caliptra-api |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
checksum::tests::test_calc_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_checksum_overflow |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
checksum::tests::test_round_trip |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_verify_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_capabilities |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_resp_header |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-api-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_security_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-auth-man-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-man-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-manifest-app::bin/caliptra-auth-manifest-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-builder |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
elf_symbols::test::test_elf_symbols |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware_not_registered |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf2rom_golden |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_fwid_elf_filename |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_image_revision_from_str |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-builder::bin/image |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_binaries_are_identical |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
106.8s |
104.0s |
106.8s |
108.2s |
58.3s |
58.8s |
59.9s |
60.1s |
56.7s |
59.3s |
58.8s |
59.3s |
test_image_options_imports_correctly |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-derive::proc-macro/caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cfi_asm_test::test::test_launder |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
caliptra-cfi-lib |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_asm |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_rand |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rand_stress |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_not_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_coverage_map_creation_data_files |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_coverage_map_creation_no_data_files_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_parse_trace_file |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage::bin/caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
array::tests::test_array_4x4_from_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array::tests::test_array_4x4_to_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_large |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bounded_address::tests::test_rom_address_validate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fuse_bank::tests::test_first_set_msbit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_dv_nonsticky_384bit_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fht_is_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fmc_priv_key_store |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_estack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_persistent_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_stack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_err |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_ok |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
persistent::tests::test_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-drivers-test-bin |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers::drivers_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_csrng |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng2 |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng_adaptive_proportion |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_csrng_repetition_count |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_doe_when_debug_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_doe_when_debug_not_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_ecc384 |
2.0s |
2.0s |
2.2s |
2.2s |
1.5s |
1.5s |
1.8s |
1.8s |
1.5s |
1.8s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
test_ecc384_sign_validation_failure |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
test_error_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_not_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_hmac384 |
1.8s |
1.8s |
2.1s |
2.1s |
1.4s |
1.4s |
2.0s |
2.0s |
1.4s |
2.0s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.5s |
0.5s |
0.6s |
test_keyvault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms_24 |
0.4s |
0.4s |
0.4s |
0.4s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_lms_32 |
4.5s |
4.5s |
4.5s |
4.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
0.2s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_mailbox_soc_to_uc |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_txn_drop |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_uc_to_soc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_negative_lms |
0.7s |
0.7s |
0.7s |
0.7s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.2s |
0.3s |
0.2s |
test_pcrbank |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_persistent |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_sha1 |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.5s |
2.7s |
2.6s |
2.4s |
2.9s |
2.8s |
2.8s |
2.7s |
2.9s |
3.0s |
2.8s |
2.9s |
test_sha256 |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
4.4s |
4.4s |
4.4s |
4.4s |
4.7s |
4.4s |
4.5s |
4.4s |
4.5s |
4.4s |
4.4s |
4.7s |
test_sha2_512_384acc |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_sha384 |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.3s |
3.3s |
3.4s |
3.3s |
3.7s |
3.7s |
3.8s |
3.8s |
3.8s |
3.6s |
3.5s |
3.7s |
test_status_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_etrng_mode |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_itrng_mode |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uart |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uc_to_soc_error_state |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-bus |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
clock::tests::test_clock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_and_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_too_far |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_mixup_timer_actions_on_cancel |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_schedule_too_far_in_future |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_searchback_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_12327834 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_attach_dev |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mmio::tests::test_bus_mmio |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_write_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_write_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_mmap_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::fake_bus::tests::test_fake_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test_clone |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-cpu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cpu::tests::test_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_pc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_xreg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_only_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_masked_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jal::tests::test_jal_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrci |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrs |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrsi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrw |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrwi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ebreak |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ecall |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_unknown_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
pic::tests::test_interrupt_priority_order |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_write_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_x0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
aes256cbc::tests::test_decrypt_1024bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_256bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_384bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_gen_key_pair |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u64 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-emu-derive::derive_bus_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_read_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_write_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive::proc-macro/caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bus::tests::test_derive_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_derive_empty_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_mask_lsbs_contiguous |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_organize_fields_by_mask |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_hex_literal_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_usize |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::sort::tests::test_sorted_by_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_attribute_or_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_field_with_attributes |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_struct |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-periph |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
asym_ecc384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.5s |
0.6s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_gen_key_kv_seed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.4s |
0.3s |
0.4s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
0.2s |
0.2s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
asym_ecc384::tests::test_sign_kv_privkey_not_allowed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_non_zero_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_zero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_single_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_two_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_zero_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_clear_secrets |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_fe |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_uds |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_error_if_w_is_not_valid |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_is_enabled |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_by_default |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_params |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_swap_word_endian |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_exact_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_small_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_tag |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_byte_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_locked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_unlocked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear_with_debug_values |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write_small |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_write_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_generic_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_lock_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive_max_limit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyforcmd_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyfordata_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_init |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_soc_to_caliptra_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_locked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sha_acc_check_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_idev_id_csr_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_ldev_id_cert_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_not_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_tb_services_cb |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_wdt |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
exception::tests::test_breakpoint |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_environment_call |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_instr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_register |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu::bin/caliptra-emu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-error |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_try_from |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::bin/caliptra-file-header-fix |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_check_failures |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_check_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::integration_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_check_only_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_check_only_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_fix |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_usage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-fmc::bin/caliptra-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-fmc::fmc_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_hand_off::test_hand_off |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.6s |
1.3s |
1.2s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.8s |
0.9s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rtalias::test_boot_status_reporting |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.6s |
1.2s |
1.6s |
1.7s |
1.2s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
test_rtalias::test_fht_info |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.8s |
1.9s |
1.6s |
1.4s |
1.0s |
1.0s |
1.1s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
test_rtalias::test_pcr_log |
2.6s |
2.6s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.9s |
2.4s |
2.4s |
2.6s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.8s |
1.8s |
1.7s |
caliptra-gen-linker-scripts |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
mmio::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::test_pretty_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_failed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_passed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_peek |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_search |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_take |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_unknown_generic_load |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_builder::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_apb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_cold_reset |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
tests::test_execution |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox_negative |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_negative_soc_mgr_mbox_users |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_output_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_sha512_acc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_exec_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_mbox_api |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model-c-binding |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_hex_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_hex_slice |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model::bin/fpga_realtime_mbox_pauser |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model::model_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_dccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_byte_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_unaligned_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_write_locked_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_invalid_instruction_exception_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mbox_pauser_sigbus |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_pcr_extend |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uninitialized_dccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_iccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_mbox_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_write_to_rom |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-app::bin/caliptra-image-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_lms |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig_h15 |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_print_lms_private_pub_key |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-elf |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_load_into_image |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_load_into_image_bad_address |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-fake-keys |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_write_lms_keys |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-serde |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_image_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-verify |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
verifier::tests::test_fmc_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_rt_load_address_range_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_lms_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_lms_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_marker |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_pk_digest_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_verify_preamble_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_owner_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_incorrect_length |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-lms-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_bytes_to_words_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_bytes_to_words_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-registers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-1_0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-latest |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-fmc::bin/caliptra-rom-test-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-rt::bin/caliptra-rom-test-rt |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/asm_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/caliptra-rom |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::rom_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
helpers::tests::test_get_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_get_data_not_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_unit_tests::test_asm |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_capabilities::test_capabilities |
0.8s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
1.0s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_cfi::test_memcpy_not_called_before_cfi_init |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_cpu_fault::test_cpu_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
test_dice_derivations::test_cold_reset_no_rng |
1.3s |
1.3s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
test_dice_derivations::test_cold_reset_status_reporting |
1.4s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.6s |
1.6s |
1.7s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_dice_derivations::test_cold_reset_success |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.2s |
1.3s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
test_fake_rom::test_fake_rom_fw_load |
0.2s |
0.3s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.6s |
0.5s |
0.8s |
0.7s |
0.4s |
0.5s |
0.5s |
0.4s |
0.4s |
0.4s |
0.4s |
0.5s |
test_fake_rom::test_fake_rom_production_enabled |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_fake_rom::test_fake_rom_production_error |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.1s |
test_fake_rom::test_fake_rom_update_reset |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
1.0s |
1.1s |
1.2s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fake_rom::test_fake_rom_version |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
test_fake_rom::test_image_verify |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_fake_rom::test_skip_kats |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
test_fips_hooks::test_fips_hook_exit |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
0.9s |
1.1s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.4s |
1.2s |
1.7s |
1.2s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_check_rom_cold_boot_status_reg |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.4s |
1.4s |
1.7s |
1.4s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_fht_info |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.4s |
1.3s |
1.6s |
1.2s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_firmware_gt_max_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.8s |
0.7s |
1.0s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_fmcalias_derivation::test_fuse_log |
1.5s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.4s |
1.2s |
1.1s |
1.4s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
test_fmcalias_derivation::test_pcr_log |
1.6s |
1.5s |
1.6s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.4s |
1.3s |
1.2s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
test_fmcalias_derivation::test_pcr_log_across_update_reset |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
2.3s |
2.2s |
2.1s |
2.0s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.6s |
1.3s |
1.4s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse |
1.5s |
1.5s |
1.6s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.8s |
1.5s |
1.9s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
test_fmcalias_derivation::test_upload_measurement_limit |
1.2s |
1.2s |
1.3s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
0.9s |
1.0s |
1.6s |
1.3s |
1.1s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_upload_measurement_limit_plus_one |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.8s |
0.7s |
0.6s |
0.7s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
test_fmcalias_derivation::test_upload_no_measurement |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.3s |
1.2s |
1.2s |
1.4s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_upload_single_measurement |
1.2s |
1.2s |
1.3s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
0.9s |
1.0s |
1.4s |
1.2s |
1.1s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_fmcalias_derivation::test_zero_firmware_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
1.0s |
0.6s |
0.7s |
0.8s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_idevid_derivation::test_generate_csr |
2.0s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.7s |
1.4s |
1.5s |
1.6s |
1.3s |
1.2s |
1.3s |
1.2s |
1.4s |
1.2s |
1.3s |
1.2s |
test_idevid_derivation::test_generate_csr_stress |
1965.2s |
1940.3s |
1961.4s |
1937.2s |
1536.3s |
1512.0s |
1536.3s |
1511.5s |
1512.0s |
1511.5s |
928.7s |
896.5s |
908.9s |
880.1s |
889.6s |
856.9s |
890.3s |
854.6s |
891.0s |
867.8s |
890.4s |
870.1s |
test_idevid_derivation::test_idev_subj_key_id_algo |
7.2s |
7.2s |
7.2s |
7.2s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.5s |
5.2s |
5.4s |
5.2s |
5.0s |
5.1s |
5.4s |
4.7s |
5.4s |
5.3s |
5.5s |
4.7s |
test_image_validation::cert_test |
2.2s |
1.7s |
2.2s |
1.6s |
3.0s |
2.3s |
2.2s |
1.6s |
1.8s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.3s |
1.2s |
1.2s |
1.1s |
test_image_validation::cert_test_with_custom_dates |
2.7s |
1.8s |
2.1s |
1.6s |
1.6s |
1.9s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.3s |
1.2s |
1.4s |
1.3s |
1.2s |
1.7s |
1.3s |
1.4s |
1.2s |
1.5s |
1.2s |
test_image_validation::cert_test_with_ueid |
1.4s |
1.3s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.2s |
1.1s |
1.1s |
1.4s |
1.2s |
1.2s |
1.0s |
1.2s |
1.2s |
1.3s |
1.0s |
test_image_validation::test_fmc_digest_mismatch |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
test_image_validation::test_fmc_entry_point_unaligned |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.8s |
0.7s |
1.0s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_after_iccm |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.9s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_load_addr_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_load_addr_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_load_addr_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
1.3s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_not_contained_in_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_rt_load_address_range_overlap |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.0s |
1.2s |
test_image_validation::test_fmc_svn_greater_than_32 |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_svn_less_than_fuse_svn |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_r |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.8s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.4s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_s |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.4s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_x |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.4s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_y |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.5s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_r |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.5s |
0.8s |
0.5s |
0.5s |
0.6s |
0.6s |
0.6s |
0.4s |
0.7s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.6s |
0.5s |
0.7s |
0.5s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_lms_optional_no_sig_mismatch_check |
2.7s |
2.6s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.4s |
2.9s |
2.4s |
2.5s |
1.7s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
test_image_validation::test_header_verify_owner_lms_sig_mismatch |
2.4s |
2.3s |
2.4s |
2.3s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
2.1s |
1.7s |
1.8s |
1.4s |
1.3s |
1.0s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
test_image_validation::test_header_verify_owner_sig_zero_fuses |
1.1s |
1.0s |
1.1s |
1.1s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
1.1s |
1.0s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.8s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_vendor_ecc_sig_mismatch |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_image_validation::test_header_verify_vendor_lms_optional_no_sig_mismatch_check |
2.7s |
2.6s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
2.0s |
test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header |
1.0s |
1.0s |
1.0s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_header_verify_vendor_lms_sig_mismatch |
2.0s |
2.0s |
2.0s |
2.0s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.1s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.4s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_pubkey |
1.7s |
1.6s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.3s |
1.1s |
1.1s |
1.0s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_signature |
1.7s |
1.6s |
1.7s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
test_image_validation::test_invalid_manifest_marker |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.7s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_invalid_manifest_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_max_fw_image |
1.3s |
1.3s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.3s |
1.4s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_image_validation::test_preamble_owner_pubkey_digest_mismatch |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.7s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_revocation |
3.4s |
3.3s |
3.4s |
3.4s |
2.5s |
2.5s |
2.6s |
2.5s |
2.5s |
2.5s |
2.8s |
2.6s |
2.8s |
2.7s |
2.6s |
2.5s |
2.6s |
2.5s |
2.5s |
2.5s |
2.6s |
2.5s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check |
39.0s |
38.6s |
39.2s |
38.8s |
29.9s |
29.5s |
30.2s |
29.7s |
29.5s |
29.7s |
33.4s |
32.0s |
32.9s |
31.6s |
30.8s |
29.8s |
31.1s |
29.8s |
30.9s |
29.6s |
31.1s |
29.9s |
test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_lms_pubkey_revocation |
23.4s |
23.1s |
23.7s |
23.4s |
17.4s |
17.0s |
17.7s |
17.3s |
17.0s |
17.3s |
19.2s |
18.1s |
18.9s |
17.6s |
17.6s |
16.6s |
17.6s |
16.8s |
17.7s |
16.5s |
17.6s |
16.7s |
test_image_validation::test_preamble_vendor_pubkey_digest_mismatch |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_zero_vendor_pubkey_digest |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.8s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_runtime_digest_mismatch |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.1s |
1.0s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
test_image_validation::test_runtime_entry_point_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.1s |
1.1s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_load_addr_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_not_contained_in_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_greater_than_max |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_less_than_fuse_svn |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
test_image_validation::test_toc_fmc_range_incorrect_order |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_fmc_range_overlap |
2.9s |
2.8s |
2.9s |
2.9s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
2.0s |
1.9s |
2.0s |
1.8s |
1.9s |
1.8s |
test_image_validation::test_toc_fmc_size_zero |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_toc_invalid_entry_count |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_toc_digest |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_rt_size_zero |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_checksum |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_large |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_small |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_zero |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_reserved_pauser |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_mailbox_errors::test_unknown_command_is_fatal |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rom_integrity::test_read_rom_info_from_fmc |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
test_rom_integrity::test_rom_integrity_failure |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_symbols::test_linker_symbols_match_memory_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_update_reset::test_check_rom_update_reset_status_reg |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_update_reset::test_fmc_is_16k |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_update_reset::test_update_reset_boot_status |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_max_fw_image |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
test_update_reset::test_update_reset_no_mailbox_cmd |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_update_reset::test_update_reset_non_fw_load_cmd |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_update_reset_success |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_update_reset::test_update_reset_verify_image_failure |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_version::test_version |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation |
1.6s |
1.6s |
2.4s |
2.4s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation |
0.6s |
0.6s |
1.4s |
1.4s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
1.3s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation |
1.1s |
1.1s |
1.4s |
1.4s |
0.8s |
0.8s |
1.3s |
1.3s |
0.8s |
1.3s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_warm_reset::test_warm_reset_during_update_reset |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
2.3s |
2.3s |
1.9s |
2.3s |
2.2s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
test_warm_reset::test_warm_reset_success |
2.4s |
2.4s |
2.7s |
2.8s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
2.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_wdt_activation_and_stoppage::test_rom_wdt_timeout |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests_get_idev_csr::test_get_csr |
1.0s |
0.9s |
1.0s |
0.9s |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
set_auth_manifest::tests::test_sort_and_duplicate_dupe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_empty |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_sort |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-runtime::bin/caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-runtime::runtime_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_authorize_and_stash::test_authorize_and_stash_after_update_reset |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.7s |
2.2s |
2.3s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.2s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.2s |
2.1s |
2.3s |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest |
3.7s |
3.7s |
3.6s |
3.6s |
3.0s |
3.0s |
3.0s |
3.0s |
3.1s |
3.0s |
2.4s |
2.5s |
2.5s |
2.5s |
2.4s |
2.3s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.2s |
2.1s |
2.3s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.2s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.3s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
2.3s |
2.1s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization |
2.7s |
2.7s |
2.6s |
2.6s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
1.9s |
1.9s |
1.9s |
2.0s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.3s |
1.6s |
1.2s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.2s |
1.6s |
1.3s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.3s |
1.7s |
1.2s |
1.4s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash |
4.5s |
4.5s |
4.5s |
4.5s |
3.6s |
3.6s |
3.6s |
3.6s |
3.7s |
3.7s |
2.5s |
2.9s |
2.6s |
3.2s |
2.5s |
2.4s |
2.8s |
2.4s |
2.5s |
2.4s |
2.9s |
2.5s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success |
3.1s |
3.1s |
3.1s |
3.1s |
2.6s |
2.5s |
2.5s |
2.5s |
2.6s |
2.6s |
2.2s |
2.4s |
2.2s |
2.3s |
2.0s |
2.0s |
2.4s |
2.0s |
2.0s |
2.0s |
2.2s |
2.0s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.6s |
1.5s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.5s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_fwid_0 |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.5s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.8s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_fwid_127 |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.5s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.4s |
1.2s |
1.2s |
1.4s |
1.6s |
1.2s |
test_boot::test_boot |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.9s |
0.9s |
0.8s |
test_boot::test_boot_tci_data |
1.8s |
1.8s |
1.7s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.0s |
1.0s |
0.9s |
1.1s |
0.9s |
1.2s |
0.9s |
0.9s |
1.1s |
1.2s |
0.9s |
test_boot::test_fw_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.2s |
1.0s |
test_boot::test_measurement_in_measurement_log_added_to_dpe |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.5s |
1.1s |
1.2s |
1.1s |
1.3s |
1.1s |
1.4s |
1.1s |
1.1s |
1.4s |
1.6s |
1.1s |
test_boot::test_persistent_data |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.4s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.8s |
0.9s |
0.9s |
0.8s |
test_boot::test_standard |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.2s |
1.0s |
1.0s |
1.3s |
1.1s |
1.0s |
test_boot::test_stress_update |
400.3s |
406.9s |
394.5s |
403.2s |
326.9s |
323.2s |
336.0s |
336.0s |
340.5s |
336.0s |
332.3s |
326.1s |
339.3s |
326.2s |
313.0s |
303.3s |
318.5s |
309.8s |
316.3s |
305.3s |
326.5s |
308.5s |
test_boot::test_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.0s |
2.1s |
2.0s |
2.0s |
2.3s |
1.8s |
2.3s |
1.8s |
1.9s |
2.2s |
1.9s |
1.9s |
test_certify_key_extended::test_dmtf_other_name_extension_not_present |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.3s |
1.6s |
1.3s |
1.5s |
1.2s |
1.3s |
1.5s |
1.4s |
1.2s |
test_certify_key_extended::test_dmtf_other_name_extension_present |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
1.2s |
1.1s |
test_certify_key_extended::test_dmtf_other_name_validation_fail |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
test_certs::test_all_measurement_apis |
6.0s |
6.0s |
6.1s |
6.1s |
4.7s |
4.6s |
5.7s |
5.6s |
4.7s |
5.7s |
3.9s |
3.8s |
5.0s |
4.0s |
3.7s |
3.6s |
3.8s |
4.3s |
3.9s |
3.9s |
4.0s |
3.9s |
test_certs::test_dpe_leaf_cert |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
1.2s |
1.2s |
1.1s |
1.1s |
test_certs::test_fmc_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.2s |
test_certs::test_full_cert_chain |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.1s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.2s |
1.0s |
1.1s |
1.2s |
test_certs::test_idev_id_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.0s |
1.0s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.3s |
test_certs::test_idev_id_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_certs::test_ldev_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.0s |
1.0s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.3s |
1.0s |
1.0s |
1.2s |
test_certs::test_rt_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.1s |
1.0s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.3s |
1.0s |
1.0s |
1.2s |
test_certs::test_rt_cert_with_custom_dates |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.3s |
1.0s |
1.1s |
1.2s |
test_disable::test_attestation_disabled_flag_after_update_reset |
3.3s |
3.3s |
3.3s |
3.3s |
2.7s |
2.6s |
2.6s |
2.6s |
2.7s |
2.7s |
2.3s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.1s |
2.2s |
2.8s |
2.1s |
2.2s |
2.3s |
test_disable::test_disable_attestation_cmd |
2.5s |
2.5s |
2.5s |
2.5s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.5s |
1.3s |
1.3s |
1.4s |
test_ecdsa::ecdsa_cmd_run_wycheproof |
10.3s |
10.3s |
10.3s |
10.3s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
4.4s |
4.5s |
4.5s |
4.4s |
4.4s |
5.5s |
4.4s |
4.5s |
4.6s |
4.4s |
4.5s |
4.4s |
test_ecdsa::test_ecdsa_hw_failure |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_ecdsa::test_ecdsa_verify_bad_chksum |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_ecdsa::test_ecdsa_verify_cmd |
1.8s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_fips::test_fips_shutdown |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_fips::test_fips_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_get_fmc_alias_csr::test_get_fmc_alias_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_get_idev_csr::test_get_csr |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_get_idev_csr::test_missing_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_capabilities |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_fw_info |
4.4s |
4.4s |
4.3s |
4.4s |
3.6s |
3.6s |
3.6s |
3.5s |
3.7s |
3.7s |
3.8s |
3.8s |
4.0s |
3.7s |
3.5s |
3.5s |
3.7s |
3.7s |
3.6s |
3.5s |
3.9s |
3.6s |
test_info::test_idev_id_info |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_dpe_header_error_code |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_asymmetric_sign |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_certify_key_csr |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_get_profile_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_rotate_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_invoke_dpe::test_invoke_dpe_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms::test_lms_verify_cmd |
2.1s |
2.1s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
1.7s |
1.5s |
1.5s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
test_lms::test_lms_verify_failure |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
test_lms::test_lms_verify_invalid_key_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
test_lms::test_lms_verify_invalid_lmots_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
test_lms::test_lms_verify_invalid_sig_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
test_mailbox::test_error_cleared |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_mailbox::test_reserved_pauser |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_mailbox::test_unimplemented_cmds |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_change_locality |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_measurement_log_pl_context_threshold |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_unset_in_header |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_pauser_privilege_levels::test_user_not_pl0 |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.1s |
1.2s |
1.2s |
1.3s |
1.2s |
test_pcr::test_extend_pcr_cmd_invalid_pcr_index |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pcr::test_extend_pcr_cmd_multiple_extensions |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_pcr::test_extend_pcr_cmd_reserved_range |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pcr::test_pcr_quote |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_revoke_exported_cdi_handle::test_export_cdi_after_revoke |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.3s |
1.2s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_set_auth_manifest::test_set_auth_manifest_cmd |
2.6s |
2.7s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.7s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len |
2.0s |
2.0s |
2.0s |
2.0s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit |
2.7s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.8s |
1.8s |
1.7s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.6s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.6s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry |
2.5s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.6s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig |
2.6s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.6s |
1.6s |
1.7s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.5s |
1.4s |
1.4s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig |
2.4s |
2.4s |
2.5s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.6s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_sign_with_export_ecdsa::test_sign_with_exported_never_derived |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_stash_measurement::test_pcr31_extended_upon_stash_measurement |
4.3s |
4.3s |
4.2s |
4.3s |
3.5s |
3.5s |
3.5s |
3.4s |
3.6s |
3.5s |
3.7s |
3.5s |
3.6s |
3.7s |
3.4s |
3.3s |
3.6s |
3.4s |
3.4s |
3.5s |
3.5s |
3.4s |
test_stash_measurement::test_stash_measurement |
2.7s |
2.7s |
2.6s |
2.6s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
1.9s |
1.8s |
2.0s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
test_tagging::test_duplicate_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_get_tagged_tci_on_non_existent_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_a_tagged_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_default_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_destroyed_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_inactive_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_retired_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
test_update_reset::test_context_has_tag_validation |
2.7s |
2.7s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
test_update_reset::test_context_tags_validation |
2.7s |
2.7s |
2.6s |
2.6s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
2.0s |
1.8s |
test_update_reset::test_dpe_validation_deformed_structure |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
test_update_reset::test_dpe_validation_illegal_state |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
test_update_reset::test_dpe_validation_used_context_threshold_exceeded |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
test_update_reset::test_pcr_reset_counter_persistence |
3.5s |
3.5s |
3.5s |
3.5s |
2.9s |
2.8s |
2.9s |
2.8s |
2.9s |
2.9s |
2.7s |
2.6s |
2.7s |
2.7s |
2.6s |
2.6s |
2.7s |
2.6s |
2.7s |
2.5s |
2.6s |
2.6s |
test_update_reset::test_rt_journey_pcr_updated_in_dpe |
2.7s |
2.7s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_tags_persistence |
3.5s |
3.5s |
3.5s |
3.5s |
2.9s |
2.8s |
2.9s |
2.8s |
2.9s |
2.9s |
2.7s |
2.6s |
2.7s |
2.7s |
2.6s |
2.6s |
2.7s |
2.5s |
2.7s |
2.5s |
2.6s |
2.7s |
test_warm_reset::test_mbox_busy_during_warm_reset |
2.4s |
2.4s |
2.8s |
2.8s |
1.8s |
1.8s |
2.6s |
2.6s |
1.8s |
2.6s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
test_warm_reset::test_mbox_idle_during_warm_reset |
2.4s |
2.4s |
2.8s |
2.8s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
2.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_warm_reset::test_rt_journey_pcr_validation |
2.6s |
2.6s |
2.9s |
2.9s |
2.0s |
2.0s |
2.7s |
2.7s |
2.0s |
2.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
caliptra-size-history::bin/caliptra-size-history |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
git::tests::test_commit_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bits::tests::test_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bits::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
lexer::test::test_foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_scope_def |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_stuff |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_type_instantiation |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
string_arena::test::foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl::bin/parse |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
crypto::test_derive_ecdsa_key |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_derive_ecdsa_keypair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg_keygen |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_kdf |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_is_valid_privkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_pubkey_ecdsa_der |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_cert_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_fmc_alias_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_pcr0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_doe_output |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_idevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_issuer_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_key_id |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_ldevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
redact::test_redact |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_none |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_single |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_two |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_get_cert_extension |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_replace_sig |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-test-harness |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test-harness-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test::caliptra_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fake_collateral_boot_test::fake_boot_test |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.3s |
0.4s |
0.4s |
0.4s |
0.3s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
jtag_test::gdb_test |
6.5s |
6.4s |
6.6s |
6.5s |
5.9s |
5.9s |
6.0s |
5.9s |
6.0s |
5.9s |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
smoke_test::retrieve_csr_test |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
smoke_test::smoke_test |
3.2s |
3.2s |
3.2s |
3.2s |
2.4s |
2.3s |
2.4s |
2.3s |
2.4s |
2.4s |
2.7s |
2.8s |
2.8s |
2.7s |
2.1s |
2.1s |
2.2s |
2.1s |
2.2s |
2.1s |
2.3s |
2.2s |
smoke_test::test_fmc_wdt_timeout |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
1.9s |
1.9s |
2.0s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
2.0s |
1.9s |
smoke_test::test_golden_idevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_golden_ldevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_rt_wdt_timeout |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
2.3s |
2.2s |
2.4s |
2.4s |
2.2s |
2.2s |
2.3s |
2.2s |
2.7s |
2.2s |
2.5s |
2.2s |
test_code_coverage::test_emu_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
7.8s |
7.0s |
8.1s |
7.3s |
7.8s |
6.7s |
8.0s |
6.7s |
8.2s |
6.9s |
8.1s |
6.7s |
warm_reset::warm_reset_basic |
2.3s |
2.3s |
2.7s |
2.7s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
2.6s |
1.6s |
1.5s |
1.6s |
1.9s |
1.5s |
1.5s |
1.9s |
1.4s |
1.9s |
1.5s |
1.7s |
1.5s |
warm_reset::warm_reset_during_fw_load |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
1.3s |
0.6s |
0.6s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.7s |
0.5s |
0.6s |
0.5s |
caliptra-test::fips_test_suite |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fw_load::corrupted_fw_load_version |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
1.0s |
1.6s |
1.0s |
1.1s |
0.9s |
1.0s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
fw_load::fw_load_bad_owner_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
1.0s |
0.9s |
0.7s |
0.7s |
0.6s |
0.8s |
0.6s |
0.7s |
0.6s |
0.7s |
0.8s |
fw_load::fw_load_bad_owner_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.8s |
0.7s |
0.8s |
0.6s |
0.8s |
0.6s |
0.7s |
1.0s |
0.7s |
0.7s |
fw_load::fw_load_bad_vendor_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.9s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
fw_load::fw_load_bad_vendor_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
fw_load::fw_load_blank_pub_key_hashes |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
fw_load::fw_load_blank_pub_keys |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.9s |
0.6s |
0.6s |
0.6s |
0.7s |
0.8s |
0.6s |
0.6s |
fw_load::fw_load_error_fmc_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.9s |
1.8s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.8s |
1.5s |
1.4s |
fw_load::fw_load_error_fmc_digest_mismatch |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.9s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_entry_point_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.9s |
1.7s |
1.8s |
1.7s |
1.6s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_entry_point_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_load_addr_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.8s |
1.7s |
1.8s |
1.7s |
1.6s |
1.6s |
1.7s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_load_addr_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.7s |
1.9s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
1.6s |
1.5s |
1.6s |
1.8s |
1.7s |
1.6s |
1.9s |
1.6s |
fw_load::fw_load_error_fmc_runtime_incorrect_order |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.8s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.7s |
1.5s |
1.7s |
1.6s |
2.0s |
1.6s |
fw_load::fw_load_error_fmc_runtime_load_addr_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.5s |
1.6s |
1.5s |
1.7s |
1.6s |
2.0s |
1.6s |
fw_load::fw_load_error_fmc_runtime_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.9s |
1.5s |
1.7s |
1.6s |
2.0s |
1.7s |
fw_load::fw_load_error_fmc_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
1.5s |
2.0s |
1.6s |
1.8s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_svn_greater_than_max_supported |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
2.0s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.5s |
1.9s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_svn_less_than_fuse |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
2.0s |
1.7s |
2.3s |
1.9s |
1.7s |
1.9s |
1.5s |
2.0s |
1.5s |
1.7s |
1.5s |
1.7s |
1.6s |
fw_load::fw_load_error_header_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.9s |
1.5s |
1.6s |
1.8s |
1.5s |
1.7s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
fw_load::fw_load_error_image_len_more_than_bundle_size |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
2.0s |
1.5s |
1.7s |
1.5s |
1.7s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_manifest_marker_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.8s |
1.4s |
1.6s |
1.4s |
1.6s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_manifest_size_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
2.1s |
fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.7s |
1.6s |
1.7s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.7s |
fw_load::fw_load_error_owner_ecc_signature_invalid |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
2.0s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_owner_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_owner_ecc_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.9s |
1.5s |
1.5s |
1.5s |
1.7s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_owner_lms_signature_invalid |
2.2s |
2.2s |
2.3s |
2.2s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
2.0s |
2.2s |
2.1s |
2.4s |
2.3s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.6s |
1.8s |
1.6s |
fw_load::fw_load_error_owner_lms_verify_failure |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.9s |
1.6s |
1.5s |
1.7s |
1.7s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_pub_key_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.9s |
1.5s |
1.5s |
1.7s |
1.6s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_owner_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.4s |
1.8s |
1.8s |
1.5s |
1.9s |
1.5s |
1.5s |
1.8s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_runtime_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.9s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_runtime_digest_mismatch |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.7s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
2.1s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
2.0s |
1.9s |
2.0s |
1.8s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_entry_point_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
2.0s |
1.8s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_load_addr_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
2.1s |
2.3s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
2.0s |
1.8s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_load_addr_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
2.1s |
2.2s |
1.9s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.8s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_runtime_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.7s |
1.6s |
1.7s |
1.7s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_runtime_svn_greater_than_max_supported |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.7s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_svn_less_than_fuse |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.7s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
fw_load::fw_load_error_toc_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.9s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_toc_digest_mismatch |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.8s |
1.7s |
1.8s |
1.7s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_toc_entry_count_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_toc_entry_range_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
2.1s |
1.7s |
1.7s |
1.7s |
1.8s |
2.0s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_update_reset_fmc_digest_mismatch |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.8s |
2.8s |
2.7s |
2.8s |
2.7s |
2.7s |
2.8s |
3.1s |
2.8s |
2.5s |
2.7s |
2.6s |
2.8s |
2.7s |
2.7s |
2.6s |
fw_load::fw_load_error_update_reset_owner_digest_failure |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.4s |
2.7s |
2.7s |
2.5s |
2.7s |
2.6s |
2.8s |
2.6s |
3.0s |
2.6s |
2.4s |
2.5s |
2.5s |
2.7s |
2.5s |
2.6s |
2.7s |
fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch |
3.1s |
3.1s |
3.1s |
3.1s |
2.5s |
2.5s |
2.8s |
2.8s |
2.6s |
2.8s |
2.8s |
3.0s |
2.7s |
2.8s |
2.6s |
2.5s |
2.6s |
2.6s |
3.3s |
2.7s |
2.7s |
2.8s |
fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch |
3.4s |
3.4s |
3.4s |
3.4s |
2.6s |
2.5s |
2.8s |
2.7s |
2.6s |
2.8s |
3.8s |
3.8s |
3.6s |
3.6s |
2.8s |
2.7s |
2.7s |
2.8s |
3.3s |
2.7s |
2.8s |
2.7s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch |
2.0s |
2.0s |
2.2s |
2.2s |
1.7s |
1.7s |
2.1s |
2.0s |
1.7s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_ecc_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.6s |
1.9s |
1.6s |
fw_load::fw_load_error_vendor_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.7s |
1.5s |
fw_load::fw_load_error_vendor_ecc_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.9s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.8s |
1.5s |
1.4s |
1.5s |
fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.7s |
2.1s |
2.0s |
1.8s |
2.1s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.6s |
1.6s |
1.6s |
2.0s |
1.7s |
1.6s |
1.7s |
fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_lms_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_lms_signature_invalid |
2.1s |
2.0s |
2.1s |
2.1s |
1.7s |
1.6s |
2.0s |
1.9s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
1.9s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_vendor_lms_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.9s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.7s |
1.5s |
1.5s |
1.4s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.9s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.4s |
1.9s |
1.8s |
1.5s |
1.9s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.4s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.9s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.3s |
1.4s |
1.5s |
1.4s |
1.4s |
jtag_locked::jtag_locked |
2.9s |
2.8s |
3.0s |
2.9s |
2.6s |
2.6s |
2.8s |
2.7s |
2.6s |
2.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
security_parameters::attempt_ssp_access_fw_load |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
security_parameters::attempt_ssp_access_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
security_parameters::attempt_ssp_access_rt |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.1s |
0.9s |
0.9s |
self_tests::fw_load_halt_check_no_output |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
self_tests::integrity_check_failure_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.9s |
2.2s |
2.1s |
2.2s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.9s |
2.3s |
2.1s |
2.4s |
2.1s |
2.1s |
2.2s |
2.0s |
2.1s |
2.2s |
2.0s |
2.2s |
2.1s |
self_tests::kat_ecc384_signature_generate_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_ecc384_signature_generate_failure_rt |
2.7s |
2.8s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.8s |
2.2s |
2.9s |
2.1s |
2.2s |
2.3s |
2.2s |
2.0s |
2.2s |
2.0s |
2.0s |
2.2s |
2.0s |
2.1s |
2.0s |
self_tests::kat_ecc384_signature_verify_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.7s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
self_tests::kat_ecc384_signature_verify_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.9s |
2.2s |
2.1s |
2.3s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.2s |
2.0s |
2.2s |
2.0s |
self_tests::kat_halt_check_no_output |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
9.2s |
9.3s |
9.5s |
8.8s |
8.7s |
9.7s |
8.6s |
9.3s |
9.5s |
8.7s |
9.4s |
8.7s |
self_tests::kat_hmac384_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.7s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
self_tests::kat_hmac384_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.9s |
2.3s |
2.1s |
2.3s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.0s |
2.2s |
2.0s |
self_tests::kat_hmac384_tag_mismatch_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
self_tests::kat_hmac384_tag_mismatch_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.9s |
2.3s |
2.2s |
2.4s |
2.1s |
2.1s |
2.5s |
2.0s |
2.1s |
2.2s |
2.0s |
2.2s |
2.0s |
self_tests::kat_lms_digest_mismatch_rom |
1.4s |
1.4s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.7s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.3s |
1.1s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
self_tests::kat_lms_digest_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.9s |
2.2s |
2.1s |
2.3s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.3s |
2.1s |
self_tests::kat_sha1_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.9s |
2.2s |
2.0s |
2.2s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha1_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.9s |
2.1s |
2.0s |
2.2s |
2.1s |
2.0s |
2.0s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha256_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
self_tests::kat_sha256_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.9s |
2.1s |
2.0s |
2.2s |
2.1s |
2.0s |
2.1s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha256_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
self_tests::kat_sha256_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.9s |
2.1s |
2.0s |
2.2s |
2.2s |
2.0s |
2.1s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.9s |
2.1s |
2.0s |
2.3s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.2s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.9s |
2.1s |
2.0s |
2.2s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.9s |
2.1s |
2.0s |
2.2s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha384_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.9s |
2.2s |
2.1s |
2.2s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
2.2s |
2.0s |
self_tests::kat_sha384_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.9s |
2.2s |
2.1s |
2.2s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
services::check_version_rom |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
services::check_version_rt |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
services::execute_all_services_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
services::execute_all_services_rt |
3.2s |
3.2s |
3.2s |
3.2s |
2.5s |
2.5s |
2.5s |
2.5s |
2.6s |
2.5s |
2.3s |
2.3s |
2.4s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.2s |
services::fips_self_test_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
services::fips_self_test_rt |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
services::version_info_update |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
services::zeroize_halt_check_no_output |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
caliptra-verilated |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_tracing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-x509 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fmc_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rt_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-zeros::bin/caliptra-zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-zeros::test_zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_zeros |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
caliptra_common |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra_registers_generator::bin/caliptra_registers_generator |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
compliance-test::bin/compliance-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
exec::tests::test_exec_process_not_found |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_process_returned_nonzero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_and_write_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_delete_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_deleted |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile_drop_on_panic |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_write_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_check_reference_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-codegen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
camel_ident_tests::test_camel_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
generate_enums_test::test_generate_enums |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
snake_ident_tests::test_snake_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-schema |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
registerfield_tests::test_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
validate::compute_reg_type_name_tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
vector_gen::bin/vector_gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.39s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 106.75s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 104.01s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 106.83s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 108.19s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.25s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.78s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.93s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 60.14s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 56.66s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.32s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.79s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.25s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.23s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
19,903 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,746 UART: csrng::test_entropy_src_seed...[ok]
439,011 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
19,831 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,904 UART: csrng::test_entropy_src_seed...[ok]
439,078 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
19,666 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,832 UART: csrng::test_entropy_src_seed...[ok]
439,045 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
19,955 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,746 UART: csrng::test_entropy_src_seed...[ok]
438,968 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
19,956 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,796 UART: csrng::test_entropy_src_seed...[ok]
439,065 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
16,848 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
16,710 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
16,814 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
16,679 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
16,590 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
16,065 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
15,786 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
16,030 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
15,951 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
15,665 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
15,818 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
16,013 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
15,986 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
15,991 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,036 writing to cptra_bootfsm_go
16,751 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
16,195 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
15,972 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
15,796 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
15,732 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
15,905 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
16,004 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
16,065 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
15,985 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
15,822 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,844 writing to cptra_bootfsm_go
17,825 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
15,942 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
15,831 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
15,850 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
15,995 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
15,873 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
15,719 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
15,982 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
15,996 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
15,628 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
15,950 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
15,827 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
16,178 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
15,995 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
15,616 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
16,120 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
15,942 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
15,760 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
15,831 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
15,899 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
16,113 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
16,027 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
15,883 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
16,008 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
16,145 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
15,959 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,544 writing to cptra_bootfsm_go
16,179 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
15,913 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
15,911 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
16,005 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
15,996 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
16,333 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
16,043 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
15,914 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
15,886 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,600 writing to cptra_bootfsm_go
16,257 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
16,114 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
15,904 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,880 writing to cptra_bootfsm_go
16,916 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
16,047 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
15,717 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,555 writing to cptra_bootfsm_go
17,389 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
16,011 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
16,004 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
16,059 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
15,964 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
16,132 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
15,638 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
15,788 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
15,992 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
16,072 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
16,103 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
16,117 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
15,905 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
15,703 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
16,119 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
21,683 UART: doe::test_decrypt...[ok]
13,249,320 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
21,733 UART: doe::test_decrypt...[ok]
13,249,131 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
21,854 UART: doe::test_decrypt...[ok]
13,460,432 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
21,873 UART: doe::test_decrypt...[ok]
13,456,599 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
21,960 UART: doe::test_decrypt...[ok]
9,939,593 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
21,866 UART: doe::test_decrypt...[ok]
9,940,450 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
21,852 UART: doe::test_decrypt...[ok]
10,198,180 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,460 writing to cptra_bootfsm_go
22,241 UART: doe::test_decrypt...[ok]
10,194,703 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
21,750 UART: doe::test_decrypt...[ok]
9,935,184 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
21,911 UART: doe::test_decrypt...[ok]
10,198,795 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,093 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,523 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,051 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,327 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,481 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,633 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,627 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,353 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,429 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,301 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,805 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,357 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
22,053 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
22,239 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
22,460 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
22,427 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
22,197 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
22,117 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
22,718 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
22,622 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
22,215 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
22,704 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
29,513 UART: ecc384::test_kat...[ok]
3,330,518 UART: ecc384::test_gen_key_pair...[ok]
6,615,836 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,898,366 UART: ecc384::test_sign...[ok]
12,199,217 UART: ecc384::test_verify...[ok]
15,790,494 UART: ecc384::test_verify_r...[ok]
19,371,774 UART: ecc384::test_verify_failure...[ok]
22,960,685 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,829,838 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,985,788 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
29,576 UART: ecc384::test_kat...[ok]
3,326,055 UART: ecc384::test_gen_key_pair...[ok]
6,613,210 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,893,301 UART: ecc384::test_sign...[ok]
12,193,583 UART: ecc384::test_verify...[ok]
15,790,249 UART: ecc384::test_verify_r...[ok]
19,373,145 UART: ecc384::test_verify_failure...[ok]
22,960,900 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,829,274 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,987,153 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
30,655 UART: ecc384::test_kat...[ok]
3,699,082 UART: ecc384::test_gen_key_pair...[ok]
6,957,965 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,213,569 UART: ecc384::test_sign...[ok]
12,500,287 UART: ecc384::test_verify...[ok]
16,079,195 UART: ecc384::test_verify_r...[ok]
23,837,644 UART: ecc384::test_verify_failure...[ok]
27,417,257 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,248,212 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,331,653 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
30,067 UART: ecc384::test_kat...[ok]
3,699,261 UART: ecc384::test_gen_key_pair...[ok]
6,960,459 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,216,181 UART: ecc384::test_sign...[ok]
12,502,001 UART: ecc384::test_verify...[ok]
16,078,357 UART: ecc384::test_verify_r...[ok]
23,825,738 UART: ecc384::test_verify_failure...[ok]
27,407,866 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,240,458 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,326,189 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
29,669 UART: ecc384::test_kat...[ok]
2,498,656 UART: ecc384::test_gen_key_pair...[ok]
4,952,384 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,404,264 UART: ecc384::test_sign...[ok]
9,127,675 UART: ecc384::test_verify...[ok]
11,820,521 UART: ecc384::test_verify_r...[ok]
14,506,857 UART: ecc384::test_verify_failure...[ok]
17,194,080 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,338,149 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,933,398 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
29,411 UART: ecc384::test_kat...[ok]
2,497,318 UART: ecc384::test_gen_key_pair...[ok]
4,954,343 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,402,574 UART: ecc384::test_sign...[ok]
9,126,866 UART: ecc384::test_verify...[ok]
11,818,825 UART: ecc384::test_verify_r...[ok]
14,502,602 UART: ecc384::test_verify_failure...[ok]
17,193,543 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,334,413 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,931,442 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
30,033 UART: ecc384::test_kat...[ok]
2,880,457 UART: ecc384::test_gen_key_pair...[ok]
5,323,472 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,764,977 UART: ecc384::test_sign...[ok]
9,477,675 UART: ecc384::test_verify...[ok]
12,157,412 UART: ecc384::test_verify_r...[ok]
14,834,545 UART: ecc384::test_verify_failure...[ok]
22,941,529 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,064,697 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,617,614 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
29,806 UART: ecc384::test_kat...[ok]
2,883,254 UART: ecc384::test_gen_key_pair...[ok]
5,326,974 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,765,852 UART: ecc384::test_sign...[ok]
9,480,030 UART: ecc384::test_verify...[ok]
12,157,586 UART: ecc384::test_verify_r...[ok]
14,834,739 UART: ecc384::test_verify_failure...[ok]
22,936,690 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,051,135 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,607,100 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
29,469 UART: ecc384::test_kat...[ok]
2,501,663 UART: ecc384::test_gen_key_pair...[ok]
4,954,179 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,404,467 UART: ecc384::test_sign...[ok]
9,127,166 UART: ecc384::test_verify...[ok]
11,820,710 UART: ecc384::test_verify_r...[ok]
14,508,081 UART: ecc384::test_verify_failure...[ok]
17,197,280 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,338,785 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,937,095 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
29,870 UART: ecc384::test_kat...[ok]
2,880,682 UART: ecc384::test_gen_key_pair...[ok]
5,323,415 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,764,359 UART: ecc384::test_sign...[ok]
9,477,495 UART: ecc384::test_verify...[ok]
12,155,672 UART: ecc384::test_verify_r...[ok]
14,832,561 UART: ecc384::test_verify_failure...[ok]
22,936,405 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,054,950 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,610,081 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,185 UART: ecc384::test_gen_key_pair...[ok]
25,595 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,227 UART: ecc384::test_sign...[ok]
42,895 UART: ecc384::test_verify...[ok]
51,939 UART: ecc384::test_verify_r...[ok]
60,642 UART: ecc384::test_verify_failure...[ok]
69,512 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,598 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,147 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,965 UART: ecc384::test_gen_key_pair...[ok]
25,583 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,113 UART: ecc384::test_sign...[ok]
42,903 UART: ecc384::test_verify...[ok]
51,977 UART: ecc384::test_verify_r...[ok]
60,728 UART: ecc384::test_verify_failure...[ok]
69,522 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,934 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,415 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,263 UART: ecc384::test_gen_key_pair...[ok]
25,165 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,629 UART: ecc384::test_sign...[ok]
42,325 UART: ecc384::test_verify...[ok]
51,249 UART: ecc384::test_verify_r...[ok]
59,900 UART: ecc384::test_verify_failure...[ok]
68,890 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,524 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,965 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,649 UART: ecc384::test_gen_key_pair...[ok]
26,151 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,127 UART: ecc384::test_sign...[ok]
43,121 UART: ecc384::test_verify...[ok]
52,345 UART: ecc384::test_verify_r...[ok]
60,616 UART: ecc384::test_verify_failure...[ok]
69,224 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,856 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,585 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,543 UART: ecc384::test_gen_key_pair...[ok]
25,385 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,075 UART: ecc384::test_sign...[ok]
43,037 UART: ecc384::test_verify...[ok]
51,797 UART: ecc384::test_verify_r...[ok]
60,474 UART: ecc384::test_verify_failure...[ok]
69,480 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,192 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,993 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,891 UART: ecc384::test_gen_key_pair...[ok]
26,199 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,615 UART: ecc384::test_sign...[ok]
43,527 UART: ecc384::test_verify...[ok]
52,585 UART: ecc384::test_verify_r...[ok]
61,042 UART: ecc384::test_verify_failure...[ok]
69,926 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,988 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,881 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,653 UART: ecc384::test_gen_key_pair...[ok]
26,357 UART: ecc384::test_gen_key_pair_with_iv...[ok]
37,185 UART: ecc384::test_sign...[ok]
43,893 UART: ecc384::test_verify...[ok]
53,289 UART: ecc384::test_verify_r...[ok]
62,060 UART: ecc384::test_verify_failure...[ok]
70,880 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,568 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,411 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,855 UART: ecc384::test_gen_key_pair...[ok]
26,171 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,927 UART: ecc384::test_sign...[ok]
43,985 UART: ecc384::test_verify...[ok]
52,707 UART: ecc384::test_verify_r...[ok]
61,650 UART: ecc384::test_verify_failure...[ok]
70,674 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,070 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,197 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,661 UART: ecc384::test_gen_key_pair...[ok]
25,615 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,915 UART: ecc384::test_sign...[ok]
42,809 UART: ecc384::test_verify...[ok]
51,861 UART: ecc384::test_verify_r...[ok]
60,018 UART: ecc384::test_verify_failure...[ok]
68,948 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,396 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,479 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,451 UART: ecc384::test_gen_key_pair...[ok]
25,649 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,167 UART: ecc384::test_sign...[ok]
42,835 UART: ecc384::test_verify...[ok]
51,907 UART: ecc384::test_verify_r...[ok]
60,376 UART: ecc384::test_verify_failure...[ok]
69,132 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,420 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
113,937 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,005 UART: ecc384::test_gen_key_pair...[ok]
26,509 UART: ecc384::test_gen_key_pair_with_iv...[ok]
37,375 UART: ecc384::test_sign...[ok]
44,175 UART: ecc384::test_verify...[ok]
53,479 UART: ecc384::test_verify_r...[ok]
62,532 UART: ecc384::test_verify_failure...[ok]
71,382 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,972 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,875 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,681 UART: ecc384::test_gen_key_pair...[ok]
25,915 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,451 UART: ecc384::test_sign...[ok]
43,387 UART: ecc384::test_verify...[ok]
52,667 UART: ecc384::test_verify_r...[ok]
61,582 UART: ecc384::test_verify_failure...[ok]
71,084 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,096 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,157 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
19,281 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
19,306 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
19,624 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
19,717 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
19,311 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
19,228 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
19,442 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
19,741 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
19,191 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
19,780 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
13,824 UART: error_reporter::test_report_fw_error...[ok]
16,859 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
13,540 UART: error_reporter::test_report_fw_error...[ok]
17,960 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
13,929 UART: error_reporter::test_report_fw_error...[ok]
16,951 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
13,948 UART: error_reporter::test_report_fw_error...[ok]
16,902 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
13,678 UART: error_reporter::test_report_fw_error...[ok]
16,672 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
13,613 UART: error_reporter::test_report_fw_error...[ok]
16,627 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
13,902 UART: error_reporter::test_report_fw_error...[ok]
16,905 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
13,809 UART: error_reporter::test_report_fw_error...[ok]
16,815 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
13,736 UART: error_reporter::test_report_fw_error...[ok]
16,730 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
13,898 UART: error_reporter::test_report_fw_error...[ok]
16,880 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
30,977 UART: hmac384::test_kat...[ok]
70,077 UART: hmac384::test_hmac0...[ok]
86,454 UART: hmac384::test_hmac1...[ok]
108,930 UART: hmac384::test_hmac2...[ok]
6,696,491 UART: hmac384::test_hmac3...[ok]
13,288,583 UART: hmac384::test_hmac4...[ok]
19,880,749 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,453,774 UART: hmac384::test_hmac5...[ok]
29,823,236 UART: hmac384::test_kdf0...[ok]
33,148,866 UART: hmac384::test_kdf1...[ok]
36,478,782 UART: hmac384::test_kdf2...[ok]
36,506,797 UART: hmac384::test_hmac_multi_block...[ok]
36,524,416 UART: hmac384::test_hmac_exact_single_block...[ok]
36,547,430 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
30,791 UART: hmac384::test_kat...[ok]
70,068 UART: hmac384::test_hmac0...[ok]
88,713 UART: hmac384::test_hmac1...[ok]
108,591 UART: hmac384::test_hmac2...[ok]
6,697,588 UART: hmac384::test_hmac3...[ok]
13,289,631 UART: hmac384::test_hmac4...[ok]
19,859,184 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,428,472 UART: hmac384::test_hmac5...[ok]
29,799,983 UART: hmac384::test_kdf0...[ok]
33,126,720 UART: hmac384::test_kdf1...[ok]
36,456,107 UART: hmac384::test_kdf2...[ok]
36,484,230 UART: hmac384::test_hmac_multi_block...[ok]
36,502,558 UART: hmac384::test_hmac_exact_single_block...[ok]
36,522,997 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
31,176 UART: hmac384::test_kat...[ok]
455,445 UART: hmac384::test_hmac0...[ok]
654,502 UART: hmac384::test_hmac1...[ok]
857,990 UART: hmac384::test_hmac2...[ok]
7,560,566 UART: hmac384::test_hmac3...[ok]
14,065,909 UART: hmac384::test_hmac4...[ok]
20,576,532 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,096,622 UART: hmac384::test_hmac5...[ok]
30,377,053 UART: hmac384::test_kdf0...[ok]
33,651,085 UART: hmac384::test_kdf1...[ok]
36,922,250 UART: hmac384::test_kdf2...[ok]
36,937,609 UART: hmac384::test_hmac_multi_block...[ok]
40,333,986 UART: hmac384::test_hmac_exact_single_block...[ok]
40,539,318 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,595 writing to cptra_bootfsm_go
31,391 UART: hmac384::test_kat...[ok]
455,064 UART: hmac384::test_hmac0...[ok]
654,702 UART: hmac384::test_hmac1...[ok]
858,983 UART: hmac384::test_hmac2...[ok]
7,561,776 UART: hmac384::test_hmac3...[ok]
14,068,971 UART: hmac384::test_hmac4...[ok]
20,577,000 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,086,754 UART: hmac384::test_hmac5...[ok]
30,365,744 UART: hmac384::test_kdf0...[ok]
33,637,100 UART: hmac384::test_kdf1...[ok]
36,902,873 UART: hmac384::test_kdf2...[ok]
36,917,452 UART: hmac384::test_hmac_multi_block...[ok]
40,325,085 UART: hmac384::test_hmac_exact_single_block...[ok]
40,528,872 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
30,640 UART: hmac384::test_kat...[ok]
69,715 UART: hmac384::test_hmac0...[ok]
87,580 UART: hmac384::test_hmac1...[ok]
108,389 UART: hmac384::test_hmac2...[ok]
5,036,080 UART: hmac384::test_hmac3...[ok]
9,963,025 UART: hmac384::test_hmac4...[ok]
14,890,943 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,819,093 UART: hmac384::test_hmac5...[ok]
22,358,559 UART: hmac384::test_kdf0...[ok]
24,855,001 UART: hmac384::test_kdf1...[ok]
27,351,807 UART: hmac384::test_kdf2...[ok]
27,376,315 UART: hmac384::test_hmac_multi_block...[ok]
27,396,051 UART: hmac384::test_hmac_exact_single_block...[ok]
27,416,602 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,433 writing to cptra_bootfsm_go
32,126 UART: hmac384::test_kat...[ok]
69,772 UART: hmac384::test_hmac0...[ok]
87,134 UART: hmac384::test_hmac1...[ok]
108,603 UART: hmac384::test_hmac2...[ok]
5,035,090 UART: hmac384::test_hmac3...[ok]
9,964,440 UART: hmac384::test_hmac4...[ok]
14,890,019 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,818,288 UART: hmac384::test_hmac5...[ok]
22,354,698 UART: hmac384::test_kdf0...[ok]
24,849,916 UART: hmac384::test_kdf1...[ok]
27,342,309 UART: hmac384::test_kdf2...[ok]
27,372,465 UART: hmac384::test_hmac_multi_block...[ok]
27,392,476 UART: hmac384::test_hmac_exact_single_block...[ok]
27,412,614 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
31,007 UART: hmac384::test_kat...[ok]
454,205 UART: hmac384::test_hmac0...[ok]
652,197 UART: hmac384::test_hmac1...[ok]
858,337 UART: hmac384::test_hmac2...[ok]
5,931,263 UART: hmac384::test_hmac3...[ok]
10,808,511 UART: hmac384::test_hmac4...[ok]
15,684,533 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,565,393 UART: hmac384::test_hmac5...[ok]
23,028,269 UART: hmac384::test_kdf0...[ok]
25,482,171 UART: hmac384::test_kdf1...[ok]
27,933,768 UART: hmac384::test_kdf2...[ok]
27,948,424 UART: hmac384::test_hmac_multi_block...[ok]
27,959,299 UART: hmac384::test_hmac_exact_single_block...[ok]
27,971,071 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
30,970 UART: hmac384::test_kat...[ok]
453,510 UART: hmac384::test_hmac0...[ok]
652,985 UART: hmac384::test_hmac1...[ok]
858,459 UART: hmac384::test_hmac2...[ok]
5,926,484 UART: hmac384::test_hmac3...[ok]
10,802,843 UART: hmac384::test_hmac4...[ok]
15,677,045 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,561,021 UART: hmac384::test_hmac5...[ok]
23,025,199 UART: hmac384::test_kdf0...[ok]
25,477,626 UART: hmac384::test_kdf1...[ok]
27,932,330 UART: hmac384::test_kdf2...[ok]
27,946,266 UART: hmac384::test_hmac_multi_block...[ok]
27,959,160 UART: hmac384::test_hmac_exact_single_block...[ok]
27,970,819 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
30,582 UART: hmac384::test_kat...[ok]
70,916 UART: hmac384::test_hmac0...[ok]
87,817 UART: hmac384::test_hmac1...[ok]
108,077 UART: hmac384::test_hmac2...[ok]
5,033,796 UART: hmac384::test_hmac3...[ok]
9,964,226 UART: hmac384::test_hmac4...[ok]
14,889,782 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,818,208 UART: hmac384::test_hmac5...[ok]
22,357,950 UART: hmac384::test_kdf0...[ok]
24,852,837 UART: hmac384::test_kdf1...[ok]
27,348,192 UART: hmac384::test_kdf2...[ok]
27,376,224 UART: hmac384::test_hmac_multi_block...[ok]
27,395,216 UART: hmac384::test_hmac_exact_single_block...[ok]
27,415,864 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
30,880 UART: hmac384::test_kat...[ok]
454,323 UART: hmac384::test_hmac0...[ok]
652,657 UART: hmac384::test_hmac1...[ok]
857,447 UART: hmac384::test_hmac2...[ok]
5,925,802 UART: hmac384::test_hmac3...[ok]
10,803,276 UART: hmac384::test_hmac4...[ok]
15,683,350 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,567,367 UART: hmac384::test_hmac5...[ok]
23,032,442 UART: hmac384::test_kdf0...[ok]
25,486,247 UART: hmac384::test_kdf1...[ok]
27,938,469 UART: hmac384::test_kdf2...[ok]
27,954,123 UART: hmac384::test_hmac_multi_block...[ok]
27,965,858 UART: hmac384::test_hmac_exact_single_block...[ok]
27,977,665 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,712 UART: hmac384::test_hmac0...[ok]
13,671 UART: hmac384::test_hmac1...[ok]
17,694 UART: hmac384::test_hmac2...[ok]
37,409 UART: hmac384::test_hmac3...[ok]
57,647 UART: hmac384::test_hmac4...[ok]
78,188 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,221 UART: hmac384::test_hmac5...[ok]
121,813 UART: hmac384::test_kdf0...[ok]
138,411 UART: hmac384::test_kdf1...[ok]
153,833 UART: hmac384::test_kdf2...[ok]
159,338 UART: hmac384::test_hmac_multi_block...[ok]
165,019 UART: hmac384::test_hmac_exact_single_block...[ok]
171,005 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,636 UART: hmac384::test_hmac0...[ok]
13,705 UART: hmac384::test_hmac1...[ok]
17,846 UART: hmac384::test_hmac2...[ok]
37,433 UART: hmac384::test_hmac3...[ok]
56,805 UART: hmac384::test_hmac4...[ok]
76,948 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,987 UART: hmac384::test_hmac5...[ok]
120,331 UART: hmac384::test_kdf0...[ok]
136,393 UART: hmac384::test_kdf1...[ok]
151,757 UART: hmac384::test_kdf2...[ok]
157,372 UART: hmac384::test_hmac_multi_block...[ok]
163,391 UART: hmac384::test_hmac_exact_single_block...[ok]
169,295 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,800 UART: hmac384::test_hmac0...[ok]
14,045 UART: hmac384::test_hmac1...[ok]
18,482 UART: hmac384::test_hmac2...[ok]
38,681 UART: hmac384::test_hmac3...[ok]
58,939 UART: hmac384::test_hmac4...[ok]
78,906 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,757 UART: hmac384::test_hmac5...[ok]
123,737 UART: hmac384::test_kdf0...[ok]
140,525 UART: hmac384::test_kdf1...[ok]
156,525 UART: hmac384::test_kdf2...[ok]
162,180 UART: hmac384::test_hmac_multi_block...[ok]
168,011 UART: hmac384::test_hmac_exact_single_block...[ok]
174,169 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,988 UART: hmac384::test_hmac0...[ok]
14,321 UART: hmac384::test_hmac1...[ok]
18,544 UART: hmac384::test_hmac2...[ok]
38,933 UART: hmac384::test_hmac3...[ok]
58,727 UART: hmac384::test_hmac4...[ok]
79,168 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,241 UART: hmac384::test_hmac5...[ok]
123,429 UART: hmac384::test_kdf0...[ok]
139,809 UART: hmac384::test_kdf1...[ok]
155,451 UART: hmac384::test_kdf2...[ok]
161,204 UART: hmac384::test_hmac_multi_block...[ok]
167,303 UART: hmac384::test_hmac_exact_single_block...[ok]
173,475 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,512 UART: hmac384::test_hmac0...[ok]
13,587 UART: hmac384::test_hmac1...[ok]
17,566 UART: hmac384::test_hmac2...[ok]
37,145 UART: hmac384::test_hmac3...[ok]
57,061 UART: hmac384::test_hmac4...[ok]
77,168 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,509 UART: hmac384::test_hmac5...[ok]
120,953 UART: hmac384::test_kdf0...[ok]
137,787 UART: hmac384::test_kdf1...[ok]
152,983 UART: hmac384::test_kdf2...[ok]
158,564 UART: hmac384::test_hmac_multi_block...[ok]
164,433 UART: hmac384::test_hmac_exact_single_block...[ok]
170,389 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,786 UART: hmac384::test_hmac0...[ok]
13,979 UART: hmac384::test_hmac1...[ok]
17,980 UART: hmac384::test_hmac2...[ok]
37,497 UART: hmac384::test_hmac3...[ok]
57,739 UART: hmac384::test_hmac4...[ok]
77,676 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,407 UART: hmac384::test_hmac5...[ok]
121,215 UART: hmac384::test_kdf0...[ok]
137,501 UART: hmac384::test_kdf1...[ok]
152,445 UART: hmac384::test_kdf2...[ok]
158,132 UART: hmac384::test_hmac_multi_block...[ok]
163,869 UART: hmac384::test_hmac_exact_single_block...[ok]
169,931 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,976 UART: hmac384::test_hmac0...[ok]
14,269 UART: hmac384::test_hmac1...[ok]
18,350 UART: hmac384::test_hmac2...[ok]
38,911 UART: hmac384::test_hmac3...[ok]
59,533 UART: hmac384::test_hmac4...[ok]
80,306 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,891 UART: hmac384::test_hmac5...[ok]
123,663 UART: hmac384::test_kdf0...[ok]
140,499 UART: hmac384::test_kdf1...[ok]
156,337 UART: hmac384::test_kdf2...[ok]
161,920 UART: hmac384::test_hmac_multi_block...[ok]
167,769 UART: hmac384::test_hmac_exact_single_block...[ok]
173,939 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,798 UART: hmac384::test_hmac0...[ok]
13,973 UART: hmac384::test_hmac1...[ok]
18,164 UART: hmac384::test_hmac2...[ok]
37,835 UART: hmac384::test_hmac3...[ok]
57,159 UART: hmac384::test_hmac4...[ok]
77,528 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,549 UART: hmac384::test_hmac5...[ok]
121,301 UART: hmac384::test_kdf0...[ok]
137,847 UART: hmac384::test_kdf1...[ok]
153,815 UART: hmac384::test_kdf2...[ok]
159,610 UART: hmac384::test_hmac_multi_block...[ok]
165,655 UART: hmac384::test_hmac_exact_single_block...[ok]
171,851 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,820 UART: hmac384::test_hmac0...[ok]
13,739 UART: hmac384::test_hmac1...[ok]
18,002 UART: hmac384::test_hmac2...[ok]
37,597 UART: hmac384::test_hmac3...[ok]
56,497 UART: hmac384::test_hmac4...[ok]
76,750 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,489 UART: hmac384::test_hmac5...[ok]
120,057 UART: hmac384::test_kdf0...[ok]
136,003 UART: hmac384::test_kdf1...[ok]
151,579 UART: hmac384::test_kdf2...[ok]
157,174 UART: hmac384::test_hmac_multi_block...[ok]
163,225 UART: hmac384::test_hmac_exact_single_block...[ok]
169,101 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,632 UART: hmac384::test_hmac0...[ok]
13,789 UART: hmac384::test_hmac1...[ok]
17,994 UART: hmac384::test_hmac2...[ok]
37,311 UART: hmac384::test_hmac3...[ok]
57,179 UART: hmac384::test_hmac4...[ok]
77,142 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,537 UART: hmac384::test_hmac5...[ok]
120,845 UART: hmac384::test_kdf0...[ok]
137,729 UART: hmac384::test_kdf1...[ok]
153,541 UART: hmac384::test_kdf2...[ok]
158,940 UART: hmac384::test_hmac_multi_block...[ok]
164,685 UART: hmac384::test_hmac_exact_single_block...[ok]
170,823 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,754 UART: hmac384::test_hmac0...[ok]
13,753 UART: hmac384::test_hmac1...[ok]
17,956 UART: hmac384::test_hmac2...[ok]
37,969 UART: hmac384::test_hmac3...[ok]
58,105 UART: hmac384::test_hmac4...[ok]
78,396 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,069 UART: hmac384::test_hmac5...[ok]
122,003 UART: hmac384::test_kdf0...[ok]
138,953 UART: hmac384::test_kdf1...[ok]
154,931 UART: hmac384::test_kdf2...[ok]
160,830 UART: hmac384::test_hmac_multi_block...[ok]
166,827 UART: hmac384::test_hmac_exact_single_block...[ok]
172,771 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,994 UART: hmac384::test_hmac0...[ok]
14,121 UART: hmac384::test_hmac1...[ok]
18,246 UART: hmac384::test_hmac2...[ok]
38,587 UART: hmac384::test_hmac3...[ok]
59,209 UART: hmac384::test_hmac4...[ok]
79,226 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,329 UART: hmac384::test_hmac5...[ok]
123,217 UART: hmac384::test_kdf0...[ok]
140,309 UART: hmac384::test_kdf1...[ok]
156,445 UART: hmac384::test_kdf2...[ok]
162,168 UART: hmac384::test_hmac_multi_block...[ok]
168,093 UART: hmac384::test_hmac_exact_single_block...[ok]
174,121 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,792 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
23,416 UART: test_lms_24::test_coefficient...[ok]
26,154 UART: test_lms_24::test_get_lms_parameters...[ok]
29,130 UART: test_lms_24::test_hash_message_24...[ok]
43,341 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
23,562 UART: test_lms_24::test_coefficient...[ok]
26,240 UART: test_lms_24::test_get_lms_parameters...[ok]
29,233 UART: test_lms_24::test_hash_message_24...[ok]
41,966 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
23,600 UART: test_lms_24::test_coefficient...[ok]
26,312 UART: test_lms_24::test_get_lms_parameters...[ok]
29,329 UART: test_lms_24::test_hash_message_24...[ok]
42,089 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
23,896 UART: test_lms_24::test_coefficient...[ok]
26,630 UART: test_lms_24::test_get_lms_parameters...[ok]
29,602 UART: test_lms_24::test_hash_message_24...[ok]
42,317 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
23,865 UART: test_lms_24::test_coefficient...[ok]
26,947 UART: test_lms_24::test_get_lms_parameters...[ok]
30,442 UART: test_lms_24::test_hash_message_24...[ok]
43,795 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,116 writing to cptra_bootfsm_go
24,971 UART: test_lms_24::test_coefficient...[ok]
28,145 UART: test_lms_24::test_get_lms_parameters...[ok]
31,572 UART: test_lms_24::test_hash_message_24...[ok]
45,025 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
24,112 UART: test_lms_24::test_coefficient...[ok]
27,229 UART: test_lms_24::test_get_lms_parameters...[ok]
30,703 UART: test_lms_24::test_hash_message_24...[ok]
44,055 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
23,990 UART: test_lms_24::test_coefficient...[ok]
27,114 UART: test_lms_24::test_get_lms_parameters...[ok]
30,541 UART: test_lms_24::test_hash_message_24...[ok]
43,937 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
23,790 UART: test_lms_24::test_coefficient...[ok]
26,922 UART: test_lms_24::test_get_lms_parameters...[ok]
30,344 UART: test_lms_24::test_hash_message_24...[ok]
43,783 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
24,154 UART: test_lms_24::test_coefficient...[ok]
27,248 UART: test_lms_24::test_get_lms_parameters...[ok]
30,756 UART: test_lms_24::test_hash_message_24...[ok]
44,109 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
22,674 UART: test_lms_32::test_hash_message_32...[ok]
41,830 UART: test_lms_32::test_ots_32...[ok]
21,830,985 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,138 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
22,778 UART: test_lms_32::test_hash_message_32...[ok]
41,928 UART: test_lms_32::test_ots_32...[ok]
21,831,072 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,211 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
23,156 UART: test_lms_32::test_hash_message_32...[ok]
42,400 UART: test_lms_32::test_ots_32...[ok]
21,831,497 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,618 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
23,120 UART: test_lms_32::test_hash_message_32...[ok]
42,277 UART: test_lms_32::test_ots_32...[ok]
21,831,392 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,550 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
22,985 UART: test_lms_32::test_hash_message_32...[ok]
42,273 UART: test_lms_32::test_ots_32...[ok]
653,324 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,165 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
23,085 UART: test_lms_32::test_hash_message_32...[ok]
42,366 UART: test_lms_32::test_ots_32...[ok]
653,451 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,270 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,910 writing to cptra_bootfsm_go
23,981 UART: test_lms_32::test_hash_message_32...[ok]
43,203 UART: test_lms_32::test_ots_32...[ok]
654,253 UART: test_lms_32::test_lms_lower_32...[ok]
1,971,141 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
23,526 UART: test_lms_32::test_hash_message_32...[ok]
42,738 UART: test_lms_32::test_ots_32...[ok]
653,807 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,679 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
22,933 UART: test_lms_32::test_hash_message_32...[ok]
42,140 UART: test_lms_32::test_ots_32...[ok]
653,195 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,088 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
23,397 UART: test_lms_32::test_hash_message_32...[ok]
42,672 UART: test_lms_32::test_ots_32...[ok]
653,703 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,549 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
3,216 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,402 UART: cmd: 0x50000000
19,195 UART: dlen: 8
20,280 >>> mbox cmd response: success
20,720 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,557 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,259 UART: cmd: 0x50000000
29,148 UART: dlen: 7
30,209 >>> mbox cmd response: success
30,685 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,678 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,382 UART: cmd: 0x50000000
39,274 UART: dlen: 0
40,272 >>> mbox cmd response: success
40,694 UART: buf: [00000000, 00000000, 00000000, 00000000]
46,987 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,688 UART: cmd: 0x50000001
49,569 UART: dlen: 5
50,621 >>> mbox cmd response: success
51,113 UART: buf: [01, 23, 45, 67, 89]
55,702 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,403 UART: cmd: 0x50000001
58,285 UART: dlen: 6
59,333 >>> mbox cmd response: success
59,810 UART: buf: [01, 23, 45, 67, 89]
64,405 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,110 UART: cmd: 0x50000001
66,991 UART: dlen: 9
68,035 >>> mbox cmd response: success
68,511 UART: buf: [01, 23, 45, 67, 89]
73,141 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,848 UART: cmd: 0x60000000
75,732 UART: dlen: 16
77,211 UART: buf: [67452301, efcdab89]
80,757 UART: buf: [33221100, 77665544]
83,934 >>> mbox cmd response: success
84,199 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,901 UART: cmd: 0x60000000
86,835 UART: dlen: 13
88,309 UART: buf: [67452301, efcdab89]
91,801 UART: buf: [33221100, 00000044]
95,169 >>> mbox cmd response: success
95,428 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,121 UART: cmd: 0x60000000
98,005 UART: dlen: 12
99,491 UART: buf: [67452301, efcdab89]
102,986 UART: buf: [33221100, 00000000]
106,365 >>> mbox cmd response: success
106,624 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,300 UART: cmd: 0x60000000
109,182 UART: dlen: 0
110,247 >>> mbox cmd response: success
110,508 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,241 UART: cmd: 0x70000000
113,514 >>> mbox cmd response: success
113,806 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,500 UART: cmd: 0x60000000
116,354 UART: dlen: 5
117,856 UART: buf: [04050607, 00000003]
121,352 >>> mbox cmd response: success
121,613 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,293 UART: cmd: 0x80000000
123,833 >>> mbox cmd response: failed
124,140 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,824 UART: cmd: 0x60000000
126,704 UART: dlen: 5
128,146 UART: buf: [04050607, 00000003]
131,666 >>> mbox cmd response: success
131,925 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,610 UART: cmd: 0x90000000
134,490 UART: dlen: 8
135,934 UART: buf: [08070605]
138,020 >>> mbox cmd response: success
138,286 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,961 UART: cmd: 0xa0000000
140,518 >>> mbox cmd response data (4 bytes)
140,920 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,612 UART: cmd: 0xb0000000
143,492 UART: dlen: 6
144,974 UART: buf: [0c0d0e0f, 00000a0b]
148,582 >>> mbox cmd response data (2 bytes)
148,960 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,640 UART: cmd: 0xc0000000
151,285 >>> mbox cmd response data (9 bytes)
151,677 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,358 UART: cmd: 0xd0000000
153,918 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,204 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,347 UART: cmd: 0x50000000
19,156 UART: dlen: 8
20,223 >>> mbox cmd response: success
20,661 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,550 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,251 UART: cmd: 0x50000000
29,141 UART: dlen: 7
30,194 >>> mbox cmd response: success
30,696 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,668 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,363 UART: cmd: 0x50000000
39,249 UART: dlen: 0
40,243 >>> mbox cmd response: success
41,139 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,016 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,729 UART: cmd: 0x50000001
49,616 UART: dlen: 5
50,669 >>> mbox cmd response: success
51,148 UART: buf: [01, 23, 45, 67, 89]
55,751 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,451 UART: cmd: 0x50000001
58,347 UART: dlen: 6
59,393 >>> mbox cmd response: success
59,869 UART: buf: [01, 23, 45, 67, 89]
64,481 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,185 UART: cmd: 0x50000001
67,067 UART: dlen: 9
68,123 >>> mbox cmd response: success
68,598 UART: buf: [01, 23, 45, 67, 89]
73,187 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,899 UART: cmd: 0x60000000
75,783 UART: dlen: 16
77,265 UART: buf: [67452301, efcdab89]
80,830 UART: buf: [33221100, 77665544]
83,993 >>> mbox cmd response: success
84,253 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,952 UART: cmd: 0x60000000
86,842 UART: dlen: 13
88,326 UART: buf: [67452301, efcdab89]
91,822 UART: buf: [33221100, 00000044]
95,224 >>> mbox cmd response: success
95,488 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,183 UART: cmd: 0x60000000
98,070 UART: dlen: 12
99,558 UART: buf: [67452301, efcdab89]
103,054 UART: buf: [33221100, 00000000]
106,442 >>> mbox cmd response: success
106,704 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,381 UART: cmd: 0x60000000
109,262 UART: dlen: 0
110,310 >>> mbox cmd response: success
110,568 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,247 UART: cmd: 0x70000000
112,786 >>> mbox cmd response: success
113,046 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,737 UART: cmd: 0x60000000
115,637 UART: dlen: 5
117,124 UART: buf: [04050607, 00000003]
120,809 >>> mbox cmd response: success
121,090 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,780 UART: cmd: 0x80000000
123,387 >>> mbox cmd response: failed
123,696 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,382 UART: cmd: 0x60000000
126,267 UART: dlen: 5
127,706 UART: buf: [04050607, 00000003]
131,193 >>> mbox cmd response: success
131,452 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,135 UART: cmd: 0x90000000
134,014 UART: dlen: 8
135,457 UART: buf: [08070605]
137,543 >>> mbox cmd response: success
137,824 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,501 UART: cmd: 0xa0000000
140,061 >>> mbox cmd response data (4 bytes)
140,466 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,161 UART: cmd: 0xb0000000
143,048 UART: dlen: 6
144,536 UART: buf: [0c0d0e0f, 00000a0b]
148,095 >>> mbox cmd response data (2 bytes)
148,476 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,157 UART: cmd: 0xc0000000
150,830 >>> mbox cmd response data (9 bytes)
151,225 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,906 UART: cmd: 0xd0000000
153,470 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,156 writing to cptra_bootfsm_go
4,692 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
18,825 UART: cmd: 0x50000000
20,680 UART: dlen: 8
21,727 >>> mbox cmd response: success
22,189 UART: buf: [67452301, efcdab89, 00000000, 00000000]
28,112 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
28,840 UART: cmd: 0x50000000
30,716 UART: dlen: 7
31,789 >>> mbox cmd response: success
32,284 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
38,292 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
39,006 UART: cmd: 0x50000000
40,894 UART: dlen: 0
41,871 >>> mbox cmd response: success
42,358 UART: buf: [00000000, 00000000, 00000000, 00000000]
48,614 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
49,317 UART: cmd: 0x50000001
51,206 UART: dlen: 5
52,277 >>> mbox cmd response: success
52,756 UART: buf: [01, 23, 45, 67, 89]
57,334 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
58,037 UART: cmd: 0x50000001
59,929 UART: dlen: 6
60,980 >>> mbox cmd response: success
61,455 UART: buf: [01, 23, 45, 67, 89]
66,035 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,750 UART: cmd: 0x50000001
68,637 UART: dlen: 9
69,687 >>> mbox cmd response: success
70,165 UART: buf: [01, 23, 45, 67, 89]
74,767 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
75,486 UART: cmd: 0x60000000
77,370 UART: dlen: 16
78,852 UART: buf: [67452301, efcdab89]
82,410 UART: buf: [33221100, 77665544]
85,592 >>> mbox cmd response: success
85,868 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
86,587 UART: cmd: 0x60000000
88,474 UART: dlen: 13
89,958 UART: buf: [67452301, efcdab89]
93,457 UART: buf: [33221100, 00000044]
96,842 >>> mbox cmd response: success
97,109 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,810 UART: cmd: 0x60000000
99,692 UART: dlen: 12
101,174 UART: buf: [67452301, efcdab89]
104,668 UART: buf: [33221100, 00000000]
108,037 >>> mbox cmd response: success
108,307 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,988 UART: cmd: 0x60000000
110,891 UART: dlen: 0
111,940 >>> mbox cmd response: success
112,203 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,891 UART: cmd: 0x70000000
114,483 >>> mbox cmd response: success
114,744 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
115,437 UART: cmd: 0x60000000
117,316 UART: dlen: 5
118,803 UART: buf: [04050607, 00000003]
122,290 >>> mbox cmd response: success
122,556 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
123,239 UART: cmd: 0x80000000
124,830 >>> mbox cmd response: failed
125,135 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,829 UART: cmd: 0x60000000
127,712 UART: dlen: 5
129,174 UART: buf: [04050607, 00000003]
132,664 >>> mbox cmd response: success
132,930 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
133,620 UART: cmd: 0x90000000
135,504 UART: dlen: 8
136,953 UART: buf: [08070605]
139,040 >>> mbox cmd response: success
139,306 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,983 UART: cmd: 0xa0000000
141,547 >>> mbox cmd response data (4 bytes)
141,948 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
142,645 UART: cmd: 0xb0000000
144,528 UART: dlen: 6
146,012 UART: buf: [0c0d0e0f, 00000a0b]
149,576 >>> mbox cmd response data (2 bytes)
149,956 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
150,664 UART: cmd: 0xc0000000
152,340 >>> mbox cmd response data (9 bytes)
152,736 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
153,425 UART: cmd: 0xd0000000
154,983 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,453 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,616 UART: cmd: 0x50000000
19,408 UART: dlen: 8
20,442 >>> mbox cmd response: success
20,935 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,845 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,579 UART: cmd: 0x50000000
29,457 UART: dlen: 7
31,478 UART: buf: [ 31,788 >>> mbox cmd response: success
67452301, 00cdab89, 00000000, 00000000]
37,045 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,779 UART: cmd: 0x50000000
39,664 UART: dlen: 0
40,642 >>> mbox cmd response: success
41,084 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,386 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,093 UART: cmd: 0x50000001
49,979 UART: dlen: 5
51,028 >>> mbox cmd response: success
51,510 UART: buf: [01, 23, 45, 67, 89]
56,103 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,811 UART: cmd: 0x50000001
58,698 UART: dlen: 6
59,744 >>> mbox cmd response: success
60,222 UART: buf: [01, 23, 45, 67, 89]
64,807 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,538 UART: cmd: 0x50000001
67,423 UART: dlen: 9
68,473 >>> mbox cmd response: success
68,949 UART: buf: [01, 23, 45, 67, 89]
73,530 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,244 UART: cmd: 0x60000000
76,163 UART: dlen: 16
77,655 UART: buf: [67452301, efcdab89]
81,152 UART: buf: [33221100, 77665544]
84,309 >>> mbox cmd response: success
84,576 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,335 UART: cmd: 0x60000000
87,222 UART: dlen: 13
88,706 UART: buf: [67452301, efcdab89]
92,206 UART: buf: [33221100, 00000044]
95,634 >>> mbox cmd response: success
95,917 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,617 UART: cmd: 0x60000000
98,502 UART: dlen: 12
99,987 UART: buf: [67452301, efcdab89]
103,482 UART: buf: [33221100, 00000000]
106,862 >>> mbox cmd response: success
107,127 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,805 UART: cmd: 0x60000000
109,782 UART: dlen: 0
110,702 >>> mbox cmd response: success
110,959 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,647 UART: cmd: 0x70000000
113,196 >>> mbox cmd response: success
113,460 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,151 UART: cmd: 0x60000000
116,037 UART: dlen: 5
117,548 UART: buf: [04050607, 00000003]
121,047 >>> mbox cmd response: success
121,316 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,002 UART: cmd: 0x80000000
123,549 >>> mbox cmd response: failed
123,860 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,550 UART: cmd: 0x60000000
126,438 UART: dlen: 5
127,877 UART: buf: [04050607, 00000003]
131,363 >>> mbox cmd response: success
131,623 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,323 UART: cmd: 0x90000000
134,202 UART: dlen: 8
135,638 UART: buf: [08070605]
137,723 >>> mbox cmd response: success
137,984 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,682 UART: cmd: 0xa0000000
140,246 >>> mbox cmd response data (4 bytes)
140,651 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,348 UART: cmd: 0xb0000000
143,232 UART: dlen: 6
144,716 UART: buf: [0c0d0e0f, 00000a0b]
148,271 >>> mbox cmd response data (2 bytes)
148,647 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,333 UART: cmd: 0xc0000000
151,001 >>> mbox cmd response data (9 bytes)
151,400 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,086 UART: cmd: 0xd0000000
153,653 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,417 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,600 UART: cmd: 0x50000000
19,400 UART: dlen: 8
20,411 >>> mbox cmd response: success
20,897 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,769 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,471 UART: cmd: 0x50000000
29,355 UART: dlen: 7
30,407 >>> mbox cmd response: success
30,878 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,885 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,572 UART: cmd: 0x50000000
39,460 UART: dlen: 0
40,455 >>> mbox cmd response: success
40,875 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,202 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,916 UART: cmd: 0x50000001
49,797 UART: dlen: 5
50,900 >>> mbox cmd response: success
51,320 UART: buf: [01, 23, 45, 67, 89]
55,955 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,653 UART: cmd: 0x50000001
58,534 UART: dlen: 6
59,579 >>> mbox cmd response: success
60,101 UART: buf: [01, 23, 45, 67, 89]
64,676 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,375 UART: cmd: 0x50000001
67,248 UART: dlen: 9
68,291 >>> mbox cmd response: success
68,765 UART: buf: [01, 23, 45, 67, 89]
73,437 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,153 UART: cmd: 0x60000000
76,058 UART: dlen: 16
77,542 UART: buf: [67452301, efcdab89]
81,082 UART: buf: [33221100, 77665544]
84,233 >>> mbox cmd response: success
84,499 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,196 UART: cmd: 0x60000000
87,128 UART: dlen: 13
88,601 UART: buf: [67452301, efcdab89]
92,088 UART: buf: [33221100, 00000044]
95,461 >>> mbox cmd response: success
95,723 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,435 UART: cmd: 0x60000000
98,310 UART: dlen: 12
99,838 UART: buf: [67452301, efcdab89]
103,332 UART: buf: [33221100, 00000000]
106,700 >>> mbox cmd response: success
106,979 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,651 UART: cmd: 0x60000000
109,527 UART: dlen: 0
110,570 >>> mbox cmd response: success
110,829 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,506 UART: cmd: 0x70000000
113,087 >>> mbox cmd response: success
113,345 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,045 UART: cmd: 0x60000000
115,920 UART: dlen: 5
117,460 UART: buf: [04050607, 00000003]
120,941 >>> mbox cmd response: success
121,197 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,875 UART: cmd: 0x80000000
123,477 >>> mbox cmd response: failed
123,781 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,481 UART: cmd: 0x60000000
126,357 UART: dlen: 5
127,845 UART: buf: [04050607, 00000003]
131,327 >>> mbox cmd response: success
131,584 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,265 UART: cmd: 0x90000000
134,138 UART: dlen: 8
135,623 UART: buf: [08070605]
137,651 >>> mbox cmd response: success
137,906 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,579 UART: cmd: 0xa0000000
140,133 >>> mbox cmd response data (4 bytes)
140,521 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,215 UART: cmd: 0xb0000000
143,090 UART: dlen: 6
144,586 UART: buf: [0c0d0e0f, 00000a0b]
148,153 >>> mbox cmd response data (2 bytes)
148,526 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,202 UART: cmd: 0xc0000000
151,031 >>> mbox cmd response data (9 bytes)
151,471 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,156 UART: cmd: 0xd0000000
153,727 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,414 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,572 UART: cmd: 0x50000000
19,363 UART: dlen: 8
20,430 >>> mbox cmd response: success
20,886 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,754 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,457 UART: cmd: 0x50000000
29,347 UART: dlen: 7
30,405 >>> mbox cmd response: success
30,877 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,865 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,557 UART: cmd: 0x50000000
39,440 UART: dlen: 0
40,430 >>> mbox cmd response: success
40,903 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,187 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,886 UART: cmd: 0x50000001
49,767 UART: dlen: 5
50,872 >>> mbox cmd response: success
51,295 UART: buf: [01, 23, 45, 67, 89]
55,958 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,656 UART: cmd: 0x50000001
58,536 UART: dlen: 6
59,578 >>> mbox cmd response: success
60,052 UART: buf: [01, 23, 45, 67, 89]
64,701 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,407 UART: cmd: 0x50000001
67,286 UART: dlen: 9
68,327 >>> mbox cmd response: success
68,800 UART: buf: [01, 23, 45, 67, 89]
73,432 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,140 UART: cmd: 0x60000000
76,016 UART: dlen: 16
77,545 UART: buf: [67452301, efcdab89]
81,072 UART: buf: [33221100, 77665544]
84,254 >>> mbox cmd response: success
84,545 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,245 UART: cmd: 0x60000000
87,129 UART: dlen: 13
88,611 UART: buf: [67452301, efcdab89]
92,156 UART: buf: [33221100, 00000044]
95,533 >>> mbox cmd response: success
95,794 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,485 UART: cmd: 0x60000000
98,362 UART: dlen: 12
99,835 UART: buf: [67452301, efcdab89]
103,328 UART: buf: [33221100, 00000000]
106,710 >>> mbox cmd response: success
106,969 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,641 UART: cmd: 0x60000000
109,518 UART: dlen: 0
110,564 >>> mbox cmd response: success
110,850 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,531 UART: cmd: 0x70000000
113,118 >>> mbox cmd response: success
113,370 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,051 UART: cmd: 0x60000000
115,927 UART: dlen: 5
117,463 UART: buf: [04050607, 00000003]
120,947 >>> mbox cmd response: success
121,203 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,876 UART: cmd: 0x80000000
123,408 >>> mbox cmd response: failed
123,711 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,395 UART: cmd: 0x60000000
126,268 UART: dlen: 5
127,751 UART: buf: [04050607, 00000003]
131,229 >>> mbox cmd response: success
131,506 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,189 UART: cmd: 0x90000000
134,065 UART: dlen: 8
135,503 UART: buf: [08070605]
137,581 >>> mbox cmd response: success
137,838 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,544 UART: cmd: 0xa0000000
140,099 >>> mbox cmd response data (4 bytes)
140,508 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,198 UART: cmd: 0xb0000000
143,075 UART: dlen: 6
144,567 UART: buf: [0c0d0e0f, 00000a0b]
148,126 >>> mbox cmd response data (2 bytes)
148,492 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,171 UART: cmd: 0xc0000000
150,840 >>> mbox cmd response data (9 bytes)
151,245 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,923 UART: cmd: 0xd0000000
153,487 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,667 writing to cptra_bootfsm_go
4,116 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
18,283 UART: cmd: 0x50000000
20,095 UART: dlen: 8
21,152 >>> mbox cmd response: success
21,597 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,528 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
28,245 UART: cmd: 0x50000000
30,126 UART: dlen: 7
31,172 >>> mbox cmd response: success
31,654 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,700 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,397 UART: cmd: 0x50000000
40,260 UART: dlen: 0
41,289 >>> mbox cmd response: success
41,722 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,996 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,715 UART: cmd: 0x50000001
50,596 UART: dlen: 5
51,641 >>> mbox cmd response: success
52,161 UART: buf: [01, 23, 45, 67, 89]
56,736 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,432 UART: cmd: 0x50000001
59,307 UART: dlen: 6
60,351 >>> mbox cmd response: success
60,874 UART: buf: [01, 23, 45, 67, 89]
65,452 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,150 UART: cmd: 0x50000001
68,027 UART: dlen: 9
69,075 >>> mbox cmd response: success
69,545 UART: buf: [01, 23, 45, 67, 89]
74,174 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,882 UART: cmd: 0x60000000
76,781 UART: dlen: 16
78,258 UART: buf: [67452301, efcdab89]
81,806 UART: buf: [33221100, 77665544]
85,000 >>> mbox cmd response: success
85,285 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,986 UART: cmd: 0x60000000
87,884 UART: dlen: 13
89,371 UART: buf: [67452301, efcdab89]
92,871 UART: buf: [33221100, 00000044]
96,248 >>> mbox cmd response: success
96,506 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,194 UART: cmd: 0x60000000
99,076 UART: dlen: 12
100,551 UART: buf: [67452301, efcdab89]
104,038 UART: buf: [33221100, 00000000]
107,414 >>> mbox cmd response: success
107,693 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,369 UART: cmd: 0x60000000
110,244 UART: dlen: 0
111,284 >>> mbox cmd response: success
111,543 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,221 UART: cmd: 0x70000000
113,809 >>> mbox cmd response: success
114,064 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,750 UART: cmd: 0x60000000
116,622 UART: dlen: 5
118,105 UART: buf: [04050607, 00000003]
121,589 >>> mbox cmd response: success
121,848 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,522 UART: cmd: 0x80000000
124,114 >>> mbox cmd response: failed
124,415 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,120 UART: cmd: 0x60000000
126,995 UART: dlen: 5
128,479 UART: buf: [04050607, 00000003]
131,956 >>> mbox cmd response: success
132,208 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,890 UART: cmd: 0x90000000
134,765 UART: dlen: 8
136,249 UART: buf: [08070605]
138,275 >>> mbox cmd response: success
138,535 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,204 UART: cmd: 0xa0000000
140,758 >>> mbox cmd response data (4 bytes)
141,156 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,841 UART: cmd: 0xb0000000
143,716 UART: dlen: 6
145,196 UART: buf: [0c0d0e0f, 00000a0b]
148,769 >>> mbox cmd response data (2 bytes)
149,138 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,813 UART: cmd: 0xc0000000
151,480 >>> mbox cmd response data (9 bytes)
151,866 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,540 UART: cmd: 0xd0000000
154,099 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,630 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,790 UART: cmd: 0x50000000
19,609 UART: dlen: 8
20,658 >>> mbox cmd response: success
21,104 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,093 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,868 UART: cmd: 0x50000000
30,234 UART: dlen: 7
30,829 >>> mbox cmd response: success
31,262 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,305 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,015 UART: cmd: 0x50000000
39,892 UART: dlen: 0
40,911 >>> mbox cmd response: success
41,335 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,628 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,327 UART: cmd: 0x50000001
50,210 UART: dlen: 5
51,261 >>> mbox cmd response: success
51,733 UART: buf: [01, 23, 45, 67, 89]
56,363 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,059 UART: cmd: 0x50000001
58,949 UART: dlen: 6
59,992 >>> mbox cmd response: success
60,461 UART: buf: [01, 23, 45, 67, 89]
65,052 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,756 UART: cmd: 0x50000001
67,641 UART: dlen: 9
68,687 >>> mbox cmd response: success
69,157 UART: buf: [01, 23, 45, 67, 89]
73,743 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,467 UART: cmd: 0x60000000
76,352 UART: dlen: 16
77,832 UART: buf: [67452301, efcdab89]
81,388 UART: buf: [33221100, 77665544]
84,541 >>> mbox cmd response: success
84,801 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,495 UART: cmd: 0x60000000
87,435 UART: dlen: 13
88,911 UART: buf: [67452301, efcdab89]
92,400 UART: buf: [33221100, 00000044]
95,775 >>> mbox cmd response: success
96,036 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,729 UART: cmd: 0x60000000
98,605 UART: dlen: 12
100,083 UART: buf: [67452301, efcdab89]
103,632 UART: buf: [33221100, 00000000]
107,026 >>> mbox cmd response: success
107,288 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,963 UART: cmd: 0x60000000
109,861 UART: dlen: 0
110,953 >>> mbox cmd response: success
111,215 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,896 UART: cmd: 0x70000000
113,436 >>> mbox cmd response: success
113,691 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,372 UART: cmd: 0x60000000
116,248 UART: dlen: 5
117,789 UART: buf: [04050607, 00000003]
121,276 >>> mbox cmd response: success
121,534 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,210 UART: cmd: 0x80000000
123,799 >>> mbox cmd response: failed
124,121 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,804 UART: cmd: 0x60000000
126,691 UART: dlen: 5
128,131 UART: buf: [04050607, 00000003]
131,620 >>> mbox cmd response: success
131,872 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,553 UART: cmd: 0x90000000
134,430 UART: dlen: 8
135,868 UART: buf: [08070605]
137,959 >>> mbox cmd response: success
138,222 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,891 UART: cmd: 0xa0000000
140,448 >>> mbox cmd response data (4 bytes)
140,841 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,526 UART: cmd: 0xb0000000
143,403 UART: dlen: 6
144,906 UART: buf: [0c0d0e0f, 00000a0b]
148,469 >>> mbox cmd response data (2 bytes)
148,840 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,516 UART: cmd: 0xc0000000
151,185 >>> mbox cmd response data (9 bytes)
151,568 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,245 UART: cmd: 0xd0000000
153,811 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
3,237 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,418 UART: cmd: 0x50000000
19,260 UART: dlen: 8
20,268 >>> mbox cmd response: success
20,758 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,581 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,283 UART: cmd: 0x50000000
29,169 UART: dlen: 7
30,221 >>> mbox cmd response: success
30,695 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,744 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,456 UART: cmd: 0x50000000
39,365 UART: dlen: 0
40,371 >>> mbox cmd response: success
40,759 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,039 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,743 UART: cmd: 0x50000001
49,671 UART: dlen: 5
50,719 >>> mbox cmd response: success
51,190 UART: buf: [01, 23, 45, 67, 89]
55,766 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,462 UART: cmd: 0x50000001
58,341 UART: dlen: 6
59,395 >>> mbox cmd response: success
59,872 UART: buf: [01, 23, 45, 67, 89]
64,465 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,165 UART: cmd: 0x50000001
67,044 UART: dlen: 9
68,095 >>> mbox cmd response: success
68,573 UART: buf: [01, 23, 45, 67, 89]
73,183 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,891 UART: cmd: 0x60000000
75,771 UART: dlen: 16
77,247 UART: buf: [67452301, efcdab89]
80,847 UART: buf: [33221100, 77665544]
83,948 >>> mbox cmd response: success
84,211 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,908 UART: cmd: 0x60000000
86,841 UART: dlen: 13
88,312 UART: buf: [67452301, efcdab89]
91,801 UART: buf: [33221100, 00000044]
95,172 >>> mbox cmd response: success
95,431 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,120 UART: cmd: 0x60000000
97,999 UART: dlen: 12
99,474 UART: buf: [67452301, efcdab89]
102,994 UART: buf: [33221100, 00000000]
106,364 >>> mbox cmd response: success
106,623 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,299 UART: cmd: 0x60000000
109,171 UART: dlen: 0
110,210 >>> mbox cmd response: success
110,471 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,145 UART: cmd: 0x70000000
112,734 >>> mbox cmd response: success
112,983 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,594 UART: cmd: 0x60000000
115,574 UART: dlen: 5
117,070 UART: buf: [04050607, 00000003]
120,561 >>> mbox cmd response: success
120,828 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,504 UART: cmd: 0x80000000
123,124 >>> mbox cmd response: failed
123,431 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,115 UART: cmd: 0x60000000
125,990 UART: dlen: 5
127,479 UART: buf: [04050607, 00000003]
130,966 >>> mbox cmd response: success
131,223 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
131,905 UART: cmd: 0x90000000
133,777 UART: dlen: 8
135,217 UART: buf: [08070605]
137,301 >>> mbox cmd response: success
137,558 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,269 UART: cmd: 0xa0000000
139,826 >>> mbox cmd response data (4 bytes)
140,232 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,927 UART: cmd: 0xb0000000
142,823 UART: dlen: 6
144,318 UART: buf: [0c0d0e0f, 00000a0b]
147,884 >>> mbox cmd response data (2 bytes)
148,251 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
148,935 UART: cmd: 0xc0000000
150,600 >>> mbox cmd response data (9 bytes)
150,985 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,668 UART: cmd: 0xd0000000
153,224 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,737 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,914 UART: cmd: 0x50000000
19,729 UART: dlen: 8
20,724 >>> mbox cmd response: success
21,223 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,247 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
28,006 UART: cmd: 0x50000000
29,874 UART: dlen: 7
30,917 >>> mbox cmd response: success
31,439 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,322 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,023 UART: cmd: 0x50000000
39,901 UART: dlen: 0
40,906 >>> mbox cmd response: success
41,331 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,671 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,367 UART: cmd: 0x50000001
50,262 UART: dlen: 5
51,314 >>> mbox cmd response: success
51,787 UART: buf: [01, 23, 45, 67, 89]
56,381 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,072 UART: cmd: 0x50000001
58,958 UART: dlen: 6
60,028 >>> mbox cmd response: success
60,492 UART: buf: [01, 23, 45, 67, 89]
65,081 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,782 UART: cmd: 0x50000001
67,676 UART: dlen: 9
68,725 >>> mbox cmd response: success
69,193 UART: buf: [01, 23, 45, 67, 89]
73,779 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,502 UART: cmd: 0x60000000
76,390 UART: dlen: 16
77,862 UART: buf: [67452301, efcdab89]
81,408 UART: buf: [33221100, 77665544]
84,567 >>> mbox cmd response: success
84,824 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,514 UART: cmd: 0x60000000
87,447 UART: dlen: 13
88,925 UART: buf: [67452301, efcdab89]
92,420 UART: buf: [33221100, 00000044]
95,798 >>> mbox cmd response: success
96,056 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,771 UART: cmd: 0x60000000
98,647 UART: dlen: 12
100,126 UART: buf: [67452301, efcdab89]
103,626 UART: buf: [33221100, 00000000]
107,061 >>> mbox cmd response: success
107,339 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,017 UART: cmd: 0x60000000
109,909 UART: dlen: 0
110,957 >>> mbox cmd response: success
111,211 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,886 UART: cmd: 0x70000000
113,422 >>> mbox cmd response: success
113,681 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,358 UART: cmd: 0x60000000
116,231 UART: dlen: 5
117,771 UART: buf: [04050607, 00000003]
121,254 >>> mbox cmd response: success
121,513 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,187 UART: cmd: 0x80000000
123,773 >>> mbox cmd response: failed
124,092 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,778 UART: cmd: 0x60000000
126,654 UART: dlen: 5
128,139 UART: buf: [04050607, 00000003]
131,637 >>> mbox cmd response: success
131,891 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,572 UART: cmd: 0x90000000
134,445 UART: dlen: 8
135,883 UART: buf: [08070605]
137,965 >>> mbox cmd response: success
138,225 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,895 UART: cmd: 0xa0000000
140,452 >>> mbox cmd response data (4 bytes)
140,858 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,545 UART: cmd: 0xb0000000
143,430 UART: dlen: 6
144,936 UART: buf: [0c0d0e0f, 00000a0b]
148,500 >>> mbox cmd response data (2 bytes)
148,870 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,546 UART: cmd: 0xc0000000
151,222 >>> mbox cmd response data (9 bytes)
151,607 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,279 UART: cmd: 0xd0000000
153,840 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,448 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,826 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,821 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,791 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,686 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,505 writing to cptra_bootfsm_go
22,566 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
22,044 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
22,412 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
22,430 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
22,571 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
22,507 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
22,649 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
22,965 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,814 writing to cptra_bootfsm_go
22,358 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
22,770 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
11,833 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,141 UART: pcrbank::test_erase_all_pcrs...[ok]
21,285 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
11,757 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,095 UART: pcrbank::test_erase_all_pcrs...[ok]
21,248 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
12,047 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,359 UART: pcrbank::test_erase_all_pcrs...[ok]
21,500 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,718 writing to cptra_bootfsm_go
13,640 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
18,903 UART: pcrbank::test_erase_all_pcrs...[ok]
23,063 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,756 writing to cptra_bootfsm_go
11,528 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,867 UART: pcrbank::test_erase_all_pcrs...[ok]
21,009 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,784 writing to cptra_bootfsm_go
11,591 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,878 UART: pcrbank::test_erase_all_pcrs...[ok]
21,024 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
11,929 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,203 UART: pcrbank::test_erase_all_pcrs...[ok]
21,361 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
12,019 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
18,279 UART: pcrbank::test_erase_all_pcrs...[ok]
21,526 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
11,887 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,222 UART: pcrbank::test_erase_all_pcrs...[ok]
21,365 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
12,074 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,367 UART: pcrbank::test_erase_all_pcrs...[ok]
21,526 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
11,555 UART: persistent::test_persistent_data_layout...[ok]
15,093 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
11,454 UART: persistent::test_persistent_data_layout...[ok]
15,003 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
11,659 UART: persistent::test_persistent_data_layout...[ok]
15,270 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
12,305 UART: persistent::test_persistent_data_layout...[ok]
15,917 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
11,384 UART: persistent::test_persistent_data_layout...[ok]
14,975 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
11,352 UART: persistent::test_persistent_data_layout...[ok]
14,887 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
45 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
11,819 UART: persistent::test_persistent_data_layout...[ok]
15,383 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,778 writing to cptra_bootfsm_go
12,365 UART: persistent::test_persistent_data_layout...[ok]
15,911 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
11,449 UART: persistent::test_persistent_data_layout...[ok]
15,049 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,206 writing to cptra_bootfsm_go
12,887 UART: persistent::test_persistent_data_layout...[ok]
16,450 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
22,346 UART: sha1::test_kat...[ok]
35,068 UART: sha1::test_digest0...[ok]
49,362 UART: sha1::test_digest1...[ok]
63,541 UART: sha1::test_digest2...[ok]
86,862 UART: sha1::test_digest3...[ok]
109,092 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
22,254 UART: sha1::test_kat...[ok]
36,196 UART: sha1::test_digest0...[ok]
49,138 UART: sha1::test_digest1...[ok]
62,741 UART: sha1::test_digest2...[ok]
85,636 UART: sha1::test_digest3...[ok]
107,718 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
22,542 UART: sha1::test_kat...[ok]
36,147 UART: sha1::test_digest0...[ok]
50,642 UART: sha1::test_digest1...[ok]
63,617 UART: sha1::test_digest2...[ok]
85,703 UART: sha1::test_digest3...[ok]
108,546 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
22,712 UART: sha1::test_kat...[ok]
37,143 UART: sha1::test_digest0...[ok]
50,082 UART: sha1::test_digest1...[ok]
63,414 UART: sha1::test_digest2...[ok]
86,195 UART: sha1::test_digest3...[ok]
109,045 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
7,724 writing to cptra_bootfsm_go
27,286 UART: sha1::test_kat...[ok]
41,421 UART: sha1::test_digest0...[ok]
55,229 UART: sha1::test_digest1...[ok]
68,958 UART: sha1::test_digest2...[ok]
90,621 UART: sha1::test_digest3...[ok]
113,345 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
22,365 UART: sha1::test_kat...[ok]
36,991 UART: sha1::test_digest0...[ok]
50,692 UART: sha1::test_digest1...[ok]
63,254 UART: sha1::test_digest2...[ok]
85,199 UART: sha1::test_digest3...[ok]
106,166 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
22,601 UART: sha1::test_kat...[ok]
36,158 UART: sha1::test_digest0...[ok]
49,271 UART: sha1::test_digest1...[ok]
63,497 UART: sha1::test_digest2...[ok]
84,131 UART: sha1::test_digest3...[ok]
106,124 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
22,807 UART: sha1::test_kat...[ok]
35,883 UART: sha1::test_digest0...[ok]
49,403 UART: sha1::test_digest1...[ok]
63,128 UART: sha1::test_digest2...[ok]
85,861 UART: sha1::test_digest3...[ok]
106,897 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
22,366 UART: sha1::test_kat...[ok]
36,949 UART: sha1::test_digest0...[ok]
50,457 UART: sha1::test_digest1...[ok]
65,039 UART: sha1::test_digest2...[ok]
86,972 UART: sha1::test_digest3...[ok]
108,698 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
22,603 UART: sha1::test_kat...[ok]
36,211 UART: sha1::test_digest0...[ok]
49,696 UART: sha1::test_digest1...[ok]
64,240 UART: sha1::test_digest2...[ok]
86,487 UART: sha1::test_digest3...[ok]
107,953 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
21,843 UART: sha256::test_kat...[ok]
26,360 UART: sha256::test_digest0...[ok]
30,841 UART: sha256::test_digest1...[ok]
35,406 UART: sha256::test_digest2...[ok]
40,927 UART: sha256::test_digest3...[ok]
46,410 UART: sha256::test_op0...[ok]
51,032 UART: sha256::test_op1...[ok]
55,654 UART: sha256::test_op2...[ok]
60,871 UART: sha256::test_op3...[ok]
69,773 UART: sha256::test_op4...[ok]
81,643 UART: sha256::test_op5...[ok]
65,235,058 UART: sha256::test_op6...[ok]
65,257,639 UART: sha256::test_op7...[ok]
65,273,721 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
22,016 UART: sha256::test_kat...[ok]
26,452 UART: sha256::test_digest0...[ok]
30,978 UART: sha256::test_digest1...[ok]
35,506 UART: sha256::test_digest2...[ok]
41,038 UART: sha256::test_digest3...[ok]
46,566 UART: sha256::test_op0...[ok]
51,173 UART: sha256::test_op1...[ok]
55,778 UART: sha256::test_op2...[ok]
61,004 UART: sha256::test_op3...[ok]
69,932 UART: sha256::test_op4...[ok]
81,807 UART: sha256::test_op5...[ok]
65,235,155 UART: sha256::test_op6...[ok]
65,257,754 UART: sha256::test_op7...[ok]
65,273,891 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
22,419 UART: sha256::test_kat...[ok]
26,870 UART: sha256::test_digest0...[ok]
31,425 UART: sha256::test_digest1...[ok]
35,960 UART: sha256::test_digest2...[ok]
41,455 UART: sha256::test_digest3...[ok]
46,959 UART: sha256::test_op0...[ok]
51,554 UART: sha256::test_op1...[ok]
56,199 UART: sha256::test_op2...[ok]
61,447 UART: sha256::test_op3...[ok]
70,341 UART: sha256::test_op4...[ok]
82,204 UART: sha256::test_op5...[ok]
65,235,544 UART: sha256::test_op6...[ok]
65,258,174 UART: sha256::test_op7...[ok]
65,274,265 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
22,415 UART: sha256::test_kat...[ok]
26,885 UART: sha256::test_digest0...[ok]
31,467 UART: sha256::test_digest1...[ok]
35,956 UART: sha256::test_digest2...[ok]
41,522 UART: sha256::test_digest3...[ok]
46,952 UART: sha256::test_op0...[ok]
51,593 UART: sha256::test_op1...[ok]
56,227 UART: sha256::test_op2...[ok]
61,452 UART: sha256::test_op3...[ok]
70,360 UART: sha256::test_op4...[ok]
82,259 UART: sha256::test_op5...[ok]
65,235,602 UART: sha256::test_op6...[ok]
65,258,175 UART: sha256::test_op7...[ok]
65,274,284 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
21,869 UART: sha256::test_kat...[ok]
26,288 UART: sha256::test_digest0...[ok]
30,731 UART: sha256::test_digest1...[ok]
35,182 UART: sha256::test_digest2...[ok]
41,338 UART: sha256::test_digest3...[ok]
46,110 UART: sha256::test_op0...[ok]
50,616 UART: sha256::test_op1...[ok]
55,169 UART: sha256::test_op2...[ok]
60,340 UART: sha256::test_op3...[ok]
69,191 UART: sha256::test_op4...[ok]
80,991 UART: sha256::test_op5...[ok]
64,968,783 UART: sha256::test_op6...[ok]
64,991,160 UART: sha256::test_op7...[ok]
65,007,102 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
22,102 UART: sha256::test_kat...[ok]
26,514 UART: sha256::test_digest0...[ok]
30,943 UART: sha256::test_digest1...[ok]
35,387 UART: sha256::test_digest2...[ok]
40,858 UART: sha256::test_digest3...[ok]
46,278 UART: sha256::test_op0...[ok]
50,827 UART: sha256::test_op1...[ok]
55,374 UART: sha256::test_op2...[ok]
60,535 UART: sha256::test_op3...[ok]
69,410 UART: sha256::test_op4...[ok]
81,229 UART: sha256::test_op5...[ok]
64,968,997 UART: sha256::test_op6...[ok]
64,991,326 UART: sha256::test_op7...[ok]
65,007,359 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
22,165 UART: sha256::test_kat...[ok]
26,641 UART: sha256::test_digest0...[ok]
31,058 UART: sha256::test_digest1...[ok]
35,516 UART: sha256::test_digest2...[ok]
40,990 UART: sha256::test_digest3...[ok]
46,419 UART: sha256::test_op0...[ok]
50,943 UART: sha256::test_op1...[ok]
55,491 UART: sha256::test_op2...[ok]
60,694 UART: sha256::test_op3...[ok]
69,539 UART: sha256::test_op4...[ok]
81,344 UART: sha256::test_op5...[ok]
64,968,940 UART: sha256::test_op6...[ok]
64,991,434 UART: sha256::test_op7...[ok]
65,007,469 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
22,117 UART: sha256::test_kat...[ok]
26,552 UART: sha256::test_digest0...[ok]
30,944 UART: sha256::test_digest1...[ok]
35,433 UART: sha256::test_digest2...[ok]
40,901 UART: sha256::test_digest3...[ok]
46,323 UART: sha256::test_op0...[ok]
50,871 UART: sha256::test_op1...[ok]
55,401 UART: sha256::test_op2...[ok]
60,569 UART: sha256::test_op3...[ok]
69,405 UART: sha256::test_op4...[ok]
81,207 UART: sha256::test_op5...[ok]
64,969,425 UART: sha256::test_op6...[ok]
64,991,343 UART: sha256::test_op7...[ok]
65,007,375 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
21,867 UART: sha256::test_kat...[ok]
26,304 UART: sha256::test_digest0...[ok]
30,755 UART: sha256::test_digest1...[ok]
35,185 UART: sha256::test_digest2...[ok]
40,648 UART: sha256::test_digest3...[ok]
46,101 UART: sha256::test_op0...[ok]
50,649 UART: sha256::test_op1...[ok]
55,200 UART: sha256::test_op2...[ok]
60,348 UART: sha256::test_op3...[ok]
69,218 UART: sha256::test_op4...[ok]
81,023 UART: sha256::test_op5...[ok]
64,968,697 UART: sha256::test_op6...[ok]
64,991,161 UART: sha256::test_op7...[ok]
65,007,173 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
22,148 UART: sha256::test_kat...[ok]
26,508 UART: sha256::test_digest0...[ok]
30,990 UART: sha256::test_digest1...[ok]
35,438 UART: sha256::test_digest2...[ok]
40,916 UART: sha256::test_digest3...[ok]
46,314 UART: sha256::test_op0...[ok]
50,871 UART: sha256::test_op1...[ok]
55,421 UART: sha256::test_op2...[ok]
60,591 UART: sha256::test_op3...[ok]
69,425 UART: sha256::test_op4...[ok]
81,242 UART: sha256::test_op5...[ok]
64,968,990 UART: sha256::test_op6...[ok]
64,991,352 UART: sha256::test_op7...[ok]
65,007,403 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
21,404 UART: sha2_512_384acc::test_kat...[ok]
26,112 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,264 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,078 UART: sha2_512_384acc::test_digest0...[ok]
1,071,361 UART: sha2_512_384acc::test_digest1...[ok]
1,079,275 UART: sha2_512_384acc::test_digest2...[ok]
1,087,318 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
21,309 UART: sha2_512_384acc::test_kat...[ok]
26,058 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,208 UART: sha2_512_384acc::test_digest_offset...[ok]
1,063,981 UART: sha2_512_384acc::test_digest0...[ok]
1,071,286 UART: sha2_512_384acc::test_digest1...[ok]
1,079,198 UART: sha2_512_384acc::test_digest2...[ok]
1,087,256 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
21,672 UART: sha2_512_384acc::test_kat...[ok]
26,417 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,550 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,320 UART: sha2_512_384acc::test_digest0...[ok]
1,071,625 UART: sha2_512_384acc::test_digest1...[ok]
1,079,605 UART: sha2_512_384acc::test_digest2...[ok]
1,087,603 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
21,708 UART: sha2_512_384acc::test_kat...[ok]
26,434 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,605 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,426 UART: sha2_512_384acc::test_digest0...[ok]
1,071,700 UART: sha2_512_384acc::test_digest1...[ok]
1,079,611 UART: sha2_512_384acc::test_digest2...[ok]
1,087,661 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
21,433 UART: sha2_512_384acc::test_kat...[ok]
26,174 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,275 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,126 UART: sha2_512_384acc::test_digest0...[ok]
1,071,387 UART: sha2_512_384acc::test_digest1...[ok]
1,079,329 UART: sha2_512_384acc::test_digest2...[ok]
1,087,369 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
21,420 UART: sha2_512_384acc::test_kat...[ok]
26,104 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,278 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,050 UART: sha2_512_384acc::test_digest0...[ok]
1,071,351 UART: sha2_512_384acc::test_digest1...[ok]
1,079,323 UART: sha2_512_384acc::test_digest2...[ok]
1,087,349 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
21,630 UART: sha2_512_384acc::test_kat...[ok]
26,329 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,489 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,303 UART: sha2_512_384acc::test_digest0...[ok]
1,071,566 UART: sha2_512_384acc::test_digest1...[ok]
1,079,512 UART: sha2_512_384acc::test_digest2...[ok]
1,087,555 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
21,675 UART: sha2_512_384acc::test_kat...[ok]
26,414 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,592 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,383 UART: sha2_512_384acc::test_digest0...[ok]
1,071,647 UART: sha2_512_384acc::test_digest1...[ok]
1,079,566 UART: sha2_512_384acc::test_digest2...[ok]
1,087,631 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
21,377 UART: sha2_512_384acc::test_kat...[ok]
26,123 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,287 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,074 UART: sha2_512_384acc::test_digest0...[ok]
1,071,347 UART: sha2_512_384acc::test_digest1...[ok]
1,079,314 UART: sha2_512_384acc::test_digest2...[ok]
1,087,305 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
21,812 UART: sha2_512_384acc::test_kat...[ok]
26,545 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,752 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,539 UART: sha2_512_384acc::test_digest0...[ok]
1,071,822 UART: sha2_512_384acc::test_digest1...[ok]
1,079,742 UART: sha2_512_384acc::test_digest2...[ok]
1,087,812 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
24,404 UART: sha384::test_kat...[ok]
32,758 UART: sha384::test_digest0...[ok]
41,239 UART: sha384::test_digest1...[ok]
51,116 UART: sha384::test_digest2...[ok]
61,767 UART: sha384::test_digest3...[ok]
72,559 UART: sha384::test_op0...[ok]
79,428 UART: sha384::test_op1...[ok]
86,321 UART: sha384::test_op2...[ok]
94,117 UART: sha384::test_op3...[ok]
104,922 UART: sha384::test_op4...[ok]
120,972 UART: sha384::test_op5...[ok]
69,348,508 UART: sha384::test_op6...[ok]
69,379,488 UART: sha384::test_op7...[ok]
69,410,129 UART: sha384::test_op8...[ok]
69,439,524 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,861 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,500 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,489,202 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
24,635 UART: sha384::test_kat...[ok]
34,281 UART: sha384::test_digest0...[ok]
41,277 UART: sha384::test_digest1...[ok]
49,972 UART: sha384::test_digest2...[ok]
59,650 UART: sha384::test_digest3...[ok]
71,618 UART: sha384::test_op0...[ok]
78,506 UART: sha384::test_op1...[ok]
85,399 UART: sha384::test_op2...[ok]
93,171 UART: sha384::test_op3...[ok]
104,004 UART: sha384::test_op4...[ok]
120,009 UART: sha384::test_op5...[ok]
69,347,672 UART: sha384::test_op6...[ok]
69,378,526 UART: sha384::test_op7...[ok]
69,409,175 UART: sha384::test_op8...[ok]
69,438,603 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,938 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,562 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,227 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
24,784 UART: sha384::test_kat...[ok]
34,154 UART: sha384::test_digest0...[ok]
42,315 UART: sha384::test_digest1...[ok]
51,033 UART: sha384::test_digest2...[ok]
60,111 UART: sha384::test_digest3...[ok]
70,855 UART: sha384::test_op0...[ok]
77,777 UART: sha384::test_op1...[ok]
84,669 UART: sha384::test_op2...[ok]
92,439 UART: sha384::test_op3...[ok]
103,275 UART: sha384::test_op4...[ok]
119,341 UART: sha384::test_op5...[ok]
69,346,881 UART: sha384::test_op6...[ok]
69,377,802 UART: sha384::test_op7...[ok]
69,408,456 UART: sha384::test_op8...[ok]
69,437,856 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,200 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,835 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,490 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
24,787 UART: sha384::test_kat...[ok]
32,937 UART: sha384::test_digest0...[ok]
41,396 UART: sha384::test_digest1...[ok]
50,396 UART: sha384::test_digest2...[ok]
60,014 UART: sha384::test_digest3...[ok]
72,195 UART: sha384::test_op0...[ok]
79,094 UART: sha384::test_op1...[ok]
85,992 UART: sha384::test_op2...[ok]
93,822 UART: sha384::test_op3...[ok]
104,575 UART: sha384::test_op4...[ok]
120,632 UART: sha384::test_op5...[ok]
69,348,265 UART: sha384::test_op6...[ok]
69,379,124 UART: sha384::test_op7...[ok]
69,409,768 UART: sha384::test_op8...[ok]
69,439,183 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,561 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,214 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,840 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
24,583 UART: sha384::test_kat...[ok]
33,068 UART: sha384::test_digest0...[ok]
40,879 UART: sha384::test_digest1...[ok]
49,442 UART: sha384::test_digest2...[ok]
58,640 UART: sha384::test_digest3...[ok]
71,500 UART: sha384::test_op0...[ok]
78,416 UART: sha384::test_op1...[ok]
85,308 UART: sha384::test_op2...[ok]
93,073 UART: sha384::test_op3...[ok]
103,895 UART: sha384::test_op4...[ok]
119,938 UART: sha384::test_op5...[ok]
69,347,571 UART: sha384::test_op6...[ok]
69,378,443 UART: sha384::test_op7...[ok]
69,409,080 UART: sha384::test_op8...[ok]
69,438,538 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,842 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,472 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,187 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
24,413 UART: sha384::test_kat...[ok]
32,571 UART: sha384::test_digest0...[ok]
41,918 UART: sha384::test_digest1...[ok]
50,754 UART: sha384::test_digest2...[ok]
60,623 UART: sha384::test_digest3...[ok]
70,647 UART: sha384::test_op0...[ok]
77,548 UART: sha384::test_op1...[ok]
84,511 UART: sha384::test_op2...[ok]
92,246 UART: sha384::test_op3...[ok]
103,073 UART: sha384::test_op4...[ok]
119,095 UART: sha384::test_op5...[ok]
69,346,638 UART: sha384::test_op6...[ok]
69,377,622 UART: sha384::test_op7...[ok]
69,408,219 UART: sha384::test_op8...[ok]
69,437,676 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,004 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,660 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,302 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
24,715 UART: sha384::test_kat...[ok]
33,056 UART: sha384::test_digest0...[ok]
39,769 UART: sha384::test_digest1...[ok]
47,567 UART: sha384::test_digest2...[ok]
55,594 UART: sha384::test_digest3...[ok]
67,829 UART: sha384::test_op0...[ok]
74,785 UART: sha384::test_op1...[ok]
81,645 UART: sha384::test_op2...[ok]
89,438 UART: sha384::test_op3...[ok]
100,260 UART: sha384::test_op4...[ok]
116,261 UART: sha384::test_op5...[ok]
69,343,901 UART: sha384::test_op6...[ok]
69,374,781 UART: sha384::test_op7...[ok]
69,405,457 UART: sha384::test_op8...[ok]
69,434,846 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,453,176 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,468,835 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,484,491 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
24,907 UART: sha384::test_kat...[ok]
34,328 UART: sha384::test_digest0...[ok]
43,372 UART: sha384::test_digest1...[ok]
51,834 UART: sha384::test_digest2...[ok]
60,426 UART: sha384::test_digest3...[ok]
72,251 UART: sha384::test_op0...[ok]
79,146 UART: sha384::test_op1...[ok]
86,108 UART: sha384::test_op2...[ok]
93,857 UART: sha384::test_op3...[ok]
104,662 UART: sha384::test_op4...[ok]
120,734 UART: sha384::test_op5...[ok]
69,348,244 UART: sha384::test_op6...[ok]
69,379,228 UART: sha384::test_op7...[ok]
69,409,880 UART: sha384::test_op8...[ok]
69,439,278 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,596 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,244 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,930 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
24,538 UART: sha384::test_kat...[ok]
34,485 UART: sha384::test_digest0...[ok]
43,609 UART: sha384::test_digest1...[ok]
53,017 UART: sha384::test_digest2...[ok]
61,702 UART: sha384::test_digest3...[ok]
74,456 UART: sha384::test_op0...[ok]
81,377 UART: sha384::test_op1...[ok]
88,270 UART: sha384::test_op2...[ok]
96,057 UART: sha384::test_op3...[ok]
106,890 UART: sha384::test_op4...[ok]
122,890 UART: sha384::test_op5...[ok]
69,350,655 UART: sha384::test_op6...[ok]
69,381,406 UART: sha384::test_op7...[ok]
69,412,048 UART: sha384::test_op8...[ok]
69,441,522 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,459,804 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,475,449 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,491,105 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,555 writing to cptra_bootfsm_go
25,250 UART: sha384::test_kat...[ok]
33,248 UART: sha384::test_digest0...[ok]
42,389 UART: sha384::test_digest1...[ok]
52,170 UART: sha384::test_digest2...[ok]
62,159 UART: sha384::test_digest3...[ok]
73,887 UART: sha384::test_op0...[ok]
80,758 UART: sha384::test_op1...[ok]
87,633 UART: sha384::test_op2...[ok]
95,495 UART: sha384::test_op3...[ok]
106,272 UART: sha384::test_op4...[ok]
122,287 UART: sha384::test_op5...[ok]
69,349,931 UART: sha384::test_op6...[ok]
69,380,810 UART: sha384::test_op7...[ok]
69,411,445 UART: sha384::test_op8...[ok]
69,440,906 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,459,189 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,474,836 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,490,499 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
13,898 UART: status_reporter::test_report_boot_status...[ok]
17,677 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,739 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
13,822 UART: status_reporter::test_report_boot_status...[ok]
17,633 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,652 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
14,082 UART: status_reporter::test_report_boot_status...[ok]
17,889 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,958 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
14,313 UART: status_reporter::test_report_boot_status...[ok]
18,141 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,200 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
13,708 UART: status_reporter::test_report_boot_status...[ok]
17,561 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,609 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
13,854 UART: status_reporter::test_report_boot_status...[ok]
17,712 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,742 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
14,003 UART: status_reporter::test_report_boot_status...[ok]
17,792 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,836 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
13,999 UART: status_reporter::test_report_boot_status...[ok]
17,820 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,865 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,815 writing to cptra_bootfsm_go
13,708 UART: status_reporter::test_report_boot_status...[ok]
17,525 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,632 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
13,977 UART: status_reporter::test_report_boot_status...[ok]
17,800 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,889 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,688 writing to cptra_bootfsm_go
4,000 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,736 >>> mbox cmd response data (48 bytes)
18,403 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,168 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,198 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,519 >>> mbox cmd response data (48 bytes)
18,171 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,919 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,176 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,539 >>> mbox cmd response data (48 bytes)
18,199 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,940 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,312 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
16,949 >>> mbox cmd response data (48 bytes)
17,591 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,308 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
3,216 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,906 >>> mbox cmd response data (48 bytes)
18,561 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,383 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,472 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,777 >>> mbox cmd response data (48 bytes)
424,516 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,691 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,805 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,926 >>> mbox cmd response data (48 bytes)
424,717 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,899 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,970 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,314 >>> mbox cmd response data (48 bytes)
425,083 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,258 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,557 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,963 >>> mbox cmd response data (48 bytes)
424,696 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,877 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,648 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,832 >>> mbox cmd response data (48 bytes)
424,560 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,727 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,834 writing to cptra_bootfsm_go
3,354 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,789 writing to cptra_bootfsm_go
3,374 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
3,653 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,868 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
3,321 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,538 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,638 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,605 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,792 writing to cptra_bootfsm_go
3,374 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,628 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7feffc000ed0`,
right: `0x7feffc000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f9390000ed0`,
right: `0x7f9390000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f8470000ed0`,
right: `0x7f8470000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f2838000ed0`,
right: `0x7f2838000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fb158000ed0`,
right: `0x7fb158000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fe004000ed0`,
right: `0x7fe004000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f4110000ed0`,
right: `0x7f4110000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f8ac4000ed0`,
right: `0x7f8ac4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7318000ed0`,
right: `0x7f7318000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f688c000ed0`,
right: `0x7f688c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f4398000ed0`,
right: `0x7f4398000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f26e8000ed0`,
right: `0x7f26e8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.41s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.54s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.56s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.45s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.33s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.45s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.43s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.42s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.36s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.33s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.32s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.18s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.17s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.01s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,462 writing to cptra_bootfsm_go
193,733 UART:
194,103 UART: Running Caliptra ROM ...
195,289 UART:
195,440 UART: [state] CFI Enabled
267,142 UART: [state] LifecycleState = Unprovisioned
269,107 UART: [state] DebugLocked = No
270,837 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,856 UART: [kat] SHA2-256
444,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,071 UART: [kat] ++
455,516 UART: [kat] sha1
466,951 UART: [kat] SHA2-256
469,663 UART: [kat] SHA2-384
474,653 UART: [kat] SHA2-512-ACC
477,010 UART: [kat] ECC-384
2,767,354 UART: [kat] HMAC-384Kdf
2,779,022 UART: [kat] LMS
3,969,352 UART: [kat] --
3,972,068 UART: [cold-reset] ++
3,973,214 UART: [fht] Storing FHT @ 0x50003400
3,984,048 UART: [idev] ++
3,984,612 UART: [idev] CDI.KEYID = 6
3,985,558 UART: [idev] SUBJECT.KEYID = 7
3,986,799 UART: [idev] UDS.KEYID = 0
3,987,751 ready_for_fw is high
3,987,932 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,028,187 UART: [idev] Erasing UDS.KEYID = 0
7,325,654 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,664 UART: [idev] --
7,353,688 UART: [ldev] ++
7,354,246 UART: [ldev] CDI.KEYID = 6
7,355,220 UART: [ldev] SUBJECT.KEYID = 5
7,356,429 UART: [ldev] AUTHORITY.KEYID = 7
7,357,731 UART: [ldev] FE.KEYID = 1
7,400,100 UART: [ldev] Erasing FE.KEYID = 1
10,732,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,936 UART: [ldev] --
13,113,756 UART: [fwproc] Waiting for Commands...
13,115,676 UART: [fwproc] Received command 0x46574c44
13,117,852 UART: [fwproc] Received Image of size 31676 bytes
16,167,780 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,246,042 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,314,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,343,468 >>> mbox cmd response: success
16,348,542 UART: [afmc] ++
16,349,169 UART: [afmc] CDI.KEYID = 6
16,350,083 UART: [afmc] SUBJECT.KEYID = 7
16,351,361 UART: [afmc] AUTHORITY.KEYID = 5
19,723,955 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,025,758 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,028,064 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,042,440 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,057,248 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,071,704 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,093,327 UART: [afmc] --
22,098,088 UART: [cold-reset] --
22,102,233 UART: [state] Locking Datavault
22,107,444 UART: [state] Locking PCR0, PCR1 and PCR31
22,109,193 UART: [state] Locking ICCM
22,110,582 UART: [exit] Launching FMC @ 0x40000130
22,118,955 UART:
22,119,216 UART: Running Caliptra FMC ...
22,120,342 UART:
22,120,496 UART: [state] CFI Enabled
22,183,795 UART: [fht] FMC Alias Private Key: 7
24,522,561 UART: [art] Extend RT PCRs Done
24,523,816 UART: [art] Lock RT PCRs Done
24,525,280 UART: [art] Populate DV Done
24,530,582 UART: [fht] FMC Alias Private Key: 7
24,532,105 UART: [art] Derive CDI
24,532,863 UART: [art] Store in in slot 0x4
24,592,148 UART: [art] Derive Key Pair
24,593,223 UART: [art] Store priv key in slot 0x5
27,884,881 UART: [art] Derive Key Pair - Done
27,897,859 UART: [art] Signing Cert with AUTHO
27,899,208 UART: RITY.KEYID = 7
30,185,496 UART: [art] Erasing AUTHORITY.KEYID = 7
30,187,116 UART: [art] PUB.X = 7E67AB19D6AF2F012B096E3069FAE43C250F7286878A9D3F373257DD22F127AA9C33CDA2D5DE4AF8F0D6FC12BFBEAB1A
30,194,469 UART: [art] PUB.Y = 927010E37E45E259712F81B98D35AF36B2EA1B5CC0928EECF80DC9D1E2B8861DE65FEAADDA94981AFD18569A1C95A02D
30,201,611 UART: [art] SIG.R = 3E6DE09DBBB74B7725D79504301C2C0EED10AEF62CFCB0E3589DC301AC9D3C0397139174C0492D716BFDADF7B3AB6A2C
30,209,012 UART: [art] SIG.S = 1085AAE300D3A0E21219ED9BAC8681120F9FC99BD2A5952E84D10A8C7CC1BAC7AFEB35054A091A4571A334217EC37107
31,513,520 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,806,323 ready_for_fw is high
3,806,733 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,212,971 >>> mbox cmd response: success
21,904,260 UART:
21,904,783 UART: Running Caliptra FMC ...
21,905,896 UART:
21,906,056 UART: [state] CFI Enabled
21,974,361 UART: [fht] FMC Alias Private Key: 7
24,312,030 UART: [art] Extend RT PCRs Done
24,313,296 UART: [art] Lock RT PCRs Done
24,315,012 UART: [art] Populate DV Done
24,320,256 UART: [fht] FMC Alias Private Key: 7
24,321,772 UART: [art] Derive CDI
24,322,568 UART: [art] Store in in slot 0x4
24,383,968 UART: [art] Derive Key Pair
24,385,046 UART: [art] Store priv key in slot 0x5
27,677,620 UART: [art] Derive Key Pair - Done
27,690,415 UART: [art] Signing Cert with AUTHO
27,691,760 UART: RITY.KEYID = 7
29,978,097 UART: [art] Erasing AUTHORITY.KEYID = 7
29,979,665 UART: [art] PUB.X = 852379F9374CADC6F250C3CFFE574C9DB886CFEC20442E66BD8E389525EAD9D6B5CD8FB8AEDEBEC0CB34BC395ABE7C89
29,986,956 UART: [art] PUB.Y = 52D4000DD9E19F2399DBEDFE980BA4B4DED49B87FCBEF78DBB445793C8E29B2920086D1AC6A0F218FA76CADF3BF30D21
29,994,190 UART: [art] SIG.R = 1AB701A65DC5945460FD4FFF4A5D311DF196CC376538E2979C892A5D7FB2682E70973557B1E21C4068DBD725A182F9AC
30,001,617 UART: [art] SIG.S = 35C7C6E07D987ABE53B45EDA5F76A60D878A5675269226B37E02ED15A52731276CB77F7E0E3A235F009887D0A3604286
31,306,124 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,301 UART:
192,663 UART: Running Caliptra ROM ...
193,786 UART:
603,576 UART: [state] CFI Enabled
614,973 UART: [state] LifecycleState = Unprovisioned
616,889 UART: [state] DebugLocked = No
618,272 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,939 UART: [kat] SHA2-256
793,717 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,244 UART: [kat] ++
804,686 UART: [kat] sha1
814,158 UART: [kat] SHA2-256
816,852 UART: [kat] SHA2-384
823,273 UART: [kat] SHA2-512-ACC
825,640 UART: [kat] ECC-384
3,109,783 UART: [kat] HMAC-384Kdf
3,121,294 UART: [kat] LMS
4,311,440 UART: [kat] --
4,314,904 UART: [cold-reset] ++
4,316,626 UART: [fht] Storing FHT @ 0x50003400
4,328,190 UART: [idev] ++
4,328,792 UART: [idev] CDI.KEYID = 6
4,329,705 UART: [idev] SUBJECT.KEYID = 7
4,330,970 UART: [idev] UDS.KEYID = 0
4,332,040 ready_for_fw is high
4,332,282 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,372,274 UART: [idev] Erasing UDS.KEYID = 0
7,619,254 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,474 UART: [idev] --
7,642,899 UART: [ldev] ++
7,643,467 UART: [ldev] CDI.KEYID = 6
7,644,478 UART: [ldev] SUBJECT.KEYID = 5
7,645,630 UART: [ldev] AUTHORITY.KEYID = 7
7,646,905 UART: [ldev] FE.KEYID = 1
7,657,010 UART: [ldev] Erasing FE.KEYID = 1
10,940,464 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,232,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,246,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,261,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,276,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,294,914 UART: [ldev] --
13,299,967 UART: [fwproc] Waiting for Commands...
13,303,134 UART: [fwproc] Received command 0x46574c44
13,305,313 UART: [fwproc] Received Image of size 31676 bytes
16,356,255 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,429,128 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,497,973 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,526,745 >>> mbox cmd response: success
16,531,313 UART: [afmc] ++
16,531,926 UART: [afmc] CDI.KEYID = 6
16,532,858 UART: [afmc] SUBJECT.KEYID = 7
16,534,124 UART: [afmc] AUTHORITY.KEYID = 5
19,848,646 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,141,945 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,144,226 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,158,609 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,173,475 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,187,926 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,209,287 UART: [afmc] --
22,212,729 UART: [cold-reset] --
22,215,921 UART: [state] Locking Datavault
22,222,059 UART: [state] Locking PCR0, PCR1 and PCR31
22,223,834 UART: [state] Locking ICCM
22,225,263 UART: [exit] Launching FMC @ 0x40000130
22,233,644 UART:
22,233,901 UART: Running Caliptra FMC ...
22,235,029 UART:
22,235,193 UART: [state] CFI Enabled
22,243,212 UART: [fht] FMC Alias Private Key: 7
24,574,304 UART: [art] Extend RT PCRs Done
24,575,569 UART: [art] Lock RT PCRs Done
24,577,147 UART: [art] Populate DV Done
24,582,532 UART: [fht] FMC Alias Private Key: 7
24,584,050 UART: [art] Derive CDI
24,584,899 UART: [art] Store in in slot 0x4
24,627,588 UART: [art] Derive Key Pair
24,628,617 UART: [art] Store priv key in slot 0x5
27,870,502 UART: [art] Derive Key Pair - Done
27,883,701 UART: [art] Signing Cert with AUTHO
27,885,034 UART: RITY.KEYID = 7
30,164,514 UART: [art] Erasing AUTHORITY.KEYID = 7
30,166,066 UART: [art] PUB.X = 64BAD96406F4DDC63B04489D165AACC9A85AA837ADC4DAD618646700CF1073D2DDC57884705565F3CE8803DF6941C051
30,173,312 UART: [art] PUB.Y = FDEF7BB91AE512702A0BE5425899F78274336CBF11011D25C071CDEB240227A6F2A4F7C709EB064209BCB44F559F1585
30,180,548 UART: [art] SIG.R = 6CA8B4C4F5A0DD54CDB8A0C5A5E3AE5EF203BC3B42D36AB1DE9024F2E5AAE7FCB12B2AF0A2FC3F2D8981B269FE3699B9
30,187,956 UART: [art] SIG.S = 37C1D5E964B395F92EA4131623D8E3AC97970FCB95CBC7D7AA30831432813B421E72B1C197F75C4A9E01D0E237F5011A
31,491,738 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
4,130,049 ready_for_fw is high
4,130,637 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,405,009 >>> mbox cmd response: success
22,050,578 UART:
22,050,975 UART: Running Caliptra FMC ...
22,052,180 UART:
22,052,348 UART: [state] CFI Enabled
22,060,267 UART: [fht] FMC Alias Private Key: 7
24,390,519 UART: [art] Extend RT PCRs Done
24,391,784 UART: [art] Lock RT PCRs Done
24,393,329 UART: [art] Populate DV Done
24,398,577 UART: [fht] FMC Alias Private Key: 7
24,400,102 UART: [art] Derive CDI
24,400,893 UART: [art] Store in in slot 0x4
24,443,241 UART: [art] Derive Key Pair
24,444,311 UART: [art] Store priv key in slot 0x5
27,686,391 UART: [art] Derive Key Pair - Done
27,699,598 UART: [art] Signing Cert with AUTHO
27,700,944 UART: RITY.KEYID = 7
29,980,440 UART: [art] Erasing AUTHORITY.KEYID = 7
29,982,039 UART: [art] PUB.X = C22FE563364CB8048A7EE4BEB4AEC9EC4FE0CD03DED7A6DAA42B31EC1EF55970CE67A2D74B294295A0A8B5EF6B5C281E
29,989,254 UART: [art] PUB.Y = 79B9F8901961F9F5A8C4255B10BC13F077CA0A0EED9B63C25DD68184BFAE6B07E9511D80F7AB05F6BEAB95F65DBC9593
29,996,488 UART: [art] SIG.R = 57B130CF5A25C7273D64F9B0FCA0B75576F3C7C5E29A22ED845C1B14CDDB66390A442A3BD501CD06266F551ADF870EF3
30,003,904 UART: [art] SIG.S = E473744F0A50551C06BBB254AFE55A7851841EF03286BACBE59DCB30EA74A5F8BA989DC574793BA95479D556A406A4E2
31,308,254 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,024 UART:
192,380 UART: Running Caliptra ROM ...
193,522 UART:
193,664 UART: [state] CFI Enabled
265,283 UART: [state] LifecycleState = Unprovisioned
267,180 UART: [state] DebugLocked = No
269,854 UART: [state] WD Timer not started. Device not locked for debugging
274,181 UART: [kat] SHA2-256
453,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,847 UART: [kat] ++
465,372 UART: [kat] sha1
476,320 UART: [kat] SHA2-256
479,314 UART: [kat] SHA2-384
485,438 UART: [kat] SHA2-512-ACC
488,435 UART: [kat] ECC-384
2,951,593 UART: [kat] HMAC-384Kdf
2,972,093 UART: [kat] LMS
3,501,566 UART: [kat] --
3,507,317 UART: [cold-reset] ++
3,508,431 UART: [fht] FHT @ 0x50003400
3,518,698 UART: [idev] ++
3,519,261 UART: [idev] CDI.KEYID = 6
3,520,245 UART: [idev] SUBJECT.KEYID = 7
3,521,416 UART: [idev] UDS.KEYID = 0
3,522,346 ready_for_fw is high
3,522,578 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,562,931 UART: [idev] Erasing UDS.KEYID = 0
6,030,411 UART: [idev] Sha1 KeyId Algorithm
6,054,070 UART: [idev] --
6,057,530 UART: [ldev] ++
6,058,104 UART: [ldev] CDI.KEYID = 6
6,058,988 UART: [ldev] SUBJECT.KEYID = 5
6,060,171 UART: [ldev] AUTHORITY.KEYID = 7
6,061,403 UART: [ldev] FE.KEYID = 1
6,104,312 UART: [ldev] Erasing FE.KEYID = 1
8,607,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,654 UART: [ldev] --
10,417,978 UART: [fwproc] Wait for Commands...
10,420,233 UART: [fwproc] Recv command 0x46574c44
10,422,323 UART: [fwproc] Recv'd Img size: 31656 bytes
12,808,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,884,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,953,599 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,982,225 >>> mbox cmd response: success
12,986,817 UART: [afmc] ++
12,987,436 UART: [afmc] CDI.KEYID = 6
12,988,352 UART: [afmc] SUBJECT.KEYID = 7
12,989,507 UART: [afmc] AUTHORITY.KEYID = 5
15,533,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,256,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,257,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,273,774 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,289,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,305,631 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,327,841 UART: [afmc] --
17,331,766 UART: [cold-reset] --
17,335,556 UART: [state] Locking Datavault
17,340,347 UART: [state] Locking PCR0, PCR1 and PCR31
17,342,019 UART: [state] Locking ICCM
17,344,351 UART: [exit] Launching FMC @ 0x40000130
17,352,829 UART:
17,353,078 UART: Running Caliptra FMC ...
17,354,213 UART:
17,354,372 UART: [state] CFI Enabled
17,415,819 UART: [fht] FMC Alias Private Key: 7
19,179,670 UART: [art] Extend RT PCRs Done
19,180,929 UART: [art] Lock RT PCRs Done
19,182,628 UART: [art] Populate DV Done
19,187,934 UART: [fht] FMC Alias Private Key: 7
19,189,517 UART: [art] Derive CDI
19,190,361 UART: [art] Store in in slot 0x4
19,248,478 UART: [art] Derive Key Pair
19,249,550 UART: [art] Store priv key in slot 0x5
21,712,748 UART: [art] Derive Key Pair - Done
21,725,668 UART: [art] Signing Cert with AUTHO
21,727,001 UART: RITY.KEYID = 7
23,438,605 UART: [art] Erasing AUTHORITY.KEYID = 7
23,440,157 UART: [art] PUB.X = 6295046C6773F2D65A3C9670C78393E64DA390FDDEE4271A823B14C6BCA7B07542486DCC8560926C5EF76320D7B2F07E
23,447,472 UART: [art] PUB.Y = 98F2B42753366294556D417F9C4F595691D3633CCB25DEAE7133882999CADBC2D3DA28B628D7E09C12A55704CD46FDF8
23,454,702 UART: [art] SIG.R = 7F3BE3F60D1CB625EA24AC6B0C864FFF2B27BB8C9D328D12819ED8FB2EE36E35ADAC25B2C6F6389B713FCE13557BCB02
23,462,121 UART: [art] SIG.S = 5580FFEBB944EE2B991775A93A1B978F4A6FD62BD353C105E9239E44D37800BE675A0B53F3900BD22051902718C53853
24,440,044 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,382,741 ready_for_fw is high
3,383,128 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,750,779 >>> mbox cmd response: success
17,045,829 UART:
17,046,204 UART: Running Caliptra FMC ...
17,047,351 UART:
17,047,508 UART: [state] CFI Enabled
17,113,267 UART: [fht] FMC Alias Private Key: 7
18,877,571 UART: [art] Extend RT PCRs Done
18,878,826 UART: [art] Lock RT PCRs Done
18,880,119 UART: [art] Populate DV Done
18,885,508 UART: [fht] FMC Alias Private Key: 7
18,887,106 UART: [art] Derive CDI
18,887,870 UART: [art] Store in in slot 0x4
18,946,023 UART: [art] Derive Key Pair
18,947,105 UART: [art] Store priv key in slot 0x5
21,409,542 UART: [art] Derive Key Pair - Done
21,422,558 UART: [art] Signing Cert with AUTHO
21,423,927 UART: RITY.KEYID = 7
23,136,339 UART: [art] Erasing AUTHORITY.KEYID = 7
23,137,883 UART: [art] PUB.X = 4E150E3ED0E4AC9F4DC0352068EC2850946AD6BF7E4054E973495E09361BADE99B8A7BB8658AE82D8901B68727F244EB
23,145,160 UART: [art] PUB.Y = 31DE568B11649F9AAE7C527A3898D32B2C90ACFA750AE06E041171A9AB664CB181E67E547C3A6F11CB5B6E198B638812
23,152,392 UART: [art] SIG.R = 2BC768BB8269197832B545D9A03B3011442A4DA789EA1D91A176688C52644DF15BF59F621C88698BF48319B5A6F8E2F1
23,159,792 UART: [art] SIG.S = 7FE199E95B7C604A49323E3390AC94A46148F15BDE7A49F1DFB38DC41EE0251F9BAC9DF1A6989F5B4E376750B9C05640
24,138,641 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,362 UART:
192,711 UART: Running Caliptra ROM ...
193,872 UART:
603,576 UART: [state] CFI Enabled
618,309 UART: [state] LifecycleState = Unprovisioned
620,154 UART: [state] DebugLocked = No
622,525 UART: [state] WD Timer not started. Device not locked for debugging
626,687 UART: [kat] SHA2-256
805,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,343 UART: [kat] ++
817,872 UART: [kat] sha1
829,669 UART: [kat] SHA2-256
832,703 UART: [kat] SHA2-384
837,481 UART: [kat] SHA2-512-ACC
840,409 UART: [kat] ECC-384
3,284,194 UART: [kat] HMAC-384Kdf
3,297,060 UART: [kat] LMS
3,826,538 UART: [kat] --
3,832,116 UART: [cold-reset] ++
3,834,057 UART: [fht] FHT @ 0x50003400
3,845,319 UART: [idev] ++
3,845,879 UART: [idev] CDI.KEYID = 6
3,846,783 UART: [idev] SUBJECT.KEYID = 7
3,848,032 UART: [idev] UDS.KEYID = 0
3,848,950 ready_for_fw is high
3,849,180 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,889,149 UART: [idev] Erasing UDS.KEYID = 0
6,317,310 UART: [idev] Sha1 KeyId Algorithm
6,340,324 UART: [idev] --
6,343,995 UART: [ldev] ++
6,344,559 UART: [ldev] CDI.KEYID = 6
6,345,462 UART: [ldev] SUBJECT.KEYID = 5
6,346,669 UART: [ldev] AUTHORITY.KEYID = 7
6,347,894 UART: [ldev] FE.KEYID = 1
6,357,995 UART: [ldev] Erasing FE.KEYID = 1
8,826,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,077 UART: [ldev] --
10,616,274 UART: [fwproc] Wait for Commands...
10,618,472 UART: [fwproc] Recv command 0x46574c44
10,620,559 UART: [fwproc] Recv'd Img size: 31656 bytes
13,018,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,090,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,159,655 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,188,463 >>> mbox cmd response: success
13,193,671 UART: [afmc] ++
13,194,280 UART: [afmc] CDI.KEYID = 6
13,195,213 UART: [afmc] SUBJECT.KEYID = 7
13,196,354 UART: [afmc] AUTHORITY.KEYID = 5
15,695,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,415,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,417,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,433,329 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,449,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,465,199 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,487,477 UART: [afmc] --
17,491,124 UART: [cold-reset] --
17,495,738 UART: [state] Locking Datavault
17,500,067 UART: [state] Locking PCR0, PCR1 and PCR31
17,501,736 UART: [state] Locking ICCM
17,503,844 UART: [exit] Launching FMC @ 0x40000130
17,512,274 UART:
17,512,522 UART: Running Caliptra FMC ...
17,513,652 UART:
17,513,810 UART: [state] CFI Enabled
17,522,161 UART: [fht] FMC Alias Private Key: 7
19,278,654 UART: [art] Extend RT PCRs Done
19,279,900 UART: [art] Lock RT PCRs Done
19,281,435 UART: [art] Populate DV Done
19,287,016 UART: [fht] FMC Alias Private Key: 7
19,288,633 UART: [art] Derive CDI
19,289,487 UART: [art] Store in in slot 0x4
19,331,908 UART: [art] Derive Key Pair
19,332,940 UART: [art] Store priv key in slot 0x5
21,759,724 UART: [art] Derive Key Pair - Done
21,772,705 UART: [art] Signing Cert with AUTHO
21,774,041 UART: RITY.KEYID = 7
23,479,873 UART: [art] Erasing AUTHORITY.KEYID = 7
23,481,428 UART: [art] PUB.X = DD2D950DBF98659D7CBD938F2D890CFA7AA56D7E5E65C30CB5FFD41990F19B1639112E4ADF4CDD0F67B5B6CD25F51A28
23,488,646 UART: [art] PUB.Y = E6F65C4978D8643977C8E91B2726C05700F9BF24F08A8951C2163773BF0FAC0B12EB0C773D09C9B73DDAF5A7A6EBCF16
23,495,956 UART: [art] SIG.R = 5FE361E4AABED6F476D9502AB92F9830E0D9CB222B16088543419A585BBD66CA709CB2A980DCC033981CA22063E62252
23,503,314 UART: [art] SIG.S = 9E966FD20B327A54FAD19EBC1D838BFE0DD0E753B009246A836547AB630DC59F6C347AA53387D8EB9AD92B78E365A025
24,482,286 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,695,530 ready_for_fw is high
3,696,085 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,957,263 >>> mbox cmd response: success
17,211,843 UART:
17,212,221 UART: Running Caliptra FMC ...
17,213,414 UART:
17,213,572 UART: [state] CFI Enabled
17,221,693 UART: [fht] FMC Alias Private Key: 7
18,978,693 UART: [art] Extend RT PCRs Done
18,979,951 UART: [art] Lock RT PCRs Done
18,981,692 UART: [art] Populate DV Done
18,987,075 UART: [fht] FMC Alias Private Key: 7
18,988,750 UART: [art] Derive CDI
18,989,599 UART: [art] Store in in slot 0x4
19,032,706 UART: [art] Derive Key Pair
19,033,784 UART: [art] Store priv key in slot 0x5
21,461,020 UART: [art] Derive Key Pair - Done
21,474,144 UART: [art] Signing Cert with AUTHO
21,475,479 UART: RITY.KEYID = 7
23,180,484 UART: [art] Erasing AUTHORITY.KEYID = 7
23,182,047 UART: [art] PUB.X = 71B82E07244FCCD74CE1B974F6223C521648C1F4761087FFAD99D821D974A4587DEFF1DC404F74721E4A3E141B7764D0
23,189,254 UART: [art] PUB.Y = 329A345CAD8FBA3B9614153928554F5821587D66DD215F6E1CF634DCD36F64B6F545904BE2619D9D948F17E1B42C3482
23,196,482 UART: [art] SIG.R = CA04FB3D963BD375635988D6A2CAC9B0913E08D4FEEC03FD5A9C0E0974B46B2A65D9B0292377B96800302F31E411142F
23,203,904 UART: [art] SIG.S = 61176BC5E0865C7F45C26760B6084E85407F0CDED0949F0EC5A8CFC892A87F6068E24132FBE653531FDA2A33B96ADBF0
24,181,636 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,417,158 ready_for_fw is high
3,418,237 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,931,937 >>> mbox cmd response: success
17,248,655 UART:
17,249,479 UART: Running Caliptra FMC ...
17,250,613 UART:
17,250,761 UART: [state] CFI Enabled
17,312,517 UART: [fht] FMC Alias Private Key: 7
19,076,583 UART: [art] Extend RT PCRs Done
19,077,847 UART: [art] Lock RT PCRs Done
19,079,374 UART: [art] Populate DV Done
19,084,987 UART: [fht] FMC Alias Private Key: 7
19,086,520 UART: [art] Derive CDI
19,087,370 UART: [art] Store in in slot 0x4
19,144,983 UART: [art] Derive Key Pair
19,146,059 UART: [art] Store priv key in slot 0x5
21,609,646 UART: [art] Derive Key Pair - Done
21,622,709 UART: [art] Signing Cert with AUTHO
21,624,053 UART: RITY.KEYID = 7
23,335,683 UART: [art] Erasing AUTHORITY.KEYID = 7
23,337,291 UART: [art] PUB.X = D69D6D261F73E65B75D7BCBBF5EFA78D6AACE9DC3A3D824508A3CFCFB113B4863C2AA1A9A163C152B2591F0934CECA54
23,344,489 UART: [art] PUB.Y = 22F9798CC690672AAF38A830C5342A4EAAA36F0F870F97781A3A452A177168900B215968DE09CD5376A21EA649ADB335
23,351,716 UART: [art] SIG.R = 54C1C84802624F7598489E43BFE8F04C3990B777BD21F3F07D6F56110D9A44E4790055F06E16F04A45D7276EE64E4EE2
23,359,122 UART: [art] SIG.S = 054021E31CB751D69D2B5A614894CA0F214473A068B9D698F5B32C680C8AD9A0613DCE8750D81285FD906522DD4A0921
24,337,806 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,753,688 ready_for_fw is high
3,754,076 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,187,510 >>> mbox cmd response: success
17,439,320 UART:
17,439,704 UART: Running Caliptra FMC ...
17,440,820 UART:
17,440,967 UART: [state] CFI Enabled
17,448,955 UART: [fht] FMC Alias Private Key: 7
19,206,028 UART: [art] Extend RT PCRs Done
19,207,295 UART: [art] Lock RT PCRs Done
19,208,942 UART: [art] Populate DV Done
19,214,138 UART: [fht] FMC Alias Private Key: 7
19,215,802 UART: [art] Derive CDI
19,216,569 UART: [art] Store in in slot 0x4
19,259,100 UART: [art] Derive Key Pair
19,260,144 UART: [art] Store priv key in slot 0x5
21,687,027 UART: [art] Derive Key Pair - Done
21,699,830 UART: [art] Signing Cert with AUTHO
21,701,172 UART: RITY.KEYID = 7
23,406,788 UART: [art] Erasing AUTHORITY.KEYID = 7
23,408,368 UART: [art] PUB.X = 88C1D2436DDE841C39D88BEBC55A10CAF4143FD9701FD1C39020B6DF9BA0078633617F5CBAF3F0DB326070EEF674B8FC
23,415,576 UART: [art] PUB.Y = 81BA39737C69336658476E212BBE06D4ECFB6AF0C9CAA7652094681AA37B0819E57B9CB6F2C59FEAF43672D2F27CC458
23,422,810 UART: [art] SIG.R = B291E1F4EAD878213EFFB5DE0DEFCE66692193A03A05CA0CEFBF29F7B8C9304C91315F77F4141B018CFFBF4BB169B037
23,430,312 UART: [art] SIG.S = 2DFB4EF8703FA21DCA33A340C6E04D53F731D1DE8C1A773D5BD5D08B7C929B13CE9B2BEDA4FB5FE55E8142BD6816DC42
24,408,860 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,628 UART: [state] LifecycleState = Unprovisioned
86,283 UART: [state] DebugLocked = No
86,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,471 UART: [kat] SHA2-256
882,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,517 UART: [kat] ++
886,669 UART: [kat] sha1
891,011 UART: [kat] SHA2-256
892,949 UART: [kat] SHA2-384
895,758 UART: [kat] SHA2-512-ACC
897,659 UART: [kat] ECC-384
903,310 UART: [kat] HMAC-384Kdf
907,898 UART: [kat] LMS
1,476,094 UART: [kat] --
1,476,841 UART: [cold-reset] ++
1,477,227 UART: [fht] Storing FHT @ 0x50003400
1,480,014 UART: [idev] ++
1,480,182 UART: [idev] CDI.KEYID = 6
1,480,542 UART: [idev] SUBJECT.KEYID = 7
1,480,966 UART: [idev] UDS.KEYID = 0
1,481,311 ready_for_fw is high
1,481,311 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,048 UART: [idev] Erasing UDS.KEYID = 0
1,505,750 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,360 UART: [idev] --
1,515,289 UART: [ldev] ++
1,515,457 UART: [ldev] CDI.KEYID = 6
1,515,820 UART: [ldev] SUBJECT.KEYID = 5
1,516,246 UART: [ldev] AUTHORITY.KEYID = 7
1,516,709 UART: [ldev] FE.KEYID = 1
1,522,083 UART: [ldev] Erasing FE.KEYID = 1
1,547,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,492 UART: [ldev] --
1,586,859 UART: [fwproc] Waiting for Commands...
1,587,690 UART: [fwproc] Received command 0x46574c44
1,588,481 UART: [fwproc] Received Image of size 31656 bytes
1,938,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,136 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,341 >>> mbox cmd response: success
2,008,501 UART: [afmc] ++
2,008,669 UART: [afmc] CDI.KEYID = 6
2,009,031 UART: [afmc] SUBJECT.KEYID = 7
2,009,456 UART: [afmc] AUTHORITY.KEYID = 5
2,044,557 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,887 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,667 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,395 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,280 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,970 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,677 UART: [afmc] --
2,087,587 UART: [cold-reset] --
2,088,493 UART: [state] Locking Datavault
2,089,696 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,300 UART: [state] Locking ICCM
2,090,858 UART: [exit] Launching FMC @ 0x40000130
2,096,187 UART:
2,096,203 UART: Running Caliptra FMC ...
2,096,611 UART:
2,096,665 UART: [state] CFI Enabled
2,107,240 UART: [fht] FMC Alias Private Key: 7
2,215,033 UART: [art] Extend RT PCRs Done
2,215,461 UART: [art] Lock RT PCRs Done
2,216,855 UART: [art] Populate DV Done
2,224,960 UART: [fht] FMC Alias Private Key: 7
2,226,012 UART: [art] Derive CDI
2,226,292 UART: [art] Store in in slot 0x4
2,312,141 UART: [art] Derive Key Pair
2,312,501 UART: [art] Store priv key in slot 0x5
2,325,501 UART: [art] Derive Key Pair - Done
2,340,110 UART: [art] Signing Cert with AUTHO
2,340,590 UART: RITY.KEYID = 7
2,355,648 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,413 UART: [art] PUB.X = 789AA2A6680380F2185CC5A6C1429D7DD9C01648FE1A97553D4E2AB6382D9B2A6BBF38DA7E38346DE7D0A7C1AC12D6E7
2,363,192 UART: [art] PUB.Y = 64C3718002B51D566D5F05DEABB56AEA95842F2591D678AEF8E32B28FBA8B7750C129E0852B5C6F154F8EABB8410F94C
2,370,140 UART: [art] SIG.R = 8658258D37255A18BC2D45A9B41F2ADCE69A477DCBAFB9FE06CA27628C3C78B2924644793E336BE00DCFB9D7CEE01A99
2,376,918 UART: [art] SIG.S = 27698B6984BB75DE1FA36A384E3264F3A16AB579B0F4D376D151C4E603003D900446E637703D94C8ABBB17E54970310A
2,400,673 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,465 ready_for_fw is high
1,362,465 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,685 >>> mbox cmd response: success
1,917,677 UART:
1,917,693 UART: Running Caliptra FMC ...
1,918,101 UART:
1,918,155 UART: [state] CFI Enabled
1,928,570 UART: [fht] FMC Alias Private Key: 7
2,036,703 UART: [art] Extend RT PCRs Done
2,037,131 UART: [art] Lock RT PCRs Done
2,038,957 UART: [art] Populate DV Done
2,047,414 UART: [fht] FMC Alias Private Key: 7
2,048,384 UART: [art] Derive CDI
2,048,664 UART: [art] Store in in slot 0x4
2,134,435 UART: [art] Derive Key Pair
2,134,795 UART: [art] Store priv key in slot 0x5
2,148,223 UART: [art] Derive Key Pair - Done
2,163,308 UART: [art] Signing Cert with AUTHO
2,163,788 UART: RITY.KEYID = 7
2,179,152 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,917 UART: [art] PUB.X = 76F129A1DBBE5056EA92B6EB6861F9206690C409EAFF59168AEC5020D6DD8D8F0170CF7349E663D812ED7B12C2F05DBB
2,186,693 UART: [art] PUB.Y = 407302A5E65DB838F5540C8E75A5B2104B5B1AE8DC0596C1BD0EE1D27DBB8DBD17E58A995326A5E6EBB57F291BB474FB
2,193,647 UART: [art] SIG.R = D6CC342DB6A330C06DE04DADA314FA9ECF0B348DA44852BD689830B4A28C7E61AF82F85395CFC86F8F917603B81114C8
2,200,423 UART: [art] SIG.S = 6E2A92705C0B48749FF7F272FB173D2B1A24A3B8D47E0EA1902942AC78A923C911A0FB7A4B2FD69AE4D06269D0881DA2
2,223,805 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,410 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,076 UART: [kat] SHA2-256
882,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,122 UART: [kat] ++
886,274 UART: [kat] sha1
890,584 UART: [kat] SHA2-256
892,522 UART: [kat] SHA2-384
895,105 UART: [kat] SHA2-512-ACC
897,006 UART: [kat] ECC-384
902,587 UART: [kat] HMAC-384Kdf
907,287 UART: [kat] LMS
1,475,483 UART: [kat] --
1,476,772 UART: [cold-reset] ++
1,477,316 UART: [fht] Storing FHT @ 0x50003400
1,480,021 UART: [idev] ++
1,480,189 UART: [idev] CDI.KEYID = 6
1,480,549 UART: [idev] SUBJECT.KEYID = 7
1,480,973 UART: [idev] UDS.KEYID = 0
1,481,318 ready_for_fw is high
1,481,318 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,655 UART: [idev] Erasing UDS.KEYID = 0
1,505,111 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,839 UART: [idev] --
1,514,782 UART: [ldev] ++
1,514,950 UART: [ldev] CDI.KEYID = 6
1,515,313 UART: [ldev] SUBJECT.KEYID = 5
1,515,739 UART: [ldev] AUTHORITY.KEYID = 7
1,516,202 UART: [ldev] FE.KEYID = 1
1,521,538 UART: [ldev] Erasing FE.KEYID = 1
1,547,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,753 UART: [ldev] --
1,587,228 UART: [fwproc] Waiting for Commands...
1,587,957 UART: [fwproc] Received command 0x46574c44
1,588,748 UART: [fwproc] Received Image of size 31656 bytes
1,938,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,057 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,216 >>> mbox cmd response: success
2,008,252 UART: [afmc] ++
2,008,420 UART: [afmc] CDI.KEYID = 6
2,008,782 UART: [afmc] SUBJECT.KEYID = 7
2,009,207 UART: [afmc] AUTHORITY.KEYID = 5
2,044,400 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,744 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,524 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,137 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,827 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,588 UART: [afmc] --
2,087,580 UART: [cold-reset] --
2,088,502 UART: [state] Locking Datavault
2,089,639 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,243 UART: [state] Locking ICCM
2,090,737 UART: [exit] Launching FMC @ 0x40000130
2,096,066 UART:
2,096,082 UART: Running Caliptra FMC ...
2,096,490 UART:
2,096,633 UART: [state] CFI Enabled
2,107,208 UART: [fht] FMC Alias Private Key: 7
2,215,043 UART: [art] Extend RT PCRs Done
2,215,471 UART: [art] Lock RT PCRs Done
2,216,689 UART: [art] Populate DV Done
2,224,888 UART: [fht] FMC Alias Private Key: 7
2,225,888 UART: [art] Derive CDI
2,226,168 UART: [art] Store in in slot 0x4
2,312,025 UART: [art] Derive Key Pair
2,312,385 UART: [art] Store priv key in slot 0x5
2,325,617 UART: [art] Derive Key Pair - Done
2,340,291 UART: [art] Signing Cert with AUTHO
2,340,771 UART: RITY.KEYID = 7
2,356,513 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,278 UART: [art] PUB.X = F07EC0BFABA06CE5CBE31B3081CD7D385D1AD019973EBF9E7DD3A105F52ED16B37BBF13B1792E37A7A3758A88E880943
2,364,060 UART: [art] PUB.Y = 1763479D7B3723CEF585A7CF239F94FE5525B1F944B258F0905BE4E89B773D91893679FC062DB91317FC7E79D73DD52A
2,371,007 UART: [art] SIG.R = 76E1764F900F5C789D92BC365F56B258C2EAD4BAF2189D6E935E482B23DC8977019B5ADEA896069696F0A8D613C50013
2,377,746 UART: [art] SIG.S = 5CEAFD2C00220164A03B5EFE9E8182491880F0FDD58D8A81A7D24EFD3E7A8162CB30D3CA1B2C7B721A32FB44C0C70D8E
2,401,812 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,264 ready_for_fw is high
1,362,264 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,722 >>> mbox cmd response: success
1,919,544 UART:
1,919,560 UART: Running Caliptra FMC ...
1,919,968 UART:
1,920,111 UART: [state] CFI Enabled
1,931,078 UART: [fht] FMC Alias Private Key: 7
2,038,883 UART: [art] Extend RT PCRs Done
2,039,311 UART: [art] Lock RT PCRs Done
2,040,767 UART: [art] Populate DV Done
2,048,996 UART: [fht] FMC Alias Private Key: 7
2,050,036 UART: [art] Derive CDI
2,050,316 UART: [art] Store in in slot 0x4
2,136,175 UART: [art] Derive Key Pair
2,136,535 UART: [art] Store priv key in slot 0x5
2,149,917 UART: [art] Derive Key Pair - Done
2,164,650 UART: [art] Signing Cert with AUTHO
2,165,130 UART: RITY.KEYID = 7
2,180,440 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,205 UART: [art] PUB.X = 7FD80A29AEDE40DAEC9A30F2146169E7F773A5B43CA99ECB2A556F6135759ECD3E7C0F8707B42D56B474A80749D053A7
2,187,973 UART: [art] PUB.Y = 94EAEE6EF034FE691BB2D4CAAC56D6212B119593F94055F43F7E928A24AA01A0F9D28758027E8F12BEFA89E94728DA45
2,194,927 UART: [art] SIG.R = CF8416F0F20857C522D0DC7CADECC881CAAB9C97EEDE68DAB2CA4A053A40C8400FAC0CF1D328E8C0D6CE00274E1D4432
2,201,689 UART: [art] SIG.S = 014BC01FA2440E752C36624F426F6DB4A7AC127C7E3287C708E0F4A34EF9C461B455B1CB530BF292EA317445D08CF1C6
2,225,177 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
893,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,591 UART: [kat] ++
897,743 UART: [kat] sha1
901,921 UART: [kat] SHA2-256
903,861 UART: [kat] SHA2-384
906,622 UART: [kat] SHA2-512-ACC
908,523 UART: [kat] ECC-384
917,810 UART: [kat] HMAC-384Kdf
922,556 UART: [kat] LMS
1,170,884 UART: [kat] --
1,171,943 UART: [cold-reset] ++
1,172,291 UART: [fht] FHT @ 0x50003400
1,174,888 UART: [idev] ++
1,175,056 UART: [idev] CDI.KEYID = 6
1,175,416 UART: [idev] SUBJECT.KEYID = 7
1,175,840 UART: [idev] UDS.KEYID = 0
1,176,185 ready_for_fw is high
1,176,185 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,810 UART: [idev] Erasing UDS.KEYID = 0
1,201,277 UART: [idev] Sha1 KeyId Algorithm
1,209,697 UART: [idev] --
1,210,767 UART: [ldev] ++
1,210,935 UART: [ldev] CDI.KEYID = 6
1,211,298 UART: [ldev] SUBJECT.KEYID = 5
1,211,724 UART: [ldev] AUTHORITY.KEYID = 7
1,212,187 UART: [ldev] FE.KEYID = 1
1,217,205 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,882 UART: [fwproc] Wait for Commands...
1,283,592 UART: [fwproc] Recv command 0x46574c44
1,284,320 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,993 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,297 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,152 >>> mbox cmd response: success
1,704,410 UART: [afmc] ++
1,704,578 UART: [afmc] CDI.KEYID = 6
1,704,940 UART: [afmc] SUBJECT.KEYID = 7
1,705,365 UART: [afmc] AUTHORITY.KEYID = 5
1,740,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,529 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,257 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,142 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,861 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,775 UART: [afmc] --
1,783,829 UART: [cold-reset] --
1,784,633 UART: [state] Locking Datavault
1,785,944 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,548 UART: [state] Locking ICCM
1,787,004 UART: [exit] Launching FMC @ 0x40000130
1,792,333 UART:
1,792,349 UART: Running Caliptra FMC ...
1,792,757 UART:
1,792,811 UART: [state] CFI Enabled
1,803,350 UART: [fht] FMC Alias Private Key: 7
1,910,811 UART: [art] Extend RT PCRs Done
1,911,239 UART: [art] Lock RT PCRs Done
1,912,635 UART: [art] Populate DV Done
1,920,814 UART: [fht] FMC Alias Private Key: 7
1,921,904 UART: [art] Derive CDI
1,922,184 UART: [art] Store in in slot 0x4
2,007,719 UART: [art] Derive Key Pair
2,008,079 UART: [art] Store priv key in slot 0x5
2,021,475 UART: [art] Derive Key Pair - Done
2,036,179 UART: [art] Signing Cert with AUTHO
2,036,659 UART: RITY.KEYID = 7
2,051,825 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,590 UART: [art] PUB.X = FA790E0A46338F1C2424DAA3530852D9A7754861E0346F3CCE742105AE230FC8F57F2CFD626FB542280678CBC83EAD1F
2,059,348 UART: [art] PUB.Y = 9FBFA5F70C5393FC8853B652BF0AED2FC6A73448B8D2534E61CAEEE4F21DB8847D951655F8731EB6323BD495558D7F95
2,066,302 UART: [art] SIG.R = A561DD354C1BEDEB67A7CB818C2997C18EFCCFB0EAC59C1ECA822E19A23538F17192F84040BAC8CB5CA195180303F871
2,073,082 UART: [art] SIG.S = 4BB82C78E748D130D6EB5C34112205DF6CC66D8BD965409AFFDD441018C2477B5E50E87BBAEAAD984712C77F60A2A83F
2,096,723 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,633 ready_for_fw is high
1,059,633 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,479 >>> mbox cmd response: success
1,618,041 UART:
1,618,057 UART: Running Caliptra FMC ...
1,618,465 UART:
1,618,519 UART: [state] CFI Enabled
1,628,794 UART: [fht] FMC Alias Private Key: 7
1,736,395 UART: [art] Extend RT PCRs Done
1,736,823 UART: [art] Lock RT PCRs Done
1,738,429 UART: [art] Populate DV Done
1,746,740 UART: [fht] FMC Alias Private Key: 7
1,747,794 UART: [art] Derive CDI
1,748,074 UART: [art] Store in in slot 0x4
1,833,231 UART: [art] Derive Key Pair
1,833,591 UART: [art] Store priv key in slot 0x5
1,847,673 UART: [art] Derive Key Pair - Done
1,862,066 UART: [art] Signing Cert with AUTHO
1,862,546 UART: RITY.KEYID = 7
1,877,598 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,363 UART: [art] PUB.X = BF11EAB54DEB16A2E7E9A93A85F0EE523D34669F1EA64100454C7CF3D9C4DC97B1A0AA16A8A9B71DBF56CF3867AA8DCE
1,885,137 UART: [art] PUB.Y = 56C00F85E6BDFC32522750977A4C8E5DD5CEE5E209C18C3C843B6DE1F79E58DC7FA81F22531BD758EC3AC1E7D0E05550
1,892,095 UART: [art] SIG.R = F6F29EC7139193976BDE5676E043150B9BFD54B4E100B49C8D7A5C1201FEC6578508340D8B584C1E7376411A37D635DB
1,898,829 UART: [art] SIG.S = 56A913B0E4F68C0938800DE0B2D29814A4ACEFF5EEAD1186BCF48A94FE14BB27797C5277DF83FE8570112CF31EB8C82A
1,923,009 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
893,277 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,402 UART: [kat] ++
897,554 UART: [kat] sha1
901,898 UART: [kat] SHA2-256
903,838 UART: [kat] SHA2-384
906,587 UART: [kat] SHA2-512-ACC
908,488 UART: [kat] ECC-384
918,071 UART: [kat] HMAC-384Kdf
922,669 UART: [kat] LMS
1,170,997 UART: [kat] --
1,171,802 UART: [cold-reset] ++
1,172,140 UART: [fht] FHT @ 0x50003400
1,174,883 UART: [idev] ++
1,175,051 UART: [idev] CDI.KEYID = 6
1,175,411 UART: [idev] SUBJECT.KEYID = 7
1,175,835 UART: [idev] UDS.KEYID = 0
1,176,180 ready_for_fw is high
1,176,180 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,205 UART: [idev] Erasing UDS.KEYID = 0
1,201,352 UART: [idev] Sha1 KeyId Algorithm
1,209,966 UART: [idev] --
1,210,904 UART: [ldev] ++
1,211,072 UART: [ldev] CDI.KEYID = 6
1,211,435 UART: [ldev] SUBJECT.KEYID = 5
1,211,861 UART: [ldev] AUTHORITY.KEYID = 7
1,212,324 UART: [ldev] FE.KEYID = 1
1,217,552 UART: [ldev] Erasing FE.KEYID = 1
1,243,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,278 UART: [ldev] --
1,283,703 UART: [fwproc] Wait for Commands...
1,284,293 UART: [fwproc] Recv command 0x46574c44
1,285,021 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,798 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,663 >>> mbox cmd response: success
1,704,849 UART: [afmc] ++
1,705,017 UART: [afmc] CDI.KEYID = 6
1,705,379 UART: [afmc] SUBJECT.KEYID = 7
1,705,804 UART: [afmc] AUTHORITY.KEYID = 5
1,741,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,752 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,480 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,365 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,084 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,778 UART: [afmc] --
1,784,714 UART: [cold-reset] --
1,785,754 UART: [state] Locking Datavault
1,787,105 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,709 UART: [state] Locking ICCM
1,788,223 UART: [exit] Launching FMC @ 0x40000130
1,793,552 UART:
1,793,568 UART: Running Caliptra FMC ...
1,793,976 UART:
1,794,119 UART: [state] CFI Enabled
1,804,410 UART: [fht] FMC Alias Private Key: 7
1,912,501 UART: [art] Extend RT PCRs Done
1,912,929 UART: [art] Lock RT PCRs Done
1,914,341 UART: [art] Populate DV Done
1,922,666 UART: [fht] FMC Alias Private Key: 7
1,923,704 UART: [art] Derive CDI
1,923,984 UART: [art] Store in in slot 0x4
2,009,897 UART: [art] Derive Key Pair
2,010,257 UART: [art] Store priv key in slot 0x5
2,023,905 UART: [art] Derive Key Pair - Done
2,038,893 UART: [art] Signing Cert with AUTHO
2,039,373 UART: RITY.KEYID = 7
2,055,005 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,770 UART: [art] PUB.X = AA6F26C4091B47E9B4EA744DDA24F9F563A4F4D9A26C715995BADDE0C98A50E873813B2CF4EE7DDD7A97E6488D79BFD2
2,062,557 UART: [art] PUB.Y = C786E47EC3500B8CA4047C7EB103F2CF3760BCD0CC361C7BF33CEBFEF7FEED378937CB9211A3BD2AC6A45D4F41287B2B
2,069,522 UART: [art] SIG.R = 7F80DABC37B44EC5F2811FF1DC82085D6763A3DEF0B01C77462C6EE0846E448FA58C24072822D7AA7FD02B12128CF639
2,076,294 UART: [art] SIG.S = B7449C911CEC23F88395CC2FA6FCE65EFA66CF965185EFFD2396FDE78C42CD193990C40F8D83A8EF5BDAAA640B763E9F
2,099,892 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,854 ready_for_fw is high
1,060,854 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,557,192 >>> mbox cmd response: success
1,620,406 UART:
1,620,422 UART: Running Caliptra FMC ...
1,620,830 UART:
1,620,973 UART: [state] CFI Enabled
1,631,678 UART: [fht] FMC Alias Private Key: 7
1,738,807 UART: [art] Extend RT PCRs Done
1,739,235 UART: [art] Lock RT PCRs Done
1,740,785 UART: [art] Populate DV Done
1,748,958 UART: [fht] FMC Alias Private Key: 7
1,749,972 UART: [art] Derive CDI
1,750,252 UART: [art] Store in in slot 0x4
1,835,923 UART: [art] Derive Key Pair
1,836,283 UART: [art] Store priv key in slot 0x5
1,849,751 UART: [art] Derive Key Pair - Done
1,864,756 UART: [art] Signing Cert with AUTHO
1,865,236 UART: RITY.KEYID = 7
1,880,908 UART: [art] Erasing AUTHORITY.KEYID = 7
1,881,673 UART: [art] PUB.X = 5178E02F9719E5DE1E4657C3763F3C55D87BA174511E5059A734F4EC38B5781534686153AF36E2F211251DAF12E2F852
1,888,435 UART: [art] PUB.Y = 1052BF954ACFE686F2ECAECCE901B0669A1FC8462E2583B2EE9EE370114DDB415885DB8F99C419943DED9CA23C0A5F5F
1,895,397 UART: [art] SIG.R = 47A47C7524D28371134EA937DC10688818B1D751FE7D6AF69581ACFE51E98F574585AE806EE246EAA31F56A3A542C6FC
1,902,171 UART: [art] SIG.S = 729CEB72EAD404530A40D22810563DD3B5B71461865C613B43A15682411085B784AD42AC11EA62D364CAF235C036A242
1,926,367 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,132 UART: [kat] SHA2-512-ACC
906,033 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,172,771 UART: [idev] ++
1,172,939 UART: [idev] CDI.KEYID = 6
1,173,300 UART: [idev] SUBJECT.KEYID = 7
1,173,725 UART: [idev] UDS.KEYID = 0
1,174,071 ready_for_fw is high
1,174,071 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,855 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,407 UART: [idev] --
1,209,530 UART: [ldev] ++
1,209,698 UART: [ldev] CDI.KEYID = 6
1,210,062 UART: [ldev] SUBJECT.KEYID = 5
1,210,489 UART: [ldev] AUTHORITY.KEYID = 7
1,210,952 UART: [ldev] FE.KEYID = 1
1,216,116 UART: [ldev] Erasing FE.KEYID = 1
1,242,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,880 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,945 UART: [fwproc] Recv command 0x46574c44
1,282,678 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,202 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,006 >>> mbox cmd response: success
1,702,075 UART: [afmc] ++
1,702,243 UART: [afmc] CDI.KEYID = 6
1,702,606 UART: [afmc] SUBJECT.KEYID = 7
1,703,032 UART: [afmc] AUTHORITY.KEYID = 5
1,738,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,642 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,254 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,973 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,968 UART: [afmc] --
1,782,086 UART: [cold-reset] --
1,782,806 UART: [state] Locking Datavault
1,784,121 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,725 UART: [state] Locking ICCM
1,785,359 UART: [exit] Launching FMC @ 0x40000130
1,790,688 UART:
1,790,704 UART: Running Caliptra FMC ...
1,791,112 UART:
1,791,166 UART: [state] CFI Enabled
1,801,809 UART: [fht] FMC Alias Private Key: 7
1,910,454 UART: [art] Extend RT PCRs Done
1,910,882 UART: [art] Lock RT PCRs Done
1,912,548 UART: [art] Populate DV Done
1,920,685 UART: [fht] FMC Alias Private Key: 7
1,921,637 UART: [art] Derive CDI
1,921,917 UART: [art] Store in in slot 0x4
2,007,476 UART: [art] Derive Key Pair
2,007,836 UART: [art] Store priv key in slot 0x5
2,020,786 UART: [art] Derive Key Pair - Done
2,035,626 UART: [art] Signing Cert with AUTHO
2,036,106 UART: RITY.KEYID = 7
2,051,200 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,965 UART: [art] PUB.X = 6F65EA6D43F348A99DDAF552A28E3706F612006A22E752B22D64785379088732A2F1666D691B548B76FB9E0CB6178A58
2,058,698 UART: [art] PUB.Y = 4457F1768C514E936901B651114771072F9B1DBC2C936D6722E7FF258781EA3C26E2057E0BC1823D6EFDFE4F0034EC33
2,065,612 UART: [art] SIG.R = E235003F87A1327E0DB03FEA024FA0EDF7FBBE44AE1895B252A94B4A4D2A89207847D53FA7624DFC760176182EB76470
2,072,357 UART: [art] SIG.S = E542B3861C117A304D2DCABEB0DB5EECFD9D3C8AB394C9C89440D985D8D9495DAD78EAB9576B66D7E9E4B7B366545418
2,096,089 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,304 ready_for_fw is high
1,056,304 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,550,830 >>> mbox cmd response: success
1,612,888 UART:
1,612,904 UART: Running Caliptra FMC ...
1,613,312 UART:
1,613,366 UART: [state] CFI Enabled
1,623,583 UART: [fht] FMC Alias Private Key: 7
1,732,066 UART: [art] Extend RT PCRs Done
1,732,494 UART: [art] Lock RT PCRs Done
1,734,112 UART: [art] Populate DV Done
1,742,607 UART: [fht] FMC Alias Private Key: 7
1,743,781 UART: [art] Derive CDI
1,744,061 UART: [art] Store in in slot 0x4
1,829,570 UART: [art] Derive Key Pair
1,829,930 UART: [art] Store priv key in slot 0x5
1,843,228 UART: [art] Derive Key Pair - Done
1,857,970 UART: [art] Signing Cert with AUTHO
1,858,450 UART: RITY.KEYID = 7
1,873,904 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,669 UART: [art] PUB.X = BA25CA0B59AC06ACC5468D462FF6226B5FACDA1CC11142B8A58EFDCFFC2D1A7596C610BF063AE2FB85F1520ABEA3C0F8
1,881,457 UART: [art] PUB.Y = 9D4AB3B117EEEAD4143980F1195CB4A080CB8C818A8E4BA02A2E89B04834C054D9A8F0DA83DD422BF891531228124713
1,888,411 UART: [art] SIG.R = 10C19E47E36F5DC53D29DEC3421A6041537DD55C734100EEA0296721E17F1D8BD4456D78066AC93D86D624DB6313B7EF
1,895,158 UART: [art] SIG.S = 5FCD204EAC973332E786BC2461C8A752839FD4DB478F0AED7F251336C6DEEE5D31C31E1FFFE54177CC76194ACA595DEA
1,919,003 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
891,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,730 UART: [kat] ++
895,882 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,170,354 UART: [cold-reset] ++
1,170,912 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,174,738 ready_for_fw is high
1,174,738 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,270 UART: [idev] Sha1 KeyId Algorithm
1,208,320 UART: [idev] --
1,209,437 UART: [ldev] ++
1,209,605 UART: [ldev] CDI.KEYID = 6
1,209,969 UART: [ldev] SUBJECT.KEYID = 5
1,210,396 UART: [ldev] AUTHORITY.KEYID = 7
1,210,859 UART: [ldev] FE.KEYID = 1
1,216,143 UART: [ldev] Erasing FE.KEYID = 1
1,243,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,387 UART: [ldev] --
1,282,673 UART: [fwproc] Wait for Commands...
1,283,340 UART: [fwproc] Recv command 0x46574c44
1,284,073 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,807 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,563 >>> mbox cmd response: success
1,704,670 UART: [afmc] ++
1,704,838 UART: [afmc] CDI.KEYID = 6
1,705,201 UART: [afmc] SUBJECT.KEYID = 7
1,705,627 UART: [afmc] AUTHORITY.KEYID = 5
1,741,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,877 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,489 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,208 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,057 UART: [afmc] --
1,785,149 UART: [cold-reset] --
1,785,861 UART: [state] Locking Datavault
1,787,122 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,726 UART: [state] Locking ICCM
1,788,390 UART: [exit] Launching FMC @ 0x40000130
1,793,719 UART:
1,793,735 UART: Running Caliptra FMC ...
1,794,143 UART:
1,794,286 UART: [state] CFI Enabled
1,804,911 UART: [fht] FMC Alias Private Key: 7
1,912,534 UART: [art] Extend RT PCRs Done
1,912,962 UART: [art] Lock RT PCRs Done
1,914,662 UART: [art] Populate DV Done
1,922,745 UART: [fht] FMC Alias Private Key: 7
1,923,867 UART: [art] Derive CDI
1,924,147 UART: [art] Store in in slot 0x4
2,010,138 UART: [art] Derive Key Pair
2,010,498 UART: [art] Store priv key in slot 0x5
2,023,544 UART: [art] Derive Key Pair - Done
2,037,952 UART: [art] Signing Cert with AUTHO
2,038,432 UART: RITY.KEYID = 7
2,053,676 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,441 UART: [art] PUB.X = EFF742532ECCAFAE1C6971E6D0BAFFB29BF52B49B55C46B34064709EA9CB73ACF2B2CA5A95517F59EB43FFB525B3E1A2
2,061,237 UART: [art] PUB.Y = 7CFA91AC860A80D8BD8B95AF5943D829B08FE4FCC7E27E03DBAE9B349D638076B01CF42028CA1ACF8E23749F28B3B728
2,068,197 UART: [art] SIG.R = 1C8E11BA904D2F130159985A62C1B18FF30B9695EA79DA51F7AB5AF39BC14487936D317113DD0F251088C63BA5671DDE
2,074,962 UART: [art] SIG.S = 9F8B40B2EF76C321284A8153690A4AB325781725A430762384AEE736C08C4A815D2EF3389A71716186D2173BBBCDEE2D
2,098,579 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,193 ready_for_fw is high
1,056,193 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,053 >>> mbox cmd response: success
1,614,509 UART:
1,614,525 UART: Running Caliptra FMC ...
1,614,933 UART:
1,615,076 UART: [state] CFI Enabled
1,625,911 UART: [fht] FMC Alias Private Key: 7
1,733,384 UART: [art] Extend RT PCRs Done
1,733,812 UART: [art] Lock RT PCRs Done
1,735,292 UART: [art] Populate DV Done
1,743,609 UART: [fht] FMC Alias Private Key: 7
1,744,557 UART: [art] Derive CDI
1,744,837 UART: [art] Store in in slot 0x4
1,830,686 UART: [art] Derive Key Pair
1,831,046 UART: [art] Store priv key in slot 0x5
1,844,546 UART: [art] Derive Key Pair - Done
1,859,550 UART: [art] Signing Cert with AUTHO
1,860,030 UART: RITY.KEYID = 7
1,875,210 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,975 UART: [art] PUB.X = 1898A775220016E7ADD15D86422B2A7DA66CA1D7D8A4FF39D6633F40674B3AB79EBF31C0FE65AE54F0E25FDAE2690685
1,882,730 UART: [art] PUB.Y = CF88EB1CBE3D5D125945CB2210F62DCD3E904E4A6580104EDE02196577E6B8F416C8740D636362A20A24D2B6782EC2B6
1,889,675 UART: [art] SIG.R = A0719279699B071669C2D72C04A8C47A74A75C06D9F172710E7BE82CAD9CFA09016AA80E21432AC14B8B7FC48136E9C6
1,896,426 UART: [art] SIG.S = 11A0AA4338BCE954DCCFC553B4D7AD92A84CEF930AD5B9204B9DA134BB4081D1FC2778E821752475D653F5F67B3A92F4
1,919,811 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,039 UART:
192,411 UART: Running Caliptra ROM ...
193,582 UART:
193,727 UART: [state] CFI Enabled
265,094 UART: [state] LifecycleState = Unprovisioned
267,053 UART: [state] DebugLocked = No
268,379 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,628 UART: [kat] SHA2-256
442,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,849 UART: [kat] ++
453,293 UART: [kat] sha1
463,737 UART: [kat] SHA2-256
466,463 UART: [kat] SHA2-384
472,446 UART: [kat] SHA2-512-ACC
474,804 UART: [kat] ECC-384
2,770,071 UART: [kat] HMAC-384Kdf
2,800,606 UART: [kat] LMS
3,990,902 UART: [kat] --
3,997,117 UART: [cold-reset] ++
3,998,835 UART: [fht] Storing FHT @ 0x50003400
4,010,096 UART: [idev] ++
4,010,672 UART: [idev] CDI.KEYID = 6
4,011,623 UART: [idev] SUBJECT.KEYID = 7
4,013,095 UART: [idev] UDS.KEYID = 0
4,014,114 ready_for_fw is high
4,014,337 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,054,492 UART: [idev] Erasing UDS.KEYID = 0
7,348,959 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,895 UART: [idev] --
7,376,415 UART: [ldev] ++
7,377,014 UART: [ldev] CDI.KEYID = 6
7,377,955 UART: [ldev] SUBJECT.KEYID = 5
7,379,165 UART: [ldev] AUTHORITY.KEYID = 7
7,380,452 UART: [ldev] FE.KEYID = 1
7,423,418 UART: [ldev] Erasing FE.KEYID = 1
10,752,046 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,714 UART: [ldev] --
13,115,950 UART: [fwproc] Waiting for Commands...
13,118,582 UART: [fwproc] Received command 0x46574c44
13,120,759 UART: [fwproc] Received Image of size 31676 bytes
16,162,742 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,244,799 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,313,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,342,216 >>> mbox cmd response: success
16,346,255 UART: [afmc] ++
16,346,843 UART: [afmc] CDI.KEYID = 6
16,347,859 UART: [afmc] SUBJECT.KEYID = 7
16,349,016 UART: [afmc] AUTHORITY.KEYID = 5
19,724,694 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,035,297 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,037,566 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,052,015 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,066,804 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,081,250 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,101,752 UART: [afmc] --
22,105,615 UART: [cold-reset] --
22,110,929 UART: [state] Locking Datavault
22,115,954 UART: [state] Locking PCR0, PCR1 and PCR31
22,117,647 UART: [state] Locking ICCM
22,120,280 UART: [exit] Launching FMC @ 0x40000130
22,128,617 UART:
22,128,860 UART: Running Caliptra FMC ...
22,129,962 UART:
22,130,123 UART: [state] CFI Enabled
22,196,434 UART: [fht] FMC Alias Private Key: 7
24,534,793 UART: [art] Extend RT PCRs Done
24,536,022 UART: [art] Lock RT PCRs Done
24,537,290 UART: [art] Populate DV Done
24,542,912 UART: [fht] FMC Alias Private Key: 7
24,544,505 UART: [art] Derive CDI
24,545,317 UART: [art] Store in in slot 0x4
24,604,827 UART: [art] Derive Key Pair
24,605,865 UART: [art] Store priv key in slot 0x5
27,898,993 UART: [art] Derive Key Pair - Done
27,912,052 UART: [art] Signing Cert with AUTHO
27,913,363 UART: RITY.KEYID = 7
30,201,303 UART: [art] Erasing AUTHORITY.KEYID = 7
30,202,812 UART: [art] PUB.X = 4DF435E161984837D0B69B5FA00D96CF5A7177EAE78A3104DCCF2BA12D512DBB2D49E0A541DD438E82DDEADD5766A878
30,210,039 UART: [art] PUB.Y = FD1A8561EA008BB42158481DD8A257A658BF6F78099AB58696A627144B2A04C4000E44738001AF452932698DCD8C4D87
30,217,246 UART: [art] SIG.R = E871F3B7E30021238FEDD06699817462EC3B4271B928A9964A9504C6EF557571F9C518F230BEE8C555EDE049ED4CA15B
30,224,612 UART: [art] SIG.S = 43BA485699E0E793C54294AF8A252C2A26B23616BB322073D9867BF288FB804DA1B68695BC9C381524C4AB5D0F2B9A4C
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,804,167 ready_for_fw is high
3,804,720 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,213,349 >>> mbox cmd response: success
21,902,949 UART:
21,903,355 UART: Running Caliptra FMC ...
21,904,491 UART:
21,904,642 UART: [state] CFI Enabled
21,974,493 UART: [fht] FMC Alias Private Key: 7
24,312,260 UART: [art] Extend RT PCRs Done
24,313,483 UART: [art] Lock RT PCRs Done
24,315,589 UART: [art] Populate DV Done
24,320,995 UART: [fht] FMC Alias Private Key: 7
24,322,480 UART: [art] Derive CDI
24,323,210 UART: [art] Store in in slot 0x4
24,383,101 UART: [art] Derive Key Pair
24,384,101 UART: [art] Store priv key in slot 0x5
27,677,018 UART: [art] Derive Key Pair - Done
27,689,973 UART: [art] Signing Cert with AUTHO
27,691,273 UART: RITY.KEYID = 7
29,978,391 UART: [art] Erasing AUTHORITY.KEYID = 7
29,979,892 UART: [art] PUB.X = A2E559032DF4124CCE945E98E0FBB3B4A905708F25404AC7BF3060547B89B852EE573B5684E58DA4F5AE3801D61635BB
29,987,162 UART: [art] PUB.Y = 8F9325C4536742201BEFE194E42F4723EDD1EE5E2ED9D2424D3980D8DDADC0F50FEB9645A0F947B8924CADE4E58520F9
29,994,399 UART: [art] SIG.R = B258669C82BB4DF038F8104D3EA66EE0443E49EAD41D118F2CDD38BABF4FA86916F4D1BC6DDBE6C02FD3446E1509DB0B
30,001,815 UART: [art] SIG.S = 3E3F3E653E378F8BC0B68450D80BDC897B014CDFB0529E64D68956F6AE61650ECFA424E227B8BEA73CC91E642AF0DCA6
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,441 UART:
192,808 UART: Running Caliptra ROM ...
193,920 UART:
603,634 UART: [state] CFI Enabled
621,549 UART: [state] LifecycleState = Unprovisioned
623,400 UART: [state] DebugLocked = No
626,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,229 UART: [kat] SHA2-256
800,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,486 UART: [kat] ++
811,932 UART: [kat] sha1
822,111 UART: [kat] SHA2-256
824,827 UART: [kat] SHA2-384
831,400 UART: [kat] SHA2-512-ACC
833,799 UART: [kat] ECC-384
3,120,422 UART: [kat] HMAC-384Kdf
3,131,867 UART: [kat] LMS
4,322,006 UART: [kat] --
4,326,215 UART: [cold-reset] ++
4,328,285 UART: [fht] Storing FHT @ 0x50003400
4,340,689 UART: [idev] ++
4,341,249 UART: [idev] CDI.KEYID = 6
4,342,154 UART: [idev] SUBJECT.KEYID = 7
4,343,421 UART: [idev] UDS.KEYID = 0
4,344,465 ready_for_fw is high
4,344,666 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,384,779 UART: [idev] Erasing UDS.KEYID = 0
7,627,641 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,136 UART: [idev] --
7,654,102 UART: [ldev] ++
7,654,668 UART: [ldev] CDI.KEYID = 6
7,655,622 UART: [ldev] SUBJECT.KEYID = 5
7,656,834 UART: [ldev] AUTHORITY.KEYID = 7
7,658,118 UART: [ldev] FE.KEYID = 1
7,668,275 UART: [ldev] Erasing FE.KEYID = 1
10,958,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,406 UART: [ldev] --
13,319,570 UART: [fwproc] Waiting for Commands...
13,322,040 UART: [fwproc] Received command 0x46574c44
13,324,221 UART: [fwproc] Received Image of size 31676 bytes
16,370,988 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,448,346 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,517,194 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,546,015 >>> mbox cmd response: success
16,550,157 UART: [afmc] ++
16,550,744 UART: [afmc] CDI.KEYID = 6
16,551,703 UART: [afmc] SUBJECT.KEYID = 7
16,552,913 UART: [afmc] AUTHORITY.KEYID = 5
19,865,027 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,159,552 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,161,797 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,176,185 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,190,991 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,205,448 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,226,479 UART: [afmc] --
22,230,721 UART: [cold-reset] --
22,234,090 UART: [state] Locking Datavault
22,239,874 UART: [state] Locking PCR0, PCR1 and PCR31
22,241,631 UART: [state] Locking ICCM
22,243,835 UART: [exit] Launching FMC @ 0x40000130
22,252,175 UART:
22,252,404 UART: Running Caliptra FMC ...
22,253,503 UART:
22,253,659 UART: [state] CFI Enabled
22,261,710 UART: [fht] FMC Alias Private Key: 7
24,592,839 UART: [art] Extend RT PCRs Done
24,594,071 UART: [art] Lock RT PCRs Done
24,595,471 UART: [art] Populate DV Done
24,600,932 UART: [fht] FMC Alias Private Key: 7
24,602,521 UART: [art] Derive CDI
24,603,255 UART: [art] Store in in slot 0x4
24,645,932 UART: [art] Derive Key Pair
24,646,929 UART: [art] Store priv key in slot 0x5
27,889,086 UART: [art] Derive Key Pair - Done
27,901,691 UART: [art] Signing Cert with AUTHO
27,903,005 UART: RITY.KEYID = 7
30,182,481 UART: [art] Erasing AUTHORITY.KEYID = 7
30,184,470 UART: [art] PUB.X = E7A0058F0442DBC8D0E94DFAD2CA672F3D8B371191ECD1690DFAE944B733D60A5DEE3B7E882FF3328D4AB29C8296615E
30,192,922 UART: [art] PUB.Y = 511EA7D2120328A5E348F6A58EE6EBFDA9D2071CCF69C5B9A11E36B44D8D629A6371D04FAE44A6A9F5C40976554627F9
30,199,707 UART: [art] SIG.R = 413723C9796DBEA09FAEBD2B1EF7AC0E1703442A6958EF648CDF56911E0FA330631301F7828AC4C8E8F43271F45118BB
30,207,118 UART: [art] SIG.S = CB9F687E3CC38FE01AB01DFDB9BC8A453035CE592BFCA91F1E82DE82D9A8078E6644F71B0F7E98E01E3AC3CC0E9FBB73
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,128,754 ready_for_fw is high
4,129,150 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,389,714 >>> mbox cmd response: success
22,030,558 UART:
22,031,445 UART: Running Caliptra FMC ...
22,032,582 UART:
22,032,740 UART: [state] CFI Enabled
22,040,197 UART: [fht] FMC Alias Private Key: 7
24,370,525 UART: [art] Extend RT PCRs Done
24,371,756 UART: [art] Lock RT PCRs Done
24,373,476 UART: [art] Populate DV Done
24,379,005 UART: [fht] FMC Alias Private Key: 7
24,380,722 UART: [art] Derive CDI
24,381,458 UART: [art] Store in in slot 0x4
24,424,314 UART: [art] Derive Key Pair
24,425,375 UART: [art] Store priv key in slot 0x5
27,667,641 UART: [art] Derive Key Pair - Done
27,680,538 UART: [art] Signing Cert with AUTHO
27,681,874 UART: RITY.KEYID = 7
29,961,575 UART: [art] Erasing AUTHORITY.KEYID = 7
29,963,085 UART: [art] PUB.X = 4FA1F5AD11DEB5B405688490F93D78FFD25A2D24EA5269B3A4C6FB5CE7CA0E5439C906AF05A7CC82BB045E25FF3DF9BA
29,970,365 UART: [art] PUB.Y = 613A558A251E21A226C772A62E24645B1B3FCE12227AB8D7566D73ACEECC4240E44B82B972D324CF786F8221B23EC9EA
29,977,597 UART: [art] SIG.R = 092F0D231B5333C27F3C8DC1B9A623AD54C0760A233E5BAAF20797C8FC9E377A27B6707B9F7370D14A961B40BEDD7BDE
29,985,015 UART: [art] SIG.S = AD541BFB7AD3DEDCCA15EA55EBDCB5C6697BB76C69765F497C4522E99D57733FC26F4E52665EDA9F70D09B5C2D5B39B6
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,762 writing to cptra_bootfsm_go
192,965 UART:
193,320 UART: Running Caliptra ROM ...
194,398 UART:
194,538 UART: [state] CFI Enabled
259,870 UART: [state] LifecycleState = Unprovisioned
261,762 UART: [state] DebugLocked = No
262,928 UART: [state] WD Timer not started. Device not locked for debugging
266,036 UART: [kat] SHA2-256
445,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,697 UART: [kat] ++
457,135 UART: [kat] sha1
467,454 UART: [kat] SHA2-256
470,534 UART: [kat] SHA2-384
476,523 UART: [kat] SHA2-512-ACC
479,525 UART: [kat] ECC-384
2,929,373 UART: [kat] HMAC-384Kdf
2,950,698 UART: [kat] LMS
3,480,137 UART: [kat] --
3,485,588 UART: [cold-reset] ++
3,486,812 UART: [fht] FHT @ 0x50003400
3,497,217 UART: [idev] ++
3,497,777 UART: [idev] CDI.KEYID = 6
3,498,807 UART: [idev] SUBJECT.KEYID = 7
3,499,909 UART: [idev] UDS.KEYID = 0
3,500,834 ready_for_fw is high
3,501,019 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,541,257 UART: [idev] Erasing UDS.KEYID = 0
6,005,838 UART: [idev] Sha1 KeyId Algorithm
6,027,933 UART: [idev] --
6,031,929 UART: [ldev] ++
6,032,495 UART: [ldev] CDI.KEYID = 6
6,033,568 UART: [ldev] SUBJECT.KEYID = 5
6,034,677 UART: [ldev] AUTHORITY.KEYID = 7
6,035,853 UART: [ldev] FE.KEYID = 1
6,078,151 UART: [ldev] Erasing FE.KEYID = 1
8,578,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,706 UART: [ldev] --
10,369,858 UART: [fwproc] Wait for Commands...
10,372,550 UART: [fwproc] Recv command 0x46574c44
10,374,657 UART: [fwproc] Recv'd Img size: 31656 bytes
12,762,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,839,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,907,934 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,936,596 >>> mbox cmd response: success
12,941,019 UART: [afmc] ++
12,941,600 UART: [afmc] CDI.KEYID = 6
12,942,508 UART: [afmc] SUBJECT.KEYID = 7
12,943,663 UART: [afmc] AUTHORITY.KEYID = 5
15,478,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,207,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,209,209 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,224,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,240,998 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,256,887 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,277,941 UART: [afmc] --
17,280,906 UART: [cold-reset] --
17,284,442 UART: [state] Locking Datavault
17,289,680 UART: [state] Locking PCR0, PCR1 and PCR31
17,291,397 UART: [state] Locking ICCM
17,293,270 UART: [exit] Launching FMC @ 0x40000130
17,301,719 UART:
17,301,955 UART: Running Caliptra FMC ...
17,303,050 UART:
17,303,209 UART: [state] CFI Enabled
17,363,629 UART: [fht] FMC Alias Private Key: 7
19,128,057 UART: [art] Extend RT PCRs Done
19,129,278 UART: [art] Lock RT PCRs Done
19,131,060 UART: [art] Populate DV Done
19,136,455 UART: [fht] FMC Alias Private Key: 7
19,138,053 UART: [art] Derive CDI
19,138,865 UART: [art] Store in in slot 0x4
19,196,880 UART: [art] Derive Key Pair
19,197,881 UART: [art] Store priv key in slot 0x5
21,660,253 UART: [art] Derive Key Pair - Done
21,673,152 UART: [art] Signing Cert with AUTHO
21,674,458 UART: RITY.KEYID = 7
23,386,907 UART: [art] Erasing AUTHORITY.KEYID = 7
23,388,456 UART: [art] PUB.X = 5DF9B1573F0CDE02BA18FC5A6CF0481BFF7B36EF0B9983AFBC0CE55B6D8AE6A2DE9E2A7095F0F02948C7A0F02D082210
23,395,725 UART: [art] PUB.Y = 6F88343FE593A239B9243113165DED4EFD537BE4BB903923849167B9D7F48F0671E7EE718B2345E34F8B37197830F191
23,402,910 UART: [art] SIG.R = 28A5674635DB819E81B92D85A85F47B00396E8EBF84F32709B851913B8778218B8F598999378887587C060222916AFAF
23,410,254 UART: [art] SIG.S = D1B9CDFE5547516A28F3972FABACD3F0E549B3F5DF5BD2B532AB950D86A4BE24F4A79C282E198D1247D68A198F2658F5
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
3,380,239 ready_for_fw is high
3,380,859 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,781,707 >>> mbox cmd response: success
17,061,870 UART:
17,062,256 UART: Running Caliptra FMC ...
17,063,367 UART:
17,063,517 UART: [state] CFI Enabled
17,128,916 UART: [fht] FMC Alias Private Key: 7
18,892,595 UART: [art] Extend RT PCRs Done
18,893,829 UART: [art] Lock RT PCRs Done
18,895,728 UART: [art] Populate DV Done
18,900,909 UART: [fht] FMC Alias Private Key: 7
18,902,614 UART: [art] Derive CDI
18,903,429 UART: [art] Store in in slot 0x4
18,961,827 UART: [art] Derive Key Pair
18,962,875 UART: [art] Store priv key in slot 0x5
21,426,223 UART: [art] Derive Key Pair - Done
21,438,774 UART: [art] Signing Cert with AUTHO
21,440,085 UART: RITY.KEYID = 7
23,151,845 UART: [art] Erasing AUTHORITY.KEYID = 7
23,153,361 UART: [art] PUB.X = A7927D5CFBABA6731168E1ACD2FBAF1D859BB3AD16905912D894F6509A6F868F4292E8498340149ACE603321DB579047
23,160,593 UART: [art] PUB.Y = F2B2196446545C2F3CD8030D964C29A5BFB6D087BE6113077F0C430ACC67D9E8B3628AFB1725D97E274096C5A2A9ACB8
23,167,897 UART: [art] SIG.R = 4F6C5B4D9113D9B69BC9EE3E73D519C186EC452F4EA237F252E80BA810F8F098930A91839B2C09261940E6D106424E39
23,175,333 UART: [art] SIG.S = 9F595BD182E8AF4B2C2ABDEADB0F6EB165A2802B07FC61C3D3C0FDC16CD36D9069A1A033723F7DE9F53AAA9A56AEDB89
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,422 UART:
192,783 UART: Running Caliptra ROM ...
193,914 UART:
603,405 UART: [state] CFI Enabled
619,489 UART: [state] LifecycleState = Unprovisioned
621,347 UART: [state] DebugLocked = No
624,147 UART: [state] WD Timer not started. Device not locked for debugging
627,820 UART: [kat] SHA2-256
806,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,538 UART: [kat] ++
819,066 UART: [kat] sha1
830,225 UART: [kat] SHA2-256
833,231 UART: [kat] SHA2-384
839,288 UART: [kat] SHA2-512-ACC
842,293 UART: [kat] ECC-384
3,284,397 UART: [kat] HMAC-384Kdf
3,297,193 UART: [kat] LMS
3,826,668 UART: [kat] --
3,832,503 UART: [cold-reset] ++
3,834,997 UART: [fht] FHT @ 0x50003400
3,844,616 UART: [idev] ++
3,845,356 UART: [idev] CDI.KEYID = 6
3,846,251 UART: [idev] SUBJECT.KEYID = 7
3,847,376 UART: [idev] UDS.KEYID = 0
3,848,275 ready_for_fw is high
3,848,482 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,888,424 UART: [idev] Erasing UDS.KEYID = 0
6,318,489 UART: [idev] Sha1 KeyId Algorithm
6,340,900 UART: [idev] --
6,345,195 UART: [ldev] ++
6,345,772 UART: [ldev] CDI.KEYID = 6
6,346,691 UART: [ldev] SUBJECT.KEYID = 5
6,347,788 UART: [ldev] AUTHORITY.KEYID = 7
6,349,121 UART: [ldev] FE.KEYID = 1
6,360,296 UART: [ldev] Erasing FE.KEYID = 1
8,835,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,163 UART: [ldev] --
10,628,361 UART: [fwproc] Wait for Commands...
10,630,829 UART: [fwproc] Recv command 0x46574c44
10,632,910 UART: [fwproc] Recv'd Img size: 31656 bytes
13,019,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,096,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,165,414 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,194,294 >>> mbox cmd response: success
13,198,278 UART: [afmc] ++
13,198,859 UART: [afmc] CDI.KEYID = 6
13,199,737 UART: [afmc] SUBJECT.KEYID = 7
13,201,004 UART: [afmc] AUTHORITY.KEYID = 5
15,695,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,416,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,418,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,434,013 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,450,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,465,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,488,537 UART: [afmc] --
17,492,772 UART: [cold-reset] --
17,497,437 UART: [state] Locking Datavault
17,501,713 UART: [state] Locking PCR0, PCR1 and PCR31
17,503,410 UART: [state] Locking ICCM
17,504,479 UART: [exit] Launching FMC @ 0x40000130
17,512,871 UART:
17,513,105 UART: Running Caliptra FMC ...
17,514,201 UART:
17,514,355 UART: [state] CFI Enabled
17,522,560 UART: [fht] FMC Alias Private Key: 7
19,279,762 UART: [art] Extend RT PCRs Done
19,280,981 UART: [art] Lock RT PCRs Done
19,282,677 UART: [art] Populate DV Done
19,288,074 UART: [fht] FMC Alias Private Key: 7
19,289,780 UART: [art] Derive CDI
19,290,521 UART: [art] Store in in slot 0x4
19,333,210 UART: [art] Derive Key Pair
19,334,210 UART: [art] Store priv key in slot 0x5
21,760,781 UART: [art] Derive Key Pair - Done
21,773,827 UART: [art] Signing Cert with AUTHO
21,775,159 UART: RITY.KEYID = 7
23,480,808 UART: [art] Erasing AUTHORITY.KEYID = 7
23,482,314 UART: [art] PUB.X = 727EF9018DE855824086C49E06880445F4056B6B0071C34DA247BE4ABE6E5B2739D0361F207ED8435D29CCBAFFED509B
23,489,536 UART: [art] PUB.Y = A6E547790C1B7C4FF056D9D48FAAF28FDACE86185647223AAD50EF8EA354322E4CDA3700921E41272D93E73B46D6C071
23,496,801 UART: [art] SIG.R = 23052490329D6BDF52B8DCE6B6C360E27D73F58382C732F0A5AF61EABA22AEEADCC008194B1272110D09555D52030933
23,504,170 UART: [art] SIG.S = 02765D2EA9BB775034E2263D04D723F500192101C5D6FDDFD329C9F4FAE461C847C1C112C867E4221F615CE74B89AA50
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,697,217 ready_for_fw is high
3,698,133 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,979,303 >>> mbox cmd response: success
17,228,784 UART:
17,229,212 UART: Running Caliptra FMC ...
17,230,327 UART:
17,230,474 UART: [state] CFI Enabled
17,238,366 UART: [fht] FMC Alias Private Key: 7
18,994,971 UART: [art] Extend RT PCRs Done
18,996,196 UART: [art] Lock RT PCRs Done
18,997,665 UART: [art] Populate DV Done
19,003,343 UART: [fht] FMC Alias Private Key: 7
19,004,941 UART: [art] Derive CDI
19,005,683 UART: [art] Store in in slot 0x4
19,048,651 UART: [art] Derive Key Pair
19,049,697 UART: [art] Store priv key in slot 0x5
21,476,480 UART: [art] Derive Key Pair - Done
21,489,327 UART: [art] Signing Cert with AUTHO
21,490,638 UART: RITY.KEYID = 7
23,196,399 UART: [art] Erasing AUTHORITY.KEYID = 7
23,197,913 UART: [art] PUB.X = 18414F5F6C7C5A91F60AE57442E605FB764F99CA307735A4AD44541D707E30A0BEFC80FEFEDE1875841F954DC81053F1
23,205,179 UART: [art] PUB.Y = CB5FEB99873EBE2D477808ED759C8F54F575701296E961324FD585922AFB10B607C45D6CCF8FE55121C8D81C9109D2FA
23,212,456 UART: [art] SIG.R = ED4E318ED57396572AE9246E0226A2E412C2F9037706603BD89F5C130F05C6C87D25E8BAACB2F36F6C378BCE773C199B
23,219,856 UART: [art] SIG.S = 03245E0403D53BE38938915690F7E2A8E2EED3D36D8AAB40CF920A15452F2B39C142F1DADCB7C436AB906BD1F5FAB8E4
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
3,439,288 ready_for_fw is high
3,439,685 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,960,423 >>> mbox cmd response: success
17,249,973 UART:
17,250,409 UART: Running Caliptra FMC ...
17,251,530 UART:
17,251,681 UART: [state] CFI Enabled
17,321,599 UART: [fht] FMC Alias Private Key: 7
19,085,664 UART: [art] Extend RT PCRs Done
19,086,892 UART: [art] Lock RT PCRs Done
19,088,810 UART: [art] Populate DV Done
19,094,001 UART: [fht] FMC Alias Private Key: 7
19,095,718 UART: [art] Derive CDI
19,096,543 UART: [art] Store in in slot 0x4
19,154,589 UART: [art] Derive Key Pair
19,155,638 UART: [art] Store priv key in slot 0x5
21,618,140 UART: [art] Derive Key Pair - Done
21,630,945 UART: [art] Signing Cert with AUTHO
21,632,253 UART: RITY.KEYID = 7
23,344,473 UART: [art] Erasing AUTHORITY.KEYID = 7
23,345,982 UART: [art] PUB.X = B15E0D95DACF7E3E2A9D21C171F926AF790C70C061B23269158B06AD4DFDBC6F94F4DAA27EF493A494C9204F70E8E74A
23,353,281 UART: [art] PUB.Y = CB08E27125DDC5B4600DA2534B7B3A9DE1D5477C92D25AAD1EF5B58FE9ED9C0B6284F120717453F410EF39C37A3FA8C2
23,360,514 UART: [art] SIG.R = D689CF5C58B2A61337C10E8EF3FDBD8390B3E991517999C69AE78827E74312076586A93D875E22E2FA61914594F1D03E
23,367,996 UART: [art] SIG.S = 9FC5395B3571268DAB90EA554143DB67F8B5A7E160D6D0F3851F8F273CF7DAD61B7C7ECCD84C22D4588ADD65F0058EF6
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,752,839 ready_for_fw is high
3,753,230 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,177,594 >>> mbox cmd response: success
17,426,349 UART:
17,426,728 UART: Running Caliptra FMC ...
17,427,921 UART:
17,428,079 UART: [state] CFI Enabled
17,436,214 UART: [fht] FMC Alias Private Key: 7
19,193,040 UART: [art] Extend RT PCRs Done
19,194,270 UART: [art] Lock RT PCRs Done
19,195,895 UART: [art] Populate DV Done
19,201,397 UART: [fht] FMC Alias Private Key: 7
19,203,041 UART: [art] Derive CDI
19,203,862 UART: [art] Store in in slot 0x4
19,246,341 UART: [art] Derive Key Pair
19,247,364 UART: [art] Store priv key in slot 0x5
21,674,216 UART: [art] Derive Key Pair - Done
21,687,284 UART: [art] Signing Cert with AUTHO
21,688,590 UART: RITY.KEYID = 7
23,393,774 UART: [art] Erasing AUTHORITY.KEYID = 7
23,395,285 UART: [art] PUB.X = DFA6DDCF09530B1B753B7E51DA4F087E986F6B7C0FF9702EF5C99F76A7DFA95416E7770230132C41E2CEEFB918FAFDCA
23,402,529 UART: [art] PUB.Y = 0633B71C29E66DCF72B985151D2ABABED07FCD385717DF5C326ADCB0315F3C6926E98834DBA93B4D636CEC1AF2E57D42
23,409,848 UART: [art] SIG.R = 284D3D8BC50B14007D1E64A194426FEF7A19BCB2A69A84BBEAFD6647DFF9A6E4CCF28AC04FCA7064C05AE7D992642354
23,417,248 UART: [art] SIG.S = 3648B20ED863D398703368076004819ADA062023FE8F243042137B3F99A45120E8C9FFAE6DD6604F578BF6F80492AB44
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,063 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,659 UART: [kat] SHA2-256
881,590 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,705 UART: [kat] ++
885,857 UART: [kat] sha1
890,125 UART: [kat] SHA2-256
892,063 UART: [kat] SHA2-384
894,888 UART: [kat] SHA2-512-ACC
896,789 UART: [kat] ECC-384
902,764 UART: [kat] HMAC-384Kdf
907,352 UART: [kat] LMS
1,475,548 UART: [kat] --
1,476,483 UART: [cold-reset] ++
1,476,867 UART: [fht] Storing FHT @ 0x50003400
1,479,808 UART: [idev] ++
1,479,976 UART: [idev] CDI.KEYID = 6
1,480,336 UART: [idev] SUBJECT.KEYID = 7
1,480,760 UART: [idev] UDS.KEYID = 0
1,481,105 ready_for_fw is high
1,481,105 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,070 UART: [idev] Erasing UDS.KEYID = 0
1,505,422 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,134 UART: [idev] --
1,515,379 UART: [ldev] ++
1,515,547 UART: [ldev] CDI.KEYID = 6
1,515,910 UART: [ldev] SUBJECT.KEYID = 5
1,516,336 UART: [ldev] AUTHORITY.KEYID = 7
1,516,799 UART: [ldev] FE.KEYID = 1
1,521,947 UART: [ldev] Erasing FE.KEYID = 1
1,546,956 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,504 UART: [ldev] --
1,585,995 UART: [fwproc] Waiting for Commands...
1,586,850 UART: [fwproc] Received command 0x46574c44
1,587,641 UART: [fwproc] Received Image of size 31656 bytes
1,939,344 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,320 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,407 >>> mbox cmd response: success
2,008,515 UART: [afmc] ++
2,008,683 UART: [afmc] CDI.KEYID = 6
2,009,045 UART: [afmc] SUBJECT.KEYID = 7
2,009,470 UART: [afmc] AUTHORITY.KEYID = 5
2,044,159 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,079 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,587 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,472 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,162 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,021 UART: [afmc] --
2,087,145 UART: [cold-reset] --
2,087,931 UART: [state] Locking Datavault
2,089,060 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,664 UART: [state] Locking ICCM
2,090,236 UART: [exit] Launching FMC @ 0x40000130
2,095,565 UART:
2,095,581 UART: Running Caliptra FMC ...
2,095,989 UART:
2,096,043 UART: [state] CFI Enabled
2,106,442 UART: [fht] FMC Alias Private Key: 7
2,214,709 UART: [art] Extend RT PCRs Done
2,215,137 UART: [art] Lock RT PCRs Done
2,216,759 UART: [art] Populate DV Done
2,225,158 UART: [fht] FMC Alias Private Key: 7
2,226,264 UART: [art] Derive CDI
2,226,544 UART: [art] Store in in slot 0x4
2,312,127 UART: [art] Derive Key Pair
2,312,487 UART: [art] Store priv key in slot 0x5
2,325,453 UART: [art] Derive Key Pair - Done
2,340,041 UART: [art] Signing Cert with AUTHO
2,340,521 UART: RITY.KEYID = 7
2,355,961 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,726 UART: [art] PUB.X = 41C58AD4E14F8339FE6EEA7BFFF35B9E27025048CC8D48A42C874E819D96A9E99A36CA4751A765A30921AF0B1A223E4C
2,363,497 UART: [art] PUB.Y = 3D4F55B3C9C3336F0ED1E2FB1F6DE440FF5DFFE09FB34D084EB14E2129D49D1E4B0038D4C8FC94450531268FFD813022
2,370,428 UART: [art] SIG.R = 16B142F009D6E6F66097B79C2B9B8E9FF74F8332CB7D33E50D0D722E86F2C30B31DBE5077973B864E5A49A83D9F98023
2,377,185 UART: [art] SIG.S = 354D987D0BACAE5594D63AEAE436DEFA038D9386F830B90FFDEDB615EC9885EE1DD6C67ADD182DC8AD90DF7939E6605B
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 ready_for_fw is high
1,362,349 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,381 >>> mbox cmd response: success
1,918,351 UART:
1,918,367 UART: Running Caliptra FMC ...
1,918,775 UART:
1,918,829 UART: [state] CFI Enabled
1,929,292 UART: [fht] FMC Alias Private Key: 7
2,037,239 UART: [art] Extend RT PCRs Done
2,037,667 UART: [art] Lock RT PCRs Done
2,039,211 UART: [art] Populate DV Done
2,047,570 UART: [fht] FMC Alias Private Key: 7
2,048,722 UART: [art] Derive CDI
2,049,002 UART: [art] Store in in slot 0x4
2,134,745 UART: [art] Derive Key Pair
2,135,105 UART: [art] Store priv key in slot 0x5
2,148,553 UART: [art] Derive Key Pair - Done
2,162,975 UART: [art] Signing Cert with AUTHO
2,163,455 UART: RITY.KEYID = 7
2,178,525 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,290 UART: [art] PUB.X = 7CF91825DF4B898DCBFC73261E6047470D26C5C349447093C3A73D88EDBE74C7A1960744F130C567B8F173B259FBCDE8
2,186,058 UART: [art] PUB.Y = 39E23B2DE2809C08D044EA7DDD5020DCE01F19D508D2B3E7220B6ED52D6AA4B29FBE713F6CE9EBF2FA94655F4DDB1DEA
2,193,025 UART: [art] SIG.R = 37D8047910D1F4BBB00C029D4663CC1F51E4C217DAE16BA1EF97D11537F5BA742B7A70AB04E21166A185E9FE58470BDA
2,199,790 UART: [art] SIG.S = 6ABCD6625CE60915562525BC7405369E5E8A2A86D4654C21BD6FAA41094AA0159222E38D1DBE79849801DE0CB0421163
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,018 UART: [kat] SHA2-256
881,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,064 UART: [kat] ++
886,216 UART: [kat] sha1
890,396 UART: [kat] SHA2-256
892,334 UART: [kat] SHA2-384
895,139 UART: [kat] SHA2-512-ACC
897,040 UART: [kat] ECC-384
902,627 UART: [kat] HMAC-384Kdf
907,247 UART: [kat] LMS
1,475,443 UART: [kat] --
1,476,184 UART: [cold-reset] ++
1,476,712 UART: [fht] Storing FHT @ 0x50003400
1,479,687 UART: [idev] ++
1,479,855 UART: [idev] CDI.KEYID = 6
1,480,215 UART: [idev] SUBJECT.KEYID = 7
1,480,639 UART: [idev] UDS.KEYID = 0
1,480,984 ready_for_fw is high
1,480,984 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,793 UART: [idev] Erasing UDS.KEYID = 0
1,505,581 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,173 UART: [idev] --
1,515,300 UART: [ldev] ++
1,515,468 UART: [ldev] CDI.KEYID = 6
1,515,831 UART: [ldev] SUBJECT.KEYID = 5
1,516,257 UART: [ldev] AUTHORITY.KEYID = 7
1,516,720 UART: [ldev] FE.KEYID = 1
1,521,810 UART: [ldev] Erasing FE.KEYID = 1
1,547,431 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,397 UART: [ldev] --
1,586,736 UART: [fwproc] Waiting for Commands...
1,587,389 UART: [fwproc] Received command 0x46574c44
1,588,180 UART: [fwproc] Received Image of size 31656 bytes
1,940,049 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,635 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,987 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,008,792 >>> mbox cmd response: success
2,010,040 UART: [afmc] ++
2,010,208 UART: [afmc] CDI.KEYID = 6
2,010,570 UART: [afmc] SUBJECT.KEYID = 7
2,010,995 UART: [afmc] AUTHORITY.KEYID = 5
2,046,148 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,062,230 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,010 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,738 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,074,623 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,080,313 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,088,244 UART: [afmc] --
2,089,170 UART: [cold-reset] --
2,090,054 UART: [state] Locking Datavault
2,091,103 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,707 UART: [state] Locking ICCM
2,092,271 UART: [exit] Launching FMC @ 0x40000130
2,097,600 UART:
2,097,616 UART: Running Caliptra FMC ...
2,098,024 UART:
2,098,167 UART: [state] CFI Enabled
2,108,852 UART: [fht] FMC Alias Private Key: 7
2,216,781 UART: [art] Extend RT PCRs Done
2,217,209 UART: [art] Lock RT PCRs Done
2,218,873 UART: [art] Populate DV Done
2,226,914 UART: [fht] FMC Alias Private Key: 7
2,228,004 UART: [art] Derive CDI
2,228,284 UART: [art] Store in in slot 0x4
2,313,935 UART: [art] Derive Key Pair
2,314,295 UART: [art] Store priv key in slot 0x5
2,327,715 UART: [art] Derive Key Pair - Done
2,342,423 UART: [art] Signing Cert with AUTHO
2,342,903 UART: RITY.KEYID = 7
2,357,809 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,574 UART: [art] PUB.X = F0100295CE2FA09804340BD299FE5D979A03E904398CA68302ABD123D1FC7D8B758CD99398B0FEE87BA497CB7F71BECA
2,365,338 UART: [art] PUB.Y = B33EC2D97C8E341C23735F8083715731C7734A6E6BE0B4DE3C8DAE0B26B9A98E8594BB2F8A1696DC71DE5989CC6A1378
2,372,293 UART: [art] SIG.R = EC3F5DC8F7E8ADF6CA0E76BA9E8899206BD2AB5AEAAF4BEFF5E0AE3E71CD174DB5BE2933D6868F31A33C75E0E0AF8691
2,379,092 UART: [art] SIG.S = AC44DFA9DEC8AE2841A94DDAF97D97101672441D536396B9FC4B65F64C03EF55B63653F5B63DF372EE634DC9D2EFE475
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,646 ready_for_fw is high
1,362,646 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,730 >>> mbox cmd response: success
1,919,664 UART:
1,919,680 UART: Running Caliptra FMC ...
1,920,088 UART:
1,920,231 UART: [state] CFI Enabled
1,931,258 UART: [fht] FMC Alias Private Key: 7
2,039,411 UART: [art] Extend RT PCRs Done
2,039,839 UART: [art] Lock RT PCRs Done
2,041,275 UART: [art] Populate DV Done
2,049,344 UART: [fht] FMC Alias Private Key: 7
2,050,312 UART: [art] Derive CDI
2,050,592 UART: [art] Store in in slot 0x4
2,136,151 UART: [art] Derive Key Pair
2,136,511 UART: [art] Store priv key in slot 0x5
2,149,347 UART: [art] Derive Key Pair - Done
2,163,949 UART: [art] Signing Cert with AUTHO
2,164,429 UART: RITY.KEYID = 7
2,179,941 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,706 UART: [art] PUB.X = 42A285E04CF96AA0D19066D78B1CB55E3362A6C2955F9515164DC3480FFDE1F95D61D6022AB7CD5CF9F99AEB6FE3A60C
2,187,481 UART: [art] PUB.Y = 1AD9B5D8C612508CD1BD24F1A1A4BDC0475EB4B767C96F71897434B9E1EC6E03A098B1E1D80C5537E1C90111C98D3CF4
2,194,432 UART: [art] SIG.R = 6A177235BDD770F21CE20A21514212C83E5D8B85CB58256C5DF832ACFDF48FBC47A63D16C8CA7F09218B8EAB678D867E
2,201,208 UART: [art] SIG.S = 56A0EC6B0ECB7475D82F841B55D5021CAE48481FD308762C7D8042649C88970BEC9F875F2558BC2ABEBFD78A1EAA727F
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,358 UART: [state] LifecycleState = Unprovisioned
85,013 UART: [state] DebugLocked = No
85,731 UART: [state] WD Timer not started. Device not locked for debugging
86,990 UART: [kat] SHA2-256
892,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,765 UART: [kat] ++
896,917 UART: [kat] sha1
901,221 UART: [kat] SHA2-256
903,161 UART: [kat] SHA2-384
906,000 UART: [kat] SHA2-512-ACC
907,901 UART: [kat] ECC-384
917,702 UART: [kat] HMAC-384Kdf
922,316 UART: [kat] LMS
1,170,644 UART: [kat] --
1,171,597 UART: [cold-reset] ++
1,172,051 UART: [fht] FHT @ 0x50003400
1,174,582 UART: [idev] ++
1,174,750 UART: [idev] CDI.KEYID = 6
1,175,110 UART: [idev] SUBJECT.KEYID = 7
1,175,534 UART: [idev] UDS.KEYID = 0
1,175,879 ready_for_fw is high
1,175,879 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,516 UART: [idev] Erasing UDS.KEYID = 0
1,200,959 UART: [idev] Sha1 KeyId Algorithm
1,209,385 UART: [idev] --
1,210,501 UART: [ldev] ++
1,210,669 UART: [ldev] CDI.KEYID = 6
1,211,032 UART: [ldev] SUBJECT.KEYID = 5
1,211,458 UART: [ldev] AUTHORITY.KEYID = 7
1,211,921 UART: [ldev] FE.KEYID = 1
1,217,215 UART: [ldev] Erasing FE.KEYID = 1
1,243,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,795 UART: [ldev] --
1,283,112 UART: [fwproc] Wait for Commands...
1,283,712 UART: [fwproc] Recv command 0x46574c44
1,284,440 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,993 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,297 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,196 >>> mbox cmd response: success
1,704,346 UART: [afmc] ++
1,704,514 UART: [afmc] CDI.KEYID = 6
1,704,876 UART: [afmc] SUBJECT.KEYID = 7
1,705,301 UART: [afmc] AUTHORITY.KEYID = 5
1,740,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,677 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,405 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,290 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,689 UART: [afmc] --
1,783,627 UART: [cold-reset] --
1,784,411 UART: [state] Locking Datavault
1,785,698 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,302 UART: [state] Locking ICCM
1,786,880 UART: [exit] Launching FMC @ 0x40000130
1,792,209 UART:
1,792,225 UART: Running Caliptra FMC ...
1,792,633 UART:
1,792,687 UART: [state] CFI Enabled
1,803,452 UART: [fht] FMC Alias Private Key: 7
1,911,423 UART: [art] Extend RT PCRs Done
1,911,851 UART: [art] Lock RT PCRs Done
1,913,437 UART: [art] Populate DV Done
1,921,580 UART: [fht] FMC Alias Private Key: 7
1,922,692 UART: [art] Derive CDI
1,922,972 UART: [art] Store in in slot 0x4
2,008,845 UART: [art] Derive Key Pair
2,009,205 UART: [art] Store priv key in slot 0x5
2,022,877 UART: [art] Derive Key Pair - Done
2,037,708 UART: [art] Signing Cert with AUTHO
2,038,188 UART: RITY.KEYID = 7
2,053,162 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,927 UART: [art] PUB.X = 8DF05C903E3ABB2BC25F3C3BBD514E49FF1B509FB12CD84126FC250542E46930B48AD8D52EC6497FAAF5D352FB541D27
2,060,710 UART: [art] PUB.Y = 012601AA5B2EE1CA82EF7BC32897D164EA6A765A01F4AC508895A687B12B2B088639B4DED6D62279CE410D0F65EC2FAA
2,067,654 UART: [art] SIG.R = 2A88C1E081E928F5FB1F4D5D538B39B3B302C56E840F58F7E15B30A2B7225154501FB58EF5E5C42E04B25171903D4723
2,074,413 UART: [art] SIG.S = C2EA3FED53C940A311E233D63049CFB1B1DD04E4CCC2C58CC4DF252D892E8D9355FE636BF9974CF05E7DEB30F9C538C6
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,855 ready_for_fw is high
1,059,855 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,553,389 >>> mbox cmd response: success
1,614,485 UART:
1,614,501 UART: Running Caliptra FMC ...
1,614,909 UART:
1,614,963 UART: [state] CFI Enabled
1,625,242 UART: [fht] FMC Alias Private Key: 7
1,733,471 UART: [art] Extend RT PCRs Done
1,733,899 UART: [art] Lock RT PCRs Done
1,735,421 UART: [art] Populate DV Done
1,743,510 UART: [fht] FMC Alias Private Key: 7
1,744,512 UART: [art] Derive CDI
1,744,792 UART: [art] Store in in slot 0x4
1,829,999 UART: [art] Derive Key Pair
1,830,359 UART: [art] Store priv key in slot 0x5
1,843,095 UART: [art] Derive Key Pair - Done
1,857,821 UART: [art] Signing Cert with AUTHO
1,858,301 UART: RITY.KEYID = 7
1,873,537 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,302 UART: [art] PUB.X = ADAB854777F9CA515278D43162CB92675379931528BF4A94DC33B870C67C9CAA01108FA7706BC7005F9F8C35D0B8564C
1,881,047 UART: [art] PUB.Y = 2AD7C66D7A4E37DC66A0D910279D94F0EB040A51AD8BAE51AA1A52ECEC977A67A18F208B7C610D6B861EE8F14CA6EB3B
1,888,010 UART: [art] SIG.R = 7D0E8C3C0890842CE23BE37B55B8F4DE0DE720824A8869358D82B96B96F27F0B0C0290CEC12808678233BED8EDFBD89A
1,894,767 UART: [art] SIG.S = E7C1D7F026DD0AAA6D3C6CE7C1E4EC309105097F8FBF86C7834A7468C7544F498DBB2076C0B99A1AD3E066007E981995
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
87,134 UART: [state] WD Timer not started. Device not locked for debugging
88,399 UART: [kat] SHA2-256
894,049 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,174 UART: [kat] ++
898,326 UART: [kat] sha1
902,494 UART: [kat] SHA2-256
904,434 UART: [kat] SHA2-384
907,281 UART: [kat] SHA2-512-ACC
909,182 UART: [kat] ECC-384
919,453 UART: [kat] HMAC-384Kdf
924,197 UART: [kat] LMS
1,172,525 UART: [kat] --
1,173,536 UART: [cold-reset] ++
1,174,022 UART: [fht] FHT @ 0x50003400
1,176,655 UART: [idev] ++
1,176,823 UART: [idev] CDI.KEYID = 6
1,177,183 UART: [idev] SUBJECT.KEYID = 7
1,177,607 UART: [idev] UDS.KEYID = 0
1,177,952 ready_for_fw is high
1,177,952 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,185,579 UART: [idev] Erasing UDS.KEYID = 0
1,202,330 UART: [idev] Sha1 KeyId Algorithm
1,210,632 UART: [idev] --
1,211,724 UART: [ldev] ++
1,211,892 UART: [ldev] CDI.KEYID = 6
1,212,255 UART: [ldev] SUBJECT.KEYID = 5
1,212,681 UART: [ldev] AUTHORITY.KEYID = 7
1,213,144 UART: [ldev] FE.KEYID = 1
1,218,348 UART: [ldev] Erasing FE.KEYID = 1
1,245,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,380 UART: [ldev] --
1,284,789 UART: [fwproc] Wait for Commands...
1,285,587 UART: [fwproc] Recv command 0x46574c44
1,286,315 UART: [fwproc] Recv'd Img size: 31656 bytes
1,637,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,665,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,694,424 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,706,177 >>> mbox cmd response: success
1,707,291 UART: [afmc] ++
1,707,459 UART: [afmc] CDI.KEYID = 6
1,707,821 UART: [afmc] SUBJECT.KEYID = 7
1,708,246 UART: [afmc] AUTHORITY.KEYID = 5
1,743,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,760,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,761,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,766,902 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,772,787 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,778,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,786,116 UART: [afmc] --
1,787,008 UART: [cold-reset] --
1,787,912 UART: [state] Locking Datavault
1,789,011 UART: [state] Locking PCR0, PCR1 and PCR31
1,789,615 UART: [state] Locking ICCM
1,790,289 UART: [exit] Launching FMC @ 0x40000130
1,795,618 UART:
1,795,634 UART: Running Caliptra FMC ...
1,796,042 UART:
1,796,185 UART: [state] CFI Enabled
1,806,818 UART: [fht] FMC Alias Private Key: 7
1,914,637 UART: [art] Extend RT PCRs Done
1,915,065 UART: [art] Lock RT PCRs Done
1,916,389 UART: [art] Populate DV Done
1,924,468 UART: [fht] FMC Alias Private Key: 7
1,925,570 UART: [art] Derive CDI
1,925,850 UART: [art] Store in in slot 0x4
2,011,695 UART: [art] Derive Key Pair
2,012,055 UART: [art] Store priv key in slot 0x5
2,024,929 UART: [art] Derive Key Pair - Done
2,039,603 UART: [art] Signing Cert with AUTHO
2,040,083 UART: RITY.KEYID = 7
2,055,649 UART: [art] Erasing AUTHORITY.KEYID = 7
2,056,414 UART: [art] PUB.X = 1981B08AE79E106E9B94B0AAF53661A8EF144B9ECA7EACDF37CF899EA104D3B90D71D5921FA30A126A1CC9CEA88E615E
2,063,195 UART: [art] PUB.Y = 53E65E92192F205E5EC67854F48E6EFAC94744E0E8F49C289B9CB7911C0F7C5A3C185F128DF073D43FA866889E06CC19
2,070,143 UART: [art] SIG.R = B5BCA47D4D3C27B17C87CBA094039B2BAAFE614BDD61F5D92119ADE79AB5E80A303599B217BE806FA9B7153A6FD828A6
2,076,925 UART: [art] SIG.S = DA670F9E60F0923CC4818EFE4E669DE3571D523A6B7D739B33B699542AC9859061F00DB5EE680521D2F2025C369DEB6E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,458 ready_for_fw is high
1,060,458 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,553,690 >>> mbox cmd response: success
1,615,844 UART:
1,615,860 UART: Running Caliptra FMC ...
1,616,268 UART:
1,616,411 UART: [state] CFI Enabled
1,626,858 UART: [fht] FMC Alias Private Key: 7
1,734,279 UART: [art] Extend RT PCRs Done
1,734,707 UART: [art] Lock RT PCRs Done
1,736,323 UART: [art] Populate DV Done
1,744,546 UART: [fht] FMC Alias Private Key: 7
1,745,562 UART: [art] Derive CDI
1,745,842 UART: [art] Store in in slot 0x4
1,831,621 UART: [art] Derive Key Pair
1,831,981 UART: [art] Store priv key in slot 0x5
1,845,439 UART: [art] Derive Key Pair - Done
1,860,294 UART: [art] Signing Cert with AUTHO
1,860,774 UART: RITY.KEYID = 7
1,875,962 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,727 UART: [art] PUB.X = C146301E664609C7D5B8C8563D4B40FECD86CE3FE5520ADD636E82E4F1ACC59BD70062115AA196FBAD68DCB9A385848D
1,883,483 UART: [art] PUB.Y = D99B83904C74A7DBA12FDC7FE644E757C806081E91ED1CCEE9C70A4D87667E9DFA5FBCA7BDAB472794C33BBF00E9B0CD
1,890,428 UART: [art] SIG.R = BB3E366910B38C68581FEAA7C8C929DFB488D4F65F24D63CFACD0A4F620FBFDCC2C8F1559F24F280FBE4A277B9245F46
1,897,212 UART: [art] SIG.S = B186980B5FC976C7E76DC77C6959A53A877B094124BFB4B18E492777F38D1534237FE312F7DC34696D800C2636B23571
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
1,169,108 UART: [kat] --
1,169,881 UART: [cold-reset] ++
1,170,239 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,174,201 ready_for_fw is high
1,174,201 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,363 UART: [idev] Erasing UDS.KEYID = 0
1,198,181 UART: [idev] Sha1 KeyId Algorithm
1,206,989 UART: [idev] --
1,207,950 UART: [ldev] ++
1,208,118 UART: [ldev] CDI.KEYID = 6
1,208,482 UART: [ldev] SUBJECT.KEYID = 5
1,208,909 UART: [ldev] AUTHORITY.KEYID = 7
1,209,372 UART: [ldev] FE.KEYID = 1
1,214,578 UART: [ldev] Erasing FE.KEYID = 1
1,241,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,980 UART: [ldev] --
1,280,256 UART: [fwproc] Wait for Commands...
1,280,855 UART: [fwproc] Recv command 0x46574c44
1,281,588 UART: [fwproc] Recv'd Img size: 31656 bytes
1,631,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,688,566 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,700,456 >>> mbox cmd response: success
1,701,665 UART: [afmc] ++
1,701,833 UART: [afmc] CDI.KEYID = 6
1,702,196 UART: [afmc] SUBJECT.KEYID = 7
1,702,622 UART: [afmc] AUTHORITY.KEYID = 5
1,737,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,754,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,760,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,766,396 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,115 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,779,908 UART: [afmc] --
1,780,884 UART: [cold-reset] --
1,781,566 UART: [state] Locking Datavault
1,782,781 UART: [state] Locking PCR0, PCR1 and PCR31
1,783,385 UART: [state] Locking ICCM
1,783,813 UART: [exit] Launching FMC @ 0x40000130
1,789,142 UART:
1,789,158 UART: Running Caliptra FMC ...
1,789,566 UART:
1,789,620 UART: [state] CFI Enabled
1,800,079 UART: [fht] FMC Alias Private Key: 7
1,907,904 UART: [art] Extend RT PCRs Done
1,908,332 UART: [art] Lock RT PCRs Done
1,909,732 UART: [art] Populate DV Done
1,917,901 UART: [fht] FMC Alias Private Key: 7
1,919,035 UART: [art] Derive CDI
1,919,315 UART: [art] Store in in slot 0x4
2,004,942 UART: [art] Derive Key Pair
2,005,302 UART: [art] Store priv key in slot 0x5
2,018,054 UART: [art] Derive Key Pair - Done
2,032,903 UART: [art] Signing Cert with AUTHO
2,033,383 UART: RITY.KEYID = 7
2,048,673 UART: [art] Erasing AUTHORITY.KEYID = 7
2,049,438 UART: [art] PUB.X = 0FB1754366AF5355644F32F6E5D0B703D20BE0691CF31AE47EF37BDEB53E2CB7ECB38B45363E812A1FE2B55EF3AADDA0
2,056,219 UART: [art] PUB.Y = 262C336C1EFD3EFCE9A0F395759D64A4185F0DE0B1C81D154160BC80DB2ED79B10BCB494CF7CF6671814BC47D6C7BD25
2,063,182 UART: [art] SIG.R = BFF291055F186D040FFEDEAA4DA8E80BED2B1FF38A91B91C67B1EF39113A978AE03FE16552C75B476AB50FD49CBEA698
2,069,959 UART: [art] SIG.S = A370B6613E04D167C144C0070E3EFF0BBC78511A0824B77F1040D58EA97659F15D924BE1AF77191985AF85EE094764A6
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,448 ready_for_fw is high
1,056,448 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,114 >>> mbox cmd response: success
1,614,002 UART:
1,614,018 UART: Running Caliptra FMC ...
1,614,426 UART:
1,614,480 UART: [state] CFI Enabled
1,624,779 UART: [fht] FMC Alias Private Key: 7
1,732,342 UART: [art] Extend RT PCRs Done
1,732,770 UART: [art] Lock RT PCRs Done
1,734,434 UART: [art] Populate DV Done
1,742,521 UART: [fht] FMC Alias Private Key: 7
1,743,677 UART: [art] Derive CDI
1,743,957 UART: [art] Store in in slot 0x4
1,829,000 UART: [art] Derive Key Pair
1,829,360 UART: [art] Store priv key in slot 0x5
1,842,780 UART: [art] Derive Key Pair - Done
1,857,705 UART: [art] Signing Cert with AUTHO
1,858,185 UART: RITY.KEYID = 7
1,873,297 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,062 UART: [art] PUB.X = 4F607F942FACE69147A620F502D000AC43F1548C7876E720CDBE644D96DB132EB9BD98C103FCC149D076EF161BBBFFF6
1,880,818 UART: [art] PUB.Y = 410B4E076B9E7228C5B38C3E2AD18AE9517671B6DFC2CC96BA63820656E1057722C977A1D89DCC8A7CD2C7917C91EA63
1,887,762 UART: [art] SIG.R = BD93117F5C567DA69DB5ED0850E4D9EDC4D3F41B44F9E956DE99DBFF9621AA91AF411E108C061F60C1B261091425BAAC
1,894,539 UART: [art] SIG.S = 926C489ACAF7E5FDE9E69F68D5D58F02748DE869503950369BCDCFC511B2DFFA68D0F22FF212856529269D39C968C772
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,169,766 UART: [cold-reset] ++
1,170,168 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,174,170 ready_for_fw is high
1,174,170 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,862 UART: [idev] Erasing UDS.KEYID = 0
1,199,606 UART: [idev] Sha1 KeyId Algorithm
1,208,436 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,897 UART: [ldev] SUBJECT.KEYID = 5
1,210,324 UART: [ldev] AUTHORITY.KEYID = 7
1,210,787 UART: [ldev] FE.KEYID = 1
1,215,743 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,125 UART: [ldev] --
1,281,583 UART: [fwproc] Wait for Commands...
1,282,200 UART: [fwproc] Recv command 0x46574c44
1,282,933 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,585 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,447 >>> mbox cmd response: success
1,702,702 UART: [afmc] ++
1,702,870 UART: [afmc] CDI.KEYID = 6
1,703,233 UART: [afmc] SUBJECT.KEYID = 7
1,703,659 UART: [afmc] AUTHORITY.KEYID = 5
1,739,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,533 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,262 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,145 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,864 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,775 UART: [afmc] --
1,782,833 UART: [cold-reset] --
1,783,717 UART: [state] Locking Datavault
1,784,812 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,416 UART: [state] Locking ICCM
1,785,972 UART: [exit] Launching FMC @ 0x40000130
1,791,301 UART:
1,791,317 UART: Running Caliptra FMC ...
1,791,725 UART:
1,791,868 UART: [state] CFI Enabled
1,802,463 UART: [fht] FMC Alias Private Key: 7
1,910,300 UART: [art] Extend RT PCRs Done
1,910,728 UART: [art] Lock RT PCRs Done
1,912,128 UART: [art] Populate DV Done
1,920,309 UART: [fht] FMC Alias Private Key: 7
1,921,463 UART: [art] Derive CDI
1,921,743 UART: [art] Store in in slot 0x4
2,007,632 UART: [art] Derive Key Pair
2,007,992 UART: [art] Store priv key in slot 0x5
2,021,596 UART: [art] Derive Key Pair - Done
2,036,918 UART: [art] Signing Cert with AUTHO
2,037,398 UART: RITY.KEYID = 7
2,052,590 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,355 UART: [art] PUB.X = C3033C1FC13ECC01DBDB67573A1AE68A6CEFC91F5432CC23447708FB8CC38A4D79219847D5354DB7850A7B0143A8C042
2,060,118 UART: [art] PUB.Y = 29B8F0ABFAC04F2BBDF63023018A09B268B33D23DBCFA7A3BA4C8A9D66E6EA144271E4605066B8B057720546764A2362
2,067,065 UART: [art] SIG.R = BD070FDAC4247DC6882C1C9E490DA530D979EFD2196CD6933D919511084D46C31027B79BF7325031B88209FE5033A4F0
2,073,818 UART: [art] SIG.S = 4B3F864941350FB73DB0E60221D1D685DC9C75F2797F1A5C0360428C55CF2BAE747B95D4539BC3F9E8D9DBCB127B4F78
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,677 ready_for_fw is high
1,055,677 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,550,171 >>> mbox cmd response: success
1,612,637 UART:
1,612,653 UART: Running Caliptra FMC ...
1,613,061 UART:
1,613,204 UART: [state] CFI Enabled
1,623,843 UART: [fht] FMC Alias Private Key: 7
1,731,632 UART: [art] Extend RT PCRs Done
1,732,060 UART: [art] Lock RT PCRs Done
1,733,078 UART: [art] Populate DV Done
1,741,359 UART: [fht] FMC Alias Private Key: 7
1,742,481 UART: [art] Derive CDI
1,742,761 UART: [art] Store in in slot 0x4
1,828,018 UART: [art] Derive Key Pair
1,828,378 UART: [art] Store priv key in slot 0x5
1,841,708 UART: [art] Derive Key Pair - Done
1,856,294 UART: [art] Signing Cert with AUTHO
1,856,774 UART: RITY.KEYID = 7
1,871,868 UART: [art] Erasing AUTHORITY.KEYID = 7
1,872,633 UART: [art] PUB.X = A2C18E6F635750336B9EC4C0DEBE9EC9D7108E0A6B53CAC095DD34E9FDB68A699EF541738371A5CE9B63630AC9D97BD5
1,879,413 UART: [art] PUB.Y = 4E9262C204A4568F01A54C157F8932F84EC8363420993F39F70418DC9CE282AE0F559126D3D03F58537224CEC7622D59
1,886,341 UART: [art] SIG.R = B5E29C04A095901BE1C17DFD56C4067EC3864C2E5AE35FFE906A3FC0416CC812846C1EBA7723B5F32684E6A8E408CA4D
1,893,114 UART: [art] SIG.S = 69CDAE0D116D288C02748551FFE3406DFB59079C9817D6E6CCE118FF5B314EB8D5A0AEE19B85D8CE83F8F099A778E86B
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,114 UART:
192,474 UART: Running Caliptra ROM ...
193,674 UART:
193,825 UART: [state] CFI Enabled
263,919 UART: [state] LifecycleState = Unprovisioned
265,862 UART: [state] DebugLocked = No
268,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,310 UART: [kat] SHA2-256
444,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,483 UART: [kat] ++
454,972 UART: [kat] sha1
465,860 UART: [kat] SHA2-256
468,516 UART: [kat] SHA2-384
473,588 UART: [kat] SHA2-512-ACC
475,953 UART: [kat] ECC-384
2,768,083 UART: [kat] HMAC-384Kdf
2,799,233 UART: [kat] LMS
3,989,578 UART: [kat] --
3,993,709 UART: [cold-reset] ++
3,995,421 UART: [fht] Storing FHT @ 0x50003400
4,006,824 UART: [idev] ++
4,007,474 UART: [idev] CDI.KEYID = 6
4,008,391 UART: [idev] SUBJECT.KEYID = 7
4,009,637 UART: [idev] UDS.KEYID = 0
4,010,696 ready_for_fw is high
4,010,894 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,105,922 UART: [idev] Erasing UDS.KEYID = 0
7,345,250 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,530 UART: [idev] --
7,371,547 UART: [ldev] ++
7,372,109 UART: [ldev] CDI.KEYID = 6
7,373,071 UART: [ldev] SUBJECT.KEYID = 5
7,374,280 UART: [ldev] AUTHORITY.KEYID = 7
7,375,561 UART: [ldev] FE.KEYID = 1
7,420,125 UART: [ldev] Erasing FE.KEYID = 1
10,752,607 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,841 UART: [ldev] --
13,113,725 UART: [fwproc] Waiting for Commands...
13,115,497 UART: [fwproc] Received command 0x46574c44
13,117,676 UART: [fwproc] Received Image of size 75428 bytes
16,688,721 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,764,079 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,832,987 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,014,121 >>> mbox cmd response: success
17,014,546 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,018,136 UART: [afmc] ++
17,018,750 UART: [afmc] CDI.KEYID = 6
17,019,634 UART: [afmc] SUBJECT.KEYID = 7
17,020,911 UART: [afmc] AUTHORITY.KEYID = 5
20,381,089 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,685,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,687,357 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,701,747 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,716,588 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,730,987 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,751,439 UART: [afmc] --
22,755,616 UART: [cold-reset] --
22,759,253 UART: [state] Locking Datavault
22,764,490 UART: [state] Locking PCR0, PCR1 and PCR31
22,766,236 UART: [state] Locking ICCM
22,767,810 UART: [exit] Launching FMC @ 0x40000130
22,776,191 UART:
22,776,416 UART: Running Caliptra FMC ...
22,777,634 UART:
22,777,823 UART: [state] CFI Enabled
22,843,272 UART: [fht] FMC Alias Private Key: 7
25,180,889 UART: [art] Extend RT PCRs Done
25,182,108 UART: [art] Lock RT PCRs Done
25,183,699 UART: [art] Populate DV Done
25,189,157 UART: [fht] FMC Alias Private Key: 7
25,190,805 UART: [art] Derive CDI
25,191,533 UART: [art] Store in in slot 0x4
25,251,993 UART: [art] Derive Key Pair
25,252,989 UART: [art] Store priv key in slot 0x5
28,545,931 UART: [art] Derive Key Pair - Done
28,558,783 UART: [art] Signing Cert with AUTHO
28,560,079 UART: RITY.KEYID = 7
30,847,780 UART: [art] Erasing AUTHORITY.KEYID = 7
30,849,290 UART: [art] PUB.X = 8C1CE6225347A1AA10CACD2D465CAC39D4A9EB85F7DB2C264B34364238CA2848EDD5BBD171ABDA6F9C94DCB058F417BF
30,856,537 UART: [art] PUB.Y = B46A40A38915B04E5DD85691615FEB0871E5854389635F793F671DDF8DD6624FCE5865514D7BE795A94E6E5AF4C2DFE3
30,863,789 UART: [art] SIG.R = 767ED23EBBAD1AE2D391265ED4FA19056CF9F3EDA51043F2C2E8F41847633395FE2DFE462544FC687AD3F2B9E6A1BB93
30,871,215 UART: [art] SIG.S = DC8EA9B3ED9AF4706FC76432DAC8667EA5DB4A019A76EA954D9742A713D1FA9EABA22EE64A9FACD1E071730DAAF72FB8
32,176,072 UART: mock_rt_interact::rt_entry...FMC Tester
32,292,953 UART: [rt] Runtime listening for mailbox commands...
32,297,236 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,803,978 ready_for_fw is high
3,804,370 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,083,644 >>> mbox cmd response: success
17,084,564 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,778,385 UART:
22,778,764 UART: Running Caliptra FMC ...
22,780,039 UART:
22,780,208 UART: [state] CFI Enabled
22,846,414 UART: [fht] FMC Alias Private Key: 7
25,185,017 UART: [art] Extend RT PCRs Done
25,186,261 UART: [art] Lock RT PCRs Done
25,187,674 UART: [art] Populate DV Done
25,193,268 UART: [fht] FMC Alias Private Key: 7
25,194,871 UART: [art] Derive CDI
25,195,685 UART: [art] Store in in slot 0x4
25,254,934 UART: [art] Derive Key Pair
25,255,974 UART: [art] Store priv key in slot 0x5
28,549,374 UART: [art] Derive Key Pair - Done
28,562,431 UART: [art] Signing Cert with AUTHO
28,563,727 UART: RITY.KEYID = 7
30,851,226 UART: [art] Erasing AUTHORITY.KEYID = 7
30,852,734 UART: [art] PUB.X = 220655B7A6199DB7086FD59EE6EA26960FF4E8A8BFB93C4ACDFCD7C985DA49B9BDDE32A30F222B6BAD0506E0094F8E5C
30,859,999 UART: [art] PUB.Y = A5D2F215F17B748AF55FB764FBD357C74D9E7D322B39D30FAAA047DC53EC3906EBAADD2EAB01A8F6326FCE727FDEFA06
30,867,266 UART: [art] SIG.R = EF6102B9C1ED35A4B078E4EC3E5B0738781DCA6A15ADBA80113BCD912ABA0D3D7AFAB73168BF2F2ABA297640CE508A72
30,874,669 UART: [art] SIG.S = AFBCC39A4B7301DA2440C100A0CE817FD1B649172D359DB7EB3972D3CDD5EF304DCEB06C8428CC57DA0786E001EE2B14
32,179,427 UART: mock_rt_interact::rt_entry...FMC Tester
32,296,426 UART: [rt] Runtime listening for mailbox commands...
32,300,666 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,444 UART:
192,809 UART: Running Caliptra ROM ...
193,935 UART:
603,451 UART: [state] CFI Enabled
617,175 UART: [state] LifecycleState = Unprovisioned
619,122 UART: [state] DebugLocked = No
620,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,077 UART: [kat] SHA2-256
794,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,336 UART: [kat] ++
805,812 UART: [kat] sha1
817,113 UART: [kat] SHA2-256
819,763 UART: [kat] SHA2-384
825,062 UART: [kat] SHA2-512-ACC
827,445 UART: [kat] ECC-384
3,112,547 UART: [kat] HMAC-384Kdf
3,123,358 UART: [kat] LMS
4,313,515 UART: [kat] --
4,317,998 UART: [cold-reset] ++
4,319,305 UART: [fht] Storing FHT @ 0x50003400
4,330,925 UART: [idev] ++
4,331,611 UART: [idev] CDI.KEYID = 6
4,332,530 UART: [idev] SUBJECT.KEYID = 7
4,333,700 UART: [idev] UDS.KEYID = 0
4,334,847 ready_for_fw is high
4,335,073 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,430,073 UART: [idev] Erasing UDS.KEYID = 0
7,622,616 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,220 UART: [idev] --
7,649,586 UART: [ldev] ++
7,650,157 UART: [ldev] CDI.KEYID = 6
7,651,174 UART: [ldev] SUBJECT.KEYID = 5
7,652,329 UART: [ldev] AUTHORITY.KEYID = 7
7,653,607 UART: [ldev] FE.KEYID = 1
7,664,404 UART: [ldev] Erasing FE.KEYID = 1
10,950,045 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,140 UART: [ldev] --
13,312,429 UART: [fwproc] Waiting for Commands...
13,314,356 UART: [fwproc] Received command 0x46574c44
13,316,533 UART: [fwproc] Received Image of size 75428 bytes
16,891,027 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,969,331 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,038,245 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,220,194 >>> mbox cmd response: success
17,220,621 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,224,083 UART: [afmc] ++
17,224,724 UART: [afmc] CDI.KEYID = 6
17,225,599 UART: [afmc] SUBJECT.KEYID = 7
17,226,861 UART: [afmc] AUTHORITY.KEYID = 5
20,544,011 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,839,155 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,841,414 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,855,802 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,870,646 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,885,099 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,907,600 UART: [afmc] --
22,910,882 UART: [cold-reset] --
22,913,949 UART: [state] Locking Datavault
22,918,497 UART: [state] Locking PCR0, PCR1 and PCR31
22,920,197 UART: [state] Locking ICCM
22,922,636 UART: [exit] Launching FMC @ 0x40000130
22,931,025 UART:
22,931,267 UART: Running Caliptra FMC ...
22,932,303 UART:
22,932,451 UART: [state] CFI Enabled
22,940,930 UART: [fht] FMC Alias Private Key: 7
25,271,711 UART: [art] Extend RT PCRs Done
25,272,945 UART: [art] Lock RT PCRs Done
25,274,541 UART: [art] Populate DV Done
25,280,109 UART: [fht] FMC Alias Private Key: 7
25,281,751 UART: [art] Derive CDI
25,282,480 UART: [art] Store in in slot 0x4
25,324,911 UART: [art] Derive Key Pair
25,325,969 UART: [art] Store priv key in slot 0x5
28,568,216 UART: [art] Derive Key Pair - Done
28,581,540 UART: [art] Signing Cert with AUTHO
28,582,832 UART: RITY.KEYID = 7
30,861,992 UART: [art] Erasing AUTHORITY.KEYID = 7
30,863,505 UART: [art] PUB.X = 153A6D6A6B9ACD93F8303F82B65FECDCEE1DE247E91A2CB9D921B4E2B51D327032473D4D46FCD8828CAA257556B7D91A
30,870,772 UART: [art] PUB.Y = 1F0F46E8B46F5148AA0F1B5ED1BBC35245AA9BC21D64885F06023BFF25A3DD5D7CBFEF7E9F7F4EB3693E022EF46FE203
30,878,062 UART: [art] SIG.R = DF8A0850BF0EC3C882C9F0903F956A69045E6AC35D476D8C33E0959B791FE970D3AFCBE716A076AB40699B9A5666FED7
30,885,617 UART: [art] SIG.S = ECA105B814FBCADD913D825271C23742B3791C9442C56C423DF65E63288CD16824BF614D8221142D007694C851552939
32,190,413 UART: mock_rt_interact::rt_entry...FMC Tester
32,307,079 UART: [rt] Runtime listening for mailbox commands...
32,311,358 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,126,957 ready_for_fw is high
4,127,582 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,293,847 >>> mbox cmd response: success
17,294,376 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,931,937 UART:
22,932,323 UART: Running Caliptra FMC ...
22,933,516 UART:
22,933,670 UART: [state] CFI Enabled
22,941,717 UART: [fht] FMC Alias Private Key: 7
25,272,545 UART: [art] Extend RT PCRs Done
25,273,773 UART: [art] Lock RT PCRs Done
25,275,615 UART: [art] Populate DV Done
25,281,132 UART: [fht] FMC Alias Private Key: 7
25,282,832 UART: [art] Derive CDI
25,283,645 UART: [art] Store in in slot 0x4
25,326,221 UART: [art] Derive Key Pair
25,327,257 UART: [art] Store priv key in slot 0x5
28,568,693 UART: [art] Derive Key Pair - Done
28,581,968 UART: [art] Signing Cert with AUTHO
28,583,274 UART: RITY.KEYID = 7
30,863,127 UART: [art] Erasing AUTHORITY.KEYID = 7
30,864,633 UART: [art] PUB.X = B0825CD77A178EE900B0B43866338400F38B8B8F2DEDBA8B3A8EB6B1F909DF1442B217A47EF8FAAD51287A1B9C5F152A
30,871,846 UART: [art] PUB.Y = 0852CE6E2B820C455B8D25B456A65391C116DCA6C6E5A5C94940DABF990EE3B0A53BB2D3E9ACC21362D208AC76C94331
30,879,094 UART: [art] SIG.R = CDFF43160CD6AAC96D721496DFD57952109FDCA94AF8527D76398A6EF64589A9A1769C85AAD42102ED863BD511A3ADB1
30,886,457 UART: [art] SIG.S = BB0D1D00965BB21CEC56F732F17C556069C940F3EDD0E90602A59351F4668AD3D4A70A97D29467B69D5A4A62A76FE7DD
32,191,045 UART: mock_rt_interact::rt_entry...FMC Tester
32,309,271 UART: [rt] Runtime listening for mailbox commands...
32,313,551 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
191,950 UART:
192,310 UART: Running Caliptra ROM ...
193,434 UART:
193,576 UART: [state] CFI Enabled
266,264 UART: [state] LifecycleState = Unprovisioned
268,312 UART: [state] DebugLocked = No
269,935 UART: [state] WD Timer not started. Device not locked for debugging
273,763 UART: [kat] SHA2-256
452,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,436 UART: [kat] ++
464,969 UART: [kat] sha1
476,131 UART: [kat] SHA2-256
479,203 UART: [kat] SHA2-384
483,977 UART: [kat] SHA2-512-ACC
486,925 UART: [kat] ECC-384
2,950,690 UART: [kat] HMAC-384Kdf
2,972,736 UART: [kat] LMS
3,502,155 UART: [kat] --
3,507,518 UART: [cold-reset] ++
3,508,955 UART: [fht] FHT @ 0x50003400
3,519,434 UART: [idev] ++
3,519,993 UART: [idev] CDI.KEYID = 6
3,520,903 UART: [idev] SUBJECT.KEYID = 7
3,522,073 UART: [idev] UDS.KEYID = 0
3,523,066 ready_for_fw is high
3,523,251 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,618,212 UART: [idev] Erasing UDS.KEYID = 0
6,027,306 UART: [idev] Sha1 KeyId Algorithm
6,050,498 UART: [idev] --
6,053,632 UART: [ldev] ++
6,054,220 UART: [ldev] CDI.KEYID = 6
6,055,102 UART: [ldev] SUBJECT.KEYID = 5
6,056,203 UART: [ldev] AUTHORITY.KEYID = 7
6,057,548 UART: [ldev] FE.KEYID = 1
6,101,332 UART: [ldev] Erasing FE.KEYID = 1
8,604,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,617 UART: [ldev] --
10,412,126 UART: [fwproc] Wait for Commands...
10,415,399 UART: [fwproc] Recv command 0x46574c44
10,417,482 UART: [fwproc] Recv'd Img size: 75384 bytes
13,346,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,417,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,486,210 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,667,090 >>> mbox cmd response: success
13,667,491 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,671,482 UART: [afmc] ++
13,672,060 UART: [afmc] CDI.KEYID = 6
13,672,967 UART: [afmc] SUBJECT.KEYID = 7
13,674,182 UART: [afmc] AUTHORITY.KEYID = 5
16,210,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,935,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,937,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,953,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,969,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,985,308 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,006,352 UART: [afmc] --
18,010,709 UART: [cold-reset] --
18,015,376 UART: [state] Locking Datavault
18,018,537 UART: [state] Locking PCR0, PCR1 and PCR31
18,020,247 UART: [state] Locking ICCM
18,021,745 UART: [exit] Launching FMC @ 0x40000130
18,030,205 UART:
18,030,482 UART: Running Caliptra FMC ...
18,031,586 UART:
18,031,743 UART: [state] CFI Enabled
18,093,199 UART: [fht] FMC Alias Private Key: 7
19,857,410 UART: [art] Extend RT PCRs Done
19,858,597 UART: [art] Lock RT PCRs Done
19,860,181 UART: [art] Populate DV Done
19,865,425 UART: [fht] FMC Alias Private Key: 7
19,866,916 UART: [art] Derive CDI
19,867,678 UART: [art] Store in in slot 0x4
19,925,483 UART: [art] Derive Key Pair
19,926,498 UART: [art] Store priv key in slot 0x5
22,389,057 UART: [art] Derive Key Pair - Done
22,401,742 UART: [art] Signing Cert with AUTHO
22,403,056 UART: RITY.KEYID = 7
24,114,354 UART: [art] Erasing AUTHORITY.KEYID = 7
24,115,858 UART: [art] PUB.X = E38BD45FEDD932504A425400D9B5782D4D6AEBB3324BB268AC22CE0EBA98EBE7A56C7DDE0C288CE6E722BCE2DD5A6D99
24,123,153 UART: [art] PUB.Y = 9CF256647598ED6DDACF178D7547F577E1FB29F12B8F9B1A87FF439FAE6C05D44CFEFBCFE15E8513CC4B718A3C1ABA82
24,130,411 UART: [art] SIG.R = 1348B7F760FFB5A3C320FF25E295139CA538E00222C8E631260F0DE318B0CF10757B28ECB8719F06DE00510B5EBE2D20
24,137,794 UART: [art] SIG.S = 69BBE1633AD195F9DE41FC4556CFE5350BBD345568BD1DE6A0C031BFBFE870210512C02732AF298B3A7BCCD934A5D3EB
25,116,493 UART: mock_rt_interact::rt_entry...FMC Tester
25,233,865 UART: [rt] Runtime listening for mailbox commands...
25,238,092 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,382,149 ready_for_fw is high
3,382,543 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,479,767 >>> mbox cmd response: success
13,480,704 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,760,453 UART:
17,760,843 UART: Running Caliptra FMC ...
17,762,061 UART:
17,762,218 UART: [state] CFI Enabled
17,827,812 UART: [fht] FMC Alias Private Key: 7
19,591,256 UART: [art] Extend RT PCRs Done
19,592,469 UART: [art] Lock RT PCRs Done
19,594,537 UART: [art] Populate DV Done
19,599,519 UART: [fht] FMC Alias Private Key: 7
19,601,012 UART: [art] Derive CDI
19,601,745 UART: [art] Store in in slot 0x4
19,660,644 UART: [art] Derive Key Pair
19,661,644 UART: [art] Store priv key in slot 0x5
22,124,890 UART: [art] Derive Key Pair - Done
22,137,958 UART: [art] Signing Cert with AUTHO
22,139,262 UART: RITY.KEYID = 7
23,850,595 UART: [art] Erasing AUTHORITY.KEYID = 7
23,852,101 UART: [art] PUB.X = 3194BA5D13129D3CA84D4FDACE78D4C578E89208D9728589F765475255DD2E71E352DB927D9A4EC26464FD886938CF41
23,859,308 UART: [art] PUB.Y = A08A6403D58262E1D48FD4C9FDFE27A8539EBFD83B539DCEE23164B6678A44F9790C27D70A518AD3763F9C2F934044CA
23,866,582 UART: [art] SIG.R = 85EBD1994041ED47792915CD7F694BB6E53B3F7BBE0DF26E1DFC87CC1AFFD76187E0FB4D5C65F242A8C8568484DF3E59
23,874,043 UART: [art] SIG.S = D77B6E37DB84EF9C27ACA3875E9292F44856389CFF66CA281A8F445614EFE4C4B56B0352DC9C2C72343B3C5FECBD234E
24,852,085 UART: mock_rt_interact::rt_entry...FMC Tester
24,968,926 UART: [rt] Runtime listening for mailbox commands...
24,973,229 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,376 UART:
192,742 UART: Running Caliptra ROM ...
193,858 UART:
603,265 UART: [state] CFI Enabled
616,126 UART: [state] LifecycleState = Unprovisioned
618,010 UART: [state] DebugLocked = No
620,470 UART: [state] WD Timer not started. Device not locked for debugging
624,702 UART: [kat] SHA2-256
803,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,372 UART: [kat] ++
815,904 UART: [kat] sha1
827,761 UART: [kat] SHA2-256
830,772 UART: [kat] SHA2-384
836,895 UART: [kat] SHA2-512-ACC
839,897 UART: [kat] ECC-384
3,279,840 UART: [kat] HMAC-384Kdf
3,292,373 UART: [kat] LMS
3,821,897 UART: [kat] --
3,826,954 UART: [cold-reset] ++
3,828,316 UART: [fht] FHT @ 0x50003400
3,839,503 UART: [idev] ++
3,840,064 UART: [idev] CDI.KEYID = 6
3,841,094 UART: [idev] SUBJECT.KEYID = 7
3,842,200 UART: [idev] UDS.KEYID = 0
3,843,187 ready_for_fw is high
3,843,380 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,938,683 UART: [idev] Erasing UDS.KEYID = 0
6,318,942 UART: [idev] Sha1 KeyId Algorithm
6,341,838 UART: [idev] --
6,345,429 UART: [ldev] ++
6,346,007 UART: [ldev] CDI.KEYID = 6
6,346,891 UART: [ldev] SUBJECT.KEYID = 5
6,348,096 UART: [ldev] AUTHORITY.KEYID = 7
6,349,380 UART: [ldev] FE.KEYID = 1
6,359,697 UART: [ldev] Erasing FE.KEYID = 1
8,831,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,266 UART: [ldev] --
10,624,417 UART: [fwproc] Wait for Commands...
10,627,528 UART: [fwproc] Recv command 0x46574c44
10,629,635 UART: [fwproc] Recv'd Img size: 75384 bytes
13,565,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,638,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,707,553 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,890,039 >>> mbox cmd response: success
13,890,446 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,894,562 UART: [afmc] ++
13,895,140 UART: [afmc] CDI.KEYID = 6
13,896,042 UART: [afmc] SUBJECT.KEYID = 7
13,897,255 UART: [afmc] AUTHORITY.KEYID = 5
16,394,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,115,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,117,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,133,174 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,149,219 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,165,070 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,187,024 UART: [afmc] --
18,190,687 UART: [cold-reset] --
18,194,390 UART: [state] Locking Datavault
18,200,444 UART: [state] Locking PCR0, PCR1 and PCR31
18,202,139 UART: [state] Locking ICCM
18,204,233 UART: [exit] Launching FMC @ 0x40000130
18,212,628 UART:
18,212,861 UART: Running Caliptra FMC ...
18,213,960 UART:
18,214,114 UART: [state] CFI Enabled
18,222,075 UART: [fht] FMC Alias Private Key: 7
19,979,015 UART: [art] Extend RT PCRs Done
19,980,249 UART: [art] Lock RT PCRs Done
19,982,150 UART: [art] Populate DV Done
19,987,720 UART: [fht] FMC Alias Private Key: 7
19,989,309 UART: [art] Derive CDI
19,990,141 UART: [art] Store in in slot 0x4
20,032,312 UART: [art] Derive Key Pair
20,033,359 UART: [art] Store priv key in slot 0x5
22,459,614 UART: [art] Derive Key Pair - Done
22,472,869 UART: [art] Signing Cert with AUTHO
22,474,182 UART: RITY.KEYID = 7
24,179,823 UART: [art] Erasing AUTHORITY.KEYID = 7
24,181,330 UART: [art] PUB.X = 73AFC8FA6BBBD2B1BF959B783CFB884CB742C669F65B07536DBFDA796E15C5E8C177E6CD563768C3CACE0AE16B0216AA
24,188,646 UART: [art] PUB.Y = 7B47E2A5529D670688FB3B6632AB3EDF0A45F6D9F6183279D378C8B648361964A6D00BB13D9888499EEF6E9AC5915D2F
24,195,923 UART: [art] SIG.R = AB68117EFA2EF4AE65369201FD6F4B4BD10C88D62D1A15E707126A3EA2DBED4EBF452C2AA24FB465FF52FBC5DB1A2ED2
24,203,365 UART: [art] SIG.S = 0080B899D9F10225E6C35FAD2E8430DE92E9DD7EE9D9A3FC02A85A5BD02C4B51C02534C7A9A12248EC5305A1165697BB
25,182,090 UART: mock_rt_interact::rt_entry...FMC Tester
25,298,569 UART: [rt] Runtime listening for mailbox commands...
25,302,811 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,692,557 ready_for_fw is high
3,692,937 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,640,033 >>> mbox cmd response: success
13,640,496 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,889,578 UART:
17,889,973 UART: Running Caliptra FMC ...
17,891,131 UART:
17,891,281 UART: [state] CFI Enabled
17,898,786 UART: [fht] FMC Alias Private Key: 7
19,656,056 UART: [art] Extend RT PCRs Done
19,657,288 UART: [art] Lock RT PCRs Done
19,658,723 UART: [art] Populate DV Done
19,664,238 UART: [fht] FMC Alias Private Key: 7
19,665,722 UART: [art] Derive CDI
19,666,451 UART: [art] Store in in slot 0x4
19,709,269 UART: [art] Derive Key Pair
19,710,313 UART: [art] Store priv key in slot 0x5
22,137,173 UART: [art] Derive Key Pair - Done
22,150,223 UART: [art] Signing Cert with AUTHO
22,151,525 UART: RITY.KEYID = 7
23,856,661 UART: [art] Erasing AUTHORITY.KEYID = 7
23,858,191 UART: [art] PUB.X = AAEBD7CD900FCA11E738E1FACF4987F3DC58297AC9BEB049EB6E07264E8E8A80ECAAECFFA323FCF359DD63823941D1A4
23,865,446 UART: [art] PUB.Y = 9FBD1B0435BB7F75993F57369AF64681C58BA3597DA6D1BF1B18903929F8EABDFF497DDA445640FD48504204C4E24045
23,872,696 UART: [art] SIG.R = 9362D41904A861F8A9D4020240F0402C430A10229DC9F73AEBEE30703F2A72DFA072C054992B0A113C70B7ECBCAAE892
23,880,095 UART: [art] SIG.S = 51068BC8B55E12ADEB4B13BEE4121097F5DE3F19DF4D5CCE64A9890F5DC0133FCC4EBD7B6142BA41418E9A70BB188ED5
24,858,067 UART: mock_rt_interact::rt_entry...FMC Tester
24,975,702 UART: [rt] Runtime listening for mailbox commands...
24,979,961 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,439,264 ready_for_fw is high
3,439,645 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,912,500 >>> mbox cmd response: success
13,912,967 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,207,959 UART:
18,208,328 UART: Running Caliptra FMC ...
18,209,585 UART:
18,209,750 UART: [state] CFI Enabled
18,274,286 UART: [fht] FMC Alias Private Key: 7
20,037,731 UART: [art] Extend RT PCRs Done
20,038,947 UART: [art] Lock RT PCRs Done
20,040,590 UART: [art] Populate DV Done
20,045,991 UART: [fht] FMC Alias Private Key: 7
20,047,638 UART: [art] Derive CDI
20,048,453 UART: [art] Store in in slot 0x4
20,107,249 UART: [art] Derive Key Pair
20,108,244 UART: [art] Store priv key in slot 0x5
22,571,344 UART: [art] Derive Key Pair - Done
22,584,349 UART: [art] Signing Cert with AUTHO
22,585,650 UART: RITY.KEYID = 7
24,297,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,299,125 UART: [art] PUB.X = 950F9E2024EA15F3AB3A2781C0FABAF3D642E24DDF90844D43FB6C014762F628F4AA0D646C02F6F7595C82EEABF3ACEC
24,306,435 UART: [art] PUB.Y = B2F93F7E4D2A8229B8D4F80E73951CDBE442576D9654404188E6C2022A02D3160893C801D5BD5AC0530A5F726BA902EC
24,313,689 UART: [art] SIG.R = 5AFD7D83CB8B94443E16697BDF656D3EEFE1634CE5E108C5F2E8DA17E00D1520DF7D85C298EBD3F84033B06013D5F705
24,321,044 UART: [art] SIG.S = 44A50DEC4FF13D9D4292A5A484353CD494F0F6DAB63091728251C1EA6B45A51A96D139A3122F5A56054887A8049D643E
25,298,761 UART: mock_rt_interact::rt_entry...FMC Tester
25,415,475 UART: [rt] Runtime listening for mailbox commands...
25,419,719 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,756,157 ready_for_fw is high
3,756,760 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
14,116,379 >>> mbox cmd response: success
14,116,942 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,369,106 UART:
18,369,513 UART: Running Caliptra FMC ...
18,370,698 UART:
18,370,848 UART: [state] CFI Enabled
18,378,737 UART: [fht] FMC Alias Private Key: 7
20,135,389 UART: [art] Extend RT PCRs Done
20,136,611 UART: [art] Lock RT PCRs Done
20,138,341 UART: [art] Populate DV Done
20,143,593 UART: [fht] FMC Alias Private Key: 7
20,145,244 UART: [art] Derive CDI
20,146,059 UART: [art] Store in in slot 0x4
20,188,232 UART: [art] Derive Key Pair
20,189,284 UART: [art] Store priv key in slot 0x5
22,616,064 UART: [art] Derive Key Pair - Done
22,629,120 UART: [art] Signing Cert with AUTHO
22,630,432 UART: RITY.KEYID = 7
24,335,907 UART: [art] Erasing AUTHORITY.KEYID = 7
24,337,413 UART: [art] PUB.X = C8F8E4EC3486D8B4B4B12898E944597F6B179DF2E9A3BE4E4F3758C9C0E518C486613061DAD4484038297D69D5540A90
24,344,674 UART: [art] PUB.Y = 9540042822338F0A98599DCD0FEC8E3CB62039B7DA4B5C72626D64438D93487C040F8D1C429072897BA88394D4A75437
24,351,944 UART: [art] SIG.R = B96169C0B38FE831637CF74CDDAEF54E38FF9A30A68178CD0A5126D7235B1B838EADAF137B451D12FB60E43BE9DD3E32
24,359,313 UART: [art] SIG.S = ED716F3368D586F4E9F6BEC00D99986AF5F475C23B7D21F7ACFFBB61AC0A980E6FB3F1D75F25C5CA1BC155A9D316A20A
25,338,402 UART: mock_rt_interact::rt_entry...FMC Tester
25,455,661 UART: [rt] Runtime listening for mailbox commands...
25,459,897 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,775 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,383 UART: [kat] SHA2-256
882,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,429 UART: [kat] ++
886,581 UART: [kat] sha1
890,995 UART: [kat] SHA2-256
892,933 UART: [kat] SHA2-384
895,788 UART: [kat] SHA2-512-ACC
897,689 UART: [kat] ECC-384
903,358 UART: [kat] HMAC-384Kdf
907,910 UART: [kat] LMS
1,476,106 UART: [kat] --
1,477,051 UART: [cold-reset] ++
1,477,585 UART: [fht] Storing FHT @ 0x50003400
1,480,384 UART: [idev] ++
1,480,552 UART: [idev] CDI.KEYID = 6
1,480,912 UART: [idev] SUBJECT.KEYID = 7
1,481,336 UART: [idev] UDS.KEYID = 0
1,481,681 ready_for_fw is high
1,481,681 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,489,408 UART: [idev] Erasing UDS.KEYID = 0
1,506,466 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,120 UART: [idev] --
1,516,289 UART: [ldev] ++
1,516,457 UART: [ldev] CDI.KEYID = 6
1,516,820 UART: [ldev] SUBJECT.KEYID = 5
1,517,246 UART: [ldev] AUTHORITY.KEYID = 7
1,517,709 UART: [ldev] FE.KEYID = 1
1,522,815 UART: [ldev] Erasing FE.KEYID = 1
1,547,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,592 UART: [ldev] --
1,587,055 UART: [fwproc] Waiting for Commands...
1,587,914 UART: [fwproc] Received command 0x46574c44
1,588,705 UART: [fwproc] Received Image of size 75384 bytes
2,441,139 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,468,837 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,498,189 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,575,650 >>> mbox cmd response: success
2,575,650 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,576,766 UART: [afmc] ++
2,576,934 UART: [afmc] CDI.KEYID = 6
2,577,296 UART: [afmc] SUBJECT.KEYID = 7
2,577,721 UART: [afmc] AUTHORITY.KEYID = 5
2,612,980 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,629,290 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,630,070 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,635,798 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,641,683 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,647,373 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,655,084 UART: [afmc] --
2,656,180 UART: [cold-reset] --
2,656,808 UART: [state] Locking Datavault
2,658,017 UART: [state] Locking PCR0, PCR1 and PCR31
2,658,621 UART: [state] Locking ICCM
2,659,117 UART: [exit] Launching FMC @ 0x40000130
2,664,446 UART:
2,664,462 UART: Running Caliptra FMC ...
2,664,870 UART:
2,664,924 UART: [state] CFI Enabled
2,675,197 UART: [fht] FMC Alias Private Key: 7
2,782,672 UART: [art] Extend RT PCRs Done
2,783,100 UART: [art] Lock RT PCRs Done
2,785,176 UART: [art] Populate DV Done
2,793,257 UART: [fht] FMC Alias Private Key: 7
2,794,219 UART: [art] Derive CDI
2,794,499 UART: [art] Store in in slot 0x4
2,880,338 UART: [art] Derive Key Pair
2,880,698 UART: [art] Store priv key in slot 0x5
2,893,292 UART: [art] Derive Key Pair - Done
2,908,185 UART: [art] Signing Cert with AUTHO
2,908,665 UART: RITY.KEYID = 7
2,923,541 UART: [art] Erasing AUTHORITY.KEYID = 7
2,924,306 UART: [art] PUB.X = 13A1807BB19A3D3FD7CC61E52BFB0F010F35455E749E919F6F1477DDE34B957818A41356B2AB0DC817996120E929E508
2,931,061 UART: [art] PUB.Y = B6B9AC3D620C23713987D12F66475B8ACC87F6C57DEF50A7E5A7AD0AE882251F147D16C6505B93602A70DF1CE375AFEF
2,938,017 UART: [art] SIG.R = 6DC919F147F7738A7ABAFF64C688A7F6B701A7533763082F1B01CED3FE017DC4A37257504505E72E116F69B91A0BD4F4
2,944,773 UART: [art] SIG.S = EB6B139ED793825B1CFF74492E26B9DF489773D5229E68AF8A43BBC00F593A00E840A5BC1C224FBCA6613988F419DDC2
2,968,223 UART: mock_rt_interact::rt_entry...FMC Tester
3,076,563 UART: [rt] Runtime listening for mailbox commands...
3,079,953 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,283 ready_for_fw is high
1,362,283 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,423,866 >>> mbox cmd response: success
2,423,866 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,485,864 UART:
2,485,880 UART: Running Caliptra FMC ...
2,486,288 UART:
2,486,342 UART: [state] CFI Enabled
2,496,799 UART: [fht] FMC Alias Private Key: 7
2,604,814 UART: [art] Extend RT PCRs Done
2,605,242 UART: [art] Lock RT PCRs Done
2,606,638 UART: [art] Populate DV Done
2,614,925 UART: [fht] FMC Alias Private Key: 7
2,615,957 UART: [art] Derive CDI
2,616,237 UART: [art] Store in in slot 0x4
2,701,956 UART: [art] Derive Key Pair
2,702,316 UART: [art] Store priv key in slot 0x5
2,715,900 UART: [art] Derive Key Pair - Done
2,730,287 UART: [art] Signing Cert with AUTHO
2,730,767 UART: RITY.KEYID = 7
2,745,751 UART: [art] Erasing AUTHORITY.KEYID = 7
2,746,516 UART: [art] PUB.X = EBD603B9B01FAAD25A24280F423AE61499B0ECF51E05E91A773B0220178BCB34367AD38A05C98502910E28EDE293F4EA
2,753,273 UART: [art] PUB.Y = 1922E99ADBDEAE1C05E126A73A94F097BAE599B379E5BAAC050517C46326BBB5339B471B549332566F75B4FF664C5640
2,760,218 UART: [art] SIG.R = 006477C3FA51B0E90DF93C1893EFD338E73083D3454F850666EC981295D2D47D163589E73CE04B63CAD5A357AEEC7F6D
2,766,964 UART: [art] SIG.S = 86A795ED7AE095CF224661A986D8489445D32A63C3616E9F9436E0D2F8B5C093959B9B9AB0C61214637293B00189B92C
2,790,074 UART: mock_rt_interact::rt_entry...FMC Tester
2,897,960 UART: [rt] Runtime listening for mailbox commands...
2,901,350 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,562 UART: [kat] SHA2-256
882,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,608 UART: [kat] ++
886,760 UART: [kat] sha1
891,058 UART: [kat] SHA2-256
892,996 UART: [kat] SHA2-384
895,915 UART: [kat] SHA2-512-ACC
897,816 UART: [kat] ECC-384
903,453 UART: [kat] HMAC-384Kdf
908,151 UART: [kat] LMS
1,476,347 UART: [kat] --
1,477,116 UART: [cold-reset] ++
1,477,560 UART: [fht] Storing FHT @ 0x50003400
1,480,515 UART: [idev] ++
1,480,683 UART: [idev] CDI.KEYID = 6
1,481,043 UART: [idev] SUBJECT.KEYID = 7
1,481,467 UART: [idev] UDS.KEYID = 0
1,481,812 ready_for_fw is high
1,481,812 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,489,483 UART: [idev] Erasing UDS.KEYID = 0
1,506,279 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,907 UART: [idev] --
1,515,894 UART: [ldev] ++
1,516,062 UART: [ldev] CDI.KEYID = 6
1,516,425 UART: [ldev] SUBJECT.KEYID = 5
1,516,851 UART: [ldev] AUTHORITY.KEYID = 7
1,517,314 UART: [ldev] FE.KEYID = 1
1,522,916 UART: [ldev] Erasing FE.KEYID = 1
1,548,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,035 UART: [ldev] --
1,587,510 UART: [fwproc] Waiting for Commands...
1,588,331 UART: [fwproc] Received command 0x46574c44
1,589,122 UART: [fwproc] Received Image of size 75384 bytes
2,441,730 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,468,970 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,498,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,575,839 >>> mbox cmd response: success
2,575,839 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,576,907 UART: [afmc] ++
2,577,075 UART: [afmc] CDI.KEYID = 6
2,577,437 UART: [afmc] SUBJECT.KEYID = 7
2,577,862 UART: [afmc] AUTHORITY.KEYID = 5
2,613,475 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,629,777 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,630,557 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,636,285 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,642,170 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,647,860 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,655,587 UART: [afmc] --
2,656,673 UART: [cold-reset] --
2,657,539 UART: [state] Locking Datavault
2,658,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,659,598 UART: [state] Locking ICCM
2,660,078 UART: [exit] Launching FMC @ 0x40000130
2,665,407 UART:
2,665,423 UART: Running Caliptra FMC ...
2,665,831 UART:
2,665,974 UART: [state] CFI Enabled
2,676,881 UART: [fht] FMC Alias Private Key: 7
2,785,234 UART: [art] Extend RT PCRs Done
2,785,662 UART: [art] Lock RT PCRs Done
2,787,346 UART: [art] Populate DV Done
2,795,731 UART: [fht] FMC Alias Private Key: 7
2,796,661 UART: [art] Derive CDI
2,796,941 UART: [art] Store in in slot 0x4
2,882,294 UART: [art] Derive Key Pair
2,882,654 UART: [art] Store priv key in slot 0x5
2,896,084 UART: [art] Derive Key Pair - Done
2,911,123 UART: [art] Signing Cert with AUTHO
2,911,603 UART: RITY.KEYID = 7
2,927,009 UART: [art] Erasing AUTHORITY.KEYID = 7
2,927,774 UART: [art] PUB.X = 8453E646D9B748B49222DB9FFE114CEDC60A0B366FAE878EB2B179067329D412EA44FFE59AEFB2A438EE5203B20A0373
2,934,536 UART: [art] PUB.Y = FC6051FF08D6C13B9D9D47A9FD49E8F07BA5FF7F177CD1D75642164A9D1F8E317E7DB8749D73975DDE79F7EC136F0E34
2,941,494 UART: [art] SIG.R = 743B2EC824178FA24B03385DC849F1FE8813090E9B614F71F2E33D0DED8D077F96D3919AD25A5DAD5D8CBBDD5C34942A
2,948,261 UART: [art] SIG.S = E68E8EAC0F14D2E9A1D2598BC43163F88CFF69644AB30A5FD23A56929ED91654DBE6BDBF1EE69B04DF99F76844DD1B49
2,972,343 UART: mock_rt_interact::rt_entry...FMC Tester
3,079,849 UART: [rt] Runtime listening for mailbox commands...
3,083,239 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,712 ready_for_fw is high
1,362,712 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,424,661 >>> mbox cmd response: success
2,424,661 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,486,743 UART:
2,486,759 UART: Running Caliptra FMC ...
2,487,167 UART:
2,487,310 UART: [state] CFI Enabled
2,498,065 UART: [fht] FMC Alias Private Key: 7
2,605,326 UART: [art] Extend RT PCRs Done
2,605,754 UART: [art] Lock RT PCRs Done
2,607,246 UART: [art] Populate DV Done
2,615,481 UART: [fht] FMC Alias Private Key: 7
2,616,421 UART: [art] Derive CDI
2,616,701 UART: [art] Store in in slot 0x4
2,702,584 UART: [art] Derive Key Pair
2,702,944 UART: [art] Store priv key in slot 0x5
2,717,100 UART: [art] Derive Key Pair - Done
2,732,271 UART: [art] Signing Cert with AUTHO
2,732,751 UART: RITY.KEYID = 7
2,747,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,748,672 UART: [art] PUB.X = 3A1B51FF285B56861FE74404538C4434BC08E2ED97D7874A78BCA7AC54055DFD05C4FD919F01A05FE835206934BDBFB9
2,755,435 UART: [art] PUB.Y = E1D032C3DB33470C25303A85FCD9FE32E799BCBA27A77950F231C5915A26E2AF02DBA28BA7A17A8E0509A2C70BF9DA06
2,762,381 UART: [art] SIG.R = 54D9D7C0E77FE627FEF04AAB276515BEEAEC30420B90EC505DCD1BC16A6B0F7E8A9346686279D372811B40F5BDD98B0B
2,769,158 UART: [art] SIG.S = 5F40E1F14FA40A1D69BA596F3F3D79774042F0B1BE24F382C06FE50A188A471ED65ECA0B86955BC0789786E164485491
2,793,260 UART: mock_rt_interact::rt_entry...FMC Tester
2,901,305 UART: [rt] Runtime listening for mailbox commands...
2,904,695 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
893,468 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,593 UART: [kat] ++
897,745 UART: [kat] sha1
902,069 UART: [kat] SHA2-256
904,009 UART: [kat] SHA2-384
906,640 UART: [kat] SHA2-512-ACC
908,541 UART: [kat] ECC-384
917,936 UART: [kat] HMAC-384Kdf
922,530 UART: [kat] LMS
1,170,858 UART: [kat] --
1,171,785 UART: [cold-reset] ++
1,172,127 UART: [fht] FHT @ 0x50003400
1,174,862 UART: [idev] ++
1,175,030 UART: [idev] CDI.KEYID = 6
1,175,390 UART: [idev] SUBJECT.KEYID = 7
1,175,814 UART: [idev] UDS.KEYID = 0
1,176,159 ready_for_fw is high
1,176,159 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,183,312 UART: [idev] Erasing UDS.KEYID = 0
1,200,649 UART: [idev] Sha1 KeyId Algorithm
1,209,175 UART: [idev] --
1,210,229 UART: [ldev] ++
1,210,397 UART: [ldev] CDI.KEYID = 6
1,210,760 UART: [ldev] SUBJECT.KEYID = 5
1,211,186 UART: [ldev] AUTHORITY.KEYID = 7
1,211,649 UART: [ldev] FE.KEYID = 1
1,217,085 UART: [ldev] Erasing FE.KEYID = 1
1,243,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,293 UART: [ldev] --
1,282,744 UART: [fwproc] Wait for Commands...
1,283,338 UART: [fwproc] Recv command 0x46574c44
1,284,066 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,161,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,190,912 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,268,235 >>> mbox cmd response: success
2,268,235 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,471 UART: [afmc] ++
2,269,639 UART: [afmc] CDI.KEYID = 6
2,270,001 UART: [afmc] SUBJECT.KEYID = 7
2,270,426 UART: [afmc] AUTHORITY.KEYID = 5
2,305,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,322,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,328,662 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,334,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,010 UART: [afmc] --
2,348,934 UART: [cold-reset] --
2,349,596 UART: [state] Locking Datavault
2,350,903 UART: [state] Locking PCR0, PCR1 and PCR31
2,351,507 UART: [state] Locking ICCM
2,352,141 UART: [exit] Launching FMC @ 0x40000130
2,357,470 UART:
2,357,486 UART: Running Caliptra FMC ...
2,357,894 UART:
2,357,948 UART: [state] CFI Enabled
2,368,641 UART: [fht] FMC Alias Private Key: 7
2,476,980 UART: [art] Extend RT PCRs Done
2,477,408 UART: [art] Lock RT PCRs Done
2,478,750 UART: [art] Populate DV Done
2,486,957 UART: [fht] FMC Alias Private Key: 7
2,488,081 UART: [art] Derive CDI
2,488,361 UART: [art] Store in in slot 0x4
2,573,950 UART: [art] Derive Key Pair
2,574,310 UART: [art] Store priv key in slot 0x5
2,587,796 UART: [art] Derive Key Pair - Done
2,602,439 UART: [art] Signing Cert with AUTHO
2,602,919 UART: RITY.KEYID = 7
2,618,221 UART: [art] Erasing AUTHORITY.KEYID = 7
2,618,986 UART: [art] PUB.X = 2BA15BF4D337E968C113529568E4681AA248120907F53F3F832AAE409405E586AB902EE438E3ED81C89CFEBF6D771737
2,625,747 UART: [art] PUB.Y = 5557FB825019D7A4906AA462238F18510774C1CC59BCE690B94EC9407CB4309A3B1D5E0B348FE152141A0B951DD0E87B
2,632,688 UART: [art] SIG.R = A7ADD89BD8DB8532298344C0E64A3FD31B27E5D43A31A015904908B68E1E1910C4B6346B1DFDA796546E3F7ACAC0938E
2,639,463 UART: [art] SIG.S = BCAEC97EBCE2880A049FAB0EC9A300A6FBC1D0C99BD1C1CD5B4301F86F7045F67C07C47BD437004234C564D4D116DE2A
2,663,195 UART: mock_rt_interact::rt_entry...FMC Tester
2,770,030 UART: [rt] Runtime listening for mailbox commands...
2,773,420 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,453 ready_for_fw is high
1,060,453 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,121,714 >>> mbox cmd response: success
2,121,714 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,183,974 UART:
2,183,990 UART: Running Caliptra FMC ...
2,184,398 UART:
2,184,452 UART: [state] CFI Enabled
2,194,915 UART: [fht] FMC Alias Private Key: 7
2,302,662 UART: [art] Extend RT PCRs Done
2,303,090 UART: [art] Lock RT PCRs Done
2,304,496 UART: [art] Populate DV Done
2,312,787 UART: [fht] FMC Alias Private Key: 7
2,313,841 UART: [art] Derive CDI
2,314,121 UART: [art] Store in in slot 0x4
2,399,468 UART: [art] Derive Key Pair
2,399,828 UART: [art] Store priv key in slot 0x5
2,413,114 UART: [art] Derive Key Pair - Done
2,427,941 UART: [art] Signing Cert with AUTHO
2,428,421 UART: RITY.KEYID = 7
2,443,483 UART: [art] Erasing AUTHORITY.KEYID = 7
2,444,248 UART: [art] PUB.X = 831AA3C9F8C8CB4FE2EDC9761F04A5452BF2D708E0CD038D02F7005BFF0391788B2F33869609A9838A54E1D8A98B3AB7
2,450,986 UART: [art] PUB.Y = F6311F734510888925F7777DEC4FD7CEABFE00877F71E067B999366A1856787CEFAE3F4A93D59817B64F96F26B09C597
2,457,911 UART: [art] SIG.R = 4802D4330622FD263288236830D87A0A1842BF71ACDADE4FF21317393A65D223522E2F4163729D7E7A0653E9C5573C2E
2,464,661 UART: [art] SIG.S = 95C6573E8700F1B9901660F9846843431B9D795AF9E264429D1D3D4AB262BB5A3B58615452762CBE4DB2619DEDE6CC30
2,488,588 UART: mock_rt_interact::rt_entry...FMC Tester
2,596,504 UART: [rt] Runtime listening for mailbox commands...
2,599,894 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,858 UART: [kat] SHA2-256
903,798 UART: [kat] SHA2-384
906,699 UART: [kat] SHA2-512-ACC
908,600 UART: [kat] ECC-384
918,685 UART: [kat] HMAC-384Kdf
923,255 UART: [kat] LMS
1,171,583 UART: [kat] --
1,172,148 UART: [cold-reset] ++
1,172,634 UART: [fht] FHT @ 0x50003400
1,175,345 UART: [idev] ++
1,175,513 UART: [idev] CDI.KEYID = 6
1,175,873 UART: [idev] SUBJECT.KEYID = 7
1,176,297 UART: [idev] UDS.KEYID = 0
1,176,642 ready_for_fw is high
1,176,642 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,184,079 UART: [idev] Erasing UDS.KEYID = 0
1,200,724 UART: [idev] Sha1 KeyId Algorithm
1,209,198 UART: [idev] --
1,210,314 UART: [ldev] ++
1,210,482 UART: [ldev] CDI.KEYID = 6
1,210,845 UART: [ldev] SUBJECT.KEYID = 5
1,211,271 UART: [ldev] AUTHORITY.KEYID = 7
1,211,734 UART: [ldev] FE.KEYID = 1
1,217,060 UART: [ldev] Erasing FE.KEYID = 1
1,244,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,014 UART: [ldev] --
1,283,325 UART: [fwproc] Wait for Commands...
1,283,957 UART: [fwproc] Recv command 0x46574c44
1,284,685 UART: [fwproc] Recv'd Img size: 75384 bytes
2,137,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,165,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,194,413 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,271,738 >>> mbox cmd response: success
2,271,738 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,272,968 UART: [afmc] ++
2,273,136 UART: [afmc] CDI.KEYID = 6
2,273,498 UART: [afmc] SUBJECT.KEYID = 7
2,273,923 UART: [afmc] AUTHORITY.KEYID = 5
2,309,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,325,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,326,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,332,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,338,014 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,343,733 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,351,433 UART: [afmc] --
2,352,337 UART: [cold-reset] --
2,353,171 UART: [state] Locking Datavault
2,354,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,354,820 UART: [state] Locking ICCM
2,355,294 UART: [exit] Launching FMC @ 0x40000130
2,360,623 UART:
2,360,639 UART: Running Caliptra FMC ...
2,361,047 UART:
2,361,190 UART: [state] CFI Enabled
2,371,985 UART: [fht] FMC Alias Private Key: 7
2,479,784 UART: [art] Extend RT PCRs Done
2,480,212 UART: [art] Lock RT PCRs Done
2,481,996 UART: [art] Populate DV Done
2,490,297 UART: [fht] FMC Alias Private Key: 7
2,491,267 UART: [art] Derive CDI
2,491,547 UART: [art] Store in in slot 0x4
2,577,286 UART: [art] Derive Key Pair
2,577,646 UART: [art] Store priv key in slot 0x5
2,591,192 UART: [art] Derive Key Pair - Done
2,605,956 UART: [art] Signing Cert with AUTHO
2,606,436 UART: RITY.KEYID = 7
2,621,268 UART: [art] Erasing AUTHORITY.KEYID = 7
2,622,033 UART: [art] PUB.X = 6EC57706D15E1865517DA5006E99CC47376E259616EB4142FE31BD50DAA61A6E45FF01B9A025C7911D0F6A8724D71426
2,628,770 UART: [art] PUB.Y = 5D12486416039378D533AE1294E07777477E18BC442E58EE3CABB76E4CFA70E9C5F64FD657FE48A3CAA0E67FFFAA1830
2,635,727 UART: [art] SIG.R = 24D060B82CCC63604293D224D84EAA05A5892735E43396269358283C04BB35DE8C83B56E5EA7D782A27238BAAD0C9173
2,642,484 UART: [art] SIG.S = 587533087173911BC32F4A2AE0C2DDEF804A5C64AF792F0F17D23D2484B033C1A60E59D1D425770C80EDF3A3D6F00501
2,666,057 UART: mock_rt_interact::rt_entry...FMC Tester
2,772,691 UART: [rt] Runtime listening for mailbox commands...
2,776,081 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,348 ready_for_fw is high
1,060,348 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,122,825 >>> mbox cmd response: success
2,122,825 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,185,577 UART:
2,185,593 UART: Running Caliptra FMC ...
2,186,001 UART:
2,186,144 UART: [state] CFI Enabled
2,196,601 UART: [fht] FMC Alias Private Key: 7
2,304,868 UART: [art] Extend RT PCRs Done
2,305,296 UART: [art] Lock RT PCRs Done
2,306,914 UART: [art] Populate DV Done
2,315,113 UART: [fht] FMC Alias Private Key: 7
2,316,087 UART: [art] Derive CDI
2,316,367 UART: [art] Store in in slot 0x4
2,401,802 UART: [art] Derive Key Pair
2,402,162 UART: [art] Store priv key in slot 0x5
2,415,362 UART: [art] Derive Key Pair - Done
2,430,167 UART: [art] Signing Cert with AUTHO
2,430,647 UART: RITY.KEYID = 7
2,446,079 UART: [art] Erasing AUTHORITY.KEYID = 7
2,446,844 UART: [art] PUB.X = BB99FE8208EB6C56F2B3E977B23439740E06D60C2F086C667B7FAA5708A311132784803D12F5507CF2ADC1EE578943A3
2,453,596 UART: [art] PUB.Y = 67EB6E13829DD334D74BC4743307530A4506B49F356C2E81C3D0EFAA546F652B6219D324B3F6ECD16B3F2E0BA0973957
2,460,536 UART: [art] SIG.R = 5FBA173DF4B4DE632E42103540BDBC36752704B958E6DA24CF1B3EDDCC271C9BBDD792425A7417E3EA2FEA3EEB643DFD
2,467,327 UART: [art] SIG.S = EBBD1383F4181BB220F539E55CB934D3FA4652FE555E4642751A32D93836C7623793F367C96E4D929DE4827F8A486667
2,491,072 UART: mock_rt_interact::rt_entry...FMC Tester
2,597,028 UART: [rt] Runtime listening for mailbox commands...
2,600,418 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,388 UART: [kat] HMAC-384Kdf
921,112 UART: [kat] LMS
1,169,424 UART: [kat] --
1,170,377 UART: [cold-reset] ++
1,170,709 UART: [fht] FHT @ 0x50003400
1,173,383 UART: [idev] ++
1,173,551 UART: [idev] CDI.KEYID = 6
1,173,912 UART: [idev] SUBJECT.KEYID = 7
1,174,337 UART: [idev] UDS.KEYID = 0
1,174,683 ready_for_fw is high
1,174,683 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,373 UART: [idev] Erasing UDS.KEYID = 0
1,198,739 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,854 UART: [ldev] ++
1,209,022 UART: [ldev] CDI.KEYID = 6
1,209,386 UART: [ldev] SUBJECT.KEYID = 5
1,209,813 UART: [ldev] AUTHORITY.KEYID = 7
1,210,276 UART: [ldev] FE.KEYID = 1
1,215,270 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,002 UART: [ldev] --
1,281,372 UART: [fwproc] Wait for Commands...
1,282,117 UART: [fwproc] Recv command 0x46574c44
1,282,850 UART: [fwproc] Recv'd Img size: 75384 bytes
2,134,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,161,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,190,987 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,268,283 >>> mbox cmd response: success
2,268,283 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,312 UART: [afmc] ++
2,269,480 UART: [afmc] CDI.KEYID = 6
2,269,843 UART: [afmc] SUBJECT.KEYID = 7
2,270,269 UART: [afmc] AUTHORITY.KEYID = 5
2,305,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,322,781 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,328,510 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,334,393 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,112 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,347,993 UART: [afmc] --
2,348,897 UART: [cold-reset] --
2,349,729 UART: [state] Locking Datavault
2,350,908 UART: [state] Locking PCR0, PCR1 and PCR31
2,351,512 UART: [state] Locking ICCM
2,351,996 UART: [exit] Launching FMC @ 0x40000130
2,357,325 UART:
2,357,341 UART: Running Caliptra FMC ...
2,357,749 UART:
2,357,803 UART: [state] CFI Enabled
2,368,226 UART: [fht] FMC Alias Private Key: 7
2,476,163 UART: [art] Extend RT PCRs Done
2,476,591 UART: [art] Lock RT PCRs Done
2,478,149 UART: [art] Populate DV Done
2,486,276 UART: [fht] FMC Alias Private Key: 7
2,487,448 UART: [art] Derive CDI
2,487,728 UART: [art] Store in in slot 0x4
2,573,529 UART: [art] Derive Key Pair
2,573,889 UART: [art] Store priv key in slot 0x5
2,587,491 UART: [art] Derive Key Pair - Done
2,602,264 UART: [art] Signing Cert with AUTHO
2,602,744 UART: RITY.KEYID = 7
2,617,908 UART: [art] Erasing AUTHORITY.KEYID = 7
2,618,673 UART: [art] PUB.X = 686B80239A65ACF4CFFC7EEEACF5AFBCE4C54AE340523E234557FF4A15D8F11269C1E25F0DFA78942AAF4E19EDF6F4BE
2,625,468 UART: [art] PUB.Y = FC9580A32D82606670CC73A9F69DA479E552E9640F4F6324F35EB99D4E85183E47AFE181A5F36C209B438D1ACC814534
2,632,415 UART: [art] SIG.R = 6A3755EC5339F729DE9A78EDD777C692D77032D5F660D279F9B0950D6EDC17E16605262882981A1208236EB374F3F48B
2,639,170 UART: [art] SIG.S = BFD8FC5C6A271D7BF0F16EBB829740EEC624C3FC9C6A51AFE9A7B6B3B929EB61F70554C4DB7A877F726A78FF540BDA36
2,662,609 UART: mock_rt_interact::rt_entry...FMC Tester
2,769,035 UART: [rt] Runtime listening for mailbox commands...
2,772,425 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,224 ready_for_fw is high
1,056,224 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,117,357 >>> mbox cmd response: success
2,117,357 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,178,575 UART:
2,178,591 UART: Running Caliptra FMC ...
2,178,999 UART:
2,179,053 UART: [state] CFI Enabled
2,189,514 UART: [fht] FMC Alias Private Key: 7
2,297,549 UART: [art] Extend RT PCRs Done
2,297,977 UART: [art] Lock RT PCRs Done
2,299,511 UART: [art] Populate DV Done
2,307,886 UART: [fht] FMC Alias Private Key: 7
2,308,998 UART: [art] Derive CDI
2,309,278 UART: [art] Store in in slot 0x4
2,394,597 UART: [art] Derive Key Pair
2,394,957 UART: [art] Store priv key in slot 0x5
2,408,045 UART: [art] Derive Key Pair - Done
2,422,845 UART: [art] Signing Cert with AUTHO
2,423,325 UART: RITY.KEYID = 7
2,438,539 UART: [art] Erasing AUTHORITY.KEYID = 7
2,439,304 UART: [art] PUB.X = 62EED7B68D3DA51F36AACE949AE7A4184B29ECDA927DE58075E76308604017B3F2F8EA364EBCB460D00DF9EEF982EC66
2,446,086 UART: [art] PUB.Y = BF4F41A631F53C536D2735A95230F12682ACDB5DF2A2319EAA11890E98E68A7596C0C56C5089F5CD217BA9A73301BA8F
2,453,036 UART: [art] SIG.R = 39E340665C6D1E09967DFB5C8E4E6019343C6E00B41AEE77847F715DB6950E715A5073FD90D5ADBBCA79951A8BEAB504
2,459,783 UART: [art] SIG.S = 16964BB0A07740D4079D4BE2835DCB840DD52B02289BA86252716135E00E695769FD450627DFBC76D5BB7CAEA7D26045
2,483,985 UART: mock_rt_interact::rt_entry...FMC Tester
2,591,995 UART: [rt] Runtime listening for mailbox commands...
2,595,385 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,611 UART: [kat] SHA2-512-ACC
906,512 UART: [kat] ECC-384
916,057 UART: [kat] HMAC-384Kdf
920,799 UART: [kat] LMS
1,169,111 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,388 UART: [fht] FHT @ 0x50003400
1,173,056 UART: [idev] ++
1,173,224 UART: [idev] CDI.KEYID = 6
1,173,585 UART: [idev] SUBJECT.KEYID = 7
1,174,010 UART: [idev] UDS.KEYID = 0
1,174,356 ready_for_fw is high
1,174,356 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,181,530 UART: [idev] Erasing UDS.KEYID = 0
1,198,792 UART: [idev] Sha1 KeyId Algorithm
1,207,622 UART: [idev] --
1,208,643 UART: [ldev] ++
1,208,811 UART: [ldev] CDI.KEYID = 6
1,209,175 UART: [ldev] SUBJECT.KEYID = 5
1,209,602 UART: [ldev] AUTHORITY.KEYID = 7
1,210,065 UART: [ldev] FE.KEYID = 1
1,215,339 UART: [ldev] Erasing FE.KEYID = 1
1,241,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,189 UART: [ldev] --
1,281,509 UART: [fwproc] Wait for Commands...
1,282,278 UART: [fwproc] Recv command 0x46574c44
1,283,011 UART: [fwproc] Recv'd Img size: 75384 bytes
2,133,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,160,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,190,270 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,267,724 >>> mbox cmd response: success
2,267,724 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,268,789 UART: [afmc] ++
2,268,957 UART: [afmc] CDI.KEYID = 6
2,269,320 UART: [afmc] SUBJECT.KEYID = 7
2,269,746 UART: [afmc] AUTHORITY.KEYID = 5
2,305,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,322,828 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,328,557 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,334,440 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,159 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,100 UART: [afmc] --
2,349,030 UART: [cold-reset] --
2,349,856 UART: [state] Locking Datavault
2,350,853 UART: [state] Locking PCR0, PCR1 and PCR31
2,351,457 UART: [state] Locking ICCM
2,352,007 UART: [exit] Launching FMC @ 0x40000130
2,357,336 UART:
2,357,352 UART: Running Caliptra FMC ...
2,357,760 UART:
2,357,903 UART: [state] CFI Enabled
2,368,126 UART: [fht] FMC Alias Private Key: 7
2,475,925 UART: [art] Extend RT PCRs Done
2,476,353 UART: [art] Lock RT PCRs Done
2,477,881 UART: [art] Populate DV Done
2,486,246 UART: [fht] FMC Alias Private Key: 7
2,487,278 UART: [art] Derive CDI
2,487,558 UART: [art] Store in in slot 0x4
2,573,167 UART: [art] Derive Key Pair
2,573,527 UART: [art] Store priv key in slot 0x5
2,587,175 UART: [art] Derive Key Pair - Done
2,602,023 UART: [art] Signing Cert with AUTHO
2,602,503 UART: RITY.KEYID = 7
2,617,739 UART: [art] Erasing AUTHORITY.KEYID = 7
2,618,504 UART: [art] PUB.X = 88E368BF13F5E46BD5A6043C52C9B16C683C31A5162CE026C2DA89ECF3F1574A9A01CDC77D4645FB1CC8415D270B48C9
2,625,275 UART: [art] PUB.Y = 2A799E41E7F79C87472E41B4584DCECAB92B820982830810791CE09EEA1520AC8EF09C4C9C366EAF31D96F0470029F52
2,632,215 UART: [art] SIG.R = 6514B3CEA92F42C6D470CE8A2A0BD53C056B82B8501A047146E21E50913525DE372A4672401311273E102C7728E4A842
2,638,966 UART: [art] SIG.S = 9DC00CF2B1B877952508EB534353DFB3CCBBD8199027B58514B76E7875A091EB26884A2D8A579141740E7ADC8484E8D9
2,662,496 UART: mock_rt_interact::rt_entry...FMC Tester
2,770,068 UART: [rt] Runtime listening for mailbox commands...
2,773,458 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,341 ready_for_fw is high
1,056,341 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,117,816 >>> mbox cmd response: success
2,117,816 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,179,612 UART:
2,179,628 UART: Running Caliptra FMC ...
2,180,036 UART:
2,180,179 UART: [state] CFI Enabled
2,191,040 UART: [fht] FMC Alias Private Key: 7
2,299,137 UART: [art] Extend RT PCRs Done
2,299,565 UART: [art] Lock RT PCRs Done
2,300,677 UART: [art] Populate DV Done
2,308,946 UART: [fht] FMC Alias Private Key: 7
2,310,116 UART: [art] Derive CDI
2,310,396 UART: [art] Store in in slot 0x4
2,396,361 UART: [art] Derive Key Pair
2,396,721 UART: [art] Store priv key in slot 0x5
2,409,955 UART: [art] Derive Key Pair - Done
2,424,549 UART: [art] Signing Cert with AUTHO
2,425,029 UART: RITY.KEYID = 7
2,440,525 UART: [art] Erasing AUTHORITY.KEYID = 7
2,441,290 UART: [art] PUB.X = E34F1B83F5C3AF03292826BE72377CEC6D3CA399BD6BE4C5932C666DB314BF8A501BF79727EC500A86437BDD9235B38B
2,448,064 UART: [art] PUB.Y = FD1EFB666660BBC068A261E86F9701975E983694C3F171A2BF3ECD957895106E3BD7FE55E3718D6C83DCCFE82A8F08D7
2,455,018 UART: [art] SIG.R = DE9CAD92561D813391596A23F641A83FDBB43D37098B37ECBD78F3E638144C7EAD3D921081DD72F4ADB326CC1CC0DF40
2,461,799 UART: [art] SIG.S = E603DE0DA553851B33712191647186145B774199A4FE6BFAD9210DC8EDCF85BF58C08A11F25F9B70B3D591896764D4B1
2,484,859 UART: mock_rt_interact::rt_entry...FMC Tester
2,592,962 UART: [rt] Runtime listening for mailbox commands...
2,596,352 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,138 UART:
192,491 UART: Running Caliptra ROM ...
193,673 UART:
193,820 UART: [state] CFI Enabled
260,848 UART: [state] LifecycleState = Unprovisioned
262,855 UART: [state] DebugLocked = No
264,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,077 UART: [kat] SHA2-256
438,825 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,279 UART: [kat] ++
449,722 UART: [kat] sha1
462,182 UART: [kat] SHA2-256
464,878 UART: [kat] SHA2-384
470,160 UART: [kat] SHA2-512-ACC
472,519 UART: [kat] ECC-384
2,768,186 UART: [kat] HMAC-384Kdf
2,798,778 UART: [kat] LMS
3,989,045 UART: [kat] --
3,993,753 UART: [cold-reset] ++
3,995,678 UART: [fht] Storing FHT @ 0x50003400
4,006,725 UART: [idev] ++
4,007,291 UART: [idev] CDI.KEYID = 6
4,008,290 UART: [idev] SUBJECT.KEYID = 7
4,009,402 UART: [idev] UDS.KEYID = 0
4,010,456 ready_for_fw is high
4,010,656 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,105,749 UART: [idev] Erasing UDS.KEYID = 0
7,346,204 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,139 UART: [idev] --
7,370,584 UART: [ldev] ++
7,371,150 UART: [ldev] CDI.KEYID = 6
7,372,129 UART: [ldev] SUBJECT.KEYID = 5
7,373,336 UART: [ldev] AUTHORITY.KEYID = 7
7,374,615 UART: [ldev] FE.KEYID = 1
7,420,509 UART: [ldev] Erasing FE.KEYID = 1
10,751,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,017 UART: [ldev] --
13,112,375 UART: [fwproc] Waiting for Commands...
13,113,982 UART: [fwproc] Received command 0x46574c44
13,116,212 UART: [fwproc] Received Image of size 75428 bytes
16,699,285 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,773,454 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,842,308 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,024,029 >>> mbox cmd response: success
17,024,469 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,028,254 UART: [afmc] ++
17,028,839 UART: [afmc] CDI.KEYID = 6
17,029,773 UART: [afmc] SUBJECT.KEYID = 7
17,031,036 UART: [afmc] AUTHORITY.KEYID = 5
20,390,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,687,483 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,689,735 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,704,161 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,718,973 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,733,382 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,754,037 UART: [afmc] --
22,757,041 UART: [cold-reset] --
22,761,600 UART: [state] Locking Datavault
22,764,786 UART: [state] Locking PCR0, PCR1 and PCR31
22,766,499 UART: [state] Locking ICCM
22,769,130 UART: [exit] Launching FMC @ 0x40000130
22,777,524 UART:
22,777,797 UART: Running Caliptra FMC ...
22,778,824 UART:
22,778,965 UART: [state] CFI Enabled
22,847,814 UART: [fht] FMC Alias Private Key: 7
25,185,741 UART: [art] Extend RT PCRs Done
25,186,966 UART: [art] Lock RT PCRs Done
25,188,719 UART: [art] Populate DV Done
25,194,228 UART: [fht] FMC Alias Private Key: 7
25,195,810 UART: [art] Derive CDI
25,196,535 UART: [art] Store in in slot 0x4
25,255,425 UART: [art] Derive Key Pair
25,256,638 UART: [art] Store priv key in slot 0x5
28,548,472 UART: [art] Derive Key Pair - Done
28,561,432 UART: [art] Signing Cert with AUTHO
28,562,729 UART: RITY.KEYID = 7
30,849,133 UART: [art] Erasing AUTHORITY.KEYID = 7
30,850,648 UART: [art] PUB.X = 33F9B2BFC36E557C5088CE272DAC733D60C17D227EAED1F03EB9095661084A0C2318BC1BB9F001450A7F72B65790BF39
30,857,927 UART: [art] PUB.Y = 63FB623E4CCF677C15350E908D8081C419B491992F59BA8B8FADCE532472B2FF7F08C450C36394D4878742960B246FEE
30,865,119 UART: [art] SIG.R = 87773E22C58F604AF6A7EAD252D4B82CAC29C1AEFE0D9193AC75ECAC87278D05BB5D79E3EBA14E89B2F7B82C7FC81AFB
30,872,524 UART: [art] SIG.S = 4CA3143F557DF2DF8D4A8931569405F90226EBB4A25C37D9614100790924C3AF4EDCD382CC5C7EDB5BD5937B72A9C47D
32,177,367 UART: mock_rt_interact::rt_entry...FMC Tester
32,294,301 UART: [rt] Runtime listening for mailbox commands...
32,298,550 >>> mbox cmd response data (2048 bytes)
32,308,274 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,309,941 >>> mbox cmd response data (336 bytes)
32,313,825 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,329,631 >>> mbox cmd response data (1536 bytes)
34,385,281 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
34,481,041 UART:
34,481,398 UART: Running Caliptra ROM ...
34,482,528 UART:
34,482,691 UART: [state] CFI Enabled
34,556,927 UART: [state] LifecycleState = Unprovisioned
34,558,859 UART: [state] DebugLocked = No
34,561,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,566,081 UART: [kat] SHA2-256
34,735,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,746,275 UART: [kat] ++
34,746,808 UART: [kat] sha1
34,757,586 UART: [kat] SHA2-256
34,760,265 UART: [kat] SHA2-384
34,765,826 UART: [kat] SHA2-512-ACC
34,768,223 UART: [kat] ECC-384
37,061,799 UART: [kat] HMAC-384Kdf
37,091,962 UART: [kat] LMS
38,282,298 UART: [kat] --
38,288,020 UART: [update-reset] ++
41,954,057 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,958,263 UART: [update-reset] Loading Runtime at address 0x40005000 len 50724
42,205,096 >>> mbox cmd response: success
42,206,409 UART: [update-reset] Copying MAN_2 To MAN_1
42,228,838 UART: [update-reset Success] --
42,233,863 UART: [state] Locking Datavault
42,237,340 UART: [state] Locking PCR0, PCR1 and PCR31
42,239,090 UART: [state] Locking ICCM
42,240,221 UART: [exit] Launching FMC @ 0x40000130
42,248,609 UART:
42,248,855 UART: Running Caliptra FMC ...
42,249,952 UART:
42,250,104 UART: [state] CFI Enabled
42,350,918 UART: [art] Extend RT PCRs Done
42,352,098 UART: [art] Lock RT PCRs Done
42,353,332 UART: [art] Populate DV Done
42,358,784 UART: [fht] FMC Alias Private Key: 7
42,360,312 UART: [art] Derive CDI
42,361,442 UART: [art] Store in in slot 0x4
42,419,807 UART: [art] Derive Key Pair
42,420,846 UART: [art] Store priv key in slot 0x5
45,713,309 UART: [art] Derive Key Pair - Done
45,726,586 UART: [art] Signing Cert with AUTHO
45,727,885 UART: RITY.KEYID = 7
48,015,759 UART: [art] Erasing AUTHORITY.KEYID = 7
48,017,267 UART: [art] PUB.X = 11A540BA90A6299B7E6FE5EE52ECEEB8367A8F6190A241C6090CC74D6A08BAB7CC93B901A7025255BAD0F22762CC4FC5
48,024,622 UART: [art] PUB.Y = AC22BA9AA512CFFF628DE1896EC2605BD05DCABD6076B4ED9949684AA263EDDC749C3F65D27C78D3FD7C38A8CE6FCA3C
48,031,837 UART: [art] SIG.R = AEC2F6F11693F71DE585AEC0C77EBF12DCDDEA428EFCD4E627B6AAE2B9991680FB49B8685BCAF70B093644C011DAC96D
48,039,254 UART: [art] SIG.S = 29C486002C898C8E602033B10494A167849C2031883E8A0474B81E8284B7990CF37873C5AD128CBD6083B46DE9EF6C58
49,342,829 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,343,862 UART: mock_rt_interact::rt_entry...FMC Tester
49,632,894 UART: [rt] Runtime listening for mailbox commands...
49,635,872 >>> mbox cmd response data (336 bytes)
49,639,674 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,655,494 >>> mbox cmd response data (1536 bytes)
49,663,092 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,663,546 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
3,787,136 ready_for_fw is high
3,788,134 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,079,761 >>> mbox cmd response: success
17,080,582 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,762,496 UART:
22,763,028 UART: Running Caliptra FMC ...
22,764,232 UART:
22,764,386 UART: [state] CFI Enabled
22,833,389 UART: [fht] FMC Alias Private Key: 7
25,171,317 UART: [art] Extend RT PCRs Done
25,172,582 UART: [art] Lock RT PCRs Done
25,174,342 UART: [art] Populate DV Done
25,179,862 UART: [fht] FMC Alias Private Key: 7
25,181,403 UART: [art] Derive CDI
25,182,167 UART: [art] Store in in slot 0x4
25,241,727 UART: [art] Derive Key Pair
25,242,771 UART: [art] Store priv key in slot 0x5
28,536,277 UART: [art] Derive Key Pair - Done
28,549,598 UART: [art] Signing Cert with AUTHO
28,550,898 UART: RITY.KEYID = 7
30,837,029 UART: [art] Erasing AUTHORITY.KEYID = 7
30,838,530 UART: [art] PUB.X = 075BF778DE90D2FEE0B538BCBCAEE1FAF02C8A2233307865C2EDE0BFFF7CADCF3374A7A2F3AE8CF7C343139CCDF35C7D
30,845,785 UART: [art] PUB.Y = 3953A8D57D85C07BF6B7F8E92EAD0ED549378F5B1E79B6DFA02F868F464BFB943FEC94AECE65E7FD0729D4E44545C245
30,853,046 UART: [art] SIG.R = 38D70E874D5F3965DDFD911066785B657431439BE86A456F314152B9A15A5DCBD7B2D2DD4767DAF79BE3BE0E2C70D9B1
30,860,479 UART: [art] SIG.S = 6D9DDA8914B5E2092DBDD7104E89AAAA98563E97ABF0198A2D0DF09BC5E85A148FFA0484BA8654F593426A89E50889C7
32,165,031 UART: mock_rt_interact::rt_entry...FMC Tester
32,282,401 UART: [rt] Runtime listening for mailbox commands...
32,286,680 >>> mbox cmd response data (2048 bytes)
32,296,380 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,298,053 >>> mbox cmd response data (336 bytes)
32,301,824 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,317,631 >>> mbox cmd response data (1536 bytes)
34,374,048 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
42,288,776 >>> mbox cmd response: success
42,323,787 UART:
42,324,078 UART: Running Caliptra FMC ...
42,325,443 UART:
42,325,605 UART: [state] CFI Enabled
42,424,984 UART: [art] Extend RT PCRs Done
42,426,164 UART: [art] Lock RT PCRs Done
42,427,853 UART: [art] Populate DV Done
42,433,212 UART: [fht] FMC Alias Private Key: 7
42,434,748 UART: [art] Derive CDI
42,435,478 UART: [art] Store in in slot 0x4
42,494,142 UART: [art] Derive Key Pair
42,495,186 UART: [art] Store priv key in slot 0x5
45,787,687 UART: [art] Derive Key Pair - Done
45,800,414 UART: [art] Signing Cert with AUTHO
45,801,708 UART: RITY.KEYID = 7
48,088,621 UART: [art] Erasing AUTHORITY.KEYID = 7
48,090,137 UART: [art] PUB.X = 09F6C6913FFAFB13E76F7D15465D557A9BAD0F04CEA146EBA7B4FF61EB34F5421AEC677034E9D50ECCCC028BF8615681
48,097,401 UART: [art] PUB.Y = 1D1FEB72A6A6F5260B9AC7A11032D79BF39139E32CA0B81166229B47138D71669BE9F8B62436B6309B8BE6FA42BA9CDA
48,104,654 UART: [art] SIG.R = B1321111E5929D0CFA9489F0DED9538B1493522F87ADC49ACA40D84FBA420E9E613E5BBCCCCCCA6A10BDD021982BC3D0
48,112,049 UART: [art] SIG.S = A5A65C2813DD28C8EA75D80C4DD23750A5E96B415B0518502EF1A4A41653EF036B97CAD371A0FAC584DBF999BB645588
49,415,745 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,416,894 UART: mock_rt_interact::rt_entry...FMC Tester
49,707,069 UART: [rt] Runtime listening for mailbox commands...
49,710,000 >>> mbox cmd response data (336 bytes)
49,713,723 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,729,540 >>> mbox cmd response data (1536 bytes)
49,737,093 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,737,528 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,404 UART:
192,773 UART: Running Caliptra ROM ...
193,902 UART:
603,648 UART: [state] CFI Enabled
617,130 UART: [state] LifecycleState = Unprovisioned
619,109 UART: [state] DebugLocked = No
621,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,761 UART: [kat] SHA2-256
796,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,015 UART: [kat] ++
807,462 UART: [kat] sha1
819,184 UART: [kat] SHA2-256
821,906 UART: [kat] SHA2-384
826,140 UART: [kat] SHA2-512-ACC
828,516 UART: [kat] ECC-384
3,112,309 UART: [kat] HMAC-384Kdf
3,123,972 UART: [kat] LMS
4,314,086 UART: [kat] --
4,316,805 UART: [cold-reset] ++
4,317,806 UART: [fht] Storing FHT @ 0x50003400
4,327,770 UART: [idev] ++
4,328,332 UART: [idev] CDI.KEYID = 6
4,329,278 UART: [idev] SUBJECT.KEYID = 7
4,330,512 UART: [idev] UDS.KEYID = 0
4,331,483 ready_for_fw is high
4,331,675 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,426,490 UART: [idev] Erasing UDS.KEYID = 0
7,616,500 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,928 UART: [idev] --
7,641,942 UART: [ldev] ++
7,642,516 UART: [ldev] CDI.KEYID = 6
7,643,478 UART: [ldev] SUBJECT.KEYID = 5
7,644,687 UART: [ldev] AUTHORITY.KEYID = 7
7,645,918 UART: [ldev] FE.KEYID = 1
7,656,785 UART: [ldev] Erasing FE.KEYID = 1
10,946,218 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,772 UART: [ldev] --
13,308,257 UART: [fwproc] Waiting for Commands...
13,310,515 UART: [fwproc] Received command 0x46574c44
13,312,695 UART: [fwproc] Received Image of size 75428 bytes
16,891,945 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,965,314 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,034,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,215,493 >>> mbox cmd response: success
17,215,882 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,219,119 UART: [afmc] ++
17,219,747 UART: [afmc] CDI.KEYID = 6
17,220,653 UART: [afmc] SUBJECT.KEYID = 7
17,221,921 UART: [afmc] AUTHORITY.KEYID = 5
20,532,563 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,827,988 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,830,290 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,844,652 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,859,477 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,873,901 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,894,130 UART: [afmc] --
22,898,586 UART: [cold-reset] --
22,902,889 UART: [state] Locking Datavault
22,908,618 UART: [state] Locking PCR0, PCR1 and PCR31
22,910,319 UART: [state] Locking ICCM
22,911,546 UART: [exit] Launching FMC @ 0x40000130
22,919,937 UART:
22,920,166 UART: Running Caliptra FMC ...
22,921,264 UART:
22,921,421 UART: [state] CFI Enabled
22,929,301 UART: [fht] FMC Alias Private Key: 7
25,260,291 UART: [art] Extend RT PCRs Done
25,261,512 UART: [art] Lock RT PCRs Done
25,263,239 UART: [art] Populate DV Done
25,268,644 UART: [fht] FMC Alias Private Key: 7
25,270,281 UART: [art] Derive CDI
25,271,090 UART: [art] Store in in slot 0x4
25,313,466 UART: [art] Derive Key Pair
25,314,485 UART: [art] Store priv key in slot 0x5
28,556,358 UART: [art] Derive Key Pair - Done
28,569,352 UART: [art] Signing Cert with AUTHO
28,570,652 UART: RITY.KEYID = 7
30,849,816 UART: [art] Erasing AUTHORITY.KEYID = 7
30,851,481 UART: [art] PUB.X = 0615985BC4A1CD3FD1B9966BD75669CFF57AC29151B85F7F464E337AC6CB96EB356E01D2C258B6D9BC22620825FCBFF2
30,858,597 UART: [art] PUB.Y = 04A199963A5EF591D6CE337A44C3DC27521138C95A9929459337829D72DEC66B741AD7FB62F9701E35FC8445FC541777
30,865,833 UART: [art] SIG.R = FB917DDF9F7F7A07445EFB1ACEA99C140671BF0CCFC6F78E61E246325529ED20F34E0F0A6C12594E9F82FBB49CA240A7
30,873,220 UART: [art] SIG.S = 0EBB49753DEDFC55B27DB679EB7D4286C91AA9536244AC28705DC44B75A61D09C28F567410643B45F4FA5EBCB79A671F
32,177,673 UART: mock_rt_interact::rt_entry...FMC Tester
32,294,981 UART: [rt] Runtime listening for mailbox commands...
32,299,278 >>> mbox cmd response data (2048 bytes)
32,308,986 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,310,656 >>> mbox cmd response data (336 bytes)
32,314,500 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,330,313 >>> mbox cmd response data (1536 bytes)
34,392,396 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
34,488,234 UART:
34,488,593 UART: Running Caliptra ROM ...
34,489,726 UART:
34,489,889 UART: [state] CFI Enabled
34,505,889 UART: [state] LifecycleState = Unprovisioned
34,507,833 UART: [state] DebugLocked = No
34,510,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,514,411 UART: [kat] SHA2-256
34,684,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,694,656 UART: [kat] ++
34,695,163 UART: [kat] sha1
34,705,903 UART: [kat] SHA2-256
34,708,592 UART: [kat] SHA2-384
34,714,900 UART: [kat] SHA2-512-ACC
34,717,300 UART: [kat] ECC-384
37,000,486 UART: [kat] HMAC-384Kdf
37,011,975 UART: [kat] LMS
38,202,068 UART: [kat] --
38,205,106 UART: [update-reset] ++
41,878,492 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,882,064 UART: [update-reset] Loading Runtime at address 0x40005000 len 50724
42,128,860 >>> mbox cmd response: success
42,129,735 UART: [update-reset] Copying MAN_2 To MAN_1
42,152,162 UART: [update-reset Success] --
42,156,623 UART: [state] Locking Datavault
42,160,577 UART: [state] Locking PCR0, PCR1 and PCR31
42,162,333 UART: [state] Locking ICCM
42,163,648 UART: [exit] Launching FMC @ 0x40000130
42,172,101 UART:
42,172,336 UART: Running Caliptra FMC ...
42,173,437 UART:
42,173,598 UART: [state] CFI Enabled
42,217,816 UART: [art] Extend RT PCRs Done
42,219,005 UART: [art] Lock RT PCRs Done
42,220,305 UART: [art] Populate DV Done
42,225,990 UART: [fht] FMC Alias Private Key: 7
42,227,641 UART: [art] Derive CDI
42,228,965 UART: [art] Store in in slot 0x4
42,270,494 UART: [art] Derive Key Pair
42,271,495 UART: [art] Store priv key in slot 0x5
45,514,154 UART: [art] Derive Key Pair - Done
45,526,946 UART: [art] Signing Cert with AUTHO
45,528,241 UART: RITY.KEYID = 7
47,807,108 UART: [art] Erasing AUTHORITY.KEYID = 7
47,808,616 UART: [art] PUB.X = EBBA06EA314577B655EC66E6F077D8B0A9E9159E84FDD84F3BB132E79832072B11D7758812EEE29587EC6E79229BE7D3
47,815,859 UART: [art] PUB.Y = 001B1C9DA5CF1D616DB528C8A42F774628EB8175894BF94DB776F79F908E6BF1C1CAAD7BA2A7BA3D5C3A0DDBD0DAE97A
47,823,135 UART: [art] SIG.R = 884762503C62C717C2AD7A818E07338BF2192DFF81D7F167315A1EF89973D8DC6B47910D266EF56FCB7C017BA490A1DB
47,830,554 UART: [art] SIG.S = E829878A8EF494A23EF031B0F91E08D2A38DC197D8DC97908320E0BFF7CB902BB3BE04D2083B88960DF3B45AC0492DFB
49,134,334 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,135,559 UART: mock_rt_interact::rt_entry...FMC Tester
49,422,604 UART: [rt] Runtime listening for mailbox commands...
49,425,543 >>> mbox cmd response data (336 bytes)
49,429,612 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,445,429 >>> mbox cmd response data (1536 bytes)
49,452,753 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,453,152 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
4,121,511 ready_for_fw is high
4,121,921 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,278,803 >>> mbox cmd response: success
17,279,458 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,920,351 UART:
22,920,806 UART: Running Caliptra FMC ...
22,921,956 UART:
22,922,113 UART: [state] CFI Enabled
22,929,938 UART: [fht] FMC Alias Private Key: 7
25,260,367 UART: [art] Extend RT PCRs Done
25,261,596 UART: [art] Lock RT PCRs Done
25,262,761 UART: [art] Populate DV Done
25,268,065 UART: [fht] FMC Alias Private Key: 7
25,269,721 UART: [art] Derive CDI
25,270,458 UART: [art] Store in in slot 0x4
25,313,000 UART: [art] Derive Key Pair
25,314,048 UART: [art] Store priv key in slot 0x5
28,556,224 UART: [art] Derive Key Pair - Done
28,569,336 UART: [art] Signing Cert with AUTHO
28,570,645 UART: RITY.KEYID = 7
30,849,604 UART: [art] Erasing AUTHORITY.KEYID = 7
30,851,120 UART: [art] PUB.X = 78D5C368453E7F0CCB79FEAAF476FD1FE5F6C1CCAB1DE1A3849A8D08EB1A427221A7AA7BF36C2752BD46FD49A0CAF47C
30,858,396 UART: [art] PUB.Y = 9187AB96B0FC2AD94A717CD0E8A1B5D360E288F1713B959F1C514A55EDE1214910724DF7346D7AD034CBECB66C6CF5CA
30,865,655 UART: [art] SIG.R = 1FCE72659849DBD893251186BF3B4294A313205F167115BE8A32B086D2EDE7525BFF0BCB59A6BD578B68825ABC66E8CB
30,873,059 UART: [art] SIG.S = 064117C499E40C8D57F167322F347421A7B9E31ADC5639C4146DE45AE055615864A3801C7C5E7EC223DE23C509974B3B
32,178,186 UART: mock_rt_interact::rt_entry...FMC Tester
32,295,850 UART: [rt] Runtime listening for mailbox commands...
32,300,093 >>> mbox cmd response data (2048 bytes)
32,309,804 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,311,482 >>> mbox cmd response data (336 bytes)
32,315,358 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,331,178 >>> mbox cmd response data (1536 bytes)
34,392,772 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
42,226,114 >>> mbox cmd response: success
42,261,049 UART:
42,261,384 UART: Running Caliptra FMC ...
42,262,431 UART:
42,262,601 UART: [state] CFI Enabled
42,307,277 UART: [art] Extend RT PCRs Done
42,308,426 UART: [art] Lock RT PCRs Done
42,309,869 UART: [art] Populate DV Done
42,315,499 UART: [fht] FMC Alias Private Key: 7
42,317,032 UART: [art] Derive CDI
42,317,764 UART: [art] Store in in slot 0x4
42,360,353 UART: [art] Derive Key Pair
42,361,411 UART: [art] Store priv key in slot 0x5
45,603,571 UART: [art] Derive Key Pair - Done
45,616,479 UART: [art] Signing Cert with AUTHO
45,617,786 UART: RITY.KEYID = 7
47,897,126 UART: [art] Erasing AUTHORITY.KEYID = 7
47,898,661 UART: [art] PUB.X = 51C09F5D9DCE19A5A7793A6E634D03D92B0EE2BD47A720844722CFBC46DDBE695A3B5965ACE4D96B3AE6FA62EE40EF75
47,905,900 UART: [art] PUB.Y = BCA96AFFE6C345F1EB5EB06A189FC1E4456B6045095D3606CC1BA4D0DC4DB90AA0311F328960804299AF5284130D83E8
47,913,152 UART: [art] SIG.R = F2ACF31123D07A877437192998E3E2378A7518892A5C14A4D042346E4C0B2061F811093D8984340A8B97B3DA11EC8EF5
47,920,520 UART: [art] SIG.S = 554D5AF29A804F87CE36C2D532F9E02FB3122E185611657909EDA6DA0F2534AD015A9A22BF6D4355B5623696D0596485
49,224,212 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,225,321 UART: mock_rt_interact::rt_entry...FMC Tester
49,514,692 UART: [rt] Runtime listening for mailbox commands...
49,517,621 >>> mbox cmd response data (336 bytes)
49,521,648 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,537,453 >>> mbox cmd response data (1536 bytes)
49,545,340 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,545,791 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,080 UART:
192,449 UART: Running Caliptra ROM ...
193,633 UART:
193,785 UART: [state] CFI Enabled
261,957 UART: [state] LifecycleState = Unprovisioned
263,812 UART: [state] DebugLocked = No
266,199 UART: [state] WD Timer not started. Device not locked for debugging
270,371 UART: [kat] SHA2-256
449,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,066 UART: [kat] ++
461,614 UART: [kat] sha1
473,932 UART: [kat] SHA2-256
476,976 UART: [kat] SHA2-384
483,499 UART: [kat] SHA2-512-ACC
486,505 UART: [kat] ECC-384
2,948,924 UART: [kat] HMAC-384Kdf
2,971,000 UART: [kat] LMS
3,500,462 UART: [kat] --
3,505,091 UART: [cold-reset] ++
3,507,168 UART: [fht] FHT @ 0x50003400
3,518,157 UART: [idev] ++
3,518,753 UART: [idev] CDI.KEYID = 6
3,519,678 UART: [idev] SUBJECT.KEYID = 7
3,520,856 UART: [idev] UDS.KEYID = 0
3,521,776 ready_for_fw is high
3,521,978 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,617,001 UART: [idev] Erasing UDS.KEYID = 0
6,024,346 UART: [idev] Sha1 KeyId Algorithm
6,047,411 UART: [idev] --
6,051,029 UART: [ldev] ++
6,051,605 UART: [ldev] CDI.KEYID = 6
6,052,489 UART: [ldev] SUBJECT.KEYID = 5
6,053,700 UART: [ldev] AUTHORITY.KEYID = 7
6,054,930 UART: [ldev] FE.KEYID = 1
6,098,929 UART: [ldev] Erasing FE.KEYID = 1
8,605,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,097 UART: [ldev] --
10,412,164 UART: [fwproc] Wait for Commands...
10,414,419 UART: [fwproc] Recv command 0x46574c44
10,416,525 UART: [fwproc] Recv'd Img size: 75384 bytes
13,348,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,422,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,491,411 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,672,887 >>> mbox cmd response: success
13,673,299 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,677,137 UART: [afmc] ++
13,677,750 UART: [afmc] CDI.KEYID = 6
13,678,627 UART: [afmc] SUBJECT.KEYID = 7
13,679,846 UART: [afmc] AUTHORITY.KEYID = 5
16,209,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,934,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,936,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,952,202 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,968,252 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,984,122 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,007,217 UART: [afmc] --
18,011,203 UART: [cold-reset] --
18,013,767 UART: [state] Locking Datavault
18,018,905 UART: [state] Locking PCR0, PCR1 and PCR31
18,020,552 UART: [state] Locking ICCM
18,022,102 UART: [exit] Launching FMC @ 0x40000130
18,030,548 UART:
18,030,783 UART: Running Caliptra FMC ...
18,031,884 UART:
18,032,040 UART: [state] CFI Enabled
18,091,000 UART: [fht] FMC Alias Private Key: 7
19,855,508 UART: [art] Extend RT PCRs Done
19,856,720 UART: [art] Lock RT PCRs Done
19,858,528 UART: [art] Populate DV Done
19,863,770 UART: [fht] FMC Alias Private Key: 7
19,865,254 UART: [art] Derive CDI
19,866,001 UART: [art] Store in in slot 0x4
19,924,961 UART: [art] Derive Key Pair
19,925,992 UART: [art] Store priv key in slot 0x5
22,389,038 UART: [art] Derive Key Pair - Done
22,401,860 UART: [art] Signing Cert with AUTHO
22,403,196 UART: RITY.KEYID = 7
24,115,203 UART: [art] Erasing AUTHORITY.KEYID = 7
24,116,709 UART: [art] PUB.X = AA796419BEC31C20C3E87F7FD729E15041DFCD93F12A14D9A0A86301FA48D96EC9349FC09546E8A75A4111D3C8E77C78
24,124,018 UART: [art] PUB.Y = 4D416512CE80064B2101A832E916138A7908EB219DD4E085D9920B35D7B42E3D27F9A5A7BA797D06FCAC07186BA95954
24,131,262 UART: [art] SIG.R = EE735D8A31464D2C13A302622AFA9E517531AAD189D36F43D2E8F4063E24502DA1485E2ADA6914206236B63239A83F64
24,138,603 UART: [art] SIG.S = AE6936F49A851DEDC8C690E8E6D4BEC789F856172C170A25037386C03F44D8DDF6C7121BF9465E407C38560C6E486AC7
25,116,827 UART: mock_rt_interact::rt_entry...FMC Tester
25,233,474 UART: [rt] Runtime listening for mailbox commands...
25,237,697 >>> mbox cmd response data (2048 bytes)
25,247,403 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,249,069 >>> mbox cmd response data (336 bytes)
25,252,943 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,268,747 >>> mbox cmd response data (1536 bytes)
27,323,991 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
27,419,707 UART:
27,420,066 UART: Running Caliptra ROM ...
27,421,204 UART:
27,421,367 UART: [state] CFI Enabled
27,482,437 UART: [state] LifecycleState = Unprovisioned
27,484,342 UART: [state] DebugLocked = No
27,485,628 UART: [state] WD Timer not started. Device not locked for debugging
27,488,921 UART: [kat] SHA2-256
27,668,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,679,595 UART: [kat] ++
27,680,143 UART: [kat] sha1
27,690,656 UART: [kat] SHA2-256
27,693,671 UART: [kat] SHA2-384
27,698,791 UART: [kat] SHA2-512-ACC
27,701,734 UART: [kat] ECC-384
30,165,464 UART: [kat] HMAC-384Kdf
30,189,050 UART: [kat] LMS
30,718,527 UART: [kat] --
30,722,776 UART: [update-reset] ++
33,672,902 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,676,255 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
33,922,820 >>> mbox cmd response: success
33,924,182 UART: [update-reset] Copying MAN_2 To MAN_1
33,946,511 UART: [update-reset Success] --
33,951,981 UART: [state] Locking Datavault
33,954,710 UART: [state] Locking PCR0, PCR1 and PCR31
33,956,409 UART: [state] Locking ICCM
33,958,844 UART: [exit] Launching FMC @ 0x40000130
33,967,293 UART:
33,967,530 UART: Running Caliptra FMC ...
33,968,628 UART:
33,968,783 UART: [state] CFI Enabled
34,060,242 UART: [art] Extend RT PCRs Done
34,061,426 UART: [art] Lock RT PCRs Done
34,063,205 UART: [art] Populate DV Done
34,068,772 UART: [fht] FMC Alias Private Key: 7
34,070,309 UART: [art] Derive CDI
34,071,070 UART: [art] Store in in slot 0x4
34,130,103 UART: [art] Derive Key Pair
34,131,167 UART: [art] Store priv key in slot 0x5
36,593,288 UART: [art] Derive Key Pair - Done
36,606,492 UART: [art] Signing Cert with AUTHO
36,607,807 UART: RITY.KEYID = 7
38,320,022 UART: [art] Erasing AUTHORITY.KEYID = 7
38,321,532 UART: [art] PUB.X = B5FAAD52875C3CE127FE699279BB200294AB3D7C2B73A0D703D0565801BF673C30E48F1064313176179BA247F14E487E
38,328,736 UART: [art] PUB.Y = 0965246DCE6C171F46C346B9F51E068FAC69BE6A4594DAB0A4067876B3359F7C8786819515239E5135D7546202DCEAFD
38,335,977 UART: [art] SIG.R = D491D352EDA447FD5E88E2510C494FACC090D9E09F669CEA6D993F20FA95BD4094530A197567CD159DCB480D260B2528
38,343,388 UART: [art] SIG.S = 2D3C11B18D520C4C454331DCF22462F0FC8C0DE8442AB524613AC5FBBDC09E89A4842D0ADE3C9976EE3B8D69CB69E3B7
39,320,483 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,321,564 UART: mock_rt_interact::rt_entry...FMC Tester
39,609,513 UART: [rt] Runtime listening for mailbox commands...
39,612,447 >>> mbox cmd response data (336 bytes)
39,616,219 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,632,018 >>> mbox cmd response data (1536 bytes)
39,639,329 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,639,726 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,358,790 ready_for_fw is high
3,359,174 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,431,704 >>> mbox cmd response: success
13,432,414 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,726,972 UART:
17,727,777 UART: Running Caliptra FMC ...
17,728,983 UART:
17,729,140 UART: [state] CFI Enabled
17,793,590 UART: [fht] FMC Alias Private Key: 7
19,557,651 UART: [art] Extend RT PCRs Done
19,558,851 UART: [art] Lock RT PCRs Done
19,560,256 UART: [art] Populate DV Done
19,565,707 UART: [fht] FMC Alias Private Key: 7
19,567,245 UART: [art] Derive CDI
19,568,075 UART: [art] Store in in slot 0x4
19,626,456 UART: [art] Derive Key Pair
19,627,486 UART: [art] Store priv key in slot 0x5
22,090,104 UART: [art] Derive Key Pair - Done
22,103,106 UART: [art] Signing Cert with AUTHO
22,104,412 UART: RITY.KEYID = 7
23,816,368 UART: [art] Erasing AUTHORITY.KEYID = 7
23,817,859 UART: [art] PUB.X = EB01755F52CB92803F9089983BA54EB40F6C30CEF69A5849AF0C013E9E21BD965AF16A249063AD756DBC12F2E1D4F3BB
23,825,106 UART: [art] PUB.Y = 6475D01EFC1FBFE9DC1F3F28F51219F42C60C12AE2515431E0797F56922FF529F3A571BC009359F46F869D6201B24639
23,832,361 UART: [art] SIG.R = 794B81EAB38710F7E871371D34EACAD63BD5E4B750DD605DAF6660C05133591891E393BE0C56EF3BE2F2752FBCD112FE
23,839,765 UART: [art] SIG.S = 0827338814964DB2BFFDEBBB4A7BC0DF43A320F670B21FB20542BAFDAC051EF1541E21E4AB767B48661EAC1C216D827A
24,818,731 UART: mock_rt_interact::rt_entry...FMC Tester
24,935,718 UART: [rt] Runtime listening for mailbox commands...
24,939,949 >>> mbox cmd response data (2048 bytes)
24,949,672 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,951,356 >>> mbox cmd response data (336 bytes)
24,955,261 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
24,971,075 >>> mbox cmd response data (1536 bytes)
27,030,063 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
33,471,504 >>> mbox cmd response: success
33,506,618 UART:
33,506,913 UART: Running Caliptra FMC ...
33,507,973 UART:
33,508,127 UART: [state] CFI Enabled
33,611,592 UART: [art] Extend RT PCRs Done
33,612,795 UART: [art] Lock RT PCRs Done
33,614,040 UART: [art] Populate DV Done
33,619,466 UART: [fht] FMC Alias Private Key: 7
33,621,080 UART: [art] Derive CDI
33,621,818 UART: [art] Store in in slot 0x4
33,679,941 UART: [art] Derive Key Pair
33,680,940 UART: [art] Store priv key in slot 0x5
36,144,071 UART: [art] Derive Key Pair - Done
36,157,239 UART: [art] Signing Cert with AUTHO
36,158,544 UART: RITY.KEYID = 7
37,869,850 UART: [art] Erasing AUTHORITY.KEYID = 7
37,871,358 UART: [art] PUB.X = 3720966F5D2EACD56B65400B4E05BE55ACEA99AE824246F316FEE630E0D140D6CD2BC951434EC2359E65B3C5E15B2E7C
37,878,638 UART: [art] PUB.Y = A22A391814A5D1924CA70CF42A20D2433A2F5AC04CC1FC9414548B31BFB493B96A0EFB71A678E7AAF6A9037D655A04CB
37,885,894 UART: [art] SIG.R = C8C25742D15AA7E0BED924130E1DF9426C38F522F23780C8572F29F6075068830B55F62DAF29477FC30CA7C8A9477EB6
37,893,257 UART: [art] SIG.S = D7AC814CF549EB77DA90855FB6BF71F5DB0342D24558342FBCD0FA4441821D06BD8A59E7078E0E5E58AF9409467CF4EA
38,870,330 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
38,871,413 UART: mock_rt_interact::rt_entry...FMC Tester
39,160,706 UART: [rt] Runtime listening for mailbox commands...
39,163,642 >>> mbox cmd response data (336 bytes)
39,167,399 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,183,227 >>> mbox cmd response data (1536 bytes)
39,190,537 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,190,940 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,447 UART:
192,798 UART: Running Caliptra ROM ...
193,972 UART:
603,522 UART: [state] CFI Enabled
616,976 UART: [state] LifecycleState = Unprovisioned
618,862 UART: [state] DebugLocked = No
621,511 UART: [state] WD Timer not started. Device not locked for debugging
625,960 UART: [kat] SHA2-256
805,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,675 UART: [kat] ++
817,126 UART: [kat] sha1
827,724 UART: [kat] SHA2-256
830,810 UART: [kat] SHA2-384
836,582 UART: [kat] SHA2-512-ACC
839,584 UART: [kat] ECC-384
3,280,407 UART: [kat] HMAC-384Kdf
3,293,171 UART: [kat] LMS
3,822,674 UART: [kat] --
3,827,814 UART: [cold-reset] ++
3,829,345 UART: [fht] FHT @ 0x50003400
3,840,963 UART: [idev] ++
3,841,529 UART: [idev] CDI.KEYID = 6
3,842,433 UART: [idev] SUBJECT.KEYID = 7
3,843,670 UART: [idev] UDS.KEYID = 0
3,844,589 ready_for_fw is high
3,844,796 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,939,666 UART: [idev] Erasing UDS.KEYID = 0
6,320,613 UART: [idev] Sha1 KeyId Algorithm
6,343,627 UART: [idev] --
6,348,047 UART: [ldev] ++
6,348,618 UART: [ldev] CDI.KEYID = 6
6,349,519 UART: [ldev] SUBJECT.KEYID = 5
6,350,611 UART: [ldev] AUTHORITY.KEYID = 7
6,351,944 UART: [ldev] FE.KEYID = 1
6,361,663 UART: [ldev] Erasing FE.KEYID = 1
8,836,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,798 UART: [ldev] --
10,629,587 UART: [fwproc] Wait for Commands...
10,632,208 UART: [fwproc] Recv command 0x46574c44
10,634,325 UART: [fwproc] Recv'd Img size: 75384 bytes
13,558,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,628,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,697,053 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,878,524 >>> mbox cmd response: success
13,878,956 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,883,610 UART: [afmc] ++
13,884,186 UART: [afmc] CDI.KEYID = 6
13,885,063 UART: [afmc] SUBJECT.KEYID = 7
13,886,278 UART: [afmc] AUTHORITY.KEYID = 5
16,386,673 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,108,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,110,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,125,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,141,831 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,157,721 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,180,633 UART: [afmc] --
18,184,926 UART: [cold-reset] --
18,188,623 UART: [state] Locking Datavault
18,195,268 UART: [state] Locking PCR0, PCR1 and PCR31
18,196,961 UART: [state] Locking ICCM
18,198,346 UART: [exit] Launching FMC @ 0x40000130
18,206,791 UART:
18,207,032 UART: Running Caliptra FMC ...
18,208,133 UART:
18,208,285 UART: [state] CFI Enabled
18,216,374 UART: [fht] FMC Alias Private Key: 7
19,973,202 UART: [art] Extend RT PCRs Done
19,974,416 UART: [art] Lock RT PCRs Done
19,976,274 UART: [art] Populate DV Done
19,981,679 UART: [fht] FMC Alias Private Key: 7
19,983,314 UART: [art] Derive CDI
19,984,062 UART: [art] Store in in slot 0x4
20,027,080 UART: [art] Derive Key Pair
20,028,140 UART: [art] Store priv key in slot 0x5
22,455,305 UART: [art] Derive Key Pair - Done
22,468,233 UART: [art] Signing Cert with AUTHO
22,469,580 UART: RITY.KEYID = 7
24,174,672 UART: [art] Erasing AUTHORITY.KEYID = 7
24,176,169 UART: [art] PUB.X = 976E699A388A48055FE873DFED48A578E5C9EBFE39F8815445A7602666FC7E0E245116E376D084A661ADCDF7B61938B7
24,183,423 UART: [art] PUB.Y = 15AC0CA389A48FAAB8658A9B62EFD53A2EFB4AC9C0CF7AF29FA8461EBC35182EADD86DE23D5AB29136B1F74D54E2B69F
24,190,704 UART: [art] SIG.R = 613C3DCC530F7C3BF3FF33C4529636CFB024531E8B696EE5BF69C731BD0BA7CEF8268729AC248C05A28F8F5235F8B86D
24,198,145 UART: [art] SIG.S = 3F0A82CB36F54655994ED42E92FBB6AEF6AC2FA498CA40746C825775AF81FDBC19F769926623FB4C417C4B312184819F
25,176,900 UART: mock_rt_interact::rt_entry...FMC Tester
25,293,008 UART: [rt] Runtime listening for mailbox commands...
25,297,244 >>> mbox cmd response data (2048 bytes)
25,306,954 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,308,612 >>> mbox cmd response data (336 bytes)
25,312,521 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,328,330 >>> mbox cmd response data (1536 bytes)
27,390,919 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
27,486,784 UART:
27,487,148 UART: Running Caliptra ROM ...
27,488,196 UART:
27,488,345 UART: [state] CFI Enabled
27,504,081 UART: [state] LifecycleState = Unprovisioned
27,506,151 UART: [state] DebugLocked = No
27,508,751 UART: [state] WD Timer not started. Device not locked for debugging
27,512,257 UART: [kat] SHA2-256
27,691,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,702,970 UART: [kat] ++
27,703,428 UART: [kat] sha1
27,715,815 UART: [kat] SHA2-256
27,718,835 UART: [kat] SHA2-384
27,724,440 UART: [kat] SHA2-512-ACC
27,727,431 UART: [kat] ECC-384
30,170,777 UART: [kat] HMAC-384Kdf
30,183,647 UART: [kat] LMS
30,713,145 UART: [kat] --
30,718,959 UART: [update-reset] ++
33,672,273 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,675,003 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
33,921,566 >>> mbox cmd response: success
33,923,428 UART: [update-reset] Copying MAN_2 To MAN_1
33,945,760 UART: [update-reset Success] --
33,949,925 UART: [state] Locking Datavault
33,952,490 UART: [state] Locking PCR0, PCR1 and PCR31
33,954,189 UART: [state] Locking ICCM
33,956,846 UART: [exit] Launching FMC @ 0x40000130
33,965,293 UART:
33,965,528 UART: Running Caliptra FMC ...
33,966,627 UART:
33,966,795 UART: [state] CFI Enabled
34,010,810 UART: [art] Extend RT PCRs Done
34,011,991 UART: [art] Lock RT PCRs Done
34,013,392 UART: [art] Populate DV Done
34,019,015 UART: [fht] FMC Alias Private Key: 7
34,020,674 UART: [art] Derive CDI
34,021,411 UART: [art] Store in in slot 0x4
34,064,011 UART: [art] Derive Key Pair
34,065,010 UART: [art] Store priv key in slot 0x5
36,491,586 UART: [art] Derive Key Pair - Done
36,504,463 UART: [art] Signing Cert with AUTHO
36,505,767 UART: RITY.KEYID = 7
38,210,903 UART: [art] Erasing AUTHORITY.KEYID = 7
38,212,419 UART: [art] PUB.X = DE2E0B81E73A90709A5BB73DD9659E25C32C50E8B5D3C4DE7D65476566244602386ECC92B71CDCB3E2FAC3031CB2EE69
38,219,651 UART: [art] PUB.Y = 88FD9A5EB0A179D6188C7E01FD0A01D01DA19F37F68B14EA57FA47642F6966323C494E10957DE521717D8885010CE901
38,226,904 UART: [art] SIG.R = E89910B0C8BFA4BCC574288AC7007891E43E63CE11F14BD0916C3FD8A61BE9FE0C7D020F279254C41C9AE73D7AC3B69E
38,234,292 UART: [art] SIG.S = 2837C6353F6BEA77A5E4535B68AEDCFC51F7C3D672A80C47A79A215D0EE27816AA3FABE93DD056B85FBE3CA6C8A64D38
39,211,821 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,212,886 UART: mock_rt_interact::rt_entry...FMC Tester
39,502,039 UART: [rt] Runtime listening for mailbox commands...
39,505,122 >>> mbox cmd response data (336 bytes)
39,509,003 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,524,810 >>> mbox cmd response data (1536 bytes)
39,532,109 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,532,503 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,695,165 ready_for_fw is high
3,695,899 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,659,049 >>> mbox cmd response: success
13,659,625 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,909,568 UART:
17,909,938 UART: Running Caliptra FMC ...
17,911,118 UART:
17,911,318 UART: [state] CFI Enabled
17,918,826 UART: [fht] FMC Alias Private Key: 7
19,675,881 UART: [art] Extend RT PCRs Done
19,677,101 UART: [art] Lock RT PCRs Done
19,678,585 UART: [art] Populate DV Done
19,684,052 UART: [fht] FMC Alias Private Key: 7
19,685,602 UART: [art] Derive CDI
19,686,333 UART: [art] Store in in slot 0x4
19,728,974 UART: [art] Derive Key Pair
19,729,972 UART: [art] Store priv key in slot 0x5
22,155,855 UART: [art] Derive Key Pair - Done
22,168,849 UART: [art] Signing Cert with AUTHO
22,170,170 UART: RITY.KEYID = 7
23,875,138 UART: [art] Erasing AUTHORITY.KEYID = 7
23,876,643 UART: [art] PUB.X = BFD6C53F2911FE5EAB0C69851C13FB9FA35FC7259A5DDC5459120703E25C994AB878749B7130E3776E4EDAC9E18AE7EF
23,883,947 UART: [art] PUB.Y = A0BCE17314943EB4C22E817E89D9934920614EC8E47B15E345B6EC219FFF49292425B11D581CFBACADAA3D7AA5A2DB78
23,891,181 UART: [art] SIG.R = A923EFB48890E55197873F2D2654AA2754026DB22264FDF9349D96A8E752A0B1993F3A161ACE69BBDAD219FDB8DEFC4C
23,898,631 UART: [art] SIG.S = F7F9CE8DEAB0823EB86698E8FFA79A2207285FAC4A4E23D854CC592D392601126AA2B8008513461DE644AD0F960B2086
24,877,311 UART: mock_rt_interact::rt_entry...FMC Tester
24,993,578 UART: [rt] Runtime listening for mailbox commands...
24,997,860 >>> mbox cmd response data (2048 bytes)
25,007,629 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,009,320 >>> mbox cmd response data (336 bytes)
25,013,146 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,028,940 >>> mbox cmd response data (1536 bytes)
27,084,205 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
33,460,550 >>> mbox cmd response: success
33,494,393 UART:
33,494,724 UART: Running Caliptra FMC ...
33,495,852 UART:
33,496,014 UART: [state] CFI Enabled
33,540,094 UART: [art] Extend RT PCRs Done
33,541,248 UART: [art] Lock RT PCRs Done
33,542,675 UART: [art] Populate DV Done
33,548,472 UART: [fht] FMC Alias Private Key: 7
33,550,075 UART: [art] Derive CDI
33,550,895 UART: [art] Store in in slot 0x4
33,593,556 UART: [art] Derive Key Pair
33,594,596 UART: [art] Store priv key in slot 0x5
36,020,739 UART: [art] Derive Key Pair - Done
36,033,811 UART: [art] Signing Cert with AUTHO
36,035,113 UART: RITY.KEYID = 7
37,740,997 UART: [art] Erasing AUTHORITY.KEYID = 7
37,742,505 UART: [art] PUB.X = 4707CBFF9FC9B20BFEDD6A393067E7F89FA21551BB1BCBD834055FF9EDEBB253CA179CDF542F9B4B4184B3B02880341F
37,749,804 UART: [art] PUB.Y = CC85A05C0270525D192D4453C75510A9FB56A9CD845B7E335B3CB5FC76C6C30AB95B97EE5EAB4F52DB4CEDD430D34F63
37,757,085 UART: [art] SIG.R = FCE2894FF1EF4B59467D278DAFBB7CA57737F08D213699AAF2CDABD9172961DFAC183366B609B7769637369A6144C4C7
37,764,485 UART: [art] SIG.S = 25E1C9661F0AEA795264FEE11CA5A2BC4AC14B6A2CE97D73D2DB326E2B664CA17DE002B5B06571D43B1C6191040FBD9B
38,742,235 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
38,743,146 UART: mock_rt_interact::rt_entry...FMC Tester
39,037,672 UART: [rt] Runtime listening for mailbox commands...
39,040,604 >>> mbox cmd response data (336 bytes)
39,044,358 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,060,162 >>> mbox cmd response data (1536 bytes)
39,067,470 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,067,870 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,823 writing to cptra_bootfsm_go
3,439,730 ready_for_fw is high
3,440,356 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,898,609 >>> mbox cmd response: success
13,899,237 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,197,720 UART:
18,198,112 UART: Running Caliptra FMC ...
18,199,295 UART:
18,199,449 UART: [state] CFI Enabled
18,262,872 UART: [fht] FMC Alias Private Key: 7
20,026,554 UART: [art] Extend RT PCRs Done
20,027,777 UART: [art] Lock RT PCRs Done
20,029,425 UART: [art] Populate DV Done
20,034,997 UART: [fht] FMC Alias Private Key: 7
20,036,536 UART: [art] Derive CDI
20,037,266 UART: [art] Store in in slot 0x4
20,095,150 UART: [art] Derive Key Pair
20,096,214 UART: [art] Store priv key in slot 0x5
22,559,643 UART: [art] Derive Key Pair - Done
22,572,685 UART: [art] Signing Cert with AUTHO
22,574,190 UART: RITY.KEYID = 7
24,285,325 UART: [art] Erasing AUTHORITY.KEYID = 7
24,286,860 UART: [art] PUB.X = 7BB7F143EA73919BB0590D4BD892711D5D9604280912A13993032CAFD23982DF8E78C1FB289A2182B98BDBF0EF22FE00
24,294,121 UART: [art] PUB.Y = 16485053CE523B94614EEABB73BD46C1EF0E3394684153CE6DC672AD411B55A1B66A417D9100ED111229EB076C712AD6
24,301,328 UART: [art] SIG.R = B2EDE440BA0974275D4F664E21D1D20BD68313B62F110A5438553F6810488D67F4BD9CB4E472AB239FF4AC29AFB45381
24,308,724 UART: [art] SIG.S = 42CFC6A54083539B297B6F208EBB191F6D5653F66C1BA50145D88F2880916E4C3D3CA7C74228139F8305E947F0FA4CBF
25,287,621 UART: mock_rt_interact::rt_entry...FMC Tester
25,405,372 UART: [rt] Runtime listening for mailbox commands...
25,409,635 >>> mbox cmd response data (2048 bytes)
25,419,340 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,421,019 >>> mbox cmd response data (336 bytes)
25,424,925 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,440,727 >>> mbox cmd response data (1536 bytes)
27,497,106 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
34,431,324 >>> mbox cmd response: success
34,464,862 UART:
34,465,159 UART: Running Caliptra FMC ...
34,466,197 UART:
34,466,347 UART: [state] CFI Enabled
34,566,262 UART: [art] Extend RT PCRs Done
34,567,449 UART: [art] Lock RT PCRs Done
34,568,927 UART: [art] Populate DV Done
34,574,516 UART: [fht] FMC Alias Private Key: 7
34,576,011 UART: [art] Derive CDI
34,576,750 UART: [art] Store in in slot 0x4
34,635,034 UART: [art] Derive Key Pair
34,636,042 UART: [art] Store priv key in slot 0x5
37,098,745 UART: [art] Derive Key Pair - Done
37,111,647 UART: [art] Signing Cert with AUTHO
37,112,945 UART: RITY.KEYID = 7
38,824,420 UART: [art] Erasing AUTHORITY.KEYID = 7
38,825,923 UART: [art] PUB.X = 3565BD15C999605B42EC213583FEB2C95282731573FCF9BCA50F2E8896C67E5DD6575626F475CC07CF4F2B0B0123AF1D
38,833,147 UART: [art] PUB.Y = 25B388D2B530E53901D330DF5A927FB94B7F70CC2697BDBAF72187D61BA0F53EF395698D43F39719B5485C4B17C72437
38,840,413 UART: [art] SIG.R = 6266A7EA5A7AC8169AAF07B385CC96FB00F61CB4B50F451ACAA5C3E0650B607C2BCD543C6DCCCABCF6A90F6850F64AE5
38,847,795 UART: [art] SIG.S = 363BBBFD70E7C778951D143430621AD03CA0EB675A6F3E64B5C788FDF6BC0225D862F1ABAE371C33BA64FC20ABC98CC8
39,824,890 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,825,825 UART: mock_rt_interact::rt_entry...FMC Tester
40,116,374 UART: [rt] Runtime listening for mailbox commands...
40,119,309 >>> mbox cmd response data (336 bytes)
40,123,297 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,139,102 >>> mbox cmd response data (1536 bytes)
40,146,661 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,147,086 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,756,521 ready_for_fw is high
3,757,107 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
14,115,934 >>> mbox cmd response: success
14,116,448 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,371,894 UART:
18,372,266 UART: Running Caliptra FMC ...
18,373,632 UART:
18,373,797 UART: [state] CFI Enabled
18,381,580 UART: [fht] FMC Alias Private Key: 7
20,138,553 UART: [art] Extend RT PCRs Done
20,139,788 UART: [art] Lock RT PCRs Done
20,141,361 UART: [art] Populate DV Done
20,147,044 UART: [fht] FMC Alias Private Key: 7
20,148,696 UART: [art] Derive CDI
20,149,512 UART: [art] Store in in slot 0x4
20,192,542 UART: [art] Derive Key Pair
20,193,543 UART: [art] Store priv key in slot 0x5
22,620,042 UART: [art] Derive Key Pair - Done
22,633,257 UART: [art] Signing Cert with AUTHO
22,634,562 UART: RITY.KEYID = 7
24,340,278 UART: [art] Erasing AUTHORITY.KEYID = 7
24,341,793 UART: [art] PUB.X = 3ADBA8BF5F6C882742A36645146487EAF483539F8399414128FCC45B352C3BB62CEAD8F41EE675A4258D69250C51E2C8
24,349,054 UART: [art] PUB.Y = 4E809F371D1AD53010C3E73112109D7BCD778FB8E618F34875D39C98A2A02EF50C81E7D1FF1ED38F56F6B3962EAE770E
24,356,307 UART: [art] SIG.R = 10F33FA60F727EB4BF1ACB3D80F102B46253B4B2C3E94D015C0B4A46D66BCFE6A1D71EE4DC0BC601C08ECD9E174C5787
24,363,703 UART: [art] SIG.S = 2E5D69902FF15A999E1D78EF0420684B69541E8446A05F408B14B482C3D22B2A23E3BE8352E49516B8F152E893C7BCF7
25,342,547 UART: mock_rt_interact::rt_entry...FMC Tester
25,459,540 UART: [rt] Runtime listening for mailbox commands...
25,463,828 >>> mbox cmd response data (2048 bytes)
25,473,523 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,475,185 >>> mbox cmd response data (336 bytes)
25,479,059 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,494,848 >>> mbox cmd response data (1536 bytes)
27,554,297 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
34,401,611 >>> mbox cmd response: success
34,435,602 UART:
34,435,892 UART: Running Caliptra FMC ...
34,436,931 UART:
34,437,073 UART: [state] CFI Enabled
34,480,724 UART: [art] Extend RT PCRs Done
34,481,914 UART: [art] Lock RT PCRs Done
34,483,425 UART: [art] Populate DV Done
34,488,518 UART: [fht] FMC Alias Private Key: 7
34,490,058 UART: [art] Derive CDI
34,490,791 UART: [art] Store in in slot 0x4
34,533,767 UART: [art] Derive Key Pair
34,534,826 UART: [art] Store priv key in slot 0x5
36,961,688 UART: [art] Derive Key Pair - Done
36,974,377 UART: [art] Signing Cert with AUTHO
36,975,686 UART: RITY.KEYID = 7
38,681,025 UART: [art] Erasing AUTHORITY.KEYID = 7
38,682,542 UART: [art] PUB.X = BD46771B8283410BF0D1888482CDE30B8DCC9441D0B813695B277512C465DABA1E2C76FCBB8FB7DE5E53929B35DA98D7
38,689,794 UART: [art] PUB.Y = 61E7FBCCB5768D23C81828E66BF6F17C96301C3E405CD6175C3BA839A913430F7B9D3B6D9E6C54CF66FEF496364361F3
38,697,068 UART: [art] SIG.R = 109E40D45582F1CD4FD875003023DFCCF51D42ACAC866E122FF254B9B5C75AF04FF44150344AD14AF3D25587AD18325B
38,704,478 UART: [art] SIG.S = 416AC7A7AAC540A234D74B98556C9721984625DC04EFF364450E9BF74FD8EB317597783CBF2A2D8F21C7B8AC1C9F0252
39,681,907 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,683,106 UART: mock_rt_interact::rt_entry...FMC Tester
39,973,826 UART: [rt] Runtime listening for mailbox commands...
39,976,773 >>> mbox cmd response data (336 bytes)
39,980,485 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,996,288 >>> mbox cmd response data (1536 bytes)
40,003,824 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,004,283 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,715 UART: [kat] SHA2-256
881,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,761 UART: [kat] ++
885,913 UART: [kat] sha1
890,049 UART: [kat] SHA2-256
891,987 UART: [kat] SHA2-384
894,722 UART: [kat] SHA2-512-ACC
896,623 UART: [kat] ECC-384
902,060 UART: [kat] HMAC-384Kdf
906,662 UART: [kat] LMS
1,474,858 UART: [kat] --
1,475,901 UART: [cold-reset] ++
1,476,439 UART: [fht] Storing FHT @ 0x50003400
1,479,266 UART: [idev] ++
1,479,434 UART: [idev] CDI.KEYID = 6
1,479,794 UART: [idev] SUBJECT.KEYID = 7
1,480,218 UART: [idev] UDS.KEYID = 0
1,480,563 ready_for_fw is high
1,480,563 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,122 UART: [idev] Erasing UDS.KEYID = 0
1,504,244 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,896 UART: [idev] --
1,514,103 UART: [ldev] ++
1,514,271 UART: [ldev] CDI.KEYID = 6
1,514,634 UART: [ldev] SUBJECT.KEYID = 5
1,515,060 UART: [ldev] AUTHORITY.KEYID = 7
1,515,523 UART: [ldev] FE.KEYID = 1
1,520,615 UART: [ldev] Erasing FE.KEYID = 1
1,545,826 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,908 UART: [ldev] --
1,585,397 UART: [fwproc] Waiting for Commands...
1,586,124 UART: [fwproc] Received command 0x46574c44
1,586,915 UART: [fwproc] Received Image of size 75384 bytes
2,438,815 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,466,357 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,495,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,573,136 >>> mbox cmd response: success
2,573,136 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,574,166 UART: [afmc] ++
2,574,334 UART: [afmc] CDI.KEYID = 6
2,574,696 UART: [afmc] SUBJECT.KEYID = 7
2,575,121 UART: [afmc] AUTHORITY.KEYID = 5
2,610,128 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,626,402 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,627,182 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,632,910 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,638,795 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,644,485 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,652,244 UART: [afmc] --
2,653,228 UART: [cold-reset] --
2,653,912 UART: [state] Locking Datavault
2,655,191 UART: [state] Locking PCR0, PCR1 and PCR31
2,655,795 UART: [state] Locking ICCM
2,656,357 UART: [exit] Launching FMC @ 0x40000130
2,661,686 UART:
2,661,702 UART: Running Caliptra FMC ...
2,662,110 UART:
2,662,164 UART: [state] CFI Enabled
2,672,811 UART: [fht] FMC Alias Private Key: 7
2,780,396 UART: [art] Extend RT PCRs Done
2,780,824 UART: [art] Lock RT PCRs Done
2,782,408 UART: [art] Populate DV Done
2,790,279 UART: [fht] FMC Alias Private Key: 7
2,791,371 UART: [art] Derive CDI
2,791,651 UART: [art] Store in in slot 0x4
2,876,802 UART: [art] Derive Key Pair
2,877,162 UART: [art] Store priv key in slot 0x5
2,889,666 UART: [art] Derive Key Pair - Done
2,904,557 UART: [art] Signing Cert with AUTHO
2,905,037 UART: RITY.KEYID = 7
2,920,091 UART: [art] Erasing AUTHORITY.KEYID = 7
2,920,856 UART: [art] PUB.X = 3938506C44EBB68B12AB7AD8209F494408C616347253190FCB5F0C119AAFDEDC791111547AECFA00AA7574C38511A701
2,927,594 UART: [art] PUB.Y = 7DA385434A7A8C71B56D9B37FF1B500CF8C351DCD22E418B0F27370F796444E19FC79A6896DE92F59FDF90B5217DDC60
2,934,543 UART: [art] SIG.R = 714D00C01B527E669872EBD43C5DAA0BBA58EAD6E7428A64BDA75F1D7C7B44C7656C507326B5709D43816A3B78C9C89C
2,941,296 UART: [art] SIG.S = 10F3B4D2E5F578C89C80744351E7786651F672AA711F1D7F9155840142ECE846A03A7849E86E0A32A64400EE2A3DED5D
2,965,339 UART: mock_rt_interact::rt_entry...FMC Tester
3,072,060 UART: [rt] Runtime listening for mailbox commands...
3,075,450 >>> mbox cmd response data (2048 bytes)
3,075,451 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,076,683 >>> mbox cmd response data (336 bytes)
3,076,684 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,089,275 >>> mbox cmd response data (1536 bytes)
3,089,276 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,089,382 UART:
3,089,398 UART: Running Caliptra ROM ...
3,089,806 UART:
3,089,860 UART: [state] CFI Enabled
3,092,186 UART: [state] LifecycleState = Unprovisioned
3,092,841 UART: [state] DebugLocked = No
3,093,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,095,236 UART: [kat] SHA2-256
3,889,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,893,282 UART: [kat] ++
3,893,434 UART: [kat] sha1
3,897,688 UART: [kat] SHA2-256
3,899,626 UART: [kat] SHA2-384
3,902,339 UART: [kat] SHA2-512-ACC
3,904,239 UART: [kat] ECC-384
3,909,990 UART: [kat] HMAC-384Kdf
3,914,598 UART: [kat] LMS
4,482,794 UART: [kat] --
4,483,759 UART: [update-reset] ++
5,372,353 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,373,451 UART: [update-reset] Loading Runtime at address 0x40005000 len 50700
5,464,905 >>> mbox cmd response: success
5,465,238 UART: [update-reset] Copying MAN_2 To MAN_1
5,473,252 UART: [update-reset Success] --
5,474,221 UART: [state] Locking Datavault
5,475,137 UART: [state] Locking PCR0, PCR1 and PCR31
5,475,741 UART: [state] Locking ICCM
5,476,371 UART: [exit] Launching FMC @ 0x40000130
5,481,700 UART:
5,481,716 UART: Running Caliptra FMC ...
5,482,124 UART:
5,482,178 UART: [state] CFI Enabled
5,571,095 UART: [art] Extend RT PCRs Done
5,571,523 UART: [art] Lock RT PCRs Done
5,572,904 UART: [art] Populate DV Done
5,581,171 UART: [fht] FMC Alias Private Key: 7
5,582,181 UART: [art] Derive CDI
5,582,461 UART: [art] Store in in slot 0x4
5,668,206 UART: [art] Derive Key Pair
5,668,566 UART: [art] Store priv key in slot 0x5
5,681,516 UART: [art] Derive Key Pair - Done
5,696,231 UART: [art] Signing Cert with AUTHO
5,696,711 UART: RITY.KEYID = 7
5,711,963 UART: [art] Erasing AUTHORITY.KEYID = 7
5,712,728 UART: [art] PUB.X = 9FD38C946BA6BEC0BCC01146DFBC859B42C247673C540D7443696F2DDBB992DFE7017C0CE39EE94462C71799A3E26213
5,719,497 UART: [art] PUB.Y = 7126EA626216AE1E3D703CFE3252BFE96F5DEE305BDB173352ABF3BC02DB44E254754BD7C27263B162A058654817ADFC
5,726,454 UART: [art] SIG.R = C93DB11971D0C5C4F21EB0724B2F1989CD097B3B5EC5214DF1C84450EDB2CCB6E76803430C3B319C895146768B13E1B3
5,733,219 UART: [art] SIG.S = 4FB1C6DF94650BD55704832CB9047B06C595D2F5DB5C3775DC0EA02BB934C24958837FFAFFF1A3C9D2D340CB42C13EA7
5,755,532 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,756,413 UART: mock_rt_interact::rt_entry...FMC Tester
6,039,505 UART: [rt] Runtime listening for mailbox commands...
6,041,540 >>> mbox cmd response data (336 bytes)
6,041,541 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,054,132 >>> mbox cmd response data (1536 bytes)
6,054,133 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,054,150 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,895 ready_for_fw is high
1,362,895 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,423,520 >>> mbox cmd response: success
2,423,520 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,485,172 UART:
2,485,188 UART: Running Caliptra FMC ...
2,485,596 UART:
2,485,650 UART: [state] CFI Enabled
2,495,813 UART: [fht] FMC Alias Private Key: 7
2,604,312 UART: [art] Extend RT PCRs Done
2,604,740 UART: [art] Lock RT PCRs Done
2,606,028 UART: [art] Populate DV Done
2,614,329 UART: [fht] FMC Alias Private Key: 7
2,615,343 UART: [art] Derive CDI
2,615,623 UART: [art] Store in in slot 0x4
2,700,998 UART: [art] Derive Key Pair
2,701,358 UART: [art] Store priv key in slot 0x5
2,714,526 UART: [art] Derive Key Pair - Done
2,729,512 UART: [art] Signing Cert with AUTHO
2,729,992 UART: RITY.KEYID = 7
2,745,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,746,241 UART: [art] PUB.X = C5AEDC85348321543A0A909E6B5B51C813BD48BFD3BDF67DAD32474206E762F858DC5B0FCED77B7D829003A6826F6C71
2,753,009 UART: [art] PUB.Y = 600DC9EAA505EAF5DE0F726A3931EE731FA55B20526EC726A869609330AB5DA47529588EB95BE857BDC4C74BFA9F024E
2,759,959 UART: [art] SIG.R = 175A85E71E51DE1F9D3C538737CBE403FE83113CE6E3201FF72C3BBA5D871935D9B188F0FB908D97765C8C46D4A49B16
2,766,732 UART: [art] SIG.S = A2528BE0209994A3A0B22F4155F996F7FA3B9C83EEB83DCF6896D12D23246E782B6CC3F6A08DE606DAD268B46ADDFE22
2,790,404 UART: mock_rt_interact::rt_entry...FMC Tester
2,898,306 UART: [rt] Runtime listening for mailbox commands...
2,901,696 >>> mbox cmd response data (2048 bytes)
2,901,697 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,902,929 >>> mbox cmd response data (336 bytes)
2,902,930 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,915,521 >>> mbox cmd response data (1536 bytes)
2,915,522 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
5,173,881 >>> mbox cmd response: success
5,187,412 UART:
5,187,428 UART: Running Caliptra FMC ...
5,187,836 UART:
5,187,890 UART: [state] CFI Enabled
5,277,423 UART: [art] Extend RT PCRs Done
5,277,851 UART: [art] Lock RT PCRs Done
5,279,144 UART: [art] Populate DV Done
5,287,533 UART: [fht] FMC Alias Private Key: 7
5,288,651 UART: [art] Derive CDI
5,288,931 UART: [art] Store in in slot 0x4
5,375,200 UART: [art] Derive Key Pair
5,375,560 UART: [art] Store priv key in slot 0x5
5,388,856 UART: [art] Derive Key Pair - Done
5,404,011 UART: [art] Signing Cert with AUTHO
5,404,491 UART: RITY.KEYID = 7
5,419,695 UART: [art] Erasing AUTHORITY.KEYID = 7
5,420,460 UART: [art] PUB.X = 0B563900C903AAE9253D0945F917474269898FC969A71C0F209E924E8C46CA145D1610DEE9FCC8F4D63D9E2C49C15AA9
5,427,198 UART: [art] PUB.Y = BF98D8B406ACF25EB257F13A807FA48C1E277DBCC35A05AD55103FAAA612DC664D73DA796371C701271E4D4B46DE7FAB
5,434,157 UART: [art] SIG.R = AB02274E87AD6C0BEB2457DC243801B0A427510C8D56694A61CBCF718C25D1F1383683DA7E9C362188C52DD20CFCF039
5,440,918 UART: [art] SIG.S = C324725BF90B29CB83C661CC656617A9CDFFFF498A192AAB8BC4B7D1772A2017E493C7A45EEE7875AF199F2D09E67B3B
5,464,034 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,465,211 UART: mock_rt_interact::rt_entry...FMC Tester
5,748,414 UART: [rt] Runtime listening for mailbox commands...
5,750,449 >>> mbox cmd response data (336 bytes)
5,750,450 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,763,041 >>> mbox cmd response data (1536 bytes)
5,763,042 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,763,059 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,406 UART: [kat] SHA2-256
882,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,452 UART: [kat] ++
886,604 UART: [kat] sha1
890,868 UART: [kat] SHA2-256
892,806 UART: [kat] SHA2-384
895,537 UART: [kat] SHA2-512-ACC
897,438 UART: [kat] ECC-384
903,085 UART: [kat] HMAC-384Kdf
907,827 UART: [kat] LMS
1,476,023 UART: [kat] --
1,477,122 UART: [cold-reset] ++
1,477,542 UART: [fht] Storing FHT @ 0x50003400
1,480,325 UART: [idev] ++
1,480,493 UART: [idev] CDI.KEYID = 6
1,480,853 UART: [idev] SUBJECT.KEYID = 7
1,481,277 UART: [idev] UDS.KEYID = 0
1,481,622 ready_for_fw is high
1,481,622 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,489,467 UART: [idev] Erasing UDS.KEYID = 0
1,506,535 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,179 UART: [idev] --
1,516,194 UART: [ldev] ++
1,516,362 UART: [ldev] CDI.KEYID = 6
1,516,725 UART: [ldev] SUBJECT.KEYID = 5
1,517,151 UART: [ldev] AUTHORITY.KEYID = 7
1,517,614 UART: [ldev] FE.KEYID = 1
1,522,990 UART: [ldev] Erasing FE.KEYID = 1
1,548,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,359 UART: [ldev] --
1,587,726 UART: [fwproc] Waiting for Commands...
1,588,369 UART: [fwproc] Received command 0x46574c44
1,589,160 UART: [fwproc] Received Image of size 75384 bytes
2,440,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,468,760 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,498,112 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,575,639 >>> mbox cmd response: success
2,575,639 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,576,837 UART: [afmc] ++
2,577,005 UART: [afmc] CDI.KEYID = 6
2,577,367 UART: [afmc] SUBJECT.KEYID = 7
2,577,792 UART: [afmc] AUTHORITY.KEYID = 5
2,613,645 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,630,367 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,631,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,636,875 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,642,760 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,648,450 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,656,419 UART: [afmc] --
2,657,375 UART: [cold-reset] --
2,658,451 UART: [state] Locking Datavault
2,659,734 UART: [state] Locking PCR0, PCR1 and PCR31
2,660,338 UART: [state] Locking ICCM
2,660,872 UART: [exit] Launching FMC @ 0x40000130
2,666,201 UART:
2,666,217 UART: Running Caliptra FMC ...
2,666,625 UART:
2,666,768 UART: [state] CFI Enabled
2,677,769 UART: [fht] FMC Alias Private Key: 7
2,785,550 UART: [art] Extend RT PCRs Done
2,785,978 UART: [art] Lock RT PCRs Done
2,787,534 UART: [art] Populate DV Done
2,795,695 UART: [fht] FMC Alias Private Key: 7
2,796,641 UART: [art] Derive CDI
2,796,921 UART: [art] Store in in slot 0x4
2,882,280 UART: [art] Derive Key Pair
2,882,640 UART: [art] Store priv key in slot 0x5
2,895,972 UART: [art] Derive Key Pair - Done
2,910,259 UART: [art] Signing Cert with AUTHO
2,910,739 UART: RITY.KEYID = 7
2,926,045 UART: [art] Erasing AUTHORITY.KEYID = 7
2,926,810 UART: [art] PUB.X = 18EBB078335CC541CD707CA7B4C0E163D9E853BDBD3E8C4C8B3267584AB12084BD1696D607C8F037710C3B24BCDA21BD
2,933,586 UART: [art] PUB.Y = DAE03B678E5E6472D2F60E5DD719559509E597F238986F5C09F563E0B6CDB43E268A9815CA09E5B7F28B42CBC98D9EE2
2,940,532 UART: [art] SIG.R = 1458B9958C77FB464D5D8434111660AB362EC559FE4E19DD8355C75207D8A1B695E903066F3F3C6C2EE077C5E08E3077
2,947,289 UART: [art] SIG.S = CEBC57A2207C579FA1009763CC38F302CEE63047A682F4610D454C747401101B8DA8D2AC5304E58900730B2DA739EE22
2,970,661 UART: mock_rt_interact::rt_entry...FMC Tester
3,079,015 UART: [rt] Runtime listening for mailbox commands...
3,082,405 >>> mbox cmd response data (2048 bytes)
3,082,406 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,083,638 >>> mbox cmd response data (336 bytes)
3,083,639 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,096,230 >>> mbox cmd response data (1536 bytes)
3,096,231 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,096,337 UART:
3,096,353 UART: Running Caliptra ROM ...
3,096,761 UART:
3,096,902 UART: [state] CFI Enabled
3,099,646 UART: [state] LifecycleState = Unprovisioned
3,100,301 UART: [state] DebugLocked = No
3,101,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,102,666 UART: [kat] SHA2-256
3,896,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,900,712 UART: [kat] ++
3,900,864 UART: [kat] sha1
3,905,132 UART: [kat] SHA2-256
3,907,070 UART: [kat] SHA2-384
3,909,933 UART: [kat] SHA2-512-ACC
3,911,833 UART: [kat] ECC-384
3,917,496 UART: [kat] HMAC-384Kdf
3,922,040 UART: [kat] LMS
4,490,236 UART: [kat] --
4,490,985 UART: [update-reset] ++
5,381,241 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,382,305 UART: [update-reset] Loading Runtime at address 0x40005000 len 50700
5,473,759 >>> mbox cmd response: success
5,473,872 UART: [update-reset] Copying MAN_2 To MAN_1
5,481,886 UART: [update-reset Success] --
5,483,033 UART: [state] Locking Datavault
5,484,041 UART: [state] Locking PCR0, PCR1 and PCR31
5,484,645 UART: [state] Locking ICCM
5,485,075 UART: [exit] Launching FMC @ 0x40000130
5,490,404 UART:
5,490,420 UART: Running Caliptra FMC ...
5,490,828 UART:
5,490,971 UART: [state] CFI Enabled
5,580,168 UART: [art] Extend RT PCRs Done
5,580,596 UART: [art] Lock RT PCRs Done
5,581,737 UART: [art] Populate DV Done
5,590,180 UART: [fht] FMC Alias Private Key: 7
5,591,180 UART: [art] Derive CDI
5,591,460 UART: [art] Store in in slot 0x4
5,677,347 UART: [art] Derive Key Pair
5,677,707 UART: [art] Store priv key in slot 0x5
5,690,955 UART: [art] Derive Key Pair - Done
5,705,643 UART: [art] Signing Cert with AUTHO
5,706,123 UART: RITY.KEYID = 7
5,721,551 UART: [art] Erasing AUTHORITY.KEYID = 7
5,722,316 UART: [art] PUB.X = BA4A28D559D600ABB918D65F34C298F114C00BD816A6B737E045A5C18268D0C2D7307E58AA38B810E2332705ACAA9C05
5,729,059 UART: [art] PUB.Y = 39575A29966DEE6296C9F60DF4F2473492975781E1281C98CA05D7787722F7916B95BD87DAA6D95FE416098646F60FF3
5,735,989 UART: [art] SIG.R = 63E48999942700C6E9C2D3105608E655509CC3EC8CDE817173199BBDBD0623244863CF05AF7287733987BBB3E78DCF14
5,742,724 UART: [art] SIG.S = C0A9CC227D4425999AF0C215644EF77443B17237759F2DF604AD866D07172E03D75FFAA4D72E4E15AC786A085C585038
5,765,542 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,766,495 UART: mock_rt_interact::rt_entry...FMC Tester
6,048,135 UART: [rt] Runtime listening for mailbox commands...
6,050,170 >>> mbox cmd response data (336 bytes)
6,050,171 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,062,762 >>> mbox cmd response data (1536 bytes)
6,062,763 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,062,780 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,004 ready_for_fw is high
1,362,004 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,423,357 >>> mbox cmd response: success
2,423,357 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,484,887 UART:
2,484,903 UART: Running Caliptra FMC ...
2,485,311 UART:
2,485,454 UART: [state] CFI Enabled
2,496,177 UART: [fht] FMC Alias Private Key: 7
2,604,146 UART: [art] Extend RT PCRs Done
2,604,574 UART: [art] Lock RT PCRs Done
2,605,948 UART: [art] Populate DV Done
2,614,429 UART: [fht] FMC Alias Private Key: 7
2,615,405 UART: [art] Derive CDI
2,615,685 UART: [art] Store in in slot 0x4
2,701,384 UART: [art] Derive Key Pair
2,701,744 UART: [art] Store priv key in slot 0x5
2,715,018 UART: [art] Derive Key Pair - Done
2,729,932 UART: [art] Signing Cert with AUTHO
2,730,412 UART: RITY.KEYID = 7
2,745,718 UART: [art] Erasing AUTHORITY.KEYID = 7
2,746,483 UART: [art] PUB.X = 7DEDE4E020A0D4A20EB9C4C14AAC5E634DC7BF111DD9BE238767797FA636E78BDCAC94D94F8557415FD4BE81BA4CB609
2,753,269 UART: [art] PUB.Y = 2D02BEF1F7BF0C5FDD2DBA3D243D9931708AE7E1EE5D340545E95A936D3BA916CBEC49EA96079607959AFE71FC7E35E9
2,760,222 UART: [art] SIG.R = F0ACE4F190C93DC0D7ADCD789A139EB3EF071735CE1C5FD5BE40F3FA9D8CDA360B6E62848FC17D505944F886000C7086
2,766,977 UART: [art] SIG.S = 8BA69D967D104710FE86B08917855611CDFFDC1C0DAA96BECA0F2A64654020327D698B0ED5F467D9820DC554F13F0677
2,790,311 UART: mock_rt_interact::rt_entry...FMC Tester
2,898,716 UART: [rt] Runtime listening for mailbox commands...
2,902,106 >>> mbox cmd response data (2048 bytes)
2,902,107 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,903,339 >>> mbox cmd response data (336 bytes)
2,903,340 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,915,931 >>> mbox cmd response data (1536 bytes)
2,915,932 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
5,174,328 >>> mbox cmd response: success
5,187,737 UART:
5,187,753 UART: Running Caliptra FMC ...
5,188,161 UART:
5,188,304 UART: [state] CFI Enabled
5,277,821 UART: [art] Extend RT PCRs Done
5,278,249 UART: [art] Lock RT PCRs Done
5,279,364 UART: [art] Populate DV Done
5,287,739 UART: [fht] FMC Alias Private Key: 7
5,288,767 UART: [art] Derive CDI
5,289,047 UART: [art] Store in in slot 0x4
5,374,998 UART: [art] Derive Key Pair
5,375,358 UART: [art] Store priv key in slot 0x5
5,388,794 UART: [art] Derive Key Pair - Done
5,404,034 UART: [art] Signing Cert with AUTHO
5,404,514 UART: RITY.KEYID = 7
5,419,668 UART: [art] Erasing AUTHORITY.KEYID = 7
5,420,433 UART: [art] PUB.X = 72F95CA3AD64CFB65C5F194314C80633586E7CEA98BD6C3FF71BAA7F696F09E94E03476E053DBA65CC84A7BD81EFC9F5
5,427,209 UART: [art] PUB.Y = 826D04735843CF5A6F1D365654FBC8325539FA6C5AFF7B226EB9DC1A92A673BCE0FC0DB31ABF74DD7C767B8B7C2CD023
5,434,171 UART: [art] SIG.R = 1A1DE807CE4104DD9CE042D52638A0C1BC448BD4372E6F4926D034BEFFF2906CC03E30791FE8570DAF68E6F234700F07
5,440,934 UART: [art] SIG.S = F012222AC6C8C28F132718C17B8980814E73F0024A99B39CBEE98C91A8ACD2C93B7EF408E33F15A8C31DEDB1ACE40D20
5,463,825 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,464,862 UART: mock_rt_interact::rt_entry...FMC Tester
5,749,482 UART: [rt] Runtime listening for mailbox commands...
5,751,517 >>> mbox cmd response data (336 bytes)
5,751,518 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,764,109 >>> mbox cmd response data (1536 bytes)
5,764,110 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,764,127 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,212 UART: [kat] HMAC-384Kdf
922,858 UART: [kat] LMS
1,171,186 UART: [kat] --
1,172,111 UART: [cold-reset] ++
1,172,649 UART: [fht] FHT @ 0x50003400
1,175,126 UART: [idev] ++
1,175,294 UART: [idev] CDI.KEYID = 6
1,175,654 UART: [idev] SUBJECT.KEYID = 7
1,176,078 UART: [idev] UDS.KEYID = 0
1,176,423 ready_for_fw is high
1,176,423 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,184,590 UART: [idev] Erasing UDS.KEYID = 0
1,201,053 UART: [idev] Sha1 KeyId Algorithm
1,209,465 UART: [idev] --
1,210,531 UART: [ldev] ++
1,210,699 UART: [ldev] CDI.KEYID = 6
1,211,062 UART: [ldev] SUBJECT.KEYID = 5
1,211,488 UART: [ldev] AUTHORITY.KEYID = 7
1,211,951 UART: [ldev] FE.KEYID = 1
1,217,201 UART: [ldev] Erasing FE.KEYID = 1
1,243,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,105 UART: [ldev] --
1,282,536 UART: [fwproc] Wait for Commands...
1,283,106 UART: [fwproc] Recv command 0x46574c44
1,283,834 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,163,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,192,544 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,269,959 >>> mbox cmd response: success
2,269,959 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,271,003 UART: [afmc] ++
2,271,171 UART: [afmc] CDI.KEYID = 6
2,271,533 UART: [afmc] SUBJECT.KEYID = 7
2,271,958 UART: [afmc] AUTHORITY.KEYID = 5
2,306,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,323,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,324,060 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,788 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,341,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,349,198 UART: [afmc] --
2,350,114 UART: [cold-reset] --
2,350,994 UART: [state] Locking Datavault
2,352,279 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,883 UART: [state] Locking ICCM
2,353,525 UART: [exit] Launching FMC @ 0x40000130
2,358,854 UART:
2,358,870 UART: Running Caliptra FMC ...
2,359,278 UART:
2,359,332 UART: [state] CFI Enabled
2,369,801 UART: [fht] FMC Alias Private Key: 7
2,478,216 UART: [art] Extend RT PCRs Done
2,478,644 UART: [art] Lock RT PCRs Done
2,480,062 UART: [art] Populate DV Done
2,488,307 UART: [fht] FMC Alias Private Key: 7
2,489,295 UART: [art] Derive CDI
2,489,575 UART: [art] Store in in slot 0x4
2,575,552 UART: [art] Derive Key Pair
2,575,912 UART: [art] Store priv key in slot 0x5
2,588,728 UART: [art] Derive Key Pair - Done
2,603,533 UART: [art] Signing Cert with AUTHO
2,604,013 UART: RITY.KEYID = 7
2,618,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,619,672 UART: [art] PUB.X = 8488A46B5EB5CEF486FAC9C2F5399A2279906CB78E5E515E7A01CACEC2D7515B1B702DCDCEB22638CF942F5FC493D9D0
2,626,457 UART: [art] PUB.Y = 48B052185470B048173F8D4E9E8B0DF3DEDDF082F1E7FB7AB10C627ACDD82DFF707A3CBB307C0CA68156C99B3F316153
2,633,412 UART: [art] SIG.R = 45C62540F3AB4521C3F8B3BADFDB33AEB1CFEDAE115865583394E04BC6F8592FF11C317B4D5D0D15BFBB95BED234B09B
2,640,201 UART: [art] SIG.S = F75948DA27828AF6178F83879BAC0EA73FF2B16E19D549AB6F9243419BB16E88ADDC8BF6D96F6ACA1DE63FA6CF17BC8B
2,663,363 UART: mock_rt_interact::rt_entry...FMC Tester
2,770,821 UART: [rt] Runtime listening for mailbox commands...
2,774,211 >>> mbox cmd response data (2048 bytes)
2,774,212 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,775,444 >>> mbox cmd response data (336 bytes)
2,775,445 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,788,036 >>> mbox cmd response data (1536 bytes)
2,788,037 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,788,140 UART:
2,788,156 UART: Running Caliptra ROM ...
2,788,564 UART:
2,788,619 UART: [state] CFI Enabled
2,791,539 UART: [state] LifecycleState = Unprovisioned
2,792,194 UART: [state] DebugLocked = No
2,792,842 UART: [state] WD Timer not started. Device not locked for debugging
2,794,006 UART: [kat] SHA2-256
3,599,656 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,603,781 UART: [kat] ++
3,603,933 UART: [kat] sha1
3,608,045 UART: [kat] SHA2-256
3,609,985 UART: [kat] SHA2-384
3,612,556 UART: [kat] SHA2-512-ACC
3,614,456 UART: [kat] ECC-384
3,623,883 UART: [kat] HMAC-384Kdf
3,628,555 UART: [kat] LMS
3,876,883 UART: [kat] --
3,877,733 UART: [update-reset] ++
4,743,451 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,744,622 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,836,024 >>> mbox cmd response: success
4,836,229 UART: [update-reset] Copying MAN_2 To MAN_1
4,844,243 UART: [update-reset Success] --
4,845,284 UART: [state] Locking Datavault
4,845,890 UART: [state] Locking PCR0, PCR1 and PCR31
4,846,494 UART: [state] Locking ICCM
4,846,958 UART: [exit] Launching FMC @ 0x40000130
4,852,287 UART:
4,852,303 UART: Running Caliptra FMC ...
4,852,711 UART:
4,852,765 UART: [state] CFI Enabled
4,942,024 UART: [art] Extend RT PCRs Done
4,942,452 UART: [art] Lock RT PCRs Done
4,943,925 UART: [art] Populate DV Done
4,952,086 UART: [fht] FMC Alias Private Key: 7
4,953,026 UART: [art] Derive CDI
4,953,306 UART: [art] Store in in slot 0x4
5,038,753 UART: [art] Derive Key Pair
5,039,113 UART: [art] Store priv key in slot 0x5
5,051,945 UART: [art] Derive Key Pair - Done
5,066,593 UART: [art] Signing Cert with AUTHO
5,067,073 UART: RITY.KEYID = 7
5,082,317 UART: [art] Erasing AUTHORITY.KEYID = 7
5,083,082 UART: [art] PUB.X = B59B71D2F864C2EEB51CEF35A9D4908B5FD8A192442B82BE7E2E98A86E83096B597FFAAC7FFBD30BB903F9FFD275C870
5,089,863 UART: [art] PUB.Y = 3378B05DA7331A59F00FFF597D110B2FB512D7C12CC4CA24AF633D5B08B6777E1B55366A122E490CAFE0E740555F39B6
5,096,807 UART: [art] SIG.R = CEB391903CE63A4214FF1BD419D0841797262000C13129EBF736DB512AA554F302DB3D650AC8BEB9A733933695EC6A0F
5,103,550 UART: [art] SIG.S = F523B76C87BE3AB176DE7788C227F8BE2AF14A90389332ABB56DF180E261EBB52566781AFCE661CA775A7182BBAED44D
5,126,054 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,127,079 UART: mock_rt_interact::rt_entry...FMC Tester
5,408,568 UART: [rt] Runtime listening for mailbox commands...
5,410,603 >>> mbox cmd response data (336 bytes)
5,410,604 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,423,195 >>> mbox cmd response data (1536 bytes)
5,423,196 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,423,213 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,083 ready_for_fw is high
1,061,083 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,121,944 >>> mbox cmd response: success
2,121,944 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,184,370 UART:
2,184,386 UART: Running Caliptra FMC ...
2,184,794 UART:
2,184,848 UART: [state] CFI Enabled
2,195,231 UART: [fht] FMC Alias Private Key: 7
2,303,218 UART: [art] Extend RT PCRs Done
2,303,646 UART: [art] Lock RT PCRs Done
2,305,150 UART: [art] Populate DV Done
2,313,405 UART: [fht] FMC Alias Private Key: 7
2,314,493 UART: [art] Derive CDI
2,314,773 UART: [art] Store in in slot 0x4
2,400,290 UART: [art] Derive Key Pair
2,400,650 UART: [art] Store priv key in slot 0x5
2,413,678 UART: [art] Derive Key Pair - Done
2,428,350 UART: [art] Signing Cert with AUTHO
2,428,830 UART: RITY.KEYID = 7
2,444,158 UART: [art] Erasing AUTHORITY.KEYID = 7
2,444,923 UART: [art] PUB.X = 4E7467948B1110EB1A4E02946D43144FD6C1B0D745F62BAD2175F3AF5F3923792669627F178244C0215A61FAA4AC03D1
2,451,683 UART: [art] PUB.Y = C559BEA507D6829ABC8B369AB08F68D2EBEBAE70E083DEB8CB3621B88EFD26CDB9F6E41E44BC6CC6816B94C5E7D84543
2,458,654 UART: [art] SIG.R = 5BD80086B85F2F2929A5AA4920643F3F47402AC8DE40B5594BACB50919EEB865658777E9AE65A1B0875405E1E1CF9DB5
2,465,400 UART: [art] SIG.S = 7E153E88C02922579FA4EEA3A83371A3C1C22CEA028B600FD05DB4C7ADD6804C35C416364AA5440ED29A5F6676D7DECE
2,489,274 UART: mock_rt_interact::rt_entry...FMC Tester
2,597,278 UART: [rt] Runtime listening for mailbox commands...
2,600,668 >>> mbox cmd response data (2048 bytes)
2,600,669 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,601,901 >>> mbox cmd response data (336 bytes)
2,601,902 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,614,493 >>> mbox cmd response data (1536 bytes)
2,614,494 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,547,808 >>> mbox cmd response: success
4,561,124 UART:
4,561,140 UART: Running Caliptra FMC ...
4,561,548 UART:
4,561,602 UART: [state] CFI Enabled
4,649,683 UART: [art] Extend RT PCRs Done
4,650,111 UART: [art] Lock RT PCRs Done
4,651,358 UART: [art] Populate DV Done
4,659,557 UART: [fht] FMC Alias Private Key: 7
4,660,657 UART: [art] Derive CDI
4,660,937 UART: [art] Store in in slot 0x4
4,746,760 UART: [art] Derive Key Pair
4,747,120 UART: [art] Store priv key in slot 0x5
4,760,494 UART: [art] Derive Key Pair - Done
4,775,494 UART: [art] Signing Cert with AUTHO
4,775,974 UART: RITY.KEYID = 7
4,791,466 UART: [art] Erasing AUTHORITY.KEYID = 7
4,792,231 UART: [art] PUB.X = E658A6D2A97979D68E01EB9952CED655B04B082A345F90D44FE9A717CCF31A86CD190C98C8624F42B2744D71D957308C
4,798,994 UART: [art] PUB.Y = B7D8D80054E6A6C36E65450FBD25EFF3C05FD8962D2ED3A4FB2F55BF893B47EC929C9B2657FA7A0A868F15FFD25035DF
4,805,934 UART: [art] SIG.R = F982AF775C1475926AF3663CCCD10CE8047C7EE5CFAE33E48E0B67C874BF3FC82677BAD0B4DABB0AD5E2BF535604DC8C
4,812,713 UART: [art] SIG.S = E0520A173F4A1719690D5BBA5894E8867B01B3375418487049AECE6A27AA71442E7F229DDEAE3F54A9B0F9717E35ABDA
4,835,338 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,836,345 UART: mock_rt_interact::rt_entry...FMC Tester
5,113,474 UART: [rt] Runtime listening for mailbox commands...
5,115,509 >>> mbox cmd response data (336 bytes)
5,115,510 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,128,101 >>> mbox cmd response data (1536 bytes)
5,128,102 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,128,119 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
87,020 UART: [state] WD Timer not started. Device not locked for debugging
88,345 UART: [kat] SHA2-256
893,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,120 UART: [kat] ++
898,272 UART: [kat] sha1
902,628 UART: [kat] SHA2-256
904,568 UART: [kat] SHA2-384
907,289 UART: [kat] SHA2-512-ACC
909,190 UART: [kat] ECC-384
919,195 UART: [kat] HMAC-384Kdf
923,797 UART: [kat] LMS
1,172,125 UART: [kat] --
1,173,154 UART: [cold-reset] ++
1,173,616 UART: [fht] FHT @ 0x50003400
1,176,219 UART: [idev] ++
1,176,387 UART: [idev] CDI.KEYID = 6
1,176,747 UART: [idev] SUBJECT.KEYID = 7
1,177,171 UART: [idev] UDS.KEYID = 0
1,177,516 ready_for_fw is high
1,177,516 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,185,285 UART: [idev] Erasing UDS.KEYID = 0
1,202,208 UART: [idev] Sha1 KeyId Algorithm
1,210,646 UART: [idev] --
1,211,858 UART: [ldev] ++
1,212,026 UART: [ldev] CDI.KEYID = 6
1,212,389 UART: [ldev] SUBJECT.KEYID = 5
1,212,815 UART: [ldev] AUTHORITY.KEYID = 7
1,213,278 UART: [ldev] FE.KEYID = 1
1,218,608 UART: [ldev] Erasing FE.KEYID = 1
1,245,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,330 UART: [ldev] --
1,284,631 UART: [fwproc] Wait for Commands...
1,285,215 UART: [fwproc] Recv command 0x46574c44
1,285,943 UART: [fwproc] Recv'd Img size: 75384 bytes
2,137,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,164,641 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,193,945 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,271,222 >>> mbox cmd response: success
2,271,222 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,272,246 UART: [afmc] ++
2,272,414 UART: [afmc] CDI.KEYID = 6
2,272,776 UART: [afmc] SUBJECT.KEYID = 7
2,273,201 UART: [afmc] AUTHORITY.KEYID = 5
2,309,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,325,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,326,005 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,331,733 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,337,618 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,343,337 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,351,311 UART: [afmc] --
2,352,299 UART: [cold-reset] --
2,353,281 UART: [state] Locking Datavault
2,354,304 UART: [state] Locking PCR0, PCR1 and PCR31
2,354,908 UART: [state] Locking ICCM
2,355,434 UART: [exit] Launching FMC @ 0x40000130
2,360,763 UART:
2,360,779 UART: Running Caliptra FMC ...
2,361,187 UART:
2,361,330 UART: [state] CFI Enabled
2,372,351 UART: [fht] FMC Alias Private Key: 7
2,480,838 UART: [art] Extend RT PCRs Done
2,481,266 UART: [art] Lock RT PCRs Done
2,482,914 UART: [art] Populate DV Done
2,491,261 UART: [fht] FMC Alias Private Key: 7
2,492,365 UART: [art] Derive CDI
2,492,645 UART: [art] Store in in slot 0x4
2,578,356 UART: [art] Derive Key Pair
2,578,716 UART: [art] Store priv key in slot 0x5
2,592,360 UART: [art] Derive Key Pair - Done
2,606,716 UART: [art] Signing Cert with AUTHO
2,607,196 UART: RITY.KEYID = 7
2,622,688 UART: [art] Erasing AUTHORITY.KEYID = 7
2,623,453 UART: [art] PUB.X = 3D488B42699699BA33FFCE140F6C107EA85CE838C2C761D866B21ACC248B766C3FD5A06432B46A60D75B5520A6B5D6F4
2,630,226 UART: [art] PUB.Y = BB3B6287F51652F51A06E344A251D635E13D08334B4C3B42D5DCCA01531EFCA4545B340A1150DEBA8324C632D208AA12
2,637,165 UART: [art] SIG.R = A717EEC0B62B9D0F136F6E14C934E7B6CE135F93DF9F1521B3039CAEA9FFE34D27D08C7DE7882176EDB11179EAC58701
2,643,940 UART: [art] SIG.S = 3488E68CA067E69E30647835EB317FA4387FBB5E1ACD2B6CAE9264A7631A331F4A4E01A463419E1FB3FDA7B548FE1D7D
2,667,354 UART: mock_rt_interact::rt_entry...FMC Tester
2,773,678 UART: [rt] Runtime listening for mailbox commands...
2,777,068 >>> mbox cmd response data (2048 bytes)
2,777,069 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,778,301 >>> mbox cmd response data (336 bytes)
2,778,302 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,790,893 >>> mbox cmd response data (1536 bytes)
2,790,894 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,790,997 UART:
2,791,013 UART: Running Caliptra ROM ...
2,791,421 UART:
2,791,563 UART: [state] CFI Enabled
2,794,319 UART: [state] LifecycleState = Unprovisioned
2,794,974 UART: [state] DebugLocked = No
2,795,560 UART: [state] WD Timer not started. Device not locked for debugging
2,796,738 UART: [kat] SHA2-256
3,602,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,606,513 UART: [kat] ++
3,606,665 UART: [kat] sha1
3,611,029 UART: [kat] SHA2-256
3,612,969 UART: [kat] SHA2-384
3,615,846 UART: [kat] SHA2-512-ACC
3,617,746 UART: [kat] ECC-384
3,627,587 UART: [kat] HMAC-384Kdf
3,632,113 UART: [kat] LMS
3,880,441 UART: [kat] --
3,881,305 UART: [update-reset] ++
4,748,233 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,749,346 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,840,748 >>> mbox cmd response: success
4,840,871 UART: [update-reset] Copying MAN_2 To MAN_1
4,848,885 UART: [update-reset Success] --
4,849,850 UART: [state] Locking Datavault
4,850,704 UART: [state] Locking PCR0, PCR1 and PCR31
4,851,308 UART: [state] Locking ICCM
4,851,962 UART: [exit] Launching FMC @ 0x40000130
4,857,291 UART:
4,857,307 UART: Running Caliptra FMC ...
4,857,715 UART:
4,857,858 UART: [state] CFI Enabled
4,946,747 UART: [art] Extend RT PCRs Done
4,947,175 UART: [art] Lock RT PCRs Done
4,948,350 UART: [art] Populate DV Done
4,956,961 UART: [fht] FMC Alias Private Key: 7
4,957,995 UART: [art] Derive CDI
4,958,275 UART: [art] Store in in slot 0x4
5,043,560 UART: [art] Derive Key Pair
5,043,920 UART: [art] Store priv key in slot 0x5
5,057,332 UART: [art] Derive Key Pair - Done
5,072,266 UART: [art] Signing Cert with AUTHO
5,072,746 UART: RITY.KEYID = 7
5,087,738 UART: [art] Erasing AUTHORITY.KEYID = 7
5,088,503 UART: [art] PUB.X = 9EE3D0C741786A12B35AC9232DE88D6CE49DF7B16F81D75A788474B1A45A58655A16C0E8D7B46ADA7EA46A85BF344DDB
5,095,287 UART: [art] PUB.Y = 66B8380B4046FBA73D908FF3D1F3D998ABA32396E302A2FD0F8BB15E2016E7F35B102FF28EDF06AA6227B55A1C5C6E6B
5,102,239 UART: [art] SIG.R = EFFA6BEF18378A80F2D6AC1704CAC117FFAA29601D7A8B853FF744E30804CFE424BBB1C95DA727BAEB19DE94ECD5BD1C
5,109,030 UART: [art] SIG.S = 5B42103511D9622570837BDC5E2FDD57988647DE6D92F750AF9853BE8D627E24F4DA9DAAD93FD05F9435244ABB991357
5,131,984 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,132,953 UART: mock_rt_interact::rt_entry...FMC Tester
5,416,069 UART: [rt] Runtime listening for mailbox commands...
5,418,104 >>> mbox cmd response data (336 bytes)
5,418,105 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,430,696 >>> mbox cmd response data (1536 bytes)
5,430,697 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,430,714 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,908 ready_for_fw is high
1,059,908 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,124,575 >>> mbox cmd response: success
2,124,575 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,187,325 UART:
2,187,341 UART: Running Caliptra FMC ...
2,187,749 UART:
2,187,892 UART: [state] CFI Enabled
2,198,441 UART: [fht] FMC Alias Private Key: 7
2,306,478 UART: [art] Extend RT PCRs Done
2,306,906 UART: [art] Lock RT PCRs Done
2,308,508 UART: [art] Populate DV Done
2,316,965 UART: [fht] FMC Alias Private Key: 7
2,318,017 UART: [art] Derive CDI
2,318,297 UART: [art] Store in in slot 0x4
2,403,864 UART: [art] Derive Key Pair
2,404,224 UART: [art] Store priv key in slot 0x5
2,417,328 UART: [art] Derive Key Pair - Done
2,431,988 UART: [art] Signing Cert with AUTHO
2,432,468 UART: RITY.KEYID = 7
2,447,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,448,599 UART: [art] PUB.X = EF25212FFEC24F845D7D0EEA9DBD0C94554F626EF24BD76A6D8C32D371963F951A751122FFC8B0694248F9CAC7780207
2,455,365 UART: [art] PUB.Y = 51308A6494D04EB287E0CB8A509E5B2F8470BB0A5481CE58E243460C29D95E03ED45DD95EA0B9AAA819AA0F5E7936E50
2,462,311 UART: [art] SIG.R = D6F3A4C1D997E69E08BD5C600ABBF2ED3A8342C8E8148695FEF77D65BA4C30C62C8EB2CE355F27BAB1332319AD1BD556
2,469,093 UART: [art] SIG.S = 5942596B22DB235998C596DAFFB57749452B4FFBA5213CDB2C0F78B823B0719FDA6F6B1669C5270ACB8579F242691106
2,492,395 UART: mock_rt_interact::rt_entry...FMC Tester
2,600,641 UART: [rt] Runtime listening for mailbox commands...
2,604,031 >>> mbox cmd response data (2048 bytes)
2,604,032 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,605,264 >>> mbox cmd response data (336 bytes)
2,605,265 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,617,856 >>> mbox cmd response data (1536 bytes)
2,617,857 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,550,200 >>> mbox cmd response: success
4,563,460 UART:
4,563,476 UART: Running Caliptra FMC ...
4,563,884 UART:
4,564,027 UART: [state] CFI Enabled
4,653,044 UART: [art] Extend RT PCRs Done
4,653,472 UART: [art] Lock RT PCRs Done
4,654,731 UART: [art] Populate DV Done
4,663,232 UART: [fht] FMC Alias Private Key: 7
4,664,366 UART: [art] Derive CDI
4,664,646 UART: [art] Store in in slot 0x4
4,750,407 UART: [art] Derive Key Pair
4,750,767 UART: [art] Store priv key in slot 0x5
4,764,109 UART: [art] Derive Key Pair - Done
4,778,667 UART: [art] Signing Cert with AUTHO
4,779,147 UART: RITY.KEYID = 7
4,794,359 UART: [art] Erasing AUTHORITY.KEYID = 7
4,795,124 UART: [art] PUB.X = A3116740A4E1496D1403EA42A882B69E8615FACAE08CF2B213B679C787BF9FCD61A310F5EB16423DC4B6C3911BD86EB2
4,801,901 UART: [art] PUB.Y = 317239C4676A9C661B29796DFCCBBB103E829143E93A4345352391B3872E369812E2A79EAD399F19F2A8CF14A6CDB439
4,808,849 UART: [art] SIG.R = 0BB3E663AF83DAE5D144E805FF9B4BFD2E48742C33907197030C284E03F20955E9F276016CD19E45DE20F9C330E22F57
4,815,600 UART: [art] SIG.S = 706B37FEAD9950EEC4E7D4D625DC2FD088D399C8AAB66A329302F45973F576BCCC2DC45F513788ABF6642D9314B3B0F0
4,838,099 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,839,066 UART: mock_rt_interact::rt_entry...FMC Tester
5,119,204 UART: [rt] Runtime listening for mailbox commands...
5,121,239 >>> mbox cmd response data (336 bytes)
5,121,240 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,133,831 >>> mbox cmd response data (1536 bytes)
5,133,832 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,133,849 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,107 UART: [kat] ++
895,259 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,524 UART: [kat] HMAC-384Kdf
920,112 UART: [kat] LMS
1,168,424 UART: [kat] --
1,169,539 UART: [cold-reset] ++
1,170,015 UART: [fht] FHT @ 0x50003400
1,172,709 UART: [idev] ++
1,172,877 UART: [idev] CDI.KEYID = 6
1,173,238 UART: [idev] SUBJECT.KEYID = 7
1,173,663 UART: [idev] UDS.KEYID = 0
1,174,009 ready_for_fw is high
1,174,009 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,181,437 UART: [idev] Erasing UDS.KEYID = 0
1,198,077 UART: [idev] Sha1 KeyId Algorithm
1,206,811 UART: [idev] --
1,207,854 UART: [ldev] ++
1,208,022 UART: [ldev] CDI.KEYID = 6
1,208,386 UART: [ldev] SUBJECT.KEYID = 5
1,208,813 UART: [ldev] AUTHORITY.KEYID = 7
1,209,276 UART: [ldev] FE.KEYID = 1
1,214,372 UART: [ldev] Erasing FE.KEYID = 1
1,240,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,728 UART: [ldev] --
1,280,036 UART: [fwproc] Wait for Commands...
1,280,737 UART: [fwproc] Recv command 0x46574c44
1,281,470 UART: [fwproc] Recv'd Img size: 75384 bytes
2,133,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,160,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,189,483 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,266,759 >>> mbox cmd response: success
2,266,759 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,267,980 UART: [afmc] ++
2,268,148 UART: [afmc] CDI.KEYID = 6
2,268,511 UART: [afmc] SUBJECT.KEYID = 7
2,268,937 UART: [afmc] AUTHORITY.KEYID = 5
2,304,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,321,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,322,225 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,327,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,333,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,339,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,347,577 UART: [afmc] --
2,348,543 UART: [cold-reset] --
2,349,545 UART: [state] Locking Datavault
2,350,896 UART: [state] Locking PCR0, PCR1 and PCR31
2,351,500 UART: [state] Locking ICCM
2,352,158 UART: [exit] Launching FMC @ 0x40000130
2,357,487 UART:
2,357,503 UART: Running Caliptra FMC ...
2,357,911 UART:
2,357,965 UART: [state] CFI Enabled
2,368,428 UART: [fht] FMC Alias Private Key: 7
2,476,089 UART: [art] Extend RT PCRs Done
2,476,517 UART: [art] Lock RT PCRs Done
2,478,111 UART: [art] Populate DV Done
2,486,260 UART: [fht] FMC Alias Private Key: 7
2,487,360 UART: [art] Derive CDI
2,487,640 UART: [art] Store in in slot 0x4
2,573,643 UART: [art] Derive Key Pair
2,574,003 UART: [art] Store priv key in slot 0x5
2,587,039 UART: [art] Derive Key Pair - Done
2,601,997 UART: [art] Signing Cert with AUTHO
2,602,477 UART: RITY.KEYID = 7
2,617,795 UART: [art] Erasing AUTHORITY.KEYID = 7
2,618,560 UART: [art] PUB.X = 57CE8A948475C4D43F14C1A9D08C2294A60F010CEB2A763BF5D5D0BEF6276F80F197EFF5C4A9991F107495486B0AFBBF
2,625,330 UART: [art] PUB.Y = 434099C7ABE554C427E970CCB2919FE9CF605665BE8DE99976699397A3BDC6E5531E28DD91FE5D09BBC44910B168D69D
2,632,283 UART: [art] SIG.R = 17CFF11B3C10AB328B8F1D3F89DCAE4029C92E7321D58060AAC5817850CB734B8A26D4E1679DC2B3F8D7ECF200770122
2,639,036 UART: [art] SIG.S = 72720DE33AB666337FE0D39BEE3CD479E4D05C6B6B7B23F0AB69EEA1651B235EF86AE26009234D3CC7A76BBDFB576CF5
2,662,909 UART: mock_rt_interact::rt_entry...FMC Tester
2,770,909 UART: [rt] Runtime listening for mailbox commands...
2,774,299 >>> mbox cmd response data (2048 bytes)
2,774,300 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,775,532 >>> mbox cmd response data (336 bytes)
2,775,533 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,788,124 >>> mbox cmd response data (1536 bytes)
2,788,125 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,788,228 UART:
2,788,244 UART: Running Caliptra ROM ...
2,788,652 UART:
2,788,707 UART: [state] CFI Enabled
2,791,601 UART: [state] LifecycleState = Unprovisioned
2,792,256 UART: [state] DebugLocked = No
2,792,970 UART: [state] WD Timer not started. Device not locked for debugging
2,794,192 UART: [kat] SHA2-256
3,597,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,601,871 UART: [kat] ++
3,602,023 UART: [kat] sha1
3,606,393 UART: [kat] SHA2-256
3,608,333 UART: [kat] SHA2-384
3,611,128 UART: [kat] SHA2-512-ACC
3,613,028 UART: [kat] ECC-384
3,622,677 UART: [kat] HMAC-384Kdf
3,627,359 UART: [kat] LMS
3,875,671 UART: [kat] --
3,876,747 UART: [update-reset] ++
4,744,142 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,745,227 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,836,629 >>> mbox cmd response: success
4,836,752 UART: [update-reset] Copying MAN_2 To MAN_1
4,844,766 UART: [update-reset Success] --
4,845,855 UART: [state] Locking Datavault
4,846,501 UART: [state] Locking PCR0, PCR1 and PCR31
4,847,105 UART: [state] Locking ICCM
4,847,755 UART: [exit] Launching FMC @ 0x40000130
4,853,084 UART:
4,853,100 UART: Running Caliptra FMC ...
4,853,508 UART:
4,853,562 UART: [state] CFI Enabled
4,942,499 UART: [art] Extend RT PCRs Done
4,942,927 UART: [art] Lock RT PCRs Done
4,944,176 UART: [art] Populate DV Done
4,952,551 UART: [fht] FMC Alias Private Key: 7
4,953,603 UART: [art] Derive CDI
4,953,883 UART: [art] Store in in slot 0x4
5,039,670 UART: [art] Derive Key Pair
5,040,030 UART: [art] Store priv key in slot 0x5
5,052,682 UART: [art] Derive Key Pair - Done
5,067,580 UART: [art] Signing Cert with AUTHO
5,068,060 UART: RITY.KEYID = 7
5,083,036 UART: [art] Erasing AUTHORITY.KEYID = 7
5,083,801 UART: [art] PUB.X = BFE02FC3268811C07B1CB97DFFDD6D1AFA8E2373B2A483832E8F9FAF492E535727AD60605A9DEDE41537337D9837400E
5,090,578 UART: [art] PUB.Y = 9D1416766DA3A394D56F999E2A49CFBAA7DAE50552FF966EDAF817F0F113E4714E50243307A33AA064D41FE453F78315
5,097,526 UART: [art] SIG.R = D7F1351A96A87F134D27FD574F0E75C0E28EED4EF3B69BD161BB35F927EF0856141B7D5F195A11858328425255650660
5,104,283 UART: [art] SIG.S = 6CA806F64805DBEA57383650DB6198D3152D56EEC8DE2D04C1531046B047463EBDDA1EC5449A7741CAADAA80EA531E17
5,127,098 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,128,065 UART: mock_rt_interact::rt_entry...FMC Tester
5,409,419 UART: [rt] Runtime listening for mailbox commands...
5,411,454 >>> mbox cmd response data (336 bytes)
5,411,455 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,424,046 >>> mbox cmd response data (1536 bytes)
5,424,047 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,424,064 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,460 ready_for_fw is high
1,056,460 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,118,283 >>> mbox cmd response: success
2,118,283 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,180,501 UART:
2,180,517 UART: Running Caliptra FMC ...
2,180,925 UART:
2,180,979 UART: [state] CFI Enabled
2,191,198 UART: [fht] FMC Alias Private Key: 7
2,299,803 UART: [art] Extend RT PCRs Done
2,300,231 UART: [art] Lock RT PCRs Done
2,301,615 UART: [art] Populate DV Done
2,309,774 UART: [fht] FMC Alias Private Key: 7
2,310,750 UART: [art] Derive CDI
2,311,030 UART: [art] Store in in slot 0x4
2,396,825 UART: [art] Derive Key Pair
2,397,185 UART: [art] Store priv key in slot 0x5
2,409,759 UART: [art] Derive Key Pair - Done
2,424,513 UART: [art] Signing Cert with AUTHO
2,424,993 UART: RITY.KEYID = 7
2,439,909 UART: [art] Erasing AUTHORITY.KEYID = 7
2,440,674 UART: [art] PUB.X = 488E707DD72E14B4F96D834E1FCB37317BBF280DE5A26B9FC26EB25A75E267486514844015A44F5B149D2A17C7EBBEEF
2,447,451 UART: [art] PUB.Y = 72C1349629141CD2A8348C827DC521F3C0501C829FBA1C7DB7CDC50BDD0B1B26965AC09F8652F84EDEEA76BDBF1E643B
2,454,411 UART: [art] SIG.R = BE3AFA60397591193A251A795F9B3142A4F7B029551BDA76C1FE955353EE59B8651865496BE6BFFB3F310FC1227079CC
2,461,180 UART: [art] SIG.S = 124B44B3F5E87931A784E59D2410C8772E28663F8CB6A7B56836A13CBEE27723B8BCCF47AB8E6B1B33F2852B15CDD3F1
2,484,961 UART: mock_rt_interact::rt_entry...FMC Tester
2,592,751 UART: [rt] Runtime listening for mailbox commands...
2,596,141 >>> mbox cmd response data (2048 bytes)
2,596,142 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,597,374 >>> mbox cmd response data (336 bytes)
2,597,375 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,609,966 >>> mbox cmd response data (1536 bytes)
2,609,967 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,537,564 >>> mbox cmd response: success
4,551,106 UART:
4,551,122 UART: Running Caliptra FMC ...
4,551,530 UART:
4,551,584 UART: [state] CFI Enabled
4,640,643 UART: [art] Extend RT PCRs Done
4,641,071 UART: [art] Lock RT PCRs Done
4,642,322 UART: [art] Populate DV Done
4,650,349 UART: [fht] FMC Alias Private Key: 7
4,651,355 UART: [art] Derive CDI
4,651,635 UART: [art] Store in in slot 0x4
4,737,414 UART: [art] Derive Key Pair
4,737,774 UART: [art] Store priv key in slot 0x5
4,751,236 UART: [art] Derive Key Pair - Done
4,765,577 UART: [art] Signing Cert with AUTHO
4,766,057 UART: RITY.KEYID = 7
4,781,069 UART: [art] Erasing AUTHORITY.KEYID = 7
4,781,834 UART: [art] PUB.X = B7B97821E803773052A6EC11114198BEA7DB63D1EA61047A6253873FE7ADCA9247902FBBAF7066AE7BF454FDF1B6E9EE
4,788,610 UART: [art] PUB.Y = F6281335005FE93B705966BEDD817BE75E31A0BAB78AAD64DCA0CE64382F27F28571467E10DF82A17DF6C2D908749FF9
4,795,543 UART: [art] SIG.R = EFCD260A7467B1CE418AB192E88F8FEEC52B9383C7D919CAC9A14AB9DC3356296A94861CFB67B95D13DF68624D80C428
4,802,322 UART: [art] SIG.S = 3040906B12DA51A17C5806046EEBDAF104366BCAF0A4E2B58B93BF083B9F769714BD788943A95E670A0A03CBBB700133
4,824,960 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,825,655 UART: mock_rt_interact::rt_entry...FMC Tester
5,108,311 UART: [rt] Runtime listening for mailbox commands...
5,110,346 >>> mbox cmd response data (336 bytes)
5,110,347 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,122,938 >>> mbox cmd response data (1536 bytes)
5,122,939 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,122,956 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,539 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,170,438 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,174,916 ready_for_fw is high
1,174,916 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,604 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,421 UART: [ldev] ++
1,209,589 UART: [ldev] CDI.KEYID = 6
1,209,953 UART: [ldev] SUBJECT.KEYID = 5
1,210,380 UART: [ldev] AUTHORITY.KEYID = 7
1,210,843 UART: [ldev] FE.KEYID = 1
1,216,245 UART: [ldev] Erasing FE.KEYID = 1
1,242,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,703 UART: [fwproc] Wait for Commands...
1,282,374 UART: [fwproc] Recv command 0x46574c44
1,283,107 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,162,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,402 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,268,808 >>> mbox cmd response: success
2,268,808 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,883 UART: [afmc] ++
2,270,051 UART: [afmc] CDI.KEYID = 6
2,270,414 UART: [afmc] SUBJECT.KEYID = 7
2,270,840 UART: [afmc] AUTHORITY.KEYID = 5
2,306,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,323,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,703 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,586 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,341,305 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,349,374 UART: [afmc] --
2,350,372 UART: [cold-reset] --
2,351,078 UART: [state] Locking Datavault
2,352,419 UART: [state] Locking PCR0, PCR1 and PCR31
2,353,023 UART: [state] Locking ICCM
2,353,637 UART: [exit] Launching FMC @ 0x40000130
2,358,966 UART:
2,358,982 UART: Running Caliptra FMC ...
2,359,390 UART:
2,359,533 UART: [state] CFI Enabled
2,370,206 UART: [fht] FMC Alias Private Key: 7
2,478,735 UART: [art] Extend RT PCRs Done
2,479,163 UART: [art] Lock RT PCRs Done
2,480,511 UART: [art] Populate DV Done
2,488,856 UART: [fht] FMC Alias Private Key: 7
2,489,828 UART: [art] Derive CDI
2,490,108 UART: [art] Store in in slot 0x4
2,575,829 UART: [art] Derive Key Pair
2,576,189 UART: [art] Store priv key in slot 0x5
2,588,849 UART: [art] Derive Key Pair - Done
2,603,437 UART: [art] Signing Cert with AUTHO
2,603,917 UART: RITY.KEYID = 7
2,618,735 UART: [art] Erasing AUTHORITY.KEYID = 7
2,619,500 UART: [art] PUB.X = F2AA30D41D561B4FC6046978E6D3B109B5A16125B03D55A262C103E261A68B1930B5B61C8ED93BBE9EEDF4BBCB35C1FC
2,626,277 UART: [art] PUB.Y = F34879504AA60B8BB1E97153F374D739A8B79B6FA0665CF31FEBA9E0022B7DCBA9A8F78FEC074A434661B755F72E1B34
2,633,228 UART: [art] SIG.R = CEBFC44D7A21142BCB34208370944D2027CAAAAFA20BF38EBA9191A20C6ACC721DAF4E66FFFAD73ACBA3EBC09C4A92C3
2,640,024 UART: [art] SIG.S = 67286F3E71823D075E050446B8018C2A0686599638FE0A639095EE2451E93D8C68AE57502EB89906F100085E3083A536
2,664,323 UART: mock_rt_interact::rt_entry...FMC Tester
2,771,407 UART: [rt] Runtime listening for mailbox commands...
2,774,797 >>> mbox cmd response data (2048 bytes)
2,774,798 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,776,030 >>> mbox cmd response data (336 bytes)
2,776,031 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,788,622 >>> mbox cmd response data (1536 bytes)
2,788,623 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,788,726 UART:
2,788,742 UART: Running Caliptra ROM ...
2,789,150 UART:
2,789,292 UART: [state] CFI Enabled
2,792,450 UART: [state] LifecycleState = Unprovisioned
2,793,105 UART: [state] DebugLocked = No
2,793,771 UART: [state] WD Timer not started. Device not locked for debugging
2,794,957 UART: [kat] SHA2-256
3,598,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,602,636 UART: [kat] ++
3,602,788 UART: [kat] sha1
3,607,038 UART: [kat] SHA2-256
3,608,978 UART: [kat] SHA2-384
3,611,711 UART: [kat] SHA2-512-ACC
3,613,611 UART: [kat] ECC-384
3,623,048 UART: [kat] HMAC-384Kdf
3,627,826 UART: [kat] LMS
3,876,138 UART: [kat] --
3,876,948 UART: [update-reset] ++
4,744,469 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,745,546 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,836,948 >>> mbox cmd response: success
4,837,061 UART: [update-reset] Copying MAN_2 To MAN_1
4,845,075 UART: [update-reset Success] --
4,846,002 UART: [state] Locking Datavault
4,846,592 UART: [state] Locking PCR0, PCR1 and PCR31
4,847,196 UART: [state] Locking ICCM
4,847,694 UART: [exit] Launching FMC @ 0x40000130
4,853,023 UART:
4,853,039 UART: Running Caliptra FMC ...
4,853,447 UART:
4,853,590 UART: [state] CFI Enabled
4,942,581 UART: [art] Extend RT PCRs Done
4,943,009 UART: [art] Lock RT PCRs Done
4,944,272 UART: [art] Populate DV Done
4,952,421 UART: [fht] FMC Alias Private Key: 7
4,953,411 UART: [art] Derive CDI
4,953,691 UART: [art] Store in in slot 0x4
5,039,252 UART: [art] Derive Key Pair
5,039,612 UART: [art] Store priv key in slot 0x5
5,053,116 UART: [art] Derive Key Pair - Done
5,068,019 UART: [art] Signing Cert with AUTHO
5,068,499 UART: RITY.KEYID = 7
5,083,525 UART: [art] Erasing AUTHORITY.KEYID = 7
5,084,290 UART: [art] PUB.X = ED3D87C0382FD12A2E350042DF911ACBD84C307C2C784520B675287831FDBB2C3481D74413C0870F0F17DCE9371AB3C0
5,091,036 UART: [art] PUB.Y = 9EAD9AD61F6B0FB2352D2B7090B31B948A6ACDB632C266E2E2D3577F22E6ED8517275E440C9713F521C3DCBE05D14B88
5,097,987 UART: [art] SIG.R = 3FA941EC6406CB21563230D80576B0EF73F4DFFC7C44FE425C85C3565FD180C635ED9C4E457C2A3BB98C43AD6668D437
5,104,759 UART: [art] SIG.S = B58A7CD9A73D823EBC7375C1C2D5A0BFF1791862541F700B7B0B6F76BA3680A2A1A88918416BAF04056A899897628727
5,127,785 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,128,694 UART: mock_rt_interact::rt_entry...FMC Tester
5,408,412 UART: [rt] Runtime listening for mailbox commands...
5,410,447 >>> mbox cmd response data (336 bytes)
5,410,448 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,423,039 >>> mbox cmd response data (1536 bytes)
5,423,040 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,423,057 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,593 ready_for_fw is high
1,056,593 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,118,512 >>> mbox cmd response: success
2,118,512 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,181,286 UART:
2,181,302 UART: Running Caliptra FMC ...
2,181,710 UART:
2,181,853 UART: [state] CFI Enabled
2,192,376 UART: [fht] FMC Alias Private Key: 7
2,300,495 UART: [art] Extend RT PCRs Done
2,300,923 UART: [art] Lock RT PCRs Done
2,302,271 UART: [art] Populate DV Done
2,310,116 UART: [fht] FMC Alias Private Key: 7
2,311,070 UART: [art] Derive CDI
2,311,350 UART: [art] Store in in slot 0x4
2,397,119 UART: [art] Derive Key Pair
2,397,479 UART: [art] Store priv key in slot 0x5
2,410,305 UART: [art] Derive Key Pair - Done
2,424,801 UART: [art] Signing Cert with AUTHO
2,425,281 UART: RITY.KEYID = 7
2,440,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,441,354 UART: [art] PUB.X = FFD83D7579CA194B4E515A896CC36E1E60B263612A5E972FAC2339FE5CF618E43BD780BCE8C48CC13BCCB14B8ECFA354
2,448,144 UART: [art] PUB.Y = 8A2BE9CEDE8EC4DE96C7592EDFE2AB0879D0FB5FBE3DEB7C489C2476E2FA8EE9B8A0942C5D54DE4BC313AC7964DE91B1
2,455,123 UART: [art] SIG.R = 1B8BD9BFA3FE07E2678CA6F718D3B72D8CF1FD2359882B643B63132A32561DB7306383FE700121F32BCE07908DF53BFC
2,461,892 UART: [art] SIG.S = BF35B7BD44EC5D4D4F2B52DA75772DCA1D45F931F0FB4EAFA5711CA8CC24A5A74312A456EFA3D4DBE475FC01C68F5AC6
2,485,744 UART: mock_rt_interact::rt_entry...FMC Tester
2,592,902 UART: [rt] Runtime listening for mailbox commands...
2,596,292 >>> mbox cmd response data (2048 bytes)
2,596,293 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,597,525 >>> mbox cmd response data (336 bytes)
2,597,526 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,610,117 >>> mbox cmd response data (1536 bytes)
2,610,118 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,537,674 >>> mbox cmd response: success
4,551,268 UART:
4,551,284 UART: Running Caliptra FMC ...
4,551,692 UART:
4,551,835 UART: [state] CFI Enabled
4,640,842 UART: [art] Extend RT PCRs Done
4,641,270 UART: [art] Lock RT PCRs Done
4,642,431 UART: [art] Populate DV Done
4,650,772 UART: [fht] FMC Alias Private Key: 7
4,651,876 UART: [art] Derive CDI
4,652,156 UART: [art] Store in in slot 0x4
4,737,293 UART: [art] Derive Key Pair
4,737,653 UART: [art] Store priv key in slot 0x5
4,750,791 UART: [art] Derive Key Pair - Done
4,765,837 UART: [art] Signing Cert with AUTHO
4,766,317 UART: RITY.KEYID = 7
4,781,547 UART: [art] Erasing AUTHORITY.KEYID = 7
4,782,312 UART: [art] PUB.X = D72D0613D36201E8CB2101BB995EAC6C27DA0BBD9A87860BB3368678B6A0B4F569F8EBADD0D6DF4B07907C567B653010
4,789,074 UART: [art] PUB.Y = C56BBF81E468E18A451BA4DC7E90A7C8098C2635EE007F2F12AA0635B5DBC558C292F87894BA7651CEBFDB984D49FE0A
4,796,009 UART: [art] SIG.R = E23AD5DAF87E17D0E6E8E1FB0CC8855286E9CBE1821CE703606BB7B9D0AB1E03206EA45CA3789A13C8769CBD9ABC7CDD
4,802,794 UART: [art] SIG.S = 16224E76C5A3ABB2350F4CBC7853EB4FFD6B25100007BF333804A8AD8997EF63577B38F58CD7E7787A4CE5ADED9E39B4
4,825,105 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,826,224 UART: mock_rt_interact::rt_entry...FMC Tester
5,108,220 UART: [rt] Runtime listening for mailbox commands...
5,110,255 >>> mbox cmd response data (336 bytes)
5,110,256 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,122,847 >>> mbox cmd response data (1536 bytes)
5,122,848 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,122,865 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,830 writing to cptra_bootfsm_go
3,234 UART: hii* TESTCASE PASSED
Initializing fuses
863 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
3,250 UART: hii* TESTCASE PASSED
Initializing fuses
872 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,200 UART: hii* TESTCASE PASSED
Initializing fuses
879 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
3,164 UART: hii* TESTCASE PASSED
Initializing fuses
895 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,820 writing to cptra_bootfsm_go
3,212 UART: hii* TESTCASE PASSED
Initializing fuses
869 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,174 UART: hii* TESTCASE PASSED
Initializing fuses
862 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,835 writing to cptra_bootfsm_go
3,137 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,625 writing to cptra_bootfsm_go
4,076 UART: hii* TESTCASE PASSED
Initializing fuses
877 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,197 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
3,154 UART: hii* TESTCASE PASSED
Initializing fuses
874 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,200 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,207 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
3,170 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,178 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,824 writing to cptra_bootfsm_go
3,143 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,791 writing to cptra_bootfsm_go
3,194 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,192 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,193 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,179 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
3,160 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,202 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,198 >>> mbox cmd response data (14 bytes)
35,764 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,425 >>> mbox cmd response data (12 bytes)
36,756 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,161 >>> mbox cmd response data (7 bytes)
37,454 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,754 >>> mbox cmd response data (7 bytes)
38,035 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,384 >>> mbox cmd response data (0 bytes)
38,616 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,882 >>> mbox cmd response: success
39,063 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,404 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,312 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,174 >>> mbox cmd response data (14 bytes)
35,689 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,340 >>> mbox cmd response data (12 bytes)
36,646 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,939 >>> mbox cmd response data (7 bytes)
37,225 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,518 >>> mbox cmd response data (7 bytes)
37,803 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,090 >>> mbox cmd response data (0 bytes)
38,330 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,593 >>> mbox cmd response: success
38,773 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,052 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
3,625 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,453 >>> mbox cmd response data (14 bytes)
36,054 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,731 >>> mbox cmd response data (12 bytes)
37,053 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,449 >>> mbox cmd response data (7 bytes)
37,745 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,047 >>> mbox cmd response data (7 bytes)
38,341 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,716 >>> mbox cmd response data (0 bytes)
38,969 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,300 >>> mbox cmd response: success
39,491 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,837 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,460 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,313 >>> mbox cmd response data (14 bytes)
36,001 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,731 >>> mbox cmd response data (12 bytes)
37,053 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,415 >>> mbox cmd response data (7 bytes)
37,713 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,023 >>> mbox cmd response data (7 bytes)
38,320 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,626 >>> mbox cmd response data (0 bytes)
38,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,224 >>> mbox cmd response: success
39,422 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,770 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,214 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,064 >>> mbox cmd response data (14 bytes)
35,566 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,268 >>> mbox cmd response data (12 bytes)
36,573 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,918 >>> mbox cmd response data (7 bytes)
37,203 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,498 >>> mbox cmd response data (7 bytes)
37,897 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,252 >>> mbox cmd response data (0 bytes)
38,483 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,848 >>> mbox cmd response: success
39,040 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,377 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,290 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,167 >>> mbox cmd response data (14 bytes)
35,673 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,322 >>> mbox cmd response data (12 bytes)
36,649 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,994 >>> mbox cmd response data (7 bytes)
37,277 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,626 >>> mbox cmd response data (7 bytes)
37,929 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,272 >>> mbox cmd response data (0 bytes)
38,504 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,763 >>> mbox cmd response: success
38,942 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,219 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,584 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,400 >>> mbox cmd response data (14 bytes)
36,063 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,743 >>> mbox cmd response data (12 bytes)
37,074 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,518 >>> mbox cmd response data (7 bytes)
37,834 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,144 >>> mbox cmd response data (7 bytes)
38,446 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,796 >>> mbox cmd response data (0 bytes)
39,075 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,365 >>> mbox cmd response: success
39,561 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,904 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,597 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,456 >>> mbox cmd response data (14 bytes)
36,067 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,747 >>> mbox cmd response data (12 bytes)
37,066 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,428 >>> mbox cmd response data (7 bytes)
37,722 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,090 >>> mbox cmd response data (7 bytes)
38,387 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,700 >>> mbox cmd response data (0 bytes)
38,943 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,214 >>> mbox cmd response: success
39,408 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,760 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,347 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,203 >>> mbox cmd response data (14 bytes)
35,706 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,346 >>> mbox cmd response data (12 bytes)
36,687 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,046 >>> mbox cmd response data (7 bytes)
37,354 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,709 >>> mbox cmd response data (7 bytes)
37,991 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,335 >>> mbox cmd response data (0 bytes)
38,563 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,884 >>> mbox cmd response: success
39,065 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,401 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,398 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,500 >>> mbox cmd response data (14 bytes)
36,094 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,767 >>> mbox cmd response data (12 bytes)
37,102 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,466 >>> mbox cmd response data (7 bytes)
37,811 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,169 >>> mbox cmd response data (7 bytes)
38,654 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
39,032 >>> mbox cmd response data (0 bytes)
39,287 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,581 >>> mbox cmd response: success
39,818 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
40,429 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,286 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,810 >>> mbox cmd response: success
35,336 UART: |dcfeffff48692121| 37,239 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,748 >>> mbox cmd response: success
|dcfeffff48692121| 39,934 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,430 >>> mbox cmd response: success
|dcfeffff48692121| 42,652 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,094 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,452 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,976 >>> mbox cmd response: success
35,496 UART: |dcfeffff48692121| 37,411 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,956 >>> mbox cmd response: success
|dcfeffff48692121| 40,153 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,600 >>> mbox cmd response: success
|dcfeffff48692121| 42,850 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,349 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
3,692 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,245 >>> mbox cmd response: success
35,924 UART: |dcfeffff48692121| 37,906 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,497 >>> mbox cmd response: success
|dcfeffff48692121| 40,732 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,265 >>> mbox cmd response: success
|dcfeffff48692121| 43,498 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,994 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,604 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,102 >>> mbox cmd response: success
35,817 UART: |dcfeffff48692121| 37,759 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,354 >>> mbox cmd response: success
|dcfeffff48692121| 40,622 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,148 >>> mbox cmd response: success
|dcfeffff48692121| 43,433 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,983 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
3,381 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,896 >>> mbox cmd response: success
35,368 UART: |dcfeffff48692121| 37,304 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,819 >>> mbox cmd response: success
|dcfeffff48692121| 40,011 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,463 >>> mbox cmd response: success
|dcfeffff48692121| 42,694 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,132 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,513 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,032 >>> mbox cmd response: success
35,497 UART: |dcfeffff48692121| 37,436 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,943 >>> mbox cmd response: success
|dcfeffff48692121| 40,138 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,637 >>> mbox cmd response: success
|dcfeffff48692121| 42,885 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,322 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
3,598 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,123 >>> mbox cmd response: success
35,726 UART: |dcfeffff48692121| 38,507 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,109 >>> mbox cmd response: success
|dcfeffff48692121| 41,314 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,828 >>> mbox cmd response: success
|dcfeffff48692121| 44,062 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,516 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,534 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,066 >>> mbox cmd response: success
35,709 UART: |dcfeffff48692121| 37,741 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,347 >>> mbox cmd response: success
|dcfeffff48692121| 40,553 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,099 >>> mbox cmd response: success
|dcfeffff48692121| 43,353 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,873 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,347 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,866 >>> mbox cmd response: success
35,327 UART: |dcfeffff48692121| 37,253 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,760 >>> mbox cmd response: success
|dcfeffff48692121| 39,955 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,397 >>> mbox cmd response: success
|dcfeffff48692121| 42,633 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,124 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,734 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,255 >>> mbox cmd response: success
35,885 UART: |dcfeffff48692121| 37,870 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,443 >>> mbox cmd response: success
|dcfeffff48692121| 40,707 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,211 >>> mbox cmd response: success
|dcfeffff48692121| 43,508 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,052 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
3,131 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,272 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,198 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,829 writing to cptra_bootfsm_go
3,243 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,259 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
3,186 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
3,222 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,271 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
3,152 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,180 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,299 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,677 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,256 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,639 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,708 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,054 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
3,566 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,934 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,410 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,770 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,296 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,692 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,586 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,934 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,641 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,000 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,281 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,230 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
4,101 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,430 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,160 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,671 >>> mbox cmd response: success
35,152 UART: |dcfeffff48692121| 37,085 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,602 >>> mbox cmd response: success
|dcfeffff48692121| 39,791 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,239 >>> mbox cmd response: success
|dcfeffff48692121| 42,471 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,921 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,154 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,668 >>> mbox cmd response: success
35,201 UART: |dcfeffff48692121| 37,070 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,587 >>> mbox cmd response: success
|dcfeffff48692121| 39,776 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,276 >>> mbox cmd response: success
|dcfeffff48692121| 42,505 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,944 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
3,722 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,241 >>> mbox cmd response: success
35,808 UART: |dcfeffff48692121| 37,823 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,431 >>> mbox cmd response: success
|dcfeffff48692121| 40,687 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,256 >>> mbox cmd response: success
|dcfeffff48692121| 43,519 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,108 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
3,869 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,406 >>> mbox cmd response: success
35,959 UART: |dcfeffff48692121| 37,988 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,591 >>> mbox cmd response: success
|dcfeffff48692121| 40,817 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,392 >>> mbox cmd response: success
|dcfeffff48692121| 43,639 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,162 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,429 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,958 >>> mbox cmd response: success
35,421 UART: |dcfeffff48692121| 37,343 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,852 >>> mbox cmd response: success
|dcfeffff48692121| 40,066 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,510 >>> mbox cmd response: success
|dcfeffff48692121| 42,760 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,201 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,675 writing to cptra_bootfsm_go
4,011 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,525 >>> mbox cmd response: success
36,002 UART: |dcfeffff48692121| 37,939 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,452 >>> mbox cmd response: success
|dcfeffff48692121| 40,649 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,092 >>> mbox cmd response: success
|dcfeffff48692121| 43,327 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,764 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
3,579 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,084 >>> mbox cmd response: success
35,780 UART: |dcfeffff48692121| 37,724 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,313 >>> mbox cmd response: success
|dcfeffff48692121| 40,571 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,124 >>> mbox cmd response: success
|dcfeffff48692121| 43,370 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,892 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,447 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,971 >>> mbox cmd response: success
35,576 UART: |dcfeffff48692121| 37,513 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,123 >>> mbox cmd response: success
|dcfeffff48692121| 40,396 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,915 >>> mbox cmd response: success
|dcfeffff48692121| 43,174 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,687 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,286 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,796 >>> mbox cmd response: success
35,272 UART: |dcfeffff48692121| 37,213 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,726 >>> mbox cmd response: success
|dcfeffff48692121| 39,921 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,421 >>> mbox cmd response: success
|dcfeffff48692121| 42,651 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,165 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,598 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,117 >>> mbox cmd response: success
35,828 UART: |dcfeffff48692121| 37,847 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,448 >>> mbox cmd response: success
|dcfeffff48692121| 40,734 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,264 >>> mbox cmd response: success
|dcfeffff48692121| 43,523 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,044 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,506 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,490 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,855 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.10s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.08s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.07s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.09s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.14s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.07s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
1,302,206 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
1,302,080 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
1,302,578 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
1,302,375 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
1,302,161 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
1,302,039 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
1,302,548 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
1,302,353 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
1,302,032 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
1,302,372 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9708c0e60d287600101f7056571b5ff5b1d7ea0a294a94028488fd74343baeaf64d2f6c66da3ad90ea2e3df7d256bc52",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,818 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,076 UART:
192,452 UART: Running Caliptra ROM ...
193,667 UART:
193,824 UART: [state] CFI Enabled
268,222 UART: [state] LifecycleState = Unprovisioned
270,569 UART: [state] DebugLocked = No
272,867 UART: [state] WD Timer not started. Device not locked for debugging
276,814 UART: [kat] SHA2-256
458,739 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,234 UART: [kat] ++
470,764 UART: [kat] sha1
481,537 UART: [kat] SHA2-256
484,538 UART: [kat] SHA2-384
490,129 UART: [kat] SHA2-512-ACC
492,736 UART: [kat] ECC-384
3,777,271 UART: [kat] HMAC-384Kdf
3,804,765 UART: [kat] LMS
4,877,919 UART: [kat] --
4,880,906 UART: [cold-reset] ++
4,883,118 UART: [fht] FHT @ 0x50003400
4,894,694 UART: [idev] ++
4,895,364 UART: [idev] CDI.KEYID = 6
4,896,521 UART: [idev] SUBJECT.KEYID = 7
4,898,014 UART: [idev] UDS.KEYID = 0
4,932,140 UART: [idev] Erasing UDS.KEYID = 0
8,245,365 UART: [idev] Sha1 KeyId Algorithm
8,268,216 UART: [idev] --
8,272,297 UART: [ldev] ++
8,272,867 UART: [ldev] CDI.KEYID = 6
8,274,108 UART: [ldev] SUBJECT.KEYID = 5
8,275,220 UART: [ldev] AUTHORITY.KEYID = 7
8,276,453 UART: [ldev] FE.KEYID = 1
8,319,255 UART: [ldev] Erasing FE.KEYID = 1
11,654,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,037,220 UART: [ldev] --
14,042,069 UART: [fwproc] Wait for Commands...
14,045,306 UART: [fwproc] Recv command 0x43415053
14,048,389 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,849 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,828,417 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
4,114 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,346 UART:
192,719 UART: Running Caliptra ROM ...
193,935 UART:
603,415 UART: [state] CFI Enabled
615,290 UART: [state] LifecycleState = Unprovisioned
617,668 UART: [state] DebugLocked = No
619,154 UART: [state] WD Timer not started. Device not locked for debugging
623,959 UART: [kat] SHA2-256
805,895 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,425 UART: [kat] ++
818,058 UART: [kat] sha1
827,865 UART: [kat] SHA2-256
830,862 UART: [kat] SHA2-384
836,971 UART: [kat] SHA2-512-ACC
839,579 UART: [kat] ECC-384
4,092,605 UART: [kat] HMAC-384Kdf
4,104,514 UART: [kat] LMS
5,177,667 UART: [kat] --
5,181,836 UART: [cold-reset] ++
5,184,593 UART: [fht] FHT @ 0x50003400
5,196,648 UART: [idev] ++
5,197,326 UART: [idev] CDI.KEYID = 6
5,198,563 UART: [idev] SUBJECT.KEYID = 7
5,199,996 UART: [idev] UDS.KEYID = 0
5,213,954 UART: [idev] Erasing UDS.KEYID = 0
8,490,604 UART: [idev] Sha1 KeyId Algorithm
8,513,410 UART: [idev] --
8,515,973 UART: [ldev] ++
8,516,551 UART: [ldev] CDI.KEYID = 6
8,517,727 UART: [ldev] SUBJECT.KEYID = 5
8,519,216 UART: [ldev] AUTHORITY.KEYID = 7
8,520,772 UART: [ldev] FE.KEYID = 1
8,532,039 UART: [ldev] Erasing FE.KEYID = 1
11,824,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,162,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,956 UART: [ldev] --
14,186,794 UART: [fwproc] Wait for Commands...
14,189,276 UART: [fwproc] Recv command 0x43415053
14,192,350 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
4,157 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,008,092 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,847 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,141 UART:
192,522 UART: Running Caliptra ROM ...
193,632 UART:
193,780 UART: [state] CFI Enabled
259,080 UART: [state] LifecycleState = Unprovisioned
260,998 UART: [state] DebugLocked = No
263,611 UART: [state] WD Timer not started. Device not locked for debugging
267,789 UART: [kat] SHA2-256
446,929 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,485 UART: [kat] ++
458,935 UART: [kat] sha1
471,106 UART: [kat] SHA2-256
474,113 UART: [kat] SHA2-384
480,144 UART: [kat] SHA2-512-ACC
483,133 UART: [kat] ECC-384
2,943,273 UART: [kat] HMAC-384Kdf
2,964,902 UART: [kat] LMS
3,494,348 UART: [kat] --
3,499,361 UART: [cold-reset] ++
3,500,479 UART: [fht] FHT @ 0x50003400
3,512,208 UART: [idev] ++
3,512,781 UART: [idev] CDI.KEYID = 6
3,513,818 UART: [idev] SUBJECT.KEYID = 7
3,514,926 UART: [idev] UDS.KEYID = 0
3,537,810 UART: [idev] Erasing UDS.KEYID = 0
6,019,754 UART: [idev] Sha1 KeyId Algorithm
6,043,100 UART: [idev] --
6,047,148 UART: [ldev] ++
6,047,720 UART: [ldev] CDI.KEYID = 6
6,048,630 UART: [ldev] SUBJECT.KEYID = 5
6,049,796 UART: [ldev] AUTHORITY.KEYID = 7
6,051,086 UART: [ldev] FE.KEYID = 1
6,092,960 UART: [ldev] Erasing FE.KEYID = 1
8,597,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,750 UART: [ldev] --
10,409,094 UART: [fwproc] Wait for Commands...
10,410,651 UART: [fwproc] Recv command 0x43415053
10,413,419 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,775 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,204,246 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
4,395 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,615 UART:
192,965 UART: Running Caliptra ROM ...
194,134 UART:
603,803 UART: [state] CFI Enabled
614,827 UART: [state] LifecycleState = Unprovisioned
616,646 UART: [state] DebugLocked = No
617,940 UART: [state] WD Timer not started. Device not locked for debugging
621,850 UART: [kat] SHA2-256
800,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,378 UART: [kat] ++
812,824 UART: [kat] sha1
824,131 UART: [kat] SHA2-256
827,136 UART: [kat] SHA2-384
833,602 UART: [kat] SHA2-512-ACC
836,530 UART: [kat] ECC-384
3,278,820 UART: [kat] HMAC-384Kdf
3,291,661 UART: [kat] LMS
3,821,166 UART: [kat] --
3,826,409 UART: [cold-reset] ++
3,828,141 UART: [fht] FHT @ 0x50003400
3,838,096 UART: [idev] ++
3,838,662 UART: [idev] CDI.KEYID = 6
3,839,629 UART: [idev] SUBJECT.KEYID = 7
3,840,747 UART: [idev] UDS.KEYID = 0
3,854,992 UART: [idev] Erasing UDS.KEYID = 0
6,313,590 UART: [idev] Sha1 KeyId Algorithm
6,336,713 UART: [idev] --
6,341,729 UART: [ldev] ++
6,342,292 UART: [ldev] CDI.KEYID = 6
6,343,175 UART: [ldev] SUBJECT.KEYID = 5
6,344,382 UART: [ldev] AUTHORITY.KEYID = 7
6,345,608 UART: [ldev] FE.KEYID = 1
6,356,497 UART: [ldev] Erasing FE.KEYID = 1
8,825,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,645 UART: [ldev] --
10,616,110 UART: [fwproc] Wait for Commands...
10,617,617 UART: [fwproc] Recv command 0x43415053
10,620,427 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,194 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,396,404 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,806 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,182,850 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,854 writing to cptra_bootfsm_go
4,925 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,401,820 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
890,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,953 UART: [kat] ++
895,105 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,792 UART: [kat] HMAC-384Kdf
920,246 UART: [kat] LMS
1,168,558 UART: [kat] --
1,169,125 UART: [cold-reset] ++
1,169,515 UART: [fht] FHT @ 0x50003400
1,172,351 UART: [idev] ++
1,172,519 UART: [idev] CDI.KEYID = 6
1,172,880 UART: [idev] SUBJECT.KEYID = 7
1,173,305 UART: [idev] UDS.KEYID = 0
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,859 UART: [idev] --
1,208,856 UART: [ldev] ++
1,209,024 UART: [ldev] CDI.KEYID = 6
1,209,388 UART: [ldev] SUBJECT.KEYID = 5
1,209,815 UART: [ldev] AUTHORITY.KEYID = 7
1,210,278 UART: [ldev] FE.KEYID = 1
1,215,568 UART: [ldev] Erasing FE.KEYID = 1
1,241,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,928 UART: [ldev] --
1,281,214 UART: [fwproc] Wait for Commands...
1,281,979 UART: [fwproc] Recv command 0x43415053
1,282,974 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,119 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,213 UART: [kat] HMAC-384Kdf
920,935 UART: [kat] LMS
1,169,247 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,434 UART: [fht] FHT @ 0x50003400
1,173,164 UART: [idev] ++
1,173,332 UART: [idev] CDI.KEYID = 6
1,173,693 UART: [idev] SUBJECT.KEYID = 7
1,174,118 UART: [idev] UDS.KEYID = 0
1,181,908 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,376 UART: [idev] --
1,209,299 UART: [ldev] ++
1,209,467 UART: [ldev] CDI.KEYID = 6
1,209,831 UART: [ldev] SUBJECT.KEYID = 5
1,210,258 UART: [ldev] AUTHORITY.KEYID = 7
1,210,721 UART: [ldev] FE.KEYID = 1
1,216,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,905 UART: [ldev] --
1,282,311 UART: [fwproc] Wait for Commands...
1,282,916 UART: [fwproc] Recv command 0x43415053
1,283,911 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,314 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
905,026 UART: [kat] SHA2-512-ACC
906,927 UART: [kat] ECC-384
916,494 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,479 UART: [cold-reset] ++
1,170,855 UART: [fht] FHT @ 0x50003400
1,173,367 UART: [idev] ++
1,173,535 UART: [idev] CDI.KEYID = 6
1,173,896 UART: [idev] SUBJECT.KEYID = 7
1,174,321 UART: [idev] UDS.KEYID = 0
1,182,267 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,207,897 UART: [idev] --
1,208,866 UART: [ldev] ++
1,209,034 UART: [ldev] CDI.KEYID = 6
1,209,398 UART: [ldev] SUBJECT.KEYID = 5
1,209,825 UART: [ldev] AUTHORITY.KEYID = 7
1,210,288 UART: [ldev] FE.KEYID = 1
1,215,240 UART: [ldev] Erasing FE.KEYID = 1
1,241,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,366 UART: [ldev] --
1,280,730 UART: [fwproc] Wait for Commands...
1,281,309 UART: [fwproc] Recv command 0x43415053
1,282,304 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,597 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,265 UART: [kat] SHA2-256
891,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,944 UART: [kat] ++
896,096 UART: [kat] sha1
900,172 UART: [kat] SHA2-256
902,112 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,699 UART: [kat] HMAC-384Kdf
921,345 UART: [kat] LMS
1,169,657 UART: [kat] --
1,170,688 UART: [cold-reset] ++
1,171,266 UART: [fht] FHT @ 0x50003400
1,173,970 UART: [idev] ++
1,174,138 UART: [idev] CDI.KEYID = 6
1,174,499 UART: [idev] SUBJECT.KEYID = 7
1,174,924 UART: [idev] UDS.KEYID = 0
1,183,168 UART: [idev] Erasing UDS.KEYID = 0
1,200,440 UART: [idev] Sha1 KeyId Algorithm
1,209,546 UART: [idev] --
1,210,553 UART: [ldev] ++
1,210,721 UART: [ldev] CDI.KEYID = 6
1,211,085 UART: [ldev] SUBJECT.KEYID = 5
1,211,512 UART: [ldev] AUTHORITY.KEYID = 7
1,211,975 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,759 UART: [fwproc] Wait for Commands...
1,283,512 UART: [fwproc] Recv command 0x43415053
1,284,507 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,730 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,169,941 UART: [cold-reset] ++
1,170,419 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,181,973 UART: [idev] Erasing UDS.KEYID = 0
1,198,673 UART: [idev] Sha1 KeyId Algorithm
1,207,715 UART: [idev] --
1,208,786 UART: [ldev] ++
1,208,954 UART: [ldev] CDI.KEYID = 6
1,209,318 UART: [ldev] SUBJECT.KEYID = 5
1,209,745 UART: [ldev] AUTHORITY.KEYID = 7
1,210,208 UART: [ldev] FE.KEYID = 1
1,215,360 UART: [ldev] Erasing FE.KEYID = 1
1,241,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,576 UART: [ldev] --
1,281,066 UART: [fwproc] Wait for Commands...
1,281,715 UART: [fwproc] Recv command 0x43415053
1,282,710 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,321 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
891,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,740 UART: [kat] ++
895,892 UART: [kat] sha1
900,270 UART: [kat] SHA2-256
902,210 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,170,102 UART: [cold-reset] ++
1,170,498 UART: [fht] FHT @ 0x50003400
1,173,280 UART: [idev] ++
1,173,448 UART: [idev] CDI.KEYID = 6
1,173,809 UART: [idev] SUBJECT.KEYID = 7
1,174,234 UART: [idev] UDS.KEYID = 0
1,182,540 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,767 UART: [ldev] ++
1,209,935 UART: [ldev] CDI.KEYID = 6
1,210,299 UART: [ldev] SUBJECT.KEYID = 5
1,210,726 UART: [ldev] AUTHORITY.KEYID = 7
1,211,189 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,242,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,773 UART: [fwproc] Wait for Commands...
1,282,548 UART: [fwproc] Recv command 0x43415053
1,283,543 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,730 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "48194c94cd849d39d5c3d8ede3242cf0c51d4132b338581001ef9bf656ca6776bda1adf0a091eed1ac9a06d487d232b5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,222 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,914 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "91a215c9b28537a78cbd90807565ae92940b50b39aa6d9d255dd1c9728eaa8ebb58d1479c6e938faf4f49b6778dfb04b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "48194c94cd849d39d5c3d8ede3242cf0c51d4132b338581001ef9bf656ca6776bda1adf0a091eed1ac9a06d487d232b5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
192,392 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
198,134 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
734 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "91a215c9b28537a78cbd90807565ae92940b50b39aa6d9d255dd1c9728eaa8ebb58d1479c6e938faf4f49b6778dfb04b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,796 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,092 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,566 UART: ROM Fatal Error: 0x01050002test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,408 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,870 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3fe511310bfa3463d381f8fa9821940560eac0530a5a58d3bcaedc28c36ffa102edb6a0e3969afd949ea15b0eedda3cf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe4cbac88caaf3659341f2a84fedb5dae7132cc3f6d9a118ceaf80d5bea81e6fda0c0d09307d41f67b990352bec8541b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,055 UART:
192,436 UART: Running Caliptra ROM ...
193,525 UART:
193,668 UART: [state] CFI Enabled
208,754 UART: [state] LifecycleState = Unprovisioned
211,167 UART: [state] DebugLocked = No
213,183 UART: [state] WD Timer not started. Device not locked for debugging
218,560 UART: [kat] SHA2-256
400,538 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
412,062 UART: [kat] ++
412,515 UART: [kat] sha1
423,032 UART: [kat] SHA2-256
426,043 UART: [kat] SHA2-384
432,670 UART: [kat] SHA2-512-ACC
435,317 UART: [kat] ECC-384
3,690,395 UART: [kat] HMAC-384Kdf
3,702,035 UART: [kat] LMS
4,775,210 UART: [kat] --
4,780,984 UART: [cold-reset] ++
4,782,699 UART: [fht] FHT @ 0x50003400
4,793,605 UART: [idev] ++
4,794,312 UART: [idev] CDI.KEYID = 6
4,795,480 UART: [idev] SUBJECT.KEYID = 7
4,797,003 UART: [idev] UDS.KEYID = 0
4,798,136 ready_for_fw is high
4,798,330 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
4,932,713 UART: [idev] Erasing UDS.KEYID = 0
8,088,180 UART: [idev] Sha1 KeyId Algorithm
8,110,179 UART: [idev] --
8,113,799 UART: [ldev] ++
8,114,369 UART: [ldev] CDI.KEYID = 6
8,115,527 UART: [ldev] SUBJECT.KEYID = 5
8,116,738 UART: [ldev] AUTHORITY.KEYID = 7
8,117,892 UART: [ldev] FE.KEYID = 1
8,130,515 UART: [ldev] Erasing FE.KEYID = 1
11,422,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,716,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,732,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,748,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,764,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,784,974 UART: [ldev] --
13,789,533 UART: [fwproc] Wait for Commands...
13,792,277 UART: [fwproc] Recv command 0x46574c44
13,794,581 UART: [fwproc] Recv'd Img size: 106620 bytes
17,773,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,854,190 UART: [fwproc] Load FMC at address 0x40000000 len 11316
17,896,689 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,214,086 >>> mbox cmd response: success
18,217,350 UART: [afmc] ++
18,217,962 UART: [afmc] CDI.KEYID = 6
18,219,072 UART: [afmc] SUBJECT.KEYID = 7
18,220,290 UART: [afmc] AUTHORITY.KEYID = 5
21,537,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,833,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,835,766 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
23,851,696 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
23,867,736 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
23,883,963 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
23,906,280 UART: [afmc] --
23,909,285 UART: [cold-reset] --
23,913,954 UART: [state] Locking Datavault
23,920,057 UART: [state] Locking PCR0, PCR1 and PCR31
23,921,697 UART: [state] Locking ICCM
23,923,805 UART: [exit] Launching FMC @ 0x40000000
23,932,478 UART:
23,932,723 UART: Running Caliptra FMC ...
23,933,867 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
4,693,596 ready_for_fw is high
4,694,469 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,018,392 >>> mbox cmd response: success
23,657,171 UART:
23,657,568 UART: Running Caliptra FMC ...
23,658,854 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,533 UART:
192,905 UART: Running Caliptra ROM ...
194,056 UART:
194,205 UART: [state] CFI Enabled
209,183 UART: [state] LifecycleState = Unprovisioned
211,582 UART: [state] DebugLocked = No
213,607 UART: [state] WD Timer not started. Device not locked for debugging
219,053 UART: [kat] SHA2-256
401,015 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
412,538 UART: [kat] ++
413,069 UART: [kat] sha1
423,520 UART: [kat] SHA2-256
426,513 UART: [kat] SHA2-384
433,138 UART: [kat] SHA2-512-ACC
435,784 UART: [kat] ECC-384
3,690,864 UART: [kat] HMAC-384Kdf
3,702,463 UART: [kat] LMS
4,775,665 UART: [kat] --
4,781,455 UART: [cold-reset] ++
4,783,171 UART: [fht] FHT @ 0x50003400
4,794,072 UART: [idev] ++
4,794,813 UART: [idev] CDI.KEYID = 6
4,795,945 UART: [idev] SUBJECT.KEYID = 7
4,798,162 UART: [idev] UDS.KEYID = 0
4,799,082 ready_for_fw is high
4,799,293 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
4,933,389 UART: [idev] Erasing UDS.KEYID = 0
8,088,604 UART: [idev] Sha1 KeyId Algorithm
8,110,597 UART: [idev] --
8,114,267 UART: [ldev] ++
8,114,833 UART: [ldev] CDI.KEYID = 6
8,116,061 UART: [ldev] SUBJECT.KEYID = 5
8,117,233 UART: [ldev] AUTHORITY.KEYID = 7
8,118,405 UART: [ldev] FE.KEYID = 1
8,130,944 UART: [ldev] Erasing FE.KEYID = 1
11,422,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,716,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,733,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,748,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,764,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,785,411 UART: [ldev] --
13,789,973 UART: [fwproc] Wait for Commands...
13,792,706 UART: [fwproc] Recv command 0x46574c44
13,795,059 UART: [fwproc] Recv'd Img size: 106620 bytes
17,774,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,854,647 UART: [fwproc] Load FMC at address 0x40000000 len 11316
17,897,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,214,498 >>> mbox cmd response: success
18,217,779 UART: [afmc] ++
18,218,396 UART: [afmc] CDI.KEYID = 6
18,219,510 UART: [afmc] SUBJECT.KEYID = 7
18,220,722 UART: [afmc] AUTHORITY.KEYID = 5
21,537,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,833,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,836,075 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
23,852,106 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
23,868,165 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
23,884,278 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
23,906,717 UART: [afmc] --
23,909,699 UART: [cold-reset] --
23,914,382 UART: [state] Locking Datavault
23,920,492 UART: [state] Locking PCR0, PCR1 and PCR31
23,922,192 UART: [state] Locking ICCM
23,924,286 UART: [exit] Launching FMC @ 0x40000000
23,932,872 UART:
23,933,114 UART: Running Caliptra FMC ...
23,934,169 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,693,973 ready_for_fw is high
4,694,479 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,018,758 >>> mbox cmd response: success
23,657,532 UART:
23,658,325 UART: Running Caliptra FMC ...
23,659,512 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,069 UART:
192,439 UART: Running Caliptra ROM ...
193,616 UART:
193,765 UART: [state] CFI Enabled
208,619 UART: [state] LifecycleState = Unprovisioned
210,487 UART: [state] DebugLocked = No
212,514 UART: [state] WD Timer not started. Device not locked for debugging
217,104 UART: [kat] SHA2-256
396,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
407,776 UART: [kat] ++
408,230 UART: [kat] sha1
419,315 UART: [kat] SHA2-256
422,328 UART: [kat] SHA2-384
429,309 UART: [kat] SHA2-512-ACC
432,246 UART: [kat] ECC-384
2,873,728 UART: [kat] HMAC-384Kdf
2,885,860 UART: [kat] LMS
3,415,302 UART: [kat] --
3,421,005 UART: [cold-reset] ++
3,422,521 UART: [fht] FHT @ 0x50003400
3,433,074 UART: [idev] ++
3,433,640 UART: [idev] CDI.KEYID = 6
3,434,524 UART: [idev] SUBJECT.KEYID = 7
3,435,955 UART: [idev] UDS.KEYID = 0
3,436,923 ready_for_fw is high
3,437,167 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,571,555 UART: [idev] Erasing UDS.KEYID = 0
5,910,031 UART: [idev] Sha1 KeyId Algorithm
5,932,987 UART: [idev] --
5,936,571 UART: [ldev] ++
5,937,152 UART: [ldev] CDI.KEYID = 6
5,938,062 UART: [ldev] SUBJECT.KEYID = 5
5,939,225 UART: [ldev] AUTHORITY.KEYID = 7
5,940,456 UART: [ldev] FE.KEYID = 1
5,952,720 UART: [ldev] Erasing FE.KEYID = 1
8,426,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,523 UART: [ldev] --
10,219,103 UART: [fwproc] Wait for Commands...
10,221,846 UART: [fwproc] Recv command 0x46574c44
10,223,936 UART: [fwproc] Recv'd Img size: 106964 bytes
13,535,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,613,446 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,656,075 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
13,974,677 >>> mbox cmd response: success
13,978,103 UART: [afmc] ++
13,978,717 UART: [afmc] CDI.KEYID = 6
13,979,644 UART: [afmc] SUBJECT.KEYID = 7
13,980,801 UART: [afmc] AUTHORITY.KEYID = 5
16,480,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,202,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,204,249 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,220,208 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,236,121 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,252,084 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,274,527 UART: [afmc] --
18,277,690 UART: [cold-reset] --
18,282,137 UART: [state] Locking Datavault
18,287,803 UART: [state] Locking PCR0, PCR1 and PCR31
18,289,490 UART: [state] Locking ICCM
18,291,311 UART: [exit] Launching FMC @ 0x40000000
18,299,711 UART:
18,299,961 UART: Running Caliptra FMC ...
18,301,102 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,288,339 ready_for_fw is high
3,288,754 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,754,844 >>> mbox cmd response: success
18,004,824 UART:
18,005,347 UART: Running Caliptra FMC ...
18,006,563 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
192,512 UART:
193,307 UART: Running Caliptra ROM ...
194,459 UART:
194,606 UART: [state] CFI Enabled
209,024 UART: [state] LifecycleState = Unprovisioned
210,928 UART: [state] DebugLocked = No
212,973 UART: [state] WD Timer not started. Device not locked for debugging
217,505 UART: [kat] SHA2-256
396,692 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
408,232 UART: [kat] ++
408,764 UART: [kat] sha1
419,717 UART: [kat] SHA2-256
422,791 UART: [kat] SHA2-384
429,698 UART: [kat] SHA2-512-ACC
432,701 UART: [kat] ECC-384
2,874,251 UART: [kat] HMAC-384Kdf
2,886,300 UART: [kat] LMS
3,415,770 UART: [kat] --
3,421,486 UART: [cold-reset] ++
3,422,925 UART: [fht] FHT @ 0x50003400
3,433,473 UART: [idev] ++
3,434,032 UART: [idev] CDI.KEYID = 6
3,435,127 UART: [idev] SUBJECT.KEYID = 7
3,436,258 UART: [idev] UDS.KEYID = 0
3,437,158 ready_for_fw is high
3,437,364 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,571,723 UART: [idev] Erasing UDS.KEYID = 0
5,910,465 UART: [idev] Sha1 KeyId Algorithm
5,933,422 UART: [idev] --
5,937,004 UART: [ldev] ++
5,937,583 UART: [ldev] CDI.KEYID = 6
5,938,464 UART: [ldev] SUBJECT.KEYID = 5
5,939,672 UART: [ldev] AUTHORITY.KEYID = 7
5,940,901 UART: [ldev] FE.KEYID = 1
5,953,179 UART: [ldev] Erasing FE.KEYID = 1
8,427,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,965 UART: [ldev] --
10,219,518 UART: [fwproc] Wait for Commands...
10,222,265 UART: [fwproc] Recv command 0x46574c44
10,224,353 UART: [fwproc] Recv'd Img size: 106964 bytes
13,535,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,613,896 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,656,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
13,975,165 >>> mbox cmd response: success
13,978,608 UART: [afmc] ++
13,979,217 UART: [afmc] CDI.KEYID = 6
13,980,106 UART: [afmc] SUBJECT.KEYID = 7
13,981,270 UART: [afmc] AUTHORITY.KEYID = 5
16,481,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,202,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,204,684 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,220,689 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,236,607 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,252,573 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,274,997 UART: [afmc] --
18,278,149 UART: [cold-reset] --
18,282,581 UART: [state] Locking Datavault
18,288,306 UART: [state] Locking PCR0, PCR1 and PCR31
18,289,990 UART: [state] Locking ICCM
18,291,775 UART: [exit] Launching FMC @ 0x40000000
18,300,175 UART:
18,300,420 UART: Running Caliptra FMC ...
18,301,558 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,288,759 ready_for_fw is high
3,289,348 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,755,219 >>> mbox cmd response: success
18,005,237 UART:
18,005,663 UART: Running Caliptra FMC ...
18,006,843 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,288,616 ready_for_fw is high
3,289,196 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,755,113 >>> mbox cmd response: success
18,005,111 UART:
18,005,543 UART: Running Caliptra FMC ...
18,006,824 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,288,698 ready_for_fw is high
3,289,508 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,755,177 >>> mbox cmd response: success
18,005,170 UART:
18,005,596 UART: Running Caliptra FMC ...
18,006,937 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,233 >>> mbox cmd response: success
2,680,254 UART: [afmc] ++
2,680,422 UART: [afmc] CDI.KEYID = 6
2,680,785 UART: [afmc] SUBJECT.KEYID = 7
2,681,211 UART: [afmc] AUTHORITY.KEYID = 5
2,716,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,393 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,113 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,006 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,699 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,502 UART: [afmc] --
2,760,414 UART: [cold-reset] --
2,761,352 UART: [state] Locking Datavault
2,762,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,197 UART: [state] Locking ICCM
2,763,737 UART: [exit] Launching FMC @ 0x40000000
2,769,034 UART:
2,769,050 UART: Running Caliptra FMC ...
2,769,458 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,529,099 >>> mbox cmd response: success
2,591,567 UART:
2,591,583 UART: Running Caliptra FMC ...
2,591,991 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,100 UART:
192,494 UART: Running Caliptra ROM ...
193,717 UART:
193,871 UART: [state] CFI Enabled
265,688 UART: [state] LifecycleState = Unprovisioned
268,041 UART: [state] DebugLocked = No
269,213 UART: [state] WD Timer not started. Device not locked for debugging
272,493 UART: [kat] SHA2-256
454,445 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,946 UART: [kat] ++
466,534 UART: [kat] sha1
477,685 UART: [kat] SHA2-256
480,692 UART: [kat] SHA2-384
486,282 UART: [kat] SHA2-512-ACC
488,855 UART: [kat] ECC-384
3,777,264 UART: [kat] HMAC-384Kdf
3,803,826 UART: [kat] LMS
4,876,975 UART: [kat] --
4,880,223 UART: [cold-reset] ++
4,882,476 UART: [fht] FHT @ 0x50003400
4,894,340 UART: [idev] ++
4,895,026 UART: [idev] CDI.KEYID = 6
4,896,278 UART: [idev] SUBJECT.KEYID = 7
4,897,305 UART: [idev] UDS.KEYID = 0
4,931,656 UART: [idev] Erasing UDS.KEYID = 0
8,247,397 UART: [idev] Sha1 KeyId Algorithm
8,268,614 UART: [idev] --
8,273,106 UART: [ldev] ++
8,273,682 UART: [ldev] CDI.KEYID = 6
8,274,870 UART: [ldev] SUBJECT.KEYID = 5
8,276,030 UART: [ldev] AUTHORITY.KEYID = 7
8,277,258 UART: [ldev] FE.KEYID = 1
8,319,016 UART: [ldev] Erasing FE.KEYID = 1
11,655,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,116 UART: [ldev] --
14,180,146 UART: [fwproc] Wait for Commands...
14,182,024 UART: [fwproc] Recv command 0x46574c44
14,184,321 UART: [fwproc] Recv'd Img size: 114124 bytes
18,260,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,333,940 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,402,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,724,776 UART: [afmc] ++
18,725,412 UART: [afmc] CDI.KEYID = 6
18,726,557 UART: [afmc] SUBJECT.KEYID = 7
18,727,665 UART: [afmc] AUTHORITY.KEYID = 5
22,100,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,417,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,419,763 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,436,003 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,451,986 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,468,011 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,491,239 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,463 UART:
192,844 UART: Running Caliptra ROM ...
194,048 UART:
603,734 UART: [state] CFI Enabled
618,697 UART: [state] LifecycleState = Unprovisioned
621,092 UART: [state] DebugLocked = No
622,818 UART: [state] WD Timer not started. Device not locked for debugging
627,589 UART: [kat] SHA2-256
809,532 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,073 UART: [kat] ++
821,606 UART: [kat] sha1
833,400 UART: [kat] SHA2-256
836,457 UART: [kat] SHA2-384
840,924 UART: [kat] SHA2-512-ACC
843,540 UART: [kat] ECC-384
4,098,644 UART: [kat] HMAC-384Kdf
4,111,186 UART: [kat] LMS
5,184,357 UART: [kat] --
5,189,076 UART: [cold-reset] ++
5,191,017 UART: [fht] FHT @ 0x50003400
5,202,866 UART: [idev] ++
5,203,536 UART: [idev] CDI.KEYID = 6
5,204,765 UART: [idev] SUBJECT.KEYID = 7
5,206,196 UART: [idev] UDS.KEYID = 0
5,223,383 UART: [idev] Erasing UDS.KEYID = 0
8,497,361 UART: [idev] Sha1 KeyId Algorithm
8,518,908 UART: [idev] --
8,521,785 UART: [ldev] ++
8,522,420 UART: [ldev] CDI.KEYID = 6
8,523,606 UART: [ldev] SUBJECT.KEYID = 5
8,525,042 UART: [ldev] AUTHORITY.KEYID = 7
8,526,627 UART: [ldev] FE.KEYID = 1
8,537,871 UART: [ldev] Erasing FE.KEYID = 1
11,828,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,421 UART: [ldev] --
14,337,569 UART: [fwproc] Wait for Commands...
14,338,957 UART: [fwproc] Recv command 0x46574c44
14,340,368 UART: [fwproc] Recv'd Img size: 114124 bytes
18,413,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,484,358 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,553,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,873,270 UART: [afmc] ++
18,873,910 UART: [afmc] CDI.KEYID = 6
18,875,043 UART: [afmc] SUBJECT.KEYID = 7
18,876,207 UART: [afmc] AUTHORITY.KEYID = 5
22,193,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,488,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,491,196 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,507,354 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,523,433 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,539,386 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,562,166 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,090 UART:
192,490 UART: Running Caliptra ROM ...
193,606 UART:
193,746 UART: [state] CFI Enabled
262,190 UART: [state] LifecycleState = Unprovisioned
264,055 UART: [state] DebugLocked = No
266,905 UART: [state] WD Timer not started. Device not locked for debugging
271,170 UART: [kat] SHA2-256
450,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,870 UART: [kat] ++
462,420 UART: [kat] sha1
473,580 UART: [kat] SHA2-256
476,596 UART: [kat] SHA2-384
481,928 UART: [kat] SHA2-512-ACC
484,862 UART: [kat] ECC-384
2,946,782 UART: [kat] HMAC-384Kdf
2,971,342 UART: [kat] LMS
3,500,795 UART: [kat] --
3,506,448 UART: [cold-reset] ++
3,507,442 UART: [fht] FHT @ 0x50003400
3,517,718 UART: [idev] ++
3,518,288 UART: [idev] CDI.KEYID = 6
3,519,200 UART: [idev] SUBJECT.KEYID = 7
3,520,412 UART: [idev] UDS.KEYID = 0
3,544,070 UART: [idev] Erasing UDS.KEYID = 0
6,028,766 UART: [idev] Sha1 KeyId Algorithm
6,050,555 UART: [idev] --
6,054,807 UART: [ldev] ++
6,055,383 UART: [ldev] CDI.KEYID = 6
6,056,295 UART: [ldev] SUBJECT.KEYID = 5
6,057,456 UART: [ldev] AUTHORITY.KEYID = 7
6,058,746 UART: [ldev] FE.KEYID = 1
6,100,514 UART: [ldev] Erasing FE.KEYID = 1
8,603,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,832 UART: [ldev] --
10,554,229 UART: [fwproc] Wait for Commands...
10,555,646 UART: [fwproc] Recv command 0x46574c44
10,557,296 UART: [fwproc] Recv'd Img size: 114448 bytes
13,957,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,031,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,099,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,422,838 UART: [afmc] ++
14,423,458 UART: [afmc] CDI.KEYID = 6
14,424,378 UART: [afmc] SUBJECT.KEYID = 7
14,425,489 UART: [afmc] AUTHORITY.KEYID = 5
16,954,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,682,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,684,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,700,581 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,716,584 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,732,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,756,785 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,621 UART:
193,006 UART: Running Caliptra ROM ...
194,188 UART:
603,810 UART: [state] CFI Enabled
619,498 UART: [state] LifecycleState = Unprovisioned
621,381 UART: [state] DebugLocked = No
622,808 UART: [state] WD Timer not started. Device not locked for debugging
625,997 UART: [kat] SHA2-256
805,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,692 UART: [kat] ++
817,135 UART: [kat] sha1
828,168 UART: [kat] SHA2-256
831,178 UART: [kat] SHA2-384
838,499 UART: [kat] SHA2-512-ACC
841,478 UART: [kat] ECC-384
3,280,911 UART: [kat] HMAC-384Kdf
3,292,497 UART: [kat] LMS
3,822,001 UART: [kat] --
3,824,841 UART: [cold-reset] ++
3,826,970 UART: [fht] FHT @ 0x50003400
3,838,319 UART: [idev] ++
3,838,922 UART: [idev] CDI.KEYID = 6
3,839,844 UART: [idev] SUBJECT.KEYID = 7
3,841,006 UART: [idev] UDS.KEYID = 0
3,860,336 UART: [idev] Erasing UDS.KEYID = 0
6,322,508 UART: [idev] Sha1 KeyId Algorithm
6,345,987 UART: [idev] --
6,349,956 UART: [ldev] ++
6,350,545 UART: [ldev] CDI.KEYID = 6
6,351,425 UART: [ldev] SUBJECT.KEYID = 5
6,352,636 UART: [ldev] AUTHORITY.KEYID = 7
6,353,926 UART: [ldev] FE.KEYID = 1
6,364,862 UART: [ldev] Erasing FE.KEYID = 1
8,838,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,249 UART: [ldev] --
10,770,989 UART: [fwproc] Wait for Commands...
10,772,377 UART: [fwproc] Recv command 0x46574c44
10,773,903 UART: [fwproc] Recv'd Img size: 114448 bytes
14,176,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,253,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,322,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,644,294 UART: [afmc] ++
14,644,905 UART: [afmc] CDI.KEYID = 6
14,645,792 UART: [afmc] SUBJECT.KEYID = 7
14,646,894 UART: [afmc] AUTHORITY.KEYID = 5
17,147,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,864,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,866,513 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,882,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,898,279 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,914,174 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,937,045 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,696 UART: [state] LifecycleState = Unprovisioned
85,351 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,367 UART: [kat] SHA2-256
901,307 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
915,416 UART: [kat] HMAC-384Kdf
920,036 UART: [kat] LMS
1,168,348 UART: [kat] --
1,169,197 UART: [cold-reset] ++
1,169,535 UART: [fht] FHT @ 0x50003400
1,172,165 UART: [idev] ++
1,172,333 UART: [idev] CDI.KEYID = 6
1,172,694 UART: [idev] SUBJECT.KEYID = 7
1,173,119 UART: [idev] UDS.KEYID = 0
1,181,315 UART: [idev] Erasing UDS.KEYID = 0
1,198,221 UART: [idev] Sha1 KeyId Algorithm
1,206,987 UART: [idev] --
1,208,098 UART: [ldev] ++
1,208,266 UART: [ldev] CDI.KEYID = 6
1,208,630 UART: [ldev] SUBJECT.KEYID = 5
1,209,057 UART: [ldev] AUTHORITY.KEYID = 7
1,209,520 UART: [ldev] FE.KEYID = 1
1,214,798 UART: [ldev] Erasing FE.KEYID = 1
1,241,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,744 UART: [ldev] --
1,280,096 UART: [fwproc] Wait for Commands...
1,280,701 UART: [fwproc] Recv command 0x46574c44
1,281,434 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,104 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,255 UART: [afmc] ++
2,774,423 UART: [afmc] CDI.KEYID = 6
2,774,786 UART: [afmc] SUBJECT.KEYID = 7
2,775,212 UART: [afmc] AUTHORITY.KEYID = 5
2,810,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,150 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,408 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,191 UART: [kat] SHA2-512-ACC
906,092 UART: [kat] ECC-384
915,547 UART: [kat] HMAC-384Kdf
920,313 UART: [kat] LMS
1,168,625 UART: [kat] --
1,169,360 UART: [cold-reset] ++
1,169,832 UART: [fht] FHT @ 0x50003400
1,172,658 UART: [idev] ++
1,172,826 UART: [idev] CDI.KEYID = 6
1,173,187 UART: [idev] SUBJECT.KEYID = 7
1,173,612 UART: [idev] UDS.KEYID = 0
1,181,700 UART: [idev] Erasing UDS.KEYID = 0
1,198,616 UART: [idev] Sha1 KeyId Algorithm
1,207,450 UART: [idev] --
1,208,397 UART: [ldev] ++
1,208,565 UART: [ldev] CDI.KEYID = 6
1,208,929 UART: [ldev] SUBJECT.KEYID = 5
1,209,356 UART: [ldev] AUTHORITY.KEYID = 7
1,209,819 UART: [ldev] FE.KEYID = 1
1,215,413 UART: [ldev] Erasing FE.KEYID = 1
1,241,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,145 UART: [ldev] --
1,280,439 UART: [fwproc] Wait for Commands...
1,281,166 UART: [fwproc] Recv command 0x46574c44
1,281,899 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,114 UART: [afmc] ++
2,774,282 UART: [afmc] CDI.KEYID = 6
2,774,645 UART: [afmc] SUBJECT.KEYID = 7
2,775,071 UART: [afmc] AUTHORITY.KEYID = 5
2,810,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,445 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,164 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,025 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,626 UART: [state] LifecycleState = Unprovisioned
86,281 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,226 UART: [kat] SHA2-256
891,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,905 UART: [kat] ++
896,057 UART: [kat] sha1
900,181 UART: [kat] SHA2-256
902,121 UART: [kat] SHA2-384
904,986 UART: [kat] SHA2-512-ACC
906,887 UART: [kat] ECC-384
916,392 UART: [kat] HMAC-384Kdf
920,872 UART: [kat] LMS
1,169,184 UART: [kat] --
1,170,073 UART: [cold-reset] ++
1,170,651 UART: [fht] FHT @ 0x50003400
1,173,277 UART: [idev] ++
1,173,445 UART: [idev] CDI.KEYID = 6
1,173,806 UART: [idev] SUBJECT.KEYID = 7
1,174,231 UART: [idev] UDS.KEYID = 0
1,182,387 UART: [idev] Erasing UDS.KEYID = 0
1,199,455 UART: [idev] Sha1 KeyId Algorithm
1,208,271 UART: [idev] --
1,209,416 UART: [ldev] ++
1,209,584 UART: [ldev] CDI.KEYID = 6
1,209,948 UART: [ldev] SUBJECT.KEYID = 5
1,210,375 UART: [ldev] AUTHORITY.KEYID = 7
1,210,838 UART: [ldev] FE.KEYID = 1
1,215,872 UART: [ldev] Erasing FE.KEYID = 1
1,242,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,174 UART: [ldev] --
1,281,610 UART: [fwproc] Wait for Commands...
1,282,417 UART: [fwproc] Recv command 0x46574c44
1,283,150 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,595 UART: [afmc] ++
2,775,763 UART: [afmc] CDI.KEYID = 6
2,776,126 UART: [afmc] SUBJECT.KEYID = 7
2,776,552 UART: [afmc] AUTHORITY.KEYID = 5
2,812,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,416 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,028 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,747 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,450 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,190 UART: [kat] SHA2-256
902,130 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,357 UART: [kat] HMAC-384Kdf
921,105 UART: [kat] LMS
1,169,417 UART: [kat] --
1,170,026 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,056 UART: [idev] Sha1 KeyId Algorithm
1,207,776 UART: [idev] --
1,209,049 UART: [ldev] ++
1,209,217 UART: [ldev] CDI.KEYID = 6
1,209,581 UART: [ldev] SUBJECT.KEYID = 5
1,210,008 UART: [ldev] AUTHORITY.KEYID = 7
1,210,471 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,242,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,427 UART: [ldev] --
1,281,893 UART: [fwproc] Wait for Commands...
1,282,586 UART: [fwproc] Recv command 0x46574c44
1,283,319 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,140 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,470 UART: [afmc] ++
2,774,638 UART: [afmc] CDI.KEYID = 6
2,775,001 UART: [afmc] SUBJECT.KEYID = 7
2,775,427 UART: [afmc] AUTHORITY.KEYID = 5
2,811,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,173 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,892 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,869 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,623 UART: [kat] ++
895,775 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,170,175 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,379 UART: [idev] ++
1,173,547 UART: [idev] CDI.KEYID = 6
1,173,908 UART: [idev] SUBJECT.KEYID = 7
1,174,333 UART: [idev] UDS.KEYID = 0
1,182,517 UART: [idev] Erasing UDS.KEYID = 0
1,199,139 UART: [idev] Sha1 KeyId Algorithm
1,208,203 UART: [idev] --
1,209,212 UART: [ldev] ++
1,209,380 UART: [ldev] CDI.KEYID = 6
1,209,744 UART: [ldev] SUBJECT.KEYID = 5
1,210,171 UART: [ldev] AUTHORITY.KEYID = 7
1,210,634 UART: [ldev] FE.KEYID = 1
1,215,726 UART: [ldev] Erasing FE.KEYID = 1
1,241,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,610 UART: [ldev] --
1,280,876 UART: [fwproc] Wait for Commands...
1,281,477 UART: [fwproc] Recv command 0x46574c44
1,282,210 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,767 UART: [afmc] ++
2,774,935 UART: [afmc] CDI.KEYID = 6
2,775,298 UART: [afmc] SUBJECT.KEYID = 7
2,775,724 UART: [afmc] AUTHORITY.KEYID = 5
2,810,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,647 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,127 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,010 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,729 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,386 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,719 UART: [kat] SHA2-512-ACC
906,620 UART: [kat] ECC-384
916,755 UART: [kat] HMAC-384Kdf
921,241 UART: [kat] LMS
1,169,553 UART: [kat] --
1,170,638 UART: [cold-reset] ++
1,170,996 UART: [fht] FHT @ 0x50003400
1,173,652 UART: [idev] ++
1,173,820 UART: [idev] CDI.KEYID = 6
1,174,181 UART: [idev] SUBJECT.KEYID = 7
1,174,606 UART: [idev] UDS.KEYID = 0
1,182,516 UART: [idev] Erasing UDS.KEYID = 0
1,200,154 UART: [idev] Sha1 KeyId Algorithm
1,209,084 UART: [idev] --
1,210,343 UART: [ldev] ++
1,210,511 UART: [ldev] CDI.KEYID = 6
1,210,875 UART: [ldev] SUBJECT.KEYID = 5
1,211,302 UART: [ldev] AUTHORITY.KEYID = 7
1,211,765 UART: [ldev] FE.KEYID = 1
1,216,817 UART: [ldev] Erasing FE.KEYID = 1
1,242,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,281,919 UART: [fwproc] Wait for Commands...
1,282,694 UART: [fwproc] Recv command 0x46574c44
1,283,427 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,140 UART: [afmc] ++
2,776,308 UART: [afmc] CDI.KEYID = 6
2,776,671 UART: [afmc] SUBJECT.KEYID = 7
2,777,097 UART: [afmc] AUTHORITY.KEYID = 5
2,812,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,239 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,968 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,851 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,570 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,539 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
192,084 UART:
192,458 UART: Running Caliptra ROM ...
193,566 UART:
193,709 UART: [state] CFI Enabled
261,930 UART: [state] LifecycleState = Unprovisioned
264,349 UART: [state] DebugLocked = No
265,586 UART: [state] WD Timer not started. Device not locked for debugging
270,678 UART: [kat] SHA2-256
452,570 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,089 UART: [kat] ++
464,611 UART: [kat] sha1
475,407 UART: [kat] SHA2-256
478,477 UART: [kat] SHA2-384
484,108 UART: [kat] SHA2-512-ACC
486,762 UART: [kat] ECC-384
3,775,535 UART: [kat] HMAC-384Kdf
3,800,921 UART: [kat] LMS
4,874,021 UART: [kat] --
4,878,360 UART: [cold-reset] ++
4,880,157 UART: [fht] FHT @ 0x50003400
4,891,904 UART: [idev] ++
4,892,658 UART: [idev] CDI.KEYID = 6
4,893,840 UART: [idev] SUBJECT.KEYID = 7
4,894,944 UART: [idev] UDS.KEYID = 0
4,895,888 ready_for_fw is high
4,896,093 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,030,185 UART: [idev] Erasing UDS.KEYID = 0
8,238,376 UART: [idev] Sha1 KeyId Algorithm
8,260,351 UART: [idev] --
8,264,695 UART: [ldev] ++
8,265,328 UART: [ldev] CDI.KEYID = 6
8,266,429 UART: [ldev] SUBJECT.KEYID = 5
8,267,692 UART: [ldev] AUTHORITY.KEYID = 7
8,268,840 UART: [ldev] FE.KEYID = 1
8,314,824 UART: [ldev] Erasing FE.KEYID = 1
11,649,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,638 UART: [ldev] --
14,035,205 UART: [fwproc] Wait for Commands...
14,037,567 UART: [fwproc] Recv command 0x46574c44
14,039,875 UART: [fwproc] Recv'd Img size: 106620 bytes
18,018,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,095,427 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,137,936 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,455,839 >>> mbox cmd response: success
18,459,903 UART: [afmc] ++
18,460,516 UART: [afmc] CDI.KEYID = 6
18,461,626 UART: [afmc] SUBJECT.KEYID = 7
18,462,848 UART: [afmc] AUTHORITY.KEYID = 5
21,832,957 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,132,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,135,123 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,151,163 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,167,184 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,183,305 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,207,148 UART: [afmc] --
24,210,103 UART: [cold-reset] --
24,214,784 UART: [state] Locking Datavault
24,219,572 UART: [state] Locking PCR0, PCR1 and PCR31
24,221,273 UART: [state] Locking ICCM
24,224,277 UART: [exit] Launching FMC @ 0x40000000
24,232,916 UART:
24,233,159 UART: Running Caliptra FMC ...
24,234,302 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
4,785,519 ready_for_fw is high
4,785,958 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,206,638 >>> mbox cmd response: success
23,908,594 UART:
23,909,508 UART: Running Caliptra FMC ...
23,910,720 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,450 UART:
192,814 UART: Running Caliptra ROM ...
194,013 UART:
603,559 UART: [state] CFI Enabled
615,242 UART: [state] LifecycleState = Unprovisioned
617,612 UART: [state] DebugLocked = No
620,486 UART: [state] WD Timer not started. Device not locked for debugging
625,355 UART: [kat] SHA2-256
807,363 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,878 UART: [kat] ++
819,482 UART: [kat] sha1
829,503 UART: [kat] SHA2-256
832,502 UART: [kat] SHA2-384
838,129 UART: [kat] SHA2-512-ACC
840,699 UART: [kat] ECC-384
4,094,972 UART: [kat] HMAC-384Kdf
4,107,205 UART: [kat] LMS
5,180,320 UART: [kat] --
5,185,181 UART: [cold-reset] ++
5,187,545 UART: [fht] FHT @ 0x50003400
5,199,834 UART: [idev] ++
5,200,576 UART: [idev] CDI.KEYID = 6
5,201,753 UART: [idev] SUBJECT.KEYID = 7
5,203,207 UART: [idev] UDS.KEYID = 0
5,204,409 ready_for_fw is high
5,204,613 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,338,524 UART: [idev] Erasing UDS.KEYID = 0
8,491,760 UART: [idev] Sha1 KeyId Algorithm
8,514,871 UART: [idev] --
8,518,970 UART: [ldev] ++
8,519,545 UART: [ldev] CDI.KEYID = 6
8,520,777 UART: [ldev] SUBJECT.KEYID = 5
8,522,266 UART: [ldev] AUTHORITY.KEYID = 7
8,523,770 UART: [ldev] FE.KEYID = 1
8,534,897 UART: [ldev] Erasing FE.KEYID = 1
11,825,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,647 UART: [ldev] --
14,190,424 UART: [fwproc] Wait for Commands...
14,192,999 UART: [fwproc] Recv command 0x46574c44
14,195,298 UART: [fwproc] Recv'd Img size: 106620 bytes
18,163,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,238,275 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,280,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,597,460 >>> mbox cmd response: success
18,601,097 UART: [afmc] ++
18,601,711 UART: [afmc] CDI.KEYID = 6
18,602,900 UART: [afmc] SUBJECT.KEYID = 7
18,603,999 UART: [afmc] AUTHORITY.KEYID = 5
21,921,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,215,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,217,520 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,233,500 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,249,578 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,265,655 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,289,329 UART: [afmc] --
24,293,124 UART: [cold-reset] --
24,295,941 UART: [state] Locking Datavault
24,301,236 UART: [state] Locking PCR0, PCR1 and PCR31
24,302,864 UART: [state] Locking ICCM
24,304,248 UART: [exit] Launching FMC @ 0x40000000
24,312,908 UART:
24,313,161 UART: Running Caliptra FMC ...
24,314,519 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
5,094,933 ready_for_fw is high
5,095,360 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,402,665 >>> mbox cmd response: success
24,050,058 UART:
24,050,455 UART: Running Caliptra FMC ...
24,051,637 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,030 UART:
192,406 UART: Running Caliptra ROM ...
193,490 UART:
193,631 UART: [state] CFI Enabled
259,933 UART: [state] LifecycleState = Unprovisioned
261,858 UART: [state] DebugLocked = No
263,092 UART: [state] WD Timer not started. Device not locked for debugging
266,497 UART: [kat] SHA2-256
445,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,153 UART: [kat] ++
457,599 UART: [kat] sha1
467,831 UART: [kat] SHA2-256
470,833 UART: [kat] SHA2-384
476,893 UART: [kat] SHA2-512-ACC
479,827 UART: [kat] ECC-384
2,923,523 UART: [kat] HMAC-384Kdf
2,948,550 UART: [kat] LMS
3,477,993 UART: [kat] --
3,482,756 UART: [cold-reset] ++
3,484,566 UART: [fht] FHT @ 0x50003400
3,494,416 UART: [idev] ++
3,494,988 UART: [idev] CDI.KEYID = 6
3,495,879 UART: [idev] SUBJECT.KEYID = 7
3,497,142 UART: [idev] UDS.KEYID = 0
3,498,041 ready_for_fw is high
3,498,233 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,632,665 UART: [idev] Erasing UDS.KEYID = 0
6,004,714 UART: [idev] Sha1 KeyId Algorithm
6,028,121 UART: [idev] --
6,032,447 UART: [ldev] ++
6,033,021 UART: [ldev] CDI.KEYID = 6
6,033,940 UART: [ldev] SUBJECT.KEYID = 5
6,035,102 UART: [ldev] AUTHORITY.KEYID = 7
6,036,341 UART: [ldev] FE.KEYID = 1
6,077,791 UART: [ldev] Erasing FE.KEYID = 1
8,579,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,857 UART: [ldev] --
10,392,640 UART: [fwproc] Wait for Commands...
10,394,628 UART: [fwproc] Recv command 0x46574c44
10,396,726 UART: [fwproc] Recv'd Img size: 106964 bytes
13,710,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,778,452 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,821,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,138,481 >>> mbox cmd response: success
14,142,197 UART: [afmc] ++
14,142,816 UART: [afmc] CDI.KEYID = 6
14,143,732 UART: [afmc] SUBJECT.KEYID = 7
14,144,838 UART: [afmc] AUTHORITY.KEYID = 5
16,679,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,401,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,403,337 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,419,304 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,435,248 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,451,239 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,472,808 UART: [afmc] --
18,476,286 UART: [cold-reset] --
18,481,406 UART: [state] Locking Datavault
18,485,816 UART: [state] Locking PCR0, PCR1 and PCR31
18,487,515 UART: [state] Locking ICCM
18,489,845 UART: [exit] Launching FMC @ 0x40000000
18,498,255 UART:
18,498,503 UART: Running Caliptra FMC ...
18,499,646 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,378,304 ready_for_fw is high
3,378,724 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,955,882 >>> mbox cmd response: success
18,234,548 UART:
18,234,963 UART: Running Caliptra FMC ...
18,236,248 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,378 UART:
192,754 UART: Running Caliptra ROM ...
193,852 UART:
603,441 UART: [state] CFI Enabled
618,445 UART: [state] LifecycleState = Unprovisioned
620,334 UART: [state] DebugLocked = No
622,929 UART: [state] WD Timer not started. Device not locked for debugging
626,883 UART: [kat] SHA2-256
806,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,626 UART: [kat] ++
818,156 UART: [kat] sha1
829,316 UART: [kat] SHA2-256
832,395 UART: [kat] SHA2-384
839,512 UART: [kat] SHA2-512-ACC
842,535 UART: [kat] ECC-384
3,281,573 UART: [kat] HMAC-384Kdf
3,292,975 UART: [kat] LMS
3,822,336 UART: [kat] --
3,826,112 UART: [cold-reset] ++
3,828,543 UART: [fht] FHT @ 0x50003400
3,839,449 UART: [idev] ++
3,840,008 UART: [idev] CDI.KEYID = 6
3,840,925 UART: [idev] SUBJECT.KEYID = 7
3,842,094 UART: [idev] UDS.KEYID = 0
3,843,019 ready_for_fw is high
3,843,240 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,977,773 UART: [idev] Erasing UDS.KEYID = 0
6,317,780 UART: [idev] Sha1 KeyId Algorithm
6,341,158 UART: [idev] --
6,345,882 UART: [ldev] ++
6,346,480 UART: [ldev] CDI.KEYID = 6
6,347,390 UART: [ldev] SUBJECT.KEYID = 5
6,348,545 UART: [ldev] AUTHORITY.KEYID = 7
6,349,773 UART: [ldev] FE.KEYID = 1
6,362,898 UART: [ldev] Erasing FE.KEYID = 1
8,838,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,049 UART: [ldev] --
10,626,937 UART: [fwproc] Wait for Commands...
10,629,781 UART: [fwproc] Recv command 0x46574c44
10,631,867 UART: [fwproc] Recv'd Img size: 106964 bytes
13,950,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,022,627 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,065,210 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,384,079 >>> mbox cmd response: success
14,387,474 UART: [afmc] ++
14,388,080 UART: [afmc] CDI.KEYID = 6
14,388,994 UART: [afmc] SUBJECT.KEYID = 7
14,390,153 UART: [afmc] AUTHORITY.KEYID = 5
16,891,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,612,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,614,055 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,630,012 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,645,923 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,661,918 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,685,747 UART: [afmc] --
18,689,474 UART: [cold-reset] --
18,693,491 UART: [state] Locking Datavault
18,698,908 UART: [state] Locking PCR0, PCR1 and PCR31
18,700,639 UART: [state] Locking ICCM
18,702,708 UART: [exit] Launching FMC @ 0x40000000
18,711,089 UART:
18,711,333 UART: Running Caliptra FMC ...
18,712,476 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,699,698 ready_for_fw is high
3,700,090 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,170,422 >>> mbox cmd response: success
18,411,896 UART:
18,412,312 UART: Running Caliptra FMC ...
18,413,567 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,361,305 ready_for_fw is high
3,361,714 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,948,299 >>> mbox cmd response: success
18,235,119 UART:
18,235,521 UART: Running Caliptra FMC ...
18,236,791 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,696,028 ready_for_fw is high
3,696,573 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,143,512 >>> mbox cmd response: success
18,394,792 UART:
18,395,178 UART: Running Caliptra FMC ...
18,396,353 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
904,166 UART: [kat] SHA2-512-ACC
906,067 UART: [kat] ECC-384
915,688 UART: [kat] HMAC-384Kdf
920,134 UART: [kat] LMS
1,168,446 UART: [kat] --
1,169,343 UART: [cold-reset] ++
1,169,915 UART: [fht] FHT @ 0x50003400
1,172,527 UART: [idev] ++
1,172,695 UART: [idev] CDI.KEYID = 6
1,173,056 UART: [idev] SUBJECT.KEYID = 7
1,173,481 UART: [idev] UDS.KEYID = 0
1,173,827 ready_for_fw is high
1,173,827 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,637 UART: [idev] Erasing UDS.KEYID = 0
1,198,601 UART: [idev] Sha1 KeyId Algorithm
1,207,417 UART: [idev] --
1,208,630 UART: [ldev] ++
1,208,798 UART: [ldev] CDI.KEYID = 6
1,209,162 UART: [ldev] SUBJECT.KEYID = 5
1,209,589 UART: [ldev] AUTHORITY.KEYID = 7
1,210,052 UART: [ldev] FE.KEYID = 1
1,215,268 UART: [ldev] Erasing FE.KEYID = 1
1,241,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,636 UART: [ldev] --
1,280,982 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,676 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,801 >>> mbox cmd response: success
2,677,004 UART: [afmc] ++
2,677,172 UART: [afmc] CDI.KEYID = 6
2,677,535 UART: [afmc] SUBJECT.KEYID = 7
2,677,961 UART: [afmc] AUTHORITY.KEYID = 5
2,713,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,084 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,804 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,697 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,390 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,291 UART: [afmc] --
2,756,263 UART: [cold-reset] --
2,756,973 UART: [state] Locking Datavault
2,757,880 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,484 UART: [state] Locking ICCM
2,759,044 UART: [exit] Launching FMC @ 0x40000000
2,764,341 UART:
2,764,357 UART: Running Caliptra FMC ...
2,764,765 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,420 ready_for_fw is high
1,056,420 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,528,547 >>> mbox cmd response: success
2,591,732 UART:
2,591,748 UART: Running Caliptra FMC ...
2,592,156 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,865 UART: [kat] LMS
1,169,177 UART: [kat] --
1,170,324 UART: [cold-reset] ++
1,170,794 UART: [fht] FHT @ 0x50003400
1,173,490 UART: [idev] ++
1,173,658 UART: [idev] CDI.KEYID = 6
1,174,019 UART: [idev] SUBJECT.KEYID = 7
1,174,444 UART: [idev] UDS.KEYID = 0
1,174,790 ready_for_fw is high
1,174,790 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,590 UART: [idev] Erasing UDS.KEYID = 0
1,199,620 UART: [idev] Sha1 KeyId Algorithm
1,208,566 UART: [idev] --
1,209,683 UART: [ldev] ++
1,209,851 UART: [ldev] CDI.KEYID = 6
1,210,215 UART: [ldev] SUBJECT.KEYID = 5
1,210,642 UART: [ldev] AUTHORITY.KEYID = 7
1,211,105 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,213 UART: [fwproc] Wait for Commands...
1,282,912 UART: [fwproc] Recv command 0x46574c44
1,283,645 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,983 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,066 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,098 >>> mbox cmd response: success
2,678,139 UART: [afmc] ++
2,678,307 UART: [afmc] CDI.KEYID = 6
2,678,670 UART: [afmc] SUBJECT.KEYID = 7
2,679,096 UART: [afmc] AUTHORITY.KEYID = 5
2,715,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,349 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,069 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,962 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,655 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,520 UART: [afmc] --
2,758,488 UART: [cold-reset] --
2,759,408 UART: [state] Locking Datavault
2,760,793 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,397 UART: [state] Locking ICCM
2,761,927 UART: [exit] Launching FMC @ 0x40000000
2,767,224 UART:
2,767,240 UART: Running Caliptra FMC ...
2,767,648 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,471 ready_for_fw is high
1,056,471 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,218 >>> mbox cmd response: success
2,588,863 UART:
2,588,879 UART: Running Caliptra FMC ...
2,589,287 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Unprovisioned
86,205 UART: [state] DebugLocked = No
86,925 UART: [state] WD Timer not started. Device not locked for debugging
88,214 UART: [kat] SHA2-256
891,764 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,893 UART: [kat] ++
896,045 UART: [kat] sha1
900,313 UART: [kat] SHA2-256
902,253 UART: [kat] SHA2-384
904,976 UART: [kat] SHA2-512-ACC
906,877 UART: [kat] ECC-384
916,664 UART: [kat] HMAC-384Kdf
921,132 UART: [kat] LMS
1,169,444 UART: [kat] --
1,170,319 UART: [cold-reset] ++
1,170,815 UART: [fht] FHT @ 0x50003400
1,173,481 UART: [idev] ++
1,173,649 UART: [idev] CDI.KEYID = 6
1,174,010 UART: [idev] SUBJECT.KEYID = 7
1,174,435 UART: [idev] UDS.KEYID = 0
1,174,781 ready_for_fw is high
1,174,781 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,313 UART: [idev] Erasing UDS.KEYID = 0
1,199,237 UART: [idev] Sha1 KeyId Algorithm
1,208,077 UART: [idev] --
1,209,118 UART: [ldev] ++
1,209,286 UART: [ldev] CDI.KEYID = 6
1,209,650 UART: [ldev] SUBJECT.KEYID = 5
1,210,077 UART: [ldev] AUTHORITY.KEYID = 7
1,210,540 UART: [ldev] FE.KEYID = 1
1,215,828 UART: [ldev] Erasing FE.KEYID = 1
1,242,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,608 UART: [ldev] --
1,281,906 UART: [fwproc] Wait for Commands...
1,282,687 UART: [fwproc] Recv command 0x46574c44
1,283,420 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,476 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,559 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,589 >>> mbox cmd response: success
2,677,794 UART: [afmc] ++
2,677,962 UART: [afmc] CDI.KEYID = 6
2,678,325 UART: [afmc] SUBJECT.KEYID = 7
2,678,751 UART: [afmc] AUTHORITY.KEYID = 5
2,714,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,854 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,574 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,467 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,160 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,109 UART: [afmc] --
2,758,091 UART: [cold-reset] --
2,758,755 UART: [state] Locking Datavault
2,760,098 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,702 UART: [state] Locking ICCM
2,761,242 UART: [exit] Launching FMC @ 0x40000000
2,766,539 UART:
2,766,555 UART: Running Caliptra FMC ...
2,766,963 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,398 ready_for_fw is high
1,055,398 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,524,515 >>> mbox cmd response: success
2,586,588 UART:
2,586,604 UART: Running Caliptra FMC ...
2,587,012 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,716 UART: [kat] ++
895,868 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
921,259 UART: [kat] LMS
1,169,571 UART: [kat] --
1,170,554 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,744 UART: [idev] ++
1,173,912 UART: [idev] CDI.KEYID = 6
1,174,273 UART: [idev] SUBJECT.KEYID = 7
1,174,698 UART: [idev] UDS.KEYID = 0
1,175,044 ready_for_fw is high
1,175,044 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,324 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,480 UART: [idev] --
1,209,555 UART: [ldev] ++
1,209,723 UART: [ldev] CDI.KEYID = 6
1,210,087 UART: [ldev] SUBJECT.KEYID = 5
1,210,514 UART: [ldev] AUTHORITY.KEYID = 7
1,210,977 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,915 UART: [ldev] --
1,282,385 UART: [fwproc] Wait for Commands...
1,283,038 UART: [fwproc] Recv command 0x46574c44
1,283,771 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,965 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,542,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,678,104 >>> mbox cmd response: success
2,679,265 UART: [afmc] ++
2,679,433 UART: [afmc] CDI.KEYID = 6
2,679,796 UART: [afmc] SUBJECT.KEYID = 7
2,680,222 UART: [afmc] AUTHORITY.KEYID = 5
2,715,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,733,155 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,875 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,768 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,461 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,758,302 UART: [afmc] --
2,759,254 UART: [cold-reset] --
2,759,832 UART: [state] Locking Datavault
2,761,227 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,831 UART: [state] Locking ICCM
2,762,405 UART: [exit] Launching FMC @ 0x40000000
2,767,702 UART:
2,767,718 UART: Running Caliptra FMC ...
2,768,126 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,781 ready_for_fw is high
1,056,781 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,292 >>> mbox cmd response: success
2,589,111 UART:
2,589,127 UART: Running Caliptra FMC ...
2,589,535 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,782 UART: [state] LifecycleState = Unprovisioned
86,437 UART: [state] DebugLocked = No
86,991 UART: [state] WD Timer not started. Device not locked for debugging
88,302 UART: [kat] SHA2-256
891,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,981 UART: [kat] ++
896,133 UART: [kat] sha1
900,199 UART: [kat] SHA2-256
902,139 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
915,844 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
1,168,810 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,005 UART: [fht] FHT @ 0x50003400
1,172,645 UART: [idev] ++
1,172,813 UART: [idev] CDI.KEYID = 6
1,173,174 UART: [idev] SUBJECT.KEYID = 7
1,173,599 UART: [idev] UDS.KEYID = 0
1,173,945 ready_for_fw is high
1,173,945 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,017 UART: [idev] Sha1 KeyId Algorithm
1,206,897 UART: [idev] --
1,208,002 UART: [ldev] ++
1,208,170 UART: [ldev] CDI.KEYID = 6
1,208,534 UART: [ldev] SUBJECT.KEYID = 5
1,208,961 UART: [ldev] AUTHORITY.KEYID = 7
1,209,424 UART: [ldev] FE.KEYID = 1
1,214,540 UART: [ldev] Erasing FE.KEYID = 1
1,240,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,496 UART: [ldev] --
1,279,786 UART: [fwproc] Wait for Commands...
1,280,527 UART: [fwproc] Recv command 0x46574c44
1,281,260 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,872 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,674,961 >>> mbox cmd response: success
2,676,182 UART: [afmc] ++
2,676,350 UART: [afmc] CDI.KEYID = 6
2,676,713 UART: [afmc] SUBJECT.KEYID = 7
2,677,139 UART: [afmc] AUTHORITY.KEYID = 5
2,713,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,168 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,888 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,781 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,474 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,435 UART: [afmc] --
2,756,335 UART: [cold-reset] --
2,757,009 UART: [state] Locking Datavault
2,758,070 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,674 UART: [state] Locking ICCM
2,759,128 UART: [exit] Launching FMC @ 0x40000000
2,764,425 UART:
2,764,441 UART: Running Caliptra FMC ...
2,764,849 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,586 ready_for_fw is high
1,056,586 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,524,455 >>> mbox cmd response: success
2,586,672 UART:
2,586,688 UART: Running Caliptra FMC ...
2,587,096 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
921,159 UART: [kat] LMS
1,169,471 UART: [kat] --
1,170,352 UART: [cold-reset] ++
1,170,710 UART: [fht] FHT @ 0x50003400
1,173,436 UART: [idev] ++
1,173,604 UART: [idev] CDI.KEYID = 6
1,173,965 UART: [idev] SUBJECT.KEYID = 7
1,174,390 UART: [idev] UDS.KEYID = 0
1,174,736 ready_for_fw is high
1,174,736 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,828 UART: [idev] Sha1 KeyId Algorithm
1,208,618 UART: [idev] --
1,209,629 UART: [ldev] ++
1,209,797 UART: [ldev] CDI.KEYID = 6
1,210,161 UART: [ldev] SUBJECT.KEYID = 5
1,210,588 UART: [ldev] AUTHORITY.KEYID = 7
1,211,051 UART: [ldev] FE.KEYID = 1
1,216,371 UART: [ldev] Erasing FE.KEYID = 1
1,242,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,771 UART: [ldev] --
1,282,239 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,697 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,353 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,324 >>> mbox cmd response: success
2,678,589 UART: [afmc] ++
2,678,757 UART: [afmc] CDI.KEYID = 6
2,679,120 UART: [afmc] SUBJECT.KEYID = 7
2,679,546 UART: [afmc] AUTHORITY.KEYID = 5
2,715,376 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,613 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,333 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,226 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,919 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,666 UART: [afmc] --
2,758,584 UART: [cold-reset] --
2,759,446 UART: [state] Locking Datavault
2,760,827 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,431 UART: [state] Locking ICCM
2,761,865 UART: [exit] Launching FMC @ 0x40000000
2,767,162 UART:
2,767,178 UART: Running Caliptra FMC ...
2,767,586 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,895 ready_for_fw is high
1,055,895 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,428 >>> mbox cmd response: success
2,587,751 UART:
2,587,767 UART: Running Caliptra FMC ...
2,588,175 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,219,126 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,360,700 UART:
2,361,098 UART: Running Caliptra ROM ...
2,362,207 UART:
2,362,370 UART: [state] CFI Enabled
2,363,348 UART: [state] LifecycleState = Unprovisioned
2,365,004 UART: [state] DebugLocked = No
2,366,115 UART: [state] WD Timer not started. Device not locked for debugging
2,368,584 UART: [fake-rom-cold-reset] ++
2,369,707 UART: [fht] FHT @ 0x50003400
2,370,736 UART: [fwproc] Wait for Commands...
2,372,017 UART: [fwproc] Recv command 0x46574c44
2,373,439 UART: [fwproc] Recv'd Img size: 111688 bytes
3,781,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,853,303 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,963,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,548,736 >>> mbox cmd response: success
4,554,797 UART: [fake-rom-cold-reset] --
4,559,641 UART: [state] Locking Datavault
4,564,149 UART: [state] Locking PCR0, PCR1 and PCR31
4,566,336 UART: [state] Locking ICCM
4,569,331 UART: [exit] Launching FMC @ 0x40000000
4,578,086 UART:
4,578,343 UART: Running Caliptra FMC ...
4,579,425 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
2,216,353 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,357,661 UART:
2,358,069 UART: Running Caliptra ROM ...
2,359,251 UART:
2,359,443 UART: [state] CFI Enabled
2,360,427 UART: [state] LifecycleState = Unprovisioned
2,362,075 UART: [state] DebugLocked = No
2,363,138 UART: [state] WD Timer not started. Device not locked for debugging
2,365,614 UART: [fake-rom-cold-reset] ++
2,366,725 UART: [fht] FHT @ 0x50003400
2,367,754 UART: [fwproc] Wait for Commands...
2,369,036 UART: [fwproc] Recv command 0x46574c44
2,370,466 UART: [fwproc] Recv'd Img size: 111688 bytes
3,779,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,859,607 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,969,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,555,088 >>> mbox cmd response: success
4,561,121 UART: [fake-rom-cold-reset] --
4,563,977 UART: [state] Locking Datavault
4,569,207 UART: [state] Locking PCR0, PCR1 and PCR31
4,571,413 UART: [state] Locking ICCM
4,573,580 UART: [exit] Launching FMC @ 0x40000000
4,582,332 UART:
4,582,593 UART: Running Caliptra FMC ...
4,583,654 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
2,222,978 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,364,021 UART:
2,364,424 UART: Running Caliptra ROM ...
2,365,589 UART:
2,365,756 UART: [state] CFI Enabled
2,366,728 UART: [state] LifecycleState = Unprovisioned
2,368,370 UART: [state] DebugLocked = No
2,369,474 UART: [state] WD Timer not started. Device not locked for debugging
2,371,946 UART: [fake-rom-cold-reset] ++
2,373,042 UART: [fht] FHT @ 0x50003400
2,374,382 UART: [fwproc] Wait for Commands...
2,375,691 UART: [fwproc] Recv command 0x46574c44
2,377,125 UART: [fwproc] Recv'd Img size: 111688 bytes
3,781,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,856,846 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,966,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,553,168 >>> mbox cmd response: success
4,559,201 UART: [fake-rom-cold-reset] --
4,562,058 UART: [state] Locking Datavault
4,568,342 UART: [state] Locking PCR0, PCR1 and PCR31
4,570,552 UART: [state] Locking ICCM
4,571,815 UART: [exit] Launching FMC @ 0x40000000
4,580,607 UART:
4,580,853 UART: Running Caliptra FMC ...
4,581,982 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,221,594 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,362,833 UART:
2,363,266 UART: Running Caliptra ROM ...
2,364,440 UART:
2,364,612 UART: [state] CFI Enabled
2,365,585 UART: [state] LifecycleState = Unprovisioned
2,367,516 UART: [state] DebugLocked = No
2,368,627 UART: [state] WD Timer not started. Device not locked for debugging
2,371,100 UART: [fake-rom-cold-reset] ++
2,372,206 UART: [fht] FHT @ 0x50003400
2,373,230 UART: [fwproc] Wait for Commands...
2,374,504 UART: [fwproc] Recv command 0x46574c44
2,375,923 UART: [fwproc] Recv'd Img size: 111688 bytes
3,790,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,871,722 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,981,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,568,028 >>> mbox cmd response: success
4,574,049 UART: [fake-rom-cold-reset] --
4,578,288 UART: [state] Locking Datavault
4,583,798 UART: [state] Locking PCR0, PCR1 and PCR31
4,585,983 UART: [state] Locking ICCM
4,588,378 UART: [exit] Launching FMC @ 0x40000000
4,597,138 UART:
4,597,424 UART: Running Caliptra FMC ...
4,598,565 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
2,219,539 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,362,206 UART:
2,362,656 UART: Running Caliptra ROM ...
2,363,764 UART:
2,363,928 UART: [state] CFI Enabled
2,364,795 UART: [state] LifecycleState = Unprovisioned
2,366,350 UART: [state] DebugLocked = No
2,367,396 UART: [state] WD Timer not started. Device not locked for debugging
2,369,875 UART: [fake-rom-cold-reset] ++
2,370,988 UART: [fht] FHT @ 0x50003400
2,372,028 UART: [fwproc] Wait for Commands...
2,373,343 UART: [fwproc] Recv command 0x46574c44
2,374,780 UART: [fwproc] Recv'd Img size: 112032 bytes
3,826,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,895,475 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,955,513 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,272,713 >>> mbox cmd response: success
4,278,543 UART: [fake-rom-cold-reset] --
4,283,111 UART: [state] Locking Datavault
4,288,333 UART: [state] Locking PCR0, PCR1 and PCR31
4,289,934 UART: [state] Locking ICCM
4,291,993 UART: [exit] Launching FMC @ 0x40000000
4,300,211 UART:
4,300,466 UART: Running Caliptra FMC ...
4,301,522 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,224,174 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,365,750 UART:
2,366,166 UART: Running Caliptra ROM ...
2,367,338 UART:
2,367,508 UART: [state] CFI Enabled
2,368,497 UART: [state] LifecycleState = Unprovisioned
2,370,156 UART: [state] DebugLocked = No
2,371,268 UART: [state] WD Timer not started. Device not locked for debugging
2,373,742 UART: [fake-rom-cold-reset] ++
2,374,852 UART: [fht] FHT @ 0x50003400
2,375,888 UART: [fwproc] Wait for Commands...
2,377,172 UART: [fwproc] Recv command 0x46574c44
2,378,596 UART: [fwproc] Recv'd Img size: 112032 bytes
3,821,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,892,569 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,952,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,269,959 >>> mbox cmd response: success
4,275,794 UART: [fake-rom-cold-reset] --
4,279,387 UART: [state] Locking Datavault
4,285,907 UART: [state] Locking PCR0, PCR1 and PCR31
4,287,510 UART: [state] Locking ICCM
4,288,889 UART: [exit] Launching FMC @ 0x40000000
4,297,109 UART:
4,297,372 UART: Running Caliptra FMC ...
4,298,510 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
2,229,238 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,371,006 UART:
2,371,399 UART: Running Caliptra ROM ...
2,372,492 UART:
2,372,644 UART: [state] CFI Enabled
2,373,608 UART: [state] LifecycleState = Unprovisioned
2,375,267 UART: [state] DebugLocked = No
2,376,295 UART: [state] WD Timer not started. Device not locked for debugging
2,378,785 UART: [fake-rom-cold-reset] ++
2,379,811 UART: [fht] FHT @ 0x50003400
2,380,841 UART: [fwproc] Wait for Commands...
2,382,121 UART: [fwproc] Recv command 0x46574c44
2,383,708 UART: [fwproc] Recv'd Img size: 112032 bytes
3,832,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,908,278 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,968,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,286,161 >>> mbox cmd response: success
4,291,979 UART: [fake-rom-cold-reset] --
4,295,463 UART: [state] Locking Datavault
4,300,629 UART: [state] Locking PCR0, PCR1 and PCR31
4,302,229 UART: [state] Locking ICCM
4,304,860 UART: [exit] Launching FMC @ 0x40000000
4,313,091 UART:
4,313,354 UART: Running Caliptra FMC ...
4,314,508 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
2,226,599 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,368,036 UART:
2,368,442 UART: Running Caliptra ROM ...
2,369,611 UART:
2,369,784 UART: [state] CFI Enabled
2,370,692 UART: [state] LifecycleState = Unprovisioned
2,372,350 UART: [state] DebugLocked = No
2,373,457 UART: [state] WD Timer not started. Device not locked for debugging
2,376,275 UART: [fake-rom-cold-reset] ++
2,377,402 UART: [fht] FHT @ 0x50003400
2,378,440 UART: [fwproc] Wait for Commands...
2,379,726 UART: [fwproc] Recv command 0x46574c44
2,381,160 UART: [fwproc] Recv'd Img size: 112032 bytes
3,825,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,893,939 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,954,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,271,676 >>> mbox cmd response: success
4,277,487 UART: [fake-rom-cold-reset] --
4,281,488 UART: [state] Locking Datavault
4,286,911 UART: [state] Locking PCR0, PCR1 and PCR31
4,288,514 UART: [state] Locking ICCM
4,289,556 UART: [exit] Launching FMC @ 0x40000000
4,297,740 UART:
4,298,034 UART: Running Caliptra FMC ...
4,299,187 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
2,219,760 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,361,521 UART:
2,361,974 UART: Running Caliptra ROM ...
2,363,146 UART:
2,363,317 UART: [state] CFI Enabled
2,364,269 UART: [state] LifecycleState = Unprovisioned
2,365,935 UART: [state] DebugLocked = No
2,366,963 UART: [state] WD Timer not started. Device not locked for debugging
2,369,435 UART: [fake-rom-cold-reset] ++
2,370,456 UART: [fht] FHT @ 0x50003400
2,371,400 UART: [fwproc] Wait for Commands...
2,372,687 UART: [fwproc] Recv command 0x46574c44
2,374,118 UART: [fwproc] Recv'd Img size: 112032 bytes
3,818,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,895,517 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,955,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,273,614 >>> mbox cmd response: success
4,279,461 UART: [fake-rom-cold-reset] --
4,282,143 UART: [state] Locking Datavault
4,286,850 UART: [state] Locking PCR0, PCR1 and PCR31
4,288,456 UART: [state] Locking ICCM
4,290,668 UART: [exit] Launching FMC @ 0x40000000
4,298,886 UART:
4,299,142 UART: Running Caliptra FMC ...
4,300,277 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
2,228,367 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,370,034 UART:
2,370,464 UART: Running Caliptra ROM ...
2,371,637 UART:
2,371,816 UART: [state] CFI Enabled
2,372,789 UART: [state] LifecycleState = Unprovisioned
2,374,453 UART: [state] DebugLocked = No
2,375,557 UART: [state] WD Timer not started. Device not locked for debugging
2,378,037 UART: [fake-rom-cold-reset] ++
2,379,146 UART: [fht] FHT @ 0x50003400
2,380,174 UART: [fwproc] Wait for Commands...
2,381,454 UART: [fwproc] Recv command 0x46574c44
2,382,889 UART: [fwproc] Recv'd Img size: 112032 bytes
3,827,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,900,509 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,960,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,277,930 >>> mbox cmd response: success
4,283,746 UART: [fake-rom-cold-reset] --
4,288,032 UART: [state] Locking Datavault
4,293,309 UART: [state] Locking PCR0, PCR1 and PCR31
4,294,911 UART: [state] Locking ICCM
4,297,262 UART: [exit] Launching FMC @ 0x40000000
4,305,473 UART:
4,305,721 UART: Running Caliptra FMC ...
4,306,856 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [fake-rom-cold-reset] ++
88,670 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,864 UART: [fht] FHT @ 0x50003400
92,225 UART: [fwproc] Wait for Commands...
92,826 UART: [fwproc] Recv command 0x46574c44
93,554 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,870 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,608 >>> mbox cmd response: success
1,549,766 UART: [fake-rom-cold-reset] --
1,550,520 UART: [state] Locking Datavault
1,551,603 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,207 UART: [state] Locking ICCM
1,552,783 UART: [exit] Launching FMC @ 0x40000000
1,558,080 UART:
1,558,096 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [fake-rom-cold-reset] ++
88,868 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,996 UART: [fht] FHT @ 0x50003400
92,345 UART: [fwproc] Wait for Commands...
93,082 UART: [fwproc] Recv command 0x46574c44
93,810 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,764 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,452 >>> mbox cmd response: success
1,549,610 UART: [fake-rom-cold-reset] --
1,550,446 UART: [state] Locking Datavault
1,551,679 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,283 UART: [state] Locking ICCM
1,552,755 UART: [exit] Launching FMC @ 0x40000000
1,558,052 UART:
1,558,068 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,975 UART: [state] LifecycleState = Unprovisioned
85,634 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [fake-rom-cold-reset] ++
88,611 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,873 UART: [fht] FHT @ 0x50003400
92,254 UART: [fwproc] Wait for Commands...
92,991 UART: [fwproc] Recv command 0x46574c44
93,719 UART: [fwproc] Recv'd Img size: 112032 bytes
1,358,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,205 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,546,969 >>> mbox cmd response: success
1,548,127 UART: [fake-rom-cold-reset] --
1,548,885 UART: [state] Locking Datavault
1,550,178 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,782 UART: [state] Locking ICCM
1,551,404 UART: [exit] Launching FMC @ 0x40000000
1,556,701 UART:
1,556,717 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [fake-rom-cold-reset] ++
88,671 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,957 UART: [fht] FHT @ 0x50003400
92,264 UART: [fwproc] Wait for Commands...
92,861 UART: [fwproc] Recv command 0x46574c44
93,589 UART: [fwproc] Recv'd Img size: 112032 bytes
1,361,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,813 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,481 >>> mbox cmd response: success
1,550,639 UART: [fake-rom-cold-reset] --
1,551,581 UART: [state] Locking Datavault
1,553,006 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,610 UART: [state] Locking ICCM
1,554,084 UART: [exit] Launching FMC @ 0x40000000
1,559,381 UART:
1,559,397 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,710 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
86,082 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [fake-rom-cold-reset] ++
88,424 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,666 UART: [fht] FHT @ 0x50003400
91,911 UART: [fwproc] Wait for Commands...
92,662 UART: [fwproc] Recv command 0x46574c44
93,390 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,312 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,994 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,000 >>> mbox cmd response: success
1,549,158 UART: [fake-rom-cold-reset] --
1,550,100 UART: [state] Locking Datavault
1,551,139 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,743 UART: [state] Locking ICCM
1,552,407 UART: [exit] Launching FMC @ 0x40000000
1,557,704 UART:
1,557,720 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [fake-rom-cold-reset] ++
88,678 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,992 UART: [fht] FHT @ 0x50003400
92,345 UART: [fwproc] Wait for Commands...
93,028 UART: [fwproc] Recv command 0x46574c44
93,756 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,878 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,650 >>> mbox cmd response: success
1,550,808 UART: [fake-rom-cold-reset] --
1,551,542 UART: [state] Locking Datavault
1,552,811 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,415 UART: [state] Locking ICCM
1,554,023 UART: [exit] Launching FMC @ 0x40000000
1,559,320 UART:
1,559,336 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [fake-rom-cold-reset] ++
89,163 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,439 UART: [fht] FHT @ 0x50003400
92,810 UART: [fwproc] Wait for Commands...
93,655 UART: [fwproc] Recv command 0x46574c44
94,383 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,713 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,309 >>> mbox cmd response: success
1,550,467 UART: [fake-rom-cold-reset] --
1,551,371 UART: [state] Locking Datavault
1,552,512 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,116 UART: [state] Locking ICCM
1,553,540 UART: [exit] Launching FMC @ 0x40000000
1,558,837 UART:
1,558,853 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [fake-rom-cold-reset] ++
88,909 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,019 UART: [fht] FHT @ 0x50003400
92,310 UART: [fwproc] Wait for Commands...
92,911 UART: [fwproc] Recv command 0x46574c44
93,639 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,347 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,115 >>> mbox cmd response: success
1,550,273 UART: [fake-rom-cold-reset] --
1,551,201 UART: [state] Locking Datavault
1,552,402 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,006 UART: [state] Locking ICCM
1,553,430 UART: [exit] Launching FMC @ 0x40000000
1,558,727 UART:
1,558,743 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [fake-rom-cold-reset] ++
88,796 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,098 UART: [fht] FHT @ 0x50003400
92,431 UART: [fwproc] Wait for Commands...
93,204 UART: [fwproc] Recv command 0x46574c44
93,932 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,430 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,112 >>> mbox cmd response: success
1,549,270 UART: [fake-rom-cold-reset] --
1,550,246 UART: [state] Locking Datavault
1,551,235 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,839 UART: [state] Locking ICCM
1,552,375 UART: [exit] Launching FMC @ 0x40000000
1,557,672 UART:
1,557,688 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,170 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [fake-rom-cold-reset] ++
88,612 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,856 UART: [fht] FHT @ 0x50003400
92,077 UART: [fwproc] Wait for Commands...
92,902 UART: [fwproc] Recv command 0x46574c44
93,630 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,226 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,547,982 >>> mbox cmd response: success
1,549,140 UART: [fake-rom-cold-reset] --
1,549,982 UART: [state] Locking Datavault
1,550,949 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,553 UART: [state] Locking ICCM
1,552,141 UART: [exit] Launching FMC @ 0x40000000
1,557,438 UART:
1,557,454 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,975 UART: [state] WD Timer not started. Device not locked for debugging
88,449 UART: [fake-rom-cold-reset] ++
89,377 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,667 UART: [fht] FHT @ 0x50003400
93,114 UART: [fwproc] Wait for Commands...
93,711 UART: [fwproc] Recv command 0x46574c44
94,439 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,985 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,685 >>> mbox cmd response: success
1,549,843 UART: [fake-rom-cold-reset] --
1,550,687 UART: [state] Locking Datavault
1,551,594 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,198 UART: [state] Locking ICCM
1,552,726 UART: [exit] Launching FMC @ 0x40000000
1,558,023 UART:
1,558,039 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [fake-rom-cold-reset] ++
89,165 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,281 UART: [fht] FHT @ 0x50003400
92,590 UART: [fwproc] Wait for Commands...
93,241 UART: [fwproc] Recv command 0x46574c44
93,969 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,089 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,837 >>> mbox cmd response: success
1,549,995 UART: [fake-rom-cold-reset] --
1,550,795 UART: [state] Locking Datavault
1,551,844 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,448 UART: [state] Locking ICCM
1,553,110 UART: [exit] Launching FMC @ 0x40000000
1,558,407 UART:
1,558,423 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,102 UART:
192,517 UART: Running Caliptra ROM ...
193,705 UART:
193,855 UART: [state] CFI Enabled
266,871 UART: [state] LifecycleState = Production
269,099 UART: [state] DebugLocked = No
271,622 UART: [state] WD Timer not started. Device not locked for debugging
277,657 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,079 UART:
192,478 UART: Running Caliptra ROM ...
193,662 UART:
193,817 UART: [state] CFI Enabled
267,091 UART: [state] LifecycleState = Production
269,337 UART: [state] DebugLocked = No
272,019 UART: [state] WD Timer not started. Device not locked for debugging
277,403 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,734 UART:
193,114 UART: Running Caliptra ROM ...
194,360 UART:
604,097 UART: [state] CFI Enabled
618,837 UART: [state] LifecycleState = Production
621,076 UART: [state] DebugLocked = No
624,398 UART: [state] WD Timer not started. Device not locked for debugging
630,003 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,365 UART:
192,757 UART: Running Caliptra ROM ...
193,849 UART:
603,864 UART: [state] CFI Enabled
618,820 UART: [state] LifecycleState = Production
621,017 UART: [state] DebugLocked = No
623,156 UART: [state] WD Timer not started. Device not locked for debugging
629,774 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,247 UART:
192,619 UART: Running Caliptra ROM ...
193,790 UART:
193,943 UART: [state] CFI Enabled
262,526 UART: [state] LifecycleState = Production
264,209 UART: [state] DebugLocked = No
265,322 UART: [state] WD Timer not started. Device not locked for debugging
268,749 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
192,293 UART:
192,661 UART: Running Caliptra ROM ...
193,846 UART:
193,997 UART: [state] CFI Enabled
261,430 UART: [state] LifecycleState = Production
263,100 UART: [state] DebugLocked = No
265,684 UART: [state] WD Timer not started. Device not locked for debugging
269,486 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,521 UART:
192,947 UART: Running Caliptra ROM ...
194,143 UART:
603,560 UART: [state] CFI Enabled
617,553 UART: [state] LifecycleState = Production
619,137 UART: [state] DebugLocked = No
620,938 UART: [state] WD Timer not started. Device not locked for debugging
625,219 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,440 UART:
192,823 UART: Running Caliptra ROM ...
194,000 UART:
603,671 UART: [state] CFI Enabled
619,916 UART: [state] LifecycleState = Production
621,496 UART: [state] DebugLocked = No
623,802 UART: [state] WD Timer not started. Device not locked for debugging
628,685 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,320 UART:
192,680 UART: Running Caliptra ROM ...
193,863 UART:
194,016 UART: [state] CFI Enabled
262,934 UART: [state] LifecycleState = Production
264,604 UART: [state] DebugLocked = No
265,876 UART: [state] WD Timer not started. Device not locked for debugging
270,912 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,316 UART:
192,720 UART: Running Caliptra ROM ...
193,856 UART:
603,329 UART: [state] CFI Enabled
616,381 UART: [state] LifecycleState = Production
618,021 UART: [state] DebugLocked = No
620,482 UART: [state] WD Timer not started. Device not locked for debugging
624,658 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Production
85,767 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Production
85,863 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Production
86,154 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
88,122 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Production
85,958 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
88,122 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Production
85,643 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Production
85,999 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Production
85,814 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,870 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Production
86,124 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
88,302 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Production
85,923 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,696 UART: [state] LifecycleState = Production
85,311 UART: [state] DebugLocked = No
86,026 UART: [state] WD Timer not started. Device not locked for debugging
87,215 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Production
85,836 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Production
86,308 UART: [state] DebugLocked = No
86,975 UART: [state] WD Timer not started. Device not locked for debugging
88,294 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,035 UART:
192,418 UART: Running Caliptra ROM ...
193,508 UART:
193,653 UART: [state] CFI Enabled
264,008 UART: [state] LifecycleState = Production
266,257 UART: Fake ROM in Prod lifecycle disabled
268,210 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,086 UART:
192,479 UART: Running Caliptra ROM ...
193,667 UART:
193,814 UART: [state] CFI Enabled
262,008 UART: [state] LifecycleState = Production
264,252 UART: Fake ROM in Prod lifecycle disabled
266,252 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,520 UART:
193,013 UART: Running Caliptra ROM ...
194,151 UART:
604,160 UART: [state] CFI Enabled
615,055 UART: [state] LifecycleState = Production
617,279 UART: Fake ROM in Prod lifecycle disabled
619,270 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,456 UART:
192,835 UART: Running Caliptra ROM ...
193,979 UART:
603,959 UART: [state] CFI Enabled
618,381 UART: [state] LifecycleState = Production
620,619 UART: Fake ROM in Prod lifecycle disabled
622,626 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,123 UART:
192,509 UART: Running Caliptra ROM ...
193,695 UART:
193,851 UART: [state] CFI Enabled
261,060 UART: [state] LifecycleState = Production
262,671 UART: Fake ROM in Prod lifecycle disabled
264,167 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,020 UART:
192,413 UART: Running Caliptra ROM ...
193,601 UART:
193,750 UART: [state] CFI Enabled
262,734 UART: [state] LifecycleState = Production
264,490 UART: Fake ROM in Prod lifecycle disabled
265,989 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,142 writing to cptra_bootfsm_go
193,254 UART:
193,642 UART: Running Caliptra ROM ...
194,827 UART:
604,488 UART: [state] CFI Enabled
617,179 UART: [state] LifecycleState = Production
618,759 UART: Fake ROM in Prod lifecycle disabled
620,250 UART: ROM Fatal Error: 0x0105000Btest test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,459 UART:
192,828 UART: Running Caliptra ROM ...
193,925 UART:
603,667 UART: [state] CFI Enabled
615,804 UART: [state] LifecycleState = Production
617,390 UART: Fake ROM in Prod lifecycle disabled
618,880 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,410 writing to cptra_bootfsm_go
192,441 UART:
192,808 UART: Running Caliptra ROM ...
193,993 UART:
194,143 UART: [state] CFI Enabled
260,278 UART: [state] LifecycleState = Production
261,946 UART: Fake ROM in Prod lifecycle disabled
263,449 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,529 UART:
192,901 UART: Running Caliptra ROM ...
194,083 UART:
603,713 UART: [state] CFI Enabled
617,529 UART: [state] LifecycleState = Production
619,099 UART: Fake ROM in Prod lifecycle disabled
620,521 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Production
85,920 UART: Fake ROM in Prod lifecycle disabled
86,514 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,610 UART: [state] LifecycleState = Production
86,218 UART: Fake ROM in Prod lifecycle disabled
86,812 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Production
85,979 UART: Fake ROM in Prod lifecycle disabled
86,573 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Production
85,831 UART: Fake ROM in Prod lifecycle disabled
86,425 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Production
85,774 UART: Fake ROM in Prod lifecycle disabled
86,368 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Production
85,824 UART: Fake ROM in Prod lifecycle disabled
86,418 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Production
85,897 UART: Fake ROM in Prod lifecycle disabled
86,491 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Production
85,693 UART: Fake ROM in Prod lifecycle disabled
86,287 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Production
86,046 UART: Fake ROM in Prod lifecycle disabled
86,640 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Production
86,136 UART: Fake ROM in Prod lifecycle disabled
86,730 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Production
85,961 UART: Fake ROM in Prod lifecycle disabled
86,555 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Production
86,107 UART: Fake ROM in Prod lifecycle disabled
86,701 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
2,214,393 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,355,685 UART:
2,356,104 UART: Running Caliptra ROM ...
2,357,191 UART:
2,357,347 UART: [state] CFI Enabled
2,358,321 UART: [state] LifecycleState = Unprovisioned
2,359,972 UART: [state] DebugLocked = No
2,360,992 UART: [state] WD Timer not started. Device not locked for debugging
2,363,460 UART: [fake-rom-cold-reset] ++
2,364,486 UART: [fht] FHT @ 0x50003400
2,365,485 UART: [fwproc] Wait for Commands...
2,366,781 UART: [fwproc] Recv command 0x46574c44
2,368,131 UART: [fwproc] Recv'd Img size: 111688 bytes
3,778,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,852,802 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,962,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,548,398 >>> mbox cmd response: success
4,554,457 UART: [fake-rom-cold-reset] --
4,557,273 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
4,697,416 UART: [state] Locking Datavault
4,698,682 UART: [state] Locking PCR0, PCR1 and PCR31
4,700,462 UART: [state] Locking ICCM
4,701,455 UART: [exit] Launching FMC @ 0x40000000
4,702,883 UART:
4,703,040 UART: Running Caliptra FMC ...
4,704,137 UART:
4,704,319 UART: [fmc] Received command: 0x46574C44
4,705,778 UART:
4,705,934 UART: Running Caliptra ROM ...
4,707,029 UART:
4,707,184 UART: [state] CFI Enabled
4,765,618 UART: [state] LifecycleState = Unprovisioned
4,768,001 UART: [state] DebugLocked = No
4,770,304 UART: [state] WD Timer not started. Device not locked for debugging
4,778,060 UART: [update-reset] ++
6,221,306 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,224,748 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
6,868,469 UART: [update-reset] Copying MAN_2 To MAN_1
6,891,391 UART: [update-reset Success] --
6,893,002 >>> mbox cmd response: success
6,893,224 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,896,085 UART: [state] Locking Datavault
6,899,361 UART: [state] Locking PCR0, PCR1 and PCR31
6,901,505 UART: [state] Locking ICCM
6,903,742 UART: [exit] Launching FMC @ 0x40000000
6,912,518 UART:
6,912,757 UART: Running Caliptra FMC ...
6,913,858 UART:
6,914,013 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,915,658 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,214,876 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,355,912 UART:
2,356,313 UART: Running Caliptra ROM ...
2,357,402 UART:
2,357,556 UART: [state] CFI Enabled
2,358,548 UART: [state] LifecycleState = Unprovisioned
2,360,211 UART: [state] DebugLocked = No
2,361,235 UART: [state] WD Timer not started. Device not locked for debugging
2,363,702 UART: [fake-rom-cold-reset] ++
2,364,728 UART: [fht] FHT @ 0x50003400
2,365,860 UART: [fwproc] Wait for Commands...
2,367,139 UART: [fwproc] Recv command 0x46574c44
2,368,564 UART: [fwproc] Recv'd Img size: 111688 bytes
3,772,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,847,859 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,957,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,543,336 >>> mbox cmd response: success
4,549,355 UART: [fake-rom-cold-reset] --
4,551,895 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
4,692,052 UART: [state] Locking Datavault
4,693,325 UART: [state] Locking PCR0, PCR1 and PCR31
4,695,010 UART: [state] Locking ICCM
4,695,949 UART: [exit] Launching FMC @ 0x40000000
4,697,389 UART:
4,697,548 UART: Running Caliptra FMC ...
4,698,649 UART:
4,698,804 UART: [fmc] Received command: 0x46574C44
4,700,262 UART:
4,700,419 UART: Running Caliptra ROM ...
4,701,517 UART:
4,701,672 UART: [state] CFI Enabled
4,763,945 UART: [state] LifecycleState = Unprovisioned
4,766,327 UART: [state] DebugLocked = No
4,769,057 UART: [state] WD Timer not started. Device not locked for debugging
4,775,244 UART: [update-reset] ++
6,221,298 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,225,474 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
6,869,079 UART: [update-reset] Copying MAN_2 To MAN_1
6,891,982 UART: [update-reset Success] --
6,893,648 >>> mbox cmd response: success
6,893,876 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,895,937 UART: [state] Locking Datavault
6,901,256 UART: [state] Locking PCR0, PCR1 and PCR31
6,903,407 UART: [state] Locking ICCM
6,906,374 UART: [exit] Launching FMC @ 0x40000000
6,915,159 UART:
6,915,393 UART: Running Caliptra FMC ...
6,916,492 UART:
6,916,647 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,918,280 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,223,286 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,365,114 UART:
2,365,538 UART: Running Caliptra ROM ...
2,366,713 UART:
2,366,885 UART: [state] CFI Enabled
2,367,850 UART: [state] LifecycleState = Unprovisioned
2,369,502 UART: [state] DebugLocked = No
2,370,561 UART: [state] WD Timer not started. Device not locked for debugging
2,373,032 UART: [fake-rom-cold-reset] ++
2,374,138 UART: [fht] FHT @ 0x50003400
2,375,165 UART: [fwproc] Wait for Commands...
2,376,440 UART: [fwproc] Recv command 0x46574c44
2,377,864 UART: [fwproc] Recv'd Img size: 111688 bytes
3,786,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,865,609 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,975,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,561,955 >>> mbox cmd response: success
4,567,991 UART: [fake-rom-cold-reset] --
4,570,562 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
4,710,927 UART: [state] Locking Datavault
4,712,199 UART: [state] Locking PCR0, PCR1 and PCR31
4,713,745 UART: [state] Locking ICCM
4,714,624 UART: [exit] Launching FMC @ 0x40000000
4,716,038 UART:
4,716,198 UART: Running Caliptra FMC ...
4,717,288 UART:
4,717,437 UART: [fmc] Received command: 0x46574C44
4,718,885 UART:
4,719,033 UART: Running Caliptra ROM ...
4,720,127 UART:
4,720,276 UART: [state] CFI Enabled
4,729,343 UART: [state] LifecycleState = Unprovisioned
4,731,664 UART: [state] DebugLocked = No
4,734,626 UART: [state] WD Timer not started. Device not locked for debugging
4,743,448 UART: [update-reset] ++
6,195,286 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,199,527 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
6,843,789 UART: [update-reset] Copying MAN_2 To MAN_1
6,866,684 UART: [update-reset Success] --
6,868,362 >>> mbox cmd response: success
6,868,581 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,870,187 UART: [state] Locking Datavault
6,874,092 UART: [state] Locking PCR0, PCR1 and PCR31
6,876,287 UART: [state] Locking ICCM
6,878,919 UART: [exit] Launching FMC @ 0x40000000
6,887,696 UART:
6,887,932 UART: Running Caliptra FMC ...
6,889,027 UART:
6,889,182 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,890,832 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,932 writing to cptra_bootfsm_go
2,227,055 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,368,408 UART:
2,368,843 UART: Running Caliptra ROM ...
2,369,931 UART:
2,370,079 UART: [state] CFI Enabled
2,371,055 UART: [state] LifecycleState = Unprovisioned
2,372,727 UART: [state] DebugLocked = No
2,373,785 UART: [state] WD Timer not started. Device not locked for debugging
2,376,270 UART: [fake-rom-cold-reset] ++
2,377,380 UART: [fht] FHT @ 0x50003400
2,378,407 UART: [fwproc] Wait for Commands...
2,379,685 UART: [fwproc] Recv command 0x46574c44
2,381,108 UART: [fwproc] Recv'd Img size: 111688 bytes
3,783,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,859,133 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,969,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
4,555,838 >>> mbox cmd response: success
4,561,871 UART: [fake-rom-cold-reset] --
4,564,497 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
4,704,630 UART: [state] Locking Datavault
4,705,889 UART: [state] Locking PCR0, PCR1 and PCR31
4,707,355 UART: [state] Locking ICCM
4,708,227 UART: [exit] Launching FMC @ 0x40000000
4,709,650 UART:
4,709,800 UART: Running Caliptra FMC ...
4,710,808 UART:
4,710,945 UART: [fmc] Received command: 0x46574C44
4,712,399 UART:
4,712,547 UART: Running Caliptra ROM ...
4,713,550 UART:
4,713,687 UART: [state] CFI Enabled
4,721,487 UART: [state] LifecycleState = Unprovisioned
4,723,875 UART: [state] DebugLocked = No
4,726,367 UART: [state] WD Timer not started. Device not locked for debugging
4,732,300 UART: [update-reset] ++
6,180,587 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,184,847 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
6,828,210 UART: [update-reset] Copying MAN_2 To MAN_1
6,851,135 UART: [update-reset Success] --
6,852,787 >>> mbox cmd response: success
6,852,993 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,856,328 UART: [state] Locking Datavault
6,859,855 UART: [state] Locking PCR0, PCR1 and PCR31
6,862,045 UART: [state] Locking ICCM
6,864,601 UART: [exit] Launching FMC @ 0x40000000
6,873,428 UART:
6,873,652 UART: Running Caliptra FMC ...
6,874,667 UART:
6,874,806 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,876,446 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,217,832 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,359,299 UART:
2,359,726 UART: Running Caliptra ROM ...
2,360,805 UART:
2,360,959 UART: [state] CFI Enabled
2,361,941 UART: [state] LifecycleState = Unprovisioned
2,363,960 UART: [state] DebugLocked = No
2,365,001 UART: [state] WD Timer not started. Device not locked for debugging
2,367,492 UART: [fake-rom-cold-reset] ++
2,368,522 UART: [fht] FHT @ 0x50003400
2,369,496 UART: [fwproc] Wait for Commands...
2,370,788 UART: [fwproc] Recv command 0x46574c44
2,372,136 UART: [fwproc] Recv'd Img size: 112032 bytes
3,811,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,883,426 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,943,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,261,354 >>> mbox cmd response: success
4,267,166 UART: [fake-rom-cold-reset] --
4,269,542 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,410,345 UART: [state] Locking Datavault
4,411,616 UART: [state] Locking PCR0, PCR1 and PCR31
4,413,175 UART: [state] Locking ICCM
4,414,091 UART: [exit] Launching FMC @ 0x40000000
4,415,523 UART:
4,415,684 UART: Running Caliptra FMC ...
4,416,784 UART:
4,416,940 UART: [fmc] Received command: 0x46574C44
4,418,396 UART:
4,418,551 UART: Running Caliptra ROM ...
4,419,651 UART:
4,419,808 UART: [state] CFI Enabled
4,484,255 UART: [state] LifecycleState = Unprovisioned
4,485,992 UART: [state] DebugLocked = No
4,487,166 UART: [state] WD Timer not started. Device not locked for debugging
4,494,196 UART: [update-reset] ++
5,970,279 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,973,826 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,350,155 UART: [update-reset] Copying MAN_2 To MAN_1
6,372,405 UART: [update-reset Success] --
6,373,714 >>> mbox cmd response: success
6,373,932 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,377,491 UART: [state] Locking Datavault
6,379,618 UART: [state] Locking PCR0, PCR1 and PCR31
6,381,159 UART: [state] Locking ICCM
6,383,659 UART: [exit] Launching FMC @ 0x40000000
6,391,845 UART:
6,392,081 UART: Running Caliptra FMC ...
6,393,107 UART:
6,393,272 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,394,911 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,223,569 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,365,312 UART:
2,365,757 UART: Running Caliptra ROM ...
2,366,828 UART:
2,366,985 UART: [state] CFI Enabled
2,367,964 UART: [state] LifecycleState = Unprovisioned
2,369,641 UART: [state] DebugLocked = No
2,370,672 UART: [state] WD Timer not started. Device not locked for debugging
2,373,154 UART: [fake-rom-cold-reset] ++
2,374,180 UART: [fht] FHT @ 0x50003400
2,375,150 UART: [fwproc] Wait for Commands...
2,376,435 UART: [fwproc] Recv command 0x46574c44
2,377,792 UART: [fwproc] Recv'd Img size: 112032 bytes
3,823,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,898,272 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,958,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,277,138 >>> mbox cmd response: success
4,282,950 UART: [fake-rom-cold-reset] --
4,285,069 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,425,790 UART: [state] Locking Datavault
4,427,057 UART: [state] Locking PCR0, PCR1 and PCR31
4,428,530 UART: [state] Locking ICCM
4,429,420 UART: [exit] Launching FMC @ 0x40000000
4,430,857 UART:
4,431,019 UART: Running Caliptra FMC ...
4,432,128 UART:
4,432,285 UART: [fmc] Received command: 0x46574C44
4,433,745 UART:
4,433,899 UART: Running Caliptra ROM ...
4,434,911 UART:
4,435,056 UART: [state] CFI Enabled
4,488,440 UART: [state] LifecycleState = Unprovisioned
4,490,155 UART: [state] DebugLocked = No
4,492,642 UART: [state] WD Timer not started. Device not locked for debugging
4,499,398 UART: [update-reset] ++
5,972,034 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,975,357 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,351,765 UART: [update-reset] Copying MAN_2 To MAN_1
6,373,988 UART: [update-reset Success] --
6,375,263 >>> mbox cmd response: success
6,375,479 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,379,150 UART: [state] Locking Datavault
6,382,339 UART: [state] Locking PCR0, PCR1 and PCR31
6,383,947 UART: [state] Locking ICCM
6,384,964 UART: [exit] Launching FMC @ 0x40000000
6,393,145 UART:
6,393,386 UART: Running Caliptra FMC ...
6,394,490 UART:
6,394,648 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,396,277 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
2,220,718 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,363,269 UART:
2,363,710 UART: Running Caliptra ROM ...
2,364,882 UART:
2,365,056 UART: [state] CFI Enabled
2,366,039 UART: [state] LifecycleState = Unprovisioned
2,367,687 UART: [state] DebugLocked = No
2,368,792 UART: [state] WD Timer not started. Device not locked for debugging
2,371,262 UART: [fake-rom-cold-reset] ++
2,372,363 UART: [fht] FHT @ 0x50003400
2,373,390 UART: [fwproc] Wait for Commands...
2,374,670 UART: [fwproc] Recv command 0x46574c44
2,376,098 UART: [fwproc] Recv'd Img size: 112032 bytes
3,820,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,896,061 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,956,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,274,618 >>> mbox cmd response: success
4,280,434 UART: [fake-rom-cold-reset] --
4,282,548 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,423,933 UART: [state] Locking Datavault
4,425,223 UART: [state] Locking PCR0, PCR1 and PCR31
4,426,777 UART: [state] Locking ICCM
4,427,692 UART: [exit] Launching FMC @ 0x40000000
4,429,118 UART:
4,429,277 UART: Running Caliptra FMC ...
4,430,372 UART:
4,430,528 UART: [fmc] Received command: 0x46574C44
4,431,984 UART:
4,432,137 UART: Running Caliptra ROM ...
4,433,234 UART:
4,433,389 UART: [state] CFI Enabled
4,439,003 UART: [state] LifecycleState = Unprovisioned
4,440,721 UART: [state] DebugLocked = No
4,443,006 UART: [state] WD Timer not started. Device not locked for debugging
4,449,351 UART: [update-reset] ++
5,922,365 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,925,565 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,301,343 UART: [update-reset] Copying MAN_2 To MAN_1
6,323,591 UART: [update-reset Success] --
6,324,889 >>> mbox cmd response: success
6,325,109 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,327,266 UART: [state] Locking Datavault
6,331,169 UART: [state] Locking PCR0, PCR1 and PCR31
6,332,712 UART: [state] Locking ICCM
6,335,022 UART: [exit] Launching FMC @ 0x40000000
6,343,202 UART:
6,343,432 UART: Running Caliptra FMC ...
6,344,534 UART:
6,344,688 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,346,340 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,222,129 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,363,895 UART:
2,364,331 UART: Running Caliptra ROM ...
2,365,417 UART:
2,365,568 UART: [state] CFI Enabled
2,366,483 UART: [state] LifecycleState = Unprovisioned
2,368,138 UART: [state] DebugLocked = No
2,369,251 UART: [state] WD Timer not started. Device not locked for debugging
2,371,718 UART: [fake-rom-cold-reset] ++
2,372,822 UART: [fht] FHT @ 0x50003400
2,373,852 UART: [fwproc] Wait for Commands...
2,375,128 UART: [fwproc] Recv command 0x46574c44
2,376,556 UART: [fwproc] Recv'd Img size: 112032 bytes
3,816,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,885,961 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,946,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,264,628 >>> mbox cmd response: success
4,270,500 UART: [fake-rom-cold-reset] --
4,272,914 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,413,576 UART: [state] Locking Datavault
4,414,851 UART: [state] Locking PCR0, PCR1 and PCR31
4,416,403 UART: [state] Locking ICCM
4,417,321 UART: [exit] Launching FMC @ 0x40000000
4,418,747 UART:
4,418,908 UART: Running Caliptra FMC ...
4,420,006 UART:
4,420,169 UART: [fmc] Received command: 0x46574C44
4,421,630 UART:
4,421,783 UART: Running Caliptra ROM ...
4,422,878 UART:
4,423,028 UART: [state] CFI Enabled
4,431,845 UART: [state] LifecycleState = Unprovisioned
4,433,603 UART: [state] DebugLocked = No
4,435,596 UART: [state] WD Timer not started. Device not locked for debugging
4,439,547 UART: [update-reset] ++
5,922,173 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,925,622 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,301,294 UART: [update-reset] Copying MAN_2 To MAN_1
6,323,498 UART: [update-reset Success] --
6,324,779 >>> mbox cmd response: success
6,324,992 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,328,231 UART: [state] Locking Datavault
6,330,941 UART: [state] Locking PCR0, PCR1 and PCR31
6,332,477 UART: [state] Locking ICCM
6,334,891 UART: [exit] Launching FMC @ 0x40000000
6,343,073 UART:
6,343,310 UART: Running Caliptra FMC ...
6,344,408 UART:
6,344,557 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,346,207 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,229,762 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,371,772 UART:
2,372,191 UART: Running Caliptra ROM ...
2,373,270 UART:
2,373,425 UART: [state] CFI Enabled
2,374,419 UART: [state] LifecycleState = Unprovisioned
2,376,083 UART: [state] DebugLocked = No
2,377,111 UART: [state] WD Timer not started. Device not locked for debugging
2,379,585 UART: [fake-rom-cold-reset] ++
2,380,610 UART: [fht] FHT @ 0x50003400
2,381,554 UART: [fwproc] Wait for Commands...
2,382,838 UART: [fwproc] Recv command 0x46574c44
2,384,278 UART: [fwproc] Recv'd Img size: 112032 bytes
3,826,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,900,555 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,960,574 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,279,038 >>> mbox cmd response: success
4,284,879 UART: [fake-rom-cold-reset] --
4,287,282 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,428,119 UART: [state] Locking Datavault
4,429,398 UART: [state] Locking PCR0, PCR1 and PCR31
4,430,954 UART: [state] Locking ICCM
4,431,842 UART: [exit] Launching FMC @ 0x40000000
4,433,192 UART:
4,433,340 UART: Running Caliptra FMC ...
4,434,387 UART:
4,434,533 UART: [fmc] Received command: 0x46574C44
4,435,992 UART:
4,436,150 UART: Running Caliptra ROM ...
4,437,282 UART:
4,437,442 UART: [state] CFI Enabled
4,488,536 UART: [state] LifecycleState = Unprovisioned
4,490,264 UART: [state] DebugLocked = No
4,492,072 UART: [state] WD Timer not started. Device not locked for debugging
4,498,679 UART: [update-reset] ++
5,978,011 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,981,834 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,357,618 UART: [update-reset] Copying MAN_2 To MAN_1
6,379,839 UART: [update-reset Success] --
6,381,116 >>> mbox cmd response: success
6,381,335 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,385,161 UART: [state] Locking Datavault
6,388,961 UART: [state] Locking PCR0, PCR1 and PCR31
6,390,513 UART: [state] Locking ICCM
6,392,344 UART: [exit] Launching FMC @ 0x40000000
6,400,547 UART:
6,400,792 UART: Running Caliptra FMC ...
6,401,894 UART:
6,402,051 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,403,690 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
2,223,493 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,365,060 UART:
2,365,484 UART: Running Caliptra ROM ...
2,366,592 UART:
2,366,780 UART: [state] CFI Enabled
2,367,758 UART: [state] LifecycleState = Unprovisioned
2,369,462 UART: [state] DebugLocked = No
2,370,493 UART: [state] WD Timer not started. Device not locked for debugging
2,372,966 UART: [fake-rom-cold-reset] ++
2,373,995 UART: [fht] FHT @ 0x50003400
2,374,965 UART: [fwproc] Wait for Commands...
2,376,247 UART: [fwproc] Recv command 0x46574c44
2,377,805 UART: [fwproc] Recv'd Img size: 112032 bytes
3,809,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,887,231 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,947,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
4,264,928 >>> mbox cmd response: success
4,270,739 UART: [fake-rom-cold-reset] --
4,272,866 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
4,413,673 UART: [state] Locking Datavault
4,414,952 UART: [state] Locking PCR0, PCR1 and PCR31
4,416,503 UART: [state] Locking ICCM
4,417,412 UART: [exit] Launching FMC @ 0x40000000
4,418,838 UART:
4,418,993 UART: Running Caliptra FMC ...
4,420,091 UART:
4,420,249 UART: [fmc] Received command: 0x46574C44
4,421,704 UART:
4,421,857 UART: Running Caliptra ROM ...
4,422,953 UART:
4,423,108 UART: [state] CFI Enabled
4,428,290 UART: [state] LifecycleState = Unprovisioned
4,430,005 UART: [state] DebugLocked = No
4,432,513 UART: [state] WD Timer not started. Device not locked for debugging
4,437,972 UART: [update-reset] ++
5,907,057 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,910,363 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,285,818 UART: [update-reset] Copying MAN_2 To MAN_1
6,308,067 UART: [update-reset Success] --
6,309,431 >>> mbox cmd response: success
6,309,679 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,312,382 UART: [state] Locking Datavault
6,315,257 UART: [state] Locking PCR0, PCR1 and PCR31
6,316,845 UART: [state] Locking ICCM
6,318,318 UART: [exit] Launching FMC @ 0x40000000
6,326,548 UART:
6,326,788 UART: Running Caliptra FMC ...
6,327,812 UART:
6,327,961 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,329,598 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,090 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [fake-rom-cold-reset] ++
88,484 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,616 UART: [fht] FHT @ 0x50003400
91,865 UART: [fwproc] Wait for Commands...
92,586 UART: [fwproc] Recv command 0x46574c44
93,314 UART: [fwproc] Recv'd Img size: 112032 bytes
1,358,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,370 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,128 >>> mbox cmd response: success
1,549,286 UART: [fake-rom-cold-reset] --
1,549,681 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,549,982 UART: [state] Locking Datavault
1,551,261 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,865 UART: [state] Locking ICCM
1,552,343 UART: [exit] Launching FMC @ 0x40000000
1,557,640 UART:
1,557,656 UART: Running Caliptra FMC ...
1,558,064 UART:
1,558,205 UART: [fmc] Received command: 0x46574C44
1,559,029 UART:
1,559,045 UART: Running Caliptra ROM ...
1,559,453 UART:
1,559,508 UART: [state] CFI Enabled
1,562,140 UART: [state] LifecycleState = Unprovisioned
1,562,799 UART: [state] DebugLocked = No
1,563,326 UART: [state] WD Timer not started. Device not locked for debugging
1,564,962 UART: [update-reset] ++
2,845,843 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,846,803 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,995,256 UART: [update-reset] Copying MAN_2 To MAN_1
3,003,270 UART: [update-reset Success] --
3,003,679 >>> mbox cmd response: success
3,003,679 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,004,426 UART: [state] Locking Datavault
3,005,268 UART: [state] Locking PCR0, PCR1 and PCR31
3,005,872 UART: [state] Locking ICCM
3,006,308 UART: [exit] Launching FMC @ 0x40000000
3,011,605 UART:
3,011,621 UART: Running Caliptra FMC ...
3,012,029 UART:
3,012,170 UART: [fmc] Received command: 0x1000000C
3,012,905 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,744 UART: [state] LifecycleState = Unprovisioned
85,403 UART: [state] DebugLocked = No
85,998 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [fake-rom-cold-reset] ++
88,254 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,436 UART: [fht] FHT @ 0x50003400
91,741 UART: [fwproc] Wait for Commands...
92,564 UART: [fwproc] Recv command 0x46574c44
93,292 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,858 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,547,536 >>> mbox cmd response: success
1,548,694 UART: [fake-rom-cold-reset] --
1,549,089 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,549,722 UART: [state] Locking Datavault
1,551,139 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,743 UART: [state] Locking ICCM
1,552,235 UART: [exit] Launching FMC @ 0x40000000
1,557,532 UART:
1,557,548 UART: Running Caliptra FMC ...
1,557,956 UART:
1,558,097 UART: [fmc] Received command: 0x46574C44
1,558,921 UART:
1,558,937 UART: Running Caliptra ROM ...
1,559,345 UART:
1,559,400 UART: [state] CFI Enabled
1,562,146 UART: [state] LifecycleState = Unprovisioned
1,562,805 UART: [state] DebugLocked = No
1,563,458 UART: [state] WD Timer not started. Device not locked for debugging
1,565,260 UART: [update-reset] ++
2,846,857 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,847,989 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,996,526 UART: [update-reset] Copying MAN_2 To MAN_1
3,004,540 UART: [update-reset Success] --
3,004,949 >>> mbox cmd response: success
3,004,949 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,005,714 UART: [state] Locking Datavault
3,006,466 UART: [state] Locking PCR0, PCR1 and PCR31
3,007,070 UART: [state] Locking ICCM
3,007,626 UART: [exit] Launching FMC @ 0x40000000
3,012,923 UART:
3,012,939 UART: Running Caliptra FMC ...
3,013,347 UART:
3,013,488 UART: [fmc] Received command: 0x1000000C
3,014,223 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [fake-rom-cold-reset] ++
89,139 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,213 UART: [fht] FHT @ 0x50003400
92,570 UART: [fwproc] Wait for Commands...
93,343 UART: [fwproc] Recv command 0x46574c44
94,071 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,407 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,181 >>> mbox cmd response: success
1,550,339 UART: [fake-rom-cold-reset] --
1,550,734 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,551,293 UART: [state] Locking Datavault
1,552,690 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,294 UART: [state] Locking ICCM
1,553,890 UART: [exit] Launching FMC @ 0x40000000
1,559,187 UART:
1,559,203 UART: Running Caliptra FMC ...
1,559,611 UART:
1,559,752 UART: [fmc] Received command: 0x46574C44
1,560,576 UART:
1,560,592 UART: Running Caliptra ROM ...
1,561,000 UART:
1,561,142 UART: [state] CFI Enabled
1,563,876 UART: [state] LifecycleState = Unprovisioned
1,564,535 UART: [state] DebugLocked = No
1,565,270 UART: [state] WD Timer not started. Device not locked for debugging
1,567,004 UART: [update-reset] ++
2,848,059 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,849,199 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,997,656 UART: [update-reset] Copying MAN_2 To MAN_1
3,005,670 UART: [update-reset Success] --
3,006,079 >>> mbox cmd response: success
3,006,079 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,006,874 UART: [state] Locking Datavault
3,007,658 UART: [state] Locking PCR0, PCR1 and PCR31
3,008,262 UART: [state] Locking ICCM
3,008,786 UART: [exit] Launching FMC @ 0x40000000
3,014,083 UART:
3,014,099 UART: Running Caliptra FMC ...
3,014,507 UART:
3,014,648 UART: [fmc] Received command: 0x1000000C
3,015,383 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [fake-rom-cold-reset] ++
88,611 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,811 UART: [fht] FHT @ 0x50003400
92,116 UART: [fwproc] Wait for Commands...
92,889 UART: [fwproc] Recv command 0x46574c44
93,617 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,389,037 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,414,719 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,550,695 >>> mbox cmd response: success
1,551,853 UART: [fake-rom-cold-reset] --
1,552,248 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,552,619 UART: [state] Locking Datavault
1,553,916 UART: [state] Locking PCR0, PCR1 and PCR31
1,554,520 UART: [state] Locking ICCM
1,555,054 UART: [exit] Launching FMC @ 0x40000000
1,560,351 UART:
1,560,367 UART: Running Caliptra FMC ...
1,560,775 UART:
1,560,916 UART: [fmc] Received command: 0x46574C44
1,561,740 UART:
1,561,756 UART: Running Caliptra ROM ...
1,562,164 UART:
1,562,306 UART: [state] CFI Enabled
1,564,672 UART: [state] LifecycleState = Unprovisioned
1,565,331 UART: [state] DebugLocked = No
1,565,980 UART: [state] WD Timer not started. Device not locked for debugging
1,567,720 UART: [update-reset] ++
2,847,887 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,848,925 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,997,278 UART: [update-reset] Copying MAN_2 To MAN_1
3,005,292 UART: [update-reset Success] --
3,005,701 >>> mbox cmd response: success
3,005,701 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,006,262 UART: [state] Locking Datavault
3,006,986 UART: [state] Locking PCR0, PCR1 and PCR31
3,007,590 UART: [state] Locking ICCM
3,008,138 UART: [exit] Launching FMC @ 0x40000000
3,013,435 UART:
3,013,451 UART: Running Caliptra FMC ...
3,013,859 UART:
3,014,000 UART: [fmc] Received command: 0x1000000C
3,014,735 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
88,086 UART: [fake-rom-cold-reset] ++
89,014 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,338 UART: [fht] FHT @ 0x50003400
92,681 UART: [fwproc] Wait for Commands...
93,380 UART: [fwproc] Recv command 0x46574c44
94,108 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,246 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,006 >>> mbox cmd response: success
1,550,164 UART: [fake-rom-cold-reset] --
1,550,559 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,970 UART: [state] Locking Datavault
1,552,167 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,771 UART: [state] Locking ICCM
1,553,409 UART: [exit] Launching FMC @ 0x40000000
1,558,706 UART:
1,558,722 UART: Running Caliptra FMC ...
1,559,130 UART:
1,559,271 UART: [fmc] Received command: 0x46574C44
1,560,095 UART:
1,560,111 UART: Running Caliptra ROM ...
1,560,519 UART:
1,560,574 UART: [state] CFI Enabled
1,563,328 UART: [state] LifecycleState = Unprovisioned
1,563,987 UART: [state] DebugLocked = No
1,564,596 UART: [state] WD Timer not started. Device not locked for debugging
1,566,304 UART: [update-reset] ++
2,847,753 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,848,809 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,997,128 UART: [update-reset] Copying MAN_2 To MAN_1
3,005,142 UART: [update-reset Success] --
3,005,551 >>> mbox cmd response: success
3,005,551 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,006,212 UART: [state] Locking Datavault
3,006,988 UART: [state] Locking PCR0, PCR1 and PCR31
3,007,592 UART: [state] Locking ICCM
3,008,242 UART: [exit] Launching FMC @ 0x40000000
3,013,539 UART:
3,013,555 UART: Running Caliptra FMC ...
3,013,963 UART:
3,014,104 UART: [fmc] Received command: 0x1000000C
3,014,839 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [fake-rom-cold-reset] ++
88,694 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,816 UART: [fht] FHT @ 0x50003400
92,037 UART: [fwproc] Wait for Commands...
92,670 UART: [fwproc] Recv command 0x46574c44
93,398 UART: [fwproc] Recv'd Img size: 112032 bytes
1,358,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,510 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,192 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,547,184 >>> mbox cmd response: success
1,548,342 UART: [fake-rom-cold-reset] --
1,548,737 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,549,128 UART: [state] Locking Datavault
1,550,243 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,847 UART: [state] Locking ICCM
1,551,423 UART: [exit] Launching FMC @ 0x40000000
1,556,720 UART:
1,556,736 UART: Running Caliptra FMC ...
1,557,144 UART:
1,557,285 UART: [fmc] Received command: 0x46574C44
1,558,109 UART:
1,558,125 UART: Running Caliptra ROM ...
1,558,533 UART:
1,558,588 UART: [state] CFI Enabled
1,560,816 UART: [state] LifecycleState = Unprovisioned
1,561,475 UART: [state] DebugLocked = No
1,561,986 UART: [state] WD Timer not started. Device not locked for debugging
1,563,494 UART: [update-reset] ++
2,844,261 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,845,345 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,993,812 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,826 UART: [update-reset Success] --
3,002,235 >>> mbox cmd response: success
3,002,235 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,856 UART: [state] Locking Datavault
3,003,720 UART: [state] Locking PCR0, PCR1 and PCR31
3,004,324 UART: [state] Locking ICCM
3,004,890 UART: [exit] Launching FMC @ 0x40000000
3,010,187 UART:
3,010,203 UART: Running Caliptra FMC ...
3,010,611 UART:
3,010,752 UART: [fmc] Received command: 0x1000000C
3,011,487 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,921 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [fake-rom-cold-reset] ++
89,249 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,491 UART: [fht] FHT @ 0x50003400
92,856 UART: [fwproc] Wait for Commands...
93,457 UART: [fwproc] Recv command 0x46574c44
94,185 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,605 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,203 >>> mbox cmd response: success
1,550,361 UART: [fake-rom-cold-reset] --
1,550,756 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,551,293 UART: [state] Locking Datavault
1,552,608 UART: [state] Locking PCR0, PCR1 and PCR31
1,553,212 UART: [state] Locking ICCM
1,553,838 UART: [exit] Launching FMC @ 0x40000000
1,559,135 UART:
1,559,151 UART: Running Caliptra FMC ...
1,559,559 UART:
1,559,700 UART: [fmc] Received command: 0x46574C44
1,560,524 UART:
1,560,540 UART: Running Caliptra ROM ...
1,560,948 UART:
1,561,090 UART: [state] CFI Enabled
1,563,882 UART: [state] LifecycleState = Unprovisioned
1,564,541 UART: [state] DebugLocked = No
1,565,212 UART: [state] WD Timer not started. Device not locked for debugging
1,566,862 UART: [update-reset] ++
2,847,511 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,848,715 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,997,064 UART: [update-reset] Copying MAN_2 To MAN_1
3,005,078 UART: [update-reset Success] --
3,005,487 >>> mbox cmd response: success
3,005,487 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,006,068 UART: [state] Locking Datavault
3,006,966 UART: [state] Locking PCR0, PCR1 and PCR31
3,007,570 UART: [state] Locking ICCM
3,008,046 UART: [exit] Launching FMC @ 0x40000000
3,013,343 UART:
3,013,359 UART: Running Caliptra FMC ...
3,013,767 UART:
3,013,908 UART: [fmc] Received command: 0x1000000C
3,014,643 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,779 UART: [state] WD Timer not started. Device not locked for debugging
88,343 UART: [fake-rom-cold-reset] ++
89,271 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,369 UART: [fht] FHT @ 0x50003400
92,810 UART: [fwproc] Wait for Commands...
93,411 UART: [fwproc] Recv command 0x46574c44
94,139 UART: [fwproc] Recv'd Img size: 112032 bytes
1,361,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,388,807 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,414,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,550,457 >>> mbox cmd response: success
1,551,615 UART: [fake-rom-cold-reset] --
1,552,010 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,552,473 UART: [state] Locking Datavault
1,553,620 UART: [state] Locking PCR0, PCR1 and PCR31
1,554,224 UART: [state] Locking ICCM
1,554,648 UART: [exit] Launching FMC @ 0x40000000
1,559,945 UART:
1,559,961 UART: Running Caliptra FMC ...
1,560,369 UART:
1,560,510 UART: [fmc] Received command: 0x46574C44
1,561,334 UART:
1,561,350 UART: Running Caliptra ROM ...
1,561,758 UART:
1,561,900 UART: [state] CFI Enabled
1,564,342 UART: [state] LifecycleState = Unprovisioned
1,565,001 UART: [state] DebugLocked = No
1,565,544 UART: [state] WD Timer not started. Device not locked for debugging
1,567,122 UART: [update-reset] ++
2,848,155 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,849,339 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,997,850 UART: [update-reset] Copying MAN_2 To MAN_1
3,005,864 UART: [update-reset Success] --
3,006,273 >>> mbox cmd response: success
3,006,273 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,007,090 UART: [state] Locking Datavault
3,007,978 UART: [state] Locking PCR0, PCR1 and PCR31
3,008,582 UART: [state] Locking ICCM
3,009,230 UART: [exit] Launching FMC @ 0x40000000
3,014,527 UART:
3,014,543 UART: Running Caliptra FMC ...
3,014,951 UART:
3,015,092 UART: [fmc] Received command: 0x1000000C
3,015,827 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [fake-rom-cold-reset] ++
88,852 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,072 UART: [fht] FHT @ 0x50003400
92,331 UART: [fwproc] Wait for Commands...
93,022 UART: [fwproc] Recv command 0x46574c44
93,750 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,330 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,549,034 >>> mbox cmd response: success
1,550,192 UART: [fake-rom-cold-reset] --
1,550,587 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,778 UART: [state] Locking Datavault
1,551,963 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,567 UART: [state] Locking ICCM
1,553,045 UART: [exit] Launching FMC @ 0x40000000
1,558,342 UART:
1,558,358 UART: Running Caliptra FMC ...
1,558,766 UART:
1,558,907 UART: [fmc] Received command: 0x46574C44
1,559,731 UART:
1,559,747 UART: Running Caliptra ROM ...
1,560,155 UART:
1,560,210 UART: [state] CFI Enabled
1,563,126 UART: [state] LifecycleState = Unprovisioned
1,563,785 UART: [state] DebugLocked = No
1,564,388 UART: [state] WD Timer not started. Device not locked for debugging
1,566,156 UART: [update-reset] ++
2,846,807 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,847,933 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,996,236 UART: [update-reset] Copying MAN_2 To MAN_1
3,004,250 UART: [update-reset Success] --
3,004,659 >>> mbox cmd response: success
3,004,659 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,005,174 UART: [state] Locking Datavault
3,005,972 UART: [state] Locking PCR0, PCR1 and PCR31
3,006,576 UART: [state] Locking ICCM
3,007,036 UART: [exit] Launching FMC @ 0x40000000
3,012,333 UART:
3,012,349 UART: Running Caliptra FMC ...
3,012,757 UART:
3,012,898 UART: [fmc] Received command: 0x1000000C
3,013,633 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [fake-rom-cold-reset] ++
88,958 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,034 UART: [fht] FHT @ 0x50003400
92,385 UART: [fwproc] Wait for Commands...
93,138 UART: [fwproc] Recv command 0x46574c44
93,866 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,266 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,547,936 >>> mbox cmd response: success
1,549,094 UART: [fake-rom-cold-reset] --
1,549,489 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,549,824 UART: [state] Locking Datavault
1,550,883 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,487 UART: [state] Locking ICCM
1,552,131 UART: [exit] Launching FMC @ 0x40000000
1,557,428 UART:
1,557,444 UART: Running Caliptra FMC ...
1,557,852 UART:
1,557,993 UART: [fmc] Received command: 0x46574C44
1,558,817 UART:
1,558,833 UART: Running Caliptra ROM ...
1,559,241 UART:
1,559,296 UART: [state] CFI Enabled
1,561,960 UART: [state] LifecycleState = Unprovisioned
1,562,619 UART: [state] DebugLocked = No
1,563,330 UART: [state] WD Timer not started. Device not locked for debugging
1,565,002 UART: [update-reset] ++
2,845,815 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,846,909 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,995,308 UART: [update-reset] Copying MAN_2 To MAN_1
3,003,322 UART: [update-reset Success] --
3,003,731 >>> mbox cmd response: success
3,003,731 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,004,188 UART: [state] Locking Datavault
3,004,958 UART: [state] Locking PCR0, PCR1 and PCR31
3,005,562 UART: [state] Locking ICCM
3,006,190 UART: [exit] Launching FMC @ 0x40000000
3,011,487 UART:
3,011,503 UART: Running Caliptra FMC ...
3,011,911 UART:
3,012,052 UART: [fmc] Received command: 0x1000000C
3,012,787 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,779 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [fake-rom-cold-reset] ++
88,985 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
89,101 UART: [fht] FHT @ 0x50003400
92,364 UART: [fwproc] Wait for Commands...
92,989 UART: [fwproc] Recv command 0x46574c44
93,717 UART: [fwproc] Recv'd Img size: 112032 bytes
1,359,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,475 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,045 >>> mbox cmd response: success
1,549,203 UART: [fake-rom-cold-reset] --
1,549,598 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,029 UART: [state] Locking Datavault
1,551,268 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,872 UART: [state] Locking ICCM
1,552,412 UART: [exit] Launching FMC @ 0x40000000
1,557,709 UART:
1,557,725 UART: Running Caliptra FMC ...
1,558,133 UART:
1,558,274 UART: [fmc] Received command: 0x46574C44
1,559,098 UART:
1,559,114 UART: Running Caliptra ROM ...
1,559,522 UART:
1,559,664 UART: [state] CFI Enabled
1,562,628 UART: [state] LifecycleState = Unprovisioned
1,563,287 UART: [state] DebugLocked = No
1,563,896 UART: [state] WD Timer not started. Device not locked for debugging
1,565,538 UART: [update-reset] ++
2,846,559 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,847,543 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,996,018 UART: [update-reset] Copying MAN_2 To MAN_1
3,004,032 UART: [update-reset Success] --
3,004,441 >>> mbox cmd response: success
3,004,441 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,005,160 UART: [state] Locking Datavault
3,006,038 UART: [state] Locking PCR0, PCR1 and PCR31
3,006,642 UART: [state] Locking ICCM
3,007,084 UART: [exit] Launching FMC @ 0x40000000
3,012,381 UART:
3,012,397 UART: Running Caliptra FMC ...
3,012,805 UART:
3,012,946 UART: [fmc] Received command: 0x1000000C
3,013,681 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [fake-rom-cold-reset] ++
88,675 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
88,935 UART: [fht] FHT @ 0x50003400
92,382 UART: [fwproc] Wait for Commands...
93,067 UART: [fwproc] Recv command 0x46574c44
93,795 UART: [fwproc] Recv'd Img size: 112032 bytes
1,360,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,203 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,548,929 >>> mbox cmd response: success
1,550,087 UART: [fake-rom-cold-reset] --
1,550,482 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,550,995 UART: [state] Locking Datavault
1,552,310 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,914 UART: [state] Locking ICCM
1,553,368 UART: [exit] Launching FMC @ 0x40000000
1,558,665 UART:
1,558,681 UART: Running Caliptra FMC ...
1,559,089 UART:
1,559,230 UART: [fmc] Received command: 0x46574C44
1,560,054 UART:
1,560,070 UART: Running Caliptra ROM ...
1,560,478 UART:
1,560,620 UART: [state] CFI Enabled
1,563,484 UART: [state] LifecycleState = Unprovisioned
1,564,143 UART: [state] DebugLocked = No
1,564,804 UART: [state] WD Timer not started. Device not locked for debugging
1,566,464 UART: [update-reset] ++
2,847,285 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,848,493 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,996,980 UART: [update-reset] Copying MAN_2 To MAN_1
3,004,994 UART: [update-reset Success] --
3,005,403 >>> mbox cmd response: success
3,005,403 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,005,904 UART: [state] Locking Datavault
3,006,642 UART: [state] Locking PCR0, PCR1 and PCR31
3,007,246 UART: [state] Locking ICCM
3,007,708 UART: [exit] Launching FMC @ 0x40000000
3,013,005 UART:
3,013,021 UART: Running Caliptra FMC ...
3,013,429 UART:
3,013,570 UART: [fmc] Received command: 0x1000000C
3,014,305 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,330 UART:
192,707 UART: Running Caliptra ROM ...
193,947 UART:
194,102 UART: [state] CFI Enabled
262,564 UART: [state] LifecycleState = Unprovisioned
264,949 UART: [state] DebugLocked = No
266,868 UART: [state] WD Timer not started. Device not locked for debugging
271,664 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,322 UART:
192,671 UART: Running Caliptra ROM ...
193,913 UART:
194,062 UART: [state] CFI Enabled
261,835 UART: [state] LifecycleState = Unprovisioned
264,227 UART: [state] DebugLocked = No
266,416 UART: [state] WD Timer not started. Device not locked for debugging
271,964 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,545 UART:
192,917 UART: Running Caliptra ROM ...
194,103 UART:
604,210 UART: [state] CFI Enabled
618,951 UART: [state] LifecycleState = Unprovisioned
621,303 UART: [state] DebugLocked = No
624,406 UART: [state] WD Timer not started. Device not locked for debugging
629,840 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,359 UART:
192,737 UART: Running Caliptra ROM ...
193,914 UART:
603,860 UART: [state] CFI Enabled
619,074 UART: [state] LifecycleState = Unprovisioned
621,521 UART: [state] DebugLocked = No
623,794 UART: [state] WD Timer not started. Device not locked for debugging
629,553 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,076 UART:
192,478 UART: Running Caliptra ROM ...
193,659 UART:
193,815 UART: [state] CFI Enabled
264,724 UART: [state] LifecycleState = Unprovisioned
266,497 UART: [state] DebugLocked = No
268,579 UART: [state] WD Timer not started. Device not locked for debugging
272,964 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,142 UART:
192,536 UART: Running Caliptra ROM ...
193,725 UART:
193,878 UART: [state] CFI Enabled
260,345 UART: [state] LifecycleState = Unprovisioned
262,057 UART: [state] DebugLocked = No
263,711 UART: [state] WD Timer not started. Device not locked for debugging
268,105 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,386 UART:
192,770 UART: Running Caliptra ROM ...
193,961 UART:
603,379 UART: [state] CFI Enabled
615,249 UART: [state] LifecycleState = Unprovisioned
616,996 UART: [state] DebugLocked = No
619,338 UART: [state] WD Timer not started. Device not locked for debugging
623,566 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,280 UART:
192,677 UART: Running Caliptra ROM ...
193,802 UART:
603,456 UART: [state] CFI Enabled
617,999 UART: [state] LifecycleState = Unprovisioned
619,682 UART: [state] DebugLocked = No
621,186 UART: [state] WD Timer not started. Device not locked for debugging
626,600 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
192,294 UART:
192,667 UART: Running Caliptra ROM ...
193,857 UART:
194,011 UART: [state] CFI Enabled
264,562 UART: [state] LifecycleState = Unprovisioned
266,350 UART: [state] DebugLocked = No
268,568 UART: [state] WD Timer not started. Device not locked for debugging
273,452 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,415 UART:
192,797 UART: Running Caliptra ROM ...
193,973 UART:
603,421 UART: [state] CFI Enabled
616,814 UART: [state] LifecycleState = Unprovisioned
618,558 UART: [state] DebugLocked = No
620,308 UART: [state] WD Timer not started. Device not locked for debugging
624,434 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,292 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,729 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,365 UART: [state] DebugLocked = No
85,928 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,961 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
87,091 UART: [state] WD Timer not started. Device not locked for debugging
88,523 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,234 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
2,211,565 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,352,828 UART:
2,353,294 UART: Running Caliptra ROM ...
2,354,377 UART:
2,354,535 UART: [state] CFI Enabled
2,355,419 UART: [state] LifecycleState = Unprovisioned
2,357,072 UART: [state] DebugLocked = No
2,358,187 UART: [state] WD Timer not started. Device not locked for debugging
2,360,665 UART: [fake-rom-cold-reset] ++
2,361,745 UART: [fht] FHT @ 0x50003400
2,362,721 UART: [fwproc] Wait for Commands...
2,364,005 UART: [fwproc] Recv command 0x46574c44
2,365,447 UART: [fwproc] Recv'd Img size: 111688 bytes
3,766,463 UART: ROM Fatal Error: 0x000B000C
3,770,297 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
2,213,651 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,354,925 UART:
2,355,324 UART: Running Caliptra ROM ...
2,356,492 UART:
2,356,667 UART: [state] CFI Enabled
2,357,645 UART: [state] LifecycleState = Unprovisioned
2,359,294 UART: [state] DebugLocked = No
2,360,402 UART: [state] WD Timer not started. Device not locked for debugging
2,362,880 UART: [fake-rom-cold-reset] ++
2,363,985 UART: [fht] FHT @ 0x50003400
2,365,014 UART: [fwproc] Wait for Commands...
2,366,298 UART: [fwproc] Recv command 0x46574c44
2,367,718 UART: [fwproc] Recv'd Img size: 111688 bytes
3,772,262 UART: ROM Fatal Error: 0x000B000C
3,776,064 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
2,218,870 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,359,966 UART:
2,360,350 UART: Running Caliptra ROM ...
2,361,518 UART:
2,361,686 UART: [state] CFI Enabled
2,362,666 UART: [state] LifecycleState = Unprovisioned
2,364,303 UART: [state] DebugLocked = No
2,365,402 UART: [state] WD Timer not started. Device not locked for debugging
2,367,873 UART: [fake-rom-cold-reset] ++
2,368,934 UART: [fht] FHT @ 0x50003400
2,369,961 UART: [fwproc] Wait for Commands...
2,371,259 UART: [fwproc] Recv command 0x46574c44
2,372,689 UART: [fwproc] Recv'd Img size: 111688 bytes
3,766,764 UART: ROM Fatal Error: 0x000B000C
3,770,554 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,505 writing to cptra_bootfsm_go
2,219,435 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,360,614 UART:
2,361,036 UART: Running Caliptra ROM ...
2,362,215 UART:
2,362,386 UART: [state] CFI Enabled
2,363,356 UART: [state] LifecycleState = Unprovisioned
2,364,997 UART: [state] DebugLocked = No
2,366,097 UART: [state] WD Timer not started. Device not locked for debugging
2,368,626 UART: [fake-rom-cold-reset] ++
2,369,685 UART: [fht] FHT @ 0x50003400
2,370,711 UART: [fwproc] Wait for Commands...
2,371,988 UART: [fwproc] Recv command 0x46574c44
2,373,408 UART: [fwproc] Recv'd Img size: 111688 bytes
3,768,157 UART: ROM Fatal Error: 0x000B000C
3,772,015 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,215,090 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,356,842 UART:
2,357,258 UART: Running Caliptra ROM ...
2,358,425 UART:
2,358,601 UART: [state] CFI Enabled
2,359,574 UART: [state] LifecycleState = Unprovisioned
2,361,234 UART: [state] DebugLocked = No
2,362,258 UART: [state] WD Timer not started. Device not locked for debugging
2,364,733 UART: [fake-rom-cold-reset] ++
2,365,845 UART: [fht] FHT @ 0x50003400
2,366,832 UART: [fwproc] Wait for Commands...
2,368,140 UART: [fwproc] Recv command 0x46574c44
2,369,576 UART: [fwproc] Recv'd Img size: 112032 bytes
3,421,266 UART: ROM Fatal Error: 0x000B000C
3,424,247 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
2,226,642 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,368,095 UART:
2,368,500 UART: Running Caliptra ROM ...
2,369,590 UART:
2,369,745 UART: [state] CFI Enabled
2,371,105 UART: [state] LifecycleState = Unprovisioned
2,372,694 UART: [state] DebugLocked = No
2,373,928 UART: [state] WD Timer not started. Device not locked for debugging
2,376,404 UART: [fake-rom-cold-reset] ++
2,377,429 UART: [fht] FHT @ 0x50003400
2,378,408 UART: [fwproc] Wait for Commands...
2,379,692 UART: [fwproc] Recv command 0x46574c44
2,381,123 UART: [fwproc] Recv'd Img size: 112032 bytes
3,433,415 UART: ROM Fatal Error: 0x000B000C
3,436,389 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,219,255 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,361,030 UART:
2,361,464 UART: Running Caliptra ROM ...
2,362,645 UART:
2,362,821 UART: [state] CFI Enabled
2,363,784 UART: [state] LifecycleState = Unprovisioned
2,365,442 UART: [state] DebugLocked = No
2,366,471 UART: [state] WD Timer not started. Device not locked for debugging
2,368,949 UART: [fake-rom-cold-reset] ++
2,370,001 UART: [fht] FHT @ 0x50003400
2,371,039 UART: [fwproc] Wait for Commands...
2,372,277 UART: [fwproc] Recv command 0x46574c44
2,373,721 UART: [fwproc] Recv'd Img size: 112032 bytes
3,427,916 UART: ROM Fatal Error: 0x000B000C
3,430,874 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
2,218,447 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,360,196 UART:
2,360,641 UART: Running Caliptra ROM ...
2,361,752 UART:
2,361,913 UART: [state] CFI Enabled
2,362,782 UART: [state] LifecycleState = Unprovisioned
2,364,439 UART: [state] DebugLocked = No
2,365,467 UART: [state] WD Timer not started. Device not locked for debugging
2,367,941 UART: [fake-rom-cold-reset] ++
2,368,969 UART: [fht] FHT @ 0x50003400
2,369,945 UART: [fwproc] Wait for Commands...
2,371,225 UART: [fwproc] Recv command 0x46574c44
2,372,570 UART: [fwproc] Recv'd Img size: 112032 bytes
3,427,281 UART: ROM Fatal Error: 0x000B000C
3,430,260 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,215,879 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,357,661 UART:
2,358,076 UART: Running Caliptra ROM ...
2,359,252 UART:
2,359,441 UART: [state] CFI Enabled
2,360,410 UART: [state] LifecycleState = Unprovisioned
2,362,067 UART: [state] DebugLocked = No
2,363,098 UART: [state] WD Timer not started. Device not locked for debugging
2,365,574 UART: [fake-rom-cold-reset] ++
2,366,603 UART: [fht] FHT @ 0x50003400
2,367,549 UART: [fwproc] Wait for Commands...
2,368,830 UART: [fwproc] Recv command 0x46574c44
2,370,177 UART: [fwproc] Recv'd Img size: 112032 bytes
3,419,590 UART: ROM Fatal Error: 0x000B000C
3,422,570 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
2,218,251 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,359,987 UART:
2,360,410 UART: Running Caliptra ROM ...
2,361,581 UART:
2,361,754 UART: [state] CFI Enabled
2,362,716 UART: [state] LifecycleState = Unprovisioned
2,364,368 UART: [state] DebugLocked = No
2,365,472 UART: [state] WD Timer not started. Device not locked for debugging
2,367,946 UART: [fake-rom-cold-reset] ++
2,369,049 UART: [fht] FHT @ 0x50003400
2,370,079 UART: [fwproc] Wait for Commands...
2,371,366 UART: [fwproc] Recv command 0x46574c44
2,372,788 UART: [fwproc] Recv'd Img size: 112032 bytes
3,415,390 UART: ROM Fatal Error: 0x000B000C
3,418,363 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [fake-rom-cold-reset] ++
89,136 UART: [fht] FHT @ 0x50003400
92,587 UART: [fwproc] Wait for Commands...
93,260 UART: [fwproc] Recv command 0x46574c44
93,988 UART: [fwproc] Recv'd Img size: 112032 bytes
131,643 UART: ROM Fatal Error: 0x000B000C
132,812 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [fake-rom-cold-reset] ++
89,214 UART: [fht] FHT @ 0x50003400
92,573 UART: [fwproc] Wait for Commands...
93,300 UART: [fwproc] Recv command 0x46574c44
94,028 UART: [fwproc] Recv'd Img size: 112032 bytes
130,773 UART: ROM Fatal Error: 0x000B000C
131,942 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [fake-rom-cold-reset] ++
89,333 UART: [fht] FHT @ 0x50003400
92,708 UART: [fwproc] Wait for Commands...
93,321 UART: [fwproc] Recv command 0x46574c44
94,049 UART: [fwproc] Recv'd Img size: 112032 bytes
130,638 UART: ROM Fatal Error: 0x000B000C
131,807 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [fake-rom-cold-reset] ++
89,065 UART: [fht] FHT @ 0x50003400
92,384 UART: [fwproc] Wait for Commands...
93,099 UART: [fwproc] Recv command 0x46574c44
93,827 UART: [fwproc] Recv'd Img size: 112032 bytes
130,526 UART: ROM Fatal Error: 0x000B000C
131,695 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [fake-rom-cold-reset] ++
89,066 UART: [fht] FHT @ 0x50003400
92,461 UART: [fwproc] Wait for Commands...
93,180 UART: [fwproc] Recv command 0x46574c44
93,908 UART: [fwproc] Recv'd Img size: 112032 bytes
131,061 UART: ROM Fatal Error: 0x000B000C
132,230 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,602 UART: [state] LifecycleState = Unprovisioned
86,261 UART: [state] DebugLocked = No
86,982 UART: [state] WD Timer not started. Device not locked for debugging
88,430 UART: [fake-rom-cold-reset] ++
89,650 UART: [fht] FHT @ 0x50003400
93,031 UART: [fwproc] Wait for Commands...
93,826 UART: [fwproc] Recv command 0x46574c44
94,554 UART: [fwproc] Recv'd Img size: 112032 bytes
131,777 UART: ROM Fatal Error: 0x000B000C
132,946 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [fake-rom-cold-reset] ++
88,985 UART: [fht] FHT @ 0x50003400
92,424 UART: [fwproc] Wait for Commands...
93,241 UART: [fwproc] Recv command 0x46574c44
93,969 UART: [fwproc] Recv'd Img size: 112032 bytes
130,706 UART: ROM Fatal Error: 0x000B000C
131,875 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,869 UART: [state] LifecycleState = Unprovisioned
86,528 UART: [state] DebugLocked = No
87,139 UART: [state] WD Timer not started. Device not locked for debugging
88,593 UART: [fake-rom-cold-reset] ++
89,683 UART: [fht] FHT @ 0x50003400
92,936 UART: [fwproc] Wait for Commands...
93,771 UART: [fwproc] Recv command 0x46574c44
94,499 UART: [fwproc] Recv'd Img size: 112032 bytes
130,660 UART: ROM Fatal Error: 0x000B000C
131,829 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,768 UART: [state] LifecycleState = Unprovisioned
85,427 UART: [state] DebugLocked = No
86,064 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [fake-rom-cold-reset] ++
88,518 UART: [fht] FHT @ 0x50003400
91,813 UART: [fwproc] Wait for Commands...
92,500 UART: [fwproc] Recv command 0x46574c44
93,228 UART: [fwproc] Recv'd Img size: 112032 bytes
130,327 UART: ROM Fatal Error: 0x000B000C
131,496 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,082 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [fake-rom-cold-reset] ++
88,712 UART: [fht] FHT @ 0x50003400
91,927 UART: [fwproc] Wait for Commands...
92,704 UART: [fwproc] Recv command 0x46574c44
93,432 UART: [fwproc] Recv'd Img size: 112032 bytes
130,769 UART: ROM Fatal Error: 0x000B000C
131,938 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [fake-rom-cold-reset] ++
89,249 UART: [fht] FHT @ 0x50003400
92,474 UART: [fwproc] Wait for Commands...
93,203 UART: [fwproc] Recv command 0x46574c44
93,931 UART: [fwproc] Recv'd Img size: 112032 bytes
131,182 UART: ROM Fatal Error: 0x000B000C
132,351 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [fake-rom-cold-reset] ++
88,879 UART: [fht] FHT @ 0x50003400
92,160 UART: [fwproc] Wait for Commands...
92,979 UART: [fwproc] Recv command 0x46574c44
93,707 UART: [fwproc] Recv'd Img size: 112032 bytes
130,726 UART: ROM Fatal Error: 0x000B000C
131,895 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,113 UART:
192,503 UART: Running Caliptra ROM ...
193,692 UART:
193,849 UART: [state] CFI Enabled
263,038 UART: [state] LifecycleState = Unprovisioned
265,435 UART: [state] DebugLocked = No
268,327 UART: [state] WD Timer not started. Device not locked for debugging
275,008 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,108 UART:
192,500 UART: Running Caliptra ROM ...
193,691 UART:
193,843 UART: [state] CFI Enabled
262,740 UART: [state] LifecycleState = Unprovisioned
265,134 UART: [state] DebugLocked = No
268,299 UART: [state] WD Timer not started. Device not locked for debugging
274,986 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,513 UART:
192,911 UART: Running Caliptra ROM ...
194,113 UART:
603,972 UART: [state] CFI Enabled
620,497 UART: [state] LifecycleState = Unprovisioned
622,912 UART: [state] DebugLocked = No
625,479 UART: [state] WD Timer not started. Device not locked for debugging
632,216 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,498 UART:
192,876 UART: Running Caliptra ROM ...
194,055 UART:
604,118 UART: [state] CFI Enabled
619,682 UART: [state] LifecycleState = Unprovisioned
622,039 UART: [state] DebugLocked = No
624,771 UART: [state] WD Timer not started. Device not locked for debugging
629,179 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,086 UART:
192,480 UART: Running Caliptra ROM ...
193,607 UART:
193,752 UART: [state] CFI Enabled
265,244 UART: [state] LifecycleState = Unprovisioned
266,971 UART: [state] DebugLocked = No
269,183 UART: [state] WD Timer not started. Device not locked for debugging
273,368 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,061 UART:
192,451 UART: Running Caliptra ROM ...
193,623 UART:
193,774 UART: [state] CFI Enabled
263,834 UART: [state] LifecycleState = Unprovisioned
265,573 UART: [state] DebugLocked = No
268,359 UART: [state] WD Timer not started. Device not locked for debugging
271,675 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,260 UART:
192,638 UART: Running Caliptra ROM ...
193,824 UART:
603,153 UART: [state] CFI Enabled
616,089 UART: [state] LifecycleState = Unprovisioned
617,868 UART: [state] DebugLocked = No
619,194 UART: [state] WD Timer not started. Device not locked for debugging
624,234 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,140 writing to cptra_bootfsm_go
193,205 UART:
193,571 UART: Running Caliptra ROM ...
194,755 UART:
604,425 UART: [state] CFI Enabled
616,487 UART: [state] LifecycleState = Unprovisioned
618,222 UART: [state] DebugLocked = No
620,022 UART: [state] WD Timer not started. Device not locked for debugging
623,984 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,358 UART:
192,747 UART: Running Caliptra ROM ...
193,935 UART:
194,090 UART: [state] CFI Enabled
260,414 UART: [state] LifecycleState = Unprovisioned
262,205 UART: [state] DebugLocked = No
263,967 UART: [state] WD Timer not started. Device not locked for debugging
267,605 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,454 UART:
192,875 UART: Running Caliptra ROM ...
194,065 UART:
603,401 UART: [state] CFI Enabled
618,354 UART: [state] LifecycleState = Unprovisioned
620,095 UART: [state] DebugLocked = No
621,861 UART: [state] WD Timer not started. Device not locked for debugging
626,953 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,234 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
87,033 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
86,953 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,332 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,801 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
4,874,688 ready_for_fw is high
4,875,174 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,452,959 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
4,877,426 ready_for_fw is high
4,878,031 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,443,826 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
5,183,852 ready_for_fw is high
5,184,646 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,632,915 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
5,186,599 ready_for_fw is high
5,187,175 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,637,432 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,458,026 ready_for_fw is high
3,458,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,283,235 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,477,945 ready_for_fw is high
3,478,339 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,311,666 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,676 writing to cptra_bootfsm_go
3,782,764 ready_for_fw is high
3,783,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,506,489 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,786,966 ready_for_fw is high
3,787,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,533,298 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,462,791 ready_for_fw is high
3,463,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,334,605 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,782,362 ready_for_fw is high
3,782,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,510,497 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,849 ready_for_fw is high
1,077,849 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,150 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,005 ready_for_fw is high
1,077,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,352 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,580 ready_for_fw is high
1,078,580 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,019 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,710 ready_for_fw is high
1,077,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,671 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,291 ready_for_fw is high
1,077,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,686 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,769 ready_for_fw is high
1,077,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,758 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,262 ready_for_fw is high
1,078,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,847 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,018 ready_for_fw is high
1,078,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,797 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,845 ready_for_fw is high
1,077,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,600 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,191 ready_for_fw is high
1,078,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,728 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,818 ready_for_fw is high
1,078,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,377 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,794 ready_for_fw is high
1,077,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,249 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,213,836 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,348,731 UART:
2,349,154 UART: Running Caliptra ROM ...
2,350,314 UART:
2,350,515 UART: [state] CFI Enabled
2,351,495 UART: [state] LifecycleState = Unprovisioned
2,353,140 UART: [state] DebugLocked = No
2,354,248 UART: [state] WD Timer not started. Device not locked for debugging
2,356,715 UART: [kat] SHA2-256
2,357,381 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,360,387 UART: [kat] ++
2,360,835 UART: [kat] sha1
2,361,429 UART: [kat] SHA2-256
2,362,140 UART: [kat] SHA2-384
2,362,802 UART: [kat] SHA2-512-ACC
2,363,631 UART: [kat] ECC-384
3,774,278 UART: [kat] HMAC-384Kdf
3,801,427 UART: [kat] LMS
4,874,592 UART: [kat] --
4,879,482 UART: [cold-reset] ++
4,880,905 UART: [fht] FHT @ 0x50003400
4,891,203 UART: [idev] ++
4,891,882 UART: [idev] CDI.KEYID = 6
4,893,044 UART: [idev] SUBJECT.KEYID = 7
4,894,259 UART: [idev] UDS.KEYID = 0
4,930,727 UART: [idev] Erasing UDS.KEYID = 0
8,244,084 UART: [idev] Sha1 KeyId Algorithm
8,265,548 UART: [idev] --
8,269,805 UART: [ldev] ++
8,270,373 UART: [ldev] CDI.KEYID = 6
8,271,530 UART: [ldev] SUBJECT.KEYID = 5
8,272,742 UART: [ldev] AUTHORITY.KEYID = 7
8,273,895 UART: [ldev] FE.KEYID = 1
8,318,909 UART: [ldev] Erasing FE.KEYID = 1
11,657,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,833 UART: [ldev] --
14,040,887 UART: [fwproc] Wait for Commands...
14,043,527 UART: [fwproc] Recv command 0x46574c44
14,045,843 UART: [fwproc] Recv'd Img size: 106620 bytes
18,022,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,092,935 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,135,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,452,640 >>> mbox cmd response: success
18,456,444 UART: [afmc] ++
18,457,035 UART: [afmc] CDI.KEYID = 6
18,457,953 UART: [afmc] SUBJECT.KEYID = 7
18,459,113 UART: [afmc] AUTHORITY.KEYID = 5
21,821,416 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,116,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,118,908 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,134,949 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,151,024 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,167,147 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,189,691 UART: [afmc] --
24,192,328 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,192,700 UART: [cold-reset] --
24,196,001 UART: [state] Locking Datavault
24,202,065 UART: [state] Locking PCR0, PCR1 and PCR31
24,203,707 UART: [state] Locking ICCM
24,206,126 UART: [exit] Launching FMC @ 0x40000000
24,214,747 UART:
24,214,979 UART: Running Caliptra FMC ...
24,216,077 UART:
24,216,238 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,217,830 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,210,577 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,241,164 >>> mbox cmd response: success
23,930,005 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
23,943,504 UART:
23,943,846 UART: Running Caliptra FMC ...
23,945,018 UART:
23,945,202 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
23,946,973 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,220,855 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,355,563 UART:
2,355,969 UART: Running Caliptra ROM ...
2,357,136 UART:
2,357,301 UART: [state] CFI Enabled
2,358,280 UART: [state] LifecycleState = Unprovisioned
2,359,915 UART: [state] DebugLocked = No
2,361,017 UART: [state] WD Timer not started. Device not locked for debugging
2,363,487 UART: [kat] SHA2-256
2,364,150 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,367,519 UART: [kat] ++
2,367,983 UART: [kat] sha1
2,368,491 UART: [kat] SHA2-256
2,369,340 UART: [kat] SHA2-384
2,370,000 UART: [kat] SHA2-512-ACC
2,370,851 UART: [kat] ECC-384
4,096,890 UART: [kat] HMAC-384Kdf
4,108,252 UART: [kat] LMS
5,181,434 UART: [kat] --
5,184,970 UART: [cold-reset] ++
5,186,477 UART: [fht] FHT @ 0x50003400
5,196,970 UART: [idev] ++
5,197,640 UART: [idev] CDI.KEYID = 6
5,198,875 UART: [idev] SUBJECT.KEYID = 7
5,200,308 UART: [idev] UDS.KEYID = 0
5,216,889 UART: [idev] Erasing UDS.KEYID = 0
8,493,097 UART: [idev] Sha1 KeyId Algorithm
8,516,142 UART: [idev] --
8,520,968 UART: [ldev] ++
8,521,566 UART: [ldev] CDI.KEYID = 6
8,522,754 UART: [ldev] SUBJECT.KEYID = 5
8,524,688 UART: [ldev] AUTHORITY.KEYID = 7
8,525,832 UART: [ldev] FE.KEYID = 1
8,536,263 UART: [ldev] Erasing FE.KEYID = 1
11,826,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,107 UART: [ldev] --
14,190,961 UART: [fwproc] Wait for Commands...
14,193,595 UART: [fwproc] Recv command 0x46574c44
14,195,908 UART: [fwproc] Recv'd Img size: 106620 bytes
18,167,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,246,604 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,289,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,606,245 >>> mbox cmd response: success
18,610,340 UART: [afmc] ++
18,611,096 UART: [afmc] CDI.KEYID = 6
18,612,201 UART: [afmc] SUBJECT.KEYID = 7
18,613,348 UART: [afmc] AUTHORITY.KEYID = 5
21,930,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,227,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,229,831 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,245,863 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,261,925 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,277,990 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,299,924 UART: [afmc] --
24,303,213 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,303,575 UART: [cold-reset] --
24,308,060 UART: [state] Locking Datavault
24,313,155 UART: [state] Locking PCR0, PCR1 and PCR31
24,314,852 UART: [state] Locking ICCM
24,317,180 UART: [exit] Launching FMC @ 0x40000000
24,325,797 UART:
24,326,022 UART: Running Caliptra FMC ...
24,327,119 UART:
24,327,270 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,328,830 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,214,382 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,410,802 >>> mbox cmd response: success
24,036,183 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,048,381 UART:
24,048,745 UART: Running Caliptra FMC ...
24,049,849 UART:
24,049,994 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,051,763 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
2,217,846 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,353,271 UART:
2,353,682 UART: Running Caliptra ROM ...
2,354,854 UART:
2,355,045 UART: [state] CFI Enabled
2,356,011 UART: [state] LifecycleState = Unprovisioned
2,357,671 UART: [state] DebugLocked = No
2,358,778 UART: [state] WD Timer not started. Device not locked for debugging
2,361,258 UART: [kat] SHA2-256
2,361,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,364,938 UART: [kat] ++
2,365,434 UART: [kat] sha1
2,365,952 UART: [kat] SHA2-256
2,366,691 UART: [kat] SHA2-384
2,367,356 UART: [kat] SHA2-512-ACC
2,368,191 UART: [kat] ECC-384
2,937,946 UART: [kat] HMAC-384Kdf
2,960,613 UART: [kat] LMS
3,490,081 UART: [kat] --
3,495,178 UART: [cold-reset] ++
3,496,055 UART: [fht] FHT @ 0x50003400
3,506,829 UART: [idev] ++
3,507,604 UART: [idev] CDI.KEYID = 6
3,508,491 UART: [idev] SUBJECT.KEYID = 7
3,509,536 UART: [idev] UDS.KEYID = 0
3,531,585 UART: [idev] Erasing UDS.KEYID = 0
6,014,457 UART: [idev] Sha1 KeyId Algorithm
6,037,315 UART: [idev] --
6,041,852 UART: [ldev] ++
6,042,425 UART: [ldev] CDI.KEYID = 6
6,043,310 UART: [ldev] SUBJECT.KEYID = 5
6,044,527 UART: [ldev] AUTHORITY.KEYID = 7
6,045,760 UART: [ldev] FE.KEYID = 1
6,087,470 UART: [ldev] Erasing FE.KEYID = 1
8,593,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,520 UART: [ldev] --
10,399,822 UART: [fwproc] Wait for Commands...
10,402,089 UART: [fwproc] Recv command 0x46574c44
10,404,186 UART: [fwproc] Recv'd Img size: 106964 bytes
13,708,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,780,459 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,823,086 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,141,765 >>> mbox cmd response: success
14,145,389 UART: [afmc] ++
14,145,982 UART: [afmc] CDI.KEYID = 6
14,146,894 UART: [afmc] SUBJECT.KEYID = 7
14,148,162 UART: [afmc] AUTHORITY.KEYID = 5
16,685,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,413,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,415,780 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,431,723 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,447,664 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,463,603 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,486,139 UART: [afmc] --
18,489,112 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,489,474 UART: [cold-reset] --
18,493,639 UART: [state] Locking Datavault
18,500,240 UART: [state] Locking PCR0, PCR1 and PCR31
18,501,943 UART: [state] Locking ICCM
18,504,635 UART: [exit] Launching FMC @ 0x40000000
18,513,032 UART:
18,513,268 UART: Running Caliptra FMC ...
18,514,372 UART:
18,514,534 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,516,209 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
2,213,619 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,925,475 >>> mbox cmd response: success
18,203,986 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,219,162 UART:
18,219,503 UART: Running Caliptra FMC ...
18,220,597 UART:
18,220,748 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,222,519 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
2,220,102 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,355,489 UART:
2,355,906 UART: Running Caliptra ROM ...
2,357,083 UART:
2,357,264 UART: [state] CFI Enabled
2,358,229 UART: [state] LifecycleState = Unprovisioned
2,359,886 UART: [state] DebugLocked = No
2,360,998 UART: [state] WD Timer not started. Device not locked for debugging
2,363,490 UART: [kat] SHA2-256
2,364,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,367,175 UART: [kat] ++
2,367,626 UART: [kat] sha1
2,368,138 UART: [kat] SHA2-256
2,368,826 UART: [kat] SHA2-384
2,369,488 UART: [kat] SHA2-512-ACC
2,370,288 UART: [kat] ECC-384
3,280,253 UART: [kat] HMAC-384Kdf
3,293,430 UART: [kat] LMS
3,822,965 UART: [kat] --
3,828,712 UART: [cold-reset] ++
3,829,765 UART: [fht] FHT @ 0x50003400
3,840,274 UART: [idev] ++
3,840,839 UART: [idev] CDI.KEYID = 6
3,841,805 UART: [idev] SUBJECT.KEYID = 7
3,842,985 UART: [idev] UDS.KEYID = 0
3,860,471 UART: [idev] Erasing UDS.KEYID = 0
6,317,428 UART: [idev] Sha1 KeyId Algorithm
6,339,789 UART: [idev] --
6,345,182 UART: [ldev] ++
6,345,752 UART: [ldev] CDI.KEYID = 6
6,346,658 UART: [ldev] SUBJECT.KEYID = 5
6,347,866 UART: [ldev] AUTHORITY.KEYID = 7
6,349,094 UART: [ldev] FE.KEYID = 1
6,360,281 UART: [ldev] Erasing FE.KEYID = 1
8,834,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,076 UART: [ldev] --
10,624,341 UART: [fwproc] Wait for Commands...
10,626,332 UART: [fwproc] Recv command 0x46574c44
10,628,424 UART: [fwproc] Recv'd Img size: 106964 bytes
13,941,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,010,977 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,053,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,372,571 >>> mbox cmd response: success
14,377,252 UART: [afmc] ++
14,377,845 UART: [afmc] CDI.KEYID = 6
14,378,750 UART: [afmc] SUBJECT.KEYID = 7
14,379,908 UART: [afmc] AUTHORITY.KEYID = 5
16,881,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,600,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,602,741 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,618,690 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,634,637 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,650,628 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,673,616 UART: [afmc] --
18,677,972 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,678,337 UART: [cold-reset] --
18,682,068 UART: [state] Locking Datavault
18,687,695 UART: [state] Locking PCR0, PCR1 and PCR31
18,689,335 UART: [state] Locking ICCM
18,691,670 UART: [exit] Launching FMC @ 0x40000000
18,700,057 UART:
18,700,291 UART: Running Caliptra FMC ...
18,701,311 UART:
18,701,457 UART: [fmc] Received command: 0x10000005
18,702,893 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,215,149 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,157,618 >>> mbox cmd response: success
18,395,298 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,411,645 UART:
18,411,984 UART: Running Caliptra FMC ...
18,413,162 UART:
18,413,326 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,415,102 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,214,432 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,945,336 >>> mbox cmd response: success
18,221,087 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,235,643 UART:
18,235,969 UART: Running Caliptra FMC ...
18,237,125 UART:
18,237,291 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,239,028 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
2,218,586 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,157,389 >>> mbox cmd response: success
18,392,300 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,405,745 UART:
18,406,097 UART: Running Caliptra FMC ...
18,407,241 UART:
18,407,392 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,409,166 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,499 UART: [kat] SHA2-256
901,439 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,942 UART: [kat] HMAC-384Kdf
920,482 UART: [kat] LMS
1,168,794 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,401 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,182,161 UART: [idev] Erasing UDS.KEYID = 0
1,198,849 UART: [idev] Sha1 KeyId Algorithm
1,207,831 UART: [idev] --
1,208,790 UART: [ldev] ++
1,208,958 UART: [ldev] CDI.KEYID = 6
1,209,322 UART: [ldev] SUBJECT.KEYID = 5
1,209,749 UART: [ldev] AUTHORITY.KEYID = 7
1,210,212 UART: [ldev] FE.KEYID = 1
1,215,412 UART: [ldev] Erasing FE.KEYID = 1
1,242,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,746 UART: [ldev] --
1,282,062 UART: [fwproc] Wait for Commands...
1,282,877 UART: [fwproc] Recv command 0x46574c44
1,283,610 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,768 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,901 >>> mbox cmd response: success
2,678,998 UART: [afmc] ++
2,679,166 UART: [afmc] CDI.KEYID = 6
2,679,529 UART: [afmc] SUBJECT.KEYID = 7
2,679,955 UART: [afmc] AUTHORITY.KEYID = 5
2,715,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,440 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,160 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,053 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,746 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,449 UART: [afmc] --
2,758,503 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,758,525 UART: [cold-reset] --
2,759,339 UART: [state] Locking Datavault
2,760,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,400 UART: [state] Locking ICCM
2,761,994 UART: [exit] Launching FMC @ 0x40000000
2,767,291 UART:
2,767,307 UART: Running Caliptra FMC ...
2,767,715 UART:
2,767,853 UART: [fmc] Received command: 0x10000005
2,768,954 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,217 >>> mbox cmd response: success
2,582,815 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,589,116 UART:
2,589,132 UART: Running Caliptra FMC ...
2,589,540 UART:
2,589,678 UART: [fmc] Received command: 0x10000005
2,590,779 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
891,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,646 UART: [kat] SHA2-256
901,586 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,271 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,170,364 UART: [cold-reset] ++
1,170,710 UART: [fht] FHT @ 0x50003400
1,173,502 UART: [idev] ++
1,173,670 UART: [idev] CDI.KEYID = 6
1,174,031 UART: [idev] SUBJECT.KEYID = 7
1,174,456 UART: [idev] UDS.KEYID = 0
1,182,216 UART: [idev] Erasing UDS.KEYID = 0
1,198,948 UART: [idev] Sha1 KeyId Algorithm
1,207,782 UART: [idev] --
1,208,879 UART: [ldev] ++
1,209,047 UART: [ldev] CDI.KEYID = 6
1,209,411 UART: [ldev] SUBJECT.KEYID = 5
1,209,838 UART: [ldev] AUTHORITY.KEYID = 7
1,210,301 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,973 UART: [ldev] --
1,281,351 UART: [fwproc] Wait for Commands...
1,282,046 UART: [fwproc] Recv command 0x46574c44
1,282,779 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,961 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,924 >>> mbox cmd response: success
2,677,141 UART: [afmc] ++
2,677,309 UART: [afmc] CDI.KEYID = 6
2,677,672 UART: [afmc] SUBJECT.KEYID = 7
2,678,098 UART: [afmc] AUTHORITY.KEYID = 5
2,713,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,217 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,937 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,830 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,523 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,318 UART: [afmc] --
2,756,388 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,410 UART: [cold-reset] --
2,757,282 UART: [state] Locking Datavault
2,758,363 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,967 UART: [state] Locking ICCM
2,759,603 UART: [exit] Launching FMC @ 0x40000000
2,764,900 UART:
2,764,916 UART: Running Caliptra FMC ...
2,765,324 UART:
2,765,462 UART: [fmc] Received command: 0x10000005
2,766,563 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,496 >>> mbox cmd response: success
2,583,394 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,589,461 UART:
2,589,477 UART: Running Caliptra FMC ...
2,589,885 UART:
2,590,023 UART: [fmc] Received command: 0x10000005
2,591,124 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,717 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,706 UART: [ldev] ++
1,208,874 UART: [ldev] CDI.KEYID = 6
1,209,238 UART: [ldev] SUBJECT.KEYID = 5
1,209,665 UART: [ldev] AUTHORITY.KEYID = 7
1,210,128 UART: [ldev] FE.KEYID = 1
1,215,502 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,226 UART: [fwproc] Wait for Commands...
1,282,011 UART: [fwproc] Recv command 0x46574c44
1,282,744 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,114 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,073 >>> mbox cmd response: success
2,678,172 UART: [afmc] ++
2,678,340 UART: [afmc] CDI.KEYID = 6
2,678,703 UART: [afmc] SUBJECT.KEYID = 7
2,679,129 UART: [afmc] AUTHORITY.KEYID = 5
2,713,945 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,874 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,594 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,487 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,180 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,065 UART: [afmc] --
2,756,951 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,973 UART: [cold-reset] --
2,757,945 UART: [state] Locking Datavault
2,758,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,430 UART: [state] Locking ICCM
2,759,950 UART: [exit] Launching FMC @ 0x40000000
2,765,247 UART:
2,765,263 UART: Running Caliptra FMC ...
2,765,671 UART:
2,765,809 UART: [fmc] Received command: 0x10000005
2,766,910 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,527 >>> mbox cmd response: success
2,583,585 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,589,544 UART:
2,589,560 UART: Running Caliptra FMC ...
2,589,968 UART:
2,590,106 UART: [fmc] Received command: 0x10000005
2,591,207 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,681 UART: [kat] HMAC-384Kdf
921,495 UART: [kat] LMS
1,169,807 UART: [kat] --
1,170,358 UART: [cold-reset] ++
1,170,742 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,182,132 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,207,836 UART: [idev] --
1,209,041 UART: [ldev] ++
1,209,209 UART: [ldev] CDI.KEYID = 6
1,209,573 UART: [ldev] SUBJECT.KEYID = 5
1,210,000 UART: [ldev] AUTHORITY.KEYID = 7
1,210,463 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,242,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,141 UART: [ldev] --
1,281,559 UART: [fwproc] Wait for Commands...
1,282,248 UART: [fwproc] Recv command 0x46574c44
1,282,981 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,541 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,624 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,738 >>> mbox cmd response: success
2,676,935 UART: [afmc] ++
2,677,103 UART: [afmc] CDI.KEYID = 6
2,677,466 UART: [afmc] SUBJECT.KEYID = 7
2,677,892 UART: [afmc] AUTHORITY.KEYID = 5
2,713,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,287 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,007 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,900 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,593 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,356 UART: [afmc] --
2,756,286 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,308 UART: [cold-reset] --
2,757,220 UART: [state] Locking Datavault
2,758,225 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,829 UART: [state] Locking ICCM
2,759,351 UART: [exit] Launching FMC @ 0x40000000
2,764,648 UART:
2,764,664 UART: Running Caliptra FMC ...
2,765,072 UART:
2,765,210 UART: [fmc] Received command: 0x10000005
2,766,311 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,994 >>> mbox cmd response: success
2,583,298 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,589,375 UART:
2,589,391 UART: Running Caliptra FMC ...
2,589,799 UART:
2,589,937 UART: [fmc] Received command: 0x10000005
2,591,038 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,945 UART: [cold-reset] ++
1,170,347 UART: [fht] FHT @ 0x50003400
1,173,015 UART: [idev] ++
1,173,183 UART: [idev] CDI.KEYID = 6
1,173,544 UART: [idev] SUBJECT.KEYID = 7
1,173,969 UART: [idev] UDS.KEYID = 0
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,198,717 UART: [idev] Sha1 KeyId Algorithm
1,207,637 UART: [idev] --
1,208,718 UART: [ldev] ++
1,208,886 UART: [ldev] CDI.KEYID = 6
1,209,250 UART: [ldev] SUBJECT.KEYID = 5
1,209,677 UART: [ldev] AUTHORITY.KEYID = 7
1,210,140 UART: [ldev] FE.KEYID = 1
1,215,082 UART: [ldev] Erasing FE.KEYID = 1
1,241,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,082 UART: [ldev] --
1,281,550 UART: [fwproc] Wait for Commands...
1,282,121 UART: [fwproc] Recv command 0x46574c44
1,282,854 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,490 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,563 >>> mbox cmd response: success
2,677,688 UART: [afmc] ++
2,677,856 UART: [afmc] CDI.KEYID = 6
2,678,219 UART: [afmc] SUBJECT.KEYID = 7
2,678,645 UART: [afmc] AUTHORITY.KEYID = 5
2,714,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,040 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,760 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,653 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,346 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,073 UART: [afmc] --
2,758,139 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,758,161 UART: [cold-reset] --
2,759,171 UART: [state] Locking Datavault
2,760,408 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,012 UART: [state] Locking ICCM
2,761,566 UART: [exit] Launching FMC @ 0x40000000
2,766,863 UART:
2,766,879 UART: Running Caliptra FMC ...
2,767,287 UART:
2,767,425 UART: [fmc] Received command: 0x10000005
2,768,526 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,643 >>> mbox cmd response: success
2,582,121 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,442 UART:
2,588,458 UART: Running Caliptra FMC ...
2,588,866 UART:
2,589,004 UART: [fmc] Received command: 0x10000005
2,590,105 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,638 UART: [kat] ++
895,790 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,913 UART: [kat] HMAC-384Kdf
921,539 UART: [kat] LMS
1,169,851 UART: [kat] --
1,170,694 UART: [cold-reset] ++
1,171,228 UART: [fht] FHT @ 0x50003400
1,173,882 UART: [idev] ++
1,174,050 UART: [idev] CDI.KEYID = 6
1,174,411 UART: [idev] SUBJECT.KEYID = 7
1,174,836 UART: [idev] UDS.KEYID = 0
1,182,840 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,166 UART: [idev] --
1,209,087 UART: [ldev] ++
1,209,255 UART: [ldev] CDI.KEYID = 6
1,209,619 UART: [ldev] SUBJECT.KEYID = 5
1,210,046 UART: [ldev] AUTHORITY.KEYID = 7
1,210,509 UART: [ldev] FE.KEYID = 1
1,215,765 UART: [ldev] Erasing FE.KEYID = 1
1,242,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,063 UART: [ldev] --
1,281,407 UART: [fwproc] Wait for Commands...
1,282,100 UART: [fwproc] Recv command 0x46574c44
1,282,833 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,355 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,438 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,346 >>> mbox cmd response: success
2,676,529 UART: [afmc] ++
2,676,697 UART: [afmc] CDI.KEYID = 6
2,677,060 UART: [afmc] SUBJECT.KEYID = 7
2,677,486 UART: [afmc] AUTHORITY.KEYID = 5
2,713,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,337 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,057 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,950 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,643 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,440 UART: [afmc] --
2,756,412 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,434 UART: [cold-reset] --
2,757,454 UART: [state] Locking Datavault
2,758,905 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,509 UART: [state] Locking ICCM
2,760,011 UART: [exit] Launching FMC @ 0x40000000
2,765,308 UART:
2,765,324 UART: Running Caliptra FMC ...
2,765,732 UART:
2,765,870 UART: [fmc] Received command: 0x10000005
2,766,971 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,664 >>> mbox cmd response: success
2,582,380 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,373 UART:
2,588,389 UART: Running Caliptra FMC ...
2,588,797 UART:
2,588,935 UART: [fmc] Received command: 0x10000005
2,590,036 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,212,462 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,347,350 UART:
2,347,765 UART: Running Caliptra ROM ...
2,348,934 UART:
2,349,107 UART: [state] CFI Enabled
2,350,091 UART: [state] LifecycleState = Unprovisioned
2,351,747 UART: [state] DebugLocked = No
2,352,858 UART: [state] WD Timer not started. Device not locked for debugging
2,355,334 UART: [kat] SHA2-256
2,356,002 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,359,032 UART: [kat] ++
2,359,487 UART: [kat] sha1
2,360,005 UART: [kat] SHA2-256
2,360,668 UART: [kat] SHA2-384
2,361,326 UART: [kat] SHA2-512-ACC
2,362,234 UART: [kat] ECC-384
3,777,705 UART: [kat] HMAC-384Kdf
3,809,094 UART: [kat] LMS
4,882,201 UART: [kat] --
4,887,207 UART: [cold-reset] ++
4,888,728 UART: [fht] FHT @ 0x50003400
4,900,058 UART: [idev] ++
4,900,735 UART: [idev] CDI.KEYID = 6
4,901,970 UART: [idev] SUBJECT.KEYID = 7
4,903,071 UART: [idev] UDS.KEYID = 0
4,936,561 UART: [idev] Erasing UDS.KEYID = 0
8,250,835 UART: [idev] Sha1 KeyId Algorithm
8,272,893 UART: [idev] --
8,277,282 UART: [ldev] ++
8,277,873 UART: [ldev] CDI.KEYID = 6
8,278,996 UART: [ldev] SUBJECT.KEYID = 5
8,280,133 UART: [ldev] AUTHORITY.KEYID = 7
8,281,472 UART: [ldev] FE.KEYID = 1
8,359,273 UART: [ldev] Erasing FE.KEYID = 1
11,699,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,007,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,023,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,039,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,055,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,076,112 UART: [ldev] --
14,081,277 UART: [fwproc] Wait for Commands...
14,082,941 UART: [fwproc] Recv command 0x46574c44
14,085,209 UART: [fwproc] Recv'd Img size: 106620 bytes
18,062,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,137,928 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,180,392 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,496,732 >>> mbox cmd response: success
18,501,252 UART: [afmc] ++
18,501,843 UART: [afmc] CDI.KEYID = 6
18,502,951 UART: [afmc] SUBJECT.KEYID = 7
18,504,162 UART: [afmc] AUTHORITY.KEYID = 5
21,861,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,157,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,159,656 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,175,720 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,191,757 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,207,865 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,230,637 UART: [afmc] --
24,234,976 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,235,356 UART: [cold-reset] --
24,238,981 UART: [state] Locking Datavault
24,244,179 UART: [state] Locking PCR0, PCR1 and PCR31
24,245,888 UART: [state] Locking ICCM
24,248,470 UART: [exit] Launching FMC @ 0x40000000
24,257,087 UART:
24,257,327 UART: Running Caliptra FMC ...
24,258,424 UART:
24,258,579 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,260,163 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,837 writing to cptra_bootfsm_go
2,210,208 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,248,809 >>> mbox cmd response: success
23,934,153 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
23,950,285 UART:
23,950,626 UART: Running Caliptra FMC ...
23,951,718 UART:
23,951,864 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
23,953,629 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
2,219,363 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,354,299 UART:
2,354,705 UART: Running Caliptra ROM ...
2,355,790 UART:
2,355,939 UART: [state] CFI Enabled
2,356,860 UART: [state] LifecycleState = Unprovisioned
2,358,507 UART: [state] DebugLocked = No
2,359,532 UART: [state] WD Timer not started. Device not locked for debugging
2,361,996 UART: [kat] SHA2-256
2,362,654 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,365,657 UART: [kat] ++
2,366,100 UART: [kat] sha1
2,366,624 UART: [kat] SHA2-256
2,367,281 UART: [kat] SHA2-384
2,367,934 UART: [kat] SHA2-512-ACC
2,368,728 UART: [kat] ECC-384
4,097,359 UART: [kat] HMAC-384Kdf
4,110,197 UART: [kat] LMS
5,183,372 UART: [kat] --
5,186,866 UART: [cold-reset] ++
5,188,160 UART: [fht] FHT @ 0x50003400
5,199,418 UART: [idev] ++
5,200,133 UART: [idev] CDI.KEYID = 6
5,201,321 UART: [idev] SUBJECT.KEYID = 7
5,202,765 UART: [idev] UDS.KEYID = 0
5,220,901 UART: [idev] Erasing UDS.KEYID = 0
8,498,872 UART: [idev] Sha1 KeyId Algorithm
8,521,297 UART: [idev] --
8,525,529 UART: [ldev] ++
8,526,099 UART: [ldev] CDI.KEYID = 6
8,527,335 UART: [ldev] SUBJECT.KEYID = 5
8,528,763 UART: [ldev] AUTHORITY.KEYID = 7
8,530,321 UART: [ldev] FE.KEYID = 1
8,542,480 UART: [ldev] Erasing FE.KEYID = 1
11,831,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,993 UART: [ldev] --
14,197,710 UART: [fwproc] Wait for Commands...
14,199,802 UART: [fwproc] Recv command 0x46574c44
14,202,113 UART: [fwproc] Recv'd Img size: 106620 bytes
18,179,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,257,826 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,300,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,617,479 >>> mbox cmd response: success
18,620,989 UART: [afmc] ++
18,621,551 UART: [afmc] CDI.KEYID = 6
18,622,749 UART: [afmc] SUBJECT.KEYID = 7
18,623,850 UART: [afmc] AUTHORITY.KEYID = 5
21,938,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,233,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,236,032 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,252,077 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,268,120 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,284,217 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,306,510 UART: [afmc] --
24,310,442 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,310,885 UART: [cold-reset] --
24,314,422 UART: [state] Locking Datavault
24,321,026 UART: [state] Locking PCR0, PCR1 and PCR31
24,322,725 UART: [state] Locking ICCM
24,325,630 UART: [exit] Launching FMC @ 0x40000000
24,334,245 UART:
24,334,472 UART: Running Caliptra FMC ...
24,335,565 UART:
24,335,717 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,337,270 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,214,194 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,413,062 >>> mbox cmd response: success
24,034,890 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,050,675 UART:
24,051,058 UART: Running Caliptra FMC ...
24,052,257 UART:
24,052,419 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,054,202 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,226,221 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,361,549 UART:
2,361,967 UART: Running Caliptra ROM ...
2,363,047 UART:
2,363,202 UART: [state] CFI Enabled
2,364,112 UART: [state] LifecycleState = Unprovisioned
2,365,788 UART: [state] DebugLocked = No
2,366,813 UART: [state] WD Timer not started. Device not locked for debugging
2,369,281 UART: [kat] SHA2-256
2,369,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,372,981 UART: [kat] ++
2,373,425 UART: [kat] sha1
2,373,933 UART: [kat] SHA2-256
2,374,589 UART: [kat] SHA2-384
2,375,242 UART: [kat] SHA2-512-ACC
2,376,126 UART: [kat] ECC-384
2,948,899 UART: [kat] HMAC-384Kdf
2,970,376 UART: [kat] LMS
3,499,810 UART: [kat] --
3,503,430 UART: [cold-reset] ++
3,504,814 UART: [fht] FHT @ 0x50003400
3,516,871 UART: [idev] ++
3,517,433 UART: [idev] CDI.KEYID = 6
3,518,448 UART: [idev] SUBJECT.KEYID = 7
3,519,550 UART: [idev] UDS.KEYID = 0
3,542,661 UART: [idev] Erasing UDS.KEYID = 0
6,026,747 UART: [idev] Sha1 KeyId Algorithm
6,049,222 UART: [idev] --
6,053,112 UART: [ldev] ++
6,053,684 UART: [ldev] CDI.KEYID = 6
6,054,572 UART: [ldev] SUBJECT.KEYID = 5
6,055,788 UART: [ldev] AUTHORITY.KEYID = 7
6,057,020 UART: [ldev] FE.KEYID = 1
6,100,838 UART: [ldev] Erasing FE.KEYID = 1
8,605,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,066 UART: [ldev] --
10,404,041 UART: [fwproc] Wait for Commands...
10,406,410 UART: [fwproc] Recv command 0x46574c44
10,408,620 UART: [fwproc] Recv'd Img size: 106964 bytes
13,720,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,793,927 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,836,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,155,462 >>> mbox cmd response: success
14,160,386 UART: [afmc] ++
14,160,977 UART: [afmc] CDI.KEYID = 6
14,161,886 UART: [afmc] SUBJECT.KEYID = 7
14,163,046 UART: [afmc] AUTHORITY.KEYID = 5
16,691,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,417,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,419,454 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,435,467 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,451,399 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,467,332 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,490,965 UART: [afmc] --
18,494,084 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,494,471 UART: [cold-reset] --
18,498,797 UART: [state] Locking Datavault
18,504,849 UART: [state] Locking PCR0, PCR1 and PCR31
18,506,545 UART: [state] Locking ICCM
18,507,666 UART: [exit] Launching FMC @ 0x40000000
18,516,062 UART:
18,516,311 UART: Running Caliptra FMC ...
18,517,413 UART:
18,517,573 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,519,130 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
2,212,837 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,923,237 >>> mbox cmd response: success
18,205,972 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,221,733 UART:
18,222,107 UART: Running Caliptra FMC ...
18,223,312 UART:
18,223,483 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,225,485 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
2,218,848 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,354,289 UART:
2,354,696 UART: Running Caliptra ROM ...
2,355,861 UART:
2,356,032 UART: [state] CFI Enabled
2,357,024 UART: [state] LifecycleState = Unprovisioned
2,358,688 UART: [state] DebugLocked = No
2,359,793 UART: [state] WD Timer not started. Device not locked for debugging
2,362,260 UART: [kat] SHA2-256
2,362,924 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,365,934 UART: [kat] ++
2,366,382 UART: [kat] sha1
2,366,895 UART: [kat] SHA2-256
2,367,630 UART: [kat] SHA2-384
2,368,292 UART: [kat] SHA2-512-ACC
2,369,119 UART: [kat] ECC-384
3,280,991 UART: [kat] HMAC-384Kdf
3,293,205 UART: [kat] LMS
3,822,704 UART: [kat] --
3,828,185 UART: [cold-reset] ++
3,829,633 UART: [fht] FHT @ 0x50003400
3,840,467 UART: [idev] ++
3,841,030 UART: [idev] CDI.KEYID = 6
3,842,045 UART: [idev] SUBJECT.KEYID = 7
3,843,100 UART: [idev] UDS.KEYID = 0
3,858,019 UART: [idev] Erasing UDS.KEYID = 0
6,311,326 UART: [idev] Sha1 KeyId Algorithm
6,334,262 UART: [idev] --
6,338,159 UART: [ldev] ++
6,338,727 UART: [ldev] CDI.KEYID = 6
6,339,691 UART: [ldev] SUBJECT.KEYID = 5
6,340,852 UART: [ldev] AUTHORITY.KEYID = 7
6,342,076 UART: [ldev] FE.KEYID = 1
6,354,124 UART: [ldev] Erasing FE.KEYID = 1
8,824,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,387 UART: [ldev] --
10,615,513 UART: [fwproc] Wait for Commands...
10,617,827 UART: [fwproc] Recv command 0x46574c44
10,619,919 UART: [fwproc] Recv'd Img size: 106964 bytes
13,923,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,385 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,035,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,354,066 >>> mbox cmd response: success
14,358,891 UART: [afmc] ++
14,359,476 UART: [afmc] CDI.KEYID = 6
14,360,384 UART: [afmc] SUBJECT.KEYID = 7
14,361,541 UART: [afmc] AUTHORITY.KEYID = 5
16,861,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,582,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,584,228 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,600,206 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,616,123 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,632,125 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,654,623 UART: [afmc] --
18,659,251 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,659,618 UART: [cold-reset] --
18,660,808 UART: [state] Locking Datavault
18,665,993 UART: [state] Locking PCR0, PCR1 and PCR31
18,667,685 UART: [state] Locking ICCM
18,669,485 UART: [exit] Launching FMC @ 0x40000000
18,677,875 UART:
18,678,105 UART: Running Caliptra FMC ...
18,679,200 UART:
18,679,359 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,680,940 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,219,580 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,154,995 >>> mbox cmd response: success
18,391,000 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,404,096 UART:
18,404,436 UART: Running Caliptra FMC ...
18,405,616 UART:
18,405,787 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,407,515 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
2,215,098 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,946,610 >>> mbox cmd response: success
18,222,205 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,237,514 UART:
18,237,844 UART: Running Caliptra FMC ...
18,239,002 UART:
18,239,172 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,240,901 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
2,217,461 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,160,115 >>> mbox cmd response: success
18,397,238 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,413,894 UART:
18,414,225 UART: Running Caliptra FMC ...
18,415,298 UART:
18,415,447 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,417,177 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,072 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,691 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,769 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,472 UART: [ldev] Erasing FE.KEYID = 1
1,241,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,956 UART: [ldev] --
1,281,226 UART: [fwproc] Wait for Commands...
1,281,819 UART: [fwproc] Recv command 0x46574c44
1,282,552 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,562 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,693 >>> mbox cmd response: success
2,676,796 UART: [afmc] ++
2,676,964 UART: [afmc] CDI.KEYID = 6
2,677,327 UART: [afmc] SUBJECT.KEYID = 7
2,677,753 UART: [afmc] AUTHORITY.KEYID = 5
2,712,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,116 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,836 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,729 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,422 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,169 UART: [afmc] --
2,756,039 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,061 UART: [cold-reset] --
2,756,885 UART: [state] Locking Datavault
2,757,680 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,284 UART: [state] Locking ICCM
2,758,950 UART: [exit] Launching FMC @ 0x40000000
2,764,247 UART:
2,764,263 UART: Running Caliptra FMC ...
2,764,671 UART:
2,764,809 UART: [fmc] Received command: 0x10000005
2,765,910 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,524,033 >>> mbox cmd response: success
2,580,029 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,292 UART:
2,586,308 UART: Running Caliptra FMC ...
2,586,716 UART:
2,586,854 UART: [fmc] Received command: 0x10000005
2,587,955 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,962 UART: [kat] SHA2-256
901,902 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,410 UART: [cold-reset] ++
1,170,900 UART: [fht] FHT @ 0x50003400
1,173,448 UART: [idev] ++
1,173,616 UART: [idev] CDI.KEYID = 6
1,173,977 UART: [idev] SUBJECT.KEYID = 7
1,174,402 UART: [idev] UDS.KEYID = 0
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,571 UART: [ldev] ++
1,209,739 UART: [ldev] CDI.KEYID = 6
1,210,103 UART: [ldev] SUBJECT.KEYID = 5
1,210,530 UART: [ldev] AUTHORITY.KEYID = 7
1,210,993 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,707 UART: [ldev] --
1,282,087 UART: [fwproc] Wait for Commands...
1,282,708 UART: [fwproc] Recv command 0x46574c44
1,283,441 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,457 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,468 >>> mbox cmd response: success
2,677,685 UART: [afmc] ++
2,677,853 UART: [afmc] CDI.KEYID = 6
2,678,216 UART: [afmc] SUBJECT.KEYID = 7
2,678,642 UART: [afmc] AUTHORITY.KEYID = 5
2,714,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,205 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,925 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,818 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,511 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,390 UART: [afmc] --
2,758,250 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,758,272 UART: [cold-reset] --
2,759,234 UART: [state] Locking Datavault
2,760,325 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,929 UART: [state] Locking ICCM
2,761,501 UART: [exit] Launching FMC @ 0x40000000
2,766,798 UART:
2,766,814 UART: Running Caliptra FMC ...
2,767,222 UART:
2,767,360 UART: [fmc] Received command: 0x10000005
2,768,461 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,854 >>> mbox cmd response: success
2,582,274 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,403 UART:
2,588,419 UART: Running Caliptra FMC ...
2,588,827 UART:
2,588,965 UART: [fmc] Received command: 0x10000005
2,590,066 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,132 UART: [kat] SHA2-512-ACC
906,033 UART: [kat] ECC-384
915,400 UART: [kat] HMAC-384Kdf
919,934 UART: [kat] LMS
1,168,246 UART: [kat] --
1,168,845 UART: [cold-reset] ++
1,169,181 UART: [fht] FHT @ 0x50003400
1,171,697 UART: [idev] ++
1,171,865 UART: [idev] CDI.KEYID = 6
1,172,226 UART: [idev] SUBJECT.KEYID = 7
1,172,651 UART: [idev] UDS.KEYID = 0
1,180,395 UART: [idev] Erasing UDS.KEYID = 0
1,197,847 UART: [idev] Sha1 KeyId Algorithm
1,206,853 UART: [idev] --
1,207,766 UART: [ldev] ++
1,207,934 UART: [ldev] CDI.KEYID = 6
1,208,298 UART: [ldev] SUBJECT.KEYID = 5
1,208,725 UART: [ldev] AUTHORITY.KEYID = 7
1,209,188 UART: [ldev] FE.KEYID = 1
1,214,742 UART: [ldev] Erasing FE.KEYID = 1
1,240,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,940 UART: [ldev] --
1,280,248 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,752 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,674,737 >>> mbox cmd response: success
2,675,872 UART: [afmc] ++
2,676,040 UART: [afmc] CDI.KEYID = 6
2,676,403 UART: [afmc] SUBJECT.KEYID = 7
2,676,829 UART: [afmc] AUTHORITY.KEYID = 5
2,712,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,262 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,982 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,875 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,568 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,387 UART: [afmc] --
2,755,277 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,299 UART: [cold-reset] --
2,756,145 UART: [state] Locking Datavault
2,756,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,492 UART: [state] Locking ICCM
2,758,092 UART: [exit] Launching FMC @ 0x40000000
2,763,389 UART:
2,763,405 UART: Running Caliptra FMC ...
2,763,813 UART:
2,763,951 UART: [fmc] Received command: 0x10000005
2,765,052 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,523,527 >>> mbox cmd response: success
2,579,615 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,344 UART:
2,585,360 UART: Running Caliptra FMC ...
2,585,768 UART:
2,585,906 UART: [fmc] Received command: 0x10000005
2,587,007 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,096 UART: [kat] SHA2-256
902,036 UART: [kat] SHA2-384
904,725 UART: [kat] SHA2-512-ACC
906,626 UART: [kat] ECC-384
916,715 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,170,642 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,786 UART: [idev] ++
1,173,954 UART: [idev] CDI.KEYID = 6
1,174,315 UART: [idev] SUBJECT.KEYID = 7
1,174,740 UART: [idev] UDS.KEYID = 0
1,182,978 UART: [idev] Erasing UDS.KEYID = 0
1,199,926 UART: [idev] Sha1 KeyId Algorithm
1,208,760 UART: [idev] --
1,209,807 UART: [ldev] ++
1,209,975 UART: [ldev] CDI.KEYID = 6
1,210,339 UART: [ldev] SUBJECT.KEYID = 5
1,210,766 UART: [ldev] AUTHORITY.KEYID = 7
1,211,229 UART: [ldev] FE.KEYID = 1
1,216,471 UART: [ldev] Erasing FE.KEYID = 1
1,242,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,695 UART: [ldev] --
1,282,075 UART: [fwproc] Wait for Commands...
1,282,790 UART: [fwproc] Recv command 0x46574c44
1,283,523 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,047 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,146 >>> mbox cmd response: success
2,678,195 UART: [afmc] ++
2,678,363 UART: [afmc] CDI.KEYID = 6
2,678,726 UART: [afmc] SUBJECT.KEYID = 7
2,679,152 UART: [afmc] AUTHORITY.KEYID = 5
2,714,438 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,815 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,535 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,428 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,121 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,850 UART: [afmc] --
2,757,708 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,757,730 UART: [cold-reset] --
2,758,454 UART: [state] Locking Datavault
2,759,537 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,141 UART: [state] Locking ICCM
2,760,617 UART: [exit] Launching FMC @ 0x40000000
2,765,914 UART:
2,765,930 UART: Running Caliptra FMC ...
2,766,338 UART:
2,766,476 UART: [fmc] Received command: 0x10000005
2,767,577 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,528,396 >>> mbox cmd response: success
2,584,076 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,590,333 UART:
2,590,349 UART: Running Caliptra FMC ...
2,590,757 UART:
2,590,895 UART: [fmc] Received command: 0x10000005
2,591,996 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,552 UART: [kat] HMAC-384Kdf
921,324 UART: [kat] LMS
1,169,636 UART: [kat] --
1,170,505 UART: [cold-reset] ++
1,170,983 UART: [fht] FHT @ 0x50003400
1,173,557 UART: [idev] ++
1,173,725 UART: [idev] CDI.KEYID = 6
1,174,086 UART: [idev] SUBJECT.KEYID = 7
1,174,511 UART: [idev] UDS.KEYID = 0
1,182,551 UART: [idev] Erasing UDS.KEYID = 0
1,200,101 UART: [idev] Sha1 KeyId Algorithm
1,208,903 UART: [idev] --
1,209,844 UART: [ldev] ++
1,210,012 UART: [ldev] CDI.KEYID = 6
1,210,376 UART: [ldev] SUBJECT.KEYID = 5
1,210,803 UART: [ldev] AUTHORITY.KEYID = 7
1,211,266 UART: [ldev] FE.KEYID = 1
1,216,370 UART: [ldev] Erasing FE.KEYID = 1
1,242,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,016 UART: [ldev] --
1,282,404 UART: [fwproc] Wait for Commands...
1,283,203 UART: [fwproc] Recv command 0x46574c44
1,283,936 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,828 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,911 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,869 >>> mbox cmd response: success
2,676,950 UART: [afmc] ++
2,677,118 UART: [afmc] CDI.KEYID = 6
2,677,481 UART: [afmc] SUBJECT.KEYID = 7
2,677,907 UART: [afmc] AUTHORITY.KEYID = 5
2,713,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,800 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,520 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,413 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,106 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,011 UART: [afmc] --
2,756,877 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,899 UART: [cold-reset] --
2,757,733 UART: [state] Locking Datavault
2,759,052 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,656 UART: [state] Locking ICCM
2,760,256 UART: [exit] Launching FMC @ 0x40000000
2,765,553 UART:
2,765,569 UART: Running Caliptra FMC ...
2,765,977 UART:
2,766,115 UART: [fmc] Received command: 0x10000005
2,767,216 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,524,645 >>> mbox cmd response: success
2,580,473 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,662 UART:
2,586,678 UART: Running Caliptra FMC ...
2,587,086 UART:
2,587,224 UART: [fmc] Received command: 0x10000005
2,588,325 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,719 UART: [kat] HMAC-384Kdf
921,477 UART: [kat] LMS
1,169,789 UART: [kat] --
1,170,850 UART: [cold-reset] ++
1,171,236 UART: [fht] FHT @ 0x50003400
1,173,982 UART: [idev] ++
1,174,150 UART: [idev] CDI.KEYID = 6
1,174,511 UART: [idev] SUBJECT.KEYID = 7
1,174,936 UART: [idev] UDS.KEYID = 0
1,183,032 UART: [idev] Erasing UDS.KEYID = 0
1,200,706 UART: [idev] Sha1 KeyId Algorithm
1,209,442 UART: [idev] --
1,210,431 UART: [ldev] ++
1,210,599 UART: [ldev] CDI.KEYID = 6
1,210,963 UART: [ldev] SUBJECT.KEYID = 5
1,211,390 UART: [ldev] AUTHORITY.KEYID = 7
1,211,853 UART: [ldev] FE.KEYID = 1
1,216,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,475 UART: [ldev] --
1,282,929 UART: [fwproc] Wait for Commands...
1,283,536 UART: [fwproc] Recv command 0x46574c44
1,284,269 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,873 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,854 >>> mbox cmd response: success
2,678,991 UART: [afmc] ++
2,679,159 UART: [afmc] CDI.KEYID = 6
2,679,522 UART: [afmc] SUBJECT.KEYID = 7
2,679,948 UART: [afmc] AUTHORITY.KEYID = 5
2,715,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,791 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,511 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,404 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,097 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,758,132 UART: [afmc] --
2,759,064 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,759,086 UART: [cold-reset] --
2,759,862 UART: [state] Locking Datavault
2,760,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,551 UART: [state] Locking ICCM
2,762,167 UART: [exit] Launching FMC @ 0x40000000
2,767,464 UART:
2,767,480 UART: Running Caliptra FMC ...
2,767,888 UART:
2,768,026 UART: [fmc] Received command: 0x10000005
2,769,127 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,528,334 >>> mbox cmd response: success
2,584,152 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,590,229 UART:
2,590,245 UART: Running Caliptra FMC ...
2,590,653 UART:
2,590,791 UART: [fmc] Received command: 0x10000005
2,591,892 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,213,846 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,348,895 UART:
2,349,330 UART: Running Caliptra ROM ...
2,350,497 UART:
2,350,679 UART: [state] CFI Enabled
2,351,660 UART: [state] LifecycleState = Unprovisioned
2,353,308 UART: [state] DebugLocked = No
2,354,411 UART: [state] WD Timer not started. Device not locked for debugging
2,356,883 UART: [kat] SHA2-256
2,357,552 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,360,558 UART: [kat] ++
2,361,009 UART: [kat] sha1
2,361,613 UART: [kat] SHA2-256
2,362,277 UART: [kat] SHA2-384
2,362,934 UART: [kat] SHA2-512-ACC
2,363,817 UART: [kat] ECC-384
3,774,557 UART: [kat] HMAC-384Kdf
3,801,978 UART: [kat] LMS
4,875,155 UART: [kat] --
4,878,616 UART: [cold-reset] ++
4,880,557 UART: [fht] FHT @ 0x50003400
4,892,242 UART: [idev] ++
4,892,929 UART: [idev] CDI.KEYID = 6
4,894,166 UART: [idev] SUBJECT.KEYID = 7
4,895,272 UART: [idev] UDS.KEYID = 0
4,929,214 UART: [idev] Erasing UDS.KEYID = 0
8,241,852 UART: [idev] Sha1 KeyId Algorithm
8,263,951 UART: [idev] --
8,267,869 UART: [ldev] ++
8,268,449 UART: [ldev] CDI.KEYID = 6
8,269,618 UART: [ldev] SUBJECT.KEYID = 5
8,270,830 UART: [ldev] AUTHORITY.KEYID = 7
8,271,980 UART: [ldev] FE.KEYID = 1
8,316,731 UART: [ldev] Erasing FE.KEYID = 1
11,654,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,364 UART: [ldev] --
14,036,131 UART: [fwproc] Wait for Commands...
14,038,934 UART: [fwproc] Recv command 0x46574c44
14,041,252 UART: [fwproc] Recv'd Img size: 106620 bytes
18,021,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,098,160 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,140,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,457,595 >>> mbox cmd response: success
18,460,986 UART: [afmc] ++
18,461,579 UART: [afmc] CDI.KEYID = 6
18,462,767 UART: [afmc] SUBJECT.KEYID = 7
18,463,946 UART: [afmc] AUTHORITY.KEYID = 5
21,838,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,139,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,141,423 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,157,318 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,173,394 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,189,532 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,213,359 UART: [afmc] --
24,217,138 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,217,548 UART: [cold-reset] --
24,219,826 UART: [state] Locking Datavault
24,223,464 UART: [state] Locking PCR0, PCR1 and PCR31
24,225,110 UART: [state] Locking ICCM
24,227,802 UART: [exit] Launching FMC @ 0x40000000
24,236,418 UART:
24,236,647 UART: Running Caliptra FMC ...
24,237,765 UART:
24,237,925 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
24,247,736 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,214,713 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,208,823 >>> mbox cmd response: success
23,877,255 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
23,891,125 UART:
23,891,468 UART: Running Caliptra FMC ...
23,892,648 UART:
23,892,826 UART: [fmc] Received command: 0x10000003
23,902,215 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,218,814 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,353,663 UART:
2,354,066 UART: Running Caliptra ROM ...
2,355,255 UART:
2,355,426 UART: [state] CFI Enabled
2,356,410 UART: [state] LifecycleState = Unprovisioned
2,358,060 UART: [state] DebugLocked = No
2,359,163 UART: [state] WD Timer not started. Device not locked for debugging
2,361,632 UART: [kat] SHA2-256
2,362,293 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,365,301 UART: [kat] ++
2,365,744 UART: [kat] sha1
2,366,335 UART: [kat] SHA2-256
2,366,992 UART: [kat] SHA2-384
2,367,642 UART: [kat] SHA2-512-ACC
2,368,514 UART: [kat] ECC-384
4,096,934 UART: [kat] HMAC-384Kdf
4,107,942 UART: [kat] LMS
5,181,056 UART: [kat] --
5,185,105 UART: [cold-reset] ++
5,187,375 UART: [fht] FHT @ 0x50003400
5,199,272 UART: [idev] ++
5,199,946 UART: [idev] CDI.KEYID = 6
5,201,124 UART: [idev] SUBJECT.KEYID = 7
5,202,608 UART: [idev] UDS.KEYID = 0
5,220,419 UART: [idev] Erasing UDS.KEYID = 0
8,491,959 UART: [idev] Sha1 KeyId Algorithm
8,514,530 UART: [idev] --
8,517,635 UART: [ldev] ++
8,518,210 UART: [ldev] CDI.KEYID = 6
8,519,364 UART: [ldev] SUBJECT.KEYID = 5
8,520,899 UART: [ldev] AUTHORITY.KEYID = 7
8,522,375 UART: [ldev] FE.KEYID = 1
8,534,910 UART: [ldev] Erasing FE.KEYID = 1
11,826,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,450 UART: [ldev] --
14,190,214 UART: [fwproc] Wait for Commands...
14,191,971 UART: [fwproc] Recv command 0x46574c44
14,194,237 UART: [fwproc] Recv'd Img size: 106620 bytes
18,171,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,237,761 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,280,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,597,040 >>> mbox cmd response: success
18,601,883 UART: [afmc] ++
18,602,470 UART: [afmc] CDI.KEYID = 6
18,603,705 UART: [afmc] SUBJECT.KEYID = 7
18,604,802 UART: [afmc] AUTHORITY.KEYID = 5
21,923,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,221,591 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,223,886 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,239,917 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,255,993 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,272,099 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,294,925 UART: [afmc] --
24,298,102 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,298,475 UART: [cold-reset] --
24,303,284 UART: [state] Locking Datavault
24,308,852 UART: [state] Locking PCR0, PCR1 and PCR31
24,310,545 UART: [state] Locking ICCM
24,313,499 UART: [exit] Launching FMC @ 0x40000000
24,322,109 UART:
24,322,335 UART: Running Caliptra FMC ...
24,323,429 UART:
24,323,603 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
24,333,435 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,216,185 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,419,885 >>> mbox cmd response: success
24,041,319 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,055,197 UART:
24,055,564 UART: Running Caliptra FMC ...
24,056,691 UART:
24,056,851 UART: [fmc] Received command: 0x10000003
24,066,266 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
2,214,422 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,350,027 UART:
2,350,438 UART: Running Caliptra ROM ...
2,351,519 UART:
2,351,675 UART: [state] CFI Enabled
2,352,596 UART: [state] LifecycleState = Unprovisioned
2,354,259 UART: [state] DebugLocked = No
2,355,286 UART: [state] WD Timer not started. Device not locked for debugging
2,357,755 UART: [kat] SHA2-256
2,358,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,361,427 UART: [kat] ++
2,361,879 UART: [kat] sha1
2,362,393 UART: [kat] SHA2-256
2,363,072 UART: [kat] SHA2-384
2,363,735 UART: [kat] SHA2-512-ACC
2,364,557 UART: [kat] ECC-384
2,946,933 UART: [kat] HMAC-384Kdf
2,974,056 UART: [kat] LMS
3,503,506 UART: [kat] --
3,508,013 UART: [cold-reset] ++
3,509,900 UART: [fht] FHT @ 0x50003400
3,521,207 UART: [idev] ++
3,521,773 UART: [idev] CDI.KEYID = 6
3,522,705 UART: [idev] SUBJECT.KEYID = 7
3,523,920 UART: [idev] UDS.KEYID = 0
3,546,302 UART: [idev] Erasing UDS.KEYID = 0
6,026,223 UART: [idev] Sha1 KeyId Algorithm
6,049,144 UART: [idev] --
6,052,927 UART: [ldev] ++
6,053,519 UART: [ldev] CDI.KEYID = 6
6,054,407 UART: [ldev] SUBJECT.KEYID = 5
6,055,567 UART: [ldev] AUTHORITY.KEYID = 7
6,056,801 UART: [ldev] FE.KEYID = 1
6,102,581 UART: [ldev] Erasing FE.KEYID = 1
8,604,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,939 UART: [ldev] --
10,396,070 UART: [fwproc] Wait for Commands...
10,398,012 UART: [fwproc] Recv command 0x46574c44
10,400,116 UART: [fwproc] Recv'd Img size: 106964 bytes
13,710,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,783,001 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,825,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,144,348 >>> mbox cmd response: success
14,148,706 UART: [afmc] ++
14,149,290 UART: [afmc] CDI.KEYID = 6
14,150,173 UART: [afmc] SUBJECT.KEYID = 7
14,151,386 UART: [afmc] AUTHORITY.KEYID = 5
16,686,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,408,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,410,044 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,426,013 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,441,969 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,457,898 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,480,192 UART: [afmc] --
18,484,447 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,484,815 UART: [cold-reset] --
18,488,598 UART: [state] Locking Datavault
18,494,080 UART: [state] Locking PCR0, PCR1 and PCR31
18,495,733 UART: [state] Locking ICCM
18,498,522 UART: [exit] Launching FMC @ 0x40000000
18,506,874 UART:
18,507,161 UART: Running Caliptra FMC ...
18,508,274 UART:
18,508,436 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,518,187 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
2,214,604 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,973,529 >>> mbox cmd response: success
18,244,635 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,262,000 UART:
18,262,347 UART: Running Caliptra FMC ...
18,263,527 UART:
18,263,692 UART: [fmc] Received command: 0x10000003
18,273,167 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,220,329 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,355,732 UART:
2,356,148 UART: Running Caliptra ROM ...
2,357,266 UART:
2,357,431 UART: [state] CFI Enabled
2,358,412 UART: [state] LifecycleState = Unprovisioned
2,360,068 UART: [state] DebugLocked = No
2,361,173 UART: [state] WD Timer not started. Device not locked for debugging
2,363,642 UART: [kat] SHA2-256
2,364,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,367,316 UART: [kat] ++
2,367,763 UART: [kat] sha1
2,368,356 UART: [kat] SHA2-256
2,369,022 UART: [kat] SHA2-384
2,369,681 UART: [kat] SHA2-512-ACC
2,370,480 UART: [kat] ECC-384
3,279,422 UART: [kat] HMAC-384Kdf
3,291,815 UART: [kat] LMS
3,821,309 UART: [kat] --
3,827,079 UART: [cold-reset] ++
3,828,735 UART: [fht] FHT @ 0x50003400
3,839,898 UART: [idev] ++
3,840,506 UART: [idev] CDI.KEYID = 6
3,841,414 UART: [idev] SUBJECT.KEYID = 7
3,842,572 UART: [idev] UDS.KEYID = 0
3,860,918 UART: [idev] Erasing UDS.KEYID = 0
6,317,065 UART: [idev] Sha1 KeyId Algorithm
6,340,562 UART: [idev] --
6,343,580 UART: [ldev] ++
6,344,148 UART: [ldev] CDI.KEYID = 6
6,345,057 UART: [ldev] SUBJECT.KEYID = 5
6,346,222 UART: [ldev] AUTHORITY.KEYID = 7
6,347,506 UART: [ldev] FE.KEYID = 1
6,359,123 UART: [ldev] Erasing FE.KEYID = 1
8,836,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,390 UART: [ldev] --
10,629,571 UART: [fwproc] Wait for Commands...
10,631,933 UART: [fwproc] Recv command 0x46574c44
10,634,590 UART: [fwproc] Recv'd Img size: 106964 bytes
13,942,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,009,278 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,051,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,370,174 >>> mbox cmd response: success
14,373,858 UART: [afmc] ++
14,374,440 UART: [afmc] CDI.KEYID = 6
14,375,319 UART: [afmc] SUBJECT.KEYID = 7
14,376,531 UART: [afmc] AUTHORITY.KEYID = 5
16,875,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,928 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,614,916 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,630,840 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,646,790 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,668,908 UART: [afmc] --
18,672,027 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,672,393 UART: [cold-reset] --
18,675,367 UART: [state] Locking Datavault
18,680,825 UART: [state] Locking PCR0, PCR1 and PCR31
18,682,464 UART: [state] Locking ICCM
18,684,240 UART: [exit] Launching FMC @ 0x40000000
18,692,589 UART:
18,692,820 UART: Running Caliptra FMC ...
18,693,917 UART:
18,694,072 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,703,926 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,217,761 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,137,070 >>> mbox cmd response: success
18,371,809 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,384,817 UART:
18,385,168 UART: Running Caliptra FMC ...
18,386,267 UART:
18,386,420 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,396,212 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
2,214,209 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,976,351 >>> mbox cmd response: success
18,246,491 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,260,362 UART:
18,260,705 UART: Running Caliptra FMC ...
18,261,877 UART:
18,262,045 UART: [fmc] Received command: 0x10000003
18,271,512 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,217,905 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,155,376 >>> mbox cmd response: success
18,389,493 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,403,083 UART:
18,403,447 UART: Running Caliptra FMC ...
18,404,558 UART:
18,404,708 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,414,510 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,019 UART: [kat] ++
895,171 UART: [kat] sha1
899,323 UART: [kat] SHA2-256
901,263 UART: [kat] SHA2-384
903,868 UART: [kat] SHA2-512-ACC
905,769 UART: [kat] ECC-384
915,514 UART: [kat] HMAC-384Kdf
920,186 UART: [kat] LMS
1,168,498 UART: [kat] --
1,169,497 UART: [cold-reset] ++
1,169,935 UART: [fht] FHT @ 0x50003400
1,172,543 UART: [idev] ++
1,172,711 UART: [idev] CDI.KEYID = 6
1,173,072 UART: [idev] SUBJECT.KEYID = 7
1,173,497 UART: [idev] UDS.KEYID = 0
1,181,449 UART: [idev] Erasing UDS.KEYID = 0
1,198,461 UART: [idev] Sha1 KeyId Algorithm
1,207,405 UART: [idev] --
1,208,666 UART: [ldev] ++
1,208,834 UART: [ldev] CDI.KEYID = 6
1,209,198 UART: [ldev] SUBJECT.KEYID = 5
1,209,625 UART: [ldev] AUTHORITY.KEYID = 7
1,210,088 UART: [ldev] FE.KEYID = 1
1,215,178 UART: [ldev] Erasing FE.KEYID = 1
1,241,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,360 UART: [ldev] --
1,280,662 UART: [fwproc] Wait for Commands...
1,281,433 UART: [fwproc] Recv command 0x46574c44
1,282,166 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,680 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,683 >>> mbox cmd response: success
2,676,762 UART: [afmc] ++
2,676,930 UART: [afmc] CDI.KEYID = 6
2,677,293 UART: [afmc] SUBJECT.KEYID = 7
2,677,719 UART: [afmc] AUTHORITY.KEYID = 5
2,713,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,510 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,230 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,123 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,816 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,445 UART: [afmc] --
2,756,339 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,756,361 UART: [cold-reset] --
2,757,133 UART: [state] Locking Datavault
2,758,246 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,850 UART: [state] Locking ICCM
2,759,314 UART: [exit] Launching FMC @ 0x40000000
2,764,611 UART:
2,764,627 UART: Running Caliptra FMC ...
2,765,035 UART:
2,765,173 UART: [fmc] Received command: 0x10000003
2,774,649 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,457 >>> mbox cmd response: success
2,582,329 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,588,460 UART:
2,588,476 UART: Running Caliptra FMC ...
2,588,884 UART:
2,589,022 UART: [fmc] Received command: 0x10000003
2,598,498 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,200 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,466 UART: [kat] SHA2-256
901,406 UART: [kat] SHA2-384
903,969 UART: [kat] SHA2-512-ACC
905,870 UART: [kat] ECC-384
915,413 UART: [kat] HMAC-384Kdf
919,985 UART: [kat] LMS
1,168,297 UART: [kat] --
1,169,302 UART: [cold-reset] ++
1,169,636 UART: [fht] FHT @ 0x50003400
1,172,120 UART: [idev] ++
1,172,288 UART: [idev] CDI.KEYID = 6
1,172,649 UART: [idev] SUBJECT.KEYID = 7
1,173,074 UART: [idev] UDS.KEYID = 0
1,181,458 UART: [idev] Erasing UDS.KEYID = 0
1,198,618 UART: [idev] Sha1 KeyId Algorithm
1,207,408 UART: [idev] --
1,208,317 UART: [ldev] ++
1,208,485 UART: [ldev] CDI.KEYID = 6
1,208,849 UART: [ldev] SUBJECT.KEYID = 5
1,209,276 UART: [ldev] AUTHORITY.KEYID = 7
1,209,739 UART: [ldev] FE.KEYID = 1
1,215,197 UART: [ldev] Erasing FE.KEYID = 1
1,241,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,101 UART: [ldev] --
1,280,477 UART: [fwproc] Wait for Commands...
1,281,182 UART: [fwproc] Recv command 0x46574c44
1,281,915 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,333 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,466 >>> mbox cmd response: success
2,676,713 UART: [afmc] ++
2,676,881 UART: [afmc] CDI.KEYID = 6
2,677,244 UART: [afmc] SUBJECT.KEYID = 7
2,677,670 UART: [afmc] AUTHORITY.KEYID = 5
2,712,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,877 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,597 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,490 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,183 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,100 UART: [afmc] --
2,756,078 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,756,100 UART: [cold-reset] --
2,756,898 UART: [state] Locking Datavault
2,758,109 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,713 UART: [state] Locking ICCM
2,759,375 UART: [exit] Launching FMC @ 0x40000000
2,764,672 UART:
2,764,688 UART: Running Caliptra FMC ...
2,765,096 UART:
2,765,234 UART: [fmc] Received command: 0x10000003
2,774,710 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,970 >>> mbox cmd response: success
2,583,894 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,590,169 UART:
2,590,185 UART: Running Caliptra FMC ...
2,590,593 UART:
2,590,731 UART: [fmc] Received command: 0x10000003
2,600,207 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,320 UART: [kat] SHA2-512-ACC
906,221 UART: [kat] ECC-384
915,506 UART: [kat] HMAC-384Kdf
920,052 UART: [kat] LMS
1,168,364 UART: [kat] --
1,169,483 UART: [cold-reset] ++
1,169,949 UART: [fht] FHT @ 0x50003400
1,172,487 UART: [idev] ++
1,172,655 UART: [idev] CDI.KEYID = 6
1,173,016 UART: [idev] SUBJECT.KEYID = 7
1,173,441 UART: [idev] UDS.KEYID = 0
1,181,525 UART: [idev] Erasing UDS.KEYID = 0
1,198,041 UART: [idev] Sha1 KeyId Algorithm
1,206,989 UART: [idev] --
1,207,928 UART: [ldev] ++
1,208,096 UART: [ldev] CDI.KEYID = 6
1,208,460 UART: [ldev] SUBJECT.KEYID = 5
1,208,887 UART: [ldev] AUTHORITY.KEYID = 7
1,209,350 UART: [ldev] FE.KEYID = 1
1,214,702 UART: [ldev] Erasing FE.KEYID = 1
1,240,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,460 UART: [ldev] --
1,279,972 UART: [fwproc] Wait for Commands...
1,280,555 UART: [fwproc] Recv command 0x46574c44
1,281,288 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,111 >>> mbox cmd response: success
2,677,156 UART: [afmc] ++
2,677,324 UART: [afmc] CDI.KEYID = 6
2,677,687 UART: [afmc] SUBJECT.KEYID = 7
2,678,113 UART: [afmc] AUTHORITY.KEYID = 5
2,713,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,012 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,732 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,625 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,318 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,965 UART: [afmc] --
2,757,037 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,757,059 UART: [cold-reset] --
2,757,883 UART: [state] Locking Datavault
2,758,952 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,556 UART: [state] Locking ICCM
2,760,196 UART: [exit] Launching FMC @ 0x40000000
2,765,493 UART:
2,765,509 UART: Running Caliptra FMC ...
2,765,917 UART:
2,766,055 UART: [fmc] Received command: 0x10000003
2,775,531 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,499 >>> mbox cmd response: success
2,581,887 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,587,852 UART:
2,587,868 UART: Running Caliptra FMC ...
2,588,276 UART:
2,588,414 UART: [fmc] Received command: 0x10000003
2,597,890 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,653 UART: [kat] LMS
1,168,965 UART: [kat] --
1,169,722 UART: [cold-reset] ++
1,170,054 UART: [fht] FHT @ 0x50003400
1,172,688 UART: [idev] ++
1,172,856 UART: [idev] CDI.KEYID = 6
1,173,217 UART: [idev] SUBJECT.KEYID = 7
1,173,642 UART: [idev] UDS.KEYID = 0
1,182,000 UART: [idev] Erasing UDS.KEYID = 0
1,199,096 UART: [idev] Sha1 KeyId Algorithm
1,208,106 UART: [idev] --
1,209,105 UART: [ldev] ++
1,209,273 UART: [ldev] CDI.KEYID = 6
1,209,637 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,215,823 UART: [ldev] Erasing FE.KEYID = 1
1,241,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,079 UART: [ldev] --
1,281,389 UART: [fwproc] Wait for Commands...
1,282,184 UART: [fwproc] Recv command 0x46574c44
1,282,917 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,537 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,688 >>> mbox cmd response: success
2,677,895 UART: [afmc] ++
2,678,063 UART: [afmc] CDI.KEYID = 6
2,678,426 UART: [afmc] SUBJECT.KEYID = 7
2,678,852 UART: [afmc] AUTHORITY.KEYID = 5
2,714,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,985 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,705 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,598 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,291 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,186 UART: [afmc] --
2,758,096 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,758,118 UART: [cold-reset] --
2,758,828 UART: [state] Locking Datavault
2,760,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,737 UART: [state] Locking ICCM
2,761,157 UART: [exit] Launching FMC @ 0x40000000
2,766,454 UART:
2,766,470 UART: Running Caliptra FMC ...
2,766,878 UART:
2,767,016 UART: [fmc] Received command: 0x10000003
2,776,492 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,004 >>> mbox cmd response: success
2,583,774 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,589,649 UART:
2,589,665 UART: Running Caliptra FMC ...
2,590,073 UART:
2,590,211 UART: [fmc] Received command: 0x10000003
2,599,687 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
900,101 UART: [kat] SHA2-256
902,041 UART: [kat] SHA2-384
904,744 UART: [kat] SHA2-512-ACC
906,645 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
920,816 UART: [kat] LMS
1,169,128 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,489 UART: [idev] ++
1,173,657 UART: [idev] CDI.KEYID = 6
1,174,018 UART: [idev] SUBJECT.KEYID = 7
1,174,443 UART: [idev] UDS.KEYID = 0
1,182,221 UART: [idev] Erasing UDS.KEYID = 0
1,198,803 UART: [idev] Sha1 KeyId Algorithm
1,207,659 UART: [idev] --
1,208,766 UART: [ldev] ++
1,208,934 UART: [ldev] CDI.KEYID = 6
1,209,298 UART: [ldev] SUBJECT.KEYID = 5
1,209,725 UART: [ldev] AUTHORITY.KEYID = 7
1,210,188 UART: [ldev] FE.KEYID = 1
1,215,528 UART: [ldev] Erasing FE.KEYID = 1
1,241,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,706 UART: [fwproc] Wait for Commands...
1,281,303 UART: [fwproc] Recv command 0x46574c44
1,282,036 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,446 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,561 >>> mbox cmd response: success
2,676,658 UART: [afmc] ++
2,676,826 UART: [afmc] CDI.KEYID = 6
2,677,189 UART: [afmc] SUBJECT.KEYID = 7
2,677,615 UART: [afmc] AUTHORITY.KEYID = 5
2,713,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,150 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,870 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,763 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,456 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,413 UART: [afmc] --
2,756,369 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,756,391 UART: [cold-reset] --
2,757,145 UART: [state] Locking Datavault
2,758,208 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,812 UART: [state] Locking ICCM
2,759,448 UART: [exit] Launching FMC @ 0x40000000
2,764,745 UART:
2,764,761 UART: Running Caliptra FMC ...
2,765,169 UART:
2,765,307 UART: [fmc] Received command: 0x10000003
2,774,783 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,833 >>> mbox cmd response: success
2,581,203 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,587,582 UART:
2,587,598 UART: Running Caliptra FMC ...
2,588,006 UART:
2,588,144 UART: [fmc] Received command: 0x10000003
2,597,620 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
87,050 UART: [state] WD Timer not started. Device not locked for debugging
88,325 UART: [kat] SHA2-256
891,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,004 UART: [kat] ++
896,156 UART: [kat] sha1
900,474 UART: [kat] SHA2-256
902,414 UART: [kat] SHA2-384
905,193 UART: [kat] SHA2-512-ACC
907,094 UART: [kat] ECC-384
916,991 UART: [kat] HMAC-384Kdf
921,597 UART: [kat] LMS
1,169,909 UART: [kat] --
1,170,754 UART: [cold-reset] ++
1,171,198 UART: [fht] FHT @ 0x50003400
1,174,020 UART: [idev] ++
1,174,188 UART: [idev] CDI.KEYID = 6
1,174,549 UART: [idev] SUBJECT.KEYID = 7
1,174,974 UART: [idev] UDS.KEYID = 0
1,182,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,560 UART: [idev] --
1,209,623 UART: [ldev] ++
1,209,791 UART: [ldev] CDI.KEYID = 6
1,210,155 UART: [ldev] SUBJECT.KEYID = 5
1,210,582 UART: [ldev] AUTHORITY.KEYID = 7
1,211,045 UART: [ldev] FE.KEYID = 1
1,216,469 UART: [ldev] Erasing FE.KEYID = 1
1,242,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,877 UART: [ldev] --
1,282,349 UART: [fwproc] Wait for Commands...
1,282,938 UART: [fwproc] Recv command 0x46574c44
1,283,671 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,641 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,826 >>> mbox cmd response: success
2,677,935 UART: [afmc] ++
2,678,103 UART: [afmc] CDI.KEYID = 6
2,678,466 UART: [afmc] SUBJECT.KEYID = 7
2,678,892 UART: [afmc] AUTHORITY.KEYID = 5
2,714,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,721 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,441 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,334 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,027 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,684 UART: [afmc] --
2,757,578 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,757,600 UART: [cold-reset] --
2,758,130 UART: [state] Locking Datavault
2,759,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,957 UART: [state] Locking ICCM
2,760,511 UART: [exit] Launching FMC @ 0x40000000
2,765,808 UART:
2,765,824 UART: Running Caliptra FMC ...
2,766,232 UART:
2,766,370 UART: [fmc] Received command: 0x10000003
2,775,846 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,914 >>> mbox cmd response: success
2,582,830 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,588,543 UART:
2,588,559 UART: Running Caliptra FMC ...
2,588,967 UART:
2,589,105 UART: [fmc] Received command: 0x10000003
2,598,581 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
191,998 UART:
192,366 UART: Running Caliptra ROM ...
193,500 UART:
193,640 UART: [state] CFI Enabled
265,910 UART: [state] LifecycleState = Unprovisioned
268,280 UART: [state] DebugLocked = No
270,921 UART: [state] WD Timer not started. Device not locked for debugging
275,114 UART: [kat] SHA2-256
457,021 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,537 UART: [kat] ++
469,123 UART: [kat] sha1
478,979 UART: [kat] SHA2-256
481,991 UART: [kat] SHA2-384
488,251 UART: [kat] SHA2-512-ACC
490,864 UART: [kat] ECC-384
3,778,255 UART: [kat] HMAC-384Kdf
3,803,748 UART: [kat] LMS
4,876,877 UART: [kat] --
4,881,329 UART: [cold-reset] ++
4,883,114 UART: [fht] FHT @ 0x50003400
4,893,358 UART: [idev] ++
4,894,075 UART: [idev] CDI.KEYID = 6
4,895,291 UART: [idev] SUBJECT.KEYID = 7
4,896,397 UART: [idev] UDS.KEYID = 0
4,931,457 UART: [idev] Erasing UDS.KEYID = 0
8,244,972 UART: [idev] Sha1 KeyId Algorithm
8,267,079 UART: [idev] --
8,271,544 UART: [ldev] ++
8,272,118 UART: [ldev] CDI.KEYID = 6
8,273,233 UART: [ldev] SUBJECT.KEYID = 5
8,274,448 UART: [ldev] AUTHORITY.KEYID = 7
8,275,600 UART: [ldev] FE.KEYID = 1
8,319,435 UART: [ldev] Erasing FE.KEYID = 1
11,652,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,993,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,383 UART: [ldev] --
14,017,150 UART: [fwproc] Wait for Commands...
14,020,010 UART: [fwproc] Recv command 0x46574c44
14,022,351 UART: Invalid Img size: 131073 bytes
14,026,961 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,541 UART:
193,247 UART: Running Caliptra ROM ...
194,417 UART:
603,672 UART: [state] CFI Enabled
619,230 UART: [state] LifecycleState = Unprovisioned
621,584 UART: [state] DebugLocked = No
623,393 UART: [state] WD Timer not started. Device not locked for debugging
628,074 UART: [kat] SHA2-256
810,045 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,588 UART: [kat] ++
822,117 UART: [kat] sha1
831,216 UART: [kat] SHA2-256
834,226 UART: [kat] SHA2-384
840,901 UART: [kat] SHA2-512-ACC
843,486 UART: [kat] ECC-384
4,097,216 UART: [kat] HMAC-384Kdf
4,110,803 UART: [kat] LMS
5,183,918 UART: [kat] --
5,189,658 UART: [cold-reset] ++
5,191,871 UART: [fht] FHT @ 0x50003400
5,203,233 UART: [idev] ++
5,203,911 UART: [idev] CDI.KEYID = 6
5,205,129 UART: [idev] SUBJECT.KEYID = 7
5,206,585 UART: [idev] UDS.KEYID = 0
5,223,488 UART: [idev] Erasing UDS.KEYID = 0
8,497,161 UART: [idev] Sha1 KeyId Algorithm
8,518,838 UART: [idev] --
8,522,188 UART: [ldev] ++
8,522,755 UART: [ldev] CDI.KEYID = 6
8,523,992 UART: [ldev] SUBJECT.KEYID = 5
8,525,447 UART: [ldev] AUTHORITY.KEYID = 7
8,527,018 UART: [ldev] FE.KEYID = 1
8,542,100 UART: [ldev] Erasing FE.KEYID = 1
11,833,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,134 UART: [ldev] --
14,199,695 UART: [fwproc] Wait for Commands...
14,202,223 UART: [fwproc] Recv command 0x46574c44
14,204,494 UART: Invalid Img size: 131073 bytes
14,207,469 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,092 UART:
192,487 UART: Running Caliptra ROM ...
193,607 UART:
193,753 UART: [state] CFI Enabled
263,753 UART: [state] LifecycleState = Unprovisioned
265,673 UART: [state] DebugLocked = No
268,131 UART: [state] WD Timer not started. Device not locked for debugging
272,615 UART: [kat] SHA2-256
451,758 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,338 UART: [kat] ++
463,875 UART: [kat] sha1
475,400 UART: [kat] SHA2-256
478,425 UART: [kat] SHA2-384
485,428 UART: [kat] SHA2-512-ACC
488,364 UART: [kat] ECC-384
2,949,896 UART: [kat] HMAC-384Kdf
2,973,073 UART: [kat] LMS
3,502,497 UART: [kat] --
3,505,459 UART: [cold-reset] ++
3,506,846 UART: [fht] FHT @ 0x50003400
3,517,555 UART: [idev] ++
3,518,126 UART: [idev] CDI.KEYID = 6
3,519,088 UART: [idev] SUBJECT.KEYID = 7
3,520,252 UART: [idev] UDS.KEYID = 0
3,545,790 UART: [idev] Erasing UDS.KEYID = 0
6,029,708 UART: [idev] Sha1 KeyId Algorithm
6,052,531 UART: [idev] --
6,055,451 UART: [ldev] ++
6,056,074 UART: [ldev] CDI.KEYID = 6
6,056,993 UART: [ldev] SUBJECT.KEYID = 5
6,058,155 UART: [ldev] AUTHORITY.KEYID = 7
6,059,389 UART: [ldev] FE.KEYID = 1
6,101,635 UART: [ldev] Erasing FE.KEYID = 1
8,607,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,650 UART: [ldev] --
10,414,806 UART: [fwproc] Wait for Commands...
10,417,983 UART: [fwproc] Recv command 0x46574c44
10,420,079 UART: Invalid Img size: 131073 bytes
10,424,323 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,476 UART:
192,872 UART: Running Caliptra ROM ...
193,989 UART:
603,631 UART: [state] CFI Enabled
615,602 UART: [state] LifecycleState = Unprovisioned
617,484 UART: [state] DebugLocked = No
620,069 UART: [state] WD Timer not started. Device not locked for debugging
623,105 UART: [kat] SHA2-256
802,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,786 UART: [kat] ++
814,234 UART: [kat] sha1
825,379 UART: [kat] SHA2-256
828,389 UART: [kat] SHA2-384
834,633 UART: [kat] SHA2-512-ACC
837,560 UART: [kat] ECC-384
3,279,076 UART: [kat] HMAC-384Kdf
3,292,346 UART: [kat] LMS
3,821,848 UART: [kat] --
3,826,432 UART: [cold-reset] ++
3,827,549 UART: [fht] FHT @ 0x50003400
3,839,439 UART: [idev] ++
3,839,999 UART: [idev] CDI.KEYID = 6
3,840,960 UART: [idev] SUBJECT.KEYID = 7
3,842,174 UART: [idev] UDS.KEYID = 0
3,859,824 UART: [idev] Erasing UDS.KEYID = 0
6,316,489 UART: [idev] Sha1 KeyId Algorithm
6,337,956 UART: [idev] --
6,342,240 UART: [ldev] ++
6,342,814 UART: [ldev] CDI.KEYID = 6
6,343,777 UART: [ldev] SUBJECT.KEYID = 5
6,344,934 UART: [ldev] AUTHORITY.KEYID = 7
6,346,163 UART: [ldev] FE.KEYID = 1
6,356,970 UART: [ldev] Erasing FE.KEYID = 1
8,830,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,960 UART: [ldev] --
10,620,266 UART: [fwproc] Wait for Commands...
10,622,466 UART: [fwproc] Recv command 0x46574c44
10,624,559 UART: Invalid Img size: 131073 bytes
10,626,566 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,583 UART: [kat] SHA2-256
901,523 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,847 UART: [cold-reset] ++
1,170,203 UART: [fht] FHT @ 0x50003400
1,172,867 UART: [idev] ++
1,173,035 UART: [idev] CDI.KEYID = 6
1,173,396 UART: [idev] SUBJECT.KEYID = 7
1,173,821 UART: [idev] UDS.KEYID = 0
1,181,567 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,865 UART: [idev] --
1,208,866 UART: [ldev] ++
1,209,034 UART: [ldev] CDI.KEYID = 6
1,209,398 UART: [ldev] SUBJECT.KEYID = 5
1,209,825 UART: [ldev] AUTHORITY.KEYID = 7
1,210,288 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,241,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,536 UART: [ldev] --
1,279,800 UART: [fwproc] Wait for Commands...
1,280,619 UART: [fwproc] Recv command 0x46574c44
1,281,353 UART: Invalid Img size: 131073 bytes
1,282,489 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
87,154 UART: [state] WD Timer not started. Device not locked for debugging
88,345 UART: [kat] SHA2-256
891,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,024 UART: [kat] ++
896,176 UART: [kat] sha1
900,530 UART: [kat] SHA2-256
902,470 UART: [kat] SHA2-384
905,209 UART: [kat] SHA2-512-ACC
907,110 UART: [kat] ECC-384
917,197 UART: [kat] HMAC-384Kdf
921,851 UART: [kat] LMS
1,170,163 UART: [kat] --
1,170,946 UART: [cold-reset] ++
1,171,412 UART: [fht] FHT @ 0x50003400
1,173,960 UART: [idev] ++
1,174,128 UART: [idev] CDI.KEYID = 6
1,174,489 UART: [idev] SUBJECT.KEYID = 7
1,174,914 UART: [idev] UDS.KEYID = 0
1,182,882 UART: [idev] Erasing UDS.KEYID = 0
1,200,488 UART: [idev] Sha1 KeyId Algorithm
1,209,348 UART: [idev] --
1,210,407 UART: [ldev] ++
1,210,575 UART: [ldev] CDI.KEYID = 6
1,210,939 UART: [ldev] SUBJECT.KEYID = 5
1,211,366 UART: [ldev] AUTHORITY.KEYID = 7
1,211,829 UART: [ldev] FE.KEYID = 1
1,217,173 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,547 UART: [ldev] --
1,283,027 UART: [fwproc] Wait for Commands...
1,283,688 UART: [fwproc] Recv command 0x46574c44
1,284,422 UART: Invalid Img size: 131073 bytes
1,285,438 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,639 UART: [kat] ++
895,791 UART: [kat] sha1
900,163 UART: [kat] SHA2-256
902,103 UART: [kat] SHA2-384
904,792 UART: [kat] SHA2-512-ACC
906,693 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,303 UART: [fht] FHT @ 0x50003400
1,173,127 UART: [idev] ++
1,173,295 UART: [idev] CDI.KEYID = 6
1,173,656 UART: [idev] SUBJECT.KEYID = 7
1,174,081 UART: [idev] UDS.KEYID = 0
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,199,435 UART: [idev] Sha1 KeyId Algorithm
1,208,257 UART: [idev] --
1,209,380 UART: [ldev] ++
1,209,548 UART: [ldev] CDI.KEYID = 6
1,209,912 UART: [ldev] SUBJECT.KEYID = 5
1,210,339 UART: [ldev] AUTHORITY.KEYID = 7
1,210,802 UART: [ldev] FE.KEYID = 1
1,216,098 UART: [ldev] Erasing FE.KEYID = 1
1,242,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,214 UART: [ldev] --
1,281,490 UART: [fwproc] Wait for Commands...
1,282,141 UART: [fwproc] Recv command 0x46574c44
1,282,875 UART: Invalid Img size: 131073 bytes
1,283,933 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,609 UART: [kat] SHA2-256
891,159 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,511 UART: [kat] HMAC-384Kdf
921,147 UART: [kat] LMS
1,169,459 UART: [kat] --
1,170,060 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,182,226 UART: [idev] Erasing UDS.KEYID = 0
1,199,898 UART: [idev] Sha1 KeyId Algorithm
1,208,804 UART: [idev] --
1,210,091 UART: [ldev] ++
1,210,259 UART: [ldev] CDI.KEYID = 6
1,210,623 UART: [ldev] SUBJECT.KEYID = 5
1,211,050 UART: [ldev] AUTHORITY.KEYID = 7
1,211,513 UART: [ldev] FE.KEYID = 1
1,216,929 UART: [ldev] Erasing FE.KEYID = 1
1,243,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,769 UART: [ldev] --
1,283,267 UART: [fwproc] Wait for Commands...
1,283,986 UART: [fwproc] Recv command 0x46574c44
1,284,720 UART: Invalid Img size: 131073 bytes
1,285,608 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,212 UART: [kat] SHA2-256
890,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,891 UART: [kat] ++
895,043 UART: [kat] sha1
899,203 UART: [kat] SHA2-256
901,143 UART: [kat] SHA2-384
903,820 UART: [kat] SHA2-512-ACC
905,721 UART: [kat] ECC-384
915,288 UART: [kat] HMAC-384Kdf
920,104 UART: [kat] LMS
1,168,416 UART: [kat] --
1,169,123 UART: [cold-reset] ++
1,169,449 UART: [fht] FHT @ 0x50003400
1,172,099 UART: [idev] ++
1,172,267 UART: [idev] CDI.KEYID = 6
1,172,628 UART: [idev] SUBJECT.KEYID = 7
1,173,053 UART: [idev] UDS.KEYID = 0
1,181,335 UART: [idev] Erasing UDS.KEYID = 0
1,198,261 UART: [idev] Sha1 KeyId Algorithm
1,207,181 UART: [idev] --
1,208,382 UART: [ldev] ++
1,208,550 UART: [ldev] CDI.KEYID = 6
1,208,914 UART: [ldev] SUBJECT.KEYID = 5
1,209,341 UART: [ldev] AUTHORITY.KEYID = 7
1,209,804 UART: [ldev] FE.KEYID = 1
1,214,952 UART: [ldev] Erasing FE.KEYID = 1
1,241,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,170 UART: [ldev] --
1,280,676 UART: [fwproc] Wait for Commands...
1,281,247 UART: [fwproc] Recv command 0x46574c44
1,281,981 UART: Invalid Img size: 131073 bytes
1,282,943 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
891,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,390 UART: [kat] ++
895,542 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,605 UART: [kat] SHA2-512-ACC
906,506 UART: [kat] ECC-384
916,181 UART: [kat] HMAC-384Kdf
920,657 UART: [kat] LMS
1,168,969 UART: [kat] --
1,169,962 UART: [cold-reset] ++
1,170,288 UART: [fht] FHT @ 0x50003400
1,172,852 UART: [idev] ++
1,173,020 UART: [idev] CDI.KEYID = 6
1,173,381 UART: [idev] SUBJECT.KEYID = 7
1,173,806 UART: [idev] UDS.KEYID = 0
1,182,348 UART: [idev] Erasing UDS.KEYID = 0
1,199,492 UART: [idev] Sha1 KeyId Algorithm
1,208,508 UART: [idev] --
1,209,467 UART: [ldev] ++
1,209,635 UART: [ldev] CDI.KEYID = 6
1,209,999 UART: [ldev] SUBJECT.KEYID = 5
1,210,426 UART: [ldev] AUTHORITY.KEYID = 7
1,210,889 UART: [ldev] FE.KEYID = 1
1,216,109 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,875 UART: [ldev] --
1,282,345 UART: [fwproc] Wait for Commands...
1,283,104 UART: [fwproc] Recv command 0x46574c44
1,283,838 UART: Invalid Img size: 131073 bytes
1,285,016 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
2,212,981 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,348,148 UART:
2,348,562 UART: Running Caliptra ROM ...
2,349,638 UART:
2,349,796 UART: [state] CFI Enabled
2,350,687 UART: [state] LifecycleState = Unprovisioned
2,352,330 UART: [state] DebugLocked = No
2,353,353 UART: [state] WD Timer not started. Device not locked for debugging
2,356,202 UART: [kat] SHA2-256
2,356,886 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,359,915 UART: [kat] ++
2,360,363 UART: [kat] sha1
2,360,872 UART: [kat] SHA2-256
2,361,549 UART: [kat] SHA2-384
2,362,209 UART: [kat] SHA2-512-ACC
2,363,043 UART: [kat] ECC-384
3,776,347 UART: [kat] HMAC-384Kdf
3,801,806 UART: [kat] LMS
4,874,982 UART: [kat] --
4,879,924 UART: [cold-reset] ++
4,882,512 UART: [fht] FHT @ 0x50003400
4,894,410 UART: [idev] ++
4,895,083 UART: [idev] CDI.KEYID = 6
4,896,318 UART: [idev] SUBJECT.KEYID = 7
4,897,420 UART: [idev] UDS.KEYID = 0
4,928,695 UART: [idev] Erasing UDS.KEYID = 0
8,240,285 UART: [idev] Sha1 KeyId Algorithm
8,262,156 UART: [idev] --
8,267,656 UART: [ldev] ++
8,268,240 UART: [ldev] CDI.KEYID = 6
8,269,474 UART: [ldev] SUBJECT.KEYID = 5
8,270,577 UART: [ldev] AUTHORITY.KEYID = 7
8,271,756 UART: [ldev] FE.KEYID = 1
8,317,257 UART: [ldev] Erasing FE.KEYID = 1
11,652,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,576 UART: [ldev] --
14,038,956 UART: [fwproc] Wait for Commands...
14,042,078 UART: [fwproc] Recv command 0x46574c44
14,044,414 UART: [fwproc] Recv'd Img size: 106620 bytes
22,510,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,584,651 UART: [fwproc] Load FMC at address 0x40000000 len 11316
22,627,135 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,945,428 >>> mbox cmd response: success
22,949,741 UART: [afmc] ++
22,950,443 UART: [afmc] CDI.KEYID = 6
22,951,685 UART: [afmc] SUBJECT.KEYID = 7
22,952,793 UART: [afmc] AUTHORITY.KEYID = 5
26,320,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,618,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,620,246 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
28,636,230 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
28,652,302 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
28,668,325 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
28,691,657 UART: [afmc] --
28,694,942 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,695,312 UART: [cold-reset] --
28,699,578 UART: [state] Locking Datavault
28,706,902 UART: [state] Locking PCR0, PCR1 and PCR31
28,708,603 UART: [state] Locking ICCM
28,710,887 UART: [exit] Launching FMC @ 0x40000000
28,719,501 UART:
28,719,737 UART: Running Caliptra FMC ...
28,720,775 UART:
28,720,922 UART: [fmc] Received command: 0x10000002
28,722,866 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
2,211,226 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
22,259,475 >>> mbox cmd response: success
27,946,356 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
27,960,788 UART:
27,961,128 UART: Running Caliptra FMC ...
27,962,222 UART:
27,962,368 UART: [fmc] Received command: 0x10000002
27,964,167 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
2,219,623 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
2,354,868 UART:
2,355,277 UART: Running Caliptra ROM ...
2,356,449 UART:
2,356,623 UART: [state] CFI Enabled
2,357,600 UART: [state] LifecycleState = Unprovisioned
2,359,246 UART: [state] DebugLocked = No
2,360,350 UART: [state] WD Timer not started. Device not locked for debugging
2,362,817 UART: [kat] SHA2-256
2,363,478 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,366,483 UART: [kat] ++
2,366,933 UART: [kat] sha1
2,367,438 UART: [kat] SHA2-256
2,368,171 UART: [kat] SHA2-384
2,368,831 UART: [kat] SHA2-512-ACC
2,369,678 UART: [kat] ECC-384
4,094,940 UART: [kat] HMAC-384Kdf
4,107,351 UART: [kat] LMS
5,180,498 UART: [kat] --
5,183,607 UART: [cold-reset] ++
5,186,252 UART: [fht] FHT @ 0x50003400
5,197,130 UART: [idev] ++
5,197,846 UART: [idev] CDI.KEYID = 6
5,199,089 UART: [idev] SUBJECT.KEYID = 7
5,200,472 UART: [idev] UDS.KEYID = 0
5,216,174 UART: [idev] Erasing UDS.KEYID = 0
8,491,863 UART: [idev] Sha1 KeyId Algorithm
8,513,938 UART: [idev] --
8,518,533 UART: [ldev] ++
8,519,103 UART: [ldev] CDI.KEYID = 6
8,520,350 UART: [ldev] SUBJECT.KEYID = 5
8,521,806 UART: [ldev] AUTHORITY.KEYID = 7
8,523,291 UART: [ldev] FE.KEYID = 1
8,531,780 UART: [ldev] Erasing FE.KEYID = 1
11,823,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,128,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,144,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,160,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,180,333 UART: [ldev] --
14,185,645 UART: [fwproc] Wait for Commands...
14,188,609 UART: [fwproc] Recv command 0x46574c44
14,190,924 UART: [fwproc] Recv'd Img size: 106620 bytes
21,880,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
21,960,903 UART: [fwproc] Load FMC at address 0x40000000 len 11316
22,003,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,320,560 >>> mbox cmd response: success
22,324,327 UART: [afmc] ++
22,325,030 UART: [afmc] CDI.KEYID = 6
22,326,275 UART: [afmc] SUBJECT.KEYID = 7
22,327,429 UART: [afmc] AUTHORITY.KEYID = 5
25,643,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
27,939,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
27,941,360 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
27,957,344 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
27,973,419 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
27,989,474 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
28,011,642 UART: [afmc] --
28,015,834 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,016,203 UART: [cold-reset] --
28,019,552 UART: [state] Locking Datavault
28,023,123 UART: [state] Locking PCR0, PCR1 and PCR31
28,024,776 UART: [state] Locking ICCM
28,027,387 UART: [exit] Launching FMC @ 0x40000000
28,036,059 UART:
28,036,294 UART: Running Caliptra FMC ...
28,037,389 UART:
28,037,544 UART: [fmc] Received command: 0x10000002
28,039,434 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,213,960 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
22,715,953 >>> mbox cmd response: success
28,338,215 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,353,861 UART:
28,354,199 UART: Running Caliptra FMC ...
28,355,386 UART:
28,355,549 UART: [fmc] Received command: 0x10000002
28,357,271 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
2,224,677 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,360,087 UART:
2,360,489 UART: Running Caliptra ROM ...
2,361,651 UART:
2,361,820 UART: [state] CFI Enabled
2,362,784 UART: [state] LifecycleState = Unprovisioned
2,364,449 UART: [state] DebugLocked = No
2,365,541 UART: [state] WD Timer not started. Device not locked for debugging
2,368,012 UART: [kat] SHA2-256
2,368,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,371,700 UART: [kat] ++
2,372,150 UART: [kat] sha1
2,372,666 UART: [kat] SHA2-256
2,373,404 UART: [kat] SHA2-384
2,374,068 UART: [kat] SHA2-512-ACC
2,374,896 UART: [kat] ECC-384
2,947,931 UART: [kat] HMAC-384Kdf
2,970,745 UART: [kat] LMS
3,500,201 UART: [kat] --
3,504,554 UART: [cold-reset] ++
3,505,405 UART: [fht] FHT @ 0x50003400
3,515,207 UART: [idev] ++
3,515,774 UART: [idev] CDI.KEYID = 6
3,516,811 UART: [idev] SUBJECT.KEYID = 7
3,517,918 UART: [idev] UDS.KEYID = 0
3,542,587 UART: [idev] Erasing UDS.KEYID = 0
6,022,747 UART: [idev] Sha1 KeyId Algorithm
6,045,972 UART: [idev] --
6,050,021 UART: [ldev] ++
6,050,594 UART: [ldev] CDI.KEYID = 6
6,051,500 UART: [ldev] SUBJECT.KEYID = 5
6,052,659 UART: [ldev] AUTHORITY.KEYID = 7
6,053,951 UART: [ldev] FE.KEYID = 1
6,100,257 UART: [ldev] Erasing FE.KEYID = 1
8,602,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,473 UART: [ldev] --
10,390,803 UART: [fwproc] Wait for Commands...
10,393,130 UART: [fwproc] Recv command 0x46574c44
10,395,230 UART: [fwproc] Recv'd Img size: 106964 bytes
14,879,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,954,678 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,997,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,315,231 >>> mbox cmd response: success
15,319,374 UART: [afmc] ++
15,319,963 UART: [afmc] CDI.KEYID = 6
15,320,848 UART: [afmc] SUBJECT.KEYID = 7
15,321,998 UART: [afmc] AUTHORITY.KEYID = 5
17,850,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,578,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,580,666 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,596,681 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,612,601 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,628,496 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,651,537 UART: [afmc] --
19,654,865 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,655,220 UART: [cold-reset] --
19,658,572 UART: [state] Locking Datavault
19,662,679 UART: [state] Locking PCR0, PCR1 and PCR31
19,664,538 UART: [state] Locking ICCM
19,666,781 UART: [exit] Launching FMC @ 0x40000000
19,675,178 UART:
19,675,413 UART: Running Caliptra FMC ...
19,676,512 UART:
19,676,667 UART: [fmc] Received command: 0x10000002
19,678,562 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,214,856 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,930,070 >>> mbox cmd response: success
19,196,059 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,208,959 UART:
19,209,298 UART: Running Caliptra FMC ...
19,210,470 UART:
19,210,655 UART: [fmc] Received command: 0x10000002
19,212,404 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
2,219,590 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,354,986 UART:
2,355,409 UART: Running Caliptra ROM ...
2,356,582 UART:
2,356,756 UART: [state] CFI Enabled
2,357,713 UART: [state] LifecycleState = Unprovisioned
2,359,365 UART: [state] DebugLocked = No
2,360,472 UART: [state] WD Timer not started. Device not locked for debugging
2,362,948 UART: [kat] SHA2-256
2,363,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,366,634 UART: [kat] ++
2,367,088 UART: [kat] sha1
2,367,605 UART: [kat] SHA2-256
2,368,346 UART: [kat] SHA2-384
2,369,010 UART: [kat] SHA2-512-ACC
2,369,900 UART: [kat] ECC-384
3,281,201 UART: [kat] HMAC-384Kdf
3,293,420 UART: [kat] LMS
3,822,893 UART: [kat] --
3,827,425 UART: [cold-reset] ++
3,829,022 UART: [fht] FHT @ 0x50003400
3,840,214 UART: [idev] ++
3,840,773 UART: [idev] CDI.KEYID = 6
3,841,706 UART: [idev] SUBJECT.KEYID = 7
3,842,865 UART: [idev] UDS.KEYID = 0
3,860,344 UART: [idev] Erasing UDS.KEYID = 0
6,316,992 UART: [idev] Sha1 KeyId Algorithm
6,340,163 UART: [idev] --
6,344,425 UART: [ldev] ++
6,344,986 UART: [ldev] CDI.KEYID = 6
6,345,866 UART: [ldev] SUBJECT.KEYID = 5
6,347,076 UART: [ldev] AUTHORITY.KEYID = 7
6,348,367 UART: [ldev] FE.KEYID = 1
6,359,310 UART: [ldev] Erasing FE.KEYID = 1
8,829,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,574 UART: [ldev] --
10,618,317 UART: [fwproc] Wait for Commands...
10,619,963 UART: [fwproc] Recv command 0x46574c44
10,622,023 UART: [fwproc] Recv'd Img size: 106964 bytes
15,116,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,195,555 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,238,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,555,957 >>> mbox cmd response: success
15,559,307 UART: [afmc] ++
15,559,891 UART: [afmc] CDI.KEYID = 6
15,560,776 UART: [afmc] SUBJECT.KEYID = 7
15,562,064 UART: [afmc] AUTHORITY.KEYID = 5
18,061,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,782,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,784,453 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,800,431 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,816,444 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,832,313 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,854,745 UART: [afmc] --
19,858,450 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,858,819 UART: [cold-reset] --
19,862,822 UART: [state] Locking Datavault
19,867,249 UART: [state] Locking PCR0, PCR1 and PCR31
19,868,889 UART: [state] Locking ICCM
19,870,942 UART: [exit] Launching FMC @ 0x40000000
19,879,333 UART:
19,879,566 UART: Running Caliptra FMC ...
19,880,682 UART:
19,880,837 UART: [fmc] Received command: 0x10000002
19,882,701 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,215,654 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,138,862 >>> mbox cmd response: success
19,370,696 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,384,883 UART:
19,385,229 UART: Running Caliptra FMC ...
19,386,396 UART:
19,386,557 UART: [fmc] Received command: 0x10000002
19,388,350 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
2,214,556 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,938,221 >>> mbox cmd response: success
19,205,913 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,220,912 UART:
19,221,237 UART: Running Caliptra FMC ...
19,222,398 UART:
19,222,568 UART: [fmc] Received command: 0x10000002
19,224,375 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,217,662 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,129,159 >>> mbox cmd response: success
19,363,547 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,377,833 UART:
19,378,176 UART: Running Caliptra FMC ...
19,379,364 UART:
19,379,533 UART: [fmc] Received command: 0x10000002
19,381,300 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,170,129 UART: [fht] FHT @ 0x50003400
1,172,787 UART: [idev] ++
1,172,955 UART: [idev] CDI.KEYID = 6
1,173,316 UART: [idev] SUBJECT.KEYID = 7
1,173,741 UART: [idev] UDS.KEYID = 0
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,198,621 UART: [idev] Sha1 KeyId Algorithm
1,207,659 UART: [idev] --
1,208,676 UART: [ldev] ++
1,208,844 UART: [ldev] CDI.KEYID = 6
1,209,208 UART: [ldev] SUBJECT.KEYID = 5
1,209,635 UART: [ldev] AUTHORITY.KEYID = 7
1,210,098 UART: [ldev] FE.KEYID = 1
1,215,260 UART: [ldev] Erasing FE.KEYID = 1
1,241,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,754 UART: [ldev] --
1,281,264 UART: [fwproc] Wait for Commands...
1,281,867 UART: [fwproc] Recv command 0x46574c44
1,282,600 UART: [fwproc] Recv'd Img size: 106964 bytes
3,042,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,070,530 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,088,613 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,224,563 >>> mbox cmd response: success
3,225,828 UART: [afmc] ++
3,225,996 UART: [afmc] CDI.KEYID = 6
3,226,359 UART: [afmc] SUBJECT.KEYID = 7
3,226,785 UART: [afmc] AUTHORITY.KEYID = 5
3,261,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,278,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,279,222 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,284,899 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,290,792 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,296,502 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,304,460 UART: [afmc] --
3,305,350 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,305,372 UART: [cold-reset] --
3,306,054 UART: [state] Locking Datavault
3,307,237 UART: [state] Locking PCR0, PCR1 and PCR31
3,307,841 UART: [state] Locking ICCM
3,308,283 UART: [exit] Launching FMC @ 0x40000000
3,313,580 UART:
3,313,596 UART: Running Caliptra FMC ...
3,314,004 UART:
3,314,142 UART: [fmc] Received command: 0x10000002
3,315,886 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,060,422 >>> mbox cmd response: success
3,116,586 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,122,867 UART:
3,122,883 UART: Running Caliptra FMC ...
3,123,291 UART:
3,123,429 UART: [fmc] Received command: 0x10000002
3,125,173 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
900,084 UART: [kat] SHA2-256
902,024 UART: [kat] SHA2-384
904,921 UART: [kat] SHA2-512-ACC
906,822 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,589 UART: [kat] LMS
1,168,901 UART: [kat] --
1,169,816 UART: [cold-reset] ++
1,170,224 UART: [fht] FHT @ 0x50003400
1,172,708 UART: [idev] ++
1,172,876 UART: [idev] CDI.KEYID = 6
1,173,237 UART: [idev] SUBJECT.KEYID = 7
1,173,662 UART: [idev] UDS.KEYID = 0
1,181,846 UART: [idev] Erasing UDS.KEYID = 0
1,198,814 UART: [idev] Sha1 KeyId Algorithm
1,207,830 UART: [idev] --
1,209,071 UART: [ldev] ++
1,209,239 UART: [ldev] CDI.KEYID = 6
1,209,603 UART: [ldev] SUBJECT.KEYID = 5
1,210,030 UART: [ldev] AUTHORITY.KEYID = 7
1,210,493 UART: [ldev] FE.KEYID = 1
1,215,641 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,179 UART: [ldev] --
1,281,517 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x46574c44
1,283,055 UART: [fwproc] Recv'd Img size: 106964 bytes
3,041,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,069,293 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,087,376 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,223,316 >>> mbox cmd response: success
3,224,427 UART: [afmc] ++
3,224,595 UART: [afmc] CDI.KEYID = 6
3,224,958 UART: [afmc] SUBJECT.KEYID = 7
3,225,384 UART: [afmc] AUTHORITY.KEYID = 5
3,261,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,277,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,278,663 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,284,340 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,290,233 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,295,943 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,303,757 UART: [afmc] --
3,304,657 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,304,679 UART: [cold-reset] --
3,305,705 UART: [state] Locking Datavault
3,307,218 UART: [state] Locking PCR0, PCR1 and PCR31
3,307,822 UART: [state] Locking ICCM
3,308,290 UART: [exit] Launching FMC @ 0x40000000
3,313,587 UART:
3,313,603 UART: Running Caliptra FMC ...
3,314,011 UART:
3,314,149 UART: [fmc] Received command: 0x10000002
3,315,893 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,073,196 >>> mbox cmd response: success
3,129,356 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,135,413 UART:
3,135,429 UART: Running Caliptra FMC ...
3,135,837 UART:
3,135,975 UART: [fmc] Received command: 0x10000002
3,137,719 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
85,849 UART: [state] WD Timer not started. Device not locked for debugging
87,200 UART: [kat] SHA2-256
890,750 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,879 UART: [kat] ++
895,031 UART: [kat] sha1
899,171 UART: [kat] SHA2-256
901,111 UART: [kat] SHA2-384
903,872 UART: [kat] SHA2-512-ACC
905,773 UART: [kat] ECC-384
915,512 UART: [kat] HMAC-384Kdf
919,944 UART: [kat] LMS
1,168,256 UART: [kat] --
1,169,215 UART: [cold-reset] ++
1,169,699 UART: [fht] FHT @ 0x50003400
1,172,441 UART: [idev] ++
1,172,609 UART: [idev] CDI.KEYID = 6
1,172,970 UART: [idev] SUBJECT.KEYID = 7
1,173,395 UART: [idev] UDS.KEYID = 0
1,181,251 UART: [idev] Erasing UDS.KEYID = 0
1,198,269 UART: [idev] Sha1 KeyId Algorithm
1,207,123 UART: [idev] --
1,208,112 UART: [ldev] ++
1,208,280 UART: [ldev] CDI.KEYID = 6
1,208,644 UART: [ldev] SUBJECT.KEYID = 5
1,209,071 UART: [ldev] AUTHORITY.KEYID = 7
1,209,534 UART: [ldev] FE.KEYID = 1
1,214,816 UART: [ldev] Erasing FE.KEYID = 1
1,241,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,674 UART: [ldev] --
1,281,040 UART: [fwproc] Wait for Commands...
1,281,695 UART: [fwproc] Recv command 0x46574c44
1,282,428 UART: [fwproc] Recv'd Img size: 106964 bytes
3,048,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,076,485 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,094,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,230,674 >>> mbox cmd response: success
3,231,805 UART: [afmc] ++
3,231,973 UART: [afmc] CDI.KEYID = 6
3,232,336 UART: [afmc] SUBJECT.KEYID = 7
3,232,762 UART: [afmc] AUTHORITY.KEYID = 5
3,268,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,285,202 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,285,953 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,291,630 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,297,523 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,303,233 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,311,157 UART: [afmc] --
3,312,211 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,312,233 UART: [cold-reset] --
3,312,963 UART: [state] Locking Datavault
3,314,346 UART: [state] Locking PCR0, PCR1 and PCR31
3,314,950 UART: [state] Locking ICCM
3,315,576 UART: [exit] Launching FMC @ 0x40000000
3,320,873 UART:
3,320,889 UART: Running Caliptra FMC ...
3,321,297 UART:
3,321,435 UART: [fmc] Received command: 0x10000002
3,323,179 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,071,065 >>> mbox cmd response: success
3,127,219 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,133,600 UART:
3,133,616 UART: Running Caliptra FMC ...
3,134,024 UART:
3,134,162 UART: [fmc] Received command: 0x10000002
3,135,906 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
891,543 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,672 UART: [kat] ++
895,824 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,271 UART: [kat] HMAC-384Kdf
920,877 UART: [kat] LMS
1,169,189 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,152 UART: [idev] ++
1,173,320 UART: [idev] CDI.KEYID = 6
1,173,681 UART: [idev] SUBJECT.KEYID = 7
1,174,106 UART: [idev] UDS.KEYID = 0
1,182,290 UART: [idev] Erasing UDS.KEYID = 0
1,199,344 UART: [idev] Sha1 KeyId Algorithm
1,208,390 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,157 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,677 UART: [ldev] --
1,282,099 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,567 UART: [fwproc] Recv'd Img size: 106964 bytes
3,038,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,066,281 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,084,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,220,454 >>> mbox cmd response: success
3,221,529 UART: [afmc] ++
3,221,697 UART: [afmc] CDI.KEYID = 6
3,222,060 UART: [afmc] SUBJECT.KEYID = 7
3,222,486 UART: [afmc] AUTHORITY.KEYID = 5
3,258,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,274,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,275,185 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,280,862 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,286,755 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,292,465 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,300,395 UART: [afmc] --
3,301,341 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,301,363 UART: [cold-reset] --
3,302,215 UART: [state] Locking Datavault
3,303,488 UART: [state] Locking PCR0, PCR1 and PCR31
3,304,092 UART: [state] Locking ICCM
3,304,716 UART: [exit] Launching FMC @ 0x40000000
3,310,013 UART:
3,310,029 UART: Running Caliptra FMC ...
3,310,437 UART:
3,310,575 UART: [fmc] Received command: 0x10000002
3,312,319 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,080,182 >>> mbox cmd response: success
3,136,682 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,142,667 UART:
3,142,683 UART: Running Caliptra FMC ...
3,143,091 UART:
3,143,229 UART: [fmc] Received command: 0x10000002
3,144,973 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
891,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,847 UART: [cold-reset] ++
1,170,295 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,182,095 UART: [idev] Erasing UDS.KEYID = 0
1,199,409 UART: [idev] Sha1 KeyId Algorithm
1,208,137 UART: [idev] --
1,209,378 UART: [ldev] ++
1,209,546 UART: [ldev] CDI.KEYID = 6
1,209,910 UART: [ldev] SUBJECT.KEYID = 5
1,210,337 UART: [ldev] AUTHORITY.KEYID = 7
1,210,800 UART: [ldev] FE.KEYID = 1
1,216,016 UART: [ldev] Erasing FE.KEYID = 1
1,242,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,758 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,889 UART: [fwproc] Recv command 0x46574c44
1,283,622 UART: [fwproc] Recv'd Img size: 106964 bytes
3,035,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,063,377 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,081,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,217,582 >>> mbox cmd response: success
3,218,627 UART: [afmc] ++
3,218,795 UART: [afmc] CDI.KEYID = 6
3,219,158 UART: [afmc] SUBJECT.KEYID = 7
3,219,584 UART: [afmc] AUTHORITY.KEYID = 5
3,255,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,271,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,272,267 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,277,944 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,283,837 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,289,547 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,297,201 UART: [afmc] --
3,298,069 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,298,091 UART: [cold-reset] --
3,298,835 UART: [state] Locking Datavault
3,300,044 UART: [state] Locking PCR0, PCR1 and PCR31
3,300,648 UART: [state] Locking ICCM
3,301,172 UART: [exit] Launching FMC @ 0x40000000
3,306,469 UART:
3,306,485 UART: Running Caliptra FMC ...
3,306,893 UART:
3,307,031 UART: [fmc] Received command: 0x10000002
3,308,775 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,069,404 >>> mbox cmd response: success
3,125,318 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,131,321 UART:
3,131,337 UART: Running Caliptra FMC ...
3,131,745 UART:
3,131,883 UART: [fmc] Received command: 0x10000002
3,133,627 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,486 UART: [kat] SHA2-256
901,426 UART: [kat] SHA2-384
904,269 UART: [kat] SHA2-512-ACC
906,170 UART: [kat] ECC-384
915,903 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,169,826 UART: [cold-reset] ++
1,170,352 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,182,678 UART: [idev] Erasing UDS.KEYID = 0
1,199,386 UART: [idev] Sha1 KeyId Algorithm
1,208,316 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,242,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,282,055 UART: [fwproc] Wait for Commands...
1,282,868 UART: [fwproc] Recv command 0x46574c44
1,283,601 UART: [fwproc] Recv'd Img size: 106964 bytes
3,044,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,072,474 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,090,557 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,226,461 >>> mbox cmd response: success
3,227,494 UART: [afmc] ++
3,227,662 UART: [afmc] CDI.KEYID = 6
3,228,025 UART: [afmc] SUBJECT.KEYID = 7
3,228,451 UART: [afmc] AUTHORITY.KEYID = 5
3,263,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,280,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,281,548 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,287,225 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,293,118 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,298,828 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,306,560 UART: [afmc] --
3,307,634 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,307,656 UART: [cold-reset] --
3,308,600 UART: [state] Locking Datavault
3,309,903 UART: [state] Locking PCR0, PCR1 and PCR31
3,310,507 UART: [state] Locking ICCM
3,311,035 UART: [exit] Launching FMC @ 0x40000000
3,316,332 UART:
3,316,348 UART: Running Caliptra FMC ...
3,316,756 UART:
3,316,894 UART: [fmc] Received command: 0x10000002
3,318,638 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,071,533 >>> mbox cmd response: success
3,127,781 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,133,778 UART:
3,133,794 UART: Running Caliptra FMC ...
3,134,202 UART:
3,134,340 UART: [fmc] Received command: 0x10000002
3,136,084 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
2,059,496 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,200,979 UART:
2,201,387 UART: Running Caliptra ROM ...
2,202,552 UART:
2,202,722 UART: [state] CFI Enabled
2,203,696 UART: [state] LifecycleState = Unprovisioned
2,205,344 UART: [state] DebugLocked = No
2,206,447 UART: [state] WD Timer not started. Device not locked for debugging
2,208,920 UART: [kat] SHA2-256
2,209,589 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,595 UART: [kat] ++
2,213,045 UART: [kat] sha1
2,213,562 UART: [kat] SHA2-256
2,214,303 UART: [kat] SHA2-384
2,214,968 UART: [kat] SHA2-512-ACC
2,215,773 UART: [kat] ECC-384
3,777,468 UART: [kat] HMAC-384Kdf
3,804,252 UART: [kat] LMS
4,877,391 UART: [kat] --
4,882,320 UART: [cold-reset] ++
4,884,417 UART: [fht] FHT @ 0x50003400
4,895,991 UART: [idev] ++
4,896,670 UART: [idev] CDI.KEYID = 6
4,897,906 UART: [idev] SUBJECT.KEYID = 7
4,899,018 UART: [idev] UDS.KEYID = 0
4,931,489 UART: [idev] Erasing UDS.KEYID = 0
8,240,804 UART: [idev] Sha1 KeyId Algorithm
8,262,785 UART: [idev] --
8,266,712 UART: [ldev] ++
8,267,278 UART: [ldev] CDI.KEYID = 6
8,268,511 UART: [ldev] SUBJECT.KEYID = 5
8,269,662 UART: [ldev] AUTHORITY.KEYID = 7
8,270,885 UART: [ldev] FE.KEYID = 1
8,298,095 UART: [ldev] Erasing FE.KEYID = 1
11,634,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,947,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,964,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,979,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,995,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,016,686 UART: [ldev] --
14,021,467 UART: [fwproc] Wait for Commands...
14,023,240 UART: [fwproc] Recv command 0x46574c44
14,025,499 UART: [fwproc] Recv'd Img size: 111688 bytes
22,482,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,563,995 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,624,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,942,138 >>> mbox cmd response: success
22,946,655 UART: [afmc] ++
22,947,362 UART: [afmc] CDI.KEYID = 6
22,948,518 UART: [afmc] SUBJECT.KEYID = 7
22,949,736 UART: [afmc] AUTHORITY.KEYID = 5
26,319,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,617,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,619,219 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
28,635,402 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
28,651,341 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
28,667,321 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
28,691,220 UART: [afmc] --
28,694,135 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,694,500 UART: [cold-reset] --
28,698,233 UART: [state] Locking Datavault
28,703,267 UART: [state] Locking PCR0, PCR1 and PCR31
28,704,963 UART: [state] Locking ICCM
28,707,115 UART: [exit] Launching FMC @ 0x40000000
28,715,730 UART:
28,715,978 UART: Running Caliptra FMC ...
28,717,000 UART:
28,717,149 UART: [fmc] Received command: 0x10000000
28,719,636 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,060,995 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,273,608 >>> mbox cmd response: success
27,947,652 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
27,962,226 UART:
27,962,562 UART: Running Caliptra FMC ...
27,963,661 UART:
27,963,810 UART: [fmc] Received command: 0x10000000
27,966,192 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,066,641 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,208,034 UART:
2,208,454 UART: Running Caliptra ROM ...
2,209,543 UART:
2,209,691 UART: [state] CFI Enabled
2,210,682 UART: [state] LifecycleState = Unprovisioned
2,212,342 UART: [state] DebugLocked = No
2,213,385 UART: [state] WD Timer not started. Device not locked for debugging
2,215,856 UART: [kat] SHA2-256
2,216,514 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,219,518 UART: [kat] ++
2,219,963 UART: [kat] sha1
2,220,468 UART: [kat] SHA2-256
2,221,118 UART: [kat] SHA2-384
2,221,766 UART: [kat] SHA2-512-ACC
2,222,558 UART: [kat] ECC-384
4,096,471 UART: [kat] HMAC-384Kdf
4,107,789 UART: [kat] LMS
5,180,950 UART: [kat] --
5,184,846 UART: [cold-reset] ++
5,187,376 UART: [fht] FHT @ 0x50003400
5,197,866 UART: [idev] ++
5,198,593 UART: [idev] CDI.KEYID = 6
5,199,800 UART: [idev] SUBJECT.KEYID = 7
5,201,241 UART: [idev] UDS.KEYID = 0
5,216,729 UART: [idev] Erasing UDS.KEYID = 0
8,491,031 UART: [idev] Sha1 KeyId Algorithm
8,511,731 UART: [idev] --
8,515,213 UART: [ldev] ++
8,515,794 UART: [ldev] CDI.KEYID = 6
8,517,035 UART: [ldev] SUBJECT.KEYID = 5
8,518,469 UART: [ldev] AUTHORITY.KEYID = 7
8,520,028 UART: [ldev] FE.KEYID = 1
8,530,566 UART: [ldev] Erasing FE.KEYID = 1
11,822,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,432 UART: [ldev] --
14,187,307 UART: [fwproc] Wait for Commands...
14,188,810 UART: [fwproc] Recv command 0x46574c44
14,190,797 UART: [fwproc] Recv'd Img size: 111688 bytes
22,360,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,437,835 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,498,086 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,815,035 >>> mbox cmd response: success
22,819,938 UART: [afmc] ++
22,820,675 UART: [afmc] CDI.KEYID = 6
22,821,863 UART: [afmc] SUBJECT.KEYID = 7
22,823,015 UART: [afmc] AUTHORITY.KEYID = 5
26,143,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,438,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,440,558 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
28,456,707 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
28,472,698 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
28,488,608 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
28,510,708 UART: [afmc] --
28,515,129 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,515,492 UART: [cold-reset] --
28,519,542 UART: [state] Locking Datavault
28,524,844 UART: [state] Locking PCR0, PCR1 and PCR31
28,526,540 UART: [state] Locking ICCM
28,528,146 UART: [exit] Launching FMC @ 0x40000000
28,536,771 UART:
28,537,000 UART: Running Caliptra FMC ...
28,538,096 UART:
28,538,258 UART: [fmc] Received command: 0x10000000
28,540,695 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,067,671 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,518,592 >>> mbox cmd response: success
28,140,524 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,156,012 UART:
28,156,357 UART: Running Caliptra FMC ...
28,157,534 UART:
28,157,696 UART: [fmc] Received command: 0x10000000
28,159,962 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
2,061,859 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,203,488 UART:
2,203,913 UART: Running Caliptra ROM ...
2,205,085 UART:
2,205,290 UART: [state] CFI Enabled
2,206,270 UART: [state] LifecycleState = Unprovisioned
2,207,921 UART: [state] DebugLocked = No
2,209,039 UART: [state] WD Timer not started. Device not locked for debugging
2,211,515 UART: [kat] SHA2-256
2,212,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,193 UART: [kat] ++
2,215,644 UART: [kat] sha1
2,216,158 UART: [kat] SHA2-256
2,216,897 UART: [kat] SHA2-384
2,217,561 UART: [kat] SHA2-512-ACC
2,218,400 UART: [kat] ECC-384
2,927,834 UART: [kat] HMAC-384Kdf
2,950,365 UART: [kat] LMS
3,479,807 UART: [kat] --
3,485,875 UART: [cold-reset] ++
3,487,290 UART: [fht] FHT @ 0x50003400
3,498,493 UART: [idev] ++
3,499,059 UART: [idev] CDI.KEYID = 6
3,499,968 UART: [idev] SUBJECT.KEYID = 7
3,501,186 UART: [idev] UDS.KEYID = 0
3,523,001 UART: [idev] Erasing UDS.KEYID = 0
6,005,758 UART: [idev] Sha1 KeyId Algorithm
6,028,468 UART: [idev] --
6,032,200 UART: [ldev] ++
6,032,786 UART: [ldev] CDI.KEYID = 6
6,033,674 UART: [ldev] SUBJECT.KEYID = 5
6,034,892 UART: [ldev] AUTHORITY.KEYID = 7
6,036,132 UART: [ldev] FE.KEYID = 1
6,079,521 UART: [ldev] Erasing FE.KEYID = 1
8,581,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,704 UART: [ldev] --
10,391,172 UART: [fwproc] Wait for Commands...
10,392,964 UART: [fwproc] Recv command 0x46574c44
10,395,067 UART: [fwproc] Recv'd Img size: 112032 bytes
14,940,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,016,978 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,077,291 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,396,150 >>> mbox cmd response: success
15,400,780 UART: [afmc] ++
15,401,381 UART: [afmc] CDI.KEYID = 6
15,402,290 UART: [afmc] SUBJECT.KEYID = 7
15,403,500 UART: [afmc] AUTHORITY.KEYID = 5
17,925,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,648,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,650,819 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,666,851 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,682,707 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,698,477 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,719,918 UART: [afmc] --
19,723,091 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,723,469 UART: [cold-reset] --
19,727,361 UART: [state] Locking Datavault
19,730,664 UART: [state] Locking PCR0, PCR1 and PCR31
19,732,306 UART: [state] Locking ICCM
19,734,400 UART: [exit] Launching FMC @ 0x40000000
19,742,801 UART:
19,743,103 UART: Running Caliptra FMC ...
19,744,228 UART:
19,744,396 UART: [fmc] Received command: 0x10000000
19,746,749 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
2,073,748 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,026,264 >>> mbox cmd response: success
19,288,712 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,307,539 UART:
19,307,891 UART: Running Caliptra FMC ...
19,309,081 UART:
19,309,252 UART: [fmc] Received command: 0x10000000
19,311,586 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
2,065,593 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,207,424 UART:
2,207,836 UART: Running Caliptra ROM ...
2,209,015 UART:
2,209,191 UART: [state] CFI Enabled
2,210,166 UART: [state] LifecycleState = Unprovisioned
2,211,807 UART: [state] DebugLocked = No
2,212,910 UART: [state] WD Timer not started. Device not locked for debugging
2,215,386 UART: [kat] SHA2-256
2,216,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,219,086 UART: [kat] ++
2,219,538 UART: [kat] sha1
2,220,048 UART: [kat] SHA2-256
2,220,788 UART: [kat] SHA2-384
2,221,456 UART: [kat] SHA2-512-ACC
2,222,259 UART: [kat] ECC-384
3,282,147 UART: [kat] HMAC-384Kdf
3,294,329 UART: [kat] LMS
3,823,795 UART: [kat] --
3,828,163 UART: [cold-reset] ++
3,829,601 UART: [fht] FHT @ 0x50003400
3,840,465 UART: [idev] ++
3,841,026 UART: [idev] CDI.KEYID = 6
3,841,996 UART: [idev] SUBJECT.KEYID = 7
3,843,151 UART: [idev] UDS.KEYID = 0
3,858,534 UART: [idev] Erasing UDS.KEYID = 0
6,314,829 UART: [idev] Sha1 KeyId Algorithm
6,337,535 UART: [idev] --
6,342,682 UART: [ldev] ++
6,343,281 UART: [ldev] CDI.KEYID = 6
6,344,169 UART: [ldev] SUBJECT.KEYID = 5
6,345,383 UART: [ldev] AUTHORITY.KEYID = 7
6,346,614 UART: [ldev] FE.KEYID = 1
6,358,154 UART: [ldev] Erasing FE.KEYID = 1
8,827,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,550 UART: [ldev] --
10,619,275 UART: [fwproc] Wait for Commands...
10,621,536 UART: [fwproc] Recv command 0x46574c44
10,623,600 UART: [fwproc] Recv'd Img size: 112032 bytes
15,129,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,210,942 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,271,215 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,590,396 >>> mbox cmd response: success
15,595,403 UART: [afmc] ++
15,595,985 UART: [afmc] CDI.KEYID = 6
15,596,869 UART: [afmc] SUBJECT.KEYID = 7
15,598,080 UART: [afmc] AUTHORITY.KEYID = 5
18,096,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,816,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,818,485 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,834,473 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,850,384 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,866,214 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,888,222 UART: [afmc] --
19,891,954 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,892,325 UART: [cold-reset] --
19,895,672 UART: [state] Locking Datavault
19,900,914 UART: [state] Locking PCR0, PCR1 and PCR31
19,902,609 UART: [state] Locking ICCM
19,905,324 UART: [exit] Launching FMC @ 0x40000000
19,913,711 UART:
19,913,938 UART: Running Caliptra FMC ...
19,914,962 UART:
19,915,107 UART: [fmc] Received command: 0x10000000
19,917,645 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
2,067,478 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,211,506 >>> mbox cmd response: success
19,443,206 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,459,394 UART:
19,459,728 UART: Running Caliptra FMC ...
19,460,904 UART:
19,461,071 UART: [fmc] Received command: 0x10000000
19,463,398 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,064,595 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,978,735 >>> mbox cmd response: success
19,247,393 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,262,209 UART:
19,262,535 UART: Running Caliptra FMC ...
19,263,613 UART:
19,263,763 UART: [fmc] Received command: 0x10000000
19,266,220 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
2,066,330 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,223,176 >>> mbox cmd response: success
19,458,970 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,473,869 UART:
19,474,217 UART: Running Caliptra FMC ...
19,475,394 UART:
19,475,560 UART: [fmc] Received command: 0x10000000
19,477,892 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,376 UART: [kat] SHA2-512-ACC
906,277 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,181,675 UART: [idev] Erasing UDS.KEYID = 0
1,199,131 UART: [idev] Sha1 KeyId Algorithm
1,208,183 UART: [idev] --
1,209,186 UART: [ldev] ++
1,209,354 UART: [ldev] CDI.KEYID = 6
1,209,718 UART: [ldev] SUBJECT.KEYID = 5
1,210,145 UART: [ldev] AUTHORITY.KEYID = 7
1,210,608 UART: [ldev] FE.KEYID = 1
1,216,128 UART: [ldev] Erasing FE.KEYID = 1
1,242,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,690 UART: [ldev] --
1,282,112 UART: [fwproc] Wait for Commands...
1,282,687 UART: [fwproc] Recv command 0x46574c44
1,283,420 UART: [fwproc] Recv'd Img size: 112032 bytes
3,098,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,126,371 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,152,056 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,288,092 >>> mbox cmd response: success
3,289,117 UART: [afmc] ++
3,289,285 UART: [afmc] CDI.KEYID = 6
3,289,648 UART: [afmc] SUBJECT.KEYID = 7
3,290,074 UART: [afmc] AUTHORITY.KEYID = 5
3,325,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,341,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,342,238 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,347,932 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,353,832 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,359,541 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,367,311 UART: [afmc] --
3,368,323 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,368,345 UART: [cold-reset] --
3,369,249 UART: [state] Locking Datavault
3,370,498 UART: [state] Locking PCR0, PCR1 and PCR31
3,371,102 UART: [state] Locking ICCM
3,371,586 UART: [exit] Launching FMC @ 0x40000000
3,376,883 UART:
3,376,899 UART: Running Caliptra FMC ...
3,377,307 UART:
3,377,537 UART: [fmc] Received command: 0x10000000
3,379,706 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,145,662 >>> mbox cmd response: success
3,201,647 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,207,982 UART:
3,207,998 UART: Running Caliptra FMC ...
3,208,406 UART:
3,208,636 UART: [fmc] Received command: 0x10000000
3,210,805 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,699 UART: [kat] LMS
1,169,011 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,296 UART: [fht] FHT @ 0x50003400
1,172,972 UART: [idev] ++
1,173,140 UART: [idev] CDI.KEYID = 6
1,173,501 UART: [idev] SUBJECT.KEYID = 7
1,173,926 UART: [idev] UDS.KEYID = 0
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,198,998 UART: [idev] Sha1 KeyId Algorithm
1,207,766 UART: [idev] --
1,208,611 UART: [ldev] ++
1,208,779 UART: [ldev] CDI.KEYID = 6
1,209,143 UART: [ldev] SUBJECT.KEYID = 5
1,209,570 UART: [ldev] AUTHORITY.KEYID = 7
1,210,033 UART: [ldev] FE.KEYID = 1
1,214,965 UART: [ldev] Erasing FE.KEYID = 1
1,241,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,237 UART: [ldev] --
1,280,521 UART: [fwproc] Wait for Commands...
1,281,104 UART: [fwproc] Recv command 0x46574c44
1,281,837 UART: [fwproc] Recv'd Img size: 112032 bytes
3,102,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,130,288 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,155,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,291,999 >>> mbox cmd response: success
3,293,188 UART: [afmc] ++
3,293,356 UART: [afmc] CDI.KEYID = 6
3,293,719 UART: [afmc] SUBJECT.KEYID = 7
3,294,145 UART: [afmc] AUTHORITY.KEYID = 5
3,329,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,346,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,347,409 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,353,103 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,359,003 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,364,712 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,372,622 UART: [afmc] --
3,373,652 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,373,674 UART: [cold-reset] --
3,374,412 UART: [state] Locking Datavault
3,375,639 UART: [state] Locking PCR0, PCR1 and PCR31
3,376,243 UART: [state] Locking ICCM
3,376,767 UART: [exit] Launching FMC @ 0x40000000
3,382,064 UART:
3,382,080 UART: Running Caliptra FMC ...
3,382,488 UART:
3,382,718 UART: [fmc] Received command: 0x10000000
3,384,887 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,138,937 >>> mbox cmd response: success
3,195,528 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,201,521 UART:
3,201,537 UART: Running Caliptra FMC ...
3,201,945 UART:
3,202,175 UART: [fmc] Received command: 0x10000000
3,204,344 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,716 UART: [kat] HMAC-384Kdf
920,274 UART: [kat] LMS
1,168,586 UART: [kat] --
1,169,441 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,181,017 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,331 UART: [idev] --
1,208,262 UART: [ldev] ++
1,208,430 UART: [ldev] CDI.KEYID = 6
1,208,794 UART: [ldev] SUBJECT.KEYID = 5
1,209,221 UART: [ldev] AUTHORITY.KEYID = 7
1,209,684 UART: [ldev] FE.KEYID = 1
1,214,842 UART: [ldev] Erasing FE.KEYID = 1
1,241,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,856 UART: [ldev] --
1,281,298 UART: [fwproc] Wait for Commands...
1,281,911 UART: [fwproc] Recv command 0x46574c44
1,282,644 UART: [fwproc] Recv'd Img size: 112032 bytes
3,107,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,134,397 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,160,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,296,018 >>> mbox cmd response: success
3,297,115 UART: [afmc] ++
3,297,283 UART: [afmc] CDI.KEYID = 6
3,297,646 UART: [afmc] SUBJECT.KEYID = 7
3,298,072 UART: [afmc] AUTHORITY.KEYID = 5
3,334,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,350,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,351,488 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,357,182 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,363,082 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,368,791 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,376,549 UART: [afmc] --
3,377,475 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,377,497 UART: [cold-reset] --
3,378,261 UART: [state] Locking Datavault
3,379,298 UART: [state] Locking PCR0, PCR1 and PCR31
3,379,902 UART: [state] Locking ICCM
3,380,392 UART: [exit] Launching FMC @ 0x40000000
3,385,689 UART:
3,385,705 UART: Running Caliptra FMC ...
3,386,113 UART:
3,386,343 UART: [fmc] Received command: 0x10000000
3,388,512 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,145,692 >>> mbox cmd response: success
3,201,849 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,208,110 UART:
3,208,126 UART: Running Caliptra FMC ...
3,208,534 UART:
3,208,764 UART: [fmc] Received command: 0x10000000
3,210,933 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,285 UART: [kat] SHA2-256
891,835 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,964 UART: [kat] ++
896,116 UART: [kat] sha1
900,276 UART: [kat] SHA2-256
902,216 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,689 UART: [kat] HMAC-384Kdf
921,437 UART: [kat] LMS
1,169,749 UART: [kat] --
1,170,450 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,546 UART: [idev] ++
1,173,714 UART: [idev] CDI.KEYID = 6
1,174,075 UART: [idev] SUBJECT.KEYID = 7
1,174,500 UART: [idev] UDS.KEYID = 0
1,182,866 UART: [idev] Erasing UDS.KEYID = 0
1,200,012 UART: [idev] Sha1 KeyId Algorithm
1,208,800 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,361 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,601 UART: [ldev] Erasing FE.KEYID = 1
1,242,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,619 UART: [fwproc] Recv'd Img size: 112032 bytes
3,090,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,118,599 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,280,250 >>> mbox cmd response: success
3,281,397 UART: [afmc] ++
3,281,565 UART: [afmc] CDI.KEYID = 6
3,281,928 UART: [afmc] SUBJECT.KEYID = 7
3,282,354 UART: [afmc] AUTHORITY.KEYID = 5
3,318,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,334,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,536 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,341,230 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,347,130 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,352,839 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,360,845 UART: [afmc] --
3,361,801 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,361,823 UART: [cold-reset] --
3,362,685 UART: [state] Locking Datavault
3,363,544 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,148 UART: [state] Locking ICCM
3,364,576 UART: [exit] Launching FMC @ 0x40000000
3,369,873 UART:
3,369,889 UART: Running Caliptra FMC ...
3,370,297 UART:
3,370,527 UART: [fmc] Received command: 0x10000000
3,372,696 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,144,826 >>> mbox cmd response: success
3,201,037 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,206,790 UART:
3,206,806 UART: Running Caliptra FMC ...
3,207,214 UART:
3,207,444 UART: [fmc] Received command: 0x10000000
3,209,613 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,170,005 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,203 UART: [idev] ++
1,173,371 UART: [idev] CDI.KEYID = 6
1,173,732 UART: [idev] SUBJECT.KEYID = 7
1,174,157 UART: [idev] UDS.KEYID = 0
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,198,267 UART: [idev] Sha1 KeyId Algorithm
1,207,041 UART: [idev] --
1,208,084 UART: [ldev] ++
1,208,252 UART: [ldev] CDI.KEYID = 6
1,208,616 UART: [ldev] SUBJECT.KEYID = 5
1,209,043 UART: [ldev] AUTHORITY.KEYID = 7
1,209,506 UART: [ldev] FE.KEYID = 1
1,214,684 UART: [ldev] Erasing FE.KEYID = 1
1,241,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,662 UART: [ldev] --
1,280,928 UART: [fwproc] Wait for Commands...
1,281,549 UART: [fwproc] Recv command 0x46574c44
1,282,282 UART: [fwproc] Recv'd Img size: 112032 bytes
3,092,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,120,277 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,145,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,281,870 >>> mbox cmd response: success
3,283,011 UART: [afmc] ++
3,283,179 UART: [afmc] CDI.KEYID = 6
3,283,542 UART: [afmc] SUBJECT.KEYID = 7
3,283,968 UART: [afmc] AUTHORITY.KEYID = 5
3,319,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,335,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,336,348 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,342,042 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,347,942 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,353,651 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,361,465 UART: [afmc] --
3,362,517 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,362,539 UART: [cold-reset] --
3,363,397 UART: [state] Locking Datavault
3,364,296 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,900 UART: [state] Locking ICCM
3,365,346 UART: [exit] Launching FMC @ 0x40000000
3,370,643 UART:
3,370,659 UART: Running Caliptra FMC ...
3,371,067 UART:
3,371,297 UART: [fmc] Received command: 0x10000000
3,373,466 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,132,838 >>> mbox cmd response: success
3,189,413 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,195,514 UART:
3,195,530 UART: Running Caliptra FMC ...
3,195,938 UART:
3,196,168 UART: [fmc] Received command: 0x10000000
3,198,337 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
899,992 UART: [kat] SHA2-256
901,932 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,615 UART: [kat] LMS
1,168,927 UART: [kat] --
1,169,676 UART: [cold-reset] ++
1,170,152 UART: [fht] FHT @ 0x50003400
1,172,868 UART: [idev] ++
1,173,036 UART: [idev] CDI.KEYID = 6
1,173,397 UART: [idev] SUBJECT.KEYID = 7
1,173,822 UART: [idev] UDS.KEYID = 0
1,182,194 UART: [idev] Erasing UDS.KEYID = 0
1,199,422 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,241,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,515 UART: [ldev] --
1,280,923 UART: [fwproc] Wait for Commands...
1,281,578 UART: [fwproc] Recv command 0x46574c44
1,282,311 UART: [fwproc] Recv'd Img size: 112032 bytes
3,097,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,125,220 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,150,905 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,286,809 >>> mbox cmd response: success
3,287,950 UART: [afmc] ++
3,288,118 UART: [afmc] CDI.KEYID = 6
3,288,481 UART: [afmc] SUBJECT.KEYID = 7
3,288,907 UART: [afmc] AUTHORITY.KEYID = 5
3,324,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,340,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,341,499 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,347,193 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,353,093 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,358,802 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,366,582 UART: [afmc] --
3,367,544 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,367,566 UART: [cold-reset] --
3,368,330 UART: [state] Locking Datavault
3,369,287 UART: [state] Locking PCR0, PCR1 and PCR31
3,369,891 UART: [state] Locking ICCM
3,370,499 UART: [exit] Launching FMC @ 0x40000000
3,375,796 UART:
3,375,812 UART: Running Caliptra FMC ...
3,376,220 UART:
3,376,450 UART: [fmc] Received command: 0x10000000
3,378,619 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,144,417 >>> mbox cmd response: success
3,199,914 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,206,001 UART:
3,206,017 UART: Running Caliptra FMC ...
3,206,425 UART:
3,206,655 UART: [fmc] Received command: 0x10000000
3,208,824 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,055,610 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,196,844 UART:
2,197,258 UART: Running Caliptra ROM ...
2,198,421 UART:
2,198,591 UART: [state] CFI Enabled
2,199,572 UART: [state] LifecycleState = Unprovisioned
2,201,216 UART: [state] DebugLocked = No
2,202,320 UART: [state] WD Timer not started. Device not locked for debugging
2,205,002 UART: [kat] SHA2-256
2,205,683 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,699 UART: [kat] ++
2,209,171 UART: [kat] sha1
2,209,772 UART: [kat] SHA2-256
2,210,439 UART: [kat] SHA2-384
2,211,098 UART: [kat] SHA2-512-ACC
2,211,982 UART: [kat] ECC-384
3,780,069 UART: [kat] HMAC-384Kdf
3,803,230 UART: [kat] LMS
4,876,392 UART: [kat] --
4,880,785 UART: [cold-reset] ++
4,882,616 UART: [fht] FHT @ 0x50003400
4,893,056 UART: [idev] ++
4,893,794 UART: [idev] CDI.KEYID = 6
4,894,972 UART: [idev] SUBJECT.KEYID = 7
4,896,128 UART: [idev] UDS.KEYID = 0
4,930,840 UART: [idev] Erasing UDS.KEYID = 0
8,242,885 UART: [idev] Sha1 KeyId Algorithm
8,266,513 UART: [idev] --
8,270,455 UART: [ldev] ++
8,271,024 UART: [ldev] CDI.KEYID = 6
8,272,265 UART: [ldev] SUBJECT.KEYID = 5
8,273,419 UART: [ldev] AUTHORITY.KEYID = 7
8,274,644 UART: [ldev] FE.KEYID = 1
8,318,140 UART: [ldev] Erasing FE.KEYID = 1
11,651,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,541 UART: [ldev] --
14,036,100 UART: [fwproc] Wait for Commands...
14,037,605 UART: [fwproc] Recv command 0x46574c44
14,039,927 UART: [fwproc] Recv'd Img size: 111688 bytes
18,085,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,165,182 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,225,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,542,109 >>> mbox cmd response: success
18,546,691 UART: [afmc] ++
18,547,281 UART: [afmc] CDI.KEYID = 6
18,548,466 UART: [afmc] SUBJECT.KEYID = 7
18,549,619 UART: [afmc] AUTHORITY.KEYID = 5
21,926,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,239,202 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,241,509 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
24,257,542 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
24,273,572 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
24,289,681 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
24,312,342 UART: [afmc] --
24,315,194 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,315,586 UART: [cold-reset] --
24,320,103 UART: [state] Locking Datavault
24,324,226 UART: [state] Locking PCR0, PCR1 and PCR31
24,325,920 UART: [state] Locking ICCM
24,328,395 UART: [exit] Launching FMC @ 0x40000000
24,337,060 UART:
24,337,293 UART: Running Caliptra FMC ...
24,338,392 UART:
24,338,552 UART: [fmc] Received command: 0x10000000
24,340,980 >>> mbox cmd response data (224 bytes)
24,342,456 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,342,866 UART: [fmc] Received command: 0x10000006
24,364,105 >>> mbox cmd response data (1536 bytes)
24,375,078 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,515,415 UART: [fmc] Received command: 0x46574C44
24,516,958 UART:
24,517,145 UART: Running Caliptra ROM ...
24,518,246 UART:
24,518,399 UART: [state] CFI Enabled
24,575,818 UART: [state] LifecycleState = Unprovisioned
24,577,694 UART: [state] DebugLocked = No
24,580,322 UART: [state] WD Timer not started. Device not locked for debugging
24,584,570 UART: [kat] SHA2-256
24,766,461 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,777,980 UART: [kat] ++
24,778,523 UART: [kat] sha1
24,788,924 UART: [kat] SHA2-256
24,791,940 UART: [kat] SHA2-384
24,799,170 UART: [kat] SHA2-512-ACC
24,801,738 UART: [kat] ECC-384
28,086,927 UART: [kat] HMAC-384Kdf
28,113,320 UART: [kat] LMS
29,186,478 UART: [kat] --
29,192,704 UART: [update-reset] ++
33,262,608 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
33,265,223 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,638,851 >>> mbox cmd response: success
33,640,068 UART: [update-reset] Copying MAN_2 To MAN_1
33,662,909 UART: [update-reset Success] --
33,664,597 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,668,285 UART: [state] Locking Datavault
33,671,875 UART: [state] Locking PCR0, PCR1 and PCR31
33,673,575 UART: [state] Locking ICCM
33,675,191 UART: [exit] Launching FMC @ 0x40000000
33,683,815 UART:
33,684,050 UART: Running Caliptra FMC ...
33,685,076 UART:
33,685,224 UART: [fmc] Received command: 0x10000000
33,687,782 >>> mbox cmd response data (224 bytes)
33,689,136 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,689,553 UART: [fmc] Received command: 0x10000006
33,710,825 >>> mbox cmd response data (1536 bytes)
33,719,181 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,719,634 UART: [fmc] Received command: 0x10000007
33,721,172 >>> mbox cmd response data (4 bytes)
33,721,488 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,721,812 UART: [fmc] Received command: 0x10000006
33,743,022 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,055,150 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,347,799 >>> mbox cmd response: success
24,019,723 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,034,312 UART:
24,034,667 UART: Running Caliptra FMC ...
24,035,848 UART:
24,036,021 UART: [fmc] Received command: 0x10000000
24,038,248 >>> mbox cmd response data (224 bytes)
24,039,675 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,040,091 UART: [fmc] Received command: 0x10000006
24,061,309 >>> mbox cmd response data (1536 bytes)
24,071,522 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,212,014 UART: [fmc] Received command: 0x46574C44
33,214,720 >>> mbox cmd response: success
33,236,104 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,249,948 UART:
33,250,237 UART: Running Caliptra FMC ...
33,251,371 UART:
33,251,540 UART: [fmc] Received command: 0x10000000
33,253,838 >>> mbox cmd response data (224 bytes)
33,255,194 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,255,608 UART: [fmc] Received command: 0x10000006
33,276,862 >>> mbox cmd response data (1536 bytes)
33,285,060 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,285,513 UART: [fmc] Received command: 0x10000007
33,287,110 >>> mbox cmd response data (4 bytes)
33,287,431 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,287,752 UART: [fmc] Received command: 0x10000006
33,308,997 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,060,061 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,201,432 UART:
2,201,840 UART: Running Caliptra ROM ...
2,202,919 UART:
2,203,066 UART: [state] CFI Enabled
2,203,984 UART: [state] LifecycleState = Unprovisioned
2,205,625 UART: [state] DebugLocked = No
2,206,734 UART: [state] WD Timer not started. Device not locked for debugging
2,209,205 UART: [kat] SHA2-256
2,209,864 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,888 UART: [kat] ++
2,213,336 UART: [kat] sha1
2,213,847 UART: [kat] SHA2-256
2,214,581 UART: [kat] SHA2-384
2,215,244 UART: [kat] SHA2-512-ACC
2,216,065 UART: [kat] ECC-384
4,100,016 UART: [kat] HMAC-384Kdf
4,113,268 UART: [kat] LMS
5,186,414 UART: [kat] --
5,192,088 UART: [cold-reset] ++
5,194,189 UART: [fht] FHT @ 0x50003400
5,206,462 UART: [idev] ++
5,207,138 UART: [idev] CDI.KEYID = 6
5,208,295 UART: [idev] SUBJECT.KEYID = 7
5,209,770 UART: [idev] UDS.KEYID = 0
5,225,662 UART: [idev] Erasing UDS.KEYID = 0
8,500,160 UART: [idev] Sha1 KeyId Algorithm
8,521,559 UART: [idev] --
8,524,729 UART: [ldev] ++
8,525,361 UART: [ldev] CDI.KEYID = 6
8,526,541 UART: [ldev] SUBJECT.KEYID = 5
8,527,969 UART: [ldev] AUTHORITY.KEYID = 7
8,529,576 UART: [ldev] FE.KEYID = 1
8,540,114 UART: [ldev] Erasing FE.KEYID = 1
11,831,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,469 UART: [ldev] --
14,198,689 UART: [fwproc] Wait for Commands...
14,201,007 UART: [fwproc] Recv command 0x46574c44
14,203,343 UART: [fwproc] Recv'd Img size: 111688 bytes
18,246,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,314,406 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,374,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,691,324 >>> mbox cmd response: success
18,695,485 UART: [afmc] ++
18,696,077 UART: [afmc] CDI.KEYID = 6
18,697,260 UART: [afmc] SUBJECT.KEYID = 7
18,698,414 UART: [afmc] AUTHORITY.KEYID = 5
22,013,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,307,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,309,564 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
24,325,533 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
24,341,608 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
24,357,716 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
24,381,844 UART: [afmc] --
24,385,081 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,385,452 UART: [cold-reset] --
24,390,369 UART: [state] Locking Datavault
24,396,920 UART: [state] Locking PCR0, PCR1 and PCR31
24,398,561 UART: [state] Locking ICCM
24,401,355 UART: [exit] Launching FMC @ 0x40000000
24,410,020 UART:
24,410,249 UART: Running Caliptra FMC ...
24,411,342 UART:
24,411,495 UART: [fmc] Received command: 0x10000000
24,413,945 >>> mbox cmd response data (224 bytes)
24,415,419 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,415,821 UART: [fmc] Received command: 0x10000006
24,437,066 >>> mbox cmd response data (1536 bytes)
24,447,745 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,588,243 UART: [fmc] Received command: 0x46574C44
24,589,808 UART:
24,589,976 UART: Running Caliptra ROM ...
24,591,076 UART:
24,591,392 UART: [state] CFI Enabled
24,604,242 UART: [state] LifecycleState = Unprovisioned
24,606,073 UART: [state] DebugLocked = No
24,607,282 UART: [state] WD Timer not started. Device not locked for debugging
24,610,368 UART: [kat] SHA2-256
24,792,313 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,803,865 UART: [kat] ++
24,804,344 UART: [kat] sha1
24,814,254 UART: [kat] SHA2-256
24,817,269 UART: [kat] SHA2-384
24,824,379 UART: [kat] SHA2-512-ACC
24,826,941 UART: [kat] ECC-384
28,084,648 UART: [kat] HMAC-384Kdf
28,095,672 UART: [kat] LMS
29,168,835 UART: [kat] --
29,174,847 UART: [update-reset] ++
33,238,764 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
33,241,711 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,615,323 >>> mbox cmd response: success
33,617,253 UART: [update-reset] Copying MAN_2 To MAN_1
33,640,142 UART: [update-reset Success] --
33,641,775 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,643,836 UART: [state] Locking Datavault
33,647,417 UART: [state] Locking PCR0, PCR1 and PCR31
33,649,054 UART: [state] Locking ICCM
33,652,122 UART: [exit] Launching FMC @ 0x40000000
33,660,735 UART:
33,660,967 UART: Running Caliptra FMC ...
33,662,065 UART:
33,662,237 UART: [fmc] Received command: 0x10000000
33,664,718 >>> mbox cmd response data (224 bytes)
33,666,144 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,666,550 UART: [fmc] Received command: 0x10000006
33,687,780 >>> mbox cmd response data (1536 bytes)
33,696,078 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,696,522 UART: [fmc] Received command: 0x10000007
33,698,053 >>> mbox cmd response data (4 bytes)
33,698,367 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,698,673 UART: [fmc] Received command: 0x10000006
33,719,887 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,059,419 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,476,824 >>> mbox cmd response: success
24,098,005 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,113,575 UART:
24,113,929 UART: Running Caliptra FMC ...
24,115,046 UART:
24,115,203 UART: [fmc] Received command: 0x10000000
24,117,536 >>> mbox cmd response data (224 bytes)
24,119,018 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,119,431 UART: [fmc] Received command: 0x10000006
24,140,654 >>> mbox cmd response data (1536 bytes)
24,150,866 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,291,337 UART: [fmc] Received command: 0x46574C44
33,214,542 >>> mbox cmd response: success
33,235,539 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,248,735 UART:
33,249,017 UART: Running Caliptra FMC ...
33,250,146 UART:
33,250,311 UART: [fmc] Received command: 0x10000000
33,252,633 >>> mbox cmd response data (224 bytes)
33,254,049 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,254,457 UART: [fmc] Received command: 0x10000006
33,275,693 >>> mbox cmd response data (1536 bytes)
33,283,971 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,284,419 UART: [fmc] Received command: 0x10000007
33,286,008 >>> mbox cmd response data (4 bytes)
33,286,346 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,286,661 UART: [fmc] Received command: 0x10000006
33,307,898 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
2,054,805 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,196,649 UART:
2,197,114 UART: Running Caliptra ROM ...
2,198,202 UART:
2,198,362 UART: [state] CFI Enabled
2,199,293 UART: [state] LifecycleState = Unprovisioned
2,200,845 UART: [state] DebugLocked = No
2,201,891 UART: [state] WD Timer not started. Device not locked for debugging
2,204,371 UART: [kat] SHA2-256
2,205,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,208,059 UART: [kat] ++
2,208,509 UART: [kat] sha1
2,209,020 UART: [kat] SHA2-256
2,209,678 UART: [kat] SHA2-384
2,210,334 UART: [kat] SHA2-512-ACC
2,211,248 UART: [kat] ECC-384
2,950,139 UART: [kat] HMAC-384Kdf
2,972,136 UART: [kat] LMS
3,501,591 UART: [kat] --
3,506,562 UART: [cold-reset] ++
3,507,842 UART: [fht] FHT @ 0x50003400
3,519,081 UART: [idev] ++
3,519,670 UART: [idev] CDI.KEYID = 6
3,520,579 UART: [idev] SUBJECT.KEYID = 7
3,521,800 UART: [idev] UDS.KEYID = 0
3,543,228 UART: [idev] Erasing UDS.KEYID = 0
6,025,677 UART: [idev] Sha1 KeyId Algorithm
6,047,842 UART: [idev] --
6,051,370 UART: [ldev] ++
6,051,947 UART: [ldev] CDI.KEYID = 6
6,052,836 UART: [ldev] SUBJECT.KEYID = 5
6,054,075 UART: [ldev] AUTHORITY.KEYID = 7
6,055,325 UART: [ldev] FE.KEYID = 1
6,100,096 UART: [ldev] Erasing FE.KEYID = 1
8,600,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,264 UART: [ldev] --
10,390,892 UART: [fwproc] Wait for Commands...
10,392,598 UART: [fwproc] Recv command 0x46574c44
10,394,712 UART: [fwproc] Recv'd Img size: 112032 bytes
13,762,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,833,980 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,894,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,213,085 >>> mbox cmd response: success
14,217,121 UART: [afmc] ++
14,217,717 UART: [afmc] CDI.KEYID = 6
14,218,598 UART: [afmc] SUBJECT.KEYID = 7
14,219,752 UART: [afmc] AUTHORITY.KEYID = 5
16,743,419 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,467,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,469,812 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,485,771 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,501,655 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,517,593 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,540,100 UART: [afmc] --
18,543,699 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,544,074 UART: [cold-reset] --
18,548,403 UART: [state] Locking Datavault
18,551,585 UART: [state] Locking PCR0, PCR1 and PCR31
18,553,244 UART: [state] Locking ICCM
18,555,498 UART: [exit] Launching FMC @ 0x40000000
18,563,904 UART:
18,564,137 UART: Running Caliptra FMC ...
18,565,159 UART:
18,565,305 UART: [fmc] Received command: 0x10000000
18,567,820 >>> mbox cmd response data (224 bytes)
18,569,325 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,569,650 UART: [fmc] Received command: 0x10000006
18,590,897 >>> mbox cmd response data (1536 bytes)
18,601,535 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,742,455 UART: [fmc] Received command: 0x46574C44
18,744,011 UART:
18,744,183 UART: Running Caliptra ROM ...
18,745,201 UART:
18,745,347 UART: [state] CFI Enabled
18,802,234 UART: [state] LifecycleState = Unprovisioned
18,804,135 UART: [state] DebugLocked = No
18,806,788 UART: [state] WD Timer not started. Device not locked for debugging
18,810,906 UART: [kat] SHA2-256
18,990,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,001,641 UART: [kat] ++
19,002,105 UART: [kat] sha1
19,014,560 UART: [kat] SHA2-256
19,017,583 UART: [kat] SHA2-384
19,023,632 UART: [kat] SHA2-512-ACC
19,026,581 UART: [kat] ECC-384
21,487,405 UART: [kat] HMAC-384Kdf
21,509,616 UART: [kat] LMS
22,039,090 UART: [kat] --
22,042,485 UART: [update-reset] ++
25,440,710 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,444,316 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,819,200 >>> mbox cmd response: success
25,820,531 UART: [update-reset] Copying MAN_2 To MAN_1
25,842,868 UART: [update-reset Success] --
25,844,166 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,846,981 UART: [state] Locking Datavault
25,849,537 UART: [state] Locking PCR0, PCR1 and PCR31
25,851,189 UART: [state] Locking ICCM
25,852,525 UART: [exit] Launching FMC @ 0x40000000
25,860,927 UART:
25,861,164 UART: Running Caliptra FMC ...
25,862,264 UART:
25,862,419 UART: [fmc] Received command: 0x10000000
25,864,855 >>> mbox cmd response data (224 bytes)
25,866,268 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,866,673 UART: [fmc] Received command: 0x10000006
25,887,913 >>> mbox cmd response data (1536 bytes)
25,896,219 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,896,682 UART: [fmc] Received command: 0x10000007
25,898,221 >>> mbox cmd response data (4 bytes)
25,898,540 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,898,849 UART: [fmc] Received command: 0x10000006
25,920,063 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
2,054,615 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,022,227 >>> mbox cmd response: success
18,306,283 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,321,690 UART:
18,322,043 UART: Running Caliptra FMC ...
18,323,234 UART:
18,323,406 UART: [fmc] Received command: 0x10000000
18,325,749 >>> mbox cmd response data (224 bytes)
18,327,234 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,327,645 UART: [fmc] Received command: 0x10000006
18,348,889 >>> mbox cmd response data (1536 bytes)
18,359,191 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,500,094 UART: [fmc] Received command: 0x46574C44
25,429,105 >>> mbox cmd response: success
25,450,558 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,465,903 UART:
25,466,158 UART: Running Caliptra FMC ...
25,467,269 UART:
25,467,451 UART: [fmc] Received command: 0x10000000
25,469,902 >>> mbox cmd response data (224 bytes)
25,471,312 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,471,727 UART: [fmc] Received command: 0x10000006
25,493,022 >>> mbox cmd response data (1536 bytes)
25,501,233 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,501,681 UART: [fmc] Received command: 0x10000007
25,503,276 >>> mbox cmd response data (4 bytes)
25,503,591 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,503,900 UART: [fmc] Received command: 0x10000006
25,525,097 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
2,059,377 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,201,215 UART:
2,201,616 UART: Running Caliptra ROM ...
2,202,701 UART:
2,202,852 UART: [state] CFI Enabled
2,203,848 UART: [state] LifecycleState = Unprovisioned
2,205,495 UART: [state] DebugLocked = No
2,206,518 UART: [state] WD Timer not started. Device not locked for debugging
2,208,987 UART: [kat] SHA2-256
2,209,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,656 UART: [kat] ++
2,213,102 UART: [kat] sha1
2,213,610 UART: [kat] SHA2-256
2,214,268 UART: [kat] SHA2-384
2,215,037 UART: [kat] SHA2-512-ACC
2,215,889 UART: [kat] ECC-384
3,277,322 UART: [kat] HMAC-384Kdf
3,290,093 UART: [kat] LMS
3,819,561 UART: [kat] --
3,825,062 UART: [cold-reset] ++
3,826,185 UART: [fht] FHT @ 0x50003400
3,837,536 UART: [idev] ++
3,838,105 UART: [idev] CDI.KEYID = 6
3,839,063 UART: [idev] SUBJECT.KEYID = 7
3,840,224 UART: [idev] UDS.KEYID = 0
3,858,949 UART: [idev] Erasing UDS.KEYID = 0
6,315,989 UART: [idev] Sha1 KeyId Algorithm
6,338,306 UART: [idev] --
6,341,168 UART: [ldev] ++
6,341,735 UART: [ldev] CDI.KEYID = 6
6,342,830 UART: [ldev] SUBJECT.KEYID = 5
6,343,955 UART: [ldev] AUTHORITY.KEYID = 7
6,345,133 UART: [ldev] FE.KEYID = 1
6,356,532 UART: [ldev] Erasing FE.KEYID = 1
8,834,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,882 UART: [ldev] --
10,626,141 UART: [fwproc] Wait for Commands...
10,628,674 UART: [fwproc] Recv command 0x46574c44
10,630,767 UART: [fwproc] Recv'd Img size: 112032 bytes
14,006,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,079,970 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,140,306 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,459,313 >>> mbox cmd response: success
14,462,775 UART: [afmc] ++
14,463,358 UART: [afmc] CDI.KEYID = 6
14,464,242 UART: [afmc] SUBJECT.KEYID = 7
14,465,451 UART: [afmc] AUTHORITY.KEYID = 5
16,966,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,686,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,688,305 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,704,226 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,720,111 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,736,068 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,759,189 UART: [afmc] --
18,762,312 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,762,684 UART: [cold-reset] --
18,763,989 UART: [state] Locking Datavault
18,768,370 UART: [state] Locking PCR0, PCR1 and PCR31
18,770,088 UART: [state] Locking ICCM
18,772,080 UART: [exit] Launching FMC @ 0x40000000
18,780,421 UART:
18,780,651 UART: Running Caliptra FMC ...
18,781,746 UART:
18,781,897 UART: [fmc] Received command: 0x10000000
18,784,375 >>> mbox cmd response data (224 bytes)
18,785,848 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,786,259 UART: [fmc] Received command: 0x10000006
18,807,553 >>> mbox cmd response data (1536 bytes)
18,818,043 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,958,924 UART: [fmc] Received command: 0x46574C44
18,960,466 UART:
18,960,644 UART: Running Caliptra ROM ...
18,961,746 UART:
18,962,007 UART: [state] CFI Enabled
18,980,445 UART: [state] LifecycleState = Unprovisioned
18,982,279 UART: [state] DebugLocked = No
18,985,218 UART: [state] WD Timer not started. Device not locked for debugging
18,989,026 UART: [kat] SHA2-256
19,168,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,179,811 UART: [kat] ++
19,180,343 UART: [kat] sha1
19,191,501 UART: [kat] SHA2-256
19,194,566 UART: [kat] SHA2-384
19,200,164 UART: [kat] SHA2-512-ACC
19,203,151 UART: [kat] ECC-384
21,645,467 UART: [kat] HMAC-384Kdf
21,657,368 UART: [kat] LMS
22,186,847 UART: [kat] --
22,190,964 UART: [update-reset] ++
25,584,486 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,587,064 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,961,821 >>> mbox cmd response: success
25,962,865 UART: [update-reset] Copying MAN_2 To MAN_1
25,985,199 UART: [update-reset Success] --
25,986,459 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,988,244 UART: [state] Locking Datavault
25,991,872 UART: [state] Locking PCR0, PCR1 and PCR31
25,993,565 UART: [state] Locking ICCM
25,994,604 UART: [exit] Launching FMC @ 0x40000000
26,002,999 UART:
26,003,242 UART: Running Caliptra FMC ...
26,004,345 UART:
26,004,505 UART: [fmc] Received command: 0x10000000
26,006,938 >>> mbox cmd response data (224 bytes)
26,008,355 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,008,770 UART: [fmc] Received command: 0x10000006
26,030,044 >>> mbox cmd response data (1536 bytes)
26,038,333 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,038,795 UART: [fmc] Received command: 0x10000007
26,040,349 >>> mbox cmd response data (4 bytes)
26,040,676 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,040,997 UART: [fmc] Received command: 0x10000006
26,062,247 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,061,430 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,241,625 >>> mbox cmd response: success
18,480,938 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,496,044 UART:
18,496,421 UART: Running Caliptra FMC ...
18,497,616 UART:
18,497,783 UART: [fmc] Received command: 0x10000000
18,500,059 >>> mbox cmd response data (224 bytes)
18,501,500 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,501,913 UART: [fmc] Received command: 0x10000006
18,523,205 >>> mbox cmd response data (1536 bytes)
18,533,468 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,674,345 UART: [fmc] Received command: 0x46574C44
25,536,596 >>> mbox cmd response: success
25,558,517 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,570,414 UART:
25,570,706 UART: Running Caliptra FMC ...
25,571,751 UART:
25,571,900 UART: [fmc] Received command: 0x10000000
25,574,416 >>> mbox cmd response data (224 bytes)
25,575,757 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,576,082 UART: [fmc] Received command: 0x10000006
25,597,379 >>> mbox cmd response data (1536 bytes)
25,605,685 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,606,133 UART: [fmc] Received command: 0x10000007
25,607,964 >>> mbox cmd response data (4 bytes)
25,608,296 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,608,614 UART: [fmc] Received command: 0x10000006
25,629,817 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
2,057,838 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,025,609 >>> mbox cmd response: success
18,305,371 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,317,667 UART:
18,318,017 UART: Running Caliptra FMC ...
18,319,185 UART:
18,319,365 UART: [fmc] Received command: 0x10000000
18,321,686 >>> mbox cmd response data (224 bytes)
18,323,167 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,323,576 UART: [fmc] Received command: 0x10000006
18,344,854 >>> mbox cmd response data (1536 bytes)
18,354,950 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,495,871 UART: [fmc] Received command: 0x46574C44
25,451,367 >>> mbox cmd response: success
25,473,257 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,484,777 UART:
25,485,053 UART: Running Caliptra FMC ...
25,486,182 UART:
25,486,348 UART: [fmc] Received command: 0x10000000
25,488,734 >>> mbox cmd response data (224 bytes)
25,490,186 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,490,595 UART: [fmc] Received command: 0x10000006
25,511,892 >>> mbox cmd response data (1536 bytes)
25,520,470 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,520,933 UART: [fmc] Received command: 0x10000007
25,522,464 >>> mbox cmd response data (4 bytes)
25,522,774 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,523,084 UART: [fmc] Received command: 0x10000006
25,544,289 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,060,779 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,233,341 >>> mbox cmd response: success
18,464,377 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,478,637 UART:
18,478,981 UART: Running Caliptra FMC ...
18,480,164 UART:
18,480,332 UART: [fmc] Received command: 0x10000000
18,482,677 >>> mbox cmd response data (224 bytes)
18,484,177 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,484,585 UART: [fmc] Received command: 0x10000006
18,505,878 >>> mbox cmd response data (1536 bytes)
18,516,247 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,657,148 UART: [fmc] Received command: 0x46574C44
25,531,043 >>> mbox cmd response: success
25,552,876 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,563,577 UART:
25,563,832 UART: Running Caliptra FMC ...
25,564,957 UART:
25,565,115 UART: [fmc] Received command: 0x10000000
25,567,560 >>> mbox cmd response data (224 bytes)
25,569,122 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,569,562 UART: [fmc] Received command: 0x10000006
25,590,862 >>> mbox cmd response data (1536 bytes)
25,599,111 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,599,573 UART: [fmc] Received command: 0x10000007
25,601,158 >>> mbox cmd response data (4 bytes)
25,601,483 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,601,800 UART: [fmc] Received command: 0x10000006
25,623,039 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,453 UART: [kat] SHA2-256
901,393 UART: [kat] SHA2-384
903,956 UART: [kat] SHA2-512-ACC
905,857 UART: [kat] ECC-384
915,266 UART: [kat] HMAC-384Kdf
919,992 UART: [kat] LMS
1,168,304 UART: [kat] --
1,169,087 UART: [cold-reset] ++
1,169,433 UART: [fht] FHT @ 0x50003400
1,172,137 UART: [idev] ++
1,172,305 UART: [idev] CDI.KEYID = 6
1,172,666 UART: [idev] SUBJECT.KEYID = 7
1,173,091 UART: [idev] UDS.KEYID = 0
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,127 UART: [idev] Sha1 KeyId Algorithm
1,207,113 UART: [idev] --
1,208,250 UART: [ldev] ++
1,208,418 UART: [ldev] CDI.KEYID = 6
1,208,782 UART: [ldev] SUBJECT.KEYID = 5
1,209,209 UART: [ldev] AUTHORITY.KEYID = 7
1,209,672 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,241,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,696 UART: [ldev] --
1,280,140 UART: [fwproc] Wait for Commands...
1,280,737 UART: [fwproc] Recv command 0x46574c44
1,281,470 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,580,926 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,489 >>> mbox cmd response: success
2,743,540 UART: [afmc] ++
2,743,708 UART: [afmc] CDI.KEYID = 6
2,744,071 UART: [afmc] SUBJECT.KEYID = 7
2,744,497 UART: [afmc] AUTHORITY.KEYID = 5
2,779,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,956 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,802,676 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,808,568 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,814,262 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,822,135 UART: [afmc] --
2,823,017 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,823,039 UART: [cold-reset] --
2,823,621 UART: [state] Locking Datavault
2,825,112 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,716 UART: [state] Locking ICCM
2,826,138 UART: [exit] Launching FMC @ 0x40000000
2,831,435 UART:
2,831,451 UART: Running Caliptra FMC ...
2,831,859 UART:
2,832,089 UART: [fmc] Received command: 0x10000000
2,834,258 >>> mbox cmd response data (224 bytes)
2,834,259 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,834,288 UART: [fmc] Received command: 0x10000006
2,852,305 >>> mbox cmd response data (1536 bytes)
2,852,306 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,852,334 UART: [fmc] Received command: 0x46574C44
2,853,160 UART:
2,853,176 UART: Running Caliptra ROM ...
2,853,584 UART:
2,853,639 UART: [state] CFI Enabled
2,856,153 UART: [state] LifecycleState = Unprovisioned
2,856,808 UART: [state] DebugLocked = No
2,857,466 UART: [state] WD Timer not started. Device not locked for debugging
2,858,606 UART: [kat] SHA2-256
3,662,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,666,285 UART: [kat] ++
3,666,437 UART: [kat] sha1
3,670,607 UART: [kat] SHA2-256
3,672,547 UART: [kat] SHA2-384
3,675,276 UART: [kat] SHA2-512-ACC
3,677,176 UART: [kat] ECC-384
3,686,819 UART: [kat] HMAC-384Kdf
3,691,457 UART: [kat] LMS
3,939,769 UART: [kat] --
3,940,849 UART: [update-reset] ++
5,226,310 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,227,297 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,375,483 >>> mbox cmd response: success
5,375,834 UART: [update-reset] Copying MAN_2 To MAN_1
5,383,848 UART: [update-reset Success] --
5,384,257 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,385,019 UART: [state] Locking Datavault
5,385,765 UART: [state] Locking PCR0, PCR1 and PCR31
5,386,369 UART: [state] Locking ICCM
5,386,957 UART: [exit] Launching FMC @ 0x40000000
5,392,254 UART:
5,392,270 UART: Running Caliptra FMC ...
5,392,678 UART:
5,392,900 UART: [fmc] Received command: 0x10000000
5,395,069 >>> mbox cmd response data (224 bytes)
5,395,070 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,395,099 UART: [fmc] Received command: 0x10000006
5,413,116 >>> mbox cmd response data (1536 bytes)
5,413,117 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,413,145 UART: [fmc] Received command: 0x10000007
5,413,937 >>> mbox cmd response data (4 bytes)
5,413,938 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,413,966 UART: [fmc] Received command: 0x10000006
5,431,983 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,061 >>> mbox cmd response: success
2,647,917 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,124 UART:
2,654,140 UART: Running Caliptra FMC ...
2,654,548 UART:
2,654,778 UART: [fmc] Received command: 0x10000000
2,656,947 >>> mbox cmd response data (224 bytes)
2,656,948 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,656,977 UART: [fmc] Received command: 0x10000006
2,674,994 >>> mbox cmd response data (1536 bytes)
2,674,995 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,675,023 UART: [fmc] Received command: 0x46574C44
5,079,469 >>> mbox cmd response: success
5,087,201 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,093,233 UART:
5,093,249 UART: Running Caliptra FMC ...
5,093,657 UART:
5,093,879 UART: [fmc] Received command: 0x10000000
5,096,048 >>> mbox cmd response data (224 bytes)
5,096,049 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,096,078 UART: [fmc] Received command: 0x10000006
5,114,095 >>> mbox cmd response data (1536 bytes)
5,114,096 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,114,124 UART: [fmc] Received command: 0x10000007
5,114,916 >>> mbox cmd response data (4 bytes)
5,114,917 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,114,945 UART: [fmc] Received command: 0x10000006
5,132,962 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,389 UART: [kat] SHA2-512-ACC
906,290 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,170,056 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,696 UART: [idev] Sha1 KeyId Algorithm
1,208,596 UART: [idev] --
1,209,671 UART: [ldev] ++
1,209,839 UART: [ldev] CDI.KEYID = 6
1,210,203 UART: [ldev] SUBJECT.KEYID = 5
1,210,630 UART: [ldev] AUTHORITY.KEYID = 7
1,211,093 UART: [ldev] FE.KEYID = 1
1,216,667 UART: [ldev] Erasing FE.KEYID = 1
1,243,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,281,943 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x46574c44
1,283,313 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,580,985 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,636 >>> mbox cmd response: success
2,743,825 UART: [afmc] ++
2,743,993 UART: [afmc] CDI.KEYID = 6
2,744,356 UART: [afmc] SUBJECT.KEYID = 7
2,744,782 UART: [afmc] AUTHORITY.KEYID = 5
2,780,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,697 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,803,417 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,809,309 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,815,003 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,822,868 UART: [afmc] --
2,823,780 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,823,802 UART: [cold-reset] --
2,824,732 UART: [state] Locking Datavault
2,826,013 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,617 UART: [state] Locking ICCM
2,827,241 UART: [exit] Launching FMC @ 0x40000000
2,832,538 UART:
2,832,554 UART: Running Caliptra FMC ...
2,832,962 UART:
2,833,192 UART: [fmc] Received command: 0x10000000
2,835,361 >>> mbox cmd response data (224 bytes)
2,835,362 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,835,391 UART: [fmc] Received command: 0x10000006
2,853,408 >>> mbox cmd response data (1536 bytes)
2,853,409 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,853,437 UART: [fmc] Received command: 0x46574C44
2,854,263 UART:
2,854,279 UART: Running Caliptra ROM ...
2,854,687 UART:
2,854,829 UART: [state] CFI Enabled
2,857,561 UART: [state] LifecycleState = Unprovisioned
2,858,216 UART: [state] DebugLocked = No
2,858,826 UART: [state] WD Timer not started. Device not locked for debugging
2,859,938 UART: [kat] SHA2-256
3,663,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,667,617 UART: [kat] ++
3,667,769 UART: [kat] sha1
3,672,233 UART: [kat] SHA2-256
3,674,173 UART: [kat] SHA2-384
3,677,024 UART: [kat] SHA2-512-ACC
3,678,924 UART: [kat] ECC-384
3,688,527 UART: [kat] HMAC-384Kdf
3,693,101 UART: [kat] LMS
3,941,413 UART: [kat] --
3,942,229 UART: [update-reset] ++
5,227,674 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,228,757 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,376,943 >>> mbox cmd response: success
5,377,200 UART: [update-reset] Copying MAN_2 To MAN_1
5,385,214 UART: [update-reset Success] --
5,385,623 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,386,299 UART: [state] Locking Datavault
5,387,137 UART: [state] Locking PCR0, PCR1 and PCR31
5,387,741 UART: [state] Locking ICCM
5,388,321 UART: [exit] Launching FMC @ 0x40000000
5,393,618 UART:
5,393,634 UART: Running Caliptra FMC ...
5,394,042 UART:
5,394,264 UART: [fmc] Received command: 0x10000000
5,396,433 >>> mbox cmd response data (224 bytes)
5,396,434 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,396,463 UART: [fmc] Received command: 0x10000006
5,414,480 >>> mbox cmd response data (1536 bytes)
5,414,481 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,414,509 UART: [fmc] Received command: 0x10000007
5,415,301 >>> mbox cmd response data (4 bytes)
5,415,302 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,415,330 UART: [fmc] Received command: 0x10000006
5,433,347 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,740 >>> mbox cmd response: success
2,648,520 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,701 UART:
2,654,717 UART: Running Caliptra FMC ...
2,655,125 UART:
2,655,355 UART: [fmc] Received command: 0x10000000
2,657,524 >>> mbox cmd response data (224 bytes)
2,657,525 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,657,554 UART: [fmc] Received command: 0x10000006
2,675,571 >>> mbox cmd response data (1536 bytes)
2,675,572 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,675,600 UART: [fmc] Received command: 0x46574C44
5,080,811 >>> mbox cmd response: success
5,088,439 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,093,959 UART:
5,093,975 UART: Running Caliptra FMC ...
5,094,383 UART:
5,094,605 UART: [fmc] Received command: 0x10000000
5,096,774 >>> mbox cmd response data (224 bytes)
5,096,775 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,096,804 UART: [fmc] Received command: 0x10000006
5,114,821 >>> mbox cmd response data (1536 bytes)
5,114,822 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,114,850 UART: [fmc] Received command: 0x10000007
5,115,642 >>> mbox cmd response data (4 bytes)
5,115,643 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,115,671 UART: [fmc] Received command: 0x10000006
5,133,688 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,577 UART: [kat] SHA2-256
901,517 UART: [kat] SHA2-384
904,370 UART: [kat] SHA2-512-ACC
906,271 UART: [kat] ECC-384
915,786 UART: [kat] HMAC-384Kdf
920,254 UART: [kat] LMS
1,168,566 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,443 UART: [idev] ++
1,172,611 UART: [idev] CDI.KEYID = 6
1,172,972 UART: [idev] SUBJECT.KEYID = 7
1,173,397 UART: [idev] UDS.KEYID = 0
1,181,559 UART: [idev] Erasing UDS.KEYID = 0
1,198,629 UART: [idev] Sha1 KeyId Algorithm
1,207,529 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,215,120 UART: [ldev] Erasing FE.KEYID = 1
1,241,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,064 UART: [ldev] --
1,280,480 UART: [fwproc] Wait for Commands...
1,281,155 UART: [fwproc] Recv command 0x46574c44
1,281,888 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,614 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,377 >>> mbox cmd response: success
2,742,570 UART: [afmc] ++
2,742,738 UART: [afmc] CDI.KEYID = 6
2,743,101 UART: [afmc] SUBJECT.KEYID = 7
2,743,527 UART: [afmc] AUTHORITY.KEYID = 5
2,779,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,808 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,802,528 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,808,420 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,814,114 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,821,853 UART: [afmc] --
2,822,777 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,799 UART: [cold-reset] --
2,823,755 UART: [state] Locking Datavault
2,824,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,362 UART: [state] Locking ICCM
2,826,024 UART: [exit] Launching FMC @ 0x40000000
2,831,321 UART:
2,831,337 UART: Running Caliptra FMC ...
2,831,745 UART:
2,831,975 UART: [fmc] Received command: 0x10000000
2,834,144 >>> mbox cmd response data (224 bytes)
2,834,145 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,834,174 UART: [fmc] Received command: 0x10000006
2,852,191 >>> mbox cmd response data (1536 bytes)
2,852,192 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,852,220 UART: [fmc] Received command: 0x46574C44
2,853,046 UART:
2,853,062 UART: Running Caliptra ROM ...
2,853,470 UART:
2,853,525 UART: [state] CFI Enabled
2,856,057 UART: [state] LifecycleState = Unprovisioned
2,856,712 UART: [state] DebugLocked = No
2,857,220 UART: [state] WD Timer not started. Device not locked for debugging
2,858,580 UART: [kat] SHA2-256
3,662,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,666,259 UART: [kat] ++
3,666,411 UART: [kat] sha1
3,670,581 UART: [kat] SHA2-256
3,672,521 UART: [kat] SHA2-384
3,675,244 UART: [kat] SHA2-512-ACC
3,677,144 UART: [kat] ECC-384
3,687,179 UART: [kat] HMAC-384Kdf
3,691,693 UART: [kat] LMS
3,940,005 UART: [kat] --
3,940,993 UART: [update-reset] ++
5,225,420 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,226,611 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,374,797 >>> mbox cmd response: success
5,375,108 UART: [update-reset] Copying MAN_2 To MAN_1
5,383,122 UART: [update-reset Success] --
5,383,531 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,383,987 UART: [state] Locking Datavault
5,384,791 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,395 UART: [state] Locking ICCM
5,385,955 UART: [exit] Launching FMC @ 0x40000000
5,391,252 UART:
5,391,268 UART: Running Caliptra FMC ...
5,391,676 UART:
5,391,898 UART: [fmc] Received command: 0x10000000
5,394,067 >>> mbox cmd response data (224 bytes)
5,394,068 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,394,097 UART: [fmc] Received command: 0x10000006
5,412,114 >>> mbox cmd response data (1536 bytes)
5,412,115 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,412,143 UART: [fmc] Received command: 0x10000007
5,412,935 >>> mbox cmd response data (4 bytes)
5,412,936 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,412,964 UART: [fmc] Received command: 0x10000006
5,430,981 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,445 >>> mbox cmd response: success
2,649,049 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,655,442 UART:
2,655,458 UART: Running Caliptra FMC ...
2,655,866 UART:
2,656,096 UART: [fmc] Received command: 0x10000000
2,658,265 >>> mbox cmd response data (224 bytes)
2,658,266 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,658,295 UART: [fmc] Received command: 0x10000006
2,676,312 >>> mbox cmd response data (1536 bytes)
2,676,313 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,676,341 UART: [fmc] Received command: 0x46574C44
5,080,023 >>> mbox cmd response: success
5,087,721 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,093,447 UART:
5,093,463 UART: Running Caliptra FMC ...
5,093,871 UART:
5,094,093 UART: [fmc] Received command: 0x10000000
5,096,262 >>> mbox cmd response data (224 bytes)
5,096,263 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,096,292 UART: [fmc] Received command: 0x10000006
5,114,309 >>> mbox cmd response data (1536 bytes)
5,114,310 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,114,338 UART: [fmc] Received command: 0x10000007
5,115,130 >>> mbox cmd response data (4 bytes)
5,115,131 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,115,159 UART: [fmc] Received command: 0x10000006
5,133,176 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,895 UART: [kat] SHA2-512-ACC
906,796 UART: [kat] ECC-384
916,421 UART: [kat] HMAC-384Kdf
921,061 UART: [kat] LMS
1,169,373 UART: [kat] --
1,170,226 UART: [cold-reset] ++
1,170,696 UART: [fht] FHT @ 0x50003400
1,173,570 UART: [idev] ++
1,173,738 UART: [idev] CDI.KEYID = 6
1,174,099 UART: [idev] SUBJECT.KEYID = 7
1,174,524 UART: [idev] UDS.KEYID = 0
1,182,334 UART: [idev] Erasing UDS.KEYID = 0
1,199,730 UART: [idev] Sha1 KeyId Algorithm
1,208,706 UART: [idev] --
1,209,807 UART: [ldev] ++
1,209,975 UART: [ldev] CDI.KEYID = 6
1,210,339 UART: [ldev] SUBJECT.KEYID = 5
1,210,766 UART: [ldev] AUTHORITY.KEYID = 7
1,211,229 UART: [ldev] FE.KEYID = 1
1,216,313 UART: [ldev] Erasing FE.KEYID = 1
1,243,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,999 UART: [ldev] --
1,282,497 UART: [fwproc] Wait for Commands...
1,283,080 UART: [fwproc] Recv command 0x46574c44
1,283,813 UART: [fwproc] Recv'd Img size: 112032 bytes
2,555,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,582,343 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,944 >>> mbox cmd response: success
2,745,187 UART: [afmc] ++
2,745,355 UART: [afmc] CDI.KEYID = 6
2,745,718 UART: [afmc] SUBJECT.KEYID = 7
2,746,144 UART: [afmc] AUTHORITY.KEYID = 5
2,781,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,685 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,804,405 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,810,297 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,815,991 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,823,880 UART: [afmc] --
2,824,970 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,824,992 UART: [cold-reset] --
2,825,886 UART: [state] Locking Datavault
2,827,121 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,725 UART: [state] Locking ICCM
2,828,315 UART: [exit] Launching FMC @ 0x40000000
2,833,612 UART:
2,833,628 UART: Running Caliptra FMC ...
2,834,036 UART:
2,834,266 UART: [fmc] Received command: 0x10000000
2,836,435 >>> mbox cmd response data (224 bytes)
2,836,436 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,836,465 UART: [fmc] Received command: 0x10000006
2,854,482 >>> mbox cmd response data (1536 bytes)
2,854,483 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,854,511 UART: [fmc] Received command: 0x46574C44
2,855,337 UART:
2,855,353 UART: Running Caliptra ROM ...
2,855,761 UART:
2,855,903 UART: [state] CFI Enabled
2,858,545 UART: [state] LifecycleState = Unprovisioned
2,859,200 UART: [state] DebugLocked = No
2,859,864 UART: [state] WD Timer not started. Device not locked for debugging
2,861,092 UART: [kat] SHA2-256
3,664,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,668,771 UART: [kat] ++
3,668,923 UART: [kat] sha1
3,673,143 UART: [kat] SHA2-256
3,675,083 UART: [kat] SHA2-384
3,677,890 UART: [kat] SHA2-512-ACC
3,679,790 UART: [kat] ECC-384
3,689,903 UART: [kat] HMAC-384Kdf
3,694,579 UART: [kat] LMS
3,942,891 UART: [kat] --
3,943,355 UART: [update-reset] ++
5,226,886 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,227,935 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,376,121 >>> mbox cmd response: success
5,376,398 UART: [update-reset] Copying MAN_2 To MAN_1
5,384,412 UART: [update-reset Success] --
5,384,821 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,385,651 UART: [state] Locking Datavault
5,386,383 UART: [state] Locking PCR0, PCR1 and PCR31
5,386,987 UART: [state] Locking ICCM
5,387,607 UART: [exit] Launching FMC @ 0x40000000
5,392,904 UART:
5,392,920 UART: Running Caliptra FMC ...
5,393,328 UART:
5,393,550 UART: [fmc] Received command: 0x10000000
5,395,719 >>> mbox cmd response data (224 bytes)
5,395,720 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,395,749 UART: [fmc] Received command: 0x10000006
5,413,766 >>> mbox cmd response data (1536 bytes)
5,413,767 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,413,795 UART: [fmc] Received command: 0x10000007
5,414,587 >>> mbox cmd response data (4 bytes)
5,414,588 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,414,616 UART: [fmc] Received command: 0x10000006
5,432,633 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,594,258 >>> mbox cmd response: success
2,651,084 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,657,203 UART:
2,657,219 UART: Running Caliptra FMC ...
2,657,627 UART:
2,657,857 UART: [fmc] Received command: 0x10000000
2,660,026 >>> mbox cmd response data (224 bytes)
2,660,027 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,660,056 UART: [fmc] Received command: 0x10000006
2,678,073 >>> mbox cmd response data (1536 bytes)
2,678,074 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,678,102 UART: [fmc] Received command: 0x46574C44
5,081,629 >>> mbox cmd response: success
5,089,241 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,094,869 UART:
5,094,885 UART: Running Caliptra FMC ...
5,095,293 UART:
5,095,515 UART: [fmc] Received command: 0x10000000
5,097,684 >>> mbox cmd response data (224 bytes)
5,097,685 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,097,714 UART: [fmc] Received command: 0x10000006
5,115,731 >>> mbox cmd response data (1536 bytes)
5,115,732 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,115,760 UART: [fmc] Received command: 0x10000007
5,116,552 >>> mbox cmd response data (4 bytes)
5,116,553 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,116,581 UART: [fmc] Received command: 0x10000006
5,134,598 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
915,558 UART: [kat] HMAC-384Kdf
920,050 UART: [kat] LMS
1,168,362 UART: [kat] --
1,168,999 UART: [cold-reset] ++
1,169,351 UART: [fht] FHT @ 0x50003400
1,171,879 UART: [idev] ++
1,172,047 UART: [idev] CDI.KEYID = 6
1,172,408 UART: [idev] SUBJECT.KEYID = 7
1,172,833 UART: [idev] UDS.KEYID = 0
1,180,895 UART: [idev] Erasing UDS.KEYID = 0
1,197,741 UART: [idev] Sha1 KeyId Algorithm
1,206,645 UART: [idev] --
1,207,536 UART: [ldev] ++
1,207,704 UART: [ldev] CDI.KEYID = 6
1,208,068 UART: [ldev] SUBJECT.KEYID = 5
1,208,495 UART: [ldev] AUTHORITY.KEYID = 7
1,208,958 UART: [ldev] FE.KEYID = 1
1,213,986 UART: [ldev] Erasing FE.KEYID = 1
1,240,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,928 UART: [ldev] --
1,279,416 UART: [fwproc] Wait for Commands...
1,280,179 UART: [fwproc] Recv command 0x46574c44
1,280,912 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,936 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,517 >>> mbox cmd response: success
2,742,776 UART: [afmc] ++
2,742,944 UART: [afmc] CDI.KEYID = 6
2,743,307 UART: [afmc] SUBJECT.KEYID = 7
2,743,733 UART: [afmc] AUTHORITY.KEYID = 5
2,779,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,250 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,801,970 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,807,862 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,813,556 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,821,243 UART: [afmc] --
2,822,217 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,239 UART: [cold-reset] --
2,822,985 UART: [state] Locking Datavault
2,824,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,608 UART: [state] Locking ICCM
2,825,078 UART: [exit] Launching FMC @ 0x40000000
2,830,375 UART:
2,830,391 UART: Running Caliptra FMC ...
2,830,799 UART:
2,831,029 UART: [fmc] Received command: 0x10000000
2,833,198 >>> mbox cmd response data (224 bytes)
2,833,199 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,833,228 UART: [fmc] Received command: 0x10000006
2,851,245 >>> mbox cmd response data (1536 bytes)
2,851,246 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,851,274 UART: [fmc] Received command: 0x46574C44
2,852,100 UART:
2,852,116 UART: Running Caliptra ROM ...
2,852,524 UART:
2,852,579 UART: [state] CFI Enabled
2,855,371 UART: [state] LifecycleState = Unprovisioned
2,856,026 UART: [state] DebugLocked = No
2,856,688 UART: [state] WD Timer not started. Device not locked for debugging
2,857,934 UART: [kat] SHA2-256
3,661,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,613 UART: [kat] ++
3,665,765 UART: [kat] sha1
3,669,997 UART: [kat] SHA2-256
3,671,937 UART: [kat] SHA2-384
3,674,548 UART: [kat] SHA2-512-ACC
3,676,448 UART: [kat] ECC-384
3,686,135 UART: [kat] HMAC-384Kdf
3,690,559 UART: [kat] LMS
3,938,871 UART: [kat] --
3,939,625 UART: [update-reset] ++
5,225,612 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,226,729 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,374,915 >>> mbox cmd response: success
5,375,078 UART: [update-reset] Copying MAN_2 To MAN_1
5,383,092 UART: [update-reset Success] --
5,383,501 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,384,183 UART: [state] Locking Datavault
5,385,139 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,743 UART: [state] Locking ICCM
5,386,359 UART: [exit] Launching FMC @ 0x40000000
5,391,656 UART:
5,391,672 UART: Running Caliptra FMC ...
5,392,080 UART:
5,392,302 UART: [fmc] Received command: 0x10000000
5,394,471 >>> mbox cmd response data (224 bytes)
5,394,472 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,394,501 UART: [fmc] Received command: 0x10000006
5,412,518 >>> mbox cmd response data (1536 bytes)
5,412,519 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,412,547 UART: [fmc] Received command: 0x10000007
5,413,339 >>> mbox cmd response data (4 bytes)
5,413,340 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,413,368 UART: [fmc] Received command: 0x10000006
5,431,385 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,323 >>> mbox cmd response: success
2,646,961 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,920 UART:
2,652,936 UART: Running Caliptra FMC ...
2,653,344 UART:
2,653,574 UART: [fmc] Received command: 0x10000000
2,655,743 >>> mbox cmd response data (224 bytes)
2,655,744 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,655,773 UART: [fmc] Received command: 0x10000006
2,673,790 >>> mbox cmd response data (1536 bytes)
2,673,791 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,673,819 UART: [fmc] Received command: 0x46574C44
5,078,639 >>> mbox cmd response: success
5,086,159 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,091,941 UART:
5,091,957 UART: Running Caliptra FMC ...
5,092,365 UART:
5,092,587 UART: [fmc] Received command: 0x10000000
5,094,756 >>> mbox cmd response data (224 bytes)
5,094,757 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,094,786 UART: [fmc] Received command: 0x10000006
5,112,803 >>> mbox cmd response data (1536 bytes)
5,112,804 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,112,832 UART: [fmc] Received command: 0x10000007
5,113,624 >>> mbox cmd response data (4 bytes)
5,113,625 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,113,653 UART: [fmc] Received command: 0x10000006
5,131,670 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,494 UART: [kat] ++
895,646 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,723 UART: [kat] LMS
1,169,035 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,342 UART: [fht] FHT @ 0x50003400
1,172,928 UART: [idev] ++
1,173,096 UART: [idev] CDI.KEYID = 6
1,173,457 UART: [idev] SUBJECT.KEYID = 7
1,173,882 UART: [idev] UDS.KEYID = 0
1,182,006 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,294 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,216,153 UART: [ldev] Erasing FE.KEYID = 1
1,242,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,197 UART: [ldev] --
1,281,555 UART: [fwproc] Wait for Commands...
1,282,188 UART: [fwproc] Recv command 0x46574c44
1,282,921 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,581,515 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,138 >>> mbox cmd response: success
2,744,237 UART: [afmc] ++
2,744,405 UART: [afmc] CDI.KEYID = 6
2,744,768 UART: [afmc] SUBJECT.KEYID = 7
2,745,194 UART: [afmc] AUTHORITY.KEYID = 5
2,781,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,973 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,804,693 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,810,585 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,816,279 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,824,134 UART: [afmc] --
2,825,170 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,825,192 UART: [cold-reset] --
2,826,070 UART: [state] Locking Datavault
2,827,263 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,867 UART: [state] Locking ICCM
2,828,437 UART: [exit] Launching FMC @ 0x40000000
2,833,734 UART:
2,833,750 UART: Running Caliptra FMC ...
2,834,158 UART:
2,834,388 UART: [fmc] Received command: 0x10000000
2,836,557 >>> mbox cmd response data (224 bytes)
2,836,558 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,836,587 UART: [fmc] Received command: 0x10000006
2,854,604 >>> mbox cmd response data (1536 bytes)
2,854,605 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,854,633 UART: [fmc] Received command: 0x46574C44
2,855,459 UART:
2,855,475 UART: Running Caliptra ROM ...
2,855,883 UART:
2,856,025 UART: [state] CFI Enabled
2,858,523 UART: [state] LifecycleState = Unprovisioned
2,859,178 UART: [state] DebugLocked = No
2,859,750 UART: [state] WD Timer not started. Device not locked for debugging
2,861,044 UART: [kat] SHA2-256
3,664,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,668,723 UART: [kat] ++
3,668,875 UART: [kat] sha1
3,673,057 UART: [kat] SHA2-256
3,674,997 UART: [kat] SHA2-384
3,677,920 UART: [kat] SHA2-512-ACC
3,679,820 UART: [kat] ECC-384
3,689,667 UART: [kat] HMAC-384Kdf
3,694,271 UART: [kat] LMS
3,942,583 UART: [kat] --
3,943,747 UART: [update-reset] ++
5,228,538 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,229,517 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,377,703 >>> mbox cmd response: success
5,377,924 UART: [update-reset] Copying MAN_2 To MAN_1
5,385,938 UART: [update-reset Success] --
5,386,347 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,386,797 UART: [state] Locking Datavault
5,387,431 UART: [state] Locking PCR0, PCR1 and PCR31
5,388,035 UART: [state] Locking ICCM
5,388,647 UART: [exit] Launching FMC @ 0x40000000
5,393,944 UART:
5,393,960 UART: Running Caliptra FMC ...
5,394,368 UART:
5,394,590 UART: [fmc] Received command: 0x10000000
5,396,759 >>> mbox cmd response data (224 bytes)
5,396,760 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,396,789 UART: [fmc] Received command: 0x10000006
5,414,806 >>> mbox cmd response data (1536 bytes)
5,414,807 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,414,835 UART: [fmc] Received command: 0x10000007
5,415,627 >>> mbox cmd response data (4 bytes)
5,415,628 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,415,656 UART: [fmc] Received command: 0x10000006
5,433,673 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,656 >>> mbox cmd response: success
2,650,144 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,656,405 UART:
2,656,421 UART: Running Caliptra FMC ...
2,656,829 UART:
2,657,059 UART: [fmc] Received command: 0x10000000
2,659,228 >>> mbox cmd response data (224 bytes)
2,659,229 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,659,258 UART: [fmc] Received command: 0x10000006
2,677,275 >>> mbox cmd response data (1536 bytes)
2,677,276 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,677,304 UART: [fmc] Received command: 0x46574C44
5,081,735 >>> mbox cmd response: success
5,089,399 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,095,335 UART:
5,095,351 UART: Running Caliptra FMC ...
5,095,759 UART:
5,095,981 UART: [fmc] Received command: 0x10000000
5,098,150 >>> mbox cmd response data (224 bytes)
5,098,151 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,098,180 UART: [fmc] Received command: 0x10000006
5,116,197 >>> mbox cmd response data (1536 bytes)
5,116,198 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,116,226 UART: [fmc] Received command: 0x10000007
5,117,018 >>> mbox cmd response data (4 bytes)
5,117,019 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,117,047 UART: [fmc] Received command: 0x10000006
5,135,064 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
2,056,125 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,197,334 UART:
2,197,747 UART: Running Caliptra ROM ...
2,198,912 UART:
2,199,088 UART: [state] CFI Enabled
2,200,082 UART: [state] LifecycleState = Unprovisioned
2,201,732 UART: [state] DebugLocked = No
2,202,838 UART: [state] WD Timer not started. Device not locked for debugging
2,205,306 UART: [kat] SHA2-256
2,206,192 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,233 UART: [kat] ++
2,209,689 UART: [kat] sha1
2,210,244 UART: [kat] SHA2-256
2,210,936 UART: [kat] SHA2-384
2,211,625 UART: [kat] SHA2-512-ACC
2,212,431 UART: [kat] ECC-384
3,777,487 UART: [kat] HMAC-384Kdf
3,801,727 UART: [kat] LMS
4,874,882 UART: [kat] --
4,877,623 UART: [cold-reset] ++
4,878,754 UART: [fht] FHT @ 0x50003400
4,890,561 UART: [idev] ++
4,891,246 UART: [idev] CDI.KEYID = 6
4,892,488 UART: [idev] SUBJECT.KEYID = 7
4,893,603 UART: [idev] UDS.KEYID = 0
4,929,772 UART: [idev] Erasing UDS.KEYID = 0
8,242,611 UART: [idev] Sha1 KeyId Algorithm
8,265,136 UART: [idev] --
8,269,403 UART: [ldev] ++
8,269,967 UART: [ldev] CDI.KEYID = 6
8,271,205 UART: [ldev] SUBJECT.KEYID = 5
8,272,369 UART: [ldev] AUTHORITY.KEYID = 7
8,273,494 UART: [ldev] FE.KEYID = 1
8,302,985 UART: [ldev] Erasing FE.KEYID = 1
11,637,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,950,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,966,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,982,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,998,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,018,861 UART: [ldev] --
14,024,185 UART: [fwproc] Wait for Commands...
14,026,293 UART: [fwproc] Recv command 0x46574c44
14,028,613 UART: [fwproc] Recv'd Img size: 111688 bytes
18,066,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,142,784 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,203,018 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,520,755 >>> mbox cmd response: success
18,524,199 UART: [afmc] ++
18,524,807 UART: [afmc] CDI.KEYID = 6
18,526,197 UART: [afmc] SUBJECT.KEYID = 7
18,527,234 UART: [afmc] AUTHORITY.KEYID = 5
21,891,704 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,188,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,190,770 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
24,206,888 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
24,222,906 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
24,238,782 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
24,262,950 UART: [afmc] --
24,266,006 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,266,382 UART: [cold-reset] --
24,270,437 UART: [state] Locking Datavault
24,276,710 UART: [state] Locking PCR0, PCR1 and PCR31
24,278,354 UART: [state] Locking ICCM
24,280,397 UART: [exit] Launching FMC @ 0x40000000
24,288,994 UART:
24,289,275 UART: Running Caliptra FMC ...
24,290,385 UART:
24,290,549 UART: [fmc] Received command: 0x10000000
24,292,992 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,060,066 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,280,877 >>> mbox cmd response: success
23,957,313 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,969,919 UART:
23,970,255 UART: Running Caliptra FMC ...
23,971,340 UART:
23,971,490 UART: [fmc] Received command: 0x10000000
23,973,905 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
2,066,820 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,208,087 UART:
2,208,501 UART: Running Caliptra ROM ...
2,209,669 UART:
2,209,835 UART: [state] CFI Enabled
2,210,801 UART: [state] LifecycleState = Unprovisioned
2,212,434 UART: [state] DebugLocked = No
2,213,534 UART: [state] WD Timer not started. Device not locked for debugging
2,216,231 UART: [kat] SHA2-256
2,216,906 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,219,928 UART: [kat] ++
2,220,377 UART: [kat] sha1
2,220,904 UART: [kat] SHA2-256
2,221,639 UART: [kat] SHA2-384
2,222,300 UART: [kat] SHA2-512-ACC
2,223,096 UART: [kat] ECC-384
4,098,708 UART: [kat] HMAC-384Kdf
4,109,271 UART: [kat] LMS
5,182,445 UART: [kat] --
5,187,599 UART: [cold-reset] ++
5,189,265 UART: [fht] FHT @ 0x50003400
5,201,102 UART: [idev] ++
5,201,776 UART: [idev] CDI.KEYID = 6
5,203,009 UART: [idev] SUBJECT.KEYID = 7
5,204,444 UART: [idev] UDS.KEYID = 0
5,223,603 UART: [idev] Erasing UDS.KEYID = 0
8,493,224 UART: [idev] Sha1 KeyId Algorithm
8,514,771 UART: [idev] --
8,518,825 UART: [ldev] ++
8,519,387 UART: [ldev] CDI.KEYID = 6
8,520,613 UART: [ldev] SUBJECT.KEYID = 5
8,522,093 UART: [ldev] AUTHORITY.KEYID = 7
8,523,648 UART: [ldev] FE.KEYID = 1
8,533,102 UART: [ldev] Erasing FE.KEYID = 1
11,828,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,025 UART: [ldev] --
14,196,908 UART: [fwproc] Wait for Commands...
14,199,427 UART: [fwproc] Recv command 0x46574c44
14,201,734 UART: [fwproc] Recv'd Img size: 111688 bytes
18,243,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,316,920 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,377,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,694,197 >>> mbox cmd response: success
18,698,085 UART: [afmc] ++
18,698,671 UART: [afmc] CDI.KEYID = 6
18,699,781 UART: [afmc] SUBJECT.KEYID = 7
18,700,988 UART: [afmc] AUTHORITY.KEYID = 5
22,017,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,311,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,314,003 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
24,330,096 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
24,346,117 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
24,362,065 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
24,384,906 UART: [afmc] --
24,388,132 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,388,498 UART: [cold-reset] --
24,391,544 UART: [state] Locking Datavault
24,397,384 UART: [state] Locking PCR0, PCR1 and PCR31
24,399,023 UART: [state] Locking ICCM
24,402,087 UART: [exit] Launching FMC @ 0x40000000
24,410,700 UART:
24,410,934 UART: Running Caliptra FMC ...
24,412,030 UART:
24,412,183 UART: [fmc] Received command: 0x10000000
24,414,639 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
2,061,492 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,503,701 >>> mbox cmd response: success
24,133,961 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,148,726 UART:
24,149,065 UART: Running Caliptra FMC ...
24,150,269 UART:
24,150,434 UART: [fmc] Received command: 0x10000000
24,152,632 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,056,775 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,199,113 UART:
2,199,562 UART: Running Caliptra ROM ...
2,200,680 UART:
2,200,845 UART: [state] CFI Enabled
2,201,758 UART: [state] LifecycleState = Unprovisioned
2,203,406 UART: [state] DebugLocked = No
2,204,522 UART: [state] WD Timer not started. Device not locked for debugging
2,206,997 UART: [kat] SHA2-256
2,207,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,672 UART: [kat] ++
2,211,141 UART: [kat] sha1
2,211,734 UART: [kat] SHA2-256
2,212,393 UART: [kat] SHA2-384
2,213,048 UART: [kat] SHA2-512-ACC
2,213,876 UART: [kat] ECC-384
2,945,678 UART: [kat] HMAC-384Kdf
2,970,961 UART: [kat] LMS
3,500,385 UART: [kat] --
3,502,592 UART: [cold-reset] ++
3,503,870 UART: [fht] FHT @ 0x50003400
3,515,977 UART: [idev] ++
3,516,578 UART: [idev] CDI.KEYID = 6
3,517,488 UART: [idev] SUBJECT.KEYID = 7
3,518,649 UART: [idev] UDS.KEYID = 0
3,541,851 UART: [idev] Erasing UDS.KEYID = 0
6,021,619 UART: [idev] Sha1 KeyId Algorithm
6,045,898 UART: [idev] --
6,049,198 UART: [ldev] ++
6,049,777 UART: [ldev] CDI.KEYID = 6
6,050,684 UART: [ldev] SUBJECT.KEYID = 5
6,051,849 UART: [ldev] AUTHORITY.KEYID = 7
6,053,140 UART: [ldev] FE.KEYID = 1
6,099,220 UART: [ldev] Erasing FE.KEYID = 1
8,598,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,425 UART: [ldev] --
10,394,482 UART: [fwproc] Wait for Commands...
10,396,702 UART: [fwproc] Recv command 0x46574c44
10,398,747 UART: [fwproc] Recv'd Img size: 112032 bytes
13,764,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,838,190 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,898,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,216,296 >>> mbox cmd response: success
14,219,801 UART: [afmc] ++
14,220,390 UART: [afmc] CDI.KEYID = 6
14,221,298 UART: [afmc] SUBJECT.KEYID = 7
14,222,457 UART: [afmc] AUTHORITY.KEYID = 5
16,763,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,489,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,491,255 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,507,268 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,523,217 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,538,941 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,562,150 UART: [afmc] --
18,566,363 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,566,761 UART: [cold-reset] --
18,570,472 UART: [state] Locking Datavault
18,576,800 UART: [state] Locking PCR0, PCR1 and PCR31
18,578,511 UART: [state] Locking ICCM
18,580,012 UART: [exit] Launching FMC @ 0x40000000
18,588,361 UART:
18,588,599 UART: Running Caliptra FMC ...
18,589,701 UART:
18,589,861 UART: [fmc] Received command: 0x10000000
18,592,320 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,056,430 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,008,770 >>> mbox cmd response: success
18,286,881 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,303,059 UART:
18,303,456 UART: Running Caliptra FMC ...
18,304,644 UART:
18,304,815 UART: [fmc] Received command: 0x10000000
18,307,092 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,061,327 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,203,136 UART:
2,203,541 UART: Running Caliptra ROM ...
2,204,710 UART:
2,204,886 UART: [state] CFI Enabled
2,205,858 UART: [state] LifecycleState = Unprovisioned
2,207,500 UART: [state] DebugLocked = No
2,208,609 UART: [state] WD Timer not started. Device not locked for debugging
2,211,103 UART: [kat] SHA2-256
2,211,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,784 UART: [kat] ++
2,215,234 UART: [kat] sha1
2,215,829 UART: [kat] SHA2-256
2,216,493 UART: [kat] SHA2-384
2,217,151 UART: [kat] SHA2-512-ACC
2,217,949 UART: [kat] ECC-384
3,281,143 UART: [kat] HMAC-384Kdf
3,293,386 UART: [kat] LMS
3,822,879 UART: [kat] --
3,825,600 UART: [cold-reset] ++
3,827,476 UART: [fht] FHT @ 0x50003400
3,838,995 UART: [idev] ++
3,839,554 UART: [idev] CDI.KEYID = 6
3,840,567 UART: [idev] SUBJECT.KEYID = 7
3,841,684 UART: [idev] UDS.KEYID = 0
3,860,876 UART: [idev] Erasing UDS.KEYID = 0
6,318,112 UART: [idev] Sha1 KeyId Algorithm
6,340,692 UART: [idev] --
6,343,500 UART: [ldev] ++
6,344,066 UART: [ldev] CDI.KEYID = 6
6,345,086 UART: [ldev] SUBJECT.KEYID = 5
6,346,347 UART: [ldev] AUTHORITY.KEYID = 7
6,347,560 UART: [ldev] FE.KEYID = 1
6,359,513 UART: [ldev] Erasing FE.KEYID = 1
8,833,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,029 UART: [ldev] --
10,623,564 UART: [fwproc] Wait for Commands...
10,625,232 UART: [fwproc] Recv command 0x46574c44
10,627,328 UART: [fwproc] Recv'd Img size: 112032 bytes
13,997,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,065,802 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,126,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,445,231 >>> mbox cmd response: success
14,450,010 UART: [afmc] ++
14,450,596 UART: [afmc] CDI.KEYID = 6
14,451,509 UART: [afmc] SUBJECT.KEYID = 7
14,452,667 UART: [afmc] AUTHORITY.KEYID = 5
16,955,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,673,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,674,898 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,690,853 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,706,851 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,722,595 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,746,054 UART: [afmc] --
18,748,961 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,749,363 UART: [cold-reset] --
18,752,454 UART: [state] Locking Datavault
18,758,781 UART: [state] Locking PCR0, PCR1 and PCR31
18,760,481 UART: [state] Locking ICCM
18,762,953 UART: [exit] Launching FMC @ 0x40000000
18,771,349 UART:
18,771,582 UART: Running Caliptra FMC ...
18,772,680 UART:
18,772,835 UART: [fmc] Received command: 0x10000000
18,775,240 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,063,320 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,228,040 >>> mbox cmd response: success
18,466,461 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,481,686 UART:
18,482,031 UART: Running Caliptra FMC ...
18,483,224 UART:
18,483,393 UART: [fmc] Received command: 0x10000000
18,485,708 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,058,149 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,009,042 >>> mbox cmd response: success
18,288,360 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,303,670 UART:
18,304,000 UART: Running Caliptra FMC ...
18,305,155 UART:
18,305,320 UART: [fmc] Received command: 0x10000000
18,307,646 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
2,061,773 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,241,476 >>> mbox cmd response: success
18,470,668 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,482,970 UART:
18,483,303 UART: Running Caliptra FMC ...
18,484,403 UART:
18,484,553 UART: [fmc] Received command: 0x10000000
18,487,006 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
890,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,045 UART: [kat] ++
895,197 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,216 UART: [kat] SHA2-512-ACC
906,117 UART: [kat] ECC-384
915,618 UART: [kat] HMAC-384Kdf
920,094 UART: [kat] LMS
1,168,406 UART: [kat] --
1,169,291 UART: [cold-reset] ++
1,169,713 UART: [fht] FHT @ 0x50003400
1,172,373 UART: [idev] ++
1,172,541 UART: [idev] CDI.KEYID = 6
1,172,902 UART: [idev] SUBJECT.KEYID = 7
1,173,327 UART: [idev] UDS.KEYID = 0
1,181,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,329 UART: [idev] Sha1 KeyId Algorithm
1,207,051 UART: [idev] --
1,207,964 UART: [ldev] ++
1,208,132 UART: [ldev] CDI.KEYID = 6
1,208,496 UART: [ldev] SUBJECT.KEYID = 5
1,208,923 UART: [ldev] AUTHORITY.KEYID = 7
1,209,386 UART: [ldev] FE.KEYID = 1
1,214,630 UART: [ldev] Erasing FE.KEYID = 1
1,241,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,962 UART: [ldev] --
1,280,310 UART: [fwproc] Wait for Commands...
1,281,077 UART: [fwproc] Recv command 0x46574c44
1,281,810 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,010 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,695 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,781 >>> mbox cmd response: success
2,742,006 UART: [afmc] ++
2,742,174 UART: [afmc] CDI.KEYID = 6
2,742,537 UART: [afmc] SUBJECT.KEYID = 7
2,742,963 UART: [afmc] AUTHORITY.KEYID = 5
2,778,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,617 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,801,323 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,807,210 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,812,929 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,820,773 UART: [afmc] --
2,821,745 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,767 UART: [cold-reset] --
2,822,461 UART: [state] Locking Datavault
2,823,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,088 UART: [state] Locking ICCM
2,824,744 UART: [exit] Launching FMC @ 0x40000000
2,830,041 UART:
2,830,057 UART: Running Caliptra FMC ...
2,830,465 UART:
2,830,695 UART: [fmc] Received command: 0x10000000
2,832,864 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,588,621 >>> mbox cmd response: success
2,645,276 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,650,945 UART:
2,650,961 UART: Running Caliptra FMC ...
2,651,369 UART:
2,651,599 UART: [fmc] Received command: 0x10000000
2,653,768 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
916,093 UART: [kat] HMAC-384Kdf
920,717 UART: [kat] LMS
1,169,029 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,182,216 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,207,982 UART: [idev] --
1,208,951 UART: [ldev] ++
1,209,119 UART: [ldev] CDI.KEYID = 6
1,209,483 UART: [ldev] SUBJECT.KEYID = 5
1,209,910 UART: [ldev] AUTHORITY.KEYID = 7
1,210,373 UART: [ldev] FE.KEYID = 1
1,215,557 UART: [ldev] Erasing FE.KEYID = 1
1,241,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,981 UART: [ldev] --
1,281,249 UART: [fwproc] Wait for Commands...
1,281,834 UART: [fwproc] Recv command 0x46574c44
1,282,567 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,581,379 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,036 >>> mbox cmd response: success
2,744,101 UART: [afmc] ++
2,744,269 UART: [afmc] CDI.KEYID = 6
2,744,632 UART: [afmc] SUBJECT.KEYID = 7
2,745,058 UART: [afmc] AUTHORITY.KEYID = 5
2,780,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,050 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,803,756 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,809,643 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,815,362 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,823,236 UART: [afmc] --
2,824,152 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,824,174 UART: [cold-reset] --
2,825,020 UART: [state] Locking Datavault
2,826,169 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,773 UART: [state] Locking ICCM
2,827,247 UART: [exit] Launching FMC @ 0x40000000
2,832,544 UART:
2,832,560 UART: Running Caliptra FMC ...
2,832,968 UART:
2,833,198 UART: [fmc] Received command: 0x10000000
2,835,367 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,078 >>> mbox cmd response: success
2,648,079 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,274 UART:
2,654,290 UART: Running Caliptra FMC ...
2,654,698 UART:
2,654,928 UART: [fmc] Received command: 0x10000000
2,657,097 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
915,768 UART: [kat] HMAC-384Kdf
920,352 UART: [kat] LMS
1,168,664 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,173,097 UART: [idev] ++
1,173,265 UART: [idev] CDI.KEYID = 6
1,173,626 UART: [idev] SUBJECT.KEYID = 7
1,174,051 UART: [idev] UDS.KEYID = 0
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,670 UART: [ldev] Erasing FE.KEYID = 1
1,241,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,674 UART: [fwproc] Wait for Commands...
1,281,269 UART: [fwproc] Recv command 0x46574c44
1,282,002 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,974 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,659 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,707 >>> mbox cmd response: success
2,742,834 UART: [afmc] ++
2,743,002 UART: [afmc] CDI.KEYID = 6
2,743,365 UART: [afmc] SUBJECT.KEYID = 7
2,743,791 UART: [afmc] AUTHORITY.KEYID = 5
2,779,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,697 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,802,403 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,808,290 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,814,009 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,821,967 UART: [afmc] --
2,823,039 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,823,061 UART: [cold-reset] --
2,823,941 UART: [state] Locking Datavault
2,825,042 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,646 UART: [state] Locking ICCM
2,826,304 UART: [exit] Launching FMC @ 0x40000000
2,831,601 UART:
2,831,617 UART: Running Caliptra FMC ...
2,832,025 UART:
2,832,255 UART: [fmc] Received command: 0x10000000
2,834,424 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,321 >>> mbox cmd response: success
2,648,098 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,141 UART:
2,654,157 UART: Running Caliptra FMC ...
2,654,565 UART:
2,654,795 UART: [fmc] Received command: 0x10000000
2,656,964 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,160 UART: [state] WD Timer not started. Device not locked for debugging
88,451 UART: [kat] SHA2-256
892,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,130 UART: [kat] ++
896,282 UART: [kat] sha1
900,502 UART: [kat] SHA2-256
902,442 UART: [kat] SHA2-384
905,247 UART: [kat] SHA2-512-ACC
907,148 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,668 UART: [cold-reset] ++
1,171,024 UART: [fht] FHT @ 0x50003400
1,173,828 UART: [idev] ++
1,173,996 UART: [idev] CDI.KEYID = 6
1,174,357 UART: [idev] SUBJECT.KEYID = 7
1,174,782 UART: [idev] UDS.KEYID = 0
1,182,848 UART: [idev] Erasing UDS.KEYID = 0
1,200,210 UART: [idev] Sha1 KeyId Algorithm
1,209,030 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,671 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,841 UART: [ldev] Erasing FE.KEYID = 1
1,243,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,991 UART: [ldev] --
1,282,329 UART: [fwproc] Wait for Commands...
1,282,998 UART: [fwproc] Recv command 0x46574c44
1,283,731 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,582,329 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,992 >>> mbox cmd response: success
2,745,035 UART: [afmc] ++
2,745,203 UART: [afmc] CDI.KEYID = 6
2,745,566 UART: [afmc] SUBJECT.KEYID = 7
2,745,992 UART: [afmc] AUTHORITY.KEYID = 5
2,781,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,524 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,804,230 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,810,117 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,815,836 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,823,698 UART: [afmc] --
2,824,740 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,824,762 UART: [cold-reset] --
2,825,576 UART: [state] Locking Datavault
2,826,901 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,505 UART: [state] Locking ICCM
2,828,109 UART: [exit] Launching FMC @ 0x40000000
2,833,406 UART:
2,833,422 UART: Running Caliptra FMC ...
2,833,830 UART:
2,834,060 UART: [fmc] Received command: 0x10000000
2,836,229 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,638 >>> mbox cmd response: success
2,649,967 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,656,310 UART:
2,656,326 UART: Running Caliptra FMC ...
2,656,734 UART:
2,656,964 UART: [fmc] Received command: 0x10000000
2,659,133 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
915,996 UART: [kat] HMAC-384Kdf
920,600 UART: [kat] LMS
1,168,912 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,389 UART: [fht] FHT @ 0x50003400
1,173,057 UART: [idev] ++
1,173,225 UART: [idev] CDI.KEYID = 6
1,173,586 UART: [idev] SUBJECT.KEYID = 7
1,174,011 UART: [idev] UDS.KEYID = 0
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,199,179 UART: [idev] Sha1 KeyId Algorithm
1,208,037 UART: [idev] --
1,209,064 UART: [ldev] ++
1,209,232 UART: [ldev] CDI.KEYID = 6
1,209,596 UART: [ldev] SUBJECT.KEYID = 5
1,210,023 UART: [ldev] AUTHORITY.KEYID = 7
1,210,486 UART: [ldev] FE.KEYID = 1
1,215,318 UART: [ldev] Erasing FE.KEYID = 1
1,240,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,004 UART: [ldev] --
1,280,418 UART: [fwproc] Wait for Commands...
1,281,077 UART: [fwproc] Recv command 0x46574c44
1,281,810 UART: [fwproc] Recv'd Img size: 112032 bytes
2,551,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,360 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,145 >>> mbox cmd response: success
2,741,338 UART: [afmc] ++
2,741,506 UART: [afmc] CDI.KEYID = 6
2,741,869 UART: [afmc] SUBJECT.KEYID = 7
2,742,295 UART: [afmc] AUTHORITY.KEYID = 5
2,777,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,777 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,483 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,806,370 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,812,089 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,819,973 UART: [afmc] --
2,820,889 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,911 UART: [cold-reset] --
2,821,903 UART: [state] Locking Datavault
2,823,002 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,606 UART: [state] Locking ICCM
2,824,126 UART: [exit] Launching FMC @ 0x40000000
2,829,423 UART:
2,829,439 UART: Running Caliptra FMC ...
2,829,847 UART:
2,830,077 UART: [fmc] Received command: 0x10000000
2,832,246 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,590,603 >>> mbox cmd response: success
2,646,902 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,039 UART:
2,653,055 UART: Running Caliptra FMC ...
2,653,463 UART:
2,653,693 UART: [fmc] Received command: 0x10000000
2,655,862 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,309 UART: [kat] LMS
1,169,621 UART: [kat] --
1,170,460 UART: [cold-reset] ++
1,170,868 UART: [fht] FHT @ 0x50003400
1,173,404 UART: [idev] ++
1,173,572 UART: [idev] CDI.KEYID = 6
1,173,933 UART: [idev] SUBJECT.KEYID = 7
1,174,358 UART: [idev] UDS.KEYID = 0
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,199,624 UART: [idev] Sha1 KeyId Algorithm
1,208,614 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,205 UART: [ldev] SUBJECT.KEYID = 5
1,210,632 UART: [ldev] AUTHORITY.KEYID = 7
1,211,095 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,841 UART: [ldev] --
1,282,127 UART: [fwproc] Wait for Commands...
1,282,748 UART: [fwproc] Recv command 0x46574c44
1,283,481 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,581,231 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,900 >>> mbox cmd response: success
2,743,923 UART: [afmc] ++
2,744,091 UART: [afmc] CDI.KEYID = 6
2,744,454 UART: [afmc] SUBJECT.KEYID = 7
2,744,880 UART: [afmc] AUTHORITY.KEYID = 5
2,780,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,242 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,803,948 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,809,835 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,815,554 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,823,570 UART: [afmc] --
2,824,646 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,824,668 UART: [cold-reset] --
2,825,596 UART: [state] Locking Datavault
2,826,879 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,483 UART: [state] Locking ICCM
2,828,067 UART: [exit] Launching FMC @ 0x40000000
2,833,364 UART:
2,833,380 UART: Running Caliptra FMC ...
2,833,788 UART:
2,834,018 UART: [fmc] Received command: 0x10000000
2,836,187 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,372 >>> mbox cmd response: success
2,647,443 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,638 UART:
2,653,654 UART: Running Caliptra FMC ...
2,654,062 UART:
2,654,292 UART: [fmc] Received command: 0x10000000
2,656,461 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,055,957 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,197,348 UART:
2,197,771 UART: Running Caliptra ROM ...
2,198,935 UART:
2,199,111 UART: [state] CFI Enabled
2,200,085 UART: [state] LifecycleState = Unprovisioned
2,201,729 UART: [state] DebugLocked = No
2,202,834 UART: [state] WD Timer not started. Device not locked for debugging
2,205,323 UART: [kat] SHA2-256
2,205,995 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,006 UART: [kat] ++
2,209,462 UART: [kat] sha1
2,209,975 UART: [kat] SHA2-256
2,210,712 UART: [kat] SHA2-384
2,211,376 UART: [kat] SHA2-512-ACC
2,212,222 UART: [kat] ECC-384
3,776,478 UART: [kat] HMAC-384Kdf
3,801,461 UART: [kat] LMS
4,874,647 UART: [kat] --
4,879,284 UART: [cold-reset] ++
4,881,216 UART: [fht] FHT @ 0x50003400
4,891,874 UART: [idev] ++
4,892,601 UART: [idev] CDI.KEYID = 6
4,893,778 UART: [idev] SUBJECT.KEYID = 7
4,894,956 UART: [idev] UDS.KEYID = 0
4,929,288 UART: [idev] Erasing UDS.KEYID = 0
8,240,799 UART: [idev] Sha1 KeyId Algorithm
8,262,774 UART: [idev] --
8,267,144 UART: [ldev] ++
8,267,707 UART: [ldev] CDI.KEYID = 6
8,268,943 UART: [ldev] SUBJECT.KEYID = 5
8,270,115 UART: [ldev] AUTHORITY.KEYID = 7
8,271,214 UART: [ldev] FE.KEYID = 1
8,318,407 UART: [ldev] Erasing FE.KEYID = 1
11,650,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,024 UART: [ldev] --
14,036,093 UART: [fwproc] Wait for Commands...
14,038,843 UART: [fwproc] Recv command 0x46574c44
14,041,164 UART: [fwproc] Recv'd Img size: 111688 bytes
22,135,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,212,054 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,272,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,589,789 >>> mbox cmd response: success
22,593,660 UART: [afmc] ++
22,594,413 UART: [afmc] CDI.KEYID = 6
22,595,594 UART: [afmc] SUBJECT.KEYID = 7
22,596,751 UART: [afmc] AUTHORITY.KEYID = 5
25,949,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,250,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,252,494 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
28,268,696 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
28,284,765 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
28,300,740 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
28,322,997 UART: [afmc] --
28,327,203 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,327,577 UART: [cold-reset] --
28,331,307 UART: [state] Locking Datavault
28,336,074 UART: [state] Locking PCR0, PCR1 and PCR31
28,337,773 UART: [state] Locking ICCM
28,339,384 UART: [exit] Launching FMC @ 0x40000000
28,348,001 UART:
28,348,238 UART: Running Caliptra FMC ...
28,349,336 UART:
28,349,492 UART: [fmc] Received command: 0x10000000
28,351,920 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,055,837 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,563,450 >>> mbox cmd response: success
28,245,411 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,259,344 UART:
28,259,690 UART: Running Caliptra FMC ...
28,260,872 UART:
28,261,046 UART: [fmc] Received command: 0x10000000
28,263,297 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
2,073,267 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,214,612 UART:
2,215,029 UART: Running Caliptra ROM ...
2,216,193 UART:
2,216,359 UART: [state] CFI Enabled
2,217,333 UART: [state] LifecycleState = Unprovisioned
2,218,972 UART: [state] DebugLocked = No
2,220,024 UART: [state] WD Timer not started. Device not locked for debugging
2,222,441 UART: [kat] SHA2-256
2,223,094 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,226,105 UART: [kat] ++
2,226,610 UART: [kat] sha1
2,227,148 UART: [kat] SHA2-256
2,227,887 UART: [kat] SHA2-384
2,228,546 UART: [kat] SHA2-512-ACC
2,229,365 UART: [kat] ECC-384
4,100,440 UART: [kat] HMAC-384Kdf
4,112,245 UART: [kat] LMS
5,185,423 UART: [kat] --
5,189,047 UART: [cold-reset] ++
5,191,042 UART: [fht] FHT @ 0x50003400
5,202,181 UART: [idev] ++
5,202,855 UART: [idev] CDI.KEYID = 6
5,204,105 UART: [idev] SUBJECT.KEYID = 7
5,205,481 UART: [idev] UDS.KEYID = 0
5,221,994 UART: [idev] Erasing UDS.KEYID = 0
8,494,960 UART: [idev] Sha1 KeyId Algorithm
8,515,977 UART: [idev] --
8,520,562 UART: [ldev] ++
8,521,124 UART: [ldev] CDI.KEYID = 6
8,522,345 UART: [ldev] SUBJECT.KEYID = 5
8,523,847 UART: [ldev] AUTHORITY.KEYID = 7
8,525,404 UART: [ldev] FE.KEYID = 1
8,536,207 UART: [ldev] Erasing FE.KEYID = 1
11,824,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,863 UART: [ldev] --
14,188,771 UART: [fwproc] Wait for Commands...
14,190,757 UART: [fwproc] Recv command 0x46574c44
14,193,067 UART: [fwproc] Recv'd Img size: 111688 bytes
22,648,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,725,591 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,785,817 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
23,103,022 >>> mbox cmd response: success
23,106,887 UART: [afmc] ++
23,107,583 UART: [afmc] CDI.KEYID = 6
23,108,762 UART: [afmc] SUBJECT.KEYID = 7
23,109,970 UART: [afmc] AUTHORITY.KEYID = 5
26,425,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,720,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,722,094 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
28,738,295 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
28,754,389 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
28,770,386 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
28,793,433 UART: [afmc] --
28,797,028 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,797,387 UART: [cold-reset] --
28,801,492 UART: [state] Locking Datavault
28,808,249 UART: [state] Locking PCR0, PCR1 and PCR31
28,809,888 UART: [state] Locking ICCM
28,812,571 UART: [exit] Launching FMC @ 0x40000000
28,821,236 UART:
28,821,458 UART: Running Caliptra FMC ...
28,822,551 UART:
28,822,701 UART: [fmc] Received command: 0x10000000
28,825,181 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
2,061,727 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,650,331 >>> mbox cmd response: success
28,274,467 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,290,773 UART:
28,291,148 UART: Running Caliptra FMC ...
28,292,326 UART:
28,292,489 UART: [fmc] Received command: 0x10000000
28,294,733 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
2,057,026 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,198,872 UART:
2,199,291 UART: Running Caliptra ROM ...
2,200,416 UART:
2,200,587 UART: [state] CFI Enabled
2,201,574 UART: [state] LifecycleState = Unprovisioned
2,203,221 UART: [state] DebugLocked = No
2,204,247 UART: [state] WD Timer not started. Device not locked for debugging
2,206,712 UART: [kat] SHA2-256
2,207,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,381 UART: [kat] ++
2,210,827 UART: [kat] sha1
2,211,336 UART: [kat] SHA2-256
2,211,990 UART: [kat] SHA2-384
2,212,664 UART: [kat] SHA2-512-ACC
2,213,491 UART: [kat] ECC-384
2,946,749 UART: [kat] HMAC-384Kdf
2,970,307 UART: [kat] LMS
3,499,761 UART: [kat] --
3,504,183 UART: [cold-reset] ++
3,505,571 UART: [fht] FHT @ 0x50003400
3,517,624 UART: [idev] ++
3,518,185 UART: [idev] CDI.KEYID = 6
3,519,148 UART: [idev] SUBJECT.KEYID = 7
3,520,306 UART: [idev] UDS.KEYID = 0
3,543,629 UART: [idev] Erasing UDS.KEYID = 0
6,027,478 UART: [idev] Sha1 KeyId Algorithm
6,050,800 UART: [idev] --
6,055,340 UART: [ldev] ++
6,055,917 UART: [ldev] CDI.KEYID = 6
6,056,844 UART: [ldev] SUBJECT.KEYID = 5
6,058,013 UART: [ldev] AUTHORITY.KEYID = 7
6,059,307 UART: [ldev] FE.KEYID = 1
6,097,184 UART: [ldev] Erasing FE.KEYID = 1
8,602,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,144 UART: [ldev] --
10,411,218 UART: [fwproc] Wait for Commands...
10,414,179 UART: [fwproc] Recv command 0x46574c44
10,416,220 UART: [fwproc] Recv'd Img size: 112032 bytes
14,949,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,027,046 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,087,358 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,406,259 >>> mbox cmd response: success
15,411,038 UART: [afmc] ++
15,411,637 UART: [afmc] CDI.KEYID = 6
15,412,543 UART: [afmc] SUBJECT.KEYID = 7
15,413,759 UART: [afmc] AUTHORITY.KEYID = 5
17,935,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,662,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,664,694 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,680,813 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,696,757 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,712,544 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,735,056 UART: [afmc] --
19,737,957 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,738,325 UART: [cold-reset] --
19,741,298 UART: [state] Locking Datavault
19,747,569 UART: [state] Locking PCR0, PCR1 and PCR31
19,749,290 UART: [state] Locking ICCM
19,750,470 UART: [exit] Launching FMC @ 0x40000000
19,758,865 UART:
19,759,102 UART: Running Caliptra FMC ...
19,760,203 UART:
19,760,361 UART: [fmc] Received command: 0x10000000
19,762,820 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,059,618 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,004,915 >>> mbox cmd response: success
19,290,089 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,305,640 UART:
19,305,980 UART: Running Caliptra FMC ...
19,307,078 UART:
19,307,231 UART: [fmc] Received command: 0x10000000
19,309,664 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
2,062,117 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,203,854 UART:
2,204,264 UART: Running Caliptra ROM ...
2,205,452 UART:
2,205,650 UART: [state] CFI Enabled
2,206,566 UART: [state] LifecycleState = Unprovisioned
2,208,215 UART: [state] DebugLocked = No
2,209,327 UART: [state] WD Timer not started. Device not locked for debugging
2,211,799 UART: [kat] SHA2-256
2,212,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,484 UART: [kat] ++
2,216,166 UART: [kat] sha1
2,216,685 UART: [kat] SHA2-256
2,217,436 UART: [kat] SHA2-384
2,218,104 UART: [kat] SHA2-512-ACC
2,218,929 UART: [kat] ECC-384
3,280,511 UART: [kat] HMAC-384Kdf
3,292,964 UART: [kat] LMS
3,822,483 UART: [kat] --
3,825,386 UART: [cold-reset] ++
3,826,360 UART: [fht] FHT @ 0x50003400
3,838,532 UART: [idev] ++
3,839,091 UART: [idev] CDI.KEYID = 6
3,840,030 UART: [idev] SUBJECT.KEYID = 7
3,841,246 UART: [idev] UDS.KEYID = 0
3,856,464 UART: [idev] Erasing UDS.KEYID = 0
6,311,846 UART: [idev] Sha1 KeyId Algorithm
6,334,377 UART: [idev] --
6,338,649 UART: [ldev] ++
6,339,214 UART: [ldev] CDI.KEYID = 6
6,340,122 UART: [ldev] SUBJECT.KEYID = 5
6,341,285 UART: [ldev] AUTHORITY.KEYID = 7
6,342,566 UART: [ldev] FE.KEYID = 1
6,355,703 UART: [ldev] Erasing FE.KEYID = 1
8,826,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,066 UART: [ldev] --
10,614,842 UART: [fwproc] Wait for Commands...
10,616,755 UART: [fwproc] Recv command 0x46574c44
10,618,835 UART: [fwproc] Recv'd Img size: 112032 bytes
15,147,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,225,535 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,285,820 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,603,659 >>> mbox cmd response: success
15,608,084 UART: [afmc] ++
15,608,670 UART: [afmc] CDI.KEYID = 6
15,609,552 UART: [afmc] SUBJECT.KEYID = 7
15,610,819 UART: [afmc] AUTHORITY.KEYID = 5
18,110,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,830,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,832,236 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,848,267 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,864,235 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,880,038 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,902,964 UART: [afmc] --
19,907,188 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,907,564 UART: [cold-reset] --
19,912,102 UART: [state] Locking Datavault
19,917,720 UART: [state] Locking PCR0, PCR1 and PCR31
19,919,359 UART: [state] Locking ICCM
19,920,507 UART: [exit] Launching FMC @ 0x40000000
19,928,893 UART:
19,929,124 UART: Running Caliptra FMC ...
19,930,220 UART:
19,930,373 UART: [fmc] Received command: 0x10000000
19,932,817 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
2,061,942 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,214,042 >>> mbox cmd response: success
19,447,187 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,461,695 UART:
19,462,042 UART: Running Caliptra FMC ...
19,463,157 UART:
19,463,308 UART: [fmc] Received command: 0x10000000
19,465,710 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
2,057,960 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,996,190 >>> mbox cmd response: success
19,268,171 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,282,894 UART:
19,283,233 UART: Running Caliptra FMC ...
19,284,399 UART:
19,284,563 UART: [fmc] Received command: 0x10000000
19,286,913 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
2,063,438 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,189,992 >>> mbox cmd response: success
19,427,812 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,444,115 UART:
19,444,443 UART: Running Caliptra FMC ...
19,445,521 UART:
19,445,673 UART: [fmc] Received command: 0x10000000
19,448,187 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Unprovisioned
85,333 UART: [state] DebugLocked = No
85,981 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
890,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,925 UART: [kat] ++
895,077 UART: [kat] sha1
899,277 UART: [kat] SHA2-256
901,217 UART: [kat] SHA2-384
903,972 UART: [kat] SHA2-512-ACC
905,873 UART: [kat] ECC-384
915,456 UART: [kat] HMAC-384Kdf
920,198 UART: [kat] LMS
1,168,510 UART: [kat] --
1,169,319 UART: [cold-reset] ++
1,169,767 UART: [fht] FHT @ 0x50003400
1,172,239 UART: [idev] ++
1,172,407 UART: [idev] CDI.KEYID = 6
1,172,768 UART: [idev] SUBJECT.KEYID = 7
1,173,193 UART: [idev] UDS.KEYID = 0
1,181,359 UART: [idev] Erasing UDS.KEYID = 0
1,198,333 UART: [idev] Sha1 KeyId Algorithm
1,207,431 UART: [idev] --
1,208,516 UART: [ldev] ++
1,208,684 UART: [ldev] CDI.KEYID = 6
1,209,048 UART: [ldev] SUBJECT.KEYID = 5
1,209,475 UART: [ldev] AUTHORITY.KEYID = 7
1,209,938 UART: [ldev] FE.KEYID = 1
1,215,396 UART: [ldev] Erasing FE.KEYID = 1
1,240,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,614 UART: [ldev] --
1,280,030 UART: [fwproc] Wait for Commands...
1,280,839 UART: [fwproc] Recv command 0x46574c44
1,281,572 UART: [fwproc] Recv'd Img size: 112032 bytes
3,099,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,127,439 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,153,124 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,289,168 >>> mbox cmd response: success
3,290,327 UART: [afmc] ++
3,290,495 UART: [afmc] CDI.KEYID = 6
3,290,858 UART: [afmc] SUBJECT.KEYID = 7
3,291,284 UART: [afmc] AUTHORITY.KEYID = 5
3,326,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,343,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,054 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,349,757 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,355,639 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,361,345 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,369,121 UART: [afmc] --
3,370,035 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,370,057 UART: [cold-reset] --
3,371,047 UART: [state] Locking Datavault
3,372,256 UART: [state] Locking PCR0, PCR1 and PCR31
3,372,860 UART: [state] Locking ICCM
3,373,438 UART: [exit] Launching FMC @ 0x40000000
3,378,735 UART:
3,378,751 UART: Running Caliptra FMC ...
3,379,159 UART:
3,379,389 UART: [fmc] Received command: 0x10000000
3,381,558 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,133,675 >>> mbox cmd response: success
3,189,222 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,195,479 UART:
3,195,495 UART: Running Caliptra FMC ...
3,195,903 UART:
3,196,133 UART: [fmc] Received command: 0x10000000
3,198,302 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,345 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,352 UART: [cold-reset] ++
1,170,778 UART: [fht] FHT @ 0x50003400
1,173,468 UART: [idev] ++
1,173,636 UART: [idev] CDI.KEYID = 6
1,173,997 UART: [idev] SUBJECT.KEYID = 7
1,174,422 UART: [idev] UDS.KEYID = 0
1,182,120 UART: [idev] Erasing UDS.KEYID = 0
1,199,344 UART: [idev] Sha1 KeyId Algorithm
1,208,314 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,216,005 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,879 UART: [ldev] --
1,281,197 UART: [fwproc] Wait for Commands...
1,281,822 UART: [fwproc] Recv command 0x46574c44
1,282,555 UART: [fwproc] Recv'd Img size: 112032 bytes
3,085,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,112,700 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,138,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,274,351 >>> mbox cmd response: success
3,275,486 UART: [afmc] ++
3,275,654 UART: [afmc] CDI.KEYID = 6
3,276,017 UART: [afmc] SUBJECT.KEYID = 7
3,276,443 UART: [afmc] AUTHORITY.KEYID = 5
3,312,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,329,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,329,887 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,335,590 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,341,472 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,347,178 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,355,070 UART: [afmc] --
3,355,942 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,355,964 UART: [cold-reset] --
3,356,568 UART: [state] Locking Datavault
3,357,635 UART: [state] Locking PCR0, PCR1 and PCR31
3,358,239 UART: [state] Locking ICCM
3,358,873 UART: [exit] Launching FMC @ 0x40000000
3,364,170 UART:
3,364,186 UART: Running Caliptra FMC ...
3,364,594 UART:
3,364,824 UART: [fmc] Received command: 0x10000000
3,366,993 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,132,120 >>> mbox cmd response: success
3,187,815 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,193,830 UART:
3,193,846 UART: Running Caliptra FMC ...
3,194,254 UART:
3,194,484 UART: [fmc] Received command: 0x10000000
3,196,653 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,169,849 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,172,997 UART: [idev] ++
1,173,165 UART: [idev] CDI.KEYID = 6
1,173,526 UART: [idev] SUBJECT.KEYID = 7
1,173,951 UART: [idev] UDS.KEYID = 0
1,181,973 UART: [idev] Erasing UDS.KEYID = 0
1,199,197 UART: [idev] Sha1 KeyId Algorithm
1,208,149 UART: [idev] --
1,209,132 UART: [ldev] ++
1,209,300 UART: [ldev] CDI.KEYID = 6
1,209,664 UART: [ldev] SUBJECT.KEYID = 5
1,210,091 UART: [ldev] AUTHORITY.KEYID = 7
1,210,554 UART: [ldev] FE.KEYID = 1
1,215,764 UART: [ldev] Erasing FE.KEYID = 1
1,242,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,346 UART: [ldev] --
1,281,698 UART: [fwproc] Wait for Commands...
1,282,489 UART: [fwproc] Recv command 0x46574c44
1,283,222 UART: [fwproc] Recv'd Img size: 112032 bytes
3,095,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,122,887 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,148,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,284,502 >>> mbox cmd response: success
3,285,547 UART: [afmc] ++
3,285,715 UART: [afmc] CDI.KEYID = 6
3,286,078 UART: [afmc] SUBJECT.KEYID = 7
3,286,504 UART: [afmc] AUTHORITY.KEYID = 5
3,322,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,338,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,339,436 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,345,139 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,351,021 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,356,727 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,364,671 UART: [afmc] --
3,365,719 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,365,741 UART: [cold-reset] --
3,366,669 UART: [state] Locking Datavault
3,367,838 UART: [state] Locking PCR0, PCR1 and PCR31
3,368,442 UART: [state] Locking ICCM
3,369,048 UART: [exit] Launching FMC @ 0x40000000
3,374,345 UART:
3,374,361 UART: Running Caliptra FMC ...
3,374,769 UART:
3,374,999 UART: [fmc] Received command: 0x10000000
3,377,168 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,134,368 >>> mbox cmd response: success
3,189,391 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,195,836 UART:
3,195,852 UART: Running Caliptra FMC ...
3,196,260 UART:
3,196,490 UART: [fmc] Received command: 0x10000000
3,198,659 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,501 UART: [kat] SHA2-256
891,051 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,180 UART: [kat] ++
895,332 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,117 UART: [kat] SHA2-512-ACC
906,018 UART: [kat] ECC-384
915,929 UART: [kat] HMAC-384Kdf
920,433 UART: [kat] LMS
1,168,745 UART: [kat] --
1,169,446 UART: [cold-reset] ++
1,169,980 UART: [fht] FHT @ 0x50003400
1,172,478 UART: [idev] ++
1,172,646 UART: [idev] CDI.KEYID = 6
1,173,007 UART: [idev] SUBJECT.KEYID = 7
1,173,432 UART: [idev] UDS.KEYID = 0
1,181,740 UART: [idev] Erasing UDS.KEYID = 0
1,198,380 UART: [idev] Sha1 KeyId Algorithm
1,207,188 UART: [idev] --
1,208,221 UART: [ldev] ++
1,208,389 UART: [ldev] CDI.KEYID = 6
1,208,753 UART: [ldev] SUBJECT.KEYID = 5
1,209,180 UART: [ldev] AUTHORITY.KEYID = 7
1,209,643 UART: [ldev] FE.KEYID = 1
1,214,919 UART: [ldev] Erasing FE.KEYID = 1
1,241,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,037 UART: [ldev] --
1,280,477 UART: [fwproc] Wait for Commands...
1,281,162 UART: [fwproc] Recv command 0x46574c44
1,281,895 UART: [fwproc] Recv'd Img size: 112032 bytes
3,098,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,126,452 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,152,137 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,288,205 >>> mbox cmd response: success
3,289,446 UART: [afmc] ++
3,289,614 UART: [afmc] CDI.KEYID = 6
3,289,977 UART: [afmc] SUBJECT.KEYID = 7
3,290,403 UART: [afmc] AUTHORITY.KEYID = 5
3,325,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,342,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,343,093 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,348,796 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,354,678 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,360,384 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,368,236 UART: [afmc] --
3,369,194 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,369,216 UART: [cold-reset] --
3,369,904 UART: [state] Locking Datavault
3,370,995 UART: [state] Locking PCR0, PCR1 and PCR31
3,371,599 UART: [state] Locking ICCM
3,372,221 UART: [exit] Launching FMC @ 0x40000000
3,377,518 UART:
3,377,534 UART: Running Caliptra FMC ...
3,377,942 UART:
3,378,172 UART: [fmc] Received command: 0x10000000
3,380,341 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,128,335 >>> mbox cmd response: success
3,184,790 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,190,789 UART:
3,190,805 UART: Running Caliptra FMC ...
3,191,213 UART:
3,191,443 UART: [fmc] Received command: 0x10000000
3,193,612 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,093 UART: [state] WD Timer not started. Device not locked for debugging
87,226 UART: [kat] SHA2-256
890,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,905 UART: [kat] ++
895,057 UART: [kat] sha1
899,289 UART: [kat] SHA2-256
901,229 UART: [kat] SHA2-384
903,926 UART: [kat] SHA2-512-ACC
905,827 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,170,009 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,259 UART: [idev] Sha1 KeyId Algorithm
1,206,977 UART: [idev] --
1,207,864 UART: [ldev] ++
1,208,032 UART: [ldev] CDI.KEYID = 6
1,208,396 UART: [ldev] SUBJECT.KEYID = 5
1,208,823 UART: [ldev] AUTHORITY.KEYID = 7
1,209,286 UART: [ldev] FE.KEYID = 1
1,214,754 UART: [ldev] Erasing FE.KEYID = 1
1,241,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,446 UART: [ldev] --
1,280,914 UART: [fwproc] Wait for Commands...
1,281,605 UART: [fwproc] Recv command 0x46574c44
1,282,338 UART: [fwproc] Recv'd Img size: 112032 bytes
3,103,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,130,879 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,156,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,292,622 >>> mbox cmd response: success
3,293,885 UART: [afmc] ++
3,294,053 UART: [afmc] CDI.KEYID = 6
3,294,416 UART: [afmc] SUBJECT.KEYID = 7
3,294,842 UART: [afmc] AUTHORITY.KEYID = 5
3,329,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,346,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,347,198 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,352,901 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,358,783 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,364,489 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,372,207 UART: [afmc] --
3,373,211 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,373,233 UART: [cold-reset] --
3,374,077 UART: [state] Locking Datavault
3,375,032 UART: [state] Locking PCR0, PCR1 and PCR31
3,375,636 UART: [state] Locking ICCM
3,376,230 UART: [exit] Launching FMC @ 0x40000000
3,381,527 UART:
3,381,543 UART: Running Caliptra FMC ...
3,381,951 UART:
3,382,181 UART: [fmc] Received command: 0x10000000
3,384,350 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,128,294 >>> mbox cmd response: success
3,184,187 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,190,672 UART:
3,190,688 UART: Running Caliptra FMC ...
3,191,096 UART:
3,191,326 UART: [fmc] Received command: 0x10000000
3,193,495 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,384 UART: [kat] SHA2-256
902,324 UART: [kat] SHA2-384
905,119 UART: [kat] SHA2-512-ACC
907,020 UART: [kat] ECC-384
916,571 UART: [kat] HMAC-384Kdf
921,249 UART: [kat] LMS
1,169,561 UART: [kat] --
1,170,584 UART: [cold-reset] ++
1,170,988 UART: [fht] FHT @ 0x50003400
1,173,778 UART: [idev] ++
1,173,946 UART: [idev] CDI.KEYID = 6
1,174,307 UART: [idev] SUBJECT.KEYID = 7
1,174,732 UART: [idev] UDS.KEYID = 0
1,182,898 UART: [idev] Erasing UDS.KEYID = 0
1,200,490 UART: [idev] Sha1 KeyId Algorithm
1,209,192 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,909 UART: [ldev] SUBJECT.KEYID = 5
1,211,336 UART: [ldev] AUTHORITY.KEYID = 7
1,211,799 UART: [ldev] FE.KEYID = 1
1,216,809 UART: [ldev] Erasing FE.KEYID = 1
1,243,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,095 UART: [ldev] --
1,282,433 UART: [fwproc] Wait for Commands...
1,283,006 UART: [fwproc] Recv command 0x46574c44
1,283,739 UART: [fwproc] Recv'd Img size: 112032 bytes
3,095,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,122,952 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,148,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,284,701 >>> mbox cmd response: success
3,285,726 UART: [afmc] ++
3,285,894 UART: [afmc] CDI.KEYID = 6
3,286,257 UART: [afmc] SUBJECT.KEYID = 7
3,286,683 UART: [afmc] AUTHORITY.KEYID = 5
3,322,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,338,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,339,459 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,345,162 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,351,044 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,356,750 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,364,630 UART: [afmc] --
3,365,678 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,365,700 UART: [cold-reset] --
3,366,622 UART: [state] Locking Datavault
3,367,433 UART: [state] Locking PCR0, PCR1 and PCR31
3,368,037 UART: [state] Locking ICCM
3,368,645 UART: [exit] Launching FMC @ 0x40000000
3,373,942 UART:
3,373,958 UART: Running Caliptra FMC ...
3,374,366 UART:
3,374,596 UART: [fmc] Received command: 0x10000000
3,376,765 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,133,802 >>> mbox cmd response: success
3,188,871 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,195,438 UART:
3,195,454 UART: Running Caliptra FMC ...
3,195,862 UART:
3,196,092 UART: [fmc] Received command: 0x10000000
3,198,261 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
2,213,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,215,230 UART:
2,215,499 UART: Running Caliptra ROM ...
2,216,642 UART:
2,216,796 UART: [state] CFI Enabled
2,217,677 UART: [state] LifecycleState = Unprovisioned
2,219,360 UART: [state] DebugLocked = No
2,220,394 UART: [state] WD Timer not started. Device not locked for debugging
2,222,878 UART: [kat] SHA2-256
2,223,564 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,226,578 UART: [kat] ++
2,227,023 UART: [kat] sha1
2,227,536 UART: [kat] SHA2-256
2,228,192 UART: [kat] SHA2-384
2,228,849 UART: [kat] SHA2-512-ACC
2,229,647 UART: [kat] ECC-384
3,777,316 UART: [kat] HMAC-384Kdf
3,802,814 UART: [kat] LMS
4,875,969 UART: [kat] --
4,881,237 UART: [cold-reset] ++
4,883,506 UART: [fht] FHT @ 0x50003400
4,895,601 UART: [idev] ++
4,896,283 UART: [idev] CDI.KEYID = 6
4,897,522 UART: [idev] SUBJECT.KEYID = 7
4,898,622 UART: [idev] UDS.KEYID = 0
4,929,259 UART: [idev] Erasing UDS.KEYID = 0
8,242,095 UART: [idev] Sha1 KeyId Algorithm
8,265,588 UART: [idev] --
8,270,839 UART: [ldev] ++
8,271,408 UART: [ldev] CDI.KEYID = 6
8,272,574 UART: [ldev] SUBJECT.KEYID = 5
8,273,792 UART: [ldev] AUTHORITY.KEYID = 7
8,274,946 UART: [ldev] FE.KEYID = 1
8,316,074 UART: [ldev] Erasing FE.KEYID = 1
11,655,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,948,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,965,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,980,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,996,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,018,233 UART: [ldev] --
14,022,860 UART: [fwproc] Wait for Commands...
14,024,396 UART: [fwproc] Recv command 0x4d454153
14,033,425 >>> mbox cmd response data (12 bytes)
14,034,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,034,597 UART: [fwproc] Recv command 0x4d454153
14,043,581 >>> mbox cmd response data (12 bytes)
14,044,030 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,045,583 UART: [fwproc] Recv command 0x4d454153
14,054,504 >>> mbox cmd response data (12 bytes)
14,054,928 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,055,769 UART: [fwproc] Recv command 0x4d454153
14,064,688 >>> mbox cmd response data (12 bytes)
14,065,119 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,066,232 UART: [fwproc] Recv command 0x4d454153
14,075,155 >>> mbox cmd response data (12 bytes)
14,075,579 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,076,631 UART: [fwproc] Recv command 0x4d454153
14,085,486 >>> mbox cmd response data (12 bytes)
14,085,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,086,600 UART: [fwproc] Recv command 0x4d454153
14,095,474 >>> mbox cmd response data (12 bytes)
14,095,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,097,382 UART: [fwproc] Recv command 0x4d454153
14,106,253 >>> mbox cmd response data (12 bytes)
14,107,992 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
14,248,776 UART: [fwproc] Recv command 0x46574c44
14,251,169 UART: [fwproc] Recv'd Img size: 111688 bytes
18,296,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,370,656 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,430,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,748,110 >>> mbox cmd response: success
18,751,591 UART: [afmc] ++
18,752,171 UART: [afmc] CDI.KEYID = 6
18,753,378 UART: [afmc] SUBJECT.KEYID = 7
18,754,533 UART: [afmc] AUTHORITY.KEYID = 5
22,126,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,424,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,426,760 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,442,961 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,459,068 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,474,929 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,496,500 UART: [afmc] --
24,499,300 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,499,661 UART: [cold-reset] --
24,500,802 UART: [state] Locking Datavault
24,505,996 UART: [state] Locking PCR0, PCR1 and PCR31
24,507,701 UART: [state] Locking ICCM
24,509,365 UART: [exit] Launching FMC @ 0x40000000
24,517,987 UART:
24,518,242 UART: Running Caliptra FMC ...
24,519,345 UART:
24,519,520 UART: [fmc] Received command: 0x1000000A
24,526,007 >>> mbox cmd response data (928 bytes)
24,531,131 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,531,578 UART: [fmc] Received command: 0x10000009
24,533,384 >>> mbox cmd response data (48 bytes)
24,535,545 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,536,006 UART: [fmc] Received command: 0x10000003
24,545,980 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,209,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,818,580 >>> mbox cmd response data (12 bytes)
13,819,695 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,827,522 >>> mbox cmd response data (12 bytes)
13,827,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,836,681 >>> mbox cmd response data (12 bytes)
13,837,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,845,672 >>> mbox cmd response data (12 bytes)
13,846,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,853,580 >>> mbox cmd response data (12 bytes)
13,854,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,861,817 >>> mbox cmd response data (12 bytes)
13,862,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,869,818 >>> mbox cmd response data (12 bytes)
13,870,238 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,877,391 >>> mbox cmd response data (12 bytes)
13,879,115 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,502,887 >>> mbox cmd response: success
24,182,511 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,198,982 UART:
24,199,322 UART: Running Caliptra FMC ...
24,200,418 UART:
24,200,566 UART: [fmc] Received command: 0x1000000A
24,207,054 >>> mbox cmd response data (928 bytes)
24,212,394 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,212,838 UART: [fmc] Received command: 0x10000009
24,214,607 >>> mbox cmd response data (48 bytes)
24,216,790 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,217,257 UART: [fmc] Received command: 0x10000003
24,227,227 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
2,218,442 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,219,786 UART:
2,220,039 UART: Running Caliptra ROM ...
2,221,106 UART:
2,221,252 UART: [state] CFI Enabled
2,222,115 UART: [state] LifecycleState = Unprovisioned
2,223,783 UART: [state] DebugLocked = No
2,224,901 UART: [state] WD Timer not started. Device not locked for debugging
2,227,383 UART: [kat] SHA2-256
2,228,048 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,231,060 UART: [kat] ++
2,231,510 UART: [kat] sha1
2,232,016 UART: [kat] SHA2-256
2,232,860 UART: [kat] SHA2-384
2,233,519 UART: [kat] SHA2-512-ACC
2,234,342 UART: [kat] ECC-384
4,096,403 UART: [kat] HMAC-384Kdf
4,108,205 UART: [kat] LMS
5,181,361 UART: [kat] --
5,187,377 UART: [cold-reset] ++
5,189,859 UART: [fht] FHT @ 0x50003400
5,201,755 UART: [idev] ++
5,202,433 UART: [idev] CDI.KEYID = 6
5,203,664 UART: [idev] SUBJECT.KEYID = 7
5,205,090 UART: [idev] UDS.KEYID = 0
5,222,144 UART: [idev] Erasing UDS.KEYID = 0
8,495,141 UART: [idev] Sha1 KeyId Algorithm
8,517,235 UART: [idev] --
8,521,223 UART: [ldev] ++
8,521,786 UART: [ldev] CDI.KEYID = 6
8,522,941 UART: [ldev] SUBJECT.KEYID = 5
8,524,473 UART: [ldev] AUTHORITY.KEYID = 7
8,525,970 UART: [ldev] FE.KEYID = 1
8,538,567 UART: [ldev] Erasing FE.KEYID = 1
11,831,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,329 UART: [ldev] --
14,195,889 UART: [fwproc] Wait for Commands...
14,198,895 UART: [fwproc] Recv command 0x4d454153
14,207,905 >>> mbox cmd response data (12 bytes)
14,208,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,210,274 UART: [fwproc] Recv command 0x4d454153
14,219,218 >>> mbox cmd response data (12 bytes)
14,219,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,220,931 UART: [fwproc] Recv command 0x4d454153
14,229,873 >>> mbox cmd response data (12 bytes)
14,230,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,231,329 UART: [fwproc] Recv command 0x4d454153
14,240,205 >>> mbox cmd response data (12 bytes)
14,240,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,241,984 UART: [fwproc] Recv command 0x4d454153
14,250,898 >>> mbox cmd response data (12 bytes)
14,251,302 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,251,963 UART: [fwproc] Recv command 0x4d454153
14,260,828 >>> mbox cmd response data (12 bytes)
14,261,234 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,262,598 UART: [fwproc] Recv command 0x4d454153
14,271,510 >>> mbox cmd response data (12 bytes)
14,271,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,272,419 UART: [fwproc] Recv command 0x4d454153
14,281,333 >>> mbox cmd response data (12 bytes)
14,283,017 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
14,423,817 UART: [fwproc] Recv command 0x46574c44
14,426,221 UART: [fwproc] Recv'd Img size: 111688 bytes
18,471,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,546,588 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,606,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,923,681 >>> mbox cmd response: success
18,928,393 UART: [afmc] ++
18,928,982 UART: [afmc] CDI.KEYID = 6
18,930,088 UART: [afmc] SUBJECT.KEYID = 7
18,931,299 UART: [afmc] AUTHORITY.KEYID = 5
22,247,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,541,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,543,634 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,559,778 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,575,922 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,591,737 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,614,661 UART: [afmc] --
24,618,625 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,618,989 UART: [cold-reset] --
24,623,581 UART: [state] Locking Datavault
24,630,553 UART: [state] Locking PCR0, PCR1 and PCR31
24,632,187 UART: [state] Locking ICCM
24,633,487 UART: [exit] Launching FMC @ 0x40000000
24,642,104 UART:
24,642,331 UART: Running Caliptra FMC ...
24,643,349 UART:
24,643,487 UART: [fmc] Received command: 0x1000000A
24,650,123 >>> mbox cmd response data (928 bytes)
24,655,338 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,655,782 UART: [fmc] Received command: 0x10000009
24,657,583 >>> mbox cmd response data (48 bytes)
24,659,799 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,660,263 UART: [fmc] Received command: 0x10000003
24,670,230 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,215,887 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,019,998 >>> mbox cmd response data (12 bytes)
14,021,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,029,591 >>> mbox cmd response data (12 bytes)
14,030,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,037,445 >>> mbox cmd response data (12 bytes)
14,037,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,045,828 >>> mbox cmd response data (12 bytes)
14,046,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,053,882 >>> mbox cmd response data (12 bytes)
14,054,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,061,445 >>> mbox cmd response data (12 bytes)
14,061,858 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,069,327 >>> mbox cmd response data (12 bytes)
14,069,749 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,077,815 >>> mbox cmd response data (12 bytes)
14,079,578 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,693,886 >>> mbox cmd response: success
24,317,192 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,335,118 UART:
24,335,439 UART: Running Caliptra FMC ...
24,336,504 UART:
24,336,647 UART: [fmc] Received command: 0x1000000A
24,343,145 >>> mbox cmd response data (928 bytes)
24,348,411 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,348,845 UART: [fmc] Received command: 0x10000009
24,350,612 >>> mbox cmd response data (48 bytes)
24,352,793 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,353,258 UART: [fmc] Received command: 0x10000003
24,363,217 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,782 writing to cptra_bootfsm_go
2,217,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,218,415 UART:
2,218,689 UART: Running Caliptra ROM ...
2,219,757 UART:
2,219,911 UART: [state] CFI Enabled
2,220,779 UART: [state] LifecycleState = Unprovisioned
2,222,450 UART: [state] DebugLocked = No
2,223,518 UART: [state] WD Timer not started. Device not locked for debugging
2,225,994 UART: [kat] SHA2-256
2,226,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,229,686 UART: [kat] ++
2,230,141 UART: [kat] sha1
2,230,654 UART: [kat] SHA2-256
2,231,395 UART: [kat] SHA2-384
2,232,062 UART: [kat] SHA2-512-ACC
2,232,890 UART: [kat] ECC-384
2,943,781 UART: [kat] HMAC-384Kdf
2,969,856 UART: [kat] LMS
3,499,331 UART: [kat] --
3,504,762 UART: [cold-reset] ++
3,505,730 UART: [fht] FHT @ 0x50003400
3,517,849 UART: [idev] ++
3,518,414 UART: [idev] CDI.KEYID = 6
3,519,320 UART: [idev] SUBJECT.KEYID = 7
3,520,535 UART: [idev] UDS.KEYID = 0
3,541,858 UART: [idev] Erasing UDS.KEYID = 0
6,025,616 UART: [idev] Sha1 KeyId Algorithm
6,048,596 UART: [idev] --
6,052,383 UART: [ldev] ++
6,052,962 UART: [ldev] CDI.KEYID = 6
6,053,850 UART: [ldev] SUBJECT.KEYID = 5
6,055,067 UART: [ldev] AUTHORITY.KEYID = 7
6,056,305 UART: [ldev] FE.KEYID = 1
6,100,035 UART: [ldev] Erasing FE.KEYID = 1
8,601,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,872 UART: [ldev] --
10,415,369 UART: [fwproc] Wait for Commands...
10,416,878 UART: [fwproc] Recv command 0x4d454153
10,425,407 >>> mbox cmd response data (12 bytes)
10,425,973 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,426,993 UART: [fwproc] Recv command 0x4d454153
10,435,484 >>> mbox cmd response data (12 bytes)
10,435,911 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,436,913 UART: [fwproc] Recv command 0x4d454153
10,445,391 >>> mbox cmd response data (12 bytes)
10,445,832 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,446,609 UART: [fwproc] Recv command 0x4d454153
10,455,032 >>> mbox cmd response data (12 bytes)
10,455,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,456,878 UART: [fwproc] Recv command 0x4d454153
10,465,298 >>> mbox cmd response data (12 bytes)
10,465,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,466,702 UART: [fwproc] Recv command 0x4d454153
10,475,180 >>> mbox cmd response data (12 bytes)
10,475,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,476,381 UART: [fwproc] Recv command 0x4d454153
10,484,823 >>> mbox cmd response data (12 bytes)
10,485,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,486,335 UART: [fwproc] Recv command 0x4d454153
10,494,819 >>> mbox cmd response data (12 bytes)
10,496,507 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,637,702 UART: [fwproc] Recv command 0x46574c44
10,639,874 UART: [fwproc] Recv'd Img size: 112032 bytes
14,012,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,083,126 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,143,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,461,094 >>> mbox cmd response: success
14,465,765 UART: [afmc] ++
14,466,350 UART: [afmc] CDI.KEYID = 6
14,467,234 UART: [afmc] SUBJECT.KEYID = 7
14,468,448 UART: [afmc] AUTHORITY.KEYID = 5
17,003,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,745,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,747,533 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,763,608 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,779,663 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,795,332 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,818,130 UART: [afmc] --
18,821,750 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,822,106 UART: [cold-reset] --
18,825,401 UART: [state] Locking Datavault
18,831,626 UART: [state] Locking PCR0, PCR1 and PCR31
18,833,272 UART: [state] Locking ICCM
18,835,718 UART: [exit] Launching FMC @ 0x40000000
18,844,115 UART:
18,844,352 UART: Running Caliptra FMC ...
18,845,454 UART:
18,845,609 UART: [fmc] Received command: 0x1000000A
18,852,145 >>> mbox cmd response data (928 bytes)
18,857,257 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,857,686 UART: [fmc] Received command: 0x10000009
18,859,492 >>> mbox cmd response data (48 bytes)
18,861,640 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,862,123 UART: [fmc] Received command: 0x10000003
18,872,043 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,212,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,204,842 >>> mbox cmd response data (12 bytes)
10,205,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,213,068 >>> mbox cmd response data (12 bytes)
10,213,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,220,575 >>> mbox cmd response data (12 bytes)
10,220,998 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,228,091 >>> mbox cmd response data (12 bytes)
10,228,510 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,236,198 >>> mbox cmd response data (12 bytes)
10,236,619 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,244,305 >>> mbox cmd response data (12 bytes)
10,244,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,252,145 >>> mbox cmd response data (12 bytes)
10,252,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,259,927 >>> mbox cmd response data (12 bytes)
10,261,656 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,236,033 >>> mbox cmd response: success
18,513,619 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,529,588 UART:
18,529,918 UART: Running Caliptra FMC ...
18,531,087 UART:
18,531,249 UART: [fmc] Received command: 0x1000000A
18,537,730 >>> mbox cmd response data (928 bytes)
18,542,967 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,543,400 UART: [fmc] Received command: 0x10000009
18,545,207 >>> mbox cmd response data (48 bytes)
18,547,381 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,547,845 UART: [fmc] Received command: 0x10000003
18,557,796 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,223,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,225,043 UART:
2,225,305 UART: Running Caliptra ROM ...
2,226,390 UART:
2,226,563 UART: [state] CFI Enabled
2,227,433 UART: [state] LifecycleState = Unprovisioned
2,229,047 UART: [state] DebugLocked = No
2,230,178 UART: [state] WD Timer not started. Device not locked for debugging
2,232,649 UART: [kat] SHA2-256
2,233,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,236,315 UART: [kat] ++
2,236,764 UART: [kat] sha1
2,237,272 UART: [kat] SHA2-256
2,237,928 UART: [kat] SHA2-384
2,238,583 UART: [kat] SHA2-512-ACC
2,239,419 UART: [kat] ECC-384
3,282,310 UART: [kat] HMAC-384Kdf
3,293,489 UART: [kat] LMS
3,822,968 UART: [kat] --
3,826,638 UART: [cold-reset] ++
3,829,179 UART: [fht] FHT @ 0x50003400
3,840,807 UART: [idev] ++
3,841,374 UART: [idev] CDI.KEYID = 6
3,842,255 UART: [idev] SUBJECT.KEYID = 7
3,843,464 UART: [idev] UDS.KEYID = 0
3,857,983 UART: [idev] Erasing UDS.KEYID = 0
6,313,198 UART: [idev] Sha1 KeyId Algorithm
6,337,059 UART: [idev] --
6,341,089 UART: [ldev] ++
6,341,674 UART: [ldev] CDI.KEYID = 6
6,342,559 UART: [ldev] SUBJECT.KEYID = 5
6,343,771 UART: [ldev] AUTHORITY.KEYID = 7
6,345,002 UART: [ldev] FE.KEYID = 1
6,356,028 UART: [ldev] Erasing FE.KEYID = 1
8,828,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,540 UART: [ldev] --
10,617,566 UART: [fwproc] Wait for Commands...
10,619,283 UART: [fwproc] Recv command 0x4d454153
10,627,810 >>> mbox cmd response data (12 bytes)
10,628,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,629,628 UART: [fwproc] Recv command 0x4d454153
10,638,112 >>> mbox cmd response data (12 bytes)
10,638,544 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,640,251 UART: [fwproc] Recv command 0x4d454153
10,648,750 >>> mbox cmd response data (12 bytes)
10,649,217 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,650,651 UART: [fwproc] Recv command 0x4d454153
10,659,136 >>> mbox cmd response data (12 bytes)
10,659,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,660,205 UART: [fwproc] Recv command 0x4d454153
10,668,685 >>> mbox cmd response data (12 bytes)
10,669,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,670,483 UART: [fwproc] Recv command 0x4d454153
10,678,905 >>> mbox cmd response data (12 bytes)
10,679,337 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,680,227 UART: [fwproc] Recv command 0x4d454153
10,688,663 >>> mbox cmd response data (12 bytes)
10,689,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,690,093 UART: [fwproc] Recv command 0x4d454153
10,698,577 >>> mbox cmd response data (12 bytes)
10,700,311 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,841,958 UART: [fwproc] Recv command 0x46574c44
10,844,080 UART: [fwproc] Recv'd Img size: 112032 bytes
14,218,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,297,133 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,357,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,675,763 >>> mbox cmd response: success
14,679,872 UART: [afmc] ++
14,680,463 UART: [afmc] CDI.KEYID = 6
14,681,348 UART: [afmc] SUBJECT.KEYID = 7
14,682,559 UART: [afmc] AUTHORITY.KEYID = 5
17,183,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,903,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,905,658 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,921,758 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,937,788 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,953,486 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,976,416 UART: [afmc] --
18,979,432 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,979,813 UART: [cold-reset] --
18,982,380 UART: [state] Locking Datavault
18,988,653 UART: [state] Locking PCR0, PCR1 and PCR31
18,990,293 UART: [state] Locking ICCM
18,992,339 UART: [exit] Launching FMC @ 0x40000000
19,000,731 UART:
19,000,978 UART: Running Caliptra FMC ...
19,002,083 UART:
19,002,250 UART: [fmc] Received command: 0x1000000A
19,008,741 >>> mbox cmd response data (928 bytes)
19,013,925 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,014,371 UART: [fmc] Received command: 0x10000009
19,016,180 >>> mbox cmd response data (48 bytes)
19,018,385 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,018,850 UART: [fmc] Received command: 0x10000003
19,028,820 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
2,217,185 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,414,513 >>> mbox cmd response data (12 bytes)
10,415,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,422,908 >>> mbox cmd response data (12 bytes)
10,423,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,431,244 >>> mbox cmd response data (12 bytes)
10,431,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,439,647 >>> mbox cmd response data (12 bytes)
10,440,072 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,447,827 >>> mbox cmd response data (12 bytes)
10,448,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,455,583 >>> mbox cmd response data (12 bytes)
10,456,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,463,976 >>> mbox cmd response data (12 bytes)
10,464,405 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,471,888 >>> mbox cmd response data (12 bytes)
10,473,637 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,443,984 >>> mbox cmd response: success
18,679,155 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,692,564 UART:
18,692,925 UART: Running Caliptra FMC ...
18,694,129 UART:
18,694,314 UART: [fmc] Received command: 0x1000000A
18,700,654 >>> mbox cmd response data (928 bytes)
18,705,954 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,706,410 UART: [fmc] Received command: 0x10000009
18,708,214 >>> mbox cmd response data (48 bytes)
18,710,363 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,710,834 UART: [fmc] Received command: 0x10000003
18,720,775 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,218,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,200,582 >>> mbox cmd response data (12 bytes)
10,201,582 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,208,636 >>> mbox cmd response data (12 bytes)
10,209,087 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,216,947 >>> mbox cmd response data (12 bytes)
10,217,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,225,011 >>> mbox cmd response data (12 bytes)
10,225,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,233,058 >>> mbox cmd response data (12 bytes)
10,233,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,240,947 >>> mbox cmd response data (12 bytes)
10,241,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,249,293 >>> mbox cmd response data (12 bytes)
10,249,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,257,550 >>> mbox cmd response data (12 bytes)
10,259,322 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,233,697 >>> mbox cmd response: success
18,512,099 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,527,662 UART:
18,527,992 UART: Running Caliptra FMC ...
18,529,140 UART:
18,529,316 UART: [fmc] Received command: 0x1000000A
18,535,739 >>> mbox cmd response data (928 bytes)
18,540,952 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,541,403 UART: [fmc] Received command: 0x10000009
18,543,202 >>> mbox cmd response data (48 bytes)
18,545,302 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,545,766 UART: [fmc] Received command: 0x10000003
18,555,724 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
2,218,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,415,785 >>> mbox cmd response data (12 bytes)
10,416,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,424,563 >>> mbox cmd response data (12 bytes)
10,425,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,432,903 >>> mbox cmd response data (12 bytes)
10,433,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,441,201 >>> mbox cmd response data (12 bytes)
10,441,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,449,265 >>> mbox cmd response data (12 bytes)
10,449,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,458,048 >>> mbox cmd response data (12 bytes)
10,458,517 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,465,969 >>> mbox cmd response data (12 bytes)
10,466,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,473,397 >>> mbox cmd response data (12 bytes)
10,475,125 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,440,917 >>> mbox cmd response: success
18,670,950 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,687,133 UART:
18,687,456 UART: Running Caliptra FMC ...
18,688,622 UART:
18,688,782 UART: [fmc] Received command: 0x1000000A
18,695,217 >>> mbox cmd response data (928 bytes)
18,700,416 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,700,861 UART: [fmc] Received command: 0x10000009
18,702,664 >>> mbox cmd response data (48 bytes)
18,704,775 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,705,237 UART: [fmc] Received command: 0x10000003
18,715,153 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,602 UART: [kat] LMS
1,168,914 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,198,437 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,502 UART: [ldev] ++
1,208,670 UART: [ldev] CDI.KEYID = 6
1,209,034 UART: [ldev] SUBJECT.KEYID = 5
1,209,461 UART: [ldev] AUTHORITY.KEYID = 7
1,209,924 UART: [ldev] FE.KEYID = 1
1,215,312 UART: [ldev] Erasing FE.KEYID = 1
1,241,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,384 UART: [ldev] --
1,280,650 UART: [fwproc] Wait for Commands...
1,281,361 UART: [fwproc] Recv command 0x4d454153
1,285,388 >>> mbox cmd response data (12 bytes)
1,285,389 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,644 UART: [fwproc] Recv command 0x4d454153
1,289,671 >>> mbox cmd response data (12 bytes)
1,289,672 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,985 UART: [fwproc] Recv command 0x4d454153
1,294,012 >>> mbox cmd response data (12 bytes)
1,294,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,282 UART: [fwproc] Recv command 0x4d454153
1,298,309 >>> mbox cmd response data (12 bytes)
1,298,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,625 UART: [fwproc] Recv command 0x4d454153
1,302,652 >>> mbox cmd response data (12 bytes)
1,302,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,770 UART: [fwproc] Recv command 0x4d454153
1,306,797 >>> mbox cmd response data (12 bytes)
1,306,798 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,103 UART: [fwproc] Recv command 0x4d454153
1,311,130 >>> mbox cmd response data (12 bytes)
1,311,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,224 UART: [fwproc] Recv command 0x4d454153
1,315,251 >>> mbox cmd response data (12 bytes)
1,315,252 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,315,419 UART: [fwproc] Recv command 0x46574c44
1,316,152 UART: [fwproc] Recv'd Img size: 112032 bytes
2,586,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,645 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,330 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,284 >>> mbox cmd response: success
2,776,397 UART: [afmc] ++
2,776,565 UART: [afmc] CDI.KEYID = 6
2,776,928 UART: [afmc] SUBJECT.KEYID = 7
2,777,354 UART: [afmc] AUTHORITY.KEYID = 5
2,813,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,294 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,835,990 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,841,889 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,847,582 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,855,310 UART: [afmc] --
2,856,252 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,856,274 UART: [cold-reset] --
2,856,974 UART: [state] Locking Datavault
2,857,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,583 UART: [state] Locking ICCM
2,859,175 UART: [exit] Launching FMC @ 0x40000000
2,864,472 UART:
2,864,488 UART: Running Caliptra FMC ...
2,864,896 UART:
2,865,126 UART: [fmc] Received command: 0x1000000A
2,871,357 >>> mbox cmd response data (928 bytes)
2,871,358 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,871,387 UART: [fmc] Received command: 0x10000009
2,872,585 >>> mbox cmd response data (48 bytes)
2,872,586 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,615 UART: [fmc] Received command: 0x10000003
2,882,071 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,838 >>> mbox cmd response data (12 bytes)
1,137,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,278 >>> mbox cmd response data (12 bytes)
1,141,279 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,738 >>> mbox cmd response data (12 bytes)
1,144,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,274 >>> mbox cmd response data (12 bytes)
1,148,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,660 >>> mbox cmd response data (12 bytes)
1,151,661 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,134 >>> mbox cmd response data (12 bytes)
1,155,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,574 >>> mbox cmd response data (12 bytes)
1,158,575 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,176 >>> mbox cmd response data (12 bytes)
1,162,177 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,618,564 >>> mbox cmd response: success
2,674,519 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,568 UART:
2,680,584 UART: Running Caliptra FMC ...
2,680,992 UART:
2,681,222 UART: [fmc] Received command: 0x1000000A
2,687,453 >>> mbox cmd response data (928 bytes)
2,687,454 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,687,483 UART: [fmc] Received command: 0x10000009
2,688,681 >>> mbox cmd response data (48 bytes)
2,688,682 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,711 UART: [fmc] Received command: 0x10000003
2,698,167 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,831 UART: [kat] SHA2-512-ACC
906,732 UART: [kat] ECC-384
916,645 UART: [kat] HMAC-384Kdf
921,197 UART: [kat] LMS
1,169,509 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,880 UART: [fht] FHT @ 0x50003400
1,173,558 UART: [idev] ++
1,173,726 UART: [idev] CDI.KEYID = 6
1,174,087 UART: [idev] SUBJECT.KEYID = 7
1,174,512 UART: [idev] UDS.KEYID = 0
1,182,750 UART: [idev] Erasing UDS.KEYID = 0
1,199,794 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,783 UART: [ldev] ++
1,209,951 UART: [ldev] CDI.KEYID = 6
1,210,315 UART: [ldev] SUBJECT.KEYID = 5
1,210,742 UART: [ldev] AUTHORITY.KEYID = 7
1,211,205 UART: [ldev] FE.KEYID = 1
1,216,385 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,243 UART: [ldev] --
1,282,593 UART: [fwproc] Wait for Commands...
1,283,378 UART: [fwproc] Recv command 0x4d454153
1,287,405 >>> mbox cmd response data (12 bytes)
1,287,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,701 UART: [fwproc] Recv command 0x4d454153
1,291,728 >>> mbox cmd response data (12 bytes)
1,291,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,292,034 UART: [fwproc] Recv command 0x4d454153
1,296,061 >>> mbox cmd response data (12 bytes)
1,296,062 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,183 UART: [fwproc] Recv command 0x4d454153
1,300,210 >>> mbox cmd response data (12 bytes)
1,300,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,474 UART: [fwproc] Recv command 0x4d454153
1,304,501 >>> mbox cmd response data (12 bytes)
1,304,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,663 UART: [fwproc] Recv command 0x4d454153
1,308,690 >>> mbox cmd response data (12 bytes)
1,308,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,926 UART: [fwproc] Recv command 0x4d454153
1,312,953 >>> mbox cmd response data (12 bytes)
1,312,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,241 UART: [fwproc] Recv command 0x4d454153
1,317,268 >>> mbox cmd response data (12 bytes)
1,317,269 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,317,332 UART: [fwproc] Recv command 0x46574c44
1,318,065 UART: [fwproc] Recv'd Img size: 112032 bytes
2,588,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,486 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,642,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,293 >>> mbox cmd response: success
2,779,460 UART: [afmc] ++
2,779,628 UART: [afmc] CDI.KEYID = 6
2,779,991 UART: [afmc] SUBJECT.KEYID = 7
2,780,417 UART: [afmc] AUTHORITY.KEYID = 5
2,816,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,055 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,751 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,650 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,343 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,079 UART: [afmc] --
2,859,961 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,859,983 UART: [cold-reset] --
2,860,785 UART: [state] Locking Datavault
2,861,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,534 UART: [state] Locking ICCM
2,863,160 UART: [exit] Launching FMC @ 0x40000000
2,868,457 UART:
2,868,473 UART: Running Caliptra FMC ...
2,868,881 UART:
2,869,111 UART: [fmc] Received command: 0x1000000A
2,875,342 >>> mbox cmd response data (928 bytes)
2,875,343 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,875,372 UART: [fmc] Received command: 0x10000009
2,876,570 >>> mbox cmd response data (48 bytes)
2,876,571 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,876,600 UART: [fmc] Received command: 0x10000003
2,886,056 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,043 >>> mbox cmd response data (12 bytes)
1,142,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,661 >>> mbox cmd response data (12 bytes)
1,145,662 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,271 >>> mbox cmd response data (12 bytes)
1,149,272 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,693 >>> mbox cmd response data (12 bytes)
1,152,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,279 >>> mbox cmd response data (12 bytes)
1,156,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,743 >>> mbox cmd response data (12 bytes)
1,159,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,125 >>> mbox cmd response data (12 bytes)
1,163,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,679 >>> mbox cmd response data (12 bytes)
1,166,680 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,621,759 >>> mbox cmd response: success
2,678,360 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,684,653 UART:
2,684,669 UART: Running Caliptra FMC ...
2,685,077 UART:
2,685,307 UART: [fmc] Received command: 0x1000000A
2,691,538 >>> mbox cmd response data (928 bytes)
2,691,539 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,691,568 UART: [fmc] Received command: 0x10000009
2,692,766 >>> mbox cmd response data (48 bytes)
2,692,767 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,692,796 UART: [fmc] Received command: 0x10000003
2,702,252 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,798 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,051 UART: [fht] FHT @ 0x50003400
1,172,775 UART: [idev] ++
1,172,943 UART: [idev] CDI.KEYID = 6
1,173,304 UART: [idev] SUBJECT.KEYID = 7
1,173,729 UART: [idev] UDS.KEYID = 0
1,182,061 UART: [idev] Erasing UDS.KEYID = 0
1,199,721 UART: [idev] Sha1 KeyId Algorithm
1,208,729 UART: [idev] --
1,209,768 UART: [ldev] ++
1,209,936 UART: [ldev] CDI.KEYID = 6
1,210,300 UART: [ldev] SUBJECT.KEYID = 5
1,210,727 UART: [ldev] AUTHORITY.KEYID = 7
1,211,190 UART: [ldev] FE.KEYID = 1
1,216,414 UART: [ldev] Erasing FE.KEYID = 1
1,242,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,342 UART: [ldev] --
1,281,700 UART: [fwproc] Wait for Commands...
1,282,383 UART: [fwproc] Recv command 0x4d454153
1,286,410 >>> mbox cmd response data (12 bytes)
1,286,411 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,658 UART: [fwproc] Recv command 0x4d454153
1,290,685 >>> mbox cmd response data (12 bytes)
1,290,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,901 UART: [fwproc] Recv command 0x4d454153
1,294,928 >>> mbox cmd response data (12 bytes)
1,294,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,180 UART: [fwproc] Recv command 0x4d454153
1,299,207 >>> mbox cmd response data (12 bytes)
1,299,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,375 UART: [fwproc] Recv command 0x4d454153
1,303,402 >>> mbox cmd response data (12 bytes)
1,303,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,600 UART: [fwproc] Recv command 0x4d454153
1,307,627 >>> mbox cmd response data (12 bytes)
1,307,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,909 UART: [fwproc] Recv command 0x4d454153
1,311,936 >>> mbox cmd response data (12 bytes)
1,311,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,144 UART: [fwproc] Recv command 0x4d454153
1,316,171 >>> mbox cmd response data (12 bytes)
1,316,172 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,316,257 UART: [fwproc] Recv command 0x46574c44
1,316,990 UART: [fwproc] Recv'd Img size: 112032 bytes
2,587,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,599 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,186 >>> mbox cmd response: success
2,777,351 UART: [afmc] ++
2,777,519 UART: [afmc] CDI.KEYID = 6
2,777,882 UART: [afmc] SUBJECT.KEYID = 7
2,778,308 UART: [afmc] AUTHORITY.KEYID = 5
2,813,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,308 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,004 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,842,903 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,596 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,648 UART: [afmc] --
2,857,624 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,857,646 UART: [cold-reset] --
2,858,524 UART: [state] Locking Datavault
2,859,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,419 UART: [state] Locking ICCM
2,860,891 UART: [exit] Launching FMC @ 0x40000000
2,866,188 UART:
2,866,204 UART: Running Caliptra FMC ...
2,866,612 UART:
2,866,842 UART: [fmc] Received command: 0x1000000A
2,873,073 >>> mbox cmd response data (928 bytes)
2,873,074 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,873,103 UART: [fmc] Received command: 0x10000009
2,874,301 >>> mbox cmd response data (48 bytes)
2,874,302 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,874,331 UART: [fmc] Received command: 0x10000003
2,883,787 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,654 >>> mbox cmd response data (12 bytes)
1,139,655 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,250 >>> mbox cmd response data (12 bytes)
1,143,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,678 >>> mbox cmd response data (12 bytes)
1,146,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,134 >>> mbox cmd response data (12 bytes)
1,150,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,744 >>> mbox cmd response data (12 bytes)
1,153,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,268 >>> mbox cmd response data (12 bytes)
1,157,269 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,794 >>> mbox cmd response data (12 bytes)
1,160,795 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,278 >>> mbox cmd response data (12 bytes)
1,164,279 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,620,184 >>> mbox cmd response: success
2,676,165 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,682,480 UART:
2,682,496 UART: Running Caliptra FMC ...
2,682,904 UART:
2,683,134 UART: [fmc] Received command: 0x1000000A
2,689,365 >>> mbox cmd response data (928 bytes)
2,689,366 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,689,395 UART: [fmc] Received command: 0x10000009
2,690,593 >>> mbox cmd response data (48 bytes)
2,690,594 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,690,623 UART: [fmc] Received command: 0x10000003
2,700,079 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,876 UART: [kat] ++
896,028 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
905,061 UART: [kat] SHA2-512-ACC
906,962 UART: [kat] ECC-384
916,715 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,158 UART: [cold-reset] ++
1,170,548 UART: [fht] FHT @ 0x50003400
1,173,164 UART: [idev] ++
1,173,332 UART: [idev] CDI.KEYID = 6
1,173,693 UART: [idev] SUBJECT.KEYID = 7
1,174,118 UART: [idev] UDS.KEYID = 0
1,182,222 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,208,378 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,309 UART: [fwproc] Wait for Commands...
1,283,132 UART: [fwproc] Recv command 0x4d454153
1,287,159 >>> mbox cmd response data (12 bytes)
1,287,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,431 UART: [fwproc] Recv command 0x4d454153
1,291,458 >>> mbox cmd response data (12 bytes)
1,291,459 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,720 UART: [fwproc] Recv command 0x4d454153
1,295,747 >>> mbox cmd response data (12 bytes)
1,295,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,811 UART: [fwproc] Recv command 0x4d454153
1,299,838 >>> mbox cmd response data (12 bytes)
1,299,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,974 UART: [fwproc] Recv command 0x4d454153
1,304,001 >>> mbox cmd response data (12 bytes)
1,304,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,255 UART: [fwproc] Recv command 0x4d454153
1,308,282 >>> mbox cmd response data (12 bytes)
1,308,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,478 UART: [fwproc] Recv command 0x4d454153
1,312,505 >>> mbox cmd response data (12 bytes)
1,312,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,767 UART: [fwproc] Recv command 0x4d454153
1,316,794 >>> mbox cmd response data (12 bytes)
1,316,795 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,316,944 UART: [fwproc] Recv command 0x46574c44
1,317,677 UART: [fwproc] Recv'd Img size: 112032 bytes
2,589,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,260 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,945 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,893 >>> mbox cmd response: success
2,779,088 UART: [afmc] ++
2,779,256 UART: [afmc] CDI.KEYID = 6
2,779,619 UART: [afmc] SUBJECT.KEYID = 7
2,780,045 UART: [afmc] AUTHORITY.KEYID = 5
2,815,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,035 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,731 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,630 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,323 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,195 UART: [afmc] --
2,859,149 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,859,171 UART: [cold-reset] --
2,859,859 UART: [state] Locking Datavault
2,860,896 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,500 UART: [state] Locking ICCM
2,862,152 UART: [exit] Launching FMC @ 0x40000000
2,867,449 UART:
2,867,465 UART: Running Caliptra FMC ...
2,867,873 UART:
2,868,103 UART: [fmc] Received command: 0x1000000A
2,874,334 >>> mbox cmd response data (928 bytes)
2,874,335 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,874,364 UART: [fmc] Received command: 0x10000009
2,875,562 >>> mbox cmd response data (48 bytes)
2,875,563 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,875,592 UART: [fmc] Received command: 0x10000003
2,885,048 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,285 >>> mbox cmd response data (12 bytes)
1,139,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,827 >>> mbox cmd response data (12 bytes)
1,142,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,245 >>> mbox cmd response data (12 bytes)
1,146,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,681 >>> mbox cmd response data (12 bytes)
1,149,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,219 >>> mbox cmd response data (12 bytes)
1,153,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,743 >>> mbox cmd response data (12 bytes)
1,156,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,339 >>> mbox cmd response data (12 bytes)
1,160,340 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,893 >>> mbox cmd response data (12 bytes)
1,163,894 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,621,357 >>> mbox cmd response: success
2,676,420 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,682,303 UART:
2,682,319 UART: Running Caliptra FMC ...
2,682,727 UART:
2,682,957 UART: [fmc] Received command: 0x1000000A
2,689,188 >>> mbox cmd response data (928 bytes)
2,689,189 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,689,218 UART: [fmc] Received command: 0x10000009
2,690,416 >>> mbox cmd response data (48 bytes)
2,690,417 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,690,446 UART: [fmc] Received command: 0x10000003
2,699,902 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,690 UART: [state] LifecycleState = Unprovisioned
85,345 UART: [state] DebugLocked = No
85,919 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [kat] SHA2-256
890,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,867 UART: [kat] ++
895,019 UART: [kat] sha1
899,249 UART: [kat] SHA2-256
901,189 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
915,116 UART: [kat] HMAC-384Kdf
919,532 UART: [kat] LMS
1,167,844 UART: [kat] --
1,168,555 UART: [cold-reset] ++
1,168,983 UART: [fht] FHT @ 0x50003400
1,171,727 UART: [idev] ++
1,171,895 UART: [idev] CDI.KEYID = 6
1,172,256 UART: [idev] SUBJECT.KEYID = 7
1,172,681 UART: [idev] UDS.KEYID = 0
1,180,557 UART: [idev] Erasing UDS.KEYID = 0
1,197,451 UART: [idev] Sha1 KeyId Algorithm
1,206,513 UART: [idev] --
1,207,702 UART: [ldev] ++
1,207,870 UART: [ldev] CDI.KEYID = 6
1,208,234 UART: [ldev] SUBJECT.KEYID = 5
1,208,661 UART: [ldev] AUTHORITY.KEYID = 7
1,209,124 UART: [ldev] FE.KEYID = 1
1,214,386 UART: [ldev] Erasing FE.KEYID = 1
1,240,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,728 UART: [ldev] --
1,280,036 UART: [fwproc] Wait for Commands...
1,280,649 UART: [fwproc] Recv command 0x4d454153
1,284,676 >>> mbox cmd response data (12 bytes)
1,284,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,888 UART: [fwproc] Recv command 0x4d454153
1,288,915 >>> mbox cmd response data (12 bytes)
1,288,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,013 UART: [fwproc] Recv command 0x4d454153
1,293,040 >>> mbox cmd response data (12 bytes)
1,293,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,340 UART: [fwproc] Recv command 0x4d454153
1,297,367 >>> mbox cmd response data (12 bytes)
1,297,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,667 UART: [fwproc] Recv command 0x4d454153
1,301,694 >>> mbox cmd response data (12 bytes)
1,301,695 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,812 UART: [fwproc] Recv command 0x4d454153
1,305,839 >>> mbox cmd response data (12 bytes)
1,305,840 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,903 UART: [fwproc] Recv command 0x4d454153
1,309,930 >>> mbox cmd response data (12 bytes)
1,309,931 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,240 UART: [fwproc] Recv command 0x4d454153
1,314,267 >>> mbox cmd response data (12 bytes)
1,314,268 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,314,505 UART: [fwproc] Recv command 0x46574c44
1,315,238 UART: [fwproc] Recv'd Img size: 112032 bytes
2,586,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,231 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,810 >>> mbox cmd response: success
2,776,833 UART: [afmc] ++
2,777,001 UART: [afmc] CDI.KEYID = 6
2,777,364 UART: [afmc] SUBJECT.KEYID = 7
2,777,790 UART: [afmc] AUTHORITY.KEYID = 5
2,813,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,714 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,836,410 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,842,309 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,002 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,070 UART: [afmc] --
2,857,016 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,857,038 UART: [cold-reset] --
2,857,726 UART: [state] Locking Datavault
2,858,893 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,497 UART: [state] Locking ICCM
2,860,087 UART: [exit] Launching FMC @ 0x40000000
2,865,384 UART:
2,865,400 UART: Running Caliptra FMC ...
2,865,808 UART:
2,866,038 UART: [fmc] Received command: 0x1000000A
2,872,269 >>> mbox cmd response data (928 bytes)
2,872,270 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,872,299 UART: [fmc] Received command: 0x10000009
2,873,497 >>> mbox cmd response data (48 bytes)
2,873,498 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,873,527 UART: [fmc] Received command: 0x10000003
2,882,983 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,700 >>> mbox cmd response data (12 bytes)
1,139,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,204 >>> mbox cmd response data (12 bytes)
1,143,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,614 >>> mbox cmd response data (12 bytes)
1,146,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,150 >>> mbox cmd response data (12 bytes)
1,150,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,652 >>> mbox cmd response data (12 bytes)
1,153,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,106 >>> mbox cmd response data (12 bytes)
1,157,107 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,536 >>> mbox cmd response data (12 bytes)
1,160,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,928 >>> mbox cmd response data (12 bytes)
1,163,929 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,621,564 >>> mbox cmd response: success
2,677,527 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,683,748 UART:
2,683,764 UART: Running Caliptra FMC ...
2,684,172 UART:
2,684,402 UART: [fmc] Received command: 0x1000000A
2,690,633 >>> mbox cmd response data (928 bytes)
2,690,634 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,690,663 UART: [fmc] Received command: 0x10000009
2,691,861 >>> mbox cmd response data (48 bytes)
2,691,862 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,691,891 UART: [fmc] Received command: 0x10000003
2,701,347 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,681 UART: [kat] SHA2-512-ACC
906,582 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,170,306 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,536 UART: [idev] ++
1,173,704 UART: [idev] CDI.KEYID = 6
1,174,065 UART: [idev] SUBJECT.KEYID = 7
1,174,490 UART: [idev] UDS.KEYID = 0
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,608 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,427 UART: [ldev] ++
1,209,595 UART: [ldev] CDI.KEYID = 6
1,209,959 UART: [ldev] SUBJECT.KEYID = 5
1,210,386 UART: [ldev] AUTHORITY.KEYID = 7
1,210,849 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,643 UART: [ldev] --
1,281,065 UART: [fwproc] Wait for Commands...
1,281,658 UART: [fwproc] Recv command 0x4d454153
1,285,685 >>> mbox cmd response data (12 bytes)
1,285,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,955 UART: [fwproc] Recv command 0x4d454153
1,289,982 >>> mbox cmd response data (12 bytes)
1,289,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,098 UART: [fwproc] Recv command 0x4d454153
1,294,125 >>> mbox cmd response data (12 bytes)
1,294,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,245 UART: [fwproc] Recv command 0x4d454153
1,298,272 >>> mbox cmd response data (12 bytes)
1,298,273 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,558 UART: [fwproc] Recv command 0x4d454153
1,302,585 >>> mbox cmd response data (12 bytes)
1,302,586 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,863 UART: [fwproc] Recv command 0x4d454153
1,306,890 >>> mbox cmd response data (12 bytes)
1,306,891 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,150 UART: [fwproc] Recv command 0x4d454153
1,311,177 >>> mbox cmd response data (12 bytes)
1,311,178 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,359 UART: [fwproc] Recv command 0x4d454153
1,315,386 >>> mbox cmd response data (12 bytes)
1,315,387 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,315,696 UART: [fwproc] Recv command 0x46574c44
1,316,429 UART: [fwproc] Recv'd Img size: 112032 bytes
2,587,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,644 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,379 >>> mbox cmd response: success
2,777,418 UART: [afmc] ++
2,777,586 UART: [afmc] CDI.KEYID = 6
2,777,949 UART: [afmc] SUBJECT.KEYID = 7
2,778,375 UART: [afmc] AUTHORITY.KEYID = 5
2,813,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,523 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,219 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,118 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,811 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,553 UART: [afmc] --
2,857,627 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,857,649 UART: [cold-reset] --
2,858,717 UART: [state] Locking Datavault
2,859,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,590 UART: [state] Locking ICCM
2,861,234 UART: [exit] Launching FMC @ 0x40000000
2,866,531 UART:
2,866,547 UART: Running Caliptra FMC ...
2,866,955 UART:
2,867,185 UART: [fmc] Received command: 0x1000000A
2,873,416 >>> mbox cmd response data (928 bytes)
2,873,417 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,873,446 UART: [fmc] Received command: 0x10000009
2,874,644 >>> mbox cmd response data (48 bytes)
2,874,645 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,874,674 UART: [fmc] Received command: 0x10000003
2,884,130 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,669 >>> mbox cmd response data (12 bytes)
1,139,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,097 >>> mbox cmd response data (12 bytes)
1,143,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,595 >>> mbox cmd response data (12 bytes)
1,146,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,079 >>> mbox cmd response data (12 bytes)
1,150,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,619 >>> mbox cmd response data (12 bytes)
1,153,620 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,121 >>> mbox cmd response data (12 bytes)
1,157,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,595 >>> mbox cmd response data (12 bytes)
1,160,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,129 >>> mbox cmd response data (12 bytes)
1,164,130 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,621,725 >>> mbox cmd response: success
2,677,530 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,683,465 UART:
2,683,481 UART: Running Caliptra FMC ...
2,683,889 UART:
2,684,119 UART: [fmc] Received command: 0x1000000A
2,690,350 >>> mbox cmd response data (928 bytes)
2,690,351 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,690,380 UART: [fmc] Received command: 0x10000009
2,691,578 >>> mbox cmd response data (48 bytes)
2,691,579 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,691,608 UART: [fmc] Received command: 0x10000003
2,701,064 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,048 UART:
192,412 UART: Running Caliptra ROM ...
193,586 UART:
193,740 UART: [state] CFI Enabled
264,677 UART: [state] LifecycleState = Unprovisioned
267,055 UART: [state] DebugLocked = No
268,915 UART: [state] WD Timer not started. Device not locked for debugging
274,356 UART: [kat] SHA2-256
456,267 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,772 UART: [kat] ++
468,358 UART: [kat] sha1
478,605 UART: [kat] SHA2-256
481,608 UART: [kat] SHA2-384
487,031 UART: [kat] SHA2-512-ACC
489,640 UART: [kat] ECC-384
3,774,290 UART: [kat] HMAC-384Kdf
3,800,010 UART: [kat] LMS
4,873,179 UART: [kat] --
4,877,628 UART: [cold-reset] ++
4,878,862 UART: [fht] FHT @ 0x50003400
4,890,847 UART: [idev] ++
4,891,577 UART: [idev] CDI.KEYID = 6
4,892,682 UART: [idev] SUBJECT.KEYID = 7
4,893,894 UART: [idev] UDS.KEYID = 0
4,928,794 UART: [idev] Erasing UDS.KEYID = 0
8,239,694 UART: [idev] Sha1 KeyId Algorithm
8,261,576 UART: [idev] --
8,266,830 UART: [ldev] ++
8,267,399 UART: [ldev] CDI.KEYID = 6
8,268,633 UART: [ldev] SUBJECT.KEYID = 5
8,269,788 UART: [ldev] AUTHORITY.KEYID = 7
8,271,015 UART: [ldev] FE.KEYID = 1
8,316,936 UART: [ldev] Erasing FE.KEYID = 1
11,650,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,317 UART: [ldev] --
14,036,689 UART: [fwproc] Wait for Commands...
14,038,894 UART: [fwproc] Recv command 0x4d454153
14,047,913 >>> mbox cmd response data (12 bytes)
14,048,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,049,597 UART: [fwproc] Recv command 0x4d454153
14,058,538 >>> mbox cmd response data (12 bytes)
14,058,999 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,060,170 UART: [fwproc] Recv command 0x4d454153
14,069,098 >>> mbox cmd response data (12 bytes)
14,069,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,070,249 UART: [fwproc] Recv command 0x4d454153
14,079,113 >>> mbox cmd response data (12 bytes)
14,079,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,080,366 UART: [fwproc] Recv command 0x4d454153
14,088,956 >>> mbox cmd response data (12 bytes)
14,089,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,090,256 UART: [fwproc] Recv command 0x4d454153
14,098,851 >>> mbox cmd response data (12 bytes)
14,099,265 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,100,535 UART: [fwproc] Recv command 0x4d454153
14,109,084 >>> mbox cmd response data (12 bytes)
14,109,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,110,072 UART: [fwproc] Recv command 0x4d454153
14,118,615 >>> mbox cmd response data (12 bytes)
14,119,036 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,119,548 UART: [fwproc] Recv command 0x4d454153
14,121,541 UART: [fwproc] Max # of measurements received.
14,123,425 >>> mbox cmd response: failed
14,125,312 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,824,731 >>> mbox cmd response data (12 bytes)
13,825,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,833,310 >>> mbox cmd response data (12 bytes)
13,833,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,842,000 >>> mbox cmd response data (12 bytes)
13,842,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,850,610 >>> mbox cmd response data (12 bytes)
13,851,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,858,950 >>> mbox cmd response data (12 bytes)
13,859,362 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,867,812 >>> mbox cmd response data (12 bytes)
13,868,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,875,339 >>> mbox cmd response data (12 bytes)
13,875,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,883,898 >>> mbox cmd response data (12 bytes)
13,884,326 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,884,932 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
4,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,833 UART:
193,202 UART: Running Caliptra ROM ...
194,376 UART:
604,146 UART: [state] CFI Enabled
620,055 UART: [state] LifecycleState = Unprovisioned
622,766 UART: [state] DebugLocked = No
624,584 UART: [state] WD Timer not started. Device not locked for debugging
629,163 UART: [kat] SHA2-256
811,142 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,700 UART: [kat] ++
823,197 UART: [kat] sha1
835,041 UART: [kat] SHA2-256
838,051 UART: [kat] SHA2-384
844,023 UART: [kat] SHA2-512-ACC
846,627 UART: [kat] ECC-384
4,102,162 UART: [kat] HMAC-384Kdf
4,113,978 UART: [kat] LMS
5,187,146 UART: [kat] --
5,191,597 UART: [cold-reset] ++
5,194,240 UART: [fht] FHT @ 0x50003400
5,205,218 UART: [idev] ++
5,205,881 UART: [idev] CDI.KEYID = 6
5,207,028 UART: [idev] SUBJECT.KEYID = 7
5,208,558 UART: [idev] UDS.KEYID = 0
5,224,633 UART: [idev] Erasing UDS.KEYID = 0
8,498,316 UART: [idev] Sha1 KeyId Algorithm
8,519,612 UART: [idev] --
8,523,711 UART: [ldev] ++
8,524,271 UART: [ldev] CDI.KEYID = 6
8,525,424 UART: [ldev] SUBJECT.KEYID = 5
8,526,955 UART: [ldev] AUTHORITY.KEYID = 7
8,528,427 UART: [ldev] FE.KEYID = 1
8,540,472 UART: [ldev] Erasing FE.KEYID = 1
11,834,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,129,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,145,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,161,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,177,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,199,713 UART: [ldev] --
14,205,186 UART: [fwproc] Wait for Commands...
14,207,193 UART: [fwproc] Recv command 0x4d454153
14,216,209 >>> mbox cmd response data (12 bytes)
14,216,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,217,778 UART: [fwproc] Recv command 0x4d454153
14,226,711 >>> mbox cmd response data (12 bytes)
14,227,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,228,446 UART: [fwproc] Recv command 0x4d454153
14,237,362 >>> mbox cmd response data (12 bytes)
14,237,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,239,078 UART: [fwproc] Recv command 0x4d454153
14,247,940 >>> mbox cmd response data (12 bytes)
14,248,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,249,227 UART: [fwproc] Recv command 0x4d454153
14,258,140 >>> mbox cmd response data (12 bytes)
14,258,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,259,146 UART: [fwproc] Recv command 0x4d454153
14,268,019 >>> mbox cmd response data (12 bytes)
14,268,437 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,269,802 UART: [fwproc] Recv command 0x4d454153
14,278,657 >>> mbox cmd response data (12 bytes)
14,279,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,279,902 UART: [fwproc] Recv command 0x4d454153
14,288,757 >>> mbox cmd response data (12 bytes)
14,289,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,290,648 UART: [fwproc] Recv command 0x4d454153
14,292,969 UART: [fwproc] Max # of measurements received.
14,294,791 >>> mbox cmd response: failed
14,296,404 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
3,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,020,672 >>> mbox cmd response data (12 bytes)
14,021,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,029,660 >>> mbox cmd response data (12 bytes)
14,030,108 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,037,696 >>> mbox cmd response data (12 bytes)
14,038,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,046,054 >>> mbox cmd response data (12 bytes)
14,046,513 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,054,317 >>> mbox cmd response data (12 bytes)
14,054,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,062,111 >>> mbox cmd response data (12 bytes)
14,062,522 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,070,533 >>> mbox cmd response data (12 bytes)
14,070,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,078,227 >>> mbox cmd response data (12 bytes)
14,078,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,079,526 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,182 UART:
192,547 UART: Running Caliptra ROM ...
193,664 UART:
193,809 UART: [state] CFI Enabled
263,116 UART: [state] LifecycleState = Unprovisioned
265,013 UART: [state] DebugLocked = No
267,056 UART: [state] WD Timer not started. Device not locked for debugging
269,946 UART: [kat] SHA2-256
449,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,635 UART: [kat] ++
461,167 UART: [kat] sha1
470,751 UART: [kat] SHA2-256
473,817 UART: [kat] SHA2-384
479,630 UART: [kat] SHA2-512-ACC
482,565 UART: [kat] ECC-384
2,926,017 UART: [kat] HMAC-384Kdf
2,949,444 UART: [kat] LMS
3,478,904 UART: [kat] --
3,484,676 UART: [cold-reset] ++
3,486,989 UART: [fht] FHT @ 0x50003400
3,497,637 UART: [idev] ++
3,498,226 UART: [idev] CDI.KEYID = 6
3,499,135 UART: [idev] SUBJECT.KEYID = 7
3,500,294 UART: [idev] UDS.KEYID = 0
3,522,265 UART: [idev] Erasing UDS.KEYID = 0
6,007,748 UART: [idev] Sha1 KeyId Algorithm
6,032,388 UART: [idev] --
6,037,354 UART: [ldev] ++
6,037,926 UART: [ldev] CDI.KEYID = 6
6,038,837 UART: [ldev] SUBJECT.KEYID = 5
6,039,999 UART: [ldev] AUTHORITY.KEYID = 7
6,041,230 UART: [ldev] FE.KEYID = 1
6,079,693 UART: [ldev] Erasing FE.KEYID = 1
8,583,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,308,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,324,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,340,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,356,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,376,545 UART: [ldev] --
10,381,875 UART: [fwproc] Wait for Commands...
10,384,563 UART: [fwproc] Recv command 0x4d454153
10,393,091 >>> mbox cmd response data (12 bytes)
10,393,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,395,070 UART: [fwproc] Recv command 0x4d454153
10,403,552 >>> mbox cmd response data (12 bytes)
10,403,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,404,526 UART: [fwproc] Recv command 0x4d454153
10,413,005 >>> mbox cmd response data (12 bytes)
10,413,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,414,194 UART: [fwproc] Recv command 0x4d454153
10,422,670 >>> mbox cmd response data (12 bytes)
10,423,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,424,447 UART: [fwproc] Recv command 0x4d454153
10,432,889 >>> mbox cmd response data (12 bytes)
10,433,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,433,865 UART: [fwproc] Recv command 0x4d454153
10,442,289 >>> mbox cmd response data (12 bytes)
10,442,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,444,120 UART: [fwproc] Recv command 0x4d454153
10,452,550 >>> mbox cmd response data (12 bytes)
10,452,998 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,454,267 UART: [fwproc] Recv command 0x4d454153
10,462,754 >>> mbox cmd response data (12 bytes)
10,463,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,464,645 UART: [fwproc] Recv command 0x4d454153
10,466,692 UART: [fwproc] Max # of measurements received.
10,468,575 >>> mbox cmd response: failed
10,470,513 UART: ROM Fatal Error: 0x01020008test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,623 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,185,952 >>> mbox cmd response data (12 bytes)
10,186,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,194,207 >>> mbox cmd response data (12 bytes)
10,194,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,202,140 >>> mbox cmd response data (12 bytes)
10,202,558 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,210,141 >>> mbox cmd response data (12 bytes)
10,210,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,217,917 >>> mbox cmd response data (12 bytes)
10,218,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,225,831 >>> mbox cmd response data (12 bytes)
10,226,245 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,233,718 >>> mbox cmd response data (12 bytes)
10,234,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,241,735 >>> mbox cmd response data (12 bytes)
10,242,159 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,243,298 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
4,180 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,518 UART:
192,889 UART: Running Caliptra ROM ...
194,000 UART:
603,615 UART: [state] CFI Enabled
614,406 UART: [state] LifecycleState = Unprovisioned
616,270 UART: [state] DebugLocked = No
618,402 UART: [state] WD Timer not started. Device not locked for debugging
621,503 UART: [kat] SHA2-256
800,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,210 UART: [kat] ++
812,740 UART: [kat] sha1
824,212 UART: [kat] SHA2-256
827,270 UART: [kat] SHA2-384
833,719 UART: [kat] SHA2-512-ACC
836,698 UART: [kat] ECC-384
3,282,361 UART: [kat] HMAC-384Kdf
3,294,077 UART: [kat] LMS
3,823,535 UART: [kat] --
3,828,107 UART: [cold-reset] ++
3,829,474 UART: [fht] FHT @ 0x50003400
3,840,238 UART: [idev] ++
3,840,810 UART: [idev] CDI.KEYID = 6
3,841,723 UART: [idev] SUBJECT.KEYID = 7
3,842,881 UART: [idev] UDS.KEYID = 0
3,858,155 UART: [idev] Erasing UDS.KEYID = 0
6,315,125 UART: [idev] Sha1 KeyId Algorithm
6,337,079 UART: [idev] --
6,340,319 UART: [ldev] ++
6,340,887 UART: [ldev] CDI.KEYID = 6
6,341,793 UART: [ldev] SUBJECT.KEYID = 5
6,342,954 UART: [ldev] AUTHORITY.KEYID = 7
6,344,255 UART: [ldev] FE.KEYID = 1
6,358,407 UART: [ldev] Erasing FE.KEYID = 1
8,832,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,106 UART: [ldev] --
10,622,361 UART: [fwproc] Wait for Commands...
10,625,372 UART: [fwproc] Recv command 0x4d454153
10,633,904 >>> mbox cmd response data (12 bytes)
10,634,586 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,635,510 UART: [fwproc] Recv command 0x4d454153
10,644,051 >>> mbox cmd response data (12 bytes)
10,644,478 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,645,692 UART: [fwproc] Recv command 0x4d454153
10,654,140 >>> mbox cmd response data (12 bytes)
10,654,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,655,338 UART: [fwproc] Recv command 0x4d454153
10,663,763 >>> mbox cmd response data (12 bytes)
10,664,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,666,198 UART: [fwproc] Recv command 0x4d454153
10,674,620 >>> mbox cmd response data (12 bytes)
10,675,027 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,675,862 UART: [fwproc] Recv command 0x4d454153
10,684,337 >>> mbox cmd response data (12 bytes)
10,684,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,686,006 UART: [fwproc] Recv command 0x4d454153
10,694,435 >>> mbox cmd response data (12 bytes)
10,694,856 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,695,527 UART: [fwproc] Recv command 0x4d454153
10,704,011 >>> mbox cmd response data (12 bytes)
10,704,453 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,705,651 UART: [fwproc] Recv command 0x4d454153
10,707,754 UART: [fwproc] Max # of measurements received.
10,709,689 >>> mbox cmd response: failed
10,711,003 UART: ROM Fatal Error: 0x01020008test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,406,664 >>> mbox cmd response data (12 bytes)
10,407,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,414,856 >>> mbox cmd response data (12 bytes)
10,415,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,422,626 >>> mbox cmd response data (12 bytes)
10,423,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,430,318 >>> mbox cmd response data (12 bytes)
10,430,736 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,438,263 >>> mbox cmd response data (12 bytes)
10,438,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,446,172 >>> mbox cmd response data (12 bytes)
10,446,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,454,222 >>> mbox cmd response data (12 bytes)
10,454,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,462,256 >>> mbox cmd response data (12 bytes)
10,462,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,463,670 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,205,557 >>> mbox cmd response data (12 bytes)
10,206,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,213,618 >>> mbox cmd response data (12 bytes)
10,214,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,221,987 >>> mbox cmd response data (12 bytes)
10,222,445 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,229,823 >>> mbox cmd response data (12 bytes)
10,230,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,237,281 >>> mbox cmd response data (12 bytes)
10,237,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,245,116 >>> mbox cmd response data (12 bytes)
10,245,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,253,171 >>> mbox cmd response data (12 bytes)
10,253,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,261,335 >>> mbox cmd response data (12 bytes)
10,261,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,262,507 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
4,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,424,035 >>> mbox cmd response data (12 bytes)
10,425,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,432,410 >>> mbox cmd response data (12 bytes)
10,432,891 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,440,660 >>> mbox cmd response data (12 bytes)
10,441,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,448,634 >>> mbox cmd response data (12 bytes)
10,449,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,456,284 >>> mbox cmd response data (12 bytes)
10,456,708 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,463,696 >>> mbox cmd response data (12 bytes)
10,464,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,471,860 >>> mbox cmd response data (12 bytes)
10,472,288 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,479,608 >>> mbox cmd response data (12 bytes)
10,480,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,480,579 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,301 UART: [idev] ++
1,173,469 UART: [idev] CDI.KEYID = 6
1,173,830 UART: [idev] SUBJECT.KEYID = 7
1,174,255 UART: [idev] UDS.KEYID = 0
1,182,309 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,227 UART: [idev] --
1,209,360 UART: [ldev] ++
1,209,528 UART: [ldev] CDI.KEYID = 6
1,209,892 UART: [ldev] SUBJECT.KEYID = 5
1,210,319 UART: [ldev] AUTHORITY.KEYID = 7
1,210,782 UART: [ldev] FE.KEYID = 1
1,215,884 UART: [ldev] Erasing FE.KEYID = 1
1,242,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,198 UART: [ldev] --
1,281,486 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x4d454153
1,286,310 >>> mbox cmd response data (12 bytes)
1,286,311 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,522 UART: [fwproc] Recv command 0x4d454153
1,290,549 >>> mbox cmd response data (12 bytes)
1,290,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,787 UART: [fwproc] Recv command 0x4d454153
1,294,814 >>> mbox cmd response data (12 bytes)
1,294,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,066 UART: [fwproc] Recv command 0x4d454153
1,299,093 >>> mbox cmd response data (12 bytes)
1,299,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,239 UART: [fwproc] Recv command 0x4d454153
1,303,266 >>> mbox cmd response data (12 bytes)
1,303,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,450 UART: [fwproc] Recv command 0x4d454153
1,307,477 >>> mbox cmd response data (12 bytes)
1,307,478 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,761 UART: [fwproc] Recv command 0x4d454153
1,311,788 >>> mbox cmd response data (12 bytes)
1,311,789 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,074 UART: [fwproc] Recv command 0x4d454153
1,316,101 >>> mbox cmd response data (12 bytes)
1,316,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,301 UART: [fwproc] Recv command 0x4d454153
1,317,044 UART: [fwproc] Max # of measurements received.
1,317,689 >>> mbox cmd response: failed
1,317,995 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,508 >>> mbox cmd response data (12 bytes)
1,139,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,990 >>> mbox cmd response data (12 bytes)
1,142,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,396 >>> mbox cmd response data (12 bytes)
1,146,397 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,780 >>> mbox cmd response data (12 bytes)
1,149,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,322 >>> mbox cmd response data (12 bytes)
1,153,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,794 >>> mbox cmd response data (12 bytes)
1,156,795 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,206 >>> mbox cmd response data (12 bytes)
1,160,207 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,694 >>> mbox cmd response data (12 bytes)
1,163,695 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,830 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,699 UART: [kat] HMAC-384Kdf
921,325 UART: [kat] LMS
1,169,637 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,968 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,182,600 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,470 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,083 UART: [ldev] Erasing FE.KEYID = 1
1,242,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,753 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x4d454153
1,286,423 >>> mbox cmd response data (12 bytes)
1,286,424 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,613 UART: [fwproc] Recv command 0x4d454153
1,290,640 >>> mbox cmd response data (12 bytes)
1,290,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,834 UART: [fwproc] Recv command 0x4d454153
1,294,861 >>> mbox cmd response data (12 bytes)
1,294,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,167 UART: [fwproc] Recv command 0x4d454153
1,299,194 >>> mbox cmd response data (12 bytes)
1,299,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,398 UART: [fwproc] Recv command 0x4d454153
1,303,425 >>> mbox cmd response data (12 bytes)
1,303,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,599 UART: [fwproc] Recv command 0x4d454153
1,307,626 >>> mbox cmd response data (12 bytes)
1,307,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,856 UART: [fwproc] Recv command 0x4d454153
1,311,883 >>> mbox cmd response data (12 bytes)
1,311,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,195 UART: [fwproc] Recv command 0x4d454153
1,316,222 >>> mbox cmd response data (12 bytes)
1,316,223 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,300 UART: [fwproc] Recv command 0x4d454153
1,317,043 UART: [fwproc] Max # of measurements received.
1,317,688 >>> mbox cmd response: failed
1,318,032 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,891 >>> mbox cmd response data (12 bytes)
1,139,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,459 >>> mbox cmd response data (12 bytes)
1,143,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,873 >>> mbox cmd response data (12 bytes)
1,146,874 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,347 >>> mbox cmd response data (12 bytes)
1,150,348 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,887 >>> mbox cmd response data (12 bytes)
1,153,888 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,399 >>> mbox cmd response data (12 bytes)
1,157,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,875 >>> mbox cmd response data (12 bytes)
1,160,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,411 >>> mbox cmd response data (12 bytes)
1,164,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,543 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,680 UART: [kat] SHA2-512-ACC
906,581 UART: [kat] ECC-384
916,174 UART: [kat] HMAC-384Kdf
920,822 UART: [kat] LMS
1,169,134 UART: [kat] --
1,170,183 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,383 UART: [idev] ++
1,173,551 UART: [idev] CDI.KEYID = 6
1,173,912 UART: [idev] SUBJECT.KEYID = 7
1,174,337 UART: [idev] UDS.KEYID = 0
1,182,533 UART: [idev] Erasing UDS.KEYID = 0
1,199,487 UART: [idev] Sha1 KeyId Algorithm
1,208,361 UART: [idev] --
1,209,496 UART: [ldev] ++
1,209,664 UART: [ldev] CDI.KEYID = 6
1,210,028 UART: [ldev] SUBJECT.KEYID = 5
1,210,455 UART: [ldev] AUTHORITY.KEYID = 7
1,210,918 UART: [ldev] FE.KEYID = 1
1,216,294 UART: [ldev] Erasing FE.KEYID = 1
1,242,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,668 UART: [ldev] --
1,282,058 UART: [fwproc] Wait for Commands...
1,282,757 UART: [fwproc] Recv command 0x4d454153
1,286,784 >>> mbox cmd response data (12 bytes)
1,286,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,022 UART: [fwproc] Recv command 0x4d454153
1,291,049 >>> mbox cmd response data (12 bytes)
1,291,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,343 UART: [fwproc] Recv command 0x4d454153
1,295,370 >>> mbox cmd response data (12 bytes)
1,295,371 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,598 UART: [fwproc] Recv command 0x4d454153
1,299,625 >>> mbox cmd response data (12 bytes)
1,299,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,859 UART: [fwproc] Recv command 0x4d454153
1,303,886 >>> mbox cmd response data (12 bytes)
1,303,887 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,982 UART: [fwproc] Recv command 0x4d454153
1,308,009 >>> mbox cmd response data (12 bytes)
1,308,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,189 UART: [fwproc] Recv command 0x4d454153
1,312,216 >>> mbox cmd response data (12 bytes)
1,312,217 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,416 UART: [fwproc] Recv command 0x4d454153
1,316,443 >>> mbox cmd response data (12 bytes)
1,316,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,613 UART: [fwproc] Recv command 0x4d454153
1,317,356 UART: [fwproc] Max # of measurements received.
1,318,001 >>> mbox cmd response: failed
1,318,569 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,572 >>> mbox cmd response data (12 bytes)
1,139,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,020 >>> mbox cmd response data (12 bytes)
1,143,021 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,618 >>> mbox cmd response data (12 bytes)
1,146,619 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,070 >>> mbox cmd response data (12 bytes)
1,150,071 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,568 >>> mbox cmd response data (12 bytes)
1,153,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,152 >>> mbox cmd response data (12 bytes)
1,157,153 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,736 >>> mbox cmd response data (12 bytes)
1,160,737 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,328 >>> mbox cmd response data (12 bytes)
1,164,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,546 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
920,873 UART: [kat] LMS
1,169,185 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,292 UART: [fht] FHT @ 0x50003400
1,172,830 UART: [idev] ++
1,172,998 UART: [idev] CDI.KEYID = 6
1,173,359 UART: [idev] SUBJECT.KEYID = 7
1,173,784 UART: [idev] UDS.KEYID = 0
1,181,892 UART: [idev] Erasing UDS.KEYID = 0
1,199,982 UART: [idev] Sha1 KeyId Algorithm
1,208,902 UART: [idev] --
1,210,025 UART: [ldev] ++
1,210,193 UART: [ldev] CDI.KEYID = 6
1,210,557 UART: [ldev] SUBJECT.KEYID = 5
1,210,984 UART: [ldev] AUTHORITY.KEYID = 7
1,211,447 UART: [ldev] FE.KEYID = 1
1,216,837 UART: [ldev] Erasing FE.KEYID = 1
1,243,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,679 UART: [ldev] --
1,283,177 UART: [fwproc] Wait for Commands...
1,283,908 UART: [fwproc] Recv command 0x4d454153
1,287,935 >>> mbox cmd response data (12 bytes)
1,287,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,288,127 UART: [fwproc] Recv command 0x4d454153
1,292,154 >>> mbox cmd response data (12 bytes)
1,292,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,292,276 UART: [fwproc] Recv command 0x4d454153
1,296,303 >>> mbox cmd response data (12 bytes)
1,296,304 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,493 UART: [fwproc] Recv command 0x4d454153
1,300,520 >>> mbox cmd response data (12 bytes)
1,300,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,704 UART: [fwproc] Recv command 0x4d454153
1,304,731 >>> mbox cmd response data (12 bytes)
1,304,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,031 UART: [fwproc] Recv command 0x4d454153
1,309,058 >>> mbox cmd response data (12 bytes)
1,309,059 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,340 UART: [fwproc] Recv command 0x4d454153
1,313,367 >>> mbox cmd response data (12 bytes)
1,313,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,451 UART: [fwproc] Recv command 0x4d454153
1,317,478 >>> mbox cmd response data (12 bytes)
1,317,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,317,568 UART: [fwproc] Recv command 0x4d454153
1,318,311 UART: [fwproc] Max # of measurements received.
1,318,956 >>> mbox cmd response: failed
1,319,288 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,255 >>> mbox cmd response data (12 bytes)
1,139,256 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,765 >>> mbox cmd response data (12 bytes)
1,142,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,351 >>> mbox cmd response data (12 bytes)
1,146,352 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,819 >>> mbox cmd response data (12 bytes)
1,149,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,401 >>> mbox cmd response data (12 bytes)
1,153,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,013 >>> mbox cmd response data (12 bytes)
1,157,014 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,529 >>> mbox cmd response data (12 bytes)
1,160,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,945 >>> mbox cmd response data (12 bytes)
1,163,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,091 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,550 UART: [kat] LMS
1,168,862 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,182,033 UART: [idev] Erasing UDS.KEYID = 0
1,198,835 UART: [idev] Sha1 KeyId Algorithm
1,207,707 UART: [idev] --
1,208,746 UART: [ldev] ++
1,208,914 UART: [ldev] CDI.KEYID = 6
1,209,278 UART: [ldev] SUBJECT.KEYID = 5
1,209,705 UART: [ldev] AUTHORITY.KEYID = 7
1,210,168 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,240,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,560 UART: [ldev] --
1,279,926 UART: [fwproc] Wait for Commands...
1,280,575 UART: [fwproc] Recv command 0x4d454153
1,284,602 >>> mbox cmd response data (12 bytes)
1,284,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,694 UART: [fwproc] Recv command 0x4d454153
1,288,721 >>> mbox cmd response data (12 bytes)
1,288,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,288,943 UART: [fwproc] Recv command 0x4d454153
1,292,970 >>> mbox cmd response data (12 bytes)
1,292,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,058 UART: [fwproc] Recv command 0x4d454153
1,297,085 >>> mbox cmd response data (12 bytes)
1,297,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,291 UART: [fwproc] Recv command 0x4d454153
1,301,318 >>> mbox cmd response data (12 bytes)
1,301,319 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,462 UART: [fwproc] Recv command 0x4d454153
1,305,489 >>> mbox cmd response data (12 bytes)
1,305,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,625 UART: [fwproc] Recv command 0x4d454153
1,309,652 >>> mbox cmd response data (12 bytes)
1,309,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,914 UART: [fwproc] Recv command 0x4d454153
1,313,941 >>> mbox cmd response data (12 bytes)
1,313,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,314,107 UART: [fwproc] Recv command 0x4d454153
1,314,850 UART: [fwproc] Max # of measurements received.
1,315,495 >>> mbox cmd response: failed
1,315,963 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,348 >>> mbox cmd response data (12 bytes)
1,138,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,930 >>> mbox cmd response data (12 bytes)
1,141,931 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,480 >>> mbox cmd response data (12 bytes)
1,145,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,890 >>> mbox cmd response data (12 bytes)
1,148,891 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,500 >>> mbox cmd response data (12 bytes)
1,152,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,944 >>> mbox cmd response data (12 bytes)
1,155,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,496 >>> mbox cmd response data (12 bytes)
1,159,497 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,958 >>> mbox cmd response data (12 bytes)
1,162,959 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,182 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,409 UART: [kat] SHA2-512-ACC
906,310 UART: [kat] ECC-384
915,723 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,181,800 UART: [idev] Erasing UDS.KEYID = 0
1,198,726 UART: [idev] Sha1 KeyId Algorithm
1,207,668 UART: [idev] --
1,208,537 UART: [ldev] ++
1,208,705 UART: [ldev] CDI.KEYID = 6
1,209,069 UART: [ldev] SUBJECT.KEYID = 5
1,209,496 UART: [ldev] AUTHORITY.KEYID = 7
1,209,959 UART: [ldev] FE.KEYID = 1
1,215,265 UART: [ldev] Erasing FE.KEYID = 1
1,242,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,575 UART: [ldev] --
1,282,087 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x4d454153
1,286,709 >>> mbox cmd response data (12 bytes)
1,286,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,867 UART: [fwproc] Recv command 0x4d454153
1,290,894 >>> mbox cmd response data (12 bytes)
1,290,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,118 UART: [fwproc] Recv command 0x4d454153
1,295,145 >>> mbox cmd response data (12 bytes)
1,295,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,341 UART: [fwproc] Recv command 0x4d454153
1,299,368 >>> mbox cmd response data (12 bytes)
1,299,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,682 UART: [fwproc] Recv command 0x4d454153
1,303,709 >>> mbox cmd response data (12 bytes)
1,303,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,817 UART: [fwproc] Recv command 0x4d454153
1,307,844 >>> mbox cmd response data (12 bytes)
1,307,845 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,022 UART: [fwproc] Recv command 0x4d454153
1,312,049 >>> mbox cmd response data (12 bytes)
1,312,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,209 UART: [fwproc] Recv command 0x4d454153
1,316,236 >>> mbox cmd response data (12 bytes)
1,316,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,370 UART: [fwproc] Recv command 0x4d454153
1,317,113 UART: [fwproc] Max # of measurements received.
1,317,758 >>> mbox cmd response: failed
1,318,340 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,363 >>> mbox cmd response data (12 bytes)
1,140,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,877 >>> mbox cmd response data (12 bytes)
1,143,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,489 >>> mbox cmd response data (12 bytes)
1,147,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,077 >>> mbox cmd response data (12 bytes)
1,151,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,487 >>> mbox cmd response data (12 bytes)
1,154,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,007 >>> mbox cmd response data (12 bytes)
1,158,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,563 >>> mbox cmd response data (12 bytes)
1,161,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,093 >>> mbox cmd response data (12 bytes)
1,165,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,377 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
2,212,110 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,354,120 UART:
2,354,554 UART: Running Caliptra ROM ...
2,355,733 UART:
2,355,906 UART: [state] CFI Enabled
2,356,878 UART: [state] LifecycleState = Unprovisioned
2,358,543 UART: [state] DebugLocked = No
2,359,649 UART: [state] WD Timer not started. Device not locked for debugging
2,362,131 UART: [kat] SHA2-256
2,362,800 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,365,810 UART: [kat] ++
2,366,261 UART: [kat] sha1
2,366,772 UART: [kat] SHA2-256
2,367,446 UART: [kat] SHA2-384
2,368,106 UART: [kat] SHA2-512-ACC
2,368,905 UART: [kat] ECC-384
3,774,442 UART: [kat] HMAC-384Kdf
3,803,467 UART: [kat] LMS
4,876,665 UART: [kat] --
4,880,368 UART: [cold-reset] ++
4,883,064 UART: [fht] FHT @ 0x50003400
4,894,160 UART: [idev] ++
4,894,840 UART: [idev] CDI.KEYID = 6
4,896,083 UART: [idev] SUBJECT.KEYID = 7
4,897,201 UART: [idev] UDS.KEYID = 0
4,932,001 UART: [idev] Erasing UDS.KEYID = 0
8,242,312 UART: [idev] Sha1 KeyId Algorithm
8,264,944 UART: [idev] --
8,269,417 UART: [ldev] ++
8,270,010 UART: [ldev] CDI.KEYID = 6
8,271,119 UART: [ldev] SUBJECT.KEYID = 5
8,272,389 UART: [ldev] AUTHORITY.KEYID = 7
8,273,487 UART: [ldev] FE.KEYID = 1
8,320,081 UART: [ldev] Erasing FE.KEYID = 1
11,655,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,941 UART: [ldev] --
14,042,376 UART: [fwproc] Wait for Commands...
14,044,317 UART: [fwproc] Recv command 0x46574c44
14,046,632 UART: [fwproc] Recv'd Img size: 111688 bytes
18,090,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,166,655 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,226,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,543,123 >>> mbox cmd response: success
18,547,607 UART: [afmc] ++
18,548,214 UART: [afmc] CDI.KEYID = 6
18,549,326 UART: [afmc] SUBJECT.KEYID = 7
18,550,542 UART: [afmc] AUTHORITY.KEYID = 5
21,906,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,205,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,207,930 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,224,074 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,240,203 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,256,030 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,278,918 UART: [afmc] --
24,282,139 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,282,507 UART: [cold-reset] --
24,286,562 UART: [state] Locking Datavault
24,292,160 UART: [state] Locking PCR0, PCR1 and PCR31
24,293,812 UART: [state] Locking ICCM
24,296,292 UART: [exit] Launching FMC @ 0x40000000
24,304,912 UART:
24,305,148 UART: Running Caliptra FMC ...
24,306,460 UART:
24,306,624 UART: [fmc] Received command: 0x10000009
24,308,144 >>> mbox cmd response data (48 bytes)
24,308,740 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,309,090 UART: [fmc] Received command: 0x1000000A
24,310,622 >>> mbox cmd response data (0 bytes)
24,310,891 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,311,205 UART: [fmc] Received command: 0x10000003
24,321,161 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,209,096 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,323,934 >>> mbox cmd response: success
24,014,380 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,027,847 UART:
24,028,197 UART: Running Caliptra FMC ...
24,029,390 UART:
24,029,582 UART: [fmc] Received command: 0x10000009
24,031,177 >>> mbox cmd response data (48 bytes)
24,031,785 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,032,140 UART: [fmc] Received command: 0x1000000A
24,033,772 >>> mbox cmd response data (0 bytes)
24,034,046 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,034,363 UART: [fmc] Received command: 0x10000003
24,044,308 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
2,218,805 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
2,360,033 UART:
2,360,458 UART: Running Caliptra ROM ...
2,361,539 UART:
2,361,686 UART: [state] CFI Enabled
2,362,669 UART: [state] LifecycleState = Unprovisioned
2,364,322 UART: [state] DebugLocked = No
2,365,346 UART: [state] WD Timer not started. Device not locked for debugging
2,367,811 UART: [kat] SHA2-256
2,368,469 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,371,469 UART: [kat] ++
2,371,907 UART: [kat] sha1
2,372,408 UART: [kat] SHA2-256
2,373,056 UART: [kat] SHA2-384
2,373,709 UART: [kat] SHA2-512-ACC
2,374,501 UART: [kat] ECC-384
4,099,142 UART: [kat] HMAC-384Kdf
4,110,909 UART: [kat] LMS
5,184,091 UART: [kat] --
5,190,766 UART: [cold-reset] ++
5,193,015 UART: [fht] FHT @ 0x50003400
5,205,547 UART: [idev] ++
5,206,226 UART: [idev] CDI.KEYID = 6
5,207,467 UART: [idev] SUBJECT.KEYID = 7
5,208,900 UART: [idev] UDS.KEYID = 0
5,228,089 UART: [idev] Erasing UDS.KEYID = 0
8,500,952 UART: [idev] Sha1 KeyId Algorithm
8,523,428 UART: [idev] --
8,526,881 UART: [ldev] ++
8,527,448 UART: [ldev] CDI.KEYID = 6
8,528,690 UART: [ldev] SUBJECT.KEYID = 5
8,530,122 UART: [ldev] AUTHORITY.KEYID = 7
8,531,599 UART: [ldev] FE.KEYID = 1
8,543,863 UART: [ldev] Erasing FE.KEYID = 1
11,834,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,129,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,145,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,161,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,177,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,198,475 UART: [ldev] --
14,202,386 UART: [fwproc] Wait for Commands...
14,204,691 UART: [fwproc] Recv command 0x46574c44
14,206,946 UART: [fwproc] Recv'd Img size: 111688 bytes
18,253,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,329,852 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,390,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,707,931 >>> mbox cmd response: success
18,712,774 UART: [afmc] ++
18,713,362 UART: [afmc] CDI.KEYID = 6
18,714,602 UART: [afmc] SUBJECT.KEYID = 7
18,715,702 UART: [afmc] AUTHORITY.KEYID = 5
22,029,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,324,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,326,656 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,342,717 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,358,849 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,374,650 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,399,146 UART: [afmc] --
24,402,542 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,402,938 UART: [cold-reset] --
24,407,208 UART: [state] Locking Datavault
24,412,947 UART: [state] Locking PCR0, PCR1 and PCR31
24,414,587 UART: [state] Locking ICCM
24,416,581 UART: [exit] Launching FMC @ 0x40000000
24,425,195 UART:
24,425,431 UART: Running Caliptra FMC ...
24,426,527 UART:
24,426,683 UART: [fmc] Received command: 0x10000009
24,428,193 >>> mbox cmd response data (48 bytes)
24,428,817 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,429,160 UART: [fmc] Received command: 0x1000000A
24,430,684 >>> mbox cmd response data (0 bytes)
24,430,947 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,431,247 UART: [fmc] Received command: 0x10000003
24,441,190 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
2,218,118 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,500,896 >>> mbox cmd response: success
24,128,064 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,143,168 UART:
24,143,512 UART: Running Caliptra FMC ...
24,144,696 UART:
24,144,856 UART: [fmc] Received command: 0x10000009
24,146,419 >>> mbox cmd response data (48 bytes)
24,147,006 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,147,322 UART: [fmc] Received command: 0x1000000A
24,148,915 >>> mbox cmd response data (0 bytes)
24,149,175 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,149,476 UART: [fmc] Received command: 0x10000003
24,159,428 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
2,215,572 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,357,379 UART:
2,357,798 UART: Running Caliptra ROM ...
2,358,962 UART:
2,359,138 UART: [state] CFI Enabled
2,360,101 UART: [state] LifecycleState = Unprovisioned
2,361,779 UART: [state] DebugLocked = No
2,362,888 UART: [state] WD Timer not started. Device not locked for debugging
2,365,361 UART: [kat] SHA2-256
2,366,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,369,051 UART: [kat] ++
2,369,505 UART: [kat] sha1
2,370,055 UART: [kat] SHA2-256
2,370,719 UART: [kat] SHA2-384
2,371,376 UART: [kat] SHA2-512-ACC
2,372,171 UART: [kat] ECC-384
2,945,716 UART: [kat] HMAC-384Kdf
2,970,725 UART: [kat] LMS
3,500,201 UART: [kat] --
3,503,689 UART: [cold-reset] ++
3,505,629 UART: [fht] FHT @ 0x50003400
3,516,667 UART: [idev] ++
3,517,251 UART: [idev] CDI.KEYID = 6
3,518,161 UART: [idev] SUBJECT.KEYID = 7
3,519,373 UART: [idev] UDS.KEYID = 0
3,543,177 UART: [idev] Erasing UDS.KEYID = 0
6,025,800 UART: [idev] Sha1 KeyId Algorithm
6,048,017 UART: [idev] --
6,051,676 UART: [ldev] ++
6,052,258 UART: [ldev] CDI.KEYID = 6
6,053,169 UART: [ldev] SUBJECT.KEYID = 5
6,054,272 UART: [ldev] AUTHORITY.KEYID = 7
6,055,562 UART: [ldev] FE.KEYID = 1
6,099,482 UART: [ldev] Erasing FE.KEYID = 1
8,599,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,907 UART: [ldev] --
10,389,847 UART: [fwproc] Wait for Commands...
10,392,055 UART: [fwproc] Recv command 0x46574c44
10,394,108 UART: [fwproc] Recv'd Img size: 112032 bytes
13,769,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,841,084 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,901,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,220,281 >>> mbox cmd response: success
14,225,428 UART: [afmc] ++
14,226,010 UART: [afmc] CDI.KEYID = 6
14,226,896 UART: [afmc] SUBJECT.KEYID = 7
14,228,109 UART: [afmc] AUTHORITY.KEYID = 5
16,761,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,485,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,487,632 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,503,719 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,519,796 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,535,477 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,558,954 UART: [afmc] --
18,562,404 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,562,813 UART: [cold-reset] --
18,566,003 UART: [state] Locking Datavault
18,572,065 UART: [state] Locking PCR0, PCR1 and PCR31
18,573,771 UART: [state] Locking ICCM
18,575,281 UART: [exit] Launching FMC @ 0x40000000
18,583,621 UART:
18,583,863 UART: Running Caliptra FMC ...
18,584,963 UART:
18,585,125 UART: [fmc] Received command: 0x10000009
18,586,695 >>> mbox cmd response data (48 bytes)
18,587,289 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,587,650 UART: [fmc] Received command: 0x1000000A
18,589,180 >>> mbox cmd response data (0 bytes)
18,589,442 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,589,751 UART: [fmc] Received command: 0x10000003
18,599,712 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,213,956 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,044,413 >>> mbox cmd response: success
18,325,628 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,342,365 UART:
18,342,703 UART: Running Caliptra FMC ...
18,343,881 UART:
18,344,054 UART: [fmc] Received command: 0x10000009
18,345,634 >>> mbox cmd response data (48 bytes)
18,346,216 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,346,529 UART: [fmc] Received command: 0x1000000A
18,348,143 >>> mbox cmd response data (0 bytes)
18,348,416 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,348,723 UART: [fmc] Received command: 0x10000003
18,358,641 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
2,220,826 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,362,235 UART:
2,362,624 UART: Running Caliptra ROM ...
2,363,715 UART:
2,363,868 UART: [state] CFI Enabled
2,364,837 UART: [state] LifecycleState = Unprovisioned
2,366,495 UART: [state] DebugLocked = No
2,367,546 UART: [state] WD Timer not started. Device not locked for debugging
2,370,017 UART: [kat] SHA2-256
2,370,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,374,012 UART: [kat] ++
2,374,486 UART: [kat] sha1
2,375,000 UART: [kat] SHA2-256
2,375,707 UART: [kat] SHA2-384
2,376,370 UART: [kat] SHA2-512-ACC
2,377,171 UART: [kat] ECC-384
3,279,580 UART: [kat] HMAC-384Kdf
3,292,220 UART: [kat] LMS
3,821,726 UART: [kat] --
3,826,389 UART: [cold-reset] ++
3,828,427 UART: [fht] FHT @ 0x50003400
3,839,724 UART: [idev] ++
3,840,297 UART: [idev] CDI.KEYID = 6
3,841,224 UART: [idev] SUBJECT.KEYID = 7
3,842,384 UART: [idev] UDS.KEYID = 0
3,861,650 UART: [idev] Erasing UDS.KEYID = 0
6,318,640 UART: [idev] Sha1 KeyId Algorithm
6,342,567 UART: [idev] --
6,347,042 UART: [ldev] ++
6,347,607 UART: [ldev] CDI.KEYID = 6
6,348,480 UART: [ldev] SUBJECT.KEYID = 5
6,349,686 UART: [ldev] AUTHORITY.KEYID = 7
6,350,914 UART: [ldev] FE.KEYID = 1
6,359,964 UART: [ldev] Erasing FE.KEYID = 1
8,836,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,487 UART: [ldev] --
10,627,992 UART: [fwproc] Wait for Commands...
10,629,874 UART: [fwproc] Recv command 0x46574c44
10,631,965 UART: [fwproc] Recv'd Img size: 112032 bytes
14,002,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,074,508 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,134,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,453,009 >>> mbox cmd response: success
14,457,566 UART: [afmc] ++
14,458,173 UART: [afmc] CDI.KEYID = 6
14,459,055 UART: [afmc] SUBJECT.KEYID = 7
14,460,210 UART: [afmc] AUTHORITY.KEYID = 5
16,958,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,678,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,680,394 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,696,451 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,712,500 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,728,199 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,751,007 UART: [afmc] --
18,754,395 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,754,757 UART: [cold-reset] --
18,757,513 UART: [state] Locking Datavault
18,762,427 UART: [state] Locking PCR0, PCR1 and PCR31
18,764,069 UART: [state] Locking ICCM
18,766,219 UART: [exit] Launching FMC @ 0x40000000
18,774,671 UART:
18,774,950 UART: Running Caliptra FMC ...
18,776,060 UART:
18,776,214 UART: [fmc] Received command: 0x10000009
18,777,728 >>> mbox cmd response data (48 bytes)
18,778,317 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,778,656 UART: [fmc] Received command: 0x1000000A
18,780,205 >>> mbox cmd response data (0 bytes)
18,780,475 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,780,784 UART: [fmc] Received command: 0x10000003
18,790,740 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,216,552 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,240,875 >>> mbox cmd response: success
18,470,441 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,486,364 UART:
18,486,708 UART: Running Caliptra FMC ...
18,487,888 UART:
18,488,068 UART: [fmc] Received command: 0x10000009
18,489,651 >>> mbox cmd response data (48 bytes)
18,490,253 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,490,771 UART: [fmc] Received command: 0x1000000A
18,492,387 >>> mbox cmd response data (0 bytes)
18,492,662 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,492,975 UART: [fmc] Received command: 0x10000003
18,502,933 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,211,539 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
13,996,036 >>> mbox cmd response: success
18,277,021 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,291,500 UART:
18,291,847 UART: Running Caliptra FMC ...
18,293,030 UART:
18,293,201 UART: [fmc] Received command: 0x10000009
18,294,787 >>> mbox cmd response data (48 bytes)
18,295,394 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,295,742 UART: [fmc] Received command: 0x1000000A
18,297,390 >>> mbox cmd response data (0 bytes)
18,297,663 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,297,967 UART: [fmc] Received command: 0x10000003
18,307,919 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,214,997 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,221,808 >>> mbox cmd response: success
18,461,176 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,478,195 UART:
18,478,552 UART: Running Caliptra FMC ...
18,479,741 UART:
18,479,902 UART: [fmc] Received command: 0x10000009
18,481,478 >>> mbox cmd response data (48 bytes)
18,482,070 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,482,457 UART: [fmc] Received command: 0x1000000A
18,484,057 >>> mbox cmd response data (0 bytes)
18,484,333 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,484,643 UART: [fmc] Received command: 0x10000003
18,494,560 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
890,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,027 UART: [kat] ++
895,179 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,169,889 UART: [fht] FHT @ 0x50003400
1,172,489 UART: [idev] ++
1,172,657 UART: [idev] CDI.KEYID = 6
1,173,018 UART: [idev] SUBJECT.KEYID = 7
1,173,443 UART: [idev] UDS.KEYID = 0
1,181,481 UART: [idev] Erasing UDS.KEYID = 0
1,199,367 UART: [idev] Sha1 KeyId Algorithm
1,208,043 UART: [idev] --
1,209,100 UART: [ldev] ++
1,209,268 UART: [ldev] CDI.KEYID = 6
1,209,632 UART: [ldev] SUBJECT.KEYID = 5
1,210,059 UART: [ldev] AUTHORITY.KEYID = 7
1,210,522 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,242,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,886 UART: [ldev] --
1,281,236 UART: [fwproc] Wait for Commands...
1,281,995 UART: [fwproc] Recv command 0x46574c44
1,282,728 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,571 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,256 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,176 >>> mbox cmd response: success
2,744,425 UART: [afmc] ++
2,744,593 UART: [afmc] CDI.KEYID = 6
2,744,956 UART: [afmc] SUBJECT.KEYID = 7
2,745,382 UART: [afmc] AUTHORITY.KEYID = 5
2,780,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,050 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,746 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,645 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,338 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,216 UART: [afmc] --
2,824,282 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,824,304 UART: [cold-reset] --
2,825,196 UART: [state] Locking Datavault
2,826,431 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,035 UART: [state] Locking ICCM
2,827,683 UART: [exit] Launching FMC @ 0x40000000
2,832,980 UART:
2,832,996 UART: Running Caliptra FMC ...
2,833,404 UART:
2,833,634 UART: [fmc] Received command: 0x10000009
2,834,832 >>> mbox cmd response data (48 bytes)
2,834,833 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,834,862 UART: [fmc] Received command: 0x1000000A
2,835,602 >>> mbox cmd response data (0 bytes)
2,835,603 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,632 UART: [fmc] Received command: 0x10000003
2,845,088 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,590,538 >>> mbox cmd response: success
2,645,327 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,651,378 UART:
2,651,394 UART: Running Caliptra FMC ...
2,651,802 UART:
2,652,032 UART: [fmc] Received command: 0x10000009
2,653,230 >>> mbox cmd response data (48 bytes)
2,653,231 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,653,260 UART: [fmc] Received command: 0x1000000A
2,654,000 >>> mbox cmd response data (0 bytes)
2,654,001 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,654,030 UART: [fmc] Received command: 0x10000003
2,663,486 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,797 UART: [state] LifecycleState = Unprovisioned
86,452 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
891,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,960 UART: [kat] ++
896,112 UART: [kat] sha1
900,376 UART: [kat] SHA2-256
902,316 UART: [kat] SHA2-384
904,959 UART: [kat] SHA2-512-ACC
906,860 UART: [kat] ECC-384
917,029 UART: [kat] HMAC-384Kdf
921,781 UART: [kat] LMS
1,170,093 UART: [kat] --
1,171,298 UART: [cold-reset] ++
1,171,644 UART: [fht] FHT @ 0x50003400
1,174,534 UART: [idev] ++
1,174,702 UART: [idev] CDI.KEYID = 6
1,175,063 UART: [idev] SUBJECT.KEYID = 7
1,175,488 UART: [idev] UDS.KEYID = 0
1,183,390 UART: [idev] Erasing UDS.KEYID = 0
1,200,272 UART: [idev] Sha1 KeyId Algorithm
1,209,126 UART: [idev] --
1,210,331 UART: [ldev] ++
1,210,499 UART: [ldev] CDI.KEYID = 6
1,210,863 UART: [ldev] SUBJECT.KEYID = 5
1,211,290 UART: [ldev] AUTHORITY.KEYID = 7
1,211,753 UART: [ldev] FE.KEYID = 1
1,217,011 UART: [ldev] Erasing FE.KEYID = 1
1,242,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,893 UART: [ldev] --
1,281,159 UART: [fwproc] Wait for Commands...
1,281,828 UART: [fwproc] Recv command 0x46574c44
1,282,561 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,574 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,259 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,277 >>> mbox cmd response: success
2,743,300 UART: [afmc] ++
2,743,468 UART: [afmc] CDI.KEYID = 6
2,743,831 UART: [afmc] SUBJECT.KEYID = 7
2,744,257 UART: [afmc] AUTHORITY.KEYID = 5
2,780,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,701 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,397 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,296 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,989 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,929 UART: [afmc] --
2,823,935 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,823,957 UART: [cold-reset] --
2,824,707 UART: [state] Locking Datavault
2,825,736 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,340 UART: [state] Locking ICCM
2,827,002 UART: [exit] Launching FMC @ 0x40000000
2,832,299 UART:
2,832,315 UART: Running Caliptra FMC ...
2,832,723 UART:
2,832,953 UART: [fmc] Received command: 0x10000009
2,834,151 >>> mbox cmd response data (48 bytes)
2,834,152 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,834,181 UART: [fmc] Received command: 0x1000000A
2,834,921 >>> mbox cmd response data (0 bytes)
2,834,922 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,834,951 UART: [fmc] Received command: 0x10000003
2,844,407 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,159 >>> mbox cmd response: success
2,649,132 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,707 UART:
2,654,723 UART: Running Caliptra FMC ...
2,655,131 UART:
2,655,361 UART: [fmc] Received command: 0x10000009
2,656,559 >>> mbox cmd response data (48 bytes)
2,656,560 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,589 UART: [fmc] Received command: 0x1000000A
2,657,329 >>> mbox cmd response data (0 bytes)
2,657,330 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,657,359 UART: [fmc] Received command: 0x10000003
2,666,815 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,173,009 UART: [idev] ++
1,173,177 UART: [idev] CDI.KEYID = 6
1,173,538 UART: [idev] SUBJECT.KEYID = 7
1,173,963 UART: [idev] UDS.KEYID = 0
1,182,365 UART: [idev] Erasing UDS.KEYID = 0
1,198,911 UART: [idev] Sha1 KeyId Algorithm
1,207,843 UART: [idev] --
1,208,854 UART: [ldev] ++
1,209,022 UART: [ldev] CDI.KEYID = 6
1,209,386 UART: [ldev] SUBJECT.KEYID = 5
1,209,813 UART: [ldev] AUTHORITY.KEYID = 7
1,210,276 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,156 UART: [ldev] --
1,281,494 UART: [fwproc] Wait for Commands...
1,282,181 UART: [fwproc] Recv command 0x46574c44
1,282,914 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,017 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,688 >>> mbox cmd response: success
2,742,951 UART: [afmc] ++
2,743,119 UART: [afmc] CDI.KEYID = 6
2,743,482 UART: [afmc] SUBJECT.KEYID = 7
2,743,908 UART: [afmc] AUTHORITY.KEYID = 5
2,778,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,490 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,186 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,085 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,778 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,438 UART: [afmc] --
2,821,490 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,821,512 UART: [cold-reset] --
2,822,386 UART: [state] Locking Datavault
2,823,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,451 UART: [state] Locking ICCM
2,824,989 UART: [exit] Launching FMC @ 0x40000000
2,830,286 UART:
2,830,302 UART: Running Caliptra FMC ...
2,830,710 UART:
2,830,940 UART: [fmc] Received command: 0x10000009
2,832,138 >>> mbox cmd response data (48 bytes)
2,832,139 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,832,168 UART: [fmc] Received command: 0x1000000A
2,832,908 >>> mbox cmd response data (0 bytes)
2,832,909 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,832,938 UART: [fmc] Received command: 0x10000003
2,842,394 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,778 >>> mbox cmd response: success
2,647,787 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,000 UART:
2,654,016 UART: Running Caliptra FMC ...
2,654,424 UART:
2,654,654 UART: [fmc] Received command: 0x10000009
2,655,852 >>> mbox cmd response data (48 bytes)
2,655,853 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,882 UART: [fmc] Received command: 0x1000000A
2,656,622 >>> mbox cmd response data (0 bytes)
2,656,623 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,652 UART: [fmc] Received command: 0x10000003
2,666,108 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
916,399 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,446 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,181,870 UART: [idev] Erasing UDS.KEYID = 0
1,199,108 UART: [idev] Sha1 KeyId Algorithm
1,207,998 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,653 UART: [ldev] Erasing FE.KEYID = 1
1,241,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,765 UART: [ldev] --
1,281,149 UART: [fwproc] Wait for Commands...
1,281,866 UART: [fwproc] Recv command 0x46574c44
1,282,599 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,244 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,917 >>> mbox cmd response: success
2,743,012 UART: [afmc] ++
2,743,180 UART: [afmc] CDI.KEYID = 6
2,743,543 UART: [afmc] SUBJECT.KEYID = 7
2,743,969 UART: [afmc] AUTHORITY.KEYID = 5
2,779,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,841 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,537 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,436 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,129 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,127 UART: [afmc] --
2,823,183 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,823,205 UART: [cold-reset] --
2,824,265 UART: [state] Locking Datavault
2,825,478 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,082 UART: [state] Locking ICCM
2,826,568 UART: [exit] Launching FMC @ 0x40000000
2,831,865 UART:
2,831,881 UART: Running Caliptra FMC ...
2,832,289 UART:
2,832,519 UART: [fmc] Received command: 0x10000009
2,833,717 >>> mbox cmd response data (48 bytes)
2,833,718 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,833,747 UART: [fmc] Received command: 0x1000000A
2,834,487 >>> mbox cmd response data (0 bytes)
2,834,488 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,834,517 UART: [fmc] Received command: 0x10000003
2,843,973 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,881 >>> mbox cmd response: success
2,649,924 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,656,047 UART:
2,656,063 UART: Running Caliptra FMC ...
2,656,471 UART:
2,656,701 UART: [fmc] Received command: 0x10000009
2,657,899 >>> mbox cmd response data (48 bytes)
2,657,900 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,657,929 UART: [fmc] Received command: 0x1000000A
2,658,669 >>> mbox cmd response data (0 bytes)
2,658,670 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,699 UART: [fmc] Received command: 0x10000003
2,668,155 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,401 UART: [fht] FHT @ 0x50003400
1,173,245 UART: [idev] ++
1,173,413 UART: [idev] CDI.KEYID = 6
1,173,774 UART: [idev] SUBJECT.KEYID = 7
1,174,199 UART: [idev] UDS.KEYID = 0
1,181,947 UART: [idev] Erasing UDS.KEYID = 0
1,199,209 UART: [idev] Sha1 KeyId Algorithm
1,208,025 UART: [idev] --
1,208,960 UART: [ldev] ++
1,209,128 UART: [ldev] CDI.KEYID = 6
1,209,492 UART: [ldev] SUBJECT.KEYID = 5
1,209,919 UART: [ldev] AUTHORITY.KEYID = 7
1,210,382 UART: [ldev] FE.KEYID = 1
1,215,602 UART: [ldev] Erasing FE.KEYID = 1
1,241,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,912 UART: [ldev] --
1,281,268 UART: [fwproc] Wait for Commands...
1,281,983 UART: [fwproc] Recv command 0x46574c44
1,282,716 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,949 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,634 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,566 >>> mbox cmd response: success
2,741,769 UART: [afmc] ++
2,741,937 UART: [afmc] CDI.KEYID = 6
2,742,300 UART: [afmc] SUBJECT.KEYID = 7
2,742,726 UART: [afmc] AUTHORITY.KEYID = 5
2,778,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,344 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,040 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,939 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,632 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,670 UART: [afmc] --
2,821,564 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,821,586 UART: [cold-reset] --
2,822,632 UART: [state] Locking Datavault
2,823,627 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,231 UART: [state] Locking ICCM
2,824,665 UART: [exit] Launching FMC @ 0x40000000
2,829,962 UART:
2,829,978 UART: Running Caliptra FMC ...
2,830,386 UART:
2,830,616 UART: [fmc] Received command: 0x10000009
2,831,814 >>> mbox cmd response data (48 bytes)
2,831,815 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,831,844 UART: [fmc] Received command: 0x1000000A
2,832,584 >>> mbox cmd response data (0 bytes)
2,832,585 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,832,614 UART: [fmc] Received command: 0x10000003
2,842,070 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,756 >>> mbox cmd response: success
2,648,019 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,014 UART:
2,654,030 UART: Running Caliptra FMC ...
2,654,438 UART:
2,654,668 UART: [fmc] Received command: 0x10000009
2,655,866 >>> mbox cmd response data (48 bytes)
2,655,867 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,896 UART: [fmc] Received command: 0x1000000A
2,656,636 >>> mbox cmd response data (0 bytes)
2,656,637 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,666 UART: [fmc] Received command: 0x10000003
2,666,122 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,041 UART: [state] LifecycleState = Unprovisioned
85,696 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,695 UART: [kat] SHA2-512-ACC
906,596 UART: [kat] ECC-384
916,549 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,169,998 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,094 UART: [idev] ++
1,173,262 UART: [idev] CDI.KEYID = 6
1,173,623 UART: [idev] SUBJECT.KEYID = 7
1,174,048 UART: [idev] UDS.KEYID = 0
1,181,746 UART: [idev] Erasing UDS.KEYID = 0
1,199,350 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,475 UART: [ldev] ++
1,209,643 UART: [ldev] CDI.KEYID = 6
1,210,007 UART: [ldev] SUBJECT.KEYID = 5
1,210,434 UART: [ldev] AUTHORITY.KEYID = 7
1,210,897 UART: [ldev] FE.KEYID = 1
1,216,187 UART: [ldev] Erasing FE.KEYID = 1
1,242,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,703 UART: [ldev] --
1,282,141 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,697 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,016 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,701 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,619 >>> mbox cmd response: success
2,742,810 UART: [afmc] ++
2,742,978 UART: [afmc] CDI.KEYID = 6
2,743,341 UART: [afmc] SUBJECT.KEYID = 7
2,743,767 UART: [afmc] AUTHORITY.KEYID = 5
2,779,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,079 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,775 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,674 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,367 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,375 UART: [afmc] --
2,823,415 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,823,437 UART: [cold-reset] --
2,824,235 UART: [state] Locking Datavault
2,825,480 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,084 UART: [state] Locking ICCM
2,826,606 UART: [exit] Launching FMC @ 0x40000000
2,831,903 UART:
2,831,919 UART: Running Caliptra FMC ...
2,832,327 UART:
2,832,557 UART: [fmc] Received command: 0x10000009
2,833,755 >>> mbox cmd response data (48 bytes)
2,833,756 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,833,785 UART: [fmc] Received command: 0x1000000A
2,834,525 >>> mbox cmd response data (0 bytes)
2,834,526 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,834,555 UART: [fmc] Received command: 0x10000003
2,844,011 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,525 >>> mbox cmd response: success
2,648,430 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,265 UART:
2,654,281 UART: Running Caliptra FMC ...
2,654,689 UART:
2,654,919 UART: [fmc] Received command: 0x10000009
2,656,117 >>> mbox cmd response data (48 bytes)
2,656,118 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,147 UART: [fmc] Received command: 0x1000000A
2,656,887 >>> mbox cmd response data (0 bytes)
2,656,888 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,917 UART: [fmc] Received command: 0x10000003
2,666,373 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
2,219,798 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,221,129 UART:
2,221,387 UART: Running Caliptra ROM ...
2,222,462 UART:
2,222,622 UART: [state] CFI Enabled
2,223,595 UART: [state] LifecycleState = Unprovisioned
2,225,201 UART: [state] DebugLocked = No
2,226,247 UART: [state] WD Timer not started. Device not locked for debugging
2,228,736 UART: [kat] SHA2-256
2,229,408 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,232,415 UART: [kat] ++
2,232,864 UART: [kat] sha1
2,233,377 UART: [kat] SHA2-256
2,234,137 UART: [kat] SHA2-384
2,234,803 UART: [kat] SHA2-512-ACC
2,235,608 UART: [kat] ECC-384
3,772,971 UART: [kat] HMAC-384Kdf
3,801,253 UART: [kat] LMS
4,874,370 UART: [kat] --
4,877,480 UART: [cold-reset] ++
4,879,640 UART: [fht] FHT @ 0x50003400
4,891,048 UART: [idev] ++
4,891,781 UART: [idev] CDI.KEYID = 6
4,892,887 UART: [idev] SUBJECT.KEYID = 7
4,894,095 UART: [idev] UDS.KEYID = 0
4,929,870 UART: [idev] Erasing UDS.KEYID = 0
8,247,068 UART: [idev] Sha1 KeyId Algorithm
8,268,218 UART: [idev] --
8,271,896 UART: [ldev] ++
8,272,526 UART: [ldev] CDI.KEYID = 6
8,273,723 UART: [ldev] SUBJECT.KEYID = 5
8,274,827 UART: [ldev] AUTHORITY.KEYID = 7
8,276,057 UART: [ldev] FE.KEYID = 1
8,315,763 UART: [ldev] Erasing FE.KEYID = 1
11,650,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,592 UART: [ldev] --
14,034,408 UART: [fwproc] Wait for Commands...
14,037,170 UART: [fwproc] Recv command 0x4d454153
14,046,142 >>> mbox cmd response data (12 bytes)
14,047,980 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
14,188,660 UART: [fwproc] Recv command 0x46574c44
14,191,065 UART: [fwproc] Recv'd Img size: 111688 bytes
18,236,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,306,802 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,367,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,684,255 >>> mbox cmd response: success
18,688,381 UART: [afmc] ++
18,688,966 UART: [afmc] CDI.KEYID = 6
18,690,151 UART: [afmc] SUBJECT.KEYID = 7
18,691,304 UART: [afmc] AUTHORITY.KEYID = 5
22,054,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,371,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,374,209 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,390,353 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,406,532 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,422,328 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,444,286 UART: [afmc] --
24,448,297 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,448,663 UART: [cold-reset] --
24,451,535 UART: [state] Locking Datavault
24,458,676 UART: [state] Locking PCR0, PCR1 and PCR31
24,460,318 UART: [state] Locking ICCM
24,462,065 UART: [exit] Launching FMC @ 0x40000000
24,470,686 UART:
24,470,926 UART: Running Caliptra FMC ...
24,472,026 UART:
24,472,188 UART: [fmc] Received command: 0x1000000A
24,473,864 >>> mbox cmd response data (116 bytes)
24,475,209 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,475,645 UART: [fmc] Received command: 0x10000009
24,477,449 >>> mbox cmd response data (48 bytes)
24,478,969 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,479,420 UART: [fmc] Received command: 0x10000003
24,489,350 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,214,938 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,834,547 >>> mbox cmd response data (12 bytes)
13,836,696 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,466,977 >>> mbox cmd response: success
24,152,335 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,167,949 UART:
24,168,276 UART: Running Caliptra FMC ...
24,169,364 UART:
24,169,518 UART: [fmc] Received command: 0x1000000A
24,171,139 >>> mbox cmd response data (116 bytes)
24,172,461 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,172,908 UART: [fmc] Received command: 0x10000009
24,174,682 >>> mbox cmd response data (48 bytes)
24,176,136 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,176,598 UART: [fmc] Received command: 0x10000003
24,186,562 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
2,227,996 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,229,322 UART:
2,229,577 UART: Running Caliptra ROM ...
2,230,729 UART:
2,230,875 UART: [state] CFI Enabled
2,231,746 UART: [state] LifecycleState = Unprovisioned
2,233,407 UART: [state] DebugLocked = No
2,234,519 UART: [state] WD Timer not started. Device not locked for debugging
2,237,012 UART: [kat] SHA2-256
2,237,683 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,240,686 UART: [kat] ++
2,241,129 UART: [kat] sha1
2,241,634 UART: [kat] SHA2-256
2,242,369 UART: [kat] SHA2-384
2,243,028 UART: [kat] SHA2-512-ACC
2,243,855 UART: [kat] ECC-384
4,100,207 UART: [kat] HMAC-384Kdf
4,112,344 UART: [kat] LMS
5,185,522 UART: [kat] --
5,191,324 UART: [cold-reset] ++
5,192,452 UART: [fht] FHT @ 0x50003400
5,205,426 UART: [idev] ++
5,206,103 UART: [idev] CDI.KEYID = 6
5,207,281 UART: [idev] SUBJECT.KEYID = 7
5,208,781 UART: [idev] UDS.KEYID = 0
5,226,484 UART: [idev] Erasing UDS.KEYID = 0
8,496,389 UART: [idev] Sha1 KeyId Algorithm
8,518,252 UART: [idev] --
8,523,215 UART: [ldev] ++
8,523,780 UART: [ldev] CDI.KEYID = 6
8,524,937 UART: [ldev] SUBJECT.KEYID = 5
8,526,468 UART: [ldev] AUTHORITY.KEYID = 7
8,527,943 UART: [ldev] FE.KEYID = 1
8,539,147 UART: [ldev] Erasing FE.KEYID = 1
11,832,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,298 UART: [ldev] --
14,197,929 UART: [fwproc] Wait for Commands...
14,200,899 UART: [fwproc] Recv command 0x4d454153
14,209,919 >>> mbox cmd response data (12 bytes)
14,211,795 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
14,353,530 UART: [fwproc] Recv command 0x46574c44
14,355,931 UART: [fwproc] Recv'd Img size: 111688 bytes
18,393,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,472,206 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,532,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,850,030 >>> mbox cmd response: success
18,854,913 UART: [afmc] ++
18,855,533 UART: [afmc] CDI.KEYID = 6
18,856,643 UART: [afmc] SUBJECT.KEYID = 7
18,857,856 UART: [afmc] AUTHORITY.KEYID = 5
22,176,908 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,475,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,477,690 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,493,819 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,509,991 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,525,787 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,548,633 UART: [afmc] --
24,551,856 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,552,203 UART: [cold-reset] --
24,558,249 UART: [state] Locking Datavault
24,562,635 UART: [state] Locking PCR0, PCR1 and PCR31
24,564,327 UART: [state] Locking ICCM
24,566,116 UART: [exit] Launching FMC @ 0x40000000
24,574,776 UART:
24,575,002 UART: Running Caliptra FMC ...
24,576,027 UART:
24,576,167 UART: [fmc] Received command: 0x1000000A
24,577,943 >>> mbox cmd response data (116 bytes)
24,579,421 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,579,760 UART: [fmc] Received command: 0x10000009
24,581,566 >>> mbox cmd response data (48 bytes)
24,583,064 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,583,527 UART: [fmc] Received command: 0x10000003
24,593,488 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
2,224,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,016,044 >>> mbox cmd response data (12 bytes)
14,018,296 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,642,025 >>> mbox cmd response: success
24,263,156 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,275,590 UART:
24,275,923 UART: Running Caliptra FMC ...
24,277,015 UART:
24,277,168 UART: [fmc] Received command: 0x1000000A
24,278,784 >>> mbox cmd response data (116 bytes)
24,280,165 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,280,604 UART: [fmc] Received command: 0x10000009
24,282,378 >>> mbox cmd response data (48 bytes)
24,283,818 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,284,293 UART: [fmc] Received command: 0x10000003
24,294,218 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
2,218,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,219,863 UART:
2,220,117 UART: Running Caliptra ROM ...
2,221,178 UART:
2,221,327 UART: [state] CFI Enabled
2,222,296 UART: [state] LifecycleState = Unprovisioned
2,223,893 UART: [state] DebugLocked = No
2,225,024 UART: [state] WD Timer not started. Device not locked for debugging
2,227,514 UART: [kat] SHA2-256
2,228,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,231,186 UART: [kat] ++
2,231,632 UART: [kat] sha1
2,232,141 UART: [kat] SHA2-256
2,232,797 UART: [kat] SHA2-384
2,233,449 UART: [kat] SHA2-512-ACC
2,234,288 UART: [kat] ECC-384
2,949,903 UART: [kat] HMAC-384Kdf
2,972,954 UART: [kat] LMS
3,502,398 UART: [kat] --
3,508,656 UART: [cold-reset] ++
3,511,066 UART: [fht] FHT @ 0x50003400
3,521,338 UART: [idev] ++
3,521,897 UART: [idev] CDI.KEYID = 6
3,522,832 UART: [idev] SUBJECT.KEYID = 7
3,524,043 UART: [idev] UDS.KEYID = 0
3,543,456 UART: [idev] Erasing UDS.KEYID = 0
6,024,296 UART: [idev] Sha1 KeyId Algorithm
6,046,300 UART: [idev] --
6,051,376 UART: [ldev] ++
6,051,967 UART: [ldev] CDI.KEYID = 6
6,052,880 UART: [ldev] SUBJECT.KEYID = 5
6,054,046 UART: [ldev] AUTHORITY.KEYID = 7
6,055,288 UART: [ldev] FE.KEYID = 1
6,099,927 UART: [ldev] Erasing FE.KEYID = 1
8,599,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,293 UART: [ldev] --
10,393,269 UART: [fwproc] Wait for Commands...
10,395,797 UART: [fwproc] Recv command 0x4d454153
10,404,323 >>> mbox cmd response data (12 bytes)
10,406,230 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,547,304 UART: [fwproc] Recv command 0x46574c44
10,549,480 UART: [fwproc] Recv'd Img size: 112032 bytes
13,919,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,737 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,060,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,377,935 >>> mbox cmd response: success
14,381,949 UART: [afmc] ++
14,382,625 UART: [afmc] CDI.KEYID = 6
14,383,511 UART: [afmc] SUBJECT.KEYID = 7
14,384,619 UART: [afmc] AUTHORITY.KEYID = 5
16,916,438 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,170 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,657,094 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,673,093 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,688,821 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,712,486 UART: [afmc] --
18,716,689 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,717,103 UART: [cold-reset] --
18,720,778 UART: [state] Locking Datavault
18,725,375 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,096 UART: [state] Locking ICCM
18,729,494 UART: [exit] Launching FMC @ 0x40000000
18,737,836 UART:
18,738,080 UART: Running Caliptra FMC ...
18,739,186 UART:
18,739,348 UART: [fmc] Received command: 0x1000000A
18,741,027 >>> mbox cmd response data (116 bytes)
18,742,644 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,743,082 UART: [fmc] Received command: 0x10000009
18,744,886 >>> mbox cmd response data (48 bytes)
18,746,445 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,746,893 UART: [fmc] Received command: 0x10000003
18,756,810 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,904 writing to cptra_bootfsm_go
2,229,207 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,205,672 >>> mbox cmd response data (12 bytes)
10,208,063 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,177,106 >>> mbox cmd response: success
18,456,164 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,471,622 UART:
18,471,951 UART: Running Caliptra FMC ...
18,473,113 UART:
18,473,297 UART: [fmc] Received command: 0x1000000A
18,474,873 >>> mbox cmd response data (116 bytes)
18,476,306 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,476,742 UART: [fmc] Received command: 0x10000009
18,478,533 >>> mbox cmd response data (48 bytes)
18,480,050 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,480,512 UART: [fmc] Received command: 0x10000003
18,490,459 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,226,695 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,227,952 UART:
2,228,200 UART: Running Caliptra ROM ...
2,229,284 UART:
2,229,434 UART: [state] CFI Enabled
2,230,309 UART: [state] LifecycleState = Unprovisioned
2,232,001 UART: [state] DebugLocked = No
2,233,126 UART: [state] WD Timer not started. Device not locked for debugging
2,235,638 UART: [kat] SHA2-256
2,236,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,239,321 UART: [kat] ++
2,239,771 UART: [kat] sha1
2,240,282 UART: [kat] SHA2-256
2,241,019 UART: [kat] SHA2-384
2,241,690 UART: [kat] SHA2-512-ACC
2,242,494 UART: [kat] ECC-384
3,277,998 UART: [kat] HMAC-384Kdf
3,289,546 UART: [kat] LMS
3,819,059 UART: [kat] --
3,822,571 UART: [cold-reset] ++
3,824,768 UART: [fht] FHT @ 0x50003400
3,836,447 UART: [idev] ++
3,837,009 UART: [idev] CDI.KEYID = 6
3,837,950 UART: [idev] SUBJECT.KEYID = 7
3,839,178 UART: [idev] UDS.KEYID = 0
3,855,183 UART: [idev] Erasing UDS.KEYID = 0
6,309,049 UART: [idev] Sha1 KeyId Algorithm
6,332,236 UART: [idev] --
6,335,637 UART: [ldev] ++
6,336,204 UART: [ldev] CDI.KEYID = 6
6,337,216 UART: [ldev] SUBJECT.KEYID = 5
6,338,312 UART: [ldev] AUTHORITY.KEYID = 7
6,339,592 UART: [ldev] FE.KEYID = 1
6,350,789 UART: [ldev] Erasing FE.KEYID = 1
8,823,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,493 UART: [ldev] --
10,612,570 UART: [fwproc] Wait for Commands...
10,614,935 UART: [fwproc] Recv command 0x4d454153
10,623,458 >>> mbox cmd response data (12 bytes)
10,625,256 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
10,766,165 UART: [fwproc] Recv command 0x46574c44
10,768,336 UART: [fwproc] Recv'd Img size: 112032 bytes
14,138,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,210,916 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,271,262 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,589,191 >>> mbox cmd response: success
14,592,999 UART: [afmc] ++
14,593,586 UART: [afmc] CDI.KEYID = 6
14,594,496 UART: [afmc] SUBJECT.KEYID = 7
14,595,808 UART: [afmc] AUTHORITY.KEYID = 5
17,093,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,813,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,815,892 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,831,933 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,848,001 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,863,638 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,887,113 UART: [afmc] --
18,891,308 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,891,665 UART: [cold-reset] --
18,895,234 UART: [state] Locking Datavault
18,899,347 UART: [state] Locking PCR0, PCR1 and PCR31
18,901,042 UART: [state] Locking ICCM
18,902,033 UART: [exit] Launching FMC @ 0x40000000
18,910,374 UART:
18,910,615 UART: Running Caliptra FMC ...
18,911,715 UART:
18,911,873 UART: [fmc] Received command: 0x1000000A
18,913,549 >>> mbox cmd response data (116 bytes)
18,915,120 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,915,586 UART: [fmc] Received command: 0x10000009
18,917,399 >>> mbox cmd response data (48 bytes)
18,918,913 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,919,371 UART: [fmc] Received command: 0x10000003
18,929,339 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,497 writing to cptra_bootfsm_go
2,238,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,414,567 >>> mbox cmd response data (12 bytes)
10,417,188 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,383,797 >>> mbox cmd response: success
18,620,695 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,637,775 UART:
18,638,109 UART: Running Caliptra FMC ...
18,639,276 UART:
18,639,439 UART: [fmc] Received command: 0x1000000A
18,641,018 >>> mbox cmd response data (116 bytes)
18,642,684 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,643,056 UART: [fmc] Received command: 0x10000009
18,644,844 >>> mbox cmd response data (48 bytes)
18,646,346 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,646,710 UART: [fmc] Received command: 0x10000003
18,656,681 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
2,225,625 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,208,426 >>> mbox cmd response data (12 bytes)
10,210,458 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,171,963 >>> mbox cmd response: success
18,453,585 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,469,640 UART:
18,469,985 UART: Running Caliptra FMC ...
18,471,065 UART:
18,471,217 UART: [fmc] Received command: 0x1000000A
18,472,880 >>> mbox cmd response data (116 bytes)
18,474,309 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,474,653 UART: [fmc] Received command: 0x10000009
18,476,480 >>> mbox cmd response data (48 bytes)
18,477,999 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,478,355 UART: [fmc] Received command: 0x10000003
18,488,327 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
2,219,265 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,413,360 >>> mbox cmd response data (12 bytes)
10,415,777 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,386,186 >>> mbox cmd response: success
18,620,325 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,634,267 UART:
18,634,584 UART: Running Caliptra FMC ...
18,635,734 UART:
18,635,900 UART: [fmc] Received command: 0x1000000A
18,637,517 >>> mbox cmd response data (116 bytes)
18,638,934 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,639,366 UART: [fmc] Received command: 0x10000009
18,641,177 >>> mbox cmd response data (48 bytes)
18,642,657 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,643,118 UART: [fmc] Received command: 0x10000003
18,653,040 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
915,904 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,899 UART: [cold-reset] ++
1,170,473 UART: [fht] FHT @ 0x50003400
1,172,959 UART: [idev] ++
1,173,127 UART: [idev] CDI.KEYID = 6
1,173,488 UART: [idev] SUBJECT.KEYID = 7
1,173,913 UART: [idev] UDS.KEYID = 0
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,693 UART: [idev] Sha1 KeyId Algorithm
1,207,555 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,586 UART: [ldev] --
1,281,058 UART: [fwproc] Wait for Commands...
1,281,845 UART: [fwproc] Recv command 0x4d454153
1,285,872 >>> mbox cmd response data (12 bytes)
1,285,873 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,286,044 UART: [fwproc] Recv command 0x46574c44
1,286,777 UART: [fwproc] Recv'd Img size: 112032 bytes
2,557,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,583,988 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,609,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,745,665 >>> mbox cmd response: success
2,746,860 UART: [afmc] ++
2,747,028 UART: [afmc] CDI.KEYID = 6
2,747,391 UART: [afmc] SUBJECT.KEYID = 7
2,747,817 UART: [afmc] AUTHORITY.KEYID = 5
2,783,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,307 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,003 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,902 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,595 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,351 UART: [afmc] --
2,826,423 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,826,445 UART: [cold-reset] --
2,827,379 UART: [state] Locking Datavault
2,828,430 UART: [state] Locking PCR0, PCR1 and PCR31
2,829,034 UART: [state] Locking ICCM
2,829,574 UART: [exit] Launching FMC @ 0x40000000
2,834,871 UART:
2,834,887 UART: Running Caliptra FMC ...
2,835,295 UART:
2,835,525 UART: [fmc] Received command: 0x1000000A
2,836,954 >>> mbox cmd response data (116 bytes)
2,836,955 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,836,984 UART: [fmc] Received command: 0x10000009
2,838,182 >>> mbox cmd response data (48 bytes)
2,838,183 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,838,212 UART: [fmc] Received command: 0x10000003
2,847,668 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,372 >>> mbox cmd response data (12 bytes)
1,138,373 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,594,032 >>> mbox cmd response: success
2,650,015 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,940 UART:
2,655,956 UART: Running Caliptra FMC ...
2,656,364 UART:
2,656,594 UART: [fmc] Received command: 0x1000000A
2,658,023 >>> mbox cmd response data (116 bytes)
2,658,024 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,658,053 UART: [fmc] Received command: 0x10000009
2,659,251 >>> mbox cmd response data (48 bytes)
2,659,252 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,659,281 UART: [fmc] Received command: 0x10000003
2,668,737 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,817 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
87,194 UART: [state] WD Timer not started. Device not locked for debugging
88,481 UART: [kat] SHA2-256
892,031 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,160 UART: [kat] ++
896,312 UART: [kat] sha1
900,688 UART: [kat] SHA2-256
902,628 UART: [kat] SHA2-384
905,301 UART: [kat] SHA2-512-ACC
907,202 UART: [kat] ECC-384
917,327 UART: [kat] HMAC-384Kdf
922,015 UART: [kat] LMS
1,170,327 UART: [kat] --
1,171,350 UART: [cold-reset] ++
1,171,778 UART: [fht] FHT @ 0x50003400
1,174,626 UART: [idev] ++
1,174,794 UART: [idev] CDI.KEYID = 6
1,175,155 UART: [idev] SUBJECT.KEYID = 7
1,175,580 UART: [idev] UDS.KEYID = 0
1,183,548 UART: [idev] Erasing UDS.KEYID = 0
1,200,732 UART: [idev] Sha1 KeyId Algorithm
1,209,478 UART: [idev] --
1,210,507 UART: [ldev] ++
1,210,675 UART: [ldev] CDI.KEYID = 6
1,211,039 UART: [ldev] SUBJECT.KEYID = 5
1,211,466 UART: [ldev] AUTHORITY.KEYID = 7
1,211,929 UART: [ldev] FE.KEYID = 1
1,216,955 UART: [ldev] Erasing FE.KEYID = 1
1,243,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,471 UART: [ldev] --
1,282,755 UART: [fwproc] Wait for Commands...
1,283,352 UART: [fwproc] Recv command 0x4d454153
1,287,379 >>> mbox cmd response data (12 bytes)
1,287,380 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,287,649 UART: [fwproc] Recv command 0x46574c44
1,288,382 UART: [fwproc] Recv'd Img size: 112032 bytes
2,560,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,587,177 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,612,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,748,818 >>> mbox cmd response: success
2,750,001 UART: [afmc] ++
2,750,169 UART: [afmc] CDI.KEYID = 6
2,750,532 UART: [afmc] SUBJECT.KEYID = 7
2,750,958 UART: [afmc] AUTHORITY.KEYID = 5
2,787,399 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,803,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,804,516 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,810,212 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,816,111 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,821,804 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,829,734 UART: [afmc] --
2,830,830 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,830,852 UART: [cold-reset] --
2,831,858 UART: [state] Locking Datavault
2,832,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,833,447 UART: [state] Locking ICCM
2,833,867 UART: [exit] Launching FMC @ 0x40000000
2,839,164 UART:
2,839,180 UART: Running Caliptra FMC ...
2,839,588 UART:
2,839,818 UART: [fmc] Received command: 0x1000000A
2,841,247 >>> mbox cmd response data (116 bytes)
2,841,248 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,841,277 UART: [fmc] Received command: 0x10000009
2,842,475 >>> mbox cmd response data (48 bytes)
2,842,476 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,842,505 UART: [fmc] Received command: 0x10000003
2,851,961 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,571 >>> mbox cmd response data (12 bytes)
1,140,572 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,596,563 >>> mbox cmd response: success
2,651,858 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,657,865 UART:
2,657,881 UART: Running Caliptra FMC ...
2,658,289 UART:
2,658,519 UART: [fmc] Received command: 0x1000000A
2,659,948 >>> mbox cmd response data (116 bytes)
2,659,949 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,659,978 UART: [fmc] Received command: 0x10000009
2,661,176 >>> mbox cmd response data (48 bytes)
2,661,177 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,661,206 UART: [fmc] Received command: 0x10000003
2,670,662 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,628 UART: [state] LifecycleState = Unprovisioned
85,283 UART: [state] DebugLocked = No
85,845 UART: [state] WD Timer not started. Device not locked for debugging
86,956 UART: [kat] SHA2-256
890,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,635 UART: [kat] ++
894,787 UART: [kat] sha1
899,029 UART: [kat] SHA2-256
900,969 UART: [kat] SHA2-384
903,924 UART: [kat] SHA2-512-ACC
905,825 UART: [kat] ECC-384
915,650 UART: [kat] HMAC-384Kdf
920,094 UART: [kat] LMS
1,168,406 UART: [kat] --
1,169,531 UART: [cold-reset] ++
1,169,983 UART: [fht] FHT @ 0x50003400
1,172,773 UART: [idev] ++
1,172,941 UART: [idev] CDI.KEYID = 6
1,173,302 UART: [idev] SUBJECT.KEYID = 7
1,173,727 UART: [idev] UDS.KEYID = 0
1,181,557 UART: [idev] Erasing UDS.KEYID = 0
1,198,599 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,550 UART: [ldev] ++
1,208,718 UART: [ldev] CDI.KEYID = 6
1,209,082 UART: [ldev] SUBJECT.KEYID = 5
1,209,509 UART: [ldev] AUTHORITY.KEYID = 7
1,209,972 UART: [ldev] FE.KEYID = 1
1,215,128 UART: [ldev] Erasing FE.KEYID = 1
1,241,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,540 UART: [ldev] --
1,280,994 UART: [fwproc] Wait for Commands...
1,281,731 UART: [fwproc] Recv command 0x4d454153
1,285,758 >>> mbox cmd response data (12 bytes)
1,285,759 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,285,874 UART: [fwproc] Recv command 0x46574c44
1,286,607 UART: [fwproc] Recv'd Img size: 112032 bytes
2,557,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,856 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,541 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,746,553 >>> mbox cmd response: success
2,747,610 UART: [afmc] ++
2,747,778 UART: [afmc] CDI.KEYID = 6
2,748,141 UART: [afmc] SUBJECT.KEYID = 7
2,748,567 UART: [afmc] AUTHORITY.KEYID = 5
2,783,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,743 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,439 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,812,338 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,818,031 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,917 UART: [afmc] --
2,826,785 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,826,807 UART: [cold-reset] --
2,827,613 UART: [state] Locking Datavault
2,828,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,829,316 UART: [state] Locking ICCM
2,829,928 UART: [exit] Launching FMC @ 0x40000000
2,835,225 UART:
2,835,241 UART: Running Caliptra FMC ...
2,835,649 UART:
2,835,879 UART: [fmc] Received command: 0x1000000A
2,837,308 >>> mbox cmd response data (116 bytes)
2,837,309 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,837,338 UART: [fmc] Received command: 0x10000009
2,838,536 >>> mbox cmd response data (48 bytes)
2,838,537 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,838,566 UART: [fmc] Received command: 0x10000003
2,848,022 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,368 >>> mbox cmd response data (12 bytes)
1,138,369 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,594,512 >>> mbox cmd response: success
2,650,817 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,964 UART:
2,656,980 UART: Running Caliptra FMC ...
2,657,388 UART:
2,657,618 UART: [fmc] Received command: 0x1000000A
2,659,047 >>> mbox cmd response data (116 bytes)
2,659,048 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,659,077 UART: [fmc] Received command: 0x10000009
2,660,275 >>> mbox cmd response data (48 bytes)
2,660,276 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,660,305 UART: [fmc] Received command: 0x10000003
2,669,761 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
891,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
916,071 UART: [kat] HMAC-384Kdf
920,853 UART: [kat] LMS
1,169,165 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,872 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,182,274 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,221 UART: [ldev] ++
1,209,389 UART: [ldev] CDI.KEYID = 6
1,209,753 UART: [ldev] SUBJECT.KEYID = 5
1,210,180 UART: [ldev] AUTHORITY.KEYID = 7
1,210,643 UART: [ldev] FE.KEYID = 1
1,216,029 UART: [ldev] Erasing FE.KEYID = 1
1,241,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,323 UART: [fwproc] Wait for Commands...
1,282,012 UART: [fwproc] Recv command 0x4d454153
1,286,039 >>> mbox cmd response data (12 bytes)
1,286,040 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,286,343 UART: [fwproc] Recv command 0x46574c44
1,287,076 UART: [fwproc] Recv'd Img size: 112032 bytes
2,557,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,585,231 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,746,996 >>> mbox cmd response: success
2,748,049 UART: [afmc] ++
2,748,217 UART: [afmc] CDI.KEYID = 6
2,748,580 UART: [afmc] SUBJECT.KEYID = 7
2,749,006 UART: [afmc] AUTHORITY.KEYID = 5
2,784,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,801,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,802,064 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,807,760 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,813,659 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,819,352 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,827,188 UART: [afmc] --
2,828,194 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,828,216 UART: [cold-reset] --
2,829,190 UART: [state] Locking Datavault
2,830,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,831,201 UART: [state] Locking ICCM
2,831,653 UART: [exit] Launching FMC @ 0x40000000
2,836,950 UART:
2,836,966 UART: Running Caliptra FMC ...
2,837,374 UART:
2,837,604 UART: [fmc] Received command: 0x1000000A
2,839,033 >>> mbox cmd response data (116 bytes)
2,839,034 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,839,063 UART: [fmc] Received command: 0x10000009
2,840,261 >>> mbox cmd response data (48 bytes)
2,840,262 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,840,291 UART: [fmc] Received command: 0x10000003
2,849,747 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,845 >>> mbox cmd response data (12 bytes)
1,139,846 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,597,305 >>> mbox cmd response: success
2,653,704 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,659,717 UART:
2,659,733 UART: Running Caliptra FMC ...
2,660,141 UART:
2,660,371 UART: [fmc] Received command: 0x1000000A
2,661,800 >>> mbox cmd response data (116 bytes)
2,661,801 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,661,830 UART: [fmc] Received command: 0x10000009
2,663,028 >>> mbox cmd response data (48 bytes)
2,663,029 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,663,058 UART: [fmc] Received command: 0x10000003
2,672,514 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
86,007 UART: [state] WD Timer not started. Device not locked for debugging
87,164 UART: [kat] SHA2-256
890,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,843 UART: [kat] ++
894,995 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,114 UART: [kat] SHA2-512-ACC
906,015 UART: [kat] ECC-384
915,422 UART: [kat] HMAC-384Kdf
919,812 UART: [kat] LMS
1,168,124 UART: [kat] --
1,169,203 UART: [cold-reset] ++
1,169,587 UART: [fht] FHT @ 0x50003400
1,172,415 UART: [idev] ++
1,172,583 UART: [idev] CDI.KEYID = 6
1,172,944 UART: [idev] SUBJECT.KEYID = 7
1,173,369 UART: [idev] UDS.KEYID = 0
1,181,209 UART: [idev] Erasing UDS.KEYID = 0
1,198,007 UART: [idev] Sha1 KeyId Algorithm
1,206,835 UART: [idev] --
1,207,856 UART: [ldev] ++
1,208,024 UART: [ldev] CDI.KEYID = 6
1,208,388 UART: [ldev] SUBJECT.KEYID = 5
1,208,815 UART: [ldev] AUTHORITY.KEYID = 7
1,209,278 UART: [ldev] FE.KEYID = 1
1,214,416 UART: [ldev] Erasing FE.KEYID = 1
1,240,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,178 UART: [ldev] --
1,279,684 UART: [fwproc] Wait for Commands...
1,280,331 UART: [fwproc] Recv command 0x4d454153
1,284,358 >>> mbox cmd response data (12 bytes)
1,284,359 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,284,544 UART: [fwproc] Recv command 0x46574c44
1,285,277 UART: [fwproc] Recv'd Img size: 112032 bytes
2,555,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,390 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,075 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,744,073 >>> mbox cmd response: success
2,745,102 UART: [afmc] ++
2,745,270 UART: [afmc] CDI.KEYID = 6
2,745,633 UART: [afmc] SUBJECT.KEYID = 7
2,746,059 UART: [afmc] AUTHORITY.KEYID = 5
2,781,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,385 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,081 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,980 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,673 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,527 UART: [afmc] --
2,824,481 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,824,503 UART: [cold-reset] --
2,825,305 UART: [state] Locking Datavault
2,826,586 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,190 UART: [state] Locking ICCM
2,827,802 UART: [exit] Launching FMC @ 0x40000000
2,833,099 UART:
2,833,115 UART: Running Caliptra FMC ...
2,833,523 UART:
2,833,753 UART: [fmc] Received command: 0x1000000A
2,835,182 >>> mbox cmd response data (116 bytes)
2,835,183 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,835,212 UART: [fmc] Received command: 0x10000009
2,836,410 >>> mbox cmd response data (48 bytes)
2,836,411 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,836,440 UART: [fmc] Received command: 0x10000003
2,845,896 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,630 >>> mbox cmd response data (12 bytes)
1,139,631 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,595,698 >>> mbox cmd response: success
2,651,485 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,657,234 UART:
2,657,250 UART: Running Caliptra FMC ...
2,657,658 UART:
2,657,888 UART: [fmc] Received command: 0x1000000A
2,659,317 >>> mbox cmd response data (116 bytes)
2,659,318 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,659,347 UART: [fmc] Received command: 0x10000009
2,660,545 >>> mbox cmd response data (48 bytes)
2,660,546 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,660,575 UART: [fmc] Received command: 0x10000003
2,670,031 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,669 UART: [kat] HMAC-384Kdf
921,377 UART: [kat] LMS
1,169,689 UART: [kat] --
1,170,180 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,504 UART: [idev] ++
1,173,672 UART: [idev] CDI.KEYID = 6
1,174,033 UART: [idev] SUBJECT.KEYID = 7
1,174,458 UART: [idev] UDS.KEYID = 0
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,968 UART: [idev] Sha1 KeyId Algorithm
1,208,998 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,479 UART: [ldev] SUBJECT.KEYID = 5
1,210,906 UART: [ldev] AUTHORITY.KEYID = 7
1,211,369 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,239 UART: [ldev] --
1,282,503 UART: [fwproc] Wait for Commands...
1,283,226 UART: [fwproc] Recv command 0x4d454153
1,287,253 >>> mbox cmd response data (12 bytes)
1,287,254 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,287,393 UART: [fwproc] Recv command 0x46574c44
1,288,126 UART: [fwproc] Recv'd Img size: 112032 bytes
2,558,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,585,775 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,611,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,747,510 >>> mbox cmd response: success
2,748,669 UART: [afmc] ++
2,748,837 UART: [afmc] CDI.KEYID = 6
2,749,200 UART: [afmc] SUBJECT.KEYID = 7
2,749,626 UART: [afmc] AUTHORITY.KEYID = 5
2,785,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,802,137 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,802,888 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,808,584 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,814,483 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,820,176 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,827,926 UART: [afmc] --
2,828,874 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,828,896 UART: [cold-reset] --
2,829,808 UART: [state] Locking Datavault
2,831,147 UART: [state] Locking PCR0, PCR1 and PCR31
2,831,751 UART: [state] Locking ICCM
2,832,229 UART: [exit] Launching FMC @ 0x40000000
2,837,526 UART:
2,837,542 UART: Running Caliptra FMC ...
2,837,950 UART:
2,838,180 UART: [fmc] Received command: 0x1000000A
2,839,609 >>> mbox cmd response data (116 bytes)
2,839,610 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,839,639 UART: [fmc] Received command: 0x10000009
2,840,837 >>> mbox cmd response data (48 bytes)
2,840,838 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,840,867 UART: [fmc] Received command: 0x10000003
2,850,323 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,879 >>> mbox cmd response data (12 bytes)
1,139,880 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,595,915 >>> mbox cmd response: success
2,652,242 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,658,167 UART:
2,658,183 UART: Running Caliptra FMC ...
2,658,591 UART:
2,658,821 UART: [fmc] Received command: 0x1000000A
2,660,250 >>> mbox cmd response data (116 bytes)
2,660,251 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,660,280 UART: [fmc] Received command: 0x10000009
2,661,478 >>> mbox cmd response data (48 bytes)
2,661,479 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,661,508 UART: [fmc] Received command: 0x10000003
2,670,964 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,702 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
191,995 UART:
192,378 UART: Running Caliptra ROM ...
193,581 UART:
193,731 UART: [state] CFI Enabled
266,018 UART: [state] LifecycleState = Unprovisioned
268,385 UART: [state] DebugLocked = No
270,596 UART: [state] WD Timer not started. Device not locked for debugging
274,786 UART: [kat] SHA2-256
456,688 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,256 UART: [kat] ++
468,722 UART: [kat] sha1
479,228 UART: [kat] SHA2-256
482,293 UART: [kat] SHA2-384
488,373 UART: [kat] SHA2-512-ACC
490,989 UART: [kat] ECC-384
3,773,066 UART: [kat] HMAC-384Kdf
3,801,808 UART: [kat] LMS
4,874,984 UART: [kat] --
4,878,566 UART: [cold-reset] ++
4,880,287 UART: [fht] FHT @ 0x50003400
4,890,467 UART: [idev] ++
4,891,141 UART: [idev] CDI.KEYID = 6
4,892,248 UART: [idev] SUBJECT.KEYID = 7
4,893,464 UART: [idev] UDS.KEYID = 0
4,928,430 UART: [idev] Erasing UDS.KEYID = 0
8,240,830 UART: [idev] Sha1 KeyId Algorithm
8,263,210 UART: [idev] --
8,268,152 UART: [ldev] ++
8,268,723 UART: [ldev] CDI.KEYID = 6
8,269,884 UART: [ldev] SUBJECT.KEYID = 5
8,271,097 UART: [ldev] AUTHORITY.KEYID = 7
8,272,251 UART: [ldev] FE.KEYID = 1
8,314,918 UART: [ldev] Erasing FE.KEYID = 1
11,650,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,551 UART: [ldev] --
14,034,257 UART: [fwproc] Wait for Commands...
14,037,171 UART: [fwproc] Recv command 0x46574c44
14,039,499 UART: Invalid Img size: 0 bytes
14,043,125 UART: ROM Fatal Error: 0x01020002
14,046,447 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,731 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
13,827,539 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,042 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,299 UART:
192,669 UART: Running Caliptra ROM ...
193,814 UART:
603,360 UART: [state] CFI Enabled
618,155 UART: [state] LifecycleState = Unprovisioned
620,545 UART: [state] DebugLocked = No
622,189 UART: [state] WD Timer not started. Device not locked for debugging
627,079 UART: [kat] SHA2-256
809,037 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,578 UART: [kat] ++
821,119 UART: [kat] sha1
831,373 UART: [kat] SHA2-256
834,454 UART: [kat] SHA2-384
840,809 UART: [kat] SHA2-512-ACC
843,427 UART: [kat] ECC-384
4,100,986 UART: [kat] HMAC-384Kdf
4,112,144 UART: [kat] LMS
5,185,334 UART: [kat] --
5,190,825 UART: [cold-reset] ++
5,192,069 UART: [fht] FHT @ 0x50003400
5,202,682 UART: [idev] ++
5,203,406 UART: [idev] CDI.KEYID = 6
5,204,583 UART: [idev] SUBJECT.KEYID = 7
5,206,011 UART: [idev] UDS.KEYID = 0
5,224,135 UART: [idev] Erasing UDS.KEYID = 0
8,503,262 UART: [idev] Sha1 KeyId Algorithm
8,526,170 UART: [idev] --
8,529,151 UART: [ldev] ++
8,529,768 UART: [ldev] CDI.KEYID = 6
8,530,872 UART: [ldev] SUBJECT.KEYID = 5
8,532,406 UART: [ldev] AUTHORITY.KEYID = 7
8,533,890 UART: [ldev] FE.KEYID = 1
8,546,102 UART: [ldev] Erasing FE.KEYID = 1
11,837,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,131,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,147,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,163,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,179,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,201,473 UART: [ldev] --
14,205,812 UART: [fwproc] Wait for Commands...
14,208,020 UART: [fwproc] Recv command 0x46574c44
14,210,284 UART: Invalid Img size: 0 bytes
14,214,502 UART: ROM Fatal Error: 0x01020002
14,217,837 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,176 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
14,019,031 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,874 writing to cptra_bootfsm_go
4,735 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,989 UART:
193,364 UART: Running Caliptra ROM ...
194,532 UART:
194,683 UART: [state] CFI Enabled
262,088 UART: [state] LifecycleState = Unprovisioned
263,963 UART: [state] DebugLocked = No
266,208 UART: [state] WD Timer not started. Device not locked for debugging
270,075 UART: [kat] SHA2-256
449,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,811 UART: [kat] ++
461,348 UART: [kat] sha1
471,958 UART: [kat] SHA2-256
474,963 UART: [kat] SHA2-384
480,561 UART: [kat] SHA2-512-ACC
483,546 UART: [kat] ECC-384
2,928,339 UART: [kat] HMAC-384Kdf
2,950,840 UART: [kat] LMS
3,480,273 UART: [kat] --
3,485,425 UART: [cold-reset] ++
3,486,285 UART: [fht] FHT @ 0x50003400
3,498,184 UART: [idev] ++
3,498,747 UART: [idev] CDI.KEYID = 6
3,499,660 UART: [idev] SUBJECT.KEYID = 7
3,500,839 UART: [idev] UDS.KEYID = 0
3,522,061 UART: [idev] Erasing UDS.KEYID = 0
6,004,019 UART: [idev] Sha1 KeyId Algorithm
6,025,727 UART: [idev] --
6,028,971 UART: [ldev] ++
6,029,546 UART: [ldev] CDI.KEYID = 6
6,030,465 UART: [ldev] SUBJECT.KEYID = 5
6,031,684 UART: [ldev] AUTHORITY.KEYID = 7
6,032,931 UART: [ldev] FE.KEYID = 1
6,079,442 UART: [ldev] Erasing FE.KEYID = 1
8,583,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,024 UART: [ldev] --
10,393,880 UART: [fwproc] Wait for Commands...
10,395,710 UART: [fwproc] Recv command 0x46574c44
10,397,803 UART: Invalid Img size: 0 bytes
10,401,209 UART: ROM Fatal Error: 0x01020002
10,404,298 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,971 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,227,197 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
4,245 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,487 UART:
192,944 UART: Running Caliptra ROM ...
194,046 UART:
603,453 UART: [state] CFI Enabled
614,482 UART: [state] LifecycleState = Unprovisioned
616,516 UART: [state] DebugLocked = No
618,554 UART: [state] WD Timer not started. Device not locked for debugging
622,083 UART: [kat] SHA2-256
801,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,761 UART: [kat] ++
813,341 UART: [kat] sha1
824,112 UART: [kat] SHA2-256
827,161 UART: [kat] SHA2-384
834,260 UART: [kat] SHA2-512-ACC
837,198 UART: [kat] ECC-384
3,280,390 UART: [kat] HMAC-384Kdf
3,292,329 UART: [kat] LMS
3,821,833 UART: [kat] --
3,826,760 UART: [cold-reset] ++
3,828,525 UART: [fht] FHT @ 0x50003400
3,839,837 UART: [idev] ++
3,840,394 UART: [idev] CDI.KEYID = 6
3,841,403 UART: [idev] SUBJECT.KEYID = 7
3,842,503 UART: [idev] UDS.KEYID = 0
3,860,363 UART: [idev] Erasing UDS.KEYID = 0
6,316,158 UART: [idev] Sha1 KeyId Algorithm
6,339,840 UART: [idev] --
6,343,647 UART: [ldev] ++
6,344,225 UART: [ldev] CDI.KEYID = 6
6,345,156 UART: [ldev] SUBJECT.KEYID = 5
6,346,317 UART: [ldev] AUTHORITY.KEYID = 7
6,347,547 UART: [ldev] FE.KEYID = 1
6,358,363 UART: [ldev] Erasing FE.KEYID = 1
8,830,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,568 UART: [ldev] --
10,620,135 UART: [fwproc] Wait for Commands...
10,622,643 UART: [fwproc] Recv command 0x46574c44
10,624,754 UART: Invalid Img size: 0 bytes
10,627,622 UART: ROM Fatal Error: 0x01020002
10,630,714 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
4,392 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,399,768 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
4,070 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,201,876 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
4,066 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,403,105 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
891,492 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,621 UART: [kat] ++
895,773 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,708 UART: [kat] SHA2-512-ACC
906,609 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,445 UART: [cold-reset] ++
1,169,923 UART: [fht] FHT @ 0x50003400
1,172,779 UART: [idev] ++
1,172,947 UART: [idev] CDI.KEYID = 6
1,173,308 UART: [idev] SUBJECT.KEYID = 7
1,173,733 UART: [idev] UDS.KEYID = 0
1,181,923 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,467 UART: [idev] --
1,208,684 UART: [ldev] ++
1,208,852 UART: [ldev] CDI.KEYID = 6
1,209,216 UART: [ldev] SUBJECT.KEYID = 5
1,209,643 UART: [ldev] AUTHORITY.KEYID = 7
1,210,106 UART: [ldev] FE.KEYID = 1
1,215,016 UART: [ldev] Erasing FE.KEYID = 1
1,241,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,638 UART: [fwproc] Wait for Commands...
1,281,303 UART: [fwproc] Recv command 0x46574c44
1,282,032 UART: Invalid Img size: 0 bytes
1,282,802 UART: ROM Fatal Error: 0x01020002
1,283,961 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,081 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,638 UART: [kat] ++
895,790 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,871 UART: [kat] SHA2-512-ACC
906,772 UART: [kat] ECC-384
916,417 UART: [kat] HMAC-384Kdf
921,109 UART: [kat] LMS
1,169,421 UART: [kat] --
1,170,118 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,465 UART: [ldev] ++
1,209,633 UART: [ldev] CDI.KEYID = 6
1,209,997 UART: [ldev] SUBJECT.KEYID = 5
1,210,424 UART: [ldev] AUTHORITY.KEYID = 7
1,210,887 UART: [ldev] FE.KEYID = 1
1,216,209 UART: [ldev] Erasing FE.KEYID = 1
1,242,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,257 UART: [ldev] --
1,282,697 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,131 UART: Invalid Img size: 0 bytes
1,284,977 UART: ROM Fatal Error: 0x01020002
1,286,136 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,736 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,246 UART: [kat] SHA2-512-ACC
906,147 UART: [kat] ECC-384
915,584 UART: [kat] HMAC-384Kdf
920,296 UART: [kat] LMS
1,168,608 UART: [kat] --
1,169,355 UART: [cold-reset] ++
1,169,839 UART: [fht] FHT @ 0x50003400
1,172,531 UART: [idev] ++
1,172,699 UART: [idev] CDI.KEYID = 6
1,173,060 UART: [idev] SUBJECT.KEYID = 7
1,173,485 UART: [idev] UDS.KEYID = 0
1,181,493 UART: [idev] Erasing UDS.KEYID = 0
1,198,333 UART: [idev] Sha1 KeyId Algorithm
1,207,275 UART: [idev] --
1,208,096 UART: [ldev] ++
1,208,264 UART: [ldev] CDI.KEYID = 6
1,208,628 UART: [ldev] SUBJECT.KEYID = 5
1,209,055 UART: [ldev] AUTHORITY.KEYID = 7
1,209,518 UART: [ldev] FE.KEYID = 1
1,215,024 UART: [ldev] Erasing FE.KEYID = 1
1,241,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,208 UART: [ldev] --
1,280,664 UART: [fwproc] Wait for Commands...
1,281,323 UART: [fwproc] Recv command 0x46574c44
1,282,052 UART: Invalid Img size: 0 bytes
1,282,954 UART: ROM Fatal Error: 0x01020002
1,284,113 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,329 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,797 UART: [state] LifecycleState = Unprovisioned
86,452 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
891,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,800 UART: [kat] ++
895,952 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,279 UART: [kat] HMAC-384Kdf
920,837 UART: [kat] LMS
1,169,149 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,580 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,198,796 UART: [idev] Sha1 KeyId Algorithm
1,207,734 UART: [idev] --
1,208,857 UART: [ldev] ++
1,209,025 UART: [ldev] CDI.KEYID = 6
1,209,389 UART: [ldev] SUBJECT.KEYID = 5
1,209,816 UART: [ldev] AUTHORITY.KEYID = 7
1,210,279 UART: [ldev] FE.KEYID = 1
1,215,729 UART: [ldev] Erasing FE.KEYID = 1
1,241,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,059 UART: [ldev] --
1,281,385 UART: [fwproc] Wait for Commands...
1,281,996 UART: [fwproc] Recv command 0x46574c44
1,282,725 UART: Invalid Img size: 0 bytes
1,283,457 UART: ROM Fatal Error: 0x01020002
1,284,616 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,708 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,195 UART: [kat] ++
895,347 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,494 UART: [kat] HMAC-384Kdf
920,178 UART: [kat] LMS
1,168,490 UART: [kat] --
1,169,521 UART: [cold-reset] ++
1,170,081 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,199,187 UART: [idev] Sha1 KeyId Algorithm
1,208,021 UART: [idev] --
1,209,082 UART: [ldev] ++
1,209,250 UART: [ldev] CDI.KEYID = 6
1,209,614 UART: [ldev] SUBJECT.KEYID = 5
1,210,041 UART: [ldev] AUTHORITY.KEYID = 7
1,210,504 UART: [ldev] FE.KEYID = 1
1,215,956 UART: [ldev] Erasing FE.KEYID = 1
1,241,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,230 UART: [ldev] --
1,280,554 UART: [fwproc] Wait for Commands...
1,281,197 UART: [fwproc] Recv command 0x46574c44
1,281,926 UART: Invalid Img size: 0 bytes
1,282,840 UART: ROM Fatal Error: 0x01020002
1,283,999 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,939 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
891,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,912 UART: [kat] ++
896,064 UART: [kat] sha1
900,336 UART: [kat] SHA2-256
902,276 UART: [kat] SHA2-384
905,047 UART: [kat] SHA2-512-ACC
906,948 UART: [kat] ECC-384
916,835 UART: [kat] HMAC-384Kdf
921,557 UART: [kat] LMS
1,169,869 UART: [kat] --
1,170,870 UART: [cold-reset] ++
1,171,436 UART: [fht] FHT @ 0x50003400
1,174,122 UART: [idev] ++
1,174,290 UART: [idev] CDI.KEYID = 6
1,174,651 UART: [idev] SUBJECT.KEYID = 7
1,175,076 UART: [idev] UDS.KEYID = 0
1,183,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,730 UART: [idev] Sha1 KeyId Algorithm
1,208,654 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,269 UART: [ldev] SUBJECT.KEYID = 5
1,210,696 UART: [ldev] AUTHORITY.KEYID = 7
1,211,159 UART: [ldev] FE.KEYID = 1
1,216,493 UART: [ldev] Erasing FE.KEYID = 1
1,243,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,533 UART: [ldev] --
1,282,937 UART: [fwproc] Wait for Commands...
1,283,574 UART: [fwproc] Recv command 0x46574c44
1,284,303 UART: Invalid Img size: 0 bytes
1,285,035 UART: ROM Fatal Error: 0x01020002
1,286,194 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,170 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,288 UART:
192,655 UART: Running Caliptra ROM ...
193,867 UART:
194,014 UART: [state] CFI Enabled
264,898 UART: [state] LifecycleState = Unprovisioned
267,336 UART: [state] DebugLocked = No
269,580 UART: [state] WD Timer not started. Device not locked for debugging
274,005 UART: [kat] SHA2-256
455,904 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,424 UART: [kat] ++
467,935 UART: [kat] sha1
479,344 UART: [kat] SHA2-256
482,359 UART: [kat] SHA2-384
487,191 UART: [kat] SHA2-512-ACC
489,799 UART: [kat] ECC-384
3,777,583 UART: [kat] HMAC-384Kdf
3,802,444 UART: [kat] LMS
4,875,610 UART: [kat] --
4,880,215 UART: [cold-reset] ++
4,882,696 UART: [fht] FHT @ 0x50003400
4,893,942 UART: [idev] ++
4,894,637 UART: [idev] CDI.KEYID = 6
4,895,873 UART: [idev] SUBJECT.KEYID = 7
4,896,974 UART: [idev] UDS.KEYID = 0
4,930,124 UART: [idev] Erasing UDS.KEYID = 0
8,241,915 UART: [idev] Sha1 KeyId Algorithm
8,261,213 UART: [idev] CSR upload begun
8,266,684 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,573,911 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,590,196 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,606,312 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,622,348 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,646,887 UART: [idev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
10,792,882 UART: [idev] CSR uploaded
10,810,090 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,953,866 UART: [idev] --
10,954,528 UART: [ldev] ++
10,955,048 UART: [ldev] CDI.KEYID = 6
10,955,929 UART: [ldev] SUBJECT.KEYID = 5
10,957,015 UART: [ldev] AUTHORITY.KEYID = 7
10,958,137 UART: [ldev] FE.KEYID = 1
10,958,977 UART: [ldev] Erasing FE.KEYID = 1
14,191,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,503,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,520,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,535,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,551,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,572,692 UART: [ldev] --
16,576,442 UART: [fwproc] Wait for Commands...
16,578,424 UART: [fwproc] Recv command 0x46574c44
16,580,689 UART: [fwproc] Recv'd Img size: 114124 bytes
20,649,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,726,824 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,795,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,112,223 >>> mbox cmd response: success
21,116,210 UART: [afmc] ++
21,116,801 UART: [afmc] CDI.KEYID = 6
21,118,044 UART: [afmc] SUBJECT.KEYID = 7
21,119,160 UART: [afmc] AUTHORITY.KEYID = 5
24,486,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,796,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,798,895 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,815,098 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,831,122 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,847,111 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,870,447 UART: [afmc] --
26,874,643 UART: [cold-reset] --
26,878,611 UART: [state] Locking Datavault
26,884,892 UART: [state] Locking PCR0, PCR1 and PCR31
26,886,551 UART: [state] Locking ICCM
26,889,169 UART: [exit] Launching FMC @ 0x40000130
26,897,833 UART:
26,898,064 UART: Running Caliptra FMC ...
26,899,092 UART:
26,899,242 UART: [state] CFI Enabled
26,970,089 UART: [fht] FMC Alias Private Key: 7
29,308,318 UART: [art] Extend RT PCRs Done
29,309,537 UART: [art] Lock RT PCRs Done
29,310,917 UART: [art] Populate DV Done
29,316,385 UART: [fht] FMC Alias Private Key: 7
29,317,977 UART: [art] Derive CDI
29,318,791 UART: [art] Store in in slot 0x4
29,381,290 UART: [art] Derive Key Pair
29,382,335 UART: [art] Store priv key in slot 0x5
32,675,196 UART: [art] Derive Key Pair - Done
32,688,207 UART: [art] Signing Cert with AUTHO
32,689,518 UART: RITY.KEYID = 7
34,976,253 UART: [art] Erasing AUTHORITY.KEYID = 7
34,977,770 UART: [art] PUB.X = 2B9C4D640E018CD76EB7CD8C505C78C47A400216FBDE83262082AB41E112536CCB4A9EC27C8F9D049C867EAF7FBA7F38
34,985,060 UART: [art] PUB.Y = 290D1058F00FF96BD1C8FDF99EEA08FF1813C6CC45F4F6FE799E99ABCA1CBDE9F7128208504F51F5F9F79466632F1FDB
34,992,292 UART: [art] SIG.R = BAB010DE00A36A86D3419549615A71B95A480FE40A79A4109A790564CFCB1549C480D87CADF718904CA96BAC56484064
34,999,684 UART: [art] SIG.S = FE4AD07464629FB54B8741CAF9E16C90ABE7D8EC8ED0725622A4FA03AC39C11FDB6A56B05814D6D234735206BFEFA162
36,304,333 UART: Caliptra RT
36,305,047 UART: [state] CFI Enabled
36,468,311 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
10,503,095 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,704,722 >>> mbox cmd response: success
26,405,137 UART:
26,405,525 UART: Running Caliptra FMC ...
26,406,752 UART:
26,406,927 UART: [state] CFI Enabled
26,475,506 UART: [fht] FMC Alias Private Key: 7
28,812,931 UART: [art] Extend RT PCRs Done
28,814,147 UART: [art] Lock RT PCRs Done
28,816,038 UART: [art] Populate DV Done
28,821,287 UART: [fht] FMC Alias Private Key: 7
28,822,930 UART: [art] Derive CDI
28,823,741 UART: [art] Store in in slot 0x4
28,882,853 UART: [art] Derive Key Pair
28,883,888 UART: [art] Store priv key in slot 0x5
32,176,960 UART: [art] Derive Key Pair - Done
32,189,951 UART: [art] Signing Cert with AUTHO
32,191,248 UART: RITY.KEYID = 7
34,478,612 UART: [art] Erasing AUTHORITY.KEYID = 7
34,480,157 UART: [art] PUB.X = 4A5116BE872385C426C52EE0EEC0211CB53AB4045A88E8B3E68D5650BB26D10D8E454D087C181A69BEA8440BD19F46B6
34,487,378 UART: [art] PUB.Y = 82074CC902C8638628CF2C4BBB0553D344C975D34271FC610303217E3B42C63B7B374FD2268BBDE11DA3B1BF6BD51D18
34,494,587 UART: [art] SIG.R = 2E4A005BC73C79F388418210A6B8A3C0A6DD7116AC0A4C622D877529D4E25EB75AE15DEEDEF473D381C836BE8EE9269C
34,501,983 UART: [art] SIG.S = C590EF697ACADAE02DF7643DE03F64132A16BD4F7D38559CD89FA60AF25053F1450DD0E205893D84ABDA2A38837078DE
35,807,229 UART: Caliptra RT
35,807,940 UART: [state] CFI Enabled
35,968,712 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,427 UART:
192,808 UART: Running Caliptra ROM ...
194,004 UART:
603,542 UART: [state] CFI Enabled
616,377 UART: [state] LifecycleState = Unprovisioned
618,687 UART: [state] DebugLocked = No
620,840 UART: [state] WD Timer not started. Device not locked for debugging
625,354 UART: [kat] SHA2-256
807,322 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,895 UART: [kat] ++
819,389 UART: [kat] sha1
828,422 UART: [kat] SHA2-256
831,470 UART: [kat] SHA2-384
837,647 UART: [kat] SHA2-512-ACC
840,273 UART: [kat] ECC-384
4,094,598 UART: [kat] HMAC-384Kdf
4,106,733 UART: [kat] LMS
5,179,904 UART: [kat] --
5,183,757 UART: [cold-reset] ++
5,185,210 UART: [fht] FHT @ 0x50003400
5,196,507 UART: [idev] ++
5,197,185 UART: [idev] CDI.KEYID = 6
5,198,411 UART: [idev] SUBJECT.KEYID = 7
5,199,841 UART: [idev] UDS.KEYID = 0
5,214,220 UART: [idev] Erasing UDS.KEYID = 0
8,487,473 UART: [idev] Sha1 KeyId Algorithm
8,507,105 UART: [idev] CSR upload begun
8,512,570 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,801,699 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,818,043 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,834,175 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,850,200 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,874,718 UART: [idev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
11,020,761 UART: [idev] CSR uploaded
11,037,938 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
11,181,445 UART: [idev] --
11,182,093 UART: [ldev] ++
11,182,586 UART: [ldev] CDI.KEYID = 6
11,183,511 UART: [ldev] SUBJECT.KEYID = 5
11,184,587 UART: [ldev] AUTHORITY.KEYID = 7
11,185,668 UART: [ldev] FE.KEYID = 1
11,186,523 UART: [ldev] Erasing FE.KEYID = 1
14,349,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,644,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,660,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,676,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,692,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,712,265 UART: [ldev] --
16,717,046 UART: [fwproc] Wait for Commands...
16,719,302 UART: [fwproc] Recv command 0x46574c44
16,721,610 UART: [fwproc] Recv'd Img size: 114124 bytes
20,793,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,867,415 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,936,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,252,553 >>> mbox cmd response: success
21,256,459 UART: [afmc] ++
21,257,040 UART: [afmc] CDI.KEYID = 6
21,258,276 UART: [afmc] SUBJECT.KEYID = 7
21,259,374 UART: [afmc] AUTHORITY.KEYID = 5
24,574,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,867,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,870,079 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,886,301 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,902,318 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,918,324 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,939,669 UART: [afmc] --
26,943,048 UART: [cold-reset] --
26,946,108 UART: [state] Locking Datavault
26,952,648 UART: [state] Locking PCR0, PCR1 and PCR31
26,954,339 UART: [state] Locking ICCM
26,956,265 UART: [exit] Launching FMC @ 0x40000130
26,964,926 UART:
26,965,157 UART: Running Caliptra FMC ...
26,966,251 UART:
26,966,402 UART: [state] CFI Enabled
26,974,441 UART: [fht] FMC Alias Private Key: 7
29,305,205 UART: [art] Extend RT PCRs Done
29,306,422 UART: [art] Lock RT PCRs Done
29,308,064 UART: [art] Populate DV Done
29,313,796 UART: [fht] FMC Alias Private Key: 7
29,315,387 UART: [art] Derive CDI
29,316,196 UART: [art] Store in in slot 0x4
29,358,594 UART: [art] Derive Key Pair
29,359,625 UART: [art] Store priv key in slot 0x5
32,602,319 UART: [art] Derive Key Pair - Done
32,615,255 UART: [art] Signing Cert with AUTHO
32,616,558 UART: RITY.KEYID = 7
34,895,619 UART: [art] Erasing AUTHORITY.KEYID = 7
34,897,125 UART: [art] PUB.X = 9A5B0A316E079B43D9B687AD7FB75FCB23C7DFC0460F35486FC5A79A369B1279512663B5602BECB925C1DAFAFAD8C4B8
34,904,367 UART: [art] PUB.Y = F0D2EF2C667DC8B08CB8F102DCC71E6FB3968BAC805FC26AFF6D0CD296F416D4FFA772FD3F3D42825D6A700D3DDD7249
34,911,646 UART: [art] SIG.R = 826A70B3CE4AE06FC60087D621CF0E06BCCAB7A282DA614AA204AEAF0A460DFD3AAE0309AD578E52B91D13E13175B277
34,919,031 UART: [art] SIG.S = 520F750281F9D61B0674D54047B9384471F578E9E5C6D9096B1C7ABB8985828F886DC068A2C33348F64C0D2CE453D6E4
36,223,910 UART: Caliptra RT
36,224,592 UART: [state] CFI Enabled
36,341,502 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
10,734,551 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,866,042 >>> mbox cmd response: success
26,507,701 UART:
26,508,115 UART: Running Caliptra FMC ...
26,509,273 UART:
26,509,420 UART: [state] CFI Enabled
26,517,246 UART: [fht] FMC Alias Private Key: 7
28,848,155 UART: [art] Extend RT PCRs Done
28,849,384 UART: [art] Lock RT PCRs Done
28,851,036 UART: [art] Populate DV Done
28,856,514 UART: [fht] FMC Alias Private Key: 7
28,858,055 UART: [art] Derive CDI
28,858,817 UART: [art] Store in in slot 0x4
28,900,933 UART: [art] Derive Key Pair
28,901,973 UART: [art] Store priv key in slot 0x5
32,144,336 UART: [art] Derive Key Pair - Done
32,157,126 UART: [art] Signing Cert with AUTHO
32,158,444 UART: RITY.KEYID = 7
34,438,069 UART: [art] Erasing AUTHORITY.KEYID = 7
34,439,577 UART: [art] PUB.X = 16F5E8247FAF1F36A877483E562D932CF5568856F2EAD0FD964408249B60463D0AE3A72846DEE53C9F5D11C0517AA198
34,446,819 UART: [art] PUB.Y = 259A8D715A070F3499978435A80DA0FD3AB6835D43EC1F7718A9A671FBE42010B07DF351B1B7D93057323923EE8A1581
34,454,029 UART: [art] SIG.R = C8B9F45412DC43B24800D3E8C414E5D78EC40F2AE1ACA0F2820E73FA9194D0B58B8CA18057EE9689A8916FD016FF55DA
34,461,416 UART: [art] SIG.S = 7E1733501596CDA4535FED5A39F2E14F9F11A555F9E86712841804424E4324786E7E41C4CFD0C292A052AF1D8A7FAC79
35,766,275 UART: Caliptra RT
35,766,992 UART: [state] CFI Enabled
35,884,880 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,280 UART:
192,653 UART: Running Caliptra ROM ...
193,831 UART:
193,984 UART: [state] CFI Enabled
263,858 UART: [state] LifecycleState = Unprovisioned
265,785 UART: [state] DebugLocked = No
268,470 UART: [state] WD Timer not started. Device not locked for debugging
271,392 UART: [kat] SHA2-256
450,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,134 UART: [kat] ++
462,664 UART: [kat] sha1
474,094 UART: [kat] SHA2-256
477,086 UART: [kat] SHA2-384
483,072 UART: [kat] SHA2-512-ACC
486,027 UART: [kat] ECC-384
2,946,764 UART: [kat] HMAC-384Kdf
2,970,861 UART: [kat] LMS
3,500,340 UART: [kat] --
3,506,280 UART: [cold-reset] ++
3,507,836 UART: [fht] FHT @ 0x50003400
3,518,708 UART: [idev] ++
3,519,317 UART: [idev] CDI.KEYID = 6
3,520,208 UART: [idev] SUBJECT.KEYID = 7
3,521,422 UART: [idev] UDS.KEYID = 0
3,543,666 UART: [idev] Erasing UDS.KEYID = 0
6,027,590 UART: [idev] Sha1 KeyId Algorithm
6,049,481 UART: [idev] CSR upload begun
6,054,149 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,778,568 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,794,638 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,810,599 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,826,443 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,850,271 UART: [idev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
7,995,313 UART: [idev] CSR uploaded
8,013,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,157,703 UART: [idev] --
8,158,345 UART: [ldev] ++
8,158,841 UART: [ldev] CDI.KEYID = 6
8,159,716 UART: [ldev] SUBJECT.KEYID = 5
8,160,860 UART: [ldev] AUTHORITY.KEYID = 7
8,162,041 UART: [ldev] FE.KEYID = 1
8,162,921 UART: [ldev] Erasing FE.KEYID = 1
10,560,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,280,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,296,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,312,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,328,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,349,605 UART: [ldev] --
12,354,172 UART: [fwproc] Wait for Commands...
12,357,024 UART: [fwproc] Recv command 0x46574c44
12,359,067 UART: [fwproc] Recv'd Img size: 114448 bytes
15,758,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,832,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,900,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,220,128 >>> mbox cmd response: success
16,225,120 UART: [afmc] ++
16,225,770 UART: [afmc] CDI.KEYID = 6
16,226,662 UART: [afmc] SUBJECT.KEYID = 7
16,227,824 UART: [afmc] AUTHORITY.KEYID = 5
18,772,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,498,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,499,999 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,515,976 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,531,982 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,547,807 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,570,968 UART: [afmc] --
20,575,546 UART: [cold-reset] --
20,577,732 UART: [state] Locking Datavault
20,582,759 UART: [state] Locking PCR0, PCR1 and PCR31
20,584,402 UART: [state] Locking ICCM
20,585,916 UART: [exit] Launching FMC @ 0x40000130
20,594,370 UART:
20,594,605 UART: Running Caliptra FMC ...
20,595,704 UART:
20,595,865 UART: [state] CFI Enabled
20,654,858 UART: [fht] FMC Alias Private Key: 7
22,418,408 UART: [art] Extend RT PCRs Done
22,419,620 UART: [art] Lock RT PCRs Done
22,421,475 UART: [art] Populate DV Done
22,427,215 UART: [fht] FMC Alias Private Key: 7
22,428,915 UART: [art] Derive CDI
22,429,726 UART: [art] Store in in slot 0x4
22,487,614 UART: [art] Derive Key Pair
22,488,663 UART: [art] Store priv key in slot 0x5
24,951,585 UART: [art] Derive Key Pair - Done
24,964,527 UART: [art] Signing Cert with AUTHO
24,965,832 UART: RITY.KEYID = 7
26,677,548 UART: [art] Erasing AUTHORITY.KEYID = 7
26,679,056 UART: [art] PUB.X = 48B8B7869D204C45930DBCEBE9A90BD6C002667428774C3604E6B10D8C7F2719ED50A7E79A9ECE4A91AB69E4118A5915
26,686,333 UART: [art] PUB.Y = 630CC8F64225B95E0CFD5D8AFC361A0DD3555F99EDB37D72835E4F746371D008F31019CBF1CDFC2084AAFA88D2FBBD7E
26,693,585 UART: [art] SIG.R = FE4E549D366F1229AF6D974F3B892B59CDC8F7F29889F9DC12C211AC3C3ED19CC021FDC04F10E33D8B9BEB5BBE23F99C
26,700,989 UART: [art] SIG.S = 905C1E524AE6477D12759CE97EF82E01978E94FDAA3DE81959CB7072E8D58252D3BABD633694369548A9E7409EFBADF0
27,679,195 UART: Caliptra RT
27,679,906 UART: [state] CFI Enabled
27,845,961 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
7,687,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,844,485 >>> mbox cmd response: success
20,137,691 UART:
20,138,079 UART: Running Caliptra FMC ...
20,139,175 UART:
20,139,330 UART: [state] CFI Enabled
20,202,373 UART: [fht] FMC Alias Private Key: 7
21,965,838 UART: [art] Extend RT PCRs Done
21,967,062 UART: [art] Lock RT PCRs Done
21,968,609 UART: [art] Populate DV Done
21,973,797 UART: [fht] FMC Alias Private Key: 7
21,975,442 UART: [art] Derive CDI
21,976,180 UART: [art] Store in in slot 0x4
22,035,516 UART: [art] Derive Key Pair
22,036,567 UART: [art] Store priv key in slot 0x5
24,499,620 UART: [art] Derive Key Pair - Done
24,512,401 UART: [art] Signing Cert with AUTHO
24,513,704 UART: RITY.KEYID = 7
26,224,739 UART: [art] Erasing AUTHORITY.KEYID = 7
26,226,256 UART: [art] PUB.X = F6FB40C4451AC8B19B61EBF002369D07CF8E68F603448CF79197FA28724B6D1360F262898C988CF9F0A4BE6B80D7E151
26,233,504 UART: [art] PUB.Y = A3AAF29A2E40D38CF9A1F06A0D006850F0024B1E52F233DEE37CA9D75A6B04D26D8A963BE7FD6C1987C47C1550A9CCAE
26,240,819 UART: [art] SIG.R = C4BB2A77C5F91E9E7A09E217095DC6F57F39FCC7B00DDE90CF61087B5171DB3DC25321D6807DAD0A706C93C1CF2593BE
26,248,226 UART: [art] SIG.S = DE1A6FF9EB6A8C661BE21D368358D4FB47ADE8AF0307F8B019D2F969D4E86E4569B64E7D6334FD19342179138088A005
27,227,126 UART: Caliptra RT
27,227,842 UART: [state] CFI Enabled
27,390,041 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,379 UART:
192,785 UART: Running Caliptra ROM ...
193,869 UART:
603,372 UART: [state] CFI Enabled
617,012 UART: [state] LifecycleState = Unprovisioned
618,842 UART: [state] DebugLocked = No
621,835 UART: [state] WD Timer not started. Device not locked for debugging
625,880 UART: [kat] SHA2-256
804,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,530 UART: [kat] ++
817,110 UART: [kat] sha1
829,443 UART: [kat] SHA2-256
832,495 UART: [kat] SHA2-384
838,351 UART: [kat] SHA2-512-ACC
841,276 UART: [kat] ECC-384
3,283,804 UART: [kat] HMAC-384Kdf
3,295,605 UART: [kat] LMS
3,825,080 UART: [kat] --
3,830,541 UART: [cold-reset] ++
3,832,261 UART: [fht] FHT @ 0x50003400
3,843,672 UART: [idev] ++
3,844,231 UART: [idev] CDI.KEYID = 6
3,845,138 UART: [idev] SUBJECT.KEYID = 7
3,846,349 UART: [idev] UDS.KEYID = 0
3,865,345 UART: [idev] Erasing UDS.KEYID = 0
6,320,888 UART: [idev] Sha1 KeyId Algorithm
6,340,428 UART: [idev] CSR upload begun
6,345,127 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,061,962 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,078,070 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,094,009 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,109,842 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,133,639 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,278,752 UART: [idev] CSR uploaded
8,296,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,440,856 UART: [idev] --
8,441,496 UART: [ldev] ++
8,441,991 UART: [ldev] CDI.KEYID = 6
8,442,888 UART: [ldev] SUBJECT.KEYID = 5
8,443,984 UART: [ldev] AUTHORITY.KEYID = 7
8,445,167 UART: [ldev] FE.KEYID = 1
8,446,012 UART: [ldev] Erasing FE.KEYID = 1
10,786,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,502,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,518,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,534,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,550,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,570,148 UART: [ldev] --
12,574,819 UART: [fwproc] Wait for Commands...
12,578,043 UART: [fwproc] Recv command 0x46574c44
12,580,142 UART: [fwproc] Recv'd Img size: 114448 bytes
15,986,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,058,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,126,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,444,345 >>> mbox cmd response: success
16,448,386 UART: [afmc] ++
16,448,969 UART: [afmc] CDI.KEYID = 6
16,449,887 UART: [afmc] SUBJECT.KEYID = 7
16,451,041 UART: [afmc] AUTHORITY.KEYID = 5
18,950,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,668,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,670,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,686,652 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,702,646 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,718,543 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,741,745 UART: [afmc] --
20,744,685 UART: [cold-reset] --
20,748,917 UART: [state] Locking Datavault
20,754,912 UART: [state] Locking PCR0, PCR1 and PCR31
20,756,552 UART: [state] Locking ICCM
20,758,649 UART: [exit] Launching FMC @ 0x40000130
20,767,097 UART:
20,767,334 UART: Running Caliptra FMC ...
20,768,432 UART:
20,768,591 UART: [state] CFI Enabled
20,776,417 UART: [fht] FMC Alias Private Key: 7
22,533,234 UART: [art] Extend RT PCRs Done
22,534,455 UART: [art] Lock RT PCRs Done
22,536,051 UART: [art] Populate DV Done
22,541,477 UART: [fht] FMC Alias Private Key: 7
22,543,124 UART: [art] Derive CDI
22,543,860 UART: [art] Store in in slot 0x4
22,586,724 UART: [art] Derive Key Pair
22,587,758 UART: [art] Store priv key in slot 0x5
25,014,015 UART: [art] Derive Key Pair - Done
25,027,168 UART: [art] Signing Cert with AUTHO
25,028,500 UART: RITY.KEYID = 7
26,733,725 UART: [art] Erasing AUTHORITY.KEYID = 7
26,735,226 UART: [art] PUB.X = 0265156A43B1A43FDF450DE392D74D4AC5C02E8C9BB5495992A32569A02E0198822E1CC69EABE93CEFB9C66F4C2477EC
26,742,509 UART: [art] PUB.Y = 8682EF9F84D8852ADD11E30585D84A54889BB73E803A59E7793053A749B24C9335A3B55B41F12A85FC99FE9808BB6551
26,749,738 UART: [art] SIG.R = 690C35D814B5A787D7B8EE1A542CC12E4F36A5C06C4050A626405D0CEF2ADD87159297FBC3C11E4D4936EA7CCF4E5270
26,757,133 UART: [art] SIG.S = 505C6EACC46650E686B01A9D5726AF3A734B80E6D2EF92CE8AD53C3080448F625D3A8E3B5A2A54EFA5F51A2AEAC3F1EE
27,736,663 UART: Caliptra RT
27,737,370 UART: [state] CFI Enabled
27,854,292 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
7,944,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,024,180 >>> mbox cmd response: success
20,267,515 UART:
20,267,905 UART: Running Caliptra FMC ...
20,269,037 UART:
20,269,201 UART: [state] CFI Enabled
20,277,054 UART: [fht] FMC Alias Private Key: 7
22,033,895 UART: [art] Extend RT PCRs Done
22,035,137 UART: [art] Lock RT PCRs Done
22,036,821 UART: [art] Populate DV Done
22,042,186 UART: [fht] FMC Alias Private Key: 7
22,043,728 UART: [art] Derive CDI
22,044,490 UART: [art] Store in in slot 0x4
22,087,309 UART: [art] Derive Key Pair
22,088,350 UART: [art] Store priv key in slot 0x5
24,515,323 UART: [art] Derive Key Pair - Done
24,528,213 UART: [art] Signing Cert with AUTHO
24,529,518 UART: RITY.KEYID = 7
26,234,657 UART: [art] Erasing AUTHORITY.KEYID = 7
26,236,164 UART: [art] PUB.X = EA0877EAD4096FA063226D25BDBA8BB8AC28F5BDF78CDBA353E58C652F83107C660DFE62426990ACEB2B02E493D5E730
26,243,495 UART: [art] PUB.Y = 0CA023FE43347CF673A5568E70939623DCD31BF443D10F1FDB26B17C5D8FF2BD907E453B62E25B7EEE0746D7C9A88254
26,250,766 UART: [art] SIG.R = C1EB4961EAAAE33985F038C64E4740EEC34633A632BA4629B890F3ED90AD03A926EA6277611C85BD51BF4BD99724AB21
26,258,121 UART: [art] SIG.S = 66C5B1318809D2C70193EB8FEB20CB73B55F1589887F846F6BCA0C9E829A04FF13167B7F43679B349C9882E5DD2E53B9
27,236,988 UART: Caliptra RT
27,237,728 UART: [state] CFI Enabled
27,354,585 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
7,645,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,786,116 >>> mbox cmd response: success
20,076,569 UART:
20,077,273 UART: Running Caliptra FMC ...
20,078,392 UART:
20,078,549 UART: [state] CFI Enabled
20,142,574 UART: [fht] FMC Alias Private Key: 7
21,905,860 UART: [art] Extend RT PCRs Done
21,907,558 UART: [art] Lock RT PCRs Done
21,908,633 UART: [art] Populate DV Done
21,914,080 UART: [fht] FMC Alias Private Key: 7
21,915,522 UART: [art] Derive CDI
21,916,300 UART: [art] Store in in slot 0x4
21,975,595 UART: [art] Derive Key Pair
21,976,642 UART: [art] Store priv key in slot 0x5
24,439,407 UART: [art] Derive Key Pair - Done
24,452,363 UART: [art] Signing Cert with AUTHO
24,453,665 UART: RITY.KEYID = 7
26,164,789 UART: [art] Erasing AUTHORITY.KEYID = 7
26,166,302 UART: [art] PUB.X = 1FEB1143FE55480430AA12FBF8CEA8886F8EAC25C54F37A4AC271CF2B3B23B77FE80E8A4309E97BE6C845B28A77771E5
26,173,551 UART: [art] PUB.Y = D136FACDA5E9F365E5BE84E1BA2DFB8D56A46F997825D76BC93E327758244C88D88473576E803D82BD9C7E887722C01A
26,180,842 UART: [art] SIG.R = C5C614059FE725934E0BB0F699B85DC126F7407191CF3CC587075C5886C30C56919FC3A79B250F7F700C4CFEFD000F65
26,188,191 UART: [art] SIG.S = 07258D5F38803750F9CA5524CC07F7C0082AAABD179437CE75782B589DB011FC38EBFAB834D072D514728F3E7119B572
27,166,770 UART: Caliptra RT
27,167,465 UART: [state] CFI Enabled
27,332,132 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,172 writing to cptra_bootfsm_go
7,938,117 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,014,808 >>> mbox cmd response: success
20,259,022 UART:
20,259,423 UART: Running Caliptra FMC ...
20,260,609 UART:
20,260,776 UART: [state] CFI Enabled
20,268,811 UART: [fht] FMC Alias Private Key: 7
22,025,648 UART: [art] Extend RT PCRs Done
22,026,871 UART: [art] Lock RT PCRs Done
22,028,771 UART: [art] Populate DV Done
22,034,020 UART: [fht] FMC Alias Private Key: 7
22,035,564 UART: [art] Derive CDI
22,036,304 UART: [art] Store in in slot 0x4
22,079,005 UART: [art] Derive Key Pair
22,080,010 UART: [art] Store priv key in slot 0x5
24,506,742 UART: [art] Derive Key Pair - Done
24,519,859 UART: [art] Signing Cert with AUTHO
24,521,170 UART: RITY.KEYID = 7
26,226,292 UART: [art] Erasing AUTHORITY.KEYID = 7
26,227,800 UART: [art] PUB.X = C01A3F9BED2285CA8F50929CCF8120C068B456495201ECC8B919466CB413D6C024764D6BB161ABC0D78C87D857FB3985
26,235,074 UART: [art] PUB.Y = FE6A8922DFFD88FAA5CD67E43E6A1E9796D13ECA77B6FA85052E53975315FCA03B329686B22CD358BAEE8652D24D2A05
26,242,342 UART: [art] SIG.R = 70E2310AFE66F6DB027F1AC9BD341D88FFEBA4ADB60B183DC61A1465C7FF6085CC95FA7CF40962142E8E447F4FF6087E
26,249,793 UART: [art] SIG.S = 36D487585799C4E9B74ACCB01EDB6FDA979A447779B4FB74AA55BE69C760591994B858F9A47141A6C87A59AA11C2207E
27,228,444 UART: Caliptra RT
27,229,132 UART: [state] CFI Enabled
27,344,916 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,797 UART: [state] WD Timer not started. Device not locked for debugging
88,070 UART: [kat] SHA2-256
891,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,325 UART: [kat] SHA2-256
902,265 UART: [kat] SHA2-384
905,046 UART: [kat] SHA2-512-ACC
906,947 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,607 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,589 UART: [idev] ++
1,172,757 UART: [idev] CDI.KEYID = 6
1,173,118 UART: [idev] SUBJECT.KEYID = 7
1,173,543 UART: [idev] UDS.KEYID = 0
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,947 UART: [idev] Sha1 KeyId Algorithm
1,207,207 UART: [idev] CSR upload begun
1,208,986 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,359 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,067 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,952 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,658 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,087 UART: [idev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
1,296,584 UART: [idev] CSR uploaded
1,299,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,299,798 UART: [idev] --
1,301,065 UART: [ldev] ++
1,301,233 UART: [ldev] CDI.KEYID = 6
1,301,597 UART: [ldev] SUBJECT.KEYID = 5
1,302,024 UART: [ldev] AUTHORITY.KEYID = 7
1,302,487 UART: [ldev] FE.KEYID = 1
1,307,765 UART: [ldev] Erasing FE.KEYID = 1
1,334,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,043 UART: [ldev] --
1,374,461 UART: [fwproc] Wait for Commands...
1,375,166 UART: [fwproc] Recv command 0x46574c44
1,375,899 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,284 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,864,533 >>> mbox cmd response: success
2,865,576 UART: [afmc] ++
2,865,744 UART: [afmc] CDI.KEYID = 6
2,866,107 UART: [afmc] SUBJECT.KEYID = 7
2,866,533 UART: [afmc] AUTHORITY.KEYID = 5
2,901,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,081 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,810 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,451 UART: [afmc] --
2,945,523 UART: [cold-reset] --
2,946,613 UART: [state] Locking Datavault
2,947,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,154 UART: [state] Locking ICCM
2,948,608 UART: [exit] Launching FMC @ 0x40000130
2,953,937 UART:
2,953,953 UART: Running Caliptra FMC ...
2,954,361 UART:
2,954,415 UART: [state] CFI Enabled
2,964,788 UART: [fht] FMC Alias Private Key: 7
3,072,857 UART: [art] Extend RT PCRs Done
3,073,285 UART: [art] Lock RT PCRs Done
3,075,023 UART: [art] Populate DV Done
3,083,434 UART: [fht] FMC Alias Private Key: 7
3,084,524 UART: [art] Derive CDI
3,084,804 UART: [art] Store in in slot 0x4
3,170,477 UART: [art] Derive Key Pair
3,170,837 UART: [art] Store priv key in slot 0x5
3,183,353 UART: [art] Derive Key Pair - Done
3,198,091 UART: [art] Signing Cert with AUTHO
3,198,571 UART: RITY.KEYID = 7
3,213,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,270 UART: [art] PUB.X = 70D0324529D44E8FE4D0B6A95F732F2D522D9AA59AA4682E891D8247E9012B6462C4C1B419C5DC6D9E59F9739477B81E
3,221,037 UART: [art] PUB.Y = 625570B6305807F90E41C3CFB872E8EDF6BCDB5B692CA72F9F5DEC6428BD294BCD75DFF0D000CFB8461AD208E94C3FE4
3,227,976 UART: [art] SIG.R = 364887E69848FFCA2AE0E653383ABC38B153D6CFD6830A8C8BB55FBF5B9EAFCFE874FCF274D3F5FE9CF766E76C271A2F
3,234,767 UART: [art] SIG.S = 85FEC522244CB8A0006DB5AB65C666C2B1DC9519C33A63B0B3F8D95FDE2A307890486F2A89D73D97225CB935D102313E
3,258,389 UART: Caliptra RT
3,258,642 UART: [state] CFI Enabled
3,365,387 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,028 >>> mbox cmd response: success
2,704,362 UART:
2,704,378 UART: Running Caliptra FMC ...
2,704,786 UART:
2,704,840 UART: [state] CFI Enabled
2,715,389 UART: [fht] FMC Alias Private Key: 7
2,823,310 UART: [art] Extend RT PCRs Done
2,823,738 UART: [art] Lock RT PCRs Done
2,825,340 UART: [art] Populate DV Done
2,833,423 UART: [fht] FMC Alias Private Key: 7
2,834,401 UART: [art] Derive CDI
2,834,681 UART: [art] Store in in slot 0x4
2,920,324 UART: [art] Derive Key Pair
2,920,684 UART: [art] Store priv key in slot 0x5
2,933,928 UART: [art] Derive Key Pair - Done
2,949,025 UART: [art] Signing Cert with AUTHO
2,949,505 UART: RITY.KEYID = 7
2,964,863 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,628 UART: [art] PUB.X = 6B747004DC88DD2AA26B29BA4C838C07143A850A1D92EBE94BBCD433B17C01C82EF63968C5E7F08374B0352D4E9232DB
2,972,394 UART: [art] PUB.Y = C8F7081769D75F542B86497794757EF1B7E68FF2A46AF99A24255675FC42A587CD43E9F8CD0B12EC656BE1AF969FABCC
2,979,348 UART: [art] SIG.R = 84F08513991239F3609BAD67D85A65021A434F33814F27CEE256EA0BC6E1FB9A11A7A6F3295EF1CE6B48B6402D821D71
2,986,114 UART: [art] SIG.S = 09DF98E4DAA4C2DE7A4513F16A35EF8EFED3864C6949BE1EA8BB4B410CA5CB564DE328D567BE57DDEA6909BFEF1C6C42
3,009,818 UART: Caliptra RT
3,010,071 UART: [state] CFI Enabled
3,117,476 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,218 UART: [state] WD Timer not started. Device not locked for debugging
87,417 UART: [kat] SHA2-256
890,967 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,096 UART: [kat] ++
895,248 UART: [kat] sha1
899,526 UART: [kat] SHA2-256
901,466 UART: [kat] SHA2-384
904,029 UART: [kat] SHA2-512-ACC
905,930 UART: [kat] ECC-384
915,599 UART: [kat] HMAC-384Kdf
920,153 UART: [kat] LMS
1,168,465 UART: [kat] --
1,169,498 UART: [cold-reset] ++
1,170,026 UART: [fht] FHT @ 0x50003400
1,172,706 UART: [idev] ++
1,172,874 UART: [idev] CDI.KEYID = 6
1,173,235 UART: [idev] SUBJECT.KEYID = 7
1,173,660 UART: [idev] UDS.KEYID = 0
1,181,802 UART: [idev] Erasing UDS.KEYID = 0
1,198,988 UART: [idev] Sha1 KeyId Algorithm
1,207,280 UART: [idev] CSR upload begun
1,209,059 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,636 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,344 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,229 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,935 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,364 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,861 UART: [idev] CSR uploaded
1,299,906 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,075 UART: [idev] --
1,301,140 UART: [ldev] ++
1,301,308 UART: [ldev] CDI.KEYID = 6
1,301,672 UART: [ldev] SUBJECT.KEYID = 5
1,302,099 UART: [ldev] AUTHORITY.KEYID = 7
1,302,562 UART: [ldev] FE.KEYID = 1
1,307,814 UART: [ldev] Erasing FE.KEYID = 1
1,334,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,644 UART: [ldev] --
1,374,040 UART: [fwproc] Wait for Commands...
1,374,837 UART: [fwproc] Recv command 0x46574c44
1,375,570 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,386 >>> mbox cmd response: success
2,868,409 UART: [afmc] ++
2,868,577 UART: [afmc] CDI.KEYID = 6
2,868,940 UART: [afmc] SUBJECT.KEYID = 7
2,869,366 UART: [afmc] AUTHORITY.KEYID = 5
2,906,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,922,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,923,432 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,929,161 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,935,044 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,940,763 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,948,546 UART: [afmc] --
2,949,546 UART: [cold-reset] --
2,950,362 UART: [state] Locking Datavault
2,951,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,952,045 UART: [state] Locking ICCM
2,952,569 UART: [exit] Launching FMC @ 0x40000130
2,957,898 UART:
2,957,914 UART: Running Caliptra FMC ...
2,958,322 UART:
2,958,465 UART: [state] CFI Enabled
2,969,084 UART: [fht] FMC Alias Private Key: 7
3,077,201 UART: [art] Extend RT PCRs Done
3,077,629 UART: [art] Lock RT PCRs Done
3,078,875 UART: [art] Populate DV Done
3,087,196 UART: [fht] FMC Alias Private Key: 7
3,088,314 UART: [art] Derive CDI
3,088,594 UART: [art] Store in in slot 0x4
3,174,581 UART: [art] Derive Key Pair
3,174,941 UART: [art] Store priv key in slot 0x5
3,188,295 UART: [art] Derive Key Pair - Done
3,203,188 UART: [art] Signing Cert with AUTHO
3,203,668 UART: RITY.KEYID = 7
3,219,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,219,961 UART: [art] PUB.X = 13C9210B9E3C9AE80DB83475D594EE85EB1D9085958E33D129BA97B9C6E305A96D8D38147ED9F6274CB26922BF4C23B8
3,226,726 UART: [art] PUB.Y = 653ED694CCF17EE44C47C57A86441FB224FD8081ACE8D1459C16EFB094E71EBF127D1DC167661C14931BAE2248043727
3,233,677 UART: [art] SIG.R = C34000163E57460EC18E6C3C89A3E9FE6D928B5BD181D952FC8B03B834EE0796002DD05BBF3E8DCAB55F5F8E30943F08
3,240,401 UART: [art] SIG.S = E9F0D6515DDCB2564D81CF1B58E6DA4B47F0F90F81DD99C6E463BBA0C8603FBC2D284B6F9F8FC21C8D3FFC2C6292B1F1
3,263,725 UART: Caliptra RT
3,264,070 UART: [state] CFI Enabled
3,372,308 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,739 >>> mbox cmd response: success
2,705,633 UART:
2,705,649 UART: Running Caliptra FMC ...
2,706,057 UART:
2,706,200 UART: [state] CFI Enabled
2,716,843 UART: [fht] FMC Alias Private Key: 7
2,825,330 UART: [art] Extend RT PCRs Done
2,825,758 UART: [art] Lock RT PCRs Done
2,827,382 UART: [art] Populate DV Done
2,835,651 UART: [fht] FMC Alias Private Key: 7
2,836,623 UART: [art] Derive CDI
2,836,903 UART: [art] Store in in slot 0x4
2,922,454 UART: [art] Derive Key Pair
2,922,814 UART: [art] Store priv key in slot 0x5
2,935,820 UART: [art] Derive Key Pair - Done
2,950,822 UART: [art] Signing Cert with AUTHO
2,951,302 UART: RITY.KEYID = 7
2,966,796 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,561 UART: [art] PUB.X = 061096930A58B031ACF0FA57420F131C328A4DA082395FA6C4A8F49EB3182A302A6AAD80EE12F92DF2CECA687D8DF1D3
2,974,334 UART: [art] PUB.Y = 89B2815BCB64522DADF068B2FFFF649E0C016025E637542158419F4227AD8F838F794014C3F32D6A47195CEA1FF76128
2,981,276 UART: [art] SIG.R = DFF5FED6E9EF2FFA0A693CBF1DFC740F6C3EEB6DAE488EE465B609C5BB29E15D153981329A1C1D5CDD878F57835AAF60
2,988,065 UART: [art] SIG.S = A81F9B1ECBF82E3FD929E883A7A16F6727E76F587619AB94B15629675DFE599B694D1F19AE5DFCBE7EB75482F069AE69
3,011,446 UART: Caliptra RT
3,011,791 UART: [state] CFI Enabled
3,119,719 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,492 UART: [kat] SHA2-512-ACC
906,393 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,657 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,182,267 UART: [idev] Erasing UDS.KEYID = 0
1,199,801 UART: [idev] Sha1 KeyId Algorithm
1,208,159 UART: [idev] CSR upload begun
1,209,938 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,565 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,273 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,158 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,864 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,293 UART: [idev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
1,297,790 UART: [idev] CSR uploaded
1,300,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,301,004 UART: [idev] --
1,302,029 UART: [ldev] ++
1,302,197 UART: [ldev] CDI.KEYID = 6
1,302,561 UART: [ldev] SUBJECT.KEYID = 5
1,302,988 UART: [ldev] AUTHORITY.KEYID = 7
1,303,451 UART: [ldev] FE.KEYID = 1
1,308,479 UART: [ldev] Erasing FE.KEYID = 1
1,335,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,001 UART: [ldev] --
1,374,509 UART: [fwproc] Wait for Commands...
1,375,236 UART: [fwproc] Recv command 0x46574c44
1,375,969 UART: [fwproc] Recv'd Img size: 114448 bytes
2,675,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,702,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,461 >>> mbox cmd response: success
2,868,486 UART: [afmc] ++
2,868,654 UART: [afmc] CDI.KEYID = 6
2,869,017 UART: [afmc] SUBJECT.KEYID = 7
2,869,443 UART: [afmc] AUTHORITY.KEYID = 5
2,904,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,888 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,771 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,499 UART: [afmc] --
2,948,613 UART: [cold-reset] --
2,949,243 UART: [state] Locking Datavault
2,950,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,951,000 UART: [state] Locking ICCM
2,951,462 UART: [exit] Launching FMC @ 0x40000130
2,956,791 UART:
2,956,807 UART: Running Caliptra FMC ...
2,957,215 UART:
2,957,269 UART: [state] CFI Enabled
2,967,672 UART: [fht] FMC Alias Private Key: 7
3,076,353 UART: [art] Extend RT PCRs Done
3,076,781 UART: [art] Lock RT PCRs Done
3,078,733 UART: [art] Populate DV Done
3,087,022 UART: [fht] FMC Alias Private Key: 7
3,088,062 UART: [art] Derive CDI
3,088,342 UART: [art] Store in in slot 0x4
3,174,115 UART: [art] Derive Key Pair
3,174,475 UART: [art] Store priv key in slot 0x5
3,188,069 UART: [art] Derive Key Pair - Done
3,203,112 UART: [art] Signing Cert with AUTHO
3,203,592 UART: RITY.KEYID = 7
3,218,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,219,299 UART: [art] PUB.X = A85104ADE0550A10B6CCFFFE202C582885043EF440541EF77BAFB9823D19A1F3BFBA868EEA8630AAF2D015489A0773E9
3,226,069 UART: [art] PUB.Y = 59AF0EA1947CD5F0D7D882E5EAEA2B7CB146AA01449C96829E4E0A7F5BF393EBD137AAC8BF4B7D743D1DBCB5D817B471
3,233,034 UART: [art] SIG.R = 65094F554B525B8FBBB3E2B29D8502537F29089996EE4AED9B6AA193359A1BA5190F4D6E5FE58B85E0F47B01F0BCF555
3,239,797 UART: [art] SIG.S = 1A58BB3CF714C579F1A5C429945807E8D138B1E0DABC482FFFBF11EFD53827A34DFFBF96E3A1A8BD22E8F8933695F8ED
3,263,883 UART: Caliptra RT
3,264,136 UART: [state] CFI Enabled
3,371,819 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,100 >>> mbox cmd response: success
2,703,580 UART:
2,703,596 UART: Running Caliptra FMC ...
2,704,004 UART:
2,704,058 UART: [state] CFI Enabled
2,715,027 UART: [fht] FMC Alias Private Key: 7
2,822,826 UART: [art] Extend RT PCRs Done
2,823,254 UART: [art] Lock RT PCRs Done
2,824,666 UART: [art] Populate DV Done
2,832,915 UART: [fht] FMC Alias Private Key: 7
2,833,913 UART: [art] Derive CDI
2,834,193 UART: [art] Store in in slot 0x4
2,920,068 UART: [art] Derive Key Pair
2,920,428 UART: [art] Store priv key in slot 0x5
2,933,148 UART: [art] Derive Key Pair - Done
2,947,925 UART: [art] Signing Cert with AUTHO
2,948,405 UART: RITY.KEYID = 7
2,963,613 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,378 UART: [art] PUB.X = 88A7FC7BF7D22013FDB85384210EEE5138DCAF106DA4D7AFC72AD3B029D94161F962C8BB02192C2EF45B95871AF327B2
2,971,154 UART: [art] PUB.Y = 645CF4A5496A88F64F38E4F277A258B0021B4EE09986BCB89A2057ACD15F5967454E1ABBB2F5F974962A66C30E41BB02
2,978,099 UART: [art] SIG.R = F87E71B95E36103773DAEE871A4A97EF53FF7500295102522B9C793494F2FCF35542D02EA5E22AFA95F01905ADD8B2A0
2,984,845 UART: [art] SIG.S = 8B71FBECB0E4E2DF8A3A048E467ED776D21F67C66E11B35F1A6ED51BD5410E817359513F2C9F10A6CB202411068AC703
3,008,524 UART: Caliptra RT
3,008,777 UART: [state] CFI Enabled
3,115,771 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
921,021 UART: [kat] LMS
1,169,333 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,730 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,182,150 UART: [idev] Erasing UDS.KEYID = 0
1,198,796 UART: [idev] Sha1 KeyId Algorithm
1,207,224 UART: [idev] CSR upload begun
1,209,003 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,442 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,150 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,035 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,741 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,170 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,667 UART: [idev] CSR uploaded
1,299,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,299,881 UART: [idev] --
1,300,880 UART: [ldev] ++
1,301,048 UART: [ldev] CDI.KEYID = 6
1,301,412 UART: [ldev] SUBJECT.KEYID = 5
1,301,839 UART: [ldev] AUTHORITY.KEYID = 7
1,302,302 UART: [ldev] FE.KEYID = 1
1,307,664 UART: [ldev] Erasing FE.KEYID = 1
1,334,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,664 UART: [ldev] --
1,373,174 UART: [fwproc] Wait for Commands...
1,373,877 UART: [fwproc] Recv command 0x46574c44
1,374,610 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,865,892 >>> mbox cmd response: success
2,867,121 UART: [afmc] ++
2,867,289 UART: [afmc] CDI.KEYID = 6
2,867,652 UART: [afmc] SUBJECT.KEYID = 7
2,868,078 UART: [afmc] AUTHORITY.KEYID = 5
2,904,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,769 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,652 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,371 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,204 UART: [afmc] --
2,947,178 UART: [cold-reset] --
2,948,278 UART: [state] Locking Datavault
2,949,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,937 UART: [state] Locking ICCM
2,950,439 UART: [exit] Launching FMC @ 0x40000130
2,955,768 UART:
2,955,784 UART: Running Caliptra FMC ...
2,956,192 UART:
2,956,335 UART: [state] CFI Enabled
2,966,580 UART: [fht] FMC Alias Private Key: 7
3,074,375 UART: [art] Extend RT PCRs Done
3,074,803 UART: [art] Lock RT PCRs Done
3,076,177 UART: [art] Populate DV Done
3,084,442 UART: [fht] FMC Alias Private Key: 7
3,085,526 UART: [art] Derive CDI
3,085,806 UART: [art] Store in in slot 0x4
3,171,861 UART: [art] Derive Key Pair
3,172,221 UART: [art] Store priv key in slot 0x5
3,185,207 UART: [art] Derive Key Pair - Done
3,199,863 UART: [art] Signing Cert with AUTHO
3,200,343 UART: RITY.KEYID = 7
3,215,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,442 UART: [art] PUB.X = 660CFEC4C940B4AF965F9AD2AD8425C126CE1E5258B431265AD428EC8CD503D6E2CAA997A493398EC83BA015D95AAF90
3,223,220 UART: [art] PUB.Y = F7D5FECD9E9CF8250F70605F2613BDB3E8F71FB33436EBFBF9732A1FA1537AD94BD32B0DAAF15D30C02B994D9DFA6FE9
3,230,190 UART: [art] SIG.R = 30920CB95F61384826A464709A900B8E372DE7736081CB1E136DCEC219108609673A5D0D2A1568FC3FCCCE5062E804BC
3,236,943 UART: [art] SIG.S = 63E535227EA110818D10F876C027DBE9E00342A6FFD8219019CEBF54CDC139AC4DEAA243415CEF581AB21A7166119834
3,260,591 UART: Caliptra RT
3,260,936 UART: [state] CFI Enabled
3,368,845 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,644,659 >>> mbox cmd response: success
2,706,539 UART:
2,706,555 UART: Running Caliptra FMC ...
2,706,963 UART:
2,707,106 UART: [state] CFI Enabled
2,717,735 UART: [fht] FMC Alias Private Key: 7
2,826,082 UART: [art] Extend RT PCRs Done
2,826,510 UART: [art] Lock RT PCRs Done
2,828,176 UART: [art] Populate DV Done
2,836,411 UART: [fht] FMC Alias Private Key: 7
2,837,541 UART: [art] Derive CDI
2,837,821 UART: [art] Store in in slot 0x4
2,923,314 UART: [art] Derive Key Pair
2,923,674 UART: [art] Store priv key in slot 0x5
2,937,400 UART: [art] Derive Key Pair - Done
2,952,060 UART: [art] Signing Cert with AUTHO
2,952,540 UART: RITY.KEYID = 7
2,967,750 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,515 UART: [art] PUB.X = 8689AD639CED88FDB9FF7D9B9D2403A3DDE1B8F2453050E54307562F3F45B72C899B6C870DDF5BC8CB7725E34B0A8E8B
2,975,287 UART: [art] PUB.Y = AE2399A160A9614090E114F922D29650549996CE8D292E3DA07A0796A48C9CE693E9F5A568ABC3F570562C052E725996
2,982,223 UART: [art] SIG.R = 1ECA2C00C6CC85E205670968763F15D925DEFBBB9CDC101D39833C036EE728607D5B2B4BB65DD6BFA69EB8C58E81A15F
2,988,978 UART: [art] SIG.S = 707945A3CB1BB1D847A04C2AC32668B57EC2709992EDC3230F32355317D2E7D7998847B537473FAB95FAEE56B69C585F
3,012,870 UART: Caliptra RT
3,013,215 UART: [state] CFI Enabled
3,120,848 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
891,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,503 UART: [kat] ++
895,655 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,472 UART: [kat] HMAC-384Kdf
920,942 UART: [kat] LMS
1,169,254 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,565 UART: [fht] FHT @ 0x50003400
1,173,213 UART: [idev] ++
1,173,381 UART: [idev] CDI.KEYID = 6
1,173,742 UART: [idev] SUBJECT.KEYID = 7
1,174,167 UART: [idev] UDS.KEYID = 0
1,182,327 UART: [idev] Erasing UDS.KEYID = 0
1,198,475 UART: [idev] Sha1 KeyId Algorithm
1,206,861 UART: [idev] CSR upload begun
1,208,640 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,743 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,451 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,336 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,042 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,471 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,295,968 UART: [idev] CSR uploaded
1,299,013 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,299,182 UART: [idev] --
1,300,197 UART: [ldev] ++
1,300,365 UART: [ldev] CDI.KEYID = 6
1,300,729 UART: [ldev] SUBJECT.KEYID = 5
1,301,156 UART: [ldev] AUTHORITY.KEYID = 7
1,301,619 UART: [ldev] FE.KEYID = 1
1,306,861 UART: [ldev] Erasing FE.KEYID = 1
1,332,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,145 UART: [ldev] --
1,371,549 UART: [fwproc] Wait for Commands...
1,372,252 UART: [fwproc] Recv command 0x46574c44
1,372,985 UART: [fwproc] Recv'd Img size: 114448 bytes
2,672,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,864,731 >>> mbox cmd response: success
2,865,752 UART: [afmc] ++
2,865,920 UART: [afmc] CDI.KEYID = 6
2,866,283 UART: [afmc] SUBJECT.KEYID = 7
2,866,709 UART: [afmc] AUTHORITY.KEYID = 5
2,901,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,093 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,822 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,705 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,223 UART: [afmc] --
2,945,209 UART: [cold-reset] --
2,946,193 UART: [state] Locking Datavault
2,947,354 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,958 UART: [state] Locking ICCM
2,948,516 UART: [exit] Launching FMC @ 0x40000130
2,953,845 UART:
2,953,861 UART: Running Caliptra FMC ...
2,954,269 UART:
2,954,323 UART: [state] CFI Enabled
2,964,748 UART: [fht] FMC Alias Private Key: 7
3,072,325 UART: [art] Extend RT PCRs Done
3,072,753 UART: [art] Lock RT PCRs Done
3,074,269 UART: [art] Populate DV Done
3,082,444 UART: [fht] FMC Alias Private Key: 7
3,083,594 UART: [art] Derive CDI
3,083,874 UART: [art] Store in in slot 0x4
3,169,509 UART: [art] Derive Key Pair
3,169,869 UART: [art] Store priv key in slot 0x5
3,182,751 UART: [art] Derive Key Pair - Done
3,197,245 UART: [art] Signing Cert with AUTHO
3,197,725 UART: RITY.KEYID = 7
3,212,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,384 UART: [art] PUB.X = A7F0CD42B7646ABF66E8F731B83089E4E1ADC1FD2372EFE16365EB751EF0E63EA572D5E9044348B21BADF6EDC3871820
3,220,165 UART: [art] PUB.Y = 14B64D526491E0DEED09AB0BF26E1F354E91FBDAA030B85605217B02591506CD479783CBC6E73D1FB1A02226762DEE2C
3,227,108 UART: [art] SIG.R = A9C62B30188658128E0C27E7DB1E98AF7D0A85FD315A1CF07712D7D8C1E04CF586AE0E5C35F7448B1BC0E92B4CCB1173
3,233,881 UART: [art] SIG.S = FC4C28BEAEA715DA0056D9445853338E64AB83B3EB39A8CBD698A11791A70A49B66C8F76DF3B8B47CF49BFC92FFAEFD9
3,257,281 UART: Caliptra RT
3,257,534 UART: [state] CFI Enabled
3,365,644 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,046 >>> mbox cmd response: success
2,705,846 UART:
2,705,862 UART: Running Caliptra FMC ...
2,706,270 UART:
2,706,324 UART: [state] CFI Enabled
2,717,021 UART: [fht] FMC Alias Private Key: 7
2,824,954 UART: [art] Extend RT PCRs Done
2,825,382 UART: [art] Lock RT PCRs Done
2,826,838 UART: [art] Populate DV Done
2,835,143 UART: [fht] FMC Alias Private Key: 7
2,836,123 UART: [art] Derive CDI
2,836,403 UART: [art] Store in in slot 0x4
2,922,566 UART: [art] Derive Key Pair
2,922,926 UART: [art] Store priv key in slot 0x5
2,936,076 UART: [art] Derive Key Pair - Done
2,951,036 UART: [art] Signing Cert with AUTHO
2,951,516 UART: RITY.KEYID = 7
2,966,466 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,231 UART: [art] PUB.X = E7393A483B6D9D2F59425C8FA2CF5A375C62B11BF63CC98E636786E542F2AD416310A1CB2D29381B23385C5804A772CA
2,974,000 UART: [art] PUB.Y = 042DACD3B5E778A365BA32A2C82FC09D1C8F367EE249B7A6DDD7F356B600EB0EC5B886CC6FEB5F2F6F26D517FE5CE3DA
2,980,950 UART: [art] SIG.R = 47C0CE2562C29689906AA1466DAFD601EBDC7710C8DC4D74B3CF31F6744A24B38F82C3D29915B615E24FA4433C1695B5
2,987,721 UART: [art] SIG.S = 4934757200255D2E7AAB1B0ED8E22E059B98A7569784D7BCA350188B9492EAF6560D91717D76130028CDE8F67AFDB47C
3,011,163 UART: Caliptra RT
3,011,416 UART: [state] CFI Enabled
3,118,421 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,589 UART: [kat] SHA2-512-ACC
906,490 UART: [kat] ECC-384
916,299 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,600 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,207,742 UART: [idev] CSR upload begun
1,209,521 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,966 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,674 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,559 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,265 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,694 UART: [idev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
1,297,191 UART: [idev] CSR uploaded
1,300,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,405 UART: [idev] --
1,301,460 UART: [ldev] ++
1,301,628 UART: [ldev] CDI.KEYID = 6
1,301,992 UART: [ldev] SUBJECT.KEYID = 5
1,302,419 UART: [ldev] AUTHORITY.KEYID = 7
1,302,882 UART: [ldev] FE.KEYID = 1
1,308,066 UART: [ldev] Erasing FE.KEYID = 1
1,335,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,166 UART: [ldev] --
1,374,674 UART: [fwproc] Wait for Commands...
1,375,495 UART: [fwproc] Recv command 0x46574c44
1,376,228 UART: [fwproc] Recv'd Img size: 114448 bytes
2,676,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,703,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,733,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,869,156 >>> mbox cmd response: success
2,870,367 UART: [afmc] ++
2,870,535 UART: [afmc] CDI.KEYID = 6
2,870,898 UART: [afmc] SUBJECT.KEYID = 7
2,871,324 UART: [afmc] AUTHORITY.KEYID = 5
2,907,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,923,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,924,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,930,147 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,936,030 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,941,749 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,949,522 UART: [afmc] --
2,950,492 UART: [cold-reset] --
2,951,268 UART: [state] Locking Datavault
2,952,615 UART: [state] Locking PCR0, PCR1 and PCR31
2,953,219 UART: [state] Locking ICCM
2,953,873 UART: [exit] Launching FMC @ 0x40000130
2,959,202 UART:
2,959,218 UART: Running Caliptra FMC ...
2,959,626 UART:
2,959,769 UART: [state] CFI Enabled
2,970,224 UART: [fht] FMC Alias Private Key: 7
3,078,199 UART: [art] Extend RT PCRs Done
3,078,627 UART: [art] Lock RT PCRs Done
3,080,131 UART: [art] Populate DV Done
3,088,546 UART: [fht] FMC Alias Private Key: 7
3,089,682 UART: [art] Derive CDI
3,089,962 UART: [art] Store in in slot 0x4
3,175,915 UART: [art] Derive Key Pair
3,176,275 UART: [art] Store priv key in slot 0x5
3,189,733 UART: [art] Derive Key Pair - Done
3,204,542 UART: [art] Signing Cert with AUTHO
3,205,022 UART: RITY.KEYID = 7
3,220,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,221,465 UART: [art] PUB.X = 157C68F3142ACD13D602FF9B345966211DD9E89B26C85CE0F290DB20A451F3D81C992E4F58D4BC2F6CB37E6254C3D003
3,228,235 UART: [art] PUB.Y = 758439FE64556305475AC4172A6A375668FC455E70E9B977C7A6773B24C3F0A14FD6EA9CF17494D37F5F7399B3E024F2
3,235,178 UART: [art] SIG.R = 6D6422B5C727AB30256FAD7ADF6CD827D643C76E38818ACE4CF86911915230581412958608F47977D7F4DB9429EE5B7B
3,241,943 UART: [art] SIG.S = BC983C593B0835EFF401244F1B507E9696305102C9D5345997CF64B9CAF590CC926690BFD1446DBCBD526B9106DAB96D
3,266,220 UART: Caliptra RT
3,266,565 UART: [state] CFI Enabled
3,375,356 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,691 >>> mbox cmd response: success
2,703,753 UART:
2,703,769 UART: Running Caliptra FMC ...
2,704,177 UART:
2,704,320 UART: [state] CFI Enabled
2,714,929 UART: [fht] FMC Alias Private Key: 7
2,822,536 UART: [art] Extend RT PCRs Done
2,822,964 UART: [art] Lock RT PCRs Done
2,824,506 UART: [art] Populate DV Done
2,832,695 UART: [fht] FMC Alias Private Key: 7
2,833,743 UART: [art] Derive CDI
2,834,023 UART: [art] Store in in slot 0x4
2,919,750 UART: [art] Derive Key Pair
2,920,110 UART: [art] Store priv key in slot 0x5
2,933,568 UART: [art] Derive Key Pair - Done
2,948,428 UART: [art] Signing Cert with AUTHO
2,948,908 UART: RITY.KEYID = 7
2,964,044 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,809 UART: [art] PUB.X = A6E226DA833D2D9B4DA46F2750339882A9B6A446CC9FAB0CDD23C35DA1844C0D97CD16862473512ED1D03F061D42CFF0
2,971,580 UART: [art] PUB.Y = 0FB0AADA6891D75E3842F275FDCFD5033502842A9C726F98244E18509A1407AD30E8ECCCF60F9C0D8281FC64F3E857BA
2,978,522 UART: [art] SIG.R = B148D1CDB0015359349F5F4BEBFBC02B7EB43F6831AFE7BDEC1109AEC2743A4DBE6AF00E96DF7CAD6734D3911548D5CE
2,985,307 UART: [art] SIG.S = 7AB0E62EA87C583470411132FF78E64826CBCB621F9E7F2BD59907E9E1AB48F453A7BBCC2DB6D1F6B195F8B63CB2A0BA
3,008,431 UART: Caliptra RT
3,008,776 UART: [state] CFI Enabled
3,116,821 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
Truncated 7343978 bytes from beginning
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
10,790,257 UART: [idev] CSR uploaded
10,806,671 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,950,391 UART: [idev] --
10,951,043 UART: [ldev] ++
10,951,542 UART: [ldev] CDI.KEYID = 6
10,952,418 UART: [ldev] SUBJECT.KEYID = 5
10,953,504 UART: [ldev] AUTHORITY.KEYID = 7
10,954,683 UART: [ldev] FE.KEYID = 1
10,955,556 UART: [ldev] Erasing FE.KEYID = 1
14,187,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,499,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,515,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,531,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,547,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,569,092 UART: [ldev] --
16,573,780 UART: [fwproc] Wait for Commands...
16,576,903 UART: [fwproc] Recv command 0x46574c44
16,579,218 UART: [fwproc] Recv'd Img size: 114124 bytes
20,652,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,726,267 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,795,034 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,112,102 >>> mbox cmd response: success
21,116,949 UART: [afmc] ++
21,117,549 UART: [afmc] CDI.KEYID = 6
21,118,730 UART: [afmc] SUBJECT.KEYID = 7
21,119,886 UART: [afmc] AUTHORITY.KEYID = 5
24,483,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,779,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,781,928 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,798,083 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,814,191 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,830,212 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,852,637 UART: [afmc] --
26,855,581 UART: [cold-reset] --
26,860,249 UART: [state] Locking Datavault
26,867,124 UART: [state] Locking PCR0, PCR1 and PCR31
26,868,766 UART: [state] Locking ICCM
26,870,642 UART: [exit] Launching FMC @ 0x40000130
26,879,312 UART:
26,879,547 UART: Running Caliptra FMC ...
26,880,646 UART:
26,880,808 UART: [state] CFI Enabled
26,942,015 UART: [fht] FMC Alias Private Key: 7
29,279,396 UART: [art] Extend RT PCRs Done
29,280,620 UART: [art] Lock RT PCRs Done
29,282,436 UART: [art] Populate DV Done
29,287,925 UART: [fht] FMC Alias Private Key: 7
29,289,534 UART: [art] Derive CDI
29,290,349 UART: [art] Store in in slot 0x4
29,350,808 UART: [art] Derive Key Pair
29,351,848 UART: [art] Store priv key in slot 0x5
32,644,409 UART: [art] Derive Key Pair - Done
32,657,207 UART: [art] Signing Cert with AUTHO
32,658,504 UART: RITY.KEYID = 7
34,946,622 UART: [art] Erasing AUTHORITY.KEYID = 7
34,948,128 UART: [art] PUB.X = 30E1BDC762C46B82D83494419D3C37F3CF44E1611D3858B9FC9E700D7C8BAD93070B906E07C385F45B2980D82B0BDC94
34,955,372 UART: [art] PUB.Y = AC73835E6D40DDFA3F22322616E9208E2CBB25A7EA63028DB1E62FE501B1EDB1E83FB08B3C6DE44C3D945CD709812F5A
34,962,598 UART: [art] SIG.R = 35BE471D52203579E39ED38F9874CE5CED057D8A1BC06F25FA895435A0E150DFF9B9A5778E7831F63A7BDAF37D0CC618
34,969,981 UART: [art] SIG.S = C25421144FFFDBD09CD2776CE1D532135CE67577E32BAC7CC4EF9306AA2363EF3C18DB87FB56769FE48E91F8A424337C
36,275,208 UART: Caliptra RT
36,275,933 UART: [state] CFI Enabled
36,437,476 UART: [rt] RT listening for mailbox commands...
36,588,868 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,618,998 UART: [rt]cmd =0x4c444556, len=4
36,629,953 >>> mbox cmd response data (687 bytes)
36,775,511 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,805,557 UART: [rt]cmd =0x43455246, len=4
36,818,276 >>> mbox cmd response data (886 bytes)
36,961,989 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,992,029 UART: [rt]cmd =0x43455252, len=4
37,003,552 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,119 UART:
192,485 UART: Running Caliptra ROM ...
193,591 UART:
193,736 UART: [state] CFI Enabled
265,442 UART: [state] LifecycleState = Unprovisioned
267,843 UART: [state] DebugLocked = No
269,891 UART: [state] WD Timer not started. Device not locked for debugging
273,674 UART: [kat] SHA2-256
455,606 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,170 UART: [kat] ++
467,614 UART: [kat] sha1
477,845 UART: [kat] SHA2-256
480,855 UART: [kat] SHA2-384
486,989 UART: [kat] SHA2-512-ACC
489,658 UART: [kat] ECC-384
3,777,753 UART: [kat] HMAC-384Kdf
3,803,336 UART: [kat] LMS
4,876,490 UART: [kat] --
4,881,478 UART: [cold-reset] ++
4,882,550 UART: [fht] FHT @ 0x50003400
4,893,772 UART: [idev] ++
4,894,540 UART: [idev] CDI.KEYID = 6
4,895,677 UART: [idev] SUBJECT.KEYID = 7
4,896,851 UART: [idev] UDS.KEYID = 0
4,929,605 UART: [idev] Erasing UDS.KEYID = 0
8,240,696 UART: [idev] Sha1 KeyId Algorithm
8,260,508 UART: [idev] CSR upload begun
8,265,959 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,571,776 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,588,071 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,604,125 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,620,176 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,644,721 UART: [idev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
10,790,258 UART: [idev] CSR uploaded
10,806,640 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,950,528 UART: [idev] --
10,951,188 UART: [ldev] ++
10,951,682 UART: [ldev] CDI.KEYID = 6
10,952,607 UART: [ldev] SUBJECT.KEYID = 5
10,953,696 UART: [ldev] AUTHORITY.KEYID = 7
10,954,785 UART: [ldev] FE.KEYID = 1
10,955,617 UART: [ldev] Erasing FE.KEYID = 1
14,189,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,502,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,518,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,534,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,550,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,571,168 UART: [ldev] --
16,574,906 UART: [fwproc] Wait for Commands...
16,577,820 UART: [fwproc] Recv command 0x46574c44
16,580,141 UART: [fwproc] Recv'd Img size: 114124 bytes
20,657,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,726,375 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,795,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,111,604 >>> mbox cmd response: success
21,116,514 UART: [afmc] ++
21,117,111 UART: [afmc] CDI.KEYID = 6
21,118,297 UART: [afmc] SUBJECT.KEYID = 7
21,119,450 UART: [afmc] AUTHORITY.KEYID = 5
24,484,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,781,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,783,789 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,799,999 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,816,057 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,832,038 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,854,602 UART: [afmc] --
26,857,489 UART: [cold-reset] --
26,860,808 UART: [state] Locking Datavault
26,866,767 UART: [state] Locking PCR0, PCR1 and PCR31
26,868,409 UART: [state] Locking ICCM
26,870,798 UART: [exit] Launching FMC @ 0x40000130
26,879,470 UART:
26,879,701 UART: Running Caliptra FMC ...
26,880,796 UART:
26,880,957 UART: [state] CFI Enabled
26,940,349 UART: [fht] FMC Alias Private Key: 7
29,278,277 UART: [art] Extend RT PCRs Done
29,279,500 UART: [art] Lock RT PCRs Done
29,281,292 UART: [art] Populate DV Done
29,286,805 UART: [fht] FMC Alias Private Key: 7
29,288,502 UART: [art] Derive CDI
29,289,560 UART: [art] Store in in slot 0x4
29,349,107 UART: [art] Derive Key Pair
29,350,109 UART: [art] Store priv key in slot 0x5
32,642,936 UART: [art] Derive Key Pair - Done
32,655,979 UART: [art] Signing Cert with AUTHO
32,657,330 UART: RITY.KEYID = 7
34,944,364 UART: [art] Erasing AUTHORITY.KEYID = 7
34,945,863 UART: [art] PUB.X = 8CE6258402651F24CCAE8838E1128C30B7620D4EF57A1A65B4F51B2323413C44E30C599151947D7A903C115AB2AE1848
34,953,105 UART: [art] PUB.Y = BC6EE15EE3D1223BEA44026FD2E601C81208029A7DE904BC55338A5AC77FA217711E7FDC5147263EE3CF5CDF7BE6A268
34,960,396 UART: [art] SIG.R = FD92EE01D7247E2D4A1ACC321748322D426C6872E62AEAE37629BE5CA1BD21A7B491CA7BE5B79DDE2D25555EBD52DBBB
34,967,787 UART: [art] SIG.S = 857BD2AFFDABC8DE7CEA9B8B4CC72BF5E156C8ADAFFC398E309A9BD745E580E14D274894C31C315625C0F00DCF1B6D4E
36,273,557 UART: Caliptra RT
36,274,261 UART: [state] CFI Enabled
36,437,757 UART: [rt] RT listening for mailbox commands...
36,589,098 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,619,226 UART: [rt]cmd =0x4c444556, len=4
36,630,452 >>> mbox cmd response data (687 bytes)
36,776,328 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,806,333 UART: [rt]cmd =0x43455246, len=4
36,818,903 >>> mbox cmd response data (886 bytes)
36,962,538 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,992,457 UART: [rt]cmd =0x43455252, len=4
37,003,650 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1965.14s
Truncated 2467978 bytes from beginning
811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
10,496,584 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,692,921 >>> mbox cmd response: success
26,382,780 UART:
26,383,165 UART: Running Caliptra FMC ...
26,384,275 UART:
26,384,426 UART: [state] CFI Enabled
26,451,356 UART: [fht] FMC Alias Private Key: 7
28,788,963 UART: [art] Extend RT PCRs Done
28,790,185 UART: [art] Lock RT PCRs Done
28,791,945 UART: [art] Populate DV Done
28,797,406 UART: [fht] FMC Alias Private Key: 7
28,798,887 UART: [art] Derive CDI
28,799,615 UART: [art] Store in in slot 0x4
28,859,306 UART: [art] Derive Key Pair
28,860,344 UART: [art] Store priv key in slot 0x5
32,152,559 UART: [art] Derive Key Pair - Done
32,165,286 UART: [art] Signing Cert with AUTHO
32,166,584 UART: RITY.KEYID = 7
34,453,624 UART: [art] Erasing AUTHORITY.KEYID = 7
34,455,132 UART: [art] PUB.X = 0F9E4B2AB8E90806EF6CBE91C4EDFDBBEFC8C00E7A3AEF6686DFF754B08E53CFF7ACFAF663444C1D91C240A88545E069
34,462,442 UART: [art] PUB.Y = 3DC8523FFF1CD61A4CC3D6E4544D97BA67B036F04EFD80E0723CAE13D1FCD5BA9195103512D00B13D4B0A12B1E702217
34,469,673 UART: [art] SIG.R = 13431DD0C2451E32C253DDA5B63C90B73E670DD38AFB6300559366A13EF58DF82170B16BFEAAF52D947EEBF6DBC255E3
34,477,068 UART: [art] SIG.S = 58EACC2EFC035179AF35A56DF1BF753DDE0D00A8A59BC95A5F5692A423F13C3217A892B252DAFC16BDB684352607AADE
35,782,394 UART: Caliptra RT
35,783,085 UART: [state] CFI Enabled
35,944,714 UART: [rt] RT listening for mailbox commands...
36,095,274 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,125,567 UART: [rt]cmd =0x4c444556, len=4
36,136,748 >>> mbox cmd response data (687 bytes)
36,282,078 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,312,080 UART: [rt]cmd =0x43455246, len=4
36,324,649 >>> mbox cmd response data (886 bytes)
36,468,514 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,498,433 UART: [rt]cmd =0x43455252, len=4
36,509,630 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
10,500,019 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,724,933 >>> mbox cmd response: success
26,430,942 UART:
26,431,325 UART: Running Caliptra FMC ...
26,432,424 UART:
26,432,576 UART: [state] CFI Enabled
26,499,062 UART: [fht] FMC Alias Private Key: 7
28,836,853 UART: [art] Extend RT PCRs Done
28,838,072 UART: [art] Lock RT PCRs Done
28,839,726 UART: [art] Populate DV Done
28,845,313 UART: [fht] FMC Alias Private Key: 7
28,846,959 UART: [art] Derive CDI
28,847,693 UART: [art] Store in in slot 0x4
28,907,541 UART: [art] Derive Key Pair
28,908,580 UART: [art] Store priv key in slot 0x5
32,201,683 UART: [art] Derive Key Pair - Done
32,214,734 UART: [art] Signing Cert with AUTHO
32,216,035 UART: RITY.KEYID = 7
34,503,877 UART: [art] Erasing AUTHORITY.KEYID = 7
34,505,392 UART: [art] PUB.X = 52DF1278405A2E0D93455B19904DD8A8CCFCF0A8019291BE55BE23710DDA6998430218A54AFEADD9F76108C5E0EADE2D
34,512,633 UART: [art] PUB.Y = 8D73CA874722E50E54595B1B72085049CF6296FC774BB7DF805B9999F43ADD6E551C57E2D678F0B9E1BDAB52A3C54692
34,519,868 UART: [art] SIG.R = 7FE1FCDFDB47421965F06FBC986ADE1BF62D09E141B32071C3FD0C2EB0DA6D84C35E17B747CE0A7F7F55DB7F5156F8D3
34,527,265 UART: [art] SIG.S = 9A07227F0832FBC60FAFE3193DE12D4AEFBB8BE940E9DFBBFAB3CA5CE99BA22CC7693F6FF02FF47502B70A5DC2056265
35,832,624 UART: Caliptra RT
35,833,335 UART: [state] CFI Enabled
35,994,985 UART: [rt] RT listening for mailbox commands...
36,144,580 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,174,671 UART: [rt]cmd =0x4c444556, len=4
36,185,921 >>> mbox cmd response data (687 bytes)
36,331,497 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,361,647 UART: [rt]cmd =0x43455246, len=4
36,374,306 >>> mbox cmd response data (886 bytes)
36,517,531 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,547,566 UART: [rt]cmd =0x43455252, len=4
36,559,001 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
10,477,498 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,666,515 >>> mbox cmd response: success
26,366,374 UART:
26,366,752 UART: Running Caliptra FMC ...
26,367,857 UART:
26,368,030 UART: [state] CFI Enabled
26,434,099 UART: [fht] FMC Alias Private Key: 7
28,771,572 UART: [art] Extend RT PCRs Done
28,772,815 UART: [art] Lock RT PCRs Done
28,774,203 UART: [art] Populate DV Done
28,779,574 UART: [fht] FMC Alias Private Key: 7
28,781,172 UART: [art] Derive CDI
28,781,911 UART: [art] Store in in slot 0x4
28,842,787 UART: [art] Derive Key Pair
28,843,832 UART: [art] Store priv key in slot 0x5
32,136,987 UART: [art] Derive Key Pair - Done
32,149,779 UART: [art] Signing Cert with AUTHO
32,151,075 UART: RITY.KEYID = 7
34,438,941 UART: [art] Erasing AUTHORITY.KEYID = 7
34,440,452 UART: [art] PUB.X = 3A74ED01A30D8F239E1066D495D224FA787D5BB7CE6FDEB620367EB2DD9FFF49E9A97317BAB1C3D526C1F4DCCB46FCA6
34,447,699 UART: [art] PUB.Y = 868766D2420770F0452DAB223A164DE4FE64974927C83D1BDDDBD5E0A42CBE5501B11FFB50A6C966C0527036E83A4B5D
34,454,946 UART: [art] SIG.R = C3B6FC686783DAD2400CB98B689A45A4EAC031B5230055FE196946D74F3B06BA14F4302A0E8024F82D298FB5387930BF
34,462,346 UART: [art] SIG.S = F140738203ABAC725D8855696BABCC732D5DC940C5AA1CF440591AB421A469F9BC0FEB81CF109C59B5CA6C58E99D6842
35,767,547 UART: Caliptra RT
35,768,267 UART: [state] CFI Enabled
35,930,138 UART: [rt] RT listening for mailbox commands...
36,080,296 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,110,227 UART: [rt]cmd =0x4c444556, len=4
36,121,224 >>> mbox cmd response data (687 bytes)
36,266,324 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,296,298 UART: [rt]cmd =0x43455246, len=4
36,308,990 >>> mbox cmd response data (886 bytes)
36,452,658 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,482,721 UART: [rt]cmd =0x43455252, len=4
36,494,070 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
10,500,520 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,705,954 >>> mbox cmd response: success
26,411,370 UART:
26,411,782 UART: Running Caliptra FMC ...
26,412,915 UART:
26,413,065 UART: [state] CFI Enabled
26,477,657 UART: [fht] FMC Alias Private Key: 7
28,815,746 UART: [art] Extend RT PCRs Done
28,816,971 UART: [art] Lock RT PCRs Done
28,818,404 UART: [art] Populate DV Done
28,823,968 UART: [fht] FMC Alias Private Key: 7
28,825,502 UART: [art] Derive CDI
28,826,310 UART: [art] Store in in slot 0x4
28,886,708 UART: [art] Derive Key Pair
28,887,747 UART: [art] Store priv key in slot 0x5
32,180,707 UART: [art] Derive Key Pair - Done
32,193,725 UART: [art] Signing Cert with AUTHO
32,195,038 UART: RITY.KEYID = 7
34,481,486 UART: [art] Erasing AUTHORITY.KEYID = 7
34,482,994 UART: [art] PUB.X = 9E3B509FBF6C9F538A1A578F1F8B0FDE294633EC5D3F3673916FFFF3D025579DB1C88F6F0C9F90E54F2EC6FD99FE1991
34,490,237 UART: [art] PUB.Y = 88C1755AD9B8FAAAF50729190E3226A635E65B1A78C8C3F2185D276F7FE7B5618E0B215D6450F42DA2202C3176813480
34,497,474 UART: [art] SIG.R = 00FBCEE5A3D7508C37BAD09831B90A05A6B34B4F1BD3618282ABB6359AAC41CC5592C80B67BC81987659C111A672DD93
34,504,870 UART: [art] SIG.S = C578DF0E98E948450A99D42DC7FC4AB10F50449032537A1C64900FBF39DED0E4DDAC1CE02452AA49A3E3F7E258911DEC
35,810,071 UART: Caliptra RT
35,810,771 UART: [state] CFI Enabled
35,971,708 UART: [rt] RT listening for mailbox commands...
36,122,151 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,152,307 UART: [rt]cmd =0x4c444556, len=4
36,163,311 >>> mbox cmd response data (687 bytes)
36,310,019 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,339,995 UART: [rt]cmd =0x43455246, len=4
36,352,886 >>> mbox cmd response data (886 bytes)
36,497,051 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,527,130 UART: [rt]cmd =0x43455252, len=4
36,538,598 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
10,492,507 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,679,131 >>> mbox cmd response: success
26,378,638 UART:
26,379,020 UART: Running Caliptra FMC ...
26,380,117 UART:
26,380,268 UART: [state] CFI Enabled
26,443,203 UART: [fht] FMC Alias Private Key: 7
28,781,615 UART: [art] Extend RT PCRs Done
28,782,837 UART: [art] Lock RT PCRs Done
28,784,661 UART: [art] Populate DV Done
28,790,079 UART: [fht] FMC Alias Private Key: 7
28,791,780 UART: [art] Derive CDI
28,792,524 UART: [art] Store in in slot 0x4
28,851,294 UART: [art] Derive Key Pair
28,852,290 UART: [art] Store priv key in slot 0x5
32,145,340 UART: [art] Derive Key Pair - Done
32,158,067 UART: [art] Signing Cert with AUTHO
32,159,396 UART: RITY.KEYID = 7
34,446,637 UART: [art] Erasing AUTHORITY.KEYID = 7
34,448,137 UART: [art] PUB.X = 85E804E357F65450F46A62797385AB92F52F636E4495AF044CE5BB6F3BB1736D20BC8471D0CBC6D8B16FF69512EE1EFE
34,455,391 UART: [art] PUB.Y = 426954E6A159CB83F119F3A498835D49ADFB775F4D68D5406B9964AA2B52F09096188C130FD700BF3070A13C8FB1398C
34,462,615 UART: [art] SIG.R = F7D2717753D19D7D312A59FD7C465B640D47D5244796926E3409812D7CC7C7B44730D0DAEC71CE2752158C28E786C0B8
34,470,038 UART: [art] SIG.S = C336CE38A8D252B64064DD355F84E880080887519D4590B3EA16E465F96CF32201F9F7DB027D5942FBFCD855BB632293
35,775,243 UART: Caliptra RT
35,775,952 UART: [state] CFI Enabled
35,935,658 UART: [rt] RT listening for mailbox commands...
36,085,686 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,115,598 UART: [rt]cmd =0x4c444556, len=4
36,126,715 >>> mbox cmd response data (687 bytes)
36,271,709 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,301,544 UART: [rt]cmd =0x43455246, len=4
36,314,339 >>> mbox cmd response data (886 bytes)
36,457,861 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,487,724 UART: [rt]cmd =0x43455252, len=4
36,498,974 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1940.25s
Truncated 7343978 bytes from beginning
4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
11,027,397 UART: [idev] CSR uploaded
11,043,748 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
11,187,068 UART: [idev] --
11,187,701 UART: [ldev] ++
11,188,190 UART: [ldev] CDI.KEYID = 6
11,189,089 UART: [ldev] SUBJECT.KEYID = 5
11,190,389 UART: [ldev] AUTHORITY.KEYID = 7
11,191,516 UART: [ldev] FE.KEYID = 1
11,192,350 UART: [ldev] Erasing FE.KEYID = 1
14,351,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,644,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,660,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,676,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,692,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,712,905 UART: [ldev] --
16,717,505 UART: [fwproc] Wait for Commands...
16,720,425 UART: [fwproc] Recv command 0x46574c44
16,722,685 UART: [fwproc] Recv'd Img size: 114124 bytes
20,792,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,863,364 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,932,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,249,929 >>> mbox cmd response: success
21,254,863 UART: [afmc] ++
21,255,444 UART: [afmc] CDI.KEYID = 6
21,256,623 UART: [afmc] SUBJECT.KEYID = 7
21,257,776 UART: [afmc] AUTHORITY.KEYID = 5
24,574,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,870,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,872,537 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,888,730 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,904,727 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,920,714 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,943,128 UART: [afmc] --
26,947,358 UART: [cold-reset] --
26,950,150 UART: [state] Locking Datavault
26,958,691 UART: [state] Locking PCR0, PCR1 and PCR31
26,960,397 UART: [state] Locking ICCM
26,962,870 UART: [exit] Launching FMC @ 0x40000130
26,971,534 UART:
26,971,768 UART: Running Caliptra FMC ...
26,972,860 UART:
26,973,012 UART: [state] CFI Enabled
26,981,051 UART: [fht] FMC Alias Private Key: 7
29,311,815 UART: [art] Extend RT PCRs Done
29,313,036 UART: [art] Lock RT PCRs Done
29,314,302 UART: [art] Populate DV Done
29,319,765 UART: [fht] FMC Alias Private Key: 7
29,321,412 UART: [art] Derive CDI
29,322,220 UART: [art] Store in in slot 0x4
29,364,966 UART: [art] Derive Key Pair
29,366,005 UART: [art] Store priv key in slot 0x5
32,607,720 UART: [art] Derive Key Pair - Done
32,620,712 UART: [art] Signing Cert with AUTHO
32,622,016 UART: RITY.KEYID = 7
34,901,214 UART: [art] Erasing AUTHORITY.KEYID = 7
34,902,719 UART: [art] PUB.X = 61336FE963CBE5DE127D29D092BD9A4F4B135EDAF990A8C8C933B80E93C3FFE67D982050BC419F4FC329DA69560E867C
34,910,008 UART: [art] PUB.Y = 547E5F9BD5F918F470EBAD30DC44502A6241DD45BECCD6CF6A14D06032B88FDD09B64733A24EAFC17DD4267A078E8944
34,917,236 UART: [art] SIG.R = 360303E61B47E312AC2BB4652444C6F0E5D5D226F1341E2A0082CC1CA703E42417C5E78E2406AB1640FCAA26748EB0C8
34,924,627 UART: [art] SIG.S = BE58C7E261277F35F0F497EF664B1873177E40746F2410F051FAEDA6244D0E8620F37FECB096119C187322C8629890A0
36,230,011 UART: Caliptra RT
36,230,840 UART: [state] CFI Enabled
36,347,976 UART: [rt] RT listening for mailbox commands...
36,498,827 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,529,081 UART: [rt]cmd =0x4c444556, len=4
36,540,263 >>> mbox cmd response data (687 bytes)
36,685,434 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,715,570 UART: [rt]cmd =0x43455246, len=4
36,728,099 >>> mbox cmd response data (886 bytes)
36,872,527 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,902,458 UART: [rt]cmd =0x43455252, len=4
36,913,799 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,370 UART:
192,751 UART: Running Caliptra ROM ...
193,936 UART:
603,730 UART: [state] CFI Enabled
615,528 UART: [state] LifecycleState = Unprovisioned
617,889 UART: [state] DebugLocked = No
619,234 UART: [state] WD Timer not started. Device not locked for debugging
623,702 UART: [kat] SHA2-256
805,675 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,234 UART: [kat] ++
817,734 UART: [kat] sha1
827,845 UART: [kat] SHA2-256
830,846 UART: [kat] SHA2-384
836,812 UART: [kat] SHA2-512-ACC
839,416 UART: [kat] ECC-384
4,095,474 UART: [kat] HMAC-384Kdf
4,107,017 UART: [kat] LMS
5,180,163 UART: [kat] --
5,185,258 UART: [cold-reset] ++
5,187,303 UART: [fht] FHT @ 0x50003400
5,199,436 UART: [idev] ++
5,200,164 UART: [idev] CDI.KEYID = 6
5,201,340 UART: [idev] SUBJECT.KEYID = 7
5,202,816 UART: [idev] UDS.KEYID = 0
5,219,920 UART: [idev] Erasing UDS.KEYID = 0
8,491,200 UART: [idev] Sha1 KeyId Algorithm
8,510,597 UART: [idev] CSR upload begun
8,516,071 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,806,730 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,823,110 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,839,164 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,855,238 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,879,747 UART: [idev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
11,025,178 UART: [idev] CSR uploaded
11,041,561 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
11,185,007 UART: [idev] --
11,185,672 UART: [ldev] ++
11,186,164 UART: [ldev] CDI.KEYID = 6
11,187,068 UART: [ldev] SUBJECT.KEYID = 5
11,188,151 UART: [ldev] AUTHORITY.KEYID = 7
11,189,233 UART: [ldev] FE.KEYID = 1
11,190,160 UART: [ldev] Erasing FE.KEYID = 1
14,351,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,644,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,660,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,676,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,692,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,713,165 UART: [ldev] --
16,717,508 UART: [fwproc] Wait for Commands...
16,719,921 UART: [fwproc] Recv command 0x46574c44
16,722,224 UART: [fwproc] Recv'd Img size: 114124 bytes
20,791,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,869,586 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,938,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,254,864 >>> mbox cmd response: success
21,258,699 UART: [afmc] ++
21,259,282 UART: [afmc] CDI.KEYID = 6
21,260,389 UART: [afmc] SUBJECT.KEYID = 7
21,261,601 UART: [afmc] AUTHORITY.KEYID = 5
24,576,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,870,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,872,942 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,889,093 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,905,171 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,921,124 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,943,721 UART: [afmc] --
26,947,323 UART: [cold-reset] --
26,952,260 UART: [state] Locking Datavault
26,958,391 UART: [state] Locking PCR0, PCR1 and PCR31
26,960,039 UART: [state] Locking ICCM
26,962,652 UART: [exit] Launching FMC @ 0x40000130
26,971,311 UART:
26,971,535 UART: Running Caliptra FMC ...
26,972,550 UART:
26,972,691 UART: [state] CFI Enabled
26,981,378 UART: [fht] FMC Alias Private Key: 7
29,312,626 UART: [art] Extend RT PCRs Done
29,313,845 UART: [art] Lock RT PCRs Done
29,315,437 UART: [art] Populate DV Done
29,320,679 UART: [fht] FMC Alias Private Key: 7
29,322,153 UART: [art] Derive CDI
29,322,878 UART: [art] Store in in slot 0x4
29,365,610 UART: [art] Derive Key Pair
29,366,620 UART: [art] Store priv key in slot 0x5
32,608,438 UART: [art] Derive Key Pair - Done
32,621,435 UART: [art] Signing Cert with AUTHO
32,622,738 UART: RITY.KEYID = 7
34,902,195 UART: [art] Erasing AUTHORITY.KEYID = 7
34,903,705 UART: [art] PUB.X = 07E8A121ACA06C439F73CC50A39AF93175432A123D4CD7CCF8EC2AC7C4EDB3DCE52B93D141FDF381378285B76EF200DB
34,910,953 UART: [art] PUB.Y = FD294DBF3751F5D730A921836B2F474CBDFFEF72CF33825D03E07FFB68E82E25BED8E75A4DC96F4A7BA1060DDC62308D
34,918,236 UART: [art] SIG.R = 84985585482BDECB28DF636CAEFCEAB777E2EF9E49E90FB7EF5AB0F52D5EFEAFFB30C298BBF0E2F694236F870E23C134
34,925,705 UART: [art] SIG.S = 3F681B6678B69622933C503F24A6A73FA8BB6B904DDBA0DA677C985D761903E2E2AA0885DB1242185B6C321CF9AEDF8F
36,230,959 UART: Caliptra RT
36,231,673 UART: [state] CFI Enabled
36,349,056 UART: [rt] RT listening for mailbox commands...
36,499,875 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,529,900 UART: [rt]cmd =0x4c444556, len=4
36,540,781 >>> mbox cmd response data (687 bytes)
36,686,317 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,716,268 UART: [rt]cmd =0x43455246, len=4
36,728,996 >>> mbox cmd response data (886 bytes)
36,872,171 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,902,213 UART: [rt]cmd =0x43455252, len=4
36,913,536 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1961.37s
Truncated 2467978 bytes from beginning
811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
10,736,096 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,860,446 >>> mbox cmd response: success
26,493,461 UART:
26,493,849 UART: Running Caliptra FMC ...
26,495,007 UART:
26,495,164 UART: [state] CFI Enabled
26,502,892 UART: [fht] FMC Alias Private Key: 7
28,833,961 UART: [art] Extend RT PCRs Done
28,835,212 UART: [art] Lock RT PCRs Done
28,836,997 UART: [art] Populate DV Done
28,842,187 UART: [fht] FMC Alias Private Key: 7
28,843,884 UART: [art] Derive CDI
28,844,692 UART: [art] Store in in slot 0x4
28,887,183 UART: [art] Derive Key Pair
28,888,220 UART: [art] Store priv key in slot 0x5
32,130,384 UART: [art] Derive Key Pair - Done
32,143,329 UART: [art] Signing Cert with AUTHO
32,144,633 UART: RITY.KEYID = 7
34,423,821 UART: [art] Erasing AUTHORITY.KEYID = 7
34,425,328 UART: [art] PUB.X = B044F98A6FAF51E4504B8ED85F2FAAD9F76CC4A53D1F4F511C4B03AF10FAFDD116A7C9186BD9C67779AE1AB66AD20927
34,432,640 UART: [art] PUB.Y = C0B57DBA3153338B94B5F4A730EDB2122124F7C8B87F4B77744DD34A0745402F113B5E1A692E47EB6172865396818B10
34,439,826 UART: [art] SIG.R = 37DA87FE16DC4D85FC28F5454DDE0399946F7A0969C997B9CDB8CFCDCF3D9D8272D7F9584F2DA65ADB06E2F0BCFE6D28
34,447,269 UART: [art] SIG.S = 269704795886F5B5C5ED21E549CE64C40AAA58EE1FA42841E072EB8AC7319DDFB628A4A2F48A01513AA471B379DEB736
35,752,666 UART: Caliptra RT
35,753,443 UART: [state] CFI Enabled
35,870,129 UART: [rt] RT listening for mailbox commands...
36,020,502 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,050,507 UART: [rt]cmd =0x4c444556, len=4
36,061,563 >>> mbox cmd response data (687 bytes)
36,207,262 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,237,276 UART: [rt]cmd =0x43455246, len=4
36,250,024 >>> mbox cmd response data (886 bytes)
36,393,357 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,423,392 UART: [rt]cmd =0x43455252, len=4
36,434,875 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
10,736,097 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,863,019 >>> mbox cmd response: success
26,500,220 UART:
26,500,614 UART: Running Caliptra FMC ...
26,501,762 UART:
26,501,918 UART: [state] CFI Enabled
26,510,436 UART: [fht] FMC Alias Private Key: 7
28,841,793 UART: [art] Extend RT PCRs Done
28,843,021 UART: [art] Lock RT PCRs Done
28,844,566 UART: [art] Populate DV Done
28,849,917 UART: [fht] FMC Alias Private Key: 7
28,851,616 UART: [art] Derive CDI
28,852,425 UART: [art] Store in in slot 0x4
28,894,915 UART: [art] Derive Key Pair
28,895,955 UART: [art] Store priv key in slot 0x5
32,138,461 UART: [art] Derive Key Pair - Done
32,151,322 UART: [art] Signing Cert with AUTHO
32,152,651 UART: RITY.KEYID = 7
34,431,757 UART: [art] Erasing AUTHORITY.KEYID = 7
34,433,263 UART: [art] PUB.X = 278BFB9D22922F01D7209B4F3DEBFB643BAC9314C44EE09FA93FCABA5EACB73AC2D388A38D27EF3643BC2F66EC4B399D
34,440,568 UART: [art] PUB.Y = 1178E04D3AF70587F46DF2482EC142F4ADE4C177B2703E6884D2BBC4C6339DA3ECEF85856F73D319A06F80D2BBB265FA
34,447,796 UART: [art] SIG.R = DC05EF41A506A0302616A7FFA49C417AC0383C18614C632EADD61A551AD85425159B7E97D9392FEBBE09471815B7C4D0
34,455,197 UART: [art] SIG.S = 5D9A5197FCFD3C27C93A20934D9EF4851A1A547E3671C1ED23194521F7EC4FDB7D30F67B0E33DCCB792277378A47B042
35,760,757 UART: Caliptra RT
35,761,456 UART: [state] CFI Enabled
35,878,896 UART: [rt] RT listening for mailbox commands...
36,028,731 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,058,666 UART: [rt]cmd =0x4c444556, len=4
36,069,912 >>> mbox cmd response data (687 bytes)
36,215,236 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,245,453 UART: [rt]cmd =0x43455246, len=4
36,258,299 >>> mbox cmd response data (886 bytes)
36,401,389 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,431,305 UART: [rt]cmd =0x43455252, len=4
36,442,687 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
10,731,673 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,858,353 >>> mbox cmd response: success
26,498,845 UART:
26,499,256 UART: Running Caliptra FMC ...
26,500,578 UART:
26,500,738 UART: [state] CFI Enabled
26,508,459 UART: [fht] FMC Alias Private Key: 7
28,839,169 UART: [art] Extend RT PCRs Done
28,840,404 UART: [art] Lock RT PCRs Done
28,842,027 UART: [art] Populate DV Done
28,847,514 UART: [fht] FMC Alias Private Key: 7
28,849,056 UART: [art] Derive CDI
28,849,785 UART: [art] Store in in slot 0x4
28,892,766 UART: [art] Derive Key Pair
28,893,762 UART: [art] Store priv key in slot 0x5
32,135,940 UART: [art] Derive Key Pair - Done
32,148,938 UART: [art] Signing Cert with AUTHO
32,150,242 UART: RITY.KEYID = 7
34,430,020 UART: [art] Erasing AUTHORITY.KEYID = 7
34,431,535 UART: [art] PUB.X = BF0D91A2B295911F3EE30A48631CBD0913D247105A97EDAD96EBE9C5C0856C0627409F458FFC8D6A65050F1AA7C798B8
34,438,855 UART: [art] PUB.Y = 4568CE713515DE3995D7E36A30D4CB25EFEC6DB168C6AAB39F2C3C057EB1A1D6DBD33057E70305935B300BC596CCD3DD
34,446,084 UART: [art] SIG.R = C395D299E7BB305BECE0D2B5A532CE2AB256D1948290CCB2824D57FD8BE3DCB81CAAC36C84DAC2E2996787164335832C
34,453,483 UART: [art] SIG.S = 0EEB50C37A74233647EFB6BE38262F8001C78DE4B87D3E9D09194F3C4850149D2858F173184B63AD29A77F60983B4C7B
35,758,433 UART: Caliptra RT
35,759,141 UART: [state] CFI Enabled
35,876,958 UART: [rt] RT listening for mailbox commands...
36,027,220 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,057,248 UART: [rt]cmd =0x4c444556, len=4
36,068,376 >>> mbox cmd response data (687 bytes)
36,216,103 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,246,214 UART: [rt]cmd =0x43455246, len=4
36,258,921 >>> mbox cmd response data (886 bytes)
36,403,190 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,432,909 UART: [rt]cmd =0x43455252, len=4
36,444,211 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
10,731,626 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,857,832 >>> mbox cmd response: success
26,496,333 UART:
26,496,746 UART: Running Caliptra FMC ...
26,497,893 UART:
26,498,049 UART: [state] CFI Enabled
26,505,781 UART: [fht] FMC Alias Private Key: 7
28,837,220 UART: [art] Extend RT PCRs Done
28,838,475 UART: [art] Lock RT PCRs Done
28,840,209 UART: [art] Populate DV Done
28,845,614 UART: [fht] FMC Alias Private Key: 7
28,847,311 UART: [art] Derive CDI
28,848,117 UART: [art] Store in in slot 0x4
28,890,761 UART: [art] Derive Key Pair
28,891,798 UART: [art] Store priv key in slot 0x5
32,132,704 UART: [art] Derive Key Pair - Done
32,145,438 UART: [art] Signing Cert with AUTHO
32,146,749 UART: RITY.KEYID = 7
34,426,419 UART: [art] Erasing AUTHORITY.KEYID = 7
34,427,925 UART: [art] PUB.X = C85ACE899D19374CD594E09F6959831D7CF0060E5759FC72DCBD42E39BDB371088B022C377F79E4B586BBF219DB6A8AB
34,435,174 UART: [art] PUB.Y = BC498677582C49C4444E1DE56BDE28862530508CD966C2FBE61CE5213D776651ADE1E7E33B6928A714D3DBBE3A4D4DCF
34,442,454 UART: [art] SIG.R = 626C304EA955E9EBBE13B107E303B32A5BA6ADAF4719D63DC7D476A7167ED88E7ADD35AD74887C9DC24D624A89113C28
34,449,835 UART: [art] SIG.S = C77EC4C5062B165242914CC3090448B6EED8429B4EC02F96550B2066405265F7CF8B39B2852BADFF0653C197D31EEFC8
35,754,915 UART: Caliptra RT
35,755,649 UART: [state] CFI Enabled
35,872,379 UART: [rt] RT listening for mailbox commands...
36,022,003 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,052,006 UART: [rt]cmd =0x4c444556, len=4
36,063,138 >>> mbox cmd response data (687 bytes)
36,208,362 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,238,238 UART: [rt]cmd =0x43455246, len=4
36,251,034 >>> mbox cmd response data (886 bytes)
36,393,909 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,424,036 UART: [rt]cmd =0x43455252, len=4
36,435,338 >>> mbox cmd response data (783 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,626 writing to cptra_bootfsm_go
10,730,461 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,854,178 >>> mbox cmd response: success
26,491,067 UART:
26,491,477 UART: Running Caliptra FMC ...
26,492,621 UART:
26,492,776 UART: [state] CFI Enabled
26,500,878 UART: [fht] FMC Alias Private Key: 7
28,831,956 UART: [art] Extend RT PCRs Done
28,833,188 UART: [art] Lock RT PCRs Done
28,834,758 UART: [art] Populate DV Done
28,840,190 UART: [fht] FMC Alias Private Key: 7
28,841,726 UART: [art] Derive CDI
28,842,457 UART: [art] Store in in slot 0x4
28,885,312 UART: [art] Derive Key Pair
28,886,388 UART: [art] Store priv key in slot 0x5
32,128,271 UART: [art] Derive Key Pair - Done
32,141,274 UART: [art] Signing Cert with AUTHO
32,142,578 UART: RITY.KEYID = 7
34,421,800 UART: [art] Erasing AUTHORITY.KEYID = 7
34,423,327 UART: [art] PUB.X = 891420F310C23EC0B07ED4EE7A8364E1B0C310542320472CF599B96133E54ABCF40D6E5235B7FA80FA66DB4325E23FAC
34,430,573 UART: [art] PUB.Y = 8C789BA65C6BDA70417506699BBF2CB9D516919F3CAE2BBCAE29EFDA7EAFB4CE08C372AF6AAA0A42FC4BA090E9D50204
34,437,806 UART: [art] SIG.R = 067836F11445C62A6EBDFEAA0BC8246AD6E2817E7C7754E80CADDCA37226BB54FE62FCF177BA0C53B970085DFB0B312D
34,445,195 UART: [art] SIG.S = C642F49ACAAF833D963D554B31087AA83445E83A378B920E62731310566D1A1675ACA5626FD3B07B4AC2534B2D518920
35,750,647 UART: Caliptra RT
35,751,339 UART: [state] CFI Enabled
35,869,055 UART: [rt] RT listening for mailbox commands...
36,018,376 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,048,591 UART: [rt]cmd =0x4c444556, len=4
36,059,763 >>> mbox cmd response data (687 bytes)
36,204,778 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,234,916 UART: [rt]cmd =0x43455246, len=4
36,247,715 >>> mbox cmd response data (886 bytes)
36,390,567 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,420,494 UART: [rt]cmd =0x43455252, len=4
36,431,900 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1937.15s
Truncated 7343978 bytes from beginning
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
7,995,233 UART: [idev] CSR uploaded
8,012,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,156,737 UART: [idev] --
8,157,377 UART: [ldev] ++
8,157,872 UART: [ldev] CDI.KEYID = 6
8,158,775 UART: [ldev] SUBJECT.KEYID = 5
8,159,868 UART: [ldev] AUTHORITY.KEYID = 7
8,160,965 UART: [ldev] FE.KEYID = 1
8,161,799 UART: [ldev] Erasing FE.KEYID = 1
10,566,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,300,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,316,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,332,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,348,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,367,097 UART: [ldev] --
12,371,498 UART: [fwproc] Wait for Commands...
12,374,328 UART: [fwproc] Recv command 0x46574c44
12,376,429 UART: [fwproc] Recv'd Img size: 114448 bytes
15,781,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,853,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,922,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,240,258 >>> mbox cmd response: success
16,245,360 UART: [afmc] ++
16,245,952 UART: [afmc] CDI.KEYID = 6
16,246,860 UART: [afmc] SUBJECT.KEYID = 7
16,248,085 UART: [afmc] AUTHORITY.KEYID = 5
18,788,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,511,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,513,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,529,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,545,417 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,561,235 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,583,938 UART: [afmc] --
20,588,215 UART: [cold-reset] --
20,592,621 UART: [state] Locking Datavault
20,597,811 UART: [state] Locking PCR0, PCR1 and PCR31
20,599,457 UART: [state] Locking ICCM
20,601,418 UART: [exit] Launching FMC @ 0x40000130
20,609,863 UART:
20,610,105 UART: Running Caliptra FMC ...
20,611,129 UART:
20,611,277 UART: [state] CFI Enabled
20,670,343 UART: [fht] FMC Alias Private Key: 7
22,434,662 UART: [art] Extend RT PCRs Done
22,435,895 UART: [art] Lock RT PCRs Done
22,437,307 UART: [art] Populate DV Done
22,442,830 UART: [fht] FMC Alias Private Key: 7
22,444,369 UART: [art] Derive CDI
22,445,150 UART: [art] Store in in slot 0x4
22,503,158 UART: [art] Derive Key Pair
22,504,218 UART: [art] Store priv key in slot 0x5
24,967,340 UART: [art] Derive Key Pair - Done
24,980,058 UART: [art] Signing Cert with AUTHO
24,981,371 UART: RITY.KEYID = 7
26,693,149 UART: [art] Erasing AUTHORITY.KEYID = 7
26,694,657 UART: [art] PUB.X = 72CCEE012510BEFEECFD84CB2766E9D555530AA0CBB4E57AD8ACC9F047971184B235D40BB70374C17A14C06676553643
26,701,905 UART: [art] PUB.Y = 78189CCDDF5911FB1EDF95D8FA1463C811F627A59C7EEBC07D5130EF273D516AF8C9243971C19B4AE18C15F4F44DD6FF
26,709,201 UART: [art] SIG.R = 88D711C528B5238E5485CCE9AF914595C32D4D397401A0B7E26A90E9C089010EDF7AFBFDB23D50D5937BE6E09F635229
26,716,545 UART: [art] SIG.S = 7DBE893E6829D6D5AC899CEB322E25C23300F73B886FB7FE8B0D963FE27DCFFFC4F8C55C7B45B9811FD935CECFAEA716
27,694,747 UART: Caliptra RT
27,695,462 UART: [state] CFI Enabled
27,861,504 UART: [rt] RT listening for mailbox commands...
28,012,028 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,041,925 UART: [rt]cmd =0x4c444556, len=4
28,053,198 >>> mbox cmd response data (687 bytes)
28,198,667 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,228,386 UART: [rt]cmd =0x43455246, len=4
28,241,106 >>> mbox cmd response data (887 bytes)
28,385,111 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,414,889 UART: [rt]cmd =0x43455252, len=4
28,426,155 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,123 UART:
192,489 UART: Running Caliptra ROM ...
193,665 UART:
193,832 UART: [state] CFI Enabled
262,883 UART: [state] LifecycleState = Unprovisioned
264,797 UART: [state] DebugLocked = No
267,043 UART: [state] WD Timer not started. Device not locked for debugging
270,837 UART: [kat] SHA2-256
449,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,575 UART: [kat] ++
462,105 UART: [kat] sha1
474,231 UART: [kat] SHA2-256
477,295 UART: [kat] SHA2-384
483,643 UART: [kat] SHA2-512-ACC
486,575 UART: [kat] ECC-384
2,947,234 UART: [kat] HMAC-384Kdf
2,974,230 UART: [kat] LMS
3,503,657 UART: [kat] --
3,508,368 UART: [cold-reset] ++
3,509,761 UART: [fht] FHT @ 0x50003400
3,520,262 UART: [idev] ++
3,520,832 UART: [idev] CDI.KEYID = 6
3,521,775 UART: [idev] SUBJECT.KEYID = 7
3,523,008 UART: [idev] UDS.KEYID = 0
3,546,049 UART: [idev] Erasing UDS.KEYID = 0
6,027,867 UART: [idev] Sha1 KeyId Algorithm
6,047,016 UART: [idev] CSR upload begun
6,051,741 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,784,440 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,800,519 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,816,470 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,832,292 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,856,093 UART: [idev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
8,000,689 UART: [idev] CSR uploaded
8,018,093 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,162,108 UART: [idev] --
8,162,747 UART: [ldev] ++
8,163,243 UART: [ldev] CDI.KEYID = 6
8,164,320 UART: [ldev] SUBJECT.KEYID = 5
8,165,531 UART: [ldev] AUTHORITY.KEYID = 7
8,166,720 UART: [ldev] FE.KEYID = 1
8,167,593 UART: [ldev] Erasing FE.KEYID = 1
10,569,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,305,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,321,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,337,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,353,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,374,425 UART: [ldev] --
12,378,177 UART: [fwproc] Wait for Commands...
12,380,006 UART: [fwproc] Recv command 0x46574c44
12,382,112 UART: [fwproc] Recv'd Img size: 114448 bytes
15,782,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,855,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,923,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,242,904 >>> mbox cmd response: success
16,246,531 UART: [afmc] ++
16,247,117 UART: [afmc] CDI.KEYID = 6
16,248,001 UART: [afmc] SUBJECT.KEYID = 7
16,249,223 UART: [afmc] AUTHORITY.KEYID = 5
18,793,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,515,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,517,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,533,558 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,549,616 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,565,443 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,589,604 UART: [afmc] --
20,593,750 UART: [cold-reset] --
20,596,096 UART: [state] Locking Datavault
20,601,615 UART: [state] Locking PCR0, PCR1 and PCR31
20,603,320 UART: [state] Locking ICCM
20,604,412 UART: [exit] Launching FMC @ 0x40000130
20,612,836 UART:
20,613,076 UART: Running Caliptra FMC ...
20,614,179 UART:
20,614,336 UART: [state] CFI Enabled
20,673,335 UART: [fht] FMC Alias Private Key: 7
22,437,120 UART: [art] Extend RT PCRs Done
22,438,334 UART: [art] Lock RT PCRs Done
22,440,329 UART: [art] Populate DV Done
22,445,741 UART: [fht] FMC Alias Private Key: 7
22,447,330 UART: [art] Derive CDI
22,448,144 UART: [art] Store in in slot 0x4
22,506,593 UART: [art] Derive Key Pair
22,507,634 UART: [art] Store priv key in slot 0x5
24,970,435 UART: [art] Derive Key Pair - Done
24,983,297 UART: [art] Signing Cert with AUTHO
24,984,627 UART: RITY.KEYID = 7
26,696,995 UART: [art] Erasing AUTHORITY.KEYID = 7
26,698,506 UART: [art] PUB.X = 77FDF9CAA2B4022098A15023EEA05C5D212555BCE9CE4CE8B522056AF4CF6E0B7547985082048500939AF800C935E3F4
26,705,718 UART: [art] PUB.Y = 45A15ECFDD56284EA1C65DD00BDCDFCF8DBF57E7EB8E0FFB3BD9583914DDA91B6A350FFEE481900C6D1F93EE23F81FF1
26,713,022 UART: [art] SIG.R = 0EE275092EA1A93962366303F0CF50D2C738D941695640C70BE54F20CB60152D31692BAE9A72C7E3F0719DFEDC66F670
26,720,420 UART: [art] SIG.S = E8A0ADA38B8DB15FE2F1E80EC4BBC57BA19D2750DB3ABE4EE4FFBDF834E97B7A9BEE8239ED550803DCD2B37B5A1F2800
27,699,592 UART: Caliptra RT
27,700,314 UART: [state] CFI Enabled
27,864,569 UART: [rt] RT listening for mailbox commands...
28,015,039 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,045,534 UART: [rt]cmd =0x4c444556, len=4
28,056,572 >>> mbox cmd response data (687 bytes)
28,202,240 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,232,207 UART: [rt]cmd =0x43455246, len=4
28,244,981 >>> mbox cmd response data (887 bytes)
28,389,285 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,419,207 UART: [rt]cmd =0x43455252, len=4
28,430,774 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.31s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
7,686,853 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,841,550 >>> mbox cmd response: success
20,136,543 UART:
20,136,937 UART: Running Caliptra FMC ...
20,138,038 UART:
20,138,204 UART: [state] CFI Enabled
20,205,055 UART: [fht] FMC Alias Private Key: 7
21,969,305 UART: [art] Extend RT PCRs Done
21,970,529 UART: [art] Lock RT PCRs Done
21,972,383 UART: [art] Populate DV Done
21,977,850 UART: [fht] FMC Alias Private Key: 7
21,979,496 UART: [art] Derive CDI
21,980,312 UART: [art] Store in in slot 0x4
22,038,279 UART: [art] Derive Key Pair
22,039,324 UART: [art] Store priv key in slot 0x5
24,501,767 UART: [art] Derive Key Pair - Done
24,514,497 UART: [art] Signing Cert with AUTHO
24,515,799 UART: RITY.KEYID = 7
26,228,105 UART: [art] Erasing AUTHORITY.KEYID = 7
26,229,624 UART: [art] PUB.X = 30CB0A71053435106A3DAD435A1030DAEFD359E3CC4EC185EAE27FEE6F71F70219F6C710C8DDCB0C9DBB7C2933F811D6
26,236,946 UART: [art] PUB.Y = 3F4BA9149398B8476ECCDABBA170969CF2C6E0BC42748D0F4AD904A2D024F7778B54462AE744FC23BE776491B83C14B2
26,244,195 UART: [art] SIG.R = 7D5C9EBE4C36E1A5D3F8D0B32A59E7B03DFCDB0A33E7ACF60C886DA0C2C6DB5BE29245E167E4F8097BD919B1D6D01C4D
26,251,588 UART: [art] SIG.S = 31E3298C1EBEB1AAF058D1AA564C6395D14C6A4B2DE89CAFF426DBB620EA2C69167CB1B3AF10CDD7137537A914A2E66D
27,230,834 UART: Caliptra RT
27,231,524 UART: [state] CFI Enabled
27,396,382 UART: [rt] RT listening for mailbox commands...
27,545,687 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,575,643 UART: [rt]cmd =0x4c444556, len=4
27,586,544 >>> mbox cmd response data (687 bytes)
27,732,023 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,761,774 UART: [rt]cmd =0x43455246, len=4
27,774,410 >>> mbox cmd response data (887 bytes)
27,917,845 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,947,774 UART: [rt]cmd =0x43455252, len=4
27,959,240 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
7,666,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,817,815 >>> mbox cmd response: success
20,109,743 UART:
20,110,153 UART: Running Caliptra FMC ...
20,111,265 UART:
20,111,420 UART: [state] CFI Enabled
20,181,037 UART: [fht] FMC Alias Private Key: 7
21,944,407 UART: [art] Extend RT PCRs Done
21,945,618 UART: [art] Lock RT PCRs Done
21,947,430 UART: [art] Populate DV Done
21,952,898 UART: [fht] FMC Alias Private Key: 7
21,954,599 UART: [art] Derive CDI
21,955,335 UART: [art] Store in in slot 0x4
22,013,510 UART: [art] Derive Key Pair
22,014,551 UART: [art] Store priv key in slot 0x5
24,477,380 UART: [art] Derive Key Pair - Done
24,490,709 UART: [art] Signing Cert with AUTHO
24,492,011 UART: RITY.KEYID = 7
26,203,920 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,418 UART: [art] PUB.X = DD63AD78AD33FF213F839CE52A3DC608AD485E46A70369B84B930E3370AFF07A75868DCECA4985A8E6DCB00848800C88
26,212,721 UART: [art] PUB.Y = 252F3BE2E0DD215A70AE0145FFAF02724295ADCC90816CEF3EE0AA5BA6F818EA96ABE2DA2607A4CD8F30CF0731184CE8
26,220,009 UART: [art] SIG.R = 41EADA39A54DA577F955853EEA0280D603246A5507C29DAD29CF8E2ADAB9FCB257CF487D74A7FC2C13030524389524B4
26,227,432 UART: [art] SIG.S = 87CEC744CB385594049663B2515B615BA441AB290CB2AFE94BB65CA079503A78D0A4BE48E31362D9359954EFD741202A
27,205,908 UART: Caliptra RT
27,206,609 UART: [state] CFI Enabled
27,371,928 UART: [rt] RT listening for mailbox commands...
27,522,164 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,552,073 UART: [rt]cmd =0x4c444556, len=4
27,563,141 >>> mbox cmd response data (687 bytes)
27,708,664 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,738,474 UART: [rt]cmd =0x43455246, len=4
27,751,226 >>> mbox cmd response data (887 bytes)
27,894,374 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,924,114 UART: [rt]cmd =0x43455252, len=4
27,935,618 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
7,666,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,812,202 >>> mbox cmd response: success
20,117,579 UART:
20,117,972 UART: Running Caliptra FMC ...
20,119,080 UART:
20,119,235 UART: [state] CFI Enabled
20,184,368 UART: [fht] FMC Alias Private Key: 7
21,948,332 UART: [art] Extend RT PCRs Done
21,949,554 UART: [art] Lock RT PCRs Done
21,951,189 UART: [art] Populate DV Done
21,956,750 UART: [fht] FMC Alias Private Key: 7
21,958,394 UART: [art] Derive CDI
21,959,207 UART: [art] Store in in slot 0x4
22,017,453 UART: [art] Derive Key Pair
22,018,501 UART: [art] Store priv key in slot 0x5
24,481,778 UART: [art] Derive Key Pair - Done
24,494,882 UART: [art] Signing Cert with AUTHO
24,496,180 UART: RITY.KEYID = 7
26,207,534 UART: [art] Erasing AUTHORITY.KEYID = 7
26,209,043 UART: [art] PUB.X = F01A0C4AD12E3378A65DCBABF714901161F1D6A0BEB67B7AFD35FC4973833C89B1464F9805AD1B2D7C53542DCCEA774E
26,216,345 UART: [art] PUB.Y = 27903E386F536790962FC8B2563D4925CBD675641D0EF7563456FFFE5EFB0A570A5ACDDB2A979D14AFE2EBABE832B1B6
26,223,602 UART: [art] SIG.R = 1F32BFB8C22DC8AA431C098590B1AA32F818112BBBAD7A284CA7F3A41AB51431F745CB5C01054686E7D41BE6218FACA7
26,231,008 UART: [art] SIG.S = 7CD23A5BAADF35C4BCD0773CF8C57DE86ED269E567A0BD3079CB98E22B9C58E0E6A689EB70785DD8BB569067BF40C67F
27,209,928 UART: Caliptra RT
27,210,643 UART: [state] CFI Enabled
27,376,963 UART: [rt] RT listening for mailbox commands...
27,526,493 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,556,480 UART: [rt]cmd =0x4c444556, len=4
27,567,348 >>> mbox cmd response data (687 bytes)
27,712,964 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,742,929 UART: [rt]cmd =0x43455246, len=4
27,755,569 >>> mbox cmd response data (887 bytes)
27,899,082 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,928,777 UART: [rt]cmd =0x43455252, len=4
27,940,206 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
7,688,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,838,956 >>> mbox cmd response: success
20,137,314 UART:
20,137,703 UART: Running Caliptra FMC ...
20,138,841 UART:
20,139,006 UART: [state] CFI Enabled
20,205,548 UART: [fht] FMC Alias Private Key: 7
21,969,795 UART: [art] Extend RT PCRs Done
21,971,029 UART: [art] Lock RT PCRs Done
21,972,714 UART: [art] Populate DV Done
21,978,000 UART: [fht] FMC Alias Private Key: 7
21,979,663 UART: [art] Derive CDI
21,980,405 UART: [art] Store in in slot 0x4
22,038,088 UART: [art] Derive Key Pair
22,039,093 UART: [art] Store priv key in slot 0x5
24,501,984 UART: [art] Derive Key Pair - Done
24,515,150 UART: [art] Signing Cert with AUTHO
24,516,459 UART: RITY.KEYID = 7
26,227,689 UART: [art] Erasing AUTHORITY.KEYID = 7
26,229,204 UART: [art] PUB.X = 8A7C643AA3487900923187BAB5F8841F7F151DD4D349E04F86EB68196655A348447049440D48EDA0CD6A0E7A6BB18D23
26,236,451 UART: [art] PUB.Y = 66175FCB797305159D507867786A175D3AFB6D80CE89989888D9D82263AD5DD9DEF09CC730A4940D031D1E464BEDD5DA
26,243,675 UART: [art] SIG.R = ED5C03444181CE2F985A81F3A17F9B8887A3B4BF0E66D8CB8118350EEEA54AEDBC5FC83C3B7E8962D09185632B130BD6
26,251,126 UART: [art] SIG.S = 29601C66841EC40A2975E90A20CB956F059C75DD823D177BF1BD87AFA39045B5215593E0ABBB630394BEC375BD9B63AE
27,229,570 UART: Caliptra RT
27,230,294 UART: [state] CFI Enabled
27,393,914 UART: [rt] RT listening for mailbox commands...
27,544,214 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,574,428 UART: [rt]cmd =0x4c444556, len=4
27,585,528 >>> mbox cmd response data (687 bytes)
27,731,206 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,761,024 UART: [rt]cmd =0x43455246, len=4
27,773,798 >>> mbox cmd response data (887 bytes)
27,917,167 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,947,147 UART: [rt]cmd =0x43455252, len=4
27,958,545 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
7,688,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,842,639 >>> mbox cmd response: success
20,136,602 UART:
20,137,027 UART: Running Caliptra FMC ...
20,138,242 UART:
20,138,410 UART: [state] CFI Enabled
20,205,646 UART: [fht] FMC Alias Private Key: 7
21,969,657 UART: [art] Extend RT PCRs Done
21,970,881 UART: [art] Lock RT PCRs Done
21,972,833 UART: [art] Populate DV Done
21,978,184 UART: [fht] FMC Alias Private Key: 7
21,979,887 UART: [art] Derive CDI
21,980,700 UART: [art] Store in in slot 0x4
22,038,123 UART: [art] Derive Key Pair
22,039,164 UART: [art] Store priv key in slot 0x5
24,502,169 UART: [art] Derive Key Pair - Done
24,515,119 UART: [art] Signing Cert with AUTHO
24,516,423 UART: RITY.KEYID = 7
26,228,543 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,080 UART: [art] PUB.X = F64C61EE04A9968DE9DD781F166A3491D65BCEBB2ABACB69AD3EC32550FA2839736A8EB80D23E1A9023EC481D63621CD
26,237,286 UART: [art] PUB.Y = C0E287D40B44FD90C524480618C2566874CA2B281DBBA312096E3FF84E80CDF029AF3FD81FDF9D0A8FD90C9822E63C49
26,244,563 UART: [art] SIG.R = D6C0A41410C785DB7FDB15D966E4A1389C6A895D532F230656F1B0E6DDDF1662003690B9A26782B4EABF4F6D35873841
26,251,931 UART: [art] SIG.S = 8D0AC9204C29C66B537BEF7ED43338F6B21BC885F85D8B85432B904B60FB27CEAE4C977D2E8793EEE60150906C392C2E
27,230,721 UART: Caliptra RT
27,231,437 UART: [state] CFI Enabled
27,397,091 UART: [rt] RT listening for mailbox commands...
27,546,933 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,576,845 UART: [rt]cmd =0x4c444556, len=4
27,587,911 >>> mbox cmd response data (687 bytes)
27,733,467 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,763,337 UART: [rt]cmd =0x43455246, len=4
27,776,116 >>> mbox cmd response data (887 bytes)
27,919,457 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,949,329 UART: [rt]cmd =0x43455252, len=4
27,960,606 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.95s
Truncated 7343978 bytes from beginning
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
8,277,434 UART: [idev] CSR uploaded
8,294,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,438,512 UART: [idev] --
8,439,144 UART: [ldev] ++
8,439,640 UART: [ldev] CDI.KEYID = 6
8,440,710 UART: [ldev] SUBJECT.KEYID = 5
8,441,905 UART: [ldev] AUTHORITY.KEYID = 7
8,443,007 UART: [ldev] FE.KEYID = 1
8,443,847 UART: [ldev] Erasing FE.KEYID = 1
10,786,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,504,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,520,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,536,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,551,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,572,623 UART: [ldev] --
12,577,835 UART: [fwproc] Wait for Commands...
12,580,468 UART: [fwproc] Recv command 0x46574c44
12,582,556 UART: [fwproc] Recv'd Img size: 114448 bytes
15,984,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,060,259 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,129,069 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,447,442 >>> mbox cmd response: success
16,451,137 UART: [afmc] ++
16,451,719 UART: [afmc] CDI.KEYID = 6
16,452,598 UART: [afmc] SUBJECT.KEYID = 7
16,453,809 UART: [afmc] AUTHORITY.KEYID = 5
18,956,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,675,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,677,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,693,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,709,290 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,725,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,747,590 UART: [afmc] --
20,751,168 UART: [cold-reset] --
20,754,856 UART: [state] Locking Datavault
20,760,039 UART: [state] Locking PCR0, PCR1 and PCR31
20,761,763 UART: [state] Locking ICCM
20,764,273 UART: [exit] Launching FMC @ 0x40000130
20,772,672 UART:
20,772,911 UART: Running Caliptra FMC ...
20,774,007 UART:
20,774,162 UART: [state] CFI Enabled
20,782,122 UART: [fht] FMC Alias Private Key: 7
22,538,564 UART: [art] Extend RT PCRs Done
22,539,796 UART: [art] Lock RT PCRs Done
22,541,174 UART: [art] Populate DV Done
22,546,536 UART: [fht] FMC Alias Private Key: 7
22,548,122 UART: [art] Derive CDI
22,548,928 UART: [art] Store in in slot 0x4
22,591,036 UART: [art] Derive Key Pair
22,592,027 UART: [art] Store priv key in slot 0x5
25,019,221 UART: [art] Derive Key Pair - Done
25,032,706 UART: [art] Signing Cert with AUTHO
25,034,010 UART: RITY.KEYID = 7
26,739,585 UART: [art] Erasing AUTHORITY.KEYID = 7
26,741,094 UART: [art] PUB.X = AAB625CE4D3026EF3F40BA33B7B51ED541B06012EDC67FCFAB9118843937DBFEBB36D854AAED7735396A7CC8852997BE
26,748,353 UART: [art] PUB.Y = 0FAFC5C25F218AE5B9814AFAC2D79B13BDE43ED0C8CB30E9208A47211DE307CFBD818ABADEFC1089FF14210721E20D9F
26,755,641 UART: [art] SIG.R = 9E10F3DB026C94E3CB1B77A31722C9FF8AEE3DF254BA79F0CB21EE9DA8977917708CFF9E5AA244412428AF2B91BAA38F
26,763,128 UART: [art] SIG.S = 8CD8B610C2E404AE0F0154202A7C2995F078F6C4CD5427877473C9A9A4B8D855DDFC0DBE40813748CD3C3BFD837AAD84
27,741,970 UART: Caliptra RT
27,742,655 UART: [state] CFI Enabled
27,860,518 UART: [rt] RT listening for mailbox commands...
28,011,859 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,042,085 UART: [rt]cmd =0x4c444556, len=4
28,053,232 >>> mbox cmd response data (687 bytes)
28,197,560 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,227,499 UART: [rt]cmd =0x43455246, len=4
28,240,083 >>> mbox cmd response data (887 bytes)
28,383,512 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,413,464 UART: [rt]cmd =0x43455252, len=4
28,424,644 >>> mbox cmd response data (784 bytes)
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,488 UART:
192,885 UART: Running Caliptra ROM ...
194,073 UART:
603,515 UART: [state] CFI Enabled
619,508 UART: [state] LifecycleState = Unprovisioned
621,335 UART: [state] DebugLocked = No
622,608 UART: [state] WD Timer not started. Device not locked for debugging
626,822 UART: [kat] SHA2-256
805,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,509 UART: [kat] ++
818,050 UART: [kat] sha1
830,072 UART: [kat] SHA2-256
833,074 UART: [kat] SHA2-384
840,084 UART: [kat] SHA2-512-ACC
843,022 UART: [kat] ECC-384
3,286,063 UART: [kat] HMAC-384Kdf
3,300,133 UART: [kat] LMS
3,829,639 UART: [kat] --
3,832,195 UART: [cold-reset] ++
3,833,155 UART: [fht] FHT @ 0x50003400
3,843,265 UART: [idev] ++
3,843,823 UART: [idev] CDI.KEYID = 6
3,844,755 UART: [idev] SUBJECT.KEYID = 7
3,845,963 UART: [idev] UDS.KEYID = 0
3,861,751 UART: [idev] Erasing UDS.KEYID = 0
6,317,781 UART: [idev] Sha1 KeyId Algorithm
6,339,763 UART: [idev] CSR upload begun
6,344,499 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,059,345 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,075,380 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,091,365 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,107,251 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,131,019 UART: [idev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
8,275,603 UART: [idev] CSR uploaded
8,292,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,436,794 UART: [idev] --
8,437,431 UART: [ldev] ++
8,437,929 UART: [ldev] CDI.KEYID = 6
8,438,808 UART: [ldev] SUBJECT.KEYID = 5
8,439,895 UART: [ldev] AUTHORITY.KEYID = 7
8,441,089 UART: [ldev] FE.KEYID = 1
8,441,937 UART: [ldev] Erasing FE.KEYID = 1
10,785,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,504,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,520,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,536,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,551,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,573,490 UART: [ldev] --
12,578,696 UART: [fwproc] Wait for Commands...
12,580,376 UART: [fwproc] Recv command 0x46574c44
12,582,472 UART: [fwproc] Recv'd Img size: 114448 bytes
15,986,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,061,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,130,415 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,448,910 >>> mbox cmd response: success
16,453,839 UART: [afmc] ++
16,454,431 UART: [afmc] CDI.KEYID = 6
16,455,341 UART: [afmc] SUBJECT.KEYID = 7
16,456,559 UART: [afmc] AUTHORITY.KEYID = 5
18,958,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,676,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,678,569 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,694,491 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,710,511 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,726,318 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,749,258 UART: [afmc] --
20,753,666 UART: [cold-reset] --
20,756,665 UART: [state] Locking Datavault
20,762,882 UART: [state] Locking PCR0, PCR1 and PCR31
20,764,521 UART: [state] Locking ICCM
20,765,588 UART: [exit] Launching FMC @ 0x40000130
20,774,038 UART:
20,774,283 UART: Running Caliptra FMC ...
20,775,382 UART:
20,775,538 UART: [state] CFI Enabled
20,783,254 UART: [fht] FMC Alias Private Key: 7
22,540,103 UART: [art] Extend RT PCRs Done
22,541,317 UART: [art] Lock RT PCRs Done
22,543,050 UART: [art] Populate DV Done
22,548,083 UART: [fht] FMC Alias Private Key: 7
22,549,673 UART: [art] Derive CDI
22,550,502 UART: [art] Store in in slot 0x4
22,593,524 UART: [art] Derive Key Pair
22,594,555 UART: [art] Store priv key in slot 0x5
25,021,267 UART: [art] Derive Key Pair - Done
25,034,415 UART: [art] Signing Cert with AUTHO
25,035,732 UART: RITY.KEYID = 7
26,741,137 UART: [art] Erasing AUTHORITY.KEYID = 7
26,742,669 UART: [art] PUB.X = 4E0A9D15DD310DCC7F5DC2FAE3874EA56F7420C30619FE5E0BFE4C767CE76C030672EE307F3ACA39D8ED4159B874B559
26,749,945 UART: [art] PUB.Y = 71E68DC15ED0CCA00A0FD456C1ED6ED2A72F40FB97317C6E57425661E539275F7DA1E0BEBA025FF6CB7614552C4C6BDA
26,757,192 UART: [art] SIG.R = 6102956974A55BA96D6D131B6EA9D1EDF7E561F49F5858D475FDCCADEACD70B4B24DF8ACCD71B14D6EDEDF9375C89CC8
26,764,585 UART: [art] SIG.S = 84AA068E935B1CC765FF19B6AB2C250992899CAC9AE5427C810D108492F0A8D38467D8202BF92FD7401E1CF06CE5FD34
27,743,510 UART: Caliptra RT
27,744,437 UART: [state] CFI Enabled
27,861,581 UART: [rt] RT listening for mailbox commands...
28,012,649 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,042,823 UART: [rt]cmd =0x4c444556, len=4
28,054,045 >>> mbox cmd response data (687 bytes)
28,198,560 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,228,618 UART: [rt]cmd =0x43455246, len=4
28,241,135 >>> mbox cmd response data (887 bytes)
28,385,524 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,415,228 UART: [rt]cmd =0x43455252, len=4
28,426,623 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.33s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
7,935,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,018,260 >>> mbox cmd response: success
20,265,951 UART:
20,266,336 UART: Running Caliptra FMC ...
20,267,430 UART:
20,267,581 UART: [state] CFI Enabled
20,275,042 UART: [fht] FMC Alias Private Key: 7
22,032,025 UART: [art] Extend RT PCRs Done
22,033,275 UART: [art] Lock RT PCRs Done
22,034,636 UART: [art] Populate DV Done
22,040,051 UART: [fht] FMC Alias Private Key: 7
22,041,537 UART: [art] Derive CDI
22,042,279 UART: [art] Store in in slot 0x4
22,084,929 UART: [art] Derive Key Pair
22,085,985 UART: [art] Store priv key in slot 0x5
24,512,858 UART: [art] Derive Key Pair - Done
24,525,637 UART: [art] Signing Cert with AUTHO
24,526,940 UART: RITY.KEYID = 7
26,232,439 UART: [art] Erasing AUTHORITY.KEYID = 7
26,233,949 UART: [art] PUB.X = 1D85A8D242620EDA051D2D407C199696F62EB5091C90FBF7AA9EA0352A63C2A4BA27C865A2873D39AE3C9E636EDDB7F4
26,241,216 UART: [art] PUB.Y = 22AB0378788887877933A57AD48BAD1245EE3709C2A02F663AAEFB4245EFDBD5385E7BFF3F66FDE7B67E06FD91A5EB36
26,248,508 UART: [art] SIG.R = 63667F26173FA25D69C9D5EAE2B4BE35B9291BDD4621ADD85D5E138FA3D46CFCD35B84AE4CB725C333FC10C4DDAB6151
26,255,929 UART: [art] SIG.S = EE549CFB4DEA87F2986104BC5C79323DA7D2A0C9D8C8F4035DA68031F722FD6131B671CC8EDBC5BFA8E1C64B9B45A28A
27,235,084 UART: Caliptra RT
27,235,808 UART: [state] CFI Enabled
27,354,234 UART: [rt] RT listening for mailbox commands...
27,504,887 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,535,339 UART: [rt]cmd =0x4c444556, len=4
27,546,417 >>> mbox cmd response data (687 bytes)
27,692,110 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,722,045 UART: [rt]cmd =0x43455246, len=4
27,734,549 >>> mbox cmd response data (887 bytes)
27,877,421 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,907,276 UART: [rt]cmd =0x43455252, len=4
27,918,539 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,563 writing to cptra_bootfsm_go
7,947,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,036,470 >>> mbox cmd response: success
20,287,759 UART:
20,288,156 UART: Running Caliptra FMC ...
20,289,356 UART:
20,289,528 UART: [state] CFI Enabled
20,297,368 UART: [fht] FMC Alias Private Key: 7
22,053,764 UART: [art] Extend RT PCRs Done
22,054,979 UART: [art] Lock RT PCRs Done
22,056,934 UART: [art] Populate DV Done
22,062,283 UART: [fht] FMC Alias Private Key: 7
22,063,829 UART: [art] Derive CDI
22,064,592 UART: [art] Store in in slot 0x4
22,107,302 UART: [art] Derive Key Pair
22,108,346 UART: [art] Store priv key in slot 0x5
24,534,895 UART: [art] Derive Key Pair - Done
24,547,895 UART: [art] Signing Cert with AUTHO
24,549,192 UART: RITY.KEYID = 7
26,254,797 UART: [art] Erasing AUTHORITY.KEYID = 7
26,256,300 UART: [art] PUB.X = 7A1E369ABD2EEE36EA54C79D66D35B998B1A5965555AF3653CE6C294CC4F50580C48D88B5BAEBF5F19E217C4D4F22066
26,263,575 UART: [art] PUB.Y = 751CF6655F97373A2BD8A6D875DAD16259CA74BB5F312053136894940FBC462A07CD3F9D95DD1806FA4022D66688FB1F
26,270,860 UART: [art] SIG.R = 88ACB74CBB96C1EA782B93C73AEEEE69601A3E095EFF062DE293F3850202DBD120AC92BBA100C54B021003DF18FA8D80
26,278,284 UART: [art] SIG.S = 0B163212007C64E3A6759FB7D214AB12B90052B8A6EA4940BEA2ED967F19E9F6A4B93C85C4BF5806BCD6FF597A3D2D99
27,256,561 UART: Caliptra RT
27,257,280 UART: [state] CFI Enabled
27,373,719 UART: [rt] RT listening for mailbox commands...
27,523,059 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,553,335 UART: [rt]cmd =0x4c444556, len=4
27,564,354 >>> mbox cmd response data (687 bytes)
27,709,406 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,739,183 UART: [rt]cmd =0x43455246, len=4
27,751,961 >>> mbox cmd response data (887 bytes)
27,895,150 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,925,219 UART: [rt]cmd =0x43455252, len=4
27,936,585 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
7,935,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,023,193 >>> mbox cmd response: success
20,272,123 UART:
20,272,572 UART: Running Caliptra FMC ...
20,273,707 UART:
20,273,871 UART: [state] CFI Enabled
20,281,873 UART: [fht] FMC Alias Private Key: 7
22,038,896 UART: [art] Extend RT PCRs Done
22,040,132 UART: [art] Lock RT PCRs Done
22,041,820 UART: [art] Populate DV Done
22,047,237 UART: [fht] FMC Alias Private Key: 7
22,048,833 UART: [art] Derive CDI
22,049,647 UART: [art] Store in in slot 0x4
22,092,413 UART: [art] Derive Key Pair
22,093,470 UART: [art] Store priv key in slot 0x5
24,519,422 UART: [art] Derive Key Pair - Done
24,532,372 UART: [art] Signing Cert with AUTHO
24,533,686 UART: RITY.KEYID = 7
26,239,816 UART: [art] Erasing AUTHORITY.KEYID = 7
26,241,332 UART: [art] PUB.X = B055CC06310F42D2A2209C82259E544BB9C08D5E1E3F54BE710931DA036C1FF9CC9415CF829576B4FD152AD1DAD14081
26,248,559 UART: [art] PUB.Y = DE841E331928E7724F988775683F9E36B0414E0C2ADB0ADF496F37B7547E1DFC80A86E220CF990F269F04E5B8758F9D3
26,255,806 UART: [art] SIG.R = EAEA4B571626C51BEDF709BBE2E121443A434A1CF782B7950E9053A38514DFB133F40A5CA206E40667D319276CD3EBD2
26,263,183 UART: [art] SIG.S = D2DC01E9E8788BCEF56309B27761F72CB1F582D5A5498BE41BB00557F3F28142EEEAACCB865EFE5254F245FF7F903565
27,241,746 UART: Caliptra RT
27,242,436 UART: [state] CFI Enabled
27,359,257 UART: [rt] RT listening for mailbox commands...
27,509,604 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,539,551 UART: [rt]cmd =0x4c444556, len=4
27,550,756 >>> mbox cmd response data (687 bytes)
27,696,347 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,726,215 UART: [rt]cmd =0x43455246, len=4
27,738,823 >>> mbox cmd response data (887 bytes)
27,881,724 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,911,549 UART: [rt]cmd =0x43455252, len=4
27,922,762 >>> mbox cmd response data (784 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
7,938,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,021,192 >>> mbox cmd response: success
20,269,441 UART:
20,269,824 UART: Running Caliptra FMC ...
20,270,964 UART:
20,271,127 UART: [state] CFI Enabled
20,279,286 UART: [fht] FMC Alias Private Key: 7
22,036,259 UART: [art] Extend RT PCRs Done
22,037,511 UART: [art] Lock RT PCRs Done
22,039,084 UART: [art] Populate DV Done
22,044,445 UART: [fht] FMC Alias Private Key: 7
22,045,990 UART: [art] Derive CDI
22,046,803 UART: [art] Store in in slot 0x4
22,089,627 UART: [art] Derive Key Pair
22,090,628 UART: [art] Store priv key in slot 0x5
24,517,875 UART: [art] Derive Key Pair - Done
24,530,931 UART: [art] Signing Cert with AUTHO
24,532,243 UART: RITY.KEYID = 7
26,237,911 UART: [art] Erasing AUTHORITY.KEYID = 7
26,239,416 UART: [art] PUB.X = 7A83435A8FF1889475B95227DCD69B70A9579A0CC792978994AD2CD7E8B96D0550B2B0ED4A29E81B383EAEBAD310F822
26,246,678 UART: [art] PUB.Y = DBC6B2B5D2B16FBD07012D4A84C5AD43DA2E036C3AB2FEE21653389F75A536B6A6C64A9A3835CBF7257E5DF0181F2B20
26,254,070 UART: [art] SIG.R = CD51F397D76E4866D03C432BE7DDA2E07F31E434C0CA5F7EFC6F94AD95185E42724FE535358C3A0C5A86B77BAF82BBC5
26,261,349 UART: [art] SIG.S = 8A499BAAC2AEE182EE5ED605E8AABEA1B246BB2D582B81FB9D76C9DF02F6AF6F31204CDE35938FEC1624A879BF8C66F8
27,239,807 UART: Caliptra RT
27,240,519 UART: [state] CFI Enabled
27,357,851 UART: [rt] RT listening for mailbox commands...
27,507,595 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,537,767 UART: [rt]cmd =0x4c444556, len=4
27,548,813 >>> mbox cmd response data (687 bytes)
27,695,176 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,724,955 UART: [rt]cmd =0x43455246, len=4
27,737,468 >>> mbox cmd response data (887 bytes)
27,882,148 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,911,978 UART: [rt]cmd =0x43455252, len=4
27,923,234 >>> mbox cmd response data (784 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
7,949,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,035,321 >>> mbox cmd response: success
20,282,767 UART:
20,283,179 UART: Running Caliptra FMC ...
20,284,292 UART:
20,284,447 UART: [state] CFI Enabled
20,292,390 UART: [fht] FMC Alias Private Key: 7
22,048,838 UART: [art] Extend RT PCRs Done
22,050,067 UART: [art] Lock RT PCRs Done
22,051,682 UART: [art] Populate DV Done
22,057,032 UART: [fht] FMC Alias Private Key: 7
22,058,683 UART: [art] Derive CDI
22,059,422 UART: [art] Store in in slot 0x4
22,102,176 UART: [art] Derive Key Pair
22,103,177 UART: [art] Store priv key in slot 0x5
24,529,691 UART: [art] Derive Key Pair - Done
24,542,523 UART: [art] Signing Cert with AUTHO
24,543,817 UART: RITY.KEYID = 7
26,249,211 UART: [art] Erasing AUTHORITY.KEYID = 7
26,250,740 UART: [art] PUB.X = F98A61892CD29893739702D826A91EB5879FE72BB2D70F2731EAE1B62EE7E6C27B803AF2B6A030D360020C687F93035D
26,257,952 UART: [art] PUB.Y = DED9A113BE148F9560860A9337B0B4A874CE7191C9A99A8C403C0EFC3AFEBD7800BAE85E91B1B3086D3FD24FCE46A718
26,265,198 UART: [art] SIG.R = 57F1AC1BF7B8B2E27E5BA202910A8F7CDD8A2A9A58C14DC11567040C5D10489D123201B45A1C19EA286C8C6F1CE327E9
26,272,604 UART: [art] SIG.S = 9DFD78FF29DF679233B14F39E17E44C80E05B654A3B6B8AC92BDF731F69BCB7709FC25DEBF9C1A0C423C05A03CD465A2
27,251,724 UART: Caliptra RT
27,252,440 UART: [state] CFI Enabled
27,368,748 UART: [rt] RT listening for mailbox commands...
27,518,769 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,548,785 UART: [rt]cmd =0x4c444556, len=4
27,559,905 >>> mbox cmd response data (687 bytes)
27,705,982 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,736,227 UART: [rt]cmd =0x43455246, len=4
27,748,929 >>> mbox cmd response data (887 bytes)
27,892,746 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,922,567 UART: [rt]cmd =0x43455252, len=4
27,934,114 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.48s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
7,686,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,818,391 >>> mbox cmd response: success
20,111,485 UART:
20,111,879 UART: Running Caliptra FMC ...
20,113,002 UART:
20,113,167 UART: [state] CFI Enabled
20,180,572 UART: [fht] FMC Alias Private Key: 7
21,944,921 UART: [art] Extend RT PCRs Done
21,946,149 UART: [art] Lock RT PCRs Done
21,947,892 UART: [art] Populate DV Done
21,953,354 UART: [fht] FMC Alias Private Key: 7
21,955,022 UART: [art] Derive CDI
21,955,846 UART: [art] Store in in slot 0x4
22,013,648 UART: [art] Derive Key Pair
22,014,686 UART: [art] Store priv key in slot 0x5
24,477,448 UART: [art] Derive Key Pair - Done
24,490,387 UART: [art] Signing Cert with AUTHO
24,491,689 UART: RITY.KEYID = 7
26,203,475 UART: [art] Erasing AUTHORITY.KEYID = 7
26,204,984 UART: [art] PUB.X = 09D7427818D9F71B3DD302C05C20D5AB4323F129A81AD8CB56AE7DB9A819678FAAB7ABBCF71127C5A89F187CBB118FB1
26,212,288 UART: [art] PUB.Y = 2B566CE01E54DEB9230837574CE5308B8571A8E7E9A7714680EEE2608E1593688FDD743C8AEFCC8327E8F902D22414CA
26,219,534 UART: [art] SIG.R = EF992903E0F63FFA62EECB459A805F480376F8FC8B535E5122CA4EE0544FB43558E15CE019EDEE4FCC0BF9D06E8E9A3F
26,226,944 UART: [art] SIG.S = 02A1E8A618B77D72DBD248EE08AEFECC9B19463E887C725496D4F8C739CBCF4F0170A984F0B3FC0B97F3A3F0999489A1
27,205,526 UART: Caliptra RT
27,206,241 UART: [state] CFI Enabled
27,373,201 UART: [rt] RT listening for mailbox commands...
27,523,076 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,553,081 UART: [rt]cmd =0x4c444556, len=4
27,564,038 >>> mbox cmd response data (687 bytes)
27,709,849 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,739,655 UART: [rt]cmd =0x43455246, len=4
27,752,403 >>> mbox cmd response data (887 bytes)
27,895,093 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,925,009 UART: [rt]cmd =0x43455252, len=4
27,936,316 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
7,683,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,837,989 >>> mbox cmd response: success
20,133,453 UART:
20,133,847 UART: Running Caliptra FMC ...
20,134,977 UART:
20,135,139 UART: [state] CFI Enabled
20,199,947 UART: [fht] FMC Alias Private Key: 7
21,964,578 UART: [art] Extend RT PCRs Done
21,965,813 UART: [art] Lock RT PCRs Done
21,967,496 UART: [art] Populate DV Done
21,972,909 UART: [fht] FMC Alias Private Key: 7
21,974,511 UART: [art] Derive CDI
21,975,333 UART: [art] Store in in slot 0x4
22,032,861 UART: [art] Derive Key Pair
22,033,912 UART: [art] Store priv key in slot 0x5
24,497,196 UART: [art] Derive Key Pair - Done
24,510,520 UART: [art] Signing Cert with AUTHO
24,511,834 UART: RITY.KEYID = 7
26,223,024 UART: [art] Erasing AUTHORITY.KEYID = 7
26,224,544 UART: [art] PUB.X = 48A0AEA1BD1D3151152F271BB5E6AD83AEA745B1ACCE5B59B155A6E2ECE116D677585607FA32D456153AAA3B6CB96A21
26,231,852 UART: [art] PUB.Y = 74365701AABD3E6DFFD4530835E08D9969605E95DED57E739DE713BDC4FB2BB494548CD773A8E79173EA11952698968D
26,239,075 UART: [art] SIG.R = 928689D0D645DEB021022E7005BC71A07072BA1BAE5DBA2BE57C3C38D6313DDF01B7725E772A01373DBD83F13063A6D1
26,246,493 UART: [art] SIG.S = EA7E3E43A526B59A2317805FAD19EE1DF1B96C14C0D8F691F1D7B3EC494D7AADA66225CF42FDA64454E3A02808A99359
27,225,553 UART: Caliptra RT
27,226,270 UART: [state] CFI Enabled
27,392,097 UART: [rt] RT listening for mailbox commands...
27,541,756 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,571,671 UART: [rt]cmd =0x4c444556, len=4
27,582,879 >>> mbox cmd response data (687 bytes)
27,728,068 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,757,826 UART: [rt]cmd =0x43455246, len=4
27,770,467 >>> mbox cmd response data (887 bytes)
27,913,394 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,943,483 UART: [rt]cmd =0x43455252, len=4
27,954,750 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
7,666,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,810,823 >>> mbox cmd response: success
20,095,168 UART:
20,095,574 UART: Running Caliptra FMC ...
20,096,693 UART:
20,096,853 UART: [state] CFI Enabled
20,159,994 UART: [fht] FMC Alias Private Key: 7
21,924,254 UART: [art] Extend RT PCRs Done
21,925,484 UART: [art] Lock RT PCRs Done
21,927,386 UART: [art] Populate DV Done
21,932,840 UART: [fht] FMC Alias Private Key: 7
21,934,551 UART: [art] Derive CDI
21,935,372 UART: [art] Store in in slot 0x4
21,992,917 UART: [art] Derive Key Pair
21,993,960 UART: [art] Store priv key in slot 0x5
24,456,804 UART: [art] Derive Key Pair - Done
24,469,597 UART: [art] Signing Cert with AUTHO
24,470,924 UART: RITY.KEYID = 7
26,182,855 UART: [art] Erasing AUTHORITY.KEYID = 7
26,184,367 UART: [art] PUB.X = 3D29CF18D4E344E28E825D966F1630452382047A0968EE3E07A56035003F58B7FBF91AC47B6D3E05FD346C4E0C38C6D0
26,191,621 UART: [art] PUB.Y = C4373C62E0A57A621E09B31C9535852DD5385BF96A7A568CC55F4B6834EC46E95391117DBDDD486E9A8511DB9E541900
26,198,828 UART: [art] SIG.R = 80B415455FB3D2662CDF2F88AAA930B7EEC2EFE359B2CEDD39DE63CACB800A19277B86245CCC05E0F589B33258202B4C
26,206,300 UART: [art] SIG.S = 317CEDAF9BB962788D123BB9BCA4BED9BA408A5C5A434FCC00C06634E1D5185B76D4E8DEE799B8CC8AF99E3D5B4CFC22
27,185,287 UART: Caliptra RT
27,185,976 UART: [state] CFI Enabled
27,349,795 UART: [rt] RT listening for mailbox commands...
27,499,808 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,529,811 UART: [rt]cmd =0x4c444556, len=4
27,541,151 >>> mbox cmd response data (687 bytes)
27,686,465 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,716,187 UART: [rt]cmd =0x43455246, len=4
27,728,843 >>> mbox cmd response data (887 bytes)
27,871,927 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,901,899 UART: [rt]cmd =0x43455252, len=4
27,913,373 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
7,665,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,802,270 >>> mbox cmd response: success
20,086,562 UART:
20,086,969 UART: Running Caliptra FMC ...
20,088,075 UART:
20,088,234 UART: [state] CFI Enabled
20,158,138 UART: [fht] FMC Alias Private Key: 7
21,921,481 UART: [art] Extend RT PCRs Done
21,922,704 UART: [art] Lock RT PCRs Done
21,924,361 UART: [art] Populate DV Done
21,929,777 UART: [fht] FMC Alias Private Key: 7
21,931,264 UART: [art] Derive CDI
21,932,020 UART: [art] Store in in slot 0x4
21,990,910 UART: [art] Derive Key Pair
21,991,954 UART: [art] Store priv key in slot 0x5
24,455,525 UART: [art] Derive Key Pair - Done
24,468,530 UART: [art] Signing Cert with AUTHO
24,469,838 UART: RITY.KEYID = 7
26,180,823 UART: [art] Erasing AUTHORITY.KEYID = 7
26,182,320 UART: [art] PUB.X = 1762B2CD0726796AD0FD64E485827D2952FC64F72F6BCB209A94607F5F1C9EFEE7EDABB9765AE0F6CDE1DC66142033E3
26,189,562 UART: [art] PUB.Y = 48959C491A1A6177C371A94AEC63E9C800FCA6E1A7224CCF70F4B567AD839475238B453DD46C04B6885031C214494167
26,196,786 UART: [art] SIG.R = AA9B7C50F55C8D4A8BFF551E1ACC2F8F91B8A10E4383CABC87CF33B8FBFD56F1A41E01FC330C7AAD83E395C6C23497C8
26,204,240 UART: [art] SIG.S = 9D15A8E3D82386B38F7CE601FBCFFD4BFAC202D8EA20C75B062F362F53CE237CC6E24D88DF50D174A50F00C6900EF20F
27,183,213 UART: Caliptra RT
27,183,932 UART: [state] CFI Enabled
27,348,798 UART: [rt] RT listening for mailbox commands...
27,498,025 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,527,894 UART: [rt]cmd =0x4c444556, len=4
27,538,933 >>> mbox cmd response data (687 bytes)
27,684,579 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,714,614 UART: [rt]cmd =0x43455246, len=4
27,727,387 >>> mbox cmd response data (887 bytes)
27,870,712 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,900,694 UART: [rt]cmd =0x43455252, len=4
27,912,134 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
7,684,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,839,466 >>> mbox cmd response: success
20,138,780 UART:
20,139,187 UART: Running Caliptra FMC ...
20,140,309 UART:
20,140,475 UART: [state] CFI Enabled
20,203,771 UART: [fht] FMC Alias Private Key: 7
21,966,964 UART: [art] Extend RT PCRs Done
21,968,190 UART: [art] Lock RT PCRs Done
21,969,718 UART: [art] Populate DV Done
21,975,558 UART: [fht] FMC Alias Private Key: 7
21,977,046 UART: [art] Derive CDI
21,977,812 UART: [art] Store in in slot 0x4
22,037,217 UART: [art] Derive Key Pair
22,038,279 UART: [art] Store priv key in slot 0x5
24,501,053 UART: [art] Derive Key Pair - Done
24,514,009 UART: [art] Signing Cert with AUTHO
24,515,323 UART: RITY.KEYID = 7
26,227,020 UART: [art] Erasing AUTHORITY.KEYID = 7
26,228,531 UART: [art] PUB.X = 40DD23F0631AD19E373014EF8B7469D5496CC98AB01D61D64A35765EA9F1343B0D0813DFAAE23AA5D33720F278039819
26,235,835 UART: [art] PUB.Y = CB8D6EDA599E97A3B20017F658C4CF131F2C5CB1B1D1A6C517B7BB1FC73161072734975CDFD32239F9BA346B0FA75B9A
26,243,059 UART: [art] SIG.R = 1A948B7AE6FBFC0477EAE1060CAF2F334168D1FC3E18D72DB6CC0347506C6CCA30ABEB2B20B1810DB662249F4A96814B
26,250,466 UART: [art] SIG.S = 8F956A7F3FA9AEE416F51E1AB7B474685C80E2635A9138B823ADE408BBD61E2F05047D7EBA95C60F5BEAF84B2B230D97
27,229,274 UART: Caliptra RT
27,229,999 UART: [state] CFI Enabled
27,393,964 UART: [rt] RT listening for mailbox commands...
27,543,879 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,573,985 UART: [rt]cmd =0x4c444556, len=4
27,584,948 >>> mbox cmd response data (687 bytes)
27,730,488 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,760,467 UART: [rt]cmd =0x43455246, len=4
27,773,118 >>> mbox cmd response data (887 bytes)
27,916,130 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,945,992 UART: [rt]cmd =0x43455252, len=4
27,957,620 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.98s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
7,944,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,026,683 >>> mbox cmd response: success
20,279,187 UART:
20,279,609 UART: Running Caliptra FMC ...
20,280,714 UART:
20,280,875 UART: [state] CFI Enabled
20,289,136 UART: [fht] FMC Alias Private Key: 7
22,046,216 UART: [art] Extend RT PCRs Done
22,047,436 UART: [art] Lock RT PCRs Done
22,049,172 UART: [art] Populate DV Done
22,054,597 UART: [fht] FMC Alias Private Key: 7
22,056,292 UART: [art] Derive CDI
22,057,087 UART: [art] Store in in slot 0x4
22,099,589 UART: [art] Derive Key Pair
22,100,599 UART: [art] Store priv key in slot 0x5
24,527,101 UART: [art] Derive Key Pair - Done
24,539,934 UART: [art] Signing Cert with AUTHO
24,541,264 UART: RITY.KEYID = 7
26,246,802 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,286 UART: [art] PUB.X = 6EF2249E930568854D9AC864C0A4654B06A09F6087DBC9A0B7D091C02B294846E4CA0F7268D6F2A4E9EDBF6D32843203
26,255,601 UART: [art] PUB.Y = 671710952C51B7C46E00141FF6074AF1903C42C521F825D30009A7594A7D7C796FAFED1FEE4E515FE3A8A624C9E1A36E
26,262,816 UART: [art] SIG.R = 36D8685A583D142FF36FAF3F2A4277289D579C6F8B01512B00DB85B10C7DE8327218CBC4613D0568CAEF777254FFC97F
26,270,189 UART: [art] SIG.S = 6EEC68417B2E38DA4C028344A77CD85C94FCAE258DF75DD3E458776721C3D99A5DD24D6EDCC2864A02C470055C475043
27,248,914 UART: Caliptra RT
27,249,629 UART: [state] CFI Enabled
27,366,743 UART: [rt] RT listening for mailbox commands...
27,516,320 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,546,511 UART: [rt]cmd =0x4c444556, len=4
27,557,530 >>> mbox cmd response data (687 bytes)
27,702,628 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,732,662 UART: [rt]cmd =0x43455246, len=4
27,745,482 >>> mbox cmd response data (887 bytes)
27,888,881 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,918,857 UART: [rt]cmd =0x43455252, len=4
27,930,159 >>> mbox cmd response data (782 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
7,933,696 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,021,149 >>> mbox cmd response: success
20,276,423 UART:
20,276,806 UART: Running Caliptra FMC ...
20,277,999 UART:
20,278,167 UART: [state] CFI Enabled
20,285,585 UART: [fht] FMC Alias Private Key: 7
22,042,568 UART: [art] Extend RT PCRs Done
22,043,802 UART: [art] Lock RT PCRs Done
22,045,407 UART: [art] Populate DV Done
22,051,256 UART: [fht] FMC Alias Private Key: 7
22,052,746 UART: [art] Derive CDI
22,053,480 UART: [art] Store in in slot 0x4
22,096,084 UART: [art] Derive Key Pair
22,097,132 UART: [art] Store priv key in slot 0x5
24,523,685 UART: [art] Derive Key Pair - Done
24,536,904 UART: [art] Signing Cert with AUTHO
24,538,205 UART: RITY.KEYID = 7
26,243,839 UART: [art] Erasing AUTHORITY.KEYID = 7
26,245,352 UART: [art] PUB.X = 69AC0761728E7B4B0564684D8919AA8042D11F2FFA229AA2480024825457687958604A508776A70D8EDC4980E88B2D84
26,252,561 UART: [art] PUB.Y = 4586C736864BCE225C97025D514DE954A092488FB4F69171F2B305DB3D65B7792E1530F4691848C8B1C87B1C6FA7E074
26,259,818 UART: [art] SIG.R = A3AB3ACDAA56F9ABBA77AB4316117A0680A4B58F02775ED72D5108E0F4B686FBCB0D16D9E17C8A2F08A37904B43D7299
26,267,240 UART: [art] SIG.S = 4CA379359CD1AFA24641CEB3024CAE72D73E19AD8660BC2D2D7F81A9F91364F6CDA91F440EDA1AD29A27CADC03878E3C
27,246,130 UART: Caliptra RT
27,246,821 UART: [state] CFI Enabled
27,364,040 UART: [rt] RT listening for mailbox commands...
27,513,989 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,543,929 UART: [rt]cmd =0x4c444556, len=4
27,555,116 >>> mbox cmd response data (687 bytes)
27,701,863 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,731,830 UART: [rt]cmd =0x43455246, len=4
27,744,548 >>> mbox cmd response data (887 bytes)
27,888,090 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,917,945 UART: [rt]cmd =0x43455252, len=4
27,929,251 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
7,938,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,020,899 >>> mbox cmd response: success
20,269,493 UART:
20,269,882 UART: Running Caliptra FMC ...
20,270,980 UART:
20,271,131 UART: [state] CFI Enabled
20,278,810 UART: [fht] FMC Alias Private Key: 7
22,035,578 UART: [art] Extend RT PCRs Done
22,036,797 UART: [art] Lock RT PCRs Done
22,038,615 UART: [art] Populate DV Done
22,043,757 UART: [fht] FMC Alias Private Key: 7
22,045,461 UART: [art] Derive CDI
22,046,278 UART: [art] Store in in slot 0x4
22,089,330 UART: [art] Derive Key Pair
22,090,402 UART: [art] Store priv key in slot 0x5
24,516,630 UART: [art] Derive Key Pair - Done
24,529,462 UART: [art] Signing Cert with AUTHO
24,530,766 UART: RITY.KEYID = 7
26,236,281 UART: [art] Erasing AUTHORITY.KEYID = 7
26,237,777 UART: [art] PUB.X = 501639B99B9B4B474884E2A9942F4625BAA3E7EC480FEFE99FE38942E88FF3ED340AAD8FDF70F6C73B00B79679E763C8
26,245,052 UART: [art] PUB.Y = FAAF631CA66EA2934445B94994D17DA38B01D540F27C880E999B5D5A549AFB7903E72B185611DA6029D286A147AE9055
26,252,299 UART: [art] SIG.R = DF0C60EABA8CFE59D83D873FE3AD7229D587ED54748EE8AC28549FEAFD9EA35E793FA4F2F10F389D162F6382E7E76070
26,259,671 UART: [art] SIG.S = 370F28169D5D5E89DC283A3A3399CF690630DF63D32CA06F7209B37830FFB81BCAB960A8C26DAB53AE13961E944C6B58
27,239,240 UART: Caliptra RT
27,239,928 UART: [state] CFI Enabled
27,355,796 UART: [rt] RT listening for mailbox commands...
27,505,010 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,534,977 UART: [rt]cmd =0x4c444556, len=4
27,545,971 >>> mbox cmd response data (687 bytes)
27,690,892 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,720,832 UART: [rt]cmd =0x43455246, len=4
27,733,448 >>> mbox cmd response data (887 bytes)
27,876,617 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,906,561 UART: [rt]cmd =0x43455252, len=4
27,918,102 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
7,944,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,035,775 >>> mbox cmd response: success
20,282,737 UART:
20,283,146 UART: Running Caliptra FMC ...
20,284,290 UART:
20,284,457 UART: [state] CFI Enabled
20,292,356 UART: [fht] FMC Alias Private Key: 7
22,049,561 UART: [art] Extend RT PCRs Done
22,050,805 UART: [art] Lock RT PCRs Done
22,052,553 UART: [art] Populate DV Done
22,058,179 UART: [fht] FMC Alias Private Key: 7
22,059,825 UART: [art] Derive CDI
22,060,639 UART: [art] Store in in slot 0x4
22,102,826 UART: [art] Derive Key Pair
22,103,831 UART: [art] Store priv key in slot 0x5
24,530,573 UART: [art] Derive Key Pair - Done
24,543,522 UART: [art] Signing Cert with AUTHO
24,544,823 UART: RITY.KEYID = 7
26,250,733 UART: [art] Erasing AUTHORITY.KEYID = 7
26,252,237 UART: [art] PUB.X = F759F71027ED0202F9B33D94A09A4B68100E4743832422858663B8A9BD4B9E515F5757094EE71E182011A80D25ECFFFE
26,259,449 UART: [art] PUB.Y = 1853053076B56D9F7E7CA95BD7EA788B91ADADDE89AC55379B87468B32781C2A344880E2CA5A23A23D3DFE198CE0AB57
26,266,728 UART: [art] SIG.R = EC24099B4EE2B39E2ED8B1144CB13F945634349FAD0A3766914A6B8D3DE1CB9CEE71E011EC78727CB66D1A610879ED3E
26,274,154 UART: [art] SIG.S = A30C8F741244EAA163A30B57DFC993A6654135AFAF117751F0E9B9296ABB50C21620929A2313FC18588D3C9F90B0A063
27,252,618 UART: Caliptra RT
27,253,322 UART: [state] CFI Enabled
27,371,155 UART: [rt] RT listening for mailbox commands...
27,520,922 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,550,766 UART: [rt]cmd =0x4c444556, len=4
27,561,929 >>> mbox cmd response data (687 bytes)
27,707,036 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,737,017 UART: [rt]cmd =0x43455246, len=4
27,749,686 >>> mbox cmd response data (887 bytes)
27,892,728 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,922,829 UART: [rt]cmd =0x43455252, len=4
27,933,950 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,594 writing to cptra_bootfsm_go
7,939,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,021,584 >>> mbox cmd response: success
20,274,191 UART:
20,274,578 UART: Running Caliptra FMC ...
20,275,710 UART:
20,275,872 UART: [state] CFI Enabled
20,284,098 UART: [fht] FMC Alias Private Key: 7
22,040,988 UART: [art] Extend RT PCRs Done
22,042,229 UART: [art] Lock RT PCRs Done
22,044,128 UART: [art] Populate DV Done
22,049,695 UART: [fht] FMC Alias Private Key: 7
22,051,234 UART: [art] Derive CDI
22,051,972 UART: [art] Store in in slot 0x4
22,095,373 UART: [art] Derive Key Pair
22,096,372 UART: [art] Store priv key in slot 0x5
24,523,029 UART: [art] Derive Key Pair - Done
24,535,542 UART: [art] Signing Cert with AUTHO
24,536,853 UART: RITY.KEYID = 7
26,242,313 UART: [art] Erasing AUTHORITY.KEYID = 7
26,243,817 UART: [art] PUB.X = 9675478646F64EAC761BE7BE22B2F3436EFC13304DA743C3CE86C1A89CCABB38304D58FADA55B5F974E7F39A6FA850A6
26,251,131 UART: [art] PUB.Y = A3170D7DDD8B2B77457A9419ABE4E5A987F634AFB5033564D853E4F7CC4EC877369E2E35CE7901EE5DC111E05F59DC2A
26,258,416 UART: [art] SIG.R = 0068B6D631B13653086656CAFDD98A5D77D9ECDBA86A76585063084079A90E15690A4176421697D12139938D705242F4
26,265,719 UART: [art] SIG.S = 6671D4DBD3464268A173DBE1CE40A67CD42CD5DE628294797788EB72AC1AD0DC268F83D40440319335573462343C52E6
27,244,150 UART: Caliptra RT
27,244,863 UART: [state] CFI Enabled
27,362,124 UART: [rt] RT listening for mailbox commands...
27,512,730 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,542,878 UART: [rt]cmd =0x4c444556, len=4
27,554,062 >>> mbox cmd response data (687 bytes)
27,699,863 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,729,672 UART: [rt]cmd =0x43455246, len=4
27,742,480 >>> mbox cmd response data (887 bytes)
27,885,729 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,915,610 UART: [rt]cmd =0x43455252, len=4
27,926,783 >>> mbox cmd response data (781 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.45s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,232 UART: [idev] CSR uploaded
1,300,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,446 UART: [idev] --
1,301,647 UART: [ldev] ++
1,301,815 UART: [ldev] CDI.KEYID = 6
1,302,179 UART: [ldev] SUBJECT.KEYID = 5
1,302,606 UART: [ldev] AUTHORITY.KEYID = 7
1,303,069 UART: [ldev] FE.KEYID = 1
1,308,359 UART: [ldev] Erasing FE.KEYID = 1
1,334,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,985 UART: [ldev] --
1,373,313 UART: [fwproc] Wait for Commands...
1,373,976 UART: [fwproc] Recv command 0x46574c44
1,374,709 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,137 >>> mbox cmd response: success
2,867,234 UART: [afmc] ++
2,867,402 UART: [afmc] CDI.KEYID = 6
2,867,765 UART: [afmc] SUBJECT.KEYID = 7
2,868,191 UART: [afmc] AUTHORITY.KEYID = 5
2,903,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,869 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,598 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,481 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,200 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,131 UART: [afmc] --
2,947,213 UART: [cold-reset] --
2,947,999 UART: [state] Locking Datavault
2,949,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,660 UART: [state] Locking ICCM
2,950,116 UART: [exit] Launching FMC @ 0x40000130
2,955,445 UART:
2,955,461 UART: Running Caliptra FMC ...
2,955,869 UART:
2,955,923 UART: [state] CFI Enabled
2,966,614 UART: [fht] FMC Alias Private Key: 7
3,074,945 UART: [art] Extend RT PCRs Done
3,075,373 UART: [art] Lock RT PCRs Done
3,076,957 UART: [art] Populate DV Done
3,085,382 UART: [fht] FMC Alias Private Key: 7
3,086,420 UART: [art] Derive CDI
3,086,700 UART: [art] Store in in slot 0x4
3,172,233 UART: [art] Derive Key Pair
3,172,593 UART: [art] Store priv key in slot 0x5
3,186,193 UART: [art] Derive Key Pair - Done
3,200,936 UART: [art] Signing Cert with AUTHO
3,201,416 UART: RITY.KEYID = 7
3,216,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,227 UART: [art] PUB.X = 00AA8FC019A68CA394D49A34A8D1F15BD51A81C9B668B9B669CAF4D4A9F00064332B4E6FE88CAF9B0352C06C8A22D296
3,223,962 UART: [art] PUB.Y = 948FF60D42686321B2175418584E7FE4E88D50EB8E0D0F82F72F6233178B975F03DA651B4632310472669C1C9520BDFB
3,230,889 UART: [art] SIG.R = D1F13562D91847CC555BB7D03CFEC5AD9F1FCA765A89C6C4AB67F05DD4DF5C692007A9A8A8CBF1F6C7FE497FD1897547
3,237,676 UART: [art] SIG.S = 4FAB1AC3FCCC2630C794EBBD0C3C07CC0C1CA8D8FCA1778EA556056244E7334998EBAC861EEABCE57CF67070099ADE73
3,261,856 UART: Caliptra RT
3,262,109 UART: [state] CFI Enabled
3,369,376 UART: [rt] RT listening for mailbox commands...
3,370,046 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,910 UART: [rt]cmd =0x4c444556, len=4
3,410,250 >>> mbox cmd response data (687 bytes)
3,410,251 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,508 UART: [rt]cmd =0x43455246, len=4
3,451,540 >>> mbox cmd response data (887 bytes)
3,451,541 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,480,888 UART: [rt]cmd =0x43455252, len=4
3,491,863 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,707 UART: [kat] SHA2-256
901,647 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
916,068 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,477 UART: [fht] FHT @ 0x50003400
1,173,003 UART: [idev] ++
1,173,171 UART: [idev] CDI.KEYID = 6
1,173,532 UART: [idev] SUBJECT.KEYID = 7
1,173,957 UART: [idev] UDS.KEYID = 0
1,182,379 UART: [idev] Erasing UDS.KEYID = 0
1,199,093 UART: [idev] Sha1 KeyId Algorithm
1,207,451 UART: [idev] CSR upload begun
1,209,230 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,073 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,781 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,666 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,372 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,801 UART: [idev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
1,297,298 UART: [idev] CSR uploaded
1,300,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,512 UART: [idev] --
1,301,593 UART: [ldev] ++
1,301,761 UART: [ldev] CDI.KEYID = 6
1,302,125 UART: [ldev] SUBJECT.KEYID = 5
1,302,552 UART: [ldev] AUTHORITY.KEYID = 7
1,303,015 UART: [ldev] FE.KEYID = 1
1,308,303 UART: [ldev] Erasing FE.KEYID = 1
1,334,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,841 UART: [ldev] --
1,374,273 UART: [fwproc] Wait for Commands...
1,374,860 UART: [fwproc] Recv command 0x46574c44
1,375,593 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,796 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,183 >>> mbox cmd response: success
2,868,222 UART: [afmc] ++
2,868,390 UART: [afmc] CDI.KEYID = 6
2,868,753 UART: [afmc] SUBJECT.KEYID = 7
2,869,179 UART: [afmc] AUTHORITY.KEYID = 5
2,904,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,055 UART: [afmc] --
2,948,177 UART: [cold-reset] --
2,949,013 UART: [state] Locking Datavault
2,950,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,966 UART: [state] Locking ICCM
2,951,438 UART: [exit] Launching FMC @ 0x40000130
2,956,767 UART:
2,956,783 UART: Running Caliptra FMC ...
2,957,191 UART:
2,957,245 UART: [state] CFI Enabled
2,967,802 UART: [fht] FMC Alias Private Key: 7
3,075,457 UART: [art] Extend RT PCRs Done
3,075,885 UART: [art] Lock RT PCRs Done
3,077,313 UART: [art] Populate DV Done
3,085,862 UART: [fht] FMC Alias Private Key: 7
3,086,888 UART: [art] Derive CDI
3,087,168 UART: [art] Store in in slot 0x4
3,172,675 UART: [art] Derive Key Pair
3,173,035 UART: [art] Store priv key in slot 0x5
3,186,023 UART: [art] Derive Key Pair - Done
3,201,231 UART: [art] Signing Cert with AUTHO
3,201,711 UART: RITY.KEYID = 7
3,216,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,554 UART: [art] PUB.X = AA5B7310FC2B7175D89C743FD9C90191212D06A36C69CF2EA9B2012DA57A7AA76B355E7C1CEE5292922382050B1F2DDE
3,224,317 UART: [art] PUB.Y = 2A79E3A8575D78BB671297093E4467DEF197B709A697429D414DA5A085197518F1E6D33CDCB46C054CAA43EC08A96FC5
3,231,257 UART: [art] SIG.R = 23820A369B448A0FF36DD29E6CF92D9162468FCC0D5FBAE52DD7D55EBD980E7C20CD11D08BBB61C33F8FFAFA3304A64F
3,238,034 UART: [art] SIG.S = A2F3B1D932749E82A3E02F184B183DC95D2AA7B4A0A527A7508B765A458E8D52F17CAB451223FB8DAC59A0B105A00B9D
3,261,923 UART: Caliptra RT
3,262,176 UART: [state] CFI Enabled
3,370,205 UART: [rt] RT listening for mailbox commands...
3,370,875 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,929 UART: [rt]cmd =0x4c444556, len=4
3,411,341 >>> mbox cmd response data (687 bytes)
3,411,342 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,697 UART: [rt]cmd =0x43455246, len=4
3,452,889 >>> mbox cmd response data (887 bytes)
3,452,890 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,195 UART: [rt]cmd =0x43455252, len=4
3,492,992 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 928.74s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,823,852 UART: [art] Lock RT PCRs Done
2,825,104 UART: [art] Populate DV Done
2,833,213 UART: [fht] FMC Alias Private Key: 7
2,834,175 UART: [art] Derive CDI
2,834,455 UART: [art] Store in in slot 0x4
2,919,696 UART: [art] Derive Key Pair
2,920,056 UART: [art] Store priv key in slot 0x5
2,932,756 UART: [art] Derive Key Pair - Done
2,947,904 UART: [art] Signing Cert with AUTHO
2,948,384 UART: RITY.KEYID = 7
2,963,872 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,637 UART: [art] PUB.X = 8A4B2F90D311A53E0E376F425A9B4D1A1E090976D7A2ACFA03EC446829348BBDD0D9E67FCF31510FF9162766484C1966
2,971,396 UART: [art] PUB.Y = 43297405CFA9B7F6DE49ECAF981A6302C65F51085D21B705520709BBA983950F1E78C48EB3F807581254DBB97285C92F
2,978,320 UART: [art] SIG.R = 4519737EF4FF5180E59AA8318F91ABED76D22425F6A8B1364FBC3DF2B1DEC01A754F5ADBAA72F69F15CAEAD381B60BEB
2,985,111 UART: [art] SIG.S = 157060AD0B0211364845E652AF49B2E507A9576CB0D8DAA9ED8B8E0A3FD2453BDA3BCE98639ED6DDF91ABC533CB18933
3,009,172 UART: Caliptra RT
3,009,425 UART: [state] CFI Enabled
3,117,804 UART: [rt] RT listening for mailbox commands...
3,118,474 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,384 UART: [rt]cmd =0x4c444556, len=4
3,158,770 >>> mbox cmd response data (687 bytes)
3,158,771 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,112 UART: [rt]cmd =0x43455246, len=4
3,200,150 >>> mbox cmd response data (887 bytes)
3,200,151 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,296 UART: [rt]cmd =0x43455252, len=4
3,240,287 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,566 >>> mbox cmd response: success
2,706,296 UART:
2,706,312 UART: Running Caliptra FMC ...
2,706,720 UART:
2,706,774 UART: [state] CFI Enabled
2,717,229 UART: [fht] FMC Alias Private Key: 7
2,825,942 UART: [art] Extend RT PCRs Done
2,826,370 UART: [art] Lock RT PCRs Done
2,827,964 UART: [art] Populate DV Done
2,836,241 UART: [fht] FMC Alias Private Key: 7
2,837,315 UART: [art] Derive CDI
2,837,595 UART: [art] Store in in slot 0x4
2,923,214 UART: [art] Derive Key Pair
2,923,574 UART: [art] Store priv key in slot 0x5
2,936,322 UART: [art] Derive Key Pair - Done
2,950,912 UART: [art] Signing Cert with AUTHO
2,951,392 UART: RITY.KEYID = 7
2,966,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,429 UART: [art] PUB.X = 48CBFEE2F7FDCA402DF25EAE00C05A043FF1A0A085857140132E34EDA49C55AAD803E52F08D5BEC0EBB7710DADC88C7B
2,974,191 UART: [art] PUB.Y = E0586710724283C203A46B6EF64658483D5C264A932584065CED5467DC7539CCEE62F66490E41152B9B72F8A74995707
2,981,118 UART: [art] SIG.R = C576446B42AEF3F09234CFEA65D27FE4CEF48124F9884C062EB62D6DB5A4E08E74ACDA1376CC07B4BA43582545D5DEBC
2,987,900 UART: [art] SIG.S = 677727E8E062E7AA45D7E1DD971214AB1BC389A6E30ED187F2DAD69DEB7CF6E717B49269455CF415F68E8D547FF90988
3,011,775 UART: Caliptra RT
3,012,028 UART: [state] CFI Enabled
3,120,205 UART: [rt] RT listening for mailbox commands...
3,120,875 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,751 UART: [rt]cmd =0x4c444556, len=4
3,161,183 >>> mbox cmd response data (687 bytes)
3,161,184 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,617 UART: [rt]cmd =0x43455246, len=4
3,202,623 >>> mbox cmd response data (887 bytes)
3,202,624 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,779 UART: [rt]cmd =0x43455252, len=4
3,242,588 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,640,864 >>> mbox cmd response: success
2,702,588 UART:
2,702,604 UART: Running Caliptra FMC ...
2,703,012 UART:
2,703,066 UART: [state] CFI Enabled
2,713,471 UART: [fht] FMC Alias Private Key: 7
2,821,924 UART: [art] Extend RT PCRs Done
2,822,352 UART: [art] Lock RT PCRs Done
2,824,112 UART: [art] Populate DV Done
2,832,543 UART: [fht] FMC Alias Private Key: 7
2,833,619 UART: [art] Derive CDI
2,833,899 UART: [art] Store in in slot 0x4
2,919,628 UART: [art] Derive Key Pair
2,919,988 UART: [art] Store priv key in slot 0x5
2,933,144 UART: [art] Derive Key Pair - Done
2,948,164 UART: [art] Signing Cert with AUTHO
2,948,644 UART: RITY.KEYID = 7
2,963,862 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,627 UART: [art] PUB.X = B8C8821BDE0DF5A343147EBFD60CBE1DFB1294EBBFDE010698286F89F83A68399D5F448A682D70FBC10421E8CECCC846
2,971,400 UART: [art] PUB.Y = C0EA7B5B18B4103944742FF474CE61713D7065FA25C625DFEBB3D8DEF7A41FEDEEF353D2D842E5AAAFB58D6A3FF7FD47
2,978,376 UART: [art] SIG.R = 57334461932D9A3C51B559AD55EC13BD9FB7894E2E23891EAE2BD7732C2AD1C12143A367F2ADDA1FAF1CFDCFEAB27706
2,985,161 UART: [art] SIG.S = 6B6EFF16A34517CC9A3D8A1988533FC902F25009125D13FAF3F701CD00F3D92A8A47C7B5E13776CA831990582546916B
3,009,163 UART: Caliptra RT
3,009,416 UART: [state] CFI Enabled
3,117,515 UART: [rt] RT listening for mailbox commands...
3,118,185 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,021 UART: [rt]cmd =0x4c444556, len=4
3,158,537 >>> mbox cmd response data (687 bytes)
3,158,538 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,709 UART: [rt]cmd =0x43455246, len=4
3,199,783 >>> mbox cmd response data (887 bytes)
3,199,784 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,189 UART: [rt]cmd =0x43455252, len=4
3,240,080 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,642 >>> mbox cmd response: success
2,704,242 UART:
2,704,258 UART: Running Caliptra FMC ...
2,704,666 UART:
2,704,720 UART: [state] CFI Enabled
2,715,181 UART: [fht] FMC Alias Private Key: 7
2,822,816 UART: [art] Extend RT PCRs Done
2,823,244 UART: [art] Lock RT PCRs Done
2,824,674 UART: [art] Populate DV Done
2,832,907 UART: [fht] FMC Alias Private Key: 7
2,833,945 UART: [art] Derive CDI
2,834,225 UART: [art] Store in in slot 0x4
2,919,742 UART: [art] Derive Key Pair
2,920,102 UART: [art] Store priv key in slot 0x5
2,933,322 UART: [art] Derive Key Pair - Done
2,947,895 UART: [art] Signing Cert with AUTHO
2,948,375 UART: RITY.KEYID = 7
2,963,651 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,416 UART: [art] PUB.X = 56192B232B0B633D3E71C35EA6C899A7A205B523C1ECA137103D76F4B769CCA9D81B2D0BBE2663F2BED6C8FFDCF0FBFD
2,971,199 UART: [art] PUB.Y = 2F940EB0E751AD9743AC75871D7E6B6485BF0CD312EDE576361B71FE5FBCF14C7D0BF5D090DD4436889936EDCBAAFFC5
2,978,160 UART: [art] SIG.R = 15EF52A96C610AB39047946EC67DE5DBACF01E90B23B1FFD4FA15F7C92F0A779BEF8BE4B5852B5CE631BC79C71559E13
2,984,945 UART: [art] SIG.S = EF918116B6BA7F808DECEE0CD23B11A6E178710CED6F67FEA93F237CD6BD9A8F6CA8DDFABEA8079A953D4E3B2574F5E0
3,009,067 UART: Caliptra RT
3,009,320 UART: [state] CFI Enabled
3,116,845 UART: [rt] RT listening for mailbox commands...
3,117,515 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,277 UART: [rt]cmd =0x4c444556, len=4
3,157,759 >>> mbox cmd response data (687 bytes)
3,157,760 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,057 UART: [rt]cmd =0x43455246, len=4
3,199,199 >>> mbox cmd response data (887 bytes)
3,199,200 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,621 UART: [rt]cmd =0x43455252, len=4
3,239,660 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,548 >>> mbox cmd response: success
2,705,582 UART:
2,705,598 UART: Running Caliptra FMC ...
2,706,006 UART:
2,706,060 UART: [state] CFI Enabled
2,716,279 UART: [fht] FMC Alias Private Key: 7
2,824,636 UART: [art] Extend RT PCRs Done
2,825,064 UART: [art] Lock RT PCRs Done
2,826,664 UART: [art] Populate DV Done
2,834,857 UART: [fht] FMC Alias Private Key: 7
2,835,973 UART: [art] Derive CDI
2,836,253 UART: [art] Store in in slot 0x4
2,922,078 UART: [art] Derive Key Pair
2,922,438 UART: [art] Store priv key in slot 0x5
2,935,668 UART: [art] Derive Key Pair - Done
2,950,211 UART: [art] Signing Cert with AUTHO
2,950,691 UART: RITY.KEYID = 7
2,965,855 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,620 UART: [art] PUB.X = A10BD3E370F5A174698FB05C163E48F2730A1BBB2EF97EEC893405C044D115D1565C3F6DDD43F933D9AF0E114E2B4E98
2,973,388 UART: [art] PUB.Y = A1287CCF25D2477919BAF032167217EDE418820A230ED31639389FBB5435768257100DEFB4F6A528EFC9A192EC654A96
2,980,327 UART: [art] SIG.R = 66116B8E4F0DB6CD0E2E5DE2F97708032EBD669296C49F324A8242E9612080300AA8F1BCF670AD986AD11DAEA48F9947
2,987,088 UART: [art] SIG.S = 86D02DF6D57E7E9C6BA21595A98B7C7F3B73F45EAD78ABBA9AB0C62543642D59A2EC7D2D9C342036CBC365CA8E4E5531
3,011,239 UART: Caliptra RT
3,011,492 UART: [state] CFI Enabled
3,118,727 UART: [rt] RT listening for mailbox commands...
3,119,397 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,079 UART: [rt]cmd =0x4c444556, len=4
3,159,691 >>> mbox cmd response data (687 bytes)
3,159,692 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,035 UART: [rt]cmd =0x43455246, len=4
3,200,969 >>> mbox cmd response data (887 bytes)
3,200,970 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,285 UART: [rt]cmd =0x43455252, len=4
3,241,052 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 896.50s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,743 UART: [idev] CSR uploaded
1,300,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,957 UART: [idev] --
1,301,922 UART: [ldev] ++
1,302,090 UART: [ldev] CDI.KEYID = 6
1,302,454 UART: [ldev] SUBJECT.KEYID = 5
1,302,881 UART: [ldev] AUTHORITY.KEYID = 7
1,303,344 UART: [ldev] FE.KEYID = 1
1,308,706 UART: [ldev] Erasing FE.KEYID = 1
1,335,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,274 UART: [ldev] --
1,374,542 UART: [fwproc] Wait for Commands...
1,375,187 UART: [fwproc] Recv command 0x46574c44
1,375,920 UART: [fwproc] Recv'd Img size: 114448 bytes
2,675,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,703,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,732,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,868,346 >>> mbox cmd response: success
2,869,479 UART: [afmc] ++
2,869,647 UART: [afmc] CDI.KEYID = 6
2,870,010 UART: [afmc] SUBJECT.KEYID = 7
2,870,436 UART: [afmc] AUTHORITY.KEYID = 5
2,905,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,922,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,928,575 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,934,458 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,940,177 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,954 UART: [afmc] --
2,948,934 UART: [cold-reset] --
2,949,982 UART: [state] Locking Datavault
2,951,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,951,827 UART: [state] Locking ICCM
2,952,461 UART: [exit] Launching FMC @ 0x40000130
2,957,790 UART:
2,957,806 UART: Running Caliptra FMC ...
2,958,214 UART:
2,958,357 UART: [state] CFI Enabled
2,968,922 UART: [fht] FMC Alias Private Key: 7
3,076,867 UART: [art] Extend RT PCRs Done
3,077,295 UART: [art] Lock RT PCRs Done
3,078,905 UART: [art] Populate DV Done
3,087,284 UART: [fht] FMC Alias Private Key: 7
3,088,368 UART: [art] Derive CDI
3,088,648 UART: [art] Store in in slot 0x4
3,174,519 UART: [art] Derive Key Pair
3,174,879 UART: [art] Store priv key in slot 0x5
3,188,291 UART: [art] Derive Key Pair - Done
3,202,957 UART: [art] Signing Cert with AUTHO
3,203,437 UART: RITY.KEYID = 7
3,218,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,219,366 UART: [art] PUB.X = AEFB361AD20CDF4DEBAB5803B89E0ECBA9A136EA69CED706526D7BD6987CF6242F76E736C58F9A535C9601B0B2348F31
3,226,139 UART: [art] PUB.Y = 368B2F474FB6DE70CE9D705B5B2FC22F0FEB1BD8D7A30B9E2528AFFA82659FD98231E7F90F3195007680657989C233D0
3,233,064 UART: [art] SIG.R = BC6CF0A1308BBF2694CB492D45A2F3D2FDF9166B459E8A63CFC4C65C76F8EB1696C401FBBB67EBF9E31B73EA67F70707
3,239,845 UART: [art] SIG.S = CBD4BBAD353CB215489DC55B11760431192111C40A757F666BE237015C1624205825E7D192A5E03EADCA148B23DD6F9F
3,263,739 UART: Caliptra RT
3,264,084 UART: [state] CFI Enabled
3,372,716 UART: [rt] RT listening for mailbox commands...
3,373,386 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,296 UART: [rt]cmd =0x4c444556, len=4
3,413,814 >>> mbox cmd response data (687 bytes)
3,413,815 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,048 UART: [rt]cmd =0x43455246, len=4
3,455,030 >>> mbox cmd response data (887 bytes)
3,455,031 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,354 UART: [rt]cmd =0x43455252, len=4
3,495,090 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,847 UART: [state] LifecycleState = Unprovisioned
86,502 UART: [state] DebugLocked = No
87,122 UART: [state] WD Timer not started. Device not locked for debugging
88,277 UART: [kat] SHA2-256
891,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,956 UART: [kat] ++
896,108 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,829 UART: [kat] SHA2-512-ACC
906,730 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,002 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,172,988 UART: [idev] ++
1,173,156 UART: [idev] CDI.KEYID = 6
1,173,517 UART: [idev] SUBJECT.KEYID = 7
1,173,942 UART: [idev] UDS.KEYID = 0
1,181,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,190 UART: [idev] Sha1 KeyId Algorithm
1,207,610 UART: [idev] CSR upload begun
1,209,389 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,150 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,858 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,743 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,449 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,878 UART: [idev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
1,297,375 UART: [idev] CSR uploaded
1,300,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,589 UART: [idev] --
1,301,606 UART: [ldev] ++
1,301,774 UART: [ldev] CDI.KEYID = 6
1,302,138 UART: [ldev] SUBJECT.KEYID = 5
1,302,565 UART: [ldev] AUTHORITY.KEYID = 7
1,303,028 UART: [ldev] FE.KEYID = 1
1,308,418 UART: [ldev] Erasing FE.KEYID = 1
1,334,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,854 UART: [ldev] --
1,374,274 UART: [fwproc] Wait for Commands...
1,374,937 UART: [fwproc] Recv command 0x46574c44
1,375,670 UART: [fwproc] Recv'd Img size: 114448 bytes
2,675,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,702,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,734 >>> mbox cmd response: success
2,868,959 UART: [afmc] ++
2,869,127 UART: [afmc] CDI.KEYID = 6
2,869,490 UART: [afmc] SUBJECT.KEYID = 7
2,869,916 UART: [afmc] AUTHORITY.KEYID = 5
2,906,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,922,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,988 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,928,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,934,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,940,319 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,948,208 UART: [afmc] --
2,949,298 UART: [cold-reset] --
2,950,380 UART: [state] Locking Datavault
2,951,413 UART: [state] Locking PCR0, PCR1 and PCR31
2,952,017 UART: [state] Locking ICCM
2,952,577 UART: [exit] Launching FMC @ 0x40000130
2,957,906 UART:
2,957,922 UART: Running Caliptra FMC ...
2,958,330 UART:
2,958,473 UART: [state] CFI Enabled
2,969,024 UART: [fht] FMC Alias Private Key: 7
3,077,521 UART: [art] Extend RT PCRs Done
3,077,949 UART: [art] Lock RT PCRs Done
3,079,483 UART: [art] Populate DV Done
3,087,584 UART: [fht] FMC Alias Private Key: 7
3,088,628 UART: [art] Derive CDI
3,088,908 UART: [art] Store in in slot 0x4
3,174,805 UART: [art] Derive Key Pair
3,175,165 UART: [art] Store priv key in slot 0x5
3,188,257 UART: [art] Derive Key Pair - Done
3,202,918 UART: [art] Signing Cert with AUTHO
3,203,398 UART: RITY.KEYID = 7
3,218,420 UART: [art] Erasing AUTHORITY.KEYID = 7
3,219,185 UART: [art] PUB.X = 49FC7CEEF4102A25E40E6C2648D0054A825AFB9C2255EA029362CC28C51B6C8995CFC06FF3D497BDE961885EEDCE1CC8
3,225,962 UART: [art] PUB.Y = D078F3A89F9DD693FD182D8C33844B78510936C76569DD2CE9B7204294E759AFCD0F7D84E5F771BBCF28036C89B06AAF
3,232,911 UART: [art] SIG.R = 940DA498900F2968610F7D429D40B463FBAC6E399C5510556C4DCD5B50C3F80AC72752F0A9593433FBF6A204E896ECAD
3,239,670 UART: [art] SIG.S = B56422599A17A7A2A0A2D908801EA5D053DBE8B28A1069CF67B3728317C6D4C7213EF1C42FCBF11CC7B3A28A7B350933
3,264,139 UART: Caliptra RT
3,264,484 UART: [state] CFI Enabled
3,371,056 UART: [rt] RT listening for mailbox commands...
3,371,726 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,412 UART: [rt]cmd =0x4c444556, len=4
3,411,920 >>> mbox cmd response data (687 bytes)
3,411,921 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,384 UART: [rt]cmd =0x43455246, len=4
3,453,512 >>> mbox cmd response data (887 bytes)
3,453,513 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,076 UART: [rt]cmd =0x43455252, len=4
3,493,960 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 908.87s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,827,440 UART: [art] Lock RT PCRs Done
2,828,598 UART: [art] Populate DV Done
2,837,081 UART: [fht] FMC Alias Private Key: 7
2,838,245 UART: [art] Derive CDI
2,838,525 UART: [art] Store in in slot 0x4
2,924,072 UART: [art] Derive Key Pair
2,924,432 UART: [art] Store priv key in slot 0x5
2,937,178 UART: [art] Derive Key Pair - Done
2,952,286 UART: [art] Signing Cert with AUTHO
2,952,766 UART: RITY.KEYID = 7
2,967,866 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,631 UART: [art] PUB.X = 03AE78ECB6A194C991593B6C5EDE1B5797BC9883D61F33E64CDE3124A6C064CFB66195095CF30A73A55F6C9EBEC22101
2,975,399 UART: [art] PUB.Y = 16A21ACBE2C68C88D8DBB2A55A021FCF7684CA543D72FA043328DBA95865FCE35F3732C7DCD279DD5FD96BD42A3CDE2D
2,982,367 UART: [art] SIG.R = 0BEAA539E89C8AB74B374F6BE478E24C4C3D4404E206172A762B146982C2CC15FE85C5307B23AC50240973A9C249AE95
2,989,127 UART: [art] SIG.S = AAC7ABD740FC16655E33534EDBCD723A18CCED441515BF88BBF4323FEB3FD1B67A164A6083130AE6E249FD0AA34F7DE1
3,012,626 UART: Caliptra RT
3,012,971 UART: [state] CFI Enabled
3,120,500 UART: [rt] RT listening for mailbox commands...
3,121,170 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,978 UART: [rt]cmd =0x4c444556, len=4
3,161,548 >>> mbox cmd response data (687 bytes)
3,161,549 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,932 UART: [rt]cmd =0x43455246, len=4
3,202,950 >>> mbox cmd response data (887 bytes)
3,202,951 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,128 UART: [rt]cmd =0x43455252, len=4
3,242,941 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,459 >>> mbox cmd response: success
2,706,515 UART:
2,706,531 UART: Running Caliptra FMC ...
2,706,939 UART:
2,707,082 UART: [state] CFI Enabled
2,717,699 UART: [fht] FMC Alias Private Key: 7
2,824,906 UART: [art] Extend RT PCRs Done
2,825,334 UART: [art] Lock RT PCRs Done
2,826,864 UART: [art] Populate DV Done
2,835,247 UART: [fht] FMC Alias Private Key: 7
2,836,249 UART: [art] Derive CDI
2,836,529 UART: [art] Store in in slot 0x4
2,922,222 UART: [art] Derive Key Pair
2,922,582 UART: [art] Store priv key in slot 0x5
2,935,958 UART: [art] Derive Key Pair - Done
2,950,732 UART: [art] Signing Cert with AUTHO
2,951,212 UART: RITY.KEYID = 7
2,966,584 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,349 UART: [art] PUB.X = 8EB91B8E9F3FEDE182C3834CF624CF57BF13524A497C13DA572A16FF19C1920B221B8DCC62FD24EB2B922CBF64BB9A3B
2,974,136 UART: [art] PUB.Y = 4F8F9D8414B3452B5B5B930EA2B583B29CD13961450A139C7F7388A51290D956E062833A95516A25D3AA78DD3C2C4592
2,981,074 UART: [art] SIG.R = CEB990EF581FD15CDD9C6C1F9054481B251048CFB2BC7FA2B5D9D962E81131B292BAAC1DCAD87BF674DA7723675B5CEE
2,987,866 UART: [art] SIG.S = C33830A5203E666E4FE351D0BDD197D8E1C7EFD4CE198E0DC3B2CB80CC94931F5B99B1072DAFD752DAECD0913307B2B9
3,011,738 UART: Caliptra RT
3,012,083 UART: [state] CFI Enabled
3,119,893 UART: [rt] RT listening for mailbox commands...
3,120,563 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,609 UART: [rt]cmd =0x4c444556, len=4
3,161,173 >>> mbox cmd response data (687 bytes)
3,161,174 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,359 UART: [rt]cmd =0x43455246, len=4
3,202,433 >>> mbox cmd response data (887 bytes)
3,202,434 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,851 UART: [rt]cmd =0x43455252, len=4
3,242,511 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,640,927 >>> mbox cmd response: success
2,703,611 UART:
2,703,627 UART: Running Caliptra FMC ...
2,704,035 UART:
2,704,178 UART: [state] CFI Enabled
2,715,047 UART: [fht] FMC Alias Private Key: 7
2,823,620 UART: [art] Extend RT PCRs Done
2,824,048 UART: [art] Lock RT PCRs Done
2,825,564 UART: [art] Populate DV Done
2,833,837 UART: [fht] FMC Alias Private Key: 7
2,834,779 UART: [art] Derive CDI
2,835,059 UART: [art] Store in in slot 0x4
2,921,130 UART: [art] Derive Key Pair
2,921,490 UART: [art] Store priv key in slot 0x5
2,934,924 UART: [art] Derive Key Pair - Done
2,950,038 UART: [art] Signing Cert with AUTHO
2,950,518 UART: RITY.KEYID = 7
2,965,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,541 UART: [art] PUB.X = DB9EF6CBC59B41ADD840FEB04C4118B113286D9F7CCBF6495608FC031A04DDC7B9F5FF768605E6C0B29503BEE801CECE
2,973,315 UART: [art] PUB.Y = 066DCB7EC07C99E852EE0E54795D8B1104469AEBEE5F32BE4AA6B82BC5A416383D4645D41299ED220F283D446C09599D
2,980,256 UART: [art] SIG.R = D43664F65CAFE9D7187E075DA542AD517E018AAB10DB523AC6DCB443FEBFDDA8CDFDF8B3EDFA8013EAAE21688F5F7AF9
2,987,054 UART: [art] SIG.S = 9349B4BC40ABD52BACBF224E4A65E9D15A13725D8CFC70269CEE553C2A83678639E0542615C907FED17622A1BDEA7C49
3,010,800 UART: Caliptra RT
3,011,145 UART: [state] CFI Enabled
3,120,067 UART: [rt] RT listening for mailbox commands...
3,120,737 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,729 UART: [rt]cmd =0x4c444556, len=4
3,161,303 >>> mbox cmd response data (687 bytes)
3,161,304 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,829 UART: [rt]cmd =0x43455246, len=4
3,203,073 >>> mbox cmd response data (887 bytes)
3,203,074 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,613 UART: [rt]cmd =0x43455252, len=4
3,243,347 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,549 >>> mbox cmd response: success
2,706,565 UART:
2,706,581 UART: Running Caliptra FMC ...
2,706,989 UART:
2,707,132 UART: [state] CFI Enabled
2,717,691 UART: [fht] FMC Alias Private Key: 7
2,825,834 UART: [art] Extend RT PCRs Done
2,826,262 UART: [art] Lock RT PCRs Done
2,827,918 UART: [art] Populate DV Done
2,836,061 UART: [fht] FMC Alias Private Key: 7
2,837,143 UART: [art] Derive CDI
2,837,423 UART: [art] Store in in slot 0x4
2,923,326 UART: [art] Derive Key Pair
2,923,686 UART: [art] Store priv key in slot 0x5
2,936,778 UART: [art] Derive Key Pair - Done
2,951,308 UART: [art] Signing Cert with AUTHO
2,951,788 UART: RITY.KEYID = 7
2,967,286 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,051 UART: [art] PUB.X = 4290E8F7B858B2AA819C370B37FE67965D2A26E0A914A28824F0A426DC8E7B06BC249D5835FD5A5C2D9EF51FF1EC2060
2,974,823 UART: [art] PUB.Y = 51E46AA2F4EC7CA80A8BF00F41E02D8636AB7A07C35E5EF11AF407CE1F5016F7D679B61223D628EDBA993C3B7473F607
2,981,770 UART: [art] SIG.R = 92A95512F903946B64F04DDBE5426373F19078470A398256210438261382D8A9327C400ABD1FB4078DF58C5C96DE181C
2,988,513 UART: [art] SIG.S = 08A65ED7B51F04817156A5E1AC56EE4EF0D7C80C0D5EFC35668D43FAD84785FEDE2E9252B4EDB0AD963A0C98DFAE9EA6
3,011,289 UART: Caliptra RT
3,011,634 UART: [state] CFI Enabled
3,119,613 UART: [rt] RT listening for mailbox commands...
3,120,283 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,927 UART: [rt]cmd =0x4c444556, len=4
3,160,337 >>> mbox cmd response data (687 bytes)
3,160,338 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,691 UART: [rt]cmd =0x43455246, len=4
3,201,897 >>> mbox cmd response data (887 bytes)
3,201,898 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,545 UART: [rt]cmd =0x43455252, len=4
3,242,524 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,057 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,387 >>> mbox cmd response: success
2,704,391 UART:
2,704,407 UART: Running Caliptra FMC ...
2,704,815 UART:
2,704,958 UART: [state] CFI Enabled
2,715,487 UART: [fht] FMC Alias Private Key: 7
2,823,374 UART: [art] Extend RT PCRs Done
2,823,802 UART: [art] Lock RT PCRs Done
2,825,178 UART: [art] Populate DV Done
2,833,431 UART: [fht] FMC Alias Private Key: 7
2,834,403 UART: [art] Derive CDI
2,834,683 UART: [art] Store in in slot 0x4
2,920,554 UART: [art] Derive Key Pair
2,920,914 UART: [art] Store priv key in slot 0x5
2,934,082 UART: [art] Derive Key Pair - Done
2,948,742 UART: [art] Signing Cert with AUTHO
2,949,222 UART: RITY.KEYID = 7
2,964,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,309 UART: [art] PUB.X = 985BAE8B425C6A494ACFA079F3F6F49F153A8633B2F15880F0350729DEFB8A074EF38467F4AFE819C9C7864BA6002057
2,972,055 UART: [art] PUB.Y = 6F8AF6AF43C607123A5333AAA825312E108AA3A8A21D8704639A394E7D06DE61E0E59CA16876B0DE624071578428AD15
2,978,994 UART: [art] SIG.R = 8EDE9EE9AC9F90A06383F3FF6CA72C99D98775D622E9A51EDAB5BCAEB42683657BDE8DAB3E8BC254C681BC2C373E7222
2,985,786 UART: [art] SIG.S = 967CC2462A6CA1B8AC18D56509CF28456D97606BB300B7E427A03AFBC9CCC655DFBE16193464FFD2319E66399AB2F6F6
3,009,564 UART: Caliptra RT
3,009,909 UART: [state] CFI Enabled
3,118,093 UART: [rt] RT listening for mailbox commands...
3,118,763 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,511 UART: [rt]cmd =0x4c444556, len=4
3,159,123 >>> mbox cmd response data (687 bytes)
3,159,124 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,541 UART: [rt]cmd =0x43455246, len=4
3,200,565 >>> mbox cmd response data (887 bytes)
3,200,566 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,963 UART: [rt]cmd =0x43455252, len=4
3,240,615 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 880.10s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,112 UART: [idev] CSR uploaded
1,300,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,326 UART: [idev] --
1,301,361 UART: [ldev] ++
1,301,529 UART: [ldev] CDI.KEYID = 6
1,301,893 UART: [ldev] SUBJECT.KEYID = 5
1,302,320 UART: [ldev] AUTHORITY.KEYID = 7
1,302,783 UART: [ldev] FE.KEYID = 1
1,308,161 UART: [ldev] Erasing FE.KEYID = 1
1,334,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,311 UART: [ldev] --
1,373,781 UART: [fwproc] Wait for Commands...
1,374,476 UART: [fwproc] Recv command 0x46574c44
1,375,209 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,761 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,769 >>> mbox cmd response: success
2,868,024 UART: [afmc] ++
2,868,192 UART: [afmc] CDI.KEYID = 6
2,868,555 UART: [afmc] SUBJECT.KEYID = 7
2,868,981 UART: [afmc] AUTHORITY.KEYID = 5
2,904,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,747 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,466 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,123 UART: [afmc] --
2,948,213 UART: [cold-reset] --
2,949,075 UART: [state] Locking Datavault
2,950,080 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,684 UART: [state] Locking ICCM
2,951,188 UART: [exit] Launching FMC @ 0x40000130
2,956,517 UART:
2,956,533 UART: Running Caliptra FMC ...
2,956,941 UART:
2,956,995 UART: [state] CFI Enabled
2,967,632 UART: [fht] FMC Alias Private Key: 7
3,075,673 UART: [art] Extend RT PCRs Done
3,076,101 UART: [art] Lock RT PCRs Done
3,077,739 UART: [art] Populate DV Done
3,086,164 UART: [fht] FMC Alias Private Key: 7
3,087,148 UART: [art] Derive CDI
3,087,428 UART: [art] Store in in slot 0x4
3,173,365 UART: [art] Derive Key Pair
3,173,725 UART: [art] Store priv key in slot 0x5
3,186,609 UART: [art] Derive Key Pair - Done
3,201,547 UART: [art] Signing Cert with AUTHO
3,202,027 UART: RITY.KEYID = 7
3,217,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,782 UART: [art] PUB.X = 23E99B479F591DCD47A3A01CBD6A6F677E589C6BCD04B3B97CE4F58F8754F561A4B82A866669C8F489BBC457E4DDD2A1
3,224,563 UART: [art] PUB.Y = FC14AB42CB4FAAF6712DDAEB2212EFCE642CD9017461606A99111065925075E69E82F797E532565D98C3BDC686D9A117
3,231,514 UART: [art] SIG.R = 746CCAE890E7DAF34F853CEC6308095442D1B3BFDDF1A09B706E3BFE9ED14EC6C70AD37AE16AA1232503BBAEE17B7FCF
3,238,300 UART: [art] SIG.S = 983B10A692372C9EFE5F90AE8B762DCA45BFD8EB84BC17BA05D2C9703AA3771ED9C3F157CBAF76A2A398FF3849759122
3,261,736 UART: Caliptra RT
3,261,989 UART: [state] CFI Enabled
3,370,280 UART: [rt] RT listening for mailbox commands...
3,370,950 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,042 UART: [rt]cmd =0x4c444556, len=4
3,411,536 >>> mbox cmd response data (687 bytes)
3,411,537 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,972 UART: [rt]cmd =0x43455246, len=4
3,453,054 >>> mbox cmd response data (887 bytes)
3,453,055 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,264 UART: [rt]cmd =0x43455252, len=4
3,493,149 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,508 UART: [kat] LMS
1,168,820 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,175 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,207,413 UART: [idev] CSR upload begun
1,209,192 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,795 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,503 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,388 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,094 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,523 UART: [idev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
1,297,020 UART: [idev] CSR uploaded
1,300,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,234 UART: [idev] --
1,301,337 UART: [ldev] ++
1,301,505 UART: [ldev] CDI.KEYID = 6
1,301,869 UART: [ldev] SUBJECT.KEYID = 5
1,302,296 UART: [ldev] AUTHORITY.KEYID = 7
1,302,759 UART: [ldev] FE.KEYID = 1
1,308,195 UART: [ldev] Erasing FE.KEYID = 1
1,335,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,637 UART: [ldev] --
1,374,045 UART: [fwproc] Wait for Commands...
1,374,662 UART: [fwproc] Recv command 0x46574c44
1,375,395 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,064 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,317 >>> mbox cmd response: success
2,867,494 UART: [afmc] ++
2,867,662 UART: [afmc] CDI.KEYID = 6
2,868,025 UART: [afmc] SUBJECT.KEYID = 7
2,868,451 UART: [afmc] AUTHORITY.KEYID = 5
2,904,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,967 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,579 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,298 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,899 UART: [afmc] --
2,946,949 UART: [cold-reset] --
2,947,889 UART: [state] Locking Datavault
2,949,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,738 UART: [state] Locking ICCM
2,950,228 UART: [exit] Launching FMC @ 0x40000130
2,955,557 UART:
2,955,573 UART: Running Caliptra FMC ...
2,955,981 UART:
2,956,035 UART: [state] CFI Enabled
2,966,424 UART: [fht] FMC Alias Private Key: 7
3,074,007 UART: [art] Extend RT PCRs Done
3,074,435 UART: [art] Lock RT PCRs Done
3,076,385 UART: [art] Populate DV Done
3,084,816 UART: [fht] FMC Alias Private Key: 7
3,085,948 UART: [art] Derive CDI
3,086,228 UART: [art] Store in in slot 0x4
3,172,083 UART: [art] Derive Key Pair
3,172,443 UART: [art] Store priv key in slot 0x5
3,184,859 UART: [art] Derive Key Pair - Done
3,199,740 UART: [art] Signing Cert with AUTHO
3,200,220 UART: RITY.KEYID = 7
3,215,302 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,067 UART: [art] PUB.X = 5808188E1BC1378F6687DD1A3AE4D00608BBBBC390D3676C1B829061D273FB2131D3F335D32210E64DC5DCE0AF0FF918
3,222,831 UART: [art] PUB.Y = AEECCBB677ABC4232FF00C75F402FDFD9113AF00C7B397E13B7DE16C823BC1882ADFE010F42C1832FC78CDA03D585130
3,229,773 UART: [art] SIG.R = 75CD85C2D3DB8F97A7376B3F48C116BD9D28377E9818E551A30F8F1C0A07656B50CC50926E8C55E0C6985840C7816FCF
3,236,536 UART: [art] SIG.S = C7AB0D3AB107550A106DA4BA828D7BACF56A847FECB8188A08F532947E55BAF6D779CBA036ED08F0F3C3055502B45FCD
3,260,030 UART: Caliptra RT
3,260,283 UART: [state] CFI Enabled
3,367,562 UART: [rt] RT listening for mailbox commands...
3,368,232 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,234 UART: [rt]cmd =0x4c444556, len=4
3,408,488 >>> mbox cmd response data (687 bytes)
3,408,489 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,774 UART: [rt]cmd =0x43455246, len=4
3,449,868 >>> mbox cmd response data (887 bytes)
3,449,869 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,312 UART: [rt]cmd =0x43455252, len=4
3,490,303 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 889.58s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,824,156 UART: [art] Lock RT PCRs Done
2,825,738 UART: [art] Populate DV Done
2,833,839 UART: [fht] FMC Alias Private Key: 7
2,834,785 UART: [art] Derive CDI
2,835,065 UART: [art] Store in in slot 0x4
2,920,766 UART: [art] Derive Key Pair
2,921,126 UART: [art] Store priv key in slot 0x5
2,934,248 UART: [art] Derive Key Pair - Done
2,948,932 UART: [art] Signing Cert with AUTHO
2,949,412 UART: RITY.KEYID = 7
2,964,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,387 UART: [art] PUB.X = E7E8C3EB9F9F2B023E707D76B402A04ED395BE3345C1872C66D50676D89C88A76F278A8C00257F6679CF270594052EAD
2,972,120 UART: [art] PUB.Y = 22704DF2F5658D9ABB043AC0BA0446719F15D8660D3B2F7765AF601C3B1C403CDD38309F1D356A55EC09DCBD5FEC762F
2,979,070 UART: [art] SIG.R = E334636D6479098E70775E86E5D7B1872C0269654EB561AFE376A044BEDD83FD7A8165C605AACC76278E4F20CAD021BF
2,985,835 UART: [art] SIG.S = CE60E8D6E8BA6003F48B30C6B0D7086DE61D10CD8789BABF78CBC595DEA97499E992F3BFF0F57BFD76C47BD558B250DE
3,009,430 UART: Caliptra RT
3,009,683 UART: [state] CFI Enabled
3,115,971 UART: [rt] RT listening for mailbox commands...
3,116,641 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,009 UART: [rt]cmd =0x4c444556, len=4
3,156,433 >>> mbox cmd response data (687 bytes)
3,156,434 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,901 UART: [rt]cmd =0x43455246, len=4
3,198,051 >>> mbox cmd response data (887 bytes)
3,198,052 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,597 UART: [rt]cmd =0x43455252, len=4
3,238,525 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,582 >>> mbox cmd response: success
2,705,128 UART:
2,705,144 UART: Running Caliptra FMC ...
2,705,552 UART:
2,705,606 UART: [state] CFI Enabled
2,716,213 UART: [fht] FMC Alias Private Key: 7
2,823,980 UART: [art] Extend RT PCRs Done
2,824,408 UART: [art] Lock RT PCRs Done
2,825,956 UART: [art] Populate DV Done
2,834,177 UART: [fht] FMC Alias Private Key: 7
2,835,255 UART: [art] Derive CDI
2,835,535 UART: [art] Store in in slot 0x4
2,921,276 UART: [art] Derive Key Pair
2,921,636 UART: [art] Store priv key in slot 0x5
2,935,192 UART: [art] Derive Key Pair - Done
2,950,036 UART: [art] Signing Cert with AUTHO
2,950,516 UART: RITY.KEYID = 7
2,965,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,159 UART: [art] PUB.X = 18EB71F99FB1FBBE69969742DAC64EAFF201DC00C23FF6EE8B6178053E23F1608234CB940732D066C7C103ABFC79D7B6
2,972,907 UART: [art] PUB.Y = A19DA41F2AF5EC0D8FF15753DC91BEB3556D499E7CA8B0E1CDFB2E1EA48665A6EC066B3D780D4DFA96448235C1458BBF
2,979,870 UART: [art] SIG.R = C7327EB637E97AC14A4FBD2889171A7942D8A32971E238F0299A56F7A01EF19CF5249C766C3F6345E1A138AA95523B90
2,986,638 UART: [art] SIG.S = B0DA88EBA6D154D21BF1C9D3A517CBB2BA2544F9369BF2995996566D6E8F909C45B9120DAC289003AB449ED16DCBBC51
3,010,807 UART: Caliptra RT
3,011,060 UART: [state] CFI Enabled
3,119,312 UART: [rt] RT listening for mailbox commands...
3,119,982 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,866 UART: [rt]cmd =0x4c444556, len=4
3,160,390 >>> mbox cmd response data (687 bytes)
3,160,391 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,500 UART: [rt]cmd =0x43455246, len=4
3,201,568 >>> mbox cmd response data (887 bytes)
3,201,569 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,832 UART: [rt]cmd =0x43455252, len=4
3,241,796 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,639,296 >>> mbox cmd response: success
2,701,808 UART:
2,701,824 UART: Running Caliptra FMC ...
2,702,232 UART:
2,702,286 UART: [state] CFI Enabled
2,712,803 UART: [fht] FMC Alias Private Key: 7
2,820,614 UART: [art] Extend RT PCRs Done
2,821,042 UART: [art] Lock RT PCRs Done
2,822,528 UART: [art] Populate DV Done
2,830,747 UART: [fht] FMC Alias Private Key: 7
2,831,813 UART: [art] Derive CDI
2,832,093 UART: [art] Store in in slot 0x4
2,918,018 UART: [art] Derive Key Pair
2,918,378 UART: [art] Store priv key in slot 0x5
2,931,252 UART: [art] Derive Key Pair - Done
2,945,911 UART: [art] Signing Cert with AUTHO
2,946,391 UART: RITY.KEYID = 7
2,961,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,374 UART: [art] PUB.X = A477DBD275AF8F9989BEF6BEA97925F01AD7DF7E0F5C9B5DA38B8D1DE67214A13DD92B47ADECD933DF78C5E31E43BBE2
2,969,169 UART: [art] PUB.Y = 75F76E0071E7004E8A8527E145ABEB31F494709ECFCE26980F83E359DBF134489609151268AE761D561943815A54BBA6
2,976,063 UART: [art] SIG.R = FC139CDF88E29608BF6680E855FB834A99664662C9D6033B158698AF314027E694939253AAF762727806AB04FDB9C948
2,982,813 UART: [art] SIG.S = 08CACA75DAA1B42C5C1BDC22B6BDCDD92E9E312163FFC4184E73EFDAB0C5DC5C632711C3C8016327D398445A5CDC33C5
3,006,938 UART: Caliptra RT
3,007,191 UART: [state] CFI Enabled
3,114,870 UART: [rt] RT listening for mailbox commands...
3,115,540 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,474 UART: [rt]cmd =0x4c444556, len=4
3,155,960 >>> mbox cmd response data (687 bytes)
3,155,961 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,282 UART: [rt]cmd =0x43455246, len=4
3,197,452 >>> mbox cmd response data (887 bytes)
3,197,453 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,614 UART: [rt]cmd =0x43455252, len=4
3,237,459 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,004 >>> mbox cmd response: success
2,704,874 UART:
2,704,890 UART: Running Caliptra FMC ...
2,705,298 UART:
2,705,352 UART: [state] CFI Enabled
2,715,537 UART: [fht] FMC Alias Private Key: 7
2,823,520 UART: [art] Extend RT PCRs Done
2,823,948 UART: [art] Lock RT PCRs Done
2,825,704 UART: [art] Populate DV Done
2,833,915 UART: [fht] FMC Alias Private Key: 7
2,834,987 UART: [art] Derive CDI
2,835,267 UART: [art] Store in in slot 0x4
2,921,002 UART: [art] Derive Key Pair
2,921,362 UART: [art] Store priv key in slot 0x5
2,935,118 UART: [art] Derive Key Pair - Done
2,949,635 UART: [art] Signing Cert with AUTHO
2,950,115 UART: RITY.KEYID = 7
2,965,041 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,806 UART: [art] PUB.X = 728B55959E9186CB1F2E1903F2C84BD4D6C534F882FF8696BC228298F2CB1F480AC61588E78B42181D1DE06AFEFB75F3
2,972,576 UART: [art] PUB.Y = DA4894FE491293F8E2D83834E3587B79535F980730745606B7A37811B3599BE14FDB80BEAA909A8A36B563F278162096
2,979,510 UART: [art] SIG.R = 347C7C7C2A81153FE6172B72506B635E1E12ABA039A720E8B9881AC44B6BFBE6CB488C3FE757242B4FE0AC709BE3C32C
2,986,292 UART: [art] SIG.S = B1324F303F392456177D751E16FC834B674275C5873D5A9BAB1D736D57AA32E2E56A455CC52301DE2F9C6BB509719A3F
3,009,513 UART: Caliptra RT
3,009,766 UART: [state] CFI Enabled
3,117,965 UART: [rt] RT listening for mailbox commands...
3,118,635 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,539 UART: [rt]cmd =0x4c444556, len=4
3,159,125 >>> mbox cmd response data (687 bytes)
3,159,126 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,409 UART: [rt]cmd =0x43455246, len=4
3,200,517 >>> mbox cmd response data (887 bytes)
3,200,518 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,149 UART: [rt]cmd =0x43455252, len=4
3,240,930 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,252 >>> mbox cmd response: success
2,705,122 UART:
2,705,138 UART: Running Caliptra FMC ...
2,705,546 UART:
2,705,600 UART: [state] CFI Enabled
2,716,115 UART: [fht] FMC Alias Private Key: 7
2,824,290 UART: [art] Extend RT PCRs Done
2,824,718 UART: [art] Lock RT PCRs Done
2,826,368 UART: [art] Populate DV Done
2,834,739 UART: [fht] FMC Alias Private Key: 7
2,835,689 UART: [art] Derive CDI
2,835,969 UART: [art] Store in in slot 0x4
2,921,910 UART: [art] Derive Key Pair
2,922,270 UART: [art] Store priv key in slot 0x5
2,935,258 UART: [art] Derive Key Pair - Done
2,949,953 UART: [art] Signing Cert with AUTHO
2,950,433 UART: RITY.KEYID = 7
2,965,687 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,452 UART: [art] PUB.X = 4F80C23A7F4A63AC5E239228DDBA3416D1EB0172C66BBC987747D87589093C7BC723EC56BC3231941409718728BAA3FC
2,973,215 UART: [art] PUB.Y = 1FBD60590A2D6E50C3E0C6B53CF3FD2EE5D32C23885D02BE1A85672C2532C77472967EBE405880B5F0762C7A860D9A99
2,980,160 UART: [art] SIG.R = 42A1C3CE90F6E51BEFA6A1CD88358CFE4738709383E3C5231FC50FDE94115FC5E361EE302D18DE7C3E2B5D8FC557BD4B
2,986,945 UART: [art] SIG.S = 2B8D3238760B55F3DD2DFFEC194ADD83B563460623E2BA8D2EBC0D2D0CA1382C49D5A9B9ADD5D573A1FACE5D1F66930C
3,010,925 UART: Caliptra RT
3,011,178 UART: [state] CFI Enabled
3,118,917 UART: [rt] RT listening for mailbox commands...
3,119,587 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,341 UART: [rt]cmd =0x4c444556, len=4
3,159,765 >>> mbox cmd response data (687 bytes)
3,159,766 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,007 UART: [rt]cmd =0x43455246, len=4
3,201,173 >>> mbox cmd response data (887 bytes)
3,201,174 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,733 UART: [rt]cmd =0x43455252, len=4
3,241,784 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 856.93s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,831 UART: [idev] CSR uploaded
1,300,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,301,045 UART: [idev] --
1,302,072 UART: [ldev] ++
1,302,240 UART: [ldev] CDI.KEYID = 6
1,302,604 UART: [ldev] SUBJECT.KEYID = 5
1,303,031 UART: [ldev] AUTHORITY.KEYID = 7
1,303,494 UART: [ldev] FE.KEYID = 1
1,308,544 UART: [ldev] Erasing FE.KEYID = 1
1,334,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,170 UART: [ldev] --
1,374,634 UART: [fwproc] Wait for Commands...
1,375,417 UART: [fwproc] Recv command 0x46574c44
1,376,150 UART: [fwproc] Recv'd Img size: 114448 bytes
2,675,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,942 >>> mbox cmd response: success
2,868,085 UART: [afmc] ++
2,868,253 UART: [afmc] CDI.KEYID = 6
2,868,616 UART: [afmc] SUBJECT.KEYID = 7
2,869,042 UART: [afmc] AUTHORITY.KEYID = 5
2,903,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,990 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,709 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,384 UART: [afmc] --
2,947,332 UART: [cold-reset] --
2,948,300 UART: [state] Locking Datavault
2,949,855 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,459 UART: [state] Locking ICCM
2,951,079 UART: [exit] Launching FMC @ 0x40000130
2,956,408 UART:
2,956,424 UART: Running Caliptra FMC ...
2,956,832 UART:
2,956,975 UART: [state] CFI Enabled
2,967,644 UART: [fht] FMC Alias Private Key: 7
3,076,003 UART: [art] Extend RT PCRs Done
3,076,431 UART: [art] Lock RT PCRs Done
3,078,093 UART: [art] Populate DV Done
3,086,332 UART: [fht] FMC Alias Private Key: 7
3,087,264 UART: [art] Derive CDI
3,087,544 UART: [art] Store in in slot 0x4
3,173,189 UART: [art] Derive Key Pair
3,173,549 UART: [art] Store priv key in slot 0x5
3,186,833 UART: [art] Derive Key Pair - Done
3,201,783 UART: [art] Signing Cert with AUTHO
3,202,263 UART: RITY.KEYID = 7
3,217,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,308 UART: [art] PUB.X = 114B950E85E7C712A3514486A1830D837CC11ABD30184E74AB1C2A74F91397B80F6F85CC39CECDCC0A7F68B182B81F29
3,225,072 UART: [art] PUB.Y = 26EC71D2EC187D21EF3AEB6603D2957CBC2774A881D4E781DB3A4162008E888CAEEE080C98D09127BCE1DBFC3E4A069C
3,232,004 UART: [art] SIG.R = 375D644E8A3263567E53A6D45ACACA1EB8714CF26C6C2AB57ABB66E81B75F7D6D35B6C4D28BBB530BB9E7F3945BB45BB
3,238,794 UART: [art] SIG.S = 0DB24ADB404DE0D1C40167DBECA2E5F404FF4922EE51123DAD72773DCF6C144A9A44F743A2AC98EC127A05C7DAE9602A
3,262,051 UART: Caliptra RT
3,262,396 UART: [state] CFI Enabled
3,369,605 UART: [rt] RT listening for mailbox commands...
3,370,275 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,979 UART: [rt]cmd =0x4c444556, len=4
3,410,449 >>> mbox cmd response data (687 bytes)
3,410,450 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,919 UART: [rt]cmd =0x43455246, len=4
3,451,925 >>> mbox cmd response data (887 bytes)
3,451,926 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,357 UART: [rt]cmd =0x43455252, len=4
3,492,276 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
891,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,730 UART: [kat] ++
895,882 UART: [kat] sha1
900,110 UART: [kat] SHA2-256
902,050 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,146 UART: [idev] ++
1,173,314 UART: [idev] CDI.KEYID = 6
1,173,675 UART: [idev] SUBJECT.KEYID = 7
1,174,100 UART: [idev] UDS.KEYID = 0
1,181,930 UART: [idev] Erasing UDS.KEYID = 0
1,199,544 UART: [idev] Sha1 KeyId Algorithm
1,207,696 UART: [idev] CSR upload begun
1,209,475 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,758 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,466 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,351 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,057 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,486 UART: [idev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
1,297,983 UART: [idev] CSR uploaded
1,301,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,301,197 UART: [idev] --
1,302,216 UART: [ldev] ++
1,302,384 UART: [ldev] CDI.KEYID = 6
1,302,748 UART: [ldev] SUBJECT.KEYID = 5
1,303,175 UART: [ldev] AUTHORITY.KEYID = 7
1,303,638 UART: [ldev] FE.KEYID = 1
1,309,056 UART: [ldev] Erasing FE.KEYID = 1
1,335,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,482 UART: [ldev] --
1,374,766 UART: [fwproc] Wait for Commands...
1,375,365 UART: [fwproc] Recv command 0x46574c44
1,376,098 UART: [fwproc] Recv'd Img size: 114448 bytes
2,675,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,038 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,120 >>> mbox cmd response: success
2,868,199 UART: [afmc] ++
2,868,367 UART: [afmc] CDI.KEYID = 6
2,868,730 UART: [afmc] SUBJECT.KEYID = 7
2,869,156 UART: [afmc] AUTHORITY.KEYID = 5
2,905,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,928,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,934,290 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,940,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,918 UART: [afmc] --
2,948,896 UART: [cold-reset] --
2,949,824 UART: [state] Locking Datavault
2,950,901 UART: [state] Locking PCR0, PCR1 and PCR31
2,951,505 UART: [state] Locking ICCM
2,952,113 UART: [exit] Launching FMC @ 0x40000130
2,957,442 UART:
2,957,458 UART: Running Caliptra FMC ...
2,957,866 UART:
2,958,009 UART: [state] CFI Enabled
2,968,468 UART: [fht] FMC Alias Private Key: 7
3,076,381 UART: [art] Extend RT PCRs Done
3,076,809 UART: [art] Lock RT PCRs Done
3,078,113 UART: [art] Populate DV Done
3,086,426 UART: [fht] FMC Alias Private Key: 7
3,087,554 UART: [art] Derive CDI
3,087,834 UART: [art] Store in in slot 0x4
3,173,639 UART: [art] Derive Key Pair
3,173,999 UART: [art] Store priv key in slot 0x5
3,187,685 UART: [art] Derive Key Pair - Done
3,202,269 UART: [art] Signing Cert with AUTHO
3,202,749 UART: RITY.KEYID = 7
3,218,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,219,004 UART: [art] PUB.X = 0D3A8814A9904FE24EB8E134B94D782ED6509CAB74ADE4E2804EA246239777D63DFB8F1F1AC50EF75406A5C0CCEA970E
3,225,776 UART: [art] PUB.Y = 1FAE0D4F3C93FCDC58BEC5756D4E30F62AE660752D5B10622E4CB61C492E2BC3CB63530430B9B51A530F3F2372C63E2F
3,232,729 UART: [art] SIG.R = 13FC26DB602A012FEAEA710235BB4BB013A78F7FFB617C893C0C1DEACF958E27DD642A23E73A55C42A489E0EC66CA54A
3,239,507 UART: [art] SIG.S = 10B3D66BA5DC3A8C197D50A4F77803D8DFCEFF65FA1C590C8C8877AC54DCEC24ABA4AF0EF49784DDA537410F4B2BF395
3,263,398 UART: Caliptra RT
3,263,743 UART: [state] CFI Enabled
3,372,180 UART: [rt] RT listening for mailbox commands...
3,372,850 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,468 UART: [rt]cmd =0x4c444556, len=4
3,413,066 >>> mbox cmd response data (687 bytes)
3,413,067 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,378 UART: [rt]cmd =0x43455246, len=4
3,454,320 >>> mbox cmd response data (887 bytes)
3,454,321 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,658 UART: [rt]cmd =0x43455252, len=4
3,494,531 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 890.32s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,826,358 UART: [art] Lock RT PCRs Done
2,828,230 UART: [art] Populate DV Done
2,836,261 UART: [fht] FMC Alias Private Key: 7
2,837,275 UART: [art] Derive CDI
2,837,555 UART: [art] Store in in slot 0x4
2,922,964 UART: [art] Derive Key Pair
2,923,324 UART: [art] Store priv key in slot 0x5
2,936,598 UART: [art] Derive Key Pair - Done
2,951,521 UART: [art] Signing Cert with AUTHO
2,952,001 UART: RITY.KEYID = 7
2,967,319 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,084 UART: [art] PUB.X = 0220FD4C22194C43E23266DEA9F01370FB0E9391D31F953AA0FBF83423036970E8851241176B48A26BDA33408BD3C8D2
2,974,841 UART: [art] PUB.Y = C6F1B4E103FF383AD6F639B4C05F142517DF174C1E72BD133CCA3F9269FFB0E38A54D8FC21F94C4DE2B0DF416B314222
2,981,802 UART: [art] SIG.R = E1B59BF6F99754E87EBAC90B94EDB61DF716080A145707D712BE0CA358764FE022FE3086A74CBD601AC8415F8485D73B
2,988,565 UART: [art] SIG.S = 06C0022169B301300ABD04589E1D0B6E8C23FF3F796D4926FE19E869683071D424A38E133F533C592DFD08CBEA5C1818
3,013,205 UART: Caliptra RT
3,013,550 UART: [state] CFI Enabled
3,121,095 UART: [rt] RT listening for mailbox commands...
3,121,765 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,847 UART: [rt]cmd =0x4c444556, len=4
3,162,111 >>> mbox cmd response data (687 bytes)
3,162,112 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,581 UART: [rt]cmd =0x43455246, len=4
3,203,701 >>> mbox cmd response data (887 bytes)
3,203,702 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,061 UART: [rt]cmd =0x43455252, len=4
3,243,960 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,815 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,501 >>> mbox cmd response: success
2,704,937 UART:
2,704,953 UART: Running Caliptra FMC ...
2,705,361 UART:
2,705,504 UART: [state] CFI Enabled
2,716,477 UART: [fht] FMC Alias Private Key: 7
2,824,932 UART: [art] Extend RT PCRs Done
2,825,360 UART: [art] Lock RT PCRs Done
2,826,806 UART: [art] Populate DV Done
2,834,983 UART: [fht] FMC Alias Private Key: 7
2,836,097 UART: [art] Derive CDI
2,836,377 UART: [art] Store in in slot 0x4
2,922,232 UART: [art] Derive Key Pair
2,922,592 UART: [art] Store priv key in slot 0x5
2,935,948 UART: [art] Derive Key Pair - Done
2,950,530 UART: [art] Signing Cert with AUTHO
2,951,010 UART: RITY.KEYID = 7
2,966,210 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,975 UART: [art] PUB.X = 448FD88B62E97276312969A2B3EFDE8846A2309E900D401B62ACA68E6592BCA269EB07C67EDB3B395F49A69351E31C64
2,973,741 UART: [art] PUB.Y = 1D5DA1690B0E5E347BC3FDDE6FC36B6C227CABE689B335015740DFC73A1234174B8224846B0C6797F804EC512B60C970
2,980,680 UART: [art] SIG.R = 3A35306A589F52655C278188662450AC1FA55D0404C5360F14AF27A0805D9A9F769030298B518B3D1CC50C3544DF51FC
2,987,430 UART: [art] SIG.S = 49D210C30EBADE0B2312F1466C4C74CDF0EB4CCD0C2CDCED3A62BF845E563E7E886FB077DB2BAE60F4313E329393313B
3,011,218 UART: Caliptra RT
3,011,563 UART: [state] CFI Enabled
3,120,174 UART: [rt] RT listening for mailbox commands...
3,120,844 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,648 UART: [rt]cmd =0x4c444556, len=4
3,161,236 >>> mbox cmd response data (687 bytes)
3,161,237 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,628 UART: [rt]cmd =0x43455246, len=4
3,202,742 >>> mbox cmd response data (887 bytes)
3,202,743 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,196 UART: [rt]cmd =0x43455252, len=4
3,242,941 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,901 >>> mbox cmd response: success
2,705,939 UART:
2,705,955 UART: Running Caliptra FMC ...
2,706,363 UART:
2,706,506 UART: [state] CFI Enabled
2,717,359 UART: [fht] FMC Alias Private Key: 7
2,825,156 UART: [art] Extend RT PCRs Done
2,825,584 UART: [art] Lock RT PCRs Done
2,826,898 UART: [art] Populate DV Done
2,834,761 UART: [fht] FMC Alias Private Key: 7
2,835,839 UART: [art] Derive CDI
2,836,119 UART: [art] Store in in slot 0x4
2,921,656 UART: [art] Derive Key Pair
2,922,016 UART: [art] Store priv key in slot 0x5
2,935,368 UART: [art] Derive Key Pair - Done
2,949,598 UART: [art] Signing Cert with AUTHO
2,950,078 UART: RITY.KEYID = 7
2,965,706 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,471 UART: [art] PUB.X = 2AEAFA4E905ACA4B143537928ABE02A2CBF7AE7D16FB0DB6063872327BC4568F555BE440E5487F70F2F79356629FFAFA
2,973,246 UART: [art] PUB.Y = 43B5FA458B5D5353A99F01F9CF3FF4CDEEFD95FA8016FEB1AE0B16C4A8A8F663830A41D55D9A6AD49B966B80159F2D11
2,980,205 UART: [art] SIG.R = 886F811AD0AD64AD96AC17212E59D12F6F2E439B6FD06DDD2C43ECCDE37F63D227C89C5B68702A216FEB82967EEA1522
2,986,989 UART: [art] SIG.S = 52E875BE0F6FDE93BF4A36E0C9520C7B30A5797E88526281349D29CEB0694ADD8166198FFD22E2AAB3BE58235D40E2F4
3,010,728 UART: Caliptra RT
3,011,073 UART: [state] CFI Enabled
3,118,646 UART: [rt] RT listening for mailbox commands...
3,119,316 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,128 UART: [rt]cmd =0x4c444556, len=4
3,159,408 >>> mbox cmd response data (687 bytes)
3,159,409 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,002 UART: [rt]cmd =0x43455246, len=4
3,201,112 >>> mbox cmd response data (887 bytes)
3,201,113 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,560 UART: [rt]cmd =0x43455252, len=4
3,241,207 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,640,209 >>> mbox cmd response: success
2,701,863 UART:
2,701,879 UART: Running Caliptra FMC ...
2,702,287 UART:
2,702,430 UART: [state] CFI Enabled
2,713,067 UART: [fht] FMC Alias Private Key: 7
2,821,784 UART: [art] Extend RT PCRs Done
2,822,212 UART: [art] Lock RT PCRs Done
2,824,026 UART: [art] Populate DV Done
2,831,983 UART: [fht] FMC Alias Private Key: 7
2,833,131 UART: [art] Derive CDI
2,833,411 UART: [art] Store in in slot 0x4
2,919,034 UART: [art] Derive Key Pair
2,919,394 UART: [art] Store priv key in slot 0x5
2,932,902 UART: [art] Derive Key Pair - Done
2,947,616 UART: [art] Signing Cert with AUTHO
2,948,096 UART: RITY.KEYID = 7
2,963,444 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,209 UART: [art] PUB.X = 7AB20215CFF7CCD010D7B32CAEB86AF57C02362552CD0685327C1EDFE64F988F7316B1ABF5F959F5F40BBA6FA1C02047
2,970,983 UART: [art] PUB.Y = 192BB4A12463210EC1269890D8C6EB785E52FB3C3A98E7029447FCB98B00F709CBB7A17E252F88272A4CA9DFD745B649
2,977,906 UART: [art] SIG.R = DC16E631768A6ED83C913B81A9322DE14759F1BDF57248717B14E560C4E8A32845DB9B002FDD6139E3C29B18CEA8E328
2,984,658 UART: [art] SIG.S = 74D521B9650ABD5FDE96E713829C1A56CED3D0F67EC2BC9DBA5DBF17B88DAC107B8F48641DCB1BB90E564F9D1B5086B6
3,009,361 UART: Caliptra RT
3,009,706 UART: [state] CFI Enabled
3,117,099 UART: [rt] RT listening for mailbox commands...
3,117,769 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,549 UART: [rt]cmd =0x4c444556, len=4
3,158,069 >>> mbox cmd response data (687 bytes)
3,158,070 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,333 UART: [rt]cmd =0x43455246, len=4
3,199,359 >>> mbox cmd response data (887 bytes)
3,199,360 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,503 UART: [rt]cmd =0x43455252, len=4
3,239,442 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,371 >>> mbox cmd response: success
2,703,825 UART:
2,703,841 UART: Running Caliptra FMC ...
2,704,249 UART:
2,704,392 UART: [state] CFI Enabled
2,714,665 UART: [fht] FMC Alias Private Key: 7
2,822,824 UART: [art] Extend RT PCRs Done
2,823,252 UART: [art] Lock RT PCRs Done
2,825,006 UART: [art] Populate DV Done
2,833,179 UART: [fht] FMC Alias Private Key: 7
2,834,325 UART: [art] Derive CDI
2,834,605 UART: [art] Store in in slot 0x4
2,920,476 UART: [art] Derive Key Pair
2,920,836 UART: [art] Store priv key in slot 0x5
2,934,106 UART: [art] Derive Key Pair - Done
2,948,644 UART: [art] Signing Cert with AUTHO
2,949,124 UART: RITY.KEYID = 7
2,964,556 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,321 UART: [art] PUB.X = 4D3B4848BAA17E0B439F82FB9EDDD43D07847273BF03C4C55C74CDB0AD857DE4A1C4508573F1BF216750BE160DF40E2F
2,972,090 UART: [art] PUB.Y = EF13BC5BDEBDF4623CB36D297251DC8153923709069492C887D64EF915F15F8CD2452A03DBF95CB17C7F9BB77C3C0114
2,979,036 UART: [art] SIG.R = 4A45CE5CE7E705A3006EFEEFC962CD0DD34AB9FA7C343BA447BAD3B56B86D3AAD86DF4EBC2C2B0FBEBD8C1E219A9E7B7
2,985,816 UART: [art] SIG.S = 0CD287F19FDC6341D7EB2BA2FFE86855BD52434D8B698C81E826622C1CF9AB6B104E8650EFB91541822F81A1F83EEB0A
3,009,607 UART: Caliptra RT
3,009,952 UART: [state] CFI Enabled
3,118,425 UART: [rt] RT listening for mailbox commands...
3,119,095 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,793 UART: [rt]cmd =0x4c444556, len=4
3,159,347 >>> mbox cmd response data (687 bytes)
3,159,348 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,679 UART: [rt]cmd =0x43455246, len=4
3,200,829 >>> mbox cmd response data (887 bytes)
3,200,830 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,273 UART: [rt]cmd =0x43455252, len=4
3,240,952 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 854.58s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,518 UART: [idev] CSR uploaded
1,300,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,732 UART: [idev] --
1,301,843 UART: [ldev] ++
1,302,011 UART: [ldev] CDI.KEYID = 6
1,302,375 UART: [ldev] SUBJECT.KEYID = 5
1,302,802 UART: [ldev] AUTHORITY.KEYID = 7
1,303,265 UART: [ldev] FE.KEYID = 1
1,308,479 UART: [ldev] Erasing FE.KEYID = 1
1,334,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,051 UART: [ldev] --
1,374,333 UART: [fwproc] Wait for Commands...
1,375,020 UART: [fwproc] Recv command 0x46574c44
1,375,753 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,702,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,467 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,371 >>> mbox cmd response: success
2,868,490 UART: [afmc] ++
2,868,658 UART: [afmc] CDI.KEYID = 6
2,869,021 UART: [afmc] SUBJECT.KEYID = 7
2,869,447 UART: [afmc] AUTHORITY.KEYID = 5
2,904,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,505 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,234 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,117 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,836 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,595 UART: [afmc] --
2,947,497 UART: [cold-reset] --
2,948,613 UART: [state] Locking Datavault
2,949,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,542 UART: [state] Locking ICCM
2,951,114 UART: [exit] Launching FMC @ 0x40000130
2,956,443 UART:
2,956,459 UART: Running Caliptra FMC ...
2,956,867 UART:
2,956,921 UART: [state] CFI Enabled
2,967,058 UART: [fht] FMC Alias Private Key: 7
3,074,355 UART: [art] Extend RT PCRs Done
3,074,783 UART: [art] Lock RT PCRs Done
3,076,401 UART: [art] Populate DV Done
3,084,668 UART: [fht] FMC Alias Private Key: 7
3,085,822 UART: [art] Derive CDI
3,086,102 UART: [art] Store in in slot 0x4
3,171,853 UART: [art] Derive Key Pair
3,172,213 UART: [art] Store priv key in slot 0x5
3,185,577 UART: [art] Derive Key Pair - Done
3,200,460 UART: [art] Signing Cert with AUTHO
3,200,940 UART: RITY.KEYID = 7
3,216,342 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,107 UART: [art] PUB.X = 09B80A8944A5F4F32FD95AF247B2D78873883A66B14BE6B97368233DAC3221D7AC0CA10E496B698D48D481660CE183CC
3,223,864 UART: [art] PUB.Y = E13F0508379675B0639A22236919B5FB00C1015A61B49B7FDB23A70AFB9B5EC5916C0CD464BC7A00DDCF21B1101D5796
3,230,759 UART: [art] SIG.R = 749159683FB06E64F5340D2925A85D6F14F747A94159BA6D0924993BEAF17AF45CB30B5148479EF9C217C4156E649D0F
3,237,513 UART: [art] SIG.S = 404ED0C2CF1F1758F43528B625C1F29ED89B4DE794B614A805B68A565617A648DEEB017A6CA178919DC146F7C6CBD49F
3,261,108 UART: Caliptra RT
3,261,361 UART: [state] CFI Enabled
3,369,430 UART: [rt] RT listening for mailbox commands...
3,370,100 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,186 UART: [rt]cmd =0x4c444556, len=4
3,410,648 >>> mbox cmd response data (687 bytes)
3,410,649 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,940 UART: [rt]cmd =0x43455246, len=4
3,452,020 >>> mbox cmd response data (887 bytes)
3,452,021 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,362 UART: [rt]cmd =0x43455252, len=4
3,492,199 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,101 UART: [kat] ++
895,253 UART: [kat] sha1
899,445 UART: [kat] SHA2-256
901,385 UART: [kat] SHA2-384
904,066 UART: [kat] SHA2-512-ACC
905,967 UART: [kat] ECC-384
915,930 UART: [kat] HMAC-384Kdf
920,484 UART: [kat] LMS
1,168,796 UART: [kat] --
1,169,637 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,181,173 UART: [idev] Erasing UDS.KEYID = 0
1,197,999 UART: [idev] Sha1 KeyId Algorithm
1,206,407 UART: [idev] CSR upload begun
1,208,186 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,153 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,861 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,746 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,452 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,881 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,378 UART: [idev] CSR uploaded
1,299,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,299,592 UART: [idev] --
1,300,569 UART: [ldev] ++
1,300,737 UART: [ldev] CDI.KEYID = 6
1,301,101 UART: [ldev] SUBJECT.KEYID = 5
1,301,528 UART: [ldev] AUTHORITY.KEYID = 7
1,301,991 UART: [ldev] FE.KEYID = 1
1,307,125 UART: [ldev] Erasing FE.KEYID = 1
1,332,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,641 UART: [ldev] --
1,372,091 UART: [fwproc] Wait for Commands...
1,372,888 UART: [fwproc] Recv command 0x46574c44
1,373,621 UART: [fwproc] Recv'd Img size: 114448 bytes
2,672,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,864,529 >>> mbox cmd response: success
2,865,758 UART: [afmc] ++
2,865,926 UART: [afmc] CDI.KEYID = 6
2,866,289 UART: [afmc] SUBJECT.KEYID = 7
2,866,715 UART: [afmc] AUTHORITY.KEYID = 5
2,902,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,312 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,195 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,914 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,849 UART: [afmc] --
2,945,737 UART: [cold-reset] --
2,946,691 UART: [state] Locking Datavault
2,947,898 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,502 UART: [state] Locking ICCM
2,948,938 UART: [exit] Launching FMC @ 0x40000130
2,954,267 UART:
2,954,283 UART: Running Caliptra FMC ...
2,954,691 UART:
2,954,745 UART: [state] CFI Enabled
2,965,242 UART: [fht] FMC Alias Private Key: 7
3,073,721 UART: [art] Extend RT PCRs Done
3,074,149 UART: [art] Lock RT PCRs Done
3,075,459 UART: [art] Populate DV Done
3,083,762 UART: [fht] FMC Alias Private Key: 7
3,084,766 UART: [art] Derive CDI
3,085,046 UART: [art] Store in in slot 0x4
3,170,953 UART: [art] Derive Key Pair
3,171,313 UART: [art] Store priv key in slot 0x5
3,184,811 UART: [art] Derive Key Pair - Done
3,199,580 UART: [art] Signing Cert with AUTHO
3,200,060 UART: RITY.KEYID = 7
3,215,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,653 UART: [art] PUB.X = 530439633DAE795DA472C5A113979822E6C1C7B34C73E3C0302138CA4347EB38B7156D7FA5D9D9C9C843309CBEB2AF30
3,223,422 UART: [art] PUB.Y = CA330EEDEAE4045D09A26B4509B514DAF416C7D6969CC69E62C6BC99F91EDA41452EF9098A8B6F1986742EE3AC861217
3,230,367 UART: [art] SIG.R = A3C2945945FAB3676B509C857D1A34178497140CA0332FCCE807B4636C4C534CBE61374D4AB40171D9065EFBDA9E3363
3,237,125 UART: [art] SIG.S = CF294A027252D6A66C262351F9F4ECCDF84F33F21A4D615DB0B9565EB1F9953B832413169734CB05F62B0D4A0A0F89C0
3,260,817 UART: Caliptra RT
3,261,070 UART: [state] CFI Enabled
3,368,938 UART: [rt] RT listening for mailbox commands...
3,369,608 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,686 UART: [rt]cmd =0x4c444556, len=4
3,410,120 >>> mbox cmd response data (687 bytes)
3,410,121 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,378 UART: [rt]cmd =0x43455246, len=4
3,451,528 >>> mbox cmd response data (887 bytes)
3,451,529 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,480,728 UART: [rt]cmd =0x43455252, len=4
3,491,376 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 891.02s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,822,416 UART: [art] Lock RT PCRs Done
2,824,038 UART: [art] Populate DV Done
2,832,227 UART: [fht] FMC Alias Private Key: 7
2,833,403 UART: [art] Derive CDI
2,833,683 UART: [art] Store in in slot 0x4
2,919,730 UART: [art] Derive Key Pair
2,920,090 UART: [art] Store priv key in slot 0x5
2,933,264 UART: [art] Derive Key Pair - Done
2,948,149 UART: [art] Signing Cert with AUTHO
2,948,629 UART: RITY.KEYID = 7
2,964,115 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,880 UART: [art] PUB.X = 72FD3D8B8ECDF0CE845656555EB704964B2008412C55538391C48F8BD3852522CD42153FD9918EF7B66DE5099FF3A5A2
2,971,641 UART: [art] PUB.Y = B768A650689253596BA1B8BAD2805854470CE59AC9AE0C4B74E120ECD07210A698C5DD8A1BBB623A7503E80A821FFF88
2,978,585 UART: [art] SIG.R = 6921615472367F9D3F18DB1F994F1665370046468E32C7F5024E642986395B787478683280776524AD5A34C94738F91A
2,985,304 UART: [art] SIG.S = 909175D5D7326743DF0676FCAF9D8FF5CC02F557FCCB62D13A898CB593BD94A7EFF926970DEDD8202DDC9AC87E8446D4
3,009,460 UART: Caliptra RT
3,009,713 UART: [state] CFI Enabled
3,117,806 UART: [rt] RT listening for mailbox commands...
3,118,476 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,180 UART: [rt]cmd =0x4c444556, len=4
3,158,494 >>> mbox cmd response data (687 bytes)
3,158,495 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,918 UART: [rt]cmd =0x43455246, len=4
3,200,074 >>> mbox cmd response data (887 bytes)
3,200,075 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,530 UART: [rt]cmd =0x43455252, len=4
3,240,443 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,892 >>> mbox cmd response: success
2,704,948 UART:
2,704,964 UART: Running Caliptra FMC ...
2,705,372 UART:
2,705,426 UART: [state] CFI Enabled
2,715,747 UART: [fht] FMC Alias Private Key: 7
2,823,282 UART: [art] Extend RT PCRs Done
2,823,710 UART: [art] Lock RT PCRs Done
2,825,388 UART: [art] Populate DV Done
2,833,649 UART: [fht] FMC Alias Private Key: 7
2,834,649 UART: [art] Derive CDI
2,834,929 UART: [art] Store in in slot 0x4
2,920,890 UART: [art] Derive Key Pair
2,921,250 UART: [art] Store priv key in slot 0x5
2,934,524 UART: [art] Derive Key Pair - Done
2,949,439 UART: [art] Signing Cert with AUTHO
2,949,919 UART: RITY.KEYID = 7
2,964,969 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,734 UART: [art] PUB.X = 03221ACA21BC1AD55569E0CAECA087B7A68BCC2207AD9E89F372D05528CE4C07AE127F9E03AB03E999755802517489CB
2,972,494 UART: [art] PUB.Y = 6DEE88E7EEA7508696493DAE290047405C71CB24FDAB51131AB0EECB449D27B9E008C2E3C4F39E737F620722ACEE2EAB
2,979,432 UART: [art] SIG.R = FFDD415A09DD43D28BF5CC31BE2E2CFCB7FB7255E32A7E5274E563FBF0CBD18A1710D5FBF76CCF47EA7CCFBA0BD28F94
2,986,232 UART: [art] SIG.S = F5E61390CE02A5DEB19641FB507A4624779EC94F2F448F0DCC0EA55F9B10F3CF163FF88B7805BF31D61F30DB4327880F
3,010,212 UART: Caliptra RT
3,010,465 UART: [state] CFI Enabled
3,117,767 UART: [rt] RT listening for mailbox commands...
3,118,437 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,221 UART: [rt]cmd =0x4c444556, len=4
3,158,785 >>> mbox cmd response data (687 bytes)
3,158,786 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,915 UART: [rt]cmd =0x43455246, len=4
3,200,085 >>> mbox cmd response data (887 bytes)
3,200,086 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,359 UART: [rt]cmd =0x43455252, len=4
3,240,037 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,640,880 >>> mbox cmd response: success
2,702,688 UART:
2,702,704 UART: Running Caliptra FMC ...
2,703,112 UART:
2,703,166 UART: [state] CFI Enabled
2,713,477 UART: [fht] FMC Alias Private Key: 7
2,821,356 UART: [art] Extend RT PCRs Done
2,821,784 UART: [art] Lock RT PCRs Done
2,823,562 UART: [art] Populate DV Done
2,831,793 UART: [fht] FMC Alias Private Key: 7
2,832,925 UART: [art] Derive CDI
2,833,205 UART: [art] Store in in slot 0x4
2,918,536 UART: [art] Derive Key Pair
2,918,896 UART: [art] Store priv key in slot 0x5
2,931,806 UART: [art] Derive Key Pair - Done
2,946,822 UART: [art] Signing Cert with AUTHO
2,947,302 UART: RITY.KEYID = 7
2,962,886 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,651 UART: [art] PUB.X = E8C77EACA9FC9297F56EDFDD92565B86CD0ADAF3710D791A5187F2017EC57FFFA3D47E3A6ED4985F6DD5030576A32B60
2,970,424 UART: [art] PUB.Y = 5B6C9674CC5DC842DCA005DBC2BFF49E334131DF9467D6781728EE2E001FB61F0F3242FB27880BF1028C609E1ABE9F16
2,977,350 UART: [art] SIG.R = 0F0B403E79CA05EDDA01B77D64B126BF7CE67C05BED974ADE5579B43DC7A86ECECCE90E2FC8B7D8BEFDE41F19A7558F1
2,984,135 UART: [art] SIG.S = 8E267F4A10569954FD16D0489B6A1FDA851526A79AD11DDFD64E83D55D57E781EF75C70D73A33B2C55BAE91BF536C924
3,007,619 UART: Caliptra RT
3,007,872 UART: [state] CFI Enabled
3,115,483 UART: [rt] RT listening for mailbox commands...
3,116,153 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,085 UART: [rt]cmd =0x4c444556, len=4
3,156,643 >>> mbox cmd response data (687 bytes)
3,156,644 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,881 UART: [rt]cmd =0x43455246, len=4
3,198,039 >>> mbox cmd response data (887 bytes)
3,198,040 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,455 UART: [rt]cmd =0x43455252, len=4
3,238,230 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,766 >>> mbox cmd response: success
2,705,384 UART:
2,705,400 UART: Running Caliptra FMC ...
2,705,808 UART:
2,705,862 UART: [state] CFI Enabled
2,716,385 UART: [fht] FMC Alias Private Key: 7
2,824,444 UART: [art] Extend RT PCRs Done
2,824,872 UART: [art] Lock RT PCRs Done
2,826,564 UART: [art] Populate DV Done
2,834,655 UART: [fht] FMC Alias Private Key: 7
2,835,585 UART: [art] Derive CDI
2,835,865 UART: [art] Store in in slot 0x4
2,921,552 UART: [art] Derive Key Pair
2,921,912 UART: [art] Store priv key in slot 0x5
2,934,606 UART: [art] Derive Key Pair - Done
2,949,338 UART: [art] Signing Cert with AUTHO
2,949,818 UART: RITY.KEYID = 7
2,965,142 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,907 UART: [art] PUB.X = C6A6FE190EC33E3675D32860A488DC9C4C459515DD762C6B63ECEAFC7C35D38668F2E023D71EF5BF78F19702DD33FAFF
2,972,687 UART: [art] PUB.Y = 7FDF6123ACFB5BF4208D1D01D669717E6F0AA4EE6077BA1880222A78D60139F672B2ED2FC2789CC778B21AC97C0A9CB6
2,979,637 UART: [art] SIG.R = 530C9A558D32AFE8E677BDC13056E1E5DF4CAE9C5B9CEA11F1EE07DA40B7090A159201CFFCF7656384921DC7309C9167
2,986,404 UART: [art] SIG.S = 784BCB1C361127E0BCE225F4970522486B0796A26A0A946BC1299EFC82FB758D1D82797F433C2FCD26D4ED39A7C72EFD
3,009,782 UART: Caliptra RT
3,010,035 UART: [state] CFI Enabled
3,116,682 UART: [rt] RT listening for mailbox commands...
3,117,352 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,506 UART: [rt]cmd =0x4c444556, len=4
3,157,918 >>> mbox cmd response data (687 bytes)
3,157,919 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,144 UART: [rt]cmd =0x43455246, len=4
3,199,198 >>> mbox cmd response data (887 bytes)
3,199,199 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,436 UART: [rt]cmd =0x43455252, len=4
3,239,211 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,230 >>> mbox cmd response: success
2,704,618 UART:
2,704,634 UART: Running Caliptra FMC ...
2,705,042 UART:
2,705,096 UART: [state] CFI Enabled
2,715,779 UART: [fht] FMC Alias Private Key: 7
2,823,134 UART: [art] Extend RT PCRs Done
2,823,562 UART: [art] Lock RT PCRs Done
2,824,954 UART: [art] Populate DV Done
2,833,369 UART: [fht] FMC Alias Private Key: 7
2,834,359 UART: [art] Derive CDI
2,834,639 UART: [art] Store in in slot 0x4
2,920,626 UART: [art] Derive Key Pair
2,920,986 UART: [art] Store priv key in slot 0x5
2,933,826 UART: [art] Derive Key Pair - Done
2,948,560 UART: [art] Signing Cert with AUTHO
2,949,040 UART: RITY.KEYID = 7
2,963,938 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,703 UART: [art] PUB.X = 66A6EDF1370EA54A8452CDD98F90077637C9B42AA3386408A997F9AD1F96B8657F8CBDDC6361C06B12180D08A0E48FC7
2,971,464 UART: [art] PUB.Y = 26700038883D286EB698F04B5C4E8170EC19F64F7DE05E483BD4B17DF60407C73A348DF372E5FF1EB20E998E6FED5BE3
2,978,391 UART: [art] SIG.R = 4F3A78DC6D4302574DE2E5D1B2492E88BFE68A9EEE2C30FC7236BC2A94B1C9D72E4C3BCE225BB25B0B621A692254AC34
2,985,171 UART: [art] SIG.S = 6E36B5043C5168F378EA4E19DDEF65ECA4E2399B85444C82D947F2ABCF5A81B182149445CF2F0EBECA64DDA9C70035AC
3,008,798 UART: Caliptra RT
3,009,051 UART: [state] CFI Enabled
3,117,174 UART: [rt] RT listening for mailbox commands...
3,117,844 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,682 UART: [rt]cmd =0x4c444556, len=4
3,158,200 >>> mbox cmd response data (687 bytes)
3,158,201 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,754 UART: [rt]cmd =0x43455246, len=4
3,199,864 >>> mbox cmd response data (887 bytes)
3,199,865 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,206 UART: [rt]cmd =0x43455252, len=4
3,240,289 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 867.77s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,251 UART: [idev] CSR uploaded
1,300,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,465 UART: [idev] --
1,301,494 UART: [ldev] ++
1,301,662 UART: [ldev] CDI.KEYID = 6
1,302,026 UART: [ldev] SUBJECT.KEYID = 5
1,302,453 UART: [ldev] AUTHORITY.KEYID = 7
1,302,916 UART: [ldev] FE.KEYID = 1
1,308,280 UART: [ldev] Erasing FE.KEYID = 1
1,334,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,572 UART: [ldev] --
1,374,028 UART: [fwproc] Wait for Commands...
1,374,729 UART: [fwproc] Recv command 0x46574c44
1,375,462 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,702,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,867,518 >>> mbox cmd response: success
2,868,583 UART: [afmc] ++
2,868,751 UART: [afmc] CDI.KEYID = 6
2,869,114 UART: [afmc] SUBJECT.KEYID = 7
2,869,540 UART: [afmc] AUTHORITY.KEYID = 5
2,904,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,922,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,975 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,858 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,577 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,268 UART: [afmc] --
2,948,182 UART: [cold-reset] --
2,949,058 UART: [state] Locking Datavault
2,950,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,853 UART: [state] Locking ICCM
2,951,483 UART: [exit] Launching FMC @ 0x40000130
2,956,812 UART:
2,956,828 UART: Running Caliptra FMC ...
2,957,236 UART:
2,957,379 UART: [state] CFI Enabled
2,967,996 UART: [fht] FMC Alias Private Key: 7
3,075,875 UART: [art] Extend RT PCRs Done
3,076,303 UART: [art] Lock RT PCRs Done
3,078,097 UART: [art] Populate DV Done
3,086,574 UART: [fht] FMC Alias Private Key: 7
3,087,586 UART: [art] Derive CDI
3,087,866 UART: [art] Store in in slot 0x4
3,173,435 UART: [art] Derive Key Pair
3,173,795 UART: [art] Store priv key in slot 0x5
3,187,453 UART: [art] Derive Key Pair - Done
3,202,425 UART: [art] Signing Cert with AUTHO
3,202,905 UART: RITY.KEYID = 7
3,217,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,466 UART: [art] PUB.X = 272985DD8195FF1E3A36F16C71A30F73C314715C31464C4891E304623DFE216F6418F7D20B1B93168C7F3B94B3986021
3,225,217 UART: [art] PUB.Y = 91762C0C590AA895EC7EBBF1AC4658D6F6C6E88676B4A96C79FCB46DDB0ADC26E5F93EB5334219AF4A09CB2E3D4CD5BC
3,232,179 UART: [art] SIG.R = 128308E39D225429743031C9E4FCE251AC1C7310D9CCD48F987C30B859B609A98F7E1DB1E20E5CB4FCE8F2F9920D8D95
3,238,943 UART: [art] SIG.S = F323E4A2473A4953940A27D608CB609E57B61966BF08156E4A00CA222851B83E95A088F4E938DEFAE3A941931EDC9CF3
3,262,863 UART: Caliptra RT
3,263,208 UART: [state] CFI Enabled
3,371,821 UART: [rt] RT listening for mailbox commands...
3,372,491 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,325 UART: [rt]cmd =0x4c444556, len=4
3,412,759 >>> mbox cmd response data (687 bytes)
3,412,760 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,987 UART: [rt]cmd =0x43455246, len=4
3,453,931 >>> mbox cmd response data (887 bytes)
3,453,932 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,169 UART: [rt]cmd =0x43455252, len=4
3,494,018 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
891,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,906 UART: [kat] ++
896,058 UART: [kat] sha1
900,264 UART: [kat] SHA2-256
902,204 UART: [kat] SHA2-384
904,895 UART: [kat] SHA2-512-ACC
906,796 UART: [kat] ECC-384
916,401 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,106 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,114 UART: [idev] ++
1,173,282 UART: [idev] CDI.KEYID = 6
1,173,643 UART: [idev] SUBJECT.KEYID = 7
1,174,068 UART: [idev] UDS.KEYID = 0
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,199,142 UART: [idev] Sha1 KeyId Algorithm
1,207,416 UART: [idev] CSR upload begun
1,209,195 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,996 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,704 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,589 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,295 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,724 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,221 UART: [idev] CSR uploaded
1,300,266 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,435 UART: [idev] --
1,301,548 UART: [ldev] ++
1,301,716 UART: [ldev] CDI.KEYID = 6
1,302,080 UART: [ldev] SUBJECT.KEYID = 5
1,302,507 UART: [ldev] AUTHORITY.KEYID = 7
1,302,970 UART: [ldev] FE.KEYID = 1
1,307,950 UART: [ldev] Erasing FE.KEYID = 1
1,335,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,876 UART: [ldev] --
1,374,322 UART: [fwproc] Wait for Commands...
1,375,013 UART: [fwproc] Recv command 0x46574c44
1,375,746 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,843 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,152 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,168 >>> mbox cmd response: success
2,867,217 UART: [afmc] ++
2,867,385 UART: [afmc] CDI.KEYID = 6
2,867,748 UART: [afmc] SUBJECT.KEYID = 7
2,868,174 UART: [afmc] AUTHORITY.KEYID = 5
2,904,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,474 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,203 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,805 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,614 UART: [afmc] --
2,947,654 UART: [cold-reset] --
2,948,596 UART: [state] Locking Datavault
2,950,015 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,619 UART: [state] Locking ICCM
2,951,065 UART: [exit] Launching FMC @ 0x40000130
2,956,394 UART:
2,956,410 UART: Running Caliptra FMC ...
2,956,818 UART:
2,956,961 UART: [state] CFI Enabled
2,967,506 UART: [fht] FMC Alias Private Key: 7
3,076,275 UART: [art] Extend RT PCRs Done
3,076,703 UART: [art] Lock RT PCRs Done
3,078,099 UART: [art] Populate DV Done
3,086,308 UART: [fht] FMC Alias Private Key: 7
3,087,246 UART: [art] Derive CDI
3,087,526 UART: [art] Store in in slot 0x4
3,173,203 UART: [art] Derive Key Pair
3,173,563 UART: [art] Store priv key in slot 0x5
3,186,799 UART: [art] Derive Key Pair - Done
3,201,827 UART: [art] Signing Cert with AUTHO
3,202,307 UART: RITY.KEYID = 7
3,217,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,216 UART: [art] PUB.X = A29309D22AD08DD5DD3A736451C951290977AA6846A694946DB3FFC4F5AA58B74FFCAD730C3DD57121CE79A335B946B0
3,224,985 UART: [art] PUB.Y = E73DE2E85ADDA425A198E6336396BBB675D02975A5589A120D8E1C531B2A14CC0BBE0863C24A9FAFFC0D5E583960C0CC
3,231,937 UART: [art] SIG.R = 9B066B54513716C807F3254BC938BFAD81CB3B4AF71306590F4F43D303525709D30CD36BF1D056FC46666D56A78BE07D
3,238,686 UART: [art] SIG.S = 79B81CA1675DCB54128CC8C37A1B97655FB4C525C5DC3B819AAB9EF0DC266A5AB96C357FE367D9CA23B361B1BA89CD0D
3,262,514 UART: Caliptra RT
3,262,859 UART: [state] CFI Enabled
3,370,860 UART: [rt] RT listening for mailbox commands...
3,371,530 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,528 UART: [rt]cmd =0x4c444556, len=4
3,411,854 >>> mbox cmd response data (687 bytes)
3,411,855 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,282 UART: [rt]cmd =0x43455246, len=4
3,453,364 >>> mbox cmd response data (887 bytes)
3,453,365 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,688 UART: [rt]cmd =0x43455252, len=4
3,493,699 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 890.42s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,827,034 UART: [art] Lock RT PCRs Done
2,828,708 UART: [art] Populate DV Done
2,837,135 UART: [fht] FMC Alias Private Key: 7
2,838,077 UART: [art] Derive CDI
2,838,357 UART: [art] Store in in slot 0x4
2,923,948 UART: [art] Derive Key Pair
2,924,308 UART: [art] Store priv key in slot 0x5
2,937,482 UART: [art] Derive Key Pair - Done
2,952,236 UART: [art] Signing Cert with AUTHO
2,952,716 UART: RITY.KEYID = 7
2,967,674 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,439 UART: [art] PUB.X = BF5B210404684236381B78DA37A7A66DB522496369702203A87AAC29B509D3AA127D4F4D79E9E730200DA5CA514EE498
2,975,190 UART: [art] PUB.Y = 38CC2DCFE5B573627CEE30F141AF3B5C0E52434B09C734ED824E61F5A94B6E46A3F0D4F8C99ED7ABC2BEBFC26D3D3962
2,982,156 UART: [art] SIG.R = 6EE7161A0D220EABBC16B76FA7367978F6261B3251572892D60539610A2C506736C02D417C4D5EF04F3709C01B131986
2,988,901 UART: [art] SIG.S = 35F743486F37B3BFD0B65F49EB03F221B192432B2A0011AA5B4F07BFBE8539393E71522E61894D737B3A10750CE43194
3,013,005 UART: Caliptra RT
3,013,350 UART: [state] CFI Enabled
3,120,981 UART: [rt] RT listening for mailbox commands...
3,121,651 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,735 UART: [rt]cmd =0x4c444556, len=4
3,162,279 >>> mbox cmd response data (687 bytes)
3,162,280 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,319 UART: [rt]cmd =0x43455246, len=4
3,203,405 >>> mbox cmd response data (887 bytes)
3,203,406 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,793 UART: [rt]cmd =0x43455252, len=4
3,243,860 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,641,695 >>> mbox cmd response: success
2,704,401 UART:
2,704,417 UART: Running Caliptra FMC ...
2,704,825 UART:
2,704,968 UART: [state] CFI Enabled
2,715,511 UART: [fht] FMC Alias Private Key: 7
2,824,220 UART: [art] Extend RT PCRs Done
2,824,648 UART: [art] Lock RT PCRs Done
2,826,178 UART: [art] Populate DV Done
2,834,335 UART: [fht] FMC Alias Private Key: 7
2,835,451 UART: [art] Derive CDI
2,835,731 UART: [art] Store in in slot 0x4
2,921,418 UART: [art] Derive Key Pair
2,921,778 UART: [art] Store priv key in slot 0x5
2,935,496 UART: [art] Derive Key Pair - Done
2,950,073 UART: [art] Signing Cert with AUTHO
2,950,553 UART: RITY.KEYID = 7
2,965,709 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,474 UART: [art] PUB.X = F9921D16E7590F7B3878F8EB2F826977B07C9D2C9F1F1165C7DCCD995F354EC1410E5EDF3F07429FBFDBAD1800F0DA31
2,973,227 UART: [art] PUB.Y = E88209D3D9AD19A9F6FE8F1AC76C38C67A5913220D353A1422579A0E3288673C517D23B1C81B52F6A0E8E749BBA4484B
2,980,170 UART: [art] SIG.R = 3BDCCF8B067B72DDA3981334431F89D668FB0DC7AEE37A113E237C6716B7F113D3187727CD6F205BDB2E47C1BBFBF4E8
2,986,950 UART: [art] SIG.S = 341B351EFE161FD3C5E99752094EBD83153472B64AF580CCF2453A06ABA374AD5F67BAE2A7313047C6951B713B1C9B8D
3,010,301 UART: Caliptra RT
3,010,646 UART: [state] CFI Enabled
3,118,677 UART: [rt] RT listening for mailbox commands...
3,119,347 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,545 UART: [rt]cmd =0x4c444556, len=4
3,160,019 >>> mbox cmd response data (687 bytes)
3,160,020 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,519 UART: [rt]cmd =0x43455246, len=4
3,201,603 >>> mbox cmd response data (887 bytes)
3,201,604 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,929 UART: [rt]cmd =0x43455252, len=4
3,241,648 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,265 >>> mbox cmd response: success
2,704,697 UART:
2,704,713 UART: Running Caliptra FMC ...
2,705,121 UART:
2,705,264 UART: [state] CFI Enabled
2,715,985 UART: [fht] FMC Alias Private Key: 7
2,824,168 UART: [art] Extend RT PCRs Done
2,824,596 UART: [art] Lock RT PCRs Done
2,826,082 UART: [art] Populate DV Done
2,834,363 UART: [fht] FMC Alias Private Key: 7
2,835,471 UART: [art] Derive CDI
2,835,751 UART: [art] Store in in slot 0x4
2,921,724 UART: [art] Derive Key Pair
2,922,084 UART: [art] Store priv key in slot 0x5
2,935,148 UART: [art] Derive Key Pair - Done
2,950,081 UART: [art] Signing Cert with AUTHO
2,950,561 UART: RITY.KEYID = 7
2,965,649 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,414 UART: [art] PUB.X = 5732A39C46A4D79FB09878D46B36864D112742933B44464064BFE7EBA6F280B4F293DDBD3C32C179D996F3E0C0A47CE6
2,973,186 UART: [art] PUB.Y = 661FC65DC3486E53BCE256EE71775A4B58D233A9C512D1F687B10EF6A3911EA8E44E0D60C9594188F1AC637967922E21
2,980,130 UART: [art] SIG.R = 2DE61ABC7F76C39C5CDAE04FC85EE66D06999590B80200C0C4C868900FE543613F03D2AF408D26A23A0BE29549AC6597
2,986,869 UART: [art] SIG.S = 5FB9023641FF2BFC8AC923DA3557B25EECE08E0CF9C5BD0A2924456FE5DF9E539067803C8F2C42C971453D2F2A4DE1F0
3,010,687 UART: Caliptra RT
3,011,032 UART: [state] CFI Enabled
3,119,053 UART: [rt] RT listening for mailbox commands...
3,119,723 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,351 UART: [rt]cmd =0x4c444556, len=4
3,159,799 >>> mbox cmd response data (687 bytes)
3,159,800 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,153 UART: [rt]cmd =0x43455246, len=4
3,201,213 >>> mbox cmd response data (887 bytes)
3,201,214 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,553 UART: [rt]cmd =0x43455252, len=4
3,241,484 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,431 >>> mbox cmd response: success
2,704,743 UART:
2,704,759 UART: Running Caliptra FMC ...
2,705,167 UART:
2,705,310 UART: [state] CFI Enabled
2,715,947 UART: [fht] FMC Alias Private Key: 7
2,824,418 UART: [art] Extend RT PCRs Done
2,824,846 UART: [art] Lock RT PCRs Done
2,826,394 UART: [art] Populate DV Done
2,834,717 UART: [fht] FMC Alias Private Key: 7
2,835,733 UART: [art] Derive CDI
2,836,013 UART: [art] Store in in slot 0x4
2,921,804 UART: [art] Derive Key Pair
2,922,164 UART: [art] Store priv key in slot 0x5
2,935,420 UART: [art] Derive Key Pair - Done
2,950,416 UART: [art] Signing Cert with AUTHO
2,950,896 UART: RITY.KEYID = 7
2,966,224 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,989 UART: [art] PUB.X = 8AAAE2DDF3682F943D4CA7AA7EA416B0243A825A88432AEDEA214B7EFE62FA25F13886C0BB929C567FCAE0304AA8C117
2,973,779 UART: [art] PUB.Y = 1E83C49FBEB5080484D8A612ABEC98600936762AAA2BE71B1903AFFB5BD6267683D79B69EFE1BE70964059B12BE33BE8
2,980,727 UART: [art] SIG.R = A88C0BA9D94A29FAEEE351EAAD06031FCC7921EE6D40E94012C7B37FA853A1B26CA42CD0314599B21E35666540FF4877
2,987,498 UART: [art] SIG.S = 04349A8A54553638F4A33402691F623EC2BCD3B5956CD5626FE43D731DC45FA90631DA3E6798F92116599956CD1B528D
3,010,840 UART: Caliptra RT
3,011,185 UART: [state] CFI Enabled
3,119,382 UART: [rt] RT listening for mailbox commands...
3,120,052 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,920 UART: [rt]cmd =0x4c444556, len=4
3,160,496 >>> mbox cmd response data (687 bytes)
3,160,497 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,752 UART: [rt]cmd =0x43455246, len=4
3,201,740 >>> mbox cmd response data (887 bytes)
3,201,741 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,290 UART: [rt]cmd =0x43455252, len=4
3,242,059 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,141 >>> mbox cmd response: success
2,703,473 UART:
2,703,489 UART: Running Caliptra FMC ...
2,703,897 UART:
2,704,040 UART: [state] CFI Enabled
2,714,607 UART: [fht] FMC Alias Private Key: 7
2,822,964 UART: [art] Extend RT PCRs Done
2,823,392 UART: [art] Lock RT PCRs Done
2,824,796 UART: [art] Populate DV Done
2,832,733 UART: [fht] FMC Alias Private Key: 7
2,833,911 UART: [art] Derive CDI
2,834,191 UART: [art] Store in in slot 0x4
2,919,810 UART: [art] Derive Key Pair
2,920,170 UART: [art] Store priv key in slot 0x5
2,933,168 UART: [art] Derive Key Pair - Done
2,948,204 UART: [art] Signing Cert with AUTHO
2,948,684 UART: RITY.KEYID = 7
2,964,356 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,121 UART: [art] PUB.X = 95D25FCE74D5C64478EF0D522DBCFC0F6542DEE1BA793C6A40C825A2766CF9E0A8BE08E99F7B082E5E3CAA17687C83F0
2,971,897 UART: [art] PUB.Y = 721FD50D24143A719F360289CBA1166F299ADDF6FFE07E558B2330D18FA1F0E6CDECF5A8A0CE608809C002B593F43847
2,978,843 UART: [art] SIG.R = 022D2D6E87D94BEC7685CF1FA49FE369D13FBAA941798AD51B2BCA50E361F06B8A17A9C76C8E393A67D5B5D55AE728DF
2,985,628 UART: [art] SIG.S = F6DE59C317F0CCCBA0DF3B19C0013D9496DF436B80CB449D777B21BCA6D706D6C5162F8F985D3BCA861829409475DD5A
3,009,205 UART: Caliptra RT
3,009,550 UART: [state] CFI Enabled
3,117,463 UART: [rt] RT listening for mailbox commands...
3,118,133 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,763 UART: [rt]cmd =0x4c444556, len=4
3,158,267 >>> mbox cmd response data (687 bytes)
3,158,268 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,703 UART: [rt]cmd =0x43455246, len=4
3,199,639 >>> mbox cmd response data (887 bytes)
3,199,640 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,123 UART: [rt]cmd =0x43455252, len=4
3,240,090 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 870.07s
Truncated 9072 bytes from beginning
24,242,651 UART: [state] Locking Datavault
24,246,113 UART: [state] Locking PCR0, PCR1 and PCR31
24,247,830 UART: [state] Locking ICCM
24,249,659 UART: [exit] Launching FMC @ 0x40000130
24,258,333 UART:
24,258,564 UART: Running Caliptra FMC ...
24,259,663 UART:
24,259,822 UART: [state] CFI Enabled
24,325,095 UART: [fht] FMC Alias Private Key: 7
26,663,131 UART: [art] Extend RT PCRs Done
26,664,364 UART: [art] Lock RT PCRs Done
26,665,938 UART: [art] Populate DV Done
26,671,561 UART: [fht] FMC Alias Private Key: 7
26,673,199 UART: [art] Derive CDI
26,674,026 UART: [art] Store in in slot 0x4
26,732,804 UART: [art] Derive Key Pair
26,733,834 UART: [art] Store priv key in slot 0x5
30,027,297 UART: [art] Derive Key Pair - Done
30,040,249 UART: [art] Signing Cert with AUTHO
30,041,556 UART: RITY.KEYID = 7
32,329,082 UART: [art] Erasing AUTHORITY.KEYID = 7
32,330,602 UART: [art] PUB.X = 32506042D52995CFB8FC8BD86D5ECFC23AD9556FDA4867208A0DF03AF644306BC27A56BE2645C6CB1F8434DB3A4DFA64
32,337,850 UART: [art] PUB.Y = BE3D349EE6CD38A9CB98F9936F217B438EAD7B78496DE4BF78EBC19D4F9C9C8C2A0E8CC28DDA7259D8AD825199EE5EB5
32,345,138 UART: [art] SIG.R = 832BC86F117126B96FC7C9BF3AAE5E1469184252C791CF5AE5A37E993A7ADBCBCDD0D0F1FB2E7998A84BB87A9AA38885
32,352,521 UART: [art] SIG.S = FB21FC30100A3AF729CE000E04BD2DC424EC88082E5AD41E1A5B2BF20A2F5010A5A87FBDAC14865D54CB0F2B3D9578FF
33,657,856 UART: Caliptra RT
33,658,571 UART: [state] CFI Enabled
33,819,511 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
4,764 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,051 UART:
192,434 UART: Running Caliptra ROM ...
193,509 UART:
193,648 UART: [state] CFI Enabled
262,528 UART: [state] LifecycleState = Unprovisioned
264,965 UART: [state] DebugLocked = No
266,422 UART: [state] WD Timer not started. Device not locked for debugging
271,729 UART: [kat] SHA2-256
453,663 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,205 UART: [kat] ++
465,648 UART: [kat] sha1
476,420 UART: [kat] SHA2-256
479,479 UART: [kat] SHA2-384
486,580 UART: [kat] SHA2-512-ACC
489,184 UART: [kat] ECC-384
3,774,209 UART: [kat] HMAC-384Kdf
3,801,350 UART: [kat] LMS
4,874,501 UART: [kat] --
4,880,284 UART: [cold-reset] ++
4,882,759 UART: [fht] FHT @ 0x50003400
4,893,409 UART: [idev] ++
4,894,160 UART: [idev] CDI.KEYID = 6
4,895,341 UART: [idev] SUBJECT.KEYID = 7
4,896,498 UART: [idev] UDS.KEYID = 0
4,929,289 UART: [idev] Erasing UDS.KEYID = 0
8,242,078 UART: [idev] Sha384 KeyId Algorithm
8,251,142 UART: [idev] --
8,254,766 UART: [ldev] ++
8,255,333 UART: [ldev] CDI.KEYID = 6
8,256,494 UART: [ldev] SUBJECT.KEYID = 5
8,257,704 UART: [ldev] AUTHORITY.KEYID = 7
8,258,854 UART: [ldev] FE.KEYID = 1
8,293,946 UART: [ldev] Erasing FE.KEYID = 1
11,627,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,956,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,972,596 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
13,988,578 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
14,008,491 UART: [ldev] --
14,013,597 UART: [fwproc] Wait for Commands...
14,016,836 UART: [fwproc] Recv command 0x46574c44
14,019,154 UART: [fwproc] Recv'd Img size: 114124 bytes
18,086,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,156,094 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,224,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,541,907 >>> mbox cmd response: success
18,546,128 UART: [afmc] ++
18,546,722 UART: [afmc] CDI.KEYID = 6
18,547,908 UART: [afmc] SUBJECT.KEYID = 7
18,549,017 UART: [afmc] AUTHORITY.KEYID = 5
21,925,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,225,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,227,509 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,243,679 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,259,763 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,275,728 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,298,333 UART: [afmc] --
24,301,231 UART: [cold-reset] --
24,305,038 UART: [state] Locking Datavault
24,309,592 UART: [state] Locking PCR0, PCR1 and PCR31
24,311,287 UART: [state] Locking ICCM
24,313,976 UART: [exit] Launching FMC @ 0x40000130
24,322,643 UART:
24,322,872 UART: Running Caliptra FMC ...
24,323,969 UART:
24,324,122 UART: [state] CFI Enabled
24,383,780 UART: [fht] FMC Alias Private Key: 7
26,721,527 UART: [art] Extend RT PCRs Done
26,722,757 UART: [art] Lock RT PCRs Done
26,724,483 UART: [art] Populate DV Done
26,730,213 UART: [fht] FMC Alias Private Key: 7
26,731,852 UART: [art] Derive CDI
26,732,587 UART: [art] Store in in slot 0x4
26,791,571 UART: [art] Derive Key Pair
26,792,612 UART: [art] Store priv key in slot 0x5
30,085,560 UART: [art] Derive Key Pair - Done
30,098,457 UART: [art] Signing Cert with AUTHO
30,099,763 UART: RITY.KEYID = 7
32,387,409 UART: [art] Erasing AUTHORITY.KEYID = 7
32,388,912 UART: [art] PUB.X = 6E416F2CC9B8397BDA0198DBDF3EB596B80EF30D64650586052DC845F26873848B8BCDC69F237946789C0CDBA64C66BE
32,396,148 UART: [art] PUB.Y = CEF805633B084534689A8D534B80845445385AED74416FA72E3C64A82E7AC20493239FAE7E74F53621D0729AB031F210
32,403,373 UART: [art] SIG.R = 3C1843F39F3E8F5EC2B8F2F25B1ADC6C585C13F89DD248EBCA5EF52595269D92DDCA4C59839E7D2BFF34C4256AC87DF8
32,410,766 UART: [art] SIG.S = 73224357C81F35DA6309EB849A4EAB85F064E1DCA8A75F14585F53F8744EC4D1E9B4022622DE9E753A89F0CEC8EC495D
33,715,756 UART: Caliptra RT
33,716,455 UART: [state] CFI Enabled
33,878,501 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
4,766 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,023 UART:
192,441 UART: Running Caliptra ROM ...
193,576 UART:
193,725 UART: [state] CFI Enabled
266,282 UART: [state] LifecycleState = Unprovisioned
268,716 UART: [state] DebugLocked = No
270,695 UART: [state] WD Timer not started. Device not locked for debugging
275,639 UART: [kat] SHA2-256
457,573 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,067 UART: [kat] ++
469,657 UART: [kat] sha1
480,161 UART: [kat] SHA2-256
483,169 UART: [kat] SHA2-384
489,621 UART: [kat] SHA2-512-ACC
492,224 UART: [kat] ECC-384
3,774,385 UART: [kat] HMAC-384Kdf
3,801,036 UART: [kat] LMS
4,874,188 UART: [kat] --
4,879,120 UART: [cold-reset] ++
4,880,951 UART: [fht] FHT @ 0x50003400
4,891,660 UART: [idev] ++
4,892,331 UART: [idev] CDI.KEYID = 6
4,893,567 UART: [idev] SUBJECT.KEYID = 7
4,894,592 UART: [idev] UDS.KEYID = 0
4,928,847 UART: [idev] Erasing UDS.KEYID = 0
8,239,990 UART: [idev] Fuse KeyId
8,244,224 UART: [idev] --
8,249,664 UART: [ldev] ++
8,250,225 UART: [ldev] CDI.KEYID = 6
8,251,453 UART: [ldev] SUBJECT.KEYID = 5
8,252,606 UART: [ldev] AUTHORITY.KEYID = 7
8,253,829 UART: [ldev] FE.KEYID = 1
8,293,313 UART: [ldev] Erasing FE.KEYID = 1
11,628,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,972,991 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
13,988,999 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
14,009,267 UART: [ldev] --
14,014,699 UART: [fwproc] Wait for Commands...
14,017,614 UART: [fwproc] Recv command 0x46574c44
14,019,647 UART: [fwproc] Recv'd Img size: 114124 bytes
18,082,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,156,972 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,225,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,542,033 >>> mbox cmd response: success
18,545,372 UART: [afmc] ++
18,545,960 UART: [afmc] CDI.KEYID = 6
18,547,143 UART: [afmc] SUBJECT.KEYID = 7
18,548,313 UART: [afmc] AUTHORITY.KEYID = 5
21,926,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,244,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,247,014 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,263,187 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,279,220 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,295,179 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,316,403 UART: [afmc] --
24,320,747 UART: [cold-reset] --
24,325,630 UART: [state] Locking Datavault
24,332,603 UART: [state] Locking PCR0, PCR1 and PCR31
24,334,240 UART: [state] Locking ICCM
24,335,990 UART: [exit] Launching FMC @ 0x40000130
24,344,699 UART:
24,344,939 UART: Running Caliptra FMC ...
24,345,970 UART:
24,346,137 UART: [state] CFI Enabled
24,404,174 UART: [fht] FMC Alias Private Key: 7
26,741,828 UART: [art] Extend RT PCRs Done
26,743,046 UART: [art] Lock RT PCRs Done
26,744,551 UART: [art] Populate DV Done
26,750,066 UART: [fht] FMC Alias Private Key: 7
26,751,661 UART: [art] Derive CDI
26,752,468 UART: [art] Store in in slot 0x4
26,812,630 UART: [art] Derive Key Pair
26,813,622 UART: [art] Store priv key in slot 0x5
30,106,236 UART: [art] Derive Key Pair - Done
30,119,345 UART: [art] Signing Cert with AUTHO
30,120,641 UART: RITY.KEYID = 7
32,408,939 UART: [art] Erasing AUTHORITY.KEYID = 7
32,410,461 UART: [art] PUB.X = 3E2E6294D0E0C2AE24EE0F5E9835D41BE9E250E8F093EC6373B764CF676B69E6F32B043D44478E50E28F93D8725A5BFC
32,417,817 UART: [art] PUB.Y = 898F0705A41C9DF0B69F280486FC5C3A5F1948F758B142F8E7A40E1BB642A42F1E01EB81C76AE2B42BF7B01E53FEAD6E
32,424,939 UART: [art] SIG.R = 45097EED24970A167648B4E76F060B7AC15AF6F87DF1ABD8EEBAE2823E859AB5B38A5BFA6986A4428AB0EB779E4C395E
32,432,339 UART: [art] SIG.S = F93235BEC473D8529113E3519DC78092C3E57B312D2D81E804506DE42D22885F3D89B4A39BA34C88D4757AE49ABCB518
33,737,448 UART: Caliptra RT
33,738,163 UART: [state] CFI Enabled
33,897,858 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
5,186 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,359,468 >>> mbox cmd response: success
24,066,379 UART:
24,066,816 UART: Running Caliptra FMC ...
24,067,969 UART:
24,068,126 UART: [state] CFI Enabled
24,134,926 UART: [fht] FMC Alias Private Key: 7
26,473,116 UART: [art] Extend RT PCRs Done
26,474,340 UART: [art] Lock RT PCRs Done
26,475,834 UART: [art] Populate DV Done
26,481,511 UART: [fht] FMC Alias Private Key: 7
26,483,159 UART: [art] Derive CDI
26,483,970 UART: [art] Store in in slot 0x4
26,544,208 UART: [art] Derive Key Pair
26,545,243 UART: [art] Store priv key in slot 0x5
29,837,843 UART: [art] Derive Key Pair - Done
29,850,851 UART: [art] Signing Cert with AUTHO
29,852,156 UART: RITY.KEYID = 7
32,139,905 UART: [art] Erasing AUTHORITY.KEYID = 7
32,141,409 UART: [art] PUB.X = 74584DFCE202E3FA4D211684B274D5ABA5061CD4516F7F3DC892A4711FDB0279057F29F7CB8B588D1FBD83F7CE0B7B7B
32,148,657 UART: [art] PUB.Y = 478338876AED21BF733E00D9F3291A0A69374C7E2FCE413098AB4F6AAD2689B9E9328F9708A970F871E15CA0FC312F68
32,155,928 UART: [art] SIG.R = E6BABC70616B9FE3441C03A265156DD6D333CD2593DA081765ACEFC31457DE9975D2743605172375422FCF4FB4D7A8C1
32,163,327 UART: [art] SIG.S = 1CADCF01069B9562B621C9DF5DBFE601D7C6DA8A60935E1E9E6780D3113BE32E945900CA4EA6DF275F46D939D4EC8AE3
33,468,147 UART: Caliptra RT
33,468,849 UART: [state] CFI Enabled
33,630,648 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
4,736 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,380,062 >>> mbox cmd response: success
24,082,700 UART:
24,083,109 UART: Running Caliptra FMC ...
24,084,239 UART:
24,084,395 UART: [state] CFI Enabled
24,152,548 UART: [fht] FMC Alias Private Key: 7
26,490,428 UART: [art] Extend RT PCRs Done
26,491,656 UART: [art] Lock RT PCRs Done
26,493,275 UART: [art] Populate DV Done
26,498,807 UART: [fht] FMC Alias Private Key: 7
26,500,407 UART: [art] Derive CDI
26,501,222 UART: [art] Store in in slot 0x4
26,560,429 UART: [art] Derive Key Pair
26,561,466 UART: [art] Store priv key in slot 0x5
29,854,228 UART: [art] Derive Key Pair - Done
29,867,283 UART: [art] Signing Cert with AUTHO
29,868,587 UART: RITY.KEYID = 7
32,154,631 UART: [art] Erasing AUTHORITY.KEYID = 7
32,156,138 UART: [art] PUB.X = 8847ED278CE1D3A7CA0CCF673D6C30ECE8F7A6F667216C51A4FEEDD652BD7B67317D9644606A13838A53466456C66E2A
32,163,392 UART: [art] PUB.Y = 91328A10612310CB6E81305ACA69E72023FD5BA8CE2A1FF384C42171F9E2327A26C588A383EB851B0EA2F2DD6B693348
32,170,604 UART: [art] SIG.R = BD8046047149B2962239FD6D897CE1AC841A90A05C0728B3427CEF070CB08D30DE0360F3F4EAC5935E39445C7E0C3364
32,177,994 UART: [art] SIG.S = DAC38576295BE0D16F0EC3512952FAB80B92C9A9D68B9C461AA58808DED7D3151CE52A47F5E5C61DB33D50D8E457C3F9
33,483,299 UART: Caliptra RT
33,484,174 UART: [state] CFI Enabled
33,643,951 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
4,683 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,338,173 >>> mbox cmd response: success
24,040,237 UART:
24,040,677 UART: Running Caliptra FMC ...
24,041,808 UART:
24,041,974 UART: [state] CFI Enabled
24,108,733 UART: [fht] FMC Alias Private Key: 7
26,446,683 UART: [art] Extend RT PCRs Done
26,447,917 UART: [art] Lock RT PCRs Done
26,449,815 UART: [art] Populate DV Done
26,455,129 UART: [fht] FMC Alias Private Key: 7
26,456,780 UART: [art] Derive CDI
26,457,522 UART: [art] Store in in slot 0x4
26,518,146 UART: [art] Derive Key Pair
26,519,186 UART: [art] Store priv key in slot 0x5
29,812,397 UART: [art] Derive Key Pair - Done
29,825,448 UART: [art] Signing Cert with AUTHO
29,826,755 UART: RITY.KEYID = 7
32,114,019 UART: [art] Erasing AUTHORITY.KEYID = 7
32,115,532 UART: [art] PUB.X = 9DFCF7CCDF6FDCC59304C8441BDE7E94EE6A60B160A0A3E6AAC22DAD6B19BCFB8DF7B2ECABE752F2AACC142A37EF1494
32,122,837 UART: [art] PUB.Y = 67E9C4425F9F58078EB5821A2A571A777DEC9ADCB59715B6BD7AD2183F4582529CB482E53BEB3644961215F651055592
32,130,056 UART: [art] SIG.R = 0F2E78222C8A486A5DF871A5D3FAF4404F7A91E8F63C2B62591345DD23EF56DBD7A856AAB4C6C926F9E6863E8057FB04
32,137,460 UART: [art] SIG.S = DFC9BCC703279427B550567EF0222F7E458D0A97D005476F788A83279DC2F5EF5C4C7A207C654A012146D77FA1A9AB94
33,443,031 UART: Caliptra RT
33,443,749 UART: [state] CFI Enabled
33,603,718 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
4,824 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,363,126 >>> mbox cmd response: success
24,058,934 UART:
24,059,380 UART: Running Caliptra FMC ...
24,060,515 UART:
24,060,672 UART: [state] CFI Enabled
24,122,184 UART: [fht] FMC Alias Private Key: 7
26,460,096 UART: [art] Extend RT PCRs Done
26,461,327 UART: [art] Lock RT PCRs Done
26,462,714 UART: [art] Populate DV Done
26,468,301 UART: [fht] FMC Alias Private Key: 7
26,469,978 UART: [art] Derive CDI
26,470,799 UART: [art] Store in in slot 0x4
26,529,848 UART: [art] Derive Key Pair
26,530,889 UART: [art] Store priv key in slot 0x5
29,823,384 UART: [art] Derive Key Pair - Done
29,836,440 UART: [art] Signing Cert with AUTHO
29,837,739 UART: RITY.KEYID = 7
32,124,829 UART: [art] Erasing AUTHORITY.KEYID = 7
32,126,345 UART: [art] PUB.X = D8B46D2870E25D2490A484C89B8E0B6100871C896E5C5352DA3BDB0049FBF7AE09E82CBA618248B33D2EC83DF10C0BDF
32,133,598 UART: [art] PUB.Y = C11CFF9A6007EF2675386045A11D79ADF1C2043E0ECEFB21B76E7C480FE2534E9B4DB2134B597AE0DAB7E6D4AC00EBDE
32,140,863 UART: [art] SIG.R = 1516C0ED2C8D5B39D38935630085566A31E1B18F7EDDDE26AFECB513A051FFA8162AB5D28A46D78BF14468F012486EBB
32,148,212 UART: [art] SIG.S = A2DDA61D807366069DB46EDC4537136EB3F5ECB334EBBD33EA5386483DCB0D5B4348D4AAD8896B02038319E7412DEC4D
33,453,471 UART: Caliptra RT
33,454,182 UART: [state] CFI Enabled
33,613,918 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.16s
Truncated 9072 bytes from beginning
24,423,557 UART: [state] Locking Datavault
24,428,974 UART: [state] Locking PCR0, PCR1 and PCR31
24,430,654 UART: [state] Locking ICCM
24,432,621 UART: [exit] Launching FMC @ 0x40000130
24,441,343 UART:
24,441,571 UART: Running Caliptra FMC ...
24,442,665 UART:
24,442,819 UART: [state] CFI Enabled
24,450,823 UART: [fht] FMC Alias Private Key: 7
26,781,288 UART: [art] Extend RT PCRs Done
26,782,517 UART: [art] Lock RT PCRs Done
26,783,882 UART: [art] Populate DV Done
26,789,237 UART: [fht] FMC Alias Private Key: 7
26,790,816 UART: [art] Derive CDI
26,791,549 UART: [art] Store in in slot 0x4
26,833,922 UART: [art] Derive Key Pair
26,834,957 UART: [art] Store priv key in slot 0x5
30,076,877 UART: [art] Derive Key Pair - Done
30,090,091 UART: [art] Signing Cert with AUTHO
30,091,394 UART: RITY.KEYID = 7
32,370,957 UART: [art] Erasing AUTHORITY.KEYID = 7
32,372,467 UART: [art] PUB.X = 5678F9CEBAF3277DF4F5C25B1BEF49D398D29B76AE0750EA142532ED7610F4DFB4BA6190122B3A5A4F87235AFFAC5652
32,379,764 UART: [art] PUB.Y = ECDAEE2C9EA42FA335F6493B4E80C734956C25349D7042094931767D095274089D0F934B81451DD4C32A3B612BBABBC1
32,386,985 UART: [art] SIG.R = 0E2C0C55B96BAC9923793A40DEB171B5B649731C731483E6EDF5166FC8FAD1A821F5EBD923552E1434133891CA4202B3
32,394,383 UART: [art] SIG.S = 56AB96259D80F6C7C6119D86C501615FF5A96266F56A71C900F9D14408C1C9AC809E6CCCB12BEC045DD1A8914EAAD99A
33,698,826 UART: Caliptra RT
33,699,540 UART: [state] CFI Enabled
33,816,776 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
5,539 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,493 UART:
192,864 UART: Running Caliptra ROM ...
194,037 UART:
603,580 UART: [state] CFI Enabled
618,830 UART: [state] LifecycleState = Unprovisioned
621,194 UART: [state] DebugLocked = No
622,762 UART: [state] WD Timer not started. Device not locked for debugging
627,568 UART: [kat] SHA2-256
809,567 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,072 UART: [kat] ++
821,581 UART: [kat] sha1
833,102 UART: [kat] SHA2-256
836,107 UART: [kat] SHA2-384
842,530 UART: [kat] SHA2-512-ACC
845,135 UART: [kat] ECC-384
4,099,882 UART: [kat] HMAC-384Kdf
4,112,452 UART: [kat] LMS
5,185,565 UART: [kat] --
5,190,762 UART: [cold-reset] ++
5,193,049 UART: [fht] FHT @ 0x50003400
5,203,115 UART: [idev] ++
5,203,780 UART: [idev] CDI.KEYID = 6
5,204,934 UART: [idev] SUBJECT.KEYID = 7
5,206,413 UART: [idev] UDS.KEYID = 0
5,222,198 UART: [idev] Erasing UDS.KEYID = 0
8,494,366 UART: [idev] Sha384 KeyId Algorithm
8,504,176 UART: [idev] --
8,509,523 UART: [ldev] ++
8,510,089 UART: [ldev] CDI.KEYID = 6
8,511,273 UART: [ldev] SUBJECT.KEYID = 5
8,512,762 UART: [ldev] AUTHORITY.KEYID = 7
8,514,319 UART: [ldev] FE.KEYID = 1
8,524,802 UART: [ldev] Erasing FE.KEYID = 1
11,815,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,108,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,125,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,141,112 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
14,157,091 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
14,177,782 UART: [ldev] --
14,182,180 UART: [fwproc] Wait for Commands...
14,185,303 UART: [fwproc] Recv command 0x46574c44
14,187,618 UART: [fwproc] Recv'd Img size: 114124 bytes
18,265,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,344,080 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,412,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,729,572 >>> mbox cmd response: success
18,733,623 UART: [afmc] ++
18,734,203 UART: [afmc] CDI.KEYID = 6
18,735,438 UART: [afmc] SUBJECT.KEYID = 7
18,736,592 UART: [afmc] AUTHORITY.KEYID = 5
22,059,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,350,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,352,394 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,368,563 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,384,658 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,400,627 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,422,382 UART: [afmc] --
24,426,465 UART: [cold-reset] --
24,430,976 UART: [state] Locking Datavault
24,436,436 UART: [state] Locking PCR0, PCR1 and PCR31
24,438,127 UART: [state] Locking ICCM
24,440,773 UART: [exit] Launching FMC @ 0x40000130
24,449,438 UART:
24,449,664 UART: Running Caliptra FMC ...
24,450,759 UART:
24,450,919 UART: [state] CFI Enabled
24,459,177 UART: [fht] FMC Alias Private Key: 7
26,790,104 UART: [art] Extend RT PCRs Done
26,791,743 UART: [art] Lock RT PCRs Done
26,792,867 UART: [art] Populate DV Done
26,798,241 UART: [fht] FMC Alias Private Key: 7
26,799,933 UART: [art] Derive CDI
26,800,665 UART: [art] Store in in slot 0x4
26,842,987 UART: [art] Derive Key Pair
26,843,983 UART: [art] Store priv key in slot 0x5
30,086,533 UART: [art] Derive Key Pair - Done
30,099,609 UART: [art] Signing Cert with AUTHO
30,100,935 UART: RITY.KEYID = 7
32,380,110 UART: [art] Erasing AUTHORITY.KEYID = 7
32,381,623 UART: [art] PUB.X = D4192911ECC64881EFBF0CAD67898797F32BFF8031962163C0A641CD0FA68CEA2A61CCEEE560F0D5D2A9EDD8C5EC2F91
32,388,870 UART: [art] PUB.Y = 6CFF28C2DE83E088CD8A7609E4613E067F7394895455B97B0D937DAAAE3C501B3E393B738F91AF5A5BE946F68D267AE5
32,396,072 UART: [art] SIG.R = 591D5AB925FF86CCC8810C8812BEEBA0A6BDE6F2685647D4D5EF4D7DB8318897AC915FA01851C40EAFC39F6E6002E553
32,403,476 UART: [art] SIG.S = 69127FDBF2AC8600E7CB803A52273D993FC1F43B2F1EED1ECE2FD8A1182A722BE89E027BC057DE9ABCC6CBBF52EC6212
33,708,483 UART: Caliptra RT
33,709,194 UART: [state] CFI Enabled
33,825,983 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
5,956 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,407 UART:
192,802 UART: Running Caliptra ROM ...
193,913 UART:
603,522 UART: [state] CFI Enabled
617,319 UART: [state] LifecycleState = Unprovisioned
619,371 UART: [state] DebugLocked = No
621,618 UART: [state] WD Timer not started. Device not locked for debugging
626,447 UART: [kat] SHA2-256
808,447 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,990 UART: [kat] ++
820,507 UART: [kat] sha1
831,817 UART: [kat] SHA2-256
834,817 UART: [kat] SHA2-384
840,849 UART: [kat] SHA2-512-ACC
843,456 UART: [kat] ECC-384
4,100,063 UART: [kat] HMAC-384Kdf
4,113,230 UART: [kat] LMS
5,186,372 UART: [kat] --
5,191,142 UART: [cold-reset] ++
5,193,342 UART: [fht] FHT @ 0x50003400
5,203,885 UART: [idev] ++
5,204,548 UART: [idev] CDI.KEYID = 6
5,205,699 UART: [idev] SUBJECT.KEYID = 7
5,207,230 UART: [idev] UDS.KEYID = 0
5,222,534 UART: [idev] Erasing UDS.KEYID = 0
8,494,355 UART: [idev] Fuse KeyId
8,498,558 UART: [idev] --
8,501,632 UART: [ldev] ++
8,502,373 UART: [ldev] CDI.KEYID = 6
8,503,551 UART: [ldev] SUBJECT.KEYID = 5
8,505,398 UART: [ldev] AUTHORITY.KEYID = 7
8,506,595 UART: [ldev] FE.KEYID = 1
8,517,893 UART: [ldev] Erasing FE.KEYID = 1
11,809,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,101,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,118,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,134,279 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
14,150,239 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
14,171,717 UART: [ldev] --
14,176,814 UART: [fwproc] Wait for Commands...
14,179,824 UART: [fwproc] Recv command 0x46574c44
14,181,807 UART: [fwproc] Recv'd Img size: 114124 bytes
18,254,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,328,316 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,397,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,713,787 >>> mbox cmd response: success
18,717,560 UART: [afmc] ++
18,718,144 UART: [afmc] CDI.KEYID = 6
18,719,321 UART: [afmc] SUBJECT.KEYID = 7
18,720,471 UART: [afmc] AUTHORITY.KEYID = 5
22,039,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,333,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,335,783 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,351,955 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,368,036 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,384,003 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,408,067 UART: [afmc] --
24,411,712 UART: [cold-reset] --
24,415,859 UART: [state] Locking Datavault
24,420,621 UART: [state] Locking PCR0, PCR1 and PCR31
24,422,253 UART: [state] Locking ICCM
24,425,087 UART: [exit] Launching FMC @ 0x40000130
24,433,749 UART:
24,433,982 UART: Running Caliptra FMC ...
24,435,003 UART:
24,435,150 UART: [state] CFI Enabled
24,443,134 UART: [fht] FMC Alias Private Key: 7
26,773,840 UART: [art] Extend RT PCRs Done
26,775,065 UART: [art] Lock RT PCRs Done
26,777,035 UART: [art] Populate DV Done
26,782,498 UART: [fht] FMC Alias Private Key: 7
26,783,975 UART: [art] Derive CDI
26,784,732 UART: [art] Store in in slot 0x4
26,827,104 UART: [art] Derive Key Pair
26,828,157 UART: [art] Store priv key in slot 0x5
30,070,124 UART: [art] Derive Key Pair - Done
30,082,806 UART: [art] Signing Cert with AUTHO
30,084,116 UART: RITY.KEYID = 7
32,363,661 UART: [art] Erasing AUTHORITY.KEYID = 7
32,365,171 UART: [art] PUB.X = 7D2196BBF5A366703EC73E2BC608C7A683FA8E81CF7D45C2E54071687ADB63A1AE5BAB5CE116EC827D6B93963B3F0CE5
32,372,405 UART: [art] PUB.Y = 67E249931AF554EEEE7341DE39A9D17C2D14E88D98C2818F11DD8840796FB39A8B302524ACC4E46381985556325AE727
32,379,624 UART: [art] SIG.R = 3D8C68E7F46D954AC71A36183C066139F3D860D283A1664092189AAE3B4C43E1B93BFD0EBD469C0762EF541E7409AEDA
32,386,999 UART: [art] SIG.S = 895461750ACC881DB7E339D944282F1B1EC0F0FF65BB6EE2B3F4F5CD1D42FFA0F9954D6652F744CB5249E74E90FD8507
33,692,321 UART: Caliptra RT
33,693,039 UART: [state] CFI Enabled
33,810,996 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
5,801 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,547,298 >>> mbox cmd response: success
24,189,597 UART:
24,190,016 UART: Running Caliptra FMC ...
24,191,168 UART:
24,191,315 UART: [state] CFI Enabled
24,199,296 UART: [fht] FMC Alias Private Key: 7
26,529,678 UART: [art] Extend RT PCRs Done
26,530,899 UART: [art] Lock RT PCRs Done
26,532,566 UART: [art] Populate DV Done
26,538,034 UART: [fht] FMC Alias Private Key: 7
26,539,706 UART: [art] Derive CDI
26,540,439 UART: [art] Store in in slot 0x4
26,583,133 UART: [art] Derive Key Pair
26,584,130 UART: [art] Store priv key in slot 0x5
29,826,082 UART: [art] Derive Key Pair - Done
29,839,030 UART: [art] Signing Cert with AUTHO
29,840,340 UART: RITY.KEYID = 7
32,119,710 UART: [art] Erasing AUTHORITY.KEYID = 7
32,121,222 UART: [art] PUB.X = A6899D9395F71AB8ACCF7A6D5C62417818FDE4130FE5A77AD4A99C3C2BD6D6A27694EE22D5F7685FBBB06989D879F0B2
32,128,472 UART: [art] PUB.Y = 5383F467CB7B550423E3C0C0A4BAD184D9F3FEA28111FB7D3D0F882C839D196D1FAA1FA4099647B6459C199AB73413AD
32,135,713 UART: [art] SIG.R = 8433FEF76F03B0DFCB55C62ABF37D0A1FB261F0F87BF0749DA963CBFBA163727E502DF53B6FEDB1477FC6F557412867B
32,143,122 UART: [art] SIG.S = 9C8D15CE0F781FEF88B919E921A6A119A79464A16977155BFAE6C263FB2D401963DFC78FB84E038665D45EA826F57977
33,448,168 UART: Caliptra RT
33,448,881 UART: [state] CFI Enabled
33,566,152 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
5,195 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,512,888 >>> mbox cmd response: success
24,152,604 UART:
24,152,996 UART: Running Caliptra FMC ...
24,154,162 UART:
24,154,324 UART: [state] CFI Enabled
24,161,933 UART: [fht] FMC Alias Private Key: 7
26,493,102 UART: [art] Extend RT PCRs Done
26,494,336 UART: [art] Lock RT PCRs Done
26,495,960 UART: [art] Populate DV Done
26,501,691 UART: [fht] FMC Alias Private Key: 7
26,503,341 UART: [art] Derive CDI
26,504,151 UART: [art] Store in in slot 0x4
26,547,177 UART: [art] Derive Key Pair
26,548,185 UART: [art] Store priv key in slot 0x5
29,790,157 UART: [art] Derive Key Pair - Done
29,803,471 UART: [art] Signing Cert with AUTHO
29,804,790 UART: RITY.KEYID = 7
32,083,771 UART: [art] Erasing AUTHORITY.KEYID = 7
32,085,287 UART: [art] PUB.X = 7DA5A72B1A634D9D38D0E1ED044E9C268B55C531FE7F851F6D4DCFB91DB4355C35240FCDC10EEF594564F3CBB41CF8C1
32,092,530 UART: [art] PUB.Y = BAC592743D056DE640F5B7F83BBF08142DF18B08C34C6BC3E33DDB8236711455424688AEF95DB0CAA1FE68849B9BEB76
32,099,792 UART: [art] SIG.R = 81EE187A47AF86783AA73DCE0D1CB3C859DFF3E820D31BD4AFB726EB5C80724882EA5E28DBCDC52ACACB99E3786D79C3
32,107,246 UART: [art] SIG.S = FCFA7044B5A51DCF375A28D841F26B077C347BCC7CB76D41B873C78075C4DCA658E8D6EB20E01E0F1F4F7EB00E1B4626
33,412,493 UART: Caliptra RT
33,413,205 UART: [state] CFI Enabled
33,531,291 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
5,411 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,519,968 >>> mbox cmd response: success
24,151,547 UART:
24,151,935 UART: Running Caliptra FMC ...
24,153,146 UART:
24,153,313 UART: [state] CFI Enabled
24,160,973 UART: [fht] FMC Alias Private Key: 7
26,491,975 UART: [art] Extend RT PCRs Done
26,493,201 UART: [art] Lock RT PCRs Done
26,495,149 UART: [art] Populate DV Done
26,500,786 UART: [fht] FMC Alias Private Key: 7
26,502,485 UART: [art] Derive CDI
26,503,291 UART: [art] Store in in slot 0x4
26,545,829 UART: [art] Derive Key Pair
26,546,875 UART: [art] Store priv key in slot 0x5
29,788,654 UART: [art] Derive Key Pair - Done
29,801,540 UART: [art] Signing Cert with AUTHO
29,803,030 UART: RITY.KEYID = 7
32,082,279 UART: [art] Erasing AUTHORITY.KEYID = 7
32,083,787 UART: [art] PUB.X = 5961EA24B403A96E65FC0EA7013AC23275DC6F74DA16258A7BC031CBD0ECFFFD4E901528ADE97DE2332CC766C9C4BB8C
32,091,039 UART: [art] PUB.Y = 5ECCAF13008D4FBE2D5DF2EDED03D77101F26426FB4F49AD02859AC5F1C28ABC71B6C81399ECBE69DEAF15E5E8C8BBE4
32,098,300 UART: [art] SIG.R = 7BD6BB97A75637B9CD2B21F6B8EDB4CA37F43F90DC5905E78F66DF16A5F0525E047107D5ACF165B32C8998425B2E96A2
32,105,740 UART: [art] SIG.S = B38DAD771A2A5CC6FA351162B1DE06BDBE9CEA416C7B647B81F8F0B3059C9CEE23481B5F4B9359D8C1040B476E7FBD70
33,410,720 UART: Caliptra RT
33,411,436 UART: [state] CFI Enabled
33,529,198 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
5,542 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,512,035 >>> mbox cmd response: success
24,147,888 UART:
24,148,306 UART: Running Caliptra FMC ...
24,149,467 UART:
24,149,628 UART: [state] CFI Enabled
24,157,848 UART: [fht] FMC Alias Private Key: 7
26,488,752 UART: [art] Extend RT PCRs Done
26,489,979 UART: [art] Lock RT PCRs Done
26,491,707 UART: [art] Populate DV Done
26,497,008 UART: [fht] FMC Alias Private Key: 7
26,498,613 UART: [art] Derive CDI
26,499,428 UART: [art] Store in in slot 0x4
26,542,241 UART: [art] Derive Key Pair
26,543,279 UART: [art] Store priv key in slot 0x5
29,785,603 UART: [art] Derive Key Pair - Done
29,798,601 UART: [art] Signing Cert with AUTHO
29,799,908 UART: RITY.KEYID = 7
32,079,329 UART: [art] Erasing AUTHORITY.KEYID = 7
32,080,846 UART: [art] PUB.X = 45832FC3D6B4A486E90BA6EAB31A783D50CEDCA964EA33CA6541C599BD794C36434C820A88B3555E9B0893556341B053
32,088,113 UART: [art] PUB.Y = 0DEA855BC7E5D1D62E978965B1E4277C2D6C81F9F75241B7C4C0BF0FB9AEA2978A15F319A24EE1298D30F67D651ACD07
32,095,316 UART: [art] SIG.R = 8D566EB7A1AD2A42A0FE0BB0312592388CA760E88964D3696836E809B8DCD32D14FFDA2107E071E474747A6E7D78AD69
32,102,708 UART: [art] SIG.S = 1B05CDC07698BD76B4D4924AA386A599B7F65DC92C638817E7A33388F937BCC77F23367F2C5E19566BFD4007DEFC5467
33,407,944 UART: Caliptra RT
33,408,632 UART: [state] CFI Enabled
33,526,508 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.14s
Truncated 9072 bytes from beginning
18,617,228 UART: [state] Locking Datavault
18,621,338 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,982 UART: [state] Locking ICCM
18,625,670 UART: [exit] Launching FMC @ 0x40000130
18,634,121 UART:
18,634,376 UART: Running Caliptra FMC ...
18,635,481 UART:
18,635,641 UART: [state] CFI Enabled
18,694,597 UART: [fht] FMC Alias Private Key: 7
20,458,787 UART: [art] Extend RT PCRs Done
20,460,002 UART: [art] Lock RT PCRs Done
20,461,580 UART: [art] Populate DV Done
20,466,774 UART: [fht] FMC Alias Private Key: 7
20,468,367 UART: [art] Derive CDI
20,469,185 UART: [art] Store in in slot 0x4
20,527,199 UART: [art] Derive Key Pair
20,528,239 UART: [art] Store priv key in slot 0x5
22,990,431 UART: [art] Derive Key Pair - Done
23,003,416 UART: [art] Signing Cert with AUTHO
23,004,762 UART: RITY.KEYID = 7
24,717,001 UART: [art] Erasing AUTHORITY.KEYID = 7
24,718,539 UART: [art] PUB.X = 6792902418ED3A4318D1242C72BBFAD8B81137AFEEAFBE2FDFB8F91F1C15971B65DA97BC60F7CF1F3BC6DD04B9B8F755
24,725,806 UART: [art] PUB.Y = 80A28737663DC6EBAF87FE964F4BA6B1E3852CEEF8819CB1C68A7927BEACE7E57849E021385CD14DB8E20240DFDDF32E
24,733,104 UART: [art] SIG.R = 537238E78AB33063303A4F2FA5963BC76F9D079EAFF65D7F6911489D7A1365FA89E2D4C3EA305A387DD17CF6B3F77812
24,740,500 UART: [art] SIG.S = 9FA79A3898C91C3C80727EB58185FCB9DD9292187FF781DAC442050601877E3210C28C4F1060A8A5B5BDCCAD4FC05667
25,719,050 UART: Caliptra RT
25,719,744 UART: [state] CFI Enabled
25,884,577 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
4,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,071 UART:
192,464 UART: Running Caliptra ROM ...
193,650 UART:
193,804 UART: [state] CFI Enabled
265,874 UART: [state] LifecycleState = Unprovisioned
267,790 UART: [state] DebugLocked = No
270,036 UART: [state] WD Timer not started. Device not locked for debugging
274,526 UART: [kat] SHA2-256
453,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,235 UART: [kat] ++
465,768 UART: [kat] sha1
477,479 UART: [kat] SHA2-256
480,499 UART: [kat] SHA2-384
487,237 UART: [kat] SHA2-512-ACC
490,187 UART: [kat] ECC-384
2,948,355 UART: [kat] HMAC-384Kdf
2,970,573 UART: [kat] LMS
3,500,030 UART: [kat] --
3,504,247 UART: [cold-reset] ++
3,505,686 UART: [fht] FHT @ 0x50003400
3,516,020 UART: [idev] ++
3,516,594 UART: [idev] CDI.KEYID = 6
3,517,485 UART: [idev] SUBJECT.KEYID = 7
3,518,704 UART: [idev] UDS.KEYID = 0
3,542,022 UART: [idev] Erasing UDS.KEYID = 0
6,027,005 UART: [idev] Sha384 KeyId Algorithm
6,036,441 UART: [idev] --
6,039,098 UART: [ldev] ++
6,039,675 UART: [ldev] CDI.KEYID = 6
6,040,566 UART: [ldev] SUBJECT.KEYID = 5
6,041,642 UART: [ldev] AUTHORITY.KEYID = 7
6,042,895 UART: [ldev] FE.KEYID = 1
6,077,472 UART: [ldev] Erasing FE.KEYID = 1
8,582,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,845 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,365,662 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,386,132 UART: [ldev] --
10,391,179 UART: [fwproc] Wait for Commands...
10,392,688 UART: [fwproc] Recv command 0x46574c44
10,394,791 UART: [fwproc] Recv'd Img size: 114448 bytes
13,798,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,511 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,941,321 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,259,320 >>> mbox cmd response: success
14,263,758 UART: [afmc] ++
14,264,346 UART: [afmc] CDI.KEYID = 6
14,265,230 UART: [afmc] SUBJECT.KEYID = 7
14,266,392 UART: [afmc] AUTHORITY.KEYID = 5
16,802,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,399 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,338 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,028 UART: [afmc] --
18,607,169 UART: [cold-reset] --
18,611,786 UART: [state] Locking Datavault
18,615,925 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,574 UART: [state] Locking ICCM
18,619,455 UART: [exit] Launching FMC @ 0x40000130
18,627,904 UART:
18,628,138 UART: Running Caliptra FMC ...
18,629,240 UART:
18,629,402 UART: [state] CFI Enabled
18,690,482 UART: [fht] FMC Alias Private Key: 7
20,454,717 UART: [art] Extend RT PCRs Done
20,455,965 UART: [art] Lock RT PCRs Done
20,457,724 UART: [art] Populate DV Done
20,462,970 UART: [fht] FMC Alias Private Key: 7
20,464,559 UART: [art] Derive CDI
20,465,377 UART: [art] Store in in slot 0x4
20,522,900 UART: [art] Derive Key Pair
20,523,944 UART: [art] Store priv key in slot 0x5
22,986,846 UART: [art] Derive Key Pair - Done
22,999,982 UART: [art] Signing Cert with AUTHO
23,001,295 UART: RITY.KEYID = 7
24,713,137 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,660 UART: [art] PUB.X = DCD1E0B36937BF31615EE0D9AF193F50CA3F9F8C631C9835E1F641622A4E79F7AB38FE5A4B1C84AF3493FD45D8127981
24,721,931 UART: [art] PUB.Y = 5CC5786E90C3588B60E77050BA3E0B2F7F52CE69F02F9D6F75694764403D66BE2E139801516CEE87839034BEB9AF9875
24,729,179 UART: [art] SIG.R = 09FCD267F2CF42C6CD452A3826189F159308CF5BC7AD212583CE0CBB5C63E7489261F8A5D844142A704A94E1FC94D8FD
24,736,582 UART: [art] SIG.S = BF107FC561F3882B36D31C84286B90A7B73F9425733C69511555569EB2925533D0B8E28AC1D5A8DB6AD3B619E1726E13
25,715,130 UART: Caliptra RT
25,715,840 UART: [state] CFI Enabled
25,881,277 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
5,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,423 UART:
192,790 UART: Running Caliptra ROM ...
193,954 UART:
194,107 UART: [state] CFI Enabled
264,247 UART: [state] LifecycleState = Unprovisioned
266,170 UART: [state] DebugLocked = No
267,990 UART: [state] WD Timer not started. Device not locked for debugging
271,775 UART: [kat] SHA2-256
450,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,453 UART: [kat] ++
462,993 UART: [kat] sha1
474,039 UART: [kat] SHA2-256
477,114 UART: [kat] SHA2-384
483,737 UART: [kat] SHA2-512-ACC
486,672 UART: [kat] ECC-384
2,947,339 UART: [kat] HMAC-384Kdf
2,964,993 UART: [kat] LMS
3,494,467 UART: [kat] --
3,499,096 UART: [cold-reset] ++
3,500,916 UART: [fht] FHT @ 0x50003400
3,512,483 UART: [idev] ++
3,513,046 UART: [idev] CDI.KEYID = 6
3,514,013 UART: [idev] SUBJECT.KEYID = 7
3,515,175 UART: [idev] UDS.KEYID = 0
3,535,871 UART: [idev] Erasing UDS.KEYID = 0
6,018,023 UART: [idev] Fuse KeyId
6,022,002 UART: [idev] --
6,026,481 UART: [ldev] ++
6,027,092 UART: [ldev] CDI.KEYID = 6
6,027,992 UART: [ldev] SUBJECT.KEYID = 5
6,029,046 UART: [ldev] AUTHORITY.KEYID = 7
6,030,407 UART: [ldev] FE.KEYID = 1
6,071,478 UART: [ldev] Erasing FE.KEYID = 1
8,578,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,614 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,360,371 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,381,651 UART: [ldev] --
10,386,226 UART: [fwproc] Wait for Commands...
10,388,243 UART: [fwproc] Recv command 0x46574c44
10,390,349 UART: [fwproc] Recv'd Img size: 114448 bytes
13,791,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,860,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,929,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,247,701 >>> mbox cmd response: success
14,251,867 UART: [afmc] ++
14,252,468 UART: [afmc] CDI.KEYID = 6
14,253,354 UART: [afmc] SUBJECT.KEYID = 7
14,254,575 UART: [afmc] AUTHORITY.KEYID = 5
16,780,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,504,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,505,991 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,521,943 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,537,976 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,553,814 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,577,359 UART: [afmc] --
18,581,777 UART: [cold-reset] --
18,586,284 UART: [state] Locking Datavault
18,591,426 UART: [state] Locking PCR0, PCR1 and PCR31
18,593,137 UART: [state] Locking ICCM
18,594,259 UART: [exit] Launching FMC @ 0x40000130
18,602,709 UART:
18,602,946 UART: Running Caliptra FMC ...
18,604,045 UART:
18,604,206 UART: [state] CFI Enabled
18,663,219 UART: [fht] FMC Alias Private Key: 7
20,428,000 UART: [art] Extend RT PCRs Done
20,429,230 UART: [art] Lock RT PCRs Done
20,430,773 UART: [art] Populate DV Done
20,436,020 UART: [fht] FMC Alias Private Key: 7
20,437,509 UART: [art] Derive CDI
20,438,264 UART: [art] Store in in slot 0x4
20,496,239 UART: [art] Derive Key Pair
20,497,279 UART: [art] Store priv key in slot 0x5
22,960,189 UART: [art] Derive Key Pair - Done
22,973,245 UART: [art] Signing Cert with AUTHO
22,974,549 UART: RITY.KEYID = 7
24,685,949 UART: [art] Erasing AUTHORITY.KEYID = 7
24,687,450 UART: [art] PUB.X = 71F06B01C935851D371C5F4271B22CB085AEAF0DD588C129F363D187E703511A86D27E4AA9BB866B9C9635BFA3B8CB30
24,694,739 UART: [art] PUB.Y = 64789BBF29FC02915331A8B1011737B392A2257D6B0C1DABB1209174CB49423162A77A12EFBA895D2C3EF5B3B5F6A28E
24,701,989 UART: [art] SIG.R = 1EAE802685FF521514FE131FE0715882617E086996DDCD82A3EF6B14998D0BDEAEE344E05E3D427910D2ECB83104247A
24,709,388 UART: [art] SIG.S = CBF90C0D45EEF5AD96D037AE01C638A82226A6C6750BEBCFC2B6D0E833DD912DB051B54ADF931F434E7A0DEE1279075A
25,688,443 UART: Caliptra RT
25,689,144 UART: [state] CFI Enabled
25,854,450 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
5,287 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,075,397 >>> mbox cmd response: success
18,365,778 UART:
18,366,192 UART: Running Caliptra FMC ...
18,367,323 UART:
18,367,486 UART: [state] CFI Enabled
18,434,786 UART: [fht] FMC Alias Private Key: 7
20,198,421 UART: [art] Extend RT PCRs Done
20,199,643 UART: [art] Lock RT PCRs Done
20,200,942 UART: [art] Populate DV Done
20,206,475 UART: [fht] FMC Alias Private Key: 7
20,208,016 UART: [art] Derive CDI
20,208,835 UART: [art] Store in in slot 0x4
20,266,857 UART: [art] Derive Key Pair
20,267,892 UART: [art] Store priv key in slot 0x5
22,730,984 UART: [art] Derive Key Pair - Done
22,743,874 UART: [art] Signing Cert with AUTHO
22,745,171 UART: RITY.KEYID = 7
24,457,006 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,527 UART: [art] PUB.X = 65E58E8B3EB7EEE6A1E8FD4D6D95BC9DED09B33B99AE76A72CFC7128F27688239F32EAA64D164794BDB36C3C878A7F37
24,465,829 UART: [art] PUB.Y = 6ABC81D647FDF768993938B0131A73090FC9220C7F202637D8C9D6040707FCA968BFEBA68C3F962F5BCEDA6E18C99CE5
24,473,090 UART: [art] SIG.R = 8F8F2C6541EC14CB580332EB93A174290248126CDB5190042B473BD818FC887C1B6FE28C3746E208EE24173B3CAD3D4C
24,480,506 UART: [art] SIG.S = 1A59F94555ED1DC4841B4FE4FD1A9BC615A638EBA3F64EADAB1F2C1A13217E35A86025D977B50DB25E7C9373466E776A
25,459,578 UART: Caliptra RT
25,460,291 UART: [state] CFI Enabled
25,625,001 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
5,104 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,073,379 >>> mbox cmd response: success
18,368,042 UART:
18,368,437 UART: Running Caliptra FMC ...
18,369,548 UART:
18,369,698 UART: [state] CFI Enabled
18,432,252 UART: [fht] FMC Alias Private Key: 7
20,196,367 UART: [art] Extend RT PCRs Done
20,197,593 UART: [art] Lock RT PCRs Done
20,199,356 UART: [art] Populate DV Done
20,204,873 UART: [fht] FMC Alias Private Key: 7
20,206,579 UART: [art] Derive CDI
20,207,404 UART: [art] Store in in slot 0x4
20,265,380 UART: [art] Derive Key Pair
20,266,443 UART: [art] Store priv key in slot 0x5
22,729,524 UART: [art] Derive Key Pair - Done
22,742,642 UART: [art] Signing Cert with AUTHO
22,743,947 UART: RITY.KEYID = 7
24,455,675 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,165 UART: [art] PUB.X = B03F3D4A4673171705B5814D7803494398397A1D206BD5163E24FFFA7B55C55843630537510E63A1961CC21CCF23E98A
24,464,423 UART: [art] PUB.Y = 1B234EFB43355BA318974E3D61C006300051BE107A15168BC813E7FBA93B6785C6859B7CC7060D02B5115CB4342E2A9C
24,471,657 UART: [art] SIG.R = A2015815C4A6A3C29897B8E461254CC0560E797310E7ABF0119F460C60B3AAB961C295F40C8DB15AB20A2460B3169502
24,479,008 UART: [art] SIG.S = 2C284BC47694B982CD5CF399278586839170F29DDEF61F2A4E4266C2252640A247FF544384B9F3D9D377F63A6471782D
25,457,402 UART: Caliptra RT
25,458,118 UART: [state] CFI Enabled
25,623,448 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
5,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,033,422 >>> mbox cmd response: success
18,321,114 UART:
18,321,509 UART: Running Caliptra FMC ...
18,322,656 UART:
18,322,811 UART: [state] CFI Enabled
18,387,392 UART: [fht] FMC Alias Private Key: 7
20,151,921 UART: [art] Extend RT PCRs Done
20,153,148 UART: [art] Lock RT PCRs Done
20,154,881 UART: [art] Populate DV Done
20,160,457 UART: [fht] FMC Alias Private Key: 7
20,161,948 UART: [art] Derive CDI
20,162,721 UART: [art] Store in in slot 0x4
20,220,363 UART: [art] Derive Key Pair
20,221,403 UART: [art] Store priv key in slot 0x5
22,684,350 UART: [art] Derive Key Pair - Done
22,697,615 UART: [art] Signing Cert with AUTHO
22,698,914 UART: RITY.KEYID = 7
24,410,228 UART: [art] Erasing AUTHORITY.KEYID = 7
24,411,737 UART: [art] PUB.X = 5A9A1C6A811FCF8B530AFEA16B3DE4883E89E7CC476525305294172533D58E81350A7DBD19A675B780CF3480283CEF02
24,418,984 UART: [art] PUB.Y = 0B69B3137B7153AA4C016ABE949707E311528247AB4B70D03799919E98BAC30CDF6119E77AA569BCEDF4B4BA99A19BA2
24,426,247 UART: [art] SIG.R = 779A9EEAAA361E804686DC7A939C19AE2A002B21CF7ABF8F651310A419A35E8DACA93BAC066C5D60843EDC655A6C7588
24,433,641 UART: [art] SIG.S = 0AE80434B4D18B597896761447618DB5E57E4D3766E186A86F6823F95E366F4A18DCBFA421445B457D451F1E02F86F57
25,412,944 UART: Caliptra RT
25,413,639 UART: [state] CFI Enabled
25,577,725 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
4,811 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,055,173 >>> mbox cmd response: success
18,348,389 UART:
18,348,797 UART: Running Caliptra FMC ...
18,350,121 UART:
18,350,296 UART: [state] CFI Enabled
18,414,018 UART: [fht] FMC Alias Private Key: 7
20,177,980 UART: [art] Extend RT PCRs Done
20,179,204 UART: [art] Lock RT PCRs Done
20,180,837 UART: [art] Populate DV Done
20,186,251 UART: [fht] FMC Alias Private Key: 7
20,187,887 UART: [art] Derive CDI
20,188,632 UART: [art] Store in in slot 0x4
20,246,269 UART: [art] Derive Key Pair
20,247,272 UART: [art] Store priv key in slot 0x5
22,724,091 UART: [art] Derive Key Pair - Done
22,736,613 UART: [art] Signing Cert with AUTHO
22,737,949 UART: RITY.KEYID = 7
24,449,561 UART: [art] Erasing AUTHORITY.KEYID = 7
24,451,077 UART: [art] PUB.X = 34BEADEF07052163B6089122AFAD1F0AE518BF2FDC8E0C98208006DBE49A79D62E0E0B8F369DBFD0AF35878DE2060206
24,458,385 UART: [art] PUB.Y = 8C620C26A4389574CB3DCDC96B443224799CBE91729F9D125483AE8C2E0541F9A80AF0B3BFD380CC06AB16FB0018528D
24,465,599 UART: [art] SIG.R = 60DC5466310A623583893D34AA3D8E27074FD4941A6DB26101D21B647306F70513BDA8B127B58A0FC89797A83CFA0973
24,473,005 UART: [art] SIG.S = 1C1C94897B7337614A056AE1B8CCA3DEA053A2BDA5B802C4DFB4B8F64986BB0DF340C57F3E0129FD148B58D1F5E4E7E6
25,452,437 UART: Caliptra RT
25,453,150 UART: [state] CFI Enabled
25,617,095 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,787,069 UART: [state] Locking Datavault
18,793,285 UART: [state] Locking PCR0, PCR1 and PCR31
18,794,923 UART: [state] Locking ICCM
18,797,612 UART: [exit] Launching FMC @ 0x40000130
18,806,058 UART:
18,806,293 UART: Running Caliptra FMC ...
18,807,575 UART:
18,807,752 UART: [state] CFI Enabled
18,815,538 UART: [fht] FMC Alias Private Key: 7
20,571,690 UART: [art] Extend RT PCRs Done
20,572,915 UART: [art] Lock RT PCRs Done
20,574,674 UART: [art] Populate DV Done
20,580,194 UART: [fht] FMC Alias Private Key: 7
20,581,792 UART: [art] Derive CDI
20,582,602 UART: [art] Store in in slot 0x4
20,625,517 UART: [art] Derive Key Pair
20,626,507 UART: [art] Store priv key in slot 0x5
23,053,223 UART: [art] Derive Key Pair - Done
23,066,059 UART: [art] Signing Cert with AUTHO
23,067,367 UART: RITY.KEYID = 7
24,773,044 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,553 UART: [art] PUB.X = 80BA1A42CD408D7EC9976B978DE633EEBA5EEB0625034386274C356EA0339F95BFC5C0926C045BF716678C5E276E80BB
24,781,793 UART: [art] PUB.Y = 5613356A61EFF3EE7F5B21A97ECC363FE2BF3D53480CA68CAEBBA791DC4C6EBEF1560C0695FBE24C570DE6F38A4CC1CB
24,789,123 UART: [art] SIG.R = 41F2AFFE99A1C329296B3506B6862399A5262D3C8836F29EC8ECE6AA3F141B6641E36BEF7D3BCC1EC00A53F00CF2B63C
24,796,513 UART: [art] SIG.S = 38D15A20A293303C89F986943C1D0F16AEFD8CB4E6B60CE2AE048E61575F75BDCB0920AE3E1BD5D391F63D669C800C15
25,775,590 UART: Caliptra RT
25,776,301 UART: [state] CFI Enabled
25,893,250 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
5,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,578 UART:
192,943 UART: Running Caliptra ROM ...
194,144 UART:
603,673 UART: [state] CFI Enabled
618,363 UART: [state] LifecycleState = Unprovisioned
620,226 UART: [state] DebugLocked = No
622,871 UART: [state] WD Timer not started. Device not locked for debugging
625,829 UART: [kat] SHA2-256
804,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,554 UART: [kat] ++
816,998 UART: [kat] sha1
829,491 UART: [kat] SHA2-256
832,499 UART: [kat] SHA2-384
837,934 UART: [kat] SHA2-512-ACC
840,911 UART: [kat] ECC-384
3,283,803 UART: [kat] HMAC-384Kdf
3,296,250 UART: [kat] LMS
3,825,735 UART: [kat] --
3,831,213 UART: [cold-reset] ++
3,833,586 UART: [fht] FHT @ 0x50003400
3,844,346 UART: [idev] ++
3,844,906 UART: [idev] CDI.KEYID = 6
3,845,914 UART: [idev] SUBJECT.KEYID = 7
3,847,064 UART: [idev] UDS.KEYID = 0
3,864,502 UART: [idev] Erasing UDS.KEYID = 0
6,324,609 UART: [idev] Sha384 KeyId Algorithm
6,334,784 UART: [idev] --
6,337,798 UART: [ldev] ++
6,338,365 UART: [ldev] CDI.KEYID = 6
6,339,242 UART: [ldev] SUBJECT.KEYID = 5
6,340,372 UART: [ldev] AUTHORITY.KEYID = 7
6,341,727 UART: [ldev] FE.KEYID = 1
6,354,316 UART: [ldev] Erasing FE.KEYID = 1
8,828,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,395 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,592,181 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,611,988 UART: [ldev] --
10,616,118 UART: [fwproc] Wait for Commands...
10,617,770 UART: [fwproc] Recv command 0x46574c44
10,619,875 UART: [fwproc] Recv'd Img size: 114448 bytes
14,017,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,083,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,152,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,471,134 >>> mbox cmd response: success
14,475,571 UART: [afmc] ++
14,476,183 UART: [afmc] CDI.KEYID = 6
14,477,096 UART: [afmc] SUBJECT.KEYID = 7
14,478,257 UART: [afmc] AUTHORITY.KEYID = 5
16,976,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,695,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,697,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,712,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,728,995 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,744,841 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,766,791 UART: [afmc] --
18,770,758 UART: [cold-reset] --
18,774,344 UART: [state] Locking Datavault
18,778,924 UART: [state] Locking PCR0, PCR1 and PCR31
18,780,633 UART: [state] Locking ICCM
18,782,837 UART: [exit] Launching FMC @ 0x40000130
18,791,234 UART:
18,791,486 UART: Running Caliptra FMC ...
18,792,588 UART:
18,792,742 UART: [state] CFI Enabled
18,801,332 UART: [fht] FMC Alias Private Key: 7
20,557,755 UART: [art] Extend RT PCRs Done
20,558,974 UART: [art] Lock RT PCRs Done
20,560,864 UART: [art] Populate DV Done
20,566,538 UART: [fht] FMC Alias Private Key: 7
20,568,240 UART: [art] Derive CDI
20,569,049 UART: [art] Store in in slot 0x4
20,611,043 UART: [art] Derive Key Pair
20,612,037 UART: [art] Store priv key in slot 0x5
23,038,068 UART: [art] Derive Key Pair - Done
23,051,170 UART: [art] Signing Cert with AUTHO
23,052,470 UART: RITY.KEYID = 7
24,758,127 UART: [art] Erasing AUTHORITY.KEYID = 7
24,759,673 UART: [art] PUB.X = 105EBAF4846D96FA9071C08ED6AE6C86799E8E2FA375F5DFE7A7A0341291E38DE9A1C47322F028024A40030B5F695761
24,766,917 UART: [art] PUB.Y = B6B5AC07E4F7E16AE7215AF00258A1DD8E533C1F96344851DA6B4DA79E6A41D21A389E92DC1058258C03E10C0E56B462
24,774,144 UART: [art] SIG.R = BE8B0851BF9111854A9D6517A238095E414371299BBE454AE28125DD6245E88F8E29479015D6B2EDD58C234728FA1EBC
24,781,566 UART: [art] SIG.S = 40872F1F2217E48FB520ADE4447C283C30DE032A4ED1CFFA0EB72611EF2285D786E400C3524F5DFF653BF81E8BB355E1
25,760,246 UART: Caliptra RT
25,760,941 UART: [state] CFI Enabled
25,878,270 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
5,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,272 UART:
192,668 UART: Running Caliptra ROM ...
193,786 UART:
603,479 UART: [state] CFI Enabled
615,698 UART: [state] LifecycleState = Unprovisioned
617,569 UART: [state] DebugLocked = No
619,615 UART: [state] WD Timer not started. Device not locked for debugging
623,664 UART: [kat] SHA2-256
802,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,363 UART: [kat] ++
814,811 UART: [kat] sha1
826,437 UART: [kat] SHA2-256
829,441 UART: [kat] SHA2-384
837,030 UART: [kat] SHA2-512-ACC
839,980 UART: [kat] ECC-384
3,278,469 UART: [kat] HMAC-384Kdf
3,290,481 UART: [kat] LMS
3,819,984 UART: [kat] --
3,823,162 UART: [cold-reset] ++
3,824,980 UART: [fht] FHT @ 0x50003400
3,836,818 UART: [idev] ++
3,837,380 UART: [idev] CDI.KEYID = 6
3,838,289 UART: [idev] SUBJECT.KEYID = 7
3,839,500 UART: [idev] UDS.KEYID = 0
3,854,878 UART: [idev] Erasing UDS.KEYID = 0
6,310,665 UART: [idev] Fuse KeyId
6,314,628 UART: [idev] --
6,317,432 UART: [ldev] ++
6,318,027 UART: [ldev] CDI.KEYID = 6
6,318,942 UART: [ldev] SUBJECT.KEYID = 5
6,320,174 UART: [ldev] AUTHORITY.KEYID = 7
6,321,302 UART: [ldev] FE.KEYID = 1
6,330,828 UART: [ldev] Erasing FE.KEYID = 1
8,805,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,525,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,541,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,557,111 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,572,878 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,594,930 UART: [ldev] --
10,599,238 UART: [fwproc] Wait for Commands...
10,601,286 UART: [fwproc] Recv command 0x46574c44
10,603,378 UART: [fwproc] Recv'd Img size: 114448 bytes
14,008,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,080,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,149,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,467,362 >>> mbox cmd response: success
14,471,926 UART: [afmc] ++
14,472,510 UART: [afmc] CDI.KEYID = 6
14,473,519 UART: [afmc] SUBJECT.KEYID = 7
14,474,559 UART: [afmc] AUTHORITY.KEYID = 5
16,976,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,693,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,695,863 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,711,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,727,812 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,743,666 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,765,014 UART: [afmc] --
18,768,943 UART: [cold-reset] --
18,773,937 UART: [state] Locking Datavault
18,777,836 UART: [state] Locking PCR0, PCR1 and PCR31
18,779,550 UART: [state] Locking ICCM
18,781,594 UART: [exit] Launching FMC @ 0x40000130
18,790,043 UART:
18,790,278 UART: Running Caliptra FMC ...
18,791,371 UART:
18,791,526 UART: [state] CFI Enabled
18,799,623 UART: [fht] FMC Alias Private Key: 7
20,556,378 UART: [art] Extend RT PCRs Done
20,557,608 UART: [art] Lock RT PCRs Done
20,559,281 UART: [art] Populate DV Done
20,564,748 UART: [fht] FMC Alias Private Key: 7
20,566,446 UART: [art] Derive CDI
20,567,257 UART: [art] Store in in slot 0x4
20,609,580 UART: [art] Derive Key Pair
20,610,613 UART: [art] Store priv key in slot 0x5
23,037,711 UART: [art] Derive Key Pair - Done
23,050,884 UART: [art] Signing Cert with AUTHO
23,052,190 UART: RITY.KEYID = 7
24,757,426 UART: [art] Erasing AUTHORITY.KEYID = 7
24,758,929 UART: [art] PUB.X = E3F6095DF046ED7708F491B0B0A07EDB121E23B0E3CBAE883AE08E554DC3DD5053B88AD08F3F63DC204121059AB26C7A
24,766,226 UART: [art] PUB.Y = 85EECE7411324828904D2F61DBB600D124F7C9D47EFF7DBA13BE3DE66AC12CD54BDC41042C9665F786ADD49E4910CFFD
24,773,460 UART: [art] SIG.R = DE1A042BB4650755CA84E5A9427D69BE713BB80E3D8D113EF1E6B6850C940AA0A779E227C65F42B93F25D601AEF847E7
24,780,848 UART: [art] SIG.S = CDA50B496A2BC08A1C1D7E355A1C39C25BBB6CCE5FA227EEA3E19EC4BC2E80BE9619961954233A59B57098CCD7DAC0C2
25,759,772 UART: Caliptra RT
25,760,482 UART: [state] CFI Enabled
25,877,468 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
5,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,286,558 >>> mbox cmd response: success
18,538,436 UART:
18,538,829 UART: Running Caliptra FMC ...
18,539,957 UART:
18,540,121 UART: [state] CFI Enabled
18,548,096 UART: [fht] FMC Alias Private Key: 7
20,304,379 UART: [art] Extend RT PCRs Done
20,305,601 UART: [art] Lock RT PCRs Done
20,307,491 UART: [art] Populate DV Done
20,313,013 UART: [fht] FMC Alias Private Key: 7
20,314,770 UART: [art] Derive CDI
20,315,591 UART: [art] Store in in slot 0x4
20,358,468 UART: [art] Derive Key Pair
20,359,510 UART: [art] Store priv key in slot 0x5
22,785,716 UART: [art] Derive Key Pair - Done
22,798,495 UART: [art] Signing Cert with AUTHO
22,799,793 UART: RITY.KEYID = 7
24,505,449 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,068 UART: [art] PUB.X = 50CF917021A438C78C874757D33224FFB22A971B4E5506D0D80C9858341DD6629E4FE720BA95CD8593C1746FDE479ED7
24,514,232 UART: [art] PUB.Y = 15152C727BE6CB7CEBB4807BA76193454381ED87A6A67D430156853B0097F7F0CAA6638648E0095E37541F58BB18BB77
24,521,458 UART: [art] SIG.R = 3B08D3B23E1C46111C4AF212212663F48FBE203D84FB581662071A4016CC0957CF9754E533BB090CDD8ED7072D34B306
24,528,823 UART: [art] SIG.S = B029E70D4CB3F25E23A5A3163C6370A6443B500FFFE509E1836CC2F4E48C49F059FF8CD8D49B02BD7ABB9C7BD93DBCBE
25,507,869 UART: Caliptra RT
25,508,568 UART: [state] CFI Enabled
25,625,410 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,473 writing to cptra_bootfsm_go
5,505 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,656 >>> mbox cmd response: success
18,524,278 UART:
18,524,665 UART: Running Caliptra FMC ...
18,525,900 UART:
18,526,070 UART: [state] CFI Enabled
18,533,740 UART: [fht] FMC Alias Private Key: 7
20,289,455 UART: [art] Extend RT PCRs Done
20,290,687 UART: [art] Lock RT PCRs Done
20,292,101 UART: [art] Populate DV Done
20,297,426 UART: [fht] FMC Alias Private Key: 7
20,299,022 UART: [art] Derive CDI
20,299,838 UART: [art] Store in in slot 0x4
20,342,439 UART: [art] Derive Key Pair
20,343,474 UART: [art] Store priv key in slot 0x5
22,770,441 UART: [art] Derive Key Pair - Done
22,783,336 UART: [art] Signing Cert with AUTHO
22,784,639 UART: RITY.KEYID = 7
24,489,819 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,324 UART: [art] PUB.X = 222E158FCE25B0F207E6C9A009E99F4DD62036AF6733F3ADBE1121DCEAEB327353DC6DD072E8229DF742A538BDE99BD9
24,498,598 UART: [art] PUB.Y = 0A611078D49EFF7534908B93A9F43ABAE877A26C792A898C8866CC8AF2DB2AAAB21E85983A666415A3EF65685CDDDC16
24,505,861 UART: [art] SIG.R = FDF574128D38FC5055E3FDD218B18F848EFF46333CF3C834B40E6BA8C2B98B41B050AD698317EC25F278B587CDAC7393
24,513,218 UART: [art] SIG.S = A7CA5DBBD67E47BA7F6579B61DE1D57C3F7C8888E4F4303C2787D519B998F4EB34FABC0C4FA8592EDA83A98507AFDC04
25,492,211 UART: Caliptra RT
25,492,920 UART: [state] CFI Enabled
25,608,906 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
5,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,253,272 >>> mbox cmd response: success
18,499,221 UART:
18,499,637 UART: Running Caliptra FMC ...
18,500,890 UART:
18,501,060 UART: [state] CFI Enabled
18,509,024 UART: [fht] FMC Alias Private Key: 7
20,265,641 UART: [art] Extend RT PCRs Done
20,266,859 UART: [art] Lock RT PCRs Done
20,268,677 UART: [art] Populate DV Done
20,274,133 UART: [fht] FMC Alias Private Key: 7
20,275,778 UART: [art] Derive CDI
20,276,586 UART: [art] Store in in slot 0x4
20,319,397 UART: [art] Derive Key Pair
20,320,391 UART: [art] Store priv key in slot 0x5
22,747,107 UART: [art] Derive Key Pair - Done
22,760,430 UART: [art] Signing Cert with AUTHO
22,761,732 UART: RITY.KEYID = 7
24,467,352 UART: [art] Erasing AUTHORITY.KEYID = 7
24,468,858 UART: [art] PUB.X = A83CD47DE718105766A956BE91405A554F3BFA4C36C4B26253D74A532B42D304EF28324894FE5D17CE28B24D12DFE139
24,476,128 UART: [art] PUB.Y = DC0AEC17F00C9E0621237C7ADF0D53A9D7A390ACCE97D826D9611D310F013B616D03E129460EBC8DD7A45E5A91ABCEBB
24,483,412 UART: [art] SIG.R = F762C34DB803469EA14129B8FBC9487CE721F41554831A3EEA49FDD95E127D69D2F8184198B010AECD97102F100C2AAC
24,490,764 UART: [art] SIG.S = 0AB68A2BB2982D19B501E5957CCE799416B62204D606F1F91534FEA3A80FFAE2BF4B31DC8516D4B560DF3FE9FE153FE4
25,469,573 UART: Caliptra RT
25,470,282 UART: [state] CFI Enabled
25,587,447 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
5,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,260,016 >>> mbox cmd response: success
18,510,646 UART:
18,511,030 UART: Running Caliptra FMC ...
18,512,167 UART:
18,512,320 UART: [state] CFI Enabled
18,520,113 UART: [fht] FMC Alias Private Key: 7
20,277,549 UART: [art] Extend RT PCRs Done
20,278,777 UART: [art] Lock RT PCRs Done
20,280,375 UART: [art] Populate DV Done
20,285,520 UART: [fht] FMC Alias Private Key: 7
20,287,112 UART: [art] Derive CDI
20,288,080 UART: [art] Store in in slot 0x4
20,330,453 UART: [art] Derive Key Pair
20,331,459 UART: [art] Store priv key in slot 0x5
22,757,847 UART: [art] Derive Key Pair - Done
22,770,731 UART: [art] Signing Cert with AUTHO
22,772,059 UART: RITY.KEYID = 7
24,477,345 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,850 UART: [art] PUB.X = 4006949F0350F9103161F4F63C7A37DAE9D5CB247E886710B0709602056AD01D66A747E32F80187463E0324E9FBB84F3
24,486,070 UART: [art] PUB.Y = 57A4F1330E8F6EA9A7FFF3946552F9DB998B327063D7DC9915B10BB496F2ECE32EEBD2083B95B19712A368044080740A
24,493,352 UART: [art] SIG.R = BD70C73AD59A699242BCE957D2669C9204E70B9CB1FF10ABF43F93187724DEB211201EB7DAC2A0784CB931955524B6A4
24,500,703 UART: [art] SIG.S = BF6EB6CC01FB392A6A12E2EE2F6BFDD132845A75486113DAB8A9432183148868FE09FB4821108B21B973FCB0957D728F
25,479,481 UART: Caliptra RT
25,480,167 UART: [state] CFI Enabled
25,597,941 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
5,339 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,049,953 >>> mbox cmd response: success
18,345,859 UART:
18,346,314 UART: Running Caliptra FMC ...
18,347,436 UART:
18,347,598 UART: [state] CFI Enabled
18,411,863 UART: [fht] FMC Alias Private Key: 7
20,176,243 UART: [art] Extend RT PCRs Done
20,177,473 UART: [art] Lock RT PCRs Done
20,179,176 UART: [art] Populate DV Done
20,184,551 UART: [fht] FMC Alias Private Key: 7
20,186,036 UART: [art] Derive CDI
20,186,771 UART: [art] Store in in slot 0x4
20,244,851 UART: [art] Derive Key Pair
20,245,896 UART: [art] Store priv key in slot 0x5
22,708,902 UART: [art] Derive Key Pair - Done
22,721,646 UART: [art] Signing Cert with AUTHO
22,722,956 UART: RITY.KEYID = 7
24,434,455 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,970 UART: [art] PUB.X = D072B7ACF9F77C3F5D485421DA8E71777E0CC4AC048850B3CE224F716D5F4EC891B14A8061E708ED31348D807AF1A9B1
24,443,243 UART: [art] PUB.Y = 32D022F65F78D348A3D380D9BCBE8710A565CE5D46BECCCCEE54A19D426DE86920B781F9B6EB0E201D58C5610A27C137
24,450,505 UART: [art] SIG.R = 62475529B9549CE03CB3506B00678668FB311E2EC8C2FB5B83EEB2EC6E942B40771BDFB40F98BFB62B5455A2191C0892
24,457,842 UART: [art] SIG.S = 524D6DD4AE1F2FFFD64669EC58467304C1E9FBC761DAA69C9F36B3F35EC858C8DB5319AD802D65DEBB1E506FAC6771D2
25,436,572 UART: Caliptra RT
25,437,287 UART: [state] CFI Enabled
25,603,102 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
4,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,034,808 >>> mbox cmd response: success
18,319,917 UART:
18,320,323 UART: Running Caliptra FMC ...
18,321,470 UART:
18,321,637 UART: [state] CFI Enabled
18,386,993 UART: [fht] FMC Alias Private Key: 7
20,151,478 UART: [art] Extend RT PCRs Done
20,152,686 UART: [art] Lock RT PCRs Done
20,154,551 UART: [art] Populate DV Done
20,160,219 UART: [fht] FMC Alias Private Key: 7
20,161,809 UART: [art] Derive CDI
20,162,566 UART: [art] Store in in slot 0x4
20,220,043 UART: [art] Derive Key Pair
20,221,048 UART: [art] Store priv key in slot 0x5
22,684,547 UART: [art] Derive Key Pair - Done
22,697,500 UART: [art] Signing Cert with AUTHO
22,698,803 UART: RITY.KEYID = 7
24,409,936 UART: [art] Erasing AUTHORITY.KEYID = 7
24,411,434 UART: [art] PUB.X = A9DC27A89CD0CFDAD5B9B07084E95392089C180952671FA60C7E4B6C73822AAC1A4A04F4ECFA3305B4CA921675D938B8
24,418,737 UART: [art] PUB.Y = 7FDA1B80A5AAE4055D0F99B9E340E67DABE8A2DCA88D841450D4B263B27DC167485C72207CAE88AF2A5739C1E6225C3C
24,426,010 UART: [art] SIG.R = D8C01D7542C7E7A828D8B630BCB309EF8A55FAFBE0D06F319EF301C25EF4DFD67824C84730E7DA19F46DCE49748C9AC6
24,433,408 UART: [art] SIG.S = B7383A6A4C81394315A3B40A08AA4FA2AC244B72AEFA7709176539D124E4123B49DEDC3BD19C7044DC676182F9A8796E
25,412,749 UART: Caliptra RT
25,413,469 UART: [state] CFI Enabled
25,576,695 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
4,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,062,256 >>> mbox cmd response: success
18,343,731 UART:
18,344,244 UART: Running Caliptra FMC ...
18,345,420 UART:
18,345,608 UART: [state] CFI Enabled
18,410,395 UART: [fht] FMC Alias Private Key: 7
20,174,259 UART: [art] Extend RT PCRs Done
20,175,491 UART: [art] Lock RT PCRs Done
20,176,872 UART: [art] Populate DV Done
20,182,281 UART: [fht] FMC Alias Private Key: 7
20,183,993 UART: [art] Derive CDI
20,184,962 UART: [art] Store in in slot 0x4
20,243,040 UART: [art] Derive Key Pair
20,244,049 UART: [art] Store priv key in slot 0x5
22,706,923 UART: [art] Derive Key Pair - Done
22,719,771 UART: [art] Signing Cert with AUTHO
22,721,078 UART: RITY.KEYID = 7
24,432,468 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,978 UART: [art] PUB.X = A1EC0BAF606C65CC1A71412C8D2B8460EC4D4CF19937C969A41F73BE52B8666A49C2F6F3B436FA1F4C819B35923E97E1
24,441,223 UART: [art] PUB.Y = ADA82D925391700470A36CFA7B5C69296E984333EDDEC0A7FD963EA964A4E060AC574289AF368D8532FD55E47D151E61
24,448,510 UART: [art] SIG.R = 74CDBFB205C4096248B7160B2E19144DF25321B3D688E9BE1AB25AC8E3ED1BAE83DF7C2A6D1DDA7DBBEC2F8DE16496FE
24,455,906 UART: [art] SIG.S = 1DCDE2E1985CB4DA0397D8E4EEBE466E65AA0CC5BC2FBCA8DDE6B133B93A135EAE5C2D81798AA588639B0B87CC59D58E
25,434,503 UART: Caliptra RT
25,435,225 UART: [state] CFI Enabled
25,600,168 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
4,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,048,778 >>> mbox cmd response: success
18,341,754 UART:
18,342,158 UART: Running Caliptra FMC ...
18,343,269 UART:
18,343,418 UART: [state] CFI Enabled
18,409,955 UART: [fht] FMC Alias Private Key: 7
20,174,087 UART: [art] Extend RT PCRs Done
20,175,323 UART: [art] Lock RT PCRs Done
20,176,667 UART: [art] Populate DV Done
20,182,027 UART: [fht] FMC Alias Private Key: 7
20,183,573 UART: [art] Derive CDI
20,184,308 UART: [art] Store in in slot 0x4
20,242,384 UART: [art] Derive Key Pair
20,243,432 UART: [art] Store priv key in slot 0x5
22,706,274 UART: [art] Derive Key Pair - Done
22,718,946 UART: [art] Signing Cert with AUTHO
22,720,249 UART: RITY.KEYID = 7
24,433,007 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,524 UART: [art] PUB.X = B30E516BC02D139B89D1A84BEE5517ACFFA2529D4D58C76506C9D7F5CB67A8DB1B1914A11B76E3727EB0F65FAAB38B0F
24,441,772 UART: [art] PUB.Y = 4B03794BDE928F7E4076851D58EC964907E2DEAB593A2939FD9CEE7043300E3D87201CA46934CC3728923DDB8B979B18
24,449,061 UART: [art] SIG.R = 74C10877F443349AE9BB06036856C80131DA80252B539E1A8E2F38433F96D4394456AE9AA11D4F979871A19DC9742E6A
24,456,411 UART: [art] SIG.S = DE45BDEA10A8510F7A10C054F460574C9169F873926EBA05661C88A2489B3F2E77B87929B3FF6C12A8E346ED4AAF39B3
25,435,252 UART: Caliptra RT
25,435,968 UART: [state] CFI Enabled
25,601,063 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
5,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,499 >>> mbox cmd response: success
18,526,704 UART:
18,527,117 UART: Running Caliptra FMC ...
18,528,243 UART:
18,528,408 UART: [state] CFI Enabled
18,536,487 UART: [fht] FMC Alias Private Key: 7
20,292,772 UART: [art] Extend RT PCRs Done
20,294,007 UART: [art] Lock RT PCRs Done
20,295,494 UART: [art] Populate DV Done
20,301,089 UART: [fht] FMC Alias Private Key: 7
20,302,525 UART: [art] Derive CDI
20,303,283 UART: [art] Store in in slot 0x4
20,346,036 UART: [art] Derive Key Pair
20,347,042 UART: [art] Store priv key in slot 0x5
22,773,911 UART: [art] Derive Key Pair - Done
22,786,702 UART: [art] Signing Cert with AUTHO
22,788,008 UART: RITY.KEYID = 7
24,493,380 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,885 UART: [art] PUB.X = 838E7EBA336726E8A20D9E15343C9E1D7A803EA98CF59CC9910486FAEECCF9AD5E8A0F483BFA6C57C14900AE3456707B
24,502,146 UART: [art] PUB.Y = 98BC8586A5679E0B7728086CBB4AB6B580BF536930B21D9ED705A45D70B0E8435C013158C51C1D7040078612E0AEA9C1
24,509,371 UART: [art] SIG.R = 313F13AFC732B82C88E2754F19522D2AD4FABC339A5552BEE9DEEB0F3ECF1A5DAEE7DCFBF37971A6F743DAF8655DB288
24,516,786 UART: [art] SIG.S = AFB67300E8F4E4FB9F3F9354C7C7ED5732D95CF1A0355A9085CFD3AEC2391AE2175B45FD23DCB30A780B295545FE2752
25,495,673 UART: Caliptra RT
25,496,374 UART: [state] CFI Enabled
25,613,402 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
6,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,248,731 >>> mbox cmd response: success
18,498,938 UART:
18,499,333 UART: Running Caliptra FMC ...
18,500,556 UART:
18,500,731 UART: [state] CFI Enabled
18,508,453 UART: [fht] FMC Alias Private Key: 7
20,265,691 UART: [art] Extend RT PCRs Done
20,266,919 UART: [art] Lock RT PCRs Done
20,268,708 UART: [art] Populate DV Done
20,274,173 UART: [fht] FMC Alias Private Key: 7
20,275,872 UART: [art] Derive CDI
20,276,684 UART: [art] Store in in slot 0x4
20,319,440 UART: [art] Derive Key Pair
20,320,484 UART: [art] Store priv key in slot 0x5
22,747,673 UART: [art] Derive Key Pair - Done
22,760,776 UART: [art] Signing Cert with AUTHO
22,762,102 UART: RITY.KEYID = 7
24,467,477 UART: [art] Erasing AUTHORITY.KEYID = 7
24,468,983 UART: [art] PUB.X = 27CC8461B3D015E006F0262631108047EC6C107548611C553D07C3AF2ABAF327AC20D4D25D980535C0543E4E1708A2A5
24,476,261 UART: [art] PUB.Y = 3C749ECFD0F73FF8A2D732AD3918EE240DF5DEC33A7803302F4A71882E1A4A5A5D3352D399FB99748D8973B39ACE2C7D
24,483,520 UART: [art] SIG.R = 8A515B7ECE942BA4B65C6B264100A9C13E167A972EE930472162EA9F0EB0BE37B47E8AECD9E76EB526F5C06DDAFD5ACD
24,490,876 UART: [art] SIG.S = B0B769C9626EA1D9A6C3FADEF0870427FB9B9D09801702A0EB8598DF5D7D67A4B1E593A777F541E88D928010EBDB95D8
25,469,917 UART: Caliptra RT
25,470,628 UART: [state] CFI Enabled
25,587,647 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
6,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,208 >>> mbox cmd response: success
18,515,191 UART:
18,515,590 UART: Running Caliptra FMC ...
18,516,730 UART:
18,516,882 UART: [state] CFI Enabled
18,524,337 UART: [fht] FMC Alias Private Key: 7
20,281,398 UART: [art] Extend RT PCRs Done
20,282,618 UART: [art] Lock RT PCRs Done
20,284,356 UART: [art] Populate DV Done
20,289,953 UART: [fht] FMC Alias Private Key: 7
20,291,445 UART: [art] Derive CDI
20,292,207 UART: [art] Store in in slot 0x4
20,334,860 UART: [art] Derive Key Pair
20,335,894 UART: [art] Store priv key in slot 0x5
22,762,858 UART: [art] Derive Key Pair - Done
22,775,700 UART: [art] Signing Cert with AUTHO
22,776,998 UART: RITY.KEYID = 7
24,482,739 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,245 UART: [art] PUB.X = 185978E8BAB1BE41C81CCBA865F21A66F56671EC8B9DF836D46E040E82E855599BE905B54999F41E10F450570A3625ED
24,491,517 UART: [art] PUB.Y = CC40B25E363795FD19020B19C419D1670C090CFB65C22AEB2C77E1E1D804FFC809FA81361EE3068A0A38A3B6043C7011
24,498,745 UART: [art] SIG.R = 69EC60756EA2E8AF5F5B0A6D0E5E1907D2E01F3D27B0B1AB8878A914002C5D24C516B64B66EC1BDC2FFDE58050D875ED
24,506,162 UART: [art] SIG.S = F8EF0E56164A4A966E5AA67CB0E11C45FE6AF524B0679CF7A283DA202A3E06E25F5067419CCAE9214D63F143DB48177A
25,485,145 UART: Caliptra RT
25,485,856 UART: [state] CFI Enabled
25,602,993 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
5,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,254,874 >>> mbox cmd response: success
18,503,264 UART:
18,503,692 UART: Running Caliptra FMC ...
18,504,877 UART:
18,505,048 UART: [state] CFI Enabled
18,512,809 UART: [fht] FMC Alias Private Key: 7
20,269,506 UART: [art] Extend RT PCRs Done
20,270,731 UART: [art] Lock RT PCRs Done
20,272,568 UART: [art] Populate DV Done
20,277,930 UART: [fht] FMC Alias Private Key: 7
20,279,522 UART: [art] Derive CDI
20,280,332 UART: [art] Store in in slot 0x4
20,323,244 UART: [art] Derive Key Pair
20,324,232 UART: [art] Store priv key in slot 0x5
22,750,642 UART: [art] Derive Key Pair - Done
22,763,317 UART: [art] Signing Cert with AUTHO
22,764,624 UART: RITY.KEYID = 7
24,470,218 UART: [art] Erasing AUTHORITY.KEYID = 7
24,471,726 UART: [art] PUB.X = C248FE7623BCA4685204D8650E0972C2005AB0003B6BCD5A05A65A15C67B3628E9222A4A453A49447F27CF7E0053F203
24,478,959 UART: [art] PUB.Y = AB8E2BAF633D91ECBFEC3162AB794A4880DF2226963FF52831917A06C41900F2D9C2B300E110FEAE333F2FEFAE0C61E6
24,486,138 UART: [art] SIG.R = 7E234C0586FA3C6A0AF9B3610ADF2A71DCEE95F2B4073D64104843DD243151C198D57A1CCB012C4A2B9E58A84BE30A91
24,493,578 UART: [art] SIG.S = A250DC7C5F5C99D552A0C99C6D49751EE9AF5311603F9EEFA5C295918CAB0BEC8A29F003FDFD9022C703BC4F8D13BD2C
25,472,461 UART: Caliptra RT
25,473,147 UART: [state] CFI Enabled
25,590,313 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,894 UART: [afmc] --
2,847,958 UART: [cold-reset] --
2,848,892 UART: [state] Locking Datavault
2,850,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,869 UART: [state] Locking ICCM
2,851,315 UART: [exit] Launching FMC @ 0x40000130
2,856,644 UART:
2,856,660 UART: Running Caliptra FMC ...
2,857,068 UART:
2,857,122 UART: [state] CFI Enabled
2,867,419 UART: [fht] FMC Alias Private Key: 7
2,974,734 UART: [art] Extend RT PCRs Done
2,975,162 UART: [art] Lock RT PCRs Done
2,976,556 UART: [art] Populate DV Done
2,984,803 UART: [fht] FMC Alias Private Key: 7
2,985,855 UART: [art] Derive CDI
2,986,135 UART: [art] Store in in slot 0x4
3,071,958 UART: [art] Derive Key Pair
3,072,318 UART: [art] Store priv key in slot 0x5
3,085,292 UART: [art] Derive Key Pair - Done
3,100,323 UART: [art] Signing Cert with AUTHO
3,100,803 UART: RITY.KEYID = 7
3,115,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,702 UART: [art] PUB.X = 0E3A2B30521A6C4B568FA70A99DF8FDA9D6CBE827CC5456BCA477377F0CC13A421987A293FB3337F5A3931825AE031E7
3,123,474 UART: [art] PUB.Y = 1A5EA67F722C5039645D4B5874B7EB82F83BD8486BC2E20445E8BD755E9DE09B45E14E2C39BFD83BAF27C3EECF3FB5D3
3,130,439 UART: [art] SIG.R = 3C846A76C69FD25D844139641437772E5CECB3B4A273DE18135C2B2502A08B09F800CFAC0A2AEE9291F15B1E661B9DBC
3,137,186 UART: [art] SIG.S = 2CB27592C32FF5FDBC502F49315D9085683AD74050D36EF70B38E8D4C25151F251623410AC9147346293F77F2E787026
3,160,956 UART: Caliptra RT
3,161,209 UART: [state] CFI Enabled
3,269,480 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,380 UART: [kat] LMS
1,168,692 UART: [kat] --
1,169,497 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,567 UART: [idev] ++
1,172,735 UART: [idev] CDI.KEYID = 6
1,173,096 UART: [idev] SUBJECT.KEYID = 7
1,173,521 UART: [idev] UDS.KEYID = 0
1,180,833 UART: [idev] Erasing UDS.KEYID = 0
1,197,848 UART: [idev] Sha384 KeyId Algorithm
1,201,521 UART: [idev] --
1,202,764 UART: [ldev] ++
1,202,932 UART: [ldev] CDI.KEYID = 6
1,203,296 UART: [ldev] SUBJECT.KEYID = 5
1,203,723 UART: [ldev] AUTHORITY.KEYID = 7
1,204,186 UART: [ldev] FE.KEYID = 1
1,209,244 UART: [ldev] Erasing FE.KEYID = 1
1,234,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,110 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,265,832 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,272,804 UART: [ldev] --
1,274,318 UART: [fwproc] Wait for Commands...
1,274,993 UART: [fwproc] Recv command 0x46574c44
1,275,726 UART: [fwproc] Recv'd Img size: 114448 bytes
2,574,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,766,936 >>> mbox cmd response: success
2,768,015 UART: [afmc] ++
2,768,183 UART: [afmc] CDI.KEYID = 6
2,768,546 UART: [afmc] SUBJECT.KEYID = 7
2,768,972 UART: [afmc] AUTHORITY.KEYID = 5
2,804,483 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,184 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,913 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,796 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,515 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,426 UART: [afmc] --
2,847,398 UART: [cold-reset] --
2,848,198 UART: [state] Locking Datavault
2,849,235 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,839 UART: [state] Locking ICCM
2,850,287 UART: [exit] Launching FMC @ 0x40000130
2,855,616 UART:
2,855,632 UART: Running Caliptra FMC ...
2,856,040 UART:
2,856,094 UART: [state] CFI Enabled
2,866,739 UART: [fht] FMC Alias Private Key: 7
2,974,850 UART: [art] Extend RT PCRs Done
2,975,278 UART: [art] Lock RT PCRs Done
2,976,572 UART: [art] Populate DV Done
2,984,893 UART: [fht] FMC Alias Private Key: 7
2,985,977 UART: [art] Derive CDI
2,986,257 UART: [art] Store in in slot 0x4
3,072,090 UART: [art] Derive Key Pair
3,072,450 UART: [art] Store priv key in slot 0x5
3,085,498 UART: [art] Derive Key Pair - Done
3,100,516 UART: [art] Signing Cert with AUTHO
3,100,996 UART: RITY.KEYID = 7
3,116,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,949 UART: [art] PUB.X = 1263CF6A96192FCE7806FC79EFA18CB9EFDA08686D1EB7349AE704FEA80AB2AE4EA66462D1BAD479C3DB66B68149D4CA
3,123,729 UART: [art] PUB.Y = 7CABEDD15BD83FD8700A60B24DC2C0B0CEEB5C734133E8F88A83F3DDAA833596303602AAAC22F95CF30A8BEA8B5DBA70
3,130,696 UART: [art] SIG.R = 6AD97E19A79FFA6A74813BF036DB672CC7E67F329A29AC8B34D4C5CD608EE2E628F7A17EE7A164B5541CAD637D9C2678
3,137,480 UART: [art] SIG.S = 48D8271B4EEA4BEE3F43FD03C31C32EDFF0500AEE248A81D55CE34A573EE9AD5104DA9ACD47BC2966377E4BF03B26ABC
3,161,612 UART: Caliptra RT
3,161,865 UART: [state] CFI Enabled
3,268,838 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,135 UART: [kat] ++
895,287 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,176 UART: [kat] SHA2-512-ACC
906,077 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,511 UART: [cold-reset] ++
1,169,905 UART: [fht] FHT @ 0x50003400
1,172,681 UART: [idev] ++
1,172,849 UART: [idev] CDI.KEYID = 6
1,173,210 UART: [idev] SUBJECT.KEYID = 7
1,173,635 UART: [idev] UDS.KEYID = 0
1,181,605 UART: [idev] Erasing UDS.KEYID = 0
1,198,480 UART: [idev] Fuse KeyId
1,199,702 UART: [idev] --
1,200,783 UART: [ldev] ++
1,200,951 UART: [ldev] CDI.KEYID = 6
1,201,315 UART: [ldev] SUBJECT.KEYID = 5
1,201,742 UART: [ldev] AUTHORITY.KEYID = 7
1,202,205 UART: [ldev] FE.KEYID = 1
1,206,953 UART: [ldev] Erasing FE.KEYID = 1
1,233,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,063 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,263,745 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,270,712 UART: [ldev] --
1,272,194 UART: [fwproc] Wait for Commands...
1,272,839 UART: [fwproc] Recv command 0x46574c44
1,273,572 UART: [fwproc] Recv'd Img size: 114448 bytes
2,572,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,764,488 >>> mbox cmd response: success
2,765,731 UART: [afmc] ++
2,765,899 UART: [afmc] CDI.KEYID = 6
2,766,262 UART: [afmc] SUBJECT.KEYID = 7
2,766,688 UART: [afmc] AUTHORITY.KEYID = 5
2,801,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,120 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,836,839 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,646 UART: [afmc] --
2,845,706 UART: [cold-reset] --
2,846,534 UART: [state] Locking Datavault
2,847,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,383 UART: [state] Locking ICCM
2,848,839 UART: [exit] Launching FMC @ 0x40000130
2,854,168 UART:
2,854,184 UART: Running Caliptra FMC ...
2,854,592 UART:
2,854,646 UART: [state] CFI Enabled
2,865,375 UART: [fht] FMC Alias Private Key: 7
2,973,554 UART: [art] Extend RT PCRs Done
2,973,982 UART: [art] Lock RT PCRs Done
2,975,540 UART: [art] Populate DV Done
2,983,659 UART: [fht] FMC Alias Private Key: 7
2,984,701 UART: [art] Derive CDI
2,984,981 UART: [art] Store in in slot 0x4
3,070,748 UART: [art] Derive Key Pair
3,071,108 UART: [art] Store priv key in slot 0x5
3,084,048 UART: [art] Derive Key Pair - Done
3,098,693 UART: [art] Signing Cert with AUTHO
3,099,173 UART: RITY.KEYID = 7
3,114,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,496 UART: [art] PUB.X = 2845007E0ED56473DCBF08279712E3C415D709910F9863830B52AC0745BAE7876B4F622CB4A00971C50D04237F28F438
3,122,207 UART: [art] PUB.Y = 22AEFD4B448C8A8474FC87AD880BC77836EC3EB2BBB987D1EDDFEAFDC3E2BD2F6AC30CA6DAD637E91C3B448A61EAB2B6
3,129,187 UART: [art] SIG.R = D19807719895A4A18B15EE86558F1A74DB618C6831F8A31DC427626C484A92326DD0E56E5141E992908A40A7EDF463CE
3,135,950 UART: [art] SIG.S = 8B1290E9A20AB0C40DBCC9AC43116B905576A087FE3C84E56E15BC2DA165C4E421B03265A113FC75013F7926034C39C1
3,159,873 UART: Caliptra RT
3,160,126 UART: [state] CFI Enabled
3,268,822 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,080 >>> mbox cmd response: success
2,685,806 UART:
2,685,822 UART: Running Caliptra FMC ...
2,686,230 UART:
2,686,284 UART: [state] CFI Enabled
2,696,715 UART: [fht] FMC Alias Private Key: 7
2,804,784 UART: [art] Extend RT PCRs Done
2,805,212 UART: [art] Lock RT PCRs Done
2,806,752 UART: [art] Populate DV Done
2,815,087 UART: [fht] FMC Alias Private Key: 7
2,816,103 UART: [art] Derive CDI
2,816,383 UART: [art] Store in in slot 0x4
2,901,712 UART: [art] Derive Key Pair
2,902,072 UART: [art] Store priv key in slot 0x5
2,915,234 UART: [art] Derive Key Pair - Done
2,929,963 UART: [art] Signing Cert with AUTHO
2,930,443 UART: RITY.KEYID = 7
2,945,491 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,256 UART: [art] PUB.X = 0B707F56D415C91EC5F76836FBFBBC0C3A3B2274D245AB7CB74479DDB16F0E01F6D379C3AFF7398D194C05812B8415F4
2,953,021 UART: [art] PUB.Y = 3070B02FC67B4D0819A47C56A868FAC4198240BD8D50E5CEBA720DB6ED2B112903E3DDA08C0C1F49C544D5A02075C21D
2,959,969 UART: [art] SIG.R = 501BA6469340502C89B7194AE3635CAA1A171B0F17385D0A5A5BF3AE1C20CC35B19AFAA3AFCD1C4A67D47583593D56F5
2,966,743 UART: [art] SIG.S = 7F33E55D13F719F70DBCB20528245B88284CAE2D527175753E835205419A2EE3BDEEFFF9CAF43372AA88734154D31950
2,991,041 UART: Caliptra RT
2,991,294 UART: [state] CFI Enabled
3,098,579 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,424 >>> mbox cmd response: success
2,683,444 UART:
2,683,460 UART: Running Caliptra FMC ...
2,683,868 UART:
2,683,922 UART: [state] CFI Enabled
2,694,285 UART: [fht] FMC Alias Private Key: 7
2,802,056 UART: [art] Extend RT PCRs Done
2,802,484 UART: [art] Lock RT PCRs Done
2,803,858 UART: [art] Populate DV Done
2,811,993 UART: [fht] FMC Alias Private Key: 7
2,813,009 UART: [art] Derive CDI
2,813,289 UART: [art] Store in in slot 0x4
2,898,788 UART: [art] Derive Key Pair
2,899,148 UART: [art] Store priv key in slot 0x5
2,912,120 UART: [art] Derive Key Pair - Done
2,926,989 UART: [art] Signing Cert with AUTHO
2,927,469 UART: RITY.KEYID = 7
2,942,861 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,626 UART: [art] PUB.X = B9477F242DED2149EFBBF9C64B58662FCF617D9839E187A6409CB408234F8F99286B752B088D996D26815E6C48A0F97B
2,950,390 UART: [art] PUB.Y = 5F2CB91B1ADD38CCB55B9932ECB91822FC30372653A3DEDB1F786180B8D84A00BF502BF6B183920563087021C3A904C6
2,957,313 UART: [art] SIG.R = 6D533F6B465651B4FDEBACF876CA357CD4EEED35ED1432BE4A03FA7D89939BE4F792E5E5139C2F74EE0288F45C8C9D36
2,964,095 UART: [art] SIG.S = 4EDD4C968CBFD7D65533CE90B2F7719D0B211F0C80A303C401919D87CDF7F87EAD71FE81CB33A1F9F717C777E5C93858
2,988,120 UART: Caliptra RT
2,988,373 UART: [state] CFI Enabled
3,095,706 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,752 >>> mbox cmd response: success
2,681,144 UART:
2,681,160 UART: Running Caliptra FMC ...
2,681,568 UART:
2,681,622 UART: [state] CFI Enabled
2,692,127 UART: [fht] FMC Alias Private Key: 7
2,800,298 UART: [art] Extend RT PCRs Done
2,800,726 UART: [art] Lock RT PCRs Done
2,802,530 UART: [art] Populate DV Done
2,810,821 UART: [fht] FMC Alias Private Key: 7
2,811,831 UART: [art] Derive CDI
2,812,111 UART: [art] Store in in slot 0x4
2,897,850 UART: [art] Derive Key Pair
2,898,210 UART: [art] Store priv key in slot 0x5
2,911,326 UART: [art] Derive Key Pair - Done
2,925,665 UART: [art] Signing Cert with AUTHO
2,926,145 UART: RITY.KEYID = 7
2,941,801 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,566 UART: [art] PUB.X = 49ACF70D0F198E3F237C6A5792EBAEC2C536D97023A2D4F3325A9CF17A92AD5B37F7FA12017A5620AE308892A92706D3
2,949,330 UART: [art] PUB.Y = E956754481A1F1B339BDF13D465F834A8438A252EFEFA7CEA85CB6DDC900AC061661964C83EE311290667FFF5952AB5B
2,956,263 UART: [art] SIG.R = 6124983E4AC0914EA6B6666DD2883BD3401CFF79D3CB97665B4C260C8427169322992FE94E35B56F81DF86457D3CCB39
2,963,028 UART: [art] SIG.S = 01B7B292514BFDF3043D03F8D8EDF18C38226DDC669A848DFA18273E01812A202441BA1E73DA740EC2205D8B81F65203
2,986,409 UART: Caliptra RT
2,986,662 UART: [state] CFI Enabled
3,093,479 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,615,202 >>> mbox cmd response: success
2,677,792 UART:
2,677,808 UART: Running Caliptra FMC ...
2,678,216 UART:
2,678,270 UART: [state] CFI Enabled
2,688,395 UART: [fht] FMC Alias Private Key: 7
2,796,814 UART: [art] Extend RT PCRs Done
2,797,242 UART: [art] Lock RT PCRs Done
2,798,774 UART: [art] Populate DV Done
2,807,039 UART: [fht] FMC Alias Private Key: 7
2,808,113 UART: [art] Derive CDI
2,808,393 UART: [art] Store in in slot 0x4
2,893,752 UART: [art] Derive Key Pair
2,894,112 UART: [art] Store priv key in slot 0x5
2,907,360 UART: [art] Derive Key Pair - Done
2,922,200 UART: [art] Signing Cert with AUTHO
2,922,680 UART: RITY.KEYID = 7
2,937,810 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,575 UART: [art] PUB.X = 806FB5817E9465C06B88C04996EF2AF0A8FF0FEAE2DD14DCAE14F90A041943A5CE910A4B7B952B81BBE0ADA3739783D6
2,945,349 UART: [art] PUB.Y = A0699BDC42586795F857FD9115CB92129AFC206DFF0BCC95B6677F03CE6FD174D085A885289EFCD179FCBBA7D3C9C6BB
2,952,311 UART: [art] SIG.R = F41612B5F1AB77E20767AD14FDD45BF73BF4456AF834AB76F209FC9B0B0F11E7B69C6D86453F7319E212F2534F2D713E
2,959,077 UART: [art] SIG.S = B9266920D822FE028406B6C36690056C3EAC3998279E00D88EC60E0F24FB1393216BF564F8F53D82CE2EEF64144B2E3A
2,983,151 UART: Caliptra RT
2,983,404 UART: [state] CFI Enabled
3,091,028 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.14s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,151 UART: [afmc] --
2,853,133 UART: [cold-reset] --
2,853,943 UART: [state] Locking Datavault
2,855,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,688 UART: [state] Locking ICCM
2,856,140 UART: [exit] Launching FMC @ 0x40000130
2,861,469 UART:
2,861,485 UART: Running Caliptra FMC ...
2,861,893 UART:
2,862,036 UART: [state] CFI Enabled
2,872,825 UART: [fht] FMC Alias Private Key: 7
2,980,976 UART: [art] Extend RT PCRs Done
2,981,404 UART: [art] Lock RT PCRs Done
2,983,266 UART: [art] Populate DV Done
2,991,399 UART: [fht] FMC Alias Private Key: 7
2,992,495 UART: [art] Derive CDI
2,992,775 UART: [art] Store in in slot 0x4
3,078,418 UART: [art] Derive Key Pair
3,078,778 UART: [art] Store priv key in slot 0x5
3,091,722 UART: [art] Derive Key Pair - Done
3,106,581 UART: [art] Signing Cert with AUTHO
3,107,061 UART: RITY.KEYID = 7
3,122,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,202 UART: [art] PUB.X = D814555273D0DEBA3E1E4ED63BFB49191CD7E6C97FD81EAEE93EB930548EA97F798A7546A4188C099FC8B43E362724CA
3,129,981 UART: [art] PUB.Y = 037380C62BC9CABECD9FFC63975B1D96C048D81EAF103316F1FFC03054B9E54864D8DBA337EA2B635B9E95F29E7FB9FC
3,136,946 UART: [art] SIG.R = 4F77E6A4266136363D6E3D05C635F0AE0EB1576CEDE5863ED7BDBE7D8F1309B54A5300EC1F93D30E2063CF5B8D6E296D
3,143,694 UART: [art] SIG.S = 260A4FDB9DAD2D7BC767A8AAF8B91F812C7A0311B6DB538BACA61793EC51CB13E2BAE5E1165395951C29B0DCCB1A043C
3,167,662 UART: Caliptra RT
3,168,007 UART: [state] CFI Enabled
3,276,286 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,637 UART: [kat] LMS
1,168,949 UART: [kat] --
1,169,806 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,173,008 UART: [idev] ++
1,173,176 UART: [idev] CDI.KEYID = 6
1,173,537 UART: [idev] SUBJECT.KEYID = 7
1,173,962 UART: [idev] UDS.KEYID = 0
1,181,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,407 UART: [idev] Sha384 KeyId Algorithm
1,203,406 UART: [idev] --
1,204,547 UART: [ldev] ++
1,204,715 UART: [ldev] CDI.KEYID = 6
1,205,079 UART: [ldev] SUBJECT.KEYID = 5
1,205,506 UART: [ldev] AUTHORITY.KEYID = 7
1,205,969 UART: [ldev] FE.KEYID = 1
1,211,427 UART: [ldev] Erasing FE.KEYID = 1
1,237,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,809 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,531 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,535 UART: [ldev] --
1,276,981 UART: [fwproc] Wait for Commands...
1,277,702 UART: [fwproc] Recv command 0x46574c44
1,278,435 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,453 >>> mbox cmd response: success
2,772,652 UART: [afmc] ++
2,772,820 UART: [afmc] CDI.KEYID = 6
2,773,183 UART: [afmc] SUBJECT.KEYID = 7
2,773,609 UART: [afmc] AUTHORITY.KEYID = 5
2,809,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,113 UART: [afmc] --
2,853,079 UART: [cold-reset] --
2,854,039 UART: [state] Locking Datavault
2,855,218 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,822 UART: [state] Locking ICCM
2,856,422 UART: [exit] Launching FMC @ 0x40000130
2,861,751 UART:
2,861,767 UART: Running Caliptra FMC ...
2,862,175 UART:
2,862,318 UART: [state] CFI Enabled
2,872,747 UART: [fht] FMC Alias Private Key: 7
2,981,032 UART: [art] Extend RT PCRs Done
2,981,460 UART: [art] Lock RT PCRs Done
2,983,196 UART: [art] Populate DV Done
2,991,575 UART: [fht] FMC Alias Private Key: 7
2,992,725 UART: [art] Derive CDI
2,993,005 UART: [art] Store in in slot 0x4
3,078,612 UART: [art] Derive Key Pair
3,078,972 UART: [art] Store priv key in slot 0x5
3,092,116 UART: [art] Derive Key Pair - Done
3,106,546 UART: [art] Signing Cert with AUTHO
3,107,026 UART: RITY.KEYID = 7
3,122,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,017 UART: [art] PUB.X = ADC1BA4726C042D4C29F7028B77E8DFC1898E54B08804598D1436BEA36874827C1B3B43DE818E3D544F06C159AFE5519
3,129,786 UART: [art] PUB.Y = 579ECDF83DCAF84AE3559C20407D4F9AD088348FFFF77F12B039DCA1A9FD03EF5658F52BD4897BA24223BC6FA0D8A5B9
3,136,753 UART: [art] SIG.R = 9862E9F9F8630F6C576A026DA0DF6B3FDC895BDC09637B4EDF7D760177AB3028A90618FBA9A6C0E8BAABE5F77FC6001F
3,143,504 UART: [art] SIG.S = 00C469A05B0E4CF525167D26116DA3E1429F416DC5EC7D9E4EFB01B170B9DFFD9E9B4ABB03790D7EAB3DAF2EBA5A4363
3,167,135 UART: Caliptra RT
3,167,480 UART: [state] CFI Enabled
3,274,741 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
915,975 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,260 UART: [fht] FHT @ 0x50003400
1,172,828 UART: [idev] ++
1,172,996 UART: [idev] CDI.KEYID = 6
1,173,357 UART: [idev] SUBJECT.KEYID = 7
1,173,782 UART: [idev] UDS.KEYID = 0
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Fuse KeyId
1,200,561 UART: [idev] --
1,201,594 UART: [ldev] ++
1,201,762 UART: [ldev] CDI.KEYID = 6
1,202,126 UART: [ldev] SUBJECT.KEYID = 5
1,202,553 UART: [ldev] AUTHORITY.KEYID = 7
1,203,016 UART: [ldev] FE.KEYID = 1
1,208,372 UART: [ldev] Erasing FE.KEYID = 1
1,235,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,208 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,890 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,967 UART: [ldev] --
1,274,297 UART: [fwproc] Wait for Commands...
1,274,942 UART: [fwproc] Recv command 0x46574c44
1,275,675 UART: [fwproc] Recv'd Img size: 114448 bytes
2,574,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,766,955 >>> mbox cmd response: success
2,768,172 UART: [afmc] ++
2,768,340 UART: [afmc] CDI.KEYID = 6
2,768,703 UART: [afmc] SUBJECT.KEYID = 7
2,769,129 UART: [afmc] AUTHORITY.KEYID = 5
2,804,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,973 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,692 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,527 UART: [afmc] --
2,847,561 UART: [cold-reset] --
2,848,463 UART: [state] Locking Datavault
2,849,494 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,098 UART: [state] Locking ICCM
2,850,748 UART: [exit] Launching FMC @ 0x40000130
2,856,077 UART:
2,856,093 UART: Running Caliptra FMC ...
2,856,501 UART:
2,856,644 UART: [state] CFI Enabled
2,866,931 UART: [fht] FMC Alias Private Key: 7
2,975,184 UART: [art] Extend RT PCRs Done
2,975,612 UART: [art] Lock RT PCRs Done
2,976,952 UART: [art] Populate DV Done
2,985,131 UART: [fht] FMC Alias Private Key: 7
2,986,145 UART: [art] Derive CDI
2,986,425 UART: [art] Store in in slot 0x4
3,071,546 UART: [art] Derive Key Pair
3,071,906 UART: [art] Store priv key in slot 0x5
3,085,254 UART: [art] Derive Key Pair - Done
3,100,154 UART: [art] Signing Cert with AUTHO
3,100,634 UART: RITY.KEYID = 7
3,116,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,135 UART: [art] PUB.X = 08DFFE733743FA2C0266F67BD685B85D143F000E0232A4C6481D3F12F2C4D53EED9CC0851BA743181131E6AB285846D2
3,123,873 UART: [art] PUB.Y = 6C992955A6AE23375920922EF37F67599BC25984AF16D41F96411A0CC38C7E41EA2649939A5962027C52465B90A1D671
3,130,805 UART: [art] SIG.R = 6095A305E09F31DFC3C858D8F6983C58BCE122C8B776594C728F223C3101CA70A5B0112B7018D9F0A620301EFB34FB4B
3,137,571 UART: [art] SIG.S = EFFE606035376EFC072403846BFEDECCF8E311C87976289AABC28A457B3E45A185250B2A19747D19FF434790A5D7B767
3,161,271 UART: Caliptra RT
3,161,616 UART: [state] CFI Enabled
3,268,621 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,775 >>> mbox cmd response: success
2,685,593 UART:
2,685,609 UART: Running Caliptra FMC ...
2,686,017 UART:
2,686,160 UART: [state] CFI Enabled
2,697,229 UART: [fht] FMC Alias Private Key: 7
2,805,490 UART: [art] Extend RT PCRs Done
2,805,918 UART: [art] Lock RT PCRs Done
2,807,604 UART: [art] Populate DV Done
2,816,161 UART: [fht] FMC Alias Private Key: 7
2,817,103 UART: [art] Derive CDI
2,817,383 UART: [art] Store in in slot 0x4
2,902,724 UART: [art] Derive Key Pair
2,903,084 UART: [art] Store priv key in slot 0x5
2,916,402 UART: [art] Derive Key Pair - Done
2,931,398 UART: [art] Signing Cert with AUTHO
2,931,878 UART: RITY.KEYID = 7
2,947,068 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,833 UART: [art] PUB.X = 144FE8322BA546945BCE96B6FDC60A8E02BD4EACE573FB946E89BCEC542EE7339BD4DA57478EF3D875EB0BBA4ECE631C
2,954,620 UART: [art] PUB.Y = 1B2021E704FE54D6EBCB8C66C0C9799066589F56566C5983CF143BBF615B4A283D74334296FC11E5FA022FC35DA4DC93
2,961,568 UART: [art] SIG.R = B92B01E0011C07BBE7CC8CC163A2B46CE493B361E9AB601842460080AAC44753FCBEAAF5932B9E6DFD99F92D8088047B
2,968,316 UART: [art] SIG.S = 71320F3AEDFA9187AC517873D223F3215DC49A644DF937FA28FC5562B3857E5097220E12751EB6CE8BA0B5C498DE2D25
2,992,061 UART: Caliptra RT
2,992,406 UART: [state] CFI Enabled
3,100,057 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,619,887 >>> mbox cmd response: success
2,681,409 UART:
2,681,425 UART: Running Caliptra FMC ...
2,681,833 UART:
2,681,976 UART: [state] CFI Enabled
2,692,383 UART: [fht] FMC Alias Private Key: 7
2,800,426 UART: [art] Extend RT PCRs Done
2,800,854 UART: [art] Lock RT PCRs Done
2,802,314 UART: [art] Populate DV Done
2,810,767 UART: [fht] FMC Alias Private Key: 7
2,811,817 UART: [art] Derive CDI
2,812,097 UART: [art] Store in in slot 0x4
2,898,034 UART: [art] Derive Key Pair
2,898,394 UART: [art] Store priv key in slot 0x5
2,911,570 UART: [art] Derive Key Pair - Done
2,926,593 UART: [art] Signing Cert with AUTHO
2,927,073 UART: RITY.KEYID = 7
2,942,203 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,968 UART: [art] PUB.X = 51C6E1EDB2D5911289324C566D421BCAFF6105C696F09DE89006F6B7E5F174AA451CCA68362D53C5AA979624B6113BBA
2,949,738 UART: [art] PUB.Y = 3DBC4FCF5938AFEA59B7FE3C0B3878928F4C1DEF67AE0F11B7DB857D775E27AF606571509DB44195B870983BDE844BD3
2,956,696 UART: [art] SIG.R = C63CD471FB19196ED008331537C138603FC47DF55CDDEC813A3C178F2177FF68BEA7869E753FE348D7D33C1BC4F4EB55
2,963,473 UART: [art] SIG.S = D81ED3FA507D1403E806E4895134E1AEEA6254E05AD0E39C90575154543A59F9C0F09D3D0112050A8FF6E36EE8BAC463
2,987,405 UART: Caliptra RT
2,987,750 UART: [state] CFI Enabled
3,094,445 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,619,055 >>> mbox cmd response: success
2,680,991 UART:
2,681,007 UART: Running Caliptra FMC ...
2,681,415 UART:
2,681,558 UART: [state] CFI Enabled
2,692,155 UART: [fht] FMC Alias Private Key: 7
2,799,970 UART: [art] Extend RT PCRs Done
2,800,398 UART: [art] Lock RT PCRs Done
2,802,420 UART: [art] Populate DV Done
2,810,781 UART: [fht] FMC Alias Private Key: 7
2,811,861 UART: [art] Derive CDI
2,812,141 UART: [art] Store in in slot 0x4
2,897,894 UART: [art] Derive Key Pair
2,898,254 UART: [art] Store priv key in slot 0x5
2,911,386 UART: [art] Derive Key Pair - Done
2,926,286 UART: [art] Signing Cert with AUTHO
2,926,766 UART: RITY.KEYID = 7
2,942,250 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,015 UART: [art] PUB.X = A15FD129BB1223E478246AC5FC00503FF2B84055BA7E92A2D4A1BED51B5FBBCD4D41105E0216469F2078C09F972883CA
2,949,768 UART: [art] PUB.Y = C48E4C9DC3A986CA74030179FDBCE79F7200A0C65C7BD60AE7B56104A23C44E64DBF2DBA2529C287A86C163C38E5D197
2,956,696 UART: [art] SIG.R = BAC4C0E9F8E105E89E9714D96DED8F4E25FE5D9C230D468D67136D3AE92AD2D2345064A7816B71F3BD54CBCB0086BF42
2,963,452 UART: [art] SIG.S = EFCA56295CF79C635C48854BC3337F3D876537E1CEEEA88943CCA3B60AA80AF5101B6F953A4998ABD69A516DE59FC28C
2,987,161 UART: Caliptra RT
2,987,506 UART: [state] CFI Enabled
3,094,823 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,616,657 >>> mbox cmd response: success
2,678,487 UART:
2,678,503 UART: Running Caliptra FMC ...
2,678,911 UART:
2,679,054 UART: [state] CFI Enabled
2,689,505 UART: [fht] FMC Alias Private Key: 7
2,797,886 UART: [art] Extend RT PCRs Done
2,798,314 UART: [art] Lock RT PCRs Done
2,800,088 UART: [art] Populate DV Done
2,808,181 UART: [fht] FMC Alias Private Key: 7
2,809,173 UART: [art] Derive CDI
2,809,453 UART: [art] Store in in slot 0x4
2,895,236 UART: [art] Derive Key Pair
2,895,596 UART: [art] Store priv key in slot 0x5
2,908,790 UART: [art] Derive Key Pair - Done
2,923,435 UART: [art] Signing Cert with AUTHO
2,923,915 UART: RITY.KEYID = 7
2,939,075 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,840 UART: [art] PUB.X = 9EC5EE8CF4CFCB2D3FD38028874FE7B1ED133994E4236BAB9B9FE0E56E6005CED61896B243D9A7BE007AE7AE0FBC0489
2,946,601 UART: [art] PUB.Y = F01307A989268E103CD94F102650D592F2852CFA66DE06A2FC1424FA9BDE41CE3EA222566B8C547001D78E1B4A346069
2,953,542 UART: [art] SIG.R = 2B814AD752013FAA4323142BF4383FA2FDAE555842B94163C5B15AC31917AC0902FE810D0A035206B0259A9741B895C5
2,960,287 UART: [art] SIG.S = 4A34F9CEF918E33E53623504CE3CD8114431E84D0612E5E9E12FD05AF1F28DE44290A32B2DE4789229EDDA9BC98914D0
2,983,730 UART: Caliptra RT
2,984,075 UART: [state] CFI Enabled
3,091,590 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.24s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,124 UART: [afmc] --
2,849,240 UART: [cold-reset] --
2,849,840 UART: [state] Locking Datavault
2,850,945 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,549 UART: [state] Locking ICCM
2,852,011 UART: [exit] Launching FMC @ 0x40000130
2,857,340 UART:
2,857,356 UART: Running Caliptra FMC ...
2,857,764 UART:
2,857,818 UART: [state] CFI Enabled
2,868,491 UART: [fht] FMC Alias Private Key: 7
2,976,128 UART: [art] Extend RT PCRs Done
2,976,556 UART: [art] Lock RT PCRs Done
2,978,188 UART: [art] Populate DV Done
2,986,373 UART: [fht] FMC Alias Private Key: 7
2,987,417 UART: [art] Derive CDI
2,987,697 UART: [art] Store in in slot 0x4
3,073,366 UART: [art] Derive Key Pair
3,073,726 UART: [art] Store priv key in slot 0x5
3,086,082 UART: [art] Derive Key Pair - Done
3,100,954 UART: [art] Signing Cert with AUTHO
3,101,434 UART: RITY.KEYID = 7
3,116,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,291 UART: [art] PUB.X = CDDBCEC18812200153934E08D838C04AE4F904167DD3BD92B20CBF8764F469913B7173F4B5348A83340ED42026E5D883
3,124,044 UART: [art] PUB.Y = FBD2253365867C7AAEB103DDED7E431ED9A7ADF353562C68F294DAF6EEEECA67D93B567320DAA0CA68A230306583CF70
3,131,009 UART: [art] SIG.R = 3144EC6B5AE07DEA3E712B8ACE1EDDE0C6EF87C7CB29E427B01132AC210CFD1DF07EDB4A8FD34BBDDD11B1C4B6B98A0E
3,137,809 UART: [art] SIG.S = 99B9BA1DE9AD52577EA15BF92A2D800FE1F9E0411E3A18282A28076F4BC53F4421533623BA2507EFB26BCFA6793CA29C
3,161,795 UART: Caliptra RT
3,162,048 UART: [state] CFI Enabled
3,269,792 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,413 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,198,604 UART: [idev] Sha384 KeyId Algorithm
1,202,365 UART: [idev] --
1,203,256 UART: [ldev] ++
1,203,424 UART: [ldev] CDI.KEYID = 6
1,203,788 UART: [ldev] SUBJECT.KEYID = 5
1,204,215 UART: [ldev] AUTHORITY.KEYID = 7
1,204,678 UART: [ldev] FE.KEYID = 1
1,209,904 UART: [ldev] Erasing FE.KEYID = 1
1,236,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,616 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,338 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,372 UART: [ldev] --
1,275,826 UART: [fwproc] Wait for Commands...
1,276,503 UART: [fwproc] Recv command 0x46574c44
1,277,236 UART: [fwproc] Recv'd Img size: 114448 bytes
2,576,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,768,662 >>> mbox cmd response: success
2,769,891 UART: [afmc] ++
2,770,059 UART: [afmc] CDI.KEYID = 6
2,770,422 UART: [afmc] SUBJECT.KEYID = 7
2,770,848 UART: [afmc] AUTHORITY.KEYID = 5
2,806,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,402 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,131 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,014 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,733 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,522 UART: [afmc] --
2,849,638 UART: [cold-reset] --
2,850,490 UART: [state] Locking Datavault
2,851,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,121 UART: [state] Locking ICCM
2,852,769 UART: [exit] Launching FMC @ 0x40000130
2,858,098 UART:
2,858,114 UART: Running Caliptra FMC ...
2,858,522 UART:
2,858,576 UART: [state] CFI Enabled
2,868,781 UART: [fht] FMC Alias Private Key: 7
2,976,402 UART: [art] Extend RT PCRs Done
2,976,830 UART: [art] Lock RT PCRs Done
2,978,654 UART: [art] Populate DV Done
2,986,713 UART: [fht] FMC Alias Private Key: 7
2,987,809 UART: [art] Derive CDI
2,988,089 UART: [art] Store in in slot 0x4
3,073,350 UART: [art] Derive Key Pair
3,073,710 UART: [art] Store priv key in slot 0x5
3,086,382 UART: [art] Derive Key Pair - Done
3,100,998 UART: [art] Signing Cert with AUTHO
3,101,478 UART: RITY.KEYID = 7
3,116,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,125 UART: [art] PUB.X = 378980169307D40AD5DAC12DAE7E7DB0E285249CC8B8541C4F043D436806BBF025373320DD9D50E17014A2BAAFE9D827
3,123,887 UART: [art] PUB.Y = AA424F873FEEFC64502AE80B1490166CE8836F6D05FE6162B023B43FEC23DFF5B90F25262FBCCDB1D5A3A454B8DE3F6A
3,130,848 UART: [art] SIG.R = 975A08C4970E2EFF9DFD54AE87CE830A3C80EB16FA8EBE1D7CBBBBDC3CAD8AA40E1B2B81131E586F17669E8F5B0B77B7
3,137,631 UART: [art] SIG.S = 3C702EECD270AB4A3EFC9BEC3EA6A33038B293FE3916AEFF8859B6FCB55F63E8AD1034B551E7668B045B8E916EA79FB1
3,161,351 UART: Caliptra RT
3,161,604 UART: [state] CFI Enabled
3,269,208 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
916,436 UART: [kat] HMAC-384Kdf
921,076 UART: [kat] LMS
1,169,388 UART: [kat] --
1,170,119 UART: [cold-reset] ++
1,170,545 UART: [fht] FHT @ 0x50003400
1,173,141 UART: [idev] ++
1,173,309 UART: [idev] CDI.KEYID = 6
1,173,670 UART: [idev] SUBJECT.KEYID = 7
1,174,095 UART: [idev] UDS.KEYID = 0
1,182,007 UART: [idev] Erasing UDS.KEYID = 0
1,198,668 UART: [idev] Fuse KeyId
1,199,890 UART: [idev] --
1,200,869 UART: [ldev] ++
1,201,037 UART: [ldev] CDI.KEYID = 6
1,201,401 UART: [ldev] SUBJECT.KEYID = 5
1,201,828 UART: [ldev] AUTHORITY.KEYID = 7
1,202,291 UART: [ldev] FE.KEYID = 1
1,207,489 UART: [ldev] Erasing FE.KEYID = 1
1,233,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,629 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,311 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,294 UART: [ldev] --
1,272,726 UART: [fwproc] Wait for Commands...
1,273,309 UART: [fwproc] Recv command 0x46574c44
1,274,042 UART: [fwproc] Recv'd Img size: 114448 bytes
2,573,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,342 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,767,228 >>> mbox cmd response: success
2,768,297 UART: [afmc] ++
2,768,465 UART: [afmc] CDI.KEYID = 6
2,768,828 UART: [afmc] SUBJECT.KEYID = 7
2,769,254 UART: [afmc] AUTHORITY.KEYID = 5
2,804,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,950 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,679 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,562 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,281 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,136 UART: [afmc] --
2,848,184 UART: [cold-reset] --
2,849,022 UART: [state] Locking Datavault
2,849,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,447 UART: [state] Locking ICCM
2,851,049 UART: [exit] Launching FMC @ 0x40000130
2,856,378 UART:
2,856,394 UART: Running Caliptra FMC ...
2,856,802 UART:
2,856,856 UART: [state] CFI Enabled
2,867,471 UART: [fht] FMC Alias Private Key: 7
2,975,304 UART: [art] Extend RT PCRs Done
2,975,732 UART: [art] Lock RT PCRs Done
2,976,900 UART: [art] Populate DV Done
2,984,963 UART: [fht] FMC Alias Private Key: 7
2,985,911 UART: [art] Derive CDI
2,986,191 UART: [art] Store in in slot 0x4
3,071,076 UART: [art] Derive Key Pair
3,071,436 UART: [art] Store priv key in slot 0x5
3,084,418 UART: [art] Derive Key Pair - Done
3,099,135 UART: [art] Signing Cert with AUTHO
3,099,615 UART: RITY.KEYID = 7
3,115,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,382 UART: [art] PUB.X = 05DD901CC4A1FBA0BEBE8C29B0D4B6F47CD1356FB8E5DE9CB2B31BA0BA3905688A6C0154C9D4AB758EAD48517275E678
3,123,163 UART: [art] PUB.Y = 2985E47C40F5E919EB97BB4A3802BEDF960C119C6885245A62CFB723237BD199ADF74B405356D5943F7B7A2113E19DEE
3,130,111 UART: [art] SIG.R = EA9F9ACAAE034D2AEC5BD15909CC359721792FC96FB1F8A4B1383E01FC9584739CC032DEBA1BDD8A7DC4D4062EFF3E98
3,136,893 UART: [art] SIG.S = A6C2F24B075E77C7AC674D6B7DC67628CFE18316328AA33071993BABC476FAF3457D77F7314F46C82E81D0C350DF1D14
3,160,559 UART: Caliptra RT
3,160,812 UART: [state] CFI Enabled
3,267,790 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,388 >>> mbox cmd response: success
2,684,102 UART:
2,684,118 UART: Running Caliptra FMC ...
2,684,526 UART:
2,684,580 UART: [state] CFI Enabled
2,694,971 UART: [fht] FMC Alias Private Key: 7
2,802,504 UART: [art] Extend RT PCRs Done
2,802,932 UART: [art] Lock RT PCRs Done
2,804,776 UART: [art] Populate DV Done
2,812,999 UART: [fht] FMC Alias Private Key: 7
2,814,151 UART: [art] Derive CDI
2,814,431 UART: [art] Store in in slot 0x4
2,900,278 UART: [art] Derive Key Pair
2,900,638 UART: [art] Store priv key in slot 0x5
2,913,812 UART: [art] Derive Key Pair - Done
2,928,922 UART: [art] Signing Cert with AUTHO
2,929,402 UART: RITY.KEYID = 7
2,944,888 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,653 UART: [art] PUB.X = A297C39617FCF86BE9537AA735C2B31CBBB872CBA06B471EADA399A50B60E044C8B6E96F9BD0F469D141A98EF4F9D698
2,952,436 UART: [art] PUB.Y = AC4EA3C9809A590C49EEA2CB67F05A1679A98E31B692B88ABA4219B011E484BB22F64B0E42011BEF9E183A7615D5857A
2,959,385 UART: [art] SIG.R = 9E898BF76D6155F4C09AD577DE32D2D62A245AB415746A87107537B181F485F97CC77556618F1F070339E3666D90F134
2,966,139 UART: [art] SIG.S = AF661E0357ED0882AD5CDD22295A4DD6D6D1E2F793530F851BA2551887544B05F34F98638D140302F2B3F71125C6E351
2,989,762 UART: Caliptra RT
2,990,015 UART: [state] CFI Enabled
3,096,925 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,834 >>> mbox cmd response: success
2,683,964 UART:
2,683,980 UART: Running Caliptra FMC ...
2,684,388 UART:
2,684,442 UART: [state] CFI Enabled
2,694,697 UART: [fht] FMC Alias Private Key: 7
2,801,734 UART: [art] Extend RT PCRs Done
2,802,162 UART: [art] Lock RT PCRs Done
2,803,686 UART: [art] Populate DV Done
2,811,809 UART: [fht] FMC Alias Private Key: 7
2,812,793 UART: [art] Derive CDI
2,813,073 UART: [art] Store in in slot 0x4
2,898,812 UART: [art] Derive Key Pair
2,899,172 UART: [art] Store priv key in slot 0x5
2,912,900 UART: [art] Derive Key Pair - Done
2,927,738 UART: [art] Signing Cert with AUTHO
2,928,218 UART: RITY.KEYID = 7
2,943,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,999 UART: [art] PUB.X = 15986BAF8385E2823D73B97A8D2D0BBB728258F3FC1C2099BB13670A3C16F08AFB48C76C337E0FB031CF771F10BC6AB8
2,950,770 UART: [art] PUB.Y = BE29C83703300B31BAF52E2E17F849E685E054F1C88D58FA891301EBED398BA00B8816DDDC0700D738F93D31797525B3
2,957,685 UART: [art] SIG.R = A7CAFEDED73C361E7093DF700F71141CA5DCA87AC9FCC0C24E0A719AE8F0FC0B2F2D5174AB04574C5D2B65D6479A5519
2,964,463 UART: [art] SIG.S = 76A730A009144F68E4C1ADF25E9D3B24FD603BE2FF11289F4D662948068D80FC80EC34C23FD108C243C29EC1A3BF1C66
2,988,117 UART: Caliptra RT
2,988,370 UART: [state] CFI Enabled
3,095,842 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,796 >>> mbox cmd response: success
2,681,916 UART:
2,681,932 UART: Running Caliptra FMC ...
2,682,340 UART:
2,682,394 UART: [state] CFI Enabled
2,693,113 UART: [fht] FMC Alias Private Key: 7
2,801,450 UART: [art] Extend RT PCRs Done
2,801,878 UART: [art] Lock RT PCRs Done
2,803,524 UART: [art] Populate DV Done
2,811,695 UART: [fht] FMC Alias Private Key: 7
2,812,727 UART: [art] Derive CDI
2,813,007 UART: [art] Store in in slot 0x4
2,898,162 UART: [art] Derive Key Pair
2,898,522 UART: [art] Store priv key in slot 0x5
2,912,188 UART: [art] Derive Key Pair - Done
2,927,161 UART: [art] Signing Cert with AUTHO
2,927,641 UART: RITY.KEYID = 7
2,942,643 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,408 UART: [art] PUB.X = F02220EA4AC4A958BE03D1336D584A681D5E5CC70953487A9BCFB79C622119C8880492822C7E935044C4BAB01A7027B5
2,950,167 UART: [art] PUB.Y = 5FC4410299BD4647C42E0CB04B0C3A04A62E3BF6922BA7AAAC9559611B2F94329F7ACDF86B4656FA2C3435BAC156CFD7
2,957,119 UART: [art] SIG.R = 86838839B7ADED20A236659DDA840752AFD039583341DB5787AB65CF2A9477071CC3F850ADB04ACDA31CF9AA7748FC55
2,963,891 UART: [art] SIG.S = 4DD221078AB4FC95BEB43419065D7C08D7218FC6A99860F5496B55931C6D7066B3FE084FA7B71885FD8A8E405C8A98A8
2,987,286 UART: Caliptra RT
2,987,539 UART: [state] CFI Enabled
3,095,055 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,616,462 >>> mbox cmd response: success
2,678,146 UART:
2,678,162 UART: Running Caliptra FMC ...
2,678,570 UART:
2,678,624 UART: [state] CFI Enabled
2,688,741 UART: [fht] FMC Alias Private Key: 7
2,797,566 UART: [art] Extend RT PCRs Done
2,797,994 UART: [art] Lock RT PCRs Done
2,799,376 UART: [art] Populate DV Done
2,807,417 UART: [fht] FMC Alias Private Key: 7
2,808,429 UART: [art] Derive CDI
2,808,709 UART: [art] Store in in slot 0x4
2,893,906 UART: [art] Derive Key Pair
2,894,266 UART: [art] Store priv key in slot 0x5
2,907,090 UART: [art] Derive Key Pair - Done
2,921,844 UART: [art] Signing Cert with AUTHO
2,922,324 UART: RITY.KEYID = 7
2,937,686 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,451 UART: [art] PUB.X = 76EE8DA8BDCD2A9F23B9A1F82C486304B097C6492CEE27D402DA5A9BE1DB9EDAC81FEF8A9474FC12E450E2A2096FA4DE
2,945,238 UART: [art] PUB.Y = A87B2C86FE1FC94E6138C91081BF6791335583E158402A7782C11F278679846AAF21B61CFF5A1F217A6A6952129DFBD5
2,952,186 UART: [art] SIG.R = 3D6BF318D31D05336EB37974598884A5BBEE12EBEFF2C94AD00B9948E8F95FA78A0ED575A3217A4D2EC0FB60B2351237
2,958,957 UART: [art] SIG.S = 9238D45F8D39F45A398698EE194882383F4DA03C1DD9951E7B6B88CFFF3E2AA5C14596A8C4FAFAB3D6107FAE0DFCFD54
2,982,857 UART: Caliptra RT
2,983,110 UART: [state] CFI Enabled
3,089,987 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.07s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,279 UART: [afmc] --
2,850,399 UART: [cold-reset] --
2,851,187 UART: [state] Locking Datavault
2,852,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,810 UART: [state] Locking ICCM
2,853,350 UART: [exit] Launching FMC @ 0x40000130
2,858,679 UART:
2,858,695 UART: Running Caliptra FMC ...
2,859,103 UART:
2,859,246 UART: [state] CFI Enabled
2,869,461 UART: [fht] FMC Alias Private Key: 7
2,977,502 UART: [art] Extend RT PCRs Done
2,977,930 UART: [art] Lock RT PCRs Done
2,979,516 UART: [art] Populate DV Done
2,987,973 UART: [fht] FMC Alias Private Key: 7
2,989,155 UART: [art] Derive CDI
2,989,435 UART: [art] Store in in slot 0x4
3,075,012 UART: [art] Derive Key Pair
3,075,372 UART: [art] Store priv key in slot 0x5
3,088,720 UART: [art] Derive Key Pair - Done
3,103,364 UART: [art] Signing Cert with AUTHO
3,103,844 UART: RITY.KEYID = 7
3,118,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,695 UART: [art] PUB.X = 3318CC34EF3BA48A17297399BDB190585D638C4792B0BA47906F172C69C259E555A5009537578F65602D7186A916B5DA
3,126,433 UART: [art] PUB.Y = 630263539C869BA1B2D1C98A28966A71CD0D9032733D828B1772AEC8B781086244F460088AF9AEF5BE42A05C34EC756E
3,133,369 UART: [art] SIG.R = 429F6E838DBE43C67DCB7EDAA7CA1053150AB94BFE9ECD5AC8E3F1F2350E832F458FBCECCB29CE58E63930E2BB4510FB
3,140,161 UART: [art] SIG.S = E983FD5E4D9C36378EB2D6905705DBF1A7744560285E58DE9968DA27FF765088212160EF430DE65D6DA3B64BE54353C2
3,164,118 UART: Caliptra RT
3,164,463 UART: [state] CFI Enabled
3,271,611 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
915,777 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,594 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,762 UART: [idev] ++
1,172,930 UART: [idev] CDI.KEYID = 6
1,173,291 UART: [idev] SUBJECT.KEYID = 7
1,173,716 UART: [idev] UDS.KEYID = 0
1,181,412 UART: [idev] Erasing UDS.KEYID = 0
1,198,559 UART: [idev] Sha384 KeyId Algorithm
1,202,482 UART: [idev] --
1,203,533 UART: [ldev] ++
1,203,701 UART: [ldev] CDI.KEYID = 6
1,204,065 UART: [ldev] SUBJECT.KEYID = 5
1,204,492 UART: [ldev] AUTHORITY.KEYID = 7
1,204,955 UART: [ldev] FE.KEYID = 1
1,210,207 UART: [ldev] Erasing FE.KEYID = 1
1,237,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,757 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,479 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,567 UART: [ldev] --
1,276,039 UART: [fwproc] Wait for Commands...
1,276,722 UART: [fwproc] Recv command 0x46574c44
1,277,455 UART: [fwproc] Recv'd Img size: 114448 bytes
2,576,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,769,349 >>> mbox cmd response: success
2,770,498 UART: [afmc] ++
2,770,666 UART: [afmc] CDI.KEYID = 6
2,771,029 UART: [afmc] SUBJECT.KEYID = 7
2,771,455 UART: [afmc] AUTHORITY.KEYID = 5
2,806,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,194 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,945 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,674 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,557 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,276 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,271 UART: [afmc] --
2,850,335 UART: [cold-reset] --
2,851,119 UART: [state] Locking Datavault
2,852,376 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,980 UART: [state] Locking ICCM
2,853,640 UART: [exit] Launching FMC @ 0x40000130
2,858,969 UART:
2,858,985 UART: Running Caliptra FMC ...
2,859,393 UART:
2,859,536 UART: [state] CFI Enabled
2,870,029 UART: [fht] FMC Alias Private Key: 7
2,977,290 UART: [art] Extend RT PCRs Done
2,977,718 UART: [art] Lock RT PCRs Done
2,979,170 UART: [art] Populate DV Done
2,987,479 UART: [fht] FMC Alias Private Key: 7
2,988,649 UART: [art] Derive CDI
2,988,929 UART: [art] Store in in slot 0x4
3,074,520 UART: [art] Derive Key Pair
3,074,880 UART: [art] Store priv key in slot 0x5
3,088,072 UART: [art] Derive Key Pair - Done
3,102,663 UART: [art] Signing Cert with AUTHO
3,103,143 UART: RITY.KEYID = 7
3,118,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,134 UART: [art] PUB.X = 4B74913E1288C2906DF98691255B4BAD6E38B05FECCDF020F3D6CB87B60411EDFE129A4B1F94F08B25D91FA85C5EFAE4
3,125,917 UART: [art] PUB.Y = 680742A32928279A7FB163E7E196A23DCB73F2E47D3ED68A0A009DF8E6D68278520628C74F63317421BBBB295C7033A5
3,132,832 UART: [art] SIG.R = B0F10846DA8FCB7D0B5558A3E6590CC9169E7E6885454E4BDFF5758A74AE9D17AB8D1CC49BF9BD8C7B34670BE284DBC2
3,139,608 UART: [art] SIG.S = E8696C239AE3FA14BFD89FFAB184209E1311070A0CB954FDB758E5749FCD58F9E6545D7F9DAA07CB908B9B0F5FC08856
3,163,476 UART: Caliptra RT
3,163,821 UART: [state] CFI Enabled
3,270,178 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,716 UART: [kat] SHA2-256
901,656 UART: [kat] SHA2-384
904,427 UART: [kat] SHA2-512-ACC
906,328 UART: [kat] ECC-384
916,417 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,316 UART: [idev] ++
1,173,484 UART: [idev] CDI.KEYID = 6
1,173,845 UART: [idev] SUBJECT.KEYID = 7
1,174,270 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Fuse KeyId
1,200,579 UART: [idev] --
1,201,510 UART: [ldev] ++
1,201,678 UART: [ldev] CDI.KEYID = 6
1,202,042 UART: [ldev] SUBJECT.KEYID = 5
1,202,469 UART: [ldev] AUTHORITY.KEYID = 7
1,202,932 UART: [ldev] FE.KEYID = 1
1,208,396 UART: [ldev] Erasing FE.KEYID = 1
1,234,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,002 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,684 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,705 UART: [ldev] --
1,274,221 UART: [fwproc] Wait for Commands...
1,274,962 UART: [fwproc] Recv command 0x46574c44
1,275,695 UART: [fwproc] Recv'd Img size: 114448 bytes
2,573,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,765,845 >>> mbox cmd response: success
2,767,042 UART: [afmc] ++
2,767,210 UART: [afmc] CDI.KEYID = 6
2,767,573 UART: [afmc] SUBJECT.KEYID = 7
2,767,999 UART: [afmc] AUTHORITY.KEYID = 5
2,803,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,021 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,750 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,633 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,352 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,317 UART: [afmc] --
2,847,305 UART: [cold-reset] --
2,848,253 UART: [state] Locking Datavault
2,849,520 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,124 UART: [state] Locking ICCM
2,850,636 UART: [exit] Launching FMC @ 0x40000130
2,855,965 UART:
2,855,981 UART: Running Caliptra FMC ...
2,856,389 UART:
2,856,532 UART: [state] CFI Enabled
2,866,803 UART: [fht] FMC Alias Private Key: 7
2,975,258 UART: [art] Extend RT PCRs Done
2,975,686 UART: [art] Lock RT PCRs Done
2,976,992 UART: [art] Populate DV Done
2,985,433 UART: [fht] FMC Alias Private Key: 7
2,986,367 UART: [art] Derive CDI
2,986,647 UART: [art] Store in in slot 0x4
3,072,108 UART: [art] Derive Key Pair
3,072,468 UART: [art] Store priv key in slot 0x5
3,085,956 UART: [art] Derive Key Pair - Done
3,100,554 UART: [art] Signing Cert with AUTHO
3,101,034 UART: RITY.KEYID = 7
3,116,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,341 UART: [art] PUB.X = 2DF7C875F56455AB9A86211636F8ADDF89598E52AE83BE2B4019988CDC7F025884F34CF5B81E7C6926D2E64A88E96DF6
3,124,114 UART: [art] PUB.Y = 0C3BEACFB2075CE811DCF39EC3A906BDA9D586A78641A8BC808BC5FAF0064EE7F6D48DBC6EEB92EBDE678B259AAD7E49
3,131,084 UART: [art] SIG.R = EDB7FC4D428521CF0F801CACDEA1477C9A7E602AD0D26A5625444BEB147DEFFF6DD0FA1366A2238D9EB61D3DAE9FC429
3,137,877 UART: [art] SIG.S = 0A2D1AFE558F8B99B274311EA6DDF57999E73793448805845B84D9E685E1E38B3452F8040E7922440314A71926D98C0C
3,161,876 UART: Caliptra RT
3,162,221 UART: [state] CFI Enabled
3,270,322 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,213 >>> mbox cmd response: success
2,685,375 UART:
2,685,391 UART: Running Caliptra FMC ...
2,685,799 UART:
2,685,942 UART: [state] CFI Enabled
2,696,219 UART: [fht] FMC Alias Private Key: 7
2,804,148 UART: [art] Extend RT PCRs Done
2,804,576 UART: [art] Lock RT PCRs Done
2,805,958 UART: [art] Populate DV Done
2,813,835 UART: [fht] FMC Alias Private Key: 7
2,814,923 UART: [art] Derive CDI
2,815,203 UART: [art] Store in in slot 0x4
2,900,640 UART: [art] Derive Key Pair
2,901,000 UART: [art] Store priv key in slot 0x5
2,914,454 UART: [art] Derive Key Pair - Done
2,929,358 UART: [art] Signing Cert with AUTHO
2,929,838 UART: RITY.KEYID = 7
2,945,132 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,897 UART: [art] PUB.X = 9A2F98DD5FCC0536867EFBA85BE74037ED39829880625C62196E1D93273E94CF9CB67D8628740FF46491258E9D8EDB5D
2,952,663 UART: [art] PUB.Y = 5AF2E87149847B35C7CDCF26C5F231A5395D41C92D36412A2E844FEB416EE01460B875A3ED751FA1E22C5659584D7C03
2,959,612 UART: [art] SIG.R = D345A80F1DF1841DC9506059700B4FB3F66A9E49D6AB25526E81DC2B81D6FD70A3F3F1C90E90CB1F42E22F583103FA16
2,966,378 UART: [art] SIG.S = 63FC2322F6E81BC5A7F72DAE9D9F4F643F900F240CF55860719318A62D4C979043F9A6BE3060F381BD06F391091D2853
2,990,415 UART: Caliptra RT
2,990,760 UART: [state] CFI Enabled
3,099,323 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,620,309 >>> mbox cmd response: success
2,682,199 UART:
2,682,215 UART: Running Caliptra FMC ...
2,682,623 UART:
2,682,766 UART: [state] CFI Enabled
2,692,977 UART: [fht] FMC Alias Private Key: 7
2,800,520 UART: [art] Extend RT PCRs Done
2,800,948 UART: [art] Lock RT PCRs Done
2,802,616 UART: [art] Populate DV Done
2,810,805 UART: [fht] FMC Alias Private Key: 7
2,811,847 UART: [art] Derive CDI
2,812,127 UART: [art] Store in in slot 0x4
2,897,940 UART: [art] Derive Key Pair
2,898,300 UART: [art] Store priv key in slot 0x5
2,911,690 UART: [art] Derive Key Pair - Done
2,926,471 UART: [art] Signing Cert with AUTHO
2,926,951 UART: RITY.KEYID = 7
2,942,599 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,364 UART: [art] PUB.X = 6E603E4B230A77E63A0B7E36EB2F643922C86B3682EB635E7B5EA94269F19F9A36DC4C6EA62E4E2FAC7CB563D02164EC
2,950,140 UART: [art] PUB.Y = 32441E94FD56218E0947B520BC32D4EBCF2C9FD4535204ECBFD5C4DAE96FCA79562B055DAC2CCCF3411303532131F22D
2,957,090 UART: [art] SIG.R = 6D240DC905BA61337F532E810AAD233E867BB1F92FAF6F69CF9DDF88350E6CDD8A3C48581FA2B3A5FC6F282DDEE1B0EF
2,963,872 UART: [art] SIG.S = F95665F6BFA3784FD5CCF98ABB1C670979175A9225656A0D4640D503B2C79C59591E858212E30A2468A4AA9AA1C146E1
2,987,633 UART: Caliptra RT
2,987,978 UART: [state] CFI Enabled
3,095,376 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,329 >>> mbox cmd response: success
2,679,743 UART:
2,679,759 UART: Running Caliptra FMC ...
2,680,167 UART:
2,680,310 UART: [state] CFI Enabled
2,690,763 UART: [fht] FMC Alias Private Key: 7
2,798,074 UART: [art] Extend RT PCRs Done
2,798,502 UART: [art] Lock RT PCRs Done
2,799,800 UART: [art] Populate DV Done
2,807,881 UART: [fht] FMC Alias Private Key: 7
2,809,033 UART: [art] Derive CDI
2,809,313 UART: [art] Store in in slot 0x4
2,895,036 UART: [art] Derive Key Pair
2,895,396 UART: [art] Store priv key in slot 0x5
2,908,820 UART: [art] Derive Key Pair - Done
2,923,640 UART: [art] Signing Cert with AUTHO
2,924,120 UART: RITY.KEYID = 7
2,939,532 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,297 UART: [art] PUB.X = CC4F77F9DED8B36793D3171D419E79617268BC8D6960299F4E2AD001991696C89CEC5A9DF6DB8FAEACC79D2EBA69DAD5
2,947,082 UART: [art] PUB.Y = 50CCC02E0B8AF4DAE054128EE2B72C03D0AEC276FE9A7E550A022EAF9E5443C380856FDE4FC741E4369BC10146621BD2
2,954,031 UART: [art] SIG.R = 83A931F2C5DE1DF58FF4D76AF62971FEBF7C5B9AE7E1FF45CDDCB2F5933245996AC6B879D2A483370558DD02F58B464F
2,960,811 UART: [art] SIG.S = A03685D87FBAF2A6C05575679679829D00AF58853DF481E3F5A95E7ABB89A57E6F69D0873AD4F9E401A66FB283FD40BF
2,985,287 UART: Caliptra RT
2,985,632 UART: [state] CFI Enabled
3,093,533 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,616,743 >>> mbox cmd response: success
2,679,541 UART:
2,679,557 UART: Running Caliptra FMC ...
2,679,965 UART:
2,680,108 UART: [state] CFI Enabled
2,690,665 UART: [fht] FMC Alias Private Key: 7
2,798,964 UART: [art] Extend RT PCRs Done
2,799,392 UART: [art] Lock RT PCRs Done
2,801,042 UART: [art] Populate DV Done
2,809,403 UART: [fht] FMC Alias Private Key: 7
2,810,573 UART: [art] Derive CDI
2,810,853 UART: [art] Store in in slot 0x4
2,896,754 UART: [art] Derive Key Pair
2,897,114 UART: [art] Store priv key in slot 0x5
2,910,660 UART: [art] Derive Key Pair - Done
2,925,606 UART: [art] Signing Cert with AUTHO
2,926,086 UART: RITY.KEYID = 7
2,941,324 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,089 UART: [art] PUB.X = F21AF1ED3A502FA997B2EB141A3CBF883987FEF79703A8825904B419225B402718FDBC2F2AB1C853A05D16B501606F30
2,948,854 UART: [art] PUB.Y = A2C883D0AE10988407C23EABBEE57E9CE0794373C932F1F375BCCA3BD1B2ED1E340B61C6EC68C9D20159DAE397FDBA9B
2,955,817 UART: [art] SIG.R = F1195D38DF76E913573E93FB5C1ABBB5FEA039B4392C01BF09426C053EE15ABB9676CA8E42004175EC9889F2C5630FA2
2,962,561 UART: [art] SIG.S = 5939CAD38773444E4FF1F994B6DCBCF56DC83B0712283D1373A0A2D36FD6A3F55ADAEFAA3181A589F41334163FFC6EFA
2,986,055 UART: Caliptra RT
2,986,400 UART: [state] CFI Enabled
3,094,443 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.71s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,526 UART: [afmc] --
2,851,474 UART: [cold-reset] --
2,852,240 UART: [state] Locking Datavault
2,853,285 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,889 UART: [state] Locking ICCM
2,854,389 UART: [exit] Launching FMC @ 0x40000130
2,859,718 UART:
2,859,734 UART: Running Caliptra FMC ...
2,860,142 UART:
2,860,196 UART: [state] CFI Enabled
2,870,831 UART: [fht] FMC Alias Private Key: 7
2,979,124 UART: [art] Extend RT PCRs Done
2,979,552 UART: [art] Lock RT PCRs Done
2,981,584 UART: [art] Populate DV Done
2,989,913 UART: [fht] FMC Alias Private Key: 7
2,991,009 UART: [art] Derive CDI
2,991,289 UART: [art] Store in in slot 0x4
3,076,712 UART: [art] Derive Key Pair
3,077,072 UART: [art] Store priv key in slot 0x5
3,090,270 UART: [art] Derive Key Pair - Done
3,105,076 UART: [art] Signing Cert with AUTHO
3,105,556 UART: RITY.KEYID = 7
3,120,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,447 UART: [art] PUB.X = 18A2EAC83EA6B56517E43F6E8E76C7506AE401BAB80FD492984C4F6E740A88A6EF3E636F735C04D733AD90EC9D534CC0
3,128,217 UART: [art] PUB.Y = 27BBC26EAED30D43E86BB44C2C44D978B153AE0DC0AB1D00B8F5CC95827052D720556A29E375DE262CAC27D3B6476CD2
3,135,153 UART: [art] SIG.R = 20C420134FF53B58E233356BF20B5DBF85F34C1035D79F40D8B38AF25825C2DA99C83450BC8C4A637A2AE12276D08E3A
3,141,924 UART: [art] SIG.S = 5D785BFD38CFCC6EA22D24828B4FCD8033161C3E65ED3FA30E5236BA0A0746BB83D2AD476A99D22C98AC146E2466E5D9
3,166,358 UART: Caliptra RT
3,166,611 UART: [state] CFI Enabled
3,273,886 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,444 UART: [kat] LMS
1,168,756 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,297 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,182,375 UART: [idev] Erasing UDS.KEYID = 0
1,199,682 UART: [idev] Sha384 KeyId Algorithm
1,203,267 UART: [idev] --
1,204,478 UART: [ldev] ++
1,204,646 UART: [ldev] CDI.KEYID = 6
1,205,010 UART: [ldev] SUBJECT.KEYID = 5
1,205,437 UART: [ldev] AUTHORITY.KEYID = 7
1,205,900 UART: [ldev] FE.KEYID = 1
1,211,068 UART: [ldev] Erasing FE.KEYID = 1
1,237,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,098 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,820 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,778 UART: [ldev] --
1,276,290 UART: [fwproc] Wait for Commands...
1,277,007 UART: [fwproc] Recv command 0x46574c44
1,277,740 UART: [fwproc] Recv'd Img size: 114448 bytes
2,576,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,769,914 >>> mbox cmd response: success
2,770,939 UART: [afmc] ++
2,771,107 UART: [afmc] CDI.KEYID = 6
2,771,470 UART: [afmc] SUBJECT.KEYID = 7
2,771,896 UART: [afmc] AUTHORITY.KEYID = 5
2,807,367 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,480 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,209 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,092 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,811 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,730 UART: [afmc] --
2,850,768 UART: [cold-reset] --
2,851,546 UART: [state] Locking Datavault
2,852,615 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,219 UART: [state] Locking ICCM
2,853,851 UART: [exit] Launching FMC @ 0x40000130
2,859,180 UART:
2,859,196 UART: Running Caliptra FMC ...
2,859,604 UART:
2,859,658 UART: [state] CFI Enabled
2,870,297 UART: [fht] FMC Alias Private Key: 7
2,979,066 UART: [art] Extend RT PCRs Done
2,979,494 UART: [art] Lock RT PCRs Done
2,981,090 UART: [art] Populate DV Done
2,989,319 UART: [fht] FMC Alias Private Key: 7
2,990,261 UART: [art] Derive CDI
2,990,541 UART: [art] Store in in slot 0x4
3,076,264 UART: [art] Derive Key Pair
3,076,624 UART: [art] Store priv key in slot 0x5
3,089,776 UART: [art] Derive Key Pair - Done
3,104,764 UART: [art] Signing Cert with AUTHO
3,105,244 UART: RITY.KEYID = 7
3,120,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,221 UART: [art] PUB.X = C40C227328538B7165CBE9EAE431667A328134485F968BAC95901BC65A6CDC7A7F31325E71AD90E591D8A43E685AFBA0
3,127,992 UART: [art] PUB.Y = E8DDA4E799979A30FE44492D1D377496BF790A9DFCED1900F1B9557B8E85DA72FAF4EE6CB38408FA06B49D425DAEC292
3,134,927 UART: [art] SIG.R = 21BF5BACAA9C924AB6F908D6AEC1E9A45D163E0F697310F037F55B61CB1375CFFCFAD5A25650218EEDE5A8216F1F415F
3,141,711 UART: [art] SIG.S = B9A6CFAA7F78EE6D5D9D93ACF21301DBBD8F17A295FF3091A2D0974B183C23993886BF05749514F2CD3B67C7A57CB53B
3,165,836 UART: Caliptra RT
3,166,089 UART: [state] CFI Enabled
3,272,675 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
916,310 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,683 UART: [fht] FHT @ 0x50003400
1,173,367 UART: [idev] ++
1,173,535 UART: [idev] CDI.KEYID = 6
1,173,896 UART: [idev] SUBJECT.KEYID = 7
1,174,321 UART: [idev] UDS.KEYID = 0
1,182,183 UART: [idev] Erasing UDS.KEYID = 0
1,198,664 UART: [idev] Fuse KeyId
1,199,886 UART: [idev] --
1,200,835 UART: [ldev] ++
1,201,003 UART: [ldev] CDI.KEYID = 6
1,201,367 UART: [ldev] SUBJECT.KEYID = 5
1,201,794 UART: [ldev] AUTHORITY.KEYID = 7
1,202,257 UART: [ldev] FE.KEYID = 1
1,207,391 UART: [ldev] Erasing FE.KEYID = 1
1,233,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,283 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,263,965 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,188 UART: [ldev] --
1,272,500 UART: [fwproc] Wait for Commands...
1,273,197 UART: [fwproc] Recv command 0x46574c44
1,273,930 UART: [fwproc] Recv'd Img size: 114448 bytes
2,574,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,765,762 >>> mbox cmd response: success
2,766,897 UART: [afmc] ++
2,767,065 UART: [afmc] CDI.KEYID = 6
2,767,428 UART: [afmc] SUBJECT.KEYID = 7
2,767,854 UART: [afmc] AUTHORITY.KEYID = 5
2,802,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,631 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,010 UART: [afmc] --
2,846,022 UART: [cold-reset] --
2,846,732 UART: [state] Locking Datavault
2,847,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,585 UART: [state] Locking ICCM
2,849,171 UART: [exit] Launching FMC @ 0x40000130
2,854,500 UART:
2,854,516 UART: Running Caliptra FMC ...
2,854,924 UART:
2,854,978 UART: [state] CFI Enabled
2,865,479 UART: [fht] FMC Alias Private Key: 7
2,973,526 UART: [art] Extend RT PCRs Done
2,973,954 UART: [art] Lock RT PCRs Done
2,975,586 UART: [art] Populate DV Done
2,983,905 UART: [fht] FMC Alias Private Key: 7
2,984,963 UART: [art] Derive CDI
2,985,243 UART: [art] Store in in slot 0x4
3,070,854 UART: [art] Derive Key Pair
3,071,214 UART: [art] Store priv key in slot 0x5
3,084,354 UART: [art] Derive Key Pair - Done
3,099,116 UART: [art] Signing Cert with AUTHO
3,099,596 UART: RITY.KEYID = 7
3,115,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,861 UART: [art] PUB.X = B258E3EB4D8E412A11420A49B826BDE3A6FE882195DD4F7F300C294E78B21147806595DB537DD61866178EAEFD7E71B1
3,122,629 UART: [art] PUB.Y = 3FB8E9A9BD1749612C1C79F61522764F3017D51727B6FCB03257019A7B83D31FF71AA3EF73A86AFE239DDADD81C8C1B9
3,129,586 UART: [art] SIG.R = 28809F73800336C8734556CFBCB323F8EE7EAA6D0E72FA8A067F548D01FD918AFD6CED72425CE8400937AE79B30835C0
3,136,344 UART: [art] SIG.S = A1E39AFEBB1365F9D33054FD54CC6D52FF5404A238D8EF5082513C2AAAE0EF3951713741693EC02BDB1181EACFFBEC59
3,159,852 UART: Caliptra RT
3,160,105 UART: [state] CFI Enabled
3,267,692 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,546 >>> mbox cmd response: success
2,685,348 UART:
2,685,364 UART: Running Caliptra FMC ...
2,685,772 UART:
2,685,826 UART: [state] CFI Enabled
2,696,293 UART: [fht] FMC Alias Private Key: 7
2,803,984 UART: [art] Extend RT PCRs Done
2,804,412 UART: [art] Lock RT PCRs Done
2,805,850 UART: [art] Populate DV Done
2,813,867 UART: [fht] FMC Alias Private Key: 7
2,814,821 UART: [art] Derive CDI
2,815,101 UART: [art] Store in in slot 0x4
2,901,022 UART: [art] Derive Key Pair
2,901,382 UART: [art] Store priv key in slot 0x5
2,914,118 UART: [art] Derive Key Pair - Done
2,928,688 UART: [art] Signing Cert with AUTHO
2,929,168 UART: RITY.KEYID = 7
2,944,196 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,961 UART: [art] PUB.X = 4A1DAADFE7BEE72EA717BA654D961A8F5CB349CCAAA81BC2F128B51E796FB502137D6F96C2CA6388D8C73976F870FE1E
2,951,750 UART: [art] PUB.Y = 8956E56D71AFEC9CCA9EFE0C21B694D96F043A574760DF28CF63C1E5F18F7AB1E6A0A2C9515C732783C35048AD0EF4B4
2,958,705 UART: [art] SIG.R = 190A6C14A2EE6981CEBFD7D644A33E80AD7410A6600818A70B147B5FA1A852E54AC344C86C0DCA5A81C34EE0F691275A
2,965,473 UART: [art] SIG.S = E5E603E1039A51C1550541E470271CE84071F11783F9071C6215EF408DF87D53EBB024ED418558C98D9322D0241106CE
2,989,089 UART: Caliptra RT
2,989,342 UART: [state] CFI Enabled
3,097,397 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,868 >>> mbox cmd response: success
2,680,716 UART:
2,680,732 UART: Running Caliptra FMC ...
2,681,140 UART:
2,681,194 UART: [state] CFI Enabled
2,691,545 UART: [fht] FMC Alias Private Key: 7
2,798,910 UART: [art] Extend RT PCRs Done
2,799,338 UART: [art] Lock RT PCRs Done
2,800,756 UART: [art] Populate DV Done
2,809,039 UART: [fht] FMC Alias Private Key: 7
2,810,221 UART: [art] Derive CDI
2,810,501 UART: [art] Store in in slot 0x4
2,896,644 UART: [art] Derive Key Pair
2,897,004 UART: [art] Store priv key in slot 0x5
2,910,462 UART: [art] Derive Key Pair - Done
2,925,564 UART: [art] Signing Cert with AUTHO
2,926,044 UART: RITY.KEYID = 7
2,940,992 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,757 UART: [art] PUB.X = 18BA520BC78751AAB1E5A57FB219F8F5B73ABE4A0DC992F7CADBECD2F85BD83D056EDCEB75E477CA3078E1B7A22F3D81
2,948,546 UART: [art] PUB.Y = 2FD835D45F81C99CA4554A6E73211334AF423B587B1E7F4ECAA0AB4FA7F6DE351B312FE245F0241758FD0C6359FBD9A8
2,955,505 UART: [art] SIG.R = 14D43EC6814E3334E5678742587C430AF8E91E9A1C1222196EEE04B4DFCEDBE519BC588880F224207FAE977747947B6F
2,962,269 UART: [art] SIG.S = 5DFE2D24C56A93E09ACC2A0F6DED7D3EAAD87AB75D8987E6B6654317D4457EB3ECBA3228226ECBCC9441B3B949B0E993
2,986,207 UART: Caliptra RT
2,986,460 UART: [state] CFI Enabled
3,094,055 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,617,402 >>> mbox cmd response: success
2,679,778 UART:
2,679,794 UART: Running Caliptra FMC ...
2,680,202 UART:
2,680,256 UART: [state] CFI Enabled
2,690,889 UART: [fht] FMC Alias Private Key: 7
2,798,986 UART: [art] Extend RT PCRs Done
2,799,414 UART: [art] Lock RT PCRs Done
2,800,932 UART: [art] Populate DV Done
2,808,839 UART: [fht] FMC Alias Private Key: 7
2,810,017 UART: [art] Derive CDI
2,810,297 UART: [art] Store in in slot 0x4
2,895,828 UART: [art] Derive Key Pair
2,896,188 UART: [art] Store priv key in slot 0x5
2,909,122 UART: [art] Derive Key Pair - Done
2,923,422 UART: [art] Signing Cert with AUTHO
2,923,902 UART: RITY.KEYID = 7
2,939,194 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,959 UART: [art] PUB.X = BAD496FD5F62875634E17B15FECDC0322E9C17F7F0EA406E370A2386183B7FDB7B882FD0AB12B5D68108E229A6548CCC
2,946,735 UART: [art] PUB.Y = 4A29BD7671EDDDADB3714600E1B5DDB77D5C931FDE0BB6B9F62C5C0EA849CAE91E98D4D7894C1809EF34580A3F3218DF
2,953,671 UART: [art] SIG.R = 2FA299ACC3FF691F06C2ABBEB5B510DEF7122D58B2D52BE52326C03628E0B7F857766E00743C3C5042C2254648A64B27
2,960,420 UART: [art] SIG.S = 4319BF2C07B875393387CFE0B2E12AA179D3A8986968FA4A691E7F838CB3AA9E97487DE935F0F527EC8C2DF3A3C9566F
2,984,218 UART: Caliptra RT
2,984,471 UART: [state] CFI Enabled
3,091,174 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,617,042 >>> mbox cmd response: success
2,677,810 UART:
2,677,826 UART: Running Caliptra FMC ...
2,678,234 UART:
2,678,288 UART: [state] CFI Enabled
2,688,917 UART: [fht] FMC Alias Private Key: 7
2,796,770 UART: [art] Extend RT PCRs Done
2,797,198 UART: [art] Lock RT PCRs Done
2,798,700 UART: [art] Populate DV Done
2,806,921 UART: [fht] FMC Alias Private Key: 7
2,807,935 UART: [art] Derive CDI
2,808,215 UART: [art] Store in in slot 0x4
2,893,460 UART: [art] Derive Key Pair
2,893,820 UART: [art] Store priv key in slot 0x5
2,906,810 UART: [art] Derive Key Pair - Done
2,921,640 UART: [art] Signing Cert with AUTHO
2,922,120 UART: RITY.KEYID = 7
2,937,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,937,987 UART: [art] PUB.X = 21DCCACC4A94EB7E80F5DDE1916985C998B2D6222E7E33FAB2B086DC95BA9F2EC0A45E7E6538C827FFCF7BE76B97E480
2,944,779 UART: [art] PUB.Y = CAFAFC5098A73EA6297E662978C05BC0B0DCBAEE50FA91A03347CD7714F383747AA6088117311EB610B3359218F30857
2,951,725 UART: [art] SIG.R = 24EF98E0D68B60E6CE4DCBB84EE9D7C3BE8351148FA022DD4B11DE2798E84D24536DE73C72B77779BB5CD83F6A6B64A2
2,958,511 UART: [art] SIG.S = 5301CED9FBF2D4430150D5A3FEEFD01CF314D3BFDB649AA27B9DA41D85D817832B3551DBABAE6190669B27A17ABCF15E
2,982,160 UART: Caliptra RT
2,982,413 UART: [state] CFI Enabled
3,089,774 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.27s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,975 UART: [afmc] --
2,849,911 UART: [cold-reset] --
2,850,799 UART: [state] Locking Datavault
2,851,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,590 UART: [state] Locking ICCM
2,853,202 UART: [exit] Launching FMC @ 0x40000130
2,858,531 UART:
2,858,547 UART: Running Caliptra FMC ...
2,858,955 UART:
2,859,098 UART: [state] CFI Enabled
2,869,341 UART: [fht] FMC Alias Private Key: 7
2,977,454 UART: [art] Extend RT PCRs Done
2,977,882 UART: [art] Lock RT PCRs Done
2,979,144 UART: [art] Populate DV Done
2,987,261 UART: [fht] FMC Alias Private Key: 7
2,988,285 UART: [art] Derive CDI
2,988,565 UART: [art] Store in in slot 0x4
3,074,292 UART: [art] Derive Key Pair
3,074,652 UART: [art] Store priv key in slot 0x5
3,088,078 UART: [art] Derive Key Pair - Done
3,102,718 UART: [art] Signing Cert with AUTHO
3,103,198 UART: RITY.KEYID = 7
3,118,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,063 UART: [art] PUB.X = 27C5B145743A337C7187D7C88CBEEB5D241196EE4B83FBC6B8D14B0127D0D5D0D3EBF3110BC42DD9E7747288248EF8C1
3,125,837 UART: [art] PUB.Y = F2D33ACB33BF891500881A71D4BBD9C2E14D4CF44776B92B728BB371BA77AE81DBB10610C70D7BA2186A5E3DB2C4FE38
3,132,775 UART: [art] SIG.R = 3C4A3B1B6BFF75CE93658AD79905FD93577706BC244405914144E56292C5B79FA986648BC2185B6B692C904CCBA2C7EB
3,139,538 UART: [art] SIG.S = 1F18E6E52B6270525ECF768144F1B55E1B6BB6A97F1A03BCF19777235D9694A1574A4F343F6D924C7BBEC6CC0F9178FF
3,164,003 UART: Caliptra RT
3,164,348 UART: [state] CFI Enabled
3,271,685 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,055 UART: [kat] LMS
1,169,367 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,162 UART: [idev] ++
1,173,330 UART: [idev] CDI.KEYID = 6
1,173,691 UART: [idev] SUBJECT.KEYID = 7
1,174,116 UART: [idev] UDS.KEYID = 0
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,069 UART: [idev] Sha384 KeyId Algorithm
1,202,964 UART: [idev] --
1,204,071 UART: [ldev] ++
1,204,239 UART: [ldev] CDI.KEYID = 6
1,204,603 UART: [ldev] SUBJECT.KEYID = 5
1,205,030 UART: [ldev] AUTHORITY.KEYID = 7
1,205,493 UART: [ldev] FE.KEYID = 1
1,210,839 UART: [ldev] Erasing FE.KEYID = 1
1,236,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,935 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,657 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,609 UART: [ldev] --
1,275,933 UART: [fwproc] Wait for Commands...
1,276,672 UART: [fwproc] Recv command 0x46574c44
1,277,405 UART: [fwproc] Recv'd Img size: 114448 bytes
2,576,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,768,733 >>> mbox cmd response: success
2,769,886 UART: [afmc] ++
2,770,054 UART: [afmc] CDI.KEYID = 6
2,770,417 UART: [afmc] SUBJECT.KEYID = 7
2,770,843 UART: [afmc] AUTHORITY.KEYID = 5
2,806,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,547 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,276 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,159 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,878 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,767 UART: [afmc] --
2,849,819 UART: [cold-reset] --
2,850,461 UART: [state] Locking Datavault
2,851,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,186 UART: [state] Locking ICCM
2,852,756 UART: [exit] Launching FMC @ 0x40000130
2,858,085 UART:
2,858,101 UART: Running Caliptra FMC ...
2,858,509 UART:
2,858,652 UART: [state] CFI Enabled
2,869,277 UART: [fht] FMC Alias Private Key: 7
2,977,218 UART: [art] Extend RT PCRs Done
2,977,646 UART: [art] Lock RT PCRs Done
2,979,184 UART: [art] Populate DV Done
2,987,243 UART: [fht] FMC Alias Private Key: 7
2,988,321 UART: [art] Derive CDI
2,988,601 UART: [art] Store in in slot 0x4
3,074,330 UART: [art] Derive Key Pair
3,074,690 UART: [art] Store priv key in slot 0x5
3,087,784 UART: [art] Derive Key Pair - Done
3,102,723 UART: [art] Signing Cert with AUTHO
3,103,203 UART: RITY.KEYID = 7
3,118,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,132 UART: [art] PUB.X = FBB08920C5A9168622B87551C1483711F20F636E4326BA6184E915DFC636531976B19B212D07712AA8D60DCCBAC5A9D4
3,125,891 UART: [art] PUB.Y = 1CD2BC4EC6C182859CDC9240F8CCB65133996AAC61F6F0D485D73512B32A905F21EF3EDF5407C44C69B60277EF3ABA38
3,132,847 UART: [art] SIG.R = F969B6E968B1BEE9EC411F44691115B42931DB8A17457230EBDD537D73B6862350589C7F6CC7D9562C421BCCB9C6DCCA
3,139,625 UART: [art] SIG.S = BDDD345C71BF7D603CF884CA1D026D124FDC6501DBFF876534F60029640D4E4524497EAC75BC87251E21EAE242363639
3,162,953 UART: Caliptra RT
3,163,298 UART: [state] CFI Enabled
3,270,461 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
920,991 UART: [kat] LMS
1,169,303 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,182,586 UART: [idev] Erasing UDS.KEYID = 0
1,199,711 UART: [idev] Fuse KeyId
1,200,933 UART: [idev] --
1,201,938 UART: [ldev] ++
1,202,106 UART: [ldev] CDI.KEYID = 6
1,202,470 UART: [ldev] SUBJECT.KEYID = 5
1,202,897 UART: [ldev] AUTHORITY.KEYID = 7
1,203,360 UART: [ldev] FE.KEYID = 1
1,208,718 UART: [ldev] Erasing FE.KEYID = 1
1,235,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,350 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,266,032 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,913 UART: [ldev] --
1,274,425 UART: [fwproc] Wait for Commands...
1,275,078 UART: [fwproc] Recv command 0x46574c44
1,275,811 UART: [fwproc] Recv'd Img size: 114448 bytes
2,574,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,766,987 >>> mbox cmd response: success
2,768,030 UART: [afmc] ++
2,768,198 UART: [afmc] CDI.KEYID = 6
2,768,561 UART: [afmc] SUBJECT.KEYID = 7
2,768,987 UART: [afmc] AUTHORITY.KEYID = 5
2,804,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,502 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,104 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,857 UART: [afmc] --
2,847,829 UART: [cold-reset] --
2,848,853 UART: [state] Locking Datavault
2,850,020 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,624 UART: [state] Locking ICCM
2,851,048 UART: [exit] Launching FMC @ 0x40000130
2,856,377 UART:
2,856,393 UART: Running Caliptra FMC ...
2,856,801 UART:
2,856,944 UART: [state] CFI Enabled
2,867,493 UART: [fht] FMC Alias Private Key: 7
2,975,548 UART: [art] Extend RT PCRs Done
2,975,976 UART: [art] Lock RT PCRs Done
2,977,552 UART: [art] Populate DV Done
2,986,045 UART: [fht] FMC Alias Private Key: 7
2,987,071 UART: [art] Derive CDI
2,987,351 UART: [art] Store in in slot 0x4
3,072,860 UART: [art] Derive Key Pair
3,073,220 UART: [art] Store priv key in slot 0x5
3,085,842 UART: [art] Derive Key Pair - Done
3,100,406 UART: [art] Signing Cert with AUTHO
3,100,886 UART: RITY.KEYID = 7
3,116,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,857 UART: [art] PUB.X = C91BA2268113A5F64107295C16BB1DEBA8493AA5E0C1843BC0FD580D9B3DE7010ADF0DCD9A4AA0351944368F2CA47CAF
3,123,628 UART: [art] PUB.Y = D961C5E760EA3A8B99EA9CF55E8C669384DB86E3DD6F403D4FC689127907EBCE03C867C492856BB7AB7462511B79786C
3,130,578 UART: [art] SIG.R = 819E58CB3A035B17105931B5C4BD4B280ABE4E67FE1061748504A7B2B12F2BA6A44A0B10731A255D742CA63C8D5AA0BC
3,137,344 UART: [art] SIG.S = 833DC0854FF942511119CBB2F837A1CAE43DF5283C0C00ECDFE97EA5C2913D358F32776A9F535AA2C368E8F8311BE834
3,161,572 UART: Caliptra RT
3,161,917 UART: [state] CFI Enabled
3,269,303 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,649 >>> mbox cmd response: success
2,687,787 UART:
2,687,803 UART: Running Caliptra FMC ...
2,688,211 UART:
2,688,354 UART: [state] CFI Enabled
2,699,203 UART: [fht] FMC Alias Private Key: 7
2,807,130 UART: [art] Extend RT PCRs Done
2,807,558 UART: [art] Lock RT PCRs Done
2,808,798 UART: [art] Populate DV Done
2,816,977 UART: [fht] FMC Alias Private Key: 7
2,818,029 UART: [art] Derive CDI
2,818,309 UART: [art] Store in in slot 0x4
2,904,380 UART: [art] Derive Key Pair
2,904,740 UART: [art] Store priv key in slot 0x5
2,918,068 UART: [art] Derive Key Pair - Done
2,933,005 UART: [art] Signing Cert with AUTHO
2,933,485 UART: RITY.KEYID = 7
2,948,925 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,690 UART: [art] PUB.X = CE039A22D74E51048E1AD5A746C415A0DD5CD77CDD182FCF697DBD1DDE3FD9C094CF50D90672F33B05DF96724909E5B4
2,956,461 UART: [art] PUB.Y = B0B7E69FE41D5724584E0FC45A051F333DED216AECCE7687E10F092F8DF4DC588AC3ED74FD908CE31FA971476A4AD182
2,963,415 UART: [art] SIG.R = C60026442FAD1FEC991613197B4C37FEB245AF8014546C37B652C546E2A07080F04FFDA088157956ADE3B1479192F77C
2,970,161 UART: [art] SIG.S = 0DC5D35ECE73E9873A27F19B63E0F2DA033E93E74BD635B102210644D25E7D4D62DCC57A296E206D30ACC16D8623AC70
2,993,838 UART: Caliptra RT
2,994,183 UART: [state] CFI Enabled
3,101,510 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,620,647 >>> mbox cmd response: success
2,683,103 UART:
2,683,119 UART: Running Caliptra FMC ...
2,683,527 UART:
2,683,670 UART: [state] CFI Enabled
2,694,405 UART: [fht] FMC Alias Private Key: 7
2,803,006 UART: [art] Extend RT PCRs Done
2,803,434 UART: [art] Lock RT PCRs Done
2,805,014 UART: [art] Populate DV Done
2,813,351 UART: [fht] FMC Alias Private Key: 7
2,814,513 UART: [art] Derive CDI
2,814,793 UART: [art] Store in in slot 0x4
2,900,526 UART: [art] Derive Key Pair
2,900,886 UART: [art] Store priv key in slot 0x5
2,913,982 UART: [art] Derive Key Pair - Done
2,928,909 UART: [art] Signing Cert with AUTHO
2,929,389 UART: RITY.KEYID = 7
2,944,527 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,292 UART: [art] PUB.X = 63E0CCDE0F5A948209288E632663255C21FD6B615A3A84E6AA7A7CFFFBDAEA40BACAB14DFE0570D730AAA524A892D3C9
2,952,075 UART: [art] PUB.Y = 02BA5EF2A3E3AD7B3315921E95526FAE63775828D4AEB6D22789212524257B5F09A48EB34CEA062A70D9DE229BF16A1E
2,959,022 UART: [art] SIG.R = C98034318C7CD7FDFA4AE76AD9735EB5A0EA7C484A565F075C3E6A33641FFE9EBBE588A89515D19D1FEFB84EC896A974
2,965,807 UART: [art] SIG.S = A0FCC1D81498ED82E93B77486903A6D0816B11A04926476F289D197FFDA96CB2BE59C9E340226C1A6C54CC7B7611DF7E
2,989,625 UART: Caliptra RT
2,989,970 UART: [state] CFI Enabled
3,098,531 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,618,249 >>> mbox cmd response: success
2,680,525 UART:
2,680,541 UART: Running Caliptra FMC ...
2,680,949 UART:
2,681,092 UART: [state] CFI Enabled
2,691,685 UART: [fht] FMC Alias Private Key: 7
2,799,832 UART: [art] Extend RT PCRs Done
2,800,260 UART: [art] Lock RT PCRs Done
2,801,612 UART: [art] Populate DV Done
2,809,741 UART: [fht] FMC Alias Private Key: 7
2,810,731 UART: [art] Derive CDI
2,811,011 UART: [art] Store in in slot 0x4
2,896,670 UART: [art] Derive Key Pair
2,897,030 UART: [art] Store priv key in slot 0x5
2,910,628 UART: [art] Derive Key Pair - Done
2,925,545 UART: [art] Signing Cert with AUTHO
2,926,025 UART: RITY.KEYID = 7
2,941,133 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,898 UART: [art] PUB.X = D526094CB4044F2A1C67F7541F53591DA5775610444A27E1C33FD1EA60AC0DE6733CC7EEAF581D4A2CC16E1F2AC258A6
2,948,669 UART: [art] PUB.Y = 2AD641B44756CADCA62517459F392FED1A3E3F40F3C4B379385A0800F6F205073C1FB432606ECB4029A370073FC5E3EA
2,955,589 UART: [art] SIG.R = 57F4970F9116930B31556BF66446C4B2F421FAB7BC8B066D4E2DED0E6ACC5C0B1E70A5E5AE797C1B5F2A869F1D00182E
2,962,334 UART: [art] SIG.S = 421C92A3E51EA71D3428DBF9030AB71A535E3574E4E1FEB37BAD48409ED6026ECE970766420B881FED3666A97BB6F754
2,986,072 UART: Caliptra RT
2,986,417 UART: [state] CFI Enabled
3,094,296 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,616,837 >>> mbox cmd response: success
2,680,117 UART:
2,680,133 UART: Running Caliptra FMC ...
2,680,541 UART:
2,680,684 UART: [state] CFI Enabled
2,691,303 UART: [fht] FMC Alias Private Key: 7
2,799,062 UART: [art] Extend RT PCRs Done
2,799,490 UART: [art] Lock RT PCRs Done
2,801,306 UART: [art] Populate DV Done
2,809,523 UART: [fht] FMC Alias Private Key: 7
2,810,479 UART: [art] Derive CDI
2,810,759 UART: [art] Store in in slot 0x4
2,896,790 UART: [art] Derive Key Pair
2,897,150 UART: [art] Store priv key in slot 0x5
2,910,372 UART: [art] Derive Key Pair - Done
2,924,945 UART: [art] Signing Cert with AUTHO
2,925,425 UART: RITY.KEYID = 7
2,941,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,928 UART: [art] PUB.X = E771A26F1E7DC390ECA11BD974246896B99F65D7DBB766F469E5D41C996F02868A67AC2A980EFBC3529EB8B04686318E
2,948,698 UART: [art] PUB.Y = D4705EC68ED29518243C5B32AADAE6A9851DBC13FA98B88A4AD31AE92B632442264979228FE411780F21402151A9CA83
2,955,645 UART: [art] SIG.R = 07993B486ECF2C54CA26AAACD109A7D9937DA58650259308670B2DF96135D908528BEB10CDCCA7DB757E031882D0A81E
2,962,403 UART: [art] SIG.S = DDA0A2A647E5B3051770A04AED588B33B54B9E55997DA6FDD36A3D756E9FDBB6551DCEFDDEC35463F0DAF9EEF071839A
2,985,903 UART: Caliptra RT
2,986,248 UART: [state] CFI Enabled
3,094,875 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.72s
Truncated 8000 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
27,052,006 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 11:15:38 2025 GMT
Not After : Jun 7 11:15:38 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:97:84:69:fb:f9:07:fa:10:d5:be:89:bc:3a:0e:
0a:46:0e:69:64:e0:8d:7a:c6:2b:c7:2f:b3:67:39:
a4:84:99:4f:3f:b4:7c:c7:b1:f8:2d:1d:e7:ba:29:
3e:2d:98:99:e4:d4:f7:c0:9e:de:e5:15:bd:94:6b:
a1:36:d3:2f:00:91:cb:82:c7:00:e6:fe:92:9a:b1:
13:49:f7:76:4a:52:50:07:c1:6c:90:6c:7c:a1:1d:
a0:f9:ee:2e:06:21:eb:f4:91:f1:e7:4a:3d:4e:b9:
e4:dd:77:29:d7:c2:4c:d9:44:84:ca:fb:25:d7:d3:
ea:6e:9e:48:18:39:a5:ab:d4:ab:7f:de:c1:ef:84:
12:1e:f5:c2:fc:d3:db:a6:ae:0b:5d:8a:22:54:f8:
5d:59:f2:62:e4:94:6e:66:0a:c4:2a:10:08:b4:43:
fe:7e:d7:1e:76:28:a9:d3:63:3d:fc:c3:ab:82:89:
fc:2a:1a:c3:12:08:b6:50:89:34:0d:f5:2c:86:c4:
2c:3b:58:08:72:81:41:a4:05:cd:69:7d:c2:6a:0a:
2c:58:e6:ae:46:da:a3:8e:6f:6b:72:21:52:c0:ab:
82:bb:d0:35:9e:c2:62:55:79:d2:9b:fc:fd:2f:43:
af:43:0f:e3:57:fe:d3:2b:e8:37:e7:c8:06:af:77:
0b:f1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
00:a3:41:11:81:52:20:34:12:9b:f8:96:72:16:08:90:3c:4c:
cd:cf:ad:c4:ae:3d:df:30:7b:79:da:7f:e0:43:fd:ed:b8:41:
0a:c4:0b:94:3e:ac:76:df:37:98:54:73:8d:84:ce:d6:55:62:
be:fd:57:99:55:1e:54:f5:d8:b7:38:35:7a:2b:79:9a:aa:d3:
09:35:b7:3f:7a:9c:c6:ae:3a:bd:fb:51:6d:c3:48:09:6f:df:
be:c2:76:f6:13:14:6c:b7:19:f6:4e:26:e5:7f:13:b2:eb:94:
d8:f0:b7:3a:80:be:7b:f0:2b:bc:2a:f6:e0:29:ac:04:b6:aa:
46:eb:43:d5:f9:6b:7a:62:23:65:0f:fe:e4:b1:ee:4b:30:e5:
ce:6c:65:00:cf:85:b3:fb:5a:ef:51:ba:c0:b5:e2:68:23:e2:
1c:2f:65:9e:40:58:cb:be:11:02:b4:f7:52:8e:d6:40:25:ad:
b6:a0:c7:fd:8c:ee:13:ed:c3:fe:82:78:cd:b3:ed:59:1f:82:
c1:7f:96:8b:85:bc:3b:8e:97:88:39:b6:25:a6:8c:00:20:fe:
6e:79:60:5b:8c:77:d3:29:e7:10:6a:5d:00:fe:23:c4:f2:6b:
fe:f4:be:46:74:6e:84:d0:47:da:63:fe:42:3c:ac:f0:47:28:
45:5d:be:b7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 11:15:39 2025 GMT
Not After : May 9 11:15:39 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
16:37:47:92:e4:ea:78:0f:bb:81:3a:81:13:56:60:59:12:f1:
f2:6b:de:45:e3:78:e3:38:e7:1f:92:46:9e:3c:eb:96:1c:29:
67:f2:02:c1:9c:6d:7e:82:bc:af:cf:1c:a3:35:9d:b7:1e:0c:
2e:ae:66:71:79:fb:1a:f2:6c:0a:6a:1d:20:53:7c:4b:62:19:
e6:8b:94:71:d6:28:c4:82:7e:5a:64:5e:79:97:8f:de:01:1c:
34:2e:a5:e6:cf:99:a5:c1:52:db:93:ae:a8:14:52:79:90:d4:
ab:dd:95:5b:46:da:4c:6b:89:8e:71:ab:51:a2:9e:03:48:e6:
77:ed:c3:1c:54:be:f0:47:41:76:49:e9:b4:b0:22:91:48:53:
8e:77:52:d1:77:f8:50:6c:56:f6:16:72:80:12:f2:79:66:ed:
c9:5d:4d:ab:09:9f:40:09:30:5f:26:2b:73:00:92:31:6f:e4:
75:5f:3f:a5:41:a6:43:52:86:e6:19:e4:89:cf:4d:f1:fe:a1:
60:dd:a9:12:99:a5:9a:da:04:0f:0c:7e:90:45:85:02:39:87:
51:44:25:f9:8f:99:44:34:cd:7d:42:81:e9:8f:a7:59:db:45:
d7:c2:54:4f:04:67:1d:f4:c1:ca:ef:87:81:73:f8:35:6c:b4:
1d:a3:1f:e6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.14s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
26,522,008 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 11:15:03 2025 GMT
Not After : Jun 7 11:15:03 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:dd:0c:26:b2:01:5e:45:c3:af:96:e1:41:5e:11:
93:0b:e2:70:a5:dc:56:d1:31:a8:b5:94:d7:5d:d3:
d5:c9:ef:07:90:fb:5b:ae:f8:b0:82:71:09:f8:0f:
b9:bc:ca:57:34:43:27:27:d2:b8:2a:66:dc:1c:c5:
72:8a:34:fa:db:0f:3a:ac:92:d8:eb:ae:9f:c3:47:
2a:1a:1b:3c:fc:0e:b4:72:80:a0:5e:32:fd:39:bd:
28:f0:c0:94:e0:ee:25:7b:16:7f:2d:f2:42:ca:0a:
ad:42:b1:4c:03:f1:3c:08:c8:db:46:51:b6:d6:cf:
5e:29:3e:8a:8e:5d:e0:10:aa:01:ee:02:91:29:cc:
32:1c:75:bd:02:8d:f5:f4:96:b3:32:93:cc:1b:b4:
38:39:e0:f8:ca:34:be:6d:2f:d6:70:50:bf:4a:7f:
70:7c:b1:af:51:b5:ea:4c:e9:c8:ec:56:a7:ec:74:
05:4d:45:82:b1:68:32:a3:79:1a:e4:68:8e:a0:b6:
85:bc:62:80:d2:f7:fc:0c:08:0c:79:16:52:9b:16:
8b:13:f6:75:48:4f:2f:4d:b7:05:37:47:2b:d2:f2:
77:77:ed:a8:8d:e3:ec:eb:0b:52:be:02:4a:44:16:
0b:c7:ec:13:c6:03:45:19:61:23:ef:08:4c:de:cc:
24:a5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
35:82:67:73:f3:76:cc:8a:1e:c7:d2:1c:32:84:d4:35:2f:02:
33:5f:7c:60:3b:8c:df:ca:79:8c:c7:57:e4:4f:68:f6:ad:7d:
b0:96:ff:1b:ae:4c:f8:c8:0b:6b:f4:20:b0:eb:7f:b3:8c:19:
80:10:af:63:d4:f6:fd:ac:b2:df:f4:8d:2a:d3:a6:ce:e4:3c:
b3:07:81:e1:41:2e:73:33:e8:09:ea:19:f2:27:3c:ff:6b:a6:
50:47:9a:59:47:b2:6b:37:f9:89:3c:47:2b:a7:97:f6:84:00:
57:9e:5a:80:aa:25:f9:b9:0d:fb:a2:0c:75:ad:f3:30:40:22:
29:bb:c6:2a:04:5b:75:d9:6b:0e:5b:6f:ef:08:fb:b7:ea:62:
d0:10:ba:67:e1:58:c5:06:ff:0d:d7:ae:e3:d3:78:68:e0:8f:
57:2c:64:13:14:4d:d3:b2:23:b5:d9:cb:c2:53:be:b9:93:8a:
a0:5f:29:c7:67:26:48:78:a2:d6:de:0e:7b:e1:0f:7a:71:f9:
fa:b3:e3:33:fe:0a:70:fd:f9:05:91:19:c3:e9:17:4d:ab:98:
7f:bb:d0:1e:5f:6d:a6:ca:c1:55:a0:65:45:0a:8b:6e:e8:3b:
f2:28:4e:db:0d:cd:43:50:70:d3:d4:c0:59:ad:dc:2b:d5:5c:
46:10:79:97
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 11:15:03 2025 GMT
Not After : May 9 11:15:03 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0a:75:3b:8b:fe:c2:a8:50:dd:4f:53:29:06:ac:c6:a8:37:6d:
59:21:fc:7a:b5:28:4f:50:a7:37:fa:38:0a:8a:a3:6d:52:4f:
95:c3:e2:16:a3:1b:9b:01:a0:7e:ea:02:fc:17:06:e8:4a:ca:
e6:93:8c:63:ff:bf:26:a7:40:05:0d:27:79:ca:f1:88:a9:46:
39:b8:24:e2:1e:fe:fe:08:4b:ba:7d:78:8f:3c:90:42:fe:70:
f4:a3:06:17:6c:02:b0:e0:cc:84:2e:4b:17:58:b1:92:b3:21:
ec:b4:2b:84:5f:74:c6:10:f1:8c:5e:08:a2:56:e6:73:7a:a7:
ba:f1:05:58:50:78:38:94:f1:b5:f5:3a:b2:14:c1:5d:28:97:
2b:61:16:e5:9f:61:fb:35:11:f1:89:4f:77:b4:db:5a:9e:e2:
a7:73:60:cd:20:b2:76:49:5a:8d:ff:03:f8:85:27:ac:3e:44:
b7:96:79:0a:63:92:2c:7f:63:4c:7e:8e:37:63:0c:8c:a5:b5:
ff:f0:38:36:1e:7c:97:57:02:ca:39:fb:19:55:a0:af:91:49:
63:84:c4:da:dd:6c:16:fe:d6:d3:28:dd:8d:2e:c2:45:f9:d3:
dc:57:92:1e:c8:d0:20:76:c6:2c:77:f9:a2:25:3e:de:aa:62:
c7:ee:be:0c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
27,097,977 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:10:16 2025 GMT
Not After : Jun 7 13:10:16 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b7:30:f5:f0:75:08:c1:67:d5:dd:e1:c6:ad:66:
16:53:bf:2b:6e:c8:62:77:a7:19:20:4e:61:92:95:
a6:c4:1a:73:2f:03:c0:e5:37:c0:42:f7:a1:c7:c3:
77:cc:1d:1c:c0:64:f5:e4:7c:4d:14:ea:f2:57:66:
80:e6:44:9a:ce:6f:f5:a3:4a:77:d0:d7:5d:60:83:
af:b7:46:e6:a2:4f:09:7a:7d:ce:ac:3e:3f:39:db:
a7:e8:7b:76:36:f7:1c:b8:e5:20:64:d5:e9:46:4b:
3f:5a:2c:6b:20:1a:b6:b2:e3:a2:21:58:1d:9d:9a:
59:17:c1:f5:5b:c0:62:c3:9f:df:71:04:ca:4d:9e:
89:97:8b:47:45:d7:1b:5e:6e:bc:f5:7c:70:7c:25:
bf:a9:48:6d:34:e6:f0:4c:19:53:85:23:01:1d:32:
94:de:d3:3d:53:1d:c7:36:a2:dc:a0:a5:0f:2c:b4:
45:9b:11:41:74:ab:03:63:dc:e0:d2:e0:be:3d:07:
ec:08:13:80:a4:96:c9:52:39:72:81:11:1c:ca:9d:
e2:6c:73:e4:f6:d9:78:93:e6:2b:9f:b7:88:96:d4:
81:3a:82:f8:19:70:12:06:1f:49:53:31:2c:d1:ff:
17:da:b0:cf:f0:e2:88:8e:0a:7e:af:48:e7:34:37:
0d:67
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
04:36:67:ea:b0:4b:2f:05:b6:25:c0:61:60:9e:a5:ea:e8:b7:
8e:c7:16:7d:d0:d3:c9:2e:7e:37:df:31:df:ce:9b:26:bb:6a:
c0:50:00:e5:90:4e:81:40:b9:42:cf:4b:a9:6f:8e:7d:86:21:
d0:05:f7:4b:14:50:3f:8f:f5:a8:7f:7b:01:14:43:a4:34:42:
32:04:c0:33:50:57:bc:c4:27:11:df:3a:3b:31:fc:8b:91:f4:
64:bc:7a:b1:17:62:53:2e:0d:a6:82:33:d8:18:bc:31:7c:05:
b9:24:1a:de:48:8b:95:2e:b7:7d:c6:12:ba:99:65:75:12:58:
1e:12:2d:a9:b9:a5:0f:78:bc:b0:a1:2a:b8:c2:78:c5:f4:e1:
45:0b:fe:fc:b9:f5:df:49:9a:05:a7:9e:b1:9a:76:71:0c:9d:
a9:c5:49:a0:01:89:1b:3b:d4:c8:b8:9e:3d:a7:4e:18:a1:69:
44:98:05:74:d5:c1:f2:34:40:eb:b5:7f:eb:da:0d:92:90:97:
fb:6e:dc:b4:8a:17:a7:7b:ac:21:c2:8b:fd:44:31:84:17:04:
f7:d0:68:69:d5:07:8d:28:2c:83:ff:40:a5:91:e4:d0:2d:93:
23:15:77:be:c5:24:1a:c6:8a:fd:8c:07:c7:ba:44:1b:2f:b6:
c7:7a:96:02
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:10:17 2025 GMT
Not After : May 9 13:10:17 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b4:a3:f5:85:33:88:0b:71:16:0d:a3:6b:06:05:3e:46:90:1b:
90:7a:ef:08:2f:e4:e6:88:3b:64:0b:2d:51:bd:30:75:d9:f3:
f2:2d:ff:eb:d4:cd:e6:19:93:da:e2:50:92:29:c2:2d:d4:0f:
63:07:a6:5b:4f:b0:fd:2a:2a:5f:b6:e2:02:aa:06:71:0e:af:
d9:d5:95:db:53:8d:d6:4c:24:92:64:93:99:a3:f0:50:94:de:
e3:1b:89:20:e9:35:70:4a:46:24:f2:4f:5e:9b:83:09:66:97:
55:ab:25:e7:cc:f8:a2:7d:4f:c2:22:b8:77:ab:d2:1a:19:e7:
95:08:94:2b:a0:a5:75:4d:7c:56:44:42:a7:71:6a:29:cf:08:
1e:04:d3:f0:db:9e:ad:1f:a5:7e:ed:b2:51:f8:32:c9:d2:a4:
a2:df:42:24:d1:56:46:1b:78:8d:5d:17:2d:59:43:b8:42:b5:
b7:45:b7:0a:06:10:4f:bd:fd:e1:9c:18:41:7a:85:67:27:d4:
5f:2a:0f:ac:cd:69:20:28:34:60:dd:73:5f:ab:43:f6:bf:81:
f6:85:70:a2:50:39:96:f6:34:96:b8:38:6c:04:38:33:71:86:
53:72:97:fb:91:13:68:e5:36:d2:d7:2d:8a:d5:b7:ac:58:21:
09:ea:55:84
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.15s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
26,644,266 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:12:31 2025 GMT
Not After : Jun 7 12:12:31 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e5:dd:10:42:d1:b7:44:44:db:3d:cc:60:cd:85:
3e:df:54:b3:f6:81:be:3d:96:a4:84:15:01:63:37:
36:ac:dc:a6:72:b9:ba:71:56:48:a9:20:06:2c:f7:
d7:ed:b5:4c:b9:41:62:62:4a:fa:94:66:ac:c0:b7:
b3:61:dd:73:74:df:3c:99:ff:bf:5f:dd:6a:6b:20:
4a:79:5f:88:27:41:f3:e4:6f:df:6e:ea:86:b4:cd:
ec:c2:a7:29:e8:eb:79:bb:15:e9:36:18:55:f5:71:
7d:91:72:21:5d:ac:84:17:90:76:8c:59:91:8a:14:
5c:8f:8a:a8:ee:51:77:7d:26:f7:44:26:11:99:2c:
dc:2d:ae:00:ac:af:dd:28:4e:5d:3a:d2:3b:ef:5e:
63:de:7e:1f:df:3b:ee:ec:f0:cc:bb:ef:9e:64:27:
a4:e0:84:c6:57:80:8d:a9:e0:44:d1:2f:cd:64:8b:
fb:ef:17:57:4e:4a:be:d9:a0:3c:9a:99:e4:8b:a3:
b4:4c:5c:64:06:fd:56:cc:a4:de:5d:70:a7:56:9b:
67:d2:6c:b0:a9:a5:67:58:cc:23:0e:92:7e:d6:78:
a1:b6:c1:73:bb:68:40:8b:08:c4:2a:b1:d6:dc:0c:
c4:5b:5d:51:87:4d:92:aa:78:70:46:42:d9:fa:62:
47:95
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c0:74:f0:a0:0c:b5:5b:f0:38:6a:52:b8:e2:0c:48:e3:a6:2f:
23:de:21:14:40:3d:ac:ae:b5:7a:66:76:9e:c5:8f:25:c6:70:
4a:fc:7c:54:f3:af:fa:16:c1:3c:d2:48:c5:a1:70:f2:db:26:
6f:f0:52:a5:5a:86:d0:86:97:7c:65:cb:b1:17:65:81:7a:79:
95:34:9c:e1:00:9d:25:ad:3f:f9:7e:f0:6d:bc:ae:dc:76:5e:
e6:64:8a:4b:bd:62:4c:d8:a5:1c:22:b0:f4:8e:d4:54:6b:44:
f6:45:1b:2d:40:1f:d5:bb:01:77:dd:d2:8b:03:56:d5:6d:50:
da:3a:d3:46:ce:bc:95:4a:c5:f4:d3:37:38:81:55:11:ef:c9:
05:e1:e6:13:c3:10:46:9b:5a:d7:1d:70:6b:36:d0:a6:c5:d4:
5d:b1:5f:8a:96:6e:13:03:a0:83:25:ea:d3:ca:9a:42:cb:8e:
22:04:55:70:2e:e5:18:b5:0b:8c:28:b1:5a:1c:d3:a0:c3:41:
38:58:4f:a4:4c:53:cd:ac:44:ae:9b:ed:5b:94:ce:ef:8d:12:
a9:24:f7:25:6b:31:83:0b:f5:8d:48:39:68:ea:93:21:31:75:
26:27:bc:e1:2d:20:e6:89:c0:0a:d8:ee:b5:70:01:b0:71:bb:
58:4b:55:02
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:12:31 2025 GMT
Not After : May 9 12:12:31 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b0:e6:b2:27:a1:29:1a:46:b5:2f:94:e8:b6:df:59:a2:0b:a3:
0b:fc:e7:0f:bd:27:70:64:41:a2:f5:fe:52:1c:a0:a5:c2:cf:
41:f1:b7:3f:a2:2e:02:4e:fa:8e:b2:42:77:45:05:90:c0:34:
7e:1c:27:c2:cb:8b:04:22:8c:48:a5:9e:2c:bc:70:c0:28:e4:
2e:42:65:b8:0f:bd:bc:87:e6:94:05:51:96:00:e0:6f:38:c8:
a8:5f:c3:9c:a7:44:18:98:ce:7e:0e:d6:f2:2b:27:57:35:43:
b3:f1:f8:2d:3b:99:60:a5:79:83:37:47:db:e1:61:b7:c3:d2:
78:ed:87:5b:c6:29:67:b6:4f:5e:53:fe:76:ca:9a:53:8d:9d:
03:e9:2f:be:0b:cb:12:43:19:24:26:20:e5:92:9d:60:23:f7:
da:41:b0:27:9c:3b:35:b5:64:35:4b:fe:27:1e:f2:66:74:a4:
7d:a4:e0:ab:7c:d7:da:b1:52:a6:96:ca:f4:33:3d:2d:2c:f0:
7c:5a:44:91:01:38:03:85:38:67:51:7f:a7:e3:30:3a:00:3b:
d8:7e:a9:48:df:6c:88:d1:18:90:08:6d:f8:a5:88:84:d7:da:
f8:14:18:f9:2d:fc:a9:09:5a:00:d6:43:87:a2:e5:8e:9d:44:
20:82:1e:b7
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,730,885 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:50:56 2025 GMT
Not After : Jun 7 12:50:56 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:93:72:d1:08:81:19:c4:50:b3:47:53:d8:36:8e:
f3:3f:e7:4e:b3:df:6d:b5:2f:bc:ca:94:46:49:e3:
79:70:1d:6e:4d:89:31:f4:e4:f1:8c:70:39:d3:01:
46:2a:5c:59:13:2c:f2:9e:52:6a:71:37:d0:f3:4d:
c2:a4:a7:de:e0:8f:8d:8c:18:de:5e:e9:95:df:b7:
2b:5f:b5:67:93:a4:11:49:bc:c2:c3:e2:9b:29:b3:
cc:ea:8a:86:07:d6:d2:76:86:18:7a:f4:f8:0f:dd:
59:10:6a:d2:8c:9d:2d:c5:75:b9:24:ec:fa:c0:37:
c3:37:ea:25:4c:ce:ee:1b:7b:da:00:06:7e:40:47:
66:ed:6f:44:f5:7e:2b:1f:bd:39:3a:cd:6a:4d:0d:
21:fc:7e:a9:80:52:a3:86:36:7e:59:1e:e9:d3:23:
b8:ff:0d:53:49:02:57:2a:5d:5e:81:f5:1a:19:18:
7c:75:a6:05:9d:8f:5d:cb:9d:cf:20:7a:fe:1b:d1:
35:32:b8:bd:43:c0:a3:11:a8:28:e5:0d:27:b5:17:
2d:13:88:10:cc:63:da:54:e3:fc:78:0a:d2:a2:de:
76:ff:86:00:b2:65:a5:5b:06:e0:d9:ef:e9:78:88:
7f:20:a7:60:e1:1c:49:26:e8:51:b4:d9:a7:cd:eb:
a7:ab
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
69:27:c5:db:42:2b:7d:f2:f8:6c:29:d5:ce:4c:53:91:1f:e2:
80:69:2a:ed:8a:36:a9:60:cd:94:0f:ba:68:0b:17:c5:0a:e6:
93:8c:48:63:64:10:8f:87:67:99:98:6a:7e:95:40:6d:51:59:
81:5a:4a:15:4d:ee:1a:bd:2a:70:12:45:08:0e:41:c9:0b:0a:
70:03:cf:87:aa:45:83:6b:90:ce:bf:fe:53:65:69:84:fd:33:
95:23:92:94:39:a8:a3:21:8c:16:a9:65:54:fc:25:03:c9:1a:
14:9a:be:0d:e5:ee:c1:fe:70:e6:fd:75:96:14:13:65:03:0f:
3b:23:f7:aa:8f:f9:38:2a:ba:6b:27:62:97:14:b7:e4:35:ac:
ec:ca:c4:22:b9:8f:5d:b8:89:3b:e1:77:52:55:1f:9a:1f:3e:
bd:86:9b:1e:de:a0:ab:c5:e6:93:8a:f7:f7:75:91:31:1d:33:
84:8e:32:2b:b3:fb:03:f4:ab:c6:d6:ed:8b:f9:17:ba:2f:8e:
0b:d5:bb:8b:84:a9:98:26:08:be:af:04:a1:5e:2e:8d:b4:c3:
c2:b6:f1:45:39:cf:de:37:76:2d:5a:2b:6a:f0:1c:3e:6f:58:
1f:9d:c3:2b:be:de:05:f0:1c:1b:a3:8c:18:51:cb:9f:da:e8:
96:1b:d5:72
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:50:58 2025 GMT
Not After : May 9 12:50:58 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8e:4f:b2:ea:2d:05:05:b2:c4:db:49:32:07:f3:0d:9d:39:ba:
f9:b1:fd:dc:61:17:54:19:13:4c:f7:a8:09:7e:a7:25:15:05:
cd:2b:1c:66:7c:74:fa:80:3f:d9:9a:ab:28:39:10:9e:3e:46:
16:00:7d:91:8e:ba:f6:30:de:e0:15:2f:83:9c:1b:10:1a:cd:
a2:35:f9:ca:a7:ed:dc:bb:85:79:cf:26:b2:de:bd:f1:04:54:
af:a4:fb:06:6c:39:ea:ec:a8:81:6e:30:f8:69:22:4d:c8:49:
3e:3e:ed:d5:6e:ed:0b:d2:b7:66:6d:0d:df:5d:2a:ec:36:26:
49:2b:b0:bf:92:f7:da:9d:a8:5c:9b:7b:aa:39:7c:0e:f2:e0:
32:bf:59:bd:13:9e:2e:96:19:01:4a:4e:1a:21:e8:d5:76:9b:
aa:2f:ff:b1:cb:2d:39:59:b1:46:d1:a8:d6:60:3c:1c:90:82:
9c:9c:f1:f8:27:ae:52:00:1f:54:6c:14:8b:c0:25:f5:d1:fa:
fb:59:04:15:fb:7a:80:83:e1:24:19:25:30:f3:d6:67:7a:30:
0e:37:74:55:1c:08:f9:8c:9a:62:56:88:1f:18:b8:77:88:2c:
b5:c1:c3:14:ad:f2:a3:ce:e2:20:f0:99:a9:f3:75:03:f8:ed:
86:89:72:90
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.98s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,240,764 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 14:22:35 2025 GMT
Not After : Jun 7 14:22:35 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:92:43:5c:3a:91:5e:bd:ea:ac:ab:fb:9b:37:11:
cd:c6:c2:23:2f:87:f7:f3:ee:79:6a:ff:7c:18:cb:
b2:49:d0:f3:4b:27:ff:1d:32:50:1c:c5:10:aa:fb:
d3:58:c2:c8:be:f0:4a:f3:17:bd:be:f3:26:ba:62:
28:ad:e0:45:fd:0e:c1:3d:97:01:1c:40:c9:35:aa:
7c:aa:c6:7c:9e:8f:3c:64:59:38:4c:7b:92:92:d7:
01:30:f6:42:eb:a1:fc:dd:7a:d3:26:ad:cf:47:9f:
1a:af:06:67:25:21:22:6f:ce:df:7b:be:db:d6:4c:
7f:ea:6c:9e:eb:af:75:84:61:db:eb:6e:00:ec:ef:
56:99:46:8f:38:2e:8d:de:e1:15:cd:86:0e:80:14:
8c:a1:ec:53:72:69:80:f8:91:f2:6e:ba:ab:1b:83:
b4:70:3e:f7:15:94:52:6f:f3:2c:00:6b:93:9c:cc:
ad:37:9a:54:98:82:63:b4:e2:54:41:ca:93:eb:20:
a5:71:04:37:ab:50:21:39:51:ac:80:c8:a9:b6:30:
1f:f7:04:a7:06:21:ee:d3:4f:f8:de:7e:4a:ac:e3:
5c:dd:8e:b9:e7:fb:d9:8e:f8:b4:d1:04:c7:68:32:
50:5a:1c:2d:2e:f7:88:78:6b:29:66:79:13:f1:c3:
81:59
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
92:08:f1:0e:11:80:a6:03:d8:6d:58:03:4b:83:54:cd:9e:71:
31:3c:7d:87:c2:24:8a:b6:aa:20:74:d4:a3:9f:b0:d2:33:3e:
f5:b6:ad:a9:7a:fd:5b:66:95:f5:df:6a:ae:a4:c5:c1:ef:a6:
20:cc:e2:02:e9:88:7e:91:99:37:2f:ec:93:69:f0:54:2c:9b:
e7:e4:b8:8b:41:3b:2e:2d:21:47:4c:87:5e:b2:98:5e:45:c9:
1c:af:64:2e:a8:62:74:84:b1:16:9d:e8:77:2e:78:70:89:62:
15:9b:36:50:b0:73:07:ac:f3:8e:ef:b2:7c:ca:1c:7e:e0:fd:
cb:48:42:0d:5b:64:d5:65:af:a8:f3:95:e6:54:6b:76:53:b5:
48:15:cb:cf:7c:6e:ad:a4:8f:db:a4:d8:7e:94:12:66:9b:aa:
60:c4:55:16:6a:72:52:df:1d:a2:2f:02:e3:8a:39:02:44:91:
01:a4:49:cb:d6:39:76:29:ed:89:31:30:4b:2c:70:93:88:46:
19:bd:f9:96:fb:57:06:19:28:ab:ac:6f:5e:7d:9c:d5:32:e0:
ed:76:85:f7:84:e5:31:39:85:cc:6e:9c:8e:79:fe:2a:8c:4b:
0b:3c:fb:f7:26:47:b1:b9:74:f5:5a:11:41:6e:45:24:bc:5b:
df:27:5a:18
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 14:22:36 2025 GMT
Not After : May 9 14:22:36 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
22:45:ef:4f:0b:5a:b8:6a:f8:72:cb:66:4f:6e:2d:5e:ee:15:
bf:6d:30:6f:0f:0b:32:0c:d4:18:84:c7:e3:ef:c9:62:3f:95:
63:76:10:38:38:89:b9:d3:cf:f9:15:1c:6c:31:e8:c8:67:87:
b8:7a:56:87:f1:fd:db:3f:96:6b:1f:0b:a7:5e:49:45:16:e2:
76:b7:7a:4b:4b:de:18:51:0c:80:5d:5a:5e:49:2f:0b:18:a5:
b2:d3:8b:d5:17:ad:e0:91:82:17:3e:d3:49:42:2a:66:84:86:
95:06:e2:d2:b8:ae:6f:6c:e8:76:27:7d:94:b0:ca:ce:ca:e7:
93:23:1a:e6:df:58:08:46:af:1b:0c:0c:11:8e:6a:cc:92:ea:
44:87:f8:d4:b7:36:81:9c:e0:a9:ab:65:b8:e3:d1:59:c9:ef:
50:28:9f:75:6e:4a:cd:da:0e:04:cf:74:d4:02:f7:4b:b8:c0:
10:36:dc:24:0f:af:da:11:59:4a:bb:30:20:37:d9:0b:d4:eb:
22:5a:f6:f4:d9:01:5d:20:b1:ca:c1:1c:1e:43:7b:b2:b5:42:
43:ae:65:34:68:36:1c:09:f9:49:1f:a2:6f:d4:fa:19:d2:30:
40:81:f3:3c:a9:28:6c:ee:f1:58:00:24:4f:a1:f2:bd:e7:9c:
6d:a8:e9:0e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.25s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,918,385 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 14:46:14 2025 GMT
Not After : Jun 7 14:46:14 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b7:42:30:46:33:f6:fa:bf:c6:1c:f6:f2:da:bf:
80:9a:91:0e:de:5f:4a:73:ab:bc:8b:b3:f8:50:4a:
52:04:47:58:91:15:96:91:9a:6f:2b:a2:fb:06:41:
99:ba:aa:42:b9:4d:5c:07:dc:20:3c:65:7b:5a:6e:
80:22:3b:dd:10:ca:87:b2:8d:8d:62:6f:51:5d:a7:
fa:f2:27:a6:4c:f7:e8:d3:19:22:1e:86:a4:33:42:
71:39:42:4b:f4:b3:ee:12:c6:e8:ea:45:c4:99:93:
fd:90:69:9d:ad:e0:af:88:b7:c6:de:ef:eb:57:59:
40:8a:00:cd:84:0c:59:87:b3:81:3b:1e:f9:87:02:
15:85:83:ec:77:af:b9:c4:07:8f:e7:59:6b:e5:9e:
09:ed:d1:a5:70:ab:3a:57:dc:88:ee:df:81:0d:9a:
44:bd:92:a9:9d:67:ca:f5:ef:3a:68:00:63:65:4b:
89:4e:42:5c:fe:13:84:23:77:6a:11:99:a0:76:91:
db:d9:b6:23:33:95:c5:a8:3a:f3:5c:81:d8:4f:c4:
70:f4:be:df:29:35:d4:16:e4:07:74:1a:b3:da:a9:
34:25:f5:d1:38:48:a7:a1:66:55:1c:ad:df:33:14:
9a:46:39:13:70:b1:9e:b8:56:b2:d7:ed:dd:5d:43:
5d:f5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4b:9d:3a:e5:2c:a3:a4:33:66:17:a5:e1:4c:b1:ca:18:91:b1:
a9:b7:62:53:af:70:a8:f6:f8:a2:82:9e:3a:c9:62:82:f5:10:
2b:90:f1:8a:c7:a3:3f:47:e6:88:2b:0c:ce:96:87:e5:bb:bb:
46:e5:7d:10:cc:05:da:28:c1:76:bf:07:f0:da:03:ab:a5:7b:
a7:38:86:cf:f1:10:39:8b:63:a0:1d:46:36:1f:03:f4:e4:1e:
35:86:18:d0:67:0f:26:59:01:3e:59:27:48:ee:82:d3:77:8f:
c7:c8:0a:3f:4b:2e:1e:24:bd:3c:03:a8:42:16:4a:f1:bc:78:
e2:19:a4:58:78:4f:83:b4:c8:fd:af:1f:ed:61:3e:36:32:15:
2e:d8:17:be:37:b7:5c:9a:c2:57:f0:cc:ee:ce:14:bc:b5:96:
b8:d4:0d:f6:dc:b3:21:7b:69:e4:5b:27:b4:eb:c6:94:17:5f:
f7:ff:24:9f:15:86:af:ab:70:8e:64:a1:58:65:c6:59:21:7f:
45:1a:06:48:ef:ac:6c:0e:f6:ec:c1:3d:39:35:16:b7:7f:42:
70:fa:4d:5a:43:48:dc:4f:1a:c5:fc:84:d6:2f:6f:0b:4d:ab:
29:08:06:dd:de:66:57:43:f9:3f:d7:23:a9:c1:d9:72:20:2b:
c7:29:1e:e9
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 14:46:15 2025 GMT
Not After : May 9 14:46:15 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
47:a6:05:d8:fc:d4:56:d1:fb:a3:bc:ca:20:94:35:b2:dd:0c:
6d:1a:e7:e0:80:a5:57:4e:eb:7e:40:d8:44:9c:fa:f4:86:e1:
c3:06:d9:40:41:2c:4d:4d:17:0a:96:98:dc:ca:5f:d7:cd:79:
5c:ec:63:cb:b1:32:30:c9:16:0d:ea:bb:95:e9:f8:a7:24:4e:
92:84:11:c1:8f:b8:45:40:dd:40:86:ec:9c:99:bc:0b:45:f2:
ac:7b:bd:a7:56:62:fd:0f:0e:bc:37:85:69:33:74:59:f1:f4:
d5:e8:e4:e1:84:4b:03:ec:f6:96:51:ca:7c:c9:90:86:23:c6:
8a:c2:98:1a:0a:f9:52:b0:d3:00:0d:8b:05:1d:0c:8a:39:ff:
1c:05:79:05:99:3b:99:7c:26:48:89:5f:88:92:71:e6:e6:e6:
86:4a:51:70:c6:8d:82:27:ce:08:98:8b:23:ae:db:57:93:0f:
16:e7:d4:a0:fc:7a:d6:e5:bd:90:df:ee:3a:66:c3:62:23:71:
0f:0d:b0:58:9c:d0:96:74:5b:2d:0c:d4:04:21:84:f1:2a:9c:
82:74:d2:c1:30:6c:85:20:67:0c:61:2e:a1:36:26:8c:7a:b3:
e8:65:a0:b7:67:37:83:c9:86:16:7c:99:46:49:9e:aa:31:9b:
b3:c5:77:b4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.19s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,400,587 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:36:25 2025 GMT
Not After : Jun 7 13:36:25 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b6:61:7e:c4:83:df:2d:cb:8f:97:fe:46:cf:4c:
e4:72:fe:44:2d:d7:8f:38:fb:c9:93:99:89:97:8f:
02:d4:16:94:0f:1b:84:2d:67:31:a9:b2:c6:6b:20:
7b:aa:51:da:04:66:dd:d2:7b:8b:6c:de:e9:13:3e:
d7:49:c8:bd:44:3b:44:cc:32:28:f3:e9:5a:5e:1c:
44:5f:a8:60:1d:1e:11:5d:3f:6f:26:81:82:d7:9f:
f8:4b:59:9c:37:19:8c:1b:c7:84:9f:f4:99:ee:09:
b8:fb:25:bf:10:12:06:60:9c:cb:58:9a:a8:10:19:
a7:b6:c1:65:3c:3f:24:c0:cd:06:36:60:6f:93:9a:
09:31:f8:84:a3:f1:c2:65:2e:02:81:fb:03:02:21:
7a:08:00:2f:3a:68:c7:2a:77:75:50:64:8f:12:e0:
65:d4:d6:e6:0a:03:ea:72:08:38:eb:66:d8:ff:37:
27:7e:7a:89:49:2d:61:6d:8c:95:a9:f9:5d:31:3b:
b6:99:6e:c2:31:26:78:a5:2b:ee:c5:c4:bd:ec:f2:
3d:4d:30:6a:f7:7c:11:42:86:c3:18:d2:43:aa:3d:
11:84:06:07:59:5d:07:5c:fd:87:e7:12:94:0f:6f:
82:10:b5:cf:a6:24:99:ac:78:4a:38:c5:17:0e:76:
82:5d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9b:dc:a0:3e:95:5c:93:de:03:26:44:42:4e:71:9a:9b:32:75:
89:7e:31:1c:f4:14:12:0f:fd:a5:d0:fe:dc:dc:bb:13:9e:9e:
59:cd:56:fe:b3:e9:16:4a:1e:cb:f6:ee:0d:b2:a9:2a:a8:3e:
84:f8:d7:4b:90:4a:54:76:15:0c:12:d4:a6:2c:05:2d:b9:d4:
6a:25:db:aa:6d:ff:3b:2c:be:ae:67:4a:a0:e1:a8:cb:03:a9:
c8:a9:a5:1d:ae:f2:ee:7b:0d:5f:33:ec:b7:cf:4d:a6:e6:e2:
d7:cd:49:8b:ac:de:dc:e3:40:ae:cf:81:d1:88:ac:ef:15:63:
5d:75:c8:bd:2a:58:3f:bd:1a:b1:5a:08:4a:28:e3:9e:01:a8:
11:99:40:dc:e5:61:69:90:e5:e3:b0:c1:6f:c7:8b:1d:69:a1:
b6:f0:f3:e4:a1:8c:0c:c6:dc:49:00:bb:a7:6b:df:01:5f:83:
5f:28:36:a1:c9:bb:98:8f:13:40:8b:1d:cc:79:28:38:d5:31:
27:96:98:15:00:a5:ad:e2:69:98:47:5a:16:81:f7:03:f9:d7:
01:ba:e2:a9:0f:8c:70:43:b3:ee:26:a4:f2:60:a5:cf:11:77:
4a:96:b5:5c:b8:35:22:5f:cb:0b:b5:37:cd:c0:53:0f:5a:f3:
38:62:32:2b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:36:26 2025 GMT
Not After : May 9 13:36:26 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
00:1d:9f:88:26:13:d0:de:58:17:8d:dc:1e:e9:da:fb:03:13:
63:ae:70:c3:ee:b8:3c:b6:c8:a3:4d:3e:c6:9f:12:45:a5:ab:
03:65:2c:2b:11:70:8c:00:f9:3e:ec:58:4f:49:ee:32:cb:1a:
09:b6:fe:55:95:97:3a:f1:90:a7:fd:50:56:10:21:f8:12:32:
18:c0:8d:a4:78:e5:d4:1a:a9:e3:5b:45:0a:d2:d4:95:e7:31:
93:51:ea:64:8c:22:c7:24:cb:14:f0:01:10:e7:f2:8c:e6:13:
5b:18:23:6c:56:d4:33:75:42:eb:00:a7:54:34:df:9f:c3:c6:
36:b2:14:16:01:53:07:5e:c2:78:a1:3a:3a:56:42:64:64:20:
6e:c9:3a:2a:38:2b:65:86:a1:df:96:c4:60:1b:f3:4a:ae:3a:
bc:9b:dc:6c:9b:4e:f9:2b:68:19:a2:6b:00:69:a9:87:92:ae:
54:cd:82:89:0a:72:c9:99:ce:06:7b:0c:8d:d5:12:75:8c:3c:
50:57:15:ce:df:8a:11:a7:95:91:a3:5a:69:fb:21:ab:ec:b1:
74:e4:48:89:02:93:54:45:18:24:8e:6b:f6:49:87:f0:bd:ae:
4b:6e:e5:8f:e2:93:a2:ef:73:5e:df:08:9f:e9:14:52:bc:c6:
92:7b:27:76
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,224,256 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:59:39 2025 GMT
Not After : Jun 7 13:59:39 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cd:d1:2f:ea:08:60:f1:01:aa:1e:8e:8b:93:3b:
fb:31:65:6a:ea:ee:da:af:0b:4d:7d:d0:ee:a4:8e:
24:d5:12:55:81:82:b3:08:3a:0d:29:43:f6:01:8f:
cd:f7:de:e5:09:f3:37:f0:ef:a0:13:31:4c:17:3a:
f2:bc:c6:8c:7d:bb:d0:98:00:f1:46:1e:4d:0b:d2:
2b:3e:2f:c5:cc:dd:25:cf:19:4d:2f:f3:36:94:5c:
22:bd:8b:5e:cc:20:19:c7:7e:6b:5b:25:c3:d1:fe:
30:3f:3d:5c:11:82:ca:08:56:eb:68:55:3f:d2:29:
f3:ad:41:e7:dc:1c:5a:c2:de:5e:16:59:b4:bd:2c:
f1:0b:50:53:df:bc:15:d8:20:8d:d0:5b:15:33:65:
25:73:f3:56:7c:ff:4e:58:8c:73:f3:f9:95:ee:60:
8c:31:df:5f:13:ac:72:fb:b1:e5:c0:c5:70:20:8a:
74:48:cb:c0:5b:20:bb:3c:a2:1b:d7:20:92:8e:85:
12:86:a2:ee:3e:bd:2e:3a:fa:59:53:b3:1b:ef:49:
3b:e3:46:01:93:e1:5a:da:60:68:ba:d5:55:5d:12:
99:00:c4:74:5d:7f:fa:d9:3c:6d:a4:f1:55:e7:59:
d3:4c:a3:d3:0b:c8:29:d0:71:44:17:be:67:6f:da:
0b:cf
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
17:39:eb:bd:78:6e:54:c8:eb:5e:a1:9a:98:e4:08:df:3b:32:
b9:1f:e3:61:f5:ea:f9:f5:21:63:9a:63:32:c5:6b:28:ba:5e:
ea:18:32:f0:06:93:4c:38:27:d6:b6:b3:fd:92:31:55:08:53:
3e:25:62:9c:2c:b2:5c:0a:29:6c:8d:3d:68:f9:bd:a9:48:65:
bb:41:7c:c0:f4:17:ae:6d:22:b0:6a:73:a4:92:fe:8c:ca:83:
24:e6:f3:2d:11:8f:ff:ce:b1:07:6a:e2:f7:9d:db:54:4e:ed:
d1:8c:0a:51:92:61:32:a4:ed:b5:cf:07:36:4b:d7:4e:bf:a8:
75:17:0e:01:fc:f9:d8:93:ac:7b:f6:a4:78:2f:65:9e:20:96:
bf:61:d3:7e:df:03:71:bb:6d:9c:f2:d0:de:ef:25:59:cc:45:
dc:d3:41:eb:0d:4c:72:dc:59:51:72:eb:6d:ad:51:dd:5f:62:
b6:60:9f:3e:f7:ed:b1:5f:47:39:8d:f5:f3:22:92:23:23:32:
f1:14:4d:c7:22:ee:f1:64:84:a9:a6:e4:47:e4:a0:e2:61:f5:
5b:7b:8b:11:9d:b6:43:5e:82:04:ed:33:cc:e5:c1:b4:b6:c6:
e3:48:bc:81:67:8c:84:c0:dd:27:26:11:b0:a9:ec:78:9b:77:
42:54:19:df
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:59:39 2025 GMT
Not After : May 9 13:59:39 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c6:db:22:28:65:35:45:fc:2d:de:75:89:5e:d9:7a:5a:4d:df:
46:a4:ea:24:20:79:c6:6e:ed:34:61:f6:3c:b8:d4:9f:60:08:
82:0a:5e:d2:13:90:c3:35:f6:89:88:9b:6b:b5:5e:0c:b0:dd:
22:ee:51:9e:ef:8e:05:db:33:4c:ca:4c:f3:7f:05:2b:55:ca:
1e:79:3c:2b:f7:1c:46:95:03:ef:89:99:50:7a:30:3f:25:e2:
0a:55:ed:e4:f1:34:23:6f:dc:43:6d:71:c2:16:34:3c:45:f7:
76:87:69:2c:34:80:97:ca:b4:bc:45:85:1b:4e:0a:e3:7a:ff:
1d:9a:3e:dc:63:a9:d2:0b:08:ad:7e:7c:bf:72:1e:72:b2:e6:
f8:6d:49:54:20:31:6f:7f:4c:03:36:40:f0:6d:f7:9e:ab:bf:
1e:5f:d2:49:71:af:ee:f0:e1:54:c6:96:c3:cd:32:78:d9:7e:
f3:9e:73:d5:a6:21:98:df:0d:40:91:40:6f:5e:3a:a6:3b:13:
e8:fe:54:e4:7e:2e:42:23:a8:27:1b:5d:fc:b4:74:51:3d:0a:
fc:67:19:b4:93:9d:4e:c9:57:3d:2e:5d:1a:f1:70:05:57:4d:
ec:6b:bc:27:f1:fc:2d:30:95:e3:1f:d1:88:b4:d4:b9:21:73:
80:9e:a0:e4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,411,418 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:04:09 2025 GMT
Not After : Jun 7 12:04:09 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b4:32:f9:b9:db:b2:6e:c7:7d:a2:7e:2e:87:ad:
8f:e8:ef:77:08:ab:1c:d1:f9:7c:6e:2a:3f:b2:41:
93:76:59:46:de:cd:c2:ae:41:ac:84:5a:32:25:1b:
c2:3d:07:0b:62:70:cf:49:27:34:cd:b5:ec:11:53:
b7:1b:97:60:bb:3c:88:45:33:26:b7:e3:35:5c:0b:
33:56:d3:9f:1f:1c:32:6f:03:7b:f6:f1:41:f7:80:
e2:af:64:c5:25:c7:4e:c9:4a:de:78:a2:fc:b3:3e:
fc:e9:13:db:20:8e:45:6b:c2:14:d4:51:64:f6:0d:
f5:4a:aa:21:c1:b7:53:e5:4d:2f:ce:21:50:7c:7c:
79:1c:0d:90:1d:98:20:76:81:de:8d:ac:88:d3:32:
5e:2b:9a:5d:b4:33:fb:c5:89:6c:e1:a1:bb:fd:ec:
98:d9:05:7e:e0:05:f9:69:8f:37:d8:7b:9c:da:27:
83:0a:5c:11:e2:ef:93:0e:33:a1:b3:57:38:c2:d4:
b3:09:0c:a9:58:c4:e6:36:17:87:e9:14:fa:a6:5a:
a7:4f:2a:20:5a:92:a5:2b:cf:41:c4:a5:36:c7:45:
9f:8b:fb:61:a5:62:fc:d3:20:bc:d4:f4:6b:ab:da:
2c:98:04:e2:5f:39:9a:a2:9a:25:c2:ab:68:ca:0e:
54:a1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6a:d9:35:0d:53:55:56:3a:a3:44:db:92:32:87:4a:64:1d:d1:
75:36:7b:a3:eb:4b:da:db:17:eb:82:9c:96:a9:09:34:43:ad:
0c:1f:93:c6:da:c1:9c:81:8e:d6:18:c2:f5:c6:67:3f:83:09:
8c:0e:4f:5b:0f:c8:f0:a0:81:29:0f:62:9b:fa:87:02:40:f0:
8c:f7:6a:4d:52:03:76:82:84:f3:1a:cd:f0:e0:e0:0b:9f:6b:
29:6b:b2:bb:d8:14:3a:9a:db:59:b5:78:fa:86:49:4c:41:ca:
d2:87:4e:b4:3e:08:25:bc:da:1c:53:ac:05:68:7a:f8:b3:da:
4f:4f:42:03:d7:56:80:28:4f:1e:2d:73:fe:3c:58:07:98:ca:
b8:10:8f:b6:89:e9:92:3d:5d:04:27:58:85:c7:e4:76:2a:c4:
46:f9:1e:9b:e2:3b:65:69:28:d5:86:18:ea:d7:ea:b2:b7:a0:
0d:19:98:98:12:13:b2:42:b8:4d:78:d5:84:26:00:a8:b1:a0:
a2:53:3d:26:99:ea:f6:ad:5c:5e:71:b9:28:a0:01:4a:df:79:
e0:ff:76:2d:15:5d:9e:d8:3f:6b:42:88:c6:55:4c:86:bd:fe:
12:8d:dd:f6:2c:3c:29:20:87:11:92:ca:b8:97:09:10:be:38:
e1:fc:41:7c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:04:09 2025 GMT
Not After : May 9 12:04:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
55:19:a6:c3:0d:8c:ff:a5:f2:a4:07:02:6e:3b:08:b1:d5:b6:
f4:f4:b2:82:28:d6:e7:c8:57:02:64:89:09:84:aa:fd:64:6a:
9b:da:bc:54:0e:59:df:01:fc:7d:3a:91:7a:3a:f0:dc:c9:99:
47:15:3f:b7:9c:e5:8a:16:7a:20:5a:52:a7:f3:4c:49:9f:0f:
63:07:c9:eb:6b:6d:43:29:5f:0b:f7:b3:a1:b6:80:4e:5a:19:
30:8f:b6:5e:65:cd:2d:99:c3:92:b8:33:c4:12:c1:01:94:8e:
5c:33:6d:1a:bd:81:32:8f:97:d7:25:43:e0:35:bf:e0:40:7a:
43:e7:84:d8:79:56:35:93:c9:d5:94:f6:da:fa:7a:df:1f:a3:
00:8c:3e:13:a5:c6:bf:ec:b6:63:74:e8:78:88:27:7f:b3:77:
a3:09:0c:c9:ea:8d:a6:d2:2d:05:31:7a:8a:6f:95:71:16:15:
bb:2d:f3:3a:17:75:95:f9:ef:25:69:0c:f5:1d:2d:9a:09:fe:
55:82:42:fb:bf:54:fb:56:b9:ba:05:fa:b4:1e:93:e7:d4:55:
b2:fc:b9:a6:de:42:37:6a:81:ca:d3:22:45:58:5a:3f:d4:22:
95:69:09:0d:da:32:81:4a:95:48:27:8f:61:74:88:de:f5:46:
59:bf:66:2c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
Truncated 7935 bytes from beginning
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
3,105,068 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:24 2025 GMT
Not After : Jun 7 10:25:24 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e2:dc:d7:6f:10:d1:20:da:1b:bc:a7:ae:93:ba:
3b:8d:94:a7:16:6f:84:f8:ad:ba:25:58:3b:89:f1:
cf:16:d9:45:81:f7:6b:5d:91:d2:67:71:4f:7b:af:
e2:07:83:fd:d9:d7:d0:ec:1d:f0:6f:cb:a3:bb:4f:
3f:c3:b4:03:33:53:b9:b2:87:40:94:76:1b:ee:f7:
50:86:75:e5:d7:f0:4e:cf:e9:f3:d0:9e:99:02:41:
ce:19:30:fa:02:16:5a:be:51:49:ca:86:1e:bc:79:
4b:31:00:70:e8:77:96:f9:76:00:5a:02:b2:3b:ff:
c9:f0:fb:fe:23:de:34:5d:4c:0a:a7:8e:11:bc:28:
f4:99:37:e3:5d:e2:0a:b9:74:99:a5:59:d6:e2:81:
a9:1a:f2:9f:7e:33:0b:75:74:5c:b4:d0:6a:3d:2d:
b6:33:90:b4:8a:38:07:19:6d:ab:07:7b:8d:87:a2:
f9:2a:20:04:35:d2:7d:48:7b:69:c6:3a:53:1f:0d:
e2:94:12:ee:89:fc:22:f2:7e:fc:9a:67:ae:24:71:
d3:8e:95:f1:c9:07:fb:f9:8c:91:49:b4:c1:9b:1b:
6e:f9:82:67:56:6a:2b:e7:5f:4a:f5:95:35:ee:38:
8f:3b:5d:98:51:87:08:8b:45:30:4a:fd:fc:8e:df:
0e:5f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
83:ad:1c:bb:e7:40:3c:b3:ac:4c:5b:6d:64:b2:8a:c8:0e:45:
0f:58:2c:2b:db:bd:07:ba:b3:d8:12:42:14:10:47:4b:d9:4a:
b7:22:ac:7b:be:93:3b:43:f2:28:f6:be:60:2d:29:3e:27:4a:
2c:4a:74:9f:5b:31:c2:76:c0:5e:be:8b:f7:7e:f9:83:17:2c:
00:ae:d2:62:d9:fc:81:33:02:e7:08:ab:32:1d:48:5a:98:ad:
b5:e4:5a:ad:2f:f8:6e:23:65:42:a0:84:e4:2f:bb:6e:ce:e4:
8a:5a:f1:01:d4:91:37:32:db:0d:f3:9a:ef:dc:34:2a:c6:1e:
e4:f5:f9:1b:7e:52:a3:99:5d:81:68:03:c6:b8:53:d2:51:25:
7f:51:1d:dc:39:95:b1:ea:49:5b:2b:f9:10:e9:d7:70:39:a7:
8a:4a:6f:38:09:a9:07:b5:9e:6d:57:f6:59:64:52:29:0c:01:
98:f0:67:35:18:5c:89:a6:b3:13:3d:4f:17:7f:dc:8f:8d:e9:
28:a4:32:bd:81:0d:b3:e0:3d:53:dc:b4:4a:9a:ca:c3:c6:a9:
30:ef:73:03:43:f5:7b:60:05:32:a2:09:18:e9:2c:01:6a:af:
ff:0a:bf:2f:75:10:58:1b:ef:d3:59:84:dd:db:69:30:10:0d:
60:ce:84:a7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:24 2025 GMT
Not After : May 9 10:25:24 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6f:84:47:9c:c4:f7:b3:cf:2b:7d:50:5d:34:d3:74:c7:79:aa:
36:6e:36:27:76:53:c5:06:63:97:93:35:56:3b:91:42:d6:8d:
5a:c0:f5:fc:5c:8b:9f:c8:0c:aa:32:e7:da:86:df:9e:f6:60:
71:1b:b9:e3:d4:aa:39:a3:61:56:78:22:92:5f:94:e0:a5:46:
29:b9:60:9b:55:24:b8:92:87:f0:64:5e:9a:8b:56:d9:50:02:
e4:18:d3:62:c2:b4:c6:c6:6a:95:9e:c3:95:dd:2f:37:84:f7:
df:cb:b9:33:a7:fb:84:c8:fd:6b:1a:0a:54:66:37:63:8e:af:
48:dd:bd:98:a2:be:34:be:00:30:50:d7:38:79:6d:dc:c3:43:
40:63:d7:03:13:17:96:4a:2a:7b:6e:06:69:63:77:73:5a:d3:
3b:7b:7b:8a:b6:a3:22:75:90:2a:2c:f6:19:9f:75:64:61:94:
ec:e7:ca:8a:15:23:b3:5b:c8:94:47:0a:53:06:0d:3c:f1:61:
49:b7:4c:76:ad:56:26:bd:78:51:af:32:2e:1d:4a:02:42:95:
cd:0b:ad:c9:d9:c7:dd:d6:2b:13:9e:5e:71:2c:9f:c5:95:5d:
b0:fe:3c:02:08:0a:bc:ed:cd:2c:b9:e9:b3:70:cb:64:74:ca:
c0:c7:b1:1b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
Truncated 3059 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,855,688 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:18 2025 GMT
Not After : Jun 7 10:25:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ed:88:ff:37:b7:1a:41:76:9e:87:1e:c6:cc:fd:
31:60:06:84:e1:9c:66:52:72:d5:da:35:db:82:a0:
7b:e5:8a:f7:7f:c9:92:18:fc:38:e3:72:bb:5e:77:
d3:72:03:c8:99:5d:43:e4:01:e2:f2:9e:d1:ac:7e:
fa:bd:bf:ca:71:2c:fa:28:7a:b4:bd:cb:2c:53:eb:
91:89:a2:3b:f8:1f:31:12:92:c8:9a:ea:41:24:a5:
b0:5e:d2:44:73:69:ae:43:c9:7b:5c:3c:02:70:b4:
87:c7:fd:28:9f:ee:73:07:ec:27:72:44:a2:f8:e4:
ed:f1:6c:4c:07:6d:fa:fb:55:44:1f:d6:42:ff:fc:
fc:63:26:79:a6:0a:a0:6c:93:e1:e2:3f:b0:f4:3a:
70:cd:ee:be:85:dc:49:13:b5:96:c8:e9:9f:d1:2d:
c5:9d:41:4f:af:b7:73:6d:ea:b9:ae:c4:3b:ca:11:
48:8c:18:8b:3e:fe:50:20:0b:e7:60:95:7b:a2:8e:
a8:8a:e5:54:dd:78:6a:e8:f1:e0:77:da:e3:86:ae:
3f:91:6a:84:8d:e1:5b:35:ab:3c:c5:49:45:58:1c:
60:ec:ae:f6:9a:0d:85:d3:ac:74:b6:30:5a:72:dc:
39:6a:b7:fa:13:0f:82:9f:c3:30:60:b1:2e:5e:5e:
1b:35
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a4:63:d8:64:44:26:2d:2b:04:f3:94:55:32:ca:34:5e:d5:74:
7c:df:31:00:83:2d:51:b5:b7:51:32:26:e8:1f:8e:63:06:85:
22:7e:62:32:79:e9:86:8c:de:58:28:88:ff:6b:57:a5:3b:0a:
4f:81:90:a9:e5:50:4d:2e:90:dc:05:e6:d6:35:85:69:0f:29:
54:e3:c9:84:a7:f6:6c:46:c0:3a:68:7f:a3:a6:73:20:73:f1:
65:60:f2:42:47:7c:fa:5d:12:e9:06:f2:ed:c4:05:65:b7:d9:
e0:02:03:45:db:e1:41:ef:ab:33:30:7d:82:ec:ff:09:b3:98:
b7:d9:20:61:e3:86:71:7f:77:4d:91:77:c8:4c:c3:87:d9:f0:
ae:a4:42:96:14:94:77:d1:1f:fb:2f:09:9a:bd:d2:03:8a:3c:
41:e4:cb:68:e4:7a:a6:83:05:df:6b:b7:24:8f:b7:0f:f2:a8:
65:d6:01:48:06:a7:79:60:ed:c0:e7:c4:9e:75:1b:ff:31:68:
a5:1c:af:60:1a:39:89:b9:54:51:8e:1b:cc:5e:9a:63:67:b9:
1c:37:92:a2:ac:e1:47:5a:84:6a:6a:18:b6:8a:a1:aa:61:ed:
cf:20:61:e7:b0:5b:58:5b:0c:01:f6:da:4a:e9:9e:34:44:c3:
ae:cf:f1:e3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:18 2025 GMT
Not After : May 9 10:25:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a2:f6:35:98:bc:a7:d3:e3:53:3c:46:ef:e9:3a:53:0d:e4:b1:
9b:b0:a5:9f:7b:43:af:6f:82:43:6f:5f:0a:e8:25:58:1b:3a:
da:4f:76:b9:98:7f:70:39:2b:41:29:7e:fd:03:55:cb:40:5f:
29:82:59:af:bd:da:21:11:e6:fa:b0:4a:41:10:54:dc:45:70:
bc:35:2c:09:2e:a7:fd:59:db:e7:99:75:64:60:d6:85:1e:37:
c5:d2:36:b6:93:09:96:58:f5:d1:2e:2b:ab:83:ae:fd:6c:71:
23:a4:76:15:c2:7d:e6:37:de:6b:2e:2e:44:a3:75:8f:e3:4a:
04:0b:26:2c:27:ec:33:79:a4:07:bd:77:86:88:11:9d:35:87:
be:af:76:92:eb:68:40:60:a4:0e:92:bf:3a:30:03:00:a6:b7:
e6:c3:d6:61:2d:bb:11:07:68:4b:74:f3:5d:7e:93:b3:d3:13:
d0:1d:7c:20:d7:05:7a:1e:38:5b:4a:51:02:c4:bc:0e:20:b8:
e6:36:b3:5d:b5:9b:dd:a3:4b:1c:42:b0:a1:8d:e9:ae:20:63:
70:b9:72:28:af:92:79:20:35:d8:d0:14:04:33:6e:bb:67:f1:
5a:e7:c3:12:46:1a:12:43:65:96:b1:d3:ae:6b:ef:0a:5f:c4:
fa:42:e1:4d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
Truncated 7935 bytes from beginning
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
3,108,519 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:17 2025 GMT
Not After : Jun 7 10:25:17 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:88:4c:ad:47:73:53:4a:c4:0d:c2:89:dd:d8:ca:
7a:93:b6:d1:ee:ce:c4:f4:d9:45:42:0d:b0:17:78:
c1:2f:f1:2c:6e:2b:32:1a:b6:c7:01:ea:d5:a1:bf:
e4:8d:70:fd:f9:55:16:c0:0d:a1:75:d9:17:df:26:
d4:8b:8f:6d:e9:1b:c7:9a:7e:7d:08:3b:78:85:32:
3f:3a:34:03:ed:b9:2e:88:90:2b:7b:9a:35:b7:4d:
de:7b:9d:f5:df:5a:a8:17:f1:04:b9:71:0c:37:65:
a6:28:3e:d2:4e:a9:0f:48:f0:cb:ed:87:95:fd:4a:
30:35:52:c9:65:8c:0f:58:7f:74:34:d3:a6:7d:d7:
31:af:79:56:9d:f1:44:04:d7:36:45:80:a6:92:3a:
50:50:fe:7e:ea:d2:52:cb:47:ac:04:a9:46:95:2f:
ea:90:85:77:cb:0f:ba:82:13:e3:2c:32:c7:32:18:
90:39:20:4f:40:62:9c:bf:53:d6:4e:a4:9c:1a:5f:
25:87:e8:fc:b0:14:36:de:8e:79:1e:20:e2:5a:8d:
c8:1c:63:23:55:69:aa:9d:0d:f7:ed:42:94:c6:a4:
68:5d:b5:79:bf:b0:7a:7d:f7:02:bc:9e:f3:f2:61:
02:7e:23:39:cf:47:26:cb:84:99:e0:36:e3:e3:46:
b8:23
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
75:e1:e6:a0:04:79:fd:91:40:04:47:ab:55:29:7b:50:f6:0e:
2c:93:d7:b5:44:0e:d4:f9:88:23:bc:7b:a0:b9:e0:34:8c:13:
1f:d2:0e:82:bc:91:78:5e:24:83:09:63:4d:dc:75:8b:4d:ec:
1c:f9:6f:c1:89:7b:6c:bc:42:f8:55:bf:19:e4:1c:45:27:2a:
51:cc:84:04:e8:e4:ab:49:9f:a0:fc:8a:fb:f6:90:d9:e9:e9:
97:57:b4:b6:99:07:dc:27:e7:ad:ea:82:89:67:ff:eb:56:36:
d6:ba:80:59:79:c2:40:5d:44:4d:01:ec:76:e4:70:90:4a:d3:
f6:f5:b9:e0:71:7f:e3:31:3c:29:9b:94:ac:84:88:9b:3e:74:
22:27:40:99:87:4b:d3:a2:88:69:d2:33:f3:84:ed:f9:6c:64:
20:c2:2b:df:66:d0:60:e0:a7:6f:1d:02:69:30:72:b5:af:29:
48:d1:1e:6d:cc:65:ce:b6:b5:dd:04:13:e9:30:92:71:dd:62:
f4:e1:09:0f:94:4e:1b:f0:4e:cb:fc:33:b1:fe:69:ac:33:34:
81:3a:7d:6b:06:ec:b2:df:bd:ab:b7:28:2f:d8:c0:38:9d:c6:
63:e8:84:fd:88:46:d0:4e:f5:71:ac:59:8a:a2:0c:ef:65:6a:
8d:e2:ef:98
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:17 2025 GMT
Not After : May 9 10:25:17 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
09:62:dc:fd:6a:e4:73:2b:25:17:6e:62:a3:00:fa:46:d1:cc:
06:f6:80:79:9c:f7:ae:3d:26:0d:87:cd:7d:82:54:e5:38:a2:
ec:a1:95:fe:3d:52:80:2e:52:fa:60:37:86:d1:82:b4:a4:0a:
1f:cf:70:55:01:e8:54:9c:80:73:04:3e:dc:c0:20:b4:ea:c7:
51:fa:2a:0a:91:57:48:53:4e:4c:1d:0a:f5:51:0d:9d:42:9d:
fd:70:e1:a1:8f:62:a6:dc:a2:42:91:fb:1a:6e:8e:3b:0c:1c:
ed:db:2e:fe:74:c8:c3:cb:08:0b:3a:77:8a:79:44:ff:50:f4:
01:b4:82:80:36:50:40:9a:8f:59:17:2e:57:b9:a6:52:58:8c:
40:3f:2f:5f:a5:03:de:a1:61:07:1f:19:82:0d:8e:6c:36:2c:
33:f0:a0:97:1d:4a:03:0a:40:b4:15:77:84:24:76:32:89:e0:
a6:4a:35:d5:f3:ee:1d:f1:00:c0:2c:90:5a:99:d1:8d:09:19:
3f:2c:e5:6e:63:00:81:9f:b4:17:99:60:29:de:59:91:bf:46:
c5:22:6e:ba:5e:e3:ce:45:9d:36:75:e7:d4:60:a6:c3:65:d0:
7f:05:5c:97:47:34:ce:58:60:79:9f:b3:8a:10:bf:4b:82:db:
ea:5d:4e:ca
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
Truncated 3059 bytes from beginning
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
2,855,271 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:20 2025 GMT
Not After : Jun 7 10:25:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:8e:04:e6:6a:4d:4a:4e:5a:d8:ab:6f:59:31:7f:
27:e6:f2:de:7f:05:a0:8a:5c:37:9d:85:4e:ab:fa:
4b:27:1e:d1:16:f3:f4:65:22:e2:fc:37:13:ec:4d:
51:5b:5c:02:0d:79:77:1b:8e:09:c6:23:2a:3d:7c:
a4:10:34:0c:a8:52:06:66:1e:c9:ff:14:fb:b5:05:
9f:d8:6c:6d:53:dc:67:b9:e8:49:91:71:3c:57:42:
f0:50:41:7c:e2:3d:6f:09:6a:1f:4c:91:19:92:8f:
31:e3:fd:93:29:a5:b9:1b:d2:28:d7:c3:9a:16:9f:
55:43:e4:56:67:fe:66:92:e3:8e:2d:5a:97:2d:72:
9b:b1:38:6e:1e:b6:ef:2c:3b:49:0e:22:70:b9:56:
cc:d6:62:28:21:c9:16:f4:d0:a5:b9:e6:81:a7:b0:
53:cd:1c:1e:22:5e:02:2d:a3:be:e8:9b:88:24:93:
93:5a:85:f7:d9:7a:a2:ca:84:54:75:05:23:3e:f5:
2f:dc:6b:37:35:a8:57:41:d1:17:9c:92:7e:01:81:
b1:0d:1c:d5:e9:c9:25:a3:17:68:c4:63:ad:87:32:
e9:e2:2c:3a:e0:af:27:97:fe:0e:b2:3d:21:7a:83:
4c:56:cb:ae:2a:73:18:57:06:1d:4d:09:37:11:35:
aa:a9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4d:e8:27:0d:62:64:cb:60:0d:94:94:8a:62:86:dd:40:8e:1b:
bc:21:e1:7f:5d:98:f7:bd:29:15:f1:6e:6b:46:ad:51:b4:3b:
65:b2:8a:90:f4:f3:2f:51:5a:c4:1a:07:fe:88:c7:b9:3d:2c:
dc:cf:83:52:e0:de:51:9b:07:fc:b0:c0:eb:71:9e:ca:cb:31:
4a:04:4f:99:07:c5:4d:51:17:7a:a2:19:44:0b:69:d0:ad:59:
d4:15:57:3f:a2:f5:0b:fc:bb:04:ad:7c:9c:d4:a3:c2:4f:63:
8f:08:80:f1:33:03:e5:c6:dc:c7:39:5c:52:9d:a1:3c:59:ef:
c8:19:d5:5e:aa:02:5a:65:90:35:c0:cd:52:e6:c0:d9:75:e2:
d1:ef:88:4d:79:b4:1c:7b:fe:e7:81:3b:c0:01:79:86:e0:9a:
8b:e7:87:36:79:1f:d5:41:6c:49:e6:c4:bc:54:8d:69:1a:66:
56:a8:86:20:45:c2:ba:60:10:10:4b:ab:b6:af:3d:9c:96:3e:
25:4a:9f:94:76:9a:81:57:ea:4f:b1:96:ee:f4:cb:55:38:fe:
8a:74:43:cc:1b:98:55:33:ef:38:ab:b0:2d:97:aa:c7:1e:0a:
b1:32:06:65:ce:18:7d:21:d0:34:4f:92:6d:be:40:70:fc:6e:
83:37:07:ea
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:20 2025 GMT
Not After : May 9 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2b:13:f6:84:5f:41:43:f2:9d:6b:76:5a:e6:cd:a5:05:0a:45:
36:76:12:4d:16:6c:0f:03:6c:af:bf:0d:f0:70:11:fa:d3:c2:
d1:61:af:f1:ea:71:ba:be:77:d7:d0:61:46:7c:82:a7:41:20:
07:30:e4:1a:59:9b:bc:3d:58:f9:08:3b:18:05:24:86:26:17:
b8:53:02:b0:77:cb:df:62:96:18:d2:3c:cd:74:5a:ed:6b:64:
9a:d4:1f:76:30:8e:a9:bb:6b:fe:1a:b8:7b:b7:27:e3:20:d0:
96:ae:4d:a3:34:a3:c4:2d:6f:6b:47:da:bc:95:49:52:c0:c8:
80:b3:55:c4:48:e3:9d:73:72:8e:c7:13:ce:5a:4f:5f:7e:e1:
8d:14:66:1d:4c:cf:53:ba:da:44:47:34:22:98:0f:1b:5a:89:
51:9c:cd:c1:c1:fa:04:20:7b:fd:00:30:ec:8d:12:4e:c0:41:
57:e7:2c:78:31:6f:27:a8:2f:7f:cb:d0:b1:39:6a:e9:fe:fc:
9e:c7:d1:94:02:82:54:ba:37:c0:43:2f:e4:59:f1:f1:fb:93:
00:b7:69:86:09:ee:dc:62:6c:41:90:f5:25:ad:bd:c7:83:79:
6d:f4:cd:80:6b:06:62:c6:5e:83:dc:f0:27:9e:b2:27:3b:13:
02:0b:94:95
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,105,212 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:19 2025 GMT
Not After : Jun 7 10:25:19 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a4:53:a6:66:1c:34:95:a4:29:0e:b2:b3:a4:f8:
5b:53:b3:ac:b4:62:71:1d:50:41:71:98:9a:bf:6a:
41:be:05:0b:b4:bc:3d:97:12:18:be:d3:fd:2b:80:
f8:25:af:8c:73:ea:4b:d6:cb:df:d5:9b:7a:8e:6e:
49:eb:98:2f:c8:d5:ca:b0:88:7e:93:ba:4c:ff:40:
7f:7a:70:e6:73:90:41:f0:3d:03:30:5c:8c:28:00:
fd:94:80:f4:05:ca:4d:4e:a7:87:bd:70:7b:2c:cb:
ac:dd:7c:07:67:ed:f3:4d:b7:89:d9:fd:f0:49:04:
f9:c1:48:83:a8:00:76:f2:6f:04:69:01:06:12:01:
61:b7:0f:36:c1:e4:17:3e:11:72:73:20:6c:f3:98:
14:78:4e:25:2a:ee:39:77:d6:31:16:8e:bb:50:77:
41:a2:3f:1a:8e:3a:25:16:b9:4e:e4:4c:28:89:ac:
87:44:49:d6:ef:48:11:51:d6:05:48:3d:d8:07:83:
d8:7c:a9:9e:86:77:cc:6c:0e:f8:85:71:60:ae:40:
fc:c5:2e:0b:76:52:2c:ae:10:a1:3f:88:08:e1:db:
20:11:27:12:64:87:bc:4e:ba:a0:3b:16:b1:eb:42:
83:d3:b5:f1:87:08:26:06:f7:51:fa:0d:a7:2f:2a:
82:4b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5b:06:28:4e:01:cb:b1:21:25:3f:3f:b9:9b:37:ac:cb:46:b9:
77:64:9c:59:65:a1:bb:5d:b1:a2:1b:6f:e6:81:a8:22:a2:6d:
33:2a:59:a2:de:f9:f6:bd:79:dd:f4:c9:9b:9e:9f:9a:ab:6b:
96:6f:72:de:d4:a7:0e:15:b6:e1:8b:5d:00:d2:8f:7b:50:13:
1b:6a:3f:b8:ba:5a:5c:b6:34:24:0e:f2:70:87:42:e7:17:e7:
fc:ae:51:4e:5e:25:a0:f0:c2:78:01:b0:d2:d8:c6:4f:75:3f:
ca:59:a3:1d:65:7b:e5:b6:3d:96:3e:3d:e1:ac:03:ee:85:89:
2a:f8:e6:c9:55:45:c9:55:e8:bb:7a:22:f7:ca:3b:f6:b0:17:
a7:46:80:ec:d8:9f:76:95:45:bd:c3:6f:cb:a9:7b:5e:f3:4b:
86:c2:cb:ec:fd:0b:e2:3d:38:ab:cd:44:14:72:b7:70:76:d4:
e6:41:8f:a4:cf:46:f0:88:7c:3b:78:cc:fa:9f:1d:8d:25:af:
d9:9b:2d:da:f2:e3:93:8a:19:17:55:99:5e:b9:2c:23:fa:77:
7f:91:6c:36:e4:6f:71:9a:94:30:a1:55:c7:97:ba:14:d5:30:
ce:6b:2e:84:35:be:ac:e9:29:ee:da:14:ee:9a:00:2a:ce:1b:
f7:c3:fd:b7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:19 2025 GMT
Not After : May 9 10:25:19 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1d:7e:70:4f:2f:2e:0c:29:29:29:d0:7b:d3:59:d9:c6:3b:2b:
86:62:a5:a0:ed:e5:f6:47:9c:a7:42:cc:31:10:10:26:be:61:
68:32:b7:00:2e:d2:14:29:a5:df:b2:77:58:fd:e2:54:1d:4c:
1b:9c:aa:33:58:55:80:ee:70:a4:66:93:a3:b7:f9:9c:d5:aa:
4b:b5:d2:e3:58:4e:96:e6:a2:b3:46:55:f0:53:d0:90:6a:8f:
a5:0c:ab:2b:93:47:fb:b2:a7:22:a1:a4:a9:02:1a:02:b3:e8:
9b:ec:46:4a:81:f2:c0:b3:16:15:12:9c:19:52:ca:e2:93:ce:
dc:02:f0:5a:0a:5e:d7:55:ab:c8:d8:d2:a4:6e:fa:c0:cd:2e:
2f:73:7d:49:ec:58:f7:b1:4d:28:ff:0c:3c:0a:f8:42:43:ba:
98:1a:c8:fc:cf:df:ee:29:42:84:00:40:77:02:30:03:76:23:
5d:b3:fb:6d:3c:c1:01:55:64:ce:67:41:8e:cb:d4:68:89:0c:
63:28:e3:07:51:06:73:ac:f0:07:bc:5e:fe:4e:86:2c:34:0e:
28:7c:b7:db:9a:f7:e9:bb:d8:9f:eb:d2:e9:55:e9:9e:a6:cf:
e4:ac:71:43:b7:2f:d0:de:d9:31:fb:70:d9:39:ed:e3:31:3c:
3e:f4:36:a1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
Truncated 3059 bytes from beginning
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
2,853,962 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:06 2025 GMT
Not After : Jun 7 10:25:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b4:ae:1f:04:f7:7a:98:91:d3:64:71:e8:52:91:
65:ec:a7:44:91:30:be:7f:89:21:28:fb:ea:2c:51:
b9:a1:5c:ca:65:60:9a:7c:eb:56:79:d3:89:2d:48:
e1:c5:d8:8d:59:ca:4d:d9:fb:59:17:3e:34:d7:61:
61:3b:04:41:c7:bc:31:5b:79:48:fc:da:9c:47:2e:
8a:c8:81:80:88:15:14:e1:2c:b1:aa:97:bd:7f:46:
31:d2:60:5b:5c:01:4d:85:0a:77:4f:d6:5c:3c:08:
2e:fe:1e:e1:2d:85:ee:62:4b:a2:46:34:bb:24:15:
39:aa:57:02:51:7a:ff:e7:52:db:6f:f8:ea:de:bd:
a5:df:e8:81:40:c5:f1:33:db:64:df:68:04:01:fd:
e3:77:94:0e:f6:2f:91:ec:6d:74:81:1f:8a:2f:ac:
69:d1:22:81:cc:5d:27:0d:8e:1d:8a:d5:c1:68:87:
f1:9c:1a:d8:25:bc:3b:2c:40:d1:3d:c1:0f:86:45:
e2:39:81:99:5a:d2:ce:c1:df:8d:4b:72:b0:c5:37:
19:b4:bb:d2:6b:5a:4d:ad:eb:49:39:c2:70:c0:56:
87:d2:5a:e9:fc:d5:e5:a7:ab:c6:c3:0b:c3:77:c8:
50:e8:0a:7d:30:23:ff:8c:93:a2:f5:40:83:59:e9:
2a:07
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3a:fc:68:83:be:b3:25:7b:17:c9:d0:97:9a:8a:eb:27:f1:d9:
40:5f:b4:81:f7:dc:43:db:a1:73:27:a5:79:0e:21:7b:59:83:
f5:de:1e:5e:76:9b:6e:ec:c8:cd:91:9a:c3:b5:af:83:d0:32:
5c:3c:0f:fb:0f:2d:b3:13:37:b4:0a:79:3c:05:60:a5:61:d2:
39:f3:dc:b3:56:02:5e:b6:43:a0:08:77:32:c3:1d:bb:fb:b7:
e6:48:a6:f2:78:a1:ac:6c:bb:f2:ea:cb:c4:98:0f:c3:42:2c:
68:43:97:36:27:f6:68:be:95:99:08:0e:75:83:e4:cc:c2:cf:
63:0e:f6:8a:e9:83:e0:11:5f:d2:be:01:0a:3a:79:39:b7:5d:
f5:4b:e4:f5:34:d5:be:63:d2:88:f0:b7:37:44:5a:6e:2e:a2:
3e:f6:6f:6d:c3:fb:c3:34:b3:69:f1:b7:07:4d:8f:dc:e6:3b:
48:2f:a2:c2:bd:d0:16:5b:a0:50:b6:74:ee:19:86:96:f8:15:
a0:52:a6:ea:bd:84:8d:19:ce:e9:14:a2:da:19:dd:69:11:e9:
73:ae:88:84:12:53:ff:3a:a7:6a:80:2a:25:88:1b:e0:79:46:
a5:f8:db:e4:40:ab:b9:f9:c8:03:05:52:f9:60:f9:80:ab:88:
b3:1c:c1:ff
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:06 2025 GMT
Not After : May 9 10:25:06 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
42:03:fb:3e:e8:5f:e5:37:85:41:95:65:94:4c:5a:87:0e:4b:
68:28:1d:e5:27:38:da:93:43:31:4c:0c:e8:d4:3b:76:af:04:
2d:75:47:cd:88:25:92:a8:6d:15:8c:7f:32:f9:3f:22:43:3a:
01:2f:77:3d:37:67:65:b9:cd:8c:4a:4e:c6:b6:cf:b6:1c:42:
30:c3:97:de:1e:24:b1:1f:5d:70:6f:e9:2a:e6:e7:3f:39:dc:
41:f4:f2:42:00:95:d0:40:a5:3f:ae:78:12:c7:61:07:f0:f4:
f5:e9:66:e8:1f:32:31:9c:00:5f:47:f9:15:58:0d:f1:cd:da:
c3:de:99:a1:df:4d:5d:5c:e1:ca:04:dd:aa:cb:2e:0e:47:b7:
99:8f:ed:a9:ae:b8:41:24:27:26:be:46:6a:8c:79:7f:a2:73:
b3:38:56:7b:08:65:ef:3d:b3:50:d0:bc:c1:6e:06:ea:af:3f:
7e:6d:b3:8e:23:0f:89:64:95:35:5b:c3:16:1b:82:36:5d:a9:
fd:e1:24:4d:a7:49:ab:b3:7b:45:5f:d0:d4:79:b9:7c:93:08:
cf:f8:59:76:a3:aa:d2:06:c5:61:bf:6a:ba:47:be:c5:a6:16:
2e:d2:98:82:a7:9b:54:9c:62:dd:7d:7f:b7:f9:a1:24:fb:9c:
5c:42:58:63
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,107,279 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:10 2025 GMT
Not After : Jun 7 10:25:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b3:07:29:74:43:1c:20:99:c9:a3:39:4f:6e:36:
1f:08:83:d8:60:40:47:2c:7a:61:90:f1:1b:49:af:
ad:dd:94:08:a1:1a:de:bb:e3:37:fd:4e:79:60:69:
af:a0:59:0c:29:5f:1d:d9:10:b4:77:20:45:fe:e2:
72:a0:04:16:d4:19:ba:9a:c6:cd:33:9b:20:92:09:
37:48:4e:26:32:cb:12:59:eb:44:0b:58:41:a2:fc:
18:46:e2:b7:48:11:c7:22:39:aa:2b:38:98:72:0a:
19:84:b9:2d:77:41:ab:31:0a:4d:c7:4e:26:3c:31:
26:ff:95:bd:3a:fb:46:5d:e5:57:4e:a0:f1:cb:ec:
10:8f:2a:cc:b6:59:f4:f7:d7:38:2a:4b:c9:63:c9:
ee:9e:2b:cb:ca:c3:3f:65:38:15:8e:5c:4f:c4:f2:
15:f1:7f:12:d4:f8:08:da:d3:79:d4:fc:7e:f5:f4:
54:f8:b2:43:07:85:00:aa:27:fe:c6:a8:b3:2b:65:
30:3d:b1:3f:a0:72:f2:ea:6f:4c:db:26:ce:c2:22:
88:a0:97:7e:e3:02:fa:c3:36:43:3c:76:36:47:2a:
36:48:a3:a3:30:48:40:f9:42:2f:0e:a5:68:d5:73:
25:4d:9d:16:43:5d:9f:95:cf:4e:8a:a8:d3:c5:73:
11:eb
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9e:bf:91:48:40:0d:1a:c0:5a:e1:62:fb:c2:9a:a3:40:ce:8b:
b6:1d:e7:0a:48:1d:5d:b7:95:f8:51:f4:31:3c:d1:5e:2a:44:
ca:71:ff:54:ac:dd:b0:bd:b9:e9:c8:5f:68:30:8d:46:7c:88:
b0:84:9e:fd:13:1a:00:a5:70:fa:47:f6:83:0d:cd:00:18:b2:
49:63:71:ff:95:00:15:db:e6:94:57:8a:3a:a8:26:8e:96:61:
61:6e:ea:5f:0f:dd:57:09:f4:a4:43:12:7b:44:df:26:71:b1:
af:53:af:a7:2e:c2:7b:f0:41:6b:76:e0:05:38:75:5e:3a:5f:
d7:d6:3b:fc:8f:6a:7b:b1:03:0a:0b:40:5e:ed:b6:23:98:20:
fe:35:37:b6:62:09:b1:69:08:c7:36:37:da:eb:66:2e:57:f3:
75:d8:78:0b:67:79:58:72:2c:0a:d2:1a:10:c4:cd:e8:ec:cf:
d1:94:32:76:24:b5:90:ae:48:f9:0a:74:4a:e6:c3:f4:45:7c:
b1:8b:56:eb:67:e5:ed:17:93:a9:22:f1:7a:94:16:a2:22:fa:
47:83:0b:0e:77:09:20:8f:ed:b9:3b:d6:d3:5d:46:6a:f0:4a:
b9:03:5b:c2:91:f9:6c:3f:13:90:97:d3:6d:24:1d:43:c4:8e:
0a:18:e9:ee
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:10 2025 GMT
Not After : May 9 10:25:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
68:1b:6d:ad:71:e7:0e:ae:0d:89:92:47:42:a1:61:4b:eb:3c:
ea:84:26:b8:58:79:34:9f:c0:69:b7:c3:b1:2b:95:82:3a:5c:
7b:cb:08:ba:db:de:b5:89:d0:82:33:43:dc:3a:4d:ca:a0:70:
a6:33:7d:0f:78:0b:de:16:6d:cc:b6:2b:1b:f9:99:64:81:7e:
ac:16:33:86:0a:04:c3:c7:61:94:e6:37:ab:75:d7:b8:ad:4d:
84:20:01:c3:5f:18:36:18:d1:56:d7:67:d4:45:6d:7b:b9:46:
77:92:25:8c:eb:c4:47:03:e5:67:92:ce:b9:c0:ad:3c:a6:68:
95:9a:85:43:ee:59:d9:56:b3:af:10:09:f0:8e:32:fc:00:41:
09:a1:a0:a9:14:01:ac:03:bf:c2:66:ec:bc:d5:68:45:3f:da:
03:d7:8b:74:8f:83:ed:86:13:38:8c:1f:13:77:10:51:12:32:
52:18:e2:c8:88:63:1a:d3:0b:2c:3e:99:27:61:86:de:21:69:
fb:73:3c:97:2a:f0:32:e2:c3:aa:03:fe:7c:15:66:fd:60:0d:
7c:a8:76:eb:d7:f2:55:4a:99:89:30:4b:5a:3b:14:ae:ce:e5:
df:0d:24:22:fa:f6:4e:72:60:19:2b:f3:ed:a1:c2:19:64:af:
18:98:e4:f1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
Truncated 3059 bytes from beginning
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
2,858,001 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:12 2025 GMT
Not After : Jun 7 10:25:12 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:90:99:ba:7d:19:af:80:4e:de:63:ac:ef:ce:f4:
60:23:17:70:87:ee:7e:6f:0c:33:9f:b3:0e:2f:a7:
98:4a:9a:6b:21:eb:9c:19:d7:a4:dd:46:ae:d4:fa:
27:d0:4e:1c:2c:ac:00:1e:33:d0:35:a6:8f:d2:f5:
c5:a2:9e:b0:29:ba:fc:64:a3:cb:16:f2:1b:12:84:
0c:e0:10:8d:f0:58:eb:a8:37:12:87:37:53:91:07:
3a:ec:37:7f:0f:d0:27:b5:e7:0d:4c:4e:58:da:bd:
32:0d:6a:f3:ff:c2:3e:b0:d3:49:e5:c7:eb:49:4c:
00:49:41:f0:d0:f7:a0:7b:07:24:f0:3d:c3:5f:b0:
5c:96:63:15:2d:e7:a1:2c:82:55:00:46:2c:4b:38:
b2:f3:89:a8:e4:a0:db:9d:49:53:19:13:1f:a9:fd:
90:b6:95:30:1c:50:a3:57:55:df:cc:81:76:1b:1e:
82:bd:60:c7:bf:c6:88:c9:88:c0:e6:79:91:4d:8b:
ef:47:cc:5a:17:b1:9e:14:2f:95:9b:4a:45:55:09:
c9:19:c4:b8:78:ce:9a:62:3c:3e:f8:f9:8f:4f:de:
6d:bb:ef:45:50:13:df:7c:c3:52:ca:e3:05:9c:0c:
6b:2b:fa:64:32:ef:99:1e:62:19:05:91:47:6e:3e:
b7:81
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
67:f6:c9:da:83:df:53:67:c0:68:a5:06:0f:a1:01:84:f4:fb:
b2:44:5d:86:5f:49:73:10:de:ce:e6:48:f9:34:4c:d2:dc:3c:
8a:f7:c2:b5:34:1d:65:90:2b:24:f1:20:cf:57:f5:14:7b:fa:
5b:9d:6b:04:f4:bd:d3:a1:cd:26:bd:97:83:8d:9a:4c:78:c9:
30:c3:c1:a5:18:62:81:07:e0:f2:68:e7:12:3c:34:74:84:ea:
b7:7c:8b:6a:01:5f:08:f1:a3:2d:c0:a8:e2:fb:d8:3d:da:a5:
eb:df:8e:0c:e9:90:25:ac:d1:a8:93:40:fc:e2:77:03:67:6f:
d7:74:4a:6f:68:e5:ad:94:86:8a:0f:5b:bd:d9:4e:bb:83:bf:
e5:d4:a1:ff:6f:c1:9b:8d:d9:67:ed:2b:c8:05:26:28:ff:68:
cd:52:b7:30:47:91:b9:1d:33:53:41:2a:d9:a8:ba:1d:f2:67:
5b:9a:2d:f2:df:c9:bf:65:5e:03:10:57:d8:c7:89:a8:0b:5d:
ae:87:ae:32:10:60:3e:5b:72:6c:fb:e7:a8:75:db:92:f6:f6:
b2:a4:ef:9d:e3:89:76:cd:ed:35:d3:f8:eb:f2:d8:98:3c:d3:
70:2a:6a:70:fa:b3:a0:68:f0:2c:d5:69:1a:3e:49:2d:9b:bd:
d0:dd:7c:34
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:12 2025 GMT
Not After : May 9 10:25:12 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
56:33:d6:92:ff:ff:36:6c:b7:40:54:d4:56:41:f0:c4:f3:e5:
95:47:61:c9:a0:45:07:52:2e:e4:b0:2b:44:5a:48:4b:44:42:
ef:10:49:8a:8f:e6:e6:0c:1b:7f:41:9b:ac:bd:51:74:f8:16:
90:01:dd:24:27:f3:ec:e6:28:c5:f1:cc:9a:72:9a:e0:f9:20:
91:7e:dc:d1:c8:2e:3f:92:42:76:df:d0:26:1f:0e:b8:48:c4:
30:2a:04:d2:9a:24:75:48:2e:c0:99:1e:04:a8:c5:ed:e3:e7:
09:94:45:24:3d:26:80:a7:60:bd:93:37:24:08:44:23:ad:73:
7d:81:54:7a:68:35:84:d8:3d:48:f8:d5:e3:96:ca:8b:b3:84:
e3:9f:56:17:be:8e:7f:4f:0d:aa:02:38:93:9c:2b:ed:a6:e0:
fa:1c:18:b7:d0:09:b3:09:f7:61:a9:2a:e7:69:5c:e4:d2:eb:
cf:d8:ef:0a:9d:c7:23:82:36:8b:48:53:9e:b4:5f:c0:84:d4:
eb:76:56:7b:4f:37:98:72:f7:b1:f1:f4:53:49:54:09:24:a6:
84:09:c0:d6:95:4c:98:c7:d4:8e:82:af:17:59:ce:13:6b:2c:
6b:88:0a:2b:76:44:d1:c0:9e:d2:d1:32:08:f8:34:cd:db:36:
16:87:95:b1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,106,342 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:07 2025 GMT
Not After : Jun 7 10:25:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c3:17:ee:d5:d6:23:8f:7b:c3:14:60:5e:0a:3a:
d0:fc:03:6d:5d:02:1b:69:e1:90:28:f7:91:1b:ae:
5b:a9:d0:5d:f8:30:a0:6e:46:ed:18:1c:da:35:33:
fb:de:61:83:66:71:1c:f8:56:2c:8c:03:aa:8c:ef:
27:10:06:19:ef:48:d0:78:a6:d8:f7:c1:7b:4c:ef:
64:a1:58:d9:97:bb:f2:5b:a8:46:8a:29:19:a4:6a:
af:18:9a:9b:94:db:66:92:ca:2e:2a:74:c0:a9:62:
39:a2:26:1a:e6:ea:92:e8:fb:f3:b5:cf:e0:36:af:
7d:1f:52:e2:08:58:08:66:fa:15:af:b2:9c:0b:29:
c1:6d:bc:2d:a3:3b:f0:e0:17:d2:fb:1a:2e:1e:67:
c1:1f:3c:75:6d:9b:d9:c5:04:07:c4:90:f9:29:23:
fb:4c:97:a7:99:4e:57:dd:75:81:8d:97:36:c0:db:
7f:c1:6a:89:2c:fd:c9:23:29:9e:eb:40:43:75:8e:
02:cb:a8:40:e9:92:2b:e4:bd:d1:8a:c2:39:47:2a:
de:71:75:6f:25:62:a2:ff:42:2b:f6:06:fb:4a:e5:
df:a6:29:df:dc:ff:b2:3b:dc:92:8f:fd:aa:ca:db:
5e:bb:3a:c4:da:bb:05:1e:d6:18:81:1c:86:d8:d9:
8c:df
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7e:d3:fd:47:1f:82:83:36:c0:d5:be:58:08:bc:26:43:0b:24:
26:bc:de:d6:94:a5:d8:7d:c9:8d:6f:e0:48:93:87:02:a0:91:
41:1e:3a:e1:05:a5:1a:12:2b:64:60:fb:97:2a:eb:ad:8c:9b:
74:50:fe:43:bb:fb:1d:d0:c0:2c:cd:8f:33:a8:5f:ed:9a:c3:
ed:39:6e:f2:15:75:c6:8c:2f:eb:05:95:90:85:aa:d0:1b:a6:
b4:b7:a3:09:c9:e7:dc:99:0b:af:bf:02:36:68:c9:d5:04:9d:
a9:57:46:16:9e:aa:e6:f7:f4:fc:de:be:3c:c8:09:97:97:f7:
23:85:c3:7c:38:cf:1b:d7:05:b2:6d:36:d9:c8:5e:dd:35:41:
ca:4f:7c:47:8f:49:98:cc:fd:5f:06:97:ed:94:b7:c2:e6:2f:
9c:de:37:33:b4:91:96:29:9e:36:c0:3c:b4:82:a8:40:44:76:
08:74:d4:59:02:f5:c6:22:ae:fd:96:4b:82:f4:c7:5b:c7:4e:
d7:e4:db:bc:37:bb:dd:9e:60:91:cb:68:03:6d:7c:a6:5f:b3:
d2:f7:51:57:e7:36:76:70:7b:6d:30:82:76:8e:66:79:37:7b:
f3:e7:5b:2e:36:5e:6c:1a:46:c4:28:20:c7:a8:78:b0:cc:00:
cc:65:c1:79
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:07 2025 GMT
Not After : May 9 10:25:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6c:b6:b3:3b:eb:16:69:f2:23:04:54:8d:3b:f4:ff:c7:38:ca:
11:e6:ac:aa:58:9a:29:ee:2d:c5:9e:96:7a:04:bd:86:9a:27:
40:70:60:dc:8b:56:43:24:d6:68:73:c1:fd:4b:15:e4:05:97:
c5:32:4e:26:0e:b5:56:c5:a1:1c:d7:e1:c3:c0:5c:65:e4:d2:
70:5f:4d:71:96:23:76:58:7b:fc:e7:b8:84:fa:d6:d4:d1:c8:
28:71:a7:bd:1e:ec:d0:b2:31:60:04:65:a6:a1:ef:1c:3d:5d:
e2:69:67:e6:3e:67:b9:5a:7e:be:ee:52:02:63:41:0f:6b:07:
51:4c:cc:2d:a0:ff:89:5c:51:aa:06:71:6b:d6:d2:30:27:a7:
d8:35:00:43:4a:08:39:be:98:ca:2b:35:4f:a8:51:19:1e:6a:
c6:8e:38:99:27:d2:46:3d:11:ba:f6:ce:6c:1e:ee:d7:f8:9e:
c3:1f:c5:49:c2:de:18:4b:8d:c3:d3:ca:f5:75:30:4a:4e:93:
16:41:64:14:59:ee:3b:30:8e:92:eb:58:77:81:46:79:b7:19:
32:dc:ad:cb:b7:a8:fd:f8:7e:5d:5b:df:63:a9:c7:63:07:6e:
f3:17:44:6c:29:0d:cc:88:0e:e8:7e:43:da:12:18:31:6a:7d:
f8:6e:5f:82
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
Truncated 3059 bytes from beginning
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
2,857,084 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:06 2025 GMT
Not After : Jun 7 10:25:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bb:b6:89:2a:48:c7:a0:f6:d4:71:86:b9:ff:9e:
90:31:bd:85:15:4c:d8:d8:33:6f:6e:43:ec:a6:ce:
c9:7d:5e:bc:1b:39:63:f1:0b:26:a1:9c:78:db:ae:
b2:be:16:93:71:0e:7e:ac:d8:e0:2d:32:dd:e1:44:
4c:40:a9:45:0c:67:b7:46:97:22:b6:a8:ea:e7:76:
d1:d6:11:20:34:05:20:d4:73:9f:9c:16:bc:7d:7f:
35:0d:84:95:90:1b:6e:3b:7c:04:71:3c:c3:72:43:
e4:8e:e2:46:e8:b1:bb:78:90:cf:f1:21:84:e4:d4:
ae:57:fc:c4:d0:33:82:69:85:af:d8:ed:05:38:e5:
90:75:cc:f0:9b:ed:46:43:e1:12:0c:7d:c5:32:0c:
e1:1f:0a:0d:0f:54:72:7c:e3:b2:8a:a3:1e:f9:ef:
78:af:89:51:43:d1:5e:0d:c6:b5:84:3e:80:6c:a9:
21:98:7c:31:e8:25:1a:9a:e2:57:90:33:66:40:a5:
c0:4e:a9:9a:ee:61:49:8b:54:5c:df:86:23:fb:aa:
0b:e6:80:ea:33:b9:1a:23:b3:4a:82:1e:bb:21:47:
07:b4:37:a6:41:07:15:1d:1b:23:3a:aa:4b:b8:00:
86:9f:27:db:c8:29:2f:b5:50:d6:75:8f:d0:69:c7:
20:3b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0e:8d:7f:bf:78:a9:0c:17:3f:d3:72:80:0d:5f:0e:33:f2:f2:
fc:3c:01:bf:7d:99:56:ef:94:1c:9d:d5:e2:7b:2e:e5:c5:98:
62:a1:de:93:8c:a7:58:ad:3e:9c:3f:89:c9:f5:ae:46:48:4e:
a0:42:b2:fd:cf:6c:eb:69:bb:0f:87:fe:fa:87:e6:ec:3d:cd:
1c:e6:17:14:80:42:04:53:9e:d1:2d:f6:f2:d7:f0:90:43:bf:
55:d6:18:64:6b:ec:41:23:da:0f:54:2d:23:bf:b9:cb:44:82:
a4:d0:03:5d:63:bb:c6:34:1e:a8:d5:3f:02:b8:a6:95:aa:2e:
a1:c9:47:6d:5b:44:b2:80:05:64:68:aa:cd:bf:34:70:db:60:
18:67:ff:10:ec:0b:b7:15:46:ea:6e:3f:fb:c4:68:7f:fe:6a:
9d:97:3d:ea:dc:6d:ac:cf:e5:a8:02:88:ef:3e:6c:b7:32:ce:
91:26:d3:ee:7d:c6:a3:94:f8:c2:fc:15:55:cc:5e:30:d4:cf:
29:c0:a5:59:03:d4:d1:05:44:cb:b2:84:5c:4f:10:0a:49:4a:
90:e0:f9:72:b7:5a:ae:ae:e6:46:e7:3d:0d:90:80:96:e5:04:
c3:87:f8:51:fe:70:e0:80:2c:a7:a9:34:50:d9:06:36:53:0f:
9a:71:0d:b3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:06 2025 GMT
Not After : May 9 10:25:06 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ad:f1:4b:59:cf:a1:36:39:01:3e:f7:77:67:a8:5b:4b:01:75:
18:54:16:df:4f:2c:41:76:a3:22:c2:54:fd:5c:1b:d0:b9:fe:
89:9d:47:f8:56:89:f3:97:70:3e:ce:4e:68:d1:f0:7c:e9:a6:
0e:57:62:a6:c1:1a:8c:2a:1e:80:07:4a:31:b0:f3:a8:b1:b9:
bc:d4:c4:a4:26:3d:b4:d2:c4:e8:36:45:11:d8:85:c5:d8:b2:
dd:d8:d6:7b:20:05:f6:ce:69:82:1c:b1:e6:5c:61:ee:e7:18:
63:f0:a6:dc:da:c3:e0:b1:8e:d3:41:69:33:37:c0:68:97:72:
b5:1b:43:1c:87:ef:7b:ec:69:14:e2:5e:0e:2b:fc:a1:8f:40:
ac:1e:88:61:47:a3:0b:63:09:cf:4b:25:b4:ea:5b:03:c9:c3:
3a:ed:27:05:09:17:80:a7:fd:6a:9b:7d:77:0e:16:6c:6c:fc:
21:9d:4b:dd:bc:99:8d:40:7d:f1:08:5c:c3:36:76:22:26:91:
25:f4:17:d8:15:5b:c5:7e:4d:ae:2c:a5:e6:1b:63:f6:54:4c:
63:8b:88:05:2a:a7:55:b1:e9:cf:67:8a:35:a1:da:f2:29:a6:
4d:f4:1b:fc:50:1f:e9:44:de:52:e4:60:ba:44:b2:67:08:d6:
e0:11:28:d6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
Truncated 7935 bytes from beginning
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
3,109,609 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:07 2025 GMT
Not After : Jun 7 10:25:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e4:88:45:af:fa:0e:a4:44:24:b2:c2:f9:bb:3b:
85:68:fb:44:6a:1d:49:d4:c6:78:e3:d7:e5:32:25:
86:cc:23:61:1f:53:77:24:4d:3d:e5:02:5f:7a:66:
b6:ad:74:23:02:76:9f:7f:16:17:eb:b8:3e:8c:3f:
88:c1:bc:20:a1:a7:ef:06:93:dd:f6:00:ab:2d:b1:
4d:14:b5:f4:cd:db:da:08:de:bc:68:a8:39:71:c4:
8f:1f:4c:8f:24:6e:df:54:5b:7c:0c:08:81:53:2b:
29:d4:0b:cc:46:06:b0:31:5d:d9:d6:de:e3:af:8c:
99:82:e9:91:24:c8:73:97:c6:eb:8c:07:de:d1:cc:
fa:8b:07:e2:73:9e:74:73:b4:03:46:e7:57:ef:c7:
da:29:c3:a1:dc:42:92:c0:1e:f6:59:b7:65:af:b7:
4b:b5:60:3c:56:15:26:92:aa:11:e1:74:51:1a:47:
3e:5b:93:c1:27:a4:f3:a6:8f:64:cc:d7:4a:0e:95:
bf:c3:a2:6f:4a:4d:25:08:34:37:f0:73:2a:8c:1b:
cd:c0:b9:33:6c:45:e1:9a:d8:64:29:d8:e4:c9:d3:
12:94:86:da:0e:85:65:d0:a5:f7:7e:3c:b3:1c:b6:
bf:5d:fd:ce:ea:63:34:58:61:d7:5b:b7:51:59:da:
0e:63
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6a:c1:ac:16:c2:6a:43:1e:f5:e2:48:80:b0:83:e4:98:dd:d4:
69:85:82:55:d2:8e:9d:07:cc:ba:99:f6:e5:b3:52:ea:69:bd:
3b:fd:cc:ec:a1:f7:29:48:80:2c:11:31:8f:b4:21:cf:0f:95:
65:8c:4b:c0:6e:6f:12:bf:7a:26:8f:25:db:11:ec:c2:3d:1b:
d2:f1:17:7a:a9:c2:c1:d2:07:69:4d:ca:ab:fb:72:fe:00:83:
a6:96:66:05:e2:d5:5f:fd:fa:3c:33:0c:af:85:e5:f6:8e:e7:
e7:2a:38:96:9d:54:71:6b:ef:dd:62:cc:52:43:49:1d:be:15:
3f:f4:21:42:09:04:3b:68:68:14:2a:4c:b0:25:d3:23:ee:70:
d5:d2:b8:f9:17:8d:e8:55:88:c1:01:ec:24:92:09:de:c6:09:
a3:8a:fa:b5:48:91:39:e2:70:94:97:5e:28:23:98:79:e5:d4:
e6:9b:da:89:75:5e:ff:ce:f6:b4:5c:c1:d1:59:33:9a:35:16:
9f:ac:23:8c:0a:4c:73:72:59:6e:20:25:f7:ad:0a:83:20:4f:
eb:a1:25:30:e5:6d:27:a4:01:53:1b:d0:78:ce:c4:30:8d:60:
64:a6:f5:59:cd:66:1a:05:c9:f4:7e:6c:fd:c5:95:db:c0:8f:
22:40:c2:82
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:07 2025 GMT
Not After : May 9 10:25:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c7:98:01:47:db:3d:bd:51:7e:3c:f6:0b:5c:36:00:ed:b3:f6:
ae:57:21:10:c4:e2:d2:44:cc:44:9f:56:02:cd:50:84:d8:89:
f5:4e:a9:7b:13:fd:ea:76:5b:f6:d1:62:9e:10:f4:ec:b7:38:
0b:6c:4c:c6:b3:17:0f:2a:6c:a7:15:23:c4:2a:f1:31:1f:25:
7f:ab:ab:c4:6a:ee:42:1f:6b:3e:6f:12:40:04:2d:cc:af:7b:
94:b5:34:6a:73:31:36:ba:bd:3f:ae:65:9b:cf:a3:44:ca:cd:
e8:f8:48:a3:9d:13:55:0f:ac:bb:46:ec:3b:de:26:cc:89:a8:
48:cd:7f:a5:62:80:d9:6e:3d:6d:c4:bf:6d:d3:35:00:fe:6b:
bf:d2:f0:51:a4:a0:06:d5:2c:a4:fe:c6:c7:95:ac:2c:82:03:
04:fc:38:e7:22:77:c0:39:2f:17:17:77:8e:c6:ab:18:92:c1:
08:c1:b9:34:77:cb:5e:e5:07:f9:f0:0d:1b:76:0a:40:1f:e8:
c3:fe:ee:cd:7e:4c:e4:88:90:10:3f:f3:52:28:92:de:14:58:
69:ff:99:b4:c0:b2:10:b3:40:c2:38:d1:dc:e0:bc:79:3e:6a:
d5:27:01:3c:7c:cb:83:a3:e8:e8:8e:4c:36:25:a2:20:05:76:
25:2b:97:76
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
Truncated 3059 bytes from beginning
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
2,857,359 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:20 2025 GMT
Not After : Jun 7 10:25:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d7:ae:cd:c8:1f:5a:c7:7a:b1:02:d1:88:d6:17:
35:58:18:31:52:11:68:fa:27:8f:8a:16:47:fe:62:
0c:84:76:2f:76:ca:f2:72:31:5e:77:99:95:4b:95:
18:71:82:5b:fc:8f:d8:99:6d:21:9e:d8:c6:ab:86:
8a:4f:eb:a2:4f:9d:87:42:83:2b:8c:95:ee:33:f6:
5f:5f:35:fa:97:66:e7:6f:87:15:b5:44:9b:26:35:
87:69:f2:a3:1d:04:7f:65:6d:14:e2:51:50:8f:10:
d8:3b:5a:ea:78:7d:8b:b2:e9:da:02:15:1a:38:9d:
3f:d3:49:d6:af:ce:5e:14:db:b0:22:31:d6:37:aa:
de:b7:d3:9b:22:b9:0b:e3:70:b5:5b:ef:6d:7b:e5:
dd:4f:c5:b4:0b:81:d6:5c:6a:c8:72:21:51:b0:5a:
41:15:21:74:af:d2:ea:27:7b:51:54:b7:bf:59:43:
7b:a4:21:87:32:f9:55:ba:95:c9:95:a9:99:f9:a5:
c4:45:2a:c1:82:5e:25:8f:f4:f8:7b:fe:a6:61:a2:
05:12:fa:49:48:aa:43:52:43:ff:58:41:8c:d3:ec:
42:6e:1f:30:a5:93:87:d0:c1:61:a3:39:4e:90:80:
01:88:92:61:28:a0:25:d0:04:9b:a1:72:f9:8d:65:
bf:5d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
15:d5:36:27:06:3e:98:92:7b:f1:62:09:9f:81:86:05:5b:1d:
ea:48:dd:f0:55:13:33:6d:e5:0f:45:89:4a:c5:1b:e9:af:91:
6c:e1:28:4f:4a:34:b2:19:0a:fb:4c:38:dc:70:9a:db:81:54:
d6:62:b5:a4:40:e9:0d:14:af:f7:60:c7:28:b9:20:42:1e:ce:
5d:8b:fe:de:c3:b4:3a:c6:be:be:9e:32:99:d3:2b:7e:62:b9:
41:7d:b1:7c:1d:b2:9b:71:ab:0b:15:50:63:19:3c:b6:4e:18:
46:53:03:38:a9:d2:db:84:3b:f8:90:2d:e4:27:32:fa:90:40:
b1:10:81:a1:e1:ef:5d:83:f9:e8:29:a2:09:62:4f:6e:d2:98:
c2:67:6e:9b:ce:cc:6c:49:3d:8b:e6:61:ef:5d:3a:49:b8:cb:
e3:a4:11:93:bf:68:b4:fe:7f:8b:52:38:f0:6d:d8:b5:69:43:
b8:e7:52:18:29:20:16:60:69:cc:a5:2b:b0:13:bd:89:e8:c8:
f4:c7:71:a9:b6:74:2a:9d:06:26:e5:ab:72:47:23:86:58:65:
08:e0:fc:16:b0:53:3a:09:a2:b9:6f:cc:6c:ec:1f:3d:d4:18:
7b:0c:3f:3b:5f:83:ba:00:7d:5e:93:b8:64:ed:b5:72:0b:c7:
30:c2:71:4f
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:20 2025 GMT
Not After : May 9 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
76:4f:3d:0c:8f:cf:b2:3e:e6:be:21:83:19:7f:ac:72:91:20:
33:18:bc:8a:24:9d:8a:23:87:51:32:dd:0b:1d:24:5e:d6:0f:
8a:cd:c4:14:b4:78:b4:4f:3a:a5:40:7d:28:43:33:a4:7c:84:
ab:22:04:94:cc:b7:1a:85:b4:98:fa:65:6d:54:a2:18:4f:31:
c5:f2:b2:2d:91:e1:da:7b:09:32:e5:f0:ce:ca:03:0b:7b:35:
bd:92:a4:e7:bf:38:37:f8:61:bf:84:c9:b7:b9:a0:e8:53:fe:
2c:63:99:18:64:a9:8f:22:76:07:50:ea:4d:1f:9f:0f:9e:0f:
a1:18:bb:c3:30:d8:0e:bf:1e:65:58:15:91:c3:73:2e:68:aa:
15:d3:be:f8:50:80:55:63:c5:0c:a2:d8:74:19:fa:eb:68:af:
93:23:38:0f:9a:81:18:17:70:9c:4e:73:3d:7c:9c:3f:71:a3:
34:e9:8b:1d:fc:f3:0b:09:4c:71:5b:c7:78:ec:af:64:70:7d:
dd:ca:da:3c:a1:57:bc:a3:67:c9:50:94:9c:7e:cc:81:e8:26:
92:99:8f:d2:9e:dd:35:f5:8d:a5:89:7d:b7:8e:9e:cd:55:5f:
d8:c3:a9:0c:50:78:a6:a3:5b:f8:49:ab:3c:f2:3c:ff:2e:c8:
d9:a5:33:1a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
27,019,821 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 11:15:40 2025 GMT
Not After : Jun 7 11:15:40 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d0:53:77:cf:91:9b:88:00:4e:40:e1:13:19:2b:
1d:f3:f3:67:d3:d5:00:b0:e8:c1:16:0d:92:e6:45:
d4:bb:79:c7:4e:1f:d7:df:49:55:0c:2d:49:5b:3b:
cf:36:4b:20:86:02:9d:62:22:df:83:5a:54:09:5b:
98:ee:2e:e0:58:93:17:57:5c:97:69:e0:8e:f6:29:
38:c5:a9:1b:12:41:c6:3f:7f:a6:73:76:95:e3:42:
17:e3:b0:35:77:1b:34:a1:e2:78:26:b2:4d:8e:ab:
5a:6c:37:e9:a9:08:8b:32:75:93:d5:5e:d9:67:ea:
67:8d:fd:2e:3d:90:bb:73:e8:e0:ed:4a:45:ba:52:
4a:e2:72:26:10:4d:26:ec:b6:38:1b:74:06:f0:54:
27:a0:01:74:3c:9a:60:56:5d:7e:b3:ea:a8:6d:4b:
31:35:de:49:ea:63:3e:5a:ee:93:56:8e:ed:98:59:
2e:66:8b:cc:e6:27:cf:14:13:99:f0:c1:36:85:8b:
e5:81:e8:ca:14:e4:ef:e8:1f:ef:2b:70:56:d5:de:
a5:15:56:5c:64:b5:e4:bc:4f:ad:1e:7c:54:a2:c8:
76:e0:4e:9b:04:14:cb:a8:97:c0:08:ec:2a:e1:16:
19:21:eb:13:0d:d6:52:f4:c1:7f:81:06:8f:5e:fa:
31:13
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
59:eb:d5:b1:4c:f6:9f:31:8c:73:84:16:d4:c9:88:ce:4f:5f:
14:3c:00:00:fa:90:c4:53:e2:7b:a8:57:ca:91:79:28:f4:8d:
57:05:aa:2e:d4:06:ad:b1:17:37:19:2b:fd:1b:9a:6c:4f:93:
d9:01:0a:3f:13:b5:03:ba:bf:9d:42:ee:18:e5:4d:89:f5:b5:
a1:f1:2e:03:9d:34:c4:13:61:95:e9:de:d0:eb:6e:c4:c4:a1:
ff:d6:d5:b2:33:b2:4a:dc:33:5a:8d:df:8b:1b:28:c4:e9:f6:
83:f4:2a:29:d2:b1:9b:7b:ee:e2:be:fd:b5:1f:7b:99:ab:e0:
d7:37:d5:21:8e:93:a9:7e:59:b6:f4:c0:b3:48:a6:aa:71:a8:
fc:65:bc:ab:32:77:b9:60:23:b6:93:9c:94:01:d8:1a:c3:8b:
9f:e8:99:98:18:c7:43:51:55:89:cf:2a:48:5b:6b:50:b6:73:
ff:0b:8b:86:f0:a9:bc:fd:14:d0:4e:b1:0d:08:bb:ad:93:cf:
69:de:de:0f:64:30:fa:4d:d3:74:9c:1e:81:a9:58:73:9f:e3:
e9:88:78:8d:bf:4b:57:98:30:be:6f:f1:46:e4:a3:90:f0:50:
5a:4b:a2:b9:81:0d:6a:82:4a:37:90:ee:ff:c2:56:b8:e5:79:
bc:36:61:3c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 11:15:41 2025 GMT
Not After : May 9 11:15:41 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ad:9c:67:47:9c:5f:8f:50:07:53:ee:2c:37:b7:29:ff:dc:d1:
5a:f7:fb:fb:0a:6b:5f:76:61:33:18:73:e6:79:cf:e7:a2:dd:
e6:29:87:bd:78:79:a3:94:ac:73:c6:dc:50:9e:54:bb:38:29:
b2:1b:99:38:22:45:0d:e0:28:8c:d0:d4:9a:06:d5:b3:7d:49:
27:ea:3b:4a:17:5a:f3:8c:3f:97:45:5c:6a:ce:9b:9e:3e:0c:
47:fa:ac:80:ad:4c:d9:c6:04:d4:25:32:a2:96:bf:7e:cc:4a:
1c:03:c3:0c:2b:7a:f9:e5:62:7e:6a:16:b7:eb:55:a3:77:b6:
a0:51:ab:cc:7b:52:52:49:02:e1:ab:4f:87:93:2d:49:56:22:
fb:e6:a8:ce:28:67:0c:d4:c0:70:78:c3:6b:5b:b3:a9:d3:a8:
3f:34:62:68:13:03:0b:af:7d:9b:9a:eb:3d:16:27:9f:7f:33:
a9:15:59:ef:a3:c4:bd:f8:d0:13:82:96:d0:a4:7d:f0:8b:8f:
90:19:2f:43:ce:ae:30:cc:c9:4f:e0:97:63:28:3c:84:24:5b:
68:5c:f2:e8:43:da:9b:e4:f5:89:19:61:f9:f8:5a:4f:e8:72:
ac:e7:9f:a2:35:cd:6b:f8:c7:5e:4e:ba:d3:cf:a0:22:81:11:
c5:2f:c1:3a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.64s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
26,550,155 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 11:15:05 2025 GMT
Not After : Jun 7 11:15:05 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e2:5c:58:cf:9a:9b:4d:2b:d7:3a:af:6b:d9:69:
3d:ea:b7:f1:fe:7b:11:f1:2f:f7:3e:63:50:56:9e:
35:6f:50:d7:a3:93:38:9e:39:b8:3b:2f:11:d0:63:
91:2c:03:89:55:84:50:02:36:df:58:1a:da:b4:0d:
38:ec:e4:53:aa:57:d4:e8:0e:55:00:8a:bf:d4:49:
56:4c:0a:e5:ab:c8:66:f7:14:bc:84:b4:3b:3d:72:
78:50:43:76:d2:06:92:ec:be:73:cd:57:72:ec:d4:
89:9c:2a:16:9a:b1:ff:3a:7a:33:9c:2e:e0:ad:67:
aa:a3:7b:f9:4c:2a:74:36:7f:36:d1:f9:97:d5:05:
db:88:c5:aa:48:39:b1:c6:60:c2:10:db:99:1b:d0:
c2:20:11:2a:1f:22:93:77:d8:d3:41:5f:e8:5a:a0:
69:c6:92:de:3d:d3:75:06:66:81:f3:a5:d8:ac:66:
9d:14:0f:be:b4:9e:b5:7f:6d:e9:32:87:ce:6f:77:
c7:c5:76:d4:51:51:34:a9:b9:a4:4c:55:a4:b5:23:
65:49:7f:10:da:45:f9:dc:d5:34:b8:a0:86:fc:65:
1e:39:a9:af:68:0d:fd:5f:1a:a3:9e:39:15:c5:13:
db:e9:a0:04:8f:55:7f:74:df:06:8c:6d:6e:26:75:
49:b7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
79:86:d1:51:d3:b9:47:3d:58:32:6b:b3:20:d7:1d:d3:1a:c1:
91:a8:3e:3a:0b:ca:93:a4:4b:f9:b3:da:14:96:a6:62:1a:17:
a6:39:8b:c4:b9:20:b4:e5:e3:ac:83:ec:58:79:b3:92:e5:0f:
5d:b6:ad:0d:f4:d9:7f:02:b7:60:af:5a:53:9b:ca:f7:13:fe:
6b:19:6e:31:be:9b:6a:c1:23:8b:26:3e:07:63:f6:ea:86:d5:
4f:e8:d9:3e:91:f9:b5:47:33:eb:5a:22:44:7a:bc:7a:a5:7d:
c8:09:4c:74:fd:2e:87:7e:9a:a8:33:e8:01:af:b6:99:45:d3:
d9:c9:76:72:83:53:69:93:2f:b4:53:a9:c5:c8:87:34:fd:4f:
6a:3a:4f:04:8c:10:3b:c5:05:6b:47:b2:9f:fb:5c:48:50:12:
01:f6:03:63:29:4d:cf:23:4e:29:5f:90:20:fe:08:9d:36:5b:
03:b4:5a:fb:9f:a0:58:f3:27:6b:27:0b:d3:71:4d:bc:13:2a:
c3:fb:cd:49:e1:0e:5b:1c:a9:13:0d:55:b6:2d:5b:6e:95:fb:
9c:16:74:9c:70:cf:a8:00:fd:c9:e1:bc:b2:e1:af:aa:05:4e:
13:8e:1a:d3:54:69:97:70:57:a4:50:27:f5:e6:f5:36:08:82:
14:e1:9b:7f
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 11:15:05 2025 GMT
Not After : May 9 11:15:05 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
63:24:95:1f:27:f2:c0:21:16:22:86:64:70:e6:24:66:eb:c7:
7c:6a:f0:6d:5f:40:0f:dc:57:65:39:cb:2c:8a:fa:ba:59:68:
e3:26:8d:22:a4:71:37:b8:25:75:74:ce:bc:ad:a9:b8:e6:59:
52:db:63:be:e3:4f:de:b2:cb:2d:3d:7f:72:32:c1:39:52:eb:
b1:f9:35:77:aa:ca:9a:1a:49:6f:97:ca:f0:d9:96:b3:97:9d:
46:e6:dc:b3:ae:71:a5:4e:2e:fa:74:97:c9:09:dc:d7:8f:ef:
dd:9c:fb:17:38:4a:67:d8:4f:b7:74:31:e8:e7:15:4b:3f:fb:
db:c8:08:0e:90:22:4c:65:8c:87:71:b7:c3:6f:bd:9a:41:34:
fb:f5:f7:96:7b:2a:f5:72:27:4a:00:34:2c:1b:c5:9c:80:7a:
e8:15:37:b2:1c:fa:13:92:b9:d4:f2:cb:3a:92:38:0c:ee:70:
86:e2:2b:15:e3:48:b4:87:47:5e:54:36:69:88:27:ec:de:3a:
a8:8e:58:95:de:ed:83:fe:ba:e9:46:26:74:b5:6a:46:c3:27:
82:39:7a:27:7f:21:93:30:51:3d:a1:5f:9f:5b:88:9b:48:c1:
70:9e:c1:7f:7b:ae:e6:22:d7:7a:f7:91:7d:e6:f6:db:40:0d:
39:44:9f:0e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.81s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
27,111,287 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:10:19 2025 GMT
Not After : Jun 7 13:10:19 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d4:46:cd:43:7a:47:2f:c6:a7:dd:3b:e6:f8:82:
87:c7:90:24:88:05:be:aa:b6:84:3d:9f:ff:5a:1c:
31:bf:55:96:de:39:55:80:bb:25:b7:53:06:99:ed:
cb:d8:7e:f7:6e:00:94:c2:c1:ec:56:b4:c0:59:35:
1e:ad:96:1b:e7:2f:a4:0c:25:59:5c:83:68:b3:c5:
14:ac:9d:fd:02:88:15:f6:e9:26:58:d1:e9:98:1a:
c7:fc:13:c7:74:66:c4:2b:ba:ee:26:e0:0a:5d:7f:
0a:7b:e3:bb:ed:d5:f7:9f:b7:10:e6:3f:56:6d:84:
7b:dd:30:88:7f:da:8f:1f:dc:9f:88:00:02:75:c3:
57:3c:7b:fd:a7:7f:a4:08:11:4c:55:7d:63:6b:0b:
bb:c8:34:e3:4f:5a:bc:0c:43:c0:59:3d:db:53:bf:
47:5f:5d:37:70:74:eb:fa:00:fd:1c:29:4a:ac:ac:
f9:de:b1:99:9f:25:63:a5:29:28:4d:70:1c:98:52:
23:84:99:ca:ed:6b:05:b1:10:aa:8c:7e:1f:d3:dc:
04:c1:39:83:08:40:6d:9a:50:33:af:de:31:2a:20:
c0:1b:f1:f1:8a:0e:35:ac:f3:22:a7:95:82:85:c3:
ae:ed:40:f6:67:b7:33:33:45:dd:04:c3:f6:fd:88:
15:b7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
83:3f:1a:9c:6f:44:66:10:91:a4:af:d9:9f:a4:84:44:fb:b7:
4b:a0:c5:a5:3d:c3:0f:89:45:9f:a4:7d:73:d9:a7:fc:c0:cb:
5d:98:23:2a:06:88:95:f6:a4:36:8c:fd:12:a1:d1:8b:8c:44:
ea:aa:d5:d6:49:39:cc:16:c5:5b:2b:f9:ff:d3:a7:c9:52:9c:
57:c1:16:43:a4:e3:00:df:97:fb:df:86:81:69:d5:6f:9d:fe:
d8:44:1b:bb:d2:05:29:b5:2a:e6:66:9b:19:20:4e:d4:6f:a2:
ce:f9:0d:cd:42:8c:98:61:8c:0c:fe:05:58:c0:73:9d:6d:fb:
c7:d3:30:e3:35:60:09:60:5f:fa:d7:7f:e5:af:b2:32:06:c9:
1b:83:50:0a:ea:af:56:83:a0:6d:bb:0d:55:6b:cc:4c:1b:c0:
85:06:df:d4:02:69:34:ae:a7:46:a5:b1:28:e8:03:80:0b:61:
e9:02:8c:ec:b1:af:a1:2c:4f:0b:be:0d:f5:9f:18:e3:d3:b1:
22:e6:5f:bf:ef:41:44:b0:89:ea:f9:fa:e7:81:99:9f:e6:ed:
5c:f8:55:78:07:fd:ac:9b:24:b2:63:49:51:b0:5e:fe:46:41:
a3:4c:d4:18:e3:31:79:00:7f:a0:84:85:fd:4b:b9:f5:05:27:
60:7d:0f:5b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:10:19 2025 GMT
Not After : May 9 13:10:19 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c4:6a:f1:f0:65:20:ab:d2:8f:2f:aa:c6:df:80:54:4f:45:63:
12:9f:ce:41:2f:ba:a9:b7:23:6f:b2:16:de:13:4e:07:dc:34:
b1:a7:13:c7:5d:ac:c8:60:79:e9:a9:29:06:c9:f9:0d:3f:37:
fd:14:5e:ae:e8:dd:3e:fe:66:44:2c:70:0a:22:db:02:b1:c6:
bb:d1:e3:04:d0:ce:f0:c4:5b:27:85:72:42:34:b8:e0:16:a9:
f6:b8:ef:cd:ff:10:a7:4d:df:d6:a6:bc:3d:2a:71:90:2b:0f:
50:99:5d:40:d8:65:62:8f:9a:1b:83:a6:62:b3:75:ae:65:07:
03:94:0c:0d:45:f6:e2:c0:2d:29:d4:7c:7e:48:7f:43:c8:b3:
72:18:71:16:d0:5e:e2:87:6e:01:53:87:9e:3c:e6:14:89:b2:
7a:18:0a:e0:39:d5:40:9c:34:94:a9:c2:58:25:35:5f:8e:26:
9a:2f:bf:0e:04:16:05:10:c2:45:0c:56:32:03:1c:c8:29:1a:
2e:b2:bd:6d:c6:eb:3f:ca:16:6f:2c:10:03:33:51:34:40:11:
25:29:00:e9:85:d9:58:0b:9c:4b:77:d8:e6:ec:05:ef:fb:e6:
d8:2b:39:38:06:74:a9:52:f7:b4:b2:df:2a:dc:c0:30:3e:d3:
7a:7e:53:90
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.13s
Truncated 3147 bytes from beginning
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mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:12:32 2025 GMT
Not After : Jun 7 12:12:32 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:af:9a:8f:d0:47:f3:f3:c9:0e:07:57:d8:82:c6:
28:52:6c:f0:eb:88:97:75:8d:b4:91:4c:e2:7d:06:
83:6b:47:2e:a0:65:00:ec:07:fa:0f:34:ac:78:45:
34:80:3f:fd:b1:e2:43:4f:b4:5d:be:87:87:61:0e:
84:82:b2:d0:61:f5:6f:f6:e9:22:0e:c5:df:e9:29:
a6:60:f0:a3:6e:24:0e:da:8a:94:e8:d6:b3:70:c1:
01:5c:62:ea:8d:47:ff:12:51:cd:cd:d3:dc:fc:06:
88:e8:75:9a:4e:4e:92:06:de:12:35:84:83:90:d0:
90:ac:5f:de:b6:c3:df:c5:e2:32:71:40:6e:05:18:
52:2d:53:d6:d8:2b:fb:69:a9:48:77:92:38:60:57:
4b:ee:d5:54:9f:88:c3:92:b8:54:9c:ba:32:ef:8b:
1c:4e:3d:b5:00:93:c7:be:44:b6:fa:c0:68:7d:c3:
5e:4b:82:b0:1f:a8:58:70:bb:b5:6b:6f:18:1e:94:
85:ea:a9:24:e3:7c:30:03:78:c5:79:ab:f6:3e:3b:
08:a8:b6:5e:e0:12:2d:6b:09:85:be:f2:b8:5a:10:
20:d2:79:29:76:2c:d7:d5:3a:03:3d:6a:ef:aa:81:
e9:02:4a:c4:9a:58:86:b2:b5:a8:3c:59:a0:dd:9c:
92:61
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
71:ab:1b:dd:4c:6e:3b:28:6f:88:25:dc:e0:4f:b8:e8:8f:48:
26:31:ec:98:7c:bf:8e:9e:65:ab:d9:b3:a1:8f:a8:72:b3:c9:
f8:0e:a9:01:fe:4f:c2:e8:c3:61:1b:95:ab:b6:90:60:18:96:
be:9b:6b:08:f5:a8:39:49:fb:bf:08:03:7f:a6:16:5c:b4:f5:
63:c2:96:fe:66:82:85:82:2c:a7:6e:c8:d1:f5:03:8f:f5:b6:
08:ec:ca:d8:9c:a8:44:bb:52:d8:45:12:86:15:d0:65:2d:fc:
97:78:fc:62:5e:e3:7c:90:f8:f0:50:08:34:35:af:45:74:c2:
39:48:fb:ec:31:b2:fc:f8:63:63:47:4d:43:36:a7:43:30:a2:
f9:48:fe:f2:84:7a:18:38:8b:7c:c8:bc:90:d8:50:8b:b1:9f:
3a:7a:47:38:93:6c:b3:fc:bf:8b:d6:9b:6f:71:b8:7c:70:da:
f3:a2:5f:c6:ca:f4:84:60:c2:93:a6:f8:14:9b:8d:35:f8:82:
37:da:be:8a:36:dd:56:6d:cb:f7:4b:de:bf:d3:a4:a4:3f:14:
91:24:44:bb:e2:76:22:a3:14:b5:62:1c:d9:0b:86:88:fc:a4:
f1:00:f5:59:8b:70:d4:b6:3b:09:f6:fd:43:9b:73:33:2a:30:
0c:f0:d3:6d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:12:32 2025 GMT
Not After : May 9 12:12:32 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
75:18:a3:0c:b1:db:e0:94:dc:2e:69:4f:0b:f5:87:28:01:fd:
3a:b6:9a:7c:8b:1d:22:10:fa:15:e8:0d:ff:a4:5a:2d:9e:74:
b2:f2:61:3d:d4:69:85:e6:a8:96:d6:0e:76:28:b3:88:2a:1c:
9a:37:21:46:76:63:f9:ad:bd:ff:59:d7:fb:db:90:84:0f:25:
4d:fe:a0:f3:31:d5:db:fa:50:7a:84:44:4f:32:02:6b:dc:5d:
5b:07:c1:57:10:54:28:c9:2f:09:ff:bc:a4:09:46:d4:ae:10:
2c:b2:ba:52:74:9e:de:6a:5e:bb:16:ae:3d:61:67:aa:ae:72:
89:b8:d4:21:89:74:1d:b2:55:52:9e:7f:c0:8c:07:24:41:ba:
cb:b9:0e:58:0c:e8:94:df:9d:65:42:96:ef:23:26:2b:09:91:
02:4c:ce:67:cb:a2:4e:61:f9:cb:c6:46:05:1e:37:64:8f:92:
e2:a7:5f:83:5f:33:02:60:1b:10:19:f3:a8:48:5a:53:9f:cd:
ca:5e:98:12:21:2a:ad:6d:82:ca:31:77:56:2a:62:2f:a1:c2:
e2:5b:d3:54:3b:69:4a:9e:4c:3c:80:48:8c:8a:ea:f9:99:5a:
57:92:f1:3b:b2:c3:44:f5:cf:4c:97:69:fb:ab:6d:73:e2:b2:
98:45:b6:55
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.62s
Truncated 8023 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
20,736,351 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:50:59 2025 GMT
Not After : Jun 7 12:50:59 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:aa:8d:90:35:32:35:9a:a1:54:af:a2:74:bb:49:
87:20:67:1e:63:0f:dd:a1:00:23:d6:2b:55:c4:69:
d7:2e:c9:ca:a1:be:c4:68:67:73:4f:71:b1:01:64:
6d:96:13:ec:20:ec:ea:de:64:58:83:82:26:3b:55:
78:0d:87:4a:b9:ae:e3:1a:10:fc:28:47:62:d3:69:
f8:67:5b:ed:79:e9:67:d2:71:f9:a6:32:38:12:88:
a1:02:92:58:09:6b:9c:10:23:b7:c5:5c:57:f7:ca:
57:c4:76:f3:c1:ee:52:d9:0b:ef:23:e7:0a:6c:05:
b8:e4:72:35:1d:8c:f0:5c:23:26:cc:fa:14:dc:f9:
f7:de:a4:45:75:02:f0:eb:c1:95:4c:1f:09:63:f4:
ba:f7:42:86:f0:21:54:c2:a9:7a:46:94:b0:70:04:
b9:c9:b4:b8:e7:63:87:d5:c6:1d:68:be:72:9a:f4:
8d:af:4b:66:03:5b:6d:3f:c9:3b:b1:00:67:ee:a0:
eb:2a:a1:97:f8:9b:28:cb:da:41:74:5d:26:12:43:
8c:c0:ce:ba:31:9d:a0:76:20:7b:66:65:98:92:4e:
ff:2d:5d:cc:24:3c:ac:3b:80:8b:f3:4e:b5:39:7b:
66:ae:ca:09:93:4b:50:ca:1e:66:09:b8:7c:24:2a:
4a:a3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7a:5d:8a:be:5c:2b:ce:58:1d:ef:e3:a7:70:f1:f6:62:56:e0:
12:e5:63:a0:71:09:39:e4:4b:0b:d0:c3:f1:bf:fd:a5:6d:d2:
99:03:29:ee:23:54:6b:dd:76:4e:66:a6:8a:55:64:96:16:ec:
2c:28:2a:5d:04:08:6d:f7:5c:da:6f:d4:55:e6:d2:06:46:f1:
c3:35:06:98:bf:63:96:be:a3:0f:85:25:6a:34:00:dc:09:19:
2f:72:c2:53:b3:0b:a3:c8:31:b1:8d:d3:7a:34:52:fa:bd:a9:
02:d0:96:1a:cf:0f:41:cb:e7:30:e1:e2:f3:60:55:f1:15:21:
04:10:8c:c7:56:72:d7:9e:24:9e:9b:e8:d0:80:e9:db:66:3b:
17:a9:db:b2:17:88:3b:95:ce:c5:26:f8:2f:4e:af:fb:23:ed:
80:7f:ee:27:35:54:58:31:56:4d:a1:64:ef:c9:c6:1c:40:37:
14:9f:fc:be:9d:2e:48:12:03:49:85:90:5c:9e:5f:a9:18:f3:
ef:61:2d:4f:cf:8f:2b:d0:7a:3d:6e:fa:d8:7d:11:cd:87:53:
9f:69:35:40:c4:ed:d2:c3:c1:08:b9:6f:0d:45:2e:24:c9:09:
ee:0b:14:62:7d:c5:84:46:22:ea:a3:c0:e2:3f:72:d2:61:af:
35:70:a3:99
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:51:00 2025 GMT
Not After : May 9 12:51:00 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
07:13:01:bc:5f:ef:70:69:99:e8:76:1c:8a:20:6c:a9:7d:e2:
16:6a:02:44:c8:c1:59:6c:bf:f0:37:fc:58:b4:29:6b:88:10:
17:16:3a:6c:aa:2f:07:4d:17:63:47:15:ad:db:ee:25:95:9c:
f6:da:3f:c9:a6:ad:db:4e:1b:56:94:d7:52:b8:95:59:c7:62:
fa:02:b7:94:67:6b:de:0c:e3:92:19:a6:50:1c:0b:f4:ff:a7:
d3:68:c1:4d:ee:0a:47:bf:a6:34:68:76:48:7a:42:d7:a1:0d:
00:3f:e3:d1:57:e6:6e:9c:dd:db:cd:01:3e:e8:84:76:1f:2c:
de:cb:fd:1e:85:93:b2:c1:74:91:b5:a7:36:bd:8a:1c:bd:bd:
87:3e:61:08:f6:11:6c:a4:b8:c6:40:d7:00:56:93:93:09:4e:
98:66:6e:b9:1f:2f:77:72:1e:a7:99:68:fe:87:a7:bb:fe:6d:
2c:0a:dc:74:a7:73:6c:99:09:29:ce:54:ed:04:ee:b4:1c:ec:
ed:1c:2c:9f:73:02:5f:ed:68:c0:c1:85:0e:46:94:de:d7:da:
42:1c:0a:4c:f2:86:df:23:8d:dd:40:11:d7:8d:e8:62:69:3e:
f3:63:8d:8a:72:1d:e0:b9:82:8b:3f:58:aa:8c:07:93:7c:50:
6a:39:85:9d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.61s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,267,153 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 14:22:37 2025 GMT
Not After : Jun 7 14:22:37 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e1:6c:36:b5:44:f2:31:67:35:e7:87:d5:87:62:
8e:fc:0a:17:31:23:23:e6:b1:97:1a:b7:35:0f:90:
db:45:29:19:7b:5a:56:f1:c3:7b:1c:37:52:90:94:
7d:e0:0e:3f:5b:29:67:95:b9:a5:d3:73:2e:80:c5:
9e:67:c7:5a:53:6d:49:72:d4:fc:fa:77:35:cd:d5:
ea:35:44:29:54:85:8c:2b:a7:16:ac:bb:c1:18:d6:
71:fa:e1:ca:c5:40:0e:26:07:5d:e4:8b:13:c7:99:
3b:21:0e:7d:fb:cb:68:d2:2d:67:50:bd:21:5d:f8:
be:19:e4:eb:a5:03:6d:65:54:42:60:26:8d:0d:da:
17:0b:37:c1:f9:c3:83:62:7a:09:69:7a:92:8f:46:
1f:52:7e:a4:57:c8:9d:f3:d3:b9:33:c8:ee:63:20:
25:bc:d0:52:c3:f7:01:e9:07:18:a9:d3:45:7f:b4:
bc:f7:63:7e:0b:e2:a0:8e:f4:1a:2a:ee:a1:b4:3d:
39:56:53:af:87:6d:38:77:1e:2b:1d:18:d6:fa:46:
4d:fd:57:57:7d:3d:8f:fb:17:d0:f3:f4:57:43:82:
b8:1e:53:1a:b4:c1:87:96:b5:26:6e:db:f7:f0:3c:
6c:09:13:27:07:fa:1a:23:30:1c:66:f0:1f:db:d5:
e7:c5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
48:9c:cf:4f:b2:cb:1e:cd:fb:8b:7d:0c:1b:20:50:96:67:98:
f4:8f:97:e5:72:a0:06:34:4c:38:e2:c5:54:98:87:af:ca:4b:
9a:14:ce:f7:0c:f8:5e:fc:75:6b:8a:47:2a:4c:77:1b:91:29:
f6:e0:94:29:44:be:df:93:c0:04:5c:14:eb:d3:3c:1a:20:5f:
23:b5:fd:de:d4:4c:d8:1e:07:ec:f7:a1:7a:e6:36:65:ef:bd:
63:1d:f6:ef:58:26:0d:5a:8c:ea:66:62:1b:f1:97:7e:40:85:
ef:47:74:ff:1e:1e:48:8a:c4:cd:aa:87:75:31:a6:2b:af:2e:
e4:1a:b4:58:8b:b4:da:cd:3c:97:38:85:d6:83:3c:f2:80:6a:
52:74:e7:05:46:0d:4f:80:37:0a:af:c2:54:9e:7c:a9:89:82:
2e:eb:3f:b5:5f:a8:db:64:34:96:a7:4a:c8:84:bd:1f:21:d4:
7b:76:5b:67:76:c8:10:f2:bc:c8:d3:63:7a:19:21:0c:29:fe:
05:33:f8:fb:63:66:c3:b1:6d:a5:be:76:d6:94:b8:cf:2c:8f:
e7:2d:cc:9f:ed:16:7a:f3:16:a0:74:80:c8:8f:12:69:56:e8:
08:2d:dc:13:45:a4:51:79:49:6d:2c:54:c5:84:59:0c:9a:39:
32:0c:97:17
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 14:22:38 2025 GMT
Not After : May 9 14:22:38 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5a:f8:e0:76:41:bb:58:8d:7d:98:37:61:b2:e2:70:c8:0c:a6:
c9:eb:0f:b0:39:88:59:76:96:c9:60:b1:51:1e:37:f6:e7:fa:
5b:c9:e7:dd:fd:c0:60:31:c7:db:f3:66:43:36:49:f4:7c:1f:
be:24:8d:2a:6e:b7:33:5c:ad:c5:00:3f:b7:e9:ec:ee:35:9c:
6a:99:dd:27:4a:23:fc:d9:85:25:5c:e2:b4:df:35:04:43:ae:
2e:52:0f:f1:6a:03:ec:6a:7b:93:43:7e:f7:60:dc:b3:1b:9a:
b5:43:dd:19:54:bd:a0:57:79:ab:d1:7b:dc:90:16:84:fe:76:
6b:80:3a:4a:ab:c7:a0:ac:40:59:d6:da:f6:56:df:9e:79:bd:
8d:65:96:f7:11:b7:7b:ee:4d:12:9a:03:a3:7d:b1:20:32:a1:
15:d9:d8:de:5c:e4:f1:0a:44:20:46:a0:7b:b7:39:b1:60:8f:
20:ea:25:0d:2a:d3:ee:50:f2:3f:66:ec:ae:a1:00:47:8b:9d:
a8:fd:65:ef:19:aa:93:ad:a3:f2:b8:8e:76:5b:31:7b:2d:a6:
e4:63:52:e1:d7:64:c6:76:2a:13:7e:f7:f5:67:8f:28:59:72:
6f:3f:d9:63:d2:b2:cf:b1:98:0f:52:a6:e9:ba:2f:28:2b:e2:
1e:5a:cf:90
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.85s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,904,499 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 14:46:16 2025 GMT
Not After : Jun 7 14:46:16 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:be:a4:29:84:24:ab:ce:75:b2:3f:2d:f2:db:50:
7b:f6:87:18:27:51:0c:9d:6b:51:45:3f:a0:9c:eb:
84:1f:b7:6c:f2:44:1d:41:3f:b9:b3:eb:ed:d1:79:
5f:45:17:25:16:25:f1:ff:93:76:60:2e:d9:c6:09:
ec:cf:ff:33:f0:4b:2e:87:79:08:5f:dc:e0:0b:5a:
ba:9f:f3:75:1f:8a:45:8d:ef:31:e5:35:ed:79:41:
d5:ab:36:7e:e2:09:dd:c3:64:75:5b:76:ef:e4:42:
79:44:f4:f9:50:e6:8f:a7:39:82:12:b5:07:db:93:
01:3c:b9:ef:22:0c:74:0c:70:57:8a:35:ef:46:07:
b3:00:d4:24:d7:a2:a1:47:d2:54:09:eb:9c:2b:7a:
ab:cd:86:4c:12:4c:14:ac:0b:40:22:d0:1d:7b:7a:
ba:ac:01:9e:6e:ef:83:8e:3f:58:21:dc:6d:df:76:
d0:b7:b6:ea:e7:9a:27:ec:89:a3:c2:ec:82:84:5f:
5d:c2:de:ff:6d:aa:08:39:46:96:4d:df:d2:05:29:
c0:56:a9:fc:43:8d:a4:3e:b0:e5:88:ea:c2:f8:f2:
2a:f2:41:83:37:8b:2c:d0:ac:14:21:e7:9b:80:a0:
54:00:7b:8a:78:42:1f:98:da:c5:e6:64:65:2b:7c:
4d:49
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
31:8c:ae:75:3d:c1:bb:02:ca:cb:6d:9f:28:d0:c5:00:8d:80:
54:e8:50:be:7a:7b:34:26:89:65:ad:b3:61:ac:af:7d:0a:77:
e2:e3:7d:ac:95:f1:2d:a2:68:50:fb:b0:21:28:2e:6a:9f:ab:
3c:a0:4c:e8:0a:ca:1c:b9:12:5e:ce:a2:6a:9a:33:86:88:5a:
df:24:a7:b9:b9:b2:db:eb:85:f3:00:69:b5:7f:62:7f:f2:ab:
13:9d:d2:97:00:3a:c0:9b:c7:95:59:58:05:be:94:47:15:f0:
02:ae:bf:4d:bb:ea:46:6a:8b:7c:f9:b0:77:5c:fd:5e:88:de:
61:1f:5f:b3:19:6c:99:bf:4d:6e:98:28:59:bc:fc:b1:e2:34:
dc:70:4c:cc:88:52:c6:c6:b2:ec:1f:1b:77:e2:77:b8:36:61:
8a:6a:34:c9:93:ab:03:f0:1c:2e:15:f2:6e:53:fe:73:5c:9e:
71:ea:c1:d7:23:57:12:69:c7:c4:b5:37:c5:1e:48:5b:f6:43:
3d:8a:c4:ce:41:2e:7f:8e:97:74:35:a7:7b:7b:2e:5c:27:8a:
38:a9:76:28:e9:19:04:6c:09:69:da:af:85:84:34:06:9c:c2:
21:79:82:32:85:2f:43:1f:5b:43:a6:fc:a1:85:18:ff:fd:73:
37:85:63:7a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 14:46:17 2025 GMT
Not After : May 9 14:46:17 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
27:82:ab:e4:12:04:a0:30:f2:f9:77:f3:27:ec:5d:16:0c:5d:
92:5c:39:d9:7c:bb:55:1e:15:30:e6:b6:a1:f8:3c:7c:db:ce:
d8:52:f4:e7:ef:ca:2c:39:a7:7e:b7:3c:33:a0:d7:af:11:c1:
43:5f:68:5e:5d:e1:fb:23:77:a9:ee:ad:38:9d:b8:65:6a:38:
f6:d0:05:49:a1:39:7b:c1:9e:34:1f:38:b1:ee:62:81:c5:88:
05:96:39:87:48:e4:52:d3:4f:07:21:cf:39:bc:e5:97:41:68:
6b:1e:62:32:5a:cc:d4:8d:06:79:3f:62:a2:03:ec:d5:0a:f1:
0b:5c:41:c3:9b:48:5f:01:27:71:99:32:7b:34:04:09:a7:ae:
29:86:93:db:3a:d6:9a:d0:66:ac:55:a5:d8:ea:06:fa:31:cc:
2d:45:6e:09:d3:5c:72:d1:b0:08:9a:ca:d7:ef:73:bb:f6:54:
09:c6:48:93:3c:38:20:e0:67:f2:22:0e:b6:cf:f7:09:8f:d5:
2b:b8:46:e8:17:8c:e4:16:95:82:ec:a3:34:2f:1c:55:37:ae:
64:e5:d8:7d:f6:4c:96:79:6a:d5:10:f0:c8:6a:86:b8:0c:02:
99:cf:60:3d:5c:89:03:32:38:4e:04:29:9a:a8:f5:2d:e4:11:
47:4b:83:cd
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
Truncated 3147 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
20,414,073 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:36:27 2025 GMT
Not After : Jun 7 13:36:27 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a7:a2:7f:cd:e1:93:8e:b0:6d:26:7e:31:10:06:
38:42:9b:39:87:32:0a:d5:f4:54:c8:1d:1c:48:61:
36:87:5c:8e:13:f5:50:fa:30:4c:77:f7:f7:24:40:
e7:86:7b:5c:30:37:3c:1f:78:96:95:90:f3:3e:72:
c6:33:e2:e5:41:e0:e4:72:8d:1d:02:89:15:48:e4:
32:c0:fa:7f:6a:f5:00:5f:42:9a:9d:36:e2:36:2c:
83:6f:bd:12:39:84:99:ac:8a:b4:52:d4:26:e7:2a:
6c:ec:52:25:6c:22:f4:1c:e1:ef:8f:2c:85:ec:65:
78:0d:aa:48:61:61:1f:58:39:6a:7b:5e:85:2a:13:
80:b6:4f:59:17:8f:98:aa:d8:7b:01:9a:34:32:8f:
ba:23:40:9b:7c:12:0a:99:1b:6a:d8:00:6b:ab:6f:
ea:91:f4:6c:a6:05:2e:74:28:e1:c2:4d:47:b6:88:
52:35:94:94:6b:ce:e9:25:81:30:f1:65:39:8e:27:
49:7f:dc:18:12:e9:fc:a6:47:c7:3f:90:87:5d:8f:
e3:b1:55:e4:85:dd:5b:e3:4f:30:ea:e2:5b:af:2d:
61:c0:6e:a1:06:8b:e7:90:8d:1c:2b:b5:81:5a:6e:
bb:e1:5a:cc:ca:4a:81:42:ab:9b:e8:d9:a0:fe:0b:
19:75
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
89:d9:8e:77:08:9a:dc:e8:ea:56:0b:ad:9f:4c:a6:38:28:97:
6b:b3:79:1e:c4:75:69:b5:a1:c5:4a:d4:c0:d2:65:c3:53:08:
c0:51:cd:3c:10:ec:68:34:0e:7c:49:2f:da:84:52:cb:2c:7d:
d2:08:5c:b8:dc:e7:e8:9f:70:09:8e:5d:9d:97:e3:2b:e5:7d:
0c:fb:ca:b0:dd:7a:28:39:26:af:45:42:57:96:76:1c:31:29:
c8:8c:1e:44:de:77:01:53:a1:65:4d:ee:ac:9a:34:f2:1b:d5:
30:ed:e6:3b:51:3e:d7:aa:e9:a4:90:fb:7f:ca:0e:27:99:32:
4b:b8:2b:4f:1f:d2:eb:e9:2f:3c:3f:c4:d4:a6:ac:bd:f1:3f:
c8:12:b4:8f:f3:1f:17:14:51:76:8a:60:70:a8:ed:1e:de:7b:
25:43:37:c2:a3:42:19:be:ee:61:e8:d0:7d:77:77:3e:4e:72:
7e:89:b9:43:cb:a4:99:29:fb:86:23:5a:64:39:c5:55:31:97:
5b:5d:d1:49:3b:9a:b1:e5:b5:da:90:f2:57:7a:76:9d:8c:1b:
23:9f:52:0b:7f:49:cd:a7:af:c6:06:d5:aa:51:a9:31:7c:86:
89:d0:f2:32:66:61:57:33:b5:35:90:17:58:90:e2:e9:cc:69:
87:d1:e7:87
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:36:27 2025 GMT
Not After : May 9 13:36:27 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
44:2a:77:b4:83:87:18:94:7a:0b:2a:47:ee:38:92:63:5c:6a:
f3:e5:f6:79:a3:39:30:e9:66:e6:99:af:68:c3:c1:2c:ea:44:
77:fb:64:3c:6c:6f:a6:a5:c1:5d:16:65:54:1c:92:75:83:80:
03:d5:36:04:f0:9b:09:bd:0f:15:bf:eb:5b:70:0b:8c:00:d0:
8c:05:db:79:2f:43:5f:2a:43:42:dc:8f:fd:1a:ed:56:72:8d:
0a:95:6e:de:d6:18:c0:dd:c9:5a:df:7f:89:0b:ff:c5:e0:b4:
11:15:b2:1a:05:37:f1:83:bb:46:19:d9:b5:c9:af:37:7c:1d:
bd:fb:11:8b:af:a5:c0:30:fd:0b:3d:e8:a3:ad:57:a5:d2:96:
da:1e:a9:27:dd:94:fa:8c:67:84:e1:f6:54:c0:60:6f:3c:b6:
d8:e1:01:d2:68:04:96:ef:d3:95:7f:bb:43:2a:77:5c:ad:45:
9b:0b:af:af:ef:ac:80:06:94:78:e9:a4:f1:ae:4f:c6:cb:64:
06:78:71:e2:f1:9a:77:61:11:62:9a:2a:67:2d:c3:b0:d7:93:
3c:3d:a3:70:b1:0e:99:53:d2:b7:a5:f6:91:ad:f9:64:92:c2:
65:5d:36:86:29:d3:88:90:65:bb:e0:9d:71:f5:dc:00:5c:61:
64:57:e4:95
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,245,723 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:59:40 2025 GMT
Not After : Jun 7 13:59:40 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ec:62:b7:46:45:da:ee:bf:f3:2e:47:d6:31:ab:
ed:70:99:17:4e:5e:7d:95:53:3c:57:01:b2:5d:26:
75:50:99:79:56:af:f0:21:d5:9e:f1:f4:5c:a7:5c:
56:05:ef:89:98:5a:cb:8f:e5:e5:4b:63:db:9f:fc:
9b:8b:fa:46:42:d6:a3:75:e1:38:20:2d:43:d1:15:
20:a3:d6:2b:7c:ec:94:1f:b2:ad:96:63:0a:6a:24:
34:c1:fe:99:8e:47:28:0a:c8:86:05:e0:6e:7a:75:
c6:91:ba:15:3a:61:aa:5e:53:04:47:8c:bb:84:ea:
7c:f4:96:2b:0a:83:aa:a9:25:7c:57:42:f2:32:e3:
29:bc:e7:61:cc:bf:ce:29:64:f0:54:89:47:bf:69:
22:28:cd:6f:fc:5a:e1:d5:b2:fb:66:71:16:f7:b5:
5b:fa:76:cd:70:be:69:b8:22:bc:6a:f6:ce:d9:33:
e6:a1:66:ae:7e:fd:00:c7:9e:56:94:43:0d:db:4a:
54:ee:b9:fc:40:16:6a:27:59:94:d7:5e:9d:20:7d:
2f:bb:d5:d3:18:21:c4:2c:c4:94:73:6c:98:fe:f0:
08:56:9f:74:5b:10:0d:e2:0d:21:7e:67:08:46:85:
4f:a5:e5:e3:b5:85:79:c4:ee:6a:ce:02:5d:36:db:
69:6d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
55:de:2a:b9:de:da:10:1f:20:50:ce:de:64:67:60:89:be:ee:
86:2b:65:53:79:31:47:be:37:26:00:3e:11:8f:e3:da:d6:b9:
2f:6e:ec:34:a3:de:86:34:1e:bf:b9:6f:dd:2b:c4:41:f6:4c:
26:7a:f2:9a:7f:22:be:06:32:2f:2c:a3:a4:65:0a:a3:7d:5c:
d7:85:46:cd:83:64:0e:72:b9:cb:06:f0:cf:4c:cd:3e:66:d0:
81:6f:4d:eb:45:d4:45:bb:52:e1:11:a8:27:d3:4d:12:72:d1:
6d:a2:94:b4:98:f5:67:28:7a:e7:77:e0:d7:02:2b:f2:11:50:
8f:80:5a:82:da:78:05:b0:41:61:02:d1:ca:93:9b:8f:be:a2:
2f:f7:6c:9d:32:18:65:18:34:1e:96:47:25:af:d3:48:82:1c:
9a:39:2b:32:66:8d:3e:95:de:d2:e6:33:54:15:89:7d:37:5e:
2e:01:5c:27:9c:05:0b:a3:56:fb:da:0e:83:e2:b9:fe:11:4e:
37:63:e1:8d:18:be:77:81:57:b5:a4:49:4b:d3:c5:d8:69:ee:
79:c8:47:04:fc:50:55:53:10:41:b7:f4:b9:eb:ba:31:22:3b:
6d:16:26:5e:4b:e5:fc:05:63:2c:62:b2:6f:0a:a1:5a:de:5d:
f8:b5:ae:5d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 13:59:41 2025 GMT
Not After : May 9 13:59:41 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
96:0c:c7:4d:fd:01:d7:44:55:4b:b9:1b:8b:f2:40:39:e0:f8:
b5:e8:5e:6e:68:e3:7f:77:e7:a9:b8:6b:17:65:1b:cd:fb:02:
6d:71:3d:6b:60:1c:96:48:5c:27:c3:b4:3b:04:4f:49:c9:8e:
93:6c:aa:96:e5:07:aa:b5:fb:a2:50:5b:39:cd:69:d8:71:b5:
bf:6d:d3:9e:b3:4a:d5:b0:71:1f:af:0a:2d:03:d1:51:26:2d:
ea:9e:0a:52:99:8b:07:26:ee:75:00:26:ff:1f:ea:56:86:a6:
a8:c2:6b:27:79:2d:2d:7b:10:69:06:f4:fd:9c:18:40:47:44:
42:19:23:31:9c:71:39:fa:4f:e4:d1:a0:43:0a:af:16:78:5a:
06:e0:aa:21:56:e7:a6:98:45:02:25:7d:31:40:d1:7a:6b:87:
69:75:7b:fc:ab:02:5e:da:ec:43:b5:c2:21:e9:9c:01:35:44:
b5:3e:57:1d:48:25:8c:bf:29:a3:09:be:f9:52:4e:90:72:3c:
bd:a0:1c:04:68:da:7d:f3:7f:a7:70:46:96:07:10:76:5e:a7:
81:4e:c2:0a:0d:c4:85:5c:5d:b1:f1:d2:67:d1:18:87:d9:cd:
c3:87:be:5e:a7:0b:a2:b8:ae:3d:3b:19:54:df:03:65:bd:03:
d4:80:cd:3e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,415,970 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:04:10 2025 GMT
Not After : Jun 7 12:04:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c7:3e:a8:e7:11:6c:4c:75:58:99:a8:aa:4c:20:
e4:9a:00:bb:ef:89:14:0a:a1:61:5b:05:a9:8c:30:
a2:00:38:af:63:dc:1a:6c:f7:73:07:e4:fd:13:13:
f3:d3:45:17:7e:9c:8d:e5:42:25:fd:04:02:86:89:
28:32:82:9e:9d:b2:6e:b3:36:90:2b:3f:78:e0:4e:
b1:a9:ff:69:55:dc:ad:a0:6b:e6:64:d2:ef:77:e9:
26:28:f2:c5:76:2d:22:b6:89:c2:0b:02:97:61:4b:
73:a2:80:8a:d5:96:3c:d6:6d:a2:ac:0d:33:37:8d:
ae:be:14:10:aa:fd:34:36:af:d0:4b:1a:94:b0:f1:
96:8b:fc:55:c9:c8:f0:10:57:3d:29:3c:95:2b:84:
18:11:b8:73:47:95:67:d3:be:4c:1f:99:61:5e:b1:
4d:a6:63:5b:6b:0c:8e:8d:f1:41:26:da:88:c3:75:
3b:4e:f3:b9:b5:4b:a8:66:4a:79:f0:9c:65:ed:03:
0a:90:cc:0a:85:2a:29:fa:00:00:7b:05:18:60:9f:
fa:a4:7f:98:1c:c3:fa:7b:31:98:9f:f5:35:f9:e9:
97:b9:df:20:6c:5a:cb:5b:3b:b0:cf:00:93:40:d8:
49:e2:81:d7:13:7b:e6:04:53:e4:7e:23:86:d8:c9:
2c:27
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9d:8d:37:ff:72:e3:b6:53:fd:ba:3d:9f:60:13:83:ec:03:2d:
c6:5c:96:c6:80:6a:4d:a5:4a:7b:8f:67:c8:4a:5e:40:23:f8:
c4:3a:e9:87:31:b2:18:b5:cf:ab:e7:ab:db:89:c5:2b:b9:43:
46:37:d3:c2:b2:45:51:12:1c:f4:48:5e:64:76:c3:06:f7:38:
4c:48:be:09:8d:8f:12:87:9d:f3:d8:93:da:3b:f0:37:c5:fd:
2f:20:85:1a:1f:dc:4b:a4:08:6f:97:94:8f:d2:43:36:2e:97:
c8:ae:4d:6b:8a:ed:06:00:cf:4b:12:83:48:ef:bb:16:d6:60:
eb:d0:2e:b2:13:ed:87:b8:00:39:d9:65:0e:c1:99:c3:6a:ab:
85:9b:93:ff:4f:7b:c5:7f:90:29:60:d3:21:cb:6e:a1:e5:fd:
bc:4a:19:cf:32:1e:38:7b:55:38:4e:5c:c5:ce:98:9f:98:ea:
f4:30:43:69:d8:32:d4:f5:59:2b:1e:cc:12:50:2d:fc:e9:eb:
cc:33:77:02:eb:ab:7c:1e:3d:26:9a:be:a4:71:4c:35:1e:52:
62:76:a2:03:0d:2a:57:d8:d1:20:c7:71:f7:43:ed:b6:c4:f8:
d4:89:a1:cb:e8:a4:34:d1:33:d2:78:01:03:33:37:10:a2:44:
d5:62:1b:88
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 12:04:10 2025 GMT
Not After : May 9 12:04:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
53:9e:6f:16:a5:23:fe:28:d3:f6:bf:b0:51:df:50:6a:05:0f:
97:11:44:f2:9a:8a:06:1e:94:64:eb:b8:64:22:65:12:52:29:
00:e3:30:8a:e9:f3:7a:2f:11:d9:cf:c3:1e:68:f2:b0:79:f2:
1d:ea:0d:1e:e8:4e:09:68:b1:f1:f7:2a:07:1c:d8:a3:9a:27:
5b:69:d8:86:9e:86:bc:6e:ac:14:b1:98:24:00:ee:b3:37:00:
34:ab:f1:31:f7:e6:ce:d4:75:44:56:be:10:96:92:51:0a:a6:
fa:f2:bd:0b:01:5d:3b:35:41:69:a4:fe:1a:7b:0b:d6:8f:50:
d8:f1:7c:ab:3e:f0:44:4d:4f:8b:ea:71:a8:b0:8c:ab:78:7f:
75:f5:4f:87:7c:94:12:8f:5e:b1:4e:fe:96:75:5a:3c:3c:0a:
8f:41:d1:dc:01:f8:fa:b7:84:8f:4b:ea:17:2b:e5:94:3e:b1:
6f:3b:87:f3:21:b5:86:67:58:1f:f8:bb:f7:a9:2b:3d:d9:8d:
44:a3:e3:02:d7:b6:58:cf:23:ad:c1:ae:30:12:bf:3e:45:41:
15:72:b0:8d:e9:ee:f6:53:1a:69:9c:e7:de:1c:51:87:0e:5c:
ae:16:24:e3:bf:6d:51:cb:70:aa:6c:dd:63:ea:c7:93:1e:50:
74:73:31:81
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
Truncated 7958 bytes from beginning
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
3,107,480 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:25 2025 GMT
Not After : Jun 7 10:25:25 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a8:2e:09:f3:42:5a:92:80:cb:e1:ae:85:d0:83:
7f:4b:09:6d:10:81:c0:20:88:f1:f7:37:68:f0:0b:
59:09:3a:c4:87:e3:6f:8a:47:10:4c:de:9a:b2:af:
2f:d2:3b:61:3a:c1:68:39:66:3c:a0:d2:38:ac:1e:
48:96:b9:79:95:6e:66:43:4a:ee:9d:7d:9b:47:74:
17:6a:b5:43:97:89:8a:5e:7d:7d:39:09:c5:c5:79:
d4:c3:eb:67:5c:9d:52:4e:34:12:a5:4f:6b:d4:f9:
0e:7a:3e:2a:6e:76:72:6c:9d:3f:0d:fa:16:26:a9:
07:9b:33:99:52:86:67:f4:5a:d7:4c:3a:78:0e:71:
48:c9:26:f8:e9:8f:f1:3b:06:b0:69:cb:93:90:ee:
4e:28:b8:17:89:d7:15:53:57:66:c1:c2:be:bf:98:
66:74:ac:41:44:47:d9:c7:f1:2a:ef:12:07:ba:00:
37:14:58:df:5a:df:49:ec:ed:30:b7:0e:80:54:c9:
b1:69:e4:b6:28:54:f9:99:90:61:8f:80:22:da:61:
a3:58:1c:72:88:81:ca:5f:4b:38:c3:23:03:e5:20:
46:a2:47:e1:f5:ca:aa:bb:e6:f3:82:d5:1b:77:57:
14:e3:1c:01:95:2c:5d:91:11:6a:24:45:b1:f3:b5:
c0:9f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5d:1f:aa:99:45:73:a1:42:93:54:d2:ba:57:48:ae:92:ec:d1:
52:09:ed:3b:1d:f4:d5:0a:84:6c:0c:c3:5a:7a:c8:3f:1f:6e:
14:a7:9f:12:e0:20:f3:39:42:59:93:b3:00:b1:45:b5:58:67:
8b:c3:45:e9:d5:6e:9c:c4:af:ae:2a:ae:ec:13:53:7e:3d:aa:
5b:af:54:00:d7:07:ce:a2:43:d4:c7:59:d5:2d:a1:af:7a:1d:
7a:e5:8d:9e:a0:27:85:b6:06:b0:a1:b5:eb:34:f0:c5:b7:2a:
be:a6:f8:d8:76:20:70:fb:23:a3:95:82:80:6c:1d:38:df:79:
a1:04:a0:cb:90:82:a4:18:7b:80:ef:ad:0d:a6:07:4d:8f:41:
70:77:cb:98:4a:3e:08:c6:e1:ea:1c:4c:b8:4d:ed:12:15:0e:
81:9d:9f:a3:cd:b5:d1:f5:2f:ba:d4:5c:4b:92:db:8a:fb:64:
bf:12:9f:c4:40:d1:41:e7:7c:cb:f0:c3:54:a8:2b:46:0e:42:
bf:34:7e:20:cd:ec:2d:88:88:bb:56:91:1c:74:21:af:68:25:
c6:30:1b:f8:88:46:05:28:b5:a9:83:92:15:71:51:f6:3f:49:
e4:70:ed:48:f3:80:56:3b:70:85:47:ec:ee:b3:a1:62:22:ad:
e2:e7:16:06
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:25 2025 GMT
Not After : May 9 10:25:25 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6d:4b:86:0a:60:7c:11:f2:47:b4:30:37:9b:6d:cb:e0:d8:0e:
68:17:4e:53:87:42:cf:4c:d9:16:e3:79:87:d6:05:8a:a4:08:
18:c5:7b:5d:a0:c3:e0:65:b2:01:bf:a8:ec:05:e9:93:b2:42:
3d:b1:71:d5:de:8a:d9:00:8c:52:70:db:e5:e8:65:67:8d:aa:
af:0f:d5:5e:af:4d:b1:33:3f:24:c8:dd:36:b5:45:04:0c:96:
ba:08:e2:58:4a:e2:3b:2e:09:8f:58:21:20:89:fd:ca:9e:8f:
63:a6:c6:8a:99:b5:4d:99:3a:76:d7:e5:5c:9f:f6:b9:d8:72:
3e:6c:34:ba:5c:3f:6c:44:7e:69:58:af:d6:e4:cc:70:04:ff:
45:17:0f:87:f6:b6:95:55:a7:c8:51:a1:02:5d:81:1e:2e:d3:
0c:9a:b7:f7:6a:75:d8:ec:a9:35:00:73:66:59:4e:3b:b3:98:
5e:1e:69:2f:2a:e1:c1:de:c3:a8:01:cb:cf:ae:93:0f:0b:1a:
e5:cd:d3:6f:c7:39:ed:60:f9:56:10:1a:bd:57:d7:31:cb:e4:
0e:e2:a8:42:a9:e9:6c:5f:ea:68:b4:06:70:8a:a1:e6:99:dc:
b6:bf:88:93:85:19:ba:94:a9:e9:54:08:ef:4a:16:b2:a8:dd:
b5:f8:9e:b3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
Truncated 3082 bytes from beginning
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
2,856,798 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:20 2025 GMT
Not After : Jun 7 10:25:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b5:48:2f:7a:f2:ee:22:da:e7:23:a4:e7:e6:dc:
2e:94:c1:08:31:db:ff:c2:aa:f8:32:25:df:fc:6f:
9a:99:1f:f3:df:84:65:30:76:7f:87:07:3a:0f:6c:
ee:c1:b3:71:cb:73:f1:96:10:b0:b0:e1:21:1e:cd:
8d:54:29:ae:05:f7:da:8f:59:fb:9b:ec:45:96:ef:
5c:aa:d0:44:69:14:e0:9e:26:3f:9d:0c:f9:75:73:
10:b4:09:2d:2e:ce:ec:53:4f:4b:53:da:59:dd:3a:
9c:39:af:ab:2e:a7:e5:d1:d1:8e:d3:0d:75:cb:96:
1f:e1:e4:ea:13:eb:fe:0a:e8:2b:2e:68:ca:08:ae:
bc:fe:91:c4:13:81:b7:3f:06:c6:5a:1e:65:74:74:
e2:c6:5b:bc:19:ed:ac:0b:91:ce:05:13:85:82:2c:
14:9c:af:48:57:bd:41:ab:08:84:12:cb:3e:17:66:
a6:00:3c:46:4d:fa:12:08:59:a6:b0:ac:86:54:8a:
e0:67:85:cd:af:75:22:6a:0f:97:32:06:a6:22:b4:
1e:2c:a4:af:ff:6e:a0:fa:f2:c7:6f:db:a3:cd:71:
a0:5b:73:fe:af:9a:cf:2c:69:20:8a:12:af:ef:02:
db:21:83:f7:97:0f:38:df:17:6c:e9:29:16:fe:0a:
70:b3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
09:48:6f:1b:0a:9b:10:7c:7f:b5:14:65:f0:09:aa:c4:82:fc:
9b:03:e6:74:9a:58:28:e5:f1:f7:e9:5a:66:73:db:2f:26:bf:
3a:b8:18:db:77:29:92:36:a7:38:44:6a:76:c7:d8:f9:7e:6b:
df:17:f3:4d:9f:bd:54:18:a5:e9:c4:c5:c4:a1:50:a4:cd:c3:
ae:58:5b:b0:3a:7b:a8:22:8c:8d:32:f4:27:63:26:8e:6d:ae:
c9:fa:c6:93:7a:14:0d:6d:8e:36:55:32:fb:bf:71:3f:64:3f:
05:b8:e7:f9:90:58:5a:4a:4f:72:1e:50:c0:12:b0:37:5f:be:
cd:4e:09:d9:fb:0d:71:ee:4e:0d:52:59:b5:97:e5:40:ae:fa:
20:56:bc:bc:09:ce:32:17:a7:d7:cc:52:d1:9f:d8:a8:ab:ba:
a3:56:03:d3:a1:dd:7f:0e:c3:82:50:1f:3a:3c:56:e7:78:77:
c1:bf:bb:29:f6:8c:83:cb:5c:59:2e:d5:ac:20:c5:60:22:80:
1e:7a:4a:ae:72:b2:bd:e0:73:c3:f4:00:3a:8f:a4:09:dc:f4:
0d:c8:13:2c:d1:75:5f:3e:2a:95:10:29:ce:6f:e2:18:e1:ab:
de:cf:df:af:98:2d:ae:48:c4:ff:74:5c:d7:f6:e6:30:2e:91:
da:82:74:58
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:20 2025 GMT
Not After : May 9 10:25:20 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5f:38:c2:8b:2b:a3:e1:74:93:53:2b:20:13:31:b3:13:3c:97:
d3:12:ff:4b:4d:86:33:3e:63:aa:c4:da:52:1b:5b:15:b4:c1:
ef:be:af:3c:c3:21:37:3f:93:47:1c:aa:90:59:b0:d0:74:4e:
2e:91:db:32:d2:db:c0:93:31:11:d7:37:ae:e9:be:5d:ff:fe:
b7:ac:19:c4:69:74:7b:74:f9:18:91:a0:20:77:b0:05:ad:a5:
9a:2a:9f:cd:74:02:d6:5c:b1:28:e9:1c:7b:27:2e:2c:81:69:
ed:ba:aa:d9:dc:ed:70:74:af:f8:8e:25:4f:d7:fe:20:80:a0:
c5:cd:68:02:2d:74:69:54:f5:f9:50:6c:3d:b2:d3:c5:a6:57:
54:be:1a:da:1f:95:ea:91:99:50:28:cc:bb:fa:12:fc:9d:1d:
50:85:13:bb:1b:a1:2f:3e:62:ec:d2:39:86:19:3e:3a:35:9e:
6e:cc:66:7b:79:5c:36:eb:d8:50:9a:a0:c9:06:53:f8:4e:53:
86:78:05:76:89:25:b6:2f:6d:3a:94:c1:68:94:8d:b5:48:0e:
72:6b:7a:68:8e:2e:ca:bd:87:1c:7f:f6:4f:ff:5f:1e:0a:44:
31:dc:55:01:d3:94:48:36:62:94:0f:32:7b:33:58:fa:21:bd:
cb:e5:dc:2d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
Truncated 7958 bytes from beginning
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
3,108,461 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:18 2025 GMT
Not After : Jun 7 10:25:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c7:a4:ac:ff:5e:5a:3b:68:b1:2a:95:cd:8c:fc:
a4:23:44:b6:63:17:9b:00:2c:85:9f:a4:41:9c:50:
12:55:76:54:6e:7b:2c:95:ba:89:6b:b7:8c:2c:bb:
24:2b:7c:6d:55:d9:f5:a0:f5:b8:fb:f7:02:d3:58:
3c:6e:73:6f:4f:ac:9a:99:47:64:44:cd:79:7b:c5:
e9:f6:5e:39:7b:37:a2:9e:ac:65:a6:73:7b:cf:b3:
f3:f5:d9:6d:5b:cc:76:73:1b:55:be:88:73:ff:ac:
d4:0c:08:2f:06:d1:38:39:36:30:09:bc:ad:ff:d3:
d2:95:2f:3c:17:26:7e:24:13:bc:5b:de:6e:8f:89:
f9:e4:a6:aa:d4:bb:75:e5:f4:42:f1:51:b2:24:3d:
ce:d8:ef:bf:0e:97:9a:91:2b:72:c0:be:48:a5:ad:
62:0a:77:36:40:a6:c9:3b:b3:cd:82:fb:09:a3:8b:
56:37:20:a6:10:d6:fb:32:49:0e:d7:18:36:a8:f0:
75:89:8a:fc:a0:db:cc:98:65:1e:95:48:ab:20:cd:
1f:18:87:17:eb:40:09:b8:24:8a:ca:85:93:8e:62:
a0:0c:67:e3:57:22:29:c7:56:8c:c3:c6:da:32:18:
ff:e1:2b:0c:d5:9f:ca:0f:1d:66:0c:6a:b6:34:8a:
1b:79
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9d:26:06:cf:5d:fe:bb:95:41:cc:53:21:03:a8:32:86:10:29:
fa:d2:18:ec:1d:45:56:e2:71:23:27:bf:18:be:72:a1:48:2a:
ae:d5:ba:f3:0f:70:5c:b2:bb:ef:f4:1e:9a:89:e4:42:9f:08:
b7:c0:15:de:2f:2b:c4:ba:36:0b:fe:6f:73:22:5d:7f:8a:14:
9a:f9:81:9a:d9:4c:22:c6:d6:1d:3e:82:69:18:48:cd:e5:16:
04:68:68:ee:b3:26:0b:61:67:6d:89:6d:e2:6e:8d:77:17:96:
0c:00:69:04:f7:f3:14:3f:5d:65:1e:92:08:2d:bf:0d:9d:4c:
ab:3c:46:77:ea:af:3a:6a:29:54:dc:c5:69:d8:24:47:30:25:
d0:c9:32:07:6f:a3:a8:6c:13:c6:5a:a0:6c:b4:e9:3e:6b:5c:
34:11:cd:3d:e0:a6:40:70:86:93:1b:9c:76:a2:57:38:92:39:
d6:d3:6b:77:7f:8c:f2:32:c8:9c:bd:09:ff:af:6f:0e:79:9a:
11:3d:54:e6:ee:4d:89:37:76:e7:d2:03:be:98:08:1f:2a:9d:
e5:01:ad:53:fc:9b:b7:0a:a4:1f:42:bd:7c:0d:7c:fe:e5:2b:
0b:14:f7:a8:5f:f5:44:8c:8e:66:fa:99:07:99:c6:17:df:b8:
de:94:8f:ec
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:18 2025 GMT
Not After : May 9 10:25:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8d:8e:9a:4e:88:11:07:5f:34:cb:3c:fe:96:14:18:52:dd:5f:
49:b2:7d:c2:f6:6f:89:af:61:f7:bf:77:d3:11:20:ca:13:d7:
14:49:c0:ef:0d:22:eb:84:61:59:b8:a9:a8:93:05:20:59:f1:
46:db:4d:62:0c:2f:fd:b8:fb:a2:93:c0:3d:08:12:b8:55:00:
a5:9f:4f:5f:f5:29:59:7d:31:0a:e1:02:53:a4:e5:e6:92:2a:
82:41:f4:4b:13:ee:4b:8c:91:46:1e:ee:bf:30:65:62:62:d1:
e3:4a:5a:5c:6d:07:4b:21:85:a6:45:2d:b4:7b:a7:ca:a1:6f:
16:95:f5:9f:30:66:87:65:42:67:e6:f2:f0:11:16:a0:0f:f7:
92:09:8b:57:9f:11:51:7b:8a:13:a6:13:31:0c:e7:72:74:dc:
c2:6d:30:2c:ef:1b:74:a5:87:ce:05:f1:3f:eb:3d:9f:01:e7:
50:c4:39:7d:cb:a9:15:1f:4f:d7:db:25:59:8b:14:1c:ac:c5:
96:63:46:e3:12:11:62:f9:5d:e7:43:82:50:7d:c7:e1:fc:8e:
d2:9d:ec:9c:a8:f3:08:36:4a:9e:75:38:b0:60:ea:79:43:cc:
68:d5:49:1b:8a:15:8d:f7:d4:37:08:4d:e3:61:97:4f:6b:54:
5b:a2:27:b4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
Truncated 3082 bytes from beginning
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
2,857,704 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:21 2025 GMT
Not After : Jun 7 10:25:21 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9f:f2:1c:8d:aa:d2:ba:7b:be:d4:fd:89:60:5f:
bc:92:08:aa:e7:09:ae:33:d8:16:14:61:e6:27:fe:
9b:8a:41:34:4e:3f:41:20:7e:7c:a8:ce:cd:4a:f8:
90:55:1c:f0:5d:d1:3c:55:f8:a4:44:0a:0e:dc:62:
04:67:31:56:b9:6e:31:65:67:46:61:6e:9e:2c:b7:
ec:bd:a4:73:e6:48:62:40:19:5f:aa:c4:16:a4:ed:
27:22:d6:d7:c2:42:fc:ad:9a:25:24:cc:45:dd:e8:
89:6e:de:f6:86:1e:fe:f2:17:62:09:4b:f3:53:d4:
35:24:2c:c3:62:8d:6c:94:5b:5c:2f:2d:78:b6:07:
a4:0c:a0:b9:1c:5d:cd:6e:87:75:6a:a2:f6:30:75:
4a:22:c3:97:f7:2c:59:ba:2c:0c:86:5e:e2:fe:cd:
42:98:1d:4a:b5:7e:93:39:4c:63:69:3f:d8:e4:44:
db:70:76:63:c2:9d:d0:9f:70:d5:db:6b:a4:55:6a:
70:3c:31:b4:59:7b:de:04:94:20:8a:52:7c:c0:d5:
74:8c:96:fc:32:a7:32:a3:33:9f:a6:e0:2c:13:aa:
9a:d5:e1:dc:9d:c6:14:dd:26:62:a2:b0:f0:e8:e0:
35:58:3d:96:82:07:44:cc:8a:63:b7:57:18:04:0b:
97:1b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
02:74:8f:0f:b4:f0:47:90:88:74:15:79:71:f8:c3:f5:5e:87:
0b:7f:dc:aa:7b:2b:1f:5f:2a:10:c5:01:5d:2e:d2:da:0f:66:
57:7f:b5:c2:1e:b5:3b:b1:e0:8b:ef:3a:d7:0b:32:5b:15:2c:
e8:02:9c:83:2e:d8:20:45:25:13:ec:99:5c:ff:2a:4f:82:0a:
aa:b3:95:14:b7:62:7a:d2:db:97:60:cd:64:29:d8:da:2f:12:
57:1f:87:80:53:0f:6b:b1:b0:49:37:f9:73:ec:80:ed:39:fa:
32:10:6c:61:5d:79:33:ef:41:ca:44:ed:ef:c4:cb:d9:0c:30:
52:78:2c:7c:c0:47:a0:28:8f:91:22:9d:cf:b2:61:d5:e6:08:
14:c3:2d:f0:aa:a8:6c:ba:12:3c:c5:bf:dd:3d:00:22:51:5e:
a2:f7:40:3b:d1:79:99:18:ef:b2:fe:c7:5d:a9:f5:57:73:d7:
3b:6d:9e:29:70:18:fc:ba:c0:cf:a4:4b:64:f8:af:cc:28:e8:
d5:51:96:80:35:00:df:cb:55:af:da:ca:e4:63:7e:b9:f8:f3:
28:b4:ef:f0:03:c1:ea:e7:93:19:f7:7e:82:67:a7:85:42:66:
39:8d:1e:7b:62:7b:68:aa:de:10:84:18:1f:7f:c5:31:fd:ee:
5a:3a:30:d7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:21 2025 GMT
Not After : May 9 10:25:21 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3d:d3:0c:b4:e3:27:cc:ed:65:69:f0:aa:88:f5:b2:e6:8b:0f:
8f:02:5a:51:83:03:27:2c:18:f1:65:12:21:82:fa:56:3d:0f:
a7:0f:b5:f7:5a:f5:a1:f9:82:03:b6:19:21:68:3c:1a:2b:40:
73:64:07:9c:08:21:0c:94:e1:e9:5f:5c:e8:7b:07:63:7b:ee:
bf:9f:9f:e7:aa:92:46:c6:48:15:ee:44:92:2b:90:28:44:ab:
23:d4:b1:e8:e0:8d:7e:8a:9e:72:2a:d6:b6:46:19:76:11:39:
0e:6b:54:b3:26:c5:d8:d4:16:01:d8:11:cd:ae:ff:26:40:cc:
48:66:28:9d:c1:e6:72:64:3d:23:47:73:6f:7b:f7:48:fb:fd:
77:97:55:44:44:06:0c:c8:69:ae:e2:6e:04:3b:a3:00:f2:99:
75:9a:74:0f:c4:25:5e:c7:c8:3d:c0:c6:b8:2c:22:e1:c9:b6:
19:7a:68:bf:79:37:79:64:f5:d8:db:c1:75:bd:de:c0:da:af:
71:3d:a1:7e:c7:cb:83:9d:dd:23:7b:d7:7c:2e:49:45:62:f7:
45:35:cb:42:03:34:f9:5b:87:0d:ca:3d:8d:eb:4e:10:c4:63:
ff:be:97:29:4a:2b:94:e8:72:83:90:d4:91:b2:66:a8:b3:3d:
84:c8:91:35
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
Truncated 7958 bytes from beginning
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
3,107,266 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:21 2025 GMT
Not After : Jun 7 10:25:21 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:df:68:1d:c3:22:9f:9a:63:4e:c5:c3:d0:cd:f2:
4d:45:e8:63:9c:7e:5e:a1:62:71:be:71:a4:1a:cc:
26:90:2e:37:a6:af:48:9d:e5:2e:c0:30:d7:80:e4:
5f:09:1f:b0:8b:e1:c6:e1:1b:8e:e7:36:23:8e:7a:
67:46:fe:d0:99:57:57:f5:a4:64:c1:45:25:b3:1f:
32:7e:a6:49:53:aa:15:c9:f6:e7:3d:1b:40:34:6e:
a4:6f:41:37:9c:d4:5f:8f:c7:63:a8:4f:4d:89:f0:
93:4a:34:89:33:d5:64:50:21:a6:67:5f:f1:05:14:
6f:19:03:1d:3c:c8:22:fa:f3:5c:02:cd:6c:15:8b:
ca:e3:e2:aa:8c:ea:46:58:07:96:9f:f5:d4:e3:03:
80:c4:90:50:e3:f7:e2:99:08:bf:2a:f5:c3:c2:fc:
2a:66:4e:cd:cf:95:fe:b2:3f:c3:15:7d:87:05:57:
9e:57:e7:3c:3a:f9:55:5f:d9:5e:c4:52:14:8e:0d:
9c:c4:89:dd:35:d4:15:d3:94:0c:da:93:5a:b4:11:
8e:ca:c9:cb:3f:0b:b5:f5:fe:93:31:ab:eb:9f:b6:
55:dd:bd:43:f5:a2:f3:af:f1:69:22:a3:49:0d:ea:
a0:2e:35:90:a0:fe:45:30:63:43:10:c4:96:11:cd:
98:1b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ca:60:2e:37:76:7b:ef:cb:df:fe:23:0a:d6:19:02:85:e1:84:
c7:8e:96:90:54:01:89:31:d8:46:63:dd:7e:43:fd:bf:a9:5c:
e4:9a:0a:58:72:f8:61:c3:f6:5f:41:82:73:1c:ae:57:34:8c:
e3:b4:66:03:28:fe:26:9f:ac:8b:19:a8:71:1e:67:a8:7c:b3:
f2:fa:f5:0b:5a:2d:b3:96:0b:54:24:5b:c1:c6:c6:17:e6:87:
4c:73:e0:5c:0b:52:5c:92:68:32:91:33:25:1d:b4:07:ea:b0:
c3:8d:1b:73:4b:82:63:8b:0f:f4:75:a4:23:a7:8e:6b:5d:7b:
e2:f9:7a:f8:88:b5:8d:9e:42:2b:b7:bd:3b:59:8a:45:aa:85:
f8:39:86:b5:31:09:8b:8d:dd:ec:43:40:84:3c:61:1c:d9:04:
02:e3:71:3f:d0:6b:ad:c2:cf:7d:77:8b:19:c2:07:40:33:31:
2e:37:ac:7c:82:56:f0:77:aa:73:62:88:5e:d0:16:44:15:10:
ec:98:9f:88:b3:e6:ee:24:7e:42:3d:ad:fe:a6:2c:09:53:28:
eb:2b:7f:73:58:3f:c5:22:fb:14:51:8e:b6:6f:e8:c3:f9:31:
21:18:05:fd:c8:61:63:17:cd:42:a4:da:94:de:98:4a:f1:a5:
25:52:43:db
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:21 2025 GMT
Not After : May 9 10:25:21 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
d8:74:93:13:b1:6d:8c:2f:31:2a:17:d5:0e:29:9e:5b:32:a3:
96:a8:8f:ef:19:96:b4:4b:8d:be:38:f2:a9:e2:a9:fe:44:8d:
c7:a1:0c:1b:cf:45:82:ce:87:d9:43:68:b4:61:49:68:c9:18:
33:c3:85:5f:06:a8:3d:ca:3c:c7:03:07:d1:3d:a3:ca:9a:30:
3b:d0:77:8b:e6:41:f2:93:87:7b:2d:20:c8:7d:78:a8:ce:a6:
4b:5a:61:60:42:81:8d:52:8a:24:14:a8:ec:46:80:35:ac:75:
c4:0f:c1:78:a1:6b:a7:81:2a:7f:0d:4d:84:d5:32:8a:53:45:
8d:7b:51:7e:11:dd:7f:d2:46:ea:79:99:7d:d1:1b:b8:87:b5:
ea:45:ea:70:34:3d:0d:d8:62:72:ae:cb:c9:86:ef:bc:8f:52:
59:87:80:93:90:00:49:40:f4:16:94:c9:b7:17:2f:a1:3d:e9:
63:31:aa:c4:2a:25:7b:74:d1:02:a2:51:80:ec:00:e3:1a:c7:
39:0d:86:71:5e:d8:ed:95:13:04:7d:4e:ab:a1:b9:3f:93:fa:
4f:85:5c:8d:f4:de:cc:f0:61:5d:a8:93:de:8d:a3:de:51:4e:
14:7f:bf:47:7c:1a:a6:b4:ff:0a:4a:61:0c:2d:7f:8e:56:3f:
f1:c2:e9:fe
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
Truncated 3082 bytes from beginning
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
2,855,453 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:07 2025 GMT
Not After : Jun 7 10:25:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ea:07:b9:07:7e:61:7d:ba:2f:3e:16:28:56:21:
90:eb:a5:70:29:c1:54:d6:47:77:41:05:be:5e:a1:
c7:b4:51:21:e7:66:42:32:d0:86:cc:b1:fd:5a:90:
c7:84:86:89:3f:5a:a7:32:49:c6:f6:87:95:0c:32:
e0:d6:e6:ca:95:aa:cc:e5:b8:49:5e:bb:60:5a:10:
3e:80:d7:f9:8d:48:b8:77:bf:3a:0d:eb:a0:4b:60:
a5:b4:81:e7:43:37:72:58:ed:9b:c5:b7:05:3c:89:
86:a7:3a:bc:45:36:39:d6:14:a1:fb:06:29:d0:a4:
8f:67:8b:10:ae:04:d4:64:4d:c4:c0:4c:1b:ad:4f:
b3:8c:28:05:5b:1e:bb:2e:c3:92:7d:0a:de:76:97:
27:62:b3:83:61:01:07:4e:15:76:fb:9c:a5:ba:33:
8b:ec:8a:db:bf:d4:b4:39:27:07:3c:97:5a:ed:7b:
e6:4c:b6:96:87:c1:40:b0:17:4e:eb:21:22:47:6d:
21:66:80:3b:35:85:df:93:2e:dc:67:78:eb:a3:c9:
ec:14:0f:ee:f8:db:3f:22:31:4f:a7:11:2b:d6:8c:
70:01:d4:68:22:76:96:d7:b5:80:8d:c2:19:a0:f6:
be:20:f8:e6:88:e7:95:1b:b8:d3:1e:b7:89:6b:03:
02:ef
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
77:f7:72:06:24:41:28:48:d7:d7:39:3d:86:41:3a:69:18:ad:
76:01:45:4d:e3:40:c6:04:e4:e5:bc:57:a8:da:c1:5d:e4:ba:
f2:b9:04:ef:7d:f3:55:2a:03:9b:33:3f:69:41:14:d4:a8:29:
4f:25:4b:c5:e0:40:2b:09:03:45:cb:28:1b:0a:39:19:56:d0:
6e:3d:b6:9d:be:e2:d9:b3:e0:e4:f6:dc:6a:d1:df:1a:79:d9:
a9:3e:d9:02:3c:e4:27:60:0f:65:a4:a9:43:98:0d:99:2e:ae:
d0:97:a1:93:23:53:cb:31:ae:61:71:3e:7a:4e:62:4f:8e:78:
5b:0c:2f:ea:6e:d5:ff:e3:69:37:7a:91:6b:48:1e:16:75:e4:
bc:20:07:bd:8e:a6:6d:ab:2f:bc:03:54:f9:f1:60:67:1d:7a:
50:78:d3:a0:00:5e:09:73:85:c2:45:87:b5:df:52:0b:ff:d1:
c9:17:3e:18:0c:ce:b0:f5:57:a1:69:dd:8a:08:b5:2f:92:59:
21:62:a0:98:63:de:78:8f:c5:7a:07:52:69:fc:05:74:fc:76:
13:37:3d:94:47:f5:fe:05:f1:21:19:c3:2b:53:7a:c0:cb:5f:
2c:63:3b:13:b2:c4:8d:de:24:66:25:16:d5:c4:8d:d6:ce:53:
f0:f3:9b:b1
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:07 2025 GMT
Not After : May 9 10:25:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8f:16:eb:15:98:92:b7:60:7c:84:25:e1:7b:7e:b1:e8:b2:c8:
c0:69:76:b0:6c:35:0f:b2:ea:04:21:e6:5a:aa:86:af:0e:1e:
c4:32:a7:3f:f9:d5:b0:66:ad:f5:10:eb:8e:22:5b:ec:2f:a2:
92:94:e4:74:18:1f:a0:3d:b2:2f:90:66:02:90:68:12:e9:61:
d9:90:d0:06:b6:d6:60:45:88:9a:31:14:a8:38:ef:65:b2:85:
44:64:a7:04:d6:c3:f7:17:3f:99:2b:3a:b1:93:56:82:c8:5a:
20:8f:0a:db:86:c4:34:04:cb:f0:be:89:cc:9a:e1:6f:a7:34:
c4:ca:09:35:f5:94:c2:44:3e:09:28:0f:0c:c1:d0:a7:c7:9b:
8e:ea:a9:a4:b7:07:ec:4f:79:ca:79:2c:a1:34:42:2c:c7:ef:
2c:97:2b:c2:51:ac:cb:00:85:74:cb:d8:ef:eb:6b:af:ac:39:
ea:c5:43:8e:1a:85:57:90:f6:e0:2b:41:50:90:54:09:15:6c:
93:b4:79:2a:d4:9f:f9:fb:31:95:3a:ad:5c:01:cd:9d:5b:71:
24:01:70:b4:76:cb:28:cf:b4:a3:e1:0a:72:ce:c4:6f:76:10:
50:a3:18:d2:ce:18:73:0a:7b:50:f3:c5:95:aa:57:7b:ec:af:
6d:08:73:d6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
Truncated 7958 bytes from beginning
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
3,110,649 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:12 2025 GMT
Not After : Jun 7 10:25:12 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e3:88:4e:ea:2e:22:8c:f0:f3:8e:9b:66:65:98:
c0:51:0e:27:0b:7f:3c:20:b5:cc:e1:42:f1:e9:90:
22:07:1b:53:27:64:1f:b0:ca:ac:e8:2d:31:1f:1b:
cf:0c:e6:e5:d9:32:c7:3d:bf:a1:c8:1a:d0:f3:57:
36:2b:b8:ec:41:6e:b2:79:d1:43:26:ee:d5:3f:aa:
d8:d1:03:b9:9f:9c:5c:d1:73:ee:e6:98:84:7d:b4:
1a:10:e6:0f:d4:39:db:f3:48:f3:7c:a2:ea:3f:a2:
ed:09:5a:13:11:fa:63:1f:31:15:25:05:06:76:c2:
05:8b:63:57:3e:cb:24:31:d4:59:c7:2b:b2:1e:0f:
da:2b:b5:91:3a:bd:72:7d:08:18:92:b6:cb:34:4d:
35:e7:15:55:24:b1:9b:d1:f0:3b:8c:d8:1f:02:8b:
0e:55:73:32:51:65:bc:a1:b0:f0:e7:47:45:5c:ea:
9f:50:62:ea:38:33:c7:f5:57:14:9b:23:82:b6:2a:
11:04:3a:e0:49:d8:49:43:81:90:6c:39:3a:7d:fb:
59:a9:8c:36:52:b2:a9:38:6d:e8:ae:42:9e:3f:2c:
8f:b2:3a:fa:b9:82:74:9e:2a:3f:de:16:43:11:43:
61:e0:fa:76:98:93:34:a5:eb:27:5e:31:15:d8:e6:
df:4d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
08:a8:2f:f9:63:c7:77:2e:4b:86:84:b2:e3:22:31:d3:29:d2:
0d:36:65:62:58:38:d7:c8:fb:2e:17:03:18:5f:d0:77:5b:f3:
46:30:d9:97:38:db:08:6b:89:2e:6d:91:bb:dd:78:da:73:03:
cd:b7:f6:e6:07:ed:8d:ef:62:ed:c7:2a:9e:f8:04:62:c2:c0:
e1:40:2d:56:4f:a0:68:2d:bd:c3:07:33:2c:39:76:6f:30:93:
e7:68:52:9e:66:75:4b:04:87:60:4e:03:93:46:22:65:81:b0:
69:a8:82:18:5e:94:13:9e:de:a3:08:fa:52:78:fc:f7:be:e1:
58:6b:3f:83:3d:18:fc:aa:08:d5:fb:8e:12:7b:68:4a:db:72:
2e:a6:48:90:76:af:6c:88:ca:3d:87:7a:6a:dd:ac:49:08:3c:
6e:f3:1c:f7:54:5a:8e:ce:f2:28:d3:28:60:8b:43:51:f1:ca:
57:df:72:d4:6f:dc:e9:89:39:5c:d5:61:cf:6f:ce:55:c3:92:
ba:eb:ec:96:db:a0:dc:1f:10:c6:53:fc:27:6e:d7:d1:4f:d7:
8b:19:5a:ac:61:ac:fd:59:af:f0:11:45:9f:9c:bd:c6:28:b7:
1f:71:23:96:08:50:b5:78:b7:44:8a:d9:9c:6f:ef:e7:8f:af:
d4:38:11:1f
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:12 2025 GMT
Not After : May 9 10:25:12 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
da:86:0b:bc:f3:30:73:b8:39:be:d3:b3:ac:12:41:01:7f:66:
3a:66:b4:df:a8:67:0c:44:57:01:89:e1:f6:5a:8a:80:81:80:
99:f0:ac:5f:cc:2b:a5:88:18:01:76:b2:a2:37:5c:c0:eb:25:
42:df:3c:ad:23:36:8f:f5:f0:77:e4:d8:f0:3f:9c:3d:57:18:
f5:6e:74:51:ac:6d:22:3c:9e:89:de:6f:d6:d5:66:0c:59:3c:
2a:95:40:bb:fe:4a:98:6b:c9:32:c9:f4:e1:be:6f:05:c6:25:
0c:24:fa:e1:49:1d:6f:3f:19:ae:16:83:7f:d1:88:49:87:d3:
1f:71:9d:18:29:2e:fb:88:0a:2e:f6:c0:5f:b9:97:19:22:07:
03:2e:60:29:a1:85:6e:33:2e:52:52:2a:3c:b7:b3:20:f5:d6:
af:b2:1b:3e:07:3f:42:d3:24:3e:a6:49:f2:e8:8d:ef:b2:7f:
2a:a9:dd:90:ea:29:66:af:bc:8f:bb:67:d4:00:9d:ce:74:27:
0f:dc:e6:5c:6d:a7:d1:9d:54:2f:c6:4c:91:67:70:94:95:8d:
ba:6d:97:fb:fb:cd:5c:2d:80:b0:94:16:42:0d:b0:e9:39:f8:
7b:19:76:15:bb:79:1c:02:63:55:81:09:21:72:97:63:22:40:
d3:e4:39:9a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.68s
Truncated 3082 bytes from beginning
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
2,855,318 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:13 2025 GMT
Not After : Jun 7 10:25:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d6:37:a2:07:0a:0f:0a:0f:9c:cd:3b:22:9c:77:
17:62:6a:52:9c:e2:0a:e5:cf:41:3e:a1:e1:3e:d8:
91:77:cd:3b:d2:91:02:0e:81:4e:af:82:80:d0:9e:
77:d4:67:ed:b3:62:ed:01:6f:56:f5:41:d6:e1:16:
93:23:11:94:34:da:12:90:f6:79:81:56:65:0e:fc:
02:b8:18:9e:d7:2a:2e:15:aa:e0:8a:48:70:ba:c9:
37:89:d6:0a:c8:52:a7:d7:8d:f4:88:e1:6e:91:e9:
9d:25:1e:1f:04:64:db:27:67:ec:3c:a5:02:77:0c:
d8:f6:58:9e:03:e5:63:2d:24:1a:e6:b8:17:e3:d9:
13:2b:92:eb:98:d6:43:99:92:79:d7:02:82:f4:cc:
f6:80:56:91:1a:4b:4d:cb:14:61:5f:59:a3:bf:d0:
42:ee:44:86:3b:b1:7b:1d:c1:4a:12:71:ed:45:7d:
a2:ec:b2:78:6f:c8:f3:c0:e2:70:00:af:7c:1f:27:
7c:02:95:b9:57:a9:c6:bd:f0:48:9d:66:17:db:aa:
97:51:f8:8e:01:80:71:bd:54:d1:d5:a7:9e:b8:e8:
61:d2:9e:f6:86:57:f2:00:22:c2:22:6e:5e:34:92:
a4:23:9f:5e:5f:cd:aa:97:fb:83:74:dc:a3:ac:69:
0b:bd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5d:23:af:87:82:98:58:9d:10:7d:81:ec:35:1a:06:98:55:8b:
05:8a:8d:a2:19:95:21:2c:cd:73:db:a5:6b:80:69:a2:ed:67:
7b:bc:0b:ab:1e:58:f5:ac:3d:c4:18:ef:d9:55:04:12:0d:a4:
d5:74:4b:c8:c5:c3:5a:69:6c:28:66:b1:b1:4e:17:bc:bf:d4:
fb:d3:2c:1d:97:4d:89:0c:5b:76:3f:24:80:63:03:5a:2e:06:
2d:6d:09:58:64:0f:2c:37:56:b1:8d:4f:0c:58:85:e6:41:52:
eb:d5:bc:c1:8d:bf:ad:46:df:dc:fb:96:07:bd:d9:d0:72:11:
95:61:c4:25:58:1f:0a:bb:5d:b4:e5:27:7b:dd:d2:a9:b0:bb:
5a:26:a6:c8:b2:ef:ad:f4:c8:e3:90:32:f3:66:f1:8a:81:27:
52:54:30:ec:ec:a9:5e:92:c6:bb:80:ed:36:6c:c0:83:d7:55:
4f:5b:00:01:f3:0c:b3:83:f2:3c:60:78:81:99:0f:c0:40:b6:
8e:56:11:f6:dc:91:42:d0:bd:e5:fa:d0:86:b7:ab:96:a8:d9:
5b:95:05:96:7d:c2:88:b9:aa:ce:09:0b:e4:dd:73:88:91:bf:
73:58:95:a3:0e:e9:4d:e9:df:ff:aa:a9:17:88:62:3a:05:77:
6b:2e:0a:f4
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:14 2025 GMT
Not After : May 9 10:25:14 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
24:48:d5:cf:60:c0:84:d8:66:2e:87:47:40:5c:00:e2:1a:8f:
b5:88:ef:63:55:0a:0c:6e:5d:10:ac:3c:44:96:15:31:7d:e7:
8d:55:80:c6:07:71:71:87:a0:00:fd:57:f9:f4:87:15:76:91:
93:89:f2:51:83:ec:97:b2:e4:95:11:21:5b:cd:39:67:e3:e0:
be:9a:a3:9d:40:bd:08:45:b2:5b:48:bc:1f:b1:5b:aa:65:7f:
97:94:be:72:98:1b:4a:d7:1e:7d:83:64:81:b3:c2:dc:ff:d7:
ec:01:b1:16:b9:ff:3c:64:0a:d2:59:d0:c9:63:c7:8b:5e:dc:
4e:2b:d2:02:bc:5a:99:e3:3a:47:db:42:56:82:5f:df:1c:37:
fa:30:47:bf:d0:8b:cf:43:bc:7f:f7:ba:dc:cf:48:58:e6:11:
c7:15:2d:72:84:76:0f:1c:18:96:3f:cb:35:b5:2b:0f:e0:7d:
bb:ce:af:94:88:b4:5b:17:4f:ef:46:70:d8:4c:5a:9b:07:49:
99:34:b0:49:9e:9c:76:d5:d0:8d:66:f2:eb:cf:50:54:23:bf:
d8:ac:49:f9:a7:45:29:3e:86:d1:b1:a9:7a:34:d4:43:c6:43:
87:24:6d:65:e5:46:f6:a3:0a:cc:34:27:75:46:d5:a0:53:e1:
41:81:e8:e4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
Truncated 7958 bytes from beginning
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
3,108,240 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:09 2025 GMT
Not After : Jun 7 10:25:09 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:af:b6:07:d6:ce:84:78:8e:84:68:aa:a9:7a:00:
b1:47:fd:f4:3a:96:55:3a:09:a8:fc:23:b4:8d:0a:
90:33:29:03:ca:47:96:87:9d:ae:50:48:fd:9c:44:
04:12:91:01:8f:12:83:40:80:f3:39:65:1d:00:43:
02:c1:83:5c:1d:93:13:d5:9c:90:7a:ba:68:aa:39:
0d:e1:8a:4d:e9:27:80:ac:6a:eb:b1:8e:43:99:9f:
bf:81:96:ef:37:b5:85:3c:b6:03:57:09:14:4c:31:
ad:67:d8:4b:6d:29:76:43:66:d2:1e:98:68:3d:04:
b1:95:dc:aa:ae:8e:66:03:c9:85:f7:4f:63:b7:95:
ce:6e:a1:10:d2:5e:3d:ae:ba:53:2f:b7:80:ec:e1:
ea:de:85:ed:05:14:b7:60:39:4d:c2:3d:fa:cd:1d:
b4:12:0f:a5:17:08:f8:fb:35:1c:a5:ea:c9:6c:7c:
d2:20:d5:37:ce:ed:0e:b5:12:48:50:0b:8a:67:b8:
bc:34:9d:31:56:46:9a:d5:4d:ed:28:df:55:04:cb:
36:0d:64:8f:91:ef:af:33:a8:a6:ea:2d:ac:a8:3b:
38:b6:b3:8c:34:8d:6e:5d:8b:45:60:60:17:1f:f5:
58:1b:95:1d:c8:c4:4b:3a:76:0b:71:c2:dd:5a:db:
71:7d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4a:16:f1:b4:ce:38:de:e8:cd:2f:a5:46:e8:e7:6c:02:87:5b:
92:1b:ec:ca:04:fa:26:16:03:a9:80:03:aa:c8:25:04:57:74:
e6:33:6b:a0:e8:80:6b:03:70:40:aa:26:5a:82:b2:52:4c:26:
2e:bd:b2:1c:b8:3c:3f:f6:18:36:15:32:77:8d:1d:67:02:0d:
c1:92:2e:57:79:ff:58:18:e1:0a:ba:dd:87:f8:b9:2b:8a:90:
d4:81:b6:73:a2:5a:c0:42:2f:11:79:62:27:9f:17:eb:42:f4:
be:06:77:d9:1a:92:be:22:d6:4a:33:95:e6:22:f4:62:07:3d:
69:ee:c6:16:42:98:55:e3:03:ca:f7:da:e4:34:a7:1a:6a:9c:
b2:37:99:c3:1c:39:29:74:de:6c:10:e9:cb:27:0b:26:b6:71:
97:3b:33:4b:d9:d3:9a:18:cb:f5:1b:c5:cd:06:be:c1:1e:f2:
ab:58:f3:e0:fa:04:66:38:ac:c0:e3:cb:82:5b:aa:2d:bf:f0:
13:6b:24:25:b8:1b:ec:0a:2c:fe:54:1d:c5:16:6b:e9:58:0c:
a4:93:07:95:7a:cf:c9:49:5e:cf:5b:80:66:4a:83:94:6b:92:
4b:74:54:50:a2:65:5f:7a:a2:31:3c:6b:6d:19:11:90:aa:06:
46:96:e5:08
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:09 2025 GMT
Not After : May 9 10:25:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
42:a5:fe:fc:83:e8:71:9f:61:55:60:13:ee:07:36:67:dd:25:
96:08:b0:02:ac:9b:09:52:ba:9b:37:3d:4d:ab:e6:45:91:9f:
72:87:7e:38:37:5a:d1:3d:56:e4:72:2a:21:95:a0:97:5c:46:
86:13:3b:dc:1d:4d:d9:3b:d2:d3:0c:96:06:61:80:91:0c:bc:
5d:b6:fa:ee:e8:12:88:0d:a4:ad:fe:36:ad:70:4b:1d:c1:e7:
07:46:8d:ed:4e:69:49:56:57:48:96:3f:12:f1:a6:66:86:a4:
ac:fa:5d:7a:b5:43:5d:a7:a5:c8:09:ba:ab:4d:24:d8:ac:9d:
5a:23:69:59:4e:75:e8:bf:e4:9e:ae:cd:fc:70:85:c5:3f:84:
65:c5:cf:d0:ba:4a:65:57:b4:8d:52:2a:a1:7e:51:94:ec:49:
d1:e9:c3:5e:f1:70:fe:e1:d2:5e:fe:f0:91:4e:eb:35:b1:78:
05:da:1d:cb:14:3b:ba:b1:7f:15:01:63:1f:1f:74:cb:fc:57:
df:a2:77:39:af:54:a9:9a:0d:22:8a:02:39:6a:33:e6:2a:74:
ba:4d:6d:79:4e:ea:ac:b5:9a:7d:2c:e4:94:fe:99:67:dc:f1:
dd:26:45:a6:ac:85:81:ef:00:25:cf:6a:a9:51:3e:55:bc:e6:
e1:e5:3e:8e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
Truncated 3082 bytes from beginning
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
2,855,727 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:08 2025 GMT
Not After : Jun 7 10:25:08 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c4:29:7e:32:28:03:ad:67:16:25:7a:64:23:46:
de:e6:9f:28:09:66:41:04:a6:53:c8:d0:fe:5a:e9:
62:38:d8:e5:bd:74:f9:09:48:e2:38:b7:71:bf:bb:
ca:97:98:5c:89:58:3f:3b:49:5d:2e:bf:1a:2c:81:
8f:b2:22:37:cd:ed:c3:de:20:a8:a4:e2:af:80:6f:
3c:0d:96:2b:a8:a5:7e:10:0f:c9:38:2a:4b:c8:30:
11:70:a5:3d:84:a8:17:32:9f:5e:a8:24:b5:ea:85:
bc:b6:18:71:1c:2a:d0:69:42:da:b3:fa:d9:f2:e7:
d0:fd:b7:7c:c1:b0:45:db:61:4d:aa:83:3e:c6:50:
9d:32:ca:7c:6f:f7:26:75:21:43:b4:30:e2:31:98:
e3:8c:8d:a2:eb:36:bc:ae:df:9f:8b:e8:26:4a:22:
e1:37:a0:8c:46:81:61:81:a4:fd:ef:3d:5d:77:94:
ed:21:97:25:84:e7:23:2d:9f:84:4e:a1:70:18:3e:
cc:3c:83:41:e5:05:b3:72:19:4a:f8:38:22:43:8c:
b6:0d:6e:f1:28:68:50:5b:70:c6:81:13:e8:5a:a6:
7c:bb:88:ec:ff:cd:45:82:96:fc:49:4a:e6:8b:dc:
11:39:c2:97:4f:8f:b9:6e:1f:55:1d:2d:92:02:30:
78:35
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
64:9d:8c:d1:07:f2:ce:e6:8c:01:7c:99:23:7b:6c:86:fc:ed:
ee:d7:70:0e:4b:db:a2:23:6e:02:05:b2:38:17:20:b7:30:d8:
30:f8:b2:68:e1:f5:23:b7:6b:b2:27:d1:a7:ea:5a:9a:cd:f8:
f2:7f:84:6f:c7:dd:96:21:1b:6a:31:d5:7c:22:51:9b:1b:69:
83:c0:2f:cc:b0:0d:d9:65:dd:7b:ec:bb:58:98:7a:3c:a3:67:
94:65:6e:3b:ba:2b:5c:75:aa:20:e4:fc:15:64:f7:78:60:b5:
34:61:9b:ec:69:9f:ef:ad:8b:42:2d:05:0e:1f:f5:ec:14:d4:
26:41:04:b8:a3:9f:ba:41:ea:62:32:65:f2:e2:ec:fa:3f:44:
b0:ca:69:99:7d:06:ad:d0:eb:68:73:79:07:cd:81:71:74:63:
39:78:1e:35:0f:52:fe:8b:c7:ec:8a:f0:c7:07:b1:80:d2:17:
97:47:76:62:b1:dd:c4:34:ea:b3:08:c2:53:ea:b7:f4:07:8e:
4d:d9:ca:7d:4d:08:ab:51:98:c9:f8:37:cc:70:0a:3b:1c:86:
e3:06:27:5f:cb:58:0b:43:31:21:4a:c6:23:cc:f8:08:e0:9e:
5f:b5:62:59:aa:34:c1:37:f6:57:27:d6:2a:26:38:60:67:2d:
25:41:d3:60
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:08 2025 GMT
Not After : May 9 10:25:08 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0c:e9:76:f0:d9:24:7d:f7:15:61:f9:18:0f:c8:d3:8e:6c:12:
dd:30:ba:6a:b3:f5:f6:46:a5:94:73:af:db:5e:ec:44:e9:14:
36:1f:7a:3e:0d:5b:34:5c:38:a9:38:d3:78:c3:29:42:f2:67:
a0:28:de:52:10:c7:d1:da:59:4d:bb:50:3a:e6:0c:2f:bf:c1:
d7:80:83:e8:0c:0c:26:0f:7a:30:77:14:ab:02:a3:41:b6:52:
87:44:fc:1c:52:96:db:d7:cd:ce:83:ed:4e:d4:4f:ed:d7:ae:
b5:b7:8d:da:df:40:3c:73:5c:72:65:6b:77:70:08:b2:a4:a3:
2b:a0:c8:8d:dc:eb:44:1c:97:07:11:d0:6e:7b:af:2b:2b:68:
8a:e9:f7:27:94:d0:03:8e:c1:ad:ad:4c:89:c1:b1:48:b1:6f:
99:50:b5:0f:9a:38:49:c7:25:70:99:cc:9b:ac:96:01:fa:18:
fa:b1:59:26:01:4c:86:6c:c2:68:0f:3a:6c:02:1b:ee:f9:3f:
55:c9:8d:0c:11:0f:7f:d0:ee:20:4b:ea:bb:99:a2:d7:ac:94:
0e:55:53:25:13:80:c8:54:b2:1e:9d:88:cd:63:be:b8:7b:af:
d5:a5:37:ae:0e:47:69:f3:55:d2:d8:8c:88:04:bf:26:61:6e:
6d:a0:94:9d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
Truncated 7958 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
3,107,489 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:09 2025 GMT
Not After : Jun 7 10:25:09 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e2:43:13:90:5b:94:48:7b:09:e8:65:b1:08:b5:
5a:00:3e:4c:47:e9:46:d3:69:a7:9f:e1:f1:f6:a5:
5e:fd:29:48:d9:3f:33:a5:e4:5f:37:ef:20:cd:5f:
b6:5c:3f:ba:35:82:73:da:1a:6d:b7:00:90:7b:86:
9c:1c:2d:83:b3:f1:83:52:47:7f:d7:a7:35:67:88:
d7:09:7d:e9:2b:9c:a0:b3:10:15:98:4a:50:5f:3b:
e3:63:7e:04:fb:67:71:e0:4b:a0:8a:28:ae:9a:80:
68:b9:af:84:ea:70:ec:3e:9c:1c:ce:ea:a1:d7:fc:
21:df:9f:14:95:71:db:be:4f:6f:b0:58:97:41:1f:
cd:e8:79:5a:fb:3b:b0:e4:c2:98:9e:78:64:9b:8c:
f7:62:bd:05:71:c2:e5:98:75:10:c3:f3:b1:ff:28:
da:8a:72:3f:94:51:66:30:79:c6:c1:6c:05:9f:69:
5c:eb:d1:4d:fc:71:23:fb:76:24:cd:6f:bd:a1:af:
42:af:a1:7e:ac:e3:9d:11:a5:3f:c8:44:8f:c1:c5:
90:c0:4a:33:94:05:37:8a:d4:b3:00:a2:20:8b:ac:
ae:7e:d1:44:32:4d:b8:ef:74:91:36:de:fa:96:79:
03:5d:db:b1:0a:d5:b9:c8:9d:d2:92:9f:cc:b4:7d:
f0:c1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
aa:5c:85:a4:d8:fb:83:c5:9d:96:db:41:1b:09:70:e3:2b:b8:
b1:2c:f5:c8:87:b7:a6:8e:89:ff:c1:9a:44:c1:6a:a6:39:4c:
e5:1c:13:3d:bf:1a:02:ae:70:8a:9e:22:22:74:6b:63:09:6b:
25:d2:b8:ef:9e:c9:8f:19:70:a0:0f:59:15:fa:57:48:53:4f:
f9:8c:2a:56:fe:66:d3:ba:04:de:21:8a:70:53:c4:6e:03:93:
12:ce:94:96:9a:c1:35:5e:76:c3:9d:64:18:5a:50:0a:56:d3:
36:ed:ef:25:64:3d:73:da:46:1d:69:32:18:31:67:73:bc:d7:
f5:7e:98:b5:5a:99:05:a0:cc:87:50:c5:ca:a7:55:c2:60:eb:
be:93:f3:99:27:bd:c2:b9:82:36:5f:72:df:0b:6e:14:90:0c:
eb:5a:98:bb:a1:29:65:fc:ee:75:e2:6b:f7:7e:b9:35:a5:42:
49:81:2e:37:03:66:db:ea:88:ee:65:aa:c0:23:cc:a9:27:78:
9c:6d:81:78:ac:74:c4:fc:e4:0e:f4:75:6a:d3:1f:26:d0:2c:
78:5d:56:2b:7e:a6:e7:06:9a:1f:1c:df:42:1f:17:50:35:92:
db:ba:50:33:e7:36:21:a5:22:fe:b3:c9:e7:25:a3:6a:ea:ff:
19:a9:a1:c1
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:09 2025 GMT
Not After : May 9 10:25:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4a:ae:50:75:88:ca:cd:74:32:e5:b3:9d:97:9d:6b:88:61:27:
78:13:7b:78:de:01:a1:0e:5c:f3:7a:d8:b2:e1:30:0d:a2:21:
1b:c7:1e:fc:b6:d5:93:98:46:90:62:ef:ae:6b:2b:81:f0:ca:
00:85:c0:e6:2e:7c:6a:37:56:35:bf:43:d0:8e:a0:dd:8c:33:
f3:01:e8:8b:f5:7a:b5:00:89:9a:cf:a2:2e:16:9c:ff:d8:95:
78:36:55:27:99:db:6f:ef:3f:a8:51:91:c5:0d:53:18:64:1c:
f8:0b:5a:e7:7b:63:76:74:33:d9:e8:59:f4:da:50:11:35:77:
17:d7:b8:6b:2c:ed:f9:cf:a1:29:ef:f7:91:4d:74:44:ab:80:
9b:a1:8e:7a:e0:dc:96:ce:42:f0:52:d5:7d:54:26:46:27:62:
bc:5d:41:fd:3b:69:a4:ab:56:77:26:ed:26:9f:70:99:d5:8e:
5d:e6:a2:a6:c8:32:04:06:c9:0d:8c:28:42:ed:a6:6f:1d:c8:
ec:a1:97:39:c2:cc:f6:2f:9e:b4:cf:7c:58:c3:95:6d:59:dd:
6a:e0:80:ed:9e:5d:31:1e:99:75:60:ef:45:35:e0:aa:2b:9b:
11:07:6a:89:f5:b7:9f:81:1d:f1:09:fe:a8:48:b8:74:3d:0f:
13:23:41:ed
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
Truncated 3082 bytes from beginning
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
2,856,824 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:21 2025 GMT
Not After : Jun 7 10:25:21 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ad:24:02:69:83:bc:54:78:25:f1:55:2f:ef:85:
ad:09:f7:fc:84:65:16:bc:7f:23:c7:28:ed:c7:33:
55:65:18:e7:47:02:af:39:8a:b9:e3:3f:f9:e5:df:
22:91:d6:81:84:72:1d:b3:a7:50:06:41:6f:6a:af:
86:4a:d5:cc:fe:ea:6a:0c:08:39:2e:1a:40:62:55:
72:3a:8f:48:f0:5c:a8:8d:37:16:d2:6f:69:01:85:
24:54:48:4a:a9:c9:39:34:7e:12:d0:4e:a4:7e:c1:
a9:d5:d0:e5:c6:df:ee:3d:80:ee:9a:b6:64:2c:54:
ce:ca:90:82:19:66:fd:83:42:1b:34:fe:64:e5:dd:
77:32:91:ca:6b:9d:ec:d8:52:a7:62:ed:9c:18:8a:
7a:4f:bb:57:d9:0b:76:e0:e3:61:2c:45:92:d3:ae:
91:29:49:60:33:54:24:0a:ca:85:b5:c3:01:bd:5b:
45:79:01:72:43:50:7f:31:8d:c8:1e:49:56:bb:60:
de:67:55:41:37:13:ea:90:48:c9:8d:f8:28:b4:91:
eb:af:32:7b:ea:7a:84:79:06:9e:67:6c:f8:3b:ce:
29:ce:0a:7f:f5:7b:56:46:e0:20:20:b8:de:39:2f:
c2:7f:4b:a0:88:e5:ae:f6:0c:2e:04:89:d8:95:b4:
78:6d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
26:da:42:24:d1:35:02:a3:e4:89:6c:d0:ff:1b:8d:4a:73:c7:
9e:a8:9b:d7:99:5f:7b:73:7c:69:c1:bb:18:82:2b:dd:b8:62:
40:23:c2:57:ab:99:89:0d:ba:87:ac:10:91:85:23:29:32:66:
0f:4c:b0:dc:9d:50:71:cd:ba:e8:6c:c0:06:a4:8a:f8:6f:fd:
7c:d1:00:a3:09:60:48:92:d7:59:22:73:ed:fa:b5:eb:32:52:
a0:d3:85:28:3a:ad:29:23:72:55:ec:8a:44:f2:04:9b:43:df:
32:26:ba:eb:09:3b:53:06:e1:88:eb:94:90:8f:53:8a:bd:57:
1d:85:05:bf:40:b0:89:2f:dd:67:12:5e:31:62:ab:2e:a4:33:
7f:75:53:8a:ee:8b:d4:37:a2:e3:1d:78:ed:2c:70:3d:5a:13:
aa:fb:1e:42:94:f8:03:d9:33:2a:a1:49:86:ec:ec:36:81:22:
2c:04:a8:a8:62:06:02:6e:7a:8f:d2:fc:e4:3e:4f:81:9f:a3:
fe:62:61:eb:84:83:15:e4:d6:36:a4:c5:b1:2a:c1:80:81:b0:
35:ae:8b:97:f3:f2:e1:5c:3f:85:d6:08:35:67:63:3a:31:af:
f3:55:6a:91:89:c6:c3:6f:73:08:06:c3:ff:2f:8f:c6:2b:ed:
1c:b2:bb:7a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 8 10:25:21 2025 GMT
Not After : May 9 10:25:21 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1e:91:05:e8:ba:4a:fb:17:92:3b:59:7d:3c:ec:25:a2:53:db:
f2:e1:26:74:fc:f3:af:70:00:eb:cf:39:7e:31:50:9c:1c:b2:
78:27:79:a7:42:bb:74:25:61:3f:57:f7:63:80:ed:c3:61:cf:
b2:1d:34:d0:ec:66:c9:03:e2:37:72:74:fd:9f:69:5f:50:91:
aa:9f:53:0c:04:72:da:0b:65:f2:a0:4d:f3:8f:23:44:7f:3b:
67:84:94:3c:14:04:29:a7:bf:98:5b:8f:0b:3e:0f:f3:83:d0:
72:ba:77:e6:3f:49:b8:71:e2:3e:f8:19:4b:7f:9c:e1:97:d7:
ae:ba:04:a4:9c:dc:4d:4b:02:39:0d:0e:f9:a9:d0:e0:03:72:
f0:b3:6a:d1:77:54:0c:35:73:53:24:07:03:f9:ea:7e:e1:76:
ad:2d:57:bd:7a:cd:6e:fb:b4:d2:78:48:5a:92:b0:5c:15:92:
7b:ca:20:ba:79:35:5e:d8:1d:b3:2e:9f:10:31:9e:1e:57:fa:
69:a9:d0:29:21:4e:2f:3a:cd:2e:f5:89:47:83:d2:e4:b5:ee:
52:6e:d1:7e:60:40:5b:03:54:63:47:36:fe:bc:eb:ed:31:ca:
65:d2:2c:c9:f8:4b:3e:90:ae:df:d9:34:f3:d1:dd:a5:99:29:
0c:e8:62:aa
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,210,412 UART:
2,211,397 UART: Running Caliptra ROM ...
2,212,501 UART:
2,212,659 UART: [state] CFI Enabled
2,213,547 UART: [state] LifecycleState = Unprovisioned
2,215,205 UART: [state] DebugLocked = No
2,216,324 UART: [state] WD Timer not started. Device not locked for debugging
2,218,802 UART: [kat] SHA2-256
2,219,469 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,222,473 UART: [kat] ++
2,222,924 UART: [kat] sha1
2,223,518 UART: [kat] SHA2-256
2,224,185 UART: [kat] SHA2-384
2,224,861 UART: [kat] SHA2-512-ACC
2,225,693 UART: [kat] ECC-384
3,776,576 UART: [kat] HMAC-384Kdf
3,803,288 UART: [kat] LMS
4,876,427 UART: [kat] --
4,879,997 UART: [cold-reset] ++
4,881,190 UART: [fht] FHT @ 0x50003400
4,892,654 UART: [idev] ++
4,893,337 UART: [idev] CDI.KEYID = 6
4,894,567 UART: [idev] SUBJECT.KEYID = 7
4,895,723 UART: [idev] UDS.KEYID = 0
4,931,483 UART: [idev] Erasing UDS.KEYID = 0
8,244,192 UART: [idev] Sha1 KeyId Algorithm
8,264,411 UART: [idev] CSR upload begun
8,269,870 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,577,310 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,593,827 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,609,688 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
10,625,732 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,650,170 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,797,153 UART: [idev] CSR uploaded
10,814,054 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
10,948,584 UART: [idev] --
10,949,233 UART: [ldev] ++
10,949,733 UART: [ldev] CDI.KEYID = 6
10,950,609 UART: [ldev] SUBJECT.KEYID = 5
10,951,656 UART: [ldev] AUTHORITY.KEYID = 7
10,952,833 UART: [ldev] FE.KEYID = 1
10,953,715 UART: [ldev] Erasing FE.KEYID = 1
14,195,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,507,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,523,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,539,577 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
16,555,452 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
16,575,533 UART: [ldev] --
16,579,711 UART: [fwproc] Wait for Commands...
16,582,292 UART: [fwproc] Recv command 0x46574c44
16,584,652 UART: [fwproc] Recv'd Img size: 106620 bytes
20,561,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,636,937 UART: [fwproc] Load FMC at address 0x40000000 len 11316
20,679,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
20,996,831 >>> mbox cmd response: success
20,997,210 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
21,000,956 UART: [afmc] ++
21,001,539 UART: [afmc] CDI.KEYID = 6
21,002,726 UART: [afmc] SUBJECT.KEYID = 7
21,003,883 UART: [afmc] AUTHORITY.KEYID = 5
24,360,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,659,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,661,533 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
26,677,652 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,693,682 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
26,709,585 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
26,732,846 UART: [afmc] --
26,736,824 UART: [cold-reset] --
26,740,310 UART: [state] Locking Datavault
26,746,541 UART: [state] Locking PCR0, PCR1 and PCR31
26,748,225 UART: [state] Locking ICCM
26,750,871 UART: [exit] Launching FMC @ 0x40000000
26,759,542 UART:
26,759,770 UART: Running Caliptra FMC ...
26,760,869 UART:
26,761,024 UART: [fmc] Received command: 0x10000001
26,762,482 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,782,201 UART: [fmc] LDEVID cert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
26,874,950 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,895,674 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
27,016,702 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
10,479,882 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
20,575,376 >>> mbox cmd response: success
20,575,839 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
26,275,445 UART:
26,275,851 UART: Running Caliptra FMC ...
26,276,945 UART:
26,277,100 UART: [fmc] Received command: 0x10000001
26,278,657 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,298,011 UART: [fmc] LDEVID cert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
26,390,801 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,411,499 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
26,532,506 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,216,413 UART:
2,217,388 UART: Running Caliptra ROM ...
2,218,479 UART:
2,218,641 UART: [state] CFI Enabled
2,219,526 UART: [state] LifecycleState = Unprovisioned
2,221,177 UART: [state] DebugLocked = No
2,222,288 UART: [state] WD Timer not started. Device not locked for debugging
2,224,761 UART: [kat] SHA2-256
2,225,422 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,228,423 UART: [kat] ++
2,228,888 UART: [kat] sha1
2,229,396 UART: [kat] SHA2-256
2,230,131 UART: [kat] SHA2-384
2,230,790 UART: [kat] SHA2-512-ACC
2,231,616 UART: [kat] ECC-384
4,096,906 UART: [kat] HMAC-384Kdf
4,108,839 UART: [kat] LMS
5,181,999 UART: [kat] --
5,185,155 UART: [cold-reset] ++
5,187,359 UART: [fht] FHT @ 0x50003400
5,197,737 UART: [idev] ++
5,198,411 UART: [idev] CDI.KEYID = 6
5,199,564 UART: [idev] SUBJECT.KEYID = 7
5,201,042 UART: [idev] UDS.KEYID = 0
5,217,802 UART: [idev] Erasing UDS.KEYID = 0
8,490,327 UART: [idev] Sha1 KeyId Algorithm
8,510,083 UART: [idev] CSR upload begun
8,515,553 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,806,446 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,822,808 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,838,922 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
10,854,962 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,879,356 UART: [idev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
11,026,236 UART: [idev] CSR uploaded
11,043,073 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
11,177,183 UART: [idev] --
11,177,821 UART: [ldev] ++
11,178,316 UART: [ldev] CDI.KEYID = 6
11,179,183 UART: [ldev] SUBJECT.KEYID = 5
11,180,221 UART: [ldev] AUTHORITY.KEYID = 7
11,181,401 UART: [ldev] FE.KEYID = 1
11,182,236 UART: [ldev] Erasing FE.KEYID = 1
14,352,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,643,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,659,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,675,645 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
16,691,517 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
16,712,275 UART: [ldev] --
16,717,158 UART: [fwproc] Wait for Commands...
16,720,166 UART: [fwproc] Recv command 0x46574c44
16,722,420 UART: [fwproc] Recv'd Img size: 106620 bytes
20,705,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,783,194 UART: [fwproc] Load FMC at address 0x40000000 len 11316
20,825,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
21,143,423 >>> mbox cmd response: success
21,143,823 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
21,147,884 UART: [afmc] ++
21,148,458 UART: [afmc] CDI.KEYID = 6
21,149,714 UART: [afmc] SUBJECT.KEYID = 7
21,150,810 UART: [afmc] AUTHORITY.KEYID = 5
24,468,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,764,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,766,377 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
26,782,459 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,798,484 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
26,814,436 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
26,837,354 UART: [afmc] --
26,841,328 UART: [cold-reset] --
26,844,224 UART: [state] Locking Datavault
26,849,794 UART: [state] Locking PCR0, PCR1 and PCR31
26,851,486 UART: [state] Locking ICCM
26,853,737 UART: [exit] Launching FMC @ 0x40000000
26,862,348 UART:
26,862,582 UART: Running Caliptra FMC ...
26,863,700 UART:
26,863,852 UART: [fmc] Received command: 0x10000001
26,865,302 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,885,055 UART: [fmc] LDEVID cert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
26,977,823 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,998,526 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
27,119,508 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
10,735,404 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
20,747,738 >>> mbox cmd response: success
20,748,277 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
26,385,030 UART:
26,385,423 UART: Running Caliptra FMC ...
26,386,629 UART:
26,386,789 UART: [fmc] Received command: 0x10000001
26,388,318 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,407,642 UART: [fmc] LDEVID cert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
26,500,386 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,521,108 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
26,642,129 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
2,215,172 UART:
2,216,158 UART: Running Caliptra ROM ...
2,217,268 UART:
2,217,429 UART: [state] CFI Enabled
2,218,290 UART: [state] LifecycleState = Unprovisioned
2,220,221 UART: [state] DebugLocked = No
2,221,378 UART: [state] WD Timer not started. Device not locked for debugging
2,223,866 UART: [kat] SHA2-256
2,224,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,548 UART: [kat] ++
2,227,999 UART: [kat] sha1
2,228,510 UART: [kat] SHA2-256
2,229,252 UART: [kat] SHA2-384
2,229,920 UART: [kat] SHA2-512-ACC
2,230,727 UART: [kat] ECC-384
2,945,171 UART: [kat] HMAC-384Kdf
2,969,046 UART: [kat] LMS
3,498,569 UART: [kat] --
3,503,159 UART: [cold-reset] ++
3,504,549 UART: [fht] FHT @ 0x50003400
3,514,837 UART: [idev] ++
3,515,405 UART: [idev] CDI.KEYID = 6
3,516,307 UART: [idev] SUBJECT.KEYID = 7
3,517,528 UART: [idev] UDS.KEYID = 0
3,540,943 UART: [idev] Erasing UDS.KEYID = 0
6,023,414 UART: [idev] Sha1 KeyId Algorithm
6,044,073 UART: [idev] CSR upload begun
6,048,802 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,777,796 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,793,860 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,809,812 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,825,735 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,849,376 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,995,221 UART: [idev] CSR uploaded
8,012,954 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
8,147,778 UART: [idev] --
8,148,422 UART: [ldev] ++
8,148,921 UART: [ldev] CDI.KEYID = 6
8,149,827 UART: [ldev] SUBJECT.KEYID = 5
8,150,975 UART: [ldev] AUTHORITY.KEYID = 7
8,152,156 UART: [ldev] FE.KEYID = 1
8,153,033 UART: [ldev] Erasing FE.KEYID = 1
10,563,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,300,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,316,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,332,188 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,347,968 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,369,739 UART: [ldev] --
12,374,189 UART: [fwproc] Wait for Commands...
12,376,555 UART: [fwproc] Recv command 0x46574c44
12,378,861 UART: [fwproc] Recv'd Img size: 106964 bytes
15,695,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,770,603 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,813,227 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,131,730 >>> mbox cmd response: success
16,132,095 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,136,919 UART: [afmc] ++
16,137,498 UART: [afmc] CDI.KEYID = 6
16,138,381 UART: [afmc] SUBJECT.KEYID = 7
16,139,594 UART: [afmc] AUTHORITY.KEYID = 5
18,676,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,404,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,405,976 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,422,082 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,437,975 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,453,796 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,476,000 UART: [afmc] --
20,480,467 UART: [cold-reset] --
20,484,385 UART: [state] Locking Datavault
20,489,578 UART: [state] Locking PCR0, PCR1 and PCR31
20,491,297 UART: [state] Locking ICCM
20,493,613 UART: [exit] Launching FMC @ 0x40000000
20,502,009 UART:
20,502,259 UART: Running Caliptra FMC ...
20,503,362 UART:
20,503,519 UART: [fmc] Received command: 0x10000001
20,504,978 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,524,644 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
20,617,411 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,638,122 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,759,130 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
7,687,655 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,726,917 >>> mbox cmd response: success
15,727,355 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,007,287 UART:
20,007,701 UART: Running Caliptra FMC ...
20,008,815 UART:
20,008,980 UART: [fmc] Received command: 0x10000001
20,010,718 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,029,963 UART: [fmc] LDEVID cert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
20,122,826 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,143,553 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,264,839 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
2,215,094 UART:
2,216,070 UART: Running Caliptra ROM ...
2,217,509 UART:
2,217,689 UART: [state] CFI Enabled
2,218,557 UART: [state] LifecycleState = Unprovisioned
2,220,245 UART: [state] DebugLocked = No
2,221,363 UART: [state] WD Timer not started. Device not locked for debugging
2,223,862 UART: [kat] SHA2-256
2,224,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,536 UART: [kat] ++
2,227,985 UART: [kat] sha1
2,228,499 UART: [kat] SHA2-256
2,229,238 UART: [kat] SHA2-384
2,229,901 UART: [kat] SHA2-512-ACC
2,230,730 UART: [kat] ECC-384
3,282,970 UART: [kat] HMAC-384Kdf
3,294,227 UART: [kat] LMS
3,823,684 UART: [kat] --
3,829,127 UART: [cold-reset] ++
3,830,888 UART: [fht] FHT @ 0x50003400
3,840,779 UART: [idev] ++
3,841,335 UART: [idev] CDI.KEYID = 6
3,842,304 UART: [idev] SUBJECT.KEYID = 7
3,843,478 UART: [idev] UDS.KEYID = 0
3,860,590 UART: [idev] Erasing UDS.KEYID = 0
6,319,992 UART: [idev] Sha1 KeyId Algorithm
6,341,265 UART: [idev] CSR upload begun
6,345,939 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,062,583 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,078,653 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,094,593 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,110,461 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,134,153 UART: [idev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
8,280,056 UART: [idev] CSR uploaded
8,298,066 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
8,432,452 UART: [idev] --
8,433,095 UART: [ldev] ++
8,433,595 UART: [ldev] CDI.KEYID = 6
8,434,468 UART: [ldev] SUBJECT.KEYID = 5
8,435,626 UART: [ldev] AUTHORITY.KEYID = 7
8,436,801 UART: [ldev] FE.KEYID = 1
8,437,690 UART: [ldev] Erasing FE.KEYID = 1
10,790,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,509,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,525,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,541,283 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,557,035 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,577,698 UART: [ldev] --
12,582,795 UART: [fwproc] Wait for Commands...
12,585,377 UART: [fwproc] Recv command 0x46574c44
12,587,413 UART: [fwproc] Recv'd Img size: 106964 bytes
15,902,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,977,126 UART: [fwproc] Load FMC at address 0x40000000 len 11316
16,019,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,337,088 >>> mbox cmd response: success
16,337,488 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,342,155 UART: [afmc] ++
16,342,733 UART: [afmc] CDI.KEYID = 6
16,343,643 UART: [afmc] SUBJECT.KEYID = 7
16,344,857 UART: [afmc] AUTHORITY.KEYID = 5
18,848,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,568,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,570,759 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,586,851 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,602,819 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,618,643 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,639,968 UART: [afmc] --
20,643,937 UART: [cold-reset] --
20,646,935 UART: [state] Locking Datavault
20,650,235 UART: [state] Locking PCR0, PCR1 and PCR31
20,651,929 UART: [state] Locking ICCM
20,654,639 UART: [exit] Launching FMC @ 0x40000000
20,662,987 UART:
20,663,218 UART: Running Caliptra FMC ...
20,664,314 UART:
20,664,469 UART: [fmc] Received command: 0x10000001
20,665,928 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,685,630 UART: [fmc] LDEVID cert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
20,778,447 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,799,123 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,920,112 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
7,945,355 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,906,859 >>> mbox cmd response: success
15,907,298 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,151,899 UART:
20,152,300 UART: Running Caliptra FMC ...
20,153,480 UART:
20,153,647 UART: [fmc] Received command: 0x10000001
20,155,177 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,174,571 UART: [fmc] LDEVID cert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
20,267,432 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,288,155 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,409,419 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
7,688,897 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,692,985 >>> mbox cmd response: success
15,693,469 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
19,990,779 UART:
19,991,170 UART: Running Caliptra FMC ...
19,992,241 UART:
19,992,393 UART: [fmc] Received command: 0x10000001
19,993,932 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,013,453 UART: [fmc] LDEVID cert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
20,106,310 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,126,981 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,248,250 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
7,944,368 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
15,915,018 >>> mbox cmd response: success
15,915,478 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,162,820 UART:
20,163,216 UART: Running Caliptra FMC ...
20,164,388 UART:
20,164,555 UART: [fmc] Received command: 0x10000001
20,166,116 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,185,508 UART: [fmc] LDEVID cert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
20,278,394 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,299,104 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,420,349 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
915,696 UART: [kat] HMAC-384Kdf
920,442 UART: [kat] LMS
1,168,754 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,145 UART: [fht] FHT @ 0x50003400
1,172,647 UART: [idev] ++
1,172,815 UART: [idev] CDI.KEYID = 6
1,173,176 UART: [idev] SUBJECT.KEYID = 7
1,173,601 UART: [idev] UDS.KEYID = 0
1,181,333 UART: [idev] Erasing UDS.KEYID = 0
1,198,487 UART: [idev] Sha1 KeyId Algorithm
1,206,851 UART: [idev] CSR upload begun
1,208,630 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,223 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,931 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,816 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,532 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,244,997 UART: [idev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
1,296,787 UART: [idev] CSR uploaded
1,299,832 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,300,001 UART: [idev] --
1,301,150 UART: [ldev] ++
1,301,318 UART: [ldev] CDI.KEYID = 6
1,301,682 UART: [ldev] SUBJECT.KEYID = 5
1,302,109 UART: [ldev] AUTHORITY.KEYID = 7
1,302,572 UART: [ldev] FE.KEYID = 1
1,307,894 UART: [ldev] Erasing FE.KEYID = 1
1,333,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,116 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,840 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,895 UART: [ldev] --
1,373,295 UART: [fwproc] Wait for Commands...
1,373,960 UART: [fwproc] Recv command 0x46574c44
1,374,693 UART: [fwproc] Recv'd Img size: 106964 bytes
2,585,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,457 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,631,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,767,540 >>> mbox cmd response: success
2,767,540 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,768,719 UART: [afmc] ++
2,768,887 UART: [afmc] CDI.KEYID = 6
2,769,250 UART: [afmc] SUBJECT.KEYID = 7
2,769,676 UART: [afmc] AUTHORITY.KEYID = 5
2,805,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,287 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,828,007 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,900 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,839,605 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,847,404 UART: [afmc] --
2,848,318 UART: [cold-reset] --
2,849,314 UART: [state] Locking Datavault
2,850,733 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,337 UART: [state] Locking ICCM
2,852,007 UART: [exit] Launching FMC @ 0x40000000
2,857,304 UART:
2,857,320 UART: Running Caliptra FMC ...
2,857,728 UART:
2,857,866 UART: [fmc] Received command: 0x10000001
2,858,959 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,877,819 UART: [fmc] LDEVID cert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
2,968,796 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,988,387 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,106,922 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,348 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,546,289 >>> mbox cmd response: success
2,546,289 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,608,432 UART:
2,608,448 UART: Running Caliptra FMC ...
2,608,856 UART:
2,608,994 UART: [fmc] Received command: 0x10000001
2,610,087 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,628,947 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,719,924 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,515 UART: [fmc] FMCALIAS cert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
2,858,050 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,586 UART: [kat] ++
895,738 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,225 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,182,088 UART: [idev] Erasing UDS.KEYID = 0
1,199,178 UART: [idev] Sha1 KeyId Algorithm
1,207,484 UART: [idev] CSR upload begun
1,209,263 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,002 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,710 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,595 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,311 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,776 UART: [idev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
1,297,566 UART: [idev] CSR uploaded
1,300,611 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,300,780 UART: [idev] --
1,302,001 UART: [ldev] ++
1,302,169 UART: [ldev] CDI.KEYID = 6
1,302,533 UART: [ldev] SUBJECT.KEYID = 5
1,302,960 UART: [ldev] AUTHORITY.KEYID = 7
1,303,423 UART: [ldev] FE.KEYID = 1
1,308,999 UART: [ldev] Erasing FE.KEYID = 1
1,335,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,655 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,379 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,558 UART: [ldev] --
1,374,996 UART: [fwproc] Wait for Commands...
1,375,801 UART: [fwproc] Recv command 0x46574c44
1,376,534 UART: [fwproc] Recv'd Img size: 106964 bytes
2,589,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,174 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,634,257 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,770,147 >>> mbox cmd response: success
2,770,147 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,771,308 UART: [afmc] ++
2,771,476 UART: [afmc] CDI.KEYID = 6
2,771,839 UART: [afmc] SUBJECT.KEYID = 7
2,772,265 UART: [afmc] AUTHORITY.KEYID = 5
2,806,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,644 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,829,364 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,835,257 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,840,962 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,848,883 UART: [afmc] --
2,849,953 UART: [cold-reset] --
2,850,755 UART: [state] Locking Datavault
2,851,948 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,552 UART: [state] Locking ICCM
2,853,122 UART: [exit] Launching FMC @ 0x40000000
2,858,419 UART:
2,858,435 UART: Running Caliptra FMC ...
2,858,843 UART:
2,858,981 UART: [fmc] Received command: 0x10000001
2,860,074 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,878,934 UART: [fmc] LDEVID cert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
2,969,911 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,989,502 UART: [fmc] FMCALIAS cert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
3,108,037 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,349 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,545,496 >>> mbox cmd response: success
2,545,496 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,607,701 UART:
2,607,717 UART: Running Caliptra FMC ...
2,608,125 UART:
2,608,263 UART: [fmc] Received command: 0x10000001
2,609,356 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,628,216 UART: [fmc] LDEVID cert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
2,719,193 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,784 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,857,319 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,464 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,199 UART: [cold-reset] ++
1,170,705 UART: [fht] FHT @ 0x50003400
1,173,431 UART: [idev] ++
1,173,599 UART: [idev] CDI.KEYID = 6
1,173,960 UART: [idev] SUBJECT.KEYID = 7
1,174,385 UART: [idev] UDS.KEYID = 0
1,182,869 UART: [idev] Erasing UDS.KEYID = 0
1,200,387 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] CSR upload begun
1,210,544 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,519 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,227 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,112 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,238,828 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,247,293 UART: [idev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
1,299,083 UART: [idev] CSR uploaded
1,302,128 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,302,297 UART: [idev] --
1,303,144 UART: [ldev] ++
1,303,312 UART: [ldev] CDI.KEYID = 6
1,303,676 UART: [ldev] SUBJECT.KEYID = 5
1,304,103 UART: [ldev] AUTHORITY.KEYID = 7
1,304,566 UART: [ldev] FE.KEYID = 1
1,309,668 UART: [ldev] Erasing FE.KEYID = 1
1,336,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,361,140 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,864 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,374,103 UART: [ldev] --
1,375,571 UART: [fwproc] Wait for Commands...
1,376,182 UART: [fwproc] Recv command 0x46574c44
1,376,915 UART: [fwproc] Recv'd Img size: 106964 bytes
2,589,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,785 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,634,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,770,788 >>> mbox cmd response: success
2,770,788 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,772,043 UART: [afmc] ++
2,772,211 UART: [afmc] CDI.KEYID = 6
2,772,574 UART: [afmc] SUBJECT.KEYID = 7
2,773,000 UART: [afmc] AUTHORITY.KEYID = 5
2,807,874 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,821 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,830,541 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,836,434 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,842,139 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,850,062 UART: [afmc] --
2,851,024 UART: [cold-reset] --
2,851,964 UART: [state] Locking Datavault
2,852,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,359 UART: [state] Locking ICCM
2,853,881 UART: [exit] Launching FMC @ 0x40000000
2,859,178 UART:
2,859,194 UART: Running Caliptra FMC ...
2,859,602 UART:
2,859,740 UART: [fmc] Received command: 0x10000001
2,860,833 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,879,693 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,970,670 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,990,261 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,108,796 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,002 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,544,255 >>> mbox cmd response: success
2,544,255 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,606,688 UART:
2,606,704 UART: Running Caliptra FMC ...
2,607,112 UART:
2,607,250 UART: [fmc] Received command: 0x10000001
2,608,343 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,627,203 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,718,180 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,771 UART: [fmc] FMCALIAS cert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
2,856,306 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Unprovisioned
85,612 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,271 UART: [kat] SHA2-512-ACC
906,172 UART: [kat] ECC-384
915,751 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,044 UART: [idev] ++
1,173,212 UART: [idev] CDI.KEYID = 6
1,173,573 UART: [idev] SUBJECT.KEYID = 7
1,173,998 UART: [idev] UDS.KEYID = 0
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,207,812 UART: [idev] CSR upload begun
1,209,591 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,226 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,934 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,819 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,535 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,000 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,297,790 UART: [idev] CSR uploaded
1,300,835 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,301,004 UART: [idev] --
1,302,045 UART: [ldev] ++
1,302,213 UART: [ldev] CDI.KEYID = 6
1,302,577 UART: [ldev] SUBJECT.KEYID = 5
1,303,004 UART: [ldev] AUTHORITY.KEYID = 7
1,303,467 UART: [ldev] FE.KEYID = 1
1,308,491 UART: [ldev] Erasing FE.KEYID = 1
1,334,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,063 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,787 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,092 UART: [ldev] --
1,374,558 UART: [fwproc] Wait for Commands...
1,375,355 UART: [fwproc] Recv command 0x46574c44
1,376,088 UART: [fwproc] Recv'd Img size: 106964 bytes
2,587,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,072 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,633,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,769,227 >>> mbox cmd response: success
2,769,227 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,770,260 UART: [afmc] ++
2,770,428 UART: [afmc] CDI.KEYID = 6
2,770,791 UART: [afmc] SUBJECT.KEYID = 7
2,771,217 UART: [afmc] AUTHORITY.KEYID = 5
2,806,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,108 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,829,828 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,835,721 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,841,426 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,849,163 UART: [afmc] --
2,850,105 UART: [cold-reset] --
2,850,811 UART: [state] Locking Datavault
2,852,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,734 UART: [state] Locking ICCM
2,853,406 UART: [exit] Launching FMC @ 0x40000000
2,858,703 UART:
2,858,719 UART: Running Caliptra FMC ...
2,859,127 UART:
2,859,265 UART: [fmc] Received command: 0x10000001
2,860,358 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,879,218 UART: [fmc] LDEVID cert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
2,970,195 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,989,786 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,108,321 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,257 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,545,410 >>> mbox cmd response: success
2,545,410 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,607,005 UART:
2,607,021 UART: Running Caliptra FMC ...
2,607,429 UART:
2,607,567 UART: [fmc] Received command: 0x10000001
2,608,660 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,627,520 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,718,497 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,088 UART: [fmc] FMCALIAS cert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
2,856,623 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,588 UART: [state] LifecycleState = Unprovisioned
86,243 UART: [state] DebugLocked = No
86,915 UART: [state] WD Timer not started. Device not locked for debugging
88,108 UART: [kat] SHA2-256
891,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,787 UART: [kat] ++
895,939 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,295 UART: [fht] FHT @ 0x50003400
1,172,939 UART: [idev] ++
1,173,107 UART: [idev] CDI.KEYID = 6
1,173,468 UART: [idev] SUBJECT.KEYID = 7
1,173,893 UART: [idev] UDS.KEYID = 0
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,097 UART: [idev] CSR upload begun
1,208,876 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,533 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,241 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,126 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,842 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,307 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,297,097 UART: [idev] CSR uploaded
1,300,142 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,300,311 UART: [idev] --
1,301,368 UART: [ldev] ++
1,301,536 UART: [ldev] CDI.KEYID = 6
1,301,900 UART: [ldev] SUBJECT.KEYID = 5
1,302,327 UART: [ldev] AUTHORITY.KEYID = 7
1,302,790 UART: [ldev] FE.KEYID = 1
1,307,778 UART: [ldev] Erasing FE.KEYID = 1
1,333,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,936 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,660 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,689 UART: [ldev] --
1,373,023 UART: [fwproc] Wait for Commands...
1,373,632 UART: [fwproc] Recv command 0x46574c44
1,374,365 UART: [fwproc] Recv'd Img size: 106964 bytes
2,587,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,211 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,632,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,768,176 >>> mbox cmd response: success
2,768,176 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,769,445 UART: [afmc] ++
2,769,613 UART: [afmc] CDI.KEYID = 6
2,769,976 UART: [afmc] SUBJECT.KEYID = 7
2,770,402 UART: [afmc] AUTHORITY.KEYID = 5
2,805,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,238 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,989 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,828,709 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,834,602 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,840,307 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,848,268 UART: [afmc] --
2,849,364 UART: [cold-reset] --
2,850,158 UART: [state] Locking Datavault
2,851,345 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,949 UART: [state] Locking ICCM
2,852,457 UART: [exit] Launching FMC @ 0x40000000
2,857,754 UART:
2,857,770 UART: Running Caliptra FMC ...
2,858,178 UART:
2,858,316 UART: [fmc] Received command: 0x10000001
2,859,409 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,878,269 UART: [fmc] LDEVID cert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
2,969,246 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,988,837 UART: [fmc] FMCALIAS cert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
3,107,372 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,558 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,544,305 >>> mbox cmd response: success
2,544,305 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,605,856 UART:
2,605,872 UART: Running Caliptra FMC ...
2,606,280 UART:
2,606,418 UART: [fmc] Received command: 0x10000001
2,607,511 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,371 UART: [fmc] LDEVID cert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
2,717,348 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,939 UART: [fmc] FMCALIAS cert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
2,855,474 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,985 UART: [state] LifecycleState = Unprovisioned
85,640 UART: [state] DebugLocked = No
86,282 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [kat] SHA2-256
891,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,564 UART: [kat] SHA2-256
901,504 UART: [kat] SHA2-384
904,343 UART: [kat] SHA2-512-ACC
906,244 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,568 UART: [cold-reset] ++
1,169,978 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,181,826 UART: [idev] Erasing UDS.KEYID = 0
1,199,376 UART: [idev] Sha1 KeyId Algorithm
1,207,706 UART: [idev] CSR upload begun
1,209,485 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,306 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,014 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,899 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,615 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,080 UART: [idev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
1,297,870 UART: [idev] CSR uploaded
1,300,915 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,301,084 UART: [idev] --
1,302,253 UART: [ldev] ++
1,302,421 UART: [ldev] CDI.KEYID = 6
1,302,785 UART: [ldev] SUBJECT.KEYID = 5
1,303,212 UART: [ldev] AUTHORITY.KEYID = 7
1,303,675 UART: [ldev] FE.KEYID = 1
1,308,983 UART: [ldev] Erasing FE.KEYID = 1
1,335,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,971 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,695 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,864 UART: [ldev] --
1,375,138 UART: [fwproc] Wait for Commands...
1,375,781 UART: [fwproc] Recv command 0x46574c44
1,376,514 UART: [fwproc] Recv'd Img size: 106964 bytes
2,590,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,046 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,635,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,187 >>> mbox cmd response: success
2,771,187 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,772,304 UART: [afmc] ++
2,772,472 UART: [afmc] CDI.KEYID = 6
2,772,835 UART: [afmc] SUBJECT.KEYID = 7
2,773,261 UART: [afmc] AUTHORITY.KEYID = 5
2,808,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,624 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,831,344 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,837,237 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,842,942 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,850,805 UART: [afmc] --
2,851,875 UART: [cold-reset] --
2,852,787 UART: [state] Locking Datavault
2,853,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,478 UART: [state] Locking ICCM
2,855,006 UART: [exit] Launching FMC @ 0x40000000
2,860,303 UART:
2,860,319 UART: Running Caliptra FMC ...
2,860,727 UART:
2,860,865 UART: [fmc] Received command: 0x10000001
2,861,958 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,880,818 UART: [fmc] LDEVID cert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
2,971,795 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,991,386 UART: [fmc] FMCALIAS cert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
3,109,921 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,645 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,543,406 >>> mbox cmd response: success
2,543,406 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,605,477 UART:
2,605,493 UART: Running Caliptra FMC ...
2,605,901 UART:
2,606,039 UART: [fmc] Received command: 0x10000001
2,607,132 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,625,992 UART: [fmc] LDEVID cert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
2,716,969 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,560 UART: [fmc] FMCALIAS cert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
2,855,095 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
5,436 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
191,974 UART:
192,370 UART: Running Caliptra ROM ...
193,589 UART:
193,746 UART: [state] CFI Enabled
262,273 UART: [state] LifecycleState = Unprovisioned
264,641 UART: [state] DebugLocked = No
266,667 UART: [state] WD Timer not started. Device not locked for debugging
271,569 UART: [kat] SHA2-256
453,460 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,020 UART: [kat] ++
465,521 UART: [kat] sha1
477,158 UART: [kat] SHA2-256
480,171 UART: [kat] SHA2-384
484,748 UART: [kat] SHA2-512-ACC
487,369 UART: [kat] ECC-384
3,774,028 UART: [kat] HMAC-384Kdf
3,801,458 UART: [kat] LMS
4,874,621 UART: [kat] --
4,878,714 UART: [cold-reset] ++
4,880,765 UART: [fht] FHT @ 0x50003400
4,891,859 UART: [idev] ++
4,892,540 UART: [idev] CDI.KEYID = 6
4,893,654 UART: [idev] SUBJECT.KEYID = 7
4,894,869 UART: [idev] UDS.KEYID = 0
4,928,982 UART: [idev] Erasing UDS.KEYID = 0
8,241,664 UART: [idev] Sha1 KeyId Algorithm
8,264,738 UART: [idev] --
8,267,169 UART: [ldev] ++
8,267,740 UART: [ldev] CDI.KEYID = 6
8,268,926 UART: [ldev] SUBJECT.KEYID = 5
8,270,081 UART: [ldev] AUTHORITY.KEYID = 7
8,271,315 UART: [ldev] FE.KEYID = 1
8,317,436 UART: [ldev] Erasing FE.KEYID = 1
11,651,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,002 UART: [ldev] --
14,037,011 UART: [fwproc] Wait for Commands...
14,038,575 UART: [fwproc] Recv command 0x46574c44
14,040,850 UART: [fwproc] Recv'd Img size: 114124 bytes
16,981,633 UART: ROM Fatal Error: 0x000B0014
16,985,102 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
5,525 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,792,198 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
6,567 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,505 UART:
192,899 UART: Running Caliptra ROM ...
194,039 UART:
603,590 UART: [state] CFI Enabled
617,953 UART: [state] LifecycleState = Unprovisioned
620,292 UART: [state] DebugLocked = No
623,207 UART: [state] WD Timer not started. Device not locked for debugging
627,343 UART: [kat] SHA2-256
809,327 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,864 UART: [kat] ++
821,366 UART: [kat] sha1
830,893 UART: [kat] SHA2-256
833,939 UART: [kat] SHA2-384
838,915 UART: [kat] SHA2-512-ACC
841,534 UART: [kat] ECC-384
4,096,211 UART: [kat] HMAC-384Kdf
4,108,945 UART: [kat] LMS
5,182,076 UART: [kat] --
5,187,231 UART: [cold-reset] ++
5,189,223 UART: [fht] FHT @ 0x50003400
5,200,901 UART: [idev] ++
5,201,572 UART: [idev] CDI.KEYID = 6
5,202,727 UART: [idev] SUBJECT.KEYID = 7
5,204,274 UART: [idev] UDS.KEYID = 0
5,221,412 UART: [idev] Erasing UDS.KEYID = 0
8,493,640 UART: [idev] Sha1 KeyId Algorithm
8,515,974 UART: [idev] --
8,519,632 UART: [ldev] ++
8,520,205 UART: [ldev] CDI.KEYID = 6
8,521,383 UART: [ldev] SUBJECT.KEYID = 5
8,522,873 UART: [ldev] AUTHORITY.KEYID = 7
8,524,359 UART: [ldev] FE.KEYID = 1
8,536,252 UART: [ldev] Erasing FE.KEYID = 1
11,822,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,114,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,162,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,636 UART: [ldev] --
14,186,765 UART: [fwproc] Wait for Commands...
14,189,993 UART: [fwproc] Recv command 0x46574c44
14,192,316 UART: [fwproc] Recv'd Img size: 114124 bytes
17,140,333 UART: ROM Fatal Error: 0x000B0014
17,143,791 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
6,964 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,965,515 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
5,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,032 UART:
192,423 UART: Running Caliptra ROM ...
193,591 UART:
193,769 UART: [state] CFI Enabled
264,102 UART: [state] LifecycleState = Unprovisioned
266,016 UART: [state] DebugLocked = No
268,219 UART: [state] WD Timer not started. Device not locked for debugging
272,396 UART: [kat] SHA2-256
451,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,078 UART: [kat] ++
463,643 UART: [kat] sha1
474,420 UART: [kat] SHA2-256
477,425 UART: [kat] SHA2-384
482,431 UART: [kat] SHA2-512-ACC
485,371 UART: [kat] ECC-384
2,949,114 UART: [kat] HMAC-384Kdf
2,972,432 UART: [kat] LMS
3,501,839 UART: [kat] --
3,507,585 UART: [cold-reset] ++
3,509,791 UART: [fht] FHT @ 0x50003400
3,520,394 UART: [idev] ++
3,520,957 UART: [idev] CDI.KEYID = 6
3,521,866 UART: [idev] SUBJECT.KEYID = 7
3,523,080 UART: [idev] UDS.KEYID = 0
3,543,810 UART: [idev] Erasing UDS.KEYID = 0
6,025,150 UART: [idev] Sha1 KeyId Algorithm
6,047,586 UART: [idev] --
6,051,101 UART: [ldev] ++
6,051,673 UART: [ldev] CDI.KEYID = 6
6,052,563 UART: [ldev] SUBJECT.KEYID = 5
6,053,667 UART: [ldev] AUTHORITY.KEYID = 7
6,055,019 UART: [ldev] FE.KEYID = 1
6,100,051 UART: [ldev] Erasing FE.KEYID = 1
8,603,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,692 UART: [ldev] --
10,413,065 UART: [fwproc] Wait for Commands...
10,414,680 UART: [fwproc] Recv command 0x46574c44
10,416,779 UART: [fwproc] Recv'd Img size: 114448 bytes
12,706,441 UART: ROM Fatal Error: 0x000B0014
12,709,573 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
5,528 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,511,903 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
6,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,495 UART:
192,901 UART: Running Caliptra ROM ...
194,069 UART:
603,624 UART: [state] CFI Enabled
619,520 UART: [state] LifecycleState = Unprovisioned
621,345 UART: [state] DebugLocked = No
623,441 UART: [state] WD Timer not started. Device not locked for debugging
627,242 UART: [kat] SHA2-256
806,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,938 UART: [kat] ++
818,383 UART: [kat] sha1
829,042 UART: [kat] SHA2-256
832,043 UART: [kat] SHA2-384
838,344 UART: [kat] SHA2-512-ACC
841,280 UART: [kat] ECC-384
3,282,575 UART: [kat] HMAC-384Kdf
3,295,025 UART: [kat] LMS
3,824,474 UART: [kat] --
3,830,777 UART: [cold-reset] ++
3,832,377 UART: [fht] FHT @ 0x50003400
3,844,866 UART: [idev] ++
3,845,425 UART: [idev] CDI.KEYID = 6
3,846,365 UART: [idev] SUBJECT.KEYID = 7
3,847,521 UART: [idev] UDS.KEYID = 0
3,863,638 UART: [idev] Erasing UDS.KEYID = 0
6,323,072 UART: [idev] Sha1 KeyId Algorithm
6,346,070 UART: [idev] --
6,348,522 UART: [ldev] ++
6,349,097 UART: [ldev] CDI.KEYID = 6
6,350,008 UART: [ldev] SUBJECT.KEYID = 5
6,351,224 UART: [ldev] AUTHORITY.KEYID = 7
6,352,453 UART: [ldev] FE.KEYID = 1
6,360,721 UART: [ldev] Erasing FE.KEYID = 1
8,836,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,301 UART: [ldev] --
10,626,482 UART: [fwproc] Wait for Commands...
10,628,848 UART: [fwproc] Recv command 0x46574c44
10,630,946 UART: [fwproc] Recv'd Img size: 114448 bytes
12,916,740 UART: ROM Fatal Error: 0x000B0014
12,919,868 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
6,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,686,218 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
5,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,498,770 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
6,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,695,211 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,421 UART: [fht] FHT @ 0x50003400
1,172,983 UART: [idev] ++
1,173,151 UART: [idev] CDI.KEYID = 6
1,173,512 UART: [idev] SUBJECT.KEYID = 7
1,173,937 UART: [idev] UDS.KEYID = 0
1,182,115 UART: [idev] Erasing UDS.KEYID = 0
1,199,193 UART: [idev] Sha1 KeyId Algorithm
1,208,151 UART: [idev] --
1,209,274 UART: [ldev] ++
1,209,442 UART: [ldev] CDI.KEYID = 6
1,209,806 UART: [ldev] SUBJECT.KEYID = 5
1,210,233 UART: [ldev] AUTHORITY.KEYID = 7
1,210,696 UART: [ldev] FE.KEYID = 1
1,215,990 UART: [ldev] Erasing FE.KEYID = 1
1,241,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,412 UART: [ldev] --
1,280,888 UART: [fwproc] Wait for Commands...
1,281,561 UART: [fwproc] Recv command 0x46574c44
1,282,294 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,811 UART: ROM Fatal Error: 0x000B0014
1,548,968 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,545 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,527 UART: [kat] SHA2-512-ACC
906,428 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,624 UART: [fht] FHT @ 0x50003400
1,173,330 UART: [idev] ++
1,173,498 UART: [idev] CDI.KEYID = 6
1,173,859 UART: [idev] SUBJECT.KEYID = 7
1,174,284 UART: [idev] UDS.KEYID = 0
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,207,968 UART: [idev] --
1,208,943 UART: [ldev] ++
1,209,111 UART: [ldev] CDI.KEYID = 6
1,209,475 UART: [ldev] SUBJECT.KEYID = 5
1,209,902 UART: [ldev] AUTHORITY.KEYID = 7
1,210,365 UART: [ldev] FE.KEYID = 1
1,215,613 UART: [ldev] Erasing FE.KEYID = 1
1,242,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,929 UART: [ldev] --
1,281,347 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,681 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,326 UART: ROM Fatal Error: 0x000B0014
1,550,483 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,024 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,340 UART: [kat] LMS
1,168,652 UART: [kat] --
1,169,453 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,777 UART: [idev] ++
1,172,945 UART: [idev] CDI.KEYID = 6
1,173,306 UART: [idev] SUBJECT.KEYID = 7
1,173,731 UART: [idev] UDS.KEYID = 0
1,181,933 UART: [idev] Erasing UDS.KEYID = 0
1,199,061 UART: [idev] Sha1 KeyId Algorithm
1,207,985 UART: [idev] --
1,208,960 UART: [ldev] ++
1,209,128 UART: [ldev] CDI.KEYID = 6
1,209,492 UART: [ldev] SUBJECT.KEYID = 5
1,209,919 UART: [ldev] AUTHORITY.KEYID = 7
1,210,382 UART: [ldev] FE.KEYID = 1
1,215,572 UART: [ldev] Erasing FE.KEYID = 1
1,242,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,982 UART: [ldev] --
1,281,388 UART: [fwproc] Wait for Commands...
1,282,173 UART: [fwproc] Recv command 0x46574c44
1,282,906 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,181 UART: ROM Fatal Error: 0x000B0014
1,549,338 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,629 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
916,539 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,448 UART: [cold-reset] ++
1,170,800 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,200,096 UART: [idev] Sha1 KeyId Algorithm
1,208,976 UART: [idev] --
1,210,157 UART: [ldev] ++
1,210,325 UART: [ldev] CDI.KEYID = 6
1,210,689 UART: [ldev] SUBJECT.KEYID = 5
1,211,116 UART: [ldev] AUTHORITY.KEYID = 7
1,211,579 UART: [ldev] FE.KEYID = 1
1,216,775 UART: [ldev] Erasing FE.KEYID = 1
1,243,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,943 UART: [ldev] --
1,282,289 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,979 UART: ROM Fatal Error: 0x000B0014
1,550,136 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,034 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
915,494 UART: [kat] HMAC-384Kdf
919,834 UART: [kat] LMS
1,168,146 UART: [kat] --
1,169,009 UART: [cold-reset] ++
1,169,385 UART: [fht] FHT @ 0x50003400
1,171,923 UART: [idev] ++
1,172,091 UART: [idev] CDI.KEYID = 6
1,172,452 UART: [idev] SUBJECT.KEYID = 7
1,172,877 UART: [idev] UDS.KEYID = 0
1,180,925 UART: [idev] Erasing UDS.KEYID = 0
1,197,591 UART: [idev] Sha1 KeyId Algorithm
1,206,561 UART: [idev] --
1,207,650 UART: [ldev] ++
1,207,818 UART: [ldev] CDI.KEYID = 6
1,208,182 UART: [ldev] SUBJECT.KEYID = 5
1,208,609 UART: [ldev] AUTHORITY.KEYID = 7
1,209,072 UART: [ldev] FE.KEYID = 1
1,214,144 UART: [ldev] Erasing FE.KEYID = 1
1,240,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,368 UART: [ldev] --
1,279,828 UART: [fwproc] Wait for Commands...
1,280,553 UART: [fwproc] Recv command 0x46574c44
1,281,286 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,703 UART: ROM Fatal Error: 0x000B0014
1,548,860 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,111 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,023 UART: [state] LifecycleState = Unprovisioned
85,678 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,607 UART: [kat] SHA2-256
891,157 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,286 UART: [kat] ++
895,438 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,853 UART: [kat] LMS
1,169,165 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,024 UART: [idev] ++
1,173,192 UART: [idev] CDI.KEYID = 6
1,173,553 UART: [idev] SUBJECT.KEYID = 7
1,173,978 UART: [idev] UDS.KEYID = 0
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,199,356 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,517 UART: [ldev] ++
1,209,685 UART: [ldev] CDI.KEYID = 6
1,210,049 UART: [ldev] SUBJECT.KEYID = 5
1,210,476 UART: [ldev] AUTHORITY.KEYID = 7
1,210,939 UART: [ldev] FE.KEYID = 1
1,216,141 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,265 UART: [ldev] --
1,281,647 UART: [fwproc] Wait for Commands...
1,282,438 UART: [fwproc] Recv command 0x46574c44
1,283,171 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,566 UART: ROM Fatal Error: 0x000B0014
1,550,723 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,112 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,569 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,330 UART:
192,711 UART: Running Caliptra ROM ...
193,846 UART:
193,992 UART: [state] CFI Enabled
262,328 UART: [state] LifecycleState = Unprovisioned
264,740 UART: [state] DebugLocked = No
267,140 UART: [state] WD Timer not started. Device not locked for debugging
271,359 UART: [kat] SHA2-256
453,283 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,784 UART: [kat] ++
465,485 UART: [kat] sha1
476,538 UART: [kat] SHA2-256
479,588 UART: [kat] SHA2-384
486,111 UART: [kat] SHA2-512-ACC
488,736 UART: [kat] ECC-384
3,776,030 UART: [kat] HMAC-384Kdf
3,802,431 UART: [kat] LMS
4,875,585 UART: [kat] --
4,880,400 UART: [cold-reset] ++
4,882,158 UART: [fht] FHT @ 0x50003400
4,894,020 UART: [idev] ++
4,894,704 UART: [idev] CDI.KEYID = 6
4,895,910 UART: [idev] SUBJECT.KEYID = 7
4,897,020 UART: [idev] UDS.KEYID = 0
4,929,690 UART: [idev] Erasing UDS.KEYID = 0
8,243,319 UART: [idev] Sha1 KeyId Algorithm
8,265,693 UART: [idev] --
8,269,955 UART: [ldev] ++
8,270,527 UART: [ldev] CDI.KEYID = 6
8,271,770 UART: [ldev] SUBJECT.KEYID = 5
8,272,799 UART: [ldev] AUTHORITY.KEYID = 7
8,274,138 UART: [ldev] FE.KEYID = 1
8,318,144 UART: [ldev] Erasing FE.KEYID = 1
11,656,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,295 UART: [ldev] --
14,038,873 UART: [fwproc] Wait for Commands...
14,040,869 UART: [fwproc] Recv command 0x46574c44
14,043,196 UART: [fwproc] Recv'd Img size: 114124 bytes
16,990,676 UART: ROM Fatal Error: 0x000B0024
16,994,107 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,595 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,788,912 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,837 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,563 UART:
192,944 UART: Running Caliptra ROM ...
194,165 UART:
603,643 UART: [state] CFI Enabled
616,672 UART: [state] LifecycleState = Unprovisioned
619,050 UART: [state] DebugLocked = No
620,859 UART: [state] WD Timer not started. Device not locked for debugging
624,966 UART: [kat] SHA2-256
806,942 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,480 UART: [kat] ++
819,070 UART: [kat] sha1
829,139 UART: [kat] SHA2-256
832,204 UART: [kat] SHA2-384
839,042 UART: [kat] SHA2-512-ACC
841,654 UART: [kat] ECC-384
4,099,361 UART: [kat] HMAC-384Kdf
4,111,123 UART: [kat] LMS
5,184,271 UART: [kat] --
5,188,389 UART: [cold-reset] ++
5,189,662 UART: [fht] FHT @ 0x50003400
5,202,481 UART: [idev] ++
5,203,151 UART: [idev] CDI.KEYID = 6
5,204,384 UART: [idev] SUBJECT.KEYID = 7
5,205,812 UART: [idev] UDS.KEYID = 0
5,222,382 UART: [idev] Erasing UDS.KEYID = 0
8,495,849 UART: [idev] Sha1 KeyId Algorithm
8,517,243 UART: [idev] --
8,521,726 UART: [ldev] ++
8,522,292 UART: [ldev] CDI.KEYID = 6
8,523,529 UART: [ldev] SUBJECT.KEYID = 5
8,524,961 UART: [ldev] AUTHORITY.KEYID = 7
8,526,517 UART: [ldev] FE.KEYID = 1
8,537,811 UART: [ldev] Erasing FE.KEYID = 1
11,830,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,582 UART: [ldev] --
14,195,714 UART: [fwproc] Wait for Commands...
14,198,725 UART: [fwproc] Recv command 0x46574c44
14,201,040 UART: [fwproc] Recv'd Img size: 114124 bytes
17,151,526 UART: ROM Fatal Error: 0x000B0024
17,154,982 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,508 writing to cptra_bootfsm_go
3,880 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,964,372 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,230 UART:
192,611 UART: Running Caliptra ROM ...
193,839 UART:
193,993 UART: [state] CFI Enabled
262,915 UART: [state] LifecycleState = Unprovisioned
264,833 UART: [state] DebugLocked = No
266,863 UART: [state] WD Timer not started. Device not locked for debugging
270,276 UART: [kat] SHA2-256
449,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,987 UART: [kat] ++
461,517 UART: [kat] sha1
472,400 UART: [kat] SHA2-256
475,402 UART: [kat] SHA2-384
481,421 UART: [kat] SHA2-512-ACC
484,401 UART: [kat] ECC-384
2,947,221 UART: [kat] HMAC-384Kdf
2,973,235 UART: [kat] LMS
3,502,656 UART: [kat] --
3,506,688 UART: [cold-reset] ++
3,509,275 UART: [fht] FHT @ 0x50003400
3,520,421 UART: [idev] ++
3,521,025 UART: [idev] CDI.KEYID = 6
3,521,961 UART: [idev] SUBJECT.KEYID = 7
3,523,073 UART: [idev] UDS.KEYID = 0
3,545,369 UART: [idev] Erasing UDS.KEYID = 0
6,027,391 UART: [idev] Sha1 KeyId Algorithm
6,050,960 UART: [idev] --
6,055,227 UART: [ldev] ++
6,055,835 UART: [ldev] CDI.KEYID = 6
6,056,749 UART: [ldev] SUBJECT.KEYID = 5
6,057,916 UART: [ldev] AUTHORITY.KEYID = 7
6,059,151 UART: [ldev] FE.KEYID = 1
6,101,562 UART: [ldev] Erasing FE.KEYID = 1
8,604,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,021 UART: [ldev] --
10,414,177 UART: [fwproc] Wait for Commands...
10,415,955 UART: [fwproc] Recv command 0x46574c44
10,418,052 UART: [fwproc] Recv'd Img size: 114448 bytes
12,712,011 UART: ROM Fatal Error: 0x000B0024
12,715,138 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,491,610 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
3,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,568 UART:
192,964 UART: Running Caliptra ROM ...
194,077 UART:
603,604 UART: [state] CFI Enabled
615,819 UART: [state] LifecycleState = Unprovisioned
617,713 UART: [state] DebugLocked = No
620,572 UART: [state] WD Timer not started. Device not locked for debugging
624,953 UART: [kat] SHA2-256
804,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,640 UART: [kat] ++
816,175 UART: [kat] sha1
827,346 UART: [kat] SHA2-256
830,403 UART: [kat] SHA2-384
836,510 UART: [kat] SHA2-512-ACC
839,484 UART: [kat] ECC-384
3,278,700 UART: [kat] HMAC-384Kdf
3,291,686 UART: [kat] LMS
3,821,141 UART: [kat] --
3,825,939 UART: [cold-reset] ++
3,828,567 UART: [fht] FHT @ 0x50003400
3,838,142 UART: [idev] ++
3,838,697 UART: [idev] CDI.KEYID = 6
3,839,604 UART: [idev] SUBJECT.KEYID = 7
3,840,813 UART: [idev] UDS.KEYID = 0
3,855,975 UART: [idev] Erasing UDS.KEYID = 0
6,311,971 UART: [idev] Sha1 KeyId Algorithm
6,334,026 UART: [idev] --
6,338,314 UART: [ldev] ++
6,338,887 UART: [ldev] CDI.KEYID = 6
6,339,796 UART: [ldev] SUBJECT.KEYID = 5
6,340,950 UART: [ldev] AUTHORITY.KEYID = 7
6,342,234 UART: [ldev] FE.KEYID = 1
6,355,475 UART: [ldev] Erasing FE.KEYID = 1
8,829,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,926 UART: [ldev] --
10,619,346 UART: [fwproc] Wait for Commands...
10,622,517 UART: [fwproc] Recv command 0x46574c44
10,624,615 UART: [fwproc] Recv'd Img size: 114448 bytes
12,911,191 UART: ROM Fatal Error: 0x000B0024
12,914,284 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
3,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,693,729 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,473,354 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,705,891 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
891,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,467 UART: [kat] ++
895,619 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,170,035 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,173,049 UART: [idev] ++
1,173,217 UART: [idev] CDI.KEYID = 6
1,173,578 UART: [idev] SUBJECT.KEYID = 7
1,174,003 UART: [idev] UDS.KEYID = 0
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,199,229 UART: [idev] Sha1 KeyId Algorithm
1,208,035 UART: [idev] --
1,208,896 UART: [ldev] ++
1,209,064 UART: [ldev] CDI.KEYID = 6
1,209,428 UART: [ldev] SUBJECT.KEYID = 5
1,209,855 UART: [ldev] AUTHORITY.KEYID = 7
1,210,318 UART: [ldev] FE.KEYID = 1
1,215,740 UART: [ldev] Erasing FE.KEYID = 1
1,241,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,438 UART: [ldev] --
1,280,812 UART: [fwproc] Wait for Commands...
1,281,619 UART: [fwproc] Recv command 0x46574c44
1,282,352 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,389 UART: ROM Fatal Error: 0x000B0024
1,549,546 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,485 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,202 UART: [state] WD Timer not started. Device not locked for debugging
87,361 UART: [kat] SHA2-256
890,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,040 UART: [kat] ++
895,192 UART: [kat] sha1
899,466 UART: [kat] SHA2-256
901,406 UART: [kat] SHA2-384
904,067 UART: [kat] SHA2-512-ACC
905,968 UART: [kat] ECC-384
915,677 UART: [kat] HMAC-384Kdf
920,211 UART: [kat] LMS
1,168,523 UART: [kat] --
1,169,348 UART: [cold-reset] ++
1,169,700 UART: [fht] FHT @ 0x50003400
1,172,458 UART: [idev] ++
1,172,626 UART: [idev] CDI.KEYID = 6
1,172,987 UART: [idev] SUBJECT.KEYID = 7
1,173,412 UART: [idev] UDS.KEYID = 0
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,198,640 UART: [idev] Sha1 KeyId Algorithm
1,207,380 UART: [idev] --
1,208,515 UART: [ldev] ++
1,208,683 UART: [ldev] CDI.KEYID = 6
1,209,047 UART: [ldev] SUBJECT.KEYID = 5
1,209,474 UART: [ldev] AUTHORITY.KEYID = 7
1,209,937 UART: [ldev] FE.KEYID = 1
1,215,275 UART: [ldev] Erasing FE.KEYID = 1
1,241,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,513 UART: [ldev] --
1,280,789 UART: [fwproc] Wait for Commands...
1,281,554 UART: [fwproc] Recv command 0x46574c44
1,282,287 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,720 UART: ROM Fatal Error: 0x000B0024
1,549,877 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,332 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
891,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,362 UART: [kat] SHA2-512-ACC
906,263 UART: [kat] ECC-384
915,968 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,711 UART: [idev] --
1,208,836 UART: [ldev] ++
1,209,004 UART: [ldev] CDI.KEYID = 6
1,209,368 UART: [ldev] SUBJECT.KEYID = 5
1,209,795 UART: [ldev] AUTHORITY.KEYID = 7
1,210,258 UART: [ldev] FE.KEYID = 1
1,215,602 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,590 UART: [ldev] --
1,280,914 UART: [fwproc] Wait for Commands...
1,281,669 UART: [fwproc] Recv command 0x46574c44
1,282,402 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,409 UART: ROM Fatal Error: 0x000B0024
1,550,566 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,889 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,073 UART: [kat] HMAC-384Kdf
920,775 UART: [kat] LMS
1,169,087 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,164 UART: [idev] ++
1,173,332 UART: [idev] CDI.KEYID = 6
1,173,693 UART: [idev] SUBJECT.KEYID = 7
1,174,118 UART: [idev] UDS.KEYID = 0
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,198,914 UART: [idev] Sha1 KeyId Algorithm
1,207,694 UART: [idev] --
1,208,711 UART: [ldev] ++
1,208,879 UART: [ldev] CDI.KEYID = 6
1,209,243 UART: [ldev] SUBJECT.KEYID = 5
1,209,670 UART: [ldev] AUTHORITY.KEYID = 7
1,210,133 UART: [ldev] FE.KEYID = 1
1,215,333 UART: [ldev] Erasing FE.KEYID = 1
1,241,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,935 UART: [ldev] --
1,281,251 UART: [fwproc] Wait for Commands...
1,282,072 UART: [fwproc] Recv command 0x46574c44
1,282,805 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,684 UART: ROM Fatal Error: 0x000B0024
1,550,841 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,014 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
915,586 UART: [kat] HMAC-384Kdf
920,114 UART: [kat] LMS
1,168,426 UART: [kat] --
1,169,373 UART: [cold-reset] ++
1,169,913 UART: [fht] FHT @ 0x50003400
1,172,499 UART: [idev] ++
1,172,667 UART: [idev] CDI.KEYID = 6
1,173,028 UART: [idev] SUBJECT.KEYID = 7
1,173,453 UART: [idev] UDS.KEYID = 0
1,181,045 UART: [idev] Erasing UDS.KEYID = 0
1,198,371 UART: [idev] Sha1 KeyId Algorithm
1,207,377 UART: [idev] --
1,208,388 UART: [ldev] ++
1,208,556 UART: [ldev] CDI.KEYID = 6
1,208,920 UART: [ldev] SUBJECT.KEYID = 5
1,209,347 UART: [ldev] AUTHORITY.KEYID = 7
1,209,810 UART: [ldev] FE.KEYID = 1
1,215,058 UART: [ldev] Erasing FE.KEYID = 1
1,241,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,806 UART: [ldev] --
1,281,102 UART: [fwproc] Wait for Commands...
1,281,777 UART: [fwproc] Recv command 0x46574c44
1,282,510 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,651 UART: ROM Fatal Error: 0x000B0024
1,549,808 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,459 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
916,865 UART: [kat] HMAC-384Kdf
921,635 UART: [kat] LMS
1,169,947 UART: [kat] --
1,170,786 UART: [cold-reset] ++
1,171,366 UART: [fht] FHT @ 0x50003400
1,173,924 UART: [idev] ++
1,174,092 UART: [idev] CDI.KEYID = 6
1,174,453 UART: [idev] SUBJECT.KEYID = 7
1,174,878 UART: [idev] UDS.KEYID = 0
1,182,936 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,846 UART: [idev] --
1,210,043 UART: [ldev] ++
1,210,211 UART: [ldev] CDI.KEYID = 6
1,210,575 UART: [ldev] SUBJECT.KEYID = 5
1,211,002 UART: [ldev] AUTHORITY.KEYID = 7
1,211,465 UART: [ldev] FE.KEYID = 1
1,216,477 UART: [ldev] Erasing FE.KEYID = 1
1,243,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,051 UART: [ldev] --
1,282,433 UART: [fwproc] Wait for Commands...
1,283,154 UART: [fwproc] Recv command 0x46574c44
1,283,887 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,718 UART: ROM Fatal Error: 0x000B0024
1,550,875 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,276 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,331 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,067 UART:
192,752 UART: Running Caliptra ROM ...
193,900 UART:
194,044 UART: [state] CFI Enabled
264,913 UART: [state] LifecycleState = Unprovisioned
267,276 UART: [state] DebugLocked = No
269,704 UART: [state] WD Timer not started. Device not locked for debugging
274,398 UART: [kat] SHA2-256
456,310 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,858 UART: [kat] ++
468,310 UART: [kat] sha1
480,000 UART: [kat] SHA2-256
483,071 UART: [kat] SHA2-384
489,535 UART: [kat] SHA2-512-ACC
492,158 UART: [kat] ECC-384
3,775,224 UART: [kat] HMAC-384Kdf
3,802,161 UART: [kat] LMS
4,875,312 UART: [kat] --
4,881,091 UART: [cold-reset] ++
4,883,893 UART: [fht] FHT @ 0x50003400
4,895,742 UART: [idev] ++
4,896,425 UART: [idev] CDI.KEYID = 6
4,897,663 UART: [idev] SUBJECT.KEYID = 7
4,898,822 UART: [idev] UDS.KEYID = 0
4,930,108 UART: [idev] Erasing UDS.KEYID = 0
8,242,191 UART: [idev] Sha1 KeyId Algorithm
8,264,681 UART: [idev] --
8,269,864 UART: [ldev] ++
8,270,432 UART: [ldev] CDI.KEYID = 6
8,271,594 UART: [ldev] SUBJECT.KEYID = 5
8,272,922 UART: [ldev] AUTHORITY.KEYID = 7
8,274,138 UART: [ldev] FE.KEYID = 1
8,317,679 UART: [ldev] Erasing FE.KEYID = 1
11,652,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,438 UART: [ldev] --
14,040,157 UART: [fwproc] Wait for Commands...
14,041,784 UART: [fwproc] Recv command 0x46574c44
14,044,051 UART: [fwproc] Recv'd Img size: 114124 bytes
16,983,550 UART: ROM Fatal Error: 0x000B0023
16,986,958 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,377 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,763,006 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,587 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,317 UART:
192,707 UART: Running Caliptra ROM ...
193,822 UART:
603,453 UART: [state] CFI Enabled
616,390 UART: [state] LifecycleState = Unprovisioned
618,765 UART: [state] DebugLocked = No
620,897 UART: [state] WD Timer not started. Device not locked for debugging
625,184 UART: [kat] SHA2-256
807,147 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,680 UART: [kat] ++
819,264 UART: [kat] sha1
829,558 UART: [kat] SHA2-256
832,618 UART: [kat] SHA2-384
838,264 UART: [kat] SHA2-512-ACC
840,871 UART: [kat] ECC-384
4,097,810 UART: [kat] HMAC-384Kdf
4,109,515 UART: [kat] LMS
5,182,662 UART: [kat] --
5,188,267 UART: [cold-reset] ++
5,190,968 UART: [fht] FHT @ 0x50003400
5,203,361 UART: [idev] ++
5,204,068 UART: [idev] CDI.KEYID = 6
5,205,314 UART: [idev] SUBJECT.KEYID = 7
5,206,773 UART: [idev] UDS.KEYID = 0
5,223,535 UART: [idev] Erasing UDS.KEYID = 0
8,495,210 UART: [idev] Sha1 KeyId Algorithm
8,517,328 UART: [idev] --
8,521,009 UART: [ldev] ++
8,521,636 UART: [ldev] CDI.KEYID = 6
8,522,819 UART: [ldev] SUBJECT.KEYID = 5
8,524,308 UART: [ldev] AUTHORITY.KEYID = 7
8,525,864 UART: [ldev] FE.KEYID = 1
8,536,836 UART: [ldev] Erasing FE.KEYID = 1
11,828,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,875 UART: [ldev] --
14,193,354 UART: [fwproc] Wait for Commands...
14,195,237 UART: [fwproc] Recv command 0x46574c44
14,197,510 UART: [fwproc] Recv'd Img size: 114124 bytes
17,139,267 UART: ROM Fatal Error: 0x000B0023
17,142,679 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,749 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,964,581 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
3,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,319 UART:
192,688 UART: Running Caliptra ROM ...
193,886 UART:
194,041 UART: [state] CFI Enabled
261,412 UART: [state] LifecycleState = Unprovisioned
263,281 UART: [state] DebugLocked = No
265,987 UART: [state] WD Timer not started. Device not locked for debugging
269,287 UART: [kat] SHA2-256
448,430 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,994 UART: [kat] ++
460,536 UART: [kat] sha1
470,956 UART: [kat] SHA2-256
473,967 UART: [kat] SHA2-384
479,889 UART: [kat] SHA2-512-ACC
482,825 UART: [kat] ECC-384
2,950,546 UART: [kat] HMAC-384Kdf
2,972,064 UART: [kat] LMS
3,501,525 UART: [kat] --
3,504,998 UART: [cold-reset] ++
3,507,146 UART: [fht] FHT @ 0x50003400
3,518,881 UART: [idev] ++
3,519,442 UART: [idev] CDI.KEYID = 6
3,520,418 UART: [idev] SUBJECT.KEYID = 7
3,521,515 UART: [idev] UDS.KEYID = 0
3,543,430 UART: [idev] Erasing UDS.KEYID = 0
6,025,882 UART: [idev] Sha1 KeyId Algorithm
6,048,766 UART: [idev] --
6,053,064 UART: [ldev] ++
6,053,683 UART: [ldev] CDI.KEYID = 6
6,054,576 UART: [ldev] SUBJECT.KEYID = 5
6,055,745 UART: [ldev] AUTHORITY.KEYID = 7
6,056,914 UART: [ldev] FE.KEYID = 1
6,099,122 UART: [ldev] Erasing FE.KEYID = 1
8,602,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,672 UART: [ldev] --
10,409,480 UART: [fwproc] Wait for Commands...
10,412,175 UART: [fwproc] Recv command 0x46574c44
10,414,271 UART: [fwproc] Recv'd Img size: 114448 bytes
12,708,297 UART: ROM Fatal Error: 0x000B0023
12,711,406 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,510,021 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,525 UART:
192,910 UART: Running Caliptra ROM ...
194,061 UART:
603,819 UART: [state] CFI Enabled
615,809 UART: [state] LifecycleState = Unprovisioned
617,746 UART: [state] DebugLocked = No
618,968 UART: [state] WD Timer not started. Device not locked for debugging
623,572 UART: [kat] SHA2-256
802,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,233 UART: [kat] ++
814,762 UART: [kat] sha1
824,512 UART: [kat] SHA2-256
827,525 UART: [kat] SHA2-384
834,636 UART: [kat] SHA2-512-ACC
837,618 UART: [kat] ECC-384
3,280,568 UART: [kat] HMAC-384Kdf
3,291,737 UART: [kat] LMS
3,821,234 UART: [kat] --
3,824,626 UART: [cold-reset] ++
3,826,113 UART: [fht] FHT @ 0x50003400
3,838,275 UART: [idev] ++
3,838,834 UART: [idev] CDI.KEYID = 6
3,839,770 UART: [idev] SUBJECT.KEYID = 7
3,840,979 UART: [idev] UDS.KEYID = 0
3,857,547 UART: [idev] Erasing UDS.KEYID = 0
6,317,451 UART: [idev] Sha1 KeyId Algorithm
6,339,978 UART: [idev] --
6,343,167 UART: [ldev] ++
6,343,733 UART: [ldev] CDI.KEYID = 6
6,344,640 UART: [ldev] SUBJECT.KEYID = 5
6,345,854 UART: [ldev] AUTHORITY.KEYID = 7
6,347,082 UART: [ldev] FE.KEYID = 1
6,357,913 UART: [ldev] Erasing FE.KEYID = 1
8,834,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,499 UART: [ldev] --
10,625,531 UART: [fwproc] Wait for Commands...
10,627,143 UART: [fwproc] Recv command 0x46574c44
10,629,189 UART: [fwproc] Recv'd Img size: 114448 bytes
12,920,594 UART: ROM Fatal Error: 0x000B0023
12,923,718 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
3,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,708,570 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
3,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,504,918 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,703,541 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
85,989 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
890,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,953 UART: [kat] ++
895,105 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
904,154 UART: [kat] SHA2-512-ACC
906,055 UART: [kat] ECC-384
915,606 UART: [kat] HMAC-384Kdf
920,220 UART: [kat] LMS
1,168,532 UART: [kat] --
1,169,201 UART: [cold-reset] ++
1,169,681 UART: [fht] FHT @ 0x50003400
1,172,407 UART: [idev] ++
1,172,575 UART: [idev] CDI.KEYID = 6
1,172,936 UART: [idev] SUBJECT.KEYID = 7
1,173,361 UART: [idev] UDS.KEYID = 0
1,181,205 UART: [idev] Erasing UDS.KEYID = 0
1,198,805 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,538 UART: [ldev] Erasing FE.KEYID = 1
1,241,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,844 UART: [ldev] --
1,280,148 UART: [fwproc] Wait for Commands...
1,280,929 UART: [fwproc] Recv command 0x46574c44
1,281,662 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,108 UART: ROM Fatal Error: 0x000B0023
1,548,265 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,542 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
916,383 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,396 UART: [cold-reset] ++
1,170,892 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,182,660 UART: [idev] Erasing UDS.KEYID = 0
1,200,022 UART: [idev] Sha1 KeyId Algorithm
1,208,942 UART: [idev] --
1,210,057 UART: [ldev] ++
1,210,225 UART: [ldev] CDI.KEYID = 6
1,210,589 UART: [ldev] SUBJECT.KEYID = 5
1,211,016 UART: [ldev] AUTHORITY.KEYID = 7
1,211,479 UART: [ldev] FE.KEYID = 1
1,216,827 UART: [ldev] Erasing FE.KEYID = 1
1,243,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,533 UART: [fwproc] Wait for Commands...
1,283,134 UART: [fwproc] Recv command 0x46574c44
1,283,867 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,975 UART: ROM Fatal Error: 0x000B0023
1,551,132 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,275 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
916,168 UART: [kat] HMAC-384Kdf
920,776 UART: [kat] LMS
1,169,088 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,283 UART: [idev] ++
1,173,451 UART: [idev] CDI.KEYID = 6
1,173,812 UART: [idev] SUBJECT.KEYID = 7
1,174,237 UART: [idev] UDS.KEYID = 0
1,182,301 UART: [idev] Erasing UDS.KEYID = 0
1,199,129 UART: [idev] Sha1 KeyId Algorithm
1,207,937 UART: [idev] --
1,209,058 UART: [ldev] ++
1,209,226 UART: [ldev] CDI.KEYID = 6
1,209,590 UART: [ldev] SUBJECT.KEYID = 5
1,210,017 UART: [ldev] AUTHORITY.KEYID = 7
1,210,480 UART: [ldev] FE.KEYID = 1
1,215,960 UART: [ldev] Erasing FE.KEYID = 1
1,242,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,692 UART: [ldev] --
1,282,134 UART: [fwproc] Wait for Commands...
1,282,873 UART: [fwproc] Recv command 0x46574c44
1,283,606 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,248 UART: ROM Fatal Error: 0x000B0023
1,551,405 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,399,942 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,558 UART: [kat] SHA2-256
901,498 UART: [kat] SHA2-384
904,285 UART: [kat] SHA2-512-ACC
906,186 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,443 UART: [kat] LMS
1,168,755 UART: [kat] --
1,169,578 UART: [cold-reset] ++
1,169,910 UART: [fht] FHT @ 0x50003400
1,172,652 UART: [idev] ++
1,172,820 UART: [idev] CDI.KEYID = 6
1,173,181 UART: [idev] SUBJECT.KEYID = 7
1,173,606 UART: [idev] UDS.KEYID = 0
1,181,480 UART: [idev] Erasing UDS.KEYID = 0
1,197,888 UART: [idev] Sha1 KeyId Algorithm
1,206,570 UART: [idev] --
1,207,649 UART: [ldev] ++
1,207,817 UART: [ldev] CDI.KEYID = 6
1,208,181 UART: [ldev] SUBJECT.KEYID = 5
1,208,608 UART: [ldev] AUTHORITY.KEYID = 7
1,209,071 UART: [ldev] FE.KEYID = 1
1,214,511 UART: [ldev] Erasing FE.KEYID = 1
1,241,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,817 UART: [ldev] --
1,280,283 UART: [fwproc] Wait for Commands...
1,280,928 UART: [fwproc] Recv command 0x46574c44
1,281,661 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,009 UART: ROM Fatal Error: 0x000B0023
1,550,166 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,841 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
916,250 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,173,055 UART: [idev] ++
1,173,223 UART: [idev] CDI.KEYID = 6
1,173,584 UART: [idev] SUBJECT.KEYID = 7
1,174,009 UART: [idev] UDS.KEYID = 0
1,182,147 UART: [idev] Erasing UDS.KEYID = 0
1,199,003 UART: [idev] Sha1 KeyId Algorithm
1,208,031 UART: [idev] --
1,209,076 UART: [ldev] ++
1,209,244 UART: [ldev] CDI.KEYID = 6
1,209,608 UART: [ldev] SUBJECT.KEYID = 5
1,210,035 UART: [ldev] AUTHORITY.KEYID = 7
1,210,498 UART: [ldev] FE.KEYID = 1
1,215,710 UART: [ldev] Erasing FE.KEYID = 1
1,242,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,426 UART: [ldev] --
1,281,696 UART: [fwproc] Wait for Commands...
1,282,469 UART: [fwproc] Recv command 0x46574c44
1,283,202 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,508 UART: ROM Fatal Error: 0x000B0023
1,549,665 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,926 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,757 UART: [kat] SHA2-512-ACC
906,658 UART: [kat] ECC-384
915,963 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,456 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,181,894 UART: [idev] Erasing UDS.KEYID = 0
1,198,722 UART: [idev] Sha1 KeyId Algorithm
1,207,618 UART: [idev] --
1,208,747 UART: [ldev] ++
1,208,915 UART: [ldev] CDI.KEYID = 6
1,209,279 UART: [ldev] SUBJECT.KEYID = 5
1,209,706 UART: [ldev] AUTHORITY.KEYID = 7
1,210,169 UART: [ldev] FE.KEYID = 1
1,215,143 UART: [ldev] Erasing FE.KEYID = 1
1,241,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,145 UART: [ldev] --
1,280,569 UART: [fwproc] Wait for Commands...
1,281,222 UART: [fwproc] Recv command 0x46574c44
1,281,955 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,125 UART: ROM Fatal Error: 0x000B0023
1,550,282 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,031 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
2,020,785 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,850 UART:
2,165,245 UART: Running Caliptra ROM ...
2,166,518 UART:
2,166,905 UART: [state] CFI Enabled
2,167,832 UART: [state] LifecycleState = Unprovisioned
2,169,483 UART: [state] DebugLocked = No
2,170,598 UART: [state] WD Timer not started. Device not locked for debugging
2,173,081 UART: [kat] SHA2-256
2,173,776 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,789 UART: [kat] ++
2,177,240 UART: [kat] sha1
2,177,755 UART: [kat] SHA2-256
2,178,493 UART: [kat] SHA2-384
2,179,158 UART: [kat] SHA2-512-ACC
2,179,985 UART: [kat] ECC-384
3,779,166 UART: [kat] HMAC-384Kdf
3,794,433 UART: [kat] LMS
4,867,567 UART: [kat] --
4,872,772 UART: [cold-reset] ++
4,874,606 UART: [fht] FHT @ 0x50003400
4,885,751 UART: [idev] ++
4,886,479 UART: [idev] CDI.KEYID = 6
4,887,611 UART: [idev] SUBJECT.KEYID = 7
4,888,856 UART: [idev] UDS.KEYID = 0
4,921,471 UART: [idev] Erasing UDS.KEYID = 0
8,235,020 UART: [idev] Sha1 KeyId Algorithm
8,256,975 UART: [idev] --
8,261,386 UART: [ldev] ++
8,261,963 UART: [ldev] CDI.KEYID = 6
8,263,208 UART: [ldev] SUBJECT.KEYID = 5
8,264,321 UART: [ldev] AUTHORITY.KEYID = 7
8,265,474 UART: [ldev] FE.KEYID = 1
8,310,253 UART: [ldev] Erasing FE.KEYID = 1
11,642,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,936,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,952,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,968,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,984,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,005,068 UART: [ldev] --
14,009,598 UART: [fwproc] Wait for Commands...
14,012,088 UART: [fwproc] Recv command 0x46574c44
14,014,371 UART: [fwproc] Recv'd Img size: 114124 bytes
16,956,782 UART: ROM Fatal Error: 0x000B0023
16,960,253 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
2,020,035 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,755,957 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
2,022,761 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,831 UART:
2,167,229 UART: Running Caliptra ROM ...
2,168,302 UART:
2,168,451 UART: [state] CFI Enabled
2,169,431 UART: [state] LifecycleState = Unprovisioned
2,171,070 UART: [state] DebugLocked = No
2,172,089 UART: [state] WD Timer not started. Device not locked for debugging
2,174,561 UART: [kat] SHA2-256
2,175,222 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,227 UART: [kat] ++
2,178,670 UART: [kat] sha1
2,179,171 UART: [kat] SHA2-256
2,179,820 UART: [kat] SHA2-384
2,180,491 UART: [kat] SHA2-512-ACC
2,181,288 UART: [kat] ECC-384
4,098,790 UART: [kat] HMAC-384Kdf
4,110,548 UART: [kat] LMS
5,183,701 UART: [kat] --
5,187,865 UART: [cold-reset] ++
5,190,129 UART: [fht] FHT @ 0x50003400
5,200,890 UART: [idev] ++
5,201,569 UART: [idev] CDI.KEYID = 6
5,202,728 UART: [idev] SUBJECT.KEYID = 7
5,204,258 UART: [idev] UDS.KEYID = 0
5,223,615 UART: [idev] Erasing UDS.KEYID = 0
8,498,332 UART: [idev] Sha1 KeyId Algorithm
8,518,860 UART: [idev] --
8,522,418 UART: [ldev] ++
8,522,980 UART: [ldev] CDI.KEYID = 6
8,524,158 UART: [ldev] SUBJECT.KEYID = 5
8,525,640 UART: [ldev] AUTHORITY.KEYID = 7
8,527,158 UART: [ldev] FE.KEYID = 1
8,538,252 UART: [ldev] Erasing FE.KEYID = 1
11,829,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,689 UART: [ldev] --
14,193,843 UART: [fwproc] Wait for Commands...
14,196,743 UART: [fwproc] Recv command 0x46574c44
14,199,004 UART: [fwproc] Recv'd Img size: 114124 bytes
17,142,587 UART: ROM Fatal Error: 0x000B0023
17,145,783 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,020,170 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,965,245 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
2,022,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,918 UART:
2,167,335 UART: Running Caliptra ROM ...
2,168,414 UART:
2,168,573 UART: [state] CFI Enabled
2,169,543 UART: [state] LifecycleState = Unprovisioned
2,171,213 UART: [state] DebugLocked = No
2,172,240 UART: [state] WD Timer not started. Device not locked for debugging
2,174,719 UART: [kat] SHA2-256
2,175,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,400 UART: [kat] ++
2,178,849 UART: [kat] sha1
2,179,362 UART: [kat] SHA2-256
2,180,019 UART: [kat] SHA2-384
2,180,677 UART: [kat] SHA2-512-ACC
2,181,515 UART: [kat] ECC-384
2,949,992 UART: [kat] HMAC-384Kdf
2,973,628 UART: [kat] LMS
3,503,082 UART: [kat] --
3,507,349 UART: [cold-reset] ++
3,508,740 UART: [fht] FHT @ 0x50003400
3,519,506 UART: [idev] ++
3,520,090 UART: [idev] CDI.KEYID = 6
3,521,061 UART: [idev] SUBJECT.KEYID = 7
3,522,227 UART: [idev] UDS.KEYID = 0
3,545,728 UART: [idev] Erasing UDS.KEYID = 0
6,027,164 UART: [idev] Sha1 KeyId Algorithm
6,049,853 UART: [idev] --
6,054,154 UART: [ldev] ++
6,054,739 UART: [ldev] CDI.KEYID = 6
6,055,652 UART: [ldev] SUBJECT.KEYID = 5
6,056,820 UART: [ldev] AUTHORITY.KEYID = 7
6,058,058 UART: [ldev] FE.KEYID = 1
6,101,605 UART: [ldev] Erasing FE.KEYID = 1
8,604,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,478 UART: [ldev] --
10,393,910 UART: [fwproc] Wait for Commands...
10,396,384 UART: [fwproc] Recv command 0x46574c44
10,398,479 UART: [fwproc] Recv'd Img size: 114448 bytes
12,692,223 UART: ROM Fatal Error: 0x000B0023
12,695,301 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
2,038,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,494,118 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,023,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,248 UART:
2,168,767 UART: Running Caliptra ROM ...
2,169,857 UART:
2,170,018 UART: [state] CFI Enabled
2,170,907 UART: [state] LifecycleState = Unprovisioned
2,172,785 UART: [state] DebugLocked = No
2,173,918 UART: [state] WD Timer not started. Device not locked for debugging
2,176,424 UART: [kat] SHA2-256
2,177,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,108 UART: [kat] ++
2,180,556 UART: [kat] sha1
2,181,119 UART: [kat] SHA2-256
2,181,778 UART: [kat] SHA2-384
2,182,435 UART: [kat] SHA2-512-ACC
2,183,257 UART: [kat] ECC-384
3,284,120 UART: [kat] HMAC-384Kdf
3,296,817 UART: [kat] LMS
3,826,317 UART: [kat] --
3,830,606 UART: [cold-reset] ++
3,832,265 UART: [fht] FHT @ 0x50003400
3,843,794 UART: [idev] ++
3,844,360 UART: [idev] CDI.KEYID = 6
3,845,320 UART: [idev] SUBJECT.KEYID = 7
3,846,477 UART: [idev] UDS.KEYID = 0
3,861,757 UART: [idev] Erasing UDS.KEYID = 0
6,317,994 UART: [idev] Sha1 KeyId Algorithm
6,341,064 UART: [idev] --
6,346,121 UART: [ldev] ++
6,346,705 UART: [ldev] CDI.KEYID = 6
6,347,609 UART: [ldev] SUBJECT.KEYID = 5
6,348,825 UART: [ldev] AUTHORITY.KEYID = 7
6,350,057 UART: [ldev] FE.KEYID = 1
6,362,272 UART: [ldev] Erasing FE.KEYID = 1
8,838,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,804 UART: [ldev] --
10,631,846 UART: [fwproc] Wait for Commands...
10,633,996 UART: [fwproc] Recv command 0x46574c44
10,636,088 UART: [fwproc] Recv'd Img size: 114448 bytes
12,929,316 UART: ROM Fatal Error: 0x000B0023
12,932,439 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
2,021,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,699,808 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
2,024,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,492,562 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
2,022,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,713,534 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,216 UART: [kat] SHA2-512-ACC
906,117 UART: [kat] ECC-384
915,416 UART: [kat] HMAC-384Kdf
919,998 UART: [kat] LMS
1,168,310 UART: [kat] --
1,169,091 UART: [cold-reset] ++
1,169,477 UART: [fht] FHT @ 0x50003400
1,172,213 UART: [idev] ++
1,172,381 UART: [idev] CDI.KEYID = 6
1,172,742 UART: [idev] SUBJECT.KEYID = 7
1,173,167 UART: [idev] UDS.KEYID = 0
1,181,021 UART: [idev] Erasing UDS.KEYID = 0
1,198,025 UART: [idev] Sha1 KeyId Algorithm
1,207,073 UART: [idev] --
1,208,054 UART: [ldev] ++
1,208,222 UART: [ldev] CDI.KEYID = 6
1,208,586 UART: [ldev] SUBJECT.KEYID = 5
1,209,013 UART: [ldev] AUTHORITY.KEYID = 7
1,209,476 UART: [ldev] FE.KEYID = 1
1,214,702 UART: [ldev] Erasing FE.KEYID = 1
1,241,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,066 UART: [ldev] --
1,280,392 UART: [fwproc] Wait for Commands...
1,281,133 UART: [fwproc] Recv command 0x46574c44
1,281,866 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,364 UART: ROM Fatal Error: 0x000B0023
1,550,521 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,430 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
915,815 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,396 UART: [idev] ++
1,173,564 UART: [idev] CDI.KEYID = 6
1,173,925 UART: [idev] SUBJECT.KEYID = 7
1,174,350 UART: [idev] UDS.KEYID = 0
1,182,416 UART: [idev] Erasing UDS.KEYID = 0
1,199,912 UART: [idev] Sha1 KeyId Algorithm
1,208,932 UART: [idev] --
1,209,977 UART: [ldev] ++
1,210,145 UART: [ldev] CDI.KEYID = 6
1,210,509 UART: [ldev] SUBJECT.KEYID = 5
1,210,936 UART: [ldev] AUTHORITY.KEYID = 7
1,211,399 UART: [ldev] FE.KEYID = 1
1,216,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,035 UART: [ldev] --
1,282,417 UART: [fwproc] Wait for Commands...
1,283,024 UART: [fwproc] Recv command 0x46574c44
1,283,757 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,875 UART: ROM Fatal Error: 0x000B0023
1,551,032 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,193 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,809 UART: [state] WD Timer not started. Device not locked for debugging
88,156 UART: [kat] SHA2-256
891,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,835 UART: [kat] ++
895,987 UART: [kat] sha1
900,269 UART: [kat] SHA2-256
902,209 UART: [kat] SHA2-384
905,176 UART: [kat] SHA2-512-ACC
907,077 UART: [kat] ECC-384
916,884 UART: [kat] HMAC-384Kdf
921,514 UART: [kat] LMS
1,169,826 UART: [kat] --
1,170,817 UART: [cold-reset] ++
1,171,265 UART: [fht] FHT @ 0x50003400
1,174,015 UART: [idev] ++
1,174,183 UART: [idev] CDI.KEYID = 6
1,174,544 UART: [idev] SUBJECT.KEYID = 7
1,174,969 UART: [idev] UDS.KEYID = 0
1,183,479 UART: [idev] Erasing UDS.KEYID = 0
1,200,343 UART: [idev] Sha1 KeyId Algorithm
1,209,251 UART: [idev] --
1,210,342 UART: [ldev] ++
1,210,510 UART: [ldev] CDI.KEYID = 6
1,210,874 UART: [ldev] SUBJECT.KEYID = 5
1,211,301 UART: [ldev] AUTHORITY.KEYID = 7
1,211,764 UART: [ldev] FE.KEYID = 1
1,217,016 UART: [ldev] Erasing FE.KEYID = 1
1,243,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,636 UART: [ldev] --
1,283,124 UART: [fwproc] Wait for Commands...
1,283,823 UART: [fwproc] Recv command 0x46574c44
1,284,556 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,500 UART: ROM Fatal Error: 0x000B0023
1,551,657 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,270 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,552 UART: [state] DebugLocked = No
87,144 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
891,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,934 UART: [kat] ++
896,086 UART: [kat] sha1
900,340 UART: [kat] SHA2-256
902,280 UART: [kat] SHA2-384
904,975 UART: [kat] SHA2-512-ACC
906,876 UART: [kat] ECC-384
916,965 UART: [kat] HMAC-384Kdf
921,575 UART: [kat] LMS
1,169,887 UART: [kat] --
1,170,864 UART: [cold-reset] ++
1,171,284 UART: [fht] FHT @ 0x50003400
1,173,848 UART: [idev] ++
1,174,016 UART: [idev] CDI.KEYID = 6
1,174,377 UART: [idev] SUBJECT.KEYID = 7
1,174,802 UART: [idev] UDS.KEYID = 0
1,183,070 UART: [idev] Erasing UDS.KEYID = 0
1,200,222 UART: [idev] Sha1 KeyId Algorithm
1,209,100 UART: [idev] --
1,210,311 UART: [ldev] ++
1,210,479 UART: [ldev] CDI.KEYID = 6
1,210,843 UART: [ldev] SUBJECT.KEYID = 5
1,211,270 UART: [ldev] AUTHORITY.KEYID = 7
1,211,733 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,243,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,497 UART: [fwproc] Wait for Commands...
1,283,086 UART: [fwproc] Recv command 0x46574c44
1,283,819 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,571 UART: ROM Fatal Error: 0x000B0023
1,550,728 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,719 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,280 UART: [state] LifecycleState = Unprovisioned
84,935 UART: [state] DebugLocked = No
85,591 UART: [state] WD Timer not started. Device not locked for debugging
86,950 UART: [kat] SHA2-256
890,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,629 UART: [kat] ++
894,781 UART: [kat] sha1
898,873 UART: [kat] SHA2-256
900,813 UART: [kat] SHA2-384
903,636 UART: [kat] SHA2-512-ACC
905,537 UART: [kat] ECC-384
914,938 UART: [kat] HMAC-384Kdf
919,512 UART: [kat] LMS
1,167,824 UART: [kat] --
1,168,507 UART: [cold-reset] ++
1,169,075 UART: [fht] FHT @ 0x50003400
1,171,863 UART: [idev] ++
1,172,031 UART: [idev] CDI.KEYID = 6
1,172,392 UART: [idev] SUBJECT.KEYID = 7
1,172,817 UART: [idev] UDS.KEYID = 0
1,180,709 UART: [idev] Erasing UDS.KEYID = 0
1,197,395 UART: [idev] Sha1 KeyId Algorithm
1,206,229 UART: [idev] --
1,207,270 UART: [ldev] ++
1,207,438 UART: [ldev] CDI.KEYID = 6
1,207,802 UART: [ldev] SUBJECT.KEYID = 5
1,208,229 UART: [ldev] AUTHORITY.KEYID = 7
1,208,692 UART: [ldev] FE.KEYID = 1
1,214,052 UART: [ldev] Erasing FE.KEYID = 1
1,240,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,070 UART: [ldev] --
1,279,386 UART: [fwproc] Wait for Commands...
1,280,107 UART: [fwproc] Recv command 0x46574c44
1,280,840 UART: [fwproc] Recv'd Img size: 114448 bytes
1,546,384 UART: ROM Fatal Error: 0x000B0023
1,547,541 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,520 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,735 UART: [state] LifecycleState = Unprovisioned
85,390 UART: [state] DebugLocked = No
86,076 UART: [state] WD Timer not started. Device not locked for debugging
87,433 UART: [kat] SHA2-256
890,983 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,112 UART: [kat] ++
895,264 UART: [kat] sha1
899,524 UART: [kat] SHA2-256
901,464 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
915,747 UART: [kat] HMAC-384Kdf
920,189 UART: [kat] LMS
1,168,501 UART: [kat] --
1,169,442 UART: [cold-reset] ++
1,169,976 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,181,834 UART: [idev] Erasing UDS.KEYID = 0
1,198,292 UART: [idev] Sha1 KeyId Algorithm
1,207,008 UART: [idev] --
1,207,889 UART: [ldev] ++
1,208,057 UART: [ldev] CDI.KEYID = 6
1,208,421 UART: [ldev] SUBJECT.KEYID = 5
1,208,848 UART: [ldev] AUTHORITY.KEYID = 7
1,209,311 UART: [ldev] FE.KEYID = 1
1,214,591 UART: [ldev] Erasing FE.KEYID = 1
1,241,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,037 UART: [ldev] --
1,280,445 UART: [fwproc] Wait for Commands...
1,281,266 UART: [fwproc] Recv command 0x46574c44
1,281,999 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,237 UART: ROM Fatal Error: 0x000B0023
1,548,394 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,483 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,021,407 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,559 UART:
2,165,944 UART: Running Caliptra ROM ...
2,167,115 UART:
2,167,283 UART: [state] CFI Enabled
2,168,259 UART: [state] LifecycleState = Unprovisioned
2,169,904 UART: [state] DebugLocked = No
2,171,031 UART: [state] WD Timer not started. Device not locked for debugging
2,173,508 UART: [kat] SHA2-256
2,174,399 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,435 UART: [kat] ++
2,177,890 UART: [kat] sha1
2,178,404 UART: [kat] SHA2-256
2,179,144 UART: [kat] SHA2-384
2,179,812 UART: [kat] SHA2-512-ACC
2,180,642 UART: [kat] ECC-384
3,774,707 UART: [kat] HMAC-384Kdf
3,802,892 UART: [kat] LMS
4,876,031 UART: [kat] --
4,879,275 UART: [cold-reset] ++
4,881,424 UART: [fht] FHT @ 0x50003400
4,893,493 UART: [idev] ++
4,894,370 UART: [idev] CDI.KEYID = 6
4,895,341 UART: [idev] SUBJECT.KEYID = 7
4,896,559 UART: [idev] UDS.KEYID = 0
4,931,169 UART: [idev] Erasing UDS.KEYID = 0
8,246,218 UART: [idev] Sha1 KeyId Algorithm
8,267,384 UART: [idev] --
8,271,409 UART: [ldev] ++
8,271,986 UART: [ldev] CDI.KEYID = 6
8,273,175 UART: [ldev] SUBJECT.KEYID = 5
8,274,346 UART: [ldev] AUTHORITY.KEYID = 7
8,275,506 UART: [ldev] FE.KEYID = 1
8,317,830 UART: [ldev] Erasing FE.KEYID = 1
11,654,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,670 UART: [ldev] --
14,037,686 UART: [fwproc] Wait for Commands...
14,040,336 UART: [fwproc] Recv command 0x46574c44
14,042,663 UART: [fwproc] Recv'd Img size: 114124 bytes
16,982,971 UART: ROM Fatal Error: 0x000B0021
16,986,372 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,026,103 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,769,474 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
2,032,517 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,176,507 UART:
2,176,921 UART: Running Caliptra ROM ...
2,178,001 UART:
2,178,179 UART: [state] CFI Enabled
2,179,156 UART: [state] LifecycleState = Unprovisioned
2,180,707 UART: [state] DebugLocked = No
2,181,720 UART: [state] WD Timer not started. Device not locked for debugging
2,184,396 UART: [kat] SHA2-256
2,185,062 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,188,077 UART: [kat] ++
2,188,522 UART: [kat] sha1
2,189,023 UART: [kat] SHA2-256
2,189,674 UART: [kat] SHA2-384
2,190,322 UART: [kat] SHA2-512-ACC
2,191,113 UART: [kat] ECC-384
4,098,332 UART: [kat] HMAC-384Kdf
4,110,551 UART: [kat] LMS
5,183,728 UART: [kat] --
5,189,074 UART: [cold-reset] ++
5,190,332 UART: [fht] FHT @ 0x50003400
5,202,530 UART: [idev] ++
5,203,249 UART: [idev] CDI.KEYID = 6
5,204,401 UART: [idev] SUBJECT.KEYID = 7
5,205,878 UART: [idev] UDS.KEYID = 0
5,222,801 UART: [idev] Erasing UDS.KEYID = 0
8,493,103 UART: [idev] Sha1 KeyId Algorithm
8,514,879 UART: [idev] --
8,519,125 UART: [ldev] ++
8,519,701 UART: [ldev] CDI.KEYID = 6
8,520,946 UART: [ldev] SUBJECT.KEYID = 5
8,522,392 UART: [ldev] AUTHORITY.KEYID = 7
8,523,873 UART: [ldev] FE.KEYID = 1
8,535,333 UART: [ldev] Erasing FE.KEYID = 1
11,826,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,171 UART: [ldev] --
14,193,866 UART: [fwproc] Wait for Commands...
14,197,044 UART: [fwproc] Recv command 0x46574c44
14,199,313 UART: [fwproc] Recv'd Img size: 114124 bytes
17,145,947 UART: ROM Fatal Error: 0x000B0021
17,149,330 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
2,021,623 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,950,392 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,032,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,177,241 UART:
2,177,651 UART: Running Caliptra ROM ...
2,178,818 UART:
2,178,988 UART: [state] CFI Enabled
2,179,952 UART: [state] LifecycleState = Unprovisioned
2,181,596 UART: [state] DebugLocked = No
2,182,703 UART: [state] WD Timer not started. Device not locked for debugging
2,185,186 UART: [kat] SHA2-256
2,185,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,188,885 UART: [kat] ++
2,189,338 UART: [kat] sha1
2,189,853 UART: [kat] SHA2-256
2,190,540 UART: [kat] SHA2-384
2,191,222 UART: [kat] SHA2-512-ACC
2,192,110 UART: [kat] ECC-384
2,947,303 UART: [kat] HMAC-384Kdf
2,970,398 UART: [kat] LMS
3,499,851 UART: [kat] --
3,504,443 UART: [cold-reset] ++
3,505,999 UART: [fht] FHT @ 0x50003400
3,517,361 UART: [idev] ++
3,517,958 UART: [idev] CDI.KEYID = 6
3,518,844 UART: [idev] SUBJECT.KEYID = 7
3,520,058 UART: [idev] UDS.KEYID = 0
3,542,334 UART: [idev] Erasing UDS.KEYID = 0
6,025,242 UART: [idev] Sha1 KeyId Algorithm
6,048,449 UART: [idev] --
6,051,042 UART: [ldev] ++
6,051,617 UART: [ldev] CDI.KEYID = 6
6,052,509 UART: [ldev] SUBJECT.KEYID = 5
6,053,646 UART: [ldev] AUTHORITY.KEYID = 7
6,054,880 UART: [ldev] FE.KEYID = 1
6,098,773 UART: [ldev] Erasing FE.KEYID = 1
8,599,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,184 UART: [ldev] --
10,409,661 UART: [fwproc] Wait for Commands...
10,411,437 UART: [fwproc] Recv command 0x46574c44
10,413,554 UART: [fwproc] Recv'd Img size: 114448 bytes
12,703,425 UART: ROM Fatal Error: 0x000B0021
12,706,550 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
2,021,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,472,845 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
2,021,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,219 UART:
2,166,637 UART: Running Caliptra ROM ...
2,167,806 UART:
2,167,981 UART: [state] CFI Enabled
2,168,940 UART: [state] LifecycleState = Unprovisioned
2,170,578 UART: [state] DebugLocked = No
2,171,681 UART: [state] WD Timer not started. Device not locked for debugging
2,174,155 UART: [kat] SHA2-256
2,174,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,832 UART: [kat] ++
2,178,282 UART: [kat] sha1
2,178,836 UART: [kat] SHA2-256
2,179,494 UART: [kat] SHA2-384
2,180,148 UART: [kat] SHA2-512-ACC
2,180,990 UART: [kat] ECC-384
3,277,686 UART: [kat] HMAC-384Kdf
3,290,669 UART: [kat] LMS
3,820,131 UART: [kat] --
3,822,871 UART: [cold-reset] ++
3,825,240 UART: [fht] FHT @ 0x50003400
3,836,645 UART: [idev] ++
3,837,206 UART: [idev] CDI.KEYID = 6
3,838,111 UART: [idev] SUBJECT.KEYID = 7
3,839,319 UART: [idev] UDS.KEYID = 0
3,856,375 UART: [idev] Erasing UDS.KEYID = 0
6,314,912 UART: [idev] Sha1 KeyId Algorithm
6,337,389 UART: [idev] --
6,340,632 UART: [ldev] ++
6,341,203 UART: [ldev] CDI.KEYID = 6
6,342,112 UART: [ldev] SUBJECT.KEYID = 5
6,343,272 UART: [ldev] AUTHORITY.KEYID = 7
6,344,556 UART: [ldev] FE.KEYID = 1
6,356,442 UART: [ldev] Erasing FE.KEYID = 1
8,829,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,595 UART: [ldev] --
10,618,386 UART: [fwproc] Wait for Commands...
10,620,120 UART: [fwproc] Recv command 0x46574c44
10,622,221 UART: [fwproc] Recv'd Img size: 114448 bytes
12,905,941 UART: ROM Fatal Error: 0x000B0021
12,909,070 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,022,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,688,422 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,022,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,492,480 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
2,020,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,694,120 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,140 UART: [kat] SHA2-512-ACC
906,041 UART: [kat] ECC-384
915,652 UART: [kat] HMAC-384Kdf
920,332 UART: [kat] LMS
1,168,644 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,165 UART: [fht] FHT @ 0x50003400
1,172,871 UART: [idev] ++
1,173,039 UART: [idev] CDI.KEYID = 6
1,173,400 UART: [idev] SUBJECT.KEYID = 7
1,173,825 UART: [idev] UDS.KEYID = 0
1,181,573 UART: [idev] Erasing UDS.KEYID = 0
1,198,727 UART: [idev] Sha1 KeyId Algorithm
1,207,561 UART: [idev] --
1,208,744 UART: [ldev] ++
1,208,912 UART: [ldev] CDI.KEYID = 6
1,209,276 UART: [ldev] SUBJECT.KEYID = 5
1,209,703 UART: [ldev] AUTHORITY.KEYID = 7
1,210,166 UART: [ldev] FE.KEYID = 1
1,215,166 UART: [ldev] Erasing FE.KEYID = 1
1,241,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,088 UART: [ldev] --
1,280,444 UART: [fwproc] Wait for Commands...
1,281,149 UART: [fwproc] Recv command 0x46574c44
1,281,882 UART: [fwproc] Recv'd Img size: 114448 bytes
1,546,995 UART: ROM Fatal Error: 0x000B0021
1,548,152 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,833 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
891,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,284 UART: [kat] ++
895,436 UART: [kat] sha1
899,702 UART: [kat] SHA2-256
901,642 UART: [kat] SHA2-384
904,413 UART: [kat] SHA2-512-ACC
906,314 UART: [kat] ECC-384
915,843 UART: [kat] HMAC-384Kdf
920,385 UART: [kat] LMS
1,168,697 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,228 UART: [fht] FHT @ 0x50003400
1,172,806 UART: [idev] ++
1,172,974 UART: [idev] CDI.KEYID = 6
1,173,335 UART: [idev] SUBJECT.KEYID = 7
1,173,760 UART: [idev] UDS.KEYID = 0
1,181,698 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,207,946 UART: [idev] --
1,209,207 UART: [ldev] ++
1,209,375 UART: [ldev] CDI.KEYID = 6
1,209,739 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,216,059 UART: [ldev] Erasing FE.KEYID = 1
1,242,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,123 UART: [ldev] --
1,281,389 UART: [fwproc] Wait for Commands...
1,282,146 UART: [fwproc] Recv command 0x46574c44
1,282,879 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,734 UART: ROM Fatal Error: 0x000B0021
1,549,891 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,932 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
890,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,971 UART: [kat] ++
895,123 UART: [kat] sha1
899,373 UART: [kat] SHA2-256
901,313 UART: [kat] SHA2-384
904,058 UART: [kat] SHA2-512-ACC
905,959 UART: [kat] ECC-384
915,430 UART: [kat] HMAC-384Kdf
920,226 UART: [kat] LMS
1,168,538 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,169,921 UART: [fht] FHT @ 0x50003400
1,172,423 UART: [idev] ++
1,172,591 UART: [idev] CDI.KEYID = 6
1,172,952 UART: [idev] SUBJECT.KEYID = 7
1,173,377 UART: [idev] UDS.KEYID = 0
1,181,239 UART: [idev] Erasing UDS.KEYID = 0
1,197,925 UART: [idev] Sha1 KeyId Algorithm
1,206,683 UART: [idev] --
1,207,630 UART: [ldev] ++
1,207,798 UART: [ldev] CDI.KEYID = 6
1,208,162 UART: [ldev] SUBJECT.KEYID = 5
1,208,589 UART: [ldev] AUTHORITY.KEYID = 7
1,209,052 UART: [ldev] FE.KEYID = 1
1,214,476 UART: [ldev] Erasing FE.KEYID = 1
1,240,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,170 UART: [ldev] --
1,279,578 UART: [fwproc] Wait for Commands...
1,280,401 UART: [fwproc] Recv command 0x46574c44
1,281,134 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,307 UART: ROM Fatal Error: 0x000B0021
1,548,464 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,351 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,150 UART: [state] WD Timer not started. Device not locked for debugging
87,437 UART: [kat] SHA2-256
890,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,116 UART: [kat] ++
895,268 UART: [kat] sha1
899,362 UART: [kat] SHA2-256
901,302 UART: [kat] SHA2-384
903,949 UART: [kat] SHA2-512-ACC
905,850 UART: [kat] ECC-384
915,543 UART: [kat] HMAC-384Kdf
920,183 UART: [kat] LMS
1,168,495 UART: [kat] --
1,169,252 UART: [cold-reset] ++
1,169,798 UART: [fht] FHT @ 0x50003400
1,172,464 UART: [idev] ++
1,172,632 UART: [idev] CDI.KEYID = 6
1,172,993 UART: [idev] SUBJECT.KEYID = 7
1,173,418 UART: [idev] UDS.KEYID = 0
1,181,150 UART: [idev] Erasing UDS.KEYID = 0
1,197,850 UART: [idev] Sha1 KeyId Algorithm
1,206,870 UART: [idev] --
1,208,119 UART: [ldev] ++
1,208,287 UART: [ldev] CDI.KEYID = 6
1,208,651 UART: [ldev] SUBJECT.KEYID = 5
1,209,078 UART: [ldev] AUTHORITY.KEYID = 7
1,209,541 UART: [ldev] FE.KEYID = 1
1,214,643 UART: [ldev] Erasing FE.KEYID = 1
1,240,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,731 UART: [ldev] --
1,280,243 UART: [fwproc] Wait for Commands...
1,280,956 UART: [fwproc] Recv command 0x46574c44
1,281,689 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,104 UART: ROM Fatal Error: 0x000B0021
1,549,261 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,848 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
891,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
915,828 UART: [kat] HMAC-384Kdf
920,272 UART: [kat] LMS
1,168,584 UART: [kat] --
1,169,485 UART: [cold-reset] ++
1,170,015 UART: [fht] FHT @ 0x50003400
1,172,525 UART: [idev] ++
1,172,693 UART: [idev] CDI.KEYID = 6
1,173,054 UART: [idev] SUBJECT.KEYID = 7
1,173,479 UART: [idev] UDS.KEYID = 0
1,181,377 UART: [idev] Erasing UDS.KEYID = 0
1,197,983 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,248 UART: [ldev] ++
1,208,416 UART: [ldev] CDI.KEYID = 6
1,208,780 UART: [ldev] SUBJECT.KEYID = 5
1,209,207 UART: [ldev] AUTHORITY.KEYID = 7
1,209,670 UART: [ldev] FE.KEYID = 1
1,214,754 UART: [ldev] Erasing FE.KEYID = 1
1,241,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,324 UART: [ldev] --
1,280,822 UART: [fwproc] Wait for Commands...
1,281,605 UART: [fwproc] Recv command 0x46574c44
1,282,338 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,793 UART: ROM Fatal Error: 0x000B0021
1,549,950 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,427 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
891,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,820 UART: [kat] ++
895,972 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,685 UART: [kat] HMAC-384Kdf
921,097 UART: [kat] LMS
1,169,409 UART: [kat] --
1,170,508 UART: [cold-reset] ++
1,170,924 UART: [fht] FHT @ 0x50003400
1,173,550 UART: [idev] ++
1,173,718 UART: [idev] CDI.KEYID = 6
1,174,079 UART: [idev] SUBJECT.KEYID = 7
1,174,504 UART: [idev] UDS.KEYID = 0
1,182,592 UART: [idev] Erasing UDS.KEYID = 0
1,199,944 UART: [idev] Sha1 KeyId Algorithm
1,208,998 UART: [idev] --
1,210,021 UART: [ldev] ++
1,210,189 UART: [ldev] CDI.KEYID = 6
1,210,553 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,217,009 UART: [ldev] Erasing FE.KEYID = 1
1,244,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,383 UART: [ldev] --
1,283,759 UART: [fwproc] Wait for Commands...
1,284,344 UART: [fwproc] Recv command 0x46574c44
1,285,077 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,582 UART: ROM Fatal Error: 0x000B0021
1,551,739 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,268 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
2,027,462 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,171,650 UART:
2,172,030 UART: Running Caliptra ROM ...
2,173,117 UART:
2,173,281 UART: [state] CFI Enabled
2,174,208 UART: [state] LifecycleState = Unprovisioned
2,175,853 UART: [state] DebugLocked = No
2,176,963 UART: [state] WD Timer not started. Device not locked for debugging
2,179,433 UART: [kat] SHA2-256
2,180,099 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,183,113 UART: [kat] ++
2,183,564 UART: [kat] sha1
2,184,249 UART: [kat] SHA2-256
2,184,991 UART: [kat] SHA2-384
2,185,659 UART: [kat] SHA2-512-ACC
2,186,488 UART: [kat] ECC-384
3,775,922 UART: [kat] HMAC-384Kdf
3,795,965 UART: [kat] LMS
4,869,109 UART: [kat] --
4,872,854 UART: [cold-reset] ++
4,874,230 UART: [fht] FHT @ 0x50003400
4,885,538 UART: [idev] ++
4,886,221 UART: [idev] CDI.KEYID = 6
4,887,454 UART: [idev] SUBJECT.KEYID = 7
4,888,560 UART: [idev] UDS.KEYID = 0
4,921,520 UART: [idev] Erasing UDS.KEYID = 0
8,231,812 UART: [idev] Sha1 KeyId Algorithm
8,254,756 UART: [idev] --
8,258,158 UART: [ldev] ++
8,258,781 UART: [ldev] CDI.KEYID = 6
8,259,965 UART: [ldev] SUBJECT.KEYID = 5
8,261,119 UART: [ldev] AUTHORITY.KEYID = 7
8,262,345 UART: [ldev] FE.KEYID = 1
8,309,798 UART: [ldev] Erasing FE.KEYID = 1
11,642,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,934,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,950,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,966,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,982,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,003,546 UART: [ldev] --
14,007,850 UART: [fwproc] Wait for Commands...
14,009,900 UART: [fwproc] Recv command 0x46574c44
14,012,175 UART: [fwproc] Recv'd Img size: 114124 bytes
16,960,932 UART: ROM Fatal Error: 0x000B0021
16,964,298 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
2,026,486 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,768,595 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,020,614 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,652 UART:
2,165,055 UART: Running Caliptra ROM ...
2,166,140 UART:
2,166,292 UART: [state] CFI Enabled
2,167,292 UART: [state] LifecycleState = Unprovisioned
2,168,933 UART: [state] DebugLocked = No
2,169,955 UART: [state] WD Timer not started. Device not locked for debugging
2,172,411 UART: [kat] SHA2-256
2,173,072 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,086 UART: [kat] ++
2,176,533 UART: [kat] sha1
2,177,037 UART: [kat] SHA2-256
2,177,773 UART: [kat] SHA2-384
2,178,432 UART: [kat] SHA2-512-ACC
2,179,224 UART: [kat] ECC-384
4,095,425 UART: [kat] HMAC-384Kdf
4,107,342 UART: [kat] LMS
5,180,494 UART: [kat] --
5,184,536 UART: [cold-reset] ++
5,186,371 UART: [fht] FHT @ 0x50003400
5,199,114 UART: [idev] ++
5,199,839 UART: [idev] CDI.KEYID = 6
5,201,027 UART: [idev] SUBJECT.KEYID = 7
5,202,460 UART: [idev] UDS.KEYID = 0
5,218,867 UART: [idev] Erasing UDS.KEYID = 0
8,488,268 UART: [idev] Sha1 KeyId Algorithm
8,510,950 UART: [idev] --
8,515,319 UART: [ldev] ++
8,515,877 UART: [ldev] CDI.KEYID = 6
8,517,109 UART: [ldev] SUBJECT.KEYID = 5
8,518,594 UART: [ldev] AUTHORITY.KEYID = 7
8,520,150 UART: [ldev] FE.KEYID = 1
8,533,330 UART: [ldev] Erasing FE.KEYID = 1
11,822,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,833 UART: [ldev] --
14,188,553 UART: [fwproc] Wait for Commands...
14,190,807 UART: [fwproc] Recv command 0x46574c44
14,193,131 UART: [fwproc] Recv'd Img size: 114124 bytes
17,139,787 UART: ROM Fatal Error: 0x000B0021
17,143,212 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,460 writing to cptra_bootfsm_go
2,028,673 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,967,731 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
2,022,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,498 UART:
2,166,895 UART: Running Caliptra ROM ...
2,168,068 UART:
2,168,243 UART: [state] CFI Enabled
2,169,197 UART: [state] LifecycleState = Unprovisioned
2,170,837 UART: [state] DebugLocked = No
2,171,944 UART: [state] WD Timer not started. Device not locked for debugging
2,174,413 UART: [kat] SHA2-256
2,175,079 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,088 UART: [kat] ++
2,178,541 UART: [kat] sha1
2,179,054 UART: [kat] SHA2-256
2,179,816 UART: [kat] SHA2-384
2,180,485 UART: [kat] SHA2-512-ACC
2,181,286 UART: [kat] ECC-384
2,947,564 UART: [kat] HMAC-384Kdf
2,970,548 UART: [kat] LMS
3,499,993 UART: [kat] --
3,503,978 UART: [cold-reset] ++
3,505,273 UART: [fht] FHT @ 0x50003400
3,516,305 UART: [idev] ++
3,516,871 UART: [idev] CDI.KEYID = 6
3,517,840 UART: [idev] SUBJECT.KEYID = 7
3,519,001 UART: [idev] UDS.KEYID = 0
3,542,015 UART: [idev] Erasing UDS.KEYID = 0
6,025,766 UART: [idev] Sha1 KeyId Algorithm
6,048,784 UART: [idev] --
6,053,212 UART: [ldev] ++
6,053,804 UART: [ldev] CDI.KEYID = 6
6,054,717 UART: [ldev] SUBJECT.KEYID = 5
6,055,883 UART: [ldev] AUTHORITY.KEYID = 7
6,057,121 UART: [ldev] FE.KEYID = 1
6,098,833 UART: [ldev] Erasing FE.KEYID = 1
8,598,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,622 UART: [ldev] --
10,392,115 UART: [fwproc] Wait for Commands...
10,395,079 UART: [fwproc] Recv command 0x46574c44
10,397,126 UART: [fwproc] Recv'd Img size: 114448 bytes
12,686,002 UART: ROM Fatal Error: 0x000B0021
12,689,081 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,029,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,455,045 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,022,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,853 UART:
2,168,255 UART: Running Caliptra ROM ...
2,169,426 UART:
2,169,600 UART: [state] CFI Enabled
2,170,559 UART: [state] LifecycleState = Unprovisioned
2,172,200 UART: [state] DebugLocked = No
2,173,304 UART: [state] WD Timer not started. Device not locked for debugging
2,175,776 UART: [kat] SHA2-256
2,176,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,477 UART: [kat] ++
2,179,926 UART: [kat] sha1
2,180,438 UART: [kat] SHA2-256
2,181,175 UART: [kat] SHA2-384
2,181,837 UART: [kat] SHA2-512-ACC
2,182,678 UART: [kat] ECC-384
3,280,233 UART: [kat] HMAC-384Kdf
3,292,991 UART: [kat] LMS
3,822,466 UART: [kat] --
3,826,956 UART: [cold-reset] ++
3,827,806 UART: [fht] FHT @ 0x50003400
3,837,166 UART: [idev] ++
3,837,724 UART: [idev] CDI.KEYID = 6
3,838,684 UART: [idev] SUBJECT.KEYID = 7
3,839,894 UART: [idev] UDS.KEYID = 0
3,859,126 UART: [idev] Erasing UDS.KEYID = 0
6,315,631 UART: [idev] Sha1 KeyId Algorithm
6,339,613 UART: [idev] --
6,343,717 UART: [ldev] ++
6,344,283 UART: [ldev] CDI.KEYID = 6
6,345,225 UART: [ldev] SUBJECT.KEYID = 5
6,346,380 UART: [ldev] AUTHORITY.KEYID = 7
6,347,767 UART: [ldev] FE.KEYID = 1
6,357,398 UART: [ldev] Erasing FE.KEYID = 1
8,830,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,851 UART: [ldev] --
10,621,111 UART: [fwproc] Wait for Commands...
10,623,390 UART: [fwproc] Recv command 0x46574c44
10,625,436 UART: [fwproc] Recv'd Img size: 114448 bytes
12,919,711 UART: ROM Fatal Error: 0x000B0021
12,922,842 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
2,020,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,700,954 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,021,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,510,556 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,023,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,708,857 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,492 UART: [kat] SHA2-512-ACC
906,393 UART: [kat] ECC-384
916,318 UART: [kat] HMAC-384Kdf
921,034 UART: [kat] LMS
1,169,346 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,545 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,182,215 UART: [idev] Erasing UDS.KEYID = 0
1,199,417 UART: [idev] Sha1 KeyId Algorithm
1,208,337 UART: [idev] --
1,209,474 UART: [ldev] ++
1,209,642 UART: [ldev] CDI.KEYID = 6
1,210,006 UART: [ldev] SUBJECT.KEYID = 5
1,210,433 UART: [ldev] AUTHORITY.KEYID = 7
1,210,896 UART: [ldev] FE.KEYID = 1
1,216,084 UART: [ldev] Erasing FE.KEYID = 1
1,242,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,618 UART: [ldev] --
1,282,020 UART: [fwproc] Wait for Commands...
1,282,599 UART: [fwproc] Recv command 0x46574c44
1,283,332 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,993 UART: ROM Fatal Error: 0x000B0021
1,550,150 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,169 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,182,508 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,431 UART: [ldev] ++
1,209,599 UART: [ldev] CDI.KEYID = 6
1,209,963 UART: [ldev] SUBJECT.KEYID = 5
1,210,390 UART: [ldev] AUTHORITY.KEYID = 7
1,210,853 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,003 UART: [ldev] --
1,282,297 UART: [fwproc] Wait for Commands...
1,283,032 UART: [fwproc] Recv command 0x46574c44
1,283,765 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,992 UART: ROM Fatal Error: 0x000B0021
1,552,149 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,936 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,578 UART: [state] LifecycleState = Unprovisioned
86,233 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,806 UART: [kat] SHA2-512-ACC
906,707 UART: [kat] ECC-384
916,772 UART: [kat] HMAC-384Kdf
921,358 UART: [kat] LMS
1,169,670 UART: [kat] --
1,170,313 UART: [cold-reset] ++
1,170,805 UART: [fht] FHT @ 0x50003400
1,173,535 UART: [idev] ++
1,173,703 UART: [idev] CDI.KEYID = 6
1,174,064 UART: [idev] SUBJECT.KEYID = 7
1,174,489 UART: [idev] UDS.KEYID = 0
1,183,073 UART: [idev] Erasing UDS.KEYID = 0
1,200,213 UART: [idev] Sha1 KeyId Algorithm
1,209,139 UART: [idev] --
1,210,298 UART: [ldev] ++
1,210,466 UART: [ldev] CDI.KEYID = 6
1,210,830 UART: [ldev] SUBJECT.KEYID = 5
1,211,257 UART: [ldev] AUTHORITY.KEYID = 7
1,211,720 UART: [ldev] FE.KEYID = 1
1,216,802 UART: [ldev] Erasing FE.KEYID = 1
1,243,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,408 UART: [ldev] --
1,282,688 UART: [fwproc] Wait for Commands...
1,283,315 UART: [fwproc] Recv command 0x46574c44
1,284,048 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,945 UART: ROM Fatal Error: 0x000B0021
1,551,102 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,493 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,497 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,194 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,142 UART: [idev] ++
1,173,310 UART: [idev] CDI.KEYID = 6
1,173,671 UART: [idev] SUBJECT.KEYID = 7
1,174,096 UART: [idev] UDS.KEYID = 0
1,182,182 UART: [idev] Erasing UDS.KEYID = 0
1,198,964 UART: [idev] Sha1 KeyId Algorithm
1,207,850 UART: [idev] --
1,208,881 UART: [ldev] ++
1,209,049 UART: [ldev] CDI.KEYID = 6
1,209,413 UART: [ldev] SUBJECT.KEYID = 5
1,209,840 UART: [ldev] AUTHORITY.KEYID = 7
1,210,303 UART: [ldev] FE.KEYID = 1
1,215,947 UART: [ldev] Erasing FE.KEYID = 1
1,242,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,891 UART: [ldev] --
1,281,399 UART: [fwproc] Wait for Commands...
1,282,090 UART: [fwproc] Recv command 0x46574c44
1,282,823 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,072 UART: ROM Fatal Error: 0x000B0021
1,550,229 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,454 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,459 UART: [kat] SHA2-256
901,399 UART: [kat] SHA2-384
904,184 UART: [kat] SHA2-512-ACC
906,085 UART: [kat] ECC-384
915,494 UART: [kat] HMAC-384Kdf
920,050 UART: [kat] LMS
1,168,362 UART: [kat] --
1,169,171 UART: [cold-reset] ++
1,169,527 UART: [fht] FHT @ 0x50003400
1,172,379 UART: [idev] ++
1,172,547 UART: [idev] CDI.KEYID = 6
1,172,908 UART: [idev] SUBJECT.KEYID = 7
1,173,333 UART: [idev] UDS.KEYID = 0
1,181,133 UART: [idev] Erasing UDS.KEYID = 0
1,198,497 UART: [idev] Sha1 KeyId Algorithm
1,207,525 UART: [idev] --
1,208,574 UART: [ldev] ++
1,208,742 UART: [ldev] CDI.KEYID = 6
1,209,106 UART: [ldev] SUBJECT.KEYID = 5
1,209,533 UART: [ldev] AUTHORITY.KEYID = 7
1,209,996 UART: [ldev] FE.KEYID = 1
1,215,214 UART: [ldev] Erasing FE.KEYID = 1
1,241,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,634 UART: [ldev] --
1,280,904 UART: [fwproc] Wait for Commands...
1,281,645 UART: [fwproc] Recv command 0x46574c44
1,282,378 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,693 UART: ROM Fatal Error: 0x000B0021
1,549,850 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,093 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,372 UART: [kat] ++
895,524 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,263 UART: [kat] SHA2-512-ACC
906,164 UART: [kat] ECC-384
915,745 UART: [kat] HMAC-384Kdf
920,327 UART: [kat] LMS
1,168,639 UART: [kat] --
1,169,800 UART: [cold-reset] ++
1,170,360 UART: [fht] FHT @ 0x50003400
1,173,252 UART: [idev] ++
1,173,420 UART: [idev] CDI.KEYID = 6
1,173,781 UART: [idev] SUBJECT.KEYID = 7
1,174,206 UART: [idev] UDS.KEYID = 0
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,208,124 UART: [idev] --
1,209,219 UART: [ldev] ++
1,209,387 UART: [ldev] CDI.KEYID = 6
1,209,751 UART: [ldev] SUBJECT.KEYID = 5
1,210,178 UART: [ldev] AUTHORITY.KEYID = 7
1,210,641 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,241,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,971 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,281,980 UART: [fwproc] Recv command 0x46574c44
1,282,713 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,424 UART: ROM Fatal Error: 0x000B0021
1,549,581 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,144 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,729 writing to cptra_bootfsm_go
2,020,825 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,067 UART:
2,165,488 UART: Running Caliptra ROM ...
2,166,653 UART:
2,166,823 UART: [state] CFI Enabled
2,167,804 UART: [state] LifecycleState = Unprovisioned
2,169,461 UART: [state] DebugLocked = No
2,170,569 UART: [state] WD Timer not started. Device not locked for debugging
2,173,039 UART: [kat] SHA2-256
2,173,710 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,720 UART: [kat] ++
2,177,174 UART: [kat] sha1
2,177,686 UART: [kat] SHA2-256
2,178,420 UART: [kat] SHA2-384
2,179,111 UART: [kat] SHA2-512-ACC
2,179,994 UART: [kat] ECC-384
3,774,779 UART: [kat] HMAC-384Kdf
3,794,561 UART: [kat] LMS
4,867,762 UART: [kat] --
4,872,432 UART: [cold-reset] ++
4,873,664 UART: [fht] FHT @ 0x50003400
4,886,650 UART: [idev] ++
4,887,369 UART: [idev] CDI.KEYID = 6
4,888,556 UART: [idev] SUBJECT.KEYID = 7
4,889,712 UART: [idev] UDS.KEYID = 0
4,921,138 UART: [idev] Erasing UDS.KEYID = 0
8,233,383 UART: [idev] Sha1 KeyId Algorithm
8,256,380 UART: [idev] --
8,260,947 UART: [ldev] ++
8,261,522 UART: [ldev] CDI.KEYID = 6
8,262,783 UART: [ldev] SUBJECT.KEYID = 5
8,263,890 UART: [ldev] AUTHORITY.KEYID = 7
8,265,122 UART: [ldev] FE.KEYID = 1
8,309,827 UART: [ldev] Erasing FE.KEYID = 1
11,641,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,935,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,951,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,967,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,983,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,003,213 UART: [ldev] --
14,007,119 UART: [fwproc] Wait for Commands...
14,010,143 UART: [fwproc] Recv command 0x46574c44
14,012,472 UART: [fwproc] Recv'd Img size: 114124 bytes
16,959,823 UART: ROM Fatal Error: 0x000B0022
16,963,251 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,021,262 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,775,736 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,022,633 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,700 UART:
2,167,099 UART: Running Caliptra ROM ...
2,168,276 UART:
2,168,440 UART: [state] CFI Enabled
2,169,314 UART: [state] LifecycleState = Unprovisioned
2,170,944 UART: [state] DebugLocked = No
2,171,965 UART: [state] WD Timer not started. Device not locked for debugging
2,174,424 UART: [kat] SHA2-256
2,175,079 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,106 UART: [kat] ++
2,178,551 UART: [kat] sha1
2,179,053 UART: [kat] SHA2-256
2,179,705 UART: [kat] SHA2-384
2,180,353 UART: [kat] SHA2-512-ACC
2,181,190 UART: [kat] ECC-384
4,096,597 UART: [kat] HMAC-384Kdf
4,109,757 UART: [kat] LMS
5,182,924 UART: [kat] --
5,187,372 UART: [cold-reset] ++
5,189,955 UART: [fht] FHT @ 0x50003400
5,200,878 UART: [idev] ++
5,201,547 UART: [idev] CDI.KEYID = 6
5,202,701 UART: [idev] SUBJECT.KEYID = 7
5,204,182 UART: [idev] UDS.KEYID = 0
5,220,857 UART: [idev] Erasing UDS.KEYID = 0
8,496,080 UART: [idev] Sha1 KeyId Algorithm
8,517,708 UART: [idev] --
8,522,070 UART: [ldev] ++
8,522,630 UART: [ldev] CDI.KEYID = 6
8,523,786 UART: [ldev] SUBJECT.KEYID = 5
8,525,269 UART: [ldev] AUTHORITY.KEYID = 7
8,526,809 UART: [ldev] FE.KEYID = 1
8,538,207 UART: [ldev] Erasing FE.KEYID = 1
11,826,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,014 UART: [ldev] --
14,191,415 UART: [fwproc] Wait for Commands...
14,194,373 UART: [fwproc] Recv command 0x46574c44
14,196,711 UART: [fwproc] Recv'd Img size: 114124 bytes
17,136,800 UART: ROM Fatal Error: 0x000B0022
17,140,215 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
2,026,312 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,961,269 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,021,414 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,097 UART:
2,166,534 UART: Running Caliptra ROM ...
2,167,622 UART:
2,167,777 UART: [state] CFI Enabled
2,168,745 UART: [state] LifecycleState = Unprovisioned
2,170,393 UART: [state] DebugLocked = No
2,171,416 UART: [state] WD Timer not started. Device not locked for debugging
2,173,883 UART: [kat] SHA2-256
2,174,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,563 UART: [kat] ++
2,178,012 UART: [kat] sha1
2,178,530 UART: [kat] SHA2-256
2,179,188 UART: [kat] SHA2-384
2,179,844 UART: [kat] SHA2-512-ACC
2,180,690 UART: [kat] ECC-384
2,947,851 UART: [kat] HMAC-384Kdf
2,971,240 UART: [kat] LMS
3,500,680 UART: [kat] --
3,504,942 UART: [cold-reset] ++
3,506,608 UART: [fht] FHT @ 0x50003400
3,517,049 UART: [idev] ++
3,517,618 UART: [idev] CDI.KEYID = 6
3,518,538 UART: [idev] SUBJECT.KEYID = 7
3,519,752 UART: [idev] UDS.KEYID = 0
3,544,371 UART: [idev] Erasing UDS.KEYID = 0
6,023,100 UART: [idev] Sha1 KeyId Algorithm
6,046,129 UART: [idev] --
6,048,992 UART: [ldev] ++
6,049,567 UART: [ldev] CDI.KEYID = 6
6,050,634 UART: [ldev] SUBJECT.KEYID = 5
6,051,744 UART: [ldev] AUTHORITY.KEYID = 7
6,052,922 UART: [ldev] FE.KEYID = 1
6,101,916 UART: [ldev] Erasing FE.KEYID = 1
8,602,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,134 UART: [ldev] --
10,414,302 UART: [fwproc] Wait for Commands...
10,416,503 UART: [fwproc] Recv command 0x46574c44
10,418,556 UART: [fwproc] Recv'd Img size: 114448 bytes
12,709,687 UART: ROM Fatal Error: 0x000B0022
12,712,830 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,020,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,518,174 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,501 writing to cptra_bootfsm_go
2,022,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,541 UART:
2,166,935 UART: Running Caliptra ROM ...
2,168,096 UART:
2,168,269 UART: [state] CFI Enabled
2,169,226 UART: [state] LifecycleState = Unprovisioned
2,170,862 UART: [state] DebugLocked = No
2,171,967 UART: [state] WD Timer not started. Device not locked for debugging
2,174,439 UART: [kat] SHA2-256
2,175,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,121 UART: [kat] ++
2,178,569 UART: [kat] sha1
2,179,163 UART: [kat] SHA2-256
2,179,826 UART: [kat] SHA2-384
2,180,480 UART: [kat] SHA2-512-ACC
2,181,355 UART: [kat] ECC-384
3,278,817 UART: [kat] HMAC-384Kdf
3,289,826 UART: [kat] LMS
3,819,333 UART: [kat] --
3,823,968 UART: [cold-reset] ++
3,824,874 UART: [fht] FHT @ 0x50003400
3,835,314 UART: [idev] ++
3,835,877 UART: [idev] CDI.KEYID = 6
3,836,891 UART: [idev] SUBJECT.KEYID = 7
3,837,992 UART: [idev] UDS.KEYID = 0
3,851,695 UART: [idev] Erasing UDS.KEYID = 0
6,307,877 UART: [idev] Sha1 KeyId Algorithm
6,331,848 UART: [idev] --
6,336,490 UART: [ldev] ++
6,337,053 UART: [ldev] CDI.KEYID = 6
6,338,042 UART: [ldev] SUBJECT.KEYID = 5
6,339,200 UART: [ldev] AUTHORITY.KEYID = 7
6,340,425 UART: [ldev] FE.KEYID = 1
6,352,981 UART: [ldev] Erasing FE.KEYID = 1
8,830,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,561 UART: [ldev] --
10,620,674 UART: [fwproc] Wait for Commands...
10,623,489 UART: [fwproc] Recv command 0x46574c44
10,625,590 UART: [fwproc] Recv'd Img size: 114448 bytes
12,915,496 UART: ROM Fatal Error: 0x000B0022
12,918,630 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
2,021,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,695,626 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
2,021,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,491,572 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
2,021,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,687,341 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
890,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,075 UART: [kat] ++
895,227 UART: [kat] sha1
899,403 UART: [kat] SHA2-256
901,343 UART: [kat] SHA2-384
904,076 UART: [kat] SHA2-512-ACC
905,977 UART: [kat] ECC-384
915,244 UART: [kat] HMAC-384Kdf
920,006 UART: [kat] LMS
1,168,318 UART: [kat] --
1,169,337 UART: [cold-reset] ++
1,169,793 UART: [fht] FHT @ 0x50003400
1,172,479 UART: [idev] ++
1,172,647 UART: [idev] CDI.KEYID = 6
1,173,008 UART: [idev] SUBJECT.KEYID = 7
1,173,433 UART: [idev] UDS.KEYID = 0
1,181,461 UART: [idev] Erasing UDS.KEYID = 0
1,198,327 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,360 UART: [ldev] ++
1,208,528 UART: [ldev] CDI.KEYID = 6
1,208,892 UART: [ldev] SUBJECT.KEYID = 5
1,209,319 UART: [ldev] AUTHORITY.KEYID = 7
1,209,782 UART: [ldev] FE.KEYID = 1
1,214,750 UART: [ldev] Erasing FE.KEYID = 1
1,240,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,216 UART: [ldev] --
1,280,532 UART: [fwproc] Wait for Commands...
1,281,113 UART: [fwproc] Recv command 0x46574c44
1,281,846 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,849 UART: ROM Fatal Error: 0x000B0022
1,550,006 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,887 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,695 UART: [kat] SHA2-512-ACC
906,596 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,487 UART: [kat] LMS
1,169,799 UART: [kat] --
1,170,856 UART: [cold-reset] ++
1,171,230 UART: [fht] FHT @ 0x50003400
1,173,866 UART: [idev] ++
1,174,034 UART: [idev] CDI.KEYID = 6
1,174,395 UART: [idev] SUBJECT.KEYID = 7
1,174,820 UART: [idev] UDS.KEYID = 0
1,183,346 UART: [idev] Erasing UDS.KEYID = 0
1,199,856 UART: [idev] Sha1 KeyId Algorithm
1,208,640 UART: [idev] --
1,209,591 UART: [ldev] ++
1,209,759 UART: [ldev] CDI.KEYID = 6
1,210,123 UART: [ldev] SUBJECT.KEYID = 5
1,210,550 UART: [ldev] AUTHORITY.KEYID = 7
1,211,013 UART: [ldev] FE.KEYID = 1
1,216,681 UART: [ldev] Erasing FE.KEYID = 1
1,243,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,419 UART: [ldev] --
1,282,829 UART: [fwproc] Wait for Commands...
1,283,410 UART: [fwproc] Recv command 0x46574c44
1,284,143 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,676 UART: ROM Fatal Error: 0x000B0022
1,550,833 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,874 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
85,813 UART: [state] WD Timer not started. Device not locked for debugging
86,962 UART: [kat] SHA2-256
890,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,641 UART: [kat] ++
894,793 UART: [kat] sha1
898,961 UART: [kat] SHA2-256
900,901 UART: [kat] SHA2-384
903,758 UART: [kat] SHA2-512-ACC
905,659 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,413 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,447 UART: [idev] ++
1,172,615 UART: [idev] CDI.KEYID = 6
1,172,976 UART: [idev] SUBJECT.KEYID = 7
1,173,401 UART: [idev] UDS.KEYID = 0
1,180,933 UART: [idev] Erasing UDS.KEYID = 0
1,197,959 UART: [idev] Sha1 KeyId Algorithm
1,206,823 UART: [idev] --
1,207,846 UART: [ldev] ++
1,208,014 UART: [ldev] CDI.KEYID = 6
1,208,378 UART: [ldev] SUBJECT.KEYID = 5
1,208,805 UART: [ldev] AUTHORITY.KEYID = 7
1,209,268 UART: [ldev] FE.KEYID = 1
1,214,706 UART: [ldev] Erasing FE.KEYID = 1
1,240,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,740 UART: [ldev] --
1,280,190 UART: [fwproc] Wait for Commands...
1,281,003 UART: [fwproc] Recv command 0x46574c44
1,281,736 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,205 UART: ROM Fatal Error: 0x000B0022
1,548,362 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,317 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
891,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,576 UART: [kat] SHA2-256
901,516 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
915,595 UART: [kat] HMAC-384Kdf
920,267 UART: [kat] LMS
1,168,579 UART: [kat] --
1,169,344 UART: [cold-reset] ++
1,169,898 UART: [fht] FHT @ 0x50003400
1,172,372 UART: [idev] ++
1,172,540 UART: [idev] CDI.KEYID = 6
1,172,901 UART: [idev] SUBJECT.KEYID = 7
1,173,326 UART: [idev] UDS.KEYID = 0
1,181,234 UART: [idev] Erasing UDS.KEYID = 0
1,198,774 UART: [idev] Sha1 KeyId Algorithm
1,207,738 UART: [idev] --
1,208,837 UART: [ldev] ++
1,209,005 UART: [ldev] CDI.KEYID = 6
1,209,369 UART: [ldev] SUBJECT.KEYID = 5
1,209,796 UART: [ldev] AUTHORITY.KEYID = 7
1,210,259 UART: [ldev] FE.KEYID = 1
1,215,519 UART: [ldev] Erasing FE.KEYID = 1
1,241,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,801 UART: [ldev] --
1,281,083 UART: [fwproc] Wait for Commands...
1,281,776 UART: [fwproc] Recv command 0x46574c44
1,282,509 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,486 UART: ROM Fatal Error: 0x000B0022
1,549,643 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,112 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,598 UART: [kat] SHA2-512-ACC
906,499 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,169,793 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,181,773 UART: [idev] Erasing UDS.KEYID = 0
1,198,697 UART: [idev] Sha1 KeyId Algorithm
1,207,687 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,866 UART: [ldev] --
1,280,312 UART: [fwproc] Wait for Commands...
1,280,899 UART: [fwproc] Recv command 0x46574c44
1,281,632 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,591 UART: ROM Fatal Error: 0x000B0022
1,548,748 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,495 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
891,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,932 UART: [kat] ++
896,084 UART: [kat] sha1
900,298 UART: [kat] SHA2-256
902,238 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,201 UART: [kat] LMS
1,169,513 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,820 UART: [idev] Sha1 KeyId Algorithm
1,208,654 UART: [idev] --
1,209,791 UART: [ldev] ++
1,209,959 UART: [ldev] CDI.KEYID = 6
1,210,323 UART: [ldev] SUBJECT.KEYID = 5
1,210,750 UART: [ldev] AUTHORITY.KEYID = 7
1,211,213 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,242,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,813 UART: [ldev] --
1,282,227 UART: [fwproc] Wait for Commands...
1,283,050 UART: [fwproc] Recv command 0x46574c44
1,283,783 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,412 UART: ROM Fatal Error: 0x000B0022
1,551,569 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,622 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,023,285 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,536 UART:
2,167,943 UART: Running Caliptra ROM ...
2,169,024 UART:
2,169,180 UART: [state] CFI Enabled
2,170,154 UART: [state] LifecycleState = Unprovisioned
2,171,796 UART: [state] DebugLocked = No
2,172,823 UART: [state] WD Timer not started. Device not locked for debugging
2,175,284 UART: [kat] SHA2-256
2,175,950 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,958 UART: [kat] ++
2,179,408 UART: [kat] sha1
2,179,938 UART: [kat] SHA2-256
2,180,598 UART: [kat] SHA2-384
2,181,257 UART: [kat] SHA2-512-ACC
2,182,083 UART: [kat] ECC-384
3,776,781 UART: [kat] HMAC-384Kdf
3,801,390 UART: [kat] LMS
4,874,533 UART: [kat] --
4,880,583 UART: [cold-reset] ++
4,882,197 UART: [fht] FHT @ 0x50003400
4,894,259 UART: [idev] ++
4,894,980 UART: [idev] CDI.KEYID = 6
4,896,172 UART: [idev] SUBJECT.KEYID = 7
4,897,332 UART: [idev] UDS.KEYID = 0
4,928,318 UART: [idev] Erasing UDS.KEYID = 0
8,240,827 UART: [idev] Sha1 KeyId Algorithm
8,262,158 UART: [idev] --
8,266,251 UART: [ldev] ++
8,266,832 UART: [ldev] CDI.KEYID = 6
8,267,939 UART: [ldev] SUBJECT.KEYID = 5
8,269,154 UART: [ldev] AUTHORITY.KEYID = 7
8,270,306 UART: [ldev] FE.KEYID = 1
8,315,695 UART: [ldev] Erasing FE.KEYID = 1
11,649,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,894 UART: [ldev] --
14,034,681 UART: [fwproc] Wait for Commands...
14,036,893 UART: [fwproc] Recv command 0x46574c44
14,039,170 UART: [fwproc] Recv'd Img size: 114124 bytes
16,983,998 UART: ROM Fatal Error: 0x000B0021
16,987,474 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,024,948 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,748,108 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,026,626 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,170,730 UART:
2,171,119 UART: Running Caliptra ROM ...
2,172,288 UART:
2,172,474 UART: [state] CFI Enabled
2,173,445 UART: [state] LifecycleState = Unprovisioned
2,175,096 UART: [state] DebugLocked = No
2,176,204 UART: [state] WD Timer not started. Device not locked for debugging
2,178,671 UART: [kat] SHA2-256
2,179,331 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,573 UART: [kat] ++
2,183,033 UART: [kat] sha1
2,183,547 UART: [kat] SHA2-256
2,184,198 UART: [kat] SHA2-384
2,184,881 UART: [kat] SHA2-512-ACC
2,185,707 UART: [kat] ECC-384
4,100,910 UART: [kat] HMAC-384Kdf
4,113,387 UART: [kat] LMS
5,186,527 UART: [kat] --
5,190,658 UART: [cold-reset] ++
5,193,105 UART: [fht] FHT @ 0x50003400
5,204,095 UART: [idev] ++
5,204,662 UART: [idev] CDI.KEYID = 6
5,205,791 UART: [idev] SUBJECT.KEYID = 7
5,207,333 UART: [idev] UDS.KEYID = 0
5,224,460 UART: [idev] Erasing UDS.KEYID = 0
8,495,428 UART: [idev] Sha1 KeyId Algorithm
8,517,391 UART: [idev] --
8,521,909 UART: [ldev] ++
8,522,486 UART: [ldev] CDI.KEYID = 6
8,523,723 UART: [ldev] SUBJECT.KEYID = 5
8,525,161 UART: [ldev] AUTHORITY.KEYID = 7
8,526,724 UART: [ldev] FE.KEYID = 1
8,538,564 UART: [ldev] Erasing FE.KEYID = 1
11,824,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,698 UART: [ldev] --
14,189,961 UART: [fwproc] Wait for Commands...
14,191,687 UART: [fwproc] Recv command 0x46574c44
14,193,954 UART: [fwproc] Recv'd Img size: 114124 bytes
17,144,823 UART: ROM Fatal Error: 0x000B0021
17,148,242 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
2,028,803 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,961,676 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
2,040,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,185,307 UART:
2,185,718 UART: Running Caliptra ROM ...
2,186,805 UART:
2,186,960 UART: [state] CFI Enabled
2,187,863 UART: [state] LifecycleState = Unprovisioned
2,189,511 UART: [state] DebugLocked = No
2,190,542 UART: [state] WD Timer not started. Device not locked for debugging
2,193,016 UART: [kat] SHA2-256
2,193,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,196,710 UART: [kat] ++
2,197,160 UART: [kat] sha1
2,197,672 UART: [kat] SHA2-256
2,198,327 UART: [kat] SHA2-384
2,198,983 UART: [kat] SHA2-512-ACC
2,199,804 UART: [kat] ECC-384
2,948,542 UART: [kat] HMAC-384Kdf
2,973,184 UART: [kat] LMS
3,502,648 UART: [kat] --
3,507,274 UART: [cold-reset] ++
3,509,718 UART: [fht] FHT @ 0x50003400
3,519,187 UART: [idev] ++
3,519,759 UART: [idev] CDI.KEYID = 6
3,520,665 UART: [idev] SUBJECT.KEYID = 7
3,521,828 UART: [idev] UDS.KEYID = 0
3,545,640 UART: [idev] Erasing UDS.KEYID = 0
6,025,857 UART: [idev] Sha1 KeyId Algorithm
6,048,663 UART: [idev] --
6,052,989 UART: [ldev] ++
6,053,570 UART: [ldev] CDI.KEYID = 6
6,054,482 UART: [ldev] SUBJECT.KEYID = 5
6,055,651 UART: [ldev] AUTHORITY.KEYID = 7
6,056,891 UART: [ldev] FE.KEYID = 1
6,101,133 UART: [ldev] Erasing FE.KEYID = 1
8,605,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,954 UART: [ldev] --
10,415,224 UART: [fwproc] Wait for Commands...
10,418,245 UART: [fwproc] Recv command 0x46574c44
10,420,364 UART: [fwproc] Recv'd Img size: 114448 bytes
12,714,646 UART: ROM Fatal Error: 0x000B0021
12,717,769 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
2,025,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,473,060 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
2,024,878 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,405 UART:
2,169,808 UART: Running Caliptra ROM ...
2,170,892 UART:
2,171,043 UART: [state] CFI Enabled
2,172,020 UART: [state] LifecycleState = Unprovisioned
2,173,670 UART: [state] DebugLocked = No
2,174,716 UART: [state] WD Timer not started. Device not locked for debugging
2,177,189 UART: [kat] SHA2-256
2,177,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,870 UART: [kat] ++
2,181,321 UART: [kat] sha1
2,181,829 UART: [kat] SHA2-256
2,182,485 UART: [kat] SHA2-384
2,183,140 UART: [kat] SHA2-512-ACC
2,184,172 UART: [kat] ECC-384
3,286,363 UART: [kat] HMAC-384Kdf
3,298,646 UART: [kat] LMS
3,828,147 UART: [kat] --
3,832,246 UART: [cold-reset] ++
3,833,202 UART: [fht] FHT @ 0x50003400
3,845,077 UART: [idev] ++
3,845,645 UART: [idev] CDI.KEYID = 6
3,846,540 UART: [idev] SUBJECT.KEYID = 7
3,847,753 UART: [idev] UDS.KEYID = 0
3,865,540 UART: [idev] Erasing UDS.KEYID = 0
6,324,177 UART: [idev] Sha1 KeyId Algorithm
6,347,073 UART: [idev] --
6,352,499 UART: [ldev] ++
6,353,073 UART: [ldev] CDI.KEYID = 6
6,353,961 UART: [ldev] SUBJECT.KEYID = 5
6,355,173 UART: [ldev] AUTHORITY.KEYID = 7
6,356,401 UART: [ldev] FE.KEYID = 1
6,367,213 UART: [ldev] Erasing FE.KEYID = 1
8,841,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,946 UART: [ldev] --
10,630,992 UART: [fwproc] Wait for Commands...
10,634,285 UART: [fwproc] Recv command 0x46574c44
10,636,334 UART: [fwproc] Recv'd Img size: 114448 bytes
12,923,558 UART: ROM Fatal Error: 0x000B0021
12,926,684 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,024,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,705,282 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
2,042,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,518,933 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,024,216 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,696,060 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,170,185 UART: [cold-reset] ++
1,170,537 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,643 UART: [idev] Sha1 KeyId Algorithm
1,207,363 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,214,954 UART: [ldev] Erasing FE.KEYID = 1
1,241,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,434 UART: [ldev] --
1,280,848 UART: [fwproc] Wait for Commands...
1,281,575 UART: [fwproc] Recv command 0x46574c44
1,282,308 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,603 UART: ROM Fatal Error: 0x000B0021
1,549,760 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,873 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
899,830 UART: [kat] SHA2-256
901,770 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
915,879 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,181,992 UART: [idev] Erasing UDS.KEYID = 0
1,198,882 UART: [idev] Sha1 KeyId Algorithm
1,207,768 UART: [idev] --
1,208,817 UART: [ldev] ++
1,208,985 UART: [ldev] CDI.KEYID = 6
1,209,349 UART: [ldev] SUBJECT.KEYID = 5
1,209,776 UART: [ldev] AUTHORITY.KEYID = 7
1,210,239 UART: [ldev] FE.KEYID = 1
1,215,527 UART: [ldev] Erasing FE.KEYID = 1
1,241,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,401 UART: [ldev] --
1,280,845 UART: [fwproc] Wait for Commands...
1,281,660 UART: [fwproc] Recv command 0x46574c44
1,282,393 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,060 UART: ROM Fatal Error: 0x000B0021
1,550,217 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,842 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,137 UART: [kat] ++
895,289 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
915,742 UART: [kat] HMAC-384Kdf
920,206 UART: [kat] LMS
1,168,518 UART: [kat] --
1,169,337 UART: [cold-reset] ++
1,169,709 UART: [fht] FHT @ 0x50003400
1,172,433 UART: [idev] ++
1,172,601 UART: [idev] CDI.KEYID = 6
1,172,962 UART: [idev] SUBJECT.KEYID = 7
1,173,387 UART: [idev] UDS.KEYID = 0
1,181,337 UART: [idev] Erasing UDS.KEYID = 0
1,198,251 UART: [idev] Sha1 KeyId Algorithm
1,207,247 UART: [idev] --
1,208,454 UART: [ldev] ++
1,208,622 UART: [ldev] CDI.KEYID = 6
1,208,986 UART: [ldev] SUBJECT.KEYID = 5
1,209,413 UART: [ldev] AUTHORITY.KEYID = 7
1,209,876 UART: [ldev] FE.KEYID = 1
1,214,952 UART: [ldev] Erasing FE.KEYID = 1
1,241,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,910 UART: [ldev] --
1,280,230 UART: [fwproc] Wait for Commands...
1,280,971 UART: [fwproc] Recv command 0x46574c44
1,281,704 UART: [fwproc] Recv'd Img size: 114448 bytes
1,547,711 UART: ROM Fatal Error: 0x000B0021
1,548,868 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,291 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,747 UART: [kat] LMS
1,169,059 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,458 UART: [fht] FHT @ 0x50003400
1,173,204 UART: [idev] ++
1,173,372 UART: [idev] CDI.KEYID = 6
1,173,733 UART: [idev] SUBJECT.KEYID = 7
1,174,158 UART: [idev] UDS.KEYID = 0
1,182,124 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,208,180 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,605 UART: [ldev] SUBJECT.KEYID = 5
1,210,032 UART: [ldev] AUTHORITY.KEYID = 7
1,210,495 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,829 UART: [ldev] --
1,281,323 UART: [fwproc] Wait for Commands...
1,282,044 UART: [fwproc] Recv command 0x46574c44
1,282,777 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,956 UART: ROM Fatal Error: 0x000B0021
1,550,113 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,610 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
891,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,653 UART: [kat] ++
895,805 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,874 UART: [kat] SHA2-512-ACC
906,775 UART: [kat] ECC-384
916,946 UART: [kat] HMAC-384Kdf
921,520 UART: [kat] LMS
1,169,832 UART: [kat] --
1,170,529 UART: [cold-reset] ++
1,171,009 UART: [fht] FHT @ 0x50003400
1,173,673 UART: [idev] ++
1,173,841 UART: [idev] CDI.KEYID = 6
1,174,202 UART: [idev] SUBJECT.KEYID = 7
1,174,627 UART: [idev] UDS.KEYID = 0
1,182,325 UART: [idev] Erasing UDS.KEYID = 0
1,199,451 UART: [idev] Sha1 KeyId Algorithm
1,208,339 UART: [idev] --
1,209,536 UART: [ldev] ++
1,209,704 UART: [ldev] CDI.KEYID = 6
1,210,068 UART: [ldev] SUBJECT.KEYID = 5
1,210,495 UART: [ldev] AUTHORITY.KEYID = 7
1,210,958 UART: [ldev] FE.KEYID = 1
1,216,378 UART: [ldev] Erasing FE.KEYID = 1
1,242,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,422 UART: [ldev] --
1,281,796 UART: [fwproc] Wait for Commands...
1,282,559 UART: [fwproc] Recv command 0x46574c44
1,283,292 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,328 UART: ROM Fatal Error: 0x000B0021
1,549,485 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,781 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,725 UART: [kat] SHA2-256
891,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,404 UART: [kat] ++
895,556 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,619 UART: [kat] HMAC-384Kdf
921,139 UART: [kat] LMS
1,169,451 UART: [kat] --
1,170,516 UART: [cold-reset] ++
1,171,004 UART: [fht] FHT @ 0x50003400
1,173,578 UART: [idev] ++
1,173,746 UART: [idev] CDI.KEYID = 6
1,174,107 UART: [idev] SUBJECT.KEYID = 7
1,174,532 UART: [idev] UDS.KEYID = 0
1,182,302 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,012 UART: [idev] --
1,209,125 UART: [ldev] ++
1,209,293 UART: [ldev] CDI.KEYID = 6
1,209,657 UART: [ldev] SUBJECT.KEYID = 5
1,210,084 UART: [ldev] AUTHORITY.KEYID = 7
1,210,547 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,417 UART: [fwproc] Wait for Commands...
1,282,234 UART: [fwproc] Recv command 0x46574c44
1,282,967 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,362 UART: ROM Fatal Error: 0x000B0021
1,550,519 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,056 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,024,431 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,986 UART:
2,169,397 UART: Running Caliptra ROM ...
2,170,476 UART:
2,170,633 UART: [state] CFI Enabled
2,171,611 UART: [state] LifecycleState = Unprovisioned
2,173,252 UART: [state] DebugLocked = No
2,174,274 UART: [state] WD Timer not started. Device not locked for debugging
2,176,736 UART: [kat] SHA2-256
2,177,406 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,419 UART: [kat] ++
2,180,868 UART: [kat] sha1
2,181,379 UART: [kat] SHA2-256
2,182,035 UART: [kat] SHA2-384
2,182,716 UART: [kat] SHA2-512-ACC
2,183,550 UART: [kat] ECC-384
3,773,950 UART: [kat] HMAC-384Kdf
3,802,761 UART: [kat] LMS
4,875,872 UART: [kat] --
4,880,435 UART: [cold-reset] ++
4,882,914 UART: [fht] FHT @ 0x50003400
4,894,434 UART: [idev] ++
4,895,108 UART: [idev] CDI.KEYID = 6
4,896,348 UART: [idev] SUBJECT.KEYID = 7
4,897,462 UART: [idev] UDS.KEYID = 0
4,931,448 UART: [idev] Erasing UDS.KEYID = 0
8,243,442 UART: [idev] Sha1 KeyId Algorithm
8,264,020 UART: [idev] --
8,268,714 UART: [ldev] ++
8,269,279 UART: [ldev] CDI.KEYID = 6
8,270,537 UART: [ldev] SUBJECT.KEYID = 5
8,271,641 UART: [ldev] AUTHORITY.KEYID = 7
8,272,867 UART: [ldev] FE.KEYID = 1
8,321,258 UART: [ldev] Erasing FE.KEYID = 1
11,658,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,037,176 UART: [ldev] --
14,042,010 UART: [fwproc] Wait for Commands...
14,044,982 UART: [fwproc] Recv command 0x46574c44
14,047,304 UART: [fwproc] Recv'd Img size: 114124 bytes
16,751,208 UART: ROM Fatal Error: 0x000B0034
16,754,670 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,018,723 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,162,562 UART:
2,162,953 UART: Running Caliptra ROM ...
2,164,031 UART:
2,164,186 UART: [state] CFI Enabled
2,165,147 UART: [state] LifecycleState = Unprovisioned
2,166,765 UART: [state] DebugLocked = No
2,167,992 UART: [state] WD Timer not started. Device not locked for debugging
2,170,482 UART: [kat] SHA2-256
2,171,149 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,174,181 UART: [kat] ++
2,174,630 UART: [kat] sha1
2,175,139 UART: [kat] SHA2-256
2,175,797 UART: [kat] SHA2-384
2,176,455 UART: [kat] SHA2-512-ACC
2,177,339 UART: [kat] ECC-384
3,775,990 UART: [kat] HMAC-384Kdf
3,801,120 UART: [kat] LMS
4,874,266 UART: [kat] --
4,878,508 UART: [cold-reset] ++
4,879,800 UART: [fht] FHT @ 0x50003400
4,890,454 UART: [idev] ++
4,891,131 UART: [idev] CDI.KEYID = 6
4,892,238 UART: [idev] SUBJECT.KEYID = 7
4,893,449 UART: [idev] UDS.KEYID = 0
4,928,734 UART: [idev] Erasing UDS.KEYID = 0
8,243,063 UART: [idev] Sha1 KeyId Algorithm
8,266,295 UART: [idev] --
8,271,151 UART: [ldev] ++
8,271,715 UART: [ldev] CDI.KEYID = 6
8,272,874 UART: [ldev] SUBJECT.KEYID = 5
8,274,085 UART: [ldev] AUTHORITY.KEYID = 7
8,275,241 UART: [ldev] FE.KEYID = 1
8,316,536 UART: [ldev] Erasing FE.KEYID = 1
11,650,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,298 UART: [ldev] --
14,033,051 UART: [fwproc] Wait for Commands...
14,034,529 UART: [fwproc] Recv command 0x46574c44
14,036,521 UART: [fwproc] Recv'd Img size: 114124 bytes
16,741,912 UART: ROM Fatal Error: 0x000B0034
16,745,298 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,020,348 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,538,750 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
2,018,874 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,524,094 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,022,789 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,891 UART:
2,167,297 UART: Running Caliptra ROM ...
2,168,583 UART:
2,168,743 UART: [state] CFI Enabled
2,169,614 UART: [state] LifecycleState = Unprovisioned
2,171,268 UART: [state] DebugLocked = No
2,172,348 UART: [state] WD Timer not started. Device not locked for debugging
2,174,819 UART: [kat] SHA2-256
2,175,482 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,498 UART: [kat] ++
2,178,944 UART: [kat] sha1
2,179,447 UART: [kat] SHA2-256
2,180,180 UART: [kat] SHA2-384
2,180,841 UART: [kat] SHA2-512-ACC
2,181,715 UART: [kat] ECC-384
4,099,357 UART: [kat] HMAC-384Kdf
4,112,026 UART: [kat] LMS
5,185,148 UART: [kat] --
5,189,356 UART: [cold-reset] ++
5,192,093 UART: [fht] FHT @ 0x50003400
5,203,177 UART: [idev] ++
5,203,853 UART: [idev] CDI.KEYID = 6
5,204,974 UART: [idev] SUBJECT.KEYID = 7
5,206,510 UART: [idev] UDS.KEYID = 0
5,223,997 UART: [idev] Erasing UDS.KEYID = 0
8,496,546 UART: [idev] Sha1 KeyId Algorithm
8,519,667 UART: [idev] --
8,525,117 UART: [ldev] ++
8,525,737 UART: [ldev] CDI.KEYID = 6
8,526,913 UART: [ldev] SUBJECT.KEYID = 5
8,528,398 UART: [ldev] AUTHORITY.KEYID = 7
8,529,953 UART: [ldev] FE.KEYID = 1
8,541,462 UART: [ldev] Erasing FE.KEYID = 1
11,834,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,946 UART: [ldev] --
14,198,566 UART: [fwproc] Wait for Commands...
14,200,658 UART: [fwproc] Recv command 0x46574c44
14,202,966 UART: [fwproc] Recv'd Img size: 114124 bytes
16,910,173 UART: ROM Fatal Error: 0x000B0034
16,913,640 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,018,750 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,162,509 UART:
2,162,899 UART: Running Caliptra ROM ...
2,163,997 UART:
2,164,146 UART: [state] CFI Enabled
2,165,107 UART: [state] LifecycleState = Unprovisioned
2,166,757 UART: [state] DebugLocked = No
2,167,774 UART: [state] WD Timer not started. Device not locked for debugging
2,170,229 UART: [kat] SHA2-256
2,170,887 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,173,892 UART: [kat] ++
2,174,335 UART: [kat] sha1
2,174,835 UART: [kat] SHA2-256
2,175,483 UART: [kat] SHA2-384
2,176,130 UART: [kat] SHA2-512-ACC
2,176,920 UART: [kat] ECC-384
4,099,311 UART: [kat] HMAC-384Kdf
4,110,805 UART: [kat] LMS
5,183,980 UART: [kat] --
5,186,698 UART: [cold-reset] ++
5,188,123 UART: [fht] FHT @ 0x50003400
5,199,216 UART: [idev] ++
5,199,894 UART: [idev] CDI.KEYID = 6
5,200,996 UART: [idev] SUBJECT.KEYID = 7
5,202,531 UART: [idev] UDS.KEYID = 0
5,218,100 UART: [idev] Erasing UDS.KEYID = 0
8,490,357 UART: [idev] Sha1 KeyId Algorithm
8,512,070 UART: [idev] --
8,516,872 UART: [ldev] ++
8,517,428 UART: [ldev] CDI.KEYID = 6
8,518,580 UART: [ldev] SUBJECT.KEYID = 5
8,520,113 UART: [ldev] AUTHORITY.KEYID = 7
8,521,590 UART: [ldev] FE.KEYID = 1
8,533,849 UART: [ldev] Erasing FE.KEYID = 1
11,826,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,007 UART: [ldev] --
14,188,187 UART: [fwproc] Wait for Commands...
14,191,360 UART: [fwproc] Recv command 0x46574c44
14,193,619 UART: [fwproc] Recv'd Img size: 114124 bytes
16,896,655 UART: ROM Fatal Error: 0x000B0034
16,900,051 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,021,387 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,718,395 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
2,020,169 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,718,847 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,038,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,183,251 UART:
2,183,669 UART: Running Caliptra ROM ...
2,184,837 UART:
2,185,012 UART: [state] CFI Enabled
2,185,971 UART: [state] LifecycleState = Unprovisioned
2,187,614 UART: [state] DebugLocked = No
2,188,641 UART: [state] WD Timer not started. Device not locked for debugging
2,191,113 UART: [kat] SHA2-256
2,191,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,194,791 UART: [kat] ++
2,195,239 UART: [kat] sha1
2,195,750 UART: [kat] SHA2-256
2,196,404 UART: [kat] SHA2-384
2,197,061 UART: [kat] SHA2-512-ACC
2,197,905 UART: [kat] ECC-384
2,945,416 UART: [kat] HMAC-384Kdf
2,971,633 UART: [kat] LMS
3,501,075 UART: [kat] --
3,504,162 UART: [cold-reset] ++
3,505,229 UART: [fht] FHT @ 0x50003400
3,516,748 UART: [idev] ++
3,517,314 UART: [idev] CDI.KEYID = 6
3,518,234 UART: [idev] SUBJECT.KEYID = 7
3,519,446 UART: [idev] UDS.KEYID = 0
3,544,119 UART: [idev] Erasing UDS.KEYID = 0
6,026,017 UART: [idev] Sha1 KeyId Algorithm
6,048,752 UART: [idev] --
6,052,978 UART: [ldev] ++
6,053,555 UART: [ldev] CDI.KEYID = 6
6,054,471 UART: [ldev] SUBJECT.KEYID = 5
6,055,640 UART: [ldev] AUTHORITY.KEYID = 7
6,056,878 UART: [ldev] FE.KEYID = 1
6,099,454 UART: [ldev] Erasing FE.KEYID = 1
8,601,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,850 UART: [ldev] --
10,413,772 UART: [fwproc] Wait for Commands...
10,415,654 UART: [fwproc] Recv command 0x46574c44
10,417,705 UART: [fwproc] Recv'd Img size: 114448 bytes
12,470,551 UART: ROM Fatal Error: 0x000B0034
12,473,672 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,020 writing to cptra_bootfsm_go
2,032,458 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,176,638 UART:
2,177,038 UART: Running Caliptra ROM ...
2,178,204 UART:
2,178,393 UART: [state] CFI Enabled
2,179,361 UART: [state] LifecycleState = Unprovisioned
2,181,021 UART: [state] DebugLocked = No
2,182,130 UART: [state] WD Timer not started. Device not locked for debugging
2,184,597 UART: [kat] SHA2-256
2,185,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,188,274 UART: [kat] ++
2,188,722 UART: [kat] sha1
2,189,342 UART: [kat] SHA2-256
2,190,013 UART: [kat] SHA2-384
2,190,863 UART: [kat] SHA2-512-ACC
2,191,756 UART: [kat] ECC-384
2,925,764 UART: [kat] HMAC-384Kdf
2,949,170 UART: [kat] LMS
3,478,625 UART: [kat] --
3,482,995 UART: [cold-reset] ++
3,483,950 UART: [fht] FHT @ 0x50003400
3,493,719 UART: [idev] ++
3,494,281 UART: [idev] CDI.KEYID = 6
3,495,214 UART: [idev] SUBJECT.KEYID = 7
3,496,428 UART: [idev] UDS.KEYID = 0
3,521,452 UART: [idev] Erasing UDS.KEYID = 0
6,005,526 UART: [idev] Sha1 KeyId Algorithm
6,027,962 UART: [idev] --
6,033,337 UART: [ldev] ++
6,033,911 UART: [ldev] CDI.KEYID = 6
6,034,793 UART: [ldev] SUBJECT.KEYID = 5
6,036,009 UART: [ldev] AUTHORITY.KEYID = 7
6,037,263 UART: [ldev] FE.KEYID = 1
6,078,342 UART: [ldev] Erasing FE.KEYID = 1
8,579,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,850 UART: [ldev] --
10,390,982 UART: [fwproc] Wait for Commands...
10,393,239 UART: [fwproc] Recv command 0x46574c44
10,395,276 UART: [fwproc] Recv'd Img size: 114448 bytes
12,444,066 UART: ROM Fatal Error: 0x000B0034
12,447,158 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
2,021,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,230,489 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
2,023,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,252,990 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
2,025,301 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,927 UART:
2,170,328 UART: Running Caliptra ROM ...
2,171,503 UART:
2,171,675 UART: [state] CFI Enabled
2,172,633 UART: [state] LifecycleState = Unprovisioned
2,174,271 UART: [state] DebugLocked = No
2,175,381 UART: [state] WD Timer not started. Device not locked for debugging
2,177,854 UART: [kat] SHA2-256
2,178,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,535 UART: [kat] ++
2,182,034 UART: [kat] sha1
2,182,572 UART: [kat] SHA2-256
2,183,314 UART: [kat] SHA2-384
2,183,978 UART: [kat] SHA2-512-ACC
2,184,956 UART: [kat] ECC-384
3,282,330 UART: [kat] HMAC-384Kdf
3,295,535 UART: [kat] LMS
3,825,038 UART: [kat] --
3,829,054 UART: [cold-reset] ++
3,829,963 UART: [fht] FHT @ 0x50003400
3,840,029 UART: [idev] ++
3,840,655 UART: [idev] CDI.KEYID = 6
3,841,542 UART: [idev] SUBJECT.KEYID = 7
3,842,759 UART: [idev] UDS.KEYID = 0
3,858,493 UART: [idev] Erasing UDS.KEYID = 0
6,314,572 UART: [idev] Sha1 KeyId Algorithm
6,338,193 UART: [idev] --
6,342,581 UART: [ldev] ++
6,343,154 UART: [ldev] CDI.KEYID = 6
6,344,062 UART: [ldev] SUBJECT.KEYID = 5
6,345,219 UART: [ldev] AUTHORITY.KEYID = 7
6,346,502 UART: [ldev] FE.KEYID = 1
6,355,871 UART: [ldev] Erasing FE.KEYID = 1
8,828,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,496 UART: [ldev] --
10,615,147 UART: [fwproc] Wait for Commands...
10,617,357 UART: [fwproc] Recv command 0x46574c44
10,619,459 UART: [fwproc] Recv'd Img size: 114448 bytes
12,675,573 UART: ROM Fatal Error: 0x000B0034
12,678,662 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,021,505 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,735 UART:
2,166,124 UART: Running Caliptra ROM ...
2,167,282 UART:
2,167,451 UART: [state] CFI Enabled
2,168,407 UART: [state] LifecycleState = Unprovisioned
2,170,069 UART: [state] DebugLocked = No
2,171,179 UART: [state] WD Timer not started. Device not locked for debugging
2,173,669 UART: [kat] SHA2-256
2,174,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,340 UART: [kat] ++
2,177,789 UART: [kat] sha1
2,178,494 UART: [kat] SHA2-256
2,179,188 UART: [kat] SHA2-384
2,179,845 UART: [kat] SHA2-512-ACC
2,180,644 UART: [kat] ECC-384
3,284,647 UART: [kat] HMAC-384Kdf
3,296,235 UART: [kat] LMS
3,825,730 UART: [kat] --
3,830,414 UART: [cold-reset] ++
3,832,123 UART: [fht] FHT @ 0x50003400
3,843,794 UART: [idev] ++
3,844,349 UART: [idev] CDI.KEYID = 6
3,845,359 UART: [idev] SUBJECT.KEYID = 7
3,846,531 UART: [idev] UDS.KEYID = 0
3,860,072 UART: [idev] Erasing UDS.KEYID = 0
6,319,628 UART: [idev] Sha1 KeyId Algorithm
6,342,095 UART: [idev] --
6,345,489 UART: [ldev] ++
6,346,247 UART: [ldev] CDI.KEYID = 6
6,347,168 UART: [ldev] SUBJECT.KEYID = 5
6,348,275 UART: [ldev] AUTHORITY.KEYID = 7
6,349,445 UART: [ldev] FE.KEYID = 1
6,361,977 UART: [ldev] Erasing FE.KEYID = 1
8,836,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,151 UART: [ldev] --
10,627,630 UART: [fwproc] Wait for Commands...
10,630,698 UART: [fwproc] Recv command 0x46574c44
10,632,792 UART: [fwproc] Recv'd Img size: 114448 bytes
12,696,612 UART: ROM Fatal Error: 0x000B0034
12,699,729 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
2,021,704 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,454,908 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,020,951 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,462,432 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,033,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,254,121 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
2,024,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,232,855 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,021,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,451,019 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
2,020,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,467,494 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
891,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,796 UART: [kat] SHA2-512-ACC
906,697 UART: [kat] ECC-384
916,248 UART: [kat] HMAC-384Kdf
920,804 UART: [kat] LMS
1,169,116 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,349 UART: [fht] FHT @ 0x50003400
1,172,907 UART: [idev] ++
1,173,075 UART: [idev] CDI.KEYID = 6
1,173,436 UART: [idev] SUBJECT.KEYID = 7
1,173,861 UART: [idev] UDS.KEYID = 0
1,181,621 UART: [idev] Erasing UDS.KEYID = 0
1,199,067 UART: [idev] Sha1 KeyId Algorithm
1,207,983 UART: [idev] --
1,208,982 UART: [ldev] ++
1,209,150 UART: [ldev] CDI.KEYID = 6
1,209,514 UART: [ldev] SUBJECT.KEYID = 5
1,209,941 UART: [ldev] AUTHORITY.KEYID = 7
1,210,404 UART: [ldev] FE.KEYID = 1
1,215,738 UART: [ldev] Erasing FE.KEYID = 1
1,241,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,640 UART: [ldev] --
1,281,072 UART: [fwproc] Wait for Commands...
1,281,837 UART: [fwproc] Recv command 0x46574c44
1,282,570 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,598 UART: ROM Fatal Error: 0x000B0034
1,330,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,290 UART: [kat] SHA2-512-ACC
906,191 UART: [kat] ECC-384
915,684 UART: [kat] HMAC-384Kdf
920,048 UART: [kat] LMS
1,168,360 UART: [kat] --
1,169,145 UART: [cold-reset] ++
1,169,719 UART: [fht] FHT @ 0x50003400
1,172,399 UART: [idev] ++
1,172,567 UART: [idev] CDI.KEYID = 6
1,172,928 UART: [idev] SUBJECT.KEYID = 7
1,173,353 UART: [idev] UDS.KEYID = 0
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,109 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,014 UART: [ldev] ++
1,208,182 UART: [ldev] CDI.KEYID = 6
1,208,546 UART: [ldev] SUBJECT.KEYID = 5
1,208,973 UART: [ldev] AUTHORITY.KEYID = 7
1,209,436 UART: [ldev] FE.KEYID = 1
1,214,474 UART: [ldev] Erasing FE.KEYID = 1
1,240,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,756 UART: [ldev] --
1,280,202 UART: [fwproc] Wait for Commands...
1,280,807 UART: [fwproc] Recv command 0x46574c44
1,281,540 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,002 UART: ROM Fatal Error: 0x000B0034
1,330,159 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,236 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,505 UART: [kat] HMAC-384Kdf
921,209 UART: [kat] LMS
1,169,521 UART: [kat] --
1,170,538 UART: [cold-reset] ++
1,171,012 UART: [fht] FHT @ 0x50003400
1,173,648 UART: [idev] ++
1,173,816 UART: [idev] CDI.KEYID = 6
1,174,177 UART: [idev] SUBJECT.KEYID = 7
1,174,602 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,486 UART: [idev] Sha1 KeyId Algorithm
1,208,368 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,029 UART: [ldev] Erasing FE.KEYID = 1
1,241,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,545 UART: [ldev] --
1,280,909 UART: [fwproc] Wait for Commands...
1,281,658 UART: [fwproc] Recv command 0x46574c44
1,282,391 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,535 UART: ROM Fatal Error: 0x000B0034
1,330,692 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,675 UART: [state] LifecycleState = Unprovisioned
85,330 UART: [state] DebugLocked = No
85,892 UART: [state] WD Timer not started. Device not locked for debugging
87,233 UART: [kat] SHA2-256
890,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,912 UART: [kat] ++
895,064 UART: [kat] sha1
899,232 UART: [kat] SHA2-256
901,172 UART: [kat] SHA2-384
903,913 UART: [kat] SHA2-512-ACC
905,814 UART: [kat] ECC-384
915,631 UART: [kat] HMAC-384Kdf
920,141 UART: [kat] LMS
1,168,453 UART: [kat] --
1,169,050 UART: [cold-reset] ++
1,169,384 UART: [fht] FHT @ 0x50003400
1,172,020 UART: [idev] ++
1,172,188 UART: [idev] CDI.KEYID = 6
1,172,549 UART: [idev] SUBJECT.KEYID = 7
1,172,974 UART: [idev] UDS.KEYID = 0
1,180,962 UART: [idev] Erasing UDS.KEYID = 0
1,197,746 UART: [idev] Sha1 KeyId Algorithm
1,206,720 UART: [idev] --
1,207,685 UART: [ldev] ++
1,207,853 UART: [ldev] CDI.KEYID = 6
1,208,217 UART: [ldev] SUBJECT.KEYID = 5
1,208,644 UART: [ldev] AUTHORITY.KEYID = 7
1,209,107 UART: [ldev] FE.KEYID = 1
1,214,427 UART: [ldev] Erasing FE.KEYID = 1
1,240,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,793 UART: [ldev] --
1,280,155 UART: [fwproc] Wait for Commands...
1,280,964 UART: [fwproc] Recv command 0x46574c44
1,281,697 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,829 UART: ROM Fatal Error: 0x000B0034
1,329,986 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,061 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,447 UART: [kat] SHA2-256
901,387 UART: [kat] SHA2-384
904,176 UART: [kat] SHA2-512-ACC
906,077 UART: [kat] ECC-384
915,658 UART: [kat] HMAC-384Kdf
920,218 UART: [kat] LMS
1,168,530 UART: [kat] --
1,169,331 UART: [cold-reset] ++
1,169,789 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,745 UART: [idev] Sha1 KeyId Algorithm
1,207,621 UART: [idev] --
1,208,750 UART: [ldev] ++
1,208,918 UART: [ldev] CDI.KEYID = 6
1,209,282 UART: [ldev] SUBJECT.KEYID = 5
1,209,709 UART: [ldev] AUTHORITY.KEYID = 7
1,210,172 UART: [ldev] FE.KEYID = 1
1,215,446 UART: [ldev] Erasing FE.KEYID = 1
1,242,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,194 UART: [ldev] --
1,281,658 UART: [fwproc] Wait for Commands...
1,282,371 UART: [fwproc] Recv command 0x46574c44
1,283,104 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,782 UART: ROM Fatal Error: 0x000B0034
1,331,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,376 UART: [kat] SHA2-512-ACC
906,277 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,199,083 UART: [idev] Sha1 KeyId Algorithm
1,208,131 UART: [idev] --
1,209,026 UART: [ldev] ++
1,209,194 UART: [ldev] CDI.KEYID = 6
1,209,558 UART: [ldev] SUBJECT.KEYID = 5
1,209,985 UART: [ldev] AUTHORITY.KEYID = 7
1,210,448 UART: [ldev] FE.KEYID = 1
1,215,788 UART: [ldev] Erasing FE.KEYID = 1
1,242,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,570 UART: [ldev] --
1,281,930 UART: [fwproc] Wait for Commands...
1,282,613 UART: [fwproc] Recv command 0x46574c44
1,283,346 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,057 UART: ROM Fatal Error: 0x000B0034
1,331,214 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,402 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
891,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,938 UART: [kat] ++
896,090 UART: [kat] sha1
900,456 UART: [kat] SHA2-256
902,396 UART: [kat] SHA2-384
905,127 UART: [kat] SHA2-512-ACC
907,028 UART: [kat] ECC-384
916,377 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,169,888 UART: [cold-reset] ++
1,170,374 UART: [fht] FHT @ 0x50003400
1,173,242 UART: [idev] ++
1,173,410 UART: [idev] CDI.KEYID = 6
1,173,771 UART: [idev] SUBJECT.KEYID = 7
1,174,196 UART: [idev] UDS.KEYID = 0
1,181,968 UART: [idev] Erasing UDS.KEYID = 0
1,198,568 UART: [idev] Sha1 KeyId Algorithm
1,207,358 UART: [idev] --
1,208,287 UART: [ldev] ++
1,208,455 UART: [ldev] CDI.KEYID = 6
1,208,819 UART: [ldev] SUBJECT.KEYID = 5
1,209,246 UART: [ldev] AUTHORITY.KEYID = 7
1,209,709 UART: [ldev] FE.KEYID = 1
1,215,359 UART: [ldev] Erasing FE.KEYID = 1
1,241,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,587 UART: [ldev] --
1,280,893 UART: [fwproc] Wait for Commands...
1,281,544 UART: [fwproc] Recv command 0x46574c44
1,282,277 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,743 UART: ROM Fatal Error: 0x000B0034
1,330,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,589 UART: [kat] SHA2-256
891,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,268 UART: [kat] ++
895,420 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,079 UART: [kat] SHA2-512-ACC
905,980 UART: [kat] ECC-384
915,799 UART: [kat] HMAC-384Kdf
920,447 UART: [kat] LMS
1,168,759 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,170,014 UART: [fht] FHT @ 0x50003400
1,172,636 UART: [idev] ++
1,172,804 UART: [idev] CDI.KEYID = 6
1,173,165 UART: [idev] SUBJECT.KEYID = 7
1,173,590 UART: [idev] UDS.KEYID = 0
1,181,598 UART: [idev] Erasing UDS.KEYID = 0
1,198,664 UART: [idev] Sha1 KeyId Algorithm
1,207,446 UART: [idev] --
1,208,597 UART: [ldev] ++
1,208,765 UART: [ldev] CDI.KEYID = 6
1,209,129 UART: [ldev] SUBJECT.KEYID = 5
1,209,556 UART: [ldev] AUTHORITY.KEYID = 7
1,210,019 UART: [ldev] FE.KEYID = 1
1,215,175 UART: [ldev] Erasing FE.KEYID = 1
1,241,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,699 UART: [ldev] --
1,281,071 UART: [fwproc] Wait for Commands...
1,281,832 UART: [fwproc] Recv command 0x46574c44
1,282,565 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,029 UART: ROM Fatal Error: 0x000B0034
1,331,186 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,719 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,545 UART: [cold-reset] ++
1,170,117 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,199,383 UART: [idev] Sha1 KeyId Algorithm
1,208,311 UART: [idev] --
1,209,442 UART: [ldev] ++
1,209,610 UART: [ldev] CDI.KEYID = 6
1,209,974 UART: [ldev] SUBJECT.KEYID = 5
1,210,401 UART: [ldev] AUTHORITY.KEYID = 7
1,210,864 UART: [ldev] FE.KEYID = 1
1,215,878 UART: [ldev] Erasing FE.KEYID = 1
1,242,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,194 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,295 UART: [fwproc] Recv command 0x46574c44
1,283,028 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,016 UART: ROM Fatal Error: 0x000B0034
1,331,173 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,874 UART: [kat] SHA2-512-ACC
906,775 UART: [kat] ECC-384
916,812 UART: [kat] HMAC-384Kdf
921,626 UART: [kat] LMS
1,169,938 UART: [kat] --
1,171,007 UART: [cold-reset] ++
1,171,555 UART: [fht] FHT @ 0x50003400
1,174,145 UART: [idev] ++
1,174,313 UART: [idev] CDI.KEYID = 6
1,174,674 UART: [idev] SUBJECT.KEYID = 7
1,175,099 UART: [idev] UDS.KEYID = 0
1,183,073 UART: [idev] Erasing UDS.KEYID = 0
1,199,885 UART: [idev] Sha1 KeyId Algorithm
1,208,877 UART: [idev] --
1,209,880 UART: [ldev] ++
1,210,048 UART: [ldev] CDI.KEYID = 6
1,210,412 UART: [ldev] SUBJECT.KEYID = 5
1,210,839 UART: [ldev] AUTHORITY.KEYID = 7
1,211,302 UART: [ldev] FE.KEYID = 1
1,216,744 UART: [ldev] Erasing FE.KEYID = 1
1,242,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,168 UART: [ldev] --
1,281,492 UART: [fwproc] Wait for Commands...
1,282,125 UART: [fwproc] Recv command 0x46574c44
1,282,858 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,020 UART: ROM Fatal Error: 0x000B0034
1,331,177 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,848 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,433 UART: [kat] SHA2-256
890,983 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,112 UART: [kat] ++
895,264 UART: [kat] sha1
899,560 UART: [kat] SHA2-256
901,500 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,372 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,182,082 UART: [idev] Erasing UDS.KEYID = 0
1,199,314 UART: [idev] Sha1 KeyId Algorithm
1,208,240 UART: [idev] --
1,209,395 UART: [ldev] ++
1,209,563 UART: [ldev] CDI.KEYID = 6
1,209,927 UART: [ldev] SUBJECT.KEYID = 5
1,210,354 UART: [ldev] AUTHORITY.KEYID = 7
1,210,817 UART: [ldev] FE.KEYID = 1
1,215,961 UART: [ldev] Erasing FE.KEYID = 1
1,242,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,611 UART: [fwproc] Wait for Commands...
1,282,324 UART: [fwproc] Recv command 0x46574c44
1,283,057 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,401 UART: ROM Fatal Error: 0x000B0034
1,331,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,190 UART: [kat] SHA2-256
902,130 UART: [kat] SHA2-384
905,053 UART: [kat] SHA2-512-ACC
906,954 UART: [kat] ECC-384
916,847 UART: [kat] HMAC-384Kdf
921,727 UART: [kat] LMS
1,170,039 UART: [kat] --
1,170,992 UART: [cold-reset] ++
1,171,402 UART: [fht] FHT @ 0x50003400
1,174,182 UART: [idev] ++
1,174,350 UART: [idev] CDI.KEYID = 6
1,174,711 UART: [idev] SUBJECT.KEYID = 7
1,175,136 UART: [idev] UDS.KEYID = 0
1,183,074 UART: [idev] Erasing UDS.KEYID = 0
1,200,084 UART: [idev] Sha1 KeyId Algorithm
1,208,944 UART: [idev] --
1,209,967 UART: [ldev] ++
1,210,135 UART: [ldev] CDI.KEYID = 6
1,210,499 UART: [ldev] SUBJECT.KEYID = 5
1,210,926 UART: [ldev] AUTHORITY.KEYID = 7
1,211,389 UART: [ldev] FE.KEYID = 1
1,216,653 UART: [ldev] Erasing FE.KEYID = 1
1,243,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,559 UART: [ldev] --
1,282,991 UART: [fwproc] Wait for Commands...
1,283,588 UART: [fwproc] Recv command 0x46574c44
1,284,321 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,127 UART: ROM Fatal Error: 0x000B0034
1,332,284 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,865 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,861 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
5,415 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,119 UART:
192,370 UART: Running Caliptra ROM ...
193,429 UART:
193,564 UART: [state] CFI Enabled
264,697 UART: [state] LifecycleState = Manufacturing
266,942 UART: [state] DebugLocked = No
268,229 UART: [state] WD Timer not started. Device not locked for debugging
272,453 UART: [kat] SHA2-256
454,401 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,933 UART: [kat] ++
466,381 UART: [kat] sha1
478,071 UART: [kat] SHA2-256
481,090 UART: [kat] SHA2-384
487,660 UART: [kat] SHA2-512-ACC
490,274 UART: [kat] ECC-384
3,773,452 UART: [kat] HMAC-384Kdf
3,801,470 UART: [kat] LMS
4,874,633 UART: [kat] --
4,878,087 UART: [cold-reset] ++
4,880,779 UART: [fht] FHT @ 0x50003400
4,891,110 UART: [idev] ++
4,891,778 UART: [idev] CDI.KEYID = 6
4,893,009 UART: [idev] SUBJECT.KEYID = 7
4,894,166 UART: [idev] UDS.KEYID = 0
4,928,091 UART: [idev] Erasing UDS.KEYID = 0
8,243,108 UART: [idev] Sha1 KeyId Algorithm
8,265,853 UART: [idev] --
8,270,277 UART: [ldev] ++
8,270,840 UART: [ldev] CDI.KEYID = 6
8,272,074 UART: [ldev] SUBJECT.KEYID = 5
8,273,228 UART: [ldev] AUTHORITY.KEYID = 7
8,274,473 UART: [ldev] FE.KEYID = 1
8,315,918 UART: [ldev] Erasing FE.KEYID = 1
11,652,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,287 UART: [ldev] --
14,035,639 UART: [fwproc] Wait for Commands...
14,038,578 UART: [fwproc] Recv command 0x46574c44
14,040,912 UART: [fwproc] Recv'd Img size: 114124 bytes
17,014,127 UART: ROM Fatal Error: 0x000B0025
17,017,479 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
5,292 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,789,517 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
6,783 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,400 UART:
192,771 UART: Running Caliptra ROM ...
193,891 UART:
603,432 UART: [state] CFI Enabled
618,052 UART: [state] LifecycleState = Manufacturing
620,433 UART: [state] DebugLocked = No
622,050 UART: [state] WD Timer not started. Device not locked for debugging
627,262 UART: [kat] SHA2-256
809,237 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,775 UART: [kat] ++
821,318 UART: [kat] sha1
831,442 UART: [kat] SHA2-256
834,456 UART: [kat] SHA2-384
840,593 UART: [kat] SHA2-512-ACC
843,253 UART: [kat] ECC-384
4,096,457 UART: [kat] HMAC-384Kdf
4,108,273 UART: [kat] LMS
5,181,458 UART: [kat] --
5,187,252 UART: [cold-reset] ++
5,188,329 UART: [fht] FHT @ 0x50003400
5,199,300 UART: [idev] ++
5,199,974 UART: [idev] CDI.KEYID = 6
5,201,204 UART: [idev] SUBJECT.KEYID = 7
5,202,631 UART: [idev] UDS.KEYID = 0
5,217,645 UART: [idev] Erasing UDS.KEYID = 0
8,495,596 UART: [idev] Sha1 KeyId Algorithm
8,516,359 UART: [idev] --
8,521,161 UART: [ldev] ++
8,521,726 UART: [ldev] CDI.KEYID = 6
8,522,885 UART: [ldev] SUBJECT.KEYID = 5
8,524,418 UART: [ldev] AUTHORITY.KEYID = 7
8,525,893 UART: [ldev] FE.KEYID = 1
8,537,564 UART: [ldev] Erasing FE.KEYID = 1
11,830,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,379 UART: [ldev] --
14,195,397 UART: [fwproc] Wait for Commands...
14,198,565 UART: [fwproc] Recv command 0x46574c44
14,200,819 UART: [fwproc] Recv'd Img size: 114124 bytes
17,170,016 UART: ROM Fatal Error: 0x000B0025
17,173,378 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
6,165 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,999,845 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
5,613 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,290 UART:
192,658 UART: Running Caliptra ROM ...
193,820 UART:
193,990 UART: [state] CFI Enabled
263,957 UART: [state] LifecycleState = Manufacturing
265,830 UART: [state] DebugLocked = No
267,648 UART: [state] WD Timer not started. Device not locked for debugging
270,714 UART: [kat] SHA2-256
449,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,360 UART: [kat] ++
461,813 UART: [kat] sha1
472,902 UART: [kat] SHA2-256
475,916 UART: [kat] SHA2-384
482,159 UART: [kat] SHA2-512-ACC
485,088 UART: [kat] ECC-384
2,946,171 UART: [kat] HMAC-384Kdf
2,971,739 UART: [kat] LMS
3,501,156 UART: [kat] --
3,506,252 UART: [cold-reset] ++
3,507,244 UART: [fht] FHT @ 0x50003400
3,518,800 UART: [idev] ++
3,519,372 UART: [idev] CDI.KEYID = 6
3,520,254 UART: [idev] SUBJECT.KEYID = 7
3,521,467 UART: [idev] UDS.KEYID = 0
3,543,825 UART: [idev] Erasing UDS.KEYID = 0
6,025,689 UART: [idev] Sha1 KeyId Algorithm
6,049,403 UART: [idev] --
6,054,428 UART: [ldev] ++
6,054,998 UART: [ldev] CDI.KEYID = 6
6,055,964 UART: [ldev] SUBJECT.KEYID = 5
6,057,268 UART: [ldev] AUTHORITY.KEYID = 7
6,058,481 UART: [ldev] FE.KEYID = 1
6,101,385 UART: [ldev] Erasing FE.KEYID = 1
8,605,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,692 UART: [ldev] --
10,396,025 UART: [fwproc] Wait for Commands...
10,397,585 UART: [fwproc] Recv command 0x46574c44
10,399,688 UART: [fwproc] Recv'd Img size: 114448 bytes
12,721,243 UART: ROM Fatal Error: 0x000B0025
12,724,382 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
5,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,551,581 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
6,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,505 UART:
192,891 UART: Running Caliptra ROM ...
193,969 UART:
603,506 UART: [state] CFI Enabled
616,181 UART: [state] LifecycleState = Manufacturing
618,022 UART: [state] DebugLocked = No
620,835 UART: [state] WD Timer not started. Device not locked for debugging
625,361 UART: [kat] SHA2-256
804,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,078 UART: [kat] ++
816,536 UART: [kat] sha1
829,084 UART: [kat] SHA2-256
832,148 UART: [kat] SHA2-384
838,119 UART: [kat] SHA2-512-ACC
841,111 UART: [kat] ECC-384
3,285,172 UART: [kat] HMAC-384Kdf
3,298,439 UART: [kat] LMS
3,827,950 UART: [kat] --
3,833,044 UART: [cold-reset] ++
3,834,664 UART: [fht] FHT @ 0x50003400
3,844,801 UART: [idev] ++
3,845,364 UART: [idev] CDI.KEYID = 6
3,846,246 UART: [idev] SUBJECT.KEYID = 7
3,847,651 UART: [idev] UDS.KEYID = 0
3,862,864 UART: [idev] Erasing UDS.KEYID = 0
6,321,950 UART: [idev] Sha1 KeyId Algorithm
6,343,483 UART: [idev] --
6,346,796 UART: [ldev] ++
6,347,367 UART: [ldev] CDI.KEYID = 6
6,348,283 UART: [ldev] SUBJECT.KEYID = 5
6,349,495 UART: [ldev] AUTHORITY.KEYID = 7
6,350,726 UART: [ldev] FE.KEYID = 1
6,362,398 UART: [ldev] Erasing FE.KEYID = 1
8,836,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,954 UART: [ldev] --
10,631,563 UART: [fwproc] Wait for Commands...
10,633,072 UART: [fwproc] Recv command 0x46574c44
10,635,173 UART: [fwproc] Recv'd Img size: 114448 bytes
12,955,616 UART: ROM Fatal Error: 0x000B0025
12,958,749 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
6,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,731,359 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
5,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,506,302 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
6,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,728,683 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Manufacturing
85,325 UART: [state] DebugLocked = No
85,887 UART: [state] WD Timer not started. Device not locked for debugging
87,034 UART: [kat] SHA2-256
890,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,713 UART: [kat] ++
894,865 UART: [kat] sha1
899,119 UART: [kat] SHA2-256
901,059 UART: [kat] SHA2-384
903,834 UART: [kat] SHA2-512-ACC
905,735 UART: [kat] ECC-384
915,514 UART: [kat] HMAC-384Kdf
920,224 UART: [kat] LMS
1,168,536 UART: [kat] --
1,169,205 UART: [cold-reset] ++
1,169,535 UART: [fht] FHT @ 0x50003400
1,172,321 UART: [idev] ++
1,172,489 UART: [idev] CDI.KEYID = 6
1,172,850 UART: [idev] SUBJECT.KEYID = 7
1,173,275 UART: [idev] UDS.KEYID = 0
1,181,017 UART: [idev] Erasing UDS.KEYID = 0
1,197,691 UART: [idev] Sha1 KeyId Algorithm
1,206,645 UART: [idev] --
1,207,862 UART: [ldev] ++
1,208,030 UART: [ldev] CDI.KEYID = 6
1,208,394 UART: [ldev] SUBJECT.KEYID = 5
1,208,821 UART: [ldev] AUTHORITY.KEYID = 7
1,209,284 UART: [ldev] FE.KEYID = 1
1,214,282 UART: [ldev] Erasing FE.KEYID = 1
1,240,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,398 UART: [ldev] --
1,279,682 UART: [fwproc] Wait for Commands...
1,280,451 UART: [fwproc] Recv command 0x46574c44
1,281,184 UART: [fwproc] Recv'd Img size: 114448 bytes
1,571,453 UART: ROM Fatal Error: 0x000B0025
1,572,610 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,747 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Manufacturing
85,710 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,407 UART: [kat] SHA2-512-ACC
906,308 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,534 UART: [cold-reset] ++
1,169,860 UART: [fht] FHT @ 0x50003400
1,172,630 UART: [idev] ++
1,172,798 UART: [idev] CDI.KEYID = 6
1,173,159 UART: [idev] SUBJECT.KEYID = 7
1,173,584 UART: [idev] UDS.KEYID = 0
1,181,728 UART: [idev] Erasing UDS.KEYID = 0
1,198,914 UART: [idev] Sha1 KeyId Algorithm
1,207,784 UART: [idev] --
1,208,803 UART: [ldev] ++
1,208,971 UART: [ldev] CDI.KEYID = 6
1,209,335 UART: [ldev] SUBJECT.KEYID = 5
1,209,762 UART: [ldev] AUTHORITY.KEYID = 7
1,210,225 UART: [ldev] FE.KEYID = 1
1,215,457 UART: [ldev] Erasing FE.KEYID = 1
1,241,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,631 UART: [ldev] --
1,281,107 UART: [fwproc] Wait for Commands...
1,281,800 UART: [fwproc] Recv command 0x46574c44
1,282,533 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,078 UART: ROM Fatal Error: 0x000B0025
1,574,235 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,791 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Manufacturing
85,657 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,547 UART: [kat] SHA2-256
901,487 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
915,592 UART: [kat] HMAC-384Kdf
920,214 UART: [kat] LMS
1,168,526 UART: [kat] --
1,169,561 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,627 UART: [idev] ++
1,172,795 UART: [idev] CDI.KEYID = 6
1,173,156 UART: [idev] SUBJECT.KEYID = 7
1,173,581 UART: [idev] UDS.KEYID = 0
1,182,013 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Sha1 KeyId Algorithm
1,207,645 UART: [idev] --
1,208,690 UART: [ldev] ++
1,208,858 UART: [ldev] CDI.KEYID = 6
1,209,222 UART: [ldev] SUBJECT.KEYID = 5
1,209,649 UART: [ldev] AUTHORITY.KEYID = 7
1,210,112 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,810 UART: [ldev] --
1,280,074 UART: [fwproc] Wait for Commands...
1,280,809 UART: [fwproc] Recv command 0x46574c44
1,281,542 UART: [fwproc] Recv'd Img size: 114448 bytes
1,572,903 UART: ROM Fatal Error: 0x000B0025
1,574,060 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,931 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Manufacturing
85,914 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,241 UART: [kat] SHA2-512-ACC
906,142 UART: [kat] ECC-384
916,097 UART: [kat] HMAC-384Kdf
920,711 UART: [kat] LMS
1,169,023 UART: [kat] --
1,169,864 UART: [cold-reset] ++
1,170,316 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,181,748 UART: [idev] Erasing UDS.KEYID = 0
1,198,562 UART: [idev] Sha1 KeyId Algorithm
1,207,394 UART: [idev] --
1,208,411 UART: [ldev] ++
1,208,579 UART: [ldev] CDI.KEYID = 6
1,208,943 UART: [ldev] SUBJECT.KEYID = 5
1,209,370 UART: [ldev] AUTHORITY.KEYID = 7
1,209,833 UART: [ldev] FE.KEYID = 1
1,214,933 UART: [ldev] Erasing FE.KEYID = 1
1,241,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,405 UART: [ldev] --
1,280,669 UART: [fwproc] Wait for Commands...
1,281,302 UART: [fwproc] Recv command 0x46574c44
1,282,035 UART: [fwproc] Recv'd Img size: 114448 bytes
1,572,090 UART: ROM Fatal Error: 0x000B0025
1,573,247 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,672 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Manufacturing
86,037 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,554 UART: [kat] HMAC-384Kdf
921,044 UART: [kat] LMS
1,169,356 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,385 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,198,659 UART: [idev] Sha1 KeyId Algorithm
1,207,697 UART: [idev] --
1,208,878 UART: [ldev] ++
1,209,046 UART: [ldev] CDI.KEYID = 6
1,209,410 UART: [ldev] SUBJECT.KEYID = 5
1,209,837 UART: [ldev] AUTHORITY.KEYID = 7
1,210,300 UART: [ldev] FE.KEYID = 1
1,215,592 UART: [ldev] Erasing FE.KEYID = 1
1,240,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,026 UART: [ldev] --
1,280,542 UART: [fwproc] Wait for Commands...
1,281,211 UART: [fwproc] Recv command 0x46574c44
1,281,944 UART: [fwproc] Recv'd Img size: 114448 bytes
1,572,931 UART: ROM Fatal Error: 0x000B0025
1,574,088 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,703 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Manufacturing
86,100 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,583 UART: [kat] HMAC-384Kdf
921,359 UART: [kat] LMS
1,169,671 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,872 UART: [fht] FHT @ 0x50003400
1,173,396 UART: [idev] ++
1,173,564 UART: [idev] CDI.KEYID = 6
1,173,925 UART: [idev] SUBJECT.KEYID = 7
1,174,350 UART: [idev] UDS.KEYID = 0
1,182,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,344 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,181 UART: [ldev] ++
1,209,349 UART: [ldev] CDI.KEYID = 6
1,209,713 UART: [ldev] SUBJECT.KEYID = 5
1,210,140 UART: [ldev] AUTHORITY.KEYID = 7
1,210,603 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,929 UART: [ldev] --
1,281,355 UART: [fwproc] Wait for Commands...
1,282,142 UART: [fwproc] Recv command 0x46574c44
1,282,875 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,982 UART: ROM Fatal Error: 0x000B0025
1,575,139 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,728 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
5,569 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,254 UART:
192,649 UART: Running Caliptra ROM ...
193,823 UART:
193,978 UART: [state] CFI Enabled
266,517 UART: [state] LifecycleState = Manufacturing
268,919 UART: [state] DebugLocked = No
270,572 UART: [state] WD Timer not started. Device not locked for debugging
275,839 UART: [kat] SHA2-256
457,781 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,260 UART: [kat] ++
469,763 UART: [kat] sha1
480,774 UART: [kat] SHA2-256
483,786 UART: [kat] SHA2-384
489,813 UART: [kat] SHA2-512-ACC
492,429 UART: [kat] ECC-384
3,779,118 UART: [kat] HMAC-384Kdf
3,804,487 UART: [kat] LMS
4,877,599 UART: [kat] --
4,882,266 UART: [cold-reset] ++
4,883,499 UART: [fht] FHT @ 0x50003400
4,895,157 UART: [idev] ++
4,895,889 UART: [idev] CDI.KEYID = 6
4,896,995 UART: [idev] SUBJECT.KEYID = 7
4,898,207 UART: [idev] UDS.KEYID = 0
4,931,822 UART: [idev] Erasing UDS.KEYID = 0
8,246,364 UART: [idev] Sha1 KeyId Algorithm
8,268,569 UART: [idev] --
8,272,720 UART: [ldev] ++
8,273,298 UART: [ldev] CDI.KEYID = 6
8,274,462 UART: [ldev] SUBJECT.KEYID = 5
8,275,670 UART: [ldev] AUTHORITY.KEYID = 7
8,276,901 UART: [ldev] FE.KEYID = 1
8,318,932 UART: [ldev] Erasing FE.KEYID = 1
11,653,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,239 UART: [ldev] --
14,018,338 UART: [fwproc] Wait for Commands...
14,021,246 UART: [fwproc] Recv command 0x46574c44
14,023,559 UART: [fwproc] Recv'd Img size: 114124 bytes
17,005,806 UART: ROM Fatal Error: 0x000B0027
17,009,182 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
5,331 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,805,197 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
6,361 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,637 UART:
193,011 UART: Running Caliptra ROM ...
194,189 UART:
603,907 UART: [state] CFI Enabled
617,326 UART: [state] LifecycleState = Manufacturing
619,638 UART: [state] DebugLocked = No
622,256 UART: [state] WD Timer not started. Device not locked for debugging
626,110 UART: [kat] SHA2-256
808,138 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,641 UART: [kat] ++
820,159 UART: [kat] sha1
829,684 UART: [kat] SHA2-256
832,744 UART: [kat] SHA2-384
838,929 UART: [kat] SHA2-512-ACC
841,531 UART: [kat] ECC-384
4,096,851 UART: [kat] HMAC-384Kdf
4,108,812 UART: [kat] LMS
5,181,964 UART: [kat] --
5,187,945 UART: [cold-reset] ++
5,189,315 UART: [fht] FHT @ 0x50003400
5,200,413 UART: [idev] ++
5,201,085 UART: [idev] CDI.KEYID = 6
5,202,319 UART: [idev] SUBJECT.KEYID = 7
5,203,748 UART: [idev] UDS.KEYID = 0
5,219,723 UART: [idev] Erasing UDS.KEYID = 0
8,496,597 UART: [idev] Sha1 KeyId Algorithm
8,519,474 UART: [idev] --
8,523,149 UART: [ldev] ++
8,523,715 UART: [ldev] CDI.KEYID = 6
8,524,948 UART: [ldev] SUBJECT.KEYID = 5
8,526,379 UART: [ldev] AUTHORITY.KEYID = 7
8,527,988 UART: [ldev] FE.KEYID = 1
8,540,467 UART: [ldev] Erasing FE.KEYID = 1
11,831,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,249 UART: [ldev] --
14,197,673 UART: [fwproc] Wait for Commands...
14,200,144 UART: [fwproc] Recv command 0x46574c44
14,202,398 UART: [fwproc] Recv'd Img size: 114124 bytes
17,180,984 UART: ROM Fatal Error: 0x000B0027
17,184,398 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
6,165 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,988,500 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,993 writing to cptra_bootfsm_go
6,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
193,131 UART:
193,518 UART: Running Caliptra ROM ...
194,596 UART:
194,737 UART: [state] CFI Enabled
261,610 UART: [state] LifecycleState = Manufacturing
263,483 UART: [state] DebugLocked = No
265,209 UART: [state] WD Timer not started. Device not locked for debugging
269,409 UART: [kat] SHA2-256
448,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,137 UART: [kat] ++
460,676 UART: [kat] sha1
471,451 UART: [kat] SHA2-256
474,510 UART: [kat] SHA2-384
479,907 UART: [kat] SHA2-512-ACC
482,860 UART: [kat] ECC-384
2,925,868 UART: [kat] HMAC-384Kdf
2,951,173 UART: [kat] LMS
3,480,644 UART: [kat] --
3,484,956 UART: [cold-reset] ++
3,485,912 UART: [fht] FHT @ 0x50003400
3,495,647 UART: [idev] ++
3,496,210 UART: [idev] CDI.KEYID = 6
3,497,227 UART: [idev] SUBJECT.KEYID = 7
3,498,329 UART: [idev] UDS.KEYID = 0
3,522,999 UART: [idev] Erasing UDS.KEYID = 0
6,001,795 UART: [idev] Sha1 KeyId Algorithm
6,024,140 UART: [idev] --
6,027,500 UART: [ldev] ++
6,028,071 UART: [ldev] CDI.KEYID = 6
6,029,021 UART: [ldev] SUBJECT.KEYID = 5
6,030,194 UART: [ldev] AUTHORITY.KEYID = 7
6,031,430 UART: [ldev] FE.KEYID = 1
6,079,667 UART: [ldev] Erasing FE.KEYID = 1
8,581,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,253 UART: [ldev] --
10,394,411 UART: [fwproc] Wait for Commands...
10,397,208 UART: [fwproc] Recv command 0x46574c44
10,399,312 UART: [fwproc] Recv'd Img size: 114448 bytes
12,717,220 UART: ROM Fatal Error: 0x000B0027
12,720,341 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
6,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,512,096 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
6,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,369 UART:
192,764 UART: Running Caliptra ROM ...
193,896 UART:
603,531 UART: [state] CFI Enabled
617,706 UART: [state] LifecycleState = Manufacturing
619,592 UART: [state] DebugLocked = No
621,044 UART: [state] WD Timer not started. Device not locked for debugging
624,623 UART: [kat] SHA2-256
803,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,307 UART: [kat] ++
815,837 UART: [kat] sha1
826,018 UART: [kat] SHA2-256
829,021 UART: [kat] SHA2-384
835,915 UART: [kat] SHA2-512-ACC
838,893 UART: [kat] ECC-384
3,278,724 UART: [kat] HMAC-384Kdf
3,290,413 UART: [kat] LMS
3,819,862 UART: [kat] --
3,825,758 UART: [cold-reset] ++
3,828,120 UART: [fht] FHT @ 0x50003400
3,839,273 UART: [idev] ++
3,839,831 UART: [idev] CDI.KEYID = 6
3,840,709 UART: [idev] SUBJECT.KEYID = 7
3,841,919 UART: [idev] UDS.KEYID = 0
3,859,566 UART: [idev] Erasing UDS.KEYID = 0
6,316,674 UART: [idev] Sha1 KeyId Algorithm
6,339,718 UART: [idev] --
6,343,765 UART: [ldev] ++
6,344,331 UART: [ldev] CDI.KEYID = 6
6,345,218 UART: [ldev] SUBJECT.KEYID = 5
6,346,423 UART: [ldev] AUTHORITY.KEYID = 7
6,347,704 UART: [ldev] FE.KEYID = 1
6,358,592 UART: [ldev] Erasing FE.KEYID = 1
8,833,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,337 UART: [ldev] --
10,622,430 UART: [fwproc] Wait for Commands...
10,624,368 UART: [fwproc] Recv command 0x46574c44
10,626,461 UART: [fwproc] Recv'd Img size: 114448 bytes
12,951,912 UART: ROM Fatal Error: 0x000B0027
12,955,045 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
6,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,737,192 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
5,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,501,068 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
6,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,731,622 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Manufacturing
85,839 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,169,821 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,199,165 UART: [idev] Sha1 KeyId Algorithm
1,207,885 UART: [idev] --
1,208,906 UART: [ldev] ++
1,209,074 UART: [ldev] CDI.KEYID = 6
1,209,438 UART: [ldev] SUBJECT.KEYID = 5
1,209,865 UART: [ldev] AUTHORITY.KEYID = 7
1,210,328 UART: [ldev] FE.KEYID = 1
1,215,650 UART: [ldev] Erasing FE.KEYID = 1
1,242,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,830 UART: [ldev] --
1,281,264 UART: [fwproc] Wait for Commands...
1,282,079 UART: [fwproc] Recv command 0x46574c44
1,282,812 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,765 UART: ROM Fatal Error: 0x000B0027
1,574,922 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,241 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Manufacturing
86,334 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,293 UART: [kat] SHA2-256
891,843 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,972 UART: [kat] ++
896,124 UART: [kat] sha1
900,486 UART: [kat] SHA2-256
902,426 UART: [kat] SHA2-384
905,239 UART: [kat] SHA2-512-ACC
907,140 UART: [kat] ECC-384
916,753 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,588 UART: [cold-reset] ++
1,171,070 UART: [fht] FHT @ 0x50003400
1,173,618 UART: [idev] ++
1,173,786 UART: [idev] CDI.KEYID = 6
1,174,147 UART: [idev] SUBJECT.KEYID = 7
1,174,572 UART: [idev] UDS.KEYID = 0
1,182,880 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,504 UART: [idev] --
1,209,561 UART: [ldev] ++
1,209,729 UART: [ldev] CDI.KEYID = 6
1,210,093 UART: [ldev] SUBJECT.KEYID = 5
1,210,520 UART: [ldev] AUTHORITY.KEYID = 7
1,210,983 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,242,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,709 UART: [ldev] --
1,282,167 UART: [fwproc] Wait for Commands...
1,282,898 UART: [fwproc] Recv command 0x46574c44
1,283,631 UART: [fwproc] Recv'd Img size: 114448 bytes
1,575,540 UART: ROM Fatal Error: 0x000B0027
1,576,697 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,938 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Manufacturing
85,793 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
916,056 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,172,711 UART: [idev] ++
1,172,879 UART: [idev] CDI.KEYID = 6
1,173,240 UART: [idev] SUBJECT.KEYID = 7
1,173,665 UART: [idev] UDS.KEYID = 0
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,198,427 UART: [idev] Sha1 KeyId Algorithm
1,207,177 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,888 UART: [ldev] Erasing FE.KEYID = 1
1,241,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,360 UART: [ldev] --
1,280,804 UART: [fwproc] Wait for Commands...
1,281,445 UART: [fwproc] Recv command 0x46574c44
1,282,178 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,287 UART: ROM Fatal Error: 0x000B0027
1,574,444 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,781 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Manufacturing
85,868 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,535 UART: [kat] LMS
1,168,847 UART: [kat] --
1,169,488 UART: [cold-reset] ++
1,169,860 UART: [fht] FHT @ 0x50003400
1,172,498 UART: [idev] ++
1,172,666 UART: [idev] CDI.KEYID = 6
1,173,027 UART: [idev] SUBJECT.KEYID = 7
1,173,452 UART: [idev] UDS.KEYID = 0
1,181,278 UART: [idev] Erasing UDS.KEYID = 0
1,198,170 UART: [idev] Sha1 KeyId Algorithm
1,207,104 UART: [idev] --
1,208,127 UART: [ldev] ++
1,208,295 UART: [ldev] CDI.KEYID = 6
1,208,659 UART: [ldev] SUBJECT.KEYID = 5
1,209,086 UART: [ldev] AUTHORITY.KEYID = 7
1,209,549 UART: [ldev] FE.KEYID = 1
1,214,593 UART: [ldev] Erasing FE.KEYID = 1
1,240,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,135 UART: [ldev] --
1,280,579 UART: [fwproc] Wait for Commands...
1,281,260 UART: [fwproc] Recv command 0x46574c44
1,281,993 UART: [fwproc] Recv'd Img size: 114448 bytes
1,572,314 UART: ROM Fatal Error: 0x000B0027
1,573,471 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,692 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Manufacturing
85,675 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
891,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,171 UART: [kat] ++
895,323 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
915,502 UART: [kat] HMAC-384Kdf
919,916 UART: [kat] LMS
1,168,228 UART: [kat] --
1,169,193 UART: [cold-reset] ++
1,169,641 UART: [fht] FHT @ 0x50003400
1,172,345 UART: [idev] ++
1,172,513 UART: [idev] CDI.KEYID = 6
1,172,874 UART: [idev] SUBJECT.KEYID = 7
1,173,299 UART: [idev] UDS.KEYID = 0
1,181,525 UART: [idev] Erasing UDS.KEYID = 0
1,198,615 UART: [idev] Sha1 KeyId Algorithm
1,207,543 UART: [idev] --
1,208,684 UART: [ldev] ++
1,208,852 UART: [ldev] CDI.KEYID = 6
1,209,216 UART: [ldev] SUBJECT.KEYID = 5
1,209,643 UART: [ldev] AUTHORITY.KEYID = 7
1,210,106 UART: [ldev] FE.KEYID = 1
1,215,480 UART: [ldev] Erasing FE.KEYID = 1
1,241,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,362 UART: [ldev] --
1,280,686 UART: [fwproc] Wait for Commands...
1,281,271 UART: [fwproc] Recv command 0x46574c44
1,282,004 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,491 UART: ROM Fatal Error: 0x000B0027
1,574,648 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,251 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Manufacturing
86,164 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,267 UART: [kat] HMAC-384Kdf
920,827 UART: [kat] LMS
1,169,139 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,574 UART: [fht] FHT @ 0x50003400
1,173,204 UART: [idev] ++
1,173,372 UART: [idev] CDI.KEYID = 6
1,173,733 UART: [idev] SUBJECT.KEYID = 7
1,174,158 UART: [idev] UDS.KEYID = 0
1,182,036 UART: [idev] Erasing UDS.KEYID = 0
1,199,292 UART: [idev] Sha1 KeyId Algorithm
1,208,124 UART: [idev] --
1,209,053 UART: [ldev] ++
1,209,221 UART: [ldev] CDI.KEYID = 6
1,209,585 UART: [ldev] SUBJECT.KEYID = 5
1,210,012 UART: [ldev] AUTHORITY.KEYID = 7
1,210,475 UART: [ldev] FE.KEYID = 1
1,215,881 UART: [ldev] Erasing FE.KEYID = 1
1,242,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,389 UART: [ldev] --
1,281,901 UART: [fwproc] Wait for Commands...
1,282,586 UART: [fwproc] Recv command 0x46574c44
1,283,319 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,672 UART: ROM Fatal Error: 0x000B0027
1,574,829 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,446 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
2,020,626 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,654 UART:
2,165,047 UART: Running Caliptra ROM ...
2,166,123 UART:
2,166,280 UART: [state] CFI Enabled
2,167,257 UART: [state] LifecycleState = Unprovisioned
2,168,902 UART: [state] DebugLocked = No
2,169,926 UART: [state] WD Timer not started. Device not locked for debugging
2,172,390 UART: [kat] SHA2-256
2,173,076 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,087 UART: [kat] ++
2,176,538 UART: [kat] sha1
2,177,052 UART: [kat] SHA2-256
2,177,712 UART: [kat] SHA2-384
2,178,369 UART: [kat] SHA2-512-ACC
2,179,359 UART: [kat] ECC-384
3,773,551 UART: [kat] HMAC-384Kdf
3,800,929 UART: [kat] LMS
4,874,112 UART: [kat] --
4,876,864 UART: [cold-reset] ++
4,878,028 UART: [fht] FHT @ 0x50003400
4,889,966 UART: [idev] ++
4,890,639 UART: [idev] CDI.KEYID = 6
4,891,847 UART: [idev] SUBJECT.KEYID = 7
4,892,929 UART: [idev] UDS.KEYID = 0
4,929,137 UART: [idev] Erasing UDS.KEYID = 0
8,241,001 UART: [idev] Sha1 KeyId Algorithm
8,264,071 UART: [idev] --
8,267,147 UART: [ldev] ++
8,267,711 UART: [ldev] CDI.KEYID = 6
8,268,879 UART: [ldev] SUBJECT.KEYID = 5
8,270,094 UART: [ldev] AUTHORITY.KEYID = 7
8,271,248 UART: [ldev] FE.KEYID = 1
8,316,268 UART: [ldev] Erasing FE.KEYID = 1
11,651,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,148 UART: [ldev] --
14,036,194 UART: [fwproc] Wait for Commands...
14,039,340 UART: [fwproc] Recv command 0x46574c44
14,041,664 UART: [fwproc] Recv'd Img size: 114124 bytes
15,430,475 UART: ROM Fatal Error: 0x000B000D
15,433,883 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,028,734 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,218,635 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,026,739 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,170,909 UART:
2,171,307 UART: Running Caliptra ROM ...
2,172,494 UART:
2,172,662 UART: [state] CFI Enabled
2,173,636 UART: [state] LifecycleState = Unprovisioned
2,175,275 UART: [state] DebugLocked = No
2,176,340 UART: [state] WD Timer not started. Device not locked for debugging
2,178,817 UART: [kat] SHA2-256
2,179,482 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,722 UART: [kat] ++
2,183,177 UART: [kat] sha1
2,183,683 UART: [kat] SHA2-256
2,184,419 UART: [kat] SHA2-384
2,185,081 UART: [kat] SHA2-512-ACC
2,185,906 UART: [kat] ECC-384
4,095,578 UART: [kat] HMAC-384Kdf
4,106,635 UART: [kat] LMS
5,179,807 UART: [kat] --
5,184,531 UART: [cold-reset] ++
5,186,478 UART: [fht] FHT @ 0x50003400
5,197,619 UART: [idev] ++
5,198,286 UART: [idev] CDI.KEYID = 6
5,199,517 UART: [idev] SUBJECT.KEYID = 7
5,200,945 UART: [idev] UDS.KEYID = 0
5,218,104 UART: [idev] Erasing UDS.KEYID = 0
8,492,014 UART: [idev] Sha1 KeyId Algorithm
8,514,647 UART: [idev] --
8,519,481 UART: [ldev] ++
8,520,060 UART: [ldev] CDI.KEYID = 6
8,521,247 UART: [ldev] SUBJECT.KEYID = 5
8,522,677 UART: [ldev] AUTHORITY.KEYID = 7
8,524,290 UART: [ldev] FE.KEYID = 1
8,534,877 UART: [ldev] Erasing FE.KEYID = 1
11,828,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,992 UART: [ldev] --
14,193,614 UART: [fwproc] Wait for Commands...
14,196,627 UART: [fwproc] Recv command 0x46574c44
14,198,893 UART: [fwproc] Recv'd Img size: 114124 bytes
15,594,373 UART: ROM Fatal Error: 0x000B000D
15,597,836 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
2,034,237 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,411,108 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
2,023,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,503 UART:
2,168,931 UART: Running Caliptra ROM ...
2,170,105 UART:
2,170,277 UART: [state] CFI Enabled
2,171,252 UART: [state] LifecycleState = Unprovisioned
2,172,904 UART: [state] DebugLocked = No
2,174,017 UART: [state] WD Timer not started. Device not locked for debugging
2,176,485 UART: [kat] SHA2-256
2,177,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,149 UART: [kat] ++
2,180,599 UART: [kat] sha1
2,181,112 UART: [kat] SHA2-256
2,181,852 UART: [kat] SHA2-384
2,182,517 UART: [kat] SHA2-512-ACC
2,183,359 UART: [kat] ECC-384
2,947,908 UART: [kat] HMAC-384Kdf
2,970,420 UART: [kat] LMS
3,499,904 UART: [kat] --
3,503,195 UART: [cold-reset] ++
3,505,179 UART: [fht] FHT @ 0x50003400
3,515,383 UART: [idev] ++
3,515,955 UART: [idev] CDI.KEYID = 6
3,516,836 UART: [idev] SUBJECT.KEYID = 7
3,517,995 UART: [idev] UDS.KEYID = 0
3,542,663 UART: [idev] Erasing UDS.KEYID = 0
6,023,384 UART: [idev] Sha1 KeyId Algorithm
6,047,001 UART: [idev] --
6,050,678 UART: [ldev] ++
6,051,253 UART: [ldev] CDI.KEYID = 6
6,052,137 UART: [ldev] SUBJECT.KEYID = 5
6,053,355 UART: [ldev] AUTHORITY.KEYID = 7
6,054,614 UART: [ldev] FE.KEYID = 1
6,098,952 UART: [ldev] Erasing FE.KEYID = 1
8,602,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,418 UART: [ldev] --
10,412,339 UART: [fwproc] Wait for Commands...
10,414,866 UART: [fwproc] Recv command 0x46574c44
10,416,970 UART: [fwproc] Recv'd Img size: 114448 bytes
11,483,369 UART: ROM Fatal Error: 0x000B000D
11,486,442 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,037,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,294,677 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,023,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,317 UART:
2,168,716 UART: Running Caliptra ROM ...
2,169,797 UART:
2,169,950 UART: [state] CFI Enabled
2,170,917 UART: [state] LifecycleState = Unprovisioned
2,172,574 UART: [state] DebugLocked = No
2,173,598 UART: [state] WD Timer not started. Device not locked for debugging
2,176,058 UART: [kat] SHA2-256
2,176,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,715 UART: [kat] ++
2,180,161 UART: [kat] sha1
2,180,673 UART: [kat] SHA2-256
2,181,333 UART: [kat] SHA2-384
2,182,079 UART: [kat] SHA2-512-ACC
2,182,886 UART: [kat] ECC-384
3,279,642 UART: [kat] HMAC-384Kdf
3,291,633 UART: [kat] LMS
3,821,106 UART: [kat] --
3,826,447 UART: [cold-reset] ++
3,828,155 UART: [fht] FHT @ 0x50003400
3,839,892 UART: [idev] ++
3,840,451 UART: [idev] CDI.KEYID = 6
3,841,459 UART: [idev] SUBJECT.KEYID = 7
3,842,613 UART: [idev] UDS.KEYID = 0
3,859,853 UART: [idev] Erasing UDS.KEYID = 0
6,320,672 UART: [idev] Sha1 KeyId Algorithm
6,343,409 UART: [idev] --
6,345,989 UART: [ldev] ++
6,346,560 UART: [ldev] CDI.KEYID = 6
6,347,468 UART: [ldev] SUBJECT.KEYID = 5
6,348,627 UART: [ldev] AUTHORITY.KEYID = 7
6,349,911 UART: [ldev] FE.KEYID = 1
6,361,491 UART: [ldev] Erasing FE.KEYID = 1
8,836,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,461 UART: [ldev] --
10,624,870 UART: [fwproc] Wait for Commands...
10,627,301 UART: [fwproc] Recv command 0x46574c44
10,629,404 UART: [fwproc] Recv'd Img size: 114448 bytes
11,692,539 UART: ROM Fatal Error: 0x000B000D
11,695,605 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
2,026,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,469,621 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,022,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,243,911 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,023,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,476,012 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
915,734 UART: [kat] HMAC-384Kdf
920,342 UART: [kat] LMS
1,168,654 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,961 UART: [fht] FHT @ 0x50003400
1,172,659 UART: [idev] ++
1,172,827 UART: [idev] CDI.KEYID = 6
1,173,188 UART: [idev] SUBJECT.KEYID = 7
1,173,613 UART: [idev] UDS.KEYID = 0
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,897 UART: [idev] Sha1 KeyId Algorithm
1,207,891 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,574 UART: [ldev] Erasing FE.KEYID = 1
1,242,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,326 UART: [ldev] --
1,281,672 UART: [fwproc] Wait for Commands...
1,282,465 UART: [fwproc] Recv command 0x46574c44
1,283,198 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,799 UART: ROM Fatal Error: 0x000B000D
1,322,958 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,173,947 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,716 UART: [kat] ++
895,868 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,437 UART: [kat] LMS
1,168,749 UART: [kat] --
1,169,582 UART: [cold-reset] ++
1,169,990 UART: [fht] FHT @ 0x50003400
1,172,518 UART: [idev] ++
1,172,686 UART: [idev] CDI.KEYID = 6
1,173,047 UART: [idev] SUBJECT.KEYID = 7
1,173,472 UART: [idev] UDS.KEYID = 0
1,181,696 UART: [idev] Erasing UDS.KEYID = 0
1,198,808 UART: [idev] Sha1 KeyId Algorithm
1,207,748 UART: [idev] --
1,208,709 UART: [ldev] ++
1,208,877 UART: [ldev] CDI.KEYID = 6
1,209,241 UART: [ldev] SUBJECT.KEYID = 5
1,209,668 UART: [ldev] AUTHORITY.KEYID = 7
1,210,131 UART: [ldev] FE.KEYID = 1
1,215,395 UART: [ldev] Erasing FE.KEYID = 1
1,241,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,461 UART: [ldev] --
1,280,889 UART: [fwproc] Wait for Commands...
1,281,620 UART: [fwproc] Recv command 0x46574c44
1,282,353 UART: [fwproc] Recv'd Img size: 114448 bytes
1,319,922 UART: ROM Fatal Error: 0x000B000D
1,321,081 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,174,388 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
900,149 UART: [kat] SHA2-256
902,089 UART: [kat] SHA2-384
904,870 UART: [kat] SHA2-512-ACC
906,771 UART: [kat] ECC-384
916,870 UART: [kat] HMAC-384Kdf
921,466 UART: [kat] LMS
1,169,778 UART: [kat] --
1,170,403 UART: [cold-reset] ++
1,170,841 UART: [fht] FHT @ 0x50003400
1,173,483 UART: [idev] ++
1,173,651 UART: [idev] CDI.KEYID = 6
1,174,012 UART: [idev] SUBJECT.KEYID = 7
1,174,437 UART: [idev] UDS.KEYID = 0
1,182,263 UART: [idev] Erasing UDS.KEYID = 0
1,199,259 UART: [idev] Sha1 KeyId Algorithm
1,208,219 UART: [idev] --
1,209,350 UART: [ldev] ++
1,209,518 UART: [ldev] CDI.KEYID = 6
1,209,882 UART: [ldev] SUBJECT.KEYID = 5
1,210,309 UART: [ldev] AUTHORITY.KEYID = 7
1,210,772 UART: [ldev] FE.KEYID = 1
1,216,092 UART: [ldev] Erasing FE.KEYID = 1
1,242,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,838 UART: [ldev] --
1,282,286 UART: [fwproc] Wait for Commands...
1,282,991 UART: [fwproc] Recv command 0x46574c44
1,283,724 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,503 UART: ROM Fatal Error: 0x000B000D
1,322,662 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,173,117 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,963 UART: [kat] SHA2-512-ACC
906,864 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,243 UART: [kat] LMS
1,169,555 UART: [kat] --
1,170,624 UART: [cold-reset] ++
1,171,148 UART: [fht] FHT @ 0x50003400
1,173,736 UART: [idev] ++
1,173,904 UART: [idev] CDI.KEYID = 6
1,174,265 UART: [idev] SUBJECT.KEYID = 7
1,174,690 UART: [idev] UDS.KEYID = 0
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,200,024 UART: [idev] Sha1 KeyId Algorithm
1,208,840 UART: [idev] --
1,209,903 UART: [ldev] ++
1,210,071 UART: [ldev] CDI.KEYID = 6
1,210,435 UART: [ldev] SUBJECT.KEYID = 5
1,210,862 UART: [ldev] AUTHORITY.KEYID = 7
1,211,325 UART: [ldev] FE.KEYID = 1
1,216,671 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,593 UART: [ldev] --
1,282,959 UART: [fwproc] Wait for Commands...
1,283,710 UART: [fwproc] Recv command 0x46574c44
1,284,443 UART: [fwproc] Recv'd Img size: 114448 bytes
1,322,116 UART: ROM Fatal Error: 0x000B000D
1,323,275 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,175,428 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,419 UART: [kat] SHA2-256
901,359 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,324 UART: [kat] LMS
1,168,636 UART: [kat] --
1,169,437 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,181,259 UART: [idev] Erasing UDS.KEYID = 0
1,198,271 UART: [idev] Sha1 KeyId Algorithm
1,207,219 UART: [idev] --
1,208,172 UART: [ldev] ++
1,208,340 UART: [ldev] CDI.KEYID = 6
1,208,704 UART: [ldev] SUBJECT.KEYID = 5
1,209,131 UART: [ldev] AUTHORITY.KEYID = 7
1,209,594 UART: [ldev] FE.KEYID = 1
1,214,522 UART: [ldev] Erasing FE.KEYID = 1
1,240,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,646 UART: [ldev] --
1,280,156 UART: [fwproc] Wait for Commands...
1,280,803 UART: [fwproc] Recv command 0x46574c44
1,281,536 UART: [fwproc] Recv'd Img size: 114448 bytes
1,318,695 UART: ROM Fatal Error: 0x000B000D
1,319,854 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,171,801 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,807 UART: [kat] LMS
1,169,119 UART: [kat] --
1,170,142 UART: [cold-reset] ++
1,170,632 UART: [fht] FHT @ 0x50003400
1,173,198 UART: [idev] ++
1,173,366 UART: [idev] CDI.KEYID = 6
1,173,727 UART: [idev] SUBJECT.KEYID = 7
1,174,152 UART: [idev] UDS.KEYID = 0
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,199,440 UART: [idev] Sha1 KeyId Algorithm
1,208,282 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,887 UART: [ldev] SUBJECT.KEYID = 5
1,210,314 UART: [ldev] AUTHORITY.KEYID = 7
1,210,777 UART: [ldev] FE.KEYID = 1
1,216,207 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,713 UART: [fwproc] Wait for Commands...
1,282,472 UART: [fwproc] Recv command 0x46574c44
1,283,205 UART: [fwproc] Recv'd Img size: 114448 bytes
1,322,176 UART: ROM Fatal Error: 0x000B000D
1,323,335 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,175,274 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,022,782 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,986 UART:
2,167,379 UART: Running Caliptra ROM ...
2,168,548 UART:
2,168,721 UART: [state] CFI Enabled
2,169,601 UART: [state] LifecycleState = Unprovisioned
2,171,235 UART: [state] DebugLocked = No
2,172,261 UART: [state] WD Timer not started. Device not locked for debugging
2,174,727 UART: [kat] SHA2-256
2,175,391 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,411 UART: [kat] ++
2,178,857 UART: [kat] sha1
2,179,365 UART: [kat] SHA2-256
2,180,021 UART: [kat] SHA2-384
2,180,682 UART: [kat] SHA2-512-ACC
2,181,526 UART: [kat] ECC-384
3,777,562 UART: [kat] HMAC-384Kdf
3,804,253 UART: [kat] LMS
4,877,420 UART: [kat] --
4,881,927 UART: [cold-reset] ++
4,884,080 UART: [fht] FHT @ 0x50003400
4,895,606 UART: [idev] ++
4,896,288 UART: [idev] CDI.KEYID = 6
4,897,525 UART: [idev] SUBJECT.KEYID = 7
4,898,623 UART: [idev] UDS.KEYID = 0
4,929,718 UART: [idev] Erasing UDS.KEYID = 0
8,241,068 UART: [idev] Sha1 KeyId Algorithm
8,262,906 UART: [idev] --
8,266,791 UART: [ldev] ++
8,267,355 UART: [ldev] CDI.KEYID = 6
8,268,515 UART: [ldev] SUBJECT.KEYID = 5
8,269,730 UART: [ldev] AUTHORITY.KEYID = 7
8,270,883 UART: [ldev] FE.KEYID = 1
8,318,240 UART: [ldev] Erasing FE.KEYID = 1
11,650,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,633 UART: [ldev] --
14,015,956 UART: [fwproc] Wait for Commands...
14,018,645 UART: [fwproc] Recv command 0x46574c44
14,020,991 UART: [fwproc] Recv'd Img size: 114124 bytes
18,093,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,167,932 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,236,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,553,656 >>> mbox cmd response: success
18,558,412 UART: [afmc] ++
18,559,006 UART: [afmc] CDI.KEYID = 6
18,560,196 UART: [afmc] SUBJECT.KEYID = 7
18,561,356 UART: [afmc] AUTHORITY.KEYID = 5
21,932,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,246,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,249,153 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,265,307 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,281,371 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,297,352 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,320,216 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,021,272 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,338,312 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,023,475 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,803 UART:
2,168,205 UART: Running Caliptra ROM ...
2,169,370 UART:
2,169,537 UART: [state] CFI Enabled
2,170,533 UART: [state] LifecycleState = Unprovisioned
2,172,087 UART: [state] DebugLocked = No
2,173,103 UART: [state] WD Timer not started. Device not locked for debugging
2,175,558 UART: [kat] SHA2-256
2,176,219 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,220 UART: [kat] ++
2,179,665 UART: [kat] sha1
2,180,169 UART: [kat] SHA2-256
2,180,900 UART: [kat] SHA2-384
2,181,566 UART: [kat] SHA2-512-ACC
2,182,394 UART: [kat] ECC-384
4,097,202 UART: [kat] HMAC-384Kdf
4,108,309 UART: [kat] LMS
5,181,446 UART: [kat] --
5,186,629 UART: [cold-reset] ++
5,188,407 UART: [fht] FHT @ 0x50003400
5,200,696 UART: [idev] ++
5,201,374 UART: [idev] CDI.KEYID = 6
5,202,551 UART: [idev] SUBJECT.KEYID = 7
5,204,035 UART: [idev] UDS.KEYID = 0
5,221,147 UART: [idev] Erasing UDS.KEYID = 0
8,499,796 UART: [idev] Sha1 KeyId Algorithm
8,521,753 UART: [idev] --
8,525,350 UART: [ldev] ++
8,525,923 UART: [ldev] CDI.KEYID = 6
8,527,084 UART: [ldev] SUBJECT.KEYID = 5
8,528,569 UART: [ldev] AUTHORITY.KEYID = 7
8,530,098 UART: [ldev] FE.KEYID = 1
8,540,631 UART: [ldev] Erasing FE.KEYID = 1
11,831,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,980 UART: [ldev] --
14,197,119 UART: [fwproc] Wait for Commands...
14,199,520 UART: [fwproc] Recv command 0x46574c44
14,201,840 UART: [fwproc] Recv'd Img size: 114124 bytes
18,275,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,353,300 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,422,066 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,739,595 >>> mbox cmd response: success
18,742,855 UART: [afmc] ++
18,743,545 UART: [afmc] CDI.KEYID = 6
18,744,422 UART: [afmc] SUBJECT.KEYID = 7
18,745,627 UART: [afmc] AUTHORITY.KEYID = 5
22,062,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,356,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,358,396 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,374,592 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,390,611 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,406,628 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,428,894 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
2,028,289 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,522,303 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
2,026,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,783 UART:
2,171,176 UART: Running Caliptra ROM ...
2,172,262 UART:
2,172,436 UART: [state] CFI Enabled
2,173,606 UART: [state] LifecycleState = Unprovisioned
2,175,271 UART: [state] DebugLocked = No
2,176,299 UART: [state] WD Timer not started. Device not locked for debugging
2,178,758 UART: [kat] SHA2-256
2,179,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,417 UART: [kat] ++
2,182,863 UART: [kat] sha1
2,183,370 UART: [kat] SHA2-256
2,184,026 UART: [kat] SHA2-384
2,184,686 UART: [kat] SHA2-512-ACC
2,185,514 UART: [kat] ECC-384
2,946,861 UART: [kat] HMAC-384Kdf
2,973,023 UART: [kat] LMS
3,502,496 UART: [kat] --
3,507,539 UART: [cold-reset] ++
3,509,876 UART: [fht] FHT @ 0x50003400
3,520,050 UART: [idev] ++
3,520,627 UART: [idev] CDI.KEYID = 6
3,521,538 UART: [idev] SUBJECT.KEYID = 7
3,522,751 UART: [idev] UDS.KEYID = 0
3,545,212 UART: [idev] Erasing UDS.KEYID = 0
6,027,437 UART: [idev] Sha1 KeyId Algorithm
6,050,236 UART: [idev] --
6,053,903 UART: [ldev] ++
6,054,475 UART: [ldev] CDI.KEYID = 6
6,055,382 UART: [ldev] SUBJECT.KEYID = 5
6,056,599 UART: [ldev] AUTHORITY.KEYID = 7
6,057,834 UART: [ldev] FE.KEYID = 1
6,100,023 UART: [ldev] Erasing FE.KEYID = 1
8,607,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,507 UART: [ldev] --
10,412,607 UART: [fwproc] Wait for Commands...
10,415,700 UART: [fwproc] Recv command 0x46574c44
10,417,751 UART: [fwproc] Recv'd Img size: 114448 bytes
13,830,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,097 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,642 >>> mbox cmd response: success
14,288,572 UART: [afmc] ++
14,289,160 UART: [afmc] CDI.KEYID = 6
14,290,065 UART: [afmc] SUBJECT.KEYID = 7
14,291,279 UART: [afmc] AUTHORITY.KEYID = 5
16,827,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,781 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,371 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
2,024,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,049,478 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
2,022,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,947 UART:
2,167,338 UART: Running Caliptra ROM ...
2,168,419 UART:
2,168,573 UART: [state] CFI Enabled
2,169,537 UART: [state] LifecycleState = Unprovisioned
2,171,184 UART: [state] DebugLocked = No
2,172,210 UART: [state] WD Timer not started. Device not locked for debugging
2,174,667 UART: [kat] SHA2-256
2,175,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,324 UART: [kat] ++
2,178,769 UART: [kat] sha1
2,179,276 UART: [kat] SHA2-256
2,179,933 UART: [kat] SHA2-384
2,180,589 UART: [kat] SHA2-512-ACC
2,181,428 UART: [kat] ECC-384
3,282,676 UART: [kat] HMAC-384Kdf
3,296,100 UART: [kat] LMS
3,825,539 UART: [kat] --
3,829,203 UART: [cold-reset] ++
3,830,267 UART: [fht] FHT @ 0x50003400
3,841,351 UART: [idev] ++
3,841,951 UART: [idev] CDI.KEYID = 6
3,842,863 UART: [idev] SUBJECT.KEYID = 7
3,844,020 UART: [idev] UDS.KEYID = 0
3,862,802 UART: [idev] Erasing UDS.KEYID = 0
6,320,668 UART: [idev] Sha1 KeyId Algorithm
6,344,538 UART: [idev] --
6,349,937 UART: [ldev] ++
6,350,502 UART: [ldev] CDI.KEYID = 6
6,351,409 UART: [ldev] SUBJECT.KEYID = 5
6,352,567 UART: [ldev] AUTHORITY.KEYID = 7
6,353,849 UART: [ldev] FE.KEYID = 1
6,364,623 UART: [ldev] Erasing FE.KEYID = 1
8,844,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,903 UART: [ldev] --
10,633,568 UART: [fwproc] Wait for Commands...
10,636,415 UART: [fwproc] Recv command 0x46574c44
10,638,563 UART: [fwproc] Recv'd Img size: 114448 bytes
14,040,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,183,183 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,986 >>> mbox cmd response: success
14,505,411 UART: [afmc] ++
14,506,008 UART: [afmc] CDI.KEYID = 6
14,506,950 UART: [afmc] SUBJECT.KEYID = 7
14,508,111 UART: [afmc] AUTHORITY.KEYID = 5
17,010,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,731,548 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,733,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,749,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,765,218 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,781,116 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,804,048 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
2,029,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,835 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
2,021,864 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,072,791 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
2,023,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,179 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
891,364 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,493 UART: [kat] ++
895,645 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,710 UART: [kat] SHA2-512-ACC
906,611 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,797 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,181,663 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,982 UART: [ldev] ++
1,209,150 UART: [ldev] CDI.KEYID = 6
1,209,514 UART: [ldev] SUBJECT.KEYID = 5
1,209,941 UART: [ldev] AUTHORITY.KEYID = 7
1,210,404 UART: [ldev] FE.KEYID = 1
1,215,670 UART: [ldev] Erasing FE.KEYID = 1
1,241,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,712 UART: [ldev] --
1,281,102 UART: [fwproc] Wait for Commands...
1,281,923 UART: [fwproc] Recv command 0x46574c44
1,282,656 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,906 >>> mbox cmd response: success
2,775,005 UART: [afmc] ++
2,775,173 UART: [afmc] CDI.KEYID = 6
2,775,536 UART: [afmc] SUBJECT.KEYID = 7
2,775,962 UART: [afmc] AUTHORITY.KEYID = 5
2,811,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,540 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,871 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,766 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,294 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,311 UART: [kat] HMAC-384Kdf
920,719 UART: [kat] LMS
1,169,031 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,182,018 UART: [idev] Erasing UDS.KEYID = 0
1,199,230 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,575 UART: [ldev] --
1,281,939 UART: [fwproc] Wait for Commands...
1,282,540 UART: [fwproc] Recv command 0x46574c44
1,283,273 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,752 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,935 >>> mbox cmd response: success
2,775,060 UART: [afmc] ++
2,775,228 UART: [afmc] CDI.KEYID = 6
2,775,591 UART: [afmc] SUBJECT.KEYID = 7
2,776,017 UART: [afmc] AUTHORITY.KEYID = 5
2,812,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,655 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,384 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,267 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,986 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,799 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,757 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
891,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,519 UART: [kat] ++
895,671 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,586 UART: [kat] HMAC-384Kdf
921,240 UART: [kat] LMS
1,169,552 UART: [kat] --
1,170,501 UART: [cold-reset] ++
1,170,999 UART: [fht] FHT @ 0x50003400
1,173,605 UART: [idev] ++
1,173,773 UART: [idev] CDI.KEYID = 6
1,174,134 UART: [idev] SUBJECT.KEYID = 7
1,174,559 UART: [idev] UDS.KEYID = 0
1,182,501 UART: [idev] Erasing UDS.KEYID = 0
1,199,619 UART: [idev] Sha1 KeyId Algorithm
1,208,487 UART: [idev] --
1,209,588 UART: [ldev] ++
1,209,756 UART: [ldev] CDI.KEYID = 6
1,210,120 UART: [ldev] SUBJECT.KEYID = 5
1,210,547 UART: [ldev] AUTHORITY.KEYID = 7
1,211,010 UART: [ldev] FE.KEYID = 1
1,216,076 UART: [ldev] Erasing FE.KEYID = 1
1,242,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,178 UART: [ldev] --
1,281,656 UART: [fwproc] Wait for Commands...
1,282,245 UART: [fwproc] Recv command 0x46574c44
1,282,978 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,324 >>> mbox cmd response: success
2,775,369 UART: [afmc] ++
2,775,537 UART: [afmc] CDI.KEYID = 6
2,775,900 UART: [afmc] SUBJECT.KEYID = 7
2,776,326 UART: [afmc] AUTHORITY.KEYID = 5
2,812,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,523 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,406 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,125 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,954 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,416 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,455 UART: [kat] HMAC-384Kdf
921,311 UART: [kat] LMS
1,169,623 UART: [kat] --
1,170,764 UART: [cold-reset] ++
1,171,172 UART: [fht] FHT @ 0x50003400
1,173,792 UART: [idev] ++
1,173,960 UART: [idev] CDI.KEYID = 6
1,174,321 UART: [idev] SUBJECT.KEYID = 7
1,174,746 UART: [idev] UDS.KEYID = 0
1,182,892 UART: [idev] Erasing UDS.KEYID = 0
1,200,330 UART: [idev] Sha1 KeyId Algorithm
1,209,188 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,216,969 UART: [ldev] Erasing FE.KEYID = 1
1,243,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,297 UART: [fwproc] Wait for Commands...
1,283,070 UART: [fwproc] Recv command 0x46574c44
1,283,803 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,360 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,669 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,611 >>> mbox cmd response: success
2,775,746 UART: [afmc] ++
2,775,914 UART: [afmc] CDI.KEYID = 6
2,776,277 UART: [afmc] SUBJECT.KEYID = 7
2,776,703 UART: [afmc] AUTHORITY.KEYID = 5
2,812,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,053 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,782 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,665 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,384 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,393 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,901 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
891,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,503 UART: [kat] ++
895,655 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,500 UART: [kat] HMAC-384Kdf
921,050 UART: [kat] LMS
1,169,362 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,987 UART: [fht] FHT @ 0x50003400
1,173,503 UART: [idev] ++
1,173,671 UART: [idev] CDI.KEYID = 6
1,174,032 UART: [idev] SUBJECT.KEYID = 7
1,174,457 UART: [idev] UDS.KEYID = 0
1,182,525 UART: [idev] Erasing UDS.KEYID = 0
1,200,069 UART: [idev] Sha1 KeyId Algorithm
1,209,129 UART: [idev] --
1,210,038 UART: [ldev] ++
1,210,206 UART: [ldev] CDI.KEYID = 6
1,210,570 UART: [ldev] SUBJECT.KEYID = 5
1,210,997 UART: [ldev] AUTHORITY.KEYID = 7
1,211,460 UART: [ldev] FE.KEYID = 1
1,216,766 UART: [ldev] Erasing FE.KEYID = 1
1,243,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,288 UART: [ldev] --
1,282,552 UART: [fwproc] Wait for Commands...
1,283,223 UART: [fwproc] Recv command 0x46574c44
1,283,956 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,106 >>> mbox cmd response: success
2,777,241 UART: [afmc] ++
2,777,409 UART: [afmc] CDI.KEYID = 6
2,777,772 UART: [afmc] SUBJECT.KEYID = 7
2,778,198 UART: [afmc] AUTHORITY.KEYID = 5
2,813,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,614 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,343 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,226 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,945 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,734 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,414 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,683 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,170 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,210 UART: [idev] ++
1,173,378 UART: [idev] CDI.KEYID = 6
1,173,739 UART: [idev] SUBJECT.KEYID = 7
1,174,164 UART: [idev] UDS.KEYID = 0
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,042 UART: [idev] Sha1 KeyId Algorithm
1,207,950 UART: [idev] --
1,209,059 UART: [ldev] ++
1,209,227 UART: [ldev] CDI.KEYID = 6
1,209,591 UART: [ldev] SUBJECT.KEYID = 5
1,210,018 UART: [ldev] AUTHORITY.KEYID = 7
1,210,481 UART: [ldev] FE.KEYID = 1
1,215,747 UART: [ldev] Erasing FE.KEYID = 1
1,242,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,475 UART: [ldev] --
1,281,917 UART: [fwproc] Wait for Commands...
1,282,498 UART: [fwproc] Recv command 0x46574c44
1,283,231 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,683 >>> mbox cmd response: success
2,776,884 UART: [afmc] ++
2,777,052 UART: [afmc] CDI.KEYID = 6
2,777,415 UART: [afmc] SUBJECT.KEYID = 7
2,777,841 UART: [afmc] AUTHORITY.KEYID = 5
2,813,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,074 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,957 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,676 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,487 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,277 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
2,020,771 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,118 UART:
2,165,525 UART: Running Caliptra ROM ...
2,166,635 UART:
2,166,802 UART: [state] CFI Enabled
2,167,875 UART: [state] LifecycleState = Unprovisioned
2,169,522 UART: [state] DebugLocked = No
2,170,628 UART: [state] WD Timer not started. Device not locked for debugging
2,173,098 UART: [kat] SHA2-256
2,173,774 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,783 UART: [kat] ++
2,177,237 UART: [kat] sha1
2,177,751 UART: [kat] SHA2-256
2,178,512 UART: [kat] SHA2-384
2,179,179 UART: [kat] SHA2-512-ACC
2,180,006 UART: [kat] ECC-384
3,775,427 UART: [kat] HMAC-384Kdf
3,800,575 UART: [kat] LMS
4,873,716 UART: [kat] --
4,878,264 UART: [cold-reset] ++
4,879,720 UART: [fht] FHT @ 0x50003400
4,890,536 UART: [idev] ++
4,891,217 UART: [idev] CDI.KEYID = 6
4,892,454 UART: [idev] SUBJECT.KEYID = 7
4,893,555 UART: [idev] UDS.KEYID = 0
4,926,764 UART: [idev] Erasing UDS.KEYID = 0
8,241,803 UART: [idev] Sha1 KeyId Algorithm
8,264,238 UART: [idev] --
8,269,183 UART: [ldev] ++
8,269,778 UART: [ldev] CDI.KEYID = 6
8,270,886 UART: [ldev] SUBJECT.KEYID = 5
8,272,104 UART: [ldev] AUTHORITY.KEYID = 7
8,273,255 UART: [ldev] FE.KEYID = 1
8,315,478 UART: [ldev] Erasing FE.KEYID = 1
11,651,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,166 UART: [ldev] --
14,037,348 UART: [fwproc] Wait for Commands...
14,038,797 UART: [fwproc] Recv command 0x46574c44
14,040,795 UART: [fwproc] Recv'd Img size: 114124 bytes
17,569,428 UART: ROM Fatal Error: 0x000B0030
17,572,515 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,020,623 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,264,432 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,964 writing to cptra_bootfsm_go
2,021,558 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,607 UART:
2,166,010 UART: Running Caliptra ROM ...
2,167,098 UART:
2,167,253 UART: [state] CFI Enabled
2,168,226 UART: [state] LifecycleState = Unprovisioned
2,169,874 UART: [state] DebugLocked = No
2,170,894 UART: [state] WD Timer not started. Device not locked for debugging
2,173,353 UART: [kat] SHA2-256
2,174,009 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,013 UART: [kat] ++
2,177,459 UART: [kat] sha1
2,177,985 UART: [kat] SHA2-256
2,178,636 UART: [kat] SHA2-384
2,179,284 UART: [kat] SHA2-512-ACC
2,180,075 UART: [kat] ECC-384
4,096,029 UART: [kat] HMAC-384Kdf
4,108,540 UART: [kat] LMS
5,181,641 UART: [kat] --
5,186,199 UART: [cold-reset] ++
5,188,889 UART: [fht] FHT @ 0x50003400
5,199,597 UART: [idev] ++
5,200,269 UART: [idev] CDI.KEYID = 6
5,201,372 UART: [idev] SUBJECT.KEYID = 7
5,202,910 UART: [idev] UDS.KEYID = 0
5,220,893 UART: [idev] Erasing UDS.KEYID = 0
8,497,167 UART: [idev] Sha1 KeyId Algorithm
8,519,066 UART: [idev] --
8,524,333 UART: [ldev] ++
8,524,959 UART: [ldev] CDI.KEYID = 6
8,526,056 UART: [ldev] SUBJECT.KEYID = 5
8,527,591 UART: [ldev] AUTHORITY.KEYID = 7
8,529,068 UART: [ldev] FE.KEYID = 1
8,540,255 UART: [ldev] Erasing FE.KEYID = 1
11,835,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,054 UART: [ldev] --
14,200,674 UART: [fwproc] Wait for Commands...
14,203,793 UART: [fwproc] Recv command 0x46574c44
14,206,102 UART: [fwproc] Recv'd Img size: 114124 bytes
17,875,203 UART: ROM Fatal Error: 0x000B0030
17,878,300 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,033,593 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,452,969 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,022,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,696 UART:
2,167,107 UART: Running Caliptra ROM ...
2,168,313 UART:
2,168,487 UART: [state] CFI Enabled
2,169,354 UART: [state] LifecycleState = Unprovisioned
2,171,003 UART: [state] DebugLocked = No
2,172,074 UART: [state] WD Timer not started. Device not locked for debugging
2,174,544 UART: [kat] SHA2-256
2,175,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,210 UART: [kat] ++
2,178,657 UART: [kat] sha1
2,179,255 UART: [kat] SHA2-256
2,179,920 UART: [kat] SHA2-384
2,180,575 UART: [kat] SHA2-512-ACC
2,181,382 UART: [kat] ECC-384
2,943,480 UART: [kat] HMAC-384Kdf
2,969,486 UART: [kat] LMS
3,498,897 UART: [kat] --
3,503,584 UART: [cold-reset] ++
3,504,770 UART: [fht] FHT @ 0x50003400
3,515,457 UART: [idev] ++
3,516,024 UART: [idev] CDI.KEYID = 6
3,516,939 UART: [idev] SUBJECT.KEYID = 7
3,518,155 UART: [idev] UDS.KEYID = 0
3,541,691 UART: [idev] Erasing UDS.KEYID = 0
6,023,839 UART: [idev] Sha1 KeyId Algorithm
6,047,776 UART: [idev] --
6,052,194 UART: [ldev] ++
6,052,775 UART: [ldev] CDI.KEYID = 6
6,053,671 UART: [ldev] SUBJECT.KEYID = 5
6,054,890 UART: [ldev] AUTHORITY.KEYID = 7
6,056,128 UART: [ldev] FE.KEYID = 1
6,096,700 UART: [ldev] Erasing FE.KEYID = 1
8,599,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,994 UART: [ldev] --
10,411,024 UART: [fwproc] Wait for Commands...
10,413,557 UART: [fwproc] Recv command 0x46574c44
10,415,650 UART: [fwproc] Recv'd Img size: 114448 bytes
12,076,061 UART: ROM Fatal Error: 0x000B0030
12,079,194 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,006 writing to cptra_bootfsm_go
2,031,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,782,276 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
2,020,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,122 UART:
2,165,516 UART: Running Caliptra ROM ...
2,166,599 UART:
2,166,756 UART: [state] CFI Enabled
2,167,718 UART: [state] LifecycleState = Unprovisioned
2,169,381 UART: [state] DebugLocked = No
2,170,409 UART: [state] WD Timer not started. Device not locked for debugging
2,172,870 UART: [kat] SHA2-256
2,173,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,534 UART: [kat] ++
2,176,983 UART: [kat] sha1
2,177,493 UART: [kat] SHA2-256
2,178,188 UART: [kat] SHA2-384
2,178,847 UART: [kat] SHA2-512-ACC
2,179,645 UART: [kat] ECC-384
3,281,803 UART: [kat] HMAC-384Kdf
3,293,623 UART: [kat] LMS
3,823,079 UART: [kat] --
3,827,614 UART: [cold-reset] ++
3,829,280 UART: [fht] FHT @ 0x50003400
3,840,047 UART: [idev] ++
3,840,671 UART: [idev] CDI.KEYID = 6
3,841,586 UART: [idev] SUBJECT.KEYID = 7
3,842,747 UART: [idev] UDS.KEYID = 0
3,858,408 UART: [idev] Erasing UDS.KEYID = 0
6,314,876 UART: [idev] Sha1 KeyId Algorithm
6,338,801 UART: [idev] --
6,341,741 UART: [ldev] ++
6,342,310 UART: [ldev] CDI.KEYID = 6
6,343,193 UART: [ldev] SUBJECT.KEYID = 5
6,344,350 UART: [ldev] AUTHORITY.KEYID = 7
6,345,694 UART: [ldev] FE.KEYID = 1
6,357,609 UART: [ldev] Erasing FE.KEYID = 1
8,830,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,038 UART: [ldev] --
10,618,222 UART: [fwproc] Wait for Commands...
10,620,153 UART: [fwproc] Recv command 0x46574c44
10,622,198 UART: [fwproc] Recv'd Img size: 114448 bytes
12,267,743 UART: ROM Fatal Error: 0x000B0030
12,270,828 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
2,020,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,968,779 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
2,031,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,747,434 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,022,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,965,303 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,564 UART: [state] LifecycleState = Unprovisioned
85,219 UART: [state] DebugLocked = No
85,873 UART: [state] WD Timer not started. Device not locked for debugging
87,068 UART: [kat] SHA2-256
890,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,747 UART: [kat] ++
894,899 UART: [kat] sha1
899,175 UART: [kat] SHA2-256
901,115 UART: [kat] SHA2-384
903,720 UART: [kat] SHA2-512-ACC
905,621 UART: [kat] ECC-384
915,500 UART: [kat] HMAC-384Kdf
920,066 UART: [kat] LMS
1,168,378 UART: [kat] --
1,169,251 UART: [cold-reset] ++
1,169,779 UART: [fht] FHT @ 0x50003400
1,172,399 UART: [idev] ++
1,172,567 UART: [idev] CDI.KEYID = 6
1,172,928 UART: [idev] SUBJECT.KEYID = 7
1,173,353 UART: [idev] UDS.KEYID = 0
1,181,463 UART: [idev] Erasing UDS.KEYID = 0
1,198,893 UART: [idev] Sha1 KeyId Algorithm
1,207,899 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,490 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,904 UART: [ldev] --
1,281,326 UART: [fwproc] Wait for Commands...
1,282,057 UART: [fwproc] Recv command 0x46574c44
1,282,790 UART: [fwproc] Recv'd Img size: 114448 bytes
1,598,627 UART: ROM Fatal Error: 0x000B0030
1,599,784 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,451,265 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
917,111 UART: [kat] HMAC-384Kdf
921,681 UART: [kat] LMS
1,169,993 UART: [kat] --
1,170,854 UART: [cold-reset] ++
1,171,388 UART: [fht] FHT @ 0x50003400
1,174,140 UART: [idev] ++
1,174,308 UART: [idev] CDI.KEYID = 6
1,174,669 UART: [idev] SUBJECT.KEYID = 7
1,175,094 UART: [idev] UDS.KEYID = 0
1,182,820 UART: [idev] Erasing UDS.KEYID = 0
1,199,508 UART: [idev] Sha1 KeyId Algorithm
1,208,602 UART: [idev] --
1,209,509 UART: [ldev] ++
1,209,677 UART: [ldev] CDI.KEYID = 6
1,210,041 UART: [ldev] SUBJECT.KEYID = 5
1,210,468 UART: [ldev] AUTHORITY.KEYID = 7
1,210,931 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,529 UART: [ldev] --
1,282,015 UART: [fwproc] Wait for Commands...
1,282,766 UART: [fwproc] Recv command 0x46574c44
1,283,499 UART: [fwproc] Recv'd Img size: 114448 bytes
1,596,857 UART: ROM Fatal Error: 0x000B0030
1,598,014 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,451,434 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,433 UART: [kat] ++
895,585 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,170,089 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,182,499 UART: [idev] Erasing UDS.KEYID = 0
1,199,785 UART: [idev] Sha1 KeyId Algorithm
1,208,639 UART: [idev] --
1,209,632 UART: [ldev] ++
1,209,800 UART: [ldev] CDI.KEYID = 6
1,210,164 UART: [ldev] SUBJECT.KEYID = 5
1,210,591 UART: [ldev] AUTHORITY.KEYID = 7
1,211,054 UART: [ldev] FE.KEYID = 1
1,216,154 UART: [ldev] Erasing FE.KEYID = 1
1,242,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,576 UART: [ldev] --
1,282,026 UART: [fwproc] Wait for Commands...
1,282,637 UART: [fwproc] Recv command 0x46574c44
1,283,370 UART: [fwproc] Recv'd Img size: 114448 bytes
1,588,237 UART: ROM Fatal Error: 0x000B0030
1,589,394 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,453,234 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,161 UART: [kat] LMS
1,169,473 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,812 UART: [fht] FHT @ 0x50003400
1,173,654 UART: [idev] ++
1,173,822 UART: [idev] CDI.KEYID = 6
1,174,183 UART: [idev] SUBJECT.KEYID = 7
1,174,608 UART: [idev] UDS.KEYID = 0
1,182,616 UART: [idev] Erasing UDS.KEYID = 0
1,200,454 UART: [idev] Sha1 KeyId Algorithm
1,209,316 UART: [idev] --
1,210,217 UART: [ldev] ++
1,210,385 UART: [ldev] CDI.KEYID = 6
1,210,749 UART: [ldev] SUBJECT.KEYID = 5
1,211,176 UART: [ldev] AUTHORITY.KEYID = 7
1,211,639 UART: [ldev] FE.KEYID = 1
1,216,987 UART: [ldev] Erasing FE.KEYID = 1
1,243,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,657 UART: [ldev] --
1,283,149 UART: [fwproc] Wait for Commands...
1,283,944 UART: [fwproc] Recv command 0x46574c44
1,284,677 UART: [fwproc] Recv'd Img size: 114448 bytes
1,585,296 UART: ROM Fatal Error: 0x000B0030
1,586,453 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,439,537 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,716 UART: [state] LifecycleState = Unprovisioned
85,371 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,019 UART: [kat] ++
895,171 UART: [kat] sha1
899,277 UART: [kat] SHA2-256
901,217 UART: [kat] SHA2-384
904,076 UART: [kat] SHA2-512-ACC
905,977 UART: [kat] ECC-384
915,700 UART: [kat] HMAC-384Kdf
920,374 UART: [kat] LMS
1,168,686 UART: [kat] --
1,169,597 UART: [cold-reset] ++
1,170,025 UART: [fht] FHT @ 0x50003400
1,172,607 UART: [idev] ++
1,172,775 UART: [idev] CDI.KEYID = 6
1,173,136 UART: [idev] SUBJECT.KEYID = 7
1,173,561 UART: [idev] UDS.KEYID = 0
1,181,415 UART: [idev] Erasing UDS.KEYID = 0
1,198,611 UART: [idev] Sha1 KeyId Algorithm
1,207,387 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,214,614 UART: [ldev] Erasing FE.KEYID = 1
1,240,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,328 UART: [ldev] --
1,279,750 UART: [fwproc] Wait for Commands...
1,280,427 UART: [fwproc] Recv command 0x46574c44
1,281,160 UART: [fwproc] Recv'd Img size: 114448 bytes
1,591,761 UART: ROM Fatal Error: 0x000B0030
1,592,918 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,436,857 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,152 UART: [idev] ++
1,173,320 UART: [idev] CDI.KEYID = 6
1,173,681 UART: [idev] SUBJECT.KEYID = 7
1,174,106 UART: [idev] UDS.KEYID = 0
1,182,644 UART: [idev] Erasing UDS.KEYID = 0
1,199,832 UART: [idev] Sha1 KeyId Algorithm
1,208,698 UART: [idev] --
1,209,781 UART: [ldev] ++
1,209,949 UART: [ldev] CDI.KEYID = 6
1,210,313 UART: [ldev] SUBJECT.KEYID = 5
1,210,740 UART: [ldev] AUTHORITY.KEYID = 7
1,211,203 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,242,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,701 UART: [fwproc] Wait for Commands...
1,282,276 UART: [fwproc] Recv command 0x46574c44
1,283,009 UART: [fwproc] Recv'd Img size: 114448 bytes
1,593,628 UART: ROM Fatal Error: 0x000B0030
1,594,785 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,447,310 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
5,516 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,164 UART:
192,552 UART: Running Caliptra ROM ...
193,929 UART:
194,083 UART: [state] CFI Enabled
263,119 UART: [state] LifecycleState = Unprovisioned
265,462 UART: [state] DebugLocked = No
267,434 UART: [state] WD Timer not started. Device not locked for debugging
271,687 UART: [kat] SHA2-256
453,601 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,114 UART: [kat] ++
465,648 UART: [kat] sha1
476,420 UART: [kat] SHA2-256
479,441 UART: [kat] SHA2-384
486,133 UART: [kat] SHA2-512-ACC
488,747 UART: [kat] ECC-384
3,775,781 UART: [kat] HMAC-384Kdf
3,803,893 UART: [kat] LMS
4,877,056 UART: [kat] --
4,879,445 UART: [cold-reset] ++
4,881,872 UART: [fht] FHT @ 0x50003400
4,892,585 UART: [idev] ++
4,893,255 UART: [idev] CDI.KEYID = 6
4,894,421 UART: [idev] SUBJECT.KEYID = 7
4,895,637 UART: [idev] UDS.KEYID = 0
4,930,376 UART: [idev] Erasing UDS.KEYID = 0
8,244,754 UART: [idev] Sha1 KeyId Algorithm
8,266,156 UART: [idev] --
8,270,365 UART: [ldev] ++
8,270,935 UART: [ldev] CDI.KEYID = 6
8,272,195 UART: [ldev] SUBJECT.KEYID = 5
8,273,505 UART: [ldev] AUTHORITY.KEYID = 7
8,274,696 UART: [ldev] FE.KEYID = 1
8,318,563 UART: [ldev] Erasing FE.KEYID = 1
11,652,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,497 UART: [ldev] --
14,039,743 UART: [fwproc] Wait for Commands...
14,042,832 UART: [fwproc] Recv command 0x46574c44
14,045,161 UART: [fwproc] Recv'd Img size: 114124 bytes
14,101,754 UART: ROM Fatal Error: 0x000B0001
14,105,194 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
5,376 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,879,398 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
6,600 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,509 UART:
192,877 UART: Running Caliptra ROM ...
193,991 UART:
603,474 UART: [state] CFI Enabled
618,753 UART: [state] LifecycleState = Unprovisioned
621,082 UART: [state] DebugLocked = No
622,433 UART: [state] WD Timer not started. Device not locked for debugging
627,882 UART: [kat] SHA2-256
809,830 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,380 UART: [kat] ++
821,883 UART: [kat] sha1
832,381 UART: [kat] SHA2-256
835,443 UART: [kat] SHA2-384
842,111 UART: [kat] SHA2-512-ACC
844,725 UART: [kat] ECC-384
4,100,142 UART: [kat] HMAC-384Kdf
4,113,038 UART: [kat] LMS
5,186,176 UART: [kat] --
5,190,340 UART: [cold-reset] ++
5,192,114 UART: [fht] FHT @ 0x50003400
5,202,756 UART: [idev] ++
5,203,451 UART: [idev] CDI.KEYID = 6
5,204,638 UART: [idev] SUBJECT.KEYID = 7
5,206,097 UART: [idev] UDS.KEYID = 0
5,223,294 UART: [idev] Erasing UDS.KEYID = 0
8,498,723 UART: [idev] Sha1 KeyId Algorithm
8,520,938 UART: [idev] --
8,524,822 UART: [ldev] ++
8,525,388 UART: [ldev] CDI.KEYID = 6
8,526,569 UART: [ldev] SUBJECT.KEYID = 5
8,528,058 UART: [ldev] AUTHORITY.KEYID = 7
8,529,621 UART: [ldev] FE.KEYID = 1
8,540,267 UART: [ldev] Erasing FE.KEYID = 1
11,831,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,509 UART: [ldev] --
14,199,571 UART: [fwproc] Wait for Commands...
14,202,746 UART: [fwproc] Recv command 0x46574c44
14,205,067 UART: [fwproc] Recv'd Img size: 114124 bytes
14,260,766 UART: ROM Fatal Error: 0x000B0001
14,264,165 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
6,086 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,064,864 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,011 writing to cptra_bootfsm_go
6,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
193,199 UART:
193,576 UART: Running Caliptra ROM ...
194,734 UART:
194,886 UART: [state] CFI Enabled
265,541 UART: [state] LifecycleState = Unprovisioned
267,416 UART: [state] DebugLocked = No
269,126 UART: [state] WD Timer not started. Device not locked for debugging
272,650 UART: [kat] SHA2-256
451,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,346 UART: [kat] ++
463,895 UART: [kat] sha1
475,537 UART: [kat] SHA2-256
478,598 UART: [kat] SHA2-384
484,203 UART: [kat] SHA2-512-ACC
487,148 UART: [kat] ECC-384
2,950,362 UART: [kat] HMAC-384Kdf
2,972,519 UART: [kat] LMS
3,501,974 UART: [kat] --
3,506,932 UART: [cold-reset] ++
3,508,646 UART: [fht] FHT @ 0x50003400
3,519,903 UART: [idev] ++
3,520,465 UART: [idev] CDI.KEYID = 6
3,521,481 UART: [idev] SUBJECT.KEYID = 7
3,522,790 UART: [idev] UDS.KEYID = 0
3,545,215 UART: [idev] Erasing UDS.KEYID = 0
6,029,876 UART: [idev] Sha1 KeyId Algorithm
6,053,941 UART: [idev] --
6,057,562 UART: [ldev] ++
6,058,133 UART: [ldev] CDI.KEYID = 6
6,059,042 UART: [ldev] SUBJECT.KEYID = 5
6,060,210 UART: [ldev] AUTHORITY.KEYID = 7
6,061,444 UART: [ldev] FE.KEYID = 1
6,100,569 UART: [ldev] Erasing FE.KEYID = 1
8,606,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,464 UART: [ldev] --
10,414,399 UART: [fwproc] Wait for Commands...
10,416,293 UART: [fwproc] Recv command 0x46574c44
10,418,392 UART: [fwproc] Recv'd Img size: 114448 bytes
10,473,864 UART: ROM Fatal Error: 0x000B0001
10,476,972 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
5,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,258,107 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
6,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,462 UART:
192,849 UART: Running Caliptra ROM ...
193,922 UART:
603,727 UART: [state] CFI Enabled
618,166 UART: [state] LifecycleState = Unprovisioned
620,051 UART: [state] DebugLocked = No
622,108 UART: [state] WD Timer not started. Device not locked for debugging
626,605 UART: [kat] SHA2-256
805,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,265 UART: [kat] ++
817,712 UART: [kat] sha1
829,612 UART: [kat] SHA2-256
832,618 UART: [kat] SHA2-384
840,373 UART: [kat] SHA2-512-ACC
843,322 UART: [kat] ECC-384
3,283,956 UART: [kat] HMAC-384Kdf
3,295,487 UART: [kat] LMS
3,824,984 UART: [kat] --
3,829,462 UART: [cold-reset] ++
3,830,789 UART: [fht] FHT @ 0x50003400
3,841,627 UART: [idev] ++
3,842,196 UART: [idev] CDI.KEYID = 6
3,843,075 UART: [idev] SUBJECT.KEYID = 7
3,844,234 UART: [idev] UDS.KEYID = 0
3,862,095 UART: [idev] Erasing UDS.KEYID = 0
6,316,799 UART: [idev] Sha1 KeyId Algorithm
6,339,780 UART: [idev] --
6,344,035 UART: [ldev] ++
6,344,599 UART: [ldev] CDI.KEYID = 6
6,345,479 UART: [ldev] SUBJECT.KEYID = 5
6,346,713 UART: [ldev] AUTHORITY.KEYID = 7
6,347,946 UART: [ldev] FE.KEYID = 1
6,357,966 UART: [ldev] Erasing FE.KEYID = 1
8,834,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,929 UART: [ldev] --
10,621,998 UART: [fwproc] Wait for Commands...
10,623,884 UART: [fwproc] Recv command 0x46574c44
10,625,982 UART: [fwproc] Recv'd Img size: 114448 bytes
10,681,935 UART: ROM Fatal Error: 0x000B0001
10,685,025 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
6,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,459,224 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
5,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,259,099 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
6,307 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,455,722 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,170,061 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,198,751 UART: [idev] Sha1 KeyId Algorithm
1,207,741 UART: [idev] --
1,208,628 UART: [ldev] ++
1,208,796 UART: [ldev] CDI.KEYID = 6
1,209,160 UART: [ldev] SUBJECT.KEYID = 5
1,209,587 UART: [ldev] AUTHORITY.KEYID = 7
1,210,050 UART: [ldev] FE.KEYID = 1
1,215,002 UART: [ldev] Erasing FE.KEYID = 1
1,241,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,958 UART: [ldev] --
1,280,446 UART: [fwproc] Wait for Commands...
1,281,103 UART: [fwproc] Recv command 0x46574c44
1,281,836 UART: [fwproc] Recv'd Img size: 114448 bytes
1,300,909 UART: ROM Fatal Error: 0x000B0001
1,302,066 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,154,967 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
891,781 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,910 UART: [kat] ++
896,062 UART: [kat] sha1
900,232 UART: [kat] SHA2-256
902,172 UART: [kat] SHA2-384
904,829 UART: [kat] SHA2-512-ACC
906,730 UART: [kat] ECC-384
916,411 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,528 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,732 UART: [idev] ++
1,173,900 UART: [idev] CDI.KEYID = 6
1,174,261 UART: [idev] SUBJECT.KEYID = 7
1,174,686 UART: [idev] UDS.KEYID = 0
1,182,564 UART: [idev] Erasing UDS.KEYID = 0
1,199,966 UART: [idev] Sha1 KeyId Algorithm
1,208,944 UART: [idev] --
1,209,925 UART: [ldev] ++
1,210,093 UART: [ldev] CDI.KEYID = 6
1,210,457 UART: [ldev] SUBJECT.KEYID = 5
1,210,884 UART: [ldev] AUTHORITY.KEYID = 7
1,211,347 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,243,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,279 UART: [fwproc] Wait for Commands...
1,282,942 UART: [fwproc] Recv command 0x46574c44
1,283,675 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,898 UART: ROM Fatal Error: 0x000B0001
1,304,055 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,154,094 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,495 UART: [kat] SHA2-256
901,435 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
915,780 UART: [kat] HMAC-384Kdf
920,244 UART: [kat] LMS
1,168,556 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,759 UART: [fht] FHT @ 0x50003400
1,172,257 UART: [idev] ++
1,172,425 UART: [idev] CDI.KEYID = 6
1,172,786 UART: [idev] SUBJECT.KEYID = 7
1,173,211 UART: [idev] UDS.KEYID = 0
1,181,213 UART: [idev] Erasing UDS.KEYID = 0
1,197,681 UART: [idev] Sha1 KeyId Algorithm
1,206,467 UART: [idev] --
1,207,502 UART: [ldev] ++
1,207,670 UART: [ldev] CDI.KEYID = 6
1,208,034 UART: [ldev] SUBJECT.KEYID = 5
1,208,461 UART: [ldev] AUTHORITY.KEYID = 7
1,208,924 UART: [ldev] FE.KEYID = 1
1,214,172 UART: [ldev] Erasing FE.KEYID = 1
1,240,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,492 UART: [ldev] --
1,280,000 UART: [fwproc] Wait for Commands...
1,280,661 UART: [fwproc] Recv command 0x46574c44
1,281,394 UART: [fwproc] Recv'd Img size: 114448 bytes
1,300,283 UART: ROM Fatal Error: 0x000B0001
1,301,440 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,143 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,567 UART: [kat] SHA2-512-ACC
906,468 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,252 UART: [cold-reset] ++
1,170,622 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,182,404 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,624 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,973 UART: [ldev] SUBJECT.KEYID = 5
1,210,400 UART: [ldev] AUTHORITY.KEYID = 7
1,210,863 UART: [ldev] FE.KEYID = 1
1,216,383 UART: [ldev] Erasing FE.KEYID = 1
1,243,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,879 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,282,924 UART: [fwproc] Recv command 0x46574c44
1,283,657 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,974 UART: ROM Fatal Error: 0x000B0001
1,304,131 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,550 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,840 UART: [state] LifecycleState = Unprovisioned
86,495 UART: [state] DebugLocked = No
87,059 UART: [state] WD Timer not started. Device not locked for debugging
88,410 UART: [kat] SHA2-256
891,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,089 UART: [kat] ++
896,241 UART: [kat] sha1
900,449 UART: [kat] SHA2-256
902,389 UART: [kat] SHA2-384
904,948 UART: [kat] SHA2-512-ACC
906,849 UART: [kat] ECC-384
916,834 UART: [kat] HMAC-384Kdf
921,466 UART: [kat] LMS
1,169,778 UART: [kat] --
1,170,905 UART: [cold-reset] ++
1,171,389 UART: [fht] FHT @ 0x50003400
1,173,971 UART: [idev] ++
1,174,139 UART: [idev] CDI.KEYID = 6
1,174,500 UART: [idev] SUBJECT.KEYID = 7
1,174,925 UART: [idev] UDS.KEYID = 0
1,182,835 UART: [idev] Erasing UDS.KEYID = 0
1,199,857 UART: [idev] Sha1 KeyId Algorithm
1,208,725 UART: [idev] --
1,209,546 UART: [ldev] ++
1,209,714 UART: [ldev] CDI.KEYID = 6
1,210,078 UART: [ldev] SUBJECT.KEYID = 5
1,210,505 UART: [ldev] AUTHORITY.KEYID = 7
1,210,968 UART: [ldev] FE.KEYID = 1
1,216,092 UART: [ldev] Erasing FE.KEYID = 1
1,242,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,220 UART: [ldev] --
1,281,732 UART: [fwproc] Wait for Commands...
1,282,525 UART: [fwproc] Recv command 0x46574c44
1,283,258 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,297 UART: ROM Fatal Error: 0x000B0001
1,303,454 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,154,953 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,619 UART: [kat] LMS
1,168,931 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,350 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,181,792 UART: [idev] Erasing UDS.KEYID = 0
1,198,926 UART: [idev] Sha1 KeyId Algorithm
1,207,596 UART: [idev] --
1,208,757 UART: [ldev] ++
1,208,925 UART: [ldev] CDI.KEYID = 6
1,209,289 UART: [ldev] SUBJECT.KEYID = 5
1,209,716 UART: [ldev] AUTHORITY.KEYID = 7
1,210,179 UART: [ldev] FE.KEYID = 1
1,215,701 UART: [ldev] Erasing FE.KEYID = 1
1,242,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,129 UART: [ldev] --
1,281,579 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0x46574c44
1,283,061 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,154 UART: ROM Fatal Error: 0x000B0001
1,303,311 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,076 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
5,501 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,078 UART:
192,487 UART: Running Caliptra ROM ...
193,641 UART:
193,790 UART: [state] CFI Enabled
264,753 UART: [state] LifecycleState = Unprovisioned
267,136 UART: [state] DebugLocked = No
269,009 UART: [state] WD Timer not started. Device not locked for debugging
273,865 UART: [kat] SHA2-256
455,785 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,333 UART: [kat] ++
467,860 UART: [kat] sha1
477,770 UART: [kat] SHA2-256
480,782 UART: [kat] SHA2-384
485,720 UART: [kat] SHA2-512-ACC
489,047 UART: [kat] ECC-384
3,775,034 UART: [kat] HMAC-384Kdf
3,801,970 UART: [kat] LMS
4,875,105 UART: [kat] --
4,878,254 UART: [cold-reset] ++
4,879,378 UART: [fht] FHT @ 0x50003400
4,891,663 UART: [idev] ++
4,892,389 UART: [idev] CDI.KEYID = 6
4,893,503 UART: [idev] SUBJECT.KEYID = 7
4,894,721 UART: [idev] UDS.KEYID = 0
4,929,266 UART: [idev] Erasing UDS.KEYID = 0
8,244,702 UART: [idev] Sha1 KeyId Algorithm
8,265,506 UART: [idev] --
8,268,396 UART: [ldev] ++
8,268,970 UART: [ldev] CDI.KEYID = 6
8,270,206 UART: [ldev] SUBJECT.KEYID = 5
8,271,363 UART: [ldev] AUTHORITY.KEYID = 7
8,272,550 UART: [ldev] FE.KEYID = 1
8,317,981 UART: [ldev] Erasing FE.KEYID = 1
11,654,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,714 UART: [ldev] --
14,038,632 UART: [fwproc] Wait for Commands...
14,040,860 UART: [fwproc] Recv command 0x46574c44
14,043,134 UART: [fwproc] Recv'd Img size: 114124 bytes
14,096,113 UART: ROM Fatal Error: 0x000B0002
14,099,533 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
5,339 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,860,273 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
6,630 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,534 UART:
192,910 UART: Running Caliptra ROM ...
194,093 UART:
603,744 UART: [state] CFI Enabled
617,794 UART: [state] LifecycleState = Unprovisioned
620,163 UART: [state] DebugLocked = No
622,520 UART: [state] WD Timer not started. Device not locked for debugging
627,415 UART: [kat] SHA2-256
809,378 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,927 UART: [kat] ++
821,460 UART: [kat] sha1
832,553 UART: [kat] SHA2-256
835,625 UART: [kat] SHA2-384
839,918 UART: [kat] SHA2-512-ACC
842,532 UART: [kat] ECC-384
4,094,486 UART: [kat] HMAC-384Kdf
4,105,395 UART: [kat] LMS
5,178,545 UART: [kat] --
5,181,484 UART: [cold-reset] ++
5,182,565 UART: [fht] FHT @ 0x50003400
5,193,546 UART: [idev] ++
5,194,270 UART: [idev] CDI.KEYID = 6
5,195,445 UART: [idev] SUBJECT.KEYID = 7
5,196,934 UART: [idev] UDS.KEYID = 0
5,214,008 UART: [idev] Erasing UDS.KEYID = 0
8,483,099 UART: [idev] Sha1 KeyId Algorithm
8,504,606 UART: [idev] --
8,507,957 UART: [ldev] ++
8,508,521 UART: [ldev] CDI.KEYID = 6
8,509,677 UART: [ldev] SUBJECT.KEYID = 5
8,511,212 UART: [ldev] AUTHORITY.KEYID = 7
8,512,687 UART: [ldev] FE.KEYID = 1
8,522,794 UART: [ldev] Erasing FE.KEYID = 1
11,812,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,105,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,122,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,138,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,154,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,174,876 UART: [ldev] --
14,179,160 UART: [fwproc] Wait for Commands...
14,181,489 UART: [fwproc] Recv command 0x46574c44
14,183,752 UART: [fwproc] Recv'd Img size: 114124 bytes
14,237,268 UART: ROM Fatal Error: 0x000B0002
14,240,680 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
6,174 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,068,734 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
5,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,254 UART:
192,631 UART: Running Caliptra ROM ...
193,698 UART:
193,838 UART: [state] CFI Enabled
261,619 UART: [state] LifecycleState = Unprovisioned
263,510 UART: [state] DebugLocked = No
265,347 UART: [state] WD Timer not started. Device not locked for debugging
269,520 UART: [kat] SHA2-256
448,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,214 UART: [kat] ++
460,663 UART: [kat] sha1
472,672 UART: [kat] SHA2-256
475,708 UART: [kat] SHA2-384
481,398 UART: [kat] SHA2-512-ACC
484,325 UART: [kat] ECC-384
2,948,774 UART: [kat] HMAC-384Kdf
2,971,106 UART: [kat] LMS
3,500,563 UART: [kat] --
3,503,795 UART: [cold-reset] ++
3,505,674 UART: [fht] FHT @ 0x50003400
3,517,294 UART: [idev] ++
3,517,901 UART: [idev] CDI.KEYID = 6
3,518,788 UART: [idev] SUBJECT.KEYID = 7
3,519,838 UART: [idev] UDS.KEYID = 0
3,542,270 UART: [idev] Erasing UDS.KEYID = 0
6,025,265 UART: [idev] Sha1 KeyId Algorithm
6,049,487 UART: [idev] --
6,052,520 UART: [ldev] ++
6,053,110 UART: [ldev] CDI.KEYID = 6
6,053,999 UART: [ldev] SUBJECT.KEYID = 5
6,055,104 UART: [ldev] AUTHORITY.KEYID = 7
6,056,395 UART: [ldev] FE.KEYID = 1
6,099,964 UART: [ldev] Erasing FE.KEYID = 1
8,603,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,576 UART: [ldev] --
10,411,422 UART: [fwproc] Wait for Commands...
10,414,019 UART: [fwproc] Recv command 0x46574c44
10,416,121 UART: [fwproc] Recv'd Img size: 114448 bytes
10,471,532 UART: ROM Fatal Error: 0x000B0002
10,474,635 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
5,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,256,760 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
6,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,477 UART:
192,889 UART: Running Caliptra ROM ...
194,013 UART:
603,634 UART: [state] CFI Enabled
616,236 UART: [state] LifecycleState = Unprovisioned
618,117 UART: [state] DebugLocked = No
620,409 UART: [state] WD Timer not started. Device not locked for debugging
623,979 UART: [kat] SHA2-256
803,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,670 UART: [kat] ++
815,237 UART: [kat] sha1
826,556 UART: [kat] SHA2-256
829,569 UART: [kat] SHA2-384
835,944 UART: [kat] SHA2-512-ACC
838,935 UART: [kat] ECC-384
3,282,842 UART: [kat] HMAC-384Kdf
3,295,375 UART: [kat] LMS
3,824,899 UART: [kat] --
3,827,644 UART: [cold-reset] ++
3,829,741 UART: [fht] FHT @ 0x50003400
3,841,101 UART: [idev] ++
3,841,668 UART: [idev] CDI.KEYID = 6
3,842,683 UART: [idev] SUBJECT.KEYID = 7
3,843,840 UART: [idev] UDS.KEYID = 0
3,859,447 UART: [idev] Erasing UDS.KEYID = 0
6,315,865 UART: [idev] Sha1 KeyId Algorithm
6,337,528 UART: [idev] --
6,340,959 UART: [ldev] ++
6,341,537 UART: [ldev] CDI.KEYID = 6
6,342,442 UART: [ldev] SUBJECT.KEYID = 5
6,343,664 UART: [ldev] AUTHORITY.KEYID = 7
6,344,897 UART: [ldev] FE.KEYID = 1
6,354,032 UART: [ldev] Erasing FE.KEYID = 1
8,823,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,328 UART: [ldev] --
10,616,834 UART: [fwproc] Wait for Commands...
10,619,631 UART: [fwproc] Recv command 0x46574c44
10,621,680 UART: [fwproc] Recv'd Img size: 114448 bytes
10,675,734 UART: ROM Fatal Error: 0x000B0002
10,678,825 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
6,134 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,463,047 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
5,696 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,257,884 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
6,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,454,789 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
890,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,971 UART: [kat] ++
895,123 UART: [kat] sha1
899,295 UART: [kat] SHA2-256
901,235 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,738 UART: [kat] HMAC-384Kdf
920,096 UART: [kat] LMS
1,168,408 UART: [kat] --
1,169,233 UART: [cold-reset] ++
1,169,757 UART: [fht] FHT @ 0x50003400
1,172,245 UART: [idev] ++
1,172,413 UART: [idev] CDI.KEYID = 6
1,172,774 UART: [idev] SUBJECT.KEYID = 7
1,173,199 UART: [idev] UDS.KEYID = 0
1,181,127 UART: [idev] Erasing UDS.KEYID = 0
1,198,611 UART: [idev] Sha1 KeyId Algorithm
1,207,421 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,214,928 UART: [ldev] Erasing FE.KEYID = 1
1,241,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,066 UART: [ldev] --
1,280,528 UART: [fwproc] Wait for Commands...
1,281,309 UART: [fwproc] Recv command 0x46574c44
1,282,042 UART: [fwproc] Recv'd Img size: 114448 bytes
1,301,078 UART: ROM Fatal Error: 0x000B0002
1,302,235 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,530 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,384 UART: [kat] SHA2-256
902,324 UART: [kat] SHA2-384
905,203 UART: [kat] SHA2-512-ACC
907,104 UART: [kat] ECC-384
916,677 UART: [kat] HMAC-384Kdf
921,279 UART: [kat] LMS
1,169,591 UART: [kat] --
1,170,272 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,594 UART: [idev] ++
1,173,762 UART: [idev] CDI.KEYID = 6
1,174,123 UART: [idev] SUBJECT.KEYID = 7
1,174,548 UART: [idev] UDS.KEYID = 0
1,183,026 UART: [idev] Erasing UDS.KEYID = 0
1,200,392 UART: [idev] Sha1 KeyId Algorithm
1,209,304 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,017 UART: [ldev] SUBJECT.KEYID = 5
1,211,444 UART: [ldev] AUTHORITY.KEYID = 7
1,211,907 UART: [ldev] FE.KEYID = 1
1,217,341 UART: [ldev] Erasing FE.KEYID = 1
1,243,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,307 UART: [ldev] --
1,282,705 UART: [fwproc] Wait for Commands...
1,283,382 UART: [fwproc] Recv command 0x46574c44
1,284,115 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,341 UART: ROM Fatal Error: 0x000B0002
1,304,498 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,757 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,420 UART: [kat] LMS
1,168,732 UART: [kat] --
1,169,817 UART: [cold-reset] ++
1,170,397 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,181,573 UART: [idev] Erasing UDS.KEYID = 0
1,198,443 UART: [idev] Sha1 KeyId Algorithm
1,207,399 UART: [idev] --
1,208,574 UART: [ldev] ++
1,208,742 UART: [ldev] CDI.KEYID = 6
1,209,106 UART: [ldev] SUBJECT.KEYID = 5
1,209,533 UART: [ldev] AUTHORITY.KEYID = 7
1,209,996 UART: [ldev] FE.KEYID = 1
1,215,196 UART: [ldev] Erasing FE.KEYID = 1
1,242,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,068 UART: [ldev] --
1,281,506 UART: [fwproc] Wait for Commands...
1,282,263 UART: [fwproc] Recv command 0x46574c44
1,282,996 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,192 UART: ROM Fatal Error: 0x000B0002
1,303,349 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,726 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
916,453 UART: [kat] HMAC-384Kdf
921,287 UART: [kat] LMS
1,169,599 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,354 UART: [idev] ++
1,173,522 UART: [idev] CDI.KEYID = 6
1,173,883 UART: [idev] SUBJECT.KEYID = 7
1,174,308 UART: [idev] UDS.KEYID = 0
1,182,444 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,124 UART: [idev] --
1,209,125 UART: [ldev] ++
1,209,293 UART: [ldev] CDI.KEYID = 6
1,209,657 UART: [ldev] SUBJECT.KEYID = 5
1,210,084 UART: [ldev] AUTHORITY.KEYID = 7
1,210,547 UART: [ldev] FE.KEYID = 1
1,215,467 UART: [ldev] Erasing FE.KEYID = 1
1,241,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,729 UART: [ldev] --
1,281,051 UART: [fwproc] Wait for Commands...
1,281,726 UART: [fwproc] Recv command 0x46574c44
1,282,459 UART: [fwproc] Recv'd Img size: 114448 bytes
1,301,721 UART: ROM Fatal Error: 0x000B0002
1,302,878 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,335 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
916,096 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,419 UART: [fht] FHT @ 0x50003400
1,172,869 UART: [idev] ++
1,173,037 UART: [idev] CDI.KEYID = 6
1,173,398 UART: [idev] SUBJECT.KEYID = 7
1,173,823 UART: [idev] UDS.KEYID = 0
1,181,471 UART: [idev] Erasing UDS.KEYID = 0
1,198,283 UART: [idev] Sha1 KeyId Algorithm
1,207,297 UART: [idev] --
1,208,382 UART: [ldev] ++
1,208,550 UART: [ldev] CDI.KEYID = 6
1,208,914 UART: [ldev] SUBJECT.KEYID = 5
1,209,341 UART: [ldev] AUTHORITY.KEYID = 7
1,209,804 UART: [ldev] FE.KEYID = 1
1,215,002 UART: [ldev] Erasing FE.KEYID = 1
1,241,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,422 UART: [ldev] --
1,280,874 UART: [fwproc] Wait for Commands...
1,281,687 UART: [fwproc] Recv command 0x46574c44
1,282,420 UART: [fwproc] Recv'd Img size: 114448 bytes
1,301,998 UART: ROM Fatal Error: 0x000B0002
1,303,155 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,754 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
891,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,922 UART: [kat] ++
896,074 UART: [kat] sha1
900,220 UART: [kat] SHA2-256
902,160 UART: [kat] SHA2-384
904,805 UART: [kat] SHA2-512-ACC
906,706 UART: [kat] ECC-384
916,651 UART: [kat] HMAC-384Kdf
921,295 UART: [kat] LMS
1,169,607 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,844 UART: [fht] FHT @ 0x50003400
1,173,430 UART: [idev] ++
1,173,598 UART: [idev] CDI.KEYID = 6
1,173,959 UART: [idev] SUBJECT.KEYID = 7
1,174,384 UART: [idev] UDS.KEYID = 0
1,182,802 UART: [idev] Erasing UDS.KEYID = 0
1,199,990 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,209,823 UART: [ldev] ++
1,209,991 UART: [ldev] CDI.KEYID = 6
1,210,355 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,743 UART: [ldev] Erasing FE.KEYID = 1
1,243,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,425 UART: [ldev] --
1,282,865 UART: [fwproc] Wait for Commands...
1,283,524 UART: [fwproc] Recv command 0x46574c44
1,284,257 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,189 UART: ROM Fatal Error: 0x000B0002
1,304,346 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,154,861 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
2,218,817 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,384,658 UART:
2,385,067 UART: Running Caliptra ROM ...
2,386,241 UART:
2,386,409 UART: [state] CFI Enabled
2,387,373 UART: [state] LifecycleState = Unprovisioned
2,389,058 UART: [state] DebugLocked = No
2,390,166 UART: [state] WD Timer not started. Device not locked for debugging
2,392,640 UART: [kat] SHA2-256
2,393,309 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,396,318 UART: [kat] ++
2,396,767 UART: [kat] sha1
2,397,344 UART: [kat] SHA2-256
2,398,007 UART: [kat] SHA2-384
2,398,670 UART: [kat] SHA2-512-ACC
2,399,508 UART: [kat] ECC-384
3,775,182 UART: [kat] HMAC-384Kdf
3,802,034 UART: [kat] LMS
4,875,182 UART: [kat] --
4,880,109 UART: [cold-reset] ++
4,881,227 UART: [fht] FHT @ 0x50003400
4,892,455 UART: [idev] ++
4,893,129 UART: [idev] CDI.KEYID = 6
4,894,309 UART: [idev] SUBJECT.KEYID = 7
4,895,458 UART: [idev] UDS.KEYID = 0
4,928,720 UART: [idev] Erasing UDS.KEYID = 0
8,241,263 UART: [idev] Sha1 KeyId Algorithm
8,262,114 UART: [idev] --
8,266,182 UART: [ldev] ++
8,266,754 UART: [ldev] CDI.KEYID = 6
8,267,932 UART: [ldev] SUBJECT.KEYID = 5
8,269,085 UART: [ldev] AUTHORITY.KEYID = 7
8,270,315 UART: [ldev] FE.KEYID = 1
8,317,621 UART: [ldev] Erasing FE.KEYID = 1
11,652,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,333 UART: [ldev] --
14,036,482 UART: [fwproc] Wait for Commands...
14,039,453 UART: [fwproc] Recv command 0x46574c44
14,041,770 UART: [fwproc] Recv'd Img size: 131072 bytes
18,330,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,401,621 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,461,865 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
18,847,379 >>> mbox cmd response: success
18,851,950 UART: [afmc] ++
18,852,650 UART: [afmc] CDI.KEYID = 6
18,853,815 UART: [afmc] SUBJECT.KEYID = 7
18,855,028 UART: [afmc] AUTHORITY.KEYID = 5
22,226,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,518,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,520,560 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,536,714 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,552,837 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,568,635 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,590,920 UART: [afmc] --
24,598,023 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,755,323 UART: [cold-reset] --
24,756,197 UART: [state] Locking Datavault
24,757,353 UART: [state] Locking PCR0, PCR1 and PCR31
24,758,889 UART: [state] Locking ICCM
24,759,799 UART: [exit] Launching FMC @ 0x40000000
24,761,218 UART:
24,761,378 UART: Running Caliptra FMC ...
24,762,467 UART:
24,762,619 UART: [fmc] Received command: 0x1000000E
25,539,697 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,213,981 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
18,621,068 >>> mbox cmd response: success
24,308,129 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,465,549 UART:
24,465,924 UART: Running Caliptra FMC ...
24,467,062 UART:
24,467,220 UART: [fmc] Received command: 0x1000000E
25,249,946 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,225,443 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,391,275 UART:
2,391,718 UART: Running Caliptra ROM ...
2,392,889 UART:
2,393,066 UART: [state] CFI Enabled
2,394,028 UART: [state] LifecycleState = Unprovisioned
2,395,683 UART: [state] DebugLocked = No
2,396,786 UART: [state] WD Timer not started. Device not locked for debugging
2,399,253 UART: [kat] SHA2-256
2,399,917 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,402,943 UART: [kat] ++
2,403,389 UART: [kat] sha1
2,403,928 UART: [kat] SHA2-256
2,404,581 UART: [kat] SHA2-384
2,405,229 UART: [kat] SHA2-512-ACC
2,406,021 UART: [kat] ECC-384
4,099,807 UART: [kat] HMAC-384Kdf
4,111,885 UART: [kat] LMS
5,184,881 UART: [kat] --
5,189,580 UART: [cold-reset] ++
5,190,810 UART: [fht] FHT @ 0x50003400
5,203,242 UART: [idev] ++
5,203,917 UART: [idev] CDI.KEYID = 6
5,205,147 UART: [idev] SUBJECT.KEYID = 7
5,206,579 UART: [idev] UDS.KEYID = 0
5,222,874 UART: [idev] Erasing UDS.KEYID = 0
8,496,101 UART: [idev] Sha1 KeyId Algorithm
8,518,633 UART: [idev] --
8,521,318 UART: [ldev] ++
8,521,893 UART: [ldev] CDI.KEYID = 6
8,523,070 UART: [ldev] SUBJECT.KEYID = 5
8,524,554 UART: [ldev] AUTHORITY.KEYID = 7
8,526,107 UART: [ldev] FE.KEYID = 1
8,537,179 UART: [ldev] Erasing FE.KEYID = 1
11,829,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,424 UART: [ldev] --
14,193,637 UART: [fwproc] Wait for Commands...
14,195,553 UART: [fwproc] Recv command 0x46574c44
14,197,889 UART: [fwproc] Recv'd Img size: 131072 bytes
18,479,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,552,344 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,612,570 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
18,998,337 >>> mbox cmd response: success
19,003,178 UART: [afmc] ++
19,003,879 UART: [afmc] CDI.KEYID = 6
19,005,123 UART: [afmc] SUBJECT.KEYID = 7
19,006,151 UART: [afmc] AUTHORITY.KEYID = 5
22,319,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,615,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,617,304 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,633,437 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,649,561 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,665,418 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,687,640 UART: [afmc] --
24,693,956 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,851,235 UART: [cold-reset] --
24,852,099 UART: [state] Locking Datavault
24,853,252 UART: [state] Locking PCR0, PCR1 and PCR31
24,854,783 UART: [state] Locking ICCM
24,855,686 UART: [exit] Launching FMC @ 0x40000000
24,857,100 UART:
24,857,254 UART: Running Caliptra FMC ...
24,858,342 UART:
24,858,490 UART: [fmc] Received command: 0x1000000E
25,635,624 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,217,994 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
18,801,325 >>> mbox cmd response: success
24,429,037 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,586,449 UART:
24,586,843 UART: Running Caliptra FMC ...
24,587,983 UART:
24,588,126 UART: [fmc] Received command: 0x1000000E
25,370,875 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
2,218,478 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,384,296 UART:
2,384,768 UART: Running Caliptra ROM ...
2,385,854 UART:
2,386,034 UART: [state] CFI Enabled
2,387,016 UART: [state] LifecycleState = Unprovisioned
2,388,682 UART: [state] DebugLocked = No
2,389,793 UART: [state] WD Timer not started. Device not locked for debugging
2,392,264 UART: [kat] SHA2-256
2,392,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,395,943 UART: [kat] ++
2,396,392 UART: [kat] sha1
2,396,948 UART: [kat] SHA2-256
2,397,607 UART: [kat] SHA2-384
2,398,264 UART: [kat] SHA2-512-ACC
2,399,276 UART: [kat] ECC-384
2,925,065 UART: [kat] HMAC-384Kdf
2,949,364 UART: [kat] LMS
3,478,790 UART: [kat] --
3,482,291 UART: [cold-reset] ++
3,484,184 UART: [fht] FHT @ 0x50003400
3,494,996 UART: [idev] ++
3,495,598 UART: [idev] CDI.KEYID = 6
3,496,666 UART: [idev] SUBJECT.KEYID = 7
3,497,778 UART: [idev] UDS.KEYID = 0
3,521,380 UART: [idev] Erasing UDS.KEYID = 0
6,007,315 UART: [idev] Sha1 KeyId Algorithm
6,029,128 UART: [idev] --
6,033,401 UART: [ldev] ++
6,033,977 UART: [ldev] CDI.KEYID = 6
6,034,896 UART: [ldev] SUBJECT.KEYID = 5
6,036,062 UART: [ldev] AUTHORITY.KEYID = 7
6,037,305 UART: [ldev] FE.KEYID = 1
6,078,113 UART: [ldev] Erasing FE.KEYID = 1
8,584,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,520 UART: [ldev] --
10,393,699 UART: [fwproc] Wait for Commands...
10,396,123 UART: [fwproc] Recv command 0x46574c44
10,398,218 UART: [fwproc] Recv'd Img size: 131072 bytes
14,008,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,080,277 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,140,622 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,525,435 >>> mbox cmd response: success
14,530,627 UART: [afmc] ++
14,531,246 UART: [afmc] CDI.KEYID = 6
14,532,164 UART: [afmc] SUBJECT.KEYID = 7
14,533,277 UART: [afmc] AUTHORITY.KEYID = 5
17,062,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,800,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,802,534 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,818,604 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,834,643 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,850,339 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,873,094 UART: [afmc] --
18,878,967 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,036,245 UART: [cold-reset] --
19,037,128 UART: [state] Locking Datavault
19,038,284 UART: [state] Locking PCR0, PCR1 and PCR31
19,039,823 UART: [state] Locking ICCM
19,040,730 UART: [exit] Launching FMC @ 0x40000000
19,042,155 UART:
19,042,318 UART: Running Caliptra FMC ...
19,043,423 UART:
19,043,584 UART: [fmc] Received command: 0x1000000E
19,820,663 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,227,193 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,302,277 >>> mbox cmd response: success
18,597,265 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,755,067 UART:
18,755,464 UART: Running Caliptra FMC ...
18,756,616 UART:
18,756,770 UART: [fmc] Received command: 0x1000000E
19,539,460 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,225,225 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,391,410 UART:
2,391,822 UART: Running Caliptra ROM ...
2,393,000 UART:
2,393,181 UART: [state] CFI Enabled
2,394,149 UART: [state] LifecycleState = Unprovisioned
2,395,823 UART: [state] DebugLocked = No
2,396,924 UART: [state] WD Timer not started. Device not locked for debugging
2,399,400 UART: [kat] SHA2-256
2,400,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,403,086 UART: [kat] ++
2,403,537 UART: [kat] sha1
2,404,052 UART: [kat] SHA2-256
2,404,792 UART: [kat] SHA2-384
2,405,456 UART: [kat] SHA2-512-ACC
2,406,293 UART: [kat] ECC-384
3,277,844 UART: [kat] HMAC-384Kdf
3,290,401 UART: [kat] LMS
3,819,869 UART: [kat] --
3,823,345 UART: [cold-reset] ++
3,825,929 UART: [fht] FHT @ 0x50003400
3,837,601 UART: [idev] ++
3,838,166 UART: [idev] CDI.KEYID = 6
3,839,068 UART: [idev] SUBJECT.KEYID = 7
3,840,282 UART: [idev] UDS.KEYID = 0
3,856,095 UART: [idev] Erasing UDS.KEYID = 0
6,314,715 UART: [idev] Sha1 KeyId Algorithm
6,339,022 UART: [idev] --
6,343,232 UART: [ldev] ++
6,343,792 UART: [ldev] CDI.KEYID = 6
6,344,698 UART: [ldev] SUBJECT.KEYID = 5
6,346,013 UART: [ldev] AUTHORITY.KEYID = 7
6,347,200 UART: [ldev] FE.KEYID = 1
6,357,488 UART: [ldev] Erasing FE.KEYID = 1
8,830,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,652 UART: [ldev] --
10,623,859 UART: [fwproc] Wait for Commands...
10,625,571 UART: [fwproc] Recv command 0x46574c44
10,627,612 UART: [fwproc] Recv'd Img size: 131072 bytes
14,226,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,300,457 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,360,785 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,745,166 >>> mbox cmd response: success
14,748,763 UART: [afmc] ++
14,749,369 UART: [afmc] CDI.KEYID = 6
14,750,306 UART: [afmc] SUBJECT.KEYID = 7
14,751,414 UART: [afmc] AUTHORITY.KEYID = 5
17,253,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,974,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,976,074 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,992,170 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,008,207 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,023,863 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,046,432 UART: [afmc] --
19,052,768 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,210,069 UART: [cold-reset] --
19,210,928 UART: [state] Locking Datavault
19,212,083 UART: [state] Locking PCR0, PCR1 and PCR31
19,213,619 UART: [state] Locking ICCM
19,214,524 UART: [exit] Launching FMC @ 0x40000000
19,215,943 UART:
19,216,121 UART: Running Caliptra FMC ...
19,217,218 UART:
19,217,370 UART: [fmc] Received command: 0x1000000E
19,994,486 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,217,124 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,548,643 >>> mbox cmd response: success
18,788,462 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,945,853 UART:
18,946,243 UART: Running Caliptra FMC ...
18,947,466 UART:
18,947,633 UART: [fmc] Received command: 0x1000000E
19,730,246 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
2,219,635 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,333,960 >>> mbox cmd response: success
18,612,706 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,771,001 UART:
18,771,407 UART: Running Caliptra FMC ...
18,772,528 UART:
18,772,679 UART: [fmc] Received command: 0x1000000E
19,555,416 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,216,718 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,533,960 >>> mbox cmd response: success
18,768,537 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,925,914 UART:
18,926,287 UART: Running Caliptra FMC ...
18,927,506 UART:
18,927,675 UART: [fmc] Received command: 0x1000000E
19,710,302 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,688 UART: [state] LifecycleState = Unprovisioned
85,343 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
890,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,947 UART: [kat] ++
895,099 UART: [kat] sha1
899,227 UART: [kat] SHA2-256
901,167 UART: [kat] SHA2-384
903,810 UART: [kat] SHA2-512-ACC
905,711 UART: [kat] ECC-384
914,986 UART: [kat] HMAC-384Kdf
919,524 UART: [kat] LMS
1,167,836 UART: [kat] --
1,168,795 UART: [cold-reset] ++
1,169,355 UART: [fht] FHT @ 0x50003400
1,171,997 UART: [idev] ++
1,172,165 UART: [idev] CDI.KEYID = 6
1,172,526 UART: [idev] SUBJECT.KEYID = 7
1,172,951 UART: [idev] UDS.KEYID = 0
1,180,963 UART: [idev] Erasing UDS.KEYID = 0
1,197,707 UART: [idev] Sha1 KeyId Algorithm
1,206,689 UART: [idev] --
1,207,858 UART: [ldev] ++
1,208,026 UART: [ldev] CDI.KEYID = 6
1,208,390 UART: [ldev] SUBJECT.KEYID = 5
1,208,817 UART: [ldev] AUTHORITY.KEYID = 7
1,209,280 UART: [ldev] FE.KEYID = 1
1,214,524 UART: [ldev] Erasing FE.KEYID = 1
1,241,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,842 UART: [fwproc] Wait for Commands...
1,281,479 UART: [fwproc] Recv command 0x46574c44
1,282,212 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,812 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,497 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,037 >>> mbox cmd response: success
2,990,160 UART: [afmc] ++
2,990,328 UART: [afmc] CDI.KEYID = 6
2,990,691 UART: [afmc] SUBJECT.KEYID = 7
2,991,117 UART: [afmc] AUTHORITY.KEYID = 5
3,027,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,061 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,757 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,656 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,349 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,321 UART: [afmc] --
3,070,363 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,385 UART: [cold-reset] --
3,071,315 UART: [state] Locking Datavault
3,072,378 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,982 UART: [state] Locking ICCM
3,073,538 UART: [exit] Launching FMC @ 0x40000000
3,078,835 UART:
3,078,851 UART: Running Caliptra FMC ...
3,079,259 UART:
3,079,489 UART: [fmc] Received command: 0x1000000E
3,424,543 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,235 >>> mbox cmd response: success
2,894,756 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,111 UART:
2,901,127 UART: Running Caliptra FMC ...
2,901,535 UART:
2,901,765 UART: [fmc] Received command: 0x1000000E
3,246,819 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Unprovisioned
85,644 UART: [state] DebugLocked = No
86,182 UART: [state] WD Timer not started. Device not locked for debugging
87,301 UART: [kat] SHA2-256
890,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,980 UART: [kat] ++
895,132 UART: [kat] sha1
899,418 UART: [kat] SHA2-256
901,358 UART: [kat] SHA2-384
903,995 UART: [kat] SHA2-512-ACC
905,896 UART: [kat] ECC-384
915,273 UART: [kat] HMAC-384Kdf
920,035 UART: [kat] LMS
1,168,347 UART: [kat] --
1,169,046 UART: [cold-reset] ++
1,169,588 UART: [fht] FHT @ 0x50003400
1,172,170 UART: [idev] ++
1,172,338 UART: [idev] CDI.KEYID = 6
1,172,699 UART: [idev] SUBJECT.KEYID = 7
1,173,124 UART: [idev] UDS.KEYID = 0
1,180,774 UART: [idev] Erasing UDS.KEYID = 0
1,198,290 UART: [idev] Sha1 KeyId Algorithm
1,207,170 UART: [idev] --
1,208,079 UART: [ldev] ++
1,208,247 UART: [ldev] CDI.KEYID = 6
1,208,611 UART: [ldev] SUBJECT.KEYID = 5
1,209,038 UART: [ldev] AUTHORITY.KEYID = 7
1,209,501 UART: [ldev] FE.KEYID = 1
1,214,587 UART: [ldev] Erasing FE.KEYID = 1
1,240,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,311 UART: [ldev] --
1,279,575 UART: [fwproc] Wait for Commands...
1,280,384 UART: [fwproc] Recv command 0x46574c44
1,281,117 UART: [fwproc] Recv'd Img size: 131072 bytes
2,770,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,796,781 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,822,466 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,987,156 >>> mbox cmd response: success
2,988,287 UART: [afmc] ++
2,988,455 UART: [afmc] CDI.KEYID = 6
2,988,818 UART: [afmc] SUBJECT.KEYID = 7
2,989,244 UART: [afmc] AUTHORITY.KEYID = 5
3,024,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,041,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,042,076 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,047,772 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,053,671 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,059,364 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,067,002 UART: [afmc] --
3,067,926 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,067,948 UART: [cold-reset] --
3,068,746 UART: [state] Locking Datavault
3,069,913 UART: [state] Locking PCR0, PCR1 and PCR31
3,070,517 UART: [state] Locking ICCM
3,071,039 UART: [exit] Launching FMC @ 0x40000000
3,076,336 UART:
3,076,352 UART: Running Caliptra FMC ...
3,076,760 UART:
3,076,990 UART: [fmc] Received command: 0x1000000E
3,422,044 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,942 >>> mbox cmd response: success
2,896,477 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,238 UART:
2,902,254 UART: Running Caliptra FMC ...
2,902,662 UART:
2,902,892 UART: [fmc] Received command: 0x1000000E
3,247,946 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,301 UART: [kat] ++
895,453 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,662 UART: [kat] HMAC-384Kdf
920,346 UART: [kat] LMS
1,168,658 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,809 UART: [idev] ++
1,172,977 UART: [idev] CDI.KEYID = 6
1,173,338 UART: [idev] SUBJECT.KEYID = 7
1,173,763 UART: [idev] UDS.KEYID = 0
1,181,497 UART: [idev] Erasing UDS.KEYID = 0
1,198,629 UART: [idev] Sha1 KeyId Algorithm
1,207,427 UART: [idev] --
1,208,544 UART: [ldev] ++
1,208,712 UART: [ldev] CDI.KEYID = 6
1,209,076 UART: [ldev] SUBJECT.KEYID = 5
1,209,503 UART: [ldev] AUTHORITY.KEYID = 7
1,209,966 UART: [ldev] FE.KEYID = 1
1,215,024 UART: [ldev] Erasing FE.KEYID = 1
1,241,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,500 UART: [ldev] --
1,280,764 UART: [fwproc] Wait for Commands...
1,281,569 UART: [fwproc] Recv command 0x46574c44
1,282,302 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,714 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,399 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,089 >>> mbox cmd response: success
2,991,318 UART: [afmc] ++
2,991,486 UART: [afmc] CDI.KEYID = 6
2,991,849 UART: [afmc] SUBJECT.KEYID = 7
2,992,275 UART: [afmc] AUTHORITY.KEYID = 5
3,028,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,253 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,949 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,848 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,541 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,399 UART: [afmc] --
3,071,357 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,379 UART: [cold-reset] --
3,072,099 UART: [state] Locking Datavault
3,073,426 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,030 UART: [state] Locking ICCM
3,074,622 UART: [exit] Launching FMC @ 0x40000000
3,079,919 UART:
3,079,935 UART: Running Caliptra FMC ...
3,080,343 UART:
3,080,573 UART: [fmc] Received command: 0x1000000E
3,425,627 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,837,205 >>> mbox cmd response: success
2,892,958 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,899,261 UART:
2,899,277 UART: Running Caliptra FMC ...
2,899,685 UART:
2,899,915 UART: [fmc] Received command: 0x1000000E
3,244,969 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
915,903 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,616 UART: [cold-reset] ++
1,170,172 UART: [fht] FHT @ 0x50003400
1,172,888 UART: [idev] ++
1,173,056 UART: [idev] CDI.KEYID = 6
1,173,417 UART: [idev] SUBJECT.KEYID = 7
1,173,842 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,198,994 UART: [idev] Sha1 KeyId Algorithm
1,207,728 UART: [idev] --
1,208,959 UART: [ldev] ++
1,209,127 UART: [ldev] CDI.KEYID = 6
1,209,491 UART: [ldev] SUBJECT.KEYID = 5
1,209,918 UART: [ldev] AUTHORITY.KEYID = 7
1,210,381 UART: [ldev] FE.KEYID = 1
1,215,573 UART: [ldev] Erasing FE.KEYID = 1
1,242,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,021 UART: [ldev] --
1,281,439 UART: [fwproc] Wait for Commands...
1,282,036 UART: [fwproc] Recv command 0x46574c44
1,282,769 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,425 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,110 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,688 >>> mbox cmd response: success
2,990,931 UART: [afmc] ++
2,991,099 UART: [afmc] CDI.KEYID = 6
2,991,462 UART: [afmc] SUBJECT.KEYID = 7
2,991,888 UART: [afmc] AUTHORITY.KEYID = 5
3,028,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,608 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,304 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,203 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,896 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,824 UART: [afmc] --
3,071,890 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,912 UART: [cold-reset] --
3,072,852 UART: [state] Locking Datavault
3,073,879 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,483 UART: [state] Locking ICCM
3,075,067 UART: [exit] Launching FMC @ 0x40000000
3,080,364 UART:
3,080,380 UART: Running Caliptra FMC ...
3,080,788 UART:
3,081,018 UART: [fmc] Received command: 0x1000000E
3,426,072 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,038 >>> mbox cmd response: success
2,895,119 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,304 UART:
2,901,320 UART: Running Caliptra FMC ...
2,901,728 UART:
2,901,958 UART: [fmc] Received command: 0x1000000E
3,247,012 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: [kat] ++
895,117 UART: [kat] sha1
899,461 UART: [kat] SHA2-256
901,401 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,308 UART: [kat] LMS
1,168,620 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,117 UART: [fht] FHT @ 0x50003400
1,172,925 UART: [idev] ++
1,173,093 UART: [idev] CDI.KEYID = 6
1,173,454 UART: [idev] SUBJECT.KEYID = 7
1,173,879 UART: [idev] UDS.KEYID = 0
1,181,961 UART: [idev] Erasing UDS.KEYID = 0
1,199,059 UART: [idev] Sha1 KeyId Algorithm
1,207,913 UART: [idev] --
1,208,970 UART: [ldev] ++
1,209,138 UART: [ldev] CDI.KEYID = 6
1,209,502 UART: [ldev] SUBJECT.KEYID = 5
1,209,929 UART: [ldev] AUTHORITY.KEYID = 7
1,210,392 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,242,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,378 UART: [ldev] --
1,281,778 UART: [fwproc] Wait for Commands...
1,282,475 UART: [fwproc] Recv command 0x46574c44
1,283,208 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,228 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,913 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,585 >>> mbox cmd response: success
2,990,690 UART: [afmc] ++
2,990,858 UART: [afmc] CDI.KEYID = 6
2,991,221 UART: [afmc] SUBJECT.KEYID = 7
2,991,647 UART: [afmc] AUTHORITY.KEYID = 5
3,027,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,421 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,117 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,016 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,709 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,499 UART: [afmc] --
3,070,373 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,395 UART: [cold-reset] --
3,071,323 UART: [state] Locking Datavault
3,072,404 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,008 UART: [state] Locking ICCM
3,073,678 UART: [exit] Launching FMC @ 0x40000000
3,078,975 UART:
3,078,991 UART: Running Caliptra FMC ...
3,079,399 UART:
3,079,629 UART: [fmc] Received command: 0x1000000E
3,424,683 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,415 >>> mbox cmd response: success
2,895,756 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,975 UART:
2,901,991 UART: Running Caliptra FMC ...
2,902,399 UART:
2,902,629 UART: [fmc] Received command: 0x1000000E
3,247,683 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,942 UART: [kat] ++
896,094 UART: [kat] sha1
900,424 UART: [kat] SHA2-256
902,364 UART: [kat] SHA2-384
904,961 UART: [kat] SHA2-512-ACC
906,862 UART: [kat] ECC-384
916,895 UART: [kat] HMAC-384Kdf
921,467 UART: [kat] LMS
1,169,779 UART: [kat] --
1,170,610 UART: [cold-reset] ++
1,170,952 UART: [fht] FHT @ 0x50003400
1,173,788 UART: [idev] ++
1,173,956 UART: [idev] CDI.KEYID = 6
1,174,317 UART: [idev] SUBJECT.KEYID = 7
1,174,742 UART: [idev] UDS.KEYID = 0
1,182,590 UART: [idev] Erasing UDS.KEYID = 0
1,199,402 UART: [idev] Sha1 KeyId Algorithm
1,208,306 UART: [idev] --
1,209,227 UART: [ldev] ++
1,209,395 UART: [ldev] CDI.KEYID = 6
1,209,759 UART: [ldev] SUBJECT.KEYID = 5
1,210,186 UART: [ldev] AUTHORITY.KEYID = 7
1,210,649 UART: [ldev] FE.KEYID = 1
1,215,873 UART: [ldev] Erasing FE.KEYID = 1
1,242,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,041 UART: [ldev] --
1,281,559 UART: [fwproc] Wait for Commands...
1,282,352 UART: [fwproc] Recv command 0x46574c44
1,283,085 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,062 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,747 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,385 >>> mbox cmd response: success
2,991,610 UART: [afmc] ++
2,991,778 UART: [afmc] CDI.KEYID = 6
2,992,141 UART: [afmc] SUBJECT.KEYID = 7
2,992,567 UART: [afmc] AUTHORITY.KEYID = 5
3,028,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,665 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,361 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,260 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,953 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,741 UART: [afmc] --
3,071,845 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,867 UART: [cold-reset] --
3,072,745 UART: [state] Locking Datavault
3,073,994 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,598 UART: [state] Locking ICCM
3,075,200 UART: [exit] Launching FMC @ 0x40000000
3,080,497 UART:
3,080,513 UART: Running Caliptra FMC ...
3,080,921 UART:
3,081,151 UART: [fmc] Received command: 0x1000000E
3,426,205 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,188 >>> mbox cmd response: success
2,896,703 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,872 UART:
2,902,888 UART: Running Caliptra FMC ...
2,903,296 UART:
2,903,526 UART: [fmc] Received command: 0x1000000E
3,248,580 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
5,660 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,082 UART:
192,476 UART: Running Caliptra ROM ...
193,625 UART:
193,770 UART: [state] CFI Enabled
264,803 UART: [state] LifecycleState = Unprovisioned
267,170 UART: [state] DebugLocked = No
269,261 UART: [state] WD Timer not started. Device not locked for debugging
274,096 UART: [kat] SHA2-256
455,988 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,531 UART: [kat] ++
468,062 UART: [kat] sha1
478,406 UART: [kat] SHA2-256
481,420 UART: [kat] SHA2-384
487,392 UART: [kat] SHA2-512-ACC
489,999 UART: [kat] ECC-384
3,780,693 UART: [kat] HMAC-384Kdf
3,804,027 UART: [kat] LMS
4,877,178 UART: [kat] --
4,882,580 UART: [cold-reset] ++
4,884,512 UART: [fht] FHT @ 0x50003400
4,895,973 UART: [idev] ++
4,896,693 UART: [idev] CDI.KEYID = 6
4,897,802 UART: [idev] SUBJECT.KEYID = 7
4,899,047 UART: [idev] UDS.KEYID = 0
4,932,449 UART: [idev] Erasing UDS.KEYID = 0
8,244,481 UART: [idev] Sha1 KeyId Algorithm
8,265,499 UART: [idev] --
8,268,978 UART: [ldev] ++
8,269,559 UART: [ldev] CDI.KEYID = 6
8,270,756 UART: [ldev] SUBJECT.KEYID = 5
8,271,854 UART: [ldev] AUTHORITY.KEYID = 7
8,273,144 UART: [ldev] FE.KEYID = 1
8,320,499 UART: [ldev] Erasing FE.KEYID = 1
11,655,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,889 UART: [ldev] --
14,037,943 UART: [fwproc] Wait for Commands...
14,039,406 UART: [fwproc] Recv command 0x46574c44
14,041,343 UART: [fwproc] Recv'd Img size: 114124 bytes
14,107,821 UART: ROM Fatal Error: 0x000B0007
14,111,241 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
5,809 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,871,263 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
6,562 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,411 UART:
192,791 UART: Running Caliptra ROM ...
193,972 UART:
603,666 UART: [state] CFI Enabled
615,009 UART: [state] LifecycleState = Unprovisioned
617,394 UART: [state] DebugLocked = No
618,715 UART: [state] WD Timer not started. Device not locked for debugging
623,684 UART: [kat] SHA2-256
805,628 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,221 UART: [kat] ++
817,738 UART: [kat] sha1
827,098 UART: [kat] SHA2-256
830,109 UART: [kat] SHA2-384
837,429 UART: [kat] SHA2-512-ACC
840,034 UART: [kat] ECC-384
4,094,262 UART: [kat] HMAC-384Kdf
4,105,039 UART: [kat] LMS
5,178,153 UART: [kat] --
5,181,684 UART: [cold-reset] ++
5,184,044 UART: [fht] FHT @ 0x50003400
5,195,236 UART: [idev] ++
5,195,946 UART: [idev] CDI.KEYID = 6
5,197,106 UART: [idev] SUBJECT.KEYID = 7
5,198,586 UART: [idev] UDS.KEYID = 0
5,215,018 UART: [idev] Erasing UDS.KEYID = 0
8,489,384 UART: [idev] Sha1 KeyId Algorithm
8,509,960 UART: [idev] --
8,514,602 UART: [ldev] ++
8,515,166 UART: [ldev] CDI.KEYID = 6
8,516,399 UART: [ldev] SUBJECT.KEYID = 5
8,517,832 UART: [ldev] AUTHORITY.KEYID = 7
8,519,386 UART: [ldev] FE.KEYID = 1
8,530,706 UART: [ldev] Erasing FE.KEYID = 1
11,821,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,037 UART: [ldev] --
14,187,922 UART: [fwproc] Wait for Commands...
14,190,929 UART: [fwproc] Recv command 0x46574c44
14,193,235 UART: [fwproc] Recv'd Img size: 114124 bytes
14,258,099 UART: ROM Fatal Error: 0x000B0007
14,261,522 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
6,312 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,083,500 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
5,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,236 UART:
192,622 UART: Running Caliptra ROM ...
193,790 UART:
193,947 UART: [state] CFI Enabled
263,345 UART: [state] LifecycleState = Unprovisioned
265,253 UART: [state] DebugLocked = No
267,608 UART: [state] WD Timer not started. Device not locked for debugging
271,719 UART: [kat] SHA2-256
450,861 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,474 UART: [kat] ++
463,029 UART: [kat] sha1
473,842 UART: [kat] SHA2-256
476,896 UART: [kat] SHA2-384
482,715 UART: [kat] SHA2-512-ACC
485,652 UART: [kat] ECC-384
2,949,495 UART: [kat] HMAC-384Kdf
2,972,405 UART: [kat] LMS
3,501,864 UART: [kat] --
3,505,812 UART: [cold-reset] ++
3,507,973 UART: [fht] FHT @ 0x50003400
3,517,666 UART: [idev] ++
3,518,265 UART: [idev] CDI.KEYID = 6
3,519,154 UART: [idev] SUBJECT.KEYID = 7
3,520,371 UART: [idev] UDS.KEYID = 0
3,543,718 UART: [idev] Erasing UDS.KEYID = 0
6,022,610 UART: [idev] Sha1 KeyId Algorithm
6,045,816 UART: [idev] --
6,049,337 UART: [ldev] ++
6,049,921 UART: [ldev] CDI.KEYID = 6
6,050,834 UART: [ldev] SUBJECT.KEYID = 5
6,052,000 UART: [ldev] AUTHORITY.KEYID = 7
6,053,244 UART: [ldev] FE.KEYID = 1
6,100,570 UART: [ldev] Erasing FE.KEYID = 1
8,600,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,025 UART: [ldev] --
10,389,888 UART: [fwproc] Wait for Commands...
10,392,402 UART: [fwproc] Recv command 0x46574c44
10,394,509 UART: [fwproc] Recv'd Img size: 114448 bytes
10,458,575 UART: ROM Fatal Error: 0x000B0007
10,461,680 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
5,331 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,283,649 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
6,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,440 UART:
192,849 UART: Running Caliptra ROM ...
193,930 UART:
603,374 UART: [state] CFI Enabled
616,812 UART: [state] LifecycleState = Unprovisioned
618,701 UART: [state] DebugLocked = No
621,043 UART: [state] WD Timer not started. Device not locked for debugging
625,170 UART: [kat] SHA2-256
804,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,900 UART: [kat] ++
816,432 UART: [kat] sha1
827,136 UART: [kat] SHA2-256
830,134 UART: [kat] SHA2-384
836,431 UART: [kat] SHA2-512-ACC
839,356 UART: [kat] ECC-384
3,277,569 UART: [kat] HMAC-384Kdf
3,289,305 UART: [kat] LMS
3,818,774 UART: [kat] --
3,825,194 UART: [cold-reset] ++
3,827,121 UART: [fht] FHT @ 0x50003400
3,838,039 UART: [idev] ++
3,838,614 UART: [idev] CDI.KEYID = 6
3,839,523 UART: [idev] SUBJECT.KEYID = 7
3,840,735 UART: [idev] UDS.KEYID = 0
3,858,113 UART: [idev] Erasing UDS.KEYID = 0
6,312,746 UART: [idev] Sha1 KeyId Algorithm
6,334,509 UART: [idev] --
6,339,747 UART: [ldev] ++
6,340,312 UART: [ldev] CDI.KEYID = 6
6,341,187 UART: [ldev] SUBJECT.KEYID = 5
6,342,396 UART: [ldev] AUTHORITY.KEYID = 7
6,343,685 UART: [ldev] FE.KEYID = 1
6,354,192 UART: [ldev] Erasing FE.KEYID = 1
8,831,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,869 UART: [ldev] --
10,624,376 UART: [fwproc] Wait for Commands...
10,627,500 UART: [fwproc] Recv command 0x46574c44
10,629,597 UART: [fwproc] Recv'd Img size: 114448 bytes
10,694,018 UART: ROM Fatal Error: 0x000B0007
10,697,113 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
6,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,480,438 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
5,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,261,629 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
6,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,478,131 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,398 UART: [kat] SHA2-512-ACC
906,299 UART: [kat] ECC-384
916,394 UART: [kat] HMAC-384Kdf
921,046 UART: [kat] LMS
1,169,358 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,279 UART: [idev] ++
1,173,447 UART: [idev] CDI.KEYID = 6
1,173,808 UART: [idev] SUBJECT.KEYID = 7
1,174,233 UART: [idev] UDS.KEYID = 0
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,198,581 UART: [idev] Sha1 KeyId Algorithm
1,207,569 UART: [idev] --
1,208,560 UART: [ldev] ++
1,208,728 UART: [ldev] CDI.KEYID = 6
1,209,092 UART: [ldev] SUBJECT.KEYID = 5
1,209,519 UART: [ldev] AUTHORITY.KEYID = 7
1,209,982 UART: [ldev] FE.KEYID = 1
1,215,154 UART: [ldev] Erasing FE.KEYID = 1
1,241,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,674 UART: [ldev] --
1,281,014 UART: [fwproc] Wait for Commands...
1,281,729 UART: [fwproc] Recv command 0x46574c44
1,282,462 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,309 UART: ROM Fatal Error: 0x000B0007
1,307,466 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,158,643 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,905 UART: [state] LifecycleState = Unprovisioned
86,560 UART: [state] DebugLocked = No
87,172 UART: [state] WD Timer not started. Device not locked for debugging
88,501 UART: [kat] SHA2-256
892,051 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,180 UART: [kat] ++
896,332 UART: [kat] sha1
900,634 UART: [kat] SHA2-256
902,574 UART: [kat] SHA2-384
905,285 UART: [kat] SHA2-512-ACC
907,186 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,547 UART: [kat] LMS
1,169,859 UART: [kat] --
1,170,794 UART: [cold-reset] ++
1,171,358 UART: [fht] FHT @ 0x50003400
1,174,102 UART: [idev] ++
1,174,270 UART: [idev] CDI.KEYID = 6
1,174,631 UART: [idev] SUBJECT.KEYID = 7
1,175,056 UART: [idev] UDS.KEYID = 0
1,183,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,486 UART: [idev] Sha1 KeyId Algorithm
1,208,462 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,216,347 UART: [ldev] Erasing FE.KEYID = 1
1,243,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,161 UART: [ldev] --
1,282,431 UART: [fwproc] Wait for Commands...
1,283,112 UART: [fwproc] Recv command 0x46574c44
1,283,845 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,764 UART: ROM Fatal Error: 0x000B0007
1,308,921 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,800 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,220 UART: [kat] SHA2-512-ACC
906,121 UART: [kat] ECC-384
915,794 UART: [kat] HMAC-384Kdf
920,310 UART: [kat] LMS
1,168,622 UART: [kat] --
1,169,615 UART: [cold-reset] ++
1,170,137 UART: [fht] FHT @ 0x50003400
1,172,767 UART: [idev] ++
1,172,935 UART: [idev] CDI.KEYID = 6
1,173,296 UART: [idev] SUBJECT.KEYID = 7
1,173,721 UART: [idev] UDS.KEYID = 0
1,181,891 UART: [idev] Erasing UDS.KEYID = 0
1,198,617 UART: [idev] Sha1 KeyId Algorithm
1,207,255 UART: [idev] --
1,208,168 UART: [ldev] ++
1,208,336 UART: [ldev] CDI.KEYID = 6
1,208,700 UART: [ldev] SUBJECT.KEYID = 5
1,209,127 UART: [ldev] AUTHORITY.KEYID = 7
1,209,590 UART: [ldev] FE.KEYID = 1
1,214,898 UART: [ldev] Erasing FE.KEYID = 1
1,241,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,900 UART: [ldev] --
1,280,212 UART: [fwproc] Wait for Commands...
1,280,817 UART: [fwproc] Recv command 0x46574c44
1,281,550 UART: [fwproc] Recv'd Img size: 114448 bytes
1,305,125 UART: ROM Fatal Error: 0x000B0007
1,306,282 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,158,843 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
891,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
915,947 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,172,942 UART: [idev] ++
1,173,110 UART: [idev] CDI.KEYID = 6
1,173,471 UART: [idev] SUBJECT.KEYID = 7
1,173,896 UART: [idev] UDS.KEYID = 0
1,181,762 UART: [idev] Erasing UDS.KEYID = 0
1,198,552 UART: [idev] Sha1 KeyId Algorithm
1,207,504 UART: [idev] --
1,208,517 UART: [ldev] ++
1,208,685 UART: [ldev] CDI.KEYID = 6
1,209,049 UART: [ldev] SUBJECT.KEYID = 5
1,209,476 UART: [ldev] AUTHORITY.KEYID = 7
1,209,939 UART: [ldev] FE.KEYID = 1
1,215,383 UART: [ldev] Erasing FE.KEYID = 1
1,241,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,799 UART: [ldev] --
1,281,267 UART: [fwproc] Wait for Commands...
1,281,916 UART: [fwproc] Recv command 0x46574c44
1,282,649 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,032 UART: ROM Fatal Error: 0x000B0007
1,307,189 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,736 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = No
86,863 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
891,528 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,170,067 UART: [cold-reset] ++
1,170,627 UART: [fht] FHT @ 0x50003400
1,173,197 UART: [idev] ++
1,173,365 UART: [idev] CDI.KEYID = 6
1,173,726 UART: [idev] SUBJECT.KEYID = 7
1,174,151 UART: [idev] UDS.KEYID = 0
1,182,187 UART: [idev] Erasing UDS.KEYID = 0
1,198,817 UART: [idev] Sha1 KeyId Algorithm
1,207,573 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,230 UART: [ldev] --
1,280,582 UART: [fwproc] Wait for Commands...
1,281,339 UART: [fwproc] Recv command 0x46574c44
1,282,072 UART: [fwproc] Recv'd Img size: 114448 bytes
1,305,725 UART: ROM Fatal Error: 0x000B0007
1,306,882 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,479 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
1,182,624 UART: [idev] Erasing UDS.KEYID = 0
1,199,900 UART: [idev] Sha1 KeyId Algorithm
1,208,656 UART: [idev] --
1,209,531 UART: [ldev] ++
1,209,699 UART: [ldev] CDI.KEYID = 6
1,210,063 UART: [ldev] SUBJECT.KEYID = 5
1,210,490 UART: [ldev] AUTHORITY.KEYID = 7
1,210,953 UART: [ldev] FE.KEYID = 1
1,216,337 UART: [ldev] Erasing FE.KEYID = 1
1,242,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,205 UART: [ldev] --
1,281,691 UART: [fwproc] Wait for Commands...
1,282,270 UART: [fwproc] Recv command 0x46574c44
1,283,003 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,082 UART: ROM Fatal Error: 0x000B0007
1,308,239 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,728 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
5,764 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,264 UART:
192,634 UART: Running Caliptra ROM ...
193,820 UART:
193,971 UART: [state] CFI Enabled
261,396 UART: [state] LifecycleState = Unprovisioned
263,839 UART: [state] DebugLocked = No
265,274 UART: [state] WD Timer not started. Device not locked for debugging
270,276 UART: [kat] SHA2-256
452,219 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,720 UART: [kat] ++
464,281 UART: [kat] sha1
475,210 UART: [kat] SHA2-256
478,200 UART: [kat] SHA2-384
484,831 UART: [kat] SHA2-512-ACC
487,450 UART: [kat] ECC-384
3,776,429 UART: [kat] HMAC-384Kdf
3,802,251 UART: [kat] LMS
4,875,404 UART: [kat] --
4,878,539 UART: [cold-reset] ++
4,880,753 UART: [fht] FHT @ 0x50003400
4,890,715 UART: [idev] ++
4,891,391 UART: [idev] CDI.KEYID = 6
4,892,626 UART: [idev] SUBJECT.KEYID = 7
4,893,724 UART: [idev] UDS.KEYID = 0
4,930,109 UART: [idev] Erasing UDS.KEYID = 0
8,241,049 UART: [idev] Sha1 KeyId Algorithm
8,261,977 UART: [idev] --
8,265,485 UART: [ldev] ++
8,266,107 UART: [ldev] CDI.KEYID = 6
8,267,290 UART: [ldev] SUBJECT.KEYID = 5
8,268,449 UART: [ldev] AUTHORITY.KEYID = 7
8,269,677 UART: [ldev] FE.KEYID = 1
8,296,525 UART: [ldev] Erasing FE.KEYID = 1
11,635,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,993,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,014,417 UART: [ldev] --
14,019,153 UART: [fwproc] Wait for Commands...
14,021,847 UART: [fwproc] Recv command 0x46574c44
14,024,125 UART: [fwproc] Recv'd Img size: 114124 bytes
14,098,132 UART: ROM Fatal Error: 0x000B0008
14,101,555 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
5,303 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,883,456 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
6,475 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,468 UART:
192,932 UART: Running Caliptra ROM ...
194,058 UART:
603,733 UART: [state] CFI Enabled
619,455 UART: [state] LifecycleState = Unprovisioned
621,831 UART: [state] DebugLocked = No
623,826 UART: [state] WD Timer not started. Device not locked for debugging
628,897 UART: [kat] SHA2-256
810,875 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,417 UART: [kat] ++
822,922 UART: [kat] sha1
832,933 UART: [kat] SHA2-256
835,995 UART: [kat] SHA2-384
841,650 UART: [kat] SHA2-512-ACC
844,290 UART: [kat] ECC-384
4,098,569 UART: [kat] HMAC-384Kdf
4,109,977 UART: [kat] LMS
5,183,115 UART: [kat] --
5,186,307 UART: [cold-reset] ++
5,188,620 UART: [fht] FHT @ 0x50003400
5,198,895 UART: [idev] ++
5,199,576 UART: [idev] CDI.KEYID = 6
5,200,810 UART: [idev] SUBJECT.KEYID = 7
5,202,243 UART: [idev] UDS.KEYID = 0
5,215,467 UART: [idev] Erasing UDS.KEYID = 0
8,488,366 UART: [idev] Sha1 KeyId Algorithm
8,509,869 UART: [idev] --
8,514,611 UART: [ldev] ++
8,515,231 UART: [ldev] CDI.KEYID = 6
8,516,413 UART: [ldev] SUBJECT.KEYID = 5
8,517,867 UART: [ldev] AUTHORITY.KEYID = 7
8,519,429 UART: [ldev] FE.KEYID = 1
8,531,206 UART: [ldev] Erasing FE.KEYID = 1
11,822,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,201 UART: [ldev] --
14,186,057 UART: [fwproc] Wait for Commands...
14,187,774 UART: [fwproc] Recv command 0x46574c44
14,190,095 UART: [fwproc] Recv'd Img size: 114124 bytes
14,265,369 UART: ROM Fatal Error: 0x000B0008
14,268,789 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
5,984 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,077,892 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
5,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,004 UART:
192,591 UART: Running Caliptra ROM ...
193,706 UART:
193,860 UART: [state] CFI Enabled
268,578 UART: [state] LifecycleState = Unprovisioned
270,459 UART: [state] DebugLocked = No
272,733 UART: [state] WD Timer not started. Device not locked for debugging
276,266 UART: [kat] SHA2-256
455,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,986 UART: [kat] ++
467,529 UART: [kat] sha1
477,923 UART: [kat] SHA2-256
480,954 UART: [kat] SHA2-384
485,688 UART: [kat] SHA2-512-ACC
488,621 UART: [kat] ECC-384
2,951,250 UART: [kat] HMAC-384Kdf
2,974,349 UART: [kat] LMS
3,503,769 UART: [kat] --
3,507,919 UART: [cold-reset] ++
3,509,523 UART: [fht] FHT @ 0x50003400
3,520,340 UART: [idev] ++
3,520,912 UART: [idev] CDI.KEYID = 6
3,521,816 UART: [idev] SUBJECT.KEYID = 7
3,523,034 UART: [idev] UDS.KEYID = 0
3,546,358 UART: [idev] Erasing UDS.KEYID = 0
6,032,304 UART: [idev] Sha1 KeyId Algorithm
6,054,782 UART: [idev] --
6,057,969 UART: [ldev] ++
6,058,563 UART: [ldev] CDI.KEYID = 6
6,059,475 UART: [ldev] SUBJECT.KEYID = 5
6,060,641 UART: [ldev] AUTHORITY.KEYID = 7
6,061,931 UART: [ldev] FE.KEYID = 1
6,102,509 UART: [ldev] Erasing FE.KEYID = 1
8,605,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,082 UART: [ldev] --
10,397,027 UART: [fwproc] Wait for Commands...
10,400,214 UART: [fwproc] Recv command 0x46574c44
10,402,309 UART: [fwproc] Recv'd Img size: 114448 bytes
10,472,784 UART: ROM Fatal Error: 0x000B0008
10,475,929 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
5,581 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,260,133 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
6,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,583 UART:
192,967 UART: Running Caliptra ROM ...
194,128 UART:
603,679 UART: [state] CFI Enabled
615,198 UART: [state] LifecycleState = Unprovisioned
617,023 UART: [state] DebugLocked = No
619,762 UART: [state] WD Timer not started. Device not locked for debugging
623,551 UART: [kat] SHA2-256
802,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,260 UART: [kat] ++
814,795 UART: [kat] sha1
825,514 UART: [kat] SHA2-256
828,575 UART: [kat] SHA2-384
833,789 UART: [kat] SHA2-512-ACC
836,774 UART: [kat] ECC-384
3,279,866 UART: [kat] HMAC-384Kdf
3,293,130 UART: [kat] LMS
3,822,633 UART: [kat] --
3,828,341 UART: [cold-reset] ++
3,830,050 UART: [fht] FHT @ 0x50003400
3,840,667 UART: [idev] ++
3,841,244 UART: [idev] CDI.KEYID = 6
3,842,259 UART: [idev] SUBJECT.KEYID = 7
3,843,357 UART: [idev] UDS.KEYID = 0
3,859,998 UART: [idev] Erasing UDS.KEYID = 0
6,317,394 UART: [idev] Sha1 KeyId Algorithm
6,340,543 UART: [idev] --
6,344,642 UART: [ldev] ++
6,345,208 UART: [ldev] CDI.KEYID = 6
6,346,125 UART: [ldev] SUBJECT.KEYID = 5
6,347,339 UART: [ldev] AUTHORITY.KEYID = 7
6,348,568 UART: [ldev] FE.KEYID = 1
6,360,649 UART: [ldev] Erasing FE.KEYID = 1
8,830,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,761 UART: [ldev] --
10,619,300 UART: [fwproc] Wait for Commands...
10,621,146 UART: [fwproc] Recv command 0x46574c44
10,623,242 UART: [fwproc] Recv'd Img size: 114448 bytes
10,695,544 UART: ROM Fatal Error: 0x000B0008
10,698,668 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
6,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,490,629 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
5,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,273,063 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
6,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,485,119 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,754 UART: [state] LifecycleState = Unprovisioned
85,409 UART: [state] DebugLocked = No
86,017 UART: [state] WD Timer not started. Device not locked for debugging
87,164 UART: [kat] SHA2-256
890,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,843 UART: [kat] ++
894,995 UART: [kat] sha1
899,041 UART: [kat] SHA2-256
900,981 UART: [kat] SHA2-384
903,770 UART: [kat] SHA2-512-ACC
905,671 UART: [kat] ECC-384
915,126 UART: [kat] HMAC-384Kdf
919,732 UART: [kat] LMS
1,168,044 UART: [kat] --
1,168,807 UART: [cold-reset] ++
1,169,217 UART: [fht] FHT @ 0x50003400
1,171,825 UART: [idev] ++
1,171,993 UART: [idev] CDI.KEYID = 6
1,172,354 UART: [idev] SUBJECT.KEYID = 7
1,172,779 UART: [idev] UDS.KEYID = 0
1,180,257 UART: [idev] Erasing UDS.KEYID = 0
1,197,105 UART: [idev] Sha1 KeyId Algorithm
1,205,855 UART: [idev] --
1,206,896 UART: [ldev] ++
1,207,064 UART: [ldev] CDI.KEYID = 6
1,207,428 UART: [ldev] SUBJECT.KEYID = 5
1,207,855 UART: [ldev] AUTHORITY.KEYID = 7
1,208,318 UART: [ldev] FE.KEYID = 1
1,213,858 UART: [ldev] Erasing FE.KEYID = 1
1,240,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,924 UART: [ldev] --
1,279,442 UART: [fwproc] Wait for Commands...
1,280,253 UART: [fwproc] Recv command 0x46574c44
1,280,986 UART: [fwproc] Recv'd Img size: 114448 bytes
1,305,770 UART: ROM Fatal Error: 0x000B0008
1,306,927 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,158,534 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,793 UART: [kat] LMS
1,169,105 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,504 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,182,142 UART: [idev] Erasing UDS.KEYID = 0
1,199,198 UART: [idev] Sha1 KeyId Algorithm
1,208,056 UART: [idev] --
1,209,211 UART: [ldev] ++
1,209,379 UART: [ldev] CDI.KEYID = 6
1,209,743 UART: [ldev] SUBJECT.KEYID = 5
1,210,170 UART: [ldev] AUTHORITY.KEYID = 7
1,210,633 UART: [ldev] FE.KEYID = 1
1,216,079 UART: [ldev] Erasing FE.KEYID = 1
1,242,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,371 UART: [fwproc] Wait for Commands...
1,282,984 UART: [fwproc] Recv command 0x46574c44
1,283,717 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,443 UART: ROM Fatal Error: 0x000B0008
1,309,600 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,691 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
915,548 UART: [kat] HMAC-384Kdf
920,154 UART: [kat] LMS
1,168,466 UART: [kat] --
1,169,363 UART: [cold-reset] ++
1,169,927 UART: [fht] FHT @ 0x50003400
1,172,583 UART: [idev] ++
1,172,751 UART: [idev] CDI.KEYID = 6
1,173,112 UART: [idev] SUBJECT.KEYID = 7
1,173,537 UART: [idev] UDS.KEYID = 0
1,181,295 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,545 UART: [idev] --
1,208,788 UART: [ldev] ++
1,208,956 UART: [ldev] CDI.KEYID = 6
1,209,320 UART: [ldev] SUBJECT.KEYID = 5
1,209,747 UART: [ldev] AUTHORITY.KEYID = 7
1,210,210 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,242,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,598 UART: [ldev] --
1,281,116 UART: [fwproc] Wait for Commands...
1,281,817 UART: [fwproc] Recv command 0x46574c44
1,282,550 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,074 UART: ROM Fatal Error: 0x000B0008
1,308,231 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,990 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,916 UART: [kat] ++
896,068 UART: [kat] sha1
900,394 UART: [kat] SHA2-256
902,334 UART: [kat] SHA2-384
904,837 UART: [kat] SHA2-512-ACC
906,738 UART: [kat] ECC-384
916,833 UART: [kat] HMAC-384Kdf
921,489 UART: [kat] LMS
1,169,801 UART: [kat] --
1,170,746 UART: [cold-reset] ++
1,171,266 UART: [fht] FHT @ 0x50003400
1,174,076 UART: [idev] ++
1,174,244 UART: [idev] CDI.KEYID = 6
1,174,605 UART: [idev] SUBJECT.KEYID = 7
1,175,030 UART: [idev] UDS.KEYID = 0
1,182,844 UART: [idev] Erasing UDS.KEYID = 0
1,199,818 UART: [idev] Sha1 KeyId Algorithm
1,208,696 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,475 UART: [ldev] Erasing FE.KEYID = 1
1,243,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,787 UART: [ldev] --
1,283,113 UART: [fwproc] Wait for Commands...
1,283,878 UART: [fwproc] Recv command 0x46574c44
1,284,611 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,835 UART: ROM Fatal Error: 0x000B0008
1,310,992 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,315 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,340 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,427 UART: [cold-reset] ++
1,170,917 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,198,871 UART: [idev] Sha1 KeyId Algorithm
1,207,689 UART: [idev] --
1,208,776 UART: [ldev] ++
1,208,944 UART: [ldev] CDI.KEYID = 6
1,209,308 UART: [ldev] SUBJECT.KEYID = 5
1,209,735 UART: [ldev] AUTHORITY.KEYID = 7
1,210,198 UART: [ldev] FE.KEYID = 1
1,215,696 UART: [ldev] Erasing FE.KEYID = 1
1,241,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,762 UART: [ldev] --
1,281,262 UART: [fwproc] Wait for Commands...
1,282,023 UART: [fwproc] Recv command 0x46574c44
1,282,756 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,740 UART: ROM Fatal Error: 0x000B0008
1,308,897 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,338 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,160 UART: [state] WD Timer not started. Device not locked for debugging
88,475 UART: [kat] SHA2-256
892,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,154 UART: [kat] ++
896,306 UART: [kat] sha1
900,398 UART: [kat] SHA2-256
902,338 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,341 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,270 UART: [cold-reset] ++
1,170,602 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,198,778 UART: [idev] Sha1 KeyId Algorithm
1,207,758 UART: [idev] --
1,208,849 UART: [ldev] ++
1,209,017 UART: [ldev] CDI.KEYID = 6
1,209,381 UART: [ldev] SUBJECT.KEYID = 5
1,209,808 UART: [ldev] AUTHORITY.KEYID = 7
1,210,271 UART: [ldev] FE.KEYID = 1
1,215,707 UART: [ldev] Erasing FE.KEYID = 1
1,241,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,809 UART: [ldev] --
1,281,255 UART: [fwproc] Wait for Commands...
1,281,998 UART: [fwproc] Recv command 0x46574c44
1,282,731 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,459 UART: ROM Fatal Error: 0x000B0008
1,308,616 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,757 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
2,218,209 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,363,532 UART:
2,364,171 UART: Running Caliptra ROM ...
2,365,268 UART:
2,365,437 UART: [state] CFI Enabled
2,366,314 UART: [state] LifecycleState = Unprovisioned
2,368,020 UART: [state] DebugLocked = No
2,369,141 UART: [state] WD Timer not started. Device not locked for debugging
2,371,627 UART: [kat] SHA2-256
2,372,296 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,375,328 UART: [kat] ++
2,375,778 UART: [kat] sha1
2,376,288 UART: [kat] SHA2-256
2,376,949 UART: [kat] SHA2-384
2,377,606 UART: [kat] SHA2-512-ACC
2,378,434 UART: [kat] ECC-384
3,774,504 UART: [kat] HMAC-384Kdf
3,800,912 UART: [kat] LMS
4,874,045 UART: [kat] --
4,877,631 UART: [cold-reset] ++
4,878,699 UART: [fht] FHT @ 0x50003400
4,890,197 UART: [idev] ++
4,890,910 UART: [idev] CDI.KEYID = 6
4,892,015 UART: [idev] SUBJECT.KEYID = 7
4,893,234 UART: [idev] UDS.KEYID = 0
4,928,563 UART: [idev] Erasing UDS.KEYID = 0
8,243,636 UART: [idev] Sha1 KeyId Algorithm
8,264,751 UART: [idev] --
8,267,144 UART: [ldev] ++
8,267,721 UART: [ldev] CDI.KEYID = 6
8,268,826 UART: [ldev] SUBJECT.KEYID = 5
8,270,011 UART: [ldev] AUTHORITY.KEYID = 7
8,271,302 UART: [ldev] FE.KEYID = 1
8,316,888 UART: [ldev] Erasing FE.KEYID = 1
11,651,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,886 UART: [ldev] --
14,036,503 UART: [fwproc] Wait for Commands...
14,038,282 UART: [fwproc] Recv command 0x46574c44
14,040,548 UART: [fwproc] Recv'd Img size: 114124 bytes
14,111,703 UART: ROM Fatal Error: 0x000B0009
14,115,126 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
2,055,133 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,199,218 UART:
2,199,621 UART: Running Caliptra ROM ...
2,200,702 UART:
2,200,855 UART: [state] CFI Enabled
2,201,820 UART: [state] LifecycleState = Unprovisioned
2,203,485 UART: [state] DebugLocked = No
2,204,509 UART: [state] WD Timer not started. Device not locked for debugging
2,206,971 UART: [kat] SHA2-256
2,207,637 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,656 UART: [kat] ++
2,211,109 UART: [kat] sha1
2,211,620 UART: [kat] SHA2-256
2,212,359 UART: [kat] SHA2-384
2,213,024 UART: [kat] SHA2-512-ACC
2,213,828 UART: [kat] ECC-384
3,775,039 UART: [kat] HMAC-384Kdf
3,801,385 UART: [kat] LMS
4,874,496 UART: [kat] --
4,878,493 UART: [cold-reset] ++
4,880,642 UART: [fht] FHT @ 0x50003400
4,891,308 UART: [idev] ++
4,891,982 UART: [idev] CDI.KEYID = 6
4,893,211 UART: [idev] SUBJECT.KEYID = 7
4,894,308 UART: [idev] UDS.KEYID = 0
4,930,365 UART: [idev] Erasing UDS.KEYID = 0
8,245,219 UART: [idev] Sha1 KeyId Algorithm
8,268,024 UART: [idev] --
8,271,211 UART: [ldev] ++
8,271,779 UART: [ldev] CDI.KEYID = 6
8,273,018 UART: [ldev] SUBJECT.KEYID = 5
8,274,191 UART: [ldev] AUTHORITY.KEYID = 7
8,275,343 UART: [ldev] FE.KEYID = 1
8,317,674 UART: [ldev] Erasing FE.KEYID = 1
11,648,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,491 UART: [ldev] --
14,037,750 UART: [fwproc] Wait for Commands...
14,040,276 UART: [fwproc] Recv command 0x46574c44
14,042,608 UART: [fwproc] Recv'd Img size: 114124 bytes
14,110,942 UART: ROM Fatal Error: 0x000B0009
14,114,364 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
2,052,733 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,196,714 UART:
2,197,131 UART: Running Caliptra ROM ...
2,198,215 UART:
2,198,368 UART: [state] CFI Enabled
2,199,380 UART: [state] LifecycleState = Unprovisioned
2,201,027 UART: [state] DebugLocked = No
2,202,054 UART: [state] WD Timer not started. Device not locked for debugging
2,204,533 UART: [kat] SHA2-256
2,205,196 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,439 UART: [kat] ++
2,208,900 UART: [kat] sha1
2,209,407 UART: [kat] SHA2-256
2,210,062 UART: [kat] SHA2-384
2,210,719 UART: [kat] SHA2-512-ACC
2,211,520 UART: [kat] ECC-384
3,776,557 UART: [kat] HMAC-384Kdf
3,802,179 UART: [kat] LMS
4,875,305 UART: [kat] --
4,880,744 UART: [cold-reset] ++
4,882,354 UART: [fht] FHT @ 0x50003400
4,893,784 UART: [idev] ++
4,894,468 UART: [idev] CDI.KEYID = 6
4,895,648 UART: [idev] SUBJECT.KEYID = 7
4,896,803 UART: [idev] UDS.KEYID = 0
4,930,186 UART: [idev] Erasing UDS.KEYID = 0
8,242,774 UART: [idev] Sha1 KeyId Algorithm
8,263,902 UART: [idev] --
8,267,673 UART: [ldev] ++
8,268,241 UART: [ldev] CDI.KEYID = 6
8,269,476 UART: [ldev] SUBJECT.KEYID = 5
8,270,642 UART: [ldev] AUTHORITY.KEYID = 7
8,271,737 UART: [ldev] FE.KEYID = 1
8,316,934 UART: [ldev] Erasing FE.KEYID = 1
11,655,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,082 UART: [ldev] --
14,038,247 UART: [fwproc] Wait for Commands...
14,040,504 UART: [fwproc] Recv command 0x46574c44
14,042,770 UART: [fwproc] Recv'd Img size: 114124 bytes
14,116,539 UART: ROM Fatal Error: 0x000B0009
14,119,953 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,050,637 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,194,808 UART:
2,195,212 UART: Running Caliptra ROM ...
2,196,292 UART:
2,196,443 UART: [state] CFI Enabled
2,197,426 UART: [state] LifecycleState = Unprovisioned
2,199,070 UART: [state] DebugLocked = No
2,200,094 UART: [state] WD Timer not started. Device not locked for debugging
2,202,554 UART: [kat] SHA2-256
2,203,216 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,221 UART: [kat] ++
2,206,665 UART: [kat] sha1
2,207,168 UART: [kat] SHA2-256
2,207,826 UART: [kat] SHA2-384
2,208,481 UART: [kat] SHA2-512-ACC
2,209,280 UART: [kat] ECC-384
3,776,405 UART: [kat] HMAC-384Kdf
3,800,376 UART: [kat] LMS
4,873,550 UART: [kat] --
4,876,920 UART: [cold-reset] ++
4,878,752 UART: [fht] FHT @ 0x50003400
4,890,705 UART: [idev] ++
4,891,377 UART: [idev] CDI.KEYID = 6
4,892,538 UART: [idev] SUBJECT.KEYID = 7
4,893,745 UART: [idev] UDS.KEYID = 0
4,927,070 UART: [idev] Erasing UDS.KEYID = 0
8,239,192 UART: [idev] Sha1 KeyId Algorithm
8,261,439 UART: [idev] --
8,265,354 UART: [ldev] ++
8,265,931 UART: [ldev] CDI.KEYID = 6
8,267,112 UART: [ldev] SUBJECT.KEYID = 5
8,268,266 UART: [ldev] AUTHORITY.KEYID = 7
8,269,515 UART: [ldev] FE.KEYID = 1
8,316,191 UART: [ldev] Erasing FE.KEYID = 1
11,649,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,057 UART: [ldev] --
14,036,337 UART: [fwproc] Wait for Commands...
14,037,846 UART: [fwproc] Recv command 0x46574c44
14,040,163 UART: [fwproc] Recv'd Img size: 114124 bytes
18,112,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,188,036 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,256,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,574,128 >>> mbox cmd response: success
18,577,696 UART: [afmc] ++
18,578,412 UART: [afmc] CDI.KEYID = 6
18,579,692 UART: [afmc] SUBJECT.KEYID = 7
18,580,729 UART: [afmc] AUTHORITY.KEYID = 5
21,945,483 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,244,722 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,246,638 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,262,821 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,278,856 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,294,713 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,316,047 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
2,217,775 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,919,360 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,056,865 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,896,591 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,051,363 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,921,407 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,050,877 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,364,896 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,225,374 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,369,944 UART:
2,370,348 UART: Running Caliptra ROM ...
2,371,531 UART:
2,371,717 UART: [state] CFI Enabled
2,372,677 UART: [state] LifecycleState = Unprovisioned
2,374,348 UART: [state] DebugLocked = No
2,375,452 UART: [state] WD Timer not started. Device not locked for debugging
2,377,923 UART: [kat] SHA2-256
2,378,584 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,381,598 UART: [kat] ++
2,382,046 UART: [kat] sha1
2,382,556 UART: [kat] SHA2-256
2,383,243 UART: [kat] SHA2-384
2,383,921 UART: [kat] SHA2-512-ACC
2,384,804 UART: [kat] ECC-384
4,094,543 UART: [kat] HMAC-384Kdf
4,107,916 UART: [kat] LMS
5,181,067 UART: [kat] --
5,186,984 UART: [cold-reset] ++
5,189,354 UART: [fht] FHT @ 0x50003400
5,200,710 UART: [idev] ++
5,201,453 UART: [idev] CDI.KEYID = 6
5,202,631 UART: [idev] SUBJECT.KEYID = 7
5,204,064 UART: [idev] UDS.KEYID = 0
5,222,185 UART: [idev] Erasing UDS.KEYID = 0
8,496,440 UART: [idev] Sha1 KeyId Algorithm
8,518,247 UART: [idev] --
8,522,145 UART: [ldev] ++
8,522,712 UART: [ldev] CDI.KEYID = 6
8,523,948 UART: [ldev] SUBJECT.KEYID = 5
8,525,431 UART: [ldev] AUTHORITY.KEYID = 7
8,526,982 UART: [ldev] FE.KEYID = 1
8,538,865 UART: [ldev] Erasing FE.KEYID = 1
11,832,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,256 UART: [ldev] --
14,198,681 UART: [fwproc] Wait for Commands...
14,201,421 UART: [fwproc] Recv command 0x46574c44
14,203,730 UART: [fwproc] Recv'd Img size: 114124 bytes
14,276,421 UART: ROM Fatal Error: 0x000B0009
14,279,839 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
2,063,593 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,207,607 UART:
2,208,036 UART: Running Caliptra ROM ...
2,209,176 UART:
2,209,336 UART: [state] CFI Enabled
2,210,302 UART: [state] LifecycleState = Unprovisioned
2,211,957 UART: [state] DebugLocked = No
2,213,060 UART: [state] WD Timer not started. Device not locked for debugging
2,215,539 UART: [kat] SHA2-256
2,216,200 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,219,425 UART: [kat] ++
2,219,890 UART: [kat] sha1
2,220,400 UART: [kat] SHA2-256
2,221,139 UART: [kat] SHA2-384
2,221,800 UART: [kat] SHA2-512-ACC
2,222,642 UART: [kat] ECC-384
4,096,559 UART: [kat] HMAC-384Kdf
4,108,912 UART: [kat] LMS
5,182,045 UART: [kat] --
5,185,639 UART: [cold-reset] ++
5,187,357 UART: [fht] FHT @ 0x50003400
5,198,231 UART: [idev] ++
5,198,895 UART: [idev] CDI.KEYID = 6
5,200,051 UART: [idev] SUBJECT.KEYID = 7
5,201,531 UART: [idev] UDS.KEYID = 0
5,217,856 UART: [idev] Erasing UDS.KEYID = 0
8,491,342 UART: [idev] Sha1 KeyId Algorithm
8,512,784 UART: [idev] --
8,518,221 UART: [ldev] ++
8,518,790 UART: [ldev] CDI.KEYID = 6
8,520,023 UART: [ldev] SUBJECT.KEYID = 5
8,521,474 UART: [ldev] AUTHORITY.KEYID = 7
8,523,031 UART: [ldev] FE.KEYID = 1
8,533,624 UART: [ldev] Erasing FE.KEYID = 1
11,820,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,572 UART: [ldev] --
14,186,188 UART: [fwproc] Wait for Commands...
14,189,085 UART: [fwproc] Recv command 0x46574c44
14,191,397 UART: [fwproc] Recv'd Img size: 114124 bytes
14,262,784 UART: ROM Fatal Error: 0x000B0009
14,266,207 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,060,058 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,203,979 UART:
2,204,552 UART: Running Caliptra ROM ...
2,205,629 UART:
2,205,776 UART: [state] CFI Enabled
2,206,751 UART: [state] LifecycleState = Unprovisioned
2,208,391 UART: [state] DebugLocked = No
2,209,415 UART: [state] WD Timer not started. Device not locked for debugging
2,211,870 UART: [kat] SHA2-256
2,212,528 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,215,551 UART: [kat] ++
2,215,994 UART: [kat] sha1
2,216,496 UART: [kat] SHA2-256
2,217,145 UART: [kat] SHA2-384
2,217,794 UART: [kat] SHA2-512-ACC
2,218,625 UART: [kat] ECC-384
4,096,151 UART: [kat] HMAC-384Kdf
4,107,698 UART: [kat] LMS
5,180,874 UART: [kat] --
5,186,618 UART: [cold-reset] ++
5,188,123 UART: [fht] FHT @ 0x50003400
5,200,179 UART: [idev] ++
5,200,847 UART: [idev] CDI.KEYID = 6
5,202,000 UART: [idev] SUBJECT.KEYID = 7
5,203,535 UART: [idev] UDS.KEYID = 0
5,219,587 UART: [idev] Erasing UDS.KEYID = 0
8,492,936 UART: [idev] Sha1 KeyId Algorithm
8,514,708 UART: [idev] --
8,519,137 UART: [ldev] ++
8,519,701 UART: [ldev] CDI.KEYID = 6
8,520,857 UART: [ldev] SUBJECT.KEYID = 5
8,522,391 UART: [ldev] AUTHORITY.KEYID = 7
8,523,869 UART: [ldev] FE.KEYID = 1
8,533,914 UART: [ldev] Erasing FE.KEYID = 1
11,824,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,170 UART: [ldev] --
14,189,177 UART: [fwproc] Wait for Commands...
14,192,073 UART: [fwproc] Recv command 0x46574c44
14,194,416 UART: [fwproc] Recv'd Img size: 114124 bytes
14,266,188 UART: ROM Fatal Error: 0x000B0009
14,269,597 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,055,968 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,199,990 UART:
2,200,400 UART: Running Caliptra ROM ...
2,201,481 UART:
2,201,631 UART: [state] CFI Enabled
2,202,607 UART: [state] LifecycleState = Unprovisioned
2,204,269 UART: [state] DebugLocked = No
2,205,291 UART: [state] WD Timer not started. Device not locked for debugging
2,207,744 UART: [kat] SHA2-256
2,208,400 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,211,404 UART: [kat] ++
2,211,843 UART: [kat] sha1
2,212,342 UART: [kat] SHA2-256
2,212,990 UART: [kat] SHA2-384
2,213,638 UART: [kat] SHA2-512-ACC
2,214,429 UART: [kat] ECC-384
4,098,539 UART: [kat] HMAC-384Kdf
4,108,911 UART: [kat] LMS
5,182,043 UART: [kat] --
5,186,318 UART: [cold-reset] ++
5,187,439 UART: [fht] FHT @ 0x50003400
5,199,064 UART: [idev] ++
5,199,766 UART: [idev] CDI.KEYID = 6
5,200,945 UART: [idev] SUBJECT.KEYID = 7
5,202,374 UART: [idev] UDS.KEYID = 0
5,221,637 UART: [idev] Erasing UDS.KEYID = 0
8,497,908 UART: [idev] Sha1 KeyId Algorithm
8,519,294 UART: [idev] --
8,524,622 UART: [ldev] ++
8,525,194 UART: [ldev] CDI.KEYID = 6
8,526,353 UART: [ldev] SUBJECT.KEYID = 5
8,527,832 UART: [ldev] AUTHORITY.KEYID = 7
8,529,362 UART: [ldev] FE.KEYID = 1
8,540,977 UART: [ldev] Erasing FE.KEYID = 1
11,833,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,929 UART: [ldev] --
14,201,425 UART: [fwproc] Wait for Commands...
14,203,198 UART: [fwproc] Recv command 0x46574c44
14,205,506 UART: [fwproc] Recv'd Img size: 114124 bytes
18,274,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,348,500 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,417,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,734,913 >>> mbox cmd response: success
18,738,776 UART: [afmc] ++
18,739,471 UART: [afmc] CDI.KEYID = 6
18,740,655 UART: [afmc] SUBJECT.KEYID = 7
18,741,815 UART: [afmc] AUTHORITY.KEYID = 5
22,057,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,352,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,354,237 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,370,400 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,386,476 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,402,322 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,424,575 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.38s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
2,230,074 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,091,569 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,062,863 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,084,672 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,057,708 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,075,705 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,064,307 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,531,499 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,220,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,365,457 UART:
2,365,875 UART: Running Caliptra ROM ...
2,366,957 UART:
2,367,111 UART: [state] CFI Enabled
2,368,085 UART: [state] LifecycleState = Unprovisioned
2,369,750 UART: [state] DebugLocked = No
2,370,776 UART: [state] WD Timer not started. Device not locked for debugging
2,373,446 UART: [kat] SHA2-256
2,374,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,377,159 UART: [kat] ++
2,377,608 UART: [kat] sha1
2,378,140 UART: [kat] SHA2-256
2,378,801 UART: [kat] SHA2-384
2,379,455 UART: [kat] SHA2-512-ACC
2,380,254 UART: [kat] ECC-384
2,945,515 UART: [kat] HMAC-384Kdf
2,971,719 UART: [kat] LMS
3,501,142 UART: [kat] --
3,505,540 UART: [cold-reset] ++
3,506,444 UART: [fht] FHT @ 0x50003400
3,516,993 UART: [idev] ++
3,517,560 UART: [idev] CDI.KEYID = 6
3,518,578 UART: [idev] SUBJECT.KEYID = 7
3,519,679 UART: [idev] UDS.KEYID = 0
3,542,028 UART: [idev] Erasing UDS.KEYID = 0
6,027,851 UART: [idev] Sha1 KeyId Algorithm
6,050,122 UART: [idev] --
6,052,954 UART: [ldev] ++
6,053,729 UART: [ldev] CDI.KEYID = 6
6,054,630 UART: [ldev] SUBJECT.KEYID = 5
6,055,861 UART: [ldev] AUTHORITY.KEYID = 7
6,057,046 UART: [ldev] FE.KEYID = 1
6,099,857 UART: [ldev] Erasing FE.KEYID = 1
8,601,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,926 UART: [ldev] --
10,412,144 UART: [fwproc] Wait for Commands...
10,413,916 UART: [fwproc] Recv command 0x46574c44
10,415,961 UART: [fwproc] Recv'd Img size: 114448 bytes
10,489,078 UART: ROM Fatal Error: 0x000B0009
10,492,193 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
2,059,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,204,256 UART:
2,204,661 UART: Running Caliptra ROM ...
2,205,825 UART:
2,205,999 UART: [state] CFI Enabled
2,206,984 UART: [state] LifecycleState = Unprovisioned
2,208,875 UART: [state] DebugLocked = No
2,209,995 UART: [state] WD Timer not started. Device not locked for debugging
2,212,478 UART: [kat] SHA2-256
2,213,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,216,154 UART: [kat] ++
2,216,603 UART: [kat] sha1
2,217,116 UART: [kat] SHA2-256
2,217,856 UART: [kat] SHA2-384
2,218,522 UART: [kat] SHA2-512-ACC
2,219,364 UART: [kat] ECC-384
2,949,117 UART: [kat] HMAC-384Kdf
2,972,127 UART: [kat] LMS
3,501,617 UART: [kat] --
3,506,924 UART: [cold-reset] ++
3,508,907 UART: [fht] FHT @ 0x50003400
3,520,827 UART: [idev] ++
3,521,400 UART: [idev] CDI.KEYID = 6
3,522,311 UART: [idev] SUBJECT.KEYID = 7
3,523,527 UART: [idev] UDS.KEYID = 0
3,543,499 UART: [idev] Erasing UDS.KEYID = 0
6,025,394 UART: [idev] Sha1 KeyId Algorithm
6,048,299 UART: [idev] --
6,051,038 UART: [ldev] ++
6,051,564 UART: [ldev] CDI.KEYID = 6
6,052,502 UART: [ldev] SUBJECT.KEYID = 5
6,053,722 UART: [ldev] AUTHORITY.KEYID = 7
6,054,882 UART: [ldev] FE.KEYID = 1
6,098,716 UART: [ldev] Erasing FE.KEYID = 1
8,601,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,463 UART: [ldev] --
10,392,356 UART: [fwproc] Wait for Commands...
10,394,841 UART: [fwproc] Recv command 0x46574c44
10,396,937 UART: [fwproc] Recv'd Img size: 114448 bytes
10,469,622 UART: ROM Fatal Error: 0x000B0009
10,472,764 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
2,055,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,126 UART:
2,200,529 UART: Running Caliptra ROM ...
2,201,609 UART:
2,201,762 UART: [state] CFI Enabled
2,202,867 UART: [state] LifecycleState = Unprovisioned
2,204,520 UART: [state] DebugLocked = No
2,205,547 UART: [state] WD Timer not started. Device not locked for debugging
2,208,008 UART: [kat] SHA2-256
2,208,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,690 UART: [kat] ++
2,212,141 UART: [kat] sha1
2,212,741 UART: [kat] SHA2-256
2,213,409 UART: [kat] SHA2-384
2,214,064 UART: [kat] SHA2-512-ACC
2,214,950 UART: [kat] ECC-384
2,949,956 UART: [kat] HMAC-384Kdf
2,973,696 UART: [kat] LMS
3,503,130 UART: [kat] --
3,509,413 UART: [cold-reset] ++
3,510,245 UART: [fht] FHT @ 0x50003400
3,520,043 UART: [idev] ++
3,520,619 UART: [idev] CDI.KEYID = 6
3,521,528 UART: [idev] SUBJECT.KEYID = 7
3,522,749 UART: [idev] UDS.KEYID = 0
3,544,018 UART: [idev] Erasing UDS.KEYID = 0
6,027,145 UART: [idev] Sha1 KeyId Algorithm
6,049,479 UART: [idev] --
6,054,399 UART: [ldev] ++
6,054,975 UART: [ldev] CDI.KEYID = 6
6,055,886 UART: [ldev] SUBJECT.KEYID = 5
6,057,104 UART: [ldev] AUTHORITY.KEYID = 7
6,058,363 UART: [ldev] FE.KEYID = 1
6,100,241 UART: [ldev] Erasing FE.KEYID = 1
8,605,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,273 UART: [ldev] --
10,416,051 UART: [fwproc] Wait for Commands...
10,417,888 UART: [fwproc] Recv command 0x46574c44
10,419,985 UART: [fwproc] Recv'd Img size: 114448 bytes
10,492,990 UART: ROM Fatal Error: 0x000B0009
10,496,072 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
2,056,527 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,051 UART:
2,201,465 UART: Running Caliptra ROM ...
2,202,631 UART:
2,202,807 UART: [state] CFI Enabled
2,203,770 UART: [state] LifecycleState = Unprovisioned
2,205,426 UART: [state] DebugLocked = No
2,206,538 UART: [state] WD Timer not started. Device not locked for debugging
2,209,011 UART: [kat] SHA2-256
2,209,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,692 UART: [kat] ++
2,213,164 UART: [kat] sha1
2,213,767 UART: [kat] SHA2-256
2,214,434 UART: [kat] SHA2-384
2,215,093 UART: [kat] SHA2-512-ACC
2,215,977 UART: [kat] ECC-384
2,949,827 UART: [kat] HMAC-384Kdf
2,973,142 UART: [kat] LMS
3,502,573 UART: [kat] --
3,507,433 UART: [cold-reset] ++
3,508,502 UART: [fht] FHT @ 0x50003400
3,518,349 UART: [idev] ++
3,518,910 UART: [idev] CDI.KEYID = 6
3,519,835 UART: [idev] SUBJECT.KEYID = 7
3,521,051 UART: [idev] UDS.KEYID = 0
3,544,861 UART: [idev] Erasing UDS.KEYID = 0
6,027,546 UART: [idev] Sha1 KeyId Algorithm
6,051,837 UART: [idev] --
6,055,258 UART: [ldev] ++
6,055,835 UART: [ldev] CDI.KEYID = 6
6,056,746 UART: [ldev] SUBJECT.KEYID = 5
6,057,911 UART: [ldev] AUTHORITY.KEYID = 7
6,059,152 UART: [ldev] FE.KEYID = 1
6,100,934 UART: [ldev] Erasing FE.KEYID = 1
8,603,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,927 UART: [ldev] --
10,413,390 UART: [fwproc] Wait for Commands...
10,416,300 UART: [fwproc] Recv command 0x46574c44
10,418,392 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,896,483 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,660 >>> mbox cmd response: success
14,287,066 UART: [afmc] ++
14,287,657 UART: [afmc] CDI.KEYID = 6
14,288,568 UART: [afmc] SUBJECT.KEYID = 7
14,289,727 UART: [afmc] AUTHORITY.KEYID = 5
16,832,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,656 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,572,624 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,588,447 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,604,165 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,627,940 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
2,221,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,253,978 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,064,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,249,187 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
2,052,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,296,767 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,060,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,058,961 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
2,226,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,370,818 UART:
2,371,226 UART: Running Caliptra ROM ...
2,372,607 UART:
2,372,789 UART: [state] CFI Enabled
2,373,770 UART: [state] LifecycleState = Unprovisioned
2,375,439 UART: [state] DebugLocked = No
2,376,543 UART: [state] WD Timer not started. Device not locked for debugging
2,379,022 UART: [kat] SHA2-256
2,379,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,382,713 UART: [kat] ++
2,383,162 UART: [kat] sha1
2,383,675 UART: [kat] SHA2-256
2,384,411 UART: [kat] SHA2-384
2,385,078 UART: [kat] SHA2-512-ACC
2,385,910 UART: [kat] ECC-384
3,282,793 UART: [kat] HMAC-384Kdf
3,294,168 UART: [kat] LMS
3,823,672 UART: [kat] --
3,830,451 UART: [cold-reset] ++
3,832,981 UART: [fht] FHT @ 0x50003400
3,842,938 UART: [idev] ++
3,843,506 UART: [idev] CDI.KEYID = 6
3,844,386 UART: [idev] SUBJECT.KEYID = 7
3,845,597 UART: [idev] UDS.KEYID = 0
3,862,436 UART: [idev] Erasing UDS.KEYID = 0
6,318,155 UART: [idev] Sha1 KeyId Algorithm
6,340,170 UART: [idev] --
6,343,635 UART: [ldev] ++
6,344,203 UART: [ldev] CDI.KEYID = 6
6,345,091 UART: [ldev] SUBJECT.KEYID = 5
6,346,306 UART: [ldev] AUTHORITY.KEYID = 7
6,347,561 UART: [ldev] FE.KEYID = 1
6,357,964 UART: [ldev] Erasing FE.KEYID = 1
8,835,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,129 UART: [ldev] --
10,625,539 UART: [fwproc] Wait for Commands...
10,628,609 UART: [fwproc] Recv command 0x46574c44
10,630,704 UART: [fwproc] Recv'd Img size: 114448 bytes
10,708,028 UART: ROM Fatal Error: 0x000B0009
10,711,113 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
2,060,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,206,039 UART:
2,206,478 UART: Running Caliptra ROM ...
2,207,564 UART:
2,207,720 UART: [state] CFI Enabled
2,208,589 UART: [state] LifecycleState = Unprovisioned
2,210,253 UART: [state] DebugLocked = No
2,211,320 UART: [state] WD Timer not started. Device not locked for debugging
2,213,794 UART: [kat] SHA2-256
2,214,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,217,486 UART: [kat] ++
2,217,934 UART: [kat] sha1
2,218,474 UART: [kat] SHA2-256
2,219,135 UART: [kat] SHA2-384
2,219,792 UART: [kat] SHA2-512-ACC
2,220,614 UART: [kat] ECC-384
3,279,105 UART: [kat] HMAC-384Kdf
3,291,323 UART: [kat] LMS
3,820,806 UART: [kat] --
3,824,956 UART: [cold-reset] ++
3,826,021 UART: [fht] FHT @ 0x50003400
3,836,488 UART: [idev] ++
3,837,102 UART: [idev] CDI.KEYID = 6
3,837,989 UART: [idev] SUBJECT.KEYID = 7
3,839,208 UART: [idev] UDS.KEYID = 0
3,854,232 UART: [idev] Erasing UDS.KEYID = 0
6,311,655 UART: [idev] Sha1 KeyId Algorithm
6,334,399 UART: [idev] --
6,338,220 UART: [ldev] ++
6,338,794 UART: [ldev] CDI.KEYID = 6
6,339,675 UART: [ldev] SUBJECT.KEYID = 5
6,340,890 UART: [ldev] AUTHORITY.KEYID = 7
6,342,121 UART: [ldev] FE.KEYID = 1
6,352,527 UART: [ldev] Erasing FE.KEYID = 1
8,822,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,525 UART: [ldev] --
10,614,028 UART: [fwproc] Wait for Commands...
10,616,359 UART: [fwproc] Recv command 0x46574c44
10,618,462 UART: [fwproc] Recv'd Img size: 114448 bytes
10,693,735 UART: ROM Fatal Error: 0x000B0009
10,696,881 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,058,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,202,703 UART:
2,203,136 UART: Running Caliptra ROM ...
2,204,217 UART:
2,204,401 UART: [state] CFI Enabled
2,205,333 UART: [state] LifecycleState = Unprovisioned
2,206,986 UART: [state] DebugLocked = No
2,208,100 UART: [state] WD Timer not started. Device not locked for debugging
2,210,581 UART: [kat] SHA2-256
2,211,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,259 UART: [kat] ++
2,214,706 UART: [kat] sha1
2,215,244 UART: [kat] SHA2-256
2,215,904 UART: [kat] SHA2-384
2,216,572 UART: [kat] SHA2-512-ACC
2,217,396 UART: [kat] ECC-384
3,282,925 UART: [kat] HMAC-384Kdf
3,295,764 UART: [kat] LMS
3,825,238 UART: [kat] --
3,830,761 UART: [cold-reset] ++
3,831,907 UART: [fht] FHT @ 0x50003400
3,842,676 UART: [idev] ++
3,843,238 UART: [idev] CDI.KEYID = 6
3,844,250 UART: [idev] SUBJECT.KEYID = 7
3,845,354 UART: [idev] UDS.KEYID = 0
3,863,491 UART: [idev] Erasing UDS.KEYID = 0
6,322,990 UART: [idev] Sha1 KeyId Algorithm
6,347,405 UART: [idev] --
6,350,911 UART: [ldev] ++
6,351,480 UART: [ldev] CDI.KEYID = 6
6,352,444 UART: [ldev] SUBJECT.KEYID = 5
6,353,603 UART: [ldev] AUTHORITY.KEYID = 7
6,354,831 UART: [ldev] FE.KEYID = 1
6,365,156 UART: [ldev] Erasing FE.KEYID = 1
8,840,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,855 UART: [ldev] --
10,635,229 UART: [fwproc] Wait for Commands...
10,637,435 UART: [fwproc] Recv command 0x46574c44
10,639,525 UART: [fwproc] Recv'd Img size: 114448 bytes
10,712,588 UART: ROM Fatal Error: 0x000B0009
10,715,677 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,064,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,208,543 UART:
2,208,974 UART: Running Caliptra ROM ...
2,210,111 UART:
2,210,272 UART: [state] CFI Enabled
2,211,241 UART: [state] LifecycleState = Unprovisioned
2,212,903 UART: [state] DebugLocked = No
2,214,013 UART: [state] WD Timer not started. Device not locked for debugging
2,216,479 UART: [kat] SHA2-256
2,217,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,220,155 UART: [kat] ++
2,220,606 UART: [kat] sha1
2,221,122 UART: [kat] SHA2-256
2,221,779 UART: [kat] SHA2-384
2,222,680 UART: [kat] SHA2-512-ACC
2,223,523 UART: [kat] ECC-384
3,283,156 UART: [kat] HMAC-384Kdf
3,295,204 UART: [kat] LMS
3,824,729 UART: [kat] --
3,831,217 UART: [cold-reset] ++
3,833,051 UART: [fht] FHT @ 0x50003400
3,844,573 UART: [idev] ++
3,845,136 UART: [idev] CDI.KEYID = 6
3,846,048 UART: [idev] SUBJECT.KEYID = 7
3,847,212 UART: [idev] UDS.KEYID = 0
3,864,160 UART: [idev] Erasing UDS.KEYID = 0
6,321,710 UART: [idev] Sha1 KeyId Algorithm
6,344,936 UART: [idev] --
6,348,873 UART: [ldev] ++
6,349,441 UART: [ldev] CDI.KEYID = 6
6,350,349 UART: [ldev] SUBJECT.KEYID = 5
6,351,466 UART: [ldev] AUTHORITY.KEYID = 7
6,352,807 UART: [ldev] FE.KEYID = 1
6,362,646 UART: [ldev] Erasing FE.KEYID = 1
8,830,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,428 UART: [ldev] --
10,620,689 UART: [fwproc] Wait for Commands...
10,623,705 UART: [fwproc] Recv command 0x46574c44
10,625,796 UART: [fwproc] Recv'd Img size: 114448 bytes
14,022,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,092,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,158 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,479,185 >>> mbox cmd response: success
14,483,741 UART: [afmc] ++
14,484,341 UART: [afmc] CDI.KEYID = 6
14,485,251 UART: [afmc] SUBJECT.KEYID = 7
14,486,461 UART: [afmc] AUTHORITY.KEYID = 5
16,990,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,176 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,727,158 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,742,965 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,758,703 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,781,356 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
2,222,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,471,722 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,060,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,465,482 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,057,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,477,478 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
2,061,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,286,819 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,064 writing to cptra_bootfsm_go
2,221,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,290,171 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,058,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,299,804 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,492 writing to cptra_bootfsm_go
2,055,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,276,808 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
2,068,095 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,084,036 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
2,227,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,479,920 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,061,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,471,717 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,057,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,476,519 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,055,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,262,128 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,576 UART: [state] LifecycleState = Unprovisioned
85,231 UART: [state] DebugLocked = No
85,861 UART: [state] WD Timer not started. Device not locked for debugging
87,056 UART: [kat] SHA2-256
890,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,735 UART: [kat] ++
894,887 UART: [kat] sha1
899,129 UART: [kat] SHA2-256
901,069 UART: [kat] SHA2-384
903,888 UART: [kat] SHA2-512-ACC
905,789 UART: [kat] ECC-384
915,486 UART: [kat] HMAC-384Kdf
919,892 UART: [kat] LMS
1,168,204 UART: [kat] --
1,169,075 UART: [cold-reset] ++
1,169,649 UART: [fht] FHT @ 0x50003400
1,172,167 UART: [idev] ++
1,172,335 UART: [idev] CDI.KEYID = 6
1,172,696 UART: [idev] SUBJECT.KEYID = 7
1,173,121 UART: [idev] UDS.KEYID = 0
1,181,553 UART: [idev] Erasing UDS.KEYID = 0
1,198,641 UART: [idev] Sha1 KeyId Algorithm
1,207,603 UART: [idev] --
1,208,478 UART: [ldev] ++
1,208,646 UART: [ldev] CDI.KEYID = 6
1,209,010 UART: [ldev] SUBJECT.KEYID = 5
1,209,437 UART: [ldev] AUTHORITY.KEYID = 7
1,209,900 UART: [ldev] FE.KEYID = 1
1,214,970 UART: [ldev] Erasing FE.KEYID = 1
1,241,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,358 UART: [ldev] --
1,280,722 UART: [fwproc] Wait for Commands...
1,281,481 UART: [fwproc] Recv command 0x46574c44
1,282,214 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,008 UART: ROM Fatal Error: 0x000B0009
1,308,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,768 UART: [state] LifecycleState = Unprovisioned
85,423 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,230 UART: [kat] SHA2-256
890,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,909 UART: [kat] ++
895,061 UART: [kat] sha1
899,215 UART: [kat] SHA2-256
901,155 UART: [kat] SHA2-384
904,020 UART: [kat] SHA2-512-ACC
905,921 UART: [kat] ECC-384
915,528 UART: [kat] HMAC-384Kdf
920,002 UART: [kat] LMS
1,168,314 UART: [kat] --
1,169,251 UART: [cold-reset] ++
1,169,637 UART: [fht] FHT @ 0x50003400
1,172,395 UART: [idev] ++
1,172,563 UART: [idev] CDI.KEYID = 6
1,172,924 UART: [idev] SUBJECT.KEYID = 7
1,173,349 UART: [idev] UDS.KEYID = 0
1,181,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,511 UART: [idev] Sha1 KeyId Algorithm
1,207,521 UART: [idev] --
1,208,582 UART: [ldev] ++
1,208,750 UART: [ldev] CDI.KEYID = 6
1,209,114 UART: [ldev] SUBJECT.KEYID = 5
1,209,541 UART: [ldev] AUTHORITY.KEYID = 7
1,210,004 UART: [ldev] FE.KEYID = 1
1,215,466 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,926 UART: [ldev] --
1,280,234 UART: [fwproc] Wait for Commands...
1,280,835 UART: [fwproc] Recv command 0x46574c44
1,281,568 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,670 UART: ROM Fatal Error: 0x000B0009
1,307,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,067 UART: [kat] ++
895,219 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,122 UART: [kat] SHA2-512-ACC
906,023 UART: [kat] ECC-384
915,862 UART: [kat] HMAC-384Kdf
920,602 UART: [kat] LMS
1,168,914 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,641 UART: [idev] ++
1,172,809 UART: [idev] CDI.KEYID = 6
1,173,170 UART: [idev] SUBJECT.KEYID = 7
1,173,595 UART: [idev] UDS.KEYID = 0
1,181,711 UART: [idev] Erasing UDS.KEYID = 0
1,198,535 UART: [idev] Sha1 KeyId Algorithm
1,207,429 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,054 UART: [ldev] Erasing FE.KEYID = 1
1,241,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,042 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,149 UART: [fwproc] Recv command 0x46574c44
1,281,882 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,958 UART: ROM Fatal Error: 0x000B0009
1,308,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,484 UART: [kat] SHA2-512-ACC
906,385 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,789 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,843 UART: [idev] ++
1,173,011 UART: [idev] CDI.KEYID = 6
1,173,372 UART: [idev] SUBJECT.KEYID = 7
1,173,797 UART: [idev] UDS.KEYID = 0
1,181,719 UART: [idev] Erasing UDS.KEYID = 0
1,199,037 UART: [idev] Sha1 KeyId Algorithm
1,208,057 UART: [idev] --
1,209,128 UART: [ldev] ++
1,209,296 UART: [ldev] CDI.KEYID = 6
1,209,660 UART: [ldev] SUBJECT.KEYID = 5
1,210,087 UART: [ldev] AUTHORITY.KEYID = 7
1,210,550 UART: [ldev] FE.KEYID = 1
1,215,596 UART: [ldev] Erasing FE.KEYID = 1
1,241,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,510 UART: [ldev] --
1,280,774 UART: [fwproc] Wait for Commands...
1,281,493 UART: [fwproc] Recv command 0x46574c44
1,282,226 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,496 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,729 >>> mbox cmd response: success
2,774,766 UART: [afmc] ++
2,774,934 UART: [afmc] CDI.KEYID = 6
2,775,297 UART: [afmc] SUBJECT.KEYID = 7
2,775,723 UART: [afmc] AUTHORITY.KEYID = 5
2,811,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,673 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,386 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,295 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,009 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,942 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,649 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,030 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
891,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,914 UART: [kat] ++
896,066 UART: [kat] sha1
900,266 UART: [kat] SHA2-256
902,206 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,755 UART: [kat] HMAC-384Kdf
921,473 UART: [kat] LMS
1,169,785 UART: [kat] --
1,170,750 UART: [cold-reset] ++
1,171,174 UART: [fht] FHT @ 0x50003400
1,173,826 UART: [idev] ++
1,173,994 UART: [idev] CDI.KEYID = 6
1,174,355 UART: [idev] SUBJECT.KEYID = 7
1,174,780 UART: [idev] UDS.KEYID = 0
1,182,712 UART: [idev] Erasing UDS.KEYID = 0
1,199,696 UART: [idev] Sha1 KeyId Algorithm
1,208,578 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,285 UART: [ldev] SUBJECT.KEYID = 5
1,210,712 UART: [ldev] AUTHORITY.KEYID = 7
1,211,175 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,637 UART: [ldev] --
1,281,979 UART: [fwproc] Wait for Commands...
1,282,772 UART: [fwproc] Recv command 0x46574c44
1,283,505 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,457 UART: ROM Fatal Error: 0x000B0009
1,309,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
899,702 UART: [kat] SHA2-256
901,642 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
915,747 UART: [kat] HMAC-384Kdf
920,347 UART: [kat] LMS
1,168,659 UART: [kat] --
1,169,538 UART: [cold-reset] ++
1,170,020 UART: [fht] FHT @ 0x50003400
1,172,844 UART: [idev] ++
1,173,012 UART: [idev] CDI.KEYID = 6
1,173,373 UART: [idev] SUBJECT.KEYID = 7
1,173,798 UART: [idev] UDS.KEYID = 0
1,181,448 UART: [idev] Erasing UDS.KEYID = 0
1,198,774 UART: [idev] Sha1 KeyId Algorithm
1,207,650 UART: [idev] --
1,208,769 UART: [ldev] ++
1,208,937 UART: [ldev] CDI.KEYID = 6
1,209,301 UART: [ldev] SUBJECT.KEYID = 5
1,209,728 UART: [ldev] AUTHORITY.KEYID = 7
1,210,191 UART: [ldev] FE.KEYID = 1
1,215,407 UART: [ldev] Erasing FE.KEYID = 1
1,241,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,645 UART: [ldev] --
1,281,067 UART: [fwproc] Wait for Commands...
1,281,822 UART: [fwproc] Recv command 0x46574c44
1,282,555 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,509 UART: ROM Fatal Error: 0x000B0009
1,308,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,538 UART: [kat] SHA2-256
901,478 UART: [kat] SHA2-384
904,293 UART: [kat] SHA2-512-ACC
906,194 UART: [kat] ECC-384
915,935 UART: [kat] HMAC-384Kdf
920,499 UART: [kat] LMS
1,168,811 UART: [kat] --
1,169,734 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,686 UART: [idev] ++
1,172,854 UART: [idev] CDI.KEYID = 6
1,173,215 UART: [idev] SUBJECT.KEYID = 7
1,173,640 UART: [idev] UDS.KEYID = 0
1,181,550 UART: [idev] Erasing UDS.KEYID = 0
1,199,054 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] --
1,209,063 UART: [ldev] ++
1,209,231 UART: [ldev] CDI.KEYID = 6
1,209,595 UART: [ldev] SUBJECT.KEYID = 5
1,210,022 UART: [ldev] AUTHORITY.KEYID = 7
1,210,485 UART: [ldev] FE.KEYID = 1
1,215,577 UART: [ldev] Erasing FE.KEYID = 1
1,241,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,325 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,448 UART: [fwproc] Recv command 0x46574c44
1,283,181 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,205 UART: ROM Fatal Error: 0x000B0009
1,310,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,362 UART: [kat] SHA2-256
902,302 UART: [kat] SHA2-384
905,191 UART: [kat] SHA2-512-ACC
907,092 UART: [kat] ECC-384
916,845 UART: [kat] HMAC-384Kdf
921,363 UART: [kat] LMS
1,169,675 UART: [kat] --
1,170,526 UART: [cold-reset] ++
1,171,078 UART: [fht] FHT @ 0x50003400
1,173,638 UART: [idev] ++
1,173,806 UART: [idev] CDI.KEYID = 6
1,174,167 UART: [idev] SUBJECT.KEYID = 7
1,174,592 UART: [idev] UDS.KEYID = 0
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,199,658 UART: [idev] Sha1 KeyId Algorithm
1,208,386 UART: [idev] --
1,209,467 UART: [ldev] ++
1,209,635 UART: [ldev] CDI.KEYID = 6
1,209,999 UART: [ldev] SUBJECT.KEYID = 5
1,210,426 UART: [ldev] AUTHORITY.KEYID = 7
1,210,889 UART: [ldev] FE.KEYID = 1
1,216,051 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,609 UART: [fwproc] Wait for Commands...
1,282,210 UART: [fwproc] Recv command 0x46574c44
1,282,943 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,364 >>> mbox cmd response: success
2,775,561 UART: [afmc] ++
2,775,729 UART: [afmc] CDI.KEYID = 6
2,776,092 UART: [afmc] SUBJECT.KEYID = 7
2,776,518 UART: [afmc] AUTHORITY.KEYID = 5
2,812,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,430 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,143 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,052 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,766 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,561 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,903 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,247 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,512 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,755 UART: [kat] SHA2-256
901,695 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,887 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,005 UART: [idev] ++
1,173,173 UART: [idev] CDI.KEYID = 6
1,173,534 UART: [idev] SUBJECT.KEYID = 7
1,173,959 UART: [idev] UDS.KEYID = 0
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,199,047 UART: [idev] Sha1 KeyId Algorithm
1,207,881 UART: [idev] --
1,208,974 UART: [ldev] ++
1,209,142 UART: [ldev] CDI.KEYID = 6
1,209,506 UART: [ldev] SUBJECT.KEYID = 5
1,209,933 UART: [ldev] AUTHORITY.KEYID = 7
1,210,396 UART: [ldev] FE.KEYID = 1
1,215,538 UART: [ldev] Erasing FE.KEYID = 1
1,241,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,214 UART: [ldev] --
1,280,526 UART: [fwproc] Wait for Commands...
1,281,275 UART: [fwproc] Recv command 0x46574c44
1,282,008 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,284 UART: ROM Fatal Error: 0x000B0009
1,308,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
915,888 UART: [kat] HMAC-384Kdf
920,430 UART: [kat] LMS
1,168,742 UART: [kat] --
1,169,437 UART: [cold-reset] ++
1,169,815 UART: [fht] FHT @ 0x50003400
1,172,475 UART: [idev] ++
1,172,643 UART: [idev] CDI.KEYID = 6
1,173,004 UART: [idev] SUBJECT.KEYID = 7
1,173,429 UART: [idev] UDS.KEYID = 0
1,181,205 UART: [idev] Erasing UDS.KEYID = 0
1,198,475 UART: [idev] Sha1 KeyId Algorithm
1,207,411 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,214,816 UART: [ldev] Erasing FE.KEYID = 1
1,240,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,258 UART: [ldev] --
1,279,674 UART: [fwproc] Wait for Commands...
1,280,483 UART: [fwproc] Recv command 0x46574c44
1,281,216 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,298 UART: ROM Fatal Error: 0x000B0009
1,307,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,803 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,983 UART: [idev] ++
1,173,151 UART: [idev] CDI.KEYID = 6
1,173,512 UART: [idev] SUBJECT.KEYID = 7
1,173,937 UART: [idev] UDS.KEYID = 0
1,181,581 UART: [idev] Erasing UDS.KEYID = 0
1,198,585 UART: [idev] Sha1 KeyId Algorithm
1,207,453 UART: [idev] --
1,208,530 UART: [ldev] ++
1,208,698 UART: [ldev] CDI.KEYID = 6
1,209,062 UART: [ldev] SUBJECT.KEYID = 5
1,209,489 UART: [ldev] AUTHORITY.KEYID = 7
1,209,952 UART: [ldev] FE.KEYID = 1
1,215,110 UART: [ldev] Erasing FE.KEYID = 1
1,240,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,770 UART: [ldev] --
1,280,098 UART: [fwproc] Wait for Commands...
1,280,679 UART: [fwproc] Recv command 0x46574c44
1,281,412 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,938 UART: ROM Fatal Error: 0x000B0009
1,308,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,349 UART: [cold-reset] ++
1,169,767 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,181,569 UART: [idev] Erasing UDS.KEYID = 0
1,198,963 UART: [idev] Sha1 KeyId Algorithm
1,207,793 UART: [idev] --
1,208,768 UART: [ldev] ++
1,208,936 UART: [ldev] CDI.KEYID = 6
1,209,300 UART: [ldev] SUBJECT.KEYID = 5
1,209,727 UART: [ldev] AUTHORITY.KEYID = 7
1,210,190 UART: [ldev] FE.KEYID = 1
1,215,538 UART: [ldev] Erasing FE.KEYID = 1
1,242,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,094 UART: [ldev] --
1,281,558 UART: [fwproc] Wait for Commands...
1,282,175 UART: [fwproc] Recv command 0x46574c44
1,282,908 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,726 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,109 >>> mbox cmd response: success
2,775,368 UART: [afmc] ++
2,775,536 UART: [afmc] CDI.KEYID = 6
2,775,899 UART: [afmc] SUBJECT.KEYID = 7
2,776,325 UART: [afmc] AUTHORITY.KEYID = 5
2,811,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,971 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,684 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,593 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,307 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,078 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,107 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,725 UART: [kat] SHA2-512-ACC
906,626 UART: [kat] ECC-384
916,563 UART: [kat] HMAC-384Kdf
921,247 UART: [kat] LMS
1,169,559 UART: [kat] --
1,170,528 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,208,434 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,083 UART: [ldev] SUBJECT.KEYID = 5
1,210,510 UART: [ldev] AUTHORITY.KEYID = 7
1,210,973 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,753 UART: [ldev] --
1,282,193 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,661 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,223 UART: ROM Fatal Error: 0x000B0009
1,310,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,219 UART: [kat] LMS
1,169,531 UART: [kat] --
1,170,318 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,534 UART: [idev] ++
1,173,702 UART: [idev] CDI.KEYID = 6
1,174,063 UART: [idev] SUBJECT.KEYID = 7
1,174,488 UART: [idev] UDS.KEYID = 0
1,182,612 UART: [idev] Erasing UDS.KEYID = 0
1,199,386 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,217 UART: [ldev] ++
1,209,385 UART: [ldev] CDI.KEYID = 6
1,209,749 UART: [ldev] SUBJECT.KEYID = 5
1,210,176 UART: [ldev] AUTHORITY.KEYID = 7
1,210,639 UART: [ldev] FE.KEYID = 1
1,215,885 UART: [ldev] Erasing FE.KEYID = 1
1,241,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,103 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,194 UART: [fwproc] Recv command 0x46574c44
1,282,927 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,567 UART: ROM Fatal Error: 0x000B0009
1,309,724 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,227 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,172,868 UART: [idev] ++
1,173,036 UART: [idev] CDI.KEYID = 6
1,173,397 UART: [idev] SUBJECT.KEYID = 7
1,173,822 UART: [idev] UDS.KEYID = 0
1,181,860 UART: [idev] Erasing UDS.KEYID = 0
1,198,658 UART: [idev] Sha1 KeyId Algorithm
1,207,558 UART: [idev] --
1,208,625 UART: [ldev] ++
1,208,793 UART: [ldev] CDI.KEYID = 6
1,209,157 UART: [ldev] SUBJECT.KEYID = 5
1,209,584 UART: [ldev] AUTHORITY.KEYID = 7
1,210,047 UART: [ldev] FE.KEYID = 1
1,215,235 UART: [ldev] Erasing FE.KEYID = 1
1,241,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,171 UART: [ldev] --
1,280,667 UART: [fwproc] Wait for Commands...
1,281,268 UART: [fwproc] Recv command 0x46574c44
1,282,001 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,825 UART: ROM Fatal Error: 0x000B0009
1,307,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,982 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
891,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,838 UART: [kat] ++
895,990 UART: [kat] sha1
900,090 UART: [kat] SHA2-256
902,030 UART: [kat] SHA2-384
904,949 UART: [kat] SHA2-512-ACC
906,850 UART: [kat] ECC-384
916,807 UART: [kat] HMAC-384Kdf
921,503 UART: [kat] LMS
1,169,815 UART: [kat] --
1,170,574 UART: [cold-reset] ++
1,171,038 UART: [fht] FHT @ 0x50003400
1,173,708 UART: [idev] ++
1,173,876 UART: [idev] CDI.KEYID = 6
1,174,237 UART: [idev] SUBJECT.KEYID = 7
1,174,662 UART: [idev] UDS.KEYID = 0
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,199,238 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,401 UART: [ldev] ++
1,209,569 UART: [ldev] CDI.KEYID = 6
1,209,933 UART: [ldev] SUBJECT.KEYID = 5
1,210,360 UART: [ldev] AUTHORITY.KEYID = 7
1,210,823 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,243,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,027 UART: [ldev] --
1,282,433 UART: [fwproc] Wait for Commands...
1,283,092 UART: [fwproc] Recv command 0x46574c44
1,283,825 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,979 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,288 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,294 >>> mbox cmd response: success
2,775,349 UART: [afmc] ++
2,775,517 UART: [afmc] CDI.KEYID = 6
2,775,880 UART: [afmc] SUBJECT.KEYID = 7
2,776,306 UART: [afmc] AUTHORITY.KEYID = 5
2,811,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,242 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,955 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,864 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,578 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,221 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,746 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,270 UART: [kat] SHA2-512-ACC
906,171 UART: [kat] ECC-384
916,002 UART: [kat] HMAC-384Kdf
920,554 UART: [kat] LMS
1,168,866 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,198,907 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,208,986 UART: [ldev] ++
1,209,154 UART: [ldev] CDI.KEYID = 6
1,209,518 UART: [ldev] SUBJECT.KEYID = 5
1,209,945 UART: [ldev] AUTHORITY.KEYID = 7
1,210,408 UART: [ldev] FE.KEYID = 1
1,215,628 UART: [ldev] Erasing FE.KEYID = 1
1,241,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,812 UART: [ldev] --
1,281,150 UART: [fwproc] Wait for Commands...
1,281,803 UART: [fwproc] Recv command 0x46574c44
1,282,536 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,118 UART: ROM Fatal Error: 0x000B0009
1,309,275 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,658 UART: [state] LifecycleState = Unprovisioned
85,313 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,158 UART: [kat] SHA2-256
890,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,837 UART: [kat] ++
894,989 UART: [kat] sha1
899,173 UART: [kat] SHA2-256
901,113 UART: [kat] SHA2-384
903,970 UART: [kat] SHA2-512-ACC
905,871 UART: [kat] ECC-384
915,590 UART: [kat] HMAC-384Kdf
920,186 UART: [kat] LMS
1,168,498 UART: [kat] --
1,169,267 UART: [cold-reset] ++
1,169,661 UART: [fht] FHT @ 0x50003400
1,172,281 UART: [idev] ++
1,172,449 UART: [idev] CDI.KEYID = 6
1,172,810 UART: [idev] SUBJECT.KEYID = 7
1,173,235 UART: [idev] UDS.KEYID = 0
1,181,071 UART: [idev] Erasing UDS.KEYID = 0
1,197,657 UART: [idev] Sha1 KeyId Algorithm
1,206,579 UART: [idev] --
1,207,648 UART: [ldev] ++
1,207,816 UART: [ldev] CDI.KEYID = 6
1,208,180 UART: [ldev] SUBJECT.KEYID = 5
1,208,607 UART: [ldev] AUTHORITY.KEYID = 7
1,209,070 UART: [ldev] FE.KEYID = 1
1,214,306 UART: [ldev] Erasing FE.KEYID = 1
1,239,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,644 UART: [ldev] --
1,279,058 UART: [fwproc] Wait for Commands...
1,279,633 UART: [fwproc] Recv command 0x46574c44
1,280,366 UART: [fwproc] Recv'd Img size: 114448 bytes
1,305,524 UART: ROM Fatal Error: 0x000B0009
1,306,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,576 UART: [kat] LMS
1,168,888 UART: [kat] --
1,169,807 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,173,031 UART: [idev] ++
1,173,199 UART: [idev] CDI.KEYID = 6
1,173,560 UART: [idev] SUBJECT.KEYID = 7
1,173,985 UART: [idev] UDS.KEYID = 0
1,182,033 UART: [idev] Erasing UDS.KEYID = 0
1,198,969 UART: [idev] Sha1 KeyId Algorithm
1,207,931 UART: [idev] --
1,208,974 UART: [ldev] ++
1,209,142 UART: [ldev] CDI.KEYID = 6
1,209,506 UART: [ldev] SUBJECT.KEYID = 5
1,209,933 UART: [ldev] AUTHORITY.KEYID = 7
1,210,396 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,242,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,390 UART: [ldev] --
1,281,662 UART: [fwproc] Wait for Commands...
1,282,417 UART: [fwproc] Recv command 0x46574c44
1,283,150 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,428 UART: ROM Fatal Error: 0x000B0009
1,309,585 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,648 UART: [state] LifecycleState = Unprovisioned
85,303 UART: [state] DebugLocked = No
85,807 UART: [state] WD Timer not started. Device not locked for debugging
87,134 UART: [kat] SHA2-256
890,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,813 UART: [kat] ++
894,965 UART: [kat] sha1
899,215 UART: [kat] SHA2-256
901,155 UART: [kat] SHA2-384
903,898 UART: [kat] SHA2-512-ACC
905,799 UART: [kat] ECC-384
915,778 UART: [kat] HMAC-384Kdf
920,246 UART: [kat] LMS
1,168,558 UART: [kat] --
1,169,153 UART: [cold-reset] ++
1,169,703 UART: [fht] FHT @ 0x50003400
1,172,399 UART: [idev] ++
1,172,567 UART: [idev] CDI.KEYID = 6
1,172,928 UART: [idev] SUBJECT.KEYID = 7
1,173,353 UART: [idev] UDS.KEYID = 0
1,180,955 UART: [idev] Erasing UDS.KEYID = 0
1,197,659 UART: [idev] Sha1 KeyId Algorithm
1,206,577 UART: [idev] --
1,207,642 UART: [ldev] ++
1,207,810 UART: [ldev] CDI.KEYID = 6
1,208,174 UART: [ldev] SUBJECT.KEYID = 5
1,208,601 UART: [ldev] AUTHORITY.KEYID = 7
1,209,064 UART: [ldev] FE.KEYID = 1
1,214,342 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,644 UART: [ldev] --
1,279,960 UART: [fwproc] Wait for Commands...
1,280,543 UART: [fwproc] Recv command 0x46574c44
1,281,276 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,731 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,613 >>> mbox cmd response: success
2,772,658 UART: [afmc] ++
2,772,826 UART: [afmc] CDI.KEYID = 6
2,773,189 UART: [afmc] SUBJECT.KEYID = 7
2,773,615 UART: [afmc] AUTHORITY.KEYID = 5
2,809,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,491 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,204 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,113 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,827 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,654 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,225 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,965 UART: [state] LifecycleState = Unprovisioned
85,620 UART: [state] DebugLocked = No
86,270 UART: [state] WD Timer not started. Device not locked for debugging
87,609 UART: [kat] SHA2-256
891,159 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,474 UART: [kat] SHA2-256
901,414 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,597 UART: [kat] LMS
1,168,909 UART: [kat] --
1,169,774 UART: [cold-reset] ++
1,170,348 UART: [fht] FHT @ 0x50003400
1,173,238 UART: [idev] ++
1,173,406 UART: [idev] CDI.KEYID = 6
1,173,767 UART: [idev] SUBJECT.KEYID = 7
1,174,192 UART: [idev] UDS.KEYID = 0
1,182,368 UART: [idev] Erasing UDS.KEYID = 0
1,199,710 UART: [idev] Sha1 KeyId Algorithm
1,208,764 UART: [idev] --
1,209,779 UART: [ldev] ++
1,209,947 UART: [ldev] CDI.KEYID = 6
1,210,311 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,243,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,747 UART: [ldev] --
1,283,145 UART: [fwproc] Wait for Commands...
1,283,746 UART: [fwproc] Recv command 0x46574c44
1,284,479 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,593 UART: ROM Fatal Error: 0x000B0009
1,310,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
921,021 UART: [kat] LMS
1,169,333 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,120 UART: [idev] ++
1,173,288 UART: [idev] CDI.KEYID = 6
1,173,649 UART: [idev] SUBJECT.KEYID = 7
1,174,074 UART: [idev] UDS.KEYID = 0
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,846 UART: [idev] --
1,208,905 UART: [ldev] ++
1,209,073 UART: [ldev] CDI.KEYID = 6
1,209,437 UART: [ldev] SUBJECT.KEYID = 5
1,209,864 UART: [ldev] AUTHORITY.KEYID = 7
1,210,327 UART: [ldev] FE.KEYID = 1
1,215,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,447 UART: [ldev] --
1,281,751 UART: [fwproc] Wait for Commands...
1,282,402 UART: [fwproc] Recv command 0x46574c44
1,283,135 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,697 UART: ROM Fatal Error: 0x000B0009
1,308,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,241 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,442 UART: [fht] FHT @ 0x50003400
1,173,120 UART: [idev] ++
1,173,288 UART: [idev] CDI.KEYID = 6
1,173,649 UART: [idev] SUBJECT.KEYID = 7
1,174,074 UART: [idev] UDS.KEYID = 0
1,182,316 UART: [idev] Erasing UDS.KEYID = 0
1,199,730 UART: [idev] Sha1 KeyId Algorithm
1,208,624 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,139 UART: [ldev] SUBJECT.KEYID = 5
1,210,566 UART: [ldev] AUTHORITY.KEYID = 7
1,211,029 UART: [ldev] FE.KEYID = 1
1,216,291 UART: [ldev] Erasing FE.KEYID = 1
1,242,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,519 UART: [ldev] --
1,281,799 UART: [fwproc] Wait for Commands...
1,282,584 UART: [fwproc] Recv command 0x46574c44
1,283,317 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,115 UART: ROM Fatal Error: 0x000B0009
1,309,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,599 UART: [kat] LMS
1,168,911 UART: [kat] --
1,169,790 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,173,068 UART: [idev] ++
1,173,236 UART: [idev] CDI.KEYID = 6
1,173,597 UART: [idev] SUBJECT.KEYID = 7
1,174,022 UART: [idev] UDS.KEYID = 0
1,181,812 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,208,018 UART: [idev] --
1,209,167 UART: [ldev] ++
1,209,335 UART: [ldev] CDI.KEYID = 6
1,209,699 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,242,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,309 UART: [ldev] --
1,281,735 UART: [fwproc] Wait for Commands...
1,282,508 UART: [fwproc] Recv command 0x46574c44
1,283,241 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,504 >>> mbox cmd response: success
2,774,573 UART: [afmc] ++
2,774,741 UART: [afmc] CDI.KEYID = 6
2,775,104 UART: [afmc] SUBJECT.KEYID = 7
2,775,530 UART: [afmc] AUTHORITY.KEYID = 5
2,811,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,254 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,967 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,876 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,590 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,359 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,005 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,046 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
5,521 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
191,991 UART:
192,391 UART: Running Caliptra ROM ...
193,524 UART:
193,670 UART: [state] CFI Enabled
257,304 UART: [state] LifecycleState = Unprovisioned
259,674 UART: [state] DebugLocked = No
262,082 UART: [state] WD Timer not started. Device not locked for debugging
267,279 UART: [kat] SHA2-256
449,219 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
460,717 UART: [kat] ++
461,214 UART: [kat] sha1
470,799 UART: [kat] SHA2-256
473,810 UART: [kat] SHA2-384
480,380 UART: [kat] SHA2-512-ACC
482,989 UART: [kat] ECC-384
3,773,364 UART: [kat] HMAC-384Kdf
3,800,376 UART: [kat] LMS
4,873,531 UART: [kat] --
4,878,143 UART: [cold-reset] ++
4,879,643 UART: [fht] FHT @ 0x50003400
4,889,920 UART: [idev] ++
4,890,632 UART: [idev] CDI.KEYID = 6
4,891,743 UART: [idev] SUBJECT.KEYID = 7
4,892,960 UART: [idev] UDS.KEYID = 0
4,927,429 UART: [idev] Erasing UDS.KEYID = 0
8,240,552 UART: [idev] Sha1 KeyId Algorithm
8,262,102 UART: [idev] --
8,267,248 UART: [ldev] ++
8,267,815 UART: [ldev] CDI.KEYID = 6
8,269,048 UART: [ldev] SUBJECT.KEYID = 5
8,270,207 UART: [ldev] AUTHORITY.KEYID = 7
8,271,434 UART: [ldev] FE.KEYID = 1
8,315,519 UART: [ldev] Erasing FE.KEYID = 1
11,652,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,257 UART: [ldev] --
14,035,662 UART: [fwproc] Wait for Commands...
14,038,192 UART: [fwproc] Recv command 0x46574c44
14,040,519 UART: [fwproc] Recv'd Img size: 114124 bytes
18,117,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,196,504 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,265,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,582,534 >>> mbox cmd response: success
18,585,780 UART: [afmc] ++
18,586,367 UART: [afmc] CDI.KEYID = 6
18,587,531 UART: [afmc] SUBJECT.KEYID = 7
18,588,743 UART: [afmc] AUTHORITY.KEYID = 5
21,944,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,243,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,245,524 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,261,695 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,277,729 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,293,746 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,315,796 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
5,643 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,351,400 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,948 writing to cptra_bootfsm_go
7,389 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
193,276 UART:
193,658 UART: Running Caliptra ROM ...
194,845 UART:
604,259 UART: [state] CFI Enabled
618,943 UART: [state] LifecycleState = Unprovisioned
621,318 UART: [state] DebugLocked = No
624,119 UART: [state] WD Timer not started. Device not locked for debugging
628,806 UART: [kat] SHA2-256
810,769 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,317 UART: [kat] ++
822,823 UART: [kat] sha1
833,477 UART: [kat] SHA2-256
836,544 UART: [kat] SHA2-384
842,086 UART: [kat] SHA2-512-ACC
844,704 UART: [kat] ECC-384
4,100,516 UART: [kat] HMAC-384Kdf
4,112,291 UART: [kat] LMS
5,185,417 UART: [kat] --
5,191,957 UART: [cold-reset] ++
5,194,264 UART: [fht] FHT @ 0x50003400
5,204,651 UART: [idev] ++
5,205,396 UART: [idev] CDI.KEYID = 6
5,206,588 UART: [idev] SUBJECT.KEYID = 7
5,208,020 UART: [idev] UDS.KEYID = 0
5,224,159 UART: [idev] Erasing UDS.KEYID = 0
8,498,948 UART: [idev] Sha1 KeyId Algorithm
8,522,415 UART: [idev] --
8,527,766 UART: [ldev] ++
8,528,335 UART: [ldev] CDI.KEYID = 6
8,529,566 UART: [ldev] SUBJECT.KEYID = 5
8,531,046 UART: [ldev] AUTHORITY.KEYID = 7
8,532,601 UART: [ldev] FE.KEYID = 1
8,544,938 UART: [ldev] Erasing FE.KEYID = 1
11,835,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,009 UART: [ldev] --
14,201,304 UART: [fwproc] Wait for Commands...
14,204,102 UART: [fwproc] Recv command 0x46574c44
14,206,415 UART: [fwproc] Recv'd Img size: 114124 bytes
18,279,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,352,435 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,421,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,738,401 >>> mbox cmd response: success
18,741,777 UART: [afmc] ++
18,742,356 UART: [afmc] CDI.KEYID = 6
18,743,553 UART: [afmc] SUBJECT.KEYID = 7
18,744,703 UART: [afmc] AUTHORITY.KEYID = 5
22,062,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,357,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,360,185 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,376,353 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,392,395 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,408,424 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,431,060 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
6,600 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,540,034 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
5,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,254 UART:
192,636 UART: Running Caliptra ROM ...
193,707 UART:
193,847 UART: [state] CFI Enabled
259,659 UART: [state] LifecycleState = Unprovisioned
261,563 UART: [state] DebugLocked = No
263,883 UART: [state] WD Timer not started. Device not locked for debugging
267,775 UART: [kat] SHA2-256
446,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,484 UART: [kat] ++
459,021 UART: [kat] sha1
469,089 UART: [kat] SHA2-256
472,144 UART: [kat] SHA2-384
477,867 UART: [kat] SHA2-512-ACC
480,852 UART: [kat] ECC-384
2,943,535 UART: [kat] HMAC-384Kdf
2,966,334 UART: [kat] LMS
3,495,803 UART: [kat] --
3,499,900 UART: [cold-reset] ++
3,502,206 UART: [fht] FHT @ 0x50003400
3,514,475 UART: [idev] ++
3,515,087 UART: [idev] CDI.KEYID = 6
3,516,002 UART: [idev] SUBJECT.KEYID = 7
3,517,173 UART: [idev] UDS.KEYID = 0
3,539,036 UART: [idev] Erasing UDS.KEYID = 0
6,021,339 UART: [idev] Sha1 KeyId Algorithm
6,045,054 UART: [idev] --
6,049,272 UART: [ldev] ++
6,049,844 UART: [ldev] CDI.KEYID = 6
6,050,753 UART: [ldev] SUBJECT.KEYID = 5
6,051,970 UART: [ldev] AUTHORITY.KEYID = 7
6,053,203 UART: [ldev] FE.KEYID = 1
6,094,561 UART: [ldev] Erasing FE.KEYID = 1
8,594,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,314,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,330,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,345,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,361,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,738 UART: [ldev] --
10,385,980 UART: [fwproc] Wait for Commands...
10,387,623 UART: [fwproc] Recv command 0x46574c44
10,389,736 UART: [fwproc] Recv'd Img size: 114448 bytes
13,792,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,863,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,932,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,250,596 >>> mbox cmd response: success
14,255,324 UART: [afmc] ++
14,255,911 UART: [afmc] CDI.KEYID = 6
14,256,851 UART: [afmc] SUBJECT.KEYID = 7
14,258,018 UART: [afmc] AUTHORITY.KEYID = 5
16,803,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,524,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,526,536 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,542,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,558,372 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,574,215 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,596,151 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
5,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,076,372 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,450 writing to cptra_bootfsm_go
6,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,674 UART:
193,051 UART: Running Caliptra ROM ...
194,217 UART:
603,792 UART: [state] CFI Enabled
615,890 UART: [state] LifecycleState = Unprovisioned
617,764 UART: [state] DebugLocked = No
619,610 UART: [state] WD Timer not started. Device not locked for debugging
623,060 UART: [kat] SHA2-256
802,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,796 UART: [kat] ++
814,327 UART: [kat] sha1
826,126 UART: [kat] SHA2-256
829,179 UART: [kat] SHA2-384
836,034 UART: [kat] SHA2-512-ACC
838,967 UART: [kat] ECC-384
3,281,953 UART: [kat] HMAC-384Kdf
3,294,830 UART: [kat] LMS
3,824,302 UART: [kat] --
3,828,259 UART: [cold-reset] ++
3,830,574 UART: [fht] FHT @ 0x50003400
3,841,711 UART: [idev] ++
3,842,278 UART: [idev] CDI.KEYID = 6
3,843,215 UART: [idev] SUBJECT.KEYID = 7
3,844,423 UART: [idev] UDS.KEYID = 0
3,860,663 UART: [idev] Erasing UDS.KEYID = 0
6,317,802 UART: [idev] Sha1 KeyId Algorithm
6,340,540 UART: [idev] --
6,343,068 UART: [ldev] ++
6,343,636 UART: [ldev] CDI.KEYID = 6
6,344,537 UART: [ldev] SUBJECT.KEYID = 5
6,345,616 UART: [ldev] AUTHORITY.KEYID = 7
6,346,953 UART: [ldev] FE.KEYID = 1
6,357,032 UART: [ldev] Erasing FE.KEYID = 1
8,834,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,773 UART: [ldev] --
10,624,754 UART: [fwproc] Wait for Commands...
10,626,797 UART: [fwproc] Recv command 0x46574c44
10,628,889 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,434 >>> mbox cmd response: success
14,497,573 UART: [afmc] ++
14,498,155 UART: [afmc] CDI.KEYID = 6
14,499,065 UART: [afmc] SUBJECT.KEYID = 7
14,500,225 UART: [afmc] AUTHORITY.KEYID = 5
16,998,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,662 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,424 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,342 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,002 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
6,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,588 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
5,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,965 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
6,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,397 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,623 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,881 UART: [idev] ++
1,173,049 UART: [idev] CDI.KEYID = 6
1,173,410 UART: [idev] SUBJECT.KEYID = 7
1,173,835 UART: [idev] UDS.KEYID = 0
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,199,255 UART: [idev] Sha1 KeyId Algorithm
1,208,315 UART: [idev] --
1,209,394 UART: [ldev] ++
1,209,562 UART: [ldev] CDI.KEYID = 6
1,209,926 UART: [ldev] SUBJECT.KEYID = 5
1,210,353 UART: [ldev] AUTHORITY.KEYID = 7
1,210,816 UART: [ldev] FE.KEYID = 1
1,216,094 UART: [ldev] Erasing FE.KEYID = 1
1,241,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,554 UART: [ldev] --
1,280,864 UART: [fwproc] Wait for Commands...
1,281,609 UART: [fwproc] Recv command 0x46574c44
1,282,342 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,099 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,408 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,506 >>> mbox cmd response: success
2,775,545 UART: [afmc] ++
2,775,713 UART: [afmc] CDI.KEYID = 6
2,776,076 UART: [afmc] SUBJECT.KEYID = 7
2,776,502 UART: [afmc] AUTHORITY.KEYID = 5
2,812,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,933 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,816 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,535 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,420 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,822 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
891,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,637 UART: [kat] LMS
1,168,949 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,094 UART: [idev] ++
1,173,262 UART: [idev] CDI.KEYID = 6
1,173,623 UART: [idev] SUBJECT.KEYID = 7
1,174,048 UART: [idev] UDS.KEYID = 0
1,181,686 UART: [idev] Erasing UDS.KEYID = 0
1,198,630 UART: [idev] Sha1 KeyId Algorithm
1,207,584 UART: [idev] --
1,208,679 UART: [ldev] ++
1,208,847 UART: [ldev] CDI.KEYID = 6
1,209,211 UART: [ldev] SUBJECT.KEYID = 5
1,209,638 UART: [ldev] AUTHORITY.KEYID = 7
1,210,101 UART: [ldev] FE.KEYID = 1
1,215,315 UART: [ldev] Erasing FE.KEYID = 1
1,241,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,577 UART: [ldev] --
1,280,963 UART: [fwproc] Wait for Commands...
1,281,754 UART: [fwproc] Recv command 0x46574c44
1,282,487 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,403 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,403 >>> mbox cmd response: success
2,775,596 UART: [afmc] ++
2,775,764 UART: [afmc] CDI.KEYID = 6
2,776,127 UART: [afmc] SUBJECT.KEYID = 7
2,776,553 UART: [afmc] AUTHORITY.KEYID = 5
2,812,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,559 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,288 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,171 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,890 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,769 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,439 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,222 UART: [kat] SHA2-512-ACC
906,123 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,342 UART: [kat] LMS
1,168,654 UART: [kat] --
1,169,499 UART: [cold-reset] ++
1,169,953 UART: [fht] FHT @ 0x50003400
1,172,481 UART: [idev] ++
1,172,649 UART: [idev] CDI.KEYID = 6
1,173,010 UART: [idev] SUBJECT.KEYID = 7
1,173,435 UART: [idev] UDS.KEYID = 0
1,181,615 UART: [idev] Erasing UDS.KEYID = 0
1,198,411 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,190 UART: [ldev] Erasing FE.KEYID = 1
1,240,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,014 UART: [ldev] --
1,280,532 UART: [fwproc] Wait for Commands...
1,281,357 UART: [fwproc] Recv command 0x46574c44
1,282,090 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,192 >>> mbox cmd response: success
2,775,309 UART: [afmc] ++
2,775,477 UART: [afmc] CDI.KEYID = 6
2,775,840 UART: [afmc] SUBJECT.KEYID = 7
2,776,266 UART: [afmc] AUTHORITY.KEYID = 5
2,811,335 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,650 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,379 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,262 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,981 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,970 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,956 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,321 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,476 UART: [fht] FHT @ 0x50003400
1,173,086 UART: [idev] ++
1,173,254 UART: [idev] CDI.KEYID = 6
1,173,615 UART: [idev] SUBJECT.KEYID = 7
1,174,040 UART: [idev] UDS.KEYID = 0
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,660 UART: [idev] Sha1 KeyId Algorithm
1,208,478 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,297 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,477 UART: [ldev] Erasing FE.KEYID = 1
1,242,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,833 UART: [ldev] --
1,282,219 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,647 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,414 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,749 >>> mbox cmd response: success
2,775,788 UART: [afmc] ++
2,775,956 UART: [afmc] CDI.KEYID = 6
2,776,319 UART: [afmc] SUBJECT.KEYID = 7
2,776,745 UART: [afmc] AUTHORITY.KEYID = 5
2,811,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,373 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,102 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,985 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,704 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,615 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,487 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,181,623 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,831 UART: [idev] --
1,209,058 UART: [ldev] ++
1,209,226 UART: [ldev] CDI.KEYID = 6
1,209,590 UART: [ldev] SUBJECT.KEYID = 5
1,210,017 UART: [ldev] AUTHORITY.KEYID = 7
1,210,480 UART: [ldev] FE.KEYID = 1
1,215,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,516 UART: [ldev] --
1,281,020 UART: [fwproc] Wait for Commands...
1,281,625 UART: [fwproc] Recv command 0x46574c44
1,282,358 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,667 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,088 >>> mbox cmd response: success
2,775,333 UART: [afmc] ++
2,775,501 UART: [afmc] CDI.KEYID = 6
2,775,864 UART: [afmc] SUBJECT.KEYID = 7
2,776,290 UART: [afmc] AUTHORITY.KEYID = 5
2,811,927 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,318 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,047 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,930 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,649 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,324 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,282 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,552 UART: [kat] ++
895,704 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,953 UART: [kat] LMS
1,169,265 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,376 UART: [idev] ++
1,173,544 UART: [idev] CDI.KEYID = 6
1,173,905 UART: [idev] SUBJECT.KEYID = 7
1,174,330 UART: [idev] UDS.KEYID = 0
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,200,088 UART: [idev] Sha1 KeyId Algorithm
1,208,874 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,217,027 UART: [ldev] Erasing FE.KEYID = 1
1,243,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,013 UART: [ldev] --
1,282,435 UART: [fwproc] Wait for Commands...
1,283,168 UART: [fwproc] Recv command 0x46574c44
1,283,901 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,194 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,503 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,605 >>> mbox cmd response: success
2,776,648 UART: [afmc] ++
2,776,816 UART: [afmc] CDI.KEYID = 6
2,777,179 UART: [afmc] SUBJECT.KEYID = 7
2,777,605 UART: [afmc] AUTHORITY.KEYID = 5
2,813,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,389 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,118 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,001 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,720 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,625 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,917 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
Truncated 107056 bytes from beginning
245,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,563,656 >>> mbox cmd response: success
18,567,479 UART: [afmc] ++
18,568,178 UART: [afmc] CDI.KEYID = 6
18,569,366 UART: [afmc] SUBJECT.KEYID = 7
18,570,527 UART: [afmc] AUTHORITY.KEYID = 5
21,937,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,235,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,237,088 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,253,230 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,269,339 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,285,207 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,307,487 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
2,055,628 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,199,732 UART:
2,200,124 UART: Running Caliptra ROM ...
2,201,285 UART:
2,201,457 UART: [state] CFI Enabled
2,202,414 UART: [state] LifecycleState = Unprovisioned
2,204,066 UART: [state] DebugLocked = No
2,205,104 UART: [state] WD Timer not started. Device not locked for debugging
2,207,746 UART: [kat] SHA2-256
2,208,420 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,211,455 UART: [kat] ++
2,211,907 UART: [kat] sha1
2,212,418 UART: [kat] SHA2-256
2,213,163 UART: [kat] SHA2-384
2,213,924 UART: [kat] SHA2-512-ACC
2,214,721 UART: [kat] ECC-384
3,774,214 UART: [kat] HMAC-384Kdf
3,801,145 UART: [kat] LMS
4,874,335 UART: [kat] --
4,878,731 UART: [cold-reset] ++
4,880,022 UART: [fht] FHT @ 0x50003400
4,890,250 UART: [idev] ++
4,890,931 UART: [idev] CDI.KEYID = 6
4,892,163 UART: [idev] SUBJECT.KEYID = 7
4,893,286 UART: [idev] UDS.KEYID = 0
4,927,200 UART: [idev] Erasing UDS.KEYID = 0
8,239,259 UART: [idev] Sha1 KeyId Algorithm
8,261,682 UART: [idev] --
8,265,139 UART: [ldev] ++
8,265,711 UART: [ldev] CDI.KEYID = 6
8,266,948 UART: [ldev] SUBJECT.KEYID = 5
8,268,061 UART: [ldev] AUTHORITY.KEYID = 7
8,269,220 UART: [ldev] FE.KEYID = 1
8,315,323 UART: [ldev] Erasing FE.KEYID = 1
11,652,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,941 UART: [ldev] --
14,034,762 UART: [fwproc] Wait for Commands...
14,037,077 UART: [fwproc] Recv command 0x46574c44
14,039,341 UART: [fwproc] Recv'd Img size: 114124 bytes
18,113,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,189,028 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,257,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,575,266 >>> mbox cmd response: success
18,578,894 UART: [afmc] ++
18,579,595 UART: [afmc] CDI.KEYID = 6
18,580,703 UART: [afmc] SUBJECT.KEYID = 7
18,581,917 UART: [afmc] AUTHORITY.KEYID = 5
21,945,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,247,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,249,054 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,265,173 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,281,262 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,297,195 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,320,308 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,049,567 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,193,715 UART:
2,194,138 UART: Running Caliptra ROM ...
2,195,317 UART:
2,195,489 UART: [state] CFI Enabled
2,196,442 UART: [state] LifecycleState = Unprovisioned
2,198,078 UART: [state] DebugLocked = No
2,199,205 UART: [state] WD Timer not started. Device not locked for debugging
2,201,690 UART: [kat] SHA2-256
2,202,356 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,205,375 UART: [kat] ++
2,205,825 UART: [kat] sha1
2,206,336 UART: [kat] SHA2-256
2,207,072 UART: [kat] SHA2-384
2,207,738 UART: [kat] SHA2-512-ACC
2,208,567 UART: [kat] ECC-384
3,770,776 UART: [kat] HMAC-384Kdf
3,800,204 UART: [kat] LMS
4,873,322 UART: [kat] --
4,879,801 UART: [cold-reset] ++
4,882,543 UART: [fht] FHT @ 0x50003400
4,892,709 UART: [idev] ++
4,893,444 UART: [idev] CDI.KEYID = 6
4,894,565 UART: [idev] SUBJECT.KEYID = 7
4,895,785 UART: [idev] UDS.KEYID = 0
4,926,367 UART: [idev] Erasing UDS.KEYID = 0
8,240,116 UART: [idev] Sha1 KeyId Algorithm
8,262,375 UART: [idev] --
8,264,800 UART: [ldev] ++
8,265,374 UART: [ldev] CDI.KEYID = 6
8,266,608 UART: [ldev] SUBJECT.KEYID = 5
8,267,762 UART: [ldev] AUTHORITY.KEYID = 7
8,268,987 UART: [ldev] FE.KEYID = 1
8,315,076 UART: [ldev] Erasing FE.KEYID = 1
11,650,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,488 UART: [ldev] --
14,033,781 UART: [fwproc] Wait for Commands...
14,035,453 UART: [fwproc] Recv command 0x46574c44
14,037,718 UART: [fwproc] Recv'd Img size: 114124 bytes
18,103,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,179,574 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,248,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,565,912 >>> mbox cmd response: success
18,570,269 UART: [afmc] ++
18,570,981 UART: [afmc] CDI.KEYID = 6
18,572,215 UART: [afmc] SUBJECT.KEYID = 7
18,573,318 UART: [afmc] AUTHORITY.KEYID = 5
21,944,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,262,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,264,400 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,280,544 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,296,641 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,312,553 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,334,661 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
2,049,883 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,194,061 UART:
2,194,471 UART: Running Caliptra ROM ...
2,195,566 UART:
2,195,719 UART: [state] CFI Enabled
2,196,639 UART: [state] LifecycleState = Unprovisioned
2,198,329 UART: [state] DebugLocked = No
2,199,359 UART: [state] WD Timer not started. Device not locked for debugging
2,201,830 UART: [kat] SHA2-256
2,202,496 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,205,508 UART: [kat] ++
2,205,961 UART: [kat] sha1
2,206,474 UART: [kat] SHA2-256
2,207,136 UART: [kat] SHA2-384
2,207,793 UART: [kat] SHA2-512-ACC
2,208,592 UART: [kat] ECC-384
3,771,012 UART: [kat] HMAC-384Kdf
3,798,861 UART: [kat] LMS
4,872,017 UART: [kat] --
4,876,258 UART: [cold-reset] ++
4,877,873 UART: [fht] FHT @ 0x50003400
4,888,912 UART: [idev] ++
4,889,604 UART: [idev] CDI.KEYID = 6
4,890,791 UART: [idev] SUBJECT.KEYID = 7
4,891,952 UART: [idev] UDS.KEYID = 0
4,924,584 UART: [idev] Erasing UDS.KEYID = 0
8,237,124 UART: [idev] Sha1 KeyId Algorithm
8,258,521 UART: [idev] --
8,263,212 UART: [ldev] ++
8,263,779 UART: [ldev] CDI.KEYID = 6
8,264,935 UART: [ldev] SUBJECT.KEYID = 5
8,266,152 UART: [ldev] AUTHORITY.KEYID = 7
8,267,303 UART: [ldev] FE.KEYID = 1
8,312,223 UART: [ldev] Erasing FE.KEYID = 1
11,645,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,958,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,974,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,990,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,006,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,025,906 UART: [ldev] --
14,031,006 UART: [fwproc] Wait for Commands...
14,033,376 UART: [fwproc] Recv command 0x46574c44
14,035,690 UART: [fwproc] Recv'd Img size: 114124 bytes
18,107,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,180,483 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,249,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,566,434 >>> mbox cmd response: success
18,570,812 UART: [afmc] ++
18,571,513 UART: [afmc] CDI.KEYID = 6
18,572,626 UART: [afmc] SUBJECT.KEYID = 7
18,573,843 UART: [afmc] AUTHORITY.KEYID = 5
21,940,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,237,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,239,247 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,255,419 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,271,541 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,287,338 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,308,453 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 39.02s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
2,055,446 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,353,385 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
2,052,116 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,322,110 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
2,049,173 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,361,566 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
2,048,821 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,346,107 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,627 writing to cptra_bootfsm_go
2,051,105 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,385,668 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,056,119 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,364,017 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
2,051,146 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,337,294 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,505 writing to cptra_bootfsm_go
2,049,816 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,350,395 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,048,839 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,379,688 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
2,053,696 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,364,033 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
2,048,330 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,321,197 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,048,591 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,340,669 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,049,720 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,341,095 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,051,048 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,368,705 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,056,976 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,307,579 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
2,049,792 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,350,566 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,049,447 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,376,739 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
2,049,314 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,322,002 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
2,049,999 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,316,393 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 38.55s
Truncated 107056 bytes from beginning
411,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,728,498 >>> mbox cmd response: success
18,732,380 UART: [afmc] ++
18,733,083 UART: [afmc] CDI.KEYID = 6
18,734,269 UART: [afmc] SUBJECT.KEYID = 7
18,735,424 UART: [afmc] AUTHORITY.KEYID = 5
22,059,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,352,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,354,633 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,370,760 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,386,881 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,402,733 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,426,022 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
2,056,548 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,200,780 UART:
2,201,192 UART: Running Caliptra ROM ...
2,202,282 UART:
2,202,432 UART: [state] CFI Enabled
2,203,390 UART: [state] LifecycleState = Unprovisioned
2,205,047 UART: [state] DebugLocked = No
2,206,070 UART: [state] WD Timer not started. Device not locked for debugging
2,208,541 UART: [kat] SHA2-256
2,209,199 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,195 UART: [kat] ++
2,212,640 UART: [kat] sha1
2,213,143 UART: [kat] SHA2-256
2,213,893 UART: [kat] SHA2-384
2,214,553 UART: [kat] SHA2-512-ACC
2,215,386 UART: [kat] ECC-384
4,101,273 UART: [kat] HMAC-384Kdf
4,113,091 UART: [kat] LMS
5,186,242 UART: [kat] --
5,188,241 UART: [cold-reset] ++
5,189,686 UART: [fht] FHT @ 0x50003400
5,202,129 UART: [idev] ++
5,202,864 UART: [idev] CDI.KEYID = 6
5,203,975 UART: [idev] SUBJECT.KEYID = 7
5,205,514 UART: [idev] UDS.KEYID = 0
5,223,598 UART: [idev] Erasing UDS.KEYID = 0
8,494,832 UART: [idev] Sha1 KeyId Algorithm
8,517,318 UART: [idev] --
8,520,826 UART: [ldev] ++
8,521,464 UART: [ldev] CDI.KEYID = 6
8,522,641 UART: [ldev] SUBJECT.KEYID = 5
8,524,068 UART: [ldev] AUTHORITY.KEYID = 7
8,525,712 UART: [ldev] FE.KEYID = 1
8,536,333 UART: [ldev] Erasing FE.KEYID = 1
11,825,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,307 UART: [ldev] --
14,192,728 UART: [fwproc] Wait for Commands...
14,195,257 UART: [fwproc] Recv command 0x46574c44
14,197,569 UART: [fwproc] Recv'd Img size: 114124 bytes
18,264,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,334,304 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,403,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,720,285 >>> mbox cmd response: success
18,724,338 UART: [afmc] ++
18,725,030 UART: [afmc] CDI.KEYID = 6
18,726,130 UART: [afmc] SUBJECT.KEYID = 7
18,727,391 UART: [afmc] AUTHORITY.KEYID = 5
22,044,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,339,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,341,700 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,357,825 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,373,941 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,389,786 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,411,708 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,053,710 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,198,437 UART:
2,198,857 UART: Running Caliptra ROM ...
2,200,030 UART:
2,200,201 UART: [state] CFI Enabled
2,201,164 UART: [state] LifecycleState = Unprovisioned
2,202,816 UART: [state] DebugLocked = No
2,203,917 UART: [state] WD Timer not started. Device not locked for debugging
2,206,388 UART: [kat] SHA2-256
2,207,052 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,067 UART: [kat] ++
2,210,513 UART: [kat] sha1
2,211,130 UART: [kat] SHA2-256
2,211,790 UART: [kat] SHA2-384
2,212,441 UART: [kat] SHA2-512-ACC
2,213,322 UART: [kat] ECC-384
4,102,424 UART: [kat] HMAC-384Kdf
4,113,356 UART: [kat] LMS
5,186,504 UART: [kat] --
5,191,868 UART: [cold-reset] ++
5,193,080 UART: [fht] FHT @ 0x50003400
5,204,714 UART: [idev] ++
5,205,391 UART: [idev] CDI.KEYID = 6
5,206,622 UART: [idev] SUBJECT.KEYID = 7
5,208,049 UART: [idev] UDS.KEYID = 0
5,223,160 UART: [idev] Erasing UDS.KEYID = 0
8,493,430 UART: [idev] Sha1 KeyId Algorithm
8,515,205 UART: [idev] --
8,519,060 UART: [ldev] ++
8,519,627 UART: [ldev] CDI.KEYID = 6
8,520,781 UART: [ldev] SUBJECT.KEYID = 5
8,522,315 UART: [ldev] AUTHORITY.KEYID = 7
8,523,871 UART: [ldev] FE.KEYID = 1
8,536,514 UART: [ldev] Erasing FE.KEYID = 1
11,827,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,822 UART: [ldev] --
14,194,052 UART: [fwproc] Wait for Commands...
14,195,983 UART: [fwproc] Recv command 0x46574c44
14,198,299 UART: [fwproc] Recv'd Img size: 114124 bytes
18,269,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,344,360 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,413,174 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,730,061 >>> mbox cmd response: success
18,733,709 UART: [afmc] ++
18,734,408 UART: [afmc] CDI.KEYID = 6
18,735,512 UART: [afmc] SUBJECT.KEYID = 7
18,736,719 UART: [afmc] AUTHORITY.KEYID = 5
22,052,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,347,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,349,059 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,365,197 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,381,265 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,397,154 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,421,109 UART: [afmc] --
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,054,488 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,198,730 UART:
2,199,123 UART: Running Caliptra ROM ...
2,200,290 UART:
2,200,455 UART: [state] CFI Enabled
2,201,411 UART: [state] LifecycleState = Unprovisioned
2,203,060 UART: [state] DebugLocked = No
2,204,165 UART: [state] WD Timer not started. Device not locked for debugging
2,206,631 UART: [kat] SHA2-256
2,207,295 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,299 UART: [kat] ++
2,210,763 UART: [kat] sha1
2,211,317 UART: [kat] SHA2-256
2,211,968 UART: [kat] SHA2-384
2,212,616 UART: [kat] SHA2-512-ACC
2,213,597 UART: [kat] ECC-384
4,097,796 UART: [kat] HMAC-384Kdf
4,110,802 UART: [kat] LMS
5,183,965 UART: [kat] --
5,189,706 UART: [cold-reset] ++
5,191,904 UART: [fht] FHT @ 0x50003400
5,203,577 UART: [idev] ++
5,204,248 UART: [idev] CDI.KEYID = 6
5,205,477 UART: [idev] SUBJECT.KEYID = 7
5,206,916 UART: [idev] UDS.KEYID = 0
5,223,429 UART: [idev] Erasing UDS.KEYID = 0
8,498,671 UART: [idev] Sha1 KeyId Algorithm
8,520,676 UART: [idev] --
8,524,131 UART: [ldev] ++
8,524,694 UART: [ldev] CDI.KEYID = 6
8,525,851 UART: [ldev] SUBJECT.KEYID = 5
8,527,382 UART: [ldev] AUTHORITY.KEYID = 7
8,528,858 UART: [ldev] FE.KEYID = 1
8,540,693 UART: [ldev] Erasing FE.KEYID = 1
11,832,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,017 UART: [ldev] --
14,198,631 UART: [fwproc] Wait for Commands...
14,201,370 UART: [fwproc] Recv command 0x46574c44
14,203,687 UART: [fwproc] Recv'd Img size: 114124 bytes
18,268,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,344,930 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,413,748 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,731,013 >>> mbox cmd response: success
18,735,611 UART: [afmc] ++
18,736,315 UART: [afmc] CDI.KEYID = 6
18,737,564 UART: [afmc] SUBJECT.KEYID = 7
18,738,670 UART: [afmc] AUTHORITY.KEYID = 5
22,053,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,349,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,351,508 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,367,652 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,383,762 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,399,575 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,423,653 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 39.18s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,055,217 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,530,542 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,060,975 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,528,865 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,053,485 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,541,311 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,054,881 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,537,876 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,058,776 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,541,661 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,053,326 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,526,691 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,058,407 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,530,462 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
2,055,061 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,524,731 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,052,849 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,541,272 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
2,057,628 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,525,777 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,052,742 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,538,970 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,919 writing to cptra_bootfsm_go
2,053,184 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,532,533 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
2,054,904 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,533,406 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,053,361 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,547,173 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
2,054,979 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,551,585 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,055,430 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,544,405 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,053,517 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,542,380 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,059,861 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,522,520 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
2,056,156 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,533,713 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 38.76s
Truncated 107056 bytes from beginning
953,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,271,290 >>> mbox cmd response: success
14,275,548 UART: [afmc] ++
14,276,137 UART: [afmc] CDI.KEYID = 6
14,277,052 UART: [afmc] SUBJECT.KEYID = 7
14,278,217 UART: [afmc] AUTHORITY.KEYID = 5
16,820,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,379 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,565,339 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,581,165 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,596,943 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,620,128 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
2,057,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,203,089 UART:
2,203,511 UART: Running Caliptra ROM ...
2,204,690 UART:
2,204,865 UART: [state] CFI Enabled
2,205,828 UART: [state] LifecycleState = Unprovisioned
2,207,467 UART: [state] DebugLocked = No
2,208,581 UART: [state] WD Timer not started. Device not locked for debugging
2,211,088 UART: [kat] SHA2-256
2,211,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,787 UART: [kat] ++
2,215,242 UART: [kat] sha1
2,215,754 UART: [kat] SHA2-256
2,216,408 UART: [kat] SHA2-384
2,217,111 UART: [kat] SHA2-512-ACC
2,217,946 UART: [kat] ECC-384
2,943,990 UART: [kat] HMAC-384Kdf
2,968,265 UART: [kat] LMS
3,497,701 UART: [kat] --
3,503,698 UART: [cold-reset] ++
3,505,200 UART: [fht] FHT @ 0x50003400
3,517,265 UART: [idev] ++
3,517,828 UART: [idev] CDI.KEYID = 6
3,518,731 UART: [idev] SUBJECT.KEYID = 7
3,519,967 UART: [idev] UDS.KEYID = 0
3,540,481 UART: [idev] Erasing UDS.KEYID = 0
6,022,995 UART: [idev] Sha1 KeyId Algorithm
6,046,504 UART: [idev] --
6,050,031 UART: [ldev] ++
6,050,610 UART: [ldev] CDI.KEYID = 6
6,051,529 UART: [ldev] SUBJECT.KEYID = 5
6,052,694 UART: [ldev] AUTHORITY.KEYID = 7
6,053,929 UART: [ldev] FE.KEYID = 1
6,095,547 UART: [ldev] Erasing FE.KEYID = 1
8,600,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,865 UART: [ldev] --
10,409,450 UART: [fwproc] Wait for Commands...
10,411,322 UART: [fwproc] Recv command 0x46574c44
10,413,164 UART: [fwproc] Recv'd Img size: 114448 bytes
13,812,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,887,819 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,275,860 >>> mbox cmd response: success
14,280,205 UART: [afmc] ++
14,280,787 UART: [afmc] CDI.KEYID = 6
14,281,691 UART: [afmc] SUBJECT.KEYID = 7
14,282,850 UART: [afmc] AUTHORITY.KEYID = 5
16,823,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,919 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,566,868 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,582,725 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,598,467 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,620,391 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,054,293 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,199,246 UART:
2,199,657 UART: Running Caliptra ROM ...
2,200,947 UART:
2,201,112 UART: [state] CFI Enabled
2,202,095 UART: [state] LifecycleState = Unprovisioned
2,203,669 UART: [state] DebugLocked = No
2,204,714 UART: [state] WD Timer not started. Device not locked for debugging
2,207,188 UART: [kat] SHA2-256
2,207,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,870 UART: [kat] ++
2,211,321 UART: [kat] sha1
2,211,830 UART: [kat] SHA2-256
2,212,487 UART: [kat] SHA2-384
2,213,140 UART: [kat] SHA2-512-ACC
2,213,986 UART: [kat] ECC-384
2,946,288 UART: [kat] HMAC-384Kdf
2,968,211 UART: [kat] LMS
3,497,662 UART: [kat] --
3,502,908 UART: [cold-reset] ++
3,504,139 UART: [fht] FHT @ 0x50003400
3,515,120 UART: [idev] ++
3,515,682 UART: [idev] CDI.KEYID = 6
3,516,663 UART: [idev] SUBJECT.KEYID = 7
3,517,824 UART: [idev] UDS.KEYID = 0
3,541,419 UART: [idev] Erasing UDS.KEYID = 0
6,022,452 UART: [idev] Sha1 KeyId Algorithm
6,043,843 UART: [idev] --
6,047,278 UART: [ldev] ++
6,047,859 UART: [ldev] CDI.KEYID = 6
6,048,770 UART: [ldev] SUBJECT.KEYID = 5
6,049,933 UART: [ldev] AUTHORITY.KEYID = 7
6,051,172 UART: [ldev] FE.KEYID = 1
6,077,863 UART: [ldev] Erasing FE.KEYID = 1
8,583,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,599 UART: [ldev] --
10,389,634 UART: [fwproc] Wait for Commands...
10,392,006 UART: [fwproc] Recv command 0x46574c44
10,394,109 UART: [fwproc] Recv'd Img size: 114448 bytes
13,786,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,860,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,928,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,247,414 >>> mbox cmd response: success
14,251,718 UART: [afmc] ++
14,252,312 UART: [afmc] CDI.KEYID = 6
14,253,224 UART: [afmc] SUBJECT.KEYID = 7
14,254,384 UART: [afmc] AUTHORITY.KEYID = 5
16,784,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,481 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,526,466 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,542,276 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,558,056 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,579,769 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
2,056,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,471 UART:
2,201,903 UART: Running Caliptra ROM ...
2,203,047 UART:
2,203,218 UART: [state] CFI Enabled
2,204,189 UART: [state] LifecycleState = Unprovisioned
2,205,860 UART: [state] DebugLocked = No
2,206,973 UART: [state] WD Timer not started. Device not locked for debugging
2,209,450 UART: [kat] SHA2-256
2,210,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,141 UART: [kat] ++
2,213,592 UART: [kat] sha1
2,214,106 UART: [kat] SHA2-256
2,214,762 UART: [kat] SHA2-384
2,215,416 UART: [kat] SHA2-512-ACC
2,216,217 UART: [kat] ECC-384
2,945,467 UART: [kat] HMAC-384Kdf
2,967,931 UART: [kat] LMS
3,497,416 UART: [kat] --
3,502,488 UART: [cold-reset] ++
3,503,770 UART: [fht] FHT @ 0x50003400
3,515,185 UART: [idev] ++
3,515,778 UART: [idev] CDI.KEYID = 6
3,516,690 UART: [idev] SUBJECT.KEYID = 7
3,517,854 UART: [idev] UDS.KEYID = 0
3,540,794 UART: [idev] Erasing UDS.KEYID = 0
6,023,293 UART: [idev] Sha1 KeyId Algorithm
6,047,418 UART: [idev] --
6,051,065 UART: [ldev] ++
6,051,651 UART: [ldev] CDI.KEYID = 6
6,052,564 UART: [ldev] SUBJECT.KEYID = 5
6,053,728 UART: [ldev] AUTHORITY.KEYID = 7
6,054,965 UART: [ldev] FE.KEYID = 1
6,096,129 UART: [ldev] Erasing FE.KEYID = 1
8,602,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,078 UART: [ldev] --
10,410,346 UART: [fwproc] Wait for Commands...
10,411,957 UART: [fwproc] Recv command 0x46574c44
10,414,064 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,886,880 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,274,465 >>> mbox cmd response: success
14,278,019 UART: [afmc] ++
14,278,616 UART: [afmc] CDI.KEYID = 6
14,279,528 UART: [afmc] SUBJECT.KEYID = 7
14,280,690 UART: [afmc] AUTHORITY.KEYID = 5
16,819,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,368 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,564,344 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,580,143 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,595,968 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,619,290 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.88s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,058,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,025,275 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
2,052,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,045,102 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,051,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,973 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
2,072,350 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,059,384 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
2,055,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,088,541 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,062,103 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,059,269 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
2,055,393 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,048,396 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
2,053,864 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,092,235 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,052,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,081,399 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
2,050,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,022,596 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
2,052,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,047,414 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
2,054,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,058,438 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
2,058,220 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,037,162 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
2,050,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,074,501 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
2,051,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,021,361 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,050,115 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,064,043 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,052,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,043,886 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,054,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,047,894 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,060,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,060,274 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.44s
Truncated 107056 bytes from beginning
170,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,391 >>> mbox cmd response: success
14,493,431 UART: [afmc] ++
14,494,024 UART: [afmc] CDI.KEYID = 6
14,494,940 UART: [afmc] SUBJECT.KEYID = 7
14,496,037 UART: [afmc] AUTHORITY.KEYID = 5
16,996,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,185 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,733,145 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,748,972 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,764,775 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,788,068 UART: [afmc] --
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,055,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,199,820 UART:
2,200,222 UART: Running Caliptra ROM ...
2,201,404 UART:
2,201,592 UART: [state] CFI Enabled
2,202,549 UART: [state] LifecycleState = Unprovisioned
2,204,220 UART: [state] DebugLocked = No
2,205,326 UART: [state] WD Timer not started. Device not locked for debugging
2,207,795 UART: [kat] SHA2-256
2,208,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,471 UART: [kat] ++
2,211,920 UART: [kat] sha1
2,212,453 UART: [kat] SHA2-256
2,213,194 UART: [kat] SHA2-384
2,213,858 UART: [kat] SHA2-512-ACC
2,214,690 UART: [kat] ECC-384
3,278,254 UART: [kat] HMAC-384Kdf
3,291,233 UART: [kat] LMS
3,820,762 UART: [kat] --
3,826,350 UART: [cold-reset] ++
3,827,577 UART: [fht] FHT @ 0x50003400
3,838,400 UART: [idev] ++
3,838,964 UART: [idev] CDI.KEYID = 6
3,839,842 UART: [idev] SUBJECT.KEYID = 7
3,841,052 UART: [idev] UDS.KEYID = 0
3,854,544 UART: [idev] Erasing UDS.KEYID = 0
6,310,724 UART: [idev] Sha1 KeyId Algorithm
6,334,329 UART: [idev] --
6,338,529 UART: [ldev] ++
6,339,115 UART: [ldev] CDI.KEYID = 6
6,339,997 UART: [ldev] SUBJECT.KEYID = 5
6,341,152 UART: [ldev] AUTHORITY.KEYID = 7
6,342,360 UART: [ldev] FE.KEYID = 1
6,355,319 UART: [ldev] Erasing FE.KEYID = 1
8,833,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,889 UART: [ldev] --
10,621,907 UART: [fwproc] Wait for Commands...
10,623,845 UART: [fwproc] Recv command 0x46574c44
10,625,936 UART: [fwproc] Recv'd Img size: 114448 bytes
14,021,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,091,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,412 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,478,210 >>> mbox cmd response: success
14,482,679 UART: [afmc] ++
14,483,266 UART: [afmc] CDI.KEYID = 6
14,484,175 UART: [afmc] SUBJECT.KEYID = 7
14,485,333 UART: [afmc] AUTHORITY.KEYID = 5
16,985,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,426 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,724,415 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,740,277 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,756,010 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,779,412 UART: [afmc] --
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,055,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,199,705 UART:
2,200,114 UART: Running Caliptra ROM ...
2,201,286 UART:
2,201,457 UART: [state] CFI Enabled
2,202,410 UART: [state] LifecycleState = Unprovisioned
2,204,293 UART: [state] DebugLocked = No
2,205,372 UART: [state] WD Timer not started. Device not locked for debugging
2,207,860 UART: [kat] SHA2-256
2,208,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,536 UART: [kat] ++
2,212,003 UART: [kat] sha1
2,212,524 UART: [kat] SHA2-256
2,213,184 UART: [kat] SHA2-384
2,213,841 UART: [kat] SHA2-512-ACC
2,214,686 UART: [kat] ECC-384
3,281,143 UART: [kat] HMAC-384Kdf
3,294,075 UART: [kat] LMS
3,823,572 UART: [kat] --
3,827,805 UART: [cold-reset] ++
3,829,473 UART: [fht] FHT @ 0x50003400
3,840,722 UART: [idev] ++
3,841,285 UART: [idev] CDI.KEYID = 6
3,842,298 UART: [idev] SUBJECT.KEYID = 7
3,843,452 UART: [idev] UDS.KEYID = 0
3,860,073 UART: [idev] Erasing UDS.KEYID = 0
6,314,786 UART: [idev] Sha1 KeyId Algorithm
6,337,391 UART: [idev] --
6,341,596 UART: [ldev] ++
6,342,161 UART: [ldev] CDI.KEYID = 6
6,343,071 UART: [ldev] SUBJECT.KEYID = 5
6,344,230 UART: [ldev] AUTHORITY.KEYID = 7
6,345,512 UART: [ldev] FE.KEYID = 1
6,354,642 UART: [ldev] Erasing FE.KEYID = 1
8,829,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,429 UART: [ldev] --
10,617,894 UART: [fwproc] Wait for Commands...
10,620,270 UART: [fwproc] Recv command 0x46574c44
10,622,364 UART: [fwproc] Recv'd Img size: 114448 bytes
14,021,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,092,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,863 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,479,356 >>> mbox cmd response: success
14,483,136 UART: [afmc] ++
14,483,723 UART: [afmc] CDI.KEYID = 6
14,484,637 UART: [afmc] SUBJECT.KEYID = 7
14,485,797 UART: [afmc] AUTHORITY.KEYID = 5
16,986,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,413 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,276 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,726,200 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,742,064 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,757,816 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,779,732 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
2,054,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,196 UART:
2,200,612 UART: Running Caliptra ROM ...
2,201,730 UART:
2,201,896 UART: [state] CFI Enabled
2,202,866 UART: [state] LifecycleState = Unprovisioned
2,204,530 UART: [state] DebugLocked = No
2,205,560 UART: [state] WD Timer not started. Device not locked for debugging
2,208,044 UART: [kat] SHA2-256
2,208,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,745 UART: [kat] ++
2,212,195 UART: [kat] sha1
2,212,705 UART: [kat] SHA2-256
2,213,448 UART: [kat] SHA2-384
2,214,114 UART: [kat] SHA2-512-ACC
2,214,997 UART: [kat] ECC-384
3,280,588 UART: [kat] HMAC-384Kdf
3,293,307 UART: [kat] LMS
3,822,834 UART: [kat] --
3,826,336 UART: [cold-reset] ++
3,828,529 UART: [fht] FHT @ 0x50003400
3,839,721 UART: [idev] ++
3,840,323 UART: [idev] CDI.KEYID = 6
3,841,209 UART: [idev] SUBJECT.KEYID = 7
3,842,422 UART: [idev] UDS.KEYID = 0
3,857,534 UART: [idev] Erasing UDS.KEYID = 0
6,314,644 UART: [idev] Sha1 KeyId Algorithm
6,338,043 UART: [idev] --
6,341,607 UART: [ldev] ++
6,342,174 UART: [ldev] CDI.KEYID = 6
6,343,136 UART: [ldev] SUBJECT.KEYID = 5
6,344,290 UART: [ldev] AUTHORITY.KEYID = 7
6,345,572 UART: [ldev] FE.KEYID = 1
6,358,105 UART: [ldev] Erasing FE.KEYID = 1
8,833,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,181 UART: [ldev] --
10,623,906 UART: [fwproc] Wait for Commands...
10,626,488 UART: [fwproc] Recv command 0x46574c44
10,628,599 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,108,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,495,739 >>> mbox cmd response: success
14,500,769 UART: [afmc] ++
14,501,353 UART: [afmc] CDI.KEYID = 6
14,502,259 UART: [afmc] SUBJECT.KEYID = 7
14,503,470 UART: [afmc] AUTHORITY.KEYID = 5
17,003,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,071 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,739,057 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,754,919 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,770,659 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,792,809 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 30.17s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
2,059,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,281 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,054,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,870 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
2,054,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,784 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,054,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,549 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,054,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,264,135 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,054,526 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,258,102 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,055,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,278,339 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,054,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,616 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,057,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,713 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,053,465 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,283,273 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
2,054,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,284,518 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
2,054,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,324 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
2,060,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,892 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
2,053,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,286,626 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
2,055,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,545 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,054,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,752 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
2,053,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,262,853 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
2,053,755 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,902 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
2,054,336 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,003 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.72s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,052,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,056,169 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
2,058,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,043,063 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,051,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,035,817 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,065,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,494 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,051,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,077,033 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,063,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,070,885 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,053,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,906 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
2,052,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,988 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
2,050,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,088,840 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,052,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,071,321 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,050,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,061,519 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,056,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,002,810 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
2,053,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,082,492 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
2,065,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,062,610 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,054,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,063,609 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,053,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,040,006 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
2,059,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,043 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
2,049,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,089,526 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
2,058,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,037,888 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.44s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
2,054,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,987 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,053,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,759 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,058,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,970 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
2,053,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,643 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
2,054,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,154 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,058,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,279 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,055,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,357 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
2,061,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,588 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
2,053,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,376 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,054,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,210 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,697 writing to cptra_bootfsm_go
2,052,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,670 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,059,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,573 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
2,053,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,857 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,064,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,431 >>> mbox cmd response: success
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,053,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,263 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,055,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,163 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,056,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,563 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,057,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,472 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
2,054,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,257,214 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.71s
Truncated 104976 bytes from beginning
4
1,282,208 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,733 >>> mbox cmd response: success
2,774,882 UART: [afmc] ++
2,775,050 UART: [afmc] CDI.KEYID = 6
2,775,413 UART: [afmc] SUBJECT.KEYID = 7
2,775,839 UART: [afmc] AUTHORITY.KEYID = 5
2,811,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,812 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,563 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,276 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,185 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,899 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,512 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
916,108 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,597 UART: [cold-reset] ++
1,170,037 UART: [fht] FHT @ 0x50003400
1,172,621 UART: [idev] ++
1,172,789 UART: [idev] CDI.KEYID = 6
1,173,150 UART: [idev] SUBJECT.KEYID = 7
1,173,575 UART: [idev] UDS.KEYID = 0
1,181,759 UART: [idev] Erasing UDS.KEYID = 0
1,198,771 UART: [idev] Sha1 KeyId Algorithm
1,207,759 UART: [idev] --
1,208,850 UART: [ldev] ++
1,209,018 UART: [ldev] CDI.KEYID = 6
1,209,382 UART: [ldev] SUBJECT.KEYID = 5
1,209,809 UART: [ldev] AUTHORITY.KEYID = 7
1,210,272 UART: [ldev] FE.KEYID = 1
1,215,130 UART: [ldev] Erasing FE.KEYID = 1
1,241,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,014 UART: [ldev] --
1,280,394 UART: [fwproc] Wait for Commands...
1,280,989 UART: [fwproc] Recv command 0x46574c44
1,281,722 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,035 >>> mbox cmd response: success
2,774,224 UART: [afmc] ++
2,774,392 UART: [afmc] CDI.KEYID = 6
2,774,755 UART: [afmc] SUBJECT.KEYID = 7
2,775,181 UART: [afmc] AUTHORITY.KEYID = 5
2,810,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,793 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,506 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,415 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,129 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,140 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,436 UART: [kat] HMAC-384Kdf
921,262 UART: [kat] LMS
1,169,574 UART: [kat] --
1,170,445 UART: [cold-reset] ++
1,170,853 UART: [fht] FHT @ 0x50003400
1,173,381 UART: [idev] ++
1,173,549 UART: [idev] CDI.KEYID = 6
1,173,910 UART: [idev] SUBJECT.KEYID = 7
1,174,335 UART: [idev] UDS.KEYID = 0
1,182,171 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,208,019 UART: [idev] --
1,209,120 UART: [ldev] ++
1,209,288 UART: [ldev] CDI.KEYID = 6
1,209,652 UART: [ldev] SUBJECT.KEYID = 5
1,210,079 UART: [ldev] AUTHORITY.KEYID = 7
1,210,542 UART: [ldev] FE.KEYID = 1
1,215,940 UART: [ldev] Erasing FE.KEYID = 1
1,242,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,126 UART: [fwproc] Wait for Commands...
1,281,915 UART: [fwproc] Recv command 0x46574c44
1,282,648 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,874 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,183 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,305 >>> mbox cmd response: success
2,775,344 UART: [afmc] ++
2,775,512 UART: [afmc] CDI.KEYID = 6
2,775,875 UART: [afmc] SUBJECT.KEYID = 7
2,776,301 UART: [afmc] AUTHORITY.KEYID = 5
2,812,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,637 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,350 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,259 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,973 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,728 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
916,422 UART: [kat] HMAC-384Kdf
921,120 UART: [kat] LMS
1,169,432 UART: [kat] --
1,170,333 UART: [cold-reset] ++
1,170,859 UART: [fht] FHT @ 0x50003400
1,173,569 UART: [idev] ++
1,173,737 UART: [idev] CDI.KEYID = 6
1,174,098 UART: [idev] SUBJECT.KEYID = 7
1,174,523 UART: [idev] UDS.KEYID = 0
1,182,571 UART: [idev] Erasing UDS.KEYID = 0
1,199,463 UART: [idev] Sha1 KeyId Algorithm
1,208,269 UART: [idev] --
1,209,132 UART: [ldev] ++
1,209,300 UART: [ldev] CDI.KEYID = 6
1,209,664 UART: [ldev] SUBJECT.KEYID = 5
1,210,091 UART: [ldev] AUTHORITY.KEYID = 7
1,210,554 UART: [ldev] FE.KEYID = 1
1,215,708 UART: [ldev] Erasing FE.KEYID = 1
1,241,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,372 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,561 UART: [fwproc] Recv command 0x46574c44
1,282,294 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,835 >>> mbox cmd response: success
2,775,010 UART: [afmc] ++
2,775,178 UART: [afmc] CDI.KEYID = 6
2,775,541 UART: [afmc] SUBJECT.KEYID = 7
2,775,967 UART: [afmc] AUTHORITY.KEYID = 5
2,811,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,623 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,336 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,245 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,959 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,006 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 33.42s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,881 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,251 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,161 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,485 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,789 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,853 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,620,371 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,699 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,543 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,389 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,971 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,061 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,367 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,923 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,391 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,617 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,995 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,931 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,891 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,601 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,025 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.01s
Truncated 104976 bytes from beginning
4
1,282,899 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,038 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,974 >>> mbox cmd response: success
2,775,091 UART: [afmc] ++
2,775,259 UART: [afmc] CDI.KEYID = 6
2,775,622 UART: [afmc] SUBJECT.KEYID = 7
2,776,048 UART: [afmc] AUTHORITY.KEYID = 5
2,811,335 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,694 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,407 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,316 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,030 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,995 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,023 UART: [state] LifecycleState = Unprovisioned
85,678 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,289 UART: [kat] SHA2-512-ACC
906,190 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,289 UART: [kat] LMS
1,169,601 UART: [kat] --
1,170,372 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,552 UART: [idev] ++
1,173,720 UART: [idev] CDI.KEYID = 6
1,174,081 UART: [idev] SUBJECT.KEYID = 7
1,174,506 UART: [idev] UDS.KEYID = 0
1,182,644 UART: [idev] Erasing UDS.KEYID = 0
1,199,770 UART: [idev] Sha1 KeyId Algorithm
1,208,496 UART: [idev] --
1,209,591 UART: [ldev] ++
1,209,759 UART: [ldev] CDI.KEYID = 6
1,210,123 UART: [ldev] SUBJECT.KEYID = 5
1,210,550 UART: [ldev] AUTHORITY.KEYID = 7
1,211,013 UART: [ldev] FE.KEYID = 1
1,216,029 UART: [ldev] Erasing FE.KEYID = 1
1,242,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,309 UART: [ldev] --
1,281,819 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,333 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,885 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,148 >>> mbox cmd response: success
2,776,371 UART: [afmc] ++
2,776,539 UART: [afmc] CDI.KEYID = 6
2,776,902 UART: [afmc] SUBJECT.KEYID = 7
2,777,328 UART: [afmc] AUTHORITY.KEYID = 5
2,813,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,920 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,633 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,542 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,848,256 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,959 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
891,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,722 UART: [kat] ++
895,874 UART: [kat] sha1
900,318 UART: [kat] SHA2-256
902,258 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,125 UART: [kat] LMS
1,169,437 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,882 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,899 UART: [idev] SUBJECT.KEYID = 7
1,174,324 UART: [idev] UDS.KEYID = 0
1,182,550 UART: [idev] Erasing UDS.KEYID = 0
1,199,360 UART: [idev] Sha1 KeyId Algorithm
1,208,116 UART: [idev] --
1,209,231 UART: [ldev] ++
1,209,399 UART: [ldev] CDI.KEYID = 6
1,209,763 UART: [ldev] SUBJECT.KEYID = 5
1,210,190 UART: [ldev] AUTHORITY.KEYID = 7
1,210,653 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,067 UART: [ldev] --
1,282,345 UART: [fwproc] Wait for Commands...
1,282,994 UART: [fwproc] Recv command 0x46574c44
1,283,727 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,927 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,146 >>> mbox cmd response: success
2,776,233 UART: [afmc] ++
2,776,401 UART: [afmc] CDI.KEYID = 6
2,776,764 UART: [afmc] SUBJECT.KEYID = 7
2,777,190 UART: [afmc] AUTHORITY.KEYID = 5
2,813,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,420 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,133 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,042 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,847,756 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,469 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,407 UART: [kat] SHA2-512-ACC
906,308 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
920,935 UART: [kat] LMS
1,169,247 UART: [kat] --
1,170,070 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,173,308 UART: [idev] ++
1,173,476 UART: [idev] CDI.KEYID = 6
1,173,837 UART: [idev] SUBJECT.KEYID = 7
1,174,262 UART: [idev] UDS.KEYID = 0
1,182,152 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,606 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,265 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,599 UART: [ldev] Erasing FE.KEYID = 1
1,243,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,191 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,114 UART: [fwproc] Recv command 0x46574c44
1,283,847 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,104 >>> mbox cmd response: success
2,776,263 UART: [afmc] ++
2,776,431 UART: [afmc] CDI.KEYID = 6
2,776,794 UART: [afmc] SUBJECT.KEYID = 7
2,777,220 UART: [afmc] AUTHORITY.KEYID = 5
2,813,391 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,758 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,471 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,380 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,848,094 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,856,069 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.89s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,854 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,102 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,408 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,778 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,156 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,392 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,540 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,296 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,088 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,314 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,878 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,862 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,560 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,508 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,672 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,728 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,484 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,442 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,182 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,838 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,964 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.60s
Truncated 104976 bytes from beginning
4
1,283,390 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,867 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,847 >>> mbox cmd response: success
2,775,960 UART: [afmc] ++
2,776,128 UART: [afmc] CDI.KEYID = 6
2,776,491 UART: [afmc] SUBJECT.KEYID = 7
2,776,917 UART: [afmc] AUTHORITY.KEYID = 5
2,811,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,005 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,718 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,627 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,341 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,282 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
916,522 UART: [kat] HMAC-384Kdf
921,042 UART: [kat] LMS
1,169,354 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,285 UART: [idev] ++
1,173,453 UART: [idev] CDI.KEYID = 6
1,173,814 UART: [idev] SUBJECT.KEYID = 7
1,174,239 UART: [idev] UDS.KEYID = 0
1,182,567 UART: [idev] Erasing UDS.KEYID = 0
1,199,579 UART: [idev] Sha1 KeyId Algorithm
1,208,293 UART: [idev] --
1,209,324 UART: [ldev] ++
1,209,492 UART: [ldev] CDI.KEYID = 6
1,209,856 UART: [ldev] SUBJECT.KEYID = 5
1,210,283 UART: [ldev] AUTHORITY.KEYID = 7
1,210,746 UART: [ldev] FE.KEYID = 1
1,216,096 UART: [ldev] Erasing FE.KEYID = 1
1,242,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,130 UART: [ldev] --
1,281,638 UART: [fwproc] Wait for Commands...
1,282,281 UART: [fwproc] Recv command 0x46574c44
1,283,014 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,669 >>> mbox cmd response: success
2,775,874 UART: [afmc] ++
2,776,042 UART: [afmc] CDI.KEYID = 6
2,776,405 UART: [afmc] SUBJECT.KEYID = 7
2,776,831 UART: [afmc] AUTHORITY.KEYID = 5
2,812,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,061 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,774 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,683 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,397 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,386 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,512 UART: [state] LifecycleState = Unprovisioned
85,167 UART: [state] DebugLocked = No
85,697 UART: [state] WD Timer not started. Device not locked for debugging
86,812 UART: [kat] SHA2-256
890,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,491 UART: [kat] ++
894,643 UART: [kat] sha1
898,701 UART: [kat] SHA2-256
900,641 UART: [kat] SHA2-384
903,250 UART: [kat] SHA2-512-ACC
905,151 UART: [kat] ECC-384
914,944 UART: [kat] HMAC-384Kdf
919,662 UART: [kat] LMS
1,167,974 UART: [kat] --
1,169,089 UART: [cold-reset] ++
1,169,429 UART: [fht] FHT @ 0x50003400
1,172,273 UART: [idev] ++
1,172,441 UART: [idev] CDI.KEYID = 6
1,172,802 UART: [idev] SUBJECT.KEYID = 7
1,173,227 UART: [idev] UDS.KEYID = 0
1,181,387 UART: [idev] Erasing UDS.KEYID = 0
1,198,621 UART: [idev] Sha1 KeyId Algorithm
1,207,469 UART: [idev] --
1,208,582 UART: [ldev] ++
1,208,750 UART: [ldev] CDI.KEYID = 6
1,209,114 UART: [ldev] SUBJECT.KEYID = 5
1,209,541 UART: [ldev] AUTHORITY.KEYID = 7
1,210,004 UART: [ldev] FE.KEYID = 1
1,215,132 UART: [ldev] Erasing FE.KEYID = 1
1,241,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,470 UART: [ldev] --
1,280,908 UART: [fwproc] Wait for Commands...
1,281,555 UART: [fwproc] Recv command 0x46574c44
1,282,288 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,610,522 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,831 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,909 >>> mbox cmd response: success
2,777,112 UART: [afmc] ++
2,777,280 UART: [afmc] CDI.KEYID = 6
2,777,643 UART: [afmc] SUBJECT.KEYID = 7
2,778,069 UART: [afmc] AUTHORITY.KEYID = 5
2,813,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,925 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,638 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,547 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,848,261 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,856,186 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,434 UART: [state] LifecycleState = Unprovisioned
85,089 UART: [state] DebugLocked = No
85,675 UART: [state] WD Timer not started. Device not locked for debugging
86,844 UART: [kat] SHA2-256
890,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,523 UART: [kat] ++
894,675 UART: [kat] sha1
898,743 UART: [kat] SHA2-256
900,683 UART: [kat] SHA2-384
903,412 UART: [kat] SHA2-512-ACC
905,313 UART: [kat] ECC-384
915,492 UART: [kat] HMAC-384Kdf
920,154 UART: [kat] LMS
1,168,466 UART: [kat] --
1,169,325 UART: [cold-reset] ++
1,169,837 UART: [fht] FHT @ 0x50003400
1,172,539 UART: [idev] ++
1,172,707 UART: [idev] CDI.KEYID = 6
1,173,068 UART: [idev] SUBJECT.KEYID = 7
1,173,493 UART: [idev] UDS.KEYID = 0
1,181,695 UART: [idev] Erasing UDS.KEYID = 0
1,199,281 UART: [idev] Sha1 KeyId Algorithm
1,208,385 UART: [idev] --
1,209,372 UART: [ldev] ++
1,209,540 UART: [ldev] CDI.KEYID = 6
1,209,904 UART: [ldev] SUBJECT.KEYID = 5
1,210,331 UART: [ldev] AUTHORITY.KEYID = 7
1,210,794 UART: [ldev] FE.KEYID = 1
1,215,882 UART: [ldev] Erasing FE.KEYID = 1
1,242,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,620 UART: [ldev] --
1,282,016 UART: [fwproc] Wait for Commands...
1,282,643 UART: [fwproc] Recv command 0x46574c44
1,283,376 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,091 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,071 >>> mbox cmd response: success
2,776,338 UART: [afmc] ++
2,776,506 UART: [afmc] CDI.KEYID = 6
2,776,869 UART: [afmc] SUBJECT.KEYID = 7
2,777,295 UART: [afmc] AUTHORITY.KEYID = 5
2,812,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,753 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,466 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,375 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,847,089 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,884 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.77s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,751 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,971 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,907 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,903 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,571 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,875 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,499 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,879 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,849 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,659 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,671 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,485 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,661 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,439 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,927 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,393 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,809 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,691 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,287 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,839 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,085 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.84s
Truncated 104976 bytes from beginning
4
1,282,657 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,919 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,318 >>> mbox cmd response: success
2,773,461 UART: [afmc] ++
2,773,629 UART: [afmc] CDI.KEYID = 6
2,773,992 UART: [afmc] SUBJECT.KEYID = 7
2,774,418 UART: [afmc] AUTHORITY.KEYID = 5
2,810,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,368 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,081 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,990 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,704 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,591 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
891,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,800 UART: [kat] ++
895,952 UART: [kat] sha1
900,416 UART: [kat] SHA2-256
902,356 UART: [kat] SHA2-384
905,117 UART: [kat] SHA2-512-ACC
907,018 UART: [kat] ECC-384
916,955 UART: [kat] HMAC-384Kdf
921,557 UART: [kat] LMS
1,169,869 UART: [kat] --
1,170,738 UART: [cold-reset] ++
1,171,166 UART: [fht] FHT @ 0x50003400
1,173,836 UART: [idev] ++
1,174,004 UART: [idev] CDI.KEYID = 6
1,174,365 UART: [idev] SUBJECT.KEYID = 7
1,174,790 UART: [idev] UDS.KEYID = 0
1,182,908 UART: [idev] Erasing UDS.KEYID = 0
1,199,462 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,155 UART: [ldev] ++
1,209,323 UART: [ldev] CDI.KEYID = 6
1,209,687 UART: [ldev] SUBJECT.KEYID = 5
1,210,114 UART: [ldev] AUTHORITY.KEYID = 7
1,210,577 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,785 UART: [fwproc] Wait for Commands...
1,282,510 UART: [fwproc] Recv command 0x46574c44
1,283,243 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,352 >>> mbox cmd response: success
2,775,517 UART: [afmc] ++
2,775,685 UART: [afmc] CDI.KEYID = 6
2,776,048 UART: [afmc] SUBJECT.KEYID = 7
2,776,474 UART: [afmc] AUTHORITY.KEYID = 5
2,812,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,492 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,205 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,114 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,828 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,621 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,564 UART: [kat] SHA2-256
901,504 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
921,039 UART: [kat] LMS
1,169,351 UART: [kat] --
1,170,180 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,240 UART: [idev] ++
1,173,408 UART: [idev] CDI.KEYID = 6
1,173,769 UART: [idev] SUBJECT.KEYID = 7
1,174,194 UART: [idev] UDS.KEYID = 0
1,182,096 UART: [idev] Erasing UDS.KEYID = 0
1,199,526 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,361 UART: [ldev] ++
1,209,529 UART: [ldev] CDI.KEYID = 6
1,209,893 UART: [ldev] SUBJECT.KEYID = 5
1,210,320 UART: [ldev] AUTHORITY.KEYID = 7
1,210,783 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,549 UART: [ldev] --
1,282,861 UART: [fwproc] Wait for Commands...
1,283,620 UART: [fwproc] Recv command 0x46574c44
1,284,353 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,610,397 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,818 >>> mbox cmd response: success
2,776,861 UART: [afmc] ++
2,777,029 UART: [afmc] CDI.KEYID = 6
2,777,392 UART: [afmc] SUBJECT.KEYID = 7
2,777,818 UART: [afmc] AUTHORITY.KEYID = 5
2,813,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,738 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,451 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,360 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,848,074 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,725 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,100 UART: [state] WD Timer not started. Device not locked for debugging
88,291 UART: [kat] SHA2-256
891,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,970 UART: [kat] ++
896,122 UART: [kat] sha1
900,418 UART: [kat] SHA2-256
902,358 UART: [kat] SHA2-384
905,183 UART: [kat] SHA2-512-ACC
907,084 UART: [kat] ECC-384
916,883 UART: [kat] HMAC-384Kdf
921,573 UART: [kat] LMS
1,169,885 UART: [kat] --
1,170,882 UART: [cold-reset] ++
1,171,274 UART: [fht] FHT @ 0x50003400
1,174,018 UART: [idev] ++
1,174,186 UART: [idev] CDI.KEYID = 6
1,174,547 UART: [idev] SUBJECT.KEYID = 7
1,174,972 UART: [idev] UDS.KEYID = 0
1,182,826 UART: [idev] Erasing UDS.KEYID = 0
1,199,774 UART: [idev] Sha1 KeyId Algorithm
1,208,846 UART: [idev] --
1,209,853 UART: [ldev] ++
1,210,021 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,205 UART: [ldev] Erasing FE.KEYID = 1
1,242,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,223 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,605 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,934 >>> mbox cmd response: success
2,775,003 UART: [afmc] ++
2,775,171 UART: [afmc] CDI.KEYID = 6
2,775,534 UART: [afmc] SUBJECT.KEYID = 7
2,775,960 UART: [afmc] AUTHORITY.KEYID = 5
2,812,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,040 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,753 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,662 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,376 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,247 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.09s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,150 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,496 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,380 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,636 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,922 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,606 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,792 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,212 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,318 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,174 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,090 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,730 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,078 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,884 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,436 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,690 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,136 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,694 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,110 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,208 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,836 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.84s
Truncated 104976 bytes from beginning
4
1,280,918 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,839 >>> mbox cmd response: success
2,773,096 UART: [afmc] ++
2,773,264 UART: [afmc] CDI.KEYID = 6
2,773,627 UART: [afmc] SUBJECT.KEYID = 7
2,774,053 UART: [afmc] AUTHORITY.KEYID = 5
2,809,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,325 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,038 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,947 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,661 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,492 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,752 UART: [state] LifecycleState = Unprovisioned
85,407 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,126 UART: [kat] SHA2-256
890,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,805 UART: [kat] ++
894,957 UART: [kat] sha1
899,229 UART: [kat] SHA2-256
901,169 UART: [kat] SHA2-384
904,100 UART: [kat] SHA2-512-ACC
906,001 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,042 UART: [kat] LMS
1,168,354 UART: [kat] --
1,169,419 UART: [cold-reset] ++
1,169,913 UART: [fht] FHT @ 0x50003400
1,172,517 UART: [idev] ++
1,172,685 UART: [idev] CDI.KEYID = 6
1,173,046 UART: [idev] SUBJECT.KEYID = 7
1,173,471 UART: [idev] UDS.KEYID = 0
1,181,449 UART: [idev] Erasing UDS.KEYID = 0
1,198,215 UART: [idev] Sha1 KeyId Algorithm
1,207,295 UART: [idev] --
1,208,450 UART: [ldev] ++
1,208,618 UART: [ldev] CDI.KEYID = 6
1,208,982 UART: [ldev] SUBJECT.KEYID = 5
1,209,409 UART: [ldev] AUTHORITY.KEYID = 7
1,209,872 UART: [ldev] FE.KEYID = 1
1,214,758 UART: [ldev] Erasing FE.KEYID = 1
1,240,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,476 UART: [ldev] --
1,279,820 UART: [fwproc] Wait for Commands...
1,280,505 UART: [fwproc] Recv command 0x46574c44
1,281,238 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,993 >>> mbox cmd response: success
2,774,216 UART: [afmc] ++
2,774,384 UART: [afmc] CDI.KEYID = 6
2,774,747 UART: [afmc] SUBJECT.KEYID = 7
2,775,173 UART: [afmc] AUTHORITY.KEYID = 5
2,810,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,229 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,942 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,851 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,565 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,290 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,311 UART: [kat] SHA2-256
901,251 UART: [kat] SHA2-384
904,196 UART: [kat] SHA2-512-ACC
906,097 UART: [kat] ECC-384
916,018 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,170,019 UART: [cold-reset] ++
1,170,505 UART: [fht] FHT @ 0x50003400
1,173,283 UART: [idev] ++
1,173,451 UART: [idev] CDI.KEYID = 6
1,173,812 UART: [idev] SUBJECT.KEYID = 7
1,174,237 UART: [idev] UDS.KEYID = 0
1,182,423 UART: [idev] Erasing UDS.KEYID = 0
1,199,595 UART: [idev] Sha1 KeyId Algorithm
1,208,411 UART: [idev] --
1,209,532 UART: [ldev] ++
1,209,700 UART: [ldev] CDI.KEYID = 6
1,210,064 UART: [ldev] SUBJECT.KEYID = 5
1,210,491 UART: [ldev] AUTHORITY.KEYID = 7
1,210,954 UART: [ldev] FE.KEYID = 1
1,216,240 UART: [ldev] Erasing FE.KEYID = 1
1,241,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,740 UART: [ldev] --
1,281,164 UART: [fwproc] Wait for Commands...
1,281,819 UART: [fwproc] Recv command 0x46574c44
1,282,552 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,047 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,033 >>> mbox cmd response: success
2,775,290 UART: [afmc] ++
2,775,458 UART: [afmc] CDI.KEYID = 6
2,775,821 UART: [afmc] SUBJECT.KEYID = 7
2,776,247 UART: [afmc] AUTHORITY.KEYID = 5
2,811,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,653 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,366 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,275 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,989 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,678 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,515 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,595 UART: [idev] ++
1,172,763 UART: [idev] CDI.KEYID = 6
1,173,124 UART: [idev] SUBJECT.KEYID = 7
1,173,549 UART: [idev] UDS.KEYID = 0
1,181,203 UART: [idev] Erasing UDS.KEYID = 0
1,198,495 UART: [idev] Sha1 KeyId Algorithm
1,207,273 UART: [idev] --
1,208,444 UART: [ldev] ++
1,208,612 UART: [ldev] CDI.KEYID = 6
1,208,976 UART: [ldev] SUBJECT.KEYID = 5
1,209,403 UART: [ldev] AUTHORITY.KEYID = 7
1,209,866 UART: [ldev] FE.KEYID = 1
1,215,370 UART: [ldev] Erasing FE.KEYID = 1
1,241,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,910 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x46574c44
1,282,340 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,503 >>> mbox cmd response: success
2,774,568 UART: [afmc] ++
2,774,736 UART: [afmc] CDI.KEYID = 6
2,775,099 UART: [afmc] SUBJECT.KEYID = 7
2,775,525 UART: [afmc] AUTHORITY.KEYID = 5
2,810,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,159 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,872 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,781 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,495 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,236 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.88s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,393 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,935 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,933 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,373 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,439 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,449 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,875 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,823 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,553 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,377 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,485 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,579 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,037 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,929 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,203 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,913 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,495 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,101 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,919 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,329 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,383 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.64s
Truncated 104976 bytes from beginning
4
1,283,867 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,612,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,392 >>> mbox cmd response: success
2,778,639 UART: [afmc] ++
2,778,807 UART: [afmc] CDI.KEYID = 6
2,779,170 UART: [afmc] SUBJECT.KEYID = 7
2,779,596 UART: [afmc] AUTHORITY.KEYID = 5
2,815,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,642 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,838,355 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,844,264 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,849,978 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,857,747 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
891,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,458 UART: [kat] SHA2-256
901,398 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
920,991 UART: [kat] LMS
1,169,303 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,316 UART: [idev] ++
1,173,484 UART: [idev] CDI.KEYID = 6
1,173,845 UART: [idev] SUBJECT.KEYID = 7
1,174,270 UART: [idev] UDS.KEYID = 0
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,198,826 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,208,723 UART: [ldev] ++
1,208,891 UART: [ldev] CDI.KEYID = 6
1,209,255 UART: [ldev] SUBJECT.KEYID = 5
1,209,682 UART: [ldev] AUTHORITY.KEYID = 7
1,210,145 UART: [ldev] FE.KEYID = 1
1,215,237 UART: [ldev] Erasing FE.KEYID = 1
1,241,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,683 UART: [ldev] --
1,280,019 UART: [fwproc] Wait for Commands...
1,280,774 UART: [fwproc] Recv command 0x46574c44
1,281,507 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,918 >>> mbox cmd response: success
2,774,011 UART: [afmc] ++
2,774,179 UART: [afmc] CDI.KEYID = 6
2,774,542 UART: [afmc] SUBJECT.KEYID = 7
2,774,968 UART: [afmc] AUTHORITY.KEYID = 5
2,810,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,412 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,125 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,034 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,748 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,427 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,953 UART: [state] LifecycleState = Unprovisioned
85,608 UART: [state] DebugLocked = No
86,204 UART: [state] WD Timer not started. Device not locked for debugging
87,391 UART: [kat] SHA2-256
890,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,070 UART: [kat] ++
895,222 UART: [kat] sha1
899,334 UART: [kat] SHA2-256
901,274 UART: [kat] SHA2-384
904,137 UART: [kat] SHA2-512-ACC
906,038 UART: [kat] ECC-384
915,867 UART: [kat] HMAC-384Kdf
920,433 UART: [kat] LMS
1,168,745 UART: [kat] --
1,169,572 UART: [cold-reset] ++
1,170,072 UART: [fht] FHT @ 0x50003400
1,172,808 UART: [idev] ++
1,172,976 UART: [idev] CDI.KEYID = 6
1,173,337 UART: [idev] SUBJECT.KEYID = 7
1,173,762 UART: [idev] UDS.KEYID = 0
1,181,650 UART: [idev] Erasing UDS.KEYID = 0
1,198,410 UART: [idev] Sha1 KeyId Algorithm
1,207,240 UART: [idev] --
1,208,143 UART: [ldev] ++
1,208,311 UART: [ldev] CDI.KEYID = 6
1,208,675 UART: [ldev] SUBJECT.KEYID = 5
1,209,102 UART: [ldev] AUTHORITY.KEYID = 7
1,209,565 UART: [ldev] FE.KEYID = 1
1,215,045 UART: [ldev] Erasing FE.KEYID = 1
1,241,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,993 UART: [ldev] --
1,280,461 UART: [fwproc] Wait for Commands...
1,281,128 UART: [fwproc] Recv command 0x46574c44
1,281,861 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,810 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,718 >>> mbox cmd response: success
2,774,981 UART: [afmc] ++
2,775,149 UART: [afmc] CDI.KEYID = 6
2,775,512 UART: [afmc] SUBJECT.KEYID = 7
2,775,938 UART: [afmc] AUTHORITY.KEYID = 5
2,812,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,494 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,207 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,116 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,830 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,629 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,275 UART: [kat] SHA2-256
891,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,954 UART: [kat] ++
896,106 UART: [kat] sha1
900,212 UART: [kat] SHA2-256
902,152 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,841 UART: [kat] HMAC-384Kdf
921,371 UART: [kat] LMS
1,169,683 UART: [kat] --
1,170,522 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,730 UART: [idev] ++
1,173,898 UART: [idev] CDI.KEYID = 6
1,174,259 UART: [idev] SUBJECT.KEYID = 7
1,174,684 UART: [idev] UDS.KEYID = 0
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,199,672 UART: [idev] Sha1 KeyId Algorithm
1,208,458 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,993 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,282,103 UART: [fwproc] Wait for Commands...
1,282,782 UART: [fwproc] Recv command 0x46574c44
1,283,515 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,330 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,438 >>> mbox cmd response: success
2,775,637 UART: [afmc] ++
2,775,805 UART: [afmc] CDI.KEYID = 6
2,776,168 UART: [afmc] SUBJECT.KEYID = 7
2,776,594 UART: [afmc] AUTHORITY.KEYID = 5
2,811,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,102 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,815 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,724 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,438 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,365 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.06s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,356 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,178 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,302 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,260 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,240 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,298 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,532 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,982 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,626 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,021 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,070 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,058 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,066 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,642 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,020 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,464 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,508 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,512 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,232 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,442 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,916 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
6,000 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,322 UART:
192,701 UART: Running Caliptra ROM ...
193,888 UART:
194,039 UART: [state] CFI Enabled
262,425 UART: [state] LifecycleState = Unprovisioned
264,770 UART: [state] DebugLocked = No
266,168 UART: [state] WD Timer not started. Device not locked for debugging
270,508 UART: [kat] SHA2-256
452,437 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,968 UART: [kat] ++
464,453 UART: [kat] sha1
475,766 UART: [kat] SHA2-256
478,777 UART: [kat] SHA2-384
484,100 UART: [kat] SHA2-512-ACC
486,710 UART: [kat] ECC-384
3,771,832 UART: [kat] HMAC-384Kdf
3,802,054 UART: [kat] LMS
4,875,218 UART: [kat] --
4,879,285 UART: [cold-reset] ++
4,881,221 UART: [fht] FHT @ 0x50003400
4,891,711 UART: [idev] ++
4,892,437 UART: [idev] CDI.KEYID = 6
4,893,634 UART: [idev] SUBJECT.KEYID = 7
4,894,791 UART: [idev] UDS.KEYID = 0
4,928,322 UART: [idev] Erasing UDS.KEYID = 0
8,242,886 UART: [idev] Sha1 KeyId Algorithm
8,264,378 UART: [idev] --
8,266,969 UART: [ldev] ++
8,267,536 UART: [ldev] CDI.KEYID = 6
8,268,700 UART: [ldev] SUBJECT.KEYID = 5
8,269,829 UART: [ldev] AUTHORITY.KEYID = 7
8,271,161 UART: [ldev] FE.KEYID = 1
8,316,026 UART: [ldev] Erasing FE.KEYID = 1
11,651,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,768 UART: [ldev] --
14,036,172 UART: [fwproc] Wait for Commands...
14,037,669 UART: [fwproc] Recv command 0x46574c44
14,039,655 UART: [fwproc] Recv'd Img size: 114124 bytes
14,112,825 UART: ROM Fatal Error: 0x000B0032
14,116,245 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
5,825 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,898,647 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
6,659 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,544 UART:
192,932 UART: Running Caliptra ROM ...
194,059 UART:
603,892 UART: [state] CFI Enabled
617,449 UART: [state] LifecycleState = Unprovisioned
619,826 UART: [state] DebugLocked = No
621,739 UART: [state] WD Timer not started. Device not locked for debugging
626,872 UART: [kat] SHA2-256
808,873 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,402 UART: [kat] ++
820,987 UART: [kat] sha1
831,629 UART: [kat] SHA2-256
834,678 UART: [kat] SHA2-384
841,140 UART: [kat] SHA2-512-ACC
843,804 UART: [kat] ECC-384
4,100,004 UART: [kat] HMAC-384Kdf
4,111,873 UART: [kat] LMS
5,185,025 UART: [kat] --
5,189,173 UART: [cold-reset] ++
5,191,927 UART: [fht] FHT @ 0x50003400
5,203,505 UART: [idev] ++
5,204,173 UART: [idev] CDI.KEYID = 6
5,205,404 UART: [idev] SUBJECT.KEYID = 7
5,206,835 UART: [idev] UDS.KEYID = 0
5,226,245 UART: [idev] Erasing UDS.KEYID = 0
8,500,174 UART: [idev] Sha1 KeyId Algorithm
8,520,613 UART: [idev] --
8,524,004 UART: [ldev] ++
8,524,633 UART: [ldev] CDI.KEYID = 6
8,525,807 UART: [ldev] SUBJECT.KEYID = 5
8,527,288 UART: [ldev] AUTHORITY.KEYID = 7
8,528,840 UART: [ldev] FE.KEYID = 1
8,541,370 UART: [ldev] Erasing FE.KEYID = 1
11,831,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,143 UART: [ldev] --
14,195,446 UART: [fwproc] Wait for Commands...
14,198,624 UART: [fwproc] Recv command 0x46574c44
14,200,938 UART: [fwproc] Recv'd Img size: 114124 bytes
14,276,260 UART: ROM Fatal Error: 0x000B0032
14,279,645 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
6,606 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,089,591 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
5,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,103 UART:
192,501 UART: Running Caliptra ROM ...
193,789 UART:
193,946 UART: [state] CFI Enabled
260,576 UART: [state] LifecycleState = Unprovisioned
262,430 UART: [state] DebugLocked = No
263,649 UART: [state] WD Timer not started. Device not locked for debugging
266,697 UART: [kat] SHA2-256
445,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,400 UART: [kat] ++
457,936 UART: [kat] sha1
468,657 UART: [kat] SHA2-256
471,716 UART: [kat] SHA2-384
478,442 UART: [kat] SHA2-512-ACC
481,376 UART: [kat] ECC-384
2,944,900 UART: [kat] HMAC-384Kdf
2,967,823 UART: [kat] LMS
3,497,276 UART: [kat] --
3,500,804 UART: [cold-reset] ++
3,501,660 UART: [fht] FHT @ 0x50003400
3,511,452 UART: [idev] ++
3,512,020 UART: [idev] CDI.KEYID = 6
3,512,934 UART: [idev] SUBJECT.KEYID = 7
3,514,174 UART: [idev] UDS.KEYID = 0
3,541,549 UART: [idev] Erasing UDS.KEYID = 0
6,024,846 UART: [idev] Sha1 KeyId Algorithm
6,048,122 UART: [idev] --
6,051,443 UART: [ldev] ++
6,052,022 UART: [ldev] CDI.KEYID = 6
6,052,920 UART: [ldev] SUBJECT.KEYID = 5
6,054,138 UART: [ldev] AUTHORITY.KEYID = 7
6,055,377 UART: [ldev] FE.KEYID = 1
6,090,466 UART: [ldev] Erasing FE.KEYID = 1
8,592,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,309,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,325,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,341,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,357,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,379,158 UART: [ldev] --
10,383,480 UART: [fwproc] Wait for Commands...
10,385,580 UART: [fwproc] Recv command 0x46574c44
10,387,672 UART: [fwproc] Recv'd Img size: 114448 bytes
10,467,455 UART: ROM Fatal Error: 0x000B0032
10,470,597 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
5,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,257,611 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
6,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,400 UART:
192,774 UART: Running Caliptra ROM ...
193,855 UART:
603,692 UART: [state] CFI Enabled
617,660 UART: [state] LifecycleState = Unprovisioned
619,554 UART: [state] DebugLocked = No
620,739 UART: [state] WD Timer not started. Device not locked for debugging
624,856 UART: [kat] SHA2-256
803,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,566 UART: [kat] ++
816,104 UART: [kat] sha1
826,499 UART: [kat] SHA2-256
829,565 UART: [kat] SHA2-384
835,918 UART: [kat] SHA2-512-ACC
838,900 UART: [kat] ECC-384
3,278,188 UART: [kat] HMAC-384Kdf
3,289,989 UART: [kat] LMS
3,819,503 UART: [kat] --
3,823,082 UART: [cold-reset] ++
3,824,206 UART: [fht] FHT @ 0x50003400
3,835,376 UART: [idev] ++
3,835,927 UART: [idev] CDI.KEYID = 6
3,836,806 UART: [idev] SUBJECT.KEYID = 7
3,838,032 UART: [idev] UDS.KEYID = 0
3,855,721 UART: [idev] Erasing UDS.KEYID = 0
6,310,364 UART: [idev] Sha1 KeyId Algorithm
6,333,055 UART: [idev] --
6,336,056 UART: [ldev] ++
6,336,631 UART: [ldev] CDI.KEYID = 6
6,337,515 UART: [ldev] SUBJECT.KEYID = 5
6,338,675 UART: [ldev] AUTHORITY.KEYID = 7
6,339,962 UART: [ldev] FE.KEYID = 1
6,349,286 UART: [ldev] Erasing FE.KEYID = 1
8,819,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,585,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,605,963 UART: [ldev] --
10,610,468 UART: [fwproc] Wait for Commands...
10,613,281 UART: [fwproc] Recv command 0x46574c44
10,615,379 UART: [fwproc] Recv'd Img size: 114448 bytes
10,694,445 UART: ROM Fatal Error: 0x000B0032
10,697,532 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
6,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,479,806 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
5,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,259,017 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
6,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,485,925 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,077 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [kat] SHA2-256
890,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,919 UART: [kat] ++
895,071 UART: [kat] sha1
899,243 UART: [kat] SHA2-256
901,183 UART: [kat] SHA2-384
903,966 UART: [kat] SHA2-512-ACC
905,867 UART: [kat] ECC-384
915,888 UART: [kat] HMAC-384Kdf
920,526 UART: [kat] LMS
1,168,838 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,169,951 UART: [fht] FHT @ 0x50003400
1,172,551 UART: [idev] ++
1,172,719 UART: [idev] CDI.KEYID = 6
1,173,080 UART: [idev] SUBJECT.KEYID = 7
1,173,505 UART: [idev] UDS.KEYID = 0
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,207,333 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,215,438 UART: [ldev] Erasing FE.KEYID = 1
1,241,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,294 UART: [ldev] --
1,280,614 UART: [fwproc] Wait for Commands...
1,281,219 UART: [fwproc] Recv command 0x46574c44
1,281,952 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,284 UART: ROM Fatal Error: 0x000B0032
1,309,441 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,354 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,772 UART: [kat] ++
895,924 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,336 UART: [cold-reset] ++
1,170,832 UART: [fht] FHT @ 0x50003400
1,173,430 UART: [idev] ++
1,173,598 UART: [idev] CDI.KEYID = 6
1,173,959 UART: [idev] SUBJECT.KEYID = 7
1,174,384 UART: [idev] UDS.KEYID = 0
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,712 UART: [idev] Sha1 KeyId Algorithm
1,208,640 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,275 UART: [ldev] Erasing FE.KEYID = 1
1,242,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,439 UART: [ldev] --
1,281,909 UART: [fwproc] Wait for Commands...
1,282,638 UART: [fwproc] Recv command 0x46574c44
1,283,371 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,423 UART: ROM Fatal Error: 0x000B0032
1,310,580 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,605 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,172,903 UART: [idev] ++
1,173,071 UART: [idev] CDI.KEYID = 6
1,173,432 UART: [idev] SUBJECT.KEYID = 7
1,173,857 UART: [idev] UDS.KEYID = 0
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,199,167 UART: [idev] Sha1 KeyId Algorithm
1,207,931 UART: [idev] --
1,208,808 UART: [ldev] ++
1,208,976 UART: [ldev] CDI.KEYID = 6
1,209,340 UART: [ldev] SUBJECT.KEYID = 5
1,209,767 UART: [ldev] AUTHORITY.KEYID = 7
1,210,230 UART: [ldev] FE.KEYID = 1
1,215,672 UART: [ldev] Erasing FE.KEYID = 1
1,242,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,986 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,282,055 UART: [fwproc] Recv command 0x46574c44
1,282,788 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,794 UART: ROM Fatal Error: 0x000B0032
1,309,951 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,030 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,186 UART: [kat] SHA2-256
902,126 UART: [kat] SHA2-384
904,987 UART: [kat] SHA2-512-ACC
906,888 UART: [kat] ECC-384
916,927 UART: [kat] HMAC-384Kdf
921,705 UART: [kat] LMS
1,170,017 UART: [kat] --
1,171,044 UART: [cold-reset] ++
1,171,602 UART: [fht] FHT @ 0x50003400
1,174,414 UART: [idev] ++
1,174,582 UART: [idev] CDI.KEYID = 6
1,174,943 UART: [idev] SUBJECT.KEYID = 7
1,175,368 UART: [idev] UDS.KEYID = 0
1,183,462 UART: [idev] Erasing UDS.KEYID = 0
1,200,164 UART: [idev] Sha1 KeyId Algorithm
1,209,114 UART: [idev] --
1,210,303 UART: [ldev] ++
1,210,471 UART: [ldev] CDI.KEYID = 6
1,210,835 UART: [ldev] SUBJECT.KEYID = 5
1,211,262 UART: [ldev] AUTHORITY.KEYID = 7
1,211,725 UART: [ldev] FE.KEYID = 1
1,217,073 UART: [ldev] Erasing FE.KEYID = 1
1,243,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,295 UART: [ldev] --
1,282,715 UART: [fwproc] Wait for Commands...
1,283,498 UART: [fwproc] Recv command 0x46574c44
1,284,231 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,733 UART: ROM Fatal Error: 0x000B0032
1,310,890 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,775 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,656 UART: [state] LifecycleState = Unprovisioned
85,311 UART: [state] DebugLocked = No
85,809 UART: [state] WD Timer not started. Device not locked for debugging
87,166 UART: [kat] SHA2-256
890,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,845 UART: [kat] ++
894,997 UART: [kat] sha1
899,301 UART: [kat] SHA2-256
901,241 UART: [kat] SHA2-384
903,812 UART: [kat] SHA2-512-ACC
905,713 UART: [kat] ECC-384
915,512 UART: [kat] HMAC-384Kdf
920,092 UART: [kat] LMS
1,168,404 UART: [kat] --
1,169,523 UART: [cold-reset] ++
1,169,969 UART: [fht] FHT @ 0x50003400
1,172,429 UART: [idev] ++
1,172,597 UART: [idev] CDI.KEYID = 6
1,172,958 UART: [idev] SUBJECT.KEYID = 7
1,173,383 UART: [idev] UDS.KEYID = 0
1,181,337 UART: [idev] Erasing UDS.KEYID = 0
1,198,091 UART: [idev] Sha1 KeyId Algorithm
1,207,151 UART: [idev] --
1,208,236 UART: [ldev] ++
1,208,404 UART: [ldev] CDI.KEYID = 6
1,208,768 UART: [ldev] SUBJECT.KEYID = 5
1,209,195 UART: [ldev] AUTHORITY.KEYID = 7
1,209,658 UART: [ldev] FE.KEYID = 1
1,214,454 UART: [ldev] Erasing FE.KEYID = 1
1,241,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,120 UART: [ldev] --
1,280,420 UART: [fwproc] Wait for Commands...
1,281,195 UART: [fwproc] Recv command 0x46574c44
1,281,928 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,018 UART: ROM Fatal Error: 0x000B0032
1,308,175 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,282 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,947 UART: [kat] HMAC-384Kdf
921,585 UART: [kat] LMS
1,169,897 UART: [kat] --
1,170,984 UART: [cold-reset] ++
1,171,502 UART: [fht] FHT @ 0x50003400
1,173,988 UART: [idev] ++
1,174,156 UART: [idev] CDI.KEYID = 6
1,174,517 UART: [idev] SUBJECT.KEYID = 7
1,174,942 UART: [idev] UDS.KEYID = 0
1,183,018 UART: [idev] Erasing UDS.KEYID = 0
1,200,064 UART: [idev] Sha1 KeyId Algorithm
1,208,796 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,473 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,773 UART: [ldev] Erasing FE.KEYID = 1
1,243,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,649 UART: [fwproc] Wait for Commands...
1,283,410 UART: [fwproc] Recv command 0x46574c44
1,284,143 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,007 UART: ROM Fatal Error: 0x000B0032
1,311,164 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,685 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
Truncated 76844 bytes from beginning
4,037,508 UART: [fwproc] Recv'd Img size: 114124 bytes
14,115,243 UART: ROM Fatal Error: 0x00B0003A
14,118,627 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
2,052,617 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,196,879 UART:
2,197,290 UART: Running Caliptra ROM ...
2,198,453 UART:
2,198,646 UART: [state] CFI Enabled
2,199,616 UART: [state] LifecycleState = Unprovisioned
2,201,271 UART: [state] DebugLocked = No
2,202,375 UART: [state] WD Timer not started. Device not locked for debugging
2,204,844 UART: [kat] SHA2-256
2,205,511 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,538 UART: [kat] ++
2,208,992 UART: [kat] sha1
2,209,547 UART: [kat] SHA2-256
2,210,205 UART: [kat] SHA2-384
2,210,863 UART: [kat] SHA2-512-ACC
2,211,665 UART: [kat] ECC-384
3,774,522 UART: [kat] HMAC-384Kdf
3,802,011 UART: [kat] LMS
4,875,165 UART: [kat] --
4,879,348 UART: [cold-reset] ++
4,880,826 UART: [fht] FHT @ 0x50003400
4,890,676 UART: [idev] ++
4,891,357 UART: [idev] CDI.KEYID = 6
4,892,590 UART: [idev] SUBJECT.KEYID = 7
4,893,690 UART: [idev] UDS.KEYID = 0
4,908,421 UART: [idev] Erasing UDS.KEYID = 0
8,222,651 UART: [idev] Sha1 KeyId Algorithm
8,244,749 UART: [idev] --
8,248,637 UART: [ldev] ++
8,249,206 UART: [ldev] CDI.KEYID = 6
8,250,446 UART: [ldev] SUBJECT.KEYID = 5
8,251,614 UART: [ldev] AUTHORITY.KEYID = 7
8,252,842 UART: [ldev] FE.KEYID = 1
8,295,695 UART: [ldev] Erasing FE.KEYID = 1
11,631,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,642 UART: [ldev] --
14,015,666 UART: [fwproc] Wait for Commands...
14,017,653 UART: [fwproc] Recv command 0x46574c44
14,019,919 UART: [fwproc] Recv'd Img size: 114124 bytes
14,098,229 UART: ROM Fatal Error: 0x00B0003A
14,101,595 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
2,053,020 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,197,220 UART:
2,197,634 UART: Running Caliptra ROM ...
2,198,706 UART:
2,198,860 UART: [state] CFI Enabled
2,199,826 UART: [state] LifecycleState = Unprovisioned
2,201,466 UART: [state] DebugLocked = No
2,202,572 UART: [state] WD Timer not started. Device not locked for debugging
2,205,063 UART: [kat] SHA2-256
2,205,735 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,761 UART: [kat] ++
2,209,213 UART: [kat] sha1
2,209,729 UART: [kat] SHA2-256
2,210,468 UART: [kat] SHA2-384
2,211,133 UART: [kat] SHA2-512-ACC
2,211,980 UART: [kat] ECC-384
3,777,251 UART: [kat] HMAC-384Kdf
3,801,269 UART: [kat] LMS
4,874,400 UART: [kat] --
4,880,144 UART: [cold-reset] ++
4,882,674 UART: [fht] FHT @ 0x50003400
4,894,089 UART: [idev] ++
4,894,772 UART: [idev] CDI.KEYID = 6
4,896,006 UART: [idev] SUBJECT.KEYID = 7
4,897,113 UART: [idev] UDS.KEYID = 0
4,927,886 UART: [idev] Erasing UDS.KEYID = 0
8,240,254 UART: [idev] Sha1 KeyId Algorithm
8,262,406 UART: [idev] --
8,266,629 UART: [ldev] ++
8,267,236 UART: [ldev] CDI.KEYID = 6
8,268,425 UART: [ldev] SUBJECT.KEYID = 5
8,269,584 UART: [ldev] AUTHORITY.KEYID = 7
8,270,832 UART: [ldev] FE.KEYID = 1
8,317,397 UART: [ldev] Erasing FE.KEYID = 1
11,649,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,009,585 UART: [ldev] --
14,015,016 UART: [fwproc] Wait for Commands...
14,017,547 UART: [fwproc] Recv command 0x46574c44
14,019,867 UART: [fwproc] Recv'd Img size: 114124 bytes
14,096,922 UART: ROM Fatal Error: 0x00B0003A
14,100,292 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
2,052,972 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,197,193 UART:
2,197,622 UART: Running Caliptra ROM ...
2,198,713 UART:
2,198,865 UART: [state] CFI Enabled
2,199,781 UART: [state] LifecycleState = Unprovisioned
2,201,423 UART: [state] DebugLocked = No
2,202,453 UART: [state] WD Timer not started. Device not locked for debugging
2,204,989 UART: [kat] SHA2-256
2,205,665 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,688 UART: [kat] ++
2,209,139 UART: [kat] sha1
2,209,670 UART: [kat] SHA2-256
2,210,468 UART: [kat] SHA2-384
2,211,140 UART: [kat] SHA2-512-ACC
2,212,055 UART: [kat] ECC-384
3,775,624 UART: [kat] HMAC-384Kdf
3,802,631 UART: [kat] LMS
4,875,825 UART: [kat] --
4,879,623 UART: [cold-reset] ++
4,880,736 UART: [fht] FHT @ 0x50003400
4,892,350 UART: [idev] ++
4,893,023 UART: [idev] CDI.KEYID = 6
4,894,267 UART: [idev] SUBJECT.KEYID = 7
4,895,373 UART: [idev] UDS.KEYID = 0
4,929,330 UART: [idev] Erasing UDS.KEYID = 0
8,242,972 UART: [idev] Sha1 KeyId Algorithm
8,264,680 UART: [idev] --
8,268,295 UART: [ldev] ++
8,268,875 UART: [ldev] CDI.KEYID = 6
8,270,115 UART: [ldev] SUBJECT.KEYID = 5
8,271,274 UART: [ldev] AUTHORITY.KEYID = 7
8,272,448 UART: [ldev] FE.KEYID = 1
8,317,182 UART: [ldev] Erasing FE.KEYID = 1
11,654,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,785 UART: [ldev] --
14,039,629 UART: [fwproc] Wait for Commands...
14,041,239 UART: [fwproc] Recv command 0x46574c44
14,043,506 UART: [fwproc] Recv'd Img size: 114124 bytes
14,122,738 UART: ROM Fatal Error: 0x00B0003A
14,126,118 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,058,736 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,202,945 UART:
2,203,370 UART: Running Caliptra ROM ...
2,204,552 UART:
2,204,725 UART: [state] CFI Enabled
2,205,692 UART: [state] LifecycleState = Unprovisioned
2,207,352 UART: [state] DebugLocked = No
2,208,461 UART: [state] WD Timer not started. Device not locked for debugging
2,210,956 UART: [kat] SHA2-256
2,211,626 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,639 UART: [kat] ++
2,215,088 UART: [kat] sha1
2,215,674 UART: [kat] SHA2-256
2,216,336 UART: [kat] SHA2-384
2,216,994 UART: [kat] SHA2-512-ACC
2,217,883 UART: [kat] ECC-384
3,775,770 UART: [kat] HMAC-384Kdf
3,801,788 UART: [kat] LMS
4,874,938 UART: [kat] --
4,880,631 UART: [cold-reset] ++
4,882,195 UART: [fht] FHT @ 0x50003400
4,894,955 UART: [idev] ++
4,895,635 UART: [idev] CDI.KEYID = 6
4,896,871 UART: [idev] SUBJECT.KEYID = 7
4,897,993 UART: [idev] UDS.KEYID = 0
4,929,526 UART: [idev] Erasing UDS.KEYID = 0
8,242,900 UART: [idev] Sha1 KeyId Algorithm
8,264,680 UART: [idev] --
8,270,191 UART: [ldev] ++
8,270,755 UART: [ldev] CDI.KEYID = 6
8,271,945 UART: [ldev] SUBJECT.KEYID = 5
8,273,102 UART: [ldev] AUTHORITY.KEYID = 7
8,274,328 UART: [ldev] FE.KEYID = 1
8,318,254 UART: [ldev] Erasing FE.KEYID = 1
11,652,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,625 UART: [ldev] --
14,035,834 UART: [fwproc] Wait for Commands...
14,037,345 UART: [fwproc] Recv command 0x46574c44
14,039,278 UART: [fwproc] Recv'd Img size: 114124 bytes
22,387,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
22,465,014 UART: [fwproc] Load FMC at address 0x40000000 len 18820
22,533,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
22,851,893 >>> mbox cmd response: success
22,855,738 UART: [afmc] ++
22,856,431 UART: [afmc] CDI.KEYID = 6
22,857,545 UART: [afmc] SUBJECT.KEYID = 7
22,858,813 UART: [afmc] AUTHORITY.KEYID = 5
26,233,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,529,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,531,082 UART: [afmc] PUB.X = 5B07BA90FD5D5FC8D4385D85A0C0D5FA6108D225C1F34E26F7A9B1581680FB47F5697BF4C5946E0063AC14467940F1AC
28,547,208 UART: [afmc] PUB.Y = E3DD14E53196DE1A08BEF1861FAC6FE6DF43074B9BCF709AB15640DA485FDC9381F45A7952E0C2A5C157936196AC9549
28,563,290 UART: [afmc] SIG.R = 505E295461973293BF2D1C1A36B4F51DCD979493DFAB7F6A693859ABFDCB516EFD6D7A92C7EE4BC2DC917F907E787A0F
28,579,055 UART: [afmc] SIG.S = 6D459BF06A46ECC729A92DF9E7524462CB58EA1F8CDA59BA0ECA6623BDC5C9CE936F2EF16DF95F44ABAF06A349D889DF
28,602,907 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.42s
Truncated 8543 bytes from beginning
x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
2,050,178 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,885,017 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,050,623 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,887,479 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
2,057,057 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,920,019 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
2,053,934 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,906,713 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,052,099 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,941,940 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
2,052,149 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,924,309 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,050,771 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,921,285 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
2,053,306 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,902,029 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,051,173 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,880,741 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
2,058,092 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,900,745 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
2,050,576 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,932,576 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,053,216 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,871,600 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,531 writing to cptra_bootfsm_go
2,051,086 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,904,067 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,053,274 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,866,167 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,053,147 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,928,698 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,051,976 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,880,928 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
2,059,492 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,903,800 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,052,494 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,882,057 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,051,145 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,589,583 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.06s
Truncated 76844 bytes from beginning
4,202,217 UART: [fwproc] Recv'd Img size: 114124 bytes
14,282,948 UART: ROM Fatal Error: 0x00B0003A
14,286,464 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,058,741 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,202,850 UART:
2,203,254 UART: Running Caliptra ROM ...
2,204,415 UART:
2,204,591 UART: [state] CFI Enabled
2,205,558 UART: [state] LifecycleState = Unprovisioned
2,207,216 UART: [state] DebugLocked = No
2,208,316 UART: [state] WD Timer not started. Device not locked for debugging
2,210,791 UART: [kat] SHA2-256
2,211,449 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,478 UART: [kat] ++
2,214,925 UART: [kat] sha1
2,215,431 UART: [kat] SHA2-256
2,216,166 UART: [kat] SHA2-384
2,216,824 UART: [kat] SHA2-512-ACC
2,217,700 UART: [kat] ECC-384
4,100,364 UART: [kat] HMAC-384Kdf
4,112,612 UART: [kat] LMS
5,185,740 UART: [kat] --
5,189,682 UART: [cold-reset] ++
5,191,078 UART: [fht] FHT @ 0x50003400
5,202,925 UART: [idev] ++
5,203,596 UART: [idev] CDI.KEYID = 6
5,204,824 UART: [idev] SUBJECT.KEYID = 7
5,206,248 UART: [idev] UDS.KEYID = 0
5,221,039 UART: [idev] Erasing UDS.KEYID = 0
8,491,381 UART: [idev] Sha1 KeyId Algorithm
8,514,185 UART: [idev] --
8,518,161 UART: [ldev] ++
8,518,731 UART: [ldev] CDI.KEYID = 6
8,519,837 UART: [ldev] SUBJECT.KEYID = 5
8,521,370 UART: [ldev] AUTHORITY.KEYID = 7
8,522,848 UART: [ldev] FE.KEYID = 1
8,535,435 UART: [ldev] Erasing FE.KEYID = 1
11,826,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,062 UART: [ldev] --
14,193,481 UART: [fwproc] Wait for Commands...
14,196,331 UART: [fwproc] Recv command 0x46574c44
14,198,664 UART: [fwproc] Recv'd Img size: 114124 bytes
14,273,555 UART: ROM Fatal Error: 0x00B0003A
14,276,918 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,056,618 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,200,806 UART:
2,201,223 UART: Running Caliptra ROM ...
2,202,403 UART:
2,202,573 UART: [state] CFI Enabled
2,203,532 UART: [state] LifecycleState = Unprovisioned
2,205,203 UART: [state] DebugLocked = No
2,206,310 UART: [state] WD Timer not started. Device not locked for debugging
2,208,780 UART: [kat] SHA2-256
2,209,443 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,454 UART: [kat] ++
2,212,943 UART: [kat] sha1
2,213,452 UART: [kat] SHA2-256
2,214,100 UART: [kat] SHA2-384
2,214,844 UART: [kat] SHA2-512-ACC
2,215,667 UART: [kat] ECC-384
4,100,028 UART: [kat] HMAC-384Kdf
4,110,891 UART: [kat] LMS
5,184,045 UART: [kat] --
5,187,070 UART: [cold-reset] ++
5,189,709 UART: [fht] FHT @ 0x50003400
5,202,145 UART: [idev] ++
5,202,879 UART: [idev] CDI.KEYID = 6
5,204,012 UART: [idev] SUBJECT.KEYID = 7
5,205,444 UART: [idev] UDS.KEYID = 0
5,221,417 UART: [idev] Erasing UDS.KEYID = 0
8,493,442 UART: [idev] Sha1 KeyId Algorithm
8,515,651 UART: [idev] --
8,520,947 UART: [ldev] ++
8,521,565 UART: [ldev] CDI.KEYID = 6
8,522,669 UART: [ldev] SUBJECT.KEYID = 5
8,524,199 UART: [ldev] AUTHORITY.KEYID = 7
8,525,674 UART: [ldev] FE.KEYID = 1
8,538,633 UART: [ldev] Erasing FE.KEYID = 1
11,825,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,479 UART: [ldev] --
14,193,739 UART: [fwproc] Wait for Commands...
14,195,401 UART: [fwproc] Recv command 0x46574c44
14,197,712 UART: [fwproc] Recv'd Img size: 114124 bytes
14,272,811 UART: ROM Fatal Error: 0x00B0003A
14,276,197 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
2,059,513 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,203,733 UART:
2,204,170 UART: Running Caliptra ROM ...
2,205,252 UART:
2,205,398 UART: [state] CFI Enabled
2,206,300 UART: [state] LifecycleState = Unprovisioned
2,207,956 UART: [state] DebugLocked = No
2,209,001 UART: [state] WD Timer not started. Device not locked for debugging
2,211,481 UART: [kat] SHA2-256
2,212,142 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,215,150 UART: [kat] ++
2,215,591 UART: [kat] sha1
2,216,090 UART: [kat] SHA2-256
2,216,741 UART: [kat] SHA2-384
2,217,387 UART: [kat] SHA2-512-ACC
2,218,178 UART: [kat] ECC-384
4,100,634 UART: [kat] HMAC-384Kdf
4,112,004 UART: [kat] LMS
5,185,173 UART: [kat] --
5,188,319 UART: [cold-reset] ++
5,189,495 UART: [fht] FHT @ 0x50003400
5,201,258 UART: [idev] ++
5,201,919 UART: [idev] CDI.KEYID = 6
5,203,071 UART: [idev] SUBJECT.KEYID = 7
5,204,605 UART: [idev] UDS.KEYID = 0
5,218,472 UART: [idev] Erasing UDS.KEYID = 0
8,491,384 UART: [idev] Sha1 KeyId Algorithm
8,513,969 UART: [idev] --
8,517,853 UART: [ldev] ++
8,518,426 UART: [ldev] CDI.KEYID = 6
8,519,664 UART: [ldev] SUBJECT.KEYID = 5
8,521,108 UART: [ldev] AUTHORITY.KEYID = 7
8,522,668 UART: [ldev] FE.KEYID = 1
8,535,614 UART: [ldev] Erasing FE.KEYID = 1
11,825,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,101 UART: [ldev] --
14,191,717 UART: [fwproc] Wait for Commands...
14,194,617 UART: [fwproc] Recv command 0x46574c44
14,196,873 UART: [fwproc] Recv'd Img size: 114124 bytes
14,278,680 UART: ROM Fatal Error: 0x00B0003A
14,282,041 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,058,461 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,203,090 UART:
2,203,515 UART: Running Caliptra ROM ...
2,204,589 UART:
2,204,738 UART: [state] CFI Enabled
2,205,709 UART: [state] LifecycleState = Unprovisioned
2,207,368 UART: [state] DebugLocked = No
2,208,389 UART: [state] WD Timer not started. Device not locked for debugging
2,210,855 UART: [kat] SHA2-256
2,211,510 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,518 UART: [kat] ++
2,214,957 UART: [kat] sha1
2,215,456 UART: [kat] SHA2-256
2,216,107 UART: [kat] SHA2-384
2,216,776 UART: [kat] SHA2-512-ACC
2,217,571 UART: [kat] ECC-384
4,098,676 UART: [kat] HMAC-384Kdf
4,110,250 UART: [kat] LMS
5,183,396 UART: [kat] --
5,186,935 UART: [cold-reset] ++
5,188,332 UART: [fht] FHT @ 0x50003400
5,199,322 UART: [idev] ++
5,199,994 UART: [idev] CDI.KEYID = 6
5,201,150 UART: [idev] SUBJECT.KEYID = 7
5,202,628 UART: [idev] UDS.KEYID = 0
5,220,302 UART: [idev] Erasing UDS.KEYID = 0
8,495,636 UART: [idev] Sha1 KeyId Algorithm
8,516,229 UART: [idev] --
8,519,284 UART: [ldev] ++
8,519,909 UART: [ldev] CDI.KEYID = 6
8,521,035 UART: [ldev] SUBJECT.KEYID = 5
8,522,574 UART: [ldev] AUTHORITY.KEYID = 7
8,524,048 UART: [ldev] FE.KEYID = 1
8,536,797 UART: [ldev] Erasing FE.KEYID = 1
11,830,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,948 UART: [ldev] --
14,198,440 UART: [fwproc] Wait for Commands...
14,201,183 UART: [fwproc] Recv command 0x46574c44
14,203,493 UART: [fwproc] Recv'd Img size: 114124 bytes
22,827,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
22,904,870 UART: [fwproc] Load FMC at address 0x40000000 len 18820
22,973,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
23,291,408 >>> mbox cmd response: success
23,295,537 UART: [afmc] ++
23,296,233 UART: [afmc] CDI.KEYID = 6
23,297,385 UART: [afmc] SUBJECT.KEYID = 7
23,298,648 UART: [afmc] AUTHORITY.KEYID = 5
26,617,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,912,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,914,138 UART: [afmc] PUB.X = 5B07BA90FD5D5FC8D4385D85A0C0D5FA6108D225C1F34E26F7A9B1581680FB47F5697BF4C5946E0063AC14467940F1AC
28,930,220 UART: [afmc] PUB.Y = E3DD14E53196DE1A08BEF1861FAC6FE6DF43074B9BCF709AB15640DA485FDC9381F45A7952E0C2A5C157936196AC9549
28,946,297 UART: [afmc] SIG.R = 505E295461973293BF2D1C1A36B4F51DCD979493DFAB7F6A693859ABFDCB516EFD6D7A92C7EE4BC2DC917F907E787A0F
28,962,040 UART: [afmc] SIG.S = 6D459BF06A46ECC729A92DF9E7524462CB58EA1F8CDA59BA0ECA6623BDC5C9CE936F2EF16DF95F44ABAF06A349D889DF
28,985,573 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.68s
Truncated 8543 bytes from beginning
x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
2,061,466 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,094,417 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
2,056,053 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,083,392 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
2,060,019 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,087,208 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
2,057,284 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,095,111 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
2,057,177 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,093,121 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
2,055,883 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,095,608 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,056,965 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,095,540 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,058,307 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,099,080 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,057,497 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,095,171 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,058,340 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,094,928 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
2,061,632 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,083,394 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,057,578 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,087,810 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,057,681 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,083,367 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,063,314 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,098,130 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,920 writing to cptra_bootfsm_go
2,063,274 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,096,130 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,059,116 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,094,535 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,487 writing to cptra_bootfsm_go
2,055,748 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,096,136 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,056,820 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,084,320 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
2,056,804 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,606,496 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.36s
Truncated 76844 bytes from beginning
0,416,024 UART: [fwproc] Recv'd Img size: 114448 bytes
10,493,175 UART: ROM Fatal Error: 0x00B0003A
10,496,258 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,055,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,199,715 UART:
2,200,160 UART: Running Caliptra ROM ...
2,201,255 UART:
2,201,404 UART: [state] CFI Enabled
2,202,375 UART: [state] LifecycleState = Unprovisioned
2,204,033 UART: [state] DebugLocked = No
2,205,060 UART: [state] WD Timer not started. Device not locked for debugging
2,207,533 UART: [kat] SHA2-256
2,208,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,206 UART: [kat] ++
2,211,656 UART: [kat] sha1
2,212,164 UART: [kat] SHA2-256
2,212,823 UART: [kat] SHA2-384
2,213,478 UART: [kat] SHA2-512-ACC
2,214,344 UART: [kat] ECC-384
2,946,725 UART: [kat] HMAC-384Kdf
2,971,464 UART: [kat] LMS
3,500,924 UART: [kat] --
3,505,973 UART: [cold-reset] ++
3,508,073 UART: [fht] FHT @ 0x50003400
3,519,381 UART: [idev] ++
3,519,953 UART: [idev] CDI.KEYID = 6
3,520,857 UART: [idev] SUBJECT.KEYID = 7
3,522,073 UART: [idev] UDS.KEYID = 0
3,542,862 UART: [idev] Erasing UDS.KEYID = 0
6,024,387 UART: [idev] Sha1 KeyId Algorithm
6,046,543 UART: [idev] --
6,049,546 UART: [ldev] ++
6,050,126 UART: [ldev] CDI.KEYID = 6
6,051,034 UART: [ldev] SUBJECT.KEYID = 5
6,052,220 UART: [ldev] AUTHORITY.KEYID = 7
6,053,459 UART: [ldev] FE.KEYID = 1
6,098,948 UART: [ldev] Erasing FE.KEYID = 1
8,603,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,100 UART: [ldev] --
10,411,370 UART: [fwproc] Wait for Commands...
10,413,630 UART: [fwproc] Recv command 0x46574c44
10,415,676 UART: [fwproc] Recv'd Img size: 114448 bytes
10,493,121 UART: ROM Fatal Error: 0x00B0003A
10,496,260 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
2,058,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,202,701 UART:
2,203,138 UART: Running Caliptra ROM ...
2,204,323 UART:
2,204,496 UART: [state] CFI Enabled
2,205,455 UART: [state] LifecycleState = Unprovisioned
2,207,092 UART: [state] DebugLocked = No
2,208,161 UART: [state] WD Timer not started. Device not locked for debugging
2,210,644 UART: [kat] SHA2-256
2,211,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,326 UART: [kat] ++
2,214,797 UART: [kat] sha1
2,215,313 UART: [kat] SHA2-256
2,216,056 UART: [kat] SHA2-384
2,216,726 UART: [kat] SHA2-512-ACC
2,217,549 UART: [kat] ECC-384
2,948,534 UART: [kat] HMAC-384Kdf
2,971,606 UART: [kat] LMS
3,501,043 UART: [kat] --
3,504,313 UART: [cold-reset] ++
3,506,095 UART: [fht] FHT @ 0x50003400
3,517,347 UART: [idev] ++
3,517,911 UART: [idev] CDI.KEYID = 6
3,518,843 UART: [idev] SUBJECT.KEYID = 7
3,520,058 UART: [idev] UDS.KEYID = 0
3,542,380 UART: [idev] Erasing UDS.KEYID = 0
6,024,004 UART: [idev] Sha1 KeyId Algorithm
6,047,958 UART: [idev] --
6,052,963 UART: [ldev] ++
6,053,543 UART: [ldev] CDI.KEYID = 6
6,054,426 UART: [ldev] SUBJECT.KEYID = 5
6,055,642 UART: [ldev] AUTHORITY.KEYID = 7
6,056,879 UART: [ldev] FE.KEYID = 1
6,098,772 UART: [ldev] Erasing FE.KEYID = 1
8,602,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,304 UART: [ldev] --
10,412,221 UART: [fwproc] Wait for Commands...
10,415,179 UART: [fwproc] Recv command 0x46574c44
10,417,275 UART: [fwproc] Recv'd Img size: 114448 bytes
10,492,412 UART: ROM Fatal Error: 0x00B0003A
10,495,497 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
2,066,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,210,947 UART:
2,211,375 UART: Running Caliptra ROM ...
2,212,549 UART:
2,212,722 UART: [state] CFI Enabled
2,213,693 UART: [state] LifecycleState = Unprovisioned
2,215,349 UART: [state] DebugLocked = No
2,216,479 UART: [state] WD Timer not started. Device not locked for debugging
2,218,956 UART: [kat] SHA2-256
2,219,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,222,642 UART: [kat] ++
2,223,096 UART: [kat] sha1
2,223,650 UART: [kat] SHA2-256
2,224,337 UART: [kat] SHA2-384
2,224,995 UART: [kat] SHA2-512-ACC
2,225,815 UART: [kat] ECC-384
2,948,288 UART: [kat] HMAC-384Kdf
2,969,923 UART: [kat] LMS
3,499,396 UART: [kat] --
3,504,738 UART: [cold-reset] ++
3,505,914 UART: [fht] FHT @ 0x50003400
3,517,135 UART: [idev] ++
3,517,703 UART: [idev] CDI.KEYID = 6
3,518,602 UART: [idev] SUBJECT.KEYID = 7
3,519,821 UART: [idev] UDS.KEYID = 0
3,542,369 UART: [idev] Erasing UDS.KEYID = 0
6,022,065 UART: [idev] Sha1 KeyId Algorithm
6,044,907 UART: [idev] --
6,048,168 UART: [ldev] ++
6,048,744 UART: [ldev] CDI.KEYID = 6
6,049,628 UART: [ldev] SUBJECT.KEYID = 5
6,050,845 UART: [ldev] AUTHORITY.KEYID = 7
6,052,081 UART: [ldev] FE.KEYID = 1
6,097,646 UART: [ldev] Erasing FE.KEYID = 1
8,600,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,357 UART: [ldev] --
10,391,143 UART: [fwproc] Wait for Commands...
10,393,299 UART: [fwproc] Recv command 0x46574c44
10,395,338 UART: [fwproc] Recv'd Img size: 114448 bytes
10,472,817 UART: ROM Fatal Error: 0x00B0003A
10,475,899 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
2,055,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,200,176 UART:
2,200,616 UART: Running Caliptra ROM ...
2,201,735 UART:
2,201,897 UART: [state] CFI Enabled
2,202,863 UART: [state] LifecycleState = Unprovisioned
2,204,522 UART: [state] DebugLocked = No
2,205,554 UART: [state] WD Timer not started. Device not locked for debugging
2,208,015 UART: [kat] SHA2-256
2,208,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,938 UART: [kat] ++
2,212,406 UART: [kat] sha1
2,212,950 UART: [kat] SHA2-256
2,213,610 UART: [kat] SHA2-384
2,214,266 UART: [kat] SHA2-512-ACC
2,215,090 UART: [kat] ECC-384
2,948,965 UART: [kat] HMAC-384Kdf
2,972,120 UART: [kat] LMS
3,501,523 UART: [kat] --
3,506,776 UART: [cold-reset] ++
3,508,824 UART: [fht] FHT @ 0x50003400
3,521,100 UART: [idev] ++
3,521,672 UART: [idev] CDI.KEYID = 6
3,522,580 UART: [idev] SUBJECT.KEYID = 7
3,523,793 UART: [idev] UDS.KEYID = 0
3,542,575 UART: [idev] Erasing UDS.KEYID = 0
6,026,852 UART: [idev] Sha1 KeyId Algorithm
6,048,627 UART: [idev] --
6,051,600 UART: [ldev] ++
6,052,210 UART: [ldev] CDI.KEYID = 6
6,053,127 UART: [ldev] SUBJECT.KEYID = 5
6,054,296 UART: [ldev] AUTHORITY.KEYID = 7
6,055,534 UART: [ldev] FE.KEYID = 1
6,098,379 UART: [ldev] Erasing FE.KEYID = 1
8,603,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,608 UART: [ldev] --
10,413,064 UART: [fwproc] Wait for Commands...
10,415,219 UART: [fwproc] Recv command 0x46574c44
10,417,314 UART: [fwproc] Recv'd Img size: 114448 bytes
14,983,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,057,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,125,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,444,217 >>> mbox cmd response: success
15,448,784 UART: [afmc] ++
15,449,377 UART: [afmc] CDI.KEYID = 6
15,450,261 UART: [afmc] SUBJECT.KEYID = 7
15,451,476 UART: [afmc] AUTHORITY.KEYID = 5
17,995,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,717,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,719,845 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,735,873 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,751,830 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,767,661 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,790,440 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.35s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
2,053,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,261,381 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
2,060,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,274,827 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,054,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,260,849 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,060,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,258,134 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,503 writing to cptra_bootfsm_go
2,053,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,255,234 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
2,055,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,258,882 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,656 writing to cptra_bootfsm_go
2,069,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,274,701 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,055,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,276,747 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
2,054,510 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,277,805 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,884 writing to cptra_bootfsm_go
2,079,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,276,399 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
2,055,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,240,203 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,053,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,253,911 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
2,058,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,250,329 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
2,055,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,274,469 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
2,056,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,278,228 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,066,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,253,981 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
2,058,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,301,168 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
2,068,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,275,640 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,057,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,055,387 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 16.99s
Truncated 76844 bytes from beginning
0,634,537 UART: [fwproc] Recv'd Img size: 114448 bytes
10,714,942 UART: ROM Fatal Error: 0x00B0003A
10,718,035 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,057,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,202,106 UART:
2,202,504 UART: Running Caliptra ROM ...
2,203,811 UART:
2,204,000 UART: [state] CFI Enabled
2,204,982 UART: [state] LifecycleState = Unprovisioned
2,206,649 UART: [state] DebugLocked = No
2,207,759 UART: [state] WD Timer not started. Device not locked for debugging
2,210,234 UART: [kat] SHA2-256
2,210,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,910 UART: [kat] ++
2,214,364 UART: [kat] sha1
2,214,903 UART: [kat] SHA2-256
2,215,563 UART: [kat] SHA2-384
2,216,405 UART: [kat] SHA2-512-ACC
2,217,217 UART: [kat] ECC-384
3,277,356 UART: [kat] HMAC-384Kdf
3,290,571 UART: [kat] LMS
3,820,066 UART: [kat] --
3,823,979 UART: [cold-reset] ++
3,824,908 UART: [fht] FHT @ 0x50003400
3,837,240 UART: [idev] ++
3,837,810 UART: [idev] CDI.KEYID = 6
3,838,716 UART: [idev] SUBJECT.KEYID = 7
3,839,928 UART: [idev] UDS.KEYID = 0
3,856,602 UART: [idev] Erasing UDS.KEYID = 0
6,313,382 UART: [idev] Sha1 KeyId Algorithm
6,337,588 UART: [idev] --
6,340,342 UART: [ldev] ++
6,340,913 UART: [ldev] CDI.KEYID = 6
6,341,820 UART: [ldev] SUBJECT.KEYID = 5
6,342,977 UART: [ldev] AUTHORITY.KEYID = 7
6,344,261 UART: [ldev] FE.KEYID = 1
6,354,634 UART: [ldev] Erasing FE.KEYID = 1
8,827,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,586 UART: [ldev] --
10,617,563 UART: [fwproc] Wait for Commands...
10,620,142 UART: [fwproc] Recv command 0x46574c44
10,622,236 UART: [fwproc] Recv'd Img size: 114448 bytes
10,697,294 UART: ROM Fatal Error: 0x00B0003A
10,700,439 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,070,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,214,688 UART:
2,215,088 UART: Running Caliptra ROM ...
2,216,267 UART:
2,216,452 UART: [state] CFI Enabled
2,217,413 UART: [state] LifecycleState = Unprovisioned
2,219,076 UART: [state] DebugLocked = No
2,220,135 UART: [state] WD Timer not started. Device not locked for debugging
2,222,609 UART: [kat] SHA2-256
2,223,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,226,306 UART: [kat] ++
2,226,759 UART: [kat] sha1
2,227,273 UART: [kat] SHA2-256
2,228,008 UART: [kat] SHA2-384
2,228,679 UART: [kat] SHA2-512-ACC
2,229,801 UART: [kat] ECC-384
3,282,036 UART: [kat] HMAC-384Kdf
3,294,298 UART: [kat] LMS
3,823,819 UART: [kat] --
3,826,546 UART: [cold-reset] ++
3,828,964 UART: [fht] FHT @ 0x50003400
3,840,894 UART: [idev] ++
3,841,480 UART: [idev] CDI.KEYID = 6
3,842,549 UART: [idev] SUBJECT.KEYID = 7
3,843,653 UART: [idev] UDS.KEYID = 0
3,862,327 UART: [idev] Erasing UDS.KEYID = 0
6,320,258 UART: [idev] Sha1 KeyId Algorithm
6,343,279 UART: [idev] --
6,346,193 UART: [ldev] ++
6,346,761 UART: [ldev] CDI.KEYID = 6
6,347,667 UART: [ldev] SUBJECT.KEYID = 5
6,348,882 UART: [ldev] AUTHORITY.KEYID = 7
6,350,131 UART: [ldev] FE.KEYID = 1
6,362,995 UART: [ldev] Erasing FE.KEYID = 1
8,835,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,416 UART: [ldev] --
10,628,866 UART: [fwproc] Wait for Commands...
10,630,672 UART: [fwproc] Recv command 0x46574c44
10,632,734 UART: [fwproc] Recv'd Img size: 114448 bytes
10,711,095 UART: ROM Fatal Error: 0x00B0003A
10,714,235 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,057,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,202,138 UART:
2,202,555 UART: Running Caliptra ROM ...
2,203,646 UART:
2,203,799 UART: [state] CFI Enabled
2,204,761 UART: [state] LifecycleState = Unprovisioned
2,206,416 UART: [state] DebugLocked = No
2,207,441 UART: [state] WD Timer not started. Device not locked for debugging
2,209,921 UART: [kat] SHA2-256
2,210,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,603 UART: [kat] ++
2,214,052 UART: [kat] sha1
2,214,589 UART: [kat] SHA2-256
2,215,331 UART: [kat] SHA2-384
2,215,996 UART: [kat] SHA2-512-ACC
2,216,877 UART: [kat] ECC-384
3,284,417 UART: [kat] HMAC-384Kdf
3,296,811 UART: [kat] LMS
3,826,325 UART: [kat] --
3,831,071 UART: [cold-reset] ++
3,832,083 UART: [fht] FHT @ 0x50003400
3,843,043 UART: [idev] ++
3,843,602 UART: [idev] CDI.KEYID = 6
3,844,484 UART: [idev] SUBJECT.KEYID = 7
3,845,696 UART: [idev] UDS.KEYID = 0
3,864,334 UART: [idev] Erasing UDS.KEYID = 0
6,319,250 UART: [idev] Sha1 KeyId Algorithm
6,342,095 UART: [idev] --
6,344,899 UART: [ldev] ++
6,345,481 UART: [ldev] CDI.KEYID = 6
6,346,366 UART: [ldev] SUBJECT.KEYID = 5
6,347,501 UART: [ldev] AUTHORITY.KEYID = 7
6,348,839 UART: [ldev] FE.KEYID = 1
6,358,516 UART: [ldev] Erasing FE.KEYID = 1
8,833,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,184 UART: [ldev] --
10,626,124 UART: [fwproc] Wait for Commands...
10,628,055 UART: [fwproc] Recv command 0x46574c44
10,630,152 UART: [fwproc] Recv'd Img size: 114448 bytes
10,710,401 UART: ROM Fatal Error: 0x00B0003A
10,713,561 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,057,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,201,976 UART:
2,202,399 UART: Running Caliptra ROM ...
2,203,535 UART:
2,203,703 UART: [state] CFI Enabled
2,204,657 UART: [state] LifecycleState = Unprovisioned
2,206,318 UART: [state] DebugLocked = No
2,207,425 UART: [state] WD Timer not started. Device not locked for debugging
2,209,930 UART: [kat] SHA2-256
2,210,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,620 UART: [kat] ++
2,214,071 UART: [kat] sha1
2,214,585 UART: [kat] SHA2-256
2,215,436 UART: [kat] SHA2-384
2,216,102 UART: [kat] SHA2-512-ACC
2,216,945 UART: [kat] ECC-384
3,279,830 UART: [kat] HMAC-384Kdf
3,293,793 UART: [kat] LMS
3,823,250 UART: [kat] --
3,827,405 UART: [cold-reset] ++
3,828,258 UART: [fht] FHT @ 0x50003400
3,837,937 UART: [idev] ++
3,838,497 UART: [idev] CDI.KEYID = 6
3,839,403 UART: [idev] SUBJECT.KEYID = 7
3,840,635 UART: [idev] UDS.KEYID = 0
3,857,669 UART: [idev] Erasing UDS.KEYID = 0
6,315,004 UART: [idev] Sha1 KeyId Algorithm
6,337,965 UART: [idev] --
6,341,034 UART: [ldev] ++
6,341,607 UART: [ldev] CDI.KEYID = 6
6,342,512 UART: [ldev] SUBJECT.KEYID = 5
6,343,724 UART: [ldev] AUTHORITY.KEYID = 7
6,344,950 UART: [ldev] FE.KEYID = 1
6,357,660 UART: [ldev] Erasing FE.KEYID = 1
8,831,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,400 UART: [ldev] --
10,621,285 UART: [fwproc] Wait for Commands...
10,624,356 UART: [fwproc] Recv command 0x46574c44
10,626,395 UART: [fwproc] Recv'd Img size: 114448 bytes
15,195,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,276,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,345,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,664,112 >>> mbox cmd response: success
15,669,126 UART: [afmc] ++
15,669,714 UART: [afmc] CDI.KEYID = 6
15,670,622 UART: [afmc] SUBJECT.KEYID = 7
15,671,838 UART: [afmc] AUTHORITY.KEYID = 5
18,173,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,894,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,896,785 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,912,770 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,928,787 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,944,606 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,966,549 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.70s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,057,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,474,313 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
2,055,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,489,111 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,063,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,494,424 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,055,598 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,469,379 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,911 writing to cptra_bootfsm_go
2,056,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,476,057 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,057,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,475,067 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,055,081 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,486,379 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,062,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,489,170 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,055,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,490,323 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,056,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,471,308 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,055,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,474,319 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,061,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,482,510 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,056,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,491,302 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,055,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,483,922 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,057,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,479,009 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,055,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,477,954 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,057,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,495,229 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
2,056,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,485,512 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,056,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,260,952 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.33s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
2,053,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,257,532 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,069,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,280,256 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
2,053,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,281,900 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,065,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,276,793 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
2,064,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,276,093 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,054,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,236,683 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
2,062,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,299,909 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,052,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,278,002 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
2,059,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,254,063 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
2,057,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,258,703 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,053,414 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,259,953 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
2,055,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,277,546 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,053,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,262,801 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
2,057,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,287,836 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,075,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,251,500 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
2,061,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,259,564 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
2,072,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,274,471 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
2,079,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,281,401 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
2,053,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,083,548 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.00s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,055,755 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,488,164 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,055,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,480,555 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,057,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,484,503 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,057,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,483,566 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
2,058,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,478,341 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
2,056,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,476,137 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,057,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,477,564 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,056,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,491,715 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
2,069,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,479,352 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,057,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,473,577 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
2,056,879 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,479,611 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,059,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,491,514 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,057,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,483,247 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,055,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,488,239 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,062,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,485,014 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
2,055,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,486,237 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,055,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,490,293 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,055,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,481,768 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
2,056,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,230,945 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.32s
Truncated 74764 bytes from beginning
1,274,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,612 UART: [ldev] --
1,282,894 UART: [fwproc] Wait for Commands...
1,283,549 UART: [fwproc] Recv command 0x46574c44
1,284,282 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,334 UART: ROM Fatal Error: 0x00B0003A
1,311,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,182,027 UART: [idev] Erasing UDS.KEYID = 0
1,199,519 UART: [idev] Sha1 KeyId Algorithm
1,208,399 UART: [idev] --
1,209,584 UART: [ldev] ++
1,209,752 UART: [ldev] CDI.KEYID = 6
1,210,116 UART: [ldev] SUBJECT.KEYID = 5
1,210,543 UART: [ldev] AUTHORITY.KEYID = 7
1,211,006 UART: [ldev] FE.KEYID = 1
1,216,274 UART: [ldev] Erasing FE.KEYID = 1
1,242,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,242 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,425 UART: [fwproc] Recv command 0x46574c44
1,283,158 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,212 UART: ROM Fatal Error: 0x00B0003A
1,309,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
891,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
915,848 UART: [kat] HMAC-384Kdf
920,292 UART: [kat] LMS
1,168,604 UART: [kat] --
1,169,677 UART: [cold-reset] ++
1,170,155 UART: [fht] FHT @ 0x50003400
1,172,839 UART: [idev] ++
1,173,007 UART: [idev] CDI.KEYID = 6
1,173,368 UART: [idev] SUBJECT.KEYID = 7
1,173,793 UART: [idev] UDS.KEYID = 0
1,181,359 UART: [idev] Erasing UDS.KEYID = 0
1,198,461 UART: [idev] Sha1 KeyId Algorithm
1,207,245 UART: [idev] --
1,208,428 UART: [ldev] ++
1,208,596 UART: [ldev] CDI.KEYID = 6
1,208,960 UART: [ldev] SUBJECT.KEYID = 5
1,209,387 UART: [ldev] AUTHORITY.KEYID = 7
1,209,850 UART: [ldev] FE.KEYID = 1
1,214,996 UART: [ldev] Erasing FE.KEYID = 1
1,241,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,488 UART: [fwproc] Wait for Commands...
1,281,267 UART: [fwproc] Recv command 0x46574c44
1,282,000 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,126 UART: ROM Fatal Error: 0x00B0003A
1,309,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,785 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,199,843 UART: [idev] Sha1 KeyId Algorithm
1,208,617 UART: [idev] --
1,209,722 UART: [ldev] ++
1,209,890 UART: [ldev] CDI.KEYID = 6
1,210,254 UART: [ldev] SUBJECT.KEYID = 5
1,210,681 UART: [ldev] AUTHORITY.KEYID = 7
1,211,144 UART: [ldev] FE.KEYID = 1
1,216,502 UART: [ldev] Erasing FE.KEYID = 1
1,242,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,612 UART: [ldev] --
1,282,040 UART: [fwproc] Wait for Commands...
1,282,717 UART: [fwproc] Recv command 0x46574c44
1,283,450 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,652 UART: ROM Fatal Error: 0x00B0003A
1,310,813 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,205 UART: [kat] ++
895,357 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
915,538 UART: [kat] HMAC-384Kdf
920,180 UART: [kat] LMS
1,168,492 UART: [kat] --
1,169,591 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,181,379 UART: [idev] Erasing UDS.KEYID = 0
1,198,597 UART: [idev] Sha1 KeyId Algorithm
1,207,597 UART: [idev] --
1,208,740 UART: [ldev] ++
1,208,908 UART: [ldev] CDI.KEYID = 6
1,209,272 UART: [ldev] SUBJECT.KEYID = 5
1,209,699 UART: [ldev] AUTHORITY.KEYID = 7
1,210,162 UART: [ldev] FE.KEYID = 1
1,215,084 UART: [ldev] Erasing FE.KEYID = 1
1,241,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,142 UART: [ldev] --
1,280,532 UART: [fwproc] Wait for Commands...
1,281,357 UART: [fwproc] Recv command 0x46574c44
1,282,090 UART: [fwproc] Recv'd Img size: 114448 bytes
3,125,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,154,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,319,380 >>> mbox cmd response: success
3,320,495 UART: [afmc] ++
3,320,663 UART: [afmc] CDI.KEYID = 6
3,321,026 UART: [afmc] SUBJECT.KEYID = 7
3,321,452 UART: [afmc] AUTHORITY.KEYID = 5
3,356,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,973 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,379,681 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,385,566 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,391,268 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,399,038 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 19.18s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,516 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,252 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,226 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,626 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,866 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,440 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,288 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,774 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,770 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,162,720 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.07s
Truncated 74764 bytes from beginning
1,273,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,631 UART: [ldev] --
1,282,049 UART: [fwproc] Wait for Commands...
1,282,762 UART: [fwproc] Recv command 0x46574c44
1,283,495 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,733 UART: ROM Fatal Error: 0x00B0003A
1,310,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,103 UART: [kat] LMS
1,169,415 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,588 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
1,181,986 UART: [idev] Erasing UDS.KEYID = 0
1,199,054 UART: [idev] Sha1 KeyId Algorithm
1,208,008 UART: [idev] --
1,209,119 UART: [ldev] ++
1,209,287 UART: [ldev] CDI.KEYID = 6
1,209,651 UART: [ldev] SUBJECT.KEYID = 5
1,210,078 UART: [ldev] AUTHORITY.KEYID = 7
1,210,541 UART: [ldev] FE.KEYID = 1
1,215,731 UART: [ldev] Erasing FE.KEYID = 1
1,242,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,733 UART: [ldev] --
1,281,203 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,847 UART: ROM Fatal Error: 0x00B0003A
1,309,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,527 UART: [kat] SHA2-512-ACC
906,428 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,729 UART: [kat] LMS
1,169,041 UART: [kat] --
1,169,956 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,182,290 UART: [idev] Erasing UDS.KEYID = 0
1,199,580 UART: [idev] Sha1 KeyId Algorithm
1,208,514 UART: [idev] --
1,209,539 UART: [ldev] ++
1,209,707 UART: [ldev] CDI.KEYID = 6
1,210,071 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,243,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,137 UART: [ldev] --
1,282,601 UART: [fwproc] Wait for Commands...
1,283,420 UART: [fwproc] Recv command 0x46574c44
1,284,153 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,721 UART: ROM Fatal Error: 0x00B0003A
1,311,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
921,143 UART: [kat] LMS
1,169,455 UART: [kat] --
1,170,436 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,182,508 UART: [idev] Erasing UDS.KEYID = 0
1,199,584 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,535 UART: [ldev] ++
1,209,703 UART: [ldev] CDI.KEYID = 6
1,210,067 UART: [ldev] SUBJECT.KEYID = 5
1,210,494 UART: [ldev] AUTHORITY.KEYID = 7
1,210,957 UART: [ldev] FE.KEYID = 1
1,216,291 UART: [ldev] Erasing FE.KEYID = 1
1,242,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,185 UART: [ldev] --
1,281,485 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x46574c44
1,282,827 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,419 UART: ROM Fatal Error: 0x00B0003A
1,309,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,657 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,666 UART: [cold-reset] ++
1,171,136 UART: [fht] FHT @ 0x50003400
1,173,872 UART: [idev] ++
1,174,040 UART: [idev] CDI.KEYID = 6
1,174,401 UART: [idev] SUBJECT.KEYID = 7
1,174,826 UART: [idev] UDS.KEYID = 0
1,183,206 UART: [idev] Erasing UDS.KEYID = 0
1,200,478 UART: [idev] Sha1 KeyId Algorithm
1,209,342 UART: [idev] --
1,210,417 UART: [ldev] ++
1,210,585 UART: [ldev] CDI.KEYID = 6
1,210,949 UART: [ldev] SUBJECT.KEYID = 5
1,211,376 UART: [ldev] AUTHORITY.KEYID = 7
1,211,839 UART: [ldev] FE.KEYID = 1
1,217,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,431 UART: [ldev] --
1,282,905 UART: [fwproc] Wait for Commands...
1,283,504 UART: [fwproc] Recv command 0x46574c44
1,284,237 UART: [fwproc] Recv'd Img size: 114448 bytes
3,136,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,164,688 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,193,997 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,329,939 >>> mbox cmd response: success
3,331,108 UART: [afmc] ++
3,331,276 UART: [afmc] CDI.KEYID = 6
3,331,639 UART: [afmc] SUBJECT.KEYID = 7
3,332,065 UART: [afmc] AUTHORITY.KEYID = 5
3,367,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,384,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,385,002 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,390,710 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,396,595 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,402,297 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,410,051 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.85s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,511 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,923 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,229 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,569 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,168,131 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.60s
Truncated 74764 bytes from beginning
1,271,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,708 UART: [ldev] --
1,280,026 UART: [fwproc] Wait for Commands...
1,280,735 UART: [fwproc] Recv command 0x46574c44
1,281,468 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,112 UART: ROM Fatal Error: 0x00B0003A
1,308,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
916,374 UART: [kat] HMAC-384Kdf
920,974 UART: [kat] LMS
1,169,286 UART: [kat] --
1,170,391 UART: [cold-reset] ++
1,170,847 UART: [fht] FHT @ 0x50003400
1,173,595 UART: [idev] ++
1,173,763 UART: [idev] CDI.KEYID = 6
1,174,124 UART: [idev] SUBJECT.KEYID = 7
1,174,549 UART: [idev] UDS.KEYID = 0
1,182,731 UART: [idev] Erasing UDS.KEYID = 0
1,199,889 UART: [idev] Sha1 KeyId Algorithm
1,208,849 UART: [idev] --
1,209,722 UART: [ldev] ++
1,209,890 UART: [ldev] CDI.KEYID = 6
1,210,254 UART: [ldev] SUBJECT.KEYID = 5
1,210,681 UART: [ldev] AUTHORITY.KEYID = 7
1,211,144 UART: [ldev] FE.KEYID = 1
1,216,242 UART: [ldev] Erasing FE.KEYID = 1
1,242,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,908 UART: [ldev] --
1,281,276 UART: [fwproc] Wait for Commands...
1,281,901 UART: [fwproc] Recv command 0x46574c44
1,282,634 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,094 UART: ROM Fatal Error: 0x00B0003A
1,310,255 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
915,854 UART: [kat] HMAC-384Kdf
920,384 UART: [kat] LMS
1,168,696 UART: [kat] --
1,169,523 UART: [cold-reset] ++
1,170,007 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,182,065 UART: [idev] Erasing UDS.KEYID = 0
1,199,353 UART: [idev] Sha1 KeyId Algorithm
1,208,241 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,606 UART: [ldev] Erasing FE.KEYID = 1
1,241,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,738 UART: [ldev] --
1,281,220 UART: [fwproc] Wait for Commands...
1,282,035 UART: [fwproc] Recv command 0x46574c44
1,282,768 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,890 UART: ROM Fatal Error: 0x00B0003A
1,310,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,205 UART: [kat] ++
895,357 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,773 UART: [cold-reset] ++
1,170,285 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,182,111 UART: [idev] Erasing UDS.KEYID = 0
1,199,179 UART: [idev] Sha1 KeyId Algorithm
1,208,145 UART: [idev] --
1,209,212 UART: [ldev] ++
1,209,380 UART: [ldev] CDI.KEYID = 6
1,209,744 UART: [ldev] SUBJECT.KEYID = 5
1,210,171 UART: [ldev] AUTHORITY.KEYID = 7
1,210,634 UART: [ldev] FE.KEYID = 1
1,215,976 UART: [ldev] Erasing FE.KEYID = 1
1,242,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,992 UART: [ldev] --
1,281,464 UART: [fwproc] Wait for Commands...
1,282,099 UART: [fwproc] Recv command 0x46574c44
1,282,832 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,552 UART: ROM Fatal Error: 0x00B0003A
1,310,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,452 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,379 UART: [cold-reset] ++
1,170,937 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,182,519 UART: [idev] Erasing UDS.KEYID = 0
1,199,419 UART: [idev] Sha1 KeyId Algorithm
1,208,115 UART: [idev] --
1,209,152 UART: [ldev] ++
1,209,320 UART: [ldev] CDI.KEYID = 6
1,209,684 UART: [ldev] SUBJECT.KEYID = 5
1,210,111 UART: [ldev] AUTHORITY.KEYID = 7
1,210,574 UART: [ldev] FE.KEYID = 1
1,215,962 UART: [ldev] Erasing FE.KEYID = 1
1,241,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,516 UART: [ldev] --
1,280,958 UART: [fwproc] Wait for Commands...
1,281,723 UART: [fwproc] Recv command 0x46574c44
1,282,456 UART: [fwproc] Recv'd Img size: 114448 bytes
3,120,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,148,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,313,456 >>> mbox cmd response: success
3,314,537 UART: [afmc] ++
3,314,705 UART: [afmc] CDI.KEYID = 6
3,315,068 UART: [afmc] SUBJECT.KEYID = 7
3,315,494 UART: [afmc] AUTHORITY.KEYID = 5
3,351,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,813 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,374,521 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,380,406 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,386,108 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,394,052 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.64s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,226 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,990 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,050 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,110 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,570 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,516 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,480 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,165,907 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.57s
Truncated 74764 bytes from beginning
1,273,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,993 UART: [ldev] --
1,282,259 UART: [fwproc] Wait for Commands...
1,283,048 UART: [fwproc] Recv command 0x46574c44
1,283,781 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,761 UART: ROM Fatal Error: 0x00B0003A
1,310,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,242 UART: [state] WD Timer not started. Device not locked for debugging
88,425 UART: [kat] SHA2-256
891,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,104 UART: [kat] ++
896,256 UART: [kat] sha1
900,392 UART: [kat] SHA2-256
902,332 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
917,079 UART: [kat] HMAC-384Kdf
921,721 UART: [kat] LMS
1,170,033 UART: [kat] --
1,170,860 UART: [cold-reset] ++
1,171,428 UART: [fht] FHT @ 0x50003400
1,173,934 UART: [idev] ++
1,174,102 UART: [idev] CDI.KEYID = 6
1,174,463 UART: [idev] SUBJECT.KEYID = 7
1,174,888 UART: [idev] UDS.KEYID = 0
1,183,220 UART: [idev] Erasing UDS.KEYID = 0
1,200,436 UART: [idev] Sha1 KeyId Algorithm
1,209,274 UART: [idev] --
1,210,295 UART: [ldev] ++
1,210,463 UART: [ldev] CDI.KEYID = 6
1,210,827 UART: [ldev] SUBJECT.KEYID = 5
1,211,254 UART: [ldev] AUTHORITY.KEYID = 7
1,211,717 UART: [ldev] FE.KEYID = 1
1,216,879 UART: [ldev] Erasing FE.KEYID = 1
1,244,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,995 UART: [ldev] --
1,283,391 UART: [fwproc] Wait for Commands...
1,284,122 UART: [fwproc] Recv command 0x46574c44
1,284,855 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,605 UART: ROM Fatal Error: 0x00B0003A
1,311,766 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,699 UART: [kat] HMAC-384Kdf
921,525 UART: [kat] LMS
1,169,837 UART: [kat] --
1,170,726 UART: [cold-reset] ++
1,171,200 UART: [fht] FHT @ 0x50003400
1,173,880 UART: [idev] ++
1,174,048 UART: [idev] CDI.KEYID = 6
1,174,409 UART: [idev] SUBJECT.KEYID = 7
1,174,834 UART: [idev] UDS.KEYID = 0
1,182,686 UART: [idev] Erasing UDS.KEYID = 0
1,200,202 UART: [idev] Sha1 KeyId Algorithm
1,209,032 UART: [idev] --
1,210,101 UART: [ldev] ++
1,210,269 UART: [ldev] CDI.KEYID = 6
1,210,633 UART: [ldev] SUBJECT.KEYID = 5
1,211,060 UART: [ldev] AUTHORITY.KEYID = 7
1,211,523 UART: [ldev] FE.KEYID = 1
1,216,545 UART: [ldev] Erasing FE.KEYID = 1
1,243,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,339 UART: [ldev] --
1,282,677 UART: [fwproc] Wait for Commands...
1,283,456 UART: [fwproc] Recv command 0x46574c44
1,284,189 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,835 UART: ROM Fatal Error: 0x00B0003A
1,310,996 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,565 UART: [kat] HMAC-384Kdf
921,195 UART: [kat] LMS
1,169,507 UART: [kat] --
1,170,418 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,590 UART: [idev] ++
1,173,758 UART: [idev] CDI.KEYID = 6
1,174,119 UART: [idev] SUBJECT.KEYID = 7
1,174,544 UART: [idev] UDS.KEYID = 0
1,182,338 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,494 UART: [idev] --
1,209,675 UART: [ldev] ++
1,209,843 UART: [ldev] CDI.KEYID = 6
1,210,207 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,243,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,747 UART: [ldev] --
1,283,199 UART: [fwproc] Wait for Commands...
1,284,024 UART: [fwproc] Recv command 0x46574c44
1,284,757 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,583 UART: ROM Fatal Error: 0x00B0003A
1,310,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,052 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,182,130 UART: [idev] Erasing UDS.KEYID = 0
1,199,222 UART: [idev] Sha1 KeyId Algorithm
1,208,274 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,215,955 UART: [ldev] Erasing FE.KEYID = 1
1,242,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,235 UART: [ldev] --
1,281,711 UART: [fwproc] Wait for Commands...
1,282,458 UART: [fwproc] Recv command 0x46574c44
1,283,191 UART: [fwproc] Recv'd Img size: 114448 bytes
3,123,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,151,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,316,306 >>> mbox cmd response: success
3,317,529 UART: [afmc] ++
3,317,697 UART: [afmc] CDI.KEYID = 6
3,318,060 UART: [afmc] SUBJECT.KEYID = 7
3,318,486 UART: [afmc] AUTHORITY.KEYID = 5
3,354,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,471 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,377,179 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,383,064 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,388,766 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,396,588 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.63s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,089 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,949 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,053 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,607 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,107 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,091 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.75s
Truncated 74764 bytes from beginning
1,272,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,326 UART: [ldev] --
1,280,636 UART: [fwproc] Wait for Commands...
1,281,305 UART: [fwproc] Recv command 0x46574c44
1,282,038 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,766 UART: ROM Fatal Error: 0x00B0003A
1,308,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
891,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,894 UART: [kat] SHA2-512-ACC
906,795 UART: [kat] ECC-384
916,484 UART: [kat] HMAC-384Kdf
921,030 UART: [kat] LMS
1,169,342 UART: [kat] --
1,170,451 UART: [cold-reset] ++
1,170,987 UART: [fht] FHT @ 0x50003400
1,173,713 UART: [idev] ++
1,173,881 UART: [idev] CDI.KEYID = 6
1,174,242 UART: [idev] SUBJECT.KEYID = 7
1,174,667 UART: [idev] UDS.KEYID = 0
1,182,429 UART: [idev] Erasing UDS.KEYID = 0
1,199,353 UART: [idev] Sha1 KeyId Algorithm
1,208,157 UART: [idev] --
1,209,130 UART: [ldev] ++
1,209,298 UART: [ldev] CDI.KEYID = 6
1,209,662 UART: [ldev] SUBJECT.KEYID = 5
1,210,089 UART: [ldev] AUTHORITY.KEYID = 7
1,210,552 UART: [ldev] FE.KEYID = 1
1,215,526 UART: [ldev] Erasing FE.KEYID = 1
1,242,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,512 UART: [fwproc] Wait for Commands...
1,282,135 UART: [fwproc] Recv command 0x46574c44
1,282,868 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,582 UART: ROM Fatal Error: 0x00B0003A
1,309,743 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,857 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,705 UART: [kat] ++
895,857 UART: [kat] sha1
900,293 UART: [kat] SHA2-256
902,233 UART: [kat] SHA2-384
905,112 UART: [kat] SHA2-512-ACC
907,013 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,170,323 UART: [cold-reset] ++
1,170,655 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,198,893 UART: [idev] Sha1 KeyId Algorithm
1,207,819 UART: [idev] --
1,208,898 UART: [ldev] ++
1,209,066 UART: [ldev] CDI.KEYID = 6
1,209,430 UART: [ldev] SUBJECT.KEYID = 5
1,209,857 UART: [ldev] AUTHORITY.KEYID = 7
1,210,320 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,241,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,038 UART: [ldev] --
1,281,354 UART: [fwproc] Wait for Commands...
1,282,041 UART: [fwproc] Recv command 0x46574c44
1,282,774 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,610 UART: ROM Fatal Error: 0x00B0003A
1,309,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
915,778 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,891 UART: [fht] FHT @ 0x50003400
1,172,603 UART: [idev] ++
1,172,771 UART: [idev] CDI.KEYID = 6
1,173,132 UART: [idev] SUBJECT.KEYID = 7
1,173,557 UART: [idev] UDS.KEYID = 0
1,181,287 UART: [idev] Erasing UDS.KEYID = 0
1,198,279 UART: [idev] Sha1 KeyId Algorithm
1,207,123 UART: [idev] --
1,208,252 UART: [ldev] ++
1,208,420 UART: [ldev] CDI.KEYID = 6
1,208,784 UART: [ldev] SUBJECT.KEYID = 5
1,209,211 UART: [ldev] AUTHORITY.KEYID = 7
1,209,674 UART: [ldev] FE.KEYID = 1
1,215,016 UART: [ldev] Erasing FE.KEYID = 1
1,240,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,858 UART: [ldev] --
1,280,268 UART: [fwproc] Wait for Commands...
1,280,937 UART: [fwproc] Recv command 0x46574c44
1,281,670 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,164 UART: ROM Fatal Error: 0x00B0003A
1,308,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
891,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
920,860 UART: [kat] LMS
1,169,172 UART: [kat] --
1,169,853 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,181,825 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,554 UART: [ldev] ++
1,208,722 UART: [ldev] CDI.KEYID = 6
1,209,086 UART: [ldev] SUBJECT.KEYID = 5
1,209,513 UART: [ldev] AUTHORITY.KEYID = 7
1,209,976 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,242,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,236 UART: [ldev] --
1,281,580 UART: [fwproc] Wait for Commands...
1,282,231 UART: [fwproc] Recv command 0x46574c44
1,282,964 UART: [fwproc] Recv'd Img size: 114448 bytes
3,113,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,141,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,170,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,306,651 >>> mbox cmd response: success
3,307,896 UART: [afmc] ++
3,308,064 UART: [afmc] CDI.KEYID = 6
3,308,427 UART: [afmc] SUBJECT.KEYID = 7
3,308,853 UART: [afmc] AUTHORITY.KEYID = 5
3,343,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,850 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,366,558 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,372,443 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,378,145 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,385,989 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.73s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,696 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,980 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,040 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,226 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,000 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,952 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,606 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,984 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,266 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,161,055 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.48s
Truncated 74764 bytes from beginning
1,273,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,265 UART: [ldev] --
1,281,649 UART: [fwproc] Wait for Commands...
1,282,340 UART: [fwproc] Recv command 0x46574c44
1,283,073 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,951 UART: ROM Fatal Error: 0x00B0003A
1,310,112 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,182,798 UART: [idev] Erasing UDS.KEYID = 0
1,199,962 UART: [idev] Sha1 KeyId Algorithm
1,208,884 UART: [idev] --
1,209,895 UART: [ldev] ++
1,210,063 UART: [ldev] CDI.KEYID = 6
1,210,427 UART: [ldev] SUBJECT.KEYID = 5
1,210,854 UART: [ldev] AUTHORITY.KEYID = 7
1,211,317 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,243,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,173 UART: [ldev] --
1,283,599 UART: [fwproc] Wait for Commands...
1,284,234 UART: [fwproc] Recv command 0x46574c44
1,284,967 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,021 UART: ROM Fatal Error: 0x00B0003A
1,311,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,772 UART: [kat] ++
895,924 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,497 UART: [kat] HMAC-384Kdf
921,165 UART: [kat] LMS
1,169,477 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,270 UART: [idev] ++
1,173,438 UART: [idev] CDI.KEYID = 6
1,173,799 UART: [idev] SUBJECT.KEYID = 7
1,174,224 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,588 UART: [idev] Sha1 KeyId Algorithm
1,208,556 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,317 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,479 UART: [ldev] --
1,281,897 UART: [fwproc] Wait for Commands...
1,282,526 UART: [fwproc] Recv command 0x46574c44
1,283,259 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,215 UART: ROM Fatal Error: 0x00B0003A
1,310,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
891,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,420 UART: [kat] ++
895,572 UART: [kat] sha1
899,834 UART: [kat] SHA2-256
901,774 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,623 UART: [kat] HMAC-384Kdf
921,241 UART: [kat] LMS
1,169,553 UART: [kat] --
1,170,386 UART: [cold-reset] ++
1,170,770 UART: [fht] FHT @ 0x50003400
1,173,408 UART: [idev] ++
1,173,576 UART: [idev] CDI.KEYID = 6
1,173,937 UART: [idev] SUBJECT.KEYID = 7
1,174,362 UART: [idev] UDS.KEYID = 0
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,195 UART: [ldev] ++
1,209,363 UART: [ldev] CDI.KEYID = 6
1,209,727 UART: [ldev] SUBJECT.KEYID = 5
1,210,154 UART: [ldev] AUTHORITY.KEYID = 7
1,210,617 UART: [ldev] FE.KEYID = 1
1,215,937 UART: [ldev] Erasing FE.KEYID = 1
1,242,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,045 UART: [fwproc] Wait for Commands...
1,282,746 UART: [fwproc] Recv command 0x46574c44
1,283,479 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,963 UART: ROM Fatal Error: 0x00B0003A
1,311,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,139 UART: [kat] LMS
1,169,451 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,818 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,182,646 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,146 UART: [idev] --
1,209,363 UART: [ldev] ++
1,209,531 UART: [ldev] CDI.KEYID = 6
1,209,895 UART: [ldev] SUBJECT.KEYID = 5
1,210,322 UART: [ldev] AUTHORITY.KEYID = 7
1,210,785 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,923 UART: [ldev] --
1,281,389 UART: [fwproc] Wait for Commands...
1,282,210 UART: [fwproc] Recv command 0x46574c44
1,282,943 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,152,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,875 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,317,803 >>> mbox cmd response: success
3,318,900 UART: [afmc] ++
3,319,068 UART: [afmc] CDI.KEYID = 6
3,319,431 UART: [afmc] SUBJECT.KEYID = 7
3,319,857 UART: [afmc] AUTHORITY.KEYID = 5
3,355,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,394 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,378,102 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,383,987 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,389,689 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,397,439 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.61s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,867 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,439 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,259 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,881 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,239 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,229 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,073 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,181,110 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
5,666 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,189 UART:
192,584 UART: Running Caliptra ROM ...
193,732 UART:
193,905 UART: [state] CFI Enabled
260,724 UART: [state] LifecycleState = Manufacturing
263,151 UART: [state] DebugLocked = No
265,305 UART: [state] WD Timer not started. Device not locked for debugging
269,370 UART: [kat] SHA2-256
451,266 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,781 UART: [kat] ++
463,315 UART: [kat] sha1
474,090 UART: [kat] SHA2-256
477,102 UART: [kat] SHA2-384
482,155 UART: [kat] SHA2-512-ACC
484,772 UART: [kat] ECC-384
3,776,643 UART: [kat] HMAC-384Kdf
3,802,052 UART: [kat] LMS
4,875,224 UART: [kat] --
4,878,753 UART: [cold-reset] ++
4,880,882 UART: [fht] FHT @ 0x50003400
4,892,254 UART: [idev] ++
4,892,938 UART: [idev] CDI.KEYID = 6
4,894,179 UART: [idev] SUBJECT.KEYID = 7
4,895,445 UART: [idev] UDS.KEYID = 0
4,929,735 UART: [idev] Erasing UDS.KEYID = 0
8,241,132 UART: [idev] Sha1 KeyId Algorithm
8,262,434 UART: [idev] --
8,267,000 UART: [ldev] ++
8,267,583 UART: [ldev] CDI.KEYID = 6
8,268,749 UART: [ldev] SUBJECT.KEYID = 5
8,269,967 UART: [ldev] AUTHORITY.KEYID = 7
8,271,120 UART: [ldev] FE.KEYID = 1
8,315,928 UART: [ldev] Erasing FE.KEYID = 1
11,649,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,850 UART: [ldev] --
14,015,742 UART: [fwproc] Wait for Commands...
14,017,995 UART: [fwproc] Recv command 0x46574c44
14,020,323 UART: [fwproc] Recv'd Img size: 114124 bytes
14,111,078 UART: ROM Fatal Error: 0x000B0005
14,114,499 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
5,752 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,935,533 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
6,835 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,631 UART:
193,012 UART: Running Caliptra ROM ...
194,202 UART:
603,846 UART: [state] CFI Enabled
620,536 UART: [state] LifecycleState = Manufacturing
622,918 UART: [state] DebugLocked = No
624,616 UART: [state] WD Timer not started. Device not locked for debugging
629,473 UART: [kat] SHA2-256
811,476 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,014 UART: [kat] ++
823,550 UART: [kat] sha1
834,964 UART: [kat] SHA2-256
837,968 UART: [kat] SHA2-384
843,096 UART: [kat] SHA2-512-ACC
845,718 UART: [kat] ECC-384
4,099,321 UART: [kat] HMAC-384Kdf
4,110,899 UART: [kat] LMS
5,184,076 UART: [kat] --
5,187,577 UART: [cold-reset] ++
5,189,027 UART: [fht] FHT @ 0x50003400
5,199,397 UART: [idev] ++
5,200,091 UART: [idev] CDI.KEYID = 6
5,201,272 UART: [idev] SUBJECT.KEYID = 7
5,202,757 UART: [idev] UDS.KEYID = 0
5,216,083 UART: [idev] Erasing UDS.KEYID = 0
8,487,175 UART: [idev] Sha1 KeyId Algorithm
8,509,598 UART: [idev] --
8,512,129 UART: [ldev] ++
8,512,696 UART: [ldev] CDI.KEYID = 6
8,513,948 UART: [ldev] SUBJECT.KEYID = 5
8,515,387 UART: [ldev] AUTHORITY.KEYID = 7
8,516,954 UART: [ldev] FE.KEYID = 1
8,527,766 UART: [ldev] Erasing FE.KEYID = 1
11,821,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,128,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,144,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,160,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,180,914 UART: [ldev] --
14,184,939 UART: [fwproc] Wait for Commands...
14,187,626 UART: [fwproc] Recv command 0x46574c44
14,189,936 UART: [fwproc] Recv'd Img size: 114124 bytes
14,280,157 UART: ROM Fatal Error: 0x000B0005
14,283,545 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
6,893 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,102,073 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
5,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,083 UART:
192,494 UART: Running Caliptra ROM ...
193,610 UART:
193,766 UART: [state] CFI Enabled
263,215 UART: [state] LifecycleState = Manufacturing
265,087 UART: [state] DebugLocked = No
266,983 UART: [state] WD Timer not started. Device not locked for debugging
270,134 UART: [kat] SHA2-256
449,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,865 UART: [kat] ++
461,393 UART: [kat] sha1
472,329 UART: [kat] SHA2-256
475,344 UART: [kat] SHA2-384
481,809 UART: [kat] SHA2-512-ACC
484,745 UART: [kat] ECC-384
2,960,836 UART: [kat] HMAC-384Kdf
2,984,615 UART: [kat] LMS
3,514,032 UART: [kat] --
3,518,261 UART: [cold-reset] ++
3,520,029 UART: [fht] FHT @ 0x50003400
3,530,415 UART: [idev] ++
3,531,015 UART: [idev] CDI.KEYID = 6
3,531,958 UART: [idev] SUBJECT.KEYID = 7
3,533,126 UART: [idev] UDS.KEYID = 0
3,557,365 UART: [idev] Erasing UDS.KEYID = 0
6,041,074 UART: [idev] Sha1 KeyId Algorithm
6,064,306 UART: [idev] --
6,067,441 UART: [ldev] ++
6,068,073 UART: [ldev] CDI.KEYID = 6
6,068,970 UART: [ldev] SUBJECT.KEYID = 5
6,070,075 UART: [ldev] AUTHORITY.KEYID = 7
6,071,315 UART: [ldev] FE.KEYID = 1
6,114,111 UART: [ldev] Erasing FE.KEYID = 1
8,619,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,204 UART: [ldev] --
10,426,535 UART: [fwproc] Wait for Commands...
10,429,715 UART: [fwproc] Recv command 0x46574c44
10,431,755 UART: [fwproc] Recv'd Img size: 114448 bytes
10,522,547 UART: ROM Fatal Error: 0x000B0005
10,525,632 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
5,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,294,065 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
6,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,594 UART:
192,969 UART: Running Caliptra ROM ...
194,128 UART:
603,893 UART: [state] CFI Enabled
619,136 UART: [state] LifecycleState = Manufacturing
621,037 UART: [state] DebugLocked = No
623,936 UART: [state] WD Timer not started. Device not locked for debugging
626,915 UART: [kat] SHA2-256
806,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,618 UART: [kat] ++
818,144 UART: [kat] sha1
828,915 UART: [kat] SHA2-256
831,975 UART: [kat] SHA2-384
838,752 UART: [kat] SHA2-512-ACC
841,744 UART: [kat] ECC-384
3,282,481 UART: [kat] HMAC-384Kdf
3,295,038 UART: [kat] LMS
3,824,521 UART: [kat] --
3,828,617 UART: [cold-reset] ++
3,831,028 UART: [fht] FHT @ 0x50003400
3,842,383 UART: [idev] ++
3,842,951 UART: [idev] CDI.KEYID = 6
3,843,917 UART: [idev] SUBJECT.KEYID = 7
3,845,071 UART: [idev] UDS.KEYID = 0
3,858,187 UART: [idev] Erasing UDS.KEYID = 0
6,313,039 UART: [idev] Sha1 KeyId Algorithm
6,336,318 UART: [idev] --
6,341,230 UART: [ldev] ++
6,341,797 UART: [ldev] CDI.KEYID = 6
6,342,703 UART: [ldev] SUBJECT.KEYID = 5
6,343,917 UART: [ldev] AUTHORITY.KEYID = 7
6,345,164 UART: [ldev] FE.KEYID = 1
6,356,511 UART: [ldev] Erasing FE.KEYID = 1
8,832,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,433 UART: [ldev] --
10,624,209 UART: [fwproc] Wait for Commands...
10,626,344 UART: [fwproc] Recv command 0x46574c44
10,628,450 UART: [fwproc] Recv'd Img size: 114448 bytes
10,718,813 UART: ROM Fatal Error: 0x000B0005
10,721,956 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
6,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,483,958 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
5,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,271,075 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
6,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,497,607 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Manufacturing
85,621 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
915,206 UART: [kat] HMAC-384Kdf
919,790 UART: [kat] LMS
1,168,102 UART: [kat] --
1,168,969 UART: [cold-reset] ++
1,169,367 UART: [fht] FHT @ 0x50003400
1,171,951 UART: [idev] ++
1,172,119 UART: [idev] CDI.KEYID = 6
1,172,480 UART: [idev] SUBJECT.KEYID = 7
1,172,905 UART: [idev] UDS.KEYID = 0
1,180,631 UART: [idev] Erasing UDS.KEYID = 0
1,197,359 UART: [idev] Sha1 KeyId Algorithm
1,206,117 UART: [idev] --
1,207,342 UART: [ldev] ++
1,207,510 UART: [ldev] CDI.KEYID = 6
1,207,874 UART: [ldev] SUBJECT.KEYID = 5
1,208,301 UART: [ldev] AUTHORITY.KEYID = 7
1,208,764 UART: [ldev] FE.KEYID = 1
1,213,644 UART: [ldev] Erasing FE.KEYID = 1
1,240,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,332 UART: [ldev] --
1,279,684 UART: [fwproc] Wait for Commands...
1,280,461 UART: [fwproc] Recv command 0x46574c44
1,281,194 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,255 UART: ROM Fatal Error: 0x000B0005
1,326,412 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,573 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Manufacturing
86,152 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,094 UART: [kat] SHA2-256
902,034 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,890 UART: [fht] FHT @ 0x50003400
1,173,686 UART: [idev] ++
1,173,854 UART: [idev] CDI.KEYID = 6
1,174,215 UART: [idev] SUBJECT.KEYID = 7
1,174,640 UART: [idev] UDS.KEYID = 0
1,182,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,654 UART: [idev] Sha1 KeyId Algorithm
1,208,332 UART: [idev] --
1,209,339 UART: [ldev] ++
1,209,507 UART: [ldev] CDI.KEYID = 6
1,209,871 UART: [ldev] SUBJECT.KEYID = 5
1,210,298 UART: [ldev] AUTHORITY.KEYID = 7
1,210,761 UART: [ldev] FE.KEYID = 1
1,215,715 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,237 UART: [ldev] --
1,281,749 UART: [fwproc] Wait for Commands...
1,282,446 UART: [fwproc] Recv command 0x46574c44
1,283,179 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,902 UART: ROM Fatal Error: 0x000B0005
1,329,059 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,852 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,624 UART: [state] LifecycleState = Manufacturing
85,279 UART: [state] DebugLocked = No
85,967 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,277 UART: [kat] SHA2-256
901,217 UART: [kat] SHA2-384
903,962 UART: [kat] SHA2-512-ACC
905,863 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,352 UART: [kat] LMS
1,168,664 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,021 UART: [fht] FHT @ 0x50003400
1,172,485 UART: [idev] ++
1,172,653 UART: [idev] CDI.KEYID = 6
1,173,014 UART: [idev] SUBJECT.KEYID = 7
1,173,439 UART: [idev] UDS.KEYID = 0
1,181,879 UART: [idev] Erasing UDS.KEYID = 0
1,198,903 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] --
1,208,762 UART: [ldev] ++
1,208,930 UART: [ldev] CDI.KEYID = 6
1,209,294 UART: [ldev] SUBJECT.KEYID = 5
1,209,721 UART: [ldev] AUTHORITY.KEYID = 7
1,210,184 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,242,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,332 UART: [ldev] --
1,281,792 UART: [fwproc] Wait for Commands...
1,282,517 UART: [fwproc] Recv command 0x46574c44
1,283,250 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,523 UART: ROM Fatal Error: 0x000B0005
1,329,680 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,515 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Manufacturing
86,002 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,263 UART: [kat] SHA2-512-ACC
906,164 UART: [kat] ECC-384
915,777 UART: [kat] HMAC-384Kdf
920,449 UART: [kat] LMS
1,168,761 UART: [kat] --
1,169,622 UART: [cold-reset] ++
1,170,020 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,181,038 UART: [idev] Erasing UDS.KEYID = 0
1,198,092 UART: [idev] Sha1 KeyId Algorithm
1,207,048 UART: [idev] --
1,208,047 UART: [ldev] ++
1,208,215 UART: [ldev] CDI.KEYID = 6
1,208,579 UART: [ldev] SUBJECT.KEYID = 5
1,209,006 UART: [ldev] AUTHORITY.KEYID = 7
1,209,469 UART: [ldev] FE.KEYID = 1
1,214,777 UART: [ldev] Erasing FE.KEYID = 1
1,241,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,025 UART: [ldev] --
1,280,519 UART: [fwproc] Wait for Commands...
1,281,296 UART: [fwproc] Recv command 0x46574c44
1,282,029 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,056 UART: ROM Fatal Error: 0x000B0005
1,328,213 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,544 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Manufacturing
85,807 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,623 UART: [kat] SHA2-256
901,563 UART: [kat] SHA2-384
904,398 UART: [kat] SHA2-512-ACC
906,299 UART: [kat] ECC-384
916,214 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,207,289 UART: [idev] --
1,208,144 UART: [ldev] ++
1,208,312 UART: [ldev] CDI.KEYID = 6
1,208,676 UART: [ldev] SUBJECT.KEYID = 5
1,209,103 UART: [ldev] AUTHORITY.KEYID = 7
1,209,566 UART: [ldev] FE.KEYID = 1
1,214,580 UART: [ldev] Erasing FE.KEYID = 1
1,240,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,834 UART: [ldev] --
1,280,148 UART: [fwproc] Wait for Commands...
1,280,863 UART: [fwproc] Recv command 0x46574c44
1,281,596 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,707 UART: ROM Fatal Error: 0x000B0005
1,327,864 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,519 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Manufacturing
85,766 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,470 UART: [kat] SHA2-256
901,410 UART: [kat] SHA2-384
904,037 UART: [kat] SHA2-512-ACC
905,938 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,405 UART: [kat] LMS
1,168,717 UART: [kat] --
1,169,416 UART: [cold-reset] ++
1,169,952 UART: [fht] FHT @ 0x50003400
1,172,664 UART: [idev] ++
1,172,832 UART: [idev] CDI.KEYID = 6
1,173,193 UART: [idev] SUBJECT.KEYID = 7
1,173,618 UART: [idev] UDS.KEYID = 0
1,181,574 UART: [idev] Erasing UDS.KEYID = 0
1,198,940 UART: [idev] Sha1 KeyId Algorithm
1,207,976 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,115 UART: [ldev] --
1,282,553 UART: [fwproc] Wait for Commands...
1,283,310 UART: [fwproc] Recv command 0x46574c44
1,284,043 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,452 UART: ROM Fatal Error: 0x000B0005
1,329,609 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,200 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
5,894 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,240 UART:
192,625 UART: Running Caliptra ROM ...
193,816 UART:
193,969 UART: [state] CFI Enabled
265,643 UART: [state] LifecycleState = Manufacturing
268,061 UART: [state] DebugLocked = No
270,571 UART: [state] WD Timer not started. Device not locked for debugging
275,871 UART: [kat] SHA2-256
457,774 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,282 UART: [kat] ++
469,880 UART: [kat] sha1
480,244 UART: [kat] SHA2-256
483,259 UART: [kat] SHA2-384
488,693 UART: [kat] SHA2-512-ACC
491,314 UART: [kat] ECC-384
3,775,795 UART: [kat] HMAC-384Kdf
3,803,302 UART: [kat] LMS
4,876,454 UART: [kat] --
4,880,961 UART: [cold-reset] ++
4,882,308 UART: [fht] FHT @ 0x50003400
4,894,326 UART: [idev] ++
4,895,010 UART: [idev] CDI.KEYID = 6
4,896,176 UART: [idev] SUBJECT.KEYID = 7
4,897,389 UART: [idev] UDS.KEYID = 0
4,929,433 UART: [idev] Erasing UDS.KEYID = 0
8,243,526 UART: [idev] Sha1 KeyId Algorithm
8,265,102 UART: [idev] --
8,269,704 UART: [ldev] ++
8,270,282 UART: [ldev] CDI.KEYID = 6
8,271,521 UART: [ldev] SUBJECT.KEYID = 5
8,272,628 UART: [ldev] AUTHORITY.KEYID = 7
8,273,857 UART: [ldev] FE.KEYID = 1
8,316,772 UART: [ldev] Erasing FE.KEYID = 1
11,649,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,270 UART: [ldev] --
14,016,247 UART: [fwproc] Wait for Commands...
14,018,839 UART: [fwproc] Recv command 0x46574c44
14,021,110 UART: [fwproc] Recv'd Img size: 114124 bytes
14,086,302 UART: ROM Fatal Error: 0x000B0003
14,089,687 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
5,878 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,884,414 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
6,450 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,243 UART:
192,642 UART: Running Caliptra ROM ...
193,768 UART:
603,390 UART: [state] CFI Enabled
615,432 UART: [state] LifecycleState = Manufacturing
617,756 UART: [state] DebugLocked = No
620,424 UART: [state] WD Timer not started. Device not locked for debugging
625,878 UART: [kat] SHA2-256
807,852 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,416 UART: [kat] ++
820,001 UART: [kat] sha1
830,199 UART: [kat] SHA2-256
833,247 UART: [kat] SHA2-384
837,763 UART: [kat] SHA2-512-ACC
840,378 UART: [kat] ECC-384
4,095,762 UART: [kat] HMAC-384Kdf
4,107,784 UART: [kat] LMS
5,180,919 UART: [kat] --
5,185,410 UART: [cold-reset] ++
5,187,940 UART: [fht] FHT @ 0x50003400
5,199,455 UART: [idev] ++
5,200,125 UART: [idev] CDI.KEYID = 6
5,201,351 UART: [idev] SUBJECT.KEYID = 7
5,202,833 UART: [idev] UDS.KEYID = 0
5,218,877 UART: [idev] Erasing UDS.KEYID = 0
8,493,841 UART: [idev] Sha1 KeyId Algorithm
8,515,178 UART: [idev] --
8,519,366 UART: [ldev] ++
8,519,997 UART: [ldev] CDI.KEYID = 6
8,521,177 UART: [ldev] SUBJECT.KEYID = 5
8,522,666 UART: [ldev] AUTHORITY.KEYID = 7
8,524,222 UART: [ldev] FE.KEYID = 1
8,534,899 UART: [ldev] Erasing FE.KEYID = 1
11,824,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,600 UART: [ldev] --
14,190,496 UART: [fwproc] Wait for Commands...
14,193,697 UART: [fwproc] Recv command 0x46574c44
14,196,011 UART: [fwproc] Recv'd Img size: 114124 bytes
14,255,407 UART: ROM Fatal Error: 0x000B0003
14,258,778 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
6,294 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,079,047 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
5,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,207 UART:
192,588 UART: Running Caliptra ROM ...
193,697 UART:
193,843 UART: [state] CFI Enabled
263,811 UART: [state] LifecycleState = Manufacturing
265,679 UART: [state] DebugLocked = No
268,226 UART: [state] WD Timer not started. Device not locked for debugging
271,128 UART: [kat] SHA2-256
450,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,811 UART: [kat] ++
462,348 UART: [kat] sha1
474,527 UART: [kat] SHA2-256
477,591 UART: [kat] SHA2-384
483,941 UART: [kat] SHA2-512-ACC
486,873 UART: [kat] ECC-384
2,947,938 UART: [kat] HMAC-384Kdf
2,972,605 UART: [kat] LMS
3,502,037 UART: [kat] --
3,507,847 UART: [cold-reset] ++
3,508,821 UART: [fht] FHT @ 0x50003400
3,520,586 UART: [idev] ++
3,521,150 UART: [idev] CDI.KEYID = 6
3,522,166 UART: [idev] SUBJECT.KEYID = 7
3,523,268 UART: [idev] UDS.KEYID = 0
3,543,802 UART: [idev] Erasing UDS.KEYID = 0
6,028,922 UART: [idev] Sha1 KeyId Algorithm
6,051,363 UART: [idev] --
6,056,609 UART: [ldev] ++
6,057,185 UART: [ldev] CDI.KEYID = 6
6,058,107 UART: [ldev] SUBJECT.KEYID = 5
6,059,273 UART: [ldev] AUTHORITY.KEYID = 7
6,060,504 UART: [ldev] FE.KEYID = 1
6,100,966 UART: [ldev] Erasing FE.KEYID = 1
8,606,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,816 UART: [ldev] --
10,414,214 UART: [fwproc] Wait for Commands...
10,417,194 UART: [fwproc] Recv command 0x46574c44
10,419,291 UART: [fwproc] Recv'd Img size: 114448 bytes
10,478,640 UART: ROM Fatal Error: 0x000B0003
10,481,785 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
5,613 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,228,417 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
6,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,611 UART:
192,993 UART: Running Caliptra ROM ...
194,161 UART:
603,838 UART: [state] CFI Enabled
617,872 UART: [state] LifecycleState = Manufacturing
619,735 UART: [state] DebugLocked = No
622,031 UART: [state] WD Timer not started. Device not locked for debugging
626,415 UART: [kat] SHA2-256
805,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,122 UART: [kat] ++
817,650 UART: [kat] sha1
828,259 UART: [kat] SHA2-256
831,309 UART: [kat] SHA2-384
836,895 UART: [kat] SHA2-512-ACC
839,819 UART: [kat] ECC-384
3,280,427 UART: [kat] HMAC-384Kdf
3,292,875 UART: [kat] LMS
3,822,348 UART: [kat] --
3,828,204 UART: [cold-reset] ++
3,830,167 UART: [fht] FHT @ 0x50003400
3,841,307 UART: [idev] ++
3,841,869 UART: [idev] CDI.KEYID = 6
3,842,780 UART: [idev] SUBJECT.KEYID = 7
3,843,993 UART: [idev] UDS.KEYID = 0
3,863,206 UART: [idev] Erasing UDS.KEYID = 0
6,319,668 UART: [idev] Sha1 KeyId Algorithm
6,342,341 UART: [idev] --
6,345,792 UART: [ldev] ++
6,346,360 UART: [ldev] CDI.KEYID = 6
6,347,268 UART: [ldev] SUBJECT.KEYID = 5
6,348,482 UART: [ldev] AUTHORITY.KEYID = 7
6,349,714 UART: [ldev] FE.KEYID = 1
6,360,416 UART: [ldev] Erasing FE.KEYID = 1
8,833,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,552 UART: [ldev] --
10,625,019 UART: [fwproc] Wait for Commands...
10,626,750 UART: [fwproc] Recv command 0x46574c44
10,628,847 UART: [fwproc] Recv'd Img size: 114448 bytes
10,688,997 UART: ROM Fatal Error: 0x000B0003
10,692,096 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
6,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,468,410 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
5,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,263,016 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
6,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,467,159 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Manufacturing
86,013 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,053 UART: [kat] SHA2-256
901,993 UART: [kat] SHA2-384
904,960 UART: [kat] SHA2-512-ACC
906,861 UART: [kat] ECC-384
916,028 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,749 UART: [cold-reset] ++
1,170,127 UART: [fht] FHT @ 0x50003400
1,172,941 UART: [idev] ++
1,173,109 UART: [idev] CDI.KEYID = 6
1,173,470 UART: [idev] SUBJECT.KEYID = 7
1,173,895 UART: [idev] UDS.KEYID = 0
1,181,797 UART: [idev] Erasing UDS.KEYID = 0
1,198,469 UART: [idev] Sha1 KeyId Algorithm
1,207,371 UART: [idev] --
1,208,614 UART: [ldev] ++
1,208,782 UART: [ldev] CDI.KEYID = 6
1,209,146 UART: [ldev] SUBJECT.KEYID = 5
1,209,573 UART: [ldev] AUTHORITY.KEYID = 7
1,210,036 UART: [ldev] FE.KEYID = 1
1,215,384 UART: [ldev] Erasing FE.KEYID = 1
1,241,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,044 UART: [ldev] --
1,280,434 UART: [fwproc] Wait for Commands...
1,281,161 UART: [fwproc] Recv command 0x46574c44
1,281,894 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,393 UART: ROM Fatal Error: 0x000B0003
1,303,550 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,495 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Manufacturing
86,124 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,204 UART: [kat] SHA2-256
902,144 UART: [kat] SHA2-384
904,969 UART: [kat] SHA2-512-ACC
906,870 UART: [kat] ECC-384
916,615 UART: [kat] HMAC-384Kdf
921,231 UART: [kat] LMS
1,169,543 UART: [kat] --
1,170,216 UART: [cold-reset] ++
1,170,710 UART: [fht] FHT @ 0x50003400
1,173,218 UART: [idev] ++
1,173,386 UART: [idev] CDI.KEYID = 6
1,173,747 UART: [idev] SUBJECT.KEYID = 7
1,174,172 UART: [idev] UDS.KEYID = 0
1,182,506 UART: [idev] Erasing UDS.KEYID = 0
1,200,014 UART: [idev] Sha1 KeyId Algorithm
1,208,996 UART: [idev] --
1,210,039 UART: [ldev] ++
1,210,207 UART: [ldev] CDI.KEYID = 6
1,210,571 UART: [ldev] SUBJECT.KEYID = 5
1,210,998 UART: [ldev] AUTHORITY.KEYID = 7
1,211,461 UART: [ldev] FE.KEYID = 1
1,216,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,063 UART: [ldev] --
1,282,511 UART: [fwproc] Wait for Commands...
1,283,260 UART: [fwproc] Recv command 0x46574c44
1,283,993 UART: [fwproc] Recv'd Img size: 114448 bytes
1,304,274 UART: ROM Fatal Error: 0x000B0003
1,305,431 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,157,250 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Manufacturing
85,855 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,523 UART: [kat] SHA2-256
901,463 UART: [kat] SHA2-384
904,156 UART: [kat] SHA2-512-ACC
906,057 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,787 UART: [cold-reset] ++
1,170,171 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,181,857 UART: [idev] Erasing UDS.KEYID = 0
1,198,513 UART: [idev] Sha1 KeyId Algorithm
1,207,561 UART: [idev] --
1,208,698 UART: [ldev] ++
1,208,866 UART: [ldev] CDI.KEYID = 6
1,209,230 UART: [ldev] SUBJECT.KEYID = 5
1,209,657 UART: [ldev] AUTHORITY.KEYID = 7
1,210,120 UART: [ldev] FE.KEYID = 1
1,215,282 UART: [ldev] Erasing FE.KEYID = 1
1,241,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,992 UART: [ldev] --
1,280,474 UART: [fwproc] Wait for Commands...
1,281,051 UART: [fwproc] Recv command 0x46574c44
1,281,784 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,575 UART: ROM Fatal Error: 0x000B0003
1,303,732 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,969 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Manufacturing
85,944 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
915,893 UART: [kat] HMAC-384Kdf
920,699 UART: [kat] LMS
1,169,011 UART: [kat] --
1,170,142 UART: [cold-reset] ++
1,170,630 UART: [fht] FHT @ 0x50003400
1,173,066 UART: [idev] ++
1,173,234 UART: [idev] CDI.KEYID = 6
1,173,595 UART: [idev] SUBJECT.KEYID = 7
1,174,020 UART: [idev] UDS.KEYID = 0
1,182,380 UART: [idev] Erasing UDS.KEYID = 0
1,199,164 UART: [idev] Sha1 KeyId Algorithm
1,208,084 UART: [idev] --
1,209,045 UART: [ldev] ++
1,209,213 UART: [ldev] CDI.KEYID = 6
1,209,577 UART: [ldev] SUBJECT.KEYID = 5
1,210,004 UART: [ldev] AUTHORITY.KEYID = 7
1,210,467 UART: [ldev] FE.KEYID = 1
1,215,787 UART: [ldev] Erasing FE.KEYID = 1
1,242,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,503 UART: [ldev] --
1,281,979 UART: [fwproc] Wait for Commands...
1,282,584 UART: [fwproc] Recv command 0x46574c44
1,283,317 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,254 UART: ROM Fatal Error: 0x000B0003
1,304,411 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,494 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Manufacturing
85,539 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,427 UART: [kat] SHA2-256
901,367 UART: [kat] SHA2-384
904,040 UART: [kat] SHA2-512-ACC
905,941 UART: [kat] ECC-384
915,844 UART: [kat] HMAC-384Kdf
920,542 UART: [kat] LMS
1,168,854 UART: [kat] --
1,169,805 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,181,879 UART: [idev] Erasing UDS.KEYID = 0
1,198,803 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,630 UART: [ldev] ++
1,208,798 UART: [ldev] CDI.KEYID = 6
1,209,162 UART: [ldev] SUBJECT.KEYID = 5
1,209,589 UART: [ldev] AUTHORITY.KEYID = 7
1,210,052 UART: [ldev] FE.KEYID = 1
1,215,452 UART: [ldev] Erasing FE.KEYID = 1
1,242,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,132 UART: [ldev] --
1,281,608 UART: [fwproc] Wait for Commands...
1,282,289 UART: [fwproc] Recv command 0x46574c44
1,283,022 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,317 UART: ROM Fatal Error: 0x000B0003
1,304,474 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,671 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Manufacturing
86,250 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,110 UART: [kat] SHA2-256
902,050 UART: [kat] SHA2-384
904,935 UART: [kat] SHA2-512-ACC
906,836 UART: [kat] ECC-384
916,935 UART: [kat] HMAC-384Kdf
921,443 UART: [kat] LMS
1,169,755 UART: [kat] --
1,170,594 UART: [cold-reset] ++
1,171,026 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,182,304 UART: [idev] Erasing UDS.KEYID = 0
1,199,710 UART: [idev] Sha1 KeyId Algorithm
1,208,504 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,997 UART: [ldev] --
1,281,449 UART: [fwproc] Wait for Commands...
1,282,044 UART: [fwproc] Recv command 0x46574c44
1,282,777 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,862 UART: ROM Fatal Error: 0x000B0003
1,304,019 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,988 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
5,772 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,252 UART:
192,631 UART: Running Caliptra ROM ...
193,815 UART:
193,968 UART: [state] CFI Enabled
267,687 UART: [state] LifecycleState = Unprovisioned
270,105 UART: [state] DebugLocked = No
273,001 UART: [state] WD Timer not started. Device not locked for debugging
277,428 UART: [kat] SHA2-256
459,363 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,880 UART: [kat] ++
471,498 UART: [kat] sha1
482,328 UART: [kat] SHA2-256
485,396 UART: [kat] SHA2-384
490,394 UART: [kat] SHA2-512-ACC
493,013 UART: [kat] ECC-384
3,778,114 UART: [kat] HMAC-384Kdf
3,801,192 UART: [kat] LMS
4,874,319 UART: [kat] --
4,878,095 UART: [cold-reset] ++
4,879,819 UART: [fht] FHT @ 0x50003400
4,891,122 UART: [idev] ++
4,891,800 UART: [idev] CDI.KEYID = 6
4,893,040 UART: [idev] SUBJECT.KEYID = 7
4,894,145 UART: [idev] UDS.KEYID = 0
4,929,777 UART: [idev] Erasing UDS.KEYID = 0
8,240,636 UART: [idev] Sha1 KeyId Algorithm
8,263,114 UART: [idev] --
8,267,161 UART: [ldev] ++
8,267,782 UART: [ldev] CDI.KEYID = 6
8,268,960 UART: [ldev] SUBJECT.KEYID = 5
8,270,115 UART: [ldev] AUTHORITY.KEYID = 7
8,271,344 UART: [ldev] FE.KEYID = 1
8,318,025 UART: [ldev] Erasing FE.KEYID = 1
11,653,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,989 UART: [ldev] --
14,037,199 UART: [fwproc] Wait for Commands...
14,038,914 UART: [fwproc] Recv command 0x46574c44
14,041,183 UART: [fwproc] Recv'd Img size: 114124 bytes
18,108,064 UART: ROM Fatal Error: 0x000B0016
18,111,474 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
5,260 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,871,279 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
7,207 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,465 UART:
192,853 UART: Running Caliptra ROM ...
194,035 UART:
603,714 UART: [state] CFI Enabled
616,837 UART: [state] LifecycleState = Unprovisioned
619,231 UART: [state] DebugLocked = No
621,467 UART: [state] WD Timer not started. Device not locked for debugging
625,928 UART: [kat] SHA2-256
807,890 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,423 UART: [kat] ++
820,004 UART: [kat] sha1
828,895 UART: [kat] SHA2-256
831,910 UART: [kat] SHA2-384
838,474 UART: [kat] SHA2-512-ACC
841,089 UART: [kat] ECC-384
4,097,835 UART: [kat] HMAC-384Kdf
4,110,218 UART: [kat] LMS
5,183,363 UART: [kat] --
5,187,913 UART: [cold-reset] ++
5,189,662 UART: [fht] FHT @ 0x50003400
5,200,970 UART: [idev] ++
5,201,643 UART: [idev] CDI.KEYID = 6
5,202,879 UART: [idev] SUBJECT.KEYID = 7
5,204,312 UART: [idev] UDS.KEYID = 0
5,217,462 UART: [idev] Erasing UDS.KEYID = 0
8,492,838 UART: [idev] Sha1 KeyId Algorithm
8,515,280 UART: [idev] --
8,518,954 UART: [ldev] ++
8,519,527 UART: [ldev] CDI.KEYID = 6
8,520,772 UART: [ldev] SUBJECT.KEYID = 5
8,522,142 UART: [ldev] AUTHORITY.KEYID = 7
8,523,758 UART: [ldev] FE.KEYID = 1
8,534,922 UART: [ldev] Erasing FE.KEYID = 1
11,825,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,110 UART: [ldev] --
14,195,158 UART: [fwproc] Wait for Commands...
14,196,711 UART: [fwproc] Recv command 0x46574c44
14,199,032 UART: [fwproc] Recv'd Img size: 114124 bytes
18,270,784 UART: ROM Fatal Error: 0x000B0016
18,274,257 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
6,333 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,090,620 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
5,527 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,033 UART:
192,451 UART: Running Caliptra ROM ...
193,567 UART:
193,717 UART: [state] CFI Enabled
267,676 UART: [state] LifecycleState = Unprovisioned
269,576 UART: [state] DebugLocked = No
271,959 UART: [state] WD Timer not started. Device not locked for debugging
275,550 UART: [kat] SHA2-256
454,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,277 UART: [kat] ++
466,809 UART: [kat] sha1
477,965 UART: [kat] SHA2-256
480,990 UART: [kat] SHA2-384
487,994 UART: [kat] SHA2-512-ACC
490,925 UART: [kat] ECC-384
2,950,677 UART: [kat] HMAC-384Kdf
2,974,107 UART: [kat] LMS
3,503,557 UART: [kat] --
3,507,228 UART: [cold-reset] ++
3,508,179 UART: [fht] FHT @ 0x50003400
3,518,678 UART: [idev] ++
3,519,243 UART: [idev] CDI.KEYID = 6
3,520,156 UART: [idev] SUBJECT.KEYID = 7
3,521,367 UART: [idev] UDS.KEYID = 0
3,546,214 UART: [idev] Erasing UDS.KEYID = 0
6,027,980 UART: [idev] Sha1 KeyId Algorithm
6,051,589 UART: [idev] --
6,054,718 UART: [ldev] ++
6,055,308 UART: [ldev] CDI.KEYID = 6
6,056,222 UART: [ldev] SUBJECT.KEYID = 5
6,057,387 UART: [ldev] AUTHORITY.KEYID = 7
6,058,677 UART: [ldev] FE.KEYID = 1
6,101,836 UART: [ldev] Erasing FE.KEYID = 1
8,602,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,499 UART: [ldev] --
10,391,795 UART: [fwproc] Wait for Commands...
10,394,385 UART: [fwproc] Recv command 0x46574c44
10,396,483 UART: [fwproc] Recv'd Img size: 114448 bytes
13,797,035 UART: ROM Fatal Error: 0x000B0016
13,800,120 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
5,664 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,630,425 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
6,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,671 UART:
193,052 UART: Running Caliptra ROM ...
194,227 UART:
603,818 UART: [state] CFI Enabled
618,188 UART: [state] LifecycleState = Unprovisioned
620,066 UART: [state] DebugLocked = No
621,831 UART: [state] WD Timer not started. Device not locked for debugging
626,371 UART: [kat] SHA2-256
805,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,042 UART: [kat] ++
817,578 UART: [kat] sha1
828,945 UART: [kat] SHA2-256
831,998 UART: [kat] SHA2-384
839,056 UART: [kat] SHA2-512-ACC
841,988 UART: [kat] ECC-384
3,285,499 UART: [kat] HMAC-384Kdf
3,298,024 UART: [kat] LMS
3,827,530 UART: [kat] --
3,834,059 UART: [cold-reset] ++
3,836,868 UART: [fht] FHT @ 0x50003400
3,848,561 UART: [idev] ++
3,849,137 UART: [idev] CDI.KEYID = 6
3,850,052 UART: [idev] SUBJECT.KEYID = 7
3,851,266 UART: [idev] UDS.KEYID = 0
3,867,508 UART: [idev] Erasing UDS.KEYID = 0
6,321,890 UART: [idev] Sha1 KeyId Algorithm
6,345,433 UART: [idev] --
6,347,964 UART: [ldev] ++
6,348,525 UART: [ldev] CDI.KEYID = 6
6,349,429 UART: [ldev] SUBJECT.KEYID = 5
6,350,639 UART: [ldev] AUTHORITY.KEYID = 7
6,351,866 UART: [ldev] FE.KEYID = 1
6,364,778 UART: [ldev] Erasing FE.KEYID = 1
8,840,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,533 UART: [ldev] --
10,631,954 UART: [fwproc] Wait for Commands...
10,633,835 UART: [fwproc] Recv command 0x46574c44
10,635,949 UART: [fwproc] Recv'd Img size: 114448 bytes
14,042,549 UART: ROM Fatal Error: 0x000B0016
14,045,686 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
6,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,807,808 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
5,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,629,460 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
6,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,829,690 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
915,872 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,235 UART: [fht] FHT @ 0x50003400
1,172,699 UART: [idev] ++
1,172,867 UART: [idev] CDI.KEYID = 6
1,173,228 UART: [idev] SUBJECT.KEYID = 7
1,173,653 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,198,499 UART: [idev] Sha1 KeyId Algorithm
1,207,469 UART: [idev] --
1,208,666 UART: [ldev] ++
1,208,834 UART: [ldev] CDI.KEYID = 6
1,209,198 UART: [ldev] SUBJECT.KEYID = 5
1,209,625 UART: [ldev] AUTHORITY.KEYID = 7
1,210,088 UART: [ldev] FE.KEYID = 1
1,215,198 UART: [ldev] Erasing FE.KEYID = 1
1,241,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,770 UART: [ldev] --
1,281,196 UART: [fwproc] Wait for Commands...
1,281,967 UART: [fwproc] Recv command 0x46574c44
1,282,700 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,865 UART: ROM Fatal Error: 0x000B0016
2,582,022 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,845 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,127 UART: [kat] SHA2-512-ACC
906,028 UART: [kat] ECC-384
915,207 UART: [kat] HMAC-384Kdf
919,735 UART: [kat] LMS
1,168,047 UART: [kat] --
1,168,888 UART: [cold-reset] ++
1,169,456 UART: [fht] FHT @ 0x50003400
1,172,180 UART: [idev] ++
1,172,348 UART: [idev] CDI.KEYID = 6
1,172,709 UART: [idev] SUBJECT.KEYID = 7
1,173,134 UART: [idev] UDS.KEYID = 0
1,180,974 UART: [idev] Erasing UDS.KEYID = 0
1,197,896 UART: [idev] Sha1 KeyId Algorithm
1,206,696 UART: [idev] --
1,207,765 UART: [ldev] ++
1,207,933 UART: [ldev] CDI.KEYID = 6
1,208,297 UART: [ldev] SUBJECT.KEYID = 5
1,208,724 UART: [ldev] AUTHORITY.KEYID = 7
1,209,187 UART: [ldev] FE.KEYID = 1
1,214,431 UART: [ldev] Erasing FE.KEYID = 1
1,240,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,539 UART: [ldev] --
1,279,829 UART: [fwproc] Wait for Commands...
1,280,622 UART: [fwproc] Recv command 0x46574c44
1,281,355 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,724 UART: ROM Fatal Error: 0x000B0016
2,580,881 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,136 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,385 UART: [kat] SHA2-256
901,325 UART: [kat] SHA2-384
904,170 UART: [kat] SHA2-512-ACC
906,071 UART: [kat] ECC-384
915,752 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,169,983 UART: [fht] FHT @ 0x50003400
1,172,585 UART: [idev] ++
1,172,753 UART: [idev] CDI.KEYID = 6
1,173,114 UART: [idev] SUBJECT.KEYID = 7
1,173,539 UART: [idev] UDS.KEYID = 0
1,181,623 UART: [idev] Erasing UDS.KEYID = 0
1,198,471 UART: [idev] Sha1 KeyId Algorithm
1,207,437 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,048 UART: [ldev] Erasing FE.KEYID = 1
1,241,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,458 UART: [fwproc] Wait for Commands...
1,281,157 UART: [fwproc] Recv command 0x46574c44
1,281,890 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,111 UART: ROM Fatal Error: 0x000B0016
2,580,268 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,647 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
891,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,906 UART: [kat] ++
896,058 UART: [kat] sha1
900,458 UART: [kat] SHA2-256
902,398 UART: [kat] SHA2-384
905,159 UART: [kat] SHA2-512-ACC
907,060 UART: [kat] ECC-384
916,985 UART: [kat] HMAC-384Kdf
921,619 UART: [kat] LMS
1,169,931 UART: [kat] --
1,170,806 UART: [cold-reset] ++
1,171,168 UART: [fht] FHT @ 0x50003400
1,173,830 UART: [idev] ++
1,173,998 UART: [idev] CDI.KEYID = 6
1,174,359 UART: [idev] SUBJECT.KEYID = 7
1,174,784 UART: [idev] UDS.KEYID = 0
1,182,666 UART: [idev] Erasing UDS.KEYID = 0
1,200,196 UART: [idev] Sha1 KeyId Algorithm
1,209,128 UART: [idev] --
1,210,045 UART: [ldev] ++
1,210,213 UART: [ldev] CDI.KEYID = 6
1,210,577 UART: [ldev] SUBJECT.KEYID = 5
1,211,004 UART: [ldev] AUTHORITY.KEYID = 7
1,211,467 UART: [ldev] FE.KEYID = 1
1,216,441 UART: [ldev] Erasing FE.KEYID = 1
1,243,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,289 UART: [ldev] --
1,281,787 UART: [fwproc] Wait for Commands...
1,282,370 UART: [fwproc] Recv command 0x46574c44
1,283,103 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,040 UART: ROM Fatal Error: 0x000B0016
2,582,197 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,412 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,363 UART: [kat] SHA2-256
901,303 UART: [kat] SHA2-384
904,022 UART: [kat] SHA2-512-ACC
905,923 UART: [kat] ECC-384
915,728 UART: [kat] HMAC-384Kdf
920,302 UART: [kat] LMS
1,168,614 UART: [kat] --
1,169,319 UART: [cold-reset] ++
1,169,753 UART: [fht] FHT @ 0x50003400
1,172,425 UART: [idev] ++
1,172,593 UART: [idev] CDI.KEYID = 6
1,172,954 UART: [idev] SUBJECT.KEYID = 7
1,173,379 UART: [idev] UDS.KEYID = 0
1,181,481 UART: [idev] Erasing UDS.KEYID = 0
1,198,399 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,932 UART: [ldev] Erasing FE.KEYID = 1
1,240,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,200 UART: [ldev] --
1,279,474 UART: [fwproc] Wait for Commands...
1,280,279 UART: [fwproc] Recv command 0x46574c44
1,281,012 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,387 UART: ROM Fatal Error: 0x000B0016
2,580,544 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,873 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,345 UART: [kat] SHA2-512-ACC
906,246 UART: [kat] ECC-384
915,913 UART: [kat] HMAC-384Kdf
920,365 UART: [kat] LMS
1,168,677 UART: [kat] --
1,169,708 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,784 UART: [idev] ++
1,172,952 UART: [idev] CDI.KEYID = 6
1,173,313 UART: [idev] SUBJECT.KEYID = 7
1,173,738 UART: [idev] UDS.KEYID = 0
1,181,450 UART: [idev] Erasing UDS.KEYID = 0
1,197,904 UART: [idev] Sha1 KeyId Algorithm
1,206,666 UART: [idev] --
1,207,765 UART: [ldev] ++
1,207,933 UART: [ldev] CDI.KEYID = 6
1,208,297 UART: [ldev] SUBJECT.KEYID = 5
1,208,724 UART: [ldev] AUTHORITY.KEYID = 7
1,209,187 UART: [ldev] FE.KEYID = 1
1,214,363 UART: [ldev] Erasing FE.KEYID = 1
1,240,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,881 UART: [ldev] --
1,280,221 UART: [fwproc] Wait for Commands...
1,280,806 UART: [fwproc] Recv command 0x46574c44
1,281,539 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,912 UART: ROM Fatal Error: 0x000B0016
2,581,069 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,788 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
2,021,538 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,944 UART:
2,166,341 UART: Running Caliptra ROM ...
2,167,505 UART:
2,167,705 UART: [state] CFI Enabled
2,168,689 UART: [state] LifecycleState = Unprovisioned
2,170,336 UART: [state] DebugLocked = No
2,171,443 UART: [state] WD Timer not started. Device not locked for debugging
2,173,913 UART: [kat] SHA2-256
2,174,583 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,591 UART: [kat] ++
2,178,044 UART: [kat] sha1
2,178,644 UART: [kat] SHA2-256
2,179,312 UART: [kat] SHA2-384
2,179,971 UART: [kat] SHA2-512-ACC
2,180,871 UART: [kat] ECC-384
3,775,938 UART: [kat] HMAC-384Kdf
3,801,614 UART: [kat] LMS
4,874,742 UART: [kat] --
4,876,955 UART: [cold-reset] ++
4,879,177 UART: [fht] FHT @ 0x50003400
4,890,751 UART: [idev] ++
4,891,423 UART: [idev] CDI.KEYID = 6
4,892,585 UART: [idev] SUBJECT.KEYID = 7
4,893,796 UART: [idev] UDS.KEYID = 0
4,929,461 UART: [idev] Erasing UDS.KEYID = 0
8,230,046 UART: [idev] Sha1 KeyId Algorithm
8,253,174 UART: [idev] --
8,257,655 UART: [ldev] ++
8,258,221 UART: [ldev] CDI.KEYID = 6
8,259,331 UART: [ldev] SUBJECT.KEYID = 5
8,260,594 UART: [ldev] AUTHORITY.KEYID = 7
8,261,819 UART: [ldev] FE.KEYID = 1
8,302,969 UART: [ldev] Erasing FE.KEYID = 1
11,641,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,951,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,967,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,983,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,999,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,019,744 UART: [ldev] --
14,024,409 UART: [fwproc] Wait for Commands...
14,026,776 UART: [fwproc] Recv command 0x46574c44
14,029,043 UART: [fwproc] Recv'd Img size: 114124 bytes
18,090,917 UART: ROM Fatal Error: 0x000B002B
18,094,334 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
2,019,814 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,892,083 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
2,022,062 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,127 UART:
2,166,532 UART: Running Caliptra ROM ...
2,167,704 UART:
2,167,879 UART: [state] CFI Enabled
2,168,846 UART: [state] LifecycleState = Unprovisioned
2,170,496 UART: [state] DebugLocked = No
2,171,610 UART: [state] WD Timer not started. Device not locked for debugging
2,174,078 UART: [kat] SHA2-256
2,174,745 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,754 UART: [kat] ++
2,178,202 UART: [kat] sha1
2,178,710 UART: [kat] SHA2-256
2,179,443 UART: [kat] SHA2-384
2,180,121 UART: [kat] SHA2-512-ACC
2,180,960 UART: [kat] ECC-384
4,099,616 UART: [kat] HMAC-384Kdf
4,112,734 UART: [kat] LMS
5,185,860 UART: [kat] --
5,190,152 UART: [cold-reset] ++
5,192,586 UART: [fht] FHT @ 0x50003400
5,203,837 UART: [idev] ++
5,204,564 UART: [idev] CDI.KEYID = 6
5,205,741 UART: [idev] SUBJECT.KEYID = 7
5,207,224 UART: [idev] UDS.KEYID = 0
5,227,035 UART: [idev] Erasing UDS.KEYID = 0
8,497,786 UART: [idev] Sha1 KeyId Algorithm
8,520,365 UART: [idev] --
8,524,632 UART: [ldev] ++
8,525,206 UART: [ldev] CDI.KEYID = 6
8,526,329 UART: [ldev] SUBJECT.KEYID = 5
8,527,869 UART: [ldev] AUTHORITY.KEYID = 7
8,529,353 UART: [ldev] FE.KEYID = 1
8,541,730 UART: [ldev] Erasing FE.KEYID = 1
11,834,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,909 UART: [ldev] --
14,200,842 UART: [fwproc] Wait for Commands...
14,203,365 UART: [fwproc] Recv command 0x46574c44
14,205,632 UART: [fwproc] Recv'd Img size: 114124 bytes
18,276,763 UART: ROM Fatal Error: 0x000B002B
18,280,176 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,022,685 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,084,643 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
2,029,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,173,933 UART:
2,174,356 UART: Running Caliptra ROM ...
2,175,524 UART:
2,175,693 UART: [state] CFI Enabled
2,176,677 UART: [state] LifecycleState = Unprovisioned
2,178,323 UART: [state] DebugLocked = No
2,179,430 UART: [state] WD Timer not started. Device not locked for debugging
2,181,917 UART: [kat] SHA2-256
2,182,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,596 UART: [kat] ++
2,186,049 UART: [kat] sha1
2,186,567 UART: [kat] SHA2-256
2,187,307 UART: [kat] SHA2-384
2,187,978 UART: [kat] SHA2-512-ACC
2,188,813 UART: [kat] ECC-384
2,949,289 UART: [kat] HMAC-384Kdf
2,971,442 UART: [kat] LMS
3,500,895 UART: [kat] --
3,506,559 UART: [cold-reset] ++
3,508,107 UART: [fht] FHT @ 0x50003400
3,518,678 UART: [idev] ++
3,519,248 UART: [idev] CDI.KEYID = 6
3,520,152 UART: [idev] SUBJECT.KEYID = 7
3,521,366 UART: [idev] UDS.KEYID = 0
3,543,013 UART: [idev] Erasing UDS.KEYID = 0
6,024,985 UART: [idev] Sha1 KeyId Algorithm
6,047,475 UART: [idev] --
6,051,377 UART: [ldev] ++
6,051,952 UART: [ldev] CDI.KEYID = 6
6,053,052 UART: [ldev] SUBJECT.KEYID = 5
6,054,195 UART: [ldev] AUTHORITY.KEYID = 7
6,055,385 UART: [ldev] FE.KEYID = 1
6,100,707 UART: [ldev] Erasing FE.KEYID = 1
8,603,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,335 UART: [ldev] --
10,414,602 UART: [fwproc] Wait for Commands...
10,416,324 UART: [fwproc] Recv command 0x46574c44
10,418,419 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,359 UART: ROM Fatal Error: 0x000B002B
13,823,447 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,028,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,642,739 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,021,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,291 UART:
2,166,703 UART: Running Caliptra ROM ...
2,167,872 UART:
2,168,046 UART: [state] CFI Enabled
2,169,017 UART: [state] LifecycleState = Unprovisioned
2,170,577 UART: [state] DebugLocked = No
2,171,599 UART: [state] WD Timer not started. Device not locked for debugging
2,174,070 UART: [kat] SHA2-256
2,174,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,744 UART: [kat] ++
2,178,193 UART: [kat] sha1
2,178,705 UART: [kat] SHA2-256
2,179,440 UART: [kat] SHA2-384
2,180,107 UART: [kat] SHA2-512-ACC
2,180,985 UART: [kat] ECC-384
3,282,360 UART: [kat] HMAC-384Kdf
3,293,768 UART: [kat] LMS
3,823,269 UART: [kat] --
3,826,989 UART: [cold-reset] ++
3,828,108 UART: [fht] FHT @ 0x50003400
3,839,173 UART: [idev] ++
3,839,725 UART: [idev] CDI.KEYID = 6
3,840,664 UART: [idev] SUBJECT.KEYID = 7
3,841,873 UART: [idev] UDS.KEYID = 0
3,858,472 UART: [idev] Erasing UDS.KEYID = 0
6,314,521 UART: [idev] Sha1 KeyId Algorithm
6,338,125 UART: [idev] --
6,343,315 UART: [ldev] ++
6,343,882 UART: [ldev] CDI.KEYID = 6
6,344,794 UART: [ldev] SUBJECT.KEYID = 5
6,345,952 UART: [ldev] AUTHORITY.KEYID = 7
6,347,236 UART: [ldev] FE.KEYID = 1
6,357,184 UART: [ldev] Erasing FE.KEYID = 1
8,827,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,888 UART: [ldev] --
10,618,756 UART: [fwproc] Wait for Commands...
10,620,427 UART: [fwproc] Recv command 0x46574c44
10,622,532 UART: [fwproc] Recv'd Img size: 114448 bytes
14,019,855 UART: ROM Fatal Error: 0x000B002B
14,022,952 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,020,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,819,471 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
2,021,698 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,611,539 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,413 writing to cptra_bootfsm_go
2,023,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,819,280 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,098 UART: [kat] SHA2-512-ACC
905,999 UART: [kat] ECC-384
915,762 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,811 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,172,861 UART: [idev] ++
1,173,029 UART: [idev] CDI.KEYID = 6
1,173,390 UART: [idev] SUBJECT.KEYID = 7
1,173,815 UART: [idev] UDS.KEYID = 0
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,699 UART: [idev] --
1,208,754 UART: [ldev] ++
1,208,922 UART: [ldev] CDI.KEYID = 6
1,209,286 UART: [ldev] SUBJECT.KEYID = 5
1,209,713 UART: [ldev] AUTHORITY.KEYID = 7
1,210,176 UART: [ldev] FE.KEYID = 1
1,215,248 UART: [ldev] Erasing FE.KEYID = 1
1,240,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,884 UART: [ldev] --
1,280,318 UART: [fwproc] Wait for Commands...
1,280,935 UART: [fwproc] Recv command 0x46574c44
1,281,668 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,294 UART: ROM Fatal Error: 0x000B002B
2,580,453 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,208 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,786 UART: [kat] ++
895,938 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,811 UART: [kat] SHA2-512-ACC
906,712 UART: [kat] ECC-384
916,863 UART: [kat] HMAC-384Kdf
921,497 UART: [kat] LMS
1,169,809 UART: [kat] --
1,170,802 UART: [cold-reset] ++
1,171,150 UART: [fht] FHT @ 0x50003400
1,173,682 UART: [idev] ++
1,173,850 UART: [idev] CDI.KEYID = 6
1,174,211 UART: [idev] SUBJECT.KEYID = 7
1,174,636 UART: [idev] UDS.KEYID = 0
1,182,444 UART: [idev] Erasing UDS.KEYID = 0
1,199,308 UART: [idev] Sha1 KeyId Algorithm
1,208,100 UART: [idev] --
1,209,293 UART: [ldev] ++
1,209,461 UART: [ldev] CDI.KEYID = 6
1,209,825 UART: [ldev] SUBJECT.KEYID = 5
1,210,252 UART: [ldev] AUTHORITY.KEYID = 7
1,210,715 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,149 UART: [ldev] --
1,281,577 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,937 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,093 UART: ROM Fatal Error: 0x000B002B
2,582,252 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,375 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,801 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
891,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,203 UART: [kat] SHA2-256
902,143 UART: [kat] SHA2-384
904,954 UART: [kat] SHA2-512-ACC
906,855 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,276 UART: [kat] LMS
1,169,588 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,507 UART: [fht] FHT @ 0x50003400
1,173,163 UART: [idev] ++
1,173,331 UART: [idev] CDI.KEYID = 6
1,173,692 UART: [idev] SUBJECT.KEYID = 7
1,174,117 UART: [idev] UDS.KEYID = 0
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,121 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,215,032 UART: [ldev] Erasing FE.KEYID = 1
1,241,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,170 UART: [ldev] --
1,280,442 UART: [fwproc] Wait for Commands...
1,281,179 UART: [fwproc] Recv command 0x46574c44
1,281,912 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,626 UART: ROM Fatal Error: 0x000B002B
2,580,785 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,308 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,270 UART: [kat] SHA2-256
902,210 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,273 UART: [kat] HMAC-384Kdf
920,889 UART: [kat] LMS
1,169,201 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,590 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,182,380 UART: [idev] Erasing UDS.KEYID = 0
1,199,464 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,415 UART: [ldev] ++
1,209,583 UART: [ldev] CDI.KEYID = 6
1,209,947 UART: [ldev] SUBJECT.KEYID = 5
1,210,374 UART: [ldev] AUTHORITY.KEYID = 7
1,210,837 UART: [ldev] FE.KEYID = 1
1,216,099 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,903 UART: [ldev] --
1,282,307 UART: [fwproc] Wait for Commands...
1,282,994 UART: [fwproc] Recv command 0x46574c44
1,283,727 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,993 UART: ROM Fatal Error: 0x000B002B
2,582,152 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,795 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,206 UART: [kat] LMS
1,168,518 UART: [kat] --
1,169,181 UART: [cold-reset] ++
1,169,537 UART: [fht] FHT @ 0x50003400
1,172,173 UART: [idev] ++
1,172,341 UART: [idev] CDI.KEYID = 6
1,172,702 UART: [idev] SUBJECT.KEYID = 7
1,173,127 UART: [idev] UDS.KEYID = 0
1,181,055 UART: [idev] Erasing UDS.KEYID = 0
1,197,821 UART: [idev] Sha1 KeyId Algorithm
1,206,559 UART: [idev] --
1,207,554 UART: [ldev] ++
1,207,722 UART: [ldev] CDI.KEYID = 6
1,208,086 UART: [ldev] SUBJECT.KEYID = 5
1,208,513 UART: [ldev] AUTHORITY.KEYID = 7
1,208,976 UART: [ldev] FE.KEYID = 1
1,214,170 UART: [ldev] Erasing FE.KEYID = 1
1,240,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,554 UART: [ldev] --
1,279,964 UART: [fwproc] Wait for Commands...
1,280,707 UART: [fwproc] Recv command 0x46574c44
1,281,440 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,294 UART: ROM Fatal Error: 0x000B002B
2,581,453 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,524 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,505 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,188 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,372 UART: [idev] ++
1,173,540 UART: [idev] CDI.KEYID = 6
1,173,901 UART: [idev] SUBJECT.KEYID = 7
1,174,326 UART: [idev] UDS.KEYID = 0
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,199,386 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] --
1,209,287 UART: [ldev] ++
1,209,455 UART: [ldev] CDI.KEYID = 6
1,209,819 UART: [ldev] SUBJECT.KEYID = 5
1,210,246 UART: [ldev] AUTHORITY.KEYID = 7
1,210,709 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,545 UART: [ldev] --
1,281,817 UART: [fwproc] Wait for Commands...
1,282,398 UART: [fwproc] Recv command 0x46574c44
1,283,131 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,685 UART: ROM Fatal Error: 0x000B002B
2,581,844 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,681 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
2,020,661 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,860 UART:
2,165,244 UART: Running Caliptra ROM ...
2,166,328 UART:
2,166,482 UART: [state] CFI Enabled
2,167,466 UART: [state] LifecycleState = Unprovisioned
2,169,130 UART: [state] DebugLocked = No
2,170,158 UART: [state] WD Timer not started. Device not locked for debugging
2,172,853 UART: [kat] SHA2-256
2,173,531 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,549 UART: [kat] ++
2,177,002 UART: [kat] sha1
2,177,523 UART: [kat] SHA2-256
2,178,180 UART: [kat] SHA2-384
2,178,837 UART: [kat] SHA2-512-ACC
2,179,637 UART: [kat] ECC-384
3,789,544 UART: [kat] HMAC-384Kdf
3,816,529 UART: [kat] LMS
4,889,701 UART: [kat] --
4,892,979 UART: [cold-reset] ++
4,894,254 UART: [fht] FHT @ 0x50003400
4,905,609 UART: [idev] ++
4,906,303 UART: [idev] CDI.KEYID = 6
4,907,411 UART: [idev] SUBJECT.KEYID = 7
4,908,623 UART: [idev] UDS.KEYID = 0
4,944,948 UART: [idev] Erasing UDS.KEYID = 0
8,257,316 UART: [idev] Sha1 KeyId Algorithm
8,278,608 UART: [idev] --
8,281,040 UART: [ldev] ++
8,281,614 UART: [ldev] CDI.KEYID = 6
8,282,850 UART: [ldev] SUBJECT.KEYID = 5
8,284,010 UART: [ldev] AUTHORITY.KEYID = 7
8,285,239 UART: [ldev] FE.KEYID = 1
8,314,684 UART: [ldev] Erasing FE.KEYID = 1
11,644,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,939,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,955,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,971,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,987,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,009,637 UART: [ldev] --
14,014,647 UART: [fwproc] Wait for Commands...
14,016,789 UART: [fwproc] Recv command 0x46574c44
14,019,123 UART: [fwproc] Recv'd Img size: 114124 bytes
18,083,721 UART: ROM Fatal Error: 0x000B002A
18,087,134 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,028,305 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,861,678 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
2,024,990 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,965 UART:
2,169,368 UART: Running Caliptra ROM ...
2,170,478 UART:
2,170,629 UART: [state] CFI Enabled
2,171,603 UART: [state] LifecycleState = Unprovisioned
2,173,248 UART: [state] DebugLocked = No
2,174,267 UART: [state] WD Timer not started. Device not locked for debugging
2,176,730 UART: [kat] SHA2-256
2,177,387 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,384 UART: [kat] ++
2,180,824 UART: [kat] sha1
2,181,325 UART: [kat] SHA2-256
2,182,209 UART: [kat] SHA2-384
2,182,874 UART: [kat] SHA2-512-ACC
2,183,670 UART: [kat] ECC-384
4,101,773 UART: [kat] HMAC-384Kdf
4,114,187 UART: [kat] LMS
5,187,305 UART: [kat] --
5,191,674 UART: [cold-reset] ++
5,192,808 UART: [fht] FHT @ 0x50003400
5,204,757 UART: [idev] ++
5,205,435 UART: [idev] CDI.KEYID = 6
5,206,663 UART: [idev] SUBJECT.KEYID = 7
5,208,091 UART: [idev] UDS.KEYID = 0
5,224,232 UART: [idev] Erasing UDS.KEYID = 0
8,498,680 UART: [idev] Sha1 KeyId Algorithm
8,519,914 UART: [idev] --
8,524,257 UART: [ldev] ++
8,524,826 UART: [ldev] CDI.KEYID = 6
8,526,008 UART: [ldev] SUBJECT.KEYID = 5
8,527,508 UART: [ldev] AUTHORITY.KEYID = 7
8,528,996 UART: [ldev] FE.KEYID = 1
8,542,668 UART: [ldev] Erasing FE.KEYID = 1
11,833,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,108 UART: [ldev] --
14,197,528 UART: [fwproc] Wait for Commands...
14,200,274 UART: [fwproc] Recv command 0x46574c44
14,202,592 UART: [fwproc] Recv'd Img size: 114124 bytes
18,273,782 UART: ROM Fatal Error: 0x000B002A
18,277,251 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
2,026,945 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,081,702 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,022,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,371 UART:
2,167,782 UART: Running Caliptra ROM ...
2,168,867 UART:
2,169,022 UART: [state] CFI Enabled
2,169,993 UART: [state] LifecycleState = Unprovisioned
2,171,645 UART: [state] DebugLocked = No
2,172,699 UART: [state] WD Timer not started. Device not locked for debugging
2,175,179 UART: [kat] SHA2-256
2,175,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,902 UART: [kat] ++
2,179,354 UART: [kat] sha1
2,180,062 UART: [kat] SHA2-256
2,180,731 UART: [kat] SHA2-384
2,181,389 UART: [kat] SHA2-512-ACC
2,182,275 UART: [kat] ECC-384
2,946,668 UART: [kat] HMAC-384Kdf
2,969,984 UART: [kat] LMS
3,499,445 UART: [kat] --
3,504,628 UART: [cold-reset] ++
3,506,775 UART: [fht] FHT @ 0x50003400
3,517,757 UART: [idev] ++
3,518,323 UART: [idev] CDI.KEYID = 6
3,519,284 UART: [idev] SUBJECT.KEYID = 7
3,520,445 UART: [idev] UDS.KEYID = 0
3,542,870 UART: [idev] Erasing UDS.KEYID = 0
6,025,929 UART: [idev] Sha1 KeyId Algorithm
6,049,056 UART: [idev] --
6,053,540 UART: [ldev] ++
6,054,109 UART: [ldev] CDI.KEYID = 6
6,055,017 UART: [ldev] SUBJECT.KEYID = 5
6,056,240 UART: [ldev] AUTHORITY.KEYID = 7
6,057,476 UART: [ldev] FE.KEYID = 1
6,098,985 UART: [ldev] Erasing FE.KEYID = 1
8,599,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,480 UART: [ldev] --
10,391,252 UART: [fwproc] Wait for Commands...
10,392,948 UART: [fwproc] Recv command 0x46574c44
10,395,051 UART: [fwproc] Recv'd Img size: 114448 bytes
13,796,480 UART: ROM Fatal Error: 0x000B002A
13,799,621 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,025,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,636,370 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
2,022,094 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,567 UART:
2,166,954 UART: Running Caliptra ROM ...
2,168,033 UART:
2,168,190 UART: [state] CFI Enabled
2,169,159 UART: [state] LifecycleState = Unprovisioned
2,170,804 UART: [state] DebugLocked = No
2,171,835 UART: [state] WD Timer not started. Device not locked for debugging
2,174,305 UART: [kat] SHA2-256
2,174,967 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,976 UART: [kat] ++
2,178,425 UART: [kat] sha1
2,178,936 UART: [kat] SHA2-256
2,179,810 UART: [kat] SHA2-384
2,180,484 UART: [kat] SHA2-512-ACC
2,181,310 UART: [kat] ECC-384
3,279,256 UART: [kat] HMAC-384Kdf
3,292,350 UART: [kat] LMS
3,821,857 UART: [kat] --
3,825,144 UART: [cold-reset] ++
3,827,448 UART: [fht] FHT @ 0x50003400
3,839,613 UART: [idev] ++
3,840,181 UART: [idev] CDI.KEYID = 6
3,841,195 UART: [idev] SUBJECT.KEYID = 7
3,842,293 UART: [idev] UDS.KEYID = 0
3,861,288 UART: [idev] Erasing UDS.KEYID = 0
6,314,963 UART: [idev] Sha1 KeyId Algorithm
6,338,129 UART: [idev] --
6,342,912 UART: [ldev] ++
6,343,513 UART: [ldev] CDI.KEYID = 6
6,344,396 UART: [ldev] SUBJECT.KEYID = 5
6,345,506 UART: [ldev] AUTHORITY.KEYID = 7
6,346,817 UART: [ldev] FE.KEYID = 1
6,357,275 UART: [ldev] Erasing FE.KEYID = 1
8,830,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,370 UART: [ldev] --
10,624,334 UART: [fwproc] Wait for Commands...
10,627,455 UART: [fwproc] Recv command 0x46574c44
10,629,495 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,208 UART: ROM Fatal Error: 0x000B002A
14,029,291 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
2,021,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,820,775 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,025,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,594,893 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,021,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,817,600 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
915,798 UART: [kat] HMAC-384Kdf
920,370 UART: [kat] LMS
1,168,682 UART: [kat] --
1,169,683 UART: [cold-reset] ++
1,170,061 UART: [fht] FHT @ 0x50003400
1,172,583 UART: [idev] ++
1,172,751 UART: [idev] CDI.KEYID = 6
1,173,112 UART: [idev] SUBJECT.KEYID = 7
1,173,537 UART: [idev] UDS.KEYID = 0
1,181,581 UART: [idev] Erasing UDS.KEYID = 0
1,198,027 UART: [idev] Sha1 KeyId Algorithm
1,206,793 UART: [idev] --
1,207,708 UART: [ldev] ++
1,207,876 UART: [ldev] CDI.KEYID = 6
1,208,240 UART: [ldev] SUBJECT.KEYID = 5
1,208,667 UART: [ldev] AUTHORITY.KEYID = 7
1,209,130 UART: [ldev] FE.KEYID = 1
1,214,550 UART: [ldev] Erasing FE.KEYID = 1
1,240,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,570 UART: [ldev] --
1,280,062 UART: [fwproc] Wait for Commands...
1,280,767 UART: [fwproc] Recv command 0x46574c44
1,281,500 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,756 UART: ROM Fatal Error: 0x000B002A
2,580,915 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,686 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,453 UART: [kat] SHA2-512-ACC
906,354 UART: [kat] ECC-384
915,899 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,422 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,181,852 UART: [idev] Erasing UDS.KEYID = 0
1,198,830 UART: [idev] Sha1 KeyId Algorithm
1,207,722 UART: [idev] --
1,208,785 UART: [ldev] ++
1,208,953 UART: [ldev] CDI.KEYID = 6
1,209,317 UART: [ldev] SUBJECT.KEYID = 5
1,209,744 UART: [ldev] AUTHORITY.KEYID = 7
1,210,207 UART: [ldev] FE.KEYID = 1
1,215,275 UART: [ldev] Erasing FE.KEYID = 1
1,241,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,919 UART: [ldev] --
1,280,299 UART: [fwproc] Wait for Commands...
1,280,956 UART: [fwproc] Recv command 0x46574c44
1,281,689 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,037 UART: ROM Fatal Error: 0x000B002A
2,581,196 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,437,023 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,322 UART: [kat] SHA2-512-ACC
906,223 UART: [kat] ECC-384
916,110 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,170,167 UART: [cold-reset] ++
1,170,705 UART: [fht] FHT @ 0x50003400
1,173,405 UART: [idev] ++
1,173,573 UART: [idev] CDI.KEYID = 6
1,173,934 UART: [idev] SUBJECT.KEYID = 7
1,174,359 UART: [idev] UDS.KEYID = 0
1,182,357 UART: [idev] Erasing UDS.KEYID = 0
1,199,511 UART: [idev] Sha1 KeyId Algorithm
1,208,477 UART: [idev] --
1,209,440 UART: [ldev] ++
1,209,608 UART: [ldev] CDI.KEYID = 6
1,209,972 UART: [ldev] SUBJECT.KEYID = 5
1,210,399 UART: [ldev] AUTHORITY.KEYID = 7
1,210,862 UART: [ldev] FE.KEYID = 1
1,216,140 UART: [ldev] Erasing FE.KEYID = 1
1,242,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,232 UART: [ldev] --
1,281,608 UART: [fwproc] Wait for Commands...
1,282,237 UART: [fwproc] Recv command 0x46574c44
1,282,970 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,568 UART: ROM Fatal Error: 0x000B002A
2,582,727 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,310 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,757 UART: [kat] SHA2-512-ACC
906,658 UART: [kat] ECC-384
916,739 UART: [kat] HMAC-384Kdf
921,393 UART: [kat] LMS
1,169,705 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,171,044 UART: [fht] FHT @ 0x50003400
1,173,584 UART: [idev] ++
1,173,752 UART: [idev] CDI.KEYID = 6
1,174,113 UART: [idev] SUBJECT.KEYID = 7
1,174,538 UART: [idev] UDS.KEYID = 0
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,836 UART: [idev] Sha1 KeyId Algorithm
1,208,754 UART: [idev] --
1,209,785 UART: [ldev] ++
1,209,953 UART: [ldev] CDI.KEYID = 6
1,210,317 UART: [ldev] SUBJECT.KEYID = 5
1,210,744 UART: [ldev] AUTHORITY.KEYID = 7
1,211,207 UART: [ldev] FE.KEYID = 1
1,216,511 UART: [ldev] Erasing FE.KEYID = 1
1,242,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,881 UART: [fwproc] Wait for Commands...
1,282,540 UART: [fwproc] Recv command 0x46574c44
1,283,273 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,039 UART: ROM Fatal Error: 0x000B002A
2,582,198 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,975 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,172,767 UART: [idev] ++
1,172,935 UART: [idev] CDI.KEYID = 6
1,173,296 UART: [idev] SUBJECT.KEYID = 7
1,173,721 UART: [idev] UDS.KEYID = 0
1,181,311 UART: [idev] Erasing UDS.KEYID = 0
1,197,881 UART: [idev] Sha1 KeyId Algorithm
1,206,827 UART: [idev] --
1,208,092 UART: [ldev] ++
1,208,260 UART: [ldev] CDI.KEYID = 6
1,208,624 UART: [ldev] SUBJECT.KEYID = 5
1,209,051 UART: [ldev] AUTHORITY.KEYID = 7
1,209,514 UART: [ldev] FE.KEYID = 1
1,214,690 UART: [ldev] Erasing FE.KEYID = 1
1,241,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,730 UART: [ldev] --
1,280,094 UART: [fwproc] Wait for Commands...
1,280,779 UART: [fwproc] Recv command 0x46574c44
1,281,512 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,486 UART: ROM Fatal Error: 0x000B002A
2,581,645 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,292 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,697 UART: [kat] LMS
1,169,009 UART: [kat] --
1,169,880 UART: [cold-reset] ++
1,170,320 UART: [fht] FHT @ 0x50003400
1,172,858 UART: [idev] ++
1,173,026 UART: [idev] CDI.KEYID = 6
1,173,387 UART: [idev] SUBJECT.KEYID = 7
1,173,812 UART: [idev] UDS.KEYID = 0
1,181,742 UART: [idev] Erasing UDS.KEYID = 0
1,198,816 UART: [idev] Sha1 KeyId Algorithm
1,207,646 UART: [idev] --
1,208,541 UART: [ldev] ++
1,208,709 UART: [ldev] CDI.KEYID = 6
1,209,073 UART: [ldev] SUBJECT.KEYID = 5
1,209,500 UART: [ldev] AUTHORITY.KEYID = 7
1,209,963 UART: [ldev] FE.KEYID = 1
1,215,003 UART: [ldev] Erasing FE.KEYID = 1
1,241,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,425 UART: [ldev] --
1,280,889 UART: [fwproc] Wait for Commands...
1,281,686 UART: [fwproc] Recv command 0x46574c44
1,282,419 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,771 UART: ROM Fatal Error: 0x000B002A
2,580,930 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,436,539 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,020,624 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,760 UART:
2,165,151 UART: Running Caliptra ROM ...
2,166,533 UART:
2,166,722 UART: [state] CFI Enabled
2,167,700 UART: [state] LifecycleState = Unprovisioned
2,169,342 UART: [state] DebugLocked = No
2,170,449 UART: [state] WD Timer not started. Device not locked for debugging
2,172,939 UART: [kat] SHA2-256
2,173,606 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,614 UART: [kat] ++
2,177,064 UART: [kat] sha1
2,177,581 UART: [kat] SHA2-256
2,178,243 UART: [kat] SHA2-384
2,178,897 UART: [kat] SHA2-512-ACC
2,179,730 UART: [kat] ECC-384
3,777,819 UART: [kat] HMAC-384Kdf
3,804,588 UART: [kat] LMS
4,877,762 UART: [kat] --
4,881,641 UART: [cold-reset] ++
4,883,474 UART: [fht] FHT @ 0x50003400
4,896,246 UART: [idev] ++
4,896,976 UART: [idev] CDI.KEYID = 6
4,898,111 UART: [idev] SUBJECT.KEYID = 7
4,899,287 UART: [idev] UDS.KEYID = 0
4,933,841 UART: [idev] Erasing UDS.KEYID = 0
8,244,863 UART: [idev] Sha1 KeyId Algorithm
8,267,429 UART: [idev] --
8,271,616 UART: [ldev] ++
8,272,195 UART: [ldev] CDI.KEYID = 6
8,273,440 UART: [ldev] SUBJECT.KEYID = 5
8,274,597 UART: [ldev] AUTHORITY.KEYID = 7
8,275,878 UART: [ldev] FE.KEYID = 1
8,320,753 UART: [ldev] Erasing FE.KEYID = 1
11,654,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,038,118 UART: [ldev] --
14,041,894 UART: [fwproc] Wait for Commands...
14,044,697 UART: [fwproc] Recv command 0x46574c44
14,046,973 UART: [fwproc] Recv'd Img size: 114124 bytes
18,116,686 UART: ROM Fatal Error: 0x000B002A
18,120,103 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,019,910 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,892,436 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
2,023,832 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,381 UART:
2,168,803 UART: Running Caliptra ROM ...
2,169,971 UART:
2,170,134 UART: [state] CFI Enabled
2,171,096 UART: [state] LifecycleState = Unprovisioned
2,172,734 UART: [state] DebugLocked = No
2,173,834 UART: [state] WD Timer not started. Device not locked for debugging
2,176,292 UART: [kat] SHA2-256
2,176,952 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,953 UART: [kat] ++
2,180,425 UART: [kat] sha1
2,181,017 UART: [kat] SHA2-256
2,181,679 UART: [kat] SHA2-384
2,182,329 UART: [kat] SHA2-512-ACC
2,183,199 UART: [kat] ECC-384
4,096,516 UART: [kat] HMAC-384Kdf
4,109,462 UART: [kat] LMS
5,182,611 UART: [kat] --
5,188,036 UART: [cold-reset] ++
5,190,107 UART: [fht] FHT @ 0x50003400
5,200,928 UART: [idev] ++
5,201,595 UART: [idev] CDI.KEYID = 6
5,202,823 UART: [idev] SUBJECT.KEYID = 7
5,204,249 UART: [idev] UDS.KEYID = 0
5,220,445 UART: [idev] Erasing UDS.KEYID = 0
8,492,490 UART: [idev] Sha1 KeyId Algorithm
8,513,693 UART: [idev] --
8,516,394 UART: [ldev] ++
8,516,960 UART: [ldev] CDI.KEYID = 6
8,518,195 UART: [ldev] SUBJECT.KEYID = 5
8,519,627 UART: [ldev] AUTHORITY.KEYID = 7
8,521,194 UART: [ldev] FE.KEYID = 1
8,530,495 UART: [ldev] Erasing FE.KEYID = 1
11,818,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,110,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,126,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,142,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,158,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,177,793 UART: [ldev] --
14,182,941 UART: [fwproc] Wait for Commands...
14,186,172 UART: [fwproc] Recv command 0x46574c44
14,188,491 UART: [fwproc] Recv'd Img size: 114124 bytes
18,262,977 UART: ROM Fatal Error: 0x000B002A
18,266,394 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
2,021,589 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,323 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
2,035,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,180,586 UART:
2,181,013 UART: Running Caliptra ROM ...
2,182,185 UART:
2,182,357 UART: [state] CFI Enabled
2,183,323 UART: [state] LifecycleState = Unprovisioned
2,184,967 UART: [state] DebugLocked = No
2,186,075 UART: [state] WD Timer not started. Device not locked for debugging
2,188,554 UART: [kat] SHA2-256
2,189,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,192,231 UART: [kat] ++
2,192,736 UART: [kat] sha1
2,193,272 UART: [kat] SHA2-256
2,194,018 UART: [kat] SHA2-384
2,194,688 UART: [kat] SHA2-512-ACC
2,195,570 UART: [kat] ECC-384
2,952,483 UART: [kat] HMAC-384Kdf
2,972,224 UART: [kat] LMS
3,501,696 UART: [kat] --
3,505,847 UART: [cold-reset] ++
3,507,997 UART: [fht] FHT @ 0x50003400
3,518,491 UART: [idev] ++
3,519,054 UART: [idev] CDI.KEYID = 6
3,520,073 UART: [idev] SUBJECT.KEYID = 7
3,521,179 UART: [idev] UDS.KEYID = 0
3,544,577 UART: [idev] Erasing UDS.KEYID = 0
6,029,138 UART: [idev] Sha1 KeyId Algorithm
6,051,404 UART: [idev] --
6,054,609 UART: [ldev] ++
6,055,187 UART: [ldev] CDI.KEYID = 6
6,056,100 UART: [ldev] SUBJECT.KEYID = 5
6,057,320 UART: [ldev] AUTHORITY.KEYID = 7
6,058,554 UART: [ldev] FE.KEYID = 1
6,101,338 UART: [ldev] Erasing FE.KEYID = 1
8,608,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,704 UART: [ldev] --
10,413,755 UART: [fwproc] Wait for Commands...
10,415,568 UART: [fwproc] Recv command 0x46574c44
10,417,673 UART: [fwproc] Recv'd Img size: 114448 bytes
13,814,085 UART: ROM Fatal Error: 0x000B002A
13,817,186 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
2,021,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,615,835 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
2,022,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,713 UART:
2,168,111 UART: Running Caliptra ROM ...
2,169,189 UART:
2,169,350 UART: [state] CFI Enabled
2,170,312 UART: [state] LifecycleState = Unprovisioned
2,171,957 UART: [state] DebugLocked = No
2,173,061 UART: [state] WD Timer not started. Device not locked for debugging
2,175,538 UART: [kat] SHA2-256
2,176,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,231 UART: [kat] ++
2,179,684 UART: [kat] sha1
2,180,218 UART: [kat] SHA2-256
2,180,965 UART: [kat] SHA2-384
2,181,631 UART: [kat] SHA2-512-ACC
2,182,514 UART: [kat] ECC-384
3,279,264 UART: [kat] HMAC-384Kdf
3,291,124 UART: [kat] LMS
3,820,641 UART: [kat] --
3,824,686 UART: [cold-reset] ++
3,825,839 UART: [fht] FHT @ 0x50003400
3,837,419 UART: [idev] ++
3,837,990 UART: [idev] CDI.KEYID = 6
3,838,970 UART: [idev] SUBJECT.KEYID = 7
3,840,129 UART: [idev] UDS.KEYID = 0
3,860,102 UART: [idev] Erasing UDS.KEYID = 0
6,313,231 UART: [idev] Sha1 KeyId Algorithm
6,335,811 UART: [idev] --
6,339,602 UART: [ldev] ++
6,340,166 UART: [ldev] CDI.KEYID = 6
6,341,043 UART: [ldev] SUBJECT.KEYID = 5
6,342,261 UART: [ldev] AUTHORITY.KEYID = 7
6,343,490 UART: [ldev] FE.KEYID = 1
6,352,815 UART: [ldev] Erasing FE.KEYID = 1
8,825,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,616 UART: [ldev] --
10,612,425 UART: [fwproc] Wait for Commands...
10,615,061 UART: [fwproc] Recv command 0x46574c44
10,617,103 UART: [fwproc] Recv'd Img size: 114448 bytes
14,012,968 UART: ROM Fatal Error: 0x000B002A
14,016,059 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,020,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,815,889 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
2,034,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,609,070 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,021,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,809,801 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
891,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,201 UART: [kat] ++
895,353 UART: [kat] sha1
899,437 UART: [kat] SHA2-256
901,377 UART: [kat] SHA2-384
904,022 UART: [kat] SHA2-512-ACC
905,923 UART: [kat] ECC-384
915,390 UART: [kat] HMAC-384Kdf
920,018 UART: [kat] LMS
1,168,330 UART: [kat] --
1,169,143 UART: [cold-reset] ++
1,169,647 UART: [fht] FHT @ 0x50003400
1,172,113 UART: [idev] ++
1,172,281 UART: [idev] CDI.KEYID = 6
1,172,642 UART: [idev] SUBJECT.KEYID = 7
1,173,067 UART: [idev] UDS.KEYID = 0
1,180,841 UART: [idev] Erasing UDS.KEYID = 0
1,197,845 UART: [idev] Sha1 KeyId Algorithm
1,206,707 UART: [idev] --
1,207,884 UART: [ldev] ++
1,208,052 UART: [ldev] CDI.KEYID = 6
1,208,416 UART: [ldev] SUBJECT.KEYID = 5
1,208,843 UART: [ldev] AUTHORITY.KEYID = 7
1,209,306 UART: [ldev] FE.KEYID = 1
1,214,844 UART: [ldev] Erasing FE.KEYID = 1
1,240,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,452 UART: [ldev] --
1,279,866 UART: [fwproc] Wait for Commands...
1,280,619 UART: [fwproc] Recv command 0x46574c44
1,281,352 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,520 UART: ROM Fatal Error: 0x000B002A
2,580,679 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,822 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,159 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,908 UART: [idev] ++
1,173,076 UART: [idev] CDI.KEYID = 6
1,173,437 UART: [idev] SUBJECT.KEYID = 7
1,173,862 UART: [idev] UDS.KEYID = 0
1,182,094 UART: [idev] Erasing UDS.KEYID = 0
1,199,126 UART: [idev] Sha1 KeyId Algorithm
1,208,066 UART: [idev] --
1,209,065 UART: [ldev] ++
1,209,233 UART: [ldev] CDI.KEYID = 6
1,209,597 UART: [ldev] SUBJECT.KEYID = 5
1,210,024 UART: [ldev] AUTHORITY.KEYID = 7
1,210,487 UART: [ldev] FE.KEYID = 1
1,215,971 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,531 UART: [ldev] --
1,281,861 UART: [fwproc] Wait for Commands...
1,282,608 UART: [fwproc] Recv command 0x46574c44
1,283,341 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,949 UART: ROM Fatal Error: 0x000B002A
2,583,108 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,169 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,446 UART: [kat] SHA2-256
890,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,125 UART: [kat] ++
895,277 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,826 UART: [kat] HMAC-384Kdf
921,508 UART: [kat] LMS
1,169,820 UART: [kat] --
1,170,591 UART: [cold-reset] ++
1,170,919 UART: [fht] FHT @ 0x50003400
1,173,473 UART: [idev] ++
1,173,641 UART: [idev] CDI.KEYID = 6
1,174,002 UART: [idev] SUBJECT.KEYID = 7
1,174,427 UART: [idev] UDS.KEYID = 0
1,182,359 UART: [idev] Erasing UDS.KEYID = 0
1,199,725 UART: [idev] Sha1 KeyId Algorithm
1,208,523 UART: [idev] --
1,209,606 UART: [ldev] ++
1,209,774 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,565 UART: [ldev] AUTHORITY.KEYID = 7
1,211,028 UART: [ldev] FE.KEYID = 1
1,216,430 UART: [ldev] Erasing FE.KEYID = 1
1,242,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,896 UART: [ldev] --
1,281,278 UART: [fwproc] Wait for Commands...
1,282,067 UART: [fwproc] Recv command 0x46574c44
1,282,800 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,002 UART: ROM Fatal Error: 0x000B002A
2,581,161 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,006 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,949 UART: [state] LifecycleState = Unprovisioned
86,604 UART: [state] DebugLocked = No
87,300 UART: [state] WD Timer not started. Device not locked for debugging
88,417 UART: [kat] SHA2-256
891,967 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,096 UART: [kat] ++
896,248 UART: [kat] sha1
900,610 UART: [kat] SHA2-256
902,550 UART: [kat] SHA2-384
905,367 UART: [kat] SHA2-512-ACC
907,268 UART: [kat] ECC-384
916,975 UART: [kat] HMAC-384Kdf
921,539 UART: [kat] LMS
1,169,851 UART: [kat] --
1,170,840 UART: [cold-reset] ++
1,171,366 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,182,982 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,736 UART: [idev] --
1,209,917 UART: [ldev] ++
1,210,085 UART: [ldev] CDI.KEYID = 6
1,210,449 UART: [ldev] SUBJECT.KEYID = 5
1,210,876 UART: [ldev] AUTHORITY.KEYID = 7
1,211,339 UART: [ldev] FE.KEYID = 1
1,216,327 UART: [ldev] Erasing FE.KEYID = 1
1,242,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,833 UART: [ldev] --
1,282,199 UART: [fwproc] Wait for Commands...
1,283,020 UART: [fwproc] Recv command 0x46574c44
1,283,753 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,329 UART: ROM Fatal Error: 0x000B002A
2,583,488 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,865 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,478 UART: [state] LifecycleState = Unprovisioned
85,133 UART: [state] DebugLocked = No
85,717 UART: [state] WD Timer not started. Device not locked for debugging
86,962 UART: [kat] SHA2-256
890,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,641 UART: [kat] ++
894,793 UART: [kat] sha1
898,987 UART: [kat] SHA2-256
900,927 UART: [kat] SHA2-384
903,738 UART: [kat] SHA2-512-ACC
905,639 UART: [kat] ECC-384
915,238 UART: [kat] HMAC-384Kdf
920,004 UART: [kat] LMS
1,168,316 UART: [kat] --
1,169,373 UART: [cold-reset] ++
1,169,781 UART: [fht] FHT @ 0x50003400
1,172,453 UART: [idev] ++
1,172,621 UART: [idev] CDI.KEYID = 6
1,172,982 UART: [idev] SUBJECT.KEYID = 7
1,173,407 UART: [idev] UDS.KEYID = 0
1,181,225 UART: [idev] Erasing UDS.KEYID = 0
1,198,247 UART: [idev] Sha1 KeyId Algorithm
1,207,211 UART: [idev] --
1,208,170 UART: [ldev] ++
1,208,338 UART: [ldev] CDI.KEYID = 6
1,208,702 UART: [ldev] SUBJECT.KEYID = 5
1,209,129 UART: [ldev] AUTHORITY.KEYID = 7
1,209,592 UART: [ldev] FE.KEYID = 1
1,214,778 UART: [ldev] Erasing FE.KEYID = 1
1,241,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,764 UART: [ldev] --
1,280,070 UART: [fwproc] Wait for Commands...
1,280,663 UART: [fwproc] Recv command 0x46574c44
1,281,396 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,226 UART: ROM Fatal Error: 0x000B002A
2,580,385 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,198 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,928 UART: [kat] SHA2-256
901,868 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,587 UART: [kat] HMAC-384Kdf
921,331 UART: [kat] LMS
1,169,643 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,766 UART: [fht] FHT @ 0x50003400
1,173,390 UART: [idev] ++
1,173,558 UART: [idev] CDI.KEYID = 6
1,173,919 UART: [idev] SUBJECT.KEYID = 7
1,174,344 UART: [idev] UDS.KEYID = 0
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,522 UART: [idev] Sha1 KeyId Algorithm
1,208,470 UART: [idev] --
1,209,513 UART: [ldev] ++
1,209,681 UART: [ldev] CDI.KEYID = 6
1,210,045 UART: [ldev] SUBJECT.KEYID = 5
1,210,472 UART: [ldev] AUTHORITY.KEYID = 7
1,210,935 UART: [ldev] FE.KEYID = 1
1,216,261 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,217 UART: [ldev] --
1,281,527 UART: [fwproc] Wait for Commands...
1,282,218 UART: [fwproc] Recv command 0x46574c44
1,282,951 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,665 UART: ROM Fatal Error: 0x000B002A
2,581,824 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,803 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,020,255 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,295 UART:
2,164,693 UART: Running Caliptra ROM ...
2,165,806 UART:
2,165,962 UART: [state] CFI Enabled
2,166,936 UART: [state] LifecycleState = Unprovisioned
2,168,587 UART: [state] DebugLocked = No
2,169,614 UART: [state] WD Timer not started. Device not locked for debugging
2,172,083 UART: [kat] SHA2-256
2,172,753 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,757 UART: [kat] ++
2,176,202 UART: [kat] sha1
2,176,712 UART: [kat] SHA2-256
2,177,369 UART: [kat] SHA2-384
2,178,023 UART: [kat] SHA2-512-ACC
2,178,910 UART: [kat] ECC-384
3,773,587 UART: [kat] HMAC-384Kdf
3,801,509 UART: [kat] LMS
4,874,653 UART: [kat] --
4,878,561 UART: [cold-reset] ++
4,880,337 UART: [fht] FHT @ 0x50003400
4,892,235 UART: [idev] ++
4,892,907 UART: [idev] CDI.KEYID = 6
4,894,142 UART: [idev] SUBJECT.KEYID = 7
4,895,301 UART: [idev] UDS.KEYID = 0
4,929,434 UART: [idev] Erasing UDS.KEYID = 0
8,237,390 UART: [idev] Sha1 KeyId Algorithm
8,259,870 UART: [idev] --
8,264,678 UART: [ldev] ++
8,265,244 UART: [ldev] CDI.KEYID = 6
8,266,354 UART: [ldev] SUBJECT.KEYID = 5
8,267,625 UART: [ldev] AUTHORITY.KEYID = 7
8,268,779 UART: [ldev] FE.KEYID = 1
8,295,160 UART: [ldev] Erasing FE.KEYID = 1
11,633,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,513 UART: [ldev] --
14,017,536 UART: [fwproc] Wait for Commands...
14,019,368 UART: [fwproc] Recv command 0x46574c44
14,021,688 UART: [fwproc] Recv'd Img size: 114124 bytes
18,091,473 UART: ROM Fatal Error: 0x000B0028
18,094,895 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
2,020,670 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,889,813 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
2,024,549 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,781 UART:
2,169,199 UART: Running Caliptra ROM ...
2,170,377 UART:
2,170,546 UART: [state] CFI Enabled
2,171,513 UART: [state] LifecycleState = Unprovisioned
2,173,159 UART: [state] DebugLocked = No
2,174,256 UART: [state] WD Timer not started. Device not locked for debugging
2,176,725 UART: [kat] SHA2-256
2,177,388 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,389 UART: [kat] ++
2,180,858 UART: [kat] sha1
2,181,366 UART: [kat] SHA2-256
2,182,100 UART: [kat] SHA2-384
2,182,762 UART: [kat] SHA2-512-ACC
2,183,585 UART: [kat] ECC-384
4,102,689 UART: [kat] HMAC-384Kdf
4,114,386 UART: [kat] LMS
5,187,546 UART: [kat] --
5,192,219 UART: [cold-reset] ++
5,193,623 UART: [fht] FHT @ 0x50003400
5,204,497 UART: [idev] ++
5,205,169 UART: [idev] CDI.KEYID = 6
5,206,400 UART: [idev] SUBJECT.KEYID = 7
5,207,828 UART: [idev] UDS.KEYID = 0
5,220,185 UART: [idev] Erasing UDS.KEYID = 0
8,494,351 UART: [idev] Sha1 KeyId Algorithm
8,516,609 UART: [idev] --
8,520,357 UART: [ldev] ++
8,520,940 UART: [ldev] CDI.KEYID = 6
8,522,179 UART: [ldev] SUBJECT.KEYID = 5
8,523,613 UART: [ldev] AUTHORITY.KEYID = 7
8,525,175 UART: [ldev] FE.KEYID = 1
8,537,873 UART: [ldev] Erasing FE.KEYID = 1
11,830,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,424 UART: [ldev] --
14,196,944 UART: [fwproc] Wait for Commands...
14,199,245 UART: [fwproc] Recv command 0x46574c44
14,201,575 UART: [fwproc] Recv'd Img size: 114124 bytes
18,273,354 UART: ROM Fatal Error: 0x000B0028
18,276,811 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
2,028,478 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,079,110 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,022,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,302 UART:
2,167,728 UART: Running Caliptra ROM ...
2,168,901 UART:
2,169,077 UART: [state] CFI Enabled
2,170,046 UART: [state] LifecycleState = Unprovisioned
2,171,689 UART: [state] DebugLocked = No
2,172,758 UART: [state] WD Timer not started. Device not locked for debugging
2,175,236 UART: [kat] SHA2-256
2,175,901 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,907 UART: [kat] ++
2,179,378 UART: [kat] sha1
2,179,893 UART: [kat] SHA2-256
2,180,634 UART: [kat] SHA2-384
2,181,299 UART: [kat] SHA2-512-ACC
2,182,143 UART: [kat] ECC-384
2,947,413 UART: [kat] HMAC-384Kdf
2,972,180 UART: [kat] LMS
3,501,644 UART: [kat] --
3,508,283 UART: [cold-reset] ++
3,510,756 UART: [fht] FHT @ 0x50003400
3,521,140 UART: [idev] ++
3,521,705 UART: [idev] CDI.KEYID = 6
3,522,608 UART: [idev] SUBJECT.KEYID = 7
3,523,824 UART: [idev] UDS.KEYID = 0
3,545,471 UART: [idev] Erasing UDS.KEYID = 0
6,029,561 UART: [idev] Sha1 KeyId Algorithm
6,052,594 UART: [idev] --
6,056,440 UART: [ldev] ++
6,057,012 UART: [ldev] CDI.KEYID = 6
6,057,928 UART: [ldev] SUBJECT.KEYID = 5
6,059,093 UART: [ldev] AUTHORITY.KEYID = 7
6,060,329 UART: [ldev] FE.KEYID = 1
6,101,382 UART: [ldev] Erasing FE.KEYID = 1
8,601,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,335 UART: [ldev] --
10,392,302 UART: [fwproc] Wait for Commands...
10,394,346 UART: [fwproc] Recv command 0x46574c44
10,396,387 UART: [fwproc] Recv'd Img size: 114448 bytes
13,802,990 UART: ROM Fatal Error: 0x000B0028
13,806,126 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
2,020,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,637,610 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,023,576 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,361 UART:
2,168,781 UART: Running Caliptra ROM ...
2,169,862 UART:
2,170,012 UART: [state] CFI Enabled
2,170,984 UART: [state] LifecycleState = Unprovisioned
2,172,625 UART: [state] DebugLocked = No
2,173,650 UART: [state] WD Timer not started. Device not locked for debugging
2,176,119 UART: [kat] SHA2-256
2,176,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,791 UART: [kat] ++
2,180,236 UART: [kat] sha1
2,180,746 UART: [kat] SHA2-256
2,181,402 UART: [kat] SHA2-384
2,182,085 UART: [kat] SHA2-512-ACC
2,182,889 UART: [kat] ECC-384
3,288,101 UART: [kat] HMAC-384Kdf
3,300,106 UART: [kat] LMS
3,829,603 UART: [kat] --
3,834,672 UART: [cold-reset] ++
3,835,905 UART: [fht] FHT @ 0x50003400
3,847,745 UART: [idev] ++
3,848,306 UART: [idev] CDI.KEYID = 6
3,849,212 UART: [idev] SUBJECT.KEYID = 7
3,850,420 UART: [idev] UDS.KEYID = 0
3,866,662 UART: [idev] Erasing UDS.KEYID = 0
6,327,521 UART: [idev] Sha1 KeyId Algorithm
6,350,313 UART: [idev] --
6,353,773 UART: [ldev] ++
6,354,350 UART: [ldev] CDI.KEYID = 6
6,355,451 UART: [ldev] SUBJECT.KEYID = 5
6,356,576 UART: [ldev] AUTHORITY.KEYID = 7
6,357,674 UART: [ldev] FE.KEYID = 1
6,366,233 UART: [ldev] Erasing FE.KEYID = 1
8,838,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,715 UART: [ldev] --
10,627,280 UART: [fwproc] Wait for Commands...
10,628,839 UART: [fwproc] Recv command 0x46574c44
10,630,937 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,216 UART: ROM Fatal Error: 0x000B0028
14,034,346 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
2,023,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,820,751 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,021,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,615,323 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,024,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,809,840 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,488 UART: [kat] LMS
1,168,800 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,355 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,181,997 UART: [idev] Erasing UDS.KEYID = 0
1,199,149 UART: [idev] Sha1 KeyId Algorithm
1,208,119 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,562 UART: [ldev] Erasing FE.KEYID = 1
1,242,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,120 UART: [ldev] --
1,281,576 UART: [fwproc] Wait for Commands...
1,282,281 UART: [fwproc] Recv command 0x46574c44
1,283,014 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,065 UART: ROM Fatal Error: 0x000B0028
2,583,222 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,323 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,358 UART: [kat] ++
895,510 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,449 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,182,186 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,207,944 UART: [idev] --
1,209,095 UART: [ldev] ++
1,209,263 UART: [ldev] CDI.KEYID = 6
1,209,627 UART: [ldev] SUBJECT.KEYID = 5
1,210,054 UART: [ldev] AUTHORITY.KEYID = 7
1,210,517 UART: [ldev] FE.KEYID = 1
1,215,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,395 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,721 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,392 UART: ROM Fatal Error: 0x000B0028
2,581,549 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,204 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
87,011 UART: [state] WD Timer not started. Device not locked for debugging
88,232 UART: [kat] SHA2-256
891,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,911 UART: [kat] ++
896,063 UART: [kat] sha1
900,263 UART: [kat] SHA2-256
902,203 UART: [kat] SHA2-384
905,018 UART: [kat] SHA2-512-ACC
906,919 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
921,178 UART: [kat] LMS
1,169,490 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,703 UART: [fht] FHT @ 0x50003400
1,173,213 UART: [idev] ++
1,173,381 UART: [idev] CDI.KEYID = 6
1,173,742 UART: [idev] SUBJECT.KEYID = 7
1,174,167 UART: [idev] UDS.KEYID = 0
1,182,141 UART: [idev] Erasing UDS.KEYID = 0
1,199,257 UART: [idev] Sha1 KeyId Algorithm
1,208,315 UART: [idev] --
1,209,390 UART: [ldev] ++
1,209,558 UART: [ldev] CDI.KEYID = 6
1,209,922 UART: [ldev] SUBJECT.KEYID = 5
1,210,349 UART: [ldev] AUTHORITY.KEYID = 7
1,210,812 UART: [ldev] FE.KEYID = 1
1,215,960 UART: [ldev] Erasing FE.KEYID = 1
1,242,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,856 UART: [ldev] --
1,281,238 UART: [fwproc] Wait for Commands...
1,281,949 UART: [fwproc] Recv command 0x46574c44
1,282,682 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,845 UART: ROM Fatal Error: 0x000B0028
2,582,002 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,047 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,054 UART: [kat] SHA2-256
901,994 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,399 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,656 UART: [fht] FHT @ 0x50003400
1,173,354 UART: [idev] ++
1,173,522 UART: [idev] CDI.KEYID = 6
1,173,883 UART: [idev] SUBJECT.KEYID = 7
1,174,308 UART: [idev] UDS.KEYID = 0
1,182,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,180 UART: [idev] Sha1 KeyId Algorithm
1,208,160 UART: [idev] --
1,209,119 UART: [ldev] ++
1,209,287 UART: [ldev] CDI.KEYID = 6
1,209,651 UART: [ldev] SUBJECT.KEYID = 5
1,210,078 UART: [ldev] AUTHORITY.KEYID = 7
1,210,541 UART: [ldev] FE.KEYID = 1
1,215,607 UART: [ldev] Erasing FE.KEYID = 1
1,242,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,941 UART: [ldev] --
1,281,451 UART: [fwproc] Wait for Commands...
1,282,126 UART: [fwproc] Recv command 0x46574c44
1,282,859 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,570 UART: ROM Fatal Error: 0x000B0028
2,581,727 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,206 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,045 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
890,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,977 UART: [kat] ++
895,129 UART: [kat] sha1
899,373 UART: [kat] SHA2-256
901,313 UART: [kat] SHA2-384
904,100 UART: [kat] SHA2-512-ACC
906,001 UART: [kat] ECC-384
915,368 UART: [kat] HMAC-384Kdf
920,020 UART: [kat] LMS
1,168,332 UART: [kat] --
1,168,949 UART: [cold-reset] ++
1,169,509 UART: [fht] FHT @ 0x50003400
1,172,131 UART: [idev] ++
1,172,299 UART: [idev] CDI.KEYID = 6
1,172,660 UART: [idev] SUBJECT.KEYID = 7
1,173,085 UART: [idev] UDS.KEYID = 0
1,180,995 UART: [idev] Erasing UDS.KEYID = 0
1,197,757 UART: [idev] Sha1 KeyId Algorithm
1,206,593 UART: [idev] --
1,207,718 UART: [ldev] ++
1,207,886 UART: [ldev] CDI.KEYID = 6
1,208,250 UART: [ldev] SUBJECT.KEYID = 5
1,208,677 UART: [ldev] AUTHORITY.KEYID = 7
1,209,140 UART: [ldev] FE.KEYID = 1
1,214,280 UART: [ldev] Erasing FE.KEYID = 1
1,240,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,808 UART: [ldev] --
1,280,224 UART: [fwproc] Wait for Commands...
1,281,011 UART: [fwproc] Recv command 0x46574c44
1,281,744 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,937 UART: ROM Fatal Error: 0x000B0028
2,582,094 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,897 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,921 UART: [kat] LMS
1,169,233 UART: [kat] --
1,170,172 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,186 UART: [idev] ++
1,173,354 UART: [idev] CDI.KEYID = 6
1,173,715 UART: [idev] SUBJECT.KEYID = 7
1,174,140 UART: [idev] UDS.KEYID = 0
1,182,060 UART: [idev] Erasing UDS.KEYID = 0
1,199,024 UART: [idev] Sha1 KeyId Algorithm
1,207,834 UART: [idev] --
1,208,937 UART: [ldev] ++
1,209,105 UART: [ldev] CDI.KEYID = 6
1,209,469 UART: [ldev] SUBJECT.KEYID = 5
1,209,896 UART: [ldev] AUTHORITY.KEYID = 7
1,210,359 UART: [ldev] FE.KEYID = 1
1,215,725 UART: [ldev] Erasing FE.KEYID = 1
1,242,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,687 UART: [ldev] --
1,281,189 UART: [fwproc] Wait for Commands...
1,281,812 UART: [fwproc] Recv command 0x46574c44
1,282,545 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,818 UART: ROM Fatal Error: 0x000B0028
2,580,975 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,586 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
2,020,577 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,725 UART:
2,165,112 UART: Running Caliptra ROM ...
2,166,288 UART:
2,166,475 UART: [state] CFI Enabled
2,167,448 UART: [state] LifecycleState = Unprovisioned
2,169,111 UART: [state] DebugLocked = No
2,170,219 UART: [state] WD Timer not started. Device not locked for debugging
2,172,689 UART: [kat] SHA2-256
2,173,357 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,367 UART: [kat] ++
2,176,817 UART: [kat] sha1
2,177,328 UART: [kat] SHA2-256
2,178,068 UART: [kat] SHA2-384
2,178,734 UART: [kat] SHA2-512-ACC
2,179,579 UART: [kat] ECC-384
3,775,756 UART: [kat] HMAC-384Kdf
3,802,639 UART: [kat] LMS
4,875,803 UART: [kat] --
4,879,958 UART: [cold-reset] ++
4,881,298 UART: [fht] FHT @ 0x50003400
4,892,656 UART: [idev] ++
4,893,354 UART: [idev] CDI.KEYID = 6
4,894,592 UART: [idev] SUBJECT.KEYID = 7
4,895,693 UART: [idev] UDS.KEYID = 0
4,930,483 UART: [idev] Erasing UDS.KEYID = 0
8,243,375 UART: [idev] Sha1 KeyId Algorithm
8,264,889 UART: [idev] --
8,268,503 UART: [ldev] ++
8,269,074 UART: [ldev] CDI.KEYID = 6
8,270,264 UART: [ldev] SUBJECT.KEYID = 5
8,271,425 UART: [ldev] AUTHORITY.KEYID = 7
8,272,655 UART: [ldev] FE.KEYID = 1
8,319,013 UART: [ldev] Erasing FE.KEYID = 1
11,652,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,071 UART: [ldev] --
14,038,562 UART: [fwproc] Wait for Commands...
14,041,306 UART: [fwproc] Recv command 0x46574c44
14,043,879 UART: [fwproc] Recv'd Img size: 114124 bytes
18,116,446 UART: ROM Fatal Error: 0x000B0028
18,119,868 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
2,021,228 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,881,594 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
2,024,510 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,506 UART:
2,168,907 UART: Running Caliptra ROM ...
2,169,983 UART:
2,170,134 UART: [state] CFI Enabled
2,171,228 UART: [state] LifecycleState = Unprovisioned
2,172,877 UART: [state] DebugLocked = No
2,173,974 UART: [state] WD Timer not started. Device not locked for debugging
2,176,439 UART: [kat] SHA2-256
2,177,098 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,102 UART: [kat] ++
2,180,549 UART: [kat] sha1
2,181,089 UART: [kat] SHA2-256
2,181,745 UART: [kat] SHA2-384
2,182,394 UART: [kat] SHA2-512-ACC
2,183,359 UART: [kat] ECC-384
4,095,950 UART: [kat] HMAC-384Kdf
4,108,034 UART: [kat] LMS
5,181,201 UART: [kat] --
5,186,725 UART: [cold-reset] ++
5,189,365 UART: [fht] FHT @ 0x50003400
5,201,059 UART: [idev] ++
5,201,786 UART: [idev] CDI.KEYID = 6
5,202,980 UART: [idev] SUBJECT.KEYID = 7
5,204,416 UART: [idev] UDS.KEYID = 0
5,223,721 UART: [idev] Erasing UDS.KEYID = 0
8,498,459 UART: [idev] Sha1 KeyId Algorithm
8,520,505 UART: [idev] --
8,524,383 UART: [ldev] ++
8,524,942 UART: [ldev] CDI.KEYID = 6
8,526,173 UART: [ldev] SUBJECT.KEYID = 5
8,527,658 UART: [ldev] AUTHORITY.KEYID = 7
8,529,238 UART: [ldev] FE.KEYID = 1
8,542,866 UART: [ldev] Erasing FE.KEYID = 1
11,829,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,915 UART: [ldev] --
14,193,909 UART: [fwproc] Wait for Commands...
14,196,378 UART: [fwproc] Recv command 0x46574c44
14,198,692 UART: [fwproc] Recv'd Img size: 114124 bytes
18,273,817 UART: ROM Fatal Error: 0x000B0028
18,277,241 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
2,021,970 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,104,441 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,022,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,126 UART:
2,167,537 UART: Running Caliptra ROM ...
2,168,619 UART:
2,168,774 UART: [state] CFI Enabled
2,169,747 UART: [state] LifecycleState = Unprovisioned
2,171,419 UART: [state] DebugLocked = No
2,172,454 UART: [state] WD Timer not started. Device not locked for debugging
2,174,938 UART: [kat] SHA2-256
2,175,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,635 UART: [kat] ++
2,179,088 UART: [kat] sha1
2,179,605 UART: [kat] SHA2-256
2,180,348 UART: [kat] SHA2-384
2,181,011 UART: [kat] SHA2-512-ACC
2,181,814 UART: [kat] ECC-384
2,947,988 UART: [kat] HMAC-384Kdf
2,972,840 UART: [kat] LMS
3,502,266 UART: [kat] --
3,507,959 UART: [cold-reset] ++
3,509,042 UART: [fht] FHT @ 0x50003400
3,519,872 UART: [idev] ++
3,520,460 UART: [idev] CDI.KEYID = 6
3,521,426 UART: [idev] SUBJECT.KEYID = 7
3,522,595 UART: [idev] UDS.KEYID = 0
3,544,748 UART: [idev] Erasing UDS.KEYID = 0
6,027,892 UART: [idev] Sha1 KeyId Algorithm
6,050,646 UART: [idev] --
6,054,517 UART: [ldev] ++
6,055,102 UART: [ldev] CDI.KEYID = 6
6,056,017 UART: [ldev] SUBJECT.KEYID = 5
6,057,184 UART: [ldev] AUTHORITY.KEYID = 7
6,058,418 UART: [ldev] FE.KEYID = 1
6,099,688 UART: [ldev] Erasing FE.KEYID = 1
8,607,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,061 UART: [ldev] --
10,416,006 UART: [fwproc] Wait for Commands...
10,418,699 UART: [fwproc] Recv command 0x46574c44
10,420,739 UART: [fwproc] Recv'd Img size: 114448 bytes
13,824,717 UART: ROM Fatal Error: 0x000B0028
13,827,851 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,023,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,610,632 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
2,021,414 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,861 UART:
2,166,241 UART: Running Caliptra ROM ...
2,167,347 UART:
2,167,513 UART: [state] CFI Enabled
2,168,466 UART: [state] LifecycleState = Unprovisioned
2,170,106 UART: [state] DebugLocked = No
2,171,212 UART: [state] WD Timer not started. Device not locked for debugging
2,173,685 UART: [kat] SHA2-256
2,174,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,362 UART: [kat] ++
2,177,811 UART: [kat] sha1
2,178,345 UART: [kat] SHA2-256
2,179,085 UART: [kat] SHA2-384
2,179,753 UART: [kat] SHA2-512-ACC
2,180,628 UART: [kat] ECC-384
3,285,452 UART: [kat] HMAC-384Kdf
3,298,265 UART: [kat] LMS
3,827,767 UART: [kat] --
3,832,571 UART: [cold-reset] ++
3,833,473 UART: [fht] FHT @ 0x50003400
3,843,962 UART: [idev] ++
3,844,564 UART: [idev] CDI.KEYID = 6
3,845,488 UART: [idev] SUBJECT.KEYID = 7
3,846,655 UART: [idev] UDS.KEYID = 0
3,863,495 UART: [idev] Erasing UDS.KEYID = 0
6,318,385 UART: [idev] Sha1 KeyId Algorithm
6,340,431 UART: [idev] --
6,344,320 UART: [ldev] ++
6,344,895 UART: [ldev] CDI.KEYID = 6
6,345,805 UART: [ldev] SUBJECT.KEYID = 5
6,346,965 UART: [ldev] AUTHORITY.KEYID = 7
6,348,245 UART: [ldev] FE.KEYID = 1
6,360,348 UART: [ldev] Erasing FE.KEYID = 1
8,834,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,876 UART: [ldev] --
10,628,032 UART: [fwproc] Wait for Commands...
10,629,644 UART: [fwproc] Recv command 0x46574c44
10,631,685 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,312 UART: ROM Fatal Error: 0x000B0028
14,032,471 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,022,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,811,795 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
2,020,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,589,671 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
2,021,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,811,802 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,296 UART: [kat] SHA2-512-ACC
906,197 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,239 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,181,421 UART: [idev] Erasing UDS.KEYID = 0
1,198,233 UART: [idev] Sha1 KeyId Algorithm
1,206,971 UART: [idev] --
1,208,018 UART: [ldev] ++
1,208,186 UART: [ldev] CDI.KEYID = 6
1,208,550 UART: [ldev] SUBJECT.KEYID = 5
1,208,977 UART: [ldev] AUTHORITY.KEYID = 7
1,209,440 UART: [ldev] FE.KEYID = 1
1,214,450 UART: [ldev] Erasing FE.KEYID = 1
1,240,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,832 UART: [ldev] --
1,279,114 UART: [fwproc] Wait for Commands...
1,279,793 UART: [fwproc] Recv command 0x46574c44
1,280,526 UART: [fwproc] Recv'd Img size: 114448 bytes
2,577,191 UART: ROM Fatal Error: 0x000B0028
2,578,348 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,231 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,828 UART: [kat] SHA2-256
901,768 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,756 UART: [cold-reset] ++
1,170,276 UART: [fht] FHT @ 0x50003400
1,172,894 UART: [idev] ++
1,173,062 UART: [idev] CDI.KEYID = 6
1,173,423 UART: [idev] SUBJECT.KEYID = 7
1,173,848 UART: [idev] UDS.KEYID = 0
1,181,566 UART: [idev] Erasing UDS.KEYID = 0
1,198,150 UART: [idev] Sha1 KeyId Algorithm
1,207,018 UART: [idev] --
1,208,197 UART: [ldev] ++
1,208,365 UART: [ldev] CDI.KEYID = 6
1,208,729 UART: [ldev] SUBJECT.KEYID = 5
1,209,156 UART: [ldev] AUTHORITY.KEYID = 7
1,209,619 UART: [ldev] FE.KEYID = 1
1,214,859 UART: [ldev] Erasing FE.KEYID = 1
1,241,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,111 UART: [ldev] --
1,280,613 UART: [fwproc] Wait for Commands...
1,281,192 UART: [fwproc] Recv command 0x46574c44
1,281,925 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,298 UART: ROM Fatal Error: 0x000B0028
2,581,455 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,662 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,810 UART: [kat] LMS
1,169,122 UART: [kat] --
1,170,103 UART: [cold-reset] ++
1,170,573 UART: [fht] FHT @ 0x50003400
1,173,097 UART: [idev] ++
1,173,265 UART: [idev] CDI.KEYID = 6
1,173,626 UART: [idev] SUBJECT.KEYID = 7
1,174,051 UART: [idev] UDS.KEYID = 0
1,181,895 UART: [idev] Erasing UDS.KEYID = 0
1,198,789 UART: [idev] Sha1 KeyId Algorithm
1,207,641 UART: [idev] --
1,208,510 UART: [ldev] ++
1,208,678 UART: [ldev] CDI.KEYID = 6
1,209,042 UART: [ldev] SUBJECT.KEYID = 5
1,209,469 UART: [ldev] AUTHORITY.KEYID = 7
1,209,932 UART: [ldev] FE.KEYID = 1
1,215,190 UART: [ldev] Erasing FE.KEYID = 1
1,241,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,788 UART: [ldev] --
1,281,276 UART: [fwproc] Wait for Commands...
1,281,899 UART: [fwproc] Recv command 0x46574c44
1,282,632 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,613 UART: ROM Fatal Error: 0x000B0028
2,581,770 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,973 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
891,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,514 UART: [kat] ++
895,666 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,599 UART: [kat] LMS
1,168,911 UART: [kat] --
1,169,668 UART: [cold-reset] ++
1,169,996 UART: [fht] FHT @ 0x50003400
1,172,608 UART: [idev] ++
1,172,776 UART: [idev] CDI.KEYID = 6
1,173,137 UART: [idev] SUBJECT.KEYID = 7
1,173,562 UART: [idev] UDS.KEYID = 0
1,181,338 UART: [idev] Erasing UDS.KEYID = 0
1,198,386 UART: [idev] Sha1 KeyId Algorithm
1,207,368 UART: [idev] --
1,208,523 UART: [ldev] ++
1,208,691 UART: [ldev] CDI.KEYID = 6
1,209,055 UART: [ldev] SUBJECT.KEYID = 5
1,209,482 UART: [ldev] AUTHORITY.KEYID = 7
1,209,945 UART: [ldev] FE.KEYID = 1
1,215,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,117 UART: [ldev] --
1,281,421 UART: [fwproc] Wait for Commands...
1,282,058 UART: [fwproc] Recv command 0x46574c44
1,282,791 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,854 UART: ROM Fatal Error: 0x000B0028
2,583,011 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,502 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,586 UART: [state] LifecycleState = Unprovisioned
86,241 UART: [state] DebugLocked = No
86,813 UART: [state] WD Timer not started. Device not locked for debugging
88,092 UART: [kat] SHA2-256
891,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,771 UART: [kat] ++
895,923 UART: [kat] sha1
899,991 UART: [kat] SHA2-256
901,931 UART: [kat] SHA2-384
904,748 UART: [kat] SHA2-512-ACC
906,649 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,579 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,685 UART: [idev] ++
1,172,853 UART: [idev] CDI.KEYID = 6
1,173,214 UART: [idev] SUBJECT.KEYID = 7
1,173,639 UART: [idev] UDS.KEYID = 0
1,182,149 UART: [idev] Erasing UDS.KEYID = 0
1,198,707 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,770 UART: [ldev] ++
1,208,938 UART: [ldev] CDI.KEYID = 6
1,209,302 UART: [ldev] SUBJECT.KEYID = 5
1,209,729 UART: [ldev] AUTHORITY.KEYID = 7
1,210,192 UART: [ldev] FE.KEYID = 1
1,215,378 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,894 UART: [ldev] --
1,281,366 UART: [fwproc] Wait for Commands...
1,282,065 UART: [fwproc] Recv command 0x46574c44
1,282,798 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,659 UART: ROM Fatal Error: 0x000B0028
2,581,816 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,253 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,181,954 UART: [idev] Erasing UDS.KEYID = 0
1,198,882 UART: [idev] Sha1 KeyId Algorithm
1,207,858 UART: [idev] --
1,208,917 UART: [ldev] ++
1,209,085 UART: [ldev] CDI.KEYID = 6
1,209,449 UART: [ldev] SUBJECT.KEYID = 5
1,209,876 UART: [ldev] AUTHORITY.KEYID = 7
1,210,339 UART: [ldev] FE.KEYID = 1
1,215,751 UART: [ldev] Erasing FE.KEYID = 1
1,242,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,185 UART: [ldev] --
1,281,453 UART: [fwproc] Wait for Commands...
1,282,172 UART: [fwproc] Recv command 0x46574c44
1,282,905 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,602 UART: ROM Fatal Error: 0x000B0028
2,582,759 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,436,214 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,075 writing to cptra_bootfsm_go
2,022,450 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,896 UART:
2,167,280 UART: Running Caliptra ROM ...
2,168,359 UART:
2,168,512 UART: [state] CFI Enabled
2,169,393 UART: [state] LifecycleState = Unprovisioned
2,171,044 UART: [state] DebugLocked = No
2,172,075 UART: [state] WD Timer not started. Device not locked for debugging
2,174,548 UART: [kat] SHA2-256
2,175,212 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,225 UART: [kat] ++
2,178,677 UART: [kat] sha1
2,179,210 UART: [kat] SHA2-256
2,179,868 UART: [kat] SHA2-384
2,180,525 UART: [kat] SHA2-512-ACC
2,181,536 UART: [kat] ECC-384
3,777,466 UART: [kat] HMAC-384Kdf
3,802,640 UART: [kat] LMS
4,875,805 UART: [kat] --
4,878,994 UART: [cold-reset] ++
4,880,224 UART: [fht] FHT @ 0x50003400
4,891,858 UART: [idev] ++
4,892,549 UART: [idev] CDI.KEYID = 6
4,893,659 UART: [idev] SUBJECT.KEYID = 7
4,894,877 UART: [idev] UDS.KEYID = 0
4,929,614 UART: [idev] Erasing UDS.KEYID = 0
8,240,045 UART: [idev] Sha1 KeyId Algorithm
8,262,841 UART: [idev] --
8,265,458 UART: [ldev] ++
8,266,085 UART: [ldev] CDI.KEYID = 6
8,267,273 UART: [ldev] SUBJECT.KEYID = 5
8,268,430 UART: [ldev] AUTHORITY.KEYID = 7
8,269,656 UART: [ldev] FE.KEYID = 1
8,316,804 UART: [ldev] Erasing FE.KEYID = 1
11,652,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,304 UART: [ldev] --
14,035,199 UART: [fwproc] Wait for Commands...
14,037,514 UART: [fwproc] Recv command 0x46574c44
14,039,787 UART: [fwproc] Recv'd Img size: 114124 bytes
18,106,377 UART: ROM Fatal Error: 0x000B0029
18,109,810 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
2,024,627 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,867,426 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,026,734 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,170,848 UART:
2,171,251 UART: Running Caliptra ROM ...
2,172,326 UART:
2,172,474 UART: [state] CFI Enabled
2,173,442 UART: [state] LifecycleState = Unprovisioned
2,175,083 UART: [state] DebugLocked = No
2,176,193 UART: [state] WD Timer not started. Device not locked for debugging
2,178,659 UART: [kat] SHA2-256
2,179,321 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,322 UART: [kat] ++
2,182,769 UART: [kat] sha1
2,183,275 UART: [kat] SHA2-256
2,184,004 UART: [kat] SHA2-384
2,184,688 UART: [kat] SHA2-512-ACC
2,185,519 UART: [kat] ECC-384
4,094,603 UART: [kat] HMAC-384Kdf
4,107,335 UART: [kat] LMS
5,180,465 UART: [kat] --
5,184,845 UART: [cold-reset] ++
5,186,947 UART: [fht] FHT @ 0x50003400
5,199,223 UART: [idev] ++
5,199,948 UART: [idev] CDI.KEYID = 6
5,201,121 UART: [idev] SUBJECT.KEYID = 7
5,202,601 UART: [idev] UDS.KEYID = 0
5,219,548 UART: [idev] Erasing UDS.KEYID = 0
8,493,652 UART: [idev] Sha1 KeyId Algorithm
8,514,810 UART: [idev] --
8,518,327 UART: [ldev] ++
8,518,893 UART: [ldev] CDI.KEYID = 6
8,520,152 UART: [ldev] SUBJECT.KEYID = 5
8,521,637 UART: [ldev] AUTHORITY.KEYID = 7
8,523,156 UART: [ldev] FE.KEYID = 1
8,534,454 UART: [ldev] Erasing FE.KEYID = 1
11,827,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,888 UART: [ldev] --
14,194,372 UART: [fwproc] Wait for Commands...
14,196,734 UART: [fwproc] Recv command 0x46574c44
14,199,051 UART: [fwproc] Recv'd Img size: 114124 bytes
18,274,196 UART: ROM Fatal Error: 0x000B0029
18,277,620 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
2,022,087 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,078,910 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
2,023,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,168,213 UART:
2,168,620 UART: Running Caliptra ROM ...
2,169,708 UART:
2,169,866 UART: [state] CFI Enabled
2,170,844 UART: [state] LifecycleState = Unprovisioned
2,172,512 UART: [state] DebugLocked = No
2,173,539 UART: [state] WD Timer not started. Device not locked for debugging
2,176,020 UART: [kat] SHA2-256
2,176,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,697 UART: [kat] ++
2,180,149 UART: [kat] sha1
2,180,663 UART: [kat] SHA2-256
2,181,409 UART: [kat] SHA2-384
2,182,111 UART: [kat] SHA2-512-ACC
2,182,909 UART: [kat] ECC-384
2,924,007 UART: [kat] HMAC-384Kdf
2,949,922 UART: [kat] LMS
3,479,358 UART: [kat] --
3,482,833 UART: [cold-reset] ++
3,484,608 UART: [fht] FHT @ 0x50003400
3,495,109 UART: [idev] ++
3,495,667 UART: [idev] CDI.KEYID = 6
3,496,713 UART: [idev] SUBJECT.KEYID = 7
3,497,832 UART: [idev] UDS.KEYID = 0
3,522,295 UART: [idev] Erasing UDS.KEYID = 0
6,005,795 UART: [idev] Sha1 KeyId Algorithm
6,028,378 UART: [idev] --
6,033,190 UART: [ldev] ++
6,033,763 UART: [ldev] CDI.KEYID = 6
6,034,651 UART: [ldev] SUBJECT.KEYID = 5
6,035,869 UART: [ldev] AUTHORITY.KEYID = 7
6,037,127 UART: [ldev] FE.KEYID = 1
6,077,568 UART: [ldev] Erasing FE.KEYID = 1
8,580,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,040 UART: [ldev] --
10,387,812 UART: [fwproc] Wait for Commands...
10,389,760 UART: [fwproc] Recv command 0x46574c44
10,391,805 UART: [fwproc] Recv'd Img size: 114448 bytes
13,791,017 UART: ROM Fatal Error: 0x000B0029
13,794,157 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
2,024,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,594,633 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
2,022,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,168 UART:
2,167,563 UART: Running Caliptra ROM ...
2,168,745 UART:
2,168,919 UART: [state] CFI Enabled
2,169,881 UART: [state] LifecycleState = Unprovisioned
2,171,531 UART: [state] DebugLocked = No
2,172,631 UART: [state] WD Timer not started. Device not locked for debugging
2,175,103 UART: [kat] SHA2-256
2,175,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,778 UART: [kat] ++
2,179,229 UART: [kat] sha1
2,179,740 UART: [kat] SHA2-256
2,180,475 UART: [kat] SHA2-384
2,181,138 UART: [kat] SHA2-512-ACC
2,182,019 UART: [kat] ECC-384
3,278,273 UART: [kat] HMAC-384Kdf
3,290,290 UART: [kat] LMS
3,819,774 UART: [kat] --
3,824,803 UART: [cold-reset] ++
3,826,874 UART: [fht] FHT @ 0x50003400
3,837,263 UART: [idev] ++
3,837,834 UART: [idev] CDI.KEYID = 6
3,838,762 UART: [idev] SUBJECT.KEYID = 7
3,839,919 UART: [idev] UDS.KEYID = 0
3,855,782 UART: [idev] Erasing UDS.KEYID = 0
6,313,366 UART: [idev] Sha1 KeyId Algorithm
6,335,400 UART: [idev] --
6,340,573 UART: [ldev] ++
6,341,136 UART: [ldev] CDI.KEYID = 6
6,342,015 UART: [ldev] SUBJECT.KEYID = 5
6,343,229 UART: [ldev] AUTHORITY.KEYID = 7
6,344,458 UART: [ldev] FE.KEYID = 1
6,355,781 UART: [ldev] Erasing FE.KEYID = 1
8,829,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,618 UART: [ldev] --
10,620,365 UART: [fwproc] Wait for Commands...
10,622,850 UART: [fwproc] Recv command 0x46574c44
10,624,938 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,173 UART: ROM Fatal Error: 0x000B0029
14,027,305 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,967 writing to cptra_bootfsm_go
2,022,416 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,822,847 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,023,161 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,628,183 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
2,021,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,810,150 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
900,155 UART: [kat] SHA2-256
902,095 UART: [kat] SHA2-384
904,826 UART: [kat] SHA2-512-ACC
906,727 UART: [kat] ECC-384
916,320 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,169,879 UART: [cold-reset] ++
1,170,345 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,199,105 UART: [idev] Sha1 KeyId Algorithm
1,207,997 UART: [idev] --
1,209,064 UART: [ldev] ++
1,209,232 UART: [ldev] CDI.KEYID = 6
1,209,596 UART: [ldev] SUBJECT.KEYID = 5
1,210,023 UART: [ldev] AUTHORITY.KEYID = 7
1,210,486 UART: [ldev] FE.KEYID = 1
1,215,648 UART: [ldev] Erasing FE.KEYID = 1
1,241,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,362 UART: [ldev] --
1,281,878 UART: [fwproc] Wait for Commands...
1,282,469 UART: [fwproc] Recv command 0x46574c44
1,283,202 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,205 UART: ROM Fatal Error: 0x000B0029
2,582,362 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,263 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] --
1,209,231 UART: [ldev] ++
1,209,399 UART: [ldev] CDI.KEYID = 6
1,209,763 UART: [ldev] SUBJECT.KEYID = 5
1,210,190 UART: [ldev] AUTHORITY.KEYID = 7
1,210,653 UART: [ldev] FE.KEYID = 1
1,215,977 UART: [ldev] Erasing FE.KEYID = 1
1,242,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,745 UART: [ldev] --
1,282,227 UART: [fwproc] Wait for Commands...
1,282,910 UART: [fwproc] Recv command 0x46574c44
1,283,643 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,920 UART: ROM Fatal Error: 0x000B0029
2,583,077 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,158 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
85,989 UART: [state] WD Timer not started. Device not locked for debugging
87,110 UART: [kat] SHA2-256
890,660 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,789 UART: [kat] ++
894,941 UART: [kat] sha1
899,177 UART: [kat] SHA2-256
901,117 UART: [kat] SHA2-384
903,888 UART: [kat] SHA2-512-ACC
905,789 UART: [kat] ECC-384
915,454 UART: [kat] HMAC-384Kdf
920,008 UART: [kat] LMS
1,168,320 UART: [kat] --
1,169,167 UART: [cold-reset] ++
1,169,513 UART: [fht] FHT @ 0x50003400
1,172,053 UART: [idev] ++
1,172,221 UART: [idev] CDI.KEYID = 6
1,172,582 UART: [idev] SUBJECT.KEYID = 7
1,173,007 UART: [idev] UDS.KEYID = 0
1,180,539 UART: [idev] Erasing UDS.KEYID = 0
1,197,417 UART: [idev] Sha1 KeyId Algorithm
1,206,453 UART: [idev] --
1,207,534 UART: [ldev] ++
1,207,702 UART: [ldev] CDI.KEYID = 6
1,208,066 UART: [ldev] SUBJECT.KEYID = 5
1,208,493 UART: [ldev] AUTHORITY.KEYID = 7
1,208,956 UART: [ldev] FE.KEYID = 1
1,214,182 UART: [ldev] Erasing FE.KEYID = 1
1,240,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,804 UART: [ldev] --
1,280,234 UART: [fwproc] Wait for Commands...
1,280,929 UART: [fwproc] Recv command 0x46574c44
1,281,662 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,019 UART: ROM Fatal Error: 0x000B0029
2,581,176 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,159 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,502 UART: [kat] ++
895,654 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
916,181 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,182,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,200 UART: [idev] Sha1 KeyId Algorithm
1,207,980 UART: [idev] --
1,209,077 UART: [ldev] ++
1,209,245 UART: [ldev] CDI.KEYID = 6
1,209,609 UART: [ldev] SUBJECT.KEYID = 5
1,210,036 UART: [ldev] AUTHORITY.KEYID = 7
1,210,499 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,242,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,591 UART: [ldev] --
1,281,939 UART: [fwproc] Wait for Commands...
1,282,618 UART: [fwproc] Recv command 0x46574c44
1,283,351 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,162 UART: ROM Fatal Error: 0x000B0029
2,582,319 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,980 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,272 UART: [kat] SHA2-256
890,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,951 UART: [kat] ++
895,103 UART: [kat] sha1
899,187 UART: [kat] SHA2-256
901,127 UART: [kat] SHA2-384
903,698 UART: [kat] SHA2-512-ACC
905,599 UART: [kat] ECC-384
915,022 UART: [kat] HMAC-384Kdf
919,534 UART: [kat] LMS
1,167,846 UART: [kat] --
1,168,529 UART: [cold-reset] ++
1,168,857 UART: [fht] FHT @ 0x50003400
1,171,437 UART: [idev] ++
1,171,605 UART: [idev] CDI.KEYID = 6
1,171,966 UART: [idev] SUBJECT.KEYID = 7
1,172,391 UART: [idev] UDS.KEYID = 0
1,180,261 UART: [idev] Erasing UDS.KEYID = 0
1,197,169 UART: [idev] Sha1 KeyId Algorithm
1,205,845 UART: [idev] --
1,206,768 UART: [ldev] ++
1,206,936 UART: [ldev] CDI.KEYID = 6
1,207,300 UART: [ldev] SUBJECT.KEYID = 5
1,207,727 UART: [ldev] AUTHORITY.KEYID = 7
1,208,190 UART: [ldev] FE.KEYID = 1
1,213,176 UART: [ldev] Erasing FE.KEYID = 1
1,239,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,676 UART: [ldev] --
1,279,120 UART: [fwproc] Wait for Commands...
1,279,793 UART: [fwproc] Recv command 0x46574c44
1,280,526 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,829 UART: ROM Fatal Error: 0x000B0029
2,579,986 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,069 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,350 UART: [cold-reset] ++
1,170,814 UART: [fht] FHT @ 0x50003400
1,173,430 UART: [idev] ++
1,173,598 UART: [idev] CDI.KEYID = 6
1,173,959 UART: [idev] SUBJECT.KEYID = 7
1,174,384 UART: [idev] UDS.KEYID = 0
1,182,746 UART: [idev] Erasing UDS.KEYID = 0
1,200,088 UART: [idev] Sha1 KeyId Algorithm
1,208,998 UART: [idev] --
1,210,061 UART: [ldev] ++
1,210,229 UART: [ldev] CDI.KEYID = 6
1,210,593 UART: [ldev] SUBJECT.KEYID = 5
1,211,020 UART: [ldev] AUTHORITY.KEYID = 7
1,211,483 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,243,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,029 UART: [ldev] --
1,282,405 UART: [fwproc] Wait for Commands...
1,283,196 UART: [fwproc] Recv command 0x46574c44
1,283,929 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,066 UART: ROM Fatal Error: 0x000B0029
2,582,223 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,456 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
2,025,030 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,169,490 UART:
2,169,910 UART: Running Caliptra ROM ...
2,171,083 UART:
2,171,263 UART: [state] CFI Enabled
2,172,243 UART: [state] LifecycleState = Unprovisioned
2,173,891 UART: [state] DebugLocked = No
2,174,914 UART: [state] WD Timer not started. Device not locked for debugging
2,177,380 UART: [kat] SHA2-256
2,178,050 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,069 UART: [kat] ++
2,181,518 UART: [kat] sha1
2,182,027 UART: [kat] SHA2-256
2,182,690 UART: [kat] SHA2-384
2,183,350 UART: [kat] SHA2-512-ACC
2,184,241 UART: [kat] ECC-384
3,777,665 UART: [kat] HMAC-384Kdf
3,802,708 UART: [kat] LMS
4,875,876 UART: [kat] --
4,880,576 UART: [cold-reset] ++
4,881,708 UART: [fht] FHT @ 0x50003400
4,892,205 UART: [idev] ++
4,892,890 UART: [idev] CDI.KEYID = 6
4,894,125 UART: [idev] SUBJECT.KEYID = 7
4,895,284 UART: [idev] UDS.KEYID = 0
4,930,663 UART: [idev] Erasing UDS.KEYID = 0
8,245,007 UART: [idev] Sha1 KeyId Algorithm
8,267,015 UART: [idev] --
8,271,012 UART: [ldev] ++
8,271,577 UART: [ldev] CDI.KEYID = 6
8,272,742 UART: [ldev] SUBJECT.KEYID = 5
8,273,956 UART: [ldev] AUTHORITY.KEYID = 7
8,275,111 UART: [ldev] FE.KEYID = 1
8,318,198 UART: [ldev] Erasing FE.KEYID = 1
11,651,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,783 UART: [ldev] --
14,038,079 UART: [fwproc] Wait for Commands...
14,040,348 UART: [fwproc] Recv command 0x46574c44
14,042,623 UART: [fwproc] Recv'd Img size: 114124 bytes
18,115,270 UART: ROM Fatal Error: 0x000B0028
18,118,684 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,023,673 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,900,427 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,026,291 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,170,695 UART:
2,171,103 UART: Running Caliptra ROM ...
2,172,275 UART:
2,172,445 UART: [state] CFI Enabled
2,173,414 UART: [state] LifecycleState = Unprovisioned
2,175,053 UART: [state] DebugLocked = No
2,176,162 UART: [state] WD Timer not started. Device not locked for debugging
2,178,627 UART: [kat] SHA2-256
2,179,290 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,293 UART: [kat] ++
2,182,735 UART: [kat] sha1
2,183,238 UART: [kat] SHA2-256
2,183,969 UART: [kat] SHA2-384
2,184,632 UART: [kat] SHA2-512-ACC
2,185,523 UART: [kat] ECC-384
4,098,978 UART: [kat] HMAC-384Kdf
4,109,511 UART: [kat] LMS
5,182,622 UART: [kat] --
5,185,727 UART: [cold-reset] ++
5,187,504 UART: [fht] FHT @ 0x50003400
5,198,745 UART: [idev] ++
5,199,471 UART: [idev] CDI.KEYID = 6
5,200,579 UART: [idev] SUBJECT.KEYID = 7
5,202,121 UART: [idev] UDS.KEYID = 0
5,219,096 UART: [idev] Erasing UDS.KEYID = 0
8,487,847 UART: [idev] Sha1 KeyId Algorithm
8,508,915 UART: [idev] --
8,511,815 UART: [ldev] ++
8,512,434 UART: [ldev] CDI.KEYID = 6
8,513,610 UART: [ldev] SUBJECT.KEYID = 5
8,515,125 UART: [ldev] AUTHORITY.KEYID = 7
8,516,633 UART: [ldev] FE.KEYID = 1
8,529,580 UART: [ldev] Erasing FE.KEYID = 1
11,825,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,527 UART: [ldev] --
14,190,546 UART: [fwproc] Wait for Commands...
14,192,692 UART: [fwproc] Recv command 0x46574c44
14,195,006 UART: [fwproc] Recv'd Img size: 114124 bytes
18,263,704 UART: ROM Fatal Error: 0x000B0028
18,267,173 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
2,025,416 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,092,567 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
2,025,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,315 UART:
2,170,728 UART: Running Caliptra ROM ...
2,171,810 UART:
2,171,963 UART: [state] CFI Enabled
2,172,940 UART: [state] LifecycleState = Unprovisioned
2,174,585 UART: [state] DebugLocked = No
2,175,611 UART: [state] WD Timer not started. Device not locked for debugging
2,178,086 UART: [kat] SHA2-256
2,178,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,763 UART: [kat] ++
2,182,211 UART: [kat] sha1
2,182,723 UART: [kat] SHA2-256
2,183,379 UART: [kat] SHA2-384
2,184,056 UART: [kat] SHA2-512-ACC
2,184,909 UART: [kat] ECC-384
2,945,414 UART: [kat] HMAC-384Kdf
2,971,308 UART: [kat] LMS
3,500,762 UART: [kat] --
3,505,028 UART: [cold-reset] ++
3,506,902 UART: [fht] FHT @ 0x50003400
3,519,336 UART: [idev] ++
3,519,908 UART: [idev] CDI.KEYID = 6
3,520,787 UART: [idev] SUBJECT.KEYID = 7
3,522,004 UART: [idev] UDS.KEYID = 0
3,544,092 UART: [idev] Erasing UDS.KEYID = 0
6,026,416 UART: [idev] Sha1 KeyId Algorithm
6,050,218 UART: [idev] --
6,053,925 UART: [ldev] ++
6,054,510 UART: [ldev] CDI.KEYID = 6
6,055,421 UART: [ldev] SUBJECT.KEYID = 5
6,056,591 UART: [ldev] AUTHORITY.KEYID = 7
6,057,828 UART: [ldev] FE.KEYID = 1
6,099,393 UART: [ldev] Erasing FE.KEYID = 1
8,603,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,326 UART: [ldev] --
10,414,297 UART: [fwproc] Wait for Commands...
10,416,247 UART: [fwproc] Recv command 0x46574c44
10,418,349 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,500 UART: ROM Fatal Error: 0x000B0028
13,823,642 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,039,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,612,156 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,025,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,090 UART:
2,170,479 UART: Running Caliptra ROM ...
2,171,564 UART:
2,171,717 UART: [state] CFI Enabled
2,172,677 UART: [state] LifecycleState = Unprovisioned
2,174,342 UART: [state] DebugLocked = No
2,175,369 UART: [state] WD Timer not started. Device not locked for debugging
2,177,840 UART: [kat] SHA2-256
2,178,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,509 UART: [kat] ++
2,181,953 UART: [kat] sha1
2,182,462 UART: [kat] SHA2-256
2,183,114 UART: [kat] SHA2-384
2,183,770 UART: [kat] SHA2-512-ACC
2,184,569 UART: [kat] ECC-384
3,277,295 UART: [kat] HMAC-384Kdf
3,289,959 UART: [kat] LMS
3,819,497 UART: [kat] --
3,823,540 UART: [cold-reset] ++
3,824,549 UART: [fht] FHT @ 0x50003400
3,835,522 UART: [idev] ++
3,836,101 UART: [idev] CDI.KEYID = 6
3,836,982 UART: [idev] SUBJECT.KEYID = 7
3,838,191 UART: [idev] UDS.KEYID = 0
3,853,628 UART: [idev] Erasing UDS.KEYID = 0
6,305,287 UART: [idev] Sha1 KeyId Algorithm
6,329,318 UART: [idev] --
6,332,611 UART: [ldev] ++
6,333,177 UART: [ldev] CDI.KEYID = 6
6,334,059 UART: [ldev] SUBJECT.KEYID = 5
6,335,271 UART: [ldev] AUTHORITY.KEYID = 7
6,336,500 UART: [ldev] FE.KEYID = 1
6,349,750 UART: [ldev] Erasing FE.KEYID = 1
8,820,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,534,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,550,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,566,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,582,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,602,774 UART: [ldev] --
10,607,250 UART: [fwproc] Wait for Commands...
10,610,001 UART: [fwproc] Recv command 0x46574c44
10,612,106 UART: [fwproc] Recv'd Img size: 114448 bytes
14,008,899 UART: ROM Fatal Error: 0x000B0028
14,012,045 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
2,026,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,818,551 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,025,705 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,630,936 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
2,024,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,811,340 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
85,987 UART: [state] WD Timer not started. Device not locked for debugging
87,266 UART: [kat] SHA2-256
890,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,945 UART: [kat] ++
895,097 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,118 UART: [kat] SHA2-512-ACC
906,019 UART: [kat] ECC-384
915,690 UART: [kat] HMAC-384Kdf
920,068 UART: [kat] LMS
1,168,380 UART: [kat] --
1,169,385 UART: [cold-reset] ++
1,169,743 UART: [fht] FHT @ 0x50003400
1,172,491 UART: [idev] ++
1,172,659 UART: [idev] CDI.KEYID = 6
1,173,020 UART: [idev] SUBJECT.KEYID = 7
1,173,445 UART: [idev] UDS.KEYID = 0
1,181,185 UART: [idev] Erasing UDS.KEYID = 0
1,198,787 UART: [idev] Sha1 KeyId Algorithm
1,207,627 UART: [idev] --
1,208,686 UART: [ldev] ++
1,208,854 UART: [ldev] CDI.KEYID = 6
1,209,218 UART: [ldev] SUBJECT.KEYID = 5
1,209,645 UART: [ldev] AUTHORITY.KEYID = 7
1,210,108 UART: [ldev] FE.KEYID = 1
1,215,478 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,568 UART: [ldev] --
1,280,848 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,251 UART: ROM Fatal Error: 0x000B0028
2,581,408 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,485 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,605 UART: [kat] HMAC-384Kdf
921,245 UART: [kat] LMS
1,169,557 UART: [kat] --
1,170,340 UART: [cold-reset] ++
1,170,722 UART: [fht] FHT @ 0x50003400
1,173,368 UART: [idev] ++
1,173,536 UART: [idev] CDI.KEYID = 6
1,173,897 UART: [idev] SUBJECT.KEYID = 7
1,174,322 UART: [idev] UDS.KEYID = 0
1,182,042 UART: [idev] Erasing UDS.KEYID = 0
1,199,282 UART: [idev] Sha1 KeyId Algorithm
1,207,964 UART: [idev] --
1,209,011 UART: [ldev] ++
1,209,179 UART: [ldev] CDI.KEYID = 6
1,209,543 UART: [ldev] SUBJECT.KEYID = 5
1,209,970 UART: [ldev] AUTHORITY.KEYID = 7
1,210,433 UART: [ldev] FE.KEYID = 1
1,215,725 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,209 UART: [ldev] --
1,281,603 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46574c44
1,283,111 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,176 UART: ROM Fatal Error: 0x000B0028
2,582,333 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,550 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
88,070 UART: [kat] SHA2-256
891,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,410 UART: [kat] LMS
1,168,722 UART: [kat] --
1,169,385 UART: [cold-reset] ++
1,169,915 UART: [fht] FHT @ 0x50003400
1,172,461 UART: [idev] ++
1,172,629 UART: [idev] CDI.KEYID = 6
1,172,990 UART: [idev] SUBJECT.KEYID = 7
1,173,415 UART: [idev] UDS.KEYID = 0
1,181,217 UART: [idev] Erasing UDS.KEYID = 0
1,198,489 UART: [idev] Sha1 KeyId Algorithm
1,207,303 UART: [idev] --
1,208,316 UART: [ldev] ++
1,208,484 UART: [ldev] CDI.KEYID = 6
1,208,848 UART: [ldev] SUBJECT.KEYID = 5
1,209,275 UART: [ldev] AUTHORITY.KEYID = 7
1,209,738 UART: [ldev] FE.KEYID = 1
1,214,692 UART: [ldev] Erasing FE.KEYID = 1
1,241,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,962 UART: [ldev] --
1,280,370 UART: [fwproc] Wait for Commands...
1,281,131 UART: [fwproc] Recv command 0x46574c44
1,281,864 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,303 UART: ROM Fatal Error: 0x000B0028
2,579,460 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,359 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,761 UART: [kat] HMAC-384Kdf
921,455 UART: [kat] LMS
1,169,767 UART: [kat] --
1,170,470 UART: [cold-reset] ++
1,170,854 UART: [fht] FHT @ 0x50003400
1,173,640 UART: [idev] ++
1,173,808 UART: [idev] CDI.KEYID = 6
1,174,169 UART: [idev] SUBJECT.KEYID = 7
1,174,594 UART: [idev] UDS.KEYID = 0
1,183,048 UART: [idev] Erasing UDS.KEYID = 0
1,200,548 UART: [idev] Sha1 KeyId Algorithm
1,209,628 UART: [idev] --
1,210,701 UART: [ldev] ++
1,210,869 UART: [ldev] CDI.KEYID = 6
1,211,233 UART: [ldev] SUBJECT.KEYID = 5
1,211,660 UART: [ldev] AUTHORITY.KEYID = 7
1,212,123 UART: [ldev] FE.KEYID = 1
1,217,369 UART: [ldev] Erasing FE.KEYID = 1
1,243,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,851 UART: [ldev] --
1,283,167 UART: [fwproc] Wait for Commands...
1,283,928 UART: [fwproc] Recv command 0x46574c44
1,284,661 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,594 UART: ROM Fatal Error: 0x000B0028
2,583,751 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,808 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,758 UART: [kat] LMS
1,169,070 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,183 UART: [idev] ++
1,173,351 UART: [idev] CDI.KEYID = 6
1,173,712 UART: [idev] SUBJECT.KEYID = 7
1,174,137 UART: [idev] UDS.KEYID = 0
1,181,637 UART: [idev] Erasing UDS.KEYID = 0
1,198,559 UART: [idev] Sha1 KeyId Algorithm
1,207,443 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,278 UART: [ldev] Erasing FE.KEYID = 1
1,241,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,360 UART: [ldev] --
1,280,660 UART: [fwproc] Wait for Commands...
1,281,277 UART: [fwproc] Recv command 0x46574c44
1,282,010 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,563 UART: ROM Fatal Error: 0x000B0028
2,581,720 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,619 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,128 UART: [kat] SHA2-256
902,068 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,322 UART: [fht] FHT @ 0x50003400
1,172,864 UART: [idev] ++
1,173,032 UART: [idev] CDI.KEYID = 6
1,173,393 UART: [idev] SUBJECT.KEYID = 7
1,173,818 UART: [idev] UDS.KEYID = 0
1,181,914 UART: [idev] Erasing UDS.KEYID = 0
1,199,508 UART: [idev] Sha1 KeyId Algorithm
1,208,510 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,843 UART: [ldev] --
1,281,161 UART: [fwproc] Wait for Commands...
1,281,920 UART: [fwproc] Recv command 0x46574c44
1,282,653 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,548 UART: ROM Fatal Error: 0x000B0028
2,582,705 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,450 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
5,490 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,106 UART:
192,506 UART: Running Caliptra ROM ...
193,642 UART:
193,790 UART: [state] CFI Enabled
264,464 UART: [state] LifecycleState = Manufacturing
266,542 UART: [state] DebugLocked = No
267,815 UART: [state] WD Timer not started. Device not locked for debugging
272,154 UART: [kat] SHA2-256
454,089 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,573 UART: [kat] ++
466,105 UART: [kat] sha1
477,550 UART: [kat] SHA2-256
480,559 UART: [kat] SHA2-384
484,964 UART: [kat] SHA2-512-ACC
487,581 UART: [kat] ECC-384
3,777,940 UART: [kat] HMAC-384Kdf
3,802,716 UART: [kat] LMS
4,875,857 UART: [kat] --
4,880,874 UART: [cold-reset] ++
4,883,132 UART: [fht] FHT @ 0x50003400
4,894,969 UART: [idev] ++
4,895,701 UART: [idev] CDI.KEYID = 6
4,896,887 UART: [idev] SUBJECT.KEYID = 7
4,898,049 UART: [idev] UDS.KEYID = 0
4,930,184 UART: [idev] Erasing UDS.KEYID = 0
8,240,009 UART: [idev] Sha1 KeyId Algorithm
8,262,115 UART: [idev] --
8,266,785 UART: [ldev] ++
8,267,364 UART: [ldev] CDI.KEYID = 6
8,268,603 UART: [ldev] SUBJECT.KEYID = 5
8,269,764 UART: [ldev] AUTHORITY.KEYID = 7
8,270,992 UART: [ldev] FE.KEYID = 1
8,317,020 UART: [ldev] Erasing FE.KEYID = 1
11,657,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,424 UART: [ldev] --
14,036,315 UART: [fwproc] Wait for Commands...
14,038,037 UART: [fwproc] Recv command 0x46574c44
14,040,360 UART: [fwproc] Recv'd Img size: 114124 bytes
18,141,188 UART: ROM Fatal Error: 0x000B002C
18,144,563 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
5,437 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,926,092 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
6,292 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,486 UART:
192,868 UART: Running Caliptra ROM ...
194,043 UART:
603,639 UART: [state] CFI Enabled
615,927 UART: [state] LifecycleState = Manufacturing
618,313 UART: [state] DebugLocked = No
620,418 UART: [state] WD Timer not started. Device not locked for debugging
624,284 UART: [kat] SHA2-256
806,265 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,809 UART: [kat] ++
818,307 UART: [kat] sha1
828,206 UART: [kat] SHA2-256
831,215 UART: [kat] SHA2-384
836,916 UART: [kat] SHA2-512-ACC
839,576 UART: [kat] ECC-384
4,093,750 UART: [kat] HMAC-384Kdf
4,105,312 UART: [kat] LMS
5,178,497 UART: [kat] --
5,182,249 UART: [cold-reset] ++
5,183,920 UART: [fht] FHT @ 0x50003400
5,195,114 UART: [idev] ++
5,195,779 UART: [idev] CDI.KEYID = 6
5,196,932 UART: [idev] SUBJECT.KEYID = 7
5,198,482 UART: [idev] UDS.KEYID = 0
5,215,305 UART: [idev] Erasing UDS.KEYID = 0
8,487,259 UART: [idev] Sha1 KeyId Algorithm
8,509,399 UART: [idev] --
8,513,876 UART: [ldev] ++
8,514,441 UART: [ldev] CDI.KEYID = 6
8,515,674 UART: [ldev] SUBJECT.KEYID = 5
8,517,102 UART: [ldev] AUTHORITY.KEYID = 7
8,518,653 UART: [ldev] FE.KEYID = 1
8,529,944 UART: [ldev] Erasing FE.KEYID = 1
11,817,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,108,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,124,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,140,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,156,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,177,618 UART: [ldev] --
14,181,990 UART: [fwproc] Wait for Commands...
14,184,188 UART: [fwproc] Recv command 0x46574c44
14,186,496 UART: [fwproc] Recv'd Img size: 114124 bytes
18,293,412 UART: ROM Fatal Error: 0x000B002C
18,296,816 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
7,360 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,113,192 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
5,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,168 UART:
192,538 UART: Running Caliptra ROM ...
193,707 UART:
193,858 UART: [state] CFI Enabled
265,789 UART: [state] LifecycleState = Manufacturing
267,710 UART: [state] DebugLocked = No
269,149 UART: [state] WD Timer not started. Device not locked for debugging
272,500 UART: [kat] SHA2-256
451,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,216 UART: [kat] ++
463,682 UART: [kat] sha1
475,406 UART: [kat] SHA2-256
478,410 UART: [kat] SHA2-384
484,123 UART: [kat] SHA2-512-ACC
487,060 UART: [kat] ECC-384
2,950,145 UART: [kat] HMAC-384Kdf
2,972,375 UART: [kat] LMS
3,501,827 UART: [kat] --
3,505,637 UART: [cold-reset] ++
3,506,641 UART: [fht] FHT @ 0x50003400
3,518,112 UART: [idev] ++
3,518,677 UART: [idev] CDI.KEYID = 6
3,519,690 UART: [idev] SUBJECT.KEYID = 7
3,520,792 UART: [idev] UDS.KEYID = 0
3,543,783 UART: [idev] Erasing UDS.KEYID = 0
6,027,930 UART: [idev] Sha1 KeyId Algorithm
6,050,368 UART: [idev] --
6,054,961 UART: [ldev] ++
6,055,534 UART: [ldev] CDI.KEYID = 6
6,056,449 UART: [ldev] SUBJECT.KEYID = 5
6,057,666 UART: [ldev] AUTHORITY.KEYID = 7
6,058,907 UART: [ldev] FE.KEYID = 1
6,099,997 UART: [ldev] Erasing FE.KEYID = 1
8,604,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,501 UART: [ldev] --
10,412,962 UART: [fwproc] Wait for Commands...
10,415,764 UART: [fwproc] Recv command 0x46574c44
10,417,802 UART: [fwproc] Recv'd Img size: 114448 bytes
13,855,338 UART: ROM Fatal Error: 0x000B002C
13,858,462 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
5,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,624,990 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,517 writing to cptra_bootfsm_go
6,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,672 UART:
193,068 UART: Running Caliptra ROM ...
194,186 UART:
603,888 UART: [state] CFI Enabled
614,973 UART: [state] LifecycleState = Manufacturing
616,819 UART: [state] DebugLocked = No
619,387 UART: [state] WD Timer not started. Device not locked for debugging
622,252 UART: [kat] SHA2-256
801,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,928 UART: [kat] ++
813,452 UART: [kat] sha1
824,107 UART: [kat] SHA2-256
827,107 UART: [kat] SHA2-384
833,841 UART: [kat] SHA2-512-ACC
836,764 UART: [kat] ECC-384
3,279,730 UART: [kat] HMAC-384Kdf
3,293,157 UART: [kat] LMS
3,822,648 UART: [kat] --
3,829,012 UART: [cold-reset] ++
3,830,675 UART: [fht] FHT @ 0x50003400
3,840,462 UART: [idev] ++
3,841,018 UART: [idev] CDI.KEYID = 6
3,841,901 UART: [idev] SUBJECT.KEYID = 7
3,843,186 UART: [idev] UDS.KEYID = 0
3,860,595 UART: [idev] Erasing UDS.KEYID = 0
6,314,548 UART: [idev] Sha1 KeyId Algorithm
6,337,346 UART: [idev] --
6,341,231 UART: [ldev] ++
6,341,796 UART: [ldev] CDI.KEYID = 6
6,342,735 UART: [ldev] SUBJECT.KEYID = 5
6,343,944 UART: [ldev] AUTHORITY.KEYID = 7
6,345,172 UART: [ldev] FE.KEYID = 1
6,355,473 UART: [ldev] Erasing FE.KEYID = 1
8,828,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,172 UART: [ldev] --
10,621,087 UART: [fwproc] Wait for Commands...
10,624,060 UART: [fwproc] Recv command 0x46574c44
10,626,155 UART: [fwproc] Recv'd Img size: 114448 bytes
14,053,714 UART: ROM Fatal Error: 0x000B002C
14,056,839 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
6,393 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,848,682 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
5,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,620,792 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
6,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,860,434 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Manufacturing
85,515 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,342 UART: [kat] SHA2-256
890,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,021 UART: [kat] ++
895,173 UART: [kat] sha1
899,233 UART: [kat] SHA2-256
901,173 UART: [kat] SHA2-384
903,864 UART: [kat] SHA2-512-ACC
905,765 UART: [kat] ECC-384
915,444 UART: [kat] HMAC-384Kdf
920,020 UART: [kat] LMS
1,168,332 UART: [kat] --
1,169,141 UART: [cold-reset] ++
1,169,481 UART: [fht] FHT @ 0x50003400
1,172,201 UART: [idev] ++
1,172,369 UART: [idev] CDI.KEYID = 6
1,172,730 UART: [idev] SUBJECT.KEYID = 7
1,173,155 UART: [idev] UDS.KEYID = 0
1,180,769 UART: [idev] Erasing UDS.KEYID = 0
1,197,915 UART: [idev] Sha1 KeyId Algorithm
1,206,693 UART: [idev] --
1,207,576 UART: [ldev] ++
1,207,744 UART: [ldev] CDI.KEYID = 6
1,208,108 UART: [ldev] SUBJECT.KEYID = 5
1,208,535 UART: [ldev] AUTHORITY.KEYID = 7
1,208,998 UART: [ldev] FE.KEYID = 1
1,214,246 UART: [ldev] Erasing FE.KEYID = 1
1,240,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,558 UART: [ldev] --
1,279,960 UART: [fwproc] Wait for Commands...
1,280,565 UART: [fwproc] Recv command 0x46574c44
1,281,298 UART: [fwproc] Recv'd Img size: 114448 bytes
2,603,176 UART: ROM Fatal Error: 0x000B002C
2,604,335 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,459,868 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Manufacturing
86,400 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
891,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,838 UART: [kat] ++
895,990 UART: [kat] sha1
900,430 UART: [kat] SHA2-256
902,370 UART: [kat] SHA2-384
905,113 UART: [kat] SHA2-512-ACC
907,014 UART: [kat] ECC-384
917,115 UART: [kat] HMAC-384Kdf
921,593 UART: [kat] LMS
1,169,905 UART: [kat] --
1,170,692 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,173,882 UART: [idev] ++
1,174,050 UART: [idev] CDI.KEYID = 6
1,174,411 UART: [idev] SUBJECT.KEYID = 7
1,174,836 UART: [idev] UDS.KEYID = 0
1,183,042 UART: [idev] Erasing UDS.KEYID = 0
1,200,670 UART: [idev] Sha1 KeyId Algorithm
1,209,448 UART: [idev] --
1,210,399 UART: [ldev] ++
1,210,567 UART: [ldev] CDI.KEYID = 6
1,210,931 UART: [ldev] SUBJECT.KEYID = 5
1,211,358 UART: [ldev] AUTHORITY.KEYID = 7
1,211,821 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,687 UART: [ldev] --
1,282,955 UART: [fwproc] Wait for Commands...
1,283,652 UART: [fwproc] Recv command 0x46574c44
1,284,385 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,747 UART: ROM Fatal Error: 0x000B002C
2,608,906 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,461,343 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Manufacturing
85,415 UART: [state] DebugLocked = No
86,005 UART: [state] WD Timer not started. Device not locked for debugging
87,138 UART: [kat] SHA2-256
890,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,817 UART: [kat] ++
894,969 UART: [kat] sha1
899,077 UART: [kat] SHA2-256
901,017 UART: [kat] SHA2-384
903,880 UART: [kat] SHA2-512-ACC
905,781 UART: [kat] ECC-384
915,632 UART: [kat] HMAC-384Kdf
920,182 UART: [kat] LMS
1,168,494 UART: [kat] --
1,169,355 UART: [cold-reset] ++
1,169,747 UART: [fht] FHT @ 0x50003400
1,172,241 UART: [idev] ++
1,172,409 UART: [idev] CDI.KEYID = 6
1,172,770 UART: [idev] SUBJECT.KEYID = 7
1,173,195 UART: [idev] UDS.KEYID = 0
1,181,071 UART: [idev] Erasing UDS.KEYID = 0
1,198,467 UART: [idev] Sha1 KeyId Algorithm
1,207,487 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,500 UART: [ldev] Erasing FE.KEYID = 1
1,241,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,832 UART: [ldev] --
1,281,226 UART: [fwproc] Wait for Commands...
1,281,885 UART: [fwproc] Recv command 0x46574c44
1,282,618 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,178 UART: ROM Fatal Error: 0x000B002C
2,607,337 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,457,332 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Manufacturing
86,194 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
905,061 UART: [kat] SHA2-512-ACC
906,962 UART: [kat] ECC-384
917,207 UART: [kat] HMAC-384Kdf
921,791 UART: [kat] LMS
1,170,103 UART: [kat] --
1,170,972 UART: [cold-reset] ++
1,171,310 UART: [fht] FHT @ 0x50003400
1,173,960 UART: [idev] ++
1,174,128 UART: [idev] CDI.KEYID = 6
1,174,489 UART: [idev] SUBJECT.KEYID = 7
1,174,914 UART: [idev] UDS.KEYID = 0
1,182,744 UART: [idev] Erasing UDS.KEYID = 0
1,199,168 UART: [idev] Sha1 KeyId Algorithm
1,207,928 UART: [idev] --
1,209,133 UART: [ldev] ++
1,209,301 UART: [ldev] CDI.KEYID = 6
1,209,665 UART: [ldev] SUBJECT.KEYID = 5
1,210,092 UART: [ldev] AUTHORITY.KEYID = 7
1,210,555 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,241,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,683 UART: [ldev] --
1,281,173 UART: [fwproc] Wait for Commands...
1,281,884 UART: [fwproc] Recv command 0x46574c44
1,282,617 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,197 UART: ROM Fatal Error: 0x000B002C
2,607,356 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,461,409 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Manufacturing
85,805 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,726 UART: [kat] HMAC-384Kdf
921,110 UART: [kat] LMS
1,169,422 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,567 UART: [fht] FHT @ 0x50003400
1,173,057 UART: [idev] ++
1,173,225 UART: [idev] CDI.KEYID = 6
1,173,586 UART: [idev] SUBJECT.KEYID = 7
1,174,011 UART: [idev] UDS.KEYID = 0
1,182,393 UART: [idev] Erasing UDS.KEYID = 0
1,199,149 UART: [idev] Sha1 KeyId Algorithm
1,208,105 UART: [idev] --
1,209,228 UART: [ldev] ++
1,209,396 UART: [ldev] CDI.KEYID = 6
1,209,760 UART: [ldev] SUBJECT.KEYID = 5
1,210,187 UART: [ldev] AUTHORITY.KEYID = 7
1,210,650 UART: [ldev] FE.KEYID = 1
1,215,706 UART: [ldev] Erasing FE.KEYID = 1
1,241,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,204 UART: [ldev] --
1,280,488 UART: [fwproc] Wait for Commands...
1,281,267 UART: [fwproc] Recv command 0x46574c44
1,282,000 UART: [fwproc] Recv'd Img size: 114448 bytes
2,604,324 UART: ROM Fatal Error: 0x000B002C
2,605,483 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,459,800 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Manufacturing
85,868 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
921,023 UART: [kat] LMS
1,169,335 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,186 UART: [idev] ++
1,173,354 UART: [idev] CDI.KEYID = 6
1,173,715 UART: [idev] SUBJECT.KEYID = 7
1,174,140 UART: [idev] UDS.KEYID = 0
1,182,148 UART: [idev] Erasing UDS.KEYID = 0
1,199,194 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,291 UART: [ldev] ++
1,209,459 UART: [ldev] CDI.KEYID = 6
1,209,823 UART: [ldev] SUBJECT.KEYID = 5
1,210,250 UART: [ldev] AUTHORITY.KEYID = 7
1,210,713 UART: [ldev] FE.KEYID = 1
1,216,083 UART: [ldev] Erasing FE.KEYID = 1
1,242,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,513 UART: [ldev] --
1,281,821 UART: [fwproc] Wait for Commands...
1,282,454 UART: [fwproc] Recv command 0x46574c44
1,283,187 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,033 UART: ROM Fatal Error: 0x000B002C
2,609,192 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,460,513 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
5,205 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,062 UART:
192,449 UART: Running Caliptra ROM ...
193,566 UART:
193,713 UART: [state] CFI Enabled
263,661 UART: [state] LifecycleState = Manufacturing
266,073 UART: [state] DebugLocked = No
268,832 UART: [state] WD Timer not started. Device not locked for debugging
273,177 UART: [kat] SHA2-256
455,120 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,652 UART: [kat] ++
467,176 UART: [kat] sha1
476,440 UART: [kat] SHA2-256
479,452 UART: [kat] SHA2-384
483,910 UART: [kat] SHA2-512-ACC
486,518 UART: [kat] ECC-384
3,776,435 UART: [kat] HMAC-384Kdf
3,803,119 UART: [kat] LMS
4,876,292 UART: [kat] --
4,881,040 UART: [cold-reset] ++
4,882,228 UART: [fht] FHT @ 0x50003400
4,892,322 UART: [idev] ++
4,893,046 UART: [idev] CDI.KEYID = 6
4,894,246 UART: [idev] SUBJECT.KEYID = 7
4,895,401 UART: [idev] UDS.KEYID = 0
4,930,446 UART: [idev] Erasing UDS.KEYID = 0
8,244,941 UART: [idev] Sha1 KeyId Algorithm
8,266,651 UART: [idev] --
8,272,238 UART: [ldev] ++
8,272,813 UART: [ldev] CDI.KEYID = 6
8,273,998 UART: [ldev] SUBJECT.KEYID = 5
8,275,154 UART: [ldev] AUTHORITY.KEYID = 7
8,276,379 UART: [ldev] FE.KEYID = 1
8,318,085 UART: [ldev] Erasing FE.KEYID = 1
11,652,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,692 UART: [ldev] --
14,036,656 UART: [fwproc] Wait for Commands...
14,039,725 UART: [fwproc] Recv command 0x46574c44
14,042,043 UART: [fwproc] Recv'd Img size: 114124 bytes
18,141,551 UART: ROM Fatal Error: 0x000B002E
18,144,915 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
5,707 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,917,791 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
6,232 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,553 UART:
192,920 UART: Running Caliptra ROM ...
194,087 UART:
603,806 UART: [state] CFI Enabled
617,796 UART: [state] LifecycleState = Manufacturing
620,206 UART: [state] DebugLocked = No
621,488 UART: [state] WD Timer not started. Device not locked for debugging
625,410 UART: [kat] SHA2-256
807,378 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,909 UART: [kat] ++
819,427 UART: [kat] sha1
828,626 UART: [kat] SHA2-256
831,626 UART: [kat] SHA2-384
837,596 UART: [kat] SHA2-512-ACC
840,207 UART: [kat] ECC-384
4,095,941 UART: [kat] HMAC-384Kdf
4,108,454 UART: [kat] LMS
5,181,625 UART: [kat] --
5,187,638 UART: [cold-reset] ++
5,188,980 UART: [fht] FHT @ 0x50003400
5,200,709 UART: [idev] ++
5,201,383 UART: [idev] CDI.KEYID = 6
5,202,614 UART: [idev] SUBJECT.KEYID = 7
5,204,043 UART: [idev] UDS.KEYID = 0
5,220,180 UART: [idev] Erasing UDS.KEYID = 0
8,493,479 UART: [idev] Sha1 KeyId Algorithm
8,515,314 UART: [idev] --
8,518,597 UART: [ldev] ++
8,519,158 UART: [ldev] CDI.KEYID = 6
8,520,389 UART: [ldev] SUBJECT.KEYID = 5
8,521,819 UART: [ldev] AUTHORITY.KEYID = 7
8,523,371 UART: [ldev] FE.KEYID = 1
8,534,489 UART: [ldev] Erasing FE.KEYID = 1
11,827,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,929 UART: [ldev] --
14,192,407 UART: [fwproc] Wait for Commands...
14,194,496 UART: [fwproc] Recv command 0x46574c44
14,196,759 UART: [fwproc] Recv'd Img size: 114124 bytes
18,297,406 UART: ROM Fatal Error: 0x000B002E
18,300,749 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
6,142 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,113,778 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
5,518 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,152 UART:
192,522 UART: Running Caliptra ROM ...
193,687 UART:
193,837 UART: [state] CFI Enabled
265,488 UART: [state] LifecycleState = Manufacturing
267,427 UART: [state] DebugLocked = No
268,811 UART: [state] WD Timer not started. Device not locked for debugging
272,708 UART: [kat] SHA2-256
451,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,409 UART: [kat] ++
463,947 UART: [kat] sha1
474,940 UART: [kat] SHA2-256
477,955 UART: [kat] SHA2-384
484,687 UART: [kat] SHA2-512-ACC
487,618 UART: [kat] ECC-384
2,952,324 UART: [kat] HMAC-384Kdf
2,972,444 UART: [kat] LMS
3,501,897 UART: [kat] --
3,507,297 UART: [cold-reset] ++
3,508,149 UART: [fht] FHT @ 0x50003400
3,518,912 UART: [idev] ++
3,519,484 UART: [idev] CDI.KEYID = 6
3,520,394 UART: [idev] SUBJECT.KEYID = 7
3,521,630 UART: [idev] UDS.KEYID = 0
3,545,276 UART: [idev] Erasing UDS.KEYID = 0
6,028,052 UART: [idev] Sha1 KeyId Algorithm
6,051,018 UART: [idev] --
6,055,454 UART: [ldev] ++
6,056,087 UART: [ldev] CDI.KEYID = 6
6,056,988 UART: [ldev] SUBJECT.KEYID = 5
6,058,101 UART: [ldev] AUTHORITY.KEYID = 7
6,059,394 UART: [ldev] FE.KEYID = 1
6,100,481 UART: [ldev] Erasing FE.KEYID = 1
8,603,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,081 UART: [ldev] --
10,414,154 UART: [fwproc] Wait for Commands...
10,416,422 UART: [fwproc] Recv command 0x46574c44
10,418,461 UART: [fwproc] Recv'd Img size: 114448 bytes
13,849,163 UART: ROM Fatal Error: 0x000B002E
13,852,259 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
5,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,615,603 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
5,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,306 UART:
192,699 UART: Running Caliptra ROM ...
193,838 UART:
603,273 UART: [state] CFI Enabled
617,634 UART: [state] LifecycleState = Manufacturing
619,475 UART: [state] DebugLocked = No
621,719 UART: [state] WD Timer not started. Device not locked for debugging
624,950 UART: [kat] SHA2-256
804,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,636 UART: [kat] ++
816,086 UART: [kat] sha1
826,370 UART: [kat] SHA2-256
829,430 UART: [kat] SHA2-384
835,615 UART: [kat] SHA2-512-ACC
838,540 UART: [kat] ECC-384
3,280,869 UART: [kat] HMAC-384Kdf
3,293,641 UART: [kat] LMS
3,823,091 UART: [kat] --
3,828,507 UART: [cold-reset] ++
3,830,275 UART: [fht] FHT @ 0x50003400
3,841,037 UART: [idev] ++
3,841,603 UART: [idev] CDI.KEYID = 6
3,842,510 UART: [idev] SUBJECT.KEYID = 7
3,843,722 UART: [idev] UDS.KEYID = 0
3,859,592 UART: [idev] Erasing UDS.KEYID = 0
6,316,804 UART: [idev] Sha1 KeyId Algorithm
6,338,513 UART: [idev] --
6,342,535 UART: [ldev] ++
6,343,115 UART: [ldev] CDI.KEYID = 6
6,343,998 UART: [ldev] SUBJECT.KEYID = 5
6,345,210 UART: [ldev] AUTHORITY.KEYID = 7
6,346,437 UART: [ldev] FE.KEYID = 1
6,357,590 UART: [ldev] Erasing FE.KEYID = 1
8,827,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,206 UART: [ldev] --
10,618,360 UART: [fwproc] Wait for Commands...
10,621,479 UART: [fwproc] Recv command 0x46574c44
10,623,564 UART: [fwproc] Recv'd Img size: 114448 bytes
14,048,368 UART: ROM Fatal Error: 0x000B002E
14,051,503 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
6,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,845,513 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
5,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,626,312 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,773 writing to cptra_bootfsm_go
7,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,846,222 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Manufacturing
85,959 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,144 UART: [kat] HMAC-384Kdf
920,780 UART: [kat] LMS
1,169,092 UART: [kat] --
1,170,139 UART: [cold-reset] ++
1,170,701 UART: [fht] FHT @ 0x50003400
1,173,197 UART: [idev] ++
1,173,365 UART: [idev] CDI.KEYID = 6
1,173,726 UART: [idev] SUBJECT.KEYID = 7
1,174,151 UART: [idev] UDS.KEYID = 0
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,198,579 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,446 UART: [ldev] Erasing FE.KEYID = 1
1,242,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,280 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,349 UART: [fwproc] Recv command 0x46574c44
1,283,082 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,806 UART: ROM Fatal Error: 0x000B002E
2,607,965 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,459,914 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Manufacturing
86,220 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
891,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,724 UART: [kat] ++
895,876 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,597 UART: [kat] HMAC-384Kdf
921,207 UART: [kat] LMS
1,169,519 UART: [kat] --
1,170,552 UART: [cold-reset] ++
1,171,032 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,182,452 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,422 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,215,939 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,601 UART: [fwproc] Wait for Commands...
1,282,316 UART: [fwproc] Recv command 0x46574c44
1,283,049 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,729 UART: ROM Fatal Error: 0x000B002E
2,607,888 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,460,419 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Manufacturing
85,939 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,544 UART: [kat] LMS
1,168,856 UART: [kat] --
1,169,879 UART: [cold-reset] ++
1,170,347 UART: [fht] FHT @ 0x50003400
1,173,043 UART: [idev] ++
1,173,211 UART: [idev] CDI.KEYID = 6
1,173,572 UART: [idev] SUBJECT.KEYID = 7
1,173,997 UART: [idev] UDS.KEYID = 0
1,181,589 UART: [idev] Erasing UDS.KEYID = 0
1,198,675 UART: [idev] Sha1 KeyId Algorithm
1,207,513 UART: [idev] --
1,208,642 UART: [ldev] ++
1,208,810 UART: [ldev] CDI.KEYID = 6
1,209,174 UART: [ldev] SUBJECT.KEYID = 5
1,209,601 UART: [ldev] AUTHORITY.KEYID = 7
1,210,064 UART: [ldev] FE.KEYID = 1
1,215,112 UART: [ldev] Erasing FE.KEYID = 1
1,241,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,748 UART: [ldev] --
1,281,246 UART: [fwproc] Wait for Commands...
1,282,059 UART: [fwproc] Recv command 0x46574c44
1,282,792 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,362 UART: ROM Fatal Error: 0x000B002E
2,607,521 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,459,622 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Manufacturing
86,326 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
891,781 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,910 UART: [kat] ++
896,062 UART: [kat] sha1
900,106 UART: [kat] SHA2-256
902,046 UART: [kat] SHA2-384
904,985 UART: [kat] SHA2-512-ACC
906,886 UART: [kat] ECC-384
916,825 UART: [kat] HMAC-384Kdf
921,425 UART: [kat] LMS
1,169,737 UART: [kat] --
1,170,342 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,182,690 UART: [idev] Erasing UDS.KEYID = 0
1,200,444 UART: [idev] Sha1 KeyId Algorithm
1,209,372 UART: [idev] --
1,210,511 UART: [ldev] ++
1,210,679 UART: [ldev] CDI.KEYID = 6
1,211,043 UART: [ldev] SUBJECT.KEYID = 5
1,211,470 UART: [ldev] AUTHORITY.KEYID = 7
1,211,933 UART: [ldev] FE.KEYID = 1
1,217,315 UART: [ldev] Erasing FE.KEYID = 1
1,243,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,393 UART: [ldev] --
1,283,773 UART: [fwproc] Wait for Commands...
1,284,518 UART: [fwproc] Recv command 0x46574c44
1,285,251 UART: [fwproc] Recv'd Img size: 114448 bytes
2,609,157 UART: ROM Fatal Error: 0x000B002E
2,610,316 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,461,809 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Manufacturing
85,597 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,514 UART: [kat] SHA2-512-ACC
906,415 UART: [kat] ECC-384
916,532 UART: [kat] HMAC-384Kdf
921,114 UART: [kat] LMS
1,169,426 UART: [kat] --
1,170,367 UART: [cold-reset] ++
1,170,937 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,182,739 UART: [idev] Erasing UDS.KEYID = 0
1,199,683 UART: [idev] Sha1 KeyId Algorithm
1,208,715 UART: [idev] --
1,209,854 UART: [ldev] ++
1,210,022 UART: [ldev] CDI.KEYID = 6
1,210,386 UART: [ldev] SUBJECT.KEYID = 5
1,210,813 UART: [ldev] AUTHORITY.KEYID = 7
1,211,276 UART: [ldev] FE.KEYID = 1
1,216,404 UART: [ldev] Erasing FE.KEYID = 1
1,243,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,110 UART: [ldev] --
1,282,464 UART: [fwproc] Wait for Commands...
1,283,053 UART: [fwproc] Recv command 0x46574c44
1,283,786 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,442 UART: ROM Fatal Error: 0x000B002E
2,608,601 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,458,982 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Manufacturing
85,754 UART: [state] DebugLocked = No
86,240 UART: [state] WD Timer not started. Device not locked for debugging
87,421 UART: [kat] SHA2-256
890,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,100 UART: [kat] ++
895,252 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
915,755 UART: [kat] HMAC-384Kdf
920,227 UART: [kat] LMS
1,168,539 UART: [kat] --
1,169,322 UART: [cold-reset] ++
1,169,694 UART: [fht] FHT @ 0x50003400
1,172,518 UART: [idev] ++
1,172,686 UART: [idev] CDI.KEYID = 6
1,173,047 UART: [idev] SUBJECT.KEYID = 7
1,173,472 UART: [idev] UDS.KEYID = 0
1,181,904 UART: [idev] Erasing UDS.KEYID = 0
1,198,854 UART: [idev] Sha1 KeyId Algorithm
1,207,810 UART: [idev] --
1,208,665 UART: [ldev] ++
1,208,833 UART: [ldev] CDI.KEYID = 6
1,209,197 UART: [ldev] SUBJECT.KEYID = 5
1,209,624 UART: [ldev] AUTHORITY.KEYID = 7
1,210,087 UART: [ldev] FE.KEYID = 1
1,215,537 UART: [ldev] Erasing FE.KEYID = 1
1,241,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,461 UART: [ldev] --
1,280,727 UART: [fwproc] Wait for Commands...
1,281,302 UART: [fwproc] Recv command 0x46574c44
1,282,035 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,841 UART: ROM Fatal Error: 0x000B002E
2,607,000 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,458,899 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,019,726 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,008 UART:
2,164,403 UART: Running Caliptra ROM ...
2,165,481 UART:
2,165,639 UART: [state] CFI Enabled
2,166,736 UART: [state] LifecycleState = Unprovisioned
2,168,384 UART: [state] DebugLocked = No
2,169,428 UART: [state] WD Timer not started. Device not locked for debugging
2,171,893 UART: [kat] SHA2-256
2,172,556 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,564 UART: [kat] ++
2,176,007 UART: [kat] sha1
2,176,519 UART: [kat] SHA2-256
2,177,177 UART: [kat] SHA2-384
2,177,833 UART: [kat] SHA2-512-ACC
2,178,667 UART: [kat] ECC-384
3,777,485 UART: [kat] HMAC-384Kdf
3,803,723 UART: [kat] LMS
4,876,877 UART: [kat] --
4,881,241 UART: [cold-reset] ++
4,883,994 UART: [fht] FHT @ 0x50003400
4,895,138 UART: [idev] ++
4,895,866 UART: [idev] CDI.KEYID = 6
4,897,064 UART: [idev] SUBJECT.KEYID = 7
4,898,176 UART: [idev] UDS.KEYID = 0
4,930,696 UART: [idev] Erasing UDS.KEYID = 0
8,245,213 UART: [idev] Sha1 KeyId Algorithm
8,267,742 UART: [idev] --
8,272,003 UART: [ldev] ++
8,272,574 UART: [ldev] CDI.KEYID = 6
8,273,687 UART: [ldev] SUBJECT.KEYID = 5
8,274,904 UART: [ldev] AUTHORITY.KEYID = 7
8,276,057 UART: [ldev] FE.KEYID = 1
8,318,929 UART: [ldev] Erasing FE.KEYID = 1
11,650,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,947,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,963,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,979,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,995,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,015,290 UART: [ldev] --
14,020,182 UART: [fwproc] Wait for Commands...
14,022,983 UART: [fwproc] Recv command 0x46574c44
14,025,258 UART: [fwproc] Recv'd Img size: 114124 bytes
16,733,632 UART: ROM Fatal Error: 0x000B0018
16,737,046 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
2,020,160 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,506,450 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
2,021,778 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,652 UART:
2,167,058 UART: Running Caliptra ROM ...
2,168,145 UART:
2,168,299 UART: [state] CFI Enabled
2,169,277 UART: [state] LifecycleState = Unprovisioned
2,170,919 UART: [state] DebugLocked = No
2,172,020 UART: [state] WD Timer not started. Device not locked for debugging
2,174,488 UART: [kat] SHA2-256
2,175,150 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,158 UART: [kat] ++
2,178,604 UART: [kat] sha1
2,179,109 UART: [kat] SHA2-256
2,179,841 UART: [kat] SHA2-384
2,180,498 UART: [kat] SHA2-512-ACC
2,181,327 UART: [kat] ECC-384
4,099,053 UART: [kat] HMAC-384Kdf
4,111,801 UART: [kat] LMS
5,184,975 UART: [kat] --
5,190,565 UART: [cold-reset] ++
5,192,825 UART: [fht] FHT @ 0x50003400
5,204,128 UART: [idev] ++
5,204,808 UART: [idev] CDI.KEYID = 6
5,205,990 UART: [idev] SUBJECT.KEYID = 7
5,207,475 UART: [idev] UDS.KEYID = 0
5,223,104 UART: [idev] Erasing UDS.KEYID = 0
8,498,261 UART: [idev] Sha1 KeyId Algorithm
8,518,633 UART: [idev] --
8,521,552 UART: [ldev] ++
8,522,121 UART: [ldev] CDI.KEYID = 6
8,523,298 UART: [ldev] SUBJECT.KEYID = 5
8,524,785 UART: [ldev] AUTHORITY.KEYID = 7
8,526,364 UART: [ldev] FE.KEYID = 1
8,536,362 UART: [ldev] Erasing FE.KEYID = 1
11,829,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,057 UART: [ldev] --
14,196,367 UART: [fwproc] Wait for Commands...
14,198,514 UART: [fwproc] Recv command 0x46574c44
14,200,831 UART: [fwproc] Recv'd Img size: 114124 bytes
16,899,566 UART: ROM Fatal Error: 0x000B0018
16,902,979 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
2,022,719 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,717,803 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
2,049,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,198,338 UART:
2,199,147 UART: Running Caliptra ROM ...
2,200,241 UART:
2,200,417 UART: [state] CFI Enabled
2,201,311 UART: [state] LifecycleState = Unprovisioned
2,202,976 UART: [state] DebugLocked = No
2,204,089 UART: [state] WD Timer not started. Device not locked for debugging
2,206,589 UART: [kat] SHA2-256
2,207,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,281 UART: [kat] ++
2,210,733 UART: [kat] sha1
2,211,244 UART: [kat] SHA2-256
2,211,905 UART: [kat] SHA2-384
2,212,752 UART: [kat] SHA2-512-ACC
2,213,717 UART: [kat] ECC-384
2,919,957 UART: [kat] HMAC-384Kdf
2,946,121 UART: [kat] LMS
3,475,585 UART: [kat] --
3,480,001 UART: [cold-reset] ++
3,481,477 UART: [fht] FHT @ 0x50003400
3,492,783 UART: [idev] ++
3,493,350 UART: [idev] CDI.KEYID = 6
3,494,271 UART: [idev] SUBJECT.KEYID = 7
3,495,429 UART: [idev] UDS.KEYID = 0
3,517,296 UART: [idev] Erasing UDS.KEYID = 0
5,997,630 UART: [idev] Sha1 KeyId Algorithm
6,021,382 UART: [idev] --
6,024,928 UART: [ldev] ++
6,025,515 UART: [ldev] CDI.KEYID = 6
6,026,437 UART: [ldev] SUBJECT.KEYID = 5
6,027,605 UART: [ldev] AUTHORITY.KEYID = 7
6,028,842 UART: [ldev] FE.KEYID = 1
6,060,647 UART: [ldev] Erasing FE.KEYID = 1
8,568,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,843 UART: [ldev] --
10,372,773 UART: [fwproc] Wait for Commands...
10,374,991 UART: [fwproc] Recv command 0x46574c44
10,377,092 UART: [fwproc] Recv'd Img size: 114448 bytes
12,427,323 UART: ROM Fatal Error: 0x000B0018
12,430,421 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,021,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,260,220 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,024,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,556 UART:
2,169,968 UART: Running Caliptra ROM ...
2,171,137 UART:
2,171,309 UART: [state] CFI Enabled
2,172,286 UART: [state] LifecycleState = Unprovisioned
2,173,928 UART: [state] DebugLocked = No
2,175,040 UART: [state] WD Timer not started. Device not locked for debugging
2,177,515 UART: [kat] SHA2-256
2,178,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,213 UART: [kat] ++
2,181,665 UART: [kat] sha1
2,182,175 UART: [kat] SHA2-256
2,182,915 UART: [kat] SHA2-384
2,183,582 UART: [kat] SHA2-512-ACC
2,184,460 UART: [kat] ECC-384
3,283,244 UART: [kat] HMAC-384Kdf
3,295,356 UART: [kat] LMS
3,824,892 UART: [kat] --
3,828,751 UART: [cold-reset] ++
3,829,660 UART: [fht] FHT @ 0x50003400
3,840,693 UART: [idev] ++
3,841,254 UART: [idev] CDI.KEYID = 6
3,842,178 UART: [idev] SUBJECT.KEYID = 7
3,843,336 UART: [idev] UDS.KEYID = 0
3,859,036 UART: [idev] Erasing UDS.KEYID = 0
6,312,221 UART: [idev] Sha1 KeyId Algorithm
6,334,101 UART: [idev] --
6,338,203 UART: [ldev] ++
6,338,771 UART: [ldev] CDI.KEYID = 6
6,339,651 UART: [ldev] SUBJECT.KEYID = 5
6,340,865 UART: [ldev] AUTHORITY.KEYID = 7
6,342,098 UART: [ldev] FE.KEYID = 1
6,350,615 UART: [ldev] Erasing FE.KEYID = 1
8,824,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,983 UART: [ldev] --
10,614,713 UART: [fwproc] Wait for Commands...
10,617,621 UART: [fwproc] Recv command 0x46574c44
10,619,738 UART: [fwproc] Recv'd Img size: 114448 bytes
12,673,151 UART: ROM Fatal Error: 0x000B0018
12,676,282 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
2,027,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,444,712 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,022,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,257,952 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,021,993 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,463,568 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,652 UART: [state] LifecycleState = Unprovisioned
85,307 UART: [state] DebugLocked = No
85,851 UART: [state] WD Timer not started. Device not locked for debugging
87,090 UART: [kat] SHA2-256
890,640 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,769 UART: [kat] ++
894,921 UART: [kat] sha1
899,157 UART: [kat] SHA2-256
901,097 UART: [kat] SHA2-384
903,874 UART: [kat] SHA2-512-ACC
905,775 UART: [kat] ECC-384
915,102 UART: [kat] HMAC-384Kdf
919,706 UART: [kat] LMS
1,168,018 UART: [kat] --
1,169,011 UART: [cold-reset] ++
1,169,483 UART: [fht] FHT @ 0x50003400
1,172,091 UART: [idev] ++
1,172,259 UART: [idev] CDI.KEYID = 6
1,172,620 UART: [idev] SUBJECT.KEYID = 7
1,173,045 UART: [idev] UDS.KEYID = 0
1,180,789 UART: [idev] Erasing UDS.KEYID = 0
1,197,103 UART: [idev] Sha1 KeyId Algorithm
1,206,163 UART: [idev] --
1,207,342 UART: [ldev] ++
1,207,510 UART: [ldev] CDI.KEYID = 6
1,207,874 UART: [ldev] SUBJECT.KEYID = 5
1,208,301 UART: [ldev] AUTHORITY.KEYID = 7
1,208,764 UART: [ldev] FE.KEYID = 1
1,213,948 UART: [ldev] Erasing FE.KEYID = 1
1,240,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,770 UART: [ldev] --
1,280,216 UART: [fwproc] Wait for Commands...
1,280,891 UART: [fwproc] Recv command 0x46574c44
1,281,624 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,606 UART: ROM Fatal Error: 0x000B0018
1,329,763 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,414 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
891,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,834 UART: [kat] ++
895,986 UART: [kat] sha1
900,234 UART: [kat] SHA2-256
902,174 UART: [kat] SHA2-384
904,963 UART: [kat] SHA2-512-ACC
906,864 UART: [kat] ECC-384
916,441 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,181,832 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,256 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,215,829 UART: [ldev] Erasing FE.KEYID = 1
1,241,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,773 UART: [ldev] --
1,281,273 UART: [fwproc] Wait for Commands...
1,281,936 UART: [fwproc] Recv command 0x46574c44
1,282,669 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,817 UART: ROM Fatal Error: 0x000B0018
1,330,974 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,323 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,694 UART: [kat] HMAC-384Kdf
920,334 UART: [kat] LMS
1,168,646 UART: [kat] --
1,169,607 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,815 UART: [idev] ++
1,172,983 UART: [idev] CDI.KEYID = 6
1,173,344 UART: [idev] SUBJECT.KEYID = 7
1,173,769 UART: [idev] UDS.KEYID = 0
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,208,904 UART: [ldev] ++
1,209,072 UART: [ldev] CDI.KEYID = 6
1,209,436 UART: [ldev] SUBJECT.KEYID = 5
1,209,863 UART: [ldev] AUTHORITY.KEYID = 7
1,210,326 UART: [ldev] FE.KEYID = 1
1,215,764 UART: [ldev] Erasing FE.KEYID = 1
1,242,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,768 UART: [ldev] --
1,282,284 UART: [fwproc] Wait for Commands...
1,283,055 UART: [fwproc] Recv command 0x46574c44
1,283,788 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,590 UART: ROM Fatal Error: 0x000B0018
1,331,747 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,526 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,187 UART: [kat] LMS
1,169,499 UART: [kat] --
1,170,424 UART: [cold-reset] ++
1,170,962 UART: [fht] FHT @ 0x50003400
1,173,644 UART: [idev] ++
1,173,812 UART: [idev] CDI.KEYID = 6
1,174,173 UART: [idev] SUBJECT.KEYID = 7
1,174,598 UART: [idev] UDS.KEYID = 0
1,182,986 UART: [idev] Erasing UDS.KEYID = 0
1,200,214 UART: [idev] Sha1 KeyId Algorithm
1,209,094 UART: [idev] --
1,210,105 UART: [ldev] ++
1,210,273 UART: [ldev] CDI.KEYID = 6
1,210,637 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,216,535 UART: [ldev] Erasing FE.KEYID = 1
1,242,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,731 UART: [fwproc] Wait for Commands...
1,282,308 UART: [fwproc] Recv command 0x46574c44
1,283,041 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,757 UART: ROM Fatal Error: 0x000B0018
1,330,914 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,163 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,315 UART: [fht] FHT @ 0x50003400
1,172,967 UART: [idev] ++
1,173,135 UART: [idev] CDI.KEYID = 6
1,173,496 UART: [idev] SUBJECT.KEYID = 7
1,173,921 UART: [idev] UDS.KEYID = 0
1,181,739 UART: [idev] Erasing UDS.KEYID = 0
1,198,977 UART: [idev] Sha1 KeyId Algorithm
1,207,959 UART: [idev] --
1,209,082 UART: [ldev] ++
1,209,250 UART: [ldev] CDI.KEYID = 6
1,209,614 UART: [ldev] SUBJECT.KEYID = 5
1,210,041 UART: [ldev] AUTHORITY.KEYID = 7
1,210,504 UART: [ldev] FE.KEYID = 1
1,215,608 UART: [ldev] Erasing FE.KEYID = 1
1,241,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,364 UART: [ldev] --
1,280,712 UART: [fwproc] Wait for Commands...
1,281,507 UART: [fwproc] Recv command 0x46574c44
1,282,240 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,054 UART: ROM Fatal Error: 0x000B0018
1,332,211 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,654 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,142 UART: [cold-reset] ++
1,170,672 UART: [fht] FHT @ 0x50003400
1,173,456 UART: [idev] ++
1,173,624 UART: [idev] CDI.KEYID = 6
1,173,985 UART: [idev] SUBJECT.KEYID = 7
1,174,410 UART: [idev] UDS.KEYID = 0
1,182,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,612 UART: [idev] Sha1 KeyId Algorithm
1,208,550 UART: [idev] --
1,209,769 UART: [ldev] ++
1,209,937 UART: [ldev] CDI.KEYID = 6
1,210,301 UART: [ldev] SUBJECT.KEYID = 5
1,210,728 UART: [ldev] AUTHORITY.KEYID = 7
1,211,191 UART: [ldev] FE.KEYID = 1
1,216,669 UART: [ldev] Erasing FE.KEYID = 1
1,243,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,593 UART: [ldev] --
1,282,985 UART: [fwproc] Wait for Commands...
1,283,774 UART: [fwproc] Recv command 0x46574c44
1,284,507 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,683 UART: ROM Fatal Error: 0x000B0018
1,332,840 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,881 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
2,020,703 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,035 UART:
2,165,432 UART: Running Caliptra ROM ...
2,166,514 UART:
2,166,692 UART: [state] CFI Enabled
2,167,671 UART: [state] LifecycleState = Unprovisioned
2,169,236 UART: [state] DebugLocked = No
2,170,351 UART: [state] WD Timer not started. Device not locked for debugging
2,172,823 UART: [kat] SHA2-256
2,173,487 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,495 UART: [kat] ++
2,176,940 UART: [kat] sha1
2,177,449 UART: [kat] SHA2-256
2,178,105 UART: [kat] SHA2-384
2,178,760 UART: [kat] SHA2-512-ACC
2,179,639 UART: [kat] ECC-384
3,777,297 UART: [kat] HMAC-384Kdf
3,804,141 UART: [kat] LMS
4,877,303 UART: [kat] --
4,880,407 UART: [cold-reset] ++
4,881,615 UART: [fht] FHT @ 0x50003400
4,892,916 UART: [idev] ++
4,893,599 UART: [idev] CDI.KEYID = 6
4,894,778 UART: [idev] SUBJECT.KEYID = 7
4,895,931 UART: [idev] UDS.KEYID = 0
4,930,872 UART: [idev] Erasing UDS.KEYID = 0
8,243,360 UART: [idev] Sha1 KeyId Algorithm
8,264,992 UART: [idev] --
8,268,406 UART: [ldev] ++
8,268,980 UART: [ldev] CDI.KEYID = 6
8,270,147 UART: [ldev] SUBJECT.KEYID = 5
8,271,365 UART: [ldev] AUTHORITY.KEYID = 7
8,272,510 UART: [ldev] FE.KEYID = 1
8,320,255 UART: [ldev] Erasing FE.KEYID = 1
11,655,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,916 UART: [ldev] --
14,038,735 UART: [fwproc] Wait for Commands...
14,040,906 UART: [fwproc] Recv command 0x46574c44
14,043,228 UART: [fwproc] Recv'd Img size: 114124 bytes
16,748,744 UART: ROM Fatal Error: 0x000B0017
16,752,156 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
2,021,903 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,542 UART:
2,165,929 UART: Running Caliptra ROM ...
2,167,099 UART:
2,167,275 UART: [state] CFI Enabled
2,168,230 UART: [state] LifecycleState = Unprovisioned
2,169,873 UART: [state] DebugLocked = No
2,170,904 UART: [state] WD Timer not started. Device not locked for debugging
2,173,336 UART: [kat] SHA2-256
2,173,999 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,008 UART: [kat] ++
2,177,464 UART: [kat] sha1
2,178,202 UART: [kat] SHA2-256
2,178,878 UART: [kat] SHA2-384
2,179,538 UART: [kat] SHA2-512-ACC
2,180,382 UART: [kat] ECC-384
3,774,848 UART: [kat] HMAC-384Kdf
3,802,169 UART: [kat] LMS
4,875,379 UART: [kat] --
4,881,548 UART: [cold-reset] ++
4,883,754 UART: [fht] FHT @ 0x50003400
4,894,360 UART: [idev] ++
4,895,038 UART: [idev] CDI.KEYID = 6
4,896,278 UART: [idev] SUBJECT.KEYID = 7
4,897,380 UART: [idev] UDS.KEYID = 0
4,928,945 UART: [idev] Erasing UDS.KEYID = 0
8,240,261 UART: [idev] Sha1 KeyId Algorithm
8,261,688 UART: [idev] --
8,265,545 UART: [ldev] ++
8,266,115 UART: [ldev] CDI.KEYID = 6
8,267,221 UART: [ldev] SUBJECT.KEYID = 5
8,268,493 UART: [ldev] AUTHORITY.KEYID = 7
8,269,663 UART: [ldev] FE.KEYID = 1
8,316,737 UART: [ldev] Erasing FE.KEYID = 1
11,649,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,354 UART: [ldev] --
14,015,022 UART: [fwproc] Wait for Commands...
14,016,641 UART: [fwproc] Recv command 0x46574c44
14,019,011 UART: [fwproc] Recv'd Img size: 114124 bytes
16,721,203 UART: ROM Fatal Error: 0x000B0017
16,724,597 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
2,020,247 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,164,126 UART:
2,164,524 UART: Running Caliptra ROM ...
2,165,608 UART:
2,165,759 UART: [state] CFI Enabled
2,166,730 UART: [state] LifecycleState = Unprovisioned
2,168,387 UART: [state] DebugLocked = No
2,169,415 UART: [state] WD Timer not started. Device not locked for debugging
2,171,881 UART: [kat] SHA2-256
2,172,543 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,547 UART: [kat] ++
2,175,996 UART: [kat] sha1
2,176,527 UART: [kat] SHA2-256
2,177,267 UART: [kat] SHA2-384
2,177,931 UART: [kat] SHA2-512-ACC
2,178,777 UART: [kat] ECC-384
3,776,501 UART: [kat] HMAC-384Kdf
3,802,218 UART: [kat] LMS
4,875,377 UART: [kat] --
4,880,743 UART: [cold-reset] ++
4,881,977 UART: [fht] FHT @ 0x50003400
4,892,346 UART: [idev] ++
4,893,076 UART: [idev] CDI.KEYID = 6
4,894,263 UART: [idev] SUBJECT.KEYID = 7
4,895,423 UART: [idev] UDS.KEYID = 0
4,929,450 UART: [idev] Erasing UDS.KEYID = 0
8,243,350 UART: [idev] Sha1 KeyId Algorithm
8,264,910 UART: [idev] --
8,270,088 UART: [ldev] ++
8,270,677 UART: [ldev] CDI.KEYID = 6
8,271,924 UART: [ldev] SUBJECT.KEYID = 5
8,273,025 UART: [ldev] AUTHORITY.KEYID = 7
8,274,253 UART: [ldev] FE.KEYID = 1
8,317,792 UART: [ldev] Erasing FE.KEYID = 1
11,649,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,449 UART: [ldev] --
14,037,890 UART: [fwproc] Wait for Commands...
14,039,510 UART: [fwproc] Recv command 0x46574c44
14,041,778 UART: [fwproc] Recv'd Img size: 114124 bytes
16,744,910 UART: ROM Fatal Error: 0x000B0017
16,748,348 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
2,020,477 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,572,290 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,020,229 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,526,433 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,019,075 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,553,654 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,022,075 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,300 UART:
2,166,705 UART: Running Caliptra ROM ...
2,167,868 UART:
2,168,035 UART: [state] CFI Enabled
2,169,030 UART: [state] LifecycleState = Unprovisioned
2,170,674 UART: [state] DebugLocked = No
2,171,775 UART: [state] WD Timer not started. Device not locked for debugging
2,174,235 UART: [kat] SHA2-256
2,174,898 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,901 UART: [kat] ++
2,178,346 UART: [kat] sha1
2,178,851 UART: [kat] SHA2-256
2,179,582 UART: [kat] SHA2-384
2,180,241 UART: [kat] SHA2-512-ACC
2,181,121 UART: [kat] ECC-384
4,101,077 UART: [kat] HMAC-384Kdf
4,112,783 UART: [kat] LMS
5,185,958 UART: [kat] --
5,189,855 UART: [cold-reset] ++
5,192,601 UART: [fht] FHT @ 0x50003400
5,204,298 UART: [idev] ++
5,204,981 UART: [idev] CDI.KEYID = 6
5,206,214 UART: [idev] SUBJECT.KEYID = 7
5,207,640 UART: [idev] UDS.KEYID = 0
5,224,100 UART: [idev] Erasing UDS.KEYID = 0
8,493,986 UART: [idev] Sha1 KeyId Algorithm
8,516,081 UART: [idev] --
8,520,684 UART: [ldev] ++
8,521,748 UART: [ldev] CDI.KEYID = 6
8,522,756 UART: [ldev] SUBJECT.KEYID = 5
8,523,865 UART: [ldev] AUTHORITY.KEYID = 7
8,525,423 UART: [ldev] FE.KEYID = 1
8,534,984 UART: [ldev] Erasing FE.KEYID = 1
11,830,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,191 UART: [ldev] --
14,194,906 UART: [fwproc] Wait for Commands...
14,197,210 UART: [fwproc] Recv command 0x46574c44
14,199,474 UART: [fwproc] Recv'd Img size: 114124 bytes
16,911,125 UART: ROM Fatal Error: 0x000B0017
16,914,582 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,026,778 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,170,429 UART:
2,170,809 UART: Running Caliptra ROM ...
2,171,980 UART:
2,172,152 UART: [state] CFI Enabled
2,173,109 UART: [state] LifecycleState = Unprovisioned
2,174,990 UART: [state] DebugLocked = No
2,176,113 UART: [state] WD Timer not started. Device not locked for debugging
2,178,586 UART: [kat] SHA2-256
2,179,250 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,259 UART: [kat] ++
2,182,705 UART: [kat] sha1
2,183,255 UART: [kat] SHA2-256
2,183,903 UART: [kat] SHA2-384
2,184,552 UART: [kat] SHA2-512-ACC
2,185,380 UART: [kat] ECC-384
4,101,113 UART: [kat] HMAC-384Kdf
4,113,157 UART: [kat] LMS
5,186,308 UART: [kat] --
5,191,932 UART: [cold-reset] ++
5,193,861 UART: [fht] FHT @ 0x50003400
5,204,241 UART: [idev] ++
5,204,972 UART: [idev] CDI.KEYID = 6
5,206,148 UART: [idev] SUBJECT.KEYID = 7
5,207,629 UART: [idev] UDS.KEYID = 0
5,224,855 UART: [idev] Erasing UDS.KEYID = 0
8,499,306 UART: [idev] Sha1 KeyId Algorithm
8,522,057 UART: [idev] --
8,525,350 UART: [ldev] ++
8,525,911 UART: [ldev] CDI.KEYID = 6
8,527,142 UART: [ldev] SUBJECT.KEYID = 5
8,528,623 UART: [ldev] AUTHORITY.KEYID = 7
8,530,172 UART: [ldev] FE.KEYID = 1
8,540,459 UART: [ldev] Erasing FE.KEYID = 1
11,831,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,333 UART: [ldev] --
14,196,308 UART: [fwproc] Wait for Commands...
14,198,833 UART: [fwproc] Recv command 0x46574c44
14,201,094 UART: [fwproc] Recv'd Img size: 114124 bytes
16,903,084 UART: ROM Fatal Error: 0x000B0017
16,906,542 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
2,022,703 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,438 UART:
2,166,828 UART: Running Caliptra ROM ...
2,168,007 UART:
2,168,179 UART: [state] CFI Enabled
2,169,145 UART: [state] LifecycleState = Unprovisioned
2,170,784 UART: [state] DebugLocked = No
2,171,890 UART: [state] WD Timer not started. Device not locked for debugging
2,174,353 UART: [kat] SHA2-256
2,175,014 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,031 UART: [kat] ++
2,178,477 UART: [kat] sha1
2,179,028 UART: [kat] SHA2-256
2,179,703 UART: [kat] SHA2-384
2,180,449 UART: [kat] SHA2-512-ACC
2,181,258 UART: [kat] ECC-384
4,093,376 UART: [kat] HMAC-384Kdf
4,105,356 UART: [kat] LMS
5,178,511 UART: [kat] --
5,182,209 UART: [cold-reset] ++
5,183,286 UART: [fht] FHT @ 0x50003400
5,194,675 UART: [idev] ++
5,195,386 UART: [idev] CDI.KEYID = 6
5,196,487 UART: [idev] SUBJECT.KEYID = 7
5,198,023 UART: [idev] UDS.KEYID = 0
5,214,186 UART: [idev] Erasing UDS.KEYID = 0
8,489,709 UART: [idev] Sha1 KeyId Algorithm
8,512,339 UART: [idev] --
8,518,002 UART: [ldev] ++
8,518,592 UART: [ldev] CDI.KEYID = 6
8,519,835 UART: [ldev] SUBJECT.KEYID = 5
8,521,271 UART: [ldev] AUTHORITY.KEYID = 7
8,522,751 UART: [ldev] FE.KEYID = 1
8,533,506 UART: [ldev] Erasing FE.KEYID = 1
11,821,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,257 UART: [ldev] --
14,189,085 UART: [fwproc] Wait for Commands...
14,191,340 UART: [fwproc] Recv command 0x46574c44
14,193,655 UART: [fwproc] Recv'd Img size: 114124 bytes
16,892,377 UART: ROM Fatal Error: 0x000B0017
16,895,773 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
2,027,290 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,726,602 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
2,027,015 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,717,135 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,020,923 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,719,857 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,027,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,172,697 UART:
2,173,349 UART: Running Caliptra ROM ...
2,174,454 UART:
2,174,621 UART: [state] CFI Enabled
2,175,740 UART: [state] LifecycleState = Unprovisioned
2,177,407 UART: [state] DebugLocked = No
2,178,524 UART: [state] WD Timer not started. Device not locked for debugging
2,181,013 UART: [kat] SHA2-256
2,181,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,184,711 UART: [kat] ++
2,185,218 UART: [kat] sha1
2,185,737 UART: [kat] SHA2-256
2,186,439 UART: [kat] SHA2-384
2,187,098 UART: [kat] SHA2-512-ACC
2,187,922 UART: [kat] ECC-384
2,947,862 UART: [kat] HMAC-384Kdf
2,974,850 UART: [kat] LMS
3,504,342 UART: [kat] --
3,509,187 UART: [cold-reset] ++
3,510,723 UART: [fht] FHT @ 0x50003400
3,522,032 UART: [idev] ++
3,522,611 UART: [idev] CDI.KEYID = 6
3,523,577 UART: [idev] SUBJECT.KEYID = 7
3,524,739 UART: [idev] UDS.KEYID = 0
3,546,665 UART: [idev] Erasing UDS.KEYID = 0
6,040,595 UART: [idev] Sha1 KeyId Algorithm
6,064,318 UART: [idev] --
6,069,120 UART: [ldev] ++
6,069,699 UART: [ldev] CDI.KEYID = 6
6,070,618 UART: [ldev] SUBJECT.KEYID = 5
6,071,861 UART: [ldev] AUTHORITY.KEYID = 7
6,073,048 UART: [ldev] FE.KEYID = 1
6,113,565 UART: [ldev] Erasing FE.KEYID = 1
8,621,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,352,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,368,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,596 UART: [ldev] --
10,423,891 UART: [fwproc] Wait for Commands...
10,425,560 UART: [fwproc] Recv command 0x46574c44
10,427,654 UART: [fwproc] Recv'd Img size: 114448 bytes
12,482,653 UART: ROM Fatal Error: 0x000B0017
12,485,790 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
2,020,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,249 UART:
2,165,641 UART: Running Caliptra ROM ...
2,166,716 UART:
2,166,870 UART: [state] CFI Enabled
2,167,837 UART: [state] LifecycleState = Unprovisioned
2,169,514 UART: [state] DebugLocked = No
2,170,585 UART: [state] WD Timer not started. Device not locked for debugging
2,173,059 UART: [kat] SHA2-256
2,173,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,746 UART: [kat] ++
2,177,220 UART: [kat] sha1
2,177,736 UART: [kat] SHA2-256
2,178,440 UART: [kat] SHA2-384
2,179,125 UART: [kat] SHA2-512-ACC
2,179,948 UART: [kat] ECC-384
2,949,568 UART: [kat] HMAC-384Kdf
2,973,885 UART: [kat] LMS
3,503,335 UART: [kat] --
3,508,437 UART: [cold-reset] ++
3,509,724 UART: [fht] FHT @ 0x50003400
3,521,650 UART: [idev] ++
3,522,214 UART: [idev] CDI.KEYID = 6
3,523,234 UART: [idev] SUBJECT.KEYID = 7
3,524,334 UART: [idev] UDS.KEYID = 0
3,544,304 UART: [idev] Erasing UDS.KEYID = 0
6,027,293 UART: [idev] Sha1 KeyId Algorithm
6,051,168 UART: [idev] --
6,055,493 UART: [ldev] ++
6,056,065 UART: [ldev] CDI.KEYID = 6
6,056,976 UART: [ldev] SUBJECT.KEYID = 5
6,058,139 UART: [ldev] AUTHORITY.KEYID = 7
6,059,432 UART: [ldev] FE.KEYID = 1
6,101,183 UART: [ldev] Erasing FE.KEYID = 1
8,604,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,793 UART: [ldev] --
10,414,600 UART: [fwproc] Wait for Commands...
10,417,234 UART: [fwproc] Recv command 0x46574c44
10,419,327 UART: [fwproc] Recv'd Img size: 114448 bytes
12,475,978 UART: ROM Fatal Error: 0x000B0017
12,479,048 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,022,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,369 UART:
2,166,768 UART: Running Caliptra ROM ...
2,167,848 UART:
2,168,002 UART: [state] CFI Enabled
2,168,981 UART: [state] LifecycleState = Unprovisioned
2,170,645 UART: [state] DebugLocked = No
2,171,690 UART: [state] WD Timer not started. Device not locked for debugging
2,174,155 UART: [kat] SHA2-256
2,174,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,835 UART: [kat] ++
2,178,283 UART: [kat] sha1
2,178,791 UART: [kat] SHA2-256
2,179,675 UART: [kat] SHA2-384
2,180,344 UART: [kat] SHA2-512-ACC
2,181,149 UART: [kat] ECC-384
2,945,987 UART: [kat] HMAC-384Kdf
2,969,857 UART: [kat] LMS
3,499,330 UART: [kat] --
3,503,730 UART: [cold-reset] ++
3,505,026 UART: [fht] FHT @ 0x50003400
3,516,288 UART: [idev] ++
3,516,856 UART: [idev] CDI.KEYID = 6
3,517,844 UART: [idev] SUBJECT.KEYID = 7
3,519,011 UART: [idev] UDS.KEYID = 0
3,542,283 UART: [idev] Erasing UDS.KEYID = 0
6,026,388 UART: [idev] Sha1 KeyId Algorithm
6,049,749 UART: [idev] --
6,052,015 UART: [ldev] ++
6,052,588 UART: [ldev] CDI.KEYID = 6
6,053,504 UART: [ldev] SUBJECT.KEYID = 5
6,054,721 UART: [ldev] AUTHORITY.KEYID = 7
6,055,959 UART: [ldev] FE.KEYID = 1
6,099,861 UART: [ldev] Erasing FE.KEYID = 1
8,600,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,294 UART: [ldev] --
10,393,188 UART: [fwproc] Wait for Commands...
10,395,342 UART: [fwproc] Recv command 0x46574c44
10,397,436 UART: [fwproc] Recv'd Img size: 114448 bytes
12,451,502 UART: ROM Fatal Error: 0x000B0017
12,454,578 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,024,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,275,089 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
2,021,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,220,182 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,032,670 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,273,275 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,022,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,167,435 UART:
2,167,840 UART: Running Caliptra ROM ...
2,169,012 UART:
2,169,188 UART: [state] CFI Enabled
2,170,158 UART: [state] LifecycleState = Unprovisioned
2,171,800 UART: [state] DebugLocked = No
2,173,131 UART: [state] WD Timer not started. Device not locked for debugging
2,175,627 UART: [kat] SHA2-256
2,176,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,309 UART: [kat] ++
2,179,757 UART: [kat] sha1
2,180,269 UART: [kat] SHA2-256
2,181,028 UART: [kat] SHA2-384
2,181,699 UART: [kat] SHA2-512-ACC
2,182,580 UART: [kat] ECC-384
3,282,248 UART: [kat] HMAC-384Kdf
3,295,564 UART: [kat] LMS
3,825,030 UART: [kat] --
3,828,159 UART: [cold-reset] ++
3,830,628 UART: [fht] FHT @ 0x50003400
3,841,819 UART: [idev] ++
3,842,374 UART: [idev] CDI.KEYID = 6
3,843,305 UART: [idev] SUBJECT.KEYID = 7
3,844,513 UART: [idev] UDS.KEYID = 0
3,861,871 UART: [idev] Erasing UDS.KEYID = 0
6,321,197 UART: [idev] Sha1 KeyId Algorithm
6,344,553 UART: [idev] --
6,347,769 UART: [ldev] ++
6,348,373 UART: [ldev] CDI.KEYID = 6
6,349,447 UART: [ldev] SUBJECT.KEYID = 5
6,350,550 UART: [ldev] AUTHORITY.KEYID = 7
6,351,721 UART: [ldev] FE.KEYID = 1
6,361,303 UART: [ldev] Erasing FE.KEYID = 1
8,832,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,016 UART: [ldev] --
10,625,491 UART: [fwproc] Wait for Commands...
10,627,108 UART: [fwproc] Recv command 0x46574c44
10,629,201 UART: [fwproc] Recv'd Img size: 114448 bytes
12,677,477 UART: ROM Fatal Error: 0x000B0017
12,680,598 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
2,021,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,165,758 UART:
2,166,145 UART: Running Caliptra ROM ...
2,167,310 UART:
2,167,483 UART: [state] CFI Enabled
2,168,443 UART: [state] LifecycleState = Unprovisioned
2,170,098 UART: [state] DebugLocked = No
2,171,201 UART: [state] WD Timer not started. Device not locked for debugging
2,173,664 UART: [kat] SHA2-256
2,174,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,363 UART: [kat] ++
2,177,812 UART: [kat] sha1
2,178,326 UART: [kat] SHA2-256
2,179,061 UART: [kat] SHA2-384
2,179,731 UART: [kat] SHA2-512-ACC
2,180,611 UART: [kat] ECC-384
3,278,769 UART: [kat] HMAC-384Kdf
3,292,351 UART: [kat] LMS
3,821,793 UART: [kat] --
3,826,158 UART: [cold-reset] ++
3,828,191 UART: [fht] FHT @ 0x50003400
3,839,338 UART: [idev] ++
3,839,948 UART: [idev] CDI.KEYID = 6
3,840,863 UART: [idev] SUBJECT.KEYID = 7
3,842,024 UART: [idev] UDS.KEYID = 0
3,854,456 UART: [idev] Erasing UDS.KEYID = 0
6,314,718 UART: [idev] Sha1 KeyId Algorithm
6,338,752 UART: [idev] --
6,343,174 UART: [ldev] ++
6,343,738 UART: [ldev] CDI.KEYID = 6
6,344,673 UART: [ldev] SUBJECT.KEYID = 5
6,345,882 UART: [ldev] AUTHORITY.KEYID = 7
6,347,109 UART: [ldev] FE.KEYID = 1
6,357,837 UART: [ldev] Erasing FE.KEYID = 1
8,829,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,181 UART: [ldev] --
10,621,630 UART: [fwproc] Wait for Commands...
10,624,062 UART: [fwproc] Recv command 0x46574c44
10,626,109 UART: [fwproc] Recv'd Img size: 114448 bytes
12,681,275 UART: ROM Fatal Error: 0x000B0017
12,684,347 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,027,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,171,456 UART:
2,171,862 UART: Running Caliptra ROM ...
2,173,021 UART:
2,173,191 UART: [state] CFI Enabled
2,174,169 UART: [state] LifecycleState = Unprovisioned
2,175,808 UART: [state] DebugLocked = No
2,176,912 UART: [state] WD Timer not started. Device not locked for debugging
2,179,392 UART: [kat] SHA2-256
2,180,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,068 UART: [kat] ++
2,183,524 UART: [kat] sha1
2,184,037 UART: [kat] SHA2-256
2,184,781 UART: [kat] SHA2-384
2,185,447 UART: [kat] SHA2-512-ACC
2,186,325 UART: [kat] ECC-384
3,283,000 UART: [kat] HMAC-384Kdf
3,295,783 UART: [kat] LMS
3,825,293 UART: [kat] --
3,828,960 UART: [cold-reset] ++
3,829,860 UART: [fht] FHT @ 0x50003400
3,841,940 UART: [idev] ++
3,842,513 UART: [idev] CDI.KEYID = 6
3,843,441 UART: [idev] SUBJECT.KEYID = 7
3,844,658 UART: [idev] UDS.KEYID = 0
3,860,414 UART: [idev] Erasing UDS.KEYID = 0
6,319,754 UART: [idev] Sha1 KeyId Algorithm
6,343,036 UART: [idev] --
6,347,134 UART: [ldev] ++
6,347,697 UART: [ldev] CDI.KEYID = 6
6,348,601 UART: [ldev] SUBJECT.KEYID = 5
6,349,760 UART: [ldev] AUTHORITY.KEYID = 7
6,351,045 UART: [ldev] FE.KEYID = 1
6,362,013 UART: [ldev] Erasing FE.KEYID = 1
8,842,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,349 UART: [ldev] --
10,631,479 UART: [fwproc] Wait for Commands...
10,634,336 UART: [fwproc] Recv command 0x46574c44
10,636,427 UART: [fwproc] Recv'd Img size: 114448 bytes
12,686,597 UART: ROM Fatal Error: 0x000B0017
12,689,564 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
2,021,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,456,125 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
2,021,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,445,446 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
2,020,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,457,776 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,020,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,232,196 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,026,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,231,585 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
2,031,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,263,462 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
2,020,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,450,860 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,503 writing to cptra_bootfsm_go
2,020,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,451,194 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,026,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,453,838 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,400 UART: [kat] HMAC-384Kdf
920,966 UART: [kat] LMS
1,169,278 UART: [kat] --
1,170,157 UART: [cold-reset] ++
1,170,549 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,182,241 UART: [idev] Erasing UDS.KEYID = 0
1,199,413 UART: [idev] Sha1 KeyId Algorithm
1,208,161 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,215,800 UART: [ldev] Erasing FE.KEYID = 1
1,241,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,092 UART: [fwproc] Wait for Commands...
1,281,851 UART: [fwproc] Recv command 0x46574c44
1,282,584 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,590 UART: ROM Fatal Error: 0x000B0017
1,331,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,846 UART: [kat] LMS
1,169,158 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,239 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,182,233 UART: [idev] Erasing UDS.KEYID = 0
1,199,535 UART: [idev] Sha1 KeyId Algorithm
1,208,633 UART: [idev] --
1,209,828 UART: [ldev] ++
1,209,996 UART: [ldev] CDI.KEYID = 6
1,210,360 UART: [ldev] SUBJECT.KEYID = 5
1,210,787 UART: [ldev] AUTHORITY.KEYID = 7
1,211,250 UART: [ldev] FE.KEYID = 1
1,216,428 UART: [ldev] Erasing FE.KEYID = 1
1,243,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,152 UART: [ldev] --
1,282,490 UART: [fwproc] Wait for Commands...
1,283,127 UART: [fwproc] Recv command 0x46574c44
1,283,860 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,252 UART: ROM Fatal Error: 0x000B0017
1,332,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,984 UART: [kat] SHA2-256
891,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,663 UART: [kat] ++
895,815 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,314 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,169,847 UART: [cold-reset] ++
1,170,361 UART: [fht] FHT @ 0x50003400
1,173,169 UART: [idev] ++
1,173,337 UART: [idev] CDI.KEYID = 6
1,173,698 UART: [idev] SUBJECT.KEYID = 7
1,174,123 UART: [idev] UDS.KEYID = 0
1,181,991 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,772 UART: [ldev] ++
1,208,940 UART: [ldev] CDI.KEYID = 6
1,209,304 UART: [ldev] SUBJECT.KEYID = 5
1,209,731 UART: [ldev] AUTHORITY.KEYID = 7
1,210,194 UART: [ldev] FE.KEYID = 1
1,215,580 UART: [ldev] Erasing FE.KEYID = 1
1,242,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,866 UART: [ldev] --
1,281,184 UART: [fwproc] Wait for Commands...
1,281,963 UART: [fwproc] Recv command 0x46574c44
1,282,696 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,104 UART: ROM Fatal Error: 0x000B0017
1,331,261 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,222 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,420 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,880 UART: [kat] SHA2-256
901,820 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
916,015 UART: [kat] HMAC-384Kdf
920,625 UART: [kat] LMS
1,168,937 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,173,182 UART: [idev] ++
1,173,350 UART: [idev] CDI.KEYID = 6
1,173,711 UART: [idev] SUBJECT.KEYID = 7
1,174,136 UART: [idev] UDS.KEYID = 0
1,182,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha1 KeyId Algorithm
1,208,116 UART: [idev] --
1,208,961 UART: [ldev] ++
1,209,129 UART: [ldev] CDI.KEYID = 6
1,209,493 UART: [ldev] SUBJECT.KEYID = 5
1,209,920 UART: [ldev] AUTHORITY.KEYID = 7
1,210,383 UART: [ldev] FE.KEYID = 1
1,215,673 UART: [ldev] Erasing FE.KEYID = 1
1,241,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,817 UART: [ldev] --
1,281,245 UART: [fwproc] Wait for Commands...
1,281,944 UART: [fwproc] Recv command 0x46574c44
1,282,677 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,109 UART: ROM Fatal Error: 0x000B0017
1,330,266 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Unprovisioned
85,602 UART: [state] DebugLocked = No
86,094 UART: [state] WD Timer not started. Device not locked for debugging
87,329 UART: [kat] SHA2-256
890,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,008 UART: [kat] ++
895,160 UART: [kat] sha1
899,470 UART: [kat] SHA2-256
901,410 UART: [kat] SHA2-384
904,271 UART: [kat] SHA2-512-ACC
906,172 UART: [kat] ECC-384
916,015 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,858 UART: [cold-reset] ++
1,170,408 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,181,790 UART: [idev] Erasing UDS.KEYID = 0
1,198,558 UART: [idev] Sha1 KeyId Algorithm
1,207,450 UART: [idev] --
1,208,459 UART: [ldev] ++
1,208,627 UART: [ldev] CDI.KEYID = 6
1,208,991 UART: [ldev] SUBJECT.KEYID = 5
1,209,418 UART: [ldev] AUTHORITY.KEYID = 7
1,209,881 UART: [ldev] FE.KEYID = 1
1,215,009 UART: [ldev] Erasing FE.KEYID = 1
1,241,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,431 UART: [ldev] --
1,280,883 UART: [fwproc] Wait for Commands...
1,281,702 UART: [fwproc] Recv command 0x46574c44
1,282,435 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,299 UART: ROM Fatal Error: 0x000B0017
1,331,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,361 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,984 UART: [fht] FHT @ 0x50003400
1,173,798 UART: [idev] ++
1,173,966 UART: [idev] CDI.KEYID = 6
1,174,327 UART: [idev] SUBJECT.KEYID = 7
1,174,752 UART: [idev] UDS.KEYID = 0
1,183,028 UART: [idev] Erasing UDS.KEYID = 0
1,200,308 UART: [idev] Sha1 KeyId Algorithm
1,209,116 UART: [idev] --
1,210,177 UART: [ldev] ++
1,210,345 UART: [ldev] CDI.KEYID = 6
1,210,709 UART: [ldev] SUBJECT.KEYID = 5
1,211,136 UART: [ldev] AUTHORITY.KEYID = 7
1,211,599 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,242,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,027 UART: [ldev] --
1,281,355 UART: [fwproc] Wait for Commands...
1,282,020 UART: [fwproc] Recv command 0x46574c44
1,282,753 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,967 UART: ROM Fatal Error: 0x000B0017
1,330,124 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,575 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,208 UART: [kat] SHA2-256
890,758 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,887 UART: [kat] ++
895,039 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,316 UART: [kat] HMAC-384Kdf
919,862 UART: [kat] LMS
1,168,174 UART: [kat] --
1,169,359 UART: [cold-reset] ++
1,169,879 UART: [fht] FHT @ 0x50003400
1,172,383 UART: [idev] ++
1,172,551 UART: [idev] CDI.KEYID = 6
1,172,912 UART: [idev] SUBJECT.KEYID = 7
1,173,337 UART: [idev] UDS.KEYID = 0
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,198,325 UART: [idev] Sha1 KeyId Algorithm
1,207,025 UART: [idev] --
1,207,866 UART: [ldev] ++
1,208,034 UART: [ldev] CDI.KEYID = 6
1,208,398 UART: [ldev] SUBJECT.KEYID = 5
1,208,825 UART: [ldev] AUTHORITY.KEYID = 7
1,209,288 UART: [ldev] FE.KEYID = 1
1,214,396 UART: [ldev] Erasing FE.KEYID = 1
1,240,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,738 UART: [ldev] --
1,280,252 UART: [fwproc] Wait for Commands...
1,280,857 UART: [fwproc] Recv command 0x46574c44
1,281,590 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,658 UART: ROM Fatal Error: 0x000B0017
1,330,815 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,842 UART: [kat] SHA2-512-ACC
906,743 UART: [kat] ECC-384
916,496 UART: [kat] HMAC-384Kdf
921,122 UART: [kat] LMS
1,169,434 UART: [kat] --
1,170,317 UART: [cold-reset] ++
1,170,851 UART: [fht] FHT @ 0x50003400
1,173,431 UART: [idev] ++
1,173,599 UART: [idev] CDI.KEYID = 6
1,173,960 UART: [idev] SUBJECT.KEYID = 7
1,174,385 UART: [idev] UDS.KEYID = 0
1,182,077 UART: [idev] Erasing UDS.KEYID = 0
1,198,875 UART: [idev] Sha1 KeyId Algorithm
1,207,827 UART: [idev] --
1,208,722 UART: [ldev] ++
1,208,890 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,681 UART: [ldev] AUTHORITY.KEYID = 7
1,210,144 UART: [ldev] FE.KEYID = 1
1,215,226 UART: [ldev] Erasing FE.KEYID = 1
1,240,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,846 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,281,009 UART: [fwproc] Recv command 0x46574c44
1,281,742 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,390 UART: ROM Fatal Error: 0x000B0017
1,329,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
920,874 UART: [kat] LMS
1,169,186 UART: [kat] --
1,169,895 UART: [cold-reset] ++
1,170,473 UART: [fht] FHT @ 0x50003400
1,173,133 UART: [idev] ++
1,173,301 UART: [idev] CDI.KEYID = 6
1,173,662 UART: [idev] SUBJECT.KEYID = 7
1,174,087 UART: [idev] UDS.KEYID = 0
1,182,279 UART: [idev] Erasing UDS.KEYID = 0
1,198,629 UART: [idev] Sha1 KeyId Algorithm
1,207,651 UART: [idev] --
1,208,604 UART: [ldev] ++
1,208,772 UART: [ldev] CDI.KEYID = 6
1,209,136 UART: [ldev] SUBJECT.KEYID = 5
1,209,563 UART: [ldev] AUTHORITY.KEYID = 7
1,210,026 UART: [ldev] FE.KEYID = 1
1,215,306 UART: [ldev] Erasing FE.KEYID = 1
1,242,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,298 UART: [ldev] --
1,281,684 UART: [fwproc] Wait for Commands...
1,282,471 UART: [fwproc] Recv command 0x46574c44
1,283,204 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,420 UART: ROM Fatal Error: 0x000B0017
1,331,577 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,956 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,720 UART: [fht] FHT @ 0x50003400
1,173,344 UART: [idev] ++
1,173,512 UART: [idev] CDI.KEYID = 6
1,173,873 UART: [idev] SUBJECT.KEYID = 7
1,174,298 UART: [idev] UDS.KEYID = 0
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,395 UART: [ldev] ++
1,209,563 UART: [ldev] CDI.KEYID = 6
1,209,927 UART: [ldev] SUBJECT.KEYID = 5
1,210,354 UART: [ldev] AUTHORITY.KEYID = 7
1,210,817 UART: [ldev] FE.KEYID = 1
1,216,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,283 UART: [ldev] --
1,281,763 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,063 UART: ROM Fatal Error: 0x000B0017
1,330,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,314 UART: [idev] ++
1,173,482 UART: [idev] CDI.KEYID = 6
1,173,843 UART: [idev] SUBJECT.KEYID = 7
1,174,268 UART: [idev] UDS.KEYID = 0
1,182,422 UART: [idev] Erasing UDS.KEYID = 0
1,199,676 UART: [idev] Sha1 KeyId Algorithm
1,208,538 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,233 UART: [ldev] SUBJECT.KEYID = 5
1,210,660 UART: [ldev] AUTHORITY.KEYID = 7
1,211,123 UART: [ldev] FE.KEYID = 1
1,216,335 UART: [ldev] Erasing FE.KEYID = 1
1,242,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,851 UART: [ldev] --
1,281,185 UART: [fwproc] Wait for Commands...
1,281,808 UART: [fwproc] Recv command 0x46574c44
1,282,541 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,515 UART: ROM Fatal Error: 0x000B0017
1,330,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,675 UART: [kat] LMS
1,168,987 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,170,166 UART: [fht] FHT @ 0x50003400
1,172,868 UART: [idev] ++
1,173,036 UART: [idev] CDI.KEYID = 6
1,173,397 UART: [idev] SUBJECT.KEYID = 7
1,173,822 UART: [idev] UDS.KEYID = 0
1,181,910 UART: [idev] Erasing UDS.KEYID = 0
1,198,530 UART: [idev] Sha1 KeyId Algorithm
1,207,266 UART: [idev] --
1,208,345 UART: [ldev] ++
1,208,513 UART: [ldev] CDI.KEYID = 6
1,208,877 UART: [ldev] SUBJECT.KEYID = 5
1,209,304 UART: [ldev] AUTHORITY.KEYID = 7
1,209,767 UART: [ldev] FE.KEYID = 1
1,215,189 UART: [ldev] Erasing FE.KEYID = 1
1,241,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,875 UART: [ldev] --
1,281,187 UART: [fwproc] Wait for Commands...
1,281,882 UART: [fwproc] Recv command 0x46574c44
1,282,615 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,221 UART: ROM Fatal Error: 0x000B0017
1,330,378 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,345 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,977 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,335 UART: [idev] ++
1,173,503 UART: [idev] CDI.KEYID = 6
1,173,864 UART: [idev] SUBJECT.KEYID = 7
1,174,289 UART: [idev] UDS.KEYID = 0
1,182,265 UART: [idev] Erasing UDS.KEYID = 0
1,199,661 UART: [idev] Sha1 KeyId Algorithm
1,208,559 UART: [idev] --
1,209,688 UART: [ldev] ++
1,209,856 UART: [ldev] CDI.KEYID = 6
1,210,220 UART: [ldev] SUBJECT.KEYID = 5
1,210,647 UART: [ldev] AUTHORITY.KEYID = 7
1,211,110 UART: [ldev] FE.KEYID = 1
1,216,474 UART: [ldev] Erasing FE.KEYID = 1
1,242,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,280 UART: [fwproc] Wait for Commands...
1,282,085 UART: [fwproc] Recv command 0x46574c44
1,282,818 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,936 UART: ROM Fatal Error: 0x000B0017
1,332,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,991 UART: [kat] SHA2-256
901,931 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
921,176 UART: [kat] LMS
1,169,488 UART: [kat] --
1,170,637 UART: [cold-reset] ++
1,171,011 UART: [fht] FHT @ 0x50003400
1,173,837 UART: [idev] ++
1,174,005 UART: [idev] CDI.KEYID = 6
1,174,366 UART: [idev] SUBJECT.KEYID = 7
1,174,791 UART: [idev] UDS.KEYID = 0
1,182,665 UART: [idev] Erasing UDS.KEYID = 0
1,199,811 UART: [idev] Sha1 KeyId Algorithm
1,208,463 UART: [idev] --
1,209,506 UART: [ldev] ++
1,209,674 UART: [ldev] CDI.KEYID = 6
1,210,038 UART: [ldev] SUBJECT.KEYID = 5
1,210,465 UART: [ldev] AUTHORITY.KEYID = 7
1,210,928 UART: [ldev] FE.KEYID = 1
1,216,288 UART: [ldev] Erasing FE.KEYID = 1
1,242,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,534 UART: [ldev] --
1,282,042 UART: [fwproc] Wait for Commands...
1,282,623 UART: [fwproc] Recv command 0x46574c44
1,283,356 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,382 UART: ROM Fatal Error: 0x000B0017
1,331,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
900,087 UART: [kat] SHA2-256
902,027 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
916,272 UART: [kat] HMAC-384Kdf
920,766 UART: [kat] LMS
1,169,078 UART: [kat] --
1,170,021 UART: [cold-reset] ++
1,170,497 UART: [fht] FHT @ 0x50003400
1,173,209 UART: [idev] ++
1,173,377 UART: [idev] CDI.KEYID = 6
1,173,738 UART: [idev] SUBJECT.KEYID = 7
1,174,163 UART: [idev] UDS.KEYID = 0
1,182,107 UART: [idev] Erasing UDS.KEYID = 0
1,199,427 UART: [idev] Sha1 KeyId Algorithm
1,208,105 UART: [idev] --
1,209,316 UART: [ldev] ++
1,209,484 UART: [ldev] CDI.KEYID = 6
1,209,848 UART: [ldev] SUBJECT.KEYID = 5
1,210,275 UART: [ldev] AUTHORITY.KEYID = 7
1,210,738 UART: [ldev] FE.KEYID = 1
1,215,960 UART: [ldev] Erasing FE.KEYID = 1
1,242,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,612 UART: [ldev] --
1,281,882 UART: [fwproc] Wait for Commands...
1,282,653 UART: [fwproc] Recv command 0x46574c44
1,283,386 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,990 UART: ROM Fatal Error: 0x000B0017
1,331,147 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,490 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,696 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,802 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,146 UART: [idev] ++
1,173,314 UART: [idev] CDI.KEYID = 6
1,173,675 UART: [idev] SUBJECT.KEYID = 7
1,174,100 UART: [idev] UDS.KEYID = 0
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,354 UART: [idev] --
1,209,505 UART: [ldev] ++
1,209,673 UART: [ldev] CDI.KEYID = 6
1,210,037 UART: [ldev] SUBJECT.KEYID = 5
1,210,464 UART: [ldev] AUTHORITY.KEYID = 7
1,210,927 UART: [ldev] FE.KEYID = 1
1,216,203 UART: [ldev] Erasing FE.KEYID = 1
1,242,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,999 UART: [ldev] --
1,281,283 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,721 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,031 UART: ROM Fatal Error: 0x000B0017
1,330,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,591 UART: [kat] SHA2-512-ACC
906,492 UART: [kat] ECC-384
916,013 UART: [kat] HMAC-384Kdf
920,703 UART: [kat] LMS
1,169,015 UART: [kat] --
1,169,814 UART: [cold-reset] ++
1,170,392 UART: [fht] FHT @ 0x50003400
1,172,830 UART: [idev] ++
1,172,998 UART: [idev] CDI.KEYID = 6
1,173,359 UART: [idev] SUBJECT.KEYID = 7
1,173,784 UART: [idev] UDS.KEYID = 0
1,181,808 UART: [idev] Erasing UDS.KEYID = 0
1,198,488 UART: [idev] Sha1 KeyId Algorithm
1,207,238 UART: [idev] --
1,208,421 UART: [ldev] ++
1,208,589 UART: [ldev] CDI.KEYID = 6
1,208,953 UART: [ldev] SUBJECT.KEYID = 5
1,209,380 UART: [ldev] AUTHORITY.KEYID = 7
1,209,843 UART: [ldev] FE.KEYID = 1
1,215,137 UART: [ldev] Erasing FE.KEYID = 1
1,242,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,085 UART: [ldev] --
1,281,601 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x46574c44
1,283,055 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,275 UART: ROM Fatal Error: 0x000B0017
1,331,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,587 UART: [kat] HMAC-384Kdf
921,367 UART: [kat] LMS
1,169,679 UART: [kat] --
1,170,794 UART: [cold-reset] ++
1,171,358 UART: [fht] FHT @ 0x50003400
1,173,864 UART: [idev] ++
1,174,032 UART: [idev] CDI.KEYID = 6
1,174,393 UART: [idev] SUBJECT.KEYID = 7
1,174,818 UART: [idev] UDS.KEYID = 0
1,182,730 UART: [idev] Erasing UDS.KEYID = 0
1,200,192 UART: [idev] Sha1 KeyId Algorithm
1,208,938 UART: [idev] --
1,210,027 UART: [ldev] ++
1,210,195 UART: [ldev] CDI.KEYID = 6
1,210,559 UART: [ldev] SUBJECT.KEYID = 5
1,210,986 UART: [ldev] AUTHORITY.KEYID = 7
1,211,449 UART: [ldev] FE.KEYID = 1
1,216,985 UART: [ldev] Erasing FE.KEYID = 1
1,243,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,257 UART: [ldev] --
1,282,761 UART: [fwproc] Wait for Commands...
1,283,520 UART: [fwproc] Recv command 0x46574c44
1,284,253 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,437 UART: ROM Fatal Error: 0x000B0017
1,332,594 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,583 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,024,096 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,230 UART:
2,168,628 UART: Running Caliptra ROM ...
2,169,799 UART:
2,169,972 UART: [state] CFI Enabled
2,170,952 UART: [state] LifecycleState = Unprovisioned
2,172,608 UART: [state] DebugLocked = No
2,173,716 UART: [state] WD Timer not started. Device not locked for debugging
2,176,185 UART: [kat] SHA2-256
2,176,852 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,857 UART: [kat] ++
2,180,340 UART: [kat] sha1
2,180,893 UART: [kat] SHA2-256
2,181,558 UART: [kat] SHA2-384
2,182,214 UART: [kat] SHA2-512-ACC
2,183,013 UART: [kat] ECC-384
3,773,984 UART: [kat] HMAC-384Kdf
3,801,569 UART: [kat] LMS
4,874,720 UART: [kat] --
4,879,284 UART: [cold-reset] ++
4,882,031 UART: [fht] FHT @ 0x50003400
4,893,500 UART: [idev] ++
4,894,170 UART: [idev] CDI.KEYID = 6
4,895,326 UART: [idev] SUBJECT.KEYID = 7
4,896,540 UART: [idev] UDS.KEYID = 0
4,928,905 UART: [idev] Erasing UDS.KEYID = 0
8,245,218 UART: [idev] Sha1 KeyId Algorithm
8,267,715 UART: [idev] --
8,270,939 UART: [ldev] ++
8,271,516 UART: [ldev] CDI.KEYID = 6
8,272,760 UART: [ldev] SUBJECT.KEYID = 5
8,273,919 UART: [ldev] AUTHORITY.KEYID = 7
8,275,147 UART: [ldev] FE.KEYID = 1
8,315,142 UART: [ldev] Erasing FE.KEYID = 1
11,651,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,091 UART: [ldev] --
14,038,119 UART: [fwproc] Wait for Commands...
14,039,891 UART: [fwproc] Recv command 0x46574c44
14,042,173 UART: [fwproc] Recv'd Img size: 114124 bytes
16,755,831 UART: ROM Fatal Error: 0x000B003B
16,759,245 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,022,559 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,506,127 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
2,025,570 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,170,224 UART:
2,170,632 UART: Running Caliptra ROM ...
2,171,730 UART:
2,171,881 UART: [state] CFI Enabled
2,172,854 UART: [state] LifecycleState = Unprovisioned
2,174,493 UART: [state] DebugLocked = No
2,175,510 UART: [state] WD Timer not started. Device not locked for debugging
2,177,964 UART: [kat] SHA2-256
2,178,620 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,616 UART: [kat] ++
2,182,056 UART: [kat] sha1
2,182,561 UART: [kat] SHA2-256
2,183,210 UART: [kat] SHA2-384
2,183,856 UART: [kat] SHA2-512-ACC
2,184,647 UART: [kat] ECC-384
4,097,439 UART: [kat] HMAC-384Kdf
4,110,420 UART: [kat] LMS
5,183,617 UART: [kat] --
5,187,495 UART: [cold-reset] ++
5,189,272 UART: [fht] FHT @ 0x50003400
5,199,657 UART: [idev] ++
5,200,378 UART: [idev] CDI.KEYID = 6
5,201,529 UART: [idev] SUBJECT.KEYID = 7
5,203,013 UART: [idev] UDS.KEYID = 0
5,220,857 UART: [idev] Erasing UDS.KEYID = 0
8,493,293 UART: [idev] Sha1 KeyId Algorithm
8,516,040 UART: [idev] --
8,520,310 UART: [ldev] ++
8,520,869 UART: [ldev] CDI.KEYID = 6
8,522,025 UART: [ldev] SUBJECT.KEYID = 5
8,523,563 UART: [ldev] AUTHORITY.KEYID = 7
8,525,040 UART: [ldev] FE.KEYID = 1
8,537,540 UART: [ldev] Erasing FE.KEYID = 1
11,826,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,705 UART: [ldev] --
14,192,375 UART: [fwproc] Wait for Commands...
14,195,113 UART: [fwproc] Recv command 0x46574c44
14,197,429 UART: [fwproc] Recv'd Img size: 114124 bytes
16,902,218 UART: ROM Fatal Error: 0x000B003B
16,905,676 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
2,028,627 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,716,474 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,026,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,171,359 UART:
2,171,770 UART: Running Caliptra ROM ...
2,172,855 UART:
2,173,008 UART: [state] CFI Enabled
2,173,992 UART: [state] LifecycleState = Unprovisioned
2,175,644 UART: [state] DebugLocked = No
2,176,665 UART: [state] WD Timer not started. Device not locked for debugging
2,179,139 UART: [kat] SHA2-256
2,179,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,819 UART: [kat] ++
2,183,270 UART: [kat] sha1
2,183,804 UART: [kat] SHA2-256
2,184,554 UART: [kat] SHA2-384
2,185,220 UART: [kat] SHA2-512-ACC
2,186,052 UART: [kat] ECC-384
2,945,264 UART: [kat] HMAC-384Kdf
2,970,089 UART: [kat] LMS
3,499,526 UART: [kat] --
3,503,451 UART: [cold-reset] ++
3,505,712 UART: [fht] FHT @ 0x50003400
3,515,881 UART: [idev] ++
3,516,457 UART: [idev] CDI.KEYID = 6
3,517,338 UART: [idev] SUBJECT.KEYID = 7
3,518,550 UART: [idev] UDS.KEYID = 0
3,542,632 UART: [idev] Erasing UDS.KEYID = 0
6,023,671 UART: [idev] Sha1 KeyId Algorithm
6,046,704 UART: [idev] --
6,050,105 UART: [ldev] ++
6,050,692 UART: [ldev] CDI.KEYID = 6
6,051,579 UART: [ldev] SUBJECT.KEYID = 5
6,052,687 UART: [ldev] AUTHORITY.KEYID = 7
6,054,037 UART: [ldev] FE.KEYID = 1
6,097,557 UART: [ldev] Erasing FE.KEYID = 1
8,599,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,577 UART: [ldev] --
10,390,308 UART: [fwproc] Wait for Commands...
10,392,521 UART: [fwproc] Recv command 0x46574c44
10,394,622 UART: [fwproc] Recv'd Img size: 114448 bytes
12,447,590 UART: ROM Fatal Error: 0x000B003B
12,450,731 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,027,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,224,724 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
2,025,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,060 UART:
2,170,474 UART: Running Caliptra ROM ...
2,171,553 UART:
2,171,708 UART: [state] CFI Enabled
2,172,683 UART: [state] LifecycleState = Unprovisioned
2,174,342 UART: [state] DebugLocked = No
2,175,365 UART: [state] WD Timer not started. Device not locked for debugging
2,177,842 UART: [kat] SHA2-256
2,178,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,520 UART: [kat] ++
2,181,969 UART: [kat] sha1
2,182,480 UART: [kat] SHA2-256
2,183,140 UART: [kat] SHA2-384
2,183,798 UART: [kat] SHA2-512-ACC
2,184,681 UART: [kat] ECC-384
3,278,983 UART: [kat] HMAC-384Kdf
3,291,995 UART: [kat] LMS
3,821,523 UART: [kat] --
3,825,264 UART: [cold-reset] ++
3,826,275 UART: [fht] FHT @ 0x50003400
3,837,277 UART: [idev] ++
3,837,870 UART: [idev] CDI.KEYID = 6
3,838,756 UART: [idev] SUBJECT.KEYID = 7
3,839,970 UART: [idev] UDS.KEYID = 0
3,856,947 UART: [idev] Erasing UDS.KEYID = 0
6,315,474 UART: [idev] Sha1 KeyId Algorithm
6,339,032 UART: [idev] --
6,342,271 UART: [ldev] ++
6,342,834 UART: [ldev] CDI.KEYID = 6
6,343,743 UART: [ldev] SUBJECT.KEYID = 5
6,344,910 UART: [ldev] AUTHORITY.KEYID = 7
6,346,139 UART: [ldev] FE.KEYID = 1
6,357,319 UART: [ldev] Erasing FE.KEYID = 1
8,831,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,513 UART: [ldev] --
10,623,801 UART: [fwproc] Wait for Commands...
10,626,893 UART: [fwproc] Recv command 0x46574c44
10,628,984 UART: [fwproc] Recv'd Img size: 114448 bytes
12,675,086 UART: ROM Fatal Error: 0x000B003B
12,678,158 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,026,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,472,263 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,028,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,222,461 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
2,025,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,457,736 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,019 UART: [kat] ++
895,171 UART: [kat] sha1
899,341 UART: [kat] SHA2-256
901,281 UART: [kat] SHA2-384
904,110 UART: [kat] SHA2-512-ACC
906,011 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,330 UART: [kat] LMS
1,168,642 UART: [kat] --
1,169,525 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,551 UART: [idev] ++
1,172,719 UART: [idev] CDI.KEYID = 6
1,173,080 UART: [idev] SUBJECT.KEYID = 7
1,173,505 UART: [idev] UDS.KEYID = 0
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,627 UART: [idev] --
1,208,672 UART: [ldev] ++
1,208,840 UART: [ldev] CDI.KEYID = 6
1,209,204 UART: [ldev] SUBJECT.KEYID = 5
1,209,631 UART: [ldev] AUTHORITY.KEYID = 7
1,210,094 UART: [ldev] FE.KEYID = 1
1,215,186 UART: [ldev] Erasing FE.KEYID = 1
1,241,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,074 UART: [ldev] --
1,280,448 UART: [fwproc] Wait for Commands...
1,281,111 UART: [fwproc] Recv command 0x46574c44
1,281,844 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,396 UART: ROM Fatal Error: 0x000B003B
1,330,555 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,590 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,861 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,364 UART: [idev] ++
1,173,532 UART: [idev] CDI.KEYID = 6
1,173,893 UART: [idev] SUBJECT.KEYID = 7
1,174,318 UART: [idev] UDS.KEYID = 0
1,182,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,216 UART: [idev] Sha1 KeyId Algorithm
1,209,144 UART: [idev] --
1,210,347 UART: [ldev] ++
1,210,515 UART: [ldev] CDI.KEYID = 6
1,210,879 UART: [ldev] SUBJECT.KEYID = 5
1,211,306 UART: [ldev] AUTHORITY.KEYID = 7
1,211,769 UART: [ldev] FE.KEYID = 1
1,217,073 UART: [ldev] Erasing FE.KEYID = 1
1,243,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,883 UART: [ldev] --
1,283,223 UART: [fwproc] Wait for Commands...
1,283,844 UART: [fwproc] Recv command 0x46574c44
1,284,577 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,599 UART: ROM Fatal Error: 0x000B003B
1,332,758 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,184 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,891 UART: [kat] SHA2-256
901,831 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,232 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,593 UART: [fht] FHT @ 0x50003400
1,173,173 UART: [idev] ++
1,173,341 UART: [idev] CDI.KEYID = 6
1,173,702 UART: [idev] SUBJECT.KEYID = 7
1,174,127 UART: [idev] UDS.KEYID = 0
1,182,059 UART: [idev] Erasing UDS.KEYID = 0
1,198,825 UART: [idev] Sha1 KeyId Algorithm
1,207,703 UART: [idev] --
1,208,672 UART: [ldev] ++
1,208,840 UART: [ldev] CDI.KEYID = 6
1,209,204 UART: [ldev] SUBJECT.KEYID = 5
1,209,631 UART: [ldev] AUTHORITY.KEYID = 7
1,210,094 UART: [ldev] FE.KEYID = 1
1,215,228 UART: [ldev] Erasing FE.KEYID = 1
1,240,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,462 UART: [ldev] --
1,279,772 UART: [fwproc] Wait for Commands...
1,280,447 UART: [fwproc] Recv command 0x46574c44
1,281,180 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,100 UART: ROM Fatal Error: 0x000B003B
1,329,259 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,462 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,465 UART: [kat] HMAC-384Kdf
920,981 UART: [kat] LMS
1,169,293 UART: [kat] --
1,170,300 UART: [cold-reset] ++
1,170,724 UART: [fht] FHT @ 0x50003400
1,173,472 UART: [idev] ++
1,173,640 UART: [idev] CDI.KEYID = 6
1,174,001 UART: [idev] SUBJECT.KEYID = 7
1,174,426 UART: [idev] UDS.KEYID = 0
1,182,532 UART: [idev] Erasing UDS.KEYID = 0
1,200,078 UART: [idev] Sha1 KeyId Algorithm
1,208,958 UART: [idev] --
1,210,127 UART: [ldev] ++
1,210,295 UART: [ldev] CDI.KEYID = 6
1,210,659 UART: [ldev] SUBJECT.KEYID = 5
1,211,086 UART: [ldev] AUTHORITY.KEYID = 7
1,211,549 UART: [ldev] FE.KEYID = 1
1,217,025 UART: [ldev] Erasing FE.KEYID = 1
1,243,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,815 UART: [ldev] --
1,282,233 UART: [fwproc] Wait for Commands...
1,283,036 UART: [fwproc] Recv command 0x46574c44
1,283,769 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,991 UART: ROM Fatal Error: 0x000B003B
1,331,150 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,465 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,352 UART: [kat] SHA2-256
890,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,031 UART: [kat] ++
895,183 UART: [kat] sha1
899,353 UART: [kat] SHA2-256
901,293 UART: [kat] SHA2-384
904,118 UART: [kat] SHA2-512-ACC
906,019 UART: [kat] ECC-384
915,716 UART: [kat] HMAC-384Kdf
920,178 UART: [kat] LMS
1,168,490 UART: [kat] --
1,169,343 UART: [cold-reset] ++
1,169,799 UART: [fht] FHT @ 0x50003400
1,172,427 UART: [idev] ++
1,172,595 UART: [idev] CDI.KEYID = 6
1,172,956 UART: [idev] SUBJECT.KEYID = 7
1,173,381 UART: [idev] UDS.KEYID = 0
1,181,501 UART: [idev] Erasing UDS.KEYID = 0
1,197,993 UART: [idev] Sha1 KeyId Algorithm
1,206,891 UART: [idev] --
1,207,720 UART: [ldev] ++
1,207,888 UART: [ldev] CDI.KEYID = 6
1,208,252 UART: [ldev] SUBJECT.KEYID = 5
1,208,679 UART: [ldev] AUTHORITY.KEYID = 7
1,209,142 UART: [ldev] FE.KEYID = 1
1,214,598 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,748 UART: [ldev] --
1,280,084 UART: [fwproc] Wait for Commands...
1,280,723 UART: [fwproc] Recv command 0x46574c44
1,281,456 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,498 UART: ROM Fatal Error: 0x000B003B
1,330,657 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,798 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,684 UART: [cold-reset] ++
1,170,234 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,181,668 UART: [idev] Erasing UDS.KEYID = 0
1,198,294 UART: [idev] Sha1 KeyId Algorithm
1,207,154 UART: [idev] --
1,208,221 UART: [ldev] ++
1,208,389 UART: [ldev] CDI.KEYID = 6
1,208,753 UART: [ldev] SUBJECT.KEYID = 5
1,209,180 UART: [ldev] AUTHORITY.KEYID = 7
1,209,643 UART: [ldev] FE.KEYID = 1
1,214,711 UART: [ldev] Erasing FE.KEYID = 1
1,241,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,445 UART: [ldev] --
1,280,741 UART: [fwproc] Wait for Commands...
1,281,392 UART: [fwproc] Recv command 0x46574c44
1,282,125 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,543 UART: ROM Fatal Error: 0x000B003B
1,329,702 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,473 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
2,021,435 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,165,623 UART:
2,166,016 UART: Running Caliptra ROM ...
2,167,192 UART:
2,167,392 UART: [state] CFI Enabled
2,168,279 UART: [state] LifecycleState = Unprovisioned
2,169,922 UART: [state] DebugLocked = No
2,171,033 UART: [state] WD Timer not started. Device not locked for debugging
2,173,530 UART: [kat] SHA2-256
2,174,196 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,198 UART: [kat] ++
2,177,649 UART: [kat] sha1
2,178,161 UART: [kat] SHA2-256
2,178,899 UART: [kat] SHA2-384
2,179,566 UART: [kat] SHA2-512-ACC
2,180,454 UART: [kat] ECC-384
3,773,503 UART: [kat] HMAC-384Kdf
3,801,201 UART: [kat] LMS
4,874,346 UART: [kat] --
4,879,491 UART: [cold-reset] ++
4,881,923 UART: [fht] FHT @ 0x50003400
4,894,422 UART: [idev] ++
4,895,103 UART: [idev] CDI.KEYID = 6
4,896,290 UART: [idev] SUBJECT.KEYID = 7
4,897,468 UART: [idev] UDS.KEYID = 0
4,929,823 UART: [idev] Erasing UDS.KEYID = 0
8,243,480 UART: [idev] Sha1 KeyId Algorithm
8,265,898 UART: [idev] --
8,269,296 UART: [ldev] ++
8,269,862 UART: [ldev] CDI.KEYID = 6
8,271,100 UART: [ldev] SUBJECT.KEYID = 5
8,272,150 UART: [ldev] AUTHORITY.KEYID = 7
8,273,435 UART: [ldev] FE.KEYID = 1
8,317,818 UART: [ldev] Erasing FE.KEYID = 1
11,652,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,993,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,828 UART: [ldev] --
14,017,407 UART: [fwproc] Wait for Commands...
14,019,180 UART: [fwproc] Recv command 0x46574c44
14,021,501 UART: [fwproc] Recv'd Img size: 114124 bytes
16,717,316 UART: ROM Fatal Error: 0x000B0010
16,720,721 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
2,020,073 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,568,190 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,023,375 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,167,485 UART:
2,167,875 UART: Running Caliptra ROM ...
2,169,049 UART:
2,169,217 UART: [state] CFI Enabled
2,170,191 UART: [state] LifecycleState = Unprovisioned
2,171,853 UART: [state] DebugLocked = No
2,172,959 UART: [state] WD Timer not started. Device not locked for debugging
2,175,657 UART: [kat] SHA2-256
2,176,329 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,340 UART: [kat] ++
2,179,784 UART: [kat] sha1
2,180,292 UART: [kat] SHA2-256
2,181,026 UART: [kat] SHA2-384
2,181,691 UART: [kat] SHA2-512-ACC
2,182,486 UART: [kat] ECC-384
4,098,538 UART: [kat] HMAC-384Kdf
4,111,213 UART: [kat] LMS
5,184,333 UART: [kat] --
5,188,939 UART: [cold-reset] ++
5,191,255 UART: [fht] FHT @ 0x50003400
5,202,457 UART: [idev] ++
5,203,146 UART: [idev] CDI.KEYID = 6
5,204,331 UART: [idev] SUBJECT.KEYID = 7
5,205,774 UART: [idev] UDS.KEYID = 0
5,223,194 UART: [idev] Erasing UDS.KEYID = 0
8,497,952 UART: [idev] Sha1 KeyId Algorithm
8,519,893 UART: [idev] --
8,524,058 UART: [ldev] ++
8,524,628 UART: [ldev] CDI.KEYID = 6
8,525,867 UART: [ldev] SUBJECT.KEYID = 5
8,527,301 UART: [ldev] AUTHORITY.KEYID = 7
8,528,783 UART: [ldev] FE.KEYID = 1
8,540,782 UART: [ldev] Erasing FE.KEYID = 1
11,833,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,142 UART: [ldev] --
14,200,815 UART: [fwproc] Wait for Commands...
14,202,743 UART: [fwproc] Recv command 0x46574c44
14,205,055 UART: [fwproc] Recv'd Img size: 114124 bytes
16,896,082 UART: ROM Fatal Error: 0x000B0010
16,899,547 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
2,022,152 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,703,496 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,021,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,888 UART:
2,167,300 UART: Running Caliptra ROM ...
2,168,471 UART:
2,168,641 UART: [state] CFI Enabled
2,169,603 UART: [state] LifecycleState = Unprovisioned
2,171,254 UART: [state] DebugLocked = No
2,172,473 UART: [state] WD Timer not started. Device not locked for debugging
2,174,962 UART: [kat] SHA2-256
2,175,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,631 UART: [kat] ++
2,179,109 UART: [kat] sha1
2,179,625 UART: [kat] SHA2-256
2,180,368 UART: [kat] SHA2-384
2,181,031 UART: [kat] SHA2-512-ACC
2,181,919 UART: [kat] ECC-384
2,947,859 UART: [kat] HMAC-384Kdf
2,972,115 UART: [kat] LMS
3,501,556 UART: [kat] --
3,506,921 UART: [cold-reset] ++
3,508,733 UART: [fht] FHT @ 0x50003400
3,520,917 UART: [idev] ++
3,521,484 UART: [idev] CDI.KEYID = 6
3,522,365 UART: [idev] SUBJECT.KEYID = 7
3,523,556 UART: [idev] UDS.KEYID = 0
3,544,337 UART: [idev] Erasing UDS.KEYID = 0
6,028,536 UART: [idev] Sha1 KeyId Algorithm
6,051,291 UART: [idev] --
6,056,260 UART: [ldev] ++
6,056,832 UART: [ldev] CDI.KEYID = 6
6,057,714 UART: [ldev] SUBJECT.KEYID = 5
6,058,927 UART: [ldev] AUTHORITY.KEYID = 7
6,060,219 UART: [ldev] FE.KEYID = 1
6,099,781 UART: [ldev] Erasing FE.KEYID = 1
8,601,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,676 UART: [ldev] --
10,414,699 UART: [fwproc] Wait for Commands...
10,417,560 UART: [fwproc] Recv command 0x46574c44
10,419,658 UART: [fwproc] Recv'd Img size: 114448 bytes
12,463,981 UART: ROM Fatal Error: 0x000B0010
12,467,108 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
2,027,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,237,631 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
2,022,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,166,601 UART:
2,166,993 UART: Running Caliptra ROM ...
2,168,078 UART:
2,168,236 UART: [state] CFI Enabled
2,169,199 UART: [state] LifecycleState = Unprovisioned
2,170,845 UART: [state] DebugLocked = No
2,171,870 UART: [state] WD Timer not started. Device not locked for debugging
2,174,328 UART: [kat] SHA2-256
2,175,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,009 UART: [kat] ++
2,178,460 UART: [kat] sha1
2,178,967 UART: [kat] SHA2-256
2,179,624 UART: [kat] SHA2-384
2,180,279 UART: [kat] SHA2-512-ACC
2,181,112 UART: [kat] ECC-384
3,280,905 UART: [kat] HMAC-384Kdf
3,294,284 UART: [kat] LMS
3,823,790 UART: [kat] --
3,828,805 UART: [cold-reset] ++
3,830,306 UART: [fht] FHT @ 0x50003400
3,840,368 UART: [idev] ++
3,840,928 UART: [idev] CDI.KEYID = 6
3,841,832 UART: [idev] SUBJECT.KEYID = 7
3,843,048 UART: [idev] UDS.KEYID = 0
3,858,721 UART: [idev] Erasing UDS.KEYID = 0
6,313,820 UART: [idev] Sha1 KeyId Algorithm
6,337,883 UART: [idev] --
6,342,265 UART: [ldev] ++
6,342,841 UART: [ldev] CDI.KEYID = 6
6,343,751 UART: [ldev] SUBJECT.KEYID = 5
6,344,908 UART: [ldev] AUTHORITY.KEYID = 7
6,346,198 UART: [ldev] FE.KEYID = 1
6,357,235 UART: [ldev] Erasing FE.KEYID = 1
8,833,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,801 UART: [ldev] --
10,625,174 UART: [fwproc] Wait for Commands...
10,626,808 UART: [fwproc] Recv command 0x46574c44
10,628,916 UART: [fwproc] Recv'd Img size: 114448 bytes
12,668,801 UART: ROM Fatal Error: 0x000B0010
12,671,887 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
2,023,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,444,429 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
2,029,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,244,244 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
2,029,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,439,936 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,898 UART: [kat] LMS
1,169,210 UART: [kat] --
1,170,261 UART: [cold-reset] ++
1,170,703 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,182,165 UART: [idev] Erasing UDS.KEYID = 0
1,199,443 UART: [idev] Sha1 KeyId Algorithm
1,208,089 UART: [idev] --
1,209,172 UART: [ldev] ++
1,209,340 UART: [ldev] CDI.KEYID = 6
1,209,704 UART: [ldev] SUBJECT.KEYID = 5
1,210,131 UART: [ldev] AUTHORITY.KEYID = 7
1,210,594 UART: [ldev] FE.KEYID = 1
1,215,736 UART: [ldev] Erasing FE.KEYID = 1
1,241,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,982 UART: [ldev] --
1,281,358 UART: [fwproc] Wait for Commands...
1,281,969 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,537 UART: ROM Fatal Error: 0x000B0010
1,326,694 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,815 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [kat] SHA2-256
891,731 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,860 UART: [kat] ++
896,012 UART: [kat] sha1
900,358 UART: [kat] SHA2-256
902,298 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,573 UART: [kat] HMAC-384Kdf
921,079 UART: [kat] LMS
1,169,391 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,574 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,182,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,174 UART: [idev] Sha1 KeyId Algorithm
1,208,022 UART: [idev] --
1,209,251 UART: [ldev] ++
1,209,419 UART: [ldev] CDI.KEYID = 6
1,209,783 UART: [ldev] SUBJECT.KEYID = 5
1,210,210 UART: [ldev] AUTHORITY.KEYID = 7
1,210,673 UART: [ldev] FE.KEYID = 1
1,216,249 UART: [ldev] Erasing FE.KEYID = 1
1,243,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,005 UART: [ldev] --
1,282,511 UART: [fwproc] Wait for Commands...
1,283,302 UART: [fwproc] Recv command 0x46574c44
1,284,035 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,418 UART: ROM Fatal Error: 0x000B0010
1,327,575 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,942 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,484 UART: [state] LifecycleState = Unprovisioned
85,139 UART: [state] DebugLocked = No
85,685 UART: [state] WD Timer not started. Device not locked for debugging
86,998 UART: [kat] SHA2-256
890,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,677 UART: [kat] ++
894,829 UART: [kat] sha1
899,063 UART: [kat] SHA2-256
901,003 UART: [kat] SHA2-384
903,796 UART: [kat] SHA2-512-ACC
905,697 UART: [kat] ECC-384
915,242 UART: [kat] HMAC-384Kdf
919,932 UART: [kat] LMS
1,168,244 UART: [kat] --
1,169,331 UART: [cold-reset] ++
1,169,893 UART: [fht] FHT @ 0x50003400
1,172,593 UART: [idev] ++
1,172,761 UART: [idev] CDI.KEYID = 6
1,173,122 UART: [idev] SUBJECT.KEYID = 7
1,173,547 UART: [idev] UDS.KEYID = 0
1,181,989 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,617 UART: [idev] --
1,208,590 UART: [ldev] ++
1,208,758 UART: [ldev] CDI.KEYID = 6
1,209,122 UART: [ldev] SUBJECT.KEYID = 5
1,209,549 UART: [ldev] AUTHORITY.KEYID = 7
1,210,012 UART: [ldev] FE.KEYID = 1
1,215,316 UART: [ldev] Erasing FE.KEYID = 1
1,242,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,148 UART: [ldev] --
1,281,538 UART: [fwproc] Wait for Commands...
1,282,225 UART: [fwproc] Recv command 0x46574c44
1,282,958 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,437 UART: ROM Fatal Error: 0x000B0010
1,326,594 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,071 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,229 UART: [kat] LMS
1,169,541 UART: [kat] --
1,170,574 UART: [cold-reset] ++
1,171,046 UART: [fht] FHT @ 0x50003400
1,173,902 UART: [idev] ++
1,174,070 UART: [idev] CDI.KEYID = 6
1,174,431 UART: [idev] SUBJECT.KEYID = 7
1,174,856 UART: [idev] UDS.KEYID = 0
1,182,996 UART: [idev] Erasing UDS.KEYID = 0
1,200,498 UART: [idev] Sha1 KeyId Algorithm
1,209,368 UART: [idev] --
1,210,469 UART: [ldev] ++
1,210,637 UART: [ldev] CDI.KEYID = 6
1,211,001 UART: [ldev] SUBJECT.KEYID = 5
1,211,428 UART: [ldev] AUTHORITY.KEYID = 7
1,211,891 UART: [ldev] FE.KEYID = 1
1,217,245 UART: [ldev] Erasing FE.KEYID = 1
1,244,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,945 UART: [ldev] --
1,283,461 UART: [fwproc] Wait for Commands...
1,284,144 UART: [fwproc] Recv command 0x46574c44
1,284,877 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,539 UART: ROM Fatal Error: 0x000B0010
1,327,696 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,177,938 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
916,406 UART: [kat] HMAC-384Kdf
921,088 UART: [kat] LMS
1,169,400 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
1,182,195 UART: [idev] Erasing UDS.KEYID = 0
1,199,167 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,192 UART: [ldev] ++
1,209,360 UART: [ldev] CDI.KEYID = 6
1,209,724 UART: [ldev] SUBJECT.KEYID = 5
1,210,151 UART: [ldev] AUTHORITY.KEYID = 7
1,210,614 UART: [ldev] FE.KEYID = 1
1,215,812 UART: [ldev] Erasing FE.KEYID = 1
1,242,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,956 UART: [ldev] --
1,281,378 UART: [fwproc] Wait for Commands...
1,282,125 UART: [fwproc] Recv command 0x46574c44
1,282,858 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,253 UART: ROM Fatal Error: 0x000B0010
1,326,410 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,581 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,350 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,181,998 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,207,998 UART: [idev] --
1,209,131 UART: [ldev] ++
1,209,299 UART: [ldev] CDI.KEYID = 6
1,209,663 UART: [ldev] SUBJECT.KEYID = 5
1,210,090 UART: [ldev] AUTHORITY.KEYID = 7
1,210,553 UART: [ldev] FE.KEYID = 1
1,215,737 UART: [ldev] Erasing FE.KEYID = 1
1,242,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,099 UART: [ldev] --
1,281,579 UART: [fwproc] Wait for Commands...
1,282,176 UART: [fwproc] Recv command 0x46574c44
1,282,909 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,118 UART: ROM Fatal Error: 0x000B0010
1,325,275 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,177,260 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,021,879 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,166,074 UART:
2,166,481 UART: Running Caliptra ROM ...
2,167,563 UART:
2,167,719 UART: [state] CFI Enabled
2,168,696 UART: [state] LifecycleState = Unprovisioned
2,170,362 UART: [state] DebugLocked = No
2,171,472 UART: [state] WD Timer not started. Device not locked for debugging
2,173,939 UART: [kat] SHA2-256
2,174,606 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,624 UART: [kat] ++
2,178,117 UART: [kat] sha1
2,178,632 UART: [kat] SHA2-256
2,179,318 UART: [kat] SHA2-384
2,179,975 UART: [kat] SHA2-512-ACC
2,180,774 UART: [kat] ECC-384
3,776,145 UART: [kat] HMAC-384Kdf
3,802,153 UART: [kat] LMS
4,875,345 UART: [kat] --
4,878,690 UART: [cold-reset] ++
4,879,764 UART: [fht] FHT @ 0x50003400
4,890,799 UART: [idev] ++
4,891,487 UART: [idev] CDI.KEYID = 6
4,892,669 UART: [idev] SUBJECT.KEYID = 7
4,893,823 UART: [idev] UDS.KEYID = 0
4,929,949 UART: [idev] Erasing UDS.KEYID = 0
8,243,354 UART: [idev] Sha1 KeyId Algorithm
8,265,934 UART: [idev] --
8,268,359 UART: [ldev] ++
8,268,930 UART: [ldev] CDI.KEYID = 6
8,270,117 UART: [ldev] SUBJECT.KEYID = 5
8,271,280 UART: [ldev] AUTHORITY.KEYID = 7
8,272,506 UART: [ldev] FE.KEYID = 1
8,316,866 UART: [ldev] Erasing FE.KEYID = 1
11,649,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,258 UART: [ldev] --
14,037,657 UART: [fwproc] Wait for Commands...
14,040,512 UART: [fwproc] Recv command 0x46574c44
14,042,853 UART: [fwproc] Recv'd Img size: 114124 bytes
16,747,962 UART: ROM Fatal Error: 0x000B0012
16,751,366 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
2,020,866 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,533,090 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,023,612 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,168,021 UART:
2,168,419 UART: Running Caliptra ROM ...
2,169,594 UART:
2,169,763 UART: [state] CFI Enabled
2,170,728 UART: [state] LifecycleState = Unprovisioned
2,172,363 UART: [state] DebugLocked = No
2,173,461 UART: [state] WD Timer not started. Device not locked for debugging
2,175,922 UART: [kat] SHA2-256
2,176,584 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,608 UART: [kat] ++
2,180,054 UART: [kat] sha1
2,180,563 UART: [kat] SHA2-256
2,181,296 UART: [kat] SHA2-384
2,181,955 UART: [kat] SHA2-512-ACC
2,182,792 UART: [kat] ECC-384
4,099,037 UART: [kat] HMAC-384Kdf
4,111,238 UART: [kat] LMS
5,184,395 UART: [kat] --
5,190,364 UART: [cold-reset] ++
5,191,706 UART: [fht] FHT @ 0x50003400
5,204,370 UART: [idev] ++
5,205,092 UART: [idev] CDI.KEYID = 6
5,206,291 UART: [idev] SUBJECT.KEYID = 7
5,207,726 UART: [idev] UDS.KEYID = 0
5,222,490 UART: [idev] Erasing UDS.KEYID = 0
8,497,730 UART: [idev] Sha1 KeyId Algorithm
8,519,455 UART: [idev] --
8,522,047 UART: [ldev] ++
8,522,670 UART: [ldev] CDI.KEYID = 6
8,523,847 UART: [ldev] SUBJECT.KEYID = 5
8,525,335 UART: [ldev] AUTHORITY.KEYID = 7
8,526,889 UART: [ldev] FE.KEYID = 1
8,536,990 UART: [ldev] Erasing FE.KEYID = 1
11,828,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,358 UART: [ldev] --
14,195,154 UART: [fwproc] Wait for Commands...
14,198,269 UART: [fwproc] Recv command 0x46574c44
14,200,602 UART: [fwproc] Recv'd Img size: 114124 bytes
16,904,182 UART: ROM Fatal Error: 0x000B0012
16,907,647 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,023,806 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,709,526 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,028,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,173,659 UART:
2,174,080 UART: Running Caliptra ROM ...
2,175,257 UART:
2,175,434 UART: [state] CFI Enabled
2,176,413 UART: [state] LifecycleState = Unprovisioned
2,178,067 UART: [state] DebugLocked = No
2,179,178 UART: [state] WD Timer not started. Device not locked for debugging
2,181,649 UART: [kat] SHA2-256
2,182,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,324 UART: [kat] ++
2,185,775 UART: [kat] sha1
2,186,393 UART: [kat] SHA2-256
2,187,249 UART: [kat] SHA2-384
2,187,916 UART: [kat] SHA2-512-ACC
2,188,803 UART: [kat] ECC-384
2,950,002 UART: [kat] HMAC-384Kdf
2,975,698 UART: [kat] LMS
3,505,116 UART: [kat] --
3,508,779 UART: [cold-reset] ++
3,510,866 UART: [fht] FHT @ 0x50003400
3,521,136 UART: [idev] ++
3,521,701 UART: [idev] CDI.KEYID = 6
3,522,613 UART: [idev] SUBJECT.KEYID = 7
3,523,827 UART: [idev] UDS.KEYID = 0
3,547,676 UART: [idev] Erasing UDS.KEYID = 0
6,029,625 UART: [idev] Sha1 KeyId Algorithm
6,053,625 UART: [idev] --
6,058,243 UART: [ldev] ++
6,058,822 UART: [ldev] CDI.KEYID = 6
6,059,731 UART: [ldev] SUBJECT.KEYID = 5
6,060,894 UART: [ldev] AUTHORITY.KEYID = 7
6,062,132 UART: [ldev] FE.KEYID = 1
6,103,415 UART: [ldev] Erasing FE.KEYID = 1
8,605,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,513 UART: [ldev] --
10,418,195 UART: [fwproc] Wait for Commands...
10,421,001 UART: [fwproc] Recv command 0x46574c44
10,423,102 UART: [fwproc] Recv'd Img size: 114448 bytes
12,472,454 UART: ROM Fatal Error: 0x000B0012
12,475,547 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
2,025,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,254,732 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
2,024,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,082 UART:
2,169,477 UART: Running Caliptra ROM ...
2,170,644 UART:
2,170,814 UART: [state] CFI Enabled
2,171,777 UART: [state] LifecycleState = Unprovisioned
2,173,417 UART: [state] DebugLocked = No
2,174,520 UART: [state] WD Timer not started. Device not locked for debugging
2,176,979 UART: [kat] SHA2-256
2,177,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,642 UART: [kat] ++
2,181,091 UART: [kat] sha1
2,181,607 UART: [kat] SHA2-256
2,182,347 UART: [kat] SHA2-384
2,183,034 UART: [kat] SHA2-512-ACC
2,183,888 UART: [kat] ECC-384
3,281,476 UART: [kat] HMAC-384Kdf
3,293,493 UART: [kat] LMS
3,822,988 UART: [kat] --
3,827,787 UART: [cold-reset] ++
3,830,362 UART: [fht] FHT @ 0x50003400
3,842,649 UART: [idev] ++
3,843,257 UART: [idev] CDI.KEYID = 6
3,844,169 UART: [idev] SUBJECT.KEYID = 7
3,845,382 UART: [idev] UDS.KEYID = 0
3,861,944 UART: [idev] Erasing UDS.KEYID = 0
6,320,120 UART: [idev] Sha1 KeyId Algorithm
6,343,677 UART: [idev] --
6,348,037 UART: [ldev] ++
6,348,613 UART: [ldev] CDI.KEYID = 6
6,349,569 UART: [ldev] SUBJECT.KEYID = 5
6,350,722 UART: [ldev] AUTHORITY.KEYID = 7
6,351,951 UART: [ldev] FE.KEYID = 1
6,364,374 UART: [ldev] Erasing FE.KEYID = 1
8,837,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,750 UART: [ldev] --
10,625,226 UART: [fwproc] Wait for Commands...
10,627,430 UART: [fwproc] Recv command 0x46574c44
10,629,523 UART: [fwproc] Recv'd Img size: 114448 bytes
12,676,917 UART: ROM Fatal Error: 0x000B0012
12,680,053 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,023,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,445,977 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
2,029,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,235,111 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
2,023,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,459,968 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,338 UART: [kat] SHA2-256
890,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,017 UART: [kat] ++
895,169 UART: [kat] sha1
899,281 UART: [kat] SHA2-256
901,221 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,232 UART: [kat] LMS
1,168,544 UART: [kat] --
1,169,371 UART: [cold-reset] ++
1,169,837 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,181,459 UART: [idev] Erasing UDS.KEYID = 0
1,198,721 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,215,242 UART: [ldev] Erasing FE.KEYID = 1
1,241,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,188 UART: [fwproc] Wait for Commands...
1,280,927 UART: [fwproc] Recv command 0x46574c44
1,281,660 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,491 UART: ROM Fatal Error: 0x000B0012
1,329,648 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,747 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,218 UART: [kat] SHA2-256
902,158 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,169,952 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,864 UART: [idev] Sha1 KeyId Algorithm
1,208,690 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,605 UART: [ldev] Erasing FE.KEYID = 1
1,242,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,567 UART: [ldev] --
1,282,077 UART: [fwproc] Wait for Commands...
1,282,728 UART: [fwproc] Recv command 0x46574c44
1,283,461 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,436 UART: ROM Fatal Error: 0x000B0012
1,330,593 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,364 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,564 UART: [state] LifecycleState = Unprovisioned
85,219 UART: [state] DebugLocked = No
85,745 UART: [state] WD Timer not started. Device not locked for debugging
87,088 UART: [kat] SHA2-256
890,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,767 UART: [kat] ++
894,919 UART: [kat] sha1
899,219 UART: [kat] SHA2-256
901,159 UART: [kat] SHA2-384
904,014 UART: [kat] SHA2-512-ACC
905,915 UART: [kat] ECC-384
915,388 UART: [kat] HMAC-384Kdf
919,984 UART: [kat] LMS
1,168,296 UART: [kat] --
1,169,117 UART: [cold-reset] ++
1,169,447 UART: [fht] FHT @ 0x50003400
1,172,201 UART: [idev] ++
1,172,369 UART: [idev] CDI.KEYID = 6
1,172,730 UART: [idev] SUBJECT.KEYID = 7
1,173,155 UART: [idev] UDS.KEYID = 0
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,197,769 UART: [idev] Sha1 KeyId Algorithm
1,206,635 UART: [idev] --
1,207,588 UART: [ldev] ++
1,207,756 UART: [ldev] CDI.KEYID = 6
1,208,120 UART: [ldev] SUBJECT.KEYID = 5
1,208,547 UART: [ldev] AUTHORITY.KEYID = 7
1,209,010 UART: [ldev] FE.KEYID = 1
1,214,250 UART: [ldev] Erasing FE.KEYID = 1
1,240,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,038 UART: [ldev] --
1,279,340 UART: [fwproc] Wait for Commands...
1,280,115 UART: [fwproc] Recv command 0x46574c44
1,280,848 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,909 UART: ROM Fatal Error: 0x000B0012
1,328,066 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,453 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,154 UART: [fht] FHT @ 0x50003400
1,172,806 UART: [idev] ++
1,172,974 UART: [idev] CDI.KEYID = 6
1,173,335 UART: [idev] SUBJECT.KEYID = 7
1,173,760 UART: [idev] UDS.KEYID = 0
1,181,930 UART: [idev] Erasing UDS.KEYID = 0
1,199,128 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,203 UART: [ldev] ++
1,209,371 UART: [ldev] CDI.KEYID = 6
1,209,735 UART: [ldev] SUBJECT.KEYID = 5
1,210,162 UART: [ldev] AUTHORITY.KEYID = 7
1,210,625 UART: [ldev] FE.KEYID = 1
1,215,899 UART: [ldev] Erasing FE.KEYID = 1
1,241,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,479 UART: [ldev] --
1,280,833 UART: [fwproc] Wait for Commands...
1,281,610 UART: [fwproc] Recv command 0x46574c44
1,282,343 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,842 UART: ROM Fatal Error: 0x000B0012
1,329,999 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,558 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,972 UART: [kat] SHA2-256
891,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,548 UART: [kat] HMAC-384Kdf
921,102 UART: [kat] LMS
1,169,414 UART: [kat] --
1,170,321 UART: [cold-reset] ++
1,170,665 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,182,155 UART: [idev] Erasing UDS.KEYID = 0
1,199,461 UART: [idev] Sha1 KeyId Algorithm
1,208,461 UART: [idev] --
1,209,684 UART: [ldev] ++
1,209,852 UART: [ldev] CDI.KEYID = 6
1,210,216 UART: [ldev] SUBJECT.KEYID = 5
1,210,643 UART: [ldev] AUTHORITY.KEYID = 7
1,211,106 UART: [ldev] FE.KEYID = 1
1,216,298 UART: [ldev] Erasing FE.KEYID = 1
1,242,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,076 UART: [ldev] --
1,281,346 UART: [fwproc] Wait for Commands...
1,282,085 UART: [fwproc] Recv command 0x46574c44
1,282,818 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,853 UART: ROM Fatal Error: 0x000B0012
1,330,010 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,755 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
87,128 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
891,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,976 UART: [kat] ++
896,128 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,827 UART: [kat] HMAC-384Kdf
921,273 UART: [kat] LMS
1,169,585 UART: [kat] --
1,170,584 UART: [cold-reset] ++
1,171,128 UART: [fht] FHT @ 0x50003400
1,173,840 UART: [idev] ++
1,174,008 UART: [idev] CDI.KEYID = 6
1,174,369 UART: [idev] SUBJECT.KEYID = 7
1,174,794 UART: [idev] UDS.KEYID = 0
1,183,102 UART: [idev] Erasing UDS.KEYID = 0
1,199,652 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,583 UART: [ldev] ++
1,209,751 UART: [ldev] CDI.KEYID = 6
1,210,115 UART: [ldev] SUBJECT.KEYID = 5
1,210,542 UART: [ldev] AUTHORITY.KEYID = 7
1,211,005 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,593 UART: [ldev] --
1,281,889 UART: [fwproc] Wait for Commands...
1,282,622 UART: [fwproc] Recv command 0x46574c44
1,283,355 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,898 UART: ROM Fatal Error: 0x000B0012
1,331,055 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,694 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,026,211 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,170,817 UART:
2,171,209 UART: Running Caliptra ROM ...
2,172,380 UART:
2,172,557 UART: [state] CFI Enabled
2,173,542 UART: [state] LifecycleState = Unprovisioned
2,175,192 UART: [state] DebugLocked = No
2,176,301 UART: [state] WD Timer not started. Device not locked for debugging
2,178,768 UART: [kat] SHA2-256
2,179,437 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,453 UART: [kat] ++
2,182,908 UART: [kat] sha1
2,183,424 UART: [kat] SHA2-256
2,184,162 UART: [kat] SHA2-384
2,184,832 UART: [kat] SHA2-512-ACC
2,185,710 UART: [kat] ECC-384
3,779,382 UART: [kat] HMAC-384Kdf
3,804,628 UART: [kat] LMS
4,877,802 UART: [kat] --
4,883,387 UART: [cold-reset] ++
4,884,678 UART: [fht] FHT @ 0x50003400
4,895,805 UART: [idev] ++
4,896,521 UART: [idev] CDI.KEYID = 6
4,897,716 UART: [idev] SUBJECT.KEYID = 7
4,898,827 UART: [idev] UDS.KEYID = 0
4,931,552 UART: [idev] Erasing UDS.KEYID = 0
8,241,059 UART: [idev] Sha1 KeyId Algorithm
8,262,887 UART: [idev] --
8,267,405 UART: [ldev] ++
8,268,046 UART: [ldev] CDI.KEYID = 6
8,269,237 UART: [ldev] SUBJECT.KEYID = 5
8,270,396 UART: [ldev] AUTHORITY.KEYID = 7
8,271,643 UART: [ldev] FE.KEYID = 1
8,311,569 UART: [ldev] Erasing FE.KEYID = 1
11,649,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,959,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,992,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,007,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,028,996 UART: [ldev] --
14,032,816 UART: [fwproc] Wait for Commands...
14,035,950 UART: [fwproc] Recv command 0x46574c44
14,038,277 UART: [fwproc] Recv'd Img size: 114124 bytes
16,744,108 UART: ROM Fatal Error: 0x000B003C
16,747,516 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
2,029,908 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,557,143 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,027,187 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,171,696 UART:
2,172,111 UART: Running Caliptra ROM ...
2,173,194 UART:
2,173,342 UART: [state] CFI Enabled
2,174,267 UART: [state] LifecycleState = Unprovisioned
2,175,919 UART: [state] DebugLocked = No
2,176,946 UART: [state] WD Timer not started. Device not locked for debugging
2,179,430 UART: [kat] SHA2-256
2,180,092 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,183,106 UART: [kat] ++
2,183,546 UART: [kat] sha1
2,184,047 UART: [kat] SHA2-256
2,184,694 UART: [kat] SHA2-384
2,185,366 UART: [kat] SHA2-512-ACC
2,186,183 UART: [kat] ECC-384
4,100,093 UART: [kat] HMAC-384Kdf
4,111,960 UART: [kat] LMS
5,185,126 UART: [kat] --
5,189,902 UART: [cold-reset] ++
5,192,177 UART: [fht] FHT @ 0x50003400
5,202,292 UART: [idev] ++
5,203,018 UART: [idev] CDI.KEYID = 6
5,204,194 UART: [idev] SUBJECT.KEYID = 7
5,205,696 UART: [idev] UDS.KEYID = 0
5,221,730 UART: [idev] Erasing UDS.KEYID = 0
8,494,349 UART: [idev] Sha1 KeyId Algorithm
8,517,209 UART: [idev] --
8,521,197 UART: [ldev] ++
8,521,760 UART: [ldev] CDI.KEYID = 6
8,523,200 UART: [ldev] SUBJECT.KEYID = 5
8,524,427 UART: [ldev] AUTHORITY.KEYID = 7
8,525,992 UART: [ldev] FE.KEYID = 1
8,536,479 UART: [ldev] Erasing FE.KEYID = 1
11,827,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,257 UART: [ldev] --
14,193,323 UART: [fwproc] Wait for Commands...
14,196,011 UART: [fwproc] Recv command 0x46574c44
14,198,330 UART: [fwproc] Recv'd Img size: 114124 bytes
16,903,111 UART: ROM Fatal Error: 0x000B003C
16,906,520 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
2,026,187 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,725,593 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,026,131 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,170,636 UART:
2,171,046 UART: Running Caliptra ROM ...
2,172,150 UART:
2,172,309 UART: [state] CFI Enabled
2,173,281 UART: [state] LifecycleState = Unprovisioned
2,174,931 UART: [state] DebugLocked = No
2,175,960 UART: [state] WD Timer not started. Device not locked for debugging
2,178,653 UART: [kat] SHA2-256
2,179,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,345 UART: [kat] ++
2,182,790 UART: [kat] sha1
2,183,301 UART: [kat] SHA2-256
2,183,961 UART: [kat] SHA2-384
2,184,616 UART: [kat] SHA2-512-ACC
2,185,442 UART: [kat] ECC-384
2,947,727 UART: [kat] HMAC-384Kdf
2,973,496 UART: [kat] LMS
3,502,935 UART: [kat] --
3,506,914 UART: [cold-reset] ++
3,508,198 UART: [fht] FHT @ 0x50003400
3,517,994 UART: [idev] ++
3,518,559 UART: [idev] CDI.KEYID = 6
3,519,438 UART: [idev] SUBJECT.KEYID = 7
3,520,653 UART: [idev] UDS.KEYID = 0
3,544,544 UART: [idev] Erasing UDS.KEYID = 0
6,028,241 UART: [idev] Sha1 KeyId Algorithm
6,051,421 UART: [idev] --
6,054,120 UART: [ldev] ++
6,054,693 UART: [ldev] CDI.KEYID = 6
6,055,582 UART: [ldev] SUBJECT.KEYID = 5
6,056,662 UART: [ldev] AUTHORITY.KEYID = 7
6,057,917 UART: [ldev] FE.KEYID = 1
6,099,949 UART: [ldev] Erasing FE.KEYID = 1
8,604,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,996 UART: [ldev] --
10,414,768 UART: [fwproc] Wait for Commands...
10,416,270 UART: [fwproc] Recv command 0x46574c44
10,418,423 UART: [fwproc] Recv'd Img size: 114448 bytes
12,471,004 UART: ROM Fatal Error: 0x000B003C
12,474,078 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
2,027,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,252,278 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,024,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,169,502 UART:
2,169,908 UART: Running Caliptra ROM ...
2,170,985 UART:
2,171,134 UART: [state] CFI Enabled
2,172,093 UART: [state] LifecycleState = Unprovisioned
2,173,738 UART: [state] DebugLocked = No
2,174,764 UART: [state] WD Timer not started. Device not locked for debugging
2,177,228 UART: [kat] SHA2-256
2,177,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,899 UART: [kat] ++
2,181,346 UART: [kat] sha1
2,181,856 UART: [kat] SHA2-256
2,182,535 UART: [kat] SHA2-384
2,183,264 UART: [kat] SHA2-512-ACC
2,184,063 UART: [kat] ECC-384
3,276,055 UART: [kat] HMAC-384Kdf
3,289,635 UART: [kat] LMS
3,819,102 UART: [kat] --
3,822,474 UART: [cold-reset] ++
3,823,597 UART: [fht] FHT @ 0x50003400
3,834,957 UART: [idev] ++
3,835,526 UART: [idev] CDI.KEYID = 6
3,836,504 UART: [idev] SUBJECT.KEYID = 7
3,837,601 UART: [idev] UDS.KEYID = 0
3,853,026 UART: [idev] Erasing UDS.KEYID = 0
6,310,404 UART: [idev] Sha1 KeyId Algorithm
6,331,868 UART: [idev] --
6,334,512 UART: [ldev] ++
6,335,101 UART: [ldev] CDI.KEYID = 6
6,335,986 UART: [ldev] SUBJECT.KEYID = 5
6,337,118 UART: [ldev] AUTHORITY.KEYID = 7
6,338,458 UART: [ldev] FE.KEYID = 1
6,348,428 UART: [ldev] Erasing FE.KEYID = 1
8,825,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,077 UART: [ldev] --
10,615,298 UART: [fwproc] Wait for Commands...
10,617,662 UART: [fwproc] Recv command 0x46574c44
10,619,756 UART: [fwproc] Recv'd Img size: 114448 bytes
12,670,238 UART: ROM Fatal Error: 0x000B003C
12,673,316 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
2,039,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,467,219 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,027,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,261,205 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,024,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,468,676 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,028 UART: [kat] HMAC-384Kdf
920,678 UART: [kat] LMS
1,168,990 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,181,739 UART: [idev] Erasing UDS.KEYID = 0
1,198,453 UART: [idev] Sha1 KeyId Algorithm
1,207,385 UART: [idev] --
1,208,534 UART: [ldev] ++
1,208,702 UART: [ldev] CDI.KEYID = 6
1,209,066 UART: [ldev] SUBJECT.KEYID = 5
1,209,493 UART: [ldev] AUTHORITY.KEYID = 7
1,209,956 UART: [ldev] FE.KEYID = 1
1,214,978 UART: [ldev] Erasing FE.KEYID = 1
1,240,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,202 UART: [ldev] --
1,280,500 UART: [fwproc] Wait for Commands...
1,281,143 UART: [fwproc] Recv command 0x46574c44
1,281,876 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,421 UART: ROM Fatal Error: 0x000B003C
1,330,580 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,905 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,527 UART: [kat] SHA2-512-ACC
906,428 UART: [kat] ECC-384
915,947 UART: [kat] HMAC-384Kdf
920,597 UART: [kat] LMS
1,168,909 UART: [kat] --
1,169,554 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,678 UART: [idev] ++
1,172,846 UART: [idev] CDI.KEYID = 6
1,173,207 UART: [idev] SUBJECT.KEYID = 7
1,173,632 UART: [idev] UDS.KEYID = 0
1,181,680 UART: [idev] Erasing UDS.KEYID = 0
1,199,158 UART: [idev] Sha1 KeyId Algorithm
1,207,884 UART: [idev] --
1,208,883 UART: [ldev] ++
1,209,051 UART: [ldev] CDI.KEYID = 6
1,209,415 UART: [ldev] SUBJECT.KEYID = 5
1,209,842 UART: [ldev] AUTHORITY.KEYID = 7
1,210,305 UART: [ldev] FE.KEYID = 1
1,215,539 UART: [ldev] Erasing FE.KEYID = 1
1,241,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,723 UART: [ldev] --
1,281,161 UART: [fwproc] Wait for Commands...
1,281,980 UART: [fwproc] Recv command 0x46574c44
1,282,713 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,530 UART: ROM Fatal Error: 0x000B003C
1,330,689 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,114 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,012 UART: [kat] SHA2-512-ACC
905,913 UART: [kat] ECC-384
915,598 UART: [kat] HMAC-384Kdf
920,114 UART: [kat] LMS
1,168,426 UART: [kat] --
1,169,129 UART: [cold-reset] ++
1,169,595 UART: [fht] FHT @ 0x50003400
1,172,327 UART: [idev] ++
1,172,495 UART: [idev] CDI.KEYID = 6
1,172,856 UART: [idev] SUBJECT.KEYID = 7
1,173,281 UART: [idev] UDS.KEYID = 0
1,181,075 UART: [idev] Erasing UDS.KEYID = 0
1,198,265 UART: [idev] Sha1 KeyId Algorithm
1,207,161 UART: [idev] --
1,208,304 UART: [ldev] ++
1,208,472 UART: [ldev] CDI.KEYID = 6
1,208,836 UART: [ldev] SUBJECT.KEYID = 5
1,209,263 UART: [ldev] AUTHORITY.KEYID = 7
1,209,726 UART: [ldev] FE.KEYID = 1
1,214,860 UART: [ldev] Erasing FE.KEYID = 1
1,241,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,482 UART: [fwproc] Wait for Commands...
1,281,193 UART: [fwproc] Recv command 0x46574c44
1,281,926 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,173 UART: ROM Fatal Error: 0x000B003C
1,329,332 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,487 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,849 UART: [kat] HMAC-384Kdf
921,367 UART: [kat] LMS
1,169,679 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,344 UART: [idev] ++
1,173,512 UART: [idev] CDI.KEYID = 6
1,173,873 UART: [idev] SUBJECT.KEYID = 7
1,174,298 UART: [idev] UDS.KEYID = 0
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,362 UART: [idev] Sha1 KeyId Algorithm
1,208,264 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,216,025 UART: [ldev] Erasing FE.KEYID = 1
1,241,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,643 UART: [ldev] --
1,281,147 UART: [fwproc] Wait for Commands...
1,281,970 UART: [fwproc] Recv command 0x46574c44
1,282,703 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,738 UART: ROM Fatal Error: 0x000B003C
1,330,897 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,072 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,316 UART: [kat] SHA2-512-ACC
906,217 UART: [kat] ECC-384
915,742 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,685 UART: [idev] ++
1,172,853 UART: [idev] CDI.KEYID = 6
1,173,214 UART: [idev] SUBJECT.KEYID = 7
1,173,639 UART: [idev] UDS.KEYID = 0
1,181,497 UART: [idev] Erasing UDS.KEYID = 0
1,198,595 UART: [idev] Sha1 KeyId Algorithm
1,207,455 UART: [idev] --
1,208,542 UART: [ldev] ++
1,208,710 UART: [ldev] CDI.KEYID = 6
1,209,074 UART: [ldev] SUBJECT.KEYID = 5
1,209,501 UART: [ldev] AUTHORITY.KEYID = 7
1,209,964 UART: [ldev] FE.KEYID = 1
1,215,034 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,102 UART: [ldev] --
1,280,478 UART: [fwproc] Wait for Commands...
1,281,153 UART: [fwproc] Recv command 0x46574c44
1,281,886 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,547 UART: ROM Fatal Error: 0x000B003C
1,330,706 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,117 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
915,971 UART: [kat] HMAC-384Kdf
920,421 UART: [kat] LMS
1,168,733 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,169,978 UART: [fht] FHT @ 0x50003400
1,172,654 UART: [idev] ++
1,172,822 UART: [idev] CDI.KEYID = 6
1,173,183 UART: [idev] SUBJECT.KEYID = 7
1,173,608 UART: [idev] UDS.KEYID = 0
1,181,234 UART: [idev] Erasing UDS.KEYID = 0
1,198,104 UART: [idev] Sha1 KeyId Algorithm
1,207,094 UART: [idev] --
1,208,281 UART: [ldev] ++
1,208,449 UART: [ldev] CDI.KEYID = 6
1,208,813 UART: [ldev] SUBJECT.KEYID = 5
1,209,240 UART: [ldev] AUTHORITY.KEYID = 7
1,209,703 UART: [ldev] FE.KEYID = 1
1,214,979 UART: [ldev] Erasing FE.KEYID = 1
1,241,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,343 UART: [ldev] --
1,280,849 UART: [fwproc] Wait for Commands...
1,281,504 UART: [fwproc] Recv command 0x46574c44
1,282,237 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,410 UART: ROM Fatal Error: 0x000B003C
1,329,569 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,598 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,622 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,249 UART:
192,610 UART: Running Caliptra ROM ...
193,813 UART:
193,989 UART: [state] CFI Enabled
261,820 UART: [state] LifecycleState = Unprovisioned
264,173 UART: [state] DebugLocked = No
266,144 UART: [state] WD Timer not started. Device not locked for debugging
270,566 UART: [kat] SHA2-256
452,470 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,195 UART: [kat] ++
464,675 UART: [kat] sha1
474,473 UART: [kat] SHA2-256
477,442 UART: [kat] SHA2-384
484,133 UART: [kat] SHA2-512-ACC
486,701 UART: [kat] ECC-384
3,777,326 UART: [kat] HMAC-384Kdf
3,803,104 UART: [kat] LMS
4,876,262 UART: [kat] --
4,880,976 UART: [cold-reset] ++
4,883,162 UART: [fht] FHT @ 0x50003400
4,896,202 UART: [idev] ++
4,896,879 UART: [idev] CDI.KEYID = 6
4,898,112 UART: [idev] SUBJECT.KEYID = 7
4,899,213 UART: [idev] UDS.KEYID = 0
4,930,096 UART: [idev] Erasing UDS.KEYID = 0
8,243,072 UART: [idev] Sha1 KeyId Algorithm
8,265,446 UART: [idev] --
8,270,798 UART: [ldev] ++
8,271,369 UART: [ldev] CDI.KEYID = 6
8,272,606 UART: [ldev] SUBJECT.KEYID = 5
8,273,769 UART: [ldev] AUTHORITY.KEYID = 7
8,274,929 UART: [ldev] FE.KEYID = 1
8,318,453 UART: [ldev] Erasing FE.KEYID = 1
11,654,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,090 UART: [ldev] --
14,036,371 UART: [fwproc] Wait for Commands...
14,038,641 UART: [fwproc] Recv command 0x46574c44
14,040,968 UART: Invalid Img size: 0 bytes
14,044,575 UART: ROM Fatal Error: 0x01020002
14,047,900 >>> mbox cmd response: failed
14,050,436 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,193,943 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,941 writing to cptra_bootfsm_go
4,459 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
13,808,896 >>> mbox cmd response: failed
13,811,745 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,955,203 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,739 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,360 UART:
192,754 UART: Running Caliptra ROM ...
193,875 UART:
603,463 UART: [state] CFI Enabled
619,771 UART: [state] LifecycleState = Unprovisioned
622,158 UART: [state] DebugLocked = No
624,336 UART: [state] WD Timer not started. Device not locked for debugging
629,667 UART: [kat] SHA2-256
811,620 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,184 UART: [kat] ++
823,690 UART: [kat] sha1
832,681 UART: [kat] SHA2-256
835,737 UART: [kat] SHA2-384
841,935 UART: [kat] SHA2-512-ACC
844,552 UART: [kat] ECC-384
4,096,991 UART: [kat] HMAC-384Kdf
4,108,445 UART: [kat] LMS
5,181,608 UART: [kat] --
5,185,908 UART: [cold-reset] ++
5,187,151 UART: [fht] FHT @ 0x50003400
5,198,112 UART: [idev] ++
5,198,784 UART: [idev] CDI.KEYID = 6
5,199,952 UART: [idev] SUBJECT.KEYID = 7
5,201,493 UART: [idev] UDS.KEYID = 0
5,218,225 UART: [idev] Erasing UDS.KEYID = 0
8,491,377 UART: [idev] Sha1 KeyId Algorithm
8,513,968 UART: [idev] --
8,517,563 UART: [ldev] ++
8,518,136 UART: [ldev] CDI.KEYID = 6
8,519,377 UART: [ldev] SUBJECT.KEYID = 5
8,520,811 UART: [ldev] AUTHORITY.KEYID = 7
8,522,371 UART: [ldev] FE.KEYID = 1
8,535,501 UART: [ldev] Erasing FE.KEYID = 1
11,829,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,286 UART: [ldev] --
14,198,341 UART: [fwproc] Wait for Commands...
14,200,191 UART: [fwproc] Recv command 0x46574c44
14,202,515 UART: Invalid Img size: 0 bytes
14,207,326 UART: ROM Fatal Error: 0x01020002
14,210,643 >>> mbox cmd response: failed
14,213,137 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,356,613 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
4,089 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
14,014,516 >>> mbox cmd response: failed
14,017,278 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,160,826 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,580 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,231 UART:
192,613 UART: Running Caliptra ROM ...
193,783 UART:
193,941 UART: [state] CFI Enabled
263,757 UART: [state] LifecycleState = Unprovisioned
265,608 UART: [state] DebugLocked = No
268,395 UART: [state] WD Timer not started. Device not locked for debugging
271,389 UART: [kat] SHA2-256
450,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,070 UART: [kat] ++
462,605 UART: [kat] sha1
473,003 UART: [kat] SHA2-256
476,017 UART: [kat] SHA2-384
483,076 UART: [kat] SHA2-512-ACC
486,019 UART: [kat] ECC-384
2,945,669 UART: [kat] HMAC-384Kdf
2,972,306 UART: [kat] LMS
3,501,725 UART: [kat] --
3,506,638 UART: [cold-reset] ++
3,508,191 UART: [fht] FHT @ 0x50003400
3,519,328 UART: [idev] ++
3,519,893 UART: [idev] CDI.KEYID = 6
3,520,816 UART: [idev] SUBJECT.KEYID = 7
3,521,993 UART: [idev] UDS.KEYID = 0
3,544,187 UART: [idev] Erasing UDS.KEYID = 0
6,023,555 UART: [idev] Sha1 KeyId Algorithm
6,047,013 UART: [idev] --
6,051,555 UART: [ldev] ++
6,052,128 UART: [ldev] CDI.KEYID = 6
6,053,038 UART: [ldev] SUBJECT.KEYID = 5
6,054,259 UART: [ldev] AUTHORITY.KEYID = 7
6,055,493 UART: [ldev] FE.KEYID = 1
6,100,551 UART: [ldev] Erasing FE.KEYID = 1
8,605,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,200 UART: [ldev] --
10,409,082 UART: [fwproc] Wait for Commands...
10,411,834 UART: [fwproc] Recv command 0x46574c44
10,413,930 UART: Invalid Img size: 0 bytes
10,417,609 UART: ROM Fatal Error: 0x01020002
10,420,757 >>> mbox cmd response: failed
10,423,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,567,273 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,491 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,207,774 >>> mbox cmd response: failed
10,210,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,354,446 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,962 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,559 UART:
192,966 UART: Running Caliptra ROM ...
194,235 UART:
603,688 UART: [state] CFI Enabled
620,709 UART: [state] LifecycleState = Unprovisioned
622,607 UART: [state] DebugLocked = No
624,524 UART: [state] WD Timer not started. Device not locked for debugging
628,360 UART: [kat] SHA2-256
807,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,059 UART: [kat] ++
819,603 UART: [kat] sha1
831,080 UART: [kat] SHA2-256
834,095 UART: [kat] SHA2-384
841,635 UART: [kat] SHA2-512-ACC
844,618 UART: [kat] ECC-384
3,287,708 UART: [kat] HMAC-384Kdf
3,299,175 UART: [kat] LMS
3,828,680 UART: [kat] --
3,834,335 UART: [cold-reset] ++
3,836,861 UART: [fht] FHT @ 0x50003400
3,847,346 UART: [idev] ++
3,847,907 UART: [idev] CDI.KEYID = 6
3,848,871 UART: [idev] SUBJECT.KEYID = 7
3,850,080 UART: [idev] UDS.KEYID = 0
3,866,709 UART: [idev] Erasing UDS.KEYID = 0
6,324,757 UART: [idev] Sha1 KeyId Algorithm
6,347,684 UART: [idev] --
6,351,375 UART: [ldev] ++
6,351,949 UART: [ldev] CDI.KEYID = 6
6,352,857 UART: [ldev] SUBJECT.KEYID = 5
6,354,015 UART: [ldev] AUTHORITY.KEYID = 7
6,355,325 UART: [ldev] FE.KEYID = 1
6,367,589 UART: [ldev] Erasing FE.KEYID = 1
8,842,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,305 UART: [ldev] --
10,633,701 UART: [fwproc] Wait for Commands...
10,636,012 UART: [fwproc] Recv command 0x46574c44
10,638,058 UART: Invalid Img size: 0 bytes
10,641,314 UART: ROM Fatal Error: 0x01020002
10,644,405 >>> mbox cmd response: failed
10,646,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,790,704 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
3,878 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,408,665 >>> mbox cmd response: failed
10,410,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,554,861 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,522 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,228,440 >>> mbox cmd response: failed
10,231,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,375,243 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
3,965 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,412,957 >>> mbox cmd response: failed
10,415,311 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,559,125 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,517 UART: [kat] SHA2-256
901,457 UART: [kat] SHA2-384
904,048 UART: [kat] SHA2-512-ACC
905,949 UART: [kat] ECC-384
915,552 UART: [kat] HMAC-384Kdf
920,226 UART: [kat] LMS
1,168,538 UART: [kat] --
1,169,507 UART: [cold-reset] ++
1,169,847 UART: [fht] FHT @ 0x50003400
1,172,591 UART: [idev] ++
1,172,759 UART: [idev] CDI.KEYID = 6
1,173,120 UART: [idev] SUBJECT.KEYID = 7
1,173,545 UART: [idev] UDS.KEYID = 0
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,809 UART: [idev] Sha1 KeyId Algorithm
1,207,611 UART: [idev] --
1,208,752 UART: [ldev] ++
1,208,920 UART: [ldev] CDI.KEYID = 6
1,209,284 UART: [ldev] SUBJECT.KEYID = 5
1,209,711 UART: [ldev] AUTHORITY.KEYID = 7
1,210,174 UART: [ldev] FE.KEYID = 1
1,215,214 UART: [ldev] Erasing FE.KEYID = 1
1,241,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,264 UART: [ldev] --
1,280,730 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,104 UART: Invalid Img size: 0 bytes
1,282,940 UART: ROM Fatal Error: 0x01020002
1,284,099 >>> mbox cmd response: failed
1,284,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,105 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,349 >>> mbox cmd response: failed
1,138,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,138,355 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
916,095 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,928 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,182,256 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,098 UART: [idev] --
1,208,903 UART: [ldev] ++
1,209,071 UART: [ldev] CDI.KEYID = 6
1,209,435 UART: [ldev] SUBJECT.KEYID = 5
1,209,862 UART: [ldev] AUTHORITY.KEYID = 7
1,210,325 UART: [ldev] FE.KEYID = 1
1,215,431 UART: [ldev] Erasing FE.KEYID = 1
1,241,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,653 UART: [ldev] --
1,280,957 UART: [fwproc] Wait for Commands...
1,281,612 UART: [fwproc] Recv command 0x46574c44
1,282,341 UART: Invalid Img size: 0 bytes
1,283,135 UART: ROM Fatal Error: 0x01020002
1,284,294 >>> mbox cmd response: failed
1,284,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,300 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,962 >>> mbox cmd response: failed
1,138,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,138,968 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,514 UART: [kat] SHA2-512-ACC
906,415 UART: [kat] ECC-384
915,736 UART: [kat] HMAC-384Kdf
920,328 UART: [kat] LMS
1,168,640 UART: [kat] --
1,169,741 UART: [cold-reset] ++
1,170,111 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,181,663 UART: [idev] Erasing UDS.KEYID = 0
1,198,325 UART: [idev] Sha1 KeyId Algorithm
1,207,197 UART: [idev] --
1,208,072 UART: [ldev] ++
1,208,240 UART: [ldev] CDI.KEYID = 6
1,208,604 UART: [ldev] SUBJECT.KEYID = 5
1,209,031 UART: [ldev] AUTHORITY.KEYID = 7
1,209,494 UART: [ldev] FE.KEYID = 1
1,214,414 UART: [ldev] Erasing FE.KEYID = 1
1,240,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,402 UART: [ldev] --
1,279,674 UART: [fwproc] Wait for Commands...
1,280,293 UART: [fwproc] Recv command 0x46574c44
1,281,022 UART: Invalid Img size: 0 bytes
1,281,734 UART: ROM Fatal Error: 0x01020002
1,282,893 >>> mbox cmd response: failed
1,282,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,282,899 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,761 >>> mbox cmd response: failed
1,136,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,136,767 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,392 UART: [kat] ++
895,544 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,283 UART: [kat] SHA2-512-ACC
906,184 UART: [kat] ECC-384
915,641 UART: [kat] HMAC-384Kdf
920,283 UART: [kat] LMS
1,168,595 UART: [kat] --
1,169,190 UART: [cold-reset] ++
1,169,762 UART: [fht] FHT @ 0x50003400
1,172,438 UART: [idev] ++
1,172,606 UART: [idev] CDI.KEYID = 6
1,172,967 UART: [idev] SUBJECT.KEYID = 7
1,173,392 UART: [idev] UDS.KEYID = 0
1,181,616 UART: [idev] Erasing UDS.KEYID = 0
1,198,830 UART: [idev] Sha1 KeyId Algorithm
1,207,584 UART: [idev] --
1,208,717 UART: [ldev] ++
1,208,885 UART: [ldev] CDI.KEYID = 6
1,209,249 UART: [ldev] SUBJECT.KEYID = 5
1,209,676 UART: [ldev] AUTHORITY.KEYID = 7
1,210,139 UART: [ldev] FE.KEYID = 1
1,215,475 UART: [ldev] Erasing FE.KEYID = 1
1,241,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,077 UART: [ldev] --
1,280,465 UART: [fwproc] Wait for Commands...
1,281,206 UART: [fwproc] Recv command 0x46574c44
1,281,935 UART: Invalid Img size: 0 bytes
1,283,033 UART: ROM Fatal Error: 0x01020002
1,284,192 >>> mbox cmd response: failed
1,284,192 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,198 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,086 >>> mbox cmd response: failed
1,138,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,138,092 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,088 UART: [state] LifecycleState = Unprovisioned
84,743 UART: [state] DebugLocked = No
85,351 UART: [state] WD Timer not started. Device not locked for debugging
86,624 UART: [kat] SHA2-256
890,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,303 UART: [kat] ++
894,455 UART: [kat] sha1
898,647 UART: [kat] SHA2-256
900,587 UART: [kat] SHA2-384
903,416 UART: [kat] SHA2-512-ACC
905,317 UART: [kat] ECC-384
915,458 UART: [kat] HMAC-384Kdf
920,136 UART: [kat] LMS
1,168,448 UART: [kat] --
1,169,293 UART: [cold-reset] ++
1,169,637 UART: [fht] FHT @ 0x50003400
1,172,251 UART: [idev] ++
1,172,419 UART: [idev] CDI.KEYID = 6
1,172,780 UART: [idev] SUBJECT.KEYID = 7
1,173,205 UART: [idev] UDS.KEYID = 0
1,180,827 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,422 UART: [ldev] ++
1,208,590 UART: [ldev] CDI.KEYID = 6
1,208,954 UART: [ldev] SUBJECT.KEYID = 5
1,209,381 UART: [ldev] AUTHORITY.KEYID = 7
1,209,844 UART: [ldev] FE.KEYID = 1
1,214,940 UART: [ldev] Erasing FE.KEYID = 1
1,241,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,042 UART: [ldev] --
1,280,362 UART: [fwproc] Wait for Commands...
1,281,015 UART: [fwproc] Recv command 0x46574c44
1,281,744 UART: Invalid Img size: 0 bytes
1,282,576 UART: ROM Fatal Error: 0x01020002
1,283,735 >>> mbox cmd response: failed
1,283,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,283,741 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,003 >>> mbox cmd response: failed
1,136,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,136,009 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,890 UART: [kat] ++
896,042 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,843 UART: [kat] HMAC-384Kdf
921,517 UART: [kat] LMS
1,169,829 UART: [kat] --
1,170,746 UART: [cold-reset] ++
1,171,128 UART: [fht] FHT @ 0x50003400
1,173,846 UART: [idev] ++
1,174,014 UART: [idev] CDI.KEYID = 6
1,174,375 UART: [idev] SUBJECT.KEYID = 7
1,174,800 UART: [idev] UDS.KEYID = 0
1,182,938 UART: [idev] Erasing UDS.KEYID = 0
1,199,654 UART: [idev] Sha1 KeyId Algorithm
1,208,504 UART: [idev] --
1,209,419 UART: [ldev] ++
1,209,587 UART: [ldev] CDI.KEYID = 6
1,209,951 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,216,083 UART: [ldev] Erasing FE.KEYID = 1
1,242,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,961 UART: [ldev] --
1,281,385 UART: [fwproc] Wait for Commands...
1,282,080 UART: [fwproc] Recv command 0x46574c44
1,282,809 UART: Invalid Img size: 0 bytes
1,283,663 UART: ROM Fatal Error: 0x01020002
1,284,822 >>> mbox cmd response: failed
1,284,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,828 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,296 >>> mbox cmd response: failed
1,136,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,136,302 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,734 UART:
193,112 UART: Running Caliptra ROM ...
194,279 UART:
194,422 UART: [state] CFI Enabled
262,883 UART: [state] LifecycleState = Unprovisioned
265,240 UART: [state] DebugLocked = No
266,740 UART: [state] WD Timer not started. Device not locked for debugging
270,837 UART: [kat] SHA2-256
452,798 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,293 UART: [kat] ++
464,806 UART: [kat] sha1
475,224 UART: [kat] SHA2-256
478,239 UART: [kat] SHA2-384
484,592 UART: [kat] SHA2-512-ACC
487,208 UART: [kat] ECC-384
3,777,311 UART: [kat] HMAC-384Kdf
3,801,600 UART: [kat] LMS
4,874,767 UART: [kat] --
4,878,122 UART: [cold-reset] ++
4,880,547 UART: [fht] FHT @ 0x50003400
4,891,473 UART: [idev] ++
4,892,153 UART: [idev] CDI.KEYID = 6
4,893,330 UART: [idev] SUBJECT.KEYID = 7
4,894,486 UART: [idev] UDS.KEYID = 0
4,929,808 UART: [idev] Erasing UDS.KEYID = 0
8,246,495 UART: [idev] Sha1 KeyId Algorithm
8,269,020 UART: [idev] --
8,272,739 UART: [ldev] ++
8,273,336 UART: [ldev] CDI.KEYID = 6
8,274,518 UART: [ldev] SUBJECT.KEYID = 5
8,275,677 UART: [ldev] AUTHORITY.KEYID = 7
8,276,905 UART: [ldev] FE.KEYID = 1
8,317,692 UART: [ldev] Erasing FE.KEYID = 1
11,650,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,953,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,970,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,986,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,002,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,022,194 UART: [ldev] --
14,026,055 UART: [fwproc] Wait for Commands...
14,028,864 UART: [fwproc] Recv command 0x4d454153
14,034,726 UART: ROM Fatal Error: 0x01020005
14,038,081 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,849,696 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,256 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,396 UART:
192,759 UART: Running Caliptra ROM ...
193,963 UART:
603,398 UART: [state] CFI Enabled
616,844 UART: [state] LifecycleState = Unprovisioned
619,219 UART: [state] DebugLocked = No
620,916 UART: [state] WD Timer not started. Device not locked for debugging
625,454 UART: [kat] SHA2-256
807,470 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,974 UART: [kat] ++
819,506 UART: [kat] sha1
830,006 UART: [kat] SHA2-256
833,036 UART: [kat] SHA2-384
839,665 UART: [kat] SHA2-512-ACC
842,272 UART: [kat] ECC-384
4,100,484 UART: [kat] HMAC-384Kdf
4,112,070 UART: [kat] LMS
5,185,232 UART: [kat] --
5,189,143 UART: [cold-reset] ++
5,191,655 UART: [fht] FHT @ 0x50003400
5,201,617 UART: [idev] ++
5,202,341 UART: [idev] CDI.KEYID = 6
5,203,512 UART: [idev] SUBJECT.KEYID = 7
5,204,993 UART: [idev] UDS.KEYID = 0
5,222,969 UART: [idev] Erasing UDS.KEYID = 0
8,494,544 UART: [idev] Sha1 KeyId Algorithm
8,516,633 UART: [idev] --
8,521,219 UART: [ldev] ++
8,521,792 UART: [ldev] CDI.KEYID = 6
8,523,030 UART: [ldev] SUBJECT.KEYID = 5
8,524,459 UART: [ldev] AUTHORITY.KEYID = 7
8,526,012 UART: [ldev] FE.KEYID = 1
8,538,086 UART: [ldev] Erasing FE.KEYID = 1
11,831,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,204 UART: [ldev] --
14,199,020 UART: [fwproc] Wait for Commands...
14,201,663 UART: [fwproc] Recv command 0x4d454153
14,208,142 UART: ROM Fatal Error: 0x01020005
14,211,453 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
4,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,025,240 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,248 UART:
192,636 UART: Running Caliptra ROM ...
193,760 UART:
194,140 UART: [state] CFI Enabled
264,736 UART: [state] LifecycleState = Unprovisioned
266,652 UART: [state] DebugLocked = No
268,414 UART: [state] WD Timer not started. Device not locked for debugging
272,741 UART: [kat] SHA2-256
451,828 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,397 UART: [kat] ++
463,931 UART: [kat] sha1
474,434 UART: [kat] SHA2-256
477,491 UART: [kat] SHA2-384
482,056 UART: [kat] SHA2-512-ACC
485,000 UART: [kat] ECC-384
2,947,696 UART: [kat] HMAC-384Kdf
2,972,389 UART: [kat] LMS
3,501,882 UART: [kat] --
3,505,765 UART: [cold-reset] ++
3,506,998 UART: [fht] FHT @ 0x50003400
3,518,909 UART: [idev] ++
3,519,476 UART: [idev] CDI.KEYID = 6
3,520,386 UART: [idev] SUBJECT.KEYID = 7
3,521,599 UART: [idev] UDS.KEYID = 0
3,544,652 UART: [idev] Erasing UDS.KEYID = 0
6,026,498 UART: [idev] Sha1 KeyId Algorithm
6,048,662 UART: [idev] --
6,053,848 UART: [ldev] ++
6,054,420 UART: [ldev] CDI.KEYID = 6
6,055,307 UART: [ldev] SUBJECT.KEYID = 5
6,056,474 UART: [ldev] AUTHORITY.KEYID = 7
6,057,770 UART: [ldev] FE.KEYID = 1
6,102,007 UART: [ldev] Erasing FE.KEYID = 1
8,603,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,503 UART: [ldev] --
10,416,162 UART: [fwproc] Wait for Commands...
10,417,999 UART: [fwproc] Recv command 0x4d454153
10,424,148 UART: ROM Fatal Error: 0x01020005
10,427,251 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,185,690 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,285 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,496 UART:
192,876 UART: Running Caliptra ROM ...
194,045 UART:
603,857 UART: [state] CFI Enabled
621,116 UART: [state] LifecycleState = Unprovisioned
622,997 UART: [state] DebugLocked = No
625,152 UART: [state] WD Timer not started. Device not locked for debugging
629,696 UART: [kat] SHA2-256
808,786 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,353 UART: [kat] ++
820,798 UART: [kat] sha1
831,886 UART: [kat] SHA2-256
834,885 UART: [kat] SHA2-384
842,003 UART: [kat] SHA2-512-ACC
844,941 UART: [kat] ECC-384
3,287,548 UART: [kat] HMAC-384Kdf
3,299,993 UART: [kat] LMS
3,829,465 UART: [kat] --
3,832,978 UART: [cold-reset] ++
3,834,904 UART: [fht] FHT @ 0x50003400
3,844,524 UART: [idev] ++
3,845,079 UART: [idev] CDI.KEYID = 6
3,846,013 UART: [idev] SUBJECT.KEYID = 7
3,847,223 UART: [idev] UDS.KEYID = 0
3,865,461 UART: [idev] Erasing UDS.KEYID = 0
6,318,379 UART: [idev] Sha1 KeyId Algorithm
6,341,281 UART: [idev] --
6,344,031 UART: [ldev] ++
6,344,610 UART: [ldev] CDI.KEYID = 6
6,345,538 UART: [ldev] SUBJECT.KEYID = 5
6,346,769 UART: [ldev] AUTHORITY.KEYID = 7
6,347,966 UART: [ldev] FE.KEYID = 1
6,359,580 UART: [ldev] Erasing FE.KEYID = 1
8,836,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,403 UART: [ldev] --
10,627,833 UART: [fwproc] Wait for Commands...
10,629,570 UART: [fwproc] Recv command 0x4d454153
10,635,882 UART: ROM Fatal Error: 0x01020005
10,638,978 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
4,334 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,417,587 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,169,173 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
4,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,419,749 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,743 UART: [idev] ++
1,172,911 UART: [idev] CDI.KEYID = 6
1,173,272 UART: [idev] SUBJECT.KEYID = 7
1,173,697 UART: [idev] UDS.KEYID = 0
1,181,557 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha1 KeyId Algorithm
1,208,107 UART: [idev] --
1,209,346 UART: [ldev] ++
1,209,514 UART: [ldev] CDI.KEYID = 6
1,209,878 UART: [ldev] SUBJECT.KEYID = 5
1,210,305 UART: [ldev] AUTHORITY.KEYID = 7
1,210,768 UART: [ldev] FE.KEYID = 1
1,215,978 UART: [ldev] Erasing FE.KEYID = 1
1,242,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,250 UART: [ldev] --
1,281,534 UART: [fwproc] Wait for Commands...
1,282,337 UART: [fwproc] Recv command 0x4d454153
1,284,410 UART: ROM Fatal Error: 0x01020005
1,285,569 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,621 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,170,874 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,182,580 UART: [idev] Erasing UDS.KEYID = 0
1,199,944 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,823 UART: [ldev] ++
1,209,991 UART: [ldev] CDI.KEYID = 6
1,210,355 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,571 UART: [ldev] Erasing FE.KEYID = 1
1,242,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,729 UART: [ldev] --
1,282,003 UART: [fwproc] Wait for Commands...
1,282,720 UART: [fwproc] Recv command 0x4d454153
1,284,605 UART: ROM Fatal Error: 0x01020005
1,285,764 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,704 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
915,890 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,199,347 UART: [idev] Sha1 KeyId Algorithm
1,208,211 UART: [idev] --
1,209,338 UART: [ldev] ++
1,209,506 UART: [ldev] CDI.KEYID = 6
1,209,870 UART: [ldev] SUBJECT.KEYID = 5
1,210,297 UART: [ldev] AUTHORITY.KEYID = 7
1,210,760 UART: [ldev] FE.KEYID = 1
1,215,872 UART: [ldev] Erasing FE.KEYID = 1
1,242,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,546 UART: [ldev] --
1,281,818 UART: [fwproc] Wait for Commands...
1,282,543 UART: [fwproc] Recv command 0x4d454153
1,284,620 UART: ROM Fatal Error: 0x01020005
1,285,779 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,281 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,289 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,118 UART: [cold-reset] ++
1,170,652 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,182,558 UART: [idev] Erasing UDS.KEYID = 0
1,199,924 UART: [idev] Sha1 KeyId Algorithm
1,208,756 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,363 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,491 UART: [ldev] Erasing FE.KEYID = 1
1,242,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,059 UART: [ldev] --
1,281,545 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x4d454153
1,284,297 UART: ROM Fatal Error: 0x01020005
1,285,456 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,694 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
88,010 UART: [kat] SHA2-256
891,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,689 UART: [kat] ++
895,841 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,444 UART: [kat] HMAC-384Kdf
921,160 UART: [kat] LMS
1,169,472 UART: [kat] --
1,170,563 UART: [cold-reset] ++
1,170,935 UART: [fht] FHT @ 0x50003400
1,173,685 UART: [idev] ++
1,173,853 UART: [idev] CDI.KEYID = 6
1,174,214 UART: [idev] SUBJECT.KEYID = 7
1,174,639 UART: [idev] UDS.KEYID = 0
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,198,339 UART: [idev] Sha1 KeyId Algorithm
1,207,335 UART: [idev] --
1,208,394 UART: [ldev] ++
1,208,562 UART: [ldev] CDI.KEYID = 6
1,208,926 UART: [ldev] SUBJECT.KEYID = 5
1,209,353 UART: [ldev] AUTHORITY.KEYID = 7
1,209,816 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,334 UART: [ldev] --
1,280,830 UART: [fwproc] Wait for Commands...
1,281,577 UART: [fwproc] Recv command 0x4d454153
1,283,556 UART: ROM Fatal Error: 0x01020005
1,284,715 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,381 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,212 UART: [kat] SHA2-256
902,152 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,500 UART: [cold-reset] ++
1,170,908 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,200,040 UART: [idev] Sha1 KeyId Algorithm
1,208,992 UART: [idev] --
1,210,007 UART: [ldev] ++
1,210,175 UART: [ldev] CDI.KEYID = 6
1,210,539 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,815 UART: [ldev] Erasing FE.KEYID = 1
1,243,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,493 UART: [ldev] --
1,282,927 UART: [fwproc] Wait for Commands...
1,283,710 UART: [fwproc] Recv command 0x4d454153
1,285,601 UART: ROM Fatal Error: 0x01020005
1,286,760 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,260 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
4,358 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,291 UART:
192,656 UART: Running Caliptra ROM ...
193,765 UART:
193,906 UART: [state] CFI Enabled
266,928 UART: [state] LifecycleState = Unprovisioned
269,333 UART: [state] DebugLocked = No
271,331 UART: [state] WD Timer not started. Device not locked for debugging
275,060 UART: [kat] SHA2-256
456,989 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,522 UART: [kat] ++
469,017 UART: [kat] sha1
480,059 UART: [kat] SHA2-256
483,091 UART: [kat] SHA2-384
489,383 UART: [kat] SHA2-512-ACC
492,019 UART: [kat] ECC-384
3,774,723 UART: [kat] HMAC-384Kdf
3,800,416 UART: [kat] LMS
4,873,558 UART: [kat] --
4,878,526 UART: [cold-reset] ++
4,881,270 UART: [fht] FHT @ 0x50003400
4,892,909 UART: [idev] ++
4,893,628 UART: [idev] CDI.KEYID = 6
4,894,821 UART: [idev] SUBJECT.KEYID = 7
4,895,976 UART: [idev] UDS.KEYID = 0
4,927,891 UART: [idev] Erasing UDS.KEYID = 0
8,241,200 UART: [idev] Sha1 KeyId Algorithm
8,262,054 UART: [idev] --
8,267,543 UART: [ldev] ++
8,268,138 UART: [ldev] CDI.KEYID = 6
8,269,326 UART: [ldev] SUBJECT.KEYID = 5
8,270,486 UART: [ldev] AUTHORITY.KEYID = 7
8,271,713 UART: [ldev] FE.KEYID = 1
8,316,596 UART: [ldev] Erasing FE.KEYID = 1
11,652,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,007 UART: [ldev] --
14,037,985 UART: [fwproc] Wait for Commands...
14,041,219 UART: [fwproc] Recv command 0x43415053
14,044,628 UART: ROM Fatal Error: 0x01020006
14,047,946 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,510 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
13,830,057 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,886 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,463 UART:
192,840 UART: Running Caliptra ROM ...
193,989 UART:
603,701 UART: [state] CFI Enabled
616,892 UART: [state] LifecycleState = Unprovisioned
619,267 UART: [state] DebugLocked = No
621,910 UART: [state] WD Timer not started. Device not locked for debugging
626,648 UART: [kat] SHA2-256
808,618 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,187 UART: [kat] ++
820,688 UART: [kat] sha1
831,022 UART: [kat] SHA2-256
834,084 UART: [kat] SHA2-384
839,188 UART: [kat] SHA2-512-ACC
841,846 UART: [kat] ECC-384
4,097,878 UART: [kat] HMAC-384Kdf
4,109,813 UART: [kat] LMS
5,183,010 UART: [kat] --
5,186,926 UART: [cold-reset] ++
5,188,765 UART: [fht] FHT @ 0x50003400
5,199,208 UART: [idev] ++
5,199,888 UART: [idev] CDI.KEYID = 6
5,201,126 UART: [idev] SUBJECT.KEYID = 7
5,202,557 UART: [idev] UDS.KEYID = 0
5,219,014 UART: [idev] Erasing UDS.KEYID = 0
8,491,106 UART: [idev] Sha1 KeyId Algorithm
8,511,667 UART: [idev] --
8,515,639 UART: [ldev] ++
8,516,210 UART: [ldev] CDI.KEYID = 6
8,517,445 UART: [ldev] SUBJECT.KEYID = 5
8,518,874 UART: [ldev] AUTHORITY.KEYID = 7
8,520,428 UART: [ldev] FE.KEYID = 1
8,533,879 UART: [ldev] Erasing FE.KEYID = 1
11,825,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,736 UART: [ldev] --
14,190,225 UART: [fwproc] Wait for Commands...
14,191,958 UART: [fwproc] Recv command 0x43415053
14,195,783 UART: ROM Fatal Error: 0x01020006
14,199,147 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,939 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
14,021,656 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,517 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,136 UART:
192,515 UART: Running Caliptra ROM ...
193,596 UART:
193,736 UART: [state] CFI Enabled
264,146 UART: [state] LifecycleState = Unprovisioned
266,059 UART: [state] DebugLocked = No
268,493 UART: [state] WD Timer not started. Device not locked for debugging
271,678 UART: [kat] SHA2-256
450,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,353 UART: [kat] ++
462,797 UART: [kat] sha1
474,384 UART: [kat] SHA2-256
477,383 UART: [kat] SHA2-384
482,882 UART: [kat] SHA2-512-ACC
485,812 UART: [kat] ECC-384
2,949,380 UART: [kat] HMAC-384Kdf
2,970,849 UART: [kat] LMS
3,500,334 UART: [kat] --
3,506,190 UART: [cold-reset] ++
3,507,218 UART: [fht] FHT @ 0x50003400
3,518,900 UART: [idev] ++
3,519,506 UART: [idev] CDI.KEYID = 6
3,520,420 UART: [idev] SUBJECT.KEYID = 7
3,521,585 UART: [idev] UDS.KEYID = 0
3,543,788 UART: [idev] Erasing UDS.KEYID = 0
6,026,302 UART: [idev] Sha1 KeyId Algorithm
6,050,066 UART: [idev] --
6,054,601 UART: [ldev] ++
6,055,171 UART: [ldev] CDI.KEYID = 6
6,056,061 UART: [ldev] SUBJECT.KEYID = 5
6,057,278 UART: [ldev] AUTHORITY.KEYID = 7
6,058,511 UART: [ldev] FE.KEYID = 1
6,099,650 UART: [ldev] Erasing FE.KEYID = 1
8,602,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,166 UART: [ldev] --
10,413,497 UART: [fwproc] Wait for Commands...
10,415,398 UART: [fwproc] Recv command 0x43415053
10,420,148 UART: ROM Fatal Error: 0x01020006
10,423,302 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,602 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,204,436 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,868 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,434 UART:
192,813 UART: Running Caliptra ROM ...
193,979 UART:
603,667 UART: [state] CFI Enabled
617,144 UART: [state] LifecycleState = Unprovisioned
618,967 UART: [state] DebugLocked = No
621,254 UART: [state] WD Timer not started. Device not locked for debugging
625,801 UART: [kat] SHA2-256
804,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,493 UART: [kat] ++
817,026 UART: [kat] sha1
828,070 UART: [kat] SHA2-256
831,125 UART: [kat] SHA2-384
836,119 UART: [kat] SHA2-512-ACC
839,045 UART: [kat] ECC-384
3,279,870 UART: [kat] HMAC-384Kdf
3,292,424 UART: [kat] LMS
3,821,926 UART: [kat] --
3,825,695 UART: [cold-reset] ++
3,827,262 UART: [fht] FHT @ 0x50003400
3,838,826 UART: [idev] ++
3,839,397 UART: [idev] CDI.KEYID = 6
3,840,377 UART: [idev] SUBJECT.KEYID = 7
3,841,477 UART: [idev] UDS.KEYID = 0
3,856,560 UART: [idev] Erasing UDS.KEYID = 0
6,314,314 UART: [idev] Sha1 KeyId Algorithm
6,336,996 UART: [idev] --
6,339,259 UART: [ldev] ++
6,339,824 UART: [ldev] CDI.KEYID = 6
6,340,728 UART: [ldev] SUBJECT.KEYID = 5
6,341,938 UART: [ldev] AUTHORITY.KEYID = 7
6,343,161 UART: [ldev] FE.KEYID = 1
6,353,113 UART: [ldev] Erasing FE.KEYID = 1
8,826,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,396 UART: [ldev] --
10,617,074 UART: [fwproc] Wait for Commands...
10,620,164 UART: [fwproc] Recv command 0x43415053
10,624,149 UART: ROM Fatal Error: 0x01020006
10,627,245 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
3,895 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,413,666 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,563 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,223,991 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,705 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,417,238 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
916,676 UART: [kat] HMAC-384Kdf
921,368 UART: [kat] LMS
1,169,680 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,767 UART: [fht] FHT @ 0x50003400
1,173,497 UART: [idev] ++
1,173,665 UART: [idev] CDI.KEYID = 6
1,174,026 UART: [idev] SUBJECT.KEYID = 7
1,174,451 UART: [idev] UDS.KEYID = 0
1,182,361 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,615 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,215,300 UART: [ldev] Erasing FE.KEYID = 1
1,241,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,248 UART: [ldev] --
1,280,658 UART: [fwproc] Wait for Commands...
1,281,369 UART: [fwproc] Recv command 0x43415053
1,282,466 UART: ROM Fatal Error: 0x01020006
1,283,625 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,123 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,172,866 UART: [idev] ++
1,173,034 UART: [idev] CDI.KEYID = 6
1,173,395 UART: [idev] SUBJECT.KEYID = 7
1,173,820 UART: [idev] UDS.KEYID = 0
1,181,366 UART: [idev] Erasing UDS.KEYID = 0
1,198,254 UART: [idev] Sha1 KeyId Algorithm
1,207,232 UART: [idev] --
1,208,283 UART: [ldev] ++
1,208,451 UART: [ldev] CDI.KEYID = 6
1,208,815 UART: [ldev] SUBJECT.KEYID = 5
1,209,242 UART: [ldev] AUTHORITY.KEYID = 7
1,209,705 UART: [ldev] FE.KEYID = 1
1,215,015 UART: [ldev] Erasing FE.KEYID = 1
1,241,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,301 UART: [ldev] --
1,280,653 UART: [fwproc] Wait for Commands...
1,281,430 UART: [fwproc] Recv command 0x43415053
1,282,561 UART: ROM Fatal Error: 0x01020006
1,283,720 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,138,522 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,321 UART: [kat] SHA2-256
901,261 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
916,104 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,571 UART: [fht] FHT @ 0x50003400
1,173,057 UART: [idev] ++
1,173,225 UART: [idev] CDI.KEYID = 6
1,173,586 UART: [idev] SUBJECT.KEYID = 7
1,174,011 UART: [idev] UDS.KEYID = 0
1,182,307 UART: [idev] Erasing UDS.KEYID = 0
1,199,129 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,366 UART: [ldev] ++
1,209,534 UART: [ldev] CDI.KEYID = 6
1,209,898 UART: [ldev] SUBJECT.KEYID = 5
1,210,325 UART: [ldev] AUTHORITY.KEYID = 7
1,210,788 UART: [ldev] FE.KEYID = 1
1,215,910 UART: [ldev] Erasing FE.KEYID = 1
1,241,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,002 UART: [ldev] --
1,281,326 UART: [fwproc] Wait for Commands...
1,282,059 UART: [fwproc] Recv command 0x43415053
1,283,086 UART: ROM Fatal Error: 0x01020006
1,284,245 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,359 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
891,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,212 UART: [kat] ++
895,364 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,075 UART: [kat] SHA2-512-ACC
905,976 UART: [kat] ECC-384
915,677 UART: [kat] HMAC-384Kdf
920,421 UART: [kat] LMS
1,168,733 UART: [kat] --
1,169,530 UART: [cold-reset] ++
1,170,014 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,181,650 UART: [idev] Erasing UDS.KEYID = 0
1,198,724 UART: [idev] Sha1 KeyId Algorithm
1,207,704 UART: [idev] --
1,208,803 UART: [ldev] ++
1,208,971 UART: [ldev] CDI.KEYID = 6
1,209,335 UART: [ldev] SUBJECT.KEYID = 5
1,209,762 UART: [ldev] AUTHORITY.KEYID = 7
1,210,225 UART: [ldev] FE.KEYID = 1
1,215,423 UART: [ldev] Erasing FE.KEYID = 1
1,241,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,927 UART: [ldev] --
1,281,429 UART: [fwproc] Wait for Commands...
1,282,076 UART: [fwproc] Recv command 0x43415053
1,283,051 UART: ROM Fatal Error: 0x01020006
1,284,210 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,138,172 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
890,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,047 UART: [kat] ++
895,199 UART: [kat] sha1
899,439 UART: [kat] SHA2-256
901,379 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,642 UART: [kat] HMAC-384Kdf
920,276 UART: [kat] LMS
1,168,588 UART: [kat] --
1,169,459 UART: [cold-reset] ++
1,169,807 UART: [fht] FHT @ 0x50003400
1,172,397 UART: [idev] ++
1,172,565 UART: [idev] CDI.KEYID = 6
1,172,926 UART: [idev] SUBJECT.KEYID = 7
1,173,351 UART: [idev] UDS.KEYID = 0
1,181,105 UART: [idev] Erasing UDS.KEYID = 0
1,198,377 UART: [idev] Sha1 KeyId Algorithm
1,207,177 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,214,902 UART: [ldev] Erasing FE.KEYID = 1
1,241,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,898 UART: [ldev] --
1,280,290 UART: [fwproc] Wait for Commands...
1,280,909 UART: [fwproc] Recv command 0x43415053
1,282,186 UART: ROM Fatal Error: 0x01020006
1,283,345 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,443 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,776 UART: [cold-reset] ++
1,170,176 UART: [fht] FHT @ 0x50003400
1,172,866 UART: [idev] ++
1,173,034 UART: [idev] CDI.KEYID = 6
1,173,395 UART: [idev] SUBJECT.KEYID = 7
1,173,820 UART: [idev] UDS.KEYID = 0
1,181,962 UART: [idev] Erasing UDS.KEYID = 0
1,199,606 UART: [idev] Sha1 KeyId Algorithm
1,208,516 UART: [idev] --
1,209,547 UART: [ldev] ++
1,209,715 UART: [ldev] CDI.KEYID = 6
1,210,079 UART: [ldev] SUBJECT.KEYID = 5
1,210,506 UART: [ldev] AUTHORITY.KEYID = 7
1,210,969 UART: [ldev] FE.KEYID = 1
1,216,193 UART: [ldev] Erasing FE.KEYID = 1
1,242,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,979 UART: [ldev] --
1,282,323 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x43415053
1,284,039 UART: ROM Fatal Error: 0x01020006
1,285,198 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,396 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,399 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,014 UART:
192,398 UART: Running Caliptra ROM ...
193,518 UART:
193,660 UART: [state] CFI Enabled
262,366 UART: [state] LifecycleState = Unprovisioned
264,777 UART: [state] DebugLocked = No
266,875 UART: [state] WD Timer not started. Device not locked for debugging
271,416 UART: [kat] SHA2-256
453,353 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,904 UART: [kat] ++
465,385 UART: [kat] sha1
476,213 UART: [kat] SHA2-256
479,227 UART: [kat] SHA2-384
485,204 UART: [kat] SHA2-512-ACC
487,821 UART: [kat] ECC-384
3,777,353 UART: [kat] HMAC-384Kdf
3,801,085 UART: [kat] LMS
4,874,220 UART: [kat] --
4,880,299 UART: [cold-reset] ++
4,882,347 UART: [fht] FHT @ 0x50003400
4,892,790 UART: [idev] ++
4,893,473 UART: [idev] CDI.KEYID = 6
4,894,674 UART: [idev] SUBJECT.KEYID = 7
4,895,835 UART: [idev] UDS.KEYID = 0
4,927,680 UART: [idev] Erasing UDS.KEYID = 0
8,241,112 UART: [idev] Sha1 KeyId Algorithm
8,263,632 UART: [idev] --
8,268,652 UART: [ldev] ++
8,269,272 UART: [ldev] CDI.KEYID = 6
8,270,458 UART: [ldev] SUBJECT.KEYID = 5
8,271,681 UART: [ldev] AUTHORITY.KEYID = 7
8,272,812 UART: [ldev] FE.KEYID = 1
8,316,557 UART: [ldev] Erasing FE.KEYID = 1
11,651,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,173 UART: [ldev] --
14,037,033 UART: [fwproc] Wait for Commands...
14,038,534 UART: [fwproc] Recv command 0x4d454153
14,044,204 UART: ROM Fatal Error: 0x01020006
14,047,530 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,644 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
13,850,177 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,970 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,526 UART:
192,892 UART: Running Caliptra ROM ...
194,048 UART:
603,600 UART: [state] CFI Enabled
619,402 UART: [state] LifecycleState = Unprovisioned
621,798 UART: [state] DebugLocked = No
622,980 UART: [state] WD Timer not started. Device not locked for debugging
626,101 UART: [kat] SHA2-256
808,082 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,631 UART: [kat] ++
820,130 UART: [kat] sha1
830,139 UART: [kat] SHA2-256
833,205 UART: [kat] SHA2-384
838,423 UART: [kat] SHA2-512-ACC
841,030 UART: [kat] ECC-384
4,096,237 UART: [kat] HMAC-384Kdf
4,108,670 UART: [kat] LMS
5,181,822 UART: [kat] --
5,187,957 UART: [cold-reset] ++
5,189,581 UART: [fht] FHT @ 0x50003400
5,201,842 UART: [idev] ++
5,202,526 UART: [idev] CDI.KEYID = 6
5,203,755 UART: [idev] SUBJECT.KEYID = 7
5,205,183 UART: [idev] UDS.KEYID = 0
5,220,565 UART: [idev] Erasing UDS.KEYID = 0
8,492,911 UART: [idev] Sha1 KeyId Algorithm
8,515,762 UART: [idev] --
8,518,890 UART: [ldev] ++
8,519,454 UART: [ldev] CDI.KEYID = 6
8,520,682 UART: [ldev] SUBJECT.KEYID = 5
8,522,118 UART: [ldev] AUTHORITY.KEYID = 7
8,523,673 UART: [ldev] FE.KEYID = 1
8,534,495 UART: [ldev] Erasing FE.KEYID = 1
11,821,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,159,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,178,994 UART: [ldev] --
14,183,178 UART: [fwproc] Wait for Commands...
14,185,062 UART: [fwproc] Recv command 0x4d454153
14,189,924 UART: ROM Fatal Error: 0x01020006
14,193,287 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,898 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
14,017,044 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,520 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,137 UART:
192,513 UART: Running Caliptra ROM ...
193,696 UART:
193,860 UART: [state] CFI Enabled
263,480 UART: [state] LifecycleState = Unprovisioned
265,394 UART: [state] DebugLocked = No
266,883 UART: [state] WD Timer not started. Device not locked for debugging
271,098 UART: [kat] SHA2-256
450,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,775 UART: [kat] ++
462,307 UART: [kat] sha1
474,111 UART: [kat] SHA2-256
477,131 UART: [kat] SHA2-384
483,267 UART: [kat] SHA2-512-ACC
486,252 UART: [kat] ECC-384
2,950,123 UART: [kat] HMAC-384Kdf
2,973,289 UART: [kat] LMS
3,502,766 UART: [kat] --
3,506,260 UART: [cold-reset] ++
3,508,038 UART: [fht] FHT @ 0x50003400
3,518,917 UART: [idev] ++
3,519,479 UART: [idev] CDI.KEYID = 6
3,520,402 UART: [idev] SUBJECT.KEYID = 7
3,521,562 UART: [idev] UDS.KEYID = 0
3,544,887 UART: [idev] Erasing UDS.KEYID = 0
6,027,226 UART: [idev] Sha1 KeyId Algorithm
6,049,541 UART: [idev] --
6,054,383 UART: [ldev] ++
6,054,966 UART: [ldev] CDI.KEYID = 6
6,055,856 UART: [ldev] SUBJECT.KEYID = 5
6,057,073 UART: [ldev] AUTHORITY.KEYID = 7
6,058,307 UART: [ldev] FE.KEYID = 1
6,102,178 UART: [ldev] Erasing FE.KEYID = 1
8,618,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,558 UART: [ldev] --
10,426,827 UART: [fwproc] Wait for Commands...
10,428,759 UART: [fwproc] Recv command 0x4d454153
10,433,883 UART: ROM Fatal Error: 0x01020006
10,436,971 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,367 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,208,320 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,959 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,563 UART:
192,946 UART: Running Caliptra ROM ...
194,132 UART:
603,674 UART: [state] CFI Enabled
619,756 UART: [state] LifecycleState = Unprovisioned
621,645 UART: [state] DebugLocked = No
623,206 UART: [state] WD Timer not started. Device not locked for debugging
627,636 UART: [kat] SHA2-256
806,786 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,312 UART: [kat] ++
818,813 UART: [kat] sha1
829,473 UART: [kat] SHA2-256
832,530 UART: [kat] SHA2-384
839,791 UART: [kat] SHA2-512-ACC
842,736 UART: [kat] ECC-384
3,283,321 UART: [kat] HMAC-384Kdf
3,296,805 UART: [kat] LMS
3,826,296 UART: [kat] --
3,830,566 UART: [cold-reset] ++
3,832,387 UART: [fht] FHT @ 0x50003400
3,843,252 UART: [idev] ++
3,843,810 UART: [idev] CDI.KEYID = 6
3,844,718 UART: [idev] SUBJECT.KEYID = 7
3,845,926 UART: [idev] UDS.KEYID = 0
3,860,385 UART: [idev] Erasing UDS.KEYID = 0
6,316,115 UART: [idev] Sha1 KeyId Algorithm
6,338,365 UART: [idev] --
6,341,388 UART: [ldev] ++
6,341,953 UART: [ldev] CDI.KEYID = 6
6,342,910 UART: [ldev] SUBJECT.KEYID = 5
6,344,065 UART: [ldev] AUTHORITY.KEYID = 7
6,345,299 UART: [ldev] FE.KEYID = 1
6,356,999 UART: [ldev] Erasing FE.KEYID = 1
8,829,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,799 UART: [ldev] --
10,618,562 UART: [fwproc] Wait for Commands...
10,621,629 UART: [fwproc] Recv command 0x4d454153
10,625,889 UART: ROM Fatal Error: 0x01020006
10,628,983 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,871 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,404,756 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,639 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,185,285 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,783 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,410,877 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,722 UART: [state] LifecycleState = Unprovisioned
86,377 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,126 UART: [kat] SHA2-256
891,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,805 UART: [kat] ++
895,957 UART: [kat] sha1
900,327 UART: [kat] SHA2-256
902,267 UART: [kat] SHA2-384
904,996 UART: [kat] SHA2-512-ACC
906,897 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,169,687 UART: [cold-reset] ++
1,170,241 UART: [fht] FHT @ 0x50003400
1,173,019 UART: [idev] ++
1,173,187 UART: [idev] CDI.KEYID = 6
1,173,548 UART: [idev] SUBJECT.KEYID = 7
1,173,973 UART: [idev] UDS.KEYID = 0
1,181,953 UART: [idev] Erasing UDS.KEYID = 0
1,199,375 UART: [idev] Sha1 KeyId Algorithm
1,208,343 UART: [idev] --
1,209,426 UART: [ldev] ++
1,209,594 UART: [ldev] CDI.KEYID = 6
1,209,958 UART: [ldev] SUBJECT.KEYID = 5
1,210,385 UART: [ldev] AUTHORITY.KEYID = 7
1,210,848 UART: [ldev] FE.KEYID = 1
1,216,000 UART: [ldev] Erasing FE.KEYID = 1
1,242,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,482 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,503 UART: [fwproc] Recv command 0x4d454153
1,283,907 UART: ROM Fatal Error: 0x01020006
1,285,066 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,724 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,469 UART: [kat] SHA2-256
891,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,148 UART: [kat] ++
895,300 UART: [kat] sha1
899,444 UART: [kat] SHA2-256
901,384 UART: [kat] SHA2-384
904,157 UART: [kat] SHA2-512-ACC
906,058 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,036 UART: [idev] ++
1,173,204 UART: [idev] CDI.KEYID = 6
1,173,565 UART: [idev] SUBJECT.KEYID = 7
1,173,990 UART: [idev] UDS.KEYID = 0
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,208,334 UART: [idev] --
1,209,339 UART: [ldev] ++
1,209,507 UART: [ldev] CDI.KEYID = 6
1,209,871 UART: [ldev] SUBJECT.KEYID = 5
1,210,298 UART: [ldev] AUTHORITY.KEYID = 7
1,210,761 UART: [ldev] FE.KEYID = 1
1,215,935 UART: [ldev] Erasing FE.KEYID = 1
1,242,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,951 UART: [ldev] --
1,282,229 UART: [fwproc] Wait for Commands...
1,282,860 UART: [fwproc] Recv command 0x4d454153
1,284,138 UART: ROM Fatal Error: 0x01020006
1,285,297 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,393 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,924 UART: [kat] HMAC-384Kdf
920,508 UART: [kat] LMS
1,168,820 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,261 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,181,875 UART: [idev] Erasing UDS.KEYID = 0
1,198,487 UART: [idev] Sha1 KeyId Algorithm
1,207,261 UART: [idev] --
1,208,380 UART: [ldev] ++
1,208,548 UART: [ldev] CDI.KEYID = 6
1,208,912 UART: [ldev] SUBJECT.KEYID = 5
1,209,339 UART: [ldev] AUTHORITY.KEYID = 7
1,209,802 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,258 UART: [ldev] --
1,280,624 UART: [fwproc] Wait for Commands...
1,281,315 UART: [fwproc] Recv command 0x4d454153
1,282,561 UART: ROM Fatal Error: 0x01020006
1,283,720 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,528 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,925 UART: [state] LifecycleState = Unprovisioned
86,580 UART: [state] DebugLocked = No
87,162 UART: [state] WD Timer not started. Device not locked for debugging
88,419 UART: [kat] SHA2-256
891,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,098 UART: [kat] ++
896,250 UART: [kat] sha1
900,618 UART: [kat] SHA2-256
902,558 UART: [kat] SHA2-384
905,327 UART: [kat] SHA2-512-ACC
907,228 UART: [kat] ECC-384
917,083 UART: [kat] HMAC-384Kdf
921,593 UART: [kat] LMS
1,169,905 UART: [kat] --
1,170,596 UART: [cold-reset] ++
1,171,162 UART: [fht] FHT @ 0x50003400
1,173,846 UART: [idev] ++
1,174,014 UART: [idev] CDI.KEYID = 6
1,174,375 UART: [idev] SUBJECT.KEYID = 7
1,174,800 UART: [idev] UDS.KEYID = 0
1,182,850 UART: [idev] Erasing UDS.KEYID = 0
1,200,186 UART: [idev] Sha1 KeyId Algorithm
1,209,100 UART: [idev] --
1,209,945 UART: [ldev] ++
1,210,113 UART: [ldev] CDI.KEYID = 6
1,210,477 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,887 UART: [ldev] Erasing FE.KEYID = 1
1,243,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,465 UART: [ldev] --
1,282,785 UART: [fwproc] Wait for Commands...
1,283,548 UART: [fwproc] Recv command 0x4d454153
1,284,712 UART: ROM Fatal Error: 0x01020006
1,285,871 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,425 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,647 UART: [kat] SHA2-256
901,587 UART: [kat] SHA2-384
904,110 UART: [kat] SHA2-512-ACC
906,011 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,537 UART: [fht] FHT @ 0x50003400
1,173,373 UART: [idev] ++
1,173,541 UART: [idev] CDI.KEYID = 6
1,173,902 UART: [idev] SUBJECT.KEYID = 7
1,174,327 UART: [idev] UDS.KEYID = 0
1,182,357 UART: [idev] Erasing UDS.KEYID = 0
1,199,813 UART: [idev] Sha1 KeyId Algorithm
1,208,551 UART: [idev] --
1,209,470 UART: [ldev] ++
1,209,638 UART: [ldev] CDI.KEYID = 6
1,210,002 UART: [ldev] SUBJECT.KEYID = 5
1,210,429 UART: [ldev] AUTHORITY.KEYID = 7
1,210,892 UART: [ldev] FE.KEYID = 1
1,216,148 UART: [ldev] Erasing FE.KEYID = 1
1,242,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,932 UART: [ldev] --
1,281,234 UART: [fwproc] Wait for Commands...
1,282,049 UART: [fwproc] Recv command 0x4d454153
1,283,235 UART: ROM Fatal Error: 0x01020006
1,284,394 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,136,284 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
891,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,722 UART: [kat] ++
895,874 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,925 UART: [kat] SHA2-512-ACC
906,826 UART: [kat] ECC-384
916,657 UART: [kat] HMAC-384Kdf
921,347 UART: [kat] LMS
1,169,659 UART: [kat] --
1,170,472 UART: [cold-reset] ++
1,170,896 UART: [fht] FHT @ 0x50003400
1,173,406 UART: [idev] ++
1,173,574 UART: [idev] CDI.KEYID = 6
1,173,935 UART: [idev] SUBJECT.KEYID = 7
1,174,360 UART: [idev] UDS.KEYID = 0
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,738 UART: [idev] Sha1 KeyId Algorithm
1,208,598 UART: [idev] --
1,209,653 UART: [ldev] ++
1,209,821 UART: [ldev] CDI.KEYID = 6
1,210,185 UART: [ldev] SUBJECT.KEYID = 5
1,210,612 UART: [ldev] AUTHORITY.KEYID = 7
1,211,075 UART: [ldev] FE.KEYID = 1
1,216,487 UART: [ldev] Erasing FE.KEYID = 1
1,242,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,523 UART: [ldev] --
1,281,819 UART: [fwproc] Wait for Commands...
1,282,614 UART: [fwproc] Recv command 0x4d454153
1,284,072 UART: ROM Fatal Error: 0x01020006
1,285,231 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,851 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,537 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,228 UART:
192,629 UART: Running Caliptra ROM ...
193,852 UART:
194,010 UART: [state] CFI Enabled
261,172 UART: [state] LifecycleState = Unprovisioned
263,535 UART: [state] DebugLocked = No
265,886 UART: [state] WD Timer not started. Device not locked for debugging
270,875 UART: [kat] SHA2-256
452,813 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,324 UART: [kat] ++
464,779 UART: [kat] sha1
475,500 UART: [kat] SHA2-256
478,514 UART: [kat] SHA2-384
483,208 UART: [kat] SHA2-512-ACC
485,847 UART: [kat] ECC-384
3,779,115 UART: [kat] HMAC-384Kdf
3,803,839 UART: [kat] LMS
4,877,006 UART: [kat] --
4,880,051 UART: [cold-reset] ++
4,881,609 UART: [fht] FHT @ 0x50003400
4,893,178 UART: [idev] ++
4,893,885 UART: [idev] CDI.KEYID = 6
4,895,075 UART: [idev] SUBJECT.KEYID = 7
4,896,192 UART: [idev] UDS.KEYID = 0
4,930,450 UART: [idev] Erasing UDS.KEYID = 0
8,244,065 UART: [idev] Sha1 KeyId Algorithm
8,265,976 UART: [idev] --
8,269,053 UART: [ldev] ++
8,269,675 UART: [ldev] CDI.KEYID = 6
8,270,803 UART: [ldev] SUBJECT.KEYID = 5
8,272,025 UART: [ldev] AUTHORITY.KEYID = 7
8,273,175 UART: [ldev] FE.KEYID = 1
8,317,386 UART: [ldev] Erasing FE.KEYID = 1
11,651,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,834 UART: [ldev] --
14,038,156 UART: [fwproc] Wait for Commands...
14,040,793 UART: [fwproc] Recv command 0x43415053
14,045,286 UART: ROM Fatal Error: 0x01020006
14,048,607 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,357 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
13,827,777 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
3,822 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,436 UART:
192,811 UART: Running Caliptra ROM ...
193,926 UART:
603,613 UART: [state] CFI Enabled
617,715 UART: [state] LifecycleState = Unprovisioned
620,049 UART: [state] DebugLocked = No
622,070 UART: [state] WD Timer not started. Device not locked for debugging
627,082 UART: [kat] SHA2-256
808,993 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,587 UART: [kat] ++
821,081 UART: [kat] sha1
831,419 UART: [kat] SHA2-256
834,435 UART: [kat] SHA2-384
839,774 UART: [kat] SHA2-512-ACC
842,380 UART: [kat] ECC-384
4,098,899 UART: [kat] HMAC-384Kdf
4,111,281 UART: [kat] LMS
5,184,443 UART: [kat] --
5,188,556 UART: [cold-reset] ++
5,190,652 UART: [fht] FHT @ 0x50003400
5,202,337 UART: [idev] ++
5,203,002 UART: [idev] CDI.KEYID = 6
5,204,187 UART: [idev] SUBJECT.KEYID = 7
5,205,668 UART: [idev] UDS.KEYID = 0
5,220,542 UART: [idev] Erasing UDS.KEYID = 0
8,493,657 UART: [idev] Sha1 KeyId Algorithm
8,515,613 UART: [idev] --
8,521,202 UART: [ldev] ++
8,521,811 UART: [ldev] CDI.KEYID = 6
8,523,001 UART: [ldev] SUBJECT.KEYID = 5
8,524,444 UART: [ldev] AUTHORITY.KEYID = 7
8,526,007 UART: [ldev] FE.KEYID = 1
8,536,876 UART: [ldev] Erasing FE.KEYID = 1
11,827,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,015 UART: [ldev] --
14,194,642 UART: [fwproc] Wait for Commands...
14,197,560 UART: [fwproc] Recv command 0x43415053
14,201,760 UART: ROM Fatal Error: 0x01020006
14,205,083 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,767 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
14,015,305 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,463 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,110 UART:
192,482 UART: Running Caliptra ROM ...
193,661 UART:
193,816 UART: [state] CFI Enabled
265,680 UART: [state] LifecycleState = Unprovisioned
267,618 UART: [state] DebugLocked = No
269,273 UART: [state] WD Timer not started. Device not locked for debugging
272,420 UART: [kat] SHA2-256
451,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,142 UART: [kat] ++
463,594 UART: [kat] sha1
474,791 UART: [kat] SHA2-256
477,800 UART: [kat] SHA2-384
483,890 UART: [kat] SHA2-512-ACC
486,835 UART: [kat] ECC-384
2,947,580 UART: [kat] HMAC-384Kdf
2,970,239 UART: [kat] LMS
3,499,705 UART: [kat] --
3,504,452 UART: [cold-reset] ++
3,506,874 UART: [fht] FHT @ 0x50003400
3,518,335 UART: [idev] ++
3,518,903 UART: [idev] CDI.KEYID = 6
3,519,787 UART: [idev] SUBJECT.KEYID = 7
3,520,998 UART: [idev] UDS.KEYID = 0
3,542,198 UART: [idev] Erasing UDS.KEYID = 0
6,027,215 UART: [idev] Sha1 KeyId Algorithm
6,050,083 UART: [idev] --
6,054,139 UART: [ldev] ++
6,054,715 UART: [ldev] CDI.KEYID = 6
6,055,628 UART: [ldev] SUBJECT.KEYID = 5
6,056,794 UART: [ldev] AUTHORITY.KEYID = 7
6,058,034 UART: [ldev] FE.KEYID = 1
6,099,207 UART: [ldev] Erasing FE.KEYID = 1
8,599,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,387 UART: [ldev] --
10,393,272 UART: [fwproc] Wait for Commands...
10,394,912 UART: [fwproc] Recv command 0x43415053
10,399,606 UART: ROM Fatal Error: 0x01020006
10,402,703 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,728 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,185,192 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,751 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,369 UART:
192,755 UART: Running Caliptra ROM ...
193,931 UART:
603,554 UART: [state] CFI Enabled
617,343 UART: [state] LifecycleState = Unprovisioned
619,201 UART: [state] DebugLocked = No
621,502 UART: [state] WD Timer not started. Device not locked for debugging
624,752 UART: [kat] SHA2-256
803,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,473 UART: [kat] ++
815,917 UART: [kat] sha1
828,194 UART: [kat] SHA2-256
831,255 UART: [kat] SHA2-384
837,550 UART: [kat] SHA2-512-ACC
840,477 UART: [kat] ECC-384
3,283,479 UART: [kat] HMAC-384Kdf
3,295,560 UART: [kat] LMS
3,825,014 UART: [kat] --
3,828,518 UART: [cold-reset] ++
3,830,664 UART: [fht] FHT @ 0x50003400
3,842,883 UART: [idev] ++
3,843,449 UART: [idev] CDI.KEYID = 6
3,844,383 UART: [idev] SUBJECT.KEYID = 7
3,845,591 UART: [idev] UDS.KEYID = 0
3,863,072 UART: [idev] Erasing UDS.KEYID = 0
6,317,834 UART: [idev] Sha1 KeyId Algorithm
6,340,678 UART: [idev] --
6,344,244 UART: [ldev] ++
6,344,808 UART: [ldev] CDI.KEYID = 6
6,345,696 UART: [ldev] SUBJECT.KEYID = 5
6,346,857 UART: [ldev] AUTHORITY.KEYID = 7
6,348,196 UART: [ldev] FE.KEYID = 1
6,359,948 UART: [ldev] Erasing FE.KEYID = 1
8,836,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,633 UART: [ldev] --
10,629,797 UART: [fwproc] Wait for Commands...
10,631,914 UART: [fwproc] Recv command 0x43415053
10,636,494 UART: ROM Fatal Error: 0x01020006
10,639,639 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,842 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,407,448 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,437 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,205,209 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,633 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,407,730 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,801 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
891,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
900,323 UART: [kat] SHA2-256
902,263 UART: [kat] SHA2-384
905,130 UART: [kat] SHA2-512-ACC
907,031 UART: [kat] ECC-384
917,066 UART: [kat] HMAC-384Kdf
921,662 UART: [kat] LMS
1,169,974 UART: [kat] --
1,170,809 UART: [cold-reset] ++
1,171,191 UART: [fht] FHT @ 0x50003400
1,173,831 UART: [idev] ++
1,173,999 UART: [idev] CDI.KEYID = 6
1,174,360 UART: [idev] SUBJECT.KEYID = 7
1,174,785 UART: [idev] UDS.KEYID = 0
1,182,581 UART: [idev] Erasing UDS.KEYID = 0
1,198,989 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] --
1,208,906 UART: [ldev] ++
1,209,074 UART: [ldev] CDI.KEYID = 6
1,209,438 UART: [ldev] SUBJECT.KEYID = 5
1,209,865 UART: [ldev] AUTHORITY.KEYID = 7
1,210,328 UART: [ldev] FE.KEYID = 1
1,215,400 UART: [ldev] Erasing FE.KEYID = 1
1,242,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,094 UART: [ldev] --
1,281,520 UART: [fwproc] Wait for Commands...
1,282,165 UART: [fwproc] Recv command 0x43415053
1,283,240 UART: ROM Fatal Error: 0x01020006
1,284,399 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,741 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,621 UART: [kat] SHA2-512-ACC
906,522 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,169,822 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,181,994 UART: [idev] Erasing UDS.KEYID = 0
1,199,152 UART: [idev] Sha1 KeyId Algorithm
1,208,010 UART: [idev] --
1,208,947 UART: [ldev] ++
1,209,115 UART: [ldev] CDI.KEYID = 6
1,209,479 UART: [ldev] SUBJECT.KEYID = 5
1,209,906 UART: [ldev] AUTHORITY.KEYID = 7
1,210,369 UART: [ldev] FE.KEYID = 1
1,215,623 UART: [ldev] Erasing FE.KEYID = 1
1,241,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,575 UART: [ldev] --
1,281,061 UART: [fwproc] Wait for Commands...
1,281,654 UART: [fwproc] Recv command 0x43415053
1,282,739 UART: ROM Fatal Error: 0x01020006
1,283,898 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,876 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
915,890 UART: [kat] HMAC-384Kdf
920,602 UART: [kat] LMS
1,168,914 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,198,513 UART: [idev] Sha1 KeyId Algorithm
1,207,483 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,214,946 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,582 UART: [ldev] --
1,281,038 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x43415053
1,282,698 UART: ROM Fatal Error: 0x01020006
1,283,857 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,063 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
87,076 UART: [state] WD Timer not started. Device not locked for debugging
88,357 UART: [kat] SHA2-256
891,907 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,036 UART: [kat] ++
896,188 UART: [kat] sha1
900,386 UART: [kat] SHA2-256
902,326 UART: [kat] SHA2-384
905,115 UART: [kat] SHA2-512-ACC
907,016 UART: [kat] ECC-384
916,899 UART: [kat] HMAC-384Kdf
921,603 UART: [kat] LMS
1,169,915 UART: [kat] --
1,170,924 UART: [cold-reset] ++
1,171,498 UART: [fht] FHT @ 0x50003400
1,173,996 UART: [idev] ++
1,174,164 UART: [idev] CDI.KEYID = 6
1,174,525 UART: [idev] SUBJECT.KEYID = 7
1,174,950 UART: [idev] UDS.KEYID = 0
1,182,662 UART: [idev] Erasing UDS.KEYID = 0
1,200,006 UART: [idev] Sha1 KeyId Algorithm
1,209,096 UART: [idev] --
1,210,061 UART: [ldev] ++
1,210,229 UART: [ldev] CDI.KEYID = 6
1,210,593 UART: [ldev] SUBJECT.KEYID = 5
1,211,020 UART: [ldev] AUTHORITY.KEYID = 7
1,211,483 UART: [ldev] FE.KEYID = 1
1,216,565 UART: [ldev] Erasing FE.KEYID = 1
1,243,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,371 UART: [ldev] --
1,282,779 UART: [fwproc] Wait for Commands...
1,283,578 UART: [fwproc] Recv command 0x43415053
1,284,701 UART: ROM Fatal Error: 0x01020006
1,285,860 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,704 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
916,366 UART: [kat] HMAC-384Kdf
920,954 UART: [kat] LMS
1,169,266 UART: [kat] --
1,170,059 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,172,839 UART: [idev] ++
1,173,007 UART: [idev] CDI.KEYID = 6
1,173,368 UART: [idev] SUBJECT.KEYID = 7
1,173,793 UART: [idev] UDS.KEYID = 0
1,181,825 UART: [idev] Erasing UDS.KEYID = 0
1,198,461 UART: [idev] Sha1 KeyId Algorithm
1,207,397 UART: [idev] --
1,208,596 UART: [ldev] ++
1,208,764 UART: [ldev] CDI.KEYID = 6
1,209,128 UART: [ldev] SUBJECT.KEYID = 5
1,209,555 UART: [ldev] AUTHORITY.KEYID = 7
1,210,018 UART: [ldev] FE.KEYID = 1
1,214,924 UART: [ldev] Erasing FE.KEYID = 1
1,241,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,370 UART: [ldev] --
1,281,840 UART: [fwproc] Wait for Commands...
1,282,639 UART: [fwproc] Recv command 0x43415053
1,283,720 UART: ROM Fatal Error: 0x01020006
1,284,879 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,477 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
915,605 UART: [kat] HMAC-384Kdf
920,361 UART: [kat] LMS
1,168,673 UART: [kat] --
1,169,638 UART: [cold-reset] ++
1,169,982 UART: [fht] FHT @ 0x50003400
1,172,456 UART: [idev] ++
1,172,624 UART: [idev] CDI.KEYID = 6
1,172,985 UART: [idev] SUBJECT.KEYID = 7
1,173,410 UART: [idev] UDS.KEYID = 0
1,181,652 UART: [idev] Erasing UDS.KEYID = 0
1,199,134 UART: [idev] Sha1 KeyId Algorithm
1,208,164 UART: [idev] --
1,209,181 UART: [ldev] ++
1,209,349 UART: [ldev] CDI.KEYID = 6
1,209,713 UART: [ldev] SUBJECT.KEYID = 5
1,210,140 UART: [ldev] AUTHORITY.KEYID = 7
1,210,603 UART: [ldev] FE.KEYID = 1
1,215,627 UART: [ldev] Erasing FE.KEYID = 1
1,242,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,489 UART: [ldev] --
1,280,883 UART: [fwproc] Wait for Commands...
1,281,582 UART: [fwproc] Recv command 0x43415053
1,282,769 UART: ROM Fatal Error: 0x01020006
1,283,928 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,954 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,508 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,172 UART:
192,543 UART: Running Caliptra ROM ...
193,712 UART:
193,864 UART: [state] CFI Enabled
265,455 UART: [state] LifecycleState = Unprovisioned
267,826 UART: [state] DebugLocked = No
270,580 UART: [state] WD Timer not started. Device not locked for debugging
276,072 UART: [kat] SHA2-256
457,960 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,516 UART: [kat] ++
470,050 UART: [kat] sha1
479,973 UART: [kat] SHA2-256
482,989 UART: [kat] SHA2-384
488,264 UART: [kat] SHA2-512-ACC
490,935 UART: [kat] ECC-384
3,777,754 UART: [kat] HMAC-384Kdf
3,803,991 UART: [kat] LMS
4,877,142 UART: [kat] --
4,879,971 UART: [cold-reset] ++
4,881,856 UART: [fht] FHT @ 0x50003400
4,892,468 UART: [idev] ++
4,893,141 UART: [idev] CDI.KEYID = 6
4,894,400 UART: [idev] SUBJECT.KEYID = 7
4,895,502 UART: [idev] UDS.KEYID = 0
4,930,989 UART: [idev] Erasing UDS.KEYID = 0
8,240,561 UART: [idev] Sha1 KeyId Algorithm
8,262,975 UART: [idev] --
8,266,593 UART: [ldev] ++
8,267,158 UART: [ldev] CDI.KEYID = 6
8,268,402 UART: [ldev] SUBJECT.KEYID = 5
8,269,575 UART: [ldev] AUTHORITY.KEYID = 7
8,270,673 UART: [ldev] FE.KEYID = 1
8,298,326 UART: [ldev] Erasing FE.KEYID = 1
11,633,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,198 UART: [ldev] --
14,018,090 UART: [fwproc] Wait for Commands...
14,023,219 UART: ROM Fatal Error: 0x01020009
14,026,543 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,590 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
13,825,474 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,979 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,551 UART:
192,935 UART: Running Caliptra ROM ...
194,132 UART:
603,609 UART: [state] CFI Enabled
617,920 UART: [state] LifecycleState = Unprovisioned
619,973 UART: [state] DebugLocked = No
621,346 UART: [state] WD Timer not started. Device not locked for debugging
625,649 UART: [kat] SHA2-256
807,454 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,984 UART: [kat] ++
819,618 UART: [kat] sha1
829,792 UART: [kat] SHA2-256
832,794 UART: [kat] SHA2-384
839,029 UART: [kat] SHA2-512-ACC
841,650 UART: [kat] ECC-384
4,096,539 UART: [kat] HMAC-384Kdf
4,107,707 UART: [kat] LMS
5,180,847 UART: [kat] --
5,185,760 UART: [cold-reset] ++
5,188,155 UART: [fht] FHT @ 0x50003400
5,201,082 UART: [idev] ++
5,201,752 UART: [idev] CDI.KEYID = 6
5,202,980 UART: [idev] SUBJECT.KEYID = 7
5,204,463 UART: [idev] UDS.KEYID = 0
5,223,296 UART: [idev] Erasing UDS.KEYID = 0
8,494,773 UART: [idev] Sha1 KeyId Algorithm
8,516,418 UART: [idev] --
8,519,387 UART: [ldev] ++
8,519,950 UART: [ldev] CDI.KEYID = 6
8,521,180 UART: [ldev] SUBJECT.KEYID = 5
8,522,667 UART: [ldev] AUTHORITY.KEYID = 7
8,524,220 UART: [ldev] FE.KEYID = 1
8,537,618 UART: [ldev] Erasing FE.KEYID = 1
11,829,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,954 UART: [ldev] --
14,196,776 UART: [fwproc] Wait for Commands...
14,201,619 UART: ROM Fatal Error: 0x01020009
14,204,936 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
3,858 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
14,018,952 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,542 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,183 UART:
192,574 UART: Running Caliptra ROM ...
193,756 UART:
193,910 UART: [state] CFI Enabled
261,685 UART: [state] LifecycleState = Unprovisioned
263,616 UART: [state] DebugLocked = No
265,296 UART: [state] WD Timer not started. Device not locked for debugging
268,662 UART: [kat] SHA2-256
447,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,361 UART: [kat] ++
459,803 UART: [kat] sha1
470,033 UART: [kat] SHA2-256
473,037 UART: [kat] SHA2-384
479,340 UART: [kat] SHA2-512-ACC
482,265 UART: [kat] ECC-384
2,928,301 UART: [kat] HMAC-384Kdf
2,951,201 UART: [kat] LMS
3,480,686 UART: [kat] --
3,484,515 UART: [cold-reset] ++
3,485,638 UART: [fht] FHT @ 0x50003400
3,496,831 UART: [idev] ++
3,497,392 UART: [idev] CDI.KEYID = 6
3,498,362 UART: [idev] SUBJECT.KEYID = 7
3,499,517 UART: [idev] UDS.KEYID = 0
3,523,703 UART: [idev] Erasing UDS.KEYID = 0
6,008,629 UART: [idev] Sha1 KeyId Algorithm
6,032,610 UART: [idev] --
6,036,534 UART: [ldev] ++
6,037,141 UART: [ldev] CDI.KEYID = 6
6,038,035 UART: [ldev] SUBJECT.KEYID = 5
6,039,143 UART: [ldev] AUTHORITY.KEYID = 7
6,040,550 UART: [ldev] FE.KEYID = 1
6,079,510 UART: [ldev] Erasing FE.KEYID = 1
8,585,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,689 UART: [ldev] --
10,390,657 UART: [fwproc] Wait for Commands...
10,395,778 UART: ROM Fatal Error: 0x01020009
10,398,874 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,430 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,183,493 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,018 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,625 UART:
192,990 UART: Running Caliptra ROM ...
194,162 UART:
603,720 UART: [state] CFI Enabled
619,556 UART: [state] LifecycleState = Unprovisioned
621,423 UART: [state] DebugLocked = No
623,691 UART: [state] WD Timer not started. Device not locked for debugging
627,549 UART: [kat] SHA2-256
806,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,225 UART: [kat] ++
818,668 UART: [kat] sha1
830,186 UART: [kat] SHA2-256
833,246 UART: [kat] SHA2-384
839,270 UART: [kat] SHA2-512-ACC
842,249 UART: [kat] ECC-384
3,283,088 UART: [kat] HMAC-384Kdf
3,296,188 UART: [kat] LMS
3,825,680 UART: [kat] --
3,829,822 UART: [cold-reset] ++
3,832,081 UART: [fht] FHT @ 0x50003400
3,843,758 UART: [idev] ++
3,844,316 UART: [idev] CDI.KEYID = 6
3,845,377 UART: [idev] SUBJECT.KEYID = 7
3,846,445 UART: [idev] UDS.KEYID = 0
3,860,175 UART: [idev] Erasing UDS.KEYID = 0
6,318,730 UART: [idev] Sha1 KeyId Algorithm
6,341,684 UART: [idev] --
6,345,780 UART: [ldev] ++
6,346,347 UART: [ldev] CDI.KEYID = 6
6,347,255 UART: [ldev] SUBJECT.KEYID = 5
6,348,466 UART: [ldev] AUTHORITY.KEYID = 7
6,349,694 UART: [ldev] FE.KEYID = 1
6,358,848 UART: [ldev] Erasing FE.KEYID = 1
8,829,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,121 UART: [ldev] --
10,620,808 UART: [fwproc] Wait for Commands...
10,625,920 UART: ROM Fatal Error: 0x01020009
10,629,019 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
3,874 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,398,843 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,564 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,183,902 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,854 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,408,115 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,453 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,098 UART:
192,495 UART: Running Caliptra ROM ...
193,722 UART:
193,876 UART: [state] CFI Enabled
262,888 UART: [state] LifecycleState = Unprovisioned
265,257 UART: [state] DebugLocked = No
266,477 UART: [state] WD Timer not started. Device not locked for debugging
270,522 UART: [kat] SHA2-256
452,430 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,975 UART: [kat] ++
464,561 UART: [kat] sha1
475,550 UART: [kat] SHA2-256
478,618 UART: [kat] SHA2-384
484,317 UART: [kat] SHA2-512-ACC
486,934 UART: [kat] ECC-384
3,776,238 UART: [kat] HMAC-384Kdf
3,801,639 UART: [kat] LMS
4,874,751 UART: [kat] --
4,879,826 UART: [cold-reset] ++
4,882,196 UART: [fht] FHT @ 0x50003400
4,894,169 UART: [idev] ++
4,894,846 UART: [idev] CDI.KEYID = 6
4,896,084 UART: [idev] SUBJECT.KEYID = 7
4,897,188 UART: [idev] UDS.KEYID = 0
4,929,058 UART: [idev] Erasing UDS.KEYID = 0
8,245,557 UART: [idev] Sha1 KeyId Algorithm
8,266,950 UART: [idev] --
8,271,945 UART: [ldev] ++
8,272,522 UART: [ldev] CDI.KEYID = 6
8,273,705 UART: [ldev] SUBJECT.KEYID = 5
8,274,862 UART: [ldev] AUTHORITY.KEYID = 7
8,276,090 UART: [ldev] FE.KEYID = 1
8,316,989 UART: [ldev] Erasing FE.KEYID = 1
11,653,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,103 UART: [ldev] --
14,038,429 UART: [fwproc] Wait for Commands...
14,041,074 UART: [fwproc] Recv command 0xabcd1234
14,043,404 UART: [fwproc] Invalid command received
14,048,005 UART: ROM Fatal Error: 0x01020004
14,051,327 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,351 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
13,808,174 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,753 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,370 UART:
192,768 UART: Running Caliptra ROM ...
193,888 UART:
603,364 UART: [state] CFI Enabled
617,507 UART: [state] LifecycleState = Unprovisioned
619,901 UART: [state] DebugLocked = No
622,793 UART: [state] WD Timer not started. Device not locked for debugging
628,061 UART: [kat] SHA2-256
810,072 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,622 UART: [kat] ++
822,210 UART: [kat] sha1
831,743 UART: [kat] SHA2-256
834,756 UART: [kat] SHA2-384
840,620 UART: [kat] SHA2-512-ACC
843,289 UART: [kat] ECC-384
4,097,777 UART: [kat] HMAC-384Kdf
4,109,869 UART: [kat] LMS
5,183,022 UART: [kat] --
5,186,705 UART: [cold-reset] ++
5,188,962 UART: [fht] FHT @ 0x50003400
5,199,789 UART: [idev] ++
5,200,462 UART: [idev] CDI.KEYID = 6
5,201,696 UART: [idev] SUBJECT.KEYID = 7
5,203,124 UART: [idev] UDS.KEYID = 0
5,220,039 UART: [idev] Erasing UDS.KEYID = 0
8,495,921 UART: [idev] Sha1 KeyId Algorithm
8,516,716 UART: [idev] --
8,521,351 UART: [ldev] ++
8,521,912 UART: [ldev] CDI.KEYID = 6
8,523,152 UART: [ldev] SUBJECT.KEYID = 5
8,524,591 UART: [ldev] AUTHORITY.KEYID = 7
8,526,161 UART: [ldev] FE.KEYID = 1
8,535,487 UART: [ldev] Erasing FE.KEYID = 1
11,828,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,745 UART: [ldev] --
14,191,944 UART: [fwproc] Wait for Commands...
14,193,612 UART: [fwproc] Recv command 0xabcd1234
14,195,989 UART: [fwproc] Invalid command received
14,200,002 UART: ROM Fatal Error: 0x01020004
14,203,321 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,933 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
14,021,557 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,595 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,246 UART:
192,633 UART: Running Caliptra ROM ...
193,807 UART:
193,961 UART: [state] CFI Enabled
265,024 UART: [state] LifecycleState = Unprovisioned
266,938 UART: [state] DebugLocked = No
269,530 UART: [state] WD Timer not started. Device not locked for debugging
273,476 UART: [kat] SHA2-256
452,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,165 UART: [kat] ++
464,674 UART: [kat] sha1
475,892 UART: [kat] SHA2-256
478,905 UART: [kat] SHA2-384
484,342 UART: [kat] SHA2-512-ACC
487,276 UART: [kat] ECC-384
2,948,858 UART: [kat] HMAC-384Kdf
2,974,323 UART: [kat] LMS
3,503,762 UART: [kat] --
3,507,502 UART: [cold-reset] ++
3,509,180 UART: [fht] FHT @ 0x50003400
3,520,699 UART: [idev] ++
3,521,265 UART: [idev] CDI.KEYID = 6
3,522,234 UART: [idev] SUBJECT.KEYID = 7
3,523,390 UART: [idev] UDS.KEYID = 0
3,545,517 UART: [idev] Erasing UDS.KEYID = 0
6,031,287 UART: [idev] Sha1 KeyId Algorithm
6,055,302 UART: [idev] --
6,058,843 UART: [ldev] ++
6,059,423 UART: [ldev] CDI.KEYID = 6
6,060,331 UART: [ldev] SUBJECT.KEYID = 5
6,061,495 UART: [ldev] AUTHORITY.KEYID = 7
6,062,734 UART: [ldev] FE.KEYID = 1
6,102,611 UART: [ldev] Erasing FE.KEYID = 1
8,604,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,402 UART: [ldev] --
10,416,383 UART: [fwproc] Wait for Commands...
10,419,301 UART: [fwproc] Recv command 0xabcd1234
10,421,450 UART: [fwproc] Invalid command received
10,424,876 UART: ROM Fatal Error: 0x01020004
10,428,001 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,490 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,192,480 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,958 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,538 UART:
192,903 UART: Running Caliptra ROM ...
194,076 UART:
603,643 UART: [state] CFI Enabled
616,697 UART: [state] LifecycleState = Unprovisioned
618,578 UART: [state] DebugLocked = No
620,843 UART: [state] WD Timer not started. Device not locked for debugging
624,628 UART: [kat] SHA2-256
803,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,300 UART: [kat] ++
815,745 UART: [kat] sha1
825,162 UART: [kat] SHA2-256
828,171 UART: [kat] SHA2-384
833,284 UART: [kat] SHA2-512-ACC
836,216 UART: [kat] ECC-384
3,277,362 UART: [kat] HMAC-384Kdf
3,290,533 UART: [kat] LMS
3,820,015 UART: [kat] --
3,824,081 UART: [cold-reset] ++
3,825,883 UART: [fht] FHT @ 0x50003400
3,836,981 UART: [idev] ++
3,837,547 UART: [idev] CDI.KEYID = 6
3,838,468 UART: [idev] SUBJECT.KEYID = 7
3,839,678 UART: [idev] UDS.KEYID = 0
3,854,195 UART: [idev] Erasing UDS.KEYID = 0
6,309,367 UART: [idev] Sha1 KeyId Algorithm
6,332,744 UART: [idev] --
6,336,630 UART: [ldev] ++
6,337,199 UART: [ldev] CDI.KEYID = 6
6,338,104 UART: [ldev] SUBJECT.KEYID = 5
6,339,312 UART: [ldev] AUTHORITY.KEYID = 7
6,340,539 UART: [ldev] FE.KEYID = 1
6,352,097 UART: [ldev] Erasing FE.KEYID = 1
8,826,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,154 UART: [ldev] --
10,614,493 UART: [fwproc] Wait for Commands...
10,616,053 UART: [fwproc] Recv command 0xabcd1234
10,618,150 UART: [fwproc] Invalid command received
10,623,140 UART: ROM Fatal Error: 0x01020004
10,626,274 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,862 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,412,183 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,500 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,182,887 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
4,032 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,407,460 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,303 UART: [fht] FHT @ 0x50003400
1,172,807 UART: [idev] ++
1,172,975 UART: [idev] CDI.KEYID = 6
1,173,336 UART: [idev] SUBJECT.KEYID = 7
1,173,761 UART: [idev] UDS.KEYID = 0
1,181,485 UART: [idev] Erasing UDS.KEYID = 0
1,198,295 UART: [idev] Sha1 KeyId Algorithm
1,207,381 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,214,940 UART: [ldev] Erasing FE.KEYID = 1
1,241,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,124 UART: [ldev] --
1,280,622 UART: [fwproc] Wait for Commands...
1,281,235 UART: [fwproc] Recv command 0xabcd1234
1,281,980 UART: [fwproc] Invalid command received
1,283,037 UART: ROM Fatal Error: 0x01020004
1,284,196 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,139,076 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,206 UART: [kat] SHA2-256
902,146 UART: [kat] SHA2-384
905,003 UART: [kat] SHA2-512-ACC
906,904 UART: [kat] ECC-384
916,875 UART: [kat] HMAC-384Kdf
921,521 UART: [kat] LMS
1,169,833 UART: [kat] --
1,170,946 UART: [cold-reset] ++
1,171,286 UART: [fht] FHT @ 0x50003400
1,174,060 UART: [idev] ++
1,174,228 UART: [idev] CDI.KEYID = 6
1,174,589 UART: [idev] SUBJECT.KEYID = 7
1,175,014 UART: [idev] UDS.KEYID = 0
1,183,024 UART: [idev] Erasing UDS.KEYID = 0
1,199,950 UART: [idev] Sha1 KeyId Algorithm
1,209,006 UART: [idev] --
1,210,197 UART: [ldev] ++
1,210,365 UART: [ldev] CDI.KEYID = 6
1,210,729 UART: [ldev] SUBJECT.KEYID = 5
1,211,156 UART: [ldev] AUTHORITY.KEYID = 7
1,211,619 UART: [ldev] FE.KEYID = 1
1,216,923 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,073 UART: [ldev] --
1,282,495 UART: [fwproc] Wait for Commands...
1,283,160 UART: [fwproc] Recv command 0xabcd1234
1,283,905 UART: [fwproc] Invalid command received
1,284,788 UART: ROM Fatal Error: 0x01020004
1,285,947 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,169 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,437 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,199,621 UART: [idev] Sha1 KeyId Algorithm
1,208,389 UART: [idev] --
1,209,468 UART: [ldev] ++
1,209,636 UART: [ldev] CDI.KEYID = 6
1,210,000 UART: [ldev] SUBJECT.KEYID = 5
1,210,427 UART: [ldev] AUTHORITY.KEYID = 7
1,210,890 UART: [ldev] FE.KEYID = 1
1,215,744 UART: [ldev] Erasing FE.KEYID = 1
1,242,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,550 UART: [ldev] --
1,280,872 UART: [fwproc] Wait for Commands...
1,281,471 UART: [fwproc] Recv command 0xabcd1234
1,282,216 UART: [fwproc] Invalid command received
1,283,135 UART: ROM Fatal Error: 0x01020004
1,284,294 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,760 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,981 UART: [state] LifecycleState = Unprovisioned
86,636 UART: [state] DebugLocked = No
87,330 UART: [state] WD Timer not started. Device not locked for debugging
88,497 UART: [kat] SHA2-256
892,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,176 UART: [kat] ++
896,328 UART: [kat] sha1
900,514 UART: [kat] SHA2-256
902,454 UART: [kat] SHA2-384
905,223 UART: [kat] SHA2-512-ACC
907,124 UART: [kat] ECC-384
916,959 UART: [kat] HMAC-384Kdf
921,527 UART: [kat] LMS
1,169,839 UART: [kat] --
1,170,748 UART: [cold-reset] ++
1,171,192 UART: [fht] FHT @ 0x50003400
1,173,954 UART: [idev] ++
1,174,122 UART: [idev] CDI.KEYID = 6
1,174,483 UART: [idev] SUBJECT.KEYID = 7
1,174,908 UART: [idev] UDS.KEYID = 0
1,182,914 UART: [idev] Erasing UDS.KEYID = 0
1,200,132 UART: [idev] Sha1 KeyId Algorithm
1,208,922 UART: [idev] --
1,209,975 UART: [ldev] ++
1,210,143 UART: [ldev] CDI.KEYID = 6
1,210,507 UART: [ldev] SUBJECT.KEYID = 5
1,210,934 UART: [ldev] AUTHORITY.KEYID = 7
1,211,397 UART: [ldev] FE.KEYID = 1
1,216,739 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,423 UART: [ldev] --
1,282,823 UART: [fwproc] Wait for Commands...
1,283,514 UART: [fwproc] Recv command 0xabcd1234
1,284,259 UART: [fwproc] Invalid command received
1,285,298 UART: ROM Fatal Error: 0x01020004
1,286,457 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,138,001 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,666 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
915,968 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,169,957 UART: [cold-reset] ++
1,170,345 UART: [fht] FHT @ 0x50003400
1,172,967 UART: [idev] ++
1,173,135 UART: [idev] CDI.KEYID = 6
1,173,496 UART: [idev] SUBJECT.KEYID = 7
1,173,921 UART: [idev] UDS.KEYID = 0
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,198,885 UART: [idev] Sha1 KeyId Algorithm
1,207,547 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,215,190 UART: [ldev] Erasing FE.KEYID = 1
1,241,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,274 UART: [ldev] --
1,280,656 UART: [fwproc] Wait for Commands...
1,281,269 UART: [fwproc] Recv command 0xabcd1234
1,282,014 UART: [fwproc] Invalid command received
1,282,923 UART: ROM Fatal Error: 0x01020004
1,284,082 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,516 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,165 UART: [kat] LMS
1,169,477 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,986 UART: [fht] FHT @ 0x50003400
1,173,648 UART: [idev] ++
1,173,816 UART: [idev] CDI.KEYID = 6
1,174,177 UART: [idev] SUBJECT.KEYID = 7
1,174,602 UART: [idev] UDS.KEYID = 0
1,182,716 UART: [idev] Erasing UDS.KEYID = 0
1,199,762 UART: [idev] Sha1 KeyId Algorithm
1,208,604 UART: [idev] --
1,209,593 UART: [ldev] ++
1,209,761 UART: [ldev] CDI.KEYID = 6
1,210,125 UART: [ldev] SUBJECT.KEYID = 5
1,210,552 UART: [ldev] AUTHORITY.KEYID = 7
1,211,015 UART: [ldev] FE.KEYID = 1
1,216,367 UART: [ldev] Erasing FE.KEYID = 1
1,242,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,925 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,282,920 UART: [fwproc] Recv command 0xabcd1234
1,283,665 UART: [fwproc] Invalid command received
1,284,550 UART: ROM Fatal Error: 0x01020004
1,285,709 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,139,119 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
191,997 UART:
192,364 UART: Running Caliptra ROM ...
193,961 UART:
194,121 UART: [state] CFI Enabled
262,483 UART: [state] LifecycleState = Unprovisioned
264,856 UART: [state] DebugLocked = No
266,590 UART: [state] WD Timer not started. Device not locked for debugging
271,047 UART: [kat] SHA2-256
452,977 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,477 UART: [kat] ++
465,091 UART: [kat] sha1
476,333 UART: [kat] SHA2-256
479,341 UART: [kat] SHA2-384
485,965 UART: [kat] SHA2-512-ACC
488,543 UART: [kat] ECC-384
3,774,470 UART: [kat] HMAC-384Kdf
3,802,667 UART: [kat] LMS
4,875,810 UART: [kat] --
4,879,914 UART: [cold-reset] ++
4,882,206 UART: [fht] FHT @ 0x50003400
4,893,112 UART: [idev] ++
4,893,817 UART: [idev] CDI.KEYID = 6
4,894,992 UART: [idev] SUBJECT.KEYID = 7
4,896,162 UART: [idev] UDS.KEYID = 0
4,897,091 ready_for_fw is high
4,897,327 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,031,712 UART: [idev] Erasing UDS.KEYID = 0
8,241,914 UART: [idev] Sha1 KeyId Algorithm
8,262,727 UART: [idev] --
8,267,157 UART: [ldev] ++
8,267,720 UART: [ldev] CDI.KEYID = 6
8,268,877 UART: [ldev] SUBJECT.KEYID = 5
8,270,090 UART: [ldev] AUTHORITY.KEYID = 7
8,271,247 UART: [ldev] FE.KEYID = 1
8,298,351 UART: [ldev] Erasing FE.KEYID = 1
11,636,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,962,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,993,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,014,584 UART: [ldev] --
14,019,759 UART: [fwproc] Wait for Commands...
14,022,343 UART: [fwproc] Recv command 0x46574c44
14,024,606 UART: [fwproc] Recv'd Img size: 106620 bytes
18,001,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,082,232 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,124,681 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,442,530 >>> mbox cmd response: success
18,443,541 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,445,889 UART: [afmc] ++
18,446,495 UART: [afmc] CDI.KEYID = 6
18,447,693 UART: [afmc] SUBJECT.KEYID = 7
18,448,855 UART: [afmc] AUTHORITY.KEYID = 5
21,820,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,119,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,121,676 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,137,664 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,153,763 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,169,835 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,193,972 UART: [afmc] --
24,197,049 UART: [cold-reset] --
24,201,526 UART: [state] Locking Datavault
24,207,376 UART: [state] Locking PCR0, PCR1 and PCR31
24,209,019 UART: [state] Locking ICCM
24,211,987 UART: [exit] Launching FMC @ 0x40000000
24,220,600 UART:
24,220,832 UART: Running Caliptra FMC ...
24,221,929 UART:
24,222,085 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,223,658 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
4,803,064 ready_for_fw is high
4,803,493 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,232,151 >>> mbox cmd response: success
18,233,099 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
23,932,470 UART:
23,932,875 UART: Running Caliptra FMC ...
23,934,032 UART:
23,934,194 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
23,935,893 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,464 UART:
192,832 UART: Running Caliptra ROM ...
193,963 UART:
603,509 UART: [state] CFI Enabled
619,007 UART: [state] LifecycleState = Unprovisioned
621,383 UART: [state] DebugLocked = No
623,830 UART: [state] WD Timer not started. Device not locked for debugging
628,706 UART: [kat] SHA2-256
810,650 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,230 UART: [kat] ++
822,825 UART: [kat] sha1
832,870 UART: [kat] SHA2-256
835,909 UART: [kat] SHA2-384
841,568 UART: [kat] SHA2-512-ACC
844,149 UART: [kat] ECC-384
4,098,514 UART: [kat] HMAC-384Kdf
4,111,150 UART: [kat] LMS
5,184,276 UART: [kat] --
5,189,092 UART: [cold-reset] ++
5,190,818 UART: [fht] FHT @ 0x50003400
5,203,142 UART: [idev] ++
5,203,778 UART: [idev] CDI.KEYID = 6
5,205,014 UART: [idev] SUBJECT.KEYID = 7
5,206,470 UART: [idev] UDS.KEYID = 0
5,207,578 ready_for_fw is high
5,207,790 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,341,788 UART: [idev] Erasing UDS.KEYID = 0
8,501,554 UART: [idev] Sha1 KeyId Algorithm
8,524,499 UART: [idev] --
8,528,334 UART: [ldev] ++
8,528,909 UART: [ldev] CDI.KEYID = 6
8,530,136 UART: [ldev] SUBJECT.KEYID = 5
8,531,555 UART: [ldev] AUTHORITY.KEYID = 7
8,533,100 UART: [ldev] FE.KEYID = 1
8,545,405 UART: [ldev] Erasing FE.KEYID = 1
11,834,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,454 UART: [ldev] --
14,199,385 UART: [fwproc] Wait for Commands...
14,201,310 UART: [fwproc] Recv command 0x46574c44
14,203,613 UART: [fwproc] Recv'd Img size: 106620 bytes
18,189,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,262,993 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,305,456 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,622,743 >>> mbox cmd response: success
18,623,668 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,627,679 UART: [afmc] ++
18,628,284 UART: [afmc] CDI.KEYID = 6
18,629,471 UART: [afmc] SUBJECT.KEYID = 7
18,630,570 UART: [afmc] AUTHORITY.KEYID = 5
21,946,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,242,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,245,055 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,261,083 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,277,178 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,293,259 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,316,509 UART: [afmc] --
24,319,612 UART: [cold-reset] --
24,323,218 UART: [state] Locking Datavault
24,328,094 UART: [state] Locking PCR0, PCR1 and PCR31
24,329,734 UART: [state] Locking ICCM
24,332,665 UART: [exit] Launching FMC @ 0x40000000
24,341,266 UART:
24,341,490 UART: Running Caliptra FMC ...
24,342,507 UART:
24,342,647 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,344,290 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
5,095,032 ready_for_fw is high
5,095,450 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,416,354 >>> mbox cmd response: success
18,417,690 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
24,057,448 UART:
24,057,838 UART: Running Caliptra FMC ...
24,059,011 UART:
24,059,164 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,060,855 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,153 UART:
192,519 UART: Running Caliptra ROM ...
193,612 UART:
193,753 UART: [state] CFI Enabled
263,372 UART: [state] LifecycleState = Unprovisioned
265,199 UART: [state] DebugLocked = No
266,439 UART: [state] WD Timer not started. Device not locked for debugging
270,676 UART: [kat] SHA2-256
449,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,405 UART: [kat] ++
461,861 UART: [kat] sha1
474,438 UART: [kat] SHA2-256
477,455 UART: [kat] SHA2-384
483,736 UART: [kat] SHA2-512-ACC
486,670 UART: [kat] ECC-384
2,948,762 UART: [kat] HMAC-384Kdf
2,970,742 UART: [kat] LMS
3,500,211 UART: [kat] --
3,506,197 UART: [cold-reset] ++
3,507,133 UART: [fht] FHT @ 0x50003400
3,517,412 UART: [idev] ++
3,517,975 UART: [idev] CDI.KEYID = 6
3,518,856 UART: [idev] SUBJECT.KEYID = 7
3,520,103 UART: [idev] UDS.KEYID = 0
3,521,001 ready_for_fw is high
3,521,201 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,655,795 UART: [idev] Erasing UDS.KEYID = 0
6,027,864 UART: [idev] Sha1 KeyId Algorithm
6,051,086 UART: [idev] --
6,053,925 UART: [ldev] ++
6,054,509 UART: [ldev] CDI.KEYID = 6
6,055,396 UART: [ldev] SUBJECT.KEYID = 5
6,056,511 UART: [ldev] AUTHORITY.KEYID = 7
6,057,854 UART: [ldev] FE.KEYID = 1
6,099,810 UART: [ldev] Erasing FE.KEYID = 1
8,600,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,687 UART: [ldev] --
10,392,626 UART: [fwproc] Wait for Commands...
10,395,749 UART: [fwproc] Recv command 0x46574c44
10,397,841 UART: [fwproc] Recv'd Img size: 106964 bytes
13,708,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,785,151 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,827,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,146,227 >>> mbox cmd response: success
14,147,143 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,150,053 UART: [afmc] ++
14,150,660 UART: [afmc] CDI.KEYID = 6
14,151,575 UART: [afmc] SUBJECT.KEYID = 7
14,152,754 UART: [afmc] AUTHORITY.KEYID = 5
16,676,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,400,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,402,216 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,418,165 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,434,098 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,450,036 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,471,980 UART: [afmc] --
18,475,745 UART: [cold-reset] --
18,479,818 UART: [state] Locking Datavault
18,486,199 UART: [state] Locking PCR0, PCR1 and PCR31
18,487,896 UART: [state] Locking ICCM
18,490,075 UART: [exit] Launching FMC @ 0x40000000
18,498,420 UART:
18,498,656 UART: Running Caliptra FMC ...
18,499,757 UART:
18,499,943 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,501,601 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,358,829 ready_for_fw is high
3,359,238 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,926,909 >>> mbox cmd response: success
13,928,139 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,215,921 UART:
18,216,307 UART: Running Caliptra FMC ...
18,217,583 UART:
18,217,756 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,219,455 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,470 UART:
192,839 UART: Running Caliptra ROM ...
194,016 UART:
603,515 UART: [state] CFI Enabled
614,896 UART: [state] LifecycleState = Unprovisioned
616,889 UART: [state] DebugLocked = No
618,767 UART: [state] WD Timer not started. Device not locked for debugging
621,664 UART: [kat] SHA2-256
800,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,400 UART: [kat] ++
812,844 UART: [kat] sha1
823,997 UART: [kat] SHA2-256
827,021 UART: [kat] SHA2-384
833,866 UART: [kat] SHA2-512-ACC
836,794 UART: [kat] ECC-384
3,280,214 UART: [kat] HMAC-384Kdf
3,292,378 UART: [kat] LMS
3,821,802 UART: [kat] --
3,824,259 UART: [cold-reset] ++
3,826,402 UART: [fht] FHT @ 0x50003400
3,838,159 UART: [idev] ++
3,838,716 UART: [idev] CDI.KEYID = 6
3,839,621 UART: [idev] SUBJECT.KEYID = 7
3,840,865 UART: [idev] UDS.KEYID = 0
3,841,788 ready_for_fw is high
3,841,975 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,976,337 UART: [idev] Erasing UDS.KEYID = 0
6,315,372 UART: [idev] Sha1 KeyId Algorithm
6,338,559 UART: [idev] --
6,341,796 UART: [ldev] ++
6,342,364 UART: [ldev] CDI.KEYID = 6
6,343,272 UART: [ldev] SUBJECT.KEYID = 5
6,344,425 UART: [ldev] AUTHORITY.KEYID = 7
6,345,707 UART: [ldev] FE.KEYID = 1
6,358,621 UART: [ldev] Erasing FE.KEYID = 1
8,833,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,518 UART: [ldev] --
10,627,948 UART: [fwproc] Wait for Commands...
10,631,175 UART: [fwproc] Recv command 0x46574c44
10,633,262 UART: [fwproc] Recv'd Img size: 106964 bytes
13,945,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,015,963 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,058,557 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,376,545 >>> mbox cmd response: success
14,377,507 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,380,010 UART: [afmc] ++
14,380,613 UART: [afmc] CDI.KEYID = 6
14,381,523 UART: [afmc] SUBJECT.KEYID = 7
14,382,682 UART: [afmc] AUTHORITY.KEYID = 5
16,883,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,604,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,606,799 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,622,798 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,638,719 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,654,684 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,676,789 UART: [afmc] --
18,680,342 UART: [cold-reset] --
18,684,578 UART: [state] Locking Datavault
18,689,982 UART: [state] Locking PCR0, PCR1 and PCR31
18,691,630 UART: [state] Locking ICCM
18,693,832 UART: [exit] Launching FMC @ 0x40000000
18,702,235 UART:
18,702,510 UART: Running Caliptra FMC ...
18,703,619 UART:
18,703,782 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,705,452 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,694,211 ready_for_fw is high
3,694,639 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,149,303 >>> mbox cmd response: success
14,150,434 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,401,292 UART:
18,401,689 UART: Running Caliptra FMC ...
18,402,859 UART:
18,403,013 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,404,724 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,383,278 ready_for_fw is high
3,383,700 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,980,300 >>> mbox cmd response: success
13,981,504 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,260,355 UART:
18,260,743 UART: Running Caliptra FMC ...
18,261,993 UART:
18,262,160 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,263,884 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,694,838 ready_for_fw is high
3,695,214 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,149,951 >>> mbox cmd response: success
14,151,305 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,400,195 UART:
18,400,587 UART: Running Caliptra FMC ...
18,401,744 UART:
18,401,897 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,403,616 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,276 UART: [kat] SHA2-256
890,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,955 UART: [kat] ++
895,107 UART: [kat] sha1
899,439 UART: [kat] SHA2-256
901,379 UART: [kat] SHA2-384
904,024 UART: [kat] SHA2-512-ACC
905,925 UART: [kat] ECC-384
915,942 UART: [kat] HMAC-384Kdf
920,396 UART: [kat] LMS
1,168,708 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,170,121 UART: [fht] FHT @ 0x50003400
1,172,589 UART: [idev] ++
1,172,757 UART: [idev] CDI.KEYID = 6
1,173,118 UART: [idev] SUBJECT.KEYID = 7
1,173,543 UART: [idev] UDS.KEYID = 0
1,173,889 ready_for_fw is high
1,173,889 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,699 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,654 UART: [ldev] ++
1,208,822 UART: [ldev] CDI.KEYID = 6
1,209,186 UART: [ldev] SUBJECT.KEYID = 5
1,209,613 UART: [ldev] AUTHORITY.KEYID = 7
1,210,076 UART: [ldev] FE.KEYID = 1
1,215,518 UART: [ldev] Erasing FE.KEYID = 1
1,241,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,776 UART: [ldev] --
1,281,290 UART: [fwproc] Wait for Commands...
1,281,973 UART: [fwproc] Recv command 0x46574c44
1,282,706 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,102 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,191 >>> mbox cmd response: success
2,676,191 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,352 UART: [afmc] ++
2,677,520 UART: [afmc] CDI.KEYID = 6
2,677,883 UART: [afmc] SUBJECT.KEYID = 7
2,678,309 UART: [afmc] AUTHORITY.KEYID = 5
2,713,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,146 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,866 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,759 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,452 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,235 UART: [afmc] --
2,756,175 UART: [cold-reset] --
2,757,013 UART: [state] Locking Datavault
2,757,966 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,570 UART: [state] Locking ICCM
2,759,010 UART: [exit] Launching FMC @ 0x40000000
2,764,307 UART:
2,764,323 UART: Running Caliptra FMC ...
2,764,731 UART:
2,764,869 UART: [fmc] Received command: 0x10000008
2,765,901 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,596 ready_for_fw is high
1,055,596 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,145 >>> mbox cmd response: success
2,525,145 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,587,798 UART:
2,587,814 UART: Running Caliptra FMC ...
2,588,222 UART:
2,588,360 UART: [fmc] Received command: 0x10000008
2,589,392 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
900,312 UART: [kat] SHA2-256
902,252 UART: [kat] SHA2-384
905,093 UART: [kat] SHA2-512-ACC
906,994 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,415 UART: [kat] LMS
1,169,727 UART: [kat] --
1,170,666 UART: [cold-reset] ++
1,171,034 UART: [fht] FHT @ 0x50003400
1,173,776 UART: [idev] ++
1,173,944 UART: [idev] CDI.KEYID = 6
1,174,305 UART: [idev] SUBJECT.KEYID = 7
1,174,730 UART: [idev] UDS.KEYID = 0
1,175,076 ready_for_fw is high
1,175,076 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,974 UART: [idev] Erasing UDS.KEYID = 0
1,199,844 UART: [idev] Sha1 KeyId Algorithm
1,208,872 UART: [idev] --
1,209,961 UART: [ldev] ++
1,210,129 UART: [ldev] CDI.KEYID = 6
1,210,493 UART: [ldev] SUBJECT.KEYID = 5
1,210,920 UART: [ldev] AUTHORITY.KEYID = 7
1,211,383 UART: [ldev] FE.KEYID = 1
1,216,473 UART: [ldev] Erasing FE.KEYID = 1
1,242,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,191 UART: [ldev] --
1,281,525 UART: [fwproc] Wait for Commands...
1,282,270 UART: [fwproc] Recv command 0x46574c44
1,283,003 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,589 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,726 >>> mbox cmd response: success
2,677,726 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,678,755 UART: [afmc] ++
2,678,923 UART: [afmc] CDI.KEYID = 6
2,679,286 UART: [afmc] SUBJECT.KEYID = 7
2,679,712 UART: [afmc] AUTHORITY.KEYID = 5
2,715,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,821 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,541 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,434 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,127 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,960 UART: [afmc] --
2,758,850 UART: [cold-reset] --
2,759,652 UART: [state] Locking Datavault
2,761,179 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,783 UART: [state] Locking ICCM
2,762,443 UART: [exit] Launching FMC @ 0x40000000
2,767,740 UART:
2,767,756 UART: Running Caliptra FMC ...
2,768,164 UART:
2,768,302 UART: [fmc] Received command: 0x10000008
2,769,334 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,221 ready_for_fw is high
1,056,221 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,268 >>> mbox cmd response: success
2,525,268 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,587,923 UART:
2,587,939 UART: Running Caliptra FMC ...
2,588,347 UART:
2,588,485 UART: [fmc] Received command: 0x10000008
2,589,517 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
891,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,199 UART: [kat] ++
895,351 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,328 UART: [kat] LMS
1,168,640 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,655 UART: [idev] ++
1,172,823 UART: [idev] CDI.KEYID = 6
1,173,184 UART: [idev] SUBJECT.KEYID = 7
1,173,609 UART: [idev] UDS.KEYID = 0
1,173,955 ready_for_fw is high
1,173,955 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,913 UART: [idev] Erasing UDS.KEYID = 0
1,199,207 UART: [idev] Sha1 KeyId Algorithm
1,208,061 UART: [idev] --
1,209,210 UART: [ldev] ++
1,209,378 UART: [ldev] CDI.KEYID = 6
1,209,742 UART: [ldev] SUBJECT.KEYID = 5
1,210,169 UART: [ldev] AUTHORITY.KEYID = 7
1,210,632 UART: [ldev] FE.KEYID = 1
1,215,796 UART: [ldev] Erasing FE.KEYID = 1
1,242,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,578 UART: [ldev] --
1,282,046 UART: [fwproc] Wait for Commands...
1,282,791 UART: [fwproc] Recv command 0x46574c44
1,283,524 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,102 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,219 >>> mbox cmd response: success
2,676,219 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,324 UART: [afmc] ++
2,677,492 UART: [afmc] CDI.KEYID = 6
2,677,855 UART: [afmc] SUBJECT.KEYID = 7
2,678,281 UART: [afmc] AUTHORITY.KEYID = 5
2,713,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,684 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,404 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,297 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,990 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,919 UART: [afmc] --
2,756,879 UART: [cold-reset] --
2,757,875 UART: [state] Locking Datavault
2,758,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,598 UART: [state] Locking ICCM
2,760,262 UART: [exit] Launching FMC @ 0x40000000
2,765,559 UART:
2,765,575 UART: Running Caliptra FMC ...
2,765,983 UART:
2,766,121 UART: [fmc] Received command: 0x10000008
2,767,153 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,860 ready_for_fw is high
1,056,860 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,495 >>> mbox cmd response: success
2,526,495 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,588,488 UART:
2,588,504 UART: Running Caliptra FMC ...
2,588,912 UART:
2,589,050 UART: [fmc] Received command: 0x10000008
2,590,082 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,204 UART: [state] WD Timer not started. Device not locked for debugging
88,455 UART: [kat] SHA2-256
892,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,134 UART: [kat] ++
896,286 UART: [kat] sha1
900,592 UART: [kat] SHA2-256
902,532 UART: [kat] SHA2-384
905,191 UART: [kat] SHA2-512-ACC
907,092 UART: [kat] ECC-384
916,711 UART: [kat] HMAC-384Kdf
921,343 UART: [kat] LMS
1,169,655 UART: [kat] --
1,170,604 UART: [cold-reset] ++
1,171,042 UART: [fht] FHT @ 0x50003400
1,173,590 UART: [idev] ++
1,173,758 UART: [idev] CDI.KEYID = 6
1,174,119 UART: [idev] SUBJECT.KEYID = 7
1,174,544 UART: [idev] UDS.KEYID = 0
1,174,890 ready_for_fw is high
1,174,890 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,199,596 UART: [idev] Sha1 KeyId Algorithm
1,208,516 UART: [idev] --
1,209,545 UART: [ldev] ++
1,209,713 UART: [ldev] CDI.KEYID = 6
1,210,077 UART: [ldev] SUBJECT.KEYID = 5
1,210,504 UART: [ldev] AUTHORITY.KEYID = 7
1,210,967 UART: [ldev] FE.KEYID = 1
1,216,199 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,759 UART: [ldev] --
1,282,191 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,647 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,691 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,740 >>> mbox cmd response: success
2,677,740 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,678,889 UART: [afmc] ++
2,679,057 UART: [afmc] CDI.KEYID = 6
2,679,420 UART: [afmc] SUBJECT.KEYID = 7
2,679,846 UART: [afmc] AUTHORITY.KEYID = 5
2,715,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,908 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,659 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,379 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,272 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,965 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,860 UART: [afmc] --
2,758,796 UART: [cold-reset] --
2,759,706 UART: [state] Locking Datavault
2,760,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,443 UART: [state] Locking ICCM
2,761,899 UART: [exit] Launching FMC @ 0x40000000
2,767,196 UART:
2,767,212 UART: Running Caliptra FMC ...
2,767,620 UART:
2,767,758 UART: [fmc] Received command: 0x10000008
2,768,790 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,843 ready_for_fw is high
1,056,843 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,894 >>> mbox cmd response: success
2,527,894 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,590,217 UART:
2,590,233 UART: Running Caliptra FMC ...
2,590,641 UART:
2,590,779 UART: [fmc] Received command: 0x10000008
2,591,811 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,170 UART: [kat] LMS
1,168,482 UART: [kat] --
1,169,423 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,173,983 ready_for_fw is high
1,173,983 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,755 UART: [idev] Erasing UDS.KEYID = 0
1,198,631 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] --
1,208,586 UART: [ldev] ++
1,208,754 UART: [ldev] CDI.KEYID = 6
1,209,118 UART: [ldev] SUBJECT.KEYID = 5
1,209,545 UART: [ldev] AUTHORITY.KEYID = 7
1,210,008 UART: [ldev] FE.KEYID = 1
1,215,188 UART: [ldev] Erasing FE.KEYID = 1
1,241,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,966 UART: [ldev] --
1,280,424 UART: [fwproc] Wait for Commands...
1,281,161 UART: [fwproc] Recv command 0x46574c44
1,281,894 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,516 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,701 >>> mbox cmd response: success
2,675,701 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,676,812 UART: [afmc] ++
2,676,980 UART: [afmc] CDI.KEYID = 6
2,677,343 UART: [afmc] SUBJECT.KEYID = 7
2,677,769 UART: [afmc] AUTHORITY.KEYID = 5
2,712,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,184 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,904 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,797 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,490 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,339 UART: [afmc] --
2,756,221 UART: [cold-reset] --
2,757,037 UART: [state] Locking Datavault
2,758,054 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,658 UART: [state] Locking ICCM
2,759,104 UART: [exit] Launching FMC @ 0x40000000
2,764,401 UART:
2,764,417 UART: Running Caliptra FMC ...
2,764,825 UART:
2,764,963 UART: [fmc] Received command: 0x10000008
2,765,995 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,816 ready_for_fw is high
1,055,816 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,495 >>> mbox cmd response: success
2,526,495 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,588,256 UART:
2,588,272 UART: Running Caliptra FMC ...
2,588,680 UART:
2,588,818 UART: [fmc] Received command: 0x10000008
2,589,850 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,809 UART: [kat] HMAC-384Kdf
921,457 UART: [kat] LMS
1,169,769 UART: [kat] --
1,170,524 UART: [cold-reset] ++
1,171,008 UART: [fht] FHT @ 0x50003400
1,173,646 UART: [idev] ++
1,173,814 UART: [idev] CDI.KEYID = 6
1,174,175 UART: [idev] SUBJECT.KEYID = 7
1,174,600 UART: [idev] UDS.KEYID = 0
1,174,946 ready_for_fw is high
1,174,946 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,484 UART: [idev] Erasing UDS.KEYID = 0
1,199,510 UART: [idev] Sha1 KeyId Algorithm
1,208,358 UART: [idev] --
1,209,427 UART: [ldev] ++
1,209,595 UART: [ldev] CDI.KEYID = 6
1,209,959 UART: [ldev] SUBJECT.KEYID = 5
1,210,386 UART: [ldev] AUTHORITY.KEYID = 7
1,210,849 UART: [ldev] FE.KEYID = 1
1,216,249 UART: [ldev] Erasing FE.KEYID = 1
1,242,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,075 UART: [ldev] --
1,281,591 UART: [fwproc] Wait for Commands...
1,282,362 UART: [fwproc] Recv command 0x46574c44
1,283,095 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,851 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,844 >>> mbox cmd response: success
2,677,844 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,678,915 UART: [afmc] ++
2,679,083 UART: [afmc] CDI.KEYID = 6
2,679,446 UART: [afmc] SUBJECT.KEYID = 7
2,679,872 UART: [afmc] AUTHORITY.KEYID = 5
2,715,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,527 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,247 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,140 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,833 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,828 UART: [afmc] --
2,758,746 UART: [cold-reset] --
2,759,622 UART: [state] Locking Datavault
2,761,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,643 UART: [state] Locking ICCM
2,762,209 UART: [exit] Launching FMC @ 0x40000000
2,767,506 UART:
2,767,522 UART: Running Caliptra FMC ...
2,767,930 UART:
2,768,068 UART: [fmc] Received command: 0x10000008
2,769,100 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,603 ready_for_fw is high
1,055,603 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,892 >>> mbox cmd response: success
2,525,892 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,588,463 UART:
2,588,479 UART: Running Caliptra FMC ...
2,588,887 UART:
2,589,025 UART: [fmc] Received command: 0x10000008
2,590,057 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
rom_info_offset is 48448
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
192,081 UART:
192,463 UART: Running Caliptra ROM ...
193,641 UART:
193,792 UART: [state] CFI Enabled
261,363 UART: [state] LifecycleState = Unprovisioned
263,707 UART: [state] DebugLocked = No
265,585 UART: [state] WD Timer not started. Device not locked for debugging
270,090 UART: [kat] SHA2-256
451,976 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,158 UART: ROM integrity test failed
464,441 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 41856
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e070b7f3fca5f7014a2c0130e1e1334ad3581d250636d110c7047305636ec67d59d2ec6adc653f43c8522a9f94ec817f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48448
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,588 UART:
192,954 UART: Running Caliptra ROM ...
194,140 UART:
603,688 UART: [state] CFI Enabled
620,745 UART: [state] LifecycleState = Unprovisioned
623,131 UART: [state] DebugLocked = No
625,800 UART: [state] WD Timer not started. Device not locked for debugging
630,681 UART: [kat] SHA2-256
812,668 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,902 UART: ROM integrity test failed
825,100 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 41856
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e070b7f3fca5f7014a2c0130e1e1334ad3581d250636d110c7047305636ec67d59d2ec6adc653f43c8522a9f94ec817f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
191,959 UART:
192,342 UART: Running Caliptra ROM ...
193,527 UART:
193,679 UART: [state] CFI Enabled
263,422 UART: [state] LifecycleState = Unprovisioned
265,328 UART: [state] DebugLocked = No
267,294 UART: [state] WD Timer not started. Device not locked for debugging
270,888 UART: [kat] SHA2-256
449,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,984 UART: ROM integrity test failed
462,273 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,826 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,299 UART:
192,690 UART: Running Caliptra ROM ...
193,991 UART:
603,460 UART: [state] CFI Enabled
615,186 UART: [state] LifecycleState = Unprovisioned
617,029 UART: [state] DebugLocked = No
618,990 UART: [state] WD Timer not started. Device not locked for debugging
622,856 UART: [kat] SHA2-256
802,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,029 UART: ROM integrity test failed
814,243 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42240
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42240
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,993 UART: ROM integrity test failed
895,440 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.20s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
891,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,146 UART: ROM integrity test failed
895,593 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.23s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.20s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,654 UART: [state] LifecycleState = Unprovisioned
86,309 UART: [state] DebugLocked = No
86,869 UART: [state] WD Timer not started. Device not locked for debugging
88,020 UART: [kat] SHA2-256
891,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,541 UART: ROM integrity test failed
895,988 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,458 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,190 UART: ROM integrity test failed
895,637 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Unprovisioned
86,253 UART: [state] DebugLocked = No
86,943 UART: [state] WD Timer not started. Device not locked for debugging
88,294 UART: [kat] SHA2-256
891,844 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,815 UART: ROM integrity test failed
896,262 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: ROM integrity test failed
896,021 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "60077c7bd0ab66985c2d6f2fe8ed5037a09f4cf274f79cb89bab0f60b2a8caa19a29498dfed3db0799dd487835fd50a5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,005 UART:
192,388 UART: Running Caliptra ROM ...
193,506 UART:
193,647 UART: [state] CFI Enabled
264,885 UART: [state] LifecycleState = Unprovisioned
267,310 UART: [state] DebugLocked = No
269,257 UART: [state] WD Timer not started. Device not locked for debugging
274,504 UART: [kat] SHA2-256
456,455 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,955 UART: [kat] ++
468,474 UART: [kat] sha1
477,495 UART: [kat] SHA2-256
480,498 UART: [kat] SHA2-384
485,586 UART: [kat] SHA2-512-ACC
488,200 UART: [kat] ECC-384
3,773,951 UART: [kat] HMAC-384Kdf
3,802,530 UART: [kat] LMS
4,875,704 UART: [kat] --
4,881,360 UART: [cold-reset] ++
4,883,861 UART: [fht] FHT @ 0x50003400
4,895,953 UART: [idev] ++
4,896,684 UART: [idev] CDI.KEYID = 6
4,897,860 UART: [idev] SUBJECT.KEYID = 7
4,899,034 UART: [idev] UDS.KEYID = 0
4,899,985 ready_for_fw is high
4,900,180 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,040,528 UART: [idev] Erasing UDS.KEYID = 0
8,242,111 UART: [idev] Sha1 KeyId Algorithm
8,263,293 UART: [idev] --
8,267,367 UART: [ldev] ++
8,267,998 UART: [ldev] CDI.KEYID = 6
8,269,174 UART: [ldev] SUBJECT.KEYID = 5
8,270,336 UART: [ldev] AUTHORITY.KEYID = 7
8,271,563 UART: [ldev] FE.KEYID = 1
8,316,748 UART: [ldev] Erasing FE.KEYID = 1
11,650,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,534 UART: [ldev] --
14,038,986 UART: [fwproc] Wait for Commands...
14,041,024 UART: [fwproc] Recv command 0x46574c44
14,043,330 UART: [fwproc] Recv'd Img size: 111688 bytes
18,077,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,155,348 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,215,567 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,532,352 >>> mbox cmd response: success
18,536,088 UART: [afmc] ++
18,536,705 UART: [afmc] CDI.KEYID = 6
18,537,919 UART: [afmc] SUBJECT.KEYID = 7
18,539,024 UART: [afmc] AUTHORITY.KEYID = 5
21,895,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,198,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,200,361 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,216,506 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,232,640 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,248,481 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,271,309 UART: [afmc] --
24,276,136 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,416,904 UART: [cold-reset] --
24,417,775 UART: [state] Locking Datavault
24,418,858 UART: [state] Locking PCR0, PCR1 and PCR31
24,420,393 UART: [state] Locking ICCM
24,421,271 UART: [exit] Launching FMC @ 0x40000000
24,422,614 UART:
24,422,784 UART: Running Caliptra FMC ...
24,423,881 UART:
24,424,051 UART: [fmc] Received command: 0x46574C44
24,425,512 UART:
24,425,667 UART: Running Caliptra ROM ...
24,426,760 UART:
24,426,914 UART: [state] CFI Enabled
24,491,514 UART: [state] LifecycleState = Unprovisioned
24,493,382 UART: [state] DebugLocked = No
24,496,000 UART: [state] WD Timer not started. Device not locked for debugging
24,500,349 UART: [kat] SHA2-256
24,682,254 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,693,818 UART: [kat] ++
24,694,274 UART: [kat] sha1
24,703,815 UART: [kat] SHA2-256
24,706,829 UART: [kat] SHA2-384
24,711,909 UART: [kat] SHA2-512-ACC
24,714,537 UART: [kat] ECC-384
28,003,249 UART: [kat] HMAC-384Kdf
28,030,715 UART: [kat] LMS
29,103,836 UART: [kat] --
29,106,658 UART: [update-reset] ++
33,172,863 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,176,187 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,549,824 >>> mbox cmd response: success
33,550,200 UART: [update-reset] Copying MAN_2 To MAN_1
33,572,971 UART: [update-reset Success] --
33,574,614 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,578,778 UART: [state] Locking Datavault
33,581,874 UART: [state] Locking PCR0, PCR1 and PCR31
33,583,526 UART: [state] Locking ICCM
33,586,437 UART: [exit] Launching FMC @ 0x40000000
33,595,074 UART:
33,595,311 UART: Running Caliptra FMC ...
33,596,406 UART:
33,596,563 UART: [fmc] Received command: 0x1000000D
33,598,074 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
4,803,116 ready_for_fw is high
4,803,692 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,305,333 >>> mbox cmd response: success
23,983,017 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,123,885 UART:
24,124,276 UART: Running Caliptra FMC ...
24,125,507 UART:
24,125,675 UART: [fmc] Received command: 0x46574C44
33,161,566 >>> mbox cmd response: success
33,182,935 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,195,464 UART:
33,195,719 UART: Running Caliptra FMC ...
33,196,898 UART:
33,197,062 UART: [fmc] Received command: 0x1000000D
33,198,587 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,279 UART:
192,654 UART: Running Caliptra ROM ...
193,756 UART:
603,335 UART: [state] CFI Enabled
615,359 UART: [state] LifecycleState = Unprovisioned
617,660 UART: [state] DebugLocked = No
620,022 UART: [state] WD Timer not started. Device not locked for debugging
624,620 UART: [kat] SHA2-256
806,597 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,169 UART: [kat] ++
818,681 UART: [kat] sha1
828,620 UART: [kat] SHA2-256
831,687 UART: [kat] SHA2-384
837,668 UART: [kat] SHA2-512-ACC
840,309 UART: [kat] ECC-384
4,094,423 UART: [kat] HMAC-384Kdf
4,107,521 UART: [kat] LMS
5,180,640 UART: [kat] --
5,185,941 UART: [cold-reset] ++
5,187,164 UART: [fht] FHT @ 0x50003400
5,199,201 UART: [idev] ++
5,199,828 UART: [idev] CDI.KEYID = 6
5,201,069 UART: [idev] SUBJECT.KEYID = 7
5,202,530 UART: [idev] UDS.KEYID = 0
5,203,708 ready_for_fw is high
5,204,124 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,344,352 UART: [idev] Erasing UDS.KEYID = 0
8,493,031 UART: [idev] Sha1 KeyId Algorithm
8,515,143 UART: [idev] --
8,519,031 UART: [ldev] ++
8,519,654 UART: [ldev] CDI.KEYID = 6
8,520,826 UART: [ldev] SUBJECT.KEYID = 5
8,522,300 UART: [ldev] AUTHORITY.KEYID = 7
8,523,850 UART: [ldev] FE.KEYID = 1
8,537,580 UART: [ldev] Erasing FE.KEYID = 1
11,832,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,847 UART: [ldev] --
14,201,133 UART: [fwproc] Wait for Commands...
14,202,786 UART: [fwproc] Recv command 0x46574c44
14,205,088 UART: [fwproc] Recv'd Img size: 111688 bytes
18,256,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,330,627 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,390,850 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,708,092 >>> mbox cmd response: success
18,712,389 UART: [afmc] ++
18,713,008 UART: [afmc] CDI.KEYID = 6
18,714,224 UART: [afmc] SUBJECT.KEYID = 7
18,715,327 UART: [afmc] AUTHORITY.KEYID = 5
22,028,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,325,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,327,481 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,343,675 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,359,791 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,375,609 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,397,033 UART: [afmc] --
24,401,465 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,542,175 UART: [cold-reset] --
24,543,035 UART: [state] Locking Datavault
24,544,196 UART: [state] Locking PCR0, PCR1 and PCR31
24,545,726 UART: [state] Locking ICCM
24,546,625 UART: [exit] Launching FMC @ 0x40000000
24,548,043 UART:
24,548,222 UART: Running Caliptra FMC ...
24,549,319 UART:
24,549,468 UART: [fmc] Received command: 0x46574C44
24,550,925 UART:
24,551,075 UART: Running Caliptra ROM ...
24,552,083 UART:
24,552,222 UART: [state] CFI Enabled
24,561,045 UART: [state] LifecycleState = Unprovisioned
24,562,871 UART: [state] DebugLocked = No
24,564,401 UART: [state] WD Timer not started. Device not locked for debugging
24,568,353 UART: [kat] SHA2-256
24,750,313 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,761,824 UART: [kat] ++
24,762,335 UART: [kat] sha1
24,773,052 UART: [kat] SHA2-256
24,776,077 UART: [kat] SHA2-384
24,782,350 UART: [kat] SHA2-512-ACC
24,784,912 UART: [kat] ECC-384
28,040,185 UART: [kat] HMAC-384Kdf
28,051,612 UART: [kat] LMS
29,124,741 UART: [kat] --
29,127,349 UART: [update-reset] ++
33,197,130 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,199,702 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,573,784 >>> mbox cmd response: success
33,575,359 UART: [update-reset] Copying MAN_2 To MAN_1
33,598,243 UART: [update-reset Success] --
33,599,550 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,601,768 UART: [state] Locking Datavault
33,605,240 UART: [state] Locking PCR0, PCR1 and PCR31
33,606,978 UART: [state] Locking ICCM
33,609,486 UART: [exit] Launching FMC @ 0x40000000
33,618,118 UART:
33,618,357 UART: Running Caliptra FMC ...
33,619,375 UART:
33,619,513 UART: [fmc] Received command: 0x1000000D
33,621,073 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
5,103,951 ready_for_fw is high
5,104,335 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,500,803 >>> mbox cmd response: success
24,120,816 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,261,751 UART:
24,262,150 UART: Running Caliptra FMC ...
24,263,358 UART:
24,263,517 UART: [fmc] Received command: 0x46574C44
33,181,754 >>> mbox cmd response: success
33,202,971 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,217,635 UART:
33,217,914 UART: Running Caliptra FMC ...
33,218,992 UART:
33,219,137 UART: [fmc] Received command: 0x1000000D
33,220,660 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,226 UART:
192,584 UART: Running Caliptra ROM ...
193,755 UART:
193,906 UART: [state] CFI Enabled
261,992 UART: [state] LifecycleState = Unprovisioned
263,833 UART: [state] DebugLocked = No
265,082 UART: [state] WD Timer not started. Device not locked for debugging
269,689 UART: [kat] SHA2-256
448,768 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,342 UART: [kat] ++
460,872 UART: [kat] sha1
470,403 UART: [kat] SHA2-256
473,413 UART: [kat] SHA2-384
480,062 UART: [kat] SHA2-512-ACC
483,038 UART: [kat] ECC-384
2,924,197 UART: [kat] HMAC-384Kdf
2,950,284 UART: [kat] LMS
3,479,756 UART: [kat] --
3,484,889 UART: [cold-reset] ++
3,487,387 UART: [fht] FHT @ 0x50003400
3,498,084 UART: [idev] ++
3,498,650 UART: [idev] CDI.KEYID = 6
3,499,529 UART: [idev] SUBJECT.KEYID = 7
3,500,773 UART: [idev] UDS.KEYID = 0
3,501,678 ready_for_fw is high
3,501,864 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,642,730 UART: [idev] Erasing UDS.KEYID = 0
6,006,274 UART: [idev] Sha1 KeyId Algorithm
6,029,360 UART: [idev] --
6,032,680 UART: [ldev] ++
6,033,285 UART: [ldev] CDI.KEYID = 6
6,034,203 UART: [ldev] SUBJECT.KEYID = 5
6,035,368 UART: [ldev] AUTHORITY.KEYID = 7
6,036,600 UART: [ldev] FE.KEYID = 1
6,079,279 UART: [ldev] Erasing FE.KEYID = 1
8,582,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,109 UART: [ldev] --
10,391,368 UART: [fwproc] Wait for Commands...
10,393,243 UART: [fwproc] Recv command 0x46574c44
10,395,480 UART: [fwproc] Recv'd Img size: 112032 bytes
13,762,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,838,520 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,898,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,216,818 >>> mbox cmd response: success
14,220,508 UART: [afmc] ++
14,221,126 UART: [afmc] CDI.KEYID = 6
14,222,044 UART: [afmc] SUBJECT.KEYID = 7
14,223,215 UART: [afmc] AUTHORITY.KEYID = 5
16,765,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,307 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,506,379 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,522,386 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,538,093 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,561,277 UART: [afmc] --
18,565,436 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,706,492 UART: [cold-reset] --
18,707,367 UART: [state] Locking Datavault
18,708,524 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,061 UART: [state] Locking ICCM
18,710,944 UART: [exit] Launching FMC @ 0x40000000
18,712,367 UART:
18,712,531 UART: Running Caliptra FMC ...
18,713,624 UART:
18,713,778 UART: [fmc] Received command: 0x46574C44
18,715,385 UART:
18,715,554 UART: Running Caliptra ROM ...
18,716,663 UART:
18,716,821 UART: [state] CFI Enabled
18,781,478 UART: [state] LifecycleState = Unprovisioned
18,783,310 UART: [state] DebugLocked = No
18,785,176 UART: [state] WD Timer not started. Device not locked for debugging
18,788,911 UART: [kat] SHA2-256
18,968,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,979,622 UART: [kat] ++
18,980,169 UART: [kat] sha1
18,990,956 UART: [kat] SHA2-256
18,994,025 UART: [kat] SHA2-384
18,999,958 UART: [kat] SHA2-512-ACC
19,002,953 UART: [kat] ECC-384
21,465,491 UART: [kat] HMAC-384Kdf
21,489,775 UART: [kat] LMS
22,019,225 UART: [kat] --
22,021,656 UART: [update-reset] ++
25,421,425 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,425,665 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,800,511 >>> mbox cmd response: success
25,801,622 UART: [update-reset] Copying MAN_2 To MAN_1
25,823,962 UART: [update-reset Success] --
25,825,249 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,827,089 UART: [state] Locking Datavault
25,830,077 UART: [state] Locking PCR0, PCR1 and PCR31
25,831,726 UART: [state] Locking ICCM
25,833,067 UART: [exit] Launching FMC @ 0x40000000
25,841,477 UART:
25,841,755 UART: Running Caliptra FMC ...
25,842,872 UART:
25,843,027 UART: [fmc] Received command: 0x1000000D
25,844,549 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,360,256 ready_for_fw is high
3,360,850 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,017,269 >>> mbox cmd response: success
18,286,874 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,427,971 UART:
18,428,351 UART: Running Caliptra FMC ...
18,429,553 UART:
18,429,722 UART: [fmc] Received command: 0x46574C44
25,367,735 >>> mbox cmd response: success
25,389,903 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,400,459 UART:
25,400,740 UART: Running Caliptra FMC ...
25,401,868 UART:
25,402,022 UART: [fmc] Received command: 0x1000000D
25,403,555 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,485 UART:
192,837 UART: Running Caliptra ROM ...
194,039 UART:
603,474 UART: [state] CFI Enabled
616,064 UART: [state] LifecycleState = Unprovisioned
617,872 UART: [state] DebugLocked = No
620,596 UART: [state] WD Timer not started. Device not locked for debugging
624,556 UART: [kat] SHA2-256
803,649 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,216 UART: [kat] ++
815,658 UART: [kat] sha1
827,308 UART: [kat] SHA2-256
830,309 UART: [kat] SHA2-384
835,868 UART: [kat] SHA2-512-ACC
838,879 UART: [kat] ECC-384
3,281,717 UART: [kat] HMAC-384Kdf
3,293,935 UART: [kat] LMS
3,823,404 UART: [kat] --
3,827,136 UART: [cold-reset] ++
3,828,287 UART: [fht] FHT @ 0x50003400
3,839,335 UART: [idev] ++
3,839,901 UART: [idev] CDI.KEYID = 6
3,840,824 UART: [idev] SUBJECT.KEYID = 7
3,841,999 UART: [idev] UDS.KEYID = 0
3,843,049 ready_for_fw is high
3,843,268 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,984,051 UART: [idev] Erasing UDS.KEYID = 0
6,313,483 UART: [idev] Sha1 KeyId Algorithm
6,335,905 UART: [idev] --
6,339,896 UART: [ldev] ++
6,340,466 UART: [ldev] CDI.KEYID = 6
6,341,371 UART: [ldev] SUBJECT.KEYID = 5
6,342,579 UART: [ldev] AUTHORITY.KEYID = 7
6,343,805 UART: [ldev] FE.KEYID = 1
6,356,465 UART: [ldev] Erasing FE.KEYID = 1
8,832,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,380 UART: [ldev] --
10,623,107 UART: [fwproc] Wait for Commands...
10,624,810 UART: [fwproc] Recv command 0x46574c44
10,626,855 UART: [fwproc] Recv'd Img size: 112032 bytes
13,997,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,065,724 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,126,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,444,681 >>> mbox cmd response: success
14,448,719 UART: [afmc] ++
14,449,330 UART: [afmc] CDI.KEYID = 6
14,450,237 UART: [afmc] SUBJECT.KEYID = 7
14,451,402 UART: [afmc] AUTHORITY.KEYID = 5
16,956,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,676,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,678,024 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,694,112 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,710,165 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,725,824 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,748,907 UART: [afmc] --
18,752,977 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,894,145 UART: [cold-reset] --
18,895,003 UART: [state] Locking Datavault
18,896,164 UART: [state] Locking PCR0, PCR1 and PCR31
18,897,700 UART: [state] Locking ICCM
18,898,605 UART: [exit] Launching FMC @ 0x40000000
18,900,027 UART:
18,900,207 UART: Running Caliptra FMC ...
18,901,300 UART:
18,901,454 UART: [fmc] Received command: 0x46574C44
18,902,908 UART:
18,903,061 UART: Running Caliptra ROM ...
18,904,157 UART:
18,904,310 UART: [state] CFI Enabled
18,912,517 UART: [state] LifecycleState = Unprovisioned
18,914,403 UART: [state] DebugLocked = No
18,916,906 UART: [state] WD Timer not started. Device not locked for debugging
18,920,152 UART: [kat] SHA2-256
19,099,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,110,918 UART: [kat] ++
19,111,458 UART: [kat] sha1
19,122,943 UART: [kat] SHA2-256
19,125,962 UART: [kat] SHA2-384
19,130,778 UART: [kat] SHA2-512-ACC
19,133,721 UART: [kat] ECC-384
21,573,705 UART: [kat] HMAC-384Kdf
21,585,491 UART: [kat] LMS
22,115,040 UART: [kat] --
22,119,644 UART: [update-reset] ++
25,526,364 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,529,626 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,904,449 >>> mbox cmd response: success
25,905,227 UART: [update-reset] Copying MAN_2 To MAN_1
25,927,562 UART: [update-reset Success] --
25,928,880 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,933,858 UART: [state] Locking Datavault
25,937,009 UART: [state] Locking PCR0, PCR1 and PCR31
25,938,719 UART: [state] Locking ICCM
25,940,272 UART: [exit] Launching FMC @ 0x40000000
25,948,684 UART:
25,948,919 UART: Running Caliptra FMC ...
25,950,020 UART:
25,950,181 UART: [fmc] Received command: 0x1000000D
25,951,696 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,698,989 ready_for_fw is high
3,699,369 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,246,227 >>> mbox cmd response: success
18,485,121 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,626,481 UART:
18,626,869 UART: Running Caliptra FMC ...
18,628,083 UART:
18,628,254 UART: [fmc] Received command: 0x46574C44
25,491,008 >>> mbox cmd response: success
25,512,907 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,527,634 UART:
25,527,887 UART: Running Caliptra FMC ...
25,529,056 UART:
25,529,225 UART: [fmc] Received command: 0x1000000D
25,530,747 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,363,196 ready_for_fw is high
3,363,828 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,010,128 >>> mbox cmd response: success
18,289,895 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,431,052 UART:
18,431,443 UART: Running Caliptra FMC ...
18,432,649 UART:
18,432,809 UART: [fmc] Received command: 0x46574C44
25,390,701 >>> mbox cmd response: success
25,412,676 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,425,629 UART:
25,425,901 UART: Running Caliptra FMC ...
25,426,992 UART:
25,427,143 UART: [fmc] Received command: 0x1000000D
25,428,670 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,698,049 ready_for_fw is high
3,698,469 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,224,822 >>> mbox cmd response: success
18,467,562 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,608,785 UART:
18,609,169 UART: Running Caliptra FMC ...
18,610,374 UART:
18,610,551 UART: [fmc] Received command: 0x46574C44
25,478,679 >>> mbox cmd response: success
25,499,951 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,512,588 UART:
25,512,844 UART: Running Caliptra FMC ...
25,514,037 UART:
25,514,200 UART: [fmc] Received command: 0x1000000D
25,515,718 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,801 UART: [state] WD Timer not started. Device not locked for debugging
88,162 UART: [kat] SHA2-256
891,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,841 UART: [kat] ++
895,993 UART: [kat] sha1
900,363 UART: [kat] SHA2-256
902,303 UART: [kat] SHA2-384
905,032 UART: [kat] SHA2-512-ACC
906,933 UART: [kat] ECC-384
916,658 UART: [kat] HMAC-384Kdf
921,226 UART: [kat] LMS
1,169,538 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,787 UART: [fht] FHT @ 0x50003400
1,173,501 UART: [idev] ++
1,173,669 UART: [idev] CDI.KEYID = 6
1,174,030 UART: [idev] SUBJECT.KEYID = 7
1,174,455 UART: [idev] UDS.KEYID = 0
1,174,801 ready_for_fw is high
1,174,801 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,191 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,513 UART: [idev] --
1,208,632 UART: [ldev] ++
1,208,800 UART: [ldev] CDI.KEYID = 6
1,209,164 UART: [ldev] SUBJECT.KEYID = 5
1,209,591 UART: [ldev] AUTHORITY.KEYID = 7
1,210,054 UART: [ldev] FE.KEYID = 1
1,215,422 UART: [ldev] Erasing FE.KEYID = 1
1,241,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,446 UART: [ldev] --
1,280,946 UART: [fwproc] Wait for Commands...
1,281,611 UART: [fwproc] Recv command 0x46574c44
1,282,344 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,951 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,572 >>> mbox cmd response: success
2,743,641 UART: [afmc] ++
2,743,809 UART: [afmc] CDI.KEYID = 6
2,744,172 UART: [afmc] SUBJECT.KEYID = 7
2,744,598 UART: [afmc] AUTHORITY.KEYID = 5
2,779,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,584 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,280 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,179 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,872 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,636 UART: [afmc] --
2,822,594 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,822,616 UART: [cold-reset] --
2,823,538 UART: [state] Locking Datavault
2,824,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,447 UART: [state] Locking ICCM
2,825,883 UART: [exit] Launching FMC @ 0x40000000
2,831,180 UART:
2,831,196 UART: Running Caliptra FMC ...
2,831,604 UART:
2,831,834 UART: [fmc] Received command: 0x46574C44
2,832,660 UART:
2,832,676 UART: Running Caliptra ROM ...
2,833,084 UART:
2,833,139 UART: [state] CFI Enabled
2,835,799 UART: [state] LifecycleState = Unprovisioned
2,836,454 UART: [state] DebugLocked = No
2,836,968 UART: [state] WD Timer not started. Device not locked for debugging
2,838,232 UART: [kat] SHA2-256
3,641,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,911 UART: [kat] ++
3,646,063 UART: [kat] sha1
3,650,253 UART: [kat] SHA2-256
3,652,193 UART: [kat] SHA2-384
3,654,890 UART: [kat] SHA2-512-ACC
3,656,790 UART: [kat] ECC-384
3,666,351 UART: [kat] HMAC-384Kdf
3,671,097 UART: [kat] LMS
3,919,409 UART: [kat] --
3,920,355 UART: [update-reset] ++
5,206,333 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,396 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,355,582 >>> mbox cmd response: success
5,355,917 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,931 UART: [update-reset Success] --
5,364,340 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,364,716 UART: [state] Locking Datavault
5,365,598 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,202 UART: [state] Locking ICCM
5,366,712 UART: [exit] Launching FMC @ 0x40000000
5,372,009 UART:
5,372,025 UART: Running Caliptra FMC ...
5,372,433 UART:
5,372,655 UART: [fmc] Received command: 0x1000000D
5,373,747 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,902 ready_for_fw is high
1,055,902 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,266 >>> mbox cmd response: success
2,648,337 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,236 UART:
2,654,252 UART: Running Caliptra FMC ...
2,654,660 UART:
2,654,890 UART: [fmc] Received command: 0x46574C44
5,058,637 >>> mbox cmd response: success
5,066,207 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,072,149 UART:
5,072,165 UART: Running Caliptra FMC ...
5,072,573 UART:
5,072,795 UART: [fmc] Received command: 0x1000000D
5,073,887 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,788 UART: [kat] SHA2-256
901,728 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,697 UART: [kat] LMS
1,169,009 UART: [kat] --
1,169,666 UART: [cold-reset] ++
1,170,084 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,174,092 ready_for_fw is high
1,174,092 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,730 UART: [idev] Erasing UDS.KEYID = 0
1,199,130 UART: [idev] Sha1 KeyId Algorithm
1,208,130 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,242,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,363 UART: [fwproc] Wait for Commands...
1,282,038 UART: [fwproc] Recv command 0x46574c44
1,282,771 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,244 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,923 >>> mbox cmd response: success
2,742,996 UART: [afmc] ++
2,743,164 UART: [afmc] CDI.KEYID = 6
2,743,527 UART: [afmc] SUBJECT.KEYID = 7
2,743,953 UART: [afmc] AUTHORITY.KEYID = 5
2,779,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,449 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,145 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,044 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,737 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,661 UART: [afmc] --
2,822,705 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,822,727 UART: [cold-reset] --
2,823,623 UART: [state] Locking Datavault
2,824,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,272 UART: [state] Locking ICCM
2,825,718 UART: [exit] Launching FMC @ 0x40000000
2,831,015 UART:
2,831,031 UART: Running Caliptra FMC ...
2,831,439 UART:
2,831,669 UART: [fmc] Received command: 0x46574C44
2,832,495 UART:
2,832,511 UART: Running Caliptra ROM ...
2,832,919 UART:
2,833,061 UART: [state] CFI Enabled
2,835,947 UART: [state] LifecycleState = Unprovisioned
2,836,602 UART: [state] DebugLocked = No
2,837,186 UART: [state] WD Timer not started. Device not locked for debugging
2,838,414 UART: [kat] SHA2-256
3,641,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,093 UART: [kat] ++
3,646,245 UART: [kat] sha1
3,650,457 UART: [kat] SHA2-256
3,652,397 UART: [kat] SHA2-384
3,655,030 UART: [kat] SHA2-512-ACC
3,656,930 UART: [kat] ECC-384
3,666,129 UART: [kat] HMAC-384Kdf
3,670,601 UART: [kat] LMS
3,918,913 UART: [kat] --
3,919,851 UART: [update-reset] ++
5,205,717 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,742 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,354,928 >>> mbox cmd response: success
5,355,123 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,137 UART: [update-reset Success] --
5,363,546 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,364,226 UART: [state] Locking Datavault
5,365,004 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,608 UART: [state] Locking ICCM
5,366,138 UART: [exit] Launching FMC @ 0x40000000
5,371,435 UART:
5,371,451 UART: Running Caliptra FMC ...
5,371,859 UART:
5,372,081 UART: [fmc] Received command: 0x1000000D
5,373,173 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,393 ready_for_fw is high
1,056,393 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,179 >>> mbox cmd response: success
2,648,514 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,775 UART:
2,654,791 UART: Running Caliptra FMC ...
2,655,199 UART:
2,655,429 UART: [fmc] Received command: 0x46574C44
5,061,351 >>> mbox cmd response: success
5,068,857 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,074,849 UART:
5,074,865 UART: Running Caliptra FMC ...
5,075,273 UART:
5,075,495 UART: [fmc] Received command: 0x1000000D
5,076,587 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,557 UART: [kat] SHA2-256
901,497 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,206 UART: [kat] LMS
1,168,518 UART: [kat] --
1,169,453 UART: [cold-reset] ++
1,169,871 UART: [fht] FHT @ 0x50003400
1,172,395 UART: [idev] ++
1,172,563 UART: [idev] CDI.KEYID = 6
1,172,924 UART: [idev] SUBJECT.KEYID = 7
1,173,349 UART: [idev] UDS.KEYID = 0
1,173,695 ready_for_fw is high
1,173,695 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,180,989 UART: [idev] Erasing UDS.KEYID = 0
1,198,079 UART: [idev] Sha1 KeyId Algorithm
1,207,095 UART: [idev] --
1,208,084 UART: [ldev] ++
1,208,252 UART: [ldev] CDI.KEYID = 6
1,208,616 UART: [ldev] SUBJECT.KEYID = 5
1,209,043 UART: [ldev] AUTHORITY.KEYID = 7
1,209,506 UART: [ldev] FE.KEYID = 1
1,214,762 UART: [ldev] Erasing FE.KEYID = 1
1,241,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,846 UART: [ldev] --
1,280,178 UART: [fwproc] Wait for Commands...
1,280,829 UART: [fwproc] Recv command 0x46574c44
1,281,562 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,927 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,572 >>> mbox cmd response: success
2,741,785 UART: [afmc] ++
2,741,953 UART: [afmc] CDI.KEYID = 6
2,742,316 UART: [afmc] SUBJECT.KEYID = 7
2,742,742 UART: [afmc] AUTHORITY.KEYID = 5
2,777,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,903 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,654 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,350 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,249 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,942 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,934 UART: [afmc] --
2,821,040 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,821,062 UART: [cold-reset] --
2,822,076 UART: [state] Locking Datavault
2,823,127 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,731 UART: [state] Locking ICCM
2,824,347 UART: [exit] Launching FMC @ 0x40000000
2,829,644 UART:
2,829,660 UART: Running Caliptra FMC ...
2,830,068 UART:
2,830,298 UART: [fmc] Received command: 0x46574C44
2,831,124 UART:
2,831,140 UART: Running Caliptra ROM ...
2,831,548 UART:
2,831,603 UART: [state] CFI Enabled
2,833,623 UART: [state] LifecycleState = Unprovisioned
2,834,278 UART: [state] DebugLocked = No
2,834,898 UART: [state] WD Timer not started. Device not locked for debugging
2,836,006 UART: [kat] SHA2-256
3,639,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,685 UART: [kat] ++
3,643,837 UART: [kat] sha1
3,648,053 UART: [kat] SHA2-256
3,649,993 UART: [kat] SHA2-384
3,652,592 UART: [kat] SHA2-512-ACC
3,654,492 UART: [kat] ECC-384
3,664,157 UART: [kat] HMAC-384Kdf
3,668,779 UART: [kat] LMS
3,917,091 UART: [kat] --
3,917,905 UART: [update-reset] ++
5,203,851 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,904 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,353,090 >>> mbox cmd response: success
5,353,395 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,409 UART: [update-reset Success] --
5,361,818 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,362,266 UART: [state] Locking Datavault
5,363,130 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,734 UART: [state] Locking ICCM
5,364,326 UART: [exit] Launching FMC @ 0x40000000
5,369,623 UART:
5,369,639 UART: Running Caliptra FMC ...
5,370,047 UART:
5,370,269 UART: [fmc] Received command: 0x1000000D
5,371,361 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,866 ready_for_fw is high
1,056,866 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,456 >>> mbox cmd response: success
2,649,019 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,655,218 UART:
2,655,234 UART: Running Caliptra FMC ...
2,655,642 UART:
2,655,872 UART: [fmc] Received command: 0x46574C44
5,062,315 >>> mbox cmd response: success
5,069,837 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,075,311 UART:
5,075,327 UART: Running Caliptra FMC ...
5,075,735 UART:
5,075,957 UART: [fmc] Received command: 0x1000000D
5,077,049 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,284 UART: [kat] SHA2-256
902,224 UART: [kat] SHA2-384
904,987 UART: [kat] SHA2-512-ACC
906,888 UART: [kat] ECC-384
916,867 UART: [kat] HMAC-384Kdf
921,469 UART: [kat] LMS
1,169,781 UART: [kat] --
1,170,700 UART: [cold-reset] ++
1,171,156 UART: [fht] FHT @ 0x50003400
1,173,810 UART: [idev] ++
1,173,978 UART: [idev] CDI.KEYID = 6
1,174,339 UART: [idev] SUBJECT.KEYID = 7
1,174,764 UART: [idev] UDS.KEYID = 0
1,175,110 ready_for_fw is high
1,175,110 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,748 UART: [idev] Erasing UDS.KEYID = 0
1,199,186 UART: [idev] Sha1 KeyId Algorithm
1,208,012 UART: [idev] --
1,209,047 UART: [ldev] ++
1,209,215 UART: [ldev] CDI.KEYID = 6
1,209,579 UART: [ldev] SUBJECT.KEYID = 5
1,210,006 UART: [ldev] AUTHORITY.KEYID = 7
1,210,469 UART: [ldev] FE.KEYID = 1
1,215,565 UART: [ldev] Erasing FE.KEYID = 1
1,241,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,715 UART: [ldev] --
1,281,061 UART: [fwproc] Wait for Commands...
1,281,830 UART: [fwproc] Recv command 0x46574c44
1,282,563 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,782 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,467 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,339 >>> mbox cmd response: success
2,743,554 UART: [afmc] ++
2,743,722 UART: [afmc] CDI.KEYID = 6
2,744,085 UART: [afmc] SUBJECT.KEYID = 7
2,744,511 UART: [afmc] AUTHORITY.KEYID = 5
2,779,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,099 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,795 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,694 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,387 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,261 UART: [afmc] --
2,823,265 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,823,287 UART: [cold-reset] --
2,824,129 UART: [state] Locking Datavault
2,825,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,064 UART: [state] Locking ICCM
2,826,670 UART: [exit] Launching FMC @ 0x40000000
2,831,967 UART:
2,831,983 UART: Running Caliptra FMC ...
2,832,391 UART:
2,832,621 UART: [fmc] Received command: 0x46574C44
2,833,447 UART:
2,833,463 UART: Running Caliptra ROM ...
2,833,871 UART:
2,834,013 UART: [state] CFI Enabled
2,836,701 UART: [state] LifecycleState = Unprovisioned
2,837,356 UART: [state] DebugLocked = No
2,837,992 UART: [state] WD Timer not started. Device not locked for debugging
2,839,126 UART: [kat] SHA2-256
3,642,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,805 UART: [kat] ++
3,646,957 UART: [kat] sha1
3,651,247 UART: [kat] SHA2-256
3,653,187 UART: [kat] SHA2-384
3,656,174 UART: [kat] SHA2-512-ACC
3,658,074 UART: [kat] ECC-384
3,667,631 UART: [kat] HMAC-384Kdf
3,672,435 UART: [kat] LMS
3,920,747 UART: [kat] --
3,921,757 UART: [update-reset] ++
5,207,971 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,209,066 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,357,252 >>> mbox cmd response: success
5,357,385 UART: [update-reset] Copying MAN_2 To MAN_1
5,365,399 UART: [update-reset Success] --
5,365,808 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,366,522 UART: [state] Locking Datavault
5,367,192 UART: [state] Locking PCR0, PCR1 and PCR31
5,367,796 UART: [state] Locking ICCM
5,368,406 UART: [exit] Launching FMC @ 0x40000000
5,373,703 UART:
5,373,719 UART: Running Caliptra FMC ...
5,374,127 UART:
5,374,349 UART: [fmc] Received command: 0x1000000D
5,375,441 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,185 ready_for_fw is high
1,056,185 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,281 >>> mbox cmd response: success
2,648,174 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,237 UART:
2,654,253 UART: Running Caliptra FMC ...
2,654,661 UART:
2,654,891 UART: [fmc] Received command: 0x46574C44
5,060,891 >>> mbox cmd response: success
5,068,417 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,074,205 UART:
5,074,221 UART: Running Caliptra FMC ...
5,074,629 UART:
5,074,851 UART: [fmc] Received command: 0x1000000D
5,075,943 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,743 UART: [kat] SHA2-256
901,683 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,749 UART: [cold-reset] ++
1,170,153 UART: [fht] FHT @ 0x50003400
1,172,815 UART: [idev] ++
1,172,983 UART: [idev] CDI.KEYID = 6
1,173,344 UART: [idev] SUBJECT.KEYID = 7
1,173,769 UART: [idev] UDS.KEYID = 0
1,174,115 ready_for_fw is high
1,174,115 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,198,829 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,270 UART: [ldev] --
1,280,630 UART: [fwproc] Wait for Commands...
1,281,233 UART: [fwproc] Recv command 0x46574c44
1,281,966 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,467 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,152 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,230 >>> mbox cmd response: success
2,743,297 UART: [afmc] ++
2,743,465 UART: [afmc] CDI.KEYID = 6
2,743,828 UART: [afmc] SUBJECT.KEYID = 7
2,744,254 UART: [afmc] AUTHORITY.KEYID = 5
2,778,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,938 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,634 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,533 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,226 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,152 UART: [afmc] --
2,822,124 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,822,146 UART: [cold-reset] --
2,823,056 UART: [state] Locking Datavault
2,824,501 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,105 UART: [state] Locking ICCM
2,825,661 UART: [exit] Launching FMC @ 0x40000000
2,830,958 UART:
2,830,974 UART: Running Caliptra FMC ...
2,831,382 UART:
2,831,612 UART: [fmc] Received command: 0x46574C44
2,832,438 UART:
2,832,454 UART: Running Caliptra ROM ...
2,832,862 UART:
2,832,917 UART: [state] CFI Enabled
2,835,495 UART: [state] LifecycleState = Unprovisioned
2,836,150 UART: [state] DebugLocked = No
2,836,654 UART: [state] WD Timer not started. Device not locked for debugging
2,837,892 UART: [kat] SHA2-256
3,641,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,571 UART: [kat] ++
3,645,723 UART: [kat] sha1
3,649,851 UART: [kat] SHA2-256
3,651,791 UART: [kat] SHA2-384
3,654,746 UART: [kat] SHA2-512-ACC
3,656,646 UART: [kat] ECC-384
3,666,663 UART: [kat] HMAC-384Kdf
3,671,219 UART: [kat] LMS
3,919,531 UART: [kat] --
3,920,457 UART: [update-reset] ++
5,206,793 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,848 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,034 >>> mbox cmd response: success
5,356,225 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,239 UART: [update-reset Success] --
5,364,648 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,365,302 UART: [state] Locking Datavault
5,366,136 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,740 UART: [state] Locking ICCM
5,367,304 UART: [exit] Launching FMC @ 0x40000000
5,372,601 UART:
5,372,617 UART: Running Caliptra FMC ...
5,373,025 UART:
5,373,247 UART: [fmc] Received command: 0x1000000D
5,374,339 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,282 ready_for_fw is high
1,056,282 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,576 >>> mbox cmd response: success
2,648,717 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,838 UART:
2,654,854 UART: Running Caliptra FMC ...
2,655,262 UART:
2,655,492 UART: [fmc] Received command: 0x46574C44
5,061,899 >>> mbox cmd response: success
5,069,531 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,075,453 UART:
5,075,469 UART: Running Caliptra FMC ...
5,075,877 UART:
5,076,099 UART: [fmc] Received command: 0x1000000D
5,077,191 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,174,566 ready_for_fw is high
1,174,566 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,208,200 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,215,807 UART: [ldev] Erasing FE.KEYID = 1
1,242,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,643 UART: [ldev] --
1,281,029 UART: [fwproc] Wait for Commands...
1,281,638 UART: [fwproc] Recv command 0x46574c44
1,282,371 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,602 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,177 >>> mbox cmd response: success
2,742,426 UART: [afmc] ++
2,742,594 UART: [afmc] CDI.KEYID = 6
2,742,957 UART: [afmc] SUBJECT.KEYID = 7
2,743,383 UART: [afmc] AUTHORITY.KEYID = 5
2,779,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,807 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,503 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,402 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,095 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,129 UART: [afmc] --
2,823,163 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,823,185 UART: [cold-reset] --
2,824,053 UART: [state] Locking Datavault
2,825,178 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,782 UART: [state] Locking ICCM
2,826,372 UART: [exit] Launching FMC @ 0x40000000
2,831,669 UART:
2,831,685 UART: Running Caliptra FMC ...
2,832,093 UART:
2,832,323 UART: [fmc] Received command: 0x46574C44
2,833,149 UART:
2,833,165 UART: Running Caliptra ROM ...
2,833,573 UART:
2,833,715 UART: [state] CFI Enabled
2,836,675 UART: [state] LifecycleState = Unprovisioned
2,837,330 UART: [state] DebugLocked = No
2,837,960 UART: [state] WD Timer not started. Device not locked for debugging
2,839,218 UART: [kat] SHA2-256
3,642,768 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,897 UART: [kat] ++
3,647,049 UART: [kat] sha1
3,651,413 UART: [kat] SHA2-256
3,653,353 UART: [kat] SHA2-384
3,656,172 UART: [kat] SHA2-512-ACC
3,658,072 UART: [kat] ECC-384
3,667,703 UART: [kat] HMAC-384Kdf
3,672,181 UART: [kat] LMS
3,920,493 UART: [kat] --
3,921,289 UART: [update-reset] ++
5,207,829 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,208,950 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,357,136 >>> mbox cmd response: success
5,357,369 UART: [update-reset] Copying MAN_2 To MAN_1
5,365,383 UART: [update-reset Success] --
5,365,792 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,366,278 UART: [state] Locking Datavault
5,367,260 UART: [state] Locking PCR0, PCR1 and PCR31
5,367,864 UART: [state] Locking ICCM
5,368,362 UART: [exit] Launching FMC @ 0x40000000
5,373,659 UART:
5,373,675 UART: Running Caliptra FMC ...
5,374,083 UART:
5,374,305 UART: [fmc] Received command: 0x1000000D
5,375,397 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,749 ready_for_fw is high
1,055,749 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,955 >>> mbox cmd response: success
2,646,894 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,652,925 UART:
2,652,941 UART: Running Caliptra FMC ...
2,653,349 UART:
2,653,579 UART: [fmc] Received command: 0x46574C44
5,058,591 >>> mbox cmd response: success
5,066,301 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,072,227 UART:
5,072,243 UART: Running Caliptra FMC ...
5,072,651 UART:
5,072,873 UART: [fmc] Received command: 0x1000000D
5,073,965 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.25s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,108 UART:
192,472 UART: Running Caliptra ROM ...
193,656 UART:
193,804 UART: [state] CFI Enabled
266,146 UART: [state] LifecycleState = Unprovisioned
268,569 UART: [state] DebugLocked = No
271,098 UART: [state] WD Timer not started. Device not locked for debugging
276,124 UART: [kat] SHA2-256
458,080 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,585 UART: [kat] ++
470,063 UART: [kat] sha1
481,295 UART: [kat] SHA2-256
484,301 UART: [kat] SHA2-384
489,573 UART: [kat] SHA2-512-ACC
492,219 UART: [kat] ECC-384
3,778,515 UART: [kat] HMAC-384Kdf
3,803,146 UART: [kat] LMS
4,876,342 UART: [kat] --
4,879,555 UART: [cold-reset] ++
4,881,416 UART: [fht] FHT @ 0x50003400
4,893,051 UART: [idev] ++
4,893,690 UART: [idev] CDI.KEYID = 6
4,894,939 UART: [idev] SUBJECT.KEYID = 7
4,896,043 UART: [idev] UDS.KEYID = 0
4,896,946 ready_for_fw is high
4,897,157 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,037,731 UART: [idev] Erasing UDS.KEYID = 0
8,244,122 UART: [idev] Sha1 KeyId Algorithm
8,265,622 UART: [idev] --
8,269,769 UART: [ldev] ++
8,270,371 UART: [ldev] CDI.KEYID = 6
8,271,552 UART: [ldev] SUBJECT.KEYID = 5
8,272,708 UART: [ldev] AUTHORITY.KEYID = 7
8,273,936 UART: [ldev] FE.KEYID = 1
8,318,938 UART: [ldev] Erasing FE.KEYID = 1
11,655,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,000 UART: [ldev] --
14,037,363 UART: [fwproc] Wait for Commands...
14,040,160 UART: [fwproc] Recv command 0x46574c44
14,042,469 UART: [fwproc] Recv'd Img size: 111688 bytes
18,088,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,166,449 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,226,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,544,336 >>> mbox cmd response: success
18,547,658 UART: [afmc] ++
18,548,274 UART: [afmc] CDI.KEYID = 6
18,549,411 UART: [afmc] SUBJECT.KEYID = 7
18,550,565 UART: [afmc] AUTHORITY.KEYID = 5
21,925,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,223,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,225,398 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,241,546 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,257,682 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,273,513 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,295,962 UART: [afmc] --
24,300,268 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,441,058 UART: [cold-reset] --
24,441,923 UART: [state] Locking Datavault
24,443,074 UART: [state] Locking PCR0, PCR1 and PCR31
24,444,610 UART: [state] Locking ICCM
24,445,527 UART: [exit] Launching FMC @ 0x40000000
24,446,956 UART:
24,447,119 UART: Running Caliptra FMC ...
24,448,219 UART:
24,448,390 UART: [fmc] Received command: 0x46574C44
24,449,856 UART:
24,450,011 UART: Running Caliptra ROM ...
24,451,025 UART:
24,451,174 UART: [state] CFI Enabled
24,512,942 UART: [state] LifecycleState = Unprovisioned
24,514,814 UART: [state] DebugLocked = No
24,516,115 UART: [state] WD Timer not started. Device not locked for debugging
24,520,782 UART: [kat] SHA2-256
24,702,677 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,714,197 UART: [kat] ++
24,714,708 UART: [kat] sha1
24,725,108 UART: [kat] SHA2-256
24,728,129 UART: [kat] SHA2-384
24,734,813 UART: [kat] SHA2-512-ACC
24,737,429 UART: [kat] ECC-384
28,023,774 UART: [kat] HMAC-384Kdf
28,052,910 UART: [kat] LMS
29,126,032 UART: [kat] --
29,129,885 UART: [update-reset] ++
33,201,320 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,205,080 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,579,192 UART: [update-reset] Copying MAN_2 To MAN_1
33,602,055 UART: [update-reset Success] --
33,603,723 >>> mbox cmd response: success
33,603,944 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,605,942 UART: [state] Locking Datavault
33,608,282 UART: [state] Locking PCR0, PCR1 and PCR31
33,609,983 UART: [state] Locking ICCM
33,611,811 UART: [exit] Launching FMC @ 0x40000000
33,620,484 UART:
33,620,718 UART: Running Caliptra FMC ...
33,621,837 UART:
33,621,991 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,623,636 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
4,801,913 ready_for_fw is high
4,802,294 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,302,616 >>> mbox cmd response: success
23,976,007 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,116,862 UART:
24,117,244 UART: Running Caliptra FMC ...
24,118,485 UART:
24,118,656 UART: [fmc] Received command: 0x46574C44
33,152,909 >>> mbox cmd response: success
33,153,305 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,166,654 UART:
33,166,900 UART: Running Caliptra FMC ...
33,167,977 UART:
33,168,122 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,169,757 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,328 UART:
192,707 UART: Running Caliptra ROM ...
193,794 UART:
603,347 UART: [state] CFI Enabled
618,702 UART: [state] LifecycleState = Unprovisioned
621,077 UART: [state] DebugLocked = No
622,558 UART: [state] WD Timer not started. Device not locked for debugging
626,943 UART: [kat] SHA2-256
808,951 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,508 UART: [kat] ++
821,035 UART: [kat] sha1
831,491 UART: [kat] SHA2-256
834,563 UART: [kat] SHA2-384
840,191 UART: [kat] SHA2-512-ACC
842,762 UART: [kat] ECC-384
4,094,829 UART: [kat] HMAC-384Kdf
4,107,247 UART: [kat] LMS
5,180,430 UART: [kat] --
5,183,228 UART: [cold-reset] ++
5,185,579 UART: [fht] FHT @ 0x50003400
5,197,962 UART: [idev] ++
5,198,668 UART: [idev] CDI.KEYID = 6
5,199,853 UART: [idev] SUBJECT.KEYID = 7
5,201,302 UART: [idev] UDS.KEYID = 0
5,202,486 ready_for_fw is high
5,202,690 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,343,055 UART: [idev] Erasing UDS.KEYID = 0
8,490,515 UART: [idev] Sha1 KeyId Algorithm
8,513,266 UART: [idev] --
8,516,831 UART: [ldev] ++
8,517,399 UART: [ldev] CDI.KEYID = 6
8,518,624 UART: [ldev] SUBJECT.KEYID = 5
8,520,045 UART: [ldev] AUTHORITY.KEYID = 7
8,521,594 UART: [ldev] FE.KEYID = 1
8,531,848 UART: [ldev] Erasing FE.KEYID = 1
11,822,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,293 UART: [ldev] --
14,189,725 UART: [fwproc] Wait for Commands...
14,191,604 UART: [fwproc] Recv command 0x46574c44
14,193,855 UART: [fwproc] Recv'd Img size: 111688 bytes
18,237,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,312,777 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,372,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,689,251 >>> mbox cmd response: success
18,693,205 UART: [afmc] ++
18,693,813 UART: [afmc] CDI.KEYID = 6
18,694,919 UART: [afmc] SUBJECT.KEYID = 7
18,696,131 UART: [afmc] AUTHORITY.KEYID = 5
22,013,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,309,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,311,675 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,327,825 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,343,942 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,359,806 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,382,668 UART: [afmc] --
24,388,110 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,528,891 UART: [cold-reset] --
24,529,751 UART: [state] Locking Datavault
24,530,821 UART: [state] Locking PCR0, PCR1 and PCR31
24,532,352 UART: [state] Locking ICCM
24,533,225 UART: [exit] Launching FMC @ 0x40000000
24,534,559 UART:
24,534,699 UART: Running Caliptra FMC ...
24,535,799 UART:
24,535,945 UART: [fmc] Received command: 0x46574C44
24,537,314 UART:
24,537,474 UART: Running Caliptra ROM ...
24,538,566 UART:
24,538,716 UART: [state] CFI Enabled
24,544,815 UART: [state] LifecycleState = Unprovisioned
24,546,634 UART: [state] DebugLocked = No
24,548,759 UART: [state] WD Timer not started. Device not locked for debugging
24,553,001 UART: [kat] SHA2-256
24,734,977 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,746,501 UART: [kat] ++
24,747,014 UART: [kat] sha1
24,758,438 UART: [kat] SHA2-256
24,761,454 UART: [kat] SHA2-384
24,766,729 UART: [kat] SHA2-512-ACC
24,769,344 UART: [kat] ECC-384
28,024,127 UART: [kat] HMAC-384Kdf
28,036,515 UART: [kat] LMS
29,109,657 UART: [kat] --
29,115,828 UART: [update-reset] ++
33,183,330 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,185,997 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,559,953 UART: [update-reset] Copying MAN_2 To MAN_1
33,582,816 UART: [update-reset Success] --
33,584,480 >>> mbox cmd response: success
33,584,687 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,586,721 UART: [state] Locking Datavault
33,591,171 UART: [state] Locking PCR0, PCR1 and PCR31
33,592,868 UART: [state] Locking ICCM
33,594,240 UART: [exit] Launching FMC @ 0x40000000
33,602,852 UART:
33,603,086 UART: Running Caliptra FMC ...
33,604,187 UART:
33,604,335 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,605,985 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
5,103,526 ready_for_fw is high
5,103,940 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,505,833 >>> mbox cmd response: success
24,129,533 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,270,440 UART:
24,270,843 UART: Running Caliptra FMC ...
24,272,044 UART:
24,272,215 UART: [fmc] Received command: 0x46574C44
33,215,334 >>> mbox cmd response: success
33,215,721 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,229,987 UART:
33,230,257 UART: Running Caliptra FMC ...
33,231,430 UART:
33,231,582 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,233,207 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,074 UART:
192,436 UART: Running Caliptra ROM ...
193,618 UART:
193,766 UART: [state] CFI Enabled
265,932 UART: [state] LifecycleState = Unprovisioned
267,837 UART: [state] DebugLocked = No
269,369 UART: [state] WD Timer not started. Device not locked for debugging
272,970 UART: [kat] SHA2-256
452,097 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,684 UART: [kat] ++
464,130 UART: [kat] sha1
475,778 UART: [kat] SHA2-256
478,859 UART: [kat] SHA2-384
485,063 UART: [kat] SHA2-512-ACC
488,164 UART: [kat] ECC-384
2,949,682 UART: [kat] HMAC-384Kdf
2,973,200 UART: [kat] LMS
3,502,623 UART: [kat] --
3,506,148 UART: [cold-reset] ++
3,508,081 UART: [fht] FHT @ 0x50003400
3,519,695 UART: [idev] ++
3,520,256 UART: [idev] CDI.KEYID = 6
3,521,138 UART: [idev] SUBJECT.KEYID = 7
3,522,377 UART: [idev] UDS.KEYID = 0
3,523,296 ready_for_fw is high
3,523,508 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,664,464 UART: [idev] Erasing UDS.KEYID = 0
6,028,283 UART: [idev] Sha1 KeyId Algorithm
6,051,894 UART: [idev] --
6,056,051 UART: [ldev] ++
6,056,625 UART: [ldev] CDI.KEYID = 6
6,057,510 UART: [ldev] SUBJECT.KEYID = 5
6,058,724 UART: [ldev] AUTHORITY.KEYID = 7
6,059,965 UART: [ldev] FE.KEYID = 1
6,101,369 UART: [ldev] Erasing FE.KEYID = 1
8,604,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,764 UART: [ldev] --
10,416,117 UART: [fwproc] Wait for Commands...
10,417,677 UART: [fwproc] Recv command 0x46574c44
10,419,776 UART: [fwproc] Recv'd Img size: 112032 bytes
13,802,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,873,901 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,934,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,252,317 >>> mbox cmd response: success
14,257,387 UART: [afmc] ++
14,257,999 UART: [afmc] CDI.KEYID = 6
14,258,885 UART: [afmc] SUBJECT.KEYID = 7
14,259,980 UART: [afmc] AUTHORITY.KEYID = 5
16,787,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,514,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,516,776 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,532,845 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,548,917 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,564,592 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,586,528 UART: [afmc] --
18,591,854 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,733,046 UART: [cold-reset] --
18,733,912 UART: [state] Locking Datavault
18,735,068 UART: [state] Locking PCR0, PCR1 and PCR31
18,736,606 UART: [state] Locking ICCM
18,737,511 UART: [exit] Launching FMC @ 0x40000000
18,738,940 UART:
18,739,102 UART: Running Caliptra FMC ...
18,740,207 UART:
18,740,363 UART: [fmc] Received command: 0x46574C44
18,741,826 UART:
18,741,980 UART: Running Caliptra ROM ...
18,743,075 UART:
18,743,251 UART: [state] CFI Enabled
18,806,395 UART: [state] LifecycleState = Unprovisioned
18,808,425 UART: [state] DebugLocked = No
18,810,954 UART: [state] WD Timer not started. Device not locked for debugging
18,814,744 UART: [kat] SHA2-256
18,993,844 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,005,415 UART: [kat] ++
19,005,873 UART: [kat] sha1
19,016,276 UART: [kat] SHA2-256
19,019,345 UART: [kat] SHA2-384
19,025,813 UART: [kat] SHA2-512-ACC
19,028,764 UART: [kat] ECC-384
21,487,642 UART: [kat] HMAC-384Kdf
21,511,700 UART: [kat] LMS
22,041,171 UART: [kat] --
22,045,121 UART: [update-reset] ++
25,449,401 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,452,773 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,829,458 UART: [update-reset] Copying MAN_2 To MAN_1
25,851,792 UART: [update-reset Success] --
25,853,096 >>> mbox cmd response: success
25,853,321 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,856,927 UART: [state] Locking Datavault
25,859,099 UART: [state] Locking PCR0, PCR1 and PCR31
25,860,745 UART: [state] Locking ICCM
25,862,270 UART: [exit] Launching FMC @ 0x40000000
25,870,661 UART:
25,870,893 UART: Running Caliptra FMC ...
25,871,915 UART:
25,872,057 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,873,687 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,360,985 ready_for_fw is high
3,361,382 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,046,170 >>> mbox cmd response: success
18,320,946 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,462,208 UART:
18,462,592 UART: Running Caliptra FMC ...
18,463,812 UART:
18,463,992 UART: [fmc] Received command: 0x46574C44
25,441,974 >>> mbox cmd response: success
25,442,357 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,454,173 UART:
25,454,458 UART: Running Caliptra FMC ...
25,455,636 UART:
25,455,797 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,457,431 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,362 UART:
192,753 UART: Running Caliptra ROM ...
193,877 UART:
603,607 UART: [state] CFI Enabled
616,074 UART: [state] LifecycleState = Unprovisioned
617,991 UART: [state] DebugLocked = No
619,296 UART: [state] WD Timer not started. Device not locked for debugging
623,619 UART: [kat] SHA2-256
802,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,333 UART: [kat] ++
814,864 UART: [kat] sha1
826,028 UART: [kat] SHA2-256
829,035 UART: [kat] SHA2-384
835,023 UART: [kat] SHA2-512-ACC
837,969 UART: [kat] ECC-384
3,279,525 UART: [kat] HMAC-384Kdf
3,293,398 UART: [kat] LMS
3,822,891 UART: [kat] --
3,826,599 UART: [cold-reset] ++
3,829,166 UART: [fht] FHT @ 0x50003400
3,840,424 UART: [idev] ++
3,840,990 UART: [idev] CDI.KEYID = 6
3,841,894 UART: [idev] SUBJECT.KEYID = 7
3,843,066 UART: [idev] UDS.KEYID = 0
3,844,110 ready_for_fw is high
3,844,308 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,985,014 UART: [idev] Erasing UDS.KEYID = 0
6,315,867 UART: [idev] Sha1 KeyId Algorithm
6,339,139 UART: [idev] --
6,341,501 UART: [ldev] ++
6,342,072 UART: [ldev] CDI.KEYID = 6
6,342,981 UART: [ldev] SUBJECT.KEYID = 5
6,344,135 UART: [ldev] AUTHORITY.KEYID = 7
6,345,433 UART: [ldev] FE.KEYID = 1
6,354,942 UART: [ldev] Erasing FE.KEYID = 1
8,828,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,061 UART: [ldev] --
10,617,849 UART: [fwproc] Wait for Commands...
10,619,460 UART: [fwproc] Recv command 0x46574c44
10,621,550 UART: [fwproc] Recv'd Img size: 112032 bytes
13,998,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,068,730 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,129,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,446,758 >>> mbox cmd response: success
14,450,281 UART: [afmc] ++
14,450,910 UART: [afmc] CDI.KEYID = 6
14,451,826 UART: [afmc] SUBJECT.KEYID = 7
14,453,150 UART: [afmc] AUTHORITY.KEYID = 5
16,953,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,673,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,675,368 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,691,406 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,707,465 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,723,111 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,745,059 UART: [afmc] --
18,750,819 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,892,031 UART: [cold-reset] --
18,892,891 UART: [state] Locking Datavault
18,894,047 UART: [state] Locking PCR0, PCR1 and PCR31
18,895,585 UART: [state] Locking ICCM
18,896,487 UART: [exit] Launching FMC @ 0x40000000
18,897,925 UART:
18,898,084 UART: Running Caliptra FMC ...
18,899,179 UART:
18,899,334 UART: [fmc] Received command: 0x46574C44
18,900,792 UART:
18,900,942 UART: Running Caliptra ROM ...
18,902,034 UART:
18,902,190 UART: [state] CFI Enabled
18,911,856 UART: [state] LifecycleState = Unprovisioned
18,913,688 UART: [state] DebugLocked = No
18,915,171 UART: [state] WD Timer not started. Device not locked for debugging
18,918,312 UART: [kat] SHA2-256
19,097,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,109,065 UART: [kat] ++
19,109,602 UART: [kat] sha1
19,119,955 UART: [kat] SHA2-256
19,122,979 UART: [kat] SHA2-384
19,129,175 UART: [kat] SHA2-512-ACC
19,132,110 UART: [kat] ECC-384
21,571,580 UART: [kat] HMAC-384Kdf
21,585,266 UART: [kat] LMS
22,114,758 UART: [kat] --
22,119,558 UART: [update-reset] ++
25,516,298 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,519,205 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,895,065 UART: [update-reset] Copying MAN_2 To MAN_1
25,917,409 UART: [update-reset Success] --
25,918,766 >>> mbox cmd response: success
25,918,996 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,922,295 UART: [state] Locking Datavault
25,925,389 UART: [state] Locking PCR0, PCR1 and PCR31
25,927,036 UART: [state] Locking ICCM
25,928,713 UART: [exit] Launching FMC @ 0x40000000
25,937,115 UART:
25,937,346 UART: Running Caliptra FMC ...
25,938,449 UART:
25,938,600 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,940,225 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,640 writing to cptra_bootfsm_go
3,698,380 ready_for_fw is high
3,698,793 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,231,645 >>> mbox cmd response: success
18,467,794 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,609,038 UART:
18,609,433 UART: Running Caliptra FMC ...
18,610,551 UART:
18,610,726 UART: [fmc] Received command: 0x46574C44
25,489,896 >>> mbox cmd response: success
25,490,296 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,503,545 UART:
25,503,800 UART: Running Caliptra FMC ...
25,504,970 UART:
25,505,133 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,506,775 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,380,717 ready_for_fw is high
3,381,107 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,042,594 >>> mbox cmd response: success
18,307,830 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,449,020 UART:
18,449,424 UART: Running Caliptra FMC ...
18,450,530 UART:
18,450,681 UART: [fmc] Received command: 0x46574C44
25,431,603 >>> mbox cmd response: success
25,431,990 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,443,232 UART:
25,443,491 UART: Running Caliptra FMC ...
25,444,577 UART:
25,444,733 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,446,383 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,698,380 ready_for_fw is high
3,698,766 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,238,154 >>> mbox cmd response: success
18,473,134 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,614,374 UART:
18,614,747 UART: Running Caliptra FMC ...
18,615,950 UART:
18,616,131 UART: [fmc] Received command: 0x46574C44
25,496,317 >>> mbox cmd response: success
25,496,737 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,510,474 UART:
25,510,726 UART: Running Caliptra FMC ...
25,511,901 UART:
25,512,062 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,513,705 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,612 UART: [state] LifecycleState = Unprovisioned
86,267 UART: [state] DebugLocked = No
86,903 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
891,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,714 UART: [kat] SHA2-512-ACC
906,615 UART: [kat] ECC-384
916,384 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,170,037 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,174,375 ready_for_fw is high
1,174,375 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,199,329 UART: [idev] Sha1 KeyId Algorithm
1,208,327 UART: [idev] --
1,209,270 UART: [ldev] ++
1,209,438 UART: [ldev] CDI.KEYID = 6
1,209,802 UART: [ldev] SUBJECT.KEYID = 5
1,210,229 UART: [ldev] AUTHORITY.KEYID = 7
1,210,692 UART: [ldev] FE.KEYID = 1
1,215,860 UART: [ldev] Erasing FE.KEYID = 1
1,242,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,448 UART: [ldev] --
1,281,884 UART: [fwproc] Wait for Commands...
1,282,581 UART: [fwproc] Recv command 0x46574c44
1,283,314 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,451 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,258 >>> mbox cmd response: success
2,744,427 UART: [afmc] ++
2,744,595 UART: [afmc] CDI.KEYID = 6
2,744,958 UART: [afmc] SUBJECT.KEYID = 7
2,745,384 UART: [afmc] AUTHORITY.KEYID = 5
2,780,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,048 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,744 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,643 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,336 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,164 UART: [afmc] --
2,824,218 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,824,240 UART: [cold-reset] --
2,824,896 UART: [state] Locking Datavault
2,826,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,671 UART: [state] Locking ICCM
2,827,203 UART: [exit] Launching FMC @ 0x40000000
2,832,500 UART:
2,832,516 UART: Running Caliptra FMC ...
2,832,924 UART:
2,833,154 UART: [fmc] Received command: 0x46574C44
2,833,980 UART:
2,833,996 UART: Running Caliptra ROM ...
2,834,404 UART:
2,834,459 UART: [state] CFI Enabled
2,837,459 UART: [state] LifecycleState = Unprovisioned
2,838,114 UART: [state] DebugLocked = No
2,838,712 UART: [state] WD Timer not started. Device not locked for debugging
2,839,862 UART: [kat] SHA2-256
3,643,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,541 UART: [kat] ++
3,647,693 UART: [kat] sha1
3,651,935 UART: [kat] SHA2-256
3,653,875 UART: [kat] SHA2-384
3,656,604 UART: [kat] SHA2-512-ACC
3,658,504 UART: [kat] ECC-384
3,668,139 UART: [kat] HMAC-384Kdf
3,672,713 UART: [kat] LMS
3,921,025 UART: [kat] --
3,921,777 UART: [update-reset] ++
5,206,839 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,208,000 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,463 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,477 UART: [update-reset Success] --
5,364,886 >>> mbox cmd response: success
5,364,886 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,365,594 UART: [state] Locking Datavault
5,366,526 UART: [state] Locking PCR0, PCR1 and PCR31
5,367,130 UART: [state] Locking ICCM
5,367,782 UART: [exit] Launching FMC @ 0x40000000
5,373,079 UART:
5,373,095 UART: Running Caliptra FMC ...
5,373,503 UART:
5,373,725 UART: [fmc] Received command: 0x1000000C
5,374,460 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,166 ready_for_fw is high
1,056,166 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,146 >>> mbox cmd response: success
2,647,769 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,653,952 UART:
2,653,968 UART: Running Caliptra FMC ...
2,654,376 UART:
2,654,606 UART: [fmc] Received command: 0x46574C44
5,066,209 >>> mbox cmd response: success
5,066,209 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,071,753 UART:
5,071,769 UART: Running Caliptra FMC ...
5,072,177 UART:
5,072,399 UART: [fmc] Received command: 0x1000000C
5,073,134 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,446 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,174,578 ready_for_fw is high
1,174,578 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,138 UART: [idev] Erasing UDS.KEYID = 0
1,199,326 UART: [idev] Sha1 KeyId Algorithm
1,208,008 UART: [idev] --
1,208,971 UART: [ldev] ++
1,209,139 UART: [ldev] CDI.KEYID = 6
1,209,503 UART: [ldev] SUBJECT.KEYID = 5
1,209,930 UART: [ldev] AUTHORITY.KEYID = 7
1,210,393 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,707 UART: [ldev] --
1,282,059 UART: [fwproc] Wait for Commands...
1,282,762 UART: [fwproc] Recv command 0x46574c44
1,283,495 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,976 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,661 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,753 >>> mbox cmd response: success
2,744,804 UART: [afmc] ++
2,744,972 UART: [afmc] CDI.KEYID = 6
2,745,335 UART: [afmc] SUBJECT.KEYID = 7
2,745,761 UART: [afmc] AUTHORITY.KEYID = 5
2,781,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,525 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,221 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,120 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,813 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,873 UART: [afmc] --
2,824,887 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,824,909 UART: [cold-reset] --
2,825,637 UART: [state] Locking Datavault
2,826,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,442 UART: [state] Locking ICCM
2,828,072 UART: [exit] Launching FMC @ 0x40000000
2,833,369 UART:
2,833,385 UART: Running Caliptra FMC ...
2,833,793 UART:
2,834,023 UART: [fmc] Received command: 0x46574C44
2,834,849 UART:
2,834,865 UART: Running Caliptra ROM ...
2,835,273 UART:
2,835,415 UART: [state] CFI Enabled
2,838,231 UART: [state] LifecycleState = Unprovisioned
2,838,886 UART: [state] DebugLocked = No
2,839,586 UART: [state] WD Timer not started. Device not locked for debugging
2,840,804 UART: [kat] SHA2-256
3,644,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,483 UART: [kat] ++
3,648,635 UART: [kat] sha1
3,652,899 UART: [kat] SHA2-256
3,654,839 UART: [kat] SHA2-384
3,657,572 UART: [kat] SHA2-512-ACC
3,659,472 UART: [kat] ECC-384
3,669,511 UART: [kat] HMAC-384Kdf
3,674,131 UART: [kat] LMS
3,922,443 UART: [kat] --
3,923,375 UART: [update-reset] ++
5,208,417 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,209,578 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,357,935 UART: [update-reset] Copying MAN_2 To MAN_1
5,365,949 UART: [update-reset Success] --
5,366,358 >>> mbox cmd response: success
5,366,358 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,366,886 UART: [state] Locking Datavault
5,367,668 UART: [state] Locking PCR0, PCR1 and PCR31
5,368,272 UART: [state] Locking ICCM
5,368,886 UART: [exit] Launching FMC @ 0x40000000
5,374,183 UART:
5,374,199 UART: Running Caliptra FMC ...
5,374,607 UART:
5,374,829 UART: [fmc] Received command: 0x1000000C
5,375,564 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,829 ready_for_fw is high
1,056,829 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,594,481 >>> mbox cmd response: success
2,651,096 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,657,283 UART:
2,657,299 UART: Running Caliptra FMC ...
2,657,707 UART:
2,657,937 UART: [fmc] Received command: 0x46574C44
5,070,889 >>> mbox cmd response: success
5,070,889 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,076,287 UART:
5,076,303 UART: Running Caliptra FMC ...
5,076,711 UART:
5,076,933 UART: [fmc] Received command: 0x1000000C
5,077,668 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Unprovisioned
86,229 UART: [state] DebugLocked = No
86,871 UART: [state] WD Timer not started. Device not locked for debugging
88,070 UART: [kat] SHA2-256
891,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,353 UART: [kat] SHA2-256
902,293 UART: [kat] SHA2-384
905,056 UART: [kat] SHA2-512-ACC
906,957 UART: [kat] ECC-384
916,798 UART: [kat] HMAC-384Kdf
921,266 UART: [kat] LMS
1,169,578 UART: [kat] --
1,170,411 UART: [cold-reset] ++
1,170,827 UART: [fht] FHT @ 0x50003400
1,173,529 UART: [idev] ++
1,173,697 UART: [idev] CDI.KEYID = 6
1,174,058 UART: [idev] SUBJECT.KEYID = 7
1,174,483 UART: [idev] UDS.KEYID = 0
1,174,829 ready_for_fw is high
1,174,829 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,293 UART: [idev] Erasing UDS.KEYID = 0
1,199,111 UART: [idev] Sha1 KeyId Algorithm
1,208,133 UART: [idev] --
1,209,142 UART: [ldev] ++
1,209,310 UART: [ldev] CDI.KEYID = 6
1,209,674 UART: [ldev] SUBJECT.KEYID = 5
1,210,101 UART: [ldev] AUTHORITY.KEYID = 7
1,210,564 UART: [ldev] FE.KEYID = 1
1,215,494 UART: [ldev] Erasing FE.KEYID = 1
1,241,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,166 UART: [ldev] --
1,280,468 UART: [fwproc] Wait for Commands...
1,281,043 UART: [fwproc] Recv command 0x46574c44
1,281,776 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,135 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,820 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,734 >>> mbox cmd response: success
2,742,995 UART: [afmc] ++
2,743,163 UART: [afmc] CDI.KEYID = 6
2,743,526 UART: [afmc] SUBJECT.KEYID = 7
2,743,952 UART: [afmc] AUTHORITY.KEYID = 5
2,780,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,162 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,858 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,757 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,450 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,258 UART: [afmc] --
2,823,214 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,823,236 UART: [cold-reset] --
2,824,048 UART: [state] Locking Datavault
2,825,319 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,923 UART: [state] Locking ICCM
2,826,545 UART: [exit] Launching FMC @ 0x40000000
2,831,842 UART:
2,831,858 UART: Running Caliptra FMC ...
2,832,266 UART:
2,832,496 UART: [fmc] Received command: 0x46574C44
2,833,322 UART:
2,833,338 UART: Running Caliptra ROM ...
2,833,746 UART:
2,833,801 UART: [state] CFI Enabled
2,836,341 UART: [state] LifecycleState = Unprovisioned
2,836,996 UART: [state] DebugLocked = No
2,837,602 UART: [state] WD Timer not started. Device not locked for debugging
2,838,794 UART: [kat] SHA2-256
3,642,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,473 UART: [kat] ++
3,646,625 UART: [kat] sha1
3,650,831 UART: [kat] SHA2-256
3,652,771 UART: [kat] SHA2-384
3,655,512 UART: [kat] SHA2-512-ACC
3,657,412 UART: [kat] ECC-384
3,666,843 UART: [kat] HMAC-384Kdf
3,671,643 UART: [kat] LMS
3,919,955 UART: [kat] --
3,920,579 UART: [update-reset] ++
5,206,091 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,168 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,355,559 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,573 UART: [update-reset Success] --
5,363,982 >>> mbox cmd response: success
5,363,982 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,364,570 UART: [state] Locking Datavault
5,365,342 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,946 UART: [state] Locking ICCM
5,366,388 UART: [exit] Launching FMC @ 0x40000000
5,371,685 UART:
5,371,701 UART: Running Caliptra FMC ...
5,372,109 UART:
5,372,331 UART: [fmc] Received command: 0x1000000C
5,373,066 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,462 ready_for_fw is high
1,056,462 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,112 >>> mbox cmd response: success
2,648,129 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,356 UART:
2,654,372 UART: Running Caliptra FMC ...
2,654,780 UART:
2,655,010 UART: [fmc] Received command: 0x46574C44
5,066,563 >>> mbox cmd response: success
5,066,563 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,072,333 UART:
5,072,349 UART: Running Caliptra FMC ...
5,072,757 UART:
5,072,979 UART: [fmc] Received command: 0x1000000C
5,073,714 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
891,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,432 UART: [kat] SHA2-256
901,372 UART: [kat] SHA2-384
904,235 UART: [kat] SHA2-512-ACC
906,136 UART: [kat] ECC-384
915,969 UART: [kat] HMAC-384Kdf
920,623 UART: [kat] LMS
1,168,935 UART: [kat] --
1,169,758 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,982 UART: [idev] ++
1,173,150 UART: [idev] CDI.KEYID = 6
1,173,511 UART: [idev] SUBJECT.KEYID = 7
1,173,936 UART: [idev] UDS.KEYID = 0
1,174,282 ready_for_fw is high
1,174,282 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,506 UART: [idev] Sha1 KeyId Algorithm
1,208,610 UART: [idev] --
1,209,593 UART: [ldev] ++
1,209,761 UART: [ldev] CDI.KEYID = 6
1,210,125 UART: [ldev] SUBJECT.KEYID = 5
1,210,552 UART: [ldev] AUTHORITY.KEYID = 7
1,211,015 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,243,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,341 UART: [ldev] --
1,282,731 UART: [fwproc] Wait for Commands...
1,283,446 UART: [fwproc] Recv command 0x46574c44
1,284,179 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,910 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,495 >>> mbox cmd response: success
2,744,660 UART: [afmc] ++
2,744,828 UART: [afmc] CDI.KEYID = 6
2,745,191 UART: [afmc] SUBJECT.KEYID = 7
2,745,617 UART: [afmc] AUTHORITY.KEYID = 5
2,781,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,175 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,871 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,770 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,463 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,235 UART: [afmc] --
2,824,153 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,824,175 UART: [cold-reset] --
2,825,067 UART: [state] Locking Datavault
2,825,880 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,484 UART: [state] Locking ICCM
2,826,974 UART: [exit] Launching FMC @ 0x40000000
2,832,271 UART:
2,832,287 UART: Running Caliptra FMC ...
2,832,695 UART:
2,832,925 UART: [fmc] Received command: 0x46574C44
2,833,751 UART:
2,833,767 UART: Running Caliptra ROM ...
2,834,175 UART:
2,834,317 UART: [state] CFI Enabled
2,837,099 UART: [state] LifecycleState = Unprovisioned
2,837,754 UART: [state] DebugLocked = No
2,838,366 UART: [state] WD Timer not started. Device not locked for debugging
2,839,522 UART: [kat] SHA2-256
3,643,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,201 UART: [kat] ++
3,647,353 UART: [kat] sha1
3,651,403 UART: [kat] SHA2-256
3,653,343 UART: [kat] SHA2-384
3,656,072 UART: [kat] SHA2-512-ACC
3,657,972 UART: [kat] ECC-384
3,667,565 UART: [kat] HMAC-384Kdf
3,672,113 UART: [kat] LMS
3,920,425 UART: [kat] --
3,921,203 UART: [update-reset] ++
5,206,961 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,980 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,356,333 UART: [update-reset] Copying MAN_2 To MAN_1
5,364,347 UART: [update-reset Success] --
5,364,756 >>> mbox cmd response: success
5,364,756 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,365,410 UART: [state] Locking Datavault
5,366,252 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,856 UART: [state] Locking ICCM
5,367,376 UART: [exit] Launching FMC @ 0x40000000
5,372,673 UART:
5,372,689 UART: Running Caliptra FMC ...
5,373,097 UART:
5,373,319 UART: [fmc] Received command: 0x1000000C
5,374,054 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,317 ready_for_fw is high
1,056,317 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,771 >>> mbox cmd response: success
2,648,098 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,431 UART:
2,654,447 UART: Running Caliptra FMC ...
2,654,855 UART:
2,655,085 UART: [fmc] Received command: 0x46574C44
5,068,309 >>> mbox cmd response: success
5,068,309 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,073,807 UART:
5,073,823 UART: Running Caliptra FMC ...
5,074,231 UART:
5,074,453 UART: [fmc] Received command: 0x1000000C
5,075,188 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,174,215 ready_for_fw is high
1,174,215 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,853 UART: [idev] Erasing UDS.KEYID = 0
1,199,695 UART: [idev] Sha1 KeyId Algorithm
1,208,381 UART: [idev] --
1,209,256 UART: [ldev] ++
1,209,424 UART: [ldev] CDI.KEYID = 6
1,209,788 UART: [ldev] SUBJECT.KEYID = 5
1,210,215 UART: [ldev] AUTHORITY.KEYID = 7
1,210,678 UART: [ldev] FE.KEYID = 1
1,215,978 UART: [ldev] Erasing FE.KEYID = 1
1,242,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,118 UART: [ldev] --
1,281,414 UART: [fwproc] Wait for Commands...
1,282,197 UART: [fwproc] Recv command 0x46574c44
1,282,930 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,075 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,702 >>> mbox cmd response: success
2,743,927 UART: [afmc] ++
2,744,095 UART: [afmc] CDI.KEYID = 6
2,744,458 UART: [afmc] SUBJECT.KEYID = 7
2,744,884 UART: [afmc] AUTHORITY.KEYID = 5
2,780,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,780 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,476 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,375 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,068 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,098 UART: [afmc] --
2,824,116 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,824,138 UART: [cold-reset] --
2,825,146 UART: [state] Locking Datavault
2,826,041 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,645 UART: [state] Locking ICCM
2,827,261 UART: [exit] Launching FMC @ 0x40000000
2,832,558 UART:
2,832,574 UART: Running Caliptra FMC ...
2,832,982 UART:
2,833,212 UART: [fmc] Received command: 0x46574C44
2,834,038 UART:
2,834,054 UART: Running Caliptra ROM ...
2,834,462 UART:
2,834,517 UART: [state] CFI Enabled
2,837,229 UART: [state] LifecycleState = Unprovisioned
2,837,884 UART: [state] DebugLocked = No
2,838,480 UART: [state] WD Timer not started. Device not locked for debugging
2,839,638 UART: [kat] SHA2-256
3,643,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,317 UART: [kat] ++
3,647,469 UART: [kat] sha1
3,651,761 UART: [kat] SHA2-256
3,653,701 UART: [kat] SHA2-384
3,656,258 UART: [kat] SHA2-512-ACC
3,658,158 UART: [kat] ECC-384
3,668,127 UART: [kat] HMAC-384Kdf
3,672,795 UART: [kat] LMS
3,921,107 UART: [kat] --
3,922,099 UART: [update-reset] ++
5,208,445 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,209,506 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,357,987 UART: [update-reset] Copying MAN_2 To MAN_1
5,366,001 UART: [update-reset Success] --
5,366,410 >>> mbox cmd response: success
5,366,410 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,366,950 UART: [state] Locking Datavault
5,367,880 UART: [state] Locking PCR0, PCR1 and PCR31
5,368,484 UART: [state] Locking ICCM
5,368,996 UART: [exit] Launching FMC @ 0x40000000
5,374,293 UART:
5,374,309 UART: Running Caliptra FMC ...
5,374,717 UART:
5,374,939 UART: [fmc] Received command: 0x1000000C
5,375,674 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,768 ready_for_fw is high
1,055,768 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,778 >>> mbox cmd response: success
2,648,599 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,526 UART:
2,654,542 UART: Running Caliptra FMC ...
2,654,950 UART:
2,655,180 UART: [fmc] Received command: 0x46574C44
5,067,931 >>> mbox cmd response: success
5,067,931 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,073,813 UART:
5,073,829 UART: Running Caliptra FMC ...
5,074,237 UART:
5,074,459 UART: [fmc] Received command: 0x1000000C
5,075,194 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,073 UART: [state] LifecycleState = Unprovisioned
86,728 UART: [state] DebugLocked = No
87,252 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
891,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,048 UART: [kat] ++
896,200 UART: [kat] sha1
900,634 UART: [kat] SHA2-256
902,574 UART: [kat] SHA2-384
905,359 UART: [kat] SHA2-512-ACC
907,260 UART: [kat] ECC-384
917,281 UART: [kat] HMAC-384Kdf
921,773 UART: [kat] LMS
1,170,085 UART: [kat] --
1,170,770 UART: [cold-reset] ++
1,171,296 UART: [fht] FHT @ 0x50003400
1,173,872 UART: [idev] ++
1,174,040 UART: [idev] CDI.KEYID = 6
1,174,401 UART: [idev] SUBJECT.KEYID = 7
1,174,826 UART: [idev] UDS.KEYID = 0
1,175,172 ready_for_fw is high
1,175,172 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,910 UART: [idev] Erasing UDS.KEYID = 0
1,200,246 UART: [idev] Sha1 KeyId Algorithm
1,209,144 UART: [idev] --
1,210,147 UART: [ldev] ++
1,210,315 UART: [ldev] CDI.KEYID = 6
1,210,679 UART: [ldev] SUBJECT.KEYID = 5
1,211,106 UART: [ldev] AUTHORITY.KEYID = 7
1,211,569 UART: [ldev] FE.KEYID = 1
1,217,039 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,295 UART: [fwproc] Wait for Commands...
1,283,082 UART: [fwproc] Recv command 0x46574c44
1,283,815 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,416 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,744,223 >>> mbox cmd response: success
2,745,328 UART: [afmc] ++
2,745,496 UART: [afmc] CDI.KEYID = 6
2,745,859 UART: [afmc] SUBJECT.KEYID = 7
2,746,285 UART: [afmc] AUTHORITY.KEYID = 5
2,781,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,865 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,561 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,460 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,153 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,824,049 UART: [afmc] --
2,825,015 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,825,037 UART: [cold-reset] --
2,825,983 UART: [state] Locking Datavault
2,827,066 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,670 UART: [state] Locking ICCM
2,828,192 UART: [exit] Launching FMC @ 0x40000000
2,833,489 UART:
2,833,505 UART: Running Caliptra FMC ...
2,833,913 UART:
2,834,143 UART: [fmc] Received command: 0x46574C44
2,834,969 UART:
2,834,985 UART: Running Caliptra ROM ...
2,835,393 UART:
2,835,535 UART: [state] CFI Enabled
2,838,563 UART: [state] LifecycleState = Unprovisioned
2,839,218 UART: [state] DebugLocked = No
2,839,908 UART: [state] WD Timer not started. Device not locked for debugging
2,841,176 UART: [kat] SHA2-256
3,644,726 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,855 UART: [kat] ++
3,649,007 UART: [kat] sha1
3,653,211 UART: [kat] SHA2-256
3,655,151 UART: [kat] SHA2-384
3,657,912 UART: [kat] SHA2-512-ACC
3,659,812 UART: [kat] ECC-384
3,669,681 UART: [kat] HMAC-384Kdf
3,674,361 UART: [kat] LMS
3,922,673 UART: [kat] --
3,923,525 UART: [update-reset] ++
5,209,659 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,210,700 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,358,999 UART: [update-reset] Copying MAN_2 To MAN_1
5,367,013 UART: [update-reset Success] --
5,367,422 >>> mbox cmd response: success
5,367,422 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,367,902 UART: [state] Locking Datavault
5,368,706 UART: [state] Locking PCR0, PCR1 and PCR31
5,369,310 UART: [state] Locking ICCM
5,369,924 UART: [exit] Launching FMC @ 0x40000000
5,375,221 UART:
5,375,237 UART: Running Caliptra FMC ...
5,375,645 UART:
5,375,867 UART: [fmc] Received command: 0x1000000C
5,376,602 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,401 ready_for_fw is high
1,056,401 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,423 >>> mbox cmd response: success
2,647,696 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,653,509 UART:
2,653,525 UART: Running Caliptra FMC ...
2,653,933 UART:
2,654,163 UART: [fmc] Received command: 0x46574C44
5,067,079 >>> mbox cmd response: success
5,067,079 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,073,085 UART:
5,073,101 UART: Running Caliptra FMC ...
5,073,509 UART:
5,073,731 UART: [fmc] Received command: 0x1000000C
5,074,466 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
192,548 UART:
193,492 UART: Running Caliptra ROM ...
194,741 UART:
194,891 UART: [state] CFI Enabled
264,779 UART: [state] LifecycleState = Unprovisioned
267,420 UART: [state] DebugLocked = No
268,522 UART: [state] WD Timer not started. Device not locked for debugging
272,311 UART: [kat] SHA2-256
454,008 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,533 UART: [kat] ++
466,069 UART: [kat] sha1
476,588 UART: [kat] SHA2-256
479,602 UART: [kat] SHA2-384
485,053 UART: [kat] SHA2-512-ACC
487,734 UART: [kat] ECC-384
3,777,050 UART: [kat] HMAC-384Kdf
3,805,781 UART: [kat] LMS
4,878,937 UART: [kat] --
4,882,647 UART: [cold-reset] ++
4,884,448 UART: [fht] FHT @ 0x50003400
4,894,470 UART: [idev] ++
4,895,181 UART: [idev] CDI.KEYID = 6
4,896,429 UART: [idev] SUBJECT.KEYID = 7
4,897,454 UART: [idev] UDS.KEYID = 0
4,898,446 ready_for_fw is high
4,898,671 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,039,515 UART: [idev] Erasing UDS.KEYID = 0
8,250,123 UART: [idev] Sha1 KeyId Algorithm
8,271,411 UART: [idev] --
8,275,984 UART: [ldev] ++
8,276,569 UART: [ldev] CDI.KEYID = 6
8,277,726 UART: [ldev] SUBJECT.KEYID = 5
8,278,935 UART: [ldev] AUTHORITY.KEYID = 7
8,280,088 UART: [ldev] FE.KEYID = 1
8,322,461 UART: [ldev] Erasing FE.KEYID = 1
11,657,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,969,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,985,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,001,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,017,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,037,147 UART: [ldev] --
14,041,279 UART: [fwproc] Wait for Commands...
14,042,895 UART: [fwproc] Recv command 0x46574c44
14,045,204 UART: [fwproc] Recv'd Img size: 111688 bytes
18,089,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,168,373 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,228,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,545,124 >>> mbox cmd response: success
18,549,907 UART: [afmc] ++
18,550,523 UART: [afmc] CDI.KEYID = 6
18,551,722 UART: [afmc] SUBJECT.KEYID = 7
18,552,835 UART: [afmc] AUTHORITY.KEYID = 5
21,910,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,209,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,211,975 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,228,109 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,244,398 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,260,081 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,282,586 UART: [afmc] --
26,343,868 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,509,742 UART: [cold-reset] --
26,510,677 UART: [state] Locking Datavault
26,511,803 UART: [state] Locking PCR0, PCR1 and PCR31
26,513,350 UART: [state] Locking ICCM
26,514,259 UART: [exit] Launching FMC @ 0x40000000
26,515,700 UART:
26,515,860 UART: Running Caliptra FMC ...
26,516,874 UART:
26,517,017 UART: [fmc] Received command: 0x46574C44
26,518,392 UART:
26,518,541 UART: Running Caliptra ROM ...
26,519,641 UART:
26,519,811 UART: [state] CFI Enabled
26,570,837 UART: [state] LifecycleState = Unprovisioned
26,572,718 UART: [state] DebugLocked = No
26,574,828 UART: [state] WD Timer not started. Device not locked for debugging
26,580,094 UART: [kat] SHA2-256
26,762,016 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,773,511 UART: [kat] ++
26,774,023 UART: [kat] sha1
26,784,807 UART: [kat] SHA2-256
26,787,817 UART: [kat] SHA2-384
26,792,770 UART: [kat] SHA2-512-ACC
26,795,393 UART: [kat] ECC-384
30,082,479 UART: [kat] HMAC-384Kdf
30,106,704 UART: [kat] LMS
31,179,832 UART: [kat] --
31,183,497 UART: [update-reset] ++
35,494,779 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,499,020 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
35,940,568 >>> mbox cmd response: success
35,940,956 UART: [update-reset] Copying MAN_2 To MAN_1
35,963,671 UART: [update-reset Success] --
35,970,928 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
36,128,928 UART: [state] Locking Datavault
36,130,180 UART: [state] Locking PCR0, PCR1 and PCR31
36,131,733 UART: [state] Locking ICCM
36,132,645 UART: [exit] Launching FMC @ 0x40000000
36,134,075 UART:
36,134,241 UART: Running Caliptra FMC ...
36,135,339 UART:
36,135,493 UART: [fmc] Received command: 0x1000000E
36,913,324 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
4,804,462 ready_for_fw is high
4,805,089 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,318,051 >>> mbox cmd response: success
26,056,631 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,222,391 UART:
26,222,810 UART: Running Caliptra FMC ...
26,223,972 UART:
26,224,140 UART: [fmc] Received command: 0x46574C44
35,560,732 >>> mbox cmd response: success
35,588,798 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
35,746,652 UART:
35,747,026 UART: Running Caliptra FMC ...
35,748,254 UART:
35,748,419 UART: [fmc] Received command: 0x1000000E
36,531,038 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,813 writing to cptra_bootfsm_go
194,061 UART:
194,431 UART: Running Caliptra ROM ...
195,514 UART:
605,108 UART: [state] CFI Enabled
620,816 UART: [state] LifecycleState = Unprovisioned
623,182 UART: [state] DebugLocked = No
625,421 UART: [state] WD Timer not started. Device not locked for debugging
629,310 UART: [kat] SHA2-256
811,292 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,787 UART: [kat] ++
823,302 UART: [kat] sha1
833,738 UART: [kat] SHA2-256
836,803 UART: [kat] SHA2-384
842,851 UART: [kat] SHA2-512-ACC
845,499 UART: [kat] ECC-384
4,100,260 UART: [kat] HMAC-384Kdf
4,111,786 UART: [kat] LMS
5,184,973 UART: [kat] --
5,187,806 UART: [cold-reset] ++
5,189,179 UART: [fht] FHT @ 0x50003400
5,199,864 UART: [idev] ++
5,200,493 UART: [idev] CDI.KEYID = 6
5,201,846 UART: [idev] SUBJECT.KEYID = 7
5,203,094 UART: [idev] UDS.KEYID = 0
5,204,430 ready_for_fw is high
5,204,636 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,344,813 UART: [idev] Erasing UDS.KEYID = 0
8,491,378 UART: [idev] Sha1 KeyId Algorithm
8,513,862 UART: [idev] --
8,518,768 UART: [ldev] ++
8,519,325 UART: [ldev] CDI.KEYID = 6
8,520,474 UART: [ldev] SUBJECT.KEYID = 5
8,521,997 UART: [ldev] AUTHORITY.KEYID = 7
8,523,517 UART: [ldev] FE.KEYID = 1
8,535,122 UART: [ldev] Erasing FE.KEYID = 1
11,824,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,543 UART: [ldev] --
14,189,345 UART: [fwproc] Wait for Commands...
14,191,214 UART: [fwproc] Recv command 0x46574c44
14,193,517 UART: [fwproc] Recv'd Img size: 111688 bytes
18,238,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,319,733 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,379,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,696,847 >>> mbox cmd response: success
18,700,663 UART: [afmc] ++
18,701,272 UART: [afmc] CDI.KEYID = 6
18,702,377 UART: [afmc] SUBJECT.KEYID = 7
18,703,590 UART: [afmc] AUTHORITY.KEYID = 5
22,021,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,317,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,320,301 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,336,483 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,352,594 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,368,410 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,389,952 UART: [afmc] --
26,457,200 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,622,953 UART: [cold-reset] --
26,623,903 UART: [state] Locking Datavault
26,625,070 UART: [state] Locking PCR0, PCR1 and PCR31
26,626,613 UART: [state] Locking ICCM
26,627,548 UART: [exit] Launching FMC @ 0x40000000
26,628,972 UART:
26,629,126 UART: Running Caliptra FMC ...
26,630,221 UART:
26,630,367 UART: [fmc] Received command: 0x46574C44
26,631,815 UART:
26,631,958 UART: Running Caliptra ROM ...
26,633,044 UART:
26,633,190 UART: [state] CFI Enabled
26,637,342 UART: [state] LifecycleState = Unprovisioned
26,639,169 UART: [state] DebugLocked = No
26,641,800 UART: [state] WD Timer not started. Device not locked for debugging
26,646,785 UART: [kat] SHA2-256
26,828,731 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,840,296 UART: [kat] ++
26,840,799 UART: [kat] sha1
26,851,806 UART: [kat] SHA2-256
26,854,875 UART: [kat] SHA2-384
26,861,116 UART: [kat] SHA2-512-ACC
26,863,725 UART: [kat] ECC-384
30,117,193 UART: [kat] HMAC-384Kdf
30,128,999 UART: [kat] LMS
31,202,149 UART: [kat] --
31,208,193 UART: [update-reset] ++
35,513,523 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,516,474 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
35,958,006 >>> mbox cmd response: success
35,960,038 UART: [update-reset] Copying MAN_2 To MAN_1
35,982,914 UART: [update-reset Success] --
35,990,242 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
36,147,633 UART: [state] Locking Datavault
36,148,897 UART: [state] Locking PCR0, PCR1 and PCR31
36,150,364 UART: [state] Locking ICCM
36,151,232 UART: [exit] Launching FMC @ 0x40000000
36,152,655 UART:
36,152,813 UART: Running Caliptra FMC ...
36,153,905 UART:
36,154,051 UART: [fmc] Received command: 0x1000000E
36,932,023 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
5,104,332 ready_for_fw is high
5,104,765 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,508,507 >>> mbox cmd response: success
26,188,200 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,353,997 UART:
26,354,424 UART: Running Caliptra FMC ...
26,355,598 UART:
26,355,765 UART: [fmc] Received command: 0x46574C44
35,586,259 >>> mbox cmd response: success
35,613,918 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
35,771,323 UART:
35,771,657 UART: Running Caliptra FMC ...
35,772,867 UART:
35,773,039 UART: [fmc] Received command: 0x1000000E
36,555,728 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,380 UART:
192,742 UART: Running Caliptra ROM ...
193,915 UART:
194,070 UART: [state] CFI Enabled
263,520 UART: [state] LifecycleState = Unprovisioned
265,386 UART: [state] DebugLocked = No
267,849 UART: [state] WD Timer not started. Device not locked for debugging
271,250 UART: [kat] SHA2-256
450,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,952 UART: [kat] ++
462,494 UART: [kat] sha1
473,941 UART: [kat] SHA2-256
477,023 UART: [kat] SHA2-384
483,093 UART: [kat] SHA2-512-ACC
486,104 UART: [kat] ECC-384
2,947,088 UART: [kat] HMAC-384Kdf
2,969,283 UART: [kat] LMS
3,498,745 UART: [kat] --
3,503,448 UART: [cold-reset] ++
3,505,873 UART: [fht] FHT @ 0x50003400
3,516,726 UART: [idev] ++
3,517,297 UART: [idev] CDI.KEYID = 6
3,518,216 UART: [idev] SUBJECT.KEYID = 7
3,519,393 UART: [idev] UDS.KEYID = 0
3,520,319 ready_for_fw is high
3,520,504 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,661,401 UART: [idev] Erasing UDS.KEYID = 0
6,025,896 UART: [idev] Sha1 KeyId Algorithm
6,048,845 UART: [idev] --
6,052,946 UART: [ldev] ++
6,053,522 UART: [ldev] CDI.KEYID = 6
6,054,614 UART: [ldev] SUBJECT.KEYID = 5
6,055,739 UART: [ldev] AUTHORITY.KEYID = 7
6,056,922 UART: [ldev] FE.KEYID = 1
6,098,469 UART: [ldev] Erasing FE.KEYID = 1
8,606,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,404 UART: [ldev] --
10,412,505 UART: [fwproc] Wait for Commands...
10,414,764 UART: [fwproc] Recv command 0x46574c44
10,416,804 UART: [fwproc] Recv'd Img size: 112032 bytes
13,793,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,863,958 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,924,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,243,120 >>> mbox cmd response: success
14,247,186 UART: [afmc] ++
14,247,808 UART: [afmc] CDI.KEYID = 6
14,248,721 UART: [afmc] SUBJECT.KEYID = 7
14,249,885 UART: [afmc] AUTHORITY.KEYID = 5
16,782,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,506,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,321 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,524,376 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,540,451 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,556,135 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,578,823 UART: [afmc] --
20,642,014 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,807,679 UART: [cold-reset] --
20,808,629 UART: [state] Locking Datavault
20,809,828 UART: [state] Locking PCR0, PCR1 and PCR31
20,811,378 UART: [state] Locking ICCM
20,812,259 UART: [exit] Launching FMC @ 0x40000000
20,813,689 UART:
20,813,846 UART: Running Caliptra FMC ...
20,814,955 UART:
20,815,107 UART: [fmc] Received command: 0x46574C44
20,816,485 UART:
20,816,628 UART: Running Caliptra ROM ...
20,817,637 UART:
20,817,781 UART: [state] CFI Enabled
20,882,400 UART: [state] LifecycleState = Unprovisioned
20,884,278 UART: [state] DebugLocked = No
20,885,693 UART: [state] WD Timer not started. Device not locked for debugging
20,889,868 UART: [kat] SHA2-256
21,069,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,080,556 UART: [kat] ++
21,081,108 UART: [kat] sha1
21,093,298 UART: [kat] SHA2-256
21,096,335 UART: [kat] SHA2-384
21,102,134 UART: [kat] SHA2-512-ACC
21,105,074 UART: [kat] ECC-384
23,569,532 UART: [kat] HMAC-384Kdf
23,590,881 UART: [kat] LMS
24,120,352 UART: [kat] --
24,125,917 UART: [update-reset] ++
27,753,321 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,756,591 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,198,138 >>> mbox cmd response: success
28,199,723 UART: [update-reset] Copying MAN_2 To MAN_1
28,222,050 UART: [update-reset Success] --
28,228,931 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,386,277 UART: [state] Locking Datavault
28,387,499 UART: [state] Locking PCR0, PCR1 and PCR31
28,389,052 UART: [state] Locking ICCM
28,389,981 UART: [exit] Launching FMC @ 0x40000000
28,391,410 UART:
28,391,569 UART: Running Caliptra FMC ...
28,392,670 UART:
28,392,822 UART: [fmc] Received command: 0x1000000E
29,170,702 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,383,593 ready_for_fw is high
3,384,009 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,016,043 >>> mbox cmd response: success
20,351,141 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,516,912 UART:
20,517,371 UART: Running Caliptra FMC ...
20,518,535 UART:
20,518,701 UART: [fmc] Received command: 0x46574C44
27,756,420 >>> mbox cmd response: success
27,783,212 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
27,940,621 UART:
27,940,949 UART: Running Caliptra FMC ...
27,942,158 UART:
27,942,328 UART: [fmc] Received command: 0x1000000E
28,725,062 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,430 UART:
192,810 UART: Running Caliptra ROM ...
193,942 UART:
603,390 UART: [state] CFI Enabled
615,136 UART: [state] LifecycleState = Unprovisioned
617,023 UART: [state] DebugLocked = No
619,763 UART: [state] WD Timer not started. Device not locked for debugging
622,874 UART: [kat] SHA2-256
801,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,542 UART: [kat] ++
814,070 UART: [kat] sha1
824,317 UART: [kat] SHA2-256
827,394 UART: [kat] SHA2-384
833,139 UART: [kat] SHA2-512-ACC
836,078 UART: [kat] ECC-384
3,277,590 UART: [kat] HMAC-384Kdf
3,290,528 UART: [kat] LMS
3,820,029 UART: [kat] --
3,825,814 UART: [cold-reset] ++
3,826,890 UART: [fht] FHT @ 0x50003400
3,837,933 UART: [idev] ++
3,838,501 UART: [idev] CDI.KEYID = 6
3,839,413 UART: [idev] SUBJECT.KEYID = 7
3,840,582 UART: [idev] UDS.KEYID = 0
3,841,594 ready_for_fw is high
3,841,791 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,982,514 UART: [idev] Erasing UDS.KEYID = 0
6,315,464 UART: [idev] Sha1 KeyId Algorithm
6,338,368 UART: [idev] --
6,342,303 UART: [ldev] ++
6,342,873 UART: [ldev] CDI.KEYID = 6
6,343,780 UART: [ldev] SUBJECT.KEYID = 5
6,344,991 UART: [ldev] AUTHORITY.KEYID = 7
6,346,216 UART: [ldev] FE.KEYID = 1
6,359,348 UART: [ldev] Erasing FE.KEYID = 1
8,832,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,844 UART: [ldev] --
10,625,889 UART: [fwproc] Wait for Commands...
10,629,001 UART: [fwproc] Recv command 0x46574c44
10,631,091 UART: [fwproc] Recv'd Img size: 112032 bytes
14,004,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,079,012 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,139,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,456,780 >>> mbox cmd response: success
14,461,001 UART: [afmc] ++
14,461,619 UART: [afmc] CDI.KEYID = 6
14,462,525 UART: [afmc] SUBJECT.KEYID = 7
14,463,682 UART: [afmc] AUTHORITY.KEYID = 5
16,966,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,687,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,689,606 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,705,653 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,721,730 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,737,363 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,760,388 UART: [afmc] --
20,823,794 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,990,258 UART: [cold-reset] --
20,991,219 UART: [state] Locking Datavault
20,992,330 UART: [state] Locking PCR0, PCR1 and PCR31
20,993,872 UART: [state] Locking ICCM
20,994,776 UART: [exit] Launching FMC @ 0x40000000
20,996,196 UART:
20,996,355 UART: Running Caliptra FMC ...
20,997,452 UART:
20,997,608 UART: [fmc] Received command: 0x46574C44
20,999,061 UART:
20,999,214 UART: Running Caliptra ROM ...
21,000,307 UART:
21,000,463 UART: [state] CFI Enabled
21,005,544 UART: [state] LifecycleState = Unprovisioned
21,007,370 UART: [state] DebugLocked = No
21,009,019 UART: [state] WD Timer not started. Device not locked for debugging
21,012,291 UART: [kat] SHA2-256
21,191,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,202,999 UART: [kat] ++
21,203,457 UART: [kat] sha1
21,214,017 UART: [kat] SHA2-256
21,217,025 UART: [kat] SHA2-384
21,223,226 UART: [kat] SHA2-512-ACC
21,226,159 UART: [kat] ECC-384
23,666,256 UART: [kat] HMAC-384Kdf
23,678,277 UART: [kat] LMS
24,207,777 UART: [kat] --
24,211,980 UART: [update-reset] ++
27,847,863 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,850,428 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,291,991 >>> mbox cmd response: success
28,292,971 UART: [update-reset] Copying MAN_2 To MAN_1
28,315,268 UART: [update-reset Success] --
28,322,159 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,479,522 UART: [state] Locking Datavault
28,480,748 UART: [state] Locking PCR0, PCR1 and PCR31
28,482,298 UART: [state] Locking ICCM
28,483,211 UART: [exit] Launching FMC @ 0x40000000
28,484,632 UART:
28,484,787 UART: Running Caliptra FMC ...
28,485,884 UART:
28,486,037 UART: [fmc] Received command: 0x1000000E
29,263,936 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
3,698,694 ready_for_fw is high
3,699,257 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,246,719 >>> mbox cmd response: success
20,538,451 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,704,557 UART:
20,705,008 UART: Running Caliptra FMC ...
20,706,100 UART:
20,706,253 UART: [fmc] Received command: 0x46574C44
27,875,028 >>> mbox cmd response: success
27,901,796 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,059,224 UART:
28,059,572 UART: Running Caliptra FMC ...
28,060,698 UART:
28,060,849 UART: [fmc] Received command: 0x1000000E
28,843,639 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,380,771 ready_for_fw is high
3,381,215 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,031,519 >>> mbox cmd response: success
20,370,719 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,536,496 UART:
20,536,939 UART: Running Caliptra FMC ...
20,538,022 UART:
20,538,180 UART: [fmc] Received command: 0x46574C44
27,770,676 >>> mbox cmd response: success
27,797,670 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
27,955,112 UART:
27,955,448 UART: Running Caliptra FMC ...
27,956,549 UART:
27,956,700 UART: [fmc] Received command: 0x1000000E
28,739,520 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,695,935 ready_for_fw is high
3,696,661 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,235,644 >>> mbox cmd response: success
20,527,644 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,693,321 UART:
20,693,784 UART: Running Caliptra FMC ...
20,694,872 UART:
20,695,033 UART: [fmc] Received command: 0x46574C44
27,855,241 >>> mbox cmd response: success
27,883,178 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,040,542 UART:
28,040,868 UART: Running Caliptra FMC ...
28,042,095 UART:
28,042,269 UART: [fmc] Received command: 0x1000000E
28,824,934 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,841 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [kat] SHA2-256
891,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,763 UART: [kat] ++
895,915 UART: [kat] sha1
900,025 UART: [kat] SHA2-256
901,965 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,672 UART: [kat] LMS
1,168,984 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,173,077 UART: [idev] ++
1,173,245 UART: [idev] CDI.KEYID = 6
1,173,606 UART: [idev] SUBJECT.KEYID = 7
1,174,031 UART: [idev] UDS.KEYID = 0
1,174,377 ready_for_fw is high
1,174,377 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,198,683 UART: [idev] Sha1 KeyId Algorithm
1,207,453 UART: [idev] --
1,208,698 UART: [ldev] ++
1,208,866 UART: [ldev] CDI.KEYID = 6
1,209,230 UART: [ldev] SUBJECT.KEYID = 5
1,209,657 UART: [ldev] AUTHORITY.KEYID = 7
1,210,120 UART: [ldev] FE.KEYID = 1
1,215,242 UART: [ldev] Erasing FE.KEYID = 1
1,240,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,718 UART: [ldev] --
1,280,158 UART: [fwproc] Wait for Commands...
1,280,871 UART: [fwproc] Recv command 0x46574c44
1,281,604 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,415 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,100 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,180 >>> mbox cmd response: success
2,743,321 UART: [afmc] ++
2,743,489 UART: [afmc] CDI.KEYID = 6
2,743,852 UART: [afmc] SUBJECT.KEYID = 7
2,744,278 UART: [afmc] AUTHORITY.KEYID = 5
2,779,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,808 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,504 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,403 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,096 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,904 UART: [afmc] --
2,822,972 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,822,994 UART: [cold-reset] --
2,823,842 UART: [state] Locking Datavault
2,824,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,491 UART: [state] Locking ICCM
2,826,009 UART: [exit] Launching FMC @ 0x40000000
2,831,306 UART:
2,831,322 UART: Running Caliptra FMC ...
2,831,730 UART:
2,831,960 UART: [fmc] Received command: 0x46574C44
2,832,786 UART:
2,832,802 UART: Running Caliptra ROM ...
2,833,210 UART:
2,833,265 UART: [state] CFI Enabled
2,835,065 UART: [state] LifecycleState = Unprovisioned
2,835,720 UART: [state] DebugLocked = No
2,836,232 UART: [state] WD Timer not started. Device not locked for debugging
2,837,548 UART: [kat] SHA2-256
3,641,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,227 UART: [kat] ++
3,645,379 UART: [kat] sha1
3,649,827 UART: [kat] SHA2-256
3,651,767 UART: [kat] SHA2-384
3,654,536 UART: [kat] SHA2-512-ACC
3,656,436 UART: [kat] ECC-384
3,666,019 UART: [kat] HMAC-384Kdf
3,670,449 UART: [kat] LMS
3,918,761 UART: [kat] --
3,919,783 UART: [update-reset] ++
5,423,582 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,591 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,601,365 >>> mbox cmd response: success
5,601,522 UART: [update-reset] Copying MAN_2 To MAN_1
5,609,536 UART: [update-reset Success] --
5,609,945 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,610,519 UART: [state] Locking Datavault
5,611,303 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,907 UART: [state] Locking ICCM
5,612,383 UART: [exit] Launching FMC @ 0x40000000
5,617,680 UART:
5,617,696 UART: Running Caliptra FMC ...
5,618,104 UART:
5,618,326 UART: [fmc] Received command: 0x1000000E
5,963,380 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,460 ready_for_fw is high
1,055,460 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,590,006 >>> mbox cmd response: success
2,645,143 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,651,216 UART:
2,651,232 UART: Running Caliptra FMC ...
2,651,640 UART:
2,651,870 UART: [fmc] Received command: 0x46574C44
5,304,030 >>> mbox cmd response: success
5,311,532 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,317,018 UART:
5,317,034 UART: Running Caliptra FMC ...
5,317,442 UART:
5,317,664 UART: [fmc] Received command: 0x1000000E
5,662,718 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,805 UART: [state] LifecycleState = Unprovisioned
85,460 UART: [state] DebugLocked = No
86,022 UART: [state] WD Timer not started. Device not locked for debugging
87,189 UART: [kat] SHA2-256
890,739 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,868 UART: [kat] ++
895,020 UART: [kat] sha1
899,276 UART: [kat] SHA2-256
901,216 UART: [kat] SHA2-384
903,865 UART: [kat] SHA2-512-ACC
905,766 UART: [kat] ECC-384
915,521 UART: [kat] HMAC-384Kdf
920,081 UART: [kat] LMS
1,168,393 UART: [kat] --
1,169,334 UART: [cold-reset] ++
1,169,884 UART: [fht] FHT @ 0x50003400
1,172,566 UART: [idev] ++
1,172,734 UART: [idev] CDI.KEYID = 6
1,173,095 UART: [idev] SUBJECT.KEYID = 7
1,173,520 UART: [idev] UDS.KEYID = 0
1,173,866 ready_for_fw is high
1,173,866 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,598 UART: [idev] Erasing UDS.KEYID = 0
1,198,562 UART: [idev] Sha1 KeyId Algorithm
1,207,326 UART: [idev] --
1,208,601 UART: [ldev] ++
1,208,769 UART: [ldev] CDI.KEYID = 6
1,209,133 UART: [ldev] SUBJECT.KEYID = 5
1,209,560 UART: [ldev] AUTHORITY.KEYID = 7
1,210,023 UART: [ldev] FE.KEYID = 1
1,215,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,209 UART: [ldev] --
1,281,631 UART: [fwproc] Wait for Commands...
1,282,296 UART: [fwproc] Recv command 0x46574c44
1,283,029 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,130 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,891 >>> mbox cmd response: success
2,745,012 UART: [afmc] ++
2,745,180 UART: [afmc] CDI.KEYID = 6
2,745,543 UART: [afmc] SUBJECT.KEYID = 7
2,745,969 UART: [afmc] AUTHORITY.KEYID = 5
2,781,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,713 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,409 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,308 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,816,001 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,949 UART: [afmc] --
2,824,877 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,824,899 UART: [cold-reset] --
2,825,707 UART: [state] Locking Datavault
2,827,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,824 UART: [state] Locking ICCM
2,828,332 UART: [exit] Launching FMC @ 0x40000000
2,833,629 UART:
2,833,645 UART: Running Caliptra FMC ...
2,834,053 UART:
2,834,283 UART: [fmc] Received command: 0x46574C44
2,835,109 UART:
2,835,125 UART: Running Caliptra ROM ...
2,835,533 UART:
2,835,675 UART: [state] CFI Enabled
2,838,257 UART: [state] LifecycleState = Unprovisioned
2,838,912 UART: [state] DebugLocked = No
2,839,416 UART: [state] WD Timer not started. Device not locked for debugging
2,840,712 UART: [kat] SHA2-256
3,644,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,391 UART: [kat] ++
3,648,543 UART: [kat] sha1
3,652,715 UART: [kat] SHA2-256
3,654,655 UART: [kat] SHA2-384
3,657,342 UART: [kat] SHA2-512-ACC
3,659,242 UART: [kat] ECC-384
3,668,809 UART: [kat] HMAC-384Kdf
3,673,539 UART: [kat] LMS
3,921,851 UART: [kat] --
3,922,491 UART: [update-reset] ++
5,426,188 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,427,321 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,604,095 >>> mbox cmd response: success
5,604,374 UART: [update-reset] Copying MAN_2 To MAN_1
5,612,388 UART: [update-reset Success] --
5,612,797 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,613,651 UART: [state] Locking Datavault
5,614,517 UART: [state] Locking PCR0, PCR1 and PCR31
5,615,121 UART: [state] Locking ICCM
5,615,603 UART: [exit] Launching FMC @ 0x40000000
5,620,900 UART:
5,620,916 UART: Running Caliptra FMC ...
5,621,324 UART:
5,621,546 UART: [fmc] Received command: 0x1000000E
5,966,600 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,541 ready_for_fw is high
1,056,541 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,957 >>> mbox cmd response: success
2,648,148 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,653,995 UART:
2,654,011 UART: Running Caliptra FMC ...
2,654,419 UART:
2,654,649 UART: [fmc] Received command: 0x46574C44
5,307,860 >>> mbox cmd response: success
5,315,440 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,321,268 UART:
5,321,284 UART: Running Caliptra FMC ...
5,321,692 UART:
5,321,914 UART: [fmc] Received command: 0x1000000E
5,666,968 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,734 UART: [state] LifecycleState = Unprovisioned
85,389 UART: [state] DebugLocked = No
85,981 UART: [state] WD Timer not started. Device not locked for debugging
87,092 UART: [kat] SHA2-256
890,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,771 UART: [kat] ++
894,923 UART: [kat] sha1
899,187 UART: [kat] SHA2-256
901,127 UART: [kat] SHA2-384
903,818 UART: [kat] SHA2-512-ACC
905,719 UART: [kat] ECC-384
915,356 UART: [kat] HMAC-384Kdf
920,030 UART: [kat] LMS
1,168,342 UART: [kat] --
1,169,307 UART: [cold-reset] ++
1,169,817 UART: [fht] FHT @ 0x50003400
1,172,469 UART: [idev] ++
1,172,637 UART: [idev] CDI.KEYID = 6
1,172,998 UART: [idev] SUBJECT.KEYID = 7
1,173,423 UART: [idev] UDS.KEYID = 0
1,173,769 ready_for_fw is high
1,173,769 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,025 UART: [idev] Erasing UDS.KEYID = 0
1,197,763 UART: [idev] Sha1 KeyId Algorithm
1,206,609 UART: [idev] --
1,207,644 UART: [ldev] ++
1,207,812 UART: [ldev] CDI.KEYID = 6
1,208,176 UART: [ldev] SUBJECT.KEYID = 5
1,208,603 UART: [ldev] AUTHORITY.KEYID = 7
1,209,066 UART: [ldev] FE.KEYID = 1
1,213,970 UART: [ldev] Erasing FE.KEYID = 1
1,239,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,028 UART: [ldev] --
1,279,470 UART: [fwproc] Wait for Commands...
1,280,285 UART: [fwproc] Recv command 0x46574c44
1,281,018 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,741 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,516 >>> mbox cmd response: success
2,742,645 UART: [afmc] ++
2,742,813 UART: [afmc] CDI.KEYID = 6
2,743,176 UART: [afmc] SUBJECT.KEYID = 7
2,743,602 UART: [afmc] AUTHORITY.KEYID = 5
2,779,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,352 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,048 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,947 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,640 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,702 UART: [afmc] --
2,822,704 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,822,726 UART: [cold-reset] --
2,823,536 UART: [state] Locking Datavault
2,824,807 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,411 UART: [state] Locking ICCM
2,826,045 UART: [exit] Launching FMC @ 0x40000000
2,831,342 UART:
2,831,358 UART: Running Caliptra FMC ...
2,831,766 UART:
2,831,996 UART: [fmc] Received command: 0x46574C44
2,832,822 UART:
2,832,838 UART: Running Caliptra ROM ...
2,833,246 UART:
2,833,301 UART: [state] CFI Enabled
2,835,731 UART: [state] LifecycleState = Unprovisioned
2,836,386 UART: [state] DebugLocked = No
2,836,968 UART: [state] WD Timer not started. Device not locked for debugging
2,838,164 UART: [kat] SHA2-256
3,641,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,843 UART: [kat] ++
3,645,995 UART: [kat] sha1
3,650,171 UART: [kat] SHA2-256
3,652,111 UART: [kat] SHA2-384
3,654,630 UART: [kat] SHA2-512-ACC
3,656,530 UART: [kat] ECC-384
3,666,099 UART: [kat] HMAC-384Kdf
3,670,565 UART: [kat] LMS
3,918,877 UART: [kat] --
3,919,497 UART: [update-reset] ++
5,423,818 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,981 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,601,755 >>> mbox cmd response: success
5,601,914 UART: [update-reset] Copying MAN_2 To MAN_1
5,609,928 UART: [update-reset Success] --
5,610,337 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,611,047 UART: [state] Locking Datavault
5,611,843 UART: [state] Locking PCR0, PCR1 and PCR31
5,612,447 UART: [state] Locking ICCM
5,613,101 UART: [exit] Launching FMC @ 0x40000000
5,618,398 UART:
5,618,414 UART: Running Caliptra FMC ...
5,618,822 UART:
5,619,044 UART: [fmc] Received command: 0x1000000E
5,964,098 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,736 ready_for_fw is high
1,055,736 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,284 >>> mbox cmd response: success
2,648,579 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,654,566 UART:
2,654,582 UART: Running Caliptra FMC ...
2,654,990 UART:
2,655,220 UART: [fmc] Received command: 0x46574C44
5,307,126 >>> mbox cmd response: success
5,314,714 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,320,616 UART:
5,320,632 UART: Running Caliptra FMC ...
5,321,040 UART:
5,321,262 UART: [fmc] Received command: 0x1000000E
5,666,316 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
915,757 UART: [kat] HMAC-384Kdf
920,199 UART: [kat] LMS
1,168,511 UART: [kat] --
1,169,104 UART: [cold-reset] ++
1,169,464 UART: [fht] FHT @ 0x50003400
1,171,984 UART: [idev] ++
1,172,152 UART: [idev] CDI.KEYID = 6
1,172,513 UART: [idev] SUBJECT.KEYID = 7
1,172,938 UART: [idev] UDS.KEYID = 0
1,173,284 ready_for_fw is high
1,173,284 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,180,788 UART: [idev] Erasing UDS.KEYID = 0
1,197,854 UART: [idev] Sha1 KeyId Algorithm
1,206,666 UART: [idev] --
1,207,713 UART: [ldev] ++
1,207,881 UART: [ldev] CDI.KEYID = 6
1,208,245 UART: [ldev] SUBJECT.KEYID = 5
1,208,672 UART: [ldev] AUTHORITY.KEYID = 7
1,209,135 UART: [ldev] FE.KEYID = 1
1,214,245 UART: [ldev] Erasing FE.KEYID = 1
1,240,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,017 UART: [ldev] --
1,280,479 UART: [fwproc] Wait for Commands...
1,281,192 UART: [fwproc] Recv command 0x46574c44
1,281,925 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,816 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,501 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,387 >>> mbox cmd response: success
2,742,480 UART: [afmc] ++
2,742,648 UART: [afmc] CDI.KEYID = 6
2,743,011 UART: [afmc] SUBJECT.KEYID = 7
2,743,437 UART: [afmc] AUTHORITY.KEYID = 5
2,778,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,443 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,139 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,038 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,731 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,565 UART: [afmc] --
2,822,521 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,822,543 UART: [cold-reset] --
2,823,531 UART: [state] Locking Datavault
2,824,734 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,338 UART: [state] Locking ICCM
2,825,828 UART: [exit] Launching FMC @ 0x40000000
2,831,125 UART:
2,831,141 UART: Running Caliptra FMC ...
2,831,549 UART:
2,831,779 UART: [fmc] Received command: 0x46574C44
2,832,605 UART:
2,832,621 UART: Running Caliptra ROM ...
2,833,029 UART:
2,833,171 UART: [state] CFI Enabled
2,835,679 UART: [state] LifecycleState = Unprovisioned
2,836,334 UART: [state] DebugLocked = No
2,836,916 UART: [state] WD Timer not started. Device not locked for debugging
2,838,094 UART: [kat] SHA2-256
3,641,644 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,773 UART: [kat] ++
3,645,925 UART: [kat] sha1
3,650,105 UART: [kat] SHA2-256
3,652,045 UART: [kat] SHA2-384
3,654,668 UART: [kat] SHA2-512-ACC
3,656,568 UART: [kat] ECC-384
3,666,221 UART: [kat] HMAC-384Kdf
3,670,865 UART: [kat] LMS
3,919,177 UART: [kat] --
3,920,053 UART: [update-reset] ++
5,422,932 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,029 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,803 >>> mbox cmd response: success
5,600,984 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,998 UART: [update-reset Success] --
5,609,407 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,937 UART: [state] Locking Datavault
5,610,587 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,191 UART: [state] Locking ICCM
5,611,817 UART: [exit] Launching FMC @ 0x40000000
5,617,114 UART:
5,617,130 UART: Running Caliptra FMC ...
5,617,538 UART:
5,617,760 UART: [fmc] Received command: 0x1000000E
5,962,814 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,099 ready_for_fw is high
1,056,099 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,835 >>> mbox cmd response: success
2,647,868 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,653,813 UART:
2,653,829 UART: Running Caliptra FMC ...
2,654,237 UART:
2,654,467 UART: [fmc] Received command: 0x46574C44
5,307,268 >>> mbox cmd response: success
5,314,778 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,320,728 UART:
5,320,744 UART: Running Caliptra FMC ...
5,321,152 UART:
5,321,374 UART: [fmc] Received command: 0x1000000E
5,666,428 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,719 UART: [idev] ++
1,172,887 UART: [idev] CDI.KEYID = 6
1,173,248 UART: [idev] SUBJECT.KEYID = 7
1,173,673 UART: [idev] UDS.KEYID = 0
1,174,019 ready_for_fw is high
1,174,019 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,861 UART: [idev] Erasing UDS.KEYID = 0
1,198,437 UART: [idev] Sha1 KeyId Algorithm
1,207,175 UART: [idev] --
1,208,110 UART: [ldev] ++
1,208,278 UART: [ldev] CDI.KEYID = 6
1,208,642 UART: [ldev] SUBJECT.KEYID = 5
1,209,069 UART: [ldev] AUTHORITY.KEYID = 7
1,209,532 UART: [ldev] FE.KEYID = 1
1,214,522 UART: [ldev] Erasing FE.KEYID = 1
1,240,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,734 UART: [ldev] --
1,280,034 UART: [fwproc] Wait for Commands...
1,280,791 UART: [fwproc] Recv command 0x46574c44
1,281,524 UART: [fwproc] Recv'd Img size: 112032 bytes
2,551,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,867 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,564 >>> mbox cmd response: success
2,742,585 UART: [afmc] ++
2,742,753 UART: [afmc] CDI.KEYID = 6
2,743,116 UART: [afmc] SUBJECT.KEYID = 7
2,743,542 UART: [afmc] AUTHORITY.KEYID = 5
2,779,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,232 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,928 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,827 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,520 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,368 UART: [afmc] --
2,822,318 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,822,340 UART: [cold-reset] --
2,823,428 UART: [state] Locking Datavault
2,824,763 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,367 UART: [state] Locking ICCM
2,825,849 UART: [exit] Launching FMC @ 0x40000000
2,831,146 UART:
2,831,162 UART: Running Caliptra FMC ...
2,831,570 UART:
2,831,800 UART: [fmc] Received command: 0x46574C44
2,832,626 UART:
2,832,642 UART: Running Caliptra ROM ...
2,833,050 UART:
2,833,105 UART: [state] CFI Enabled
2,835,519 UART: [state] LifecycleState = Unprovisioned
2,836,174 UART: [state] DebugLocked = No
2,836,786 UART: [state] WD Timer not started. Device not locked for debugging
2,838,124 UART: [kat] SHA2-256
3,641,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,803 UART: [kat] ++
3,645,955 UART: [kat] sha1
3,650,197 UART: [kat] SHA2-256
3,652,137 UART: [kat] SHA2-384
3,654,900 UART: [kat] SHA2-512-ACC
3,656,800 UART: [kat] ECC-384
3,666,409 UART: [kat] HMAC-384Kdf
3,670,769 UART: [kat] LMS
3,919,081 UART: [kat] --
3,920,079 UART: [update-reset] ++
5,422,750 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,845 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,619 >>> mbox cmd response: success
5,600,768 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,782 UART: [update-reset Success] --
5,609,191 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,855 UART: [state] Locking Datavault
5,610,485 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,089 UART: [state] Locking ICCM
5,611,617 UART: [exit] Launching FMC @ 0x40000000
5,616,914 UART:
5,616,930 UART: Running Caliptra FMC ...
5,617,338 UART:
5,617,560 UART: [fmc] Received command: 0x1000000E
5,962,614 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,986 ready_for_fw is high
1,055,986 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,044 >>> mbox cmd response: success
2,647,721 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,653,684 UART:
2,653,700 UART: Running Caliptra FMC ...
2,654,108 UART:
2,654,338 UART: [fmc] Received command: 0x46574C44
5,305,628 >>> mbox cmd response: success
5,313,224 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,318,786 UART:
5,318,802 UART: Running Caliptra FMC ...
5,319,210 UART:
5,319,432 UART: [fmc] Received command: 0x1000000E
5,664,486 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,774 UART: [kat] SHA2-256
901,714 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
916,413 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,126 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,054 UART: [idev] ++
1,173,222 UART: [idev] CDI.KEYID = 6
1,173,583 UART: [idev] SUBJECT.KEYID = 7
1,174,008 UART: [idev] UDS.KEYID = 0
1,174,354 ready_for_fw is high
1,174,354 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,260 UART: [idev] Sha1 KeyId Algorithm
1,208,202 UART: [idev] --
1,209,331 UART: [ldev] ++
1,209,499 UART: [ldev] CDI.KEYID = 6
1,209,863 UART: [ldev] SUBJECT.KEYID = 5
1,210,290 UART: [ldev] AUTHORITY.KEYID = 7
1,210,753 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,241,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,971 UART: [ldev] --
1,281,277 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,328 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,091 >>> mbox cmd response: success
2,743,112 UART: [afmc] ++
2,743,280 UART: [afmc] CDI.KEYID = 6
2,743,643 UART: [afmc] SUBJECT.KEYID = 7
2,744,069 UART: [afmc] AUTHORITY.KEYID = 5
2,779,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,665 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,361 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,260 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,953 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,829 UART: [afmc] --
2,822,849 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,822,871 UART: [cold-reset] --
2,823,563 UART: [state] Locking Datavault
2,824,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,256 UART: [state] Locking ICCM
2,825,924 UART: [exit] Launching FMC @ 0x40000000
2,831,221 UART:
2,831,237 UART: Running Caliptra FMC ...
2,831,645 UART:
2,831,875 UART: [fmc] Received command: 0x46574C44
2,832,701 UART:
2,832,717 UART: Running Caliptra ROM ...
2,833,125 UART:
2,833,267 UART: [state] CFI Enabled
2,835,919 UART: [state] LifecycleState = Unprovisioned
2,836,574 UART: [state] DebugLocked = No
2,837,260 UART: [state] WD Timer not started. Device not locked for debugging
2,838,430 UART: [kat] SHA2-256
3,641,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,109 UART: [kat] ++
3,646,261 UART: [kat] sha1
3,650,517 UART: [kat] SHA2-256
3,652,457 UART: [kat] SHA2-384
3,655,226 UART: [kat] SHA2-512-ACC
3,657,126 UART: [kat] ECC-384
3,666,979 UART: [kat] HMAC-384Kdf
3,671,517 UART: [kat] LMS
3,919,829 UART: [kat] --
3,920,629 UART: [update-reset] ++
5,423,794 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,799 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,601,573 >>> mbox cmd response: success
5,601,720 UART: [update-reset] Copying MAN_2 To MAN_1
5,609,734 UART: [update-reset Success] --
5,610,143 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,610,769 UART: [state] Locking Datavault
5,611,485 UART: [state] Locking PCR0, PCR1 and PCR31
5,612,089 UART: [state] Locking ICCM
5,612,577 UART: [exit] Launching FMC @ 0x40000000
5,617,874 UART:
5,617,890 UART: Running Caliptra FMC ...
5,618,298 UART:
5,618,520 UART: [fmc] Received command: 0x1000000E
5,963,574 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,505 ready_for_fw is high
1,056,505 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,265 >>> mbox cmd response: success
2,648,942 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,655,025 UART:
2,655,041 UART: Running Caliptra FMC ...
2,655,449 UART:
2,655,679 UART: [fmc] Received command: 0x46574C44
5,306,400 >>> mbox cmd response: success
5,313,930 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,319,706 UART:
5,319,722 UART: Running Caliptra FMC ...
5,320,130 UART:
5,320,352 UART: [fmc] Received command: 0x1000000E
5,665,406 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,244 UART:
192,602 UART: Running Caliptra ROM ...
193,801 UART:
193,950 UART: [state] CFI Enabled
263,453 UART: [state] LifecycleState = Unprovisioned
265,796 UART: [state] DebugLocked = No
268,173 UART: [state] WD Timer not started. Device not locked for debugging
272,219 UART: [kat] SHA2-256
454,135 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,720 UART: [kat] ++
466,256 UART: [kat] sha1
477,068 UART: [kat] SHA2-256
480,081 UART: [kat] SHA2-384
485,289 UART: [kat] SHA2-512-ACC
487,868 UART: [kat] ECC-384
3,777,705 UART: [kat] HMAC-384Kdf
3,802,726 UART: [kat] LMS
4,875,866 UART: [kat] --
4,880,874 UART: [cold-reset] ++
4,882,173 UART: [fht] FHT @ 0x50003400
4,892,364 UART: [idev] ++
4,893,069 UART: [idev] CDI.KEYID = 6
4,894,169 UART: [idev] SUBJECT.KEYID = 7
4,895,431 UART: [idev] UDS.KEYID = 0
4,896,344 ready_for_fw is high
4,896,520 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,030,669 UART: [idev] Erasing UDS.KEYID = 0
8,243,485 UART: [idev] Sha1 KeyId Algorithm
8,265,614 UART: [idev] --
8,270,257 UART: [ldev] ++
8,270,824 UART: [ldev] CDI.KEYID = 6
8,272,060 UART: [ldev] SUBJECT.KEYID = 5
8,273,178 UART: [ldev] AUTHORITY.KEYID = 7
8,274,331 UART: [ldev] FE.KEYID = 1
8,317,252 UART: [ldev] Erasing FE.KEYID = 1
11,651,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,300 UART: [ldev] --
14,037,646 UART: [fwproc] Wait for Commands...
14,039,685 UART: [fwproc] Recv command 0x46574c44
14,041,990 UART: [fwproc] Recv'd Img size: 106620 bytes
18,023,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,099,281 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,141,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,458,557 >>> mbox cmd response: success
18,463,050 UART: [afmc] ++
18,463,644 UART: [afmc] CDI.KEYID = 6
18,464,745 UART: [afmc] SUBJECT.KEYID = 7
18,465,960 UART: [afmc] AUTHORITY.KEYID = 5
21,836,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,136,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,139,106 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,155,112 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,171,193 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,187,274 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,210,133 UART: [afmc] --
24,214,436 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,215,450 UART: [cold-reset] --
24,219,442 UART: [state] Locking Datavault
24,225,466 UART: [state] Locking PCR0, PCR1 and PCR31
24,227,166 UART: [state] Locking ICCM
24,230,180 UART: [exit] Launching FMC @ 0x40000000
24,238,796 UART:
24,239,036 UART: Running Caliptra FMC ...
24,240,140 UART:
24,240,294 UART: [fmc] Received command: 0x10000004
24,241,671 UART:
24,241,813 UART: Running Caliptra ROM ...
24,242,922 UART:
24,243,087 UART: [state] CFI Enabled
24,244,051 >>> mbox cmd response: success
24,301,513 UART: [state] LifecycleState = Unprovisioned
24,303,387 UART: [state] DebugLocked = No
24,305,090 UART: [state] WD Timer not started. Device not locked for debugging
24,309,213 UART: [kat] SHA2-256
24,491,172 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,502,672 UART: [kat] ++
24,503,272 UART: [kat] sha1
24,514,650 UART: [kat] SHA2-256
24,517,674 UART: [kat] SHA2-384
24,522,521 UART: [kat] SHA2-512-ACC
24,525,141 UART: [kat] ECC-384
27,809,982 UART: [kat] HMAC-384Kdf
27,838,045 UART: [kat] LMS
28,911,146 UART: [kat] --
28,916,548 UART: [update-reset] ++
28,917,685 UART: Failed To Get Mailbox Txn
28,921,632 UART: ROM Non-Fatal Error: 0x01040004
28,923,938 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,924,642 UART: [state] Locking Datavault
28,927,257 UART: [state] Locking PCR0, PCR1 and PCR31
28,928,959 UART: [state] Locking ICCM
28,931,707 UART: [exit] Launching FMC @ 0x40000000
28,940,397 UART:
28,940,669 UART: Running Caliptra FMC ...
28,941,700 UART:
28,941,846 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,943,482 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
4,801,805 ready_for_fw is high
4,802,334 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,231,536 >>> mbox cmd response: success
23,915,882 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
23,932,879 UART:
23,933,250 UART: Running Caliptra FMC ...
23,934,528 UART:
23,934,692 UART: [fmc] Received command: 0x10000004
23,936,234 >>> mbox cmd response: success
28,534,907 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,545,472 UART:
28,545,758 UART: Running Caliptra FMC ...
28,546,843 UART:
28,546,995 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,548,642 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,572 UART:
193,012 UART: Running Caliptra ROM ...
194,103 UART:
603,654 UART: [state] CFI Enabled
615,390 UART: [state] LifecycleState = Unprovisioned
617,761 UART: [state] DebugLocked = No
619,496 UART: [state] WD Timer not started. Device not locked for debugging
624,300 UART: [kat] SHA2-256
806,330 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,839 UART: [kat] ++
818,438 UART: [kat] sha1
829,253 UART: [kat] SHA2-256
832,481 UART: [kat] SHA2-384
838,008 UART: [kat] SHA2-512-ACC
840,594 UART: [kat] ECC-384
4,096,627 UART: [kat] HMAC-384Kdf
4,109,372 UART: [kat] LMS
5,182,515 UART: [kat] --
5,186,378 UART: [cold-reset] ++
5,188,175 UART: [fht] FHT @ 0x50003400
5,198,725 UART: [idev] ++
5,199,425 UART: [idev] CDI.KEYID = 6
5,200,588 UART: [idev] SUBJECT.KEYID = 7
5,202,039 UART: [idev] UDS.KEYID = 0
5,203,295 ready_for_fw is high
5,203,489 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,337,429 UART: [idev] Erasing UDS.KEYID = 0
8,488,307 UART: [idev] Sha1 KeyId Algorithm
8,510,268 UART: [idev] --
8,512,855 UART: [ldev] ++
8,513,934 UART: [ldev] CDI.KEYID = 6
8,514,884 UART: [ldev] SUBJECT.KEYID = 5
8,516,137 UART: [ldev] AUTHORITY.KEYID = 7
8,517,694 UART: [ldev] FE.KEYID = 1
8,528,799 UART: [ldev] Erasing FE.KEYID = 1
11,814,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,106,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,123,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,139,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,154,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,175,519 UART: [ldev] --
14,180,286 UART: [fwproc] Wait for Commands...
14,182,584 UART: [fwproc] Recv command 0x46574c44
14,184,880 UART: [fwproc] Recv'd Img size: 106620 bytes
18,164,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,242,225 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,284,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,601,599 >>> mbox cmd response: success
18,605,667 UART: [afmc] ++
18,606,254 UART: [afmc] CDI.KEYID = 6
18,607,355 UART: [afmc] SUBJECT.KEYID = 7
18,608,616 UART: [afmc] AUTHORITY.KEYID = 5
21,920,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,215,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,217,479 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,233,452 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,249,527 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,265,642 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,288,430 UART: [afmc] --
24,291,222 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,292,192 UART: [cold-reset] --
24,296,590 UART: [state] Locking Datavault
24,301,957 UART: [state] Locking PCR0, PCR1 and PCR31
24,303,656 UART: [state] Locking ICCM
24,305,550 UART: [exit] Launching FMC @ 0x40000000
24,314,164 UART:
24,314,401 UART: Running Caliptra FMC ...
24,315,497 UART:
24,315,647 UART: [fmc] Received command: 0x10000004
24,317,096 UART:
24,317,246 UART: Running Caliptra ROM ...
24,318,334 UART:
24,318,480 UART: [state] CFI Enabled
24,319,427 >>> mbox cmd response: success
24,333,384 UART: [state] LifecycleState = Unprovisioned
24,335,210 UART: [state] DebugLocked = No
24,337,008 UART: [state] WD Timer not started. Device not locked for debugging
24,341,768 UART: [kat] SHA2-256
24,523,736 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,535,283 UART: [kat] ++
24,535,785 UART: [kat] sha1
24,545,778 UART: [kat] SHA2-256
24,548,797 UART: [kat] SHA2-384
24,555,151 UART: [kat] SHA2-512-ACC
24,557,760 UART: [kat] ECC-384
27,810,789 UART: [kat] HMAC-384Kdf
27,822,432 UART: [kat] LMS
28,895,579 UART: [kat] --
28,900,762 UART: [update-reset] ++
28,901,902 UART: Failed To Get Mailbox Txn
28,904,576 UART: ROM Non-Fatal Error: 0x01040004
28,906,834 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,907,101 UART: [state] Locking Datavault
28,909,273 UART: [state] Locking PCR0, PCR1 and PCR31
28,911,468 UART: [state] Locking ICCM
28,913,173 UART: [exit] Launching FMC @ 0x40000000
28,921,848 UART:
28,922,086 UART: Running Caliptra FMC ...
28,923,109 UART:
28,923,247 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,924,864 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
5,098,381 ready_for_fw is high
5,098,927 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,415,989 >>> mbox cmd response: success
24,039,561 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,053,353 UART:
24,053,712 UART: Running Caliptra FMC ...
24,054,983 UART:
24,055,147 UART: [fmc] Received command: 0x10000004
24,056,683 >>> mbox cmd response: success
28,541,250 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,551,503 UART:
28,551,807 UART: Running Caliptra FMC ...
28,553,005 UART:
28,553,166 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,554,825 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
192,230 UART:
192,587 UART: Running Caliptra ROM ...
193,761 UART:
193,914 UART: [state] CFI Enabled
262,250 UART: [state] LifecycleState = Unprovisioned
264,175 UART: [state] DebugLocked = No
266,070 UART: [state] WD Timer not started. Device not locked for debugging
269,962 UART: [kat] SHA2-256
449,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,645 UART: [kat] ++
461,092 UART: [kat] sha1
470,615 UART: [kat] SHA2-256
473,628 UART: [kat] SHA2-384
479,806 UART: [kat] SHA2-512-ACC
482,717 UART: [kat] ECC-384
2,947,116 UART: [kat] HMAC-384Kdf
2,970,474 UART: [kat] LMS
3,499,958 UART: [kat] --
3,501,799 UART: [cold-reset] ++
3,503,604 UART: [fht] FHT @ 0x50003400
3,514,654 UART: [idev] ++
3,515,231 UART: [idev] CDI.KEYID = 6
3,516,119 UART: [idev] SUBJECT.KEYID = 7
3,517,342 UART: [idev] UDS.KEYID = 0
3,518,338 ready_for_fw is high
3,518,554 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,653,180 UART: [idev] Erasing UDS.KEYID = 0
6,027,989 UART: [idev] Sha1 KeyId Algorithm
6,051,830 UART: [idev] --
6,055,419 UART: [ldev] ++
6,055,996 UART: [ldev] CDI.KEYID = 6
6,056,883 UART: [ldev] SUBJECT.KEYID = 5
6,058,096 UART: [ldev] AUTHORITY.KEYID = 7
6,059,337 UART: [ldev] FE.KEYID = 1
6,099,397 UART: [ldev] Erasing FE.KEYID = 1
8,601,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,304 UART: [ldev] --
10,412,880 UART: [fwproc] Wait for Commands...
10,415,517 UART: [fwproc] Recv command 0x46574c44
10,417,554 UART: [fwproc] Recv'd Img size: 106964 bytes
13,736,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,802,988 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,845,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,163,798 >>> mbox cmd response: success
14,168,590 UART: [afmc] ++
14,169,181 UART: [afmc] CDI.KEYID = 6
14,170,067 UART: [afmc] SUBJECT.KEYID = 7
14,171,282 UART: [afmc] AUTHORITY.KEYID = 5
16,697,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,422,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,424,329 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,440,269 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,456,216 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,472,160 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,494,875 UART: [afmc] --
18,499,352 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,500,285 UART: [cold-reset] --
18,502,870 UART: [state] Locking Datavault
18,508,565 UART: [state] Locking PCR0, PCR1 and PCR31
18,510,212 UART: [state] Locking ICCM
18,512,820 UART: [exit] Launching FMC @ 0x40000000
18,521,218 UART:
18,521,452 UART: Running Caliptra FMC ...
18,522,487 UART:
18,522,634 UART: [fmc] Received command: 0x10000004
18,524,008 UART:
18,524,157 UART: Running Caliptra ROM ...
18,525,251 UART:
18,525,409 UART: [state] CFI Enabled
18,526,312 >>> mbox cmd response: success
18,584,628 UART: [state] LifecycleState = Unprovisioned
18,586,559 UART: [state] DebugLocked = No
18,588,888 UART: [state] WD Timer not started. Device not locked for debugging
18,592,472 UART: [kat] SHA2-256
18,771,588 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,783,164 UART: [kat] ++
18,783,615 UART: [kat] sha1
18,794,660 UART: [kat] SHA2-256
18,797,665 UART: [kat] SHA2-384
18,804,120 UART: [kat] SHA2-512-ACC
18,807,070 UART: [kat] ECC-384
21,281,615 UART: [kat] HMAC-384Kdf
21,303,738 UART: [kat] LMS
21,833,182 UART: [kat] --
21,839,050 UART: [update-reset] ++
21,839,980 UART: Failed To Get Mailbox Txn
21,842,808 UART: ROM Non-Fatal Error: 0x01040004
21,844,855 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,846,414 UART: [state] Locking Datavault
21,849,417 UART: [state] Locking PCR0, PCR1 and PCR31
21,851,062 UART: [state] Locking ICCM
21,853,023 UART: [exit] Launching FMC @ 0x40000000
21,861,420 UART:
21,861,661 UART: Running Caliptra FMC ...
21,862,687 UART:
21,862,832 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,864,469 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,381,323 ready_for_fw is high
3,381,708 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,954,116 >>> mbox cmd response: success
18,221,860 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,234,422 UART:
18,234,805 UART: Running Caliptra FMC ...
18,235,977 UART:
18,236,129 UART: [fmc] Received command: 0x10000004
18,237,675 >>> mbox cmd response: success
21,397,124 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,407,975 UART:
21,408,247 UART: Running Caliptra FMC ...
21,409,444 UART:
21,409,606 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,411,250 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,494 UART:
192,868 UART: Running Caliptra ROM ...
194,053 UART:
603,673 UART: [state] CFI Enabled
614,285 UART: [state] LifecycleState = Unprovisioned
616,164 UART: [state] DebugLocked = No
618,539 UART: [state] WD Timer not started. Device not locked for debugging
622,711 UART: [kat] SHA2-256
801,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,392 UART: [kat] ++
813,923 UART: [kat] sha1
824,094 UART: [kat] SHA2-256
827,099 UART: [kat] SHA2-384
833,756 UART: [kat] SHA2-512-ACC
836,690 UART: [kat] ECC-384
3,282,543 UART: [kat] HMAC-384Kdf
3,295,407 UART: [kat] LMS
3,824,927 UART: [kat] --
3,828,919 UART: [cold-reset] ++
3,831,264 UART: [fht] FHT @ 0x50003400
3,842,373 UART: [idev] ++
3,842,930 UART: [idev] CDI.KEYID = 6
3,843,807 UART: [idev] SUBJECT.KEYID = 7
3,845,049 UART: [idev] UDS.KEYID = 0
3,845,950 ready_for_fw is high
3,846,147 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,980,525 UART: [idev] Erasing UDS.KEYID = 0
6,318,515 UART: [idev] Sha1 KeyId Algorithm
6,341,793 UART: [idev] --
6,345,582 UART: [ldev] ++
6,346,149 UART: [ldev] CDI.KEYID = 6
6,347,069 UART: [ldev] SUBJECT.KEYID = 5
6,348,228 UART: [ldev] AUTHORITY.KEYID = 7
6,349,509 UART: [ldev] FE.KEYID = 1
6,361,478 UART: [ldev] Erasing FE.KEYID = 1
8,836,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,661 UART: [ldev] --
10,628,488 UART: [fwproc] Wait for Commands...
10,631,276 UART: [fwproc] Recv command 0x46574c44
10,633,308 UART: [fwproc] Recv'd Img size: 106964 bytes
13,947,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,015,311 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,057,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,376,545 >>> mbox cmd response: success
14,381,422 UART: [afmc] ++
14,382,006 UART: [afmc] CDI.KEYID = 6
14,382,902 UART: [afmc] SUBJECT.KEYID = 7
14,384,051 UART: [afmc] AUTHORITY.KEYID = 5
16,879,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,601,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,603,257 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,619,241 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,635,156 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,651,118 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,672,350 UART: [afmc] --
18,676,861 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,677,851 UART: [cold-reset] --
18,680,792 UART: [state] Locking Datavault
18,687,078 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,736 UART: [state] Locking ICCM
18,690,807 UART: [exit] Launching FMC @ 0x40000000
18,699,200 UART:
18,699,441 UART: Running Caliptra FMC ...
18,700,539 UART:
18,700,691 UART: [fmc] Received command: 0x10000004
18,702,146 UART:
18,702,297 UART: Running Caliptra ROM ...
18,703,387 UART:
18,703,537 UART: [state] CFI Enabled
18,704,496 >>> mbox cmd response: success
18,718,188 UART: [state] LifecycleState = Unprovisioned
18,720,022 UART: [state] DebugLocked = No
18,722,531 UART: [state] WD Timer not started. Device not locked for debugging
18,726,806 UART: [kat] SHA2-256
18,905,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,917,545 UART: [kat] ++
18,917,995 UART: [kat] sha1
18,930,172 UART: [kat] SHA2-256
18,933,225 UART: [kat] SHA2-384
18,938,937 UART: [kat] SHA2-512-ACC
18,941,872 UART: [kat] ECC-384
21,383,459 UART: [kat] HMAC-384Kdf
21,396,925 UART: [kat] LMS
21,926,465 UART: [kat] --
21,930,713 UART: [update-reset] ++
21,931,624 UART: Failed To Get Mailbox Txn
21,933,411 UART: ROM Non-Fatal Error: 0x01040004
21,935,497 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,935,769 UART: [state] Locking Datavault
21,938,092 UART: [state] Locking PCR0, PCR1 and PCR31
21,939,732 UART: [state] Locking ICCM
21,941,420 UART: [exit] Launching FMC @ 0x40000000
21,949,808 UART:
21,950,037 UART: Running Caliptra FMC ...
21,951,072 UART:
21,951,221 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,952,847 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,696,593 ready_for_fw is high
3,697,118 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,145,820 >>> mbox cmd response: success
18,380,351 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,395,145 UART:
18,395,525 UART: Running Caliptra FMC ...
18,396,700 UART:
18,396,853 UART: [fmc] Received command: 0x10000004
18,398,399 >>> mbox cmd response: success
21,489,380 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,499,419 UART:
21,499,684 UART: Running Caliptra FMC ...
21,500,759 UART:
21,500,905 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,502,550 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,385,369 ready_for_fw is high
3,385,774 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,965,570 >>> mbox cmd response: success
18,244,443 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,263,028 UART:
18,263,391 UART: Running Caliptra FMC ...
18,264,630 UART:
18,264,793 UART: [fmc] Received command: 0x10000004
18,266,334 >>> mbox cmd response: success
21,440,403 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,451,424 UART:
21,451,688 UART: Running Caliptra FMC ...
21,452,859 UART:
21,453,022 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,454,666 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,695,555 ready_for_fw is high
3,695,979 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,150,281 >>> mbox cmd response: success
18,389,827 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,402,859 UART:
18,403,216 UART: Running Caliptra FMC ...
18,404,473 UART:
18,404,663 UART: [fmc] Received command: 0x10000004
18,406,417 >>> mbox cmd response: success
21,496,663 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,506,321 UART:
21,506,579 UART: Running Caliptra FMC ...
21,507,656 UART:
21,507,803 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,509,437 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,462 UART: [kat] HMAC-384Kdf
921,172 UART: [kat] LMS
1,169,484 UART: [kat] --
1,170,437 UART: [cold-reset] ++
1,170,865 UART: [fht] FHT @ 0x50003400
1,173,661 UART: [idev] ++
1,173,829 UART: [idev] CDI.KEYID = 6
1,174,190 UART: [idev] SUBJECT.KEYID = 7
1,174,615 UART: [idev] UDS.KEYID = 0
1,174,961 ready_for_fw is high
1,174,961 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,911 UART: [idev] Erasing UDS.KEYID = 0
1,199,699 UART: [idev] Sha1 KeyId Algorithm
1,208,679 UART: [idev] --
1,209,714 UART: [ldev] ++
1,209,882 UART: [ldev] CDI.KEYID = 6
1,210,246 UART: [ldev] SUBJECT.KEYID = 5
1,210,673 UART: [ldev] AUTHORITY.KEYID = 7
1,211,136 UART: [ldev] FE.KEYID = 1
1,216,256 UART: [ldev] Erasing FE.KEYID = 1
1,242,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,264 UART: [ldev] --
1,281,618 UART: [fwproc] Wait for Commands...
1,282,213 UART: [fwproc] Recv command 0x46574c44
1,282,946 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,058 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,019 >>> mbox cmd response: success
2,678,228 UART: [afmc] ++
2,678,396 UART: [afmc] CDI.KEYID = 6
2,678,759 UART: [afmc] SUBJECT.KEYID = 7
2,679,185 UART: [afmc] AUTHORITY.KEYID = 5
2,714,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,344 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,064 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,957 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,650 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,725 UART: [afmc] --
2,757,661 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,757,683 UART: [cold-reset] --
2,758,457 UART: [state] Locking Datavault
2,759,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,768 UART: [state] Locking ICCM
2,760,406 UART: [exit] Launching FMC @ 0x40000000
2,765,703 UART:
2,765,719 UART: Running Caliptra FMC ...
2,766,127 UART:
2,766,265 UART: [fmc] Received command: 0x10000004
2,767,002 >>> mbox cmd response: success
2,767,098 UART:
2,767,114 UART: Running Caliptra ROM ...
2,767,522 UART:
2,767,577 UART: [state] CFI Enabled
2,770,265 UART: [state] LifecycleState = Unprovisioned
2,770,920 UART: [state] DebugLocked = No
2,771,470 UART: [state] WD Timer not started. Device not locked for debugging
2,772,728 UART: [kat] SHA2-256
3,576,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,407 UART: [kat] ++
3,580,559 UART: [kat] sha1
3,584,751 UART: [kat] SHA2-256
3,586,691 UART: [kat] SHA2-384
3,589,552 UART: [kat] SHA2-512-ACC
3,591,452 UART: [kat] ECC-384
3,601,297 UART: [kat] HMAC-384Kdf
3,605,749 UART: [kat] LMS
3,854,061 UART: [kat] --
3,855,045 UART: [update-reset] ++
3,855,356 UART: Failed To Get Mailbox Txn
3,856,175 UART: ROM Non-Fatal Error: 0x01040004
3,856,850 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,856,943 UART: [state] Locking Datavault
3,857,883 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,487 UART: [state] Locking ICCM
3,859,083 UART: [exit] Launching FMC @ 0x40000000
3,864,380 UART:
3,864,396 UART: Running Caliptra FMC ...
3,864,804 UART:
3,864,934 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,865,710 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,266 ready_for_fw is high
1,056,266 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,045 >>> mbox cmd response: success
2,582,187 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,587,992 UART:
2,588,008 UART: Running Caliptra FMC ...
2,588,416 UART:
2,588,554 UART: [fmc] Received command: 0x10000004
2,589,291 >>> mbox cmd response: success
3,562,567 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,567,952 UART:
3,567,968 UART: Running Caliptra FMC ...
3,568,376 UART:
3,568,506 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,569,282 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,540 UART: [kat] ++
895,692 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,619 UART: [kat] LMS
1,168,931 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,174,466 ready_for_fw is high
1,174,466 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,144 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,732 UART: [idev] --
1,209,909 UART: [ldev] ++
1,210,077 UART: [ldev] CDI.KEYID = 6
1,210,441 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,355 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,701 UART: [ldev] --
1,282,103 UART: [fwproc] Wait for Commands...
1,282,760 UART: [fwproc] Recv command 0x46574c44
1,283,493 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,299 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,308 >>> mbox cmd response: success
2,678,359 UART: [afmc] ++
2,678,527 UART: [afmc] CDI.KEYID = 6
2,678,890 UART: [afmc] SUBJECT.KEYID = 7
2,679,316 UART: [afmc] AUTHORITY.KEYID = 5
2,715,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,861 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,581 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,474 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,167 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,084 UART: [afmc] --
2,757,968 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,757,990 UART: [cold-reset] --
2,758,742 UART: [state] Locking Datavault
2,759,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,451 UART: [state] Locking ICCM
2,760,907 UART: [exit] Launching FMC @ 0x40000000
2,766,204 UART:
2,766,220 UART: Running Caliptra FMC ...
2,766,628 UART:
2,766,766 UART: [fmc] Received command: 0x10000004
2,767,503 >>> mbox cmd response: success
2,767,599 UART:
2,767,615 UART: Running Caliptra ROM ...
2,768,023 UART:
2,768,165 UART: [state] CFI Enabled
2,771,049 UART: [state] LifecycleState = Unprovisioned
2,771,704 UART: [state] DebugLocked = No
2,772,356 UART: [state] WD Timer not started. Device not locked for debugging
2,773,570 UART: [kat] SHA2-256
3,577,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,581,249 UART: [kat] ++
3,581,401 UART: [kat] sha1
3,585,843 UART: [kat] SHA2-256
3,587,783 UART: [kat] SHA2-384
3,590,646 UART: [kat] SHA2-512-ACC
3,592,546 UART: [kat] ECC-384
3,601,877 UART: [kat] HMAC-384Kdf
3,606,499 UART: [kat] LMS
3,854,811 UART: [kat] --
3,855,553 UART: [update-reset] ++
3,855,864 UART: Failed To Get Mailbox Txn
3,856,763 UART: ROM Non-Fatal Error: 0x01040004
3,857,438 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,857,727 UART: [state] Locking Datavault
3,858,415 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,019 UART: [state] Locking ICCM
3,859,647 UART: [exit] Launching FMC @ 0x40000000
3,864,944 UART:
3,864,960 UART: Running Caliptra FMC ...
3,865,368 UART:
3,865,498 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,866,274 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,893 ready_for_fw is high
1,056,893 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,348 >>> mbox cmd response: success
2,583,448 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,589,849 UART:
2,589,865 UART: Running Caliptra FMC ...
2,590,273 UART:
2,590,411 UART: [fmc] Received command: 0x10000004
2,591,148 >>> mbox cmd response: success
3,563,807 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,569,422 UART:
3,569,438 UART: Running Caliptra FMC ...
3,569,846 UART:
3,569,976 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,570,752 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,684 UART: [state] LifecycleState = Unprovisioned
85,339 UART: [state] DebugLocked = No
86,039 UART: [state] WD Timer not started. Device not locked for debugging
87,172 UART: [kat] SHA2-256
890,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,851 UART: [kat] ++
895,003 UART: [kat] sha1
899,379 UART: [kat] SHA2-256
901,319 UART: [kat] SHA2-384
904,166 UART: [kat] SHA2-512-ACC
906,067 UART: [kat] ECC-384
915,418 UART: [kat] HMAC-384Kdf
919,934 UART: [kat] LMS
1,168,246 UART: [kat] --
1,169,047 UART: [cold-reset] ++
1,169,567 UART: [fht] FHT @ 0x50003400
1,172,219 UART: [idev] ++
1,172,387 UART: [idev] CDI.KEYID = 6
1,172,748 UART: [idev] SUBJECT.KEYID = 7
1,173,173 UART: [idev] UDS.KEYID = 0
1,173,519 ready_for_fw is high
1,173,519 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,475 UART: [idev] Erasing UDS.KEYID = 0
1,198,037 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,214,728 UART: [ldev] Erasing FE.KEYID = 1
1,241,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,034 UART: [ldev] --
1,280,492 UART: [fwproc] Wait for Commands...
1,281,241 UART: [fwproc] Recv command 0x46574c44
1,281,974 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,682 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,674,859 >>> mbox cmd response: success
2,676,056 UART: [afmc] ++
2,676,224 UART: [afmc] CDI.KEYID = 6
2,676,587 UART: [afmc] SUBJECT.KEYID = 7
2,677,013 UART: [afmc] AUTHORITY.KEYID = 5
2,712,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,486 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,206 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,099 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,792 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,663 UART: [afmc] --
2,755,741 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,755,763 UART: [cold-reset] --
2,756,519 UART: [state] Locking Datavault
2,757,358 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,962 UART: [state] Locking ICCM
2,758,544 UART: [exit] Launching FMC @ 0x40000000
2,763,841 UART:
2,763,857 UART: Running Caliptra FMC ...
2,764,265 UART:
2,764,403 UART: [fmc] Received command: 0x10000004
2,765,140 >>> mbox cmd response: success
2,765,236 UART:
2,765,252 UART: Running Caliptra ROM ...
2,765,660 UART:
2,765,715 UART: [state] CFI Enabled
2,768,207 UART: [state] LifecycleState = Unprovisioned
2,768,862 UART: [state] DebugLocked = No
2,769,464 UART: [state] WD Timer not started. Device not locked for debugging
2,770,668 UART: [kat] SHA2-256
3,574,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,347 UART: [kat] ++
3,578,499 UART: [kat] sha1
3,582,753 UART: [kat] SHA2-256
3,584,693 UART: [kat] SHA2-384
3,587,374 UART: [kat] SHA2-512-ACC
3,589,274 UART: [kat] ECC-384
3,598,771 UART: [kat] HMAC-384Kdf
3,603,373 UART: [kat] LMS
3,851,685 UART: [kat] --
3,852,673 UART: [update-reset] ++
3,852,984 UART: Failed To Get Mailbox Txn
3,853,807 UART: ROM Non-Fatal Error: 0x01040004
3,854,482 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,854,599 UART: [state] Locking Datavault
3,855,419 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,023 UART: [state] Locking ICCM
3,856,491 UART: [exit] Launching FMC @ 0x40000000
3,861,788 UART:
3,861,804 UART: Running Caliptra FMC ...
3,862,212 UART:
3,862,342 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,863,118 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,322 ready_for_fw is high
1,056,322 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,017 >>> mbox cmd response: success
2,580,857 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,586,764 UART:
2,586,780 UART: Running Caliptra FMC ...
2,587,188 UART:
2,587,326 UART: [fmc] Received command: 0x10000004
2,588,063 >>> mbox cmd response: success
3,559,743 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,564,948 UART:
3,564,964 UART: Running Caliptra FMC ...
3,565,372 UART:
3,565,502 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,566,278 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,471 UART: [kat] SHA2-512-ACC
906,372 UART: [kat] ECC-384
916,357 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,170,290 UART: [cold-reset] ++
1,170,656 UART: [fht] FHT @ 0x50003400
1,173,450 UART: [idev] ++
1,173,618 UART: [idev] CDI.KEYID = 6
1,173,979 UART: [idev] SUBJECT.KEYID = 7
1,174,404 UART: [idev] UDS.KEYID = 0
1,174,750 ready_for_fw is high
1,174,750 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,170 UART: [idev] Erasing UDS.KEYID = 0
1,198,642 UART: [idev] Sha1 KeyId Algorithm
1,207,592 UART: [idev] --
1,208,821 UART: [ldev] ++
1,208,989 UART: [ldev] CDI.KEYID = 6
1,209,353 UART: [ldev] SUBJECT.KEYID = 5
1,209,780 UART: [ldev] AUTHORITY.KEYID = 7
1,210,243 UART: [ldev] FE.KEYID = 1
1,215,451 UART: [ldev] Erasing FE.KEYID = 1
1,241,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,235 UART: [ldev] --
1,281,667 UART: [fwproc] Wait for Commands...
1,282,416 UART: [fwproc] Recv command 0x46574c44
1,283,149 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,524,091 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,542,174 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,678,062 >>> mbox cmd response: success
2,679,139 UART: [afmc] ++
2,679,307 UART: [afmc] CDI.KEYID = 6
2,679,670 UART: [afmc] SUBJECT.KEYID = 7
2,680,096 UART: [afmc] AUTHORITY.KEYID = 5
2,715,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,745 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,465 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,358 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,051 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,872 UART: [afmc] --
2,758,960 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,758,982 UART: [cold-reset] --
2,759,816 UART: [state] Locking Datavault
2,760,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,537 UART: [state] Locking ICCM
2,762,117 UART: [exit] Launching FMC @ 0x40000000
2,767,414 UART:
2,767,430 UART: Running Caliptra FMC ...
2,767,838 UART:
2,767,976 UART: [fmc] Received command: 0x10000004
2,768,713 >>> mbox cmd response: success
2,768,809 UART:
2,768,825 UART: Running Caliptra ROM ...
2,769,233 UART:
2,769,375 UART: [state] CFI Enabled
2,771,903 UART: [state] LifecycleState = Unprovisioned
2,772,558 UART: [state] DebugLocked = No
2,773,148 UART: [state] WD Timer not started. Device not locked for debugging
2,774,410 UART: [kat] SHA2-256
3,577,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,582,089 UART: [kat] ++
3,582,241 UART: [kat] sha1
3,586,619 UART: [kat] SHA2-256
3,588,559 UART: [kat] SHA2-384
3,591,310 UART: [kat] SHA2-512-ACC
3,593,210 UART: [kat] ECC-384
3,602,813 UART: [kat] HMAC-384Kdf
3,607,445 UART: [kat] LMS
3,855,757 UART: [kat] --
3,856,725 UART: [update-reset] ++
3,857,036 UART: Failed To Get Mailbox Txn
3,857,861 UART: ROM Non-Fatal Error: 0x01040004
3,858,536 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,858,831 UART: [state] Locking Datavault
3,859,417 UART: [state] Locking PCR0, PCR1 and PCR31
3,860,021 UART: [state] Locking ICCM
3,860,531 UART: [exit] Launching FMC @ 0x40000000
3,865,828 UART:
3,865,844 UART: Running Caliptra FMC ...
3,866,252 UART:
3,866,382 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,867,158 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,563 ready_for_fw is high
1,056,563 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,010 >>> mbox cmd response: success
2,583,864 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,590,285 UART:
2,590,301 UART: Running Caliptra FMC ...
2,590,709 UART:
2,590,847 UART: [fmc] Received command: 0x10000004
2,591,584 >>> mbox cmd response: success
3,563,547 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,569,056 UART:
3,569,072 UART: Running Caliptra FMC ...
3,569,480 UART:
3,569,610 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,570,386 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
900,013 UART: [kat] SHA2-256
901,953 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,347 UART: [fht] FHT @ 0x50003400
1,173,177 UART: [idev] ++
1,173,345 UART: [idev] CDI.KEYID = 6
1,173,706 UART: [idev] SUBJECT.KEYID = 7
1,174,131 UART: [idev] UDS.KEYID = 0
1,174,477 ready_for_fw is high
1,174,477 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,199,363 UART: [idev] Sha1 KeyId Algorithm
1,208,355 UART: [idev] --
1,209,372 UART: [ldev] ++
1,209,540 UART: [ldev] CDI.KEYID = 6
1,209,904 UART: [ldev] SUBJECT.KEYID = 5
1,210,331 UART: [ldev] AUTHORITY.KEYID = 7
1,210,794 UART: [ldev] FE.KEYID = 1
1,215,852 UART: [ldev] Erasing FE.KEYID = 1
1,242,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,664 UART: [ldev] --
1,281,140 UART: [fwproc] Wait for Commands...
1,281,755 UART: [fwproc] Recv command 0x46574c44
1,282,488 UART: [fwproc] Recv'd Img size: 106964 bytes
2,494,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,974 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,057 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,017 >>> mbox cmd response: success
2,677,058 UART: [afmc] ++
2,677,226 UART: [afmc] CDI.KEYID = 6
2,677,589 UART: [afmc] SUBJECT.KEYID = 7
2,678,015 UART: [afmc] AUTHORITY.KEYID = 5
2,714,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,694 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,414 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,307 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,000 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,723 UART: [afmc] --
2,757,637 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,757,659 UART: [cold-reset] --
2,758,371 UART: [state] Locking Datavault
2,759,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,304 UART: [state] Locking ICCM
2,760,784 UART: [exit] Launching FMC @ 0x40000000
2,766,081 UART:
2,766,097 UART: Running Caliptra FMC ...
2,766,505 UART:
2,766,643 UART: [fmc] Received command: 0x10000004
2,767,380 >>> mbox cmd response: success
2,767,476 UART:
2,767,492 UART: Running Caliptra ROM ...
2,767,900 UART:
2,767,955 UART: [state] CFI Enabled
2,770,331 UART: [state] LifecycleState = Unprovisioned
2,770,986 UART: [state] DebugLocked = No
2,771,622 UART: [state] WD Timer not started. Device not locked for debugging
2,772,794 UART: [kat] SHA2-256
3,576,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,473 UART: [kat] ++
3,580,625 UART: [kat] sha1
3,584,809 UART: [kat] SHA2-256
3,586,749 UART: [kat] SHA2-384
3,589,556 UART: [kat] SHA2-512-ACC
3,591,456 UART: [kat] ECC-384
3,601,015 UART: [kat] HMAC-384Kdf
3,605,719 UART: [kat] LMS
3,854,031 UART: [kat] --
3,855,205 UART: [update-reset] ++
3,855,516 UART: Failed To Get Mailbox Txn
3,856,417 UART: ROM Non-Fatal Error: 0x01040004
3,857,092 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,857,315 UART: [state] Locking Datavault
3,858,175 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,779 UART: [state] Locking ICCM
3,859,333 UART: [exit] Launching FMC @ 0x40000000
3,864,630 UART:
3,864,646 UART: Running Caliptra FMC ...
3,865,054 UART:
3,865,184 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,865,960 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,188 ready_for_fw is high
1,057,188 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,689 >>> mbox cmd response: success
2,582,489 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,588,708 UART:
2,588,724 UART: Running Caliptra FMC ...
2,589,132 UART:
2,589,270 UART: [fmc] Received command: 0x10000004
2,590,007 >>> mbox cmd response: success
3,562,477 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,567,714 UART:
3,567,730 UART: Running Caliptra FMC ...
3,568,138 UART:
3,568,268 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,569,044 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,030 UART: [state] WD Timer not started. Device not locked for debugging
88,349 UART: [kat] SHA2-256
891,899 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,028 UART: [kat] ++
896,180 UART: [kat] sha1
900,428 UART: [kat] SHA2-256
902,368 UART: [kat] SHA2-384
905,031 UART: [kat] SHA2-512-ACC
906,932 UART: [kat] ECC-384
916,635 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,170,226 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,388 UART: [idev] ++
1,173,556 UART: [idev] CDI.KEYID = 6
1,173,917 UART: [idev] SUBJECT.KEYID = 7
1,174,342 UART: [idev] UDS.KEYID = 0
1,174,688 ready_for_fw is high
1,174,688 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,480 UART: [idev] Sha1 KeyId Algorithm
1,208,240 UART: [idev] --
1,209,339 UART: [ldev] ++
1,209,507 UART: [ldev] CDI.KEYID = 6
1,209,871 UART: [ldev] SUBJECT.KEYID = 5
1,210,298 UART: [ldev] AUTHORITY.KEYID = 7
1,210,761 UART: [ldev] FE.KEYID = 1
1,215,861 UART: [ldev] Erasing FE.KEYID = 1
1,242,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,769 UART: [ldev] --
1,281,241 UART: [fwproc] Wait for Commands...
1,281,964 UART: [fwproc] Recv command 0x46574c44
1,282,697 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,743 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,762 >>> mbox cmd response: success
2,677,823 UART: [afmc] ++
2,677,991 UART: [afmc] CDI.KEYID = 6
2,678,354 UART: [afmc] SUBJECT.KEYID = 7
2,678,780 UART: [afmc] AUTHORITY.KEYID = 5
2,714,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,137 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,857 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,750 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,443 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,334 UART: [afmc] --
2,758,202 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,758,224 UART: [cold-reset] --
2,759,260 UART: [state] Locking Datavault
2,760,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,125 UART: [state] Locking ICCM
2,761,717 UART: [exit] Launching FMC @ 0x40000000
2,767,014 UART:
2,767,030 UART: Running Caliptra FMC ...
2,767,438 UART:
2,767,576 UART: [fmc] Received command: 0x10000004
2,768,313 >>> mbox cmd response: success
2,768,409 UART:
2,768,425 UART: Running Caliptra ROM ...
2,768,833 UART:
2,768,975 UART: [state] CFI Enabled
2,771,751 UART: [state] LifecycleState = Unprovisioned
2,772,406 UART: [state] DebugLocked = No
2,772,940 UART: [state] WD Timer not started. Device not locked for debugging
2,774,240 UART: [kat] SHA2-256
3,577,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,581,919 UART: [kat] ++
3,582,071 UART: [kat] sha1
3,586,391 UART: [kat] SHA2-256
3,588,331 UART: [kat] SHA2-384
3,591,286 UART: [kat] SHA2-512-ACC
3,593,186 UART: [kat] ECC-384
3,603,091 UART: [kat] HMAC-384Kdf
3,607,823 UART: [kat] LMS
3,856,135 UART: [kat] --
3,857,119 UART: [update-reset] ++
3,857,430 UART: Failed To Get Mailbox Txn
3,858,083 UART: ROM Non-Fatal Error: 0x01040004
3,858,758 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,858,939 UART: [state] Locking Datavault
3,859,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,860,457 UART: [state] Locking ICCM
3,860,977 UART: [exit] Launching FMC @ 0x40000000
3,866,274 UART:
3,866,290 UART: Running Caliptra FMC ...
3,866,698 UART:
3,866,828 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,867,604 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,169 ready_for_fw is high
1,056,169 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,866 >>> mbox cmd response: success
2,581,748 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,587,907 UART:
2,587,923 UART: Running Caliptra FMC ...
2,588,331 UART:
2,588,469 UART: [fmc] Received command: 0x10000004
2,589,206 >>> mbox cmd response: success
3,561,147 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,566,292 UART:
3,566,308 UART: Running Caliptra FMC ...
3,566,716 UART:
3,566,846 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,567,622 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,137 UART:
192,505 UART: Running Caliptra ROM ...
193,623 UART:
193,767 UART: [state] CFI Enabled
262,421 UART: [state] LifecycleState = Unprovisioned
264,844 UART: [state] DebugLocked = No
266,024 UART: [state] WD Timer not started. Device not locked for debugging
269,416 UART: [kat] SHA2-256
451,313 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,838 UART: [kat] ++
463,438 UART: [kat] sha1
474,226 UART: [kat] SHA2-256
477,205 UART: [kat] SHA2-384
483,409 UART: [kat] SHA2-512-ACC
485,993 UART: [kat] ECC-384
3,776,097 UART: [kat] HMAC-384Kdf
3,802,766 UART: [kat] LMS
4,875,886 UART: [kat] --
4,878,391 UART: [cold-reset] ++
4,880,885 UART: [fht] FHT @ 0x50003400
4,892,213 UART: [idev] ++
4,892,842 UART: [idev] CDI.KEYID = 6
4,894,007 UART: [idev] SUBJECT.KEYID = 7
4,895,253 UART: [idev] UDS.KEYID = 0
4,896,149 ready_for_fw is high
4,896,332 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,030,475 UART: [idev] Erasing UDS.KEYID = 0
8,239,527 UART: [idev] Sha1 KeyId Algorithm
8,261,036 UART: [idev] --
8,265,046 UART: [ldev] ++
8,265,619 UART: [ldev] CDI.KEYID = 6
8,266,853 UART: [ldev] SUBJECT.KEYID = 5
8,268,009 UART: [ldev] AUTHORITY.KEYID = 7
8,269,243 UART: [ldev] FE.KEYID = 1
8,318,625 UART: [ldev] Erasing FE.KEYID = 1
11,651,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,983 UART: [ldev] --
14,038,658 UART: [fwproc] Wait for Commands...
14,040,595 UART: [fwproc] Recv command 0x46574c44
14,042,925 UART: [fwproc] Recv'd Img size: 106620 bytes
18,014,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,087,272 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,129,731 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,447,433 >>> mbox cmd response: success
18,451,196 UART: [afmc] ++
18,451,789 UART: [afmc] CDI.KEYID = 6
18,452,975 UART: [afmc] SUBJECT.KEYID = 7
18,454,125 UART: [afmc] AUTHORITY.KEYID = 5
21,811,936 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,113,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,115,590 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,131,624 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,147,692 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,163,813 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,187,877 UART: [afmc] --
24,190,953 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,192,000 UART: [cold-reset] --
24,196,141 UART: [state] Locking Datavault
24,202,430 UART: [state] Locking PCR0, PCR1 and PCR31
24,204,076 UART: [state] Locking ICCM
24,205,526 UART: [exit] Launching FMC @ 0x40000000
24,214,143 UART:
24,214,385 UART: Running Caliptra FMC ...
24,215,485 UART:
24,215,639 UART: [fmc] Received command: 0x1000000B
24,217,094 UART:
24,217,253 UART: Running Caliptra ROM ...
24,218,349 UART:
24,218,503 UART: [state] CFI Enabled
24,277,869 UART: [state] LifecycleState = Unprovisioned
24,279,752 UART: [state] DebugLocked = No
24,282,556 UART: [state] WD Timer not started. Device not locked for debugging
24,286,999 UART: [kat] SHA2-256
24,468,943 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,480,465 UART: [kat] ++
24,480,921 UART: [kat] sha1
24,490,403 UART: [kat] SHA2-256
24,493,419 UART: [kat] SHA2-384
24,497,723 UART: [kat] SHA2-512-ACC
24,500,337 UART: [kat] ECC-384
27,789,291 UART: [kat] HMAC-384Kdf
27,817,355 UART: [kat] LMS
28,890,510 UART: [kat] --
28,894,885 UART: [update-reset] ++
28,896,026 UART: Invalid command 0x1000000b recv
28,899,336 UART: ROM Non-Fatal Error: 0x01040003
28,903,014 UART: [state] Locking Datavault
28,905,432 UART: [state] Locking PCR0, PCR1 and PCR31
28,907,629 UART: [state] Locking ICCM
28,908,962 UART: [exit] Launching FMC @ 0x40000000
28,917,602 UART:
28,917,842 UART: Running Caliptra FMC ...
28,919,045 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
4,781,547 ready_for_fw is high
4,782,164 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,201,549 >>> mbox cmd response: success
23,869,289 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
23,882,404 UART:
23,882,749 UART: Running Caliptra FMC ...
23,883,916 UART:
23,884,071 UART: [fmc] Received command: 0x1000000B
28,498,596 UART:
28,498,962 UART: Running Caliptra FMC ...
28,500,049 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,465 UART:
192,815 UART: Running Caliptra ROM ...
193,908 UART:
603,620 UART: [state] CFI Enabled
617,912 UART: [state] LifecycleState = Unprovisioned
620,297 UART: [state] DebugLocked = No
622,808 UART: [state] WD Timer not started. Device not locked for debugging
626,754 UART: [kat] SHA2-256
808,748 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,319 UART: [kat] ++
820,831 UART: [kat] sha1
831,480 UART: [kat] SHA2-256
834,552 UART: [kat] SHA2-384
840,254 UART: [kat] SHA2-512-ACC
842,918 UART: [kat] ECC-384
4,096,198 UART: [kat] HMAC-384Kdf
4,109,207 UART: [kat] LMS
5,182,304 UART: [kat] --
5,187,376 UART: [cold-reset] ++
5,188,740 UART: [fht] FHT @ 0x50003400
5,201,274 UART: [idev] ++
5,201,978 UART: [idev] CDI.KEYID = 6
5,203,220 UART: [idev] SUBJECT.KEYID = 7
5,204,609 UART: [idev] UDS.KEYID = 0
5,205,785 ready_for_fw is high
5,205,980 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,339,974 UART: [idev] Erasing UDS.KEYID = 0
8,488,231 UART: [idev] Sha1 KeyId Algorithm
8,510,382 UART: [idev] --
8,514,349 UART: [ldev] ++
8,514,999 UART: [ldev] CDI.KEYID = 6
8,516,177 UART: [ldev] SUBJECT.KEYID = 5
8,517,599 UART: [ldev] AUTHORITY.KEYID = 7
8,519,202 UART: [ldev] FE.KEYID = 1
8,531,784 UART: [ldev] Erasing FE.KEYID = 1
11,823,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,728 UART: [ldev] --
14,191,716 UART: [fwproc] Wait for Commands...
14,194,617 UART: [fwproc] Recv command 0x46574c44
14,196,864 UART: [fwproc] Recv'd Img size: 106620 bytes
18,178,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,259,450 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,301,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,619,752 >>> mbox cmd response: success
18,624,097 UART: [afmc] ++
18,624,686 UART: [afmc] CDI.KEYID = 6
18,625,867 UART: [afmc] SUBJECT.KEYID = 7
18,627,019 UART: [afmc] AUTHORITY.KEYID = 5
21,942,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,240,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,242,698 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,258,760 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,274,797 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,290,893 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,313,377 UART: [afmc] --
24,317,037 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,317,999 UART: [cold-reset] --
24,320,434 UART: [state] Locking Datavault
24,325,567 UART: [state] Locking PCR0, PCR1 and PCR31
24,327,216 UART: [state] Locking ICCM
24,329,742 UART: [exit] Launching FMC @ 0x40000000
24,338,355 UART:
24,338,582 UART: Running Caliptra FMC ...
24,339,674 UART:
24,339,822 UART: [fmc] Received command: 0x1000000B
24,341,275 UART:
24,341,425 UART: Running Caliptra ROM ...
24,342,513 UART:
24,342,663 UART: [state] CFI Enabled
24,351,995 UART: [state] LifecycleState = Unprovisioned
24,353,806 UART: [state] DebugLocked = No
24,355,337 UART: [state] WD Timer not started. Device not locked for debugging
24,360,740 UART: [kat] SHA2-256
24,542,702 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,554,276 UART: [kat] ++
24,554,813 UART: [kat] sha1
24,564,997 UART: [kat] SHA2-256
24,568,008 UART: [kat] SHA2-384
24,575,121 UART: [kat] SHA2-512-ACC
24,577,697 UART: [kat] ECC-384
27,831,705 UART: [kat] HMAC-384Kdf
27,843,555 UART: [kat] LMS
28,916,719 UART: [kat] --
28,922,673 UART: [update-reset] ++
28,923,811 UART: Invalid command 0x1000000b recv
28,927,200 UART: ROM Non-Fatal Error: 0x01040003
28,929,983 UART: [state] Locking Datavault
28,932,728 UART: [state] Locking PCR0, PCR1 and PCR31
28,934,936 UART: [state] Locking ICCM
28,937,420 UART: [exit] Launching FMC @ 0x40000000
28,946,027 UART:
28,946,287 UART: Running Caliptra FMC ...
28,947,458 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
5,097,639 ready_for_fw is high
5,098,027 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,420,158 >>> mbox cmd response: success
24,040,992 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,054,176 UART:
24,054,525 UART: Running Caliptra FMC ...
24,055,708 UART:
24,055,858 UART: [fmc] Received command: 0x1000000B
28,553,116 UART:
28,553,477 UART: Running Caliptra FMC ...
28,554,556 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,254 UART:
192,624 UART: Running Caliptra ROM ...
193,805 UART:
193,954 UART: [state] CFI Enabled
263,810 UART: [state] LifecycleState = Unprovisioned
265,721 UART: [state] DebugLocked = No
267,113 UART: [state] WD Timer not started. Device not locked for debugging
271,637 UART: [kat] SHA2-256
450,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,298 UART: [kat] ++
462,906 UART: [kat] sha1
474,706 UART: [kat] SHA2-256
477,709 UART: [kat] SHA2-384
484,406 UART: [kat] SHA2-512-ACC
487,417 UART: [kat] ECC-384
2,946,869 UART: [kat] HMAC-384Kdf
2,972,530 UART: [kat] LMS
3,501,996 UART: [kat] --
3,505,567 UART: [cold-reset] ++
3,507,359 UART: [fht] FHT @ 0x50003400
3,518,922 UART: [idev] ++
3,519,496 UART: [idev] CDI.KEYID = 6
3,520,476 UART: [idev] SUBJECT.KEYID = 7
3,521,653 UART: [idev] UDS.KEYID = 0
3,522,591 ready_for_fw is high
3,522,773 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,657,326 UART: [idev] Erasing UDS.KEYID = 0
6,023,090 UART: [idev] Sha1 KeyId Algorithm
6,045,093 UART: [idev] --
6,049,909 UART: [ldev] ++
6,050,480 UART: [ldev] CDI.KEYID = 6
6,051,391 UART: [ldev] SUBJECT.KEYID = 5
6,052,608 UART: [ldev] AUTHORITY.KEYID = 7
6,053,844 UART: [ldev] FE.KEYID = 1
6,100,733 UART: [ldev] Erasing FE.KEYID = 1
8,605,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,553 UART: [ldev] --
10,414,528 UART: [fwproc] Wait for Commands...
10,417,701 UART: [fwproc] Recv command 0x46574c44
10,419,788 UART: [fwproc] Recv'd Img size: 106964 bytes
13,735,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,807,215 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,849,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,168,490 >>> mbox cmd response: success
14,172,694 UART: [afmc] ++
14,173,289 UART: [afmc] CDI.KEYID = 6
14,174,200 UART: [afmc] SUBJECT.KEYID = 7
14,175,359 UART: [afmc] AUTHORITY.KEYID = 5
16,702,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,428,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,429,859 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,445,823 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,461,796 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,477,730 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,499,433 UART: [afmc] --
18,503,439 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,504,433 UART: [cold-reset] --
18,506,281 UART: [state] Locking Datavault
18,511,024 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,724 UART: [state] Locking ICCM
18,514,868 UART: [exit] Launching FMC @ 0x40000000
18,523,264 UART:
18,523,508 UART: Running Caliptra FMC ...
18,524,609 UART:
18,524,794 UART: [fmc] Received command: 0x1000000B
18,526,262 UART:
18,526,416 UART: Running Caliptra ROM ...
18,527,431 UART:
18,527,573 UART: [state] CFI Enabled
18,590,895 UART: [state] LifecycleState = Unprovisioned
18,592,777 UART: [state] DebugLocked = No
18,595,268 UART: [state] WD Timer not started. Device not locked for debugging
18,598,934 UART: [kat] SHA2-256
18,778,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,789,631 UART: [kat] ++
18,790,087 UART: [kat] sha1
18,800,323 UART: [kat] SHA2-256
18,803,341 UART: [kat] SHA2-384
18,810,457 UART: [kat] SHA2-512-ACC
18,813,397 UART: [kat] ECC-384
21,273,274 UART: [kat] HMAC-384Kdf
21,297,436 UART: [kat] LMS
21,826,929 UART: [kat] --
21,832,415 UART: [update-reset] ++
21,833,341 UART: Invalid command 0x1000000b recv
21,837,380 UART: ROM Non-Fatal Error: 0x01040003
21,840,928 UART: [state] Locking Datavault
21,844,168 UART: [state] Locking PCR0, PCR1 and PCR31
21,845,845 UART: [state] Locking ICCM
21,847,638 UART: [exit] Launching FMC @ 0x40000000
21,856,093 UART:
21,856,358 UART: Running Caliptra FMC ...
21,857,502 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,362,981 ready_for_fw is high
3,363,382 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,933,018 >>> mbox cmd response: success
18,200,652 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,214,914 UART:
18,215,267 UART: Running Caliptra FMC ...
18,216,528 UART:
18,216,695 UART: [fmc] Received command: 0x1000000B
21,406,358 UART:
21,406,693 UART: Running Caliptra FMC ...
21,407,870 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,408 UART:
192,782 UART: Running Caliptra ROM ...
193,876 UART:
603,358 UART: [state] CFI Enabled
616,941 UART: [state] LifecycleState = Unprovisioned
618,751 UART: [state] DebugLocked = No
620,124 UART: [state] WD Timer not started. Device not locked for debugging
623,722 UART: [kat] SHA2-256
802,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,383 UART: [kat] ++
814,828 UART: [kat] sha1
824,438 UART: [kat] SHA2-256
827,443 UART: [kat] SHA2-384
833,925 UART: [kat] SHA2-512-ACC
836,928 UART: [kat] ECC-384
3,277,977 UART: [kat] HMAC-384Kdf
3,290,377 UART: [kat] LMS
3,819,906 UART: [kat] --
3,824,040 UART: [cold-reset] ++
3,826,395 UART: [fht] FHT @ 0x50003400
3,836,869 UART: [idev] ++
3,837,438 UART: [idev] CDI.KEYID = 6
3,838,319 UART: [idev] SUBJECT.KEYID = 7
3,839,561 UART: [idev] UDS.KEYID = 0
3,840,459 ready_for_fw is high
3,840,658 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,975,129 UART: [idev] Erasing UDS.KEYID = 0
6,312,955 UART: [idev] Sha1 KeyId Algorithm
6,334,609 UART: [idev] --
6,338,686 UART: [ldev] ++
6,339,261 UART: [ldev] CDI.KEYID = 6
6,340,144 UART: [ldev] SUBJECT.KEYID = 5
6,341,352 UART: [ldev] AUTHORITY.KEYID = 7
6,342,578 UART: [ldev] FE.KEYID = 1
6,352,898 UART: [ldev] Erasing FE.KEYID = 1
8,824,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,986 UART: [ldev] --
10,616,431 UART: [fwproc] Wait for Commands...
10,619,220 UART: [fwproc] Recv command 0x46574c44
10,621,327 UART: [fwproc] Recv'd Img size: 106964 bytes
13,937,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,013,029 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,055,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,373,992 >>> mbox cmd response: success
14,378,441 UART: [afmc] ++
14,379,023 UART: [afmc] CDI.KEYID = 6
14,379,907 UART: [afmc] SUBJECT.KEYID = 7
14,381,117 UART: [afmc] AUTHORITY.KEYID = 5
16,883,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,602,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,604,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,620,844 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,636,752 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,652,742 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,676,362 UART: [afmc] --
18,679,706 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,680,680 UART: [cold-reset] --
18,684,222 UART: [state] Locking Datavault
18,688,778 UART: [state] Locking PCR0, PCR1 and PCR31
18,690,423 UART: [state] Locking ICCM
18,692,601 UART: [exit] Launching FMC @ 0x40000000
18,700,992 UART:
18,701,219 UART: Running Caliptra FMC ...
18,702,241 UART:
18,702,387 UART: [fmc] Received command: 0x1000000B
18,703,840 UART:
18,703,992 UART: Running Caliptra ROM ...
18,705,080 UART:
18,705,232 UART: [state] CFI Enabled
18,718,564 UART: [state] LifecycleState = Unprovisioned
18,720,383 UART: [state] DebugLocked = No
18,721,879 UART: [state] WD Timer not started. Device not locked for debugging
18,725,766 UART: [kat] SHA2-256
18,904,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,916,488 UART: [kat] ++
18,916,941 UART: [kat] sha1
18,928,902 UART: [kat] SHA2-256
18,931,914 UART: [kat] SHA2-384
18,936,813 UART: [kat] SHA2-512-ACC
18,939,804 UART: [kat] ECC-384
21,382,816 UART: [kat] HMAC-384Kdf
21,393,757 UART: [kat] LMS
21,923,322 UART: [kat] --
21,928,398 UART: [update-reset] ++
21,929,261 UART: Invalid command 0x1000000b recv
21,931,853 UART: ROM Non-Fatal Error: 0x01040003
21,934,004 UART: [state] Locking Datavault
21,937,177 UART: [state] Locking PCR0, PCR1 and PCR31
21,938,860 UART: [state] Locking ICCM
21,940,574 UART: [exit] Launching FMC @ 0x40000000
21,949,020 UART:
21,949,267 UART: Running Caliptra FMC ...
21,950,409 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,697,683 ready_for_fw is high
3,698,133 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,148,052 >>> mbox cmd response: success
18,386,534 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,402,175 UART:
18,402,531 UART: Running Caliptra FMC ...
18,403,809 UART:
18,403,973 UART: [fmc] Received command: 0x1000000B
21,504,960 UART:
21,505,303 UART: Running Caliptra FMC ...
21,506,422 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,382,983 ready_for_fw is high
3,383,403 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,975,613 >>> mbox cmd response: success
18,245,549 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,259,233 UART:
18,259,575 UART: Running Caliptra FMC ...
18,260,839 UART:
18,261,005 UART: [fmc] Received command: 0x1000000B
21,454,156 UART:
21,454,493 UART: Running Caliptra FMC ...
21,455,574 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,696,246 ready_for_fw is high
3,696,673 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,152,222 >>> mbox cmd response: success
18,389,186 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,402,742 UART:
18,403,097 UART: Running Caliptra FMC ...
18,404,373 UART:
18,404,543 UART: [fmc] Received command: 0x1000000B
21,503,165 UART:
21,503,493 UART: Running Caliptra FMC ...
21,504,671 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,170,021 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,174,237 ready_for_fw is high
1,174,237 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,297 UART: [idev] Erasing UDS.KEYID = 0
1,199,657 UART: [idev] Sha1 KeyId Algorithm
1,208,305 UART: [idev] --
1,209,196 UART: [ldev] ++
1,209,364 UART: [ldev] CDI.KEYID = 6
1,209,728 UART: [ldev] SUBJECT.KEYID = 5
1,210,155 UART: [ldev] AUTHORITY.KEYID = 7
1,210,618 UART: [ldev] FE.KEYID = 1
1,216,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,662 UART: [ldev] --
1,281,070 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,522 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,597 >>> mbox cmd response: success
2,677,816 UART: [afmc] ++
2,677,984 UART: [afmc] CDI.KEYID = 6
2,678,347 UART: [afmc] SUBJECT.KEYID = 7
2,678,773 UART: [afmc] AUTHORITY.KEYID = 5
2,713,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,248 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,968 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,861 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,554 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,403 UART: [afmc] --
2,757,329 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,757,351 UART: [cold-reset] --
2,758,245 UART: [state] Locking Datavault
2,759,324 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,928 UART: [state] Locking ICCM
2,760,528 UART: [exit] Launching FMC @ 0x40000000
2,765,825 UART:
2,765,841 UART: Running Caliptra FMC ...
2,766,249 UART:
2,766,387 UART: [fmc] Received command: 0x1000000B
2,767,219 UART:
2,767,235 UART: Running Caliptra ROM ...
2,767,643 UART:
2,767,698 UART: [state] CFI Enabled
2,770,252 UART: [state] LifecycleState = Unprovisioned
2,770,907 UART: [state] DebugLocked = No
2,771,441 UART: [state] WD Timer not started. Device not locked for debugging
2,772,667 UART: [kat] SHA2-256
3,576,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,346 UART: [kat] ++
3,580,498 UART: [kat] sha1
3,584,816 UART: [kat] SHA2-256
3,586,756 UART: [kat] SHA2-384
3,589,505 UART: [kat] SHA2-512-ACC
3,591,405 UART: [kat] ECC-384
3,601,266 UART: [kat] HMAC-384Kdf
3,605,764 UART: [kat] LMS
3,854,076 UART: [kat] --
3,854,758 UART: [update-reset] ++
3,855,075 UART: Invalid command 0x1000000b recv
3,856,085 UART: ROM Non-Fatal Error: 0x01040003
3,856,855 UART: [state] Locking Datavault
3,857,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,313 UART: [state] Locking ICCM
3,858,923 UART: [exit] Launching FMC @ 0x40000000
3,864,220 UART:
3,864,236 UART: Running Caliptra FMC ...
3,864,644 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,786 ready_for_fw is high
1,055,786 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,524,525 >>> mbox cmd response: success
2,579,597 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,585,678 UART:
2,585,694 UART: Running Caliptra FMC ...
2,586,102 UART:
2,586,240 UART: [fmc] Received command: 0x1000000B
3,564,493 UART:
3,564,509 UART: Running Caliptra FMC ...
3,564,917 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,188 UART: [state] WD Timer not started. Device not locked for debugging
88,391 UART: [kat] SHA2-256
891,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,070 UART: [kat] ++
896,222 UART: [kat] sha1
900,420 UART: [kat] SHA2-256
902,360 UART: [kat] SHA2-384
905,079 UART: [kat] SHA2-512-ACC
906,980 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,252 UART: [cold-reset] ++
1,170,630 UART: [fht] FHT @ 0x50003400
1,173,168 UART: [idev] ++
1,173,336 UART: [idev] CDI.KEYID = 6
1,173,697 UART: [idev] SUBJECT.KEYID = 7
1,174,122 UART: [idev] UDS.KEYID = 0
1,174,468 ready_for_fw is high
1,174,468 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,062 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,202 UART: [idev] --
1,209,357 UART: [ldev] ++
1,209,525 UART: [ldev] CDI.KEYID = 6
1,209,889 UART: [ldev] SUBJECT.KEYID = 5
1,210,316 UART: [ldev] AUTHORITY.KEYID = 7
1,210,779 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,867 UART: [fwproc] Wait for Commands...
1,282,476 UART: [fwproc] Recv command 0x46574c44
1,283,209 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,777 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,902 >>> mbox cmd response: success
2,678,111 UART: [afmc] ++
2,678,279 UART: [afmc] CDI.KEYID = 6
2,678,642 UART: [afmc] SUBJECT.KEYID = 7
2,679,068 UART: [afmc] AUTHORITY.KEYID = 5
2,714,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,239 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,959 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,852 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,545 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,510 UART: [afmc] --
2,758,420 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,758,442 UART: [cold-reset] --
2,759,300 UART: [state] Locking Datavault
2,760,513 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,117 UART: [state] Locking ICCM
2,761,701 UART: [exit] Launching FMC @ 0x40000000
2,766,998 UART:
2,767,014 UART: Running Caliptra FMC ...
2,767,422 UART:
2,767,560 UART: [fmc] Received command: 0x1000000B
2,768,392 UART:
2,768,408 UART: Running Caliptra ROM ...
2,768,816 UART:
2,768,958 UART: [state] CFI Enabled
2,771,982 UART: [state] LifecycleState = Unprovisioned
2,772,637 UART: [state] DebugLocked = No
2,773,341 UART: [state] WD Timer not started. Device not locked for debugging
2,774,695 UART: [kat] SHA2-256
3,578,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,582,374 UART: [kat] ++
3,582,526 UART: [kat] sha1
3,586,830 UART: [kat] SHA2-256
3,588,770 UART: [kat] SHA2-384
3,591,727 UART: [kat] SHA2-512-ACC
3,593,627 UART: [kat] ECC-384
3,603,670 UART: [kat] HMAC-384Kdf
3,608,258 UART: [kat] LMS
3,856,570 UART: [kat] --
3,857,734 UART: [update-reset] ++
3,858,051 UART: Invalid command 0x1000000b recv
3,859,325 UART: ROM Non-Fatal Error: 0x01040003
3,860,243 UART: [state] Locking Datavault
3,861,127 UART: [state] Locking PCR0, PCR1 and PCR31
3,861,731 UART: [state] Locking ICCM
3,862,257 UART: [exit] Launching FMC @ 0x40000000
3,867,554 UART:
3,867,570 UART: Running Caliptra FMC ...
3,867,978 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,329 ready_for_fw is high
1,056,329 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,954 >>> mbox cmd response: success
2,582,408 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,588,369 UART:
2,588,385 UART: Running Caliptra FMC ...
2,588,793 UART:
2,588,931 UART: [fmc] Received command: 0x1000000B
3,566,883 UART:
3,566,899 UART: Running Caliptra FMC ...
3,567,307 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,284 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,537 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,174,269 ready_for_fw is high
1,174,269 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,175 UART: [idev] Erasing UDS.KEYID = 0
1,199,663 UART: [idev] Sha1 KeyId Algorithm
1,208,639 UART: [idev] --
1,209,720 UART: [ldev] ++
1,209,888 UART: [ldev] CDI.KEYID = 6
1,210,252 UART: [ldev] SUBJECT.KEYID = 5
1,210,679 UART: [ldev] AUTHORITY.KEYID = 7
1,211,142 UART: [ldev] FE.KEYID = 1
1,216,156 UART: [ldev] Erasing FE.KEYID = 1
1,242,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,584 UART: [ldev] --
1,281,942 UART: [fwproc] Wait for Commands...
1,282,547 UART: [fwproc] Recv command 0x46574c44
1,283,280 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,890 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,051 >>> mbox cmd response: success
2,678,084 UART: [afmc] ++
2,678,252 UART: [afmc] CDI.KEYID = 6
2,678,615 UART: [afmc] SUBJECT.KEYID = 7
2,679,041 UART: [afmc] AUTHORITY.KEYID = 5
2,714,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,662 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,382 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,275 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,968 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,841 UART: [afmc] --
2,757,837 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,757,859 UART: [cold-reset] --
2,758,611 UART: [state] Locking Datavault
2,759,628 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,232 UART: [state] Locking ICCM
2,760,792 UART: [exit] Launching FMC @ 0x40000000
2,766,089 UART:
2,766,105 UART: Running Caliptra FMC ...
2,766,513 UART:
2,766,651 UART: [fmc] Received command: 0x1000000B
2,767,483 UART:
2,767,499 UART: Running Caliptra ROM ...
2,767,907 UART:
2,767,962 UART: [state] CFI Enabled
2,770,870 UART: [state] LifecycleState = Unprovisioned
2,771,525 UART: [state] DebugLocked = No
2,772,063 UART: [state] WD Timer not started. Device not locked for debugging
2,773,199 UART: [kat] SHA2-256
3,576,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,878 UART: [kat] ++
3,581,030 UART: [kat] sha1
3,585,118 UART: [kat] SHA2-256
3,587,058 UART: [kat] SHA2-384
3,589,807 UART: [kat] SHA2-512-ACC
3,591,707 UART: [kat] ECC-384
3,601,524 UART: [kat] HMAC-384Kdf
3,606,222 UART: [kat] LMS
3,854,534 UART: [kat] --
3,855,356 UART: [update-reset] ++
3,855,673 UART: Invalid command 0x1000000b recv
3,856,857 UART: ROM Non-Fatal Error: 0x01040003
3,857,729 UART: [state] Locking Datavault
3,858,719 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,323 UART: [state] Locking ICCM
3,859,789 UART: [exit] Launching FMC @ 0x40000000
3,865,086 UART:
3,865,102 UART: Running Caliptra FMC ...
3,865,510 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,716 ready_for_fw is high
1,055,716 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,445 >>> mbox cmd response: success
2,581,471 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,668 UART:
2,587,684 UART: Running Caliptra FMC ...
2,588,092 UART:
2,588,230 UART: [fmc] Received command: 0x1000000B
3,566,183 UART:
3,566,199 UART: Running Caliptra FMC ...
3,566,607 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,667 UART: [kat] HMAC-384Kdf
921,195 UART: [kat] LMS
1,169,507 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,170,950 UART: [fht] FHT @ 0x50003400
1,173,680 UART: [idev] ++
1,173,848 UART: [idev] CDI.KEYID = 6
1,174,209 UART: [idev] SUBJECT.KEYID = 7
1,174,634 UART: [idev] UDS.KEYID = 0
1,174,980 ready_for_fw is high
1,174,980 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,456 UART: [idev] Sha1 KeyId Algorithm
1,208,418 UART: [idev] --
1,209,577 UART: [ldev] ++
1,209,745 UART: [ldev] CDI.KEYID = 6
1,210,109 UART: [ldev] SUBJECT.KEYID = 5
1,210,536 UART: [ldev] AUTHORITY.KEYID = 7
1,210,999 UART: [ldev] FE.KEYID = 1
1,216,055 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,811 UART: [fwproc] Wait for Commands...
1,282,562 UART: [fwproc] Recv command 0x46574c44
1,283,295 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,641 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,650 >>> mbox cmd response: success
2,676,827 UART: [afmc] ++
2,676,995 UART: [afmc] CDI.KEYID = 6
2,677,358 UART: [afmc] SUBJECT.KEYID = 7
2,677,784 UART: [afmc] AUTHORITY.KEYID = 5
2,713,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,777 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,497 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,390 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,083 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,904 UART: [afmc] --
2,756,886 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,756,908 UART: [cold-reset] --
2,757,746 UART: [state] Locking Datavault
2,758,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,513 UART: [state] Locking ICCM
2,760,125 UART: [exit] Launching FMC @ 0x40000000
2,765,422 UART:
2,765,438 UART: Running Caliptra FMC ...
2,765,846 UART:
2,765,984 UART: [fmc] Received command: 0x1000000B
2,766,816 UART:
2,766,832 UART: Running Caliptra ROM ...
2,767,240 UART:
2,767,382 UART: [state] CFI Enabled
2,769,812 UART: [state] LifecycleState = Unprovisioned
2,770,467 UART: [state] DebugLocked = No
2,771,123 UART: [state] WD Timer not started. Device not locked for debugging
2,772,345 UART: [kat] SHA2-256
3,575,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,024 UART: [kat] ++
3,580,176 UART: [kat] sha1
3,584,300 UART: [kat] SHA2-256
3,586,240 UART: [kat] SHA2-384
3,588,787 UART: [kat] SHA2-512-ACC
3,590,687 UART: [kat] ECC-384
3,600,474 UART: [kat] HMAC-384Kdf
3,605,122 UART: [kat] LMS
3,853,434 UART: [kat] --
3,854,408 UART: [update-reset] ++
3,854,725 UART: Invalid command 0x1000000b recv
3,855,943 UART: ROM Non-Fatal Error: 0x01040003
3,856,945 UART: [state] Locking Datavault
3,857,619 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,223 UART: [state] Locking ICCM
3,858,831 UART: [exit] Launching FMC @ 0x40000000
3,864,128 UART:
3,864,144 UART: Running Caliptra FMC ...
3,864,552 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,659 ready_for_fw is high
1,056,659 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,260 >>> mbox cmd response: success
2,582,854 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,589,117 UART:
2,589,133 UART: Running Caliptra FMC ...
2,589,541 UART:
2,589,679 UART: [fmc] Received command: 0x1000000B
3,568,137 UART:
3,568,153 UART: Running Caliptra FMC ...
3,568,561 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
85,993 UART: [state] WD Timer not started. Device not locked for debugging
87,168 UART: [kat] SHA2-256
890,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,847 UART: [kat] ++
894,999 UART: [kat] sha1
899,261 UART: [kat] SHA2-256
901,201 UART: [kat] SHA2-384
903,914 UART: [kat] SHA2-512-ACC
905,815 UART: [kat] ECC-384
915,264 UART: [kat] HMAC-384Kdf
919,994 UART: [kat] LMS
1,168,306 UART: [kat] --
1,169,383 UART: [cold-reset] ++
1,169,909 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,173,829 ready_for_fw is high
1,173,829 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,495 UART: [idev] Erasing UDS.KEYID = 0
1,198,569 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,574 UART: [ldev] ++
1,208,742 UART: [ldev] CDI.KEYID = 6
1,209,106 UART: [ldev] SUBJECT.KEYID = 5
1,209,533 UART: [ldev] AUTHORITY.KEYID = 7
1,209,996 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,241,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,430 UART: [ldev] --
1,280,850 UART: [fwproc] Wait for Commands...
1,281,565 UART: [fwproc] Recv command 0x46574c44
1,282,298 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,460 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,463 >>> mbox cmd response: success
2,677,630 UART: [afmc] ++
2,677,798 UART: [afmc] CDI.KEYID = 6
2,678,161 UART: [afmc] SUBJECT.KEYID = 7
2,678,587 UART: [afmc] AUTHORITY.KEYID = 5
2,714,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,430 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,150 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,043 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,736 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,653 UART: [afmc] --
2,757,651 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,757,673 UART: [cold-reset] --
2,758,401 UART: [state] Locking Datavault
2,759,614 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,218 UART: [state] Locking ICCM
2,760,804 UART: [exit] Launching FMC @ 0x40000000
2,766,101 UART:
2,766,117 UART: Running Caliptra FMC ...
2,766,525 UART:
2,766,663 UART: [fmc] Received command: 0x1000000B
2,767,495 UART:
2,767,511 UART: Running Caliptra ROM ...
2,767,919 UART:
2,767,974 UART: [state] CFI Enabled
2,770,604 UART: [state] LifecycleState = Unprovisioned
2,771,259 UART: [state] DebugLocked = No
2,771,937 UART: [state] WD Timer not started. Device not locked for debugging
2,773,173 UART: [kat] SHA2-256
3,576,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,852 UART: [kat] ++
3,581,004 UART: [kat] sha1
3,585,112 UART: [kat] SHA2-256
3,587,052 UART: [kat] SHA2-384
3,589,795 UART: [kat] SHA2-512-ACC
3,591,695 UART: [kat] ECC-384
3,601,310 UART: [kat] HMAC-384Kdf
3,605,686 UART: [kat] LMS
3,853,998 UART: [kat] --
3,854,612 UART: [update-reset] ++
3,854,929 UART: Invalid command 0x1000000b recv
3,855,949 UART: ROM Non-Fatal Error: 0x01040003
3,856,943 UART: [state] Locking Datavault
3,857,573 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,177 UART: [state] Locking ICCM
3,858,723 UART: [exit] Launching FMC @ 0x40000000
3,864,020 UART:
3,864,036 UART: Running Caliptra FMC ...
3,864,444 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,546 ready_for_fw is high
1,056,546 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,451 >>> mbox cmd response: success
2,581,479 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,698 UART:
2,587,714 UART: Running Caliptra FMC ...
2,588,122 UART:
2,588,260 UART: [fmc] Received command: 0x1000000B
3,566,965 UART:
3,566,981 UART: Running Caliptra FMC ...
3,567,389 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
891,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,928 UART: [kat] ++
896,080 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,255 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,046 UART: [cold-reset] ++
1,170,564 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,174,530 ready_for_fw is high
1,174,530 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,882 UART: [idev] Sha1 KeyId Algorithm
1,208,828 UART: [idev] --
1,209,781 UART: [ldev] ++
1,209,949 UART: [ldev] CDI.KEYID = 6
1,210,313 UART: [ldev] SUBJECT.KEYID = 5
1,210,740 UART: [ldev] AUTHORITY.KEYID = 7
1,211,203 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,243,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,631 UART: [ldev] --
1,282,919 UART: [fwproc] Wait for Commands...
1,283,634 UART: [fwproc] Recv command 0x46574c44
1,284,367 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,641 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,756 >>> mbox cmd response: success
2,679,013 UART: [afmc] ++
2,679,181 UART: [afmc] CDI.KEYID = 6
2,679,544 UART: [afmc] SUBJECT.KEYID = 7
2,679,970 UART: [afmc] AUTHORITY.KEYID = 5
2,715,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,733,377 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,739,097 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,990 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,683 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,758,540 UART: [afmc] --
2,759,556 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,759,578 UART: [cold-reset] --
2,760,396 UART: [state] Locking Datavault
2,761,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,762,327 UART: [state] Locking ICCM
2,762,805 UART: [exit] Launching FMC @ 0x40000000
2,768,102 UART:
2,768,118 UART: Running Caliptra FMC ...
2,768,526 UART:
2,768,664 UART: [fmc] Received command: 0x1000000B
2,769,496 UART:
2,769,512 UART: Running Caliptra ROM ...
2,769,920 UART:
2,770,062 UART: [state] CFI Enabled
2,772,446 UART: [state] LifecycleState = Unprovisioned
2,773,101 UART: [state] DebugLocked = No
2,773,655 UART: [state] WD Timer not started. Device not locked for debugging
2,774,839 UART: [kat] SHA2-256
3,578,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,582,518 UART: [kat] ++
3,582,670 UART: [kat] sha1
3,586,902 UART: [kat] SHA2-256
3,588,842 UART: [kat] SHA2-384
3,591,523 UART: [kat] SHA2-512-ACC
3,593,423 UART: [kat] ECC-384
3,603,244 UART: [kat] HMAC-384Kdf
3,607,690 UART: [kat] LMS
3,856,002 UART: [kat] --
3,856,822 UART: [update-reset] ++
3,857,139 UART: Invalid command 0x1000000b recv
3,858,385 UART: ROM Non-Fatal Error: 0x01040003
3,859,225 UART: [state] Locking Datavault
3,859,929 UART: [state] Locking PCR0, PCR1 and PCR31
3,860,533 UART: [state] Locking ICCM
3,860,957 UART: [exit] Launching FMC @ 0x40000000
3,866,254 UART:
3,866,270 UART: Running Caliptra FMC ...
3,866,678 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,777 ready_for_fw is high
1,056,777 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,528,012 >>> mbox cmd response: success
2,583,804 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,589,879 UART:
2,589,895 UART: Running Caliptra FMC ...
2,590,303 UART:
2,590,441 UART: [fmc] Received command: 0x1000000B
3,568,917 UART:
3,568,933 UART: Running Caliptra FMC ...
3,569,341 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
191,978 UART:
192,366 UART: Running Caliptra ROM ...
193,473 UART:
193,617 UART: [state] CFI Enabled
263,914 UART: [state] LifecycleState = Unprovisioned
266,348 UART: [state] DebugLocked = No
267,876 UART: [state] WD Timer not started. Device not locked for debugging
272,981 UART: [kat] SHA2-256
454,941 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,444 UART: [kat] ++
466,958 UART: [kat] sha1
477,047 UART: [kat] SHA2-256
480,058 UART: [kat] SHA2-384
485,834 UART: [kat] SHA2-512-ACC
488,413 UART: [kat] ECC-384
3,775,303 UART: [kat] HMAC-384Kdf
3,802,319 UART: [kat] LMS
4,875,498 UART: [kat] --
4,880,724 UART: [cold-reset] ++
4,882,591 UART: [fht] FHT @ 0x50003400
4,894,649 UART: [idev] ++
4,895,366 UART: [idev] CDI.KEYID = 6
4,896,611 UART: [idev] SUBJECT.KEYID = 7
4,897,716 UART: [idev] UDS.KEYID = 0
4,898,642 ready_for_fw is high
4,898,850 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,039,509 UART: [idev] Erasing UDS.KEYID = 0
8,245,369 UART: [idev] Sha1 KeyId Algorithm
8,267,198 UART: [idev] --
8,270,630 UART: [ldev] ++
8,271,212 UART: [ldev] CDI.KEYID = 6
8,272,370 UART: [ldev] SUBJECT.KEYID = 5
8,273,585 UART: [ldev] AUTHORITY.KEYID = 7
8,274,736 UART: [ldev] FE.KEYID = 1
8,318,944 UART: [ldev] Erasing FE.KEYID = 1
11,654,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,371 UART: [ldev] --
14,036,221 UART: [fwproc] Wait for Commands...
14,038,592 UART: [fwproc] Recv command 0x46574c44
14,040,898 UART: [fwproc] Recv'd Img size: 111688 bytes
18,088,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,168,970 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,229,178 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,546,050 >>> mbox cmd response: success
18,550,338 UART: [afmc] ++
18,550,926 UART: [afmc] CDI.KEYID = 6
18,552,031 UART: [afmc] SUBJECT.KEYID = 7
18,553,246 UART: [afmc] AUTHORITY.KEYID = 5
21,923,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,225,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,227,316 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,243,518 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,259,589 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,275,480 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,297,545 UART: [afmc] --
24,301,455 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,442,458 UART: [cold-reset] --
24,443,320 UART: [state] Locking Datavault
24,444,391 UART: [state] Locking PCR0, PCR1 and PCR31
24,445,925 UART: [state] Locking ICCM
24,446,803 UART: [exit] Launching FMC @ 0x40000000
24,448,148 UART:
24,448,295 UART: Running Caliptra FMC ...
24,449,393 UART:
24,449,567 UART: [fmc] Received command: 0x46574C44
24,450,941 UART:
24,451,088 UART: Running Caliptra ROM ...
24,452,105 UART:
24,452,247 UART: [state] CFI Enabled
24,519,065 UART: [state] LifecycleState = Unprovisioned
24,520,947 UART: [state] DebugLocked = No
24,522,735 UART: [state] WD Timer not started. Device not locked for debugging
24,526,818 UART: [kat] SHA2-256
24,708,704 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,720,255 UART: [kat] ++
24,720,711 UART: [kat] sha1
24,730,734 UART: [kat] SHA2-256
24,733,748 UART: [kat] SHA2-384
24,738,603 UART: [kat] SHA2-512-ACC
24,741,168 UART: [kat] ECC-384
28,030,778 UART: [kat] HMAC-384Kdf
28,057,151 UART: [kat] LMS
29,130,308 UART: [kat] --
29,133,385 UART: [update-reset] ++
33,198,189 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,201,348 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,574,971 >>> mbox cmd response: success
33,576,340 UART: [update-reset] Copying MAN_2 To MAN_1
33,599,226 UART: [update-reset Success] --
33,600,870 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,604,440 UART: [state] Locking Datavault
33,607,704 UART: [state] Locking PCR0, PCR1 and PCR31
33,609,400 UART: [state] Locking ICCM
33,611,278 UART: [exit] Launching FMC @ 0x40000000
33,619,945 UART:
33,620,180 UART: Running Caliptra FMC ...
33,621,298 UART:
33,621,455 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,623,098 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
4,781,199 ready_for_fw is high
4,781,748 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,276,952 >>> mbox cmd response: success
23,959,828 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,101,161 UART:
24,101,547 UART: Running Caliptra FMC ...
24,102,680 UART:
24,102,854 UART: [fmc] Received command: 0x46574C44
33,137,381 >>> mbox cmd response: success
33,159,028 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,169,942 UART:
33,170,194 UART: Running Caliptra FMC ...
33,171,280 UART:
33,171,430 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,173,081 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,460 UART:
192,811 UART: Running Caliptra ROM ...
193,981 UART:
603,553 UART: [state] CFI Enabled
618,638 UART: [state] LifecycleState = Unprovisioned
621,003 UART: [state] DebugLocked = No
623,303 UART: [state] WD Timer not started. Device not locked for debugging
627,682 UART: [kat] SHA2-256
809,663 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,170 UART: [kat] ++
821,718 UART: [kat] sha1
831,804 UART: [kat] SHA2-256
834,814 UART: [kat] SHA2-384
839,802 UART: [kat] SHA2-512-ACC
842,441 UART: [kat] ECC-384
4,099,488 UART: [kat] HMAC-384Kdf
4,111,548 UART: [kat] LMS
5,184,709 UART: [kat] --
5,187,953 UART: [cold-reset] ++
5,190,597 UART: [fht] FHT @ 0x50003400
5,202,968 UART: [idev] ++
5,203,714 UART: [idev] CDI.KEYID = 6
5,204,814 UART: [idev] SUBJECT.KEYID = 7
5,206,334 UART: [idev] UDS.KEYID = 0
5,207,510 ready_for_fw is high
5,207,705 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,347,917 UART: [idev] Erasing UDS.KEYID = 0
8,497,563 UART: [idev] Sha1 KeyId Algorithm
8,520,477 UART: [idev] --
8,524,417 UART: [ldev] ++
8,525,036 UART: [ldev] CDI.KEYID = 6
8,526,211 UART: [ldev] SUBJECT.KEYID = 5
8,527,685 UART: [ldev] AUTHORITY.KEYID = 7
8,529,240 UART: [ldev] FE.KEYID = 1
8,542,364 UART: [ldev] Erasing FE.KEYID = 1
11,831,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,539 UART: [ldev] --
14,197,095 UART: [fwproc] Wait for Commands...
14,199,890 UART: [fwproc] Recv command 0x46574c44
14,202,193 UART: [fwproc] Recv'd Img size: 111688 bytes
18,246,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,319,274 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,379,492 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,696,970 >>> mbox cmd response: success
18,700,979 UART: [afmc] ++
18,701,571 UART: [afmc] CDI.KEYID = 6
18,702,748 UART: [afmc] SUBJECT.KEYID = 7
18,703,900 UART: [afmc] AUTHORITY.KEYID = 5
22,022,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,317,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,319,532 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,335,723 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,351,793 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,367,639 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,390,074 UART: [afmc] --
24,395,184 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,536,543 UART: [cold-reset] --
24,537,418 UART: [state] Locking Datavault
24,538,492 UART: [state] Locking PCR0, PCR1 and PCR31
24,540,028 UART: [state] Locking ICCM
24,540,940 UART: [exit] Launching FMC @ 0x40000000
24,542,359 UART:
24,542,508 UART: Running Caliptra FMC ...
24,543,594 UART:
24,543,764 UART: [fmc] Received command: 0x46574C44
24,545,215 UART:
24,545,364 UART: Running Caliptra ROM ...
24,546,449 UART:
24,546,599 UART: [state] CFI Enabled
24,555,989 UART: [state] LifecycleState = Unprovisioned
24,557,863 UART: [state] DebugLocked = No
24,559,301 UART: [state] WD Timer not started. Device not locked for debugging
24,564,620 UART: [kat] SHA2-256
24,746,554 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,758,104 UART: [kat] ++
24,758,639 UART: [kat] sha1
24,768,394 UART: [kat] SHA2-256
24,771,404 UART: [kat] SHA2-384
24,777,219 UART: [kat] SHA2-512-ACC
24,779,775 UART: [kat] ECC-384
28,034,024 UART: [kat] HMAC-384Kdf
28,047,560 UART: [kat] LMS
29,120,703 UART: [kat] --
29,123,013 UART: [update-reset] ++
33,190,504 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,194,051 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
33,567,663 >>> mbox cmd response: success
33,569,494 UART: [update-reset] Copying MAN_2 To MAN_1
33,592,367 UART: [update-reset Success] --
33,594,008 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,597,212 UART: [state] Locking Datavault
33,599,966 UART: [state] Locking PCR0, PCR1 and PCR31
33,601,670 UART: [state] Locking ICCM
33,604,090 UART: [exit] Launching FMC @ 0x40000000
33,612,704 UART:
33,612,940 UART: Running Caliptra FMC ...
33,614,056 UART:
33,614,217 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,615,841 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,249 writing to cptra_bootfsm_go
5,102,302 ready_for_fw is high
5,102,727 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,506,640 >>> mbox cmd response: success
24,132,624 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
24,273,650 UART:
24,274,036 UART: Running Caliptra FMC ...
24,275,252 UART:
24,275,412 UART: [fmc] Received command: 0x46574C44
33,189,809 >>> mbox cmd response: success
33,212,545 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,224,988 UART:
33,225,243 UART: Running Caliptra FMC ...
33,226,323 UART:
33,226,484 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,228,130 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,038 UART:
192,434 UART: Running Caliptra ROM ...
193,741 UART:
193,902 UART: [state] CFI Enabled
268,443 UART: [state] LifecycleState = Unprovisioned
270,263 UART: [state] DebugLocked = No
271,959 UART: [state] WD Timer not started. Device not locked for debugging
274,895 UART: [kat] SHA2-256
453,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,511 UART: [kat] ++
466,050 UART: [kat] sha1
478,709 UART: [kat] SHA2-256
481,724 UART: [kat] SHA2-384
487,496 UART: [kat] SHA2-512-ACC
490,434 UART: [kat] ECC-384
2,949,635 UART: [kat] HMAC-384Kdf
2,974,932 UART: [kat] LMS
3,504,422 UART: [kat] --
3,508,795 UART: [cold-reset] ++
3,510,232 UART: [fht] FHT @ 0x50003400
3,520,218 UART: [idev] ++
3,520,790 UART: [idev] CDI.KEYID = 6
3,521,707 UART: [idev] SUBJECT.KEYID = 7
3,522,899 UART: [idev] UDS.KEYID = 0
3,523,822 ready_for_fw is high
3,524,064 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,665,557 UART: [idev] Erasing UDS.KEYID = 0
6,030,794 UART: [idev] Sha1 KeyId Algorithm
6,055,137 UART: [idev] --
6,059,227 UART: [ldev] ++
6,059,807 UART: [ldev] CDI.KEYID = 6
6,060,698 UART: [ldev] SUBJECT.KEYID = 5
6,061,916 UART: [ldev] AUTHORITY.KEYID = 7
6,063,150 UART: [ldev] FE.KEYID = 1
6,101,973 UART: [ldev] Erasing FE.KEYID = 1
8,604,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,474 UART: [ldev] --
10,415,873 UART: [fwproc] Wait for Commands...
10,418,397 UART: [fwproc] Recv command 0x46574c44
10,420,499 UART: [fwproc] Recv'd Img size: 112032 bytes
13,801,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,123 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,934,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,253,069 >>> mbox cmd response: success
14,258,142 UART: [afmc] ++
14,258,747 UART: [afmc] CDI.KEYID = 6
14,259,660 UART: [afmc] SUBJECT.KEYID = 7
14,260,824 UART: [afmc] AUTHORITY.KEYID = 5
16,787,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,509,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,511,836 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,527,936 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,543,951 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,559,624 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,583,187 UART: [afmc] --
18,589,060 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,730,935 UART: [cold-reset] --
18,731,817 UART: [state] Locking Datavault
18,732,979 UART: [state] Locking PCR0, PCR1 and PCR31
18,734,515 UART: [state] Locking ICCM
18,735,420 UART: [exit] Launching FMC @ 0x40000000
18,736,850 UART:
18,737,014 UART: Running Caliptra FMC ...
18,738,120 UART:
18,738,280 UART: [fmc] Received command: 0x46574C44
18,739,660 UART:
18,739,805 UART: Running Caliptra ROM ...
18,740,837 UART:
18,740,986 UART: [state] CFI Enabled
18,801,290 UART: [state] LifecycleState = Unprovisioned
18,803,165 UART: [state] DebugLocked = No
18,805,365 UART: [state] WD Timer not started. Device not locked for debugging
18,809,818 UART: [kat] SHA2-256
18,988,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,000,521 UART: [kat] ++
19,001,072 UART: [kat] sha1
19,011,135 UART: [kat] SHA2-256
19,014,147 UART: [kat] SHA2-384
19,020,562 UART: [kat] SHA2-512-ACC
19,023,512 UART: [kat] ECC-384
21,483,675 UART: [kat] HMAC-384Kdf
21,506,889 UART: [kat] LMS
22,036,345 UART: [kat] --
22,041,273 UART: [update-reset] ++
25,442,153 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,445,754 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,820,572 >>> mbox cmd response: success
25,821,440 UART: [update-reset] Copying MAN_2 To MAN_1
25,843,773 UART: [update-reset Success] --
25,845,043 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,847,321 UART: [state] Locking Datavault
25,851,276 UART: [state] Locking PCR0, PCR1 and PCR31
25,852,976 UART: [state] Locking ICCM
25,855,554 UART: [exit] Launching FMC @ 0x40000000
25,863,949 UART:
25,864,182 UART: Running Caliptra FMC ...
25,865,280 UART:
25,865,436 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,867,090 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,892 writing to cptra_bootfsm_go
3,361,931 ready_for_fw is high
3,362,353 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,027,001 >>> mbox cmd response: success
18,309,926 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,451,281 UART:
18,451,666 UART: Running Caliptra FMC ...
18,452,877 UART:
18,453,047 UART: [fmc] Received command: 0x46574C44
25,419,435 >>> mbox cmd response: success
25,441,476 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,456,404 UART:
25,456,663 UART: Running Caliptra FMC ...
25,457,756 UART:
25,457,905 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,459,568 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,452 UART:
192,791 UART: Running Caliptra ROM ...
193,969 UART:
603,768 UART: [state] CFI Enabled
619,067 UART: [state] LifecycleState = Unprovisioned
620,979 UART: [state] DebugLocked = No
622,224 UART: [state] WD Timer not started. Device not locked for debugging
625,550 UART: [kat] SHA2-256
804,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,279 UART: [kat] ++
816,725 UART: [kat] sha1
828,185 UART: [kat] SHA2-256
831,198 UART: [kat] SHA2-384
837,684 UART: [kat] SHA2-512-ACC
840,617 UART: [kat] ECC-384
3,278,967 UART: [kat] HMAC-384Kdf
3,291,406 UART: [kat] LMS
3,820,884 UART: [kat] --
3,825,463 UART: [cold-reset] ++
3,826,328 UART: [fht] FHT @ 0x50003400
3,837,659 UART: [idev] ++
3,838,224 UART: [idev] CDI.KEYID = 6
3,839,254 UART: [idev] SUBJECT.KEYID = 7
3,840,351 UART: [idev] UDS.KEYID = 0
3,841,273 ready_for_fw is high
3,841,457 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,982,147 UART: [idev] Erasing UDS.KEYID = 0
6,314,793 UART: [idev] Sha1 KeyId Algorithm
6,337,851 UART: [idev] --
6,341,190 UART: [ldev] ++
6,341,756 UART: [ldev] CDI.KEYID = 6
6,342,664 UART: [ldev] SUBJECT.KEYID = 5
6,343,877 UART: [ldev] AUTHORITY.KEYID = 7
6,345,105 UART: [ldev] FE.KEYID = 1
6,356,442 UART: [ldev] Erasing FE.KEYID = 1
8,830,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,924 UART: [ldev] --
10,620,281 UART: [fwproc] Wait for Commands...
10,621,821 UART: [fwproc] Recv command 0x46574c44
10,623,894 UART: [fwproc] Recv'd Img size: 112032 bytes
13,998,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,070,564 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,130,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,448,589 >>> mbox cmd response: success
14,452,829 UART: [afmc] ++
14,453,415 UART: [afmc] CDI.KEYID = 6
14,454,326 UART: [afmc] SUBJECT.KEYID = 7
14,455,484 UART: [afmc] AUTHORITY.KEYID = 5
16,962,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,684,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,686,821 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,702,884 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,718,933 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,734,573 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,758,721 UART: [afmc] --
18,762,894 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,904,320 UART: [cold-reset] --
18,905,192 UART: [state] Locking Datavault
18,906,270 UART: [state] Locking PCR0, PCR1 and PCR31
18,907,803 UART: [state] Locking ICCM
18,908,678 UART: [exit] Launching FMC @ 0x40000000
18,910,021 UART:
18,910,170 UART: Running Caliptra FMC ...
18,911,264 UART:
18,911,414 UART: [fmc] Received command: 0x46574C44
18,912,785 UART:
18,912,931 UART: Running Caliptra ROM ...
18,913,977 UART:
18,914,125 UART: [state] CFI Enabled
18,920,823 UART: [state] LifecycleState = Unprovisioned
18,922,709 UART: [state] DebugLocked = No
18,924,887 UART: [state] WD Timer not started. Device not locked for debugging
18,928,401 UART: [kat] SHA2-256
19,107,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,119,137 UART: [kat] ++
19,119,591 UART: [kat] sha1
19,130,525 UART: [kat] SHA2-256
19,133,541 UART: [kat] SHA2-384
19,140,499 UART: [kat] SHA2-512-ACC
19,143,438 UART: [kat] ECC-384
21,585,308 UART: [kat] HMAC-384Kdf
21,598,562 UART: [kat] LMS
22,128,102 UART: [kat] --
22,132,377 UART: [update-reset] ++
25,528,997 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,531,775 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
25,906,636 >>> mbox cmd response: success
25,907,469 UART: [update-reset] Copying MAN_2 To MAN_1
25,929,806 UART: [update-reset Success] --
25,931,066 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,933,230 UART: [state] Locking Datavault
25,937,023 UART: [state] Locking PCR0, PCR1 and PCR31
25,938,667 UART: [state] Locking ICCM
25,940,245 UART: [exit] Launching FMC @ 0x40000000
25,948,691 UART:
25,948,930 UART: Running Caliptra FMC ...
25,950,029 UART:
25,950,183 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,951,811 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,695,204 ready_for_fw is high
3,695,782 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,235,258 >>> mbox cmd response: success
18,467,757 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,609,052 UART:
18,609,591 UART: Running Caliptra FMC ...
18,610,811 UART:
18,610,998 UART: [fmc] Received command: 0x46574C44
25,477,088 >>> mbox cmd response: success
25,498,204 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,513,200 UART:
25,513,463 UART: Running Caliptra FMC ...
25,514,629 UART:
25,514,787 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,516,424 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,380,606 ready_for_fw is high
3,381,011 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,030,644 >>> mbox cmd response: success
18,308,988 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,450,423 UART:
18,450,815 UART: Running Caliptra FMC ...
18,452,022 UART:
18,452,191 UART: [fmc] Received command: 0x46574C44
25,413,747 >>> mbox cmd response: success
25,435,338 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,446,516 UART:
25,446,772 UART: Running Caliptra FMC ...
25,447,858 UART:
25,448,006 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,449,650 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,697,107 ready_for_fw is high
3,697,754 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,225,341 >>> mbox cmd response: success
18,457,683 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
18,598,987 UART:
18,599,367 UART: Running Caliptra FMC ...
18,600,569 UART:
18,600,738 UART: [fmc] Received command: 0x46574C44
25,472,687 >>> mbox cmd response: success
25,495,355 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,507,314 UART:
25,507,566 UART: Running Caliptra FMC ...
25,508,732 UART:
25,508,895 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,510,534 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
916,232 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,669 UART: [cold-reset] ++
1,170,031 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,174,121 ready_for_fw is high
1,174,121 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,919 UART: [idev] Erasing UDS.KEYID = 0
1,199,155 UART: [idev] Sha1 KeyId Algorithm
1,207,863 UART: [idev] --
1,209,034 UART: [ldev] ++
1,209,202 UART: [ldev] CDI.KEYID = 6
1,209,566 UART: [ldev] SUBJECT.KEYID = 5
1,209,993 UART: [ldev] AUTHORITY.KEYID = 7
1,210,456 UART: [ldev] FE.KEYID = 1
1,215,472 UART: [ldev] Erasing FE.KEYID = 1
1,241,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,378 UART: [ldev] --
1,280,896 UART: [fwproc] Wait for Commands...
1,281,499 UART: [fwproc] Recv command 0x46574c44
1,282,232 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,595 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,280 >>> mbox cmd response: success
2,743,335 UART: [afmc] ++
2,743,503 UART: [afmc] CDI.KEYID = 6
2,743,866 UART: [afmc] SUBJECT.KEYID = 7
2,744,292 UART: [afmc] AUTHORITY.KEYID = 5
2,779,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,036 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,732 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,631 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,324 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,094 UART: [afmc] --
2,823,018 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,823,040 UART: [cold-reset] --
2,823,950 UART: [state] Locking Datavault
2,824,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,511 UART: [state] Locking ICCM
2,825,955 UART: [exit] Launching FMC @ 0x40000000
2,831,252 UART:
2,831,268 UART: Running Caliptra FMC ...
2,831,676 UART:
2,831,906 UART: [fmc] Received command: 0x46574C44
2,832,732 UART:
2,832,748 UART: Running Caliptra ROM ...
2,833,156 UART:
2,833,211 UART: [state] CFI Enabled
2,835,895 UART: [state] LifecycleState = Unprovisioned
2,836,550 UART: [state] DebugLocked = No
2,837,156 UART: [state] WD Timer not started. Device not locked for debugging
2,838,272 UART: [kat] SHA2-256
3,641,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,951 UART: [kat] ++
3,646,103 UART: [kat] sha1
3,650,299 UART: [kat] SHA2-256
3,652,239 UART: [kat] SHA2-384
3,655,082 UART: [kat] SHA2-512-ACC
3,656,982 UART: [kat] ECC-384
3,667,195 UART: [kat] HMAC-384Kdf
3,671,799 UART: [kat] LMS
3,920,111 UART: [kat] --
3,920,831 UART: [update-reset] ++
5,205,253 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,382 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,354,568 >>> mbox cmd response: success
5,354,711 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,725 UART: [update-reset Success] --
5,363,134 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,363,750 UART: [state] Locking Datavault
5,364,728 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,332 UART: [state] Locking ICCM
5,365,836 UART: [exit] Launching FMC @ 0x40000000
5,371,133 UART:
5,371,149 UART: Running Caliptra FMC ...
5,371,557 UART:
5,371,779 UART: [fmc] Received command: 0x1000000C
5,372,514 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,256 ready_for_fw is high
1,056,256 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,930 >>> mbox cmd response: success
2,649,847 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,655,986 UART:
2,656,002 UART: Running Caliptra FMC ...
2,656,410 UART:
2,656,640 UART: [fmc] Received command: 0x46574C44
5,060,397 >>> mbox cmd response: success
5,067,979 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,073,507 UART:
5,073,523 UART: Running Caliptra FMC ...
5,073,931 UART:
5,074,153 UART: [fmc] Received command: 0x1000000C
5,074,888 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
915,893 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,724 UART: [cold-reset] ++
1,170,134 UART: [fht] FHT @ 0x50003400
1,172,720 UART: [idev] ++
1,172,888 UART: [idev] CDI.KEYID = 6
1,173,249 UART: [idev] SUBJECT.KEYID = 7
1,173,674 UART: [idev] UDS.KEYID = 0
1,174,020 ready_for_fw is high
1,174,020 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,828 UART: [idev] Erasing UDS.KEYID = 0
1,198,856 UART: [idev] Sha1 KeyId Algorithm
1,207,734 UART: [idev] --
1,208,623 UART: [ldev] ++
1,208,791 UART: [ldev] CDI.KEYID = 6
1,209,155 UART: [ldev] SUBJECT.KEYID = 5
1,209,582 UART: [ldev] AUTHORITY.KEYID = 7
1,210,045 UART: [ldev] FE.KEYID = 1
1,215,467 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,493 UART: [fwproc] Wait for Commands...
1,282,234 UART: [fwproc] Recv command 0x46574c44
1,282,967 UART: [fwproc] Recv'd Img size: 112032 bytes
2,550,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,188 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,873 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,739,833 >>> mbox cmd response: success
2,740,962 UART: [afmc] ++
2,741,130 UART: [afmc] CDI.KEYID = 6
2,741,493 UART: [afmc] SUBJECT.KEYID = 7
2,741,919 UART: [afmc] AUTHORITY.KEYID = 5
2,777,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,777 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,473 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,372 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,065 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,925 UART: [afmc] --
2,821,017 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,821,039 UART: [cold-reset] --
2,821,843 UART: [state] Locking Datavault
2,822,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,414 UART: [state] Locking ICCM
2,823,844 UART: [exit] Launching FMC @ 0x40000000
2,829,141 UART:
2,829,157 UART: Running Caliptra FMC ...
2,829,565 UART:
2,829,795 UART: [fmc] Received command: 0x46574C44
2,830,621 UART:
2,830,637 UART: Running Caliptra ROM ...
2,831,045 UART:
2,831,187 UART: [state] CFI Enabled
2,833,975 UART: [state] LifecycleState = Unprovisioned
2,834,630 UART: [state] DebugLocked = No
2,835,164 UART: [state] WD Timer not started. Device not locked for debugging
2,836,322 UART: [kat] SHA2-256
3,639,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,001 UART: [kat] ++
3,644,153 UART: [kat] sha1
3,648,305 UART: [kat] SHA2-256
3,650,245 UART: [kat] SHA2-384
3,653,008 UART: [kat] SHA2-512-ACC
3,654,908 UART: [kat] ECC-384
3,664,751 UART: [kat] HMAC-384Kdf
3,669,305 UART: [kat] LMS
3,917,617 UART: [kat] --
3,918,429 UART: [update-reset] ++
5,204,781 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,784 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,353,970 >>> mbox cmd response: success
5,354,195 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,209 UART: [update-reset Success] --
5,362,618 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,363,164 UART: [state] Locking Datavault
5,363,884 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,488 UART: [state] Locking ICCM
5,365,148 UART: [exit] Launching FMC @ 0x40000000
5,370,445 UART:
5,370,461 UART: Running Caliptra FMC ...
5,370,869 UART:
5,371,091 UART: [fmc] Received command: 0x1000000C
5,371,826 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,969 ready_for_fw is high
1,056,969 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,355 >>> mbox cmd response: success
2,649,356 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,655,441 UART:
2,655,457 UART: Running Caliptra FMC ...
2,655,865 UART:
2,656,095 UART: [fmc] Received command: 0x46574C44
5,060,861 >>> mbox cmd response: success
5,068,507 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,074,437 UART:
5,074,453 UART: Running Caliptra FMC ...
5,074,861 UART:
5,075,083 UART: [fmc] Received command: 0x1000000C
5,075,818 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,504 UART: [state] LifecycleState = Unprovisioned
85,159 UART: [state] DebugLocked = No
85,831 UART: [state] WD Timer not started. Device not locked for debugging
87,146 UART: [kat] SHA2-256
890,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,825 UART: [kat] ++
894,977 UART: [kat] sha1
899,007 UART: [kat] SHA2-256
900,947 UART: [kat] SHA2-384
903,746 UART: [kat] SHA2-512-ACC
905,647 UART: [kat] ECC-384
915,452 UART: [kat] HMAC-384Kdf
919,968 UART: [kat] LMS
1,168,280 UART: [kat] --
1,169,155 UART: [cold-reset] ++
1,169,521 UART: [fht] FHT @ 0x50003400
1,172,263 UART: [idev] ++
1,172,431 UART: [idev] CDI.KEYID = 6
1,172,792 UART: [idev] SUBJECT.KEYID = 7
1,173,217 UART: [idev] UDS.KEYID = 0
1,173,563 ready_for_fw is high
1,173,563 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,115 UART: [idev] Erasing UDS.KEYID = 0
1,198,439 UART: [idev] Sha1 KeyId Algorithm
1,207,277 UART: [idev] --
1,208,358 UART: [ldev] ++
1,208,526 UART: [ldev] CDI.KEYID = 6
1,208,890 UART: [ldev] SUBJECT.KEYID = 5
1,209,317 UART: [ldev] AUTHORITY.KEYID = 7
1,209,780 UART: [ldev] FE.KEYID = 1
1,214,890 UART: [ldev] Erasing FE.KEYID = 1
1,240,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,984 UART: [ldev] --
1,280,484 UART: [fwproc] Wait for Commands...
1,281,229 UART: [fwproc] Recv command 0x46574c44
1,281,962 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,027 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,834 >>> mbox cmd response: success
2,743,045 UART: [afmc] ++
2,743,213 UART: [afmc] CDI.KEYID = 6
2,743,576 UART: [afmc] SUBJECT.KEYID = 7
2,744,002 UART: [afmc] AUTHORITY.KEYID = 5
2,778,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,444 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,140 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,039 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,732 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,478 UART: [afmc] --
2,822,528 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,822,550 UART: [cold-reset] --
2,823,426 UART: [state] Locking Datavault
2,824,763 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,367 UART: [state] Locking ICCM
2,825,873 UART: [exit] Launching FMC @ 0x40000000
2,831,170 UART:
2,831,186 UART: Running Caliptra FMC ...
2,831,594 UART:
2,831,824 UART: [fmc] Received command: 0x46574C44
2,832,650 UART:
2,832,666 UART: Running Caliptra ROM ...
2,833,074 UART:
2,833,129 UART: [state] CFI Enabled
2,835,417 UART: [state] LifecycleState = Unprovisioned
2,836,072 UART: [state] DebugLocked = No
2,836,698 UART: [state] WD Timer not started. Device not locked for debugging
2,837,940 UART: [kat] SHA2-256
3,641,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,619 UART: [kat] ++
3,645,771 UART: [kat] sha1
3,650,169 UART: [kat] SHA2-256
3,652,109 UART: [kat] SHA2-384
3,654,990 UART: [kat] SHA2-512-ACC
3,656,890 UART: [kat] ECC-384
3,666,641 UART: [kat] HMAC-384Kdf
3,671,041 UART: [kat] LMS
3,919,353 UART: [kat] --
3,920,113 UART: [update-reset] ++
5,204,727 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,816 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,354,002 >>> mbox cmd response: success
5,354,249 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,263 UART: [update-reset Success] --
5,362,672 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,363,424 UART: [state] Locking Datavault
5,364,296 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,900 UART: [state] Locking ICCM
5,365,554 UART: [exit] Launching FMC @ 0x40000000
5,370,851 UART:
5,370,867 UART: Running Caliptra FMC ...
5,371,275 UART:
5,371,497 UART: [fmc] Received command: 0x1000000C
5,372,232 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,696 ready_for_fw is high
1,055,696 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,714 >>> mbox cmd response: success
2,647,511 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,653,652 UART:
2,653,668 UART: Running Caliptra FMC ...
2,654,076 UART:
2,654,306 UART: [fmc] Received command: 0x46574C44
5,058,663 >>> mbox cmd response: success
5,066,329 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,072,147 UART:
5,072,163 UART: Running Caliptra FMC ...
5,072,571 UART:
5,072,793 UART: [fmc] Received command: 0x1000000C
5,073,528 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,636 UART: [kat] SHA2-256
901,576 UART: [kat] SHA2-384
904,101 UART: [kat] SHA2-512-ACC
906,002 UART: [kat] ECC-384
915,555 UART: [kat] HMAC-384Kdf
920,357 UART: [kat] LMS
1,168,669 UART: [kat] --
1,169,318 UART: [cold-reset] ++
1,169,854 UART: [fht] FHT @ 0x50003400
1,172,570 UART: [idev] ++
1,172,738 UART: [idev] CDI.KEYID = 6
1,173,099 UART: [idev] SUBJECT.KEYID = 7
1,173,524 UART: [idev] UDS.KEYID = 0
1,173,870 ready_for_fw is high
1,173,870 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,494 UART: [idev] Erasing UDS.KEYID = 0
1,198,512 UART: [idev] Sha1 KeyId Algorithm
1,207,338 UART: [idev] --
1,208,255 UART: [ldev] ++
1,208,423 UART: [ldev] CDI.KEYID = 6
1,208,787 UART: [ldev] SUBJECT.KEYID = 5
1,209,214 UART: [ldev] AUTHORITY.KEYID = 7
1,209,677 UART: [ldev] FE.KEYID = 1
1,214,969 UART: [ldev] Erasing FE.KEYID = 1
1,240,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,981 UART: [ldev] --
1,280,473 UART: [fwproc] Wait for Commands...
1,281,298 UART: [fwproc] Recv command 0x46574c44
1,282,031 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,272 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,881 >>> mbox cmd response: success
2,742,132 UART: [afmc] ++
2,742,300 UART: [afmc] CDI.KEYID = 6
2,742,663 UART: [afmc] SUBJECT.KEYID = 7
2,743,089 UART: [afmc] AUTHORITY.KEYID = 5
2,778,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,759 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,455 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,354 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,047 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,791 UART: [afmc] --
2,821,861 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,821,883 UART: [cold-reset] --
2,822,619 UART: [state] Locking Datavault
2,823,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,336 UART: [state] Locking ICCM
2,824,756 UART: [exit] Launching FMC @ 0x40000000
2,830,053 UART:
2,830,069 UART: Running Caliptra FMC ...
2,830,477 UART:
2,830,707 UART: [fmc] Received command: 0x46574C44
2,831,533 UART:
2,831,549 UART: Running Caliptra ROM ...
2,831,957 UART:
2,832,099 UART: [state] CFI Enabled
2,834,935 UART: [state] LifecycleState = Unprovisioned
2,835,590 UART: [state] DebugLocked = No
2,836,304 UART: [state] WD Timer not started. Device not locked for debugging
2,837,522 UART: [kat] SHA2-256
3,641,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,201 UART: [kat] ++
3,645,353 UART: [kat] sha1
3,649,497 UART: [kat] SHA2-256
3,651,437 UART: [kat] SHA2-384
3,654,180 UART: [kat] SHA2-512-ACC
3,656,080 UART: [kat] ECC-384
3,665,545 UART: [kat] HMAC-384Kdf
3,670,113 UART: [kat] LMS
3,918,425 UART: [kat] --
3,919,597 UART: [update-reset] ++
5,204,699 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,660 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,353,846 >>> mbox cmd response: success
5,354,081 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,095 UART: [update-reset Success] --
5,362,504 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,363,286 UART: [state] Locking Datavault
5,363,930 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,534 UART: [state] Locking ICCM
5,365,198 UART: [exit] Launching FMC @ 0x40000000
5,370,495 UART:
5,370,511 UART: Running Caliptra FMC ...
5,370,919 UART:
5,371,141 UART: [fmc] Received command: 0x1000000C
5,371,876 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,373 ready_for_fw is high
1,056,373 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,827 >>> mbox cmd response: success
2,650,224 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,656,681 UART:
2,656,697 UART: Running Caliptra FMC ...
2,657,105 UART:
2,657,335 UART: [fmc] Received command: 0x46574C44
5,061,941 >>> mbox cmd response: success
5,069,443 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,075,035 UART:
5,075,051 UART: Running Caliptra FMC ...
5,075,459 UART:
5,075,681 UART: [fmc] Received command: 0x1000000C
5,076,416 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
915,862 UART: [kat] HMAC-384Kdf
920,478 UART: [kat] LMS
1,168,790 UART: [kat] --
1,169,581 UART: [cold-reset] ++
1,170,021 UART: [fht] FHT @ 0x50003400
1,172,611 UART: [idev] ++
1,172,779 UART: [idev] CDI.KEYID = 6
1,173,140 UART: [idev] SUBJECT.KEYID = 7
1,173,565 UART: [idev] UDS.KEYID = 0
1,173,911 ready_for_fw is high
1,173,911 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,621 UART: [idev] Erasing UDS.KEYID = 0
1,198,017 UART: [idev] Sha1 KeyId Algorithm
1,207,001 UART: [idev] --
1,208,140 UART: [ldev] ++
1,208,308 UART: [ldev] CDI.KEYID = 6
1,208,672 UART: [ldev] SUBJECT.KEYID = 5
1,209,099 UART: [ldev] AUTHORITY.KEYID = 7
1,209,562 UART: [ldev] FE.KEYID = 1
1,214,752 UART: [ldev] Erasing FE.KEYID = 1
1,241,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,224 UART: [ldev] --
1,280,652 UART: [fwproc] Wait for Commands...
1,281,469 UART: [fwproc] Recv command 0x46574c44
1,282,202 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,093 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,880 >>> mbox cmd response: success
2,743,037 UART: [afmc] ++
2,743,205 UART: [afmc] CDI.KEYID = 6
2,743,568 UART: [afmc] SUBJECT.KEYID = 7
2,743,994 UART: [afmc] AUTHORITY.KEYID = 5
2,779,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,798 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,494 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,393 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,086 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,804 UART: [afmc] --
2,822,750 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,822,772 UART: [cold-reset] --
2,823,722 UART: [state] Locking Datavault
2,824,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,373 UART: [state] Locking ICCM
2,825,955 UART: [exit] Launching FMC @ 0x40000000
2,831,252 UART:
2,831,268 UART: Running Caliptra FMC ...
2,831,676 UART:
2,831,906 UART: [fmc] Received command: 0x46574C44
2,832,732 UART:
2,832,748 UART: Running Caliptra ROM ...
2,833,156 UART:
2,833,211 UART: [state] CFI Enabled
2,836,159 UART: [state] LifecycleState = Unprovisioned
2,836,814 UART: [state] DebugLocked = No
2,837,358 UART: [state] WD Timer not started. Device not locked for debugging
2,838,662 UART: [kat] SHA2-256
3,642,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,341 UART: [kat] ++
3,646,493 UART: [kat] sha1
3,650,617 UART: [kat] SHA2-256
3,652,557 UART: [kat] SHA2-384
3,655,490 UART: [kat] SHA2-512-ACC
3,657,390 UART: [kat] ECC-384
3,667,177 UART: [kat] HMAC-384Kdf
3,671,735 UART: [kat] LMS
3,920,047 UART: [kat] --
3,921,053 UART: [update-reset] ++
5,205,241 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,368 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,354,554 >>> mbox cmd response: success
5,354,839 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,853 UART: [update-reset Success] --
5,363,262 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,363,826 UART: [state] Locking Datavault
5,364,626 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,230 UART: [state] Locking ICCM
5,365,812 UART: [exit] Launching FMC @ 0x40000000
5,371,109 UART:
5,371,125 UART: Running Caliptra FMC ...
5,371,533 UART:
5,371,755 UART: [fmc] Received command: 0x1000000C
5,372,490 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,706 ready_for_fw is high
1,055,706 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,508 >>> mbox cmd response: success
2,650,061 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,656,216 UART:
2,656,232 UART: Running Caliptra FMC ...
2,656,640 UART:
2,656,870 UART: [fmc] Received command: 0x46574C44
5,062,653 >>> mbox cmd response: success
5,070,341 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,076,509 UART:
5,076,525 UART: Running Caliptra FMC ...
5,076,933 UART:
5,077,155 UART: [fmc] Received command: 0x1000000C
5,077,890 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,777 UART: [kat] HMAC-384Kdf
921,339 UART: [kat] LMS
1,169,651 UART: [kat] --
1,170,606 UART: [cold-reset] ++
1,171,116 UART: [fht] FHT @ 0x50003400
1,173,744 UART: [idev] ++
1,173,912 UART: [idev] CDI.KEYID = 6
1,174,273 UART: [idev] SUBJECT.KEYID = 7
1,174,698 UART: [idev] UDS.KEYID = 0
1,175,044 ready_for_fw is high
1,175,044 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,826 UART: [idev] Erasing UDS.KEYID = 0
1,200,362 UART: [idev] Sha1 KeyId Algorithm
1,209,106 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,813 UART: [ldev] SUBJECT.KEYID = 5
1,211,240 UART: [ldev] AUTHORITY.KEYID = 7
1,211,703 UART: [ldev] FE.KEYID = 1
1,216,995 UART: [ldev] Erasing FE.KEYID = 1
1,243,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,251 UART: [ldev] --
1,282,753 UART: [fwproc] Wait for Commands...
1,283,520 UART: [fwproc] Recv command 0x46574c44
1,284,253 UART: [fwproc] Recv'd Img size: 112032 bytes
2,556,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,583,630 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,609,315 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,745,427 >>> mbox cmd response: success
2,746,470 UART: [afmc] ++
2,746,638 UART: [afmc] CDI.KEYID = 6
2,747,001 UART: [afmc] SUBJECT.KEYID = 7
2,747,427 UART: [afmc] AUTHORITY.KEYID = 5
2,782,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,009 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,805,705 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,604 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,297 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,095 UART: [afmc] --
2,825,969 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,825,991 UART: [cold-reset] --
2,826,897 UART: [state] Locking Datavault
2,828,200 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,804 UART: [state] Locking ICCM
2,829,238 UART: [exit] Launching FMC @ 0x40000000
2,834,535 UART:
2,834,551 UART: Running Caliptra FMC ...
2,834,959 UART:
2,835,189 UART: [fmc] Received command: 0x46574C44
2,836,015 UART:
2,836,031 UART: Running Caliptra ROM ...
2,836,439 UART:
2,836,581 UART: [state] CFI Enabled
2,839,633 UART: [state] LifecycleState = Unprovisioned
2,840,288 UART: [state] DebugLocked = No
2,840,960 UART: [state] WD Timer not started. Device not locked for debugging
2,842,084 UART: [kat] SHA2-256
3,645,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,649,763 UART: [kat] ++
3,649,915 UART: [kat] sha1
3,654,221 UART: [kat] SHA2-256
3,656,161 UART: [kat] SHA2-384
3,658,846 UART: [kat] SHA2-512-ACC
3,660,746 UART: [kat] ECC-384
3,670,005 UART: [kat] HMAC-384Kdf
3,674,747 UART: [kat] LMS
3,923,059 UART: [kat] --
3,923,991 UART: [update-reset] ++
5,210,433 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,211,512 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,359,698 >>> mbox cmd response: success
5,359,931 UART: [update-reset] Copying MAN_2 To MAN_1
5,367,945 UART: [update-reset Success] --
5,368,354 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,369,036 UART: [state] Locking Datavault
5,369,880 UART: [state] Locking PCR0, PCR1 and PCR31
5,370,484 UART: [state] Locking ICCM
5,371,038 UART: [exit] Launching FMC @ 0x40000000
5,376,335 UART:
5,376,351 UART: Running Caliptra FMC ...
5,376,759 UART:
5,376,981 UART: [fmc] Received command: 0x1000000C
5,377,716 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,357 ready_for_fw is high
1,056,357 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,965 >>> mbox cmd response: success
2,647,742 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,654,101 UART:
2,654,117 UART: Running Caliptra FMC ...
2,654,525 UART:
2,654,755 UART: [fmc] Received command: 0x46574C44
5,059,575 >>> mbox cmd response: success
5,067,155 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,073,081 UART:
5,073,097 UART: Running Caliptra FMC ...
5,073,505 UART:
5,073,727 UART: [fmc] Received command: 0x1000000C
5,074,462 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,409 writing to cptra_bootfsm_go
193,478 UART:
193,844 UART: Running Caliptra ROM ...
195,030 UART:
195,188 UART: [state] CFI Enabled
267,632 UART: [state] LifecycleState = Unprovisioned
270,041 UART: [state] DebugLocked = No
272,215 UART: [state] WD Timer not started. Device not locked for debugging
276,061 UART: [kat] SHA2-256
458,045 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,510 UART: [kat] ++
470,039 UART: [kat] sha1
480,060 UART: [kat] SHA2-256
483,035 UART: [kat] SHA2-384
489,509 UART: [kat] SHA2-512-ACC
492,174 UART: [kat] ECC-384
3,777,196 UART: [kat] HMAC-384Kdf
3,804,198 UART: [kat] LMS
4,877,332 UART: [kat] --
4,881,928 UART: [cold-reset] ++
4,882,967 UART: [fht] FHT @ 0x50003400
4,894,027 UART: [idev] ++
4,894,679 UART: [idev] CDI.KEYID = 6
4,895,849 UART: [idev] SUBJECT.KEYID = 7
4,897,046 UART: [idev] UDS.KEYID = 0
4,897,945 ready_for_fw is high
4,898,135 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,038,475 UART: [idev] Erasing UDS.KEYID = 0
8,242,991 UART: [idev] Sha1 KeyId Algorithm
8,264,745 UART: [idev] --
8,268,190 UART: [ldev] ++
8,268,765 UART: [ldev] CDI.KEYID = 6
8,269,998 UART: [ldev] SUBJECT.KEYID = 5
8,271,158 UART: [ldev] AUTHORITY.KEYID = 7
8,272,382 UART: [ldev] FE.KEYID = 1
8,299,673 UART: [ldev] Erasing FE.KEYID = 1
11,639,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,993,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,014,627 UART: [ldev] --
14,018,768 UART: [fwproc] Wait for Commands...
14,021,945 UART: [fwproc] Recv command 0x46574c44
14,024,252 UART: [fwproc] Recv'd Img size: 111688 bytes
18,064,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,136,884 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,197,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,514,286 >>> mbox cmd response: success
18,517,924 UART: [afmc] ++
18,518,645 UART: [afmc] CDI.KEYID = 6
18,519,766 UART: [afmc] SUBJECT.KEYID = 7
18,520,987 UART: [afmc] AUTHORITY.KEYID = 5
21,887,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,183,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,185,709 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
24,201,812 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
24,217,943 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
24,233,914 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
24,257,448 UART: [afmc] --
26,321,751 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
26,457,228 UART: [cold-reset] --
26,458,173 UART: [state] Locking Datavault
26,459,284 UART: [state] Locking PCR0, PCR1 and PCR31
26,460,840 UART: [state] Locking ICCM
26,461,716 UART: [exit] Launching FMC @ 0x40000000
26,463,060 UART:
26,463,211 UART: Running Caliptra FMC ...
26,464,323 UART:
26,464,478 UART: [fmc] Received command: 0x46574C44
26,465,935 UART:
26,466,092 UART: Running Caliptra ROM ...
26,467,114 UART:
26,467,257 UART: [state] CFI Enabled
26,524,127 UART: [state] LifecycleState = Unprovisioned
26,526,016 UART: [state] DebugLocked = No
26,528,459 UART: [state] WD Timer not started. Device not locked for debugging
26,533,618 UART: [kat] SHA2-256
26,715,543 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,727,069 UART: [kat] ++
26,727,532 UART: [kat] sha1
26,738,905 UART: [kat] SHA2-256
26,741,916 UART: [kat] SHA2-384
26,748,935 UART: [kat] SHA2-512-ACC
26,751,555 UART: [kat] ECC-384
30,037,171 UART: [kat] HMAC-384Kdf
30,061,305 UART: [kat] LMS
31,134,414 UART: [kat] --
31,138,897 UART: [update-reset] ++
31,185,797 >>> mbox cmd response: failed
31,186,154 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
31,187,504 UART: ROM Non-Fatal Error: 0x000B001E
31,189,584 UART: [state] Locking Datavault
31,192,712 UART: [state] Locking PCR0, PCR1 and PCR31
31,194,901 UART: [state] Locking ICCM
31,197,315 UART: [exit] Launching FMC @ 0x40000000
31,205,995 UART:
31,206,269 UART: Running Caliptra FMC ...
31,207,299 UART:
31,207,446 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
31,209,085 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
4,803,380 ready_for_fw is high
4,803,795 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,319,504 >>> mbox cmd response: success
26,058,155 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
26,193,451 UART:
26,193,886 UART: Running Caliptra FMC ...
26,194,972 UART:
26,195,122 UART: [fmc] Received command: 0x46574C44
30,838,218 >>> mbox cmd response: failed
30,838,653 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
30,848,572 UART:
30,848,837 UART: Running Caliptra FMC ...
30,849,903 UART:
30,850,053 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
30,851,702 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,428 UART:
192,817 UART: Running Caliptra ROM ...
193,912 UART:
603,596 UART: [state] CFI Enabled
614,609 UART: [state] LifecycleState = Unprovisioned
616,907 UART: [state] DebugLocked = No
619,150 UART: [state] WD Timer not started. Device not locked for debugging
623,537 UART: [kat] SHA2-256
805,493 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,986 UART: [kat] ++
817,514 UART: [kat] sha1
829,372 UART: [kat] SHA2-256
832,444 UART: [kat] SHA2-384
838,777 UART: [kat] SHA2-512-ACC
841,357 UART: [kat] ECC-384
4,096,806 UART: [kat] HMAC-384Kdf
4,109,040 UART: [kat] LMS
5,182,164 UART: [kat] --
5,186,102 UART: [cold-reset] ++
5,188,184 UART: [fht] FHT @ 0x50003400
5,199,939 UART: [idev] ++
5,200,645 UART: [idev] CDI.KEYID = 6
5,201,887 UART: [idev] SUBJECT.KEYID = 7
5,203,271 UART: [idev] UDS.KEYID = 0
5,204,447 ready_for_fw is high
5,204,629 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,344,912 UART: [idev] Erasing UDS.KEYID = 0
8,488,125 UART: [idev] Sha1 KeyId Algorithm
8,509,955 UART: [idev] --
8,514,441 UART: [ldev] ++
8,515,013 UART: [ldev] CDI.KEYID = 6
8,516,243 UART: [ldev] SUBJECT.KEYID = 5
8,517,666 UART: [ldev] AUTHORITY.KEYID = 7
8,519,286 UART: [ldev] FE.KEYID = 1
8,531,706 UART: [ldev] Erasing FE.KEYID = 1
11,821,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,345 UART: [ldev] --
14,187,601 UART: [fwproc] Wait for Commands...
14,189,468 UART: [fwproc] Recv command 0x46574c44
14,191,766 UART: [fwproc] Recv'd Img size: 111688 bytes
18,230,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,304,638 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,364,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,681,640 >>> mbox cmd response: success
18,686,167 UART: [afmc] ++
18,686,867 UART: [afmc] CDI.KEYID = 6
18,688,057 UART: [afmc] SUBJECT.KEYID = 7
18,689,214 UART: [afmc] AUTHORITY.KEYID = 5
22,000,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,295,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,297,184 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
24,313,337 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
24,329,454 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
24,345,429 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
24,368,732 UART: [afmc] --
26,432,291 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
26,567,742 UART: [cold-reset] --
26,568,696 UART: [state] Locking Datavault
26,569,777 UART: [state] Locking PCR0, PCR1 and PCR31
26,571,318 UART: [state] Locking ICCM
26,572,239 UART: [exit] Launching FMC @ 0x40000000
26,573,659 UART:
26,573,814 UART: Running Caliptra FMC ...
26,574,908 UART:
26,575,056 UART: [fmc] Received command: 0x46574C44
26,576,508 UART:
26,576,658 UART: Running Caliptra ROM ...
26,577,744 UART:
26,577,915 UART: [state] CFI Enabled
26,588,280 UART: [state] LifecycleState = Unprovisioned
26,590,102 UART: [state] DebugLocked = No
26,592,443 UART: [state] WD Timer not started. Device not locked for debugging
26,596,459 UART: [kat] SHA2-256
26,778,401 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,789,961 UART: [kat] ++
26,790,419 UART: [kat] sha1
26,800,542 UART: [kat] SHA2-256
26,803,557 UART: [kat] SHA2-384
26,809,053 UART: [kat] SHA2-512-ACC
26,811,673 UART: [kat] ECC-384
30,066,998 UART: [kat] HMAC-384Kdf
30,079,674 UART: [kat] LMS
31,152,808 UART: [kat] --
31,155,970 UART: [update-reset] ++
31,198,471 >>> mbox cmd response: failed
31,198,868 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
31,201,628 UART: ROM Non-Fatal Error: 0x000B001E
31,205,050 UART: [state] Locking Datavault
31,208,157 UART: [state] Locking PCR0, PCR1 and PCR31
31,210,350 UART: [state] Locking ICCM
31,211,849 UART: [exit] Launching FMC @ 0x40000000
31,220,517 UART:
31,220,743 UART: Running Caliptra FMC ...
31,221,833 UART:
31,221,980 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
31,223,625 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
5,100,253 ready_for_fw is high
5,100,765 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,496,900 >>> mbox cmd response: success
26,178,213 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
26,313,883 UART:
26,314,340 UART: Running Caliptra FMC ...
26,315,472 UART:
26,315,625 UART: [fmc] Received command: 0x46574C44
30,851,591 >>> mbox cmd response: failed
30,852,037 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
30,864,858 UART:
30,865,159 UART: Running Caliptra FMC ...
30,866,320 UART:
30,866,497 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
30,868,139 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,122 UART:
192,496 UART: Running Caliptra ROM ...
193,583 UART:
193,722 UART: [state] CFI Enabled
265,655 UART: [state] LifecycleState = Unprovisioned
267,595 UART: [state] DebugLocked = No
269,333 UART: [state] WD Timer not started. Device not locked for debugging
272,801 UART: [kat] SHA2-256
451,924 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,436 UART: [kat] ++
463,883 UART: [kat] sha1
475,108 UART: [kat] SHA2-256
478,117 UART: [kat] SHA2-384
485,249 UART: [kat] SHA2-512-ACC
488,257 UART: [kat] ECC-384
2,948,617 UART: [kat] HMAC-384Kdf
2,972,378 UART: [kat] LMS
3,501,807 UART: [kat] --
3,506,088 UART: [cold-reset] ++
3,508,380 UART: [fht] FHT @ 0x50003400
3,519,855 UART: [idev] ++
3,520,449 UART: [idev] CDI.KEYID = 6
3,521,358 UART: [idev] SUBJECT.KEYID = 7
3,522,538 UART: [idev] UDS.KEYID = 0
3,523,462 ready_for_fw is high
3,523,650 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,664,577 UART: [idev] Erasing UDS.KEYID = 0
6,027,931 UART: [idev] Sha1 KeyId Algorithm
6,051,128 UART: [idev] --
6,054,280 UART: [ldev] ++
6,054,860 UART: [ldev] CDI.KEYID = 6
6,055,781 UART: [ldev] SUBJECT.KEYID = 5
6,056,943 UART: [ldev] AUTHORITY.KEYID = 7
6,058,179 UART: [ldev] FE.KEYID = 1
6,099,616 UART: [ldev] Erasing FE.KEYID = 1
8,602,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,649 UART: [ldev] --
10,413,219 UART: [fwproc] Wait for Commands...
10,414,823 UART: [fwproc] Recv command 0x46574c44
10,416,930 UART: [fwproc] Recv'd Img size: 112032 bytes
13,787,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,862,134 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,922,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,240,342 >>> mbox cmd response: success
14,244,420 UART: [afmc] ++
14,245,035 UART: [afmc] CDI.KEYID = 6
14,245,926 UART: [afmc] SUBJECT.KEYID = 7
14,247,095 UART: [afmc] AUTHORITY.KEYID = 5
16,783,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,554 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,526,569 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,542,619 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,558,391 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,581,167 UART: [afmc] --
20,651,642 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,787,631 UART: [cold-reset] --
20,788,633 UART: [state] Locking Datavault
20,789,716 UART: [state] Locking PCR0, PCR1 and PCR31
20,791,265 UART: [state] Locking ICCM
20,792,178 UART: [exit] Launching FMC @ 0x40000000
20,793,608 UART:
20,793,769 UART: Running Caliptra FMC ...
20,794,873 UART:
20,795,027 UART: [fmc] Received command: 0x46574C44
20,796,496 UART:
20,796,654 UART: Running Caliptra ROM ...
20,797,749 UART:
20,797,904 UART: [state] CFI Enabled
20,845,495 UART: [state] LifecycleState = Unprovisioned
20,847,447 UART: [state] DebugLocked = No
20,849,001 UART: [state] WD Timer not started. Device not locked for debugging
20,852,337 UART: [kat] SHA2-256
21,031,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,042,996 UART: [kat] ++
21,043,537 UART: [kat] sha1
21,055,665 UART: [kat] SHA2-256
21,058,692 UART: [kat] SHA2-384
21,065,288 UART: [kat] SHA2-512-ACC
21,068,235 UART: [kat] ECC-384
23,532,399 UART: [kat] HMAC-384Kdf
23,556,153 UART: [kat] LMS
24,085,632 UART: [kat] --
24,091,139 UART: [update-reset] ++
24,139,559 >>> mbox cmd response: failed
24,139,951 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,140,933 UART: ROM Non-Fatal Error: 0x000B001E
24,143,068 UART: [state] Locking Datavault
24,145,263 UART: [state] Locking PCR0, PCR1 and PCR31
24,146,911 UART: [state] Locking ICCM
24,149,064 UART: [exit] Launching FMC @ 0x40000000
24,157,461 UART:
24,157,711 UART: Running Caliptra FMC ...
24,158,818 UART:
24,158,974 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,160,609 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,381,139 ready_for_fw is high
3,381,687 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,029,170 >>> mbox cmd response: success
20,375,191 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,510,820 UART:
20,511,269 UART: Running Caliptra FMC ...
20,512,380 UART:
20,512,532 UART: [fmc] Received command: 0x46574C44
23,702,067 >>> mbox cmd response: failed
23,702,527 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,716,688 UART:
23,716,947 UART: Running Caliptra FMC ...
23,718,036 UART:
23,718,187 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,719,831 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
192,421 UART:
192,784 UART: Running Caliptra ROM ...
193,967 UART:
603,478 UART: [state] CFI Enabled
612,158 UART: [state] LifecycleState = Unprovisioned
613,962 UART: [state] DebugLocked = No
615,341 UART: [state] WD Timer not started. Device not locked for debugging
619,870 UART: [kat] SHA2-256
798,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
810,538 UART: [kat] ++
811,062 UART: [kat] sha1
822,396 UART: [kat] SHA2-256
825,367 UART: [kat] SHA2-384
831,928 UART: [kat] SHA2-512-ACC
834,888 UART: [kat] ECC-384
3,278,582 UART: [kat] HMAC-384Kdf
3,290,958 UART: [kat] LMS
3,820,500 UART: [kat] --
3,825,844 UART: [cold-reset] ++
3,828,197 UART: [fht] FHT @ 0x50003400
3,839,522 UART: [idev] ++
3,840,076 UART: [idev] CDI.KEYID = 6
3,841,105 UART: [idev] SUBJECT.KEYID = 7
3,842,206 UART: [idev] UDS.KEYID = 0
3,843,252 ready_for_fw is high
3,843,462 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,984,614 UART: [idev] Erasing UDS.KEYID = 0
6,318,955 UART: [idev] Sha1 KeyId Algorithm
6,342,068 UART: [idev] --
6,345,007 UART: [ldev] ++
6,345,612 UART: [ldev] CDI.KEYID = 6
6,346,531 UART: [ldev] SUBJECT.KEYID = 5
6,347,635 UART: [ldev] AUTHORITY.KEYID = 7
6,348,918 UART: [ldev] FE.KEYID = 1
6,359,754 UART: [ldev] Erasing FE.KEYID = 1
8,833,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,125 UART: [ldev] --
10,625,571 UART: [fwproc] Wait for Commands...
10,628,798 UART: [fwproc] Recv command 0x46574c44
10,630,883 UART: [fwproc] Recv'd Img size: 112032 bytes
14,010,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,084,142 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,144,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,461,979 >>> mbox cmd response: success
14,466,591 UART: [afmc] ++
14,467,206 UART: [afmc] CDI.KEYID = 6
14,468,118 UART: [afmc] SUBJECT.KEYID = 7
14,469,277 UART: [afmc] AUTHORITY.KEYID = 5
16,967,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,687,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,689,254 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,705,242 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,721,265 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,737,057 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,758,927 UART: [afmc] --
20,824,296 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,959,926 UART: [cold-reset] --
20,960,850 UART: [state] Locking Datavault
20,962,010 UART: [state] Locking PCR0, PCR1 and PCR31
20,963,553 UART: [state] Locking ICCM
20,964,466 UART: [exit] Launching FMC @ 0x40000000
20,965,892 UART:
20,966,076 UART: Running Caliptra FMC ...
20,967,175 UART:
20,967,328 UART: [fmc] Received command: 0x46574C44
20,968,805 UART:
20,968,964 UART: Running Caliptra ROM ...
20,970,059 UART:
20,970,214 UART: [state] CFI Enabled
20,978,909 UART: [state] LifecycleState = Unprovisioned
20,980,831 UART: [state] DebugLocked = No
20,982,610 UART: [state] WD Timer not started. Device not locked for debugging
20,986,678 UART: [kat] SHA2-256
21,165,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,177,395 UART: [kat] ++
21,177,932 UART: [kat] sha1
21,188,336 UART: [kat] SHA2-256
21,191,339 UART: [kat] SHA2-384
21,196,996 UART: [kat] SHA2-512-ACC
21,199,988 UART: [kat] ECC-384
23,641,925 UART: [kat] HMAC-384Kdf
23,655,954 UART: [kat] LMS
24,185,457 UART: [kat] --
24,191,174 UART: [update-reset] ++
24,236,452 >>> mbox cmd response: failed
24,236,811 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,238,654 UART: ROM Non-Fatal Error: 0x000B001E
24,241,537 UART: [state] Locking Datavault
24,243,542 UART: [state] Locking PCR0, PCR1 and PCR31
24,245,181 UART: [state] Locking ICCM
24,247,165 UART: [exit] Launching FMC @ 0x40000000
24,255,562 UART:
24,255,799 UART: Running Caliptra FMC ...
24,256,898 UART:
24,257,051 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,258,682 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,701,095 ready_for_fw is high
3,701,477 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,234,954 >>> mbox cmd response: success
20,524,922 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,660,560 UART:
20,660,994 UART: Running Caliptra FMC ...
20,662,079 UART:
20,662,235 UART: [fmc] Received command: 0x46574C44
23,793,961 >>> mbox cmd response: failed
23,794,386 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,805,144 UART:
23,805,397 UART: Running Caliptra FMC ...
23,806,561 UART:
23,806,718 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,808,353 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,396,910 ready_for_fw is high
3,397,524 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,065,574 >>> mbox cmd response: success
20,406,533 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,542,182 UART:
20,542,629 UART: Running Caliptra FMC ...
20,543,708 UART:
20,543,864 UART: [fmc] Received command: 0x46574C44
23,735,338 >>> mbox cmd response: failed
23,735,801 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,746,781 UART:
23,747,040 UART: Running Caliptra FMC ...
23,748,127 UART:
23,748,274 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,749,924 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
3,695,330 ready_for_fw is high
3,695,825 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,235,262 >>> mbox cmd response: success
20,524,544 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
20,660,180 UART:
20,660,618 UART: Running Caliptra FMC ...
20,661,788 UART:
20,661,957 UART: [fmc] Received command: 0x46574C44
23,787,155 >>> mbox cmd response: failed
23,787,601 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,799,611 UART:
23,799,862 UART: Running Caliptra FMC ...
23,800,947 UART:
23,801,097 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,802,766 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,602 UART: [kat] LMS
1,168,914 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,169,929 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
1,174,097 ready_for_fw is high
1,174,097 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,198,755 UART: [idev] Sha1 KeyId Algorithm
1,207,805 UART: [idev] --
1,208,772 UART: [ldev] ++
1,208,940 UART: [ldev] CDI.KEYID = 6
1,209,304 UART: [ldev] SUBJECT.KEYID = 5
1,209,731 UART: [ldev] AUTHORITY.KEYID = 7
1,210,194 UART: [ldev] FE.KEYID = 1
1,215,312 UART: [ldev] Erasing FE.KEYID = 1
1,240,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,368 UART: [ldev] --
1,279,640 UART: [fwproc] Wait for Commands...
1,280,459 UART: [fwproc] Recv command 0x46574c44
1,281,192 UART: [fwproc] Recv'd Img size: 112032 bytes
2,551,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,252 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,739,907 >>> mbox cmd response: success
2,740,956 UART: [afmc] ++
2,741,124 UART: [afmc] CDI.KEYID = 6
2,741,487 UART: [afmc] SUBJECT.KEYID = 7
2,741,913 UART: [afmc] AUTHORITY.KEYID = 5
2,777,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,675 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,800,390 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,806,282 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,811,994 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,819,767 UART: [afmc] --
2,820,681 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,820,703 UART: [cold-reset] --
2,821,691 UART: [state] Locking Datavault
2,822,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,442 UART: [state] Locking ICCM
2,823,896 UART: [exit] Launching FMC @ 0x40000000
2,829,193 UART:
2,829,209 UART: Running Caliptra FMC ...
2,829,617 UART:
2,829,847 UART: [fmc] Received command: 0x46574C44
2,830,673 UART:
2,830,689 UART: Running Caliptra ROM ...
2,831,097 UART:
2,831,152 UART: [state] CFI Enabled
2,833,696 UART: [state] LifecycleState = Unprovisioned
2,834,351 UART: [state] DebugLocked = No
2,834,923 UART: [state] WD Timer not started. Device not locked for debugging
2,836,209 UART: [kat] SHA2-256
3,639,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,888 UART: [kat] ++
3,644,040 UART: [kat] sha1
3,648,330 UART: [kat] SHA2-256
3,650,270 UART: [kat] SHA2-384
3,652,923 UART: [kat] SHA2-512-ACC
3,654,823 UART: [kat] ECC-384
3,664,530 UART: [kat] HMAC-384Kdf
3,669,314 UART: [kat] LMS
3,917,626 UART: [kat] --
3,918,526 UART: [update-reset] ++
3,935,190 >>> mbox cmd response: failed
3,935,190 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,935,612 UART: ROM Non-Fatal Error: 0x000B001E
3,936,584 UART: [state] Locking Datavault
3,937,444 UART: [state] Locking PCR0, PCR1 and PCR31
3,938,048 UART: [state] Locking ICCM
3,938,718 UART: [exit] Launching FMC @ 0x40000000
3,944,015 UART:
3,944,031 UART: Running Caliptra FMC ...
3,944,439 UART:
3,944,661 UART: [fmc] Received command: 0x1000000C
3,945,396 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,436 ready_for_fw is high
1,055,436 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,590,653 >>> mbox cmd response: success
2,646,700 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,653,109 UART:
2,653,125 UART: Running Caliptra FMC ...
2,653,533 UART:
2,653,763 UART: [fmc] Received command: 0x46574C44
3,642,610 >>> mbox cmd response: failed
3,642,610 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,648,107 UART:
3,648,123 UART: Running Caliptra FMC ...
3,648,531 UART:
3,648,753 UART: [fmc] Received command: 0x1000000C
3,649,488 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,781 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,472 UART: [cold-reset] ++
1,171,052 UART: [fht] FHT @ 0x50003400
1,173,714 UART: [idev] ++
1,173,882 UART: [idev] CDI.KEYID = 6
1,174,243 UART: [idev] SUBJECT.KEYID = 7
1,174,668 UART: [idev] UDS.KEYID = 0
1,175,014 ready_for_fw is high
1,175,014 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,986 UART: [idev] Erasing UDS.KEYID = 0
1,199,902 UART: [idev] Sha1 KeyId Algorithm
1,208,874 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,295 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,369 UART: [fwproc] Wait for Commands...
1,282,982 UART: [fwproc] Recv command 0x46574c44
1,283,715 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,581,023 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,708 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,790 >>> mbox cmd response: success
2,743,807 UART: [afmc] ++
2,743,975 UART: [afmc] CDI.KEYID = 6
2,744,338 UART: [afmc] SUBJECT.KEYID = 7
2,744,764 UART: [afmc] AUTHORITY.KEYID = 5
2,780,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,644 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,803,359 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,809,251 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,814,963 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,822,666 UART: [afmc] --
2,823,552 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,823,574 UART: [cold-reset] --
2,824,512 UART: [state] Locking Datavault
2,825,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,327 UART: [state] Locking ICCM
2,826,763 UART: [exit] Launching FMC @ 0x40000000
2,832,060 UART:
2,832,076 UART: Running Caliptra FMC ...
2,832,484 UART:
2,832,714 UART: [fmc] Received command: 0x46574C44
2,833,540 UART:
2,833,556 UART: Running Caliptra ROM ...
2,833,964 UART:
2,834,106 UART: [state] CFI Enabled
2,837,132 UART: [state] LifecycleState = Unprovisioned
2,837,787 UART: [state] DebugLocked = No
2,838,521 UART: [state] WD Timer not started. Device not locked for debugging
2,839,673 UART: [kat] SHA2-256
3,643,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,352 UART: [kat] ++
3,647,504 UART: [kat] sha1
3,651,788 UART: [kat] SHA2-256
3,653,728 UART: [kat] SHA2-384
3,656,625 UART: [kat] SHA2-512-ACC
3,658,525 UART: [kat] ECC-384
3,667,766 UART: [kat] HMAC-384Kdf
3,672,570 UART: [kat] LMS
3,920,882 UART: [kat] --
3,922,072 UART: [update-reset] ++
3,938,962 >>> mbox cmd response: failed
3,938,962 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,939,500 UART: ROM Non-Fatal Error: 0x000B001E
3,940,332 UART: [state] Locking Datavault
3,941,096 UART: [state] Locking PCR0, PCR1 and PCR31
3,941,700 UART: [state] Locking ICCM
3,942,322 UART: [exit] Launching FMC @ 0x40000000
3,947,619 UART:
3,947,635 UART: Running Caliptra FMC ...
3,948,043 UART:
3,948,265 UART: [fmc] Received command: 0x1000000C
3,949,000 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,455 ready_for_fw is high
1,056,455 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,358 >>> mbox cmd response: success
2,648,169 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,654,358 UART:
2,654,374 UART: Running Caliptra FMC ...
2,654,782 UART:
2,655,012 UART: [fmc] Received command: 0x46574C44
3,643,614 >>> mbox cmd response: failed
3,643,614 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,649,481 UART:
3,649,497 UART: Running Caliptra FMC ...
3,649,905 UART:
3,650,127 UART: [fmc] Received command: 0x1000000C
3,650,862 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,290 UART: [kat] SHA2-256
890,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,969 UART: [kat] ++
895,121 UART: [kat] sha1
899,341 UART: [kat] SHA2-256
901,281 UART: [kat] SHA2-384
904,106 UART: [kat] SHA2-512-ACC
906,007 UART: [kat] ECC-384
915,548 UART: [kat] HMAC-384Kdf
920,066 UART: [kat] LMS
1,168,378 UART: [kat] --
1,169,463 UART: [cold-reset] ++
1,169,809 UART: [fht] FHT @ 0x50003400
1,172,481 UART: [idev] ++
1,172,649 UART: [idev] CDI.KEYID = 6
1,173,010 UART: [idev] SUBJECT.KEYID = 7
1,173,435 UART: [idev] UDS.KEYID = 0
1,173,781 ready_for_fw is high
1,173,781 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,125 UART: [idev] Erasing UDS.KEYID = 0
1,197,919 UART: [idev] Sha1 KeyId Algorithm
1,206,655 UART: [idev] --
1,207,476 UART: [ldev] ++
1,207,644 UART: [ldev] CDI.KEYID = 6
1,208,008 UART: [ldev] SUBJECT.KEYID = 5
1,208,435 UART: [ldev] AUTHORITY.KEYID = 7
1,208,898 UART: [ldev] FE.KEYID = 1
1,214,274 UART: [ldev] Erasing FE.KEYID = 1
1,240,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,790 UART: [ldev] --
1,280,196 UART: [fwproc] Wait for Commands...
1,280,819 UART: [fwproc] Recv command 0x46574c44
1,281,552 UART: [fwproc] Recv'd Img size: 112032 bytes
2,551,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,644 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,293 >>> mbox cmd response: success
2,741,376 UART: [afmc] ++
2,741,544 UART: [afmc] CDI.KEYID = 6
2,741,907 UART: [afmc] SUBJECT.KEYID = 7
2,742,333 UART: [afmc] AUTHORITY.KEYID = 5
2,777,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,343 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,801,058 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,806,950 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,662 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,820,415 UART: [afmc] --
2,821,379 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,821,401 UART: [cold-reset] --
2,822,281 UART: [state] Locking Datavault
2,823,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,102 UART: [state] Locking ICCM
2,824,744 UART: [exit] Launching FMC @ 0x40000000
2,830,041 UART:
2,830,057 UART: Running Caliptra FMC ...
2,830,465 UART:
2,830,695 UART: [fmc] Received command: 0x46574C44
2,831,521 UART:
2,831,537 UART: Running Caliptra ROM ...
2,831,945 UART:
2,832,000 UART: [state] CFI Enabled
2,835,040 UART: [state] LifecycleState = Unprovisioned
2,835,695 UART: [state] DebugLocked = No
2,836,189 UART: [state] WD Timer not started. Device not locked for debugging
2,837,515 UART: [kat] SHA2-256
3,641,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,194 UART: [kat] ++
3,645,346 UART: [kat] sha1
3,649,818 UART: [kat] SHA2-256
3,651,758 UART: [kat] SHA2-384
3,654,411 UART: [kat] SHA2-512-ACC
3,656,311 UART: [kat] ECC-384
3,665,600 UART: [kat] HMAC-384Kdf
3,670,128 UART: [kat] LMS
3,918,440 UART: [kat] --
3,919,382 UART: [update-reset] ++
3,935,824 >>> mbox cmd response: failed
3,935,824 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,936,154 UART: ROM Non-Fatal Error: 0x000B001E
3,936,980 UART: [state] Locking Datavault
3,937,932 UART: [state] Locking PCR0, PCR1 and PCR31
3,938,536 UART: [state] Locking ICCM
3,939,116 UART: [exit] Launching FMC @ 0x40000000
3,944,413 UART:
3,944,429 UART: Running Caliptra FMC ...
3,944,837 UART:
3,945,059 UART: [fmc] Received command: 0x1000000C
3,945,794 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,688 ready_for_fw is high
1,056,688 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,751 >>> mbox cmd response: success
2,648,604 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,654,377 UART:
2,654,393 UART: Running Caliptra FMC ...
2,654,801 UART:
2,655,031 UART: [fmc] Received command: 0x46574C44
3,642,902 >>> mbox cmd response: failed
3,642,902 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,648,389 UART:
3,648,405 UART: Running Caliptra FMC ...
3,648,813 UART:
3,649,035 UART: [fmc] Received command: 0x1000000C
3,649,770 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,699 UART: [kat] SHA2-512-ACC
906,600 UART: [kat] ECC-384
916,613 UART: [kat] HMAC-384Kdf
921,225 UART: [kat] LMS
1,169,537 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,972 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,175,046 ready_for_fw is high
1,175,046 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,714 UART: [idev] Erasing UDS.KEYID = 0
1,200,210 UART: [idev] Sha1 KeyId Algorithm
1,208,930 UART: [idev] --
1,210,051 UART: [ldev] ++
1,210,219 UART: [ldev] CDI.KEYID = 6
1,210,583 UART: [ldev] SUBJECT.KEYID = 5
1,211,010 UART: [ldev] AUTHORITY.KEYID = 7
1,211,473 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,153 UART: [ldev] --
1,282,585 UART: [fwproc] Wait for Commands...
1,283,358 UART: [fwproc] Recv command 0x46574c44
1,284,091 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,580,593 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,398 >>> mbox cmd response: success
2,743,573 UART: [afmc] ++
2,743,741 UART: [afmc] CDI.KEYID = 6
2,744,104 UART: [afmc] SUBJECT.KEYID = 7
2,744,530 UART: [afmc] AUTHORITY.KEYID = 5
2,780,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,074 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,802,789 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,808,681 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,814,393 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,822,204 UART: [afmc] --
2,823,088 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,823,110 UART: [cold-reset] --
2,824,012 UART: [state] Locking Datavault
2,824,935 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,539 UART: [state] Locking ICCM
2,826,185 UART: [exit] Launching FMC @ 0x40000000
2,831,482 UART:
2,831,498 UART: Running Caliptra FMC ...
2,831,906 UART:
2,832,136 UART: [fmc] Received command: 0x46574C44
2,832,962 UART:
2,832,978 UART: Running Caliptra ROM ...
2,833,386 UART:
2,833,528 UART: [state] CFI Enabled
2,836,222 UART: [state] LifecycleState = Unprovisioned
2,836,877 UART: [state] DebugLocked = No
2,837,385 UART: [state] WD Timer not started. Device not locked for debugging
2,838,629 UART: [kat] SHA2-256
3,642,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,308 UART: [kat] ++
3,646,460 UART: [kat] sha1
3,650,702 UART: [kat] SHA2-256
3,652,642 UART: [kat] SHA2-384
3,655,327 UART: [kat] SHA2-512-ACC
3,657,227 UART: [kat] ECC-384
3,666,832 UART: [kat] HMAC-384Kdf
3,671,314 UART: [kat] LMS
3,919,626 UART: [kat] --
3,920,652 UART: [update-reset] ++
3,937,788 >>> mbox cmd response: failed
3,937,788 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,938,336 UART: ROM Non-Fatal Error: 0x000B001E
3,939,202 UART: [state] Locking Datavault
3,940,020 UART: [state] Locking PCR0, PCR1 and PCR31
3,940,624 UART: [state] Locking ICCM
3,941,126 UART: [exit] Launching FMC @ 0x40000000
3,946,423 UART:
3,946,439 UART: Running Caliptra FMC ...
3,946,847 UART:
3,947,069 UART: [fmc] Received command: 0x1000000C
3,947,804 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,555 ready_for_fw is high
1,056,555 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,048 >>> mbox cmd response: success
2,648,387 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,654,712 UART:
2,654,728 UART: Running Caliptra FMC ...
2,655,136 UART:
2,655,366 UART: [fmc] Received command: 0x46574C44
3,645,380 >>> mbox cmd response: failed
3,645,380 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,651,381 UART:
3,651,397 UART: Running Caliptra FMC ...
3,651,805 UART:
3,652,027 UART: [fmc] Received command: 0x1000000C
3,652,762 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,814 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,079 UART: [kat] ++
895,231 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,418 UART: [kat] SHA2-512-ACC
906,319 UART: [kat] ECC-384
915,584 UART: [kat] HMAC-384Kdf
920,236 UART: [kat] LMS
1,168,548 UART: [kat] --
1,169,243 UART: [cold-reset] ++
1,169,591 UART: [fht] FHT @ 0x50003400
1,172,385 UART: [idev] ++
1,172,553 UART: [idev] CDI.KEYID = 6
1,172,914 UART: [idev] SUBJECT.KEYID = 7
1,173,339 UART: [idev] UDS.KEYID = 0
1,173,685 ready_for_fw is high
1,173,685 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,305 UART: [idev] Erasing UDS.KEYID = 0
1,198,019 UART: [idev] Sha1 KeyId Algorithm
1,206,757 UART: [idev] --
1,207,926 UART: [ldev] ++
1,208,094 UART: [ldev] CDI.KEYID = 6
1,208,458 UART: [ldev] SUBJECT.KEYID = 5
1,208,885 UART: [ldev] AUTHORITY.KEYID = 7
1,209,348 UART: [ldev] FE.KEYID = 1
1,214,524 UART: [ldev] Erasing FE.KEYID = 1
1,240,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,670 UART: [ldev] --
1,280,170 UART: [fwproc] Wait for Commands...
1,280,821 UART: [fwproc] Recv command 0x46574c44
1,281,554 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,446 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,740,023 >>> mbox cmd response: success
2,741,168 UART: [afmc] ++
2,741,336 UART: [afmc] CDI.KEYID = 6
2,741,699 UART: [afmc] SUBJECT.KEYID = 7
2,742,125 UART: [afmc] AUTHORITY.KEYID = 5
2,777,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,823 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,800,538 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,806,430 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,142 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,819,989 UART: [afmc] --
2,820,991 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,821,013 UART: [cold-reset] --
2,821,983 UART: [state] Locking Datavault
2,823,258 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,862 UART: [state] Locking ICCM
2,824,506 UART: [exit] Launching FMC @ 0x40000000
2,829,803 UART:
2,829,819 UART: Running Caliptra FMC ...
2,830,227 UART:
2,830,457 UART: [fmc] Received command: 0x46574C44
2,831,283 UART:
2,831,299 UART: Running Caliptra ROM ...
2,831,707 UART:
2,831,762 UART: [state] CFI Enabled
2,834,044 UART: [state] LifecycleState = Unprovisioned
2,834,699 UART: [state] DebugLocked = No
2,835,199 UART: [state] WD Timer not started. Device not locked for debugging
2,836,473 UART: [kat] SHA2-256
3,640,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,152 UART: [kat] ++
3,644,304 UART: [kat] sha1
3,648,664 UART: [kat] SHA2-256
3,650,604 UART: [kat] SHA2-384
3,653,309 UART: [kat] SHA2-512-ACC
3,655,209 UART: [kat] ECC-384
3,664,830 UART: [kat] HMAC-384Kdf
3,669,530 UART: [kat] LMS
3,917,842 UART: [kat] --
3,918,528 UART: [update-reset] ++
3,935,586 >>> mbox cmd response: failed
3,935,586 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,936,040 UART: ROM Non-Fatal Error: 0x000B001E
3,936,910 UART: [state] Locking Datavault
3,937,776 UART: [state] Locking PCR0, PCR1 and PCR31
3,938,380 UART: [state] Locking ICCM
3,938,908 UART: [exit] Launching FMC @ 0x40000000
3,944,205 UART:
3,944,221 UART: Running Caliptra FMC ...
3,944,629 UART:
3,944,851 UART: [fmc] Received command: 0x1000000C
3,945,586 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,030 ready_for_fw is high
1,056,030 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,590,187 >>> mbox cmd response: success
2,645,878 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,652,015 UART:
2,652,031 UART: Running Caliptra FMC ...
2,652,439 UART:
2,652,669 UART: [fmc] Received command: 0x46574C44
3,641,968 >>> mbox cmd response: failed
3,641,968 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,647,553 UART:
3,647,569 UART: Running Caliptra FMC ...
3,647,977 UART:
3,648,199 UART: [fmc] Received command: 0x1000000C
3,648,934 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
900,328 UART: [kat] SHA2-256
902,268 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
917,039 UART: [kat] HMAC-384Kdf
921,613 UART: [kat] LMS
1,169,925 UART: [kat] --
1,170,592 UART: [cold-reset] ++
1,170,994 UART: [fht] FHT @ 0x50003400
1,173,656 UART: [idev] ++
1,173,824 UART: [idev] CDI.KEYID = 6
1,174,185 UART: [idev] SUBJECT.KEYID = 7
1,174,610 UART: [idev] UDS.KEYID = 0
1,174,956 ready_for_fw is high
1,174,956 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,482 UART: [idev] Erasing UDS.KEYID = 0
1,199,558 UART: [idev] Sha1 KeyId Algorithm
1,208,410 UART: [idev] --
1,209,301 UART: [ldev] ++
1,209,469 UART: [ldev] CDI.KEYID = 6
1,209,833 UART: [ldev] SUBJECT.KEYID = 5
1,210,260 UART: [ldev] AUTHORITY.KEYID = 7
1,210,723 UART: [ldev] FE.KEYID = 1
1,215,921 UART: [ldev] Erasing FE.KEYID = 1
1,242,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,282,103 UART: [fwproc] Wait for Commands...
1,282,748 UART: [fwproc] Recv command 0x46574c44
1,283,481 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,580,433 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,118 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,206 >>> mbox cmd response: success
2,743,473 UART: [afmc] ++
2,743,641 UART: [afmc] CDI.KEYID = 6
2,744,004 UART: [afmc] SUBJECT.KEYID = 7
2,744,430 UART: [afmc] AUTHORITY.KEYID = 5
2,780,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,556 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,803,271 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,809,163 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,814,875 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,822,654 UART: [afmc] --
2,823,568 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,823,590 UART: [cold-reset] --
2,824,422 UART: [state] Locking Datavault
2,825,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,201 UART: [state] Locking ICCM
2,826,725 UART: [exit] Launching FMC @ 0x40000000
2,832,022 UART:
2,832,038 UART: Running Caliptra FMC ...
2,832,446 UART:
2,832,676 UART: [fmc] Received command: 0x46574C44
2,833,502 UART:
2,833,518 UART: Running Caliptra ROM ...
2,833,926 UART:
2,834,068 UART: [state] CFI Enabled
2,837,154 UART: [state] LifecycleState = Unprovisioned
2,837,809 UART: [state] DebugLocked = No
2,838,469 UART: [state] WD Timer not started. Device not locked for debugging
2,839,805 UART: [kat] SHA2-256
3,643,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,484 UART: [kat] ++
3,647,636 UART: [kat] sha1
3,651,952 UART: [kat] SHA2-256
3,653,892 UART: [kat] SHA2-384
3,656,757 UART: [kat] SHA2-512-ACC
3,658,657 UART: [kat] ECC-384
3,668,492 UART: [kat] HMAC-384Kdf
3,672,988 UART: [kat] LMS
3,921,300 UART: [kat] --
3,922,186 UART: [update-reset] ++
3,939,450 >>> mbox cmd response: failed
3,939,450 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,940,016 UART: ROM Non-Fatal Error: 0x000B001E
3,940,818 UART: [state] Locking Datavault
3,941,548 UART: [state] Locking PCR0, PCR1 and PCR31
3,942,152 UART: [state] Locking ICCM
3,942,616 UART: [exit] Launching FMC @ 0x40000000
3,947,913 UART:
3,947,929 UART: Running Caliptra FMC ...
3,948,337 UART:
3,948,559 UART: [fmc] Received command: 0x1000000C
3,949,294 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,211 ready_for_fw is high
1,057,211 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,593,562 >>> mbox cmd response: success
2,649,787 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,656,240 UART:
2,656,256 UART: Running Caliptra FMC ...
2,656,664 UART:
2,656,894 UART: [fmc] Received command: 0x46574C44
3,645,634 >>> mbox cmd response: failed
3,645,634 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,650,969 UART:
3,650,985 UART: Running Caliptra FMC ...
3,651,393 UART:
3,651,615 UART: [fmc] Received command: 0x1000000C
3,652,350 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,136 UART:
192,491 UART: Running Caliptra ROM ...
193,581 UART:
193,723 UART: [state] CFI Enabled
263,643 UART: [state] LifecycleState = Unprovisioned
266,068 UART: [state] DebugLocked = No
267,313 UART: [state] WD Timer not started. Device not locked for debugging
271,268 UART: [kat] SHA2-256
453,216 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,733 UART: [kat] ++
465,180 UART: [kat] sha1
476,336 UART: [kat] SHA2-256
479,333 UART: [kat] SHA2-384
484,821 UART: [kat] SHA2-512-ACC
487,413 UART: [kat] ECC-384
3,776,457 UART: [kat] HMAC-384Kdf
3,802,511 UART: [kat] LMS
4,875,655 UART: [kat] --
4,880,222 UART: [cold-reset] ++
4,882,719 UART: [fht] FHT @ 0x50003400
4,894,495 UART: [idev] ++
4,895,168 UART: [idev] CDI.KEYID = 6
4,896,421 UART: [idev] SUBJECT.KEYID = 7
4,897,477 UART: [idev] UDS.KEYID = 0
4,898,449 ready_for_fw is high
4,898,651 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,039,437 UART: [idev] Erasing UDS.KEYID = 0
8,244,717 UART: [idev] Sha1 KeyId Algorithm
8,266,493 UART: [idev] --
8,272,089 UART: [ldev] ++
8,272,688 UART: [ldev] CDI.KEYID = 6
8,273,821 UART: [ldev] SUBJECT.KEYID = 5
8,274,977 UART: [ldev] AUTHORITY.KEYID = 7
8,276,264 UART: [ldev] FE.KEYID = 1
8,316,710 UART: [ldev] Erasing FE.KEYID = 1
11,649,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,774 UART: [ldev] --
14,017,191 UART: [fwproc] Wait for Commands...
14,020,325 UART: [fwproc] Recv command 0x46574c44
14,022,635 UART: [fwproc] Recv'd Img size: 111688 bytes
22,619,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,698,354 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,758,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
23,076,502 >>> mbox cmd response: success
23,080,183 UART: [afmc] ++
23,080,916 UART: [afmc] CDI.KEYID = 6
23,082,110 UART: [afmc] SUBJECT.KEYID = 7
23,083,269 UART: [afmc] AUTHORITY.KEYID = 5
26,443,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,745,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,747,870 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
28,763,959 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
28,780,037 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
28,796,005 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
28,818,841 UART: [afmc] --
28,824,098 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
28,964,791 UART: [cold-reset] --
28,965,649 UART: [state] Locking Datavault
28,966,824 UART: [state] Locking PCR0, PCR1 and PCR31
28,968,363 UART: [state] Locking ICCM
28,969,282 UART: [exit] Launching FMC @ 0x40000000
28,970,714 UART:
28,971,066 UART: Running Caliptra FMC ...
28,972,210 UART:
28,972,389 UART: [fmc] Received command: 0x46574C44
28,973,765 UART:
28,973,911 UART: Running Caliptra ROM ...
28,975,010 UART:
28,975,165 UART: [state] CFI Enabled
29,040,617 UART: [state] LifecycleState = Unprovisioned
29,042,454 UART: [state] DebugLocked = No
29,044,591 UART: [state] WD Timer not started. Device not locked for debugging
29,049,967 UART: [kat] SHA2-256
29,231,884 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
29,243,445 UART: [kat] ++
29,243,983 UART: [kat] sha1
29,255,200 UART: [kat] SHA2-256
29,258,220 UART: [kat] SHA2-384
29,264,202 UART: [kat] SHA2-512-ACC
29,266,819 UART: [kat] ECC-384
32,548,789 UART: [kat] HMAC-384Kdf
32,575,489 UART: [kat] LMS
33,648,660 UART: [kat] --
33,652,170 UART: [update-reset] ++
33,707,944 >>> mbox cmd response: failed
33,708,366 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,708,807 UART: ROM Non-Fatal Error: 0x000B003D
33,710,781 UART: [state] Locking Datavault
33,714,042 UART: [state] Locking PCR0, PCR1 and PCR31
33,716,181 UART: [state] Locking ICCM
33,718,841 UART: [exit] Launching FMC @ 0x40000000
33,727,514 UART:
33,727,744 UART: Running Caliptra FMC ...
33,728,841 UART:
33,728,997 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,730,634 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
4,784,190 ready_for_fw is high
4,784,655 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,436,620 >>> mbox cmd response: success
28,119,313 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
28,260,515 UART:
28,260,896 UART: Running Caliptra FMC ...
28,262,087 UART:
28,262,263 UART: [fmc] Received command: 0x46574C44
32,904,148 >>> mbox cmd response: failed
32,904,621 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
32,915,888 UART:
32,916,154 UART: Running Caliptra FMC ...
32,917,341 UART:
32,917,504 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
32,919,147 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,478 UART:
192,913 UART: Running Caliptra ROM ...
194,028 UART:
603,750 UART: [state] CFI Enabled
615,611 UART: [state] LifecycleState = Unprovisioned
618,024 UART: [state] DebugLocked = No
619,919 UART: [state] WD Timer not started. Device not locked for debugging
624,296 UART: [kat] SHA2-256
806,235 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,852 UART: [kat] ++
818,380 UART: [kat] sha1
827,195 UART: [kat] SHA2-256
830,255 UART: [kat] SHA2-384
835,952 UART: [kat] SHA2-512-ACC
838,597 UART: [kat] ECC-384
4,092,551 UART: [kat] HMAC-384Kdf
4,104,433 UART: [kat] LMS
5,177,553 UART: [kat] --
5,182,115 UART: [cold-reset] ++
5,184,612 UART: [fht] FHT @ 0x50003400
5,196,647 UART: [idev] ++
5,197,351 UART: [idev] CDI.KEYID = 6
5,198,515 UART: [idev] SUBJECT.KEYID = 7
5,200,035 UART: [idev] UDS.KEYID = 0
5,201,145 ready_for_fw is high
5,201,372 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,341,709 UART: [idev] Erasing UDS.KEYID = 0
8,490,434 UART: [idev] Sha1 KeyId Algorithm
8,513,617 UART: [idev] --
8,517,504 UART: [ldev] ++
8,518,068 UART: [ldev] CDI.KEYID = 6
8,519,303 UART: [ldev] SUBJECT.KEYID = 5
8,520,726 UART: [ldev] AUTHORITY.KEYID = 7
8,522,197 UART: [ldev] FE.KEYID = 1
8,535,061 UART: [ldev] Erasing FE.KEYID = 1
11,825,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,416 UART: [ldev] --
14,193,422 UART: [fwproc] Wait for Commands...
14,195,031 UART: [fwproc] Recv command 0x46574c44
14,197,289 UART: [fwproc] Recv'd Img size: 111688 bytes
22,725,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,804,738 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,865,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
23,181,776 >>> mbox cmd response: success
23,185,555 UART: [afmc] ++
23,186,280 UART: [afmc] CDI.KEYID = 6
23,187,387 UART: [afmc] SUBJECT.KEYID = 7
23,188,654 UART: [afmc] AUTHORITY.KEYID = 5
26,506,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,799,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,801,401 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
28,817,489 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
28,833,561 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
28,849,546 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
28,872,342 UART: [afmc] --
28,876,469 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
29,017,291 UART: [cold-reset] --
29,018,154 UART: [state] Locking Datavault
29,019,305 UART: [state] Locking PCR0, PCR1 and PCR31
29,020,839 UART: [state] Locking ICCM
29,021,743 UART: [exit] Launching FMC @ 0x40000000
29,023,156 UART:
29,023,310 UART: Running Caliptra FMC ...
29,024,399 UART:
29,024,548 UART: [fmc] Received command: 0x46574C44
29,025,994 UART:
29,026,142 UART: Running Caliptra ROM ...
29,027,229 UART:
29,027,379 UART: [state] CFI Enabled
29,032,845 UART: [state] LifecycleState = Unprovisioned
29,034,722 UART: [state] DebugLocked = No
29,036,417 UART: [state] WD Timer not started. Device not locked for debugging
29,041,308 UART: [kat] SHA2-256
29,223,234 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
29,234,782 UART: [kat] ++
29,235,289 UART: [kat] sha1
29,245,034 UART: [kat] SHA2-256
29,248,045 UART: [kat] SHA2-384
29,253,649 UART: [kat] SHA2-512-ACC
29,256,251 UART: [kat] ECC-384
32,510,988 UART: [kat] HMAC-384Kdf
32,522,844 UART: [kat] LMS
33,596,004 UART: [kat] --
33,600,185 UART: [update-reset] ++
33,649,748 >>> mbox cmd response: failed
33,650,151 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,652,305 UART: ROM Non-Fatal Error: 0x000B003D
33,654,689 UART: [state] Locking Datavault
33,658,764 UART: [state] Locking PCR0, PCR1 and PCR31
33,660,896 UART: [state] Locking ICCM
33,663,933 UART: [exit] Launching FMC @ 0x40000000
33,672,594 UART:
33,672,822 UART: Running Caliptra FMC ...
33,673,835 UART:
33,673,971 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,675,588 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
5,102,005 ready_for_fw is high
5,102,429 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
22,872,207 >>> mbox cmd response: success
28,494,550 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
28,635,718 UART:
28,636,079 UART: Running Caliptra FMC ...
28,637,283 UART:
28,637,450 UART: [fmc] Received command: 0x46574C44
33,179,740 >>> mbox cmd response: failed
33,180,212 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,193,365 UART:
33,193,628 UART: Running Caliptra FMC ...
33,194,823 UART:
33,194,976 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,196,602 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,140 UART:
192,518 UART: Running Caliptra ROM ...
193,628 UART:
193,994 UART: [state] CFI Enabled
263,827 UART: [state] LifecycleState = Unprovisioned
265,626 UART: [state] DebugLocked = No
267,373 UART: [state] WD Timer not started. Device not locked for debugging
270,265 UART: [kat] SHA2-256
449,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,016 UART: [kat] ++
461,565 UART: [kat] sha1
472,941 UART: [kat] SHA2-256
475,950 UART: [kat] SHA2-384
482,366 UART: [kat] SHA2-512-ACC
485,303 UART: [kat] ECC-384
2,949,381 UART: [kat] HMAC-384Kdf
2,970,524 UART: [kat] LMS
3,499,984 UART: [kat] --
3,503,516 UART: [cold-reset] ++
3,505,740 UART: [fht] FHT @ 0x50003400
3,516,297 UART: [idev] ++
3,516,869 UART: [idev] CDI.KEYID = 6
3,517,779 UART: [idev] SUBJECT.KEYID = 7
3,518,955 UART: [idev] UDS.KEYID = 0
3,520,005 ready_for_fw is high
3,520,202 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,661,125 UART: [idev] Erasing UDS.KEYID = 0
6,026,483 UART: [idev] Sha1 KeyId Algorithm
6,050,150 UART: [idev] --
6,054,353 UART: [ldev] ++
6,054,945 UART: [ldev] CDI.KEYID = 6
6,055,861 UART: [ldev] SUBJECT.KEYID = 5
6,057,027 UART: [ldev] AUTHORITY.KEYID = 7
6,058,266 UART: [ldev] FE.KEYID = 1
6,097,836 UART: [ldev] Erasing FE.KEYID = 1
8,600,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,451 UART: [ldev] --
10,412,639 UART: [fwproc] Wait for Commands...
10,414,354 UART: [fwproc] Recv command 0x46574c44
10,416,451 UART: [fwproc] Recv'd Img size: 112032 bytes
14,937,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,011,030 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,071,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,390,128 >>> mbox cmd response: success
15,395,259 UART: [afmc] ++
15,395,903 UART: [afmc] CDI.KEYID = 6
15,396,839 UART: [afmc] SUBJECT.KEYID = 7
15,397,953 UART: [afmc] AUTHORITY.KEYID = 5
17,939,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,680,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,682,285 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,698,286 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,714,265 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,730,055 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,752,196 UART: [afmc] --
19,757,720 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,898,847 UART: [cold-reset] --
19,899,704 UART: [state] Locking Datavault
19,900,858 UART: [state] Locking PCR0, PCR1 and PCR31
19,902,393 UART: [state] Locking ICCM
19,903,296 UART: [exit] Launching FMC @ 0x40000000
19,904,719 UART:
19,904,899 UART: Running Caliptra FMC ...
19,906,000 UART:
19,906,165 UART: [fmc] Received command: 0x46574C44
19,907,624 UART:
19,907,780 UART: Running Caliptra ROM ...
19,908,874 UART:
19,909,027 UART: [state] CFI Enabled
19,969,909 UART: [state] LifecycleState = Unprovisioned
19,971,788 UART: [state] DebugLocked = No
19,974,146 UART: [state] WD Timer not started. Device not locked for debugging
19,977,452 UART: [kat] SHA2-256
20,156,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,168,158 UART: [kat] ++
20,168,704 UART: [kat] sha1
20,179,430 UART: [kat] SHA2-256
20,182,445 UART: [kat] SHA2-384
20,188,445 UART: [kat] SHA2-512-ACC
20,191,394 UART: [kat] ECC-384
22,635,079 UART: [kat] HMAC-384Kdf
22,657,362 UART: [kat] LMS
23,186,792 UART: [kat] --
23,192,145 UART: [update-reset] ++
23,244,678 >>> mbox cmd response: failed
23,245,100 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,247,213 UART: ROM Non-Fatal Error: 0x000B003D
23,250,542 UART: [state] Locking Datavault
23,254,715 UART: [state] Locking PCR0, PCR1 and PCR31
23,256,362 UART: [state] Locking ICCM
23,258,300 UART: [exit] Launching FMC @ 0x40000000
23,266,696 UART:
23,266,932 UART: Running Caliptra FMC ...
23,268,034 UART:
23,268,210 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,269,840 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,362,399 ready_for_fw is high
3,362,930 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,975,319 >>> mbox cmd response: success
19,249,381 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,390,607 UART:
19,390,984 UART: Running Caliptra FMC ...
19,392,163 UART:
19,392,332 UART: [fmc] Received command: 0x46574C44
22,601,309 >>> mbox cmd response: failed
22,601,830 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,613,084 UART:
22,613,349 UART: Running Caliptra FMC ...
22,614,547 UART:
22,614,709 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,616,345 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,352 UART:
192,711 UART: Running Caliptra ROM ...
193,807 UART:
603,527 UART: [state] CFI Enabled
614,503 UART: [state] LifecycleState = Unprovisioned
616,358 UART: [state] DebugLocked = No
617,944 UART: [state] WD Timer not started. Device not locked for debugging
622,047 UART: [kat] SHA2-256
801,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,756 UART: [kat] ++
813,202 UART: [kat] sha1
824,302 UART: [kat] SHA2-256
827,346 UART: [kat] SHA2-384
833,980 UART: [kat] SHA2-512-ACC
836,981 UART: [kat] ECC-384
3,280,063 UART: [kat] HMAC-384Kdf
3,293,378 UART: [kat] LMS
3,822,912 UART: [kat] --
3,826,124 UART: [cold-reset] ++
3,827,054 UART: [fht] FHT @ 0x50003400
3,838,530 UART: [idev] ++
3,839,092 UART: [idev] CDI.KEYID = 6
3,840,005 UART: [idev] SUBJECT.KEYID = 7
3,841,181 UART: [idev] UDS.KEYID = 0
3,842,228 ready_for_fw is high
3,842,453 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,983,178 UART: [idev] Erasing UDS.KEYID = 0
6,311,143 UART: [idev] Sha1 KeyId Algorithm
6,334,368 UART: [idev] --
6,337,814 UART: [ldev] ++
6,338,577 UART: [ldev] CDI.KEYID = 6
6,339,496 UART: [ldev] SUBJECT.KEYID = 5
6,340,601 UART: [ldev] AUTHORITY.KEYID = 7
6,341,774 UART: [ldev] FE.KEYID = 1
6,353,547 UART: [ldev] Erasing FE.KEYID = 1
8,828,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,364 UART: [ldev] --
10,619,701 UART: [fwproc] Wait for Commands...
10,621,364 UART: [fwproc] Recv command 0x46574c44
10,623,463 UART: [fwproc] Recv'd Img size: 112032 bytes
15,147,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,222,843 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,283,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,601,794 >>> mbox cmd response: success
15,606,112 UART: [afmc] ++
15,606,725 UART: [afmc] CDI.KEYID = 6
15,607,640 UART: [afmc] SUBJECT.KEYID = 7
15,608,801 UART: [afmc] AUTHORITY.KEYID = 5
18,109,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,831,054 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,832,924 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,848,939 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,864,943 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,880,723 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,904,895 UART: [afmc] --
19,910,424 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
20,051,579 UART: [cold-reset] --
20,052,441 UART: [state] Locking Datavault
20,053,607 UART: [state] Locking PCR0, PCR1 and PCR31
20,055,144 UART: [state] Locking ICCM
20,056,053 UART: [exit] Launching FMC @ 0x40000000
20,057,479 UART:
20,057,640 UART: Running Caliptra FMC ...
20,058,794 UART:
20,058,962 UART: [fmc] Received command: 0x46574C44
20,060,379 UART:
20,060,539 UART: Running Caliptra ROM ...
20,061,721 UART:
20,061,880 UART: [state] CFI Enabled
20,069,750 UART: [state] LifecycleState = Unprovisioned
20,071,632 UART: [state] DebugLocked = No
20,072,976 UART: [state] WD Timer not started. Device not locked for debugging
20,076,706 UART: [kat] SHA2-256
20,255,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,267,452 UART: [kat] ++
20,267,993 UART: [kat] sha1
20,278,022 UART: [kat] SHA2-256
20,281,028 UART: [kat] SHA2-384
20,286,954 UART: [kat] SHA2-512-ACC
20,289,887 UART: [kat] ECC-384
22,729,663 UART: [kat] HMAC-384Kdf
22,741,767 UART: [kat] LMS
23,271,278 UART: [kat] --
23,274,675 UART: [update-reset] ++
23,323,863 >>> mbox cmd response: failed
23,324,321 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,327,685 UART: ROM Non-Fatal Error: 0x000B003D
23,329,826 UART: [state] Locking Datavault
23,332,643 UART: [state] Locking PCR0, PCR1 and PCR31
23,334,336 UART: [state] Locking ICCM
23,335,511 UART: [exit] Launching FMC @ 0x40000000
23,343,902 UART:
23,344,133 UART: Running Caliptra FMC ...
23,345,231 UART:
23,345,382 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,347,009 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,694,151 ready_for_fw is high
3,694,579 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,208,274 >>> mbox cmd response: success
19,446,723 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,587,959 UART:
19,588,340 UART: Running Caliptra FMC ...
19,589,522 UART:
19,589,695 UART: [fmc] Received command: 0x46574C44
22,722,308 >>> mbox cmd response: failed
22,722,790 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,733,504 UART:
22,733,771 UART: Running Caliptra FMC ...
22,734,949 UART:
22,735,109 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,736,768 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,381,487 ready_for_fw is high
3,382,061 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,033,254 >>> mbox cmd response: success
19,311,780 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,453,025 UART:
19,453,410 UART: Running Caliptra FMC ...
19,454,505 UART:
19,454,659 UART: [fmc] Received command: 0x46574C44
22,680,720 >>> mbox cmd response: failed
22,681,194 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,694,277 UART:
22,694,534 UART: Running Caliptra FMC ...
22,695,628 UART:
22,695,774 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,697,415 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,692,930 ready_for_fw is high
3,693,325 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
15,227,466 >>> mbox cmd response: success
19,454,662 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
19,596,484 UART:
19,596,890 UART: Running Caliptra FMC ...
19,598,024 UART:
19,598,188 UART: [fmc] Received command: 0x46574C44
22,726,233 >>> mbox cmd response: failed
22,726,696 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,739,404 UART:
22,739,664 UART: Running Caliptra FMC ...
22,740,862 UART:
22,741,023 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,742,662 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,503 UART: [kat] SHA2-256
901,443 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,610 UART: [kat] HMAC-384Kdf
920,372 UART: [kat] LMS
1,168,684 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,121 UART: [fht] FHT @ 0x50003400
1,172,753 UART: [idev] ++
1,172,921 UART: [idev] CDI.KEYID = 6
1,173,282 UART: [idev] SUBJECT.KEYID = 7
1,173,707 UART: [idev] UDS.KEYID = 0
1,174,053 ready_for_fw is high
1,174,053 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,667 UART: [idev] Erasing UDS.KEYID = 0
1,198,395 UART: [idev] Sha1 KeyId Algorithm
1,207,377 UART: [idev] --
1,208,456 UART: [ldev] ++
1,208,624 UART: [ldev] CDI.KEYID = 6
1,208,988 UART: [ldev] SUBJECT.KEYID = 5
1,209,415 UART: [ldev] AUTHORITY.KEYID = 7
1,209,878 UART: [ldev] FE.KEYID = 1
1,214,860 UART: [ldev] Erasing FE.KEYID = 1
1,240,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,476 UART: [ldev] --
1,279,890 UART: [fwproc] Wait for Commands...
1,280,511 UART: [fwproc] Recv command 0x46574c44
1,281,244 UART: [fwproc] Recv'd Img size: 112032 bytes
3,096,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,125,232 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,150,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,286,923 >>> mbox cmd response: success
3,288,000 UART: [afmc] ++
3,288,168 UART: [afmc] CDI.KEYID = 6
3,288,531 UART: [afmc] SUBJECT.KEYID = 7
3,288,957 UART: [afmc] AUTHORITY.KEYID = 5
3,324,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,340,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,341,125 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,346,836 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,352,723 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,358,421 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,366,282 UART: [afmc] --
3,367,296 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,367,318 UART: [cold-reset] --
3,368,042 UART: [state] Locking Datavault
3,369,139 UART: [state] Locking PCR0, PCR1 and PCR31
3,369,743 UART: [state] Locking ICCM
3,370,281 UART: [exit] Launching FMC @ 0x40000000
3,375,578 UART:
3,375,594 UART: Running Caliptra FMC ...
3,376,002 UART:
3,376,232 UART: [fmc] Received command: 0x46574C44
3,377,058 UART:
3,377,074 UART: Running Caliptra ROM ...
3,377,482 UART:
3,377,537 UART: [state] CFI Enabled
3,380,121 UART: [state] LifecycleState = Unprovisioned
3,380,776 UART: [state] DebugLocked = No
3,381,296 UART: [state] WD Timer not started. Device not locked for debugging
3,382,558 UART: [kat] SHA2-256
4,186,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,190,237 UART: [kat] ++
4,190,389 UART: [kat] sha1
4,194,425 UART: [kat] SHA2-256
4,196,365 UART: [kat] SHA2-384
4,198,996 UART: [kat] SHA2-512-ACC
4,200,896 UART: [kat] ECC-384
4,210,585 UART: [kat] HMAC-384Kdf
4,215,299 UART: [kat] LMS
4,463,611 UART: [kat] --
4,464,633 UART: [update-reset] ++
4,482,799 >>> mbox cmd response: failed
4,482,799 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,483,077 UART: ROM Non-Fatal Error: 0x000B003D
4,484,017 UART: [state] Locking Datavault
4,484,761 UART: [state] Locking PCR0, PCR1 and PCR31
4,485,365 UART: [state] Locking ICCM
4,485,995 UART: [exit] Launching FMC @ 0x40000000
4,491,292 UART:
4,491,308 UART: Running Caliptra FMC ...
4,491,716 UART:
4,491,938 UART: [fmc] Received command: 0x1000000C
4,492,673 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,604 ready_for_fw is high
1,055,604 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,134,033 >>> mbox cmd response: success
3,189,544 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,195,295 UART:
3,195,311 UART: Running Caliptra FMC ...
3,195,719 UART:
3,195,949 UART: [fmc] Received command: 0x46574C44
4,186,748 >>> mbox cmd response: failed
4,186,748 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,192,379 UART:
4,192,395 UART: Running Caliptra FMC ...
4,192,803 UART:
4,193,025 UART: [fmc] Received command: 0x1000000C
4,193,760 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,056 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,858 UART: [kat] ++
896,010 UART: [kat] sha1
900,216 UART: [kat] SHA2-256
902,156 UART: [kat] SHA2-384
904,857 UART: [kat] SHA2-512-ACC
906,758 UART: [kat] ECC-384
916,791 UART: [kat] HMAC-384Kdf
921,337 UART: [kat] LMS
1,169,649 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,074 UART: [idev] ++
1,173,242 UART: [idev] CDI.KEYID = 6
1,173,603 UART: [idev] SUBJECT.KEYID = 7
1,174,028 UART: [idev] UDS.KEYID = 0
1,174,374 ready_for_fw is high
1,174,374 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,912 UART: [idev] Erasing UDS.KEYID = 0
1,199,264 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,861 UART: [ldev] SUBJECT.KEYID = 5
1,210,288 UART: [ldev] AUTHORITY.KEYID = 7
1,210,751 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,463 UART: [fwproc] Wait for Commands...
1,282,288 UART: [fwproc] Recv command 0x46574c44
1,283,021 UART: [fwproc] Recv'd Img size: 112032 bytes
3,100,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,128,366 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,154,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,290,157 >>> mbox cmd response: success
3,291,320 UART: [afmc] ++
3,291,488 UART: [afmc] CDI.KEYID = 6
3,291,851 UART: [afmc] SUBJECT.KEYID = 7
3,292,277 UART: [afmc] AUTHORITY.KEYID = 5
3,327,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,343,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,713 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,350,424 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,356,311 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,362,009 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,369,868 UART: [afmc] --
3,370,872 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,370,894 UART: [cold-reset] --
3,371,846 UART: [state] Locking Datavault
3,373,195 UART: [state] Locking PCR0, PCR1 and PCR31
3,373,799 UART: [state] Locking ICCM
3,374,385 UART: [exit] Launching FMC @ 0x40000000
3,379,682 UART:
3,379,698 UART: Running Caliptra FMC ...
3,380,106 UART:
3,380,336 UART: [fmc] Received command: 0x46574C44
3,381,162 UART:
3,381,178 UART: Running Caliptra ROM ...
3,381,586 UART:
3,381,728 UART: [state] CFI Enabled
3,384,424 UART: [state] LifecycleState = Unprovisioned
3,385,079 UART: [state] DebugLocked = No
3,385,681 UART: [state] WD Timer not started. Device not locked for debugging
3,386,795 UART: [kat] SHA2-256
4,190,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,194,474 UART: [kat] ++
4,194,626 UART: [kat] sha1
4,198,860 UART: [kat] SHA2-256
4,200,800 UART: [kat] SHA2-384
4,203,425 UART: [kat] SHA2-512-ACC
4,205,325 UART: [kat] ECC-384
4,215,392 UART: [kat] HMAC-384Kdf
4,220,024 UART: [kat] LMS
4,468,336 UART: [kat] --
4,469,078 UART: [update-reset] ++
4,486,554 >>> mbox cmd response: failed
4,486,554 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,487,102 UART: ROM Non-Fatal Error: 0x000B003D
4,487,980 UART: [state] Locking Datavault
4,488,890 UART: [state] Locking PCR0, PCR1 and PCR31
4,489,494 UART: [state] Locking ICCM
4,490,152 UART: [exit] Launching FMC @ 0x40000000
4,495,449 UART:
4,495,465 UART: Running Caliptra FMC ...
4,495,873 UART:
4,496,095 UART: [fmc] Received command: 0x1000000C
4,496,830 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,251 ready_for_fw is high
1,057,251 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,137,381 >>> mbox cmd response: success
3,194,190 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,200,199 UART:
3,200,215 UART: Running Caliptra FMC ...
3,200,623 UART:
3,200,853 UART: [fmc] Received command: 0x46574C44
4,191,073 >>> mbox cmd response: failed
4,191,073 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,196,640 UART:
4,196,656 UART: Running Caliptra FMC ...
4,197,064 UART:
4,197,286 UART: [fmc] Received command: 0x1000000C
4,198,021 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
890,792 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,921 UART: [kat] ++
895,073 UART: [kat] sha1
899,281 UART: [kat] SHA2-256
901,221 UART: [kat] SHA2-384
904,036 UART: [kat] SHA2-512-ACC
905,937 UART: [kat] ECC-384
916,064 UART: [kat] HMAC-384Kdf
920,504 UART: [kat] LMS
1,168,816 UART: [kat] --
1,169,389 UART: [cold-reset] ++
1,169,969 UART: [fht] FHT @ 0x50003400
1,172,695 UART: [idev] ++
1,172,863 UART: [idev] CDI.KEYID = 6
1,173,224 UART: [idev] SUBJECT.KEYID = 7
1,173,649 UART: [idev] UDS.KEYID = 0
1,173,995 ready_for_fw is high
1,173,995 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,483 UART: [idev] Erasing UDS.KEYID = 0
1,198,559 UART: [idev] Sha1 KeyId Algorithm
1,207,381 UART: [idev] --
1,208,572 UART: [ldev] ++
1,208,740 UART: [ldev] CDI.KEYID = 6
1,209,104 UART: [ldev] SUBJECT.KEYID = 5
1,209,531 UART: [ldev] AUTHORITY.KEYID = 7
1,209,994 UART: [ldev] FE.KEYID = 1
1,215,510 UART: [ldev] Erasing FE.KEYID = 1
1,241,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,766 UART: [ldev] --
1,281,240 UART: [fwproc] Wait for Commands...
1,281,993 UART: [fwproc] Recv command 0x46574c44
1,282,726 UART: [fwproc] Recv'd Img size: 112032 bytes
3,098,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,126,192 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,151,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,287,803 >>> mbox cmd response: success
3,288,870 UART: [afmc] ++
3,289,038 UART: [afmc] CDI.KEYID = 6
3,289,401 UART: [afmc] SUBJECT.KEYID = 7
3,289,827 UART: [afmc] AUTHORITY.KEYID = 5
3,325,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,341,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,342,655 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,348,366 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,354,253 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,359,951 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,367,588 UART: [afmc] --
3,368,624 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,368,646 UART: [cold-reset] --
3,369,544 UART: [state] Locking Datavault
3,370,807 UART: [state] Locking PCR0, PCR1 and PCR31
3,371,411 UART: [state] Locking ICCM
3,372,005 UART: [exit] Launching FMC @ 0x40000000
3,377,302 UART:
3,377,318 UART: Running Caliptra FMC ...
3,377,726 UART:
3,377,956 UART: [fmc] Received command: 0x46574C44
3,378,782 UART:
3,378,798 UART: Running Caliptra ROM ...
3,379,206 UART:
3,379,261 UART: [state] CFI Enabled
3,382,127 UART: [state] LifecycleState = Unprovisioned
3,382,782 UART: [state] DebugLocked = No
3,383,416 UART: [state] WD Timer not started. Device not locked for debugging
3,384,770 UART: [kat] SHA2-256
4,188,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,192,449 UART: [kat] ++
4,192,601 UART: [kat] sha1
4,196,845 UART: [kat] SHA2-256
4,198,785 UART: [kat] SHA2-384
4,201,446 UART: [kat] SHA2-512-ACC
4,203,346 UART: [kat] ECC-384
4,212,887 UART: [kat] HMAC-384Kdf
4,217,447 UART: [kat] LMS
4,465,759 UART: [kat] --
4,466,719 UART: [update-reset] ++
4,483,917 >>> mbox cmd response: failed
4,483,917 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,484,447 UART: ROM Non-Fatal Error: 0x000B003D
4,485,287 UART: [state] Locking Datavault
4,486,277 UART: [state] Locking PCR0, PCR1 and PCR31
4,486,881 UART: [state] Locking ICCM
4,487,397 UART: [exit] Launching FMC @ 0x40000000
4,492,694 UART:
4,492,710 UART: Running Caliptra FMC ...
4,493,118 UART:
4,493,340 UART: [fmc] Received command: 0x1000000C
4,494,075 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,178 ready_for_fw is high
1,056,178 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,144,594 >>> mbox cmd response: success
3,199,827 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,206,526 UART:
3,206,542 UART: Running Caliptra FMC ...
3,206,950 UART:
3,207,180 UART: [fmc] Received command: 0x46574C44
4,197,445 >>> mbox cmd response: failed
4,197,445 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,203,016 UART:
4,203,032 UART: Running Caliptra FMC ...
4,203,440 UART:
4,203,662 UART: [fmc] Received command: 0x1000000C
4,204,397 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,053 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,834 UART: [idev] ++
1,173,002 UART: [idev] CDI.KEYID = 6
1,173,363 UART: [idev] SUBJECT.KEYID = 7
1,173,788 UART: [idev] UDS.KEYID = 0
1,174,134 ready_for_fw is high
1,174,134 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,834 UART: [idev] Erasing UDS.KEYID = 0
1,199,088 UART: [idev] Sha1 KeyId Algorithm
1,208,026 UART: [idev] --
1,209,027 UART: [ldev] ++
1,209,195 UART: [ldev] CDI.KEYID = 6
1,209,559 UART: [ldev] SUBJECT.KEYID = 5
1,209,986 UART: [ldev] AUTHORITY.KEYID = 7
1,210,449 UART: [ldev] FE.KEYID = 1
1,215,867 UART: [ldev] Erasing FE.KEYID = 1
1,241,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,019 UART: [ldev] --
1,281,441 UART: [fwproc] Wait for Commands...
1,282,122 UART: [fwproc] Recv command 0x46574c44
1,282,855 UART: [fwproc] Recv'd Img size: 112032 bytes
3,099,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,127,728 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,153,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,289,439 >>> mbox cmd response: success
3,290,508 UART: [afmc] ++
3,290,676 UART: [afmc] CDI.KEYID = 6
3,291,039 UART: [afmc] SUBJECT.KEYID = 7
3,291,465 UART: [afmc] AUTHORITY.KEYID = 5
3,327,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,343,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,521 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,350,232 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,356,119 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,361,817 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,369,764 UART: [afmc] --
3,370,842 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,370,864 UART: [cold-reset] --
3,371,524 UART: [state] Locking Datavault
3,372,715 UART: [state] Locking PCR0, PCR1 and PCR31
3,373,319 UART: [state] Locking ICCM
3,373,779 UART: [exit] Launching FMC @ 0x40000000
3,379,076 UART:
3,379,092 UART: Running Caliptra FMC ...
3,379,500 UART:
3,379,730 UART: [fmc] Received command: 0x46574C44
3,380,556 UART:
3,380,572 UART: Running Caliptra ROM ...
3,380,980 UART:
3,381,122 UART: [state] CFI Enabled
3,384,114 UART: [state] LifecycleState = Unprovisioned
3,384,769 UART: [state] DebugLocked = No
3,385,487 UART: [state] WD Timer not started. Device not locked for debugging
3,386,813 UART: [kat] SHA2-256
4,190,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,194,492 UART: [kat] ++
4,194,644 UART: [kat] sha1
4,198,926 UART: [kat] SHA2-256
4,200,866 UART: [kat] SHA2-384
4,203,641 UART: [kat] SHA2-512-ACC
4,205,541 UART: [kat] ECC-384
4,215,178 UART: [kat] HMAC-384Kdf
4,220,006 UART: [kat] LMS
4,468,318 UART: [kat] --
4,469,308 UART: [update-reset] ++
4,487,220 >>> mbox cmd response: failed
4,487,220 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,487,524 UART: ROM Non-Fatal Error: 0x000B003D
4,488,364 UART: [state] Locking Datavault
4,489,110 UART: [state] Locking PCR0, PCR1 and PCR31
4,489,714 UART: [state] Locking ICCM
4,490,186 UART: [exit] Launching FMC @ 0x40000000
4,495,483 UART:
4,495,499 UART: Running Caliptra FMC ...
4,495,907 UART:
4,496,129 UART: [fmc] Received command: 0x1000000C
4,496,864 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,807 ready_for_fw is high
1,056,807 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,135,353 >>> mbox cmd response: success
3,191,316 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,197,703 UART:
3,197,719 UART: Running Caliptra FMC ...
3,198,127 UART:
3,198,357 UART: [fmc] Received command: 0x46574C44
4,188,743 >>> mbox cmd response: failed
4,188,743 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,194,626 UART:
4,194,642 UART: Running Caliptra FMC ...
4,195,050 UART:
4,195,272 UART: [fmc] Received command: 0x1000000C
4,196,007 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,997 UART: [kat] SHA2-256
901,937 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,890 UART: [kat] LMS
1,169,202 UART: [kat] --
1,170,351 UART: [cold-reset] ++
1,170,865 UART: [fht] FHT @ 0x50003400
1,173,295 UART: [idev] ++
1,173,463 UART: [idev] CDI.KEYID = 6
1,173,824 UART: [idev] SUBJECT.KEYID = 7
1,174,249 UART: [idev] UDS.KEYID = 0
1,174,595 ready_for_fw is high
1,174,595 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,198,885 UART: [idev] Sha1 KeyId Algorithm
1,207,845 UART: [idev] --
1,209,074 UART: [ldev] ++
1,209,242 UART: [ldev] CDI.KEYID = 6
1,209,606 UART: [ldev] SUBJECT.KEYID = 5
1,210,033 UART: [ldev] AUTHORITY.KEYID = 7
1,210,496 UART: [ldev] FE.KEYID = 1
1,215,880 UART: [ldev] Erasing FE.KEYID = 1
1,241,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,216 UART: [ldev] --
1,280,564 UART: [fwproc] Wait for Commands...
1,281,251 UART: [fwproc] Recv command 0x46574c44
1,281,984 UART: [fwproc] Recv'd Img size: 112032 bytes
3,103,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,132,627 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,158,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,294,392 >>> mbox cmd response: success
3,295,649 UART: [afmc] ++
3,295,817 UART: [afmc] CDI.KEYID = 6
3,296,180 UART: [afmc] SUBJECT.KEYID = 7
3,296,606 UART: [afmc] AUTHORITY.KEYID = 5
3,332,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,348,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,349,202 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,354,913 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,360,800 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,366,498 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,374,343 UART: [afmc] --
3,375,343 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,375,365 UART: [cold-reset] --
3,376,347 UART: [state] Locking Datavault
3,377,814 UART: [state] Locking PCR0, PCR1 and PCR31
3,378,418 UART: [state] Locking ICCM
3,379,050 UART: [exit] Launching FMC @ 0x40000000
3,384,347 UART:
3,384,363 UART: Running Caliptra FMC ...
3,384,771 UART:
3,385,001 UART: [fmc] Received command: 0x46574C44
3,385,827 UART:
3,385,843 UART: Running Caliptra ROM ...
3,386,251 UART:
3,386,306 UART: [state] CFI Enabled
3,389,048 UART: [state] LifecycleState = Unprovisioned
3,389,703 UART: [state] DebugLocked = No
3,390,217 UART: [state] WD Timer not started. Device not locked for debugging
3,391,477 UART: [kat] SHA2-256
4,195,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,199,156 UART: [kat] ++
4,199,308 UART: [kat] sha1
4,203,316 UART: [kat] SHA2-256
4,205,256 UART: [kat] SHA2-384
4,208,045 UART: [kat] SHA2-512-ACC
4,209,945 UART: [kat] ECC-384
4,219,546 UART: [kat] HMAC-384Kdf
4,224,084 UART: [kat] LMS
4,472,396 UART: [kat] --
4,473,006 UART: [update-reset] ++
4,490,138 >>> mbox cmd response: failed
4,490,138 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,490,564 UART: ROM Non-Fatal Error: 0x000B003D
4,491,390 UART: [state] Locking Datavault
4,492,074 UART: [state] Locking PCR0, PCR1 and PCR31
4,492,678 UART: [state] Locking ICCM
4,493,288 UART: [exit] Launching FMC @ 0x40000000
4,498,585 UART:
4,498,601 UART: Running Caliptra FMC ...
4,499,009 UART:
4,499,231 UART: [fmc] Received command: 0x1000000C
4,499,966 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,294 ready_for_fw is high
1,056,294 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,132,701 >>> mbox cmd response: success
3,188,614 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,194,589 UART:
3,194,605 UART: Running Caliptra FMC ...
3,195,013 UART:
3,195,243 UART: [fmc] Received command: 0x46574C44
4,186,244 >>> mbox cmd response: failed
4,186,244 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,192,093 UART:
4,192,109 UART: Running Caliptra FMC ...
4,192,517 UART:
4,192,739 UART: [fmc] Received command: 0x1000000C
4,193,474 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
900,166 UART: [kat] SHA2-256
902,106 UART: [kat] SHA2-384
904,869 UART: [kat] SHA2-512-ACC
906,770 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
921,019 UART: [kat] LMS
1,169,331 UART: [kat] --
1,170,224 UART: [cold-reset] ++
1,170,748 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,174,774 ready_for_fw is high
1,174,774 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,680 UART: [idev] Erasing UDS.KEYID = 0
1,199,436 UART: [idev] Sha1 KeyId Algorithm
1,208,230 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,216,085 UART: [ldev] Erasing FE.KEYID = 1
1,243,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,199 UART: [ldev] --
1,282,583 UART: [fwproc] Wait for Commands...
1,283,372 UART: [fwproc] Recv command 0x46574c44
1,284,105 UART: [fwproc] Recv'd Img size: 112032 bytes
3,096,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,124,571 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,150,256 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,286,128 >>> mbox cmd response: success
3,287,345 UART: [afmc] ++
3,287,513 UART: [afmc] CDI.KEYID = 6
3,287,876 UART: [afmc] SUBJECT.KEYID = 7
3,288,302 UART: [afmc] AUTHORITY.KEYID = 5
3,323,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,340,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,341,350 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,347,061 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,352,948 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,358,646 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,366,399 UART: [afmc] --
3,367,343 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,367,365 UART: [cold-reset] --
3,368,463 UART: [state] Locking Datavault
3,369,780 UART: [state] Locking PCR0, PCR1 and PCR31
3,370,384 UART: [state] Locking ICCM
3,370,856 UART: [exit] Launching FMC @ 0x40000000
3,376,153 UART:
3,376,169 UART: Running Caliptra FMC ...
3,376,577 UART:
3,376,807 UART: [fmc] Received command: 0x46574C44
3,377,633 UART:
3,377,649 UART: Running Caliptra ROM ...
3,378,057 UART:
3,378,199 UART: [state] CFI Enabled
3,381,105 UART: [state] LifecycleState = Unprovisioned
3,381,760 UART: [state] DebugLocked = No
3,382,386 UART: [state] WD Timer not started. Device not locked for debugging
3,383,604 UART: [kat] SHA2-256
4,187,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,191,283 UART: [kat] ++
4,191,435 UART: [kat] sha1
4,195,531 UART: [kat] SHA2-256
4,197,471 UART: [kat] SHA2-384
4,200,332 UART: [kat] SHA2-512-ACC
4,202,232 UART: [kat] ECC-384
4,211,629 UART: [kat] HMAC-384Kdf
4,216,185 UART: [kat] LMS
4,464,497 UART: [kat] --
4,465,507 UART: [update-reset] ++
4,482,835 >>> mbox cmd response: failed
4,482,835 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,483,385 UART: ROM Non-Fatal Error: 0x000B003D
4,484,313 UART: [state] Locking Datavault
4,485,175 UART: [state] Locking PCR0, PCR1 and PCR31
4,485,779 UART: [state] Locking ICCM
4,486,293 UART: [exit] Launching FMC @ 0x40000000
4,491,590 UART:
4,491,606 UART: Running Caliptra FMC ...
4,492,014 UART:
4,492,236 UART: [fmc] Received command: 0x1000000C
4,492,971 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,429 ready_for_fw is high
1,056,429 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,139,619 >>> mbox cmd response: success
3,195,450 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,201,669 UART:
3,201,685 UART: Running Caliptra FMC ...
3,202,093 UART:
3,202,323 UART: [fmc] Received command: 0x46574C44
4,192,637 >>> mbox cmd response: failed
4,192,637 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,198,804 UART:
4,198,820 UART: Running Caliptra FMC ...
4,199,228 UART:
4,199,450 UART: [fmc] Received command: 0x1000000C
4,200,185 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,151 UART:
192,513 UART: Running Caliptra ROM ...
193,697 UART:
193,849 UART: [state] CFI Enabled
264,403 UART: [state] LifecycleState = Unprovisioned
266,817 UART: [state] DebugLocked = No
269,556 UART: [state] WD Timer not started. Device not locked for debugging
274,790 UART: [kat] SHA2-256
456,717 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,305 UART: [kat] ++
468,835 UART: [kat] sha1
478,151 UART: [kat] SHA2-256
481,158 UART: [kat] SHA2-384
486,573 UART: [kat] SHA2-512-ACC
489,224 UART: [kat] ECC-384
3,777,159 UART: [kat] HMAC-384Kdf
3,795,371 UART: [kat] LMS
4,868,525 UART: [kat] --
4,873,889 UART: [cold-reset] ++
4,876,241 UART: [fht] FHT @ 0x50003400
4,887,003 UART: [idev] ++
4,887,650 UART: [idev] CDI.KEYID = 6
4,888,818 UART: [idev] SUBJECT.KEYID = 7
4,890,058 UART: [idev] UDS.KEYID = 0
4,890,956 ready_for_fw is high
4,891,146 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,025,344 UART: [idev] Erasing UDS.KEYID = 0
8,237,895 UART: [idev] Sha1 KeyId Algorithm
8,260,073 UART: [idev] --
8,263,746 UART: [ldev] ++
8,264,317 UART: [ldev] CDI.KEYID = 6
8,265,574 UART: [ldev] SUBJECT.KEYID = 5
8,266,689 UART: [ldev] AUTHORITY.KEYID = 7
8,267,841 UART: [ldev] FE.KEYID = 1
8,311,198 UART: [ldev] Erasing FE.KEYID = 1
11,644,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,957,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,973,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,989,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,005,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,027,040 UART: [ldev] --
14,032,311 UART: [fwproc] Wait for Commands...
14,035,489 UART: [fwproc] Recv command 0x46574c44
14,037,743 UART: [fwproc] Recv'd Img size: 106620 bytes
18,015,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,094,292 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,136,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,454,411 >>> mbox cmd response: success
18,458,062 UART: [afmc] ++
18,458,678 UART: [afmc] CDI.KEYID = 6
18,459,865 UART: [afmc] SUBJECT.KEYID = 7
18,460,966 UART: [afmc] AUTHORITY.KEYID = 5
21,834,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,133,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,135,694 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,151,737 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,167,774 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,183,846 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,207,368 UART: [afmc] --
24,211,066 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,211,855 UART: [cold-reset] --
24,214,581 UART: [state] Locking Datavault
24,220,011 UART: [state] Locking PCR0, PCR1 and PCR31
24,221,677 UART: [state] Locking ICCM
24,223,807 UART: [exit] Launching FMC @ 0x40000000
24,232,419 UART:
24,232,648 UART: Running Caliptra FMC ...
24,233,670 UART:
24,233,817 UART: [fmc] Received command: 0x46574C44
24,235,270 UART:
24,235,424 UART: Running Caliptra ROM ...
24,236,522 UART:
24,236,674 UART: [state] CFI Enabled
24,299,770 UART: [state] LifecycleState = Unprovisioned
24,301,634 UART: [state] DebugLocked = No
24,303,748 UART: [state] WD Timer not started. Device not locked for debugging
24,308,299 UART: [kat] SHA2-256
24,490,190 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,501,733 UART: [kat] ++
24,502,207 UART: [kat] sha1
24,512,716 UART: [kat] SHA2-256
24,515,739 UART: [kat] SHA2-384
24,520,959 UART: [kat] SHA2-512-ACC
24,523,524 UART: [kat] ECC-384
27,810,518 UART: [kat] HMAC-384Kdf
27,835,979 UART: [kat] LMS
28,909,094 UART: [kat] --
28,912,046 UART: [update-reset] ++
28,919,248 >>> mbox cmd response: failed
28,920,504 UART: ROM Non-Fatal Error: 0x000B0001
28,923,716 UART: [state] Locking Datavault
28,927,579 UART: [state] Locking PCR0, PCR1 and PCR31
28,929,816 UART: [state] Locking ICCM
28,931,486 UART: [exit] Launching FMC @ 0x40000000
28,940,130 UART:
28,940,392 UART: Running Caliptra FMC ...
28,941,540 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
4,782,066 ready_for_fw is high
4,782,573 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,219,055 >>> mbox cmd response: success
23,890,956 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
23,904,071 UART:
23,904,473 UART: Running Caliptra FMC ...
23,905,755 UART:
23,905,930 UART: [fmc] Received command: 0x46574C44
28,491,080 >>> mbox cmd response: failed
28,504,842 UART:
28,505,126 UART: Running Caliptra FMC ...
28,506,288 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,374 UART:
192,745 UART: Running Caliptra ROM ...
193,937 UART:
603,671 UART: [state] CFI Enabled
618,187 UART: [state] LifecycleState = Unprovisioned
620,570 UART: [state] DebugLocked = No
622,154 UART: [state] WD Timer not started. Device not locked for debugging
626,881 UART: [kat] SHA2-256
808,815 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,342 UART: [kat] ++
820,855 UART: [kat] sha1
832,074 UART: [kat] SHA2-256
835,153 UART: [kat] SHA2-384
840,140 UART: [kat] SHA2-512-ACC
842,784 UART: [kat] ECC-384
4,096,813 UART: [kat] HMAC-384Kdf
4,108,028 UART: [kat] LMS
5,181,219 UART: [kat] --
5,186,659 UART: [cold-reset] ++
5,188,943 UART: [fht] FHT @ 0x50003400
5,199,840 UART: [idev] ++
5,200,546 UART: [idev] CDI.KEYID = 6
5,201,714 UART: [idev] SUBJECT.KEYID = 7
5,203,231 UART: [idev] UDS.KEYID = 0
5,204,334 ready_for_fw is high
5,204,545 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
5,338,522 UART: [idev] Erasing UDS.KEYID = 0
8,491,903 UART: [idev] Sha1 KeyId Algorithm
8,513,959 UART: [idev] --
8,517,848 UART: [ldev] ++
8,518,413 UART: [ldev] CDI.KEYID = 6
8,519,644 UART: [ldev] SUBJECT.KEYID = 5
8,521,072 UART: [ldev] AUTHORITY.KEYID = 7
8,522,546 UART: [ldev] FE.KEYID = 1
8,533,563 UART: [ldev] Erasing FE.KEYID = 1
11,827,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,341 UART: [ldev] --
14,193,461 UART: [fwproc] Wait for Commands...
14,196,253 UART: [fwproc] Recv command 0x46574c44
14,198,565 UART: [fwproc] Recv'd Img size: 106620 bytes
18,176,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,252,016 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,294,471 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,612,175 >>> mbox cmd response: success
18,616,053 UART: [afmc] ++
18,616,665 UART: [afmc] CDI.KEYID = 6
18,617,846 UART: [afmc] SUBJECT.KEYID = 7
18,619,018 UART: [afmc] AUTHORITY.KEYID = 5
21,936,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,231,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,234,216 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,250,199 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,266,277 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,282,360 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,306,613 UART: [afmc] --
24,309,476 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,310,209 UART: [cold-reset] --
24,311,880 UART: [state] Locking Datavault
24,316,594 UART: [state] Locking PCR0, PCR1 and PCR31
24,318,235 UART: [state] Locking ICCM
24,319,896 UART: [exit] Launching FMC @ 0x40000000
24,328,506 UART:
24,328,743 UART: Running Caliptra FMC ...
24,329,839 UART:
24,329,992 UART: [fmc] Received command: 0x46574C44
24,331,444 UART:
24,331,593 UART: Running Caliptra ROM ...
24,332,602 UART:
24,332,736 UART: [state] CFI Enabled
24,348,164 UART: [state] LifecycleState = Unprovisioned
24,350,043 UART: [state] DebugLocked = No
24,351,476 UART: [state] WD Timer not started. Device not locked for debugging
24,356,557 UART: [kat] SHA2-256
24,538,509 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,550,050 UART: [kat] ++
24,550,638 UART: [kat] sha1
24,559,640 UART: [kat] SHA2-256
24,562,654 UART: [kat] SHA2-384
24,569,439 UART: [kat] SHA2-512-ACC
24,572,052 UART: [kat] ECC-384
27,829,072 UART: [kat] HMAC-384Kdf
27,840,750 UART: [kat] LMS
28,913,882 UART: [kat] --
28,920,181 UART: [update-reset] ++
28,928,157 >>> mbox cmd response: failed
28,931,044 UART: ROM Non-Fatal Error: 0x000B0001
28,934,818 UART: [state] Locking Datavault
28,938,659 UART: [state] Locking PCR0, PCR1 and PCR31
28,940,921 UART: [state] Locking ICCM
28,943,531 UART: [exit] Launching FMC @ 0x40000000
28,952,201 UART:
28,952,446 UART: Running Caliptra FMC ...
28,953,591 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
5,098,774 ready_for_fw is high
5,099,482 <<< Executing mbox cmd 0x46574c44 (106620 bytes) from SoC
18,407,752 >>> mbox cmd response: success
24,038,626 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,052,258 UART:
24,052,616 UART: Running Caliptra FMC ...
24,053,890 UART:
24,054,061 UART: [fmc] Received command: 0x46574C44
28,546,214 >>> mbox cmd response: failed
28,559,215 UART:
28,559,502 UART: Running Caliptra FMC ...
28,560,666 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,022 UART:
192,402 UART: Running Caliptra ROM ...
193,597 UART:
193,755 UART: [state] CFI Enabled
260,128 UART: [state] LifecycleState = Unprovisioned
261,993 UART: [state] DebugLocked = No
264,444 UART: [state] WD Timer not started. Device not locked for debugging
269,136 UART: [kat] SHA2-256
447,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,209 UART: [kat] ++
459,657 UART: [kat] sha1
470,264 UART: [kat] SHA2-256
473,281 UART: [kat] SHA2-384
479,272 UART: [kat] SHA2-512-ACC
482,206 UART: [kat] ECC-384
2,946,144 UART: [kat] HMAC-384Kdf
2,971,690 UART: [kat] LMS
3,501,163 UART: [kat] --
3,506,791 UART: [cold-reset] ++
3,508,652 UART: [fht] FHT @ 0x50003400
3,520,841 UART: [idev] ++
3,521,408 UART: [idev] CDI.KEYID = 6
3,522,313 UART: [idev] SUBJECT.KEYID = 7
3,523,489 UART: [idev] UDS.KEYID = 0
3,524,544 ready_for_fw is high
3,524,740 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,659,332 UART: [idev] Erasing UDS.KEYID = 0
6,027,399 UART: [idev] Sha1 KeyId Algorithm
6,050,659 UART: [idev] --
6,055,584 UART: [ldev] ++
6,056,159 UART: [ldev] CDI.KEYID = 6
6,057,070 UART: [ldev] SUBJECT.KEYID = 5
6,058,293 UART: [ldev] AUTHORITY.KEYID = 7
6,059,528 UART: [ldev] FE.KEYID = 1
6,100,909 UART: [ldev] Erasing FE.KEYID = 1
8,601,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,971 UART: [ldev] --
10,393,179 UART: [fwproc] Wait for Commands...
10,395,541 UART: [fwproc] Recv command 0x46574c44
10,397,653 UART: [fwproc] Recv'd Img size: 106964 bytes
13,708,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,781,807 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,824,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,143,101 >>> mbox cmd response: success
14,147,946 UART: [afmc] ++
14,148,558 UART: [afmc] CDI.KEYID = 6
14,149,469 UART: [afmc] SUBJECT.KEYID = 7
14,150,632 UART: [afmc] AUTHORITY.KEYID = 5
16,680,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,401,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,403,482 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,419,421 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,435,349 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,451,313 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,475,762 UART: [afmc] --
18,478,746 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,479,489 UART: [cold-reset] --
18,480,893 UART: [state] Locking Datavault
18,485,551 UART: [state] Locking PCR0, PCR1 and PCR31
18,487,202 UART: [state] Locking ICCM
18,488,809 UART: [exit] Launching FMC @ 0x40000000
18,497,204 UART:
18,497,439 UART: Running Caliptra FMC ...
18,498,538 UART:
18,498,699 UART: [fmc] Received command: 0x46574C44
18,500,156 UART:
18,500,307 UART: Running Caliptra ROM ...
18,501,401 UART:
18,501,552 UART: [state] CFI Enabled
18,564,492 UART: [state] LifecycleState = Unprovisioned
18,566,370 UART: [state] DebugLocked = No
18,568,326 UART: [state] WD Timer not started. Device not locked for debugging
18,571,676 UART: [kat] SHA2-256
18,750,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,762,384 UART: [kat] ++
18,762,842 UART: [kat] sha1
18,773,238 UART: [kat] SHA2-256
18,776,254 UART: [kat] SHA2-384
18,781,264 UART: [kat] SHA2-512-ACC
18,784,208 UART: [kat] ECC-384
21,226,906 UART: [kat] HMAC-384Kdf
21,249,220 UART: [kat] LMS
21,778,661 UART: [kat] --
21,783,467 UART: [update-reset] ++
21,790,837 >>> mbox cmd response: failed
21,792,405 UART: ROM Non-Fatal Error: 0x000B0001
21,794,818 UART: [state] Locking Datavault
21,796,849 UART: [state] Locking PCR0, PCR1 and PCR31
21,798,544 UART: [state] Locking ICCM
21,800,397 UART: [exit] Launching FMC @ 0x40000000
21,808,853 UART:
21,809,103 UART: Running Caliptra FMC ...
21,810,246 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,876 writing to cptra_bootfsm_go
3,383,748 ready_for_fw is high
3,384,139 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,943,206 >>> mbox cmd response: success
18,227,101 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,243,331 UART:
18,243,693 UART: Running Caliptra FMC ...
18,244,848 UART:
18,245,003 UART: [fmc] Received command: 0x46574C44
21,425,673 >>> mbox cmd response: failed
21,437,975 UART:
21,438,259 UART: Running Caliptra FMC ...
21,439,424 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,671 UART:
193,042 UART: Running Caliptra ROM ...
194,138 UART:
603,834 UART: [state] CFI Enabled
614,923 UART: [state] LifecycleState = Unprovisioned
616,801 UART: [state] DebugLocked = No
619,603 UART: [state] WD Timer not started. Device not locked for debugging
623,215 UART: [kat] SHA2-256
802,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,914 UART: [kat] ++
814,445 UART: [kat] sha1
824,967 UART: [kat] SHA2-256
827,970 UART: [kat] SHA2-384
834,449 UART: [kat] SHA2-512-ACC
837,409 UART: [kat] ECC-384
3,275,845 UART: [kat] HMAC-384Kdf
3,287,585 UART: [kat] LMS
3,817,046 UART: [kat] --
3,822,817 UART: [cold-reset] ++
3,825,097 UART: [fht] FHT @ 0x50003400
3,836,215 UART: [idev] ++
3,836,783 UART: [idev] CDI.KEYID = 6
3,837,692 UART: [idev] SUBJECT.KEYID = 7
3,838,865 UART: [idev] UDS.KEYID = 0
3,839,808 ready_for_fw is high
3,839,994 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
3,975,118 UART: [idev] Erasing UDS.KEYID = 0
6,311,722 UART: [idev] Sha1 KeyId Algorithm
6,335,514 UART: [idev] --
6,338,152 UART: [ldev] ++
6,338,718 UART: [ldev] CDI.KEYID = 6
6,339,655 UART: [ldev] SUBJECT.KEYID = 5
6,340,731 UART: [ldev] AUTHORITY.KEYID = 7
6,342,065 UART: [ldev] FE.KEYID = 1
6,353,924 UART: [ldev] Erasing FE.KEYID = 1
8,830,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,261 UART: [ldev] --
10,620,507 UART: [fwproc] Wait for Commands...
10,623,409 UART: [fwproc] Recv command 0x46574c44
10,625,503 UART: [fwproc] Recv'd Img size: 106964 bytes
13,940,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,017,119 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,059,722 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,377,681 >>> mbox cmd response: success
14,381,355 UART: [afmc] ++
14,381,970 UART: [afmc] CDI.KEYID = 6
14,382,855 UART: [afmc] SUBJECT.KEYID = 7
14,384,071 UART: [afmc] AUTHORITY.KEYID = 5
16,882,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,601,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,603,467 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,619,455 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,635,385 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,651,283 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,674,574 UART: [afmc] --
18,678,857 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,679,652 UART: [cold-reset] --
18,685,029 UART: [state] Locking Datavault
18,690,456 UART: [state] Locking PCR0, PCR1 and PCR31
18,692,102 UART: [state] Locking ICCM
18,693,462 UART: [exit] Launching FMC @ 0x40000000
18,701,848 UART:
18,702,086 UART: Running Caliptra FMC ...
18,703,115 UART:
18,703,256 UART: [fmc] Received command: 0x46574C44
18,704,653 UART:
18,704,799 UART: Running Caliptra ROM ...
18,705,891 UART:
18,706,060 UART: [state] CFI Enabled
18,723,775 UART: [state] LifecycleState = Unprovisioned
18,725,604 UART: [state] DebugLocked = No
18,727,332 UART: [state] WD Timer not started. Device not locked for debugging
18,731,423 UART: [kat] SHA2-256
18,910,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,922,190 UART: [kat] ++
18,922,648 UART: [kat] sha1
18,933,206 UART: [kat] SHA2-256
18,936,215 UART: [kat] SHA2-384
18,942,795 UART: [kat] SHA2-512-ACC
18,945,737 UART: [kat] ECC-384
21,390,731 UART: [kat] HMAC-384Kdf
21,403,747 UART: [kat] LMS
21,933,260 UART: [kat] --
21,938,573 UART: [update-reset] ++
21,945,680 >>> mbox cmd response: failed
21,947,905 UART: ROM Non-Fatal Error: 0x000B0001
21,951,173 UART: [state] Locking Datavault
21,953,969 UART: [state] Locking PCR0, PCR1 and PCR31
21,955,648 UART: [state] Locking ICCM
21,956,879 UART: [exit] Launching FMC @ 0x40000000
21,965,164 UART:
21,965,414 UART: Running Caliptra FMC ...
21,966,551 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,694,264 ready_for_fw is high
3,694,823 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,155,685 >>> mbox cmd response: success
18,386,749 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,403,150 UART:
18,403,513 UART: Running Caliptra FMC ...
18,404,772 UART:
18,404,935 UART: [fmc] Received command: 0x46574C44
21,497,666 >>> mbox cmd response: failed
21,510,579 UART:
21,510,863 UART: Running Caliptra FMC ...
21,512,023 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,362,367 ready_for_fw is high
3,362,749 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
13,915,701 >>> mbox cmd response: success
18,181,565 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,197,483 UART:
18,197,861 UART: Running Caliptra FMC ...
18,199,058 UART:
18,199,270 UART: [fmc] Received command: 0x46574C44
21,362,249 >>> mbox cmd response: failed
21,377,092 UART:
21,377,381 UART: Running Caliptra FMC ...
21,378,567 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,701,613 ready_for_fw is high
3,702,035 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
14,149,180 >>> mbox cmd response: success
18,384,108 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,398,578 UART:
18,398,916 UART: Running Caliptra FMC ...
18,400,167 UART:
18,400,331 UART: [fmc] Received command: 0x46574C44
21,494,731 >>> mbox cmd response: failed
21,508,412 UART:
21,508,696 UART: Running Caliptra FMC ...
21,509,865 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
915,774 UART: [kat] HMAC-384Kdf
920,384 UART: [kat] LMS
1,168,696 UART: [kat] --
1,169,663 UART: [cold-reset] ++
1,170,059 UART: [fht] FHT @ 0x50003400
1,172,817 UART: [idev] ++
1,172,985 UART: [idev] CDI.KEYID = 6
1,173,346 UART: [idev] SUBJECT.KEYID = 7
1,173,771 UART: [idev] UDS.KEYID = 0
1,174,117 ready_for_fw is high
1,174,117 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,543 UART: [idev] Erasing UDS.KEYID = 0
1,198,671 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,548 UART: [ldev] ++
1,208,716 UART: [ldev] CDI.KEYID = 6
1,209,080 UART: [ldev] SUBJECT.KEYID = 5
1,209,507 UART: [ldev] AUTHORITY.KEYID = 7
1,209,970 UART: [ldev] FE.KEYID = 1
1,215,202 UART: [ldev] Erasing FE.KEYID = 1
1,241,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,708 UART: [ldev] --
1,281,018 UART: [fwproc] Wait for Commands...
1,281,589 UART: [fwproc] Recv command 0x46574c44
1,282,322 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,172 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,676,177 >>> mbox cmd response: success
2,677,316 UART: [afmc] ++
2,677,484 UART: [afmc] CDI.KEYID = 6
2,677,847 UART: [afmc] SUBJECT.KEYID = 7
2,678,273 UART: [afmc] AUTHORITY.KEYID = 5
2,713,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,470 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,190 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,083 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,776 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,763 UART: [afmc] --
2,756,777 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,756,799 UART: [cold-reset] --
2,757,751 UART: [state] Locking Datavault
2,759,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,690 UART: [state] Locking ICCM
2,760,334 UART: [exit] Launching FMC @ 0x40000000
2,765,631 UART:
2,765,647 UART: Running Caliptra FMC ...
2,766,055 UART:
2,766,193 UART: [fmc] Received command: 0x46574C44
2,767,022 UART:
2,767,038 UART: Running Caliptra ROM ...
2,767,446 UART:
2,767,501 UART: [state] CFI Enabled
2,770,121 UART: [state] LifecycleState = Unprovisioned
2,770,776 UART: [state] DebugLocked = No
2,771,260 UART: [state] WD Timer not started. Device not locked for debugging
2,772,538 UART: [kat] SHA2-256
3,576,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,217 UART: [kat] ++
3,580,369 UART: [kat] sha1
3,584,665 UART: [kat] SHA2-256
3,586,605 UART: [kat] SHA2-384
3,589,334 UART: [kat] SHA2-512-ACC
3,591,234 UART: [kat] ECC-384
3,600,893 UART: [kat] HMAC-384Kdf
3,605,537 UART: [kat] LMS
3,853,849 UART: [kat] --
3,854,343 UART: [update-reset] ++
3,855,804 >>> mbox cmd response: failed
3,856,276 UART: ROM Non-Fatal Error: 0x000B0001
3,857,258 UART: [state] Locking Datavault
3,858,030 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,634 UART: [state] Locking ICCM
3,859,064 UART: [exit] Launching FMC @ 0x40000000
3,864,361 UART:
3,864,377 UART: Running Caliptra FMC ...
3,864,785 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,362 ready_for_fw is high
1,056,362 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,005 >>> mbox cmd response: success
2,583,427 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,589,546 UART:
2,589,562 UART: Running Caliptra FMC ...
2,589,970 UART:
2,590,108 UART: [fmc] Received command: 0x46574C44
3,564,111 >>> mbox cmd response: failed
3,569,578 UART:
3,569,594 UART: Running Caliptra FMC ...
3,570,002 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,723 UART: [kat] HMAC-384Kdf
921,347 UART: [kat] LMS
1,169,659 UART: [kat] --
1,170,572 UART: [cold-reset] ++
1,171,052 UART: [fht] FHT @ 0x50003400
1,173,624 UART: [idev] ++
1,173,792 UART: [idev] CDI.KEYID = 6
1,174,153 UART: [idev] SUBJECT.KEYID = 7
1,174,578 UART: [idev] UDS.KEYID = 0
1,174,924 ready_for_fw is high
1,174,924 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,858 UART: [idev] Erasing UDS.KEYID = 0
1,200,432 UART: [idev] Sha1 KeyId Algorithm
1,209,396 UART: [idev] --
1,210,491 UART: [ldev] ++
1,210,659 UART: [ldev] CDI.KEYID = 6
1,211,023 UART: [ldev] SUBJECT.KEYID = 5
1,211,450 UART: [ldev] AUTHORITY.KEYID = 7
1,211,913 UART: [ldev] FE.KEYID = 1
1,217,217 UART: [ldev] Erasing FE.KEYID = 1
1,243,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,747 UART: [ldev] --
1,282,249 UART: [fwproc] Wait for Commands...
1,283,010 UART: [fwproc] Recv command 0x46574c44
1,283,743 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,813 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,896 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,850 >>> mbox cmd response: success
2,678,943 UART: [afmc] ++
2,679,111 UART: [afmc] CDI.KEYID = 6
2,679,474 UART: [afmc] SUBJECT.KEYID = 7
2,679,900 UART: [afmc] AUTHORITY.KEYID = 5
2,715,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,733,343 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,739,063 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,956 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,649 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,758,448 UART: [afmc] --
2,759,344 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,759,366 UART: [cold-reset] --
2,760,320 UART: [state] Locking Datavault
2,761,289 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,893 UART: [state] Locking ICCM
2,762,529 UART: [exit] Launching FMC @ 0x40000000
2,767,826 UART:
2,767,842 UART: Running Caliptra FMC ...
2,768,250 UART:
2,768,388 UART: [fmc] Received command: 0x46574C44
2,769,217 UART:
2,769,233 UART: Running Caliptra ROM ...
2,769,641 UART:
2,769,783 UART: [state] CFI Enabled
2,772,535 UART: [state] LifecycleState = Unprovisioned
2,773,190 UART: [state] DebugLocked = No
2,773,820 UART: [state] WD Timer not started. Device not locked for debugging
2,775,076 UART: [kat] SHA2-256
3,578,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,582,755 UART: [kat] ++
3,582,907 UART: [kat] sha1
3,587,177 UART: [kat] SHA2-256
3,589,117 UART: [kat] SHA2-384
3,591,818 UART: [kat] SHA2-512-ACC
3,593,718 UART: [kat] ECC-384
3,603,389 UART: [kat] HMAC-384Kdf
3,607,829 UART: [kat] LMS
3,856,141 UART: [kat] --
3,856,753 UART: [update-reset] ++
3,858,164 >>> mbox cmd response: failed
3,858,636 UART: ROM Non-Fatal Error: 0x000B0001
3,859,476 UART: [state] Locking Datavault
3,860,126 UART: [state] Locking PCR0, PCR1 and PCR31
3,860,730 UART: [state] Locking ICCM
3,861,154 UART: [exit] Launching FMC @ 0x40000000
3,866,451 UART:
3,866,467 UART: Running Caliptra FMC ...
3,866,875 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,967 ready_for_fw is high
1,055,967 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,527,276 >>> mbox cmd response: success
2,583,308 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,589,563 UART:
2,589,579 UART: Running Caliptra FMC ...
2,589,987 UART:
2,590,125 UART: [fmc] Received command: 0x46574C44
3,563,721 >>> mbox cmd response: failed
3,569,232 UART:
3,569,248 UART: Running Caliptra FMC ...
3,569,656 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,805 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
891,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,685 UART: [kat] ++
895,837 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,169,749 UART: [cold-reset] ++
1,170,105 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,173,957 ready_for_fw is high
1,173,957 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,199,035 UART: [idev] Sha1 KeyId Algorithm
1,207,935 UART: [idev] --
1,209,146 UART: [ldev] ++
1,209,314 UART: [ldev] CDI.KEYID = 6
1,209,678 UART: [ldev] SUBJECT.KEYID = 5
1,210,105 UART: [ldev] AUTHORITY.KEYID = 7
1,210,568 UART: [ldev] FE.KEYID = 1
1,215,580 UART: [ldev] Erasing FE.KEYID = 1
1,241,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,690 UART: [ldev] --
1,281,070 UART: [fwproc] Wait for Commands...
1,281,673 UART: [fwproc] Recv command 0x46574c44
1,282,406 UART: [fwproc] Recv'd Img size: 106964 bytes
2,495,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,974 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,057 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,937 >>> mbox cmd response: success
2,676,968 UART: [afmc] ++
2,677,136 UART: [afmc] CDI.KEYID = 6
2,677,499 UART: [afmc] SUBJECT.KEYID = 7
2,677,925 UART: [afmc] AUTHORITY.KEYID = 5
2,713,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,660 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,380 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,273 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,966 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,641 UART: [afmc] --
2,756,721 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,756,743 UART: [cold-reset] --
2,757,471 UART: [state] Locking Datavault
2,758,642 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,246 UART: [state] Locking ICCM
2,759,810 UART: [exit] Launching FMC @ 0x40000000
2,765,107 UART:
2,765,123 UART: Running Caliptra FMC ...
2,765,531 UART:
2,765,669 UART: [fmc] Received command: 0x46574C44
2,766,498 UART:
2,766,514 UART: Running Caliptra ROM ...
2,766,922 UART:
2,766,977 UART: [state] CFI Enabled
2,769,817 UART: [state] LifecycleState = Unprovisioned
2,770,472 UART: [state] DebugLocked = No
2,771,108 UART: [state] WD Timer not started. Device not locked for debugging
2,772,300 UART: [kat] SHA2-256
3,575,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,979 UART: [kat] ++
3,580,131 UART: [kat] sha1
3,584,427 UART: [kat] SHA2-256
3,586,367 UART: [kat] SHA2-384
3,589,104 UART: [kat] SHA2-512-ACC
3,591,004 UART: [kat] ECC-384
3,601,017 UART: [kat] HMAC-384Kdf
3,605,621 UART: [kat] LMS
3,853,933 UART: [kat] --
3,854,523 UART: [update-reset] ++
3,855,952 >>> mbox cmd response: failed
3,856,356 UART: ROM Non-Fatal Error: 0x000B0001
3,857,204 UART: [state] Locking Datavault
3,857,916 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,520 UART: [state] Locking ICCM
3,859,106 UART: [exit] Launching FMC @ 0x40000000
3,864,403 UART:
3,864,419 UART: Running Caliptra FMC ...
3,864,827 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,742 ready_for_fw is high
1,055,742 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,551 >>> mbox cmd response: success
2,582,959 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,589,152 UART:
2,589,168 UART: Running Caliptra FMC ...
2,589,576 UART:
2,589,714 UART: [fmc] Received command: 0x46574C44
3,563,803 >>> mbox cmd response: failed
3,569,522 UART:
3,569,538 UART: Running Caliptra FMC ...
3,569,946 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,615 UART: [kat] HMAC-384Kdf
921,139 UART: [kat] LMS
1,169,451 UART: [kat] --
1,170,602 UART: [cold-reset] ++
1,171,020 UART: [fht] FHT @ 0x50003400
1,173,820 UART: [idev] ++
1,173,988 UART: [idev] CDI.KEYID = 6
1,174,349 UART: [idev] SUBJECT.KEYID = 7
1,174,774 UART: [idev] UDS.KEYID = 0
1,175,120 ready_for_fw is high
1,175,120 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,183,176 UART: [idev] Erasing UDS.KEYID = 0
1,200,726 UART: [idev] Sha1 KeyId Algorithm
1,209,840 UART: [idev] --
1,210,719 UART: [ldev] ++
1,210,887 UART: [ldev] CDI.KEYID = 6
1,211,251 UART: [ldev] SUBJECT.KEYID = 5
1,211,678 UART: [ldev] AUTHORITY.KEYID = 7
1,212,141 UART: [ldev] FE.KEYID = 1
1,217,669 UART: [ldev] Erasing FE.KEYID = 1
1,244,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,419 UART: [ldev] --
1,283,921 UART: [fwproc] Wait for Commands...
1,284,644 UART: [fwproc] Recv command 0x46574c44
1,285,377 UART: [fwproc] Recv'd Img size: 106964 bytes
2,497,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,525,239 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,543,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,679,438 >>> mbox cmd response: success
2,680,625 UART: [afmc] ++
2,680,793 UART: [afmc] CDI.KEYID = 6
2,681,156 UART: [afmc] SUBJECT.KEYID = 7
2,681,582 UART: [afmc] AUTHORITY.KEYID = 5
2,717,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,733,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,734,419 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,740,139 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,746,032 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,751,725 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,759,492 UART: [afmc] --
2,760,478 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,760,500 UART: [cold-reset] --
2,761,288 UART: [state] Locking Datavault
2,762,473 UART: [state] Locking PCR0, PCR1 and PCR31
2,763,077 UART: [state] Locking ICCM
2,763,639 UART: [exit] Launching FMC @ 0x40000000
2,768,936 UART:
2,768,952 UART: Running Caliptra FMC ...
2,769,360 UART:
2,769,498 UART: [fmc] Received command: 0x46574C44
2,770,327 UART:
2,770,343 UART: Running Caliptra ROM ...
2,770,751 UART:
2,770,893 UART: [state] CFI Enabled
2,773,347 UART: [state] LifecycleState = Unprovisioned
2,774,002 UART: [state] DebugLocked = No
2,774,648 UART: [state] WD Timer not started. Device not locked for debugging
2,776,006 UART: [kat] SHA2-256
3,579,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,583,685 UART: [kat] ++
3,583,837 UART: [kat] sha1
3,588,005 UART: [kat] SHA2-256
3,589,945 UART: [kat] SHA2-384
3,592,684 UART: [kat] SHA2-512-ACC
3,594,584 UART: [kat] ECC-384
3,604,241 UART: [kat] HMAC-384Kdf
3,608,863 UART: [kat] LMS
3,857,175 UART: [kat] --
3,858,069 UART: [update-reset] ++
3,859,080 >>> mbox cmd response: failed
3,859,576 UART: ROM Non-Fatal Error: 0x000B0001
3,860,436 UART: [state] Locking Datavault
3,861,346 UART: [state] Locking PCR0, PCR1 and PCR31
3,861,950 UART: [state] Locking ICCM
3,862,398 UART: [exit] Launching FMC @ 0x40000000
3,867,695 UART:
3,867,711 UART: Running Caliptra FMC ...
3,868,119 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,141 ready_for_fw is high
1,056,141 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,525,914 >>> mbox cmd response: success
2,582,156 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,588,643 UART:
2,588,659 UART: Running Caliptra FMC ...
2,589,067 UART:
2,589,205 UART: [fmc] Received command: 0x46574C44
3,563,857 >>> mbox cmd response: failed
3,569,612 UART:
3,569,628 UART: Running Caliptra FMC ...
3,570,036 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,603 UART: [kat] SHA2-256
901,543 UART: [kat] SHA2-384
904,308 UART: [kat] SHA2-512-ACC
906,209 UART: [kat] ECC-384
915,594 UART: [kat] HMAC-384Kdf
920,086 UART: [kat] LMS
1,168,398 UART: [kat] --
1,169,313 UART: [cold-reset] ++
1,169,885 UART: [fht] FHT @ 0x50003400
1,172,623 UART: [idev] ++
1,172,791 UART: [idev] CDI.KEYID = 6
1,173,152 UART: [idev] SUBJECT.KEYID = 7
1,173,577 UART: [idev] UDS.KEYID = 0
1,173,923 ready_for_fw is high
1,173,923 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,181,335 UART: [idev] Erasing UDS.KEYID = 0
1,198,241 UART: [idev] Sha1 KeyId Algorithm
1,206,973 UART: [idev] --
1,207,960 UART: [ldev] ++
1,208,128 UART: [ldev] CDI.KEYID = 6
1,208,492 UART: [ldev] SUBJECT.KEYID = 5
1,208,919 UART: [ldev] AUTHORITY.KEYID = 7
1,209,382 UART: [ldev] FE.KEYID = 1
1,214,382 UART: [ldev] Erasing FE.KEYID = 1
1,240,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,126 UART: [ldev] --
1,279,642 UART: [fwproc] Wait for Commands...
1,280,267 UART: [fwproc] Recv command 0x46574c44
1,281,000 UART: [fwproc] Recv'd Img size: 106964 bytes
2,493,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,440 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,675,639 >>> mbox cmd response: success
2,676,680 UART: [afmc] ++
2,676,848 UART: [afmc] CDI.KEYID = 6
2,677,211 UART: [afmc] SUBJECT.KEYID = 7
2,677,637 UART: [afmc] AUTHORITY.KEYID = 5
2,712,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,996 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,716 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,609 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,302 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,119 UART: [afmc] --
2,756,047 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,756,069 UART: [cold-reset] --
2,756,855 UART: [state] Locking Datavault
2,757,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,598 UART: [state] Locking ICCM
2,759,256 UART: [exit] Launching FMC @ 0x40000000
2,764,553 UART:
2,764,569 UART: Running Caliptra FMC ...
2,764,977 UART:
2,765,115 UART: [fmc] Received command: 0x46574C44
2,765,944 UART:
2,765,960 UART: Running Caliptra ROM ...
2,766,368 UART:
2,766,423 UART: [state] CFI Enabled
2,768,817 UART: [state] LifecycleState = Unprovisioned
2,769,472 UART: [state] DebugLocked = No
2,770,028 UART: [state] WD Timer not started. Device not locked for debugging
2,771,360 UART: [kat] SHA2-256
3,574,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,039 UART: [kat] ++
3,579,191 UART: [kat] sha1
3,583,329 UART: [kat] SHA2-256
3,585,269 UART: [kat] SHA2-384
3,587,942 UART: [kat] SHA2-512-ACC
3,589,842 UART: [kat] ECC-384
3,599,813 UART: [kat] HMAC-384Kdf
3,604,413 UART: [kat] LMS
3,852,725 UART: [kat] --
3,853,595 UART: [update-reset] ++
3,855,246 >>> mbox cmd response: failed
3,855,516 UART: ROM Non-Fatal Error: 0x000B0001
3,856,338 UART: [state] Locking Datavault
3,857,036 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,640 UART: [state] Locking ICCM
3,858,120 UART: [exit] Launching FMC @ 0x40000000
3,863,417 UART:
3,863,433 UART: Running Caliptra FMC ...
3,863,841 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,712 ready_for_fw is high
1,055,712 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,524,075 >>> mbox cmd response: success
2,580,221 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,586,368 UART:
2,586,384 UART: Running Caliptra FMC ...
2,586,792 UART:
2,586,930 UART: [fmc] Received command: 0x46574C44
3,561,337 >>> mbox cmd response: failed
3,567,174 UART:
3,567,190 UART: Running Caliptra FMC ...
3,567,598 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,815 UART: [kat] SHA2-512-ACC
906,716 UART: [kat] ECC-384
916,947 UART: [kat] HMAC-384Kdf
921,525 UART: [kat] LMS
1,169,837 UART: [kat] --
1,170,688 UART: [cold-reset] ++
1,171,132 UART: [fht] FHT @ 0x50003400
1,173,820 UART: [idev] ++
1,173,988 UART: [idev] CDI.KEYID = 6
1,174,349 UART: [idev] SUBJECT.KEYID = 7
1,174,774 UART: [idev] UDS.KEYID = 0
1,175,120 ready_for_fw is high
1,175,120 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
1,182,474 UART: [idev] Erasing UDS.KEYID = 0
1,199,914 UART: [idev] Sha1 KeyId Algorithm
1,208,840 UART: [idev] --
1,209,909 UART: [ldev] ++
1,210,077 UART: [ldev] CDI.KEYID = 6
1,210,441 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,242,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,282,193 UART: [fwproc] Wait for Commands...
1,282,828 UART: [fwproc] Recv command 0x46574c44
1,283,561 UART: [fwproc] Recv'd Img size: 106964 bytes
2,496,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,181 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,264 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,677,142 >>> mbox cmd response: success
2,678,379 UART: [afmc] ++
2,678,547 UART: [afmc] CDI.KEYID = 6
2,678,910 UART: [afmc] SUBJECT.KEYID = 7
2,679,336 UART: [afmc] AUTHORITY.KEYID = 5
2,714,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,969 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,689 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,582 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,275 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,050 UART: [afmc] --
2,758,064 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,758,086 UART: [cold-reset] --
2,758,886 UART: [state] Locking Datavault
2,759,917 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,521 UART: [state] Locking ICCM
2,760,967 UART: [exit] Launching FMC @ 0x40000000
2,766,264 UART:
2,766,280 UART: Running Caliptra FMC ...
2,766,688 UART:
2,766,826 UART: [fmc] Received command: 0x46574C44
2,767,655 UART:
2,767,671 UART: Running Caliptra ROM ...
2,768,079 UART:
2,768,221 UART: [state] CFI Enabled
2,770,603 UART: [state] LifecycleState = Unprovisioned
2,771,258 UART: [state] DebugLocked = No
2,771,970 UART: [state] WD Timer not started. Device not locked for debugging
2,773,170 UART: [kat] SHA2-256
3,576,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,580,849 UART: [kat] ++
3,581,001 UART: [kat] sha1
3,585,237 UART: [kat] SHA2-256
3,587,177 UART: [kat] SHA2-384
3,589,812 UART: [kat] SHA2-512-ACC
3,591,712 UART: [kat] ECC-384
3,601,195 UART: [kat] HMAC-384Kdf
3,605,811 UART: [kat] LMS
3,854,123 UART: [kat] --
3,855,271 UART: [update-reset] ++
3,857,018 >>> mbox cmd response: failed
3,857,270 UART: ROM Non-Fatal Error: 0x000B0001
3,858,184 UART: [state] Locking Datavault
3,858,998 UART: [state] Locking PCR0, PCR1 and PCR31
3,859,602 UART: [state] Locking ICCM
3,860,226 UART: [exit] Launching FMC @ 0x40000000
3,865,523 UART:
3,865,539 UART: Running Caliptra FMC ...
3,865,947 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,289 ready_for_fw is high
1,056,289 <<< Executing mbox cmd 0x46574c44 (106964 bytes) from SoC
2,526,088 >>> mbox cmd response: success
2,582,392 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,588,831 UART:
2,588,847 UART: Running Caliptra FMC ...
2,589,255 UART:
2,589,393 UART: [fmc] Received command: 0x46574C44
3,563,839 >>> mbox cmd response: failed
3,569,670 UART:
3,569,686 UART: Running Caliptra FMC ...
3,570,094 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,961 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,231 UART:
192,606 UART: Running Caliptra ROM ...
193,855 UART:
194,013 UART: [state] CFI Enabled
264,821 UART: [state] LifecycleState = Unprovisioned
267,187 UART: [state] DebugLocked = No
268,948 UART: [state] WD Timer not started. Device not locked for debugging
273,655 UART: [kat] SHA2-256
455,602 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,088 UART: [kat] ++
467,617 UART: [kat] sha1
478,823 UART: [kat] SHA2-256
481,835 UART: [kat] SHA2-384
486,787 UART: [kat] SHA2-512-ACC
489,393 UART: [kat] ECC-384
3,776,358 UART: [kat] HMAC-384Kdf
3,800,359 UART: [kat] LMS
4,873,533 UART: [kat] --
4,879,025 UART: [cold-reset] ++
4,881,353 UART: [fht] FHT @ 0x50003400
4,893,414 UART: [idev] ++
4,894,082 UART: [idev] CDI.KEYID = 6
4,895,244 UART: [idev] SUBJECT.KEYID = 7
4,896,404 UART: [idev] UDS.KEYID = 0
4,927,799 UART: [idev] Erasing UDS.KEYID = 0
8,241,098 UART: [idev] Sha1 KeyId Algorithm
8,262,607 UART: [idev] --
8,266,601 UART: [ldev] ++
8,267,171 UART: [ldev] CDI.KEYID = 6
8,268,407 UART: [ldev] SUBJECT.KEYID = 5
8,269,509 UART: [ldev] AUTHORITY.KEYID = 7
8,270,741 UART: [ldev] FE.KEYID = 1
8,314,306 UART: [ldev] Erasing FE.KEYID = 1
11,651,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,279 UART: [ldev] --
14,035,467 UART: [fwproc] Wait for Commands...
14,038,382 UART: [fwproc] Recv command 0x46505652
14,040,979 UART: [rt] FIPS Version
14,042,764 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,875 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,810,554 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
4,338 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,531 UART:
192,906 UART: Running Caliptra ROM ...
194,108 UART:
603,909 UART: [state] CFI Enabled
619,030 UART: [state] LifecycleState = Unprovisioned
621,407 UART: [state] DebugLocked = No
623,640 UART: [state] WD Timer not started. Device not locked for debugging
628,905 UART: [kat] SHA2-256
810,866 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,449 UART: [kat] ++
823,041 UART: [kat] sha1
832,631 UART: [kat] SHA2-256
835,688 UART: [kat] SHA2-384
841,012 UART: [kat] SHA2-512-ACC
843,618 UART: [kat] ECC-384
4,098,347 UART: [kat] HMAC-384Kdf
4,109,936 UART: [kat] LMS
5,183,080 UART: [kat] --
5,188,023 UART: [cold-reset] ++
5,189,584 UART: [fht] FHT @ 0x50003400
5,201,112 UART: [idev] ++
5,201,834 UART: [idev] CDI.KEYID = 6
5,202,943 UART: [idev] SUBJECT.KEYID = 7
5,204,501 UART: [idev] UDS.KEYID = 0
5,220,018 UART: [idev] Erasing UDS.KEYID = 0
8,494,860 UART: [idev] Sha1 KeyId Algorithm
8,515,719 UART: [idev] --
8,520,904 UART: [ldev] ++
8,521,468 UART: [ldev] CDI.KEYID = 6
8,522,623 UART: [ldev] SUBJECT.KEYID = 5
8,524,157 UART: [ldev] AUTHORITY.KEYID = 7
8,525,634 UART: [ldev] FE.KEYID = 1
8,536,492 UART: [ldev] Erasing FE.KEYID = 1
11,828,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,354 UART: [ldev] --
14,191,150 UART: [fwproc] Wait for Commands...
14,193,577 UART: [fwproc] Recv command 0x46505652
14,196,105 UART: [rt] FIPS Version
14,197,910 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,098 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,012,276 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,976 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,216 UART:
192,581 UART: Running Caliptra ROM ...
193,754 UART:
193,905 UART: [state] CFI Enabled
261,766 UART: [state] LifecycleState = Unprovisioned
263,684 UART: [state] DebugLocked = No
266,418 UART: [state] WD Timer not started. Device not locked for debugging
270,585 UART: [kat] SHA2-256
449,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,289 UART: [kat] ++
461,824 UART: [kat] sha1
473,114 UART: [kat] SHA2-256
476,139 UART: [kat] SHA2-384
483,421 UART: [kat] SHA2-512-ACC
486,362 UART: [kat] ECC-384
2,947,071 UART: [kat] HMAC-384Kdf
2,970,409 UART: [kat] LMS
3,499,856 UART: [kat] --
3,505,144 UART: [cold-reset] ++
3,506,152 UART: [fht] FHT @ 0x50003400
3,518,350 UART: [idev] ++
3,518,929 UART: [idev] CDI.KEYID = 6
3,519,875 UART: [idev] SUBJECT.KEYID = 7
3,521,092 UART: [idev] UDS.KEYID = 0
3,541,504 UART: [idev] Erasing UDS.KEYID = 0
6,025,042 UART: [idev] Sha1 KeyId Algorithm
6,048,639 UART: [idev] --
6,051,733 UART: [ldev] ++
6,052,312 UART: [ldev] CDI.KEYID = 6
6,053,228 UART: [ldev] SUBJECT.KEYID = 5
6,054,390 UART: [ldev] AUTHORITY.KEYID = 7
6,055,625 UART: [ldev] FE.KEYID = 1
6,097,770 UART: [ldev] Erasing FE.KEYID = 1
8,603,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,132 UART: [ldev] --
10,406,898 UART: [fwproc] Wait for Commands...
10,409,591 UART: [fwproc] Recv command 0x46505652
10,411,929 UART: [rt] FIPS Version
10,413,389 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
4,492 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,226,182 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
4,337 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,546 UART:
192,920 UART: Running Caliptra ROM ...
194,001 UART:
603,486 UART: [state] CFI Enabled
616,406 UART: [state] LifecycleState = Unprovisioned
618,282 UART: [state] DebugLocked = No
620,007 UART: [state] WD Timer not started. Device not locked for debugging
623,733 UART: [kat] SHA2-256
802,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,407 UART: [kat] ++
814,852 UART: [kat] sha1
827,129 UART: [kat] SHA2-256
830,129 UART: [kat] SHA2-384
835,451 UART: [kat] SHA2-512-ACC
838,379 UART: [kat] ECC-384
3,278,863 UART: [kat] HMAC-384Kdf
3,291,761 UART: [kat] LMS
3,821,264 UART: [kat] --
3,824,433 UART: [cold-reset] ++
3,825,581 UART: [fht] FHT @ 0x50003400
3,837,882 UART: [idev] ++
3,838,453 UART: [idev] CDI.KEYID = 6
3,839,367 UART: [idev] SUBJECT.KEYID = 7
3,840,579 UART: [idev] UDS.KEYID = 0
3,857,418 UART: [idev] Erasing UDS.KEYID = 0
6,314,469 UART: [idev] Sha1 KeyId Algorithm
6,337,806 UART: [idev] --
6,342,770 UART: [ldev] ++
6,343,334 UART: [ldev] CDI.KEYID = 6
6,344,273 UART: [ldev] SUBJECT.KEYID = 5
6,345,484 UART: [ldev] AUTHORITY.KEYID = 7
6,346,714 UART: [ldev] FE.KEYID = 1
6,356,252 UART: [ldev] Erasing FE.KEYID = 1
8,829,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,257 UART: [ldev] --
10,617,578 UART: [fwproc] Wait for Commands...
10,619,998 UART: [fwproc] Recv command 0x46505652
10,622,347 UART: [rt] FIPS Version
10,623,818 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,188 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,410,820 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,892 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,182,710 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
4,329 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,404,770 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,077 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,039 UART: [kat] ++
895,191 UART: [kat] sha1
899,447 UART: [kat] SHA2-256
901,387 UART: [kat] SHA2-384
904,222 UART: [kat] SHA2-512-ACC
906,123 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,172,991 UART: [idev] ++
1,173,159 UART: [idev] CDI.KEYID = 6
1,173,520 UART: [idev] SUBJECT.KEYID = 7
1,173,945 UART: [idev] UDS.KEYID = 0
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,199,073 UART: [idev] Sha1 KeyId Algorithm
1,207,963 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,356 UART: [ldev] Erasing FE.KEYID = 1
1,241,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,682 UART: [ldev] --
1,280,062 UART: [fwproc] Wait for Commands...
1,280,863 UART: [fwproc] Recv command 0x46505652
1,281,690 UART: [rt] FIPS Version
1,282,251 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,062 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,721 UART: [kat] HMAC-384Kdf
921,223 UART: [kat] LMS
1,169,535 UART: [kat] --
1,170,610 UART: [cold-reset] ++
1,171,172 UART: [fht] FHT @ 0x50003400
1,173,692 UART: [idev] ++
1,173,860 UART: [idev] CDI.KEYID = 6
1,174,221 UART: [idev] SUBJECT.KEYID = 7
1,174,646 UART: [idev] UDS.KEYID = 0
1,182,500 UART: [idev] Erasing UDS.KEYID = 0
1,198,780 UART: [idev] Sha1 KeyId Algorithm
1,207,626 UART: [idev] --
1,208,883 UART: [ldev] ++
1,209,051 UART: [ldev] CDI.KEYID = 6
1,209,415 UART: [ldev] SUBJECT.KEYID = 5
1,209,842 UART: [ldev] AUTHORITY.KEYID = 7
1,210,305 UART: [ldev] FE.KEYID = 1
1,215,489 UART: [ldev] Erasing FE.KEYID = 1
1,242,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,855 UART: [ldev] --
1,281,141 UART: [fwproc] Wait for Commands...
1,281,812 UART: [fwproc] Recv command 0x46505652
1,282,639 UART: [rt] FIPS Version
1,283,200 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,339 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
85,975 UART: [state] WD Timer not started. Device not locked for debugging
87,252 UART: [kat] SHA2-256
890,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,931 UART: [kat] ++
895,083 UART: [kat] sha1
899,355 UART: [kat] SHA2-256
901,295 UART: [kat] SHA2-384
903,988 UART: [kat] SHA2-512-ACC
905,889 UART: [kat] ECC-384
915,806 UART: [kat] HMAC-384Kdf
920,366 UART: [kat] LMS
1,168,678 UART: [kat] --
1,169,523 UART: [cold-reset] ++
1,169,923 UART: [fht] FHT @ 0x50003400
1,172,587 UART: [idev] ++
1,172,755 UART: [idev] CDI.KEYID = 6
1,173,116 UART: [idev] SUBJECT.KEYID = 7
1,173,541 UART: [idev] UDS.KEYID = 0
1,181,619 UART: [idev] Erasing UDS.KEYID = 0
1,198,301 UART: [idev] Sha1 KeyId Algorithm
1,207,233 UART: [idev] --
1,208,330 UART: [ldev] ++
1,208,498 UART: [ldev] CDI.KEYID = 6
1,208,862 UART: [ldev] SUBJECT.KEYID = 5
1,209,289 UART: [ldev] AUTHORITY.KEYID = 7
1,209,752 UART: [ldev] FE.KEYID = 1
1,215,138 UART: [ldev] Erasing FE.KEYID = 1
1,242,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,334 UART: [ldev] --
1,281,736 UART: [fwproc] Wait for Commands...
1,282,525 UART: [fwproc] Recv command 0x46505652
1,283,352 UART: [rt] FIPS Version
1,283,913 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,160 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
921,125 UART: [kat] LMS
1,169,437 UART: [kat] --
1,170,262 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,332 UART: [idev] ++
1,173,500 UART: [idev] CDI.KEYID = 6
1,173,861 UART: [idev] SUBJECT.KEYID = 7
1,174,286 UART: [idev] UDS.KEYID = 0
1,182,240 UART: [idev] Erasing UDS.KEYID = 0
1,198,980 UART: [idev] Sha1 KeyId Algorithm
1,207,988 UART: [idev] --
1,209,279 UART: [ldev] ++
1,209,447 UART: [ldev] CDI.KEYID = 6
1,209,811 UART: [ldev] SUBJECT.KEYID = 5
1,210,238 UART: [ldev] AUTHORITY.KEYID = 7
1,210,701 UART: [ldev] FE.KEYID = 1
1,216,065 UART: [ldev] Erasing FE.KEYID = 1
1,242,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,411 UART: [fwproc] Wait for Commands...
1,283,206 UART: [fwproc] Recv command 0x46505652
1,284,033 UART: [rt] FIPS Version
1,284,594 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,489 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,647 UART: [kat] SHA2-256
901,587 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,630 UART: [kat] HMAC-384Kdf
920,178 UART: [kat] LMS
1,168,490 UART: [kat] --
1,169,497 UART: [cold-reset] ++
1,169,897 UART: [fht] FHT @ 0x50003400
1,172,537 UART: [idev] ++
1,172,705 UART: [idev] CDI.KEYID = 6
1,173,066 UART: [idev] SUBJECT.KEYID = 7
1,173,491 UART: [idev] UDS.KEYID = 0
1,181,417 UART: [idev] Erasing UDS.KEYID = 0
1,198,417 UART: [idev] Sha1 KeyId Algorithm
1,207,325 UART: [idev] --
1,208,288 UART: [ldev] ++
1,208,456 UART: [ldev] CDI.KEYID = 6
1,208,820 UART: [ldev] SUBJECT.KEYID = 5
1,209,247 UART: [ldev] AUTHORITY.KEYID = 7
1,209,710 UART: [ldev] FE.KEYID = 1
1,214,518 UART: [ldev] Erasing FE.KEYID = 1
1,240,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,730 UART: [ldev] --
1,280,042 UART: [fwproc] Wait for Commands...
1,280,721 UART: [fwproc] Recv command 0x46505652
1,281,548 UART: [rt] FIPS Version
1,282,109 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,922 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,650 UART: [state] DebugLocked = No
86,318 UART: [state] WD Timer not started. Device not locked for debugging
87,479 UART: [kat] SHA2-256
891,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,158 UART: [kat] ++
895,310 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
904,201 UART: [kat] SHA2-512-ACC
906,102 UART: [kat] ECC-384
915,647 UART: [kat] HMAC-384Kdf
920,275 UART: [kat] LMS
1,168,587 UART: [kat] --
1,169,248 UART: [cold-reset] ++
1,169,708 UART: [fht] FHT @ 0x50003400
1,172,336 UART: [idev] ++
1,172,504 UART: [idev] CDI.KEYID = 6
1,172,865 UART: [idev] SUBJECT.KEYID = 7
1,173,290 UART: [idev] UDS.KEYID = 0
1,181,798 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,324 UART: [idev] --
1,209,221 UART: [ldev] ++
1,209,389 UART: [ldev] CDI.KEYID = 6
1,209,753 UART: [ldev] SUBJECT.KEYID = 5
1,210,180 UART: [ldev] AUTHORITY.KEYID = 7
1,210,643 UART: [ldev] FE.KEYID = 1
1,216,015 UART: [ldev] Erasing FE.KEYID = 1
1,242,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,907 UART: [fwproc] Wait for Commands...
1,282,564 UART: [fwproc] Recv command 0x46505652
1,283,391 UART: [rt] FIPS Version
1,283,952 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,483 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
5,651 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,107 UART:
192,534 UART: Running Caliptra ROM ...
193,685 UART:
193,834 UART: [state] CFI Enabled
263,335 UART: [state] LifecycleState = Unprovisioned
265,690 UART: [state] DebugLocked = No
267,882 UART: [state] WD Timer not started. Device not locked for debugging
271,779 UART: [kat] SHA2-256
453,716 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,205 UART: [kat] ++
465,731 UART: [kat] sha1
476,070 UART: [kat] SHA2-256
479,100 UART: [kat] SHA2-384
485,286 UART: [kat] SHA2-512-ACC
487,905 UART: [kat] ECC-384
3,771,706 UART: [kat] HMAC-384Kdf
3,798,316 UART: [kat] LMS
4,871,474 UART: [kat] --
4,877,270 UART: [cold-reset] ++
4,878,452 UART: [fht] FHT @ 0x50003400
4,890,348 UART: [idev] ++
4,891,027 UART: [idev] CDI.KEYID = 6
4,892,272 UART: [idev] SUBJECT.KEYID = 7
4,893,298 UART: [idev] UDS.KEYID = 0
4,925,842 UART: [idev] Erasing UDS.KEYID = 0
8,237,917 UART: [idev] Sha1 KeyId Algorithm
8,259,562 UART: [idev] --
8,263,857 UART: [ldev] ++
8,264,451 UART: [ldev] CDI.KEYID = 6
8,265,558 UART: [ldev] SUBJECT.KEYID = 5
8,266,772 UART: [ldev] AUTHORITY.KEYID = 7
8,267,923 UART: [ldev] FE.KEYID = 1
8,313,586 UART: [ldev] Erasing FE.KEYID = 1
11,649,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,843 UART: [ldev] --
14,034,799 UART: [fwproc] Wait for Commands...
14,036,311 UART: [fwproc] Recv command 0x46574c44
14,038,630 UART: [fwproc] Recv'd Img size: 114124 bytes
18,114,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,187,863 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,256,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,574,117 >>> mbox cmd response: success
18,578,987 UART: [afmc] ++
18,579,598 UART: [afmc] CDI.KEYID = 6
18,580,517 UART: [afmc] SUBJECT.KEYID = 7
18,581,622 UART: [afmc] AUTHORITY.KEYID = 5
21,939,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,240,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,242,450 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,258,589 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,274,655 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,290,651 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
Initializing fuses
810 UART: [
1,355 UART: Running Caliptra ROM ...
2,452 UART:
2,628 UART: [state] CFI Enabled
70,195 UART: [state] LifecycleState = Unprovisioned
72,062 UART: [state] DebugLocked = No
74,415 UART: [state] WD Timer not started. Device not locked for debugging
78,379 UART: [kat] SHA2-256
260,308 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
271,814 UART: [kat] ++
272,395 UART: [kat] sha1
283,426 UART: [kat] SHA2-256
286,430 UART: [kat] SHA2-384
291,265 UART: [kat] SHA2-512-ACC
293,879 UART: [kat] ECC-384
3,578,897 UART: [kat] HMAC-384Kdf
3,606,481 UART: [kat] LMS
4,679,660 UART: [kat] --
4,684,513 UART: [warm-reset] ++
4,685,543 UART: [warm-reset] Prev Cold-Reset failed
4,689,921 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
5,429 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,344,358 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
6,502 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,593 UART:
192,999 UART: Running Caliptra ROM ...
194,095 UART:
603,710 UART: [state] CFI Enabled
617,324 UART: [state] LifecycleState = Unprovisioned
619,704 UART: [state] DebugLocked = No
621,617 UART: [state] WD Timer not started. Device not locked for debugging
626,227 UART: [kat] SHA2-256
808,201 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,738 UART: [kat] ++
820,320 UART: [kat] sha1
830,875 UART: [kat] SHA2-256
833,926 UART: [kat] SHA2-384
838,605 UART: [kat] SHA2-512-ACC
841,222 UART: [kat] ECC-384
4,093,610 UART: [kat] HMAC-384Kdf
4,105,858 UART: [kat] LMS
5,179,009 UART: [kat] --
5,183,503 UART: [cold-reset] ++
5,184,790 UART: [fht] FHT @ 0x50003400
5,195,067 UART: [idev] ++
5,195,738 UART: [idev] CDI.KEYID = 6
5,196,974 UART: [idev] SUBJECT.KEYID = 7
5,198,430 UART: [idev] UDS.KEYID = 0
5,216,189 UART: [idev] Erasing UDS.KEYID = 0
8,487,251 UART: [idev] Sha1 KeyId Algorithm
8,509,543 UART: [idev] --
8,513,160 UART: [ldev] ++
8,513,733 UART: [ldev] CDI.KEYID = 6
8,515,172 UART: [ldev] SUBJECT.KEYID = 5
8,516,407 UART: [ldev] AUTHORITY.KEYID = 7
8,517,967 UART: [ldev] FE.KEYID = 1
8,529,476 UART: [ldev] Erasing FE.KEYID = 1
11,819,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,159,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,180,799 UART: [ldev] --
14,184,673 UART: [fwproc] Wait for Commands...
14,187,847 UART: [fwproc] Recv command 0x46574c44
14,190,102 UART: [fwproc] Recv'd Img size: 114124 bytes
18,258,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,330,070 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,398,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,715,160 >>> mbox cmd response: success
18,719,403 UART: [afmc] ++
18,719,985 UART: [afmc] CDI.KEYID = 6
18,721,165 UART: [afmc] SUBJECT.KEYID = 7
18,722,325 UART: [afmc] AUTHORITY.KEYID = 5
22,041,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,334,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,337,105 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,353,251 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,369,314 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,385,305 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
Initializing fuses
1,120 UART:
1,282 UART: Running Caliptra ROM ...
2,385 UART:
16,173,133 UART: [state] CFI Enabled
16,190,346 UART: [state] LifecycleState = Unprovisioned
16,192,220 UART: [state] DebugLocked = No
16,193,741 UART: [state] WD Timer not started. Device not locked for debugging
16,197,704 UART: [kat] SHA2-256
16,379,679 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
16,391,223 UART: [kat] ++
16,391,730 UART: [kat] sha1
16,402,821 UART: [kat] SHA2-256
16,405,883 UART: [kat] SHA2-384
16,412,506 UART: [kat] SHA2-512-ACC
16,415,137 UART: [kat] ECC-384
19,669,979 UART: [kat] HMAC-384Kdf
19,681,992 UART: [kat] LMS
20,755,130 UART: [kat] --
20,758,928 UART: [warm-reset] ++
20,759,939 UART: [warm-reset] Prev Cold-Reset failed
20,765,506 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
6,430 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,526,964 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
5,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,123 UART:
192,492 UART: Running Caliptra ROM ...
193,661 UART:
193,817 UART: [state] CFI Enabled
263,689 UART: [state] LifecycleState = Unprovisioned
265,586 UART: [state] DebugLocked = No
267,570 UART: [state] WD Timer not started. Device not locked for debugging
270,985 UART: [kat] SHA2-256
450,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,695 UART: [kat] ++
462,231 UART: [kat] sha1
473,007 UART: [kat] SHA2-256
475,992 UART: [kat] SHA2-384
481,436 UART: [kat] SHA2-512-ACC
484,368 UART: [kat] ECC-384
2,928,233 UART: [kat] HMAC-384Kdf
2,952,314 UART: [kat] LMS
3,481,795 UART: [kat] --
3,485,724 UART: [cold-reset] ++
3,487,714 UART: [fht] FHT @ 0x50003400
3,498,311 UART: [idev] ++
3,498,916 UART: [idev] CDI.KEYID = 6
3,499,835 UART: [idev] SUBJECT.KEYID = 7
3,500,940 UART: [idev] UDS.KEYID = 0
3,524,592 UART: [idev] Erasing UDS.KEYID = 0
6,006,214 UART: [idev] Sha1 KeyId Algorithm
6,028,651 UART: [idev] --
6,032,161 UART: [ldev] ++
6,032,750 UART: [ldev] CDI.KEYID = 6
6,033,644 UART: [ldev] SUBJECT.KEYID = 5
6,034,806 UART: [ldev] AUTHORITY.KEYID = 7
6,036,051 UART: [ldev] FE.KEYID = 1
6,080,650 UART: [ldev] Erasing FE.KEYID = 1
8,581,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,323 UART: [ldev] --
10,393,845 UART: [fwproc] Wait for Commands...
10,396,485 UART: [fwproc] Recv command 0x46574c44
10,398,584 UART: [fwproc] Recv'd Img size: 114448 bytes
13,805,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,877,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,946,422 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,265,395 >>> mbox cmd response: success
14,268,977 UART: [afmc] ++
14,269,563 UART: [afmc] CDI.KEYID = 6
14,270,474 UART: [afmc] SUBJECT.KEYID = 7
14,271,694 UART: [afmc] AUTHORITY.KEYID = 5
16,807,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,536 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,331 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,323 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,205 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
811 UART: [
1,302 UART: Running Caliptra ROM ...
2,341 UART:
2,510 UART: [state] CFI Enabled
65,651 UART: [state] LifecycleState = Unprovisioned
67,574 UART: [state] DebugLocked = No
69,443 UART: [state] WD Timer not started. Device not locked for debugging
73,231 UART: [kat] SHA2-256
252,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,917 UART: [kat] ++
264,365 UART: [kat] sha1
276,208 UART: [kat] SHA2-256
279,271 UART: [kat] SHA2-384
285,521 UART: [kat] SHA2-512-ACC
288,504 UART: [kat] ECC-384
2,753,334 UART: [kat] HMAC-384Kdf
2,774,380 UART: [kat] LMS
3,303,838 UART: [kat] --
3,306,315 UART: [warm-reset] ++
3,307,123 UART: [warm-reset] Prev Cold-Reset failed
3,312,140 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
5,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,062,201 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
6,567 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,523 UART:
192,895 UART: Running Caliptra ROM ...
194,055 UART:
603,797 UART: [state] CFI Enabled
615,523 UART: [state] LifecycleState = Unprovisioned
617,400 UART: [state] DebugLocked = No
619,827 UART: [state] WD Timer not started. Device not locked for debugging
623,060 UART: [kat] SHA2-256
802,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,752 UART: [kat] ++
814,196 UART: [kat] sha1
825,180 UART: [kat] SHA2-256
828,210 UART: [kat] SHA2-384
833,105 UART: [kat] SHA2-512-ACC
836,039 UART: [kat] ECC-384
3,277,599 UART: [kat] HMAC-384Kdf
3,290,479 UART: [kat] LMS
3,820,013 UART: [kat] --
3,824,458 UART: [cold-reset] ++
3,825,424 UART: [fht] FHT @ 0x50003400
3,837,085 UART: [idev] ++
3,837,690 UART: [idev] CDI.KEYID = 6
3,838,578 UART: [idev] SUBJECT.KEYID = 7
3,839,794 UART: [idev] UDS.KEYID = 0
3,854,590 UART: [idev] Erasing UDS.KEYID = 0
6,311,365 UART: [idev] Sha1 KeyId Algorithm
6,335,004 UART: [idev] --
6,340,163 UART: [ldev] ++
6,340,756 UART: [ldev] CDI.KEYID = 6
6,341,646 UART: [ldev] SUBJECT.KEYID = 5
6,342,861 UART: [ldev] AUTHORITY.KEYID = 7
6,344,085 UART: [ldev] FE.KEYID = 1
6,353,928 UART: [ldev] Erasing FE.KEYID = 1
8,830,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,995 UART: [ldev] --
10,623,018 UART: [fwproc] Wait for Commands...
10,625,490 UART: [fwproc] Recv command 0x46574c44
10,627,527 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,793 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,495,765 >>> mbox cmd response: success
14,499,950 UART: [afmc] ++
14,500,537 UART: [afmc] CDI.KEYID = 6
14,501,447 UART: [afmc] SUBJECT.KEYID = 7
14,502,602 UART: [afmc] AUTHORITY.KEYID = 5
16,999,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,571 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,342 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,368 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,243 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
974 UART: [
1,467 UART: Running Caliptra ROM ...
2,585 UART:
1,720,081 UART: [state] CFI Enabled
1,733,728 UART: [state] LifecycleState = Unprovisioned
1,735,575 UART: [state] DebugLocked = No
1,737,581 UART: [state] WD Timer not started. Device not locked for debugging
1,741,634 UART: [kat] SHA2-256
1,920,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,932,321 UART: [kat] ++
1,932,775 UART: [kat] sha1
1,942,472 UART: [kat] SHA2-256
1,945,535 UART: [kat] SHA2-384
1,951,944 UART: [kat] SHA2-512-ACC
1,954,886 UART: [kat] ECC-384
4,396,128 UART: [kat] HMAC-384Kdf
4,408,720 UART: [kat] LMS
4,938,186 UART: [kat] --
4,945,032 UART: [warm-reset] ++
4,945,840 UART: [warm-reset] Prev Cold-Reset failed
4,949,828 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
6,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,261 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
5,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,555 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
6,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,919 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,146 UART: [kat] LMS
1,168,458 UART: [kat] --
1,169,353 UART: [cold-reset] ++
1,169,871 UART: [fht] FHT @ 0x50003400
1,172,603 UART: [idev] ++
1,172,771 UART: [idev] CDI.KEYID = 6
1,173,132 UART: [idev] SUBJECT.KEYID = 7
1,173,557 UART: [idev] UDS.KEYID = 0
1,181,461 UART: [idev] Erasing UDS.KEYID = 0
1,198,181 UART: [idev] Sha1 KeyId Algorithm
1,207,201 UART: [idev] --
1,208,186 UART: [ldev] ++
1,208,354 UART: [ldev] CDI.KEYID = 6
1,208,718 UART: [ldev] SUBJECT.KEYID = 5
1,209,145 UART: [ldev] AUTHORITY.KEYID = 7
1,209,608 UART: [ldev] FE.KEYID = 1
1,214,906 UART: [ldev] Erasing FE.KEYID = 1
1,241,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,618 UART: [ldev] --
1,279,920 UART: [fwproc] Wait for Commands...
1,280,633 UART: [fwproc] Recv command 0x46574c44
1,281,366 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,172 >>> mbox cmd response: success
2,774,403 UART: [afmc] ++
2,774,571 UART: [afmc] CDI.KEYID = 6
2,774,934 UART: [afmc] SUBJECT.KEYID = 7
2,775,360 UART: [afmc] AUTHORITY.KEYID = 5
2,811,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,386 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,998 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,717 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,853,657 UART:
2,853,673 UART: Running Caliptra ROM ...
2,854,081 UART:
2,854,136 UART: [state] CFI Enabled
2,856,522 UART: [state] LifecycleState = Unprovisioned
2,857,177 UART: [state] DebugLocked = No
2,857,675 UART: [state] WD Timer not started. Device not locked for debugging
2,859,010 UART: [kat] SHA2-256
3,662,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,666,689 UART: [kat] ++
3,666,841 UART: [kat] sha1
3,671,081 UART: [kat] SHA2-256
3,673,021 UART: [kat] SHA2-384
3,675,810 UART: [kat] SHA2-512-ACC
3,677,711 UART: [kat] ECC-384
3,687,660 UART: [kat] HMAC-384Kdf
3,692,180 UART: [kat] LMS
3,940,492 UART: [kat] --
3,941,050 UART: [warm-reset] ++
3,941,318 UART: [warm-reset] Prev Cold-Reset failed
3,942,171 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,496 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,392 UART: [kat] ++
895,544 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,621 UART: [kat] SHA2-512-ACC
906,522 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,966 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,016 UART: [idev] ++
1,173,184 UART: [idev] CDI.KEYID = 6
1,173,545 UART: [idev] SUBJECT.KEYID = 7
1,173,970 UART: [idev] UDS.KEYID = 0
1,181,776 UART: [idev] Erasing UDS.KEYID = 0
1,199,016 UART: [idev] Sha1 KeyId Algorithm
1,207,886 UART: [idev] --
1,208,861 UART: [ldev] ++
1,209,029 UART: [ldev] CDI.KEYID = 6
1,209,393 UART: [ldev] SUBJECT.KEYID = 5
1,209,820 UART: [ldev] AUTHORITY.KEYID = 7
1,210,283 UART: [ldev] FE.KEYID = 1
1,215,627 UART: [ldev] Erasing FE.KEYID = 1
1,241,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,963 UART: [ldev] --
1,281,429 UART: [fwproc] Wait for Commands...
1,282,188 UART: [fwproc] Recv command 0x46574c44
1,282,921 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,379 >>> mbox cmd response: success
2,775,644 UART: [afmc] ++
2,775,812 UART: [afmc] CDI.KEYID = 6
2,776,175 UART: [afmc] SUBJECT.KEYID = 7
2,776,601 UART: [afmc] AUTHORITY.KEYID = 5
2,812,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,920 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,671 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,400 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,283 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,002 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,854,826 UART:
2,854,842 UART: Running Caliptra ROM ...
2,855,250 UART:
2,855,392 UART: [state] CFI Enabled
2,858,442 UART: [state] LifecycleState = Unprovisioned
2,859,097 UART: [state] DebugLocked = No
2,859,661 UART: [state] WD Timer not started. Device not locked for debugging
2,861,006 UART: [kat] SHA2-256
3,664,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,668,685 UART: [kat] ++
3,668,837 UART: [kat] sha1
3,673,063 UART: [kat] SHA2-256
3,675,003 UART: [kat] SHA2-384
3,677,778 UART: [kat] SHA2-512-ACC
3,679,679 UART: [kat] ECC-384
3,689,086 UART: [kat] HMAC-384Kdf
3,693,670 UART: [kat] LMS
3,941,982 UART: [kat] --
3,942,644 UART: [warm-reset] ++
3,942,912 UART: [warm-reset] Prev Cold-Reset failed
3,943,907 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,775 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
916,016 UART: [kat] HMAC-384Kdf
920,538 UART: [kat] LMS
1,168,850 UART: [kat] --
1,169,457 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,637 UART: [idev] ++
1,172,805 UART: [idev] CDI.KEYID = 6
1,173,166 UART: [idev] SUBJECT.KEYID = 7
1,173,591 UART: [idev] UDS.KEYID = 0
1,181,501 UART: [idev] Erasing UDS.KEYID = 0
1,198,105 UART: [idev] Sha1 KeyId Algorithm
1,207,177 UART: [idev] --
1,208,120 UART: [ldev] ++
1,208,288 UART: [ldev] CDI.KEYID = 6
1,208,652 UART: [ldev] SUBJECT.KEYID = 5
1,209,079 UART: [ldev] AUTHORITY.KEYID = 7
1,209,542 UART: [ldev] FE.KEYID = 1
1,214,780 UART: [ldev] Erasing FE.KEYID = 1
1,241,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,458 UART: [ldev] --
1,280,842 UART: [fwproc] Wait for Commands...
1,281,471 UART: [fwproc] Recv command 0x46574c44
1,282,204 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,784 >>> mbox cmd response: success
2,773,877 UART: [afmc] ++
2,774,045 UART: [afmc] CDI.KEYID = 6
2,774,408 UART: [afmc] SUBJECT.KEYID = 7
2,774,834 UART: [afmc] AUTHORITY.KEYID = 5
2,810,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,360 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,079 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,852,961 UART:
2,852,977 UART: Running Caliptra ROM ...
2,853,385 UART:
2,853,440 UART: [state] CFI Enabled
2,856,050 UART: [state] LifecycleState = Unprovisioned
2,856,705 UART: [state] DebugLocked = No
2,857,243 UART: [state] WD Timer not started. Device not locked for debugging
2,858,596 UART: [kat] SHA2-256
3,662,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,666,275 UART: [kat] ++
3,666,427 UART: [kat] sha1
3,670,753 UART: [kat] SHA2-256
3,672,693 UART: [kat] SHA2-384
3,675,470 UART: [kat] SHA2-512-ACC
3,677,371 UART: [kat] ECC-384
3,687,162 UART: [kat] HMAC-384Kdf
3,691,928 UART: [kat] LMS
3,940,240 UART: [kat] --
3,941,002 UART: [warm-reset] ++
3,941,270 UART: [warm-reset] Prev Cold-Reset failed
3,942,231 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,926 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,673 UART: [state] LifecycleState = Unprovisioned
85,328 UART: [state] DebugLocked = No
85,868 UART: [state] WD Timer not started. Device not locked for debugging
86,987 UART: [kat] SHA2-256
890,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,666 UART: [kat] ++
894,818 UART: [kat] sha1
899,098 UART: [kat] SHA2-256
901,038 UART: [kat] SHA2-384
903,827 UART: [kat] SHA2-512-ACC
905,728 UART: [kat] ECC-384
915,331 UART: [kat] HMAC-384Kdf
919,967 UART: [kat] LMS
1,168,279 UART: [kat] --
1,168,934 UART: [cold-reset] ++
1,169,508 UART: [fht] FHT @ 0x50003400
1,172,170 UART: [idev] ++
1,172,338 UART: [idev] CDI.KEYID = 6
1,172,699 UART: [idev] SUBJECT.KEYID = 7
1,173,124 UART: [idev] UDS.KEYID = 0
1,181,106 UART: [idev] Erasing UDS.KEYID = 0
1,197,742 UART: [idev] Sha1 KeyId Algorithm
1,206,846 UART: [idev] --
1,207,775 UART: [ldev] ++
1,207,943 UART: [ldev] CDI.KEYID = 6
1,208,307 UART: [ldev] SUBJECT.KEYID = 5
1,208,734 UART: [ldev] AUTHORITY.KEYID = 7
1,209,197 UART: [ldev] FE.KEYID = 1
1,214,599 UART: [ldev] Erasing FE.KEYID = 1
1,240,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,887 UART: [ldev] --
1,280,165 UART: [fwproc] Wait for Commands...
1,280,832 UART: [fwproc] Recv command 0x46574c44
1,281,565 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,423 >>> mbox cmd response: success
2,773,688 UART: [afmc] ++
2,773,856 UART: [afmc] CDI.KEYID = 6
2,774,219 UART: [afmc] SUBJECT.KEYID = 7
2,774,645 UART: [afmc] AUTHORITY.KEYID = 5
2,810,734 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,737 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,349 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,068 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,852,858 UART:
2,852,874 UART: Running Caliptra ROM ...
2,853,282 UART:
2,853,424 UART: [state] CFI Enabled
2,856,126 UART: [state] LifecycleState = Unprovisioned
2,856,781 UART: [state] DebugLocked = No
2,857,369 UART: [state] WD Timer not started. Device not locked for debugging
2,858,562 UART: [kat] SHA2-256
3,662,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,666,241 UART: [kat] ++
3,666,393 UART: [kat] sha1
3,670,681 UART: [kat] SHA2-256
3,672,621 UART: [kat] SHA2-384
3,675,444 UART: [kat] SHA2-512-ACC
3,677,345 UART: [kat] ECC-384
3,686,906 UART: [kat] HMAC-384Kdf
3,691,566 UART: [kat] LMS
3,939,878 UART: [kat] --
3,940,760 UART: [warm-reset] ++
3,941,028 UART: [warm-reset] Prev Cold-Reset failed
3,942,005 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,603 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,646 UART: [state] LifecycleState = Unprovisioned
86,301 UART: [state] DebugLocked = No
86,945 UART: [state] WD Timer not started. Device not locked for debugging
88,304 UART: [kat] SHA2-256
891,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,983 UART: [kat] ++
896,135 UART: [kat] sha1
900,525 UART: [kat] SHA2-256
902,465 UART: [kat] SHA2-384
905,388 UART: [kat] SHA2-512-ACC
907,289 UART: [kat] ECC-384
916,970 UART: [kat] HMAC-384Kdf
921,404 UART: [kat] LMS
1,169,716 UART: [kat] --
1,170,379 UART: [cold-reset] ++
1,170,799 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,182,385 UART: [idev] Erasing UDS.KEYID = 0
1,199,211 UART: [idev] Sha1 KeyId Algorithm
1,208,057 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,896 UART: [ldev] Erasing FE.KEYID = 1
1,242,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,642 UART: [ldev] --
1,281,036 UART: [fwproc] Wait for Commands...
1,281,713 UART: [fwproc] Recv command 0x46574c44
1,282,446 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,850 >>> mbox cmd response: success
2,776,053 UART: [afmc] ++
2,776,221 UART: [afmc] CDI.KEYID = 6
2,776,584 UART: [afmc] SUBJECT.KEYID = 7
2,777,010 UART: [afmc] AUTHORITY.KEYID = 5
2,812,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,100 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,829 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,712 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,431 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,854,343 UART:
2,854,359 UART: Running Caliptra ROM ...
2,854,767 UART:
2,854,822 UART: [state] CFI Enabled
2,857,122 UART: [state] LifecycleState = Unprovisioned
2,857,777 UART: [state] DebugLocked = No
2,858,469 UART: [state] WD Timer not started. Device not locked for debugging
2,859,740 UART: [kat] SHA2-256
3,663,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,667,419 UART: [kat] ++
3,667,571 UART: [kat] sha1
3,671,857 UART: [kat] SHA2-256
3,673,797 UART: [kat] SHA2-384
3,676,504 UART: [kat] SHA2-512-ACC
3,678,405 UART: [kat] ECC-384
3,688,182 UART: [kat] HMAC-384Kdf
3,692,642 UART: [kat] LMS
3,940,954 UART: [kat] --
3,941,804 UART: [warm-reset] ++
3,942,072 UART: [warm-reset] Prev Cold-Reset failed
3,943,039 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,640 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,864 UART: [kat] ++
896,016 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,921 UART: [kat] SHA2-512-ACC
906,822 UART: [kat] ECC-384
916,391 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,738 UART: [fht] FHT @ 0x50003400
1,173,400 UART: [idev] ++
1,173,568 UART: [idev] CDI.KEYID = 6
1,173,929 UART: [idev] SUBJECT.KEYID = 7
1,174,354 UART: [idev] UDS.KEYID = 0
1,182,824 UART: [idev] Erasing UDS.KEYID = 0
1,199,904 UART: [idev] Sha1 KeyId Algorithm
1,208,608 UART: [idev] --
1,209,565 UART: [ldev] ++
1,209,733 UART: [ldev] CDI.KEYID = 6
1,210,097 UART: [ldev] SUBJECT.KEYID = 5
1,210,524 UART: [ldev] AUTHORITY.KEYID = 7
1,210,987 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,553 UART: [ldev] --
1,281,941 UART: [fwproc] Wait for Commands...
1,282,544 UART: [fwproc] Recv command 0x46574c44
1,283,277 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,428 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,661 >>> mbox cmd response: success
2,775,926 UART: [afmc] ++
2,776,094 UART: [afmc] CDI.KEYID = 6
2,776,457 UART: [afmc] SUBJECT.KEYID = 7
2,776,883 UART: [afmc] AUTHORITY.KEYID = 5
2,812,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,812 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,695 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,414 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,855,182 UART:
2,855,198 UART: Running Caliptra ROM ...
2,855,606 UART:
2,855,748 UART: [state] CFI Enabled
2,857,886 UART: [state] LifecycleState = Unprovisioned
2,858,541 UART: [state] DebugLocked = No
2,859,045 UART: [state] WD Timer not started. Device not locked for debugging
2,860,306 UART: [kat] SHA2-256
3,663,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,667,985 UART: [kat] ++
3,668,137 UART: [kat] sha1
3,672,457 UART: [kat] SHA2-256
3,674,397 UART: [kat] SHA2-384
3,677,108 UART: [kat] SHA2-512-ACC
3,679,009 UART: [kat] ECC-384
3,688,804 UART: [kat] HMAC-384Kdf
3,693,558 UART: [kat] LMS
3,941,870 UART: [kat] --
3,942,878 UART: [warm-reset] ++
3,943,146 UART: [warm-reset] Prev Cold-Reset failed
3,944,027 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,105 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,223 UART:
192,603 UART: Running Caliptra ROM ...
193,830 UART:
193,981 UART: [state] CFI Enabled
259,885 UART: [state] LifecycleState = Production
262,075 UART: [state] DebugLocked = No
264,997 UART: [state] WD Timer not started. Device not locked for debugging
269,539 UART: [kat] SHA2-256
451,463 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,009 UART: [kat] ++
463,474 UART: [kat] sha1
474,630 UART: [kat] SHA2-256
477,644 UART: [kat] SHA2-384
483,673 UART: [kat] SHA2-512-ACC
486,281 UART: [kat] ECC-384
3,775,376 UART: [kat] HMAC-384Kdf
3,801,173 UART: [kat] LMS
4,874,340 UART: [kat] --
4,881,166 UART: [cold-reset] ++
4,882,838 UART: [fht] FHT @ 0x50003400
4,894,518 UART: [idev] ++
4,895,197 UART: [idev] CDI.KEYID = 6
4,896,430 UART: [idev] SUBJECT.KEYID = 7
4,897,585 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,466 UART:
1,741 UART: Running Caliptra ROM ...
2,880 UART:
3,032 UART: [state] CFI Enabled
74,621 UART: [state] LifecycleState = Production
76,382 UART: [state] DebugLocked = No
78,858 UART: [state] WD Timer not started. Device not locked for debugging
84,063 UART: [kat] SHA2-256
265,999 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
277,509 UART: [kat] ++
278,100 UART: [kat] sha1
290,220 UART: [kat] SHA2-256
293,226 UART: [kat] SHA2-384
299,372 UART: [kat] SHA2-512-ACC
301,986 UART: [kat] ECC-384
3,586,249 UART: [kat] HMAC-384Kdf
3,611,754 UART: [kat] LMS
4,684,881 UART: [kat] --
4,687,740 UART: [warm-reset] ++
4,688,761 UART: [warm-reset] Prev Cold-Reset failed
4,692,600 UART: ROM Fatal Error: 0x01040010test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,358 UART:
192,747 UART: Running Caliptra ROM ...
193,969 UART:
603,631 UART: [state] CFI Enabled
619,146 UART: [state] LifecycleState = Production
621,394 UART: [state] DebugLocked = No
622,964 UART: [state] WD Timer not started. Device not locked for debugging
628,042 UART: [kat] SHA2-256
809,994 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,523 UART: [kat] ++
822,020 UART: [kat] sha1
831,761 UART: [kat] SHA2-256
834,785 UART: [kat] SHA2-384
839,840 UART: [kat] SHA2-512-ACC
842,453 UART: [kat] ECC-384
4,099,610 UART: [kat] HMAC-384Kdf
4,111,419 UART: [kat] LMS
5,184,575 UART: [kat] --
5,188,644 UART: [cold-reset] ++
5,191,118 UART: [fht] FHT @ 0x50003400
5,202,247 UART: [idev] ++
5,202,923 UART: [idev] CDI.KEYID = 6
5,204,156 UART: [idev] SUBJECT.KEYID = 7
5,205,582 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,352 UART:
1,617 UART: Running Caliptra ROM ...
2,749 UART:
15,263,264 UART: [state] CFI Enabled
15,276,778 UART: [state] LifecycleState = Production
15,278,519 UART: [state] DebugLocked = No
15,279,928 UART: [state] WD Timer not started. Device not locked for debugging
15,285,076 UART: [kat] SHA2-256
15,467,078 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
15,478,630 UART: [kat] ++
15,479,135 UART: [kat] sha1
15,488,988 UART: [kat] SHA2-256
15,492,003 UART: [kat] SHA2-384
15,498,353 UART: [kat] SHA2-512-ACC
15,500,983 UART: [kat] ECC-384
18,753,281 UART: [kat] HMAC-384Kdf
18,766,162 UART: [kat] LMS
19,839,309 UART: [kat] --
19,843,526 UART: [warm-reset] ++
19,844,611 UART: [warm-reset] Prev Cold-Reset failed
19,850,225 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,330 UART:
192,712 UART: Running Caliptra ROM ...
193,902 UART:
194,056 UART: [state] CFI Enabled
264,417 UART: [state] LifecycleState = Production
266,197 UART: [state] DebugLocked = No
268,285 UART: [state] WD Timer not started. Device not locked for debugging
272,689 UART: [kat] SHA2-256
451,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,366 UART: [kat] ++
463,902 UART: [kat] sha1
476,515 UART: [kat] SHA2-256
479,587 UART: [kat] SHA2-384
485,883 UART: [kat] SHA2-512-ACC
488,815 UART: [kat] ECC-384
2,948,482 UART: [kat] HMAC-384Kdf
2,971,245 UART: [kat] LMS
3,500,695 UART: [kat] --
3,507,060 UART: [cold-reset] ++
3,509,637 UART: [fht] FHT @ 0x50003400
3,520,880 UART: [idev] ++
3,521,446 UART: [idev] CDI.KEYID = 6
3,522,392 UART: [idev] SUBJECT.KEYID = 7
3,523,629 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,426 UART:
1,700 UART: Running Caliptra ROM ...
2,804 UART:
2,952 UART: [state] CFI Enabled
63,041 UART: [state] LifecycleState = Production
64,802 UART: [state] DebugLocked = No
66,476 UART: [state] WD Timer not started. Device not locked for debugging
69,393 UART: [kat] SHA2-256
248,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
260,107 UART: [kat] ++
260,551 UART: [kat] sha1
271,694 UART: [kat] SHA2-256
274,752 UART: [kat] SHA2-384
281,050 UART: [kat] SHA2-512-ACC
284,013 UART: [kat] ECC-384
2,730,458 UART: [kat] HMAC-384Kdf
2,764,772 UART: [kat] LMS
3,294,252 UART: [kat] --
3,298,263 UART: [warm-reset] ++
3,299,061 UART: [warm-reset] Prev Cold-Reset failed
3,303,598 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,625 UART:
193,029 UART: Running Caliptra ROM ...
194,123 UART:
603,694 UART: [state] CFI Enabled
617,277 UART: [state] LifecycleState = Production
618,998 UART: [state] DebugLocked = No
621,859 UART: [state] WD Timer not started. Device not locked for debugging
626,298 UART: [kat] SHA2-256
805,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,028 UART: [kat] ++
817,475 UART: [kat] sha1
827,538 UART: [kat] SHA2-256
830,562 UART: [kat] SHA2-384
836,701 UART: [kat] SHA2-512-ACC
839,631 UART: [kat] ECC-384
3,282,132 UART: [kat] HMAC-384Kdf
3,295,661 UART: [kat] LMS
3,825,059 UART: [kat] --
3,829,829 UART: [cold-reset] ++
3,830,791 UART: [fht] FHT @ 0x50003400
3,843,011 UART: [idev] ++
3,843,574 UART: [idev] CDI.KEYID = 6
3,844,547 UART: [idev] SUBJECT.KEYID = 7
3,845,699 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,485 UART:
1,754 UART: Running Caliptra ROM ...
2,955 UART:
16,619,169 UART: [state] CFI Enabled
16,634,387 UART: [state] LifecycleState = Production
16,636,140 UART: [state] DebugLocked = No
16,637,549 UART: [state] WD Timer not started. Device not locked for debugging
16,640,744 UART: [kat] SHA2-256
16,819,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,831,479 UART: [kat] ++
16,831,931 UART: [kat] sha1
16,843,300 UART: [kat] SHA2-256
16,846,316 UART: [kat] SHA2-384
16,852,784 UART: [kat] SHA2-512-ACC
16,855,718 UART: [kat] ECC-384
19,296,672 UART: [kat] HMAC-384Kdf
19,309,159 UART: [kat] LMS
19,838,637 UART: [kat] --
19,844,190 UART: [warm-reset] ++
19,845,051 UART: [warm-reset] Prev Cold-Reset failed
19,848,749 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Production
85,453 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,238 UART: [kat] SHA2-256
890,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,917 UART: [kat] ++
895,069 UART: [kat] sha1
899,303 UART: [kat] SHA2-256
901,243 UART: [kat] SHA2-384
903,864 UART: [kat] SHA2-512-ACC
905,765 UART: [kat] ECC-384
915,560 UART: [kat] HMAC-384Kdf
920,040 UART: [kat] LMS
1,168,352 UART: [kat] --
1,169,363 UART: [cold-reset] ++
1,169,891 UART: [fht] FHT @ 0x50003400
1,172,773 UART: [idev] ++
1,172,941 UART: [idev] CDI.KEYID = 6
1,173,302 UART: [idev] SUBJECT.KEYID = 7
1,173,727 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,483 UART:
1,175,499 UART: Running Caliptra ROM ...
1,175,907 UART:
1,175,962 UART: [state] CFI Enabled
1,178,178 UART: [state] LifecycleState = Production
1,178,785 UART: [state] DebugLocked = No
1,179,449 UART: [state] WD Timer not started. Device not locked for debugging
1,180,638 UART: [kat] SHA2-256
1,984,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,317 UART: [kat] ++
1,988,469 UART: [kat] sha1
1,992,613 UART: [kat] SHA2-256
1,994,553 UART: [kat] SHA2-384
1,997,496 UART: [kat] SHA2-512-ACC
1,999,397 UART: [kat] ECC-384
2,009,254 UART: [kat] HMAC-384Kdf
2,013,708 UART: [kat] LMS
2,262,020 UART: [kat] --
2,263,038 UART: [warm-reset] ++
2,263,306 UART: [warm-reset] Prev Cold-Reset failed
2,264,313 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Production
86,192 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,197 UART: [kat] LMS
1,169,509 UART: [kat] --
1,170,376 UART: [cold-reset] ++
1,170,912 UART: [fht] FHT @ 0x50003400
1,173,440 UART: [idev] ++
1,173,608 UART: [idev] CDI.KEYID = 6
1,173,969 UART: [idev] SUBJECT.KEYID = 7
1,174,394 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,000 UART:
1,176,016 UART: Running Caliptra ROM ...
1,176,424 UART:
1,176,566 UART: [state] CFI Enabled
1,179,292 UART: [state] LifecycleState = Production
1,179,899 UART: [state] DebugLocked = No
1,180,593 UART: [state] WD Timer not started. Device not locked for debugging
1,181,868 UART: [kat] SHA2-256
1,985,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,547 UART: [kat] ++
1,989,699 UART: [kat] sha1
1,993,923 UART: [kat] SHA2-256
1,995,863 UART: [kat] SHA2-384
1,998,640 UART: [kat] SHA2-512-ACC
2,000,541 UART: [kat] ECC-384
2,010,038 UART: [kat] HMAC-384Kdf
2,014,740 UART: [kat] LMS
2,263,052 UART: [kat] --
2,263,962 UART: [warm-reset] ++
2,264,230 UART: [warm-reset] Prev Cold-Reset failed
2,265,223 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Production
86,161 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
900,133 UART: [kat] SHA2-256
902,073 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,290 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,169,825 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,499 UART:
1,175,515 UART: Running Caliptra ROM ...
1,175,923 UART:
1,175,978 UART: [state] CFI Enabled
1,178,830 UART: [state] LifecycleState = Production
1,179,437 UART: [state] DebugLocked = No
1,180,139 UART: [state] WD Timer not started. Device not locked for debugging
1,181,468 UART: [kat] SHA2-256
1,985,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,147 UART: [kat] ++
1,989,299 UART: [kat] sha1
1,993,525 UART: [kat] SHA2-256
1,995,465 UART: [kat] SHA2-384
1,998,196 UART: [kat] SHA2-512-ACC
2,000,097 UART: [kat] ECC-384
2,009,414 UART: [kat] HMAC-384Kdf
2,013,766 UART: [kat] LMS
2,262,078 UART: [kat] --
2,262,562 UART: [warm-reset] ++
2,262,830 UART: [warm-reset] Prev Cold-Reset failed
2,263,831 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Production
86,228 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
915,805 UART: [kat] HMAC-384Kdf
920,635 UART: [kat] LMS
1,168,947 UART: [kat] --
1,170,026 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,172,978 UART: [idev] ++
1,173,146 UART: [idev] CDI.KEYID = 6
1,173,507 UART: [idev] SUBJECT.KEYID = 7
1,173,932 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,506 UART:
1,175,522 UART: Running Caliptra ROM ...
1,175,930 UART:
1,176,072 UART: [state] CFI Enabled
1,178,636 UART: [state] LifecycleState = Production
1,179,243 UART: [state] DebugLocked = No
1,179,913 UART: [state] WD Timer not started. Device not locked for debugging
1,181,066 UART: [kat] SHA2-256
1,984,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,745 UART: [kat] ++
1,988,897 UART: [kat] sha1
1,993,145 UART: [kat] SHA2-256
1,995,085 UART: [kat] SHA2-384
1,997,924 UART: [kat] SHA2-512-ACC
1,999,825 UART: [kat] ECC-384
2,010,098 UART: [kat] HMAC-384Kdf
2,014,664 UART: [kat] LMS
2,262,976 UART: [kat] --
2,263,714 UART: [warm-reset] ++
2,263,982 UART: [warm-reset] Prev Cold-Reset failed
2,264,995 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Production
85,557 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,073 UART: [kat] ++
895,225 UART: [kat] sha1
899,391 UART: [kat] SHA2-256
901,331 UART: [kat] SHA2-384
903,932 UART: [kat] SHA2-512-ACC
905,833 UART: [kat] ECC-384
915,482 UART: [kat] HMAC-384Kdf
919,898 UART: [kat] LMS
1,168,210 UART: [kat] --
1,169,251 UART: [cold-reset] ++
1,169,691 UART: [fht] FHT @ 0x50003400
1,172,359 UART: [idev] ++
1,172,527 UART: [idev] CDI.KEYID = 6
1,172,888 UART: [idev] SUBJECT.KEYID = 7
1,173,313 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,081 UART:
1,175,097 UART: Running Caliptra ROM ...
1,175,505 UART:
1,175,560 UART: [state] CFI Enabled
1,178,336 UART: [state] LifecycleState = Production
1,178,943 UART: [state] DebugLocked = No
1,179,639 UART: [state] WD Timer not started. Device not locked for debugging
1,180,930 UART: [kat] SHA2-256
1,984,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,609 UART: [kat] ++
1,988,761 UART: [kat] sha1
1,992,995 UART: [kat] SHA2-256
1,994,935 UART: [kat] SHA2-384
1,997,772 UART: [kat] SHA2-512-ACC
1,999,673 UART: [kat] ECC-384
2,009,010 UART: [kat] HMAC-384Kdf
2,013,410 UART: [kat] LMS
2,261,722 UART: [kat] --
2,262,722 UART: [warm-reset] ++
2,262,990 UART: [warm-reset] Prev Cold-Reset failed
2,264,093 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Production
86,012 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,359 UART: [kat] SHA2-512-ACC
906,260 UART: [kat] ECC-384
916,067 UART: [kat] HMAC-384Kdf
920,663 UART: [kat] LMS
1,168,975 UART: [kat] --
1,169,884 UART: [cold-reset] ++
1,170,424 UART: [fht] FHT @ 0x50003400
1,172,966 UART: [idev] ++
1,173,134 UART: [idev] CDI.KEYID = 6
1,173,495 UART: [idev] SUBJECT.KEYID = 7
1,173,920 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,592 UART:
1,175,608 UART: Running Caliptra ROM ...
1,176,016 UART:
1,176,158 UART: [state] CFI Enabled
1,179,152 UART: [state] LifecycleState = Production
1,179,759 UART: [state] DebugLocked = No
1,180,269 UART: [state] WD Timer not started. Device not locked for debugging
1,181,566 UART: [kat] SHA2-256
1,985,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,245 UART: [kat] ++
1,989,397 UART: [kat] sha1
1,993,443 UART: [kat] SHA2-256
1,995,383 UART: [kat] SHA2-384
1,998,118 UART: [kat] SHA2-512-ACC
2,000,019 UART: [kat] ECC-384
2,009,976 UART: [kat] HMAC-384Kdf
2,014,576 UART: [kat] LMS
2,262,888 UART: [kat] --
2,264,018 UART: [warm-reset] ++
2,264,286 UART: [warm-reset] Prev Cold-Reset failed
2,265,157 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
6,608 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,373 UART:
192,749 UART: Running Caliptra ROM ...
193,944 UART:
194,095 UART: [state] CFI Enabled
265,284 UART: [state] LifecycleState = Unprovisioned
267,394 UART: [state] DebugLocked = No
270,128 UART: [state] WD Timer not started. Device not locked for debugging
275,155 UART: [kat] SHA2-256
457,087 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,577 UART: [kat] ++
469,121 UART: [kat] sha1
478,707 UART: [kat] SHA2-256
481,723 UART: [kat] SHA2-384
489,155 UART: [kat] SHA2-512-ACC
491,762 UART: [kat] ECC-384
3,775,532 UART: [kat] HMAC-384Kdf
3,801,824 UART: [kat] LMS
4,874,963 UART: [kat] --
4,881,590 UART: [cold-reset] ++
4,884,229 UART: [fht] FHT @ 0x50003400
4,895,368 UART: [idev] ++
4,896,058 UART: [idev] CDI.KEYID = 6
4,897,299 UART: [idev] SUBJECT.KEYID = 7
4,898,324 UART: [idev] UDS.KEYID = 0
4,929,260 UART: [idev] Erasing UDS.KEYID = 0
8,243,784 UART: [idev] Sha1 KeyId Algorithm
8,265,074 UART: [idev] --
8,269,715 UART: [ldev] ++
8,270,283 UART: [ldev] CDI.KEYID = 6
8,271,517 UART: [ldev] SUBJECT.KEYID = 5
8,272,672 UART: [ldev] AUTHORITY.KEYID = 7
8,273,900 UART: [ldev] FE.KEYID = 1
8,318,258 UART: [ldev] Erasing FE.KEYID = 1
11,648,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,993,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,014,334 UART: [ldev] --
14,019,224 UART: [fwproc] Wait for Commands...
14,021,436 UART: [fwproc] Recv command 0x46574c44
14,023,753 UART: [fwproc] Recv'd Img size: 114124 bytes
Initializing fuses
1,174 UART:
1,354 UART: Running Caliptra ROM ...
2,459 UART:
2,610 UART: [state] CFI Enabled
71,697 UART: [state] LifecycleState = Unprovisioned
73,569 UART: [state] DebugLocked = No
75,622 UART: [state] WD Timer not started. Device not locked for debugging
80,554 UART: [kat] SHA2-256
262,499 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
274,039 UART: [kat] ++
274,504 UART: [kat] sha1
284,790 UART: [kat] SHA2-256
287,848 UART: [kat] SHA2-384
293,874 UART: [kat] SHA2-512-ACC
296,475 UART: [kat] ECC-384
3,581,609 UART: [kat] HMAC-384Kdf
3,608,588 UART: [kat] LMS
4,681,710 UART: [kat] --
4,686,531 UART: [warm-reset] ++
4,687,545 UART: [warm-reset] Prev Cold-Reset failed
4,692,467 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
6,503 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
6,347 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,281 UART:
192,675 UART: Running Caliptra ROM ...
193,856 UART:
603,648 UART: [state] CFI Enabled
614,285 UART: [state] LifecycleState = Unprovisioned
616,630 UART: [state] DebugLocked = No
617,972 UART: [state] WD Timer not started. Device not locked for debugging
622,728 UART: [kat] SHA2-256
804,701 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,238 UART: [kat] ++
816,732 UART: [kat] sha1
826,848 UART: [kat] SHA2-256
829,904 UART: [kat] SHA2-384
835,547 UART: [kat] SHA2-512-ACC
838,151 UART: [kat] ECC-384
4,092,155 UART: [kat] HMAC-384Kdf
4,105,004 UART: [kat] LMS
5,178,147 UART: [kat] --
5,182,872 UART: [cold-reset] ++
5,184,921 UART: [fht] FHT @ 0x50003400
5,197,631 UART: [idev] ++
5,198,325 UART: [idev] CDI.KEYID = 6
5,199,564 UART: [idev] SUBJECT.KEYID = 7
5,201,012 UART: [idev] UDS.KEYID = 0
5,218,128 UART: [idev] Erasing UDS.KEYID = 0
8,490,592 UART: [idev] Sha1 KeyId Algorithm
8,512,369 UART: [idev] --
8,517,283 UART: [ldev] ++
8,517,854 UART: [ldev] CDI.KEYID = 6
8,519,248 UART: [ldev] SUBJECT.KEYID = 5
8,520,478 UART: [ldev] AUTHORITY.KEYID = 7
8,522,096 UART: [ldev] FE.KEYID = 1
8,531,808 UART: [ldev] Erasing FE.KEYID = 1
11,818,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,999 UART: [ldev] --
14,187,209 UART: [fwproc] Wait for Commands...
14,190,112 UART: [fwproc] Recv command 0x46574c44
14,192,423 UART: [fwproc] Recv'd Img size: 114124 bytes
Initializing fuses
1,167 UART:
1,428 UART: Running Caliptra ROM ...
2,531 UART:
6,269,294 UART: [state] CFI Enabled
6,284,388 UART: [state] LifecycleState = Unprovisioned
6,286,244 UART: [state] DebugLocked = No
6,288,324 UART: [state] WD Timer not started. Device not locked for debugging
6,293,809 UART: [kat] SHA2-256
6,475,783 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,487,277 UART: [kat] ++
6,487,822 UART: [kat] sha1
6,497,840 UART: [kat] SHA2-256
6,500,912 UART: [kat] SHA2-384
6,507,160 UART: [kat] SHA2-512-ACC
6,509,806 UART: [kat] ECC-384
9,767,224 UART: [kat] HMAC-384Kdf
9,778,906 UART: [kat] LMS
10,852,048 UART: [kat] --
10,855,960 UART: [warm-reset] ++
10,856,976 UART: [warm-reset] Prev Cold-Reset failed
10,860,489 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
6,393 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
5,613 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,078 UART:
192,476 UART: Running Caliptra ROM ...
193,642 UART:
193,803 UART: [state] CFI Enabled
267,220 UART: [state] LifecycleState = Unprovisioned
269,085 UART: [state] DebugLocked = No
270,795 UART: [state] WD Timer not started. Device not locked for debugging
275,020 UART: [kat] SHA2-256
454,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,723 UART: [kat] ++
466,262 UART: [kat] sha1
477,684 UART: [kat] SHA2-256
480,698 UART: [kat] SHA2-384
487,266 UART: [kat] SHA2-512-ACC
490,200 UART: [kat] ECC-384
2,948,832 UART: [kat] HMAC-384Kdf
2,972,682 UART: [kat] LMS
3,502,127 UART: [kat] --
3,505,743 UART: [cold-reset] ++
3,507,460 UART: [fht] FHT @ 0x50003400
3,520,130 UART: [idev] ++
3,520,707 UART: [idev] CDI.KEYID = 6
3,521,614 UART: [idev] SUBJECT.KEYID = 7
3,522,777 UART: [idev] UDS.KEYID = 0
3,545,135 UART: [idev] Erasing UDS.KEYID = 0
6,026,468 UART: [idev] Sha1 KeyId Algorithm
6,050,262 UART: [idev] --
6,055,074 UART: [ldev] ++
6,055,650 UART: [ldev] CDI.KEYID = 6
6,056,542 UART: [ldev] SUBJECT.KEYID = 5
6,057,760 UART: [ldev] AUTHORITY.KEYID = 7
6,059,001 UART: [ldev] FE.KEYID = 1
6,101,068 UART: [ldev] Erasing FE.KEYID = 1
8,602,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,943 UART: [ldev] --
10,395,097 UART: [fwproc] Wait for Commands...
10,397,466 UART: [fwproc] Recv command 0x46574c44
10,399,564 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,164 UART:
1,340 UART: Running Caliptra ROM ...
2,387 UART:
2,531 UART: [state] CFI Enabled
70,367 UART: [state] LifecycleState = Unprovisioned
72,237 UART: [state] DebugLocked = No
73,752 UART: [state] WD Timer not started. Device not locked for debugging
78,190 UART: [kat] SHA2-256
257,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
268,856 UART: [kat] ++
269,388 UART: [kat] sha1
280,483 UART: [kat] SHA2-256
283,489 UART: [kat] SHA2-384
288,709 UART: [kat] SHA2-512-ACC
291,681 UART: [kat] ECC-384
2,754,017 UART: [kat] HMAC-384Kdf
2,776,447 UART: [kat] LMS
3,305,870 UART: [kat] --
3,310,393 UART: [warm-reset] ++
3,311,242 UART: [warm-reset] Prev Cold-Reset failed
3,314,798 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
6,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
13,860 writing to cptra_bootfsm_go
17,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
203,267 UART:
203,696 UART: Running Caliptra ROM ...
204,770 UART:
614,299 UART: [state] CFI Enabled
628,795 UART: [state] LifecycleState = Unprovisioned
630,626 UART: [state] DebugLocked = No
633,571 UART: [state] WD Timer not started. Device not locked for debugging
638,118 UART: [kat] SHA2-256
817,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
828,810 UART: [kat] ++
829,346 UART: [kat] sha1
841,001 UART: [kat] SHA2-256
844,010 UART: [kat] SHA2-384
851,114 UART: [kat] SHA2-512-ACC
854,040 UART: [kat] ECC-384
3,297,101 UART: [kat] HMAC-384Kdf
3,309,400 UART: [kat] LMS
3,838,908 UART: [kat] --
3,842,999 UART: [cold-reset] ++
3,845,393 UART: [fht] FHT @ 0x50003400
3,856,487 UART: [idev] ++
3,857,052 UART: [idev] CDI.KEYID = 6
3,857,962 UART: [idev] SUBJECT.KEYID = 7
3,859,174 UART: [idev] UDS.KEYID = 0
3,874,677 UART: [idev] Erasing UDS.KEYID = 0
6,328,771 UART: [idev] Sha1 KeyId Algorithm
6,352,769 UART: [idev] --
6,357,591 UART: [ldev] ++
6,358,162 UART: [ldev] CDI.KEYID = 6
6,359,066 UART: [ldev] SUBJECT.KEYID = 5
6,360,226 UART: [ldev] AUTHORITY.KEYID = 7
6,361,457 UART: [ldev] FE.KEYID = 1
6,372,905 UART: [ldev] Erasing FE.KEYID = 1
8,844,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,078 UART: [ldev] --
10,636,695 UART: [fwproc] Wait for Commands...
10,639,221 UART: [fwproc] Recv command 0x46574c44
10,641,316 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,173 UART:
1,428 UART: Running Caliptra ROM ...
2,532 UART:
9,808,180 UART: [state] CFI Enabled
9,822,596 UART: [state] LifecycleState = Unprovisioned
9,824,443 UART: [state] DebugLocked = No
9,826,069 UART: [state] WD Timer not started. Device not locked for debugging
9,830,248 UART: [kat] SHA2-256
10,009,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,020,909 UART: [kat] ++
10,021,361 UART: [kat] sha1
10,032,948 UART: [kat] SHA2-256
10,035,946 UART: [kat] SHA2-384
10,042,420 UART: [kat] SHA2-512-ACC
10,045,416 UART: [kat] ECC-384
12,487,332 UART: [kat] HMAC-384Kdf
12,498,990 UART: [kat] LMS
13,028,499 UART: [kat] --
13,031,950 UART: [warm-reset] ++
13,032,739 UART: [warm-reset] Prev Cold-Reset failed
13,036,220 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
6,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
5,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
6,022 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,820 UART: [kat] LMS
1,169,132 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,651 UART: [fht] FHT @ 0x50003400
1,173,173 UART: [idev] ++
1,173,341 UART: [idev] CDI.KEYID = 6
1,173,702 UART: [idev] SUBJECT.KEYID = 7
1,174,127 UART: [idev] UDS.KEYID = 0
1,181,909 UART: [idev] Erasing UDS.KEYID = 0
1,198,875 UART: [idev] Sha1 KeyId Algorithm
1,207,665 UART: [idev] --
1,208,870 UART: [ldev] ++
1,209,038 UART: [ldev] CDI.KEYID = 6
1,209,402 UART: [ldev] SUBJECT.KEYID = 5
1,209,829 UART: [ldev] AUTHORITY.KEYID = 7
1,210,292 UART: [ldev] FE.KEYID = 1
1,215,236 UART: [ldev] Erasing FE.KEYID = 1
1,241,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,106 UART: [ldev] --
1,280,464 UART: [fwproc] Wait for Commands...
1,281,217 UART: [fwproc] Recv command 0x46574c44
1,281,950 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,292,807 UART:
1,292,823 UART: Running Caliptra ROM ...
1,293,231 UART:
1,293,286 UART: [state] CFI Enabled
1,295,876 UART: [state] LifecycleState = Unprovisioned
1,296,531 UART: [state] DebugLocked = No
1,297,071 UART: [state] WD Timer not started. Device not locked for debugging
1,298,356 UART: [kat] SHA2-256
2,101,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,035 UART: [kat] ++
2,106,187 UART: [kat] sha1
2,110,351 UART: [kat] SHA2-256
2,112,291 UART: [kat] SHA2-384
2,114,972 UART: [kat] SHA2-512-ACC
2,116,873 UART: [kat] ECC-384
2,126,824 UART: [kat] HMAC-384Kdf
2,131,340 UART: [kat] LMS
2,379,652 UART: [kat] --
2,380,650 UART: [warm-reset] ++
2,380,918 UART: [warm-reset] Prev Cold-Reset failed
2,381,727 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,207 UART: [kat] LMS
1,169,519 UART: [kat] --
1,170,222 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,182,040 UART: [idev] Erasing UDS.KEYID = 0
1,199,368 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,539 UART: [ldev] --
1,281,805 UART: [fwproc] Wait for Commands...
1,282,572 UART: [fwproc] Recv command 0x46574c44
1,283,305 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,294,138 UART:
1,294,154 UART: Running Caliptra ROM ...
1,294,562 UART:
1,294,704 UART: [state] CFI Enabled
1,297,160 UART: [state] LifecycleState = Unprovisioned
1,297,815 UART: [state] DebugLocked = No
1,298,361 UART: [state] WD Timer not started. Device not locked for debugging
1,299,658 UART: [kat] SHA2-256
2,103,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,337 UART: [kat] ++
2,107,489 UART: [kat] sha1
2,111,689 UART: [kat] SHA2-256
2,113,629 UART: [kat] SHA2-384
2,116,440 UART: [kat] SHA2-512-ACC
2,118,341 UART: [kat] ECC-384
2,128,116 UART: [kat] HMAC-384Kdf
2,132,658 UART: [kat] LMS
2,380,970 UART: [kat] --
2,381,952 UART: [warm-reset] ++
2,382,220 UART: [warm-reset] Prev Cold-Reset failed
2,383,195 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
890,954 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,083 UART: [kat] ++
895,235 UART: [kat] sha1
899,293 UART: [kat] SHA2-256
901,233 UART: [kat] SHA2-384
903,890 UART: [kat] SHA2-512-ACC
905,791 UART: [kat] ECC-384
915,510 UART: [kat] HMAC-384Kdf
920,092 UART: [kat] LMS
1,168,404 UART: [kat] --
1,169,057 UART: [cold-reset] ++
1,169,471 UART: [fht] FHT @ 0x50003400
1,172,053 UART: [idev] ++
1,172,221 UART: [idev] CDI.KEYID = 6
1,172,582 UART: [idev] SUBJECT.KEYID = 7
1,173,007 UART: [idev] UDS.KEYID = 0
1,180,763 UART: [idev] Erasing UDS.KEYID = 0
1,197,357 UART: [idev] Sha1 KeyId Algorithm
1,206,311 UART: [idev] --
1,207,210 UART: [ldev] ++
1,207,378 UART: [ldev] CDI.KEYID = 6
1,207,742 UART: [ldev] SUBJECT.KEYID = 5
1,208,169 UART: [ldev] AUTHORITY.KEYID = 7
1,208,632 UART: [ldev] FE.KEYID = 1
1,213,826 UART: [ldev] Erasing FE.KEYID = 1
1,240,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,924 UART: [ldev] --
1,279,338 UART: [fwproc] Wait for Commands...
1,280,077 UART: [fwproc] Recv command 0x46574c44
1,280,810 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,291,671 UART:
1,291,687 UART: Running Caliptra ROM ...
1,292,095 UART:
1,292,150 UART: [state] CFI Enabled
1,294,704 UART: [state] LifecycleState = Unprovisioned
1,295,359 UART: [state] DebugLocked = No
1,295,903 UART: [state] WD Timer not started. Device not locked for debugging
1,297,086 UART: [kat] SHA2-256
2,100,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,104,765 UART: [kat] ++
2,104,917 UART: [kat] sha1
2,109,219 UART: [kat] SHA2-256
2,111,159 UART: [kat] SHA2-384
2,113,816 UART: [kat] SHA2-512-ACC
2,115,717 UART: [kat] ECC-384
2,125,242 UART: [kat] HMAC-384Kdf
2,129,920 UART: [kat] LMS
2,378,232 UART: [kat] --
2,379,258 UART: [warm-reset] ++
2,379,526 UART: [warm-reset] Prev Cold-Reset failed
2,380,631 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,409 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,262 UART: [idev] ++
1,173,430 UART: [idev] CDI.KEYID = 6
1,173,791 UART: [idev] SUBJECT.KEYID = 7
1,174,216 UART: [idev] UDS.KEYID = 0
1,181,988 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,420 UART: [idev] --
1,209,625 UART: [ldev] ++
1,209,793 UART: [ldev] CDI.KEYID = 6
1,210,157 UART: [ldev] SUBJECT.KEYID = 5
1,210,584 UART: [ldev] AUTHORITY.KEYID = 7
1,211,047 UART: [ldev] FE.KEYID = 1
1,216,313 UART: [ldev] Erasing FE.KEYID = 1
1,242,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,449 UART: [ldev] --
1,281,947 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,253 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,294,188 UART:
1,294,204 UART: Running Caliptra ROM ...
1,294,612 UART:
1,294,754 UART: [state] CFI Enabled
1,297,816 UART: [state] LifecycleState = Unprovisioned
1,298,471 UART: [state] DebugLocked = No
1,299,043 UART: [state] WD Timer not started. Device not locked for debugging
1,300,282 UART: [kat] SHA2-256
2,103,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,961 UART: [kat] ++
2,108,113 UART: [kat] sha1
2,112,503 UART: [kat] SHA2-256
2,114,443 UART: [kat] SHA2-384
2,116,970 UART: [kat] SHA2-512-ACC
2,118,871 UART: [kat] ECC-384
2,129,012 UART: [kat] HMAC-384Kdf
2,133,602 UART: [kat] LMS
2,381,914 UART: [kat] --
2,382,794 UART: [warm-reset] ++
2,383,062 UART: [warm-reset] Prev Cold-Reset failed
2,383,855 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
88,032 UART: [kat] SHA2-256
891,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
904,880 UART: [kat] SHA2-512-ACC
906,781 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,365 UART: [fht] FHT @ 0x50003400
1,173,237 UART: [idev] ++
1,173,405 UART: [idev] CDI.KEYID = 6
1,173,766 UART: [idev] SUBJECT.KEYID = 7
1,174,191 UART: [idev] UDS.KEYID = 0
1,182,593 UART: [idev] Erasing UDS.KEYID = 0
1,198,935 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,794 UART: [ldev] ++
1,208,962 UART: [ldev] CDI.KEYID = 6
1,209,326 UART: [ldev] SUBJECT.KEYID = 5
1,209,753 UART: [ldev] AUTHORITY.KEYID = 7
1,210,216 UART: [ldev] FE.KEYID = 1
1,215,204 UART: [ldev] Erasing FE.KEYID = 1
1,241,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,946 UART: [ldev] --
1,280,314 UART: [fwproc] Wait for Commands...
1,280,917 UART: [fwproc] Recv command 0x46574c44
1,281,650 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,292,447 UART:
1,292,463 UART: Running Caliptra ROM ...
1,292,871 UART:
1,292,926 UART: [state] CFI Enabled
1,295,298 UART: [state] LifecycleState = Unprovisioned
1,295,953 UART: [state] DebugLocked = No
1,296,449 UART: [state] WD Timer not started. Device not locked for debugging
1,297,680 UART: [kat] SHA2-256
2,101,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,105,359 UART: [kat] ++
2,105,511 UART: [kat] sha1
2,109,917 UART: [kat] SHA2-256
2,111,857 UART: [kat] SHA2-384
2,114,504 UART: [kat] SHA2-512-ACC
2,116,405 UART: [kat] ECC-384
2,125,708 UART: [kat] HMAC-384Kdf
2,130,216 UART: [kat] LMS
2,378,528 UART: [kat] --
2,379,334 UART: [warm-reset] ++
2,379,602 UART: [warm-reset] Prev Cold-Reset failed
2,380,587 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,358 UART: [kat] ++
895,510 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,243 UART: [kat] SHA2-512-ACC
906,144 UART: [kat] ECC-384
915,705 UART: [kat] HMAC-384Kdf
920,443 UART: [kat] LMS
1,168,755 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,164 UART: [fht] FHT @ 0x50003400
1,172,948 UART: [idev] ++
1,173,116 UART: [idev] CDI.KEYID = 6
1,173,477 UART: [idev] SUBJECT.KEYID = 7
1,173,902 UART: [idev] UDS.KEYID = 0
1,181,854 UART: [idev] Erasing UDS.KEYID = 0
1,198,636 UART: [idev] Sha1 KeyId Algorithm
1,207,628 UART: [idev] --
1,208,671 UART: [ldev] ++
1,208,839 UART: [ldev] CDI.KEYID = 6
1,209,203 UART: [ldev] SUBJECT.KEYID = 5
1,209,630 UART: [ldev] AUTHORITY.KEYID = 7
1,210,093 UART: [ldev] FE.KEYID = 1
1,215,403 UART: [ldev] Erasing FE.KEYID = 1
1,241,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,069 UART: [ldev] --
1,280,477 UART: [fwproc] Wait for Commands...
1,281,224 UART: [fwproc] Recv command 0x46574c44
1,281,957 UART: [fwproc] Recv'd Img size: 114448 bytes
Initializing fuses
1,292,888 UART:
1,292,904 UART: Running Caliptra ROM ...
1,293,312 UART:
1,293,454 UART: [state] CFI Enabled
1,296,572 UART: [state] LifecycleState = Unprovisioned
1,297,227 UART: [state] DebugLocked = No
1,297,787 UART: [state] WD Timer not started. Device not locked for debugging
1,299,126 UART: [kat] SHA2-256
2,102,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,805 UART: [kat] ++
2,106,957 UART: [kat] sha1
2,111,103 UART: [kat] SHA2-256
2,113,043 UART: [kat] SHA2-384
2,115,754 UART: [kat] SHA2-512-ACC
2,117,655 UART: [kat] ECC-384
2,127,346 UART: [kat] HMAC-384Kdf
2,131,972 UART: [kat] LMS
2,380,284 UART: [kat] --
2,381,304 UART: [warm-reset] ++
2,381,572 UART: [warm-reset] Prev Cold-Reset failed
2,382,535 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
5,750 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,085 UART:
192,489 UART: Running Caliptra ROM ...
193,589 UART:
193,731 UART: [state] CFI Enabled
267,069 UART: [state] LifecycleState = Unprovisioned
269,445 UART: [state] DebugLocked = No
271,985 UART: [state] WD Timer not started. Device not locked for debugging
277,395 UART: [kat] SHA2-256
459,332 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,871 UART: [kat] ++
471,312 UART: [kat] sha1
482,429 UART: [kat] SHA2-256
485,436 UART: [kat] SHA2-384
491,358 UART: [kat] SHA2-512-ACC
493,966 UART: [kat] ECC-384
3,778,072 UART: [kat] HMAC-384Kdf
3,802,725 UART: [kat] LMS
4,875,845 UART: [kat] --
4,880,816 UART: [cold-reset] ++
4,882,693 UART: [fht] FHT @ 0x50003400
4,895,078 UART: [idev] ++
4,895,762 UART: [idev] CDI.KEYID = 6
4,896,867 UART: [idev] SUBJECT.KEYID = 7
4,898,085 UART: [idev] UDS.KEYID = 0
4,929,220 UART: [idev] Erasing UDS.KEYID = 0
8,241,063 UART: [idev] Sha1 KeyId Algorithm
8,263,431 UART: [idev] --
8,268,884 UART: [ldev] ++
8,269,506 UART: [ldev] CDI.KEYID = 6
8,270,689 UART: [ldev] SUBJECT.KEYID = 5
8,271,849 UART: [ldev] AUTHORITY.KEYID = 7
8,273,075 UART: [ldev] FE.KEYID = 1
8,315,328 UART: [ldev] Erasing FE.KEYID = 1
11,652,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,371 UART: [ldev] --
14,034,933 UART: [fwproc] Wait for Commands...
14,037,625 UART: [fwproc] Recv command 0x46574c44
14,039,945 UART: [fwproc] Recv'd Img size: 114124 bytes
18,110,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,191,529 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,260,295 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,577,983 >>> mbox cmd response: success
18,581,403 UART: [afmc] ++
18,581,991 UART: [afmc] CDI.KEYID = 6
18,583,229 UART: [afmc] SUBJECT.KEYID = 7
18,584,353 UART: [afmc] AUTHORITY.KEYID = 5
21,944,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,240,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,242,774 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,258,907 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,274,966 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,290,987 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,313,364 UART: [afmc] --
24,318,837 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,462,399 UART: [cold-reset] --
24,463,252 UART: [state] Locking Datavault
24,464,404 UART: [state] Locking PCR0, PCR1 and PCR31
24,465,942 UART: [state] Locking ICCM
24,466,854 UART: [exit] Launching FMC @ 0x40000130
24,468,273 UART:
24,468,434 UART: Running Caliptra FMC ...
24,469,547 UART:
24,469,702 UART: [state] CFI Enabled
24,470,562 UART: [fht] FMC Alias Private Key: 7
26,739,425 UART: [art] Extend RT PCRs Done
26,740,655 UART: [art] Lock RT PCRs Done
26,742,601 UART: [art] Populate DV Done
26,747,792 UART: [fht] FMC Alias Private Key: 7
26,749,328 UART: [art] Derive CDI
26,750,137 UART: [art] Store in in slot 0x4
26,809,158 UART: [art] Derive Key Pair
26,810,200 UART: [art] Store priv key in slot 0x5
30,103,047 UART: [art] Derive Key Pair - Done
30,116,653 UART: [art] Signing Cert with AUTHO
30,117,958 UART: RITY.KEYID = 7
32,405,073 UART: [art] Erasing AUTHORITY.KEYID = 7
32,406,593 UART: [art] PUB.X = 56805A7BF52C252EFF22D28232AE2ED4AD474C1E0839440AD63A839CD0910EFA9B758B5FE1CA66906DC41D1C29399112
32,413,855 UART: [art] PUB.Y = 454A5B1C60B784A5D8414D1C9896746678DD5EFF6479DB0F9F830E8A7D4A57629C6ED09610F14445F665095900D4DE5F
32,421,030 UART: [art] SIG.R = D0DDD44BB6B45EE08A955D7ECE4B894E22853BE27DEDE332F5A3658143774DD8D4DF6881E00F4B5B3C8B93D006D10F36
32,428,483 UART: [art] SIG.S = 5FD9A21963FDF7230274CD0DAB5D205CD1DC169B830521D05BD6A1B73EBD92899919BA3CDEC9315C9FAF7FD26B6464BA
33,733,511 UART: Caliptra RT
33,734,226 UART: [state] CFI Enabled
33,896,889 UART: [rt] RT listening for mailbox commands...
33,900,008 UART:
33,900,263 UART: Running Caliptra ROM ...
33,901,368 UART:
33,901,528 UART: [state] CFI Enabled
33,964,339 UART: [state] LifecycleState = Unprovisioned
33,966,208 UART: [state] DebugLocked = No
33,968,568 UART: [state] WD Timer not started. Device not locked for debugging
33,972,375 UART: [kat] SHA2-256
34,154,317 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
34,165,811 UART: [kat] ++
34,166,420 UART: [kat] sha1
34,177,369 UART: [kat] SHA2-256
34,180,434 UART: [kat] SHA2-384
34,187,870 UART: [kat] SHA2-512-ACC
34,190,491 UART: [kat] ECC-384
37,476,358 UART: [kat] HMAC-384Kdf
37,501,779 UART: [kat] LMS
38,574,888 UART: [kat] --
38,580,661 UART: [update-reset] ++
42,681,192 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,683,868 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
43,066,028 >>> mbox cmd response: success
Initializing fuses
721 UART: [
1,220 UART: Running Caliptra ROM ...
2,239 UART:
2,404 UART: [state] CFI Enabled
69,836 UART: [state] LifecycleState = Unprovisioned
71,706 UART: [state] DebugLocked = No
73,952 UART: [state] WD Timer not started. Device not locked for debugging
78,348 UART: [kat] SHA2-256
260,274 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
271,805 UART: [kat] ++
272,244 UART: [kat] sha1
284,150 UART: [kat] SHA2-256
287,218 UART: [kat] SHA2-384
293,224 UART: [kat] SHA2-512-ACC
295,837 UART: [kat] ECC-384
3,583,031 UART: [kat] HMAC-384Kdf
3,608,060 UART: [kat] LMS
4,681,167 UART: [kat] --
4,685,023 UART: [warm-reset] ++
4,687,953 UART: [warm-reset] Prev Update Reset failed
4,691,369 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
5,546 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,353,087 >>> mbox cmd response: success
24,027,504 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,171,401 UART:
24,171,780 UART: Running Caliptra FMC ...
24,172,900 UART:
24,173,049 UART: [state] CFI Enabled
24,174,015 UART: [fht] FMC Alias Private Key: 7
26,448,877 UART: [art] Extend RT PCRs Done
26,450,102 UART: [art] Lock RT PCRs Done
26,451,756 UART: [art] Populate DV Done
26,457,061 UART: [fht] FMC Alias Private Key: 7
26,458,657 UART: [art] Derive CDI
26,459,411 UART: [art] Store in in slot 0x4
26,519,357 UART: [art] Derive Key Pair
26,520,398 UART: [art] Store priv key in slot 0x5
29,813,272 UART: [art] Derive Key Pair - Done
29,826,270 UART: [art] Signing Cert with AUTHO
29,827,575 UART: RITY.KEYID = 7
32,114,989 UART: [art] Erasing AUTHORITY.KEYID = 7
32,116,503 UART: [art] PUB.X = 43B6E8244C8180E00F83355A5349BCF8814D03DC72AD77AADA5DBF8493A22A52BE2E5BADFFC2E864A6E12B008CDA8B40
32,123,755 UART: [art] PUB.Y = 9FE44DD866A9291231A97E226AFC23872D57E2BB9404FF5E7AEF67A85F0CAD9AAC8AB5654B4A5C1DC18DC35B808C5D92
32,131,021 UART: [art] SIG.R = D4BD5A2415B6A7E1BE499B09F1649A21658407C0A82059406AADB588DA5AE2ACADB6759CEB2838674C6BFCB9ACA19AD5
32,138,471 UART: [art] SIG.S = 1E53C657D4D1178445E94998C161C9ECD44F0DCD4DAFED23FCBBBF80C4BA897345A44C695F379BBFB2351DC724133255
33,444,204 UART: Caliptra RT
33,444,923 UART: [state] CFI Enabled
33,625,468 UART: [rt] RT listening for mailbox commands...
42,694,524 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
6,471 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
192,403 UART:
192,781 UART: Running Caliptra ROM ...
193,983 UART:
603,353 UART: [state] CFI Enabled
619,604 UART: [state] LifecycleState = Unprovisioned
621,931 UART: [state] DebugLocked = No
623,492 UART: [state] WD Timer not started. Device not locked for debugging
627,970 UART: [kat] SHA2-256
809,943 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,471 UART: [kat] ++
821,965 UART: [kat] sha1
832,299 UART: [kat] SHA2-256
835,349 UART: [kat] SHA2-384
841,330 UART: [kat] SHA2-512-ACC
843,959 UART: [kat] ECC-384
4,100,602 UART: [kat] HMAC-384Kdf
4,113,179 UART: [kat] LMS
5,186,317 UART: [kat] --
5,191,293 UART: [cold-reset] ++
5,193,069 UART: [fht] FHT @ 0x50003400
5,204,480 UART: [idev] ++
5,205,149 UART: [idev] CDI.KEYID = 6
5,206,376 UART: [idev] SUBJECT.KEYID = 7
5,207,802 UART: [idev] UDS.KEYID = 0
5,224,695 UART: [idev] Erasing UDS.KEYID = 0
8,495,731 UART: [idev] Sha1 KeyId Algorithm
8,518,408 UART: [idev] --
8,522,965 UART: [ldev] ++
8,523,536 UART: [ldev] CDI.KEYID = 6
8,524,774 UART: [ldev] SUBJECT.KEYID = 5
8,526,226 UART: [ldev] AUTHORITY.KEYID = 7
8,527,706 UART: [ldev] FE.KEYID = 1
8,537,705 UART: [ldev] Erasing FE.KEYID = 1
11,828,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,035 UART: [ldev] --
14,195,716 UART: [fwproc] Wait for Commands...
14,198,294 UART: [fwproc] Recv command 0x46574c44
14,200,603 UART: [fwproc] Recv'd Img size: 114124 bytes
18,272,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,350,704 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,419,415 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,736,356 >>> mbox cmd response: success
18,741,276 UART: [afmc] ++
18,741,871 UART: [afmc] CDI.KEYID = 6
18,742,973 UART: [afmc] SUBJECT.KEYID = 7
18,744,185 UART: [afmc] AUTHORITY.KEYID = 5
22,060,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,353,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,355,541 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,371,736 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,387,802 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,403,759 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,427,121 UART: [afmc] --
24,433,182 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,576,470 UART: [cold-reset] --
24,577,322 UART: [state] Locking Datavault
24,578,381 UART: [state] Locking PCR0, PCR1 and PCR31
24,579,906 UART: [state] Locking ICCM
24,580,795 UART: [exit] Launching FMC @ 0x40000130
24,582,128 UART:
24,582,268 UART: Running Caliptra FMC ...
24,583,364 UART:
24,583,505 UART: [state] CFI Enabled
24,584,328 UART: [fht] FMC Alias Private Key: 7
26,793,550 UART: [art] Extend RT PCRs Done
26,794,770 UART: [art] Lock RT PCRs Done
26,796,413 UART: [art] Populate DV Done
26,801,764 UART: [fht] FMC Alias Private Key: 7
26,803,452 UART: [art] Derive CDI
26,804,180 UART: [art] Store in in slot 0x4
26,846,988 UART: [art] Derive Key Pair
26,848,029 UART: [art] Store priv key in slot 0x5
30,090,442 UART: [art] Derive Key Pair - Done
30,103,326 UART: [art] Signing Cert with AUTHO
30,104,639 UART: RITY.KEYID = 7
32,383,884 UART: [art] Erasing AUTHORITY.KEYID = 7
32,385,390 UART: [art] PUB.X = 3380A822CB938B62D332ABAEE595B027DFAC93A2ABEA39226C786004515B5CBA8D6B3AB5CEFBC63448D62F6F26D264CD
32,392,634 UART: [art] PUB.Y = C367C7FA83E4737445FDCEA0E4E83212B15F7D126EFD69EA3D5C5AD86738AF7BC28B3F15B556725D7B6246FEFDDEEF14
32,399,904 UART: [art] SIG.R = B4768FC99CEA88C15901D4607083848A782481C41F5C8D6480557D0B52C71E4606C77EBBC7B42911D316750B84BD24C8
32,407,224 UART: [art] SIG.S = 6EC4BF5D68DD4CAE550A2C50E52296AC9B7CDCF78B9472CCE351E55BC298BE7497B433FF33A44053328E5830314E46A7
33,712,749 UART: Caliptra RT
33,713,462 UART: [state] CFI Enabled
33,829,714 UART: [rt] RT listening for mailbox commands...
33,832,665 UART:
33,832,905 UART: Running Caliptra ROM ...
33,834,002 UART:
33,834,270 UART: [state] CFI Enabled
33,846,627 UART: [state] LifecycleState = Unprovisioned
33,848,448 UART: [state] DebugLocked = No
33,849,758 UART: [state] WD Timer not started. Device not locked for debugging
33,854,976 UART: [kat] SHA2-256
34,036,923 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
34,048,468 UART: [kat] ++
34,049,067 UART: [kat] sha1
34,059,799 UART: [kat] SHA2-256
34,062,808 UART: [kat] SHA2-384
34,069,430 UART: [kat] SHA2-512-ACC
34,072,055 UART: [kat] ECC-384
37,326,142 UART: [kat] HMAC-384Kdf
37,336,482 UART: [kat] LMS
38,409,615 UART: [kat] --
38,416,285 UART: [update-reset] ++
42,516,014 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,518,900 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89420
42,901,050 >>> mbox cmd response: success
Initializing fuses
743 UART: [
1,303 UART: Running Caliptra ROM ...
2,326 UART:
412,183 UART: [state] CFI Enabled
428,505 UART: [state] LifecycleState = Unprovisioned
430,386 UART: [state] DebugLocked = No
432,977 UART: [state] WD Timer not started. Device not locked for debugging
438,230 UART: [kat] SHA2-256
620,168 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
631,753 UART: [kat] ++
632,329 UART: [kat] sha1
642,445 UART: [kat] SHA2-256
645,472 UART: [kat] SHA2-384
651,778 UART: [kat] SHA2-512-ACC
654,404 UART: [kat] ECC-384
3,907,037 UART: [kat] HMAC-384Kdf
3,919,330 UART: [kat] LMS
4,992,444 UART: [kat] --
4,997,924 UART: [warm-reset] ++
5,000,615 UART: [warm-reset] Prev Update Reset failed
5,006,039 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
6,448 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,543,472 >>> mbox cmd response: success
24,169,913 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,313,756 UART:
24,314,149 UART: Running Caliptra FMC ...
24,315,278 UART:
24,315,422 UART: [state] CFI Enabled
24,316,384 UART: [fht] FMC Alias Private Key: 7
26,527,365 UART: [art] Extend RT PCRs Done
26,528,595 UART: [art] Lock RT PCRs Done
26,530,400 UART: [art] Populate DV Done
26,535,640 UART: [fht] FMC Alias Private Key: 7
26,537,272 UART: [art] Derive CDI
26,538,006 UART: [art] Store in in slot 0x4
26,580,655 UART: [art] Derive Key Pair
26,581,677 UART: [art] Store priv key in slot 0x5
29,823,151 UART: [art] Derive Key Pair - Done
29,835,928 UART: [art] Signing Cert with AUTHO
29,837,226 UART: RITY.KEYID = 7
32,116,843 UART: [art] Erasing AUTHORITY.KEYID = 7
32,118,356 UART: [art] PUB.X = A80B2B9A3F314AE16268855AF940AF298347D9636C20C1B76706643D1997D44B09CCE3E8DD325C02922664B65D7297A4
32,125,612 UART: [art] PUB.Y = FB0FF603789E0848376B99053C16AF66BE5E9C1A1A0D23B715072771FD15597DE6B592B230376A72F938B6E33CA40BA6
32,132,846 UART: [art] SIG.R = 7FFA570877A2CD86AC4034AD0633DCDED726F316A0C040B0FF4C92D13224AB61BBE808324BDE991E56CF9812B73E7F44
32,140,186 UART: [art] SIG.S = FFECB89B1A29865B3184EDB77534CD8D208825CC7A30AC225C2F436611A03C016039294CCF57C0DCF70108C3ACDD875C
33,444,726 UART: Caliptra RT
33,445,438 UART: [state] CFI Enabled
33,562,482 UART: [rt] RT listening for mailbox commands...
42,510,553 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
5,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,258 UART:
192,689 UART: Running Caliptra ROM ...
193,849 UART:
194,005 UART: [state] CFI Enabled
262,856 UART: [state] LifecycleState = Unprovisioned
264,730 UART: [state] DebugLocked = No
266,386 UART: [state] WD Timer not started. Device not locked for debugging
270,340 UART: [kat] SHA2-256
449,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,019 UART: [kat] ++
461,555 UART: [kat] sha1
473,894 UART: [kat] SHA2-256
476,959 UART: [kat] SHA2-384
482,989 UART: [kat] SHA2-512-ACC
485,979 UART: [kat] ECC-384
2,950,676 UART: [kat] HMAC-384Kdf
2,973,623 UART: [kat] LMS
3,503,105 UART: [kat] --
3,509,716 UART: [cold-reset] ++
3,511,069 UART: [fht] FHT @ 0x50003400
3,521,262 UART: [idev] ++
3,521,834 UART: [idev] CDI.KEYID = 6
3,522,757 UART: [idev] SUBJECT.KEYID = 7
3,523,918 UART: [idev] UDS.KEYID = 0
3,546,066 UART: [idev] Erasing UDS.KEYID = 0
6,024,899 UART: [idev] Sha1 KeyId Algorithm
6,048,563 UART: [idev] --
6,051,694 UART: [ldev] ++
6,052,267 UART: [ldev] CDI.KEYID = 6
6,053,180 UART: [ldev] SUBJECT.KEYID = 5
6,054,400 UART: [ldev] AUTHORITY.KEYID = 7
6,055,635 UART: [ldev] FE.KEYID = 1
6,101,174 UART: [ldev] Erasing FE.KEYID = 1
8,606,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,583 UART: [ldev] --
10,416,429 UART: [fwproc] Wait for Commands...
10,419,543 UART: [fwproc] Recv command 0x46574c44
10,421,648 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,736 >>> mbox cmd response: success
14,285,488 UART: [afmc] ++
14,286,075 UART: [afmc] CDI.KEYID = 6
14,286,990 UART: [afmc] SUBJECT.KEYID = 7
14,288,209 UART: [afmc] AUTHORITY.KEYID = 5
16,814,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,845 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,684 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,567 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,619 UART: [afmc] --
18,611,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,755,879 UART: [cold-reset] --
18,756,737 UART: [state] Locking Datavault
18,757,889 UART: [state] Locking PCR0, PCR1 and PCR31
18,759,425 UART: [state] Locking ICCM
18,760,332 UART: [exit] Launching FMC @ 0x40000130
18,761,756 UART:
18,761,919 UART: Running Caliptra FMC ...
18,763,018 UART:
18,763,175 UART: [state] CFI Enabled
18,764,010 UART: [fht] FMC Alias Private Key: 7
20,459,474 UART: [art] Extend RT PCRs Done
20,460,697 UART: [art] Lock RT PCRs Done
20,462,429 UART: [art] Populate DV Done
20,467,946 UART: [fht] FMC Alias Private Key: 7
20,469,432 UART: [art] Derive CDI
20,470,170 UART: [art] Store in in slot 0x4
20,527,724 UART: [art] Derive Key Pair
20,528,763 UART: [art] Store priv key in slot 0x5
22,991,909 UART: [art] Derive Key Pair - Done
23,004,804 UART: [art] Signing Cert with AUTHO
23,006,114 UART: RITY.KEYID = 7
24,716,814 UART: [art] Erasing AUTHORITY.KEYID = 7
24,718,318 UART: [art] PUB.X = E8F5576E8338DDFEA41B682F632A644F5F3D8118666D8DEB6BA6B46386E1482EDC3B0748D0C97D57D60E2F3111A8CBB1
24,725,578 UART: [art] PUB.Y = 3B9A647A35830883AD6E77C462DE3EA6AA0563E17C928DEB50F62E545A0FB59179D9F70E00CC744C194797046809C392
24,732,827 UART: [art] SIG.R = 689B1E68DC4F6D390E5F9D1692309A11F16CED991DCB22D10B2190A6997FAF02612DEE2525E86276C4EA4BC58D766B49
24,740,217 UART: [art] SIG.S = 32D6619B2413ED91B40F412997DAC47EFA72F5FCB0C777AEE311DD09C92CF02AE1D16377539E7F2D2A6DE8D0CFD7CCBB
25,719,274 UART: Caliptra RT
25,719,975 UART: [state] CFI Enabled
25,885,751 UART: [rt] RT listening for mailbox commands...
25,888,771 UART:
25,889,020 UART: Running Caliptra ROM ...
25,890,050 UART:
25,890,202 UART: [state] CFI Enabled
25,955,672 UART: [state] LifecycleState = Unprovisioned
25,957,547 UART: [state] DebugLocked = No
25,959,796 UART: [state] WD Timer not started. Device not locked for debugging
25,963,909 UART: [kat] SHA2-256
26,143,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,154,556 UART: [kat] ++
26,155,090 UART: [kat] sha1
26,165,120 UART: [kat] SHA2-256
26,168,135 UART: [kat] SHA2-384
26,174,237 UART: [kat] SHA2-512-ACC
26,177,163 UART: [kat] ECC-384
28,636,572 UART: [kat] HMAC-384Kdf
28,658,893 UART: [kat] LMS
29,188,366 UART: [kat] --
29,192,672 UART: [update-reset] ++
32,614,454 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,617,132 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
33,000,403 >>> mbox cmd response: success
Initializing fuses
734 UART: [
1,231 UART: Running Caliptra ROM ...
2,339 UART:
2,492 UART: [state] CFI Enabled
76,922 UART: [state] LifecycleState = Unprovisioned
78,844 UART: [state] DebugLocked = No
81,562 UART: [state] WD Timer not started. Device not locked for debugging
85,294 UART: [kat] SHA2-256
264,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
276,009 UART: [kat] ++
276,459 UART: [kat] sha1
287,170 UART: [kat] SHA2-256
290,231 UART: [kat] SHA2-384
297,073 UART: [kat] SHA2-512-ACC
300,050 UART: [kat] ECC-384
2,758,395 UART: [kat] HMAC-384Kdf
2,783,316 UART: [kat] LMS
3,312,784 UART: [kat] --
3,317,853 UART: [warm-reset] ++
3,319,835 UART: [warm-reset] Prev Update Reset failed
3,322,874 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
5,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,070,575 >>> mbox cmd response: success
18,348,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,493,550 UART:
18,493,976 UART: Running Caliptra FMC ...
18,495,152 UART:
18,495,330 UART: [state] CFI Enabled
18,496,308 UART: [fht] FMC Alias Private Key: 7
20,195,648 UART: [art] Extend RT PCRs Done
20,197,117 UART: [art] Lock RT PCRs Done
20,198,466 UART: [art] Populate DV Done
20,203,844 UART: [fht] FMC Alias Private Key: 7
20,205,439 UART: [art] Derive CDI
20,206,181 UART: [art] Store in in slot 0x4
20,264,401 UART: [art] Derive Key Pair
20,265,444 UART: [art] Store priv key in slot 0x5
22,728,057 UART: [art] Derive Key Pair - Done
22,740,844 UART: [art] Signing Cert with AUTHO
22,742,158 UART: RITY.KEYID = 7
24,454,203 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,707 UART: [art] PUB.X = EAB8F86756071D72542034316DF85323C09BE679376CD50C29AA7C41CC6F581DB1C125482A05F306ED92E8F7ABB7BB15
24,462,967 UART: [art] PUB.Y = 1E284462F4958DB0EF32641CF7160B9D9C2D67F416939C1EBDDD8E2FBFAFB9B0147C5F01ABD55071D6D98A1AEB8EEE90
24,470,194 UART: [art] SIG.R = B2A89A46113432CD9901E01B13A8FEB372CFDA8D69C83FEF249F02730A1E506235A9BD6FEFC8BE4257B76751007A97B8
24,477,593 UART: [art] SIG.S = 78E61C729AB0F0A10F5B4877CD32FE0CA4DF49005FF3FD5D236FE7450A1487D5C8D6785242B53D53D227C888CD7B1BD3
25,456,577 UART: Caliptra RT
25,457,285 UART: [state] CFI Enabled
25,622,229 UART: [rt] RT listening for mailbox commands...
32,611,199 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
6,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
192,431 UART:
192,830 UART: Running Caliptra ROM ...
193,934 UART:
603,639 UART: [state] CFI Enabled
619,800 UART: [state] LifecycleState = Unprovisioned
621,681 UART: [state] DebugLocked = No
623,323 UART: [state] WD Timer not started. Device not locked for debugging
627,008 UART: [kat] SHA2-256
806,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,687 UART: [kat] ++
818,211 UART: [kat] sha1
829,790 UART: [kat] SHA2-256
832,779 UART: [kat] SHA2-384
837,948 UART: [kat] SHA2-512-ACC
840,891 UART: [kat] ECC-384
3,280,640 UART: [kat] HMAC-384Kdf
3,293,202 UART: [kat] LMS
3,822,716 UART: [kat] --
3,829,300 UART: [cold-reset] ++
3,830,960 UART: [fht] FHT @ 0x50003400
3,840,859 UART: [idev] ++
3,841,416 UART: [idev] CDI.KEYID = 6
3,842,291 UART: [idev] SUBJECT.KEYID = 7
3,843,505 UART: [idev] UDS.KEYID = 0
3,859,744 UART: [idev] Erasing UDS.KEYID = 0
6,319,861 UART: [idev] Sha1 KeyId Algorithm
6,342,485 UART: [idev] --
6,346,564 UART: [ldev] ++
6,347,134 UART: [ldev] CDI.KEYID = 6
6,348,016 UART: [ldev] SUBJECT.KEYID = 5
6,349,233 UART: [ldev] AUTHORITY.KEYID = 7
6,350,463 UART: [ldev] FE.KEYID = 1
6,359,273 UART: [ldev] Erasing FE.KEYID = 1
8,833,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,919 UART: [ldev] --
10,623,015 UART: [fwproc] Wait for Commands...
10,624,807 UART: [fwproc] Recv command 0x46574c44
10,626,900 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,495,120 >>> mbox cmd response: success
14,499,072 UART: [afmc] ++
14,499,658 UART: [afmc] CDI.KEYID = 6
14,500,542 UART: [afmc] SUBJECT.KEYID = 7
14,502,005 UART: [afmc] AUTHORITY.KEYID = 5
17,002,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,469 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,247 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,258 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,126 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,957 UART: [afmc] --
18,800,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,944,048 UART: [cold-reset] --
18,944,909 UART: [state] Locking Datavault
18,945,984 UART: [state] Locking PCR0, PCR1 and PCR31
18,947,520 UART: [state] Locking ICCM
18,948,399 UART: [exit] Launching FMC @ 0x40000130
18,949,739 UART:
18,949,886 UART: Running Caliptra FMC ...
18,950,977 UART:
18,951,134 UART: [state] CFI Enabled
18,952,000 UART: [fht] FMC Alias Private Key: 7
20,584,537 UART: [art] Extend RT PCRs Done
20,585,761 UART: [art] Lock RT PCRs Done
20,587,302 UART: [art] Populate DV Done
20,592,768 UART: [fht] FMC Alias Private Key: 7
20,594,327 UART: [art] Derive CDI
20,595,065 UART: [art] Store in in slot 0x4
20,638,196 UART: [art] Derive Key Pair
20,639,189 UART: [art] Store priv key in slot 0x5
23,066,118 UART: [art] Derive Key Pair - Done
23,079,113 UART: [art] Signing Cert with AUTHO
23,080,409 UART: RITY.KEYID = 7
24,785,947 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,453 UART: [art] PUB.X = D81634DFD75C2B913B54D0EEA3702405B274DF467BAEB062FFF2E4A4FAC4A0B131ECE438FFE5DDA1E0236AC2A0C899F5
24,794,745 UART: [art] PUB.Y = FCC9DFF592B926A2AA44EC23233F4378E904865317E05B83EED0F32796DEC4D2632FB6AA7BEEEF57A949E2178E1B4939
24,802,021 UART: [art] SIG.R = 180A6978C77EC8D8AE0E61C910AE00709E1339E2DDE6503C93EE147C62C6571F5A2E8F5868A2B0024245CAD2473069EB
24,809,359 UART: [art] SIG.S = 3858B13D7BCDF3F94CCFA8AC65D73E01C98BA155D6323497B87A400B58075B6CD7D28305D00EE20E36DB8DBEF25C880B
25,788,176 UART: Caliptra RT
25,788,871 UART: [state] CFI Enabled
25,905,169 UART: [rt] RT listening for mailbox commands...
25,907,962 UART:
25,908,231 UART: Running Caliptra ROM ...
25,909,333 UART:
25,909,543 UART: [state] CFI Enabled
25,923,692 UART: [state] LifecycleState = Unprovisioned
25,925,576 UART: [state] DebugLocked = No
25,927,649 UART: [state] WD Timer not started. Device not locked for debugging
25,932,080 UART: [kat] SHA2-256
26,111,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,122,827 UART: [kat] ++
26,123,366 UART: [kat] sha1
26,133,827 UART: [kat] SHA2-256
26,136,897 UART: [kat] SHA2-384
26,142,708 UART: [kat] SHA2-512-ACC
26,145,644 UART: [kat] ECC-384
28,586,980 UART: [kat] HMAC-384Kdf
28,598,830 UART: [kat] LMS
29,128,335 UART: [kat] --
29,132,803 UART: [update-reset] ++
32,557,891 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,560,947 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
32,944,273 >>> mbox cmd response: success
Initializing fuses
724 UART: [
1,196 UART: Running Caliptra ROM ...
2,242 UART:
7,626,044 UART: [state] CFI Enabled
7,640,466 UART: [state] LifecycleState = Unprovisioned
7,642,361 UART: [state] DebugLocked = No
7,644,346 UART: [state] WD Timer not started. Device not locked for debugging
7,647,868 UART: [kat] SHA2-256
7,826,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,838,551 UART: [kat] ++
7,839,114 UART: [kat] sha1
7,850,225 UART: [kat] SHA2-256
7,853,285 UART: [kat] SHA2-384
7,859,372 UART: [kat] SHA2-512-ACC
7,862,359 UART: [kat] ECC-384
10,300,847 UART: [kat] HMAC-384Kdf
10,313,822 UART: [kat] LMS
10,843,365 UART: [kat] --
10,847,728 UART: [warm-reset] ++
10,849,488 UART: [warm-reset] Prev Update Reset failed
10,853,281 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
6,493 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,605 >>> mbox cmd response: success
18,507,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,651,499 UART:
18,651,880 UART: Running Caliptra FMC ...
18,652,966 UART:
18,653,117 UART: [state] CFI Enabled
18,654,101 UART: [fht] FMC Alias Private Key: 7
20,287,511 UART: [art] Extend RT PCRs Done
20,288,741 UART: [art] Lock RT PCRs Done
20,290,447 UART: [art] Populate DV Done
20,296,032 UART: [fht] FMC Alias Private Key: 7
20,297,571 UART: [art] Derive CDI
20,298,304 UART: [art] Store in in slot 0x4
20,341,105 UART: [art] Derive Key Pair
20,342,179 UART: [art] Store priv key in slot 0x5
22,769,018 UART: [art] Derive Key Pair - Done
22,782,181 UART: [art] Signing Cert with AUTHO
22,783,480 UART: RITY.KEYID = 7
24,488,922 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,440 UART: [art] PUB.X = 52E34C823708B7A1FBC1837896CA2ED029D753CEE1EC7EFB60EFCA455057192344B676534A23011843C1AAD3423D6C9D
24,497,697 UART: [art] PUB.Y = A104DA792545372A2894707AC510819585AD816AA7CC15747E2F33B047063502DAD287F776CB2FB7335851593E95CCD9
24,504,923 UART: [art] SIG.R = 732962E20BC42B8B7CE1A469FADC0098011E17D9665DA6E518A241283767693278DFDAB2609EB0915566742F1E91AF15
24,512,280 UART: [art] SIG.S = BE830865D251D4A2826BA67D9AF3EFC198A5C7DEFB6FA27BB4815567891B651FCAC33C8BB6C6A2C8A2DB6AD8B3E94D34
25,491,261 UART: Caliptra RT
25,491,958 UART: [state] CFI Enabled
25,610,325 UART: [rt] RT listening for mailbox commands...
32,513,468 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
5,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,066,812 >>> mbox cmd response: success
18,332,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,476,840 UART:
18,477,227 UART: Running Caliptra FMC ...
18,478,406 UART:
18,478,579 UART: [state] CFI Enabled
18,479,558 UART: [fht] FMC Alias Private Key: 7
20,179,923 UART: [art] Extend RT PCRs Done
20,181,163 UART: [art] Lock RT PCRs Done
20,182,385 UART: [art] Populate DV Done
20,187,710 UART: [fht] FMC Alias Private Key: 7
20,189,310 UART: [art] Derive CDI
20,190,048 UART: [art] Store in in slot 0x4
20,248,596 UART: [art] Derive Key Pair
20,249,662 UART: [art] Store priv key in slot 0x5
22,712,707 UART: [art] Derive Key Pair - Done
22,725,609 UART: [art] Signing Cert with AUTHO
22,726,917 UART: RITY.KEYID = 7
24,438,461 UART: [art] Erasing AUTHORITY.KEYID = 7
24,439,988 UART: [art] PUB.X = D2CCCDF838B7C872A4B4506DA5B69CACF2BE58A7718B71C24883D394BB55C4254D1A3A608B43FAC347385A74C9863732
24,447,239 UART: [art] PUB.Y = F706F17BF723DFBD66727932CEB2F2E09DD50CE20533EF76CB7EA25BA3DC2FA80CF924A9F8B264981D257E77012FE01D
24,454,509 UART: [art] SIG.R = CB994EAA4ACFE6FA712053361A60775D241F284DC3E9916EDE3E2B6B37CD40B55FD79A0173FC1350D32648E30AA08E55
24,461,902 UART: [art] SIG.S = 274D003FEDE7DFCB5F137A9757C90F2E055F0A3DCAC667FC23249FE7A32BF8E9A83CF7DDCB2297ECB27509924A13BAAB
25,440,506 UART: Caliptra RT
25,441,212 UART: [state] CFI Enabled
25,606,845 UART: [rt] RT listening for mailbox commands...
32,583,767 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
6,384 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,214 >>> mbox cmd response: success
18,507,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,651,550 UART:
18,651,928 UART: Running Caliptra FMC ...
18,653,048 UART:
18,653,215 UART: [state] CFI Enabled
18,654,198 UART: [fht] FMC Alias Private Key: 7
20,290,069 UART: [art] Extend RT PCRs Done
20,291,307 UART: [art] Lock RT PCRs Done
20,293,069 UART: [art] Populate DV Done
20,298,452 UART: [fht] FMC Alias Private Key: 7
20,300,064 UART: [art] Derive CDI
20,300,882 UART: [art] Store in in slot 0x4
20,343,041 UART: [art] Derive Key Pair
20,344,040 UART: [art] Store priv key in slot 0x5
22,770,626 UART: [art] Derive Key Pair - Done
22,783,686 UART: [art] Signing Cert with AUTHO
22,784,992 UART: RITY.KEYID = 7
24,490,022 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,530 UART: [art] PUB.X = 7037E54F310F11BD0EED92F41F22DC4E130C6119DD3EAC8C98A21D7912A199630B3E8A1774B0BE56904C9CB98967E9D8
24,498,806 UART: [art] PUB.Y = DDFB727E42F4E88F70B9550CE6D0E2D01BB0F5D830E96909A1FC097552720874B4FEFB188FA77F1A16C4BCCDBFA88E50
24,506,086 UART: [art] SIG.R = 9E86725F58A22216F182A9FBDF7251BE62440278BC93E3885645D786041F383601FB233A8CF34752259883821594AF6F
24,513,449 UART: [art] SIG.S = 135475BAAAF1076D4991763C51A1AF9BC404D102E48E29E7ABE85015CA1E9AFA3DB50D313CC709C41CBC1FACD7769B79
25,492,299 UART: Caliptra RT
25,492,999 UART: [state] CFI Enabled
25,610,167 UART: [rt] RT listening for mailbox commands...
32,510,590 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [kat] SHA2-256
891,586 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,715 UART: [kat] ++
895,867 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,476 UART: [kat] HMAC-384Kdf
920,882 UART: [kat] LMS
1,169,194 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,595 UART: [fht] FHT @ 0x50003400
1,173,469 UART: [idev] ++
1,173,637 UART: [idev] CDI.KEYID = 6
1,173,998 UART: [idev] SUBJECT.KEYID = 7
1,174,423 UART: [idev] UDS.KEYID = 0
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,199,049 UART: [idev] Sha1 KeyId Algorithm
1,207,913 UART: [idev] --
1,208,824 UART: [ldev] ++
1,208,992 UART: [ldev] CDI.KEYID = 6
1,209,356 UART: [ldev] SUBJECT.KEYID = 5
1,209,783 UART: [ldev] AUTHORITY.KEYID = 7
1,210,246 UART: [ldev] FE.KEYID = 1
1,215,556 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,922 UART: [ldev] --
1,280,340 UART: [fwproc] Wait for Commands...
1,280,989 UART: [fwproc] Recv command 0x46574c44
1,281,722 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,624 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,508 >>> mbox cmd response: success
2,775,589 UART: [afmc] ++
2,775,757 UART: [afmc] CDI.KEYID = 6
2,776,120 UART: [afmc] SUBJECT.KEYID = 7
2,776,546 UART: [afmc] AUTHORITY.KEYID = 5
2,812,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,360 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,089 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,972 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,691 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,728 UART: [afmc] --
2,855,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,855,606 UART: [cold-reset] --
2,856,356 UART: [state] Locking Datavault
2,857,519 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,123 UART: [state] Locking ICCM
2,858,571 UART: [exit] Launching FMC @ 0x40000130
2,863,900 UART:
2,863,916 UART: Running Caliptra FMC ...
2,864,324 UART:
2,864,378 UART: [state] CFI Enabled
2,874,415 UART: [fht] FMC Alias Private Key: 7
2,982,246 UART: [art] Extend RT PCRs Done
2,982,674 UART: [art] Lock RT PCRs Done
2,984,136 UART: [art] Populate DV Done
2,992,537 UART: [fht] FMC Alias Private Key: 7
2,993,607 UART: [art] Derive CDI
2,993,887 UART: [art] Store in in slot 0x4
3,079,752 UART: [art] Derive Key Pair
3,080,112 UART: [art] Store priv key in slot 0x5
3,093,296 UART: [art] Derive Key Pair - Done
3,108,206 UART: [art] Signing Cert with AUTHO
3,108,686 UART: RITY.KEYID = 7
3,123,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,611 UART: [art] PUB.X = 7D8196699301BD76B47BFB058180EA6FC5BF4B9E12FF74B3D8185EFD4B62D28EF123AF01AFBC2A5908503F59828D4ADC
3,131,383 UART: [art] PUB.Y = 042B6B97DE35864A89E4ABCAE204E66DB59A95802EE4437B0F7CE81C3C133F286CB0FBAB01FDA8FE42645F93281E1440
3,138,333 UART: [art] SIG.R = 460C631357221B86BE6FE12497E944AE59CCE70DF92B1CA899419A05E8F1E1238A83375CFBE6C473FB20DC8EADDB8040
3,145,104 UART: [art] SIG.S = 49D3DA12081AB2EE42CF07DDF1573A92C33797C65B42521EEBA7CDBDBBAF5AC3992E3DEEF194833574E359639EECCC49
3,169,005 UART: Caliptra RT
3,169,258 UART: [state] CFI Enabled
3,277,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,413 UART:
3,279,429 UART: Running Caliptra ROM ...
3,279,837 UART:
3,279,892 UART: [state] CFI Enabled
3,282,288 UART: [state] LifecycleState = Unprovisioned
3,282,943 UART: [state] DebugLocked = No
3,283,529 UART: [state] WD Timer not started. Device not locked for debugging
3,284,725 UART: [kat] SHA2-256
4,088,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,404 UART: [kat] ++
4,092,556 UART: [kat] sha1
4,096,900 UART: [kat] SHA2-256
4,098,840 UART: [kat] SHA2-384
4,101,611 UART: [kat] SHA2-512-ACC
4,103,511 UART: [kat] ECC-384
4,113,496 UART: [kat] HMAC-384Kdf
4,118,184 UART: [kat] LMS
4,366,496 UART: [kat] --
4,367,538 UART: [update-reset] ++
5,681,078 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,682,077 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,832,075 >>> mbox cmd response: success
Initializing fuses
5,832,319 UART:
5,832,335 UART: Running Caliptra ROM ...
5,832,743 UART:
5,832,798 UART: [state] CFI Enabled
5,835,466 UART: [state] LifecycleState = Unprovisioned
5,836,121 UART: [state] DebugLocked = No
5,836,777 UART: [state] WD Timer not started. Device not locked for debugging
5,838,124 UART: [kat] SHA2-256
6,641,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,645,803 UART: [kat] ++
6,645,955 UART: [kat] sha1
6,650,127 UART: [kat] SHA2-256
6,652,067 UART: [kat] SHA2-384
6,654,966 UART: [kat] SHA2-512-ACC
6,656,867 UART: [kat] ECC-384
6,666,606 UART: [kat] HMAC-384Kdf
6,671,112 UART: [kat] LMS
6,919,424 UART: [kat] --
6,920,124 UART: [warm-reset] ++
6,920,677 UART: [warm-reset] Prev Update Reset failed
6,921,704 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,292 >>> mbox cmd response: success
2,676,993 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,683,270 UART:
2,683,286 UART: Running Caliptra FMC ...
2,683,694 UART:
2,683,748 UART: [state] CFI Enabled
2,694,083 UART: [fht] FMC Alias Private Key: 7
2,801,820 UART: [art] Extend RT PCRs Done
2,802,248 UART: [art] Lock RT PCRs Done
2,803,906 UART: [art] Populate DV Done
2,811,933 UART: [fht] FMC Alias Private Key: 7
2,812,973 UART: [art] Derive CDI
2,813,253 UART: [art] Store in in slot 0x4
2,898,748 UART: [art] Derive Key Pair
2,899,108 UART: [art] Store priv key in slot 0x5
2,911,978 UART: [art] Derive Key Pair - Done
2,926,715 UART: [art] Signing Cert with AUTHO
2,927,195 UART: RITY.KEYID = 7
2,942,473 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,238 UART: [art] PUB.X = 09B7A6B8320608E5BE8140E6064C0C56ABC3665791603BB914D8AB45AE607D94570C9EB517D3339ABBDDD646AB2C2648
2,949,994 UART: [art] PUB.Y = 528E046152AA49A0CAD11B723961EA22FF2BAAE780E1C53E4ACAFDC63ADEADCE66ADFC47D22EDFB6DF1071C905184667
2,956,964 UART: [art] SIG.R = 14130EF89C6640E2C263F56801B8BDB4AD8551CAD316119FDBE3253714D46519EE631A6074C7933CDF6C99219D7F1577
2,963,726 UART: [art] SIG.S = 00927233C8CFDAE4844B76CAF4C53F9C3D8BDE9DCB50451A6CC9F398CEE4B4EF0B290C0F47995A9A4FFAC7BD71ACF7CD
2,987,550 UART: Caliptra RT
2,987,803 UART: [state] CFI Enabled
3,096,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,532,118 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,475 UART: [kat] HMAC-384Kdf
921,157 UART: [kat] LMS
1,169,469 UART: [kat] --
1,170,282 UART: [cold-reset] ++
1,170,812 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,182,290 UART: [idev] Erasing UDS.KEYID = 0
1,199,094 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,209,097 UART: [ldev] ++
1,209,265 UART: [ldev] CDI.KEYID = 6
1,209,629 UART: [ldev] SUBJECT.KEYID = 5
1,210,056 UART: [ldev] AUTHORITY.KEYID = 7
1,210,519 UART: [ldev] FE.KEYID = 1
1,215,721 UART: [ldev] Erasing FE.KEYID = 1
1,242,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,903 UART: [fwproc] Wait for Commands...
1,282,698 UART: [fwproc] Recv command 0x46574c44
1,283,431 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,091 >>> mbox cmd response: success
2,775,190 UART: [afmc] ++
2,775,358 UART: [afmc] CDI.KEYID = 6
2,775,721 UART: [afmc] SUBJECT.KEYID = 7
2,776,147 UART: [afmc] AUTHORITY.KEYID = 5
2,811,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,472 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,223 UART: [afmc] --
2,855,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,855,267 UART: [cold-reset] --
2,856,061 UART: [state] Locking Datavault
2,856,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,532 UART: [state] Locking ICCM
2,858,000 UART: [exit] Launching FMC @ 0x40000130
2,863,329 UART:
2,863,345 UART: Running Caliptra FMC ...
2,863,753 UART:
2,863,896 UART: [state] CFI Enabled
2,874,573 UART: [fht] FMC Alias Private Key: 7
2,982,956 UART: [art] Extend RT PCRs Done
2,983,384 UART: [art] Lock RT PCRs Done
2,985,038 UART: [art] Populate DV Done
2,993,325 UART: [fht] FMC Alias Private Key: 7
2,994,489 UART: [art] Derive CDI
2,994,769 UART: [art] Store in in slot 0x4
3,080,260 UART: [art] Derive Key Pair
3,080,620 UART: [art] Store priv key in slot 0x5
3,093,776 UART: [art] Derive Key Pair - Done
3,108,184 UART: [art] Signing Cert with AUTHO
3,108,664 UART: RITY.KEYID = 7
3,123,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,437 UART: [art] PUB.X = 747F970FBA529A541DE884D296E1D5B59ED1EADFE681F2811114A7DC456873737F6F81C7C3067025B178B3C6E2EDA909
3,131,202 UART: [art] PUB.Y = CB98109B8C8448AAAE60DEC89CDFCA8B090B3DC2D21DE4F56D54D2020240EDCAE3E07364B8E4F45783E0C2C95B127948
3,138,156 UART: [art] SIG.R = 7462268F9D744E7F2A0759063B7D180C77CD771005883068A58CA667ED40C20A96568FE410BFCCCB8524CE96C804D9FD
3,144,908 UART: [art] SIG.S = 6114A2618265CEF9FD38D301CBDC801C6C3C0EB11CA087036AEC84742088F2235863ED0FB040862C6C8FED0F7BD18D0A
3,169,119 UART: Caliptra RT
3,169,464 UART: [state] CFI Enabled
3,277,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,957 UART:
3,278,973 UART: Running Caliptra ROM ...
3,279,381 UART:
3,279,523 UART: [state] CFI Enabled
3,282,365 UART: [state] LifecycleState = Unprovisioned
3,283,020 UART: [state] DebugLocked = No
3,283,684 UART: [state] WD Timer not started. Device not locked for debugging
3,284,820 UART: [kat] SHA2-256
4,088,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,499 UART: [kat] ++
4,092,651 UART: [kat] sha1
4,096,811 UART: [kat] SHA2-256
4,098,751 UART: [kat] SHA2-384
4,101,452 UART: [kat] SHA2-512-ACC
4,103,352 UART: [kat] ECC-384
4,112,969 UART: [kat] HMAC-384Kdf
4,117,415 UART: [kat] LMS
4,365,727 UART: [kat] --
4,366,665 UART: [update-reset] ++
5,679,707 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,846 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,830,844 >>> mbox cmd response: success
Initializing fuses
5,831,238 UART:
5,831,254 UART: Running Caliptra ROM ...
5,831,662 UART:
5,831,804 UART: [state] CFI Enabled
5,834,496 UART: [state] LifecycleState = Unprovisioned
5,835,151 UART: [state] DebugLocked = No
5,835,759 UART: [state] WD Timer not started. Device not locked for debugging
5,837,116 UART: [kat] SHA2-256
6,640,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,644,795 UART: [kat] ++
6,644,947 UART: [kat] sha1
6,649,247 UART: [kat] SHA2-256
6,651,187 UART: [kat] SHA2-384
6,653,986 UART: [kat] SHA2-512-ACC
6,655,887 UART: [kat] ECC-384
6,665,882 UART: [kat] HMAC-384Kdf
6,670,722 UART: [kat] LMS
6,919,034 UART: [kat] --
6,920,004 UART: [warm-reset] ++
6,920,501 UART: [warm-reset] Prev Update Reset failed
6,921,544 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,479 >>> mbox cmd response: success
2,679,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,685,989 UART:
2,686,005 UART: Running Caliptra FMC ...
2,686,413 UART:
2,686,556 UART: [state] CFI Enabled
2,697,157 UART: [fht] FMC Alias Private Key: 7
2,804,818 UART: [art] Extend RT PCRs Done
2,805,246 UART: [art] Lock RT PCRs Done
2,806,570 UART: [art] Populate DV Done
2,814,703 UART: [fht] FMC Alias Private Key: 7
2,815,707 UART: [art] Derive CDI
2,815,987 UART: [art] Store in in slot 0x4
2,901,842 UART: [art] Derive Key Pair
2,902,202 UART: [art] Store priv key in slot 0x5
2,915,024 UART: [art] Derive Key Pair - Done
2,930,035 UART: [art] Signing Cert with AUTHO
2,930,515 UART: RITY.KEYID = 7
2,946,015 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,780 UART: [art] PUB.X = 89A7810766C4942FF8B24AF33F8B5C70E5200AC6DC3F1AA00A1EB8F959E3E3BD05AEB9A84A1CCEB4FF333065F716AB01
2,953,553 UART: [art] PUB.Y = EDB5642BF38F66584BD85ECC8CEDDD52EA06ECD27A6CBA1DD67BDF0FAB98205DAA38FB7934E998E3DACE0ACC11E251F6
2,960,530 UART: [art] SIG.R = 65B3C40ED3E16E519E9E19D3ED28311802B7DD436E7FFB29B93991AFCD47AF87100F782706DED6AA037352D213F590E7
2,967,291 UART: [art] SIG.S = D34434E8752B3DE1C88C02ED5F417E64B0929F8F09994018768CCB8D45A350C76DB97CB5D53F2ECCE4576CAF7C40652E
2,991,334 UART: Caliptra RT
2,991,679 UART: [state] CFI Enabled
3,099,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,535,968 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
891,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,296 UART: [kat] LMS
1,168,608 UART: [kat] --
1,169,249 UART: [cold-reset] ++
1,169,773 UART: [fht] FHT @ 0x50003400
1,172,343 UART: [idev] ++
1,172,511 UART: [idev] CDI.KEYID = 6
1,172,872 UART: [idev] SUBJECT.KEYID = 7
1,173,297 UART: [idev] UDS.KEYID = 0
1,181,141 UART: [idev] Erasing UDS.KEYID = 0
1,197,733 UART: [idev] Sha1 KeyId Algorithm
1,206,551 UART: [idev] --
1,207,630 UART: [ldev] ++
1,207,798 UART: [ldev] CDI.KEYID = 6
1,208,162 UART: [ldev] SUBJECT.KEYID = 5
1,208,589 UART: [ldev] AUTHORITY.KEYID = 7
1,209,052 UART: [ldev] FE.KEYID = 1
1,214,380 UART: [ldev] Erasing FE.KEYID = 1
1,241,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,652 UART: [ldev] --
1,279,956 UART: [fwproc] Wait for Commands...
1,280,775 UART: [fwproc] Recv command 0x46574c44
1,281,508 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,522 >>> mbox cmd response: success
2,773,625 UART: [afmc] ++
2,773,793 UART: [afmc] CDI.KEYID = 6
2,774,156 UART: [afmc] SUBJECT.KEYID = 7
2,774,582 UART: [afmc] AUTHORITY.KEYID = 5
2,809,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,535 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,137 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,022 UART: [afmc] --
2,853,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,853,072 UART: [cold-reset] --
2,853,894 UART: [state] Locking Datavault
2,855,145 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,749 UART: [state] Locking ICCM
2,856,253 UART: [exit] Launching FMC @ 0x40000130
2,861,582 UART:
2,861,598 UART: Running Caliptra FMC ...
2,862,006 UART:
2,862,060 UART: [state] CFI Enabled
2,872,479 UART: [fht] FMC Alias Private Key: 7
2,980,362 UART: [art] Extend RT PCRs Done
2,980,790 UART: [art] Lock RT PCRs Done
2,982,168 UART: [art] Populate DV Done
2,990,219 UART: [fht] FMC Alias Private Key: 7
2,991,279 UART: [art] Derive CDI
2,991,559 UART: [art] Store in in slot 0x4
3,077,138 UART: [art] Derive Key Pair
3,077,498 UART: [art] Store priv key in slot 0x5
3,089,952 UART: [art] Derive Key Pair - Done
3,104,630 UART: [art] Signing Cert with AUTHO
3,105,110 UART: RITY.KEYID = 7
3,120,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,163 UART: [art] PUB.X = 7C9C75E01DF60FFB9E56343FC80C59911B5F1CAFECBCCB6D3843F18A47CF69B2F1EEEAD08A6EFA01DB29CE9AA06F4B25
3,127,956 UART: [art] PUB.Y = E08CC77A9BB34732B7E95C5C5F4AE5779E40ED36264C84E246F8F9FCDFDE3C6D6260A01C0BBF6E6621D2A5C23AD6CE00
3,134,901 UART: [art] SIG.R = 2D250E7EE015CBD065BFFED0052D934CC2F9A29AF50074C79728C712FF8F011116B7FBE3C0D992BCC263333A8D4BDD21
3,141,654 UART: [art] SIG.S = 6715F38C08BAFFA284130EC5293AEECDE99DA24555C3E392E0F68928F12BCF06D0F54F342FEED8DAB43CCD54E9A23957
3,166,152 UART: Caliptra RT
3,166,405 UART: [state] CFI Enabled
3,274,892 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,798 UART:
3,276,814 UART: Running Caliptra ROM ...
3,277,222 UART:
3,277,277 UART: [state] CFI Enabled
3,280,315 UART: [state] LifecycleState = Unprovisioned
3,280,970 UART: [state] DebugLocked = No
3,281,538 UART: [state] WD Timer not started. Device not locked for debugging
3,282,760 UART: [kat] SHA2-256
4,086,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,439 UART: [kat] ++
4,090,591 UART: [kat] sha1
4,094,743 UART: [kat] SHA2-256
4,096,683 UART: [kat] SHA2-384
4,099,220 UART: [kat] SHA2-512-ACC
4,101,120 UART: [kat] ECC-384
4,111,391 UART: [kat] HMAC-384Kdf
4,115,889 UART: [kat] LMS
4,364,201 UART: [kat] --
4,365,163 UART: [update-reset] ++
5,679,201 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,274 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,830,272 >>> mbox cmd response: success
Initializing fuses
5,830,660 UART:
5,830,676 UART: Running Caliptra ROM ...
5,831,084 UART:
5,831,139 UART: [state] CFI Enabled
5,833,507 UART: [state] LifecycleState = Unprovisioned
5,834,162 UART: [state] DebugLocked = No
5,834,816 UART: [state] WD Timer not started. Device not locked for debugging
5,836,009 UART: [kat] SHA2-256
6,639,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,643,688 UART: [kat] ++
6,643,840 UART: [kat] sha1
6,648,150 UART: [kat] SHA2-256
6,650,090 UART: [kat] SHA2-384
6,652,837 UART: [kat] SHA2-512-ACC
6,654,738 UART: [kat] ECC-384
6,664,213 UART: [kat] HMAC-384Kdf
6,668,905 UART: [kat] LMS
6,917,217 UART: [kat] --
6,917,947 UART: [warm-reset] ++
6,918,484 UART: [warm-reset] Prev Update Reset failed
6,919,635 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,288 >>> mbox cmd response: success
2,680,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,686,092 UART:
2,686,108 UART: Running Caliptra FMC ...
2,686,516 UART:
2,686,570 UART: [state] CFI Enabled
2,697,247 UART: [fht] FMC Alias Private Key: 7
2,805,312 UART: [art] Extend RT PCRs Done
2,805,740 UART: [art] Lock RT PCRs Done
2,807,498 UART: [art] Populate DV Done
2,815,795 UART: [fht] FMC Alias Private Key: 7
2,816,965 UART: [art] Derive CDI
2,817,245 UART: [art] Store in in slot 0x4
2,902,808 UART: [art] Derive Key Pair
2,903,168 UART: [art] Store priv key in slot 0x5
2,916,188 UART: [art] Derive Key Pair - Done
2,931,012 UART: [art] Signing Cert with AUTHO
2,931,492 UART: RITY.KEYID = 7
2,947,184 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,949 UART: [art] PUB.X = 9E1CE3AA8CA6E3825298C45A4EA4CC3516A99F96EFC67B335B7046F1404F72A245E1C3FC74CE368208D156B2AAAA9E80
2,954,728 UART: [art] PUB.Y = 800628877158832B4E72999F23F5F31AF46631DD7A74A04061B8B6993CB43C169F845D004FD01100B497D6CE9618C2B4
2,961,621 UART: [art] SIG.R = 137C9A7A91CF039E28E104FBDB0A241CD5C896C295E1463FB9F6D58FDD1F655CF89C2A7BC2D892835068DA121C275DF7
2,968,394 UART: [art] SIG.S = AEB3FE236B7592A7EABA2ADE79ACD30B879AA92728D6243A6AB9AD03EDB1D4B00BAD87589DA6AD76303557B272692524
2,991,890 UART: Caliptra RT
2,992,143 UART: [state] CFI Enabled
3,099,128 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,534,931 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
891,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,918 UART: [kat] ++
896,070 UART: [kat] sha1
900,238 UART: [kat] SHA2-256
902,178 UART: [kat] SHA2-384
905,071 UART: [kat] SHA2-512-ACC
906,972 UART: [kat] ECC-384
917,135 UART: [kat] HMAC-384Kdf
921,803 UART: [kat] LMS
1,170,115 UART: [kat] --
1,171,084 UART: [cold-reset] ++
1,171,482 UART: [fht] FHT @ 0x50003400
1,174,318 UART: [idev] ++
1,174,486 UART: [idev] CDI.KEYID = 6
1,174,847 UART: [idev] SUBJECT.KEYID = 7
1,175,272 UART: [idev] UDS.KEYID = 0
1,183,364 UART: [idev] Erasing UDS.KEYID = 0
1,200,400 UART: [idev] Sha1 KeyId Algorithm
1,209,256 UART: [idev] --
1,210,375 UART: [ldev] ++
1,210,543 UART: [ldev] CDI.KEYID = 6
1,210,907 UART: [ldev] SUBJECT.KEYID = 5
1,211,334 UART: [ldev] AUTHORITY.KEYID = 7
1,211,797 UART: [ldev] FE.KEYID = 1
1,216,951 UART: [ldev] Erasing FE.KEYID = 1
1,243,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,245 UART: [ldev] --
1,282,589 UART: [fwproc] Wait for Commands...
1,283,278 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,779 >>> mbox cmd response: success
2,775,944 UART: [afmc] ++
2,776,112 UART: [afmc] CDI.KEYID = 6
2,776,475 UART: [afmc] SUBJECT.KEYID = 7
2,776,901 UART: [afmc] AUTHORITY.KEYID = 5
2,813,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,443 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,055 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,774 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,529 UART: [afmc] --
2,856,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,856,489 UART: [cold-reset] --
2,857,153 UART: [state] Locking Datavault
2,858,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,894 UART: [state] Locking ICCM
2,859,428 UART: [exit] Launching FMC @ 0x40000130
2,864,757 UART:
2,864,773 UART: Running Caliptra FMC ...
2,865,181 UART:
2,865,324 UART: [state] CFI Enabled
2,876,077 UART: [fht] FMC Alias Private Key: 7
2,984,450 UART: [art] Extend RT PCRs Done
2,984,878 UART: [art] Lock RT PCRs Done
2,986,264 UART: [art] Populate DV Done
2,994,137 UART: [fht] FMC Alias Private Key: 7
2,995,065 UART: [art] Derive CDI
2,995,345 UART: [art] Store in in slot 0x4
3,080,944 UART: [art] Derive Key Pair
3,081,304 UART: [art] Store priv key in slot 0x5
3,094,512 UART: [art] Derive Key Pair - Done
3,109,404 UART: [art] Signing Cert with AUTHO
3,109,884 UART: RITY.KEYID = 7
3,124,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,705 UART: [art] PUB.X = 8F974E26194B3E4510D199D08D952156BFD4D1236851359F6663877B3725CE403FFD7D339A91E6661E5D8C5257EFC4EC
3,132,471 UART: [art] PUB.Y = 9DC47DFBE9BDBC7C314E3C53809B11A8F6C696142FB697EE6B29AC50E2534E9D179D139EBBFA63747A81E9B2CBBAF16E
3,139,443 UART: [art] SIG.R = 64DE6CDEAB207E8386EED885226F63EC3B160DF8E9EF778C0B78298C1D35169CBD0BC6AA96A49166B179BA6F27518AD5
3,146,218 UART: [art] SIG.S = 6047A9FFC55449B1228EFE3F399D7CB32FE0E145F60A8453201F98A194A7822BF6C052AD303EAFAF95AED99B40C32892
3,169,964 UART: Caliptra RT
3,170,309 UART: [state] CFI Enabled
3,279,218 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,146 UART:
3,281,162 UART: Running Caliptra ROM ...
3,281,570 UART:
3,281,712 UART: [state] CFI Enabled
3,284,070 UART: [state] LifecycleState = Unprovisioned
3,284,725 UART: [state] DebugLocked = No
3,285,377 UART: [state] WD Timer not started. Device not locked for debugging
3,286,519 UART: [kat] SHA2-256
4,090,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,094,198 UART: [kat] ++
4,094,350 UART: [kat] sha1
4,098,610 UART: [kat] SHA2-256
4,100,550 UART: [kat] SHA2-384
4,103,283 UART: [kat] SHA2-512-ACC
4,105,183 UART: [kat] ECC-384
4,114,634 UART: [kat] HMAC-384Kdf
4,119,304 UART: [kat] LMS
4,367,616 UART: [kat] --
4,368,470 UART: [update-reset] ++
5,681,434 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,682,523 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,832,521 >>> mbox cmd response: success
Initializing fuses
5,832,797 UART:
5,832,813 UART: Running Caliptra ROM ...
5,833,221 UART:
5,833,363 UART: [state] CFI Enabled
5,836,271 UART: [state] LifecycleState = Unprovisioned
5,836,926 UART: [state] DebugLocked = No
5,837,510 UART: [state] WD Timer not started. Device not locked for debugging
5,838,775 UART: [kat] SHA2-256
6,642,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,646,454 UART: [kat] ++
6,646,606 UART: [kat] sha1
6,650,842 UART: [kat] SHA2-256
6,652,782 UART: [kat] SHA2-384
6,655,677 UART: [kat] SHA2-512-ACC
6,657,578 UART: [kat] ECC-384
6,667,457 UART: [kat] HMAC-384Kdf
6,672,205 UART: [kat] LMS
6,920,517 UART: [kat] --
6,921,395 UART: [warm-reset] ++
6,921,768 UART: [warm-reset] Prev Update Reset failed
6,922,825 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,907 >>> mbox cmd response: success
2,681,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,687,447 UART:
2,687,463 UART: Running Caliptra FMC ...
2,687,871 UART:
2,688,014 UART: [state] CFI Enabled
2,698,703 UART: [fht] FMC Alias Private Key: 7
2,806,666 UART: [art] Extend RT PCRs Done
2,807,094 UART: [art] Lock RT PCRs Done
2,808,846 UART: [art] Populate DV Done
2,817,041 UART: [fht] FMC Alias Private Key: 7
2,817,979 UART: [art] Derive CDI
2,818,259 UART: [art] Store in in slot 0x4
2,903,590 UART: [art] Derive Key Pair
2,903,950 UART: [art] Store priv key in slot 0x5
2,917,206 UART: [art] Derive Key Pair - Done
2,931,837 UART: [art] Signing Cert with AUTHO
2,932,317 UART: RITY.KEYID = 7
2,947,533 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,298 UART: [art] PUB.X = F6BA391BE0A36173F38833136CDDBA5F65ECB0F90A0C4DF3884AC4C4FFC07089CBF2B6D1084235F41021AA3E66417864
2,955,069 UART: [art] PUB.Y = DDAFAD5E13039AFB79955255972ECFDBBF782A28CD458B85F6B4CFA8754B49832DFCEECF26AC6EFD063CBA6AEBF7BCC7
2,962,049 UART: [art] SIG.R = 20E497D536A4857859EA44BF3557487C882551D2060E4B5713325E386A5501F9AFF0476EF0F6ACE76E8EB2AAD68E3A0A
2,968,809 UART: [art] SIG.S = 9D875AB0866658E52BE4E72AA192CA4DB2C39550E68EBB218F10CF50483038FA60E4D7584EEB89CEFF612514AC20B11A
2,992,720 UART: Caliptra RT
2,993,065 UART: [state] CFI Enabled
3,100,502 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,536,490 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,734 UART: [kat] HMAC-384Kdf
920,310 UART: [kat] LMS
1,168,622 UART: [kat] --
1,169,277 UART: [cold-reset] ++
1,169,805 UART: [fht] FHT @ 0x50003400
1,172,513 UART: [idev] ++
1,172,681 UART: [idev] CDI.KEYID = 6
1,173,042 UART: [idev] SUBJECT.KEYID = 7
1,173,467 UART: [idev] UDS.KEYID = 0
1,181,445 UART: [idev] Erasing UDS.KEYID = 0
1,198,131 UART: [idev] Sha1 KeyId Algorithm
1,206,917 UART: [idev] --
1,208,110 UART: [ldev] ++
1,208,278 UART: [ldev] CDI.KEYID = 6
1,208,642 UART: [ldev] SUBJECT.KEYID = 5
1,209,069 UART: [ldev] AUTHORITY.KEYID = 7
1,209,532 UART: [ldev] FE.KEYID = 1
1,214,486 UART: [ldev] Erasing FE.KEYID = 1
1,239,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,828 UART: [ldev] --
1,279,186 UART: [fwproc] Wait for Commands...
1,279,793 UART: [fwproc] Recv command 0x46574c44
1,280,526 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,380 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,500 >>> mbox cmd response: success
2,773,689 UART: [afmc] ++
2,773,857 UART: [afmc] CDI.KEYID = 6
2,774,220 UART: [afmc] SUBJECT.KEYID = 7
2,774,646 UART: [afmc] AUTHORITY.KEYID = 5
2,810,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,270 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,882 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,601 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,274 UART: [afmc] --
2,853,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,853,326 UART: [cold-reset] --
2,854,110 UART: [state] Locking Datavault
2,855,243 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,847 UART: [state] Locking ICCM
2,856,327 UART: [exit] Launching FMC @ 0x40000130
2,861,656 UART:
2,861,672 UART: Running Caliptra FMC ...
2,862,080 UART:
2,862,134 UART: [state] CFI Enabled
2,872,659 UART: [fht] FMC Alias Private Key: 7
2,981,060 UART: [art] Extend RT PCRs Done
2,981,488 UART: [art] Lock RT PCRs Done
2,983,190 UART: [art] Populate DV Done
2,991,399 UART: [fht] FMC Alias Private Key: 7
2,992,481 UART: [art] Derive CDI
2,992,761 UART: [art] Store in in slot 0x4
3,077,890 UART: [art] Derive Key Pair
3,078,250 UART: [art] Store priv key in slot 0x5
3,091,954 UART: [art] Derive Key Pair - Done
3,106,439 UART: [art] Signing Cert with AUTHO
3,106,919 UART: RITY.KEYID = 7
3,122,085 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,850 UART: [art] PUB.X = 399DE6D2831C0D94C0B887BF5BF6F56DF75ABDBC2805F9006F4F5A944A130C44BEF21702F73814BC2CF8D81F8FF22A51
3,129,600 UART: [art] PUB.Y = C7CBAEE3BC5E4EC567E47F03C65DD225CD0A1981FE1E5D28D8599C6614D21704980C4A5BC03CCADB6631E6F5A4AB4C16
3,136,558 UART: [art] SIG.R = 70355D4D21AAF6EE5B20B7ACDF223770C55EDCE41787C1BDB50926C0A9B4D17CD3A14EE86D135461E255FED7B0098867
3,143,334 UART: [art] SIG.S = 51CE4C12EEE140C66A7B8F80666FA093282F82F04A106817D9B2944BBAA4FC8EA7905E5F94AF86D804CF5E6C4E191A80
3,167,440 UART: Caliptra RT
3,167,693 UART: [state] CFI Enabled
3,275,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,110 UART:
3,277,126 UART: Running Caliptra ROM ...
3,277,534 UART:
3,277,589 UART: [state] CFI Enabled
3,280,401 UART: [state] LifecycleState = Unprovisioned
3,281,056 UART: [state] DebugLocked = No
3,281,540 UART: [state] WD Timer not started. Device not locked for debugging
3,282,714 UART: [kat] SHA2-256
4,086,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,393 UART: [kat] ++
4,090,545 UART: [kat] sha1
4,094,889 UART: [kat] SHA2-256
4,096,829 UART: [kat] SHA2-384
4,099,724 UART: [kat] SHA2-512-ACC
4,101,624 UART: [kat] ECC-384
4,111,661 UART: [kat] HMAC-384Kdf
4,116,301 UART: [kat] LMS
4,364,613 UART: [kat] --
4,365,709 UART: [update-reset] ++
5,680,337 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,681,550 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,831,548 >>> mbox cmd response: success
Initializing fuses
5,831,732 UART:
5,831,748 UART: Running Caliptra ROM ...
5,832,156 UART:
5,832,211 UART: [state] CFI Enabled
5,835,019 UART: [state] LifecycleState = Unprovisioned
5,835,674 UART: [state] DebugLocked = No
5,836,366 UART: [state] WD Timer not started. Device not locked for debugging
5,837,511 UART: [kat] SHA2-256
6,641,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,645,190 UART: [kat] ++
6,645,342 UART: [kat] sha1
6,649,530 UART: [kat] SHA2-256
6,651,470 UART: [kat] SHA2-384
6,654,119 UART: [kat] SHA2-512-ACC
6,656,020 UART: [kat] ECC-384
6,665,767 UART: [kat] HMAC-384Kdf
6,670,195 UART: [kat] LMS
6,918,507 UART: [kat] --
6,919,439 UART: [warm-reset] ++
6,920,082 UART: [warm-reset] Prev Update Reset failed
6,921,043 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,242 >>> mbox cmd response: success
2,681,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,687,512 UART:
2,687,528 UART: Running Caliptra FMC ...
2,687,936 UART:
2,687,990 UART: [state] CFI Enabled
2,698,409 UART: [fht] FMC Alias Private Key: 7
2,805,850 UART: [art] Extend RT PCRs Done
2,806,278 UART: [art] Lock RT PCRs Done
2,808,010 UART: [art] Populate DV Done
2,815,977 UART: [fht] FMC Alias Private Key: 7
2,816,957 UART: [art] Derive CDI
2,817,237 UART: [art] Store in in slot 0x4
2,903,276 UART: [art] Derive Key Pair
2,903,636 UART: [art] Store priv key in slot 0x5
2,916,750 UART: [art] Derive Key Pair - Done
2,931,453 UART: [art] Signing Cert with AUTHO
2,931,933 UART: RITY.KEYID = 7
2,947,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,242 UART: [art] PUB.X = 847141679FEA5C6ED65680BFB3FC37B762E43347BC29E1F2A515949610EDB85496BA41A8E273A9D8899E681A2C5AB059
2,955,014 UART: [art] PUB.Y = FA2ECEE1928CCE1C245850C562157BDEC47CEFAB9FE572F7DA7BF79D1FED912652C46DB73AF5FA883B10177FFA25AE59
2,961,990 UART: [art] SIG.R = B3D25286536C85DB7448FD04509C124F7E9497D62664EBEB788B33C50A74930E4F454C16C6B98CC7DB7975614DB28F5C
2,968,751 UART: [art] SIG.S = 9EDA3A2DCAF267B092896591E8D668312B30D67BD2B6E3ED2370571458252351E80904007B045C83B93BB218F2883BF9
2,992,411 UART: Caliptra RT
2,992,664 UART: [state] CFI Enabled
3,099,574 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,534,473 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
916,057 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,170,162 UART: [cold-reset] ++
1,170,656 UART: [fht] FHT @ 0x50003400
1,173,464 UART: [idev] ++
1,173,632 UART: [idev] CDI.KEYID = 6
1,173,993 UART: [idev] SUBJECT.KEYID = 7
1,174,418 UART: [idev] UDS.KEYID = 0
1,182,130 UART: [idev] Erasing UDS.KEYID = 0
1,198,754 UART: [idev] Sha1 KeyId Algorithm
1,207,624 UART: [idev] --
1,208,723 UART: [ldev] ++
1,208,891 UART: [ldev] CDI.KEYID = 6
1,209,255 UART: [ldev] SUBJECT.KEYID = 5
1,209,682 UART: [ldev] AUTHORITY.KEYID = 7
1,210,145 UART: [ldev] FE.KEYID = 1
1,215,243 UART: [ldev] Erasing FE.KEYID = 1
1,241,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,307 UART: [ldev] --
1,280,745 UART: [fwproc] Wait for Commands...
1,281,348 UART: [fwproc] Recv command 0x46574c44
1,282,081 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,657 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,599 >>> mbox cmd response: success
2,773,816 UART: [afmc] ++
2,773,984 UART: [afmc] CDI.KEYID = 6
2,774,347 UART: [afmc] SUBJECT.KEYID = 7
2,774,773 UART: [afmc] AUTHORITY.KEYID = 5
2,811,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,229 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,958 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,841 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,560 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,305 UART: [afmc] --
2,854,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,854,325 UART: [cold-reset] --
2,855,229 UART: [state] Locking Datavault
2,856,512 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,116 UART: [state] Locking ICCM
2,857,576 UART: [exit] Launching FMC @ 0x40000130
2,862,905 UART:
2,862,921 UART: Running Caliptra FMC ...
2,863,329 UART:
2,863,472 UART: [state] CFI Enabled
2,874,459 UART: [fht] FMC Alias Private Key: 7
2,982,740 UART: [art] Extend RT PCRs Done
2,983,168 UART: [art] Lock RT PCRs Done
2,984,760 UART: [art] Populate DV Done
2,992,951 UART: [fht] FMC Alias Private Key: 7
2,994,063 UART: [art] Derive CDI
2,994,343 UART: [art] Store in in slot 0x4
3,080,162 UART: [art] Derive Key Pair
3,080,522 UART: [art] Store priv key in slot 0x5
3,093,714 UART: [art] Derive Key Pair - Done
3,108,589 UART: [art] Signing Cert with AUTHO
3,109,069 UART: RITY.KEYID = 7
3,124,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,476 UART: [art] PUB.X = 272C731521F4168DF6B40C2CB0A4906B2B80EDBFA840720F909FF3921AFB57470CDC1A1440864531F5DED622502528F8
3,132,237 UART: [art] PUB.Y = 1050C15B0CAC144ED1922E2487C9A9356E1FFF7AC289986703698C030EC4467F8D723830EE775898669206BBB3490F9B
3,139,163 UART: [art] SIG.R = 05B732D35EA5A89CDC7AAE0F0A0B922CA28F793A21C4A4610FF905A7D83161AD65E6B08C8374C8A8020764EF94603F7E
3,145,917 UART: [art] SIG.S = 008081CD14D416048F5C2259727FBA8AD59C5F7369643CA62E1B5FA1025E44D9AFF9E08D431C4F9490301F2C60ABAD65
3,169,836 UART: Caliptra RT
3,170,181 UART: [state] CFI Enabled
3,278,457 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,195 UART:
3,280,211 UART: Running Caliptra ROM ...
3,280,619 UART:
3,280,761 UART: [state] CFI Enabled
3,283,447 UART: [state] LifecycleState = Unprovisioned
3,284,102 UART: [state] DebugLocked = No
3,284,742 UART: [state] WD Timer not started. Device not locked for debugging
3,285,892 UART: [kat] SHA2-256
4,089,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,571 UART: [kat] ++
4,093,723 UART: [kat] sha1
4,098,017 UART: [kat] SHA2-256
4,099,957 UART: [kat] SHA2-384
4,102,828 UART: [kat] SHA2-512-ACC
4,104,728 UART: [kat] ECC-384
4,114,777 UART: [kat] HMAC-384Kdf
4,119,413 UART: [kat] LMS
4,367,725 UART: [kat] --
4,368,499 UART: [update-reset] ++
5,681,727 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,682,692 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,832,690 >>> mbox cmd response: success
Initializing fuses
5,832,960 UART:
5,832,976 UART: Running Caliptra ROM ...
5,833,384 UART:
5,833,526 UART: [state] CFI Enabled
5,836,096 UART: [state] LifecycleState = Unprovisioned
5,836,751 UART: [state] DebugLocked = No
5,837,309 UART: [state] WD Timer not started. Device not locked for debugging
5,838,416 UART: [kat] SHA2-256
6,641,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,646,095 UART: [kat] ++
6,646,247 UART: [kat] sha1
6,650,459 UART: [kat] SHA2-256
6,652,399 UART: [kat] SHA2-384
6,655,024 UART: [kat] SHA2-512-ACC
6,656,925 UART: [kat] ECC-384
6,667,138 UART: [kat] HMAC-384Kdf
6,671,798 UART: [kat] LMS
6,920,110 UART: [kat] --
6,920,804 UART: [warm-reset] ++
6,921,477 UART: [warm-reset] Prev Update Reset failed
6,922,554 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,973 >>> mbox cmd response: success
2,679,644 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,685,759 UART:
2,685,775 UART: Running Caliptra FMC ...
2,686,183 UART:
2,686,326 UART: [state] CFI Enabled
2,697,209 UART: [fht] FMC Alias Private Key: 7
2,805,324 UART: [art] Extend RT PCRs Done
2,805,752 UART: [art] Lock RT PCRs Done
2,807,154 UART: [art] Populate DV Done
2,815,251 UART: [fht] FMC Alias Private Key: 7
2,816,211 UART: [art] Derive CDI
2,816,491 UART: [art] Store in in slot 0x4
2,902,510 UART: [art] Derive Key Pair
2,902,870 UART: [art] Store priv key in slot 0x5
2,916,630 UART: [art] Derive Key Pair - Done
2,931,467 UART: [art] Signing Cert with AUTHO
2,931,947 UART: RITY.KEYID = 7
2,946,989 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,754 UART: [art] PUB.X = C9BE61C9418DB7ACA232FF2ED7BE83A8B1EE73ACAFB7EAC75BF4752D4AC91B7557206DE25FB07B4A609095FAD4992B37
2,954,548 UART: [art] PUB.Y = 74B1A697D9C8072DBBAF5E945A372E72ECAD84759F79E1BCADA99402FC98DE84AAEE8DE934381B214574989B63FE6133
2,961,504 UART: [art] SIG.R = 53F58E7EA8B58CD82DAEFAC5F6C3CC853CB4B0CE113A2BCF6A21C869CEB8EE3CDEC01F1A5CE23D7F5C6425CE575C0885
2,968,303 UART: [art] SIG.S = D450020887CFC7B1694D352834CA038A79278010389C23EAD9B028AF16CC2759165A9CCA82B55F37098D7B119983023D
2,992,545 UART: Caliptra RT
2,992,890 UART: [state] CFI Enabled
3,101,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,538,559 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
191,616 UART:
191,970 UART: Running Caliptra ROM ...
193,102 UART:
193,248 UART: [state] CFI Enabled
265,589 UART: [state] LifecycleState = Production
267,809 UART: [state] DebugLocked = Yes
270,233 UART: [state] Starting the WD Timer 40000000 cycles
276,107 UART: [kat] SHA2-256
458,040 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,541 UART: [kat] ++
470,066 UART: [kat] sha1
480,472 UART: [kat] SHA2-256
483,498 UART: [kat] SHA2-384
490,339 UART: [kat] SHA2-512-ACC
492,925 UART: [kat] ECC-384
3,772,300 UART: [kat] HMAC-384Kdf
3,801,173 UART: [kat] LMS
4,874,347 UART: [kat] --
4,879,130 UART: [cold-reset] ++
4,881,415 UART: [fht] FHT @ 0x50003400
4,893,954 UART: [idev] ++
4,894,594 UART: [idev] CDI.KEYID = 6
4,895,839 UART: [idev] SUBJECT.KEYID = 7
4,896,939 UART: [idev] UDS.KEYID = 0
4,897,992 ready_for_fw is high
4,898,202 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,041,826 UART: [idev] Erasing UDS.KEYID = 0
8,242,286 UART: [idev] Sha1 KeyId Algorithm
8,263,784 UART: [idev] --
8,267,241 UART: [ldev] ++
8,267,865 UART: [ldev] CDI.KEYID = 6
8,269,049 UART: [ldev] SUBJECT.KEYID = 5
8,270,210 UART: [ldev] AUTHORITY.KEYID = 7
8,271,383 UART: [ldev] FE.KEYID = 1
8,317,451 UART: [ldev] Erasing FE.KEYID = 1
11,652,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,808 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,980,121 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,996,127 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,012,262 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,032,988 UART: [ldev] --
14,037,281 UART: [fwproc] Wait for Commands...
14,039,544 UART: [fwproc] Recv command 0x46574c44
14,041,857 UART: [fwproc] Recv'd Img size: 114124 bytes
18,144,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,215,043 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,283,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,601,310 >>> mbox cmd response: success
18,605,741 UART: [afmc] ++
18,606,328 UART: [afmc] CDI.KEYID = 6
18,607,569 UART: [afmc] SUBJECT.KEYID = 7
18,608,671 UART: [afmc] AUTHORITY.KEYID = 5
21,970,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,266,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,268,810 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,284,799 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,300,940 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,317,007 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,339,253 UART: [afmc] --
24,343,759 UART: [cold-reset] --
24,347,916 UART: [state] Locking Datavault
24,354,519 UART: [state] Locking PCR0, PCR1 and PCR31
24,356,221 UART: [state] Locking ICCM
24,357,764 UART: [exit] Launching FMC @ 0x40000130
24,366,394 UART:
24,366,626 UART: Running Caliptra FMC ...
24,367,655 UART:
24,367,803 UART: [state] CFI Enabled
24,428,544 UART: [fht] FMC Alias Private Key: 7
26,766,570 UART: [art] Extend RT PCRs Done
26,767,787 UART: [art] Lock RT PCRs Done
26,769,279 UART: [art] Populate DV Done
26,774,476 UART: [fht] FMC Alias Private Key: 7
26,776,015 UART: [art] Derive CDI
26,776,833 UART: [art] Store in in slot 0x4
26,837,441 UART: [art] Derive Key Pair
26,838,498 UART: [art] Store priv key in slot 0x5
30,131,531 UART: [art] Derive Key Pair - Done
30,144,360 UART: [art] Signing Cert with AUTHO
30,145,707 UART: RITY.KEYID = 7
32,433,516 UART: [art] Erasing AUTHORITY.KEYID = 7
32,435,022 UART: [art] PUB.X = EA9FDAE1C309027357A25E0D042F12D6166821F57021C20FED0936B865568BF07BA5A952635B822F6D4144727CD22AB4
32,442,268 UART: [art] PUB.Y = CCB56D2F162E2CAB6A67DB5FB8D9DFB1BF97150A5AF42C4CBE032D0754EA838F17560AA397994077795A5DAB1906FDA3
32,449,556 UART: [art] SIG.R = 38C97ACEE76B834D935E55277F56FE70B913072608C9EAF8273CAB9067B78BB2886C821BF54E8BCC31F6A5946AF30587
32,456,952 UART: [art] SIG.S = 51464785CCCE4EAA3AD7398A9394F91B79BF909611F0940FD6E00827376A1211B2558FCB94D291B8DADBF0E9BCA722DF
33,762,158 UART: Caliptra RT
33,762,854 UART: [state] CFI Enabled
33,923,852 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,305 UART:
1,588 UART: Running Caliptra ROM ...
2,700 UART:
2,869 UART: [state] CFI Enabled
63,814 UART: [state] LifecycleState = Production
65,579 UART: [state] DebugLocked = Yes
66,992 UART: [state] Starting the WD Timer 40000000 cycles
72,805 UART: [kat] SHA2-256
254,744 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
266,279 UART: [kat] ++
266,861 UART: [kat] sha1
277,095 UART: [kat] SHA2-256
280,099 UART: [kat] SHA2-384
286,125 UART: [kat] SHA2-512-ACC
288,742 UART: [kat] ECC-384
3,577,747 UART: [kat] HMAC-384Kdf
3,604,239 UART: [kat] LMS
4,677,377 UART: [kat] --
4,679,932 UART: [warm-reset] ++
4,683,241 UART: [warm-reset] --
4,687,868 UART: [state] Locking Datavault
4,692,524 UART: [state] Locking PCR0, PCR1 and PCR31
4,694,664 UART: [state] Locking ICCM
4,697,569 UART: [exit] Launching FMC @ 0x40000130
4,706,231 UART:
4,706,479 UART: Running Caliptra FMC ...
4,707,581 UART:
4,707,741 UART: [state] CFI Enabled
4,769,314 UART: [aliasrt :skip pcr extension
4,770,569 UART: [art] Extend RT PCRs Done
4,771,712 UART: [art] Lock RT PCRs Done
4,773,102 UART: [art] Populate DV Done
4,778,465 UART: [fht] FMC Alias Private Key: 7
4,780,146 UART: [art] Derive CDI
4,780,886 UART: [art] Store in in slot 0x4
4,837,942 UART: [art] Derive Key Pair
4,838,946 UART: [art] Store priv key in slot 0x5
8,132,049 UART: [art] Derive Key Pair - Done
8,144,994 UART: [art] Signing Cert with AUTHO
8,146,331 UART: RITY.KEYID = 7
10,445,943 UART: [art] Erasing AUTHORITY.KEYID = 7
10,447,448 UART: [art] PUB.X = EA9FDAE1C309027357A25E0D042F12D6166821F57021C20FED0936B865568BF07BA5A952635B822F6D4144727CD22AB4
10,454,680 UART: [art] PUB.Y = CCB56D2F162E2CAB6A67DB5FB8D9DFB1BF97150A5AF42C4CBE032D0754EA838F17560AA397994077795A5DAB1906FDA3
10,461,955 UART: [art] SIG.R = 38C97ACEE76B834D935E55277F56FE70B913072608C9EAF8273CAB9067B78BB2886C821BF54E8BCC31F6A5946AF30587
10,469,301 UART: [art] SIG.S = 51464785CCCE4EAA3AD7398A9394F91B79BF909611F0940FD6E00827376A1211B2558FCB94D291B8DADBF0E9BCA722DF
11,774,782 UART: Caliptra RT
11,775,506 UART: [state] CFI Enabled
12,107,320 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
191,601 UART:
191,957 UART: Running Caliptra ROM ...
193,064 UART:
193,216 UART: [state] CFI Enabled
263,228 UART: [state] LifecycleState = Production
266,163 UART: [state] DebugLocked = Yes
268,228 UART: [state] Starting the WD Timer 40000000 cycles
274,261 UART: [kat] SHA2-256
456,234 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,785 UART: [kat] ++
468,336 UART: [kat] sha1
478,961 UART: [kat] SHA2-256
481,965 UART: [kat] SHA2-384
486,811 UART: [kat] SHA2-512-ACC
489,456 UART: [kat] ECC-384
3,775,272 UART: [kat] HMAC-384Kdf
3,801,128 UART: [kat] LMS
4,874,338 UART: [kat] --
4,879,061 UART: [cold-reset] ++
4,880,497 UART: [fht] FHT @ 0x50003400
4,891,969 UART: [idev] ++
4,892,672 UART: [idev] CDI.KEYID = 6
4,893,913 UART: [idev] SUBJECT.KEYID = 7
4,895,010 UART: [idev] UDS.KEYID = 0
4,895,941 ready_for_fw is high
4,896,151 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,039,879 UART: [idev] Erasing UDS.KEYID = 0
8,241,336 UART: [idev] Sha1 KeyId Algorithm
8,263,985 UART: [idev] --
8,267,109 UART: [ldev] ++
8,267,712 UART: [ldev] CDI.KEYID = 6
8,268,899 UART: [ldev] SUBJECT.KEYID = 5
8,270,057 UART: [ldev] AUTHORITY.KEYID = 7
8,271,236 UART: [ldev] FE.KEYID = 1
8,317,470 UART: [ldev] Erasing FE.KEYID = 1
11,650,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,570 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,957,905 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,973,888 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,990,006 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,011,694 UART: [ldev] --
14,016,584 UART: [fwproc] Wait for Commands...
14,018,051 UART: [fwproc] Recv command 0x46574c44
14,019,996 UART: [fwproc] Recv'd Img size: 114124 bytes
18,115,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,192,384 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,261,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,577,398 >>> mbox cmd response: success
18,581,450 UART: [afmc] ++
18,582,041 UART: [afmc] CDI.KEYID = 6
18,583,227 UART: [afmc] SUBJECT.KEYID = 7
18,584,329 UART: [afmc] AUTHORITY.KEYID = 5
21,947,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,245,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,248,298 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,264,274 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,280,382 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,296,478 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,320,023 UART: [afmc] --
24,323,498 UART: [cold-reset] --
24,326,609 UART: [state] Locking Datavault
24,332,832 UART: [state] Locking PCR0, PCR1 and PCR31
24,334,537 UART: [state] Locking ICCM
24,337,591 UART: [exit] Launching FMC @ 0x40000130
24,346,220 UART:
24,346,493 UART: Running Caliptra FMC ...
24,347,528 UART:
24,347,673 UART: [state] CFI Enabled
24,405,706 UART: [fht] FMC Alias Private Key: 7
26,743,958 UART: [art] Extend RT PCRs Done
26,745,332 UART: [art] Lock RT PCRs Done
26,746,722 UART: [art] Populate DV Done
26,752,089 UART: [fht] FMC Alias Private Key: 7
26,753,682 UART: [art] Derive CDI
26,754,433 UART: [art] Store in in slot 0x4
26,814,559 UART: [art] Derive Key Pair
26,815,558 UART: [art] Store priv key in slot 0x5
30,108,228 UART: [art] Derive Key Pair - Done
30,121,228 UART: [art] Signing Cert with AUTHO
30,122,535 UART: RITY.KEYID = 7
32,409,625 UART: [art] Erasing AUTHORITY.KEYID = 7
32,411,131 UART: [art] PUB.X = F09BF54A1AE7774BF13A78AC47F4BDB726457905D8C6E851DEDBDEC49DE3435401BC9B53CACCBCF861317133F58F114C
32,418,377 UART: [art] PUB.Y = 73143749502AAB99757B0FFBBB8336DAF4D48C9BDF8DC09E6BDAFFE474CBD16AA5618EBE101BD05DF7F5C866AE3299ED
32,425,695 UART: [art] SIG.R = B7045F4F4FCAB90C4ADA85BA297A2F0B665843886F083B45881CA052C79E8662D9F3BA5F00EEAD20A8447CB940EE5382
32,433,053 UART: [art] SIG.S = 910371D2DEE0E05B0564F17FA0D8F7821AB58E0CAD99D66CC1E353F199FD3CFCF7372816999ABF32C6CEDEE082904276
33,738,283 UART: Caliptra RT
33,738,998 UART: [state] CFI Enabled
33,898,480 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,321 UART:
1,622 UART: Running Caliptra ROM ...
2,737 UART:
2,895 UART: [state] CFI Enabled
67,026 UART: [state] LifecycleState = Production
68,794 UART: [state] DebugLocked = Yes
70,691 UART: [state] Starting the WD Timer 40000000 cycles
76,285 UART: [kat] SHA2-256
258,262 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
269,801 UART: [kat] ++
270,384 UART: [kat] sha1
280,782 UART: [kat] SHA2-256
283,838 UART: [kat] SHA2-384
290,596 UART: [kat] SHA2-512-ACC
293,226 UART: [kat] ECC-384
3,575,707 UART: [kat] HMAC-384Kdf
3,603,442 UART: [kat] LMS
4,676,595 UART: [kat] --
4,678,828 UART: [warm-reset] ++
4,682,665 UART: [warm-reset] --
4,688,044 UART: [state] Locking Datavault
4,690,860 UART: [state] Locking PCR0, PCR1 and PCR31
4,693,011 UART: [state] Locking ICCM
4,694,739 UART: [exit] Launching FMC @ 0x40000130
4,703,414 UART:
4,703,648 UART: Running Caliptra FMC ...
4,704,676 UART:
4,704,825 UART: [state] CFI Enabled
4,768,493 UART: [aliasrt :skip pcr extension
4,769,787 UART: [art] Extend RT PCRs Done
4,770,858 UART: [art] Lock RT PCRs Done
4,772,088 UART: [art] Populate DV Done
4,777,718 UART: [fht] FMC Alias Private Key: 7
4,779,274 UART: [art] Derive CDI
4,780,012 UART: [art] Store in in slot 0x4
4,837,156 UART: [art] Derive Key Pair
4,838,152 UART: [art] Store priv key in slot 0x5
8,131,099 UART: [art] Derive Key Pair - Done
8,144,048 UART: [art] Signing Cert with AUTHO
8,145,358 UART: RITY.KEYID = 7
10,431,994 UART: [art] Erasing AUTHORITY.KEYID = 7
10,433,497 UART: [art] PUB.X = F09BF54A1AE7774BF13A78AC47F4BDB726457905D8C6E851DEDBDEC49DE3435401BC9B53CACCBCF861317133F58F114C
10,440,800 UART: [art] PUB.Y = 73143749502AAB99757B0FFBBB8336DAF4D48C9BDF8DC09E6BDAFFE474CBD16AA5618EBE101BD05DF7F5C866AE3299ED
10,448,069 UART: [art] SIG.R = B7045F4F4FCAB90C4ADA85BA297A2F0B665843886F083B45881CA052C79E8662D9F3BA5F00EEAD20A8447CB940EE5382
10,455,425 UART: [art] SIG.S = 910371D2DEE0E05B0564F17FA0D8F7821AB58E0CAD99D66CC1E353F199FD3CFCF7372816999ABF32C6CEDEE082904276
11,760,539 UART: Caliptra RT
11,761,237 UART: [state] CFI Enabled
12,089,907 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
191,790 UART:
192,162 UART: Running Caliptra ROM ...
193,265 UART:
602,920 UART: [state] CFI Enabled
615,866 UART: [state] LifecycleState = Production
618,051 UART: [state] DebugLocked = Yes
620,325 UART: [state] Starting the WD Timer 40000000 cycles
625,129 UART: [kat] SHA2-256
807,073 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,620 UART: [kat] ++
819,218 UART: [kat] sha1
829,056 UART: [kat] SHA2-256
832,082 UART: [kat] SHA2-384
837,969 UART: [kat] SHA2-512-ACC
840,583 UART: [kat] ECC-384
4,096,979 UART: [kat] HMAC-384Kdf
4,108,437 UART: [kat] LMS
5,181,639 UART: [kat] --
5,185,572 UART: [cold-reset] ++
5,187,640 UART: [fht] FHT @ 0x50003400
5,199,391 UART: [idev] ++
5,200,026 UART: [idev] CDI.KEYID = 6
5,201,200 UART: [idev] SUBJECT.KEYID = 7
5,202,718 UART: [idev] UDS.KEYID = 0
5,203,892 ready_for_fw is high
5,204,096 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,347,490 UART: [idev] Erasing UDS.KEYID = 0
8,493,016 UART: [idev] Sha1 KeyId Algorithm
8,515,958 UART: [idev] --
8,520,093 UART: [ldev] ++
8,520,689 UART: [ldev] CDI.KEYID = 6
8,521,841 UART: [ldev] SUBJECT.KEYID = 5
8,523,053 UART: [ldev] AUTHORITY.KEYID = 7
8,524,280 UART: [ldev] FE.KEYID = 1
8,534,841 UART: [ldev] Erasing FE.KEYID = 1
11,828,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,647 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,139,965 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,155,997 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,172,113 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,193,430 UART: [ldev] --
14,197,713 UART: [fwproc] Wait for Commands...
14,199,768 UART: [fwproc] Recv command 0x46574c44
14,202,076 UART: [fwproc] Recv'd Img size: 114124 bytes
18,302,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,374,455 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,443,168 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,759,802 >>> mbox cmd response: success
18,763,192 UART: [afmc] ++
18,763,776 UART: [afmc] CDI.KEYID = 6
18,765,013 UART: [afmc] SUBJECT.KEYID = 7
18,766,119 UART: [afmc] AUTHORITY.KEYID = 5
22,078,441 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,374,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,377,215 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,393,202 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,409,337 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,425,348 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,449,588 UART: [afmc] --
24,452,326 UART: [cold-reset] --
24,458,078 UART: [state] Locking Datavault
24,463,490 UART: [state] Locking PCR0, PCR1 and PCR31
24,465,200 UART: [state] Locking ICCM
24,467,276 UART: [exit] Launching FMC @ 0x40000130
24,475,941 UART:
24,476,177 UART: Running Caliptra FMC ...
24,477,208 UART:
24,477,348 UART: [state] CFI Enabled
24,485,662 UART: [fht] FMC Alias Private Key: 7
26,816,977 UART: [art] Extend RT PCRs Done
26,818,200 UART: [art] Lock RT PCRs Done
26,819,576 UART: [art] Populate DV Done
26,825,036 UART: [fht] FMC Alias Private Key: 7
26,826,571 UART: [art] Derive CDI
26,827,377 UART: [art] Store in in slot 0x4
26,870,034 UART: [art] Derive Key Pair
26,871,072 UART: [art] Store priv key in slot 0x5
30,113,561 UART: [art] Derive Key Pair - Done
30,126,524 UART: [art] Signing Cert with AUTHO
30,127,818 UART: RITY.KEYID = 7
32,407,544 UART: [art] Erasing AUTHORITY.KEYID = 7
32,409,049 UART: [art] PUB.X = 6AFFF9FB8DEBC82D2D093F7F831B6BF19309C460EF830B2C174427A524074C78BDCAEEA759B7835C71D08B504A0379DB
32,416,298 UART: [art] PUB.Y = 86305C9972B04E90A5355586FF05F951A4CC544056A4DC93352EC2F2F3B04562CC01FD12BE7A4994CCB64AE286F3D26D
32,423,528 UART: [art] SIG.R = 9876BF88A678C4691886581579B528F4D80B18CCA849257A74B8DEEF2FD914A758F6CF63E8EFAF76F7C1FC6D6742D10B
32,431,067 UART: [art] SIG.S = B448E484C1EE92E8DD6B397382E02B892C643E945A0805C9F47C72DA242AB203047CE8D3FD964F59603A1A3CFEE6BCC9
33,735,352 UART: Caliptra RT
33,736,062 UART: [state] CFI Enabled
33,853,720 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,297 UART:
1,588 UART: Running Caliptra ROM ...
2,640 UART:
6,671,189 UART: [state] CFI Enabled
6,685,768 UART: [state] LifecycleState = Production
6,687,537 UART: [state] DebugLocked = Yes
6,690,442 UART: [state] Starting the WD Timer 40000000 cycles
6,695,935 UART: [kat] SHA2-256
6,877,942 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,889,490 UART: [kat] ++
6,890,000 UART: [kat] sha1
6,900,564 UART: [kat] SHA2-256
6,903,620 UART: [kat] SHA2-384
6,909,119 UART: [kat] SHA2-512-ACC
6,911,735 UART: [kat] ECC-384
10,167,848 UART: [kat] HMAC-384Kdf
10,178,997 UART: [kat] LMS
11,252,159 UART: [kat] --
11,257,128 UART: [warm-reset] ++
11,262,997 UART: [warm-reset] --
11,267,183 UART: [state] Locking Datavault
11,271,472 UART: [state] Locking PCR0, PCR1 and PCR31
11,273,614 UART: [state] Locking ICCM
11,276,170 UART: [exit] Launching FMC @ 0x40000130
11,284,836 UART:
11,285,064 UART: Running Caliptra FMC ...
11,286,082 UART:
11,286,222 UART: [state] CFI Enabled
11,288,374 UART: [aliasrt :skip pcr extension
11,289,614 UART: [art] Extend RT PCRs Done
11,290,746 UART: [art] Lock RT PCRs Done
11,291,968 UART: [art] Populate DV Done
11,297,315 UART: [fht] FMC Alias Private Key: 7
11,298,946 UART: [art] Derive CDI
11,299,687 UART: [art] Store in in slot 0x4
11,342,277 UART: [art] Derive Key Pair
11,343,275 UART: [art] Store priv key in slot 0x5
14,585,277 UART: [art] Derive Key Pair - Done
14,598,659 UART: [art] Signing Cert with AUTHO
14,599,956 UART: RITY.KEYID = 7
16,878,895 UART: [art] Erasing AUTHORITY.KEYID = 7
16,880,399 UART: [art] PUB.X = 6AFFF9FB8DEBC82D2D093F7F831B6BF19309C460EF830B2C174427A524074C78BDCAEEA759B7835C71D08B504A0379DB
16,887,664 UART: [art] PUB.Y = 86305C9972B04E90A5355586FF05F951A4CC544056A4DC93352EC2F2F3B04562CC01FD12BE7A4994CCB64AE286F3D26D
16,894,992 UART: [art] SIG.R = 9876BF88A678C4691886581579B528F4D80B18CCA849257A74B8DEEF2FD914A758F6CF63E8EFAF76F7C1FC6D6742D10B
16,902,305 UART: [art] SIG.S = B448E484C1EE92E8DD6B397382E02B892C643E945A0805C9F47C72DA242AB203047CE8D3FD964F59603A1A3CFEE6BCC9
18,207,249 UART: Caliptra RT
18,207,960 UART: [state] CFI Enabled
18,493,909 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
191,900 UART:
192,348 UART: Running Caliptra ROM ...
193,486 UART:
603,022 UART: [state] CFI Enabled
614,790 UART: [state] LifecycleState = Production
616,989 UART: [state] DebugLocked = Yes
618,273 UART: [state] Starting the WD Timer 40000000 cycles
623,940 UART: [kat] SHA2-256
805,934 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,472 UART: [kat] ++
817,989 UART: [kat] sha1
828,245 UART: [kat] SHA2-256
831,250 UART: [kat] SHA2-384
836,737 UART: [kat] SHA2-512-ACC
839,390 UART: [kat] ECC-384
4,096,289 UART: [kat] HMAC-384Kdf
4,108,098 UART: [kat] LMS
5,181,221 UART: [kat] --
5,184,958 UART: [cold-reset] ++
5,186,817 UART: [fht] FHT @ 0x50003400
5,198,117 UART: [idev] ++
5,198,796 UART: [idev] CDI.KEYID = 6
5,199,975 UART: [idev] SUBJECT.KEYID = 7
5,201,428 UART: [idev] UDS.KEYID = 0
5,202,681 ready_for_fw is high
5,202,870 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,346,103 UART: [idev] Erasing UDS.KEYID = 0
8,496,031 UART: [idev] Sha1 KeyId Algorithm
8,518,672 UART: [idev] --
8,522,769 UART: [ldev] ++
8,523,385 UART: [ldev] CDI.KEYID = 6
8,524,533 UART: [ldev] SUBJECT.KEYID = 5
8,525,736 UART: [ldev] AUTHORITY.KEYID = 7
8,526,881 UART: [ldev] FE.KEYID = 1
8,537,756 UART: [ldev] Erasing FE.KEYID = 1
11,827,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,462 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,138,772 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,154,802 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,170,923 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,192,505 UART: [ldev] --
14,197,932 UART: [fwproc] Wait for Commands...
14,201,041 UART: [fwproc] Recv command 0x46574c44
14,203,341 UART: [fwproc] Recv'd Img size: 114124 bytes
18,311,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,388,754 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,457,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,774,033 >>> mbox cmd response: success
18,777,637 UART: [afmc] ++
18,778,215 UART: [afmc] CDI.KEYID = 6
18,779,454 UART: [afmc] SUBJECT.KEYID = 7
18,780,605 UART: [afmc] AUTHORITY.KEYID = 5
22,097,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,391,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,394,055 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,410,069 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,426,215 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,442,235 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,465,485 UART: [afmc] --
24,468,786 UART: [cold-reset] --
24,472,379 UART: [state] Locking Datavault
24,477,740 UART: [state] Locking PCR0, PCR1 and PCR31
24,479,421 UART: [state] Locking ICCM
24,481,658 UART: [exit] Launching FMC @ 0x40000130
24,490,320 UART:
24,490,554 UART: Running Caliptra FMC ...
24,491,582 UART:
24,491,722 UART: [state] CFI Enabled
24,499,943 UART: [fht] FMC Alias Private Key: 7
26,830,969 UART: [art] Extend RT PCRs Done
26,832,188 UART: [art] Lock RT PCRs Done
26,833,718 UART: [art] Populate DV Done
26,839,009 UART: [fht] FMC Alias Private Key: 7
26,840,601 UART: [art] Derive CDI
26,841,331 UART: [art] Store in in slot 0x4
26,884,023 UART: [art] Derive Key Pair
26,885,063 UART: [art] Store priv key in slot 0x5
30,127,296 UART: [art] Derive Key Pair - Done
30,140,297 UART: [art] Signing Cert with AUTHO
30,141,604 UART: RITY.KEYID = 7
32,421,602 UART: [art] Erasing AUTHORITY.KEYID = 7
32,423,109 UART: [art] PUB.X = 799361F6AE864BA9959F666EB2F3494B70EC427C901C7BFC601BCA355BB4A26C1189CE8993728D080E02F6BBA40E76B3
32,430,349 UART: [art] PUB.Y = 3A522DB91FD6BACEA82A4CD2CD3585F923853E63AA54DEB26FE9B112CFFC53542BDDC3481D6D3AFB2B9883C9725E4328
32,437,623 UART: [art] SIG.R = AE4DC824C5F838CD919E3FD59F29368CFE7E053FA1F9E45B22AA86CD1F70F306EEEE5F876579C5BE6C4991B04ABBA956
32,445,018 UART: [art] SIG.S = 4F2CB96F1D15F3C04183D90EDA4010595CA682720BD15FACC688BBBDCA8D40DCAC8744327E1FF249C88DFFF4E01C0882
33,750,334 UART: Caliptra RT
33,751,046 UART: [state] CFI Enabled
33,868,179 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,299 UART:
1,508 UART: Running Caliptra ROM ...
2,544 UART:
6,661,980 UART: [state] CFI Enabled
6,674,132 UART: [state] LifecycleState = Production
6,675,876 UART: [state] DebugLocked = Yes
6,678,317 UART: [state] Starting the WD Timer 40000000 cycles
6,682,886 UART: [kat] SHA2-256
6,864,873 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,876,374 UART: [kat] ++
6,876,908 UART: [kat] sha1
6,886,190 UART: [kat] SHA2-256
6,889,259 UART: [kat] SHA2-384
6,894,318 UART: [kat] SHA2-512-ACC
6,896,940 UART: [kat] ECC-384
10,151,337 UART: [kat] HMAC-384Kdf
10,163,466 UART: [kat] LMS
11,236,649 UART: [kat] --
11,241,131 UART: [warm-reset] ++
11,246,029 UART: [warm-reset] --
11,250,903 UART: [state] Locking Datavault
11,255,299 UART: [state] Locking PCR0, PCR1 and PCR31
11,257,498 UART: [state] Locking ICCM
11,260,298 UART: [exit] Launching FMC @ 0x40000130
11,268,966 UART:
11,269,192 UART: Running Caliptra FMC ...
11,270,283 UART:
11,270,452 UART: [state] CFI Enabled
11,272,334 UART: [aliasrt :skip pcr extension
11,273,566 UART: [art] Extend RT PCRs Done
11,274,691 UART: [art] Lock RT PCRs Done
11,275,916 UART: [art] Populate DV Done
11,281,309 UART: [fht] FMC Alias Private Key: 7
11,282,780 UART: [art] Derive CDI
11,283,531 UART: [art] Store in in slot 0x4
11,326,060 UART: [art] Derive Key Pair
11,327,093 UART: [art] Store priv key in slot 0x5
14,569,458 UART: [art] Derive Key Pair - Done
14,582,452 UART: [art] Signing Cert with AUTHO
14,583,745 UART: RITY.KEYID = 7
16,863,247 UART: [art] Erasing AUTHORITY.KEYID = 7
16,864,751 UART: [art] PUB.X = 799361F6AE864BA9959F666EB2F3494B70EC427C901C7BFC601BCA355BB4A26C1189CE8993728D080E02F6BBA40E76B3
16,872,045 UART: [art] PUB.Y = 3A522DB91FD6BACEA82A4CD2CD3585F923853E63AA54DEB26FE9B112CFFC53542BDDC3481D6D3AFB2B9883C9725E4328
16,879,305 UART: [art] SIG.R = AE4DC824C5F838CD919E3FD59F29368CFE7E053FA1F9E45B22AA86CD1F70F306EEEE5F876579C5BE6C4991B04ABBA956
16,886,695 UART: [art] SIG.S = 4F2CB96F1D15F3C04183D90EDA4010595CA682720BD15FACC688BBBDCA8D40DCAC8744327E1FF249C88DFFF4E01C0882
18,191,498 UART: Caliptra RT
18,192,185 UART: [state] CFI Enabled
18,484,347 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
191,704 UART:
192,066 UART: Running Caliptra ROM ...
193,265 UART:
193,420 UART: [state] CFI Enabled
264,589 UART: [state] LifecycleState = Production
266,387 UART: [state] DebugLocked = Yes
268,171 UART: [state] Starting the WD Timer 40000000 cycles
272,423 UART: [kat] SHA2-256
451,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,157 UART: [kat] ++
463,673 UART: [kat] sha1
475,346 UART: [kat] SHA2-256
478,432 UART: [kat] SHA2-384
484,785 UART: [kat] SHA2-512-ACC
487,743 UART: [kat] ECC-384
2,948,762 UART: [kat] HMAC-384Kdf
2,972,329 UART: [kat] LMS
3,501,785 UART: [kat] --
3,506,852 UART: [cold-reset] ++
3,508,713 UART: [fht] FHT @ 0x50003400
3,519,690 UART: [idev] ++
3,520,253 UART: [idev] CDI.KEYID = 6
3,521,181 UART: [idev] SUBJECT.KEYID = 7
3,522,355 UART: [idev] UDS.KEYID = 0
3,523,278 ready_for_fw is high
3,523,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,695 UART: [idev] Erasing UDS.KEYID = 0
6,026,239 UART: [idev] Sha1 KeyId Algorithm
6,049,090 UART: [idev] --
6,052,659 UART: [ldev] ++
6,053,256 UART: [ldev] CDI.KEYID = 6
6,054,229 UART: [ldev] SUBJECT.KEYID = 5
6,055,339 UART: [ldev] AUTHORITY.KEYID = 7
6,056,579 UART: [ldev] FE.KEYID = 1
6,101,242 UART: [ldev] Erasing FE.KEYID = 1
8,605,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,645 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,634 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,456 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,403 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,720 UART: [ldev] --
10,413,048 UART: [fwproc] Wait for Commands...
10,414,874 UART: [fwproc] Recv command 0x46574c44
10,416,978 UART: [fwproc] Recv'd Img size: 114448 bytes
13,854,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,001,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,319,735 >>> mbox cmd response: success
14,323,878 UART: [afmc] ++
14,324,472 UART: [afmc] CDI.KEYID = 6
14,325,382 UART: [afmc] SUBJECT.KEYID = 7
14,326,542 UART: [afmc] AUTHORITY.KEYID = 5
16,850,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,417 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,593,432 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,609,310 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,625,024 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,648,743 UART: [afmc] --
18,652,052 UART: [cold-reset] --
18,656,993 UART: [state] Locking Datavault
18,663,978 UART: [state] Locking PCR0, PCR1 and PCR31
18,665,645 UART: [state] Locking ICCM
18,667,741 UART: [exit] Launching FMC @ 0x40000130
18,676,136 UART:
18,676,381 UART: Running Caliptra FMC ...
18,677,486 UART:
18,677,656 UART: [state] CFI Enabled
18,733,366 UART: [fht] FMC Alias Private Key: 7
20,497,351 UART: [art] Extend RT PCRs Done
20,498,581 UART: [art] Lock RT PCRs Done
20,500,041 UART: [art] Populate DV Done
20,505,563 UART: [fht] FMC Alias Private Key: 7
20,507,099 UART: [art] Derive CDI
20,507,914 UART: [art] Store in in slot 0x4
20,566,636 UART: [art] Derive Key Pair
20,567,638 UART: [art] Store priv key in slot 0x5
23,030,527 UART: [art] Derive Key Pair - Done
23,043,386 UART: [art] Signing Cert with AUTHO
23,044,700 UART: RITY.KEYID = 7
24,756,338 UART: [art] Erasing AUTHORITY.KEYID = 7
24,757,851 UART: [art] PUB.X = 299EFF5BA12FA30D35EE3859BBAFC64DC6470C1218ABCB5CEDA714709A50C5151A7C27DC9F3A9D12B19B52A8C0F90397
24,765,160 UART: [art] PUB.Y = 39E1681CE332790E2F2114FE570B0C3D5A9ECA46FE00C19164E54D0928A814029119ABC577828C33FA1D1B5388F2D6B6
24,772,409 UART: [art] SIG.R = AE822920FACAC3CD02D893C42840856F20053C4DAF46603F1EF10FB254B4EC0B6BE7879555FF757586E7F89EC30E9C12
24,779,812 UART: [art] SIG.S = 783A539866B490C018A9D997409DEFA27B49D59EF629C8960D93B88CE2CD8B19FE633FC75884D269B16638ABE56D73EA
25,759,138 UART: Caliptra RT
25,759,859 UART: [state] CFI Enabled
25,924,054 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,297 UART:
1,589 UART: Running Caliptra ROM ...
2,703 UART:
2,859 UART: [state] CFI Enabled
65,532 UART: [state] LifecycleState = Production
67,313 UART: [state] DebugLocked = Yes
69,654 UART: [state] Starting the WD Timer 40000000 cycles
74,487 UART: [kat] SHA2-256
253,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,183 UART: [kat] ++
265,717 UART: [kat] sha1
276,870 UART: [kat] SHA2-256
279,934 UART: [kat] SHA2-384
285,689 UART: [kat] SHA2-512-ACC
288,673 UART: [kat] ECC-384
2,747,930 UART: [kat] HMAC-384Kdf
2,769,659 UART: [kat] LMS
3,299,150 UART: [kat] --
3,303,265 UART: [warm-reset] ++
3,308,870 UART: [warm-reset] --
3,312,895 UART: [state] Locking Datavault
3,315,086 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,746 UART: [state] Locking ICCM
3,317,988 UART: [exit] Launching FMC @ 0x40000130
3,326,388 UART:
3,326,625 UART: Running Caliptra FMC ...
3,327,732 UART:
3,327,890 UART: [state] CFI Enabled
3,379,629 UART: [aliasrt :skip pcr extension
3,380,927 UART: [art] Extend RT PCRs Done
3,382,077 UART: [art] Lock RT PCRs Done
3,383,148 UART: [art] Populate DV Done
3,388,663 UART: [fht] FMC Alias Private Key: 7
3,390,420 UART: [art] Derive CDI
3,391,236 UART: [art] Store in in slot 0x4
3,448,386 UART: [art] Derive Key Pair
3,449,428 UART: [art] Store priv key in slot 0x5
5,911,642 UART: [art] Derive Key Pair - Done
5,924,323 UART: [art] Signing Cert with AUTHO
5,925,818 UART: RITY.KEYID = 7
7,637,547 UART: [art] Erasing AUTHORITY.KEYID = 7
7,639,064 UART: [art] PUB.X = 299EFF5BA12FA30D35EE3859BBAFC64DC6470C1218ABCB5CEDA714709A50C5151A7C27DC9F3A9D12B19B52A8C0F90397
7,646,318 UART: [art] PUB.Y = 39E1681CE332790E2F2114FE570B0C3D5A9ECA46FE00C19164E54D0928A814029119ABC577828C33FA1D1B5388F2D6B6
7,653,564 UART: [art] SIG.R = AE822920FACAC3CD02D893C42840856F20053C4DAF46603F1EF10FB254B4EC0B6BE7879555FF757586E7F89EC30E9C12
7,660,967 UART: [art] SIG.S = 783A539866B490C018A9D997409DEFA27B49D59EF629C8960D93B88CE2CD8B19FE633FC75884D269B16638ABE56D73EA
8,639,864 UART: Caliptra RT
8,640,572 UART: [state] CFI Enabled
8,972,547 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
191,613 UART:
192,010 UART: Running Caliptra ROM ...
193,200 UART:
193,352 UART: [state] CFI Enabled
263,262 UART: [state] LifecycleState = Production
265,061 UART: [state] DebugLocked = Yes
267,702 UART: [state] Starting the WD Timer 40000000 cycles
272,225 UART: [kat] SHA2-256
451,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,933 UART: [kat] ++
463,465 UART: [kat] sha1
473,587 UART: [kat] SHA2-256
476,595 UART: [kat] SHA2-384
482,439 UART: [kat] SHA2-512-ACC
485,385 UART: [kat] ECC-384
2,947,959 UART: [kat] HMAC-384Kdf
2,972,508 UART: [kat] LMS
3,501,945 UART: [kat] --
3,505,664 UART: [cold-reset] ++
3,506,599 UART: [fht] FHT @ 0x50003400
3,516,293 UART: [idev] ++
3,516,851 UART: [idev] CDI.KEYID = 6
3,517,809 UART: [idev] SUBJECT.KEYID = 7
3,518,984 UART: [idev] UDS.KEYID = 0
3,519,889 ready_for_fw is high
3,520,093 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,125 UART: [idev] Erasing UDS.KEYID = 0
6,024,508 UART: [idev] Sha1 KeyId Algorithm
6,047,039 UART: [idev] --
6,049,534 UART: [ldev] ++
6,050,115 UART: [ldev] CDI.KEYID = 6
6,051,000 UART: [ldev] SUBJECT.KEYID = 5
6,052,218 UART: [ldev] AUTHORITY.KEYID = 7
6,053,470 UART: [ldev] FE.KEYID = 1
6,100,092 UART: [ldev] Erasing FE.KEYID = 1
8,606,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,608 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,589 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,404 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,350 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,611 UART: [ldev] --
10,414,369 UART: [fwproc] Wait for Commands...
10,416,573 UART: [fwproc] Recv command 0x46574c44
10,418,668 UART: [fwproc] Recv'd Img size: 114448 bytes
13,855,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,926,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,995,567 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,314,222 >>> mbox cmd response: success
14,317,617 UART: [afmc] ++
14,318,225 UART: [afmc] CDI.KEYID = 6
14,319,140 UART: [afmc] SUBJECT.KEYID = 7
14,320,300 UART: [afmc] AUTHORITY.KEYID = 5
16,848,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,598 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,590,596 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,606,481 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,622,179 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,645,378 UART: [afmc] --
18,649,928 UART: [cold-reset] --
18,653,248 UART: [state] Locking Datavault
18,659,036 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,167 UART: [state] Locking ICCM
18,662,202 UART: [exit] Launching FMC @ 0x40000130
18,670,608 UART:
18,670,864 UART: Running Caliptra FMC ...
18,671,969 UART:
18,672,125 UART: [state] CFI Enabled
18,730,265 UART: [fht] FMC Alias Private Key: 7
20,494,223 UART: [art] Extend RT PCRs Done
20,495,424 UART: [art] Lock RT PCRs Done
20,496,882 UART: [art] Populate DV Done
20,502,400 UART: [fht] FMC Alias Private Key: 7
20,504,030 UART: [art] Derive CDI
20,504,859 UART: [art] Store in in slot 0x4
20,563,737 UART: [art] Derive Key Pair
20,564,732 UART: [art] Store priv key in slot 0x5
23,028,350 UART: [art] Derive Key Pair - Done
23,041,197 UART: [art] Signing Cert with AUTHO
23,042,509 UART: RITY.KEYID = 7
24,753,890 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,396 UART: [art] PUB.X = 78661D72AB1237469556D7172695C8C49117FA41F0CC0B9516A655454CD48E0F4B16A5449DF6FCCA9681DAB44485C679
24,762,641 UART: [art] PUB.Y = 99AA92B73A1A4BF302CD4379580EDCD69A6E46292015A31C7A35A124DD01BD80367F11F42CA0F9433F3573B83D8E1A25
24,769,926 UART: [art] SIG.R = 48EFF755D71563B56BF4E6C1A5C33BADFCFC86ECD5119883EBFBC0853705E472E803C2B63BE77DE2CC820477E28DE2B8
24,777,317 UART: [art] SIG.S = CB6563158423AD2BD5643116724AD7983BC3625F8E269A97A42D46C0B84E6FF6019CB6998DAC931DD02F0E113310186B
25,756,338 UART: Caliptra RT
25,757,050 UART: [state] CFI Enabled
25,922,401 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,283 UART:
1,568 UART: Running Caliptra ROM ...
2,683 UART:
2,836 UART: [state] CFI Enabled
61,979 UART: [state] LifecycleState = Production
63,737 UART: [state] DebugLocked = Yes
66,451 UART: [state] Starting the WD Timer 40000000 cycles
71,875 UART: [kat] SHA2-256
251,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,654 UART: [kat] ++
263,103 UART: [kat] sha1
274,193 UART: [kat] SHA2-256
277,201 UART: [kat] SHA2-384
281,937 UART: [kat] SHA2-512-ACC
284,922 UART: [kat] ECC-384
2,748,154 UART: [kat] HMAC-384Kdf
2,771,722 UART: [kat] LMS
3,301,213 UART: [kat] --
3,306,792 UART: [warm-reset] ++
3,311,909 UART: [warm-reset] --
3,316,959 UART: [state] Locking Datavault
3,319,993 UART: [state] Locking PCR0, PCR1 and PCR31
3,321,704 UART: [state] Locking ICCM
3,323,939 UART: [exit] Launching FMC @ 0x40000130
3,332,356 UART:
3,332,607 UART: Running Caliptra FMC ...
3,333,714 UART:
3,333,872 UART: [state] CFI Enabled
3,380,462 UART: [aliasrt :skip pcr extension
3,381,760 UART: [art] Extend RT PCRs Done
3,382,915 UART: [art] Lock RT PCRs Done
3,384,042 UART: [art] Populate DV Done
3,389,615 UART: [fht] FMC Alias Private Key: 7
3,391,204 UART: [art] Derive CDI
3,392,017 UART: [art] Store in in slot 0x4
3,448,792 UART: [art] Derive Key Pair
3,449,793 UART: [art] Store priv key in slot 0x5
5,913,076 UART: [art] Derive Key Pair - Done
5,926,453 UART: [art] Signing Cert with AUTHO
5,927,756 UART: RITY.KEYID = 7
7,638,269 UART: [art] Erasing AUTHORITY.KEYID = 7
7,639,787 UART: [art] PUB.X = 78661D72AB1237469556D7172695C8C49117FA41F0CC0B9516A655454CD48E0F4B16A5449DF6FCCA9681DAB44485C679
7,646,975 UART: [art] PUB.Y = 99AA92B73A1A4BF302CD4379580EDCD69A6E46292015A31C7A35A124DD01BD80367F11F42CA0F9433F3573B83D8E1A25
7,654,278 UART: [art] SIG.R = 48EFF755D71563B56BF4E6C1A5C33BADFCFC86ECD5119883EBFBC0853705E472E803C2B63BE77DE2CC820477E28DE2B8
7,661,675 UART: [art] SIG.S = CB6563158423AD2BD5643116724AD7983BC3625F8E269A97A42D46C0B84E6FF6019CB6998DAC931DD02F0E113310186B
8,641,215 UART: Caliptra RT
8,641,909 UART: [state] CFI Enabled
8,977,413 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
191,878 UART:
192,236 UART: Running Caliptra ROM ...
193,405 UART:
602,841 UART: [state] CFI Enabled
616,420 UART: [state] LifecycleState = Production
618,228 UART: [state] DebugLocked = Yes
620,719 UART: [state] Starting the WD Timer 40000000 cycles
626,171 UART: [kat] SHA2-256
805,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,922 UART: [kat] ++
817,452 UART: [kat] sha1
828,924 UART: [kat] SHA2-256
832,006 UART: [kat] SHA2-384
837,663 UART: [kat] SHA2-512-ACC
840,674 UART: [kat] ECC-384
3,281,009 UART: [kat] HMAC-384Kdf
3,293,965 UART: [kat] LMS
3,823,500 UART: [kat] --
3,828,204 UART: [cold-reset] ++
3,829,988 UART: [fht] FHT @ 0x50003400
3,840,893 UART: [idev] ++
3,841,455 UART: [idev] CDI.KEYID = 6
3,842,429 UART: [idev] SUBJECT.KEYID = 7
3,843,597 UART: [idev] UDS.KEYID = 0
3,844,639 ready_for_fw is high
3,844,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,645 UART: [idev] Erasing UDS.KEYID = 0
6,317,348 UART: [idev] Sha1 KeyId Algorithm
6,340,523 UART: [idev] --
6,344,531 UART: [ldev] ++
6,345,095 UART: [ldev] CDI.KEYID = 6
6,346,007 UART: [ldev] SUBJECT.KEYID = 5
6,347,221 UART: [ldev] AUTHORITY.KEYID = 7
6,348,449 UART: [ldev] FE.KEYID = 1
6,359,472 UART: [ldev] Erasing FE.KEYID = 1
8,830,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,214 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,564,210 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,580,079 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,596,034 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,616,863 UART: [ldev] --
10,621,895 UART: [fwproc] Wait for Commands...
10,624,970 UART: [fwproc] Recv command 0x46574c44
10,627,061 UART: [fwproc] Recv'd Img size: 114448 bytes
14,065,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,138,005 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,206,764 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,524,781 >>> mbox cmd response: success
14,529,792 UART: [afmc] ++
14,530,378 UART: [afmc] CDI.KEYID = 6
14,531,284 UART: [afmc] SUBJECT.KEYID = 7
14,532,575 UART: [afmc] AUTHORITY.KEYID = 5
17,035,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,759,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,760,910 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,776,908 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,792,731 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,808,475 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,831,129 UART: [afmc] --
18,835,078 UART: [cold-reset] --
18,840,617 UART: [state] Locking Datavault
18,847,068 UART: [state] Locking PCR0, PCR1 and PCR31
18,848,715 UART: [state] Locking ICCM
18,851,136 UART: [exit] Launching FMC @ 0x40000130
18,859,532 UART:
18,859,780 UART: Running Caliptra FMC ...
18,860,880 UART:
18,861,036 UART: [state] CFI Enabled
18,869,249 UART: [fht] FMC Alias Private Key: 7
20,626,048 UART: [art] Extend RT PCRs Done
20,627,262 UART: [art] Lock RT PCRs Done
20,628,830 UART: [art] Populate DV Done
20,634,130 UART: [fht] FMC Alias Private Key: 7
20,635,777 UART: [art] Derive CDI
20,636,585 UART: [art] Store in in slot 0x4
20,679,119 UART: [art] Derive Key Pair
20,680,110 UART: [art] Store priv key in slot 0x5
23,106,813 UART: [art] Derive Key Pair - Done
23,119,638 UART: [art] Signing Cert with AUTHO
23,120,935 UART: RITY.KEYID = 7
24,826,443 UART: [art] Erasing AUTHORITY.KEYID = 7
24,827,934 UART: [art] PUB.X = 91DC1CEBAB44D90FE173077BC30F0C56632D40AFAA10CB2569D3FEBBEE06D37700466E1EE747F6B740A1DABE20E47DAF
24,835,240 UART: [art] PUB.Y = 54A781F438C8B6C92C2A7C38002843C96DBDF5F1661617F305B127911EBE3D25B563C59BFE7FC66046050EB256F3FEF2
24,842,466 UART: [art] SIG.R = D02BA8BE5F49272E3F40A329928949A0E9F07CBEFE5C417BF889E0E099313023CC7F0FF259165D183B0A9A766187CE17
24,849,853 UART: [art] SIG.S = 402955CF394D19A9432D68A4ED9AEED96F112A937B03B5409540CC39ECC716A49E933C3D2C69B414BD8E88727B8114C8
25,828,310 UART: Caliptra RT
25,829,002 UART: [state] CFI Enabled
25,945,684 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,293 UART:
1,570 UART: Running Caliptra ROM ...
2,789 UART:
14,584,376 UART: [state] CFI Enabled
14,596,666 UART: [state] LifecycleState = Production
14,598,419 UART: [state] DebugLocked = Yes
14,600,702 UART: [state] Starting the WD Timer 40000000 cycles
14,605,055 UART: [kat] SHA2-256
14,784,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,795,746 UART: [kat] ++
14,796,202 UART: [kat] sha1
14,807,889 UART: [kat] SHA2-256
14,810,903 UART: [kat] SHA2-384
14,817,801 UART: [kat] SHA2-512-ACC
14,820,734 UART: [kat] ECC-384
17,261,452 UART: [kat] HMAC-384Kdf
17,273,834 UART: [kat] LMS
17,803,377 UART: [kat] --
17,806,710 UART: [warm-reset] ++
17,811,548 UART: [warm-reset] --
17,813,910 UART: [state] Locking Datavault
17,817,749 UART: [state] Locking PCR0, PCR1 and PCR31
17,819,397 UART: [state] Locking ICCM
17,821,277 UART: [exit] Launching FMC @ 0x40000130
17,829,727 UART:
17,829,959 UART: Running Caliptra FMC ...
17,831,052 UART:
17,831,206 UART: [state] CFI Enabled
17,833,417 UART: [aliasrt :skip pcr extension
17,834,652 UART: [art] Extend RT PCRs Done
17,835,786 UART: [art] Lock RT PCRs Done
17,837,118 UART: [art] Populate DV Done
17,842,679 UART: [fht] FMC Alias Private Key: 7
17,844,212 UART: [art] Derive CDI
17,845,022 UART: [art] Store in in slot 0x4
17,887,890 UART: [art] Derive Key Pair
17,888,950 UART: [art] Store priv key in slot 0x5
20,316,275 UART: [art] Derive Key Pair - Done
20,329,276 UART: [art] Signing Cert with AUTHO
20,330,572 UART: RITY.KEYID = 7
22,035,771 UART: [art] Erasing AUTHORITY.KEYID = 7
22,037,283 UART: [art] PUB.X = 91DC1CEBAB44D90FE173077BC30F0C56632D40AFAA10CB2569D3FEBBEE06D37700466E1EE747F6B740A1DABE20E47DAF
22,044,571 UART: [art] PUB.Y = 54A781F438C8B6C92C2A7C38002843C96DBDF5F1661617F305B127911EBE3D25B563C59BFE7FC66046050EB256F3FEF2
22,051,800 UART: [art] SIG.R = D02BA8BE5F49272E3F40A329928949A0E9F07CBEFE5C417BF889E0E099313023CC7F0FF259165D183B0A9A766187CE17
22,059,195 UART: [art] SIG.S = 402955CF394D19A9432D68A4ED9AEED96F112A937B03B5409540CC39ECC716A49E933C3D2C69B414BD8E88727B8114C8
23,038,385 UART: Caliptra RT
23,039,091 UART: [state] CFI Enabled
23,325,707 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
191,904 UART:
192,299 UART: Running Caliptra ROM ...
193,440 UART:
602,946 UART: [state] CFI Enabled
616,524 UART: [state] LifecycleState = Production
618,285 UART: [state] DebugLocked = Yes
619,772 UART: [state] Starting the WD Timer 40000000 cycles
625,222 UART: [kat] SHA2-256
804,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,982 UART: [kat] ++
816,503 UART: [kat] sha1
827,546 UART: [kat] SHA2-256
830,583 UART: [kat] SHA2-384
836,785 UART: [kat] SHA2-512-ACC
839,715 UART: [kat] ECC-384
3,282,122 UART: [kat] HMAC-384Kdf
3,294,421 UART: [kat] LMS
3,823,924 UART: [kat] --
3,828,274 UART: [cold-reset] ++
3,830,694 UART: [fht] FHT @ 0x50003400
3,841,381 UART: [idev] ++
3,841,941 UART: [idev] CDI.KEYID = 6
3,842,816 UART: [idev] SUBJECT.KEYID = 7
3,844,055 UART: [idev] UDS.KEYID = 0
3,845,129 ready_for_fw is high
3,845,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,906 UART: [idev] Erasing UDS.KEYID = 0
6,316,334 UART: [idev] Sha1 KeyId Algorithm
6,340,012 UART: [idev] --
6,343,550 UART: [ldev] ++
6,344,129 UART: [ldev] CDI.KEYID = 6
6,345,042 UART: [ldev] SUBJECT.KEYID = 5
6,346,199 UART: [ldev] AUTHORITY.KEYID = 7
6,347,478 UART: [ldev] FE.KEYID = 1
6,357,527 UART: [ldev] Erasing FE.KEYID = 1
8,832,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,567 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,566,575 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,582,391 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,598,322 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,617,521 UART: [ldev] --
10,622,885 UART: [fwproc] Wait for Commands...
10,625,185 UART: [fwproc] Recv command 0x46574c44
10,627,269 UART: [fwproc] Recv'd Img size: 114448 bytes
14,057,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,128,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,197,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,515,328 >>> mbox cmd response: success
14,518,776 UART: [afmc] ++
14,519,366 UART: [afmc] CDI.KEYID = 6
14,520,245 UART: [afmc] SUBJECT.KEYID = 7
14,521,454 UART: [afmc] AUTHORITY.KEYID = 5
17,021,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,739,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,741,707 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,757,721 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,773,546 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,789,264 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,811,126 UART: [afmc] --
18,815,300 UART: [cold-reset] --
18,818,746 UART: [state] Locking Datavault
18,822,975 UART: [state] Locking PCR0, PCR1 and PCR31
18,824,616 UART: [state] Locking ICCM
18,827,356 UART: [exit] Launching FMC @ 0x40000130
18,835,805 UART:
18,836,037 UART: Running Caliptra FMC ...
18,837,137 UART:
18,837,302 UART: [state] CFI Enabled
18,845,292 UART: [fht] FMC Alias Private Key: 7
20,602,419 UART: [art] Extend RT PCRs Done
20,603,621 UART: [art] Lock RT PCRs Done
20,605,452 UART: [art] Populate DV Done
20,610,697 UART: [fht] FMC Alias Private Key: 7
20,612,337 UART: [art] Derive CDI
20,613,144 UART: [art] Store in in slot 0x4
20,655,460 UART: [art] Derive Key Pair
20,656,510 UART: [art] Store priv key in slot 0x5
23,082,998 UART: [art] Derive Key Pair - Done
23,096,211 UART: [art] Signing Cert with AUTHO
23,097,523 UART: RITY.KEYID = 7
24,803,096 UART: [art] Erasing AUTHORITY.KEYID = 7
24,804,706 UART: [art] PUB.X = 27EEA459D8C7E6C205D3FD6F7F689E8D3D4F2919C2351674623E27F444AEA488ED02A62DDC283E7DF32C7D12262DD6FE
24,811,857 UART: [art] PUB.Y = FA80FE7DFF4BE51BA658E20484DED5B733761540F68F211D6099583C30616D5BB5F86D89CA8E92693123E969455BE6CA
24,819,166 UART: [art] SIG.R = F98E70CF5BAB912966483A72F801BFECB850F0D67D6F62E07D68D96C5C96FE58029A54603D0090D40593827194C987A5
24,826,525 UART: [art] SIG.S = A1ECF35A940CD2FD154042FB7136D0ADCE973FF0B889224B928D3EFBBE3777DCC6A940F020A43C5367D548D3AA175699
25,805,923 UART: Caliptra RT
25,806,639 UART: [state] CFI Enabled
25,923,783 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,326 UART:
1,612 UART: Running Caliptra ROM ...
2,720 UART:
14,605,565 UART: [state] CFI Enabled
14,619,522 UART: [state] LifecycleState = Production
14,621,284 UART: [state] DebugLocked = Yes
14,623,297 UART: [state] Starting the WD Timer 40000000 cycles
14,628,242 UART: [kat] SHA2-256
14,807,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,818,956 UART: [kat] ++
14,819,501 UART: [kat] sha1
14,830,067 UART: [kat] SHA2-256
14,833,085 UART: [kat] SHA2-384
14,838,959 UART: [kat] SHA2-512-ACC
14,841,946 UART: [kat] ECC-384
17,284,886 UART: [kat] HMAC-384Kdf
17,297,698 UART: [kat] LMS
17,827,223 UART: [kat] --
17,830,520 UART: [warm-reset] ++
17,835,110 UART: [warm-reset] --
17,836,967 UART: [state] Locking Datavault
17,839,765 UART: [state] Locking PCR0, PCR1 and PCR31
17,841,417 UART: [state] Locking ICCM
17,842,756 UART: [exit] Launching FMC @ 0x40000130
17,851,204 UART:
17,851,441 UART: Running Caliptra FMC ...
17,852,538 UART:
17,852,692 UART: [state] CFI Enabled
17,854,636 UART: [aliasrt :skip pcr extension
17,855,876 UART: [art] Extend RT PCRs Done
17,857,005 UART: [art] Lock RT PCRs Done
17,858,349 UART: [art] Populate DV Done
17,864,075 UART: [fht] FMC Alias Private Key: 7
17,865,714 UART: [art] Derive CDI
17,866,517 UART: [art] Store in in slot 0x4
17,909,446 UART: [art] Derive Key Pair
17,910,443 UART: [art] Store priv key in slot 0x5
20,337,361 UART: [art] Derive Key Pair - Done
20,350,406 UART: [art] Signing Cert with AUTHO
20,351,709 UART: RITY.KEYID = 7
22,057,778 UART: [art] Erasing AUTHORITY.KEYID = 7
22,059,287 UART: [art] PUB.X = 27EEA459D8C7E6C205D3FD6F7F689E8D3D4F2919C2351674623E27F444AEA488ED02A62DDC283E7DF32C7D12262DD6FE
22,066,542 UART: [art] PUB.Y = FA80FE7DFF4BE51BA658E20484DED5B733761540F68F211D6099583C30616D5BB5F86D89CA8E92693123E969455BE6CA
22,073,796 UART: [art] SIG.R = F98E70CF5BAB912966483A72F801BFECB850F0D67D6F62E07D68D96C5C96FE58029A54603D0090D40593827194C987A5
22,081,189 UART: [art] SIG.S = A1ECF35A940CD2FD154042FB7136D0ADCE973FF0B889224B928D3EFBBE3777DCC6A940F020A43C5367D548D3AA175699
23,060,009 UART: Caliptra RT
23,060,702 UART: [state] CFI Enabled
23,351,291 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
191,667 UART:
192,037 UART: Running Caliptra ROM ...
193,226 UART:
193,374 UART: [state] CFI Enabled
262,322 UART: [state] LifecycleState = Production
264,064 UART: [state] DebugLocked = Yes
266,208 UART: [state] Starting the WD Timer 40000000 cycles
270,598 UART: [kat] SHA2-256
449,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,295 UART: [kat] ++
461,831 UART: [kat] sha1
473,087 UART: [kat] SHA2-256
476,105 UART: [kat] SHA2-384
482,624 UART: [kat] SHA2-512-ACC
485,606 UART: [kat] ECC-384
2,946,929 UART: [kat] HMAC-384Kdf
2,970,540 UART: [kat] LMS
3,499,996 UART: [kat] --
3,504,699 UART: [cold-reset] ++
3,506,346 UART: [fht] FHT @ 0x50003400
3,517,692 UART: [idev] ++
3,518,458 UART: [idev] CDI.KEYID = 6
3,519,377 UART: [idev] SUBJECT.KEYID = 7
3,520,485 UART: [idev] UDS.KEYID = 0
3,521,408 ready_for_fw is high
3,521,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,453 UART: [idev] Erasing UDS.KEYID = 0
6,028,368 UART: [idev] Sha1 KeyId Algorithm
6,052,349 UART: [idev] --
6,056,561 UART: [ldev] ++
6,057,137 UART: [ldev] CDI.KEYID = 6
6,058,022 UART: [ldev] SUBJECT.KEYID = 5
6,059,202 UART: [ldev] AUTHORITY.KEYID = 7
6,060,498 UART: [ldev] FE.KEYID = 1
6,100,508 UART: [ldev] Erasing FE.KEYID = 1
8,603,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,870 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,355,867 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,684 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,672 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,863 UART: [ldev] --
10,413,603 UART: [fwproc] Wait for Commands...
10,416,348 UART: [fwproc] Recv command 0x46574c44
10,418,441 UART: [fwproc] Recv'd Img size: 114448 bytes
13,848,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,921,959 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,990,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,309,502 >>> mbox cmd response: success
14,314,294 UART: [afmc] ++
14,314,890 UART: [afmc] CDI.KEYID = 6
14,315,772 UART: [afmc] SUBJECT.KEYID = 7
14,316,986 UART: [afmc] AUTHORITY.KEYID = 5
16,849,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,576,817 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,592,777 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,608,631 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,624,387 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,647,835 UART: [afmc] --
18,652,173 UART: [cold-reset] --
18,656,198 UART: [state] Locking Datavault
18,659,660 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,359 UART: [state] Locking ICCM
18,663,723 UART: [exit] Launching FMC @ 0x40000130
18,672,143 UART:
18,672,384 UART: Running Caliptra FMC ...
18,673,488 UART:
18,673,643 UART: [state] CFI Enabled
18,731,952 UART: [fht] FMC Alias Private Key: 7
20,495,927 UART: [art] Extend RT PCRs Done
20,497,145 UART: [art] Lock RT PCRs Done
20,498,522 UART: [art] Populate DV Done
20,503,884 UART: [fht] FMC Alias Private Key: 7
20,505,419 UART: [art] Derive CDI
20,506,151 UART: [art] Store in in slot 0x4
20,563,955 UART: [art] Derive Key Pair
20,564,997 UART: [art] Store priv key in slot 0x5
23,027,592 UART: [art] Derive Key Pair - Done
23,040,425 UART: [art] Signing Cert with AUTHO
23,041,759 UART: RITY.KEYID = 7
24,754,002 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,514 UART: [art] PUB.X = F9AA4B02B27EA0627849B4D124D1A46138649B6B3F38742A176F721F65D111056292FF80FD3FFF7F9A0AE16AE4D2DB4E
24,762,765 UART: [art] PUB.Y = 8495ED777F5866D1B81A45E7E9C2F4734E86DAFB21A80B7DF72D00367393C87C86107C348686C5921E9FF37913401CDA
24,770,004 UART: [art] SIG.R = 83A8615B150873A4489F82E4FB4EF492D40801B48A3F506673DE30F409CC7FAFE1D50A761112DB9DE7E6E2B360B70AED
24,777,404 UART: [art] SIG.S = 72089F52A1000D0C090A59BC5B3985DF09BE4BCF23EA1E727FC6363AAE0CE3C9BC073314D4A9CEDBBF8E1B9E039D05D2
25,756,775 UART: Caliptra RT
25,757,490 UART: [state] CFI Enabled
25,922,983 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,304 UART:
1,510 UART: Running Caliptra ROM ...
2,629 UART:
2,785 UART: [state] CFI Enabled
62,088 UART: [state] LifecycleState = Production
63,812 UART: [state] DebugLocked = Yes
65,487 UART: [state] Starting the WD Timer 40000000 cycles
71,198 UART: [kat] SHA2-256
250,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
261,942 UART: [kat] ++
262,388 UART: [kat] sha1
272,716 UART: [kat] SHA2-256
275,718 UART: [kat] SHA2-384
281,965 UART: [kat] SHA2-512-ACC
284,945 UART: [kat] ECC-384
2,746,495 UART: [kat] HMAC-384Kdf
2,770,712 UART: [kat] LMS
3,300,184 UART: [kat] --
3,303,491 UART: [warm-reset] ++
3,307,967 UART: [warm-reset] --
3,312,057 UART: [state] Locking Datavault
3,315,797 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,442 UART: [state] Locking ICCM
3,319,857 UART: [exit] Launching FMC @ 0x40000130
3,328,317 UART:
3,328,569 UART: Running Caliptra FMC ...
3,329,670 UART:
3,329,831 UART: [state] CFI Enabled
3,380,852 UART: [aliasrt :skip pcr extension
3,382,148 UART: [art] Extend RT PCRs Done
3,383,295 UART: [art] Lock RT PCRs Done
3,384,362 UART: [art] Populate DV Done
3,390,199 UART: [fht] FMC Alias Private Key: 7
3,391,741 UART: [art] Derive CDI
3,392,557 UART: [art] Store in in slot 0x4
3,449,865 UART: [art] Derive Key Pair
3,450,907 UART: [art] Store priv key in slot 0x5
5,913,118 UART: [art] Derive Key Pair - Done
5,926,269 UART: [art] Signing Cert with AUTHO
5,927,587 UART: RITY.KEYID = 7
7,639,892 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,403 UART: [art] PUB.X = F9AA4B02B27EA0627849B4D124D1A46138649B6B3F38742A176F721F65D111056292FF80FD3FFF7F9A0AE16AE4D2DB4E
7,648,691 UART: [art] PUB.Y = 8495ED777F5866D1B81A45E7E9C2F4734E86DAFB21A80B7DF72D00367393C87C86107C348686C5921E9FF37913401CDA
7,655,925 UART: [art] SIG.R = 83A8615B150873A4489F82E4FB4EF492D40801B48A3F506673DE30F409CC7FAFE1D50A761112DB9DE7E6E2B360B70AED
7,663,318 UART: [art] SIG.S = 72089F52A1000D0C090A59BC5B3985DF09BE4BCF23EA1E727FC6363AAE0CE3C9BC073314D4A9CEDBBF8E1B9E039D05D2
8,641,698 UART: Caliptra RT
8,642,391 UART: [state] CFI Enabled
8,981,975 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
191,816 UART:
192,165 UART: Running Caliptra ROM ...
193,261 UART:
602,829 UART: [state] CFI Enabled
614,211 UART: [state] LifecycleState = Production
615,975 UART: [state] DebugLocked = Yes
617,968 UART: [state] Starting the WD Timer 40000000 cycles
622,709 UART: [kat] SHA2-256
801,814 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,398 UART: [kat] ++
813,935 UART: [kat] sha1
825,766 UART: [kat] SHA2-256
828,851 UART: [kat] SHA2-384
834,693 UART: [kat] SHA2-512-ACC
837,703 UART: [kat] ECC-384
3,280,086 UART: [kat] HMAC-384Kdf
3,292,675 UART: [kat] LMS
3,822,184 UART: [kat] --
3,827,102 UART: [cold-reset] ++
3,828,530 UART: [fht] FHT @ 0x50003400
3,840,348 UART: [idev] ++
3,840,952 UART: [idev] CDI.KEYID = 6
3,841,863 UART: [idev] SUBJECT.KEYID = 7
3,843,038 UART: [idev] UDS.KEYID = 0
3,844,105 ready_for_fw is high
3,844,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,873 UART: [idev] Erasing UDS.KEYID = 0
6,310,155 UART: [idev] Sha1 KeyId Algorithm
6,332,245 UART: [idev] --
6,337,720 UART: [ldev] ++
6,338,294 UART: [ldev] CDI.KEYID = 6
6,339,177 UART: [ldev] SUBJECT.KEYID = 5
6,340,386 UART: [ldev] AUTHORITY.KEYID = 7
6,341,617 UART: [ldev] FE.KEYID = 1
6,351,640 UART: [ldev] Erasing FE.KEYID = 1
8,825,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,829 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,560,825 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,576,644 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,592,625 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,613,736 UART: [ldev] --
10,619,159 UART: [fwproc] Wait for Commands...
10,621,947 UART: [fwproc] Recv command 0x46574c44
10,624,033 UART: [fwproc] Recv'd Img size: 114448 bytes
14,059,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,126,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,195,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,513,397 >>> mbox cmd response: success
14,518,380 UART: [afmc] ++
14,518,965 UART: [afmc] CDI.KEYID = 6
14,519,873 UART: [afmc] SUBJECT.KEYID = 7
14,521,084 UART: [afmc] AUTHORITY.KEYID = 5
17,020,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,743,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,745,095 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,761,055 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,776,915 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,792,640 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,816,082 UART: [afmc] --
18,820,379 UART: [cold-reset] --
18,822,835 UART: [state] Locking Datavault
18,827,710 UART: [state] Locking PCR0, PCR1 and PCR31
18,829,356 UART: [state] Locking ICCM
18,831,664 UART: [exit] Launching FMC @ 0x40000130
18,840,111 UART:
18,840,340 UART: Running Caliptra FMC ...
18,841,434 UART:
18,841,594 UART: [state] CFI Enabled
18,849,693 UART: [fht] FMC Alias Private Key: 7
20,606,039 UART: [art] Extend RT PCRs Done
20,607,264 UART: [art] Lock RT PCRs Done
20,608,672 UART: [art] Populate DV Done
20,614,269 UART: [fht] FMC Alias Private Key: 7
20,615,818 UART: [art] Derive CDI
20,616,626 UART: [art] Store in in slot 0x4
20,659,111 UART: [art] Derive Key Pair
20,660,151 UART: [art] Store priv key in slot 0x5
23,086,605 UART: [art] Derive Key Pair - Done
23,099,495 UART: [art] Signing Cert with AUTHO
23,100,795 UART: RITY.KEYID = 7
24,806,319 UART: [art] Erasing AUTHORITY.KEYID = 7
24,807,825 UART: [art] PUB.X = 636C8B717ADF475686845DF00EB0280C76614A2C61EEFB0CDDB14DBDE212B040637E5AA245149370610BB4FA697C16E6
24,815,084 UART: [art] PUB.Y = A47D655621DC741673BC681C25CB1B89F49108058ED99A3D857064088353322F998C1A6B1F3659419AE84C219273B6F3
24,822,276 UART: [art] SIG.R = E33AA3CC654295F597BB86411E00D0F32A75B5B2CD9920B25A3EBBD47901BD4500065CB7AA82E978860A4EF3373C8C37
24,829,629 UART: [art] SIG.S = 75F0E79EC8AE8BBD1AC2F4EBCCC647450D38FE2EC0DF68D6FE8307FBB5A55576099CA5191C0769A64146BF8B9D24FE37
25,809,150 UART: Caliptra RT
25,809,857 UART: [state] CFI Enabled
25,926,209 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,336 UART:
1,621 UART: Running Caliptra ROM ...
2,677 UART:
14,602,647 UART: [state] CFI Enabled
14,612,378 UART: [state] LifecycleState = Production
14,614,129 UART: [state] DebugLocked = Yes
14,617,139 UART: [state] Starting the WD Timer 40000000 cycles
14,621,377 UART: [kat] SHA2-256
14,800,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,812,052 UART: [kat] ++
14,812,511 UART: [kat] sha1
14,823,393 UART: [kat] SHA2-256
14,826,405 UART: [kat] SHA2-384
14,833,357 UART: [kat] SHA2-512-ACC
14,836,291 UART: [kat] ECC-384
17,278,347 UART: [kat] HMAC-384Kdf
17,290,081 UART: [kat] LMS
17,819,619 UART: [kat] --
17,825,591 UART: [warm-reset] ++
17,831,048 UART: [warm-reset] --
17,833,669 UART: [state] Locking Datavault
17,835,787 UART: [state] Locking PCR0, PCR1 and PCR31
17,837,480 UART: [state] Locking ICCM
17,839,681 UART: [exit] Launching FMC @ 0x40000130
17,848,130 UART:
17,848,363 UART: Running Caliptra FMC ...
17,849,458 UART:
17,849,610 UART: [state] CFI Enabled
17,851,497 UART: [aliasrt :skip pcr extension
17,852,734 UART: [art] Extend RT PCRs Done
17,853,861 UART: [art] Lock RT PCRs Done
17,855,315 UART: [art] Populate DV Done
17,860,768 UART: [fht] FMC Alias Private Key: 7
17,862,296 UART: [art] Derive CDI
17,863,109 UART: [art] Store in in slot 0x4
17,905,968 UART: [art] Derive Key Pair
17,906,996 UART: [art] Store priv key in slot 0x5
20,332,926 UART: [art] Derive Key Pair - Done
20,346,192 UART: [art] Signing Cert with AUTHO
20,347,485 UART: RITY.KEYID = 7
22,053,216 UART: [art] Erasing AUTHORITY.KEYID = 7
22,054,723 UART: [art] PUB.X = 636C8B717ADF475686845DF00EB0280C76614A2C61EEFB0CDDB14DBDE212B040637E5AA245149370610BB4FA697C16E6
22,062,013 UART: [art] PUB.Y = A47D655621DC741673BC681C25CB1B89F49108058ED99A3D857064088353322F998C1A6B1F3659419AE84C219273B6F3
22,069,229 UART: [art] SIG.R = E33AA3CC654295F597BB86411E00D0F32A75B5B2CD9920B25A3EBBD47901BD4500065CB7AA82E978860A4EF3373C8C37
22,076,591 UART: [art] SIG.S = 75F0E79EC8AE8BBD1AC2F4EBCCC647450D38FE2EC0DF68D6FE8307FBB5A55576099CA5191C0769A64146BF8B9D24FE37
23,056,017 UART: Caliptra RT
23,056,723 UART: [state] CFI Enabled
23,345,063 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,991 UART: [state] LifecycleState = Production
85,599 UART: [state] DebugLocked = Yes
86,329 UART: [state] Starting the WD Timer 40000000 cycles
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,170,126 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,174,056 ready_for_fw is high
1,174,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,711 UART: [idev] Erasing UDS.KEYID = 0
1,199,036 UART: [idev] Sha1 KeyId Algorithm
1,207,863 UART: [idev] --
1,208,872 UART: [ldev] ++
1,209,040 UART: [ldev] CDI.KEYID = 6
1,209,404 UART: [ldev] SUBJECT.KEYID = 5
1,209,831 UART: [ldev] AUTHORITY.KEYID = 7
1,210,294 UART: [ldev] FE.KEYID = 1
1,215,852 UART: [ldev] Erasing FE.KEYID = 1
1,241,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,323 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,017 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,887 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,593 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,621 UART: [ldev] --
1,281,041 UART: [fwproc] Wait for Commands...
1,281,652 UART: [fwproc] Recv command 0x46574c44
1,282,385 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,511 >>> mbox cmd response: success
2,799,569 UART: [afmc] ++
2,799,737 UART: [afmc] CDI.KEYID = 6
2,800,100 UART: [afmc] SUBJECT.KEYID = 7
2,800,526 UART: [afmc] AUTHORITY.KEYID = 5
2,836,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,402 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,121 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,014 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,721 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,638 UART: [afmc] --
2,879,517 UART: [cold-reset] --
2,880,255 UART: [state] Locking Datavault
2,881,432 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,036 UART: [state] Locking ICCM
2,882,484 UART: [exit] Launching FMC @ 0x40000130
2,887,813 UART:
2,887,829 UART: Running Caliptra FMC ...
2,888,237 UART:
2,888,291 UART: [state] CFI Enabled
2,898,824 UART: [fht] FMC Alias Private Key: 7
3,006,963 UART: [art] Extend RT PCRs Done
3,007,391 UART: [art] Lock RT PCRs Done
3,009,085 UART: [art] Populate DV Done
3,017,227 UART: [fht] FMC Alias Private Key: 7
3,018,269 UART: [art] Derive CDI
3,018,549 UART: [art] Store in in slot 0x4
3,104,314 UART: [art] Derive Key Pair
3,104,674 UART: [art] Store priv key in slot 0x5
3,117,542 UART: [art] Derive Key Pair - Done
3,132,433 UART: [art] Signing Cert with AUTHO
3,132,913 UART: RITY.KEYID = 7
3,148,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,782 UART: [art] PUB.X = CD9FABA61C436985938520EC8AF939F8F5DD10B684E9EF11417012781B6A5AAD8C6B395B78D8EF2C57F0DBFF64E55A12
3,155,566 UART: [art] PUB.Y = 150BF2CA3DA35792FEEC3747432856EDFBC1843A802D875C0AE701AD894F18CAC26A5F120E5281ADAB9202E5E7E83B2E
3,162,515 UART: [art] SIG.R = 314ACAC32836ABDF63A88A71FC573FE9CC08CD70A77E56BBBAF31C4B6C20983489D92A888C2228DBADEDB5E34DE2B0F0
3,169,306 UART: [art] SIG.S = 0DFD0410C755F1267DB4005895F43A47F647FA74BE65CB0549FE04D91F5A77F9D2C79954BF60E43A800E0C9AEEE55F3A
3,193,041 UART: Caliptra RT
3,193,294 UART: [state] CFI Enabled
3,300,590 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,346 UART:
3,301,362 UART: Running Caliptra ROM ...
3,301,770 UART:
3,301,825 UART: [state] CFI Enabled
3,304,274 UART: [state] LifecycleState = Production
3,304,882 UART: [state] DebugLocked = Yes
3,305,518 UART: [state] Starting the WD Timer 40000000 cycles
3,307,207 UART: [kat] SHA2-256
4,110,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,886 UART: [kat] ++
4,115,038 UART: [kat] sha1
4,119,390 UART: [kat] SHA2-256
4,121,330 UART: [kat] SHA2-384
4,124,149 UART: [kat] SHA2-512-ACC
4,126,050 UART: [kat] ECC-384
4,135,669 UART: [kat] HMAC-384Kdf
4,140,223 UART: [kat] LMS
4,388,535 UART: [kat] --
4,389,171 UART: [warm-reset] ++
4,390,094 UART: [warm-reset] --
4,391,003 UART: [state] Locking Datavault
4,391,617 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,221 UART: [state] Locking ICCM
4,392,819 UART: [exit] Launching FMC @ 0x40000130
4,398,148 UART:
4,398,164 UART: Running Caliptra FMC ...
4,398,572 UART:
4,398,626 UART: [state] CFI Enabled
4,399,987 UART: [aliasrt :skip pcr extension
4,400,460 UART: [art] Extend RT PCRs Done
4,400,888 UART: [art] Lock RT PCRs Done
4,402,319 UART: [art] Populate DV Done
4,410,579 UART: [fht] FMC Alias Private Key: 7
4,411,537 UART: [art] Derive CDI
4,411,817 UART: [art] Store in in slot 0x4
4,497,258 UART: [art] Derive Key Pair
4,497,618 UART: [art] Store priv key in slot 0x5
4,511,084 UART: [art] Derive Key Pair - Done
4,526,233 UART: [art] Signing Cert with AUTHO
4,526,713 UART: RITY.KEYID = 7
4,541,813 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,578 UART: [art] PUB.X = CD9FABA61C436985938520EC8AF939F8F5DD10B684E9EF11417012781B6A5AAD8C6B395B78D8EF2C57F0DBFF64E55A12
4,549,362 UART: [art] PUB.Y = 150BF2CA3DA35792FEEC3747432856EDFBC1843A802D875C0AE701AD894F18CAC26A5F120E5281ADAB9202E5E7E83B2E
4,556,311 UART: [art] SIG.R = 314ACAC32836ABDF63A88A71FC573FE9CC08CD70A77E56BBBAF31C4B6C20983489D92A888C2228DBADEDB5E34DE2B0F0
4,563,102 UART: [art] SIG.S = 0DFD0410C755F1267DB4005895F43A47F647FA74BE65CB0549FE04D91F5A77F9D2C79954BF60E43A800E0C9AEEE55F3A
4,586,667 UART: Caliptra RT
4,586,920 UART: [state] CFI Enabled
4,871,774 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,865 UART: [state] LifecycleState = Production
85,473 UART: [state] DebugLocked = Yes
86,043 UART: [state] Starting the WD Timer 40000000 cycles
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,296 UART: [kat] SHA2-512-ACC
906,197 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,776 UART: [kat] LMS
1,169,088 UART: [kat] --
1,170,167 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,174,502 ready_for_fw is high
1,174,502 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,015 UART: [idev] Erasing UDS.KEYID = 0
1,199,308 UART: [idev] Sha1 KeyId Algorithm
1,208,167 UART: [idev] --
1,209,270 UART: [ldev] ++
1,209,438 UART: [ldev] CDI.KEYID = 6
1,209,802 UART: [ldev] SUBJECT.KEYID = 5
1,210,229 UART: [ldev] AUTHORITY.KEYID = 7
1,210,692 UART: [ldev] FE.KEYID = 1
1,216,044 UART: [ldev] Erasing FE.KEYID = 1
1,242,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,769 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,463 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,333 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,039 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,945 UART: [ldev] --
1,281,383 UART: [fwproc] Wait for Commands...
1,282,104 UART: [fwproc] Recv command 0x46574c44
1,282,837 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,548 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,653 >>> mbox cmd response: success
2,800,689 UART: [afmc] ++
2,800,857 UART: [afmc] CDI.KEYID = 6
2,801,220 UART: [afmc] SUBJECT.KEYID = 7
2,801,646 UART: [afmc] AUTHORITY.KEYID = 5
2,836,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,583 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,334 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,053 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,946 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,653 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,392 UART: [afmc] --
2,880,479 UART: [cold-reset] --
2,881,199 UART: [state] Locking Datavault
2,882,454 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,058 UART: [state] Locking ICCM
2,883,576 UART: [exit] Launching FMC @ 0x40000130
2,888,905 UART:
2,888,921 UART: Running Caliptra FMC ...
2,889,329 UART:
2,889,383 UART: [state] CFI Enabled
2,899,600 UART: [fht] FMC Alias Private Key: 7
3,006,831 UART: [art] Extend RT PCRs Done
3,007,259 UART: [art] Lock RT PCRs Done
3,008,783 UART: [art] Populate DV Done
3,016,983 UART: [fht] FMC Alias Private Key: 7
3,017,917 UART: [art] Derive CDI
3,018,197 UART: [art] Store in in slot 0x4
3,104,032 UART: [art] Derive Key Pair
3,104,392 UART: [art] Store priv key in slot 0x5
3,116,814 UART: [art] Derive Key Pair - Done
3,131,410 UART: [art] Signing Cert with AUTHO
3,131,890 UART: RITY.KEYID = 7
3,146,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,625 UART: [art] PUB.X = C9B68761462CD81F78D4E281F61AD0D524064D264644C6FEF4377C186EE83F8C4F9B366B79DE38A1F3609466C0594025
3,154,388 UART: [art] PUB.Y = E0D51D7DD10D56AB94D5D5834CAC4C6FDFFEDE5631393A08FD21FB8411002485328502E7C0E180CE25E65ABFE8B97B5E
3,161,323 UART: [art] SIG.R = 2E21DFA767E2D9645C093841F41462AA24665E45190478FBF1E1882F40FFAC174040DB3AE40E8F6CCA7D6FD204CAAEB2
3,168,093 UART: [art] SIG.S = C1F92A656C81C3AD686CDD8671C97CF71FFB27D32FBB08B6325E583B9C2CD2636BE11211BE7059E4B23CFAF2B0E64C28
3,192,225 UART: Caliptra RT
3,192,478 UART: [state] CFI Enabled
3,300,011 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,767 UART:
3,300,783 UART: Running Caliptra ROM ...
3,301,191 UART:
3,301,246 UART: [state] CFI Enabled
3,303,943 UART: [state] LifecycleState = Production
3,304,551 UART: [state] DebugLocked = Yes
3,305,201 UART: [state] Starting the WD Timer 40000000 cycles
3,306,774 UART: [kat] SHA2-256
4,110,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,453 UART: [kat] ++
4,114,605 UART: [kat] sha1
4,118,961 UART: [kat] SHA2-256
4,120,901 UART: [kat] SHA2-384
4,123,434 UART: [kat] SHA2-512-ACC
4,125,335 UART: [kat] ECC-384
4,135,062 UART: [kat] HMAC-384Kdf
4,139,652 UART: [kat] LMS
4,387,964 UART: [kat] --
4,388,914 UART: [warm-reset] ++
4,389,921 UART: [warm-reset] --
4,390,788 UART: [state] Locking Datavault
4,391,766 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,370 UART: [state] Locking ICCM
4,392,986 UART: [exit] Launching FMC @ 0x40000130
4,398,315 UART:
4,398,331 UART: Running Caliptra FMC ...
4,398,739 UART:
4,398,793 UART: [state] CFI Enabled
4,399,872 UART: [aliasrt :skip pcr extension
4,400,345 UART: [art] Extend RT PCRs Done
4,400,773 UART: [art] Lock RT PCRs Done
4,401,652 UART: [art] Populate DV Done
4,409,746 UART: [fht] FMC Alias Private Key: 7
4,410,704 UART: [art] Derive CDI
4,410,984 UART: [art] Store in in slot 0x4
4,496,855 UART: [art] Derive Key Pair
4,497,215 UART: [art] Store priv key in slot 0x5
4,510,761 UART: [art] Derive Key Pair - Done
4,525,413 UART: [art] Signing Cert with AUTHO
4,525,893 UART: RITY.KEYID = 7
4,541,711 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,476 UART: [art] PUB.X = C9B68761462CD81F78D4E281F61AD0D524064D264644C6FEF4377C186EE83F8C4F9B366B79DE38A1F3609466C0594025
4,549,239 UART: [art] PUB.Y = E0D51D7DD10D56AB94D5D5834CAC4C6FDFFEDE5631393A08FD21FB8411002485328502E7C0E180CE25E65ABFE8B97B5E
4,556,174 UART: [art] SIG.R = 2E21DFA767E2D9645C093841F41462AA24665E45190478FBF1E1882F40FFAC174040DB3AE40E8F6CCA7D6FD204CAAEB2
4,562,944 UART: [art] SIG.S = C1F92A656C81C3AD686CDD8671C97CF71FFB27D32FBB08B6325E583B9C2CD2636BE11211BE7059E4B23CFAF2B0E64C28
4,586,506 UART: Caliptra RT
4,586,759 UART: [state] CFI Enabled
4,869,088 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Production
85,984 UART: [state] DebugLocked = Yes
86,536 UART: [state] Starting the WD Timer 40000000 cycles
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,767 UART: [kat] HMAC-384Kdf
921,611 UART: [kat] LMS
1,169,923 UART: [kat] --
1,170,934 UART: [cold-reset] ++
1,171,359 UART: [fht] FHT @ 0x50003400
1,173,859 UART: [idev] ++
1,174,027 UART: [idev] CDI.KEYID = 6
1,174,388 UART: [idev] SUBJECT.KEYID = 7
1,174,813 UART: [idev] UDS.KEYID = 0
1,175,159 ready_for_fw is high
1,175,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,199,327 UART: [idev] Sha1 KeyId Algorithm
1,208,170 UART: [idev] --
1,209,167 UART: [ldev] ++
1,209,335 UART: [ldev] CDI.KEYID = 6
1,209,699 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,506 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,200 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,070 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,776 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,754 UART: [ldev] --
1,282,192 UART: [fwproc] Wait for Commands...
1,282,937 UART: [fwproc] Recv command 0x46574c44
1,283,670 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,740 >>> mbox cmd response: success
2,801,982 UART: [afmc] ++
2,802,150 UART: [afmc] CDI.KEYID = 6
2,802,513 UART: [afmc] SUBJECT.KEYID = 7
2,802,939 UART: [afmc] AUTHORITY.KEYID = 5
2,838,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,383 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,102 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,995 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,702 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,417 UART: [afmc] --
2,881,332 UART: [cold-reset] --
2,882,094 UART: [state] Locking Datavault
2,883,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,013 UART: [state] Locking ICCM
2,884,465 UART: [exit] Launching FMC @ 0x40000130
2,889,794 UART:
2,889,810 UART: Running Caliptra FMC ...
2,890,218 UART:
2,890,361 UART: [state] CFI Enabled
2,901,088 UART: [fht] FMC Alias Private Key: 7
3,009,271 UART: [art] Extend RT PCRs Done
3,009,699 UART: [art] Lock RT PCRs Done
3,011,283 UART: [art] Populate DV Done
3,019,703 UART: [fht] FMC Alias Private Key: 7
3,020,709 UART: [art] Derive CDI
3,020,989 UART: [art] Store in in slot 0x4
3,106,746 UART: [art] Derive Key Pair
3,107,106 UART: [art] Store priv key in slot 0x5
3,120,956 UART: [art] Derive Key Pair - Done
3,135,323 UART: [art] Signing Cert with AUTHO
3,135,803 UART: RITY.KEYID = 7
3,150,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,530 UART: [art] PUB.X = F6131F74BCA284E9F37CE526C4BB036D0ACCB75AC061DD38D975E21F2B304F3456989709FD8199EC783DCA5449FF1C57
3,158,301 UART: [art] PUB.Y = 54CD2D17B7023541A826BA6F683114FB70EAD58ED345334386720D37231556C63CDEF3B3B71CD3B687C3565E363E25BF
3,165,245 UART: [art] SIG.R = 1D8CF77A6FC9FBE00CA956F3A9E462F25CA4352D591319FC5211639D280E98A5B3505D89976E4882FDE0274B6B703DFB
3,172,015 UART: [art] SIG.S = EE78F50DC65FC5B71AB3F12F2D56E1C0A6D8401D82E4B372FECCE3ACCC0511070DCDDF51355DD3BF10F980C562C43A71
3,196,204 UART: Caliptra RT
3,196,549 UART: [state] CFI Enabled
3,303,934 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,690 UART:
3,304,706 UART: Running Caliptra ROM ...
3,305,114 UART:
3,305,256 UART: [state] CFI Enabled
3,308,211 UART: [state] LifecycleState = Production
3,308,819 UART: [state] DebugLocked = Yes
3,309,487 UART: [state] Starting the WD Timer 40000000 cycles
3,311,202 UART: [kat] SHA2-256
4,114,752 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,881 UART: [kat] ++
4,119,033 UART: [kat] sha1
4,123,457 UART: [kat] SHA2-256
4,125,397 UART: [kat] SHA2-384
4,127,980 UART: [kat] SHA2-512-ACC
4,129,881 UART: [kat] ECC-384
4,139,648 UART: [kat] HMAC-384Kdf
4,144,154 UART: [kat] LMS
4,392,466 UART: [kat] --
4,393,260 UART: [warm-reset] ++
4,394,213 UART: [warm-reset] --
4,395,128 UART: [state] Locking Datavault
4,395,976 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,580 UART: [state] Locking ICCM
4,397,120 UART: [exit] Launching FMC @ 0x40000130
4,402,449 UART:
4,402,465 UART: Running Caliptra FMC ...
4,402,873 UART:
4,403,016 UART: [state] CFI Enabled
4,404,475 UART: [aliasrt :skip pcr extension
4,404,948 UART: [art] Extend RT PCRs Done
4,405,376 UART: [art] Lock RT PCRs Done
4,406,315 UART: [art] Populate DV Done
4,414,649 UART: [fht] FMC Alias Private Key: 7
4,415,717 UART: [art] Derive CDI
4,415,997 UART: [art] Store in in slot 0x4
4,501,602 UART: [art] Derive Key Pair
4,501,962 UART: [art] Store priv key in slot 0x5
4,515,430 UART: [art] Derive Key Pair - Done
4,530,101 UART: [art] Signing Cert with AUTHO
4,530,581 UART: RITY.KEYID = 7
4,546,077 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,842 UART: [art] PUB.X = F6131F74BCA284E9F37CE526C4BB036D0ACCB75AC061DD38D975E21F2B304F3456989709FD8199EC783DCA5449FF1C57
4,553,613 UART: [art] PUB.Y = 54CD2D17B7023541A826BA6F683114FB70EAD58ED345334386720D37231556C63CDEF3B3B71CD3B687C3565E363E25BF
4,560,557 UART: [art] SIG.R = 1D8CF77A6FC9FBE00CA956F3A9E462F25CA4352D591319FC5211639D280E98A5B3505D89976E4882FDE0274B6B703DFB
4,567,327 UART: [art] SIG.S = EE78F50DC65FC5B71AB3F12F2D56E1C0A6D8401D82E4B372FECCE3ACCC0511070DCDDF51355DD3BF10F980C562C43A71
4,590,716 UART: Caliptra RT
4,591,061 UART: [state] CFI Enabled
4,874,588 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Production
85,608 UART: [state] DebugLocked = Yes
86,292 UART: [state] Starting the WD Timer 40000000 cycles
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,733 UART: [kat] SHA2-512-ACC
906,634 UART: [kat] ECC-384
916,829 UART: [kat] HMAC-384Kdf
921,435 UART: [kat] LMS
1,169,747 UART: [kat] --
1,170,786 UART: [cold-reset] ++
1,171,179 UART: [fht] FHT @ 0x50003400
1,173,931 UART: [idev] ++
1,174,099 UART: [idev] CDI.KEYID = 6
1,174,460 UART: [idev] SUBJECT.KEYID = 7
1,174,885 UART: [idev] UDS.KEYID = 0
1,175,231 ready_for_fw is high
1,175,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,607 UART: [idev] Sha1 KeyId Algorithm
1,208,454 UART: [idev] --
1,209,525 UART: [ldev] ++
1,209,693 UART: [ldev] CDI.KEYID = 6
1,210,057 UART: [ldev] SUBJECT.KEYID = 5
1,210,484 UART: [ldev] AUTHORITY.KEYID = 7
1,210,947 UART: [ldev] FE.KEYID = 1
1,216,227 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,314 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,008 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,878 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,584 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,558 UART: [ldev] --
1,281,894 UART: [fwproc] Wait for Commands...
1,282,547 UART: [fwproc] Recv command 0x46574c44
1,283,280 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,032 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,386 >>> mbox cmd response: success
2,801,556 UART: [afmc] ++
2,801,724 UART: [afmc] CDI.KEYID = 6
2,802,087 UART: [afmc] SUBJECT.KEYID = 7
2,802,513 UART: [afmc] AUTHORITY.KEYID = 5
2,838,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,855,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,856,035 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,754 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,647 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,873,354 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,881,229 UART: [afmc] --
2,882,332 UART: [cold-reset] --
2,883,324 UART: [state] Locking Datavault
2,884,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,885,051 UART: [state] Locking ICCM
2,885,653 UART: [exit] Launching FMC @ 0x40000130
2,890,982 UART:
2,890,998 UART: Running Caliptra FMC ...
2,891,406 UART:
2,891,549 UART: [state] CFI Enabled
2,902,384 UART: [fht] FMC Alias Private Key: 7
3,010,137 UART: [art] Extend RT PCRs Done
3,010,565 UART: [art] Lock RT PCRs Done
3,012,219 UART: [art] Populate DV Done
3,020,701 UART: [fht] FMC Alias Private Key: 7
3,021,853 UART: [art] Derive CDI
3,022,133 UART: [art] Store in in slot 0x4
3,108,036 UART: [art] Derive Key Pair
3,108,396 UART: [art] Store priv key in slot 0x5
3,121,846 UART: [art] Derive Key Pair - Done
3,136,562 UART: [art] Signing Cert with AUTHO
3,137,042 UART: RITY.KEYID = 7
3,152,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,153,021 UART: [art] PUB.X = 8544BA83AAE58FF3C7BCE4F625A33CDC46FFC5B37F23BADEB8E2E474306E1C98E420D06E184976EC0014C1C7D5F895BD
3,159,789 UART: [art] PUB.Y = 2D89B8360AEDDA1A4E649FBF6C93D2EA5B2184AAB6034E4EC12AE8DE2B42B0B5B6DEB378853BFAB22C2C99CA65CEA287
3,166,761 UART: [art] SIG.R = 4986159EDDA4431DA2D29D701105775B71C8CD38CFFCDD070D79A97FE5D92B68796C36EF0AEA7812CCD349CA758C38EE
3,173,533 UART: [art] SIG.S = DC198F23AA4A569072127757C2C77972AB71A233FDF9A9AB6941C5E96A28A39247ECBDA836F7ADAE6907B6E3325FC502
3,197,008 UART: Caliptra RT
3,197,353 UART: [state] CFI Enabled
3,305,586 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,306,342 UART:
3,306,358 UART: Running Caliptra ROM ...
3,306,766 UART:
3,306,908 UART: [state] CFI Enabled
3,309,685 UART: [state] LifecycleState = Production
3,310,293 UART: [state] DebugLocked = Yes
3,310,809 UART: [state] Starting the WD Timer 40000000 cycles
3,312,276 UART: [kat] SHA2-256
4,115,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,119,955 UART: [kat] ++
4,120,107 UART: [kat] sha1
4,124,389 UART: [kat] SHA2-256
4,126,329 UART: [kat] SHA2-384
4,129,120 UART: [kat] SHA2-512-ACC
4,131,021 UART: [kat] ECC-384
4,140,568 UART: [kat] HMAC-384Kdf
4,145,168 UART: [kat] LMS
4,393,480 UART: [kat] --
4,394,258 UART: [warm-reset] ++
4,394,915 UART: [warm-reset] --
4,395,792 UART: [state] Locking Datavault
4,396,368 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,972 UART: [state] Locking ICCM
4,397,494 UART: [exit] Launching FMC @ 0x40000130
4,402,823 UART:
4,402,839 UART: Running Caliptra FMC ...
4,403,247 UART:
4,403,390 UART: [state] CFI Enabled
4,404,961 UART: [aliasrt :skip pcr extension
4,405,434 UART: [art] Extend RT PCRs Done
4,405,862 UART: [art] Lock RT PCRs Done
4,407,223 UART: [art] Populate DV Done
4,415,537 UART: [fht] FMC Alias Private Key: 7
4,416,565 UART: [art] Derive CDI
4,416,845 UART: [art] Store in in slot 0x4
4,502,888 UART: [art] Derive Key Pair
4,503,248 UART: [art] Store priv key in slot 0x5
4,516,560 UART: [art] Derive Key Pair - Done
4,531,320 UART: [art] Signing Cert with AUTHO
4,531,800 UART: RITY.KEYID = 7
4,546,932 UART: [art] Erasing AUTHORITY.KEYID = 7
4,547,697 UART: [art] PUB.X = 8544BA83AAE58FF3C7BCE4F625A33CDC46FFC5B37F23BADEB8E2E474306E1C98E420D06E184976EC0014C1C7D5F895BD
4,554,465 UART: [art] PUB.Y = 2D89B8360AEDDA1A4E649FBF6C93D2EA5B2184AAB6034E4EC12AE8DE2B42B0B5B6DEB378853BFAB22C2C99CA65CEA287
4,561,437 UART: [art] SIG.R = 4986159EDDA4431DA2D29D701105775B71C8CD38CFFCDD070D79A97FE5D92B68796C36EF0AEA7812CCD349CA758C38EE
4,568,209 UART: [art] SIG.S = DC198F23AA4A569072127757C2C77972AB71A233FDF9A9AB6941C5E96A28A39247ECBDA836F7ADAE6907B6E3325FC502
4,591,402 UART: Caliptra RT
4,591,747 UART: [state] CFI Enabled
4,875,126 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,907 UART: [state] LifecycleState = Production
85,515 UART: [state] DebugLocked = Yes
86,197 UART: [state] Starting the WD Timer 40000000 cycles
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,398 UART: [kat] LMS
1,168,710 UART: [kat] --
1,169,721 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,174,340 ready_for_fw is high
1,174,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,199,172 UART: [idev] Sha1 KeyId Algorithm
1,208,201 UART: [idev] --
1,209,346 UART: [ldev] ++
1,209,514 UART: [ldev] CDI.KEYID = 6
1,209,878 UART: [ldev] SUBJECT.KEYID = 5
1,210,305 UART: [ldev] AUTHORITY.KEYID = 7
1,210,768 UART: [ldev] FE.KEYID = 1
1,215,998 UART: [ldev] Erasing FE.KEYID = 1
1,241,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,991 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,861 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,567 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,779 UART: [ldev] --
1,281,053 UART: [fwproc] Wait for Commands...
1,281,852 UART: [fwproc] Recv command 0x46574c44
1,282,585 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,627 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,936 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,945 >>> mbox cmd response: success
2,800,071 UART: [afmc] ++
2,800,239 UART: [afmc] CDI.KEYID = 6
2,800,602 UART: [afmc] SUBJECT.KEYID = 7
2,801,028 UART: [afmc] AUTHORITY.KEYID = 5
2,836,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,938 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,657 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,550 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,257 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,300 UART: [afmc] --
2,880,183 UART: [cold-reset] --
2,880,941 UART: [state] Locking Datavault
2,882,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,844 UART: [state] Locking ICCM
2,883,400 UART: [exit] Launching FMC @ 0x40000130
2,888,729 UART:
2,888,745 UART: Running Caliptra FMC ...
2,889,153 UART:
2,889,207 UART: [state] CFI Enabled
2,899,796 UART: [fht] FMC Alias Private Key: 7
3,007,689 UART: [art] Extend RT PCRs Done
3,008,117 UART: [art] Lock RT PCRs Done
3,009,303 UART: [art] Populate DV Done
3,017,365 UART: [fht] FMC Alias Private Key: 7
3,018,531 UART: [art] Derive CDI
3,018,811 UART: [art] Store in in slot 0x4
3,104,330 UART: [art] Derive Key Pair
3,104,690 UART: [art] Store priv key in slot 0x5
3,118,218 UART: [art] Derive Key Pair - Done
3,132,961 UART: [art] Signing Cert with AUTHO
3,133,441 UART: RITY.KEYID = 7
3,148,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,360 UART: [art] PUB.X = E5E5E2C1597BB91E052CCEBA5F942111B82E889DAAE3E975B9F94C7F8770DE91A61FEF15D28B76D1234B5D3D513E41A6
3,156,141 UART: [art] PUB.Y = 86112ACCEE376404B1AFD38AE3661EEDE37362F9E0462334D383AC74CDE128ACD2A9D65F369CFD7A5407960BD2A8D70A
3,163,093 UART: [art] SIG.R = AF3D3B022FC3EFD5E23896A810B788BC3274FD77CE59308C93849EC9FFFB2E21C1F562F09B0CC8683F10481E749740CB
3,169,867 UART: [art] SIG.S = 14413FDBEF22E236B989BE92D8377F75ACE515006555BE37268904F6AB48EAF847CCE0128DD30CD09077962A0DD48E03
3,193,790 UART: Caliptra RT
3,194,043 UART: [state] CFI Enabled
3,301,608 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,364 UART:
3,302,380 UART: Running Caliptra ROM ...
3,302,788 UART:
3,302,843 UART: [state] CFI Enabled
3,305,448 UART: [state] LifecycleState = Production
3,306,056 UART: [state] DebugLocked = Yes
3,306,784 UART: [state] Starting the WD Timer 40000000 cycles
3,308,399 UART: [kat] SHA2-256
4,111,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,078 UART: [kat] ++
4,116,230 UART: [kat] sha1
4,120,278 UART: [kat] SHA2-256
4,122,218 UART: [kat] SHA2-384
4,124,911 UART: [kat] SHA2-512-ACC
4,126,812 UART: [kat] ECC-384
4,135,875 UART: [kat] HMAC-384Kdf
4,140,377 UART: [kat] LMS
4,388,689 UART: [kat] --
4,389,577 UART: [warm-reset] ++
4,390,394 UART: [warm-reset] --
4,391,187 UART: [state] Locking Datavault
4,392,011 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,615 UART: [state] Locking ICCM
4,393,275 UART: [exit] Launching FMC @ 0x40000130
4,398,604 UART:
4,398,620 UART: Running Caliptra FMC ...
4,399,028 UART:
4,399,082 UART: [state] CFI Enabled
4,400,061 UART: [aliasrt :skip pcr extension
4,400,534 UART: [art] Extend RT PCRs Done
4,400,962 UART: [art] Lock RT PCRs Done
4,402,339 UART: [art] Populate DV Done
4,410,399 UART: [fht] FMC Alias Private Key: 7
4,411,391 UART: [art] Derive CDI
4,411,671 UART: [art] Store in in slot 0x4
4,497,166 UART: [art] Derive Key Pair
4,497,526 UART: [art] Store priv key in slot 0x5
4,509,942 UART: [art] Derive Key Pair - Done
4,524,611 UART: [art] Signing Cert with AUTHO
4,525,091 UART: RITY.KEYID = 7
4,540,421 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,186 UART: [art] PUB.X = E5E5E2C1597BB91E052CCEBA5F942111B82E889DAAE3E975B9F94C7F8770DE91A61FEF15D28B76D1234B5D3D513E41A6
4,547,967 UART: [art] PUB.Y = 86112ACCEE376404B1AFD38AE3661EEDE37362F9E0462334D383AC74CDE128ACD2A9D65F369CFD7A5407960BD2A8D70A
4,554,919 UART: [art] SIG.R = AF3D3B022FC3EFD5E23896A810B788BC3274FD77CE59308C93849EC9FFFB2E21C1F562F09B0CC8683F10481E749740CB
4,561,693 UART: [art] SIG.S = 14413FDBEF22E236B989BE92D8377F75ACE515006555BE37268904F6AB48EAF847CCE0128DD30CD09077962A0DD48E03
4,585,566 UART: Caliptra RT
4,585,819 UART: [state] CFI Enabled
4,866,912 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,041 UART: [state] LifecycleState = Production
85,649 UART: [state] DebugLocked = Yes
86,243 UART: [state] Starting the WD Timer 40000000 cycles
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
905,040 UART: [kat] SHA2-512-ACC
906,941 UART: [kat] ECC-384
916,804 UART: [kat] HMAC-384Kdf
921,408 UART: [kat] LMS
1,169,720 UART: [kat] --
1,170,661 UART: [cold-reset] ++
1,171,166 UART: [fht] FHT @ 0x50003400
1,173,994 UART: [idev] ++
1,174,162 UART: [idev] CDI.KEYID = 6
1,174,523 UART: [idev] SUBJECT.KEYID = 7
1,174,948 UART: [idev] UDS.KEYID = 0
1,175,294 ready_for_fw is high
1,175,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,921 UART: [idev] Erasing UDS.KEYID = 0
1,199,734 UART: [idev] Sha1 KeyId Algorithm
1,208,811 UART: [idev] --
1,209,884 UART: [ldev] ++
1,210,052 UART: [ldev] CDI.KEYID = 6
1,210,416 UART: [ldev] SUBJECT.KEYID = 5
1,210,843 UART: [ldev] AUTHORITY.KEYID = 7
1,211,306 UART: [ldev] FE.KEYID = 1
1,216,352 UART: [ldev] Erasing FE.KEYID = 1
1,242,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,779 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,473 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,343 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,049 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,095 UART: [ldev] --
1,281,509 UART: [fwproc] Wait for Commands...
1,282,208 UART: [fwproc] Recv command 0x46574c44
1,282,941 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,131 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,440 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,403 >>> mbox cmd response: success
2,800,493 UART: [afmc] ++
2,800,661 UART: [afmc] CDI.KEYID = 6
2,801,024 UART: [afmc] SUBJECT.KEYID = 7
2,801,450 UART: [afmc] AUTHORITY.KEYID = 5
2,836,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,046 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,765 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,658 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,365 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,068 UART: [afmc] --
2,880,075 UART: [cold-reset] --
2,881,035 UART: [state] Locking Datavault
2,882,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,918 UART: [state] Locking ICCM
2,883,550 UART: [exit] Launching FMC @ 0x40000130
2,888,879 UART:
2,888,895 UART: Running Caliptra FMC ...
2,889,303 UART:
2,889,357 UART: [state] CFI Enabled
2,899,800 UART: [fht] FMC Alias Private Key: 7
3,007,973 UART: [art] Extend RT PCRs Done
3,008,401 UART: [art] Lock RT PCRs Done
3,009,757 UART: [art] Populate DV Done
3,017,793 UART: [fht] FMC Alias Private Key: 7
3,018,947 UART: [art] Derive CDI
3,019,227 UART: [art] Store in in slot 0x4
3,105,016 UART: [art] Derive Key Pair
3,105,376 UART: [art] Store priv key in slot 0x5
3,118,592 UART: [art] Derive Key Pair - Done
3,133,409 UART: [art] Signing Cert with AUTHO
3,133,889 UART: RITY.KEYID = 7
3,149,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,164 UART: [art] PUB.X = 01F0CB8ED5F5DBE49BCC84492EE871515EE2D4DF2DFEEBDB312E116A983D5768AC0EF31AA94BBCAFD5AB8EECBF0BACAE
3,156,969 UART: [art] PUB.Y = BAF8571A32FBF99C7112CE0C987FC5B6468E3EC726490B7299BC9D5D24E7820467B7738D92FDB540F57A274EEF1EF1A5
3,163,920 UART: [art] SIG.R = 044E56FE6CA680440B80BBB6973A4D2425D6CE69EF6C91D998C09437808C664BCF1039E0D6E89903BA7BB1D4D1EB3F14
3,170,689 UART: [art] SIG.S = A6736E219A9648841C70C18F3559BEBF1C30FD337398A09162609C13BE3CC04B8575E0F336A8D6FD7449B8B93D8A714B
3,194,626 UART: Caliptra RT
3,194,879 UART: [state] CFI Enabled
3,302,870 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,626 UART:
3,303,642 UART: Running Caliptra ROM ...
3,304,050 UART:
3,304,105 UART: [state] CFI Enabled
3,306,706 UART: [state] LifecycleState = Production
3,307,314 UART: [state] DebugLocked = Yes
3,307,982 UART: [state] Starting the WD Timer 40000000 cycles
3,309,601 UART: [kat] SHA2-256
4,113,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,280 UART: [kat] ++
4,117,432 UART: [kat] sha1
4,121,688 UART: [kat] SHA2-256
4,123,628 UART: [kat] SHA2-384
4,126,267 UART: [kat] SHA2-512-ACC
4,128,168 UART: [kat] ECC-384
4,137,817 UART: [kat] HMAC-384Kdf
4,142,199 UART: [kat] LMS
4,390,511 UART: [kat] --
4,391,553 UART: [warm-reset] ++
4,392,466 UART: [warm-reset] --
4,393,447 UART: [state] Locking Datavault
4,394,197 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,801 UART: [state] Locking ICCM
4,395,381 UART: [exit] Launching FMC @ 0x40000130
4,400,710 UART:
4,400,726 UART: Running Caliptra FMC ...
4,401,134 UART:
4,401,188 UART: [state] CFI Enabled
4,402,371 UART: [aliasrt :skip pcr extension
4,402,844 UART: [art] Extend RT PCRs Done
4,403,272 UART: [art] Lock RT PCRs Done
4,404,649 UART: [art] Populate DV Done
4,413,235 UART: [fht] FMC Alias Private Key: 7
4,414,375 UART: [art] Derive CDI
4,414,655 UART: [art] Store in in slot 0x4
4,500,200 UART: [art] Derive Key Pair
4,500,560 UART: [art] Store priv key in slot 0x5
4,513,080 UART: [art] Derive Key Pair - Done
4,528,211 UART: [art] Signing Cert with AUTHO
4,528,691 UART: RITY.KEYID = 7
4,543,721 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,486 UART: [art] PUB.X = 01F0CB8ED5F5DBE49BCC84492EE871515EE2D4DF2DFEEBDB312E116A983D5768AC0EF31AA94BBCAFD5AB8EECBF0BACAE
4,551,291 UART: [art] PUB.Y = BAF8571A32FBF99C7112CE0C987FC5B6468E3EC726490B7299BC9D5D24E7820467B7738D92FDB540F57A274EEF1EF1A5
4,558,242 UART: [art] SIG.R = 044E56FE6CA680440B80BBB6973A4D2425D6CE69EF6C91D998C09437808C664BCF1039E0D6E89903BA7BB1D4D1EB3F14
4,565,011 UART: [art] SIG.S = A6736E219A9648841C70C18F3559BEBF1C30FD337398A09162609C13BE3CC04B8575E0F336A8D6FD7449B8B93D8A714B
4,588,792 UART: Caliptra RT
4,589,045 UART: [state] CFI Enabled
4,871,766 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Production
85,578 UART: [state] DebugLocked = Yes
86,322 UART: [state] Starting the WD Timer 40000000 cycles
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
915,829 UART: [kat] HMAC-384Kdf
920,285 UART: [kat] LMS
1,168,597 UART: [kat] --
1,169,382 UART: [cold-reset] ++
1,169,839 UART: [fht] FHT @ 0x50003400
1,172,439 UART: [idev] ++
1,172,607 UART: [idev] CDI.KEYID = 6
1,172,968 UART: [idev] SUBJECT.KEYID = 7
1,173,393 UART: [idev] UDS.KEYID = 0
1,173,739 ready_for_fw is high
1,173,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,152 UART: [idev] Erasing UDS.KEYID = 0
1,197,931 UART: [idev] Sha1 KeyId Algorithm
1,206,876 UART: [idev] --
1,207,915 UART: [ldev] ++
1,208,083 UART: [ldev] CDI.KEYID = 6
1,208,447 UART: [ldev] SUBJECT.KEYID = 5
1,208,874 UART: [ldev] AUTHORITY.KEYID = 7
1,209,337 UART: [ldev] FE.KEYID = 1
1,214,725 UART: [ldev] Erasing FE.KEYID = 1
1,241,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,756 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,450 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,320 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,026 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,880 UART: [ldev] --
1,280,266 UART: [fwproc] Wait for Commands...
1,280,925 UART: [fwproc] Recv command 0x46574c44
1,281,658 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,356 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,665 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,778 >>> mbox cmd response: success
2,800,952 UART: [afmc] ++
2,801,120 UART: [afmc] CDI.KEYID = 6
2,801,483 UART: [afmc] SUBJECT.KEYID = 7
2,801,909 UART: [afmc] AUTHORITY.KEYID = 5
2,837,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,467 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,186 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,079 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,786 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,497 UART: [afmc] --
2,881,592 UART: [cold-reset] --
2,882,566 UART: [state] Locking Datavault
2,883,889 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,493 UART: [state] Locking ICCM
2,885,059 UART: [exit] Launching FMC @ 0x40000130
2,890,388 UART:
2,890,404 UART: Running Caliptra FMC ...
2,890,812 UART:
2,890,955 UART: [state] CFI Enabled
2,901,234 UART: [fht] FMC Alias Private Key: 7
3,008,661 UART: [art] Extend RT PCRs Done
3,009,089 UART: [art] Lock RT PCRs Done
3,010,669 UART: [art] Populate DV Done
3,018,983 UART: [fht] FMC Alias Private Key: 7
3,020,073 UART: [art] Derive CDI
3,020,353 UART: [art] Store in in slot 0x4
3,106,074 UART: [art] Derive Key Pair
3,106,434 UART: [art] Store priv key in slot 0x5
3,120,032 UART: [art] Derive Key Pair - Done
3,135,018 UART: [art] Signing Cert with AUTHO
3,135,498 UART: RITY.KEYID = 7
3,150,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,317 UART: [art] PUB.X = 896E2857D0399963FAA8E6D86091C880B26DD36A4EDB649B4D2D2AA5768B3C4BE6DB65D66F83D6180D4368B7DDB96E8D
3,158,094 UART: [art] PUB.Y = 572E6EBA7E461D576759141DAC40F9CA4C2234410479EB928E9655E00D5FBCD58A8B304346985FA3FAAA9C8EE327A1E7
3,165,046 UART: [art] SIG.R = 7704592233951E244E45C90B46BFA956EC4B90C153C9630D14238DEED75F03487AD77AB34CCD3F8EA1963E4C9DC47D0E
3,171,807 UART: [art] SIG.S = 16627A1D18B828C8C3E0A46160B9FF65F8649032CA5189427BF89183D83B62420EA24363E341DBD2287960FE21391A23
3,195,095 UART: Caliptra RT
3,195,440 UART: [state] CFI Enabled
3,303,520 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,276 UART:
3,304,292 UART: Running Caliptra ROM ...
3,304,700 UART:
3,304,842 UART: [state] CFI Enabled
3,307,761 UART: [state] LifecycleState = Production
3,308,369 UART: [state] DebugLocked = Yes
3,308,877 UART: [state] Starting the WD Timer 40000000 cycles
3,310,592 UART: [kat] SHA2-256
4,114,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,271 UART: [kat] ++
4,118,423 UART: [kat] sha1
4,122,615 UART: [kat] SHA2-256
4,124,555 UART: [kat] SHA2-384
4,127,142 UART: [kat] SHA2-512-ACC
4,129,043 UART: [kat] ECC-384
4,139,008 UART: [kat] HMAC-384Kdf
4,143,722 UART: [kat] LMS
4,392,034 UART: [kat] --
4,392,974 UART: [warm-reset] ++
4,393,903 UART: [warm-reset] --
4,394,716 UART: [state] Locking Datavault
4,395,438 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,042 UART: [state] Locking ICCM
4,396,516 UART: [exit] Launching FMC @ 0x40000130
4,401,845 UART:
4,401,861 UART: Running Caliptra FMC ...
4,402,269 UART:
4,402,412 UART: [state] CFI Enabled
4,403,697 UART: [aliasrt :skip pcr extension
4,404,170 UART: [art] Extend RT PCRs Done
4,404,598 UART: [art] Lock RT PCRs Done
4,405,647 UART: [art] Populate DV Done
4,414,001 UART: [fht] FMC Alias Private Key: 7
4,415,155 UART: [art] Derive CDI
4,415,435 UART: [art] Store in in slot 0x4
4,501,286 UART: [art] Derive Key Pair
4,501,646 UART: [art] Store priv key in slot 0x5
4,514,428 UART: [art] Derive Key Pair - Done
4,529,194 UART: [art] Signing Cert with AUTHO
4,529,674 UART: RITY.KEYID = 7
4,545,122 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,887 UART: [art] PUB.X = 896E2857D0399963FAA8E6D86091C880B26DD36A4EDB649B4D2D2AA5768B3C4BE6DB65D66F83D6180D4368B7DDB96E8D
4,552,664 UART: [art] PUB.Y = 572E6EBA7E461D576759141DAC40F9CA4C2234410479EB928E9655E00D5FBCD58A8B304346985FA3FAAA9C8EE327A1E7
4,559,616 UART: [art] SIG.R = 7704592233951E244E45C90B46BFA956EC4B90C153C9630D14238DEED75F03487AD77AB34CCD3F8EA1963E4C9DC47D0E
4,566,377 UART: [art] SIG.S = 16627A1D18B828C8C3E0A46160B9FF65F8649032CA5189427BF89183D83B62420EA24363E341DBD2287960FE21391A23
4,590,125 UART: Caliptra RT
4,590,470 UART: [state] CFI Enabled
4,869,252 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Production
85,614 UART: [state] DebugLocked = Yes
86,210 UART: [state] Starting the WD Timer 40000000 cycles
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
899,962 UART: [kat] SHA2-256
901,902 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,709 UART: [kat] HMAC-384Kdf
921,399 UART: [kat] LMS
1,169,711 UART: [kat] --
1,170,456 UART: [cold-reset] ++
1,170,973 UART: [fht] FHT @ 0x50003400
1,173,499 UART: [idev] ++
1,173,667 UART: [idev] CDI.KEYID = 6
1,174,028 UART: [idev] SUBJECT.KEYID = 7
1,174,453 UART: [idev] UDS.KEYID = 0
1,174,799 ready_for_fw is high
1,174,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,396 UART: [idev] Erasing UDS.KEYID = 0
1,199,025 UART: [idev] Sha1 KeyId Algorithm
1,207,980 UART: [idev] --
1,208,955 UART: [ldev] ++
1,209,123 UART: [ldev] CDI.KEYID = 6
1,209,487 UART: [ldev] SUBJECT.KEYID = 5
1,209,914 UART: [ldev] AUTHORITY.KEYID = 7
1,210,377 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,292 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,986 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,856 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,562 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,584 UART: [ldev] --
1,281,848 UART: [fwproc] Wait for Commands...
1,282,599 UART: [fwproc] Recv command 0x46574c44
1,283,332 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,038 >>> mbox cmd response: success
2,801,166 UART: [afmc] ++
2,801,334 UART: [afmc] CDI.KEYID = 6
2,801,697 UART: [afmc] SUBJECT.KEYID = 7
2,802,123 UART: [afmc] AUTHORITY.KEYID = 5
2,837,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,201 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,920 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,813 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,520 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,315 UART: [afmc] --
2,881,272 UART: [cold-reset] --
2,882,234 UART: [state] Locking Datavault
2,883,295 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,899 UART: [state] Locking ICCM
2,884,437 UART: [exit] Launching FMC @ 0x40000130
2,889,766 UART:
2,889,782 UART: Running Caliptra FMC ...
2,890,190 UART:
2,890,333 UART: [state] CFI Enabled
2,901,070 UART: [fht] FMC Alias Private Key: 7
3,009,827 UART: [art] Extend RT PCRs Done
3,010,255 UART: [art] Lock RT PCRs Done
3,011,509 UART: [art] Populate DV Done
3,019,657 UART: [fht] FMC Alias Private Key: 7
3,020,811 UART: [art] Derive CDI
3,021,091 UART: [art] Store in in slot 0x4
3,106,524 UART: [art] Derive Key Pair
3,106,884 UART: [art] Store priv key in slot 0x5
3,120,584 UART: [art] Derive Key Pair - Done
3,135,571 UART: [art] Signing Cert with AUTHO
3,136,051 UART: RITY.KEYID = 7
3,151,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,910 UART: [art] PUB.X = EE831B9EE7E5D882380C7DCA5BAEF1127D2A8163401CC4C29754E3DFAE5324DC9BA7A5C8E466D04245EF0B681BC5FC0B
3,158,691 UART: [art] PUB.Y = 9E9DA26FAD956C2AC662FF0BDE343615901F42446534F4C536CCF68F7CD51138A14C2F8709ABB056C270B3BD65CF1244
3,165,643 UART: [art] SIG.R = D7E70198AF13F7F5685B3B7C518C046D5C7D6BD7F66093B0515DDA6882BB7678E641F114F623052A5CFA4E647DA83C69
3,172,408 UART: [art] SIG.S = 161CE7CB529ECBBA9F786E0991756953B36B945435BC30DC6AA7A2BD4A0B5873F621F2452F84BE24BFEC5C4AEA37D51C
3,195,835 UART: Caliptra RT
3,196,180 UART: [state] CFI Enabled
3,305,183 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,305,939 UART:
3,305,955 UART: Running Caliptra ROM ...
3,306,363 UART:
3,306,505 UART: [state] CFI Enabled
3,309,114 UART: [state] LifecycleState = Production
3,309,722 UART: [state] DebugLocked = Yes
3,310,352 UART: [state] Starting the WD Timer 40000000 cycles
3,311,951 UART: [kat] SHA2-256
4,115,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,119,630 UART: [kat] ++
4,119,782 UART: [kat] sha1
4,124,088 UART: [kat] SHA2-256
4,126,028 UART: [kat] SHA2-384
4,128,969 UART: [kat] SHA2-512-ACC
4,130,870 UART: [kat] ECC-384
4,140,749 UART: [kat] HMAC-384Kdf
4,145,353 UART: [kat] LMS
4,393,665 UART: [kat] --
4,394,373 UART: [warm-reset] ++
4,395,132 UART: [warm-reset] --
4,395,917 UART: [state] Locking Datavault
4,396,707 UART: [state] Locking PCR0, PCR1 and PCR31
4,397,311 UART: [state] Locking ICCM
4,397,773 UART: [exit] Launching FMC @ 0x40000130
4,403,102 UART:
4,403,118 UART: Running Caliptra FMC ...
4,403,526 UART:
4,403,669 UART: [state] CFI Enabled
4,404,932 UART: [aliasrt :skip pcr extension
4,405,405 UART: [art] Extend RT PCRs Done
4,405,833 UART: [art] Lock RT PCRs Done
4,407,048 UART: [art] Populate DV Done
4,415,432 UART: [fht] FMC Alias Private Key: 7
4,416,488 UART: [art] Derive CDI
4,416,768 UART: [art] Store in in slot 0x4
4,502,225 UART: [art] Derive Key Pair
4,502,585 UART: [art] Store priv key in slot 0x5
4,516,167 UART: [art] Derive Key Pair - Done
4,530,790 UART: [art] Signing Cert with AUTHO
4,531,270 UART: RITY.KEYID = 7
4,547,056 UART: [art] Erasing AUTHORITY.KEYID = 7
4,547,821 UART: [art] PUB.X = EE831B9EE7E5D882380C7DCA5BAEF1127D2A8163401CC4C29754E3DFAE5324DC9BA7A5C8E466D04245EF0B681BC5FC0B
4,554,602 UART: [art] PUB.Y = 9E9DA26FAD956C2AC662FF0BDE343615901F42446534F4C536CCF68F7CD51138A14C2F8709ABB056C270B3BD65CF1244
4,561,554 UART: [art] SIG.R = D7E70198AF13F7F5685B3B7C518C046D5C7D6BD7F66093B0515DDA6882BB7678E641F114F623052A5CFA4E647DA83C69
4,568,319 UART: [art] SIG.S = 161CE7CB529ECBBA9F786E0991756953B36B945435BC30DC6AA7A2BD4A0B5873F621F2452F84BE24BFEC5C4AEA37D51C
4,591,946 UART: Caliptra RT
4,592,291 UART: [state] CFI Enabled
4,877,246 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Production
85,985 UART: [state] DebugLocked = Yes
86,571 UART: [state] Starting the WD Timer 40000000 cycles
88,274 UART: [kat] SHA2-256
891,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,953 UART: [kat] ++
896,105 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,886 UART: [kat] SHA2-512-ACC
906,787 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,853 UART: [cold-reset] ++
1,170,248 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,174,326 ready_for_fw is high
1,174,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,526 UART: [idev] Sha1 KeyId Algorithm
1,207,373 UART: [idev] --
1,208,364 UART: [ldev] ++
1,208,532 UART: [ldev] CDI.KEYID = 6
1,208,896 UART: [ldev] SUBJECT.KEYID = 5
1,209,323 UART: [ldev] AUTHORITY.KEYID = 7
1,209,786 UART: [ldev] FE.KEYID = 1
1,214,868 UART: [ldev] Erasing FE.KEYID = 1
1,241,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,775 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,469 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,339 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,045 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,305 UART: [ldev] --
1,280,807 UART: [fwproc] Wait for Commands...
1,281,600 UART: [fwproc] Recv command 0x46574c44
1,282,333 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,797,733 >>> mbox cmd response: success
2,798,823 UART: [afmc] ++
2,798,991 UART: [afmc] CDI.KEYID = 6
2,799,354 UART: [afmc] SUBJECT.KEYID = 7
2,799,780 UART: [afmc] AUTHORITY.KEYID = 5
2,834,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,142 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,861 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,754 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,461 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,186 UART: [afmc] --
2,878,289 UART: [cold-reset] --
2,879,087 UART: [state] Locking Datavault
2,879,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,492 UART: [state] Locking ICCM
2,881,112 UART: [exit] Launching FMC @ 0x40000130
2,886,441 UART:
2,886,457 UART: Running Caliptra FMC ...
2,886,865 UART:
2,886,919 UART: [state] CFI Enabled
2,897,616 UART: [fht] FMC Alias Private Key: 7
3,006,061 UART: [art] Extend RT PCRs Done
3,006,489 UART: [art] Lock RT PCRs Done
3,008,275 UART: [art] Populate DV Done
3,016,595 UART: [fht] FMC Alias Private Key: 7
3,017,595 UART: [art] Derive CDI
3,017,875 UART: [art] Store in in slot 0x4
3,103,566 UART: [art] Derive Key Pair
3,103,926 UART: [art] Store priv key in slot 0x5
3,117,268 UART: [art] Derive Key Pair - Done
3,131,907 UART: [art] Signing Cert with AUTHO
3,132,387 UART: RITY.KEYID = 7
3,147,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,822 UART: [art] PUB.X = B3152BCA36728FD4075B8B55E78A589671CDB8B03D277A0D4F861F3987CDA9B4DBBCF0FDB4AC9D76D6CDFE821853A2D9
3,154,606 UART: [art] PUB.Y = E605194ADF9E3B18BFBF3133461F3330486E356D69EE0AF8011A547FEA2BC60B895804AF34BF796AE83427BE7A72747E
3,161,547 UART: [art] SIG.R = 65CFC5EB882758450C2F733554B0C6BDFDD247E26978ED96E48226A8610E77B586A201D3F4A8FB6C176055CBB4763C65
3,168,310 UART: [art] SIG.S = 8FCDDD0F0C6F38474FAF8468562E8D92B1DDDEA3169B65667C98019874CB5848BE236AF5FDA3A383A68C4314FC040BA9
3,191,940 UART: Caliptra RT
3,192,193 UART: [state] CFI Enabled
3,299,316 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,072 UART:
3,300,088 UART: Running Caliptra ROM ...
3,300,496 UART:
3,300,551 UART: [state] CFI Enabled
3,302,966 UART: [state] LifecycleState = Production
3,303,574 UART: [state] DebugLocked = Yes
3,304,308 UART: [state] Starting the WD Timer 40000000 cycles
3,305,953 UART: [kat] SHA2-256
4,109,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,632 UART: [kat] ++
4,113,784 UART: [kat] sha1
4,117,894 UART: [kat] SHA2-256
4,119,834 UART: [kat] SHA2-384
4,122,727 UART: [kat] SHA2-512-ACC
4,124,628 UART: [kat] ECC-384
4,134,427 UART: [kat] HMAC-384Kdf
4,139,101 UART: [kat] LMS
4,387,413 UART: [kat] --
4,388,279 UART: [warm-reset] ++
4,389,192 UART: [warm-reset] --
4,390,101 UART: [state] Locking Datavault
4,390,903 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,507 UART: [state] Locking ICCM
4,391,973 UART: [exit] Launching FMC @ 0x40000130
4,397,302 UART:
4,397,318 UART: Running Caliptra FMC ...
4,397,726 UART:
4,397,780 UART: [state] CFI Enabled
4,398,995 UART: [aliasrt :skip pcr extension
4,399,468 UART: [art] Extend RT PCRs Done
4,399,896 UART: [art] Lock RT PCRs Done
4,401,407 UART: [art] Populate DV Done
4,409,559 UART: [fht] FMC Alias Private Key: 7
4,410,491 UART: [art] Derive CDI
4,410,771 UART: [art] Store in in slot 0x4
4,496,314 UART: [art] Derive Key Pair
4,496,674 UART: [art] Store priv key in slot 0x5
4,509,466 UART: [art] Derive Key Pair - Done
4,524,023 UART: [art] Signing Cert with AUTHO
4,524,503 UART: RITY.KEYID = 7
4,539,733 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,498 UART: [art] PUB.X = B3152BCA36728FD4075B8B55E78A589671CDB8B03D277A0D4F861F3987CDA9B4DBBCF0FDB4AC9D76D6CDFE821853A2D9
4,547,282 UART: [art] PUB.Y = E605194ADF9E3B18BFBF3133461F3330486E356D69EE0AF8011A547FEA2BC60B895804AF34BF796AE83427BE7A72747E
4,554,223 UART: [art] SIG.R = 65CFC5EB882758450C2F733554B0C6BDFDD247E26978ED96E48226A8610E77B586A201D3F4A8FB6C176055CBB4763C65
4,560,986 UART: [art] SIG.S = 8FCDDD0F0C6F38474FAF8468562E8D92B1DDDEA3169B65667C98019874CB5848BE236AF5FDA3A383A68C4314FC040BA9
4,585,216 UART: Caliptra RT
4,585,469 UART: [state] CFI Enabled
4,872,394 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Production
85,835 UART: [state] DebugLocked = Yes
86,365 UART: [state] Starting the WD Timer 40000000 cycles
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,000 UART: [kat] HMAC-384Kdf
920,416 UART: [kat] LMS
1,168,728 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,136 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,174,146 ready_for_fw is high
1,174,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,825 UART: [idev] Erasing UDS.KEYID = 0
1,198,890 UART: [idev] Sha1 KeyId Algorithm
1,207,941 UART: [idev] --
1,208,912 UART: [ldev] ++
1,209,080 UART: [ldev] CDI.KEYID = 6
1,209,444 UART: [ldev] SUBJECT.KEYID = 5
1,209,871 UART: [ldev] AUTHORITY.KEYID = 7
1,210,334 UART: [ldev] FE.KEYID = 1
1,215,478 UART: [ldev] Erasing FE.KEYID = 1
1,241,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,879 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,573 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,443 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,149 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,105 UART: [ldev] --
1,280,465 UART: [fwproc] Wait for Commands...
1,281,212 UART: [fwproc] Recv command 0x46574c44
1,281,945 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,143 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,443 >>> mbox cmd response: success
2,801,517 UART: [afmc] ++
2,801,685 UART: [afmc] CDI.KEYID = 6
2,802,048 UART: [afmc] SUBJECT.KEYID = 7
2,802,474 UART: [afmc] AUTHORITY.KEYID = 5
2,838,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,690 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,409 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,302 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,873,009 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,866 UART: [afmc] --
2,881,869 UART: [cold-reset] --
2,882,537 UART: [state] Locking Datavault
2,883,468 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,072 UART: [state] Locking ICCM
2,884,602 UART: [exit] Launching FMC @ 0x40000130
2,889,931 UART:
2,889,947 UART: Running Caliptra FMC ...
2,890,355 UART:
2,890,409 UART: [state] CFI Enabled
2,900,846 UART: [fht] FMC Alias Private Key: 7
3,008,909 UART: [art] Extend RT PCRs Done
3,009,337 UART: [art] Lock RT PCRs Done
3,010,809 UART: [art] Populate DV Done
3,019,221 UART: [fht] FMC Alias Private Key: 7
3,020,185 UART: [art] Derive CDI
3,020,465 UART: [art] Store in in slot 0x4
3,106,174 UART: [art] Derive Key Pair
3,106,534 UART: [art] Store priv key in slot 0x5
3,119,778 UART: [art] Derive Key Pair - Done
3,134,610 UART: [art] Signing Cert with AUTHO
3,135,090 UART: RITY.KEYID = 7
3,150,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,851 UART: [art] PUB.X = 07D02AFDB24F6D2B6D16D5EF5727AB20661A90EFD8801879CF7C7EE4C42699E8362200A59B669D0B8B5EB77E826E32BB
3,157,603 UART: [art] PUB.Y = 01F473F3F863253F006BFDBFAE207948F6375F31B9A8E066D3949DF6585ACEB0A3DE3E42D10F8E8F69A50EB4014936F5
3,164,527 UART: [art] SIG.R = AE17C0BEDBEC7D21246B0DA00BA2557741D208E81D2D3BA3EC22DABB4BC9F3655089464A291AFF9BA74AC44C0690FFF0
3,171,307 UART: [art] SIG.S = 299AF4AD8DB5263F3D32416AC4E94366821E57C696F7FFC28070E161DCBF8DEA4F6426242386C62C7A410A0B65E5D25F
3,195,752 UART: Caliptra RT
3,196,005 UART: [state] CFI Enabled
3,304,128 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,884 UART:
3,304,900 UART: Running Caliptra ROM ...
3,305,308 UART:
3,305,363 UART: [state] CFI Enabled
3,308,242 UART: [state] LifecycleState = Production
3,308,850 UART: [state] DebugLocked = Yes
3,309,368 UART: [state] Starting the WD Timer 40000000 cycles
3,310,977 UART: [kat] SHA2-256
4,114,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,656 UART: [kat] ++
4,118,808 UART: [kat] sha1
4,122,990 UART: [kat] SHA2-256
4,124,930 UART: [kat] SHA2-384
4,127,493 UART: [kat] SHA2-512-ACC
4,129,394 UART: [kat] ECC-384
4,138,681 UART: [kat] HMAC-384Kdf
4,143,359 UART: [kat] LMS
4,391,671 UART: [kat] --
4,392,605 UART: [warm-reset] ++
4,393,322 UART: [warm-reset] --
4,394,207 UART: [state] Locking Datavault
4,395,219 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,823 UART: [state] Locking ICCM
4,396,277 UART: [exit] Launching FMC @ 0x40000130
4,401,606 UART:
4,401,622 UART: Running Caliptra FMC ...
4,402,030 UART:
4,402,084 UART: [state] CFI Enabled
4,403,561 UART: [aliasrt :skip pcr extension
4,404,034 UART: [art] Extend RT PCRs Done
4,404,462 UART: [art] Lock RT PCRs Done
4,405,835 UART: [art] Populate DV Done
4,413,953 UART: [fht] FMC Alias Private Key: 7
4,414,917 UART: [art] Derive CDI
4,415,197 UART: [art] Store in in slot 0x4
4,500,608 UART: [art] Derive Key Pair
4,500,968 UART: [art] Store priv key in slot 0x5
4,514,322 UART: [art] Derive Key Pair - Done
4,529,066 UART: [art] Signing Cert with AUTHO
4,529,546 UART: RITY.KEYID = 7
4,544,724 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,489 UART: [art] PUB.X = 07D02AFDB24F6D2B6D16D5EF5727AB20661A90EFD8801879CF7C7EE4C42699E8362200A59B669D0B8B5EB77E826E32BB
4,552,241 UART: [art] PUB.Y = 01F473F3F863253F006BFDBFAE207948F6375F31B9A8E066D3949DF6585ACEB0A3DE3E42D10F8E8F69A50EB4014936F5
4,559,165 UART: [art] SIG.R = AE17C0BEDBEC7D21246B0DA00BA2557741D208E81D2D3BA3EC22DABB4BC9F3655089464A291AFF9BA74AC44C0690FFF0
4,565,945 UART: [art] SIG.S = 299AF4AD8DB5263F3D32416AC4E94366821E57C696F7FFC28070E161DCBF8DEA4F6426242386C62C7A410A0B65E5D25F
4,589,786 UART: Caliptra RT
4,590,039 UART: [state] CFI Enabled
4,871,166 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Production
85,720 UART: [state] DebugLocked = Yes
86,302 UART: [state] Starting the WD Timer 40000000 cycles
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,823 UART: [kat] SHA2-512-ACC
906,724 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
920,935 UART: [kat] LMS
1,169,247 UART: [kat] --
1,170,120 UART: [cold-reset] ++
1,170,567 UART: [fht] FHT @ 0x50003400
1,173,193 UART: [idev] ++
1,173,361 UART: [idev] CDI.KEYID = 6
1,173,722 UART: [idev] SUBJECT.KEYID = 7
1,174,147 UART: [idev] UDS.KEYID = 0
1,174,493 ready_for_fw is high
1,174,493 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,038 UART: [idev] Erasing UDS.KEYID = 0
1,199,077 UART: [idev] Sha1 KeyId Algorithm
1,207,908 UART: [idev] --
1,208,949 UART: [ldev] ++
1,209,117 UART: [ldev] CDI.KEYID = 6
1,209,481 UART: [ldev] SUBJECT.KEYID = 5
1,209,908 UART: [ldev] AUTHORITY.KEYID = 7
1,210,371 UART: [ldev] FE.KEYID = 1
1,215,487 UART: [ldev] Erasing FE.KEYID = 1
1,242,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,686 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,380 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,250 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,956 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,026 UART: [ldev] --
1,281,316 UART: [fwproc] Wait for Commands...
1,282,099 UART: [fwproc] Recv command 0x46574c44
1,282,832 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,310 >>> mbox cmd response: success
2,800,500 UART: [afmc] ++
2,800,668 UART: [afmc] CDI.KEYID = 6
2,801,031 UART: [afmc] SUBJECT.KEYID = 7
2,801,457 UART: [afmc] AUTHORITY.KEYID = 5
2,836,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,289 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,008 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,901 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,608 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,491 UART: [afmc] --
2,880,426 UART: [cold-reset] --
2,881,410 UART: [state] Locking Datavault
2,882,663 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,267 UART: [state] Locking ICCM
2,883,875 UART: [exit] Launching FMC @ 0x40000130
2,889,204 UART:
2,889,220 UART: Running Caliptra FMC ...
2,889,628 UART:
2,889,771 UART: [state] CFI Enabled
2,900,496 UART: [fht] FMC Alias Private Key: 7
3,008,349 UART: [art] Extend RT PCRs Done
3,008,777 UART: [art] Lock RT PCRs Done
3,010,097 UART: [art] Populate DV Done
3,018,335 UART: [fht] FMC Alias Private Key: 7
3,019,485 UART: [art] Derive CDI
3,019,765 UART: [art] Store in in slot 0x4
3,105,452 UART: [art] Derive Key Pair
3,105,812 UART: [art] Store priv key in slot 0x5
3,119,232 UART: [art] Derive Key Pair - Done
3,134,176 UART: [art] Signing Cert with AUTHO
3,134,656 UART: RITY.KEYID = 7
3,150,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,979 UART: [art] PUB.X = D9FB0692077B4E17A37175902AC5EC7E25A213A8EBC3B28231C7866C19A030BFFD5D5CCBB34476CF4E9B4D84F95984F6
3,157,753 UART: [art] PUB.Y = D368995BAE8D53A938AF4098542A260610D330680CE9DCF5814CB38EFFBE025F018D624EB9DBD374AA5802186DC58EDB
3,164,698 UART: [art] SIG.R = 717EB2886BAEEBF27DF224D816F750BEF136115511B9C40134BF5F0614596C3CCF238B4A9B8EBA13792EC99B4B245BA7
3,171,472 UART: [art] SIG.S = 7FB32421088CC796DD7F38BB4E54D1640FC6B94D422C8209DF81E43062EC7F0B78C109A07BDA8302342B3658E863A585
3,195,929 UART: Caliptra RT
3,196,274 UART: [state] CFI Enabled
3,303,596 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,352 UART:
3,304,368 UART: Running Caliptra ROM ...
3,304,776 UART:
3,304,918 UART: [state] CFI Enabled
3,307,687 UART: [state] LifecycleState = Production
3,308,295 UART: [state] DebugLocked = Yes
3,308,939 UART: [state] Starting the WD Timer 40000000 cycles
3,310,490 UART: [kat] SHA2-256
4,114,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,169 UART: [kat] ++
4,118,321 UART: [kat] sha1
4,122,567 UART: [kat] SHA2-256
4,124,507 UART: [kat] SHA2-384
4,127,238 UART: [kat] SHA2-512-ACC
4,129,139 UART: [kat] ECC-384
4,138,710 UART: [kat] HMAC-384Kdf
4,143,528 UART: [kat] LMS
4,391,840 UART: [kat] --
4,392,654 UART: [warm-reset] ++
4,393,665 UART: [warm-reset] --
4,394,378 UART: [state] Locking Datavault
4,395,292 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,896 UART: [state] Locking ICCM
4,396,562 UART: [exit] Launching FMC @ 0x40000130
4,401,891 UART:
4,401,907 UART: Running Caliptra FMC ...
4,402,315 UART:
4,402,458 UART: [state] CFI Enabled
4,403,909 UART: [aliasrt :skip pcr extension
4,404,382 UART: [art] Extend RT PCRs Done
4,404,810 UART: [art] Lock RT PCRs Done
4,406,313 UART: [art] Populate DV Done
4,414,685 UART: [fht] FMC Alias Private Key: 7
4,415,707 UART: [art] Derive CDI
4,415,987 UART: [art] Store in in slot 0x4
4,501,642 UART: [art] Derive Key Pair
4,502,002 UART: [art] Store priv key in slot 0x5
4,514,660 UART: [art] Derive Key Pair - Done
4,529,266 UART: [art] Signing Cert with AUTHO
4,529,746 UART: RITY.KEYID = 7
4,545,036 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,801 UART: [art] PUB.X = D9FB0692077B4E17A37175902AC5EC7E25A213A8EBC3B28231C7866C19A030BFFD5D5CCBB34476CF4E9B4D84F95984F6
4,552,575 UART: [art] PUB.Y = D368995BAE8D53A938AF4098542A260610D330680CE9DCF5814CB38EFFBE025F018D624EB9DBD374AA5802186DC58EDB
4,559,520 UART: [art] SIG.R = 717EB2886BAEEBF27DF224D816F750BEF136115511B9C40134BF5F0614596C3CCF238B4A9B8EBA13792EC99B4B245BA7
4,566,294 UART: [art] SIG.S = 7FB32421088CC796DD7F38BB4E54D1640FC6B94D422C8209DF81E43062EC7F0B78C109A07BDA8302342B3658E863A585
4,590,221 UART: Caliptra RT
4,590,566 UART: [state] CFI Enabled
4,873,306 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,698 UART: [state] LifecycleState = Production
86,306 UART: [state] DebugLocked = Yes
87,028 UART: [state] Starting the WD Timer 40000000 cycles
88,625 UART: [kat] SHA2-256
892,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,304 UART: [kat] ++
896,456 UART: [kat] sha1
900,874 UART: [kat] SHA2-256
902,814 UART: [kat] SHA2-384
905,449 UART: [kat] SHA2-512-ACC
907,350 UART: [kat] ECC-384
916,857 UART: [kat] HMAC-384Kdf
921,419 UART: [kat] LMS
1,169,731 UART: [kat] --
1,170,580 UART: [cold-reset] ++
1,170,917 UART: [fht] FHT @ 0x50003400
1,173,535 UART: [idev] ++
1,173,703 UART: [idev] CDI.KEYID = 6
1,174,064 UART: [idev] SUBJECT.KEYID = 7
1,174,489 UART: [idev] UDS.KEYID = 0
1,174,835 ready_for_fw is high
1,174,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,199,325 UART: [idev] Sha1 KeyId Algorithm
1,208,342 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,243,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,512 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,206 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,076 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,782 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,804 UART: [ldev] --
1,282,170 UART: [fwproc] Wait for Commands...
1,282,957 UART: [fwproc] Recv command 0x46574c44
1,283,690 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,147 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,212 >>> mbox cmd response: success
2,800,440 UART: [afmc] ++
2,800,608 UART: [afmc] CDI.KEYID = 6
2,800,971 UART: [afmc] SUBJECT.KEYID = 7
2,801,397 UART: [afmc] AUTHORITY.KEYID = 5
2,836,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,065 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,784 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,677 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,384 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,317 UART: [afmc] --
2,880,428 UART: [cold-reset] --
2,881,566 UART: [state] Locking Datavault
2,882,637 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,241 UART: [state] Locking ICCM
2,883,797 UART: [exit] Launching FMC @ 0x40000130
2,889,126 UART:
2,889,142 UART: Running Caliptra FMC ...
2,889,550 UART:
2,889,693 UART: [state] CFI Enabled
2,900,438 UART: [fht] FMC Alias Private Key: 7
3,008,883 UART: [art] Extend RT PCRs Done
3,009,311 UART: [art] Lock RT PCRs Done
3,011,095 UART: [art] Populate DV Done
3,019,109 UART: [fht] FMC Alias Private Key: 7
3,020,225 UART: [art] Derive CDI
3,020,505 UART: [art] Store in in slot 0x4
3,106,386 UART: [art] Derive Key Pair
3,106,746 UART: [art] Store priv key in slot 0x5
3,119,976 UART: [art] Derive Key Pair - Done
3,134,997 UART: [art] Signing Cert with AUTHO
3,135,477 UART: RITY.KEYID = 7
3,150,995 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,760 UART: [art] PUB.X = 11EF3D5E8CB74747E2905A7A3EE203497971B160BE74A48AC176465A26421739DB901F6D839814DAED9754457ECB80DD
3,158,527 UART: [art] PUB.Y = 07D29BA3CFF69C70053DA89AA932355FE5E183A698D04537D6885FD3DF078ED3CDF341A2481470D315CD30ABCC7FF2C5
3,165,480 UART: [art] SIG.R = 4AD082B1FD0ED7931671A625C1BCF67FFC082F3475398B3CFBBB0CF5DA3A596B268517E44C835CB471B63A526B0C3CDA
3,172,254 UART: [art] SIG.S = F98E5DD142F1FAEB6A637032DA4E2E42F8CA274B5F636E2FF8FB506F88FC2B06F2CD1DAA29F77187D20E257E90935C6B
3,196,221 UART: Caliptra RT
3,196,566 UART: [state] CFI Enabled
3,305,187 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,305,943 UART:
3,305,959 UART: Running Caliptra ROM ...
3,306,367 UART:
3,306,509 UART: [state] CFI Enabled
3,309,236 UART: [state] LifecycleState = Production
3,309,844 UART: [state] DebugLocked = Yes
3,310,402 UART: [state] Starting the WD Timer 40000000 cycles
3,311,889 UART: [kat] SHA2-256
4,115,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,119,568 UART: [kat] ++
4,119,720 UART: [kat] sha1
4,124,052 UART: [kat] SHA2-256
4,125,992 UART: [kat] SHA2-384
4,128,957 UART: [kat] SHA2-512-ACC
4,130,858 UART: [kat] ECC-384
4,140,893 UART: [kat] HMAC-384Kdf
4,145,549 UART: [kat] LMS
4,393,861 UART: [kat] --
4,394,701 UART: [warm-reset] ++
4,395,648 UART: [warm-reset] --
4,396,715 UART: [state] Locking Datavault
4,397,447 UART: [state] Locking PCR0, PCR1 and PCR31
4,398,051 UART: [state] Locking ICCM
4,398,659 UART: [exit] Launching FMC @ 0x40000130
4,403,988 UART:
4,404,004 UART: Running Caliptra FMC ...
4,404,412 UART:
4,404,555 UART: [state] CFI Enabled
4,406,124 UART: [aliasrt :skip pcr extension
4,406,597 UART: [art] Extend RT PCRs Done
4,407,025 UART: [art] Lock RT PCRs Done
4,408,302 UART: [art] Populate DV Done
4,416,280 UART: [fht] FMC Alias Private Key: 7
4,417,326 UART: [art] Derive CDI
4,417,606 UART: [art] Store in in slot 0x4
4,503,201 UART: [art] Derive Key Pair
4,503,561 UART: [art] Store priv key in slot 0x5
4,516,727 UART: [art] Derive Key Pair - Done
4,531,734 UART: [art] Signing Cert with AUTHO
4,532,214 UART: RITY.KEYID = 7
4,547,618 UART: [art] Erasing AUTHORITY.KEYID = 7
4,548,383 UART: [art] PUB.X = 11EF3D5E8CB74747E2905A7A3EE203497971B160BE74A48AC176465A26421739DB901F6D839814DAED9754457ECB80DD
4,555,150 UART: [art] PUB.Y = 07D29BA3CFF69C70053DA89AA932355FE5E183A698D04537D6885FD3DF078ED3CDF341A2481470D315CD30ABCC7FF2C5
4,562,103 UART: [art] SIG.R = 4AD082B1FD0ED7931671A625C1BCF67FFC082F3475398B3CFBBB0CF5DA3A596B268517E44C835CB471B63A526B0C3CDA
4,568,877 UART: [art] SIG.S = F98E5DD142F1FAEB6A637032DA4E2E42F8CA274B5F636E2FF8FB506F88FC2B06F2CD1DAA29F77187D20E257E90935C6B
4,592,496 UART: Caliptra RT
4,592,841 UART: [state] CFI Enabled
4,873,694 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,727 writing to cptra_bootfsm_go
192,361 UART:
192,734 UART: Running Caliptra ROM ...
193,861 UART:
194,010 UART: [state] CFI Enabled
264,492 UART: [state] LifecycleState = Unprovisioned
266,879 UART: [state] DebugLocked = Yes
269,212 UART: [state] Starting the WD Timer 1000000 cycles
275,061 UART: [kat] SHA2-256
457,053 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,556 UART: [kat] ++
469,157 UART: [kat] sha1
478,693 UART: [kat] SHA2-256
481,723 UART: [kat] SHA2-384
487,704 UART: [kat] SHA2-512-ACC
490,328 UART: [kat] ECC-384
1,273,215 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
1,280,896 UART: WDT Expired
1,281,667 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007C58 ra=0x00007C46 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
192,086 UART:
192,475 UART: Running Caliptra ROM ...
193,603 UART:
603,212 UART: [state] CFI Enabled
614,506 UART: [state] LifecycleState = Unprovisioned
616,907 UART: [state] DebugLocked = Yes
619,026 UART: [state] Starting the WD Timer 1000000 cycles
624,010 UART: [kat] SHA2-256
806,035 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,556 UART: [kat] ++
818,155 UART: [kat] sha1
828,495 UART: [kat] SHA2-256
831,555 UART: [kat] SHA2-384
837,418 UART: [kat] SHA2-512-ACC
840,024 UART: [kat] ECC-384
1,623,052 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
1,630,709 UART: WDT Expired
1,631,267 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007C54 ra=0x00007C46 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
191,568 UART:
191,973 UART: Running Caliptra ROM ...
193,095 UART:
193,246 UART: [state] CFI Enabled
264,469 UART: [state] LifecycleState = Unprovisioned
266,366 UART: [state] DebugLocked = Yes
269,348 UART: [state] Starting the WD Timer 1000000 cycles
273,785 UART: [kat] SHA2-256
452,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,512 UART: [kat] ++
465,071 UART: [kat] sha1
475,687 UART: [kat] SHA2-256
478,748 UART: [kat] SHA2-384
485,097 UART: [kat] SHA2-512-ACC
488,089 UART: [kat] ECC-384
1,272,891 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
1,279,908 UART: WDT Expired
1,280,501 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008072 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
191,740 UART:
192,176 UART: Running Caliptra ROM ...
193,292 UART:
602,769 UART: [state] CFI Enabled
618,697 UART: [state] LifecycleState = Unprovisioned
620,551 UART: [state] DebugLocked = Yes
622,117 UART: [state] Starting the WD Timer 1000000 cycles
626,333 UART: [kat] SHA2-256
805,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,012 UART: [kat] ++
817,576 UART: [kat] sha1
827,697 UART: [kat] SHA2-256
830,725 UART: [kat] SHA2-384
836,281 UART: [kat] SHA2-512-ACC
839,263 UART: [kat] ECC-384
1,625,726 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
1,632,709 UART: WDT Expired
1,633,282 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008064 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008072 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000806C ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = Yes
86,819 UART: [state] Starting the WD Timer 1000000 cycles
88,382 UART: [kat] SHA2-256
891,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,061 UART: [kat] ++
896,213 UART: [kat] sha1
900,459 UART: [kat] SHA2-256
902,399 UART: [kat] SHA2-384
905,072 UART: [kat] SHA2-512-ACC
906,973 UART: [kat] ECC-384
916,472 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,132 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008156 ra=0x00008150 error_internal_intr_r=00000040
1,090,571 UART: WDT Expired
1,090,780 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008156 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007834 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = Yes
86,350 UART: [state] Starting the WD Timer 1000000 cycles
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
900,226 UART: [kat] SHA2-256
902,166 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
917,307 UART: [kat] HMAC-384Kdf
922,135 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,663 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007B06 ra=0x00007AEC error_internal_intr_r=00000040
1,090,110 UART: WDT Expired
1,090,319 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007B06 ra=0x00007AEC error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000090CA ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = Yes
86,651 UART: [state] Starting the WD Timer 1000000 cycles
88,248 UART: [kat] SHA2-256
891,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,927 UART: [kat] ++
896,079 UART: [kat] sha1
900,287 UART: [kat] SHA2-256
902,227 UART: [kat] SHA2-384
904,860 UART: [kat] SHA2-512-ACC
906,761 UART: [kat] ECC-384
916,630 UART: [kat] HMAC-384Kdf
921,276 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,964 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
1,090,405 UART: WDT Expired
1,090,614 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007874 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = Yes
86,664 UART: [state] Starting the WD Timer 1000000 cycles
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,175 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,977 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000798C ra=0x00008150 error_internal_intr_r=00000040
1,090,418 UART: WDT Expired
1,090,627 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000798C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000090CA ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = Yes
86,673 UART: [state] Starting the WD Timer 1000000 cycles
88,132 UART: [kat] SHA2-256
891,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,811 UART: [kat] ++
895,963 UART: [kat] sha1
900,341 UART: [kat] SHA2-256
902,281 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,986 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
1,090,427 UART: WDT Expired
1,090,636 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007834 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = Yes
86,852 UART: [state] Starting the WD Timer 1000000 cycles
88,449 UART: [kat] SHA2-256
891,999 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,128 UART: [kat] ++
896,280 UART: [kat] sha1
900,454 UART: [kat] SHA2-256
902,394 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
916,687 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,165 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008150 error_internal_intr_r=00000040
1,090,604 UART: WDT Expired
1,090,813 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000090CC ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,741 writing to cptra_bootfsm_go
192,389 UART:
192,754 UART: Running Caliptra ROM ...
193,841 UART:
193,983 UART: [state] CFI Enabled
264,301 UART: [state] LifecycleState = Unprovisioned
266,689 UART: [state] DebugLocked = Yes
269,721 UART: [state] Starting the WD Timer 40000000 cycles
275,043 UART: [kat] SHA2-256
457,005 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,514 UART: [kat] ++
469,128 UART: [kat] sha1
479,943 UART: [kat] SHA2-256
482,994 UART: [kat] SHA2-384
488,889 UART: [kat] SHA2-512-ACC
491,506 UART: [kat] ECC-384
3,776,804 UART: [kat] HMAC-384Kdf
3,802,565 UART: [kat] LMS
4,875,733 UART: [kat] --
4,882,495 UART: [cold-reset] ++
4,883,626 UART: [fht] FHT @ 0x50003400
4,895,330 UART: [idev] ++
4,895,997 UART: [idev] CDI.KEYID = 6
4,897,206 UART: [idev] SUBJECT.KEYID = 7
4,898,358 UART: [idev] UDS.KEYID = 0
4,901,505 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,042,707 UART: [idev] Erasing UDS.KEYID = 0
8,244,209 UART: [idev] Sha1 KeyId Algorithm
8,266,911 UART: [idev] --
8,270,752 UART: [ldev] ++
8,271,397 UART: [ldev] CDI.KEYID = 6
8,272,537 UART: [ldev] SUBJECT.KEYID = 5
8,273,702 UART: [ldev] AUTHORITY.KEYID = 7
8,274,861 UART: [ldev] FE.KEYID = 1
8,318,419 UART: [ldev] Erasing FE.KEYID = 1
11,650,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,819 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,978,139 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,994,126 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,010,283 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,031,182 UART: [ldev] --
14,035,169 UART: [fwproc] Wait for Commands...
14,036,892 UART: [fwproc] Recv command 0x46574c44
14,039,208 UART: [fwproc] Recv'd Img size: 111688 bytes
18,076,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,156,842 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,217,084 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,533,704 >>> mbox cmd response: success
18,537,246 UART: [afmc] ++
18,537,852 UART: [afmc] CDI.KEYID = 6
18,539,010 UART: [afmc] SUBJECT.KEYID = 7
18,540,167 UART: [afmc] AUTHORITY.KEYID = 5
21,902,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,201,054 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,203,345 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
24,219,525 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
24,235,615 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
24,251,769 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
24,275,575 UART: [afmc] --
24,280,016 UART: [cold-reset] --
24,283,463 UART: [state] Locking Datavault
24,288,501 UART: [state] Locking PCR0, PCR1 and PCR31
24,290,221 UART: [state] Locking ICCM
24,291,979 UART: [exit] Launching FMC @ 0x40000000
24,300,611 UART:
24,300,860 UART: Running Caliptra FMC ...
24,301,997 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
4,789,374 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,281,075 >>> mbox cmd response: success
23,980,975 UART:
23,981,358 UART: Running Caliptra FMC ...
23,982,617 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
191,845 UART:
192,226 UART: Running Caliptra ROM ...
193,305 UART:
603,065 UART: [state] CFI Enabled
613,228 UART: [state] LifecycleState = Unprovisioned
615,628 UART: [state] DebugLocked = Yes
618,498 UART: [state] Starting the WD Timer 40000000 cycles
623,865 UART: [kat] SHA2-256
805,819 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,389 UART: [kat] ++
818,001 UART: [kat] sha1
828,291 UART: [kat] SHA2-256
831,308 UART: [kat] SHA2-384
838,062 UART: [kat] SHA2-512-ACC
840,682 UART: [kat] ECC-384
4,094,825 UART: [kat] HMAC-384Kdf
4,106,485 UART: [kat] LMS
5,179,660 UART: [kat] --
5,184,827 UART: [cold-reset] ++
5,186,596 UART: [fht] FHT @ 0x50003400
5,198,293 UART: [idev] ++
5,198,983 UART: [idev] CDI.KEYID = 6
5,200,202 UART: [idev] SUBJECT.KEYID = 7
5,201,614 UART: [idev] UDS.KEYID = 0
5,204,987 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
5,345,531 UART: [idev] Erasing UDS.KEYID = 0
8,491,844 UART: [idev] Sha1 KeyId Algorithm
8,514,151 UART: [idev] --
8,518,988 UART: [ldev] ++
8,519,562 UART: [ldev] CDI.KEYID = 6
8,520,726 UART: [ldev] SUBJECT.KEYID = 5
8,521,941 UART: [ldev] AUTHORITY.KEYID = 7
8,523,090 UART: [ldev] FE.KEYID = 1
8,533,606 UART: [ldev] Erasing FE.KEYID = 1
11,828,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,345 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,137,658 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,153,662 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,169,765 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,189,519 UART: [ldev] --
14,193,470 UART: [fwproc] Wait for Commands...
14,195,201 UART: [fwproc] Recv command 0x46574c44
14,197,461 UART: [fwproc] Recv'd Img size: 111688 bytes
18,246,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,314,851 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,375,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,692,170 >>> mbox cmd response: success
18,697,181 UART: [afmc] ++
18,697,787 UART: [afmc] CDI.KEYID = 6
18,698,874 UART: [afmc] SUBJECT.KEYID = 7
18,700,115 UART: [afmc] AUTHORITY.KEYID = 5
22,021,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,317,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,320,263 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
24,336,456 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
24,352,544 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
24,368,637 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
24,392,139 UART: [afmc] --
24,396,326 UART: [cold-reset] --
24,400,852 UART: [state] Locking Datavault
24,406,770 UART: [state] Locking PCR0, PCR1 and PCR31
24,408,447 UART: [state] Locking ICCM
24,410,553 UART: [exit] Launching FMC @ 0x40000000
24,419,180 UART:
24,419,426 UART: Running Caliptra FMC ...
24,420,563 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
5,099,858 <<< Executing mbox cmd 0x46574c44 (111688 bytes) from SoC
18,493,212 >>> mbox cmd response: success
24,130,919 UART:
24,131,306 UART: Running Caliptra FMC ...
24,132,488 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
191,586 UART:
191,961 UART: Running Caliptra ROM ...
193,043 UART:
193,188 UART: [state] CFI Enabled
263,780 UART: [state] LifecycleState = Unprovisioned
265,701 UART: [state] DebugLocked = Yes
267,360 UART: [state] Starting the WD Timer 40000000 cycles
272,935 UART: [kat] SHA2-256
452,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,654 UART: [kat] ++
464,218 UART: [kat] sha1
475,089 UART: [kat] SHA2-256
478,138 UART: [kat] SHA2-384
484,433 UART: [kat] SHA2-512-ACC
487,405 UART: [kat] ECC-384
2,948,988 UART: [kat] HMAC-384Kdf
2,972,685 UART: [kat] LMS
3,502,205 UART: [kat] --
3,507,846 UART: [cold-reset] ++
3,509,916 UART: [fht] FHT @ 0x50003400
3,520,436 UART: [idev] ++
3,521,006 UART: [idev] CDI.KEYID = 6
3,521,924 UART: [idev] SUBJECT.KEYID = 7
3,523,130 UART: [idev] UDS.KEYID = 0
3,526,249 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,667,692 UART: [idev] Erasing UDS.KEYID = 0
6,028,462 UART: [idev] Sha1 KeyId Algorithm
6,052,187 UART: [idev] --
6,054,484 UART: [ldev] ++
6,055,066 UART: [ldev] CDI.KEYID = 6
6,055,979 UART: [ldev] SUBJECT.KEYID = 5
6,057,203 UART: [ldev] AUTHORITY.KEYID = 7
6,058,437 UART: [ldev] FE.KEYID = 1
6,102,576 UART: [ldev] Erasing FE.KEYID = 1
8,607,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,638 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,656 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,458 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,426 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,385 UART: [ldev] --
10,415,020 UART: [fwproc] Wait for Commands...
10,416,808 UART: [fwproc] Recv command 0x46574c44
10,418,903 UART: [fwproc] Recv'd Img size: 112032 bytes
13,795,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,670 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,927,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,247,213 >>> mbox cmd response: success
14,251,434 UART: [afmc] ++
14,252,042 UART: [afmc] CDI.KEYID = 6
14,252,999 UART: [afmc] SUBJECT.KEYID = 7
14,254,136 UART: [afmc] AUTHORITY.KEYID = 5
16,787,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,512,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,514,013 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,530,193 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,546,137 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,562,055 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,586,095 UART: [afmc] --
18,590,367 UART: [cold-reset] --
18,594,003 UART: [state] Locking Datavault
18,598,086 UART: [state] Locking PCR0, PCR1 and PCR31
18,599,800 UART: [state] Locking ICCM
18,601,541 UART: [exit] Launching FMC @ 0x40000000
18,609,922 UART:
18,610,172 UART: Running Caliptra FMC ...
18,611,320 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,384,842 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,062,077 >>> mbox cmd response: success
18,347,065 UART:
18,347,451 UART: Running Caliptra FMC ...
18,348,724 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
192,070 UART:
192,445 UART: Running Caliptra ROM ...
193,578 UART:
603,284 UART: [state] CFI Enabled
616,039 UART: [state] LifecycleState = Unprovisioned
617,874 UART: [state] DebugLocked = Yes
620,180 UART: [state] Starting the WD Timer 40000000 cycles
624,474 UART: [kat] SHA2-256
803,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,213 UART: [kat] ++
815,776 UART: [kat] sha1
826,086 UART: [kat] SHA2-256
829,115 UART: [kat] SHA2-384
835,965 UART: [kat] SHA2-512-ACC
838,936 UART: [kat] ECC-384
3,282,413 UART: [kat] HMAC-384Kdf
3,295,031 UART: [kat] LMS
3,824,515 UART: [kat] --
3,828,062 UART: [cold-reset] ++
3,830,620 UART: [fht] FHT @ 0x50003400
3,842,116 UART: [idev] ++
3,842,674 UART: [idev] CDI.KEYID = 6
3,843,602 UART: [idev] SUBJECT.KEYID = 7
3,844,801 UART: [idev] UDS.KEYID = 0
3,847,742 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
3,988,661 UART: [idev] Erasing UDS.KEYID = 0
6,315,081 UART: [idev] Sha1 KeyId Algorithm
6,337,177 UART: [idev] --
6,339,762 UART: [ldev] ++
6,340,330 UART: [ldev] CDI.KEYID = 6
6,341,209 UART: [ldev] SUBJECT.KEYID = 5
6,342,344 UART: [ldev] AUTHORITY.KEYID = 7
6,343,676 UART: [ldev] FE.KEYID = 1
6,355,834 UART: [ldev] Erasing FE.KEYID = 1
8,827,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,741 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,560,692 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,576,566 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,592,482 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,612,443 UART: [ldev] --
10,616,375 UART: [fwproc] Wait for Commands...
10,619,392 UART: [fwproc] Recv command 0x46574c44
10,621,429 UART: [fwproc] Recv'd Img size: 112032 bytes
13,991,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,063,889 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,124,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,442,517 >>> mbox cmd response: success
14,447,082 UART: [afmc] ++
14,447,701 UART: [afmc] CDI.KEYID = 6
14,448,651 UART: [afmc] SUBJECT.KEYID = 7
14,449,786 UART: [afmc] AUTHORITY.KEYID = 5
16,949,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,672,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,674,151 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,690,350 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,706,250 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,722,216 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,746,101 UART: [afmc] --
18,750,171 UART: [cold-reset] --
18,753,962 UART: [state] Locking Datavault
18,758,632 UART: [state] Locking PCR0, PCR1 and PCR31
18,760,336 UART: [state] Locking ICCM
18,762,471 UART: [exit] Launching FMC @ 0x40000000
18,770,833 UART:
18,771,080 UART: Running Caliptra FMC ...
18,772,229 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
3,700,025 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,235,353 >>> mbox cmd response: success
18,487,522 UART:
18,487,914 UART: Running Caliptra FMC ...
18,489,072 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,363,042 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,003,679 >>> mbox cmd response: success
18,295,995 UART:
18,296,393 UART: Running Caliptra FMC ...
18,297,637 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,698,888 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
14,235,278 >>> mbox cmd response: success
18,486,710 UART:
18,487,106 UART: Running Caliptra FMC ...
18,488,368 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,023 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = Yes
86,197 UART: [state] Starting the WD Timer 40000000 cycles
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,420 UART: [kat] HMAC-384Kdf
920,856 UART: [kat] LMS
1,169,168 UART: [kat] --
1,170,189 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,174,340 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,207,967 UART: [idev] --
1,209,032 UART: [ldev] ++
1,209,200 UART: [ldev] CDI.KEYID = 6
1,209,564 UART: [ldev] SUBJECT.KEYID = 5
1,209,991 UART: [ldev] AUTHORITY.KEYID = 7
1,210,454 UART: [ldev] FE.KEYID = 1
1,215,562 UART: [ldev] Erasing FE.KEYID = 1
1,242,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,099 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,793 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,663 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,369 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,493 UART: [ldev] --
1,281,917 UART: [fwproc] Wait for Commands...
1,282,730 UART: [fwproc] Recv command 0x46574c44
1,283,463 UART: [fwproc] Recv'd Img size: 112032 bytes
2,553,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,295 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,742,045 >>> mbox cmd response: success
2,743,181 UART: [afmc] ++
2,743,349 UART: [afmc] CDI.KEYID = 6
2,743,712 UART: [afmc] SUBJECT.KEYID = 7
2,744,138 UART: [afmc] AUTHORITY.KEYID = 5
2,779,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,369 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,802,082 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,953 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,663 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,513 UART: [afmc] --
2,822,410 UART: [cold-reset] --
2,823,276 UART: [state] Locking Datavault
2,824,415 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,019 UART: [state] Locking ICCM
2,825,633 UART: [exit] Launching FMC @ 0x40000000
2,830,930 UART:
2,830,946 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,335 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,729 >>> mbox cmd response: success
2,653,409 UART:
2,653,425 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = Yes
86,514 UART: [state] Starting the WD Timer 40000000 cycles
88,201 UART: [kat] SHA2-256
891,751 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,880 UART: [kat] ++
896,032 UART: [kat] sha1
900,426 UART: [kat] SHA2-256
902,366 UART: [kat] SHA2-384
905,195 UART: [kat] SHA2-512-ACC
907,096 UART: [kat] ECC-384
916,693 UART: [kat] HMAC-384Kdf
921,259 UART: [kat] LMS
1,169,571 UART: [kat] --
1,170,570 UART: [cold-reset] ++
1,170,991 UART: [fht] FHT @ 0x50003400
1,173,755 UART: [idev] ++
1,173,923 UART: [idev] CDI.KEYID = 6
1,174,284 UART: [idev] SUBJECT.KEYID = 7
1,174,709 UART: [idev] UDS.KEYID = 0
1,175,055 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,199,379 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,173 UART: [ldev] ++
1,209,341 UART: [ldev] CDI.KEYID = 6
1,209,705 UART: [ldev] SUBJECT.KEYID = 5
1,210,132 UART: [ldev] AUTHORITY.KEYID = 7
1,210,595 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,242,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,136 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,830 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,700 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,406 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,462 UART: [ldev] --
1,281,830 UART: [fwproc] Wait for Commands...
1,282,585 UART: [fwproc] Recv command 0x46574c44
1,283,318 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,716 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,410 >>> mbox cmd response: success
2,744,620 UART: [afmc] ++
2,744,788 UART: [afmc] CDI.KEYID = 6
2,745,151 UART: [afmc] SUBJECT.KEYID = 7
2,745,577 UART: [afmc] AUTHORITY.KEYID = 5
2,781,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,420 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,804,133 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,810,004 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,815,714 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,823,694 UART: [afmc] --
2,824,779 UART: [cold-reset] --
2,825,653 UART: [state] Locking Datavault
2,827,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,662 UART: [state] Locking ICCM
2,828,158 UART: [exit] Launching FMC @ 0x40000000
2,833,455 UART:
2,833,471 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,834 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,056 >>> mbox cmd response: success
2,653,334 UART:
2,653,350 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = Yes
86,427 UART: [state] Starting the WD Timer 40000000 cycles
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,623 UART: [kat] ++
895,775 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,827 UART: [cold-reset] ++
1,170,278 UART: [fht] FHT @ 0x50003400
1,172,762 UART: [idev] ++
1,172,930 UART: [idev] CDI.KEYID = 6
1,173,291 UART: [idev] SUBJECT.KEYID = 7
1,173,716 UART: [idev] UDS.KEYID = 0
1,174,062 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,181,665 UART: [idev] Erasing UDS.KEYID = 0
1,198,344 UART: [idev] Sha1 KeyId Algorithm
1,207,283 UART: [idev] --
1,208,162 UART: [ldev] ++
1,208,330 UART: [ldev] CDI.KEYID = 6
1,208,694 UART: [ldev] SUBJECT.KEYID = 5
1,209,121 UART: [ldev] AUTHORITY.KEYID = 7
1,209,584 UART: [ldev] FE.KEYID = 1
1,214,560 UART: [ldev] Erasing FE.KEYID = 1
1,240,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,409 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,103 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,973 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,679 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,931 UART: [ldev] --
1,280,317 UART: [fwproc] Wait for Commands...
1,281,142 UART: [fwproc] Recv command 0x46574c44
1,281,875 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,955 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,585 >>> mbox cmd response: success
2,742,761 UART: [afmc] ++
2,742,929 UART: [afmc] CDI.KEYID = 6
2,743,292 UART: [afmc] SUBJECT.KEYID = 7
2,743,718 UART: [afmc] AUTHORITY.KEYID = 5
2,779,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,027 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,801,740 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,611 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,321 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,233 UART: [afmc] --
2,822,150 UART: [cold-reset] --
2,823,116 UART: [state] Locking Datavault
2,824,425 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,029 UART: [state] Locking ICCM
2,825,535 UART: [exit] Launching FMC @ 0x40000000
2,830,832 UART:
2,830,848 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,279 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,495 >>> mbox cmd response: success
2,654,103 UART:
2,654,119 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = Yes
86,584 UART: [state] Starting the WD Timer 40000000 cycles
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,946 UART: [kat] ++
896,098 UART: [kat] sha1
900,306 UART: [kat] SHA2-256
902,246 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,825 UART: [kat] HMAC-384Kdf
921,625 UART: [kat] LMS
1,169,937 UART: [kat] --
1,170,662 UART: [cold-reset] ++
1,171,219 UART: [fht] FHT @ 0x50003400
1,173,907 UART: [idev] ++
1,174,075 UART: [idev] CDI.KEYID = 6
1,174,436 UART: [idev] SUBJECT.KEYID = 7
1,174,861 UART: [idev] UDS.KEYID = 0
1,175,207 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,183,004 UART: [idev] Erasing UDS.KEYID = 0
1,200,379 UART: [idev] Sha1 KeyId Algorithm
1,209,250 UART: [idev] --
1,210,185 UART: [ldev] ++
1,210,353 UART: [ldev] CDI.KEYID = 6
1,210,717 UART: [ldev] SUBJECT.KEYID = 5
1,211,144 UART: [ldev] AUTHORITY.KEYID = 7
1,211,607 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,242,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,246 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,940 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,810 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,516 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,638 UART: [ldev] --
1,282,006 UART: [fwproc] Wait for Commands...
1,282,653 UART: [fwproc] Recv command 0x46574c44
1,283,386 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,898 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,583 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,744,648 >>> mbox cmd response: success
2,745,740 UART: [afmc] ++
2,745,908 UART: [afmc] CDI.KEYID = 6
2,746,271 UART: [afmc] SUBJECT.KEYID = 7
2,746,697 UART: [afmc] AUTHORITY.KEYID = 5
2,782,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,728 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,805,441 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,811,312 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,817,022 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,824,918 UART: [afmc] --
2,825,927 UART: [cold-reset] --
2,826,781 UART: [state] Locking Datavault
2,827,940 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,544 UART: [state] Locking ICCM
2,829,008 UART: [exit] Launching FMC @ 0x40000000
2,834,305 UART:
2,834,321 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,252 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,592,322 >>> mbox cmd response: success
2,655,292 UART:
2,655,308 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = Yes
86,547 UART: [state] Starting the WD Timer 40000000 cycles
88,212 UART: [kat] SHA2-256
891,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,891 UART: [kat] ++
896,043 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,108 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,538 UART: [fht] FHT @ 0x50003400
1,173,086 UART: [idev] ++
1,173,254 UART: [idev] CDI.KEYID = 6
1,173,615 UART: [idev] SUBJECT.KEYID = 7
1,174,040 UART: [idev] UDS.KEYID = 0
1,174,386 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,251 UART: [idev] --
1,209,256 UART: [ldev] ++
1,209,424 UART: [ldev] CDI.KEYID = 6
1,209,788 UART: [ldev] SUBJECT.KEYID = 5
1,210,215 UART: [ldev] AUTHORITY.KEYID = 7
1,210,678 UART: [ldev] FE.KEYID = 1
1,216,026 UART: [ldev] Erasing FE.KEYID = 1
1,242,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,205 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,075 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,781 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,793 UART: [ldev] --
1,281,087 UART: [fwproc] Wait for Commands...
1,281,858 UART: [fwproc] Recv command 0x46574c44
1,282,591 UART: [fwproc] Recv'd Img size: 112032 bytes
2,552,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,073 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,741,865 >>> mbox cmd response: success
2,743,103 UART: [afmc] ++
2,743,271 UART: [afmc] CDI.KEYID = 6
2,743,634 UART: [afmc] SUBJECT.KEYID = 7
2,744,060 UART: [afmc] AUTHORITY.KEYID = 5
2,779,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,079 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,802,792 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,808,663 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,814,373 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,822,063 UART: [afmc] --
2,823,038 UART: [cold-reset] --
2,823,872 UART: [state] Locking Datavault
2,825,009 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,613 UART: [state] Locking ICCM
2,826,275 UART: [exit] Launching FMC @ 0x40000000
2,831,572 UART:
2,831,588 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,709 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,783 >>> mbox cmd response: success
2,652,825 UART:
2,652,841 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = Yes
86,688 UART: [state] Starting the WD Timer 40000000 cycles
88,247 UART: [kat] SHA2-256
891,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,926 UART: [kat] ++
896,078 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,811 UART: [kat] HMAC-384Kdf
921,433 UART: [kat] LMS
1,169,745 UART: [kat] --
1,170,772 UART: [cold-reset] ++
1,171,143 UART: [fht] FHT @ 0x50003400
1,173,701 UART: [idev] ++
1,173,869 UART: [idev] CDI.KEYID = 6
1,174,230 UART: [idev] SUBJECT.KEYID = 7
1,174,655 UART: [idev] UDS.KEYID = 0
1,175,001 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
1,182,614 UART: [idev] Erasing UDS.KEYID = 0
1,199,895 UART: [idev] Sha1 KeyId Algorithm
1,208,600 UART: [idev] --
1,209,473 UART: [ldev] ++
1,209,641 UART: [ldev] CDI.KEYID = 6
1,210,005 UART: [ldev] SUBJECT.KEYID = 5
1,210,432 UART: [ldev] AUTHORITY.KEYID = 7
1,210,895 UART: [ldev] FE.KEYID = 1
1,216,383 UART: [ldev] Erasing FE.KEYID = 1
1,242,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,162 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,856 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,726 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,432 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,480 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,485 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 112032 bytes
2,554,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,974 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,659 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,743,528 >>> mbox cmd response: success
2,744,542 UART: [afmc] ++
2,744,710 UART: [afmc] CDI.KEYID = 6
2,745,073 UART: [afmc] SUBJECT.KEYID = 7
2,745,499 UART: [afmc] AUTHORITY.KEYID = 5
2,781,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,008 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,803,721 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,809,592 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,815,302 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,823,252 UART: [afmc] --
2,824,203 UART: [cold-reset] --
2,825,107 UART: [state] Locking Datavault
2,826,242 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,846 UART: [state] Locking ICCM
2,827,520 UART: [exit] Launching FMC @ 0x40000000
2,832,817 UART:
2,832,833 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,624 <<< Executing mbox cmd 0x46574c44 (112032 bytes) from SoC
2,591,638 >>> mbox cmd response: success
2,654,228 UART:
2,654,244 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,262 UART:
192,626 UART: Running Caliptra ROM ...
193,807 UART:
193,956 UART: [state] CFI Enabled
260,267 UART: [state] LifecycleState = Unprovisioned
262,671 UART: [state] DebugLocked = No
265,512 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,533 UART:
192,927 UART: Running Caliptra ROM ...
194,112 UART:
603,671 UART: [state] CFI Enabled
616,612 UART: [state] LifecycleState = Unprovisioned
618,943 UART: [state] DebugLocked = No
620,426 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,028 UART:
192,411 UART: Running Caliptra ROM ...
193,588 UART:
193,755 UART: [state] CFI Enabled
264,300 UART: [state] LifecycleState = Unprovisioned
266,191 UART: [state] DebugLocked = No
267,571 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
192,720 UART:
193,089 UART: Running Caliptra ROM ...
194,270 UART:
603,927 UART: [state] CFI Enabled
616,914 UART: [state] LifecycleState = Unprovisioned
618,772 UART: [state] DebugLocked = No
620,573 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,288 UART:
192,652 UART: Running Caliptra ROM ...
193,882 UART:
194,031 UART: [state] CFI Enabled
261,766 UART: [state] LifecycleState = Unprovisioned
264,187 UART: [state] DebugLocked = No
266,968 UART: [state] WD Timer not started. Device not locked for debugging
271,391 UART: [kat] SHA2-256
453,322 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,847 UART: [kat] ++
465,383 UART: [kat] sha1
476,592 UART: [kat] SHA2-256
479,590 UART: [kat] SHA2-384
484,696 UART: [kat] SHA2-512-ACC
487,324 UART: [kat] ECC-384
3,770,127 UART: [kat] HMAC-384Kdf
3,798,506 UART: [kat] LMS
4,871,662 UART: [kat] --
4,877,385 UART: [cold-reset] ++
4,879,313 UART: [fht] FHT @ 0x50003400
4,891,856 UART: [idev] ++
4,892,530 UART: [idev] CDI.KEYID = 6
4,893,682 UART: [idev] SUBJECT.KEYID = 7
4,894,893 UART: [idev] UDS.KEYID = 0
4,925,740 UART: [idev] Erasing UDS.KEYID = 0
8,239,923 UART: [idev] Sha1 KeyId Algorithm
8,260,562 UART: [idev] CSR upload begun
8,266,023 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,568,510 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,584,797 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,600,873 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,616,859 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,641,476 UART: [idev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
10,787,551 UART: [idev] CSR uploaded
10,802,658 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,803,144 UART: [idev] --
10,808,770 UART: [ldev] ++
10,809,327 UART: [ldev] CDI.KEYID = 6
10,810,205 UART: [ldev] SUBJECT.KEYID = 5
10,811,434 UART: [ldev] AUTHORITY.KEYID = 7
10,812,666 UART: [ldev] FE.KEYID = 1
10,850,398 UART: [ldev] Erasing FE.KEYID = 1
14,190,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,499,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,515,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,531,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,547,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,566,845 UART: [ldev] --
16,570,595 UART: [fwproc] Wait for Commands...
16,572,796 UART: [fwproc] Recv command 0x49444352
16,588,236 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
10,479,433 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,166,714 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,727 UART:
193,083 UART: Running Caliptra ROM ...
194,199 UART:
603,869 UART: [state] CFI Enabled
615,913 UART: [state] LifecycleState = Unprovisioned
618,284 UART: [state] DebugLocked = No
621,024 UART: [state] WD Timer not started. Device not locked for debugging
626,209 UART: [kat] SHA2-256
808,200 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,718 UART: [kat] ++
820,307 UART: [kat] sha1
830,211 UART: [kat] SHA2-256
833,205 UART: [kat] SHA2-384
839,442 UART: [kat] SHA2-512-ACC
842,046 UART: [kat] ECC-384
4,098,117 UART: [kat] HMAC-384Kdf
4,110,036 UART: [kat] LMS
5,183,220 UART: [kat] --
5,187,664 UART: [cold-reset] ++
5,190,144 UART: [fht] FHT @ 0x50003400
5,203,160 UART: [idev] ++
5,203,843 UART: [idev] CDI.KEYID = 6
5,205,092 UART: [idev] SUBJECT.KEYID = 7
5,206,471 UART: [idev] UDS.KEYID = 0
5,222,092 UART: [idev] Erasing UDS.KEYID = 0
8,495,006 UART: [idev] Sha1 KeyId Algorithm
8,515,243 UART: [idev] CSR upload begun
8,520,754 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,811,374 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,827,715 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,843,819 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,859,817 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,884,394 UART: [idev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
11,030,380 UART: [idev] CSR uploaded
11,045,501 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,045,990 UART: [idev] --
11,051,303 UART: [ldev] ++
11,051,862 UART: [ldev] CDI.KEYID = 6
11,052,755 UART: [ldev] SUBJECT.KEYID = 5
11,054,008 UART: [ldev] AUTHORITY.KEYID = 7
11,055,201 UART: [ldev] FE.KEYID = 1
11,065,224 UART: [ldev] Erasing FE.KEYID = 1
14,353,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,644,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,660,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,676,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,692,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,713,808 UART: [ldev] --
16,718,459 UART: [fwproc] Wait for Commands...
16,721,598 UART: [fwproc] Recv command 0x49444352
16,737,041 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,259 writing to cptra_bootfsm_go
10,738,532 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,356,663 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,120 UART:
192,512 UART: Running Caliptra ROM ...
193,682 UART:
193,833 UART: [state] CFI Enabled
262,913 UART: [state] LifecycleState = Unprovisioned
264,778 UART: [state] DebugLocked = No
266,689 UART: [state] WD Timer not started. Device not locked for debugging
270,296 UART: [kat] SHA2-256
449,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,984 UART: [kat] ++
461,524 UART: [kat] sha1
472,357 UART: [kat] SHA2-256
475,417 UART: [kat] SHA2-384
482,144 UART: [kat] SHA2-512-ACC
485,141 UART: [kat] ECC-384
2,946,031 UART: [kat] HMAC-384Kdf
2,969,807 UART: [kat] LMS
3,499,270 UART: [kat] --
3,503,258 UART: [cold-reset] ++
3,505,144 UART: [fht] FHT @ 0x50003400
3,516,177 UART: [idev] ++
3,516,742 UART: [idev] CDI.KEYID = 6
3,517,721 UART: [idev] SUBJECT.KEYID = 7
3,518,817 UART: [idev] UDS.KEYID = 0
3,542,100 UART: [idev] Erasing UDS.KEYID = 0
6,029,393 UART: [idev] Sha1 KeyId Algorithm
6,050,638 UART: [idev] CSR upload begun
6,055,363 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,779,545 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,795,631 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,811,597 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,827,417 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,851,257 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,996,375 UART: [idev] CSR uploaded
8,012,443 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,012,941 UART: [idev] --
8,016,847 UART: [ldev] ++
8,017,417 UART: [ldev] CDI.KEYID = 6
8,018,335 UART: [ldev] SUBJECT.KEYID = 5
8,019,480 UART: [ldev] AUTHORITY.KEYID = 7
8,020,794 UART: [ldev] FE.KEYID = 1
8,059,774 UART: [ldev] Erasing FE.KEYID = 1
10,561,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,301,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,317,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,333,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,349,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,369,452 UART: [ldev] --
12,373,586 UART: [fwproc] Wait for Commands...
12,375,802 UART: [fwproc] Recv command 0x49444352
12,390,922 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
7,686,118 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,988,493 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,486 UART:
192,873 UART: Running Caliptra ROM ...
194,046 UART:
603,663 UART: [state] CFI Enabled
616,504 UART: [state] LifecycleState = Unprovisioned
618,385 UART: [state] DebugLocked = No
621,328 UART: [state] WD Timer not started. Device not locked for debugging
624,628 UART: [kat] SHA2-256
803,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,325 UART: [kat] ++
815,774 UART: [kat] sha1
826,701 UART: [kat] SHA2-256
829,723 UART: [kat] SHA2-384
835,376 UART: [kat] SHA2-512-ACC
838,307 UART: [kat] ECC-384
3,278,467 UART: [kat] HMAC-384Kdf
3,289,672 UART: [kat] LMS
3,819,137 UART: [kat] --
3,823,558 UART: [cold-reset] ++
3,825,756 UART: [fht] FHT @ 0x50003400
3,836,728 UART: [idev] ++
3,837,293 UART: [idev] CDI.KEYID = 6
3,838,255 UART: [idev] SUBJECT.KEYID = 7
3,839,408 UART: [idev] UDS.KEYID = 0
3,856,138 UART: [idev] Erasing UDS.KEYID = 0
6,317,328 UART: [idev] Sha1 KeyId Algorithm
6,337,412 UART: [idev] CSR upload begun
6,342,151 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,055,909 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,072,009 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,087,943 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,103,834 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,127,620 UART: [idev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
8,272,794 UART: [idev] CSR uploaded
8,288,922 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,289,406 UART: [idev] --
8,292,654 UART: [ldev] ++
8,293,212 UART: [ldev] CDI.KEYID = 6
8,294,124 UART: [ldev] SUBJECT.KEYID = 5
8,295,325 UART: [ldev] AUTHORITY.KEYID = 7
8,296,556 UART: [ldev] FE.KEYID = 1
8,306,229 UART: [ldev] Erasing FE.KEYID = 1
10,780,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,499,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,515,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,531,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,547,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,569,125 UART: [ldev] --
12,574,641 UART: [fwproc] Wait for Commands...
12,577,882 UART: [fwproc] Recv command 0x49444352
12,592,998 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
7,938,059 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,169,810 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
7,688,171 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,963,301 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,509 writing to cptra_bootfsm_go
7,944,580 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,174,526 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,096 UART: [kat] SHA2-512-ACC
905,997 UART: [kat] ECC-384
915,656 UART: [kat] HMAC-384Kdf
920,146 UART: [kat] LMS
1,168,458 UART: [kat] --
1,169,171 UART: [cold-reset] ++
1,169,511 UART: [fht] FHT @ 0x50003400
1,172,019 UART: [idev] ++
1,172,187 UART: [idev] CDI.KEYID = 6
1,172,548 UART: [idev] SUBJECT.KEYID = 7
1,172,973 UART: [idev] UDS.KEYID = 0
1,181,037 UART: [idev] Erasing UDS.KEYID = 0
1,197,725 UART: [idev] Sha1 KeyId Algorithm
1,206,079 UART: [idev] CSR upload begun
1,207,858 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,613 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,321 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,206 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,912 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,341 UART: [idev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
1,295,838 UART: [idev] CSR uploaded
1,298,883 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,052 UART: [idev] --
1,300,061 UART: [ldev] ++
1,300,229 UART: [ldev] CDI.KEYID = 6
1,300,593 UART: [ldev] SUBJECT.KEYID = 5
1,301,020 UART: [ldev] AUTHORITY.KEYID = 7
1,301,483 UART: [ldev] FE.KEYID = 1
1,306,591 UART: [ldev] Erasing FE.KEYID = 1
1,332,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,565 UART: [ldev] --
1,371,853 UART: [fwproc] Wait for Commands...
1,372,564 UART: [fwproc] Recv command 0x49444352
1,377,693 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,530 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,542 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,205 UART: [kat] LMS
1,169,517 UART: [kat] --
1,170,496 UART: [cold-reset] ++
1,171,052 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,182,950 UART: [idev] Erasing UDS.KEYID = 0
1,200,462 UART: [idev] Sha1 KeyId Algorithm
1,208,938 UART: [idev] CSR upload begun
1,210,717 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,216 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,924 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,809 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,515 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,944 UART: [idev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
1,298,441 UART: [idev] CSR uploaded
1,301,486 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,655 UART: [idev] --
1,302,640 UART: [ldev] ++
1,302,808 UART: [ldev] CDI.KEYID = 6
1,303,172 UART: [ldev] SUBJECT.KEYID = 5
1,303,599 UART: [ldev] AUTHORITY.KEYID = 7
1,304,062 UART: [ldev] FE.KEYID = 1
1,309,610 UART: [ldev] Erasing FE.KEYID = 1
1,335,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,382 UART: [ldev] --
1,374,672 UART: [fwproc] Wait for Commands...
1,375,485 UART: [fwproc] Recv command 0x49444352
1,380,614 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,195 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,160,231 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
915,882 UART: [kat] HMAC-384Kdf
920,360 UART: [kat] LMS
1,168,672 UART: [kat] --
1,169,437 UART: [cold-reset] ++
1,169,803 UART: [fht] FHT @ 0x50003400
1,172,507 UART: [idev] ++
1,172,675 UART: [idev] CDI.KEYID = 6
1,173,036 UART: [idev] SUBJECT.KEYID = 7
1,173,461 UART: [idev] UDS.KEYID = 0
1,181,673 UART: [idev] Erasing UDS.KEYID = 0
1,198,381 UART: [idev] Sha1 KeyId Algorithm
1,206,733 UART: [idev] CSR upload begun
1,208,512 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,437 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,145 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,030 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,736 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,165 UART: [idev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
1,296,662 UART: [idev] CSR uploaded
1,299,707 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,876 UART: [idev] --
1,300,765 UART: [ldev] ++
1,300,933 UART: [ldev] CDI.KEYID = 6
1,301,297 UART: [ldev] SUBJECT.KEYID = 5
1,301,724 UART: [ldev] AUTHORITY.KEYID = 7
1,302,187 UART: [ldev] FE.KEYID = 1
1,307,299 UART: [ldev] Erasing FE.KEYID = 1
1,333,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,901 UART: [ldev] --
1,372,219 UART: [fwproc] Wait for Commands...
1,373,022 UART: [fwproc] Recv command 0x49444352
1,378,151 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,100 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,128 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,895 UART: [state] LifecycleState = Unprovisioned
85,550 UART: [state] DebugLocked = No
86,156 UART: [state] WD Timer not started. Device not locked for debugging
87,341 UART: [kat] SHA2-256
890,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,020 UART: [kat] ++
895,172 UART: [kat] sha1
899,474 UART: [kat] SHA2-256
901,414 UART: [kat] SHA2-384
904,169 UART: [kat] SHA2-512-ACC
906,070 UART: [kat] ECC-384
915,631 UART: [kat] HMAC-384Kdf
920,069 UART: [kat] LMS
1,168,381 UART: [kat] --
1,169,274 UART: [cold-reset] ++
1,169,778 UART: [fht] FHT @ 0x50003400
1,172,534 UART: [idev] ++
1,172,702 UART: [idev] CDI.KEYID = 6
1,173,063 UART: [idev] SUBJECT.KEYID = 7
1,173,488 UART: [idev] UDS.KEYID = 0
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,198,544 UART: [idev] Sha1 KeyId Algorithm
1,206,888 UART: [idev] CSR upload begun
1,208,667 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,998 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,706 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,591 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,297 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,726 UART: [idev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
1,296,223 UART: [idev] CSR uploaded
1,299,268 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,437 UART: [idev] --
1,300,408 UART: [ldev] ++
1,300,576 UART: [ldev] CDI.KEYID = 6
1,300,940 UART: [ldev] SUBJECT.KEYID = 5
1,301,367 UART: [ldev] AUTHORITY.KEYID = 7
1,301,830 UART: [ldev] FE.KEYID = 1
1,307,130 UART: [ldev] Erasing FE.KEYID = 1
1,333,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,686 UART: [ldev] --
1,373,004 UART: [fwproc] Wait for Commands...
1,373,659 UART: [fwproc] Recv command 0x49444352
1,378,788 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,603 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,585 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,069 UART: [kat] ++
895,221 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
915,988 UART: [kat] HMAC-384Kdf
920,614 UART: [kat] LMS
1,168,926 UART: [kat] --
1,169,739 UART: [cold-reset] ++
1,170,155 UART: [fht] FHT @ 0x50003400
1,172,933 UART: [idev] ++
1,173,101 UART: [idev] CDI.KEYID = 6
1,173,462 UART: [idev] SUBJECT.KEYID = 7
1,173,887 UART: [idev] UDS.KEYID = 0
1,181,943 UART: [idev] Erasing UDS.KEYID = 0
1,198,871 UART: [idev] Sha1 KeyId Algorithm
1,207,151 UART: [idev] CSR upload begun
1,208,930 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,607 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,315 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,200 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,906 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,335 UART: [idev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
1,296,832 UART: [idev] CSR uploaded
1,299,877 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,046 UART: [idev] --
1,300,959 UART: [ldev] ++
1,301,127 UART: [ldev] CDI.KEYID = 6
1,301,491 UART: [ldev] SUBJECT.KEYID = 5
1,301,918 UART: [ldev] AUTHORITY.KEYID = 7
1,302,381 UART: [ldev] FE.KEYID = 1
1,307,827 UART: [ldev] Erasing FE.KEYID = 1
1,333,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,837 UART: [ldev] --
1,373,337 UART: [fwproc] Wait for Commands...
1,374,024 UART: [fwproc] Recv command 0x49444352
1,379,153 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,436 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,500 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,681 UART: [kat] SHA2-512-ACC
906,582 UART: [kat] ECC-384
916,099 UART: [kat] HMAC-384Kdf
920,767 UART: [kat] LMS
1,169,079 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,340 UART: [idev] ++
1,173,508 UART: [idev] CDI.KEYID = 6
1,173,869 UART: [idev] SUBJECT.KEYID = 7
1,174,294 UART: [idev] UDS.KEYID = 0
1,182,450 UART: [idev] Erasing UDS.KEYID = 0
1,199,644 UART: [idev] Sha1 KeyId Algorithm
1,208,048 UART: [idev] CSR upload begun
1,209,827 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,402 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,110 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,995 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,701 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,130 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,627 UART: [idev] CSR uploaded
1,300,672 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,841 UART: [idev] --
1,301,886 UART: [ldev] ++
1,302,054 UART: [ldev] CDI.KEYID = 6
1,302,418 UART: [ldev] SUBJECT.KEYID = 5
1,302,845 UART: [ldev] AUTHORITY.KEYID = 7
1,303,308 UART: [ldev] FE.KEYID = 1
1,308,454 UART: [ldev] Erasing FE.KEYID = 1
1,334,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,712 UART: [ldev] --
1,374,086 UART: [fwproc] Wait for Commands...
1,374,683 UART: [fwproc] Recv command 0x49444352
1,379,812 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,049 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,160,185 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,091 UART:
192,475 UART: Running Caliptra ROM ...
193,693 UART:
193,844 UART: [state] CFI Enabled
264,420 UART: [state] LifecycleState = Unprovisioned
266,783 UART: [state] DebugLocked = No
269,014 UART: [state] WD Timer not started. Device not locked for debugging
274,321 UART: [kat] SHA2-256
456,210 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,754 UART: [kat] ++
468,283 UART: [kat] sha1
478,297 UART: [kat] SHA2-256
481,324 UART: [kat] SHA2-384
486,268 UART: [kat] SHA2-512-ACC
488,875 UART: [kat] ECC-384
3,775,674 UART: [kat] HMAC-384Kdf
3,801,741 UART: [kat] LMS
4,874,943 UART: [kat] --
4,878,734 UART: [cold-reset] ++
4,880,294 UART: [fht] FHT @ 0x50003400
4,891,543 UART: [idev] ++
4,892,219 UART: [idev] CDI.KEYID = 6
4,893,457 UART: [idev] SUBJECT.KEYID = 7
4,894,558 UART: [idev] UDS.KEYID = 0
4,895,561 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
4,921,569 UART: [idev] Erasing UDS.KEYID = 0
8,233,655 UART: [idev] Sha1 KeyId Algorithm
8,253,968 UART: [idev] --
8,259,060 UART: [ldev] ++
8,259,644 UART: [ldev] CDI.KEYID = 6
8,260,882 UART: [ldev] SUBJECT.KEYID = 5
8,262,035 UART: [ldev] AUTHORITY.KEYID = 7
8,263,264 UART: [ldev] FE.KEYID = 1
8,309,024 UART: [ldev] Erasing FE.KEYID = 1
11,642,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,936,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,952,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,968,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,984,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,003,486 UART: [ldev] --
14,007,942 UART: [fwproc] Wait for Commands...
14,010,481 UART: [fwproc] Recv command 0x49444352
14,017,714 UART: ROM Fatal Error: 0x0102000A
14,021,079 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
4,781,407 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
13,810,073 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,452 UART:
192,840 UART: Running Caliptra ROM ...
194,085 UART:
603,748 UART: [state] CFI Enabled
614,878 UART: [state] LifecycleState = Unprovisioned
617,443 UART: [state] DebugLocked = No
618,584 UART: [state] WD Timer not started. Device not locked for debugging
622,992 UART: [kat] SHA2-256
804,954 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,482 UART: [kat] ++
817,036 UART: [kat] sha1
826,939 UART: [kat] SHA2-256
829,945 UART: [kat] SHA2-384
835,750 UART: [kat] SHA2-512-ACC
838,411 UART: [kat] ECC-384
4,093,656 UART: [kat] HMAC-384Kdf
4,105,693 UART: [kat] LMS
5,178,864 UART: [kat] --
5,184,937 UART: [cold-reset] ++
5,187,575 UART: [fht] FHT @ 0x50003400
5,198,933 UART: [idev] ++
5,199,601 UART: [idev] CDI.KEYID = 6
5,200,830 UART: [idev] SUBJECT.KEYID = 7
5,202,275 UART: [idev] UDS.KEYID = 0
5,203,578 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
5,219,194 UART: [idev] Erasing UDS.KEYID = 0
8,496,888 UART: [idev] Sha1 KeyId Algorithm
8,519,349 UART: [idev] --
8,524,049 UART: [ldev] ++
8,524,627 UART: [ldev] CDI.KEYID = 6
8,525,864 UART: [ldev] SUBJECT.KEYID = 5
8,527,296 UART: [ldev] AUTHORITY.KEYID = 7
8,528,778 UART: [ldev] FE.KEYID = 1
8,539,065 UART: [ldev] Erasing FE.KEYID = 1
11,827,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,703 UART: [ldev] --
14,193,177 UART: [fwproc] Wait for Commands...
14,196,185 UART: [fwproc] Recv command 0x49444352
14,203,304 UART: ROM Fatal Error: 0x0102000A
14,206,669 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
5,100,012 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
14,021,141 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,186 UART:
192,583 UART: Running Caliptra ROM ...
193,717 UART:
193,864 UART: [state] CFI Enabled
267,447 UART: [state] LifecycleState = Unprovisioned
269,317 UART: [state] DebugLocked = No
271,392 UART: [state] WD Timer not started. Device not locked for debugging
274,563 UART: [kat] SHA2-256
453,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,264 UART: [kat] ++
465,814 UART: [kat] sha1
477,022 UART: [kat] SHA2-256
480,028 UART: [kat] SHA2-384
484,655 UART: [kat] SHA2-512-ACC
487,585 UART: [kat] ECC-384
2,950,738 UART: [kat] HMAC-384Kdf
2,974,377 UART: [kat] LMS
3,503,851 UART: [kat] --
3,506,603 UART: [cold-reset] ++
3,507,672 UART: [fht] FHT @ 0x50003400
3,518,379 UART: [idev] ++
3,518,946 UART: [idev] CDI.KEYID = 6
3,519,967 UART: [idev] SUBJECT.KEYID = 7
3,521,069 UART: [idev] UDS.KEYID = 0
3,522,050 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,545,037 UART: [idev] Erasing UDS.KEYID = 0
6,031,570 UART: [idev] Sha1 KeyId Algorithm
6,054,564 UART: [idev] --
6,059,536 UART: [ldev] ++
6,060,112 UART: [ldev] CDI.KEYID = 6
6,060,995 UART: [ldev] SUBJECT.KEYID = 5
6,062,098 UART: [ldev] AUTHORITY.KEYID = 7
6,063,454 UART: [ldev] FE.KEYID = 1
6,101,787 UART: [ldev] Erasing FE.KEYID = 1
8,603,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,608 UART: [ldev] --
10,393,221 UART: [fwproc] Wait for Commands...
10,395,639 UART: [fwproc] Recv command 0x49444352
10,402,719 UART: ROM Fatal Error: 0x0102000A
10,405,870 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,363,522 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,170,414 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,326 UART:
192,732 UART: Running Caliptra ROM ...
193,849 UART:
603,256 UART: [state] CFI Enabled
617,176 UART: [state] LifecycleState = Unprovisioned
619,108 UART: [state] DebugLocked = No
621,627 UART: [state] WD Timer not started. Device not locked for debugging
624,711 UART: [kat] SHA2-256
803,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,388 UART: [kat] ++
815,923 UART: [kat] sha1
826,371 UART: [kat] SHA2-256
829,434 UART: [kat] SHA2-384
835,833 UART: [kat] SHA2-512-ACC
838,811 UART: [kat] ECC-384
3,280,547 UART: [kat] HMAC-384Kdf
3,293,275 UART: [kat] LMS
3,822,721 UART: [kat] --
3,827,620 UART: [cold-reset] ++
3,830,211 UART: [fht] FHT @ 0x50003400
3,840,963 UART: [idev] ++
3,841,569 UART: [idev] CDI.KEYID = 6
3,842,454 UART: [idev] SUBJECT.KEYID = 7
3,843,665 UART: [idev] UDS.KEYID = 0
3,844,756 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,858,620 UART: [idev] Erasing UDS.KEYID = 0
6,318,536 UART: [idev] Sha1 KeyId Algorithm
6,340,418 UART: [idev] --
6,343,384 UART: [ldev] ++
6,343,964 UART: [ldev] CDI.KEYID = 6
6,344,892 UART: [ldev] SUBJECT.KEYID = 5
6,346,049 UART: [ldev] AUTHORITY.KEYID = 7
6,347,278 UART: [ldev] FE.KEYID = 1
6,358,843 UART: [ldev] Erasing FE.KEYID = 1
8,833,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,034 UART: [ldev] --
10,621,981 UART: [fwproc] Wait for Commands...
10,624,350 UART: [fwproc] Recv command 0x49444352
10,629,847 UART: ROM Fatal Error: 0x0102000A
10,632,994 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
3,690,688 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,404,062 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,361,158 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,188,514 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,694,028 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,404,081 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,860 UART: [kat] LMS
1,169,172 UART: [kat] --
1,170,013 UART: [cold-reset] ++
1,170,521 UART: [fht] FHT @ 0x50003400
1,173,383 UART: [idev] ++
1,173,551 UART: [idev] CDI.KEYID = 6
1,173,912 UART: [idev] SUBJECT.KEYID = 7
1,174,337 UART: [idev] UDS.KEYID = 0
1,174,683 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,695 UART: [idev] Erasing UDS.KEYID = 0
1,199,877 UART: [idev] Sha1 KeyId Algorithm
1,208,667 UART: [idev] --
1,209,860 UART: [ldev] ++
1,210,028 UART: [ldev] CDI.KEYID = 6
1,210,392 UART: [ldev] SUBJECT.KEYID = 5
1,210,819 UART: [ldev] AUTHORITY.KEYID = 7
1,211,282 UART: [ldev] FE.KEYID = 1
1,216,676 UART: [ldev] Erasing FE.KEYID = 1
1,243,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,034 UART: [ldev] --
1,282,470 UART: [fwproc] Wait for Commands...
1,283,183 UART: [fwproc] Recv command 0x49444352
1,284,791 UART: ROM Fatal Error: 0x0102000A
1,285,952 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,034 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,990 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Unprovisioned
86,584 UART: [state] DebugLocked = No
87,312 UART: [state] WD Timer not started. Device not locked for debugging
88,429 UART: [kat] SHA2-256
891,979 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,108 UART: [kat] ++
896,260 UART: [kat] sha1
900,548 UART: [kat] SHA2-256
902,488 UART: [kat] SHA2-384
905,463 UART: [kat] SHA2-512-ACC
907,364 UART: [kat] ECC-384
917,319 UART: [kat] HMAC-384Kdf
922,099 UART: [kat] LMS
1,170,411 UART: [kat] --
1,171,322 UART: [cold-reset] ++
1,171,846 UART: [fht] FHT @ 0x50003400
1,174,394 UART: [idev] ++
1,174,562 UART: [idev] CDI.KEYID = 6
1,174,923 UART: [idev] SUBJECT.KEYID = 7
1,175,348 UART: [idev] UDS.KEYID = 0
1,175,694 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,183,788 UART: [idev] Erasing UDS.KEYID = 0
1,200,868 UART: [idev] Sha1 KeyId Algorithm
1,209,744 UART: [idev] --
1,210,735 UART: [ldev] ++
1,210,903 UART: [ldev] CDI.KEYID = 6
1,211,267 UART: [ldev] SUBJECT.KEYID = 5
1,211,694 UART: [ldev] AUTHORITY.KEYID = 7
1,212,157 UART: [ldev] FE.KEYID = 1
1,217,493 UART: [ldev] Erasing FE.KEYID = 1
1,244,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,301 UART: [ldev] --
1,283,595 UART: [fwproc] Wait for Commands...
1,284,188 UART: [fwproc] Recv command 0x49444352
1,286,090 UART: ROM Fatal Error: 0x0102000A
1,287,251 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,389 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,835 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,169,687 UART: [cold-reset] ++
1,170,081 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,174,103 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,917 UART: [idev] Erasing UDS.KEYID = 0
1,198,771 UART: [idev] Sha1 KeyId Algorithm
1,207,805 UART: [idev] --
1,209,010 UART: [ldev] ++
1,209,178 UART: [ldev] CDI.KEYID = 6
1,209,542 UART: [ldev] SUBJECT.KEYID = 5
1,209,969 UART: [ldev] AUTHORITY.KEYID = 7
1,210,432 UART: [ldev] FE.KEYID = 1
1,215,296 UART: [ldev] Erasing FE.KEYID = 1
1,241,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,234 UART: [ldev] --
1,280,572 UART: [fwproc] Wait for Commands...
1,281,357 UART: [fwproc] Recv command 0x49444352
1,283,025 UART: ROM Fatal Error: 0x0102000A
1,284,186 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,038 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,360 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,998 UART: [kat] SHA2-256
901,938 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,233 UART: [kat] LMS
1,169,545 UART: [kat] --
1,170,402 UART: [cold-reset] ++
1,170,982 UART: [fht] FHT @ 0x50003400
1,173,630 UART: [idev] ++
1,173,798 UART: [idev] CDI.KEYID = 6
1,174,159 UART: [idev] SUBJECT.KEYID = 7
1,174,584 UART: [idev] UDS.KEYID = 0
1,174,930 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,198,702 UART: [idev] Sha1 KeyId Algorithm
1,207,764 UART: [idev] --
1,208,833 UART: [ldev] ++
1,209,001 UART: [ldev] CDI.KEYID = 6
1,209,365 UART: [ldev] SUBJECT.KEYID = 5
1,209,792 UART: [ldev] AUTHORITY.KEYID = 7
1,210,255 UART: [ldev] FE.KEYID = 1
1,215,409 UART: [ldev] Erasing FE.KEYID = 1
1,241,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,555 UART: [ldev] --
1,280,977 UART: [fwproc] Wait for Commands...
1,281,644 UART: [fwproc] Recv command 0x49444352
1,283,102 UART: ROM Fatal Error: 0x0102000A
1,284,263 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,365 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,867 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,523 UART: [kat] SHA2-256
901,463 UART: [kat] SHA2-384
904,294 UART: [kat] SHA2-512-ACC
906,195 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,805 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,174,289 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,155 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,793 UART: [idev] --
1,208,940 UART: [ldev] ++
1,209,108 UART: [ldev] CDI.KEYID = 6
1,209,472 UART: [ldev] SUBJECT.KEYID = 5
1,209,899 UART: [ldev] AUTHORITY.KEYID = 7
1,210,362 UART: [ldev] FE.KEYID = 1
1,215,676 UART: [ldev] Erasing FE.KEYID = 1
1,242,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,556 UART: [ldev] --
1,282,056 UART: [fwproc] Wait for Commands...
1,282,865 UART: [fwproc] Recv command 0x49444352
1,284,569 UART: ROM Fatal Error: 0x0102000A
1,285,730 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,430 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,362 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
87,066 UART: [state] WD Timer not started. Device not locked for debugging
88,353 UART: [kat] SHA2-256
891,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,032 UART: [kat] ++
896,184 UART: [kat] sha1
900,410 UART: [kat] SHA2-256
902,350 UART: [kat] SHA2-384
905,167 UART: [kat] SHA2-512-ACC
907,068 UART: [kat] ECC-384
916,603 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,174,526 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,040 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,954 UART: [idev] --
1,208,919 UART: [ldev] ++
1,209,087 UART: [ldev] CDI.KEYID = 6
1,209,451 UART: [ldev] SUBJECT.KEYID = 5
1,209,878 UART: [ldev] AUTHORITY.KEYID = 7
1,210,341 UART: [ldev] FE.KEYID = 1
1,215,539 UART: [ldev] Erasing FE.KEYID = 1
1,241,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,339 UART: [ldev] --
1,280,673 UART: [fwproc] Wait for Commands...
1,281,436 UART: [fwproc] Recv command 0x49444352
1,283,086 UART: ROM Fatal Error: 0x0102000A
1,284,247 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,495 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,741 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,179 UART:
192,538 UART: Running Caliptra ROM ...
193,656 UART:
193,803 UART: [state] CFI Enabled
262,208 UART: [state] LifecycleState = Unprovisioned
264,173 UART: [state] DebugLocked = No
265,482 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,617 UART: [kat] SHA2-256
440,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,863 UART: [kat] ++
451,316 UART: [kat] sha1
462,052 UART: [kat] SHA2-256
464,775 UART: [kat] SHA2-384
470,979 UART: [kat] SHA2-512-ACC
473,350 UART: [kat] ECC-384
2,768,314 UART: [kat] HMAC-384Kdf
2,800,210 UART: [kat] LMS
3,990,476 UART: [kat] --
3,995,056 UART: [cold-reset] ++
3,996,711 UART: [fht] Storing FHT @ 0x50003400
4,009,182 UART: [idev] ++
4,009,916 UART: [idev] CDI.KEYID = 6
4,010,873 UART: [idev] SUBJECT.KEYID = 7
4,011,998 UART: [idev] UDS.KEYID = 0
4,013,032 ready_for_fw is high
4,013,257 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,783 UART: [idev] Erasing UDS.KEYID = 0
7,348,522 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,371 UART: [idev] --
7,375,421 UART: [ldev] ++
7,375,995 UART: [ldev] CDI.KEYID = 6
7,376,931 UART: [ldev] SUBJECT.KEYID = 5
7,378,166 UART: [ldev] AUTHORITY.KEYID = 7
7,379,399 UART: [ldev] FE.KEYID = 1
7,424,236 UART: [ldev] Erasing FE.KEYID = 1
10,757,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,402 UART: [ldev] --
13,136,295 UART: [fwproc] Waiting for Commands...
13,139,591 UART: [fwproc] Received command 0x46574c44
13,141,775 UART: [fwproc] Received Image of size 114124 bytes
17,196,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,219 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,344,119 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,660,939 >>> mbox cmd response: success
17,665,851 UART: [afmc] ++
17,666,467 UART: [afmc] CDI.KEYID = 6
17,667,379 UART: [afmc] SUBJECT.KEYID = 7
17,668,653 UART: [afmc] AUTHORITY.KEYID = 5
21,029,522 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,744 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,056 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,429 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,272 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,765 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,465 UART: [afmc] --
23,399,339 UART: [cold-reset] --
23,404,818 UART: [state] Locking Datavault
23,410,874 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,634 UART: [state] Locking ICCM
23,414,762 UART: [exit] Launching FMC @ 0x40000130
23,423,174 UART:
23,423,410 UART: Running Caliptra FMC ...
23,424,511 UART:
23,424,674 UART: [state] CFI Enabled
23,487,970 UART: [fht] FMC Alias Private Key: 7
25,826,104 UART: [art] Extend RT PCRs Done
25,827,322 UART: [art] Lock RT PCRs Done
25,828,927 UART: [art] Populate DV Done
25,834,176 UART: [fht] FMC Alias Private Key: 7
25,835,872 UART: [art] Derive CDI
25,836,610 UART: [art] Store in in slot 0x4
25,896,783 UART: [art] Derive Key Pair
25,897,827 UART: [art] Store priv key in slot 0x5
29,189,947 UART: [art] Derive Key Pair - Done
29,203,259 UART: [art] Signing Cert with AUTHO
29,204,563 UART: RITY.KEYID = 7
31,491,178 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,679 UART: [art] PUB.X = 606B7A23D523CFE465F36CC756AEBB71D7CD0A5F8591589AB2801E1D10E414121E708FE589ED30A8979A48D2A58D3048
31,499,924 UART: [art] PUB.Y = AE4C71120A74691529527287B690B136D92ACF1D41CD170251DCF46D904F53DD36A11017A5510A9BE2CC806094E355A8
31,507,150 UART: [art] SIG.R = 18CAC32B378D0C66FFAD80990B2363849A42DC7C6D512FFE69A55DD3DEBBFE8B1236093CC105CD0A47A8B61CE96CF52A
31,514,538 UART: [art] SIG.S = 30967227352AD8255338333AE53397F029693AEAE04552C784072CF64E439FC36D7E37C7B720D45CB7A0CF29A8EE491D
32,819,955 UART: Caliptra RT
32,820,661 UART: [state] CFI Enabled
32,981,005 UART: [rt] RT listening for mailbox commands...
32,983,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,138,662 UART: [rt]cmd =0x41544d4e, len=14344
38,374,165 >>> mbox cmd response data (8 bytes)
38,375,209 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,405,983 UART: [rt]cmd =0x41545348, len=116
38,426,418 >>> mbox cmd response data (12 bytes)
40,560,236 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,705,427 UART:
40,705,783 UART: Running Caliptra ROM ...
40,706,846 UART:
40,706,999 UART: [state] CFI Enabled
40,766,453 UART: [state] LifecycleState = Unprovisioned
40,768,396 UART: [state] DebugLocked = No
40,771,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,776,565 UART: [kat] SHA2-256
40,946,257 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,956,730 UART: [kat] ++
40,957,188 UART: [kat] sha1
40,968,294 UART: [kat] SHA2-256
40,970,958 UART: [kat] SHA2-384
40,976,602 UART: [kat] SHA2-512-ACC
40,978,956 UART: [kat] ECC-384
43,269,527 UART: [kat] HMAC-384Kdf
43,302,238 UART: [kat] LMS
44,492,573 UART: [kat] --
44,497,444 UART: [update-reset] ++
48,634,439 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,638,548 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
49,020,783 >>> mbox cmd response: success
49,025,537 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,026,153 UART: [update-reset] Copying MAN_2 To MAN_1
49,045,173 UART: [update-reset Success] --
49,048,933 UART: [state] Locking Datavault
49,052,247 UART: [state] Locking PCR0, PCR1 and PCR31
49,054,000 UART: [state] Locking ICCM
49,055,635 UART: [exit] Launching FMC @ 0x40000130
49,064,094 UART:
49,064,347 UART: Running Caliptra FMC ...
49,065,455 UART:
49,065,620 UART: [state] CFI Enabled
49,158,440 UART: [art] Extend RT PCRs Done
49,159,631 UART: [art] Lock RT PCRs Done
49,161,195 UART: [art] Populate DV Done
49,166,656 UART: [fht] FMC Alias Private Key: 7
49,168,203 UART: [art] Derive CDI
49,169,022 UART: [art] Store in in slot 0x4
49,227,255 UART: [art] Derive Key Pair
49,228,312 UART: [art] Store priv key in slot 0x5
52,520,713 UART: [art] Derive Key Pair - Done
52,533,656 UART: [art] Signing Cert with AUTHO
52,534,961 UART: RITY.KEYID = 7
54,822,454 UART: [art] Erasing AUTHORITY.KEYID = 7
54,823,960 UART: [art] PUB.X = 09A23A637805C2E215FD5EAF6CFD811D01989B0BB36C70BAD048EFF9274F405D2322BDAAEA6BB0B86AC5BFF1480286CA
54,831,212 UART: [art] PUB.Y = 777F85E4D95DB33FEB4DB279ED1BE507391CC5D5691878D05197C513E6079F88B71FEB2EC077FA349D1F89A68CCA7B43
54,838,493 UART: [art] SIG.R = 9C9C6F6CDCFBB74B9A9703525280A1886639C002A032EC2D01BCA53F84FA85D01238F90C9B3E09AE03F0A9F32A26BED6
54,845,826 UART: [art] SIG.S = CA028D732A8344BA28D9A6EFE0C860D43B1B3FB0CBBBFA686DAC5551C446BFFE106EA38DB6B8A78838127A1291E66674
56,150,536 UART: Caliptra RT
56,151,243 UART: [state] CFI Enabled
56,487,427 UART: [rt] RT listening for mailbox commands...
56,519,384 UART: [rt]cmd =0x41545348, len=116
56,539,932 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,801,910 ready_for_fw is high
3,802,285 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,876,973 >>> mbox cmd response: success
23,572,667 UART:
23,573,065 UART: Running Caliptra FMC ...
23,574,268 UART:
23,574,449 UART: [state] CFI Enabled
23,637,179 UART: [fht] FMC Alias Private Key: 7
25,974,539 UART: [art] Extend RT PCRs Done
25,975,762 UART: [art] Lock RT PCRs Done
25,977,369 UART: [art] Populate DV Done
25,982,565 UART: [fht] FMC Alias Private Key: 7
25,984,220 UART: [art] Derive CDI
25,984,960 UART: [art] Store in in slot 0x4
26,045,345 UART: [art] Derive Key Pair
26,046,352 UART: [art] Store priv key in slot 0x5
29,339,012 UART: [art] Derive Key Pair - Done
29,351,975 UART: [art] Signing Cert with AUTHO
29,353,284 UART: RITY.KEYID = 7
31,640,203 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,718 UART: [art] PUB.X = DE0B3CD3D75BB657B61BEB1C11FBADF5C0995452607DAE996A9A9A7DA201F8FF213197F6A5D2CCFF753A7CF1660ED72B
31,648,990 UART: [art] PUB.Y = 55F908E59C8FD0F81CB46CEF5B6EBA909212A5905C41126566DDB3AD0A68776E82A176515B233FFAF0AB94C93D8F10A7
31,656,239 UART: [art] SIG.R = 02D4AFCEDE5518D4595C4BA96D1BCD33A4B09C36B39079605E63FE98237C735E594BB82FD0F75933CDF8F46D7A12E36C
31,663,635 UART: [art] SIG.S = 635F9D8A7EEE679C0B2F0562C984AC716F1A535C161FB514CFD062841ECD520FCC4E8EDDF4FF1684E0F4D723A9CD867E
32,968,343 UART: Caliptra RT
32,969,039 UART: [state] CFI Enabled
33,130,093 UART: [rt] RT listening for mailbox commands...
33,132,507 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,287,835 UART: [rt]cmd =0x41544d4e, len=14344
38,523,652 >>> mbox cmd response data (8 bytes)
38,524,231 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,554,699 UART: [rt]cmd =0x41545348, len=116
38,574,327 >>> mbox cmd response data (12 bytes)
40,708,001 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,447,468 >>> mbox cmd response: success
49,448,012 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,482,067 UART:
49,482,365 UART: Running Caliptra FMC ...
49,483,441 UART:
49,483,600 UART: [state] CFI Enabled
49,587,402 UART: [art] Extend RT PCRs Done
49,588,607 UART: [art] Lock RT PCRs Done
49,590,122 UART: [art] Populate DV Done
49,595,644 UART: [fht] FMC Alias Private Key: 7
49,597,127 UART: [art] Derive CDI
49,597,865 UART: [art] Store in in slot 0x4
49,657,002 UART: [art] Derive Key Pair
49,658,216 UART: [art] Store priv key in slot 0x5
52,952,278 UART: [art] Derive Key Pair - Done
52,964,995 UART: [art] Signing Cert with AUTHO
52,966,306 UART: RITY.KEYID = 7
55,255,031 UART: [art] Erasing AUTHORITY.KEYID = 7
55,256,553 UART: [art] PUB.X = C5BC4775F16775A4313A4C85DDF94DC5BACF1679409D6D9D36745A2D0B10675104F8E35176FEBE4F6C3B8D71F0DC2A5B
55,263,832 UART: [art] PUB.Y = 1881C664F22EF42E523572F59C7A0E8987C60D102D570C5B798AE5B7482E35FA7872C5E318C96AA48A53B0B96CBAE8C1
55,271,063 UART: [art] SIG.R = D1D1FA865A444C4C47B1425B7B1404207B635DB22883640E744D6E05EB88FD4A9EB31A711EBD632C3F68CF60AD59682A
55,278,429 UART: [art] SIG.S = 44CF0257C020490B8BB99ED04739228BF5FFB661FEF0F2195B5CA751557872C9AFE22412B835648635C17EB5544B3E39
56,583,731 UART: Caliptra RT
56,584,430 UART: [state] CFI Enabled
56,921,327 UART: [rt] RT listening for mailbox commands...
56,953,306 UART: [rt]cmd =0x41545348, len=116
56,973,846 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,502 UART:
192,846 UART: Running Caliptra ROM ...
194,057 UART:
603,676 UART: [state] CFI Enabled
618,124 UART: [state] LifecycleState = Unprovisioned
620,061 UART: [state] DebugLocked = No
621,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,368 UART: [kat] SHA2-256
796,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,649 UART: [kat] ++
807,129 UART: [kat] sha1
818,347 UART: [kat] SHA2-256
821,069 UART: [kat] SHA2-384
827,341 UART: [kat] SHA2-512-ACC
829,708 UART: [kat] ECC-384
3,115,513 UART: [kat] HMAC-384Kdf
3,127,605 UART: [kat] LMS
4,317,707 UART: [kat] --
4,322,239 UART: [cold-reset] ++
4,324,172 UART: [fht] Storing FHT @ 0x50003400
4,335,217 UART: [idev] ++
4,335,854 UART: [idev] CDI.KEYID = 6
4,336,732 UART: [idev] SUBJECT.KEYID = 7
4,337,913 UART: [idev] UDS.KEYID = 0
4,339,051 ready_for_fw is high
4,339,240 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,550 UART: [idev] Erasing UDS.KEYID = 0
7,630,876 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,631 UART: [idev] --
7,658,189 UART: [ldev] ++
7,658,756 UART: [ldev] CDI.KEYID = 6
7,659,715 UART: [ldev] SUBJECT.KEYID = 5
7,660,920 UART: [ldev] AUTHORITY.KEYID = 7
7,662,201 UART: [ldev] FE.KEYID = 1
7,672,159 UART: [ldev] Erasing FE.KEYID = 1
10,959,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,641 UART: [ldev] --
13,320,004 UART: [fwproc] Waiting for Commands...
13,323,231 UART: [fwproc] Received command 0x46574c44
13,325,415 UART: [fwproc] Received Image of size 114124 bytes
17,376,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,103 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,557 >>> mbox cmd response: success
17,839,693 UART: [afmc] ++
17,840,339 UART: [afmc] CDI.KEYID = 6
17,841,244 UART: [afmc] SUBJECT.KEYID = 7
17,842,456 UART: [afmc] AUTHORITY.KEYID = 5
21,155,299 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,914 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,173 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,576 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,401 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,811 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,788 UART: [afmc] --
23,518,986 UART: [cold-reset] --
23,523,176 UART: [state] Locking Datavault
23,527,448 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,145 UART: [state] Locking ICCM
23,530,212 UART: [exit] Launching FMC @ 0x40000130
23,538,601 UART:
23,538,841 UART: Running Caliptra FMC ...
23,539,958 UART:
23,540,112 UART: [state] CFI Enabled
23,548,131 UART: [fht] FMC Alias Private Key: 7
25,879,513 UART: [art] Extend RT PCRs Done
25,880,739 UART: [art] Lock RT PCRs Done
25,882,388 UART: [art] Populate DV Done
25,887,903 UART: [fht] FMC Alias Private Key: 7
25,889,444 UART: [art] Derive CDI
25,890,255 UART: [art] Store in in slot 0x4
25,932,849 UART: [art] Derive Key Pair
25,933,879 UART: [art] Store priv key in slot 0x5
29,175,864 UART: [art] Derive Key Pair - Done
29,188,749 UART: [art] Signing Cert with AUTHO
29,190,232 UART: RITY.KEYID = 7
31,469,507 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,022 UART: [art] PUB.X = A047F27EDCF0A7266B956ECFCE5031FE0B6AA0A98496883337BC74EA6D31925575F57BE1F77A1A3623E1CA6BE1AC8EC3
31,478,334 UART: [art] PUB.Y = 1424B0469BBD8849AB621CC94507CFBC9DF7FA9932D0B09909B77C1ABAE28AC65C0774D8659744F5C1135349E8670B96
31,485,549 UART: [art] SIG.R = DDA10222E9BDDFA5F00FDE19FCE124D5EE08FBB776EDB94D4ABFC62D6603DE7BC6F4CBFD4E4FD7B46B1C5CB127CD78CF
31,493,025 UART: [art] SIG.S = 95D3A1136B6BB5243AF3CD5933D5203951E327D53C1F81CA20A2BCB52B47D412E7938E8CF0C753FF621A7283C50D5F08
32,798,597 UART: Caliptra RT
32,799,293 UART: [state] CFI Enabled
32,918,027 UART: [rt] RT listening for mailbox commands...
32,920,429 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,075,866 UART: [rt]cmd =0x41544d4e, len=14344
38,311,220 >>> mbox cmd response data (8 bytes)
38,311,839 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,342,632 UART: [rt]cmd =0x41545348, len=116
38,361,790 >>> mbox cmd response data (12 bytes)
40,417,328 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,562,417 UART:
40,562,800 UART: Running Caliptra ROM ...
40,563,850 UART:
40,564,056 UART: [state] CFI Enabled
40,577,528 UART: [state] LifecycleState = Unprovisioned
40,579,437 UART: [state] DebugLocked = No
40,580,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,585,535 UART: [kat] SHA2-256
40,755,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,765,751 UART: [kat] ++
40,766,204 UART: [kat] sha1
40,777,893 UART: [kat] SHA2-256
40,780,582 UART: [kat] SHA2-384
40,786,568 UART: [kat] SHA2-512-ACC
40,788,989 UART: [kat] ECC-384
43,073,850 UART: [kat] HMAC-384Kdf
43,085,164 UART: [kat] LMS
44,275,225 UART: [kat] --
44,278,645 UART: [update-reset] ++
48,421,076 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,424,320 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,806,582 >>> mbox cmd response: success
48,811,368 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,811,984 UART: [update-reset] Copying MAN_2 To MAN_1
48,830,222 UART: [update-reset Success] --
48,834,997 UART: [state] Locking Datavault
48,839,351 UART: [state] Locking PCR0, PCR1 and PCR31
48,841,107 UART: [state] Locking ICCM
48,842,094 UART: [exit] Launching FMC @ 0x40000130
48,850,542 UART:
48,850,781 UART: Running Caliptra FMC ...
48,851,808 UART:
48,851,948 UART: [state] CFI Enabled
48,896,457 UART: [art] Extend RT PCRs Done
48,897,645 UART: [art] Lock RT PCRs Done
48,899,396 UART: [art] Populate DV Done
48,904,961 UART: [fht] FMC Alias Private Key: 7
48,906,659 UART: [art] Derive CDI
48,907,390 UART: [art] Store in in slot 0x4
48,950,343 UART: [art] Derive Key Pair
48,951,396 UART: [art] Store priv key in slot 0x5
52,193,864 UART: [art] Derive Key Pair - Done
52,206,670 UART: [art] Signing Cert with AUTHO
52,207,978 UART: RITY.KEYID = 7
54,487,673 UART: [art] Erasing AUTHORITY.KEYID = 7
54,489,177 UART: [art] PUB.X = 4E429ED4C60F12CE33B7AD921E28B026D0A617B8E06297369BD4336D3BB9947A163E9C973A83C565FBB8BB9A305C930B
54,496,481 UART: [art] PUB.Y = 72DEEF7CA679F777C5194A226D43C6B9415ED30BE6D9FD1920ABA6B3B78699C67F3E9CDE23F4AE7E79F8EB21A71FB0D0
54,503,712 UART: [art] SIG.R = 74E432EAE37BA937EC922272EB8D9F01DFB6AEFEAC9AEC679A582CE0F91948E183AF3BDBFCD6311D2A05E63933246FBB
54,511,153 UART: [art] SIG.S = 3062E1EB02F4910A4741C758C2BBD50147AC596928534DDAA47FED07689C407E309E33C5476913545EE7E0CEDA057685
55,816,424 UART: Caliptra RT
55,817,125 UART: [state] CFI Enabled
56,106,204 UART: [rt] RT listening for mailbox commands...
56,138,243 UART: [rt]cmd =0x41545348, len=116
56,157,875 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
4,130,629 ready_for_fw is high
4,130,995 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,369 >>> mbox cmd response: success
23,715,843 UART:
23,716,216 UART: Running Caliptra FMC ...
23,717,310 UART:
23,717,456 UART: [state] CFI Enabled
23,725,225 UART: [fht] FMC Alias Private Key: 7
26,055,870 UART: [art] Extend RT PCRs Done
26,057,102 UART: [art] Lock RT PCRs Done
26,058,543 UART: [art] Populate DV Done
26,063,712 UART: [fht] FMC Alias Private Key: 7
26,065,215 UART: [art] Derive CDI
26,065,981 UART: [art] Store in in slot 0x4
26,108,376 UART: [art] Derive Key Pair
26,109,421 UART: [art] Store priv key in slot 0x5
29,351,776 UART: [art] Derive Key Pair - Done
29,364,671 UART: [art] Signing Cert with AUTHO
29,365,977 UART: RITY.KEYID = 7
31,645,620 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,124 UART: [art] PUB.X = 335A5B18A00C22F55A928BED02EC3D573B6A6C2884FA67BCFB6F5A7EC5A4FEE7432D1DFB69131194B1E2C342EB3C6B63
31,654,384 UART: [art] PUB.Y = 75C6E8D0A799DA697872D7A30E2F6FB1B24BA6DCC1F808755C2D8DB273E333E9642C16B0172C8D628E7CD15345CFE2B9
31,661,622 UART: [art] SIG.R = B734D4EE9FC2666B60FCE6869E85C109052AF1FF252B9460E4C82A3F0CF631178DFF4F2D5C5C349FC7461D97802C8212
31,669,005 UART: [art] SIG.S = 85889282D031B2BD1DB99966834E7CDFB85450D642249F1D2A7A51543014A4CF92DC5A68899AEA3DCA8EB79BC19AC062
32,973,631 UART: Caliptra RT
32,974,330 UART: [state] CFI Enabled
33,092,898 UART: [rt] RT listening for mailbox commands...
33,095,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,250,828 UART: [rt]cmd =0x41544d4e, len=14344
38,486,541 >>> mbox cmd response data (8 bytes)
38,487,106 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,517,722 UART: [rt]cmd =0x41545348, len=116
38,537,694 >>> mbox cmd response data (12 bytes)
40,592,527 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,251,385 >>> mbox cmd response: success
49,251,973 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,285,633 UART:
49,285,959 UART: Running Caliptra FMC ...
49,287,090 UART:
49,287,250 UART: [state] CFI Enabled
49,330,838 UART: [art] Extend RT PCRs Done
49,331,990 UART: [art] Lock RT PCRs Done
49,333,603 UART: [art] Populate DV Done
49,338,951 UART: [fht] FMC Alias Private Key: 7
49,340,482 UART: [art] Derive CDI
49,341,289 UART: [art] Store in in slot 0x4
49,384,027 UART: [art] Derive Key Pair
49,385,063 UART: [art] Store priv key in slot 0x5
52,627,257 UART: [art] Derive Key Pair - Done
52,640,206 UART: [art] Signing Cert with AUTHO
52,641,560 UART: RITY.KEYID = 7
54,920,763 UART: [art] Erasing AUTHORITY.KEYID = 7
54,922,268 UART: [art] PUB.X = 96819BCAFA3FFDCB5DC56182471AF4DBC281242A2CDEF8B6FB93AB81775173CD72A0E9EEFE8E4D47E6CE43B7DCAE44E2
54,929,565 UART: [art] PUB.Y = 7FF05572A6A4A0D6AC543DE21152FD4476AAFB55484BD97F035F72F71FE90BA0D50680E10DFF2DA4C965D4174DE73494
54,936,787 UART: [art] SIG.R = FF98AFAA5EA8E463E76EE204E5EB40714B18695C9FF1C47534977D7052EDB24EA5A8C471EFF0FD252A3502DAAB68456F
54,944,182 UART: [art] SIG.S = 608AC15EDF3BCEB6DA0E4130822F6247E99761D27E7BBBF7D38FCF28D7CB1E9BC2A38F7F510DFD7A133D337974C26487
56,249,482 UART: Caliptra RT
56,250,258 UART: [state] CFI Enabled
56,539,479 UART: [rt] RT listening for mailbox commands...
56,571,468 UART: [rt]cmd =0x41545348, len=116
56,591,498 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,894 writing to cptra_bootfsm_go
193,020 UART:
193,376 UART: Running Caliptra ROM ...
194,579 UART:
194,727 UART: [state] CFI Enabled
263,770 UART: [state] LifecycleState = Unprovisioned
265,620 UART: [state] DebugLocked = No
268,296 UART: [state] WD Timer not started. Device not locked for debugging
272,104 UART: [kat] SHA2-256
451,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,830 UART: [kat] ++
463,278 UART: [kat] sha1
473,936 UART: [kat] SHA2-256
476,949 UART: [kat] SHA2-384
483,818 UART: [kat] SHA2-512-ACC
486,744 UART: [kat] ECC-384
2,948,592 UART: [kat] HMAC-384Kdf
2,973,405 UART: [kat] LMS
3,502,852 UART: [kat] --
3,507,768 UART: [cold-reset] ++
3,509,912 UART: [fht] FHT @ 0x50003400
3,520,818 UART: [idev] ++
3,521,576 UART: [idev] CDI.KEYID = 6
3,522,506 UART: [idev] SUBJECT.KEYID = 7
3,523,553 UART: [idev] UDS.KEYID = 0
3,524,444 ready_for_fw is high
3,524,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,384 UART: [idev] Erasing UDS.KEYID = 0
6,025,312 UART: [idev] Sha1 KeyId Algorithm
6,049,249 UART: [idev] --
6,054,110 UART: [ldev] ++
6,054,701 UART: [ldev] CDI.KEYID = 6
6,055,595 UART: [ldev] SUBJECT.KEYID = 5
6,056,811 UART: [ldev] AUTHORITY.KEYID = 7
6,058,041 UART: [ldev] FE.KEYID = 1
6,100,975 UART: [ldev] Erasing FE.KEYID = 1
8,602,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,820 UART: [ldev] --
10,413,606 UART: [fwproc] Wait for Commands...
10,415,103 UART: [fwproc] Recv command 0x46574c44
10,417,195 UART: [fwproc] Recv'd Img size: 114448 bytes
13,825,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,285,627 >>> mbox cmd response: success
14,289,434 UART: [afmc] ++
14,290,031 UART: [afmc] CDI.KEYID = 6
14,290,925 UART: [afmc] SUBJECT.KEYID = 7
14,292,026 UART: [afmc] AUTHORITY.KEYID = 5
16,827,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,439 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,319 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,396 UART: [afmc] --
18,628,606 UART: [cold-reset] --
18,633,172 UART: [state] Locking Datavault
18,638,418 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,079 UART: [state] Locking ICCM
18,642,141 UART: [exit] Launching FMC @ 0x40000130
18,650,549 UART:
18,650,801 UART: Running Caliptra FMC ...
18,651,909 UART:
18,652,067 UART: [state] CFI Enabled
18,711,948 UART: [fht] FMC Alias Private Key: 7
20,475,343 UART: [art] Extend RT PCRs Done
20,476,565 UART: [art] Lock RT PCRs Done
20,478,239 UART: [art] Populate DV Done
20,483,944 UART: [fht] FMC Alias Private Key: 7
20,485,626 UART: [art] Derive CDI
20,486,369 UART: [art] Store in in slot 0x4
20,543,894 UART: [art] Derive Key Pair
20,544,893 UART: [art] Store priv key in slot 0x5
23,007,871 UART: [art] Derive Key Pair - Done
23,020,619 UART: [art] Signing Cert with AUTHO
23,021,928 UART: RITY.KEYID = 7
24,733,575 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,071 UART: [art] PUB.X = A3C5235D24565B8A56E66A7E6ACDAF1B62017D7CDBD8A360B5E31AECD7FA5706CDB9AFFA624E37DFCB932A74741451E2
24,742,383 UART: [art] PUB.Y = D8F7F9335FACD828E450E9E090716554564302AE0153AD6326D22FA3EF2871EB86BFF6AF49CC325598ACD9368C1BCC08
24,749,630 UART: [art] SIG.R = 02EA956F3D07DA9EBE4315E8541C1BC2C77E3A9290174F1FF95A771CFE52AE4CCBB8CAC2B34A1BD8F1F76E55ABFB80F7
24,757,090 UART: [art] SIG.S = 79144AA2B92CC0DE84CA494458ADBC1D8EA8967C2BE84BCAAC2F4EA7DA206C87D28F8B998C91CF0925EA82565035C65B
25,736,010 UART: Caliptra RT
25,736,709 UART: [state] CFI Enabled
25,902,558 UART: [rt] RT listening for mailbox commands...
25,904,957 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,061,519 UART: [rt]cmd =0x41544d4e, len=14344
29,992,142 >>> mbox cmd response data (8 bytes)
29,992,754 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,023,473 UART: [rt]cmd =0x41545348, len=116
30,043,096 >>> mbox cmd response data (12 bytes)
32,097,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,242,985 UART:
32,243,359 UART: Running Caliptra ROM ...
32,244,408 UART:
32,244,559 UART: [state] CFI Enabled
32,302,138 UART: [state] LifecycleState = Unprovisioned
32,303,983 UART: [state] DebugLocked = No
32,306,688 UART: [state] WD Timer not started. Device not locked for debugging
32,310,593 UART: [kat] SHA2-256
32,489,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,501,311 UART: [kat] ++
32,501,773 UART: [kat] sha1
32,513,107 UART: [kat] SHA2-256
32,516,184 UART: [kat] SHA2-384
32,520,820 UART: [kat] SHA2-512-ACC
32,523,813 UART: [kat] ECC-384
34,986,508 UART: [kat] HMAC-384Kdf
35,008,313 UART: [kat] LMS
35,537,771 UART: [kat] --
35,542,043 UART: [update-reset] ++
38,977,374 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,979,943 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,363,248 >>> mbox cmd response: success
39,363,716 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,364,361 UART: [update-reset] Copying MAN_2 To MAN_1
39,386,653 UART: [update-reset Success] --
39,389,859 UART: [state] Locking Datavault
39,391,981 UART: [state] Locking PCR0, PCR1 and PCR31
39,393,646 UART: [state] Locking ICCM
39,395,666 UART: [exit] Launching FMC @ 0x40000130
39,404,059 UART:
39,404,291 UART: Running Caliptra FMC ...
39,405,329 UART:
39,405,477 UART: [state] CFI Enabled
39,496,592 UART: [art] Extend RT PCRs Done
39,497,776 UART: [art] Lock RT PCRs Done
39,498,986 UART: [art] Populate DV Done
39,504,392 UART: [fht] FMC Alias Private Key: 7
39,506,143 UART: [art] Derive CDI
39,506,954 UART: [art] Store in in slot 0x4
39,565,539 UART: [art] Derive Key Pair
39,566,626 UART: [art] Store priv key in slot 0x5
42,029,449 UART: [art] Derive Key Pair - Done
42,042,282 UART: [art] Signing Cert with AUTHO
42,043,602 UART: RITY.KEYID = 7
43,754,695 UART: [art] Erasing AUTHORITY.KEYID = 7
43,756,200 UART: [art] PUB.X = BB84C40754651280A66FEFC7E9FB8A4B52DCB75242516EAC739A59FB93C916E593E71782701574FACA877FEFECF17A02
43,763,466 UART: [art] PUB.Y = ECCFBC25EC006FB6C3E2CAA3E1ECA9B73342372B88CFA35C10AD3CA41EA7FCA3FA0AA8F9BE2FDC8D6A350D772188BAF8
43,770,765 UART: [art] SIG.R = 5FFD2A1007FB0D6BF1FC1F60344673CBBD14BBA1DA60833688E7D000966EE4B3B1B79C4140E861F483D9E488C6A905F2
43,778,114 UART: [art] SIG.S = CEA5656F890A3F9B656E8300573DD8EDEF9A4C2F700F1DBDDDE29D391C04C58BCA2E5F15EB4E78894DF6AD1FDFB088E0
44,757,372 UART: Caliptra RT
44,758,062 UART: [state] CFI Enabled
45,095,640 UART: [rt] RT listening for mailbox commands...
45,127,500 UART: [rt]cmd =0x41545348, len=116
45,147,809 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,359,046 ready_for_fw is high
3,359,458 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,070,597 >>> mbox cmd response: success
18,367,499 UART:
18,367,884 UART: Running Caliptra FMC ...
18,369,072 UART:
18,369,238 UART: [state] CFI Enabled
18,435,984 UART: [fht] FMC Alias Private Key: 7
20,199,898 UART: [art] Extend RT PCRs Done
20,201,122 UART: [art] Lock RT PCRs Done
20,202,857 UART: [art] Populate DV Done
20,208,260 UART: [fht] FMC Alias Private Key: 7
20,209,799 UART: [art] Derive CDI
20,210,634 UART: [art] Store in in slot 0x4
20,268,980 UART: [art] Derive Key Pair
20,270,021 UART: [art] Store priv key in slot 0x5
22,733,447 UART: [art] Derive Key Pair - Done
22,746,542 UART: [art] Signing Cert with AUTHO
22,747,846 UART: RITY.KEYID = 7
24,458,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,359 UART: [art] PUB.X = D569934C07AFA2A1DAF1719A2BF605B1A583ACF74ED111BE71FA372DFF732256A7B9718A69F84715980FB4431F22F332
24,467,662 UART: [art] PUB.Y = 104D6E2736EC8270969E91DB6A1E7615195455D1BF0C51DA7B7249486ABF73F9121D4DF692881D82CD4A8F396A3BC3B8
24,474,920 UART: [art] SIG.R = A013B12039E6F72B45520833F9FD6E8C07CD61C1C6F1DFF100AD602E972CDCDB7DF5E95C17607BB39291433C8F6BAAFC
24,482,316 UART: [art] SIG.S = 61B0EED972AA5913D502AD76362CD4F04AD5482D7AA3A59A223FF97F288A31F74831BB4AE642538E94AD3D5CA0102C6E
25,461,046 UART: Caliptra RT
25,461,740 UART: [state] CFI Enabled
25,628,420 UART: [rt] RT listening for mailbox commands...
25,630,804 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,787,215 UART: [rt]cmd =0x41544d4e, len=14344
29,718,176 >>> mbox cmd response data (8 bytes)
29,718,748 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,749,476 UART: [rt]cmd =0x41545348, len=116
29,770,428 >>> mbox cmd response data (12 bytes)
31,825,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,935,424 >>> mbox cmd response: success
38,936,067 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,970,073 UART:
38,970,402 UART: Running Caliptra FMC ...
38,971,531 UART:
38,971,694 UART: [state] CFI Enabled
39,077,114 UART: [art] Extend RT PCRs Done
39,078,324 UART: [art] Lock RT PCRs Done
39,079,586 UART: [art] Populate DV Done
39,085,058 UART: [fht] FMC Alias Private Key: 7
39,086,654 UART: [art] Derive CDI
39,087,473 UART: [art] Store in in slot 0x4
39,146,114 UART: [art] Derive Key Pair
39,147,154 UART: [art] Store priv key in slot 0x5
41,609,934 UART: [art] Derive Key Pair - Done
41,622,996 UART: [art] Signing Cert with AUTHO
41,624,301 UART: RITY.KEYID = 7
43,335,174 UART: [art] Erasing AUTHORITY.KEYID = 7
43,336,686 UART: [art] PUB.X = CF82AC32882671107E54223C354ABA5EDE748B13CFB80D55F56846CD53DBC5A411DC6696CCE7AD7064C80A9F569C15EA
43,343,928 UART: [art] PUB.Y = C21419FD386C9A6D6459B498F94283E4FBE2031AE4038FA01AE06315043C2073BAF27211517F24067642E1D33C075F99
43,351,209 UART: [art] SIG.R = 1162FC6A39E87997E9CA3BFCE4B3D777F017CD7F76F2EBD50946DDACE62F9009CB7CB12F00C5296CAEF83E38C5A2D518
43,358,602 UART: [art] SIG.S = AED1D1F37EBC01373E247F0B46D13AE8A90DD11F7B42AE202BB3F363AB772F7E61C66F1F8EB3435776A852807F604241
44,337,313 UART: Caliptra RT
44,338,015 UART: [state] CFI Enabled
44,673,844 UART: [rt] RT listening for mailbox commands...
44,705,652 UART: [rt]cmd =0x41545348, len=116
44,725,633 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,467 UART:
192,960 UART: Running Caliptra ROM ...
194,138 UART:
603,793 UART: [state] CFI Enabled
619,593 UART: [state] LifecycleState = Unprovisioned
621,408 UART: [state] DebugLocked = No
623,155 UART: [state] WD Timer not started. Device not locked for debugging
626,038 UART: [kat] SHA2-256
805,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,721 UART: [kat] ++
817,161 UART: [kat] sha1
827,612 UART: [kat] SHA2-256
830,591 UART: [kat] SHA2-384
836,725 UART: [kat] SHA2-512-ACC
839,727 UART: [kat] ECC-384
3,281,662 UART: [kat] HMAC-384Kdf
3,294,180 UART: [kat] LMS
3,823,676 UART: [kat] --
3,828,463 UART: [cold-reset] ++
3,830,101 UART: [fht] FHT @ 0x50003400
3,841,282 UART: [idev] ++
3,841,833 UART: [idev] CDI.KEYID = 6
3,842,874 UART: [idev] SUBJECT.KEYID = 7
3,843,972 UART: [idev] UDS.KEYID = 0
3,844,895 ready_for_fw is high
3,845,093 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,291 UART: [idev] Erasing UDS.KEYID = 0
6,323,452 UART: [idev] Sha1 KeyId Algorithm
6,346,135 UART: [idev] --
6,349,019 UART: [ldev] ++
6,349,593 UART: [ldev] CDI.KEYID = 6
6,350,496 UART: [ldev] SUBJECT.KEYID = 5
6,351,650 UART: [ldev] AUTHORITY.KEYID = 7
6,352,927 UART: [ldev] FE.KEYID = 1
6,364,482 UART: [ldev] Erasing FE.KEYID = 1
8,836,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,868 UART: [ldev] --
10,629,079 UART: [fwproc] Wait for Commands...
10,631,172 UART: [fwproc] Recv command 0x46574c44
10,633,256 UART: [fwproc] Recv'd Img size: 114448 bytes
14,044,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,116,827 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,185,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,504,667 >>> mbox cmd response: success
14,508,315 UART: [afmc] ++
14,508,935 UART: [afmc] CDI.KEYID = 6
14,509,814 UART: [afmc] SUBJECT.KEYID = 7
14,510,909 UART: [afmc] AUTHORITY.KEYID = 5
17,013,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,734,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,736,307 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,752,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,768,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,783,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,806,497 UART: [afmc] --
18,810,026 UART: [cold-reset] --
18,813,338 UART: [state] Locking Datavault
18,817,766 UART: [state] Locking PCR0, PCR1 and PCR31
18,819,398 UART: [state] Locking ICCM
18,820,838 UART: [exit] Launching FMC @ 0x40000130
18,829,291 UART:
18,829,559 UART: Running Caliptra FMC ...
18,830,660 UART:
18,830,811 UART: [state] CFI Enabled
18,839,066 UART: [fht] FMC Alias Private Key: 7
20,596,232 UART: [art] Extend RT PCRs Done
20,597,465 UART: [art] Lock RT PCRs Done
20,599,087 UART: [art] Populate DV Done
20,604,499 UART: [fht] FMC Alias Private Key: 7
20,605,935 UART: [art] Derive CDI
20,606,689 UART: [art] Store in in slot 0x4
20,648,840 UART: [art] Derive Key Pair
20,649,837 UART: [art] Store priv key in slot 0x5
23,076,705 UART: [art] Derive Key Pair - Done
23,090,135 UART: [art] Signing Cert with AUTHO
23,091,430 UART: RITY.KEYID = 7
24,796,871 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,374 UART: [art] PUB.X = 61F4157CE7A4F46AB4BBF6D776848A0CD9EBB363FC0ECEA58055FA2C74D8457E5DF6D709A13359732EE55EB784408598
24,805,659 UART: [art] PUB.Y = EBCAD0F73FF076521DA65B6BCC85FF974166B7E7F26BCBAB2C91786E10E40D8F599EE8234DCB1E46C4A035DD8DE3DE7D
24,812,983 UART: [art] SIG.R = 6186B534E2854E787A965B3B4416EFA5626D1EEB6CEDFB1A3CCC24D052BBAC549A9A88DABA87B5EC9202BC04E05129F2
24,820,366 UART: [art] SIG.S = B2737C33A65B7270985F03AAB0B7DBD6DB47CEFC89FBD8E54BAA9F5D9F6108B68FCA443E5C17FE7B338A395E9D1B270C
25,799,600 UART: Caliptra RT
25,800,312 UART: [state] CFI Enabled
25,917,996 UART: [rt] RT listening for mailbox commands...
25,920,401 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,075,740 UART: [rt]cmd =0x41544d4e, len=14344
30,006,518 >>> mbox cmd response data (8 bytes)
30,007,112 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,037,684 UART: [rt]cmd =0x41545348, len=116
30,057,902 >>> mbox cmd response data (12 bytes)
32,112,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,257,910 UART:
32,258,277 UART: Running Caliptra ROM ...
32,259,406 UART:
32,259,594 UART: [state] CFI Enabled
32,273,070 UART: [state] LifecycleState = Unprovisioned
32,274,962 UART: [state] DebugLocked = No
32,276,267 UART: [state] WD Timer not started. Device not locked for debugging
32,280,392 UART: [kat] SHA2-256
32,459,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,471,196 UART: [kat] ++
32,471,647 UART: [kat] sha1
32,483,443 UART: [kat] SHA2-256
32,486,456 UART: [kat] SHA2-384
32,492,495 UART: [kat] SHA2-512-ACC
32,495,432 UART: [kat] ECC-384
34,941,448 UART: [kat] HMAC-384Kdf
34,953,794 UART: [kat] LMS
35,483,266 UART: [kat] --
35,487,869 UART: [update-reset] ++
38,918,090 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,922,336 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,305,647 >>> mbox cmd response: success
39,306,103 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,306,688 UART: [update-reset] Copying MAN_2 To MAN_1
39,329,026 UART: [update-reset Success] --
39,332,653 UART: [state] Locking Datavault
39,334,703 UART: [state] Locking PCR0, PCR1 and PCR31
39,336,392 UART: [state] Locking ICCM
39,338,401 UART: [exit] Launching FMC @ 0x40000130
39,346,835 UART:
39,347,061 UART: Running Caliptra FMC ...
39,348,154 UART:
39,348,304 UART: [state] CFI Enabled
39,392,486 UART: [art] Extend RT PCRs Done
39,393,704 UART: [art] Lock RT PCRs Done
39,394,747 UART: [art] Populate DV Done
39,400,047 UART: [fht] FMC Alias Private Key: 7
39,401,691 UART: [art] Derive CDI
39,402,497 UART: [art] Store in in slot 0x4
39,445,413 UART: [art] Derive Key Pair
39,446,473 UART: [art] Store priv key in slot 0x5
41,873,095 UART: [art] Derive Key Pair - Done
41,885,717 UART: [art] Signing Cert with AUTHO
41,887,016 UART: RITY.KEYID = 7
43,592,450 UART: [art] Erasing AUTHORITY.KEYID = 7
43,593,952 UART: [art] PUB.X = B43F24A360EBBCE2078BCC136CFB419E0E4C72C4D8EC72002DF5F2545832039DA6527868F8218A8FC02DC63171E5F1EE
43,601,183 UART: [art] PUB.Y = 940D6D62415330FE28D52CFB63E5459FAAC3A747EF23147403DEF653EFC8C70962C98253B7002AE48540521334145E87
43,608,455 UART: [art] SIG.R = 5879AB2BD480C0DBA6540740D99E838F500A9247C90D2C37C4F7EADDEB3FC27B2B2341B4200080784AA8692A88C895BE
43,615,776 UART: [art] SIG.S = 55539E02C49E75207F7E6C8626BFD691F6A9F40B789E02D6312293E918B23E211132C87845E30D1B1D44FA43FC5AE921
44,595,451 UART: Caliptra RT
44,596,137 UART: [state] CFI Enabled
44,883,159 UART: [rt] RT listening for mailbox commands...
44,915,152 UART: [rt]cmd =0x41545348, len=116
44,934,752 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,698,466 ready_for_fw is high
3,698,851 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,533 >>> mbox cmd response: success
18,518,831 UART:
18,519,215 UART: Running Caliptra FMC ...
18,520,310 UART:
18,520,453 UART: [state] CFI Enabled
18,528,350 UART: [fht] FMC Alias Private Key: 7
20,285,340 UART: [art] Extend RT PCRs Done
20,286,570 UART: [art] Lock RT PCRs Done
20,288,437 UART: [art] Populate DV Done
20,293,837 UART: [fht] FMC Alias Private Key: 7
20,295,477 UART: [art] Derive CDI
20,296,208 UART: [art] Store in in slot 0x4
20,338,953 UART: [art] Derive Key Pair
20,340,024 UART: [art] Store priv key in slot 0x5
22,766,443 UART: [art] Derive Key Pair - Done
22,779,437 UART: [art] Signing Cert with AUTHO
22,780,736 UART: RITY.KEYID = 7
24,486,085 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,603 UART: [art] PUB.X = 9FAF8E77004042CA30862B146962346FDC8FA8E8BC2966A728024A15A9D5692F8F24BEE84C12BAD9408CF6CE6A062FFE
24,494,894 UART: [art] PUB.Y = DDFEFB3AEE3F536ECA5188F8BED4FBD8080AED2A6773AC5AAA5CF9878A8DF30AEFB3D6EEA1A39C26DF01D0801CB223CF
24,502,170 UART: [art] SIG.R = 1D7F41BF98F9E2CF81E6B7D839A764DFA338F4CC8A93D3C6B4EBD6B0B48CA1C50A4DADC75874C5AEEF1C20E55ED47E21
24,509,601 UART: [art] SIG.S = A251E8E296E4C8AF9EB46D5CCB5C4BB5BB80647290D7BF0EAE63FF4B2F9E0FE1BFDDA9C9B1AD3690F7E8823C80382486
25,488,787 UART: Caliptra RT
25,489,503 UART: [state] CFI Enabled
25,607,823 UART: [rt] RT listening for mailbox commands...
25,610,191 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,765,431 UART: [rt]cmd =0x41544d4e, len=14344
29,695,910 >>> mbox cmd response data (8 bytes)
29,696,483 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,727,072 UART: [rt]cmd =0x41545348, len=116
29,747,317 >>> mbox cmd response data (12 bytes)
31,802,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,854,277 >>> mbox cmd response: success
38,854,831 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,891,497 UART:
38,891,824 UART: Running Caliptra FMC ...
38,892,859 UART:
38,893,003 UART: [state] CFI Enabled
38,937,543 UART: [art] Extend RT PCRs Done
38,938,689 UART: [art] Lock RT PCRs Done
38,939,942 UART: [art] Populate DV Done
38,945,578 UART: [fht] FMC Alias Private Key: 7
38,947,273 UART: [art] Derive CDI
38,947,998 UART: [art] Store in in slot 0x4
38,990,661 UART: [art] Derive Key Pair
38,991,702 UART: [art] Store priv key in slot 0x5
41,418,694 UART: [art] Derive Key Pair - Done
41,431,748 UART: [art] Signing Cert with AUTHO
41,433,084 UART: RITY.KEYID = 7
43,138,373 UART: [art] Erasing AUTHORITY.KEYID = 7
43,139,884 UART: [art] PUB.X = E08963BB7C21589BE8C9B684AEB29D3E46BDBA21D14533705B7CACC21C147BC89B2A7E89CC296306FD5997B331AA7DF2
43,147,183 UART: [art] PUB.Y = C2F86394C0767A4119600DFB03497DD76D74F23D651D9D78D41162FFEA9EE13FAFA7D5302C91FFE928E84CE8ED448C9F
43,154,462 UART: [art] SIG.R = 0630EBB1CD8044DD38DA56DE3A406E3845E5F4EF57721C4EDFCDF1ADA247C98EFAFBCA5106C2CBED1C9795F545CE6166
43,161,847 UART: [art] SIG.S = C4BD2A2040A8EE075C2C6B4D65FC27C5F0F11384B48390746D11E12F14B2BB866E1AB999AF7651E1BF1EE223A7B026DF
44,140,677 UART: Caliptra RT
44,141,388 UART: [state] CFI Enabled
44,429,167 UART: [rt] RT listening for mailbox commands...
44,461,031 UART: [rt]cmd =0x41545348, len=116
44,481,253 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,438,572 ready_for_fw is high
3,439,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,719,410 >>> mbox cmd response: success
19,004,420 UART:
19,004,809 UART: Running Caliptra FMC ...
19,005,956 UART:
19,006,121 UART: [state] CFI Enabled
19,075,625 UART: [fht] FMC Alias Private Key: 7
20,839,688 UART: [art] Extend RT PCRs Done
20,840,914 UART: [art] Lock RT PCRs Done
20,842,862 UART: [art] Populate DV Done
20,848,056 UART: [fht] FMC Alias Private Key: 7
20,849,604 UART: [art] Derive CDI
20,850,441 UART: [art] Store in in slot 0x4
20,908,029 UART: [art] Derive Key Pair
20,909,029 UART: [art] Store priv key in slot 0x5
23,371,895 UART: [art] Derive Key Pair - Done
23,384,783 UART: [art] Signing Cert with AUTHO
23,386,080 UART: RITY.KEYID = 7
25,098,071 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,576 UART: [art] PUB.X = B2697B58C1AE1334F6E9318AFF05EF0ED04BCC517FEA1C0AB3ED609AEE78F94096841B9AF569CF522AD02CDDC16EB2A4
25,106,877 UART: [art] PUB.Y = CB2FB295300122C6776EE422E48565DF1B08B1BB07DF99E9DF721DD78DE8FA3E3F975F263D0C0A1C7C2928A7A6C01DB3
25,114,126 UART: [art] SIG.R = B18916EA136E3383BBC587BB33D63E56C9B3648458272C243131E16743EB40976BC0F5949609E29608C10E588363020C
25,121,459 UART: [art] SIG.S = 6D7086A29B413DD92C00ECAB0175B201D1A9938407D77362682781287E3E583BF04F8B49508AB426D4A1E5F66E7F44B6
26,100,570 UART: Caliptra RT
26,101,281 UART: [state] CFI Enabled
26,267,375 UART: [rt] RT listening for mailbox commands...
26,269,819 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,426,238 UART: [rt]cmd =0x41544d4e, len=14344
30,357,117 >>> mbox cmd response data (8 bytes)
30,357,720 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,388,301 UART: [rt]cmd =0x41545348, len=116
30,407,675 >>> mbox cmd response data (12 bytes)
32,462,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,271,493 >>> mbox cmd response: success
40,272,212 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,305,080 UART:
40,305,405 UART: Running Caliptra FMC ...
40,306,444 UART:
40,306,592 UART: [state] CFI Enabled
40,399,735 UART: [art] Extend RT PCRs Done
40,400,931 UART: [art] Lock RT PCRs Done
40,402,525 UART: [art] Populate DV Done
40,408,204 UART: [fht] FMC Alias Private Key: 7
40,409,736 UART: [art] Derive CDI
40,410,468 UART: [art] Store in in slot 0x4
40,468,838 UART: [art] Derive Key Pair
40,469,905 UART: [art] Store priv key in slot 0x5
42,932,645 UART: [art] Derive Key Pair - Done
42,945,691 UART: [art] Signing Cert with AUTHO
42,946,991 UART: RITY.KEYID = 7
44,658,828 UART: [art] Erasing AUTHORITY.KEYID = 7
44,660,333 UART: [art] PUB.X = 5D9359D738BC367CBAB7ADA7DC4A60FF3E988A37947922BA9C3ADE094EB82DCEDD283A63E0C5C61855BA4981C496294A
44,667,575 UART: [art] PUB.Y = 81D26D5060527ACDF6BD22AB9946CE399389D9951D924329245ECEBEA50FB99795840D35D1DA740B6813C98F14C6EF0F
44,674,849 UART: [art] SIG.R = 72309EAFBB87C3556FE0CEDB0AEA68723AF04CB1B9A5326A9EF7F0D979BD6459D87AFE05720AD2E946BA6046524EAF19
44,682,251 UART: [art] SIG.S = 21C63CEA736069198986AD3D3767658F0E1630D14E43DA567A8ED923B7D010A15C9DD5CB0745204B74009DE08CB764EA
45,661,429 UART: Caliptra RT
45,662,128 UART: [state] CFI Enabled
45,995,627 UART: [rt] RT listening for mailbox commands...
46,027,634 UART: [rt]cmd =0x41545348, len=116
46,047,540 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,752,188 ready_for_fw is high
3,752,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,824 >>> mbox cmd response: success
19,210,890 UART:
19,211,292 UART: Running Caliptra FMC ...
19,212,486 UART:
19,212,656 UART: [state] CFI Enabled
19,220,726 UART: [fht] FMC Alias Private Key: 7
20,977,971 UART: [art] Extend RT PCRs Done
20,979,193 UART: [art] Lock RT PCRs Done
20,980,869 UART: [art] Populate DV Done
20,986,222 UART: [fht] FMC Alias Private Key: 7
20,987,811 UART: [art] Derive CDI
20,988,617 UART: [art] Store in in slot 0x4
21,031,156 UART: [art] Derive Key Pair
21,032,149 UART: [art] Store priv key in slot 0x5
23,459,301 UART: [art] Derive Key Pair - Done
23,472,525 UART: [art] Signing Cert with AUTHO
23,473,826 UART: RITY.KEYID = 7
25,179,235 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,756 UART: [art] PUB.X = F7029FD8A7EF5D39AF3129D08972970FDFCA8194BA831AFAB8A5EDE228C05BFD7FE317799E795A8CC7968A1C33977656
25,188,058 UART: [art] PUB.Y = 4B8F82BE26FDDA3D5519531300A6EC0F861997D7D88A3A778D7DFB255593E2968AC5B8141FFFCEA9E44C40BCCD77E256
25,195,312 UART: [art] SIG.R = 5AFDA3B56C5AD91873FA7462ED2B7E7179B407D76482466D0C61C2280EBD96912C3A1B2BBFD1DC4FE1F340F339F5AD86
25,202,743 UART: [art] SIG.S = B2C718CD8D1F732CECF9A74C9A28BCD366ABC108BE29716596CDDC3C59BE88E9054FB17D5F348B657D9DB358FBF50795
26,181,381 UART: Caliptra RT
26,182,090 UART: [state] CFI Enabled
26,300,001 UART: [rt] RT listening for mailbox commands...
26,302,399 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,458,566 UART: [rt]cmd =0x41544d4e, len=14344
30,389,383 >>> mbox cmd response data (8 bytes)
30,389,951 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,420,686 UART: [rt]cmd =0x41545348, len=116
30,441,172 >>> mbox cmd response data (12 bytes)
32,494,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,228,768 >>> mbox cmd response: success
40,229,356 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,263,888 UART:
40,264,212 UART: Running Caliptra FMC ...
40,265,239 UART:
40,265,379 UART: [state] CFI Enabled
40,309,110 UART: [art] Extend RT PCRs Done
40,310,267 UART: [art] Lock RT PCRs Done
40,311,470 UART: [art] Populate DV Done
40,317,035 UART: [fht] FMC Alias Private Key: 7
40,318,917 UART: [art] Derive CDI
40,319,698 UART: [art] Store in in slot 0x4
40,361,937 UART: [art] Derive Key Pair
40,362,963 UART: [art] Store priv key in slot 0x5
42,790,180 UART: [art] Derive Key Pair - Done
42,803,226 UART: [art] Signing Cert with AUTHO
42,804,555 UART: RITY.KEYID = 7
44,510,208 UART: [art] Erasing AUTHORITY.KEYID = 7
44,511,719 UART: [art] PUB.X = E220AB76751017D3E8A23D84AAE91B77088A2E49F36890D252F648FD5F77C6F7055A277C3844A14024CDC61FF52D1677
44,518,968 UART: [art] PUB.Y = EBC67E1A37E7AEC77A48B13AB3CEA2E97E20330866C45E6933044E5D4BD5B8449DAC89A23CFB4DAA53C0F0D2EF3945AB
44,526,249 UART: [art] SIG.R = 7E3EDB540C153981B8B4D878539ED81EAA48652B72B396906F04A19AE2FCE1E3DF59B4AC5FFF149BF92425F86B569189
44,533,644 UART: [art] SIG.S = 27E8356B01579B4FAEC569A4E97BB9E9ADB4CAE9A38009230A3DC5A80FCC44B672C71674128151FDA2BEBE179D79AC22
45,512,428 UART: Caliptra RT
45,513,114 UART: [state] CFI Enabled
45,798,313 UART: [rt] RT listening for mailbox commands...
45,830,116 UART: [rt]cmd =0x41545348, len=116
45,849,468 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,325 UART: [kat] SHA2-256
882,256 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,371 UART: [kat] ++
886,523 UART: [kat] sha1
890,831 UART: [kat] SHA2-256
892,769 UART: [kat] SHA2-384
895,646 UART: [kat] SHA2-512-ACC
897,547 UART: [kat] ECC-384
903,074 UART: [kat] HMAC-384Kdf
907,626 UART: [kat] LMS
1,475,822 UART: [kat] --
1,476,677 UART: [cold-reset] ++
1,477,249 UART: [fht] Storing FHT @ 0x50003400
1,480,132 UART: [idev] ++
1,480,300 UART: [idev] CDI.KEYID = 6
1,480,660 UART: [idev] SUBJECT.KEYID = 7
1,481,084 UART: [idev] UDS.KEYID = 0
1,481,429 ready_for_fw is high
1,481,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,118 UART: [idev] Erasing UDS.KEYID = 0
1,505,424 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,986 UART: [idev] --
1,515,017 UART: [ldev] ++
1,515,185 UART: [ldev] CDI.KEYID = 6
1,515,548 UART: [ldev] SUBJECT.KEYID = 5
1,515,974 UART: [ldev] AUTHORITY.KEYID = 7
1,516,437 UART: [ldev] FE.KEYID = 1
1,521,599 UART: [ldev] Erasing FE.KEYID = 1
1,547,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,120 UART: [ldev] --
1,586,415 UART: [fwproc] Waiting for Commands...
1,587,268 UART: [fwproc] Received command 0x46574c44
1,588,059 UART: [fwproc] Received Image of size 114448 bytes
2,886,824 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,300 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,652 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,759 >>> mbox cmd response: success
3,080,963 UART: [afmc] ++
3,081,131 UART: [afmc] CDI.KEYID = 6
3,081,493 UART: [afmc] SUBJECT.KEYID = 7
3,081,918 UART: [afmc] AUTHORITY.KEYID = 5
3,116,825 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,151 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,931 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,659 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,544 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,234 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,093 UART: [afmc] --
3,160,179 UART: [cold-reset] --
3,161,019 UART: [state] Locking Datavault
3,162,364 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,968 UART: [state] Locking ICCM
3,163,618 UART: [exit] Launching FMC @ 0x40000130
3,168,947 UART:
3,168,963 UART: Running Caliptra FMC ...
3,169,371 UART:
3,169,425 UART: [state] CFI Enabled
3,180,004 UART: [fht] FMC Alias Private Key: 7
3,288,041 UART: [art] Extend RT PCRs Done
3,288,469 UART: [art] Lock RT PCRs Done
3,289,901 UART: [art] Populate DV Done
3,298,020 UART: [fht] FMC Alias Private Key: 7
3,299,052 UART: [art] Derive CDI
3,299,332 UART: [art] Store in in slot 0x4
3,385,477 UART: [art] Derive Key Pair
3,385,837 UART: [art] Store priv key in slot 0x5
3,398,791 UART: [art] Derive Key Pair - Done
3,413,557 UART: [art] Signing Cert with AUTHO
3,414,037 UART: RITY.KEYID = 7
3,428,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,482 UART: [art] PUB.X = 8925A6F46D416F4FC915E58C386691BA961264C4B423A79E127DBDEDD5F979BE435E9689A4BAFAE8E6A714CA6F9B4F98
3,436,264 UART: [art] PUB.Y = BD9D0ACE24F35801CF9CDE4DB852762828AE7F92EDC8053B37A42705D24D00A409ADF1FBA5E1A1B8969C908C79EAD9E9
3,443,195 UART: [art] SIG.R = 71DAEDFA4215247A5DAC9A46484F09C27220E3E7EAE01773B810B95F1A9A043F4A15F9AEF83D99F5A301C239440A70D9
3,449,961 UART: [art] SIG.S = DA0FD06E673B8F28D83AB36F9E5F832F58066E3223383B3A3E2E425039476E6842ABDE4BECFA596AB62B4F5BBB2875A7
3,473,754 UART: Caliptra RT
3,474,007 UART: [state] CFI Enabled
3,583,684 UART: [rt] RT listening for mailbox commands...
3,584,354 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,218 UART: [rt]cmd =0x41544d4e, len=14344
3,852,102 >>> mbox cmd response data (8 bytes)
3,852,103 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,118 UART: [rt]cmd =0x41545348, len=116
3,904,174 >>> mbox cmd response data (12 bytes)
3,904,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,904,817 UART:
3,904,833 UART: Running Caliptra ROM ...
3,905,241 UART:
3,905,295 UART: [state] CFI Enabled
3,908,075 UART: [state] LifecycleState = Unprovisioned
3,908,730 UART: [state] DebugLocked = No
3,909,304 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,910,821 UART: [kat] SHA2-256
4,704,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,708,867 UART: [kat] ++
4,709,019 UART: [kat] sha1
4,713,229 UART: [kat] SHA2-256
4,715,167 UART: [kat] SHA2-384
4,717,832 UART: [kat] SHA2-512-ACC
4,719,732 UART: [kat] ECC-384
4,725,243 UART: [kat] HMAC-384Kdf
4,729,905 UART: [kat] LMS
5,298,101 UART: [kat] --
5,298,986 UART: [update-reset] ++
6,634,691 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,635,913 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,785,963 >>> mbox cmd response: success
6,785,963 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,786,090 UART: [update-reset] Copying MAN_2 To MAN_1
6,794,104 UART: [update-reset Success] --
6,795,249 UART: [state] Locking Datavault
6,795,853 UART: [state] Locking PCR0, PCR1 and PCR31
6,796,457 UART: [state] Locking ICCM
6,797,087 UART: [exit] Launching FMC @ 0x40000130
6,802,416 UART:
6,802,432 UART: Running Caliptra FMC ...
6,802,840 UART:
6,802,894 UART: [state] CFI Enabled
6,892,061 UART: [art] Extend RT PCRs Done
6,892,489 UART: [art] Lock RT PCRs Done
6,893,790 UART: [art] Populate DV Done
6,901,913 UART: [fht] FMC Alias Private Key: 7
6,902,987 UART: [art] Derive CDI
6,903,267 UART: [art] Store in in slot 0x4
6,989,470 UART: [art] Derive Key Pair
6,989,830 UART: [art] Store priv key in slot 0x5
7,003,104 UART: [art] Derive Key Pair - Done
7,017,565 UART: [art] Signing Cert with AUTHO
7,018,045 UART: RITY.KEYID = 7
7,033,121 UART: [art] Erasing AUTHORITY.KEYID = 7
7,033,886 UART: [art] PUB.X = 1B58D8F8166FD466359AC048B1C53C8E960CB9CCA9C2C777E2FECF74945185AB0DD2AEAAE04C6D0AA240F53E0C5BFD26
7,040,666 UART: [art] PUB.Y = 77454EF61A7F6D9757C74EBB4A34C5B31DF784CF706F6C023FCAFA0F99EEBE9A7946F50075460C6BB36DF84EC10F22F9
7,047,598 UART: [art] SIG.R = 950ACA41145DCE08F703451409A746E638CC2EAA80B37374E0185CB35FF2E6D77352EC5A09D57BE247F57268BC8CD877
7,054,357 UART: [art] SIG.S = 63AE0433AB1683DB2279DA0007B219A9A6A4F2D166D1E9C59F7373341C21D84177654E4E09AEBAC2A72E7CAA8772A357
7,078,977 UART: Caliptra RT
7,079,230 UART: [state] CFI Enabled
7,358,541 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,389,458 UART: [rt]cmd =0x41545348, len=116
7,410,998 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,063 ready_for_fw is high
1,362,063 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,243 >>> mbox cmd response: success
2,991,295 UART:
2,991,311 UART: Running Caliptra FMC ...
2,991,719 UART:
2,991,773 UART: [state] CFI Enabled
3,002,368 UART: [fht] FMC Alias Private Key: 7
3,110,531 UART: [art] Extend RT PCRs Done
3,110,959 UART: [art] Lock RT PCRs Done
3,112,933 UART: [art] Populate DV Done
3,121,132 UART: [fht] FMC Alias Private Key: 7
3,122,190 UART: [art] Derive CDI
3,122,470 UART: [art] Store in in slot 0x4
3,208,173 UART: [art] Derive Key Pair
3,208,533 UART: [art] Store priv key in slot 0x5
3,221,757 UART: [art] Derive Key Pair - Done
3,235,970 UART: [art] Signing Cert with AUTHO
3,236,450 UART: RITY.KEYID = 7
3,251,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,693 UART: [art] PUB.X = BFB4262FC4ED30C94188402C6F5800D04971A218B8DA9081B1A9B5C78873E95A188D439A084990C8C4FB95A863E85E20
3,259,436 UART: [art] PUB.Y = A671E107B4BBED0DA54E4668AF2F0CA572BFFCCFD4358075233E05545823D270F0940178FA6361BEFED974951BAF63AD
3,266,383 UART: [art] SIG.R = A337F2139E65A14D7E3E9243259CA7AC4357BB49DED26BA8A785BDFCFBBE1666DFAD6900D8146B73202784889622B718
3,273,137 UART: [art] SIG.S = DD0C3B5ABB2AADB459A48EDE80F8F4DAB9E29B440B6A33405C1655AC1E050795B06E8390D7E73089CC9D17C91C5249F5
3,296,024 UART: Caliptra RT
3,296,277 UART: [state] CFI Enabled
3,404,397 UART: [rt] RT listening for mailbox commands...
3,405,067 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,343 UART: [rt]cmd =0x41544d4e, len=14344
3,673,427 >>> mbox cmd response data (8 bytes)
3,673,428 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,611 UART: [rt]cmd =0x41545348, len=116
3,725,531 >>> mbox cmd response data (12 bytes)
3,725,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,490,226 >>> mbox cmd response: success
6,490,226 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,503,331 UART:
6,503,347 UART: Running Caliptra FMC ...
6,503,755 UART:
6,503,809 UART: [state] CFI Enabled
6,593,010 UART: [art] Extend RT PCRs Done
6,593,438 UART: [art] Lock RT PCRs Done
6,594,667 UART: [art] Populate DV Done
6,603,090 UART: [fht] FMC Alias Private Key: 7
6,604,100 UART: [art] Derive CDI
6,604,380 UART: [art] Store in in slot 0x4
6,690,123 UART: [art] Derive Key Pair
6,690,483 UART: [art] Store priv key in slot 0x5
6,702,811 UART: [art] Derive Key Pair - Done
6,717,408 UART: [art] Signing Cert with AUTHO
6,717,888 UART: RITY.KEYID = 7
6,732,862 UART: [art] Erasing AUTHORITY.KEYID = 7
6,733,627 UART: [art] PUB.X = 907F8E1243CCE34CC3D62122E0BB32BAF583F6D611916947E9DDCF43376B976727381727D7B2594D802B52282B27E3D4
6,740,393 UART: [art] PUB.Y = BD38FA3FEE3F2D48AA20EEC7079D34AB34938319BB15CC3FD3D89A89CFE248900159C8F45034DA557C31EA6AD894BAE1
6,747,355 UART: [art] SIG.R = 69EA6DE9A16A4EB73FABA937BDE318926B330478BF13E70383DE296DABEA28610CE9667C63173FB4C32CF333C246C671
6,754,126 UART: [art] SIG.S = 87611F8401C835ADE56C91BAA522FE78FC7218D7681005F9F7A47015F29F02575184348F9826A1B613F5834F84ECCB1E
6,778,026 UART: Caliptra RT
6,778,279 UART: [state] CFI Enabled
7,060,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,090,885 UART: [rt]cmd =0x41545348, len=116
7,112,273 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,226 UART: [kat] SHA2-256
882,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,272 UART: [kat] ++
886,424 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,459 UART: [kat] SHA2-512-ACC
897,360 UART: [kat] ECC-384
903,265 UART: [kat] HMAC-384Kdf
908,137 UART: [kat] LMS
1,476,333 UART: [kat] --
1,477,220 UART: [cold-reset] ++
1,477,742 UART: [fht] Storing FHT @ 0x50003400
1,480,523 UART: [idev] ++
1,480,691 UART: [idev] CDI.KEYID = 6
1,481,051 UART: [idev] SUBJECT.KEYID = 7
1,481,475 UART: [idev] UDS.KEYID = 0
1,481,820 ready_for_fw is high
1,481,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,717 UART: [idev] Erasing UDS.KEYID = 0
1,506,207 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,871 UART: [idev] --
1,515,946 UART: [ldev] ++
1,516,114 UART: [ldev] CDI.KEYID = 6
1,516,477 UART: [ldev] SUBJECT.KEYID = 5
1,516,903 UART: [ldev] AUTHORITY.KEYID = 7
1,517,366 UART: [ldev] FE.KEYID = 1
1,522,374 UART: [ldev] Erasing FE.KEYID = 1
1,547,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,553 UART: [ldev] --
1,586,872 UART: [fwproc] Waiting for Commands...
1,587,729 UART: [fwproc] Received command 0x46574c44
1,588,520 UART: [fwproc] Received Image of size 114448 bytes
2,887,751 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,859 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,168 >>> mbox cmd response: success
3,081,320 UART: [afmc] ++
3,081,488 UART: [afmc] CDI.KEYID = 6
3,081,850 UART: [afmc] SUBJECT.KEYID = 7
3,082,275 UART: [afmc] AUTHORITY.KEYID = 5
3,117,938 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,530 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,310 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,923 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,613 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,458 UART: [afmc] --
3,161,444 UART: [cold-reset] --
3,162,044 UART: [state] Locking Datavault
3,163,197 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,801 UART: [state] Locking ICCM
3,164,447 UART: [exit] Launching FMC @ 0x40000130
3,169,776 UART:
3,169,792 UART: Running Caliptra FMC ...
3,170,200 UART:
3,170,343 UART: [state] CFI Enabled
3,180,902 UART: [fht] FMC Alias Private Key: 7
3,288,583 UART: [art] Extend RT PCRs Done
3,289,011 UART: [art] Lock RT PCRs Done
3,290,631 UART: [art] Populate DV Done
3,299,004 UART: [fht] FMC Alias Private Key: 7
3,300,132 UART: [art] Derive CDI
3,300,412 UART: [art] Store in in slot 0x4
3,386,279 UART: [art] Derive Key Pair
3,386,639 UART: [art] Store priv key in slot 0x5
3,400,105 UART: [art] Derive Key Pair - Done
3,415,116 UART: [art] Signing Cert with AUTHO
3,415,596 UART: RITY.KEYID = 7
3,430,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,621 UART: [art] PUB.X = 6F77F831ECEC13B284ACFD6E80E2323F895F19636F67D6FA6C18B5839BA81B88A143769EC8774BAF7C75D021D31D5C47
3,438,399 UART: [art] PUB.Y = B9423C635D334E05B0C978A5DF63A7A2806D2CE7A1B3229C4D750ACC25A923C603DD18CD9AE6E7B502F70201DF9560E1
3,445,339 UART: [art] SIG.R = 020E7237C91CE631000041001284D8E3C370668D3D6F5B4400DC85216B01A3AED6CDAB6A8BF7B245EEA8C20B8C63A969
3,452,013 UART: [art] SIG.S = 36D5E0D097AFA12EEAC4A4677835B11655E37F5A1EA13B7793345B9A1352FD66D8E8DBFE4BB33C434801DE78FEC3797C
3,475,525 UART: Caliptra RT
3,475,870 UART: [state] CFI Enabled
3,585,154 UART: [rt] RT listening for mailbox commands...
3,585,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,052 UART: [rt]cmd =0x41544d4e, len=14344
3,853,704 >>> mbox cmd response data (8 bytes)
3,853,705 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,682 UART: [rt]cmd =0x41545348, len=116
3,906,132 >>> mbox cmd response data (12 bytes)
3,906,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,906,853 UART:
3,906,869 UART: Running Caliptra ROM ...
3,907,277 UART:
3,907,418 UART: [state] CFI Enabled
3,910,334 UART: [state] LifecycleState = Unprovisioned
3,910,989 UART: [state] DebugLocked = No
3,911,475 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,913,090 UART: [kat] SHA2-256
4,707,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,711,136 UART: [kat] ++
4,711,288 UART: [kat] sha1
4,715,668 UART: [kat] SHA2-256
4,717,606 UART: [kat] SHA2-384
4,720,295 UART: [kat] SHA2-512-ACC
4,722,195 UART: [kat] ECC-384
4,727,620 UART: [kat] HMAC-384Kdf
4,732,294 UART: [kat] LMS
5,300,490 UART: [kat] --
5,301,263 UART: [update-reset] ++
6,637,286 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,638,534 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,788,584 >>> mbox cmd response: success
6,788,584 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,788,881 UART: [update-reset] Copying MAN_2 To MAN_1
6,796,895 UART: [update-reset Success] --
6,797,824 UART: [state] Locking Datavault
6,798,796 UART: [state] Locking PCR0, PCR1 and PCR31
6,799,400 UART: [state] Locking ICCM
6,800,004 UART: [exit] Launching FMC @ 0x40000130
6,805,333 UART:
6,805,349 UART: Running Caliptra FMC ...
6,805,757 UART:
6,805,900 UART: [state] CFI Enabled
6,895,269 UART: [art] Extend RT PCRs Done
6,895,697 UART: [art] Lock RT PCRs Done
6,896,932 UART: [art] Populate DV Done
6,905,123 UART: [fht] FMC Alias Private Key: 7
6,906,257 UART: [art] Derive CDI
6,906,537 UART: [art] Store in in slot 0x4
6,992,166 UART: [art] Derive Key Pair
6,992,526 UART: [art] Store priv key in slot 0x5
7,005,626 UART: [art] Derive Key Pair - Done
7,020,238 UART: [art] Signing Cert with AUTHO
7,020,718 UART: RITY.KEYID = 7
7,036,362 UART: [art] Erasing AUTHORITY.KEYID = 7
7,037,127 UART: [art] PUB.X = 36A7A1E38F1E1E343C7467C6680AC274250E531DE159CF9BFD6F01D92B3B2149FB8BDCE36096EB17A1F117C6C943BC08
7,043,895 UART: [art] PUB.Y = 01D74181D41E0DFDB9673F42CBD64C57555597508B9906255AF841F466D1540B1249DD35640DD58E493FA81DCB6FF55C
7,050,830 UART: [art] SIG.R = DF48FCFC414FEAF25058E497FD0B7A8882C101FF31F296470EF12BA2A37430B86A57902D5092B245572C6A44FDA7590C
7,057,594 UART: [art] SIG.S = 7557FE94996826666E23A058CAD6585ECD7716E1FA6EF128A718466361B997F97B5EA773EB688C472D3FC0697562230E
7,081,052 UART: Caliptra RT
7,081,397 UART: [state] CFI Enabled
7,359,544 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,390,357 UART: [rt]cmd =0x41545348, len=116
7,411,855 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,184 ready_for_fw is high
1,363,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,940 >>> mbox cmd response: success
2,992,470 UART:
2,992,486 UART: Running Caliptra FMC ...
2,992,894 UART:
2,993,037 UART: [state] CFI Enabled
3,003,424 UART: [fht] FMC Alias Private Key: 7
3,111,961 UART: [art] Extend RT PCRs Done
3,112,389 UART: [art] Lock RT PCRs Done
3,113,781 UART: [art] Populate DV Done
3,121,982 UART: [fht] FMC Alias Private Key: 7
3,123,124 UART: [art] Derive CDI
3,123,404 UART: [art] Store in in slot 0x4
3,208,939 UART: [art] Derive Key Pair
3,209,299 UART: [art] Store priv key in slot 0x5
3,222,671 UART: [art] Derive Key Pair - Done
3,237,064 UART: [art] Signing Cert with AUTHO
3,237,544 UART: RITY.KEYID = 7
3,252,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,629 UART: [art] PUB.X = 9AF032A959567DBD18851A760AE24603D7959932FB19B3B266DCB7DA10CD217B3FD15B19D34F7DE18C9A4746C23A635C
3,260,399 UART: [art] PUB.Y = 240E947A9DB890FF4C9849DDB9A7E61509C32A30C6F9CA49389083429EAE670F117082FFCEE87C5010979B0A798CDEB1
3,267,343 UART: [art] SIG.R = 967A520CB308788B38937826154DF602D08BB24BEE8442A434D999AF0694F11878E37514D2ADD689F4B1B7530FA2D92F
3,274,094 UART: [art] SIG.S = 749C0CF868216360CEB90AA9158042DFD8E7D0B956E0C5CD0FD05BA3A36FFBFDAF8E798E7F596E38DB6AE00C1B5EB96B
3,297,523 UART: Caliptra RT
3,297,868 UART: [state] CFI Enabled
3,405,949 UART: [rt] RT listening for mailbox commands...
3,406,619 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,835 UART: [rt]cmd =0x41544d4e, len=14344
3,674,489 >>> mbox cmd response data (8 bytes)
3,674,490 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,401 UART: [rt]cmd =0x41545348, len=116
3,726,513 >>> mbox cmd response data (12 bytes)
3,726,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,490,895 >>> mbox cmd response: success
6,490,895 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,503,922 UART:
6,503,938 UART: Running Caliptra FMC ...
6,504,346 UART:
6,504,489 UART: [state] CFI Enabled
6,593,172 UART: [art] Extend RT PCRs Done
6,593,600 UART: [art] Lock RT PCRs Done
6,594,771 UART: [art] Populate DV Done
6,603,072 UART: [fht] FMC Alias Private Key: 7
6,604,034 UART: [art] Derive CDI
6,604,314 UART: [art] Store in in slot 0x4
6,689,969 UART: [art] Derive Key Pair
6,690,329 UART: [art] Store priv key in slot 0x5
6,704,485 UART: [art] Derive Key Pair - Done
6,719,247 UART: [art] Signing Cert with AUTHO
6,719,727 UART: RITY.KEYID = 7
6,734,905 UART: [art] Erasing AUTHORITY.KEYID = 7
6,735,670 UART: [art] PUB.X = 51E45770BCD8E7DF3A20A8C642B8C4A4FA1EAFDADBF276D53F9BE671F870AB1142B9B8036867AE637469C73D14BE8566
6,742,451 UART: [art] PUB.Y = 95AD5258BFB661A0DCE85678A70B68A245C94AF76F3A3630F2D5AA7A79155A577AF80E64152042F7ABA933BB88AB9F21
6,749,403 UART: [art] SIG.R = 079081378CA5C71A366CA3F0FE02B31DD9774E522666038229D0B0B24492D7BB543BE16FE1301CEE41E76E77E275AA51
6,756,164 UART: [art] SIG.S = A7253BF14E1AEAC2AC858132B51938B31CCCFD3E59CBAE719476D914911AC5A79B0A28BA7CA9115133E3DD60350858EB
6,780,265 UART: Caliptra RT
6,780,610 UART: [state] CFI Enabled
7,059,395 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,090,388 UART: [rt]cmd =0x41545348, len=116
7,112,912 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
893,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,627 UART: [kat] ++
897,779 UART: [kat] sha1
902,087 UART: [kat] SHA2-256
904,027 UART: [kat] SHA2-384
906,622 UART: [kat] SHA2-512-ACC
908,523 UART: [kat] ECC-384
918,188 UART: [kat] HMAC-384Kdf
922,594 UART: [kat] LMS
1,170,922 UART: [kat] --
1,172,027 UART: [cold-reset] ++
1,172,543 UART: [fht] FHT @ 0x50003400
1,175,274 UART: [idev] ++
1,175,442 UART: [idev] CDI.KEYID = 6
1,175,802 UART: [idev] SUBJECT.KEYID = 7
1,176,226 UART: [idev] UDS.KEYID = 0
1,176,571 ready_for_fw is high
1,176,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,202 UART: [idev] Erasing UDS.KEYID = 0
1,200,783 UART: [idev] Sha1 KeyId Algorithm
1,209,147 UART: [idev] --
1,210,209 UART: [ldev] ++
1,210,377 UART: [ldev] CDI.KEYID = 6
1,210,740 UART: [ldev] SUBJECT.KEYID = 5
1,211,166 UART: [ldev] AUTHORITY.KEYID = 7
1,211,629 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,429 UART: [ldev] --
1,281,700 UART: [fwproc] Wait for Commands...
1,282,452 UART: [fwproc] Recv command 0x46574c44
1,283,180 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,381 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,488 >>> mbox cmd response: success
2,775,524 UART: [afmc] ++
2,775,692 UART: [afmc] CDI.KEYID = 6
2,776,054 UART: [afmc] SUBJECT.KEYID = 7
2,776,479 UART: [afmc] AUTHORITY.KEYID = 5
2,811,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,949 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,834 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,553 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,517 UART: [afmc] --
2,855,501 UART: [cold-reset] --
2,856,265 UART: [state] Locking Datavault
2,857,600 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,204 UART: [state] Locking ICCM
2,858,722 UART: [exit] Launching FMC @ 0x40000130
2,864,051 UART:
2,864,067 UART: Running Caliptra FMC ...
2,864,475 UART:
2,864,529 UART: [state] CFI Enabled
2,874,728 UART: [fht] FMC Alias Private Key: 7
2,982,487 UART: [art] Extend RT PCRs Done
2,982,915 UART: [art] Lock RT PCRs Done
2,984,591 UART: [art] Populate DV Done
2,992,798 UART: [fht] FMC Alias Private Key: 7
2,993,774 UART: [art] Derive CDI
2,994,054 UART: [art] Store in in slot 0x4
3,079,885 UART: [art] Derive Key Pair
3,080,245 UART: [art] Store priv key in slot 0x5
3,093,401 UART: [art] Derive Key Pair - Done
3,108,113 UART: [art] Signing Cert with AUTHO
3,108,593 UART: RITY.KEYID = 7
3,123,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,412 UART: [art] PUB.X = 8F6D8533262D3C45510A029CF43493081F69F8E7CAA8E3BCA9153DC438BCFDEAE7BE350797ED7CA59B8EE15071684AF6
3,131,182 UART: [art] PUB.Y = 1DB1A7DAECEF72D5C56B9B6991FC08FBC8FC23234B6CA79EEEE6692B91C2A09FC2C3DD88BF83DD4B5FE9B46F80749BFF
3,138,161 UART: [art] SIG.R = 6288D1C143DDAFD80FC7F926111EE3E56F14926A46BA2346A1A4671A5CE3261D43D41FFE9CF7F360F1889262A06DE690
3,144,934 UART: [art] SIG.S = DA947228475ABCD3E63650035AEA7F52BD60584FD34AE30D20A3CC2E76C20C2BAAA3D88D6CFFB6A4031CB9A8AC13DE6B
3,168,883 UART: Caliptra RT
3,169,136 UART: [state] CFI Enabled
3,277,487 UART: [rt] RT listening for mailbox commands...
3,278,157 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,317 UART: [rt]cmd =0x41544d4e, len=14344
3,546,475 >>> mbox cmd response data (8 bytes)
3,546,476 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,827 UART: [rt]cmd =0x41545348, len=116
3,598,895 >>> mbox cmd response data (12 bytes)
3,598,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,599,547 UART:
3,599,563 UART: Running Caliptra ROM ...
3,599,971 UART:
3,600,026 UART: [state] CFI Enabled
3,602,496 UART: [state] LifecycleState = Unprovisioned
3,603,151 UART: [state] DebugLocked = No
3,603,741 UART: [state] WD Timer not started. Device not locked for debugging
3,605,051 UART: [kat] SHA2-256
4,410,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,414,826 UART: [kat] ++
4,414,978 UART: [kat] sha1
4,419,062 UART: [kat] SHA2-256
4,421,002 UART: [kat] SHA2-384
4,423,805 UART: [kat] SHA2-512-ACC
4,425,705 UART: [kat] ECC-384
4,435,392 UART: [kat] HMAC-384Kdf
4,439,952 UART: [kat] LMS
4,688,280 UART: [kat] --
4,689,142 UART: [update-reset] ++
6,002,283 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,003,246 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,153,244 >>> mbox cmd response: success
6,153,244 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,153,493 UART: [update-reset] Copying MAN_2 To MAN_1
6,161,507 UART: [update-reset Success] --
6,162,450 UART: [state] Locking Datavault
6,163,320 UART: [state] Locking PCR0, PCR1 and PCR31
6,163,924 UART: [state] Locking ICCM
6,164,464 UART: [exit] Launching FMC @ 0x40000130
6,169,793 UART:
6,169,809 UART: Running Caliptra FMC ...
6,170,217 UART:
6,170,271 UART: [state] CFI Enabled
6,258,934 UART: [art] Extend RT PCRs Done
6,259,362 UART: [art] Lock RT PCRs Done
6,260,549 UART: [art] Populate DV Done
6,268,628 UART: [fht] FMC Alias Private Key: 7
6,269,732 UART: [art] Derive CDI
6,270,012 UART: [art] Store in in slot 0x4
6,355,251 UART: [art] Derive Key Pair
6,355,611 UART: [art] Store priv key in slot 0x5
6,368,607 UART: [art] Derive Key Pair - Done
6,383,200 UART: [art] Signing Cert with AUTHO
6,383,680 UART: RITY.KEYID = 7
6,398,436 UART: [art] Erasing AUTHORITY.KEYID = 7
6,399,201 UART: [art] PUB.X = E633FF10E81CBC435CE25E0B0F901F669F1E969CCE3DCCC9836D6B9242EAA2D90DEEE412C4EA41C5A0A69B82E9AECE5D
6,405,990 UART: [art] PUB.Y = 0F468B89E9B6F9360B74EC6C5791422E838350A058CE5B0BFBB6DA6A83809067BCE4A166677B0768A7C461B3C0067AED
6,412,929 UART: [art] SIG.R = A0493C032073E4AECAFBC9EE25C9901B15020A135688DF9F69DC8B957B726E152758A38DAD06618F5BCB0B03AB2B5131
6,419,689 UART: [art] SIG.S = E64EA7B7D7749D87F8E049F916DBA254F27C7B48CE087357D79D6AB86DEE2CA656AE92D05696A950377340E396AAA85D
6,443,641 UART: Caliptra RT
6,443,894 UART: [state] CFI Enabled
6,727,076 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,757,819 UART: [rt]cmd =0x41545348, len=116
6,779,661 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,557 ready_for_fw is high
1,060,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,375 >>> mbox cmd response: success
2,688,537 UART:
2,688,553 UART: Running Caliptra FMC ...
2,688,961 UART:
2,689,015 UART: [state] CFI Enabled
2,699,696 UART: [fht] FMC Alias Private Key: 7
2,807,741 UART: [art] Extend RT PCRs Done
2,808,169 UART: [art] Lock RT PCRs Done
2,809,857 UART: [art] Populate DV Done
2,818,252 UART: [fht] FMC Alias Private Key: 7
2,819,184 UART: [art] Derive CDI
2,819,464 UART: [art] Store in in slot 0x4
2,905,113 UART: [art] Derive Key Pair
2,905,473 UART: [art] Store priv key in slot 0x5
2,918,587 UART: [art] Derive Key Pair - Done
2,933,373 UART: [art] Signing Cert with AUTHO
2,933,853 UART: RITY.KEYID = 7
2,949,059 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,824 UART: [art] PUB.X = 511802173DF47032ABE7081ECD249ADD0A9132B1F069DCE7FD7C062EC34DF355525373797ADEB45E824DC2ADB90264C5
2,956,587 UART: [art] PUB.Y = CFE22A3022F6D5775A2A486E66AD2F1D253DC04C9B77B393D8AB11926D9F7FB7BFC70B903C9188EBDE6313641D612435
2,963,542 UART: [art] SIG.R = F6F62ABB6E8BF9BD200CF70D7404648B207B8C97361E09387D1465C901A17CB57436D79570338BBF8D26C04E346A0BA8
2,970,296 UART: [art] SIG.S = D174464FA4D77529625711F34B4D3FC0ABB78BED9CB8A989D9CF8C6BBAC37288226D0EF9E03422CB56569A2449B9F3D4
2,994,506 UART: Caliptra RT
2,994,759 UART: [state] CFI Enabled
3,101,775 UART: [rt] RT listening for mailbox commands...
3,102,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,261 UART: [rt]cmd =0x41544d4e, len=14344
3,370,327 >>> mbox cmd response data (8 bytes)
3,370,328 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,229 UART: [rt]cmd =0x41545348, len=116
3,423,079 >>> mbox cmd response data (12 bytes)
3,423,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,863,429 >>> mbox cmd response: success
5,863,429 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,876,569 UART:
5,876,585 UART: Running Caliptra FMC ...
5,876,993 UART:
5,877,047 UART: [state] CFI Enabled
5,966,260 UART: [art] Extend RT PCRs Done
5,966,688 UART: [art] Lock RT PCRs Done
5,967,861 UART: [art] Populate DV Done
5,976,326 UART: [fht] FMC Alias Private Key: 7
5,977,366 UART: [art] Derive CDI
5,977,646 UART: [art] Store in in slot 0x4
6,063,707 UART: [art] Derive Key Pair
6,064,067 UART: [art] Store priv key in slot 0x5
6,077,377 UART: [art] Derive Key Pair - Done
6,092,338 UART: [art] Signing Cert with AUTHO
6,092,818 UART: RITY.KEYID = 7
6,107,594 UART: [art] Erasing AUTHORITY.KEYID = 7
6,108,359 UART: [art] PUB.X = BD6D0CA7FEFC6398F44FB4883C1CF946EEC25B1A3995762C38D958DD439C81BF9C01FEDA2ABCCA810A67CF709DDCEB70
6,115,148 UART: [art] PUB.Y = 56F96EF96686469B4D4E6E4BEF922050446353E3A266DEF9AF8F27B20A20FA7DE69DDA4E9FB6EE864300BB50FDA6C42E
6,122,089 UART: [art] SIG.R = D69C76CBC84690E482DD4FB8EBF9BAB39A76D5DB851979858E7FF866410BA017E398969BF10AB81190D4224FE678B002
6,128,856 UART: [art] SIG.S = A091338DDF1E7FEBA81046692AF7A46B90A3B761504A431FCE522823FD75D34D69F734BB3DD50CF72C96C5031D914CBA
6,152,535 UART: Caliptra RT
6,152,788 UART: [state] CFI Enabled
6,435,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,465,849 UART: [rt]cmd =0x41545348, len=116
6,488,659 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
893,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,054 UART: [kat] ++
898,206 UART: [kat] sha1
902,314 UART: [kat] SHA2-256
904,254 UART: [kat] SHA2-384
907,063 UART: [kat] SHA2-512-ACC
908,964 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
923,147 UART: [kat] LMS
1,171,475 UART: [kat] --
1,172,542 UART: [cold-reset] ++
1,173,116 UART: [fht] FHT @ 0x50003400
1,175,733 UART: [idev] ++
1,175,901 UART: [idev] CDI.KEYID = 6
1,176,261 UART: [idev] SUBJECT.KEYID = 7
1,176,685 UART: [idev] UDS.KEYID = 0
1,177,030 ready_for_fw is high
1,177,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,561 UART: [idev] Erasing UDS.KEYID = 0
1,202,412 UART: [idev] Sha1 KeyId Algorithm
1,211,020 UART: [idev] --
1,212,094 UART: [ldev] ++
1,212,262 UART: [ldev] CDI.KEYID = 6
1,212,625 UART: [ldev] SUBJECT.KEYID = 5
1,213,051 UART: [ldev] AUTHORITY.KEYID = 7
1,213,514 UART: [ldev] FE.KEYID = 1
1,218,948 UART: [ldev] Erasing FE.KEYID = 1
1,244,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,318 UART: [ldev] --
1,284,607 UART: [fwproc] Wait for Commands...
1,285,385 UART: [fwproc] Recv command 0x46574c44
1,286,113 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,392 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,491 >>> mbox cmd response: success
2,779,577 UART: [afmc] ++
2,779,745 UART: [afmc] CDI.KEYID = 6
2,780,107 UART: [afmc] SUBJECT.KEYID = 7
2,780,532 UART: [afmc] AUTHORITY.KEYID = 5
2,816,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,472 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,376 UART: [afmc] --
2,859,466 UART: [cold-reset] --
2,860,420 UART: [state] Locking Datavault
2,861,539 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,143 UART: [state] Locking ICCM
2,862,731 UART: [exit] Launching FMC @ 0x40000130
2,868,060 UART:
2,868,076 UART: Running Caliptra FMC ...
2,868,484 UART:
2,868,627 UART: [state] CFI Enabled
2,879,300 UART: [fht] FMC Alias Private Key: 7
2,987,687 UART: [art] Extend RT PCRs Done
2,988,115 UART: [art] Lock RT PCRs Done
2,989,605 UART: [art] Populate DV Done
2,997,886 UART: [fht] FMC Alias Private Key: 7
2,998,928 UART: [art] Derive CDI
2,999,208 UART: [art] Store in in slot 0x4
3,084,587 UART: [art] Derive Key Pair
3,084,947 UART: [art] Store priv key in slot 0x5
3,098,561 UART: [art] Derive Key Pair - Done
3,113,218 UART: [art] Signing Cert with AUTHO
3,113,698 UART: RITY.KEYID = 7
3,128,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,709 UART: [art] PUB.X = 472905D4F0C607C4B24138652D365A6469B16231FCFF3593944865837804FD035DD5A8E80DF4A35474D6BACFC746E12C
3,136,460 UART: [art] PUB.Y = BD95849DE2E191BA8D1DEC458D980A708C3FC831E22363C28CD14CF2E34E7ED109075E3EE29F181520F2D516CB0982FC
3,143,408 UART: [art] SIG.R = 5149CC206C193C6CDEAAA4513A2DE8F58CE8D2F7B6C418E8FAD6FD7CDDD5024D72CF3850A1325F51C4DCE6A8D2DCEE20
3,150,203 UART: [art] SIG.S = DA67CB448509777ABFC1656BCA03C3AF0478105609A02ADF4430764AD18D1EE59DD8FB4B59677A65F9806310D2AF71CA
3,174,002 UART: Caliptra RT
3,174,347 UART: [state] CFI Enabled
3,282,210 UART: [rt] RT listening for mailbox commands...
3,282,880 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,960 UART: [rt]cmd =0x41544d4e, len=14344
3,550,252 >>> mbox cmd response data (8 bytes)
3,550,253 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,214 UART: [rt]cmd =0x41545348, len=116
3,601,456 >>> mbox cmd response data (12 bytes)
3,601,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,602,306 UART:
3,602,322 UART: Running Caliptra ROM ...
3,602,730 UART:
3,602,872 UART: [state] CFI Enabled
3,605,472 UART: [state] LifecycleState = Unprovisioned
3,606,127 UART: [state] DebugLocked = No
3,606,619 UART: [state] WD Timer not started. Device not locked for debugging
3,607,851 UART: [kat] SHA2-256
4,413,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,417,626 UART: [kat] ++
4,417,778 UART: [kat] sha1
4,422,156 UART: [kat] SHA2-256
4,424,096 UART: [kat] SHA2-384
4,426,889 UART: [kat] SHA2-512-ACC
4,428,789 UART: [kat] ECC-384
4,438,428 UART: [kat] HMAC-384Kdf
4,443,284 UART: [kat] LMS
4,691,612 UART: [kat] --
4,692,498 UART: [update-reset] ++
6,006,623 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,007,770 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,157,768 >>> mbox cmd response: success
6,157,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,157,993 UART: [update-reset] Copying MAN_2 To MAN_1
6,166,007 UART: [update-reset Success] --
6,167,180 UART: [state] Locking Datavault
6,167,848 UART: [state] Locking PCR0, PCR1 and PCR31
6,168,452 UART: [state] Locking ICCM
6,169,018 UART: [exit] Launching FMC @ 0x40000130
6,174,347 UART:
6,174,363 UART: Running Caliptra FMC ...
6,174,771 UART:
6,174,914 UART: [state] CFI Enabled
6,264,333 UART: [art] Extend RT PCRs Done
6,264,761 UART: [art] Lock RT PCRs Done
6,265,912 UART: [art] Populate DV Done
6,274,059 UART: [fht] FMC Alias Private Key: 7
6,275,123 UART: [art] Derive CDI
6,275,403 UART: [art] Store in in slot 0x4
6,361,160 UART: [art] Derive Key Pair
6,361,520 UART: [art] Store priv key in slot 0x5
6,374,576 UART: [art] Derive Key Pair - Done
6,389,434 UART: [art] Signing Cert with AUTHO
6,389,914 UART: RITY.KEYID = 7
6,404,752 UART: [art] Erasing AUTHORITY.KEYID = 7
6,405,517 UART: [art] PUB.X = A76459B7F842C569DABB49DFD091DC857C318F48356F75876CC18756844D018B36F5A736DE6949314FDF4ED8B27778A3
6,412,284 UART: [art] PUB.Y = 0587DF29B70DBBD3B313A1BD24C858EA4A0364388F8FF14E35D6A72891BFB6BCB4920D34209DA6914CD650DEDD50E20D
6,419,233 UART: [art] SIG.R = 8B3EEDEA7FDA9730CAD5441BF2324EE1D2DC503C8638650382A1B08ECEC88B70F21FC7958E1898A0F932F7187427CDED
6,426,014 UART: [art] SIG.S = AE26D2D6B4CF7249C516427284D4C46C3EF2B18B95B5B5F030205F40DF5107EEC72E9D1D33D9B35C77906000285E4B22
6,449,454 UART: Caliptra RT
6,449,799 UART: [state] CFI Enabled
6,728,835 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,759,726 UART: [rt]cmd =0x41545348, len=116
6,781,162 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,006 ready_for_fw is high
1,061,006 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,854 >>> mbox cmd response: success
2,691,198 UART:
2,691,214 UART: Running Caliptra FMC ...
2,691,622 UART:
2,691,765 UART: [state] CFI Enabled
2,702,666 UART: [fht] FMC Alias Private Key: 7
2,811,637 UART: [art] Extend RT PCRs Done
2,812,065 UART: [art] Lock RT PCRs Done
2,813,515 UART: [art] Populate DV Done
2,821,832 UART: [fht] FMC Alias Private Key: 7
2,822,782 UART: [art] Derive CDI
2,823,062 UART: [art] Store in in slot 0x4
2,908,739 UART: [art] Derive Key Pair
2,909,099 UART: [art] Store priv key in slot 0x5
2,922,731 UART: [art] Derive Key Pair - Done
2,937,486 UART: [art] Signing Cert with AUTHO
2,937,966 UART: RITY.KEYID = 7
2,953,142 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,907 UART: [art] PUB.X = 46D20B94D63C38E7DA2A830C766D4BE59F1F48805AB76B271D914F8AD78107BE986C19CED44240DA64026F2005D89F21
2,960,664 UART: [art] PUB.Y = 1F0F892B4610E7DA379A477909FCA9CC8CA98FD3EEA786ADC60CB935A2E02B7F01063DDA208E8FB41813105952722B84
2,967,607 UART: [art] SIG.R = 3559E89AD8B5367F9010BE9D906A6BCB4A13D80A9A0C4742D3B44C9AEDA27B37FEAEADDF5121B1D9F47B61098FC1BE5E
2,974,390 UART: [art] SIG.S = 9EE2D56A8455976A157C7590791D0210C5DF0E1C4C53D4E116F4E6EB705B3C74D6290B170100320E32CEE5DEC303DA26
2,998,145 UART: Caliptra RT
2,998,490 UART: [state] CFI Enabled
3,106,485 UART: [rt] RT listening for mailbox commands...
3,107,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,417 UART: [rt]cmd =0x41544d4e, len=14344
3,375,513 >>> mbox cmd response data (8 bytes)
3,375,514 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,469 UART: [rt]cmd =0x41545348, len=116
3,427,205 >>> mbox cmd response data (12 bytes)
3,427,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,865,296 >>> mbox cmd response: success
5,865,296 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,878,402 UART:
5,878,418 UART: Running Caliptra FMC ...
5,878,826 UART:
5,878,969 UART: [state] CFI Enabled
5,968,202 UART: [art] Extend RT PCRs Done
5,968,630 UART: [art] Lock RT PCRs Done
5,969,725 UART: [art] Populate DV Done
5,978,040 UART: [fht] FMC Alias Private Key: 7
5,979,158 UART: [art] Derive CDI
5,979,438 UART: [art] Store in in slot 0x4
6,065,083 UART: [art] Derive Key Pair
6,065,443 UART: [art] Store priv key in slot 0x5
6,078,521 UART: [art] Derive Key Pair - Done
6,093,079 UART: [art] Signing Cert with AUTHO
6,093,559 UART: RITY.KEYID = 7
6,108,979 UART: [art] Erasing AUTHORITY.KEYID = 7
6,109,744 UART: [art] PUB.X = 9935985ACE16FEE7189C9C13FEAA9B2E9B6CE4F835282898B20667CD86FA50AB73F541277A70B38C1A0DF1A747F093C3
6,116,516 UART: [art] PUB.Y = 013130467831CEB0C292B699B01222DB603923F754557BB76A86980F07FD1CEC058F05F53EB6B24C354971A2A30FCE71
6,123,444 UART: [art] SIG.R = E947833294455B2E0E580A9BEB9D5C4FAD4FCC203C068B1A388D1DBEB0C6D27216863EA475661E499A267C3B1A936692
6,130,209 UART: [art] SIG.S = 7700F4F44A3BA3C0137BC425455D68A028F7D8552A59658C5CC790A2644A57F45BDDC34A269D0C5BA5D631653DB5161A
6,154,155 UART: Caliptra RT
6,154,500 UART: [state] CFI Enabled
6,433,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,464,074 UART: [rt]cmd =0x41545348, len=116
6,485,912 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,187 UART: [cold-reset] ++
1,170,751 UART: [fht] FHT @ 0x50003400
1,173,549 UART: [idev] ++
1,173,717 UART: [idev] CDI.KEYID = 6
1,174,078 UART: [idev] SUBJECT.KEYID = 7
1,174,503 UART: [idev] UDS.KEYID = 0
1,174,849 ready_for_fw is high
1,174,849 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,681 UART: [idev] Erasing UDS.KEYID = 0
1,199,747 UART: [idev] Sha1 KeyId Algorithm
1,208,591 UART: [idev] --
1,209,644 UART: [ldev] ++
1,209,812 UART: [ldev] CDI.KEYID = 6
1,210,176 UART: [ldev] SUBJECT.KEYID = 5
1,210,603 UART: [ldev] AUTHORITY.KEYID = 7
1,211,066 UART: [ldev] FE.KEYID = 1
1,215,988 UART: [ldev] Erasing FE.KEYID = 1
1,243,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,686 UART: [ldev] --
1,281,982 UART: [fwproc] Wait for Commands...
1,282,555 UART: [fwproc] Recv command 0x46574c44
1,283,288 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,172 >>> mbox cmd response: success
2,775,397 UART: [afmc] ++
2,775,565 UART: [afmc] CDI.KEYID = 6
2,775,928 UART: [afmc] SUBJECT.KEYID = 7
2,776,354 UART: [afmc] AUTHORITY.KEYID = 5
2,812,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,538 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,257 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,196 UART: [afmc] --
2,856,108 UART: [cold-reset] --
2,856,988 UART: [state] Locking Datavault
2,858,079 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,683 UART: [state] Locking ICCM
2,859,297 UART: [exit] Launching FMC @ 0x40000130
2,864,626 UART:
2,864,642 UART: Running Caliptra FMC ...
2,865,050 UART:
2,865,104 UART: [state] CFI Enabled
2,876,075 UART: [fht] FMC Alias Private Key: 7
2,983,706 UART: [art] Extend RT PCRs Done
2,984,134 UART: [art] Lock RT PCRs Done
2,985,594 UART: [art] Populate DV Done
2,993,691 UART: [fht] FMC Alias Private Key: 7
2,994,667 UART: [art] Derive CDI
2,994,947 UART: [art] Store in in slot 0x4
3,080,242 UART: [art] Derive Key Pair
3,080,602 UART: [art] Store priv key in slot 0x5
3,093,748 UART: [art] Derive Key Pair - Done
3,108,149 UART: [art] Signing Cert with AUTHO
3,108,629 UART: RITY.KEYID = 7
3,123,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,738 UART: [art] PUB.X = 1CD7281D4D47C8BEBBCACA794A5ECCEE25926F8B76A37C1DD492F7AC0BC4349CC5F3D184927557227847EE137F9145E6
3,131,519 UART: [art] PUB.Y = 7C3E71F12B1076B9355D909126A36E8809123C0A579D92E4D4DE4412DAA427744927741229DE90896E969F15B6CA47DE
3,138,455 UART: [art] SIG.R = 02FB464BFBFA6EC0BD5D3A5A8A722A448CFE371CD682D170C1CACA9F4F834BF2CCD40B363B8124FCDAA11B92153369CF
3,145,245 UART: [art] SIG.S = 7A1471C393D6A78C865C77CAF440763BE060886F351CD7B6CF3FD8A5BFA5855AAEC18EF08578E328305B6675934D988F
3,168,752 UART: Caliptra RT
3,169,005 UART: [state] CFI Enabled
3,277,362 UART: [rt] RT listening for mailbox commands...
3,278,032 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,974 UART: [rt]cmd =0x41544d4e, len=14344
3,545,362 >>> mbox cmd response data (8 bytes)
3,545,363 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,424 UART: [rt]cmd =0x41545348, len=116
3,597,366 >>> mbox cmd response data (12 bytes)
3,597,367 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,598,324 UART:
3,598,340 UART: Running Caliptra ROM ...
3,598,748 UART:
3,598,803 UART: [state] CFI Enabled
3,601,397 UART: [state] LifecycleState = Unprovisioned
3,602,052 UART: [state] DebugLocked = No
3,602,592 UART: [state] WD Timer not started. Device not locked for debugging
3,603,736 UART: [kat] SHA2-256
4,407,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,411,415 UART: [kat] ++
4,411,567 UART: [kat] sha1
4,415,909 UART: [kat] SHA2-256
4,417,849 UART: [kat] SHA2-384
4,420,788 UART: [kat] SHA2-512-ACC
4,422,688 UART: [kat] ECC-384
4,432,303 UART: [kat] HMAC-384Kdf
4,436,895 UART: [kat] LMS
4,685,207 UART: [kat] --
4,686,103 UART: [update-reset] ++
5,998,805 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,999,884 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,149,882 >>> mbox cmd response: success
6,149,882 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,150,231 UART: [update-reset] Copying MAN_2 To MAN_1
6,158,245 UART: [update-reset Success] --
6,159,190 UART: [state] Locking Datavault
6,159,992 UART: [state] Locking PCR0, PCR1 and PCR31
6,160,596 UART: [state] Locking ICCM
6,161,110 UART: [exit] Launching FMC @ 0x40000130
6,166,439 UART:
6,166,455 UART: Running Caliptra FMC ...
6,166,863 UART:
6,166,917 UART: [state] CFI Enabled
6,256,030 UART: [art] Extend RT PCRs Done
6,256,458 UART: [art] Lock RT PCRs Done
6,257,545 UART: [art] Populate DV Done
6,265,788 UART: [fht] FMC Alias Private Key: 7
6,266,870 UART: [art] Derive CDI
6,267,150 UART: [art] Store in in slot 0x4
6,352,413 UART: [art] Derive Key Pair
6,352,773 UART: [art] Store priv key in slot 0x5
6,365,849 UART: [art] Derive Key Pair - Done
6,380,854 UART: [art] Signing Cert with AUTHO
6,381,334 UART: RITY.KEYID = 7
6,396,020 UART: [art] Erasing AUTHORITY.KEYID = 7
6,396,785 UART: [art] PUB.X = 3B9CD89A781403F98AFC547B95330DA9138890ABF871B4310105C590E614CBAB10D10B5C0EC568CFF683A22812E8A776
6,403,539 UART: [art] PUB.Y = 9C53DAFF945DE7BB93C0158BA2F2E31DF0D0A8BB2D57D60BDB70D333F3A0B3E2F5A35D4704D2094B8CB9CE498E9CFD54
6,410,504 UART: [art] SIG.R = F969B54C1E349A681164C50E4FB513F0736C785D74EB6E0884F0DA8080C6621AA56F53A1BE35988BBC6E65003D8D77E4
6,417,248 UART: [art] SIG.S = 971AD1A366E5D8D41902CA69E1B4507F82976C173F339BAF0A067094DE3F937B3BCF894CD69F2DD101DB9C0F2746C1AB
6,440,634 UART: Caliptra RT
6,440,887 UART: [state] CFI Enabled
6,721,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,752,392 UART: [rt]cmd =0x41545348, len=116
6,774,250 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,454 ready_for_fw is high
1,056,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,262 >>> mbox cmd response: success
2,685,364 UART:
2,685,380 UART: Running Caliptra FMC ...
2,685,788 UART:
2,685,842 UART: [state] CFI Enabled
2,696,281 UART: [fht] FMC Alias Private Key: 7
2,804,686 UART: [art] Extend RT PCRs Done
2,805,114 UART: [art] Lock RT PCRs Done
2,806,826 UART: [art] Populate DV Done
2,815,027 UART: [fht] FMC Alias Private Key: 7
2,816,049 UART: [art] Derive CDI
2,816,329 UART: [art] Store in in slot 0x4
2,901,930 UART: [art] Derive Key Pair
2,902,290 UART: [art] Store priv key in slot 0x5
2,915,542 UART: [art] Derive Key Pair - Done
2,930,449 UART: [art] Signing Cert with AUTHO
2,930,929 UART: RITY.KEYID = 7
2,946,141 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,906 UART: [art] PUB.X = 8D04FB4F756EB486BBCD923A25323E1200E78DCA21DEB56CBAC08E9A2BD70AB126D9BC8C387E3BA0E7B7862AC9C12E8C
2,953,672 UART: [art] PUB.Y = BE95BBFAA88FDAD634B9ED5EF231E4C225508EE8B902359C0FA6492B103C15CEECE9CD51F893F1871BE00A4FAE30BD9C
2,960,639 UART: [art] SIG.R = 1EED01B0A288C93EE39D673EFB9C92683CE999733B92FB1105A002FE2016475E14409A1CA9FDA308E6998F0D01FBE6D5
2,967,399 UART: [art] SIG.S = 28EE9DCF85A616B12705B690D22E2AA4C272325898675ACB7188EA1256E67A72C19D4FAB89168BCDAF42882E8FC250EB
2,991,421 UART: Caliptra RT
2,991,674 UART: [state] CFI Enabled
3,100,265 UART: [rt] RT listening for mailbox commands...
3,100,935 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,087 UART: [rt]cmd =0x41544d4e, len=14344
3,368,885 >>> mbox cmd response data (8 bytes)
3,368,886 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,067 UART: [rt]cmd =0x41545348, len=116
3,419,927 >>> mbox cmd response data (12 bytes)
3,419,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,855,836 >>> mbox cmd response: success
5,855,836 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,869,470 UART:
5,869,486 UART: Running Caliptra FMC ...
5,869,894 UART:
5,869,948 UART: [state] CFI Enabled
5,958,907 UART: [art] Extend RT PCRs Done
5,959,335 UART: [art] Lock RT PCRs Done
5,960,852 UART: [art] Populate DV Done
5,969,113 UART: [fht] FMC Alias Private Key: 7
5,970,257 UART: [art] Derive CDI
5,970,537 UART: [art] Store in in slot 0x4
6,056,310 UART: [art] Derive Key Pair
6,056,670 UART: [art] Store priv key in slot 0x5
6,070,020 UART: [art] Derive Key Pair - Done
6,084,861 UART: [art] Signing Cert with AUTHO
6,085,341 UART: RITY.KEYID = 7
6,100,451 UART: [art] Erasing AUTHORITY.KEYID = 7
6,101,216 UART: [art] PUB.X = A8E2176F11EB41F7501B8DB4EE96C9F61170120B1250C27C92B9110241C565D430F56D999CDB9FA100FA038F066BAC09
6,107,951 UART: [art] PUB.Y = AB1932D10DF463512C28B1877D49D85E1C191E8E6E5EA1FECD28F486E00E5AB36137730F9E737DC2930F9FEFFC898081
6,114,897 UART: [art] SIG.R = 505F949CC8E1E245DD565DBBD4FE9631DD24053AC61A8D7E703549EA398964EC830C235D53C4C7D6B2C0D2CF79170288
6,121,664 UART: [art] SIG.S = A3D27F43F05F24DB600C0A72BD1667C136C0F6C6E91BB248E21463F5AD830D110C3E0BBA3430480C7068A29DCE8300B0
6,145,947 UART: Caliptra RT
6,146,200 UART: [state] CFI Enabled
6,428,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,458,816 UART: [rt]cmd =0x41545348, len=116
6,481,538 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,594 UART: [fht] FHT @ 0x50003400
1,173,256 UART: [idev] ++
1,173,424 UART: [idev] CDI.KEYID = 6
1,173,785 UART: [idev] SUBJECT.KEYID = 7
1,174,210 UART: [idev] UDS.KEYID = 0
1,174,556 ready_for_fw is high
1,174,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,560 UART: [idev] Erasing UDS.KEYID = 0
1,199,976 UART: [idev] Sha1 KeyId Algorithm
1,208,748 UART: [idev] --
1,209,789 UART: [ldev] ++
1,209,957 UART: [ldev] CDI.KEYID = 6
1,210,321 UART: [ldev] SUBJECT.KEYID = 5
1,210,748 UART: [ldev] AUTHORITY.KEYID = 7
1,211,211 UART: [ldev] FE.KEYID = 1
1,216,685 UART: [ldev] Erasing FE.KEYID = 1
1,243,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,137 UART: [ldev] --
1,282,655 UART: [fwproc] Wait for Commands...
1,283,292 UART: [fwproc] Recv command 0x46574c44
1,284,025 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,345 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,389 >>> mbox cmd response: success
2,776,642 UART: [afmc] ++
2,776,810 UART: [afmc] CDI.KEYID = 6
2,777,173 UART: [afmc] SUBJECT.KEYID = 7
2,777,599 UART: [afmc] AUTHORITY.KEYID = 5
2,813,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,049 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,661 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,380 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,173 UART: [afmc] --
2,857,257 UART: [cold-reset] --
2,858,337 UART: [state] Locking Datavault
2,859,570 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,174 UART: [state] Locking ICCM
2,860,766 UART: [exit] Launching FMC @ 0x40000130
2,866,095 UART:
2,866,111 UART: Running Caliptra FMC ...
2,866,519 UART:
2,866,662 UART: [state] CFI Enabled
2,877,299 UART: [fht] FMC Alias Private Key: 7
2,985,404 UART: [art] Extend RT PCRs Done
2,985,832 UART: [art] Lock RT PCRs Done
2,987,520 UART: [art] Populate DV Done
2,995,689 UART: [fht] FMC Alias Private Key: 7
2,996,695 UART: [art] Derive CDI
2,996,975 UART: [art] Store in in slot 0x4
3,082,628 UART: [art] Derive Key Pair
3,082,988 UART: [art] Store priv key in slot 0x5
3,096,290 UART: [art] Derive Key Pair - Done
3,110,788 UART: [art] Signing Cert with AUTHO
3,111,268 UART: RITY.KEYID = 7
3,126,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,781 UART: [art] PUB.X = 8BE42D84376D2F6CEFED150FA819C6926748AE8C094CE2DF11DA9712D1340384EA77DCF6C427C28177374EC697DD5936
3,133,548 UART: [art] PUB.Y = C4D2B96A40059F546967283604D3057ED1359C6DF1A6107E81D74731F16202267D4673865619CBB33C42974147A1AFAE
3,140,474 UART: [art] SIG.R = 4036864CBED70A6CD4F465B09601240FE26CFA3D95942AE54C7A5AF7D0AD20651F17C79F2BA42E9B625CF9058CF6522B
3,147,242 UART: [art] SIG.S = 1364D02B1D8F42B6F7B4812E66815A8AEBAD7692857F6CB1C9120BE8D0A995B86EE23CC142B7FB0448BF137CBB47F2CC
3,171,013 UART: Caliptra RT
3,171,358 UART: [state] CFI Enabled
3,279,843 UART: [rt] RT listening for mailbox commands...
3,280,513 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,559 UART: [rt]cmd =0x41544d4e, len=14344
3,548,413 >>> mbox cmd response data (8 bytes)
3,548,414 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,289 UART: [rt]cmd =0x41545348, len=116
3,600,403 >>> mbox cmd response data (12 bytes)
3,600,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,933 UART:
3,600,949 UART: Running Caliptra ROM ...
3,601,357 UART:
3,601,499 UART: [state] CFI Enabled
3,604,661 UART: [state] LifecycleState = Unprovisioned
3,605,316 UART: [state] DebugLocked = No
3,605,840 UART: [state] WD Timer not started. Device not locked for debugging
3,607,106 UART: [kat] SHA2-256
4,410,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,414,785 UART: [kat] ++
4,414,937 UART: [kat] sha1
4,419,283 UART: [kat] SHA2-256
4,421,223 UART: [kat] SHA2-384
4,423,906 UART: [kat] SHA2-512-ACC
4,425,806 UART: [kat] ECC-384
4,435,451 UART: [kat] HMAC-384Kdf
4,440,177 UART: [kat] LMS
4,688,489 UART: [kat] --
4,689,319 UART: [update-reset] ++
6,003,623 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,004,628 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,154,626 >>> mbox cmd response: success
6,154,626 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,154,763 UART: [update-reset] Copying MAN_2 To MAN_1
6,162,777 UART: [update-reset Success] --
6,163,808 UART: [state] Locking Datavault
6,164,712 UART: [state] Locking PCR0, PCR1 and PCR31
6,165,316 UART: [state] Locking ICCM
6,165,808 UART: [exit] Launching FMC @ 0x40000130
6,171,137 UART:
6,171,153 UART: Running Caliptra FMC ...
6,171,561 UART:
6,171,704 UART: [state] CFI Enabled
6,260,599 UART: [art] Extend RT PCRs Done
6,261,027 UART: [art] Lock RT PCRs Done
6,262,210 UART: [art] Populate DV Done
6,270,283 UART: [fht] FMC Alias Private Key: 7
6,271,453 UART: [art] Derive CDI
6,271,733 UART: [art] Store in in slot 0x4
6,357,404 UART: [art] Derive Key Pair
6,357,764 UART: [art] Store priv key in slot 0x5
6,371,570 UART: [art] Derive Key Pair - Done
6,386,066 UART: [art] Signing Cert with AUTHO
6,386,546 UART: RITY.KEYID = 7
6,401,842 UART: [art] Erasing AUTHORITY.KEYID = 7
6,402,607 UART: [art] PUB.X = F4CC326223443A5C99655634A9047FDDA1C258903C55E27828205CD7F25DCBDE7070C5870679D0F4B3A0BD73D220F7CA
6,409,373 UART: [art] PUB.Y = 1268C941E26516A820B1868D72DA84B1E1A75282E4EF0BA12EE8CE376335D0DC3EF4141A21D950807B95349767CB3353
6,416,316 UART: [art] SIG.R = 96B9E8C2A9A08ED3F484BE71B8E12A0DE7E288038865CF970FBB2D33E00231449B24801FA56C52D2DF245558A1FB947A
6,423,080 UART: [art] SIG.S = 13EB1DC10306915107EDA65ACD2501300151F1F2D6E4F04CC36E20E989EF26CF9F81E8BEF3711F55015443A5B64B4DEE
6,446,729 UART: Caliptra RT
6,447,074 UART: [state] CFI Enabled
6,730,091 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,760,728 UART: [rt]cmd =0x41545348, len=116
6,782,236 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,647 ready_for_fw is high
1,056,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,077 >>> mbox cmd response: success
2,688,419 UART:
2,688,435 UART: Running Caliptra FMC ...
2,688,843 UART:
2,688,986 UART: [state] CFI Enabled
2,699,521 UART: [fht] FMC Alias Private Key: 7
2,808,020 UART: [art] Extend RT PCRs Done
2,808,448 UART: [art] Lock RT PCRs Done
2,810,062 UART: [art] Populate DV Done
2,818,281 UART: [fht] FMC Alias Private Key: 7
2,819,271 UART: [art] Derive CDI
2,819,551 UART: [art] Store in in slot 0x4
2,905,366 UART: [art] Derive Key Pair
2,905,726 UART: [art] Store priv key in slot 0x5
2,919,118 UART: [art] Derive Key Pair - Done
2,933,788 UART: [art] Signing Cert with AUTHO
2,934,268 UART: RITY.KEYID = 7
2,948,956 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,721 UART: [art] PUB.X = 7FD71C3466FE1CD414D4336681684B0BA5F4BFB509C81DA47593E4858461E71914AF4051A3A92EFF75109F38894D26E1
2,956,483 UART: [art] PUB.Y = E09BFF71D64267D002753BE8685434C8F30EA71A4D4145F4579635BB2E89C0A124661E1F421E6DA913B8A38700050945
2,963,391 UART: [art] SIG.R = 279CAF06722A4A145F10C672484F80115D32E51F42CAFBE9BBF899BC713BF0704AD2B2B6B824293743193F465CF3D8E5
2,970,162 UART: [art] SIG.S = 1A0639B05B34EE6BBB1C7A710BAF99084F9A4A801BF1403309B5417190E6103EEA2B6DEA1282431F35F6B9A6FF43CD31
2,994,361 UART: Caliptra RT
2,994,706 UART: [state] CFI Enabled
3,102,369 UART: [rt] RT listening for mailbox commands...
3,103,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,065 UART: [rt]cmd =0x41544d4e, len=14344
3,370,865 >>> mbox cmd response data (8 bytes)
3,370,866 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,997 UART: [rt]cmd =0x41545348, len=116
3,422,993 >>> mbox cmd response data (12 bytes)
3,422,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,857,301 >>> mbox cmd response: success
5,857,301 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,870,439 UART:
5,870,455 UART: Running Caliptra FMC ...
5,870,863 UART:
5,871,006 UART: [state] CFI Enabled
5,960,061 UART: [art] Extend RT PCRs Done
5,960,489 UART: [art] Lock RT PCRs Done
5,961,692 UART: [art] Populate DV Done
5,970,105 UART: [fht] FMC Alias Private Key: 7
5,971,127 UART: [art] Derive CDI
5,971,407 UART: [art] Store in in slot 0x4
6,056,948 UART: [art] Derive Key Pair
6,057,308 UART: [art] Store priv key in slot 0x5
6,069,856 UART: [art] Derive Key Pair - Done
6,084,724 UART: [art] Signing Cert with AUTHO
6,085,204 UART: RITY.KEYID = 7
6,100,188 UART: [art] Erasing AUTHORITY.KEYID = 7
6,100,953 UART: [art] PUB.X = FD5B3E18B3344D139CC32759D41856DEA438B7A243C708F05F2D62C419498345BC7AEA152676BC2E1FBF9784893B756B
6,107,722 UART: [art] PUB.Y = A0F8FE45C11C15DC7FDC9C0DB0AB5E7605D008B4363FC95EF9E4E36FD8EA0F28DEE952A2AFE99684F95A58CBB1467E32
6,114,684 UART: [art] SIG.R = 698E6D25FC24CED945EA568F62B396D6D53FC9E5FBB1C9E9F930F956C09BB2A49614504E747ACDBA80CD958439C6EF42
6,121,468 UART: [art] SIG.S = 1E02AF482D44467FE21A8A9F191DAF2F4D21F57B4F2034B6FB611CA4045E12805A702249C127EB508A50D7905467DF49
6,144,795 UART: Caliptra RT
6,145,140 UART: [state] CFI Enabled
6,427,205 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,458,078 UART: [rt]cmd =0x41545348, len=116
6,479,614 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,103 UART:
192,469 UART: Running Caliptra ROM ...
193,582 UART:
193,726 UART: [state] CFI Enabled
263,333 UART: [state] LifecycleState = Unprovisioned
265,211 UART: [state] DebugLocked = No
267,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,369 UART: [kat] SHA2-256
443,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,558 UART: [kat] ++
454,092 UART: [kat] sha1
464,767 UART: [kat] SHA2-256
467,484 UART: [kat] SHA2-384
472,618 UART: [kat] SHA2-512-ACC
474,991 UART: [kat] ECC-384
2,766,931 UART: [kat] HMAC-384Kdf
2,778,174 UART: [kat] LMS
3,968,450 UART: [kat] --
3,972,313 UART: [cold-reset] ++
3,974,530 UART: [fht] Storing FHT @ 0x50003400
3,985,864 UART: [idev] ++
3,986,426 UART: [idev] CDI.KEYID = 6
3,987,380 UART: [idev] SUBJECT.KEYID = 7
3,988,621 UART: [idev] UDS.KEYID = 0
3,989,676 ready_for_fw is high
3,989,872 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,389 UART: [idev] Erasing UDS.KEYID = 0
7,324,244 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,156 UART: [idev] --
7,349,660 UART: [ldev] ++
7,350,287 UART: [ldev] CDI.KEYID = 6
7,351,171 UART: [ldev] SUBJECT.KEYID = 5
7,352,431 UART: [ldev] AUTHORITY.KEYID = 7
7,353,718 UART: [ldev] FE.KEYID = 1
7,399,017 UART: [ldev] Erasing FE.KEYID = 1
10,733,758 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,246 UART: [ldev] --
13,110,972 UART: [fwproc] Waiting for Commands...
13,113,556 UART: [fwproc] Received command 0x46574c44
13,115,735 UART: [fwproc] Received Image of size 114124 bytes
17,168,636 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,699 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,628,575 >>> mbox cmd response: success
17,633,493 UART: [afmc] ++
17,634,093 UART: [afmc] CDI.KEYID = 6
17,635,212 UART: [afmc] SUBJECT.KEYID = 7
17,636,331 UART: [afmc] AUTHORITY.KEYID = 5
21,007,135 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,013 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,305,290 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,712 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,334,540 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,966 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,535 UART: [afmc] --
23,373,537 UART: [cold-reset] --
23,378,376 UART: [state] Locking Datavault
23,384,705 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,460 UART: [state] Locking ICCM
23,388,339 UART: [exit] Launching FMC @ 0x40000130
23,396,750 UART:
23,397,034 UART: Running Caliptra FMC ...
23,398,069 UART:
23,398,222 UART: [state] CFI Enabled
23,462,424 UART: [fht] FMC Alias Private Key: 7
25,800,801 UART: [art] Extend RT PCRs Done
25,802,020 UART: [art] Lock RT PCRs Done
25,803,656 UART: [art] Populate DV Done
25,809,249 UART: [fht] FMC Alias Private Key: 7
25,810,787 UART: [art] Derive CDI
25,811,602 UART: [art] Store in in slot 0x4
25,871,355 UART: [art] Derive Key Pair
25,872,355 UART: [art] Store priv key in slot 0x5
29,164,750 UART: [art] Derive Key Pair - Done
29,177,639 UART: [art] Signing Cert with AUTHO
29,178,938 UART: RITY.KEYID = 7
31,464,779 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,286 UART: [art] PUB.X = F91EA2361C61A41C9FC5526398D482E3C8B7303D47F909B378C47A11EC93DEF2AB2182C072C9ACD8738227CCB6439875
31,473,538 UART: [art] PUB.Y = 7AFC6808BF9A62CBE5CB95882C4F0BADFE9D8FE457EE77F4776C0C3E842ED4D22F6596C2BE7819AFD45D38B9062B1DF8
31,480,798 UART: [art] SIG.R = 47392C9FB9A65B07D82287F94A2FB680E1A5C82DCA6D68CF9FB389A41BB1F147E2A60F38C4FFB108ADC19F57AA9E56C3
31,488,203 UART: [art] SIG.S = 3F7C7FD5B63CA2D813DE2BE68CFE388220B1900645AABC763BE354731DE2F66B0B8206CB73B655B7B6D2237B508CD3F9
32,793,066 UART: Caliptra RT
32,793,777 UART: [state] CFI Enabled
32,954,533 UART: [rt] RT listening for mailbox commands...
32,956,956 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,112,332 UART: [rt]cmd =0x41544d4e, len=14344
38,347,985 >>> mbox cmd response data (8 bytes)
38,348,594 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,379,450 UART: [rt]cmd =0x41545348, len=116
38,381,850 >>> mbox cmd response data (12 bytes)
40,514,227 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,659,548 UART:
40,659,895 UART: Running Caliptra ROM ...
40,661,030 UART:
40,661,202 UART: [state] CFI Enabled
40,720,070 UART: [state] LifecycleState = Unprovisioned
40,722,018 UART: [state] DebugLocked = No
40,724,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,729,134 UART: [kat] SHA2-256
40,898,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,909,335 UART: [kat] ++
40,909,795 UART: [kat] sha1
40,920,955 UART: [kat] SHA2-256
40,923,628 UART: [kat] SHA2-384
40,928,270 UART: [kat] SHA2-512-ACC
40,930,617 UART: [kat] ECC-384
43,224,975 UART: [kat] HMAC-384Kdf
43,237,398 UART: [kat] LMS
44,427,696 UART: [kat] --
44,433,597 UART: [update-reset] ++
48,574,629 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,578,486 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,960,782 >>> mbox cmd response: success
48,965,614 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,966,236 UART: [update-reset] Copying MAN_2 To MAN_1
48,984,825 UART: [update-reset Success] --
48,988,413 UART: [state] Locking Datavault
48,991,131 UART: [state] Locking PCR0, PCR1 and PCR31
48,992,835 UART: [state] Locking ICCM
48,995,455 UART: [exit] Launching FMC @ 0x40000130
49,003,744 UART:
49,004,004 UART: Running Caliptra FMC ...
49,005,123 UART:
49,005,307 UART: [state] CFI Enabled
49,094,409 UART: [art] Extend RT PCRs Done
49,095,609 UART: [art] Lock RT PCRs Done
49,097,017 UART: [art] Populate DV Done
49,102,245 UART: [fht] FMC Alias Private Key: 7
49,103,898 UART: [art] Derive CDI
49,104,722 UART: [art] Store in in slot 0x4
49,163,618 UART: [art] Derive Key Pair
49,164,658 UART: [art] Store priv key in slot 0x5
52,456,507 UART: [art] Derive Key Pair - Done
52,469,612 UART: [art] Signing Cert with AUTHO
52,470,922 UART: RITY.KEYID = 7
54,757,412 UART: [art] Erasing AUTHORITY.KEYID = 7
54,758,927 UART: [art] PUB.X = 8F73426827E0A1C4D648D051989922B8390D1A3A8A883FD99ED09712C9146D7BC6CE268427376EB054892432B96D97F6
54,766,127 UART: [art] PUB.Y = F73FB7649FA487466B2DBEE00C0880E2F21B844915D7C952FBB473A5CB9BDF7D8E7E2093E1CE8A57FE85C0ACFA019D01
54,773,411 UART: [art] SIG.R = 4A65BCDC57B72F3027DFC4BC6B62F576263C5047A658936A7E77D4E6E2A93CFD79D8080EF3154FB17B9DB5616D58249B
54,780,818 UART: [art] SIG.S = 510465C1560FFA322FA01B64FC12AB75DB41B25E87CC6337A8C1ADC8A6BBDC44940F2BB0C6D1B28859FF1BFB1EC91CDB
56,085,631 UART: Caliptra RT
56,086,346 UART: [state] CFI Enabled
56,419,514 UART: [rt] RT listening for mailbox commands...
56,451,252 UART: [rt]cmd =0x41545348, len=116
56,453,422 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,804,073 ready_for_fw is high
3,804,715 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,878,634 >>> mbox cmd response: success
23,567,243 UART:
23,567,625 UART: Running Caliptra FMC ...
23,568,766 UART:
23,568,925 UART: [state] CFI Enabled
23,638,484 UART: [fht] FMC Alias Private Key: 7
25,976,136 UART: [art] Extend RT PCRs Done
25,977,367 UART: [art] Lock RT PCRs Done
25,979,058 UART: [art] Populate DV Done
25,984,692 UART: [fht] FMC Alias Private Key: 7
25,986,344 UART: [art] Derive CDI
25,987,157 UART: [art] Store in in slot 0x4
26,047,345 UART: [art] Derive Key Pair
26,048,395 UART: [art] Store priv key in slot 0x5
29,341,225 UART: [art] Derive Key Pair - Done
29,353,801 UART: [art] Signing Cert with AUTHO
29,355,118 UART: RITY.KEYID = 7
31,643,150 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,662 UART: [art] PUB.X = 6D549CC1A2BCE0A57A051FBDB1776A59362985060D6F357ADFEC15726ED7D1B629C8DFB7CF6455DFBD8C47C83DE920C7
31,651,873 UART: [art] PUB.Y = EE0353EDB624CC57B301250888662EDC40FCD9F0DBC64AF67A0D95B35B51C9AAB074D88DE9243BD6C64C5D54BDA425BD
31,659,151 UART: [art] SIG.R = B5BF1A6D28ED690CA93FF1D49B7DCB881C75ACF8636D0675D1812CC0F3B43C3DF938DAA5A6C43F16438298A66FB3DF72
31,666,562 UART: [art] SIG.S = F3114BBAE6EB94D54F5476D6772400A5BAD35F12FE5022DC6C4E4EA2FCAE6AEA2AC6DB1F19C3B41DF3A24C4AB8E2FD74
32,971,630 UART: Caliptra RT
32,972,340 UART: [state] CFI Enabled
33,134,101 UART: [rt] RT listening for mailbox commands...
33,136,575 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,291,932 UART: [rt]cmd =0x41544d4e, len=14344
38,527,845 >>> mbox cmd response data (8 bytes)
38,528,441 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,559,334 UART: [rt]cmd =0x41545348, len=116
38,561,824 >>> mbox cmd response data (12 bytes)
40,692,348 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,429,690 >>> mbox cmd response: success
49,430,226 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,464,915 UART:
49,465,200 UART: Running Caliptra FMC ...
49,466,318 UART:
49,466,481 UART: [state] CFI Enabled
49,567,728 UART: [art] Extend RT PCRs Done
49,568,934 UART: [art] Lock RT PCRs Done
49,570,288 UART: [art] Populate DV Done
49,575,993 UART: [fht] FMC Alias Private Key: 7
49,577,527 UART: [art] Derive CDI
49,578,343 UART: [art] Store in in slot 0x4
49,637,906 UART: [art] Derive Key Pair
49,638,900 UART: [art] Store priv key in slot 0x5
52,932,010 UART: [art] Derive Key Pair - Done
52,945,077 UART: [art] Signing Cert with AUTHO
52,946,401 UART: RITY.KEYID = 7
55,233,107 UART: [art] Erasing AUTHORITY.KEYID = 7
55,234,609 UART: [art] PUB.X = CA38517A39388572AE0A1F5D795100EB5AB2FE8B6A159D3A8D86A224CC807745BF84045F0F7332691A9DEF4D41514078
55,241,997 UART: [art] PUB.Y = 4118BD8DC3E3623BB68FDCAE6F9F9A89E7BF84EABB7BD359FE6C1E60FA25B8817C3E8D7E66EFE70AB27926D8D72C0BFE
55,249,150 UART: [art] SIG.R = 8DBD23BC8C842ABDD42CDFB3AD1CAD6AC8AF19A529E8901E5E39F5B85614EE804ABD7DB46E5A7C7CFE1604562766A42F
55,256,555 UART: [art] SIG.S = 858208314C7AD1582A81AAC62934E90A12E2E7F0A299BABDB0A94BDC4C2B3141E9736F24D3C92A2BD3D38B96AB4F5EBA
56,561,050 UART: Caliptra RT
56,561,751 UART: [state] CFI Enabled
56,897,497 UART: [rt] RT listening for mailbox commands...
56,929,623 UART: [rt]cmd =0x41545348, len=116
56,931,847 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,439 UART:
192,787 UART: Running Caliptra ROM ...
193,985 UART:
603,460 UART: [state] CFI Enabled
619,122 UART: [state] LifecycleState = Unprovisioned
621,066 UART: [state] DebugLocked = No
622,380 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,941 UART: [kat] SHA2-256
797,710 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,299 UART: [kat] ++
808,828 UART: [kat] sha1
819,932 UART: [kat] SHA2-256
822,649 UART: [kat] SHA2-384
829,907 UART: [kat] SHA2-512-ACC
832,268 UART: [kat] ECC-384
3,116,255 UART: [kat] HMAC-384Kdf
3,128,051 UART: [kat] LMS
4,318,133 UART: [kat] --
4,324,004 UART: [cold-reset] ++
4,325,736 UART: [fht] Storing FHT @ 0x50003400
4,337,070 UART: [idev] ++
4,337,632 UART: [idev] CDI.KEYID = 6
4,338,659 UART: [idev] SUBJECT.KEYID = 7
4,339,831 UART: [idev] UDS.KEYID = 0
4,340,857 ready_for_fw is high
4,341,084 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,492 UART: [idev] Erasing UDS.KEYID = 0
7,627,097 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,534 UART: [idev] --
7,653,222 UART: [ldev] ++
7,653,788 UART: [ldev] CDI.KEYID = 6
7,654,747 UART: [ldev] SUBJECT.KEYID = 5
7,655,971 UART: [ldev] AUTHORITY.KEYID = 7
7,657,197 UART: [ldev] FE.KEYID = 1
7,668,378 UART: [ldev] Erasing FE.KEYID = 1
10,960,931 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,436 UART: [ldev] --
13,319,370 UART: [fwproc] Waiting for Commands...
13,321,463 UART: [fwproc] Received command 0x46574c44
13,323,696 UART: [fwproc] Received Image of size 114124 bytes
17,384,274 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,909 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,813 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,841,356 >>> mbox cmd response: success
17,846,395 UART: [afmc] ++
17,846,994 UART: [afmc] CDI.KEYID = 6
17,847,878 UART: [afmc] SUBJECT.KEYID = 7
17,849,147 UART: [afmc] AUTHORITY.KEYID = 5
21,166,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,886 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,148 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,535 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,358 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,507,787 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,529,019 UART: [afmc] --
23,532,730 UART: [cold-reset] --
23,537,242 UART: [state] Locking Datavault
23,540,923 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,676 UART: [state] Locking ICCM
23,545,309 UART: [exit] Launching FMC @ 0x40000130
23,553,725 UART:
23,553,966 UART: Running Caliptra FMC ...
23,555,065 UART:
23,555,220 UART: [state] CFI Enabled
23,563,072 UART: [fht] FMC Alias Private Key: 7
25,893,173 UART: [art] Extend RT PCRs Done
25,894,384 UART: [art] Lock RT PCRs Done
25,895,973 UART: [art] Populate DV Done
25,901,380 UART: [fht] FMC Alias Private Key: 7
25,902,977 UART: [art] Derive CDI
25,903,709 UART: [art] Store in in slot 0x4
25,945,793 UART: [art] Derive Key Pair
25,946,845 UART: [art] Store priv key in slot 0x5
29,188,607 UART: [art] Derive Key Pair - Done
29,201,432 UART: [art] Signing Cert with AUTHO
29,202,765 UART: RITY.KEYID = 7
31,482,074 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,581 UART: [art] PUB.X = E4EA760E7DD908EE6018DFC75070D43ADFE6661A3D8903D6CE2C1343920AD4C424E51EB1C7DAF182E9607B31EEC832C3
31,490,784 UART: [art] PUB.Y = 54D23127247D62B1E5BEB5708D3CB4F9A54C7D64213261770BD170EE8AA2A09C6918EAC6F477116B5B93CD4C97624D81
31,498,056 UART: [art] SIG.R = 05EE13F56E97174F263AC99E4A3D8FBC8BA7E76AD8B924599D9B4BB5DED7062BD24E7ABC69C1F44BD7F9E745B0837F21
31,505,438 UART: [art] SIG.S = 41008D9C5B9190B976A7BDAC39C4C06A973E78D6C9C54132CDE79F261D9A4DADFD4CCF781737FB4D0977496686E108C8
32,810,509 UART: Caliptra RT
32,811,218 UART: [state] CFI Enabled
32,930,000 UART: [rt] RT listening for mailbox commands...
32,932,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,087,832 UART: [rt]cmd =0x41544d4e, len=14344
38,323,585 >>> mbox cmd response data (8 bytes)
38,324,196 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,354,656 UART: [rt]cmd =0x41545348, len=116
38,357,126 >>> mbox cmd response data (12 bytes)
40,411,378 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,556,460 UART:
40,556,814 UART: Running Caliptra ROM ...
40,558,069 UART:
40,558,247 UART: [state] CFI Enabled
40,574,585 UART: [state] LifecycleState = Unprovisioned
40,576,498 UART: [state] DebugLocked = No
40,578,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,583,834 UART: [kat] SHA2-256
40,753,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,764,106 UART: [kat] ++
40,764,642 UART: [kat] sha1
40,775,636 UART: [kat] SHA2-256
40,778,348 UART: [kat] SHA2-384
40,783,527 UART: [kat] SHA2-512-ACC
40,785,926 UART: [kat] ECC-384
43,069,892 UART: [kat] HMAC-384Kdf
43,080,131 UART: [kat] LMS
44,270,192 UART: [kat] --
44,273,822 UART: [update-reset] ++
48,416,567 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,420,195 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,802,432 >>> mbox cmd response: success
48,807,206 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,807,808 UART: [update-reset] Copying MAN_2 To MAN_1
48,825,605 UART: [update-reset Success] --
48,828,553 UART: [state] Locking Datavault
48,832,235 UART: [state] Locking PCR0, PCR1 and PCR31
48,833,987 UART: [state] Locking ICCM
48,835,447 UART: [exit] Launching FMC @ 0x40000130
48,843,838 UART:
48,844,069 UART: Running Caliptra FMC ...
48,845,167 UART:
48,845,321 UART: [state] CFI Enabled
48,889,814 UART: [art] Extend RT PCRs Done
48,890,999 UART: [art] Lock RT PCRs Done
48,892,553 UART: [art] Populate DV Done
48,898,242 UART: [fht] FMC Alias Private Key: 7
48,899,941 UART: [art] Derive CDI
48,900,747 UART: [art] Store in in slot 0x4
48,942,738 UART: [art] Derive Key Pair
48,943,752 UART: [art] Store priv key in slot 0x5
52,185,758 UART: [art] Derive Key Pair - Done
52,198,712 UART: [art] Signing Cert with AUTHO
52,200,009 UART: RITY.KEYID = 7
54,479,264 UART: [art] Erasing AUTHORITY.KEYID = 7
54,480,771 UART: [art] PUB.X = E187F9BF45BB9505F75B72423A768CB07FA1688CCEC873A66471ED6C185B1741B9B700E0137F9349B3640D9E6F35BB8A
54,488,023 UART: [art] PUB.Y = 3CA9628BF35C972E4E8C776E7D1F595C5315210009D27C8BD57129F4BB95E17B491BA753842D7AAFFD5F0C6480E11B43
54,495,250 UART: [art] SIG.R = B8ED46776B01CE75823BC1E401744D07C3151B4AE71F29245C73C3017F3C27597A21F5F774E824CD066B61ABA177A593
54,502,624 UART: [art] SIG.S = CE8A4F779A6C4BC591C802DACB1751780462314E7E01A9620830F7D080B716F5512F95E6AE26DF785425BD9D1D2BA39A
55,808,683 UART: Caliptra RT
55,809,395 UART: [state] CFI Enabled
56,098,373 UART: [rt] RT listening for mailbox commands...
56,130,331 UART: [rt]cmd =0x41545348, len=116
56,132,839 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
4,126,398 ready_for_fw is high
4,127,013 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,083,192 >>> mbox cmd response: success
23,734,090 UART:
23,734,503 UART: Running Caliptra FMC ...
23,735,605 UART:
23,735,764 UART: [state] CFI Enabled
23,743,759 UART: [fht] FMC Alias Private Key: 7
26,074,455 UART: [art] Extend RT PCRs Done
26,075,696 UART: [art] Lock RT PCRs Done
26,077,438 UART: [art] Populate DV Done
26,082,960 UART: [fht] FMC Alias Private Key: 7
26,084,500 UART: [art] Derive CDI
26,085,311 UART: [art] Store in in slot 0x4
26,127,580 UART: [art] Derive Key Pair
26,128,770 UART: [art] Store priv key in slot 0x5
29,370,367 UART: [art] Derive Key Pair - Done
29,383,369 UART: [art] Signing Cert with AUTHO
29,384,672 UART: RITY.KEYID = 7
31,663,821 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,327 UART: [art] PUB.X = 3D6EA722965AE1F0750354479F6D21A6E0A31C9A7AE5A2D1E9F2F347D8A94F388DA82243C0BD78639563AE86971707A1
31,672,574 UART: [art] PUB.Y = BC68A912913F4F3B2F47D4906A8518EF1A99DB6A20E34B259F505EE011634E8F2D2D2A356D7320FC04507F57DBA28420
31,679,812 UART: [art] SIG.R = 107D76B4BDD8C4F0B24182E2708001F2FB9E45DF41768041DE6C5E8E1C90C980428AC48462299817C3B1DDCA592A9B6D
31,687,188 UART: [art] SIG.S = 11ABD25620164689A1236328B49F4EA5D11A82AE56E8BA653F01FB5841ED0286812D7EEF888AC826130FC57F5CA5BF1B
32,992,537 UART: Caliptra RT
32,993,266 UART: [state] CFI Enabled
33,111,268 UART: [rt] RT listening for mailbox commands...
33,113,654 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,268,923 UART: [rt]cmd =0x41544d4e, len=14344
38,504,551 >>> mbox cmd response data (8 bytes)
38,505,138 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,535,767 UART: [rt]cmd =0x41545348, len=116
38,538,107 >>> mbox cmd response data (12 bytes)
40,591,154 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,249,815 >>> mbox cmd response: success
49,250,518 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,283,391 UART:
49,283,678 UART: Running Caliptra FMC ...
49,284,802 UART:
49,284,950 UART: [state] CFI Enabled
49,329,300 UART: [art] Extend RT PCRs Done
49,330,489 UART: [art] Lock RT PCRs Done
49,331,886 UART: [art] Populate DV Done
49,337,129 UART: [fht] FMC Alias Private Key: 7
49,338,660 UART: [art] Derive CDI
49,339,471 UART: [art] Store in in slot 0x4
49,382,005 UART: [art] Derive Key Pair
49,383,008 UART: [art] Store priv key in slot 0x5
52,624,958 UART: [art] Derive Key Pair - Done
52,637,632 UART: [art] Signing Cert with AUTHO
52,638,931 UART: RITY.KEYID = 7
54,918,152 UART: [art] Erasing AUTHORITY.KEYID = 7
54,919,669 UART: [art] PUB.X = 006145DC9C56EBDE60A332EE5CD827F73BB57A5641748528A6BA91218D1091254023DEA62F445712C8FB0C8576D1CA39
54,926,914 UART: [art] PUB.Y = ACB60F5E12C1EF53B859D42E2101F8BB283282408B286BA618A4928577E7EE28DCA3B4C32BD8EEFCD15B78F4E859CC22
54,934,182 UART: [art] SIG.R = 6381647E949A7CD0F4528CE030A1841F0274519A6E98D4A38AC8B8F6CD63D270E4F7EFD0CC2D04183FD6D04FA5F02217
54,941,524 UART: [art] SIG.S = AFB05B2E8BBE563B869098E82EBC743441429CC280988C7ED85A16A6103CDC5EE01654FA4FCF04CA279A407775737C8B
56,246,474 UART: Caliptra RT
56,247,191 UART: [state] CFI Enabled
56,536,299 UART: [rt] RT listening for mailbox commands...
56,567,962 UART: [rt]cmd =0x41545348, len=116
56,570,318 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
191,951 UART:
192,318 UART: Running Caliptra ROM ...
193,432 UART:
193,594 UART: [state] CFI Enabled
265,472 UART: [state] LifecycleState = Unprovisioned
267,388 UART: [state] DebugLocked = No
269,333 UART: [state] WD Timer not started. Device not locked for debugging
273,280 UART: [kat] SHA2-256
452,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,968 UART: [kat] ++
464,421 UART: [kat] sha1
476,216 UART: [kat] SHA2-256
479,228 UART: [kat] SHA2-384
484,224 UART: [kat] SHA2-512-ACC
487,237 UART: [kat] ECC-384
2,948,180 UART: [kat] HMAC-384Kdf
2,971,213 UART: [kat] LMS
3,500,706 UART: [kat] --
3,505,868 UART: [cold-reset] ++
3,506,905 UART: [fht] FHT @ 0x50003400
3,517,391 UART: [idev] ++
3,517,953 UART: [idev] CDI.KEYID = 6
3,518,984 UART: [idev] SUBJECT.KEYID = 7
3,520,086 UART: [idev] UDS.KEYID = 0
3,521,016 ready_for_fw is high
3,521,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,650 UART: [idev] Erasing UDS.KEYID = 0
6,025,755 UART: [idev] Sha1 KeyId Algorithm
6,050,115 UART: [idev] --
6,054,377 UART: [ldev] ++
6,054,949 UART: [ldev] CDI.KEYID = 6
6,055,864 UART: [ldev] SUBJECT.KEYID = 5
6,057,021 UART: [ldev] AUTHORITY.KEYID = 7
6,058,318 UART: [ldev] FE.KEYID = 1
6,099,063 UART: [ldev] Erasing FE.KEYID = 1
8,606,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,807 UART: [ldev] --
10,413,776 UART: [fwproc] Wait for Commands...
10,416,367 UART: [fwproc] Recv command 0x46574c44
10,418,497 UART: [fwproc] Recv'd Img size: 114448 bytes
13,827,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,631 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,289,996 >>> mbox cmd response: success
14,293,913 UART: [afmc] ++
14,294,510 UART: [afmc] CDI.KEYID = 6
14,295,398 UART: [afmc] SUBJECT.KEYID = 7
14,296,521 UART: [afmc] AUTHORITY.KEYID = 5
16,832,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,051 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,590,826 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,606,834 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,622,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,644,690 UART: [afmc] --
18,648,991 UART: [cold-reset] --
18,652,524 UART: [state] Locking Datavault
18,659,182 UART: [state] Locking PCR0, PCR1 and PCR31
18,660,867 UART: [state] Locking ICCM
18,662,159 UART: [exit] Launching FMC @ 0x40000130
18,670,556 UART:
18,670,788 UART: Running Caliptra FMC ...
18,671,815 UART:
18,671,981 UART: [state] CFI Enabled
18,733,537 UART: [fht] FMC Alias Private Key: 7
20,497,268 UART: [art] Extend RT PCRs Done
20,498,483 UART: [art] Lock RT PCRs Done
20,500,023 UART: [art] Populate DV Done
20,505,491 UART: [fht] FMC Alias Private Key: 7
20,506,981 UART: [art] Derive CDI
20,507,745 UART: [art] Store in in slot 0x4
20,565,975 UART: [art] Derive Key Pair
20,566,980 UART: [art] Store priv key in slot 0x5
23,029,746 UART: [art] Derive Key Pair - Done
23,042,705 UART: [art] Signing Cert with AUTHO
23,044,007 UART: RITY.KEYID = 7
24,755,655 UART: [art] Erasing AUTHORITY.KEYID = 7
24,757,192 UART: [art] PUB.X = F79807D013BDEA4199EEA63A7D8931AE0A18C68D0763A9CF2AFF200EDB9BB19A880AB9285635C0B36CE09955AA5A30A7
24,764,450 UART: [art] PUB.Y = 6E3E816F3D25D2290920D3DA17DC39AEFA83530FE8968EC24B291C6DAC2B8FE4751B8BAC34696172BD4BBCC0424AC714
24,771,722 UART: [art] SIG.R = 5477CC0403F679F8CE2871E6CC2E916A858D4070EAE73386A41F2DD5342A2CBC264F062509904CE5B96E73A9EF015A69
24,779,125 UART: [art] SIG.S = C476B900AC3285CEB7B0CC363E8CF8DA58AE293F2F2C606CF3B2B30D306D79C7A550C7FE387A9DF3CB53A75BDEC45F28
25,758,333 UART: Caliptra RT
25,759,025 UART: [state] CFI Enabled
25,923,821 UART: [rt] RT listening for mailbox commands...
25,926,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,082,460 UART: [rt]cmd =0x41544d4e, len=14344
30,012,967 >>> mbox cmd response data (8 bytes)
30,013,616 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,044,474 UART: [rt]cmd =0x41545348, len=116
30,046,925 >>> mbox cmd response data (12 bytes)
32,098,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,244,150 UART:
32,244,528 UART: Running Caliptra ROM ...
32,245,663 UART:
32,245,844 UART: [state] CFI Enabled
32,305,126 UART: [state] LifecycleState = Unprovisioned
32,307,012 UART: [state] DebugLocked = No
32,309,642 UART: [state] WD Timer not started. Device not locked for debugging
32,313,225 UART: [kat] SHA2-256
32,492,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,503,936 UART: [kat] ++
32,504,481 UART: [kat] sha1
32,514,890 UART: [kat] SHA2-256
32,517,912 UART: [kat] SHA2-384
32,524,599 UART: [kat] SHA2-512-ACC
32,527,541 UART: [kat] ECC-384
34,987,546 UART: [kat] HMAC-384Kdf
35,007,424 UART: [kat] LMS
35,536,892 UART: [kat] --
35,540,932 UART: [update-reset] ++
38,972,419 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,975,374 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,358,697 >>> mbox cmd response: success
39,359,164 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,359,599 UART: [update-reset] Copying MAN_2 To MAN_1
39,381,771 UART: [update-reset Success] --
39,387,128 UART: [state] Locking Datavault
39,390,503 UART: [state] Locking PCR0, PCR1 and PCR31
39,392,211 UART: [state] Locking ICCM
39,394,605 UART: [exit] Launching FMC @ 0x40000130
39,403,053 UART:
39,403,286 UART: Running Caliptra FMC ...
39,404,308 UART:
39,404,475 UART: [state] CFI Enabled
39,498,720 UART: [art] Extend RT PCRs Done
39,499,905 UART: [art] Lock RT PCRs Done
39,501,440 UART: [art] Populate DV Done
39,506,954 UART: [fht] FMC Alias Private Key: 7
39,508,435 UART: [art] Derive CDI
39,509,198 UART: [art] Store in in slot 0x4
39,568,056 UART: [art] Derive Key Pair
39,569,167 UART: [art] Store priv key in slot 0x5
42,031,966 UART: [art] Derive Key Pair - Done
42,045,029 UART: [art] Signing Cert with AUTHO
42,046,334 UART: RITY.KEYID = 7
43,757,400 UART: [art] Erasing AUTHORITY.KEYID = 7
43,758,916 UART: [art] PUB.X = 9E904AF82C9740D712AA566B80FB6BA492F9A29A429580C00B815E6F3665023B820BECEE2F93506A743525EDB5A0E866
43,766,134 UART: [art] PUB.Y = 5E4D00856DDDCEFC0642D941E937EACB2FC0D6FA24CD3D3F3D1100EF00A241D43706343210E600B9F2A385B4AB576CF8
43,773,325 UART: [art] SIG.R = 1B5DE61C9992F4EFA57DA7EEBA99504F02773B41B9ABC024514B953D5B2172D01C6967763D3C93667F84CF1541E82006
43,780,732 UART: [art] SIG.S = 7A9CF5F2B584503E5CD7AD3AAA655F332CC1E5EE6EB0CB45B6C4F28CF93DC37428ACD0672383519B024FE33545959437
44,759,458 UART: Caliptra RT
44,760,141 UART: [state] CFI Enabled
45,096,430 UART: [rt] RT listening for mailbox commands...
45,128,336 UART: [rt]cmd =0x41545348, len=116
45,130,682 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,384,042 ready_for_fw is high
3,384,427 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,086,583 >>> mbox cmd response: success
18,363,556 UART:
18,363,957 UART: Running Caliptra FMC ...
18,365,094 UART:
18,365,266 UART: [state] CFI Enabled
18,432,788 UART: [fht] FMC Alias Private Key: 7
20,197,389 UART: [art] Extend RT PCRs Done
20,198,597 UART: [art] Lock RT PCRs Done
20,200,297 UART: [art] Populate DV Done
20,205,537 UART: [fht] FMC Alias Private Key: 7
20,207,184 UART: [art] Derive CDI
20,208,000 UART: [art] Store in in slot 0x4
20,265,707 UART: [art] Derive Key Pair
20,266,769 UART: [art] Store priv key in slot 0x5
22,729,410 UART: [art] Derive Key Pair - Done
22,742,235 UART: [art] Signing Cert with AUTHO
22,743,531 UART: RITY.KEYID = 7
24,455,974 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,481 UART: [art] PUB.X = D568827548061A37DBC955E645B94F300EE0188A7A305F098A65574E71E1FD0A7CE83FE78382E9C9B4CAA99AA96658BB
24,464,731 UART: [art] PUB.Y = B4C0A45001DC2F2DD259199FC82B1C4AFA3E4B0E97579F8D17DE30A6C7D572438AF3D760A31056A59716FA07018A703C
24,472,009 UART: [art] SIG.R = 10ECA1CDC6BFEF4842AA25A091E5425469AE7EA58C5E30637E9926EA0F77FF62747852C7AF27916D7D57E01D743D7956
24,479,402 UART: [art] SIG.S = 3B1E6CA40D5973C770A413B0A31A29883E0AE34215F2D29F8F4B04B4B24D2A965E4711DFDB6A8BA80A75AEC2CBB947E0
25,458,279 UART: Caliptra RT
25,458,972 UART: [state] CFI Enabled
25,624,902 UART: [rt] RT listening for mailbox commands...
25,627,297 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,783,132 UART: [rt]cmd =0x41544d4e, len=14344
29,713,582 >>> mbox cmd response data (8 bytes)
29,714,192 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,744,884 UART: [rt]cmd =0x41545348, len=116
29,747,029 >>> mbox cmd response data (12 bytes)
31,800,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,908,188 >>> mbox cmd response: success
38,908,796 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,941,634 UART:
38,941,971 UART: Running Caliptra FMC ...
38,943,107 UART:
38,943,270 UART: [state] CFI Enabled
39,034,160 UART: [art] Extend RT PCRs Done
39,035,358 UART: [art] Lock RT PCRs Done
39,036,713 UART: [art] Populate DV Done
39,042,288 UART: [fht] FMC Alias Private Key: 7
39,044,013 UART: [art] Derive CDI
39,044,834 UART: [art] Store in in slot 0x4
39,103,210 UART: [art] Derive Key Pair
39,104,249 UART: [art] Store priv key in slot 0x5
41,566,874 UART: [art] Derive Key Pair - Done
41,580,082 UART: [art] Signing Cert with AUTHO
41,581,426 UART: RITY.KEYID = 7
43,293,497 UART: [art] Erasing AUTHORITY.KEYID = 7
43,294,998 UART: [art] PUB.X = 3AA92415B2E1A2B92F066110E8D0EDE4FB8C24C074E1B75DB9D5C1D280F4E5EE6F42476ADBAB23B5355FFDADF7451100
43,302,248 UART: [art] PUB.Y = EC4443EEE3B9254ED8FDC2F54BB3DD11A8F7EAAA374980C4B86822EE688C8265D39A138FF3480869F9AD9B2895CCB387
43,309,533 UART: [art] SIG.R = 21771D10F455C1CE51D0A5845F0BD629D94C81A02DB0F123D7729405B576C96C42139255E12E34B19D969F2963C065E3
43,316,862 UART: [art] SIG.S = 27C73A05CAC479F691354EFEDD3C75E40F893BD9BEE1E1D8E166158CE9D85D97CBF244059C1D5B8FE96F6D431D76BA10
44,295,871 UART: Caliptra RT
44,296,595 UART: [state] CFI Enabled
44,631,384 UART: [rt] RT listening for mailbox commands...
44,663,392 UART: [rt]cmd =0x41545348, len=116
44,665,813 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,524 UART:
192,913 UART: Running Caliptra ROM ...
194,026 UART:
603,624 UART: [state] CFI Enabled
619,070 UART: [state] LifecycleState = Unprovisioned
620,960 UART: [state] DebugLocked = No
623,552 UART: [state] WD Timer not started. Device not locked for debugging
627,498 UART: [kat] SHA2-256
806,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,195 UART: [kat] ++
818,661 UART: [kat] sha1
829,809 UART: [kat] SHA2-256
832,809 UART: [kat] SHA2-384
838,438 UART: [kat] SHA2-512-ACC
841,435 UART: [kat] ECC-384
3,283,295 UART: [kat] HMAC-384Kdf
3,295,668 UART: [kat] LMS
3,825,112 UART: [kat] --
3,829,543 UART: [cold-reset] ++
3,830,986 UART: [fht] FHT @ 0x50003400
3,841,354 UART: [idev] ++
3,841,918 UART: [idev] CDI.KEYID = 6
3,842,941 UART: [idev] SUBJECT.KEYID = 7
3,844,033 UART: [idev] UDS.KEYID = 0
3,845,076 ready_for_fw is high
3,845,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,849 UART: [idev] Erasing UDS.KEYID = 0
6,317,645 UART: [idev] Sha1 KeyId Algorithm
6,341,197 UART: [idev] --
6,345,179 UART: [ldev] ++
6,345,740 UART: [ldev] CDI.KEYID = 6
6,346,700 UART: [ldev] SUBJECT.KEYID = 5
6,347,849 UART: [ldev] AUTHORITY.KEYID = 7
6,349,129 UART: [ldev] FE.KEYID = 1
6,359,335 UART: [ldev] Erasing FE.KEYID = 1
8,835,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,065 UART: [ldev] --
10,627,355 UART: [fwproc] Wait for Commands...
10,629,465 UART: [fwproc] Recv command 0x46574c44
10,631,601 UART: [fwproc] Recv'd Img size: 114448 bytes
14,039,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,499,171 >>> mbox cmd response: success
14,503,445 UART: [afmc] ++
14,504,040 UART: [afmc] CDI.KEYID = 6
14,504,946 UART: [afmc] SUBJECT.KEYID = 7
14,506,103 UART: [afmc] AUTHORITY.KEYID = 5
17,007,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,719 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,470 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,544 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,370 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,158 UART: [afmc] --
18,803,304 UART: [cold-reset] --
18,807,273 UART: [state] Locking Datavault
18,812,513 UART: [state] Locking PCR0, PCR1 and PCR31
18,814,153 UART: [state] Locking ICCM
18,815,808 UART: [exit] Launching FMC @ 0x40000130
18,824,250 UART:
18,824,476 UART: Running Caliptra FMC ...
18,825,567 UART:
18,825,721 UART: [state] CFI Enabled
18,833,919 UART: [fht] FMC Alias Private Key: 7
20,590,051 UART: [art] Extend RT PCRs Done
20,591,302 UART: [art] Lock RT PCRs Done
20,593,323 UART: [art] Populate DV Done
20,598,675 UART: [fht] FMC Alias Private Key: 7
20,600,369 UART: [art] Derive CDI
20,601,194 UART: [art] Store in in slot 0x4
20,643,463 UART: [art] Derive Key Pair
20,644,498 UART: [art] Store priv key in slot 0x5
23,071,592 UART: [art] Derive Key Pair - Done
23,084,500 UART: [art] Signing Cert with AUTHO
23,085,814 UART: RITY.KEYID = 7
24,791,742 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,249 UART: [art] PUB.X = D86B03A7402AF802D0E6A99A6C686B27E0945FB3B343686BB3CFAE50A42085042D6C62DF21120EA2A7FE86B4D4FB8C0A
24,800,527 UART: [art] PUB.Y = 65EBF065BDC72A38D42E74ECE45ABBC404D21B8DB3258B37342AEC8B7491D789439D54FB420EE4DFECD276F6D7AE468A
24,807,845 UART: [art] SIG.R = 64C0E49CDE947C4186B54C291BB76EC08C52A12B8C8B2D603359F5DBA4A82376567D085DEC9B9AD4A09C39E4DFD573D9
24,815,217 UART: [art] SIG.S = B089E3152B63FC7168B937E93B377165AA22BBCB6AC73D0C81C23B28FCD7BDA479DFB33DCF32777E9D0BC60CC362E4B4
25,794,514 UART: Caliptra RT
25,795,207 UART: [state] CFI Enabled
25,911,950 UART: [rt] RT listening for mailbox commands...
25,914,354 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,069,539 UART: [rt]cmd =0x41544d4e, len=14344
30,000,094 >>> mbox cmd response data (8 bytes)
30,000,726 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,031,466 UART: [rt]cmd =0x41545348, len=116
30,033,621 >>> mbox cmd response data (12 bytes)
32,085,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,230,868 UART:
32,231,220 UART: Running Caliptra ROM ...
32,232,262 UART:
32,232,405 UART: [state] CFI Enabled
32,246,623 UART: [state] LifecycleState = Unprovisioned
32,248,457 UART: [state] DebugLocked = No
32,251,268 UART: [state] WD Timer not started. Device not locked for debugging
32,255,026 UART: [kat] SHA2-256
32,434,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,445,763 UART: [kat] ++
32,446,218 UART: [kat] sha1
32,456,718 UART: [kat] SHA2-256
32,459,739 UART: [kat] SHA2-384
32,464,746 UART: [kat] SHA2-512-ACC
32,467,683 UART: [kat] ECC-384
34,910,369 UART: [kat] HMAC-384Kdf
34,923,192 UART: [kat] LMS
35,452,674 UART: [kat] --
35,458,059 UART: [update-reset] ++
38,894,341 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,897,406 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,280,695 >>> mbox cmd response: success
39,281,128 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,282,061 UART: [update-reset] Copying MAN_2 To MAN_1
39,304,443 UART: [update-reset Success] --
39,307,434 UART: [state] Locking Datavault
39,309,229 UART: [state] Locking PCR0, PCR1 and PCR31
39,310,867 UART: [state] Locking ICCM
39,312,003 UART: [exit] Launching FMC @ 0x40000130
39,320,396 UART:
39,320,620 UART: Running Caliptra FMC ...
39,321,711 UART:
39,321,863 UART: [state] CFI Enabled
39,366,251 UART: [art] Extend RT PCRs Done
39,367,428 UART: [art] Lock RT PCRs Done
39,368,765 UART: [art] Populate DV Done
39,374,107 UART: [fht] FMC Alias Private Key: 7
39,375,579 UART: [art] Derive CDI
39,376,330 UART: [art] Store in in slot 0x4
39,419,094 UART: [art] Derive Key Pair
39,420,144 UART: [art] Store priv key in slot 0x5
41,846,614 UART: [art] Derive Key Pair - Done
41,859,339 UART: [art] Signing Cert with AUTHO
41,860,633 UART: RITY.KEYID = 7
43,566,473 UART: [art] Erasing AUTHORITY.KEYID = 7
43,567,978 UART: [art] PUB.X = 9CD3AD7873D73184BDFD5CA084D3A2AA9380C5C48D9D232F2F52E605AE4E4B806EB8D27DE5FEA836D25202A704EDD3B2
43,575,275 UART: [art] PUB.Y = 1E6F434EC293AA7A9CE466C1701F92E6CDA2C061A0DAF9D4797FBCC43AAC35869454D05F70ED1B68FE9D045269BAA4D9
43,582,547 UART: [art] SIG.R = D4F8A3E7147F051497A23001710CBA2CB7D55845BC5EE22D02EFA5BFAF29772CCE628B89A03601A4F23F32FADE8E3436
43,589,993 UART: [art] SIG.S = 4C40B34D0218320CDA08CBC9C1314E8AECC0CD68343A4084815B350A215BC23867C337D6DBE9B182AC1967199C5BFA1B
44,569,506 UART: Caliptra RT
44,570,191 UART: [state] CFI Enabled
44,858,134 UART: [rt] RT listening for mailbox commands...
44,890,219 UART: [rt]cmd =0x41545348, len=116
44,892,542 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,703,740 ready_for_fw is high
3,704,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,283,951 >>> mbox cmd response: success
18,534,004 UART:
18,534,405 UART: Running Caliptra FMC ...
18,535,523 UART:
18,535,671 UART: [state] CFI Enabled
18,543,571 UART: [fht] FMC Alias Private Key: 7
20,299,830 UART: [art] Extend RT PCRs Done
20,301,048 UART: [art] Lock RT PCRs Done
20,302,592 UART: [art] Populate DV Done
20,307,826 UART: [fht] FMC Alias Private Key: 7
20,309,465 UART: [art] Derive CDI
20,310,274 UART: [art] Store in in slot 0x4
20,352,973 UART: [art] Derive Key Pair
20,353,964 UART: [art] Store priv key in slot 0x5
22,780,858 UART: [art] Derive Key Pair - Done
22,793,960 UART: [art] Signing Cert with AUTHO
22,795,252 UART: RITY.KEYID = 7
24,500,796 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,301 UART: [art] PUB.X = 16D61E83A2CF47C59F895142ACF16B3146D46B2AB4F8227C885E6C48BB0E997FF5E858B5E7C3CC6FD8A3F36DCCF7D217
24,509,594 UART: [art] PUB.Y = D4662D433ECE9EA86E8B712B8F7F99EB83CC0BA145E373DE5DDD8D386AA99DC603185D772DAAA07A79EC91EC60BA00D5
24,516,806 UART: [art] SIG.R = C2BF761173EA98BE92855F76D43BFEAD2F4073EB9CB5E13CD295582188DAE957B8A14B6F2585BA5B888B0E252BB6D940
24,524,277 UART: [art] SIG.S = D9A76986E86085986D4A62803F5F57A058743E39D5DFF21ECE3016E5E553E622CCD5D2AE6F80ECE859C42693469F1B64
25,503,383 UART: Caliptra RT
25,504,068 UART: [state] CFI Enabled
25,621,831 UART: [rt] RT listening for mailbox commands...
25,624,194 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,780,035 UART: [rt]cmd =0x41544d4e, len=14344
29,710,468 >>> mbox cmd response data (8 bytes)
29,711,035 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,741,790 UART: [rt]cmd =0x41545348, len=116
29,743,750 >>> mbox cmd response data (12 bytes)
31,798,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,844,587 >>> mbox cmd response: success
38,845,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,879,263 UART:
38,879,550 UART: Running Caliptra FMC ...
38,880,574 UART:
38,880,714 UART: [state] CFI Enabled
38,924,582 UART: [art] Extend RT PCRs Done
38,925,769 UART: [art] Lock RT PCRs Done
38,927,243 UART: [art] Populate DV Done
38,932,428 UART: [fht] FMC Alias Private Key: 7
38,933,960 UART: [art] Derive CDI
38,934,685 UART: [art] Store in in slot 0x4
38,977,269 UART: [art] Derive Key Pair
38,978,261 UART: [art] Store priv key in slot 0x5
41,405,072 UART: [art] Derive Key Pair - Done
41,418,143 UART: [art] Signing Cert with AUTHO
41,419,441 UART: RITY.KEYID = 7
43,125,018 UART: [art] Erasing AUTHORITY.KEYID = 7
43,126,523 UART: [art] PUB.X = D98ADA2F01A8733531317EC4730DAA8D2C76FE879FF22FB941B747E2C06D193E360AA707B348A48BB735175D745C759D
43,133,764 UART: [art] PUB.Y = 9FDC8A3AFA81FE931FD64978773397BA65BAC06ADF5C4B513E14F5E3BE01A51DAB0B300E3067F1C64B2C67693BE5BB79
43,141,051 UART: [art] SIG.R = 41E97E0508E05648850048C89D6F06EDD1942F0DC467FE7CCE5B82C667AF02131A03D08D034DE5A476331E2D9DC43BCD
43,148,436 UART: [art] SIG.S = 4D91F397F30771D858EB928E39A6FAEA98929A5825BF87753CCAF1C5BD947B49878C9C2AE54B4312F67F32A0570D51FD
44,127,301 UART: Caliptra RT
44,127,995 UART: [state] CFI Enabled
44,415,893 UART: [rt] RT listening for mailbox commands...
44,447,820 UART: [rt]cmd =0x41545348, len=116
44,450,092 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,435,840 ready_for_fw is high
3,436,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,727,621 >>> mbox cmd response: success
19,021,431 UART:
19,021,846 UART: Running Caliptra FMC ...
19,022,946 UART:
19,023,101 UART: [state] CFI Enabled
19,093,080 UART: [fht] FMC Alias Private Key: 7
20,857,506 UART: [art] Extend RT PCRs Done
20,858,731 UART: [art] Lock RT PCRs Done
20,860,329 UART: [art] Populate DV Done
20,865,695 UART: [fht] FMC Alias Private Key: 7
20,867,438 UART: [art] Derive CDI
20,868,224 UART: [art] Store in in slot 0x4
20,925,394 UART: [art] Derive Key Pair
20,926,404 UART: [art] Store priv key in slot 0x5
23,389,164 UART: [art] Derive Key Pair - Done
23,402,054 UART: [art] Signing Cert with AUTHO
23,403,359 UART: RITY.KEYID = 7
25,114,849 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,358 UART: [art] PUB.X = 4CA7B63567F01D8B0A34DFAD2F410EEF6B485151376418A28EC4A76E0399220D3AC25B055D1B7D8B491845B9EBBB7128
25,123,601 UART: [art] PUB.Y = 6D47D728DF5EA10C368D3EC322F41C9A10C3BEF9BB89B9B02D09AED5D23CF024D6A5905E28543B593DC09BDFE9FE70CB
25,130,920 UART: [art] SIG.R = C3C3FB7DE855CE7DE497F5333072635F6334D8FE8A7E6A035F09C3B4AA91D4FC9F86A5C56AF25A9670849E1CD75C80FC
25,138,309 UART: [art] SIG.S = B879D693B5C170BCB961F1321EF68A3DC03205D6F24A5ECB336B490BD6F6906E0078D96EDD3F344ADCCF32BE5D8C0901
26,116,827 UART: Caliptra RT
26,117,543 UART: [state] CFI Enabled
26,297,435 UART: [rt] RT listening for mailbox commands...
26,299,813 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,455,792 UART: [rt]cmd =0x41544d4e, len=14344
30,385,992 >>> mbox cmd response data (8 bytes)
30,386,564 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,417,453 UART: [rt]cmd =0x41545348, len=116
30,419,764 >>> mbox cmd response data (12 bytes)
32,473,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,286,782 >>> mbox cmd response: success
40,287,413 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,321,623 UART:
40,321,948 UART: Running Caliptra FMC ...
40,322,984 UART:
40,323,135 UART: [state] CFI Enabled
40,429,101 UART: [art] Extend RT PCRs Done
40,430,316 UART: [art] Lock RT PCRs Done
40,431,761 UART: [art] Populate DV Done
40,437,280 UART: [fht] FMC Alias Private Key: 7
40,438,875 UART: [art] Derive CDI
40,439,619 UART: [art] Store in in slot 0x4
40,498,521 UART: [art] Derive Key Pair
40,499,562 UART: [art] Store priv key in slot 0x5
42,962,536 UART: [art] Derive Key Pair - Done
42,975,800 UART: [art] Signing Cert with AUTHO
42,977,101 UART: RITY.KEYID = 7
44,688,405 UART: [art] Erasing AUTHORITY.KEYID = 7
44,689,895 UART: [art] PUB.X = 0F9692C3CE2E96F69DBCA882A8CC22185D4D65A855FD237111008DF4E6080AD7936B4515A3BCE672D4B35CB1084A1F74
44,697,193 UART: [art] PUB.Y = B7D6EE4C936DF7DDD2709F7F3C7D87BAE8DF53FFCC69F617470305218A46925E99E63C8CC03CBE68337EC277687C173B
44,704,471 UART: [art] SIG.R = 6AE44E6E2DB69610AE77EC806A0EDFF239810F9516ED94D77E79EF43F088FF596B20C74EB6BE8B7C2AC9D7D7C3CAC7A1
44,711,903 UART: [art] SIG.S = 1825058BBCCA1F6DF1D32B9856E101CFE71C8A3E76FDE5C3CC6CA0C2C405FC2496137256FCA524277D286005B83CEA24
45,691,090 UART: Caliptra RT
45,691,811 UART: [state] CFI Enabled
46,019,630 UART: [rt] RT listening for mailbox commands...
46,051,760 UART: [rt]cmd =0x41545348, len=116
46,054,273 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
3,756,696 ready_for_fw is high
3,757,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,724 >>> mbox cmd response: success
19,219,090 UART:
19,219,484 UART: Running Caliptra FMC ...
19,220,670 UART:
19,220,839 UART: [state] CFI Enabled
19,228,767 UART: [fht] FMC Alias Private Key: 7
20,985,674 UART: [art] Extend RT PCRs Done
20,986,888 UART: [art] Lock RT PCRs Done
20,988,456 UART: [art] Populate DV Done
20,993,644 UART: [fht] FMC Alias Private Key: 7
20,995,298 UART: [art] Derive CDI
20,996,133 UART: [art] Store in in slot 0x4
21,038,354 UART: [art] Derive Key Pair
21,039,395 UART: [art] Store priv key in slot 0x5
23,465,997 UART: [art] Derive Key Pair - Done
23,478,834 UART: [art] Signing Cert with AUTHO
23,480,129 UART: RITY.KEYID = 7
25,185,662 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,171 UART: [art] PUB.X = 485DA981E74D125A80D0D9F0D4A111E61F7669553AB2676256BA7FB439FECDDD2555B82845772D761DF47D8009938208
25,194,400 UART: [art] PUB.Y = DC1BB8CB6EBDFA25C97B43827C432A1F3195A281D8D289120496E03C9FEBABE960DA21624C4D99240ED7CD3FA52B4B7B
25,201,702 UART: [art] SIG.R = 39277F52ADF2AA96AB5B53B34FE8F10BA6BD92E599EC616EE89FABA0AA075C8ABFD7A02867F6CE6E860710B59FAEE7D8
25,209,122 UART: [art] SIG.S = 0CB177ADBBE609F5277BE1E5CE505B4970EBBA555FFF57AAA28026D722A4E715872C7DD9ECB6B812AF6A610D0F3DA50A
26,188,107 UART: Caliptra RT
26,188,811 UART: [state] CFI Enabled
26,305,943 UART: [rt] RT listening for mailbox commands...
26,308,345 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,463,833 UART: [rt]cmd =0x41544d4e, len=14344
30,394,602 >>> mbox cmd response data (8 bytes)
30,395,162 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,426,044 UART: [rt]cmd =0x41545348, len=116
30,428,033 >>> mbox cmd response data (12 bytes)
32,493,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,224,681 >>> mbox cmd response: success
40,225,513 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,257,835 UART:
40,258,139 UART: Running Caliptra FMC ...
40,259,255 UART:
40,259,408 UART: [state] CFI Enabled
40,303,718 UART: [art] Extend RT PCRs Done
40,304,904 UART: [art] Lock RT PCRs Done
40,306,519 UART: [art] Populate DV Done
40,311,706 UART: [fht] FMC Alias Private Key: 7
40,313,343 UART: [art] Derive CDI
40,314,149 UART: [art] Store in in slot 0x4
40,357,167 UART: [art] Derive Key Pair
40,358,152 UART: [art] Store priv key in slot 0x5
42,785,087 UART: [art] Derive Key Pair - Done
42,798,201 UART: [art] Signing Cert with AUTHO
42,799,500 UART: RITY.KEYID = 7
44,505,076 UART: [art] Erasing AUTHORITY.KEYID = 7
44,506,590 UART: [art] PUB.X = E0D161939E01BECED6E6D3494DADDE95079478D565AF7585C571202AEAFF18E0EFC78FA69FCF6B425BC9B16415437DEB
44,513,889 UART: [art] PUB.Y = 5526D6B52CD66A4667505F2CE23BEBEEAEDE7829B7A71AAEB3A981414BECDACE41E18E00D97D807AD6CAF9CFE1982793
44,521,116 UART: [art] SIG.R = DA061402436B67169EE059DCC6F22BC0EE7A68918FC632F82A3780BE0A58210844F4C45F56D3DC5C64E274F2AB42A303
44,528,505 UART: [art] SIG.S = BD45538CD2CB8CEC88508A5117925C84EBDFA0EE2C526A2BFB1DD7E2B301B6521E98D60DE2E307EEA778D0CF2DC12FEB
45,507,087 UART: Caliptra RT
45,507,801 UART: [state] CFI Enabled
45,798,336 UART: [rt] RT listening for mailbox commands...
45,830,354 UART: [rt]cmd =0x41545348, len=116
45,832,350 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
890,141 UART: [kat] SHA2-256
892,079 UART: [kat] SHA2-384
894,756 UART: [kat] SHA2-512-ACC
896,657 UART: [kat] ECC-384
902,122 UART: [kat] HMAC-384Kdf
906,498 UART: [kat] LMS
1,474,694 UART: [kat] --
1,475,689 UART: [cold-reset] ++
1,476,043 UART: [fht] Storing FHT @ 0x50003400
1,478,670 UART: [idev] ++
1,478,838 UART: [idev] CDI.KEYID = 6
1,479,198 UART: [idev] SUBJECT.KEYID = 7
1,479,622 UART: [idev] UDS.KEYID = 0
1,479,967 ready_for_fw is high
1,479,967 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,668 UART: [idev] Erasing UDS.KEYID = 0
1,504,176 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,728 UART: [idev] --
1,513,673 UART: [ldev] ++
1,513,841 UART: [ldev] CDI.KEYID = 6
1,514,204 UART: [ldev] SUBJECT.KEYID = 5
1,514,630 UART: [ldev] AUTHORITY.KEYID = 7
1,515,093 UART: [ldev] FE.KEYID = 1
1,520,233 UART: [ldev] Erasing FE.KEYID = 1
1,545,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,280 UART: [ldev] --
1,584,675 UART: [fwproc] Waiting for Commands...
1,585,378 UART: [fwproc] Received command 0x46574c44
1,586,169 UART: [fwproc] Received Image of size 114448 bytes
2,885,250 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,697 >>> mbox cmd response: success
3,078,781 UART: [afmc] ++
3,078,949 UART: [afmc] CDI.KEYID = 6
3,079,311 UART: [afmc] SUBJECT.KEYID = 7
3,079,736 UART: [afmc] AUTHORITY.KEYID = 5
3,114,745 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,577 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,190 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,880 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,673 UART: [afmc] --
3,157,641 UART: [cold-reset] --
3,158,367 UART: [state] Locking Datavault
3,159,382 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,986 UART: [state] Locking ICCM
3,160,492 UART: [exit] Launching FMC @ 0x40000130
3,165,821 UART:
3,165,837 UART: Running Caliptra FMC ...
3,166,245 UART:
3,166,299 UART: [state] CFI Enabled
3,176,900 UART: [fht] FMC Alias Private Key: 7
3,284,957 UART: [art] Extend RT PCRs Done
3,285,385 UART: [art] Lock RT PCRs Done
3,286,889 UART: [art] Populate DV Done
3,295,208 UART: [fht] FMC Alias Private Key: 7
3,296,298 UART: [art] Derive CDI
3,296,578 UART: [art] Store in in slot 0x4
3,382,309 UART: [art] Derive Key Pair
3,382,669 UART: [art] Store priv key in slot 0x5
3,395,495 UART: [art] Derive Key Pair - Done
3,410,226 UART: [art] Signing Cert with AUTHO
3,410,706 UART: RITY.KEYID = 7
3,425,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,707 UART: [art] PUB.X = 815E492459FCCB10E5DD14F0A146D0DAD3FADB9E777DB5933930B48362371A5187EA65AB5402D8D7E7B86D36082ADCB7
3,433,481 UART: [art] PUB.Y = FD0D6FDE235BDDC6E24D5E65C68C717A419216E488D77A3C595A0F3F9486717EC2B98843F4BAA588728938A6311BE576
3,440,429 UART: [art] SIG.R = C74EE4912655443E7A2F83DFD9F524631458DB7030D13831557F761FE381D0989A4B3697D9BE8A0B5FFE6538EC594BED
3,447,198 UART: [art] SIG.S = BED6A09E56C083D476F03DD36733E7FB0433BCCC3261FF81ED122B9B20F8D663086CB6144D722AD3C34E1CEF8DFB4D85
3,471,575 UART: Caliptra RT
3,471,828 UART: [state] CFI Enabled
3,579,586 UART: [rt] RT listening for mailbox commands...
3,580,256 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,214 UART: [rt]cmd =0x41544d4e, len=14344
3,848,912 >>> mbox cmd response data (8 bytes)
3,848,913 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,040 UART: [rt]cmd =0x41545348, len=116
3,881,084 >>> mbox cmd response data (12 bytes)
3,881,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,727 UART:
3,881,743 UART: Running Caliptra ROM ...
3,882,151 UART:
3,882,205 UART: [state] CFI Enabled
3,885,113 UART: [state] LifecycleState = Unprovisioned
3,885,768 UART: [state] DebugLocked = No
3,886,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,887,943 UART: [kat] SHA2-256
4,681,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,685,989 UART: [kat] ++
4,686,141 UART: [kat] sha1
4,690,553 UART: [kat] SHA2-256
4,692,491 UART: [kat] SHA2-384
4,695,060 UART: [kat] SHA2-512-ACC
4,696,960 UART: [kat] ECC-384
4,702,687 UART: [kat] HMAC-384Kdf
4,707,341 UART: [kat] LMS
5,275,537 UART: [kat] --
5,276,692 UART: [update-reset] ++
6,613,231 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,614,515 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,764,565 >>> mbox cmd response: success
6,764,565 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,764,826 UART: [update-reset] Copying MAN_2 To MAN_1
6,772,840 UART: [update-reset Success] --
6,773,671 UART: [state] Locking Datavault
6,774,443 UART: [state] Locking PCR0, PCR1 and PCR31
6,775,047 UART: [state] Locking ICCM
6,775,599 UART: [exit] Launching FMC @ 0x40000130
6,780,928 UART:
6,780,944 UART: Running Caliptra FMC ...
6,781,352 UART:
6,781,406 UART: [state] CFI Enabled
6,870,613 UART: [art] Extend RT PCRs Done
6,871,041 UART: [art] Lock RT PCRs Done
6,872,298 UART: [art] Populate DV Done
6,880,695 UART: [fht] FMC Alias Private Key: 7
6,881,727 UART: [art] Derive CDI
6,882,007 UART: [art] Store in in slot 0x4
6,967,770 UART: [art] Derive Key Pair
6,968,130 UART: [art] Store priv key in slot 0x5
6,981,714 UART: [art] Derive Key Pair - Done
6,996,568 UART: [art] Signing Cert with AUTHO
6,997,048 UART: RITY.KEYID = 7
7,012,328 UART: [art] Erasing AUTHORITY.KEYID = 7
7,013,093 UART: [art] PUB.X = 337255D96A1A6F48665D2A1058703AB9D5F2295E92DB2B49B57103D01A16271F13F68CF5C1252642E6256EA2F98C75E4
7,019,854 UART: [art] PUB.Y = 8B9775AB29664449BD173708132BBD4A8F17B0ECD8EC4D95EF55280E0ED5559549B567B1BF5CF9453E4F754E55C57A61
7,026,799 UART: [art] SIG.R = D416D46DFA95FA34929EA62FE6ECE7C4D6BACC6FBD12048227A2009927BCD55737F7FE0EE44DF80EF2624CF0F0B4E23A
7,033,560 UART: [art] SIG.S = 8D1FAABAAAA60D3E962DA32F9CDE6280FFE67F0AFC43157C57146C3A0E3E81D08AF1EC2E8AB6E07508DD6360822456B7
7,057,465 UART: Caliptra RT
7,057,718 UART: [state] CFI Enabled
7,341,060 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,372,009 UART: [rt]cmd =0x41545348, len=116
7,373,887 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,817 ready_for_fw is high
1,363,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,125 >>> mbox cmd response: success
2,993,797 UART:
2,993,813 UART: Running Caliptra FMC ...
2,994,221 UART:
2,994,275 UART: [state] CFI Enabled
3,004,892 UART: [fht] FMC Alias Private Key: 7
3,112,479 UART: [art] Extend RT PCRs Done
3,112,907 UART: [art] Lock RT PCRs Done
3,114,143 UART: [art] Populate DV Done
3,122,640 UART: [fht] FMC Alias Private Key: 7
3,123,700 UART: [art] Derive CDI
3,123,980 UART: [art] Store in in slot 0x4
3,209,637 UART: [art] Derive Key Pair
3,209,997 UART: [art] Store priv key in slot 0x5
3,223,477 UART: [art] Derive Key Pair - Done
3,238,584 UART: [art] Signing Cert with AUTHO
3,239,064 UART: RITY.KEYID = 7
3,254,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,145 UART: [art] PUB.X = AFF9366DE93D7D10E3A30DCE260FA076F6D7732EBFA74E1ED8570B953ADEC1E460004FE41671750AC434A1CC376E91F9
3,261,895 UART: [art] PUB.Y = A38BE9FE5320C4E43674F13FF0BA206F6ADC53859245615685C9DA5542E0F9C572E2A781E8672A8A36539A8FA3105BAB
3,268,849 UART: [art] SIG.R = 12581FB3AB2EC051AB100F3D2734C7EA531C5B2C0013C65EE39EE5539FB6E0BBBE2F774BBE0AC0FEEFCB9BB7D74CF042
3,275,619 UART: [art] SIG.S = 3E4E383320091676C523A7838FF2BFEE316B59C2CEE805A4A4DACC8F6753A9724AFFF4C9CA8B3877E2BE12A9C8ECB674
3,299,186 UART: Caliptra RT
3,299,439 UART: [state] CFI Enabled
3,407,937 UART: [rt] RT listening for mailbox commands...
3,408,607 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,709 UART: [rt]cmd =0x41544d4e, len=14344
3,676,811 >>> mbox cmd response data (8 bytes)
3,676,812 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,981 UART: [rt]cmd =0x41545348, len=116
3,708,859 >>> mbox cmd response data (12 bytes)
3,708,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,471,620 >>> mbox cmd response: success
6,471,620 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,485,075 UART:
6,485,091 UART: Running Caliptra FMC ...
6,485,499 UART:
6,485,553 UART: [state] CFI Enabled
6,574,374 UART: [art] Extend RT PCRs Done
6,574,802 UART: [art] Lock RT PCRs Done
6,576,181 UART: [art] Populate DV Done
6,584,590 UART: [fht] FMC Alias Private Key: 7
6,585,752 UART: [art] Derive CDI
6,586,032 UART: [art] Store in in slot 0x4
6,672,025 UART: [art] Derive Key Pair
6,672,385 UART: [art] Store priv key in slot 0x5
6,685,551 UART: [art] Derive Key Pair - Done
6,700,321 UART: [art] Signing Cert with AUTHO
6,700,801 UART: RITY.KEYID = 7
6,715,629 UART: [art] Erasing AUTHORITY.KEYID = 7
6,716,394 UART: [art] PUB.X = F675073A58C5E2AD29AE9A0255E7461F81333EB9C550EB77CE29DFBB2A7A461EA199D728C9755EC1D050E18514EDDA95
6,723,168 UART: [art] PUB.Y = 51DE40FA2FA6D51DE83F2D1947DC1FDD7B614591D72DE19973F86412F80CEB99AE78A6B521BA129EB106F120155F24F0
6,730,122 UART: [art] SIG.R = 8CA57FDDDD73877D69D2B9223DFA45DB3A0BB5325B7A63039113E025FE529EBFE859A2E543FCF93E4F3F5618BA8B0AC5
6,736,901 UART: [art] SIG.S = F3628EEB2B16C15E0344513176C5055065B35CBAB3C92D69D37A7141A6417D6C2EA9198F47765AAAF6A545EED35D76FD
6,761,052 UART: Caliptra RT
6,761,305 UART: [state] CFI Enabled
7,044,399 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,075,242 UART: [rt]cmd =0x41545348, len=116
7,076,914 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,548 UART: [kat] SHA2-256
882,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,594 UART: [kat] ++
886,746 UART: [kat] sha1
890,988 UART: [kat] SHA2-256
892,926 UART: [kat] SHA2-384
895,601 UART: [kat] SHA2-512-ACC
897,502 UART: [kat] ECC-384
903,201 UART: [kat] HMAC-384Kdf
907,915 UART: [kat] LMS
1,476,111 UART: [kat] --
1,476,906 UART: [cold-reset] ++
1,477,294 UART: [fht] Storing FHT @ 0x50003400
1,479,943 UART: [idev] ++
1,480,111 UART: [idev] CDI.KEYID = 6
1,480,471 UART: [idev] SUBJECT.KEYID = 7
1,480,895 UART: [idev] UDS.KEYID = 0
1,481,240 ready_for_fw is high
1,481,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,819 UART: [idev] Erasing UDS.KEYID = 0
1,505,431 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,963 UART: [idev] --
1,514,874 UART: [ldev] ++
1,515,042 UART: [ldev] CDI.KEYID = 6
1,515,405 UART: [ldev] SUBJECT.KEYID = 5
1,515,831 UART: [ldev] AUTHORITY.KEYID = 7
1,516,294 UART: [ldev] FE.KEYID = 1
1,521,622 UART: [ldev] Erasing FE.KEYID = 1
1,546,951 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,645 UART: [ldev] --
1,585,926 UART: [fwproc] Waiting for Commands...
1,586,547 UART: [fwproc] Received command 0x46574c44
1,587,338 UART: [fwproc] Received Image of size 114448 bytes
2,886,817 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,583 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,935 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,986 >>> mbox cmd response: success
3,080,198 UART: [afmc] ++
3,080,366 UART: [afmc] CDI.KEYID = 6
3,080,728 UART: [afmc] SUBJECT.KEYID = 7
3,081,153 UART: [afmc] AUTHORITY.KEYID = 5
3,115,956 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,274 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,054 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,782 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,667 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,357 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,288 UART: [afmc] --
3,159,262 UART: [cold-reset] --
3,159,976 UART: [state] Locking Datavault
3,161,229 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,833 UART: [state] Locking ICCM
3,162,349 UART: [exit] Launching FMC @ 0x40000130
3,167,678 UART:
3,167,694 UART: Running Caliptra FMC ...
3,168,102 UART:
3,168,245 UART: [state] CFI Enabled
3,179,102 UART: [fht] FMC Alias Private Key: 7
3,287,101 UART: [art] Extend RT PCRs Done
3,287,529 UART: [art] Lock RT PCRs Done
3,289,091 UART: [art] Populate DV Done
3,297,476 UART: [fht] FMC Alias Private Key: 7
3,298,636 UART: [art] Derive CDI
3,298,916 UART: [art] Store in in slot 0x4
3,384,675 UART: [art] Derive Key Pair
3,385,035 UART: [art] Store priv key in slot 0x5
3,398,535 UART: [art] Derive Key Pair - Done
3,413,105 UART: [art] Signing Cert with AUTHO
3,413,585 UART: RITY.KEYID = 7
3,428,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,622 UART: [art] PUB.X = 41663BB0B48E80A7B9682C6AC616E6A7D1547818B9F1EBDA7800D071B3A3FE8ECDBEEB74975B088D651C9435E3A29C82
3,436,377 UART: [art] PUB.Y = 300B6525599438BBDEF28CFE15105B726C28B4482C355F1B011A9BD072427A0BD80C0F9D7A0872B15255F59DE394D394
3,443,307 UART: [art] SIG.R = E15F128E2121C292FA5D3D9F742EA3A8301AA7A01EFF9565D6D58AC138B0EC71D440C14DF296705E79A7F67806A7075B
3,450,077 UART: [art] SIG.S = 7EE331EAA5ABAE6F4CE50CA7A7AD1C9BE8FC062B1C883DB3AD63BA37801090FD23B07B918C866DDDD5B0D3B39A617818
3,474,050 UART: Caliptra RT
3,474,395 UART: [state] CFI Enabled
3,582,892 UART: [rt] RT listening for mailbox commands...
3,583,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,402 UART: [rt]cmd =0x41544d4e, len=14344
3,851,104 >>> mbox cmd response data (8 bytes)
3,851,105 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,230 UART: [rt]cmd =0x41545348, len=116
3,883,126 >>> mbox cmd response data (12 bytes)
3,883,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,901 UART:
3,883,917 UART: Running Caliptra ROM ...
3,884,325 UART:
3,884,466 UART: [state] CFI Enabled
3,887,800 UART: [state] LifecycleState = Unprovisioned
3,888,455 UART: [state] DebugLocked = No
3,889,065 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,890,742 UART: [kat] SHA2-256
4,684,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,688,788 UART: [kat] ++
4,688,940 UART: [kat] sha1
4,693,336 UART: [kat] SHA2-256
4,695,274 UART: [kat] SHA2-384
4,698,095 UART: [kat] SHA2-512-ACC
4,699,995 UART: [kat] ECC-384
4,705,612 UART: [kat] HMAC-384Kdf
4,710,324 UART: [kat] LMS
5,278,520 UART: [kat] --
5,279,479 UART: [update-reset] ++
6,615,452 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,616,504 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,766,554 >>> mbox cmd response: success
6,766,554 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,766,767 UART: [update-reset] Copying MAN_2 To MAN_1
6,774,781 UART: [update-reset Success] --
6,775,840 UART: [state] Locking Datavault
6,776,452 UART: [state] Locking PCR0, PCR1 and PCR31
6,777,056 UART: [state] Locking ICCM
6,777,658 UART: [exit] Launching FMC @ 0x40000130
6,782,987 UART:
6,783,003 UART: Running Caliptra FMC ...
6,783,411 UART:
6,783,554 UART: [state] CFI Enabled
6,872,533 UART: [art] Extend RT PCRs Done
6,872,961 UART: [art] Lock RT PCRs Done
6,874,334 UART: [art] Populate DV Done
6,882,889 UART: [fht] FMC Alias Private Key: 7
6,884,033 UART: [art] Derive CDI
6,884,313 UART: [art] Store in in slot 0x4
6,970,082 UART: [art] Derive Key Pair
6,970,442 UART: [art] Store priv key in slot 0x5
6,983,706 UART: [art] Derive Key Pair - Done
6,998,697 UART: [art] Signing Cert with AUTHO
6,999,177 UART: RITY.KEYID = 7
7,014,395 UART: [art] Erasing AUTHORITY.KEYID = 7
7,015,160 UART: [art] PUB.X = 27F2D89AAC86A4582488A1F1F0D03DC2646E923AC1D979744153954F9DAA6C71437174B247BFE54DA5802475721E920C
7,021,923 UART: [art] PUB.Y = 5B2C541A49AC95BCB952914B8CDFAAFBAEDDFAA6BFB29304D265FB94856C876015BA06D684B26993C5A2414046CEDD27
7,028,885 UART: [art] SIG.R = 138882473FD2C0187256FAF28F6E822BA678F0B9A810ECC9EEABCE5F8B0C1F42C50634A0053D394EBAEA42086934CDF2
7,035,655 UART: [art] SIG.S = A8942C240C8497532E090FE48BFAF31399F170C32E0C4CF434D490B3141EFB1206F7AB9F7B97136287613CAE0DF33521
7,060,176 UART: Caliptra RT
7,060,521 UART: [state] CFI Enabled
7,339,516 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,370,271 UART: [rt]cmd =0x41545348, len=116
7,371,995 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,724 ready_for_fw is high
1,362,724 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,948 >>> mbox cmd response: success
2,992,780 UART:
2,992,796 UART: Running Caliptra FMC ...
2,993,204 UART:
2,993,347 UART: [state] CFI Enabled
3,004,140 UART: [fht] FMC Alias Private Key: 7
3,112,581 UART: [art] Extend RT PCRs Done
3,113,009 UART: [art] Lock RT PCRs Done
3,114,623 UART: [art] Populate DV Done
3,123,060 UART: [fht] FMC Alias Private Key: 7
3,124,046 UART: [art] Derive CDI
3,124,326 UART: [art] Store in in slot 0x4
3,210,159 UART: [art] Derive Key Pair
3,210,519 UART: [art] Store priv key in slot 0x5
3,223,825 UART: [art] Derive Key Pair - Done
3,238,880 UART: [art] Signing Cert with AUTHO
3,239,360 UART: RITY.KEYID = 7
3,254,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,699 UART: [art] PUB.X = E8F4B0F48DEAC303A37DCD4F6DCEDEFBB6227AA098EC8333F41EC61AF3F0AE384264C493DC323B7B6013A6CBE4023B8A
3,262,489 UART: [art] PUB.Y = DC2BDB24166C60368984F30CFE0ED31ACAE2EB71D8C05E04980197AB8CA294623E6A7D884DAF7FEAC91A3ED26232B231
3,269,443 UART: [art] SIG.R = BE070650FF1EFA8C6A51AADFDCE765A7D571B19E2F6933D21BEC729C07F324B6C3814C352A228C773062A84361F3368B
3,276,212 UART: [art] SIG.S = A2124F93AC5C634E8E0F27CE47F791F206D2AAF9CC8973C69D1A95A8C485B81A27C2D3F2ADD30002E9DAC1CC59524506
3,300,437 UART: Caliptra RT
3,300,782 UART: [state] CFI Enabled
3,408,302 UART: [rt] RT listening for mailbox commands...
3,408,972 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,998 UART: [rt]cmd =0x41544d4e, len=14344
3,676,128 >>> mbox cmd response data (8 bytes)
3,676,129 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,250 UART: [rt]cmd =0x41545348, len=116
3,708,278 >>> mbox cmd response data (12 bytes)
3,708,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,473,610 >>> mbox cmd response: success
6,473,610 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,487,077 UART:
6,487,093 UART: Running Caliptra FMC ...
6,487,501 UART:
6,487,644 UART: [state] CFI Enabled
6,576,535 UART: [art] Extend RT PCRs Done
6,576,963 UART: [art] Lock RT PCRs Done
6,578,206 UART: [art] Populate DV Done
6,586,273 UART: [fht] FMC Alias Private Key: 7
6,587,419 UART: [art] Derive CDI
6,587,699 UART: [art] Store in in slot 0x4
6,673,282 UART: [art] Derive Key Pair
6,673,642 UART: [art] Store priv key in slot 0x5
6,686,836 UART: [art] Derive Key Pair - Done
6,701,964 UART: [art] Signing Cert with AUTHO
6,702,444 UART: RITY.KEYID = 7
6,717,608 UART: [art] Erasing AUTHORITY.KEYID = 7
6,718,373 UART: [art] PUB.X = 90F09C056A2291955D27D28C405CA2AB9F7BA4CA0FF937763BEEBE3BF935D1737B7C101CFE7C856A448D9EF055F02167
6,725,147 UART: [art] PUB.Y = 33EBC7D9DA6FBBE225C1CFD790CE9497CDD2903166D75953C718E55EC6E63BD154828373769374CD3402452A3021BC2D
6,732,098 UART: [art] SIG.R = FC39BEC7E9732266A71CB9AE2A5CD67C198C656C0DE1437B6A01BFBAC7C0DC30E227CA029CA0DB63879EEEDF95E15663
6,738,881 UART: [art] SIG.S = 19D8F45C2D19AD3C2B4F1259B86AB9B6A3A9A3B605D5D17CFC02AE84F4BC2C52ED4DAEAFAF0077B8E87A07D7215ECC12
6,762,799 UART: Caliptra RT
6,763,144 UART: [state] CFI Enabled
7,042,433 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,073,176 UART: [rt]cmd =0x41545348, len=116
7,075,324 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,799 UART: [kat] SHA2-256
903,739 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
918,412 UART: [kat] HMAC-384Kdf
922,988 UART: [kat] LMS
1,171,316 UART: [kat] --
1,172,051 UART: [cold-reset] ++
1,172,569 UART: [fht] FHT @ 0x50003400
1,175,296 UART: [idev] ++
1,175,464 UART: [idev] CDI.KEYID = 6
1,175,824 UART: [idev] SUBJECT.KEYID = 7
1,176,248 UART: [idev] UDS.KEYID = 0
1,176,593 ready_for_fw is high
1,176,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,306 UART: [idev] Erasing UDS.KEYID = 0
1,201,653 UART: [idev] Sha1 KeyId Algorithm
1,210,015 UART: [idev] --
1,211,079 UART: [ldev] ++
1,211,247 UART: [ldev] CDI.KEYID = 6
1,211,610 UART: [ldev] SUBJECT.KEYID = 5
1,212,036 UART: [ldev] AUTHORITY.KEYID = 7
1,212,499 UART: [ldev] FE.KEYID = 1
1,217,693 UART: [ldev] Erasing FE.KEYID = 1
1,243,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,612 UART: [fwproc] Wait for Commands...
1,283,228 UART: [fwproc] Recv command 0x46574c44
1,283,956 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,028 >>> mbox cmd response: success
2,777,110 UART: [afmc] ++
2,777,278 UART: [afmc] CDI.KEYID = 6
2,777,640 UART: [afmc] SUBJECT.KEYID = 7
2,778,065 UART: [afmc] AUTHORITY.KEYID = 5
2,813,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,921 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,534 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,253 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,129 UART: [afmc] --
2,857,015 UART: [cold-reset] --
2,857,755 UART: [state] Locking Datavault
2,858,870 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,474 UART: [state] Locking ICCM
2,860,082 UART: [exit] Launching FMC @ 0x40000130
2,865,411 UART:
2,865,427 UART: Running Caliptra FMC ...
2,865,835 UART:
2,865,889 UART: [state] CFI Enabled
2,876,652 UART: [fht] FMC Alias Private Key: 7
2,984,321 UART: [art] Extend RT PCRs Done
2,984,749 UART: [art] Lock RT PCRs Done
2,986,193 UART: [art] Populate DV Done
2,994,560 UART: [fht] FMC Alias Private Key: 7
2,995,576 UART: [art] Derive CDI
2,995,856 UART: [art] Store in in slot 0x4
3,081,579 UART: [art] Derive Key Pair
3,081,939 UART: [art] Store priv key in slot 0x5
3,094,447 UART: [art] Derive Key Pair - Done
3,109,145 UART: [art] Signing Cert with AUTHO
3,109,625 UART: RITY.KEYID = 7
3,124,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,370 UART: [art] PUB.X = 75B9972FA02C7FE4DC64C65FEE12E6E44FC93BE8D9B607181475194BE872AF0A732C95783638232853E421FC0A8F4F10
3,132,133 UART: [art] PUB.Y = 85855FD3C282197AB7FD54BD506457AAF9F0D7479F44A3EF69AC4E469826B25DDF6C56E7B03AB517CFA5EECD36FF25E7
3,139,101 UART: [art] SIG.R = 4C585807CB64D5DBD1D327A1681201852FB2DF11459818215C9CC481B5639FC83C0FD4D9854FF66325AFCF274A4BC7ED
3,145,868 UART: [art] SIG.S = 908C5A4A7DB5F353D2DB5613F9FB6D9DEEDDAA772B9A73E5174F38F8A2C85AA5BC88C254B49A9DBB59D48B24D67B3543
3,169,709 UART: Caliptra RT
3,169,962 UART: [state] CFI Enabled
3,278,169 UART: [rt] RT listening for mailbox commands...
3,278,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,085 UART: [rt]cmd =0x41544d4e, len=14344
3,546,883 >>> mbox cmd response data (8 bytes)
3,546,884 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,951 UART: [rt]cmd =0x41545348, len=116
3,578,681 >>> mbox cmd response data (12 bytes)
3,578,682 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,449 UART:
3,579,465 UART: Running Caliptra ROM ...
3,579,873 UART:
3,579,928 UART: [state] CFI Enabled
3,582,376 UART: [state] LifecycleState = Unprovisioned
3,583,031 UART: [state] DebugLocked = No
3,583,645 UART: [state] WD Timer not started. Device not locked for debugging
3,584,939 UART: [kat] SHA2-256
4,390,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,394,714 UART: [kat] ++
4,394,866 UART: [kat] sha1
4,398,938 UART: [kat] SHA2-256
4,400,878 UART: [kat] SHA2-384
4,403,691 UART: [kat] SHA2-512-ACC
4,405,591 UART: [kat] ECC-384
4,415,352 UART: [kat] HMAC-384Kdf
4,419,910 UART: [kat] LMS
4,668,238 UART: [kat] --
4,669,270 UART: [update-reset] ++
5,982,569 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,983,716 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,133,714 >>> mbox cmd response: success
6,133,714 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,133,871 UART: [update-reset] Copying MAN_2 To MAN_1
6,141,885 UART: [update-reset Success] --
6,142,930 UART: [state] Locking Datavault
6,143,824 UART: [state] Locking PCR0, PCR1 and PCR31
6,144,428 UART: [state] Locking ICCM
6,144,918 UART: [exit] Launching FMC @ 0x40000130
6,150,247 UART:
6,150,263 UART: Running Caliptra FMC ...
6,150,671 UART:
6,150,725 UART: [state] CFI Enabled
6,240,014 UART: [art] Extend RT PCRs Done
6,240,442 UART: [art] Lock RT PCRs Done
6,241,761 UART: [art] Populate DV Done
6,249,738 UART: [fht] FMC Alias Private Key: 7
6,250,902 UART: [art] Derive CDI
6,251,182 UART: [art] Store in in slot 0x4
6,336,581 UART: [art] Derive Key Pair
6,336,941 UART: [art] Store priv key in slot 0x5
6,349,903 UART: [art] Derive Key Pair - Done
6,364,590 UART: [art] Signing Cert with AUTHO
6,365,070 UART: RITY.KEYID = 7
6,380,672 UART: [art] Erasing AUTHORITY.KEYID = 7
6,381,437 UART: [art] PUB.X = 930FC6A9F81F99D7EA85410F04601BC90F8EF3B6EEEE9975898789B9F82AC95A23BE7048C959BB688BA8A3592E3EE71F
6,388,205 UART: [art] PUB.Y = A407C6ABEC8C4511F734B2EF4DEE3F263C87E8303B256BE71FBF7F841C4111E2A135C3E4F8E6416666772596B4693BEF
6,395,160 UART: [art] SIG.R = 74625E44D307F5600C18CF2DDB870DF2815067A7B9B19FDBF1F90001C65A030024FC3F068A22A59406919222C07FF3E1
6,401,863 UART: [art] SIG.S = 62D080568CAEE39DEF89672C2F20DEFEA272EA4040A6BFA5236F8C0C75BAD24C24C090993C79EF6903F5FB4BF7904E63
6,426,024 UART: Caliptra RT
6,426,277 UART: [state] CFI Enabled
6,711,708 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,742,739 UART: [rt]cmd =0x41545348, len=116
6,744,583 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,843 ready_for_fw is high
1,060,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,089 >>> mbox cmd response: success
2,690,537 UART:
2,690,553 UART: Running Caliptra FMC ...
2,690,961 UART:
2,691,015 UART: [state] CFI Enabled
2,701,464 UART: [fht] FMC Alias Private Key: 7
2,808,799 UART: [art] Extend RT PCRs Done
2,809,227 UART: [art] Lock RT PCRs Done
2,810,495 UART: [art] Populate DV Done
2,818,768 UART: [fht] FMC Alias Private Key: 7
2,819,836 UART: [art] Derive CDI
2,820,116 UART: [art] Store in in slot 0x4
2,905,471 UART: [art] Derive Key Pair
2,905,831 UART: [art] Store priv key in slot 0x5
2,919,027 UART: [art] Derive Key Pair - Done
2,933,842 UART: [art] Signing Cert with AUTHO
2,934,322 UART: RITY.KEYID = 7
2,949,286 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,051 UART: [art] PUB.X = 97A08F3BE392A89A717DF8D0557572F46021DB1FE2E9D44D2B3F62B290282FC8F98651298C31A4D258421A56F7945786
2,956,815 UART: [art] PUB.Y = B3932ABE44DFDB6E1CF669912E4A26F7CE6118229B576CD5C28021AECA688D3D2FAC080BFC20D47FEC4E8A409272470F
2,963,772 UART: [art] SIG.R = 872A1686EE215378C252D122928415F5DB190BB53FB4362B583AC960BE4C5BE66BB15DDD4880097EE2F6E60F65E85B96
2,970,535 UART: [art] SIG.S = 98C23E0878245C20C94D4831711CBCB16A80AB93CA262731C48B4515A8363ED4A66EDF14DBE4DB26DA7ABC4CA824416F
2,994,477 UART: Caliptra RT
2,994,730 UART: [state] CFI Enabled
3,101,436 UART: [rt] RT listening for mailbox commands...
3,102,106 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,158 UART: [rt]cmd =0x41544d4e, len=14344
3,370,106 >>> mbox cmd response data (8 bytes)
3,370,107 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,198 UART: [rt]cmd =0x41545348, len=116
3,402,212 >>> mbox cmd response data (12 bytes)
3,402,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,843,866 >>> mbox cmd response: success
5,843,866 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,857,100 UART:
5,857,116 UART: Running Caliptra FMC ...
5,857,524 UART:
5,857,578 UART: [state] CFI Enabled
5,946,673 UART: [art] Extend RT PCRs Done
5,947,101 UART: [art] Lock RT PCRs Done
5,948,362 UART: [art] Populate DV Done
5,956,473 UART: [fht] FMC Alias Private Key: 7
5,957,545 UART: [art] Derive CDI
5,957,825 UART: [art] Store in in slot 0x4
6,043,630 UART: [art] Derive Key Pair
6,043,990 UART: [art] Store priv key in slot 0x5
6,057,832 UART: [art] Derive Key Pair - Done
6,072,572 UART: [art] Signing Cert with AUTHO
6,073,052 UART: RITY.KEYID = 7
6,088,652 UART: [art] Erasing AUTHORITY.KEYID = 7
6,089,417 UART: [art] PUB.X = 56FBB91F682858F7E1980D88294E0CC7002517DC64079798EA805647A24FACE091CD404923BF1534844B6AD24FE15C02
6,096,149 UART: [art] PUB.Y = 325EDEE310AF36F1637147EFAF6371BAA4A89B651E786E3F014BFA041D23201A706C6C7651F9BB2BB744898D34422A4C
6,103,099 UART: [art] SIG.R = 3CBD181B306DAAFAA534AF7A49F29DDDC35F7FC4780B72508319E0C0FEDCF2812DFC02B1CEC042525A51BAB1AEE8F26F
6,109,891 UART: [art] SIG.S = 1173631E0C58116349CE81C33471034371D5BAC1AB21E9648415431AC575CD657C01E690190ED7EA0C8FA37CB1F1C0CD
6,133,321 UART: Caliptra RT
6,133,574 UART: [state] CFI Enabled
6,411,105 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,441,904 UART: [rt]cmd =0x41545348, len=116
6,443,868 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
901,982 UART: [kat] SHA2-256
903,922 UART: [kat] SHA2-384
906,627 UART: [kat] SHA2-512-ACC
908,528 UART: [kat] ECC-384
918,009 UART: [kat] HMAC-384Kdf
922,529 UART: [kat] LMS
1,170,857 UART: [kat] --
1,171,750 UART: [cold-reset] ++
1,172,102 UART: [fht] FHT @ 0x50003400
1,174,745 UART: [idev] ++
1,174,913 UART: [idev] CDI.KEYID = 6
1,175,273 UART: [idev] SUBJECT.KEYID = 7
1,175,697 UART: [idev] UDS.KEYID = 0
1,176,042 ready_for_fw is high
1,176,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,931 UART: [idev] Erasing UDS.KEYID = 0
1,200,934 UART: [idev] Sha1 KeyId Algorithm
1,209,264 UART: [idev] --
1,210,428 UART: [ldev] ++
1,210,596 UART: [ldev] CDI.KEYID = 6
1,210,959 UART: [ldev] SUBJECT.KEYID = 5
1,211,385 UART: [ldev] AUTHORITY.KEYID = 7
1,211,848 UART: [ldev] FE.KEYID = 1
1,217,378 UART: [ldev] Erasing FE.KEYID = 1
1,243,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,452 UART: [ldev] --
1,282,797 UART: [fwproc] Wait for Commands...
1,283,451 UART: [fwproc] Recv command 0x46574c44
1,284,179 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,794 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,143 >>> mbox cmd response: success
2,777,349 UART: [afmc] ++
2,777,517 UART: [afmc] CDI.KEYID = 6
2,777,879 UART: [afmc] SUBJECT.KEYID = 7
2,778,304 UART: [afmc] AUTHORITY.KEYID = 5
2,814,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,646 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,374 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,259 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,978 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,734 UART: [afmc] --
2,857,634 UART: [cold-reset] --
2,858,508 UART: [state] Locking Datavault
2,859,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,125 UART: [state] Locking ICCM
2,860,747 UART: [exit] Launching FMC @ 0x40000130
2,866,076 UART:
2,866,092 UART: Running Caliptra FMC ...
2,866,500 UART:
2,866,643 UART: [state] CFI Enabled
2,877,362 UART: [fht] FMC Alias Private Key: 7
2,985,717 UART: [art] Extend RT PCRs Done
2,986,145 UART: [art] Lock RT PCRs Done
2,987,869 UART: [art] Populate DV Done
2,995,920 UART: [fht] FMC Alias Private Key: 7
2,997,024 UART: [art] Derive CDI
2,997,304 UART: [art] Store in in slot 0x4
3,082,757 UART: [art] Derive Key Pair
3,083,117 UART: [art] Store priv key in slot 0x5
3,096,509 UART: [art] Derive Key Pair - Done
3,110,981 UART: [art] Signing Cert with AUTHO
3,111,461 UART: RITY.KEYID = 7
3,127,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,780 UART: [art] PUB.X = 77755CE1C5172F8AB3BEBA4E99997E953757826A1B85D790687442F94572F0F22E54ABC3A94400605DE956CB15B9B52D
3,134,526 UART: [art] PUB.Y = 160E949856EB03D8AF20E8D1000F7CCC746EBA7A975232A3A937AB9D9B53B2A3D6AED62E7ED27E1A3ABA41F35CFCCD4C
3,141,469 UART: [art] SIG.R = D64CD7DB55531DBB3AF4CF809D652FC78DAAA0CE2E8C81F183BB7F4D5CA5C2601BAA2A901C36D2105B8204CF4213C50D
3,148,255 UART: [art] SIG.S = C5D8103EF2D31FDC0DAA004DA637C4B8494BBC0A3948C5B30B72821EB2D200FF3A90C489222AF17F9E6888AC86D603CC
3,172,226 UART: Caliptra RT
3,172,571 UART: [state] CFI Enabled
3,279,939 UART: [rt] RT listening for mailbox commands...
3,280,609 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,457 UART: [rt]cmd =0x41544d4e, len=14344
3,548,095 >>> mbox cmd response data (8 bytes)
3,548,096 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,315 UART: [rt]cmd =0x41545348, len=116
3,579,973 >>> mbox cmd response data (12 bytes)
3,579,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,685 UART:
3,580,701 UART: Running Caliptra ROM ...
3,581,109 UART:
3,581,251 UART: [state] CFI Enabled
3,584,141 UART: [state] LifecycleState = Unprovisioned
3,584,796 UART: [state] DebugLocked = No
3,585,386 UART: [state] WD Timer not started. Device not locked for debugging
3,586,678 UART: [kat] SHA2-256
4,392,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,396,453 UART: [kat] ++
4,396,605 UART: [kat] sha1
4,400,931 UART: [kat] SHA2-256
4,402,871 UART: [kat] SHA2-384
4,405,564 UART: [kat] SHA2-512-ACC
4,407,464 UART: [kat] ECC-384
4,417,429 UART: [kat] HMAC-384Kdf
4,421,973 UART: [kat] LMS
4,670,301 UART: [kat] --
4,671,377 UART: [update-reset] ++
5,985,206 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,986,241 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,136,239 >>> mbox cmd response: success
6,136,239 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,136,472 UART: [update-reset] Copying MAN_2 To MAN_1
6,144,486 UART: [update-reset Success] --
6,145,659 UART: [state] Locking Datavault
6,146,565 UART: [state] Locking PCR0, PCR1 and PCR31
6,147,169 UART: [state] Locking ICCM
6,147,761 UART: [exit] Launching FMC @ 0x40000130
6,153,090 UART:
6,153,106 UART: Running Caliptra FMC ...
6,153,514 UART:
6,153,657 UART: [state] CFI Enabled
6,242,854 UART: [art] Extend RT PCRs Done
6,243,282 UART: [art] Lock RT PCRs Done
6,244,371 UART: [art] Populate DV Done
6,252,640 UART: [fht] FMC Alias Private Key: 7
6,253,674 UART: [art] Derive CDI
6,253,954 UART: [art] Store in in slot 0x4
6,339,829 UART: [art] Derive Key Pair
6,340,189 UART: [art] Store priv key in slot 0x5
6,353,215 UART: [art] Derive Key Pair - Done
6,368,212 UART: [art] Signing Cert with AUTHO
6,368,692 UART: RITY.KEYID = 7
6,384,200 UART: [art] Erasing AUTHORITY.KEYID = 7
6,384,965 UART: [art] PUB.X = 85A43DB1D046D10CCBBB634B77FD3CC850BA06969DF8DE95C476A76C51BD9E63A722E62926D42451D4B6A6A3E3ED8BD5
6,391,745 UART: [art] PUB.Y = AA3133DD7236B2C50CDAAC9181B69A232047FFBA0FD8631C03E385BBFB9E8C503EB03652EA273392B69D8F7EAF58C257
6,398,700 UART: [art] SIG.R = 6329FD71A4016D20E4B75A7B7DDC3249A3F68EB5149F30F38B41D5CF2B4EE6DBA29C661E7929F303D21FAE3E4D4C9486
6,405,476 UART: [art] SIG.S = 013A8B7647711EDD974A3FA63DEF75A40130C55FC4948385CFB95E0AAB843EEDDE43BA6D9CC2A5207C166B756A546ED1
6,429,262 UART: Caliptra RT
6,429,607 UART: [state] CFI Enabled
6,715,386 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,746,301 UART: [rt]cmd =0x41545348, len=116
6,748,117 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,582 ready_for_fw is high
1,061,582 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,090 >>> mbox cmd response: success
2,692,382 UART:
2,692,398 UART: Running Caliptra FMC ...
2,692,806 UART:
2,692,949 UART: [state] CFI Enabled
2,703,678 UART: [fht] FMC Alias Private Key: 7
2,811,571 UART: [art] Extend RT PCRs Done
2,811,999 UART: [art] Lock RT PCRs Done
2,813,553 UART: [art] Populate DV Done
2,821,820 UART: [fht] FMC Alias Private Key: 7
2,822,766 UART: [art] Derive CDI
2,823,046 UART: [art] Store in in slot 0x4
2,908,937 UART: [art] Derive Key Pair
2,909,297 UART: [art] Store priv key in slot 0x5
2,922,759 UART: [art] Derive Key Pair - Done
2,937,595 UART: [art] Signing Cert with AUTHO
2,938,075 UART: RITY.KEYID = 7
2,953,105 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,870 UART: [art] PUB.X = BD02A4CBCDD6EDAC69413CF6AFD1F01CFEB7134E8B1197C339717858CAE4C0041295A4C49F815F64D5648ACCA1D35404
2,960,647 UART: [art] PUB.Y = C91785F0359355D85D7B73ED43B81C9FBB831144452F87BF6BCCEE61650E6FADDA20162BCE573B620DBF94065C486FF4
2,967,598 UART: [art] SIG.R = 7F59BA206F9C05A30F099F5E3482F87BBFB53BC8FDD492EADAB172950B5E8A3192BBCBED9F077A5DA826868E5D1F94B5
2,974,373 UART: [art] SIG.S = D4108C3310B68E943998DCBAAA7064B17300837A7F1693F3F00E16E6F5EA3DDB614D3020750DDBA44B09B69D5525271E
2,998,167 UART: Caliptra RT
2,998,512 UART: [state] CFI Enabled
3,106,033 UART: [rt] RT listening for mailbox commands...
3,106,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,635 UART: [rt]cmd =0x41544d4e, len=14344
3,374,277 >>> mbox cmd response data (8 bytes)
3,374,278 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,393 UART: [rt]cmd =0x41545348, len=116
3,406,293 >>> mbox cmd response data (12 bytes)
3,406,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,845,726 >>> mbox cmd response: success
5,845,726 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,858,884 UART:
5,858,900 UART: Running Caliptra FMC ...
5,859,308 UART:
5,859,451 UART: [state] CFI Enabled
5,948,404 UART: [art] Extend RT PCRs Done
5,948,832 UART: [art] Lock RT PCRs Done
5,949,799 UART: [art] Populate DV Done
5,958,072 UART: [fht] FMC Alias Private Key: 7
5,959,102 UART: [art] Derive CDI
5,959,382 UART: [art] Store in in slot 0x4
6,045,357 UART: [art] Derive Key Pair
6,045,717 UART: [art] Store priv key in slot 0x5
6,059,399 UART: [art] Derive Key Pair - Done
6,074,447 UART: [art] Signing Cert with AUTHO
6,074,927 UART: RITY.KEYID = 7
6,090,207 UART: [art] Erasing AUTHORITY.KEYID = 7
6,090,972 UART: [art] PUB.X = FEAA0BA43DAE01E97481C55F35130B197445CDAAE54E58F592D6B5526D1D59E45E8C2CC98BAAFDD493CDE1E768F0BD0B
6,097,754 UART: [art] PUB.Y = A6D56926DBDAAA36533A3980BF0864ED90EE4FBE6ACC9EA215F7357046375ACE42B33133903F2908AF23CF66E71837B7
6,104,706 UART: [art] SIG.R = FD3C1FA326B97D29BB55B73ECC18B50C00C873D6A3FB761C8EBC1CC92A2FB32C9EA951E502E53B2F7F789ADFD874904F
6,111,470 UART: [art] SIG.S = 4085158A9DF73B20C5BB719FF3AF07DF3FF4F68D347E89C0750201FE2F1D34A3BF7FDC7ECA01A2A924819CBD371BBE64
6,135,355 UART: Caliptra RT
6,135,700 UART: [state] CFI Enabled
6,416,713 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,447,770 UART: [rt]cmd =0x41545348, len=116
6,449,620 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,664 UART: [kat] LMS
1,168,976 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,589 UART: [fht] FHT @ 0x50003400
1,173,321 UART: [idev] ++
1,173,489 UART: [idev] CDI.KEYID = 6
1,173,850 UART: [idev] SUBJECT.KEYID = 7
1,174,275 UART: [idev] UDS.KEYID = 0
1,174,621 ready_for_fw is high
1,174,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,425 UART: [idev] Erasing UDS.KEYID = 0
1,199,549 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,400 UART: [ldev] ++
1,209,568 UART: [ldev] CDI.KEYID = 6
1,209,932 UART: [ldev] SUBJECT.KEYID = 5
1,210,359 UART: [ldev] AUTHORITY.KEYID = 7
1,210,822 UART: [ldev] FE.KEYID = 1
1,216,034 UART: [ldev] Erasing FE.KEYID = 1
1,242,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,108 UART: [ldev] --
1,281,446 UART: [fwproc] Wait for Commands...
1,282,253 UART: [fwproc] Recv command 0x46574c44
1,282,986 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,864 >>> mbox cmd response: success
2,777,021 UART: [afmc] ++
2,777,189 UART: [afmc] CDI.KEYID = 6
2,777,552 UART: [afmc] SUBJECT.KEYID = 7
2,777,978 UART: [afmc] AUTHORITY.KEYID = 5
2,813,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,779 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,650 UART: [afmc] --
2,856,622 UART: [cold-reset] --
2,857,364 UART: [state] Locking Datavault
2,858,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,745 UART: [state] Locking ICCM
2,859,183 UART: [exit] Launching FMC @ 0x40000130
2,864,512 UART:
2,864,528 UART: Running Caliptra FMC ...
2,864,936 UART:
2,864,990 UART: [state] CFI Enabled
2,875,433 UART: [fht] FMC Alias Private Key: 7
2,983,106 UART: [art] Extend RT PCRs Done
2,983,534 UART: [art] Lock RT PCRs Done
2,985,202 UART: [art] Populate DV Done
2,993,651 UART: [fht] FMC Alias Private Key: 7
2,994,833 UART: [art] Derive CDI
2,995,113 UART: [art] Store in in slot 0x4
3,080,670 UART: [art] Derive Key Pair
3,081,030 UART: [art] Store priv key in slot 0x5
3,094,462 UART: [art] Derive Key Pair - Done
3,109,134 UART: [art] Signing Cert with AUTHO
3,109,614 UART: RITY.KEYID = 7
3,124,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,655 UART: [art] PUB.X = E23255CA88865B3E2E658ECAF32772B01DF6BA0183EA06DA372FD99E4414571244D5741808AB7A4E2A5B48EE19679B96
3,132,418 UART: [art] PUB.Y = EB5F2D90D428B1EF25E331B605C83ACDEE5A43B548C6887C62A0967911EDF0D85AB8E2B33A467B71F1C4712CE9587E38
3,139,375 UART: [art] SIG.R = A55AE35D1EA94390AE0BAB713496DC44A10BE7F41DB85D489328A5939C7418A0F4928295FA4E1244EA633F32F3216156
3,146,139 UART: [art] SIG.S = BA36738F5BEF53194E0AB07C6896D8FF868CB35DBCE7DE0A2C9AB80F7349C2C0CCEBA8AAF555C8A5B28C3C1F5874BA39
3,170,281 UART: Caliptra RT
3,170,534 UART: [state] CFI Enabled
3,277,616 UART: [rt] RT listening for mailbox commands...
3,278,286 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,116 UART: [rt]cmd =0x41544d4e, len=14344
3,546,100 >>> mbox cmd response data (8 bytes)
3,546,101 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,172 UART: [rt]cmd =0x41545348, len=116
3,578,114 >>> mbox cmd response data (12 bytes)
3,578,115 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,818 UART:
3,578,834 UART: Running Caliptra ROM ...
3,579,242 UART:
3,579,297 UART: [state] CFI Enabled
3,582,251 UART: [state] LifecycleState = Unprovisioned
3,582,906 UART: [state] DebugLocked = No
3,583,406 UART: [state] WD Timer not started. Device not locked for debugging
3,584,568 UART: [kat] SHA2-256
4,388,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,392,247 UART: [kat] ++
4,392,399 UART: [kat] sha1
4,396,779 UART: [kat] SHA2-256
4,398,719 UART: [kat] SHA2-384
4,401,324 UART: [kat] SHA2-512-ACC
4,403,224 UART: [kat] ECC-384
4,413,001 UART: [kat] HMAC-384Kdf
4,417,621 UART: [kat] LMS
4,665,933 UART: [kat] --
4,666,515 UART: [update-reset] ++
5,979,609 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,980,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,130,788 >>> mbox cmd response: success
6,130,788 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,131,107 UART: [update-reset] Copying MAN_2 To MAN_1
6,139,121 UART: [update-reset Success] --
6,140,078 UART: [state] Locking Datavault
6,140,724 UART: [state] Locking PCR0, PCR1 and PCR31
6,141,328 UART: [state] Locking ICCM
6,141,848 UART: [exit] Launching FMC @ 0x40000130
6,147,177 UART:
6,147,193 UART: Running Caliptra FMC ...
6,147,601 UART:
6,147,655 UART: [state] CFI Enabled
6,236,462 UART: [art] Extend RT PCRs Done
6,236,890 UART: [art] Lock RT PCRs Done
6,238,537 UART: [art] Populate DV Done
6,246,880 UART: [fht] FMC Alias Private Key: 7
6,248,026 UART: [art] Derive CDI
6,248,306 UART: [art] Store in in slot 0x4
6,333,927 UART: [art] Derive Key Pair
6,334,287 UART: [art] Store priv key in slot 0x5
6,347,487 UART: [art] Derive Key Pair - Done
6,362,368 UART: [art] Signing Cert with AUTHO
6,362,848 UART: RITY.KEYID = 7
6,378,254 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,019 UART: [art] PUB.X = 45199131B7BE2C11C2AFAAD699BB43CDC3A7E5CA7B987BC25FC829FFC928990F183FFB66765F7CF837A25C9B0A29B2CE
6,385,803 UART: [art] PUB.Y = 564EA4735DF5E85795CE0BADABE0FD33524E09E2F9D6067854B3A62D526E47D61C098D713D02C26F4566912977BE9672
6,392,738 UART: [art] SIG.R = C26BF19DC9753B2239E7CA57EBA93905C84CE95D02564E99F2A44A93C405B0B49851AC2B619C4689EBC69668CD7A9D69
6,399,505 UART: [art] SIG.S = 5295E00F5B9A0B0829701FACFD6F093FE81A9CCF9F1AA838FF13F7A656AB702DB525F33C19355C67CB1E9496282E3F3E
6,424,050 UART: Caliptra RT
6,424,303 UART: [state] CFI Enabled
6,700,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,731,443 UART: [rt]cmd =0x41545348, len=116
6,733,401 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,032 ready_for_fw is high
1,056,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,292 >>> mbox cmd response: success
2,687,440 UART:
2,687,456 UART: Running Caliptra FMC ...
2,687,864 UART:
2,687,918 UART: [state] CFI Enabled
2,698,125 UART: [fht] FMC Alias Private Key: 7
2,806,046 UART: [art] Extend RT PCRs Done
2,806,474 UART: [art] Lock RT PCRs Done
2,808,276 UART: [art] Populate DV Done
2,816,489 UART: [fht] FMC Alias Private Key: 7
2,817,467 UART: [art] Derive CDI
2,817,747 UART: [art] Store in in slot 0x4
2,903,554 UART: [art] Derive Key Pair
2,903,914 UART: [art] Store priv key in slot 0x5
2,917,076 UART: [art] Derive Key Pair - Done
2,931,996 UART: [art] Signing Cert with AUTHO
2,932,476 UART: RITY.KEYID = 7
2,947,330 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,095 UART: [art] PUB.X = 3B972577580C00F3CF4A51D8D5E9BC810F6BA94D345F8F0A686575A854147EB454B0560E6EA42A679638DF941B791F40
2,954,829 UART: [art] PUB.Y = 3E68B37736F019D8812C2410D3C0C18E65F5300CD9144F3F0673C46EBFFC2490CD4209A9A55F691A17BBA61B3A4E12E1
2,961,774 UART: [art] SIG.R = 14777F245BF0BEC4200B590700F29027AC169DD6B8B3158B2E97566173D3E8F5D8E8329C8943121A8AE0CA31D6141BCB
2,968,516 UART: [art] SIG.S = EF107D840D6DC01118514A4090E44221E4D16F49CC5F5256974759FD15408A770276E59C69DFADB67F8C825086A2A561
2,992,215 UART: Caliptra RT
2,992,468 UART: [state] CFI Enabled
3,100,273 UART: [rt] RT listening for mailbox commands...
3,100,943 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,817 UART: [rt]cmd =0x41544d4e, len=14344
3,368,411 >>> mbox cmd response data (8 bytes)
3,368,412 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,313 UART: [rt]cmd =0x41545348, len=116
3,400,365 >>> mbox cmd response data (12 bytes)
3,400,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,836,468 >>> mbox cmd response: success
5,836,468 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,849,910 UART:
5,849,926 UART: Running Caliptra FMC ...
5,850,334 UART:
5,850,388 UART: [state] CFI Enabled
5,939,233 UART: [art] Extend RT PCRs Done
5,939,661 UART: [art] Lock RT PCRs Done
5,941,220 UART: [art] Populate DV Done
5,949,461 UART: [fht] FMC Alias Private Key: 7
5,950,629 UART: [art] Derive CDI
5,950,909 UART: [art] Store in in slot 0x4
6,036,304 UART: [art] Derive Key Pair
6,036,664 UART: [art] Store priv key in slot 0x5
6,050,102 UART: [art] Derive Key Pair - Done
6,065,018 UART: [art] Signing Cert with AUTHO
6,065,498 UART: RITY.KEYID = 7
6,081,248 UART: [art] Erasing AUTHORITY.KEYID = 7
6,082,013 UART: [art] PUB.X = F1712B8C95ACFFC420D7E6DD3FBAB6A1E6682123F14695668D0FEB9529E8474354E462815A91094AFFA1A421CCAC4ACB
6,088,791 UART: [art] PUB.Y = FE16A718BDAB5ABCD31D99DAC36D24409043DB407CEFCF893AD980C2A2748D4042158334D559A2CBBB6E6EB7D8EE12FC
6,095,763 UART: [art] SIG.R = 273093D15D568B2A64628114F6284B592584BEA5CC1D2F2FE68B79AB2600604761B248481EEDB92C92182502D0C49A8C
6,102,502 UART: [art] SIG.S = E029E89493A058B6AB09CF7B11FCDE4E0C996EBBBAFBE159426EC3CCC52416C8970817E858827BFA18A41DF93B8D1CCF
6,125,842 UART: Caliptra RT
6,126,095 UART: [state] CFI Enabled
6,409,878 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,440,843 UART: [rt]cmd =0x41545348, len=116
6,442,789 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,768 UART: [kat] ++
895,920 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,408 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,899 UART: [idev] SUBJECT.KEYID = 7
1,174,324 UART: [idev] UDS.KEYID = 0
1,174,670 ready_for_fw is high
1,174,670 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,392 UART: [idev] Erasing UDS.KEYID = 0
1,199,820 UART: [idev] Sha1 KeyId Algorithm
1,208,818 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,337 UART: [ldev] SUBJECT.KEYID = 5
1,210,764 UART: [ldev] AUTHORITY.KEYID = 7
1,211,227 UART: [ldev] FE.KEYID = 1
1,216,591 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,885 UART: [ldev] --
1,282,279 UART: [fwproc] Wait for Commands...
1,283,054 UART: [fwproc] Recv command 0x46574c44
1,283,787 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,979 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,995 >>> mbox cmd response: success
2,775,256 UART: [afmc] ++
2,775,424 UART: [afmc] CDI.KEYID = 6
2,775,787 UART: [afmc] SUBJECT.KEYID = 7
2,776,213 UART: [afmc] AUTHORITY.KEYID = 5
2,811,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,216 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,099 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,818 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,473 UART: [afmc] --
2,855,527 UART: [cold-reset] --
2,856,331 UART: [state] Locking Datavault
2,857,500 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,104 UART: [state] Locking ICCM
2,858,724 UART: [exit] Launching FMC @ 0x40000130
2,864,053 UART:
2,864,069 UART: Running Caliptra FMC ...
2,864,477 UART:
2,864,620 UART: [state] CFI Enabled
2,875,181 UART: [fht] FMC Alias Private Key: 7
2,983,012 UART: [art] Extend RT PCRs Done
2,983,440 UART: [art] Lock RT PCRs Done
2,984,816 UART: [art] Populate DV Done
2,992,867 UART: [fht] FMC Alias Private Key: 7
2,993,807 UART: [art] Derive CDI
2,994,087 UART: [art] Store in in slot 0x4
3,080,184 UART: [art] Derive Key Pair
3,080,544 UART: [art] Store priv key in slot 0x5
3,093,800 UART: [art] Derive Key Pair - Done
3,108,622 UART: [art] Signing Cert with AUTHO
3,109,102 UART: RITY.KEYID = 7
3,124,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,055 UART: [art] PUB.X = CF8D0C694D36113E5066FCA56915EFD96517084C7F726F9191A2E360354CC963118A68D8296A32966F56A074FDCC4D5B
3,131,817 UART: [art] PUB.Y = 13AA60155E0AD1F6B6D9C25531E8E40D90B3F3AD02161C180D59638C80138547AF15F092FC28A82E592782F4D5F0A4EC
3,138,757 UART: [art] SIG.R = 21C4EB5E2B71687BBD38F878F3608061524735FEE00E4E011B51FCCFF2BEEEA16A53FC35931DC5B6423FD31E7827D0B7
3,145,533 UART: [art] SIG.S = FA403574424FE5960F7F95E0437562A8A732C4EFF9FE38D60B562E66FE837C5B739B0A40E3E7DF17370F3E53E787EB74
3,168,790 UART: Caliptra RT
3,169,135 UART: [state] CFI Enabled
3,277,768 UART: [rt] RT listening for mailbox commands...
3,278,438 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,300 UART: [rt]cmd =0x41544d4e, len=14344
3,546,424 >>> mbox cmd response data (8 bytes)
3,546,425 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,588 UART: [rt]cmd =0x41545348, len=116
3,578,624 >>> mbox cmd response data (12 bytes)
3,578,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,572 UART:
3,579,588 UART: Running Caliptra ROM ...
3,579,996 UART:
3,580,138 UART: [state] CFI Enabled
3,582,280 UART: [state] LifecycleState = Unprovisioned
3,582,935 UART: [state] DebugLocked = No
3,583,529 UART: [state] WD Timer not started. Device not locked for debugging
3,584,851 UART: [kat] SHA2-256
4,388,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,392,530 UART: [kat] ++
4,392,682 UART: [kat] sha1
4,396,932 UART: [kat] SHA2-256
4,398,872 UART: [kat] SHA2-384
4,401,725 UART: [kat] SHA2-512-ACC
4,403,625 UART: [kat] ECC-384
4,413,508 UART: [kat] HMAC-384Kdf
4,418,046 UART: [kat] LMS
4,666,358 UART: [kat] --
4,667,302 UART: [update-reset] ++
5,981,020 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,982,147 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,132,145 >>> mbox cmd response: success
6,132,145 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,132,496 UART: [update-reset] Copying MAN_2 To MAN_1
6,140,510 UART: [update-reset Success] --
6,141,369 UART: [state] Locking Datavault
6,142,169 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,773 UART: [state] Locking ICCM
6,143,217 UART: [exit] Launching FMC @ 0x40000130
6,148,546 UART:
6,148,562 UART: Running Caliptra FMC ...
6,148,970 UART:
6,149,113 UART: [state] CFI Enabled
6,238,176 UART: [art] Extend RT PCRs Done
6,238,604 UART: [art] Lock RT PCRs Done
6,239,853 UART: [art] Populate DV Done
6,247,966 UART: [fht] FMC Alias Private Key: 7
6,248,962 UART: [art] Derive CDI
6,249,242 UART: [art] Store in in slot 0x4
6,335,169 UART: [art] Derive Key Pair
6,335,529 UART: [art] Store priv key in slot 0x5
6,348,935 UART: [art] Derive Key Pair - Done
6,363,469 UART: [art] Signing Cert with AUTHO
6,363,949 UART: RITY.KEYID = 7
6,378,999 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,764 UART: [art] PUB.X = B54A01415F888D94E2232BA70117C6855C8C6FB27CF391ED2F0E177DD187D1989F3C52B8D474B0B913099D8F3CA84E94
6,386,524 UART: [art] PUB.Y = 70DDBABFB74D9D8FE2FF829375172E1B1D4AB901E4D17CDAF20E791EE8AAB652985F95C801983D3455979A8DB03E2EA7
6,393,481 UART: [art] SIG.R = 3426074F4630ED28E1E18162F144B7EFF746887C186973197420D7BD42E3EDDCA885E688FB5686FA299AE83064771288
6,400,240 UART: [art] SIG.S = 71F1322FD2C18DECFBEB42775CC20D0A5AAD784C48367B04C6A10A1C75379E23DC19206281B8BA13B760854FA47D8D76
6,423,457 UART: Caliptra RT
6,423,802 UART: [state] CFI Enabled
6,705,219 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,736,032 UART: [rt]cmd =0x41545348, len=116
6,737,796 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,787 ready_for_fw is high
1,056,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,653 >>> mbox cmd response: success
2,689,131 UART:
2,689,147 UART: Running Caliptra FMC ...
2,689,555 UART:
2,689,698 UART: [state] CFI Enabled
2,700,299 UART: [fht] FMC Alias Private Key: 7
2,808,756 UART: [art] Extend RT PCRs Done
2,809,184 UART: [art] Lock RT PCRs Done
2,810,172 UART: [art] Populate DV Done
2,818,539 UART: [fht] FMC Alias Private Key: 7
2,819,561 UART: [art] Derive CDI
2,819,841 UART: [art] Store in in slot 0x4
2,905,066 UART: [art] Derive Key Pair
2,905,426 UART: [art] Store priv key in slot 0x5
2,918,466 UART: [art] Derive Key Pair - Done
2,933,487 UART: [art] Signing Cert with AUTHO
2,933,967 UART: RITY.KEYID = 7
2,948,745 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,510 UART: [art] PUB.X = 0948ED885A9ECECDE51ECBF3C478DBEFA511E1394EDA9C2DC8A851358DA521084EC3713A972E4718377985AF81798826
2,956,282 UART: [art] PUB.Y = 6C3D943139515670625BE718E6521628F3A1BDFE92893B0688F92DE621A48930BF09657BD662F954C53594797CF88361
2,963,212 UART: [art] SIG.R = A9223A6817CF8DE0CB906D47F91CA2A15AA39D7736373DED2841439AF6B28AE03B02C47E73DAC55E1A777FCC0F57D835
2,969,988 UART: [art] SIG.S = 037F184BD1404D7EA5BBA4FECBBFFFAD9D5F2BAAC4B0C4CD1CB772DEF6327FA56A975BB1494AC58B8F88D4C91915D2DD
2,993,828 UART: Caliptra RT
2,994,173 UART: [state] CFI Enabled
3,102,026 UART: [rt] RT listening for mailbox commands...
3,102,696 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,582 UART: [rt]cmd =0x41544d4e, len=14344
3,369,666 >>> mbox cmd response data (8 bytes)
3,369,667 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,702 UART: [rt]cmd =0x41545348, len=116
3,401,472 >>> mbox cmd response data (12 bytes)
3,401,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,984 >>> mbox cmd response: success
5,837,984 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,851,176 UART:
5,851,192 UART: Running Caliptra FMC ...
5,851,600 UART:
5,851,743 UART: [state] CFI Enabled
5,941,276 UART: [art] Extend RT PCRs Done
5,941,704 UART: [art] Lock RT PCRs Done
5,943,097 UART: [art] Populate DV Done
5,951,402 UART: [fht] FMC Alias Private Key: 7
5,952,422 UART: [art] Derive CDI
5,952,702 UART: [art] Store in in slot 0x4
6,038,477 UART: [art] Derive Key Pair
6,038,837 UART: [art] Store priv key in slot 0x5
6,051,709 UART: [art] Derive Key Pair - Done
6,066,586 UART: [art] Signing Cert with AUTHO
6,067,066 UART: RITY.KEYID = 7
6,082,322 UART: [art] Erasing AUTHORITY.KEYID = 7
6,083,087 UART: [art] PUB.X = DDF8465BD4C0E75B2E32AB6B27849F0C5AB2CF13FB64C7B69AF6875DA9FF6D498503D350D19655E6052F74C994807EB3
6,089,858 UART: [art] PUB.Y = 5750D8D4140D2E6B71D792297A1C0DA550C3F90F2102451F79451AB041AC892DAC110CF83B3C8C4B8C613263D40D7BE4
6,096,792 UART: [art] SIG.R = B39CFC269B960FC441A78DAB650B1A4DB33363AAE36180B3B07CE662957C2AD5EC55D57FC20BB909C59A684D9B2EAD60
6,103,566 UART: [art] SIG.S = D3E557E313C39CE8280A3F26FED7EF77C9FE15B5DE9C8AB6952B26647B3D7424B2DE09DEFC7753CEE3C4508DF1519ECB
6,127,375 UART: Caliptra RT
6,127,720 UART: [state] CFI Enabled
6,412,192 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,443,127 UART: [rt]cmd =0x41545348, len=116
6,445,239 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,181 UART:
192,531 UART: Running Caliptra ROM ...
193,737 UART:
193,892 UART: [state] CFI Enabled
262,664 UART: [state] LifecycleState = Unprovisioned
264,577 UART: [state] DebugLocked = No
266,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,666 UART: [kat] SHA2-256
440,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,877 UART: [kat] ++
451,345 UART: [kat] sha1
463,384 UART: [kat] SHA2-256
466,074 UART: [kat] SHA2-384
471,443 UART: [kat] SHA2-512-ACC
473,812 UART: [kat] ECC-384
2,765,162 UART: [kat] HMAC-384Kdf
2,776,333 UART: [kat] LMS
3,966,664 UART: [kat] --
3,971,042 UART: [cold-reset] ++
3,972,272 UART: [fht] Storing FHT @ 0x50003400
3,983,568 UART: [idev] ++
3,984,168 UART: [idev] CDI.KEYID = 6
3,985,098 UART: [idev] SUBJECT.KEYID = 7
3,986,347 UART: [idev] UDS.KEYID = 0
3,987,305 ready_for_fw is high
3,987,502 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,130,903 UART: [idev] Erasing UDS.KEYID = 0
7,323,386 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,234 UART: [idev] --
7,350,287 UART: [ldev] ++
7,350,860 UART: [ldev] CDI.KEYID = 6
7,351,885 UART: [ldev] SUBJECT.KEYID = 5
7,353,045 UART: [ldev] AUTHORITY.KEYID = 7
7,354,280 UART: [ldev] FE.KEYID = 1
7,397,382 UART: [ldev] Erasing FE.KEYID = 1
10,729,547 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,275 UART: [ldev] --
13,089,403 UART: [fwproc] Waiting for Commands...
13,092,163 UART: [fwproc] Received command 0x46574c44
13,094,350 UART: [fwproc] Received Image of size 114124 bytes
17,146,558 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,219,934 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,288,840 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,606,653 >>> mbox cmd response: success
17,611,155 UART: [afmc] ++
17,611,756 UART: [afmc] CDI.KEYID = 6
17,612,674 UART: [afmc] SUBJECT.KEYID = 7
17,613,950 UART: [afmc] AUTHORITY.KEYID = 5
20,984,247 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,283,221 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,285,475 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,299,892 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,314,730 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,329,135 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,244 UART: [afmc] --
23,355,936 UART: [cold-reset] --
23,360,394 UART: [state] Locking Datavault
23,365,322 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,079 UART: [state] Locking ICCM
23,369,299 UART: [exit] Launching FMC @ 0x40000130
23,377,699 UART:
23,377,934 UART: Running Caliptra FMC ...
23,379,034 UART:
23,379,203 UART: [state] CFI Enabled
23,445,034 UART: [fht] FMC Alias Private Key: 7
25,783,286 UART: [art] Extend RT PCRs Done
25,784,509 UART: [art] Lock RT PCRs Done
25,786,082 UART: [art] Populate DV Done
25,791,445 UART: [fht] FMC Alias Private Key: 7
25,793,092 UART: [art] Derive CDI
25,793,931 UART: [art] Store in in slot 0x4
25,854,239 UART: [art] Derive Key Pair
25,855,283 UART: [art] Store priv key in slot 0x5
29,147,886 UART: [art] Derive Key Pair - Done
29,160,886 UART: [art] Signing Cert with AUTHO
29,162,192 UART: RITY.KEYID = 7
31,449,335 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,847 UART: [art] PUB.X = FBF10A3454FEE6E094C524A39D3414F636AD1516B87E269CD7C7E5B444F04F702B1BF1B9451B90564B8FED52C3E00CE1
31,458,039 UART: [art] PUB.Y = EB4336D718C2EE62EEF795932C9658C6AB611D854986A57275A8AD4D29A20A6407B09E4956563600675DFAEF9C856808
31,465,282 UART: [art] SIG.R = 0EBE779DEAD0F871B2032CF1C53065554B0137407D4136A452E78DDBB620993C750AFA148D857F45E4148AF4554E0357
31,472,673 UART: [art] SIG.S = 4267C0E2AA7178479A1B7F7BC53E9D11D8EDFA043F9AABB7EF886D8587CBE39B8FCD05D35AB3EE4BBAE637D9FDF0400C
32,778,170 UART: Caliptra RT
32,778,886 UART: [state] CFI Enabled
32,958,901 UART: [rt] RT listening for mailbox commands...
32,961,413 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,116,732 UART: [rt]cmd =0x41544d4e, len=14344
38,352,326 >>> mbox cmd response data (8 bytes)
38,352,935 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,383,570 UART: [rt]cmd =0x41545348, len=116
38,402,882 >>> mbox cmd response data (12 bytes)
38,404,138 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,434,927 UART: [rt]cmd =0x41545348, len=116
38,437,228 >>> mbox cmd response data (12 bytes)
40,571,696 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,716,721 UART:
40,717,081 UART: Running Caliptra ROM ...
40,718,220 UART:
40,718,414 UART: [state] CFI Enabled
40,789,462 UART: [state] LifecycleState = Unprovisioned
40,791,394 UART: [state] DebugLocked = No
40,794,027 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,798,832 UART: [kat] SHA2-256
40,968,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,979,010 UART: [kat] ++
40,979,519 UART: [kat] sha1
40,990,678 UART: [kat] SHA2-256
40,993,377 UART: [kat] SHA2-384
40,999,095 UART: [kat] SHA2-512-ACC
41,001,450 UART: [kat] ECC-384
43,292,718 UART: [kat] HMAC-384Kdf
43,325,682 UART: [kat] LMS
44,515,993 UART: [kat] --
44,520,519 UART: [update-reset] ++
48,650,579 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,655,057 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
49,037,292 >>> mbox cmd response: success
49,042,032 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,042,636 UART: [update-reset] Copying MAN_2 To MAN_1
49,060,091 UART: [update-reset Success] --
49,063,908 UART: [state] Locking Datavault
49,066,356 UART: [state] Locking PCR0, PCR1 and PCR31
49,068,064 UART: [state] Locking ICCM
49,070,499 UART: [exit] Launching FMC @ 0x40000130
49,078,899 UART:
49,079,149 UART: Running Caliptra FMC ...
49,080,272 UART:
49,080,436 UART: [state] CFI Enabled
49,181,121 UART: [art] Extend RT PCRs Done
49,182,326 UART: [art] Lock RT PCRs Done
49,183,686 UART: [art] Populate DV Done
49,189,372 UART: [fht] FMC Alias Private Key: 7
49,191,070 UART: [art] Derive CDI
49,191,882 UART: [art] Store in in slot 0x4
49,250,513 UART: [art] Derive Key Pair
49,251,510 UART: [art] Store priv key in slot 0x5
52,544,476 UART: [art] Derive Key Pair - Done
52,557,473 UART: [art] Signing Cert with AUTHO
52,558,772 UART: RITY.KEYID = 7
54,845,476 UART: [art] Erasing AUTHORITY.KEYID = 7
54,846,983 UART: [art] PUB.X = 0917DBADDE2BB31B4EAD0403F1196251388AC814425C4037DE7B2FB87F42EE5262AD699CC23EE7AF64D902FB4F8AD4CA
54,854,233 UART: [art] PUB.Y = F1F2409865487F8A491EE0E4667207F205FE48D9EE2483C6F3E0511ABB11E1DAB0A98F08B265F21BAAC6D4CB847C72DA
54,861,514 UART: [art] SIG.R = 2866CF1D73F6FCBFA0D0C5F29A7BB1FA938A632E719DB0A92277B7520F07B389B00E6C5574BDF7221537E84743078CB1
54,868,872 UART: [art] SIG.S = 8712709D87F9FA15F38D5A230A8CCB11B5B080EF2667ECF5B6241E609679F6A3472D12C35E0C039FC342DB0BBFE5709B
56,174,456 UART: Caliptra RT
56,175,166 UART: [state] CFI Enabled
56,510,118 UART: [rt] RT listening for mailbox commands...
56,541,914 UART: [rt]cmd =0x41545348, len=116
56,562,016 >>> mbox cmd response data (12 bytes)
56,562,941 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,593,462 UART: [rt]cmd =0x41545348, len=116
56,595,447 >>> mbox cmd response data (12 bytes)
60,772,891 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,929,007 UART: [rt]cmd =0x41544d4e, len=14344
66,164,332 >>> mbox cmd response data (8 bytes)
66,164,888 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,195,574 UART: [rt]cmd =0x41545348, len=116
66,215,073 >>> mbox cmd response data (12 bytes)
66,215,526 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,246,307 UART: [rt]cmd =0x41545348, len=116
66,248,429 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,806,834 ready_for_fw is high
3,807,595 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,895,284 >>> mbox cmd response: success
23,586,896 UART:
23,587,292 UART: Running Caliptra FMC ...
23,588,426 UART:
23,588,583 UART: [state] CFI Enabled
23,657,636 UART: [fht] FMC Alias Private Key: 7
25,995,223 UART: [art] Extend RT PCRs Done
25,996,483 UART: [art] Lock RT PCRs Done
25,998,067 UART: [art] Populate DV Done
26,003,695 UART: [fht] FMC Alias Private Key: 7
26,005,187 UART: [art] Derive CDI
26,005,958 UART: [art] Store in in slot 0x4
26,065,932 UART: [art] Derive Key Pair
26,066,977 UART: [art] Store priv key in slot 0x5
29,358,903 UART: [art] Derive Key Pair - Done
29,371,853 UART: [art] Signing Cert with AUTHO
29,373,164 UART: RITY.KEYID = 7
31,661,107 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,613 UART: [art] PUB.X = F1539B38026C9CA9DDBE092333BB3F4EF29438EB213BC283E524D1FA867AAA7783C5AF2037D6AC5AA49C86D93BBB6C5E
31,669,917 UART: [art] PUB.Y = 31341BB9C5C9EDF31CB84F5BFA45EFBB9609C1CA6F82DC27DF57385D21DCACA1AB1E75C7F0FA8F4EF0257AF94A4248DF
31,677,155 UART: [art] SIG.R = 50646E177FBCF31563D61DCC1997AA6903CCF2C1990B2B7F13FB08F11F2845FC9EA02B6050C51BDC5EF5C61D62B06B69
31,684,516 UART: [art] SIG.S = 19FF5980459F7BD9295D9B30EC577A886DE5C56191EF1DB40574BB0DFD0B3000C73F8A36EBEA606ADBAF44039E3256A2
32,989,438 UART: Caliptra RT
32,990,170 UART: [state] CFI Enabled
33,151,476 UART: [rt] RT listening for mailbox commands...
33,153,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,309,250 UART: [rt]cmd =0x41544d4e, len=14344
38,544,544 >>> mbox cmd response data (8 bytes)
38,545,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,576,023 UART: [rt]cmd =0x41545348, len=116
38,595,568 >>> mbox cmd response data (12 bytes)
38,596,851 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,627,666 UART: [rt]cmd =0x41545348, len=116
38,630,054 >>> mbox cmd response data (12 bytes)
40,758,766 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,492,075 >>> mbox cmd response: success
49,492,681 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,524,319 UART:
49,524,646 UART: Running Caliptra FMC ...
49,525,854 UART:
49,526,017 UART: [state] CFI Enabled
49,627,471 UART: [art] Extend RT PCRs Done
49,628,668 UART: [art] Lock RT PCRs Done
49,630,297 UART: [art] Populate DV Done
49,635,874 UART: [fht] FMC Alias Private Key: 7
49,637,517 UART: [art] Derive CDI
49,638,329 UART: [art] Store in in slot 0x4
49,696,859 UART: [art] Derive Key Pair
49,697,899 UART: [art] Store priv key in slot 0x5
52,990,775 UART: [art] Derive Key Pair - Done
53,003,846 UART: [art] Signing Cert with AUTHO
53,005,164 UART: RITY.KEYID = 7
55,291,549 UART: [art] Erasing AUTHORITY.KEYID = 7
55,293,063 UART: [art] PUB.X = 0E3F03487D1D76255701D4E9919384B0DA6BA0B3EECA26DE93F571A57C90B526F66ABB2F182995C98DF01017981E7387
55,300,279 UART: [art] PUB.Y = 9915CD192F9A423DAFA46DEF15F071766D3FC144870C11A56640B4BEEA415A69C23FBC5C3CD59A890AF4763C09BFCF84
55,307,542 UART: [art] SIG.R = B5A5D60B4FA9261DCC73BBAD10DA22ECDBA1D1181870E4992DBCE484BD86241EEC1B8D6058418EBD79FC5CE71B9834A7
55,314,955 UART: [art] SIG.S = 21E0943A94FA120741937113A2AB73C147C03EB0EA37C6316ADAAA2B89CE03A0A60F2013350802A415554A7F6EB15949
56,620,104 UART: Caliptra RT
56,620,800 UART: [state] CFI Enabled
56,954,567 UART: [rt] RT listening for mailbox commands...
56,986,271 UART: [rt]cmd =0x41545348, len=116
57,006,445 >>> mbox cmd response data (12 bytes)
57,007,502 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
57,038,160 UART: [rt]cmd =0x41545348, len=116
57,040,181 >>> mbox cmd response data (12 bytes)
61,221,642 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,377,370 UART: [rt]cmd =0x41544d4e, len=14344
66,612,366 >>> mbox cmd response data (8 bytes)
66,612,925 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,643,832 UART: [rt]cmd =0x41545348, len=116
66,663,516 >>> mbox cmd response data (12 bytes)
66,663,947 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,694,766 UART: [rt]cmd =0x41545348, len=116
66,697,065 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,351 UART:
192,703 UART: Running Caliptra ROM ...
193,897 UART:
603,724 UART: [state] CFI Enabled
617,754 UART: [state] LifecycleState = Unprovisioned
619,707 UART: [state] DebugLocked = No
621,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,568 UART: [kat] SHA2-256
796,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,835 UART: [kat] ++
807,322 UART: [kat] sha1
818,119 UART: [kat] SHA2-256
820,793 UART: [kat] SHA2-384
827,355 UART: [kat] SHA2-512-ACC
829,721 UART: [kat] ECC-384
3,114,054 UART: [kat] HMAC-384Kdf
3,125,060 UART: [kat] LMS
4,315,232 UART: [kat] --
4,318,973 UART: [cold-reset] ++
4,321,075 UART: [fht] Storing FHT @ 0x50003400
4,333,055 UART: [idev] ++
4,333,629 UART: [idev] CDI.KEYID = 6
4,334,579 UART: [idev] SUBJECT.KEYID = 7
4,335,819 UART: [idev] UDS.KEYID = 0
4,336,792 ready_for_fw is high
4,337,011 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,448 UART: [idev] Erasing UDS.KEYID = 0
7,622,806 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,629 UART: [idev] --
7,649,139 UART: [ldev] ++
7,649,756 UART: [ldev] CDI.KEYID = 6
7,650,763 UART: [ldev] SUBJECT.KEYID = 5
7,651,911 UART: [ldev] AUTHORITY.KEYID = 7
7,653,187 UART: [ldev] FE.KEYID = 1
7,666,310 UART: [ldev] Erasing FE.KEYID = 1
10,958,242 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,089 UART: [ldev] --
13,318,622 UART: [fwproc] Waiting for Commands...
13,320,766 UART: [fwproc] Received command 0x46574c44
13,322,995 UART: [fwproc] Received Image of size 114124 bytes
17,376,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,731 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,635 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,843,196 >>> mbox cmd response: success
17,847,088 UART: [afmc] ++
17,847,735 UART: [afmc] CDI.KEYID = 6
17,848,647 UART: [afmc] SUBJECT.KEYID = 7
17,849,857 UART: [afmc] AUTHORITY.KEYID = 5
21,166,557 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,757 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,017 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,421 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,241 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,673 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,781 UART: [afmc] --
23,531,646 UART: [cold-reset] --
23,534,708 UART: [state] Locking Datavault
23,538,764 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,463 UART: [state] Locking ICCM
23,541,848 UART: [exit] Launching FMC @ 0x40000130
23,550,254 UART:
23,550,485 UART: Running Caliptra FMC ...
23,551,580 UART:
23,551,734 UART: [state] CFI Enabled
23,559,882 UART: [fht] FMC Alias Private Key: 7
25,891,682 UART: [art] Extend RT PCRs Done
25,892,898 UART: [art] Lock RT PCRs Done
25,894,379 UART: [art] Populate DV Done
25,899,778 UART: [fht] FMC Alias Private Key: 7
25,901,362 UART: [art] Derive CDI
25,902,169 UART: [art] Store in in slot 0x4
25,944,902 UART: [art] Derive Key Pair
25,945,964 UART: [art] Store priv key in slot 0x5
29,187,847 UART: [art] Derive Key Pair - Done
29,200,893 UART: [art] Signing Cert with AUTHO
29,202,219 UART: RITY.KEYID = 7
31,481,743 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,245 UART: [art] PUB.X = 3607B6D8BB7A950ED76BEA49093D5AE98F4E3FC78D1D6A1C4EFB819A92B375A577232455CEB8F76CAE7E1F42FA6607C6
31,490,525 UART: [art] PUB.Y = DD94EA72D9B58614DEBF511463D9D9A6B8D3C6BA6A675AB45B61D6A036DC6C1FA1C5F3F615DFEEDF0CAECD0BC6C11749
31,497,785 UART: [art] SIG.R = 2D3104FAA97258EF336A60ADF76E8760236FBBA2FC0C2ED21258FCCEBCBCFA916AE4F53637E0AC0EB183FFA23D0D6036
31,505,159 UART: [art] SIG.S = 4CBBE6E81096E432CF0A439574AA615E72F679265A5B8BDA7097F212EFE6742EBC744F9386D0E5CDB97F61BB7E24F4CE
32,810,458 UART: Caliptra RT
32,811,166 UART: [state] CFI Enabled
32,929,036 UART: [rt] RT listening for mailbox commands...
32,931,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,086,823 UART: [rt]cmd =0x41544d4e, len=14344
38,321,995 >>> mbox cmd response data (8 bytes)
38,322,621 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,353,255 UART: [rt]cmd =0x41545348, len=116
38,372,581 >>> mbox cmd response data (12 bytes)
38,373,979 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,405,072 UART: [rt]cmd =0x41545348, len=116
38,407,202 >>> mbox cmd response data (12 bytes)
40,468,134 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,613,373 UART:
40,613,767 UART: Running Caliptra ROM ...
40,614,903 UART:
40,615,074 UART: [state] CFI Enabled
40,629,289 UART: [state] LifecycleState = Unprovisioned
40,631,199 UART: [state] DebugLocked = No
40,634,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,639,544 UART: [kat] SHA2-256
40,809,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,819,825 UART: [kat] ++
40,820,308 UART: [kat] sha1
40,832,110 UART: [kat] SHA2-256
40,834,802 UART: [kat] SHA2-384
40,841,056 UART: [kat] SHA2-512-ACC
40,843,407 UART: [kat] ECC-384
43,125,165 UART: [kat] HMAC-384Kdf
43,135,661 UART: [kat] LMS
44,325,766 UART: [kat] --
44,330,479 UART: [update-reset] ++
48,468,584 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,472,197 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,854,474 >>> mbox cmd response: success
48,859,163 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,859,770 UART: [update-reset] Copying MAN_2 To MAN_1
48,878,282 UART: [update-reset Success] --
48,881,985 UART: [state] Locking Datavault
48,883,845 UART: [state] Locking PCR0, PCR1 and PCR31
48,885,598 UART: [state] Locking ICCM
48,886,826 UART: [exit] Launching FMC @ 0x40000130
48,895,272 UART:
48,895,504 UART: Running Caliptra FMC ...
48,896,597 UART:
48,896,750 UART: [state] CFI Enabled
48,941,153 UART: [art] Extend RT PCRs Done
48,942,295 UART: [art] Lock RT PCRs Done
48,943,909 UART: [art] Populate DV Done
48,949,310 UART: [fht] FMC Alias Private Key: 7
48,950,891 UART: [art] Derive CDI
48,951,698 UART: [art] Store in in slot 0x4
48,994,193 UART: [art] Derive Key Pair
48,995,234 UART: [art] Store priv key in slot 0x5
52,237,375 UART: [art] Derive Key Pair - Done
52,250,266 UART: [art] Signing Cert with AUTHO
52,251,597 UART: RITY.KEYID = 7
54,531,357 UART: [art] Erasing AUTHORITY.KEYID = 7
54,532,870 UART: [art] PUB.X = 3EC7BB83994991AC99A134D9CB0FB6A7A603741AC6736893D417E01C19368754D42CEEFCD3E8E58B2A4D6C7DF1429F18
54,540,124 UART: [art] PUB.Y = 7BD2C32AAA5FC34E0B7A64FC0EFCF2649D277186FCB8A75744C916FDA31BF3DC3E021F3DA2560A183124ECC6F478C96A
54,547,400 UART: [art] SIG.R = DFFFA63D5C4D0FDD527184D79CB96D53FDFE1E90EF9E4D042C4E3D9D966E747616612810D32F24FD245F82F07F4E06C1
54,554,778 UART: [art] SIG.S = C1D84EB00794E87BC96C8ED8756023E00237E1F363712729B0CFD7164C956EC24D3BDAA0FB1EA791EF84BE416E00F1B7
55,860,113 UART: Caliptra RT
55,860,827 UART: [state] CFI Enabled
56,148,018 UART: [rt] RT listening for mailbox commands...
56,179,811 UART: [rt]cmd =0x41545348, len=116
56,199,682 >>> mbox cmd response data (12 bytes)
56,200,662 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,231,488 UART: [rt]cmd =0x41545348, len=116
56,233,901 >>> mbox cmd response data (12 bytes)
60,258,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,414,530 UART: [rt]cmd =0x41544d4e, len=14344
65,650,585 >>> mbox cmd response data (8 bytes)
65,651,176 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
65,681,770 UART: [rt]cmd =0x41545348, len=116
65,702,109 >>> mbox cmd response data (12 bytes)
65,702,543 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
65,733,087 UART: [rt]cmd =0x41545348, len=116
65,735,408 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
4,125,806 ready_for_fw is high
4,126,205 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,058,673 >>> mbox cmd response: success
23,700,631 UART:
23,701,085 UART: Running Caliptra FMC ...
23,702,203 UART:
23,702,357 UART: [state] CFI Enabled
23,709,968 UART: [fht] FMC Alias Private Key: 7
26,040,769 UART: [art] Extend RT PCRs Done
26,042,001 UART: [art] Lock RT PCRs Done
26,043,799 UART: [art] Populate DV Done
26,049,329 UART: [fht] FMC Alias Private Key: 7
26,050,870 UART: [art] Derive CDI
26,051,704 UART: [art] Store in in slot 0x4
26,093,920 UART: [art] Derive Key Pair
26,094,921 UART: [art] Store priv key in slot 0x5
29,337,005 UART: [art] Derive Key Pair - Done
29,350,129 UART: [art] Signing Cert with AUTHO
29,351,428 UART: RITY.KEYID = 7
31,630,688 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,197 UART: [art] PUB.X = 19A088AF502E60671DA14F10BD6E786092A54975A08DBC672B10FEC73C12E8FC913D40A84A90440F0ED584EB63A28396
31,639,453 UART: [art] PUB.Y = DF764D396A8051D24B8055742848A5E14BF2A09633B10DDDC43E1EDAC033B5892C5BEA370700B91713B0C2CC5D656725
31,646,656 UART: [art] SIG.R = 713D45580E3ACAF46CC381E10DBFC44B418E8D0CC7ABFA25E36787D5BC7147515247A37600EA9D0527244860E7B6E265
31,654,038 UART: [art] SIG.S = 3A76DB4C32132DD7732E93ADACBF0AEFD9110A770C6FAF663B5754A61BDFC44A0BD4A298CC114D14CB6F84F995C27D03
32,959,607 UART: Caliptra RT
32,960,313 UART: [state] CFI Enabled
33,077,931 UART: [rt] RT listening for mailbox commands...
33,080,331 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,235,696 UART: [rt]cmd =0x41544d4e, len=14344
38,471,279 >>> mbox cmd response data (8 bytes)
38,471,860 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,502,476 UART: [rt]cmd =0x41545348, len=116
38,523,265 >>> mbox cmd response data (12 bytes)
38,524,584 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,555,374 UART: [rt]cmd =0x41545348, len=116
38,557,955 >>> mbox cmd response data (12 bytes)
40,611,543 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,277,949 >>> mbox cmd response: success
49,278,531 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,311,814 UART:
49,312,128 UART: Running Caliptra FMC ...
49,313,351 UART:
49,313,506 UART: [state] CFI Enabled
49,357,432 UART: [art] Extend RT PCRs Done
49,358,629 UART: [art] Lock RT PCRs Done
49,359,876 UART: [art] Populate DV Done
49,365,452 UART: [fht] FMC Alias Private Key: 7
49,367,156 UART: [art] Derive CDI
49,367,970 UART: [art] Store in in slot 0x4
49,410,634 UART: [art] Derive Key Pair
49,411,678 UART: [art] Store priv key in slot 0x5
52,654,307 UART: [art] Derive Key Pair - Done
52,667,148 UART: [art] Signing Cert with AUTHO
52,668,453 UART: RITY.KEYID = 7
54,948,122 UART: [art] Erasing AUTHORITY.KEYID = 7
54,949,631 UART: [art] PUB.X = 1F4B7BA7FED0C69D316210BCD5A699457576E98E39718E67CD870EC3B0FDB429F1F543D6536DDE8D4BFB1057DF52CB3F
54,956,951 UART: [art] PUB.Y = 625A42D3B454F278DD7E65C81E6BA2F3F72B95AE33CD84C5B790FD65C250ADCC2479A8A37F3E45EA00F3112562E9E886
54,964,176 UART: [art] SIG.R = 280B8036075DC533CB664449215299E5FED59FFA9B933DE95DA0D0ADF8BE710294EFDD3781A2C262B0FD5C5D1C9A1631
54,971,554 UART: [art] SIG.S = F7C557AEB4E601915E240FD0A76A5E80E2F1252DAC0CDB21EFAACD7A18E288AEC17E4B012885E3062904960358C73771
56,277,320 UART: Caliptra RT
56,278,034 UART: [state] CFI Enabled
56,570,303 UART: [rt] RT listening for mailbox commands...
56,602,088 UART: [rt]cmd =0x41545348, len=116
56,622,832 >>> mbox cmd response data (12 bytes)
56,623,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,654,482 UART: [rt]cmd =0x41545348, len=116
56,656,520 >>> mbox cmd response data (12 bytes)
60,686,455 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,841,820 UART: [rt]cmd =0x41544d4e, len=14344
66,076,960 >>> mbox cmd response data (8 bytes)
66,077,543 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,108,010 UART: [rt]cmd =0x41545348, len=116
66,127,313 >>> mbox cmd response data (12 bytes)
66,127,783 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,158,492 UART: [rt]cmd =0x41545348, len=116
66,160,783 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,973 UART:
192,338 UART: Running Caliptra ROM ...
193,446 UART:
193,606 UART: [state] CFI Enabled
267,757 UART: [state] LifecycleState = Unprovisioned
269,611 UART: [state] DebugLocked = No
272,271 UART: [state] WD Timer not started. Device not locked for debugging
276,010 UART: [kat] SHA2-256
455,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,685 UART: [kat] ++
467,215 UART: [kat] sha1
478,381 UART: [kat] SHA2-256
481,461 UART: [kat] SHA2-384
485,989 UART: [kat] SHA2-512-ACC
488,962 UART: [kat] ECC-384
2,949,579 UART: [kat] HMAC-384Kdf
2,972,915 UART: [kat] LMS
3,502,320 UART: [kat] --
3,505,967 UART: [cold-reset] ++
3,507,135 UART: [fht] FHT @ 0x50003400
3,517,971 UART: [idev] ++
3,518,540 UART: [idev] CDI.KEYID = 6
3,519,532 UART: [idev] SUBJECT.KEYID = 7
3,520,705 UART: [idev] UDS.KEYID = 0
3,521,627 ready_for_fw is high
3,521,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,765 UART: [idev] Erasing UDS.KEYID = 0
6,023,606 UART: [idev] Sha1 KeyId Algorithm
6,044,882 UART: [idev] --
6,048,443 UART: [ldev] ++
6,049,017 UART: [ldev] CDI.KEYID = 6
6,049,931 UART: [ldev] SUBJECT.KEYID = 5
6,051,092 UART: [ldev] AUTHORITY.KEYID = 7
6,052,388 UART: [ldev] FE.KEYID = 1
6,099,825 UART: [ldev] Erasing FE.KEYID = 1
8,601,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,954 UART: [ldev] --
10,396,108 UART: [fwproc] Wait for Commands...
10,398,528 UART: [fwproc] Recv command 0x46574c44
10,400,615 UART: [fwproc] Recv'd Img size: 114448 bytes
13,808,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,267,611 >>> mbox cmd response: success
14,271,469 UART: [afmc] ++
14,272,076 UART: [afmc] CDI.KEYID = 6
14,272,993 UART: [afmc] SUBJECT.KEYID = 7
14,274,120 UART: [afmc] AUTHORITY.KEYID = 5
16,807,889 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,297 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,511 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,180 UART: [afmc] --
18,606,500 UART: [cold-reset] --
18,608,843 UART: [state] Locking Datavault
18,614,412 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,062 UART: [state] Locking ICCM
18,617,672 UART: [exit] Launching FMC @ 0x40000130
18,626,107 UART:
18,626,346 UART: Running Caliptra FMC ...
18,627,376 UART:
18,627,543 UART: [state] CFI Enabled
18,690,844 UART: [fht] FMC Alias Private Key: 7
20,455,183 UART: [art] Extend RT PCRs Done
20,456,375 UART: [art] Lock RT PCRs Done
20,457,911 UART: [art] Populate DV Done
20,463,425 UART: [fht] FMC Alias Private Key: 7
20,464,955 UART: [art] Derive CDI
20,465,686 UART: [art] Store in in slot 0x4
20,523,315 UART: [art] Derive Key Pair
20,524,354 UART: [art] Store priv key in slot 0x5
22,987,255 UART: [art] Derive Key Pair - Done
22,999,976 UART: [art] Signing Cert with AUTHO
23,001,280 UART: RITY.KEYID = 7
24,715,304 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,796 UART: [art] PUB.X = 9CD5EBB3C7EAE3B3647E4C9861BF103D1ECA63ED841F24839CE5048BB3294DD9590318E2AB2592B970E175B10DF40064
24,724,052 UART: [art] PUB.Y = 34D74A31D70CC994EC45252D9A9AA5695EB9B58B6C908076698CC2D8A93C0AA4D4117A322EF4B576D508DD640AA5C351
24,731,340 UART: [art] SIG.R = 40AD5EB4BF10CB4638F298033484B1009A35F117E5811F3CCAF271151114A27DA43C5E6367496004BBE7BD9C7480F39A
24,738,711 UART: [art] SIG.S = 30C5D422496ABA2362EA361F808DB259976DA7230427590375C9C7A3BF2C6D57FC3F7768043E0A06AB147F0F5CAAE43D
25,717,817 UART: Caliptra RT
25,718,532 UART: [state] CFI Enabled
25,881,460 UART: [rt] RT listening for mailbox commands...
25,883,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,039,753 UART: [rt]cmd =0x41544d4e, len=14344
29,970,101 >>> mbox cmd response data (8 bytes)
29,970,710 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,001,715 UART: [rt]cmd =0x41545348, len=116
30,021,535 >>> mbox cmd response data (12 bytes)
30,022,603 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,053,617 UART: [rt]cmd =0x41545348, len=116
30,055,542 >>> mbox cmd response data (12 bytes)
32,117,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,263,391 UART:
32,263,765 UART: Running Caliptra ROM ...
32,265,017 UART:
32,265,185 UART: [state] CFI Enabled
32,336,973 UART: [state] LifecycleState = Unprovisioned
32,339,168 UART: [state] DebugLocked = No
32,341,706 UART: [state] WD Timer not started. Device not locked for debugging
32,345,996 UART: [kat] SHA2-256
32,525,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,536,691 UART: [kat] ++
32,537,160 UART: [kat] sha1
32,548,211 UART: [kat] SHA2-256
32,551,240 UART: [kat] SHA2-384
32,558,015 UART: [kat] SHA2-512-ACC
32,560,912 UART: [kat] ECC-384
35,024,293 UART: [kat] HMAC-384Kdf
35,054,260 UART: [kat] LMS
35,583,725 UART: [kat] --
35,587,367 UART: [update-reset] ++
39,019,136 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,022,584 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,405,925 >>> mbox cmd response: success
39,406,462 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,407,193 UART: [update-reset] Copying MAN_2 To MAN_1
39,429,524 UART: [update-reset Success] --
39,434,888 UART: [state] Locking Datavault
39,437,648 UART: [state] Locking PCR0, PCR1 and PCR31
39,439,295 UART: [state] Locking ICCM
39,441,740 UART: [exit] Launching FMC @ 0x40000130
39,450,164 UART:
39,450,436 UART: Running Caliptra FMC ...
39,451,461 UART:
39,451,607 UART: [state] CFI Enabled
39,546,562 UART: [art] Extend RT PCRs Done
39,547,739 UART: [art] Lock RT PCRs Done
39,549,266 UART: [art] Populate DV Done
39,554,881 UART: [fht] FMC Alias Private Key: 7
39,556,518 UART: [art] Derive CDI
39,557,252 UART: [art] Store in in slot 0x4
39,615,755 UART: [art] Derive Key Pair
39,616,794 UART: [art] Store priv key in slot 0x5
42,080,469 UART: [art] Derive Key Pair - Done
42,093,718 UART: [art] Signing Cert with AUTHO
42,095,046 UART: RITY.KEYID = 7
43,806,387 UART: [art] Erasing AUTHORITY.KEYID = 7
43,807,908 UART: [art] PUB.X = 9E234BA49840B24460160C3FACF3481B41A82C889AE25459B0CDA46CC80BB8EF0CE38E86B69D4C462C592DE1A7DEE1B5
43,815,169 UART: [art] PUB.Y = 006E3B80FA00D0546ADC82C7C1E3B884628E6AA5D40DD79BBFC82B644BFA3E1D33C42C54C0339295D1CAD7D06554BD65
43,822,421 UART: [art] SIG.R = 85AF58109340BAAA436B556210A70FBD266A7D78C273792B26025AACBD9A9B4586DD7584AE884A6E392FEC96DBB49697
43,829,814 UART: [art] SIG.S = 3ED118E1E443A783A78DAF4B81B08F10A987D35A402D76778C7D6D75E0FB39A5B2B8DC540FAA8262BF00964E7FD935D7
44,808,372 UART: Caliptra RT
44,809,061 UART: [state] CFI Enabled
45,146,324 UART: [rt] RT listening for mailbox commands...
45,178,219 UART: [rt]cmd =0x41545348, len=116
45,197,689 >>> mbox cmd response data (12 bytes)
45,198,747 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,229,266 UART: [rt]cmd =0x41545348, len=116
45,231,713 >>> mbox cmd response data (12 bytes)
49,267,358 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,423,014 UART: [rt]cmd =0x41544d4e, len=14344
53,353,034 >>> mbox cmd response data (8 bytes)
53,353,580 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,384,509 UART: [rt]cmd =0x41545348, len=116
53,404,525 >>> mbox cmd response data (12 bytes)
53,404,962 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,435,511 UART: [rt]cmd =0x41545348, len=116
53,437,601 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,384,008 ready_for_fw is high
3,384,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,090,877 >>> mbox cmd response: success
18,383,855 UART:
18,384,241 UART: Running Caliptra FMC ...
18,385,434 UART:
18,385,626 UART: [state] CFI Enabled
18,453,135 UART: [fht] FMC Alias Private Key: 7
20,217,222 UART: [art] Extend RT PCRs Done
20,218,437 UART: [art] Lock RT PCRs Done
20,220,121 UART: [art] Populate DV Done
20,225,740 UART: [fht] FMC Alias Private Key: 7
20,227,340 UART: [art] Derive CDI
20,228,158 UART: [art] Store in in slot 0x4
20,285,537 UART: [art] Derive Key Pair
20,286,578 UART: [art] Store priv key in slot 0x5
22,749,878 UART: [art] Derive Key Pair - Done
22,762,869 UART: [art] Signing Cert with AUTHO
22,764,175 UART: RITY.KEYID = 7
24,475,889 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,392 UART: [art] PUB.X = A98A07A4134D422BC26512B45AEEDFB78CAEB208A256AF33A0C5D84244B6ED1A155475D182A2999AEC97F3CCD810C9DA
24,484,693 UART: [art] PUB.Y = 35F6BEB966780250D349234C9E66EAA1F411F41A45968EE333138D2DC730C8531DE8470E1165FFB3B4EF1029451DD8B6
24,491,969 UART: [art] SIG.R = BC1C7D5B32849C9897DD68081689C1E5537D946A7F7761EF7656543A1675CEFA26FF8DC46E4B1BD5064BC54E1E5BB30E
24,499,303 UART: [art] SIG.S = A1A2976DAF5091E586E8D6CE8D4A5328D319F2279F1E7B4557C0E509173C3158CE677F033738B703A01EB605F2112557
25,478,070 UART: Caliptra RT
25,478,783 UART: [state] CFI Enabled
25,643,985 UART: [rt] RT listening for mailbox commands...
25,646,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,802,648 UART: [rt]cmd =0x41544d4e, len=14344
29,732,862 >>> mbox cmd response data (8 bytes)
29,733,423 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,764,261 UART: [rt]cmd =0x41545348, len=116
29,784,448 >>> mbox cmd response data (12 bytes)
29,785,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,816,418 UART: [rt]cmd =0x41545348, len=116
29,818,481 >>> mbox cmd response data (12 bytes)
31,874,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,996,834 >>> mbox cmd response: success
38,997,393 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,029,940 UART:
39,030,273 UART: Running Caliptra FMC ...
39,031,555 UART:
39,031,728 UART: [state] CFI Enabled
39,138,976 UART: [art] Extend RT PCRs Done
39,140,168 UART: [art] Lock RT PCRs Done
39,141,863 UART: [art] Populate DV Done
39,147,440 UART: [fht] FMC Alias Private Key: 7
39,149,191 UART: [art] Derive CDI
39,149,930 UART: [art] Store in in slot 0x4
39,207,979 UART: [art] Derive Key Pair
39,209,044 UART: [art] Store priv key in slot 0x5
41,671,786 UART: [art] Derive Key Pair - Done
41,684,890 UART: [art] Signing Cert with AUTHO
41,686,201 UART: RITY.KEYID = 7
43,397,312 UART: [art] Erasing AUTHORITY.KEYID = 7
43,398,807 UART: [art] PUB.X = F0FBF1777E9EA9B2C6DAC25087C3C8F2B051BB92C14CB8A0309690ED6C853BC1FDF2AE6856BF098399525475843B1674
43,406,082 UART: [art] PUB.Y = 14B7A0152DF91C9861C6E96599DE46F2D71143766D5FCF8A93D7A92E665DA862F2A00977556CD01D1C43A8974A3595EB
43,413,329 UART: [art] SIG.R = E6D104E10D6D1334717FB3617EF4230EA409BF384B584F2DAEB4A1821DFD03D3389AFA13D0F6163D4C22F302F652548B
43,420,724 UART: [art] SIG.S = C111CA4B00CD9F47A8897F23358C3854C3BB05CE3DF69D5AA79C90B1190F203778112A58C2F379A6378B0756AFD4434C
44,399,489 UART: Caliptra RT
44,400,203 UART: [state] CFI Enabled
44,734,494 UART: [rt] RT listening for mailbox commands...
44,766,228 UART: [rt]cmd =0x41545348, len=116
44,785,839 >>> mbox cmd response data (12 bytes)
44,786,787 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,817,512 UART: [rt]cmd =0x41545348, len=116
44,819,680 >>> mbox cmd response data (12 bytes)
48,858,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,014,216 UART: [rt]cmd =0x41544d4e, len=14344
52,944,609 >>> mbox cmd response data (8 bytes)
52,945,149 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,975,987 UART: [rt]cmd =0x41545348, len=116
52,995,917 >>> mbox cmd response data (12 bytes)
52,996,354 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,027,234 UART: [rt]cmd =0x41545348, len=116
53,029,436 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,274 UART:
192,644 UART: Running Caliptra ROM ...
193,849 UART:
603,563 UART: [state] CFI Enabled
620,996 UART: [state] LifecycleState = Unprovisioned
622,869 UART: [state] DebugLocked = No
625,671 UART: [state] WD Timer not started. Device not locked for debugging
629,208 UART: [kat] SHA2-256
808,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,945 UART: [kat] ++
820,483 UART: [kat] sha1
832,070 UART: [kat] SHA2-256
835,070 UART: [kat] SHA2-384
841,263 UART: [kat] SHA2-512-ACC
844,260 UART: [kat] ECC-384
3,285,742 UART: [kat] HMAC-384Kdf
3,297,806 UART: [kat] LMS
3,827,283 UART: [kat] --
3,832,500 UART: [cold-reset] ++
3,834,071 UART: [fht] FHT @ 0x50003400
3,844,060 UART: [idev] ++
3,844,620 UART: [idev] CDI.KEYID = 6
3,845,526 UART: [idev] SUBJECT.KEYID = 7
3,846,690 UART: [idev] UDS.KEYID = 0
3,847,679 ready_for_fw is high
3,847,864 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,579 UART: [idev] Erasing UDS.KEYID = 0
6,321,151 UART: [idev] Sha1 KeyId Algorithm
6,343,668 UART: [idev] --
6,346,390 UART: [ldev] ++
6,346,958 UART: [ldev] CDI.KEYID = 6
6,348,016 UART: [ldev] SUBJECT.KEYID = 5
6,349,137 UART: [ldev] AUTHORITY.KEYID = 7
6,350,307 UART: [ldev] FE.KEYID = 1
6,360,033 UART: [ldev] Erasing FE.KEYID = 1
8,832,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,003 UART: [ldev] --
10,623,022 UART: [fwproc] Wait for Commands...
10,626,080 UART: [fwproc] Recv command 0x46574c44
10,628,168 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,086 >>> mbox cmd response: success
14,486,681 UART: [afmc] ++
14,487,269 UART: [afmc] CDI.KEYID = 6
14,488,174 UART: [afmc] SUBJECT.KEYID = 7
14,489,381 UART: [afmc] AUTHORITY.KEYID = 5
16,992,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,143 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,974 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,803 UART: [afmc] --
18,788,448 UART: [cold-reset] --
18,793,874 UART: [state] Locking Datavault
18,798,581 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,275 UART: [state] Locking ICCM
18,802,631 UART: [exit] Launching FMC @ 0x40000130
18,811,046 UART:
18,811,292 UART: Running Caliptra FMC ...
18,812,594 UART:
18,812,757 UART: [state] CFI Enabled
18,820,856 UART: [fht] FMC Alias Private Key: 7
20,577,443 UART: [art] Extend RT PCRs Done
20,578,660 UART: [art] Lock RT PCRs Done
20,580,395 UART: [art] Populate DV Done
20,585,584 UART: [fht] FMC Alias Private Key: 7
20,587,171 UART: [art] Derive CDI
20,587,975 UART: [art] Store in in slot 0x4
20,630,291 UART: [art] Derive Key Pair
20,631,286 UART: [art] Store priv key in slot 0x5
23,057,606 UART: [art] Derive Key Pair - Done
23,070,653 UART: [art] Signing Cert with AUTHO
23,071,957 UART: RITY.KEYID = 7
24,777,809 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,321 UART: [art] PUB.X = 1D5C916794F49B21F1B86F73FAAA29DD5F861105EA7834701DE04D97147D666CDE040AECE5DDED74FA8DE93889ED454A
24,786,558 UART: [art] PUB.Y = FEB5878E8F166382C517EF20F11311B420180E309720F5AE2C915F7CBB5B3136BEE287E692AA4ECF8D0C5D7C025358C6
24,793,828 UART: [art] SIG.R = BD8EE6E8FE55E5937A55C37E8FBD6E5759DD7D24E89F130EB0C9F154419E15F3435405B3B6518FF99E3330465F2D0B14
24,801,233 UART: [art] SIG.S = 16838AA960E9A98E887413B249C4162870FDA1D486CBF0BCF2FCC80801A3D094EA0A267CA1A3F06B1A68E3FA4CDAD8FD
25,780,551 UART: Caliptra RT
25,781,265 UART: [state] CFI Enabled
25,897,673 UART: [rt] RT listening for mailbox commands...
25,900,056 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,055,304 UART: [rt]cmd =0x41544d4e, len=14344
29,985,656 >>> mbox cmd response data (8 bytes)
29,986,253 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,016,977 UART: [rt]cmd =0x41545348, len=116
30,036,976 >>> mbox cmd response data (12 bytes)
30,038,192 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,069,144 UART: [rt]cmd =0x41545348, len=116
30,071,490 >>> mbox cmd response data (12 bytes)
32,135,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,280,872 UART:
32,281,254 UART: Running Caliptra ROM ...
32,282,293 UART:
32,282,435 UART: [state] CFI Enabled
32,299,839 UART: [state] LifecycleState = Unprovisioned
32,301,670 UART: [state] DebugLocked = No
32,304,158 UART: [state] WD Timer not started. Device not locked for debugging
32,308,322 UART: [kat] SHA2-256
32,487,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,499,077 UART: [kat] ++
32,499,638 UART: [kat] sha1
32,511,929 UART: [kat] SHA2-256
32,514,947 UART: [kat] SHA2-384
32,522,009 UART: [kat] SHA2-512-ACC
32,524,954 UART: [kat] ECC-384
34,968,271 UART: [kat] HMAC-384Kdf
34,980,834 UART: [kat] LMS
35,510,303 UART: [kat] --
35,515,800 UART: [update-reset] ++
38,944,570 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,948,069 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,331,393 >>> mbox cmd response: success
39,331,833 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,333,295 UART: [update-reset] Copying MAN_2 To MAN_1
39,355,616 UART: [update-reset Success] --
39,359,409 UART: [state] Locking Datavault
39,363,099 UART: [state] Locking PCR0, PCR1 and PCR31
39,364,745 UART: [state] Locking ICCM
39,367,346 UART: [exit] Launching FMC @ 0x40000130
39,375,741 UART:
39,376,009 UART: Running Caliptra FMC ...
39,377,038 UART:
39,377,181 UART: [state] CFI Enabled
39,421,568 UART: [art] Extend RT PCRs Done
39,422,710 UART: [art] Lock RT PCRs Done
39,424,149 UART: [art] Populate DV Done
39,429,825 UART: [fht] FMC Alias Private Key: 7
39,431,518 UART: [art] Derive CDI
39,432,324 UART: [art] Store in in slot 0x4
39,474,601 UART: [art] Derive Key Pair
39,475,643 UART: [art] Store priv key in slot 0x5
41,903,051 UART: [art] Derive Key Pair - Done
41,916,134 UART: [art] Signing Cert with AUTHO
41,917,437 UART: RITY.KEYID = 7
43,622,746 UART: [art] Erasing AUTHORITY.KEYID = 7
43,624,277 UART: [art] PUB.X = AF3DAC55B5D687F6CDCEE957776E4DCD2E23E3E272DA18F99C706E206B9288A9063E69A293F2CC02F37880D2917147E8
43,631,523 UART: [art] PUB.Y = 0D4BDD7D72B06A3835E7C461EC6ECF1B413C9BA234208A2A5E08AE4BD403D5385515AA71B85834428144A74C8B78A30C
43,638,745 UART: [art] SIG.R = 14BEDC8C3C8802288B191B8652812B8BC2E8359951CF6BE21C2A203E1BCD54098E9943DC3A8EE505489B6F249E68D09B
43,646,133 UART: [art] SIG.S = 4DA995DAFC3551E56727889B18BD8B6B5AE2F9C70797C59F618214160CF4FDC63F7A4802B0AD9E0EC93FA5470F9295FB
44,625,301 UART: Caliptra RT
44,626,011 UART: [state] CFI Enabled
44,909,346 UART: [rt] RT listening for mailbox commands...
44,941,082 UART: [rt]cmd =0x41545348, len=116
44,961,359 >>> mbox cmd response data (12 bytes)
44,962,353 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,993,204 UART: [rt]cmd =0x41545348, len=116
44,995,328 >>> mbox cmd response data (12 bytes)
49,019,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,175,023 UART: [rt]cmd =0x41544d4e, len=14344
53,105,574 >>> mbox cmd response data (8 bytes)
53,106,228 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,136,823 UART: [rt]cmd =0x41545348, len=116
53,157,424 >>> mbox cmd response data (12 bytes)
53,157,859 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,188,621 UART: [rt]cmd =0x41545348, len=116
53,190,650 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.98s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,694,749 ready_for_fw is high
3,695,180 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,808 >>> mbox cmd response: success
18,537,732 UART:
18,538,163 UART: Running Caliptra FMC ...
18,539,298 UART:
18,539,456 UART: [state] CFI Enabled
18,547,168 UART: [fht] FMC Alias Private Key: 7
20,304,129 UART: [art] Extend RT PCRs Done
20,305,351 UART: [art] Lock RT PCRs Done
20,307,320 UART: [art] Populate DV Done
20,312,765 UART: [fht] FMC Alias Private Key: 7
20,314,302 UART: [art] Derive CDI
20,315,065 UART: [art] Store in in slot 0x4
20,357,671 UART: [art] Derive Key Pair
20,358,713 UART: [art] Store priv key in slot 0x5
22,785,596 UART: [art] Derive Key Pair - Done
22,798,649 UART: [art] Signing Cert with AUTHO
22,799,957 UART: RITY.KEYID = 7
24,505,670 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,193 UART: [art] PUB.X = 0CFEAFA45A84B7C9A257127819E8250EADAC781821543BE90305951ABA60E787012C476F3D5063B4FA1401C4D4804280
24,514,408 UART: [art] PUB.Y = 6EBC38E3C423C52E855106C9D2C856DA2353ACD22B920847A504036D7E5B980B731076A04F571D76C4A311F3D0AFDD3C
24,521,658 UART: [art] SIG.R = 1D7FFEDB7B689F39ACC3C2C8F12FD7EF5AD5E1D83043FA5F750CBD5311B29DF864ECE8DAB389A08071FCC8C8C5A10E54
24,529,067 UART: [art] SIG.S = 3CC5ABDED4885EE6BA79E9DF7E3BD7BC3231C0957C7C04A2470586791E8F8C0B748013AF607F391EF3C99C55038F764D
25,508,307 UART: Caliptra RT
25,508,997 UART: [state] CFI Enabled
25,625,687 UART: [rt] RT listening for mailbox commands...
25,628,082 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,783,245 UART: [rt]cmd =0x41544d4e, len=14344
29,714,021 >>> mbox cmd response data (8 bytes)
29,714,610 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,745,275 UART: [rt]cmd =0x41545348, len=116
29,765,845 >>> mbox cmd response data (12 bytes)
29,767,072 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,798,084 UART: [rt]cmd =0x41545348, len=116
29,800,073 >>> mbox cmd response data (12 bytes)
31,854,459 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,915,148 >>> mbox cmd response: success
38,915,697 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,947,567 UART:
38,947,857 UART: Running Caliptra FMC ...
38,948,976 UART:
38,949,119 UART: [state] CFI Enabled
38,993,214 UART: [art] Extend RT PCRs Done
38,994,407 UART: [art] Lock RT PCRs Done
38,995,777 UART: [art] Populate DV Done
39,001,234 UART: [fht] FMC Alias Private Key: 7
39,002,939 UART: [art] Derive CDI
39,003,776 UART: [art] Store in in slot 0x4
39,046,217 UART: [art] Derive Key Pair
39,047,258 UART: [art] Store priv key in slot 0x5
41,473,902 UART: [art] Derive Key Pair - Done
41,486,923 UART: [art] Signing Cert with AUTHO
41,488,235 UART: RITY.KEYID = 7
43,194,053 UART: [art] Erasing AUTHORITY.KEYID = 7
43,195,561 UART: [art] PUB.X = 5416F260F8C6B4001704DA939771DFBB516B25B7EEF424308F7CE1FB161D8B22CF02467B7C27836EA9248B1DB28C9A72
43,202,809 UART: [art] PUB.Y = 31B30A225D31B7702301C0859B4B1BFD971405B0DF37E984E9D4490460E57810B25011782BDAAAA8514E98AECD5AF8CC
43,210,080 UART: [art] SIG.R = 88852C11F92689B367937BBD3302D5B0AECDABFB450CB2508728383846B07A80847C7ADFC0EFA3F074E4C91A276FD728
43,217,485 UART: [art] SIG.S = 809411B196FC850A000C4140AF0600574FC626FD2636F1EF0024D46875525388EC53C585C1BDBDFB272685DF797C52B2
44,196,422 UART: Caliptra RT
44,197,110 UART: [state] CFI Enabled
44,482,616 UART: [rt] RT listening for mailbox commands...
44,514,522 UART: [rt]cmd =0x41545348, len=116
44,534,751 >>> mbox cmd response data (12 bytes)
44,535,852 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,566,508 UART: [rt]cmd =0x41545348, len=116
44,568,369 >>> mbox cmd response data (12 bytes)
48,592,211 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
48,747,540 UART: [rt]cmd =0x41544d4e, len=14344
52,678,035 >>> mbox cmd response data (8 bytes)
52,678,588 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,709,099 UART: [rt]cmd =0x41545348, len=116
52,728,272 >>> mbox cmd response data (12 bytes)
52,728,738 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,759,662 UART: [rt]cmd =0x41545348, len=116
52,761,742 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,894 writing to cptra_bootfsm_go
3,440,332 ready_for_fw is high
3,440,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,075 >>> mbox cmd response: success
19,046,020 UART:
19,046,434 UART: Running Caliptra FMC ...
19,047,582 UART:
19,047,750 UART: [state] CFI Enabled
19,114,496 UART: [fht] FMC Alias Private Key: 7
20,878,954 UART: [art] Extend RT PCRs Done
20,880,189 UART: [art] Lock RT PCRs Done
20,882,182 UART: [art] Populate DV Done
20,887,250 UART: [fht] FMC Alias Private Key: 7
20,888,848 UART: [art] Derive CDI
20,889,613 UART: [art] Store in in slot 0x4
20,947,523 UART: [art] Derive Key Pair
20,948,523 UART: [art] Store priv key in slot 0x5
23,411,385 UART: [art] Derive Key Pair - Done
23,424,290 UART: [art] Signing Cert with AUTHO
23,425,594 UART: RITY.KEYID = 7
25,137,290 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,770 UART: [art] PUB.X = D65AB110F7913D85E8225775AFB521B0A70FE60D7ECB4F4F02E59572A1692D66FB0E81D7C7782F5A57D10F3EB6AEDAA3
25,146,062 UART: [art] PUB.Y = C8CDEAEEEA425D9E5CFB6FB45CBE22DBA663A9E967F1C561D1EF8EF395C5ACFF62AA653B311DF2697D5A22E212FB07AC
25,153,372 UART: [art] SIG.R = 536CC8B85F2EA215E8C89CB96A15B1B6DAD8BBF7FDFCC1DC006EACA19DE967575A9B5CFE242D4BDC3B921BE81D3D383A
25,160,760 UART: [art] SIG.S = 3674EF32948B282D5997EA7E76441EADF8319D4FF26AB3DC280387878F2613F5F6B12F443598647C4A2F2CB2FC6F2D43
26,139,335 UART: Caliptra RT
26,140,066 UART: [state] CFI Enabled
26,305,030 UART: [rt] RT listening for mailbox commands...
26,307,423 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,463,537 UART: [rt]cmd =0x41544d4e, len=14344
30,393,887 >>> mbox cmd response data (8 bytes)
30,394,470 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,424,997 UART: [rt]cmd =0x41545348, len=116
30,444,845 >>> mbox cmd response data (12 bytes)
30,446,016 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,476,858 UART: [rt]cmd =0x41545348, len=116
30,478,894 >>> mbox cmd response data (12 bytes)
32,534,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,362,054 >>> mbox cmd response: success
40,362,688 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,396,733 UART:
40,397,024 UART: Running Caliptra FMC ...
40,398,153 UART:
40,398,305 UART: [state] CFI Enabled
40,503,982 UART: [art] Extend RT PCRs Done
40,505,209 UART: [art] Lock RT PCRs Done
40,506,646 UART: [art] Populate DV Done
40,512,217 UART: [fht] FMC Alias Private Key: 7
40,513,754 UART: [art] Derive CDI
40,514,565 UART: [art] Store in in slot 0x4
40,573,758 UART: [art] Derive Key Pair
40,574,793 UART: [art] Store priv key in slot 0x5
43,037,696 UART: [art] Derive Key Pair - Done
43,050,654 UART: [art] Signing Cert with AUTHO
43,051,985 UART: RITY.KEYID = 7
44,763,106 UART: [art] Erasing AUTHORITY.KEYID = 7
44,764,615 UART: [art] PUB.X = 839BA4DACE2F0E4D2B90232C93412A29B2E9281572E10CDCF2537CC206EB184D4B18997AE3100193DF7EBA54E11BF97C
44,771,861 UART: [art] PUB.Y = 71F4F540004E3C5C541FB66ECF61808867F7B09B8741874C0E6333EBEBF4A5589A27269B4F835B437464F1A3D6479738
44,779,095 UART: [art] SIG.R = CAF26EFAFC9C9E67DFA8FEC1B30F37AD7F3DE218B39A98029D4586E5F827D36C9609E963AA18D2A5546E2B2B8A01FAB3
44,786,483 UART: [art] SIG.S = 5216004F689C11EAE46BEF33A1A9D44A63010BD2A87BC8ABFD8D598CD4BE3A2D35B3A4D6171036BDBD70912049D44533
45,765,883 UART: Caliptra RT
45,766,584 UART: [state] CFI Enabled
46,103,307 UART: [rt] RT listening for mailbox commands...
46,135,172 UART: [rt]cmd =0x41545348, len=116
46,154,639 >>> mbox cmd response data (12 bytes)
46,155,552 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,186,141 UART: [rt]cmd =0x41545348, len=116
46,188,535 >>> mbox cmd response data (12 bytes)
50,215,587 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,371,144 UART: [rt]cmd =0x41544d4e, len=14344
54,300,985 >>> mbox cmd response data (8 bytes)
54,301,554 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,332,402 UART: [rt]cmd =0x41545348, len=116
54,352,085 >>> mbox cmd response data (12 bytes)
54,352,515 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,383,123 UART: [rt]cmd =0x41545348, len=116
54,385,206 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,752,440 ready_for_fw is high
3,752,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,711 >>> mbox cmd response: success
19,210,423 UART:
19,210,815 UART: Running Caliptra FMC ...
19,212,007 UART:
19,212,179 UART: [state] CFI Enabled
19,220,323 UART: [fht] FMC Alias Private Key: 7
20,977,193 UART: [art] Extend RT PCRs Done
20,978,423 UART: [art] Lock RT PCRs Done
20,979,960 UART: [art] Populate DV Done
20,985,575 UART: [fht] FMC Alias Private Key: 7
20,987,283 UART: [art] Derive CDI
20,988,016 UART: [art] Store in in slot 0x4
21,030,790 UART: [art] Derive Key Pair
21,031,836 UART: [art] Store priv key in slot 0x5
23,457,978 UART: [art] Derive Key Pair - Done
23,470,651 UART: [art] Signing Cert with AUTHO
23,471,950 UART: RITY.KEYID = 7
25,177,564 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,066 UART: [art] PUB.X = E2E49071C13E7585BCA823BD3649D638BA8598B7830EE21779C4CE308EB1D01646BD50D87588A07F7C18BDAD52634209
25,186,290 UART: [art] PUB.Y = B43FF75E5D77A911CDBC8A3AA1D20676AA3F9F28A0C7EE3736727E432095D2BEDB64E042613948422EF6E033E5B3CE37
25,193,593 UART: [art] SIG.R = D7A8BBF71B23C84FCB93E90D33DB09447B660AE3425EB65B75A477BA69D8CCD3BD118C0971B385E2733420E0EB0CEAD7
25,200,953 UART: [art] SIG.S = 710CEF3ACFDDCD63B8EAC9EA1D5D61206591846460FB4F734D1E2B762A5166E4FC680E69096A0233504F66A6757C8D34
26,179,589 UART: Caliptra RT
26,180,302 UART: [state] CFI Enabled
26,297,288 UART: [rt] RT listening for mailbox commands...
26,299,692 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,455,162 UART: [rt]cmd =0x41544d4e, len=14344
30,385,876 >>> mbox cmd response data (8 bytes)
30,386,439 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,417,318 UART: [rt]cmd =0x41545348, len=116
30,437,502 >>> mbox cmd response data (12 bytes)
30,438,657 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,469,305 UART: [rt]cmd =0x41545348, len=116
30,471,710 >>> mbox cmd response data (12 bytes)
32,525,483 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,262,798 >>> mbox cmd response: success
40,263,480 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,297,091 UART:
40,297,427 UART: Running Caliptra FMC ...
40,298,660 UART:
40,298,819 UART: [state] CFI Enabled
40,342,457 UART: [art] Extend RT PCRs Done
40,343,601 UART: [art] Lock RT PCRs Done
40,344,882 UART: [art] Populate DV Done
40,350,281 UART: [fht] FMC Alias Private Key: 7
40,351,916 UART: [art] Derive CDI
40,352,725 UART: [art] Store in in slot 0x4
40,395,357 UART: [art] Derive Key Pair
40,396,392 UART: [art] Store priv key in slot 0x5
42,822,939 UART: [art] Derive Key Pair - Done
42,836,093 UART: [art] Signing Cert with AUTHO
42,837,417 UART: RITY.KEYID = 7
44,543,400 UART: [art] Erasing AUTHORITY.KEYID = 7
44,544,900 UART: [art] PUB.X = 2A1CCB826E8263C53B62443C22219E4FA96FE847A0C51CF0AD9A842CDF6875D829C1D61F989F7C531DB68E40412ED6B7
44,552,201 UART: [art] PUB.Y = 7EBC9AF248E9BDB7EC8C591FC3A8A1535A4F29FB63979334A3DB10EF7DCAA1E57A3C9ACAD10D192EF78440C50D04F283
44,559,480 UART: [art] SIG.R = F3A9223662EDCCDE731E428B92508B3D3E1760643079DE836BA6945CAB7A7F6AD0E6F8F0381631B05FC827CA825940B9
44,566,866 UART: [art] SIG.S = 54C141575F7B72ABF1DF59D1D5848F8E739654D024D964D524F3F4EA9923C504FA22C6A5848F53B6A0AF0C57159247DE
45,545,742 UART: Caliptra RT
45,546,427 UART: [state] CFI Enabled
45,834,955 UART: [rt] RT listening for mailbox commands...
45,866,702 UART: [rt]cmd =0x41545348, len=116
45,887,465 >>> mbox cmd response data (12 bytes)
45,888,364 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,919,109 UART: [rt]cmd =0x41545348, len=116
45,921,230 >>> mbox cmd response data (12 bytes)
49,945,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,100,903 UART: [rt]cmd =0x41544d4e, len=14344
54,031,530 >>> mbox cmd response data (8 bytes)
54,032,106 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,063,067 UART: [rt]cmd =0x41545348, len=116
54,082,919 >>> mbox cmd response data (12 bytes)
54,083,358 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,114,014 UART: [rt]cmd =0x41545348, len=116
54,116,045 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,197 UART: [kat] SHA2-256
882,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,243 UART: [kat] ++
886,395 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,364 UART: [kat] SHA2-512-ACC
897,265 UART: [kat] ECC-384
902,696 UART: [kat] HMAC-384Kdf
907,228 UART: [kat] LMS
1,475,424 UART: [kat] --
1,476,303 UART: [cold-reset] ++
1,476,857 UART: [fht] Storing FHT @ 0x50003400
1,479,504 UART: [idev] ++
1,479,672 UART: [idev] CDI.KEYID = 6
1,480,032 UART: [idev] SUBJECT.KEYID = 7
1,480,456 UART: [idev] UDS.KEYID = 0
1,480,801 ready_for_fw is high
1,480,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,360 UART: [idev] Erasing UDS.KEYID = 0
1,504,428 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,974 UART: [idev] --
1,513,931 UART: [ldev] ++
1,514,099 UART: [ldev] CDI.KEYID = 6
1,514,462 UART: [ldev] SUBJECT.KEYID = 5
1,514,888 UART: [ldev] AUTHORITY.KEYID = 7
1,515,351 UART: [ldev] FE.KEYID = 1
1,520,239 UART: [ldev] Erasing FE.KEYID = 1
1,545,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,586 UART: [ldev] --
1,585,035 UART: [fwproc] Waiting for Commands...
1,585,806 UART: [fwproc] Received command 0x46574c44
1,586,597 UART: [fwproc] Received Image of size 114448 bytes
2,886,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,238 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,590 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,639 >>> mbox cmd response: success
3,079,789 UART: [afmc] ++
3,079,957 UART: [afmc] CDI.KEYID = 6
3,080,319 UART: [afmc] SUBJECT.KEYID = 7
3,080,744 UART: [afmc] AUTHORITY.KEYID = 5
3,116,193 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,187 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,967 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,695 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,580 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,270 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,045 UART: [afmc] --
3,158,995 UART: [cold-reset] --
3,159,831 UART: [state] Locking Datavault
3,161,172 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,776 UART: [state] Locking ICCM
3,162,256 UART: [exit] Launching FMC @ 0x40000130
3,167,585 UART:
3,167,601 UART: Running Caliptra FMC ...
3,168,009 UART:
3,168,063 UART: [state] CFI Enabled
3,178,370 UART: [fht] FMC Alias Private Key: 7
3,285,385 UART: [art] Extend RT PCRs Done
3,285,813 UART: [art] Lock RT PCRs Done
3,287,465 UART: [art] Populate DV Done
3,295,840 UART: [fht] FMC Alias Private Key: 7
3,296,868 UART: [art] Derive CDI
3,297,148 UART: [art] Store in in slot 0x4
3,383,205 UART: [art] Derive Key Pair
3,383,565 UART: [art] Store priv key in slot 0x5
3,396,283 UART: [art] Derive Key Pair - Done
3,410,744 UART: [art] Signing Cert with AUTHO
3,411,224 UART: RITY.KEYID = 7
3,426,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,153 UART: [art] PUB.X = F70ECD544D6DEF2D092B633C471433073F898B53C53A8241FDF771FEB9CA6CC94AAB3B29A55BBCA85291E439F179C707
3,433,923 UART: [art] PUB.Y = 02B47F16D87D3F3A38335716FDDD6158812E132047B6EFEA0C123C550AC26C7B73D465C4E4EF5FE381E4516570B6E4ED
3,440,870 UART: [art] SIG.R = 46433BDE5CC3541B74C49AD728459667A911EEC456858BA3CE1FB003476130811A484BC1D05C6DCE3F2D3FC40F61C3B4
3,447,640 UART: [art] SIG.S = 3E670FA95D33FB05BB74266B39C7226D8530C99BD795E40B46F04DDC7E824C6103F5C475DCE1C6E21B04DF6FDEB14DE0
3,471,712 UART: Caliptra RT
3,471,965 UART: [state] CFI Enabled
3,580,501 UART: [rt] RT listening for mailbox commands...
3,581,171 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,087 UART: [rt]cmd =0x41544d4e, len=14344
3,849,007 >>> mbox cmd response data (8 bytes)
3,849,008 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,189 UART: [rt]cmd =0x41545348, len=116
3,900,383 >>> mbox cmd response data (12 bytes)
3,900,384 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,397 UART: [rt]cmd =0x41545348, len=116
3,932,361 >>> mbox cmd response data (12 bytes)
3,932,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,074 UART:
3,933,090 UART: Running Caliptra ROM ...
3,933,498 UART:
3,933,552 UART: [state] CFI Enabled
3,936,278 UART: [state] LifecycleState = Unprovisioned
3,936,933 UART: [state] DebugLocked = No
3,937,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,939,058 UART: [kat] SHA2-256
4,732,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,737,104 UART: [kat] ++
4,737,256 UART: [kat] sha1
4,741,546 UART: [kat] SHA2-256
4,743,484 UART: [kat] SHA2-384
4,746,241 UART: [kat] SHA2-512-ACC
4,748,141 UART: [kat] ECC-384
4,753,724 UART: [kat] HMAC-384Kdf
4,758,370 UART: [kat] LMS
5,326,566 UART: [kat] --
5,327,479 UART: [update-reset] ++
6,663,688 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,664,744 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,814,794 >>> mbox cmd response: success
6,814,794 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,815,109 UART: [update-reset] Copying MAN_2 To MAN_1
6,823,123 UART: [update-reset Success] --
6,823,904 UART: [state] Locking Datavault
6,824,680 UART: [state] Locking PCR0, PCR1 and PCR31
6,825,284 UART: [state] Locking ICCM
6,825,754 UART: [exit] Launching FMC @ 0x40000130
6,831,083 UART:
6,831,099 UART: Running Caliptra FMC ...
6,831,507 UART:
6,831,561 UART: [state] CFI Enabled
6,919,942 UART: [art] Extend RT PCRs Done
6,920,370 UART: [art] Lock RT PCRs Done
6,921,445 UART: [art] Populate DV Done
6,929,536 UART: [fht] FMC Alias Private Key: 7
6,930,696 UART: [art] Derive CDI
6,930,976 UART: [art] Store in in slot 0x4
7,016,637 UART: [art] Derive Key Pair
7,016,997 UART: [art] Store priv key in slot 0x5
7,030,711 UART: [art] Derive Key Pair - Done
7,045,467 UART: [art] Signing Cert with AUTHO
7,045,947 UART: RITY.KEYID = 7
7,060,799 UART: [art] Erasing AUTHORITY.KEYID = 7
7,061,564 UART: [art] PUB.X = C382785695410C86C18F7C0C864631A452C6075AF2595B1D7B9107A15D57064C29CE597A2DC054418B7EC0663CC5763B
7,068,311 UART: [art] PUB.Y = A385ECE1C6CF246A8A3176BCA77B10FE99A590777EB40B45D90CE1BA02FD3407CD0275E65EF21C1C992B5B4D67096E80
7,075,255 UART: [art] SIG.R = E6EE19E32996D99A9BEF02C69ACF1A9B90D41FFE72D500ACBB51379888616B764A8D369843F1D2D74F35109507E3709F
7,082,001 UART: [art] SIG.S = 2636B8599C708F9CAA1CE79AAF272E85FE08D53EAC2B04C8D51EADAF7552E483EBDA79DEF93F640CC74748826BDF7B76
7,105,589 UART: Caliptra RT
7,105,842 UART: [state] CFI Enabled
7,384,407 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,415,532 UART: [rt]cmd =0x41545348, len=116
7,438,190 >>> mbox cmd response data (12 bytes)
7,438,191 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,468,166 UART: [rt]cmd =0x41545348, len=116
7,469,620 >>> mbox cmd response data (12 bytes)
7,469,621 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,592,250 UART: [rt]cmd =0x41544d4e, len=14344
7,736,702 >>> mbox cmd response data (8 bytes)
7,736,703 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,766,862 UART: [rt]cmd =0x41545348, len=116
7,789,044 >>> mbox cmd response data (12 bytes)
7,789,045 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,818,976 UART: [rt]cmd =0x41545348, len=116
7,820,531 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,695 ready_for_fw is high
1,362,695 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,795 >>> mbox cmd response: success
2,990,629 UART:
2,990,645 UART: Running Caliptra FMC ...
2,991,053 UART:
2,991,107 UART: [state] CFI Enabled
3,001,414 UART: [fht] FMC Alias Private Key: 7
3,109,427 UART: [art] Extend RT PCRs Done
3,109,855 UART: [art] Lock RT PCRs Done
3,111,423 UART: [art] Populate DV Done
3,119,884 UART: [fht] FMC Alias Private Key: 7
3,120,886 UART: [art] Derive CDI
3,121,166 UART: [art] Store in in slot 0x4
3,206,651 UART: [art] Derive Key Pair
3,207,011 UART: [art] Store priv key in slot 0x5
3,220,405 UART: [art] Derive Key Pair - Done
3,234,952 UART: [art] Signing Cert with AUTHO
3,235,432 UART: RITY.KEYID = 7
3,250,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,357 UART: [art] PUB.X = 56722DD6C5C9F9D2E063641F2513E3144468C3ACC72849D8EC7C7C09F398B01123AD510BFC538A621B408822B422C39C
3,258,119 UART: [art] PUB.Y = 74A1792D876E721550893775FA261C447976A9B6709D2B44C7F39754FA53305EFE00A9C9F33140821DBC9C9970A435F8
3,265,037 UART: [art] SIG.R = 2260AA4CB9A9FB5B9AEA55662EC4EF796A9CFC66A5A3D71C39CE5274F2C53544EC571DA8209D3ED2E71E7771308EE9C5
3,271,823 UART: [art] SIG.S = B42A12C947F07C413609225125D29BEAD09553A589CB0C757FE44AB86B120091B33F92A9A53681ADEC62544CE0B21523
3,295,470 UART: Caliptra RT
3,295,723 UART: [state] CFI Enabled
3,404,150 UART: [rt] RT listening for mailbox commands...
3,404,820 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,062 UART: [rt]cmd =0x41544d4e, len=14344
3,672,870 >>> mbox cmd response data (8 bytes)
3,672,871 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,066 UART: [rt]cmd =0x41545348, len=116
3,725,218 >>> mbox cmd response data (12 bytes)
3,725,219 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,342 UART: [rt]cmd =0x41545348, len=116
3,757,264 >>> mbox cmd response data (12 bytes)
3,757,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,522,463 >>> mbox cmd response: success
6,522,463 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,535,730 UART:
6,535,746 UART: Running Caliptra FMC ...
6,536,154 UART:
6,536,208 UART: [state] CFI Enabled
6,624,977 UART: [art] Extend RT PCRs Done
6,625,405 UART: [art] Lock RT PCRs Done
6,626,610 UART: [art] Populate DV Done
6,634,509 UART: [fht] FMC Alias Private Key: 7
6,635,581 UART: [art] Derive CDI
6,635,861 UART: [art] Store in in slot 0x4
6,721,574 UART: [art] Derive Key Pair
6,721,934 UART: [art] Store priv key in slot 0x5
6,735,340 UART: [art] Derive Key Pair - Done
6,749,660 UART: [art] Signing Cert with AUTHO
6,750,140 UART: RITY.KEYID = 7
6,765,146 UART: [art] Erasing AUTHORITY.KEYID = 7
6,765,911 UART: [art] PUB.X = 92BDD04E80476A8213B987F3A13CAD10B5CCEADEA07CC741CD29408520E9CF69DA378C99DC62E2540B920827B61B601F
6,772,685 UART: [art] PUB.Y = 608DBBFD8889780FD43B74E3F44C5CF83882BAA3AB799D16CF474BEE256FF950EC0FFF2A790E89B162BB6357D91ED381
6,779,642 UART: [art] SIG.R = C915E6AD9565E4A3F7EBE740F72949A1B5983FF6531A40D437F9D42C4264B325CFAD8C0DF1B101402BCDF2BFFC17A9AF
6,786,424 UART: [art] SIG.S = 98C65C2B2442500981B56831955777F69DF8D35090673DF0A5C84198CC0957CCDD969BDA1A16B599DE720ACAEAF993DB
6,810,162 UART: Caliptra RT
6,810,415 UART: [state] CFI Enabled
7,091,375 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,122,284 UART: [rt]cmd =0x41545348, len=116
7,144,762 >>> mbox cmd response data (12 bytes)
7,144,763 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,174,804 UART: [rt]cmd =0x41545348, len=116
7,176,764 >>> mbox cmd response data (12 bytes)
7,176,765 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,299,492 UART: [rt]cmd =0x41544d4e, len=14344
7,444,486 >>> mbox cmd response data (8 bytes)
7,444,487 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,474,694 UART: [rt]cmd =0x41545348, len=116
7,496,132 >>> mbox cmd response data (12 bytes)
7,496,133 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,526,452 UART: [rt]cmd =0x41545348, len=116
7,528,241 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,478 UART: [kat] SHA2-256
882,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,524 UART: [kat] ++
886,676 UART: [kat] sha1
891,038 UART: [kat] SHA2-256
892,976 UART: [kat] SHA2-384
895,663 UART: [kat] SHA2-512-ACC
897,564 UART: [kat] ECC-384
903,151 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,476,876 UART: [cold-reset] ++
1,477,412 UART: [fht] Storing FHT @ 0x50003400
1,480,419 UART: [idev] ++
1,480,587 UART: [idev] CDI.KEYID = 6
1,480,947 UART: [idev] SUBJECT.KEYID = 7
1,481,371 UART: [idev] UDS.KEYID = 0
1,481,716 ready_for_fw is high
1,481,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,433 UART: [idev] Erasing UDS.KEYID = 0
1,506,129 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,583 UART: [idev] --
1,515,476 UART: [ldev] ++
1,515,644 UART: [ldev] CDI.KEYID = 6
1,516,007 UART: [ldev] SUBJECT.KEYID = 5
1,516,433 UART: [ldev] AUTHORITY.KEYID = 7
1,516,896 UART: [ldev] FE.KEYID = 1
1,522,284 UART: [ldev] Erasing FE.KEYID = 1
1,547,721 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,913 UART: [ldev] --
1,587,370 UART: [fwproc] Waiting for Commands...
1,588,047 UART: [fwproc] Received command 0x46574c44
1,588,838 UART: [fwproc] Received Image of size 114448 bytes
2,887,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,259 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,522 >>> mbox cmd response: success
3,081,546 UART: [afmc] ++
3,081,714 UART: [afmc] CDI.KEYID = 6
3,082,076 UART: [afmc] SUBJECT.KEYID = 7
3,082,501 UART: [afmc] AUTHORITY.KEYID = 5
3,117,032 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,480 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,260 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,873 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,563 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,416 UART: [afmc] --
3,160,518 UART: [cold-reset] --
3,161,494 UART: [state] Locking Datavault
3,162,643 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,247 UART: [state] Locking ICCM
3,163,847 UART: [exit] Launching FMC @ 0x40000130
3,169,176 UART:
3,169,192 UART: Running Caliptra FMC ...
3,169,600 UART:
3,169,743 UART: [state] CFI Enabled
3,180,774 UART: [fht] FMC Alias Private Key: 7
3,288,457 UART: [art] Extend RT PCRs Done
3,288,885 UART: [art] Lock RT PCRs Done
3,290,549 UART: [art] Populate DV Done
3,298,774 UART: [fht] FMC Alias Private Key: 7
3,299,800 UART: [art] Derive CDI
3,300,080 UART: [art] Store in in slot 0x4
3,385,419 UART: [art] Derive Key Pair
3,385,779 UART: [art] Store priv key in slot 0x5
3,399,087 UART: [art] Derive Key Pair - Done
3,413,909 UART: [art] Signing Cert with AUTHO
3,414,389 UART: RITY.KEYID = 7
3,429,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,480 UART: [art] PUB.X = 280A7179C97A36FC76771E865AD53340995A6C6B34FBD00B65A1DFD80A8331152EA24AEC302629DC2423108C368F9448
3,437,237 UART: [art] PUB.Y = A49F0878747FC30243BA8BADE63BE48CB17CD86C9CBFDDE6E5246DB96F75B4E63F923A328D9B809DC97C3986D5075A87
3,444,192 UART: [art] SIG.R = 7F1B131183C07BF01895406126E3D2825F946617710E7BFB689B993486284D0A42CBD854AC5D64CB7CBE3742E677A83F
3,450,952 UART: [art] SIG.S = 2C6F7AACC0161CA32D4E14CC39C61F63E217B37263779195155DD1F8F6A5BB9C15B5E479D55E655BEFD54FB8F4B1E746
3,474,663 UART: Caliptra RT
3,475,008 UART: [state] CFI Enabled
3,582,994 UART: [rt] RT listening for mailbox commands...
3,583,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,126 UART: [rt]cmd =0x41544d4e, len=14344
3,851,910 >>> mbox cmd response data (8 bytes)
3,851,911 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,850 UART: [rt]cmd =0x41545348, len=116
3,904,054 >>> mbox cmd response data (12 bytes)
3,904,055 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,062 UART: [rt]cmd =0x41545348, len=116
3,935,760 >>> mbox cmd response data (12 bytes)
3,935,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,495 UART:
3,936,511 UART: Running Caliptra ROM ...
3,936,919 UART:
3,937,060 UART: [state] CFI Enabled
3,939,674 UART: [state] LifecycleState = Unprovisioned
3,940,329 UART: [state] DebugLocked = No
3,940,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,942,480 UART: [kat] SHA2-256
4,736,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,740,526 UART: [kat] ++
4,740,678 UART: [kat] sha1
4,744,898 UART: [kat] SHA2-256
4,746,836 UART: [kat] SHA2-384
4,749,461 UART: [kat] SHA2-512-ACC
4,751,361 UART: [kat] ECC-384
4,756,990 UART: [kat] HMAC-384Kdf
4,761,506 UART: [kat] LMS
5,329,702 UART: [kat] --
5,330,317 UART: [update-reset] ++
6,667,996 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,669,074 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,819,124 >>> mbox cmd response: success
6,819,124 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,819,449 UART: [update-reset] Copying MAN_2 To MAN_1
6,827,463 UART: [update-reset Success] --
6,828,434 UART: [state] Locking Datavault
6,829,214 UART: [state] Locking PCR0, PCR1 and PCR31
6,829,818 UART: [state] Locking ICCM
6,830,280 UART: [exit] Launching FMC @ 0x40000130
6,835,609 UART:
6,835,625 UART: Running Caliptra FMC ...
6,836,033 UART:
6,836,176 UART: [state] CFI Enabled
6,925,679 UART: [art] Extend RT PCRs Done
6,926,107 UART: [art] Lock RT PCRs Done
6,927,454 UART: [art] Populate DV Done
6,935,887 UART: [fht] FMC Alias Private Key: 7
6,936,819 UART: [art] Derive CDI
6,937,099 UART: [art] Store in in slot 0x4
7,022,986 UART: [art] Derive Key Pair
7,023,346 UART: [art] Store priv key in slot 0x5
7,036,816 UART: [art] Derive Key Pair - Done
7,051,461 UART: [art] Signing Cert with AUTHO
7,051,941 UART: RITY.KEYID = 7
7,067,697 UART: [art] Erasing AUTHORITY.KEYID = 7
7,068,462 UART: [art] PUB.X = DEC929CF3DBEC88A429F35EDB4D5471ADD324A0236426A23890CA4614D0EDCF6FBAEE96CD59AB71F19B153E51DFEC9E9
7,075,249 UART: [art] PUB.Y = E7E75320354FD3F7F688C29BAADB492CE6C460924D4DE2F8F95D95C6DECB509F783BC85D47F349542C299F8079E5F68F
7,082,209 UART: [art] SIG.R = C5837EDF1F0F04C4C2D2F4EC0A5BD2DF2007A597887DC06CEDE91E0F10AA9889236BA8880E111D34DBCBC65389D6CC9B
7,088,981 UART: [art] SIG.S = CE8D67FB393DC89B94200877C2ACACDA6E618D5005CCFACE90AF618ABAB028697FD993D63E2D8F9DBC437132DEDEBC7B
7,113,510 UART: Caliptra RT
7,113,855 UART: [state] CFI Enabled
7,395,915 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,426,964 UART: [rt]cmd =0x41545348, len=116
7,448,676 >>> mbox cmd response data (12 bytes)
7,448,677 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,478,704 UART: [rt]cmd =0x41545348, len=116
7,480,328 >>> mbox cmd response data (12 bytes)
7,480,329 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,603,022 UART: [rt]cmd =0x41544d4e, len=14344
7,747,562 >>> mbox cmd response data (8 bytes)
7,747,563 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,777,544 UART: [rt]cmd =0x41545348, len=116
7,799,298 >>> mbox cmd response data (12 bytes)
7,799,299 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,829,386 UART: [rt]cmd =0x41545348, len=116
7,831,035 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,192 ready_for_fw is high
1,363,192 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,028 >>> mbox cmd response: success
2,992,274 UART:
2,992,290 UART: Running Caliptra FMC ...
2,992,698 UART:
2,992,841 UART: [state] CFI Enabled
3,003,582 UART: [fht] FMC Alias Private Key: 7
3,111,879 UART: [art] Extend RT PCRs Done
3,112,307 UART: [art] Lock RT PCRs Done
3,113,613 UART: [art] Populate DV Done
3,121,690 UART: [fht] FMC Alias Private Key: 7
3,122,704 UART: [art] Derive CDI
3,122,984 UART: [art] Store in in slot 0x4
3,208,717 UART: [art] Derive Key Pair
3,209,077 UART: [art] Store priv key in slot 0x5
3,222,413 UART: [art] Derive Key Pair - Done
3,236,998 UART: [art] Signing Cert with AUTHO
3,237,478 UART: RITY.KEYID = 7
3,253,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,827 UART: [art] PUB.X = F8901380282D5D8F7C746C3CE00434CC2AE0CF2FC2D6EE36B869B2695CF86EA62666BE1D8A2052013E9B65893748D83A
3,260,595 UART: [art] PUB.Y = 3B922C43214FE29CD0173AB0B2C962E07D1E16679F648F532538F6DCFD0743622E686D13B5EE70E5CCD48FC6E440D0E0
3,267,548 UART: [art] SIG.R = A095C63BA14BC9AF6AD110E225337F1B9C69AD9DA75DFFC2CC62D45ECE9B8FCBB75C6400C64450965DA1E0A8BD1F20C7
3,274,320 UART: [art] SIG.S = FA82190121D5AAB3A7CCA95F4E7DD5EF0AD433940C234A61FE4DD13C1EC89682FA8A1BA53EE31CBFD60C58B65EA18E31
3,298,931 UART: Caliptra RT
3,299,276 UART: [state] CFI Enabled
3,407,712 UART: [rt] RT listening for mailbox commands...
3,408,382 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,442 UART: [rt]cmd =0x41544d4e, len=14344
3,676,312 >>> mbox cmd response data (8 bytes)
3,676,313 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,364 UART: [rt]cmd =0x41545348, len=116
3,728,632 >>> mbox cmd response data (12 bytes)
3,728,633 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,604 UART: [rt]cmd =0x41545348, len=116
3,760,284 >>> mbox cmd response data (12 bytes)
3,760,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,523,690 >>> mbox cmd response: success
6,523,690 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,536,985 UART:
6,537,001 UART: Running Caliptra FMC ...
6,537,409 UART:
6,537,552 UART: [state] CFI Enabled
6,626,681 UART: [art] Extend RT PCRs Done
6,627,109 UART: [art] Lock RT PCRs Done
6,628,306 UART: [art] Populate DV Done
6,636,809 UART: [fht] FMC Alias Private Key: 7
6,637,755 UART: [art] Derive CDI
6,638,035 UART: [art] Store in in slot 0x4
6,723,824 UART: [art] Derive Key Pair
6,724,184 UART: [art] Store priv key in slot 0x5
6,737,236 UART: [art] Derive Key Pair - Done
6,751,562 UART: [art] Signing Cert with AUTHO
6,752,042 UART: RITY.KEYID = 7
6,767,514 UART: [art] Erasing AUTHORITY.KEYID = 7
6,768,279 UART: [art] PUB.X = CF44F8E61B883C54B00DFF2855D1B3477821825CD56BAB3D7E635CD2DB89EF694F529425BED21F82CAC09240FF57DB31
6,775,058 UART: [art] PUB.Y = 676E171FBA0D4800E1CB984A212FA744D9917012821BF30905C545EBF2E55E75AB769190752CDA3845A06C5E12C239E4
6,781,975 UART: [art] SIG.R = 60300949D3705E684C280C2AC4246BC8DF248B2DEF6CACE93C80EF2A4D797B3C3D5B2D6541413146D0075F50B7A1B4B3
6,788,742 UART: [art] SIG.S = 4DCA8354B3D8C67E741D8DDC823118C3E2C743705B973872CD1E5D8EB4E2850A34783810C17FC9D6E146043EF5D93804
6,812,146 UART: Caliptra RT
6,812,491 UART: [state] CFI Enabled
7,093,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,124,952 UART: [rt]cmd =0x41545348, len=116
7,146,830 >>> mbox cmd response data (12 bytes)
7,146,831 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,177,154 UART: [rt]cmd =0x41545348, len=116
7,178,836 >>> mbox cmd response data (12 bytes)
7,178,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,301,170 UART: [rt]cmd =0x41544d4e, len=14344
7,445,948 >>> mbox cmd response data (8 bytes)
7,445,949 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,475,908 UART: [rt]cmd =0x41545348, len=116
7,498,460 >>> mbox cmd response data (12 bytes)
7,498,461 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,528,528 UART: [rt]cmd =0x41545348, len=116
7,530,439 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
893,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,591 UART: [kat] ++
897,743 UART: [kat] sha1
901,907 UART: [kat] SHA2-256
903,847 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
917,840 UART: [kat] HMAC-384Kdf
922,360 UART: [kat] LMS
1,170,688 UART: [kat] --
1,171,591 UART: [cold-reset] ++
1,172,081 UART: [fht] FHT @ 0x50003400
1,174,684 UART: [idev] ++
1,174,852 UART: [idev] CDI.KEYID = 6
1,175,212 UART: [idev] SUBJECT.KEYID = 7
1,175,636 UART: [idev] UDS.KEYID = 0
1,175,981 ready_for_fw is high
1,175,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,608 UART: [idev] Erasing UDS.KEYID = 0
1,200,415 UART: [idev] Sha1 KeyId Algorithm
1,209,091 UART: [idev] --
1,210,121 UART: [ldev] ++
1,210,289 UART: [ldev] CDI.KEYID = 6
1,210,652 UART: [ldev] SUBJECT.KEYID = 5
1,211,078 UART: [ldev] AUTHORITY.KEYID = 7
1,211,541 UART: [ldev] FE.KEYID = 1
1,216,729 UART: [ldev] Erasing FE.KEYID = 1
1,243,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,009 UART: [ldev] --
1,282,362 UART: [fwproc] Wait for Commands...
1,283,000 UART: [fwproc] Recv command 0x46574c44
1,283,728 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,905 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,002 >>> mbox cmd response: success
2,778,180 UART: [afmc] ++
2,778,348 UART: [afmc] CDI.KEYID = 6
2,778,710 UART: [afmc] SUBJECT.KEYID = 7
2,779,135 UART: [afmc] AUTHORITY.KEYID = 5
2,814,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,283 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,896 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,615 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,501 UART: [afmc] --
2,857,557 UART: [cold-reset] --
2,858,301 UART: [state] Locking Datavault
2,859,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,894 UART: [state] Locking ICCM
2,860,490 UART: [exit] Launching FMC @ 0x40000130
2,865,819 UART:
2,865,835 UART: Running Caliptra FMC ...
2,866,243 UART:
2,866,297 UART: [state] CFI Enabled
2,876,934 UART: [fht] FMC Alias Private Key: 7
2,984,601 UART: [art] Extend RT PCRs Done
2,985,029 UART: [art] Lock RT PCRs Done
2,986,463 UART: [art] Populate DV Done
2,994,512 UART: [fht] FMC Alias Private Key: 7
2,995,482 UART: [art] Derive CDI
2,995,762 UART: [art] Store in in slot 0x4
3,081,335 UART: [art] Derive Key Pair
3,081,695 UART: [art] Store priv key in slot 0x5
3,095,081 UART: [art] Derive Key Pair - Done
3,109,721 UART: [art] Signing Cert with AUTHO
3,110,201 UART: RITY.KEYID = 7
3,125,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,006 UART: [art] PUB.X = 890F4A1DC675E9CD12069948D87D27C265E3C63A61BCE7B61DDD983B3E06D0E2CE829C6B550011924542B8D4C8216DE1
3,132,749 UART: [art] PUB.Y = 358A08465F19B07C3D0B86D1BE8AED5A669B9AC9A62374B19BC7376193C90C42231D69E212AFD364111D95583C3EE12C
3,139,692 UART: [art] SIG.R = 1DEB12F52057033362D75C8261D40EB2BABDAB523049D0FCD05CECAC80D1A037D472A14289823826C600C17B8EEA21CC
3,146,444 UART: [art] SIG.S = 23952223CB9887392AA41FB32EA71F3F3786DD0D903440EE95B966121C467279A23641F4826D80689846C15BDA3F938D
3,170,286 UART: Caliptra RT
3,170,539 UART: [state] CFI Enabled
3,278,188 UART: [rt] RT listening for mailbox commands...
3,278,858 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,054 UART: [rt]cmd =0x41544d4e, len=14344
3,547,326 >>> mbox cmd response data (8 bytes)
3,547,327 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,316 UART: [rt]cmd =0x41545348, len=116
3,599,564 >>> mbox cmd response data (12 bytes)
3,599,565 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,900 UART: [rt]cmd =0x41545348, len=116
3,631,696 >>> mbox cmd response data (12 bytes)
3,631,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,654 UART:
3,632,670 UART: Running Caliptra ROM ...
3,633,078 UART:
3,633,133 UART: [state] CFI Enabled
3,635,601 UART: [state] LifecycleState = Unprovisioned
3,636,256 UART: [state] DebugLocked = No
3,636,802 UART: [state] WD Timer not started. Device not locked for debugging
3,638,112 UART: [kat] SHA2-256
4,443,762 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,447,887 UART: [kat] ++
4,448,039 UART: [kat] sha1
4,452,285 UART: [kat] SHA2-256
4,454,225 UART: [kat] SHA2-384
4,457,092 UART: [kat] SHA2-512-ACC
4,458,992 UART: [kat] ECC-384
4,468,845 UART: [kat] HMAC-384Kdf
4,473,467 UART: [kat] LMS
4,721,795 UART: [kat] --
4,722,751 UART: [update-reset] ++
6,037,474 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,038,461 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,188,459 >>> mbox cmd response: success
6,188,459 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,188,600 UART: [update-reset] Copying MAN_2 To MAN_1
6,196,614 UART: [update-reset Success] --
6,197,613 UART: [state] Locking Datavault
6,198,467 UART: [state] Locking PCR0, PCR1 and PCR31
6,199,071 UART: [state] Locking ICCM
6,199,491 UART: [exit] Launching FMC @ 0x40000130
6,204,820 UART:
6,204,836 UART: Running Caliptra FMC ...
6,205,244 UART:
6,205,298 UART: [state] CFI Enabled
6,294,179 UART: [art] Extend RT PCRs Done
6,294,607 UART: [art] Lock RT PCRs Done
6,296,056 UART: [art] Populate DV Done
6,304,073 UART: [fht] FMC Alias Private Key: 7
6,305,223 UART: [art] Derive CDI
6,305,503 UART: [art] Store in in slot 0x4
6,390,914 UART: [art] Derive Key Pair
6,391,274 UART: [art] Store priv key in slot 0x5
6,403,792 UART: [art] Derive Key Pair - Done
6,418,810 UART: [art] Signing Cert with AUTHO
6,419,290 UART: RITY.KEYID = 7
6,434,470 UART: [art] Erasing AUTHORITY.KEYID = 7
6,435,235 UART: [art] PUB.X = 44FE959A946F45EC4EC7A2701009172C94BA0364B515F45B9AD6E9A55BE1BC316FABE603DB54AB664FBE12417373C23B
6,442,006 UART: [art] PUB.Y = 9E70C4C7A2EFC4F67FC8B6869C1C9F2A92F039786EC3C5FF8553828AF5E54C7C53AA7739D02F9F9E7284BDE2A5633A5A
6,448,970 UART: [art] SIG.R = 3314FFFE77E37F666E71C6FD2F116BA7BF7B56CA74FA51B6DF4216DEF63C9ECCD9664A39D178BD99E7F269430B7E96F0
6,455,755 UART: [art] SIG.S = B17EAFBF35D823CF27E4A79204EA08DED70F21B0957181599068B4D81F4C1F234D63A4BE0D7F71D24B77723B7C63D1A4
6,479,598 UART: Caliptra RT
6,479,851 UART: [state] CFI Enabled
6,766,696 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,797,771 UART: [rt]cmd =0x41545348, len=116
6,819,321 >>> mbox cmd response data (12 bytes)
6,819,322 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,849,391 UART: [rt]cmd =0x41545348, len=116
6,851,033 >>> mbox cmd response data (12 bytes)
6,851,034 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,973,553 UART: [rt]cmd =0x41544d4e, len=14344
7,117,989 >>> mbox cmd response data (8 bytes)
7,117,990 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,147,997 UART: [rt]cmd =0x41545348, len=116
7,169,989 >>> mbox cmd response data (12 bytes)
7,169,990 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,200,171 UART: [rt]cmd =0x41545348, len=116
7,201,942 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,813 ready_for_fw is high
1,060,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,197 >>> mbox cmd response: success
2,690,487 UART:
2,690,503 UART: Running Caliptra FMC ...
2,690,911 UART:
2,690,965 UART: [state] CFI Enabled
2,701,452 UART: [fht] FMC Alias Private Key: 7
2,809,301 UART: [art] Extend RT PCRs Done
2,809,729 UART: [art] Lock RT PCRs Done
2,811,015 UART: [art] Populate DV Done
2,819,172 UART: [fht] FMC Alias Private Key: 7
2,820,350 UART: [art] Derive CDI
2,820,630 UART: [art] Store in in slot 0x4
2,906,435 UART: [art] Derive Key Pair
2,906,795 UART: [art] Store priv key in slot 0x5
2,919,601 UART: [art] Derive Key Pair - Done
2,934,657 UART: [art] Signing Cert with AUTHO
2,935,137 UART: RITY.KEYID = 7
2,950,185 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,950 UART: [art] PUB.X = C6BCD450DED25F99900D9693E33C7F8A17617E808EA17A462A2F66A4F0673FE93BDBAECED6C71573827D64190BC10D64
2,957,721 UART: [art] PUB.Y = 536FD2F7FC8A57F6D799FC5C657CD30CCC304B7556F96F1989A8B07AB18DEB4B94ED584AC0C427D4B6EF6BF043D4FFCD
2,964,692 UART: [art] SIG.R = E9A5311A4D1A47E224D5B76644BC04DBE54F3D4CB5E32210B19F7DC5ABA87F0F461760E915637422C838A43C6B193F94
2,971,460 UART: [art] SIG.S = A13D8D3C0075FABE095121170EEFD32A5C86323CFB73E985125DBC199841582DB4775456DA37F7767EDA4D582C2CBF8E
2,994,893 UART: Caliptra RT
2,995,146 UART: [state] CFI Enabled
3,103,192 UART: [rt] RT listening for mailbox commands...
3,103,862 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,846 UART: [rt]cmd =0x41544d4e, len=14344
3,371,240 >>> mbox cmd response data (8 bytes)
3,371,241 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,216 UART: [rt]cmd =0x41545348, len=116
3,423,714 >>> mbox cmd response data (12 bytes)
3,423,715 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,453,830 UART: [rt]cmd =0x41545348, len=116
3,455,536 >>> mbox cmd response data (12 bytes)
3,455,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,895,920 >>> mbox cmd response: success
5,895,920 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,909,356 UART:
5,909,372 UART: Running Caliptra FMC ...
5,909,780 UART:
5,909,834 UART: [state] CFI Enabled
5,998,763 UART: [art] Extend RT PCRs Done
5,999,191 UART: [art] Lock RT PCRs Done
6,000,290 UART: [art] Populate DV Done
6,008,413 UART: [fht] FMC Alias Private Key: 7
6,009,401 UART: [art] Derive CDI
6,009,681 UART: [art] Store in in slot 0x4
6,095,124 UART: [art] Derive Key Pair
6,095,484 UART: [art] Store priv key in slot 0x5
6,108,382 UART: [art] Derive Key Pair - Done
6,122,731 UART: [art] Signing Cert with AUTHO
6,123,211 UART: RITY.KEYID = 7
6,138,471 UART: [art] Erasing AUTHORITY.KEYID = 7
6,139,236 UART: [art] PUB.X = 9CA394AA6DB7893DD6B22851DF2A37063DE6C5D7366E55531F5D500426C08D58C329B4581DF22D1135F50762215B246E
6,145,993 UART: [art] PUB.Y = 67B6702CB7BD8939118B026C61EFC1DB8C59F10209542978BD15DE51BB612A149DBADF0718D38BECC1EFD8A4C88D9CB7
6,152,947 UART: [art] SIG.R = 91443B12F785A2E50B23F12EC56E6E89A89F544EE5415C7784519C49ECB7D6BB71024F00CCB3C7B6C1F2139693BCB30A
6,159,692 UART: [art] SIG.S = AFDC8BF66A6CB40B3E96ACB57CF7CC56C0953C4B6E272B5A46FAC946E777E8A4E32AF53B5B320514533B303883080FDA
6,183,471 UART: Caliptra RT
6,183,724 UART: [state] CFI Enabled
6,463,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,493,915 UART: [rt]cmd =0x41545348, len=116
6,516,043 >>> mbox cmd response data (12 bytes)
6,516,044 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,546,199 UART: [rt]cmd =0x41545348, len=116
6,548,161 >>> mbox cmd response data (12 bytes)
6,548,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,670,799 UART: [rt]cmd =0x41544d4e, len=14344
6,814,945 >>> mbox cmd response data (8 bytes)
6,814,946 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,844,839 UART: [rt]cmd =0x41545348, len=116
6,866,971 >>> mbox cmd response data (12 bytes)
6,866,972 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,897,125 UART: [rt]cmd =0x41545348, len=116
6,899,010 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
893,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,844 UART: [kat] ++
897,996 UART: [kat] sha1
902,280 UART: [kat] SHA2-256
904,220 UART: [kat] SHA2-384
906,993 UART: [kat] SHA2-512-ACC
908,894 UART: [kat] ECC-384
918,869 UART: [kat] HMAC-384Kdf
923,513 UART: [kat] LMS
1,171,841 UART: [kat] --
1,172,728 UART: [cold-reset] ++
1,173,280 UART: [fht] FHT @ 0x50003400
1,175,945 UART: [idev] ++
1,176,113 UART: [idev] CDI.KEYID = 6
1,176,473 UART: [idev] SUBJECT.KEYID = 7
1,176,897 UART: [idev] UDS.KEYID = 0
1,177,242 ready_for_fw is high
1,177,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,661 UART: [idev] Erasing UDS.KEYID = 0
1,201,150 UART: [idev] Sha1 KeyId Algorithm
1,209,516 UART: [idev] --
1,210,616 UART: [ldev] ++
1,210,784 UART: [ldev] CDI.KEYID = 6
1,211,147 UART: [ldev] SUBJECT.KEYID = 5
1,211,573 UART: [ldev] AUTHORITY.KEYID = 7
1,212,036 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,243,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,776 UART: [ldev] --
1,283,037 UART: [fwproc] Wait for Commands...
1,283,783 UART: [fwproc] Recv command 0x46574c44
1,284,511 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,665 >>> mbox cmd response: success
2,777,849 UART: [afmc] ++
2,778,017 UART: [afmc] CDI.KEYID = 6
2,778,379 UART: [afmc] SUBJECT.KEYID = 7
2,778,804 UART: [afmc] AUTHORITY.KEYID = 5
2,814,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,820 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,548 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,433 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,152 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,046 UART: [afmc] --
2,858,118 UART: [cold-reset] --
2,858,922 UART: [state] Locking Datavault
2,860,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,687 UART: [state] Locking ICCM
2,861,201 UART: [exit] Launching FMC @ 0x40000130
2,866,530 UART:
2,866,546 UART: Running Caliptra FMC ...
2,866,954 UART:
2,867,097 UART: [state] CFI Enabled
2,878,016 UART: [fht] FMC Alias Private Key: 7
2,985,573 UART: [art] Extend RT PCRs Done
2,986,001 UART: [art] Lock RT PCRs Done
2,987,679 UART: [art] Populate DV Done
2,995,806 UART: [fht] FMC Alias Private Key: 7
2,996,850 UART: [art] Derive CDI
2,997,130 UART: [art] Store in in slot 0x4
3,082,643 UART: [art] Derive Key Pair
3,083,003 UART: [art] Store priv key in slot 0x5
3,096,169 UART: [art] Derive Key Pair - Done
3,111,031 UART: [art] Signing Cert with AUTHO
3,111,511 UART: RITY.KEYID = 7
3,126,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,712 UART: [art] PUB.X = 92003C5621BF3856AF6B9C3264207B0A70327FA862F0EBDE5F903A59E955FD531880DC3EAB05D52BAFEC8DC61AD9B577
3,134,466 UART: [art] PUB.Y = 22E033E5F279DB5843D8725B56372761F75A798DA0BB0B87F16411555B1DB7AFC38A76118A2E41F88609F4F7905C6739
3,141,404 UART: [art] SIG.R = BF7A0AA2B0EECAC2B407BB3B7263B7F66B0EB690F9FD6B6C3FA7669C5A8296D93E3AEDBD49C81F0D4FABF617BD730629
3,148,187 UART: [art] SIG.S = DC280F9D633487EDB8B24D165E23C2BEAD6BCA45D005F75E4A073F9962D81942FF812AEAAABF952CDB57E44E5C1966D8
3,172,281 UART: Caliptra RT
3,172,626 UART: [state] CFI Enabled
3,280,406 UART: [rt] RT listening for mailbox commands...
3,281,076 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,310 UART: [rt]cmd =0x41544d4e, len=14344
3,548,804 >>> mbox cmd response data (8 bytes)
3,548,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,658 UART: [rt]cmd =0x41545348, len=116
3,600,354 >>> mbox cmd response data (12 bytes)
3,600,355 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,504 UART: [rt]cmd =0x41545348, len=116
3,632,500 >>> mbox cmd response data (12 bytes)
3,632,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,332 UART:
3,633,348 UART: Running Caliptra ROM ...
3,633,756 UART:
3,633,898 UART: [state] CFI Enabled
3,636,560 UART: [state] LifecycleState = Unprovisioned
3,637,215 UART: [state] DebugLocked = No
3,637,821 UART: [state] WD Timer not started. Device not locked for debugging
3,639,085 UART: [kat] SHA2-256
4,444,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,448,860 UART: [kat] ++
4,449,012 UART: [kat] sha1
4,453,288 UART: [kat] SHA2-256
4,455,228 UART: [kat] SHA2-384
4,457,931 UART: [kat] SHA2-512-ACC
4,459,831 UART: [kat] ECC-384
4,469,790 UART: [kat] HMAC-384Kdf
4,474,406 UART: [kat] LMS
4,722,734 UART: [kat] --
4,723,744 UART: [update-reset] ++
6,037,347 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,038,536 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,188,534 >>> mbox cmd response: success
6,188,534 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,188,725 UART: [update-reset] Copying MAN_2 To MAN_1
6,196,739 UART: [update-reset Success] --
6,197,660 UART: [state] Locking Datavault
6,198,250 UART: [state] Locking PCR0, PCR1 and PCR31
6,198,854 UART: [state] Locking ICCM
6,199,308 UART: [exit] Launching FMC @ 0x40000130
6,204,637 UART:
6,204,653 UART: Running Caliptra FMC ...
6,205,061 UART:
6,205,204 UART: [state] CFI Enabled
6,294,657 UART: [art] Extend RT PCRs Done
6,295,085 UART: [art] Lock RT PCRs Done
6,296,564 UART: [art] Populate DV Done
6,305,007 UART: [fht] FMC Alias Private Key: 7
6,306,017 UART: [art] Derive CDI
6,306,297 UART: [art] Store in in slot 0x4
6,392,020 UART: [art] Derive Key Pair
6,392,380 UART: [art] Store priv key in slot 0x5
6,405,492 UART: [art] Derive Key Pair - Done
6,420,170 UART: [art] Signing Cert with AUTHO
6,420,650 UART: RITY.KEYID = 7
6,435,816 UART: [art] Erasing AUTHORITY.KEYID = 7
6,436,581 UART: [art] PUB.X = BFB92BE9992FD1DA209E102989E645AD4646F9A84A0C6C7AE18AF5FE0A53CE8FAA5323AE5993A6A759FE017F9AB15490
6,443,358 UART: [art] PUB.Y = E0F9424123F5FEF8C950DDB7483534973029D4F4319D99545722851E56A842D7C5E115BF9440858A1D0A1EEB450E7002
6,450,291 UART: [art] SIG.R = 862FF6DF17F6CB239AD2227F5FC175B70028429957E80BE54F947D209EA6048EA3F584981546219A88DE93BE670730A5
6,457,026 UART: [art] SIG.S = CB2D3BED6F1CAABB408093F56A9B0D10DB34EB8F46D037F252286560C0650CBA8DB30E135606982080C9DD8ED25F6A43
6,481,119 UART: Caliptra RT
6,481,464 UART: [state] CFI Enabled
6,762,578 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,793,669 UART: [rt]cmd =0x41545348, len=116
6,815,517 >>> mbox cmd response data (12 bytes)
6,815,518 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,845,527 UART: [rt]cmd =0x41545348, len=116
6,847,449 >>> mbox cmd response data (12 bytes)
6,847,450 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,969,925 UART: [rt]cmd =0x41544d4e, len=14344
7,114,725 >>> mbox cmd response data (8 bytes)
7,114,726 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,144,905 UART: [rt]cmd =0x41545348, len=116
7,167,139 >>> mbox cmd response data (12 bytes)
7,167,140 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,197,273 UART: [rt]cmd =0x41545348, len=116
7,199,024 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,498 ready_for_fw is high
1,060,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,370 >>> mbox cmd response: success
2,691,678 UART:
2,691,694 UART: Running Caliptra FMC ...
2,692,102 UART:
2,692,245 UART: [state] CFI Enabled
2,702,970 UART: [fht] FMC Alias Private Key: 7
2,811,183 UART: [art] Extend RT PCRs Done
2,811,611 UART: [art] Lock RT PCRs Done
2,813,215 UART: [art] Populate DV Done
2,821,462 UART: [fht] FMC Alias Private Key: 7
2,822,398 UART: [art] Derive CDI
2,822,678 UART: [art] Store in in slot 0x4
2,908,577 UART: [art] Derive Key Pair
2,908,937 UART: [art] Store priv key in slot 0x5
2,922,347 UART: [art] Derive Key Pair - Done
2,937,112 UART: [art] Signing Cert with AUTHO
2,937,592 UART: RITY.KEYID = 7
2,953,064 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,829 UART: [art] PUB.X = 3E3390B84C0146E872543E6C847AF29AE5F4814C9059096FAE344BD29E3ABBEEAC26ED0F5D6D6114B0503E09B7FD7B00
2,960,575 UART: [art] PUB.Y = FDC0B064EAF146D787637D28C55FFFDE7E94438B9124C563E1C0408D03030B50C85258D8BAC13EB1A7E64C9FD809D4E5
2,967,523 UART: [art] SIG.R = E3E2DED47FF03D09C34754341BB91104140214A33EC0EEEE02876AD3FFB75A90BC34B3A635CEFC1D0B680488D0576275
2,974,283 UART: [art] SIG.S = 9BBD14AB8728D20110AF6D6D00D9D125E4764D4733D67AF4D55D28ED61DE60F690F30B9CA3CF41197548FA541677061F
2,998,065 UART: Caliptra RT
2,998,410 UART: [state] CFI Enabled
3,105,270 UART: [rt] RT listening for mailbox commands...
3,105,940 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,860 UART: [rt]cmd =0x41544d4e, len=14344
3,373,394 >>> mbox cmd response data (8 bytes)
3,373,395 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,166 UART: [rt]cmd =0x41545348, len=116
3,425,080 >>> mbox cmd response data (12 bytes)
3,425,081 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,455,204 UART: [rt]cmd =0x41545348, len=116
3,457,132 >>> mbox cmd response data (12 bytes)
3,457,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,896,473 >>> mbox cmd response: success
5,896,473 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,909,897 UART:
5,909,913 UART: Running Caliptra FMC ...
5,910,321 UART:
5,910,464 UART: [state] CFI Enabled
5,999,055 UART: [art] Extend RT PCRs Done
5,999,483 UART: [art] Lock RT PCRs Done
6,000,504 UART: [art] Populate DV Done
6,009,035 UART: [fht] FMC Alias Private Key: 7
6,010,033 UART: [art] Derive CDI
6,010,313 UART: [art] Store in in slot 0x4
6,096,094 UART: [art] Derive Key Pair
6,096,454 UART: [art] Store priv key in slot 0x5
6,109,762 UART: [art] Derive Key Pair - Done
6,124,108 UART: [art] Signing Cert with AUTHO
6,124,588 UART: RITY.KEYID = 7
6,139,922 UART: [art] Erasing AUTHORITY.KEYID = 7
6,140,687 UART: [art] PUB.X = 2C5325360F0BCCC5522E3A79F6C61D97D592F281A8DE14AF9A3319E37064199C519E6F676C14738D001030A55695F4C5
6,147,423 UART: [art] PUB.Y = 8059A1376B7E7F1C8FA69DD919EAFBC7874298445EF664DD7B14EB408400A3E647104BDA32CE66973744AD5146190C2D
6,154,350 UART: [art] SIG.R = A2D3B7868F1B7D58C6CDD85E14846969BE08EC9E7785068A0089F99D9716BB906D63CFD8DA6708DC9B2712A3446D34A8
6,161,093 UART: [art] SIG.S = 0C644774E841971DB6C1BF47165AFCB07CC1E4CC840BD297993458FE9916D6254C605E5D490D73A999C49A2548D3554B
6,185,251 UART: Caliptra RT
6,185,596 UART: [state] CFI Enabled
6,463,585 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,494,358 UART: [rt]cmd =0x41545348, len=116
6,516,140 >>> mbox cmd response data (12 bytes)
6,516,141 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,546,292 UART: [rt]cmd =0x41545348, len=116
6,548,180 >>> mbox cmd response data (12 bytes)
6,548,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,670,460 UART: [rt]cmd =0x41544d4e, len=14344
6,816,232 >>> mbox cmd response data (8 bytes)
6,816,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,846,288 UART: [rt]cmd =0x41545348, len=116
6,868,128 >>> mbox cmd response data (12 bytes)
6,868,129 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,898,160 UART: [rt]cmd =0x41545348, len=116
6,899,975 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,491 UART: [kat] SHA2-256
901,431 UART: [kat] SHA2-384
904,068 UART: [kat] SHA2-512-ACC
905,969 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,653 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,637 UART: [idev] ++
1,172,805 UART: [idev] CDI.KEYID = 6
1,173,166 UART: [idev] SUBJECT.KEYID = 7
1,173,591 UART: [idev] UDS.KEYID = 0
1,173,937 ready_for_fw is high
1,173,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,631 UART: [idev] Erasing UDS.KEYID = 0
1,198,859 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,408 UART: [ldev] Erasing FE.KEYID = 1
1,242,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,946 UART: [ldev] --
1,281,346 UART: [fwproc] Wait for Commands...
1,282,019 UART: [fwproc] Recv command 0x46574c44
1,282,752 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,332 >>> mbox cmd response: success
2,775,497 UART: [afmc] ++
2,775,665 UART: [afmc] CDI.KEYID = 6
2,776,028 UART: [afmc] SUBJECT.KEYID = 7
2,776,454 UART: [afmc] AUTHORITY.KEYID = 5
2,812,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,975 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,858 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,577 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,290 UART: [afmc] --
2,855,414 UART: [cold-reset] --
2,856,562 UART: [state] Locking Datavault
2,857,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,387 UART: [state] Locking ICCM
2,858,959 UART: [exit] Launching FMC @ 0x40000130
2,864,288 UART:
2,864,304 UART: Running Caliptra FMC ...
2,864,712 UART:
2,864,766 UART: [state] CFI Enabled
2,875,281 UART: [fht] FMC Alias Private Key: 7
2,982,850 UART: [art] Extend RT PCRs Done
2,983,278 UART: [art] Lock RT PCRs Done
2,984,828 UART: [art] Populate DV Done
2,993,113 UART: [fht] FMC Alias Private Key: 7
2,994,057 UART: [art] Derive CDI
2,994,337 UART: [art] Store in in slot 0x4
3,080,228 UART: [art] Derive Key Pair
3,080,588 UART: [art] Store priv key in slot 0x5
3,093,670 UART: [art] Derive Key Pair - Done
3,108,497 UART: [art] Signing Cert with AUTHO
3,108,977 UART: RITY.KEYID = 7
3,123,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,344 UART: [art] PUB.X = B31FC52FA3FD41A8F4738CA7138D5901C4A31F3DEF75EC742CC77ABA274793D35B7E53B7C27892B923202802366A032B
3,131,109 UART: [art] PUB.Y = B2DE6F3FC34DF93E2F5AEDD7BE0ABBD94C3AADCF92B1026C47E2902E39AABE52BF4D5C7537460346BD9C67A5EFDCD4FF
3,138,086 UART: [art] SIG.R = B6F7C9565F5F7449BDED8ECAAB5E9B19B75034F7B6FD2AF6DEB2ADEC882CCFBF90779424B4317C34CCA0876F39B98739
3,144,878 UART: [art] SIG.S = 2ABC63FA82EF8EEA5D3C92BB429E03028E5A9A681B57F1CB5675392D15C115DEA90B1164C1A8165D17CC241AC231CBDD
3,168,942 UART: Caliptra RT
3,169,195 UART: [state] CFI Enabled
3,276,782 UART: [rt] RT listening for mailbox commands...
3,277,452 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,530 UART: [rt]cmd =0x41544d4e, len=14344
3,545,128 >>> mbox cmd response data (8 bytes)
3,545,129 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,292 UART: [rt]cmd =0x41545348, len=116
3,597,296 >>> mbox cmd response data (12 bytes)
3,597,297 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,276 UART: [rt]cmd =0x41545348, len=116
3,629,230 >>> mbox cmd response data (12 bytes)
3,629,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,678 UART:
3,629,694 UART: Running Caliptra ROM ...
3,630,102 UART:
3,630,157 UART: [state] CFI Enabled
3,632,947 UART: [state] LifecycleState = Unprovisioned
3,633,602 UART: [state] DebugLocked = No
3,634,126 UART: [state] WD Timer not started. Device not locked for debugging
3,635,330 UART: [kat] SHA2-256
4,438,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,443,009 UART: [kat] ++
4,443,161 UART: [kat] sha1
4,447,433 UART: [kat] SHA2-256
4,449,373 UART: [kat] SHA2-384
4,452,148 UART: [kat] SHA2-512-ACC
4,454,048 UART: [kat] ECC-384
4,463,909 UART: [kat] HMAC-384Kdf
4,468,335 UART: [kat] LMS
4,716,647 UART: [kat] --
4,717,347 UART: [update-reset] ++
6,031,725 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,032,736 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,182,734 >>> mbox cmd response: success
6,182,734 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,183,021 UART: [update-reset] Copying MAN_2 To MAN_1
6,191,035 UART: [update-reset Success] --
6,192,098 UART: [state] Locking Datavault
6,193,076 UART: [state] Locking PCR0, PCR1 and PCR31
6,193,680 UART: [state] Locking ICCM
6,194,182 UART: [exit] Launching FMC @ 0x40000130
6,199,511 UART:
6,199,527 UART: Running Caliptra FMC ...
6,199,935 UART:
6,199,989 UART: [state] CFI Enabled
6,288,874 UART: [art] Extend RT PCRs Done
6,289,302 UART: [art] Lock RT PCRs Done
6,290,461 UART: [art] Populate DV Done
6,298,486 UART: [fht] FMC Alias Private Key: 7
6,299,458 UART: [art] Derive CDI
6,299,738 UART: [art] Store in in slot 0x4
6,385,165 UART: [art] Derive Key Pair
6,385,525 UART: [art] Store priv key in slot 0x5
6,398,749 UART: [art] Derive Key Pair - Done
6,413,404 UART: [art] Signing Cert with AUTHO
6,413,884 UART: RITY.KEYID = 7
6,429,062 UART: [art] Erasing AUTHORITY.KEYID = 7
6,429,827 UART: [art] PUB.X = 6AA265ABDA95A3EC86A097FD8843ADD127F8B68D95F50A815DBC5498B8CB50BCF9029FCFBDEBCBC87F38B65639AE8506
6,436,612 UART: [art] PUB.Y = 3CE2D769A49E36CD889A7D93535B009601577D8269C430975B1E6006A82CECBE9B980F1AA3FBC7F1B28F332BDF45CBAA
6,443,543 UART: [art] SIG.R = 32E61900E123F93D1FF0704F0D9DFDBBF1560F6C64FC8ACDB7A1A4DA0DDB3E7A76E83109BE791FEAA4C246BCB91B25F1
6,450,305 UART: [art] SIG.S = C892D5B758BEBCE8C27F50C366057153FAF75608F69986F3FDB8577169FF7EF82F44994C50B2E55CA77F19D315B214A5
6,474,634 UART: Caliptra RT
6,474,887 UART: [state] CFI Enabled
6,757,290 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,788,329 UART: [rt]cmd =0x41545348, len=116
6,810,855 >>> mbox cmd response data (12 bytes)
6,810,856 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,840,893 UART: [rt]cmd =0x41545348, len=116
6,842,613 >>> mbox cmd response data (12 bytes)
6,842,614 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,965,265 UART: [rt]cmd =0x41544d4e, len=14344
7,110,745 >>> mbox cmd response data (8 bytes)
7,110,746 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,140,981 UART: [rt]cmd =0x41545348, len=116
7,162,959 >>> mbox cmd response data (12 bytes)
7,162,960 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,193,167 UART: [rt]cmd =0x41545348, len=116
7,194,898 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,554 ready_for_fw is high
1,055,554 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,760 >>> mbox cmd response: success
2,685,850 UART:
2,685,866 UART: Running Caliptra FMC ...
2,686,274 UART:
2,686,328 UART: [state] CFI Enabled
2,697,081 UART: [fht] FMC Alias Private Key: 7
2,805,246 UART: [art] Extend RT PCRs Done
2,805,674 UART: [art] Lock RT PCRs Done
2,807,350 UART: [art] Populate DV Done
2,815,371 UART: [fht] FMC Alias Private Key: 7
2,816,405 UART: [art] Derive CDI
2,816,685 UART: [art] Store in in slot 0x4
2,902,584 UART: [art] Derive Key Pair
2,902,944 UART: [art] Store priv key in slot 0x5
2,915,918 UART: [art] Derive Key Pair - Done
2,930,769 UART: [art] Signing Cert with AUTHO
2,931,249 UART: RITY.KEYID = 7
2,946,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,254 UART: [art] PUB.X = 6DE7C08C06AB271F213F86E30B34590B9F6B33E73F25AF71403783D0284F02891FC2EA98D3BD4E14D1AA33E4C741C2FA
2,954,020 UART: [art] PUB.Y = 06B07F56443798772CC092E4EC7AB3B6AC3F9361813BC6228D20B96232D1CF62205B001012578F71A5411B3F5BD977BF
2,960,941 UART: [art] SIG.R = 10503ACD63BF5A3596887754220DC3E82CF72FDADD624F785C33AF5D7B2FED5EE1A1DE2CB1A38D8996E8DBD6AF461827
2,967,726 UART: [art] SIG.S = AD88CC4BAFA2A939E880A07C22028A2C79D36626342618310D63FF1BCD8767420792E4AA0C95E631A3A18B3815D189C2
2,991,167 UART: Caliptra RT
2,991,420 UART: [state] CFI Enabled
3,099,037 UART: [rt] RT listening for mailbox commands...
3,099,707 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,735 UART: [rt]cmd =0x41544d4e, len=14344
3,367,961 >>> mbox cmd response data (8 bytes)
3,367,962 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,029 UART: [rt]cmd =0x41545348, len=116
3,419,377 >>> mbox cmd response data (12 bytes)
3,419,378 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,445 UART: [rt]cmd =0x41545348, len=116
3,451,383 >>> mbox cmd response data (12 bytes)
3,451,384 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,886,074 >>> mbox cmd response: success
5,886,074 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,899,722 UART:
5,899,738 UART: Running Caliptra FMC ...
5,900,146 UART:
5,900,200 UART: [state] CFI Enabled
5,988,869 UART: [art] Extend RT PCRs Done
5,989,297 UART: [art] Lock RT PCRs Done
5,990,708 UART: [art] Populate DV Done
5,999,053 UART: [fht] FMC Alias Private Key: 7
5,999,999 UART: [art] Derive CDI
6,000,279 UART: [art] Store in in slot 0x4
6,085,776 UART: [art] Derive Key Pair
6,086,136 UART: [art] Store priv key in slot 0x5
6,099,280 UART: [art] Derive Key Pair - Done
6,113,968 UART: [art] Signing Cert with AUTHO
6,114,448 UART: RITY.KEYID = 7
6,129,314 UART: [art] Erasing AUTHORITY.KEYID = 7
6,130,079 UART: [art] PUB.X = 3A305EBB100BFC7587CAB4C92E8CFDB5D9016220E897A2407773E056EBD3506467E333B3E89645B8B6B45D3E4837F31B
6,136,847 UART: [art] PUB.Y = ECBFA8DD7A8CFCADF366B3C218EB6A779FAB09199499BC028E2C45CE696B1499F9887A816A72F691FD7F07613D0C1729
6,143,799 UART: [art] SIG.R = B2385CD4487C3179D4C92A9BA436497C61088C632E13420BD5A7FF6878628ED3FFB21E9FD2218A0BF3AF63293181F3ED
6,150,564 UART: [art] SIG.S = A9A947804C10B2DDC9F5BF58027646185AE3920FE55CB7DC9222FFB1719647A16921546DBAFD9A92D2D4E627BA29A9D6
6,173,803 UART: Caliptra RT
6,174,056 UART: [state] CFI Enabled
6,452,654 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,483,341 UART: [rt]cmd =0x41545348, len=116
6,505,191 >>> mbox cmd response data (12 bytes)
6,505,192 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,535,417 UART: [rt]cmd =0x41545348, len=116
6,537,019 >>> mbox cmd response data (12 bytes)
6,537,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,659,537 UART: [rt]cmd =0x41544d4e, len=14344
6,804,519 >>> mbox cmd response data (8 bytes)
6,804,520 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,834,657 UART: [rt]cmd =0x41545348, len=116
6,857,663 >>> mbox cmd response data (12 bytes)
6,857,664 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,887,909 UART: [rt]cmd =0x41545348, len=116
6,889,634 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,829 UART: [state] LifecycleState = Unprovisioned
85,484 UART: [state] DebugLocked = No
86,020 UART: [state] WD Timer not started. Device not locked for debugging
87,141 UART: [kat] SHA2-256
890,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,820 UART: [kat] ++
894,972 UART: [kat] sha1
899,166 UART: [kat] SHA2-256
901,106 UART: [kat] SHA2-384
903,907 UART: [kat] SHA2-512-ACC
905,808 UART: [kat] ECC-384
915,521 UART: [kat] HMAC-384Kdf
920,159 UART: [kat] LMS
1,168,471 UART: [kat] --
1,169,520 UART: [cold-reset] ++
1,170,028 UART: [fht] FHT @ 0x50003400
1,172,690 UART: [idev] ++
1,172,858 UART: [idev] CDI.KEYID = 6
1,173,219 UART: [idev] SUBJECT.KEYID = 7
1,173,644 UART: [idev] UDS.KEYID = 0
1,173,990 ready_for_fw is high
1,173,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,198,952 UART: [idev] Sha1 KeyId Algorithm
1,207,832 UART: [idev] --
1,208,739 UART: [ldev] ++
1,208,907 UART: [ldev] CDI.KEYID = 6
1,209,271 UART: [ldev] SUBJECT.KEYID = 5
1,209,698 UART: [ldev] AUTHORITY.KEYID = 7
1,210,161 UART: [ldev] FE.KEYID = 1
1,215,857 UART: [ldev] Erasing FE.KEYID = 1
1,242,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,385 UART: [ldev] --
1,281,841 UART: [fwproc] Wait for Commands...
1,282,444 UART: [fwproc] Recv command 0x46574c44
1,283,177 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,557 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,557 >>> mbox cmd response: success
2,775,760 UART: [afmc] ++
2,775,928 UART: [afmc] CDI.KEYID = 6
2,776,291 UART: [afmc] SUBJECT.KEYID = 7
2,776,717 UART: [afmc] AUTHORITY.KEYID = 5
2,812,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,248 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,131 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,850 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,781 UART: [afmc] --
2,856,845 UART: [cold-reset] --
2,857,537 UART: [state] Locking Datavault
2,858,750 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,354 UART: [state] Locking ICCM
2,859,914 UART: [exit] Launching FMC @ 0x40000130
2,865,243 UART:
2,865,259 UART: Running Caliptra FMC ...
2,865,667 UART:
2,865,810 UART: [state] CFI Enabled
2,876,297 UART: [fht] FMC Alias Private Key: 7
2,984,120 UART: [art] Extend RT PCRs Done
2,984,548 UART: [art] Lock RT PCRs Done
2,986,036 UART: [art] Populate DV Done
2,994,211 UART: [fht] FMC Alias Private Key: 7
2,995,211 UART: [art] Derive CDI
2,995,491 UART: [art] Store in in slot 0x4
3,080,942 UART: [art] Derive Key Pair
3,081,302 UART: [art] Store priv key in slot 0x5
3,094,492 UART: [art] Derive Key Pair - Done
3,109,230 UART: [art] Signing Cert with AUTHO
3,109,710 UART: RITY.KEYID = 7
3,125,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,811 UART: [art] PUB.X = B3497E4CB727F10D39EE586700E7D84CBC8D91E60B91C9FBCAEDFF76246A62EBD650A828C4BF3B6EE9AD1E609F0D0FEA
3,132,573 UART: [art] PUB.Y = 4B28A03A0222C715E15D97563EB878E36D9A79FC4E69C6CFB4EF55E6D6DFF4D2CAE8F1F22B603BCE8C34A536F5028505
3,139,528 UART: [art] SIG.R = 77FCB296959F50DE9AFDE68016ADBF9A706630CE8AE735642A97F7AB90A43E0E6A71931C330C38A795908D1E7D395778
3,146,296 UART: [art] SIG.S = 4128DA37AF330C6554793DF2B14512E616DD2E0AE9700170954E2778B4DBA560B69220FE35020CBE08C2F0CE196C6A42
3,170,329 UART: Caliptra RT
3,170,674 UART: [state] CFI Enabled
3,278,695 UART: [rt] RT listening for mailbox commands...
3,279,365 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,459 UART: [rt]cmd =0x41544d4e, len=14344
3,546,729 >>> mbox cmd response data (8 bytes)
3,546,730 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,475 UART: [rt]cmd =0x41545348, len=116
3,598,377 >>> mbox cmd response data (12 bytes)
3,598,378 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,333 UART: [rt]cmd =0x41545348, len=116
3,629,919 >>> mbox cmd response data (12 bytes)
3,629,920 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,949 UART:
3,630,965 UART: Running Caliptra ROM ...
3,631,373 UART:
3,631,515 UART: [state] CFI Enabled
3,634,271 UART: [state] LifecycleState = Unprovisioned
3,634,926 UART: [state] DebugLocked = No
3,635,624 UART: [state] WD Timer not started. Device not locked for debugging
3,636,822 UART: [kat] SHA2-256
4,440,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,444,501 UART: [kat] ++
4,444,653 UART: [kat] sha1
4,448,953 UART: [kat] SHA2-256
4,450,893 UART: [kat] SHA2-384
4,453,564 UART: [kat] SHA2-512-ACC
4,455,464 UART: [kat] ECC-384
4,465,065 UART: [kat] HMAC-384Kdf
4,469,645 UART: [kat] LMS
4,717,957 UART: [kat] --
4,718,833 UART: [update-reset] ++
6,032,685 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,033,664 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,183,662 >>> mbox cmd response: success
6,183,662 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,183,885 UART: [update-reset] Copying MAN_2 To MAN_1
6,191,899 UART: [update-reset Success] --
6,192,828 UART: [state] Locking Datavault
6,193,658 UART: [state] Locking PCR0, PCR1 and PCR31
6,194,262 UART: [state] Locking ICCM
6,194,760 UART: [exit] Launching FMC @ 0x40000130
6,200,089 UART:
6,200,105 UART: Running Caliptra FMC ...
6,200,513 UART:
6,200,656 UART: [state] CFI Enabled
6,289,663 UART: [art] Extend RT PCRs Done
6,290,091 UART: [art] Lock RT PCRs Done
6,291,190 UART: [art] Populate DV Done
6,299,413 UART: [fht] FMC Alias Private Key: 7
6,300,511 UART: [art] Derive CDI
6,300,791 UART: [art] Store in in slot 0x4
6,386,668 UART: [art] Derive Key Pair
6,387,028 UART: [art] Store priv key in slot 0x5
6,400,270 UART: [art] Derive Key Pair - Done
6,414,962 UART: [art] Signing Cert with AUTHO
6,415,442 UART: RITY.KEYID = 7
6,430,790 UART: [art] Erasing AUTHORITY.KEYID = 7
6,431,555 UART: [art] PUB.X = 3D0AB3214C0C27642FA35C568C735CC077AED90538F3D7BB9762040CE73F1C0519AE8CA093F01C032BC17C971670E2AB
6,438,310 UART: [art] PUB.Y = AB68915C6CC71EE507EFC8FB1B18741329D080881BCA25D58828F1E3BC7C2FBC2E328056DACDDCBA6D9ADAF388D97B75
6,445,279 UART: [art] SIG.R = 30F22E02B8CE512948057235B05E7E77C567F75BFB33DD916199292CE3ECC697E80A021F917091D85710A9B09CD72062
6,452,031 UART: [art] SIG.S = E0C615499686D405ECE682D6780DE54AF51BD446A98C90A14823E0D9A42CAD3FBE6A209BD708B2DAB3F45CACE55024AE
6,475,701 UART: Caliptra RT
6,476,046 UART: [state] CFI Enabled
6,758,239 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,788,958 UART: [rt]cmd =0x41545348, len=116
6,810,674 >>> mbox cmd response data (12 bytes)
6,810,675 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,840,558 UART: [rt]cmd =0x41545348, len=116
6,842,518 >>> mbox cmd response data (12 bytes)
6,842,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,965,096 UART: [rt]cmd =0x41544d4e, len=14344
7,109,960 >>> mbox cmd response data (8 bytes)
7,109,961 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,140,020 UART: [rt]cmd =0x41545348, len=116
7,162,004 >>> mbox cmd response data (12 bytes)
7,162,005 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,192,016 UART: [rt]cmd =0x41545348, len=116
7,193,773 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,005 ready_for_fw is high
1,057,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,689 >>> mbox cmd response: success
2,686,821 UART:
2,686,837 UART: Running Caliptra FMC ...
2,687,245 UART:
2,687,388 UART: [state] CFI Enabled
2,697,857 UART: [fht] FMC Alias Private Key: 7
2,805,782 UART: [art] Extend RT PCRs Done
2,806,210 UART: [art] Lock RT PCRs Done
2,807,846 UART: [art] Populate DV Done
2,815,901 UART: [fht] FMC Alias Private Key: 7
2,817,081 UART: [art] Derive CDI
2,817,361 UART: [art] Store in in slot 0x4
2,903,220 UART: [art] Derive Key Pair
2,903,580 UART: [art] Store priv key in slot 0x5
2,916,594 UART: [art] Derive Key Pair - Done
2,931,313 UART: [art] Signing Cert with AUTHO
2,931,793 UART: RITY.KEYID = 7
2,946,987 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,752 UART: [art] PUB.X = 516FF288696AE714F1E95524512B28D5FB4473CEE4697F7065908AEADA0B824062F1AD0668BD82B111E18A9A3501DC4C
2,954,515 UART: [art] PUB.Y = 86D372B9C2EC278FFEAAAD42121A67DE60F25AF7EE6A35C749E735152F1399E6FE1C8EC85BAD0E5396CA9792AB528843
2,961,476 UART: [art] SIG.R = 06174C69344CC40FFB665A607384AA0ADB2BF1013751BDAD1D094CE9C195740802C624F04993E4AD78635C432ADACB96
2,968,229 UART: [art] SIG.S = B6A2F1A0291FDCDCCF0CA349F28638D7F9C2B3E77FF26D7E8E4B7DFCFE06A75AD07A250DB566F84D1A02B9FFFAF085BF
2,992,228 UART: Caliptra RT
2,992,573 UART: [state] CFI Enabled
3,099,518 UART: [rt] RT listening for mailbox commands...
3,100,188 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,066 UART: [rt]cmd =0x41544d4e, len=14344
3,367,868 >>> mbox cmd response data (8 bytes)
3,367,869 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,134 UART: [rt]cmd =0x41545348, len=116
3,419,712 >>> mbox cmd response data (12 bytes)
3,419,713 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,868 UART: [rt]cmd =0x41545348, len=116
3,451,610 >>> mbox cmd response data (12 bytes)
3,451,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,887,768 >>> mbox cmd response: success
5,887,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,901,348 UART:
5,901,364 UART: Running Caliptra FMC ...
5,901,772 UART:
5,901,915 UART: [state] CFI Enabled
5,990,994 UART: [art] Extend RT PCRs Done
5,991,422 UART: [art] Lock RT PCRs Done
5,992,465 UART: [art] Populate DV Done
6,000,788 UART: [fht] FMC Alias Private Key: 7
6,001,782 UART: [art] Derive CDI
6,002,062 UART: [art] Store in in slot 0x4
6,088,103 UART: [art] Derive Key Pair
6,088,463 UART: [art] Store priv key in slot 0x5
6,102,367 UART: [art] Derive Key Pair - Done
6,117,117 UART: [art] Signing Cert with AUTHO
6,117,597 UART: RITY.KEYID = 7
6,132,779 UART: [art] Erasing AUTHORITY.KEYID = 7
6,133,544 UART: [art] PUB.X = 84F9D2AB8162731782E5CCB16512AB369FABC562F9F025A872B49210E8116A19B93499FBB55E29B2525C95F729EAAC22
6,140,316 UART: [art] PUB.Y = B6F8DE04DB1656A3215265C6E5277BB3EBAC8BE268787705BEEAD7169621569957D72E7E71911284BD48EE9EA4718906
6,147,257 UART: [art] SIG.R = 42D61C5CFA7EE1B6C0D06CDE92C99C9712F148AD05B6EFA57D86B041D05907EE373B0DB536872A6F09B9656AA6CB1419
6,154,027 UART: [art] SIG.S = E296031177BC3BD9D6BF36C164257682019D18119E0E147593636B0682446A85AE764545E860A96EE513C0C6142E10CE
6,177,280 UART: Caliptra RT
6,177,625 UART: [state] CFI Enabled
6,464,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,495,637 UART: [rt]cmd =0x41545348, len=116
6,517,353 >>> mbox cmd response data (12 bytes)
6,517,354 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,547,403 UART: [rt]cmd =0x41545348, len=116
6,549,037 >>> mbox cmd response data (12 bytes)
6,549,038 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,671,717 UART: [rt]cmd =0x41544d4e, len=14344
6,816,287 >>> mbox cmd response data (8 bytes)
6,816,288 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,846,485 UART: [rt]cmd =0x41545348, len=116
6,868,523 >>> mbox cmd response data (12 bytes)
6,868,524 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,898,865 UART: [rt]cmd =0x41545348, len=116
6,900,632 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,279 UART:
192,640 UART: Running Caliptra ROM ...
193,830 UART:
193,981 UART: [state] CFI Enabled
263,890 UART: [state] LifecycleState = Unprovisioned
265,892 UART: [state] DebugLocked = No
267,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,307 UART: [kat] SHA2-256
442,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,508 UART: [kat] ++
452,996 UART: [kat] sha1
462,968 UART: [kat] SHA2-256
465,700 UART: [kat] SHA2-384
472,472 UART: [kat] SHA2-512-ACC
474,835 UART: [kat] ECC-384
2,769,707 UART: [kat] HMAC-384Kdf
2,800,071 UART: [kat] LMS
3,990,387 UART: [kat] --
3,996,663 UART: [cold-reset] ++
3,998,338 UART: [fht] Storing FHT @ 0x50003400
4,010,048 UART: [idev] ++
4,010,625 UART: [idev] CDI.KEYID = 6
4,011,537 UART: [idev] SUBJECT.KEYID = 7
4,012,788 UART: [idev] UDS.KEYID = 0
4,013,827 ready_for_fw is high
4,014,037 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,611 UART: [idev] Erasing UDS.KEYID = 0
7,344,298 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,875 UART: [idev] --
7,369,903 UART: [ldev] ++
7,370,484 UART: [ldev] CDI.KEYID = 6
7,371,405 UART: [ldev] SUBJECT.KEYID = 5
7,372,614 UART: [ldev] AUTHORITY.KEYID = 7
7,373,896 UART: [ldev] FE.KEYID = 1
7,422,618 UART: [ldev] Erasing FE.KEYID = 1
10,755,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,126 UART: [ldev] --
13,117,993 UART: [fwproc] Waiting for Commands...
13,120,249 UART: [fwproc] Received command 0x46574c44
13,122,451 UART: [fwproc] Received Image of size 114124 bytes
17,174,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,787 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,637,995 >>> mbox cmd response: success
17,642,516 UART: [afmc] ++
17,643,132 UART: [afmc] CDI.KEYID = 6
17,644,056 UART: [afmc] SUBJECT.KEYID = 7
17,645,280 UART: [afmc] AUTHORITY.KEYID = 5
21,005,162 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,258 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,510 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,931 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,769 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,410 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,801 UART: [afmc] --
23,379,527 UART: [cold-reset] --
23,384,200 UART: [state] Locking Datavault
23,388,583 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,334 UART: [state] Locking ICCM
23,392,214 UART: [exit] Launching FMC @ 0x40000130
23,400,607 UART:
23,400,848 UART: Running Caliptra FMC ...
23,401,950 UART:
23,402,121 UART: [state] CFI Enabled
23,467,681 UART: [fht] FMC Alias Private Key: 7
25,805,974 UART: [art] Extend RT PCRs Done
25,807,190 UART: [art] Lock RT PCRs Done
25,809,004 UART: [art] Populate DV Done
25,814,537 UART: [fht] FMC Alias Private Key: 7
25,816,292 UART: [art] Derive CDI
25,817,034 UART: [art] Store in in slot 0x4
25,876,104 UART: [art] Derive Key Pair
25,877,145 UART: [art] Store priv key in slot 0x5
29,169,866 UART: [art] Derive Key Pair - Done
29,182,649 UART: [art] Signing Cert with AUTHO
29,183,948 UART: RITY.KEYID = 7
31,471,723 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,227 UART: [art] PUB.X = 4E845AFFD122CEDD25742CC1459568373579DB43F2A5954A253E2136DDEB84D0F6ECFAED0B48735BC30FF5CD53AD64A4
31,480,523 UART: [art] PUB.Y = 67C7BB546532FFD5051ED1CAFD9511BAD77A320654A590D5DD39605F910D520BBB42BD34633286E8AFACAA281BB02C19
31,487,753 UART: [art] SIG.R = 829C13950BB7611C4E0D4AB3903793A954847945E86F8169C83E2359685B29EBEE968730D2F2CA891B94751675542003
31,495,097 UART: [art] SIG.S = 2CF190F50721D3E3D39751553ABD9227729B6922127FFE64BBDB986328101CC01C63A8F76BD97B59229CA0B1D9FF91B8
32,800,243 UART: Caliptra RT
32,800,948 UART: [state] CFI Enabled
32,963,616 UART: [rt] RT listening for mailbox commands...
37,140,276 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,295,890 UART: [rt]cmd =0x41544d4e, len=14344
42,530,917 >>> mbox cmd response data (8 bytes)
42,531,511 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,562,158 UART: [rt]cmd =0x41545348, len=116
42,581,676 >>> mbox cmd response data (12 bytes)
44,712,152 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
44,857,403 UART:
44,857,767 UART: Running Caliptra ROM ...
44,858,843 UART:
44,859,007 UART: [state] CFI Enabled
44,935,301 UART: [state] LifecycleState = Unprovisioned
44,937,244 UART: [state] DebugLocked = No
44,939,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,945,025 UART: [kat] SHA2-256
45,114,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,125,219 UART: [kat] ++
45,125,700 UART: [kat] sha1
45,137,512 UART: [kat] SHA2-256
45,140,204 UART: [kat] SHA2-384
45,145,328 UART: [kat] SHA2-512-ACC
45,147,686 UART: [kat] ECC-384
47,434,132 UART: [kat] HMAC-384Kdf
47,465,805 UART: [kat] LMS
48,656,110 UART: [kat] --
48,661,575 UART: [update-reset] ++
52,808,630 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,812,196 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
53,194,460 >>> mbox cmd response: success
53,199,163 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,199,771 UART: [update-reset] Copying MAN_2 To MAN_1
53,218,631 UART: [update-reset Success] --
53,221,843 UART: [state] Locking Datavault
53,224,450 UART: [state] Locking PCR0, PCR1 and PCR31
53,226,154 UART: [state] Locking ICCM
53,228,276 UART: [exit] Launching FMC @ 0x40000130
53,236,669 UART:
53,236,902 UART: Running Caliptra FMC ...
53,237,928 UART:
53,238,080 UART: [state] CFI Enabled
53,343,836 UART: [art] Extend RT PCRs Done
53,345,028 UART: [art] Lock RT PCRs Done
53,346,434 UART: [art] Populate DV Done
53,351,987 UART: [fht] FMC Alias Private Key: 7
53,353,514 UART: [art] Derive CDI
53,354,284 UART: [art] Store in in slot 0x4
53,412,608 UART: [art] Derive Key Pair
53,413,611 UART: [art] Store priv key in slot 0x5
56,705,557 UART: [art] Derive Key Pair - Done
56,718,242 UART: [art] Signing Cert with AUTHO
56,719,578 UART: RITY.KEYID = 7
59,007,791 UART: [art] Erasing AUTHORITY.KEYID = 7
59,009,304 UART: [art] PUB.X = BCEB404C4F0BAE017F4E47B8A8A484A688F8AF0EC14208738B6E5DA932101D7FFC619C5D3143DBC799210A0716A5876D
59,016,552 UART: [art] PUB.Y = 6294CE0A0277AB797A55E69FB8A4B4FD6979F893E08ADF55B67CBACD785CC43C30575510232AD0C2DFCE2474B397E791
59,023,831 UART: [art] SIG.R = FCB3A6990578648E92468A6C55A35BC365021E787002B9A3A344A05A1355B8BB0EEC4C13294503DF92276DBE02246A32
59,031,175 UART: [art] SIG.S = FE4C43F65BFFEE3325B48AD98B1FE1AC20AB399A1546449078FDD043834EBB441AAC607F1D9A0FEDEF7A7A9C53C782DD
60,336,537 UART: Caliptra RT
60,337,234 UART: [state] CFI Enabled
60,667,673 UART: [rt] RT listening for mailbox commands...
60,699,542 UART: [rt]cmd =0x41545348, len=116
60,719,290 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,805,370 ready_for_fw is high
3,805,775 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,896,112 >>> mbox cmd response: success
23,609,645 UART:
23,610,062 UART: Running Caliptra FMC ...
23,611,207 UART:
23,611,376 UART: [state] CFI Enabled
23,676,962 UART: [fht] FMC Alias Private Key: 7
26,015,216 UART: [art] Extend RT PCRs Done
26,016,444 UART: [art] Lock RT PCRs Done
26,018,294 UART: [art] Populate DV Done
26,023,672 UART: [fht] FMC Alias Private Key: 7
26,025,325 UART: [art] Derive CDI
26,026,148 UART: [art] Store in in slot 0x4
26,085,670 UART: [art] Derive Key Pair
26,086,712 UART: [art] Store priv key in slot 0x5
29,379,622 UART: [art] Derive Key Pair - Done
29,392,734 UART: [art] Signing Cert with AUTHO
29,394,075 UART: RITY.KEYID = 7
31,680,524 UART: [art] Erasing AUTHORITY.KEYID = 7
31,682,030 UART: [art] PUB.X = 5FB759E927A00DFAB310AFB036C08FDE6DD59EF66AA7013D4AAEB864CBAD161231EE84A10EAA94E87E8B2580AEFEEA7D
31,689,323 UART: [art] PUB.Y = C5BC8AA8D57C36FD1288D3199126944C2325FAD68DFD6AC31B680A343B4FAF1C8D0A8414301B87545FCCB9566A0CF0B0
31,696,593 UART: [art] SIG.R = 2A4D97B9324F7AAD4F5BCC6D609A66735C33E6961C4FF4A6494F2B864C53D00BF0DB7CEE70ED53136C8353C5B1830279
31,703,952 UART: [art] SIG.S = 7E9977C67763907A287404AEB95610914F6A14A0E92377A31964693C9EAD8149971778F95EB958D2A30BC8EDB2C3D6BF
33,009,286 UART: Caliptra RT
33,010,010 UART: [state] CFI Enabled
33,171,339 UART: [rt] RT listening for mailbox commands...
37,348,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,504,418 UART: [rt]cmd =0x41544d4e, len=14344
42,739,978 >>> mbox cmd response data (8 bytes)
42,740,571 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,771,390 UART: [rt]cmd =0x41545348, len=116
42,791,077 >>> mbox cmd response data (12 bytes)
44,922,024 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
53,664,392 >>> mbox cmd response: success
53,669,140 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,698,423 UART:
53,698,737 UART: Running Caliptra FMC ...
53,699,853 UART:
53,700,022 UART: [state] CFI Enabled
53,787,864 UART: [art] Extend RT PCRs Done
53,789,057 UART: [art] Lock RT PCRs Done
53,790,412 UART: [art] Populate DV Done
53,795,921 UART: [fht] FMC Alias Private Key: 7
53,797,607 UART: [art] Derive CDI
53,798,432 UART: [art] Store in in slot 0x4
53,856,692 UART: [art] Derive Key Pair
53,857,693 UART: [art] Store priv key in slot 0x5
57,150,488 UART: [art] Derive Key Pair - Done
57,163,433 UART: [art] Signing Cert with AUTHO
57,164,785 UART: RITY.KEYID = 7
59,453,089 UART: [art] Erasing AUTHORITY.KEYID = 7
59,454,590 UART: [art] PUB.X = 36775D90505BB574E25E4FBD4D9CB83C4E44F99DEA58C9D3E4150F3A72DEC1A35E4D6F844FD7C90A862FDF8834ACFB6C
59,461,933 UART: [art] PUB.Y = F629C2D23359E77FDF126982298B7A28747F9341D68C58565F8216D373CEE3931EF2D5DCE89BC306CF3B578346379641
59,469,096 UART: [art] SIG.R = 2CF3D827706F667BF75E6D3E7096A129AE6E5866CA7B25495D6EB4C0FA9EDCB2DE00C6C5999328F8F42CF083E8CAAC5B
59,476,510 UART: [art] SIG.S = 2CFB770CE893D6ECFA708F10CC0BDF1A228E68B77247A9382446303409F19AFD27690843A447E2BB2A0AB914AAEE013C
60,781,472 UART: Caliptra RT
60,782,177 UART: [state] CFI Enabled
61,118,323 UART: [rt] RT listening for mailbox commands...
61,150,281 UART: [rt]cmd =0x41545348, len=116
61,170,506 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,518 UART:
192,872 UART: Running Caliptra ROM ...
193,990 UART:
603,771 UART: [state] CFI Enabled
617,995 UART: [state] LifecycleState = Unprovisioned
619,972 UART: [state] DebugLocked = No
621,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,146 UART: [kat] SHA2-256
796,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,406 UART: [kat] ++
807,940 UART: [kat] sha1
818,816 UART: [kat] SHA2-256
821,527 UART: [kat] SHA2-384
827,164 UART: [kat] SHA2-512-ACC
829,528 UART: [kat] ECC-384
3,115,582 UART: [kat] HMAC-384Kdf
3,126,340 UART: [kat] LMS
4,316,416 UART: [kat] --
4,321,997 UART: [cold-reset] ++
4,323,437 UART: [fht] Storing FHT @ 0x50003400
4,335,560 UART: [idev] ++
4,336,145 UART: [idev] CDI.KEYID = 6
4,337,124 UART: [idev] SUBJECT.KEYID = 7
4,338,293 UART: [idev] UDS.KEYID = 0
4,339,360 ready_for_fw is high
4,339,591 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,007 UART: [idev] Erasing UDS.KEYID = 0
7,619,865 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,607 UART: [idev] --
7,645,432 UART: [ldev] ++
7,646,066 UART: [ldev] CDI.KEYID = 6
7,646,982 UART: [ldev] SUBJECT.KEYID = 5
7,648,193 UART: [ldev] AUTHORITY.KEYID = 7
7,649,480 UART: [ldev] FE.KEYID = 1
7,658,717 UART: [ldev] Erasing FE.KEYID = 1
10,947,034 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,125 UART: [ldev] --
13,309,111 UART: [fwproc] Waiting for Commands...
13,311,089 UART: [fwproc] Received command 0x46574c44
13,313,264 UART: [fwproc] Received Image of size 114124 bytes
17,366,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,129 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,025 >>> mbox cmd response: success
17,839,030 UART: [afmc] ++
17,839,649 UART: [afmc] CDI.KEYID = 6
17,840,555 UART: [afmc] SUBJECT.KEYID = 7
17,841,762 UART: [afmc] AUTHORITY.KEYID = 5
21,153,922 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,020 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,284 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,682 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,500 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,996 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,390 UART: [afmc] --
23,519,955 UART: [cold-reset] --
23,522,789 UART: [state] Locking Datavault
23,529,598 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,352 UART: [state] Locking ICCM
23,533,982 UART: [exit] Launching FMC @ 0x40000130
23,542,327 UART:
23,542,555 UART: Running Caliptra FMC ...
23,543,654 UART:
23,543,813 UART: [state] CFI Enabled
23,551,855 UART: [fht] FMC Alias Private Key: 7
25,882,740 UART: [art] Extend RT PCRs Done
25,883,958 UART: [art] Lock RT PCRs Done
25,885,417 UART: [art] Populate DV Done
25,890,559 UART: [fht] FMC Alias Private Key: 7
25,892,267 UART: [art] Derive CDI
25,893,002 UART: [art] Store in in slot 0x4
25,935,595 UART: [art] Derive Key Pair
25,936,595 UART: [art] Store priv key in slot 0x5
29,179,147 UART: [art] Derive Key Pair - Done
29,192,248 UART: [art] Signing Cert with AUTHO
29,193,542 UART: RITY.KEYID = 7
31,472,883 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,384 UART: [art] PUB.X = C78ADBA4E2B1F4E5DF3D64B379F2CA1F755983D78786199A0DAA1812F0FC34D9C905C15E058B2AF785FE488492287691
31,481,660 UART: [art] PUB.Y = 8633E774D512627C81D34B9F1E0BEDB32D666EBADAE033AE459021ED46CC1A29E3AF6203A038DD23D62C5834F5796247
31,488,897 UART: [art] SIG.R = 73542F5C88D25A1757465B892726CFE62E855675DEB206667CAC0739198B049E1F3A8E34CDFDF6B7D3E64E202E5C1CEF
31,496,283 UART: [art] SIG.S = 3FB66E7BE96A66CD58BF2A74584D34B0B5D05B9C5FE7FAD37B4A3D5919E957D3A0E14CE6D11D00A1370B7A7A3523FDE7
32,801,269 UART: Caliptra RT
32,801,986 UART: [state] CFI Enabled
32,920,556 UART: [rt] RT listening for mailbox commands...
36,943,756 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,099,249 UART: [rt]cmd =0x41544d4e, len=14344
42,335,244 >>> mbox cmd response data (8 bytes)
42,335,829 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,366,550 UART: [rt]cmd =0x41545348, len=116
42,386,458 >>> mbox cmd response data (12 bytes)
44,439,515 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
44,584,628 UART:
44,585,078 UART: Running Caliptra ROM ...
44,586,126 UART:
44,586,279 UART: [state] CFI Enabled
44,600,999 UART: [state] LifecycleState = Unprovisioned
44,602,898 UART: [state] DebugLocked = No
44,605,761 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,611,294 UART: [kat] SHA2-256
44,781,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,791,567 UART: [kat] ++
44,792,051 UART: [kat] sha1
44,802,067 UART: [kat] SHA2-256
44,804,762 UART: [kat] SHA2-384
44,810,749 UART: [kat] SHA2-512-ACC
44,813,095 UART: [kat] ECC-384
47,096,992 UART: [kat] HMAC-384Kdf
47,109,601 UART: [kat] LMS
48,299,658 UART: [kat] --
48,302,695 UART: [update-reset] ++
52,448,531 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,452,256 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
52,834,538 >>> mbox cmd response: success
52,839,181 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,839,776 UART: [update-reset] Copying MAN_2 To MAN_1
52,857,979 UART: [update-reset Success] --
52,864,153 UART: [state] Locking Datavault
52,867,521 UART: [state] Locking PCR0, PCR1 and PCR31
52,869,219 UART: [state] Locking ICCM
52,870,396 UART: [exit] Launching FMC @ 0x40000130
52,878,816 UART:
52,879,052 UART: Running Caliptra FMC ...
52,880,157 UART:
52,880,318 UART: [state] CFI Enabled
52,924,921 UART: [art] Extend RT PCRs Done
52,926,319 UART: [art] Lock RT PCRs Done
52,927,391 UART: [art] Populate DV Done
52,932,863 UART: [fht] FMC Alias Private Key: 7
52,934,512 UART: [art] Derive CDI
52,935,321 UART: [art] Store in in slot 0x4
52,977,970 UART: [art] Derive Key Pair
52,978,967 UART: [art] Store priv key in slot 0x5
56,221,141 UART: [art] Derive Key Pair - Done
56,234,249 UART: [art] Signing Cert with AUTHO
56,235,559 UART: RITY.KEYID = 7
58,514,485 UART: [art] Erasing AUTHORITY.KEYID = 7
58,516,014 UART: [art] PUB.X = E43CA2E79CD240C4D3A1AB596F37759C968823F8D88941C0A060DE67E789389B16D4129E1C4850D260B85FFACA407D7D
58,523,211 UART: [art] PUB.Y = 49A6F14E6C73131D20F65393DD815CBB4EEDFDEFA4F5F47FFB300ABBB8287C345E5C91259D9A10E49CFE08E1F0690607
58,530,479 UART: [art] SIG.R = CB22EA60C7B28E503E907ACE41769600C44FF5A089AE8E75CF5386E48FFD0FC0DA97541909554247A32EE9B1B8D518F5
58,537,879 UART: [art] SIG.S = AB13107E2B9A56FA48F66D360B803A7A13483C3B37753C1665DABFFA7707101BBADB106191F61CA3AB204B8936F6D3DD
59,843,212 UART: Caliptra RT
59,843,928 UART: [state] CFI Enabled
60,132,147 UART: [rt] RT listening for mailbox commands...
60,163,944 UART: [rt]cmd =0x41545348, len=116
60,183,037 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
4,129,483 ready_for_fw is high
4,129,879 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,079,438 >>> mbox cmd response: success
23,721,621 UART:
23,722,076 UART: Running Caliptra FMC ...
23,723,187 UART:
23,723,346 UART: [state] CFI Enabled
23,731,239 UART: [fht] FMC Alias Private Key: 7
26,061,781 UART: [art] Extend RT PCRs Done
26,063,002 UART: [art] Lock RT PCRs Done
26,064,714 UART: [art] Populate DV Done
26,069,981 UART: [fht] FMC Alias Private Key: 7
26,071,479 UART: [art] Derive CDI
26,072,246 UART: [art] Store in in slot 0x4
26,114,727 UART: [art] Derive Key Pair
26,115,726 UART: [art] Store priv key in slot 0x5
29,357,779 UART: [art] Derive Key Pair - Done
29,370,615 UART: [art] Signing Cert with AUTHO
29,371,922 UART: RITY.KEYID = 7
31,651,171 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,793 UART: [art] PUB.X = 779DCF7339CEF09DE97E7F7BB97E429E7A15562262F72DBC26C4B954AC7D62D604A544E975D357BE4655946A86380A16
31,659,910 UART: [art] PUB.Y = 83F73E8698794C5EB9BCBA8963BD624D580E5DF429056AFDD5894BB2D85DF8AECDE274102BFB1B3A7F39F6BED1475BB8
31,667,181 UART: [art] SIG.R = 845861220471FA5FE54C292C21D6C23E1EBC8E43E83269A4F8D773A1A9CA006280FC85A242E5464B8C7AA5CF50C217CC
31,674,618 UART: [art] SIG.S = DB30F71D1805849425E877D2B4AFF35D09B2BE67AF1623C44B09F8C880953E98BBCA5E756DBA2DFF2A20BF96A5A49AD2
32,979,749 UART: Caliptra RT
32,980,462 UART: [state] CFI Enabled
33,098,972 UART: [rt] RT listening for mailbox commands...
37,123,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,278,493 UART: [rt]cmd =0x41544d4e, len=14344
42,513,749 >>> mbox cmd response data (8 bytes)
42,514,371 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,545,174 UART: [rt]cmd =0x41545348, len=116
42,564,040 >>> mbox cmd response data (12 bytes)
44,617,581 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
53,264,775 >>> mbox cmd response: success
53,269,460 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,301,068 UART:
53,301,361 UART: Running Caliptra FMC ...
53,302,479 UART:
53,302,641 UART: [state] CFI Enabled
53,347,165 UART: [art] Extend RT PCRs Done
53,348,352 UART: [art] Lock RT PCRs Done
53,349,726 UART: [art] Populate DV Done
53,355,510 UART: [fht] FMC Alias Private Key: 7
53,357,214 UART: [art] Derive CDI
53,358,022 UART: [art] Store in in slot 0x4
53,400,612 UART: [art] Derive Key Pair
53,401,605 UART: [art] Store priv key in slot 0x5
56,644,150 UART: [art] Derive Key Pair - Done
56,657,124 UART: [art] Signing Cert with AUTHO
56,658,432 UART: RITY.KEYID = 7
58,938,444 UART: [art] Erasing AUTHORITY.KEYID = 7
58,939,951 UART: [art] PUB.X = 1FC1C046E28C03CFEAF6CB1FA9DD3E0C7D3ECBF8A9728446FBCADBCB09F0D2C869A4DB26720995019B2676F63BDB043D
58,947,199 UART: [art] PUB.Y = 361C6FEC25D29F7A55C05F4425DC30A752F1911357B50F8F47FBF2C8D987ABE33E8DA56FC53396276B47FC4921F7E162
58,954,446 UART: [art] SIG.R = D2BC0C8D1F080B978BA6985FBE9615B46C0724DBFBA0A93F2507C59D0885184494C66DB3A7DE1F009F291774C3BE8113
58,961,833 UART: [art] SIG.S = 5EA491BD54DEB3C7E27ED7A19DE8D38DE1F4C28BDC4F4E4074293B4D1B7786511B65EF69EDBDC7F3D888E084128652CF
60,267,221 UART: Caliptra RT
60,267,938 UART: [state] CFI Enabled
60,553,507 UART: [rt] RT listening for mailbox commands...
60,585,438 UART: [rt]cmd =0x41545348, len=116
60,605,019 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,123 UART:
192,485 UART: Running Caliptra ROM ...
193,682 UART:
193,831 UART: [state] CFI Enabled
263,193 UART: [state] LifecycleState = Unprovisioned
265,112 UART: [state] DebugLocked = No
266,862 UART: [state] WD Timer not started. Device not locked for debugging
271,114 UART: [kat] SHA2-256
450,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,778 UART: [kat] ++
462,311 UART: [kat] sha1
473,714 UART: [kat] SHA2-256
476,761 UART: [kat] SHA2-384
482,467 UART: [kat] SHA2-512-ACC
485,421 UART: [kat] ECC-384
2,945,144 UART: [kat] HMAC-384Kdf
2,970,939 UART: [kat] LMS
3,500,438 UART: [kat] --
3,505,446 UART: [cold-reset] ++
3,506,509 UART: [fht] FHT @ 0x50003400
3,518,414 UART: [idev] ++
3,518,985 UART: [idev] CDI.KEYID = 6
3,519,894 UART: [idev] SUBJECT.KEYID = 7
3,521,139 UART: [idev] UDS.KEYID = 0
3,522,061 ready_for_fw is high
3,522,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,182 UART: [idev] Erasing UDS.KEYID = 0
6,025,717 UART: [idev] Sha1 KeyId Algorithm
6,047,012 UART: [idev] --
6,051,390 UART: [ldev] ++
6,051,988 UART: [ldev] CDI.KEYID = 6
6,052,904 UART: [ldev] SUBJECT.KEYID = 5
6,054,065 UART: [ldev] AUTHORITY.KEYID = 7
6,055,300 UART: [ldev] FE.KEYID = 1
6,098,578 UART: [ldev] Erasing FE.KEYID = 1
8,602,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,119 UART: [ldev] --
10,413,437 UART: [fwproc] Wait for Commands...
10,415,698 UART: [fwproc] Recv command 0x46574c44
10,417,793 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,408 >>> mbox cmd response: success
14,282,049 UART: [afmc] ++
14,282,670 UART: [afmc] CDI.KEYID = 6
14,283,583 UART: [afmc] SUBJECT.KEYID = 7
14,284,748 UART: [afmc] AUTHORITY.KEYID = 5
16,825,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,063 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,804 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,854 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,740 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,942 UART: [afmc] --
18,623,883 UART: [cold-reset] --
18,628,665 UART: [state] Locking Datavault
18,632,110 UART: [state] Locking PCR0, PCR1 and PCR31
18,633,777 UART: [state] Locking ICCM
18,636,309 UART: [exit] Launching FMC @ 0x40000130
18,644,704 UART:
18,644,939 UART: Running Caliptra FMC ...
18,645,986 UART:
18,646,142 UART: [state] CFI Enabled
18,708,551 UART: [fht] FMC Alias Private Key: 7
20,472,326 UART: [art] Extend RT PCRs Done
20,473,546 UART: [art] Lock RT PCRs Done
20,475,384 UART: [art] Populate DV Done
20,481,112 UART: [fht] FMC Alias Private Key: 7
20,482,705 UART: [art] Derive CDI
20,483,451 UART: [art] Store in in slot 0x4
20,540,863 UART: [art] Derive Key Pair
20,541,857 UART: [art] Store priv key in slot 0x5
23,004,461 UART: [art] Derive Key Pair - Done
23,017,425 UART: [art] Signing Cert with AUTHO
23,018,741 UART: RITY.KEYID = 7
24,731,449 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,947 UART: [art] PUB.X = 614CC68CE0157835601FFA98F42695E26F2F431BBDC6369F3866EB09F1E3D1687C96ABBFEACDA314CAF3EB889B44C973
24,740,207 UART: [art] PUB.Y = C16FC35AEA9AA0619B5E4F1AEAC2F78EB8C54A06040DC756C4F691DCCB2E7E97CA32003CFB4344AD0A3011C2A4388973
24,747,503 UART: [art] SIG.R = 08E7D7F0F742E6249011B621B0B87D5CFA92572AC06A878FE3B1F6D65DD47AC9AC6A7FC3ADD8130463D9AB0359550251
24,754,892 UART: [art] SIG.S = 1328B807FB39852EFE2FD5FF87A044075305FE6124573237C07CEACC06A389976172B3EEFC87EA92A42463D78FB0914C
25,733,558 UART: Caliptra RT
25,734,254 UART: [state] CFI Enabled
25,899,317 UART: [rt] RT listening for mailbox commands...
29,939,194 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,095,133 UART: [rt]cmd =0x41544d4e, len=14344
34,025,746 >>> mbox cmd response data (8 bytes)
34,026,345 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,056,972 UART: [rt]cmd =0x41545348, len=116
34,076,583 >>> mbox cmd response data (12 bytes)
36,143,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
36,288,804 UART:
36,289,166 UART: Running Caliptra ROM ...
36,290,306 UART:
36,290,476 UART: [state] CFI Enabled
36,360,382 UART: [state] LifecycleState = Unprovisioned
36,362,258 UART: [state] DebugLocked = No
36,363,486 UART: [state] WD Timer not started. Device not locked for debugging
36,367,982 UART: [kat] SHA2-256
36,547,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,558,695 UART: [kat] ++
36,559,236 UART: [kat] sha1
36,568,854 UART: [kat] SHA2-256
36,571,885 UART: [kat] SHA2-384
36,577,006 UART: [kat] SHA2-512-ACC
36,579,953 UART: [kat] ECC-384
39,043,003 UART: [kat] HMAC-384Kdf
39,064,104 UART: [kat] LMS
39,593,562 UART: [kat] --
39,596,652 UART: [update-reset] ++
43,024,396 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,028,560 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
43,411,831 >>> mbox cmd response: success
43,412,291 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,413,053 UART: [update-reset] Copying MAN_2 To MAN_1
43,435,362 UART: [update-reset Success] --
43,440,870 UART: [state] Locking Datavault
43,443,047 UART: [state] Locking PCR0, PCR1 and PCR31
43,444,721 UART: [state] Locking ICCM
43,446,711 UART: [exit] Launching FMC @ 0x40000130
43,455,110 UART:
43,455,345 UART: Running Caliptra FMC ...
43,456,447 UART:
43,456,608 UART: [state] CFI Enabled
43,555,173 UART: [art] Extend RT PCRs Done
43,556,356 UART: [art] Lock RT PCRs Done
43,557,596 UART: [art] Populate DV Done
43,562,899 UART: [fht] FMC Alias Private Key: 7
43,564,486 UART: [art] Derive CDI
43,565,298 UART: [art] Store in in slot 0x4
43,623,873 UART: [art] Derive Key Pair
43,625,027 UART: [art] Store priv key in slot 0x5
46,087,808 UART: [art] Derive Key Pair - Done
46,100,917 UART: [art] Signing Cert with AUTHO
46,102,233 UART: RITY.KEYID = 7
47,813,814 UART: [art] Erasing AUTHORITY.KEYID = 7
47,815,318 UART: [art] PUB.X = 40A33BA8F0B3D8AF192247DFC3A5042FAAFF89BCE2A1417A46D48CFF75327E858A00C93473CD5DFAB2F18280B99B728B
47,822,572 UART: [art] PUB.Y = CD9332D62C7FED8199CA99383E915E8EBFA5D2AEBEA0D45028FD6EF4641AF79659EA40CC0996C9FE73BF7CC1906DFD77
47,829,914 UART: [art] SIG.R = 45088E90C725E47C471A70A078FF03FD1E45F985C959AE08243FB10EFEDF9F876A9935410FBB6480DC6F4C0FE1D886A6
47,837,266 UART: [art] SIG.S = 9846F4207A51A37BD049EAC461EE0D87B798630850AC13339B2161BD36D07B1B162FE6CFF88BE41573F2CE9E0E9BC7EB
48,816,563 UART: Caliptra RT
48,817,249 UART: [state] CFI Enabled
49,152,023 UART: [rt] RT listening for mailbox commands...
49,184,082 UART: [rt]cmd =0x41545348, len=116
49,203,871 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,384,384 ready_for_fw is high
3,384,967 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,097,104 >>> mbox cmd response: success
18,386,428 UART:
18,386,829 UART: Running Caliptra FMC ...
18,387,960 UART:
18,388,122 UART: [state] CFI Enabled
18,454,240 UART: [fht] FMC Alias Private Key: 7
20,218,817 UART: [art] Extend RT PCRs Done
20,220,038 UART: [art] Lock RT PCRs Done
20,221,838 UART: [art] Populate DV Done
20,227,412 UART: [fht] FMC Alias Private Key: 7
20,228,897 UART: [art] Derive CDI
20,229,633 UART: [art] Store in in slot 0x4
20,287,602 UART: [art] Derive Key Pair
20,288,645 UART: [art] Store priv key in slot 0x5
22,751,402 UART: [art] Derive Key Pair - Done
22,764,355 UART: [art] Signing Cert with AUTHO
22,765,699 UART: RITY.KEYID = 7
24,477,692 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,209 UART: [art] PUB.X = 1801C7BD457EF50E880ED0F734227190958C406A26F0B529587363DBFBA9E89CC0A5F2AC650E067AE6C416396B1B16DC
24,486,476 UART: [art] PUB.Y = C98BDA5B8F6D13A224F704704F74B765CC4604E9D9A7769EBCE42C3515A6FF6922EEC6A5C8552779330327E3F8E2CB73
24,493,729 UART: [art] SIG.R = B68204752753A056A3E3581862D621701D7B1428D62C629F1EC69D78DE2CF53A308402070B13E711464FB388CBB8A058
24,501,074 UART: [art] SIG.S = 2BAA8A2E1A08E500EB0EDC712BEEE5708A4C73A771BEB2C00B5993A5AB0202693E54CB83ED140054544DA305236E4ADE
25,479,887 UART: Caliptra RT
25,480,584 UART: [state] CFI Enabled
25,644,547 UART: [rt] RT listening for mailbox commands...
29,673,082 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,828,900 UART: [rt]cmd =0x41544d4e, len=14344
33,759,720 >>> mbox cmd response data (8 bytes)
33,760,297 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,791,100 UART: [rt]cmd =0x41545348, len=116
33,809,952 >>> mbox cmd response data (12 bytes)
35,860,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
42,981,154 >>> mbox cmd response: success
42,981,766 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,016,683 UART:
43,017,016 UART: Running Caliptra FMC ...
43,018,062 UART:
43,018,216 UART: [state] CFI Enabled
43,104,189 UART: [art] Extend RT PCRs Done
43,105,386 UART: [art] Lock RT PCRs Done
43,106,617 UART: [art] Populate DV Done
43,112,422 UART: [fht] FMC Alias Private Key: 7
43,114,123 UART: [art] Derive CDI
43,114,860 UART: [art] Store in in slot 0x4
43,173,347 UART: [art] Derive Key Pair
43,174,386 UART: [art] Store priv key in slot 0x5
45,637,228 UART: [art] Derive Key Pair - Done
45,650,409 UART: [art] Signing Cert with AUTHO
45,651,744 UART: RITY.KEYID = 7
47,363,062 UART: [art] Erasing AUTHORITY.KEYID = 7
47,364,576 UART: [art] PUB.X = 6A7B50729C65660C0480DC45121A90ABDFF6E45200C337A667D1216B68A8CDA08A327B28C9761F1281669B60F9195168
47,371,821 UART: [art] PUB.Y = 97BB647C6BF7DDAC5A44464B3DFA779E348B23C618F433FD9A9106C93A7738851FD66ABC9BDC6A723297BF5C233711AE
47,379,057 UART: [art] SIG.R = 9906F8768342C85241C917CF775AADD1A74FA13852FCB31BB6A377534275A58949C081ADEE89D007AC3A8EB377BB8A0D
47,386,446 UART: [art] SIG.S = 7D0751E0C1DAB465F7134BE558BABF7B75FBC57ACCBB94F189E7AED982B2BD027D1E871983A78BEE5B7996CB82FBB8E9
48,364,921 UART: Caliptra RT
48,365,627 UART: [state] CFI Enabled
48,703,617 UART: [rt] RT listening for mailbox commands...
48,735,469 UART: [rt]cmd =0x41545348, len=116
48,755,644 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,357 UART:
192,716 UART: Running Caliptra ROM ...
193,811 UART:
603,467 UART: [state] CFI Enabled
614,609 UART: [state] LifecycleState = Unprovisioned
616,498 UART: [state] DebugLocked = No
618,647 UART: [state] WD Timer not started. Device not locked for debugging
622,889 UART: [kat] SHA2-256
802,033 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,626 UART: [kat] ++
814,069 UART: [kat] sha1
824,318 UART: [kat] SHA2-256
827,397 UART: [kat] SHA2-384
832,311 UART: [kat] SHA2-512-ACC
835,235 UART: [kat] ECC-384
3,277,834 UART: [kat] HMAC-384Kdf
3,290,717 UART: [kat] LMS
3,820,227 UART: [kat] --
3,823,725 UART: [cold-reset] ++
3,825,221 UART: [fht] FHT @ 0x50003400
3,835,209 UART: [idev] ++
3,835,805 UART: [idev] CDI.KEYID = 6
3,836,736 UART: [idev] SUBJECT.KEYID = 7
3,837,905 UART: [idev] UDS.KEYID = 0
3,838,824 ready_for_fw is high
3,839,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,983,082 UART: [idev] Erasing UDS.KEYID = 0
6,313,278 UART: [idev] Sha1 KeyId Algorithm
6,334,938 UART: [idev] --
6,338,874 UART: [ldev] ++
6,339,441 UART: [ldev] CDI.KEYID = 6
6,340,399 UART: [ldev] SUBJECT.KEYID = 5
6,341,553 UART: [ldev] AUTHORITY.KEYID = 7
6,342,830 UART: [ldev] FE.KEYID = 1
6,353,950 UART: [ldev] Erasing FE.KEYID = 1
8,824,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,430 UART: [ldev] --
10,612,088 UART: [fwproc] Wait for Commands...
10,615,316 UART: [fwproc] Recv command 0x46574c44
10,617,422 UART: [fwproc] Recv'd Img size: 114448 bytes
14,020,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,961 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,480,333 >>> mbox cmd response: success
14,483,877 UART: [afmc] ++
14,484,508 UART: [afmc] CDI.KEYID = 6
14,485,419 UART: [afmc] SUBJECT.KEYID = 7
14,486,570 UART: [afmc] AUTHORITY.KEYID = 5
16,987,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,580 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,452 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,777,768 UART: [afmc] --
18,782,131 UART: [cold-reset] --
18,784,258 UART: [state] Locking Datavault
18,788,506 UART: [state] Locking PCR0, PCR1 and PCR31
18,790,183 UART: [state] Locking ICCM
18,791,432 UART: [exit] Launching FMC @ 0x40000130
18,799,890 UART:
18,800,120 UART: Running Caliptra FMC ...
18,801,215 UART:
18,801,371 UART: [state] CFI Enabled
18,809,467 UART: [fht] FMC Alias Private Key: 7
20,565,627 UART: [art] Extend RT PCRs Done
20,566,844 UART: [art] Lock RT PCRs Done
20,568,763 UART: [art] Populate DV Done
20,573,897 UART: [fht] FMC Alias Private Key: 7
20,575,497 UART: [art] Derive CDI
20,576,310 UART: [art] Store in in slot 0x4
20,619,083 UART: [art] Derive Key Pair
20,620,082 UART: [art] Store priv key in slot 0x5
23,046,965 UART: [art] Derive Key Pair - Done
23,059,857 UART: [art] Signing Cert with AUTHO
23,061,155 UART: RITY.KEYID = 7
24,766,442 UART: [art] Erasing AUTHORITY.KEYID = 7
24,767,944 UART: [art] PUB.X = D619202017937BA74C84C32816E50C09CA0250EFB3CAA20FA53F03E71D5BE53D64FFBCDBF981E2B85255706933695988
24,775,168 UART: [art] PUB.Y = C4CAC996117DA77A7C55F05CDB08BCEF76E71AA5A8BBB08FFF31CC3A955E44405D46A3961F238DF09D08C91CCD7246A4
24,782,489 UART: [art] SIG.R = 9D9A23089B0149FBB9F9A2D9148E6FD98A54DC8FB31434FD3A9389CE2575D84936938A44F1B01EE4111C1B4DEB7CBD0D
24,789,903 UART: [art] SIG.S = 2C95409A8EBEDF0DEE92C3BEF93061A6A57BCA37667BDE896977E6138AC572ED9C2B401363AC826DAECD7B998CBF76ED
25,768,882 UART: Caliptra RT
25,769,576 UART: [state] CFI Enabled
25,886,685 UART: [rt] RT listening for mailbox commands...
29,913,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,069,653 UART: [rt]cmd =0x41544d4e, len=14344
34,000,275 >>> mbox cmd response data (8 bytes)
34,000,911 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,031,491 UART: [rt]cmd =0x41545348, len=116
34,050,881 >>> mbox cmd response data (12 bytes)
36,104,670 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
36,250,001 UART:
36,250,383 UART: Running Caliptra ROM ...
36,251,516 UART:
36,251,680 UART: [state] CFI Enabled
36,263,352 UART: [state] LifecycleState = Unprovisioned
36,265,241 UART: [state] DebugLocked = No
36,268,125 UART: [state] WD Timer not started. Device not locked for debugging
36,272,772 UART: [kat] SHA2-256
36,451,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,463,521 UART: [kat] ++
36,463,975 UART: [kat] sha1
36,475,984 UART: [kat] SHA2-256
36,478,981 UART: [kat] SHA2-384
36,484,807 UART: [kat] SHA2-512-ACC
36,487,796 UART: [kat] ECC-384
38,929,547 UART: [kat] HMAC-384Kdf
38,943,562 UART: [kat] LMS
39,473,068 UART: [kat] --
39,478,374 UART: [update-reset] ++
42,904,464 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,907,959 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
43,291,240 >>> mbox cmd response: success
43,291,686 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,292,882 UART: [update-reset] Copying MAN_2 To MAN_1
43,315,179 UART: [update-reset Success] --
43,320,276 UART: [state] Locking Datavault
43,324,710 UART: [state] Locking PCR0, PCR1 and PCR31
43,326,400 UART: [state] Locking ICCM
43,327,794 UART: [exit] Launching FMC @ 0x40000130
43,336,194 UART:
43,336,423 UART: Running Caliptra FMC ...
43,337,522 UART:
43,337,668 UART: [state] CFI Enabled
43,381,305 UART: [art] Extend RT PCRs Done
43,382,485 UART: [art] Lock RT PCRs Done
43,384,047 UART: [art] Populate DV Done
43,389,402 UART: [fht] FMC Alias Private Key: 7
43,390,985 UART: [art] Derive CDI
43,391,789 UART: [art] Store in in slot 0x4
43,434,252 UART: [art] Derive Key Pair
43,435,469 UART: [art] Store priv key in slot 0x5
45,862,247 UART: [art] Derive Key Pair - Done
45,875,457 UART: [art] Signing Cert with AUTHO
45,876,762 UART: RITY.KEYID = 7
47,582,431 UART: [art] Erasing AUTHORITY.KEYID = 7
47,583,918 UART: [art] PUB.X = 8526D5EC96FD1F9F9BF58A8F06A340D7358F1ABCB061F336A82420D3664D674185299C40260841FD0B053A200ABC6BE4
47,591,240 UART: [art] PUB.Y = 8F6CBE33F012213448D98EFC08E1B9FD0223B7289CF8D3C84C835EC50CAC4699BB13F9FABB249DD621D73C4CD6DF0DAB
47,598,479 UART: [art] SIG.R = 45C2678A83D05DE8E0A4DCB15C732B08DEC4C7E9183FC8AA0202202873DF0E1734703393B72DC9B49F2D77DBCF865880
47,605,863 UART: [art] SIG.S = 7319746004D1A7DE59AEF0935084E60479195B227407A28D5EBC2830F27EF89189BF0B772B44FFC0F904C013B9B64836
48,584,883 UART: Caliptra RT
48,585,571 UART: [state] CFI Enabled
48,874,787 UART: [rt] RT listening for mailbox commands...
48,906,465 UART: [rt]cmd =0x41545348, len=116
48,925,498 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,693,862 ready_for_fw is high
3,694,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,443 >>> mbox cmd response: success
18,519,457 UART:
18,519,874 UART: Running Caliptra FMC ...
18,521,067 UART:
18,521,233 UART: [state] CFI Enabled
18,529,174 UART: [fht] FMC Alias Private Key: 7
20,286,578 UART: [art] Extend RT PCRs Done
20,287,799 UART: [art] Lock RT PCRs Done
20,289,432 UART: [art] Populate DV Done
20,294,631 UART: [fht] FMC Alias Private Key: 7
20,296,179 UART: [art] Derive CDI
20,296,992 UART: [art] Store in in slot 0x4
20,339,586 UART: [art] Derive Key Pair
20,340,579 UART: [art] Store priv key in slot 0x5
22,767,627 UART: [art] Derive Key Pair - Done
22,780,844 UART: [art] Signing Cert with AUTHO
22,782,139 UART: RITY.KEYID = 7
24,488,099 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,630 UART: [art] PUB.X = 7038A6FF2A8B5B6AEE5823BFBBF9AB9F5816F0718E4D8EF2A956F231A09CA96197448B56304B8B436FA56C42B0C4C181
24,496,837 UART: [art] PUB.Y = E37602CE50E8266B668B8F8E7CBC4E43D29A57A32E39CAFF349E1D5C89B9CF083E5DC296C8CBDC40F2D6CE98093A70B7
24,504,153 UART: [art] SIG.R = 299684C5043B23C2A214657302F74FEE8E827B6712DCD646950EB0D54C96F9061DD4B1743A89F9E8F1B02897FAA22ABC
24,511,508 UART: [art] SIG.S = 1D266EF0CA1A83E42C18089FA8A6B931D06E3709263871A033FA4E70F26626104CF175A479025D0DD36FD4E6D52CA8F2
25,490,223 UART: Caliptra RT
25,490,936 UART: [state] CFI Enabled
25,607,972 UART: [rt] RT listening for mailbox commands...
29,636,078 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,791,337 UART: [rt]cmd =0x41544d4e, len=14344
33,721,919 >>> mbox cmd response data (8 bytes)
33,722,505 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,753,184 UART: [rt]cmd =0x41545348, len=116
33,772,458 >>> mbox cmd response data (12 bytes)
35,824,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
42,865,100 >>> mbox cmd response: success
42,865,671 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,899,916 UART:
42,900,214 UART: Running Caliptra FMC ...
42,901,240 UART:
42,901,377 UART: [state] CFI Enabled
42,945,881 UART: [art] Extend RT PCRs Done
42,947,074 UART: [art] Lock RT PCRs Done
42,948,570 UART: [art] Populate DV Done
42,954,079 UART: [fht] FMC Alias Private Key: 7
42,955,776 UART: [art] Derive CDI
42,956,506 UART: [art] Store in in slot 0x4
42,999,207 UART: [art] Derive Key Pair
43,000,236 UART: [art] Store priv key in slot 0x5
45,426,993 UART: [art] Derive Key Pair - Done
45,440,322 UART: [art] Signing Cert with AUTHO
45,441,624 UART: RITY.KEYID = 7
47,147,299 UART: [art] Erasing AUTHORITY.KEYID = 7
47,148,801 UART: [art] PUB.X = BBA4123EFDBBEB56B5B2E2EC775782A5B8BDE996052D203B8CA1CBA7CD2EBB1D29CF6CD30381BAC584F2095DFC8D63E2
47,156,180 UART: [art] PUB.Y = 67E5E9897FF4F34B56CC9880343CD8F800F68BA53B8DCD1741699CEF2E39D6DC80BEB1FAA520EE2A3383923B9E1F763F
47,163,378 UART: [art] SIG.R = 4CEDE06C08340A7A08ECF661A1938A7DE1A289C2F45FF5A628759BDC22A804966D211FD509551C024C00027DA1C950D3
47,170,763 UART: [art] SIG.S = DD39AA2DE8738858677614E8E3280AB3434DF8CCF7213FA163422DC0AE4AC01031EB21A2082DB6595E673BA6E05F446E
48,150,023 UART: Caliptra RT
48,150,717 UART: [state] CFI Enabled
48,440,110 UART: [rt] RT listening for mailbox commands...
48,471,653 UART: [rt]cmd =0x41545348, len=116
48,491,236 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
3,437,624 ready_for_fw is high
3,438,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,006 >>> mbox cmd response: success
19,023,217 UART:
19,023,638 UART: Running Caliptra FMC ...
19,024,779 UART:
19,024,941 UART: [state] CFI Enabled
19,093,594 UART: [fht] FMC Alias Private Key: 7
20,857,650 UART: [art] Extend RT PCRs Done
20,858,872 UART: [art] Lock RT PCRs Done
20,860,497 UART: [art] Populate DV Done
20,865,912 UART: [fht] FMC Alias Private Key: 7
20,867,399 UART: [art] Derive CDI
20,868,135 UART: [art] Store in in slot 0x4
20,926,262 UART: [art] Derive Key Pair
20,927,303 UART: [art] Store priv key in slot 0x5
23,390,076 UART: [art] Derive Key Pair - Done
23,402,728 UART: [art] Signing Cert with AUTHO
23,404,081 UART: RITY.KEYID = 7
25,116,568 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,068 UART: [art] PUB.X = 611B1F78E9AAF468BF668FB641A2D793E01F5735AE532A49DE31B5353DE4ADB973AD734BC4022251AAC97C2366B17298
25,125,316 UART: [art] PUB.Y = FC335804E7E88212EF894541CC6045B7F5ED263198866424EF6615C970F8046B908BE2FDF96AA47481A5C5F95CADC792
25,132,566 UART: [art] SIG.R = 20586E1BF4550031D045E3C4F559C7604ACBE7E06BB11191646732000D25184C0F22BE4D51794C97E3A4F195D5AE656E
25,139,904 UART: [art] SIG.S = 75D7006611A874C4EB5D14A3A599A0FC3AA185C059E5C23A0A3568A155C0A832E6D20EBF163988911DD16FE1C74B8DF0
26,119,055 UART: Caliptra RT
26,119,764 UART: [state] CFI Enabled
26,284,677 UART: [rt] RT listening for mailbox commands...
30,310,508 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,466,693 UART: [rt]cmd =0x41544d4e, len=14344
34,396,675 >>> mbox cmd response data (8 bytes)
34,397,248 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,427,763 UART: [rt]cmd =0x41545348, len=116
34,446,678 >>> mbox cmd response data (12 bytes)
36,519,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
44,324,592 >>> mbox cmd response: success
44,329,493 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,357,952 UART:
44,358,279 UART: Running Caliptra FMC ...
44,359,320 UART:
44,359,472 UART: [state] CFI Enabled
44,451,970 UART: [art] Extend RT PCRs Done
44,453,189 UART: [art] Lock RT PCRs Done
44,454,622 UART: [art] Populate DV Done
44,460,079 UART: [fht] FMC Alias Private Key: 7
44,461,725 UART: [art] Derive CDI
44,462,535 UART: [art] Store in in slot 0x4
44,521,217 UART: [art] Derive Key Pair
44,522,259 UART: [art] Store priv key in slot 0x5
46,985,246 UART: [art] Derive Key Pair - Done
46,998,256 UART: [art] Signing Cert with AUTHO
46,999,588 UART: RITY.KEYID = 7
48,711,303 UART: [art] Erasing AUTHORITY.KEYID = 7
48,712,808 UART: [art] PUB.X = 031896AB4243A36F42AB79277FC27A534C4B65660B79C2D429EDE7204117EB8E1216ECC0A4A160BF927EB01B718AF95A
48,720,060 UART: [art] PUB.Y = 7CFDCDB3BB5E8D50922B4BA35C12090AA2E6736A2069E825084E9C79765A4DEC48D315394044FB542C0A59BB849234C8
48,727,350 UART: [art] SIG.R = 4F57FD12B7816711F0342B6F03CF0FDF2F484BE079AE8F0693CA12E42D063F5A9A0C162C39A0EF76D503D3C275B3B658
48,734,743 UART: [art] SIG.S = 1D20FF37DC8DEDDED34D9FCDF4FD2AFEC97E77B108038EDFCD5D638EC9C4D84112EA596FBB2F4638F02AA374C40252E2
49,713,293 UART: Caliptra RT
49,714,019 UART: [state] CFI Enabled
50,048,067 UART: [rt] RT listening for mailbox commands...
50,079,884 UART: [rt]cmd =0x41545348, len=116
50,100,061 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,756,635 ready_for_fw is high
3,757,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,945,202 >>> mbox cmd response: success
19,196,470 UART:
19,196,902 UART: Running Caliptra FMC ...
19,198,006 UART:
19,198,156 UART: [state] CFI Enabled
19,206,038 UART: [fht] FMC Alias Private Key: 7
20,962,935 UART: [art] Extend RT PCRs Done
20,964,190 UART: [art] Lock RT PCRs Done
20,965,951 UART: [art] Populate DV Done
20,971,150 UART: [fht] FMC Alias Private Key: 7
20,972,740 UART: [art] Derive CDI
20,973,505 UART: [art] Store in in slot 0x4
21,016,478 UART: [art] Derive Key Pair
21,017,522 UART: [art] Store priv key in slot 0x5
23,444,341 UART: [art] Derive Key Pair - Done
23,457,329 UART: [art] Signing Cert with AUTHO
23,458,624 UART: RITY.KEYID = 7
25,164,221 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,739 UART: [art] PUB.X = A12971902DDEF1D9F26DED07DBC32DE0709014FAAFC6FE65D4133ED62F665C6CC4F45430EFF4EFD29C734DCC37456445
25,173,026 UART: [art] PUB.Y = 492F3F948CD3CE6AA95AA0125E0E2F290C597049DEC974FE530D40F0B947DD6350AB4ADC50200A5856751E62B0F28317
25,180,274 UART: [art] SIG.R = B261ECC31DC3D29E6EDCEAD9532713D121081863DA3A4D8A74E750CED093C7D26E1988DADB73D680166D0F8CA761A1F9
25,187,711 UART: [art] SIG.S = 41B4ADAE39BB3840764DF2F1CC0C9BE0A55542635111C2DF446FADF8BB3A479B331AD4A9778047674CA218A1255203E5
26,166,683 UART: Caliptra RT
26,167,390 UART: [state] CFI Enabled
26,284,235 UART: [rt] RT listening for mailbox commands...
30,308,462 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,464,059 UART: [rt]cmd =0x41544d4e, len=14344
34,395,119 >>> mbox cmd response data (8 bytes)
34,395,699 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,426,479 UART: [rt]cmd =0x41545348, len=116
34,446,032 >>> mbox cmd response data (12 bytes)
36,507,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
44,239,071 >>> mbox cmd response: success
44,243,975 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,272,335 UART:
44,272,666 UART: Running Caliptra FMC ...
44,273,894 UART:
44,274,061 UART: [state] CFI Enabled
44,317,494 UART: [art] Extend RT PCRs Done
44,318,636 UART: [art] Lock RT PCRs Done
44,320,077 UART: [art] Populate DV Done
44,325,480 UART: [fht] FMC Alias Private Key: 7
44,327,069 UART: [art] Derive CDI
44,327,880 UART: [art] Store in in slot 0x4
44,370,566 UART: [art] Derive Key Pair
44,371,615 UART: [art] Store priv key in slot 0x5
46,798,223 UART: [art] Derive Key Pair - Done
46,811,115 UART: [art] Signing Cert with AUTHO
46,812,412 UART: RITY.KEYID = 7
48,517,714 UART: [art] Erasing AUTHORITY.KEYID = 7
48,519,221 UART: [art] PUB.X = 54BDB17F5D1BA97D19ABED72E6004F87EE8F3031E6EF9F9D84D908CE3CC018F2A6FA471E6FC6B2F9614BB06ED864D469
48,526,520 UART: [art] PUB.Y = D2F80C5ED83B5467A3889CA91C1C9DEB7B307F2B6A17F51BCB463AD7C8ACE2B94EC6DA24CD2124769B4956954415DAD3
48,533,796 UART: [art] SIG.R = 2059350523F081188D087965F6C62E34D78275FEF6B6DC5D34D9CAFB5CD0A94487A5004B57A2911C24C49B071E44FBD1
48,541,134 UART: [art] SIG.S = 7AC7DA2EF78B72D450FF4E6994D6813E9378CDD1E5021CCED7CEEC0AF2BA01CB852393842E470D53783A6E9A51989B76
49,519,948 UART: Caliptra RT
49,520,633 UART: [state] CFI Enabled
49,808,172 UART: [rt] RT listening for mailbox commands...
49,840,186 UART: [rt]cmd =0x41545348, len=116
49,859,759 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,955 UART: [kat] SHA2-256
881,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,001 UART: [kat] ++
886,153 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,200 UART: [kat] SHA2-512-ACC
897,101 UART: [kat] ECC-384
902,906 UART: [kat] HMAC-384Kdf
907,462 UART: [kat] LMS
1,475,658 UART: [kat] --
1,476,427 UART: [cold-reset] ++
1,476,919 UART: [fht] Storing FHT @ 0x50003400
1,479,708 UART: [idev] ++
1,479,876 UART: [idev] CDI.KEYID = 6
1,480,236 UART: [idev] SUBJECT.KEYID = 7
1,480,660 UART: [idev] UDS.KEYID = 0
1,481,005 ready_for_fw is high
1,481,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,404 UART: [idev] Erasing UDS.KEYID = 0
1,504,896 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,342 UART: [idev] --
1,514,253 UART: [ldev] ++
1,514,421 UART: [ldev] CDI.KEYID = 6
1,514,784 UART: [ldev] SUBJECT.KEYID = 5
1,515,210 UART: [ldev] AUTHORITY.KEYID = 7
1,515,673 UART: [ldev] FE.KEYID = 1
1,520,783 UART: [ldev] Erasing FE.KEYID = 1
1,545,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,646 UART: [ldev] --
1,584,989 UART: [fwproc] Waiting for Commands...
1,585,846 UART: [fwproc] Received command 0x46574c44
1,586,637 UART: [fwproc] Received Image of size 114448 bytes
2,886,258 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,324 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,743 >>> mbox cmd response: success
3,079,815 UART: [afmc] ++
3,079,983 UART: [afmc] CDI.KEYID = 6
3,080,345 UART: [afmc] SUBJECT.KEYID = 7
3,080,770 UART: [afmc] AUTHORITY.KEYID = 5
3,116,259 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,647 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,155 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,040 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,730 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,519 UART: [afmc] --
3,159,547 UART: [cold-reset] --
3,160,379 UART: [state] Locking Datavault
3,161,920 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,524 UART: [state] Locking ICCM
3,162,944 UART: [exit] Launching FMC @ 0x40000130
3,168,273 UART:
3,168,289 UART: Running Caliptra FMC ...
3,168,697 UART:
3,168,751 UART: [state] CFI Enabled
3,179,264 UART: [fht] FMC Alias Private Key: 7
3,286,973 UART: [art] Extend RT PCRs Done
3,287,401 UART: [art] Lock RT PCRs Done
3,288,997 UART: [art] Populate DV Done
3,297,152 UART: [fht] FMC Alias Private Key: 7
3,298,326 UART: [art] Derive CDI
3,298,606 UART: [art] Store in in slot 0x4
3,384,155 UART: [art] Derive Key Pair
3,384,515 UART: [art] Store priv key in slot 0x5
3,397,775 UART: [art] Derive Key Pair - Done
3,412,399 UART: [art] Signing Cert with AUTHO
3,412,879 UART: RITY.KEYID = 7
3,427,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,726 UART: [art] PUB.X = 8F3FE694232829E5ACB04B28EA4523386B83BEC590386A32EB1260E01E0B145150C229EAFFC2EA3B42F543547A6C2247
3,435,495 UART: [art] PUB.Y = A0ADE5F9EFBC022CA5356EC47D45FE97B93A640D2ABA0482638630F69B07F9CF83F7C9BAF7959FCB4A8291C9EC28C687
3,442,451 UART: [art] SIG.R = 9023A0AE2A7550F731D5C955DE9954B3F174AA49EF2E5A44638A373B10152D1B590E41C04A06723E8BE0AC1EBB825A9C
3,449,221 UART: [art] SIG.S = 00D94D059E801559BB5EE9D374732AD4FBF66AC606F7794A2CD33D9112A266C9BE2C8CF4BA488209917ABE58C1ABA05C
3,472,555 UART: Caliptra RT
3,472,808 UART: [state] CFI Enabled
3,581,108 UART: [rt] RT listening for mailbox commands...
3,581,778 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,820 UART: [rt]cmd =0x41544d4e, len=14344
3,849,331 >>> mbox cmd response data (8 bytes)
3,849,332 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,383 UART: [rt]cmd =0x41545348, len=116
3,899,779 >>> mbox cmd response data (12 bytes)
3,899,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,900,722 UART:
3,900,738 UART: Running Caliptra ROM ...
3,901,146 UART:
3,901,200 UART: [state] CFI Enabled
3,904,004 UART: [state] LifecycleState = Unprovisioned
3,904,659 UART: [state] DebugLocked = No
3,905,265 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,906,830 UART: [kat] SHA2-256
4,700,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,704,876 UART: [kat] ++
4,705,028 UART: [kat] sha1
4,709,444 UART: [kat] SHA2-256
4,711,382 UART: [kat] SHA2-384
4,714,105 UART: [kat] SHA2-512-ACC
4,716,005 UART: [kat] ECC-384
4,721,480 UART: [kat] HMAC-384Kdf
4,726,110 UART: [kat] LMS
5,294,306 UART: [kat] --
5,295,069 UART: [update-reset] ++
6,630,898 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,632,160 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,782,210 >>> mbox cmd response: success
6,782,210 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,782,341 UART: [update-reset] Copying MAN_2 To MAN_1
6,790,355 UART: [update-reset Success] --
6,791,380 UART: [state] Locking Datavault
6,792,278 UART: [state] Locking PCR0, PCR1 and PCR31
6,792,882 UART: [state] Locking ICCM
6,793,420 UART: [exit] Launching FMC @ 0x40000130
6,798,749 UART:
6,798,765 UART: Running Caliptra FMC ...
6,799,173 UART:
6,799,227 UART: [state] CFI Enabled
6,888,204 UART: [art] Extend RT PCRs Done
6,888,632 UART: [art] Lock RT PCRs Done
6,890,017 UART: [art] Populate DV Done
6,898,342 UART: [fht] FMC Alias Private Key: 7
6,899,404 UART: [art] Derive CDI
6,899,684 UART: [art] Store in in slot 0x4
6,985,171 UART: [art] Derive Key Pair
6,985,531 UART: [art] Store priv key in slot 0x5
6,998,101 UART: [art] Derive Key Pair - Done
7,012,473 UART: [art] Signing Cert with AUTHO
7,012,953 UART: RITY.KEYID = 7
7,027,641 UART: [art] Erasing AUTHORITY.KEYID = 7
7,028,406 UART: [art] PUB.X = D92D37E8DD1D0E250F03555B379F63B8E7D1080E8F08FD4F960A24128D03EF33CE6643168B976C820D837E8E243BD9A6
7,035,151 UART: [art] PUB.Y = F36C0BD94D23727A8720F02C1A6A7F7B70A4EAE1DE692C26470B22CE0E2A30271AEA0319AD329F2D07323791CD4E2CA4
7,042,096 UART: [art] SIG.R = 2CFB3B3052C6A7686ADEC9ECF48A69633BBC5EECAC7A636281A9B68B6C3A5CF16744C09CD5DD6EF0742996BD7A248D35
7,048,886 UART: [art] SIG.S = 6C1E16C52F1048D9637ADE5AD450B5823EA2C24C6F1875818ECCA825FB9E3870D34620E0C6256213D6C9F57D1E834ABF
7,072,559 UART: Caliptra RT
7,072,812 UART: [state] CFI Enabled
7,354,184 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,385,253 UART: [rt]cmd =0x41545348, len=116
7,407,089 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,019 ready_for_fw is high
1,363,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,471 >>> mbox cmd response: success
2,990,509 UART:
2,990,525 UART: Running Caliptra FMC ...
2,990,933 UART:
2,990,987 UART: [state] CFI Enabled
3,001,744 UART: [fht] FMC Alias Private Key: 7
3,109,493 UART: [art] Extend RT PCRs Done
3,109,921 UART: [art] Lock RT PCRs Done
3,111,465 UART: [art] Populate DV Done
3,119,638 UART: [fht] FMC Alias Private Key: 7
3,120,602 UART: [art] Derive CDI
3,120,882 UART: [art] Store in in slot 0x4
3,206,301 UART: [art] Derive Key Pair
3,206,661 UART: [art] Store priv key in slot 0x5
3,219,653 UART: [art] Derive Key Pair - Done
3,234,877 UART: [art] Signing Cert with AUTHO
3,235,357 UART: RITY.KEYID = 7
3,250,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,486 UART: [art] PUB.X = 81F8E38DA6D36ECE2FA91B439A84CB6D768A700BF4A813A5CC13B0413C94424BF1AC64D3F6A706254ECE477448A20862
3,258,255 UART: [art] PUB.Y = 0F6962ABA566B77520E6718D0053A11C336FD35625CAA346FE1E5E5AE60133CC6E5C0EB8A67312113DEA8F07EBCE6034
3,265,179 UART: [art] SIG.R = D3E9E8901DBC4F1CEAD77A346B4BCA1BC257DEA05314F74746514B85AB06977830DF1C6CCFF2C07E9B966114CC245217
3,271,958 UART: [art] SIG.S = 996B32F814C92CCD5F51A9C1A86181C39CB782190C5288E5729E78B8FF2A9D8F4BAA035ABA5BBBA1C4607358D33AD2B7
3,295,359 UART: Caliptra RT
3,295,612 UART: [state] CFI Enabled
3,404,038 UART: [rt] RT listening for mailbox commands...
3,404,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,502 UART: [rt]cmd =0x41544d4e, len=14344
3,672,225 >>> mbox cmd response data (8 bytes)
3,672,226 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,111 UART: [rt]cmd =0x41545348, len=116
3,723,781 >>> mbox cmd response data (12 bytes)
3,723,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,486,758 >>> mbox cmd response: success
6,486,758 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,500,193 UART:
6,500,209 UART: Running Caliptra FMC ...
6,500,617 UART:
6,500,671 UART: [state] CFI Enabled
6,589,018 UART: [art] Extend RT PCRs Done
6,589,446 UART: [art] Lock RT PCRs Done
6,590,591 UART: [art] Populate DV Done
6,598,688 UART: [fht] FMC Alias Private Key: 7
6,599,776 UART: [art] Derive CDI
6,600,056 UART: [art] Store in in slot 0x4
6,685,559 UART: [art] Derive Key Pair
6,685,919 UART: [art] Store priv key in slot 0x5
6,698,923 UART: [art] Derive Key Pair - Done
6,713,218 UART: [art] Signing Cert with AUTHO
6,713,698 UART: RITY.KEYID = 7
6,728,932 UART: [art] Erasing AUTHORITY.KEYID = 7
6,729,697 UART: [art] PUB.X = FF737646C406786D00A60866A1AB638308752DDFC012B2218DBDCC45EA90BB5B46C3CB3C6F556FB74DBC4071DFB25CED
6,736,452 UART: [art] PUB.Y = BE3963E92E7A7406E201FB200A3F55CA93C9818785D68581F54B1E1A349364832FC845DD9D71F58E54FC2BF0F1EC369F
6,743,397 UART: [art] SIG.R = 886FA7F934E3A98205C84AE87820991BABAB6911C94DFAABC6645482EED264DF5835F69F0E10924161C788299F4662EC
6,750,163 UART: [art] SIG.S = 820AADAE84001A50C92108749D2FB3C2C6CB872A09B612FCCF617A4F17DCFAF86B54879C95EF1E45E4CECFE49C81D488
6,773,469 UART: Caliptra RT
6,773,722 UART: [state] CFI Enabled
7,054,002 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,084,937 UART: [rt]cmd =0x41545348, len=116
7,106,489 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,121 UART: [state] LifecycleState = Unprovisioned
86,776 UART: [state] DebugLocked = No
87,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,954 UART: [kat] SHA2-256
882,885 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,000 UART: [kat] ++
887,152 UART: [kat] sha1
891,338 UART: [kat] SHA2-256
893,276 UART: [kat] SHA2-384
896,161 UART: [kat] SHA2-512-ACC
898,062 UART: [kat] ECC-384
903,619 UART: [kat] HMAC-384Kdf
908,285 UART: [kat] LMS
1,476,481 UART: [kat] --
1,477,238 UART: [cold-reset] ++
1,477,776 UART: [fht] Storing FHT @ 0x50003400
1,480,455 UART: [idev] ++
1,480,623 UART: [idev] CDI.KEYID = 6
1,480,983 UART: [idev] SUBJECT.KEYID = 7
1,481,407 UART: [idev] UDS.KEYID = 0
1,481,752 ready_for_fw is high
1,481,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,561 UART: [idev] Erasing UDS.KEYID = 0
1,505,937 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,659 UART: [idev] --
1,515,788 UART: [ldev] ++
1,515,956 UART: [ldev] CDI.KEYID = 6
1,516,319 UART: [ldev] SUBJECT.KEYID = 5
1,516,745 UART: [ldev] AUTHORITY.KEYID = 7
1,517,208 UART: [ldev] FE.KEYID = 1
1,522,266 UART: [ldev] Erasing FE.KEYID = 1
1,547,237 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,315 UART: [ldev] --
1,586,766 UART: [fwproc] Waiting for Commands...
1,587,419 UART: [fwproc] Received command 0x46574c44
1,588,210 UART: [fwproc] Received Image of size 114448 bytes
2,887,275 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,441 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,840 >>> mbox cmd response: success
3,081,054 UART: [afmc] ++
3,081,222 UART: [afmc] CDI.KEYID = 6
3,081,584 UART: [afmc] SUBJECT.KEYID = 7
3,082,009 UART: [afmc] AUTHORITY.KEYID = 5
3,116,670 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,782 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,175 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,865 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,846 UART: [afmc] --
3,159,978 UART: [cold-reset] --
3,160,680 UART: [state] Locking Datavault
3,161,729 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,333 UART: [state] Locking ICCM
3,162,967 UART: [exit] Launching FMC @ 0x40000130
3,168,296 UART:
3,168,312 UART: Running Caliptra FMC ...
3,168,720 UART:
3,168,863 UART: [state] CFI Enabled
3,179,110 UART: [fht] FMC Alias Private Key: 7
3,287,761 UART: [art] Extend RT PCRs Done
3,288,189 UART: [art] Lock RT PCRs Done
3,289,659 UART: [art] Populate DV Done
3,297,916 UART: [fht] FMC Alias Private Key: 7
3,298,922 UART: [art] Derive CDI
3,299,202 UART: [art] Store in in slot 0x4
3,384,965 UART: [art] Derive Key Pair
3,385,325 UART: [art] Store priv key in slot 0x5
3,398,911 UART: [art] Derive Key Pair - Done
3,413,536 UART: [art] Signing Cert with AUTHO
3,414,016 UART: RITY.KEYID = 7
3,429,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,109 UART: [art] PUB.X = 163C3F9B36A1C310A7055C924C63917E448ADC578F1F60C075B27FC1E57DA3790C66777A8FE4F07E2EEA7926CA89D7B2
3,436,879 UART: [art] PUB.Y = 7926C4D53E16335DE7DAA7718D678470A203F71D0398EE886218DD5D56AD3E70FFB6E8404E43F2E0A5DB8FCC6580C5C8
3,443,831 UART: [art] SIG.R = 84C1F069ADE1E5EA4D12F8E9001F23E3D3999CEB8A8835ABDCF0FA7FF5577C4C063D1E9205C3B092D4F74FC6CDC4EB74
3,450,595 UART: [art] SIG.S = E3603AB809B7FAC481EE941AC9973F3E555708FCFABBA5AAD2BD52C145A3A5D199F6B1B59A82286E5CDE80FE5AF38394
3,474,970 UART: Caliptra RT
3,475,315 UART: [state] CFI Enabled
3,584,517 UART: [rt] RT listening for mailbox commands...
3,585,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,177 UART: [rt]cmd =0x41544d4e, len=14344
3,852,986 >>> mbox cmd response data (8 bytes)
3,852,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,034 UART: [rt]cmd =0x41545348, len=116
3,904,604 >>> mbox cmd response data (12 bytes)
3,904,605 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,905,515 UART:
3,905,531 UART: Running Caliptra ROM ...
3,905,939 UART:
3,906,080 UART: [state] CFI Enabled
3,908,918 UART: [state] LifecycleState = Unprovisioned
3,909,573 UART: [state] DebugLocked = No
3,910,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,911,686 UART: [kat] SHA2-256
4,705,617 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,709,732 UART: [kat] ++
4,709,884 UART: [kat] sha1
4,714,308 UART: [kat] SHA2-256
4,716,246 UART: [kat] SHA2-384
4,718,967 UART: [kat] SHA2-512-ACC
4,720,867 UART: [kat] ECC-384
4,726,600 UART: [kat] HMAC-384Kdf
4,731,254 UART: [kat] LMS
5,299,450 UART: [kat] --
5,300,267 UART: [update-reset] ++
6,635,492 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,636,774 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,786,824 >>> mbox cmd response: success
6,786,824 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,786,959 UART: [update-reset] Copying MAN_2 To MAN_1
6,794,973 UART: [update-reset Success] --
6,795,890 UART: [state] Locking Datavault
6,796,642 UART: [state] Locking PCR0, PCR1 and PCR31
6,797,246 UART: [state] Locking ICCM
6,797,802 UART: [exit] Launching FMC @ 0x40000130
6,803,131 UART:
6,803,147 UART: Running Caliptra FMC ...
6,803,555 UART:
6,803,698 UART: [state] CFI Enabled
6,893,167 UART: [art] Extend RT PCRs Done
6,893,595 UART: [art] Lock RT PCRs Done
6,894,952 UART: [art] Populate DV Done
6,903,107 UART: [fht] FMC Alias Private Key: 7
6,904,049 UART: [art] Derive CDI
6,904,329 UART: [art] Store in in slot 0x4
6,989,850 UART: [art] Derive Key Pair
6,990,210 UART: [art] Store priv key in slot 0x5
7,003,638 UART: [art] Derive Key Pair - Done
7,018,381 UART: [art] Signing Cert with AUTHO
7,018,861 UART: RITY.KEYID = 7
7,033,939 UART: [art] Erasing AUTHORITY.KEYID = 7
7,034,704 UART: [art] PUB.X = FA0D70CCC45218CFE502CB5E348AD873A80C9CBD3CC4081272B9489C8C46E0B66B92A9D2B97DCDCC4C4CFFDB086A1396
7,041,481 UART: [art] PUB.Y = A69F79DC7D95F40FDAB97E167F03B39ED6E10B5C4BCAFBAFA49BBDBAA9F0A83D998987958E856AD7E40A0F156B1179B5
7,048,440 UART: [art] SIG.R = E46D5B608DE88B751F49201BC8F3668700316141B662BE4EC6C0C9FAF610970ACFBA6CED5F0E9CA12F81E3E3D9C28076
7,055,194 UART: [art] SIG.S = 37168090E4B66E5832997C3B1F91922AA520E5284FE20F254854ECCE4BE813FF21E44437E5F14E65AA05723AC93B0920
7,079,172 UART: Caliptra RT
7,079,517 UART: [state] CFI Enabled
7,363,804 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,394,539 UART: [rt]cmd =0x41545348, len=116
7,415,421 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,052 ready_for_fw is high
1,363,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,476 >>> mbox cmd response: success
2,989,612 UART:
2,989,628 UART: Running Caliptra FMC ...
2,990,036 UART:
2,990,179 UART: [state] CFI Enabled
3,001,032 UART: [fht] FMC Alias Private Key: 7
3,108,713 UART: [art] Extend RT PCRs Done
3,109,141 UART: [art] Lock RT PCRs Done
3,110,963 UART: [art] Populate DV Done
3,118,956 UART: [fht] FMC Alias Private Key: 7
3,119,918 UART: [art] Derive CDI
3,120,198 UART: [art] Store in in slot 0x4
3,205,977 UART: [art] Derive Key Pair
3,206,337 UART: [art] Store priv key in slot 0x5
3,219,791 UART: [art] Derive Key Pair - Done
3,234,537 UART: [art] Signing Cert with AUTHO
3,235,017 UART: RITY.KEYID = 7
3,250,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,074 UART: [art] PUB.X = 3B05EF4664FED0BDBEFC7E413E79532E6237E4AB9ECE3F89F5081FB0C4267DEF8C8A8C754F7418B2CF7778743C97DC2B
3,257,856 UART: [art] PUB.Y = 2D973EDE191C2B562B195805F2CE003974BE7AB76784D4E6CECA9A566019F2C85B079739F6B5F5DD37158E15D061AA19
3,264,782 UART: [art] SIG.R = 575BF5252DC5A78D3CD4E33767AB1DA6000D8016EC64DC2529A5F819992DFBCF7D13F03119CD4E1F1D0D0EFB2A5777F7
3,271,535 UART: [art] SIG.S = 8469B12D00718C182B32E05F6D9CC66B305EB584AF5E1DF5086CA0893F174B6E284AC73EB7851FE8E5A69E20EA34164A
3,294,979 UART: Caliptra RT
3,295,324 UART: [state] CFI Enabled
3,404,237 UART: [rt] RT listening for mailbox commands...
3,404,907 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,691 UART: [rt]cmd =0x41544d4e, len=14344
3,672,982 >>> mbox cmd response data (8 bytes)
3,672,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,154 UART: [rt]cmd =0x41545348, len=116
3,724,202 >>> mbox cmd response data (12 bytes)
3,724,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,487,248 >>> mbox cmd response: success
6,487,248 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,500,401 UART:
6,500,417 UART: Running Caliptra FMC ...
6,500,825 UART:
6,500,968 UART: [state] CFI Enabled
6,590,583 UART: [art] Extend RT PCRs Done
6,591,011 UART: [art] Lock RT PCRs Done
6,592,228 UART: [art] Populate DV Done
6,600,351 UART: [fht] FMC Alias Private Key: 7
6,601,517 UART: [art] Derive CDI
6,601,797 UART: [art] Store in in slot 0x4
6,687,034 UART: [art] Derive Key Pair
6,687,394 UART: [art] Store priv key in slot 0x5
6,700,760 UART: [art] Derive Key Pair - Done
6,715,888 UART: [art] Signing Cert with AUTHO
6,716,368 UART: RITY.KEYID = 7
6,731,962 UART: [art] Erasing AUTHORITY.KEYID = 7
6,732,727 UART: [art] PUB.X = 08DB4055D3C3074C1082270383F86C72F25275756C0FA3F8041F5143B4B37A96B7B1453804DD6FD1F3ACC76041FDA6AF
6,739,479 UART: [art] PUB.Y = 1E7A06530BB16B0F74173C0BD5186FCC64A101C67D016D603DF198A6156A6A1BF4E236258A043CDBBB54B43A3B128F83
6,746,414 UART: [art] SIG.R = DB93022B450134A0A55BF2EC71F23A621DD389FB3EEE8DFC5115EC36214072609FE770663FD4BCCED24C44A3CA50908F
6,753,190 UART: [art] SIG.S = B579374792A22EB843EFF7003EC9A6CE7FD724190D596B2C98C27D3E8068580691665F9BA6C5424FA826A383C36927EE
6,777,355 UART: Caliptra RT
6,777,700 UART: [state] CFI Enabled
7,057,524 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,088,485 UART: [rt]cmd =0x41545348, len=116
7,110,155 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,723 UART: [kat] SHA2-256
903,663 UART: [kat] SHA2-384
906,550 UART: [kat] SHA2-512-ACC
908,451 UART: [kat] ECC-384
918,210 UART: [kat] HMAC-384Kdf
922,934 UART: [kat] LMS
1,171,262 UART: [kat] --
1,172,133 UART: [cold-reset] ++
1,172,497 UART: [fht] FHT @ 0x50003400
1,175,180 UART: [idev] ++
1,175,348 UART: [idev] CDI.KEYID = 6
1,175,708 UART: [idev] SUBJECT.KEYID = 7
1,176,132 UART: [idev] UDS.KEYID = 0
1,176,477 ready_for_fw is high
1,176,477 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,182 UART: [idev] Erasing UDS.KEYID = 0
1,201,633 UART: [idev] Sha1 KeyId Algorithm
1,210,081 UART: [idev] --
1,211,029 UART: [ldev] ++
1,211,197 UART: [ldev] CDI.KEYID = 6
1,211,560 UART: [ldev] SUBJECT.KEYID = 5
1,211,986 UART: [ldev] AUTHORITY.KEYID = 7
1,212,449 UART: [ldev] FE.KEYID = 1
1,217,607 UART: [ldev] Erasing FE.KEYID = 1
1,243,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,527 UART: [ldev] --
1,282,814 UART: [fwproc] Wait for Commands...
1,283,598 UART: [fwproc] Recv command 0x46574c44
1,284,326 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,873 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,206 >>> mbox cmd response: success
2,777,238 UART: [afmc] ++
2,777,406 UART: [afmc] CDI.KEYID = 6
2,777,768 UART: [afmc] SUBJECT.KEYID = 7
2,778,193 UART: [afmc] AUTHORITY.KEYID = 5
2,813,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,511 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,239 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,124 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,843 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,571 UART: [afmc] --
2,856,689 UART: [cold-reset] --
2,857,441 UART: [state] Locking Datavault
2,858,786 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,390 UART: [state] Locking ICCM
2,859,892 UART: [exit] Launching FMC @ 0x40000130
2,865,221 UART:
2,865,237 UART: Running Caliptra FMC ...
2,865,645 UART:
2,865,699 UART: [state] CFI Enabled
2,876,018 UART: [fht] FMC Alias Private Key: 7
2,984,111 UART: [art] Extend RT PCRs Done
2,984,539 UART: [art] Lock RT PCRs Done
2,986,011 UART: [art] Populate DV Done
2,994,106 UART: [fht] FMC Alias Private Key: 7
2,995,152 UART: [art] Derive CDI
2,995,432 UART: [art] Store in in slot 0x4
3,081,245 UART: [art] Derive Key Pair
3,081,605 UART: [art] Store priv key in slot 0x5
3,094,169 UART: [art] Derive Key Pair - Done
3,108,726 UART: [art] Signing Cert with AUTHO
3,109,206 UART: RITY.KEYID = 7
3,124,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,931 UART: [art] PUB.X = AEEAE3AF3D7567D975F691594B042DDAB8B8C04C54C8730E5B65C60DF0B9372E740192175BCF1033E2AD7E34C43890F6
3,131,697 UART: [art] PUB.Y = 537D16762DB73191E90840BC8DC4DD974E79D1931DB92A211CCA5A927F986CABCE5802C0141759A743FDE8AADA697D38
3,138,649 UART: [art] SIG.R = 0821F68399BDBACCD52A9B1A9FFFD3FFA8D7A8F1B8185BCA20B4AE96FB9C4C477E269E46BBC78C31A60EE928AEEDEEA7
3,145,447 UART: [art] SIG.S = A9331A7161EDC0096DE5D4D4B4C683F415C2A221EFD1E38D72CC20D0FB0D90CC30190CDC80B88DA6E81625B186C06B84
3,169,131 UART: Caliptra RT
3,169,384 UART: [state] CFI Enabled
3,277,291 UART: [rt] RT listening for mailbox commands...
3,277,961 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,701 UART: [rt]cmd =0x41544d4e, len=14344
3,545,466 >>> mbox cmd response data (8 bytes)
3,545,467 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,428 UART: [rt]cmd =0x41545348, len=116
3,596,346 >>> mbox cmd response data (12 bytes)
3,596,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,166 UART:
3,597,182 UART: Running Caliptra ROM ...
3,597,590 UART:
3,597,645 UART: [state] CFI Enabled
3,599,717 UART: [state] LifecycleState = Unprovisioned
3,600,372 UART: [state] DebugLocked = No
3,600,958 UART: [state] WD Timer not started. Device not locked for debugging
3,602,298 UART: [kat] SHA2-256
4,407,948 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,412,073 UART: [kat] ++
4,412,225 UART: [kat] sha1
4,416,491 UART: [kat] SHA2-256
4,418,431 UART: [kat] SHA2-384
4,421,036 UART: [kat] SHA2-512-ACC
4,422,936 UART: [kat] ECC-384
4,433,149 UART: [kat] HMAC-384Kdf
4,437,679 UART: [kat] LMS
4,686,007 UART: [kat] --
4,686,897 UART: [update-reset] ++
6,001,488 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,002,501 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,152,499 >>> mbox cmd response: success
6,152,499 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,152,722 UART: [update-reset] Copying MAN_2 To MAN_1
6,160,736 UART: [update-reset Success] --
6,161,757 UART: [state] Locking Datavault
6,162,469 UART: [state] Locking PCR0, PCR1 and PCR31
6,163,073 UART: [state] Locking ICCM
6,163,537 UART: [exit] Launching FMC @ 0x40000130
6,168,866 UART:
6,168,882 UART: Running Caliptra FMC ...
6,169,290 UART:
6,169,344 UART: [state] CFI Enabled
6,258,101 UART: [art] Extend RT PCRs Done
6,258,529 UART: [art] Lock RT PCRs Done
6,259,730 UART: [art] Populate DV Done
6,268,193 UART: [fht] FMC Alias Private Key: 7
6,269,175 UART: [art] Derive CDI
6,269,455 UART: [art] Store in in slot 0x4
6,355,194 UART: [art] Derive Key Pair
6,355,554 UART: [art] Store priv key in slot 0x5
6,368,372 UART: [art] Derive Key Pair - Done
6,383,042 UART: [art] Signing Cert with AUTHO
6,383,522 UART: RITY.KEYID = 7
6,398,740 UART: [art] Erasing AUTHORITY.KEYID = 7
6,399,505 UART: [art] PUB.X = 06BA4A18BB2176191AC3F6635B232336F625B6E14808B538A0AAD456EA089068B9C603D20E6C45CDED46E3D6C9D4FD4D
6,406,268 UART: [art] PUB.Y = 4D27A9433526FD0FC3510DEF5F235396F182BC4349726D587F80C8F04299D75C761E03F9832FE21B76B696B35122BB5C
6,413,205 UART: [art] SIG.R = 0A49127DB35AA118C788B314D74F162AE25298686A3FD435A28C9AF6A2DD74DD120E0C9E16E89FAEE90DFCEA04F21CE9
6,419,976 UART: [art] SIG.S = 969AB74D5B0103A5936A968468BEA0C8F1DEA2F04294EE555C18AF77944B5FC05E67A3E14A14D5999F1DF42232172884
6,442,911 UART: Caliptra RT
6,443,164 UART: [state] CFI Enabled
6,722,045 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,752,926 UART: [rt]cmd =0x41545348, len=116
6,774,836 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,335 ready_for_fw is high
1,060,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,253 >>> mbox cmd response: success
2,690,869 UART:
2,690,885 UART: Running Caliptra FMC ...
2,691,293 UART:
2,691,347 UART: [state] CFI Enabled
2,701,746 UART: [fht] FMC Alias Private Key: 7
2,809,249 UART: [art] Extend RT PCRs Done
2,809,677 UART: [art] Lock RT PCRs Done
2,811,011 UART: [art] Populate DV Done
2,819,152 UART: [fht] FMC Alias Private Key: 7
2,820,088 UART: [art] Derive CDI
2,820,368 UART: [art] Store in in slot 0x4
2,905,609 UART: [art] Derive Key Pair
2,905,969 UART: [art] Store priv key in slot 0x5
2,919,055 UART: [art] Derive Key Pair - Done
2,934,164 UART: [art] Signing Cert with AUTHO
2,934,644 UART: RITY.KEYID = 7
2,949,538 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,303 UART: [art] PUB.X = CED6172C0CD3C838234A6A8495B66266544AABAFC7A4F61265E6C38B915C67285DCC8FCEAF1CECB8A028EF495545ED77
2,957,086 UART: [art] PUB.Y = 0D330FB650D4C08382792D116086BE79861028AB869A33622D13B5D985CAE8979DE7E09B093941F7A85C6F2254B5DA68
2,964,021 UART: [art] SIG.R = B8E54D51674D2DEE82C914DF1F5B26D854106AE3465B7AF50D247A9C0A5401BAA064A51F722DE008231A343655B55BF4
2,970,783 UART: [art] SIG.S = 34B9F8D60A5EE4DA9532A4CF446E272726503BAA315E9FB4EBC7AD5C81139E356C091F47AF6B0F8F6B25E0CF202E1B97
2,994,517 UART: Caliptra RT
2,994,770 UART: [state] CFI Enabled
3,102,197 UART: [rt] RT listening for mailbox commands...
3,102,867 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,569 UART: [rt]cmd =0x41544d4e, len=14344
3,370,594 >>> mbox cmd response data (8 bytes)
3,370,595 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,790 UART: [rt]cmd =0x41545348, len=116
3,422,500 >>> mbox cmd response data (12 bytes)
3,422,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,861,854 >>> mbox cmd response: success
5,861,854 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,875,452 UART:
5,875,468 UART: Running Caliptra FMC ...
5,875,876 UART:
5,875,930 UART: [state] CFI Enabled
5,965,063 UART: [art] Extend RT PCRs Done
5,965,491 UART: [art] Lock RT PCRs Done
5,966,712 UART: [art] Populate DV Done
5,974,935 UART: [fht] FMC Alias Private Key: 7
5,976,013 UART: [art] Derive CDI
5,976,293 UART: [art] Store in in slot 0x4
6,061,656 UART: [art] Derive Key Pair
6,062,016 UART: [art] Store priv key in slot 0x5
6,075,164 UART: [art] Derive Key Pair - Done
6,089,803 UART: [art] Signing Cert with AUTHO
6,090,283 UART: RITY.KEYID = 7
6,105,483 UART: [art] Erasing AUTHORITY.KEYID = 7
6,106,248 UART: [art] PUB.X = E2FD183038E48BA61A15D05BE6F896C412DA50F088756615B5338CB3273E8CD9450409D4196AD09BDE94818A5B783F3B
6,113,012 UART: [art] PUB.Y = B5F6DCC6252E0E86EABF3B173A82A167B0567BE770DDBD1BBB602E12823E46CB6B2AC6610E668B9849240CDD1DC5EF7E
6,119,973 UART: [art] SIG.R = CF9103CE1A4765ECB0200A42A09991FF50236E73E98ECDB6BF7A164B5368B0256EA1F43A58918999D1F3D1A9CD6A4CC2
6,126,747 UART: [art] SIG.S = E75A5B737DB36ADBD98E42C96FF2A6F2B5EF6307CE1377F2C922D359B4A5381E70D39719262C6B7F8A7B2BE3E5007BD7
6,150,551 UART: Caliptra RT
6,150,804 UART: [state] CFI Enabled
6,433,462 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,464,171 UART: [rt]cmd =0x41545348, len=116
6,485,577 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
893,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,940 UART: [kat] ++
898,092 UART: [kat] sha1
902,386 UART: [kat] SHA2-256
904,326 UART: [kat] SHA2-384
907,187 UART: [kat] SHA2-512-ACC
909,088 UART: [kat] ECC-384
919,047 UART: [kat] HMAC-384Kdf
923,665 UART: [kat] LMS
1,171,993 UART: [kat] --
1,172,994 UART: [cold-reset] ++
1,173,372 UART: [fht] FHT @ 0x50003400
1,176,001 UART: [idev] ++
1,176,169 UART: [idev] CDI.KEYID = 6
1,176,529 UART: [idev] SUBJECT.KEYID = 7
1,176,953 UART: [idev] UDS.KEYID = 0
1,177,298 ready_for_fw is high
1,177,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,117 UART: [idev] Erasing UDS.KEYID = 0
1,202,108 UART: [idev] Sha1 KeyId Algorithm
1,210,436 UART: [idev] --
1,211,506 UART: [ldev] ++
1,211,674 UART: [ldev] CDI.KEYID = 6
1,212,037 UART: [ldev] SUBJECT.KEYID = 5
1,212,463 UART: [ldev] AUTHORITY.KEYID = 7
1,212,926 UART: [ldev] FE.KEYID = 1
1,217,996 UART: [ldev] Erasing FE.KEYID = 1
1,244,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,684 UART: [ldev] --
1,284,181 UART: [fwproc] Wait for Commands...
1,284,853 UART: [fwproc] Recv command 0x46574c44
1,285,581 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,635 >>> mbox cmd response: success
2,777,835 UART: [afmc] ++
2,778,003 UART: [afmc] CDI.KEYID = 6
2,778,365 UART: [afmc] SUBJECT.KEYID = 7
2,778,790 UART: [afmc] AUTHORITY.KEYID = 5
2,814,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,478 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,091 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,810 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,416 UART: [afmc] --
2,857,490 UART: [cold-reset] --
2,858,386 UART: [state] Locking Datavault
2,859,735 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,339 UART: [state] Locking ICCM
2,860,781 UART: [exit] Launching FMC @ 0x40000130
2,866,110 UART:
2,866,126 UART: Running Caliptra FMC ...
2,866,534 UART:
2,866,677 UART: [state] CFI Enabled
2,877,516 UART: [fht] FMC Alias Private Key: 7
2,985,357 UART: [art] Extend RT PCRs Done
2,985,785 UART: [art] Lock RT PCRs Done
2,987,295 UART: [art] Populate DV Done
2,995,720 UART: [fht] FMC Alias Private Key: 7
2,996,900 UART: [art] Derive CDI
2,997,180 UART: [art] Store in in slot 0x4
3,082,817 UART: [art] Derive Key Pair
3,083,177 UART: [art] Store priv key in slot 0x5
3,096,723 UART: [art] Derive Key Pair - Done
3,111,413 UART: [art] Signing Cert with AUTHO
3,111,893 UART: RITY.KEYID = 7
3,127,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,034 UART: [art] PUB.X = DA17E6B32A07CFDA517AFAABCF58634AE328B58F9E6865B337456E758E66F68BF0BD7368BC803CD1DA2A4B25976A9314
3,134,815 UART: [art] PUB.Y = 6701146E013F6EFA395B91273BFA7785276504CF4FDE45EB3AC9EDD30E9E63C2101FD272CB7B696EBD82C1DD940A3361
3,141,760 UART: [art] SIG.R = D639160A3CF1A841CBE530DAD0C7A663E5D2749FE5B2A1E819F43D2AC54FE59651BBFA8BB2F37567DB8B71AD125B5F48
3,148,545 UART: [art] SIG.S = 9C11CDE7CC89AAFF97210252C3BC659EAEE2244E300FE8C71506AB410A35F4BA23FF4BFFD9DC79A8F3E8BB042935ED99
3,172,905 UART: Caliptra RT
3,173,250 UART: [state] CFI Enabled
3,281,356 UART: [rt] RT listening for mailbox commands...
3,282,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,066 UART: [rt]cmd =0x41544d4e, len=14344
3,549,567 >>> mbox cmd response data (8 bytes)
3,549,568 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,483 UART: [rt]cmd =0x41545348, len=116
3,601,293 >>> mbox cmd response data (12 bytes)
3,601,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,602,169 UART:
3,602,185 UART: Running Caliptra ROM ...
3,602,593 UART:
3,602,735 UART: [state] CFI Enabled
3,605,893 UART: [state] LifecycleState = Unprovisioned
3,606,548 UART: [state] DebugLocked = No
3,607,270 UART: [state] WD Timer not started. Device not locked for debugging
3,608,578 UART: [kat] SHA2-256
4,414,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,418,353 UART: [kat] ++
4,418,505 UART: [kat] sha1
4,422,551 UART: [kat] SHA2-256
4,424,491 UART: [kat] SHA2-384
4,427,306 UART: [kat] SHA2-512-ACC
4,429,206 UART: [kat] ECC-384
4,439,379 UART: [kat] HMAC-384Kdf
4,443,975 UART: [kat] LMS
4,692,303 UART: [kat] --
4,693,179 UART: [update-reset] ++
6,006,542 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,007,735 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,157,733 >>> mbox cmd response: success
6,157,733 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,157,884 UART: [update-reset] Copying MAN_2 To MAN_1
6,165,898 UART: [update-reset Success] --
6,166,977 UART: [state] Locking Datavault
6,167,875 UART: [state] Locking PCR0, PCR1 and PCR31
6,168,479 UART: [state] Locking ICCM
6,168,959 UART: [exit] Launching FMC @ 0x40000130
6,174,288 UART:
6,174,304 UART: Running Caliptra FMC ...
6,174,712 UART:
6,174,855 UART: [state] CFI Enabled
6,263,840 UART: [art] Extend RT PCRs Done
6,264,268 UART: [art] Lock RT PCRs Done
6,265,383 UART: [art] Populate DV Done
6,273,546 UART: [fht] FMC Alias Private Key: 7
6,274,488 UART: [art] Derive CDI
6,274,768 UART: [art] Store in in slot 0x4
6,360,807 UART: [art] Derive Key Pair
6,361,167 UART: [art] Store priv key in slot 0x5
6,374,559 UART: [art] Derive Key Pair - Done
6,389,477 UART: [art] Signing Cert with AUTHO
6,389,957 UART: RITY.KEYID = 7
6,405,113 UART: [art] Erasing AUTHORITY.KEYID = 7
6,405,878 UART: [art] PUB.X = 60A6F5E176748D685CB653952DA8D9647336D020B4070C5FB67BF9EE1899D3E94804CC2599CB115BCEB9534F545CB2B5
6,412,641 UART: [art] PUB.Y = 8E1735D52BAD1B2CF4C34322D3267D06D54B6128DE84FBBEE23EFE37AD38ECE6A454CC73068D858E5BA536FDA32EE553
6,419,603 UART: [art] SIG.R = E99D3849B9B0663318AFB9F47D6951414C205155F999163CD1C0492BCA0D1F35A5A955C93B017716A338296895793158
6,426,353 UART: [art] SIG.S = 21028CBC9A043C07CCE8CBE2C7588E069EF9309070428A2E90DD3F5FC5BB17A67DF13E6723760D76DCFA5C3DB2CA597A
6,449,771 UART: Caliptra RT
6,450,116 UART: [state] CFI Enabled
6,728,133 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,758,898 UART: [rt]cmd =0x41545348, len=116
6,779,644 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,074 ready_for_fw is high
1,060,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,214 >>> mbox cmd response: success
2,688,810 UART:
2,688,826 UART: Running Caliptra FMC ...
2,689,234 UART:
2,689,377 UART: [state] CFI Enabled
2,700,060 UART: [fht] FMC Alias Private Key: 7
2,807,839 UART: [art] Extend RT PCRs Done
2,808,267 UART: [art] Lock RT PCRs Done
2,809,687 UART: [art] Populate DV Done
2,818,042 UART: [fht] FMC Alias Private Key: 7
2,819,102 UART: [art] Derive CDI
2,819,382 UART: [art] Store in in slot 0x4
2,904,737 UART: [art] Derive Key Pair
2,905,097 UART: [art] Store priv key in slot 0x5
2,918,531 UART: [art] Derive Key Pair - Done
2,933,168 UART: [art] Signing Cert with AUTHO
2,933,648 UART: RITY.KEYID = 7
2,948,654 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,419 UART: [art] PUB.X = 30F50711C80A390D3F18CBB79DD5316BA8E216FC998DBCFB5735EE6A646FA2D7B31B45FDD0C06BCDE6A013C4BD3CB4F6
2,956,204 UART: [art] PUB.Y = ECB10FA7D971280E86277BA23FB7C5C2410BA76E54CCB16CFB1AA9CD4788958817E8AFB429532B1E5283FEAB536F963A
2,963,159 UART: [art] SIG.R = BE4A9C098B2832BD5EBB449A61245BED4A61C1E8801C28DF9002BA766E2784AB6CB5FC69457938286BD1B2E6DC9D970B
2,969,932 UART: [art] SIG.S = D131FB239EDA83DD0881EDC3B2B89E693EA82661A2FDBA4C312F79D25265A36C05E4E5D964938A746C076C148FB0314A
2,993,712 UART: Caliptra RT
2,994,057 UART: [state] CFI Enabled
3,101,893 UART: [rt] RT listening for mailbox commands...
3,102,563 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,603 UART: [rt]cmd =0x41544d4e, len=14344
3,370,526 >>> mbox cmd response data (8 bytes)
3,370,527 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,734 UART: [rt]cmd =0x41545348, len=116
3,422,010 >>> mbox cmd response data (12 bytes)
3,422,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,861,847 >>> mbox cmd response: success
5,861,847 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,875,147 UART:
5,875,163 UART: Running Caliptra FMC ...
5,875,571 UART:
5,875,714 UART: [state] CFI Enabled
5,964,863 UART: [art] Extend RT PCRs Done
5,965,291 UART: [art] Lock RT PCRs Done
5,966,210 UART: [art] Populate DV Done
5,974,507 UART: [fht] FMC Alias Private Key: 7
5,975,525 UART: [art] Derive CDI
5,975,805 UART: [art] Store in in slot 0x4
6,061,548 UART: [art] Derive Key Pair
6,061,908 UART: [art] Store priv key in slot 0x5
6,075,092 UART: [art] Derive Key Pair - Done
6,089,931 UART: [art] Signing Cert with AUTHO
6,090,411 UART: RITY.KEYID = 7
6,105,725 UART: [art] Erasing AUTHORITY.KEYID = 7
6,106,490 UART: [art] PUB.X = B229CF7C49966335AD27FD659C0C94ACD671D75D952B331EB1BD6F65ADBDD5CF088ECEED3B93933275614F610DF2D935
6,113,265 UART: [art] PUB.Y = 98C7781C7A167ED7F56F74378B1911A1F9D0FBD7C62C0BA4B962AC91F35BB72C3E926A3270C46BEFF9214A0AEA0A9637
6,120,218 UART: [art] SIG.R = EDD1A3897E027E4B9F74723C67A3FAE842B8D84A44FDC11710E3BC28662A4B2462D5EC8742E577EB751C0D4E85B932A5
6,126,990 UART: [art] SIG.S = D072C3269DC7CEC54DD9ED56F9CA5554BDCB434570A86C7CDDC907AC4DA49823D98E10D581B9B010C98873CB9C68AD63
6,150,488 UART: Caliptra RT
6,150,833 UART: [state] CFI Enabled
6,430,067 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,461,020 UART: [rt]cmd =0x41545348, len=116
6,481,926 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,529 UART: [kat] SHA2-256
901,469 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
915,794 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,503 UART: [cold-reset] ++
1,169,981 UART: [fht] FHT @ 0x50003400
1,172,613 UART: [idev] ++
1,172,781 UART: [idev] CDI.KEYID = 6
1,173,142 UART: [idev] SUBJECT.KEYID = 7
1,173,567 UART: [idev] UDS.KEYID = 0
1,173,913 ready_for_fw is high
1,173,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,607 UART: [idev] Erasing UDS.KEYID = 0
1,198,877 UART: [idev] Sha1 KeyId Algorithm
1,207,753 UART: [idev] --
1,208,810 UART: [ldev] ++
1,208,978 UART: [ldev] CDI.KEYID = 6
1,209,342 UART: [ldev] SUBJECT.KEYID = 5
1,209,769 UART: [ldev] AUTHORITY.KEYID = 7
1,210,232 UART: [ldev] FE.KEYID = 1
1,215,556 UART: [ldev] Erasing FE.KEYID = 1
1,242,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,720 UART: [ldev] --
1,281,094 UART: [fwproc] Wait for Commands...
1,281,855 UART: [fwproc] Recv command 0x46574c44
1,282,588 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,052 >>> mbox cmd response: success
2,775,305 UART: [afmc] ++
2,775,473 UART: [afmc] CDI.KEYID = 6
2,775,836 UART: [afmc] SUBJECT.KEYID = 7
2,776,262 UART: [afmc] AUTHORITY.KEYID = 5
2,811,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,610 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,339 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,222 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,900 UART: [afmc] --
2,854,902 UART: [cold-reset] --
2,855,904 UART: [state] Locking Datavault
2,856,865 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,469 UART: [state] Locking ICCM
2,857,991 UART: [exit] Launching FMC @ 0x40000130
2,863,320 UART:
2,863,336 UART: Running Caliptra FMC ...
2,863,744 UART:
2,863,798 UART: [state] CFI Enabled
2,873,895 UART: [fht] FMC Alias Private Key: 7
2,982,196 UART: [art] Extend RT PCRs Done
2,982,624 UART: [art] Lock RT PCRs Done
2,984,008 UART: [art] Populate DV Done
2,992,283 UART: [fht] FMC Alias Private Key: 7
2,993,265 UART: [art] Derive CDI
2,993,545 UART: [art] Store in in slot 0x4
3,079,382 UART: [art] Derive Key Pair
3,079,742 UART: [art] Store priv key in slot 0x5
3,092,348 UART: [art] Derive Key Pair - Done
3,107,215 UART: [art] Signing Cert with AUTHO
3,107,695 UART: RITY.KEYID = 7
3,123,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,956 UART: [art] PUB.X = 0B16A1DB66C881BD1BC5740D66131AD40E2B12F9BC098D28DEB05712802E896641114FEB5565286E77F8B03697870834
3,130,705 UART: [art] PUB.Y = 2E995C4897A497B8B886987110EF843A1CA31C7BBDE05D64BD2C6416AE997923803ABDD97488A292D7B20B89E6C5B52E
3,137,656 UART: [art] SIG.R = A886DE388D92F37BF53149EB9B9D80D6B551895BA7E5C644B5EA35791967C3919EC493F01BC9A57AD9831BC081867E66
3,144,428 UART: [art] SIG.S = 17E044B4A9FC4CE575B24E0BA0C83E3949707A37DA1A8540B8B199534CE8397CA75EEA93A90D543882197D6B2DDAF205
3,168,272 UART: Caliptra RT
3,168,525 UART: [state] CFI Enabled
3,275,214 UART: [rt] RT listening for mailbox commands...
3,275,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,098 UART: [rt]cmd =0x41544d4e, len=14344
3,544,097 >>> mbox cmd response data (8 bytes)
3,544,098 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,189 UART: [rt]cmd =0x41545348, len=116
3,595,443 >>> mbox cmd response data (12 bytes)
3,595,444 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,596,459 UART:
3,596,475 UART: Running Caliptra ROM ...
3,596,883 UART:
3,596,938 UART: [state] CFI Enabled
3,600,104 UART: [state] LifecycleState = Unprovisioned
3,600,759 UART: [state] DebugLocked = No
3,601,419 UART: [state] WD Timer not started. Device not locked for debugging
3,602,669 UART: [kat] SHA2-256
4,406,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,410,348 UART: [kat] ++
4,410,500 UART: [kat] sha1
4,414,654 UART: [kat] SHA2-256
4,416,594 UART: [kat] SHA2-384
4,419,501 UART: [kat] SHA2-512-ACC
4,421,401 UART: [kat] ECC-384
4,430,686 UART: [kat] HMAC-384Kdf
4,435,122 UART: [kat] LMS
4,683,434 UART: [kat] --
4,684,378 UART: [update-reset] ++
5,997,742 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,998,955 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,148,953 >>> mbox cmd response: success
6,148,953 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,149,188 UART: [update-reset] Copying MAN_2 To MAN_1
6,157,202 UART: [update-reset Success] --
6,158,301 UART: [state] Locking Datavault
6,159,135 UART: [state] Locking PCR0, PCR1 and PCR31
6,159,739 UART: [state] Locking ICCM
6,160,353 UART: [exit] Launching FMC @ 0x40000130
6,165,682 UART:
6,165,698 UART: Running Caliptra FMC ...
6,166,106 UART:
6,166,160 UART: [state] CFI Enabled
6,255,197 UART: [art] Extend RT PCRs Done
6,255,625 UART: [art] Lock RT PCRs Done
6,256,690 UART: [art] Populate DV Done
6,265,179 UART: [fht] FMC Alias Private Key: 7
6,266,339 UART: [art] Derive CDI
6,266,619 UART: [art] Store in in slot 0x4
6,352,498 UART: [art] Derive Key Pair
6,352,858 UART: [art] Store priv key in slot 0x5
6,366,100 UART: [art] Derive Key Pair - Done
6,380,895 UART: [art] Signing Cert with AUTHO
6,381,375 UART: RITY.KEYID = 7
6,396,227 UART: [art] Erasing AUTHORITY.KEYID = 7
6,396,992 UART: [art] PUB.X = 964A0DF1809F1BB14053F0CA11BD48B4D599547C07F50F32961AC260382FCC4FA3681014B7A6EE14DBDD207C3366C74D
6,403,759 UART: [art] PUB.Y = 793BB3955072FB265DBBDB66F9702731A0DD635913BDD95EAFEEE9E1208F007CE745B8ECD316BFB33B198DEF68EB1BA2
6,410,707 UART: [art] SIG.R = 0DFB44E57FCF22FCA30F44C980D3FD998BE9E6092FD70CECF4CC0CAF116372A2F2EA1341BDDCC698C3C746EB70F40AB3
6,417,487 UART: [art] SIG.S = BE6A8BD688515FA46359B6E30A67C379EDC6E41FDEEDC1E2880B1FAD3034B5E6388A06FB868F09B466170E182F87E094
6,441,013 UART: Caliptra RT
6,441,266 UART: [state] CFI Enabled
6,721,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,752,518 UART: [rt]cmd =0x41545348, len=116
6,773,924 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,340 ready_for_fw is high
1,056,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,900 >>> mbox cmd response: success
2,686,786 UART:
2,686,802 UART: Running Caliptra FMC ...
2,687,210 UART:
2,687,264 UART: [state] CFI Enabled
2,697,953 UART: [fht] FMC Alias Private Key: 7
2,806,148 UART: [art] Extend RT PCRs Done
2,806,576 UART: [art] Lock RT PCRs Done
2,807,848 UART: [art] Populate DV Done
2,815,795 UART: [fht] FMC Alias Private Key: 7
2,816,833 UART: [art] Derive CDI
2,817,113 UART: [art] Store in in slot 0x4
2,902,586 UART: [art] Derive Key Pair
2,902,946 UART: [art] Store priv key in slot 0x5
2,916,110 UART: [art] Derive Key Pair - Done
2,930,822 UART: [art] Signing Cert with AUTHO
2,931,302 UART: RITY.KEYID = 7
2,946,238 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,003 UART: [art] PUB.X = DC514476C167031D4FE1D7B99436E6792421CAAE2023C1889B8579ADC852A274C8EC34F9172DF10A12C097AE9182C66D
2,953,767 UART: [art] PUB.Y = 1A651A9C98CD9FC79745DF3C4AD7910511430B3BD83F71648218187016125BA3B11F616F7809C398B53AF8D535F8A985
2,960,702 UART: [art] SIG.R = 489D1D8D4B8E8225175E2A5A5C6C19E83332CFEDF81B84ADB82D2A0083086F308B2A938CAD14016F5CDC3CC30410534D
2,967,449 UART: [art] SIG.S = 1423F67D886DDC75D7B55A6ADE89F3E273012B5D24B653AB7353C6A83252DFE6EA2B7573A7935FBA01A8773AF086AAA9
2,991,170 UART: Caliptra RT
2,991,423 UART: [state] CFI Enabled
3,098,722 UART: [rt] RT listening for mailbox commands...
3,099,392 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,492 UART: [rt]cmd =0x41544d4e, len=14344
3,367,371 >>> mbox cmd response data (8 bytes)
3,367,372 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,581 UART: [rt]cmd =0x41545348, len=116
3,418,373 >>> mbox cmd response data (12 bytes)
3,418,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,854,704 >>> mbox cmd response: success
5,854,704 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,868,202 UART:
5,868,218 UART: Running Caliptra FMC ...
5,868,626 UART:
5,868,680 UART: [state] CFI Enabled
5,957,589 UART: [art] Extend RT PCRs Done
5,958,017 UART: [art] Lock RT PCRs Done
5,959,170 UART: [art] Populate DV Done
5,967,237 UART: [fht] FMC Alias Private Key: 7
5,968,191 UART: [art] Derive CDI
5,968,471 UART: [art] Store in in slot 0x4
6,054,140 UART: [art] Derive Key Pair
6,054,500 UART: [art] Store priv key in slot 0x5
6,067,572 UART: [art] Derive Key Pair - Done
6,082,341 UART: [art] Signing Cert with AUTHO
6,082,821 UART: RITY.KEYID = 7
6,098,291 UART: [art] Erasing AUTHORITY.KEYID = 7
6,099,056 UART: [art] PUB.X = 947087F1C0D68FDD962042F9A7EE603F6B69FA564C0918E9D0EB49A1A87FF3F10ED563D120778F1760B8F741DC116782
6,105,822 UART: [art] PUB.Y = BD8DE3940EE29FCE08B68568112FF38ED48E9051F23D4C47E1637EDE9531DB55D07DF3F2327B6446C0BD0B89F97B3DC0
6,112,775 UART: [art] SIG.R = 0A6C787A321BBF0C593B7C68BF015DCCA3D8195C30DCB397DB10BE65DAB499923B53F153599E929946A24EAE09EC3F97
6,119,545 UART: [art] SIG.S = 3F31ABD3DE90BC17D1810DE023D0351A50813CB0EBA30326AB8344268D162A2F605A5F0150AAAC821ABBEE5271B60989
6,143,888 UART: Caliptra RT
6,144,141 UART: [state] CFI Enabled
6,422,094 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,452,821 UART: [rt]cmd =0x41545348, len=116
6,475,013 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,733 UART: [kat] SHA2-512-ACC
906,634 UART: [kat] ECC-384
916,109 UART: [kat] HMAC-384Kdf
920,757 UART: [kat] LMS
1,169,069 UART: [kat] --
1,170,032 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,174,434 ready_for_fw is high
1,174,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,968 UART: [idev] Erasing UDS.KEYID = 0
1,199,462 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,565 UART: [ldev] ++
1,209,733 UART: [ldev] CDI.KEYID = 6
1,210,097 UART: [ldev] SUBJECT.KEYID = 5
1,210,524 UART: [ldev] AUTHORITY.KEYID = 7
1,210,987 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,243,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,073 UART: [ldev] --
1,282,413 UART: [fwproc] Wait for Commands...
1,283,118 UART: [fwproc] Recv command 0x46574c44
1,283,851 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,355 >>> mbox cmd response: success
2,777,550 UART: [afmc] ++
2,777,718 UART: [afmc] CDI.KEYID = 6
2,778,081 UART: [afmc] SUBJECT.KEYID = 7
2,778,507 UART: [afmc] AUTHORITY.KEYID = 5
2,814,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,235 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,847 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,566 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,383 UART: [afmc] --
2,857,365 UART: [cold-reset] --
2,858,295 UART: [state] Locking Datavault
2,859,664 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,268 UART: [state] Locking ICCM
2,860,724 UART: [exit] Launching FMC @ 0x40000130
2,866,053 UART:
2,866,069 UART: Running Caliptra FMC ...
2,866,477 UART:
2,866,620 UART: [state] CFI Enabled
2,877,757 UART: [fht] FMC Alias Private Key: 7
2,986,082 UART: [art] Extend RT PCRs Done
2,986,510 UART: [art] Lock RT PCRs Done
2,988,122 UART: [art] Populate DV Done
2,996,127 UART: [fht] FMC Alias Private Key: 7
2,997,219 UART: [art] Derive CDI
2,997,499 UART: [art] Store in in slot 0x4
3,083,144 UART: [art] Derive Key Pair
3,083,504 UART: [art] Store priv key in slot 0x5
3,097,568 UART: [art] Derive Key Pair - Done
3,112,125 UART: [art] Signing Cert with AUTHO
3,112,605 UART: RITY.KEYID = 7
3,127,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,762 UART: [art] PUB.X = 08FE8E378C5BD575456A7F7C592726C1CD34E20CE393826EE60DE899DF6F305BC93C7AC01EF2BAD711DDF1E43A063EB8
3,135,536 UART: [art] PUB.Y = B4D77228A1DFD7E8D5605A4A18DE9AF11DBB005D09BFD477994F6D06D34767EC5D31DE3DE0336AD44631FB3B050365A0
3,142,464 UART: [art] SIG.R = 18EC36440438981A2C3DDD0CF03AFB42FF1CF2489837B51102D383246EE58BC6E3131F5B764071AE1858B739DBD40716
3,149,222 UART: [art] SIG.S = AF42245A5F4D1DB95DC65FF2A3D6EF038474EDFACFD91E9462C32C825E8814E15C033AE25002518424BE5E4A84EA5398
3,173,218 UART: Caliptra RT
3,173,563 UART: [state] CFI Enabled
3,282,098 UART: [rt] RT listening for mailbox commands...
3,282,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,786 UART: [rt]cmd =0x41544d4e, len=14344
3,550,763 >>> mbox cmd response data (8 bytes)
3,550,764 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,571 UART: [rt]cmd =0x41545348, len=116
3,601,741 >>> mbox cmd response data (12 bytes)
3,601,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,602,645 UART:
3,602,661 UART: Running Caliptra ROM ...
3,603,069 UART:
3,603,211 UART: [state] CFI Enabled
3,606,027 UART: [state] LifecycleState = Unprovisioned
3,606,682 UART: [state] DebugLocked = No
3,607,188 UART: [state] WD Timer not started. Device not locked for debugging
3,608,394 UART: [kat] SHA2-256
4,411,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,416,073 UART: [kat] ++
4,416,225 UART: [kat] sha1
4,420,417 UART: [kat] SHA2-256
4,422,357 UART: [kat] SHA2-384
4,425,138 UART: [kat] SHA2-512-ACC
4,427,038 UART: [kat] ECC-384
4,437,103 UART: [kat] HMAC-384Kdf
4,441,667 UART: [kat] LMS
4,689,979 UART: [kat] --
4,690,693 UART: [update-reset] ++
6,004,789 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,005,996 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,155,994 >>> mbox cmd response: success
6,155,994 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,156,119 UART: [update-reset] Copying MAN_2 To MAN_1
6,164,133 UART: [update-reset Success] --
6,165,214 UART: [state] Locking Datavault
6,165,958 UART: [state] Locking PCR0, PCR1 and PCR31
6,166,562 UART: [state] Locking ICCM
6,167,090 UART: [exit] Launching FMC @ 0x40000130
6,172,419 UART:
6,172,435 UART: Running Caliptra FMC ...
6,172,843 UART:
6,172,986 UART: [state] CFI Enabled
6,262,101 UART: [art] Extend RT PCRs Done
6,262,529 UART: [art] Lock RT PCRs Done
6,263,600 UART: [art] Populate DV Done
6,271,857 UART: [fht] FMC Alias Private Key: 7
6,273,007 UART: [art] Derive CDI
6,273,287 UART: [art] Store in in slot 0x4
6,359,050 UART: [art] Derive Key Pair
6,359,410 UART: [art] Store priv key in slot 0x5
6,372,344 UART: [art] Derive Key Pair - Done
6,386,987 UART: [art] Signing Cert with AUTHO
6,387,467 UART: RITY.KEYID = 7
6,402,283 UART: [art] Erasing AUTHORITY.KEYID = 7
6,403,048 UART: [art] PUB.X = F13FA9CE040EB83812E776C81CE95A707A4A4C9C5C861DA21D076733806E4F7EB82961212123F3223CC924622396D775
6,409,803 UART: [art] PUB.Y = BA3771BBBD9D6D1522CDA4F2096630602490B4E3CC058B016B5995EAA82C27CA9037C69F2B41E116E871BBFD734887F8
6,416,750 UART: [art] SIG.R = 4826A53BC7E4F64F2990DAD447C3F7FD8CA95666C28DC5F316F8EF9001CEBE3291178C410525CA017B883D53360DBDDA
6,423,518 UART: [art] SIG.S = 8F5FB3E3A0D9409724F406C96D4ED100175400351DEAC0C03E7FFFC97FC33955A80BACEF22B6812880BE7EACEA46BF9D
6,447,151 UART: Caliptra RT
6,447,496 UART: [state] CFI Enabled
6,731,921 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,762,710 UART: [rt]cmd =0x41545348, len=116
6,783,516 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,213 ready_for_fw is high
1,056,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,865 >>> mbox cmd response: success
2,686,983 UART:
2,686,999 UART: Running Caliptra FMC ...
2,687,407 UART:
2,687,550 UART: [state] CFI Enabled
2,698,505 UART: [fht] FMC Alias Private Key: 7
2,806,846 UART: [art] Extend RT PCRs Done
2,807,274 UART: [art] Lock RT PCRs Done
2,809,022 UART: [art] Populate DV Done
2,817,053 UART: [fht] FMC Alias Private Key: 7
2,818,055 UART: [art] Derive CDI
2,818,335 UART: [art] Store in in slot 0x4
2,904,090 UART: [art] Derive Key Pair
2,904,450 UART: [art] Store priv key in slot 0x5
2,917,806 UART: [art] Derive Key Pair - Done
2,932,549 UART: [art] Signing Cert with AUTHO
2,933,029 UART: RITY.KEYID = 7
2,948,309 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,074 UART: [art] PUB.X = 7C4B78587D093B15C72CC66E9B915B01C24F599778D8777199FD105AB48CD698BFD3BE67C541A44C4A0762D68328D9FF
2,955,837 UART: [art] PUB.Y = 1DB735DDB1C5720A31B28C69B364436279CE833720C1A4BD4518E84603473A85F0B61F1C59E1AD1D41BDADC44548C300
2,962,761 UART: [art] SIG.R = A21C668EE6ADAD05108ECD0AD5A0F855D3BCDF10A05FFC477BCEE6A9FB167BDE776769A510B7352CC7ACF69CF2F0A9F0
2,969,555 UART: [art] SIG.S = 50F0258043F409EA02FD020BAAA9A9BDB9BC769E6A8FC322D02F100177004464A2E0598D32DC65A0B764B8913235CEB7
2,993,563 UART: Caliptra RT
2,993,908 UART: [state] CFI Enabled
3,102,459 UART: [rt] RT listening for mailbox commands...
3,103,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,075 UART: [rt]cmd =0x41544d4e, len=14344
3,371,030 >>> mbox cmd response data (8 bytes)
3,371,031 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,852 UART: [rt]cmd =0x41545348, len=116
3,422,482 >>> mbox cmd response data (12 bytes)
3,422,483 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,857,086 >>> mbox cmd response: success
5,857,086 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,870,356 UART:
5,870,372 UART: Running Caliptra FMC ...
5,870,780 UART:
5,870,923 UART: [state] CFI Enabled
5,960,074 UART: [art] Extend RT PCRs Done
5,960,502 UART: [art] Lock RT PCRs Done
5,961,847 UART: [art] Populate DV Done
5,969,874 UART: [fht] FMC Alias Private Key: 7
5,970,832 UART: [art] Derive CDI
5,971,112 UART: [art] Store in in slot 0x4
6,056,613 UART: [art] Derive Key Pair
6,056,973 UART: [art] Store priv key in slot 0x5
6,070,181 UART: [art] Derive Key Pair - Done
6,084,937 UART: [art] Signing Cert with AUTHO
6,085,417 UART: RITY.KEYID = 7
6,100,787 UART: [art] Erasing AUTHORITY.KEYID = 7
6,101,552 UART: [art] PUB.X = 4DFA400342D91D2D454F27F05576C4AB3E8178510D62DB9A8FEFFC3336FBCC69DD8FD4784B584CCAA663611C5A69C8D8
6,108,330 UART: [art] PUB.Y = 4144A73D41BE51AB87751FFDB39ACEEC0973D6F739D3F65BF65FF48F5112258BC1EC137679725B0EA3EDDAC0D85C7B03
6,115,287 UART: [art] SIG.R = 616B899D23DBDCB927B9115458D35648656E5399D349086057E4BE47F91E7891D44507DA1CC9AE839CE77CC9BC298D8F
6,122,051 UART: [art] SIG.S = 3316FE8AB02A494C7369E9109E1FAE97D6982221BCE82F213968DCD05AC4E0BEA009DE57E1016EF79745FF142E405A96
6,145,732 UART: Caliptra RT
6,146,077 UART: [state] CFI Enabled
6,428,208 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,459,043 UART: [rt]cmd =0x41545348, len=116
6,480,623 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,073 UART:
192,453 UART: Running Caliptra ROM ...
193,569 UART:
193,711 UART: [state] CFI Enabled
259,726 UART: [state] LifecycleState = Unprovisioned
261,646 UART: [state] DebugLocked = No
263,735 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,878 UART: [kat] SHA2-256
438,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,064 UART: [kat] ++
449,520 UART: [kat] sha1
461,104 UART: [kat] SHA2-256
463,757 UART: [kat] SHA2-384
469,322 UART: [kat] SHA2-512-ACC
471,687 UART: [kat] ECC-384
2,766,016 UART: [kat] HMAC-384Kdf
2,777,898 UART: [kat] LMS
3,968,233 UART: [kat] --
3,971,318 UART: [cold-reset] ++
3,973,604 UART: [fht] Storing FHT @ 0x50003400
3,985,790 UART: [idev] ++
3,986,355 UART: [idev] CDI.KEYID = 6
3,987,416 UART: [idev] SUBJECT.KEYID = 7
3,988,516 UART: [idev] UDS.KEYID = 0
3,989,473 ready_for_fw is high
3,989,666 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,180 UART: [idev] Erasing UDS.KEYID = 0
7,324,966 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,168 UART: [idev] --
7,350,432 UART: [ldev] ++
7,351,006 UART: [ldev] CDI.KEYID = 6
7,351,978 UART: [ldev] SUBJECT.KEYID = 5
7,353,190 UART: [ldev] AUTHORITY.KEYID = 7
7,354,437 UART: [ldev] FE.KEYID = 1
7,401,765 UART: [ldev] Erasing FE.KEYID = 1
10,734,661 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,196 UART: [ldev] --
13,094,295 UART: [fwproc] Waiting for Commands...
13,097,088 UART: [fwproc] Received command 0x46574c44
13,099,270 UART: [fwproc] Received Image of size 114124 bytes
17,147,627 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,224,604 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,293,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,609,948 >>> mbox cmd response: success
17,614,638 UART: [afmc] ++
17,615,258 UART: [afmc] CDI.KEYID = 6
17,616,145 UART: [afmc] SUBJECT.KEYID = 7
17,617,421 UART: [afmc] AUTHORITY.KEYID = 5
20,986,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,967 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,222 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,636 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,478 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,923 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,070 UART: [afmc] --
23,359,585 UART: [cold-reset] --
23,363,667 UART: [state] Locking Datavault
23,369,678 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,422 UART: [state] Locking ICCM
23,374,119 UART: [exit] Launching FMC @ 0x40000130
23,382,524 UART:
23,382,785 UART: Running Caliptra FMC ...
23,383,889 UART:
23,384,049 UART: [state] CFI Enabled
23,445,799 UART: [fht] FMC Alias Private Key: 7
25,783,363 UART: [art] Extend RT PCRs Done
25,784,579 UART: [art] Lock RT PCRs Done
25,785,851 UART: [art] Populate DV Done
25,791,368 UART: [fht] FMC Alias Private Key: 7
25,793,075 UART: [art] Derive CDI
25,793,896 UART: [art] Store in in slot 0x4
25,853,373 UART: [art] Derive Key Pair
25,854,404 UART: [art] Store priv key in slot 0x5
29,147,345 UART: [art] Derive Key Pair - Done
29,160,284 UART: [art] Signing Cert with AUTHO
29,161,583 UART: RITY.KEYID = 7
31,448,197 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,718 UART: [art] PUB.X = FD0F3C0D69B9CCF655F1FA06C6F9B6C77EBCF8DE14BBF730D3540A2F75804130CED64C3D63BC0426862958D4DE3FEB53
31,456,967 UART: [art] PUB.Y = 71C62808306287AB86FA68D321C4EE227836E8974816DF6003BB0BF0F4CB03ACBA5072896FABA8309E87CF55D9D6CC7B
31,464,198 UART: [art] SIG.R = 0DFC1A834DEF9C469B6F5C4A6105517EA5E7AD8BDC06269C8DE15903526D52301108D133F2A0C23C4E29E0ECF1A49A0A
31,471,593 UART: [art] SIG.S = 3A429C8D416F9A18CAC7D5D7926E64E6AFE5FB2CDC2B490D457455C8476054C7981CF055BB1D3E42E2FC12C4BD418168
32,776,603 UART: Caliptra RT
32,777,307 UART: [state] CFI Enabled
32,938,215 UART: [rt] RT listening for mailbox commands...
32,940,591 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,095,707 UART: [rt]cmd =0x41544d4e, len=14344
38,331,589 >>> mbox cmd response data (8 bytes)
38,332,168 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,363,003 UART: [rt]cmd =0x41545348, len=116
38,365,098 >>> mbox cmd response data (12 bytes)
40,503,175 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,648,531 UART:
40,648,901 UART: Running Caliptra ROM ...
40,649,994 UART:
40,650,161 UART: [state] CFI Enabled
40,724,945 UART: [state] LifecycleState = Unprovisioned
40,726,893 UART: [state] DebugLocked = No
40,728,611 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,733,578 UART: [kat] SHA2-256
40,903,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,913,776 UART: [kat] ++
40,914,316 UART: [kat] sha1
40,924,943 UART: [kat] SHA2-256
40,927,627 UART: [kat] SHA2-384
40,934,277 UART: [kat] SHA2-512-ACC
40,936,691 UART: [kat] ECC-384
43,225,966 UART: [kat] HMAC-384Kdf
43,237,766 UART: [kat] LMS
44,428,126 UART: [kat] --
44,434,548 UART: [update-reset] ++
48,575,192 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,579,194 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,961,468 >>> mbox cmd response: success
48,966,719 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,967,335 UART: [update-reset] Copying MAN_2 To MAN_1
48,984,272 UART: [update-reset Success] --
48,987,118 UART: [state] Locking Datavault
48,991,352 UART: [state] Locking PCR0, PCR1 and PCR31
48,993,056 UART: [state] Locking ICCM
48,995,027 UART: [exit] Launching FMC @ 0x40000130
49,003,478 UART:
49,003,719 UART: Running Caliptra FMC ...
49,004,829 UART:
49,004,992 UART: [state] CFI Enabled
49,092,644 UART: [art] Extend RT PCRs Done
49,093,843 UART: [art] Lock RT PCRs Done
49,095,195 UART: [art] Populate DV Done
49,100,711 UART: [fht] FMC Alias Private Key: 7
49,102,356 UART: [art] Derive CDI
49,103,168 UART: [art] Store in in slot 0x4
49,162,108 UART: [art] Derive Key Pair
49,163,152 UART: [art] Store priv key in slot 0x5
52,455,579 UART: [art] Derive Key Pair - Done
52,468,548 UART: [art] Signing Cert with AUTHO
52,469,858 UART: RITY.KEYID = 7
54,756,432 UART: [art] Erasing AUTHORITY.KEYID = 7
54,757,938 UART: [art] PUB.X = 53BD18B989BBF08B589B9912BE201AA9F20790E91C10E81DA9AA723B643C15F21526C14D4DFFD3B2040B92AC86E09C0E
54,765,230 UART: [art] PUB.Y = 6D7573B5B720BD017757703AB7841F6D7C951F63AA7000E811C89A766BC293FF4C5E02967F941F8F1EBB12834A207D63
54,772,455 UART: [art] SIG.R = B3D1A6489B7FD0F05B64B7F3305EB8E3EA8023D982E65B91A47E3B4F44CA80B3AA6EAB9D7935FAB7B98750A58A5DDC76
54,779,853 UART: [art] SIG.S = A20703630600908310CE999286938661280F1802160DE593A95F4D3F30B2EFF1894ED72D7EB11FF00D05A5ADBAEAFE36
56,085,355 UART: Caliptra RT
56,086,226 UART: [state] CFI Enabled
56,419,043 UART: [rt] RT listening for mailbox commands...
56,450,996 UART: [rt]cmd =0x41545348, len=116
56,453,295 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,786,429 ready_for_fw is high
3,786,843 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,856,185 >>> mbox cmd response: success
23,543,735 UART:
23,544,116 UART: Running Caliptra FMC ...
23,545,262 UART:
23,545,426 UART: [state] CFI Enabled
23,615,164 UART: [fht] FMC Alias Private Key: 7
25,952,878 UART: [art] Extend RT PCRs Done
25,954,121 UART: [art] Lock RT PCRs Done
25,955,967 UART: [art] Populate DV Done
25,961,442 UART: [fht] FMC Alias Private Key: 7
25,962,986 UART: [art] Derive CDI
25,963,801 UART: [art] Store in in slot 0x4
26,024,620 UART: [art] Derive Key Pair
26,025,665 UART: [art] Store priv key in slot 0x5
29,318,087 UART: [art] Derive Key Pair - Done
29,330,834 UART: [art] Signing Cert with AUTHO
29,332,153 UART: RITY.KEYID = 7
31,620,355 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,870 UART: [art] PUB.X = E6BB2C6CA8FF36824B175D4EF15D130A1138ECC2401B5CCC16516D043557050CE5603792CEDBEECCAD57D22459F114D7
31,629,144 UART: [art] PUB.Y = E88C303F531F9799F60D82817A58AE22E2DD837FFC0787330347D414D2F7CB2030BD7FE90BB1E9098C47394CCE2CB490
31,636,372 UART: [art] SIG.R = E4F7CBDC3B79F6BAE6B463E8CD0323B478AE1EF101FC871879B3E956CF0DE8E9B659088104435215EEA48BBF2E5436E9
31,643,738 UART: [art] SIG.S = 7F4DC0C6A82EB80A38D237DF8D8BBAEBE0FE74DF331C97A131782854A9FA7E75B2084817EE3E2EEB44D40969CB3E155E
32,948,993 UART: Caliptra RT
32,949,733 UART: [state] CFI Enabled
33,111,511 UART: [rt] RT listening for mailbox commands...
33,113,899 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,269,291 UART: [rt]cmd =0x41544d4e, len=14344
38,505,165 >>> mbox cmd response data (8 bytes)
38,505,759 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,536,404 UART: [rt]cmd =0x41545348, len=116
38,538,479 >>> mbox cmd response data (12 bytes)
40,667,697 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,411,348 >>> mbox cmd response: success
49,412,398 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,446,798 UART:
49,447,145 UART: Running Caliptra FMC ...
49,448,189 UART:
49,448,341 UART: [state] CFI Enabled
49,554,033 UART: [art] Extend RT PCRs Done
49,555,226 UART: [art] Lock RT PCRs Done
49,556,608 UART: [art] Populate DV Done
49,562,294 UART: [fht] FMC Alias Private Key: 7
49,563,783 UART: [art] Derive CDI
49,564,550 UART: [art] Store in in slot 0x4
49,622,865 UART: [art] Derive Key Pair
49,623,904 UART: [art] Store priv key in slot 0x5
52,916,997 UART: [art] Derive Key Pair - Done
52,929,874 UART: [art] Signing Cert with AUTHO
52,931,183 UART: RITY.KEYID = 7
55,217,905 UART: [art] Erasing AUTHORITY.KEYID = 7
55,219,453 UART: [art] PUB.X = 94304D3FA09E9563520F99E721E144B0FA4DF0D2AF184198866105310247AC20B934B842F0EA1BB1A7B415A8E3CD5E2A
55,226,675 UART: [art] PUB.Y = 35F2B288922A47999F902AFD78007438EEA1B0190B781F07D263E88EE3681E3FE339110767089A531D2E93AD54D328A5
55,233,885 UART: [art] SIG.R = BC9DB4D35002B889047A3466409749AD1C34D9D461E015B87FA6E181154C50A4426DE86A2595BAFD75E9E9E1EE963808
55,241,244 UART: [art] SIG.S = F6BEFCDD87268FE86B678A5921D0A0F2015E4E35838B3386A5663D8D69537EE08DC1E12A87CE87E705A4C18B982491FF
56,546,070 UART: Caliptra RT
56,546,776 UART: [state] CFI Enabled
56,877,614 UART: [rt] RT listening for mailbox commands...
56,909,409 UART: [rt]cmd =0x41545348, len=116
56,911,723 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,545 UART:
192,919 UART: Running Caliptra ROM ...
194,027 UART:
603,842 UART: [state] CFI Enabled
613,603 UART: [state] LifecycleState = Unprovisioned
615,544 UART: [state] DebugLocked = No
618,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,050 UART: [kat] SHA2-256
793,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,301 UART: [kat] ++
804,772 UART: [kat] sha1
815,922 UART: [kat] SHA2-256
818,637 UART: [kat] SHA2-384
825,047 UART: [kat] SHA2-512-ACC
827,413 UART: [kat] ECC-384
3,112,123 UART: [kat] HMAC-384Kdf
3,123,013 UART: [kat] LMS
4,313,152 UART: [kat] --
4,318,862 UART: [cold-reset] ++
4,320,582 UART: [fht] Storing FHT @ 0x50003400
4,332,418 UART: [idev] ++
4,332,979 UART: [idev] CDI.KEYID = 6
4,334,009 UART: [idev] SUBJECT.KEYID = 7
4,335,184 UART: [idev] UDS.KEYID = 0
4,336,190 ready_for_fw is high
4,336,395 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,124 UART: [idev] Erasing UDS.KEYID = 0
7,620,508 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,660 UART: [idev] --
7,647,898 UART: [ldev] ++
7,648,473 UART: [ldev] CDI.KEYID = 6
7,649,453 UART: [ldev] SUBJECT.KEYID = 5
7,650,668 UART: [ldev] AUTHORITY.KEYID = 7
7,651,899 UART: [ldev] FE.KEYID = 1
7,661,945 UART: [ldev] Erasing FE.KEYID = 1
10,946,840 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,670 UART: [ldev] --
13,307,193 UART: [fwproc] Waiting for Commands...
13,310,249 UART: [fwproc] Received command 0x46574c44
13,312,495 UART: [fwproc] Received Image of size 114124 bytes
17,370,182 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,567 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,830,288 >>> mbox cmd response: success
17,833,977 UART: [afmc] ++
17,834,565 UART: [afmc] CDI.KEYID = 6
17,835,581 UART: [afmc] SUBJECT.KEYID = 7
17,836,737 UART: [afmc] AUTHORITY.KEYID = 5
21,149,153 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,751 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,012 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,355 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,218 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,650 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,442 UART: [afmc] --
23,515,144 UART: [cold-reset] --
23,518,515 UART: [state] Locking Datavault
23,523,434 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,184 UART: [state] Locking ICCM
23,526,569 UART: [exit] Launching FMC @ 0x40000130
23,534,960 UART:
23,535,194 UART: Running Caliptra FMC ...
23,536,218 UART:
23,536,357 UART: [state] CFI Enabled
23,544,426 UART: [fht] FMC Alias Private Key: 7
25,875,302 UART: [art] Extend RT PCRs Done
25,876,529 UART: [art] Lock RT PCRs Done
25,878,500 UART: [art] Populate DV Done
25,884,070 UART: [fht] FMC Alias Private Key: 7
25,885,722 UART: [art] Derive CDI
25,886,540 UART: [art] Store in in slot 0x4
25,929,137 UART: [art] Derive Key Pair
25,930,135 UART: [art] Store priv key in slot 0x5
29,172,734 UART: [art] Derive Key Pair - Done
29,185,945 UART: [art] Signing Cert with AUTHO
29,187,262 UART: RITY.KEYID = 7
31,466,807 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,314 UART: [art] PUB.X = 5B5F23BAB704C3C65487253E527AC59A67B85BB283B1100E0614E06F89DB79BEFDE5BEB911CD9DAAB2DD545259D6CD63
31,475,574 UART: [art] PUB.Y = EAB6235E3ECF1789D9804AE5B331EC8A2F88D0D7C7F382DEC5D8DC0719AD3EDD7783B96A53E31EF82605A6CA88B66624
31,482,857 UART: [art] SIG.R = 5D7E2ADF12300ACB97F256E46B2CBA9DA15FF29D07F30CC15791F30A9A05AB8511D7646CD1F661B23B53EF67010E2B33
31,490,230 UART: [art] SIG.S = C16960D1586B329083D340B73D271FAF76E5EA994FE2C15C732E08EEC8F2128969DB324B2132101ED280358E0BF2DBB0
32,794,970 UART: Caliptra RT
32,795,652 UART: [state] CFI Enabled
32,914,986 UART: [rt] RT listening for mailbox commands...
32,917,381 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,072,530 UART: [rt]cmd =0x41544d4e, len=14344
38,308,406 >>> mbox cmd response data (8 bytes)
38,309,015 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,339,531 UART: [rt]cmd =0x41545348, len=116
38,341,892 >>> mbox cmd response data (12 bytes)
40,395,540 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
40,540,557 UART:
40,540,951 UART: Running Caliptra ROM ...
40,542,043 UART:
40,542,201 UART: [state] CFI Enabled
40,555,173 UART: [state] LifecycleState = Unprovisioned
40,557,067 UART: [state] DebugLocked = No
40,559,957 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,564,334 UART: [kat] SHA2-256
40,734,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,744,602 UART: [kat] ++
40,745,079 UART: [kat] sha1
40,756,795 UART: [kat] SHA2-256
40,759,505 UART: [kat] SHA2-384
40,765,610 UART: [kat] SHA2-512-ACC
40,768,013 UART: [kat] ECC-384
43,050,927 UART: [kat] HMAC-384Kdf
43,062,618 UART: [kat] LMS
44,252,649 UART: [kat] --
44,256,933 UART: [update-reset] ++
48,399,341 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,403,400 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
48,785,688 >>> mbox cmd response: success
48,790,461 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,791,077 UART: [update-reset] Copying MAN_2 To MAN_1
48,809,101 UART: [update-reset Success] --
48,814,689 UART: [state] Locking Datavault
48,818,046 UART: [state] Locking PCR0, PCR1 and PCR31
48,819,744 UART: [state] Locking ICCM
48,822,432 UART: [exit] Launching FMC @ 0x40000130
48,830,877 UART:
48,831,160 UART: Running Caliptra FMC ...
48,832,188 UART:
48,832,328 UART: [state] CFI Enabled
48,876,877 UART: [art] Extend RT PCRs Done
48,878,017 UART: [art] Lock RT PCRs Done
48,879,540 UART: [art] Populate DV Done
48,885,049 UART: [fht] FMC Alias Private Key: 7
48,886,531 UART: [art] Derive CDI
48,887,289 UART: [art] Store in in slot 0x4
48,929,931 UART: [art] Derive Key Pair
48,930,975 UART: [art] Store priv key in slot 0x5
52,173,098 UART: [art] Derive Key Pair - Done
52,186,001 UART: [art] Signing Cert with AUTHO
52,187,312 UART: RITY.KEYID = 7
54,466,706 UART: [art] Erasing AUTHORITY.KEYID = 7
54,468,213 UART: [art] PUB.X = 0F4BC40CC2AF53D3D7A6802B75CABBFFC0265889A5923F7CEF7B8A4C347E45DFC0863E7B4979D4D82E346627F09C1B98
54,475,457 UART: [art] PUB.Y = 01DD0FA8E123EED94E065A9B336F9555ADBE96719866645245DEF1D3776BF4288A0566F371F665B7B1BE823C6B86B9D0
54,482,671 UART: [art] SIG.R = 8EA44F62C85B1BE127C55F2711F40C787EF202E8A1C02C8C07F3A9C62328E9561B610E23D32C6ECCF5F5501134A03DED
54,490,056 UART: [art] SIG.S = 03197B01005C23B33321CC18DB14E82AC27E6CD3CAC85FB99C7D42257FFF51927CAF30E0B3C3149CA066EE85B76BA6C0
55,795,703 UART: Caliptra RT
55,796,401 UART: [state] CFI Enabled
56,088,280 UART: [rt] RT listening for mailbox commands...
56,120,006 UART: [rt]cmd =0x41545348, len=116
56,122,396 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,353 writing to cptra_bootfsm_go
4,131,354 ready_for_fw is high
4,131,924 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,741 >>> mbox cmd response: success
23,712,949 UART:
23,713,363 UART: Running Caliptra FMC ...
23,714,500 UART:
23,714,656 UART: [state] CFI Enabled
23,722,753 UART: [fht] FMC Alias Private Key: 7
26,053,922 UART: [art] Extend RT PCRs Done
26,055,150 UART: [art] Lock RT PCRs Done
26,057,155 UART: [art] Populate DV Done
26,062,629 UART: [fht] FMC Alias Private Key: 7
26,064,278 UART: [art] Derive CDI
26,065,013 UART: [art] Store in in slot 0x4
26,107,563 UART: [art] Derive Key Pair
26,108,603 UART: [art] Store priv key in slot 0x5
29,350,715 UART: [art] Derive Key Pair - Done
29,364,138 UART: [art] Signing Cert with AUTHO
29,365,471 UART: RITY.KEYID = 7
31,644,999 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,514 UART: [art] PUB.X = 29073004D143742E8A6D2B0F3A63B8558DCE95FC115ED9D794783138CF5889BA9BBA87318ACF56669B5363A3974D16F2
31,653,700 UART: [art] PUB.Y = 90E5623AB8E71CBE5184D5E6408803B7133A7000C3C30633DD3AE7A921353169A00150A321C283DBBE9071C57DD7B6F4
31,660,944 UART: [art] SIG.R = AD48E3E36E2ECFC15624C6C052E45F131B60D8FF4382A0D81A30E33663D01B7009776A9FAF2E35B89AFE9CFDCE2AFF47
31,668,321 UART: [art] SIG.S = 8BC290250F079E357A229A4ADD925287594189BE8054A0BA4D5CD2837D08EC4CA05E973F1157079FE38043C086610F4A
32,973,952 UART: Caliptra RT
32,974,660 UART: [state] CFI Enabled
33,093,076 UART: [rt] RT listening for mailbox commands...
33,095,477 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,250,996 UART: [rt]cmd =0x41544d4e, len=14344
38,486,867 >>> mbox cmd response data (8 bytes)
38,487,422 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,518,042 UART: [rt]cmd =0x41545348, len=116
38,520,568 >>> mbox cmd response data (12 bytes)
40,574,468 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
49,232,823 >>> mbox cmd response: success
49,233,494 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,267,978 UART:
49,268,263 UART: Running Caliptra FMC ...
49,269,392 UART:
49,269,547 UART: [state] CFI Enabled
49,314,070 UART: [art] Extend RT PCRs Done
49,315,260 UART: [art] Lock RT PCRs Done
49,316,501 UART: [art] Populate DV Done
49,322,119 UART: [fht] FMC Alias Private Key: 7
49,323,651 UART: [art] Derive CDI
49,324,461 UART: [art] Store in in slot 0x4
49,366,683 UART: [art] Derive Key Pair
49,367,735 UART: [art] Store priv key in slot 0x5
52,609,667 UART: [art] Derive Key Pair - Done
52,622,611 UART: [art] Signing Cert with AUTHO
52,623,922 UART: RITY.KEYID = 7
54,903,750 UART: [art] Erasing AUTHORITY.KEYID = 7
54,905,255 UART: [art] PUB.X = 4FF70C7DF7CFFE52414C6A5C8192BD01A1DDE066B63E8EAB709C2D27A197786EFA9D40AF913C58A423358D0D56B8EE42
54,912,515 UART: [art] PUB.Y = 6DD85132862F2EEE9A49742CB3FBB4D1232203A525832353137D559CA0A7AD4630BE40C733273CAF5C11B4296A85A1DB
54,919,749 UART: [art] SIG.R = 1E43B50C82751522ABC8478BFE97793AF214C93599258BF84396217B6EC6B12EC69FA82002F5AADEB04BA2634E460D9F
54,927,144 UART: [art] SIG.S = E1FA64B36B6570F5E6987F36FA6A4144D2C02106EA1B68FBD1EDD3F01E70F61F8E0BA62B08BDC37FD62F9B8BBA7E3C66
56,232,369 UART: Caliptra RT
56,233,069 UART: [state] CFI Enabled
56,522,528 UART: [rt] RT listening for mailbox commands...
56,554,520 UART: [rt]cmd =0x41545348, len=116
56,556,663 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
192,014 UART:
192,380 UART: Running Caliptra ROM ...
193,586 UART:
193,761 UART: [state] CFI Enabled
266,403 UART: [state] LifecycleState = Unprovisioned
268,330 UART: [state] DebugLocked = No
270,223 UART: [state] WD Timer not started. Device not locked for debugging
274,315 UART: [kat] SHA2-256
453,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,029 UART: [kat] ++
465,573 UART: [kat] sha1
477,446 UART: [kat] SHA2-256
480,459 UART: [kat] SHA2-384
487,369 UART: [kat] SHA2-512-ACC
490,300 UART: [kat] ECC-384
2,949,482 UART: [kat] HMAC-384Kdf
2,971,114 UART: [kat] LMS
3,500,569 UART: [kat] --
3,507,127 UART: [cold-reset] ++
3,508,859 UART: [fht] FHT @ 0x50003400
3,520,833 UART: [idev] ++
3,521,400 UART: [idev] CDI.KEYID = 6
3,522,431 UART: [idev] SUBJECT.KEYID = 7
3,523,534 UART: [idev] UDS.KEYID = 0
3,524,478 ready_for_fw is high
3,524,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,730 UART: [idev] Erasing UDS.KEYID = 0
6,030,642 UART: [idev] Sha1 KeyId Algorithm
6,053,711 UART: [idev] --
6,058,087 UART: [ldev] ++
6,058,664 UART: [ldev] CDI.KEYID = 6
6,059,731 UART: [ldev] SUBJECT.KEYID = 5
6,060,836 UART: [ldev] AUTHORITY.KEYID = 7
6,062,014 UART: [ldev] FE.KEYID = 1
6,101,560 UART: [ldev] Erasing FE.KEYID = 1
8,601,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,818 UART: [ldev] --
10,393,808 UART: [fwproc] Wait for Commands...
10,396,553 UART: [fwproc] Recv command 0x46574c44
10,398,642 UART: [fwproc] Recv'd Img size: 114448 bytes
13,806,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,100 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,272,311 >>> mbox cmd response: success
14,277,023 UART: [afmc] ++
14,277,622 UART: [afmc] CDI.KEYID = 6
14,278,511 UART: [afmc] SUBJECT.KEYID = 7
14,279,638 UART: [afmc] AUTHORITY.KEYID = 5
16,809,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,980 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,791 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,679 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,413 UART: [afmc] --
18,629,026 UART: [cold-reset] --
18,631,919 UART: [state] Locking Datavault
18,637,482 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,131 UART: [state] Locking ICCM
18,640,149 UART: [exit] Launching FMC @ 0x40000130
18,648,538 UART:
18,648,772 UART: Running Caliptra FMC ...
18,649,871 UART:
18,650,050 UART: [state] CFI Enabled
18,710,916 UART: [fht] FMC Alias Private Key: 7
20,474,414 UART: [art] Extend RT PCRs Done
20,475,640 UART: [art] Lock RT PCRs Done
20,476,996 UART: [art] Populate DV Done
20,482,629 UART: [fht] FMC Alias Private Key: 7
20,484,173 UART: [art] Derive CDI
20,484,935 UART: [art] Store in in slot 0x4
20,542,845 UART: [art] Derive Key Pair
20,543,879 UART: [art] Store priv key in slot 0x5
23,007,230 UART: [art] Derive Key Pair - Done
23,020,182 UART: [art] Signing Cert with AUTHO
23,021,492 UART: RITY.KEYID = 7
24,732,028 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,534 UART: [art] PUB.X = 30B7D591E41618FE63F991E0CFF83DF0A3ACA38883E61E716C281F61D41C1357327A29B00B0BE7FD9BC438ADF18B1C38
24,740,823 UART: [art] PUB.Y = 631239B4B599A64960B920C33B7158909AB320D91718070A6F4A9617AC3CD15241D06FB8930695907EEAC2C7137257A9
24,748,041 UART: [art] SIG.R = B2A9CC3679450094A7D6BD35BE803F8AB7A5EDC25EBDE4487B254EBB0739A74411D4D380C9D44C8407561C16A6D9C580
24,755,438 UART: [art] SIG.S = 2FDF55662A871D1DEA1ADB8A2085ABDD9A4328CE781170B3ACEA34424B71BE0F4DA3B7E20D71BCA606B277E5282FCCA3
25,734,809 UART: Caliptra RT
25,735,518 UART: [state] CFI Enabled
25,899,944 UART: [rt] RT listening for mailbox commands...
25,902,337 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,058,412 UART: [rt]cmd =0x41544d4e, len=14344
29,988,782 >>> mbox cmd response data (8 bytes)
29,989,373 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,020,174 UART: [rt]cmd =0x41545348, len=116
30,022,466 >>> mbox cmd response data (12 bytes)
32,076,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,221,795 UART:
32,222,169 UART: Running Caliptra ROM ...
32,223,299 UART:
32,223,470 UART: [state] CFI Enabled
32,280,690 UART: [state] LifecycleState = Unprovisioned
32,282,579 UART: [state] DebugLocked = No
32,285,264 UART: [state] WD Timer not started. Device not locked for debugging
32,288,373 UART: [kat] SHA2-256
32,467,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,479,119 UART: [kat] ++
32,479,576 UART: [kat] sha1
32,490,241 UART: [kat] SHA2-256
32,493,256 UART: [kat] SHA2-384
32,499,189 UART: [kat] SHA2-512-ACC
32,502,123 UART: [kat] ECC-384
34,963,126 UART: [kat] HMAC-384Kdf
34,987,532 UART: [kat] LMS
35,517,007 UART: [kat] --
35,522,132 UART: [update-reset] ++
38,956,251 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,959,161 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,342,470 >>> mbox cmd response: success
39,342,921 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,343,788 UART: [update-reset] Copying MAN_2 To MAN_1
39,366,066 UART: [update-reset Success] --
39,369,761 UART: [state] Locking Datavault
39,372,957 UART: [state] Locking PCR0, PCR1 and PCR31
39,374,601 UART: [state] Locking ICCM
39,377,095 UART: [exit] Launching FMC @ 0x40000130
39,385,530 UART:
39,385,773 UART: Running Caliptra FMC ...
39,386,874 UART:
39,387,054 UART: [state] CFI Enabled
39,476,500 UART: [art] Extend RT PCRs Done
39,477,677 UART: [art] Lock RT PCRs Done
39,479,347 UART: [art] Populate DV Done
39,485,033 UART: [fht] FMC Alias Private Key: 7
39,486,515 UART: [art] Derive CDI
39,487,277 UART: [art] Store in in slot 0x4
39,545,317 UART: [art] Derive Key Pair
39,546,461 UART: [art] Store priv key in slot 0x5
42,009,235 UART: [art] Derive Key Pair - Done
42,022,202 UART: [art] Signing Cert with AUTHO
42,023,562 UART: RITY.KEYID = 7
43,734,912 UART: [art] Erasing AUTHORITY.KEYID = 7
43,736,421 UART: [art] PUB.X = D505587B9F3C26045BD99A92F9FC844A4645DCF4A24299E7391F37DA14288409C83920DF65B58185C38591708D562ED9
43,743,627 UART: [art] PUB.Y = 956D39ABFE2BC06E3FDCAFEBDFEE737915377713B53ADBF674A44D6D8E7803B56C9E3A12AD655D4A67AB684AF59792A0
43,750,920 UART: [art] SIG.R = AD0F7CE62E334F6570CF1559A7196D3957A8EF908215B6ADB12975C14153DBCB95597A118E60DC3B8028169F777B966D
43,758,343 UART: [art] SIG.S = 45EEC1656A446FA7E58C34B5B2AF71ACD0621834FA94A96CD084E6C9C36DE5D538E55A350CE9FCDFC4B1AE11ACAD7282
44,737,255 UART: Caliptra RT
44,737,965 UART: [state] CFI Enabled
45,074,262 UART: [rt] RT listening for mailbox commands...
45,106,165 UART: [rt]cmd =0x41545348, len=116
45,108,354 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
3,363,715 ready_for_fw is high
3,364,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,042,809 >>> mbox cmd response: success
18,329,261 UART:
18,329,662 UART: Running Caliptra FMC ...
18,330,965 UART:
18,331,131 UART: [state] CFI Enabled
18,393,459 UART: [fht] FMC Alias Private Key: 7
20,156,873 UART: [art] Extend RT PCRs Done
20,158,089 UART: [art] Lock RT PCRs Done
20,159,745 UART: [art] Populate DV Done
20,165,040 UART: [fht] FMC Alias Private Key: 7
20,166,554 UART: [art] Derive CDI
20,167,293 UART: [art] Store in in slot 0x4
20,226,180 UART: [art] Derive Key Pair
20,227,225 UART: [art] Store priv key in slot 0x5
22,690,145 UART: [art] Derive Key Pair - Done
22,703,082 UART: [art] Signing Cert with AUTHO
22,704,583 UART: RITY.KEYID = 7
24,415,995 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,500 UART: [art] PUB.X = 848F9A8E8A95FE42AB0A72DAAEEAF72A20E0804C495F890FDBDF7550A41A0FAB59349E03521B788ADD36DD7A5A6168EA
24,424,805 UART: [art] PUB.Y = 0DBD0FD87E69CC68470099619C0CD2F1C145461E7556F115EC686BB47AAB3931D2C239AB4355A4DD80AB4E49B5B98183
24,432,058 UART: [art] SIG.R = 86943B42676FE9AC49DD82F5100AD86BD3A90317CD661EED14BE0A381657847641656058B50DBD1F90300606B9E5A82E
24,439,389 UART: [art] SIG.S = 58DEF9563CABC85D7F7EB69BD3B95F29F67EBB231B883AB1158D3E6ADBF2B1EEDAE2258746387B4ACACF5D6CA93E851C
25,418,841 UART: Caliptra RT
25,419,556 UART: [state] CFI Enabled
25,582,585 UART: [rt] RT listening for mailbox commands...
25,585,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,740,987 UART: [rt]cmd =0x41544d4e, len=14344
29,671,325 >>> mbox cmd response data (8 bytes)
29,671,912 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,702,539 UART: [rt]cmd =0x41545348, len=116
29,704,687 >>> mbox cmd response data (12 bytes)
31,757,695 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,862,239 >>> mbox cmd response: success
38,862,844 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,898,025 UART:
38,898,354 UART: Running Caliptra FMC ...
38,899,480 UART:
38,899,638 UART: [state] CFI Enabled
38,993,312 UART: [art] Extend RT PCRs Done
38,994,503 UART: [art] Lock RT PCRs Done
38,995,691 UART: [art] Populate DV Done
39,001,150 UART: [fht] FMC Alias Private Key: 7
39,002,634 UART: [art] Derive CDI
39,003,406 UART: [art] Store in in slot 0x4
39,062,328 UART: [art] Derive Key Pair
39,063,372 UART: [art] Store priv key in slot 0x5
41,525,995 UART: [art] Derive Key Pair - Done
41,539,097 UART: [art] Signing Cert with AUTHO
41,540,405 UART: RITY.KEYID = 7
43,251,878 UART: [art] Erasing AUTHORITY.KEYID = 7
43,253,381 UART: [art] PUB.X = 8EB55C8CA219FCF985D721506157D640074FACF538738DE8305028B1C2AB5D68999085BAD00AC947697CA5EF0B593E73
43,260,624 UART: [art] PUB.Y = AEA661EDE3CEECFC46743643A76409C9C121F4ECFD0FF5FC429861943E950783E0A703074C025B844A135E6199A8ACC4
43,267,898 UART: [art] SIG.R = D8767FDF100E07CBE8763A5898E5C37E03D0BBA46283CCCE4973312E5677F2342EF18DFB494D5DB942D9B7EA1999F413
43,275,295 UART: [art] SIG.S = 7C5B49E87CE810DB23E9D4B96A16F7D60F40E5D713856426315BA584863AC977C379A3BDDF986895CDEAB661CC659C6B
44,253,882 UART: Caliptra RT
44,254,604 UART: [state] CFI Enabled
44,596,611 UART: [rt] RT listening for mailbox commands...
44,628,490 UART: [rt]cmd =0x41545348, len=116
44,630,656 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,492 UART:
192,858 UART: Running Caliptra ROM ...
194,080 UART:
603,536 UART: [state] CFI Enabled
616,926 UART: [state] LifecycleState = Unprovisioned
618,794 UART: [state] DebugLocked = No
621,298 UART: [state] WD Timer not started. Device not locked for debugging
624,382 UART: [kat] SHA2-256
803,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,118 UART: [kat] ++
815,560 UART: [kat] sha1
827,558 UART: [kat] SHA2-256
830,627 UART: [kat] SHA2-384
836,698 UART: [kat] SHA2-512-ACC
839,669 UART: [kat] ECC-384
3,280,238 UART: [kat] HMAC-384Kdf
3,292,114 UART: [kat] LMS
3,821,637 UART: [kat] --
3,825,598 UART: [cold-reset] ++
3,826,465 UART: [fht] FHT @ 0x50003400
3,835,873 UART: [idev] ++
3,836,427 UART: [idev] CDI.KEYID = 6
3,837,329 UART: [idev] SUBJECT.KEYID = 7
3,838,492 UART: [idev] UDS.KEYID = 0
3,839,531 ready_for_fw is high
3,839,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,983,446 UART: [idev] Erasing UDS.KEYID = 0
6,310,585 UART: [idev] Sha1 KeyId Algorithm
6,333,489 UART: [idev] --
6,337,040 UART: [ldev] ++
6,337,606 UART: [ldev] CDI.KEYID = 6
6,338,561 UART: [ldev] SUBJECT.KEYID = 5
6,339,652 UART: [ldev] AUTHORITY.KEYID = 7
6,340,979 UART: [ldev] FE.KEYID = 1
6,349,855 UART: [ldev] Erasing FE.KEYID = 1
8,822,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,985 UART: [ldev] --
10,612,226 UART: [fwproc] Wait for Commands...
10,613,938 UART: [fwproc] Recv command 0x46574c44
10,616,019 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,531 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,481,687 >>> mbox cmd response: success
14,486,484 UART: [afmc] ++
14,487,070 UART: [afmc] CDI.KEYID = 6
14,487,995 UART: [afmc] SUBJECT.KEYID = 7
14,489,149 UART: [afmc] AUTHORITY.KEYID = 5
16,989,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,834 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,852 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,726 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,326 UART: [afmc] --
18,787,724 UART: [cold-reset] --
18,791,466 UART: [state] Locking Datavault
18,795,677 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,325 UART: [state] Locking ICCM
18,799,634 UART: [exit] Launching FMC @ 0x40000130
18,808,028 UART:
18,808,259 UART: Running Caliptra FMC ...
18,809,372 UART:
18,809,539 UART: [state] CFI Enabled
18,817,850 UART: [fht] FMC Alias Private Key: 7
20,574,857 UART: [art] Extend RT PCRs Done
20,576,070 UART: [art] Lock RT PCRs Done
20,577,693 UART: [art] Populate DV Done
20,582,880 UART: [fht] FMC Alias Private Key: 7
20,584,464 UART: [art] Derive CDI
20,585,266 UART: [art] Store in in slot 0x4
20,627,581 UART: [art] Derive Key Pair
20,628,618 UART: [art] Store priv key in slot 0x5
23,055,903 UART: [art] Derive Key Pair - Done
23,068,949 UART: [art] Signing Cert with AUTHO
23,070,248 UART: RITY.KEYID = 7
24,775,925 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,434 UART: [art] PUB.X = 3B74748723B47F9F5D0390F8EB747B8D7DF201E2556B72DA3399CF19ECF47B34FC739B09BA6FEF957D11D7C741C2A83C
24,784,741 UART: [art] PUB.Y = 648AE9D406D547920278D08B32CC3A64661B259D0D411984431FEC3DDF47EED48C0B2AC526348F972850F9ED4980D741
24,791,943 UART: [art] SIG.R = 9446550459B49D59FE740DEF52E0D0AEFF6E20D229176841E8EF29B2549789D29B531415090046BD3F5E3FC00E376A60
24,799,274 UART: [art] SIG.S = FAC8F43FCCAB987FF83961888DDAAE4C0A6662BDAC13C0AF7018BDA3CF9A6BCAF3500EE7CE60C99A5B615B671FD4C47B
25,778,766 UART: Caliptra RT
25,779,452 UART: [state] CFI Enabled
25,896,724 UART: [rt] RT listening for mailbox commands...
25,899,183 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,054,544 UART: [rt]cmd =0x41544d4e, len=14344
29,984,998 >>> mbox cmd response data (8 bytes)
29,985,578 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,016,246 UART: [rt]cmd =0x41545348, len=116
30,018,393 >>> mbox cmd response data (12 bytes)
32,071,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
32,216,683 UART:
32,217,037 UART: Running Caliptra ROM ...
32,218,088 UART:
32,218,238 UART: [state] CFI Enabled
32,230,674 UART: [state] LifecycleState = Unprovisioned
32,232,502 UART: [state] DebugLocked = No
32,234,823 UART: [state] WD Timer not started. Device not locked for debugging
32,238,015 UART: [kat] SHA2-256
32,417,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,428,748 UART: [kat] ++
32,429,201 UART: [kat] sha1
32,441,097 UART: [kat] SHA2-256
32,444,146 UART: [kat] SHA2-384
32,451,700 UART: [kat] SHA2-512-ACC
32,454,643 UART: [kat] ECC-384
34,895,008 UART: [kat] HMAC-384Kdf
34,907,195 UART: [kat] LMS
35,436,717 UART: [kat] --
35,441,457 UART: [update-reset] ++
38,867,631 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,871,874 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
39,255,141 >>> mbox cmd response: success
39,255,612 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,256,694 UART: [update-reset] Copying MAN_2 To MAN_1
39,279,020 UART: [update-reset Success] --
39,282,708 UART: [state] Locking Datavault
39,285,304 UART: [state] Locking PCR0, PCR1 and PCR31
39,286,941 UART: [state] Locking ICCM
39,288,222 UART: [exit] Launching FMC @ 0x40000130
39,296,664 UART:
39,296,893 UART: Running Caliptra FMC ...
39,297,999 UART:
39,298,152 UART: [state] CFI Enabled
39,342,003 UART: [art] Extend RT PCRs Done
39,343,193 UART: [art] Lock RT PCRs Done
39,344,854 UART: [art] Populate DV Done
39,350,524 UART: [fht] FMC Alias Private Key: 7
39,352,004 UART: [art] Derive CDI
39,352,760 UART: [art] Store in in slot 0x4
39,395,238 UART: [art] Derive Key Pair
39,396,328 UART: [art] Store priv key in slot 0x5
41,822,867 UART: [art] Derive Key Pair - Done
41,835,587 UART: [art] Signing Cert with AUTHO
41,836,877 UART: RITY.KEYID = 7
43,542,687 UART: [art] Erasing AUTHORITY.KEYID = 7
43,544,192 UART: [art] PUB.X = 34962EBC6815822B6AEC9CEC6773E34826F696EA776CCE2868D47F2BB277B8202A2F68DF29435B1CAEAFAAAF1484C654
43,551,431 UART: [art] PUB.Y = 60FEDFCBA34702FB54A2B10491FC048FEA0D8AC69FC48CFBEE312B13CD3DD7FBD24F3A8F146FB24ADE35AE4C6FB2F9D6
43,558,756 UART: [art] SIG.R = D922E3EEAC8CD34AF5D338335A70F5FCB3CC5D1E7104B6CC59C086F1B0E3EC0250BC16B9C79D28A6A02DBA308FA41F4F
43,566,215 UART: [art] SIG.S = 5396D34DCCC77C240DF54C08BBC3AE093994A064F4F26107A60ED32AD5DAE8B666243717B9FA67CD446D1229DF19C930
44,544,689 UART: Caliptra RT
44,545,373 UART: [state] CFI Enabled
44,836,498 UART: [rt] RT listening for mailbox commands...
44,868,396 UART: [rt]cmd =0x41545348, len=116
44,870,525 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,693,126 ready_for_fw is high
3,693,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,262,476 >>> mbox cmd response: success
18,505,297 UART:
18,505,689 UART: Running Caliptra FMC ...
18,506,830 UART:
18,506,980 UART: [state] CFI Enabled
18,514,925 UART: [fht] FMC Alias Private Key: 7
20,272,028 UART: [art] Extend RT PCRs Done
20,273,251 UART: [art] Lock RT PCRs Done
20,274,952 UART: [art] Populate DV Done
20,280,184 UART: [fht] FMC Alias Private Key: 7
20,281,661 UART: [art] Derive CDI
20,282,416 UART: [art] Store in in slot 0x4
20,325,216 UART: [art] Derive Key Pair
20,326,251 UART: [art] Store priv key in slot 0x5
22,753,043 UART: [art] Derive Key Pair - Done
22,766,108 UART: [art] Signing Cert with AUTHO
22,767,409 UART: RITY.KEYID = 7
24,472,652 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,153 UART: [art] PUB.X = 2ACF022EA4239F6DECE6D15C1EDD1BD64ED15CC85062FC2A41265C797C85501CA55F0A575D9CFA811E044429F71E59A1
24,481,442 UART: [art] PUB.Y = 03E386B1FF768FE90BCB930A1B137AB90F4FBDFB1E72233DEFBB6186927C27BF9A59CABC74EEE76F8394A1A4C868BD2D
24,488,776 UART: [art] SIG.R = 3A53D4742F79D450ECCC5D01807B5A7A735AC6D6AF58BAF2C3E4AAF70EC818EDE1BD1421BED50CC116941BFFEB288DC9
24,496,187 UART: [art] SIG.S = BEDD4F84D8431B71F9C07D9E1837D2EE8888CA7C7C216D66CACC2906BE9BADC68D593A3312671616E421EF66DFEAD9F6
25,474,553 UART: Caliptra RT
25,475,235 UART: [state] CFI Enabled
25,592,817 UART: [rt] RT listening for mailbox commands...
25,595,229 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,750,423 UART: [rt]cmd =0x41544d4e, len=14344
29,680,875 >>> mbox cmd response data (8 bytes)
29,681,432 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,712,101 UART: [rt]cmd =0x41545348, len=116
29,714,191 >>> mbox cmd response data (12 bytes)
31,769,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,814,545 >>> mbox cmd response: success
38,815,132 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,848,300 UART:
38,848,590 UART: Running Caliptra FMC ...
38,849,625 UART:
38,849,764 UART: [state] CFI Enabled
38,894,338 UART: [art] Extend RT PCRs Done
38,895,532 UART: [art] Lock RT PCRs Done
38,896,745 UART: [art] Populate DV Done
38,902,210 UART: [fht] FMC Alias Private Key: 7
38,903,738 UART: [art] Derive CDI
38,904,485 UART: [art] Store in in slot 0x4
38,946,999 UART: [art] Derive Key Pair
38,948,032 UART: [art] Store priv key in slot 0x5
41,375,026 UART: [art] Derive Key Pair - Done
41,388,407 UART: [art] Signing Cert with AUTHO
41,389,703 UART: RITY.KEYID = 7
43,095,733 UART: [art] Erasing AUTHORITY.KEYID = 7
43,097,237 UART: [art] PUB.X = 7F71713A09741AD8AD52FC84F3FCAAADDF97BC7AAC9BC67CDA56E461BED632D998D9DB4E91AB02D7AAD7048F8CB46B5B
43,104,555 UART: [art] PUB.Y = FB5B51BAC1E0503F81331FA68DC769AA69B5D246AECA99C3271E2B898C7A8311B4F68A1BD1958E067448EFE3BCBA444D
43,111,789 UART: [art] SIG.R = A5D78AD4CF1DBA2077486216099F9F2F47A9549BEF595CD5673C7D038CE218E325DDC2CD615B86159EE652EAA5EF385C
43,119,241 UART: [art] SIG.S = A40DE1DAADFE38E4B69ABEDE8C272229439CC87659BC7C16DC18D3323CF822BCDE4929C2C603AB3C15D54CE3A7322A08
44,098,213 UART: Caliptra RT
44,098,916 UART: [state] CFI Enabled
44,386,572 UART: [rt] RT listening for mailbox commands...
44,418,380 UART: [rt]cmd =0x41545348, len=116
44,420,358 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,439,755 ready_for_fw is high
3,440,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,358 >>> mbox cmd response: success
19,026,731 UART:
19,027,130 UART: Running Caliptra FMC ...
19,028,277 UART:
19,028,437 UART: [state] CFI Enabled
19,091,956 UART: [fht] FMC Alias Private Key: 7
20,857,035 UART: [art] Extend RT PCRs Done
20,858,293 UART: [art] Lock RT PCRs Done
20,860,269 UART: [art] Populate DV Done
20,865,643 UART: [fht] FMC Alias Private Key: 7
20,867,396 UART: [art] Derive CDI
20,868,209 UART: [art] Store in in slot 0x4
20,925,041 UART: [art] Derive Key Pair
20,926,083 UART: [art] Store priv key in slot 0x5
23,389,218 UART: [art] Derive Key Pair - Done
23,402,456 UART: [art] Signing Cert with AUTHO
23,403,756 UART: RITY.KEYID = 7
25,114,672 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,162 UART: [art] PUB.X = 23D70174FB8EDAF93A256844A7161B3E1409E2AB58288C486258642BC6951FA7D87F8EBF764F87FAB4CD7F46170FA470
25,123,409 UART: [art] PUB.Y = D5E762C36861D8F72C16E6AEAD51E7C72D8ADE4511B55DD883FC1225F1A987786761111955790658365FB46E74CCEAD9
25,130,666 UART: [art] SIG.R = 345DBF34A1C96FA282F5C9E0AB3CCF22858DEF4462B89A2AC6B432C0DEC3641E23A6BE130E6CFF9644B3567D26CDE2D7
25,138,112 UART: [art] SIG.S = 5DBC6B9A40BDEBD311B08D16A8CDCD1F6426FF3290DB3EC0D0B76DEF00525540A401F5EAE869A1A686DEB57AB3D19000
26,116,990 UART: Caliptra RT
26,117,706 UART: [state] CFI Enabled
26,282,108 UART: [rt] RT listening for mailbox commands...
26,284,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,440,666 UART: [rt]cmd =0x41544d4e, len=14344
30,371,544 >>> mbox cmd response data (8 bytes)
30,372,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,402,802 UART: [rt]cmd =0x41545348, len=116
30,405,324 >>> mbox cmd response data (12 bytes)
32,458,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,263,170 >>> mbox cmd response: success
40,263,843 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,297,560 UART:
40,297,856 UART: Running Caliptra FMC ...
40,298,893 UART:
40,299,040 UART: [state] CFI Enabled
40,392,986 UART: [art] Extend RT PCRs Done
40,394,176 UART: [art] Lock RT PCRs Done
40,395,765 UART: [art] Populate DV Done
40,401,285 UART: [fht] FMC Alias Private Key: 7
40,402,783 UART: [art] Derive CDI
40,403,518 UART: [art] Store in in slot 0x4
40,461,780 UART: [art] Derive Key Pair
40,462,822 UART: [art] Store priv key in slot 0x5
42,926,143 UART: [art] Derive Key Pair - Done
42,939,090 UART: [art] Signing Cert with AUTHO
42,940,396 UART: RITY.KEYID = 7
44,652,108 UART: [art] Erasing AUTHORITY.KEYID = 7
44,653,612 UART: [art] PUB.X = 0A5FA32148017AD7F0B16B494E93A2CEFCAB4CA3D24817FD7970D1CC3D838D294EEE29A31D177E002A53A07295787957
44,660,887 UART: [art] PUB.Y = ED94BD179D7D7C7359EC28F5F9F3F38BF77C2DB165B26A1E3DF54D2833C31331E29B8463E3E67C1E13438D0EF68BF7BA
44,668,123 UART: [art] SIG.R = 62FEE63427A31B4CCCC6E954640060B2D31B37995E2926F096403AF3C24BFD5BD1D6D6A895494309C1FB626985A306D7
44,675,455 UART: [art] SIG.S = EB3570152F3C15A5307D21CE03DF3472C6989B06A5C1EE23B6F7E35D4CBA4311D2CDCDA91ED4A146A28ABEF9CCD73034
45,654,352 UART: Caliptra RT
45,655,037 UART: [state] CFI Enabled
45,991,887 UART: [rt] RT listening for mailbox commands...
46,023,906 UART: [rt]cmd =0x41545348, len=116
46,026,208 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,756,424 ready_for_fw is high
3,756,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,955,878 >>> mbox cmd response: success
19,207,664 UART:
19,208,046 UART: Running Caliptra FMC ...
19,209,240 UART:
19,209,395 UART: [state] CFI Enabled
19,217,096 UART: [fht] FMC Alias Private Key: 7
20,973,837 UART: [art] Extend RT PCRs Done
20,975,051 UART: [art] Lock RT PCRs Done
20,976,732 UART: [art] Populate DV Done
20,982,301 UART: [fht] FMC Alias Private Key: 7
20,983,891 UART: [art] Derive CDI
20,984,711 UART: [art] Store in in slot 0x4
21,027,363 UART: [art] Derive Key Pair
21,028,364 UART: [art] Store priv key in slot 0x5
23,455,066 UART: [art] Derive Key Pair - Done
23,467,749 UART: [art] Signing Cert with AUTHO
23,469,114 UART: RITY.KEYID = 7
25,174,314 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,813 UART: [art] PUB.X = 70078E688556EA0F39DB76170201DF11B84C887F64BE7D15E34FDFBD43E61F8E7345DF2C14DA76D8EA4F51586F8D0C60
25,183,087 UART: [art] PUB.Y = 987C0D8884A28E11F779F75DE17CC96F41218B8D0EE2C62145F910CC16B95A1073757487BDADA5A701FB0313C719E227
25,190,320 UART: [art] SIG.R = 936E91F2E435B422FF0BC89AF06EB38C9EE0B90A82C046A408756B454FA04BB00632256C55B47BDA8186BA08543BFCBB
25,197,764 UART: [art] SIG.S = 0E6F76DEF6C7DB32521D0DB55626F90B3EBCC8308F3D31EA49C05AF07804ECA2A4A5CBC1CFFD89CA0B5F5CFD7FD1750D
26,176,933 UART: Caliptra RT
26,177,645 UART: [state] CFI Enabled
26,295,652 UART: [rt] RT listening for mailbox commands...
26,298,038 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,453,288 UART: [rt]cmd =0x41544d4e, len=14344
30,383,316 >>> mbox cmd response data (8 bytes)
30,383,896 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,414,673 UART: [rt]cmd =0x41545348, len=116
30,416,713 >>> mbox cmd response data (12 bytes)
32,470,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
40,203,367 >>> mbox cmd response: success
40,203,985 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,239,800 UART:
40,240,093 UART: Running Caliptra FMC ...
40,241,125 UART:
40,241,266 UART: [state] CFI Enabled
40,285,225 UART: [art] Extend RT PCRs Done
40,286,411 UART: [art] Lock RT PCRs Done
40,287,619 UART: [art] Populate DV Done
40,293,182 UART: [fht] FMC Alias Private Key: 7
40,294,787 UART: [art] Derive CDI
40,295,596 UART: [art] Store in in slot 0x4
40,338,290 UART: [art] Derive Key Pair
40,339,485 UART: [art] Store priv key in slot 0x5
42,765,807 UART: [art] Derive Key Pair - Done
42,778,919 UART: [art] Signing Cert with AUTHO
42,780,221 UART: RITY.KEYID = 7
44,485,742 UART: [art] Erasing AUTHORITY.KEYID = 7
44,487,233 UART: [art] PUB.X = DFDB18586A9CEB634D00DE0C99F1C3A439E16F7F84E7A764867360F55BC3BF39C8BD5BC2F0311C1BC3160E7903E4AADB
44,494,524 UART: [art] PUB.Y = 5C8C9EAD9AEE66EE2E2E0727594CCF770B999CFE9448297090F326169DFB4FB4C637F29BF29F65418E28776F4DAC4660
44,501,787 UART: [art] SIG.R = FAEC70B602BA48F56BC3F96938762D4BE3F296FBF842E2554099591A8EABF8584A91546705D216B8B25E68A5765709D7
44,509,188 UART: [art] SIG.S = 18FA075E0FDA496DC9D82BDCB26A8E51BE3A3817CABADC6C858A9954F79DEB713E39C072D66DBA5FDB11898676147A82
45,487,765 UART: Caliptra RT
45,488,469 UART: [state] CFI Enabled
45,779,517 UART: [rt] RT listening for mailbox commands...
45,811,433 UART: [rt]cmd =0x41545348, len=116
45,813,753 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,347 UART: [kat] SHA2-256
882,278 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,393 UART: [kat] ++
886,545 UART: [kat] sha1
890,833 UART: [kat] SHA2-256
892,771 UART: [kat] SHA2-384
895,552 UART: [kat] SHA2-512-ACC
897,453 UART: [kat] ECC-384
902,940 UART: [kat] HMAC-384Kdf
907,656 UART: [kat] LMS
1,475,852 UART: [kat] --
1,476,673 UART: [cold-reset] ++
1,477,165 UART: [fht] Storing FHT @ 0x50003400
1,479,906 UART: [idev] ++
1,480,074 UART: [idev] CDI.KEYID = 6
1,480,434 UART: [idev] SUBJECT.KEYID = 7
1,480,858 UART: [idev] UDS.KEYID = 0
1,481,203 ready_for_fw is high
1,481,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,416 UART: [idev] Erasing UDS.KEYID = 0
1,505,220 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,686 UART: [idev] --
1,514,727 UART: [ldev] ++
1,514,895 UART: [ldev] CDI.KEYID = 6
1,515,258 UART: [ldev] SUBJECT.KEYID = 5
1,515,684 UART: [ldev] AUTHORITY.KEYID = 7
1,516,147 UART: [ldev] FE.KEYID = 1
1,521,297 UART: [ldev] Erasing FE.KEYID = 1
1,546,558 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,488 UART: [ldev] --
1,585,905 UART: [fwproc] Waiting for Commands...
1,586,598 UART: [fwproc] Received command 0x46574c44
1,587,389 UART: [fwproc] Received Image of size 114448 bytes
2,886,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,468 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,937 >>> mbox cmd response: success
3,081,029 UART: [afmc] ++
3,081,197 UART: [afmc] CDI.KEYID = 6
3,081,559 UART: [afmc] SUBJECT.KEYID = 7
3,081,984 UART: [afmc] AUTHORITY.KEYID = 5
3,116,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,419 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,812 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,502 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,409 UART: [afmc] --
3,160,439 UART: [cold-reset] --
3,161,195 UART: [state] Locking Datavault
3,162,130 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,734 UART: [state] Locking ICCM
3,163,164 UART: [exit] Launching FMC @ 0x40000130
3,168,493 UART:
3,168,509 UART: Running Caliptra FMC ...
3,168,917 UART:
3,168,971 UART: [state] CFI Enabled
3,179,910 UART: [fht] FMC Alias Private Key: 7
3,287,923 UART: [art] Extend RT PCRs Done
3,288,351 UART: [art] Lock RT PCRs Done
3,289,701 UART: [art] Populate DV Done
3,298,138 UART: [fht] FMC Alias Private Key: 7
3,299,300 UART: [art] Derive CDI
3,299,580 UART: [art] Store in in slot 0x4
3,384,753 UART: [art] Derive Key Pair
3,385,113 UART: [art] Store priv key in slot 0x5
3,398,423 UART: [art] Derive Key Pair - Done
3,413,185 UART: [art] Signing Cert with AUTHO
3,413,665 UART: RITY.KEYID = 7
3,429,205 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,970 UART: [art] PUB.X = 00CB482C8554A7A733DFAEC7939218659568DA297F77F1BF784BBFCC70A863A8E5A5A86E66526C4D19CBA57F5CA64F6B
3,436,730 UART: [art] PUB.Y = EF897E17C17CA433EF634F0EF46ACEC93530EFBFDE09A45A01796BEF7796C2B428A9F2292B3722039333B62B2A693333
3,443,674 UART: [art] SIG.R = 0B76BCBE4F7F5DD136CD0388E0FA2A05AEECA38A6B2AEEEFF9D8758BC5FED0CB4150EEE2471F2D888FC051DEACEAF2F9
3,450,475 UART: [art] SIG.S = C30479FF676B182AC0EFD3AC7BD48F6447E88DB8DC6EAD04AB49AE5F8471745A3F902EDA825EAA529D69AD1BC9D3BB9F
3,474,270 UART: Caliptra RT
3,474,523 UART: [state] CFI Enabled
3,582,296 UART: [rt] RT listening for mailbox commands...
3,582,966 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,734 UART: [rt]cmd =0x41544d4e, len=14344
3,850,532 >>> mbox cmd response data (8 bytes)
3,850,533 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,608 UART: [rt]cmd =0x41545348, len=116
3,882,610 >>> mbox cmd response data (12 bytes)
3,882,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,515 UART:
3,883,531 UART: Running Caliptra ROM ...
3,883,939 UART:
3,883,993 UART: [state] CFI Enabled
3,887,213 UART: [state] LifecycleState = Unprovisioned
3,887,868 UART: [state] DebugLocked = No
3,888,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,889,967 UART: [kat] SHA2-256
4,683,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,688,013 UART: [kat] ++
4,688,165 UART: [kat] sha1
4,692,443 UART: [kat] SHA2-256
4,694,381 UART: [kat] SHA2-384
4,697,204 UART: [kat] SHA2-512-ACC
4,699,104 UART: [kat] ECC-384
4,704,729 UART: [kat] HMAC-384Kdf
4,709,091 UART: [kat] LMS
5,277,287 UART: [kat] --
5,278,020 UART: [update-reset] ++
6,614,405 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,615,519 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,765,569 >>> mbox cmd response: success
6,765,569 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,765,794 UART: [update-reset] Copying MAN_2 To MAN_1
6,773,808 UART: [update-reset Success] --
6,774,817 UART: [state] Locking Datavault
6,775,607 UART: [state] Locking PCR0, PCR1 and PCR31
6,776,211 UART: [state] Locking ICCM
6,776,819 UART: [exit] Launching FMC @ 0x40000130
6,782,148 UART:
6,782,164 UART: Running Caliptra FMC ...
6,782,572 UART:
6,782,626 UART: [state] CFI Enabled
6,871,791 UART: [art] Extend RT PCRs Done
6,872,219 UART: [art] Lock RT PCRs Done
6,873,716 UART: [art] Populate DV Done
6,881,963 UART: [fht] FMC Alias Private Key: 7
6,883,125 UART: [art] Derive CDI
6,883,405 UART: [art] Store in in slot 0x4
6,968,942 UART: [art] Derive Key Pair
6,969,302 UART: [art] Store priv key in slot 0x5
6,982,480 UART: [art] Derive Key Pair - Done
6,997,145 UART: [art] Signing Cert with AUTHO
6,997,625 UART: RITY.KEYID = 7
7,012,755 UART: [art] Erasing AUTHORITY.KEYID = 7
7,013,520 UART: [art] PUB.X = 8545D7A68ED75610BB324017EF6391EB9406B46FD8B001BF2988DC8F2108AB34D0C7ABE3FFE0BA3DAB57787900FFF055
7,020,271 UART: [art] PUB.Y = E028550B710D54E060911FEB1EDEF7CA901F34C2F474D7B50DF29EB8581A7873E7B99308CE7F70BB1EF6651F636D1BD2
7,027,219 UART: [art] SIG.R = 7608EC5E75A513F2442153DF258D77D7BB70A5189C710F449A58D4030A6D18623BB9E9CEAB0CE356A63457E188BD35B6
7,033,976 UART: [art] SIG.S = E900B693A60C36D52AD922FFEC706356A71E753373E10529F18CA3C14193E3BA77F251CCF0A3DE48C2497C8DD7EB907C
7,057,881 UART: Caliptra RT
7,058,134 UART: [state] CFI Enabled
7,339,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,370,566 UART: [rt]cmd =0x41545348, len=116
7,372,236 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,543 ready_for_fw is high
1,362,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,113 >>> mbox cmd response: success
2,991,997 UART:
2,992,013 UART: Running Caliptra FMC ...
2,992,421 UART:
2,992,475 UART: [state] CFI Enabled
3,003,322 UART: [fht] FMC Alias Private Key: 7
3,110,807 UART: [art] Extend RT PCRs Done
3,111,235 UART: [art] Lock RT PCRs Done
3,112,941 UART: [art] Populate DV Done
3,121,218 UART: [fht] FMC Alias Private Key: 7
3,122,232 UART: [art] Derive CDI
3,122,512 UART: [art] Store in in slot 0x4
3,208,307 UART: [art] Derive Key Pair
3,208,667 UART: [art] Store priv key in slot 0x5
3,221,813 UART: [art] Derive Key Pair - Done
3,236,626 UART: [art] Signing Cert with AUTHO
3,237,106 UART: RITY.KEYID = 7
3,252,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,129 UART: [art] PUB.X = C0C19B91CFBA33BB9D9E050FE63CEB5FEC907800DF7A2DAE2E8CA114651A54B981CE3A2D0B7C17D998120E49D02F8CAA
3,259,889 UART: [art] PUB.Y = F40EC1B6A3457D6826AF9326DA9CF8E7C2129B711D5EF6B6F03CB7AA90AAE0F0E571FB0A2175C636C1D17A06EEE6E9A0
3,266,850 UART: [art] SIG.R = D4E77CF2B13B23FE6333C716CC59818738176A3ADFAE50229AB7D642C3CE6A5ABE324084FF27DCEC84D66D17B417A85B
3,273,634 UART: [art] SIG.S = D648548777208B0C21D957D9470543ED59EBD3D5A16FE345D765E59F3B929C90BB8D51AF5A44AB4CF4D6A15FA9ABEF91
3,297,303 UART: Caliptra RT
3,297,556 UART: [state] CFI Enabled
3,405,052 UART: [rt] RT listening for mailbox commands...
3,405,722 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,674 UART: [rt]cmd =0x41544d4e, len=14344
3,673,804 >>> mbox cmd response data (8 bytes)
3,673,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,926 UART: [rt]cmd =0x41545348, len=116
3,705,766 >>> mbox cmd response data (12 bytes)
3,705,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,469,743 >>> mbox cmd response: success
6,469,743 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,482,960 UART:
6,482,976 UART: Running Caliptra FMC ...
6,483,384 UART:
6,483,438 UART: [state] CFI Enabled
6,572,473 UART: [art] Extend RT PCRs Done
6,572,901 UART: [art] Lock RT PCRs Done
6,574,204 UART: [art] Populate DV Done
6,582,437 UART: [fht] FMC Alias Private Key: 7
6,583,437 UART: [art] Derive CDI
6,583,717 UART: [art] Store in in slot 0x4
6,669,194 UART: [art] Derive Key Pair
6,669,554 UART: [art] Store priv key in slot 0x5
6,682,394 UART: [art] Derive Key Pair - Done
6,697,318 UART: [art] Signing Cert with AUTHO
6,697,798 UART: RITY.KEYID = 7
6,713,450 UART: [art] Erasing AUTHORITY.KEYID = 7
6,714,215 UART: [art] PUB.X = F68312063AABACE04846BBF1AA85FB1BC0EFA518A7ED41B63046570B595E7EAE5E0A38A4E4C81FFD38A3478433C05124
6,720,990 UART: [art] PUB.Y = 4B8D08D6436A30225F0ABF873C50ECD0F94ADEF6E2F6F226267096F0F4A3F90595953FF3C8F88B5D28FE8444E5C744C9
6,727,939 UART: [art] SIG.R = AE4EA0EE931FE4DDE4E647F107E00ED2452B78CF8D7E8E99149B3C0C1923AD19BFC81F57ED366F0E912BBC2ADA1F9A1F
6,734,723 UART: [art] SIG.S = 1BC5EF978B97C6103D6734E97C5F27A0D1367D56C592D157B8D641981FC8CFCDDD4E6E318E63ABC454A58891292EE624
6,758,432 UART: Caliptra RT
6,758,685 UART: [state] CFI Enabled
7,042,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,073,227 UART: [rt]cmd =0x41545348, len=116
7,075,043 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
86,998 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,506 UART: [kat] SHA2-256
882,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,552 UART: [kat] ++
886,704 UART: [kat] sha1
890,994 UART: [kat] SHA2-256
892,932 UART: [kat] SHA2-384
895,831 UART: [kat] SHA2-512-ACC
897,732 UART: [kat] ECC-384
903,333 UART: [kat] HMAC-384Kdf
907,895 UART: [kat] LMS
1,476,091 UART: [kat] --
1,476,988 UART: [cold-reset] ++
1,477,432 UART: [fht] Storing FHT @ 0x50003400
1,480,271 UART: [idev] ++
1,480,439 UART: [idev] CDI.KEYID = 6
1,480,799 UART: [idev] SUBJECT.KEYID = 7
1,481,223 UART: [idev] UDS.KEYID = 0
1,481,568 ready_for_fw is high
1,481,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,135 UART: [idev] Erasing UDS.KEYID = 0
1,506,095 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,679 UART: [idev] --
1,515,844 UART: [ldev] ++
1,516,012 UART: [ldev] CDI.KEYID = 6
1,516,375 UART: [ldev] SUBJECT.KEYID = 5
1,516,801 UART: [ldev] AUTHORITY.KEYID = 7
1,517,264 UART: [ldev] FE.KEYID = 1
1,522,394 UART: [ldev] Erasing FE.KEYID = 1
1,547,767 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,403 UART: [ldev] --
1,586,852 UART: [fwproc] Waiting for Commands...
1,587,651 UART: [fwproc] Received command 0x46574c44
1,588,442 UART: [fwproc] Received Image of size 114448 bytes
2,888,223 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,865 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,217 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,298 >>> mbox cmd response: success
3,081,434 UART: [afmc] ++
3,081,602 UART: [afmc] CDI.KEYID = 6
3,081,964 UART: [afmc] SUBJECT.KEYID = 7
3,082,389 UART: [afmc] AUTHORITY.KEYID = 5
3,117,414 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,440 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,833 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,523 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,436 UART: [afmc] --
3,160,346 UART: [cold-reset] --
3,161,116 UART: [state] Locking Datavault
3,162,203 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,807 UART: [state] Locking ICCM
3,163,365 UART: [exit] Launching FMC @ 0x40000130
3,168,694 UART:
3,168,710 UART: Running Caliptra FMC ...
3,169,118 UART:
3,169,261 UART: [state] CFI Enabled
3,179,846 UART: [fht] FMC Alias Private Key: 7
3,287,863 UART: [art] Extend RT PCRs Done
3,288,291 UART: [art] Lock RT PCRs Done
3,289,939 UART: [art] Populate DV Done
3,297,842 UART: [fht] FMC Alias Private Key: 7
3,298,840 UART: [art] Derive CDI
3,299,120 UART: [art] Store in in slot 0x4
3,384,575 UART: [art] Derive Key Pair
3,384,935 UART: [art] Store priv key in slot 0x5
3,398,463 UART: [art] Derive Key Pair - Done
3,413,179 UART: [art] Signing Cert with AUTHO
3,413,659 UART: RITY.KEYID = 7
3,428,995 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,760 UART: [art] PUB.X = 2AAB9EFB6586DDF0791A16FAC3E04581E7B6D31D0363F6215DF876CFA8EC03BDCF5CF3AFD7665BFC69C0B8AABEF9BD35
3,436,556 UART: [art] PUB.Y = 27CD31C64B46D92B025E4B2256D2FA670E3D703ED10AD66C12179899D4C1ED1F175670A9A590E364C26FF1A649CB9FD9
3,443,503 UART: [art] SIG.R = 98EB4A8219E9A3754A573CF84CA84734AFA188A27A03C5C47E25C478D1FD9D39C1CEBFC035B3545C6659BD99BE2E1ED7
3,450,284 UART: [art] SIG.S = 244A9AB9AB4EFC8335243983A4B81456B5D141BF50C8E001133D80DA9A941F9AC58F4D0A0042CFA36DFC857C6711024F
3,474,224 UART: Caliptra RT
3,474,569 UART: [state] CFI Enabled
3,582,566 UART: [rt] RT listening for mailbox commands...
3,583,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,008 UART: [rt]cmd =0x41544d4e, len=14344
3,850,654 >>> mbox cmd response data (8 bytes)
3,850,655 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,606 UART: [rt]cmd =0x41545348, len=116
3,882,456 >>> mbox cmd response data (12 bytes)
3,882,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,261 UART:
3,883,277 UART: Running Caliptra ROM ...
3,883,685 UART:
3,883,826 UART: [state] CFI Enabled
3,886,622 UART: [state] LifecycleState = Unprovisioned
3,887,277 UART: [state] DebugLocked = No
3,887,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,889,388 UART: [kat] SHA2-256
4,683,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,687,434 UART: [kat] ++
4,687,586 UART: [kat] sha1
4,691,838 UART: [kat] SHA2-256
4,693,776 UART: [kat] SHA2-384
4,696,549 UART: [kat] SHA2-512-ACC
4,698,449 UART: [kat] ECC-384
4,703,906 UART: [kat] HMAC-384Kdf
4,708,366 UART: [kat] LMS
5,276,562 UART: [kat] --
5,277,505 UART: [update-reset] ++
6,612,650 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,613,836 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,763,886 >>> mbox cmd response: success
6,763,886 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,764,179 UART: [update-reset] Copying MAN_2 To MAN_1
6,772,193 UART: [update-reset Success] --
6,773,364 UART: [state] Locking Datavault
6,774,304 UART: [state] Locking PCR0, PCR1 and PCR31
6,774,908 UART: [state] Locking ICCM
6,775,468 UART: [exit] Launching FMC @ 0x40000130
6,780,797 UART:
6,780,813 UART: Running Caliptra FMC ...
6,781,221 UART:
6,781,364 UART: [state] CFI Enabled
6,870,653 UART: [art] Extend RT PCRs Done
6,871,081 UART: [art] Lock RT PCRs Done
6,872,278 UART: [art] Populate DV Done
6,880,589 UART: [fht] FMC Alias Private Key: 7
6,881,535 UART: [art] Derive CDI
6,881,815 UART: [art] Store in in slot 0x4
6,966,986 UART: [art] Derive Key Pair
6,967,346 UART: [art] Store priv key in slot 0x5
6,981,268 UART: [art] Derive Key Pair - Done
6,996,424 UART: [art] Signing Cert with AUTHO
6,996,904 UART: RITY.KEYID = 7
7,012,008 UART: [art] Erasing AUTHORITY.KEYID = 7
7,012,773 UART: [art] PUB.X = 4BDBD33928A492E4E8AFF60C2A5A527984D9F20E20F4A65B8D33B3F64A6E286AB7C9B622022656FE137CFCE21A568D71
7,019,544 UART: [art] PUB.Y = 9F6EE3A4C9A3A501B0180F87DB29203678E5DCCAE3D91B89424211E506AFC08F134EA58AD5EB48EC986BEAD7F4ED28C1
7,026,503 UART: [art] SIG.R = 8E09F19001044BA13C4AD16314B6B043F5747BDA7EE0ED65A0F8542098586EEC15F785DCB14A52779837F76AB14A816B
7,033,266 UART: [art] SIG.S = 553D61E481E0FEA1A115D93D581D9DA404B9F072B145C91056940E85EA4C655215A237AD3780EDBB45ACAF21837132FE
7,056,445 UART: Caliptra RT
7,056,790 UART: [state] CFI Enabled
7,337,155 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,368,094 UART: [rt]cmd =0x41545348, len=116
7,369,824 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,456 ready_for_fw is high
1,362,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,306 >>> mbox cmd response: success
2,992,370 UART:
2,992,386 UART: Running Caliptra FMC ...
2,992,794 UART:
2,992,937 UART: [state] CFI Enabled
3,003,634 UART: [fht] FMC Alias Private Key: 7
3,111,411 UART: [art] Extend RT PCRs Done
3,111,839 UART: [art] Lock RT PCRs Done
3,113,187 UART: [art] Populate DV Done
3,121,392 UART: [fht] FMC Alias Private Key: 7
3,122,500 UART: [art] Derive CDI
3,122,780 UART: [art] Store in in slot 0x4
3,208,667 UART: [art] Derive Key Pair
3,209,027 UART: [art] Store priv key in slot 0x5
3,222,687 UART: [art] Derive Key Pair - Done
3,237,794 UART: [art] Signing Cert with AUTHO
3,238,274 UART: RITY.KEYID = 7
3,253,656 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,421 UART: [art] PUB.X = 784025B992EE1F777429CCCFC414A387BA07DE9E1229DDA74EC4644937262D003939F222650DB8857E6E1A00E1FFF843
3,261,141 UART: [art] PUB.Y = FE69CD7A45173A4E4BE290055C8CC1CE9062C6274208FC92AC57DF32D31F7E65B47869ABA2361EC0DF0951038409109A
3,268,080 UART: [art] SIG.R = B149186C32AE3DF0FEE4EE4FF668D7F15748EA89728151ADD26FCA6E1979B3CE937E7F3B87DA71373C6E854615B3B7E4
3,274,862 UART: [art] SIG.S = 404BEA5C264E441697F71D478EB2DBE30522482201DE37AAC93DC75A3470A331852BB1831BEE0E1D7B6B929F70FE8B1B
3,298,748 UART: Caliptra RT
3,299,093 UART: [state] CFI Enabled
3,407,842 UART: [rt] RT listening for mailbox commands...
3,408,512 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,210 UART: [rt]cmd =0x41544d4e, len=14344
3,676,010 >>> mbox cmd response data (8 bytes)
3,676,011 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,000 UART: [rt]cmd =0x41545348, len=116
3,707,524 >>> mbox cmd response data (12 bytes)
3,707,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,471,638 >>> mbox cmd response: success
6,471,638 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,484,931 UART:
6,484,947 UART: Running Caliptra FMC ...
6,485,355 UART:
6,485,498 UART: [state] CFI Enabled
6,574,671 UART: [art] Extend RT PCRs Done
6,575,099 UART: [art] Lock RT PCRs Done
6,576,198 UART: [art] Populate DV Done
6,584,177 UART: [fht] FMC Alias Private Key: 7
6,585,167 UART: [art] Derive CDI
6,585,447 UART: [art] Store in in slot 0x4
6,671,286 UART: [art] Derive Key Pair
6,671,646 UART: [art] Store priv key in slot 0x5
6,685,166 UART: [art] Derive Key Pair - Done
6,699,926 UART: [art] Signing Cert with AUTHO
6,700,406 UART: RITY.KEYID = 7
6,715,830 UART: [art] Erasing AUTHORITY.KEYID = 7
6,716,595 UART: [art] PUB.X = 241EF9557A0FC2AB1C40C62464AD39E02990DF89C36F277CBD83E5529BAF69ABE7FA1F058D4A077B957DE3FC87D8960B
6,723,367 UART: [art] PUB.Y = 21D360CA37586E791029B5655C78FD31A0C9C8EF88F83DE49CC1E1296A795806DC22A4096AE19DE7388DBB05371ADD79
6,730,312 UART: [art] SIG.R = AAB1B74CA2B66D1D1BA9F850B10186DFF1C472CBE57993C5BADCFC56F805913CC33EBD53B5FB68535A039A568719049C
6,737,086 UART: [art] SIG.S = 2900E88E4D747B4C19634A0B1205056CB2026499997F7EBDDD182B8D35512F1805C903743146F55C1737E1FDA347152A
6,760,873 UART: Caliptra RT
6,761,218 UART: [state] CFI Enabled
7,045,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,076,552 UART: [rt]cmd =0x41545348, len=116
7,078,180 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
893,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,367 UART: [kat] ++
897,519 UART: [kat] sha1
901,935 UART: [kat] SHA2-256
903,875 UART: [kat] SHA2-384
906,594 UART: [kat] SHA2-512-ACC
908,495 UART: [kat] ECC-384
918,030 UART: [kat] HMAC-384Kdf
922,454 UART: [kat] LMS
1,170,782 UART: [kat] --
1,171,687 UART: [cold-reset] ++
1,172,165 UART: [fht] FHT @ 0x50003400
1,174,786 UART: [idev] ++
1,174,954 UART: [idev] CDI.KEYID = 6
1,175,314 UART: [idev] SUBJECT.KEYID = 7
1,175,738 UART: [idev] UDS.KEYID = 0
1,176,083 ready_for_fw is high
1,176,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,824 UART: [idev] Erasing UDS.KEYID = 0
1,199,991 UART: [idev] Sha1 KeyId Algorithm
1,208,359 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,010 UART: [ldev] SUBJECT.KEYID = 5
1,210,436 UART: [ldev] AUTHORITY.KEYID = 7
1,210,899 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,065 UART: [ldev] --
1,282,578 UART: [fwproc] Wait for Commands...
1,283,226 UART: [fwproc] Recv command 0x46574c44
1,283,954 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,910 >>> mbox cmd response: success
2,775,918 UART: [afmc] ++
2,776,086 UART: [afmc] CDI.KEYID = 6
2,776,448 UART: [afmc] SUBJECT.KEYID = 7
2,776,873 UART: [afmc] AUTHORITY.KEYID = 5
2,811,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,367 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,095 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,980 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,699 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,671 UART: [afmc] --
2,855,627 UART: [cold-reset] --
2,856,381 UART: [state] Locking Datavault
2,857,318 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,922 UART: [state] Locking ICCM
2,858,374 UART: [exit] Launching FMC @ 0x40000130
2,863,703 UART:
2,863,719 UART: Running Caliptra FMC ...
2,864,127 UART:
2,864,181 UART: [state] CFI Enabled
2,874,916 UART: [fht] FMC Alias Private Key: 7
2,983,025 UART: [art] Extend RT PCRs Done
2,983,453 UART: [art] Lock RT PCRs Done
2,985,013 UART: [art] Populate DV Done
2,993,366 UART: [fht] FMC Alias Private Key: 7
2,994,482 UART: [art] Derive CDI
2,994,762 UART: [art] Store in in slot 0x4
3,080,195 UART: [art] Derive Key Pair
3,080,555 UART: [art] Store priv key in slot 0x5
3,093,899 UART: [art] Derive Key Pair - Done
3,108,765 UART: [art] Signing Cert with AUTHO
3,109,245 UART: RITY.KEYID = 7
3,124,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,554 UART: [art] PUB.X = 2B546AA9683FFF1F7F3FBF184B8E81DB72691AB16848847C1309CA5CC298558B8F73EA266CAF8DD52CE40CE374E1E01C
3,132,332 UART: [art] PUB.Y = 9F61E7204F929E3A0EF305778143F90AFEEFED6A9F771D4264FAEFF00CF8EEF1D031AE56546FD358797A43A0B3FA19BD
3,139,288 UART: [art] SIG.R = 4D2A4B71B23EB5EB8E9CDE4C91653ADBC51657F1BA07D92E139D5A496E16C1CE04AF962AC337FD6AB0A46846EF87B555
3,146,070 UART: [art] SIG.S = D1D7C31A525629502524CDF29B1ADBEBEF2FA5EB03869E6AACA23E7558795A361D776E44C1E5D6DB8C5CEFA4A2681077
3,169,700 UART: Caliptra RT
3,169,953 UART: [state] CFI Enabled
3,277,748 UART: [rt] RT listening for mailbox commands...
3,278,418 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,264 UART: [rt]cmd =0x41544d4e, len=14344
3,546,292 >>> mbox cmd response data (8 bytes)
3,546,293 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,290 UART: [rt]cmd =0x41545348, len=116
3,578,142 >>> mbox cmd response data (12 bytes)
3,578,143 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,976 UART:
3,578,992 UART: Running Caliptra ROM ...
3,579,400 UART:
3,579,455 UART: [state] CFI Enabled
3,582,029 UART: [state] LifecycleState = Unprovisioned
3,582,684 UART: [state] DebugLocked = No
3,583,194 UART: [state] WD Timer not started. Device not locked for debugging
3,584,320 UART: [kat] SHA2-256
4,389,970 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,394,095 UART: [kat] ++
4,394,247 UART: [kat] sha1
4,398,665 UART: [kat] SHA2-256
4,400,605 UART: [kat] SHA2-384
4,403,306 UART: [kat] SHA2-512-ACC
4,405,206 UART: [kat] ECC-384
4,414,867 UART: [kat] HMAC-384Kdf
4,419,467 UART: [kat] LMS
4,667,795 UART: [kat] --
4,668,689 UART: [update-reset] ++
5,982,148 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,983,339 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,133,337 >>> mbox cmd response: success
6,133,337 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,133,536 UART: [update-reset] Copying MAN_2 To MAN_1
6,141,550 UART: [update-reset Success] --
6,142,577 UART: [state] Locking Datavault
6,143,413 UART: [state] Locking PCR0, PCR1 and PCR31
6,144,017 UART: [state] Locking ICCM
6,144,475 UART: [exit] Launching FMC @ 0x40000130
6,149,804 UART:
6,149,820 UART: Running Caliptra FMC ...
6,150,228 UART:
6,150,282 UART: [state] CFI Enabled
6,239,431 UART: [art] Extend RT PCRs Done
6,239,859 UART: [art] Lock RT PCRs Done
6,241,380 UART: [art] Populate DV Done
6,249,761 UART: [fht] FMC Alias Private Key: 7
6,250,765 UART: [art] Derive CDI
6,251,045 UART: [art] Store in in slot 0x4
6,335,914 UART: [art] Derive Key Pair
6,336,274 UART: [art] Store priv key in slot 0x5
6,349,166 UART: [art] Derive Key Pair - Done
6,363,789 UART: [art] Signing Cert with AUTHO
6,364,269 UART: RITY.KEYID = 7
6,379,467 UART: [art] Erasing AUTHORITY.KEYID = 7
6,380,232 UART: [art] PUB.X = 5B513593F0C06B86DC7C2A06CAEAE5D1EAF142A5E362A698B2F7B29F8EA42C66D3277F23FEA87045FB70591BC9F133C4
6,387,013 UART: [art] PUB.Y = C405D53A39F50591538A4BA0EAB3CE2A6B878B98658BD9563D54D36665A6A335D8D1A2448C56D2C3BD67C738A070D1E7
6,393,961 UART: [art] SIG.R = 84EF7BE9BF25B2C04C0CDC599B9BC2296EEF1891E0B9FE92E5C1C29E6FD4024DE7C667652D5DFC6C895077E3A8B936C9
6,400,743 UART: [art] SIG.S = 3735AE9BDBE02D0033351799FD559FD4CABF5D5AF9E5E3B3B1236C2567815131FFC490F88CE0020857444F59A0A77346
6,424,292 UART: Caliptra RT
6,424,545 UART: [state] CFI Enabled
6,708,050 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,738,997 UART: [rt]cmd =0x41545348, len=116
6,740,731 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,441 ready_for_fw is high
1,059,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,131 >>> mbox cmd response: success
2,689,295 UART:
2,689,311 UART: Running Caliptra FMC ...
2,689,719 UART:
2,689,773 UART: [state] CFI Enabled
2,700,238 UART: [fht] FMC Alias Private Key: 7
2,809,071 UART: [art] Extend RT PCRs Done
2,809,499 UART: [art] Lock RT PCRs Done
2,811,143 UART: [art] Populate DV Done
2,819,650 UART: [fht] FMC Alias Private Key: 7
2,820,636 UART: [art] Derive CDI
2,820,916 UART: [art] Store in in slot 0x4
2,906,893 UART: [art] Derive Key Pair
2,907,253 UART: [art] Store priv key in slot 0x5
2,920,233 UART: [art] Derive Key Pair - Done
2,934,807 UART: [art] Signing Cert with AUTHO
2,935,287 UART: RITY.KEYID = 7
2,950,409 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,174 UART: [art] PUB.X = 1405B6AD527AAAE8A1FA4EAB98ED2B3E869D5C5AC3523DD53A785AA1F8B1CB17085DA6300342E38355FA7DE73221F0D9
2,957,951 UART: [art] PUB.Y = A4618ACD6882CCC0C9F0B805766FB8DD387534B792CA0A0BE4C77AA7260911D5C6A2DF86BC34686C81E714691F2FCD64
2,964,899 UART: [art] SIG.R = 68828E19134BD9C53F145DD3A61ADEF5991EDB694BECB3EAA7975BA5F56B3B8C82CA8A98B16D5E3117FCC0979C23DFD2
2,971,689 UART: [art] SIG.S = 66379CDAD5448FE44FE3C5812A5316686701D5A6453AC752530F8D9F0D53AE59EB8E898E27923D9823EC38D83DAC93C9
2,995,049 UART: Caliptra RT
2,995,302 UART: [state] CFI Enabled
3,103,133 UART: [rt] RT listening for mailbox commands...
3,103,803 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,607 UART: [rt]cmd =0x41544d4e, len=14344
3,371,267 >>> mbox cmd response data (8 bytes)
3,371,268 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,339 UART: [rt]cmd =0x41545348, len=116
3,403,035 >>> mbox cmd response data (12 bytes)
3,403,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,842,255 >>> mbox cmd response: success
5,842,255 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,855,657 UART:
5,855,673 UART: Running Caliptra FMC ...
5,856,081 UART:
5,856,135 UART: [state] CFI Enabled
5,944,868 UART: [art] Extend RT PCRs Done
5,945,296 UART: [art] Lock RT PCRs Done
5,946,619 UART: [art] Populate DV Done
5,954,688 UART: [fht] FMC Alias Private Key: 7
5,955,782 UART: [art] Derive CDI
5,956,062 UART: [art] Store in in slot 0x4
6,041,527 UART: [art] Derive Key Pair
6,041,887 UART: [art] Store priv key in slot 0x5
6,055,373 UART: [art] Derive Key Pair - Done
6,070,223 UART: [art] Signing Cert with AUTHO
6,070,703 UART: RITY.KEYID = 7
6,085,721 UART: [art] Erasing AUTHORITY.KEYID = 7
6,086,486 UART: [art] PUB.X = B325AC14072F0DBEB300AB832410A55146ED99E689F47AD4E4482A8C94833B8DDAC9AB98B05E52A3EE6924C059DCD4C0
6,093,240 UART: [art] PUB.Y = B405D81FB15F6A3604491C205DEFEFFC33582178A098F0D0F27D53C873C6743F8225B3C0BE5E3A14F70E0351747B01F1
6,100,177 UART: [art] SIG.R = 1B46FB497173E9A22F95D848FE1B6EFCFDFB951FEB159A48617BBD2F1077C2766F86C1387D62A630A6686A45E82BB8EA
6,106,959 UART: [art] SIG.S = 4A408033FBCFD5DA06326788183B1C5AACD97FA8DAF998D213D5940AE3EC824A8460E0BD6D7760846376D373A1E3BB62
6,131,188 UART: Caliptra RT
6,131,441 UART: [state] CFI Enabled
6,417,704 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,448,671 UART: [rt]cmd =0x41545348, len=116
6,450,491 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,925 UART: [state] LifecycleState = Unprovisioned
86,580 UART: [state] DebugLocked = No
87,300 UART: [state] WD Timer not started. Device not locked for debugging
88,619 UART: [kat] SHA2-256
894,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,394 UART: [kat] ++
898,546 UART: [kat] sha1
902,770 UART: [kat] SHA2-256
904,710 UART: [kat] SHA2-384
907,425 UART: [kat] SHA2-512-ACC
909,326 UART: [kat] ECC-384
918,985 UART: [kat] HMAC-384Kdf
923,743 UART: [kat] LMS
1,172,071 UART: [kat] --
1,173,102 UART: [cold-reset] ++
1,173,492 UART: [fht] FHT @ 0x50003400
1,176,157 UART: [idev] ++
1,176,325 UART: [idev] CDI.KEYID = 6
1,176,685 UART: [idev] SUBJECT.KEYID = 7
1,177,109 UART: [idev] UDS.KEYID = 0
1,177,454 ready_for_fw is high
1,177,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,215 UART: [idev] Erasing UDS.KEYID = 0
1,202,670 UART: [idev] Sha1 KeyId Algorithm
1,211,304 UART: [idev] --
1,212,412 UART: [ldev] ++
1,212,580 UART: [ldev] CDI.KEYID = 6
1,212,943 UART: [ldev] SUBJECT.KEYID = 5
1,213,369 UART: [ldev] AUTHORITY.KEYID = 7
1,213,832 UART: [ldev] FE.KEYID = 1
1,219,188 UART: [ldev] Erasing FE.KEYID = 1
1,245,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,568 UART: [ldev] --
1,284,879 UART: [fwproc] Wait for Commands...
1,285,459 UART: [fwproc] Recv command 0x46574c44
1,286,187 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,381 >>> mbox cmd response: success
2,778,443 UART: [afmc] ++
2,778,611 UART: [afmc] CDI.KEYID = 6
2,778,973 UART: [afmc] SUBJECT.KEYID = 7
2,779,398 UART: [afmc] AUTHORITY.KEYID = 5
2,815,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,578 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,306 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,191 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,910 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,744 UART: [afmc] --
2,858,804 UART: [cold-reset] --
2,859,670 UART: [state] Locking Datavault
2,861,087 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,691 UART: [state] Locking ICCM
2,862,167 UART: [exit] Launching FMC @ 0x40000130
2,867,496 UART:
2,867,512 UART: Running Caliptra FMC ...
2,867,920 UART:
2,868,063 UART: [state] CFI Enabled
2,878,288 UART: [fht] FMC Alias Private Key: 7
2,985,433 UART: [art] Extend RT PCRs Done
2,985,861 UART: [art] Lock RT PCRs Done
2,987,419 UART: [art] Populate DV Done
2,995,608 UART: [fht] FMC Alias Private Key: 7
2,996,708 UART: [art] Derive CDI
2,996,988 UART: [art] Store in in slot 0x4
3,082,493 UART: [art] Derive Key Pair
3,082,853 UART: [art] Store priv key in slot 0x5
3,095,547 UART: [art] Derive Key Pair - Done
3,110,422 UART: [art] Signing Cert with AUTHO
3,110,902 UART: RITY.KEYID = 7
3,126,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,993 UART: [art] PUB.X = D938B86A51E8F6F38696EF744B8D3E67E69F5E51EDCF8123C5D5DE3CFB9944BB960369C2AD07DD4E6A0AC3157531EC38
3,133,768 UART: [art] PUB.Y = 6911E4222ADA07E43606CA49D57A9CDCE569EC06A550EBE15159E11F9A973D54B64D7AB869E4C2252D7F19ED93325A92
3,140,715 UART: [art] SIG.R = F411420DD2D81573D704E14E86AD77B08A346446A5B186B3C483EE771E9CEC431082C93FFFD9A69CF2BBD2757027DA90
3,147,485 UART: [art] SIG.S = 9EFB29EB1BE77F112A45EDD27DAF38FE820E0FB3434BCC654E280F415977EB14CA5F2C9A7704C91E398182109488E5CE
3,171,738 UART: Caliptra RT
3,172,083 UART: [state] CFI Enabled
3,281,141 UART: [rt] RT listening for mailbox commands...
3,281,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,113 UART: [rt]cmd =0x41544d4e, len=14344
3,549,755 >>> mbox cmd response data (8 bytes)
3,549,756 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,911 UART: [rt]cmd =0x41545348, len=116
3,581,625 >>> mbox cmd response data (12 bytes)
3,581,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,419 UART:
3,582,435 UART: Running Caliptra ROM ...
3,582,843 UART:
3,582,985 UART: [state] CFI Enabled
3,585,707 UART: [state] LifecycleState = Unprovisioned
3,586,362 UART: [state] DebugLocked = No
3,586,928 UART: [state] WD Timer not started. Device not locked for debugging
3,588,168 UART: [kat] SHA2-256
4,393,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,397,943 UART: [kat] ++
4,398,095 UART: [kat] sha1
4,402,323 UART: [kat] SHA2-256
4,404,263 UART: [kat] SHA2-384
4,407,222 UART: [kat] SHA2-512-ACC
4,409,122 UART: [kat] ECC-384
4,418,609 UART: [kat] HMAC-384Kdf
4,423,141 UART: [kat] LMS
4,671,469 UART: [kat] --
4,672,243 UART: [update-reset] ++
5,985,234 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,986,295 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,136,293 >>> mbox cmd response: success
6,136,293 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,136,452 UART: [update-reset] Copying MAN_2 To MAN_1
6,144,466 UART: [update-reset Success] --
6,145,259 UART: [state] Locking Datavault
6,145,985 UART: [state] Locking PCR0, PCR1 and PCR31
6,146,589 UART: [state] Locking ICCM
6,147,107 UART: [exit] Launching FMC @ 0x40000130
6,152,436 UART:
6,152,452 UART: Running Caliptra FMC ...
6,152,860 UART:
6,153,003 UART: [state] CFI Enabled
6,241,928 UART: [art] Extend RT PCRs Done
6,242,356 UART: [art] Lock RT PCRs Done
6,243,363 UART: [art] Populate DV Done
6,251,460 UART: [fht] FMC Alias Private Key: 7
6,252,478 UART: [art] Derive CDI
6,252,758 UART: [art] Store in in slot 0x4
6,338,705 UART: [art] Derive Key Pair
6,339,065 UART: [art] Store priv key in slot 0x5
6,352,551 UART: [art] Derive Key Pair - Done
6,367,558 UART: [art] Signing Cert with AUTHO
6,368,038 UART: RITY.KEYID = 7
6,383,366 UART: [art] Erasing AUTHORITY.KEYID = 7
6,384,131 UART: [art] PUB.X = 7176E489C5670DECAF72DB3FCBF062F7265877821ABD64707875771EE77D69B4E02AC07372CFE2E02A10D71C2E826A6D
6,390,904 UART: [art] PUB.Y = 58CF1F2AB26125E52C13DDD0511A0F24522A95E49276D87C62739707434240E76B46AEBF311521C62D48EF43E066F833
6,397,842 UART: [art] SIG.R = 54DF067A3C04B8718DE9FCDB1ACD36738CB2153CDC88D3531582F1F509A14AD36AAF2546A697A06282F5F62E2A20653C
6,404,611 UART: [art] SIG.S = F709B36DD92FF3B84699E69B5CC8013AF29E95F01917033774D19AA5C0F78E9CAAC76577C311E6CC8A84BDDF84ACA07B
6,428,387 UART: Caliptra RT
6,428,732 UART: [state] CFI Enabled
6,711,073 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,741,814 UART: [rt]cmd =0x41545348, len=116
6,743,654 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,586 ready_for_fw is high
1,060,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,838 >>> mbox cmd response: success
2,690,144 UART:
2,690,160 UART: Running Caliptra FMC ...
2,690,568 UART:
2,690,711 UART: [state] CFI Enabled
2,701,116 UART: [fht] FMC Alias Private Key: 7
2,809,173 UART: [art] Extend RT PCRs Done
2,809,601 UART: [art] Lock RT PCRs Done
2,810,839 UART: [art] Populate DV Done
2,819,064 UART: [fht] FMC Alias Private Key: 7
2,820,166 UART: [art] Derive CDI
2,820,446 UART: [art] Store in in slot 0x4
2,906,175 UART: [art] Derive Key Pair
2,906,535 UART: [art] Store priv key in slot 0x5
2,919,527 UART: [art] Derive Key Pair - Done
2,934,107 UART: [art] Signing Cert with AUTHO
2,934,587 UART: RITY.KEYID = 7
2,949,663 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,428 UART: [art] PUB.X = 12224F4DDB6F93B8FA4FD0BB6A4A19F6CB900BB45FD20162620C43B675252A2EE7C927072B9E0A40C01206AF41772AE7
2,957,188 UART: [art] PUB.Y = BCF8791FCDD9056BEFACBDBBBCCBFDCB3EE35FC1D65405F03FBD7425452B3E6B33C60C6E5EE285A0AF8696F6B565C29C
2,964,163 UART: [art] SIG.R = C9238174D9C9162DC3E2F6426AEDCEEF0BDE323F664710492E4AFCF71C4285654091A34D808765027CC3DEFB1DE6B4FE
2,970,939 UART: [art] SIG.S = F10EEE8EE83B824754AE6D290FC700266E40DF6FCEF1793699DBF70926B302B04FFEE76117D2A362C220FE688B3620E7
2,994,418 UART: Caliptra RT
2,994,763 UART: [state] CFI Enabled
3,102,983 UART: [rt] RT listening for mailbox commands...
3,103,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,355 UART: [rt]cmd =0x41544d4e, len=14344
3,370,661 >>> mbox cmd response data (8 bytes)
3,370,662 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,687 UART: [rt]cmd =0x41545348, len=116
3,402,533 >>> mbox cmd response data (12 bytes)
3,402,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,843,260 >>> mbox cmd response: success
5,843,260 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,856,534 UART:
5,856,550 UART: Running Caliptra FMC ...
5,856,958 UART:
5,857,101 UART: [state] CFI Enabled
5,946,002 UART: [art] Extend RT PCRs Done
5,946,430 UART: [art] Lock RT PCRs Done
5,947,655 UART: [art] Populate DV Done
5,956,128 UART: [fht] FMC Alias Private Key: 7
5,957,118 UART: [art] Derive CDI
5,957,398 UART: [art] Store in in slot 0x4
6,042,759 UART: [art] Derive Key Pair
6,043,119 UART: [art] Store priv key in slot 0x5
6,056,485 UART: [art] Derive Key Pair - Done
6,071,250 UART: [art] Signing Cert with AUTHO
6,071,730 UART: RITY.KEYID = 7
6,087,290 UART: [art] Erasing AUTHORITY.KEYID = 7
6,088,055 UART: [art] PUB.X = B6F00FECEAF01E0A5649DC38253B0020952F0177964A7C552137FABC049D6F19F3B0C3E4BDCDCD85CF9F50D7B9EBDE13
6,094,811 UART: [art] PUB.Y = 999A67FE12894B068978B241732C1B4197F7A6E8E5DC67C55474B0DF40D66DADCBAE7A747E76D66B40F92C96808FB2AE
6,101,766 UART: [art] SIG.R = C0026ABA6009C922D9D449BD3A224F1E22CCCD5A7E612CC626064E9E6ED76FB7D2F18A89D762E2283112A42A9212C69C
6,108,535 UART: [art] SIG.S = F897DE2656EDB2D68E65F0F6F6AE718BEDA7A619CD61BAD8D0A4FEB6F9F740F602D9BF5C6E8DA162E897946DE1DD371A
6,132,437 UART: Caliptra RT
6,132,782 UART: [state] CFI Enabled
6,413,968 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,444,691 UART: [rt]cmd =0x41545348, len=116
6,446,425 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,640 UART: [state] LifecycleState = Unprovisioned
85,295 UART: [state] DebugLocked = No
85,921 UART: [state] WD Timer not started. Device not locked for debugging
87,220 UART: [kat] SHA2-256
890,770 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,899 UART: [kat] ++
895,051 UART: [kat] sha1
899,071 UART: [kat] SHA2-256
901,011 UART: [kat] SHA2-384
903,720 UART: [kat] SHA2-512-ACC
905,621 UART: [kat] ECC-384
915,366 UART: [kat] HMAC-384Kdf
920,156 UART: [kat] LMS
1,168,468 UART: [kat] --
1,169,475 UART: [cold-reset] ++
1,169,929 UART: [fht] FHT @ 0x50003400
1,172,435 UART: [idev] ++
1,172,603 UART: [idev] CDI.KEYID = 6
1,172,964 UART: [idev] SUBJECT.KEYID = 7
1,173,389 UART: [idev] UDS.KEYID = 0
1,173,735 ready_for_fw is high
1,173,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,543 UART: [idev] Erasing UDS.KEYID = 0
1,199,153 UART: [idev] Sha1 KeyId Algorithm
1,208,083 UART: [idev] --
1,209,032 UART: [ldev] ++
1,209,200 UART: [ldev] CDI.KEYID = 6
1,209,564 UART: [ldev] SUBJECT.KEYID = 5
1,209,991 UART: [ldev] AUTHORITY.KEYID = 7
1,210,454 UART: [ldev] FE.KEYID = 1
1,215,660 UART: [ldev] Erasing FE.KEYID = 1
1,242,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,910 UART: [ldev] --
1,282,222 UART: [fwproc] Wait for Commands...
1,282,939 UART: [fwproc] Recv command 0x46574c44
1,283,672 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,906 >>> mbox cmd response: success
2,775,153 UART: [afmc] ++
2,775,321 UART: [afmc] CDI.KEYID = 6
2,775,684 UART: [afmc] SUBJECT.KEYID = 7
2,776,110 UART: [afmc] AUTHORITY.KEYID = 5
2,811,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,011 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,730 UART: [afmc] --
2,854,748 UART: [cold-reset] --
2,855,548 UART: [state] Locking Datavault
2,856,543 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,147 UART: [state] Locking ICCM
2,857,719 UART: [exit] Launching FMC @ 0x40000130
2,863,048 UART:
2,863,064 UART: Running Caliptra FMC ...
2,863,472 UART:
2,863,526 UART: [state] CFI Enabled
2,873,917 UART: [fht] FMC Alias Private Key: 7
2,981,548 UART: [art] Extend RT PCRs Done
2,981,976 UART: [art] Lock RT PCRs Done
2,983,676 UART: [art] Populate DV Done
2,992,021 UART: [fht] FMC Alias Private Key: 7
2,993,165 UART: [art] Derive CDI
2,993,445 UART: [art] Store in in slot 0x4
3,079,026 UART: [art] Derive Key Pair
3,079,386 UART: [art] Store priv key in slot 0x5
3,092,358 UART: [art] Derive Key Pair - Done
3,107,069 UART: [art] Signing Cert with AUTHO
3,107,549 UART: RITY.KEYID = 7
3,123,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,772 UART: [art] PUB.X = DE0E6D68E842ECAAFCF56240184D5DCC721993739817FAE3E889D80A4D63D4D6B29C9EDD4311447F5B96C406D1DDB8C3
3,130,547 UART: [art] PUB.Y = 42D6A1DE979A3F7CEBD9D6650722416AD209A47A46AA85013D3277325AFBD4B753FAEE2019C4030E2275114156F94B0F
3,137,481 UART: [art] SIG.R = 79C2074D59B6B93E65587CAE35760DA7FFC55978129746BCE8F0BF3B1111E6FB6603A3DC4A188291ECD3B49E653EAE94
3,144,250 UART: [art] SIG.S = 86DAAA04159E0BA2573055413950595C943235C18D313DFB61C9A9D736C86A9FB3FD79ACD61AFE05CBE13A253A743859
3,168,478 UART: Caliptra RT
3,168,731 UART: [state] CFI Enabled
3,276,634 UART: [rt] RT listening for mailbox commands...
3,277,304 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,240 UART: [rt]cmd =0x41544d4e, len=14344
3,545,604 >>> mbox cmd response data (8 bytes)
3,545,605 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,618 UART: [rt]cmd =0x41545348, len=116
3,577,218 >>> mbox cmd response data (12 bytes)
3,577,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,966 UART:
3,577,982 UART: Running Caliptra ROM ...
3,578,390 UART:
3,578,445 UART: [state] CFI Enabled
3,581,017 UART: [state] LifecycleState = Unprovisioned
3,581,672 UART: [state] DebugLocked = No
3,582,276 UART: [state] WD Timer not started. Device not locked for debugging
3,583,520 UART: [kat] SHA2-256
4,387,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,391,199 UART: [kat] ++
4,391,351 UART: [kat] sha1
4,395,641 UART: [kat] SHA2-256
4,397,581 UART: [kat] SHA2-384
4,400,392 UART: [kat] SHA2-512-ACC
4,402,292 UART: [kat] ECC-384
4,411,999 UART: [kat] HMAC-384Kdf
4,416,493 UART: [kat] LMS
4,664,805 UART: [kat] --
4,665,893 UART: [update-reset] ++
5,977,931 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,979,078 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,129,076 >>> mbox cmd response: success
6,129,076 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,129,319 UART: [update-reset] Copying MAN_2 To MAN_1
6,137,333 UART: [update-reset Success] --
6,138,426 UART: [state] Locking Datavault
6,139,400 UART: [state] Locking PCR0, PCR1 and PCR31
6,140,004 UART: [state] Locking ICCM
6,140,494 UART: [exit] Launching FMC @ 0x40000130
6,145,823 UART:
6,145,839 UART: Running Caliptra FMC ...
6,146,247 UART:
6,146,301 UART: [state] CFI Enabled
6,235,094 UART: [art] Extend RT PCRs Done
6,235,522 UART: [art] Lock RT PCRs Done
6,236,713 UART: [art] Populate DV Done
6,245,006 UART: [fht] FMC Alias Private Key: 7
6,245,986 UART: [art] Derive CDI
6,246,266 UART: [art] Store in in slot 0x4
6,332,021 UART: [art] Derive Key Pair
6,332,381 UART: [art] Store priv key in slot 0x5
6,345,419 UART: [art] Derive Key Pair - Done
6,360,449 UART: [art] Signing Cert with AUTHO
6,360,929 UART: RITY.KEYID = 7
6,376,483 UART: [art] Erasing AUTHORITY.KEYID = 7
6,377,248 UART: [art] PUB.X = 3F4015104976C0845AE046E16F9E35315158D7125BC5BB9EE1C63900CCC5DEED28AED100E728C880AA49D34188EAEDDF
6,383,984 UART: [art] PUB.Y = 72878C8F76171F6D163ABCDA616F98F97806D0EA49238D9908E32C23D5F7505714B7230DBE464627EA13C43757B8CACD
6,390,925 UART: [art] SIG.R = 38B9B445DB1C4B40D9BEFBA7048D654878E6C54D64387DBA9465C185B0D665B9BF827B15221842C11D800E321C4837F6
6,397,689 UART: [art] SIG.S = D15BA5C27503E3335AC9E619E2AAFA13A4FF07BF0C65308D78AF0B0E4D44E756EB5AE2A284785C9A32D0C6A5938EE31A
6,421,411 UART: Caliptra RT
6,421,664 UART: [state] CFI Enabled
6,703,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,734,548 UART: [rt]cmd =0x41545348, len=116
6,736,210 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,448 ready_for_fw is high
1,055,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,812 >>> mbox cmd response: success
2,684,386 UART:
2,684,402 UART: Running Caliptra FMC ...
2,684,810 UART:
2,684,864 UART: [state] CFI Enabled
2,695,597 UART: [fht] FMC Alias Private Key: 7
2,803,002 UART: [art] Extend RT PCRs Done
2,803,430 UART: [art] Lock RT PCRs Done
2,805,254 UART: [art] Populate DV Done
2,813,497 UART: [fht] FMC Alias Private Key: 7
2,814,649 UART: [art] Derive CDI
2,814,929 UART: [art] Store in in slot 0x4
2,900,804 UART: [art] Derive Key Pair
2,901,164 UART: [art] Store priv key in slot 0x5
2,913,966 UART: [art] Derive Key Pair - Done
2,929,021 UART: [art] Signing Cert with AUTHO
2,929,501 UART: RITY.KEYID = 7
2,944,661 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,426 UART: [art] PUB.X = B21BF0E225856C1486E3E61FBF8960A0C671C1B8C27605231C34E66E8D19DE1C96F66F9899DB7CE3C6EE9E0CDEA8593A
2,952,202 UART: [art] PUB.Y = CDBE162BE271D9BF46B65778D932CE986D0EE6431605B756719CD2EDDD39DCE256D8A88DC60A1A5FB662B01F7B0E6BA8
2,959,158 UART: [art] SIG.R = 88ADE4FC209E1BF346630A249B167A254403220462128B72B2887F37A5717BF5D997FAC68DD63624F8A057D8BD496B42
2,965,915 UART: [art] SIG.S = BB2E430E692761BE77243ADFE1F6860E36462FAA7B404A47DFE84733DD26D7B29FAB9627BF5667FE758E1AC47D164C76
2,989,622 UART: Caliptra RT
2,989,875 UART: [state] CFI Enabled
3,098,513 UART: [rt] RT listening for mailbox commands...
3,099,183 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,453 UART: [rt]cmd =0x41544d4e, len=14344
3,367,071 >>> mbox cmd response data (8 bytes)
3,367,072 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,025 UART: [rt]cmd =0x41545348, len=116
3,398,807 >>> mbox cmd response data (12 bytes)
3,398,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,833,414 >>> mbox cmd response: success
5,833,414 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,846,896 UART:
5,846,912 UART: Running Caliptra FMC ...
5,847,320 UART:
5,847,374 UART: [state] CFI Enabled
5,936,151 UART: [art] Extend RT PCRs Done
5,936,579 UART: [art] Lock RT PCRs Done
5,937,782 UART: [art] Populate DV Done
5,946,097 UART: [fht] FMC Alias Private Key: 7
5,947,065 UART: [art] Derive CDI
5,947,345 UART: [art] Store in in slot 0x4
6,033,134 UART: [art] Derive Key Pair
6,033,494 UART: [art] Store priv key in slot 0x5
6,046,746 UART: [art] Derive Key Pair - Done
6,061,199 UART: [art] Signing Cert with AUTHO
6,061,679 UART: RITY.KEYID = 7
6,077,079 UART: [art] Erasing AUTHORITY.KEYID = 7
6,077,844 UART: [art] PUB.X = D24B7CE1A13125F15A989CD627FFF4E6DB42E1A2E8CA584A42D50D2EF2D83A344861FC397E4CBB906523FB438B5D18DC
6,084,627 UART: [art] PUB.Y = E96B9AAC879CA0DE951E8A1BB703AFFCE21F3F0B0080001A8D9AE91ED4C9AC21C5A410C4017BC98989B1B2BC286EFEDA
6,091,550 UART: [art] SIG.R = 5CF774DD1ED0EF3006BDCB8868950A93D7EC0BD99BCAAE2AD74F445AD937B8B93978CFFF923CFC5BF3DFDF7C5CE7D76C
6,098,345 UART: [art] SIG.S = C446FE4FBB9069D4C08E6ABE14CBE1B3623146EE86F857212845956A19E542BB301DBD7E2FD922A181A07EE01F219ED5
6,122,264 UART: Caliptra RT
6,122,517 UART: [state] CFI Enabled
6,404,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,435,695 UART: [rt]cmd =0x41545348, len=116
6,437,603 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,455 UART: [kat] HMAC-384Kdf
921,187 UART: [kat] LMS
1,169,499 UART: [kat] --
1,170,636 UART: [cold-reset] ++
1,171,056 UART: [fht] FHT @ 0x50003400
1,173,662 UART: [idev] ++
1,173,830 UART: [idev] CDI.KEYID = 6
1,174,191 UART: [idev] SUBJECT.KEYID = 7
1,174,616 UART: [idev] UDS.KEYID = 0
1,174,962 ready_for_fw is high
1,174,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,804 UART: [idev] Erasing UDS.KEYID = 0
1,200,364 UART: [idev] Sha1 KeyId Algorithm
1,209,316 UART: [idev] --
1,210,375 UART: [ldev] ++
1,210,543 UART: [ldev] CDI.KEYID = 6
1,210,907 UART: [ldev] SUBJECT.KEYID = 5
1,211,334 UART: [ldev] AUTHORITY.KEYID = 7
1,211,797 UART: [ldev] FE.KEYID = 1
1,216,897 UART: [ldev] Erasing FE.KEYID = 1
1,243,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,423 UART: [ldev] --
1,282,717 UART: [fwproc] Wait for Commands...
1,283,396 UART: [fwproc] Recv command 0x46574c44
1,284,129 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,663 >>> mbox cmd response: success
2,775,862 UART: [afmc] ++
2,776,030 UART: [afmc] CDI.KEYID = 6
2,776,393 UART: [afmc] SUBJECT.KEYID = 7
2,776,819 UART: [afmc] AUTHORITY.KEYID = 5
2,812,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,040 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,923 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,642 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,609 UART: [afmc] --
2,856,619 UART: [cold-reset] --
2,857,667 UART: [state] Locking Datavault
2,858,950 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,554 UART: [state] Locking ICCM
2,860,060 UART: [exit] Launching FMC @ 0x40000130
2,865,389 UART:
2,865,405 UART: Running Caliptra FMC ...
2,865,813 UART:
2,865,956 UART: [state] CFI Enabled
2,876,785 UART: [fht] FMC Alias Private Key: 7
2,984,978 UART: [art] Extend RT PCRs Done
2,985,406 UART: [art] Lock RT PCRs Done
2,986,588 UART: [art] Populate DV Done
2,994,709 UART: [fht] FMC Alias Private Key: 7
2,995,691 UART: [art] Derive CDI
2,995,971 UART: [art] Store in in slot 0x4
3,081,192 UART: [art] Derive Key Pair
3,081,552 UART: [art] Store priv key in slot 0x5
3,095,248 UART: [art] Derive Key Pair - Done
3,109,900 UART: [art] Signing Cert with AUTHO
3,110,380 UART: RITY.KEYID = 7
3,125,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,449 UART: [art] PUB.X = AD0904AF71300F4DFB404147593E68F3C1D836F171B7310F2A63A7C322364744DC19435C5295AD476B2E8824E4003334
3,133,175 UART: [art] PUB.Y = 8BE51A51DFA3C7BDC7F5A2847351581779806931D9D18D54EC1697B43FED4A0FCBC960B8EECF9319DAB2EC90CB0F8ED6
3,140,139 UART: [art] SIG.R = 22716529DE387CFE58C9DF0B806812178FC0AEC2D0C38EBD50AAD877E24D1F676C431AD785A9E338E59E14F35B87C76B
3,146,916 UART: [art] SIG.S = E8CF949B4368C2845BCBD3524D5095666CC61056B79236BE54B453F1D7E8A2221F26215EA01AD61F915E05FDCD222B12
3,170,940 UART: Caliptra RT
3,171,285 UART: [state] CFI Enabled
3,279,050 UART: [rt] RT listening for mailbox commands...
3,279,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,750 UART: [rt]cmd =0x41544d4e, len=14344
3,547,728 >>> mbox cmd response data (8 bytes)
3,547,729 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,924 UART: [rt]cmd =0x41545348, len=116
3,579,842 >>> mbox cmd response data (12 bytes)
3,579,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,706 UART:
3,580,722 UART: Running Caliptra ROM ...
3,581,130 UART:
3,581,272 UART: [state] CFI Enabled
3,583,354 UART: [state] LifecycleState = Unprovisioned
3,584,009 UART: [state] DebugLocked = No
3,584,507 UART: [state] WD Timer not started. Device not locked for debugging
3,585,643 UART: [kat] SHA2-256
4,389,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,393,322 UART: [kat] ++
4,393,474 UART: [kat] sha1
4,397,688 UART: [kat] SHA2-256
4,399,628 UART: [kat] SHA2-384
4,402,317 UART: [kat] SHA2-512-ACC
4,404,217 UART: [kat] ECC-384
4,413,614 UART: [kat] HMAC-384Kdf
4,418,246 UART: [kat] LMS
4,666,558 UART: [kat] --
4,667,264 UART: [update-reset] ++
5,980,828 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,981,907 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
6,131,905 >>> mbox cmd response: success
6,131,905 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,132,094 UART: [update-reset] Copying MAN_2 To MAN_1
6,140,108 UART: [update-reset Success] --
6,141,167 UART: [state] Locking Datavault
6,141,947 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,551 UART: [state] Locking ICCM
6,143,005 UART: [exit] Launching FMC @ 0x40000130
6,148,334 UART:
6,148,350 UART: Running Caliptra FMC ...
6,148,758 UART:
6,148,901 UART: [state] CFI Enabled
6,237,822 UART: [art] Extend RT PCRs Done
6,238,250 UART: [art] Lock RT PCRs Done
6,239,253 UART: [art] Populate DV Done
6,247,492 UART: [fht] FMC Alias Private Key: 7
6,248,420 UART: [art] Derive CDI
6,248,700 UART: [art] Store in in slot 0x4
6,333,799 UART: [art] Derive Key Pair
6,334,159 UART: [art] Store priv key in slot 0x5
6,348,041 UART: [art] Derive Key Pair - Done
6,362,972 UART: [art] Signing Cert with AUTHO
6,363,452 UART: RITY.KEYID = 7
6,378,684 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,449 UART: [art] PUB.X = 035B93473DF5CCDB67228D45AF880537CDEC5F44D92BF82BDA05A88C9803B8A29978FDBDE2A16316BC470A6B0DA360A7
6,386,215 UART: [art] PUB.Y = 8DFFF28E666145341629B1BEEF097FB80F8CDDAB60A808A44D092BF71801411848504085246E66104659BD1A32C4D13D
6,393,148 UART: [art] SIG.R = 9F3AF52C2F95A76F47998AD2380F441942199FAC5D89368F3E43A306CAF95699DB12ECC3D08ABABC7C14575FE35CC536
6,399,922 UART: [art] SIG.S = 8E64DCA4C50497A8975FDECAD916AB7443A431B7FD81FC2D8E3F8C9EAEA49481AFF44C733337D6A18152B6314077239A
6,423,850 UART: Caliptra RT
6,424,195 UART: [state] CFI Enabled
6,704,933 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,735,728 UART: [rt]cmd =0x41545348, len=116
6,737,496 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,727 ready_for_fw is high
1,056,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,611 >>> mbox cmd response: success
2,686,967 UART:
2,686,983 UART: Running Caliptra FMC ...
2,687,391 UART:
2,687,534 UART: [state] CFI Enabled
2,697,759 UART: [fht] FMC Alias Private Key: 7
2,805,526 UART: [art] Extend RT PCRs Done
2,805,954 UART: [art] Lock RT PCRs Done
2,807,556 UART: [art] Populate DV Done
2,815,777 UART: [fht] FMC Alias Private Key: 7
2,816,857 UART: [art] Derive CDI
2,817,137 UART: [art] Store in in slot 0x4
2,902,664 UART: [art] Derive Key Pair
2,903,024 UART: [art] Store priv key in slot 0x5
2,916,004 UART: [art] Derive Key Pair - Done
2,930,742 UART: [art] Signing Cert with AUTHO
2,931,222 UART: RITY.KEYID = 7
2,946,462 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,227 UART: [art] PUB.X = D6D86164546F5F011F040A1BA0DAF79740A46AEE623AE5C4CD30D82B7B69313E45BBCD6B39E8AB6F83ABB8D8E4275988
2,954,002 UART: [art] PUB.Y = ABC6A73560C257513CE14343D35E9486A5250C85A2E327DDB8090B7F587869410C32E30B281777C1CCB58B6FF904DB1D
2,960,934 UART: [art] SIG.R = 34AF2C6F369E58E7FB63A93C2BE460EDDCE4E6601B546CFA6DD66EB71D2594B0DE7D3C14BDF35D381F3838FF8E5EC730
2,967,726 UART: [art] SIG.S = 22EEFE9C10F2C0EB281A04E5D19AA82A662F9491D6894FDEEE4AE6DE52CF2F1B9DB69B2C6922D6EE3B10D11CC24F891F
2,991,922 UART: Caliptra RT
2,992,267 UART: [state] CFI Enabled
3,100,852 UART: [rt] RT listening for mailbox commands...
3,101,522 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,482 UART: [rt]cmd =0x41544d4e, len=14344
3,369,624 >>> mbox cmd response data (8 bytes)
3,369,625 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,674 UART: [rt]cmd =0x41545348, len=116
3,401,582 >>> mbox cmd response data (12 bytes)
3,401,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,514 >>> mbox cmd response: success
5,837,514 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,850,792 UART:
5,850,808 UART: Running Caliptra FMC ...
5,851,216 UART:
5,851,359 UART: [state] CFI Enabled
5,940,286 UART: [art] Extend RT PCRs Done
5,940,714 UART: [art] Lock RT PCRs Done
5,942,067 UART: [art] Populate DV Done
5,950,360 UART: [fht] FMC Alias Private Key: 7
5,951,444 UART: [art] Derive CDI
5,951,724 UART: [art] Store in in slot 0x4
6,038,045 UART: [art] Derive Key Pair
6,038,405 UART: [art] Store priv key in slot 0x5
6,051,947 UART: [art] Derive Key Pair - Done
6,066,962 UART: [art] Signing Cert with AUTHO
6,067,442 UART: RITY.KEYID = 7
6,082,132 UART: [art] Erasing AUTHORITY.KEYID = 7
6,082,897 UART: [art] PUB.X = 6A6D58BA4A336BD3FC94CE25A5676CA4DF37E16D9CFC86F475A3091AFF94280DEB6A75212963E684434B30B34D64B12F
6,089,671 UART: [art] PUB.Y = 98052F4CC14C4B421CF5CD1005EEF985C5312D6FD4AD00BA7E0D7E1600D4FF91BE51B0B3586FABC67491E5E06E6B0486
6,096,579 UART: [art] SIG.R = C862F6213F0726EFC65AF8397C55DE9C272CE616343DE6BF5E100AFD67CBB984ECEDD7056316AE683B77C100733B4ECF
6,103,332 UART: [art] SIG.S = 554BEDF6544A1A46202A3A32E974671C697ABDD2E54627B2F2F7FFD2726A2B1B597FA1E09E0C13C3CC4630EF6608AE1B
6,127,183 UART: Caliptra RT
6,127,528 UART: [state] CFI Enabled
6,409,273 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,440,182 UART: [rt]cmd =0x41545348, len=116
6,442,132 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
192,052 UART:
192,420 UART: Running Caliptra ROM ...
193,560 UART:
193,710 UART: [state] CFI Enabled
264,778 UART: [state] LifecycleState = Unprovisioned
266,686 UART: [state] DebugLocked = No
268,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,086 UART: [kat] SHA2-256
443,779 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,305 UART: [kat] ++
454,840 UART: [kat] sha1
466,579 UART: [kat] SHA2-256
469,236 UART: [kat] SHA2-384
476,003 UART: [kat] SHA2-512-ACC
478,374 UART: [kat] ECC-384
2,767,791 UART: [kat] HMAC-384Kdf
2,799,929 UART: [kat] LMS
3,990,243 UART: [kat] --
3,993,979 UART: [cold-reset] ++
3,996,128 UART: [fht] Storing FHT @ 0x50003400
4,006,617 UART: [idev] ++
4,007,197 UART: [idev] CDI.KEYID = 6
4,008,115 UART: [idev] SUBJECT.KEYID = 7
4,009,367 UART: [idev] UDS.KEYID = 0
4,010,358 ready_for_fw is high
4,010,552 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,134 UART: [idev] Erasing UDS.KEYID = 0
7,346,396 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,714 UART: [idev] --
7,373,873 UART: [ldev] ++
7,374,443 UART: [ldev] CDI.KEYID = 6
7,375,412 UART: [ldev] SUBJECT.KEYID = 5
7,376,651 UART: [ldev] AUTHORITY.KEYID = 7
7,377,886 UART: [ldev] FE.KEYID = 1
7,411,714 UART: [ldev] Erasing FE.KEYID = 1
10,743,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,059,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,073,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,088,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,102,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,122,271 UART: [ldev] --
13,126,345 UART: [fwproc] Waiting for Commands...
13,128,120 UART: [fwproc] Received command 0x46574c44
13,130,308 UART: [fwproc] Received Image of size 114124 bytes
17,181,970 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,255,638 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,324,496 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,642,251 >>> mbox cmd response: success
17,647,069 UART: [afmc] ++
17,647,709 UART: [afmc] CDI.KEYID = 6
17,648,629 UART: [afmc] SUBJECT.KEYID = 7
17,649,794 UART: [afmc] AUTHORITY.KEYID = 5
21,017,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,318,238 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,320,493 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,334,941 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,349,728 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,364,186 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,386,671 UART: [afmc] --
23,391,295 UART: [cold-reset] --
23,394,991 UART: [state] Locking Datavault
23,400,240 UART: [state] Locking PCR0, PCR1 and PCR31
23,401,992 UART: [state] Locking ICCM
23,403,791 UART: [exit] Launching FMC @ 0x40000130
23,412,158 UART:
23,412,434 UART: Running Caliptra FMC ...
23,413,471 UART:
23,413,619 UART: [state] CFI Enabled
23,478,631 UART: [fht] FMC Alias Private Key: 7
25,816,950 UART: [art] Extend RT PCRs Done
25,818,213 UART: [art] Lock RT PCRs Done
25,820,142 UART: [art] Populate DV Done
25,825,339 UART: [fht] FMC Alias Private Key: 7
25,826,985 UART: [art] Derive CDI
25,827,720 UART: [art] Store in in slot 0x4
25,887,638 UART: [art] Derive Key Pair
25,888,675 UART: [art] Store priv key in slot 0x5
29,181,270 UART: [art] Derive Key Pair - Done
29,194,156 UART: [art] Signing Cert with AUTHO
29,195,460 UART: RITY.KEYID = 7
31,482,717 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,215 UART: [art] PUB.X = 92C126DAAC7CF7FBB412E2D9B92C14070523724CEBA50F56D6BE370D5F7784A1AEE98B9581BF8B2151508D4D6D179886
31,491,484 UART: [art] PUB.Y = 618F6FF0B64CB4CD4E6E4EEC50DCD76061F8661D859BD25441124EC7741C8AD575AC2ECF2CCFF5122687B1A606118DBD
31,498,735 UART: [art] SIG.R = 3B67395FB1A488D3E70C3F07804152130BAEAFD82D4D27D775A7CDD0FD430CF5A3C57F3D24D4F572B28962FF1FA2C2CD
31,506,126 UART: [art] SIG.S = 16F527E136576DC82CDA6BC9E6F32E9DC0110DBD4E5420569DF760954CE67C04721978226F1E6552D10A1004F537B281
32,810,959 UART: Caliptra RT
32,811,673 UART: [state] CFI Enabled
32,972,063 UART: [rt] RT listening for mailbox commands...
32,974,346 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,005,096 UART: [rt]cmd =0x41545348, len=116
33,007,221 >>> mbox cmd response data (12 bytes)
35,134,380 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,234,970 UART:
35,235,327 UART: Running Caliptra ROM ...
35,236,373 UART:
35,236,524 UART: [state] CFI Enabled
35,303,202 UART: [state] LifecycleState = Unprovisioned
35,305,141 UART: [state] DebugLocked = No
35,307,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,313,463 UART: [kat] SHA2-256
35,483,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,493,641 UART: [kat] ++
35,494,113 UART: [kat] sha1
35,504,680 UART: [kat] SHA2-256
35,507,380 UART: [kat] SHA2-384
35,512,289 UART: [kat] SHA2-512-ACC
35,514,689 UART: [kat] ECC-384
37,804,139 UART: [kat] HMAC-384Kdf
37,834,263 UART: [kat] LMS
39,024,632 UART: [kat] --
39,028,494 UART: [update-reset] ++
42,741,880 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,744,945 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
43,003,355 >>> mbox cmd response: success
43,003,721 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,004,012 UART: [update-reset] Copying MAN_2 To MAN_1
43,026,027 UART: [update-reset Success] --
43,029,875 UART: [state] Locking Datavault
43,033,190 UART: [state] Locking PCR0, PCR1 and PCR31
43,034,955 UART: [state] Locking ICCM
43,036,163 UART: [exit] Launching FMC @ 0x40000130
43,044,612 UART:
43,044,847 UART: Running Caliptra FMC ...
43,045,873 UART:
43,046,043 UART: [state] CFI Enabled
43,136,182 UART: [art] Extend RT PCRs Done
43,137,367 UART: [art] Lock RT PCRs Done
43,138,640 UART: [art] Populate DV Done
43,144,094 UART: [fht] FMC Alias Private Key: 7
43,145,628 UART: [art] Derive CDI
43,146,394 UART: [art] Store in in slot 0x4
43,204,983 UART: [art] Derive Key Pair
43,206,021 UART: [art] Store priv key in slot 0x5
46,498,396 UART: [art] Derive Key Pair - Done
46,511,338 UART: [art] Signing Cert with AUTHO
46,512,636 UART: RITY.KEYID = 7
48,800,925 UART: [art] Erasing AUTHORITY.KEYID = 7
48,802,432 UART: [art] PUB.X = B3FE20FCA04F01DB7E736EB74E693C931863DEED89BE35274D6AFBCBDCC993F99B53151ECD74DA5473F43AB2DCE4B9AC
48,809,740 UART: [art] PUB.Y = ED321AAFED05E469180A8D0F150D088CF38AF69A8D9EF62E311EB315B7479385DE8045465FE0D9287334F02E405E160B
48,816,973 UART: [art] SIG.R = 49B8BBAF88315DFC8F8478E7FD04DFEE2A029FB533B9BBC2688AA2AD0F35B6A89F046D429CA314F2A7AC9987D0005EC7
48,824,392 UART: [art] SIG.S = 3DCBE7322040DBAAD0F44D0BF1C7C169A35584E364979A0BA28A0C296246C54C1DAB980385D24A75C62A8B1601185242
50,129,080 UART: mbox::rt_entry...
50,130,038 UART: ____ _ _ _ ____ _____
50,132,022 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,134,030 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,135,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,137,887 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,139,810 UART: |_|
50,140,618 UART:
50,429,099 UART: [rt] Runtime listening for mailbox commands...
50,431,222 >>> mbox cmd response data (48 bytes)
50,431,803 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,434,162 >>> mbox cmd response data (48 bytes)
50,435,017 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,447,584 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,783,676 ready_for_fw is high
3,784,119 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,855,180 >>> mbox cmd response: success
23,549,006 UART:
23,549,395 UART: Running Caliptra FMC ...
23,550,540 UART:
23,550,699 UART: [state] CFI Enabled
23,616,011 UART: [fht] FMC Alias Private Key: 7
25,953,689 UART: [art] Extend RT PCRs Done
25,954,914 UART: [art] Lock RT PCRs Done
25,956,603 UART: [art] Populate DV Done
25,961,984 UART: [fht] FMC Alias Private Key: 7
25,963,483 UART: [art] Derive CDI
25,964,247 UART: [art] Store in in slot 0x4
26,024,180 UART: [art] Derive Key Pair
26,025,188 UART: [art] Store priv key in slot 0x5
29,318,051 UART: [art] Derive Key Pair - Done
29,330,950 UART: [art] Signing Cert with AUTHO
29,332,263 UART: RITY.KEYID = 7
31,618,710 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,220 UART: [art] PUB.X = 01640A5D2B9DC8FABEDED9B7E4381AB15839EEF60746180611697F6F4D49852662143BECD62F403635F765959B47C9A0
31,627,446 UART: [art] PUB.Y = B3A794A3B9F30F1C44A9AA9C9DEF94654969EE97256A54E15EE9127358597D88161A376233A53CD76E7C3B2907B3AE26
31,634,663 UART: [art] SIG.R = 9D85CCA98E6B59EBDED6CA2B0C254D48D62CD4CFF65C7924731A9B8C5394B6E848B57E9C5B8C321FA2B13187A7089F50
31,642,137 UART: [art] SIG.S = D63EA2F0A3541F053A800C3A360D9F265E8945F55E37E987D7FC43A411EB692D80D386D20BB8018AE50507BFA39A1BB7
32,947,485 UART: Caliptra RT
32,948,186 UART: [state] CFI Enabled
33,107,454 UART: [rt] RT listening for mailbox commands...
33,109,769 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,140,796 UART: [rt]cmd =0x41545348, len=116
33,143,012 >>> mbox cmd response data (12 bytes)
35,268,865 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,244,142 >>> mbox cmd response: success
43,244,598 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,281,020 UART:
43,281,305 UART: Running Caliptra FMC ...
43,282,425 UART:
43,282,595 UART: [state] CFI Enabled
43,379,671 UART: [art] Extend RT PCRs Done
43,380,867 UART: [art] Lock RT PCRs Done
43,382,333 UART: [art] Populate DV Done
43,387,925 UART: [fht] FMC Alias Private Key: 7
43,389,522 UART: [art] Derive CDI
43,390,282 UART: [art] Store in in slot 0x4
43,448,882 UART: [art] Derive Key Pair
43,449,929 UART: [art] Store priv key in slot 0x5
46,742,963 UART: [art] Derive Key Pair - Done
46,755,960 UART: [art] Signing Cert with AUTHO
46,757,456 UART: RITY.KEYID = 7
49,043,693 UART: [art] Erasing AUTHORITY.KEYID = 7
49,045,205 UART: [art] PUB.X = B028EB25309B2F672B34EE0D0C3800E15573E2DB6CCB50047004626B9EA58DB57D853C61AA7DE2CE5FF446E661ABA699
49,052,485 UART: [art] PUB.Y = 9BB7E43B75D1DF17FDE6DD1E441DD72FD85B8697401D163B267557F9E96AD477D089CFC0ECD3D9BAF1E5188B4CFAC821
49,059,747 UART: [art] SIG.R = 316F889725A371F962ADDFE1322424B3D13D819FE96D074CD041694E5F3E7BFB04D759C6F2EB29F8E827F03C1D77FBC3
49,067,165 UART: [art] SIG.S = 7CE4414F39AB551933FC0DB497022AD865EEE91A938CE21198195B570F0F80862D7BAF370249221F7AC256080D9C65DE
50,372,427 UART: mbox::rt_entry...
50,373,391 UART: ____ _ _ _ ____ _____
50,375,330 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,377,344 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,379,286 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,381,239 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,383,174 UART: |_|
50,383,990 UART:
50,670,579 UART: [rt] Runtime listening for mailbox commands...
50,672,735 >>> mbox cmd response data (48 bytes)
50,673,292 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,675,612 >>> mbox cmd response data (48 bytes)
50,676,663 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,689,231 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,332 UART:
192,716 UART: Running Caliptra ROM ...
193,846 UART:
603,426 UART: [state] CFI Enabled
619,146 UART: [state] LifecycleState = Unprovisioned
621,021 UART: [state] DebugLocked = No
623,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,636 UART: [kat] SHA2-256
797,363 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,886 UART: [kat] ++
808,533 UART: [kat] sha1
818,793 UART: [kat] SHA2-256
821,452 UART: [kat] SHA2-384
827,722 UART: [kat] SHA2-512-ACC
830,083 UART: [kat] ECC-384
3,112,349 UART: [kat] HMAC-384Kdf
3,124,149 UART: [kat] LMS
4,314,281 UART: [kat] --
4,318,654 UART: [cold-reset] ++
4,319,877 UART: [fht] Storing FHT @ 0x50003400
4,330,454 UART: [idev] ++
4,331,055 UART: [idev] CDI.KEYID = 6
4,332,007 UART: [idev] SUBJECT.KEYID = 7
4,333,252 UART: [idev] UDS.KEYID = 0
4,334,199 ready_for_fw is high
4,334,392 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,595 UART: [idev] Erasing UDS.KEYID = 0
7,619,780 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,011 UART: [idev] --
7,645,677 UART: [ldev] ++
7,646,297 UART: [ldev] CDI.KEYID = 6
7,647,308 UART: [ldev] SUBJECT.KEYID = 5
7,648,458 UART: [ldev] AUTHORITY.KEYID = 7
7,649,686 UART: [ldev] FE.KEYID = 1
7,660,057 UART: [ldev] Erasing FE.KEYID = 1
10,941,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,234,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,248,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,263,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,278,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,024 UART: [ldev] --
13,301,323 UART: [fwproc] Waiting for Commands...
13,303,376 UART: [fwproc] Received command 0x46574c44
13,305,555 UART: [fwproc] Received Image of size 114124 bytes
17,364,696 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,923 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,827,813 >>> mbox cmd response: success
17,831,924 UART: [afmc] ++
17,832,521 UART: [afmc] CDI.KEYID = 6
17,833,425 UART: [afmc] SUBJECT.KEYID = 7
17,834,690 UART: [afmc] AUTHORITY.KEYID = 5
21,147,889 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,004 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,259 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,668 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,509 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,915 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,533 UART: [afmc] --
23,515,403 UART: [cold-reset] --
23,518,452 UART: [state] Locking Datavault
23,523,428 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,118 UART: [state] Locking ICCM
23,526,615 UART: [exit] Launching FMC @ 0x40000130
23,535,014 UART:
23,535,302 UART: Running Caliptra FMC ...
23,536,414 UART:
23,536,577 UART: [state] CFI Enabled
23,544,788 UART: [fht] FMC Alias Private Key: 7
25,876,029 UART: [art] Extend RT PCRs Done
25,877,253 UART: [art] Lock RT PCRs Done
25,879,114 UART: [art] Populate DV Done
25,884,679 UART: [fht] FMC Alias Private Key: 7
25,886,426 UART: [art] Derive CDI
25,887,176 UART: [art] Store in in slot 0x4
25,930,095 UART: [art] Derive Key Pair
25,931,137 UART: [art] Store priv key in slot 0x5
29,172,481 UART: [art] Derive Key Pair - Done
29,185,318 UART: [art] Signing Cert with AUTHO
29,186,617 UART: RITY.KEYID = 7
31,466,490 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,000 UART: [art] PUB.X = 73E129ABD86026BF0DDEE804AB22E18B57ACF6DCE4585B199A491A66BA1BA32C048F14011E8DB75BBA4B9702F4A7E4C9
31,475,232 UART: [art] PUB.Y = F5289F4C1CCA34A4D88013C6060E1BCF281E7BD0E9EE3BCCC82FF40DD0CE3A6C3D455236851D9DB9FB01F250C4E3C61C
31,482,507 UART: [art] SIG.R = D9108886392A0429958EA58A0715E75BFB0ECD311867E84BD3022FB1CF8DF6A7F9F60563B4B860333C50419182BB1831
31,489,829 UART: [art] SIG.S = EFF989CF8AEEC4E1E094804394276727738414C2A49C37298F116118C0B0E57AEB6797318BD3EC481344559125CCC9F0
32,795,047 UART: Caliptra RT
32,795,754 UART: [state] CFI Enabled
32,912,939 UART: [rt] RT listening for mailbox commands...
32,915,370 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
32,946,323 UART: [rt]cmd =0x41545348, len=116
32,948,440 >>> mbox cmd response data (12 bytes)
34,997,390 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,098,234 UART:
35,098,586 UART: Running Caliptra ROM ...
35,099,718 UART:
35,099,884 UART: [state] CFI Enabled
35,115,718 UART: [state] LifecycleState = Unprovisioned
35,117,612 UART: [state] DebugLocked = No
35,119,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,123,232 UART: [kat] SHA2-256
35,292,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,303,503 UART: [kat] ++
35,304,067 UART: [kat] sha1
35,316,316 UART: [kat] SHA2-256
35,319,059 UART: [kat] SHA2-384
35,324,346 UART: [kat] SHA2-512-ACC
35,326,742 UART: [kat] ECC-384
37,609,349 UART: [kat] HMAC-384Kdf
37,622,494 UART: [kat] LMS
38,812,513 UART: [kat] --
38,818,342 UART: [update-reset] ++
42,524,795 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,528,504 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,786,957 >>> mbox cmd response: success
42,787,314 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,788,240 UART: [update-reset] Copying MAN_2 To MAN_1
42,810,671 UART: [update-reset Success] --
42,814,020 UART: [state] Locking Datavault
42,816,812 UART: [state] Locking PCR0, PCR1 and PCR31
42,818,572 UART: [state] Locking ICCM
42,820,475 UART: [exit] Launching FMC @ 0x40000130
42,828,921 UART:
42,829,159 UART: Running Caliptra FMC ...
42,830,181 UART:
42,830,321 UART: [state] CFI Enabled
42,874,433 UART: [art] Extend RT PCRs Done
42,875,574 UART: [art] Lock RT PCRs Done
42,877,127 UART: [art] Populate DV Done
42,882,419 UART: [fht] FMC Alias Private Key: 7
42,883,959 UART: [art] Derive CDI
42,884,865 UART: [art] Store in in slot 0x4
42,927,577 UART: [art] Derive Key Pair
42,928,616 UART: [art] Store priv key in slot 0x5
46,170,816 UART: [art] Derive Key Pair - Done
46,183,455 UART: [art] Signing Cert with AUTHO
46,184,764 UART: RITY.KEYID = 7
48,464,169 UART: [art] Erasing AUTHORITY.KEYID = 7
48,465,680 UART: [art] PUB.X = 82C19792F308817A6329A68687B9773D23890F4ED527BEB98A7E0E5862BB0240103DEB94A1D6D8A08139AE5B2572E4C3
48,472,919 UART: [art] PUB.Y = 42F99F677CE85B990B880847F034AB09A2E6DF7E534E04AC397596BF7EB75D3FE0E4D6CAA60E944C95C10A0A28C7C847
48,480,192 UART: [art] SIG.R = 61DBDFEFB8D70CCEBEEBF3F0693C7774E515C178FB87F8C2C83EB28B8533F174F0282087DD32A82986A1841F53FB84C5
48,487,569 UART: [art] SIG.S = F71D56EA1AACE8A73DD67339376594C37DD99EF639B2B00146C56E66BFC3C23CDD8FB412E7753066851E774C3E6B3D6A
49,792,380 UART: mbox::rt_entry...
49,793,341 UART: ____ _ _ _ ____ _____
49,795,264 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,797,265 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,799,189 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,801,108 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,803,028 UART: |_|
49,803,834 UART:
50,089,357 UART: [rt] Runtime listening for mailbox commands...
50,091,498 >>> mbox cmd response data (48 bytes)
50,092,075 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,094,399 >>> mbox cmd response data (48 bytes)
50,095,251 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,107,800 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
4,131,748 ready_for_fw is high
4,132,313 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,061,821 >>> mbox cmd response: success
23,697,783 UART:
23,698,180 UART: Running Caliptra FMC ...
23,699,311 UART:
23,699,469 UART: [state] CFI Enabled
23,707,184 UART: [fht] FMC Alias Private Key: 7
26,038,702 UART: [art] Extend RT PCRs Done
26,039,944 UART: [art] Lock RT PCRs Done
26,041,508 UART: [art] Populate DV Done
26,046,895 UART: [fht] FMC Alias Private Key: 7
26,048,405 UART: [art] Derive CDI
26,049,137 UART: [art] Store in in slot 0x4
26,091,889 UART: [art] Derive Key Pair
26,092,885 UART: [art] Store priv key in slot 0x5
29,335,280 UART: [art] Derive Key Pair - Done
29,348,445 UART: [art] Signing Cert with AUTHO
29,349,751 UART: RITY.KEYID = 7
31,629,596 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,237 UART: [art] PUB.X = 6ACBE258DE65494DCE11C33CA5CBA75B444A4CCF8C53283A4EE8D9E4E7B0140F5BCEBD0FD0FDA48D8AFF245FA0344313
31,638,353 UART: [art] PUB.Y = 037258484AFE191678DAE3606510D50A591651F492C5A14777BA168EDF1123B78234AD97AC0BFBF303C4A7A17BC1001C
31,645,590 UART: [art] SIG.R = BCB7893DF96BDC35D8E1A2E7F0942F3B8C9AAE140B654792B916A668E0A8B674B16E0A734B6F367BEC75D44E264F1CFE
31,652,967 UART: [art] SIG.S = E841963131463F5229454EE4C32142B2CC0C619AEE5BDB5C9A361E6E87BE1D6911C3AC888F1C351D33C5594D61D4D842
32,958,112 UART: Caliptra RT
32,958,824 UART: [state] CFI Enabled
33,075,425 UART: [rt] RT listening for mailbox commands...
33,077,875 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,108,680 UART: [rt]cmd =0x41545348, len=116
33,111,320 >>> mbox cmd response data (12 bytes)
35,161,363 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,065,198 >>> mbox cmd response: success
43,065,678 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,099,304 UART:
43,099,627 UART: Running Caliptra FMC ...
43,100,758 UART:
43,100,914 UART: [state] CFI Enabled
43,145,036 UART: [art] Extend RT PCRs Done
43,146,180 UART: [art] Lock RT PCRs Done
43,147,836 UART: [art] Populate DV Done
43,153,317 UART: [fht] FMC Alias Private Key: 7
43,154,901 UART: [art] Derive CDI
43,155,671 UART: [art] Store in in slot 0x4
43,198,373 UART: [art] Derive Key Pair
43,199,373 UART: [art] Store priv key in slot 0x5
46,441,378 UART: [art] Derive Key Pair - Done
46,453,840 UART: [art] Signing Cert with AUTHO
46,455,146 UART: RITY.KEYID = 7
48,734,820 UART: [art] Erasing AUTHORITY.KEYID = 7
48,736,326 UART: [art] PUB.X = B4D1C2CF44CF87AC8B7759933197B0D3870D09B6E64E4808B931485CCBE9EFDACECDB85F2170D9FCAA4FAD55CEA9A77C
48,743,569 UART: [art] PUB.Y = 5136834D23D4370ECF4AC6FBAF40DAC52B3BE0534FC0C43FAB80E3D4C1899936A6C8A121E3478CA619B53624455614B4
48,750,935 UART: [art] SIG.R = E8839C53D5B949C17EEBA90A5301DE9BEA314D8845C659F8B9D7978F4D4ECB44A287C0BEEF190034D4F5B75F20DF642D
48,758,227 UART: [art] SIG.S = BCD858D2BAC2F248B44394FE4B3A2E1B7FCC4A4229EACC307E820157460F02615BF2398CACA7E2B27D1E188E772B442C
50,063,324 UART: mbox::rt_entry...
50,064,304 UART: ____ _ _ _ ____ _____
50,066,237 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,068,263 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,070,117 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,072,039 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,073,922 UART: |_|
50,074,745 UART:
50,359,201 UART: [rt] Runtime listening for mailbox commands...
50,361,382 >>> mbox cmd response data (48 bytes)
50,361,954 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,364,270 >>> mbox cmd response data (48 bytes)
50,365,120 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,377,667 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,010 UART:
192,390 UART: Running Caliptra ROM ...
193,488 UART:
193,630 UART: [state] CFI Enabled
264,891 UART: [state] LifecycleState = Unprovisioned
266,722 UART: [state] DebugLocked = No
268,882 UART: [state] WD Timer not started. Device not locked for debugging
273,062 UART: [kat] SHA2-256
452,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,763 UART: [kat] ++
464,328 UART: [kat] sha1
475,424 UART: [kat] SHA2-256
478,439 UART: [kat] SHA2-384
485,779 UART: [kat] SHA2-512-ACC
488,716 UART: [kat] ECC-384
2,946,365 UART: [kat] HMAC-384Kdf
2,971,597 UART: [kat] LMS
3,501,095 UART: [kat] --
3,504,607 UART: [cold-reset] ++
3,506,632 UART: [fht] FHT @ 0x50003400
3,517,969 UART: [idev] ++
3,518,539 UART: [idev] CDI.KEYID = 6
3,519,419 UART: [idev] SUBJECT.KEYID = 7
3,520,658 UART: [idev] UDS.KEYID = 0
3,521,589 ready_for_fw is high
3,521,803 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,731 UART: [idev] Erasing UDS.KEYID = 0
6,029,018 UART: [idev] Sha1 KeyId Algorithm
6,052,091 UART: [idev] --
6,056,745 UART: [ldev] ++
6,057,319 UART: [ldev] CDI.KEYID = 6
6,058,232 UART: [ldev] SUBJECT.KEYID = 5
6,059,445 UART: [ldev] AUTHORITY.KEYID = 7
6,060,675 UART: [ldev] FE.KEYID = 1
6,100,390 UART: [ldev] Erasing FE.KEYID = 1
8,605,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,268 UART: [ldev] --
10,416,763 UART: [fwproc] Wait for Commands...
10,418,919 UART: [fwproc] Recv command 0x46574c44
10,421,012 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,508 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,554 >>> mbox cmd response: success
14,283,271 UART: [afmc] ++
14,283,857 UART: [afmc] CDI.KEYID = 6
14,284,783 UART: [afmc] SUBJECT.KEYID = 7
14,285,946 UART: [afmc] AUTHORITY.KEYID = 5
16,829,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,881 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,669 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,668 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,564 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,500 UART: [afmc] --
18,629,559 UART: [cold-reset] --
18,633,262 UART: [state] Locking Datavault
18,639,429 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,126 UART: [state] Locking ICCM
18,643,414 UART: [exit] Launching FMC @ 0x40000130
18,651,856 UART:
18,652,088 UART: Running Caliptra FMC ...
18,653,192 UART:
18,653,356 UART: [state] CFI Enabled
18,713,444 UART: [fht] FMC Alias Private Key: 7
20,477,276 UART: [art] Extend RT PCRs Done
20,478,501 UART: [art] Lock RT PCRs Done
20,480,259 UART: [art] Populate DV Done
20,485,774 UART: [fht] FMC Alias Private Key: 7
20,487,436 UART: [art] Derive CDI
20,488,171 UART: [art] Store in in slot 0x4
20,546,077 UART: [art] Derive Key Pair
20,547,117 UART: [art] Store priv key in slot 0x5
23,009,903 UART: [art] Derive Key Pair - Done
23,023,707 UART: [art] Signing Cert with AUTHO
23,025,063 UART: RITY.KEYID = 7
24,737,107 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,591 UART: [art] PUB.X = 484BBA12B2C8CBC11A01AED44BD036803C4D1D681582D531C3403E1A71321E0AE4E75B18E0D38A2615B460DE492901E9
24,745,845 UART: [art] PUB.Y = BFC65504FDFF21B705BEA4C3B7F1FCAB4B5D06E509A396FF0DF080F66432DA39D193B365C83AF99A0DA2067CF2E2DAEB
24,753,135 UART: [art] SIG.R = E4E6B60DB13E7035F8E4C287C24550F79C5F3849ACC0C8FA958EBE7FB270DD55322A4B1BF9F6A557AD2B5770E7D34B27
24,760,587 UART: [art] SIG.S = 55A53F35D50023ADC42323AA18898C4A709CC91C3DF5BDE20E1A645A117BB9EAD230B6D50A595505C8EDEF7BF64F3899
25,739,938 UART: Caliptra RT
25,740,642 UART: [state] CFI Enabled
25,905,339 UART: [rt] RT listening for mailbox commands...
25,907,738 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,938,993 UART: [rt]cmd =0x41545348, len=116
25,941,222 >>> mbox cmd response data (12 bytes)
28,008,798 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,109,502 UART:
28,109,859 UART: Running Caliptra ROM ...
28,110,989 UART:
28,111,161 UART: [state] CFI Enabled
28,170,943 UART: [state] LifecycleState = Unprovisioned
28,172,816 UART: [state] DebugLocked = No
28,174,468 UART: [state] WD Timer not started. Device not locked for debugging
28,177,405 UART: [kat] SHA2-256
28,356,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,368,098 UART: [kat] ++
28,368,562 UART: [kat] sha1
28,379,987 UART: [kat] SHA2-256
28,382,997 UART: [kat] SHA2-384
28,389,599 UART: [kat] SHA2-512-ACC
28,392,553 UART: [kat] ECC-384
30,856,701 UART: [kat] HMAC-384Kdf
30,877,200 UART: [kat] LMS
31,406,645 UART: [kat] --
31,410,716 UART: [update-reset] ++
34,406,859 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,410,394 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,668,617 >>> mbox cmd response: success
34,668,974 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,669,630 UART: [update-reset] Copying MAN_2 To MAN_1
34,691,957 UART: [update-reset Success] --
34,694,905 UART: [state] Locking Datavault
34,698,371 UART: [state] Locking PCR0, PCR1 and PCR31
34,700,020 UART: [state] Locking ICCM
34,701,930 UART: [exit] Launching FMC @ 0x40000130
34,710,366 UART:
34,710,611 UART: Running Caliptra FMC ...
34,711,635 UART:
34,711,782 UART: [state] CFI Enabled
34,813,027 UART: [art] Extend RT PCRs Done
34,814,223 UART: [art] Lock RT PCRs Done
34,815,548 UART: [art] Populate DV Done
34,820,794 UART: [fht] FMC Alias Private Key: 7
34,822,328 UART: [art] Derive CDI
34,823,086 UART: [art] Store in in slot 0x4
34,881,998 UART: [art] Derive Key Pair
34,883,036 UART: [art] Store priv key in slot 0x5
37,345,785 UART: [art] Derive Key Pair - Done
37,358,634 UART: [art] Signing Cert with AUTHO
37,359,930 UART: RITY.KEYID = 7
39,072,294 UART: [art] Erasing AUTHORITY.KEYID = 7
39,073,805 UART: [art] PUB.X = 8EC049EB3F0FA1EF1E4FC424E9FA52CEC3B81ECDDD4A6312487B2998A3A7D267A75838D6B94678ADCA4BB299F9CC67A8
39,081,066 UART: [art] PUB.Y = A04DB672929A2531641E1C69327A2B5E74791E963B60605987B2E5C07D433461CAAF80C231121CB6E373751C40A3A7B0
39,088,310 UART: [art] SIG.R = F780D9ED5EC566FFFD3BCEF9DAC48A982F99EDF6B61629578A2954327F717408E048675EB9B68F923177BE5EF4EC4EF3
39,095,704 UART: [art] SIG.S = 6F2F44583B1CC8E25512C2BB7EC5861B134C6D63375E49866FA6D61D30760548F0EF304E8D2ED2A6EE2493F40FB66E48
40,074,582 UART: mbox::rt_entry...
40,075,545 UART: ____ _ _ _ ____ _____
40,077,535 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,079,541 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,081,474 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,083,404 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,085,333 UART: |_|
40,086,175 UART:
40,369,122 UART: [rt] Runtime listening for mailbox commands...
40,371,235 >>> mbox cmd response data (48 bytes)
40,371,817 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,374,168 >>> mbox cmd response data (48 bytes)
40,375,032 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,387,600 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,382,059 ready_for_fw is high
3,382,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,093,209 >>> mbox cmd response: success
18,391,555 UART:
18,391,955 UART: Running Caliptra FMC ...
18,393,157 UART:
18,393,325 UART: [state] CFI Enabled
18,460,849 UART: [fht] FMC Alias Private Key: 7
20,224,808 UART: [art] Extend RT PCRs Done
20,226,030 UART: [art] Lock RT PCRs Done
20,227,926 UART: [art] Populate DV Done
20,233,556 UART: [fht] FMC Alias Private Key: 7
20,235,094 UART: [art] Derive CDI
20,235,931 UART: [art] Store in in slot 0x4
20,293,145 UART: [art] Derive Key Pair
20,294,185 UART: [art] Store priv key in slot 0x5
22,756,875 UART: [art] Derive Key Pair - Done
22,770,214 UART: [art] Signing Cert with AUTHO
22,771,522 UART: RITY.KEYID = 7
24,481,787 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,289 UART: [art] PUB.X = 9B5EF1F015EC01FC2F26927A26F665BF1508CE7FF28EB6C875992A122192F1013FDEC81C794F9A169B2C1E484B41A8F1
24,490,538 UART: [art] PUB.Y = E521267630A246F14FE7968370A9B0DF7993506D9EE68C7E2F3686007D80437728EC4F48EB96A3B8FC4652966F477F8E
24,497,756 UART: [art] SIG.R = 5175A8079C3D319D96CFE0C814780EB95CA1713B0E770404B64B2AEA543D8AA436337EC7C27B7CCA2F2942F3E4D94E07
24,505,157 UART: [art] SIG.S = C9FE7A4ADF8E879901873E57CDAABA816A1DE7059B8AD0FA008F845BE9394CEEA88CAB721547B81BD2036C7F08F001B7
25,483,209 UART: Caliptra RT
25,483,903 UART: [state] CFI Enabled
25,649,836 UART: [rt] RT listening for mailbox commands...
25,652,123 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,683,489 UART: [rt]cmd =0x41545348, len=116
25,685,691 >>> mbox cmd response data (12 bytes)
27,735,668 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,230,116 >>> mbox cmd response: success
34,230,580 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,265,818 UART:
34,266,109 UART: Running Caliptra FMC ...
34,267,229 UART:
34,267,392 UART: [state] CFI Enabled
34,366,838 UART: [art] Extend RT PCRs Done
34,368,040 UART: [art] Lock RT PCRs Done
34,369,297 UART: [art] Populate DV Done
34,374,771 UART: [fht] FMC Alias Private Key: 7
34,376,380 UART: [art] Derive CDI
34,377,193 UART: [art] Store in in slot 0x4
34,435,848 UART: [art] Derive Key Pair
34,436,885 UART: [art] Store priv key in slot 0x5
36,900,136 UART: [art] Derive Key Pair - Done
36,912,870 UART: [art] Signing Cert with AUTHO
36,914,201 UART: RITY.KEYID = 7
38,625,540 UART: [art] Erasing AUTHORITY.KEYID = 7
38,627,054 UART: [art] PUB.X = 606036328A9277D7E9DEC76434E090DB32BDE400C48DC4D44166DF78130B45FE0185AFE07E71E104888420E4C3D2B4AF
38,634,312 UART: [art] PUB.Y = D10DFBFA88A548382A7F6C735D3A575A6FDA2963882B182E32AB62118B212CD065A3E464D97FC73B5A48CE43CCCCAAB8
38,641,555 UART: [art] SIG.R = 5C5668215E75C599FEF5B223C4550B4E6E75E9674604DECA5D37D881132F2D3063DE5D02BDD1876B322F8A921CD6073F
38,648,947 UART: [art] SIG.S = F1FDD0BCAD0D5E8C6CD0F5C8F4340F0C1B8F0C56E3F1630531061B04496822FF0305C532C22F8E7C73B0344A1738F5FF
39,627,728 UART: mbox::rt_entry...
39,628,673 UART: ____ _ _ _ ____ _____
39,630,757 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,632,784 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,634,743 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,636,679 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,638,533 UART: |_|
39,639,334 UART:
39,924,057 UART: [rt] Runtime listening for mailbox commands...
39,926,219 >>> mbox cmd response data (48 bytes)
39,926,798 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,929,118 >>> mbox cmd response data (48 bytes)
39,929,981 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,942,532 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,352 UART:
192,726 UART: Running Caliptra ROM ...
193,828 UART:
603,578 UART: [state] CFI Enabled
615,112 UART: [state] LifecycleState = Unprovisioned
616,973 UART: [state] DebugLocked = No
619,758 UART: [state] WD Timer not started. Device not locked for debugging
622,857 UART: [kat] SHA2-256
802,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,566 UART: [kat] ++
814,012 UART: [kat] sha1
825,277 UART: [kat] SHA2-256
828,319 UART: [kat] SHA2-384
835,096 UART: [kat] SHA2-512-ACC
838,031 UART: [kat] ECC-384
3,280,652 UART: [kat] HMAC-384Kdf
3,293,947 UART: [kat] LMS
3,823,392 UART: [kat] --
3,829,578 UART: [cold-reset] ++
3,830,510 UART: [fht] FHT @ 0x50003400
3,840,909 UART: [idev] ++
3,841,464 UART: [idev] CDI.KEYID = 6
3,842,486 UART: [idev] SUBJECT.KEYID = 7
3,843,578 UART: [idev] UDS.KEYID = 0
3,844,616 ready_for_fw is high
3,844,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,491 UART: [idev] Erasing UDS.KEYID = 0
6,310,917 UART: [idev] Sha1 KeyId Algorithm
6,335,280 UART: [idev] --
6,338,345 UART: [ldev] ++
6,338,942 UART: [ldev] CDI.KEYID = 6
6,339,855 UART: [ldev] SUBJECT.KEYID = 5
6,341,008 UART: [ldev] AUTHORITY.KEYID = 7
6,342,236 UART: [ldev] FE.KEYID = 1
6,355,787 UART: [ldev] Erasing FE.KEYID = 1
8,829,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,667 UART: [ldev] --
10,622,865 UART: [fwproc] Wait for Commands...
10,625,986 UART: [fwproc] Recv command 0x46574c44
10,628,092 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,390 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,498,028 >>> mbox cmd response: success
14,502,896 UART: [afmc] ++
14,503,490 UART: [afmc] CDI.KEYID = 6
14,504,396 UART: [afmc] SUBJECT.KEYID = 7
14,505,550 UART: [afmc] AUTHORITY.KEYID = 5
17,004,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,396 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,267 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,497 UART: [afmc] --
18,803,050 UART: [cold-reset] --
18,808,219 UART: [state] Locking Datavault
18,814,113 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,807 UART: [state] Locking ICCM
18,817,522 UART: [exit] Launching FMC @ 0x40000130
18,825,934 UART:
18,826,180 UART: Running Caliptra FMC ...
18,827,397 UART:
18,827,553 UART: [state] CFI Enabled
18,835,321 UART: [fht] FMC Alias Private Key: 7
20,592,042 UART: [art] Extend RT PCRs Done
20,593,261 UART: [art] Lock RT PCRs Done
20,595,174 UART: [art] Populate DV Done
20,600,473 UART: [fht] FMC Alias Private Key: 7
20,601,949 UART: [art] Derive CDI
20,602,677 UART: [art] Store in in slot 0x4
20,645,657 UART: [art] Derive Key Pair
20,646,653 UART: [art] Store priv key in slot 0x5
23,073,619 UART: [art] Derive Key Pair - Done
23,086,618 UART: [art] Signing Cert with AUTHO
23,087,925 UART: RITY.KEYID = 7
24,793,773 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,277 UART: [art] PUB.X = FCB22DC03C94B0D4DDA42E11B766BF34D6A14986422AD0ECFE903FACDA4DA5C2C8A5035352A15F8F55BB24E87AC9E301
24,802,564 UART: [art] PUB.Y = 1A5A9B51F0EED94B829EBA4256CD31E06A9B03A3CF8DC38BB7E09706FC1D016073EBE7E373E498BE2AEA44F595FD542E
24,809,882 UART: [art] SIG.R = 8BF9D72E40BFA6B14A9B51BF89DCFDE2B4EACC2987C8A30C8F81189656D7FB5BAA4A466623A646AEF53C0C0611B770FE
24,817,337 UART: [art] SIG.S = 30042EC36CF8C17E2F116414B4650664D39C30C9C8FC3F37E8EDFE354CFDED658B3C2E9DEEA99D4D917F591F673227D6
25,796,509 UART: Caliptra RT
25,797,213 UART: [state] CFI Enabled
25,914,025 UART: [rt] RT listening for mailbox commands...
25,916,343 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,946,990 UART: [rt]cmd =0x41545348, len=116
25,948,833 >>> mbox cmd response data (12 bytes)
28,001,020 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,102,201 UART:
28,102,574 UART: Running Caliptra ROM ...
28,103,712 UART:
28,103,878 UART: [state] CFI Enabled
28,119,164 UART: [state] LifecycleState = Unprovisioned
28,121,057 UART: [state] DebugLocked = No
28,123,997 UART: [state] WD Timer not started. Device not locked for debugging
28,127,942 UART: [kat] SHA2-256
28,307,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,318,690 UART: [kat] ++
28,319,223 UART: [kat] sha1
28,328,959 UART: [kat] SHA2-256
28,331,974 UART: [kat] SHA2-384
28,338,550 UART: [kat] SHA2-512-ACC
28,341,471 UART: [kat] ECC-384
30,782,697 UART: [kat] HMAC-384Kdf
30,796,444 UART: [kat] LMS
31,325,946 UART: [kat] --
31,329,281 UART: [update-reset] ++
34,326,695 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,330,556 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,588,756 >>> mbox cmd response: success
34,589,114 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,589,711 UART: [update-reset] Copying MAN_2 To MAN_1
34,612,084 UART: [update-reset Success] --
34,616,313 UART: [state] Locking Datavault
34,619,290 UART: [state] Locking PCR0, PCR1 and PCR31
34,620,949 UART: [state] Locking ICCM
34,622,127 UART: [exit] Launching FMC @ 0x40000130
34,630,576 UART:
34,630,804 UART: Running Caliptra FMC ...
34,631,895 UART:
34,632,042 UART: [state] CFI Enabled
34,675,997 UART: [art] Extend RT PCRs Done
34,677,178 UART: [art] Lock RT PCRs Done
34,678,626 UART: [art] Populate DV Done
34,683,918 UART: [fht] FMC Alias Private Key: 7
34,685,553 UART: [art] Derive CDI
34,686,356 UART: [art] Store in in slot 0x4
34,728,724 UART: [art] Derive Key Pair
34,729,718 UART: [art] Store priv key in slot 0x5
37,156,750 UART: [art] Derive Key Pair - Done
37,169,897 UART: [art] Signing Cert with AUTHO
37,171,211 UART: RITY.KEYID = 7
38,876,301 UART: [art] Erasing AUTHORITY.KEYID = 7
38,877,814 UART: [art] PUB.X = 407682F833DA5AC0DA21163F20DCC31802726927AF1783BB4B7D445795A9DD5DD3D97E87783986061CA2EF3C1781A27A
38,885,056 UART: [art] PUB.Y = 1B1D1F716D13A89E1C72371ACA9D0B90E3849300614700DE1E306C6DC2D0725A179820D365E3C4C4921E5320F8658461
38,892,292 UART: [art] SIG.R = 9763EF7B1C2C9161D7896B79BB5E0D5FE763945324873BEB60287BAAF622AA46D1D823EECDB3F61144E5AF4F337A53C0
38,899,713 UART: [art] SIG.S = C53BFB40DB3A7EE71B1999300E2D49E8BFD835DD0D56D361D9033000FD3EE4ED7C78B74D09A607E0436BA442FB04C8F2
39,878,389 UART: mbox::rt_entry...
39,879,358 UART: ____ _ _ _ ____ _____
39,881,288 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,883,291 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,885,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,887,137 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,889,057 UART: |_|
39,889,860 UART:
40,171,362 UART: [rt] Runtime listening for mailbox commands...
40,173,527 >>> mbox cmd response data (48 bytes)
40,174,131 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,176,792 >>> mbox cmd response data (48 bytes)
40,177,704 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,190,252 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,699,567 ready_for_fw is high
3,699,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,263,624 >>> mbox cmd response: success
18,509,931 UART:
18,510,312 UART: Running Caliptra FMC ...
18,511,406 UART:
18,511,552 UART: [state] CFI Enabled
18,519,468 UART: [fht] FMC Alias Private Key: 7
20,276,477 UART: [art] Extend RT PCRs Done
20,277,700 UART: [art] Lock RT PCRs Done
20,279,458 UART: [art] Populate DV Done
20,284,862 UART: [fht] FMC Alias Private Key: 7
20,286,399 UART: [art] Derive CDI
20,287,131 UART: [art] Store in in slot 0x4
20,329,824 UART: [art] Derive Key Pair
20,330,817 UART: [art] Store priv key in slot 0x5
22,757,368 UART: [art] Derive Key Pair - Done
22,770,421 UART: [art] Signing Cert with AUTHO
22,771,726 UART: RITY.KEYID = 7
24,477,087 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,599 UART: [art] PUB.X = DE17E53265BD2A14A873F4B2E570811DC58051F2123D6BF83152298F442580EE8AF0A27C53B9288C5F6712DAE8F63E90
24,485,834 UART: [art] PUB.Y = 96FA8A9D3BEED9E0C22181A95124EE9AC9F9CB28843696948E23AC78994D8085E914A38512020AB242B41F2CEED50BDD
24,493,097 UART: [art] SIG.R = 00994D4C656AFBC40101545CD074C78D70D86167B083B288A895521F06827BB1DA231910F63A60BCE5B0815E2F593870
24,500,446 UART: [art] SIG.S = 330577AF367F609E3FB8295FD58BB87A35473CA2EE0F372838A7F998140CF4340611DF200DE291C7BF3340BF252F486D
25,479,108 UART: Caliptra RT
25,479,828 UART: [state] CFI Enabled
25,596,835 UART: [rt] RT listening for mailbox commands...
25,599,071 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,629,818 UART: [rt]cmd =0x41545348, len=116
25,632,423 >>> mbox cmd response data (12 bytes)
27,682,473 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,132,827 >>> mbox cmd response: success
34,133,255 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,165,998 UART:
34,166,286 UART: Running Caliptra FMC ...
34,167,333 UART:
34,167,477 UART: [state] CFI Enabled
34,211,940 UART: [art] Extend RT PCRs Done
34,213,129 UART: [art] Lock RT PCRs Done
34,214,710 UART: [art] Populate DV Done
34,220,017 UART: [fht] FMC Alias Private Key: 7
34,221,502 UART: [art] Derive CDI
34,222,264 UART: [art] Store in in slot 0x4
34,265,281 UART: [art] Derive Key Pair
34,266,279 UART: [art] Store priv key in slot 0x5
36,693,262 UART: [art] Derive Key Pair - Done
36,706,420 UART: [art] Signing Cert with AUTHO
36,707,723 UART: RITY.KEYID = 7
38,413,190 UART: [art] Erasing AUTHORITY.KEYID = 7
38,414,699 UART: [art] PUB.X = BE22484789CD837C11FDB2FEDD89A729F498721847595FE1EE44DAED3B871B2229057F85CC62C8236EBF4D41CF0FED46
38,421,997 UART: [art] PUB.Y = 4103D760625A1FF2B012F307AA2C807AC96B90E29732E9E41337D1F0563025221932E3EA7539E8551EF26975280190CE
38,429,244 UART: [art] SIG.R = 658AD438E54B919D5C9689F40DB69408323F8700E9BF02C828874222A5961166970D569BF2813B5E5F02143E53EDC3AD
38,436,623 UART: [art] SIG.S = 1382FAC1DB9C711551CC78E92AFBB699D416A39F4EBB661867F754BA1032CB65573EE1E308F79E046B974FC01AABC91F
39,415,481 UART: mbox::rt_entry...
39,416,421 UART: ____ _ _ _ ____ _____
39,418,342 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,420,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,422,180 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,424,095 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,425,977 UART: |_|
39,426,796 UART:
39,711,613 UART: [rt] Runtime listening for mailbox commands...
39,714,143 >>> mbox cmd response data (48 bytes)
39,714,704 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,717,024 >>> mbox cmd response data (48 bytes)
39,717,894 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,730,438 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,437,582 ready_for_fw is high
3,438,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,742,146 >>> mbox cmd response: success
19,045,576 UART:
19,045,965 UART: Running Caliptra FMC ...
19,047,161 UART:
19,047,337 UART: [state] CFI Enabled
19,115,601 UART: [fht] FMC Alias Private Key: 7
20,879,070 UART: [art] Extend RT PCRs Done
20,880,310 UART: [art] Lock RT PCRs Done
20,882,111 UART: [art] Populate DV Done
20,887,377 UART: [fht] FMC Alias Private Key: 7
20,889,117 UART: [art] Derive CDI
20,889,940 UART: [art] Store in in slot 0x4
20,948,659 UART: [art] Derive Key Pair
20,949,652 UART: [art] Store priv key in slot 0x5
23,413,095 UART: [art] Derive Key Pair - Done
23,426,199 UART: [art] Signing Cert with AUTHO
23,427,498 UART: RITY.KEYID = 7
25,138,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,177 UART: [art] PUB.X = 9E2635368F90F84F6D72E2EF83689B38A68B6E9C037A7A6A1DCE88415F4251942CC9899833EFCE5529C9EB63113FC6AC
25,147,421 UART: [art] PUB.Y = 63DABAD3588CC6CDE4882C08F7F284C046BE74111CB0DE346434582ECCE647CC6223C0056CBEBCBB845C3F93F36A1A5A
25,154,680 UART: [art] SIG.R = 752801D9543A0C093DBD9F7B2B006C3F452BA2F962BFED978C9C973CF85BD28FD33A964F6311018D33CDCF66842AFC5B
25,162,070 UART: [art] SIG.S = D735EC10690046C1726434EE7917C2DA37FE12B199DAD46E218198B6B6614E8D93C62E54049E93C2C676AF51E833D933
26,141,388 UART: Caliptra RT
26,142,099 UART: [state] CFI Enabled
26,307,906 UART: [rt] RT listening for mailbox commands...
26,310,222 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,341,423 UART: [rt]cmd =0x41545348, len=116
26,343,831 >>> mbox cmd response data (12 bytes)
28,392,052 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,406,129 >>> mbox cmd response: success
35,406,601 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,440,216 UART:
35,440,492 UART: Running Caliptra FMC ...
35,441,609 UART:
35,441,766 UART: [state] CFI Enabled
35,546,322 UART: [art] Extend RT PCRs Done
35,547,542 UART: [art] Lock RT PCRs Done
35,548,790 UART: [art] Populate DV Done
35,554,169 UART: [fht] FMC Alias Private Key: 7
35,555,720 UART: [art] Derive CDI
35,556,457 UART: [art] Store in in slot 0x4
35,616,083 UART: [art] Derive Key Pair
35,617,130 UART: [art] Store priv key in slot 0x5
38,079,888 UART: [art] Derive Key Pair - Done
38,093,318 UART: [art] Signing Cert with AUTHO
38,094,656 UART: RITY.KEYID = 7
39,805,539 UART: [art] Erasing AUTHORITY.KEYID = 7
39,807,042 UART: [art] PUB.X = D92370DC7154F084F82BF9ACEE07F7EE387D9C1CD34106E92C384469EE2A3DA93859A5AA3D1CBB04E426313735059E96
39,814,352 UART: [art] PUB.Y = 7E4AB4AE30BF664187BFDBD930BDEFBBC3985522621C1744F8EA35D93F1CF350D0D3D231A6A94AD00F5B9096A4CCAD14
39,821,579 UART: [art] SIG.R = D30C633DD95733397612D2EF1DA790C16AFEF53FEFB595EA0851C8710FD74CA5A246023B25286B704C42427CA941AD22
39,828,967 UART: [art] SIG.S = 578F9AF3689F9EA365ABDEBF653BA6F095CD79204FB6D572093ABBB86856F5DD3CC0F7FE03833213295263E4C40E545F
40,807,465 UART: mbox::rt_entry...
40,808,412 UART: ____ _ _ _ ____ _____
40,810,343 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,812,347 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,814,277 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,816,207 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,818,132 UART: |_|
40,818,941 UART:
41,102,676 UART: [rt] Runtime listening for mailbox commands...
41,104,824 >>> mbox cmd response data (48 bytes)
41,105,388 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,107,717 >>> mbox cmd response data (48 bytes)
41,108,582 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,121,129 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,757,920 ready_for_fw is high
3,758,469 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,749 >>> mbox cmd response: success
19,215,314 UART:
19,215,709 UART: Running Caliptra FMC ...
19,216,837 UART:
19,216,988 UART: [state] CFI Enabled
19,224,719 UART: [fht] FMC Alias Private Key: 7
20,981,478 UART: [art] Extend RT PCRs Done
20,982,699 UART: [art] Lock RT PCRs Done
20,984,175 UART: [art] Populate DV Done
20,989,329 UART: [fht] FMC Alias Private Key: 7
20,990,983 UART: [art] Derive CDI
20,991,796 UART: [art] Store in in slot 0x4
21,034,402 UART: [art] Derive Key Pair
21,035,443 UART: [art] Store priv key in slot 0x5
23,462,095 UART: [art] Derive Key Pair - Done
23,475,046 UART: [art] Signing Cert with AUTHO
23,476,339 UART: RITY.KEYID = 7
25,181,761 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,271 UART: [art] PUB.X = E82AB710F0BFB5F4042EDCD2CC8775030AE3F09764449D67D81200517479977A7EBEBB84F3D821EE75CD23AF653304D1
25,190,502 UART: [art] PUB.Y = 864A1DF7C111F1772326703C737957DBEA151C9F4726CA0CA4CD993434B3D37360BE44C26FB1CA0D162925FFEF97958F
25,197,782 UART: [art] SIG.R = E5753DA9021B1FD106DA2FD65B8E1B57C200D528C910F2018EB78D5E19EC3E9110F76C984A233BBDF2A5AB731F267D04
25,205,148 UART: [art] SIG.S = 2414596DDBCD229E3C119F390349E513AA06611DCC015041E945A6893BA2B1A52CAE52933CB00D6D3BE6DEC06E3E1203
26,184,215 UART: Caliptra RT
26,184,905 UART: [state] CFI Enabled
26,301,406 UART: [rt] RT listening for mailbox commands...
26,303,724 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,334,475 UART: [rt]cmd =0x41545348, len=116
26,336,734 >>> mbox cmd response data (12 bytes)
28,394,576 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,326,432 >>> mbox cmd response: success
35,326,936 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,361,896 UART:
35,362,219 UART: Running Caliptra FMC ...
35,363,340 UART:
35,363,494 UART: [state] CFI Enabled
35,407,020 UART: [art] Extend RT PCRs Done
35,408,182 UART: [art] Lock RT PCRs Done
35,409,589 UART: [art] Populate DV Done
35,414,966 UART: [fht] FMC Alias Private Key: 7
35,416,599 UART: [art] Derive CDI
35,417,416 UART: [art] Store in in slot 0x4
35,460,010 UART: [art] Derive Key Pair
35,461,006 UART: [art] Store priv key in slot 0x5
37,887,591 UART: [art] Derive Key Pair - Done
37,900,691 UART: [art] Signing Cert with AUTHO
37,902,028 UART: RITY.KEYID = 7
39,607,220 UART: [art] Erasing AUTHORITY.KEYID = 7
39,608,722 UART: [art] PUB.X = E211F8381AF814D6849DF848AB0FA5AC5CE083D9297F905AE46441D37CE6AF0AE96A6EBA88FC90BDA908DF381690EF44
39,615,972 UART: [art] PUB.Y = B0758502EBA665D3D9D169495FF647CC12C069E161D64BEE1A46161EA2A11B6706E89D95E49AB71250E49E908A864AF7
39,623,256 UART: [art] SIG.R = 75D0A7AE247D26E9ACA424C90F9758394E881ADC28819293C28C11E210F66DDCC5C4E0F1828C3720A952D689F4D2C275
39,630,639 UART: [art] SIG.S = 7F5EADB480D60BCE0E37A2131879E85277FF25371AF05A2B294C96B8536D782819BEA809B7550560F79B14732E71E9B1
40,609,412 UART: mbox::rt_entry...
40,610,379 UART: ____ _ _ _ ____ _____
40,612,357 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,614,356 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,616,478 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,618,419 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,620,341 UART: |_|
40,621,141 UART:
40,907,983 UART: [rt] Runtime listening for mailbox commands...
40,910,137 >>> mbox cmd response data (48 bytes)
40,910,708 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,913,025 >>> mbox cmd response data (48 bytes)
40,913,911 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,926,456 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,145 UART: [kat] SHA2-256
882,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,191 UART: [kat] ++
886,343 UART: [kat] sha1
890,517 UART: [kat] SHA2-256
892,455 UART: [kat] SHA2-384
895,264 UART: [kat] SHA2-512-ACC
897,165 UART: [kat] ECC-384
902,644 UART: [kat] HMAC-384Kdf
907,354 UART: [kat] LMS
1,475,550 UART: [kat] --
1,476,377 UART: [cold-reset] ++
1,476,831 UART: [fht] Storing FHT @ 0x50003400
1,479,662 UART: [idev] ++
1,479,830 UART: [idev] CDI.KEYID = 6
1,480,190 UART: [idev] SUBJECT.KEYID = 7
1,480,614 UART: [idev] UDS.KEYID = 0
1,480,959 ready_for_fw is high
1,480,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,360 UART: [idev] Erasing UDS.KEYID = 0
1,505,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,564 UART: [idev] --
1,514,717 UART: [ldev] ++
1,514,885 UART: [ldev] CDI.KEYID = 6
1,515,248 UART: [ldev] SUBJECT.KEYID = 5
1,515,674 UART: [ldev] AUTHORITY.KEYID = 7
1,516,137 UART: [ldev] FE.KEYID = 1
1,521,351 UART: [ldev] Erasing FE.KEYID = 1
1,546,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,692 UART: [ldev] --
1,585,993 UART: [fwproc] Waiting for Commands...
1,586,794 UART: [fwproc] Received command 0x46574c44
1,587,585 UART: [fwproc] Received Image of size 114448 bytes
2,887,338 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,220 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,572 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,689 >>> mbox cmd response: success
3,080,915 UART: [afmc] ++
3,081,083 UART: [afmc] CDI.KEYID = 6
3,081,445 UART: [afmc] SUBJECT.KEYID = 7
3,081,870 UART: [afmc] AUTHORITY.KEYID = 5
3,117,149 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,065 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,845 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,573 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,458 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,148 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,047 UART: [afmc] --
3,160,063 UART: [cold-reset] --
3,160,827 UART: [state] Locking Datavault
3,162,126 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,730 UART: [state] Locking ICCM
3,163,298 UART: [exit] Launching FMC @ 0x40000130
3,168,627 UART:
3,168,643 UART: Running Caliptra FMC ...
3,169,051 UART:
3,169,105 UART: [state] CFI Enabled
3,179,678 UART: [fht] FMC Alias Private Key: 7
3,287,477 UART: [art] Extend RT PCRs Done
3,287,905 UART: [art] Lock RT PCRs Done
3,289,413 UART: [art] Populate DV Done
3,297,748 UART: [fht] FMC Alias Private Key: 7
3,298,830 UART: [art] Derive CDI
3,299,110 UART: [art] Store in in slot 0x4
3,384,773 UART: [art] Derive Key Pair
3,385,133 UART: [art] Store priv key in slot 0x5
3,398,321 UART: [art] Derive Key Pair - Done
3,412,752 UART: [art] Signing Cert with AUTHO
3,413,232 UART: RITY.KEYID = 7
3,428,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,935 UART: [art] PUB.X = 9E97EA20EC78CA8A6162E6BBAFB1127DD9D1139CD908F13F8CAAD716B11488A785A6FA16150632950610B60396FFA632
3,435,699 UART: [art] PUB.Y = A631C1E1177895C2320025660829836EC1404EF8FEEFBF1260B089B8283E491A21B36EECB2DCCD5A2D70660D6E1C108F
3,442,625 UART: [art] SIG.R = 38D847FCE657939A146A9C8724FDD7BA86477488BD2D548DE60FDEC9C6B43E0900E32745DB72E6448D83837A674D1702
3,449,364 UART: [art] SIG.S = 6AE7D4276D2157C068767AB499ADD05303F9EE224B79C2F3C23F9F61085D0F39CC2F362ED116251F6B41F0A953337E68
3,473,094 UART: Caliptra RT
3,473,347 UART: [state] CFI Enabled
3,581,765 UART: [rt] RT listening for mailbox commands...
3,582,435 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,995 UART: [rt]cmd =0x41545348, len=116
3,614,717 >>> mbox cmd response data (12 bytes)
3,614,718 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,580 UART:
3,615,596 UART: Running Caliptra ROM ...
3,616,004 UART:
3,616,058 UART: [state] CFI Enabled
3,619,042 UART: [state] LifecycleState = Unprovisioned
3,619,697 UART: [state] DebugLocked = No
3,620,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,894 UART: [kat] SHA2-256
4,415,825 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,940 UART: [kat] ++
4,420,092 UART: [kat] sha1
4,424,320 UART: [kat] SHA2-256
4,426,258 UART: [kat] SHA2-384
4,428,849 UART: [kat] SHA2-512-ACC
4,430,749 UART: [kat] ECC-384
4,436,032 UART: [kat] HMAC-384Kdf
4,440,794 UART: [kat] LMS
5,008,990 UART: [kat] --
5,010,051 UART: [update-reset] ++
5,938,257 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,939,335 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,035,769 >>> mbox cmd response: success
6,035,769 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,035,932 UART: [update-reset] Copying MAN_2 To MAN_1
6,043,946 UART: [update-reset Success] --
6,045,211 UART: [state] Locking Datavault
6,046,081 UART: [state] Locking PCR0, PCR1 and PCR31
6,046,685 UART: [state] Locking ICCM
6,047,255 UART: [exit] Launching FMC @ 0x40000130
6,052,584 UART:
6,052,600 UART: Running Caliptra FMC ...
6,053,008 UART:
6,053,062 UART: [state] CFI Enabled
6,141,955 UART: [art] Extend RT PCRs Done
6,142,383 UART: [art] Lock RT PCRs Done
6,143,818 UART: [art] Populate DV Done
6,152,147 UART: [fht] FMC Alias Private Key: 7
6,153,261 UART: [art] Derive CDI
6,153,541 UART: [art] Store in in slot 0x4
6,238,798 UART: [art] Derive Key Pair
6,239,158 UART: [art] Store priv key in slot 0x5
6,252,456 UART: [art] Derive Key Pair - Done
6,267,300 UART: [art] Signing Cert with AUTHO
6,267,780 UART: RITY.KEYID = 7
6,282,616 UART: [art] Erasing AUTHORITY.KEYID = 7
6,283,381 UART: [art] PUB.X = A5CA91E75883A380C3ABC47AB281BD84A275DF87558F649B0BDE571B91E77AFE6B12D03514AEE6000561A86BD991EF1E
6,290,135 UART: [art] PUB.Y = 101003329D0943CCD8755562CF8F46331D437CD698EBB61C4254E435C4200955B096433DFBF24EE4E1D291D23A7141C9
6,297,070 UART: [art] SIG.R = 282C143CB926C6E6C57CE3834BEAD5BC47FD20F894E637812520CE3D82717E888B0CD4FEE02909CF6A4BC44E8254E24A
6,303,844 UART: [art] SIG.S = 3707CFFC1D7FD1E43D708716A97D55BD63766906B5D87798B86BD900AE31BF07A502F017FCE1193CC6A78FC74EE6830A
6,327,156 UART: mbox::rt_entry...
6,327,528 UART: ____ _ _ _ ____ _____
6,328,312 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,329,112 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,329,880 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,330,648 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,331,416 UART: |_|
6,331,728 UART:
6,608,101 UART: [rt] Runtime listening for mailbox commands...
6,609,291 >>> mbox cmd response data (48 bytes)
6,609,292 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,612,075 >>> mbox cmd response data (48 bytes)
6,612,076 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,625,014 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,297 ready_for_fw is high
1,362,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,155 >>> mbox cmd response: success
2,988,939 UART:
2,988,955 UART: Running Caliptra FMC ...
2,989,363 UART:
2,989,417 UART: [state] CFI Enabled
3,000,220 UART: [fht] FMC Alias Private Key: 7
3,108,135 UART: [art] Extend RT PCRs Done
3,108,563 UART: [art] Lock RT PCRs Done
3,109,991 UART: [art] Populate DV Done
3,118,230 UART: [fht] FMC Alias Private Key: 7
3,119,302 UART: [art] Derive CDI
3,119,582 UART: [art] Store in in slot 0x4
3,205,151 UART: [art] Derive Key Pair
3,205,511 UART: [art] Store priv key in slot 0x5
3,219,559 UART: [art] Derive Key Pair - Done
3,234,001 UART: [art] Signing Cert with AUTHO
3,234,481 UART: RITY.KEYID = 7
3,249,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,418 UART: [art] PUB.X = F91B5821CC09769906734CA7D1C204100E756FECE708AEF6B693E38350278DC30A8B4040D0F32457C59FE7AE90B6709B
3,257,170 UART: [art] PUB.Y = 8E9156624F211A2DB77D1BD1D374E9C22E60AFB739073B23D52F35355B5843DDF56777D4FC027D032DD9DA0D547B09F6
3,264,109 UART: [art] SIG.R = 317FB5E1A1ED519D08AD6A0A967B496C3B2D26F3C510688851355316D13196C9FF50417F654B5B5A4D58DE5A5731C911
3,270,871 UART: [art] SIG.S = 9001C8DA1AA49EE2D3856B62A88ED2347952E59589BAFD98655DBC30B044D1855D0D18547BF121962C1CE3A96E862396
3,295,356 UART: Caliptra RT
3,295,609 UART: [state] CFI Enabled
3,404,360 UART: [rt] RT listening for mailbox commands...
3,405,030 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,636 UART: [rt]cmd =0x41545348, len=116
3,437,734 >>> mbox cmd response data (12 bytes)
3,437,735 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,738,094 >>> mbox cmd response: success
5,738,094 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,751,095 UART:
5,751,111 UART: Running Caliptra FMC ...
5,751,519 UART:
5,751,573 UART: [state] CFI Enabled
5,840,382 UART: [art] Extend RT PCRs Done
5,840,810 UART: [art] Lock RT PCRs Done
5,841,819 UART: [art] Populate DV Done
5,849,950 UART: [fht] FMC Alias Private Key: 7
5,850,906 UART: [art] Derive CDI
5,851,186 UART: [art] Store in in slot 0x4
5,936,667 UART: [art] Derive Key Pair
5,937,027 UART: [art] Store priv key in slot 0x5
5,949,725 UART: [art] Derive Key Pair - Done
5,964,536 UART: [art] Signing Cert with AUTHO
5,965,016 UART: RITY.KEYID = 7
5,980,354 UART: [art] Erasing AUTHORITY.KEYID = 7
5,981,119 UART: [art] PUB.X = 8ADE7C5BD974020EAC1D55A68AEDD719FB06586EA65F28F6166E37D6CE7244F07CEDFF40E89C0E50016980D6B19CCDEF
5,987,894 UART: [art] PUB.Y = 4E7309B42DF462B1AE6439BA26B9112B125972DD89960DEB8263FCDF97B25F9EB2B2E7A5CC7119A0FE09355F528A85A0
5,994,843 UART: [art] SIG.R = AD8D6C1AC0622723EB8676F42EF078FA317AA934BF7A6A18AE16581953A5BF6856840E528C9B44B16EA8FC69AC5B91AF
6,001,622 UART: [art] SIG.S = 1CB9A799FD6ADC00DB980BF602CFBE8510BB56028BC18C87444A2FFCFEEDF2A6D44BE3AF365F48D444AF70CFAF2E63E3
6,025,514 UART: mbox::rt_entry...
6,025,886 UART: ____ _ _ _ ____ _____
6,026,670 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,027,470 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,028,238 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,029,006 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,029,774 UART: |_|
6,030,086 UART:
6,306,162 UART: [rt] Runtime listening for mailbox commands...
6,307,352 >>> mbox cmd response data (48 bytes)
6,307,353 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,310,136 >>> mbox cmd response data (48 bytes)
6,310,137 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,323,075 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,924 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,884 UART: [kat] SHA2-256
892,822 UART: [kat] SHA2-384
895,529 UART: [kat] SHA2-512-ACC
897,430 UART: [kat] ECC-384
902,819 UART: [kat] HMAC-384Kdf
907,405 UART: [kat] LMS
1,475,601 UART: [kat] --
1,476,492 UART: [cold-reset] ++
1,477,034 UART: [fht] Storing FHT @ 0x50003400
1,479,921 UART: [idev] ++
1,480,089 UART: [idev] CDI.KEYID = 6
1,480,449 UART: [idev] SUBJECT.KEYID = 7
1,480,873 UART: [idev] UDS.KEYID = 0
1,481,218 ready_for_fw is high
1,481,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,999 UART: [idev] Erasing UDS.KEYID = 0
1,505,383 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,809 UART: [idev] --
1,514,796 UART: [ldev] ++
1,514,964 UART: [ldev] CDI.KEYID = 6
1,515,327 UART: [ldev] SUBJECT.KEYID = 5
1,515,753 UART: [ldev] AUTHORITY.KEYID = 7
1,516,216 UART: [ldev] FE.KEYID = 1
1,521,354 UART: [ldev] Erasing FE.KEYID = 1
1,546,755 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,099 UART: [ldev] --
1,586,422 UART: [fwproc] Waiting for Commands...
1,587,065 UART: [fwproc] Received command 0x46574c44
1,587,856 UART: [fwproc] Received Image of size 114448 bytes
2,887,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,035 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,387 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,398 >>> mbox cmd response: success
3,080,510 UART: [afmc] ++
3,080,678 UART: [afmc] CDI.KEYID = 6
3,081,040 UART: [afmc] SUBJECT.KEYID = 7
3,081,465 UART: [afmc] AUTHORITY.KEYID = 5
3,116,474 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,401 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,091 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,910 UART: [afmc] --
3,159,916 UART: [cold-reset] --
3,160,952 UART: [state] Locking Datavault
3,161,971 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,575 UART: [state] Locking ICCM
3,163,049 UART: [exit] Launching FMC @ 0x40000130
3,168,378 UART:
3,168,394 UART: Running Caliptra FMC ...
3,168,802 UART:
3,168,945 UART: [state] CFI Enabled
3,179,544 UART: [fht] FMC Alias Private Key: 7
3,287,427 UART: [art] Extend RT PCRs Done
3,287,855 UART: [art] Lock RT PCRs Done
3,289,423 UART: [art] Populate DV Done
3,297,758 UART: [fht] FMC Alias Private Key: 7
3,298,826 UART: [art] Derive CDI
3,299,106 UART: [art] Store in in slot 0x4
3,384,875 UART: [art] Derive Key Pair
3,385,235 UART: [art] Store priv key in slot 0x5
3,398,515 UART: [art] Derive Key Pair - Done
3,413,189 UART: [art] Signing Cert with AUTHO
3,413,669 UART: RITY.KEYID = 7
3,429,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,784 UART: [art] PUB.X = 089AE0E43FC0AA8D99D439985BD175EA9FA5298B9B461B31EA294A170909CB2F490987B5BA1FDC85B78A3BF4DCFCB10B
3,436,557 UART: [art] PUB.Y = AA8BC89284F3191CD77162A9FBED645416A57BEB8138083151646566471FA3D88F1A86BE5C5D2FF3B573CD3FCBD2A472
3,443,512 UART: [art] SIG.R = 003E46120E8CA357E519E337D8E1D6DBA0DAD6FDDE2D61738A976C22B4D9180F9730529C078EE93DA5BE675304AEE401
3,450,253 UART: [art] SIG.S = 0CEEA5821F144250DFC1E7B6381DEB1D61910E10C3AC3F00782933C2DA54A2F2C44CF2A699809DF79FAFDE4702C77454
3,473,997 UART: Caliptra RT
3,474,342 UART: [state] CFI Enabled
3,582,409 UART: [rt] RT listening for mailbox commands...
3,583,079 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,609 UART: [rt]cmd =0x41545348, len=116
3,615,279 >>> mbox cmd response data (12 bytes)
3,615,280 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,182 UART:
3,616,198 UART: Running Caliptra ROM ...
3,616,606 UART:
3,616,747 UART: [state] CFI Enabled
3,619,917 UART: [state] LifecycleState = Unprovisioned
3,620,572 UART: [state] DebugLocked = No
3,621,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,622,983 UART: [kat] SHA2-256
4,416,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,421,029 UART: [kat] ++
4,421,181 UART: [kat] sha1
4,425,293 UART: [kat] SHA2-256
4,427,231 UART: [kat] SHA2-384
4,429,952 UART: [kat] SHA2-512-ACC
4,431,852 UART: [kat] ECC-384
4,437,469 UART: [kat] HMAC-384Kdf
4,442,059 UART: [kat] LMS
5,010,255 UART: [kat] --
5,010,760 UART: [update-reset] ++
5,937,322 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,938,608 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,035,042 >>> mbox cmd response: success
6,035,042 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,035,365 UART: [update-reset] Copying MAN_2 To MAN_1
6,043,379 UART: [update-reset Success] --
6,044,270 UART: [state] Locking Datavault
6,045,208 UART: [state] Locking PCR0, PCR1 and PCR31
6,045,812 UART: [state] Locking ICCM
6,046,256 UART: [exit] Launching FMC @ 0x40000130
6,051,585 UART:
6,051,601 UART: Running Caliptra FMC ...
6,052,009 UART:
6,052,152 UART: [state] CFI Enabled
6,141,125 UART: [art] Extend RT PCRs Done
6,141,553 UART: [art] Lock RT PCRs Done
6,142,770 UART: [art] Populate DV Done
6,150,951 UART: [fht] FMC Alias Private Key: 7
6,151,879 UART: [art] Derive CDI
6,152,159 UART: [art] Store in in slot 0x4
6,237,822 UART: [art] Derive Key Pair
6,238,182 UART: [art] Store priv key in slot 0x5
6,251,290 UART: [art] Derive Key Pair - Done
6,266,412 UART: [art] Signing Cert with AUTHO
6,266,892 UART: RITY.KEYID = 7
6,282,132 UART: [art] Erasing AUTHORITY.KEYID = 7
6,282,897 UART: [art] PUB.X = 03C0C44C9A3F37C41087D6C483CB531B0982644012F099B19385F63AB09E458B91F58E75013019B674D1C0DF8444904C
6,289,648 UART: [art] PUB.Y = 0D6824BBD282A356CC87A31B3AC0C3851ABAB7AC224262D939E170F64ACE12C3B5D9F06B0CFC09D3715DF7AC97A1C710
6,296,605 UART: [art] SIG.R = 1D16F9E36F586AB6D91CF34B885937937BBA91281B8ACC99FAAB6AE0D4620FB8D7F7A1FE719ADF53454CD22E82271A8C
6,303,388 UART: [art] SIG.S = F9455F08B068807F8E77F10A80928FE68676172E5D5F2D531145364AC6A90C8305B4EA5FBF441B0509FC8A9706317151
6,327,082 UART: mbox::rt_entry...
6,327,454 UART: ____ _ _ _ ____ _____
6,328,238 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,329,038 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,329,806 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,330,574 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,331,342 UART: |_|
6,331,654 UART:
6,614,746 UART: [rt] Runtime listening for mailbox commands...
6,615,936 >>> mbox cmd response data (48 bytes)
6,615,937 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,618,720 >>> mbox cmd response data (48 bytes)
6,618,721 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,631,659 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,820 ready_for_fw is high
1,362,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,926,988 >>> mbox cmd response: success
2,989,204 UART:
2,989,220 UART: Running Caliptra FMC ...
2,989,628 UART:
2,989,771 UART: [state] CFI Enabled
3,000,542 UART: [fht] FMC Alias Private Key: 7
3,108,649 UART: [art] Extend RT PCRs Done
3,109,077 UART: [art] Lock RT PCRs Done
3,110,575 UART: [art] Populate DV Done
3,118,782 UART: [fht] FMC Alias Private Key: 7
3,119,880 UART: [art] Derive CDI
3,120,160 UART: [art] Store in in slot 0x4
3,205,885 UART: [art] Derive Key Pair
3,206,245 UART: [art] Store priv key in slot 0x5
3,219,687 UART: [art] Derive Key Pair - Done
3,234,810 UART: [art] Signing Cert with AUTHO
3,235,290 UART: RITY.KEYID = 7
3,250,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,667 UART: [art] PUB.X = C051B6F21C721F4F924662ECFE327A2F92CA3F960406CEA6A5449764A0EC74012AF29FF6A3922358DA280669CEE02190
3,258,427 UART: [art] PUB.Y = 624049F90C336F5ABE753F72BA79ED76EBD7310E24E2ECBC906EB4CDF5607553B125B75D5DFA00F1946067B64EA1A5EC
3,265,363 UART: [art] SIG.R = C6E02731A0CBD3DD1840ADABD04F25860FC88C3C1A8218FA2DA6FCFBED046DFF042E38DEF4918855DB9010EECAEFC51C
3,272,154 UART: [art] SIG.S = 3C0003652E2E2C472EA759CF4920EE4D15146B3EB58C4607C6C4B5877B34CC6886F97D11DC7CD51275828AAD1E2BEAE0
3,295,837 UART: Caliptra RT
3,296,182 UART: [state] CFI Enabled
3,403,957 UART: [rt] RT listening for mailbox commands...
3,404,627 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,627 UART: [rt]cmd =0x41545348, len=116
3,437,257 >>> mbox cmd response data (12 bytes)
3,437,258 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,739,236 >>> mbox cmd response: success
5,739,236 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,752,535 UART:
5,752,551 UART: Running Caliptra FMC ...
5,752,959 UART:
5,753,102 UART: [state] CFI Enabled
5,842,937 UART: [art] Extend RT PCRs Done
5,843,365 UART: [art] Lock RT PCRs Done
5,844,392 UART: [art] Populate DV Done
5,852,481 UART: [fht] FMC Alias Private Key: 7
5,853,515 UART: [art] Derive CDI
5,853,795 UART: [art] Store in in slot 0x4
5,939,366 UART: [art] Derive Key Pair
5,939,726 UART: [art] Store priv key in slot 0x5
5,952,608 UART: [art] Derive Key Pair - Done
5,967,258 UART: [art] Signing Cert with AUTHO
5,967,738 UART: RITY.KEYID = 7
5,982,944 UART: [art] Erasing AUTHORITY.KEYID = 7
5,983,709 UART: [art] PUB.X = 07D9A19DDCDFA79EEE460076FCD37CCA79128E4F23DF3C3068E1BAAD77FCB8746C0FF15E007891C900D6C40FC6F5B545
5,990,424 UART: [art] PUB.Y = A7B0BBBECB945A2FF88220D320A367BC418A58DFB2EE22655B1A56850F8907E88DC2EA6DE2570C1FE768A83A7EEFFD12
5,997,385 UART: [art] SIG.R = 61B182DEA4B123114F7EACE1C9D69F2151E73B3D0CF6D810F4465F0E137C5278531E04F8A8C0580FCF79BC456D6468A9
6,004,149 UART: [art] SIG.S = 5A3362C129CB851F98C886ECA90076D8B82EA6CC718B28261067E280320102C7BFD8494C06A10987123695A09534C8F4
6,027,864 UART: mbox::rt_entry...
6,028,236 UART: ____ _ _ _ ____ _____
6,029,020 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,029,820 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,030,588 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,031,356 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,032,124 UART: |_|
6,032,436 UART:
6,315,011 UART: [rt] Runtime listening for mailbox commands...
6,316,201 >>> mbox cmd response data (48 bytes)
6,316,202 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,318,985 >>> mbox cmd response data (48 bytes)
6,318,986 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,331,924 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
893,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,821 UART: [kat] ++
897,973 UART: [kat] sha1
902,217 UART: [kat] SHA2-256
904,157 UART: [kat] SHA2-384
906,862 UART: [kat] SHA2-512-ACC
908,763 UART: [kat] ECC-384
918,244 UART: [kat] HMAC-384Kdf
922,872 UART: [kat] LMS
1,171,200 UART: [kat] --
1,172,183 UART: [cold-reset] ++
1,172,629 UART: [fht] FHT @ 0x50003400
1,175,362 UART: [idev] ++
1,175,530 UART: [idev] CDI.KEYID = 6
1,175,890 UART: [idev] SUBJECT.KEYID = 7
1,176,314 UART: [idev] UDS.KEYID = 0
1,176,659 ready_for_fw is high
1,176,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,416 UART: [idev] Erasing UDS.KEYID = 0
1,201,321 UART: [idev] Sha1 KeyId Algorithm
1,209,777 UART: [idev] --
1,210,741 UART: [ldev] ++
1,210,909 UART: [ldev] CDI.KEYID = 6
1,211,272 UART: [ldev] SUBJECT.KEYID = 5
1,211,698 UART: [ldev] AUTHORITY.KEYID = 7
1,212,161 UART: [ldev] FE.KEYID = 1
1,217,483 UART: [ldev] Erasing FE.KEYID = 1
1,244,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,485 UART: [ldev] --
1,283,808 UART: [fwproc] Wait for Commands...
1,284,630 UART: [fwproc] Recv command 0x46574c44
1,285,358 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,905 >>> mbox cmd response: success
2,777,021 UART: [afmc] ++
2,777,189 UART: [afmc] CDI.KEYID = 6
2,777,551 UART: [afmc] SUBJECT.KEYID = 7
2,777,976 UART: [afmc] AUTHORITY.KEYID = 5
2,813,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,871 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,590 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,602 UART: [afmc] --
2,856,720 UART: [cold-reset] --
2,857,786 UART: [state] Locking Datavault
2,858,999 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,603 UART: [state] Locking ICCM
2,860,267 UART: [exit] Launching FMC @ 0x40000130
2,865,596 UART:
2,865,612 UART: Running Caliptra FMC ...
2,866,020 UART:
2,866,074 UART: [state] CFI Enabled
2,876,853 UART: [fht] FMC Alias Private Key: 7
2,985,566 UART: [art] Extend RT PCRs Done
2,985,994 UART: [art] Lock RT PCRs Done
2,987,718 UART: [art] Populate DV Done
2,995,731 UART: [fht] FMC Alias Private Key: 7
2,996,877 UART: [art] Derive CDI
2,997,157 UART: [art] Store in in slot 0x4
3,083,028 UART: [art] Derive Key Pair
3,083,388 UART: [art] Store priv key in slot 0x5
3,096,786 UART: [art] Derive Key Pair - Done
3,111,562 UART: [art] Signing Cert with AUTHO
3,112,042 UART: RITY.KEYID = 7
3,126,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,357 UART: [art] PUB.X = 11074A5C4C0C9C63311C349FEDE10D5406842A3C4431FBF3E13C6BCAB66B84D05B39727B801DC6FF7FEDF228EFDB56CC
3,134,133 UART: [art] PUB.Y = 776547A7A11B99AF757AEB660CEEC030558F25E05961F2FF4739884A27BA275238917E4D777DBD34CEA5DAE4369F0E16
3,141,081 UART: [art] SIG.R = 26F12225D0854E19D67E68C1FC251E370B3331EC989A69DC1602F7AADD82E786A558D57992CC5805D4CBFDADFB7111EE
3,147,852 UART: [art] SIG.S = F5763E31CA02CCBC7865FE334666B53B9C5224089764924AFFA7AABCB30324BA42F37A755ACAD4AFB92B581D37770C17
3,172,209 UART: Caliptra RT
3,172,462 UART: [state] CFI Enabled
3,280,697 UART: [rt] RT listening for mailbox commands...
3,281,367 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,925 UART: [rt]cmd =0x41545348, len=116
3,313,891 >>> mbox cmd response data (12 bytes)
3,313,892 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,863 UART:
3,314,879 UART: Running Caliptra ROM ...
3,315,287 UART:
3,315,342 UART: [state] CFI Enabled
3,318,304 UART: [state] LifecycleState = Unprovisioned
3,318,959 UART: [state] DebugLocked = No
3,319,649 UART: [state] WD Timer not started. Device not locked for debugging
3,320,939 UART: [kat] SHA2-256
4,126,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,130,714 UART: [kat] ++
4,130,866 UART: [kat] sha1
4,135,082 UART: [kat] SHA2-256
4,137,022 UART: [kat] SHA2-384
4,139,809 UART: [kat] SHA2-512-ACC
4,141,709 UART: [kat] ECC-384
4,151,512 UART: [kat] HMAC-384Kdf
4,156,038 UART: [kat] LMS
4,404,366 UART: [kat] --
4,405,370 UART: [update-reset] ++
5,310,172 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,311,137 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,407,519 >>> mbox cmd response: success
5,407,519 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,407,850 UART: [update-reset] Copying MAN_2 To MAN_1
5,415,864 UART: [update-reset Success] --
5,416,915 UART: [state] Locking Datavault
5,417,743 UART: [state] Locking PCR0, PCR1 and PCR31
5,418,347 UART: [state] Locking ICCM
5,418,955 UART: [exit] Launching FMC @ 0x40000130
5,424,284 UART:
5,424,300 UART: Running Caliptra FMC ...
5,424,708 UART:
5,424,762 UART: [state] CFI Enabled
5,513,971 UART: [art] Extend RT PCRs Done
5,514,399 UART: [art] Lock RT PCRs Done
5,515,460 UART: [art] Populate DV Done
5,523,971 UART: [fht] FMC Alias Private Key: 7
5,525,097 UART: [art] Derive CDI
5,525,377 UART: [art] Store in in slot 0x4
5,610,726 UART: [art] Derive Key Pair
5,611,086 UART: [art] Store priv key in slot 0x5
5,623,964 UART: [art] Derive Key Pair - Done
5,638,658 UART: [art] Signing Cert with AUTHO
5,639,138 UART: RITY.KEYID = 7
5,654,230 UART: [art] Erasing AUTHORITY.KEYID = 7
5,654,995 UART: [art] PUB.X = 925D8BE1CEA2A4F00DB13C4436F71220A2924639A51AC99DC95227AFD62998F958B142708F2113F74DB74D57A46FBA53
5,661,764 UART: [art] PUB.Y = 3B70C76B7D3B785B40582945FD4B2A75A1D27B3D16EA4F4CA1D141B265D1C479A7582A05483B75891A90C2C849ABDC8D
5,668,717 UART: [art] SIG.R = 30DB8B4E2094B0E57551804384E276E04B136B3139894EBFA67DAEBF7911820249B9DBED0986959C7F8DB092B9A4DBF4
5,675,485 UART: [art] SIG.S = D666CC27A4DC3B48FA66719F658BC7576383ADB8BFDEE2A3999BFBFDB24B46A04F6631B15F90C15B86BBC1C1FDA7C703
5,699,295 UART: mbox::rt_entry...
5,699,667 UART: ____ _ _ _ ____ _____
5,700,451 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,701,251 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,702,019 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,702,787 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,703,555 UART: |_|
5,703,867 UART:
5,982,359 UART: [rt] Runtime listening for mailbox commands...
5,983,549 >>> mbox cmd response data (48 bytes)
5,983,550 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,986,333 >>> mbox cmd response data (48 bytes)
5,986,334 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,999,272 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 ready_for_fw is high
1,060,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,069 >>> mbox cmd response: success
2,688,457 UART:
2,688,473 UART: Running Caliptra FMC ...
2,688,881 UART:
2,688,935 UART: [state] CFI Enabled
2,699,910 UART: [fht] FMC Alias Private Key: 7
2,807,459 UART: [art] Extend RT PCRs Done
2,807,887 UART: [art] Lock RT PCRs Done
2,809,841 UART: [art] Populate DV Done
2,818,094 UART: [fht] FMC Alias Private Key: 7
2,819,072 UART: [art] Derive CDI
2,819,352 UART: [art] Store in in slot 0x4
2,905,433 UART: [art] Derive Key Pair
2,905,793 UART: [art] Store priv key in slot 0x5
2,918,307 UART: [art] Derive Key Pair - Done
2,933,227 UART: [art] Signing Cert with AUTHO
2,933,707 UART: RITY.KEYID = 7
2,948,633 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,398 UART: [art] PUB.X = EF7012D4FDEF4F0020300ADF56A12A4C268B0DAF30297E57FA12C461A564048D0A05F545141A7645D1DBFC9F54579E7E
2,956,139 UART: [art] PUB.Y = C04A6D4C65E80C327DCD80C2A0ED89F555BAB66DC472C5C8C3D53E777480DD2A87743A59C0AF22B65DCFC3C7EDBAF9C2
2,963,110 UART: [art] SIG.R = 2C730D8A9FDC4CBF1AFA69FB66CD0FD32FD233F5A0D400358B95387F78CBDEA0F8716E02D27D096FAEA468514925A460
2,969,862 UART: [art] SIG.S = 81D836B3DF801DC58850D16D90B1937C54B7BE0274AC1C2A9515F0DFB004AEE87E80D2DE9F465DB83F6F1F2977F1B64C
2,993,639 UART: Caliptra RT
2,993,892 UART: [state] CFI Enabled
3,101,871 UART: [rt] RT listening for mailbox commands...
3,102,541 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,151 UART: [rt]cmd =0x41545348, len=116
3,134,957 >>> mbox cmd response data (12 bytes)
3,134,958 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,112,228 >>> mbox cmd response: success
5,112,228 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,125,748 UART:
5,125,764 UART: Running Caliptra FMC ...
5,126,172 UART:
5,126,226 UART: [state] CFI Enabled
5,215,743 UART: [art] Extend RT PCRs Done
5,216,171 UART: [art] Lock RT PCRs Done
5,217,406 UART: [art] Populate DV Done
5,225,805 UART: [fht] FMC Alias Private Key: 7
5,226,927 UART: [art] Derive CDI
5,227,207 UART: [art] Store in in slot 0x4
5,312,690 UART: [art] Derive Key Pair
5,313,050 UART: [art] Store priv key in slot 0x5
5,326,308 UART: [art] Derive Key Pair - Done
5,340,947 UART: [art] Signing Cert with AUTHO
5,341,427 UART: RITY.KEYID = 7
5,357,039 UART: [art] Erasing AUTHORITY.KEYID = 7
5,357,804 UART: [art] PUB.X = 8862B2F292C03FD29684A9450C563ED76688CF9DC4FF770AD5B9F2A0DE4ACD004862AA8658E6EFD383595416FABA1EC4
5,364,558 UART: [art] PUB.Y = 7C798CD01A4E4A6288C4CDDFF7E4DF0193F131A17DA6E1599C4F98BCAE4350BF2438E199EBB5F56D93EEC4ABBC026AB7
5,371,526 UART: [art] SIG.R = 71318CA33A0FEDBB2CEA6D562508C04B67F278C72C5F53183A75AA2DC64DF1EF4DD293B883CA8F5745D8CDA9ACB35D80
5,378,310 UART: [art] SIG.S = BA5DE625E7756C66EE2BD5370BCC3A16C297435DE0B851F89F27486DD775078AE21EDE707F127E8B56D97B51F0315AC6
5,402,145 UART: mbox::rt_entry...
5,402,517 UART: ____ _ _ _ ____ _____
5,403,301 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,404,101 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,404,869 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,405,637 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,406,405 UART: |_|
5,406,717 UART:
5,686,069 UART: [rt] Runtime listening for mailbox commands...
5,687,259 >>> mbox cmd response data (48 bytes)
5,687,260 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,690,043 >>> mbox cmd response data (48 bytes)
5,690,044 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,702,982 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,064 UART: [kat] SHA2-256
904,004 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,175 UART: [kat] HMAC-384Kdf
922,773 UART: [kat] LMS
1,171,101 UART: [kat] --
1,171,974 UART: [cold-reset] ++
1,172,424 UART: [fht] FHT @ 0x50003400
1,175,023 UART: [idev] ++
1,175,191 UART: [idev] CDI.KEYID = 6
1,175,551 UART: [idev] SUBJECT.KEYID = 7
1,175,975 UART: [idev] UDS.KEYID = 0
1,176,320 ready_for_fw is high
1,176,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,923 UART: [idev] Erasing UDS.KEYID = 0
1,200,994 UART: [idev] Sha1 KeyId Algorithm
1,209,576 UART: [idev] --
1,210,768 UART: [ldev] ++
1,210,936 UART: [ldev] CDI.KEYID = 6
1,211,299 UART: [ldev] SUBJECT.KEYID = 5
1,211,725 UART: [ldev] AUTHORITY.KEYID = 7
1,212,188 UART: [ldev] FE.KEYID = 1
1,217,194 UART: [ldev] Erasing FE.KEYID = 1
1,243,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,144 UART: [ldev] --
1,282,565 UART: [fwproc] Wait for Commands...
1,283,157 UART: [fwproc] Recv command 0x46574c44
1,283,885 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,550 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,857 >>> mbox cmd response: success
2,775,963 UART: [afmc] ++
2,776,131 UART: [afmc] CDI.KEYID = 6
2,776,493 UART: [afmc] SUBJECT.KEYID = 7
2,776,918 UART: [afmc] AUTHORITY.KEYID = 5
2,812,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,344 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,072 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,957 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,676 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,480 UART: [afmc] --
2,855,608 UART: [cold-reset] --
2,856,612 UART: [state] Locking Datavault
2,857,765 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,369 UART: [state] Locking ICCM
2,858,865 UART: [exit] Launching FMC @ 0x40000130
2,864,194 UART:
2,864,210 UART: Running Caliptra FMC ...
2,864,618 UART:
2,864,761 UART: [state] CFI Enabled
2,875,592 UART: [fht] FMC Alias Private Key: 7
2,983,287 UART: [art] Extend RT PCRs Done
2,983,715 UART: [art] Lock RT PCRs Done
2,985,133 UART: [art] Populate DV Done
2,993,198 UART: [fht] FMC Alias Private Key: 7
2,994,256 UART: [art] Derive CDI
2,994,536 UART: [art] Store in in slot 0x4
3,079,949 UART: [art] Derive Key Pair
3,080,309 UART: [art] Store priv key in slot 0x5
3,093,553 UART: [art] Derive Key Pair - Done
3,108,311 UART: [art] Signing Cert with AUTHO
3,108,791 UART: RITY.KEYID = 7
3,124,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,022 UART: [art] PUB.X = 4E693E6B7BA2A415946C7A2E5CC14F538D8A0F51591EA8FCEA0346E38147A8B511D402899EC8BFF33A56ACE949CF58D4
3,131,795 UART: [art] PUB.Y = 8D676E800095C9A87DE34F908A1E9AAE8FE93F3928E25D1F41BEE2D7099F20FD1F9C7B50AD9408000BBDBE88B113B511
3,138,704 UART: [art] SIG.R = 7A2C1E418EE3728C7515C53F03B91D4F9C1A4B491A7C4E5A9C26DA70B3EB84E71ABD60C6F598E4C2C103D1ADA4CA46F0
3,145,486 UART: [art] SIG.S = 526D56239E5048F931EB285033714A55E24D99C6241E6022D7C391E21ED6AE209D3CA5BE46694ECF23D2952F564D765B
3,169,551 UART: Caliptra RT
3,169,896 UART: [state] CFI Enabled
3,277,769 UART: [rt] RT listening for mailbox commands...
3,278,439 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,953 UART: [rt]cmd =0x41545348, len=116
3,310,609 >>> mbox cmd response data (12 bytes)
3,310,610 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,631 UART:
3,311,647 UART: Running Caliptra ROM ...
3,312,055 UART:
3,312,197 UART: [state] CFI Enabled
3,315,117 UART: [state] LifecycleState = Unprovisioned
3,315,772 UART: [state] DebugLocked = No
3,316,292 UART: [state] WD Timer not started. Device not locked for debugging
3,317,424 UART: [kat] SHA2-256
4,123,074 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,127,199 UART: [kat] ++
4,127,351 UART: [kat] sha1
4,131,513 UART: [kat] SHA2-256
4,133,453 UART: [kat] SHA2-384
4,136,174 UART: [kat] SHA2-512-ACC
4,138,074 UART: [kat] ECC-384
4,147,431 UART: [kat] HMAC-384Kdf
4,152,133 UART: [kat] LMS
4,400,461 UART: [kat] --
4,401,337 UART: [update-reset] ++
5,306,359 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,307,402 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,403,784 >>> mbox cmd response: success
5,403,784 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,404,083 UART: [update-reset] Copying MAN_2 To MAN_1
5,412,097 UART: [update-reset Success] --
5,413,204 UART: [state] Locking Datavault
5,414,078 UART: [state] Locking PCR0, PCR1 and PCR31
5,414,682 UART: [state] Locking ICCM
5,415,214 UART: [exit] Launching FMC @ 0x40000130
5,420,543 UART:
5,420,559 UART: Running Caliptra FMC ...
5,420,967 UART:
5,421,110 UART: [state] CFI Enabled
5,511,015 UART: [art] Extend RT PCRs Done
5,511,443 UART: [art] Lock RT PCRs Done
5,512,762 UART: [art] Populate DV Done
5,520,597 UART: [fht] FMC Alias Private Key: 7
5,521,637 UART: [art] Derive CDI
5,521,917 UART: [art] Store in in slot 0x4
5,607,724 UART: [art] Derive Key Pair
5,608,084 UART: [art] Store priv key in slot 0x5
5,621,404 UART: [art] Derive Key Pair - Done
5,635,849 UART: [art] Signing Cert with AUTHO
5,636,329 UART: RITY.KEYID = 7
5,651,659 UART: [art] Erasing AUTHORITY.KEYID = 7
5,652,424 UART: [art] PUB.X = AFA2D81C0F4C619C3B51984FC69D9C7A9DA8A3D4AF372E7BEF5D0A97CDA9A9CA1F0B5C766745FF733430EA5F80714709
5,659,200 UART: [art] PUB.Y = 69530E05BF06F59C7CA517D2EEE166818D483E8C3C447902927BE50752DF764CD6F85C8AEE3EB5A0CAFF11A562BB5B78
5,666,147 UART: [art] SIG.R = 1A8BFDF8C1E826B5E89E4E271E6EC0BD43241BFDCFD8494B355AC4799C419B1D9AC0EEB7E7158E6DC9D5723FEC982F12
5,672,939 UART: [art] SIG.S = E5DE6083A6A69112667631F85F0197BC2B0A952421E4D611D14777295E4663D3364AA77892168DB4F90556607311FF95
5,696,591 UART: mbox::rt_entry...
5,696,963 UART: ____ _ _ _ ____ _____
5,697,747 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,698,547 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,699,315 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,700,083 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,700,851 UART: |_|
5,701,163 UART:
5,974,337 UART: [rt] Runtime listening for mailbox commands...
5,975,527 >>> mbox cmd response data (48 bytes)
5,975,528 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,978,311 >>> mbox cmd response data (48 bytes)
5,978,312 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,991,250 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,324 ready_for_fw is high
1,060,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,998 >>> mbox cmd response: success
2,690,668 UART:
2,690,684 UART: Running Caliptra FMC ...
2,691,092 UART:
2,691,235 UART: [state] CFI Enabled
2,702,298 UART: [fht] FMC Alias Private Key: 7
2,809,637 UART: [art] Extend RT PCRs Done
2,810,065 UART: [art] Lock RT PCRs Done
2,811,729 UART: [art] Populate DV Done
2,819,780 UART: [fht] FMC Alias Private Key: 7
2,820,918 UART: [art] Derive CDI
2,821,198 UART: [art] Store in in slot 0x4
2,907,031 UART: [art] Derive Key Pair
2,907,391 UART: [art] Store priv key in slot 0x5
2,920,599 UART: [art] Derive Key Pair - Done
2,935,363 UART: [art] Signing Cert with AUTHO
2,935,843 UART: RITY.KEYID = 7
2,950,731 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,496 UART: [art] PUB.X = 5C40C8303553FFA2D1D5006E7B6322312D51CE11F40798FD07F88CF587976AC431A6299F773332AFAF58D85A0D99D84F
2,958,235 UART: [art] PUB.Y = B73B4EE56BF773BE942810F756C31696B40E8703BCE8EE9BDF7D58F7AF1786D1BCC2DA9DAF2DD8952D64294247C4B364
2,965,193 UART: [art] SIG.R = 8AC64DDC327E5EC2CDFE5C7FC78BBF82D065425B4B6ED067C9928ABF6D9CB2388E0A61DA25CE0551C9E82062EE22F50F
2,971,976 UART: [art] SIG.S = 4FCD2E16B055DE426E1DA2BBE94ADCBB9648D86CEA3B5CD5BFE7E3ECD9D7374CF9F032BB79E650D4E44195E8FF81097F
2,996,060 UART: Caliptra RT
2,996,405 UART: [state] CFI Enabled
3,105,324 UART: [rt] RT listening for mailbox commands...
3,105,994 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,188 UART: [rt]cmd =0x41545348, len=116
3,137,908 >>> mbox cmd response data (12 bytes)
3,137,909 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,113,212 >>> mbox cmd response: success
5,113,212 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,126,384 UART:
5,126,400 UART: Running Caliptra FMC ...
5,126,808 UART:
5,126,951 UART: [state] CFI Enabled
5,216,262 UART: [art] Extend RT PCRs Done
5,216,690 UART: [art] Lock RT PCRs Done
5,218,027 UART: [art] Populate DV Done
5,226,384 UART: [fht] FMC Alias Private Key: 7
5,227,328 UART: [art] Derive CDI
5,227,608 UART: [art] Store in in slot 0x4
5,313,801 UART: [art] Derive Key Pair
5,314,161 UART: [art] Store priv key in slot 0x5
5,327,523 UART: [art] Derive Key Pair - Done
5,342,460 UART: [art] Signing Cert with AUTHO
5,342,940 UART: RITY.KEYID = 7
5,357,812 UART: [art] Erasing AUTHORITY.KEYID = 7
5,358,577 UART: [art] PUB.X = E00C85583427C0EE3DAB8D8EFBF1FD18AA7849BE553DD5412A23345113BBED5433625D3C519149155913BE6E83AD26FA
5,365,352 UART: [art] PUB.Y = 468BEB3775E25261BFA0D640FDC886955F4EA66EB987DAC118AE05344F520DB12A00DC0E6162032D4330636BC8B0C022
5,372,272 UART: [art] SIG.R = F68CEC30F49FDE1AD274E9DB2FA88C169F549FBF30DB1F76C1624883FB3AB799890A887C391C4A9DCF4B6CD5CEF5E8C1
5,379,063 UART: [art] SIG.S = 55FBFB1872EE6EA77154C80492048546019F9ED1D091058B03D42D6DB5633CFDD0EE57577D8413AA86466C53D9C38DD9
5,402,967 UART: mbox::rt_entry...
5,403,339 UART: ____ _ _ _ ____ _____
5,404,123 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,404,923 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,405,691 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,406,459 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,407,227 UART: |_|
5,407,539 UART:
5,686,883 UART: [rt] Runtime listening for mailbox commands...
5,688,073 >>> mbox cmd response data (48 bytes)
5,688,074 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,690,857 >>> mbox cmd response data (48 bytes)
5,690,858 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,703,796 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,734 UART: [state] LifecycleState = Unprovisioned
85,389 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
890,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,011 UART: [kat] ++
895,163 UART: [kat] sha1
899,315 UART: [kat] SHA2-256
901,255 UART: [kat] SHA2-384
904,038 UART: [kat] SHA2-512-ACC
905,939 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,118 UART: [kat] LMS
1,168,430 UART: [kat] --
1,169,271 UART: [cold-reset] ++
1,169,813 UART: [fht] FHT @ 0x50003400
1,172,577 UART: [idev] ++
1,172,745 UART: [idev] CDI.KEYID = 6
1,173,106 UART: [idev] SUBJECT.KEYID = 7
1,173,531 UART: [idev] UDS.KEYID = 0
1,173,877 ready_for_fw is high
1,173,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,509 UART: [idev] Erasing UDS.KEYID = 0
1,198,195 UART: [idev] Sha1 KeyId Algorithm
1,207,091 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,956 UART: [ldev] Erasing FE.KEYID = 1
1,240,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,462 UART: [ldev] --
1,279,792 UART: [fwproc] Wait for Commands...
1,280,577 UART: [fwproc] Recv command 0x46574c44
1,281,310 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,439 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,748 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,668 >>> mbox cmd response: success
2,775,921 UART: [afmc] ++
2,776,089 UART: [afmc] CDI.KEYID = 6
2,776,452 UART: [afmc] SUBJECT.KEYID = 7
2,776,878 UART: [afmc] AUTHORITY.KEYID = 5
2,812,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,266 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,995 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,878 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,597 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,304 UART: [afmc] --
2,856,230 UART: [cold-reset] --
2,857,056 UART: [state] Locking Datavault
2,858,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,945 UART: [state] Locking ICCM
2,859,521 UART: [exit] Launching FMC @ 0x40000130
2,864,850 UART:
2,864,866 UART: Running Caliptra FMC ...
2,865,274 UART:
2,865,328 UART: [state] CFI Enabled
2,875,749 UART: [fht] FMC Alias Private Key: 7
2,983,742 UART: [art] Extend RT PCRs Done
2,984,170 UART: [art] Lock RT PCRs Done
2,986,014 UART: [art] Populate DV Done
2,994,477 UART: [fht] FMC Alias Private Key: 7
2,995,605 UART: [art] Derive CDI
2,995,885 UART: [art] Store in in slot 0x4
3,081,238 UART: [art] Derive Key Pair
3,081,598 UART: [art] Store priv key in slot 0x5
3,094,742 UART: [art] Derive Key Pair - Done
3,109,766 UART: [art] Signing Cert with AUTHO
3,110,246 UART: RITY.KEYID = 7
3,125,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,263 UART: [art] PUB.X = 014009A47E5C7205D2A45DDE4BA4915E410278C13241B923D1E30D3132F6F31C47D9014701F16227E82DD53D9CA7597D
3,133,006 UART: [art] PUB.Y = C227C2909FA92E4D08B0F7BC1F962E2929A5427FB8B27F304225697DD9D7C88BA821BFF92312697C4DE711D6F9470AFA
3,139,956 UART: [art] SIG.R = C50C8280FF523AAF3134ABFF49C653155C770E19E614085B5AD3B57AD3A86EF0853315FE8453CB63C2DB512841112EA9
3,146,721 UART: [art] SIG.S = 7729804C149682A6D0838C65CB2D447C8A916D4B54165A8770D0538D79C2CA35723C4C1D27CCC757CC04E6D371E94689
3,170,929 UART: Caliptra RT
3,171,182 UART: [state] CFI Enabled
3,277,483 UART: [rt] RT listening for mailbox commands...
3,278,153 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,757 UART: [rt]cmd =0x41545348, len=116
3,310,391 >>> mbox cmd response data (12 bytes)
3,310,392 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,197 UART:
3,311,213 UART: Running Caliptra ROM ...
3,311,621 UART:
3,311,676 UART: [state] CFI Enabled
3,314,536 UART: [state] LifecycleState = Unprovisioned
3,315,191 UART: [state] DebugLocked = No
3,315,699 UART: [state] WD Timer not started. Device not locked for debugging
3,317,029 UART: [kat] SHA2-256
4,120,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,124,708 UART: [kat] ++
4,124,860 UART: [kat] sha1
4,129,126 UART: [kat] SHA2-256
4,131,066 UART: [kat] SHA2-384
4,134,019 UART: [kat] SHA2-512-ACC
4,135,919 UART: [kat] ECC-384
4,145,906 UART: [kat] HMAC-384Kdf
4,150,530 UART: [kat] LMS
4,398,842 UART: [kat] --
4,399,478 UART: [update-reset] ++
5,303,735 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,304,878 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,401,260 >>> mbox cmd response: success
5,401,260 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,401,431 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,445 UART: [update-reset Success] --
5,410,552 UART: [state] Locking Datavault
5,411,354 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,958 UART: [state] Locking ICCM
5,412,432 UART: [exit] Launching FMC @ 0x40000130
5,417,761 UART:
5,417,777 UART: Running Caliptra FMC ...
5,418,185 UART:
5,418,239 UART: [state] CFI Enabled
5,507,210 UART: [art] Extend RT PCRs Done
5,507,638 UART: [art] Lock RT PCRs Done
5,508,901 UART: [art] Populate DV Done
5,517,056 UART: [fht] FMC Alias Private Key: 7
5,517,994 UART: [art] Derive CDI
5,518,274 UART: [art] Store in in slot 0x4
5,603,963 UART: [art] Derive Key Pair
5,604,323 UART: [art] Store priv key in slot 0x5
5,617,363 UART: [art] Derive Key Pair - Done
5,631,805 UART: [art] Signing Cert with AUTHO
5,632,285 UART: RITY.KEYID = 7
5,647,521 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,286 UART: [art] PUB.X = 546B319A80A6C76844FB2A1D46412E50C3ADA5AA4DF9237A6264EC0BFC213A8DD098CB55195B7B487953C486234BD8B1
5,655,059 UART: [art] PUB.Y = CE378DDF0D19ED47304D2D7AE6A99EFC663428D7661A2611EAB3895B4FB3F63A653C434684E75F001516EC9AABE9A3C3
5,661,996 UART: [art] SIG.R = 2534D80CCE70273C5DF194DFF61FFC7F0EA07C646FBCB29C80676C67E26ED1EFBC769F708191703E1811329BCF3CA9BB
5,668,776 UART: [art] SIG.S = 8F1B1CDB9E82B044263C91C9373F8E0819B93F9020F927E8AC28F7B37BA3795FF33080D7C367435CB6F5C46BFE04C05E
5,692,551 UART: mbox::rt_entry...
5,692,923 UART: ____ _ _ _ ____ _____
5,693,707 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,694,507 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,695,275 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,696,043 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,696,811 UART: |_|
5,697,123 UART:
5,975,723 UART: [rt] Runtime listening for mailbox commands...
5,976,913 >>> mbox cmd response data (48 bytes)
5,976,914 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,979,697 >>> mbox cmd response data (48 bytes)
5,979,698 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,992,636 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,126 ready_for_fw is high
1,056,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,206 >>> mbox cmd response: success
2,686,890 UART:
2,686,906 UART: Running Caliptra FMC ...
2,687,314 UART:
2,687,368 UART: [state] CFI Enabled
2,697,843 UART: [fht] FMC Alias Private Key: 7
2,805,480 UART: [art] Extend RT PCRs Done
2,805,908 UART: [art] Lock RT PCRs Done
2,807,156 UART: [art] Populate DV Done
2,815,575 UART: [fht] FMC Alias Private Key: 7
2,816,571 UART: [art] Derive CDI
2,816,851 UART: [art] Store in in slot 0x4
2,902,390 UART: [art] Derive Key Pair
2,902,750 UART: [art] Store priv key in slot 0x5
2,915,848 UART: [art] Derive Key Pair - Done
2,930,398 UART: [art] Signing Cert with AUTHO
2,930,878 UART: RITY.KEYID = 7
2,946,356 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,121 UART: [art] PUB.X = A21E8945017634B68F8879810B047149837D0BB1208A75E593F22B72AF6C0503E1E81AFF3DFC97F984785C1A380D95FC
2,953,866 UART: [art] PUB.Y = 5D3FC2CAC8CD92E079BCCFA465C5659068CF91C674DE44E156FF2F643FBA2F3AEB6FD3E426EB44BAA0A33A4EC513D69A
2,960,844 UART: [art] SIG.R = 09A992DB9B687EBC206DCB9A44A3CE39787966C846013CD5854E3ADBD9F3A968960D33BA469C1D943020199E1E739FE6
2,967,609 UART: [art] SIG.S = 0D6B90C327AD50710D6DBA609B0D6CD18202A17151E4F555CE3275B696FA05F1FC2503A10140B641AAB2BBC805A2A290
2,991,190 UART: Caliptra RT
2,991,443 UART: [state] CFI Enabled
3,098,668 UART: [rt] RT listening for mailbox commands...
3,099,338 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,134 UART: [rt]cmd =0x41545348, len=116
3,131,652 >>> mbox cmd response data (12 bytes)
3,131,653 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,103,288 >>> mbox cmd response: success
5,103,288 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,117,000 UART:
5,117,016 UART: Running Caliptra FMC ...
5,117,424 UART:
5,117,478 UART: [state] CFI Enabled
5,206,541 UART: [art] Extend RT PCRs Done
5,206,969 UART: [art] Lock RT PCRs Done
5,208,340 UART: [art] Populate DV Done
5,216,479 UART: [fht] FMC Alias Private Key: 7
5,217,467 UART: [art] Derive CDI
5,217,747 UART: [art] Store in in slot 0x4
5,303,616 UART: [art] Derive Key Pair
5,303,976 UART: [art] Store priv key in slot 0x5
5,316,642 UART: [art] Derive Key Pair - Done
5,331,417 UART: [art] Signing Cert with AUTHO
5,331,897 UART: RITY.KEYID = 7
5,346,949 UART: [art] Erasing AUTHORITY.KEYID = 7
5,347,714 UART: [art] PUB.X = C659B67BF008519BBBA6550D6CA126ABF99FD209DFDDA3611947BB4BD8496C515054E9196694BE29D1675DA5FBC44A0E
5,354,484 UART: [art] PUB.Y = D28A2800EFAC28FDA9080A56CC2DBC9906308B7393BA83410B283D7FE4D9BD4EF817A5EF5B348A5E580DE906D1E121D0
5,361,408 UART: [art] SIG.R = AD90F319A111300433E5ADF027BAEBA3438B55F1F6C3AE3AFCB23A6175331509B6107B3A7062FCF745C2BAE30883DBAD
5,368,183 UART: [art] SIG.S = 094ADF3275A7196378A2867DB35CFA68DFD0557D578C0CA6D25B14F8EF3C9C3B0F7285AF4579746C85DE85FA3213BDFD
5,391,979 UART: mbox::rt_entry...
5,392,351 UART: ____ _ _ _ ____ _____
5,393,135 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,393,935 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,394,703 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,395,471 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,396,239 UART: |_|
5,396,551 UART:
5,677,779 UART: [rt] Runtime listening for mailbox commands...
5,678,969 >>> mbox cmd response data (48 bytes)
5,678,970 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,681,753 >>> mbox cmd response data (48 bytes)
5,681,754 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,694,692 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,859 UART: [state] LifecycleState = Unprovisioned
86,514 UART: [state] DebugLocked = No
87,174 UART: [state] WD Timer not started. Device not locked for debugging
88,439 UART: [kat] SHA2-256
891,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,118 UART: [kat] ++
896,270 UART: [kat] sha1
900,416 UART: [kat] SHA2-256
902,356 UART: [kat] SHA2-384
905,261 UART: [kat] SHA2-512-ACC
907,162 UART: [kat] ECC-384
917,273 UART: [kat] HMAC-384Kdf
921,937 UART: [kat] LMS
1,170,249 UART: [kat] --
1,170,892 UART: [cold-reset] ++
1,171,330 UART: [fht] FHT @ 0x50003400
1,174,090 UART: [idev] ++
1,174,258 UART: [idev] CDI.KEYID = 6
1,174,619 UART: [idev] SUBJECT.KEYID = 7
1,175,044 UART: [idev] UDS.KEYID = 0
1,175,390 ready_for_fw is high
1,175,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,152 UART: [idev] Erasing UDS.KEYID = 0
1,199,774 UART: [idev] Sha1 KeyId Algorithm
1,208,608 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,393 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,363 UART: [fwproc] Wait for Commands...
1,283,058 UART: [fwproc] Recv command 0x46574c44
1,283,791 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,133 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,237 >>> mbox cmd response: success
2,775,506 UART: [afmc] ++
2,775,674 UART: [afmc] CDI.KEYID = 6
2,776,037 UART: [afmc] SUBJECT.KEYID = 7
2,776,463 UART: [afmc] AUTHORITY.KEYID = 5
2,811,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,255 UART: [afmc] --
2,855,221 UART: [cold-reset] --
2,856,187 UART: [state] Locking Datavault
2,857,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,768 UART: [state] Locking ICCM
2,858,400 UART: [exit] Launching FMC @ 0x40000130
2,863,729 UART:
2,863,745 UART: Running Caliptra FMC ...
2,864,153 UART:
2,864,296 UART: [state] CFI Enabled
2,874,955 UART: [fht] FMC Alias Private Key: 7
2,983,112 UART: [art] Extend RT PCRs Done
2,983,540 UART: [art] Lock RT PCRs Done
2,985,130 UART: [art] Populate DV Done
2,993,625 UART: [fht] FMC Alias Private Key: 7
2,994,649 UART: [art] Derive CDI
2,994,929 UART: [art] Store in in slot 0x4
3,080,406 UART: [art] Derive Key Pair
3,080,766 UART: [art] Store priv key in slot 0x5
3,094,538 UART: [art] Derive Key Pair - Done
3,109,167 UART: [art] Signing Cert with AUTHO
3,109,647 UART: RITY.KEYID = 7
3,124,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,710 UART: [art] PUB.X = 72E2C90C87894F45954141111EEACF961B547D4448193248F5EB8321D7C3C4F0B14801527D71C754A00156418D8F7337
3,132,457 UART: [art] PUB.Y = BA84FDDAEE0EEF5C3BA98C4EBD832F6705497303193452DB0AE0AB0A4C0108AF709D6F4FE70DB772ED2DD094757F60E6
3,139,403 UART: [art] SIG.R = E2621E732D701AD4490646913F15D135C257F7E66F8C6B1C96F73BA1BC5CDB7A2DB5C070ABADA0111222810D6F05D06D
3,146,172 UART: [art] SIG.S = 982A0B109F21E330690BCC93A83A3586405E3E4C56BBF6FD2D0F12709E151855E3470C9D373C3BC81BC72A0B7959B8CD
3,170,272 UART: Caliptra RT
3,170,617 UART: [state] CFI Enabled
3,278,841 UART: [rt] RT listening for mailbox commands...
3,279,511 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,103 UART: [rt]cmd =0x41545348, len=116
3,311,969 >>> mbox cmd response data (12 bytes)
3,311,970 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,671 UART:
3,312,687 UART: Running Caliptra ROM ...
3,313,095 UART:
3,313,237 UART: [state] CFI Enabled
3,316,413 UART: [state] LifecycleState = Unprovisioned
3,317,068 UART: [state] DebugLocked = No
3,317,776 UART: [state] WD Timer not started. Device not locked for debugging
3,319,006 UART: [kat] SHA2-256
4,122,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,126,685 UART: [kat] ++
4,126,837 UART: [kat] sha1
4,131,011 UART: [kat] SHA2-256
4,132,951 UART: [kat] SHA2-384
4,135,826 UART: [kat] SHA2-512-ACC
4,137,726 UART: [kat] ECC-384
4,147,247 UART: [kat] HMAC-384Kdf
4,151,781 UART: [kat] LMS
4,400,093 UART: [kat] --
4,400,683 UART: [update-reset] ++
5,306,248 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,307,407 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,403,789 >>> mbox cmd response: success
5,403,789 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,404,112 UART: [update-reset] Copying MAN_2 To MAN_1
5,412,126 UART: [update-reset Success] --
5,413,129 UART: [state] Locking Datavault
5,414,131 UART: [state] Locking PCR0, PCR1 and PCR31
5,414,735 UART: [state] Locking ICCM
5,415,307 UART: [exit] Launching FMC @ 0x40000130
5,420,636 UART:
5,420,652 UART: Running Caliptra FMC ...
5,421,060 UART:
5,421,203 UART: [state] CFI Enabled
5,510,282 UART: [art] Extend RT PCRs Done
5,510,710 UART: [art] Lock RT PCRs Done
5,511,759 UART: [art] Populate DV Done
5,520,068 UART: [fht] FMC Alias Private Key: 7
5,521,158 UART: [art] Derive CDI
5,521,438 UART: [art] Store in in slot 0x4
5,607,069 UART: [art] Derive Key Pair
5,607,429 UART: [art] Store priv key in slot 0x5
5,620,065 UART: [art] Derive Key Pair - Done
5,634,582 UART: [art] Signing Cert with AUTHO
5,635,062 UART: RITY.KEYID = 7
5,650,484 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,249 UART: [art] PUB.X = 997594BC302FB34B20AE3CF1380906EE25269F9ADF8622C0E619BCEE04A533F2386A5525C3AAE7E818FD4247159D5E6E
5,658,016 UART: [art] PUB.Y = 3317B0B2BB8A764AADA6FC4E8F1DD907E0AE4D75A2D9C116E051A39A6A6C94F26CBD5790F0E538900AA00EDD93411ECB
5,664,977 UART: [art] SIG.R = 3D8F1DDC607FA51B32E53EA95C95E274B3E5380421B345C1E7BC934505C57B8205963371477B183DB34D9D0027BB36C8
5,671,714 UART: [art] SIG.S = 13C8FED103DA2D1237C1A78A0095BCF40FEB8776F77F213C31947835E5855CF53A2BCEBF80D50DA1ED2D8B7576D6205E
5,695,368 UART: mbox::rt_entry...
5,695,740 UART: ____ _ _ _ ____ _____
5,696,524 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,697,324 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,698,092 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,698,860 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,699,628 UART: |_|
5,699,940 UART:
5,980,134 UART: [rt] Runtime listening for mailbox commands...
5,981,324 >>> mbox cmd response data (48 bytes)
5,981,325 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,984,108 >>> mbox cmd response data (48 bytes)
5,984,109 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,997,047 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,575 ready_for_fw is high
1,055,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,853 >>> mbox cmd response: success
2,685,245 UART:
2,685,261 UART: Running Caliptra FMC ...
2,685,669 UART:
2,685,812 UART: [state] CFI Enabled
2,695,949 UART: [fht] FMC Alias Private Key: 7
2,804,014 UART: [art] Extend RT PCRs Done
2,804,442 UART: [art] Lock RT PCRs Done
2,805,726 UART: [art] Populate DV Done
2,813,993 UART: [fht] FMC Alias Private Key: 7
2,815,041 UART: [art] Derive CDI
2,815,321 UART: [art] Store in in slot 0x4
2,901,080 UART: [art] Derive Key Pair
2,901,440 UART: [art] Store priv key in slot 0x5
2,915,450 UART: [art] Derive Key Pair - Done
2,930,355 UART: [art] Signing Cert with AUTHO
2,930,835 UART: RITY.KEYID = 7
2,945,823 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,588 UART: [art] PUB.X = 130FA177E20D099F003745F6ABA6F1F0F90F27F8C4CE870F4011BB9389269E0CD0C9BB8DFB8E90F945A3A4477BF40021
2,953,304 UART: [art] PUB.Y = E0C7CB61B6151675708C697EEB772CD1F1214BFF6FA828D3E01B1E9C330CB69E4F46317E7158E9FBF46378DA1B5E080B
2,960,255 UART: [art] SIG.R = 913E785E8FDC255A1A95284CCA2C175BD73BB047641592AC8AEB013615387596C8B58D319A7BDE18AEB5EAAD19360D75
2,967,027 UART: [art] SIG.S = 2ED0D35FCF9857E8F727B232C60C06B98FFDB7B5CF042AB9F78E3D6F567633D6BB375CA102E35C1A8F369A124CEED8CB
2,990,786 UART: Caliptra RT
2,991,131 UART: [state] CFI Enabled
3,098,892 UART: [rt] RT listening for mailbox commands...
3,099,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,166 UART: [rt]cmd =0x41545348, len=116
3,132,044 >>> mbox cmd response data (12 bytes)
3,132,045 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,104,711 >>> mbox cmd response: success
5,104,711 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,117,929 UART:
5,117,945 UART: Running Caliptra FMC ...
5,118,353 UART:
5,118,496 UART: [state] CFI Enabled
5,207,827 UART: [art] Extend RT PCRs Done
5,208,255 UART: [art] Lock RT PCRs Done
5,209,382 UART: [art] Populate DV Done
5,217,641 UART: [fht] FMC Alias Private Key: 7
5,218,793 UART: [art] Derive CDI
5,219,073 UART: [art] Store in in slot 0x4
5,304,906 UART: [art] Derive Key Pair
5,305,266 UART: [art] Store priv key in slot 0x5
5,318,374 UART: [art] Derive Key Pair - Done
5,333,212 UART: [art] Signing Cert with AUTHO
5,333,692 UART: RITY.KEYID = 7
5,349,144 UART: [art] Erasing AUTHORITY.KEYID = 7
5,349,909 UART: [art] PUB.X = F2155BAC3E32B9A7A9517991E453CDB51011B1443A4A4FDF42C7C6527DB2E36D2D8D5EB4D618971B5D019C8A7AA05C48
5,356,686 UART: [art] PUB.Y = BBC2D5E6B0E11CA06BAD3E0C203146BBB2A255F2DBDFB3084ADA2A9F71400500D3CC74E2D3E1D303C9183CF05DF48E3D
5,363,626 UART: [art] SIG.R = FE7D1355F0AE1D92C8CA219A8A966836222B04ABB7ABBB24DEB8B707BA037F7A210F342471D7CBC0889CA4CA35D81946
5,370,398 UART: [art] SIG.S = B00C65D1DBDCA3B19619C2C3DF82A9D8C3A7F1C664189840B17C5F83B75EA176D40BC55098A2821AEFDAF14448BE581F
5,394,153 UART: mbox::rt_entry...
5,394,525 UART: ____ _ _ _ ____ _____
5,395,309 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,396,109 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,396,877 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,397,645 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,398,413 UART: |_|
5,398,725 UART:
5,677,308 UART: [rt] Runtime listening for mailbox commands...
5,678,498 >>> mbox cmd response data (48 bytes)
5,678,499 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,681,282 >>> mbox cmd response data (48 bytes)
5,681,283 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,694,221 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,149 UART:
192,506 UART: Running Caliptra ROM ...
193,653 UART:
193,800 UART: [state] CFI Enabled
262,662 UART: [state] LifecycleState = Unprovisioned
264,643 UART: [state] DebugLocked = No
266,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,055 UART: [kat] SHA2-256
440,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,243 UART: [kat] ++
451,715 UART: [kat] sha1
462,872 UART: [kat] SHA2-256
465,518 UART: [kat] SHA2-384
471,790 UART: [kat] SHA2-512-ACC
474,164 UART: [kat] ECC-384
2,767,039 UART: [kat] HMAC-384Kdf
2,779,202 UART: [kat] LMS
3,969,479 UART: [kat] --
3,976,548 UART: [cold-reset] ++
3,977,847 UART: [fht] Storing FHT @ 0x50003400
3,989,546 UART: [idev] ++
3,990,184 UART: [idev] CDI.KEYID = 6
3,991,110 UART: [idev] SUBJECT.KEYID = 7
3,992,352 UART: [idev] UDS.KEYID = 0
3,993,330 ready_for_fw is high
3,993,527 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,066 UART: [idev] Erasing UDS.KEYID = 0
7,325,605 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,453 UART: [idev] --
7,349,524 UART: [ldev] ++
7,350,101 UART: [ldev] CDI.KEYID = 6
7,351,115 UART: [ldev] SUBJECT.KEYID = 5
7,352,270 UART: [ldev] AUTHORITY.KEYID = 7
7,353,498 UART: [ldev] FE.KEYID = 1
7,381,063 UART: [ldev] Erasing FE.KEYID = 1
10,715,415 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,541 UART: [ldev] --
13,092,952 UART: [fwproc] Waiting for Commands...
13,094,945 UART: [fwproc] Received command 0x46574c44
13,097,137 UART: [fwproc] Received Image of size 114124 bytes
17,149,728 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,597 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,604,258 >>> mbox cmd response: success
17,608,281 UART: [afmc] ++
17,608,881 UART: [afmc] CDI.KEYID = 6
17,609,800 UART: [afmc] SUBJECT.KEYID = 7
17,611,019 UART: [afmc] AUTHORITY.KEYID = 5
20,984,116 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,831 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,103 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,472 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,308 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,808 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,556 UART: [afmc] --
23,357,030 UART: [cold-reset] --
23,360,682 UART: [state] Locking Datavault
23,364,910 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,663 UART: [state] Locking ICCM
23,368,006 UART: [exit] Launching FMC @ 0x40000130
23,376,406 UART:
23,376,649 UART: Running Caliptra FMC ...
23,377,754 UART:
23,377,919 UART: [state] CFI Enabled
23,443,556 UART: [fht] FMC Alias Private Key: 7
25,781,468 UART: [art] Extend RT PCRs Done
25,782,704 UART: [art] Lock RT PCRs Done
25,784,438 UART: [art] Populate DV Done
25,789,800 UART: [fht] FMC Alias Private Key: 7
25,791,558 UART: [art] Derive CDI
25,792,374 UART: [art] Store in in slot 0x4
25,850,933 UART: [art] Derive Key Pair
25,851,980 UART: [art] Store priv key in slot 0x5
29,144,481 UART: [art] Derive Key Pair - Done
29,157,956 UART: [art] Signing Cert with AUTHO
29,159,286 UART: RITY.KEYID = 7
31,447,002 UART: [art] Erasing AUTHORITY.KEYID = 7
31,448,529 UART: [art] PUB.X = C2AD345328665890B8D3DD8C51EAC556C1289ACD8D40E403D264D33E8823F5730DAAFFA7EDCEE613CDF610D0B9651F7A
31,455,783 UART: [art] PUB.Y = 1CF4324F331D5CAFCF7B0D699F4E0C7E25CF478559B43B524382298005AFF5ADF3E5B72F59380D63926834B8F7AFDC47
31,463,008 UART: [art] SIG.R = 0DA15395147631B782BBD5A42D6EBE965F77183D8642B665CBCC5A7CE11D098AF866616DFF844D3FACEC7840F42490F9
31,470,412 UART: [art] SIG.S = 9FEEFB40104886DD69AD52F1A75DDC412CDA4977C9C690CF31C21A2D67A7A87D4EDDCA3229A5E1D506F221450A6A6D2B
32,775,448 UART: Caliptra RT
32,776,177 UART: [state] CFI Enabled
32,937,255 UART: [rt] RT listening for mailbox commands...
37,113,068 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,268,374 UART: [rt]cmd =0x41544d4e, len=14344
42,503,687 >>> mbox cmd response data (8 bytes)
42,504,261 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,535,007 UART: [rt]cmd =0x41545348, len=116
42,537,362 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,785,614 ready_for_fw is high
3,786,022 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,871,380 >>> mbox cmd response: success
23,572,143 UART:
23,572,530 UART: Running Caliptra FMC ...
23,573,673 UART:
23,573,837 UART: [state] CFI Enabled
23,638,329 UART: [fht] FMC Alias Private Key: 7
25,976,792 UART: [art] Extend RT PCRs Done
25,978,018 UART: [art] Lock RT PCRs Done
25,979,819 UART: [art] Populate DV Done
25,985,181 UART: [fht] FMC Alias Private Key: 7
25,986,856 UART: [art] Derive CDI
25,987,677 UART: [art] Store in in slot 0x4
26,047,059 UART: [art] Derive Key Pair
26,048,113 UART: [art] Store priv key in slot 0x5
29,341,247 UART: [art] Derive Key Pair - Done
29,354,153 UART: [art] Signing Cert with AUTHO
29,355,455 UART: RITY.KEYID = 7
31,643,340 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,852 UART: [art] PUB.X = B4718240A8935CE574D97513886531897CADDAE59CBC90F271B447947AAF312BEC2F9457373978717C509199B64909B0
31,652,072 UART: [art] PUB.Y = 6D8ED26FA17F11B1B73EB4F2D50F9A26C10F913F80C11A19CE8417ACC9B1FE7EAFE9885EEA0EBF5D49E3CCE830B65BCB
31,659,354 UART: [art] SIG.R = FA8A528206E078356F6A9810D7D015A541AB4A4A9D5FBE430ACE5B72BA12F3B88EC77435E2893CD083182C1DC4FD871D
31,666,714 UART: [art] SIG.S = D553E366405284C13E7274B1065D61B5B7C0A0903CE99B664151C7F91C41B0C70B9C4B253FC2F1307B0BCDD6473059EE
32,971,497 UART: Caliptra RT
32,972,200 UART: [state] CFI Enabled
33,132,802 UART: [rt] RT listening for mailbox commands...
37,307,192 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,462,524 UART: [rt]cmd =0x41544d4e, len=14344
42,698,510 >>> mbox cmd response data (8 bytes)
42,699,085 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,729,991 UART: [rt]cmd =0x41545348, len=116
42,732,199 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,082 writing to cptra_bootfsm_go
193,194 UART:
193,589 UART: Running Caliptra ROM ...
194,767 UART:
604,275 UART: [state] CFI Enabled
621,634 UART: [state] LifecycleState = Unprovisioned
623,561 UART: [state] DebugLocked = No
625,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,273 UART: [kat] SHA2-256
801,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,587 UART: [kat] ++
812,033 UART: [kat] sha1
823,892 UART: [kat] SHA2-256
826,605 UART: [kat] SHA2-384
832,094 UART: [kat] SHA2-512-ACC
834,455 UART: [kat] ECC-384
3,120,964 UART: [kat] HMAC-384Kdf
3,132,610 UART: [kat] LMS
4,322,708 UART: [kat] --
4,327,442 UART: [cold-reset] ++
4,330,012 UART: [fht] Storing FHT @ 0x50003400
4,341,271 UART: [idev] ++
4,341,840 UART: [idev] CDI.KEYID = 6
4,342,720 UART: [idev] SUBJECT.KEYID = 7
4,344,028 UART: [idev] UDS.KEYID = 0
4,345,020 ready_for_fw is high
4,345,253 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,488,659 UART: [idev] Erasing UDS.KEYID = 0
7,629,289 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,126 UART: [idev] --
7,654,737 UART: [ldev] ++
7,655,297 UART: [ldev] CDI.KEYID = 6
7,656,229 UART: [ldev] SUBJECT.KEYID = 5
7,657,486 UART: [ldev] AUTHORITY.KEYID = 7
7,658,732 UART: [ldev] FE.KEYID = 1
7,667,827 UART: [ldev] Erasing FE.KEYID = 1
10,956,704 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,223 UART: [ldev] --
13,318,569 UART: [fwproc] Waiting for Commands...
13,320,713 UART: [fwproc] Received command 0x46574c44
13,322,885 UART: [fwproc] Received Image of size 114124 bytes
17,376,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,048 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,840,048 >>> mbox cmd response: success
17,843,503 UART: [afmc] ++
17,844,157 UART: [afmc] CDI.KEYID = 6
17,845,069 UART: [afmc] SUBJECT.KEYID = 7
17,846,289 UART: [afmc] AUTHORITY.KEYID = 5
21,159,313 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,044 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,302 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,694 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,512 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,974 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,744 UART: [afmc] --
23,524,425 UART: [cold-reset] --
23,530,076 UART: [state] Locking Datavault
23,536,190 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,944 UART: [state] Locking ICCM
23,540,466 UART: [exit] Launching FMC @ 0x40000130
23,548,860 UART:
23,549,119 UART: Running Caliptra FMC ...
23,550,219 UART:
23,550,376 UART: [state] CFI Enabled
23,558,150 UART: [fht] FMC Alias Private Key: 7
25,888,760 UART: [art] Extend RT PCRs Done
25,889,972 UART: [art] Lock RT PCRs Done
25,891,946 UART: [art] Populate DV Done
25,897,462 UART: [fht] FMC Alias Private Key: 7
25,899,116 UART: [art] Derive CDI
25,899,848 UART: [art] Store in in slot 0x4
25,942,658 UART: [art] Derive Key Pair
25,943,689 UART: [art] Store priv key in slot 0x5
29,185,948 UART: [art] Derive Key Pair - Done
29,198,999 UART: [art] Signing Cert with AUTHO
29,200,295 UART: RITY.KEYID = 7
31,479,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,043 UART: [art] PUB.X = 795B3EC1E46E6EC14957D72E616DD52E5BE591CA7DBFE348C760E8F61AA9251C3787D110AF93D0762D81D807D3F6B931
31,488,247 UART: [art] PUB.Y = 97C1C9321B3607E21FFF65A76D0AA76EFFCA92D43358C9B7C2F1BAFFBCF45E702269F8073697AA69FBD5DC8C96A7484E
31,495,515 UART: [art] SIG.R = 051D26DBF56DBE2CA6B108D5354291FA32241ADB830BD91B8853C6B82FAB6D21AD38E3A99475E15E88BEF7049534727E
31,502,884 UART: [art] SIG.S = 3C980FA4FB6DD4A2605FA5FEB7ABB22D64198B3FE79B6C1DBA2E4B5FF707A24A2A75EAA6537858DA4EA156F779DA0BB7
32,808,057 UART: Caliptra RT
32,808,775 UART: [state] CFI Enabled
32,927,131 UART: [rt] RT listening for mailbox commands...
36,953,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,108,991 UART: [rt]cmd =0x41544d4e, len=14344
42,344,471 >>> mbox cmd response data (8 bytes)
42,345,182 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,375,991 UART: [rt]cmd =0x41545348, len=116
42,377,983 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,137,886 ready_for_fw is high
4,138,271 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,780 >>> mbox cmd response: success
23,706,597 UART:
23,706,988 UART: Running Caliptra FMC ...
23,708,072 UART:
23,708,222 UART: [state] CFI Enabled
23,716,440 UART: [fht] FMC Alias Private Key: 7
26,047,153 UART: [art] Extend RT PCRs Done
26,048,377 UART: [art] Lock RT PCRs Done
26,049,818 UART: [art] Populate DV Done
26,055,071 UART: [fht] FMC Alias Private Key: 7
26,056,692 UART: [art] Derive CDI
26,057,512 UART: [art] Store in in slot 0x4
26,099,851 UART: [art] Derive Key Pair
26,100,900 UART: [art] Store priv key in slot 0x5
29,342,197 UART: [art] Derive Key Pair - Done
29,355,520 UART: [art] Signing Cert with AUTHO
29,356,818 UART: RITY.KEYID = 7
31,636,125 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,627 UART: [art] PUB.X = 8069376EF97B4212B3EF88817DF60059D1C2C4EB3300E93FBB7A8DF5C30743EA6CE1118E4CC868BB9D91A55D639ECC0F
31,644,872 UART: [art] PUB.Y = 18D384F9DD4CDCEB3B8391E03A69C3BD14914FF8CC201C66D01341C18A79654EE5AD60BA97694E22C55E830C623D9B7D
31,652,147 UART: [art] SIG.R = 8BCCC903E95CCA31BC2609BC5A8E352EC737959931202365F47DB00B5A0D0FA23ADD00529A6F7C00F5E31E04D4152BD2
31,659,641 UART: [art] SIG.S = E935AF596C53456060DC7A1964F5D941387F273B613999AA295DE07A08AB64569AA12683731B7C85A3BF59051F1550B8
32,964,289 UART: Caliptra RT
32,964,989 UART: [state] CFI Enabled
33,081,831 UART: [rt] RT listening for mailbox commands...
37,100,869 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,256,623 UART: [rt]cmd =0x41544d4e, len=14344
42,491,978 >>> mbox cmd response data (8 bytes)
42,492,567 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,523,354 UART: [rt]cmd =0x41545348, len=116
42,525,821 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,301 UART:
192,657 UART: Running Caliptra ROM ...
193,852 UART:
194,012 UART: [state] CFI Enabled
265,326 UART: [state] LifecycleState = Unprovisioned
267,178 UART: [state] DebugLocked = No
268,499 UART: [state] WD Timer not started. Device not locked for debugging
272,810 UART: [kat] SHA2-256
451,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,502 UART: [kat] ++
464,039 UART: [kat] sha1
474,785 UART: [kat] SHA2-256
477,856 UART: [kat] SHA2-384
483,917 UART: [kat] SHA2-512-ACC
486,920 UART: [kat] ECC-384
2,947,113 UART: [kat] HMAC-384Kdf
2,964,697 UART: [kat] LMS
3,494,131 UART: [kat] --
3,499,652 UART: [cold-reset] ++
3,502,089 UART: [fht] FHT @ 0x50003400
3,513,496 UART: [idev] ++
3,514,059 UART: [idev] CDI.KEYID = 6
3,514,973 UART: [idev] SUBJECT.KEYID = 7
3,516,146 UART: [idev] UDS.KEYID = 0
3,517,087 ready_for_fw is high
3,517,310 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,661,339 UART: [idev] Erasing UDS.KEYID = 0
6,019,358 UART: [idev] Sha1 KeyId Algorithm
6,042,160 UART: [idev] --
6,046,202 UART: [ldev] ++
6,046,771 UART: [ldev] CDI.KEYID = 6
6,047,663 UART: [ldev] SUBJECT.KEYID = 5
6,048,874 UART: [ldev] AUTHORITY.KEYID = 7
6,050,106 UART: [ldev] FE.KEYID = 1
6,092,080 UART: [ldev] Erasing FE.KEYID = 1
8,599,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,091 UART: [ldev] --
10,404,338 UART: [fwproc] Wait for Commands...
10,406,054 UART: [fwproc] Recv command 0x46574c44
10,408,151 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,883,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,124 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,270,885 >>> mbox cmd response: success
14,275,339 UART: [afmc] ++
14,275,930 UART: [afmc] CDI.KEYID = 6
14,276,836 UART: [afmc] SUBJECT.KEYID = 7
14,277,997 UART: [afmc] AUTHORITY.KEYID = 5
16,822,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,544,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,546,445 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,562,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,578,268 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,594,148 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,617,733 UART: [afmc] --
18,621,138 UART: [cold-reset] --
18,623,598 UART: [state] Locking Datavault
18,629,440 UART: [state] Locking PCR0, PCR1 and PCR31
18,631,081 UART: [state] Locking ICCM
18,632,577 UART: [exit] Launching FMC @ 0x40000130
18,640,971 UART:
18,641,210 UART: Running Caliptra FMC ...
18,642,309 UART:
18,642,470 UART: [state] CFI Enabled
18,702,193 UART: [fht] FMC Alias Private Key: 7
20,466,064 UART: [art] Extend RT PCRs Done
20,467,281 UART: [art] Lock RT PCRs Done
20,468,955 UART: [art] Populate DV Done
20,474,162 UART: [fht] FMC Alias Private Key: 7
20,475,807 UART: [art] Derive CDI
20,476,623 UART: [art] Store in in slot 0x4
20,535,068 UART: [art] Derive Key Pair
20,536,102 UART: [art] Store priv key in slot 0x5
22,998,859 UART: [art] Derive Key Pair - Done
23,011,953 UART: [art] Signing Cert with AUTHO
23,013,252 UART: RITY.KEYID = 7
24,724,641 UART: [art] Erasing AUTHORITY.KEYID = 7
24,726,145 UART: [art] PUB.X = 0A79B08707313C93FA1DEEA45A73F4E1133E7D0545AA4FF8E7AA37023F2EF5A411D63D47F3E505DA18E5CBEEFDA7AE5A
24,733,450 UART: [art] PUB.Y = 5147D31C962A405C7C337F99E596A5FAC0894746E1DDBC4678AF48858485A0561D7E5CB03E8BA22B052B1A82A501B777
24,740,689 UART: [art] SIG.R = 818C37EF13DCA961C1A66F678924DFF2550E91CE334B73EA85D7BF034DA6795007E9C5FEFF86BE6EC28D25C43AE28A2D
24,748,094 UART: [art] SIG.S = 387F8859E878E397B216782764757E343D0BFE5CED858B9962179679E598E14B5D4F73F00215E338449145E5B1E8648E
25,726,605 UART: Caliptra RT
25,727,299 UART: [state] CFI Enabled
25,892,605 UART: [rt] RT listening for mailbox commands...
29,932,702 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,088,836 UART: [rt]cmd =0x41544d4e, len=14344
34,019,603 >>> mbox cmd response data (8 bytes)
34,020,202 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,050,999 UART: [rt]cmd =0x41545348, len=116
34,053,315 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,381,563 ready_for_fw is high
3,381,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,084,723 >>> mbox cmd response: success
18,365,894 UART:
18,366,305 UART: Running Caliptra FMC ...
18,367,444 UART:
18,367,603 UART: [state] CFI Enabled
18,433,936 UART: [fht] FMC Alias Private Key: 7
20,197,757 UART: [art] Extend RT PCRs Done
20,198,982 UART: [art] Lock RT PCRs Done
20,200,716 UART: [art] Populate DV Done
20,206,037 UART: [fht] FMC Alias Private Key: 7
20,207,646 UART: [art] Derive CDI
20,208,462 UART: [art] Store in in slot 0x4
20,266,567 UART: [art] Derive Key Pair
20,267,612 UART: [art] Store priv key in slot 0x5
22,730,883 UART: [art] Derive Key Pair - Done
22,743,661 UART: [art] Signing Cert with AUTHO
22,744,967 UART: RITY.KEYID = 7
24,457,272 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,907 UART: [art] PUB.X = D972D3154C6CF93452EC3932A7ABC313F2046865A5D47FCEB71C9FFF82472F4B24F4BAEEDFF2427BF6EFF85D6D6AC8F2
24,466,104 UART: [art] PUB.Y = 18342DB72756E307FFC82C3A74489EFF5C8F826589D8345AD9DAEC0BB358F2CE39DE7813902EEFA61A01741D5495B2D9
24,473,357 UART: [art] SIG.R = EC25A847F0A336EF014581DEB956066D01DB35BD87E7AECDB91365E73BA54BEA682CEF34411B28CAF4D6A44524F79167
24,480,801 UART: [art] SIG.S = 7163C69430F49BE744D56B2AA2B98DE13743D24FE3F95A0252B381CE37B65EB11FE90B02610C4182FBE04A812B5B2215
25,459,655 UART: Caliptra RT
25,460,369 UART: [state] CFI Enabled
25,624,639 UART: [rt] RT listening for mailbox commands...
29,662,582 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,818,931 UART: [rt]cmd =0x41544d4e, len=14344
33,749,102 >>> mbox cmd response data (8 bytes)
33,749,694 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,780,322 UART: [rt]cmd =0x41545348, len=116
33,782,482 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,479 UART:
192,844 UART: Running Caliptra ROM ...
193,968 UART:
603,732 UART: [state] CFI Enabled
619,879 UART: [state] LifecycleState = Unprovisioned
621,753 UART: [state] DebugLocked = No
623,135 UART: [state] WD Timer not started. Device not locked for debugging
627,512 UART: [kat] SHA2-256
806,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,216 UART: [kat] ++
818,749 UART: [kat] sha1
830,194 UART: [kat] SHA2-256
833,263 UART: [kat] SHA2-384
840,098 UART: [kat] SHA2-512-ACC
843,292 UART: [kat] ECC-384
3,285,798 UART: [kat] HMAC-384Kdf
3,298,665 UART: [kat] LMS
3,828,178 UART: [kat] --
3,833,231 UART: [cold-reset] ++
3,834,726 UART: [fht] FHT @ 0x50003400
3,845,979 UART: [idev] ++
3,846,542 UART: [idev] CDI.KEYID = 6
3,847,441 UART: [idev] SUBJECT.KEYID = 7
3,848,676 UART: [idev] UDS.KEYID = 0
3,849,595 ready_for_fw is high
3,849,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,475 UART: [idev] Erasing UDS.KEYID = 0
6,322,510 UART: [idev] Sha1 KeyId Algorithm
6,346,684 UART: [idev] --
6,350,732 UART: [ldev] ++
6,351,320 UART: [ldev] CDI.KEYID = 6
6,352,231 UART: [ldev] SUBJECT.KEYID = 5
6,353,381 UART: [ldev] AUTHORITY.KEYID = 7
6,354,659 UART: [ldev] FE.KEYID = 1
6,363,319 UART: [ldev] Erasing FE.KEYID = 1
8,839,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,613 UART: [ldev] --
10,630,387 UART: [fwproc] Wait for Commands...
10,632,741 UART: [fwproc] Recv command 0x46574c44
10,634,826 UART: [fwproc] Recv'd Img size: 114448 bytes
14,043,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,117,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,186,478 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,505,605 >>> mbox cmd response: success
14,509,856 UART: [afmc] ++
14,510,440 UART: [afmc] CDI.KEYID = 6
14,511,316 UART: [afmc] SUBJECT.KEYID = 7
14,512,521 UART: [afmc] AUTHORITY.KEYID = 5
17,017,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,736,956 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,738,872 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,754,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,770,650 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,786,507 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,808,075 UART: [afmc] --
18,812,367 UART: [cold-reset] --
18,816,657 UART: [state] Locking Datavault
18,820,495 UART: [state] Locking PCR0, PCR1 and PCR31
18,822,210 UART: [state] Locking ICCM
18,824,897 UART: [exit] Launching FMC @ 0x40000130
18,833,342 UART:
18,833,571 UART: Running Caliptra FMC ...
18,834,663 UART:
18,834,812 UART: [state] CFI Enabled
18,843,185 UART: [fht] FMC Alias Private Key: 7
20,599,768 UART: [art] Extend RT PCRs Done
20,600,984 UART: [art] Lock RT PCRs Done
20,602,708 UART: [art] Populate DV Done
20,608,146 UART: [fht] FMC Alias Private Key: 7
20,609,632 UART: [art] Derive CDI
20,610,387 UART: [art] Store in in slot 0x4
20,652,914 UART: [art] Derive Key Pair
20,653,907 UART: [art] Store priv key in slot 0x5
23,080,704 UART: [art] Derive Key Pair - Done
23,093,829 UART: [art] Signing Cert with AUTHO
23,095,165 UART: RITY.KEYID = 7
24,800,558 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,055 UART: [art] PUB.X = 108C91E51A7806839721A7B282ED3A4D5F86342B803A18EE7E1798D6F2116B1B1B7923DF039AC5BA15EC8F65D9966241
24,809,331 UART: [art] PUB.Y = BC86E27A0750400A32440C3756F9C010575066C558B30F6CBBC96ADCB565666E1D2C5F2AEB96513EC3034AA1A26FE93C
24,816,600 UART: [art] SIG.R = 897C6F57E413C652E567D09AD6EFC61FCFFFCFCB3D281B9AF4B507629E901A38F3E8BB0C35BCB8A5338997C7F286099D
24,823,974 UART: [art] SIG.S = 5B43C1BD0F488124B0F7B656C5F81E5B2F0B9B97D10CF2C1CBC3A1772E939A588CDA575693CFC69CE1232727A56AA5A0
25,802,825 UART: Caliptra RT
25,803,669 UART: [state] CFI Enabled
25,920,462 UART: [rt] RT listening for mailbox commands...
29,941,684 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,097,071 UART: [rt]cmd =0x41544d4e, len=14344
34,027,627 >>> mbox cmd response data (8 bytes)
34,028,214 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,059,007 UART: [rt]cmd =0x41545348, len=116
34,061,307 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
3,696,609 ready_for_fw is high
3,696,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,231 >>> mbox cmd response: success
18,517,394 UART:
18,517,785 UART: Running Caliptra FMC ...
18,518,879 UART:
18,519,025 UART: [state] CFI Enabled
18,527,194 UART: [fht] FMC Alias Private Key: 7
20,283,657 UART: [art] Extend RT PCRs Done
20,284,877 UART: [art] Lock RT PCRs Done
20,287,007 UART: [art] Populate DV Done
20,292,470 UART: [fht] FMC Alias Private Key: 7
20,294,024 UART: [art] Derive CDI
20,294,755 UART: [art] Store in in slot 0x4
20,337,016 UART: [art] Derive Key Pair
20,338,059 UART: [art] Store priv key in slot 0x5
22,764,953 UART: [art] Derive Key Pair - Done
22,778,067 UART: [art] Signing Cert with AUTHO
22,779,366 UART: RITY.KEYID = 7
24,484,974 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,473 UART: [art] PUB.X = 01C32C1D6F02A976699EDDE5EAC8B2F80D0C2F729FB269897ECDDFA76FCB1CD5663F4C6C8C8DE27C6B9103C59907D211
24,493,766 UART: [art] PUB.Y = 5EF64B88B9FFDEC7D357F73808A503C00ED382225928FA8282FFC926534564D1DD0192942001EA3F41D281483E2B1EF9
24,500,975 UART: [art] SIG.R = 0375089D00D6B00519168B94F3538C5F117F35CC93896D6135CC8F0DAEBD4EB43ACE1A40AD01BFC973FD8410821FA5C3
24,508,354 UART: [art] SIG.S = 0523532B275B2D63A38F831FF8137713A0D5A89A45B0E26C3F7637E28BE1F6FAA1E2268622CC15EF846EF322763F9B62
25,487,748 UART: Caliptra RT
25,488,447 UART: [state] CFI Enabled
25,605,561 UART: [rt] RT listening for mailbox commands...
29,630,454 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,786,159 UART: [rt]cmd =0x41544d4e, len=14344
33,716,298 >>> mbox cmd response data (8 bytes)
33,716,873 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,747,613 UART: [rt]cmd =0x41545348, len=116
33,749,853 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,419,088 ready_for_fw is high
3,419,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,715,335 >>> mbox cmd response: success
19,006,848 UART:
19,007,270 UART: Running Caliptra FMC ...
19,008,436 UART:
19,008,604 UART: [state] CFI Enabled
19,073,999 UART: [fht] FMC Alias Private Key: 7
20,838,399 UART: [art] Extend RT PCRs Done
20,839,634 UART: [art] Lock RT PCRs Done
20,841,345 UART: [art] Populate DV Done
20,846,706 UART: [fht] FMC Alias Private Key: 7
20,848,411 UART: [art] Derive CDI
20,849,223 UART: [art] Store in in slot 0x4
20,907,141 UART: [art] Derive Key Pair
20,908,173 UART: [art] Store priv key in slot 0x5
23,371,105 UART: [art] Derive Key Pair - Done
23,383,819 UART: [art] Signing Cert with AUTHO
23,385,147 UART: RITY.KEYID = 7
25,096,351 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,861 UART: [art] PUB.X = FA18A1CD6D4323AC3850728C8CB58D0C9D91B4D4CD3F2C66F8F7F15EE76562B938D2CF32B8678BF991D178F0BC43E6A5
25,105,129 UART: [art] PUB.Y = 727BDC4268DD6D1A6BD8F6E72A5BB56D461891B8D7B7650254901FD4911DE7DA729F67612C2A32103E71472B795D9ACA
25,112,388 UART: [art] SIG.R = EFE8AC430BBA9A768931D918B4D1A7AFC45EFABBCBC83F5CE9DF938E26EC8A35BA3B474B3E9420C47EEAE7FE0C18FB47
25,119,778 UART: [art] SIG.S = 3333BBD4154C186B2EC517189B61929E88AEC4960D6A85B489B0AB4ED28A4A01C236F0CBA0CB9440BAF584984FEBBCDD
26,098,705 UART: Caliptra RT
26,099,415 UART: [state] CFI Enabled
26,265,137 UART: [rt] RT listening for mailbox commands...
30,307,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,463,918 UART: [rt]cmd =0x41544d4e, len=14344
34,394,633 >>> mbox cmd response data (8 bytes)
34,395,218 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,426,171 UART: [rt]cmd =0x41545348, len=116
34,428,303 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,752,470 ready_for_fw is high
3,752,851 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,721 >>> mbox cmd response: success
19,205,367 UART:
19,205,761 UART: Running Caliptra FMC ...
19,206,850 UART:
19,207,017 UART: [state] CFI Enabled
19,214,973 UART: [fht] FMC Alias Private Key: 7
20,971,531 UART: [art] Extend RT PCRs Done
20,972,757 UART: [art] Lock RT PCRs Done
20,974,661 UART: [art] Populate DV Done
20,980,007 UART: [fht] FMC Alias Private Key: 7
20,981,656 UART: [art] Derive CDI
20,982,384 UART: [art] Store in in slot 0x4
21,025,160 UART: [art] Derive Key Pair
21,026,188 UART: [art] Store priv key in slot 0x5
23,452,831 UART: [art] Derive Key Pair - Done
23,465,379 UART: [art] Signing Cert with AUTHO
23,466,706 UART: RITY.KEYID = 7
25,172,119 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,621 UART: [art] PUB.X = 6FEF40060F46E768DD0C8B96E93173C8B15D851B579664EBE115089CAF1DBC2574167B6EED31DF177B91360C35884F07
25,180,855 UART: [art] PUB.Y = 0809CFC4D83222F3E72EB6712C724ACDED7F5CA4FA44950672D8D9298A08751697F376B19C7D592A5502038AF1F39E8A
25,188,112 UART: [art] SIG.R = 78ECD6AAA37B51FE8721546ABAA600F50DF8D9DE2944E04DF1BE1B08EB1C1B7D51F9B4A8F966CA9EC8B9C44C8EB55A39
25,195,548 UART: [art] SIG.S = 67E8A00830263D074B20F51F3831A17909A40D393FCB3FB8F3D30D8E519311B15AAD536E42ACAEA901426B63CC0BA5F1
26,174,189 UART: Caliptra RT
26,174,878 UART: [state] CFI Enabled
26,291,569 UART: [rt] RT listening for mailbox commands...
30,313,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,469,337 UART: [rt]cmd =0x41544d4e, len=14344
34,399,847 >>> mbox cmd response data (8 bytes)
34,400,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,431,088 UART: [rt]cmd =0x41545348, len=116
34,433,275 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,077 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,717 UART: [kat] SHA2-256
881,648 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,763 UART: [kat] ++
885,915 UART: [kat] sha1
890,091 UART: [kat] SHA2-256
892,029 UART: [kat] SHA2-384
894,700 UART: [kat] SHA2-512-ACC
896,601 UART: [kat] ECC-384
902,450 UART: [kat] HMAC-384Kdf
906,880 UART: [kat] LMS
1,475,076 UART: [kat] --
1,475,833 UART: [cold-reset] ++
1,476,311 UART: [fht] Storing FHT @ 0x50003400
1,479,106 UART: [idev] ++
1,479,274 UART: [idev] CDI.KEYID = 6
1,479,634 UART: [idev] SUBJECT.KEYID = 7
1,480,058 UART: [idev] UDS.KEYID = 0
1,480,403 ready_for_fw is high
1,480,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,872 UART: [idev] Erasing UDS.KEYID = 0
1,504,216 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,858 UART: [idev] --
1,513,887 UART: [ldev] ++
1,514,055 UART: [ldev] CDI.KEYID = 6
1,514,418 UART: [ldev] SUBJECT.KEYID = 5
1,514,844 UART: [ldev] AUTHORITY.KEYID = 7
1,515,307 UART: [ldev] FE.KEYID = 1
1,520,513 UART: [ldev] Erasing FE.KEYID = 1
1,545,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,824 UART: [ldev] --
1,585,105 UART: [fwproc] Waiting for Commands...
1,585,758 UART: [fwproc] Received command 0x46574c44
1,586,549 UART: [fwproc] Received Image of size 114448 bytes
2,885,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,634 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,986 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,123 >>> mbox cmd response: success
3,079,139 UART: [afmc] ++
3,079,307 UART: [afmc] CDI.KEYID = 6
3,079,669 UART: [afmc] SUBJECT.KEYID = 7
3,080,094 UART: [afmc] AUTHORITY.KEYID = 5
3,115,257 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,537 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,317 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,930 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,620 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,479 UART: [afmc] --
3,158,567 UART: [cold-reset] --
3,159,445 UART: [state] Locking Datavault
3,160,434 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,038 UART: [state] Locking ICCM
3,161,702 UART: [exit] Launching FMC @ 0x40000130
3,167,031 UART:
3,167,047 UART: Running Caliptra FMC ...
3,167,455 UART:
3,167,509 UART: [state] CFI Enabled
3,177,882 UART: [fht] FMC Alias Private Key: 7
3,285,433 UART: [art] Extend RT PCRs Done
3,285,861 UART: [art] Lock RT PCRs Done
3,287,429 UART: [art] Populate DV Done
3,295,642 UART: [fht] FMC Alias Private Key: 7
3,296,688 UART: [art] Derive CDI
3,296,968 UART: [art] Store in in slot 0x4
3,382,689 UART: [art] Derive Key Pair
3,383,049 UART: [art] Store priv key in slot 0x5
3,396,399 UART: [art] Derive Key Pair - Done
3,411,323 UART: [art] Signing Cert with AUTHO
3,411,803 UART: RITY.KEYID = 7
3,427,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,048 UART: [art] PUB.X = D118A7168C7F79FD18EA739234BAC882602E3D1C46B1E813572E9439E93943C5B925FEBCD71E9E61CC11C6306D875C2C
3,434,822 UART: [art] PUB.Y = 614486DDD46239D2EC99757852C5D0E19811E23024093C6ACA236B25953FB7E8C8626A611463B47EF797B431E8D65A19
3,441,761 UART: [art] SIG.R = B91AD1CA3E29C8EA6E0561BE5476AA3FC6A161656965A13DC4F71B63B9B24B07007670ABD136E6A366EB810A221BF2E6
3,448,510 UART: [art] SIG.S = F6FFB01FE7AC127822B8FB4D65C14FC53EBFDF17B782E85D30A0758D6CB05C4EECB08CEF18DD15A612C595593E4C3895
3,472,381 UART: Caliptra RT
3,472,634 UART: [state] CFI Enabled
3,580,774 UART: [rt] RT listening for mailbox commands...
3,581,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,466 UART: [rt]cmd =0x41544d4e, len=14344
3,849,775 >>> mbox cmd response data (8 bytes)
3,849,776 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,869 UART: [rt]cmd =0x41545348, len=116
3,881,820 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,925 ready_for_fw is high
1,361,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,897 >>> mbox cmd response: success
2,989,615 UART:
2,989,631 UART: Running Caliptra FMC ...
2,990,039 UART:
2,990,093 UART: [state] CFI Enabled
3,001,004 UART: [fht] FMC Alias Private Key: 7
3,108,297 UART: [art] Extend RT PCRs Done
3,108,725 UART: [art] Lock RT PCRs Done
3,110,281 UART: [art] Populate DV Done
3,118,558 UART: [fht] FMC Alias Private Key: 7
3,119,566 UART: [art] Derive CDI
3,119,846 UART: [art] Store in in slot 0x4
3,205,215 UART: [art] Derive Key Pair
3,205,575 UART: [art] Store priv key in slot 0x5
3,218,519 UART: [art] Derive Key Pair - Done
3,233,627 UART: [art] Signing Cert with AUTHO
3,234,107 UART: RITY.KEYID = 7
3,249,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,966 UART: [art] PUB.X = 4D8CC60430DFCC3160469079743743120BABC9B4F29A1AF379F804E017984815B4A6D3B416F43038BA56524BF668981F
3,256,721 UART: [art] PUB.Y = 2D011C3B45BAB3FCB6A1420EF0403DFFD90DE72873EA3392BFCB3156A4CC97CEA68BA944C133C952B89F606A37E5BAD6
3,263,682 UART: [art] SIG.R = 480A16371E92BAAE17344D791FBB42A102A73E3CABC85FFCB7DF431EDF36E4FF78F1BC820D4A829192864028BCE390EE
3,270,459 UART: [art] SIG.S = DF939678279E5AB9A91AD0180CCA70A9B50787C87F89B2DC107BC4A0B8702B6453F2326BE70F0289712F464F192D0DB5
3,293,771 UART: Caliptra RT
3,294,024 UART: [state] CFI Enabled
3,401,641 UART: [rt] RT listening for mailbox commands...
3,402,311 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,289 UART: [rt]cmd =0x41544d4e, len=14344
3,670,150 >>> mbox cmd response data (8 bytes)
3,670,151 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,260 UART: [rt]cmd =0x41545348, len=116
3,701,861 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,350 UART: [kat] SHA2-256
882,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,396 UART: [kat] ++
886,548 UART: [kat] sha1
890,814 UART: [kat] SHA2-256
892,752 UART: [kat] SHA2-384
895,525 UART: [kat] SHA2-512-ACC
897,426 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,357 UART: [kat] LMS
1,475,553 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,476,920 UART: [fht] Storing FHT @ 0x50003400
1,479,745 UART: [idev] ++
1,479,913 UART: [idev] CDI.KEYID = 6
1,480,273 UART: [idev] SUBJECT.KEYID = 7
1,480,697 UART: [idev] UDS.KEYID = 0
1,481,042 ready_for_fw is high
1,481,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,749 UART: [idev] Erasing UDS.KEYID = 0
1,505,609 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,231 UART: [idev] --
1,515,292 UART: [ldev] ++
1,515,460 UART: [ldev] CDI.KEYID = 6
1,515,823 UART: [ldev] SUBJECT.KEYID = 5
1,516,249 UART: [ldev] AUTHORITY.KEYID = 7
1,516,712 UART: [ldev] FE.KEYID = 1
1,522,000 UART: [ldev] Erasing FE.KEYID = 1
1,547,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,173 UART: [ldev] --
1,586,506 UART: [fwproc] Waiting for Commands...
1,587,271 UART: [fwproc] Received command 0x46574c44
1,588,062 UART: [fwproc] Received Image of size 114448 bytes
2,887,425 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,293 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,645 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,782 >>> mbox cmd response: success
3,081,002 UART: [afmc] ++
3,081,170 UART: [afmc] CDI.KEYID = 6
3,081,532 UART: [afmc] SUBJECT.KEYID = 7
3,081,957 UART: [afmc] AUTHORITY.KEYID = 5
3,117,486 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,982 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,762 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,375 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,065 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,100 UART: [afmc] --
3,161,078 UART: [cold-reset] --
3,161,930 UART: [state] Locking Datavault
3,163,169 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,773 UART: [state] Locking ICCM
3,164,233 UART: [exit] Launching FMC @ 0x40000130
3,169,562 UART:
3,169,578 UART: Running Caliptra FMC ...
3,169,986 UART:
3,170,129 UART: [state] CFI Enabled
3,180,538 UART: [fht] FMC Alias Private Key: 7
3,288,631 UART: [art] Extend RT PCRs Done
3,289,059 UART: [art] Lock RT PCRs Done
3,290,671 UART: [art] Populate DV Done
3,298,768 UART: [fht] FMC Alias Private Key: 7
3,299,718 UART: [art] Derive CDI
3,299,998 UART: [art] Store in in slot 0x4
3,386,009 UART: [art] Derive Key Pair
3,386,369 UART: [art] Store priv key in slot 0x5
3,399,321 UART: [art] Derive Key Pair - Done
3,414,288 UART: [art] Signing Cert with AUTHO
3,414,768 UART: RITY.KEYID = 7
3,429,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,439 UART: [art] PUB.X = 4957EFC17584382292AC04A9DC9E626B07CE78EEABB8D9555D8DD1C7ED8A4053191122B4849C3DFC6D0C03CD2AFE8BDC
3,437,215 UART: [art] PUB.Y = 7FB6EFC32B4FCA1E1879B213DA81CC439D4C75807BFD7F19F007E42FB88A19A062837C697807106AAB6F3DB1A38D0D65
3,444,168 UART: [art] SIG.R = 39E570D400C0120B88C740BD1BABEF3AD5EC11991C5AA2A2524BF978D90E7C2858D766C2E227D8A0408D1A545B40DBB1
3,450,920 UART: [art] SIG.S = FA8E16713AF615DF2B39D92183E30BAA5563C00CCF2EBF2D2A1DE99914044C98B631A2BDB630023F6B6D857A811F1449
3,474,907 UART: Caliptra RT
3,475,252 UART: [state] CFI Enabled
3,583,483 UART: [rt] RT listening for mailbox commands...
3,584,153 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,275 UART: [rt]cmd =0x41544d4e, len=14344
3,852,266 >>> mbox cmd response data (8 bytes)
3,852,267 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,404 UART: [rt]cmd =0x41545348, len=116
3,883,985 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,126 ready_for_fw is high
1,363,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,776 >>> mbox cmd response: success
2,992,450 UART:
2,992,466 UART: Running Caliptra FMC ...
2,992,874 UART:
2,993,017 UART: [state] CFI Enabled
3,003,720 UART: [fht] FMC Alias Private Key: 7
3,111,795 UART: [art] Extend RT PCRs Done
3,112,223 UART: [art] Lock RT PCRs Done
3,113,957 UART: [art] Populate DV Done
3,122,198 UART: [fht] FMC Alias Private Key: 7
3,123,172 UART: [art] Derive CDI
3,123,452 UART: [art] Store in in slot 0x4
3,209,357 UART: [art] Derive Key Pair
3,209,717 UART: [art] Store priv key in slot 0x5
3,223,015 UART: [art] Derive Key Pair - Done
3,237,494 UART: [art] Signing Cert with AUTHO
3,237,974 UART: RITY.KEYID = 7
3,253,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,449 UART: [art] PUB.X = 048EFE3096135495878EA7AEAD09532EAB984F3D70A0320D6DEEEC03B8EE871ECDE89927C030FD56B4229FB62DBD58C6
3,261,221 UART: [art] PUB.Y = 8587133580876E3FE3828660F157573CF6A083C26D4F757F83C13526A4D6F7EFE48706BF75B976C6B15997A9C0425AE1
3,268,160 UART: [art] SIG.R = 372C055BDEC32E6559799CDB960B4218B3A379D0794392D39FB1B05893DD5D7507DD93DB9BF6623444CD65CA8C5933EC
3,274,925 UART: [art] SIG.S = D000E88C24706DE8B2A9862DD40D718CE662569434379CF7E35CBD9E79E7275A347EB6C8E9E9F0B01FAD95E18F02DDD5
3,298,788 UART: Caliptra RT
3,299,133 UART: [state] CFI Enabled
3,406,770 UART: [rt] RT listening for mailbox commands...
3,407,440 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,720 UART: [rt]cmd =0x41544d4e, len=14344
3,675,361 >>> mbox cmd response data (8 bytes)
3,675,362 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,313 UART: [rt]cmd =0x41545348, len=116
3,706,884 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
893,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,587 UART: [kat] ++
897,739 UART: [kat] sha1
901,987 UART: [kat] SHA2-256
903,927 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,242 UART: [kat] HMAC-384Kdf
922,702 UART: [kat] LMS
1,171,030 UART: [kat] --
1,171,957 UART: [cold-reset] ++
1,172,385 UART: [fht] FHT @ 0x50003400
1,175,118 UART: [idev] ++
1,175,286 UART: [idev] CDI.KEYID = 6
1,175,646 UART: [idev] SUBJECT.KEYID = 7
1,176,070 UART: [idev] UDS.KEYID = 0
1,176,415 ready_for_fw is high
1,176,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,024 UART: [idev] Erasing UDS.KEYID = 0
1,201,483 UART: [idev] Sha1 KeyId Algorithm
1,209,839 UART: [idev] --
1,210,813 UART: [ldev] ++
1,210,981 UART: [ldev] CDI.KEYID = 6
1,211,344 UART: [ldev] SUBJECT.KEYID = 5
1,211,770 UART: [ldev] AUTHORITY.KEYID = 7
1,212,233 UART: [ldev] FE.KEYID = 1
1,217,561 UART: [ldev] Erasing FE.KEYID = 1
1,243,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,983 UART: [ldev] --
1,282,472 UART: [fwproc] Wait for Commands...
1,283,058 UART: [fwproc] Recv command 0x46574c44
1,283,786 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,930 >>> mbox cmd response: success
2,777,964 UART: [afmc] ++
2,778,132 UART: [afmc] CDI.KEYID = 6
2,778,494 UART: [afmc] SUBJECT.KEYID = 7
2,778,919 UART: [afmc] AUTHORITY.KEYID = 5
2,814,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,161 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,046 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,765 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,501 UART: [afmc] --
2,857,469 UART: [cold-reset] --
2,858,241 UART: [state] Locking Datavault
2,859,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,256 UART: [state] Locking ICCM
2,860,714 UART: [exit] Launching FMC @ 0x40000130
2,866,043 UART:
2,866,059 UART: Running Caliptra FMC ...
2,866,467 UART:
2,866,521 UART: [state] CFI Enabled
2,877,220 UART: [fht] FMC Alias Private Key: 7
2,984,711 UART: [art] Extend RT PCRs Done
2,985,139 UART: [art] Lock RT PCRs Done
2,986,959 UART: [art] Populate DV Done
2,995,058 UART: [fht] FMC Alias Private Key: 7
2,996,168 UART: [art] Derive CDI
2,996,448 UART: [art] Store in in slot 0x4
3,082,459 UART: [art] Derive Key Pair
3,082,819 UART: [art] Store priv key in slot 0x5
3,096,171 UART: [art] Derive Key Pair - Done
3,111,192 UART: [art] Signing Cert with AUTHO
3,111,672 UART: RITY.KEYID = 7
3,127,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,871 UART: [art] PUB.X = 08EDE2BABD2AFCA5CEB50CE9B1E299EC4D39F77ADB44A2975E61667CAD7CB4001D4B101D04BCBD029FD615FA2DC30D7E
3,134,636 UART: [art] PUB.Y = 95BE189FDD4FAB584A608320525D6FC2C81A3611DCD77C0222DDAAD4C99DFDF8C3FCFA2B00F3546D0F0CA17D264AF95B
3,141,579 UART: [art] SIG.R = 43762848CE4E0186E126BB83A4F762A9FC4B854670E82B208BF1B67D278A91E3490D0A66D7468B0654036B26FEC169F7
3,148,330 UART: [art] SIG.S = 99CBD8E4DCE086E4FC7D533407FFCEF3AB3C978DEFC71C7E2B6D26F568C0D64A858B874FA209582D571DB5025D8E146E
3,172,034 UART: Caliptra RT
3,172,287 UART: [state] CFI Enabled
3,280,552 UART: [rt] RT listening for mailbox commands...
3,281,222 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,136 UART: [rt]cmd =0x41544d4e, len=14344
3,548,249 >>> mbox cmd response data (8 bytes)
3,548,250 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,377 UART: [rt]cmd =0x41545348, len=116
3,580,400 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,783 ready_for_fw is high
1,060,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,873 >>> mbox cmd response: success
2,691,521 UART:
2,691,537 UART: Running Caliptra FMC ...
2,691,945 UART:
2,691,999 UART: [state] CFI Enabled
2,702,404 UART: [fht] FMC Alias Private Key: 7
2,809,865 UART: [art] Extend RT PCRs Done
2,810,293 UART: [art] Lock RT PCRs Done
2,812,007 UART: [art] Populate DV Done
2,820,218 UART: [fht] FMC Alias Private Key: 7
2,821,278 UART: [art] Derive CDI
2,821,558 UART: [art] Store in in slot 0x4
2,907,441 UART: [art] Derive Key Pair
2,907,801 UART: [art] Store priv key in slot 0x5
2,921,303 UART: [art] Derive Key Pair - Done
2,936,077 UART: [art] Signing Cert with AUTHO
2,936,557 UART: RITY.KEYID = 7
2,951,855 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,620 UART: [art] PUB.X = 5D29EC7FEB665F9CF8FCC7FA1D3C7E02648072694FB47B1B1A8D82F42DE45A24191445104EE64DD6E77E4039B7703742
2,959,393 UART: [art] PUB.Y = EA44EE1708D75EC3609B724B2A6F1E228AE987B053CAB7B25D91F6FD37325D41E6660C7E85326BFC4ADEFB6540B0C167
2,966,349 UART: [art] SIG.R = 3DC656D0D5443458918CF4A2365DFA1C039964A340E52896C0076C5089AB9DB40171A1427415FD86658509AC8EA04226
2,973,097 UART: [art] SIG.S = 19CBACDBD1F66C47AC7F29A98691231E1F0B3AE3E64024BD62F3998A4C73203154D930B66A517B34E40ECEA5D7C9949F
2,996,396 UART: Caliptra RT
2,996,649 UART: [state] CFI Enabled
3,105,342 UART: [rt] RT listening for mailbox commands...
3,106,012 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,860 UART: [rt]cmd =0x41544d4e, len=14344
3,373,167 >>> mbox cmd response data (8 bytes)
3,373,168 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,999 UART: [rt]cmd =0x41545348, len=116
3,404,838 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
893,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,930 UART: [kat] ++
898,082 UART: [kat] sha1
902,236 UART: [kat] SHA2-256
904,176 UART: [kat] SHA2-384
906,965 UART: [kat] SHA2-512-ACC
908,866 UART: [kat] ECC-384
918,553 UART: [kat] HMAC-384Kdf
923,207 UART: [kat] LMS
1,171,535 UART: [kat] --
1,172,210 UART: [cold-reset] ++
1,172,566 UART: [fht] FHT @ 0x50003400
1,175,319 UART: [idev] ++
1,175,487 UART: [idev] CDI.KEYID = 6
1,175,847 UART: [idev] SUBJECT.KEYID = 7
1,176,271 UART: [idev] UDS.KEYID = 0
1,176,616 ready_for_fw is high
1,176,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,213 UART: [idev] Erasing UDS.KEYID = 0
1,200,912 UART: [idev] Sha1 KeyId Algorithm
1,209,380 UART: [idev] --
1,210,484 UART: [ldev] ++
1,210,652 UART: [ldev] CDI.KEYID = 6
1,211,015 UART: [ldev] SUBJECT.KEYID = 5
1,211,441 UART: [ldev] AUTHORITY.KEYID = 7
1,211,904 UART: [ldev] FE.KEYID = 1
1,217,060 UART: [ldev] Erasing FE.KEYID = 1
1,243,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,192 UART: [ldev] --
1,282,547 UART: [fwproc] Wait for Commands...
1,283,263 UART: [fwproc] Recv command 0x46574c44
1,283,991 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,741 >>> mbox cmd response: success
2,775,791 UART: [afmc] ++
2,775,959 UART: [afmc] CDI.KEYID = 6
2,776,321 UART: [afmc] SUBJECT.KEYID = 7
2,776,746 UART: [afmc] AUTHORITY.KEYID = 5
2,812,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,222 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,107 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,826 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,530 UART: [afmc] --
2,855,452 UART: [cold-reset] --
2,856,252 UART: [state] Locking Datavault
2,857,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,013 UART: [state] Locking ICCM
2,858,513 UART: [exit] Launching FMC @ 0x40000130
2,863,842 UART:
2,863,858 UART: Running Caliptra FMC ...
2,864,266 UART:
2,864,409 UART: [state] CFI Enabled
2,875,048 UART: [fht] FMC Alias Private Key: 7
2,983,151 UART: [art] Extend RT PCRs Done
2,983,579 UART: [art] Lock RT PCRs Done
2,985,227 UART: [art] Populate DV Done
2,993,390 UART: [fht] FMC Alias Private Key: 7
2,994,550 UART: [art] Derive CDI
2,994,830 UART: [art] Store in in slot 0x4
3,080,195 UART: [art] Derive Key Pair
3,080,555 UART: [art] Store priv key in slot 0x5
3,093,735 UART: [art] Derive Key Pair - Done
3,108,480 UART: [art] Signing Cert with AUTHO
3,108,960 UART: RITY.KEYID = 7
3,124,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,085 UART: [art] PUB.X = 64615F6E39BDA8F3B583A80BCB6B6A364E8D86C946CD6BFC6F8A1E86B9754EC03763375C85FD7DBDE97E6436F25FBF19
3,131,868 UART: [art] PUB.Y = 3933EA2088E3E26B372F41E80DFEDECF8E7DD1541DA10948B84DC3F591C6A7E52BBC2375D4D379637DE66F2F7FD9ECAA
3,138,832 UART: [art] SIG.R = DF023063A4066DB4B98056A1105207313999F2D52F6A76E9818164B3A29C4EA7BE79AF58E6383F6152AF0B222D76617B
3,145,584 UART: [art] SIG.S = 50F61FC88A2F6984BD1B9C7697438901E3673BEB5B7F3CCBE2A61A8842F77C235D265AB459F6B5EFA49245443279454F
3,169,402 UART: Caliptra RT
3,169,747 UART: [state] CFI Enabled
3,278,120 UART: [rt] RT listening for mailbox commands...
3,278,790 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,656 UART: [rt]cmd =0x41544d4e, len=14344
3,546,595 >>> mbox cmd response data (8 bytes)
3,546,596 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,757 UART: [rt]cmd =0x41545348, len=116
3,578,618 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,944 ready_for_fw is high
1,060,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,814 >>> mbox cmd response: success
2,691,300 UART:
2,691,316 UART: Running Caliptra FMC ...
2,691,724 UART:
2,691,867 UART: [state] CFI Enabled
2,702,320 UART: [fht] FMC Alias Private Key: 7
2,810,733 UART: [art] Extend RT PCRs Done
2,811,161 UART: [art] Lock RT PCRs Done
2,812,697 UART: [art] Populate DV Done
2,820,926 UART: [fht] FMC Alias Private Key: 7
2,822,094 UART: [art] Derive CDI
2,822,374 UART: [art] Store in in slot 0x4
2,908,101 UART: [art] Derive Key Pair
2,908,461 UART: [art] Store priv key in slot 0x5
2,921,991 UART: [art] Derive Key Pair - Done
2,936,852 UART: [art] Signing Cert with AUTHO
2,937,332 UART: RITY.KEYID = 7
2,952,526 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,291 UART: [art] PUB.X = 90CD047A801849DCDC3B1325890E8D18028A79530AC4EB4FD2C63BC01308F4CFD37A73086D89DBEC2376246A64845E03
2,960,042 UART: [art] PUB.Y = 6577A529FA9FDEB66C2DF0279253C3F099F698F23EAFAA936950635A73FF400363FE5A699E8FC05F4D9CA5CB50FAAEBC
2,967,007 UART: [art] SIG.R = C5E7D25AD890FA72FB552F8BA9A58D045EC860A55F89E7B88285BFBA28BCA5253CACCAE4F225538E5112CA063A20D9EF
2,973,791 UART: [art] SIG.S = 57B50AB2984E0741B4C2812DF18A258CED1E9B9AA81D30152A0233F18FCB3B6D07F4D4B8EC5B9742D8633B56FEF61AAE
2,997,828 UART: Caliptra RT
2,998,173 UART: [state] CFI Enabled
3,105,492 UART: [rt] RT listening for mailbox commands...
3,106,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,126 UART: [rt]cmd =0x41544d4e, len=14344
3,374,207 >>> mbox cmd response data (8 bytes)
3,374,208 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,435 UART: [rt]cmd =0x41545348, len=116
3,406,376 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
916,134 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,249 UART: [idev] ++
1,173,417 UART: [idev] CDI.KEYID = 6
1,173,778 UART: [idev] SUBJECT.KEYID = 7
1,174,203 UART: [idev] UDS.KEYID = 0
1,174,549 ready_for_fw is high
1,174,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,198,949 UART: [idev] Sha1 KeyId Algorithm
1,207,913 UART: [idev] --
1,209,014 UART: [ldev] ++
1,209,182 UART: [ldev] CDI.KEYID = 6
1,209,546 UART: [ldev] SUBJECT.KEYID = 5
1,209,973 UART: [ldev] AUTHORITY.KEYID = 7
1,210,436 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,241,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,402 UART: [ldev] --
1,280,822 UART: [fwproc] Wait for Commands...
1,281,479 UART: [fwproc] Recv command 0x46574c44
1,282,212 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,166 >>> mbox cmd response: success
2,776,211 UART: [afmc] ++
2,776,379 UART: [afmc] CDI.KEYID = 6
2,776,742 UART: [afmc] SUBJECT.KEYID = 7
2,777,168 UART: [afmc] AUTHORITY.KEYID = 5
2,812,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,636 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,365 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,248 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,734 UART: [afmc] --
2,856,836 UART: [cold-reset] --
2,857,780 UART: [state] Locking Datavault
2,858,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,543 UART: [state] Locking ICCM
2,860,057 UART: [exit] Launching FMC @ 0x40000130
2,865,386 UART:
2,865,402 UART: Running Caliptra FMC ...
2,865,810 UART:
2,865,864 UART: [state] CFI Enabled
2,876,269 UART: [fht] FMC Alias Private Key: 7
2,983,556 UART: [art] Extend RT PCRs Done
2,983,984 UART: [art] Lock RT PCRs Done
2,985,468 UART: [art] Populate DV Done
2,993,535 UART: [fht] FMC Alias Private Key: 7
2,994,593 UART: [art] Derive CDI
2,994,873 UART: [art] Store in in slot 0x4
3,080,500 UART: [art] Derive Key Pair
3,080,860 UART: [art] Store priv key in slot 0x5
3,093,612 UART: [art] Derive Key Pair - Done
3,108,154 UART: [art] Signing Cert with AUTHO
3,108,634 UART: RITY.KEYID = 7
3,123,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,687 UART: [art] PUB.X = 84CF855F9EDC1316F41593CA41866B99DBAC7B66740CB5C78048304AAFB2A6CBB0129F2A94AFDC60279E8969BA07340E
3,131,458 UART: [art] PUB.Y = F98F4698577396EF39E7C8AEF1B7D1B4065A94C95C4FE06CD941BA6B22B3C5ECF6DAFB11D560C14F2CF18ACB63050D79
3,138,417 UART: [art] SIG.R = B1327985EBA7B6097A4DD8968DB184070D0A094B3426862A9A4BFE8C92C11BAF0587EFC8B7AAE1B9058405721CD9F570
3,145,169 UART: [art] SIG.S = E9D879A1E9CD605177FB7C18C426525E37D00F52A4895AF30436FC27A5B21534614E5E58C3832DFC01CB8E3C985390CE
3,169,243 UART: Caliptra RT
3,169,496 UART: [state] CFI Enabled
3,276,976 UART: [rt] RT listening for mailbox commands...
3,277,646 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,532 UART: [rt]cmd =0x41544d4e, len=14344
3,544,797 >>> mbox cmd response data (8 bytes)
3,544,798 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,815 UART: [rt]cmd =0x41545348, len=116
3,576,588 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,668 ready_for_fw is high
1,055,668 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,278 >>> mbox cmd response: success
2,685,070 UART:
2,685,086 UART: Running Caliptra FMC ...
2,685,494 UART:
2,685,548 UART: [state] CFI Enabled
2,696,125 UART: [fht] FMC Alias Private Key: 7
2,803,744 UART: [art] Extend RT PCRs Done
2,804,172 UART: [art] Lock RT PCRs Done
2,805,646 UART: [art] Populate DV Done
2,813,969 UART: [fht] FMC Alias Private Key: 7
2,815,015 UART: [art] Derive CDI
2,815,295 UART: [art] Store in in slot 0x4
2,901,288 UART: [art] Derive Key Pair
2,901,648 UART: [art] Store priv key in slot 0x5
2,915,176 UART: [art] Derive Key Pair - Done
2,929,762 UART: [art] Signing Cert with AUTHO
2,930,242 UART: RITY.KEYID = 7
2,945,352 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,117 UART: [art] PUB.X = F436FD37B392A386A21B0FF5DAAFDBE8D7CCA0178DEA514DD9B59AB229B136A038E21C11168A8F500A550F4023EB6FEF
2,952,898 UART: [art] PUB.Y = 49FEE3DD43014981737214F3343DB3987D6EAB1D28E6E3B28D6E5833EC617A7F3CD7432B568886E8CE164582ED536F3F
2,959,847 UART: [art] SIG.R = 2EB700B5799AD36ABBDA2E09622F4539D43BBDC8F60BD6BC01EC027ECAF45118E9635A541230349307FAC7C396F5B6B8
2,966,592 UART: [art] SIG.S = 809FCD716552FFD976A6131C59007EA27D415EC528F3398FBD7D7E6A095E06CE7590F7AB78D974D1CF2274B40D5F3294
2,990,056 UART: Caliptra RT
2,990,309 UART: [state] CFI Enabled
3,098,308 UART: [rt] RT listening for mailbox commands...
3,098,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,150 UART: [rt]cmd =0x41544d4e, len=14344
3,366,863 >>> mbox cmd response data (8 bytes)
3,366,864 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,753 UART: [rt]cmd =0x41545348, len=116
3,398,572 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,742 UART: [kat] ++
895,894 UART: [kat] sha1
900,268 UART: [kat] SHA2-256
902,208 UART: [kat] SHA2-384
904,937 UART: [kat] SHA2-512-ACC
906,838 UART: [kat] ECC-384
916,647 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,306 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,174,810 ready_for_fw is high
1,174,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,214 UART: [idev] Erasing UDS.KEYID = 0
1,199,418 UART: [idev] Sha1 KeyId Algorithm
1,208,334 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,375 UART: [ldev] Erasing FE.KEYID = 1
1,242,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,245 UART: [ldev] --
1,282,701 UART: [fwproc] Wait for Commands...
1,283,284 UART: [fwproc] Recv command 0x46574c44
1,284,017 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,200 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,423 >>> mbox cmd response: success
2,776,632 UART: [afmc] ++
2,776,800 UART: [afmc] CDI.KEYID = 6
2,777,163 UART: [afmc] SUBJECT.KEYID = 7
2,777,589 UART: [afmc] AUTHORITY.KEYID = 5
2,813,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,171 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,900 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,783 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,502 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,457 UART: [afmc] --
2,856,525 UART: [cold-reset] --
2,857,327 UART: [state] Locking Datavault
2,858,250 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,854 UART: [state] Locking ICCM
2,859,320 UART: [exit] Launching FMC @ 0x40000130
2,864,649 UART:
2,864,665 UART: Running Caliptra FMC ...
2,865,073 UART:
2,865,216 UART: [state] CFI Enabled
2,875,909 UART: [fht] FMC Alias Private Key: 7
2,983,862 UART: [art] Extend RT PCRs Done
2,984,290 UART: [art] Lock RT PCRs Done
2,985,738 UART: [art] Populate DV Done
2,994,051 UART: [fht] FMC Alias Private Key: 7
2,995,101 UART: [art] Derive CDI
2,995,381 UART: [art] Store in in slot 0x4
3,081,192 UART: [art] Derive Key Pair
3,081,552 UART: [art] Store priv key in slot 0x5
3,094,942 UART: [art] Derive Key Pair - Done
3,109,653 UART: [art] Signing Cert with AUTHO
3,110,133 UART: RITY.KEYID = 7
3,125,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,180 UART: [art] PUB.X = D028767F20C522774C1D852C0370A670DA0412C17E6E2AE366550975A599075E3C3308DB5E3743FB53AB79823774CFB7
3,132,927 UART: [art] PUB.Y = 1BEB0F5FE6A801D0B6496E9F75F0D2C872404AEFE09D4D5B6D1C310190A0265C3E246F787B96C9955A347B1C5FB3B962
3,139,876 UART: [art] SIG.R = B1C9B9F02E845964CAECBE7E7C78A59F95B805AD4FFCCD924FC1A7D7A6D14F5E7243245042A3328BCD51CD99D59ACA92
3,146,663 UART: [art] SIG.S = 0B8DDCAC9D7EA3FFDE0F289B4B8E9F8D03390E7BA3B03F094134B38B984280B49BFBEB5EAF43F64534DCC3B4A4471CC3
3,170,589 UART: Caliptra RT
3,170,934 UART: [state] CFI Enabled
3,278,399 UART: [rt] RT listening for mailbox commands...
3,279,069 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,109 UART: [rt]cmd =0x41544d4e, len=14344
3,547,186 >>> mbox cmd response data (8 bytes)
3,547,187 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,314 UART: [rt]cmd =0x41545348, len=116
3,579,141 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,445 ready_for_fw is high
1,056,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,565 >>> mbox cmd response: success
2,686,747 UART:
2,686,763 UART: Running Caliptra FMC ...
2,687,171 UART:
2,687,314 UART: [state] CFI Enabled
2,698,051 UART: [fht] FMC Alias Private Key: 7
2,806,234 UART: [art] Extend RT PCRs Done
2,806,662 UART: [art] Lock RT PCRs Done
2,807,940 UART: [art] Populate DV Done
2,815,997 UART: [fht] FMC Alias Private Key: 7
2,816,985 UART: [art] Derive CDI
2,817,265 UART: [art] Store in in slot 0x4
2,902,732 UART: [art] Derive Key Pair
2,903,092 UART: [art] Store priv key in slot 0x5
2,916,358 UART: [art] Derive Key Pair - Done
2,931,286 UART: [art] Signing Cert with AUTHO
2,931,766 UART: RITY.KEYID = 7
2,946,862 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,627 UART: [art] PUB.X = BBE0A1FC60D7FB26947A37FC4C5825347A9D18A0BB5E74FAC6D09944FA9312BE13ED1ED533AF76A6901AD46F4F373719
2,954,411 UART: [art] PUB.Y = 77FC890683759624CADA8C3D0709D588012E796D0839F8817DB301B9E78DFF1DCAD4E690A918D58C387D49DBCAFCC285
2,961,351 UART: [art] SIG.R = 07F0BAA7B50F3486E6AE906BA552EF6C43BDB524D17C7C2BAD16F8B60151B060BEDB24E030A778EBF5C0737AB1C5C452
2,968,130 UART: [art] SIG.S = 4E4D1C35EC72937CEC040F34DE3501BB0125AC4BF4B4A426961139DA4DA967580C30DEEDA75A5D66351BEFFF63F43F76
2,992,448 UART: Caliptra RT
2,992,793 UART: [state] CFI Enabled
3,101,390 UART: [rt] RT listening for mailbox commands...
3,102,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,906 UART: [rt]cmd =0x41544d4e, len=14344
3,370,035 >>> mbox cmd response data (8 bytes)
3,370,036 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,085 UART: [rt]cmd =0x41545348, len=116
3,402,158 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,731 writing to cptra_bootfsm_go
192,955 UART:
193,310 UART: Running Caliptra ROM ...
194,407 UART:
194,554 UART: [state] CFI Enabled
264,502 UART: [state] LifecycleState = Unprovisioned
266,484 UART: [state] DebugLocked = No
268,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,522 UART: [kat] SHA2-256
444,222 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,769 UART: [kat] ++
455,219 UART: [kat] sha1
467,228 UART: [kat] SHA2-256
469,946 UART: [kat] SHA2-384
475,293 UART: [kat] SHA2-512-ACC
477,659 UART: [kat] ECC-384
2,766,944 UART: [kat] HMAC-384Kdf
2,780,442 UART: [kat] LMS
3,970,774 UART: [kat] --
3,974,413 UART: [cold-reset] ++
3,975,785 UART: [fht] Storing FHT @ 0x50003400
3,987,121 UART: [idev] ++
3,987,687 UART: [idev] CDI.KEYID = 6
3,988,616 UART: [idev] SUBJECT.KEYID = 7
3,989,881 UART: [idev] UDS.KEYID = 0
3,990,967 ready_for_fw is high
3,991,182 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,788 UART: [idev] Erasing UDS.KEYID = 0
7,324,749 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,274 UART: [idev] --
7,350,728 UART: [ldev] ++
7,351,308 UART: [ldev] CDI.KEYID = 6
7,352,328 UART: [ldev] SUBJECT.KEYID = 5
7,353,485 UART: [ldev] AUTHORITY.KEYID = 7
7,354,768 UART: [ldev] FE.KEYID = 1
7,383,996 UART: [ldev] Erasing FE.KEYID = 1
10,732,050 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,852 UART: [ldev] --
13,092,440 UART: [fwproc] Waiting for Commands...
13,094,913 UART: [fwproc] Received command 0x46574c44
13,097,105 UART: [fwproc] Received Image of size 114124 bytes
17,148,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,222,292 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,291,153 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,607,879 >>> mbox cmd response: success
17,612,412 UART: [afmc] ++
17,613,017 UART: [afmc] CDI.KEYID = 6
17,613,912 UART: [afmc] SUBJECT.KEYID = 7
17,615,186 UART: [afmc] AUTHORITY.KEYID = 5
20,983,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,283,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,012 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,300,468 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,257 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,329,704 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,093 UART: [afmc] --
23,355,282 UART: [cold-reset] --
23,359,302 UART: [state] Locking Datavault
23,365,209 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,955 UART: [state] Locking ICCM
23,368,924 UART: [exit] Launching FMC @ 0x40000130
23,377,265 UART:
23,377,499 UART: Running Caliptra FMC ...
23,378,525 UART:
23,378,674 UART: [state] CFI Enabled
23,441,206 UART: [fht] FMC Alias Private Key: 7
25,778,482 UART: [art] Extend RT PCRs Done
25,779,703 UART: [art] Lock RT PCRs Done
25,781,141 UART: [art] Populate DV Done
25,786,551 UART: [fht] FMC Alias Private Key: 7
25,788,206 UART: [art] Derive CDI
25,789,026 UART: [art] Store in in slot 0x4
25,849,661 UART: [art] Derive Key Pair
25,850,699 UART: [art] Store priv key in slot 0x5
29,143,202 UART: [art] Derive Key Pair - Done
29,156,462 UART: [art] Signing Cert with AUTHO
29,157,761 UART: RITY.KEYID = 7
31,437,657 UART: [art] Erasing AUTHORITY.KEYID = 7
31,439,162 UART: [art] PUB.X = EC68B1CEFCA87255523141469D9633471F64DCFF720660594E8852B2DA854A5ACEB1B9B7748607C2232EA1288669FFBA
31,446,438 UART: [art] PUB.Y = 4819D36963208318D2327815F59AEAFE64FE3B07F68EE1933EBFF1D48318385F046D4566C57444D2A290B0E6E973486E
31,453,618 UART: [art] SIG.R = 241A76D1970C661D3656E9CC46128A1953C7C5BD20EE2251AF6FA8D2C325BD85FD6C21119F55654D136FED769E65E041
31,461,004 UART: [art] SIG.S = 3F8DB712B8D0D542D30723A6D4531D67B71D7B1E58E6AF1A1D8525BED092C6E7B94F50C06BFF39A65F8551FD04B2EE2C
32,766,382 UART: Caliptra RT
32,767,098 UART: [state] CFI Enabled
32,927,272 UART: [rt] RT listening for mailbox commands...
37,099,153 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,254,568 UART: [rt]cmd =0x41544d4e, len=14344
42,490,138 >>> mbox cmd response data (8 bytes)
42,490,763 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,521,455 UART: [rt]cmd =0x41545348, len=116
42,523,669 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,804,260 ready_for_fw is high
3,804,879 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,858,269 >>> mbox cmd response: success
23,558,423 UART:
23,558,804 UART: Running Caliptra FMC ...
23,559,960 UART:
23,560,122 UART: [state] CFI Enabled
23,628,352 UART: [fht] FMC Alias Private Key: 7
25,965,737 UART: [art] Extend RT PCRs Done
25,966,963 UART: [art] Lock RT PCRs Done
25,968,673 UART: [art] Populate DV Done
25,974,203 UART: [fht] FMC Alias Private Key: 7
25,975,799 UART: [art] Derive CDI
25,976,563 UART: [art] Store in in slot 0x4
26,036,146 UART: [art] Derive Key Pair
26,037,353 UART: [art] Store priv key in slot 0x5
29,330,152 UART: [art] Derive Key Pair - Done
29,343,314 UART: [art] Signing Cert with AUTHO
29,344,623 UART: RITY.KEYID = 7
31,631,463 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,970 UART: [art] PUB.X = 9B8C5A85FC4CCF35298880A81EEF0BD4575F1D68798925314E2AB87C3A6578F12CDAA6701C34433E255D75742239D145
31,640,199 UART: [art] PUB.Y = EE6E464BA4ADA147A65CE078822A91C50DAE6B7F3FF90B0468F3BDBAE819B996632690F5BC9AA3492B3820B0F1C0C87D
31,647,426 UART: [art] SIG.R = 319155F8090771EC1F905411CDD56C5A1AEFE37C9F37F93CC1C5B14B0E62955501D6F256463F138FCB02304B83951A5C
31,654,792 UART: [art] SIG.S = 0CE42F87C0571EC0E6B6008DA9C8C72DA2D09C16C02E916EE33FC0259291D4B80D22D98EFBBE59A9F1DA316F1D7EA1C2
32,959,768 UART: Caliptra RT
32,960,491 UART: [state] CFI Enabled
33,121,551 UART: [rt] RT listening for mailbox commands...
37,294,071 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,449,763 UART: [rt]cmd =0x41544d4e, len=14344
42,685,299 >>> mbox cmd response data (8 bytes)
42,685,892 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,716,689 UART: [rt]cmd =0x41545348, len=116
42,719,001 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,400 UART:
192,774 UART: Running Caliptra ROM ...
193,952 UART:
603,652 UART: [state] CFI Enabled
618,735 UART: [state] LifecycleState = Unprovisioned
620,612 UART: [state] DebugLocked = No
622,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,144 UART: [kat] SHA2-256
795,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,469 UART: [kat] ++
807,004 UART: [kat] sha1
817,551 UART: [kat] SHA2-256
820,284 UART: [kat] SHA2-384
826,552 UART: [kat] SHA2-512-ACC
828,913 UART: [kat] ECC-384
3,110,821 UART: [kat] HMAC-384Kdf
3,121,489 UART: [kat] LMS
4,311,572 UART: [kat] --
4,316,150 UART: [cold-reset] ++
4,317,659 UART: [fht] Storing FHT @ 0x50003400
4,329,353 UART: [idev] ++
4,329,912 UART: [idev] CDI.KEYID = 6
4,330,888 UART: [idev] SUBJECT.KEYID = 7
4,332,128 UART: [idev] UDS.KEYID = 0
4,333,163 ready_for_fw is high
4,333,367 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,695 UART: [idev] Erasing UDS.KEYID = 0
7,615,440 UART: [idev] Using Sha1 for KeyId Algorithm
7,636,998 UART: [idev] --
7,642,405 UART: [ldev] ++
7,643,012 UART: [ldev] CDI.KEYID = 6
7,643,929 UART: [ldev] SUBJECT.KEYID = 5
7,645,132 UART: [ldev] AUTHORITY.KEYID = 7
7,646,408 UART: [ldev] FE.KEYID = 1
7,654,505 UART: [ldev] Erasing FE.KEYID = 1
10,945,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,027 UART: [ldev] --
13,307,285 UART: [fwproc] Waiting for Commands...
13,309,245 UART: [fwproc] Received command 0x46574c44
13,311,444 UART: [fwproc] Received Image of size 114124 bytes
17,367,449 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,042 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,776 >>> mbox cmd response: success
17,839,230 UART: [afmc] ++
17,839,826 UART: [afmc] CDI.KEYID = 6
17,840,763 UART: [afmc] SUBJECT.KEYID = 7
17,842,023 UART: [afmc] AUTHORITY.KEYID = 5
21,155,960 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,450 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,711 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,097 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,955 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,351 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,671 UART: [afmc] --
23,519,712 UART: [cold-reset] --
23,524,000 UART: [state] Locking Datavault
23,529,625 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,382 UART: [state] Locking ICCM
23,532,799 UART: [exit] Launching FMC @ 0x40000130
23,541,186 UART:
23,541,415 UART: Running Caliptra FMC ...
23,542,512 UART:
23,542,664 UART: [state] CFI Enabled
23,550,568 UART: [fht] FMC Alias Private Key: 7
25,881,468 UART: [art] Extend RT PCRs Done
25,882,684 UART: [art] Lock RT PCRs Done
25,884,492 UART: [art] Populate DV Done
25,889,950 UART: [fht] FMC Alias Private Key: 7
25,891,591 UART: [art] Derive CDI
25,892,318 UART: [art] Store in in slot 0x4
25,935,193 UART: [art] Derive Key Pair
25,936,193 UART: [art] Store priv key in slot 0x5
29,178,148 UART: [art] Derive Key Pair - Done
29,190,989 UART: [art] Signing Cert with AUTHO
29,192,295 UART: RITY.KEYID = 7
31,471,753 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,259 UART: [art] PUB.X = FF4B76865F4094F366B2609B5C69EE04AF827616A07BF59FCC5648B07A3D2515C4FA06A2B361E4860C0DCA519AAA83D6
31,480,539 UART: [art] PUB.Y = A7EB6F7D02CEE2AC2E9EA91DB1062A883528305C85C94BC729A7479194885EEE7291DE82B7C5310A286E3EBD98DE6B2C
31,487,757 UART: [art] SIG.R = 0D847BDA277DA5C0802E656A5969AAA1BA576B37D7D834930FEB37D859F0047B2C414AE0002C2503E09762879D74AC6F
31,495,124 UART: [art] SIG.S = 8FB0920103734D7586670858000021A1F70EBB27DC1147A96269ED7E7FEF7E974405EBA9FFA6D8937DEB2187D6DB849B
32,800,513 UART: Caliptra RT
32,801,208 UART: [state] CFI Enabled
32,918,962 UART: [rt] RT listening for mailbox commands...
36,938,389 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,093,863 UART: [rt]cmd =0x41544d4e, len=14344
42,329,774 >>> mbox cmd response data (8 bytes)
42,330,380 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,361,136 UART: [rt]cmd =0x41545348, len=116
42,363,704 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,132,472 ready_for_fw is high
4,132,876 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,073 >>> mbox cmd response: success
23,715,273 UART:
23,715,674 UART: Running Caliptra FMC ...
23,716,782 UART:
23,716,929 UART: [state] CFI Enabled
23,724,882 UART: [fht] FMC Alias Private Key: 7
26,055,411 UART: [art] Extend RT PCRs Done
26,056,642 UART: [art] Lock RT PCRs Done
26,058,557 UART: [art] Populate DV Done
26,064,245 UART: [fht] FMC Alias Private Key: 7
26,065,750 UART: [art] Derive CDI
26,066,562 UART: [art] Store in in slot 0x4
26,108,945 UART: [art] Derive Key Pair
26,109,940 UART: [art] Store priv key in slot 0x5
29,352,225 UART: [art] Derive Key Pair - Done
29,365,174 UART: [art] Signing Cert with AUTHO
29,366,477 UART: RITY.KEYID = 7
31,645,749 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,253 UART: [art] PUB.X = 7A5B1141B17B77C4C7879B516E9B8F335E333047F4D877E679A4E48BB76E1E54EF1A5AE59E61DD4F783F2D829CE8538F
31,654,492 UART: [art] PUB.Y = FBCF570B6583039039E51DBACDBC436168021C83EED1CC24B399669F2AF13241BD0CCAE035EB7D2A20D68B892F7B5695
31,661,766 UART: [art] SIG.R = 9F677130CDB8CF5450C3367797F5E5EB0A666E3D7BF040A63304B5320C6EB9A1F3D4F2A76820D46C8797221EF19ABF35
31,669,149 UART: [art] SIG.S = 6C4C32A58E9B04DB5769C9B7DAEE25BBAAB70BA13C4D00CE1D15E3A536BF1AB0B50B541D9C7006F16B9470AC33DF7468
32,974,021 UART: Caliptra RT
32,974,724 UART: [state] CFI Enabled
33,092,165 UART: [rt] RT listening for mailbox commands...
37,111,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,267,039 UART: [rt]cmd =0x41544d4e, len=14344
42,502,656 >>> mbox cmd response data (8 bytes)
42,503,255 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,534,109 UART: [rt]cmd =0x41545348, len=116
42,536,403 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
191,970 UART:
192,363 UART: Running Caliptra ROM ...
193,474 UART:
193,615 UART: [state] CFI Enabled
263,936 UART: [state] LifecycleState = Unprovisioned
265,777 UART: [state] DebugLocked = No
267,366 UART: [state] WD Timer not started. Device not locked for debugging
271,039 UART: [kat] SHA2-256
450,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,799 UART: [kat] ++
462,244 UART: [kat] sha1
474,604 UART: [kat] SHA2-256
477,610 UART: [kat] SHA2-384
483,955 UART: [kat] SHA2-512-ACC
486,965 UART: [kat] ECC-384
2,947,949 UART: [kat] HMAC-384Kdf
2,971,895 UART: [kat] LMS
3,501,363 UART: [kat] --
3,507,067 UART: [cold-reset] ++
3,508,151 UART: [fht] FHT @ 0x50003400
3,519,910 UART: [idev] ++
3,520,476 UART: [idev] CDI.KEYID = 6
3,521,405 UART: [idev] SUBJECT.KEYID = 7
3,522,576 UART: [idev] UDS.KEYID = 0
3,523,500 ready_for_fw is high
3,523,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,389 UART: [idev] Erasing UDS.KEYID = 0
6,020,310 UART: [idev] Sha1 KeyId Algorithm
6,043,813 UART: [idev] --
6,047,848 UART: [ldev] ++
6,048,431 UART: [ldev] CDI.KEYID = 6
6,049,354 UART: [ldev] SUBJECT.KEYID = 5
6,050,517 UART: [ldev] AUTHORITY.KEYID = 7
6,051,828 UART: [ldev] FE.KEYID = 1
6,079,442 UART: [ldev] Erasing FE.KEYID = 1
8,582,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,936 UART: [ldev] --
10,372,861 UART: [fwproc] Wait for Commands...
10,374,524 UART: [fwproc] Recv command 0x46574c44
10,376,621 UART: [fwproc] Recv'd Img size: 114448 bytes
13,778,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,855,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,923,833 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,242,092 >>> mbox cmd response: success
14,246,097 UART: [afmc] ++
14,246,716 UART: [afmc] CDI.KEYID = 6
14,247,633 UART: [afmc] SUBJECT.KEYID = 7
14,248,801 UART: [afmc] AUTHORITY.KEYID = 5
16,787,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,526,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,542,146 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,557,969 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,580,741 UART: [afmc] --
18,585,307 UART: [cold-reset] --
18,588,679 UART: [state] Locking Datavault
18,592,783 UART: [state] Locking PCR0, PCR1 and PCR31
18,594,429 UART: [state] Locking ICCM
18,595,605 UART: [exit] Launching FMC @ 0x40000130
18,604,044 UART:
18,604,323 UART: Running Caliptra FMC ...
18,605,431 UART:
18,605,594 UART: [state] CFI Enabled
18,667,587 UART: [fht] FMC Alias Private Key: 7
20,431,333 UART: [art] Extend RT PCRs Done
20,432,555 UART: [art] Lock RT PCRs Done
20,434,153 UART: [art] Populate DV Done
20,439,300 UART: [fht] FMC Alias Private Key: 7
20,440,869 UART: [art] Derive CDI
20,441,696 UART: [art] Store in in slot 0x4
20,500,468 UART: [art] Derive Key Pair
20,501,468 UART: [art] Store priv key in slot 0x5
22,964,327 UART: [art] Derive Key Pair - Done
22,977,534 UART: [art] Signing Cert with AUTHO
22,978,830 UART: RITY.KEYID = 7
24,689,973 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,489 UART: [art] PUB.X = 0BADF63932E5C1F92A57153F326C160C02FCB2E11FCE16F9A7802598950FA8DEB619CA52C279DE23EC0209959902BBA2
24,698,747 UART: [art] PUB.Y = C3E7B9945EB1C6BC63AFF874449BCA631818F86311B7504DEE958C06322A9664E20BA6B41D0EF4B0579314510D850B37
24,706,052 UART: [art] SIG.R = 707705797EE5D09638B2B4BEF69AC83A41CD616058865BFDCCE8D0D21EB4B92D6841194747D5C4ED2D2157EB445C1741
24,713,412 UART: [art] SIG.S = 09AEB7575AF9A2EE7BE309B8CA5732D559D90E8F1CC802A22264283A774668598AEE876A36924DB2C8025F69C78895CE
25,692,184 UART: Caliptra RT
25,692,880 UART: [state] CFI Enabled
25,858,753 UART: [rt] RT listening for mailbox commands...
29,907,669 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,063,821 UART: [rt]cmd =0x41544d4e, len=14344
33,993,913 >>> mbox cmd response data (8 bytes)
33,994,514 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,024,983 UART: [rt]cmd =0x41545348, len=116
34,027,306 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,357,481 ready_for_fw is high
3,357,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,025,861 >>> mbox cmd response: success
18,343,247 UART:
18,343,640 UART: Running Caliptra FMC ...
18,344,838 UART:
18,345,006 UART: [state] CFI Enabled
18,411,875 UART: [fht] FMC Alias Private Key: 7
20,176,369 UART: [art] Extend RT PCRs Done
20,177,602 UART: [art] Lock RT PCRs Done
20,179,256 UART: [art] Populate DV Done
20,184,455 UART: [fht] FMC Alias Private Key: 7
20,185,999 UART: [art] Derive CDI
20,186,771 UART: [art] Store in in slot 0x4
20,245,336 UART: [art] Derive Key Pair
20,246,377 UART: [art] Store priv key in slot 0x5
22,709,185 UART: [art] Derive Key Pair - Done
22,721,822 UART: [art] Signing Cert with AUTHO
22,723,130 UART: RITY.KEYID = 7
24,434,607 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,105 UART: [art] PUB.X = D811A9B1C6A800A57924DEB994EE3FB575A39FCDFB524B1FE78B2675F371F8BDC3B379D69EFEA06ADDFDC89E034C30EE
24,443,421 UART: [art] PUB.Y = 1AB4F5741F0E08A42E413A14C6A7B26866D0A2064990FB053DF82E1956C510D2D4E3AE943354A1FD858A9F440D793BC8
24,450,645 UART: [art] SIG.R = 08E24E34E2BF2E8CDE3AA52787BF7AD5C55C6739E40C35D7FAD041EC1F626D5322E9043A59308C801973C3C41C18C029
24,458,038 UART: [art] SIG.S = 42E2688AA6E5260B4BE52C2B18FB61592CF4BA34A193A7C31F5D087592351B11FA724793C3787B77331B34CD517C3847
25,436,624 UART: Caliptra RT
25,437,375 UART: [state] CFI Enabled
25,604,288 UART: [rt] RT listening for mailbox commands...
29,658,341 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,814,357 UART: [rt]cmd =0x41544d4e, len=14344
33,744,566 >>> mbox cmd response data (8 bytes)
33,745,146 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,775,942 UART: [rt]cmd =0x41545348, len=116
33,778,204 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,329 UART:
192,709 UART: Running Caliptra ROM ...
193,851 UART:
603,579 UART: [state] CFI Enabled
614,682 UART: [state] LifecycleState = Unprovisioned
616,561 UART: [state] DebugLocked = No
618,245 UART: [state] WD Timer not started. Device not locked for debugging
622,426 UART: [kat] SHA2-256
801,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,126 UART: [kat] ++
813,651 UART: [kat] sha1
825,091 UART: [kat] SHA2-256
828,167 UART: [kat] SHA2-384
834,503 UART: [kat] SHA2-512-ACC
837,500 UART: [kat] ECC-384
3,279,977 UART: [kat] HMAC-384Kdf
3,292,700 UART: [kat] LMS
3,822,198 UART: [kat] --
3,827,892 UART: [cold-reset] ++
3,830,024 UART: [fht] FHT @ 0x50003400
3,840,142 UART: [idev] ++
3,840,697 UART: [idev] CDI.KEYID = 6
3,841,744 UART: [idev] SUBJECT.KEYID = 7
3,842,841 UART: [idev] UDS.KEYID = 0
3,843,761 ready_for_fw is high
3,843,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,919 UART: [idev] Erasing UDS.KEYID = 0
6,317,747 UART: [idev] Sha1 KeyId Algorithm
6,340,482 UART: [idev] --
6,343,875 UART: [ldev] ++
6,344,432 UART: [ldev] CDI.KEYID = 6
6,345,330 UART: [ldev] SUBJECT.KEYID = 5
6,346,532 UART: [ldev] AUTHORITY.KEYID = 7
6,347,754 UART: [ldev] FE.KEYID = 1
6,357,900 UART: [ldev] Erasing FE.KEYID = 1
8,832,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,599 UART: [ldev] --
10,623,547 UART: [fwproc] Wait for Commands...
10,626,120 UART: [fwproc] Recv command 0x46574c44
10,628,205 UART: [fwproc] Recv'd Img size: 114448 bytes
14,039,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,321 >>> mbox cmd response: success
14,504,742 UART: [afmc] ++
14,505,326 UART: [afmc] CDI.KEYID = 6
14,506,227 UART: [afmc] SUBJECT.KEYID = 7
14,507,378 UART: [afmc] AUTHORITY.KEYID = 5
17,004,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,630 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,441 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,458 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,325 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,217 UART: [afmc] --
18,799,194 UART: [cold-reset] --
18,801,216 UART: [state] Locking Datavault
18,804,890 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,527 UART: [state] Locking ICCM
18,808,990 UART: [exit] Launching FMC @ 0x40000130
18,817,380 UART:
18,817,619 UART: Running Caliptra FMC ...
18,818,712 UART:
18,818,871 UART: [state] CFI Enabled
18,826,967 UART: [fht] FMC Alias Private Key: 7
20,584,187 UART: [art] Extend RT PCRs Done
20,585,425 UART: [art] Lock RT PCRs Done
20,587,319 UART: [art] Populate DV Done
20,592,722 UART: [fht] FMC Alias Private Key: 7
20,594,360 UART: [art] Derive CDI
20,595,167 UART: [art] Store in in slot 0x4
20,637,651 UART: [art] Derive Key Pair
20,638,689 UART: [art] Store priv key in slot 0x5
23,065,587 UART: [art] Derive Key Pair - Done
23,078,753 UART: [art] Signing Cert with AUTHO
23,080,057 UART: RITY.KEYID = 7
24,785,459 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,936 UART: [art] PUB.X = C3CCD7F28A3C682CB6AC17E1C095B7C14E4CAB2BFD6C83E7B17E0296F79DCF6B65277B252DBE5D34E2BE1E4D0B3CB814
24,794,274 UART: [art] PUB.Y = 5E18D35B11274AA86050B32378CED1FF476433533C794ABC8CD2DAE5C7E46A2D9F37C742F553EB1F697A78ED67BD100A
24,801,539 UART: [art] SIG.R = 0738D3869B0520F23A5E411B7124FF21B2C43969AAFBE81D647278CFBF990F4F414F21D2B5549170A6255512AD1F9BDA
24,808,908 UART: [art] SIG.S = 549C1C406CB6E466FC19CDC37CE37FB9049C9A4AC4B1484F89EF1276579B611B734A136AAE92B60DAFAA8AE3EFBB04A5
25,788,058 UART: Caliptra RT
25,788,789 UART: [state] CFI Enabled
25,905,709 UART: [rt] RT listening for mailbox commands...
29,940,226 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,095,578 UART: [rt]cmd =0x41544d4e, len=14344
34,025,668 >>> mbox cmd response data (8 bytes)
34,026,248 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,057,099 UART: [rt]cmd =0x41545348, len=116
34,059,450 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,693,095 ready_for_fw is high
3,693,472 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,261,679 >>> mbox cmd response: success
18,514,418 UART:
18,514,827 UART: Running Caliptra FMC ...
18,515,929 UART:
18,516,074 UART: [state] CFI Enabled
18,524,131 UART: [fht] FMC Alias Private Key: 7
20,280,899 UART: [art] Extend RT PCRs Done
20,282,135 UART: [art] Lock RT PCRs Done
20,283,763 UART: [art] Populate DV Done
20,289,168 UART: [fht] FMC Alias Private Key: 7
20,290,699 UART: [art] Derive CDI
20,291,476 UART: [art] Store in in slot 0x4
20,334,073 UART: [art] Derive Key Pair
20,335,119 UART: [art] Store priv key in slot 0x5
22,762,106 UART: [art] Derive Key Pair - Done
22,775,218 UART: [art] Signing Cert with AUTHO
22,776,523 UART: RITY.KEYID = 7
24,481,950 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,456 UART: [art] PUB.X = 7116C67683B33A8215CDE766ACDEE6408FB81BB47BA58B0127280DA6FB2A735C6EE7475672D4E304199C18AFA8E791A6
24,490,718 UART: [art] PUB.Y = DF866793E1901FF55B626A1804FC34B9CC8EA5954ECD22A2CA4F943065A89BF6CC00929A3F57EF35D8A533F768D3AAA6
24,497,991 UART: [art] SIG.R = 3D85B51E52F546273E2C0CA6BED595EADDD2F5882DAEA1798BEDCD369DCAF70824AEDF7F9B0306AF04AFC6A1A0852148
24,505,429 UART: [art] SIG.S = B13BFCD0C0B15C619929691A44AC1E4742C5B5363F035AF245B2C2593A4F7D3D21D9D140684DE822BE2215FE201E909E
25,484,580 UART: Caliptra RT
25,485,273 UART: [state] CFI Enabled
25,602,155 UART: [rt] RT listening for mailbox commands...
29,626,138 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,781,628 UART: [rt]cmd =0x41544d4e, len=14344
33,712,428 >>> mbox cmd response data (8 bytes)
33,713,023 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,743,699 UART: [rt]cmd =0x41545348, len=116
33,745,915 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,048 writing to cptra_bootfsm_go
3,442,051 ready_for_fw is high
3,442,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,761,327 >>> mbox cmd response: success
19,049,942 UART:
19,050,327 UART: Running Caliptra FMC ...
19,051,533 UART:
19,051,707 UART: [state] CFI Enabled
19,117,395 UART: [fht] FMC Alias Private Key: 7
20,881,477 UART: [art] Extend RT PCRs Done
20,882,841 UART: [art] Lock RT PCRs Done
20,884,424 UART: [art] Populate DV Done
20,889,896 UART: [fht] FMC Alias Private Key: 7
20,891,385 UART: [art] Derive CDI
20,892,152 UART: [art] Store in in slot 0x4
20,950,059 UART: [art] Derive Key Pair
20,951,057 UART: [art] Store priv key in slot 0x5
23,414,006 UART: [art] Derive Key Pair - Done
23,427,174 UART: [art] Signing Cert with AUTHO
23,428,479 UART: RITY.KEYID = 7
25,140,126 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,623 UART: [art] PUB.X = FDAFFDB5E2392ED4B9DFB894BB2368F83FF433991BA20A4259F57D4E8E0AE430880F309ACA82575A3CBAEB65EBADAA1C
25,148,924 UART: [art] PUB.Y = 0F38BDE202130F05023E42A5BF5A76B1608C6F17901FE93E37164A466BAFD4C7A793549D7F58044B2D17A633F356982E
25,156,191 UART: [art] SIG.R = 872A28D67970BEB41CA150B8AA9DB219BD8632BC7EB890CC2A64AFBA2C0DDAD4B9072B35A002B68F86349106E1CC4FC0
25,163,612 UART: [art] SIG.S = C8C466C380C21E027157358CBD1434786701269FF8DF06337A25687D339DD806A0F87ED77AD7D876E5CDD2964341C689
26,142,557 UART: Caliptra RT
26,143,241 UART: [state] CFI Enabled
26,321,287 UART: [rt] RT listening for mailbox commands...
30,342,011 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,497,788 UART: [rt]cmd =0x41544d4e, len=14344
34,428,473 >>> mbox cmd response data (8 bytes)
34,429,040 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,459,996 UART: [rt]cmd =0x41545348, len=116
34,462,366 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,754,588 ready_for_fw is high
3,755,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,957,439 >>> mbox cmd response: success
19,212,128 UART:
19,212,515 UART: Running Caliptra FMC ...
19,213,705 UART:
19,213,869 UART: [state] CFI Enabled
19,221,759 UART: [fht] FMC Alias Private Key: 7
20,978,398 UART: [art] Extend RT PCRs Done
20,979,621 UART: [art] Lock RT PCRs Done
20,981,161 UART: [art] Populate DV Done
20,986,517 UART: [fht] FMC Alias Private Key: 7
20,988,210 UART: [art] Derive CDI
20,988,942 UART: [art] Store in in slot 0x4
21,031,648 UART: [art] Derive Key Pair
21,032,688 UART: [art] Store priv key in slot 0x5
23,458,834 UART: [art] Derive Key Pair - Done
23,471,745 UART: [art] Signing Cert with AUTHO
23,473,048 UART: RITY.KEYID = 7
25,178,536 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,041 UART: [art] PUB.X = 973AFA87F7E45904EF0239740D296F3ACFFA8589244710524AE306DB3B6A9EF49D7E5ECBF2021932F185A332CBC391D9
25,187,261 UART: [art] PUB.Y = CB37C21E2D36E918A09C40C64EB9E053B3045BDE1D28B1C53CE211F55A2DD8E0AD606473D5A93C4B62B31E329F30DC13
25,194,588 UART: [art] SIG.R = 2396C95C6D2B4D0D18686EF1BBA2A4BF75568B15F1106FED85923D370B66B0E27728243E818B73135F24ACB1DD3C4DA1
25,201,961 UART: [art] SIG.S = AC6B8FB5676D67AA6FCB45FBFCDC4BFF03E649CCAB8904A836A28891572F0F455F775FCCE520484737B16005A732682C
26,181,006 UART: Caliptra RT
26,181,698 UART: [state] CFI Enabled
26,298,616 UART: [rt] RT listening for mailbox commands...
30,331,033 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,486,608 UART: [rt]cmd =0x41544d4e, len=14344
34,416,874 >>> mbox cmd response data (8 bytes)
34,417,444 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,448,066 UART: [rt]cmd =0x41545348, len=116
34,450,111 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,855 UART: [kat] SHA2-256
881,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,901 UART: [kat] ++
886,053 UART: [kat] sha1
890,181 UART: [kat] SHA2-256
892,119 UART: [kat] SHA2-384
894,816 UART: [kat] SHA2-512-ACC
896,717 UART: [kat] ECC-384
902,446 UART: [kat] HMAC-384Kdf
906,978 UART: [kat] LMS
1,475,174 UART: [kat] --
1,476,017 UART: [cold-reset] ++
1,476,365 UART: [fht] Storing FHT @ 0x50003400
1,479,100 UART: [idev] ++
1,479,268 UART: [idev] CDI.KEYID = 6
1,479,628 UART: [idev] SUBJECT.KEYID = 7
1,480,052 UART: [idev] UDS.KEYID = 0
1,480,397 ready_for_fw is high
1,480,397 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,042 UART: [idev] Erasing UDS.KEYID = 0
1,504,606 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,346 UART: [idev] --
1,514,435 UART: [ldev] ++
1,514,603 UART: [ldev] CDI.KEYID = 6
1,514,966 UART: [ldev] SUBJECT.KEYID = 5
1,515,392 UART: [ldev] AUTHORITY.KEYID = 7
1,515,855 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,210 UART: [ldev] --
1,585,633 UART: [fwproc] Waiting for Commands...
1,586,478 UART: [fwproc] Received command 0x46574c44
1,587,269 UART: [fwproc] Received Image of size 114448 bytes
2,885,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,312 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,707 >>> mbox cmd response: success
3,079,815 UART: [afmc] ++
3,079,983 UART: [afmc] CDI.KEYID = 6
3,080,345 UART: [afmc] SUBJECT.KEYID = 7
3,080,770 UART: [afmc] AUTHORITY.KEYID = 5
3,115,767 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,281 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,674 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,364 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,301 UART: [afmc] --
3,159,263 UART: [cold-reset] --
3,160,161 UART: [state] Locking Datavault
3,161,222 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,826 UART: [state] Locking ICCM
3,162,254 UART: [exit] Launching FMC @ 0x40000130
3,167,583 UART:
3,167,599 UART: Running Caliptra FMC ...
3,168,007 UART:
3,168,061 UART: [state] CFI Enabled
3,178,502 UART: [fht] FMC Alias Private Key: 7
3,285,969 UART: [art] Extend RT PCRs Done
3,286,397 UART: [art] Lock RT PCRs Done
3,287,903 UART: [art] Populate DV Done
3,296,322 UART: [fht] FMC Alias Private Key: 7
3,297,272 UART: [art] Derive CDI
3,297,552 UART: [art] Store in in slot 0x4
3,383,133 UART: [art] Derive Key Pair
3,383,493 UART: [art] Store priv key in slot 0x5
3,395,943 UART: [art] Derive Key Pair - Done
3,410,716 UART: [art] Signing Cert with AUTHO
3,411,196 UART: RITY.KEYID = 7
3,426,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,899 UART: [art] PUB.X = E98CC33F0D691EE34BD2DEE15703D847E6768A3233F77328436AB9AF43698C263681B2A0B5A12E11800413F7229D9D04
3,433,653 UART: [art] PUB.Y = 9EA98D11F49598121C722AC98A9203E2C4939E295EF699A366CF2C6FBBDF0F6A46B82D5185452CDCF0983413239434C6
3,440,597 UART: [art] SIG.R = A478BEBB1D1279036E49BD1AC1A3F3569E03419C552F0509EC13C35B2357CEA149AEC7E2683E9B6F1C67C0F2EC81748E
3,447,365 UART: [art] SIG.S = 70403B85D2BF777A0B95CC4D79834181ABD27AF435FA5DBE72CFD2104906AAD5EB09459C491962A2125786335A87ED6C
3,471,583 UART: Caliptra RT
3,471,836 UART: [state] CFI Enabled
3,580,003 UART: [rt] RT listening for mailbox commands...
3,580,673 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,555 UART: [rt]cmd =0x41544d4e, len=14344
3,848,330 >>> mbox cmd response data (8 bytes)
3,848,331 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,364 UART: [rt]cmd =0x41545348, len=116
3,880,046 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,831 ready_for_fw is high
1,362,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,465 >>> mbox cmd response: success
2,990,873 UART:
2,990,889 UART: Running Caliptra FMC ...
2,991,297 UART:
2,991,351 UART: [state] CFI Enabled
3,002,000 UART: [fht] FMC Alias Private Key: 7
3,110,075 UART: [art] Extend RT PCRs Done
3,110,503 UART: [art] Lock RT PCRs Done
3,111,971 UART: [art] Populate DV Done
3,120,020 UART: [fht] FMC Alias Private Key: 7
3,121,030 UART: [art] Derive CDI
3,121,310 UART: [art] Store in in slot 0x4
3,207,155 UART: [art] Derive Key Pair
3,207,515 UART: [art] Store priv key in slot 0x5
3,220,907 UART: [art] Derive Key Pair - Done
3,235,539 UART: [art] Signing Cert with AUTHO
3,236,019 UART: RITY.KEYID = 7
3,251,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,948 UART: [art] PUB.X = 4F5FD87841D012D9DA53F9186C0238C436ED3C4CDC92468D0FD06FA7DCD02EF5A456D63B72D91FE55C403A57E65791BB
3,258,724 UART: [art] PUB.Y = 41A18223C1A13A28343F3F6F57A2BDD1AEB7D536D5BE07B26F2E22E0C764A8720ADD43E2AF1C94ECADF63775646361C4
3,265,680 UART: [art] SIG.R = 21409222336D73AFF5E6130661E4DA202D35E95425D81FD090012BECA3BF68C96C22B7CD80C5E61BF76384CBC0E6C3AC
3,272,452 UART: [art] SIG.S = 167F832318CBB9CB9F1B5C3356CFA7A51A0B78478C638695609B2ECD942A2D98AE79F27AA1643EED4CB233340FBBB2CC
3,296,161 UART: Caliptra RT
3,296,414 UART: [state] CFI Enabled
3,405,274 UART: [rt] RT listening for mailbox commands...
3,405,944 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,920 UART: [rt]cmd =0x41544d4e, len=14344
3,673,549 >>> mbox cmd response data (8 bytes)
3,673,550 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,761 UART: [rt]cmd =0x41545348, len=116
3,705,867 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,442 UART: [kat] SHA2-256
882,373 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,488 UART: [kat] ++
886,640 UART: [kat] sha1
890,904 UART: [kat] SHA2-256
892,842 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
902,903 UART: [kat] HMAC-384Kdf
907,583 UART: [kat] LMS
1,475,779 UART: [kat] --
1,476,650 UART: [cold-reset] ++
1,477,132 UART: [fht] Storing FHT @ 0x50003400
1,479,815 UART: [idev] ++
1,479,983 UART: [idev] CDI.KEYID = 6
1,480,343 UART: [idev] SUBJECT.KEYID = 7
1,480,767 UART: [idev] UDS.KEYID = 0
1,481,112 ready_for_fw is high
1,481,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,343 UART: [idev] Erasing UDS.KEYID = 0
1,505,655 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,377 UART: [idev] --
1,515,366 UART: [ldev] ++
1,515,534 UART: [ldev] CDI.KEYID = 6
1,515,897 UART: [ldev] SUBJECT.KEYID = 5
1,516,323 UART: [ldev] AUTHORITY.KEYID = 7
1,516,786 UART: [ldev] FE.KEYID = 1
1,522,030 UART: [ldev] Erasing FE.KEYID = 1
1,547,609 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,419 UART: [ldev] --
1,586,848 UART: [fwproc] Waiting for Commands...
1,587,659 UART: [fwproc] Received command 0x46574c44
1,588,450 UART: [fwproc] Received Image of size 114448 bytes
2,888,035 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,523 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,875 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,028 >>> mbox cmd response: success
3,082,068 UART: [afmc] ++
3,082,236 UART: [afmc] CDI.KEYID = 6
3,082,598 UART: [afmc] SUBJECT.KEYID = 7
3,083,023 UART: [afmc] AUTHORITY.KEYID = 5
3,118,222 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,420 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,200 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,928 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,813 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,503 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,534 UART: [afmc] --
3,161,506 UART: [cold-reset] --
3,162,368 UART: [state] Locking Datavault
3,163,369 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,973 UART: [state] Locking ICCM
3,164,595 UART: [exit] Launching FMC @ 0x40000130
3,169,924 UART:
3,169,940 UART: Running Caliptra FMC ...
3,170,348 UART:
3,170,491 UART: [state] CFI Enabled
3,181,434 UART: [fht] FMC Alias Private Key: 7
3,289,759 UART: [art] Extend RT PCRs Done
3,290,187 UART: [art] Lock RT PCRs Done
3,291,775 UART: [art] Populate DV Done
3,300,212 UART: [fht] FMC Alias Private Key: 7
3,301,284 UART: [art] Derive CDI
3,301,564 UART: [art] Store in in slot 0x4
3,387,207 UART: [art] Derive Key Pair
3,387,567 UART: [art] Store priv key in slot 0x5
3,400,321 UART: [art] Derive Key Pair - Done
3,415,256 UART: [art] Signing Cert with AUTHO
3,415,736 UART: RITY.KEYID = 7
3,430,598 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,363 UART: [art] PUB.X = CE6A61FA237C12C07488979411C6C19FC6C78BA011C36A3C51C75686CF0EDAD0D30E4B43219548783EB25D2EB459BEAC
3,438,137 UART: [art] PUB.Y = 0947A74E7462F320E47173F9A5EDA39283246A82882B5D1F236DE0C746F54598B47D0F45E393A8656BFAA750FC6F408E
3,445,079 UART: [art] SIG.R = EC1354D17F085FBF86402C078E760212273D9530D4B826313727D1E918A891A66ADA83DB3FA8B88C4BC910DFBA3DB4AF
3,451,848 UART: [art] SIG.S = A6FDC40A083D35B2B08FC8B0CBA115D910DABD30D1FF710B14C64C933A7B10AB4F22A31C01BEF1A9EF48CCDCA47C27BB
3,476,437 UART: Caliptra RT
3,476,782 UART: [state] CFI Enabled
3,584,956 UART: [rt] RT listening for mailbox commands...
3,585,626 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,454 UART: [rt]cmd =0x41544d4e, len=14344
3,853,499 >>> mbox cmd response data (8 bytes)
3,853,500 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,427 UART: [rt]cmd =0x41545348, len=116
3,885,393 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,470 ready_for_fw is high
1,362,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,126 >>> mbox cmd response: success
2,990,998 UART:
2,991,014 UART: Running Caliptra FMC ...
2,991,422 UART:
2,991,565 UART: [state] CFI Enabled
3,001,856 UART: [fht] FMC Alias Private Key: 7
3,109,329 UART: [art] Extend RT PCRs Done
3,109,757 UART: [art] Lock RT PCRs Done
3,111,223 UART: [art] Populate DV Done
3,119,400 UART: [fht] FMC Alias Private Key: 7
3,120,400 UART: [art] Derive CDI
3,120,680 UART: [art] Store in in slot 0x4
3,206,119 UART: [art] Derive Key Pair
3,206,479 UART: [art] Store priv key in slot 0x5
3,219,895 UART: [art] Derive Key Pair - Done
3,234,522 UART: [art] Signing Cert with AUTHO
3,235,002 UART: RITY.KEYID = 7
3,250,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,201 UART: [art] PUB.X = 29E48D28DE9BB2A31D9CE26A2DE7BEFF700F7E720FBE0218D905C054854CB26E93C3D2756C0F163F14BE89E00F91A7A1
3,257,967 UART: [art] PUB.Y = BF279BF4AC9D7C7FDFF9CC2482CECA8E50E5583A41C6F9455773BE9731D77E30F8159C365C1BFB411DDF48DE71B8CA25
3,264,937 UART: [art] SIG.R = 5E5FA5E1BE40496E0394A7E20DF6DE52E09120DDA1CDBE8B706C17AEBC3982F367C25B7BEB4E857B9AAEF74F8C733BDF
3,271,727 UART: [art] SIG.S = 8D3CE9C8AD5777287280D222C163EC66D842CC77F4F1222985DE9F67B81761CAD8E1C54CBFC43829699C206B9CE32C9C
3,295,830 UART: Caliptra RT
3,296,175 UART: [state] CFI Enabled
3,404,892 UART: [rt] RT listening for mailbox commands...
3,405,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,814 UART: [rt]cmd =0x41544d4e, len=14344
3,673,461 >>> mbox cmd response data (8 bytes)
3,673,462 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,515 UART: [rt]cmd =0x41545348, len=116
3,705,281 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,446 UART: [kat] SHA2-256
893,096 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,221 UART: [kat] ++
897,373 UART: [kat] sha1
901,553 UART: [kat] SHA2-256
903,493 UART: [kat] SHA2-384
906,268 UART: [kat] SHA2-512-ACC
908,169 UART: [kat] ECC-384
918,034 UART: [kat] HMAC-384Kdf
922,706 UART: [kat] LMS
1,171,034 UART: [kat] --
1,171,759 UART: [cold-reset] ++
1,172,339 UART: [fht] FHT @ 0x50003400
1,174,816 UART: [idev] ++
1,174,984 UART: [idev] CDI.KEYID = 6
1,175,344 UART: [idev] SUBJECT.KEYID = 7
1,175,768 UART: [idev] UDS.KEYID = 0
1,176,113 ready_for_fw is high
1,176,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,554 UART: [idev] Erasing UDS.KEYID = 0
1,200,093 UART: [idev] Sha1 KeyId Algorithm
1,208,365 UART: [idev] --
1,209,387 UART: [ldev] ++
1,209,555 UART: [ldev] CDI.KEYID = 6
1,209,918 UART: [ldev] SUBJECT.KEYID = 5
1,210,344 UART: [ldev] AUTHORITY.KEYID = 7
1,210,807 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,211 UART: [ldev] --
1,281,704 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,146 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,464 >>> mbox cmd response: success
2,776,502 UART: [afmc] ++
2,776,670 UART: [afmc] CDI.KEYID = 6
2,777,032 UART: [afmc] SUBJECT.KEYID = 7
2,777,457 UART: [afmc] AUTHORITY.KEYID = 5
2,813,388 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,759 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,487 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,372 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,091 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,933 UART: [afmc] --
2,856,821 UART: [cold-reset] --
2,857,615 UART: [state] Locking Datavault
2,858,604 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,208 UART: [state] Locking ICCM
2,859,812 UART: [exit] Launching FMC @ 0x40000130
2,865,141 UART:
2,865,157 UART: Running Caliptra FMC ...
2,865,565 UART:
2,865,619 UART: [state] CFI Enabled
2,876,276 UART: [fht] FMC Alias Private Key: 7
2,983,969 UART: [art] Extend RT PCRs Done
2,984,397 UART: [art] Lock RT PCRs Done
2,986,221 UART: [art] Populate DV Done
2,994,460 UART: [fht] FMC Alias Private Key: 7
2,995,586 UART: [art] Derive CDI
2,995,866 UART: [art] Store in in slot 0x4
3,081,543 UART: [art] Derive Key Pair
3,081,903 UART: [art] Store priv key in slot 0x5
3,095,453 UART: [art] Derive Key Pair - Done
3,110,169 UART: [art] Signing Cert with AUTHO
3,110,649 UART: RITY.KEYID = 7
3,126,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,906 UART: [art] PUB.X = 8A8C2C54B0F02681ED0A3706B8D12379B779BD58EC7B9D4869015F2E2F5A493D4D4E38CF49D7EB1C55A504F500EE2149
3,133,648 UART: [art] PUB.Y = A1F891D671D82F049BC89DE7E0E2C16E801138239C94CAFFAB82744E04CECE9EF6CF1D0E7EF45E66E90E4B2B4D2247ED
3,140,606 UART: [art] SIG.R = 221A0053881135261D15842DDAE68148F86EF85B6433DAD96A14DC675B59AABB119F215489FDE2DD170FF347BBA96391
3,147,353 UART: [art] SIG.S = F0F2F41B06F0196A03D4F66C83322ADABA5A3B5C90363A37A86C3D0A118D5666F8681E6232DE1E9E7B9CB3B90494A3EF
3,170,810 UART: Caliptra RT
3,171,063 UART: [state] CFI Enabled
3,279,298 UART: [rt] RT listening for mailbox commands...
3,279,968 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,084 UART: [rt]cmd =0x41544d4e, len=14344
3,548,145 >>> mbox cmd response data (8 bytes)
3,548,146 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,403 UART: [rt]cmd =0x41545348, len=116
3,580,463 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,239 ready_for_fw is high
1,060,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,521 >>> mbox cmd response: success
2,689,301 UART:
2,689,317 UART: Running Caliptra FMC ...
2,689,725 UART:
2,689,779 UART: [state] CFI Enabled
2,700,168 UART: [fht] FMC Alias Private Key: 7
2,808,951 UART: [art] Extend RT PCRs Done
2,809,379 UART: [art] Lock RT PCRs Done
2,810,791 UART: [art] Populate DV Done
2,818,908 UART: [fht] FMC Alias Private Key: 7
2,819,876 UART: [art] Derive CDI
2,820,156 UART: [art] Store in in slot 0x4
2,905,577 UART: [art] Derive Key Pair
2,905,937 UART: [art] Store priv key in slot 0x5
2,918,863 UART: [art] Derive Key Pair - Done
2,933,576 UART: [art] Signing Cert with AUTHO
2,934,056 UART: RITY.KEYID = 7
2,949,120 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,885 UART: [art] PUB.X = 17658E486B6DF63E99373E19605B6F38735042B421924A38699F75AA6C2065B1EA86DC9CAB38D95A1562F7342AA1E757
2,956,649 UART: [art] PUB.Y = 29EC2C7B1C9660CC560D6B363A76DCE5A4A8D522848058E3D8EEC716A6BECCCD8613FA8D8CD3F171EE013BE2BFE18A4D
2,963,617 UART: [art] SIG.R = E983A74106580797FACDC218D00462C7CC49AF03C9BECCBDAAC6D38D7468E385517ECDC2559B855E418595119340D2A4
2,970,381 UART: [art] SIG.S = 941B56F26E43EB594DF6F9687A3F5C757BF66D42156425C8D5B75806E13D1A1906F29BAD957D6D18C6BB4A3938101C9C
2,994,186 UART: Caliptra RT
2,994,439 UART: [state] CFI Enabled
3,102,179 UART: [rt] RT listening for mailbox commands...
3,102,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,743 UART: [rt]cmd =0x41544d4e, len=14344
3,370,672 >>> mbox cmd response data (8 bytes)
3,370,673 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,862 UART: [rt]cmd =0x41545348, len=116
3,403,062 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,899 UART: [state] LifecycleState = Unprovisioned
86,554 UART: [state] DebugLocked = No
87,114 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
893,955 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,080 UART: [kat] ++
898,232 UART: [kat] sha1
902,536 UART: [kat] SHA2-256
904,476 UART: [kat] SHA2-384
907,235 UART: [kat] SHA2-512-ACC
909,136 UART: [kat] ECC-384
918,855 UART: [kat] HMAC-384Kdf
923,309 UART: [kat] LMS
1,171,637 UART: [kat] --
1,172,362 UART: [cold-reset] ++
1,172,692 UART: [fht] FHT @ 0x50003400
1,175,271 UART: [idev] ++
1,175,439 UART: [idev] CDI.KEYID = 6
1,175,799 UART: [idev] SUBJECT.KEYID = 7
1,176,223 UART: [idev] UDS.KEYID = 0
1,176,568 ready_for_fw is high
1,176,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,915 UART: [idev] Erasing UDS.KEYID = 0
1,200,982 UART: [idev] Sha1 KeyId Algorithm
1,209,672 UART: [idev] --
1,210,708 UART: [ldev] ++
1,210,876 UART: [ldev] CDI.KEYID = 6
1,211,239 UART: [ldev] SUBJECT.KEYID = 5
1,211,665 UART: [ldev] AUTHORITY.KEYID = 7
1,212,128 UART: [ldev] FE.KEYID = 1
1,217,430 UART: [ldev] Erasing FE.KEYID = 1
1,244,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,188 UART: [ldev] --
1,283,585 UART: [fwproc] Wait for Commands...
1,284,311 UART: [fwproc] Recv command 0x46574c44
1,285,039 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,726 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,030 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,045 >>> mbox cmd response: success
2,779,097 UART: [afmc] ++
2,779,265 UART: [afmc] CDI.KEYID = 6
2,779,627 UART: [afmc] SUBJECT.KEYID = 7
2,780,052 UART: [afmc] AUTHORITY.KEYID = 5
2,814,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,202 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,815 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,534 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,312 UART: [afmc] --
2,858,440 UART: [cold-reset] --
2,859,250 UART: [state] Locking Datavault
2,860,513 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,117 UART: [state] Locking ICCM
2,861,587 UART: [exit] Launching FMC @ 0x40000130
2,866,916 UART:
2,866,932 UART: Running Caliptra FMC ...
2,867,340 UART:
2,867,483 UART: [state] CFI Enabled
2,878,346 UART: [fht] FMC Alias Private Key: 7
2,986,187 UART: [art] Extend RT PCRs Done
2,986,615 UART: [art] Lock RT PCRs Done
2,988,227 UART: [art] Populate DV Done
2,996,424 UART: [fht] FMC Alias Private Key: 7
2,997,384 UART: [art] Derive CDI
2,997,664 UART: [art] Store in in slot 0x4
3,083,289 UART: [art] Derive Key Pair
3,083,649 UART: [art] Store priv key in slot 0x5
3,097,345 UART: [art] Derive Key Pair - Done
3,112,282 UART: [art] Signing Cert with AUTHO
3,112,762 UART: RITY.KEYID = 7
3,127,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,561 UART: [art] PUB.X = 6C047E519EE8EF128066DC9180E3F2B20F80717C9E341B495871D0539F2CD20C1899DED183D569B574ACA2C31859C942
3,135,320 UART: [art] PUB.Y = EFE7F9977DF56727BA94EB9FAF3E124DAEFCD3464440ACFF9A3FA48D7578FDF8D0C666F1EB6633674EE49A9A2DF48745
3,142,292 UART: [art] SIG.R = A392D0B42B28E460BF032EEDAD2176C587206A68B12B1D254901B059820D1CB899598BD8BB7D0A58DE0E11FBB34DAFD0
3,149,059 UART: [art] SIG.S = 995926B840B3C5358BA0164425EEE42CDE791131E9E0B10E6EDD611025696DB4AE40B7551B5A84FA105E4063CE9D072B
3,173,164 UART: Caliptra RT
3,173,509 UART: [state] CFI Enabled
3,281,377 UART: [rt] RT listening for mailbox commands...
3,282,047 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,101 UART: [rt]cmd =0x41544d4e, len=14344
3,549,780 >>> mbox cmd response data (8 bytes)
3,549,781 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,042 UART: [rt]cmd =0x41545348, len=116
3,582,146 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,354 ready_for_fw is high
1,061,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,844 >>> mbox cmd response: success
2,691,534 UART:
2,691,550 UART: Running Caliptra FMC ...
2,691,958 UART:
2,692,101 UART: [state] CFI Enabled
2,702,812 UART: [fht] FMC Alias Private Key: 7
2,811,093 UART: [art] Extend RT PCRs Done
2,811,521 UART: [art] Lock RT PCRs Done
2,813,251 UART: [art] Populate DV Done
2,821,660 UART: [fht] FMC Alias Private Key: 7
2,822,816 UART: [art] Derive CDI
2,823,096 UART: [art] Store in in slot 0x4
2,908,967 UART: [art] Derive Key Pair
2,909,327 UART: [art] Store priv key in slot 0x5
2,922,833 UART: [art] Derive Key Pair - Done
2,937,696 UART: [art] Signing Cert with AUTHO
2,938,176 UART: RITY.KEYID = 7
2,953,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,319 UART: [art] PUB.X = 43ED804F16AE98B54A5C2E8CBD666ED96283651A07A835BCC50200B125DECA0A1E3543500886789E95040400BA7EABE7
2,961,031 UART: [art] PUB.Y = 5644597753FE263CF677C709CF6DFFD84504283B021F2A91B62215937194558F5973A66D2DFD2DFDD6877DA5BD2033A9
2,967,970 UART: [art] SIG.R = 29055389149F16BE93BE14E75D712EB3A7E848D674FBF95ADCF074B46CCDFAF41ADE3F3403A65BFF40444BE8A32BD116
2,974,750 UART: [art] SIG.S = 90229D99B62AF97549FAAA0393BCAB374DD039169BE8D13EB1A1D57400C6FB84F2354766E0EFA4057D6ACC1F904D1F53
2,998,613 UART: Caliptra RT
2,998,958 UART: [state] CFI Enabled
3,107,287 UART: [rt] RT listening for mailbox commands...
3,107,957 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,191 UART: [rt]cmd =0x41544d4e, len=14344
3,375,892 >>> mbox cmd response data (8 bytes)
3,375,893 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,056 UART: [rt]cmd =0x41545348, len=116
3,408,082 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: [kat] ++
895,117 UART: [kat] sha1
899,301 UART: [kat] SHA2-256
901,241 UART: [kat] SHA2-384
903,766 UART: [kat] SHA2-512-ACC
905,667 UART: [kat] ECC-384
915,036 UART: [kat] HMAC-384Kdf
919,554 UART: [kat] LMS
1,167,866 UART: [kat] --
1,168,977 UART: [cold-reset] ++
1,169,375 UART: [fht] FHT @ 0x50003400
1,172,061 UART: [idev] ++
1,172,229 UART: [idev] CDI.KEYID = 6
1,172,590 UART: [idev] SUBJECT.KEYID = 7
1,173,015 UART: [idev] UDS.KEYID = 0
1,173,361 ready_for_fw is high
1,173,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,681 UART: [idev] Erasing UDS.KEYID = 0
1,197,657 UART: [idev] Sha1 KeyId Algorithm
1,206,583 UART: [idev] --
1,207,682 UART: [ldev] ++
1,207,850 UART: [ldev] CDI.KEYID = 6
1,208,214 UART: [ldev] SUBJECT.KEYID = 5
1,208,641 UART: [ldev] AUTHORITY.KEYID = 7
1,209,104 UART: [ldev] FE.KEYID = 1
1,214,264 UART: [ldev] Erasing FE.KEYID = 1
1,240,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,320 UART: [ldev] --
1,279,662 UART: [fwproc] Wait for Commands...
1,280,347 UART: [fwproc] Recv command 0x46574c44
1,281,080 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,813 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,120 >>> mbox cmd response: success
2,773,315 UART: [afmc] ++
2,773,483 UART: [afmc] CDI.KEYID = 6
2,773,846 UART: [afmc] SUBJECT.KEYID = 7
2,774,272 UART: [afmc] AUTHORITY.KEYID = 5
2,809,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,780 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,390 UART: [afmc] --
2,853,452 UART: [cold-reset] --
2,854,392 UART: [state] Locking Datavault
2,855,571 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,175 UART: [state] Locking ICCM
2,856,769 UART: [exit] Launching FMC @ 0x40000130
2,862,098 UART:
2,862,114 UART: Running Caliptra FMC ...
2,862,522 UART:
2,862,576 UART: [state] CFI Enabled
2,872,809 UART: [fht] FMC Alias Private Key: 7
2,980,762 UART: [art] Extend RT PCRs Done
2,981,190 UART: [art] Lock RT PCRs Done
2,982,788 UART: [art] Populate DV Done
2,991,123 UART: [fht] FMC Alias Private Key: 7
2,992,119 UART: [art] Derive CDI
2,992,399 UART: [art] Store in in slot 0x4
3,077,662 UART: [art] Derive Key Pair
3,078,022 UART: [art] Store priv key in slot 0x5
3,091,244 UART: [art] Derive Key Pair - Done
3,106,009 UART: [art] Signing Cert with AUTHO
3,106,489 UART: RITY.KEYID = 7
3,121,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,854 UART: [art] PUB.X = 640EBB36764877D50FFA05D08D5782BA237E681C656B53B48C28AE338D8B6D2C2AAC9065F1CCFE02DBD679396850DA81
3,128,620 UART: [art] PUB.Y = 73C778E1A55A9AE5A6D5E1433FC613BF2C087775CE73A677CB76B63296F341D5CA31E88515C74692305432F5B4968A6E
3,135,565 UART: [art] SIG.R = B33ECA7876596FDA0CE51F42F12D2C7E8E63D7C5E475FBCFC3C622888EAAF050AB50EB9A676DF9D6492CD13F817B89C1
3,142,352 UART: [art] SIG.S = 2931F6298A818D094A02918F3B3172B37A9B12633613CC9ACA4B245838A866B8EFD527D5CECDFFBCAC01B844F2AEE7C6
3,165,844 UART: Caliptra RT
3,166,097 UART: [state] CFI Enabled
3,274,020 UART: [rt] RT listening for mailbox commands...
3,274,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,848 UART: [rt]cmd =0x41544d4e, len=14344
3,542,947 >>> mbox cmd response data (8 bytes)
3,542,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,879 UART: [rt]cmd =0x41545348, len=116
3,574,985 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,408 ready_for_fw is high
1,055,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,870 >>> mbox cmd response: success
2,685,180 UART:
2,685,196 UART: Running Caliptra FMC ...
2,685,604 UART:
2,685,658 UART: [state] CFI Enabled
2,695,999 UART: [fht] FMC Alias Private Key: 7
2,803,968 UART: [art] Extend RT PCRs Done
2,804,396 UART: [art] Lock RT PCRs Done
2,806,076 UART: [art] Populate DV Done
2,814,319 UART: [fht] FMC Alias Private Key: 7
2,815,275 UART: [art] Derive CDI
2,815,555 UART: [art] Store in in slot 0x4
2,901,222 UART: [art] Derive Key Pair
2,901,582 UART: [art] Store priv key in slot 0x5
2,915,524 UART: [art] Derive Key Pair - Done
2,930,465 UART: [art] Signing Cert with AUTHO
2,930,945 UART: RITY.KEYID = 7
2,946,409 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,174 UART: [art] PUB.X = EE21D33273F51226A7BFBE66109248B38739AACCD7E1A15F0957512E40FF3AE6034F7F9BB49CA92B9AA2F59F30891A9A
2,953,948 UART: [art] PUB.Y = 23A26B97B7C9F6BD091B0F7F3C4F176A80AF16DAAC48E881BEA8F3EC65B3623C125F9E6D825C2363CF88B142E98BA5F8
2,960,908 UART: [art] SIG.R = F6AA9D975CC15131CB627384BCA06083E70693AB1B757D7D92B447666E3903171EA2857A83959E1152AEB84331A1022E
2,967,663 UART: [art] SIG.S = 3E32BBCB510BA401DF5E0AE426FDCD823C1F22F55B72675C409BD60ED4E5757281E447EC57D38F3240157220AFB76238
2,991,414 UART: Caliptra RT
2,991,667 UART: [state] CFI Enabled
3,099,676 UART: [rt] RT listening for mailbox commands...
3,100,346 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,524 UART: [rt]cmd =0x41544d4e, len=14344
3,368,513 >>> mbox cmd response data (8 bytes)
3,368,514 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,855 UART: [rt]cmd =0x41545348, len=116
3,400,723 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,858 UART: [kat] ++
896,010 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,674 UART: [idev] ++
1,173,842 UART: [idev] CDI.KEYID = 6
1,174,203 UART: [idev] SUBJECT.KEYID = 7
1,174,628 UART: [idev] UDS.KEYID = 0
1,174,974 ready_for_fw is high
1,174,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,236 UART: [idev] --
1,209,277 UART: [ldev] ++
1,209,445 UART: [ldev] CDI.KEYID = 6
1,209,809 UART: [ldev] SUBJECT.KEYID = 5
1,210,236 UART: [ldev] AUTHORITY.KEYID = 7
1,210,699 UART: [ldev] FE.KEYID = 1
1,215,591 UART: [ldev] Erasing FE.KEYID = 1
1,241,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,547 UART: [ldev] --
1,281,025 UART: [fwproc] Wait for Commands...
1,281,720 UART: [fwproc] Recv command 0x46574c44
1,282,453 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,865 >>> mbox cmd response: success
2,776,024 UART: [afmc] ++
2,776,192 UART: [afmc] CDI.KEYID = 6
2,776,555 UART: [afmc] SUBJECT.KEYID = 7
2,776,981 UART: [afmc] AUTHORITY.KEYID = 5
2,812,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,604 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,487 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,206 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,973 UART: [afmc] --
2,856,077 UART: [cold-reset] --
2,856,921 UART: [state] Locking Datavault
2,858,190 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,794 UART: [state] Locking ICCM
2,859,456 UART: [exit] Launching FMC @ 0x40000130
2,864,785 UART:
2,864,801 UART: Running Caliptra FMC ...
2,865,209 UART:
2,865,352 UART: [state] CFI Enabled
2,876,027 UART: [fht] FMC Alias Private Key: 7
2,984,106 UART: [art] Extend RT PCRs Done
2,984,534 UART: [art] Lock RT PCRs Done
2,986,018 UART: [art] Populate DV Done
2,994,361 UART: [fht] FMC Alias Private Key: 7
2,995,481 UART: [art] Derive CDI
2,995,761 UART: [art] Store in in slot 0x4
3,081,500 UART: [art] Derive Key Pair
3,081,860 UART: [art] Store priv key in slot 0x5
3,095,300 UART: [art] Derive Key Pair - Done
3,110,279 UART: [art] Signing Cert with AUTHO
3,110,759 UART: RITY.KEYID = 7
3,126,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,926 UART: [art] PUB.X = 62C1A1287BA1FE715CB23261967E19E2EE1111738A1A942597EC9CF328FA4F252EB5282C22C5F1429A3AA09764FCF0CD
3,133,702 UART: [art] PUB.Y = 45F00B387B26C390E1FDD08ACB9A46560CAE127485D3B1E7AE72AE4D5ADBEC224E37C8A5A1F872D64EE5318B1276E2DA
3,140,664 UART: [art] SIG.R = 5ED0F4C557E2C2D52ABF5DFF43EF2DFA751A96CC73A8D482118E045006D284DC6029E8F894DD900B0DA94BA73CC782D7
3,147,438 UART: [art] SIG.S = 22FBE4392A4BE8E46A7473E55D391103C30F4AB611CBF4386B8883850AF34DD82CEDA8B090D0603B8A57CB3BBCF929F2
3,171,246 UART: Caliptra RT
3,171,591 UART: [state] CFI Enabled
3,280,186 UART: [rt] RT listening for mailbox commands...
3,280,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,862 UART: [rt]cmd =0x41544d4e, len=14344
3,548,621 >>> mbox cmd response data (8 bytes)
3,548,622 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,787 UART: [rt]cmd =0x41545348, len=116
3,580,833 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,069 ready_for_fw is high
1,057,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,329 >>> mbox cmd response: success
2,686,947 UART:
2,686,963 UART: Running Caliptra FMC ...
2,687,371 UART:
2,687,514 UART: [state] CFI Enabled
2,698,455 UART: [fht] FMC Alias Private Key: 7
2,806,538 UART: [art] Extend RT PCRs Done
2,806,966 UART: [art] Lock RT PCRs Done
2,808,248 UART: [art] Populate DV Done
2,816,353 UART: [fht] FMC Alias Private Key: 7
2,817,305 UART: [art] Derive CDI
2,817,585 UART: [art] Store in in slot 0x4
2,903,196 UART: [art] Derive Key Pair
2,903,556 UART: [art] Store priv key in slot 0x5
2,917,020 UART: [art] Derive Key Pair - Done
2,931,579 UART: [art] Signing Cert with AUTHO
2,932,059 UART: RITY.KEYID = 7
2,947,533 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,298 UART: [art] PUB.X = 6D3DC27B5FB9B01626F23735E389153E96996E8285F7BA9F4AE606F3FAC4418E5B50166D9B2363DDD333B2EAEDD5B584
2,955,073 UART: [art] PUB.Y = CE787ADCB59F7CF0F9C8E038803D85539CDE2D74DDDA7C2805A35F7C35278C548791306B5F807E74DBC99B1C73B8CF5D
2,962,034 UART: [art] SIG.R = 547F9784F55E0F24AE1485DE6463B197BE6158A06DA840AF3BCB2CB3123FBBF87187F8208019744B38EA3224BF73591C
2,968,803 UART: [art] SIG.S = 8EF5502297A1939B9CBBB0A3D8D7831DE9E673517DD289BE72EE08D2A75B9BAAF42F2E5A0EB107995C78B9226AA1E16D
2,992,649 UART: Caliptra RT
2,992,994 UART: [state] CFI Enabled
3,100,671 UART: [rt] RT listening for mailbox commands...
3,101,341 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,291 UART: [rt]cmd =0x41544d4e, len=14344
3,369,406 >>> mbox cmd response data (8 bytes)
3,369,407 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,680 UART: [rt]cmd =0x41545348, len=116
3,401,664 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,298 UART:
192,654 UART: Running Caliptra ROM ...
193,847 UART:
194,002 UART: [state] CFI Enabled
264,209 UART: [state] LifecycleState = Unprovisioned
266,129 UART: [state] DebugLocked = No
269,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,170 UART: [kat] SHA2-256
442,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,406 UART: [kat] ++
453,896 UART: [kat] sha1
465,222 UART: [kat] SHA2-256
467,924 UART: [kat] SHA2-384
472,856 UART: [kat] SHA2-512-ACC
475,221 UART: [kat] ECC-384
2,764,905 UART: [kat] HMAC-384Kdf
2,776,380 UART: [kat] LMS
3,966,650 UART: [kat] --
3,970,953 UART: [cold-reset] ++
3,972,532 UART: [fht] Storing FHT @ 0x50003400
3,983,393 UART: [idev] ++
3,983,995 UART: [idev] CDI.KEYID = 6
3,984,920 UART: [idev] SUBJECT.KEYID = 7
3,986,166 UART: [idev] UDS.KEYID = 0
3,987,212 ready_for_fw is high
3,987,429 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,130,829 UART: [idev] Erasing UDS.KEYID = 0
7,326,165 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,803 UART: [idev] --
7,353,057 UART: [ldev] ++
7,353,638 UART: [ldev] CDI.KEYID = 6
7,354,662 UART: [ldev] SUBJECT.KEYID = 5
7,355,824 UART: [ldev] AUTHORITY.KEYID = 7
7,357,057 UART: [ldev] FE.KEYID = 1
7,398,719 UART: [ldev] Erasing FE.KEYID = 1
10,732,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,014 UART: [ldev] --
13,113,471 UART: [fwproc] Waiting for Commands...
13,115,355 UART: [fwproc] Received command 0x46574c44
13,117,537 UART: [fwproc] Received Image of size 114124 bytes
17,167,781 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,367 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,276 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,631,776 >>> mbox cmd response: success
17,636,760 UART: [afmc] ++
17,637,359 UART: [afmc] CDI.KEYID = 6
17,638,244 UART: [afmc] SUBJECT.KEYID = 7
17,639,515 UART: [afmc] AUTHORITY.KEYID = 5
21,001,805 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,307 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,565 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,318,974 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,333,812 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,329 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,017 UART: [afmc] --
23,373,777 UART: [cold-reset] --
23,377,150 UART: [state] Locking Datavault
23,381,261 UART: [state] Locking PCR0, PCR1 and PCR31
23,383,015 UART: [state] Locking ICCM
23,385,414 UART: [exit] Launching FMC @ 0x40000130
23,393,761 UART:
23,393,993 UART: Running Caliptra FMC ...
23,395,022 UART:
23,395,173 UART: [state] CFI Enabled
23,460,511 UART: [fht] FMC Alias Private Key: 7
25,799,115 UART: [art] Extend RT PCRs Done
25,800,341 UART: [art] Lock RT PCRs Done
25,802,212 UART: [art] Populate DV Done
25,807,621 UART: [fht] FMC Alias Private Key: 7
25,809,123 UART: [art] Derive CDI
25,809,885 UART: [art] Store in in slot 0x4
25,869,528 UART: [art] Derive Key Pair
25,870,569 UART: [art] Store priv key in slot 0x5
29,162,937 UART: [art] Derive Key Pair - Done
29,176,036 UART: [art] Signing Cert with AUTHO
29,177,349 UART: RITY.KEYID = 7
31,464,734 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,247 UART: [art] PUB.X = A9D0730A9B5331430AE9701DBB92857A5CE9BCC6949B4D7584C7DB946BC9E27B8F3A6294541266B35D11C9E7F2D1FFAD
31,473,492 UART: [art] PUB.Y = 7328073CB9FA3FB488A15105F6E9EA86885C7A222A69999FFFD6B5556E612EFD8C8270BA7E3D521906AA5100DE229C2E
31,480,727 UART: [art] SIG.R = E812331B6374204284682910FB25C393A032527F0033C7030480932291A6E96A74F03CA0BAEE76B65C7CA82F59149360
31,488,061 UART: [art] SIG.S = D1E2BD30B336F1DFBD7B107151EFCEF3DC1A393B8A5BD212F483A0D55A63C5ECC8778B10FF1D9E4337338CCD69B42DF4
32,793,432 UART: Caliptra RT
32,794,143 UART: [state] CFI Enabled
32,953,943 UART: [rt] RT listening for mailbox commands...
37,129,592 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,285,177 UART: [rt]cmd =0x41544d4e, len=14344
42,520,852 >>> mbox cmd response data (8 bytes)
42,521,435 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,552,297 UART: [rt]cmd =0x41545348, len=116
42,554,640 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,784,397 ready_for_fw is high
3,784,795 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,857,828 >>> mbox cmd response: success
23,544,555 UART:
23,544,964 UART: Running Caliptra FMC ...
23,546,077 UART:
23,546,245 UART: [state] CFI Enabled
23,616,976 UART: [fht] FMC Alias Private Key: 7
25,955,095 UART: [art] Extend RT PCRs Done
25,956,317 UART: [art] Lock RT PCRs Done
25,957,894 UART: [art] Populate DV Done
25,963,328 UART: [fht] FMC Alias Private Key: 7
25,964,978 UART: [art] Derive CDI
25,965,798 UART: [art] Store in in slot 0x4
26,024,805 UART: [art] Derive Key Pair
26,025,853 UART: [art] Store priv key in slot 0x5
29,319,313 UART: [art] Derive Key Pair - Done
29,332,307 UART: [art] Signing Cert with AUTHO
29,333,623 UART: RITY.KEYID = 7
31,621,361 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,868 UART: [art] PUB.X = EFCFF82B2CC7A78CE3DF1E02C188D0A0FA81F7516D7681EA83058D0862F04DA237977FA10ED8C749AB0DB1D9CAB9F1BD
31,630,095 UART: [art] PUB.Y = 05F6DDAC21A5B98AAD681FEC7E6FF86DEBE5FCFF896D48DE760685B061E93A41C6BD51062C7E63B8C8F0F9BFEE0A42AE
31,637,424 UART: [art] SIG.R = 13440F7B71C5180836D03FDC64A29364C9AA0775E047E90978C0B8DE507D192B50C0B3923C7A95E9D498B6F211EAFC19
31,644,787 UART: [art] SIG.S = 8EA0E7B04910EB9B6B36475269E98FE7657A4231E0EFB7212E017C80E9B5D1F0B707349238F2D0354067A92E9834AB27
32,949,993 UART: Caliptra RT
32,950,699 UART: [state] CFI Enabled
33,111,095 UART: [rt] RT listening for mailbox commands...
37,283,465 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,439,116 UART: [rt]cmd =0x41544d4e, len=14344
42,674,829 >>> mbox cmd response data (8 bytes)
42,675,424 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,706,189 UART: [rt]cmd =0x41545348, len=116
42,708,397 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,553 UART:
192,949 UART: Running Caliptra ROM ...
194,134 UART:
603,775 UART: [state] CFI Enabled
618,644 UART: [state] LifecycleState = Unprovisioned
620,520 UART: [state] DebugLocked = No
622,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,051 UART: [kat] SHA2-256
796,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,406 UART: [kat] ++
807,854 UART: [kat] sha1
820,139 UART: [kat] SHA2-256
822,853 UART: [kat] SHA2-384
829,874 UART: [kat] SHA2-512-ACC
832,290 UART: [kat] ECC-384
3,119,137 UART: [kat] HMAC-384Kdf
3,131,279 UART: [kat] LMS
4,321,385 UART: [kat] --
4,325,171 UART: [cold-reset] ++
4,326,886 UART: [fht] Storing FHT @ 0x50003400
4,338,080 UART: [idev] ++
4,338,717 UART: [idev] CDI.KEYID = 6
4,339,623 UART: [idev] SUBJECT.KEYID = 7
4,340,865 UART: [idev] UDS.KEYID = 0
4,341,926 ready_for_fw is high
4,342,151 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,548 UART: [idev] Erasing UDS.KEYID = 0
7,628,684 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,668 UART: [idev] --
7,654,765 UART: [ldev] ++
7,655,329 UART: [ldev] CDI.KEYID = 6
7,656,290 UART: [ldev] SUBJECT.KEYID = 5
7,657,500 UART: [ldev] AUTHORITY.KEYID = 7
7,658,801 UART: [ldev] FE.KEYID = 1
7,668,148 UART: [ldev] Erasing FE.KEYID = 1
10,954,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,767 UART: [ldev] --
13,317,388 UART: [fwproc] Waiting for Commands...
13,319,964 UART: [fwproc] Received command 0x46574c44
13,322,141 UART: [fwproc] Received Image of size 114124 bytes
17,379,258 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,677 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,558 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,845,810 >>> mbox cmd response: success
17,849,562 UART: [afmc] ++
17,850,169 UART: [afmc] CDI.KEYID = 6
17,851,080 UART: [afmc] SUBJECT.KEYID = 7
17,852,352 UART: [afmc] AUTHORITY.KEYID = 5
21,166,691 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,462,709 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,974 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,479,389 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,494,225 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,662 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,426 UART: [afmc] --
23,534,828 UART: [cold-reset] --
23,539,490 UART: [state] Locking Datavault
23,545,552 UART: [state] Locking PCR0, PCR1 and PCR31
23,547,287 UART: [state] Locking ICCM
23,549,173 UART: [exit] Launching FMC @ 0x40000130
23,557,574 UART:
23,557,833 UART: Running Caliptra FMC ...
23,558,878 UART:
23,559,024 UART: [state] CFI Enabled
23,567,635 UART: [fht] FMC Alias Private Key: 7
25,898,334 UART: [art] Extend RT PCRs Done
25,899,739 UART: [art] Lock RT PCRs Done
25,901,335 UART: [art] Populate DV Done
25,906,637 UART: [fht] FMC Alias Private Key: 7
25,908,282 UART: [art] Derive CDI
25,909,093 UART: [art] Store in in slot 0x4
25,951,805 UART: [art] Derive Key Pair
25,952,842 UART: [art] Store priv key in slot 0x5
29,194,896 UART: [art] Derive Key Pair - Done
29,207,732 UART: [art] Signing Cert with AUTHO
29,209,033 UART: RITY.KEYID = 7
31,488,469 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,990 UART: [art] PUB.X = 492C0C72F194EA67D2316BE91AAD2E1F43621148A6C6A6B884702628860F6D1DA6196BC8DB12F9E698AA0C5D1BC2CB04
31,497,261 UART: [art] PUB.Y = 395CB749B43957DD71C304FF85C82050DCE84C73978AF2851D4410207E636B68A2A7385EAF82B9F458376FDC0F64BCFC
31,504,498 UART: [art] SIG.R = 1048A8AE7AF78D014C8A43CBF2E16A277F987449CF8BE3E5D907B73C640B6B58CEBD1A4BB712ABD19913898BB3F71E7B
31,511,881 UART: [art] SIG.S = D9D8B9CA4E4E99C21D1AE9868A5F94DC898DDA366031F1A4470287B73FA9F4BEFEFDB1C07FE2D6A41A614F763D26131A
32,816,474 UART: Caliptra RT
32,817,186 UART: [state] CFI Enabled
32,935,614 UART: [rt] RT listening for mailbox commands...
36,954,595 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,110,109 UART: [rt]cmd =0x41544d4e, len=14344
42,345,343 >>> mbox cmd response data (8 bytes)
42,345,931 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,376,384 UART: [rt]cmd =0x41545348, len=116
42,378,529 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
4,129,618 ready_for_fw is high
4,130,082 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,885 >>> mbox cmd response: success
23,714,172 UART:
23,714,556 UART: Running Caliptra FMC ...
23,715,680 UART:
23,715,831 UART: [state] CFI Enabled
23,723,882 UART: [fht] FMC Alias Private Key: 7
26,054,231 UART: [art] Extend RT PCRs Done
26,055,463 UART: [art] Lock RT PCRs Done
26,057,041 UART: [art] Populate DV Done
26,062,409 UART: [fht] FMC Alias Private Key: 7
26,063,911 UART: [art] Derive CDI
26,064,675 UART: [art] Store in in slot 0x4
26,107,227 UART: [art] Derive Key Pair
26,108,267 UART: [art] Store priv key in slot 0x5
29,350,306 UART: [art] Derive Key Pair - Done
29,363,536 UART: [art] Signing Cert with AUTHO
29,364,872 UART: RITY.KEYID = 7
31,644,271 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,783 UART: [art] PUB.X = 9738BE6D9CD9168EBB2767D5D83CFD7549A0BFCD0996B5C92151AA9BA0CFBB26A8535780B2E29F0795C6DFA377653B77
31,653,075 UART: [art] PUB.Y = 40AAFCFA6F32BAF9C2B0314E1D256BA819301EEDE925A6CD37BA8678F7200B92975C88797BCBF9E78F9F17FE9A60FB9B
31,660,312 UART: [art] SIG.R = DBE97AE081FD40536C0A09D40498F92E8F0136DEF0F752042E299EBFBCA8A05D06653B370DA716B4DAD48386E8EEC45A
31,667,694 UART: [art] SIG.S = 16B644BF17B74C630CAF486115AF197EC3C738D2FDC8AB3DC9913A28B9DD03E2B1A7F5772B81A76B9D37750E0EC0D1FB
32,973,582 UART: Caliptra RT
32,974,294 UART: [state] CFI Enabled
33,091,572 UART: [rt] RT listening for mailbox commands...
37,113,416 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,269,138 UART: [rt]cmd =0x41544d4e, len=14344
42,504,334 >>> mbox cmd response data (8 bytes)
42,504,933 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,535,781 UART: [rt]cmd =0x41545348, len=116
42,538,100 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,159 UART:
192,516 UART: Running Caliptra ROM ...
193,705 UART:
193,862 UART: [state] CFI Enabled
264,428 UART: [state] LifecycleState = Unprovisioned
266,293 UART: [state] DebugLocked = No
268,969 UART: [state] WD Timer not started. Device not locked for debugging
272,859 UART: [kat] SHA2-256
451,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,525 UART: [kat] ++
464,059 UART: [kat] sha1
473,882 UART: [kat] SHA2-256
476,901 UART: [kat] SHA2-384
483,815 UART: [kat] SHA2-512-ACC
486,749 UART: [kat] ECC-384
2,946,650 UART: [kat] HMAC-384Kdf
2,972,254 UART: [kat] LMS
3,501,654 UART: [kat] --
3,505,361 UART: [cold-reset] ++
3,507,569 UART: [fht] FHT @ 0x50003400
3,518,329 UART: [idev] ++
3,518,899 UART: [idev] CDI.KEYID = 6
3,519,812 UART: [idev] SUBJECT.KEYID = 7
3,520,982 UART: [idev] UDS.KEYID = 0
3,521,905 ready_for_fw is high
3,522,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,041 UART: [idev] Erasing UDS.KEYID = 0
6,025,725 UART: [idev] Sha1 KeyId Algorithm
6,048,496 UART: [idev] --
6,052,886 UART: [ldev] ++
6,053,521 UART: [ldev] CDI.KEYID = 6
6,054,447 UART: [ldev] SUBJECT.KEYID = 5
6,055,561 UART: [ldev] AUTHORITY.KEYID = 7
6,056,798 UART: [ldev] FE.KEYID = 1
6,100,550 UART: [ldev] Erasing FE.KEYID = 1
8,603,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,969 UART: [ldev] --
10,393,756 UART: [fwproc] Wait for Commands...
10,396,827 UART: [fwproc] Recv command 0x46574c44
10,398,915 UART: [fwproc] Recv'd Img size: 114448 bytes
13,804,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,871,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,940,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,258,491 >>> mbox cmd response: success
14,262,449 UART: [afmc] ++
14,263,043 UART: [afmc] CDI.KEYID = 6
14,263,961 UART: [afmc] SUBJECT.KEYID = 7
14,265,120 UART: [afmc] AUTHORITY.KEYID = 5
16,805,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,935 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,808 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,267 UART: [afmc] --
18,607,342 UART: [cold-reset] --
18,613,466 UART: [state] Locking Datavault
18,618,651 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,313 UART: [state] Locking ICCM
18,622,792 UART: [exit] Launching FMC @ 0x40000130
18,631,189 UART:
18,631,426 UART: Running Caliptra FMC ...
18,632,526 UART:
18,632,687 UART: [state] CFI Enabled
18,691,646 UART: [fht] FMC Alias Private Key: 7
20,455,617 UART: [art] Extend RT PCRs Done
20,456,819 UART: [art] Lock RT PCRs Done
20,458,255 UART: [art] Populate DV Done
20,463,658 UART: [fht] FMC Alias Private Key: 7
20,465,253 UART: [art] Derive CDI
20,466,069 UART: [art] Store in in slot 0x4
20,524,135 UART: [art] Derive Key Pair
20,525,147 UART: [art] Store priv key in slot 0x5
22,988,154 UART: [art] Derive Key Pair - Done
23,000,778 UART: [art] Signing Cert with AUTHO
23,002,092 UART: RITY.KEYID = 7
24,714,554 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,038 UART: [art] PUB.X = 80FC4E61CCD15DDDA4D71D8801CAD8C128047C2169575867C109DE5829F624477CE404CCC67C70FB9CB8320233A6CB47
24,723,301 UART: [art] PUB.Y = F4C0B3B593710DE6785697BD93B17203D6A2D68F85A962354BB9452FFB3FFC7652733FA4FCC2CB9560B5D9A84FEBAEA1
24,730,595 UART: [art] SIG.R = 31286D6D306C45DF0AF84188F7A71FDC05A0E47B1A886AA42DE5A2C5639EBCB232BA4C468F1C50AFCBF02AC1ACE16303
24,737,995 UART: [art] SIG.S = 9CF9843889A07BC4FDE4C1115E583E93EFB638ECDA1E3475E53BE47C867F9262A0F5CDB4EEA7868AF514033C49435F4F
25,716,791 UART: Caliptra RT
25,717,502 UART: [state] CFI Enabled
25,882,688 UART: [rt] RT listening for mailbox commands...
29,903,003 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,059,367 UART: [rt]cmd =0x41544d4e, len=14344
33,989,692 >>> mbox cmd response data (8 bytes)
33,990,260 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,021,124 UART: [rt]cmd =0x41545348, len=116
34,023,173 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,384,331 ready_for_fw is high
3,384,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,058,924 >>> mbox cmd response: success
18,346,960 UART:
18,347,362 UART: Running Caliptra FMC ...
18,348,470 UART:
18,348,624 UART: [state] CFI Enabled
18,412,779 UART: [fht] FMC Alias Private Key: 7
20,176,726 UART: [art] Extend RT PCRs Done
20,177,950 UART: [art] Lock RT PCRs Done
20,179,390 UART: [art] Populate DV Done
20,184,697 UART: [fht] FMC Alias Private Key: 7
20,186,396 UART: [art] Derive CDI
20,187,212 UART: [art] Store in in slot 0x4
20,245,823 UART: [art] Derive Key Pair
20,246,825 UART: [art] Store priv key in slot 0x5
22,709,296 UART: [art] Derive Key Pair - Done
22,722,220 UART: [art] Signing Cert with AUTHO
22,723,536 UART: RITY.KEYID = 7
24,435,103 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,607 UART: [art] PUB.X = A79C652ACEB90DA60D5500BD020576675EFEC6031BEB243C646D690F9B34E5E37423DA290B1D69EE56EB4E381E803673
24,443,854 UART: [art] PUB.Y = FB7E3FA844DE506556828C0D1DA5F46D117DC11BC11D77449067D716A316AFF2CF2C5BEFC9AEA3083D3F6E31ACA43268
24,451,159 UART: [art] SIG.R = 4581715835E7BF6A2230FAE9A4590870179C0222CFC8767C598F94E940428728E81E9A1275B5CA434AECF5D111B7BC4E
24,458,555 UART: [art] SIG.S = 814DB9E15A63206E80EFC519D2BE6A5490E7FF8ACF18C90EBA7A7200775EE73807F883DA83552A29EA1095D51417AB7B
25,437,673 UART: Caliptra RT
25,438,371 UART: [state] CFI Enabled
25,603,702 UART: [rt] RT listening for mailbox commands...
29,626,602 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,782,832 UART: [rt]cmd =0x41544d4e, len=14344
33,712,957 >>> mbox cmd response data (8 bytes)
33,713,538 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,744,224 UART: [rt]cmd =0x41545348, len=116
33,746,488 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,482 UART:
192,849 UART: Running Caliptra ROM ...
193,951 UART:
603,576 UART: [state] CFI Enabled
615,485 UART: [state] LifecycleState = Unprovisioned
617,377 UART: [state] DebugLocked = No
620,110 UART: [state] WD Timer not started. Device not locked for debugging
624,274 UART: [kat] SHA2-256
803,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,025 UART: [kat] ++
815,560 UART: [kat] sha1
825,653 UART: [kat] SHA2-256
828,655 UART: [kat] SHA2-384
834,567 UART: [kat] SHA2-512-ACC
837,493 UART: [kat] ECC-384
3,281,053 UART: [kat] HMAC-384Kdf
3,294,384 UART: [kat] LMS
3,823,919 UART: [kat] --
3,829,332 UART: [cold-reset] ++
3,831,612 UART: [fht] FHT @ 0x50003400
3,843,710 UART: [idev] ++
3,844,290 UART: [idev] CDI.KEYID = 6
3,845,207 UART: [idev] SUBJECT.KEYID = 7
3,846,379 UART: [idev] UDS.KEYID = 0
3,847,296 ready_for_fw is high
3,847,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,342 UART: [idev] Erasing UDS.KEYID = 0
6,320,884 UART: [idev] Sha1 KeyId Algorithm
6,343,463 UART: [idev] --
6,346,428 UART: [ldev] ++
6,346,992 UART: [ldev] CDI.KEYID = 6
6,347,894 UART: [ldev] SUBJECT.KEYID = 5
6,349,096 UART: [ldev] AUTHORITY.KEYID = 7
6,350,324 UART: [ldev] FE.KEYID = 1
6,363,027 UART: [ldev] Erasing FE.KEYID = 1
8,835,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,218 UART: [ldev] --
10,626,479 UART: [fwproc] Wait for Commands...
10,628,564 UART: [fwproc] Recv command 0x46574c44
10,630,650 UART: [fwproc] Recv'd Img size: 114448 bytes
14,033,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,358 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,495,048 >>> mbox cmd response: success
14,498,915 UART: [afmc] ++
14,499,501 UART: [afmc] CDI.KEYID = 6
14,500,411 UART: [afmc] SUBJECT.KEYID = 7
14,501,566 UART: [afmc] AUTHORITY.KEYID = 5
17,005,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,309 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,135 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,885 UART: [afmc] --
18,801,858 UART: [cold-reset] --
18,805,120 UART: [state] Locking Datavault
18,808,579 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,270 UART: [state] Locking ICCM
18,812,514 UART: [exit] Launching FMC @ 0x40000130
18,820,968 UART:
18,821,195 UART: Running Caliptra FMC ...
18,822,286 UART:
18,822,439 UART: [state] CFI Enabled
18,830,750 UART: [fht] FMC Alias Private Key: 7
20,587,744 UART: [art] Extend RT PCRs Done
20,588,971 UART: [art] Lock RT PCRs Done
20,590,171 UART: [art] Populate DV Done
20,595,468 UART: [fht] FMC Alias Private Key: 7
20,597,003 UART: [art] Derive CDI
20,597,734 UART: [art] Store in in slot 0x4
20,640,706 UART: [art] Derive Key Pair
20,641,741 UART: [art] Store priv key in slot 0x5
23,068,451 UART: [art] Derive Key Pair - Done
23,081,337 UART: [art] Signing Cert with AUTHO
23,082,668 UART: RITY.KEYID = 7
24,788,059 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,560 UART: [art] PUB.X = C9A6AA91204A738A0638D551FE2FD06B906C8B708296A543ABFA3E3D584F2873F5D2F65C5DF77E800B385F0BCBD164A6
24,796,844 UART: [art] PUB.Y = E8756862FF3FC1EDDF638679EBB1B4454639C41E1D43D1887C4809B8F1502184ABCE2803EBF98829F1F8DBEF19D3BEDC
24,804,115 UART: [art] SIG.R = 99758D7221CD5883782EC533FE7C095727A5629C7475149B75438664683C2D1E7F5C5F9ED691BE120DF08AA947B6CA0B
24,811,494 UART: [art] SIG.S = 01180A14D4027F56588963AB33384485A635F6D5B1757902E84C8FC5A8A39BD04BA6E8CAAA340BB2737F5250894A6D03
25,790,133 UART: Caliptra RT
25,790,834 UART: [state] CFI Enabled
25,907,911 UART: [rt] RT listening for mailbox commands...
29,928,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,084,564 UART: [rt]cmd =0x41544d4e, len=14344
34,015,220 >>> mbox cmd response data (8 bytes)
34,015,851 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,046,548 UART: [rt]cmd =0x41545348, len=116
34,048,625 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,695,707 ready_for_fw is high
3,696,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,107 >>> mbox cmd response: success
18,508,453 UART:
18,508,845 UART: Running Caliptra FMC ...
18,510,034 UART:
18,510,200 UART: [state] CFI Enabled
18,518,193 UART: [fht] FMC Alias Private Key: 7
20,275,039 UART: [art] Extend RT PCRs Done
20,276,253 UART: [art] Lock RT PCRs Done
20,278,028 UART: [art] Populate DV Done
20,283,655 UART: [fht] FMC Alias Private Key: 7
20,285,356 UART: [art] Derive CDI
20,286,089 UART: [art] Store in in slot 0x4
20,328,954 UART: [art] Derive Key Pair
20,329,993 UART: [art] Store priv key in slot 0x5
22,756,820 UART: [art] Derive Key Pair - Done
22,769,880 UART: [art] Signing Cert with AUTHO
22,771,181 UART: RITY.KEYID = 7
24,476,508 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,984 UART: [art] PUB.X = B488B76743D574A0193D6A7C4FFE309D809BE02604A242A5B86346196F9ECFDEBDDEC1844C2B98D108C79BE481A8B98F
24,485,267 UART: [art] PUB.Y = C47AE8534C28E09352C5B5ED8A47D75A0DE8FAD739F933CFC3CD67CF553D504BBB5860F19A961EB429D645B2A59426AB
24,492,554 UART: [art] SIG.R = 120633BC82967BDC43771710EBFDE7042B16A8F886D3782401218FFCE8C2542E64907A03FE0D3B89F50453C9429DF38E
24,499,931 UART: [art] SIG.S = 9581A69285873CB8C359818EDD0C71502DB37E1AE9C1459DE835E602717740D3A3E181C27E6F149207017A9B436D7014
25,478,939 UART: Caliptra RT
25,479,648 UART: [state] CFI Enabled
25,597,508 UART: [rt] RT listening for mailbox commands...
29,621,595 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,777,082 UART: [rt]cmd =0x41544d4e, len=14344
33,707,288 >>> mbox cmd response data (8 bytes)
33,707,873 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,738,514 UART: [rt]cmd =0x41545348, len=116
33,740,545 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,435,208 ready_for_fw is high
3,435,623 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,591 >>> mbox cmd response: success
19,027,989 UART:
19,028,467 UART: Running Caliptra FMC ...
19,029,573 UART:
19,029,741 UART: [state] CFI Enabled
19,096,140 UART: [fht] FMC Alias Private Key: 7
20,859,740 UART: [art] Extend RT PCRs Done
20,860,957 UART: [art] Lock RT PCRs Done
20,862,584 UART: [art] Populate DV Done
20,867,886 UART: [fht] FMC Alias Private Key: 7
20,869,481 UART: [art] Derive CDI
20,870,293 UART: [art] Store in in slot 0x4
20,928,663 UART: [art] Derive Key Pair
20,929,699 UART: [art] Store priv key in slot 0x5
23,392,503 UART: [art] Derive Key Pair - Done
23,405,281 UART: [art] Signing Cert with AUTHO
23,406,582 UART: RITY.KEYID = 7
25,118,635 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,143 UART: [art] PUB.X = 72A30EE671CC5EA0155F0A4A009718C35301B1E2CAD472066949C1229D9705E8A5D1367AFBDF0380B9D89E2154425892
25,127,332 UART: [art] PUB.Y = 88E38773550F626FE7539B6B712B05504372BD034620B301B95D2FA056AA86DFE32704E4ECF69763A5CE1588773D9794
25,134,580 UART: [art] SIG.R = C71D1AFC4B82B9DA9CD6514E85630A30B0398ACFDB574C5FF89582A88805855784CB0D9693510B643E7FC480BDC2BDAD
25,142,006 UART: [art] SIG.S = 8A39C797DF73675327E07DCA3AE2F883F9C28AAC9C72836059718A0491FB40DE2DE806BF73E3F50F5A9CECD6DA57D698
26,121,100 UART: Caliptra RT
26,121,784 UART: [state] CFI Enabled
26,286,958 UART: [rt] RT listening for mailbox commands...
30,308,868 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,464,870 UART: [rt]cmd =0x41544d4e, len=14344
34,395,369 >>> mbox cmd response data (8 bytes)
34,395,967 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,426,654 UART: [rt]cmd =0x41545348, len=116
34,428,784 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
3,760,597 ready_for_fw is high
3,761,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,967,251 >>> mbox cmd response: success
19,224,676 UART:
19,225,073 UART: Running Caliptra FMC ...
19,226,172 UART:
19,226,318 UART: [state] CFI Enabled
19,234,389 UART: [fht] FMC Alias Private Key: 7
20,991,265 UART: [art] Extend RT PCRs Done
20,992,477 UART: [art] Lock RT PCRs Done
20,994,556 UART: [art] Populate DV Done
20,999,912 UART: [fht] FMC Alias Private Key: 7
21,001,631 UART: [art] Derive CDI
21,002,454 UART: [art] Store in in slot 0x4
21,044,722 UART: [art] Derive Key Pair
21,045,719 UART: [art] Store priv key in slot 0x5
23,472,192 UART: [art] Derive Key Pair - Done
23,485,203 UART: [art] Signing Cert with AUTHO
23,486,528 UART: RITY.KEYID = 7
25,192,080 UART: [art] Erasing AUTHORITY.KEYID = 7
25,193,571 UART: [art] PUB.X = 23447A2DB19AB6EA9D98DEB387BC5C1D3D69D9ACB3C62FFE290D64415DC1D765F1AAFC84BCEBB4D539052ED05929E9FC
25,200,912 UART: [art] PUB.Y = 330C8E4DC83F656D611A3A805351A01A982E626A9C1AF05E25399DE1C301AA2A73D97A259B2D1ACE913283A477C77BB1
25,208,190 UART: [art] SIG.R = BE6673066415C7A85A3ED4C023E2DA100AF895BDADDAF2CA7F7DF89FA1CA759C4AEE3BE9BCC8B4119285E50F46E5994A
25,215,549 UART: [art] SIG.S = 29B811DB3B06B2C29E55CB97EDD1187A5E43C14F146FC7FA866AB0639908685FF6BC5A0D60C7F2CD73846DB3D7FEB57B
26,194,293 UART: Caliptra RT
26,195,001 UART: [state] CFI Enabled
26,312,820 UART: [rt] RT listening for mailbox commands...
30,333,143 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,488,669 UART: [rt]cmd =0x41544d4e, len=14344
34,419,324 >>> mbox cmd response data (8 bytes)
34,419,906 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,450,429 UART: [rt]cmd =0x41545348, len=116
34,452,560 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,628 UART: [state] LifecycleState = Unprovisioned
86,283 UART: [state] DebugLocked = No
86,825 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,397 UART: [kat] SHA2-256
882,328 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,443 UART: [kat] ++
886,595 UART: [kat] sha1
890,925 UART: [kat] SHA2-256
892,863 UART: [kat] SHA2-384
895,456 UART: [kat] SHA2-512-ACC
897,357 UART: [kat] ECC-384
902,666 UART: [kat] HMAC-384Kdf
907,122 UART: [kat] LMS
1,475,318 UART: [kat] --
1,476,483 UART: [cold-reset] ++
1,476,869 UART: [fht] Storing FHT @ 0x50003400
1,479,504 UART: [idev] ++
1,479,672 UART: [idev] CDI.KEYID = 6
1,480,032 UART: [idev] SUBJECT.KEYID = 7
1,480,456 UART: [idev] UDS.KEYID = 0
1,480,801 ready_for_fw is high
1,480,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,606 UART: [idev] Erasing UDS.KEYID = 0
1,505,346 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,880 UART: [idev] --
1,514,909 UART: [ldev] ++
1,515,077 UART: [ldev] CDI.KEYID = 6
1,515,440 UART: [ldev] SUBJECT.KEYID = 5
1,515,866 UART: [ldev] AUTHORITY.KEYID = 7
1,516,329 UART: [ldev] FE.KEYID = 1
1,521,519 UART: [ldev] Erasing FE.KEYID = 1
1,546,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,016 UART: [ldev] --
1,585,277 UART: [fwproc] Waiting for Commands...
1,586,088 UART: [fwproc] Received command 0x46574c44
1,586,879 UART: [fwproc] Received Image of size 114448 bytes
2,884,888 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,876 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,228 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,227 >>> mbox cmd response: success
3,078,319 UART: [afmc] ++
3,078,487 UART: [afmc] CDI.KEYID = 6
3,078,849 UART: [afmc] SUBJECT.KEYID = 7
3,079,274 UART: [afmc] AUTHORITY.KEYID = 5
3,113,625 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,055 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,835 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,563 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,448 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,138 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,929 UART: [afmc] --
3,156,839 UART: [cold-reset] --
3,157,707 UART: [state] Locking Datavault
3,159,080 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,684 UART: [state] Locking ICCM
3,160,292 UART: [exit] Launching FMC @ 0x40000130
3,165,621 UART:
3,165,637 UART: Running Caliptra FMC ...
3,166,045 UART:
3,166,099 UART: [state] CFI Enabled
3,176,370 UART: [fht] FMC Alias Private Key: 7
3,284,123 UART: [art] Extend RT PCRs Done
3,284,551 UART: [art] Lock RT PCRs Done
3,286,053 UART: [art] Populate DV Done
3,294,382 UART: [fht] FMC Alias Private Key: 7
3,295,370 UART: [art] Derive CDI
3,295,650 UART: [art] Store in in slot 0x4
3,381,389 UART: [art] Derive Key Pair
3,381,749 UART: [art] Store priv key in slot 0x5
3,394,401 UART: [art] Derive Key Pair - Done
3,408,952 UART: [art] Signing Cert with AUTHO
3,409,432 UART: RITY.KEYID = 7
3,424,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,259 UART: [art] PUB.X = FDFE5C036754B83425C85B0A89C10F0C8CA7DA46CCB01BE85D36046F2FC901961C5D9BFFCB14F2DC06A9FFF0E0E40CC5
3,432,029 UART: [art] PUB.Y = FC56F990DCE7273EED5384ED46099DB7A89D91B08AB73A0F46A4D7A6157A77E9525E60260066330AB1C10534E204BDA4
3,438,946 UART: [art] SIG.R = 5C87D32207ADCE2A4C86FF740EEADB3755D7A4B5A3D3CE70DA09B2948A4F1851B7B930EDEA1E6EC862D5C98E334D7B1E
3,445,729 UART: [art] SIG.S = 5D43576D6D95EE95A65A2B3E4EECB80BB5FAC451C1B31DD8946E7E11069BA788D8323E7BDA09632F16B439A0DB778E60
3,469,245 UART: Caliptra RT
3,469,498 UART: [state] CFI Enabled
3,577,718 UART: [rt] RT listening for mailbox commands...
3,578,388 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,510 UART: [rt]cmd =0x41544d4e, len=14344
3,845,945 >>> mbox cmd response data (8 bytes)
3,845,946 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,875,973 UART: [rt]cmd =0x41545348, len=116
3,877,725 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,911 ready_for_fw is high
1,362,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,459 >>> mbox cmd response: success
2,991,305 UART:
2,991,321 UART: Running Caliptra FMC ...
2,991,729 UART:
2,991,783 UART: [state] CFI Enabled
3,002,050 UART: [fht] FMC Alias Private Key: 7
3,110,717 UART: [art] Extend RT PCRs Done
3,111,145 UART: [art] Lock RT PCRs Done
3,112,429 UART: [art] Populate DV Done
3,120,688 UART: [fht] FMC Alias Private Key: 7
3,121,830 UART: [art] Derive CDI
3,122,110 UART: [art] Store in in slot 0x4
3,207,727 UART: [art] Derive Key Pair
3,208,087 UART: [art] Store priv key in slot 0x5
3,221,467 UART: [art] Derive Key Pair - Done
3,236,045 UART: [art] Signing Cert with AUTHO
3,236,525 UART: RITY.KEYID = 7
3,251,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,220 UART: [art] PUB.X = 0D5DD5E6A64074D72579056B470570C181414F09981B00284C65BE2A094CD952556F04DD97DD4724BEBC916E071A57BF
3,258,943 UART: [art] PUB.Y = 98EEDD66F4739B980B1E2B7589217184BDE59C216C4F654388EEE5976F6C309ADF36C7F1C7ABB7C69DE00E19B6AC402F
3,265,899 UART: [art] SIG.R = CF8EA5278D3C001D8C2B689B5BFFD52B68297D3CF669B733A8A0141CB6BD213208D2C626ED1373EA677B272CA2497B29
3,272,652 UART: [art] SIG.S = EA63860E9D1296684530EDD756E9510382DEE888991AB1F4F364111778CC81661AAD1D1CAC5B9A5B650834E72CD6C495
3,296,256 UART: Caliptra RT
3,296,509 UART: [state] CFI Enabled
3,405,045 UART: [rt] RT listening for mailbox commands...
3,405,715 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,917 UART: [rt]cmd =0x41544d4e, len=14344
3,673,774 >>> mbox cmd response data (8 bytes)
3,673,775 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,724 UART: [rt]cmd =0x41545348, len=116
3,705,680 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,538 UART: [kat] SHA2-256
882,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,584 UART: [kat] ++
886,736 UART: [kat] sha1
890,958 UART: [kat] SHA2-256
892,896 UART: [kat] SHA2-384
895,657 UART: [kat] SHA2-512-ACC
897,558 UART: [kat] ECC-384
903,217 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,477,164 UART: [cold-reset] ++
1,477,574 UART: [fht] Storing FHT @ 0x50003400
1,480,297 UART: [idev] ++
1,480,465 UART: [idev] CDI.KEYID = 6
1,480,825 UART: [idev] SUBJECT.KEYID = 7
1,481,249 UART: [idev] UDS.KEYID = 0
1,481,594 ready_for_fw is high
1,481,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,435 UART: [idev] Erasing UDS.KEYID = 0
1,505,591 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,231 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,521,992 UART: [ldev] Erasing FE.KEYID = 1
1,546,817 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,813 UART: [ldev] --
1,586,312 UART: [fwproc] Waiting for Commands...
1,586,999 UART: [fwproc] Received command 0x46574c44
1,587,790 UART: [fwproc] Received Image of size 114448 bytes
2,886,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,789 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,141 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,184 >>> mbox cmd response: success
3,080,312 UART: [afmc] ++
3,080,480 UART: [afmc] CDI.KEYID = 6
3,080,842 UART: [afmc] SUBJECT.KEYID = 7
3,081,267 UART: [afmc] AUTHORITY.KEYID = 5
3,116,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,700 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,480 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,093 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,783 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,666 UART: [afmc] --
3,159,740 UART: [cold-reset] --
3,160,402 UART: [state] Locking Datavault
3,161,837 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,441 UART: [state] Locking ICCM
3,162,939 UART: [exit] Launching FMC @ 0x40000130
3,168,268 UART:
3,168,284 UART: Running Caliptra FMC ...
3,168,692 UART:
3,168,835 UART: [state] CFI Enabled
3,179,540 UART: [fht] FMC Alias Private Key: 7
3,287,467 UART: [art] Extend RT PCRs Done
3,287,895 UART: [art] Lock RT PCRs Done
3,289,525 UART: [art] Populate DV Done
3,297,454 UART: [fht] FMC Alias Private Key: 7
3,298,586 UART: [art] Derive CDI
3,298,866 UART: [art] Store in in slot 0x4
3,384,117 UART: [art] Derive Key Pair
3,384,477 UART: [art] Store priv key in slot 0x5
3,398,117 UART: [art] Derive Key Pair - Done
3,412,868 UART: [art] Signing Cert with AUTHO
3,413,348 UART: RITY.KEYID = 7
3,428,474 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,239 UART: [art] PUB.X = 932DD2BFFC683567F22284396A46D559E48F3B15D3F4B6CCB38300D775AA45901FDFE838433AFF9BDB8B16A20F560133
3,435,987 UART: [art] PUB.Y = 630A118FE2547AEF065EB48769796F316E77BC3B067120ED4897681882485530F549EEEFAC910E4B33059BC65A5B147E
3,442,918 UART: [art] SIG.R = 94BA763FC77E1F0863FBD3C4550307C72DBF1BB79F15F5418DE410191C7EEB6DFBA2A5A33696A881DCC1AB5CA2E23779
3,449,695 UART: [art] SIG.S = A89986F6E476213F19CB292FFB7D03B6FA28E2F8864510BBE3A77005F14767B5A84CD896F72E8561A3E81A70EF4EAC6F
3,472,580 UART: Caliptra RT
3,472,925 UART: [state] CFI Enabled
3,581,381 UART: [rt] RT listening for mailbox commands...
3,582,051 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,099 UART: [rt]cmd =0x41544d4e, len=14344
3,849,992 >>> mbox cmd response data (8 bytes)
3,849,993 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,906 UART: [rt]cmd =0x41545348, len=116
3,881,834 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,418 ready_for_fw is high
1,362,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,246 >>> mbox cmd response: success
2,990,376 UART:
2,990,392 UART: Running Caliptra FMC ...
2,990,800 UART:
2,990,943 UART: [state] CFI Enabled
3,001,426 UART: [fht] FMC Alias Private Key: 7
3,109,963 UART: [art] Extend RT PCRs Done
3,110,391 UART: [art] Lock RT PCRs Done
3,111,949 UART: [art] Populate DV Done
3,119,946 UART: [fht] FMC Alias Private Key: 7
3,121,086 UART: [art] Derive CDI
3,121,366 UART: [art] Store in in slot 0x4
3,206,885 UART: [art] Derive Key Pair
3,207,245 UART: [art] Store priv key in slot 0x5
3,220,217 UART: [art] Derive Key Pair - Done
3,234,808 UART: [art] Signing Cert with AUTHO
3,235,288 UART: RITY.KEYID = 7
3,250,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,993 UART: [art] PUB.X = C3481BA6370BCAFD18155D336CEB78241189908E258915F099070BE32F91A0266546CB2ADB451E7AF53EE5CC4E6A8447
3,257,756 UART: [art] PUB.Y = CB21ACEA00511CDAC5B209AFC5F2CF15DC564219C6EC77017AF3135D5E8DFDFB92CA1AA2BC0502ABC4ED318B7C2A3255
3,264,700 UART: [art] SIG.R = D6E9B704B3B5D4BE9D1D0F059635A11F05418E451D1CA377AECD476BCB4945716D5EE8B5AA206C35873CBDB20F33B644
3,271,467 UART: [art] SIG.S = 89BDC02309C67CD0FE54D16C59641FA51A0C55B88CBD266572665D57019FEDCB0A494AD6ADAA9E254C87F9BBC4BAFF60
3,294,818 UART: Caliptra RT
3,295,163 UART: [state] CFI Enabled
3,402,875 UART: [rt] RT listening for mailbox commands...
3,403,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,331 UART: [rt]cmd =0x41544d4e, len=14344
3,670,724 >>> mbox cmd response data (8 bytes)
3,670,725 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,704 UART: [rt]cmd =0x41545348, len=116
3,702,618 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
893,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,695 UART: [kat] ++
897,847 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,688 UART: [kat] SHA2-512-ACC
908,589 UART: [kat] ECC-384
918,666 UART: [kat] HMAC-384Kdf
923,126 UART: [kat] LMS
1,171,454 UART: [kat] --
1,172,287 UART: [cold-reset] ++
1,172,823 UART: [fht] FHT @ 0x50003400
1,175,326 UART: [idev] ++
1,175,494 UART: [idev] CDI.KEYID = 6
1,175,854 UART: [idev] SUBJECT.KEYID = 7
1,176,278 UART: [idev] UDS.KEYID = 0
1,176,623 ready_for_fw is high
1,176,623 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,274 UART: [idev] Erasing UDS.KEYID = 0
1,201,477 UART: [idev] Sha1 KeyId Algorithm
1,210,043 UART: [idev] --
1,210,975 UART: [ldev] ++
1,211,143 UART: [ldev] CDI.KEYID = 6
1,211,506 UART: [ldev] SUBJECT.KEYID = 5
1,211,932 UART: [ldev] AUTHORITY.KEYID = 7
1,212,395 UART: [ldev] FE.KEYID = 1
1,217,749 UART: [ldev] Erasing FE.KEYID = 1
1,244,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,745 UART: [ldev] --
1,283,198 UART: [fwproc] Wait for Commands...
1,283,940 UART: [fwproc] Recv command 0x46574c44
1,284,668 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,458 >>> mbox cmd response: success
2,777,516 UART: [afmc] ++
2,777,684 UART: [afmc] CDI.KEYID = 6
2,778,046 UART: [afmc] SUBJECT.KEYID = 7
2,778,471 UART: [afmc] AUTHORITY.KEYID = 5
2,814,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,721 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,606 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,325 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,087 UART: [afmc] --
2,857,121 UART: [cold-reset] --
2,857,761 UART: [state] Locking Datavault
2,858,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,280 UART: [state] Locking ICCM
2,859,860 UART: [exit] Launching FMC @ 0x40000130
2,865,189 UART:
2,865,205 UART: Running Caliptra FMC ...
2,865,613 UART:
2,865,667 UART: [state] CFI Enabled
2,876,584 UART: [fht] FMC Alias Private Key: 7
2,984,831 UART: [art] Extend RT PCRs Done
2,985,259 UART: [art] Lock RT PCRs Done
2,986,907 UART: [art] Populate DV Done
2,995,110 UART: [fht] FMC Alias Private Key: 7
2,996,118 UART: [art] Derive CDI
2,996,398 UART: [art] Store in in slot 0x4
3,082,121 UART: [art] Derive Key Pair
3,082,481 UART: [art] Store priv key in slot 0x5
3,095,235 UART: [art] Derive Key Pair - Done
3,110,042 UART: [art] Signing Cert with AUTHO
3,110,522 UART: RITY.KEYID = 7
3,126,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,845 UART: [art] PUB.X = CE69768040F01EC62B30BF490F28E66A88730D0CD8C4B02B4A11FF8FB80D4330A0223540D7E3C85DCFBB9A7A4CD7CBF8
3,133,619 UART: [art] PUB.Y = 4D90DB34234B243A313728D5A81B004C7EB0C445604594FA1EB739B1CE4C897AD629DBA6A7BF78842CFFEB7BBEFC129D
3,140,563 UART: [art] SIG.R = B7FAD82A7C824D16521B823CF9BAFF1C0D6D5A1CF7779B1CD94D57B174E5998BDC6C626A886689C298B702E2E5F3D090
3,147,339 UART: [art] SIG.S = 6CA148BE99CE3514543CF893335879D71C58FC2E6DFCD964EA76609FDFDB387A1EA6519DA2AA7731BFBE46C9452C3CE1
3,170,828 UART: Caliptra RT
3,171,081 UART: [state] CFI Enabled
3,280,066 UART: [rt] RT listening for mailbox commands...
3,280,736 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,898 UART: [rt]cmd =0x41544d4e, len=14344
3,548,819 >>> mbox cmd response data (8 bytes)
3,548,820 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,161 UART: [rt]cmd =0x41545348, len=116
3,580,775 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,233 ready_for_fw is high
1,060,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,851 >>> mbox cmd response: success
2,689,863 UART:
2,689,879 UART: Running Caliptra FMC ...
2,690,287 UART:
2,690,341 UART: [state] CFI Enabled
2,700,926 UART: [fht] FMC Alias Private Key: 7
2,808,543 UART: [art] Extend RT PCRs Done
2,808,971 UART: [art] Lock RT PCRs Done
2,810,319 UART: [art] Populate DV Done
2,818,382 UART: [fht] FMC Alias Private Key: 7
2,819,370 UART: [art] Derive CDI
2,819,650 UART: [art] Store in in slot 0x4
2,905,135 UART: [art] Derive Key Pair
2,905,495 UART: [art] Store priv key in slot 0x5
2,918,627 UART: [art] Derive Key Pair - Done
2,933,703 UART: [art] Signing Cert with AUTHO
2,934,183 UART: RITY.KEYID = 7
2,948,857 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,622 UART: [art] PUB.X = D987CC72ED0A52F1ACCEB9836D24DFEEDBFAE5CB60F56FE7B9C854E89AD426A37068356B6C0C1C218BAA220DA51F9050
2,956,407 UART: [art] PUB.Y = 7286F574A6BB5B04A2193345ACF62163769418A83980816F3B55EAED4CE619229C4CD7735B910D4DF72E42BA41E7DCC7
2,963,353 UART: [art] SIG.R = E8AC3272D1FD18CA203547F4403C01E9282953A6B2D972DA1E09C9807FD24BD6E9BBD2E64B770A755EEC929E0F487054
2,970,117 UART: [art] SIG.S = BF817883AB30C52CDBBB8E08BC4FF7C9D4C14FBDC4E4B064C1FF4CE75882FAF1E9747138DA004050102F67AA37B61178
2,994,243 UART: Caliptra RT
2,994,496 UART: [state] CFI Enabled
3,103,020 UART: [rt] RT listening for mailbox commands...
3,103,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,676 UART: [rt]cmd =0x41544d4e, len=14344
3,371,563 >>> mbox cmd response data (8 bytes)
3,371,564 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,749 UART: [rt]cmd =0x41545348, len=116
3,403,673 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
893,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,944 UART: [kat] ++
898,096 UART: [kat] sha1
902,346 UART: [kat] SHA2-256
904,286 UART: [kat] SHA2-384
907,141 UART: [kat] SHA2-512-ACC
909,042 UART: [kat] ECC-384
918,455 UART: [kat] HMAC-384Kdf
923,141 UART: [kat] LMS
1,171,469 UART: [kat] --
1,172,182 UART: [cold-reset] ++
1,172,582 UART: [fht] FHT @ 0x50003400
1,175,317 UART: [idev] ++
1,175,485 UART: [idev] CDI.KEYID = 6
1,175,845 UART: [idev] SUBJECT.KEYID = 7
1,176,269 UART: [idev] UDS.KEYID = 0
1,176,614 ready_for_fw is high
1,176,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,313 UART: [idev] Erasing UDS.KEYID = 0
1,201,524 UART: [idev] Sha1 KeyId Algorithm
1,210,002 UART: [idev] --
1,210,980 UART: [ldev] ++
1,211,148 UART: [ldev] CDI.KEYID = 6
1,211,511 UART: [ldev] SUBJECT.KEYID = 5
1,211,937 UART: [ldev] AUTHORITY.KEYID = 7
1,212,400 UART: [ldev] FE.KEYID = 1
1,217,566 UART: [ldev] Erasing FE.KEYID = 1
1,243,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,036 UART: [ldev] --
1,283,317 UART: [fwproc] Wait for Commands...
1,283,909 UART: [fwproc] Recv command 0x46574c44
1,284,637 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,300 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,695 >>> mbox cmd response: success
2,777,739 UART: [afmc] ++
2,777,907 UART: [afmc] CDI.KEYID = 6
2,778,269 UART: [afmc] SUBJECT.KEYID = 7
2,778,694 UART: [afmc] AUTHORITY.KEYID = 5
2,814,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,052 UART: [afmc] --
2,858,150 UART: [cold-reset] --
2,858,944 UART: [state] Locking Datavault
2,860,019 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,623 UART: [state] Locking ICCM
2,861,099 UART: [exit] Launching FMC @ 0x40000130
2,866,428 UART:
2,866,444 UART: Running Caliptra FMC ...
2,866,852 UART:
2,866,995 UART: [state] CFI Enabled
2,877,606 UART: [fht] FMC Alias Private Key: 7
2,985,691 UART: [art] Extend RT PCRs Done
2,986,119 UART: [art] Lock RT PCRs Done
2,987,601 UART: [art] Populate DV Done
2,995,918 UART: [fht] FMC Alias Private Key: 7
2,996,890 UART: [art] Derive CDI
2,997,170 UART: [art] Store in in slot 0x4
3,082,581 UART: [art] Derive Key Pair
3,082,941 UART: [art] Store priv key in slot 0x5
3,095,431 UART: [art] Derive Key Pair - Done
3,110,253 UART: [art] Signing Cert with AUTHO
3,110,733 UART: RITY.KEYID = 7
3,126,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,142 UART: [art] PUB.X = 6D9E369B459C5BD7553EE076C3D49D75F2663C923020F806991B6E37471C0052AF620A5B93FD1B396AC85CAAE686CE1D
3,133,888 UART: [art] PUB.Y = 9AA48229F9F8E2116FD7820191CF7DF3AE454601980FFA9CD574B5E3C4484266E9585DA98516B6B65BF086BCDAC5E503
3,140,832 UART: [art] SIG.R = 451B8DD267F2AB604BECF898219CF1B4379ECF80938F42C3150032C108EE48CACC8958706BEB54B7933B97A44809CAE3
3,147,580 UART: [art] SIG.S = 5CE0BBE0804EC234B0C7748A6F28C288ABDEE4FC9E486C004032DB6A407C075781F9EFC1ECCFB303B114FAEC078EF895
3,171,244 UART: Caliptra RT
3,171,589 UART: [state] CFI Enabled
3,279,920 UART: [rt] RT listening for mailbox commands...
3,280,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,778 UART: [rt]cmd =0x41544d4e, len=14344
3,548,561 >>> mbox cmd response data (8 bytes)
3,548,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,651 UART: [rt]cmd =0x41545348, len=116
3,580,439 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,032 ready_for_fw is high
1,060,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,900 >>> mbox cmd response: success
2,690,024 UART:
2,690,040 UART: Running Caliptra FMC ...
2,690,448 UART:
2,690,591 UART: [state] CFI Enabled
2,701,402 UART: [fht] FMC Alias Private Key: 7
2,809,583 UART: [art] Extend RT PCRs Done
2,810,011 UART: [art] Lock RT PCRs Done
2,811,247 UART: [art] Populate DV Done
2,819,694 UART: [fht] FMC Alias Private Key: 7
2,820,780 UART: [art] Derive CDI
2,821,060 UART: [art] Store in in slot 0x4
2,906,811 UART: [art] Derive Key Pair
2,907,171 UART: [art] Store priv key in slot 0x5
2,920,725 UART: [art] Derive Key Pair - Done
2,935,689 UART: [art] Signing Cert with AUTHO
2,936,169 UART: RITY.KEYID = 7
2,951,573 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,338 UART: [art] PUB.X = 4BFEB6542D22062CFE3B56385392E1E103101E9A92379311445C5669F0ADAFDEEB215F3111B8462EF574E7929D0CCCE6
2,959,103 UART: [art] PUB.Y = 31C9DBD6D5262E8922393662905419B46B35D1E7013E3A22DF413CAB3860356452CC0ACC8E82CE6A1A765309F229C95C
2,966,042 UART: [art] SIG.R = B688DBF7C5F3EA313EB91BAEC5F85C3486B5077AD840C1D990C9160DE8E3FFF8FE849569512C0007AE71BE932D607F04
2,972,790 UART: [art] SIG.S = BD3EB9F60FA887816AA8B1E2017A063D8C313FADAB3F35BA3D7E0714EED7C80C4EB99015D551C8C97938B5982AB50857
2,996,207 UART: Caliptra RT
2,996,552 UART: [state] CFI Enabled
3,103,098 UART: [rt] RT listening for mailbox commands...
3,103,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,872 UART: [rt]cmd =0x41544d4e, len=14344
3,371,587 >>> mbox cmd response data (8 bytes)
3,371,588 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,745 UART: [rt]cmd =0x41545348, len=116
3,403,555 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,590 UART: [kat] HMAC-384Kdf
921,202 UART: [kat] LMS
1,169,514 UART: [kat] --
1,170,287 UART: [cold-reset] ++
1,170,797 UART: [fht] FHT @ 0x50003400
1,173,397 UART: [idev] ++
1,173,565 UART: [idev] CDI.KEYID = 6
1,173,926 UART: [idev] SUBJECT.KEYID = 7
1,174,351 UART: [idev] UDS.KEYID = 0
1,174,697 ready_for_fw is high
1,174,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,093 UART: [idev] Erasing UDS.KEYID = 0
1,199,587 UART: [idev] Sha1 KeyId Algorithm
1,208,609 UART: [idev] --
1,209,602 UART: [ldev] ++
1,209,770 UART: [ldev] CDI.KEYID = 6
1,210,134 UART: [ldev] SUBJECT.KEYID = 5
1,210,561 UART: [ldev] AUTHORITY.KEYID = 7
1,211,024 UART: [ldev] FE.KEYID = 1
1,216,438 UART: [ldev] Erasing FE.KEYID = 1
1,242,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,140 UART: [ldev] --
1,281,588 UART: [fwproc] Wait for Commands...
1,282,361 UART: [fwproc] Recv command 0x46574c44
1,283,094 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,472 >>> mbox cmd response: success
2,774,669 UART: [afmc] ++
2,774,837 UART: [afmc] CDI.KEYID = 6
2,775,200 UART: [afmc] SUBJECT.KEYID = 7
2,775,626 UART: [afmc] AUTHORITY.KEYID = 5
2,811,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,262 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,991 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,874 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,593 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,538 UART: [afmc] --
2,854,468 UART: [cold-reset] --
2,855,546 UART: [state] Locking Datavault
2,856,801 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,405 UART: [state] Locking ICCM
2,857,899 UART: [exit] Launching FMC @ 0x40000130
2,863,228 UART:
2,863,244 UART: Running Caliptra FMC ...
2,863,652 UART:
2,863,706 UART: [state] CFI Enabled
2,874,169 UART: [fht] FMC Alias Private Key: 7
2,981,740 UART: [art] Extend RT PCRs Done
2,982,168 UART: [art] Lock RT PCRs Done
2,983,730 UART: [art] Populate DV Done
2,991,717 UART: [fht] FMC Alias Private Key: 7
2,992,719 UART: [art] Derive CDI
2,992,999 UART: [art] Store in in slot 0x4
3,078,860 UART: [art] Derive Key Pair
3,079,220 UART: [art] Store priv key in slot 0x5
3,092,232 UART: [art] Derive Key Pair - Done
3,106,641 UART: [art] Signing Cert with AUTHO
3,107,121 UART: RITY.KEYID = 7
3,122,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,300 UART: [art] PUB.X = B359DD467C198169A171C24ADA44AD1F7116260CBA38CB98D88622AB52A0B5E3055F10609A738924586DCD8C881260CE
3,130,064 UART: [art] PUB.Y = A22B28B4907B0B7FEFEF1522494643623E5E63DC2DDDA1DB9A7FA3DFE4AF14200FD443384596096F621DF3EDC4F939AC
3,137,021 UART: [art] SIG.R = 74D43CBA95D5EA4D2B9CA1768153DD8C1AE8EA3C49153B5CF30F9AFA0045809E7B509E46B9C0887843B181230B52E869
3,143,769 UART: [art] SIG.S = D5443834BFFC9B436E4620143EF5432BEB7C2C3D901F6DE7C99CBFA11C15B178E6022396EF0D31BA7A1E43ED24ADACAA
3,167,624 UART: Caliptra RT
3,167,877 UART: [state] CFI Enabled
3,275,480 UART: [rt] RT listening for mailbox commands...
3,276,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,560 UART: [rt]cmd =0x41544d4e, len=14344
3,544,921 >>> mbox cmd response data (8 bytes)
3,544,922 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,005 UART: [rt]cmd =0x41545348, len=116
3,576,755 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,082 ready_for_fw is high
1,056,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,506 >>> mbox cmd response: success
2,685,154 UART:
2,685,170 UART: Running Caliptra FMC ...
2,685,578 UART:
2,685,632 UART: [state] CFI Enabled
2,695,589 UART: [fht] FMC Alias Private Key: 7
2,804,206 UART: [art] Extend RT PCRs Done
2,804,634 UART: [art] Lock RT PCRs Done
2,806,210 UART: [art] Populate DV Done
2,814,495 UART: [fht] FMC Alias Private Key: 7
2,815,489 UART: [art] Derive CDI
2,815,769 UART: [art] Store in in slot 0x4
2,901,472 UART: [art] Derive Key Pair
2,901,832 UART: [art] Store priv key in slot 0x5
2,914,756 UART: [art] Derive Key Pair - Done
2,929,664 UART: [art] Signing Cert with AUTHO
2,930,144 UART: RITY.KEYID = 7
2,945,176 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,941 UART: [art] PUB.X = 0BFFC9AFE2D76182776BC752385BCCCA44183596074AA5CA2302D1DB396A7141315A9B694B3066D227447820CBD7B6F4
2,952,704 UART: [art] PUB.Y = 4E36500898288E9CC9CA62FB66E4001C056A7A536135C8E624FEBEE68365109C977385CA6C1C365FA9F53C73DC9C5290
2,959,626 UART: [art] SIG.R = C0F7A5401AE0AF8DD4CD51D04377BC47C8413F10CE24B8DE6138B57067439372BB34A7281D0C9226CEB3242A928FB4A7
2,966,399 UART: [art] SIG.S = CDD0BD0B83E13F2380E75CDBE8CEA355CF76CA4D94FC8194C107451DB1876F70935A99BAD979AF4F42C0311B7C219B33
2,989,900 UART: Caliptra RT
2,990,153 UART: [state] CFI Enabled
3,097,619 UART: [rt] RT listening for mailbox commands...
3,098,289 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,213 UART: [rt]cmd =0x41544d4e, len=14344
3,366,242 >>> mbox cmd response data (8 bytes)
3,366,243 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,244 UART: [rt]cmd =0x41545348, len=116
3,397,884 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,174,470 ready_for_fw is high
1,174,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,152 UART: [idev] --
1,209,163 UART: [ldev] ++
1,209,331 UART: [ldev] CDI.KEYID = 6
1,209,695 UART: [ldev] SUBJECT.KEYID = 5
1,210,122 UART: [ldev] AUTHORITY.KEYID = 7
1,210,585 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,201 UART: [ldev] --
1,281,595 UART: [fwproc] Wait for Commands...
1,282,320 UART: [fwproc] Recv command 0x46574c44
1,283,053 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,290 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,515 >>> mbox cmd response: success
2,774,776 UART: [afmc] ++
2,774,944 UART: [afmc] CDI.KEYID = 6
2,775,307 UART: [afmc] SUBJECT.KEYID = 7
2,775,733 UART: [afmc] AUTHORITY.KEYID = 5
2,810,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,807 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,879 UART: [afmc] --
2,854,011 UART: [cold-reset] --
2,854,985 UART: [state] Locking Datavault
2,856,072 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,676 UART: [state] Locking ICCM
2,857,336 UART: [exit] Launching FMC @ 0x40000130
2,862,665 UART:
2,862,681 UART: Running Caliptra FMC ...
2,863,089 UART:
2,863,232 UART: [state] CFI Enabled
2,873,967 UART: [fht] FMC Alias Private Key: 7
2,982,000 UART: [art] Extend RT PCRs Done
2,982,428 UART: [art] Lock RT PCRs Done
2,984,146 UART: [art] Populate DV Done
2,992,123 UART: [fht] FMC Alias Private Key: 7
2,993,193 UART: [art] Derive CDI
2,993,473 UART: [art] Store in in slot 0x4
3,078,978 UART: [art] Derive Key Pair
3,079,338 UART: [art] Store priv key in slot 0x5
3,092,062 UART: [art] Derive Key Pair - Done
3,106,813 UART: [art] Signing Cert with AUTHO
3,107,293 UART: RITY.KEYID = 7
3,122,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,380 UART: [art] PUB.X = C97C2801A663F529EB5DCEEC922DCA47F09EB4540EFFD90A3424043F9621F09BFA75445B428D0B97122ACD52DE29E501
3,130,142 UART: [art] PUB.Y = 7C46F3570188921669632B725062EDBF7A0FA237DE9B61713635199F01C0BBDB48EB4BABE416E4B033484545C9445F1A
3,137,081 UART: [art] SIG.R = 3EA16BB3368234A02F64517632E16ED218CE28E8813DC39301B93B2008698739378D9C48E738C54A9C924F0671DC288B
3,143,832 UART: [art] SIG.S = A4AF0D872C6750D057EE97CDF18C738E3291C5A8A9BD7BBA4EBE94ADF7FE19BC87DF20D12E35A2B410CE22C6942EFAB4
3,168,256 UART: Caliptra RT
3,168,601 UART: [state] CFI Enabled
3,276,934 UART: [rt] RT listening for mailbox commands...
3,277,604 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,668 UART: [rt]cmd =0x41544d4e, len=14344
3,545,263 >>> mbox cmd response data (8 bytes)
3,545,264 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,363 UART: [rt]cmd =0x41545348, len=116
3,577,231 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,723 ready_for_fw is high
1,056,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,961 >>> mbox cmd response: success
2,687,867 UART:
2,687,883 UART: Running Caliptra FMC ...
2,688,291 UART:
2,688,434 UART: [state] CFI Enabled
2,698,869 UART: [fht] FMC Alias Private Key: 7
2,807,156 UART: [art] Extend RT PCRs Done
2,807,584 UART: [art] Lock RT PCRs Done
2,809,012 UART: [art] Populate DV Done
2,817,121 UART: [fht] FMC Alias Private Key: 7
2,818,179 UART: [art] Derive CDI
2,818,459 UART: [art] Store in in slot 0x4
2,904,038 UART: [art] Derive Key Pair
2,904,398 UART: [art] Store priv key in slot 0x5
2,918,156 UART: [art] Derive Key Pair - Done
2,933,027 UART: [art] Signing Cert with AUTHO
2,933,507 UART: RITY.KEYID = 7
2,949,119 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,884 UART: [art] PUB.X = D1236B28E2B7BF2F5F76D53F5D8E83991343F5D91A28A01B9B634A6E79321799AB249D84825D3EF95741E985CC8A300D
2,956,651 UART: [art] PUB.Y = 8C0A47743BF5C5875AACFA4A1FA54DBC8A3C4847E32E6B5413770648B7EA2FC2E2B3ECADE08E22DD29F1360F239CD84C
2,963,612 UART: [art] SIG.R = B5C53D339649BEBEAA633626D176158B40C1437B8ACBB79CDCCDC0BDC1F0B4F242CCEBB1C7D448083A1A7CA7A2B4778E
2,970,403 UART: [art] SIG.S = C2B09812D279192C977220D93E7DFF4BDDF5AE61B60D9CB87B9D1E29E3BACD32DFA07691EE8022B9574447A86721BC28
2,994,951 UART: Caliptra RT
2,995,296 UART: [state] CFI Enabled
3,102,500 UART: [rt] RT listening for mailbox commands...
3,103,170 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,122 UART: [rt]cmd =0x41544d4e, len=14344
3,370,387 >>> mbox cmd response data (8 bytes)
3,370,388 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,407 UART: [rt]cmd =0x41545348, len=116
3,402,177 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,057 UART:
192,426 UART: Running Caliptra ROM ...
193,627 UART:
193,785 UART: [state] CFI Enabled
263,940 UART: [state] LifecycleState = Unprovisioned
265,923 UART: [state] DebugLocked = No
267,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,266 UART: [kat] SHA2-256
441,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,491 UART: [kat] ++
452,946 UART: [kat] sha1
465,317 UART: [kat] SHA2-256
467,981 UART: [kat] SHA2-384
472,838 UART: [kat] SHA2-512-ACC
475,217 UART: [kat] ECC-384
2,769,265 UART: [kat] HMAC-384Kdf
2,781,583 UART: [kat] LMS
3,971,857 UART: [kat] --
3,975,657 UART: [cold-reset] ++
3,978,163 UART: [fht] Storing FHT @ 0x50003400
3,990,638 UART: [idev] ++
3,991,201 UART: [idev] CDI.KEYID = 6
3,992,159 UART: [idev] SUBJECT.KEYID = 7
3,993,404 UART: [idev] UDS.KEYID = 0
3,994,377 ready_for_fw is high
3,994,587 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,138,229 UART: [idev] Erasing UDS.KEYID = 0
7,325,985 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,966 UART: [idev] --
7,351,912 UART: [ldev] ++
7,352,496 UART: [ldev] CDI.KEYID = 6
7,353,466 UART: [ldev] SUBJECT.KEYID = 5
7,354,681 UART: [ldev] AUTHORITY.KEYID = 7
7,355,920 UART: [ldev] FE.KEYID = 1
7,403,093 UART: [ldev] Erasing FE.KEYID = 1
10,736,105 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,450 UART: [ldev] --
13,095,176 UART: [fwproc] Waiting for Commands...
13,097,757 UART: [fwproc] Received command 0x46574c44
13,099,963 UART: [fwproc] Received Image of size 114124 bytes
17,149,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,671 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,618,579 >>> mbox cmd response: success
17,623,423 UART: [afmc] ++
17,624,029 UART: [afmc] CDI.KEYID = 6
17,624,948 UART: [afmc] SUBJECT.KEYID = 7
17,626,162 UART: [afmc] AUTHORITY.KEYID = 5
20,990,836 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,025 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,283 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,703 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,547 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,999 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,469 UART: [afmc] --
23,377,391 UART: [cold-reset] --
23,380,290 UART: [state] Locking Datavault
23,386,079 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,837 UART: [state] Locking ICCM
23,390,592 UART: [exit] Launching FMC @ 0x40000130
23,398,988 UART:
23,399,232 UART: Running Caliptra FMC ...
23,400,333 UART:
23,400,494 UART: [state] CFI Enabled
23,465,836 UART: [fht] FMC Alias Private Key: 7
25,803,477 UART: [art] Extend RT PCRs Done
25,804,699 UART: [art] Lock RT PCRs Done
25,806,698 UART: [art] Populate DV Done
25,812,057 UART: [fht] FMC Alias Private Key: 7
25,813,596 UART: [art] Derive CDI
25,814,407 UART: [art] Store in in slot 0x4
25,873,366 UART: [art] Derive Key Pair
25,874,414 UART: [art] Store priv key in slot 0x5
29,166,576 UART: [art] Derive Key Pair - Done
29,179,415 UART: [art] Signing Cert with AUTHO
29,180,722 UART: RITY.KEYID = 7
31,468,255 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,765 UART: [art] PUB.X = 1E0AFB189D2424AC2633A3453E55A00C3F66E6402081D22FFD665504C32FA521547F2903926D7869D79DDDCE6044BF9C
31,476,957 UART: [art] PUB.Y = D093E6F7C7BE92EB9800E26C11209D898320835143115D2B9F72BAAF7F093E11DEB7AB8B323C3A799EA3D3F1D3496B59
31,484,187 UART: [art] SIG.R = 0327A095D1F2F8750F9D9BEAE112F3D7C759743719C7327E210EB1700B093CBBEEAD20387E09B9012BA01156268E0286
31,491,578 UART: [art] SIG.S = 211B32CE404CF5FAA427AEF3433C0ADD26D91D9809E254B9016FF6CFD5502473F6F60915B3D88C7812AF27E66CAA7975
32,797,136 UART: Caliptra RT
32,797,847 UART: [state] CFI Enabled
32,960,203 UART: [rt] RT listening for mailbox commands...
37,145,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,301,254 UART: [rt]cmd =0x41544d4e, len=14344
42,537,159 >>> mbox cmd response data (8 bytes)
42,537,755 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,568,713 UART: [rt]cmd =0x41545348, len=116
42,587,728 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,177 UART:
192,535 UART: Running Caliptra ROM ...
193,644 UART:
193,789 UART: [state] CFI Enabled
263,947 UART: [state] LifecycleState = Unprovisioned
265,870 UART: [state] DebugLocked = No
267,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,337 UART: [kat] SHA2-256
442,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,553 UART: [kat] ++
453,001 UART: [kat] sha1
465,445 UART: [kat] SHA2-256
468,097 UART: [kat] SHA2-384
473,593 UART: [kat] SHA2-512-ACC
475,959 UART: [kat] ECC-384
2,766,141 UART: [kat] HMAC-384Kdf
2,799,757 UART: [kat] LMS
3,990,042 UART: [kat] --
3,997,057 UART: [cold-reset] ++
3,999,631 UART: [fht] Storing FHT @ 0x50003400
4,011,766 UART: [idev] ++
4,012,373 UART: [idev] CDI.KEYID = 6
4,013,298 UART: [idev] SUBJECT.KEYID = 7
4,014,545 UART: [idev] UDS.KEYID = 0
4,015,563 ready_for_fw is high
4,015,765 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,147 UART: [idev] Erasing UDS.KEYID = 0
7,347,092 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,849 UART: [idev] --
7,371,904 UART: [ldev] ++
7,372,483 UART: [ldev] CDI.KEYID = 6
7,373,450 UART: [ldev] SUBJECT.KEYID = 5
7,374,663 UART: [ldev] AUTHORITY.KEYID = 7
7,375,897 UART: [ldev] FE.KEYID = 1
7,420,751 UART: [ldev] Erasing FE.KEYID = 1
10,752,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,679 UART: [ldev] --
13,114,053 UART: [fwproc] Waiting for Commands...
13,115,933 UART: [fwproc] Received command 0x46574c44
13,118,116 UART: [fwproc] Received Image of size 114124 bytes
17,168,376 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,824 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,635,720 >>> mbox cmd response: success
17,640,240 UART: [afmc] ++
17,640,899 UART: [afmc] CDI.KEYID = 6
17,641,819 UART: [afmc] SUBJECT.KEYID = 7
17,642,984 UART: [afmc] AUTHORITY.KEYID = 5
21,005,634 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,012 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,278 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,660 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,495 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,943 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,148 UART: [afmc] --
23,377,294 UART: [cold-reset] --
23,381,812 UART: [state] Locking Datavault
23,388,735 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,454 UART: [state] Locking ICCM
23,392,203 UART: [exit] Launching FMC @ 0x40000130
23,400,600 UART:
23,400,841 UART: Running Caliptra FMC ...
23,401,870 UART:
23,402,020 UART: [state] CFI Enabled
23,466,772 UART: [fht] FMC Alias Private Key: 7
25,804,685 UART: [art] Extend RT PCRs Done
25,805,912 UART: [art] Lock RT PCRs Done
25,807,284 UART: [art] Populate DV Done
25,812,862 UART: [fht] FMC Alias Private Key: 7
25,814,567 UART: [art] Derive CDI
25,815,379 UART: [art] Store in in slot 0x4
25,875,185 UART: [art] Derive Key Pair
25,876,229 UART: [art] Store priv key in slot 0x5
29,169,220 UART: [art] Derive Key Pair - Done
29,182,223 UART: [art] Signing Cert with AUTHO
29,183,524 UART: RITY.KEYID = 7
31,470,839 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,412 UART: [art] PUB.X = AF9DD927F877E28BE2428CE1780264A0BEC323FB40E0B6F67C50F05949B28F0D8AECEC8CAE75B175F2985DCF77FAF36F
31,479,603 UART: [art] PUB.Y = CC5AE35CFA04B41F2B1BCB7BDE3B609D6BEACBABB48C0BB764FE6D90C4DBBAE29B3F630CE4FD8D37C559DE7C9A70A02A
31,486,943 UART: [art] SIG.R = 2E7971DAF1294356B9DAF45CF3DA4F20027D9207383E2ADDDA2E630BBC91B5E8CC99410D95A02B7D7236A8B6580AA29D
31,494,345 UART: [art] SIG.S = 3880C858275FFAF61216A69A0CED8F9870D9007824CF233F069EA7F1FB9BD6C7D5A2BBB77E21BB1142C3AC5729B3AD6C
32,799,571 UART: Caliptra RT
32,800,267 UART: [state] CFI Enabled
32,961,080 UART: [rt] RT listening for mailbox commands...
32,963,533 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,119,331 UART: [rt]cmd =0x41544d4e, len=14344
38,354,745 >>> mbox cmd response data (8 bytes)
38,355,378 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,386,328 UART: [rt]cmd =0x41545348, len=116
38,388,964 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,783,464 ready_for_fw is high
3,783,908 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,851,810 >>> mbox cmd response: success
23,545,742 UART:
23,546,119 UART: Running Caliptra FMC ...
23,547,259 UART:
23,547,423 UART: [state] CFI Enabled
23,615,029 UART: [fht] FMC Alias Private Key: 7
25,953,240 UART: [art] Extend RT PCRs Done
25,954,463 UART: [art] Lock RT PCRs Done
25,955,981 UART: [art] Populate DV Done
25,961,499 UART: [fht] FMC Alias Private Key: 7
25,963,261 UART: [art] Derive CDI
25,964,074 UART: [art] Store in in slot 0x4
26,022,748 UART: [art] Derive Key Pair
26,023,816 UART: [art] Store priv key in slot 0x5
29,316,008 UART: [art] Derive Key Pair - Done
29,329,066 UART: [art] Signing Cert with AUTHO
29,330,375 UART: RITY.KEYID = 7
31,616,810 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,332 UART: [art] PUB.X = 7A572C7FC7465C951782B7171F03933E8D24B993B123FD4BE90C7251FCE1B8EAD400456E0242C7A09CED88352EC0E0DA
31,625,579 UART: [art] PUB.Y = 9B42475980ED000C7846ED6B7B0338E8E2A83ABB6B54B828C35A2D11D611A92AEB926571234968E1566BFBCEC24B7224
31,632,795 UART: [art] SIG.R = 006B5F5399C0A48D9A49D795AFAA9C85F8D0ACB4BDE8955F6C0E02E859134A9E782B9EEE2D1F7B19BB13C05DB5404492
31,640,176 UART: [art] SIG.S = 8BD55DC11529F00A8DB97BE573AE93B12C40FC397572D0E8E428C934D41F0455E60BABFED2138456F8097A9E3C91FD86
32,945,740 UART: Caliptra RT
32,946,460 UART: [state] CFI Enabled
33,107,043 UART: [rt] RT listening for mailbox commands...
37,284,673 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,440,382 UART: [rt]cmd =0x41544d4e, len=14344
42,676,495 >>> mbox cmd response data (8 bytes)
42,677,070 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,707,884 UART: [rt]cmd =0x41545348, len=116
42,728,405 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,806,447 ready_for_fw is high
3,806,845 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,896,468 >>> mbox cmd response: success
23,593,298 UART:
23,593,708 UART: Running Caliptra FMC ...
23,594,852 UART:
23,595,019 UART: [state] CFI Enabled
23,660,218 UART: [fht] FMC Alias Private Key: 7
25,997,270 UART: [art] Extend RT PCRs Done
25,998,497 UART: [art] Lock RT PCRs Done
26,000,135 UART: [art] Populate DV Done
26,005,446 UART: [fht] FMC Alias Private Key: 7
26,007,099 UART: [art] Derive CDI
26,007,918 UART: [art] Store in in slot 0x4
26,068,371 UART: [art] Derive Key Pair
26,069,413 UART: [art] Store priv key in slot 0x5
29,362,028 UART: [art] Derive Key Pair - Done
29,375,038 UART: [art] Signing Cert with AUTHO
29,376,355 UART: RITY.KEYID = 7
31,663,710 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,214 UART: [art] PUB.X = EEEE2E328DA0C84C462BBE4F2753E151ABEBCD8D4A1D2C82067101A90E9A7DDFB535BBA440D17A609F01BBCB839E22C8
31,672,505 UART: [art] PUB.Y = 1B7CDA7E91A310A2E018A6C18CE3532DD4759CE07968602D34D38C7418191F751F4F6A9FBFE0079D0D96FE0249DFF6E9
31,679,726 UART: [art] SIG.R = 1B3641258749E3C15C40D6B6CAA3412C56074E497364AA00F6D55FB7656D6F62E7F8AEF822A1C5B6ADE46935C198B7E0
31,687,089 UART: [art] SIG.S = E517D6F1795E95203A3F2716D09244E731D7BE39F4EB3D0E94DCE5546E93E292444F42099397ED6ACDE2D7C69915C30A
32,991,848 UART: Caliptra RT
32,992,544 UART: [state] CFI Enabled
33,153,597 UART: [rt] RT listening for mailbox commands...
33,155,990 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,311,375 UART: [rt]cmd =0x41544d4e, len=14344
38,546,773 >>> mbox cmd response data (8 bytes)
38,547,345 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,578,134 UART: [rt]cmd =0x41545348, len=116
38,580,252 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
192,384 UART:
192,737 UART: Running Caliptra ROM ...
193,921 UART:
603,772 UART: [state] CFI Enabled
620,649 UART: [state] LifecycleState = Unprovisioned
622,547 UART: [state] DebugLocked = No
624,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,856 UART: [kat] SHA2-256
799,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,105 UART: [kat] ++
810,642 UART: [kat] sha1
821,649 UART: [kat] SHA2-256
824,361 UART: [kat] SHA2-384
829,432 UART: [kat] SHA2-512-ACC
831,792 UART: [kat] ECC-384
3,116,992 UART: [kat] HMAC-384Kdf
3,128,523 UART: [kat] LMS
4,318,678 UART: [kat] --
4,324,823 UART: [cold-reset] ++
4,327,325 UART: [fht] Storing FHT @ 0x50003400
4,340,297 UART: [idev] ++
4,340,934 UART: [idev] CDI.KEYID = 6
4,341,845 UART: [idev] SUBJECT.KEYID = 7
4,343,081 UART: [idev] UDS.KEYID = 0
4,344,115 ready_for_fw is high
4,344,302 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,487,634 UART: [idev] Erasing UDS.KEYID = 0
7,627,942 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,121 UART: [idev] --
7,655,569 UART: [ldev] ++
7,656,188 UART: [ldev] CDI.KEYID = 6
7,657,148 UART: [ldev] SUBJECT.KEYID = 5
7,658,352 UART: [ldev] AUTHORITY.KEYID = 7
7,659,575 UART: [ldev] FE.KEYID = 1
7,669,195 UART: [ldev] Erasing FE.KEYID = 1
10,954,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,565 UART: [ldev] --
13,311,337 UART: [fwproc] Waiting for Commands...
13,314,359 UART: [fwproc] Received command 0x46574c44
13,316,536 UART: [fwproc] Received Image of size 114124 bytes
17,375,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,906 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,783 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,839,960 >>> mbox cmd response: success
17,843,585 UART: [afmc] ++
17,844,167 UART: [afmc] CDI.KEYID = 6
17,845,105 UART: [afmc] SUBJECT.KEYID = 7
17,846,372 UART: [afmc] AUTHORITY.KEYID = 5
21,162,915 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,792 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,099 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,425 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,268 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,773 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,459 UART: [afmc] --
23,526,270 UART: [cold-reset] --
23,530,016 UART: [state] Locking Datavault
23,535,095 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,850 UART: [state] Locking ICCM
23,539,581 UART: [exit] Launching FMC @ 0x40000130
23,547,970 UART:
23,548,198 UART: Running Caliptra FMC ...
23,549,291 UART:
23,549,441 UART: [state] CFI Enabled
23,557,479 UART: [fht] FMC Alias Private Key: 7
25,889,111 UART: [art] Extend RT PCRs Done
25,890,325 UART: [art] Lock RT PCRs Done
25,892,053 UART: [art] Populate DV Done
25,897,465 UART: [fht] FMC Alias Private Key: 7
25,898,998 UART: [art] Derive CDI
25,899,771 UART: [art] Store in in slot 0x4
25,942,079 UART: [art] Derive Key Pair
25,943,104 UART: [art] Store priv key in slot 0x5
29,185,442 UART: [art] Derive Key Pair - Done
29,198,652 UART: [art] Signing Cert with AUTHO
29,199,959 UART: RITY.KEYID = 7
31,479,223 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,728 UART: [art] PUB.X = C76DAFC65A2CB3AFE473B5BDED85FC2EB24B2B96F03B34552951B221D45CA57857F4A84B5F521E6E3FBCBE4F99B0368A
31,488,018 UART: [art] PUB.Y = 93D50000FD99BD9537124BBAAC6D09B87C4A53A800A2B56D7338BBC1077F97BF100F1463BB9C6387C11F994D92732D64
31,495,226 UART: [art] SIG.R = ED5B3C010533F91DBEC002747C446207EEF00185525AC56C1EBEBB8EB7488EDC51554835F86C1D72F505E5C0485429A0
31,502,632 UART: [art] SIG.S = 4110EEF5C49A6E38E31D74E24F5F0655B6A66FDFE97ABB8D6276C31F311FAABC7A4BD756C98167BCBB7E11808B3D6C95
32,807,903 UART: Caliptra RT
32,808,612 UART: [state] CFI Enabled
32,926,392 UART: [rt] RT listening for mailbox commands...
36,951,626 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,106,961 UART: [rt]cmd =0x41544d4e, len=14344
42,341,885 >>> mbox cmd response data (8 bytes)
42,342,464 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,373,087 UART: [rt]cmd =0x41545348, len=116
42,392,751 >>> mbox cmd response data (12 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,700 writing to cptra_bootfsm_go
193,840 UART:
194,194 UART: Running Caliptra ROM ...
195,387 UART:
604,940 UART: [state] CFI Enabled
620,889 UART: [state] LifecycleState = Unprovisioned
622,813 UART: [state] DebugLocked = No
625,745 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,031 UART: [kat] SHA2-256
799,831 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,374 UART: [kat] ++
810,826 UART: [kat] sha1
821,906 UART: [kat] SHA2-256
824,628 UART: [kat] SHA2-384
830,403 UART: [kat] SHA2-512-ACC
832,764 UART: [kat] ECC-384
3,116,734 UART: [kat] HMAC-384Kdf
3,128,762 UART: [kat] LMS
4,318,897 UART: [kat] --
4,321,998 UART: [cold-reset] ++
4,323,211 UART: [fht] Storing FHT @ 0x50003400
4,334,768 UART: [idev] ++
4,335,328 UART: [idev] CDI.KEYID = 6
4,336,305 UART: [idev] SUBJECT.KEYID = 7
4,337,542 UART: [idev] UDS.KEYID = 0
4,338,603 ready_for_fw is high
4,338,797 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,967 UART: [idev] Erasing UDS.KEYID = 0
7,621,670 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,729 UART: [idev] --
7,647,975 UART: [ldev] ++
7,648,536 UART: [ldev] CDI.KEYID = 6
7,649,490 UART: [ldev] SUBJECT.KEYID = 5
7,650,688 UART: [ldev] AUTHORITY.KEYID = 7
7,651,963 UART: [ldev] FE.KEYID = 1
7,664,297 UART: [ldev] Erasing FE.KEYID = 1
10,955,994 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,156 UART: [ldev] --
13,318,149 UART: [fwproc] Waiting for Commands...
13,320,075 UART: [fwproc] Received command 0x46574c44
13,322,254 UART: [fwproc] Received Image of size 114124 bytes
17,381,346 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,293 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,160 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,841,179 >>> mbox cmd response: success
17,845,802 UART: [afmc] ++
17,846,468 UART: [afmc] CDI.KEYID = 6
17,847,360 UART: [afmc] SUBJECT.KEYID = 7
17,848,575 UART: [afmc] AUTHORITY.KEYID = 5
21,159,432 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,385 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,642 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,040 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,852 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,282 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,337 UART: [afmc] --
23,522,334 UART: [cold-reset] --
23,526,433 UART: [state] Locking Datavault
23,532,241 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,019 UART: [state] Locking ICCM
23,536,114 UART: [exit] Launching FMC @ 0x40000130
23,544,507 UART:
23,544,736 UART: Running Caliptra FMC ...
23,545,829 UART:
23,545,984 UART: [state] CFI Enabled
23,554,241 UART: [fht] FMC Alias Private Key: 7
25,884,930 UART: [art] Extend RT PCRs Done
25,886,144 UART: [art] Lock RT PCRs Done
25,887,790 UART: [art] Populate DV Done
25,893,040 UART: [fht] FMC Alias Private Key: 7
25,894,740 UART: [art] Derive CDI
25,895,547 UART: [art] Store in in slot 0x4
25,938,310 UART: [art] Derive Key Pair
25,939,346 UART: [art] Store priv key in slot 0x5
29,180,661 UART: [art] Derive Key Pair - Done
29,193,657 UART: [art] Signing Cert with AUTHO
29,194,959 UART: RITY.KEYID = 7
31,474,170 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,713 UART: [art] PUB.X = 72E6BA17C5E7B28DFBD344A6E9D3BC37ECED2E913F94E0E896CB1EFFF15ED654EEF973CFDA7D78948346D8B5C3C3D3D9
31,482,948 UART: [art] PUB.Y = 92D663056947BF8EA4CE6BDE42227F60C5F769CEBEBBE9C422EFFE47B78A20FADF1E67B64D313A65B98314F3A0DF7A94
31,490,207 UART: [art] SIG.R = 9613685F5C60EFBB1227BB8C6E0CA843ED05EEDE2DC97026EC6F7C4FB871B9BE55BDE09DF9E24C5A6EAB1060BCA6C638
31,497,638 UART: [art] SIG.S = C31CF01D4D3BD5CA840D30E3CD503DBA4FFCDF20BFC84F66076EFE9DF3D5B83F6CCC9F9351A1BC91DA9E67E5C5282C21
32,803,061 UART: Caliptra RT
32,803,780 UART: [state] CFI Enabled
32,921,486 UART: [rt] RT listening for mailbox commands...
32,923,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,079,138 UART: [rt]cmd =0x41544d4e, len=14344
38,314,701 >>> mbox cmd response data (8 bytes)
38,315,359 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,346,226 UART: [rt]cmd =0x41545348, len=116
38,348,731 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
4,132,748 ready_for_fw is high
4,133,184 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,085,932 >>> mbox cmd response: success
23,727,391 UART:
23,727,782 UART: Running Caliptra FMC ...
23,728,991 UART:
23,729,155 UART: [state] CFI Enabled
23,737,001 UART: [fht] FMC Alias Private Key: 7
26,067,322 UART: [art] Extend RT PCRs Done
26,068,557 UART: [art] Lock RT PCRs Done
26,069,871 UART: [art] Populate DV Done
26,075,128 UART: [fht] FMC Alias Private Key: 7
26,076,780 UART: [art] Derive CDI
26,077,597 UART: [art] Store in in slot 0x4
26,120,431 UART: [art] Derive Key Pair
26,121,472 UART: [art] Store priv key in slot 0x5
29,363,502 UART: [art] Derive Key Pair - Done
29,376,578 UART: [art] Signing Cert with AUTHO
29,377,888 UART: RITY.KEYID = 7
31,657,398 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,902 UART: [art] PUB.X = C82628F562B54EC944073D40BF549F21513CDFECF9B8CEEBE68BE7152D51461A4E4467637A2B251478EDACBB4507BEE1
31,666,141 UART: [art] PUB.Y = D8901E387D0F8D0851572D04627246F915290B130A6A1B5BB7C73992F01787617AFEB62B1B72372AB058A96DAE220A91
31,673,354 UART: [art] SIG.R = D1FAEA7F0F4B060D0C253FFDE2EBC4E07EBDC5677F77E9CB7A60725886B1A56E571FDD4EF90003A2E4D52DB2ECE038EE
31,680,786 UART: [art] SIG.S = 3C4D64260D8C919D4FC8BCB2E489D2944645CEEAEEE5F71D27395E2E7BD53EE88C094406B88D321D2C7EF9EA1F325D86
32,985,742 UART: Caliptra RT
32,986,917 UART: [state] CFI Enabled
33,105,187 UART: [rt] RT listening for mailbox commands...
37,131,099 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,287,257 UART: [rt]cmd =0x41544d4e, len=14344
42,522,592 >>> mbox cmd response data (8 bytes)
42,523,201 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,553,882 UART: [rt]cmd =0x41545348, len=116
42,574,013 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
4,126,583 ready_for_fw is high
4,126,991 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,678 >>> mbox cmd response: success
23,703,059 UART:
23,703,485 UART: Running Caliptra FMC ...
23,704,586 UART:
23,704,735 UART: [state] CFI Enabled
23,713,115 UART: [fht] FMC Alias Private Key: 7
26,043,293 UART: [art] Extend RT PCRs Done
26,044,522 UART: [art] Lock RT PCRs Done
26,046,229 UART: [art] Populate DV Done
26,051,794 UART: [fht] FMC Alias Private Key: 7
26,053,445 UART: [art] Derive CDI
26,054,179 UART: [art] Store in in slot 0x4
26,096,673 UART: [art] Derive Key Pair
26,097,678 UART: [art] Store priv key in slot 0x5
29,339,785 UART: [art] Derive Key Pair - Done
29,352,950 UART: [art] Signing Cert with AUTHO
29,354,273 UART: RITY.KEYID = 7
31,633,930 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,440 UART: [art] PUB.X = 203CA577CC44BBE8B0D4CF72BAB89F8A4F58B85DB3CA6733A48D33E85631EA0D9364676C15EF73FD9266E03900F5BC03
31,642,662 UART: [art] PUB.Y = 16372561DC5004F9BF1CFBCC9864B796A1F405E03CFD98C075F02E855322093AE2C73F0AC93CD8BCBF740C790F5DE74B
31,649,926 UART: [art] SIG.R = 0833815E5819C6CFD3C0A3212B75E1B76A09EF9015DE938521871824BE673D850439E3B067988D04E6E4AD57FA5E26CC
31,657,307 UART: [art] SIG.S = CABAD65041E88F627744ABBF37012EFC61D5E3C82A6E0F1F1BC8C51265FE38BCB5731BA387CBE07F1BD1C7A537F20770
32,962,451 UART: Caliptra RT
32,963,163 UART: [state] CFI Enabled
33,081,383 UART: [rt] RT listening for mailbox commands...
33,083,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,238,999 UART: [rt]cmd =0x41544d4e, len=14344
38,474,380 >>> mbox cmd response data (8 bytes)
38,474,992 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,505,620 UART: [rt]cmd =0x41545348, len=116
38,507,978 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,132 UART:
192,493 UART: Running Caliptra ROM ...
193,690 UART:
193,842 UART: [state] CFI Enabled
266,286 UART: [state] LifecycleState = Unprovisioned
268,159 UART: [state] DebugLocked = No
270,262 UART: [state] WD Timer not started. Device not locked for debugging
274,076 UART: [kat] SHA2-256
453,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,824 UART: [kat] ++
465,356 UART: [kat] sha1
476,126 UART: [kat] SHA2-256
479,176 UART: [kat] SHA2-384
484,968 UART: [kat] SHA2-512-ACC
487,903 UART: [kat] ECC-384
2,948,455 UART: [kat] HMAC-384Kdf
2,970,753 UART: [kat] LMS
3,500,262 UART: [kat] --
3,504,291 UART: [cold-reset] ++
3,506,580 UART: [fht] FHT @ 0x50003400
3,518,926 UART: [idev] ++
3,519,546 UART: [idev] CDI.KEYID = 6
3,520,442 UART: [idev] SUBJECT.KEYID = 7
3,521,619 UART: [idev] UDS.KEYID = 0
3,522,620 ready_for_fw is high
3,522,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,701 UART: [idev] Erasing UDS.KEYID = 0
6,026,890 UART: [idev] Sha1 KeyId Algorithm
6,049,366 UART: [idev] --
6,053,250 UART: [ldev] ++
6,053,820 UART: [ldev] CDI.KEYID = 6
6,054,709 UART: [ldev] SUBJECT.KEYID = 5
6,055,922 UART: [ldev] AUTHORITY.KEYID = 7
6,057,210 UART: [ldev] FE.KEYID = 1
6,099,655 UART: [ldev] Erasing FE.KEYID = 1
8,604,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,244 UART: [ldev] --
10,413,760 UART: [fwproc] Wait for Commands...
10,415,582 UART: [fwproc] Recv command 0x46574c44
10,417,672 UART: [fwproc] Recv'd Img size: 114448 bytes
13,822,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,211 >>> mbox cmd response: success
14,285,117 UART: [afmc] ++
14,285,709 UART: [afmc] CDI.KEYID = 6
14,286,599 UART: [afmc] SUBJECT.KEYID = 7
14,287,814 UART: [afmc] AUTHORITY.KEYID = 5
16,830,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,026 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,017 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,875 UART: [afmc] --
18,630,574 UART: [cold-reset] --
18,634,720 UART: [state] Locking Datavault
18,639,954 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,670 UART: [state] Locking ICCM
18,644,200 UART: [exit] Launching FMC @ 0x40000130
18,652,594 UART:
18,652,826 UART: Running Caliptra FMC ...
18,653,877 UART:
18,654,029 UART: [state] CFI Enabled
18,710,685 UART: [fht] FMC Alias Private Key: 7
20,474,822 UART: [art] Extend RT PCRs Done
20,476,039 UART: [art] Lock RT PCRs Done
20,477,827 UART: [art] Populate DV Done
20,483,183 UART: [fht] FMC Alias Private Key: 7
20,484,879 UART: [art] Derive CDI
20,485,692 UART: [art] Store in in slot 0x4
20,543,333 UART: [art] Derive Key Pair
20,544,328 UART: [art] Store priv key in slot 0x5
23,007,155 UART: [art] Derive Key Pair - Done
23,020,209 UART: [art] Signing Cert with AUTHO
23,021,513 UART: RITY.KEYID = 7
24,733,661 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,159 UART: [art] PUB.X = E9461107E7AF5DF33040081602C5E5E72D216B257FAA843026906EC127352A6F2266B446EE555C90814B3490C933B5AB
24,742,408 UART: [art] PUB.Y = E7C00DCB4247C74C0146DDB592DEFD7A6916596FEE85B46BFDBC2A99409514F9EE8363F1F5004D2F08640E7507183ED5
24,749,704 UART: [art] SIG.R = E8ADC6FFADEE0A3E55ADDD59651B9088797B138E012DAE3D0096231332E976F6FF2EF78BDA11C7780F0B0ACEF9506E7E
24,757,050 UART: [art] SIG.S = 77F265AE9ABA7C29B7ED7A4F6E47BFBBE91108C05432964E5ABDA5A205BF44B79A886DB77EFE8B413FF107FAC088AA8B
25,735,492 UART: Caliptra RT
25,736,191 UART: [state] CFI Enabled
25,902,438 UART: [rt] RT listening for mailbox commands...
29,931,504 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,087,461 UART: [rt]cmd =0x41544d4e, len=14344
34,017,989 >>> mbox cmd response data (8 bytes)
34,018,594 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,049,443 UART: [rt]cmd =0x41545348, len=116
34,069,583 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,076 UART:
192,441 UART: Running Caliptra ROM ...
193,536 UART:
193,681 UART: [state] CFI Enabled
264,190 UART: [state] LifecycleState = Unprovisioned
266,104 UART: [state] DebugLocked = No
268,407 UART: [state] WD Timer not started. Device not locked for debugging
272,166 UART: [kat] SHA2-256
451,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,888 UART: [kat] ++
463,334 UART: [kat] sha1
474,132 UART: [kat] SHA2-256
477,141 UART: [kat] SHA2-384
483,839 UART: [kat] SHA2-512-ACC
486,847 UART: [kat] ECC-384
2,947,721 UART: [kat] HMAC-384Kdf
2,971,427 UART: [kat] LMS
3,500,834 UART: [kat] --
3,504,537 UART: [cold-reset] ++
3,506,033 UART: [fht] FHT @ 0x50003400
3,517,581 UART: [idev] ++
3,518,145 UART: [idev] CDI.KEYID = 6
3,519,204 UART: [idev] SUBJECT.KEYID = 7
3,520,327 UART: [idev] UDS.KEYID = 0
3,521,255 ready_for_fw is high
3,521,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,425 UART: [idev] Erasing UDS.KEYID = 0
6,029,170 UART: [idev] Sha1 KeyId Algorithm
6,051,812 UART: [idev] --
6,055,245 UART: [ldev] ++
6,055,823 UART: [ldev] CDI.KEYID = 6
6,056,740 UART: [ldev] SUBJECT.KEYID = 5
6,057,902 UART: [ldev] AUTHORITY.KEYID = 7
6,059,135 UART: [ldev] FE.KEYID = 1
6,100,996 UART: [ldev] Erasing FE.KEYID = 1
8,608,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,342 UART: [ldev] --
10,415,558 UART: [fwproc] Wait for Commands...
10,417,816 UART: [fwproc] Recv command 0x46574c44
10,419,907 UART: [fwproc] Recv'd Img size: 114448 bytes
13,824,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,638 >>> mbox cmd response: success
14,288,963 UART: [afmc] ++
14,289,631 UART: [afmc] CDI.KEYID = 6
14,290,554 UART: [afmc] SUBJECT.KEYID = 7
14,291,685 UART: [afmc] AUTHORITY.KEYID = 5
16,831,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,287 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,151 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,104 UART: [afmc] --
18,629,290 UART: [cold-reset] --
18,634,280 UART: [state] Locking Datavault
18,639,908 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,551 UART: [state] Locking ICCM
18,643,052 UART: [exit] Launching FMC @ 0x40000130
18,651,452 UART:
18,651,684 UART: Running Caliptra FMC ...
18,652,783 UART:
18,652,959 UART: [state] CFI Enabled
18,712,193 UART: [fht] FMC Alias Private Key: 7
20,476,789 UART: [art] Extend RT PCRs Done
20,478,011 UART: [art] Lock RT PCRs Done
20,479,856 UART: [art] Populate DV Done
20,485,481 UART: [fht] FMC Alias Private Key: 7
20,487,121 UART: [art] Derive CDI
20,487,931 UART: [art] Store in in slot 0x4
20,545,301 UART: [art] Derive Key Pair
20,546,342 UART: [art] Store priv key in slot 0x5
23,009,460 UART: [art] Derive Key Pair - Done
23,022,293 UART: [art] Signing Cert with AUTHO
23,023,599 UART: RITY.KEYID = 7
24,735,729 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,239 UART: [art] PUB.X = 3B4770C8BCF903468679146D84ACBAFD252EA3377234AF152E8D44C6E641B741BC4DD425C1F04F63034AB84780138DAD
24,744,493 UART: [art] PUB.Y = BC0F5AC33116B0073E2A96EA4DFF928994195004569B9D282D97D801D0167449694944D4BFE789F077DFA02CA23DBD0E
24,751,749 UART: [art] SIG.R = F08E8E1AFB73F89EFCA4EA037A13E1F208C9B486432D88A80801661D107BC9D26BF67B8F0F29C771CABD731AAFE18E31
24,759,193 UART: [art] SIG.S = 62F4808E43171FE9FB30AF70EF4F03397547E2CF526251D7E5B11F68FAD603EFFC6560F6CD23031446CF70168F9D794C
25,737,697 UART: Caliptra RT
25,738,405 UART: [state] CFI Enabled
25,904,018 UART: [rt] RT listening for mailbox commands...
25,906,418 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,061,732 UART: [rt]cmd =0x41544d4e, len=14344
29,992,585 >>> mbox cmd response data (8 bytes)
29,993,181 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,023,912 UART: [rt]cmd =0x41545348, len=116
30,026,166 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,361,226 ready_for_fw is high
3,361,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,072,833 >>> mbox cmd response: success
18,370,242 UART:
18,370,641 UART: Running Caliptra FMC ...
18,371,738 UART:
18,371,891 UART: [state] CFI Enabled
18,436,601 UART: [fht] FMC Alias Private Key: 7
20,200,930 UART: [art] Extend RT PCRs Done
20,202,152 UART: [art] Lock RT PCRs Done
20,204,048 UART: [art] Populate DV Done
20,209,756 UART: [fht] FMC Alias Private Key: 7
20,211,247 UART: [art] Derive CDI
20,212,012 UART: [art] Store in in slot 0x4
20,269,546 UART: [art] Derive Key Pair
20,270,591 UART: [art] Store priv key in slot 0x5
22,733,688 UART: [art] Derive Key Pair - Done
22,746,692 UART: [art] Signing Cert with AUTHO
22,748,002 UART: RITY.KEYID = 7
24,459,333 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,836 UART: [art] PUB.X = 43C5D8D56BB8C47E786C7DBD39024EAAA5169C0E0635F4B123FB5E1FCCD3D6A3C399BB26C2982A706FE6874BAD9A7EBA
24,468,137 UART: [art] PUB.Y = E98E2DC96DF533667FEA98010EB700BEDCAE129617B23BE7BB9BF42E62B5B7EFB70C049D76AD335EDC58E11CDDA4BC9A
24,475,389 UART: [art] SIG.R = 784C68D7D11E117B1CFF8569D0A7CB9D58CF194693F2D28A8C089FEC279E151188DA3F481F3341EC2710D88E3E619A67
24,482,846 UART: [art] SIG.S = FDAEA4D1CF5F04518DC20ECE5750B514D00E67A9881DF77B61E37CD4047966A202607601FA6AC392C21D0703BDCE90B7
25,461,869 UART: Caliptra RT
25,462,581 UART: [state] CFI Enabled
25,625,006 UART: [rt] RT listening for mailbox commands...
29,669,561 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,825,858 UART: [rt]cmd =0x41544d4e, len=14344
33,756,121 >>> mbox cmd response data (8 bytes)
33,756,720 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,787,419 UART: [rt]cmd =0x41545348, len=116
33,807,436 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,359,328 ready_for_fw is high
3,359,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,041,338 >>> mbox cmd response: success
18,320,212 UART:
18,320,650 UART: Running Caliptra FMC ...
18,321,786 UART:
18,321,964 UART: [state] CFI Enabled
18,391,177 UART: [fht] FMC Alias Private Key: 7
20,155,809 UART: [art] Extend RT PCRs Done
20,157,039 UART: [art] Lock RT PCRs Done
20,158,750 UART: [art] Populate DV Done
20,164,279 UART: [fht] FMC Alias Private Key: 7
20,165,827 UART: [art] Derive CDI
20,166,645 UART: [art] Store in in slot 0x4
20,223,544 UART: [art] Derive Key Pair
20,224,587 UART: [art] Store priv key in slot 0x5
22,687,593 UART: [art] Derive Key Pair - Done
22,700,863 UART: [art] Signing Cert with AUTHO
22,702,174 UART: RITY.KEYID = 7
24,413,713 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,219 UART: [art] PUB.X = FC7E69ABF6B73A3CD1CCD25EC39F08ED064877084CA10751AB7CDB4754C1B047CA3D50481F078AC49951841764F2A7F4
24,422,491 UART: [art] PUB.Y = 76A80AAC8C0208DAB81A3B03E0C198941C6661B7B5D60A1C7A7BF5F780ABA2857DA9904DDD2F11F1C7C2C8852FFC35E3
24,429,775 UART: [art] SIG.R = 12136F5B90DD6B1832559FF780FD6702AEAC90926C5FFB2CDE30279E0A9E09A8B1DBBB2B4A8DC7540D4C1EDF94451A53
24,437,177 UART: [art] SIG.S = 312C1A19E7A5CD58121246A51205B894E6AF8E676F121F640EF42A2B448F7E6DB87AF5AB4DBDF681648A90B975A9045F
25,415,696 UART: Caliptra RT
25,416,387 UART: [state] CFI Enabled
25,582,264 UART: [rt] RT listening for mailbox commands...
25,584,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,739,830 UART: [rt]cmd =0x41544d4e, len=14344
29,670,208 >>> mbox cmd response data (8 bytes)
29,670,794 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,701,265 UART: [rt]cmd =0x41545348, len=116
29,703,830 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,269 UART:
192,643 UART: Running Caliptra ROM ...
193,770 UART:
603,439 UART: [state] CFI Enabled
616,544 UART: [state] LifecycleState = Unprovisioned
618,408 UART: [state] DebugLocked = No
620,072 UART: [state] WD Timer not started. Device not locked for debugging
624,599 UART: [kat] SHA2-256
803,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,334 UART: [kat] ++
815,870 UART: [kat] sha1
826,101 UART: [kat] SHA2-256
829,140 UART: [kat] SHA2-384
835,665 UART: [kat] SHA2-512-ACC
838,604 UART: [kat] ECC-384
3,279,270 UART: [kat] HMAC-384Kdf
3,291,358 UART: [kat] LMS
3,820,870 UART: [kat] --
3,825,209 UART: [cold-reset] ++
3,827,342 UART: [fht] FHT @ 0x50003400
3,838,962 UART: [idev] ++
3,839,518 UART: [idev] CDI.KEYID = 6
3,840,462 UART: [idev] SUBJECT.KEYID = 7
3,841,689 UART: [idev] UDS.KEYID = 0
3,842,581 ready_for_fw is high
3,842,771 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,471 UART: [idev] Erasing UDS.KEYID = 0
6,309,936 UART: [idev] Sha1 KeyId Algorithm
6,331,802 UART: [idev] --
6,336,328 UART: [ldev] ++
6,336,888 UART: [ldev] CDI.KEYID = 6
6,337,762 UART: [ldev] SUBJECT.KEYID = 5
6,338,960 UART: [ldev] AUTHORITY.KEYID = 7
6,340,239 UART: [ldev] FE.KEYID = 1
6,351,935 UART: [ldev] Erasing FE.KEYID = 1
8,827,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,061 UART: [ldev] --
10,617,183 UART: [fwproc] Wait for Commands...
10,620,394 UART: [fwproc] Recv command 0x46574c44
10,622,476 UART: [fwproc] Recv'd Img size: 114448 bytes
14,021,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,230 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,485,097 >>> mbox cmd response: success
14,488,930 UART: [afmc] ++
14,489,520 UART: [afmc] CDI.KEYID = 6
14,490,399 UART: [afmc] SUBJECT.KEYID = 7
14,491,604 UART: [afmc] AUTHORITY.KEYID = 5
16,994,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,628 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,678 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,511 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,041 UART: [afmc] --
18,793,089 UART: [cold-reset] --
18,796,132 UART: [state] Locking Datavault
18,800,886 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,520 UART: [state] Locking ICCM
18,804,797 UART: [exit] Launching FMC @ 0x40000130
18,813,177 UART:
18,813,402 UART: Running Caliptra FMC ...
18,814,420 UART:
18,814,557 UART: [state] CFI Enabled
18,823,154 UART: [fht] FMC Alias Private Key: 7
20,580,049 UART: [art] Extend RT PCRs Done
20,581,270 UART: [art] Lock RT PCRs Done
20,583,134 UART: [art] Populate DV Done
20,588,888 UART: [fht] FMC Alias Private Key: 7
20,590,573 UART: [art] Derive CDI
20,591,395 UART: [art] Store in in slot 0x4
20,633,885 UART: [art] Derive Key Pair
20,634,878 UART: [art] Store priv key in slot 0x5
23,061,605 UART: [art] Derive Key Pair - Done
23,074,860 UART: [art] Signing Cert with AUTHO
23,076,190 UART: RITY.KEYID = 7
24,781,309 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,819 UART: [art] PUB.X = 12A1B9F1BF27D00AF5A1AD48DFCA8639BABCA9207E23757E6CB4A9755FF9B0C256F371C93C41E36D3A14CA7BE14900E0
24,790,046 UART: [art] PUB.Y = 53B343C33750DBDC24AF8EA968329B8D88E821F7B7880DCFCE79400E53938CBD13254F01183558B7649FE428B851C77E
24,797,312 UART: [art] SIG.R = 3B38C33B0623E32E2BE9727F70F5873D44ECFCE8B51658958A7A47D23869730B21166EB462D9636411F6EAFB8D0750ED
24,804,710 UART: [art] SIG.S = FFDB64316655D9724F16EAD0CC36CCAF4EC47A1E3B851F67E60BD8E6FB8D4647AD199AC87475E2FC7FCF2788EFB40C73
25,783,696 UART: Caliptra RT
25,784,391 UART: [state] CFI Enabled
25,901,855 UART: [rt] RT listening for mailbox commands...
29,932,134 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,087,974 UART: [rt]cmd =0x41544d4e, len=14344
34,017,830 >>> mbox cmd response data (8 bytes)
34,018,401 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,049,227 UART: [rt]cmd =0x41545348, len=116
34,068,867 >>> mbox cmd response data (12 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,374 UART:
192,753 UART: Running Caliptra ROM ...
193,846 UART:
603,378 UART: [state] CFI Enabled
616,690 UART: [state] LifecycleState = Unprovisioned
618,561 UART: [state] DebugLocked = No
621,027 UART: [state] WD Timer not started. Device not locked for debugging
625,502 UART: [kat] SHA2-256
804,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,189 UART: [kat] ++
816,716 UART: [kat] sha1
827,255 UART: [kat] SHA2-256
830,294 UART: [kat] SHA2-384
835,500 UART: [kat] SHA2-512-ACC
838,426 UART: [kat] ECC-384
3,280,608 UART: [kat] HMAC-384Kdf
3,293,117 UART: [kat] LMS
3,822,638 UART: [kat] --
3,825,061 UART: [cold-reset] ++
3,826,132 UART: [fht] FHT @ 0x50003400
3,836,674 UART: [idev] ++
3,837,230 UART: [idev] CDI.KEYID = 6
3,838,154 UART: [idev] SUBJECT.KEYID = 7
3,839,388 UART: [idev] UDS.KEYID = 0
3,840,283 ready_for_fw is high
3,840,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,189 UART: [idev] Erasing UDS.KEYID = 0
6,313,513 UART: [idev] Sha1 KeyId Algorithm
6,335,178 UART: [idev] --
6,339,569 UART: [ldev] ++
6,340,179 UART: [ldev] CDI.KEYID = 6
6,341,058 UART: [ldev] SUBJECT.KEYID = 5
6,342,155 UART: [ldev] AUTHORITY.KEYID = 7
6,343,492 UART: [ldev] FE.KEYID = 1
6,354,697 UART: [ldev] Erasing FE.KEYID = 1
8,828,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,231 UART: [ldev] --
10,619,407 UART: [fwproc] Wait for Commands...
10,620,851 UART: [fwproc] Recv command 0x46574c44
10,622,940 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,485,725 >>> mbox cmd response: success
14,490,691 UART: [afmc] ++
14,491,350 UART: [afmc] CDI.KEYID = 6
14,492,289 UART: [afmc] SUBJECT.KEYID = 7
14,493,391 UART: [afmc] AUTHORITY.KEYID = 5
16,993,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,289 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,097 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,969 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,211 UART: [afmc] --
18,790,235 UART: [cold-reset] --
18,794,845 UART: [state] Locking Datavault
18,799,439 UART: [state] Locking PCR0, PCR1 and PCR31
18,801,078 UART: [state] Locking ICCM
18,802,469 UART: [exit] Launching FMC @ 0x40000130
18,810,854 UART:
18,811,084 UART: Running Caliptra FMC ...
18,812,201 UART:
18,812,353 UART: [state] CFI Enabled
18,820,248 UART: [fht] FMC Alias Private Key: 7
20,576,754 UART: [art] Extend RT PCRs Done
20,578,082 UART: [art] Lock RT PCRs Done
20,579,693 UART: [art] Populate DV Done
20,584,989 UART: [fht] FMC Alias Private Key: 7
20,586,626 UART: [art] Derive CDI
20,587,358 UART: [art] Store in in slot 0x4
20,630,104 UART: [art] Derive Key Pair
20,631,102 UART: [art] Store priv key in slot 0x5
23,058,287 UART: [art] Derive Key Pair - Done
23,071,611 UART: [art] Signing Cert with AUTHO
23,072,912 UART: RITY.KEYID = 7
24,778,681 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,198 UART: [art] PUB.X = 7021662D092E411AD9D00E994A1CD30707D4D027A519E33B895980C11E3CA049996E35C95DF1BFC8CA5FE6123757DCA8
24,787,477 UART: [art] PUB.Y = 0BD4723EDA91F3C6D6A6A502E2E7D835F3EC178D736AC1C6E6BD33AE682FBE814303DCDBC7D7235A9C2B6EDB24F155FD
24,794,757 UART: [art] SIG.R = 1824D99B2B1D6456EE9C8FF0DA2720A8C3934B4526537E823BFE10180EEFD67E7A256723668628C0B1156B8204C80C1C
24,802,132 UART: [art] SIG.S = B7A3BDECC7A7FE57D12D7886E8A55A3A6F7C5456E94CB53E09B4A8B7AF828B77B156362267E9638557141A1BAE15FBEC
25,780,916 UART: Caliptra RT
25,781,627 UART: [state] CFI Enabled
25,898,689 UART: [rt] RT listening for mailbox commands...
25,901,098 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,056,570 UART: [rt]cmd =0x41544d4e, len=14344
29,986,816 >>> mbox cmd response data (8 bytes)
29,987,417 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,018,127 UART: [rt]cmd =0x41545348, len=116
30,020,154 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,697,007 ready_for_fw is high
3,697,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,427 >>> mbox cmd response: success
18,533,143 UART:
18,533,581 UART: Running Caliptra FMC ...
18,534,728 UART:
18,534,902 UART: [state] CFI Enabled
18,542,697 UART: [fht] FMC Alias Private Key: 7
20,299,861 UART: [art] Extend RT PCRs Done
20,301,086 UART: [art] Lock RT PCRs Done
20,302,551 UART: [art] Populate DV Done
20,307,748 UART: [fht] FMC Alias Private Key: 7
20,309,223 UART: [art] Derive CDI
20,309,985 UART: [art] Store in in slot 0x4
20,352,632 UART: [art] Derive Key Pair
20,353,618 UART: [art] Store priv key in slot 0x5
22,780,068 UART: [art] Derive Key Pair - Done
22,793,174 UART: [art] Signing Cert with AUTHO
22,794,507 UART: RITY.KEYID = 7
24,500,167 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,671 UART: [art] PUB.X = 5821E89330AA925AB86A2D14B6D5139B283E305F9ECBD913861041CAC236D28B3C63531D6148B144717271AB6B48C418
24,508,911 UART: [art] PUB.Y = D6C4EE7E000976A7D9AA00AF2A41B753FB7AA6324C754492444387C5F672D5F4A406B478296AB247785B24E07420F60F
24,516,154 UART: [art] SIG.R = E47732D3A223EBEBF03B6C9EDFF35D8E21F10D2AF8EFBB05D8536257EB219D35B2EC10CAB92E2C92F22FA64C68664EF9
24,523,538 UART: [art] SIG.S = 584E97CCA0305F9CC42942A5B82053D518907348FB22036A3A3D02AB71DD6012875BA2764780FBFDE1854251888B2115
25,502,650 UART: Caliptra RT
25,503,348 UART: [state] CFI Enabled
25,620,616 UART: [rt] RT listening for mailbox commands...
29,649,009 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,804,741 UART: [rt]cmd =0x41544d4e, len=14344
33,735,155 >>> mbox cmd response data (8 bytes)
33,735,738 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,766,545 UART: [rt]cmd =0x41545348, len=116
33,786,488 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,697,139 ready_for_fw is high
3,697,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,259,682 >>> mbox cmd response: success
18,505,135 UART:
18,505,544 UART: Running Caliptra FMC ...
18,506,762 UART:
18,506,923 UART: [state] CFI Enabled
18,514,810 UART: [fht] FMC Alias Private Key: 7
20,271,538 UART: [art] Extend RT PCRs Done
20,272,768 UART: [art] Lock RT PCRs Done
20,274,559 UART: [art] Populate DV Done
20,280,085 UART: [fht] FMC Alias Private Key: 7
20,281,791 UART: [art] Derive CDI
20,282,599 UART: [art] Store in in slot 0x4
20,325,346 UART: [art] Derive Key Pair
20,326,340 UART: [art] Store priv key in slot 0x5
22,753,570 UART: [art] Derive Key Pair - Done
22,766,644 UART: [art] Signing Cert with AUTHO
22,767,951 UART: RITY.KEYID = 7
24,473,511 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,016 UART: [art] PUB.X = 3948A9AC27F5831EAE2464878F8C4B58FD05E50DFB31227C507401FDC1869C12E47AA908942E104C91C344349222AF08
24,482,261 UART: [art] PUB.Y = DF8B5823D5CC647F3DEE44BCAA5D639FFF3B4BD137FC78BC45B265B666EA2A0363550DDDFC874ACD6BCB504354DA9C03
24,489,558 UART: [art] SIG.R = 9FAF9798BD049BD92B83EEAB943ADC4E14138EC9D175C904DF498EFA1B3423D90D4FCDEF8092F2D025C1392A90C2F1B6
24,496,965 UART: [art] SIG.S = 5E00E775F34D136260539CA29A67F35D4A0297D1CD39DC59791C2B19B8CB7309C78C8879667A156FB1FC9E256A55D8C7
25,475,285 UART: Caliptra RT
25,476,001 UART: [state] CFI Enabled
25,594,289 UART: [rt] RT listening for mailbox commands...
25,596,779 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,752,252 UART: [rt]cmd =0x41544d4e, len=14344
29,682,975 >>> mbox cmd response data (8 bytes)
29,683,546 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,714,228 UART: [rt]cmd =0x41545348, len=116
29,716,409 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,916 writing to cptra_bootfsm_go
3,438,987 ready_for_fw is high
3,439,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,728,899 >>> mbox cmd response: success
19,002,343 UART:
19,002,733 UART: Running Caliptra FMC ...
19,003,846 UART:
19,004,001 UART: [state] CFI Enabled
19,074,840 UART: [fht] FMC Alias Private Key: 7
20,838,473 UART: [art] Extend RT PCRs Done
20,839,697 UART: [art] Lock RT PCRs Done
20,841,351 UART: [art] Populate DV Done
20,846,763 UART: [fht] FMC Alias Private Key: 7
20,848,306 UART: [art] Derive CDI
20,849,040 UART: [art] Store in in slot 0x4
20,907,440 UART: [art] Derive Key Pair
20,908,478 UART: [art] Store priv key in slot 0x5
23,371,489 UART: [art] Derive Key Pair - Done
23,384,489 UART: [art] Signing Cert with AUTHO
23,385,798 UART: RITY.KEYID = 7
25,097,600 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,123 UART: [art] PUB.X = C938371F93368DDADC3D04E9AC2C7D57E38D88DC514E4001850C7C8563E4459655C203B97260644D2C88BCE090C0395B
25,106,326 UART: [art] PUB.Y = 9C618FCCABEF51773840357570328F7B63A169B3ED728D89870FFA71344AB33668FFA75D0B4C79398C3DE3B52B7086F6
25,113,573 UART: [art] SIG.R = 91670CA922B17B1B67F031EF678DB39B96CD2F7C5D5B6DB4DD6D034CDECB4CBE38D1E866F71693DA1BAD59F0C0ADD09D
25,121,058 UART: [art] SIG.S = 49EBA6EC80FE8FEDC979E0FA79ECF2FACD806FB22E319C58F59CBE0CCA6D237DA9A24CC91A22BC40A89A0ADD5575280B
26,099,894 UART: Caliptra RT
26,100,611 UART: [state] CFI Enabled
26,266,709 UART: [rt] RT listening for mailbox commands...
30,307,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,464,198 UART: [rt]cmd =0x41544d4e, len=14344
34,394,811 >>> mbox cmd response data (8 bytes)
34,395,375 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,426,169 UART: [rt]cmd =0x41545348, len=116
34,445,424 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,437,504 ready_for_fw is high
3,437,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,702,571 >>> mbox cmd response: success
18,981,713 UART:
18,982,144 UART: Running Caliptra FMC ...
18,983,262 UART:
18,983,415 UART: [state] CFI Enabled
19,047,743 UART: [fht] FMC Alias Private Key: 7
20,812,301 UART: [art] Extend RT PCRs Done
20,813,518 UART: [art] Lock RT PCRs Done
20,815,332 UART: [art] Populate DV Done
20,820,836 UART: [fht] FMC Alias Private Key: 7
20,822,331 UART: [art] Derive CDI
20,823,109 UART: [art] Store in in slot 0x4
20,880,759 UART: [art] Derive Key Pair
20,881,799 UART: [art] Store priv key in slot 0x5
23,344,412 UART: [art] Derive Key Pair - Done
23,357,411 UART: [art] Signing Cert with AUTHO
23,358,719 UART: RITY.KEYID = 7
25,070,504 UART: [art] Erasing AUTHORITY.KEYID = 7
25,072,031 UART: [art] PUB.X = 52A7423170D21171186398C2FDE52D779CE97B179320FF5E49446E884441C3AD613008E76244E0D381FB8FF954804A29
25,079,261 UART: [art] PUB.Y = 28A297893447B89C7703BF424087F8E754F27B1F4396C6588D52CB6D0DAD5ED6CF813FEEAA490E362889D6419AC027D5
25,086,468 UART: [art] SIG.R = F8019FF81FA5E841667F56D4BB6280E00FB08C4BDC2D5DF417800F49315AA36373CE72859D1CEBC6AF77CAC75176073D
25,093,860 UART: [art] SIG.S = C352934EBB07CF3CC1014BA2A82EC525C624D8B47FD049155282E67C36B6B6BE8B752BF9BB99A0F8236373AD7D8D9B14
26,072,729 UART: Caliptra RT
26,073,421 UART: [state] CFI Enabled
26,238,223 UART: [rt] RT listening for mailbox commands...
26,240,621 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,395,998 UART: [rt]cmd =0x41544d4e, len=14344
30,327,121 >>> mbox cmd response data (8 bytes)
30,327,712 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,358,396 UART: [rt]cmd =0x41545348, len=116
30,360,689 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,751,106 ready_for_fw is high
3,751,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,757 >>> mbox cmd response: success
19,207,346 UART:
19,207,720 UART: Running Caliptra FMC ...
19,208,851 UART:
19,209,003 UART: [state] CFI Enabled
19,216,793 UART: [fht] FMC Alias Private Key: 7
20,973,288 UART: [art] Extend RT PCRs Done
20,974,491 UART: [art] Lock RT PCRs Done
20,976,055 UART: [art] Populate DV Done
20,981,688 UART: [fht] FMC Alias Private Key: 7
20,983,271 UART: [art] Derive CDI
20,984,075 UART: [art] Store in in slot 0x4
21,026,444 UART: [art] Derive Key Pair
21,027,453 UART: [art] Store priv key in slot 0x5
23,453,862 UART: [art] Derive Key Pair - Done
23,466,921 UART: [art] Signing Cert with AUTHO
23,468,217 UART: RITY.KEYID = 7
25,173,610 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,096 UART: [art] PUB.X = 62C4AA167E3013582191A601D502400C9003F58770B8C5ADB429AA1FA2BC2A37F1E20EA4DE224143D3B32572B731A181
25,182,379 UART: [art] PUB.Y = 082AAC3C3B8F1C7B97F581952E236815B6DC3929921814A0DDEC612CEC69CDDC403ACDE44F79AF3A0C5115BA8075B9CD
25,189,597 UART: [art] SIG.R = B6DD4C5791D81DF986F6513A096DEEA76B11DBC7F693B49DB38397D6D3F0FB563E80C8CC0670F95AC2FCC7269DDA160F
25,197,065 UART: [art] SIG.S = 80C951405B231B947B80C7837A0F251D5230825721741D202FE87CC47C4469165E4EA51D2693AB8A138E700735CBEDBD
26,175,161 UART: Caliptra RT
26,175,868 UART: [state] CFI Enabled
26,292,015 UART: [rt] RT listening for mailbox commands...
30,333,288 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,488,640 UART: [rt]cmd =0x41544d4e, len=14344
34,419,369 >>> mbox cmd response data (8 bytes)
34,419,938 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,450,798 UART: [rt]cmd =0x41545348, len=116
34,471,536 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
3,755,686 ready_for_fw is high
3,756,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,967,025 >>> mbox cmd response: success
19,219,088 UART:
19,219,485 UART: Running Caliptra FMC ...
19,220,617 UART:
19,220,769 UART: [state] CFI Enabled
19,229,305 UART: [fht] FMC Alias Private Key: 7
20,986,442 UART: [art] Extend RT PCRs Done
20,987,676 UART: [art] Lock RT PCRs Done
20,989,081 UART: [art] Populate DV Done
20,994,710 UART: [fht] FMC Alias Private Key: 7
20,996,351 UART: [art] Derive CDI
20,997,158 UART: [art] Store in in slot 0x4
21,039,814 UART: [art] Derive Key Pair
21,040,850 UART: [art] Store priv key in slot 0x5
23,467,529 UART: [art] Derive Key Pair - Done
23,480,417 UART: [art] Signing Cert with AUTHO
23,481,721 UART: RITY.KEYID = 7
25,187,022 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,532 UART: [art] PUB.X = FF7847C9F52B5F81A235C04FF894B8A42D363C2AC7A21D55FB14018B86BED47A929AABD939E80B628F51464F666BC3B8
25,195,789 UART: [art] PUB.Y = 8BA3D8DF9EC4FF28F7816F746CB4DD91741C5C67F1812B2031FC46DC1FA8E8475C1454811CAA31D7B9990448023FF8CD
25,203,049 UART: [art] SIG.R = 6C86D68F0BF9DFD709E52F89E27437D31F6AA203453AA1009BAD4DFA03BF1AD0A75D8EB109CB5976932F16DC724B3B3F
25,210,431 UART: [art] SIG.S = 0C0082F0690FBE64CAD5B96D07E9B0EEB5147C37B194CDC3F86AC7F2AED67E1C2E0BDC9D760CAF1065F77A183BA5DEE7
26,189,204 UART: Caliptra RT
26,189,889 UART: [state] CFI Enabled
26,306,942 UART: [rt] RT listening for mailbox commands...
26,309,355 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,464,773 UART: [rt]cmd =0x41544d4e, len=14344
30,395,371 >>> mbox cmd response data (8 bytes)
30,395,941 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,426,447 UART: [rt]cmd =0x41545348, len=116
30,428,721 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,167 UART: [kat] SHA2-256
892,105 UART: [kat] SHA2-384
894,706 UART: [kat] SHA2-512-ACC
896,607 UART: [kat] ECC-384
902,148 UART: [kat] HMAC-384Kdf
906,518 UART: [kat] LMS
1,474,714 UART: [kat] --
1,475,519 UART: [cold-reset] ++
1,475,901 UART: [fht] Storing FHT @ 0x50003400
1,478,634 UART: [idev] ++
1,478,802 UART: [idev] CDI.KEYID = 6
1,479,162 UART: [idev] SUBJECT.KEYID = 7
1,479,586 UART: [idev] UDS.KEYID = 0
1,479,931 ready_for_fw is high
1,479,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,246 UART: [idev] Erasing UDS.KEYID = 0
1,503,852 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,462 UART: [idev] --
1,513,529 UART: [ldev] ++
1,513,697 UART: [ldev] CDI.KEYID = 6
1,514,060 UART: [ldev] SUBJECT.KEYID = 5
1,514,486 UART: [ldev] AUTHORITY.KEYID = 7
1,514,949 UART: [ldev] FE.KEYID = 1
1,520,203 UART: [ldev] Erasing FE.KEYID = 1
1,545,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,756 UART: [ldev] --
1,585,019 UART: [fwproc] Waiting for Commands...
1,585,686 UART: [fwproc] Received command 0x46574c44
1,586,477 UART: [fwproc] Received Image of size 114448 bytes
2,885,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,354 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,789 >>> mbox cmd response: success
3,078,843 UART: [afmc] ++
3,079,011 UART: [afmc] CDI.KEYID = 6
3,079,373 UART: [afmc] SUBJECT.KEYID = 7
3,079,798 UART: [afmc] AUTHORITY.KEYID = 5
3,114,603 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,637 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,417 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,030 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,720 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,685 UART: [afmc] --
3,157,605 UART: [cold-reset] --
3,158,323 UART: [state] Locking Datavault
3,159,724 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,328 UART: [state] Locking ICCM
3,160,932 UART: [exit] Launching FMC @ 0x40000130
3,166,261 UART:
3,166,277 UART: Running Caliptra FMC ...
3,166,685 UART:
3,166,739 UART: [state] CFI Enabled
3,177,652 UART: [fht] FMC Alias Private Key: 7
3,285,677 UART: [art] Extend RT PCRs Done
3,286,105 UART: [art] Lock RT PCRs Done
3,287,325 UART: [art] Populate DV Done
3,295,574 UART: [fht] FMC Alias Private Key: 7
3,296,530 UART: [art] Derive CDI
3,296,810 UART: [art] Store in in slot 0x4
3,382,587 UART: [art] Derive Key Pair
3,382,947 UART: [art] Store priv key in slot 0x5
3,396,171 UART: [art] Derive Key Pair - Done
3,410,956 UART: [art] Signing Cert with AUTHO
3,411,436 UART: RITY.KEYID = 7
3,426,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,291 UART: [art] PUB.X = F6E62BCA469B9425F76AF1E43E2652FF99E152B711A12D157A6629E3841347CB3DFFA5824DFD020093C08089C03686A5
3,434,036 UART: [art] PUB.Y = A767AA3FF751212CACA404E9E50817EA0C54C82FC12A7C16DA289943A79478CA2ACD16AAF51F9F391254BC315331A10B
3,440,984 UART: [art] SIG.R = 433D2360BBF40DDA0B879A036B8447BBAF974F609EED910D14BB809A16BBF42774B66EFEA5C31D7AC566EB43DF52DB2E
3,447,762 UART: [art] SIG.S = 765C963A827294DFF8E1E6C2F00140265A4458277547461815B149A91D3A04AADD90D3EA6305AA2FCEA8CC55D777E4AF
3,471,714 UART: Caliptra RT
3,471,967 UART: [state] CFI Enabled
3,580,071 UART: [rt] RT listening for mailbox commands...
3,580,741 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,915 UART: [rt]cmd =0x41544d4e, len=14344
3,848,734 >>> mbox cmd response data (8 bytes)
3,848,735 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,850 UART: [rt]cmd =0x41545348, len=116
3,900,908 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,781 UART: [kat] SHA2-256
881,712 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,827 UART: [kat] ++
885,979 UART: [kat] sha1
890,203 UART: [kat] SHA2-256
892,141 UART: [kat] SHA2-384
895,138 UART: [kat] SHA2-512-ACC
897,039 UART: [kat] ECC-384
902,948 UART: [kat] HMAC-384Kdf
907,598 UART: [kat] LMS
1,475,794 UART: [kat] --
1,476,981 UART: [cold-reset] ++
1,477,403 UART: [fht] Storing FHT @ 0x50003400
1,480,308 UART: [idev] ++
1,480,476 UART: [idev] CDI.KEYID = 6
1,480,836 UART: [idev] SUBJECT.KEYID = 7
1,481,260 UART: [idev] UDS.KEYID = 0
1,481,605 ready_for_fw is high
1,481,605 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,372 UART: [idev] Erasing UDS.KEYID = 0
1,505,496 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,152 UART: [idev] --
1,515,385 UART: [ldev] ++
1,515,553 UART: [ldev] CDI.KEYID = 6
1,515,916 UART: [ldev] SUBJECT.KEYID = 5
1,516,342 UART: [ldev] AUTHORITY.KEYID = 7
1,516,805 UART: [ldev] FE.KEYID = 1
1,522,333 UART: [ldev] Erasing FE.KEYID = 1
1,547,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,976 UART: [ldev] --
1,587,297 UART: [fwproc] Waiting for Commands...
1,588,114 UART: [fwproc] Received command 0x46574c44
1,588,905 UART: [fwproc] Received Image of size 114448 bytes
2,888,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,640 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,992 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,013 >>> mbox cmd response: success
3,082,031 UART: [afmc] ++
3,082,199 UART: [afmc] CDI.KEYID = 6
3,082,561 UART: [afmc] SUBJECT.KEYID = 7
3,082,986 UART: [afmc] AUTHORITY.KEYID = 5
3,118,219 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,531 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,039 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,924 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,614 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,329 UART: [afmc] --
3,161,355 UART: [cold-reset] --
3,162,293 UART: [state] Locking Datavault
3,163,340 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,944 UART: [state] Locking ICCM
3,164,574 UART: [exit] Launching FMC @ 0x40000130
3,169,903 UART:
3,169,919 UART: Running Caliptra FMC ...
3,170,327 UART:
3,170,381 UART: [state] CFI Enabled
3,181,040 UART: [fht] FMC Alias Private Key: 7
3,289,051 UART: [art] Extend RT PCRs Done
3,289,479 UART: [art] Lock RT PCRs Done
3,290,995 UART: [art] Populate DV Done
3,299,236 UART: [fht] FMC Alias Private Key: 7
3,300,264 UART: [art] Derive CDI
3,300,544 UART: [art] Store in in slot 0x4
3,385,997 UART: [art] Derive Key Pair
3,386,357 UART: [art] Store priv key in slot 0x5
3,399,893 UART: [art] Derive Key Pair - Done
3,414,898 UART: [art] Signing Cert with AUTHO
3,415,378 UART: RITY.KEYID = 7
3,430,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,483 UART: [art] PUB.X = B1A537435D023B570DD4E8C3CCD6F41C4265342783290A70AB07F36714536B01E7E81315B057829E8C6FF26340882EF2
3,438,230 UART: [art] PUB.Y = 984A85BF22E8A48BD34FA87AF7B50972423F6DD7B1F2C07FAFB844BC0454B5D47225BEE920DBAF9DEA83EF8E17FA1780
3,445,194 UART: [art] SIG.R = 7FB30D9A4CC48B81A87D5EE13671394481A37FA019DC5598F3579A74DB82D122DEDAF1D8D57B0F4651DCCB0D408F5A0E
3,451,966 UART: [art] SIG.S = 162E4E6AA44AD93E9A56C400B02F7CD351BF8DCDBA288DB43A74EF964321B8DA6B7DF619F97969EAF4D47F39018A3667
3,475,244 UART: Caliptra RT
3,475,497 UART: [state] CFI Enabled
3,584,305 UART: [rt] RT listening for mailbox commands...
3,584,975 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,979 UART: [rt]cmd =0x41544d4e, len=14344
3,853,175 >>> mbox cmd response data (8 bytes)
3,853,176 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,991 UART: [rt]cmd =0x41545348, len=116
3,884,499 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,925 ready_for_fw is high
1,361,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,195 >>> mbox cmd response: success
2,989,323 UART:
2,989,339 UART: Running Caliptra FMC ...
2,989,747 UART:
2,989,801 UART: [state] CFI Enabled
3,000,386 UART: [fht] FMC Alias Private Key: 7
3,108,165 UART: [art] Extend RT PCRs Done
3,108,593 UART: [art] Lock RT PCRs Done
3,110,035 UART: [art] Populate DV Done
3,118,392 UART: [fht] FMC Alias Private Key: 7
3,119,370 UART: [art] Derive CDI
3,119,650 UART: [art] Store in in slot 0x4
3,205,123 UART: [art] Derive Key Pair
3,205,483 UART: [art] Store priv key in slot 0x5
3,218,271 UART: [art] Derive Key Pair - Done
3,233,205 UART: [art] Signing Cert with AUTHO
3,233,685 UART: RITY.KEYID = 7
3,249,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,820 UART: [art] PUB.X = 35B0B36E041BE8BF0713C5AA56504AAF993BA5CDC733608AC924AE0E19438550EF69DF85B0402CC786E77026BF6CA86D
3,256,591 UART: [art] PUB.Y = DF47F1E031696AE7853418E8F20958572683AC2B38FF15BF8721E26432BDB067101DB513426EC0DD9858112786A64622
3,263,528 UART: [art] SIG.R = 0141DDA38B56A894F64D064CD97335F892E39DDDEA6EA406C651EBDF6E2C5BB4CD256F6856D3ED7A58F57A19CEC72C73
3,270,307 UART: [art] SIG.S = 9AB410200DAD8FA6335EE38B2E0DA698E04FDEB9BAE94F3BA3FB831F6F3F27B72087837D169FB85FDFD8F90619EA5A29
3,294,839 UART: Caliptra RT
3,295,092 UART: [state] CFI Enabled
3,403,327 UART: [rt] RT listening for mailbox commands...
3,403,997 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,219 UART: [rt]cmd =0x41544d4e, len=14344
3,671,754 >>> mbox cmd response data (8 bytes)
3,671,755 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,888 UART: [rt]cmd =0x41545348, len=116
3,724,476 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,805 ready_for_fw is high
1,363,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,801 >>> mbox cmd response: success
2,992,783 UART:
2,992,799 UART: Running Caliptra FMC ...
2,993,207 UART:
2,993,261 UART: [state] CFI Enabled
3,003,694 UART: [fht] FMC Alias Private Key: 7
3,111,643 UART: [art] Extend RT PCRs Done
3,112,071 UART: [art] Lock RT PCRs Done
3,113,607 UART: [art] Populate DV Done
3,121,796 UART: [fht] FMC Alias Private Key: 7
3,122,768 UART: [art] Derive CDI
3,123,048 UART: [art] Store in in slot 0x4
3,208,605 UART: [art] Derive Key Pair
3,208,965 UART: [art] Store priv key in slot 0x5
3,222,245 UART: [art] Derive Key Pair - Done
3,237,168 UART: [art] Signing Cert with AUTHO
3,237,648 UART: RITY.KEYID = 7
3,252,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,515 UART: [art] PUB.X = 6C28FDA40EEBF9FAD4AF789C29B25C6EAC52A1E52BBA5260831905BFE41DE96008BB56B5ED7456AFB231EE62DB19D409
3,260,295 UART: [art] PUB.Y = DED48E5867F42855407FA428EADD14AEBEAFF7DFF3E627CBD183EAE991A180DCCA1B0A33721A5F0950479AFAD6F3526B
3,267,263 UART: [art] SIG.R = 0BCECD159740AFF5D644D9E4E5E1ABC655666CF0812EF737C537C8187F1B521460234AFB421C4A5E72651E59F19FCB22
3,274,038 UART: [art] SIG.S = D3CDBE4946FC65C641D1B498A4A9AA6BDFD4273E1F26573A3B519474660A1A333B430CD620CD4FF0BF4A95E6D8E290A8
3,297,745 UART: Caliptra RT
3,297,998 UART: [state] CFI Enabled
3,406,375 UART: [rt] RT listening for mailbox commands...
3,407,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,855 UART: [rt]cmd =0x41544d4e, len=14344
3,674,303 >>> mbox cmd response data (8 bytes)
3,674,304 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,277 UART: [rt]cmd =0x41545348, len=116
3,706,235 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,428 UART: [kat] SHA2-256
882,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,474 UART: [kat] ++
886,626 UART: [kat] sha1
890,878 UART: [kat] SHA2-256
892,816 UART: [kat] SHA2-384
895,743 UART: [kat] SHA2-512-ACC
897,644 UART: [kat] ECC-384
903,145 UART: [kat] HMAC-384Kdf
907,905 UART: [kat] LMS
1,476,101 UART: [kat] --
1,476,776 UART: [cold-reset] ++
1,477,126 UART: [fht] Storing FHT @ 0x50003400
1,480,137 UART: [idev] ++
1,480,305 UART: [idev] CDI.KEYID = 6
1,480,665 UART: [idev] SUBJECT.KEYID = 7
1,481,089 UART: [idev] UDS.KEYID = 0
1,481,434 ready_for_fw is high
1,481,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,863 UART: [idev] Erasing UDS.KEYID = 0
1,505,603 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,479 UART: [idev] --
1,515,390 UART: [ldev] ++
1,515,558 UART: [ldev] CDI.KEYID = 6
1,515,921 UART: [ldev] SUBJECT.KEYID = 5
1,516,347 UART: [ldev] AUTHORITY.KEYID = 7
1,516,810 UART: [ldev] FE.KEYID = 1
1,522,086 UART: [ldev] Erasing FE.KEYID = 1
1,547,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,413 UART: [ldev] --
1,587,714 UART: [fwproc] Waiting for Commands...
1,588,551 UART: [fwproc] Received command 0x46574c44
1,589,342 UART: [fwproc] Received Image of size 114448 bytes
2,888,425 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,541 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,582 >>> mbox cmd response: success
3,081,766 UART: [afmc] ++
3,081,934 UART: [afmc] CDI.KEYID = 6
3,082,296 UART: [afmc] SUBJECT.KEYID = 7
3,082,721 UART: [afmc] AUTHORITY.KEYID = 5
3,117,362 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,656 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,164 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,049 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,739 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,606 UART: [afmc] --
3,160,558 UART: [cold-reset] --
3,161,380 UART: [state] Locking Datavault
3,162,443 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,047 UART: [state] Locking ICCM
3,163,693 UART: [exit] Launching FMC @ 0x40000130
3,169,022 UART:
3,169,038 UART: Running Caliptra FMC ...
3,169,446 UART:
3,169,589 UART: [state] CFI Enabled
3,180,228 UART: [fht] FMC Alias Private Key: 7
3,288,231 UART: [art] Extend RT PCRs Done
3,288,659 UART: [art] Lock RT PCRs Done
3,289,971 UART: [art] Populate DV Done
3,298,002 UART: [fht] FMC Alias Private Key: 7
3,299,134 UART: [art] Derive CDI
3,299,414 UART: [art] Store in in slot 0x4
3,385,105 UART: [art] Derive Key Pair
3,385,465 UART: [art] Store priv key in slot 0x5
3,399,149 UART: [art] Derive Key Pair - Done
3,413,885 UART: [art] Signing Cert with AUTHO
3,414,365 UART: RITY.KEYID = 7
3,428,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,676 UART: [art] PUB.X = 602AE55B2975AD21A4CA9423F05B166EBC27C052A86B63966295A06A2987DD7D102EED565EA1E6A3BDEDCB1B5EB6A2B4
3,436,462 UART: [art] PUB.Y = E7DFFF4604FDF509360518B0344F350B3106B3FAF11454FE7881B3232117FA80963C290035C65E2B07DC2FD37C6C8FCE
3,443,376 UART: [art] SIG.R = A97DA9070908B4BEC42F975DCFEA5F06A15486B5478D17363E4D4ADB0054021D75A63D16C6B3596B747AA4D0353ACD9F
3,450,117 UART: [art] SIG.S = D71ED9C00DBB4456564AF7DD478E1D4F9EF9F3D46AFC27808EC954B09D47B768AC1CDF75A41B5110D337DEDEB67EE90C
3,473,716 UART: Caliptra RT
3,474,061 UART: [state] CFI Enabled
3,581,863 UART: [rt] RT listening for mailbox commands...
3,582,533 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,651 UART: [rt]cmd =0x41544d4e, len=14344
3,850,312 >>> mbox cmd response data (8 bytes)
3,850,313 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,374 UART: [rt]cmd =0x41545348, len=116
3,901,958 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,306 UART: [kat] SHA2-256
882,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,352 UART: [kat] ++
886,504 UART: [kat] sha1
890,912 UART: [kat] SHA2-256
892,850 UART: [kat] SHA2-384
895,635 UART: [kat] SHA2-512-ACC
897,536 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,869 UART: [kat] LMS
1,476,065 UART: [kat] --
1,477,020 UART: [cold-reset] ++
1,477,378 UART: [fht] Storing FHT @ 0x50003400
1,479,995 UART: [idev] ++
1,480,163 UART: [idev] CDI.KEYID = 6
1,480,523 UART: [idev] SUBJECT.KEYID = 7
1,480,947 UART: [idev] UDS.KEYID = 0
1,481,292 ready_for_fw is high
1,481,292 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,925 UART: [idev] Erasing UDS.KEYID = 0
1,505,559 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,295 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,522,066 UART: [ldev] Erasing FE.KEYID = 1
1,547,781 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,677 UART: [ldev] --
1,586,982 UART: [fwproc] Waiting for Commands...
1,587,643 UART: [fwproc] Received command 0x46574c44
1,588,434 UART: [fwproc] Received Image of size 114448 bytes
2,887,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,725 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,077 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,232 >>> mbox cmd response: success
3,080,274 UART: [afmc] ++
3,080,442 UART: [afmc] CDI.KEYID = 6
3,080,804 UART: [afmc] SUBJECT.KEYID = 7
3,081,229 UART: [afmc] AUTHORITY.KEYID = 5
3,116,668 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,892 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,400 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,285 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,975 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,820 UART: [afmc] --
3,159,724 UART: [cold-reset] --
3,160,666 UART: [state] Locking Datavault
3,161,741 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,345 UART: [state] Locking ICCM
3,162,833 UART: [exit] Launching FMC @ 0x40000130
3,168,162 UART:
3,168,178 UART: Running Caliptra FMC ...
3,168,586 UART:
3,168,729 UART: [state] CFI Enabled
3,179,132 UART: [fht] FMC Alias Private Key: 7
3,287,433 UART: [art] Extend RT PCRs Done
3,287,861 UART: [art] Lock RT PCRs Done
3,289,289 UART: [art] Populate DV Done
3,297,556 UART: [fht] FMC Alias Private Key: 7
3,298,680 UART: [art] Derive CDI
3,298,960 UART: [art] Store in in slot 0x4
3,384,845 UART: [art] Derive Key Pair
3,385,205 UART: [art] Store priv key in slot 0x5
3,398,331 UART: [art] Derive Key Pair - Done
3,413,301 UART: [art] Signing Cert with AUTHO
3,413,781 UART: RITY.KEYID = 7
3,428,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,670 UART: [art] PUB.X = D3E6E778CDE0DA48AD75ABC894FCA983FF79A0BBFDB5A58384FB47DA52A0736366A5D1D936D39513383E838439E1C172
3,436,452 UART: [art] PUB.Y = 4C9E0FB8EAC6DCBB23E3F548E047135F8C19D2DA24304F3D2000C498289F27C622B529EE4A254681C2EF50EE1B26F29C
3,443,387 UART: [art] SIG.R = ABBBD9B18B25B6DF2E407BA37581157A21E6459F6EA7E2841F8A5B76C4811BE96A12753FED246E3C2FA209D658504C50
3,450,162 UART: [art] SIG.S = 1C703F9CF90116D8F561D6BCE7864E24903C4C97D1313CBAA09E07AA7CED5D44D01674DA8B4FE7FAC1B5A981F0C997B0
3,474,057 UART: Caliptra RT
3,474,402 UART: [state] CFI Enabled
3,582,261 UART: [rt] RT listening for mailbox commands...
3,582,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,975 UART: [rt]cmd =0x41544d4e, len=14344
3,850,425 >>> mbox cmd response data (8 bytes)
3,850,426 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,527 UART: [rt]cmd =0x41545348, len=116
3,882,315 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,194 ready_for_fw is high
1,362,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,224 >>> mbox cmd response: success
2,991,528 UART:
2,991,544 UART: Running Caliptra FMC ...
2,991,952 UART:
2,992,095 UART: [state] CFI Enabled
3,002,682 UART: [fht] FMC Alias Private Key: 7
3,110,523 UART: [art] Extend RT PCRs Done
3,110,951 UART: [art] Lock RT PCRs Done
3,112,607 UART: [art] Populate DV Done
3,120,602 UART: [fht] FMC Alias Private Key: 7
3,121,700 UART: [art] Derive CDI
3,121,980 UART: [art] Store in in slot 0x4
3,207,583 UART: [art] Derive Key Pair
3,207,943 UART: [art] Store priv key in slot 0x5
3,220,819 UART: [art] Derive Key Pair - Done
3,235,209 UART: [art] Signing Cert with AUTHO
3,235,689 UART: RITY.KEYID = 7
3,251,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,820 UART: [art] PUB.X = 1FC17347D614F01C0A63ABB950CE704EB9E10C843A9CB5880A70678755A4AB6CA203EBF47B7A3925D3EE281521F114B8
3,258,584 UART: [art] PUB.Y = 06876A669921FDC55443D4B9838FAB584A377F9F0717A9C01116134D039315A3490D16314C8723C338155E841306FD84
3,265,501 UART: [art] SIG.R = 0246B5B3BC2CA8C40410AF82F8945CE04266476486B84364C2CA6C33923BDDDB2F62ABB8E14E594460AB908B0176AFD5
3,272,268 UART: [art] SIG.S = EE7B7C865F85634A3DE7EB31A6FAA74FB5AD891A8A5D356F6A5A5ECBD06B48EDD5E72243E7FD3F36C795FB90BB572F38
3,295,427 UART: Caliptra RT
3,295,772 UART: [state] CFI Enabled
3,403,745 UART: [rt] RT listening for mailbox commands...
3,404,415 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,187 UART: [rt]cmd =0x41544d4e, len=14344
3,672,090 >>> mbox cmd response data (8 bytes)
3,672,091 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,958 UART: [rt]cmd =0x41545348, len=116
3,724,298 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,078 ready_for_fw is high
1,363,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,640 >>> mbox cmd response: success
2,992,386 UART:
2,992,402 UART: Running Caliptra FMC ...
2,992,810 UART:
2,992,953 UART: [state] CFI Enabled
3,003,360 UART: [fht] FMC Alias Private Key: 7
3,111,155 UART: [art] Extend RT PCRs Done
3,111,583 UART: [art] Lock RT PCRs Done
3,113,311 UART: [art] Populate DV Done
3,121,610 UART: [fht] FMC Alias Private Key: 7
3,122,672 UART: [art] Derive CDI
3,122,952 UART: [art] Store in in slot 0x4
3,208,769 UART: [art] Derive Key Pair
3,209,129 UART: [art] Store priv key in slot 0x5
3,222,581 UART: [art] Derive Key Pair - Done
3,237,346 UART: [art] Signing Cert with AUTHO
3,237,826 UART: RITY.KEYID = 7
3,252,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,661 UART: [art] PUB.X = 95160D68103EF3034F56F9E2363CF410F4AA94B18CC5F73140786FAF18CBB114195280DB5FBD81A72D35EA8CC17220E7
3,260,429 UART: [art] PUB.Y = 407209D432A58EE537923274D423C25544BE18BE6B52119701D77021F047A6C0D22AC7A7BC9AF5CD5950D225733A0CFC
3,267,368 UART: [art] SIG.R = 560E795A48FF8C7B14C20C767C6B58E4B4DBB8E43115274C6FECAF0015084BAB28BD10E6B6D27BE23039B36501F9CF19
3,274,114 UART: [art] SIG.S = 456D7A56A36F4E1201244270D70D3135DF8E0D8E094A651EE5B6D9986CB5C3F80C3D1ED10F5FC266E6D196A22C568DCB
3,297,993 UART: Caliptra RT
3,298,338 UART: [state] CFI Enabled
3,406,912 UART: [rt] RT listening for mailbox commands...
3,407,582 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,934 UART: [rt]cmd =0x41544d4e, len=14344
3,675,790 >>> mbox cmd response data (8 bytes)
3,675,791 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,778 UART: [rt]cmd =0x41545348, len=116
3,707,554 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
893,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,261 UART: [kat] ++
897,413 UART: [kat] sha1
901,769 UART: [kat] SHA2-256
903,709 UART: [kat] SHA2-384
906,530 UART: [kat] SHA2-512-ACC
908,431 UART: [kat] ECC-384
918,486 UART: [kat] HMAC-384Kdf
923,042 UART: [kat] LMS
1,171,370 UART: [kat] --
1,172,339 UART: [cold-reset] ++
1,172,813 UART: [fht] FHT @ 0x50003400
1,175,250 UART: [idev] ++
1,175,418 UART: [idev] CDI.KEYID = 6
1,175,778 UART: [idev] SUBJECT.KEYID = 7
1,176,202 UART: [idev] UDS.KEYID = 0
1,176,547 ready_for_fw is high
1,176,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,256 UART: [idev] Erasing UDS.KEYID = 0
1,201,493 UART: [idev] Sha1 KeyId Algorithm
1,209,987 UART: [idev] --
1,211,015 UART: [ldev] ++
1,211,183 UART: [ldev] CDI.KEYID = 6
1,211,546 UART: [ldev] SUBJECT.KEYID = 5
1,211,972 UART: [ldev] AUTHORITY.KEYID = 7
1,212,435 UART: [ldev] FE.KEYID = 1
1,217,547 UART: [ldev] Erasing FE.KEYID = 1
1,244,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,675 UART: [ldev] --
1,283,162 UART: [fwproc] Wait for Commands...
1,283,938 UART: [fwproc] Recv command 0x46574c44
1,284,666 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,419 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,684 >>> mbox cmd response: success
2,776,718 UART: [afmc] ++
2,776,886 UART: [afmc] CDI.KEYID = 6
2,777,248 UART: [afmc] SUBJECT.KEYID = 7
2,777,673 UART: [afmc] AUTHORITY.KEYID = 5
2,812,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,493 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,378 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,775 UART: [afmc] --
2,855,751 UART: [cold-reset] --
2,856,731 UART: [state] Locking Datavault
2,857,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,460 UART: [state] Locking ICCM
2,858,950 UART: [exit] Launching FMC @ 0x40000130
2,864,279 UART:
2,864,295 UART: Running Caliptra FMC ...
2,864,703 UART:
2,864,757 UART: [state] CFI Enabled
2,875,106 UART: [fht] FMC Alias Private Key: 7
2,982,541 UART: [art] Extend RT PCRs Done
2,982,969 UART: [art] Lock RT PCRs Done
2,984,775 UART: [art] Populate DV Done
2,992,862 UART: [fht] FMC Alias Private Key: 7
2,993,802 UART: [art] Derive CDI
2,994,082 UART: [art] Store in in slot 0x4
3,080,107 UART: [art] Derive Key Pair
3,080,467 UART: [art] Store priv key in slot 0x5
3,093,809 UART: [art] Derive Key Pair - Done
3,108,539 UART: [art] Signing Cert with AUTHO
3,109,019 UART: RITY.KEYID = 7
3,124,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,074 UART: [art] PUB.X = F72BC4BE0C2C201E9D5776619A4B28B453A3C3110EE6209D33211315D8D81CC57B40D36455FBA331B88F4954F8DBDA02
3,131,839 UART: [art] PUB.Y = A270703A224C59BD253720C7D46AA3D494E0558F668B77DB8122674AD5EF0A0958849D6A14F4A49C298351F209DF35A6
3,138,776 UART: [art] SIG.R = C2692A2DBABFC23522224770DBEDB55060C53627CBFD83D9033D9749DD3FDA43A32063D5B11BF54264A66AF88B189949
3,145,549 UART: [art] SIG.S = 8534354E40521284E6278AA2A25972D4122E8B59601978DA9C185A8EA237210A7AD63DEF6DC0F74BC09AD91CD482BC8C
3,169,303 UART: Caliptra RT
3,169,556 UART: [state] CFI Enabled
3,277,368 UART: [rt] RT listening for mailbox commands...
3,278,038 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,016 UART: [rt]cmd =0x41544d4e, len=14344
3,545,713 >>> mbox cmd response data (8 bytes)
3,545,714 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,767 UART: [rt]cmd =0x41545348, len=116
3,598,405 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
893,358 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,483 UART: [kat] ++
897,635 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,446 UART: [kat] SHA2-512-ACC
908,347 UART: [kat] ECC-384
918,048 UART: [kat] HMAC-384Kdf
922,502 UART: [kat] LMS
1,170,830 UART: [kat] --
1,171,733 UART: [cold-reset] ++
1,172,161 UART: [fht] FHT @ 0x50003400
1,174,882 UART: [idev] ++
1,175,050 UART: [idev] CDI.KEYID = 6
1,175,410 UART: [idev] SUBJECT.KEYID = 7
1,175,834 UART: [idev] UDS.KEYID = 0
1,176,179 ready_for_fw is high
1,176,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,512 UART: [idev] Erasing UDS.KEYID = 0
1,200,785 UART: [idev] Sha1 KeyId Algorithm
1,209,465 UART: [idev] --
1,210,427 UART: [ldev] ++
1,210,595 UART: [ldev] CDI.KEYID = 6
1,210,958 UART: [ldev] SUBJECT.KEYID = 5
1,211,384 UART: [ldev] AUTHORITY.KEYID = 7
1,211,847 UART: [ldev] FE.KEYID = 1
1,216,843 UART: [ldev] Erasing FE.KEYID = 1
1,242,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,547 UART: [ldev] --
1,281,896 UART: [fwproc] Wait for Commands...
1,282,496 UART: [fwproc] Recv command 0x46574c44
1,283,224 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,866 >>> mbox cmd response: success
2,776,102 UART: [afmc] ++
2,776,270 UART: [afmc] CDI.KEYID = 6
2,776,632 UART: [afmc] SUBJECT.KEYID = 7
2,777,057 UART: [afmc] AUTHORITY.KEYID = 5
2,812,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,155 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,040 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,759 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,535 UART: [afmc] --
2,855,587 UART: [cold-reset] --
2,856,351 UART: [state] Locking Datavault
2,857,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,236 UART: [state] Locking ICCM
2,858,902 UART: [exit] Launching FMC @ 0x40000130
2,864,231 UART:
2,864,247 UART: Running Caliptra FMC ...
2,864,655 UART:
2,864,709 UART: [state] CFI Enabled
2,875,616 UART: [fht] FMC Alias Private Key: 7
2,983,897 UART: [art] Extend RT PCRs Done
2,984,325 UART: [art] Lock RT PCRs Done
2,985,831 UART: [art] Populate DV Done
2,994,044 UART: [fht] FMC Alias Private Key: 7
2,995,052 UART: [art] Derive CDI
2,995,332 UART: [art] Store in in slot 0x4
3,081,119 UART: [art] Derive Key Pair
3,081,479 UART: [art] Store priv key in slot 0x5
3,094,425 UART: [art] Derive Key Pair - Done
3,109,225 UART: [art] Signing Cert with AUTHO
3,109,705 UART: RITY.KEYID = 7
3,124,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,732 UART: [art] PUB.X = A6936B2EC3459459B2F04BC16A381A49395C9D134A85451C2CDFA1D3CF12ADCBF7E122C17765E31601963A8F0CAF5DCB
3,132,508 UART: [art] PUB.Y = B646C979728E30754F06A691B302A9DB24AE4990F1F7C3AED0EE14E1D2C97D6BA75CC42DDB75A5F123FEFAE87ABC628A
3,139,472 UART: [art] SIG.R = C21F79854E7CAE47A851D9B8CE1E662794DFB3C56AB40DFA7A34DF432BB43209298628DCDAAFB9AFBF0A1795E27E65ED
3,146,255 UART: [art] SIG.S = 09B2FEBE9BB540CFDDD7C78727388F92E7C2FA895AEC773D3851800214DBA67680C8CDA8DD126DEB4F7E8FA7AAC22160
3,169,544 UART: Caliptra RT
3,169,797 UART: [state] CFI Enabled
3,278,218 UART: [rt] RT listening for mailbox commands...
3,278,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,096 UART: [rt]cmd =0x41544d4e, len=14344
3,546,700 >>> mbox cmd response data (8 bytes)
3,546,701 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,826 UART: [rt]cmd =0x41545348, len=116
3,578,614 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,121 ready_for_fw is high
1,060,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,755 >>> mbox cmd response: success
2,689,857 UART:
2,689,873 UART: Running Caliptra FMC ...
2,690,281 UART:
2,690,335 UART: [state] CFI Enabled
2,701,324 UART: [fht] FMC Alias Private Key: 7
2,808,907 UART: [art] Extend RT PCRs Done
2,809,335 UART: [art] Lock RT PCRs Done
2,810,601 UART: [art] Populate DV Done
2,819,068 UART: [fht] FMC Alias Private Key: 7
2,820,022 UART: [art] Derive CDI
2,820,302 UART: [art] Store in in slot 0x4
2,905,841 UART: [art] Derive Key Pair
2,906,201 UART: [art] Store priv key in slot 0x5
2,918,891 UART: [art] Derive Key Pair - Done
2,933,894 UART: [art] Signing Cert with AUTHO
2,934,374 UART: RITY.KEYID = 7
2,949,386 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,151 UART: [art] PUB.X = 946D4A787F1DC95D838ED8879540F0BFF78EB3A6C3D152EB951D300E6EECBC6F1B39087913E079ADFCE9BD5EEF8F9509
2,956,930 UART: [art] PUB.Y = B2CAB83E722D3CD4E8EA061E6FCC6A35B272C0D09B52DAB8565B4FA5879EB0F6B1C5F4DF568A36059D4432940BF89C2F
2,963,889 UART: [art] SIG.R = 75EDAE63F540080A784E9574800B2BAC8DD33D78B2B6A71F18D1B4BE42CCE861F9D6EC10E37EDF1DE54CE61F0A8C8316
2,970,665 UART: [art] SIG.S = 1114E263211F31790D35EAC04D7BD16027517E279D7EA8DA82762ADF17B3153B36DA63D5615EA1FFF44C92F469874604
2,994,546 UART: Caliptra RT
2,994,799 UART: [state] CFI Enabled
3,102,452 UART: [rt] RT listening for mailbox commands...
3,103,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,150 UART: [rt]cmd =0x41544d4e, len=14344
3,371,121 >>> mbox cmd response data (8 bytes)
3,371,122 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,013 UART: [rt]cmd =0x41545348, len=116
3,422,235 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,999 ready_for_fw is high
1,060,999 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,471 >>> mbox cmd response: success
2,688,665 UART:
2,688,681 UART: Running Caliptra FMC ...
2,689,089 UART:
2,689,143 UART: [state] CFI Enabled
2,699,532 UART: [fht] FMC Alias Private Key: 7
2,807,203 UART: [art] Extend RT PCRs Done
2,807,631 UART: [art] Lock RT PCRs Done
2,809,001 UART: [art] Populate DV Done
2,817,278 UART: [fht] FMC Alias Private Key: 7
2,818,374 UART: [art] Derive CDI
2,818,654 UART: [art] Store in in slot 0x4
2,904,155 UART: [art] Derive Key Pair
2,904,515 UART: [art] Store priv key in slot 0x5
2,917,337 UART: [art] Derive Key Pair - Done
2,932,004 UART: [art] Signing Cert with AUTHO
2,932,484 UART: RITY.KEYID = 7
2,947,472 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,237 UART: [art] PUB.X = 09D0333B004E5224BBD275BD43104991E684981D5A144D8DADFE646C23E99EAF65EFA8DF279AAB65D38FC589556605B9
2,954,985 UART: [art] PUB.Y = 8A8AE8D20B15C281C2CBF54E02EAFB32C997346791E7A06310A5FEC1305AFD9208FA0EF128C01A2B1C4825100EF9666A
2,961,930 UART: [art] SIG.R = A815D4D86464A3C67488A0E9FADDB6A313D6E6D3D5AD03C9A702C99B28D8F86140E5DE7EA8C8887C05D0AD4EB86711E8
2,968,705 UART: [art] SIG.S = 6A92E74552C584D5A238D9F57DBE738D825B1A63802242CD0A0C113857D795C07E5338227AB7D2E40AF27E3E18504FBB
2,991,915 UART: Caliptra RT
2,992,168 UART: [state] CFI Enabled
3,099,681 UART: [rt] RT listening for mailbox commands...
3,100,351 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,485 UART: [rt]cmd =0x41544d4e, len=14344
3,367,813 >>> mbox cmd response data (8 bytes)
3,367,814 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,993 UART: [rt]cmd =0x41545348, len=116
3,399,639 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
902,070 UART: [kat] SHA2-256
904,010 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
918,649 UART: [kat] HMAC-384Kdf
923,145 UART: [kat] LMS
1,171,473 UART: [kat] --
1,172,544 UART: [cold-reset] ++
1,173,114 UART: [fht] FHT @ 0x50003400
1,175,941 UART: [idev] ++
1,176,109 UART: [idev] CDI.KEYID = 6
1,176,469 UART: [idev] SUBJECT.KEYID = 7
1,176,893 UART: [idev] UDS.KEYID = 0
1,177,238 ready_for_fw is high
1,177,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,271 UART: [idev] Erasing UDS.KEYID = 0
1,202,088 UART: [idev] Sha1 KeyId Algorithm
1,210,672 UART: [idev] --
1,211,642 UART: [ldev] ++
1,211,810 UART: [ldev] CDI.KEYID = 6
1,212,173 UART: [ldev] SUBJECT.KEYID = 5
1,212,599 UART: [ldev] AUTHORITY.KEYID = 7
1,213,062 UART: [ldev] FE.KEYID = 1
1,217,964 UART: [ldev] Erasing FE.KEYID = 1
1,244,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,102 UART: [ldev] --
1,283,395 UART: [fwproc] Wait for Commands...
1,284,193 UART: [fwproc] Recv command 0x46574c44
1,284,921 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,268 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,459 >>> mbox cmd response: success
2,777,517 UART: [afmc] ++
2,777,685 UART: [afmc] CDI.KEYID = 6
2,778,047 UART: [afmc] SUBJECT.KEYID = 7
2,778,472 UART: [afmc] AUTHORITY.KEYID = 5
2,813,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,924 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,652 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,537 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,256 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,054 UART: [afmc] --
2,857,110 UART: [cold-reset] --
2,857,914 UART: [state] Locking Datavault
2,858,733 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,337 UART: [state] Locking ICCM
2,859,891 UART: [exit] Launching FMC @ 0x40000130
2,865,220 UART:
2,865,236 UART: Running Caliptra FMC ...
2,865,644 UART:
2,865,787 UART: [state] CFI Enabled
2,876,424 UART: [fht] FMC Alias Private Key: 7
2,984,105 UART: [art] Extend RT PCRs Done
2,984,533 UART: [art] Lock RT PCRs Done
2,986,029 UART: [art] Populate DV Done
2,993,984 UART: [fht] FMC Alias Private Key: 7
2,995,010 UART: [art] Derive CDI
2,995,290 UART: [art] Store in in slot 0x4
3,080,891 UART: [art] Derive Key Pair
3,081,251 UART: [art] Store priv key in slot 0x5
3,094,477 UART: [art] Derive Key Pair - Done
3,109,188 UART: [art] Signing Cert with AUTHO
3,109,668 UART: RITY.KEYID = 7
3,124,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,273 UART: [art] PUB.X = F0CAA4AB78AD1B51CF54B9C67EFE875EBAE4AF29E9313403F94FEBFED298DF5E72B2754A156EE58F93A010AB58922A0D
3,132,061 UART: [art] PUB.Y = 95A6B07AE71BBEF04FF2009D9DA1123E7E49D17F51B29538BE9E9089748013F1E63C0208B633A53F2933A9678007FB0A
3,138,977 UART: [art] SIG.R = 7949BE9BFE7533D6124CAFFD6076A0D1BE2878945F4CDD542E0C214A62BB243EDCECCD2A3BF48A2390A61782256F6051
3,145,756 UART: [art] SIG.S = 4E9140ADB4F4B8AA4C9497DB3B02E8A124B0FF7D086B6E097A3FBB693ED8BF33944D79859FF61BAE6E7267FAA85445A7
3,169,270 UART: Caliptra RT
3,169,615 UART: [state] CFI Enabled
3,277,308 UART: [rt] RT listening for mailbox commands...
3,277,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,032 UART: [rt]cmd =0x41544d4e, len=14344
3,546,051 >>> mbox cmd response data (8 bytes)
3,546,052 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,291 UART: [rt]cmd =0x41545348, len=116
3,597,815 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
893,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,744 UART: [kat] ++
897,896 UART: [kat] sha1
901,908 UART: [kat] SHA2-256
903,848 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,517 UART: [kat] HMAC-384Kdf
923,199 UART: [kat] LMS
1,171,527 UART: [kat] --
1,172,552 UART: [cold-reset] ++
1,173,102 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 ready_for_fw is high
1,176,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,831 UART: [idev] Erasing UDS.KEYID = 0
1,202,414 UART: [idev] Sha1 KeyId Algorithm
1,210,916 UART: [idev] --
1,211,746 UART: [ldev] ++
1,211,914 UART: [ldev] CDI.KEYID = 6
1,212,277 UART: [ldev] SUBJECT.KEYID = 5
1,212,703 UART: [ldev] AUTHORITY.KEYID = 7
1,213,166 UART: [ldev] FE.KEYID = 1
1,218,420 UART: [ldev] Erasing FE.KEYID = 1
1,244,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,474 UART: [ldev] --
1,283,893 UART: [fwproc] Wait for Commands...
1,284,709 UART: [fwproc] Recv command 0x46574c44
1,285,437 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,461 >>> mbox cmd response: success
2,778,549 UART: [afmc] ++
2,778,717 UART: [afmc] CDI.KEYID = 6
2,779,079 UART: [afmc] SUBJECT.KEYID = 7
2,779,504 UART: [afmc] AUTHORITY.KEYID = 5
2,815,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,969 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,688 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,504 UART: [afmc] --
2,858,580 UART: [cold-reset] --
2,859,544 UART: [state] Locking Datavault
2,860,793 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,397 UART: [state] Locking ICCM
2,861,881 UART: [exit] Launching FMC @ 0x40000130
2,867,210 UART:
2,867,226 UART: Running Caliptra FMC ...
2,867,634 UART:
2,867,777 UART: [state] CFI Enabled
2,878,320 UART: [fht] FMC Alias Private Key: 7
2,986,615 UART: [art] Extend RT PCRs Done
2,987,043 UART: [art] Lock RT PCRs Done
2,988,403 UART: [art] Populate DV Done
2,996,544 UART: [fht] FMC Alias Private Key: 7
2,997,682 UART: [art] Derive CDI
2,997,962 UART: [art] Store in in slot 0x4
3,083,761 UART: [art] Derive Key Pair
3,084,121 UART: [art] Store priv key in slot 0x5
3,097,315 UART: [art] Derive Key Pair - Done
3,112,223 UART: [art] Signing Cert with AUTHO
3,112,703 UART: RITY.KEYID = 7
3,128,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,014 UART: [art] PUB.X = B67D42E1D82558BFA4CDC41BBFBA628DA950DEBBD99E2ADA9F0CF48B2B8D0A6C5DC0C8292A8938262EEBC76F651D027F
3,135,803 UART: [art] PUB.Y = 4112F93E9FCF56C43EAF7E84C1DA350699902BC83DA84B59BAEB6D3979A04C3A7994E28403BDBBCB88D634B8759F481B
3,142,759 UART: [art] SIG.R = 4EC790405DE87935045B940A86270EA0E21FF25F00C1A034774AC02E7F2925AF8CAEFDCDEE17AD2E90A7ACEE199348EB
3,149,514 UART: [art] SIG.S = 8681750B2D40682D44DFC9C8D6AE9FF743DE7B782A2A6B478D2F5FD2E9956EAE9AB187D2F540DD5F2C53381749600E75
3,173,273 UART: Caliptra RT
3,173,618 UART: [state] CFI Enabled
3,280,677 UART: [rt] RT listening for mailbox commands...
3,281,347 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,217 UART: [rt]cmd =0x41544d4e, len=14344
3,548,849 >>> mbox cmd response data (8 bytes)
3,548,850 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,929 UART: [rt]cmd =0x41545348, len=116
3,580,517 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,694 ready_for_fw is high
1,060,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,870 >>> mbox cmd response: success
2,690,578 UART:
2,690,594 UART: Running Caliptra FMC ...
2,691,002 UART:
2,691,145 UART: [state] CFI Enabled
2,701,730 UART: [fht] FMC Alias Private Key: 7
2,809,895 UART: [art] Extend RT PCRs Done
2,810,323 UART: [art] Lock RT PCRs Done
2,811,625 UART: [art] Populate DV Done
2,819,848 UART: [fht] FMC Alias Private Key: 7
2,820,782 UART: [art] Derive CDI
2,821,062 UART: [art] Store in in slot 0x4
2,906,845 UART: [art] Derive Key Pair
2,907,205 UART: [art] Store priv key in slot 0x5
2,920,745 UART: [art] Derive Key Pair - Done
2,935,422 UART: [art] Signing Cert with AUTHO
2,935,902 UART: RITY.KEYID = 7
2,951,312 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,077 UART: [art] PUB.X = F434F85FEB8EEF59317DCC1EC4A1E07978306F2A408A654A00C20C2354ADE4E5176436B6A4E8355CA7A9B4E32BD44EFC
2,958,836 UART: [art] PUB.Y = E18B38B60A410732358F8791F0DEB2D816E918F41D6539A1C8CB9A8F5B574C51415CD2C715293DA6040E89B4B752CABD
2,965,778 UART: [art] SIG.R = 367AD9EA804409D0F044E581DE087A085A40F81A0ACB6F619BD326780A8360C5635AF59C6DE1DDF79671F0E1CD384302
2,972,534 UART: [art] SIG.S = B508B9E7B090C9E5DECF6FE3CAFD03FC55DAFCF4D4C56B8EFC4BA6A805D2FED17E86253A6CC2EC7B95D03FA5CD810048
2,996,528 UART: Caliptra RT
2,996,873 UART: [state] CFI Enabled
3,104,480 UART: [rt] RT listening for mailbox commands...
3,105,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,132 UART: [rt]cmd =0x41544d4e, len=14344
3,372,619 >>> mbox cmd response data (8 bytes)
3,372,620 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,757 UART: [rt]cmd =0x41545348, len=116
3,424,481 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,564 ready_for_fw is high
1,059,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,100 >>> mbox cmd response: success
2,688,240 UART:
2,688,256 UART: Running Caliptra FMC ...
2,688,664 UART:
2,688,807 UART: [state] CFI Enabled
2,699,608 UART: [fht] FMC Alias Private Key: 7
2,808,009 UART: [art] Extend RT PCRs Done
2,808,437 UART: [art] Lock RT PCRs Done
2,809,989 UART: [art] Populate DV Done
2,818,450 UART: [fht] FMC Alias Private Key: 7
2,819,614 UART: [art] Derive CDI
2,819,894 UART: [art] Store in in slot 0x4
2,905,717 UART: [art] Derive Key Pair
2,906,077 UART: [art] Store priv key in slot 0x5
2,919,639 UART: [art] Derive Key Pair - Done
2,934,690 UART: [art] Signing Cert with AUTHO
2,935,170 UART: RITY.KEYID = 7
2,950,710 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,475 UART: [art] PUB.X = CB1876D9A9E31D348D4C6FDFFBAC74D09D051B7A1F491567A7DD4E7D72F5A87BB4F0F07523D8F53C81133B9999F18794
2,958,252 UART: [art] PUB.Y = 02A1A2C2B14F36136DC012E095A1AD514FBCFDA5437965E901812B76B314EBB0BE0880ACD1D79A350913C8A5630CD8E8
2,965,195 UART: [art] SIG.R = AC2B4A2E35722D43B7B65D5393CCD4C5852C05791980E0CFE72767A48701C4AD19137ECCC7CC003EE21C53007FFDC02D
2,971,925 UART: [art] SIG.S = CD4BBA26560AFB8B3C9DF0F83E60BB5C5E04055A2DA814DACF5517E9A1FCEF8ED88BBFBBF64A600528292E9D640735BD
2,995,701 UART: Caliptra RT
2,996,046 UART: [state] CFI Enabled
3,104,438 UART: [rt] RT listening for mailbox commands...
3,105,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,078 UART: [rt]cmd =0x41544d4e, len=14344
3,373,488 >>> mbox cmd response data (8 bytes)
3,373,489 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,392 UART: [rt]cmd =0x41545348, len=116
3,405,474 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,459 UART: [kat] SHA2-256
901,399 UART: [kat] SHA2-384
904,272 UART: [kat] SHA2-512-ACC
906,173 UART: [kat] ECC-384
915,972 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,495 UART: [fht] FHT @ 0x50003400
1,173,285 UART: [idev] ++
1,173,453 UART: [idev] CDI.KEYID = 6
1,173,814 UART: [idev] SUBJECT.KEYID = 7
1,174,239 UART: [idev] UDS.KEYID = 0
1,174,585 ready_for_fw is high
1,174,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,547 UART: [idev] Erasing UDS.KEYID = 0
1,199,675 UART: [idev] Sha1 KeyId Algorithm
1,208,563 UART: [idev] --
1,209,604 UART: [ldev] ++
1,209,772 UART: [ldev] CDI.KEYID = 6
1,210,136 UART: [ldev] SUBJECT.KEYID = 5
1,210,563 UART: [ldev] AUTHORITY.KEYID = 7
1,211,026 UART: [ldev] FE.KEYID = 1
1,216,150 UART: [ldev] Erasing FE.KEYID = 1
1,242,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,914 UART: [ldev] --
1,281,400 UART: [fwproc] Wait for Commands...
1,282,061 UART: [fwproc] Recv command 0x46574c44
1,282,794 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,938 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,908 >>> mbox cmd response: success
2,775,133 UART: [afmc] ++
2,775,301 UART: [afmc] CDI.KEYID = 6
2,775,664 UART: [afmc] SUBJECT.KEYID = 7
2,776,090 UART: [afmc] AUTHORITY.KEYID = 5
2,811,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,558 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,287 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,170 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,889 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,624 UART: [afmc] --
2,854,622 UART: [cold-reset] --
2,855,590 UART: [state] Locking Datavault
2,856,733 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,337 UART: [state] Locking ICCM
2,857,929 UART: [exit] Launching FMC @ 0x40000130
2,863,258 UART:
2,863,274 UART: Running Caliptra FMC ...
2,863,682 UART:
2,863,736 UART: [state] CFI Enabled
2,874,059 UART: [fht] FMC Alias Private Key: 7
2,981,306 UART: [art] Extend RT PCRs Done
2,981,734 UART: [art] Lock RT PCRs Done
2,983,522 UART: [art] Populate DV Done
2,991,807 UART: [fht] FMC Alias Private Key: 7
2,992,931 UART: [art] Derive CDI
2,993,211 UART: [art] Store in in slot 0x4
3,079,242 UART: [art] Derive Key Pair
3,079,602 UART: [art] Store priv key in slot 0x5
3,093,076 UART: [art] Derive Key Pair - Done
3,107,697 UART: [art] Signing Cert with AUTHO
3,108,177 UART: RITY.KEYID = 7
3,123,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,088 UART: [art] PUB.X = DB0AB13157DE075D9E98AFEDB83938B61E39F4F3B2C840B94B4094E13D60001B02DE2663B770873AE0FD4A8EDBB106B0
3,130,836 UART: [art] PUB.Y = C174044402B345B58DEFAD6ADE7C5A0F17AAA834E995276A372C9AA8D27B2BEF28904EA17846EE878F373D6B5386B040
3,137,785 UART: [art] SIG.R = 2925D44D989C9401D40BBAFEDE1A09CF7C77B210C787BA195A3770E8E1113498AAAB520561806EFA15551FBFFD8E227C
3,144,553 UART: [art] SIG.S = DC6F9B8B432A1340842A1082A36B1595E5862DBDE754CD019D98462F927F0E865AF09B1022284C03743CEB507C3BB3FB
3,168,399 UART: Caliptra RT
3,168,652 UART: [state] CFI Enabled
3,277,279 UART: [rt] RT listening for mailbox commands...
3,277,949 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,931 UART: [rt]cmd =0x41544d4e, len=14344
3,546,354 >>> mbox cmd response data (8 bytes)
3,546,355 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,422 UART: [rt]cmd =0x41545348, len=116
3,598,206 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,743 UART: [state] WD Timer not started. Device not locked for debugging
88,092 UART: [kat] SHA2-256
891,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,771 UART: [kat] ++
895,923 UART: [kat] sha1
900,221 UART: [kat] SHA2-256
902,161 UART: [kat] SHA2-384
904,968 UART: [kat] SHA2-512-ACC
906,869 UART: [kat] ECC-384
916,774 UART: [kat] HMAC-384Kdf
921,142 UART: [kat] LMS
1,169,454 UART: [kat] --
1,170,655 UART: [cold-reset] ++
1,171,117 UART: [fht] FHT @ 0x50003400
1,173,829 UART: [idev] ++
1,173,997 UART: [idev] CDI.KEYID = 6
1,174,358 UART: [idev] SUBJECT.KEYID = 7
1,174,783 UART: [idev] UDS.KEYID = 0
1,175,129 ready_for_fw is high
1,175,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,241 UART: [idev] Erasing UDS.KEYID = 0
1,199,641 UART: [idev] Sha1 KeyId Algorithm
1,208,411 UART: [idev] --
1,209,484 UART: [ldev] ++
1,209,652 UART: [ldev] CDI.KEYID = 6
1,210,016 UART: [ldev] SUBJECT.KEYID = 5
1,210,443 UART: [ldev] AUTHORITY.KEYID = 7
1,210,906 UART: [ldev] FE.KEYID = 1
1,216,110 UART: [ldev] Erasing FE.KEYID = 1
1,241,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,240 UART: [ldev] --
1,280,534 UART: [fwproc] Wait for Commands...
1,281,231 UART: [fwproc] Recv command 0x46574c44
1,281,964 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,343 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,586 >>> mbox cmd response: success
2,774,703 UART: [afmc] ++
2,774,871 UART: [afmc] CDI.KEYID = 6
2,775,234 UART: [afmc] SUBJECT.KEYID = 7
2,775,660 UART: [afmc] AUTHORITY.KEYID = 5
2,810,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,857 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,740 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,459 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,142 UART: [afmc] --
2,854,026 UART: [cold-reset] --
2,854,920 UART: [state] Locking Datavault
2,856,163 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,767 UART: [state] Locking ICCM
2,857,323 UART: [exit] Launching FMC @ 0x40000130
2,862,652 UART:
2,862,668 UART: Running Caliptra FMC ...
2,863,076 UART:
2,863,130 UART: [state] CFI Enabled
2,873,719 UART: [fht] FMC Alias Private Key: 7
2,980,982 UART: [art] Extend RT PCRs Done
2,981,410 UART: [art] Lock RT PCRs Done
2,983,128 UART: [art] Populate DV Done
2,991,415 UART: [fht] FMC Alias Private Key: 7
2,992,473 UART: [art] Derive CDI
2,992,753 UART: [art] Store in in slot 0x4
3,078,342 UART: [art] Derive Key Pair
3,078,702 UART: [art] Store priv key in slot 0x5
3,091,766 UART: [art] Derive Key Pair - Done
3,106,838 UART: [art] Signing Cert with AUTHO
3,107,318 UART: RITY.KEYID = 7
3,122,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,447 UART: [art] PUB.X = 85B0E269D768815BCDFAE702462D7C2FDF55BECDCC3A5298F4B446E13D1B010E426DC52A96C0DE786EA3EAECCCE8E63A
3,130,234 UART: [art] PUB.Y = 0EAA98A3EB301A6AD094C449AFB6A13050266F00A7F1093A5BCC94A2CAACB784DA0812B9230472A1DFF5DB7D74410FD1
3,137,163 UART: [art] SIG.R = 628664194FAB3276A2CE4C89A6A35DF35670CD31DA529EDB84FA86C5304DBB5B5EB7764A4321EED8C18FDC4292424739
3,143,941 UART: [art] SIG.S = 3BD5F4B3D023D6226C30BCC64B25320A989DE3CE67C5E4E5AE974B6EB71FECDB17C205C95441D7098FCACCBB770F0195
3,167,423 UART: Caliptra RT
3,167,676 UART: [state] CFI Enabled
3,274,623 UART: [rt] RT listening for mailbox commands...
3,275,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,207 UART: [rt]cmd =0x41544d4e, len=14344
3,543,005 >>> mbox cmd response data (8 bytes)
3,543,006 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,961 UART: [rt]cmd =0x41545348, len=116
3,574,683 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,856 ready_for_fw is high
1,055,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,080 >>> mbox cmd response: success
2,685,628 UART:
2,685,644 UART: Running Caliptra FMC ...
2,686,052 UART:
2,686,106 UART: [state] CFI Enabled
2,696,807 UART: [fht] FMC Alias Private Key: 7
2,804,548 UART: [art] Extend RT PCRs Done
2,804,976 UART: [art] Lock RT PCRs Done
2,806,798 UART: [art] Populate DV Done
2,815,271 UART: [fht] FMC Alias Private Key: 7
2,816,253 UART: [art] Derive CDI
2,816,533 UART: [art] Store in in slot 0x4
2,902,348 UART: [art] Derive Key Pair
2,902,708 UART: [art] Store priv key in slot 0x5
2,915,658 UART: [art] Derive Key Pair - Done
2,930,037 UART: [art] Signing Cert with AUTHO
2,930,517 UART: RITY.KEYID = 7
2,945,505 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,270 UART: [art] PUB.X = F77F39FF9805F12B80AAA0071C4D5B0BE86A71044DBFED5F4D76B0392190C69A1A0AD71F42C926A16480B7AC2D8EBAF9
2,953,041 UART: [art] PUB.Y = 2C36F2E0BB6E231260ECC8121DEDF1B1CC7B50C70C600269918F2C806EB8A555E1951B86F31E5A3A4CF3ED1B1BEB9B70
2,960,001 UART: [art] SIG.R = 2017669A7612658726691052823C2EEF1F8B2570975CDA3643A6FF58477066755010F8338A1901ADC2390BA5DD766FA2
2,966,751 UART: [art] SIG.S = 124F7E3CEC2DE0749BE9DF554ACD49DE4C4E790678DE11CC378042058226C064F226F1F04DB8A9D1C3B541C92F64AA57
2,991,240 UART: Caliptra RT
2,991,493 UART: [state] CFI Enabled
3,098,632 UART: [rt] RT listening for mailbox commands...
3,099,302 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,292 UART: [rt]cmd =0x41544d4e, len=14344
3,367,263 >>> mbox cmd response data (8 bytes)
3,367,264 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,297 UART: [rt]cmd =0x41545348, len=116
3,419,395 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,970 ready_for_fw is high
1,055,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,900 >>> mbox cmd response: success
2,686,156 UART:
2,686,172 UART: Running Caliptra FMC ...
2,686,580 UART:
2,686,634 UART: [state] CFI Enabled
2,696,995 UART: [fht] FMC Alias Private Key: 7
2,804,684 UART: [art] Extend RT PCRs Done
2,805,112 UART: [art] Lock RT PCRs Done
2,806,696 UART: [art] Populate DV Done
2,815,307 UART: [fht] FMC Alias Private Key: 7
2,816,253 UART: [art] Derive CDI
2,816,533 UART: [art] Store in in slot 0x4
2,902,226 UART: [art] Derive Key Pair
2,902,586 UART: [art] Store priv key in slot 0x5
2,915,824 UART: [art] Derive Key Pair - Done
2,930,707 UART: [art] Signing Cert with AUTHO
2,931,187 UART: RITY.KEYID = 7
2,946,245 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,010 UART: [art] PUB.X = 81F9D51A24ED39C10B8689E3E7B3DEEDDB99AEBB578A7133677E7BDCDDEF1E2E7930D53AB395EA1123F2E0A83D29E579
2,953,797 UART: [art] PUB.Y = A0413C3842261A722077D10433928B7978B915049CAE902814D91C315BA792B6D49FF65BCB993061EBC5BDE269E3CAD8
2,960,739 UART: [art] SIG.R = E9EA274E3EFFCE34D25E26282E68021E5B4E1769F4F120CDB24682E8E0A3EBC606B44303CA17715E5A9E3773177E01DC
2,967,505 UART: [art] SIG.S = D12C7ACF589BA275286DB36AAB313DCC600DB90EC7C6D0A330013A563D0EE06DB5E019108AE6FF9D5BED9729D270035E
2,990,911 UART: Caliptra RT
2,991,164 UART: [state] CFI Enabled
3,100,006 UART: [rt] RT listening for mailbox commands...
3,100,676 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,740 UART: [rt]cmd =0x41544d4e, len=14344
3,368,286 >>> mbox cmd response data (8 bytes)
3,368,287 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,618 UART: [rt]cmd =0x41545348, len=116
3,400,508 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,084 UART: [kat] SHA2-256
902,024 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
920,877 UART: [kat] LMS
1,169,189 UART: [kat] --
1,170,122 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,174,586 ready_for_fw is high
1,174,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,954 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,801 UART: [ldev] ++
1,209,969 UART: [ldev] CDI.KEYID = 6
1,210,333 UART: [ldev] SUBJECT.KEYID = 5
1,210,760 UART: [ldev] AUTHORITY.KEYID = 7
1,211,223 UART: [ldev] FE.KEYID = 1
1,216,807 UART: [ldev] Erasing FE.KEYID = 1
1,243,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,131 UART: [ldev] --
1,282,417 UART: [fwproc] Wait for Commands...
1,283,064 UART: [fwproc] Recv command 0x46574c44
1,283,797 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,752 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,111 >>> mbox cmd response: success
2,777,376 UART: [afmc] ++
2,777,544 UART: [afmc] CDI.KEYID = 6
2,777,907 UART: [afmc] SUBJECT.KEYID = 7
2,778,333 UART: [afmc] AUTHORITY.KEYID = 5
2,814,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,741 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,470 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,353 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,072 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,079 UART: [afmc] --
2,857,997 UART: [cold-reset] --
2,858,903 UART: [state] Locking Datavault
2,859,910 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,514 UART: [state] Locking ICCM
2,861,022 UART: [exit] Launching FMC @ 0x40000130
2,866,351 UART:
2,866,367 UART: Running Caliptra FMC ...
2,866,775 UART:
2,866,918 UART: [state] CFI Enabled
2,877,533 UART: [fht] FMC Alias Private Key: 7
2,985,542 UART: [art] Extend RT PCRs Done
2,985,970 UART: [art] Lock RT PCRs Done
2,987,252 UART: [art] Populate DV Done
2,995,421 UART: [fht] FMC Alias Private Key: 7
2,996,501 UART: [art] Derive CDI
2,996,781 UART: [art] Store in in slot 0x4
3,082,550 UART: [art] Derive Key Pair
3,082,910 UART: [art] Store priv key in slot 0x5
3,096,434 UART: [art] Derive Key Pair - Done
3,111,188 UART: [art] Signing Cert with AUTHO
3,111,668 UART: RITY.KEYID = 7
3,126,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,673 UART: [art] PUB.X = 76BC8578217306225AD1A2DD52EF7C5D35660109C31C3B877105611305AB9D83C3F56B28E77F6D6BA788315DA85090D3
3,134,422 UART: [art] PUB.Y = D74028A48FBB07565ACD2858E106FD35B56D6084E735C962CFD2EC4115EF274B62F67CE3823E1F4FE43E451E75E65935
3,141,370 UART: [art] SIG.R = FAA8CDC362D1CED18312AFE04EA5D8042B208CC5E5B5F2A48F3BED375DB2718C7E48BE1A7D8B0AEEB1EC5ED51B567CA4
3,148,166 UART: [art] SIG.S = 0379BC558D37E7B2D3844DEEEAF6F76DFA23CFCB855DA09CF78E063F1618AE114DFB53754716E8778123D8522F5FDC56
3,172,165 UART: Caliptra RT
3,172,510 UART: [state] CFI Enabled
3,280,647 UART: [rt] RT listening for mailbox commands...
3,281,317 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,149 UART: [rt]cmd =0x41544d4e, len=14344
3,548,944 >>> mbox cmd response data (8 bytes)
3,548,945 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,048 UART: [rt]cmd =0x41545348, len=116
3,600,562 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
915,937 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,169,778 UART: [cold-reset] ++
1,170,108 UART: [fht] FHT @ 0x50003400
1,172,796 UART: [idev] ++
1,172,964 UART: [idev] CDI.KEYID = 6
1,173,325 UART: [idev] SUBJECT.KEYID = 7
1,173,750 UART: [idev] UDS.KEYID = 0
1,174,096 ready_for_fw is high
1,174,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,358 UART: [idev] Erasing UDS.KEYID = 0
1,198,684 UART: [idev] Sha1 KeyId Algorithm
1,207,450 UART: [idev] --
1,208,537 UART: [ldev] ++
1,208,705 UART: [ldev] CDI.KEYID = 6
1,209,069 UART: [ldev] SUBJECT.KEYID = 5
1,209,496 UART: [ldev] AUTHORITY.KEYID = 7
1,209,959 UART: [ldev] FE.KEYID = 1
1,214,983 UART: [ldev] Erasing FE.KEYID = 1
1,241,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,697 UART: [ldev] --
1,280,979 UART: [fwproc] Wait for Commands...
1,281,674 UART: [fwproc] Recv command 0x46574c44
1,282,407 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,565 >>> mbox cmd response: success
2,775,708 UART: [afmc] ++
2,775,876 UART: [afmc] CDI.KEYID = 6
2,776,239 UART: [afmc] SUBJECT.KEYID = 7
2,776,665 UART: [afmc] AUTHORITY.KEYID = 5
2,812,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,379 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,108 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,991 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,710 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,519 UART: [afmc] --
2,856,419 UART: [cold-reset] --
2,857,273 UART: [state] Locking Datavault
2,858,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,848 UART: [state] Locking ICCM
2,859,320 UART: [exit] Launching FMC @ 0x40000130
2,864,649 UART:
2,864,665 UART: Running Caliptra FMC ...
2,865,073 UART:
2,865,216 UART: [state] CFI Enabled
2,876,085 UART: [fht] FMC Alias Private Key: 7
2,983,812 UART: [art] Extend RT PCRs Done
2,984,240 UART: [art] Lock RT PCRs Done
2,985,560 UART: [art] Populate DV Done
2,993,831 UART: [fht] FMC Alias Private Key: 7
2,994,875 UART: [art] Derive CDI
2,995,155 UART: [art] Store in in slot 0x4
3,080,826 UART: [art] Derive Key Pair
3,081,186 UART: [art] Store priv key in slot 0x5
3,093,984 UART: [art] Derive Key Pair - Done
3,109,085 UART: [art] Signing Cert with AUTHO
3,109,565 UART: RITY.KEYID = 7
3,125,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,938 UART: [art] PUB.X = 20D79CCF29448AA06A4CEEAEA2A9B7D897314831B561D57C3B8BCDD068B855D7602CB69A6BC4C088FFF978F46A4F1B43
3,132,724 UART: [art] PUB.Y = 914ACB7C7455CC46160E18BBDD1172E44B8F766B37C5CF220527F42B4CFA11B0E7BD15DF8386E6CC1896AF31FAC31829
3,139,680 UART: [art] SIG.R = 4B4B69A500DCA36BB1C0EBA872F05C6358C33357C1AFF953A1945F9182589A84721B906550D506B1E18BE6B73D7CA907
3,146,424 UART: [art] SIG.S = 5758B9584CC40BAB87BC5470D5EA3BA89260D1742F13B5AF773BDC78CD3E920D67CE0702BA5307E3C8A3C0DBDFE9E7F6
3,170,212 UART: Caliptra RT
3,170,557 UART: [state] CFI Enabled
3,279,218 UART: [rt] RT listening for mailbox commands...
3,279,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,652 UART: [rt]cmd =0x41544d4e, len=14344
3,546,714 >>> mbox cmd response data (8 bytes)
3,546,715 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,974 UART: [rt]cmd =0x41545348, len=116
3,578,972 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,863 ready_for_fw is high
1,055,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,087 >>> mbox cmd response: success
2,686,075 UART:
2,686,091 UART: Running Caliptra FMC ...
2,686,499 UART:
2,686,642 UART: [state] CFI Enabled
2,697,461 UART: [fht] FMC Alias Private Key: 7
2,805,470 UART: [art] Extend RT PCRs Done
2,805,898 UART: [art] Lock RT PCRs Done
2,807,212 UART: [art] Populate DV Done
2,815,255 UART: [fht] FMC Alias Private Key: 7
2,816,293 UART: [art] Derive CDI
2,816,573 UART: [art] Store in in slot 0x4
2,902,348 UART: [art] Derive Key Pair
2,902,708 UART: [art] Store priv key in slot 0x5
2,916,410 UART: [art] Derive Key Pair - Done
2,931,169 UART: [art] Signing Cert with AUTHO
2,931,649 UART: RITY.KEYID = 7
2,947,313 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,078 UART: [art] PUB.X = 7C7B81AB590BB8E0ECA20C6F78031DF82C6EC6957E40E0F5E6BA9E454AC82153D70F9BD323C00E11B813C6F94C86AA1D
2,954,849 UART: [art] PUB.Y = 3D317163F70A609664629E38BDCFFC48A5C228AB1D3FC045BC42D4CC512506224F7F6B7DADF8193219B3DFFE089D8BE0
2,961,802 UART: [art] SIG.R = E1CB7285103BA6D25FCC294D52BB63E7430365CFC7AB9384A0F42CD0BD565B33133F59805EDD024A406786A3E0827E8C
2,968,572 UART: [art] SIG.S = E279D5D29302180680E7A2375EA077A56CAD3996909DD507A064CD8FDD7DAF06571B319BD2BB4C5C3C3E287BE35B8F12
2,992,841 UART: Caliptra RT
2,993,186 UART: [state] CFI Enabled
3,100,526 UART: [rt] RT listening for mailbox commands...
3,101,196 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,222 UART: [rt]cmd =0x41544d4e, len=14344
3,369,591 >>> mbox cmd response data (8 bytes)
3,369,592 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,587 UART: [rt]cmd =0x41545348, len=116
3,422,121 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,467 ready_for_fw is high
1,057,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,417 >>> mbox cmd response: success
2,687,777 UART:
2,687,793 UART: Running Caliptra FMC ...
2,688,201 UART:
2,688,344 UART: [state] CFI Enabled
2,698,975 UART: [fht] FMC Alias Private Key: 7
2,806,798 UART: [art] Extend RT PCRs Done
2,807,226 UART: [art] Lock RT PCRs Done
2,808,802 UART: [art] Populate DV Done
2,817,029 UART: [fht] FMC Alias Private Key: 7
2,818,001 UART: [art] Derive CDI
2,818,281 UART: [art] Store in in slot 0x4
2,904,156 UART: [art] Derive Key Pair
2,904,516 UART: [art] Store priv key in slot 0x5
2,917,460 UART: [art] Derive Key Pair - Done
2,932,381 UART: [art] Signing Cert with AUTHO
2,932,861 UART: RITY.KEYID = 7
2,947,801 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,566 UART: [art] PUB.X = C3203D6D7DACEEEE7DA22E8C714BE9A90D12B1BBBA2C70860A69C58DB2A503CDEA725EE79B0549D18CF87DAD95351042
2,955,346 UART: [art] PUB.Y = FF1FC1B0D509ABECB1623079E3E1B449C5C0366559E707856908CACBA71F696C1602F24A81ADEA20A6080026B39F4E63
2,962,265 UART: [art] SIG.R = 5861ED74A963DFA1689E2A5E4EEA24991338807BDEAF28F6C5E5D957195C2D925E45B44DC5CACCCA182CC5C87D190D45
2,969,046 UART: [art] SIG.S = AAC7B9633BF092CF3653652D57DAC0BDFEB091F5D055D0DA5EFE71DCB327E748D1CCEC937CB16613B2666FC9801EC9A3
2,993,087 UART: Caliptra RT
2,993,432 UART: [state] CFI Enabled
3,101,725 UART: [rt] RT listening for mailbox commands...
3,102,395 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,517 UART: [rt]cmd =0x41544d4e, len=14344
3,370,331 >>> mbox cmd response data (8 bytes)
3,370,332 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,565 UART: [rt]cmd =0x41545348, len=116
3,402,617 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,100 UART:
192,452 UART: Running Caliptra ROM ...
193,643 UART:
193,803 UART: [state] CFI Enabled
265,171 UART: [state] LifecycleState = Unprovisioned
267,089 UART: [state] DebugLocked = No
270,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,353 UART: [kat] SHA2-256
445,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,174 UART: [kat] ++
456,635 UART: [kat] sha1
467,014 UART: [kat] SHA2-256
469,752 UART: [kat] SHA2-384
474,130 UART: [kat] SHA2-512-ACC
476,500 UART: [kat] ECC-384
2,764,815 UART: [kat] HMAC-384Kdf
2,779,145 UART: [kat] LMS
3,969,480 UART: [kat] --
3,975,193 UART: [cold-reset] ++
3,977,298 UART: [fht] Storing FHT @ 0x50003400
3,989,777 UART: [idev] ++
3,990,351 UART: [idev] CDI.KEYID = 6
3,991,267 UART: [idev] SUBJECT.KEYID = 7
3,992,516 UART: [idev] UDS.KEYID = 0
3,993,573 ready_for_fw is high
3,993,800 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,469 UART: [idev] Erasing UDS.KEYID = 0
7,324,170 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,729 UART: [idev] --
7,349,413 UART: [ldev] ++
7,349,991 UART: [ldev] CDI.KEYID = 6
7,350,931 UART: [ldev] SUBJECT.KEYID = 5
7,352,198 UART: [ldev] AUTHORITY.KEYID = 7
7,353,430 UART: [ldev] FE.KEYID = 1
7,380,351 UART: [ldev] Erasing FE.KEYID = 1
10,711,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,006,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,020,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,035,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,050,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,070,015 UART: [ldev] --
13,073,887 UART: [fwproc] Waiting for Commands...
13,075,987 UART: [fwproc] Received command 0x46574c44
13,078,168 UART: [fwproc] Received Image of size 114124 bytes
17,134,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,211,237 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,280,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,596,983 >>> mbox cmd response: success
17,601,033 UART: [afmc] ++
17,601,633 UART: [afmc] CDI.KEYID = 6
17,602,550 UART: [afmc] SUBJECT.KEYID = 7
17,603,821 UART: [afmc] AUTHORITY.KEYID = 5
20,966,899 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,267,339 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,269,621 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,284,049 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,298,889 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,313,296 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,334,712 UART: [afmc] --
23,339,156 UART: [cold-reset] --
23,342,429 UART: [state] Locking Datavault
23,347,594 UART: [state] Locking PCR0, PCR1 and PCR31
23,349,297 UART: [state] Locking ICCM
23,350,646 UART: [exit] Launching FMC @ 0x40000130
23,358,991 UART:
23,359,226 UART: Running Caliptra FMC ...
23,360,327 UART:
23,360,485 UART: [state] CFI Enabled
23,426,204 UART: [fht] FMC Alias Private Key: 7
25,763,678 UART: [art] Extend RT PCRs Done
25,764,903 UART: [art] Lock RT PCRs Done
25,766,422 UART: [art] Populate DV Done
25,771,946 UART: [fht] FMC Alias Private Key: 7
25,773,437 UART: [art] Derive CDI
25,774,176 UART: [art] Store in in slot 0x4
25,834,134 UART: [art] Derive Key Pair
25,835,175 UART: [art] Store priv key in slot 0x5
29,128,290 UART: [art] Derive Key Pair - Done
29,141,610 UART: [art] Signing Cert with AUTHO
29,142,910 UART: RITY.KEYID = 7
31,429,715 UART: [art] Erasing AUTHORITY.KEYID = 7
31,431,221 UART: [art] PUB.X = A44FDACF7D09C1FD7A7FED24945720AC29BAB2BF05AF2BC2BDE8CCEAC6F723FC17089615BCDA2760DB1A95252DC1999D
31,438,466 UART: [art] PUB.Y = C2B23475BFC7DB3012C31F9E28073166E7715502B799364733C032D10C5E9D977E3A2900E9D009F79CA5DF119CC3F9F9
31,445,689 UART: [art] SIG.R = E9EDE3B61E950D979059024FA52BAEA8930A7104B91A281D57D050FD115072F7E2CA1FFFF3325F2E486F8D427FCC58B5
31,453,083 UART: [art] SIG.S = 3EECE030E0BF4FED15017916AB958E3DC52D2E52BF7CDBBF6B9CC2DD10DE4A0D30ED982F6A6EA3B69AEE03C5D8CF31CD
32,758,555 UART: Caliptra RT
32,759,269 UART: [state] CFI Enabled
32,920,326 UART: [rt] RT listening for mailbox commands...
37,100,307 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,255,825 UART: [rt]cmd =0x41544d4e, len=14344
42,491,723 >>> mbox cmd response data (8 bytes)
42,492,496 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,523,297 UART: [rt]cmd =0x41545348, len=116
42,543,970 >>> mbox cmd response data (12 bytes)
44,667,460 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
44,768,223 UART:
44,768,562 UART: Running Caliptra ROM ...
44,769,607 UART:
44,769,760 UART: [state] CFI Enabled
44,845,663 UART: [state] LifecycleState = Unprovisioned
44,847,593 UART: [state] DebugLocked = No
44,850,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,854,996 UART: [kat] SHA2-256
45,024,621 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,035,156 UART: [kat] ++
45,035,637 UART: [kat] sha1
45,047,933 UART: [kat] SHA2-256
45,050,640 UART: [kat] SHA2-384
45,056,524 UART: [kat] SHA2-512-ACC
45,058,933 UART: [kat] ECC-384
47,345,001 UART: [kat] HMAC-384Kdf
47,356,213 UART: [kat] LMS
48,546,576 UART: [kat] --
48,551,657 UART: [update-reset] ++
52,260,199 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,263,716 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
52,522,119 >>> mbox cmd response: success
52,522,488 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,522,772 UART: [update-reset] Copying MAN_2 To MAN_1
52,545,155 UART: [update-reset Success] --
52,549,160 UART: [state] Locking Datavault
52,552,925 UART: [state] Locking PCR0, PCR1 and PCR31
52,554,631 UART: [state] Locking ICCM
52,557,329 UART: [exit] Launching FMC @ 0x40000130
52,565,786 UART:
52,566,019 UART: Running Caliptra FMC ...
52,567,121 UART:
52,567,283 UART: [state] CFI Enabled
52,658,241 UART: [art] Extend RT PCRs Done
52,659,423 UART: [art] Lock RT PCRs Done
52,660,989 UART: [art] Populate DV Done
52,666,461 UART: [fht] FMC Alias Private Key: 7
52,667,945 UART: [art] Derive CDI
52,668,709 UART: [art] Store in in slot 0x4
52,727,416 UART: [art] Derive Key Pair
52,728,481 UART: [art] Store priv key in slot 0x5
56,021,183 UART: [art] Derive Key Pair - Done
56,033,767 UART: [art] Signing Cert with AUTHO
56,035,077 UART: RITY.KEYID = 7
58,323,498 UART: [art] Erasing AUTHORITY.KEYID = 7
58,325,013 UART: [art] PUB.X = FAE03443D48ABD3B4D383CD31BFD8ABAB1A581442FDABB6492ACD3A96DA500718A68C29E138F04D989453CB7EEAD7778
58,332,289 UART: [art] PUB.Y = 02468B6B4C09249D2A531A8E5D8947261A611EED9AA162B07C6405A807700D153A9BE72BEFD6C027976D8AB582D9C01C
58,339,520 UART: [art] SIG.R = 41FCD8D3932405357D8E251EA5E925542DECC03E470D01B7BBF75086040C7B30F08E1B8BAD94021082BB880687D5FDD6
58,346,919 UART: [art] SIG.S = 08275C35A5858EFEBBC2E1692DC254EE25F380414726E0A58EEA1DC1FEFA8F7D60FBBBC7301F4100E21A455871F91262
59,652,160 UART: mbox::rt_entry...
59,653,130 UART: ____ _ _ _ ____ _____
59,655,257 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,657,289 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,659,175 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,661,103 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,662,983 UART: |_|
59,663,864 UART:
59,948,548 UART: [rt] Runtime listening for mailbox commands...
59,950,687 >>> mbox cmd response data (48 bytes)
59,951,278 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,953,633 >>> mbox cmd response data (48 bytes)
59,954,507 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,968,351 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,783,624 ready_for_fw is high
3,784,005 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,858,916 >>> mbox cmd response: success
23,544,350 UART:
23,544,737 UART: Running Caliptra FMC ...
23,545,853 UART:
23,546,006 UART: [state] CFI Enabled
23,613,810 UART: [fht] FMC Alias Private Key: 7
25,951,361 UART: [art] Extend RT PCRs Done
25,952,590 UART: [art] Lock RT PCRs Done
25,954,299 UART: [art] Populate DV Done
25,959,944 UART: [fht] FMC Alias Private Key: 7
25,961,436 UART: [art] Derive CDI
25,962,229 UART: [art] Store in in slot 0x4
26,006,888 UART: [art] Derive Key Pair
26,007,934 UART: [art] Store priv key in slot 0x5
29,300,555 UART: [art] Derive Key Pair - Done
29,313,073 UART: [art] Signing Cert with AUTHO
29,314,376 UART: RITY.KEYID = 7
31,602,348 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,861 UART: [art] PUB.X = 2540CF59183FA47344718BAA40E4B3A5BD7E9D64B1D637E062C5F5EC8F52B5E47C5C53ABAA681F3EB855C6EDA9E5371D
31,611,082 UART: [art] PUB.Y = 4B9F26B930BDA8F64460CBAF5DC583CC13B4C7C0BC269FB3089E0AD43A6207483D728480C7F3213BEC3EAD19F9FB03A3
31,618,346 UART: [art] SIG.R = 8EB190F80E6A2E7143E3498B2633778B59BC8EAA99B20BD7DC6D33EBEB72FE32B6979870755C93641683058D70498AF7
31,625,702 UART: [art] SIG.S = 586B9DEC3D432C85844A16B7F6AE06A586B73BD2B44CE71B37A7D72FD0799AD4D51E067067FECCE2CE92554F2C70C641
32,930,827 UART: Caliptra RT
32,931,542 UART: [state] CFI Enabled
33,093,301 UART: [rt] RT listening for mailbox commands...
37,273,719 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,429,188 UART: [rt]cmd =0x41544d4e, len=14344
42,664,838 >>> mbox cmd response data (8 bytes)
42,665,580 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,696,381 UART: [rt]cmd =0x41545348, len=116
42,716,499 >>> mbox cmd response data (12 bytes)
44,837,953 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,808,401 >>> mbox cmd response: success
52,808,911 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,842,367 UART:
52,842,654 UART: Running Caliptra FMC ...
52,843,772 UART:
52,843,932 UART: [state] CFI Enabled
52,941,109 UART: [art] Extend RT PCRs Done
52,942,326 UART: [art] Lock RT PCRs Done
52,943,734 UART: [art] Populate DV Done
52,949,096 UART: [fht] FMC Alias Private Key: 7
52,950,681 UART: [art] Derive CDI
52,951,502 UART: [art] Store in in slot 0x4
53,009,814 UART: [art] Derive Key Pair
53,010,825 UART: [art] Store priv key in slot 0x5
56,304,211 UART: [art] Derive Key Pair - Done
56,317,404 UART: [art] Signing Cert with AUTHO
56,318,720 UART: RITY.KEYID = 7
58,605,516 UART: [art] Erasing AUTHORITY.KEYID = 7
58,607,023 UART: [art] PUB.X = AC549B1153CEFAB970B7280BA8BC500D3D4C35BA467774F52E12F102E1FA9E5015E120F4026C801D258D2181C73B23B1
58,614,296 UART: [art] PUB.Y = 7ED80A660ABAF5951D917B67738AD9AA309ACC655A36FB0DC5D5513116D5E72E705796F95D708B5ADC215E6EFC6ABBC0
58,621,561 UART: [art] SIG.R = 8C277095E4C9010F518F1F635B755E966471928A96119D357087A028BA3F29E47AB7858F8645EB5620B07F1F024AFAA3
58,628,937 UART: [art] SIG.S = 4DC3F6D4339C5B564229042F90DE7A4919A04553F8D656700CF631EC3064B7D7A472B5E002A95FFC0BAA9918817EFD28
59,933,213 UART: mbox::rt_entry...
59,934,198 UART: ____ _ _ _ ____ _____
59,936,105 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,938,135 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,940,075 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,942,017 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,943,953 UART: |_|
59,944,756 UART:
60,226,291 UART: [rt] Runtime listening for mailbox commands...
60,228,468 >>> mbox cmd response data (48 bytes)
60,229,040 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,231,359 >>> mbox cmd response data (48 bytes)
60,232,267 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,246,108 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.13s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
192,349 UART:
192,728 UART: Running Caliptra ROM ...
193,930 UART:
603,500 UART: [state] CFI Enabled
618,789 UART: [state] LifecycleState = Unprovisioned
620,738 UART: [state] DebugLocked = No
622,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,483 UART: [kat] SHA2-256
797,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,786 UART: [kat] ++
808,238 UART: [kat] sha1
819,952 UART: [kat] SHA2-256
822,669 UART: [kat] SHA2-384
828,654 UART: [kat] SHA2-512-ACC
831,024 UART: [kat] ECC-384
3,115,273 UART: [kat] HMAC-384Kdf
3,127,093 UART: [kat] LMS
4,317,177 UART: [kat] --
4,320,477 UART: [cold-reset] ++
4,322,578 UART: [fht] Storing FHT @ 0x50003400
4,334,276 UART: [idev] ++
4,334,851 UART: [idev] CDI.KEYID = 6
4,335,763 UART: [idev] SUBJECT.KEYID = 7
4,337,005 UART: [idev] UDS.KEYID = 0
4,338,157 ready_for_fw is high
4,338,349 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,669 UART: [idev] Erasing UDS.KEYID = 0
7,621,953 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,060 UART: [idev] --
7,648,515 UART: [ldev] ++
7,649,135 UART: [ldev] CDI.KEYID = 6
7,650,147 UART: [ldev] SUBJECT.KEYID = 5
7,651,301 UART: [ldev] AUTHORITY.KEYID = 7
7,652,545 UART: [ldev] FE.KEYID = 1
7,663,457 UART: [ldev] Erasing FE.KEYID = 1
10,954,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,563 UART: [ldev] --
13,314,472 UART: [fwproc] Waiting for Commands...
13,317,259 UART: [fwproc] Received command 0x46574c44
13,319,434 UART: [fwproc] Received Image of size 114124 bytes
17,370,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,268 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,833,665 >>> mbox cmd response: success
17,838,664 UART: [afmc] ++
17,839,300 UART: [afmc] CDI.KEYID = 6
17,840,209 UART: [afmc] SUBJECT.KEYID = 7
17,841,422 UART: [afmc] AUTHORITY.KEYID = 5
21,159,757 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,635 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,890 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,237 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,116 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,554 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,800 UART: [afmc] --
23,529,451 UART: [cold-reset] --
23,533,906 UART: [state] Locking Datavault
23,539,040 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,802 UART: [state] Locking ICCM
23,542,729 UART: [exit] Launching FMC @ 0x40000130
23,551,118 UART:
23,551,370 UART: Running Caliptra FMC ...
23,552,464 UART:
23,552,619 UART: [state] CFI Enabled
23,560,416 UART: [fht] FMC Alias Private Key: 7
25,890,500 UART: [art] Extend RT PCRs Done
25,891,723 UART: [art] Lock RT PCRs Done
25,893,285 UART: [art] Populate DV Done
25,898,799 UART: [fht] FMC Alias Private Key: 7
25,900,331 UART: [art] Derive CDI
25,901,142 UART: [art] Store in in slot 0x4
25,943,686 UART: [art] Derive Key Pair
25,944,726 UART: [art] Store priv key in slot 0x5
29,186,357 UART: [art] Derive Key Pair - Done
29,199,266 UART: [art] Signing Cert with AUTHO
29,200,612 UART: RITY.KEYID = 7
31,480,216 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,740 UART: [art] PUB.X = 182C3E592C45E982E7E8997A23FC18FE660BF14BD79A11404E629D5C48237F42195ECCC6C4ECAAC74E127CE18B78F674
31,488,980 UART: [art] PUB.Y = 854753A275D5A4BC762F94315C5A5B3032E310E59326B23458F7D21AC26A4F9DE24563330C5213D63FAD4A2B0C6FFAB8
31,496,250 UART: [art] SIG.R = 7053052D38FD3EA24449233E091364BEDC03069F1BF58A9C7FFDE005EA249C8AD508DABECF5591F31B5CE5435F9F3657
31,503,622 UART: [art] SIG.S = 09FE27EE2A078BE419F2C39D61159C3EE9376BD46F54E5642841F0CBFE65ABD5D1EFEC971C08780107E9D42B1FD3BBAE
32,808,816 UART: Caliptra RT
32,809,526 UART: [state] CFI Enabled
32,928,179 UART: [rt] RT listening for mailbox commands...
36,957,766 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,113,404 UART: [rt]cmd =0x41544d4e, len=14344
42,349,060 >>> mbox cmd response data (8 bytes)
42,349,980 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,380,624 UART: [rt]cmd =0x41545348, len=116
42,400,247 >>> mbox cmd response data (12 bytes)
44,445,778 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
44,546,292 UART:
44,546,641 UART: Running Caliptra ROM ...
44,547,779 UART:
44,547,944 UART: [state] CFI Enabled
44,559,364 UART: [state] LifecycleState = Unprovisioned
44,561,290 UART: [state] DebugLocked = No
44,562,997 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,568,544 UART: [kat] SHA2-256
44,738,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,748,812 UART: [kat] ++
44,749,304 UART: [kat] sha1
44,760,348 UART: [kat] SHA2-256
44,763,084 UART: [kat] SHA2-384
44,768,589 UART: [kat] SHA2-512-ACC
44,770,956 UART: [kat] ECC-384
47,056,132 UART: [kat] HMAC-384Kdf
47,067,873 UART: [kat] LMS
48,257,950 UART: [kat] --
48,262,533 UART: [update-reset] ++
51,971,949 UART: [update-reset] Image verified using Vendor ECC Key Index 0
51,975,571 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
52,234,008 >>> mbox cmd response: success
52,234,363 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,234,749 UART: [update-reset] Copying MAN_2 To MAN_1
52,257,163 UART: [update-reset Success] --
52,261,225 UART: [state] Locking Datavault
52,263,567 UART: [state] Locking PCR0, PCR1 and PCR31
52,265,266 UART: [state] Locking ICCM
52,266,601 UART: [exit] Launching FMC @ 0x40000130
52,275,046 UART:
52,275,303 UART: Running Caliptra FMC ...
52,276,407 UART:
52,276,568 UART: [state] CFI Enabled
52,321,122 UART: [art] Extend RT PCRs Done
52,322,299 UART: [art] Lock RT PCRs Done
52,323,752 UART: [art] Populate DV Done
52,329,292 UART: [fht] FMC Alias Private Key: 7
52,330,990 UART: [art] Derive CDI
52,331,798 UART: [art] Store in in slot 0x4
52,374,547 UART: [art] Derive Key Pair
52,375,546 UART: [art] Store priv key in slot 0x5
55,617,974 UART: [art] Derive Key Pair - Done
55,630,974 UART: [art] Signing Cert with AUTHO
55,632,279 UART: RITY.KEYID = 7
57,911,789 UART: [art] Erasing AUTHORITY.KEYID = 7
57,913,295 UART: [art] PUB.X = 3FB987745482B1AC79D36D9376B668B5E17FC8C81487E614F90823E7BEA2362A4962957EDD2E6C33ECE329BA0DB4EF49
57,920,633 UART: [art] PUB.Y = 51F38A14C1826EF06F5DF434AFA9C34E6E8B5A1415A1B387398EE52F44BEA5AF7109B40F9828F7E98B317FBDF4A1D1CE
57,927,815 UART: [art] SIG.R = 10CD667595D4B69230557C6A0B1498F7E7FFB8ED6F0B4F55C741C8AEB745369A06225077ABA9E0BB80D5D8C83DA23854
57,935,208 UART: [art] SIG.S = 2C994464D77D50D3483808AB5FE416778EFE1964D8F4C5CF9F7E2B0D4D81AD0080208BBA29B49F151822037DA5F55FE7
59,239,793 UART: mbox::rt_entry...
59,240,754 UART: ____ _ _ _ ____ _____
59,242,736 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,244,736 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,246,662 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,248,588 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,250,512 UART: |_|
59,251,315 UART:
59,536,835 UART: [rt] Runtime listening for mailbox commands...
59,539,000 >>> mbox cmd response data (48 bytes)
59,539,583 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,541,900 >>> mbox cmd response data (48 bytes)
59,542,805 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,556,669 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.09s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
4,126,559 ready_for_fw is high
4,127,355 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,082,364 >>> mbox cmd response: success
23,728,811 UART:
23,729,205 UART: Running Caliptra FMC ...
23,730,318 UART:
23,730,461 UART: [state] CFI Enabled
23,738,423 UART: [fht] FMC Alias Private Key: 7
26,068,909 UART: [art] Extend RT PCRs Done
26,070,143 UART: [art] Lock RT PCRs Done
26,071,765 UART: [art] Populate DV Done
26,077,461 UART: [fht] FMC Alias Private Key: 7
26,079,108 UART: [art] Derive CDI
26,079,841 UART: [art] Store in in slot 0x4
26,122,546 UART: [art] Derive Key Pair
26,123,589 UART: [art] Store priv key in slot 0x5
29,365,846 UART: [art] Derive Key Pair - Done
29,378,684 UART: [art] Signing Cert with AUTHO
29,379,997 UART: RITY.KEYID = 7
31,659,596 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,105 UART: [art] PUB.X = 8768ABA62DFF7BAA3E10008DA3BF38A01336750E51728358BD0A9A36D09525A51B6D4FF518EE9403977DAB8F5236F8A7
31,668,385 UART: [art] PUB.Y = 8364064C2D6530D396CD0B8277C9089681C06290E09BEB60287F2A842A7B23514E1F4CEA72108FCF0169907AA9B061E9
31,675,609 UART: [art] SIG.R = A563467606146B690E1EBDD787C78244349FC9DC3986FE03673E4B0FB31C49A61A38E161DED6A3385BB390D818B0EDF7
31,682,990 UART: [art] SIG.S = 76826CC13785999A5BB795C537F5FFDAEEF3B767A4D1CCD84BDFAB3A84826CE732AABB03E463B09BEEB27D9ACF46A035
32,988,981 UART: Caliptra RT
32,989,744 UART: [state] CFI Enabled
33,106,632 UART: [rt] RT listening for mailbox commands...
37,136,135 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,291,992 UART: [rt]cmd =0x41544d4e, len=14344
42,527,872 >>> mbox cmd response data (8 bytes)
42,528,672 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,559,364 UART: [rt]cmd =0x41545348, len=116
42,579,354 >>> mbox cmd response data (12 bytes)
44,625,469 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,522,870 >>> mbox cmd response: success
52,523,344 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,559,001 UART:
52,559,282 UART: Running Caliptra FMC ...
52,560,418 UART:
52,560,572 UART: [state] CFI Enabled
52,604,927 UART: [art] Extend RT PCRs Done
52,606,117 UART: [art] Lock RT PCRs Done
52,607,303 UART: [art] Populate DV Done
52,612,866 UART: [fht] FMC Alias Private Key: 7
52,614,400 UART: [art] Derive CDI
52,615,209 UART: [art] Store in in slot 0x4
52,657,746 UART: [art] Derive Key Pair
52,658,735 UART: [art] Store priv key in slot 0x5
55,900,666 UART: [art] Derive Key Pair - Done
55,913,664 UART: [art] Signing Cert with AUTHO
55,914,970 UART: RITY.KEYID = 7
58,194,258 UART: [art] Erasing AUTHORITY.KEYID = 7
58,195,774 UART: [art] PUB.X = 143EFCBB44646425ADBC46303B378682F74F61E90B69139CFE579D64BABAB85199E41887ECF6C7724CACDB17BC0F37D9
58,203,022 UART: [art] PUB.Y = CA6C94DAD4F0B81CF5D7A4C9B086F8D0383CD463DD7EE3FAFF04E1449B5BE7F379607A4589E6236A14D61FEB86584109
58,210,272 UART: [art] SIG.R = 65E9E032063037AF5443363D46AE773A1684F7E841A1E7B51D43D0B8CB2DA79A556E09484DAF8AD0DB8F56BC7A822FE4
58,217,665 UART: [art] SIG.S = 8E3314226DABCFAED6102822B8FBAF0C97A0C3FB740F3695EC87AD0DBABE5971238EE1C727601538B744871D0A7DE832
59,522,643 UART: mbox::rt_entry...
59,523,584 UART: ____ _ _ _ ____ _____
59,525,561 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,527,563 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,529,485 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,531,407 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,533,401 UART: |_|
59,534,205 UART:
59,813,282 UART: [rt] Runtime listening for mailbox commands...
59,815,437 >>> mbox cmd response data (48 bytes)
59,816,015 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,818,373 >>> mbox cmd response data (48 bytes)
59,819,270 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,833,114 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,774 writing to cptra_bootfsm_go
193,019 UART:
193,377 UART: Running Caliptra ROM ...
194,476 UART:
194,619 UART: [state] CFI Enabled
262,592 UART: [state] LifecycleState = Unprovisioned
264,512 UART: [state] DebugLocked = No
266,830 UART: [state] WD Timer not started. Device not locked for debugging
269,866 UART: [kat] SHA2-256
449,003 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,554 UART: [kat] ++
461,085 UART: [kat] sha1
470,764 UART: [kat] SHA2-256
473,778 UART: [kat] SHA2-384
479,337 UART: [kat] SHA2-512-ACC
482,308 UART: [kat] ECC-384
2,926,492 UART: [kat] HMAC-384Kdf
2,951,579 UART: [kat] LMS
3,481,096 UART: [kat] --
3,485,038 UART: [cold-reset] ++
3,487,048 UART: [fht] FHT @ 0x50003400
3,497,317 UART: [idev] ++
3,497,923 UART: [idev] CDI.KEYID = 6
3,498,811 UART: [idev] SUBJECT.KEYID = 7
3,499,932 UART: [idev] UDS.KEYID = 0
3,500,932 ready_for_fw is high
3,501,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,645,044 UART: [idev] Erasing UDS.KEYID = 0
6,005,567 UART: [idev] Sha1 KeyId Algorithm
6,029,242 UART: [idev] --
6,032,693 UART: [ldev] ++
6,033,264 UART: [ldev] CDI.KEYID = 6
6,034,156 UART: [ldev] SUBJECT.KEYID = 5
6,035,369 UART: [ldev] AUTHORITY.KEYID = 7
6,036,655 UART: [ldev] FE.KEYID = 1
6,070,830 UART: [ldev] Erasing FE.KEYID = 1
8,575,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,314,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,330,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,946 UART: [ldev] --
10,386,826 UART: [fwproc] Wait for Commands...
10,389,458 UART: [fwproc] Recv command 0x46574c44
10,391,556 UART: [fwproc] Recv'd Img size: 114448 bytes
13,792,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,253,913 >>> mbox cmd response: success
14,258,049 UART: [afmc] ++
14,258,649 UART: [afmc] CDI.KEYID = 6
14,259,566 UART: [afmc] SUBJECT.KEYID = 7
14,260,725 UART: [afmc] AUTHORITY.KEYID = 5
16,786,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,514,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,516,161 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,531,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,547,970 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,563,829 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,586,945 UART: [afmc] --
18,591,086 UART: [cold-reset] --
18,595,435 UART: [state] Locking Datavault
18,599,548 UART: [state] Locking PCR0, PCR1 and PCR31
18,601,199 UART: [state] Locking ICCM
18,602,406 UART: [exit] Launching FMC @ 0x40000130
18,610,798 UART:
18,611,038 UART: Running Caliptra FMC ...
18,612,092 UART:
18,612,252 UART: [state] CFI Enabled
18,670,566 UART: [fht] FMC Alias Private Key: 7
20,434,911 UART: [art] Extend RT PCRs Done
20,436,119 UART: [art] Lock RT PCRs Done
20,437,518 UART: [art] Populate DV Done
20,442,948 UART: [fht] FMC Alias Private Key: 7
20,444,594 UART: [art] Derive CDI
20,445,410 UART: [art] Store in in slot 0x4
20,503,857 UART: [art] Derive Key Pair
20,504,889 UART: [art] Store priv key in slot 0x5
22,968,015 UART: [art] Derive Key Pair - Done
22,980,794 UART: [art] Signing Cert with AUTHO
22,982,095 UART: RITY.KEYID = 7
24,693,424 UART: [art] Erasing AUTHORITY.KEYID = 7
24,694,921 UART: [art] PUB.X = 3F66A56F00D5A45540277945557B46CAEB5EDA489B3B2D21011920DB7E0782FBFAC57D94A775C49D6954A1C6D5A18AC6
24,702,123 UART: [art] PUB.Y = EBA9F250A88F0398BAE2AB99061E352A5BBA51A873C49BDD6B0F830E62DC2E62832FEE7FC9A4FF490BEDA88F2FDA547A
24,709,419 UART: [art] SIG.R = 8754AB727A326409A0243A147D1AB09E57A18ABAE34AE743F03AD69CCFA0ED9F739D44D4CC44FD656B1D2BF029BAAA5C
24,716,866 UART: [art] SIG.S = 0E08817B2AEB1A740C37C4D1432EDD7DC62B0115A17CA41EC25704B86417A00B0E194CFD88FB25B1CF035AC76A0095E3
25,695,630 UART: Caliptra RT
25,696,340 UART: [state] CFI Enabled
25,861,082 UART: [rt] RT listening for mailbox commands...
29,930,414 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,086,354 UART: [rt]cmd =0x41544d4e, len=14344
34,017,095 >>> mbox cmd response data (8 bytes)
34,017,881 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,048,521 UART: [rt]cmd =0x41545348, len=116
34,069,205 >>> mbox cmd response data (12 bytes)
36,116,484 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
36,217,108 UART:
36,217,474 UART: Running Caliptra ROM ...
36,218,530 UART:
36,218,681 UART: [state] CFI Enabled
36,293,075 UART: [state] LifecycleState = Unprovisioned
36,294,980 UART: [state] DebugLocked = No
36,297,262 UART: [state] WD Timer not started. Device not locked for debugging
36,301,108 UART: [kat] SHA2-256
36,480,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,491,756 UART: [kat] ++
36,492,219 UART: [kat] sha1
36,504,506 UART: [kat] SHA2-256
36,507,530 UART: [kat] SHA2-384
36,512,707 UART: [kat] SHA2-512-ACC
36,515,646 UART: [kat] ECC-384
38,978,536 UART: [kat] HMAC-384Kdf
38,998,962 UART: [kat] LMS
39,528,388 UART: [kat] --
39,534,635 UART: [update-reset] ++
42,528,027 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,531,741 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
42,789,995 >>> mbox cmd response: success
42,790,416 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,791,923 UART: [update-reset] Copying MAN_2 To MAN_1
42,814,274 UART: [update-reset Success] --
42,817,573 UART: [state] Locking Datavault
42,821,483 UART: [state] Locking PCR0, PCR1 and PCR31
42,823,126 UART: [state] Locking ICCM
42,825,290 UART: [exit] Launching FMC @ 0x40000130
42,833,742 UART:
42,833,978 UART: Running Caliptra FMC ...
42,835,076 UART:
42,835,234 UART: [state] CFI Enabled
42,937,953 UART: [art] Extend RT PCRs Done
42,939,138 UART: [art] Lock RT PCRs Done
42,940,804 UART: [art] Populate DV Done
42,946,207 UART: [fht] FMC Alias Private Key: 7
42,947,704 UART: [art] Derive CDI
42,948,519 UART: [art] Store in in slot 0x4
43,006,672 UART: [art] Derive Key Pair
43,007,953 UART: [art] Store priv key in slot 0x5
45,471,032 UART: [art] Derive Key Pair - Done
45,484,082 UART: [art] Signing Cert with AUTHO
45,485,385 UART: RITY.KEYID = 7
47,196,433 UART: [art] Erasing AUTHORITY.KEYID = 7
47,197,938 UART: [art] PUB.X = A0B0E182CC0355216EBFECC23CDC3BD24187332731153F5817C7BA9692DC6CF6AE6E8F3037A422B7C36A567415492847
47,205,227 UART: [art] PUB.Y = 4860C45AF930EC37CE0F23E8C87FAA5D7ADC34B8AE90FAAB39D10E43D3819CF5D146E99784965035637A6363C90208ED
47,212,486 UART: [art] SIG.R = BE6B1D6143FCEFF2EBF9135B5D3AB4418A886B8A6C51E5C2DBBFFAABF2F9748D837731BE3C227C84DC55FB175BA9F27B
47,219,941 UART: [art] SIG.S = 2D4F2BC42AD435155B36A818F38373CBD9C20FE786D97290AA9FF8B52D93E456D741C2B76BCA04E8DD925D964D158AF2
48,198,340 UART: mbox::rt_entry...
48,199,290 UART: ____ _ _ _ ____ _____
48,201,269 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,203,272 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,205,217 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,207,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,209,075 UART: |_|
48,209,915 UART:
48,497,277 UART: [rt] Runtime listening for mailbox commands...
48,499,396 >>> mbox cmd response data (48 bytes)
48,499,995 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,502,359 >>> mbox cmd response data (48 bytes)
48,503,257 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,517,195 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,381,714 ready_for_fw is high
3,382,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,077,847 >>> mbox cmd response: success
18,368,515 UART:
18,368,908 UART: Running Caliptra FMC ...
18,370,031 UART:
18,370,189 UART: [state] CFI Enabled
18,434,036 UART: [fht] FMC Alias Private Key: 7
20,198,101 UART: [art] Extend RT PCRs Done
20,199,330 UART: [art] Lock RT PCRs Done
20,201,149 UART: [art] Populate DV Done
20,206,574 UART: [fht] FMC Alias Private Key: 7
20,208,279 UART: [art] Derive CDI
20,209,037 UART: [art] Store in in slot 0x4
20,266,089 UART: [art] Derive Key Pair
20,267,131 UART: [art] Store priv key in slot 0x5
22,729,940 UART: [art] Derive Key Pair - Done
22,742,988 UART: [art] Signing Cert with AUTHO
22,744,294 UART: RITY.KEYID = 7
24,455,672 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,175 UART: [art] PUB.X = 5A21767EF91E590F00F6AFDE0AA9B6AEC8E105404D224DD0DFA9F9036BBAF6DBF3E6C81B3110F0393066F3EC944F666F
24,464,484 UART: [art] PUB.Y = 2B1D8C7FD9CC12C59218CF1FEDACD195E6B2D01D020D7E07EB5355D10F2B72E9ACCD946FE1A02550B5757499ED006F56
24,471,710 UART: [art] SIG.R = 9C86E7F428124E0B635A8A79EB0624A2745997834515282E98DD46C03A106CCB236AE15313A579FF529C75BC21A3BE35
24,479,114 UART: [art] SIG.S = AB036A4660E3A56419DBC97D05B40C79243F3CC4478F48B0FC45ADA1A5D63F45C5547DBB6603A544F2687B807E34C0A5
25,457,970 UART: Caliptra RT
25,458,683 UART: [state] CFI Enabled
25,623,943 UART: [rt] RT listening for mailbox commands...
29,660,792 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,817,112 UART: [rt]cmd =0x41544d4e, len=14344
33,747,573 >>> mbox cmd response data (8 bytes)
33,748,386 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,779,145 UART: [rt]cmd =0x41545348, len=116
33,799,406 >>> mbox cmd response data (12 bytes)
35,845,714 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,370,039 >>> mbox cmd response: success
42,370,485 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,404,473 UART:
42,404,794 UART: Running Caliptra FMC ...
42,405,929 UART:
42,406,098 UART: [state] CFI Enabled
42,505,149 UART: [art] Extend RT PCRs Done
42,506,357 UART: [art] Lock RT PCRs Done
42,507,818 UART: [art] Populate DV Done
42,513,445 UART: [fht] FMC Alias Private Key: 7
42,515,144 UART: [art] Derive CDI
42,515,958 UART: [art] Store in in slot 0x4
42,574,340 UART: [art] Derive Key Pair
42,575,378 UART: [art] Store priv key in slot 0x5
45,038,104 UART: [art] Derive Key Pair - Done
45,051,162 UART: [art] Signing Cert with AUTHO
45,052,465 UART: RITY.KEYID = 7
46,764,060 UART: [art] Erasing AUTHORITY.KEYID = 7
46,765,566 UART: [art] PUB.X = CF9E073516CC5576560B52034E1F3C9BD2A30C0C14755DBEB0772428B3001AFC617E6084261D79D576D8D45635F3CB7A
46,772,806 UART: [art] PUB.Y = 7BA11F0CA59C5C8F1FC1712C1FDE3329F1D0B843F45546B99B61473FEAE8A35977E55EA9B02AC4407BA9E228CAEB8074
46,780,092 UART: [art] SIG.R = 21DBCA99F2C937A05B78F275CFD07554362711A12C7EFF4FB68E4A42412CDDF6AC4188C2DB6C381A298E9D0F767CDA59
46,787,514 UART: [art] SIG.S = C038E208CC3294F475B8418352AE8A7F6CC32F1D87AEF0F9C82AA3DB0BF0D2C917E2B91F7B221C57BE303541DA226D97
47,766,120 UART: mbox::rt_entry...
47,767,090 UART: ____ _ _ _ ____ _____
47,769,028 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
47,771,038 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
47,772,971 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
47,774,900 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
47,776,877 UART: |_|
47,777,683 UART:
48,068,126 UART: [rt] Runtime listening for mailbox commands...
48,070,253 >>> mbox cmd response data (48 bytes)
48,070,824 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,073,148 >>> mbox cmd response data (48 bytes)
48,074,044 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,087,947 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,390 UART:
192,767 UART: Running Caliptra ROM ...
193,870 UART:
603,528 UART: [state] CFI Enabled
614,579 UART: [state] LifecycleState = Unprovisioned
616,400 UART: [state] DebugLocked = No
617,772 UART: [state] WD Timer not started. Device not locked for debugging
622,028 UART: [kat] SHA2-256
801,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,714 UART: [kat] ++
813,155 UART: [kat] sha1
824,230 UART: [kat] SHA2-256
827,293 UART: [kat] SHA2-384
833,982 UART: [kat] SHA2-512-ACC
836,906 UART: [kat] ECC-384
3,280,906 UART: [kat] HMAC-384Kdf
3,293,260 UART: [kat] LMS
3,822,705 UART: [kat] --
3,827,141 UART: [cold-reset] ++
3,829,584 UART: [fht] FHT @ 0x50003400
3,841,405 UART: [idev] ++
3,841,959 UART: [idev] CDI.KEYID = 6
3,842,981 UART: [idev] SUBJECT.KEYID = 7
3,844,095 UART: [idev] UDS.KEYID = 0
3,845,039 ready_for_fw is high
3,845,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,280 UART: [idev] Erasing UDS.KEYID = 0
6,313,839 UART: [idev] Sha1 KeyId Algorithm
6,336,582 UART: [idev] --
6,341,113 UART: [ldev] ++
6,341,676 UART: [ldev] CDI.KEYID = 6
6,342,579 UART: [ldev] SUBJECT.KEYID = 5
6,343,783 UART: [ldev] AUTHORITY.KEYID = 7
6,345,008 UART: [ldev] FE.KEYID = 1
6,356,459 UART: [ldev] Erasing FE.KEYID = 1
8,833,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,411 UART: [ldev] --
10,627,499 UART: [fwproc] Wait for Commands...
10,629,261 UART: [fwproc] Recv command 0x46574c44
10,631,349 UART: [fwproc] Recv'd Img size: 114448 bytes
14,040,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,119,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,188,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,507,884 >>> mbox cmd response: success
14,511,956 UART: [afmc] ++
14,512,547 UART: [afmc] CDI.KEYID = 6
14,513,449 UART: [afmc] SUBJECT.KEYID = 7
14,514,656 UART: [afmc] AUTHORITY.KEYID = 5
17,017,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,736,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,738,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,754,509 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,770,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,786,407 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,808,935 UART: [afmc] --
18,813,276 UART: [cold-reset] --
18,815,939 UART: [state] Locking Datavault
18,823,124 UART: [state] Locking PCR0, PCR1 and PCR31
18,824,766 UART: [state] Locking ICCM
18,826,099 UART: [exit] Launching FMC @ 0x40000130
18,834,548 UART:
18,834,777 UART: Running Caliptra FMC ...
18,835,868 UART:
18,836,019 UART: [state] CFI Enabled
18,844,060 UART: [fht] FMC Alias Private Key: 7
20,600,292 UART: [art] Extend RT PCRs Done
20,601,508 UART: [art] Lock RT PCRs Done
20,603,199 UART: [art] Populate DV Done
20,608,839 UART: [fht] FMC Alias Private Key: 7
20,610,522 UART: [art] Derive CDI
20,611,255 UART: [art] Store in in slot 0x4
20,654,001 UART: [art] Derive Key Pair
20,654,997 UART: [art] Store priv key in slot 0x5
23,081,309 UART: [art] Derive Key Pair - Done
23,094,196 UART: [art] Signing Cert with AUTHO
23,095,524 UART: RITY.KEYID = 7
24,800,722 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,221 UART: [art] PUB.X = 716273A8BC73E9D4434248EC9DE9F440DC7254B8F04117CBABD73AED612003E88F713014B64BD4992892E2ABA6B679B2
24,809,504 UART: [art] PUB.Y = E1D6F052BAA3933F07D84AC7F89D296745A469204E3316631E946257AFB9766DCEEFE9057A6F4EFCEC03F32C54D36B88
24,816,763 UART: [art] SIG.R = 62312A013FDAC91531D4B2EAEC33EBE99DD8BF68857C98E165A0E1713DC0D3601D067218B7CD3F96DF7A4B915E6EAEAA
24,824,203 UART: [art] SIG.S = C4F9BE9B7160E6D43D3CC471EBEE7B3C928FA20850C0498E6E54F34519CDB2982520CB284B8B9E4C29A824AEBE4F4068
25,803,102 UART: Caliptra RT
25,803,801 UART: [state] CFI Enabled
25,922,081 UART: [rt] RT listening for mailbox commands...
29,954,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,110,219 UART: [rt]cmd =0x41544d4e, len=14344
34,040,936 >>> mbox cmd response data (8 bytes)
34,041,705 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,072,446 UART: [rt]cmd =0x41545348, len=116
34,092,247 >>> mbox cmd response data (12 bytes)
36,138,716 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
36,239,189 UART:
36,239,553 UART: Running Caliptra ROM ...
36,240,593 UART:
36,240,734 UART: [state] CFI Enabled
36,254,919 UART: [state] LifecycleState = Unprovisioned
36,256,756 UART: [state] DebugLocked = No
36,258,591 UART: [state] WD Timer not started. Device not locked for debugging
36,263,128 UART: [kat] SHA2-256
36,442,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,453,889 UART: [kat] ++
36,454,425 UART: [kat] sha1
36,464,607 UART: [kat] SHA2-256
36,467,617 UART: [kat] SHA2-384
36,473,164 UART: [kat] SHA2-512-ACC
36,476,094 UART: [kat] ECC-384
38,916,258 UART: [kat] HMAC-384Kdf
38,927,685 UART: [kat] LMS
39,457,151 UART: [kat] --
39,461,944 UART: [update-reset] ++
42,458,596 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,462,526 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
42,720,729 >>> mbox cmd response: success
42,721,089 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,721,372 UART: [update-reset] Copying MAN_2 To MAN_1
42,743,587 UART: [update-reset Success] --
42,749,542 UART: [state] Locking Datavault
42,751,765 UART: [state] Locking PCR0, PCR1 and PCR31
42,753,471 UART: [state] Locking ICCM
42,754,618 UART: [exit] Launching FMC @ 0x40000130
42,763,057 UART:
42,763,287 UART: Running Caliptra FMC ...
42,764,382 UART:
42,764,530 UART: [state] CFI Enabled
42,808,651 UART: [art] Extend RT PCRs Done
42,809,837 UART: [art] Lock RT PCRs Done
42,811,178 UART: [art] Populate DV Done
42,816,816 UART: [fht] FMC Alias Private Key: 7
42,818,354 UART: [art] Derive CDI
42,819,113 UART: [art] Store in in slot 0x4
42,861,914 UART: [art] Derive Key Pair
42,863,073 UART: [art] Store priv key in slot 0x5
45,289,866 UART: [art] Derive Key Pair - Done
45,302,866 UART: [art] Signing Cert with AUTHO
45,304,168 UART: RITY.KEYID = 7
47,009,694 UART: [art] Erasing AUTHORITY.KEYID = 7
47,011,183 UART: [art] PUB.X = 8C125B0B19B78A563CA2E986EA31390E4E1AE4DAE13B4A89446BAA86ED51881848EAE78871B2ED54323994FB48E56392
47,018,479 UART: [art] PUB.Y = 617C7E7B135196670D7C6E13B2ABC7050D6084A34F6D01BF1360DFAA1C95D03195C254205B9D497E3F4CBD3F3BFC760A
47,025,756 UART: [art] SIG.R = A01B148FC5CAA661223FDF3345D60AF5639B2EB98E79CF245D39849CCEFD03228D0C89592741176341521B6AFDEF6D47
47,033,140 UART: [art] SIG.S = 438C220E1DB25539E6C0D8978C8849230AD8ECDE3455116F9DC76EDA4783B0DF634BBDD7DD9C2F288DC28F70AEA76DEF
48,011,887 UART: mbox::rt_entry...
48,012,859 UART: ____ _ _ _ ____ _____
48,014,853 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,016,878 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,018,810 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,020,736 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,022,583 UART: |_|
48,023,457 UART:
48,308,732 UART: [rt] Runtime listening for mailbox commands...
48,310,905 >>> mbox cmd response data (48 bytes)
48,311,461 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,313,775 >>> mbox cmd response data (48 bytes)
48,314,655 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,328,582 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,692,046 ready_for_fw is high
3,692,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,739 >>> mbox cmd response: success
18,527,065 UART:
18,527,453 UART: Running Caliptra FMC ...
18,528,580 UART:
18,528,732 UART: [state] CFI Enabled
18,536,338 UART: [fht] FMC Alias Private Key: 7
20,293,658 UART: [art] Extend RT PCRs Done
20,294,897 UART: [art] Lock RT PCRs Done
20,296,386 UART: [art] Populate DV Done
20,301,686 UART: [fht] FMC Alias Private Key: 7
20,303,435 UART: [art] Derive CDI
20,304,191 UART: [art] Store in in slot 0x4
20,347,057 UART: [art] Derive Key Pair
20,348,101 UART: [art] Store priv key in slot 0x5
22,774,615 UART: [art] Derive Key Pair - Done
22,787,200 UART: [art] Signing Cert with AUTHO
22,788,503 UART: RITY.KEYID = 7
24,494,401 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,911 UART: [art] PUB.X = 7BB78D93DCE25EEF136B03DEBAF4B097C04D3A4990A93104111D981A18777BB1BE7AD0F3FCA39919A2576623A613FFD0
24,503,200 UART: [art] PUB.Y = 75DB9568B67EA4020E8B8DE492249BD4523CC289D84B8F10D1FF32223C39AB96839E4A3B8FFA394D7633C13541C6FEF8
24,510,494 UART: [art] SIG.R = 754864D3ABF7516F956575A57338A27970BF0DE0C994B00BCA09EC8FD06B21403B5FE2A8135D15D9809154E34C03E1DB
24,517,853 UART: [art] SIG.S = AB58CE047CC1CEF57CC5463DEB96A51DC4FF8D28AF4129045C24EAF3665D866A2C78145FD0980BA9886613B1A4DE0E18
25,497,008 UART: Caliptra RT
25,497,730 UART: [state] CFI Enabled
25,614,653 UART: [rt] RT listening for mailbox commands...
29,646,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,802,032 UART: [rt]cmd =0x41544d4e, len=14344
33,732,043 >>> mbox cmd response data (8 bytes)
33,732,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,763,591 UART: [rt]cmd =0x41545348, len=116
33,783,766 >>> mbox cmd response data (12 bytes)
35,828,943 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,270,447 >>> mbox cmd response: success
42,270,928 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,305,075 UART:
42,305,356 UART: Running Caliptra FMC ...
42,306,382 UART:
42,306,525 UART: [state] CFI Enabled
42,350,561 UART: [art] Extend RT PCRs Done
42,351,771 UART: [art] Lock RT PCRs Done
42,353,376 UART: [art] Populate DV Done
42,358,999 UART: [fht] FMC Alias Private Key: 7
42,360,475 UART: [art] Derive CDI
42,361,201 UART: [art] Store in in slot 0x4
42,403,951 UART: [art] Derive Key Pair
42,404,987 UART: [art] Store priv key in slot 0x5
44,831,514 UART: [art] Derive Key Pair - Done
44,844,179 UART: [art] Signing Cert with AUTHO
44,845,477 UART: RITY.KEYID = 7
46,551,278 UART: [art] Erasing AUTHORITY.KEYID = 7
46,552,890 UART: [art] PUB.X = 019179B0FEA5344953B6B475DD097EA293F7F52AA51F6AFEDD76D6583F225FA1B8B1BC3E70E5E8AE5718D246657670EB
46,560,022 UART: [art] PUB.Y = 09EF1218A2F08C51FCCE0E240E8A17D93AF4C7C0162AD2792A525E3FA968EC2EB0BE8447BFB02E150593C8D105AC8B28
46,567,313 UART: [art] SIG.R = 7CA21FF2E5931F584A1710DBEAB94AC5B39E79557F425FE01F42B01300F090BAD15647B7C13A30147FF2C0BA1D1CA4CC
46,574,703 UART: [art] SIG.S = 1282895FFC858B1CC140E753F6E305E7C56E1D86726E45B69467DE720CD2BC4AD0AB834C2B78B15CC105C15E59E5B248
47,553,592 UART: mbox::rt_entry...
47,554,580 UART: ____ _ _ _ ____ _____
47,556,565 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
47,558,563 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
47,560,482 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
47,562,327 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
47,564,281 UART: |_|
47,565,086 UART:
47,850,182 UART: [rt] Runtime listening for mailbox commands...
47,852,349 >>> mbox cmd response data (48 bytes)
47,852,923 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
47,855,242 >>> mbox cmd response data (48 bytes)
47,856,128 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
47,870,053 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,439,890 ready_for_fw is high
3,440,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,743,344 >>> mbox cmd response: success
19,031,349 UART:
19,031,728 UART: Running Caliptra FMC ...
19,032,936 UART:
19,033,105 UART: [state] CFI Enabled
19,099,774 UART: [fht] FMC Alias Private Key: 7
20,863,102 UART: [art] Extend RT PCRs Done
20,864,306 UART: [art] Lock RT PCRs Done
20,866,097 UART: [art] Populate DV Done
20,871,298 UART: [fht] FMC Alias Private Key: 7
20,872,948 UART: [art] Derive CDI
20,873,761 UART: [art] Store in in slot 0x4
20,932,434 UART: [art] Derive Key Pair
20,933,494 UART: [art] Store priv key in slot 0x5
23,396,388 UART: [art] Derive Key Pair - Done
23,409,597 UART: [art] Signing Cert with AUTHO
23,410,897 UART: RITY.KEYID = 7
25,122,940 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,435 UART: [art] PUB.X = 4B762553B1C21E081D4AF5A3C978FFB6E8CDAF0CD1AECCE264CFFD0E172D1973DE0A97D328275CCCAED217CB6F093FC1
25,131,734 UART: [art] PUB.Y = 889BDD2121983F2F5B8997DA7160307F83BAEB332CFB00FCDE2807F9A9FC64C0C41FF562D2B9E8BA4AD2E3327BB77943
25,138,997 UART: [art] SIG.R = 5FC04A95B7712EC5A3E544F9B7870B1C0F251EEB7A271B7F76DD702567018469ABA4ADC1425431F32FA81637E1AC4E9F
25,146,394 UART: [art] SIG.S = EB9B4DABD200991CC8936817437FC5E00E746827A94302D858EF5AB9AE2175D16B2520E51DDA9416B3DCEC79285D988E
26,124,418 UART: Caliptra RT
26,125,109 UART: [state] CFI Enabled
26,290,146 UART: [rt] RT listening for mailbox commands...
30,326,098 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,482,321 UART: [rt]cmd =0x41544d4e, len=14344
34,412,576 >>> mbox cmd response data (8 bytes)
34,413,356 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,444,072 UART: [rt]cmd =0x41545348, len=116
34,463,715 >>> mbox cmd response data (12 bytes)
36,515,104 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
43,531,790 >>> mbox cmd response: success
43,532,307 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,567,003 UART:
43,567,339 UART: Running Caliptra FMC ...
43,568,378 UART:
43,568,527 UART: [state] CFI Enabled
43,668,480 UART: [art] Extend RT PCRs Done
43,669,675 UART: [art] Lock RT PCRs Done
43,670,949 UART: [art] Populate DV Done
43,676,470 UART: [fht] FMC Alias Private Key: 7
43,677,959 UART: [art] Derive CDI
43,678,696 UART: [art] Store in in slot 0x4
43,738,186 UART: [art] Derive Key Pair
43,739,221 UART: [art] Store priv key in slot 0x5
46,202,479 UART: [art] Derive Key Pair - Done
46,215,373 UART: [art] Signing Cert with AUTHO
46,216,686 UART: RITY.KEYID = 7
47,928,174 UART: [art] Erasing AUTHORITY.KEYID = 7
47,929,667 UART: [art] PUB.X = 0D8EB5316365485CA649BBB46F6E559F99C1B3626EC086771B3353A31ECFBBCA7E05C29A3CEBC0A82CF8D201B50173E7
47,936,970 UART: [art] PUB.Y = F89EB0B276331F4A45EC6A88644655EB62FDFACE2C6DB81332D320160D8F5D82A0FA6A4C100252219DCDF1FBD62E0BBA
47,944,253 UART: [art] SIG.R = 1864077762197103EED0825ACAF0AF871158FDE5C3FF79B71C72CA32405EF009385B0DDD1DBE9946D6C2791E648D73D7
47,951,656 UART: [art] SIG.S = 0AB35BC6FEE9FBD04459745AE158D5C86814FE640D25523FE6FF3244AD856E993B4085B832F3A2B5AD02AF1DA0C0C3AF
48,929,871 UART: mbox::rt_entry...
48,930,819 UART: ____ _ _ _ ____ _____
48,932,798 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,934,805 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,936,734 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,938,665 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,940,633 UART: |_|
48,941,446 UART:
49,226,195 UART: [rt] Runtime listening for mailbox commands...
49,228,365 >>> mbox cmd response data (48 bytes)
49,228,924 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,231,273 >>> mbox cmd response data (48 bytes)
49,232,172 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,246,072 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,758,021 ready_for_fw is high
3,758,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,974,551 >>> mbox cmd response: success
19,230,385 UART:
19,230,786 UART: Running Caliptra FMC ...
19,232,000 UART:
19,232,169 UART: [state] CFI Enabled
19,239,738 UART: [fht] FMC Alias Private Key: 7
20,996,693 UART: [art] Extend RT PCRs Done
20,997,925 UART: [art] Lock RT PCRs Done
20,999,828 UART: [art] Populate DV Done
21,005,024 UART: [fht] FMC Alias Private Key: 7
21,006,511 UART: [art] Derive CDI
21,007,267 UART: [art] Store in in slot 0x4
21,049,597 UART: [art] Derive Key Pair
21,050,636 UART: [art] Store priv key in slot 0x5
23,477,410 UART: [art] Derive Key Pair - Done
23,490,411 UART: [art] Signing Cert with AUTHO
23,491,716 UART: RITY.KEYID = 7
25,197,715 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,217 UART: [art] PUB.X = 3A9C9F9920B31505E0D8682B054256EA34BC9C79598EF3BE1178C11C53FD84F8208A0E23456F7402CDC204F14FFFC9BD
25,206,508 UART: [art] PUB.Y = 1DCEE640C89B5BA7A764FDABCF8E6125D10EDA38F209ADA4EF2ECCEDF3A15FE99CE31E5256FA0BB4CA1DE8593BB75C8D
25,213,839 UART: [art] SIG.R = 9E3932CC513251842F1804DDF1BFE76D4ABAF7142431FE2B2FFA7A8A521148AA239C9581D750E5C5FD5ABACBF92362A2
25,221,198 UART: [art] SIG.S = B82F240D44D74112CB4BD3372583EC87AA3582897E3F766737E9F99D1583D8AF8B835A68F54727EF18242E191B3076A7
26,200,441 UART: Caliptra RT
26,201,125 UART: [state] CFI Enabled
26,317,929 UART: [rt] RT listening for mailbox commands...
30,351,654 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,506,894 UART: [rt]cmd =0x41544d4e, len=14344
34,437,518 >>> mbox cmd response data (8 bytes)
34,438,361 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,469,155 UART: [rt]cmd =0x41545348, len=116
34,489,165 >>> mbox cmd response data (12 bytes)
36,538,679 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
43,461,583 >>> mbox cmd response: success
43,462,080 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,496,083 UART:
43,496,374 UART: Running Caliptra FMC ...
43,497,486 UART:
43,497,637 UART: [state] CFI Enabled
43,541,073 UART: [art] Extend RT PCRs Done
43,542,271 UART: [art] Lock RT PCRs Done
43,543,888 UART: [art] Populate DV Done
43,549,184 UART: [fht] FMC Alias Private Key: 7
43,550,877 UART: [art] Derive CDI
43,551,683 UART: [art] Store in in slot 0x4
43,594,381 UART: [art] Derive Key Pair
43,595,411 UART: [art] Store priv key in slot 0x5
46,022,344 UART: [art] Derive Key Pair - Done
46,035,205 UART: [art] Signing Cert with AUTHO
46,036,516 UART: RITY.KEYID = 7
47,741,822 UART: [art] Erasing AUTHORITY.KEYID = 7
47,743,341 UART: [art] PUB.X = F545F55CB46831A3F71495D50A4D9F2F32B97BF0A2FD366DFF796676A19564B1C9CE5A46C7D8933A7471FD175B3F1522
47,750,595 UART: [art] PUB.Y = 3CA764E902A746818ED9AED7B8E61621BA290E9E6E5E88613C2CF422A121B81259799C9C7A7BA5BF6633DF521363968F
47,757,855 UART: [art] SIG.R = 035380BA6A346120E9A26D52EF4AF9AEBCC1E93651908CD0D16AEBC5E77E680298C8CD622947B65E3AB47E1E26E241F7
47,765,253 UART: [art] SIG.S = BEEA684ACD24FFAA6B6FB9CF5A0833A666A72B6B640BED6553FEBB12DF66F95D33A1DF9A78D8E6E814F8D957B9CC1FEE
48,744,134 UART: mbox::rt_entry...
48,745,095 UART: ____ _ _ _ ____ _____
48,747,077 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,749,076 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,751,000 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,752,926 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,754,887 UART: |_|
48,755,694 UART:
49,040,138 UART: [rt] Runtime listening for mailbox commands...
49,042,332 >>> mbox cmd response data (48 bytes)
49,042,908 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,045,230 >>> mbox cmd response data (48 bytes)
49,046,140 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,060,039 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,971 UART: [kat] SHA2-256
881,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,017 UART: [kat] ++
886,169 UART: [kat] sha1
890,227 UART: [kat] SHA2-256
892,165 UART: [kat] SHA2-384
894,916 UART: [kat] SHA2-512-ACC
896,817 UART: [kat] ECC-384
902,408 UART: [kat] HMAC-384Kdf
907,140 UART: [kat] LMS
1,475,336 UART: [kat] --
1,476,177 UART: [cold-reset] ++
1,476,581 UART: [fht] Storing FHT @ 0x50003400
1,479,422 UART: [idev] ++
1,479,590 UART: [idev] CDI.KEYID = 6
1,479,950 UART: [idev] SUBJECT.KEYID = 7
1,480,374 UART: [idev] UDS.KEYID = 0
1,480,719 ready_for_fw is high
1,480,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,598 UART: [idev] Erasing UDS.KEYID = 0
1,505,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,954 UART: [idev] --
1,514,829 UART: [ldev] ++
1,514,997 UART: [ldev] CDI.KEYID = 6
1,515,360 UART: [ldev] SUBJECT.KEYID = 5
1,515,786 UART: [ldev] AUTHORITY.KEYID = 7
1,516,249 UART: [ldev] FE.KEYID = 1
1,521,711 UART: [ldev] Erasing FE.KEYID = 1
1,547,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,466 UART: [ldev] --
1,586,767 UART: [fwproc] Waiting for Commands...
1,587,384 UART: [fwproc] Received command 0x46574c44
1,588,175 UART: [fwproc] Received Image of size 114448 bytes
2,887,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,422 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,774 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,837 >>> mbox cmd response: success
3,081,885 UART: [afmc] ++
3,082,053 UART: [afmc] CDI.KEYID = 6
3,082,415 UART: [afmc] SUBJECT.KEYID = 7
3,082,840 UART: [afmc] AUTHORITY.KEYID = 5
3,117,703 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,003 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,783 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,511 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,396 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,086 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,159 UART: [afmc] --
3,161,225 UART: [cold-reset] --
3,162,103 UART: [state] Locking Datavault
3,163,398 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,002 UART: [state] Locking ICCM
3,164,546 UART: [exit] Launching FMC @ 0x40000130
3,169,875 UART:
3,169,891 UART: Running Caliptra FMC ...
3,170,299 UART:
3,170,353 UART: [state] CFI Enabled
3,181,052 UART: [fht] FMC Alias Private Key: 7
3,288,687 UART: [art] Extend RT PCRs Done
3,289,115 UART: [art] Lock RT PCRs Done
3,290,511 UART: [art] Populate DV Done
3,298,616 UART: [fht] FMC Alias Private Key: 7
3,299,578 UART: [art] Derive CDI
3,299,858 UART: [art] Store in in slot 0x4
3,385,551 UART: [art] Derive Key Pair
3,385,911 UART: [art] Store priv key in slot 0x5
3,398,447 UART: [art] Derive Key Pair - Done
3,413,316 UART: [art] Signing Cert with AUTHO
3,413,796 UART: RITY.KEYID = 7
3,429,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,925 UART: [art] PUB.X = 78E0F53D1098B5D09B2518F7112CB9EDB48C62EE749D638D6A8691203A55C4F7CC2957EAABCE735039C9436BAE0D4E48
3,436,700 UART: [art] PUB.Y = 8D97836A87E79DD1083A3F1CDBAA17A138A66B7CB23061DB99FEB1C3325A1EF260FCB46DA9004A86483BAB4FAAD367E1
3,443,643 UART: [art] SIG.R = 140E2C08C00C0E958984DF038CCFE728B9AE0DBFD420A435795DD036217DAA39D4BB8AC5AD9E36EAE786F8BD444C788A
3,450,413 UART: [art] SIG.S = 0C8CFA9F0C19084C487EF090B2E0E39F339F27D91A37EBCF815F3B8CD66ED686BDFBC81A4C0C5DA94FAA5583E8B8866B
3,473,514 UART: Caliptra RT
3,473,767 UART: [state] CFI Enabled
3,581,395 UART: [rt] RT listening for mailbox commands...
3,582,065 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,849 UART: [rt]cmd =0x41544d4e, len=14344
3,850,086 >>> mbox cmd response data (8 bytes)
3,850,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,254 UART: [rt]cmd =0x41545348, len=116
3,902,092 >>> mbox cmd response data (12 bytes)
3,902,093 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,831 UART:
3,902,847 UART: Running Caliptra ROM ...
3,903,255 UART:
3,903,309 UART: [state] CFI Enabled
3,905,943 UART: [state] LifecycleState = Unprovisioned
3,906,598 UART: [state] DebugLocked = No
3,907,086 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,908,751 UART: [kat] SHA2-256
4,702,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,706,797 UART: [kat] ++
4,706,949 UART: [kat] sha1
4,711,061 UART: [kat] SHA2-256
4,712,999 UART: [kat] SHA2-384
4,715,810 UART: [kat] SHA2-512-ACC
4,717,710 UART: [kat] ECC-384
4,723,505 UART: [kat] HMAC-384Kdf
4,727,993 UART: [kat] LMS
5,296,189 UART: [kat] --
5,297,334 UART: [update-reset] ++
6,224,616 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,225,836 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,322,270 >>> mbox cmd response: success
6,322,270 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,322,581 UART: [update-reset] Copying MAN_2 To MAN_1
6,330,595 UART: [update-reset Success] --
6,331,744 UART: [state] Locking Datavault
6,332,576 UART: [state] Locking PCR0, PCR1 and PCR31
6,333,180 UART: [state] Locking ICCM
6,333,834 UART: [exit] Launching FMC @ 0x40000130
6,339,163 UART:
6,339,179 UART: Running Caliptra FMC ...
6,339,587 UART:
6,339,641 UART: [state] CFI Enabled
6,428,578 UART: [art] Extend RT PCRs Done
6,429,006 UART: [art] Lock RT PCRs Done
6,430,121 UART: [art] Populate DV Done
6,438,462 UART: [fht] FMC Alias Private Key: 7
6,439,424 UART: [art] Derive CDI
6,439,704 UART: [art] Store in in slot 0x4
6,525,285 UART: [art] Derive Key Pair
6,525,645 UART: [art] Store priv key in slot 0x5
6,538,243 UART: [art] Derive Key Pair - Done
6,553,001 UART: [art] Signing Cert with AUTHO
6,553,481 UART: RITY.KEYID = 7
6,568,559 UART: [art] Erasing AUTHORITY.KEYID = 7
6,569,324 UART: [art] PUB.X = 5D7805E071813388C9D08C49A46777843D36C4C95DC720FBD8EE98FB9392285FE1B315EB044F7629448F51392D40841D
6,576,080 UART: [art] PUB.Y = 3B2644F7EB1BF9CDBB9B88294C3890A6914EB5F553CD0BB8BF1F86099A908548ECD955392F92C9E4C30712D1C4FA0C14
6,583,028 UART: [art] SIG.R = 0288131558FA3836CECC62065C4D3EF7B529A6C25C22C9D2F980D585B365BA5371C7C7DFC3C2DA08ADB4915D69F80079
6,589,773 UART: [art] SIG.S = 72F89BEF583D27F54E35CBDC9B7B0AEF4943AE0638DBFB647BAC444A9CAA8D47C4A005B74CA4166AEBB4441C534DA677
6,612,913 UART: mbox::rt_entry...
6,613,285 UART: ____ _ _ _ ____ _____
6,614,069 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,614,869 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,615,637 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,616,405 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,617,173 UART: |_|
6,617,485 UART:
6,901,620 UART: [rt] Runtime listening for mailbox commands...
6,902,810 >>> mbox cmd response data (48 bytes)
6,902,811 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,905,594 >>> mbox cmd response data (48 bytes)
6,905,595 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,920,732 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,779 ready_for_fw is high
1,362,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,451 >>> mbox cmd response: success
2,991,029 UART:
2,991,045 UART: Running Caliptra FMC ...
2,991,453 UART:
2,991,507 UART: [state] CFI Enabled
3,001,716 UART: [fht] FMC Alias Private Key: 7
3,109,841 UART: [art] Extend RT PCRs Done
3,110,269 UART: [art] Lock RT PCRs Done
3,111,853 UART: [art] Populate DV Done
3,120,256 UART: [fht] FMC Alias Private Key: 7
3,121,350 UART: [art] Derive CDI
3,121,630 UART: [art] Store in in slot 0x4
3,207,081 UART: [art] Derive Key Pair
3,207,441 UART: [art] Store priv key in slot 0x5
3,220,567 UART: [art] Derive Key Pair - Done
3,235,395 UART: [art] Signing Cert with AUTHO
3,235,875 UART: RITY.KEYID = 7
3,251,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,888 UART: [art] PUB.X = 9E1467FAA3E6D90E139811C1CC7DD62D87613AF2F2FC0990365E9BE8D5BE123A5EDC297B803593D19BC4E4ED1B7DA09C
3,258,668 UART: [art] PUB.Y = A5D175E15418350DAD510EE3DE3F6489A10039141353C097B72F2321D936CF13BB483E9349EAAA5CBEE592F98CE7AB78
3,265,596 UART: [art] SIG.R = 254E21290FCF8473B9718405F0FDF9E8FA7F94235686E25F7DAE093628E38099865ACFB84337D0499C3DB623AD9FB026
3,272,357 UART: [art] SIG.S = E56B3C034A61CF67D4089B052B763E9C42DA8EC5E68A99EE3EE6D1F0E415DE872CA1A4FC8C5F686A04171ABEAB264C86
3,296,228 UART: Caliptra RT
3,296,481 UART: [state] CFI Enabled
3,405,472 UART: [rt] RT listening for mailbox commands...
3,406,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,230 UART: [rt]cmd =0x41544d4e, len=14344
3,674,043 >>> mbox cmd response data (8 bytes)
3,674,044 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,253 UART: [rt]cmd =0x41545348, len=116
3,726,273 >>> mbox cmd response data (12 bytes)
3,726,274 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,027,153 >>> mbox cmd response: success
6,027,153 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,040,222 UART:
6,040,238 UART: Running Caliptra FMC ...
6,040,646 UART:
6,040,700 UART: [state] CFI Enabled
6,130,325 UART: [art] Extend RT PCRs Done
6,130,753 UART: [art] Lock RT PCRs Done
6,131,866 UART: [art] Populate DV Done
6,140,005 UART: [fht] FMC Alias Private Key: 7
6,141,009 UART: [art] Derive CDI
6,141,289 UART: [art] Store in in slot 0x4
6,226,860 UART: [art] Derive Key Pair
6,227,220 UART: [art] Store priv key in slot 0x5
6,240,386 UART: [art] Derive Key Pair - Done
6,255,418 UART: [art] Signing Cert with AUTHO
6,255,898 UART: RITY.KEYID = 7
6,271,210 UART: [art] Erasing AUTHORITY.KEYID = 7
6,271,975 UART: [art] PUB.X = 981BF5E2B723133F2C913A8EA6C51780D55D49A06DF8D4C32BA6555D23772E606BAD5888B2734FEEB84FE6F7245F5F25
6,278,751 UART: [art] PUB.Y = F17AE8D9B0EB596614C4121F35714E8B735C81B6C83F8DEDFB8EC4F3BDF63F97AFB285F45672487430B4041DF1A153F6
6,285,708 UART: [art] SIG.R = ACE21C083B7F2C301B42D774DD09800B21D7E3F2640ADE8E3AFD3C91F4A3C71DB462A222A7C3EF7533B98BDD00534674
6,292,456 UART: [art] SIG.S = 51B7777EC83D2FBBF192E5B5AF5764105DE7D1C7C37127E6B5C3D0B763459B300A2BE1344E30075ED743B6A7C0F4A1B7
6,316,025 UART: mbox::rt_entry...
6,316,397 UART: ____ _ _ _ ____ _____
6,317,181 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,317,981 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,318,749 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,319,517 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,320,285 UART: |_|
6,320,597 UART:
6,599,419 UART: [rt] Runtime listening for mailbox commands...
6,600,609 >>> mbox cmd response data (48 bytes)
6,600,610 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,603,393 >>> mbox cmd response data (48 bytes)
6,603,394 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,618,531 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,755 UART: [state] LifecycleState = Unprovisioned
85,410 UART: [state] DebugLocked = No
86,016 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,680 UART: [kat] SHA2-256
881,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,726 UART: [kat] ++
885,878 UART: [kat] sha1
890,094 UART: [kat] SHA2-256
892,032 UART: [kat] SHA2-384
894,601 UART: [kat] SHA2-512-ACC
896,502 UART: [kat] ECC-384
902,205 UART: [kat] HMAC-384Kdf
906,931 UART: [kat] LMS
1,475,127 UART: [kat] --
1,476,094 UART: [cold-reset] ++
1,476,476 UART: [fht] Storing FHT @ 0x50003400
1,479,289 UART: [idev] ++
1,479,457 UART: [idev] CDI.KEYID = 6
1,479,817 UART: [idev] SUBJECT.KEYID = 7
1,480,241 UART: [idev] UDS.KEYID = 0
1,480,586 ready_for_fw is high
1,480,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,303 UART: [idev] Erasing UDS.KEYID = 0
1,504,831 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,499 UART: [idev] --
1,514,656 UART: [ldev] ++
1,514,824 UART: [ldev] CDI.KEYID = 6
1,515,187 UART: [ldev] SUBJECT.KEYID = 5
1,515,613 UART: [ldev] AUTHORITY.KEYID = 7
1,516,076 UART: [ldev] FE.KEYID = 1
1,521,522 UART: [ldev] Erasing FE.KEYID = 1
1,547,087 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,063 UART: [ldev] --
1,586,478 UART: [fwproc] Waiting for Commands...
1,587,241 UART: [fwproc] Received command 0x46574c44
1,588,032 UART: [fwproc] Received Image of size 114448 bytes
2,888,027 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,262 >>> mbox cmd response: success
3,081,462 UART: [afmc] ++
3,081,630 UART: [afmc] CDI.KEYID = 6
3,081,992 UART: [afmc] SUBJECT.KEYID = 7
3,082,417 UART: [afmc] AUTHORITY.KEYID = 5
3,117,540 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,212 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,992 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,720 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,605 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,295 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,174 UART: [afmc] --
3,161,304 UART: [cold-reset] --
3,162,064 UART: [state] Locking Datavault
3,163,245 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,849 UART: [state] Locking ICCM
3,164,313 UART: [exit] Launching FMC @ 0x40000130
3,169,642 UART:
3,169,658 UART: Running Caliptra FMC ...
3,170,066 UART:
3,170,209 UART: [state] CFI Enabled
3,180,722 UART: [fht] FMC Alias Private Key: 7
3,288,811 UART: [art] Extend RT PCRs Done
3,289,239 UART: [art] Lock RT PCRs Done
3,290,621 UART: [art] Populate DV Done
3,298,680 UART: [fht] FMC Alias Private Key: 7
3,299,750 UART: [art] Derive CDI
3,300,030 UART: [art] Store in in slot 0x4
3,385,707 UART: [art] Derive Key Pair
3,386,067 UART: [art] Store priv key in slot 0x5
3,398,809 UART: [art] Derive Key Pair - Done
3,413,238 UART: [art] Signing Cert with AUTHO
3,413,718 UART: RITY.KEYID = 7
3,428,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,411 UART: [art] PUB.X = 44A887861FEAD57456F9D7BF9A032625EC2B44655A60A57234A9FB4C370F0877EF9A9296830FC96F143E6A94DE0D9DC4
3,436,170 UART: [art] PUB.Y = B7B9D2D98C5A87944CE58081D1EED9B27DD07DB26783205011331443BA2DBB91719C465864945464229BF1FC80C41B23
3,443,116 UART: [art] SIG.R = 00FE63FDE7E6BAB2C7A1CADE63DC829F10A94B26D12948DADCCD0AE316F23993490F2D3AFA70153D5BA556200750E0E0
3,449,873 UART: [art] SIG.S = 0F9CC5365C781C59BDAF603FBDBBC328F436B5185B2762B9E83674AA20566F45D14777D649182F6E2D29A3D2C775DDB2
3,474,069 UART: Caliptra RT
3,474,414 UART: [state] CFI Enabled
3,582,109 UART: [rt] RT listening for mailbox commands...
3,582,779 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,857 UART: [rt]cmd =0x41544d4e, len=14344
3,851,124 >>> mbox cmd response data (8 bytes)
3,851,125 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,244 UART: [rt]cmd =0x41545348, len=116
3,902,960 >>> mbox cmd response data (12 bytes)
3,902,961 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,903,691 UART:
3,903,707 UART: Running Caliptra ROM ...
3,904,115 UART:
3,904,256 UART: [state] CFI Enabled
3,907,202 UART: [state] LifecycleState = Unprovisioned
3,907,857 UART: [state] DebugLocked = No
3,908,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,909,864 UART: [kat] SHA2-256
4,703,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,707,910 UART: [kat] ++
4,708,062 UART: [kat] sha1
4,712,148 UART: [kat] SHA2-256
4,714,086 UART: [kat] SHA2-384
4,716,755 UART: [kat] SHA2-512-ACC
4,718,655 UART: [kat] ECC-384
4,724,198 UART: [kat] HMAC-384Kdf
4,728,734 UART: [kat] LMS
5,296,930 UART: [kat] --
5,297,781 UART: [update-reset] ++
6,224,905 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,226,019 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,322,453 >>> mbox cmd response: success
6,322,453 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,322,570 UART: [update-reset] Copying MAN_2 To MAN_1
6,330,584 UART: [update-reset Success] --
6,331,479 UART: [state] Locking Datavault
6,332,397 UART: [state] Locking PCR0, PCR1 and PCR31
6,333,001 UART: [state] Locking ICCM
6,333,639 UART: [exit] Launching FMC @ 0x40000130
6,338,968 UART:
6,338,984 UART: Running Caliptra FMC ...
6,339,392 UART:
6,339,535 UART: [state] CFI Enabled
6,428,248 UART: [art] Extend RT PCRs Done
6,428,676 UART: [art] Lock RT PCRs Done
6,430,165 UART: [art] Populate DV Done
6,438,234 UART: [fht] FMC Alias Private Key: 7
6,439,410 UART: [art] Derive CDI
6,439,690 UART: [art] Store in in slot 0x4
6,524,869 UART: [art] Derive Key Pair
6,525,229 UART: [art] Store priv key in slot 0x5
6,538,851 UART: [art] Derive Key Pair - Done
6,553,692 UART: [art] Signing Cert with AUTHO
6,554,172 UART: RITY.KEYID = 7
6,569,122 UART: [art] Erasing AUTHORITY.KEYID = 7
6,569,887 UART: [art] PUB.X = B66094AC9EFBDE3516D96ADE92CB54F51040FD8F576B980D7A8AEEBD37208640C329E749476E82B6CDF5FF38EC0C83D4
6,576,667 UART: [art] PUB.Y = 9B99FA6521A2204CD5AEAE90B6AFE71F0D8B94DB9113D14DC2EC3E60DC66702B678AEE62EB06957A2474AB87E8B1EDA1
6,583,631 UART: [art] SIG.R = 618F3795DD17D571C7D780F60BC8585739F07C313EDC06C1A5641FCD9E882FFA7AF54335544947C4A485C31D48E9A3CB
6,590,399 UART: [art] SIG.S = 7D68BB862C23EA4A48ED0351A922EFA9B9FCAAE0125FA37B3805099CD842271BB71FC1E7032CDBB88DCF12DE10B3605D
6,614,618 UART: mbox::rt_entry...
6,614,990 UART: ____ _ _ _ ____ _____
6,615,774 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,616,574 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,617,342 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,618,110 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,618,878 UART: |_|
6,619,190 UART:
6,905,929 UART: [rt] Runtime listening for mailbox commands...
6,907,119 >>> mbox cmd response data (48 bytes)
6,907,120 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,909,903 >>> mbox cmd response data (48 bytes)
6,909,904 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,925,041 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,042 ready_for_fw is high
1,363,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,314 >>> mbox cmd response: success
2,991,118 UART:
2,991,134 UART: Running Caliptra FMC ...
2,991,542 UART:
2,991,685 UART: [state] CFI Enabled
3,002,254 UART: [fht] FMC Alias Private Key: 7
3,110,183 UART: [art] Extend RT PCRs Done
3,110,611 UART: [art] Lock RT PCRs Done
3,111,713 UART: [art] Populate DV Done
3,119,946 UART: [fht] FMC Alias Private Key: 7
3,120,888 UART: [art] Derive CDI
3,121,168 UART: [art] Store in in slot 0x4
3,206,445 UART: [art] Derive Key Pair
3,206,805 UART: [art] Store priv key in slot 0x5
3,219,413 UART: [art] Derive Key Pair - Done
3,234,132 UART: [art] Signing Cert with AUTHO
3,234,612 UART: RITY.KEYID = 7
3,249,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,955 UART: [art] PUB.X = 1D49A8C94B12B2968F726B3F71D41155B58E600D2836125ACB99E5A25D50AF104DA2BDCCD51C36F24C2A0957E49E9A87
3,256,725 UART: [art] PUB.Y = 3A8ABAEDD1FBE6F449BFE9716C1923DA614F93D7067341DDEB46C96D97CE4A0D9DD071011AEB2D78A4D1028408CFCD3E
3,263,682 UART: [art] SIG.R = B01C0EF89D299BDFC9EA20F3FB2AB6D640AAF7765B19D67936BA2B8BCD1945BB3794AF435EFB0393D0C5619793795B57
3,270,460 UART: [art] SIG.S = 48801FE2279B516DB573F51B59B18F96217CA2EC13F4ADF434D99EDE12292740418582B20296539AC58B52C92F2E635A
3,294,694 UART: Caliptra RT
3,295,039 UART: [state] CFI Enabled
3,402,930 UART: [rt] RT listening for mailbox commands...
3,403,600 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,444 UART: [rt]cmd =0x41544d4e, len=14344
3,670,571 >>> mbox cmd response data (8 bytes)
3,670,572 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,819 UART: [rt]cmd =0x41545348, len=116
3,722,339 >>> mbox cmd response data (12 bytes)
3,722,340 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,023,644 >>> mbox cmd response: success
6,023,644 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,037,289 UART:
6,037,305 UART: Running Caliptra FMC ...
6,037,713 UART:
6,037,856 UART: [state] CFI Enabled
6,127,137 UART: [art] Extend RT PCRs Done
6,127,565 UART: [art] Lock RT PCRs Done
6,128,930 UART: [art] Populate DV Done
6,137,187 UART: [fht] FMC Alias Private Key: 7
6,138,163 UART: [art] Derive CDI
6,138,443 UART: [art] Store in in slot 0x4
6,223,682 UART: [art] Derive Key Pair
6,224,042 UART: [art] Store priv key in slot 0x5
6,237,606 UART: [art] Derive Key Pair - Done
6,252,688 UART: [art] Signing Cert with AUTHO
6,253,168 UART: RITY.KEYID = 7
6,268,136 UART: [art] Erasing AUTHORITY.KEYID = 7
6,268,901 UART: [art] PUB.X = 1F5D1AA6116E7EAD9F619D28245A3B2B2000DCB177F7BF601A47E11760E3A2C389BB5945C8FEE7AF1C3DF866877BF289
6,275,661 UART: [art] PUB.Y = D0670C0A093FB28AB78BE745538412AC64F2CD922D071E43F9EA4F812E576BD241C45DD90BDC179F9AE54979439EF95C
6,282,604 UART: [art] SIG.R = CCE309B5412231F73CACA0DA403F7A4DDB2A147A35EC5AB46FD861FE0A0C309A98D0240BB2475394791B012D4AEBB991
6,289,373 UART: [art] SIG.S = 822977DA7A9630492077DD419CBE52EC04F9A44E073461DCE0958ED0A33CB2B40F25C738AAB9D13C092ADEC8C44FD2E2
6,313,204 UART: mbox::rt_entry...
6,313,576 UART: ____ _ _ _ ____ _____
6,314,360 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,315,160 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,315,928 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,316,696 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,317,464 UART: |_|
6,317,776 UART:
6,596,885 UART: [rt] Runtime listening for mailbox commands...
6,598,075 >>> mbox cmd response data (48 bytes)
6,598,076 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,600,859 >>> mbox cmd response data (48 bytes)
6,600,860 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,615,997 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
893,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,417 UART: [kat] ++
897,569 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
918,092 UART: [kat] HMAC-384Kdf
922,760 UART: [kat] LMS
1,171,088 UART: [kat] --
1,171,955 UART: [cold-reset] ++
1,172,353 UART: [fht] FHT @ 0x50003400
1,175,140 UART: [idev] ++
1,175,308 UART: [idev] CDI.KEYID = 6
1,175,668 UART: [idev] SUBJECT.KEYID = 7
1,176,092 UART: [idev] UDS.KEYID = 0
1,176,437 ready_for_fw is high
1,176,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,884 UART: [idev] Erasing UDS.KEYID = 0
1,201,319 UART: [idev] Sha1 KeyId Algorithm
1,209,799 UART: [idev] --
1,210,627 UART: [ldev] ++
1,210,795 UART: [ldev] CDI.KEYID = 6
1,211,158 UART: [ldev] SUBJECT.KEYID = 5
1,211,584 UART: [ldev] AUTHORITY.KEYID = 7
1,212,047 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,243,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,763 UART: [ldev] --
1,282,052 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,388 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,175 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,479 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,368 >>> mbox cmd response: success
2,775,400 UART: [afmc] ++
2,775,568 UART: [afmc] CDI.KEYID = 6
2,775,930 UART: [afmc] SUBJECT.KEYID = 7
2,776,355 UART: [afmc] AUTHORITY.KEYID = 5
2,811,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,871 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,801 UART: [afmc] --
2,854,705 UART: [cold-reset] --
2,855,627 UART: [state] Locking Datavault
2,856,534 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,138 UART: [state] Locking ICCM
2,857,614 UART: [exit] Launching FMC @ 0x40000130
2,862,943 UART:
2,862,959 UART: Running Caliptra FMC ...
2,863,367 UART:
2,863,421 UART: [state] CFI Enabled
2,874,142 UART: [fht] FMC Alias Private Key: 7
2,981,927 UART: [art] Extend RT PCRs Done
2,982,355 UART: [art] Lock RT PCRs Done
2,983,791 UART: [art] Populate DV Done
2,992,096 UART: [fht] FMC Alias Private Key: 7
2,993,152 UART: [art] Derive CDI
2,993,432 UART: [art] Store in in slot 0x4
3,079,149 UART: [art] Derive Key Pair
3,079,509 UART: [art] Store priv key in slot 0x5
3,092,605 UART: [art] Derive Key Pair - Done
3,107,483 UART: [art] Signing Cert with AUTHO
3,107,963 UART: RITY.KEYID = 7
3,123,023 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,788 UART: [art] PUB.X = 770BB59BBD8C7DB0FF5F13F0F2BA7361B0B89AAB6742FD02C4C7B1A7B3C1FF1BA4EF2F47C362F8EE87F16DCFDAC726ED
3,130,586 UART: [art] PUB.Y = 71AAEA5B87BB97F006BBBC15E5450E461BA8CBA6B779578CEE12B7779C60532C0562A1D7B195BBC1A11E8F713AAFB3BE
3,137,547 UART: [art] SIG.R = C1AA98BBB07045ABEFB9B6CEC7C53D0C00D09E0ACA0157EFEA8CA8F58DEB1310CF06B6BB2BC8C277490DB3354DC9DBB7
3,144,314 UART: [art] SIG.S = 0BCAB3C0636F342DAF7C844E93826D409C365A9C93D12DE69631E82279D2A2E15CE9F25921CE13864ED5EAD5B1BE9979
3,168,242 UART: Caliptra RT
3,168,495 UART: [state] CFI Enabled
3,276,202 UART: [rt] RT listening for mailbox commands...
3,276,872 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,844 UART: [rt]cmd =0x41544d4e, len=14344
3,544,729 >>> mbox cmd response data (8 bytes)
3,544,730 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,965 UART: [rt]cmd =0x41545348, len=116
3,597,175 >>> mbox cmd response data (12 bytes)
3,597,176 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,799 UART:
3,597,815 UART: Running Caliptra ROM ...
3,598,223 UART:
3,598,278 UART: [state] CFI Enabled
3,601,074 UART: [state] LifecycleState = Unprovisioned
3,601,729 UART: [state] DebugLocked = No
3,602,249 UART: [state] WD Timer not started. Device not locked for debugging
3,603,591 UART: [kat] SHA2-256
4,409,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,413,366 UART: [kat] ++
4,413,518 UART: [kat] sha1
4,417,788 UART: [kat] SHA2-256
4,419,728 UART: [kat] SHA2-384
4,422,539 UART: [kat] SHA2-512-ACC
4,424,439 UART: [kat] ECC-384
4,434,156 UART: [kat] HMAC-384Kdf
4,438,862 UART: [kat] LMS
4,687,190 UART: [kat] --
4,687,812 UART: [update-reset] ++
5,592,282 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,593,471 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,689,853 >>> mbox cmd response: success
5,689,853 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,690,122 UART: [update-reset] Copying MAN_2 To MAN_1
5,698,136 UART: [update-reset Success] --
5,699,263 UART: [state] Locking Datavault
5,699,939 UART: [state] Locking PCR0, PCR1 and PCR31
5,700,543 UART: [state] Locking ICCM
5,701,187 UART: [exit] Launching FMC @ 0x40000130
5,706,516 UART:
5,706,532 UART: Running Caliptra FMC ...
5,706,940 UART:
5,706,994 UART: [state] CFI Enabled
5,795,785 UART: [art] Extend RT PCRs Done
5,796,213 UART: [art] Lock RT PCRs Done
5,797,572 UART: [art] Populate DV Done
5,806,011 UART: [fht] FMC Alias Private Key: 7
5,807,161 UART: [art] Derive CDI
5,807,441 UART: [art] Store in in slot 0x4
5,892,946 UART: [art] Derive Key Pair
5,893,306 UART: [art] Store priv key in slot 0x5
5,906,712 UART: [art] Derive Key Pair - Done
5,921,598 UART: [art] Signing Cert with AUTHO
5,922,078 UART: RITY.KEYID = 7
5,937,382 UART: [art] Erasing AUTHORITY.KEYID = 7
5,938,147 UART: [art] PUB.X = 0E46DD9886D631DAD423BC85A263D736BBD8B65EE159AF80D4EC4742CC06D780E8EE44451BCE877AD0D3E6E11519EAFB
5,944,929 UART: [art] PUB.Y = 27D773F071FA9E60EF07865A015259C81C84D282EC929D0D74C6AF2AE7703B3EA83445B99898094E44C2C4A41CCCFFCE
5,951,875 UART: [art] SIG.R = 746F1FBEB50D58BE8608955963E907C0F6017C9697E78DE2124D6B421926B73D8117F5CEC2C47ACA8F04BBC2F46429E4
5,958,634 UART: [art] SIG.S = 7151522497C56F019122E98D8D9F33BA34C99AF7C92B242C139F06D35F1D3703147B88B472650FF21A36350D0CB49B71
5,982,323 UART: mbox::rt_entry...
5,982,695 UART: ____ _ _ _ ____ _____
5,983,479 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,984,279 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,985,047 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,985,815 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,986,583 UART: |_|
5,986,895 UART:
6,267,495 UART: [rt] Runtime listening for mailbox commands...
6,268,685 >>> mbox cmd response data (48 bytes)
6,268,686 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,271,469 >>> mbox cmd response data (48 bytes)
6,271,470 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,286,607 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,653 ready_for_fw is high
1,060,653 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,735 >>> mbox cmd response: success
2,690,805 UART:
2,690,821 UART: Running Caliptra FMC ...
2,691,229 UART:
2,691,283 UART: [state] CFI Enabled
2,701,958 UART: [fht] FMC Alias Private Key: 7
2,809,141 UART: [art] Extend RT PCRs Done
2,809,569 UART: [art] Lock RT PCRs Done
2,811,037 UART: [art] Populate DV Done
2,819,058 UART: [fht] FMC Alias Private Key: 7
2,819,998 UART: [art] Derive CDI
2,820,278 UART: [art] Store in in slot 0x4
2,905,989 UART: [art] Derive Key Pair
2,906,349 UART: [art] Store priv key in slot 0x5
2,919,931 UART: [art] Derive Key Pair - Done
2,934,909 UART: [art] Signing Cert with AUTHO
2,935,389 UART: RITY.KEYID = 7
2,950,729 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,494 UART: [art] PUB.X = B2C271B6B98BAB3C4EA7D82A4D5EEE12A7F1D15FA889B4CC27B569759195374F1A96CF854433A6A7EE3B5E8C7D16C9ED
2,958,282 UART: [art] PUB.Y = 8DF0DEE3A11AB135C3FBFDAEB26CBAFDA72202383081F072627CF20EFE6E27B8A46B46B405C5594DA7C820B3015DAA78
2,965,240 UART: [art] SIG.R = BF1B2C683B4468EECA8B6C861112EF88FCB85F0027B0A1CA55664A9BBD40279ADB81848961EE976231A62139006E99D5
2,971,970 UART: [art] SIG.S = D230B40C6B5DF63744B45E1729E578726DCD4DCFB7962068CC74902E9036E668EE3D17D57B34F67AD6A5F007C5F8F187
2,995,821 UART: Caliptra RT
2,996,074 UART: [state] CFI Enabled
3,103,796 UART: [rt] RT listening for mailbox commands...
3,104,466 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,572 UART: [rt]cmd =0x41544d4e, len=14344
3,371,671 >>> mbox cmd response data (8 bytes)
3,371,672 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,803 UART: [rt]cmd =0x41545348, len=116
3,424,445 >>> mbox cmd response data (12 bytes)
3,424,446 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,402,762 >>> mbox cmd response: success
5,402,762 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,416,454 UART:
5,416,470 UART: Running Caliptra FMC ...
5,416,878 UART:
5,416,932 UART: [state] CFI Enabled
5,506,367 UART: [art] Extend RT PCRs Done
5,506,795 UART: [art] Lock RT PCRs Done
5,508,010 UART: [art] Populate DV Done
5,516,291 UART: [fht] FMC Alias Private Key: 7
5,517,391 UART: [art] Derive CDI
5,517,671 UART: [art] Store in in slot 0x4
5,603,278 UART: [art] Derive Key Pair
5,603,638 UART: [art] Store priv key in slot 0x5
5,617,122 UART: [art] Derive Key Pair - Done
5,632,021 UART: [art] Signing Cert with AUTHO
5,632,501 UART: RITY.KEYID = 7
5,647,775 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,540 UART: [art] PUB.X = 5A0B60200594C6DDC39E421BEFB960E9BD9AA3D3B3CEB5D51AB3AD406EAD37F3C2A3E545A34E32F0D05F895C9EEE6547
5,655,326 UART: [art] PUB.Y = 90713B1478D3A3B154E9BA186D77EC1FC564DD8F5CDF87CE9DD9ADD9BCF665C9F176CF28F61DBA36C5390E989B84A2FE
5,662,295 UART: [art] SIG.R = A74B148E2F8ABF7DD9F753BB4BE8D36A00E9163CB445CED7370FD0C6FF4DFAEF120714FCD9C9C333630EF8942CDC5935
5,669,056 UART: [art] SIG.S = 52644E11621B8BBCDF174A19FC77CAB15C8C6E11BC32A3F91A69E6E98D309B09523FD7E25B86E93B920E92F3602E9057
5,692,887 UART: mbox::rt_entry...
5,693,259 UART: ____ _ _ _ ____ _____
5,694,043 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,694,843 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,695,611 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,696,379 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,147 UART: |_|
5,697,459 UART:
5,976,641 UART: [rt] Runtime listening for mailbox commands...
5,977,831 >>> mbox cmd response data (48 bytes)
5,977,832 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,980,615 >>> mbox cmd response data (48 bytes)
5,980,616 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,995,753 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
893,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,662 UART: [kat] ++
897,814 UART: [kat] sha1
902,206 UART: [kat] SHA2-256
904,146 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,791 UART: [kat] HMAC-384Kdf
923,561 UART: [kat] LMS
1,171,889 UART: [kat] --
1,172,958 UART: [cold-reset] ++
1,173,336 UART: [fht] FHT @ 0x50003400
1,175,941 UART: [idev] ++
1,176,109 UART: [idev] CDI.KEYID = 6
1,176,469 UART: [idev] SUBJECT.KEYID = 7
1,176,893 UART: [idev] UDS.KEYID = 0
1,177,238 ready_for_fw is high
1,177,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,865 UART: [idev] Erasing UDS.KEYID = 0
1,201,852 UART: [idev] Sha1 KeyId Algorithm
1,210,254 UART: [idev] --
1,211,334 UART: [ldev] ++
1,211,502 UART: [ldev] CDI.KEYID = 6
1,211,865 UART: [ldev] SUBJECT.KEYID = 5
1,212,291 UART: [ldev] AUTHORITY.KEYID = 7
1,212,754 UART: [ldev] FE.KEYID = 1
1,218,258 UART: [ldev] Erasing FE.KEYID = 1
1,244,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,198 UART: [ldev] --
1,283,501 UART: [fwproc] Wait for Commands...
1,284,277 UART: [fwproc] Recv command 0x46574c44
1,285,005 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,639 >>> mbox cmd response: success
2,776,757 UART: [afmc] ++
2,776,925 UART: [afmc] CDI.KEYID = 6
2,777,287 UART: [afmc] SUBJECT.KEYID = 7
2,777,712 UART: [afmc] AUTHORITY.KEYID = 5
2,813,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,124 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,852 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,737 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,456 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,232 UART: [afmc] --
2,856,322 UART: [cold-reset] --
2,857,078 UART: [state] Locking Datavault
2,858,217 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,821 UART: [state] Locking ICCM
2,859,421 UART: [exit] Launching FMC @ 0x40000130
2,864,750 UART:
2,864,766 UART: Running Caliptra FMC ...
2,865,174 UART:
2,865,317 UART: [state] CFI Enabled
2,875,916 UART: [fht] FMC Alias Private Key: 7
2,983,537 UART: [art] Extend RT PCRs Done
2,983,965 UART: [art] Lock RT PCRs Done
2,985,869 UART: [art] Populate DV Done
2,994,032 UART: [fht] FMC Alias Private Key: 7
2,995,016 UART: [art] Derive CDI
2,995,296 UART: [art] Store in in slot 0x4
3,081,083 UART: [art] Derive Key Pair
3,081,443 UART: [art] Store priv key in slot 0x5
3,095,393 UART: [art] Derive Key Pair - Done
3,110,061 UART: [art] Signing Cert with AUTHO
3,110,541 UART: RITY.KEYID = 7
3,125,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,294 UART: [art] PUB.X = 6424D3A984F27F32C5A94D8427385FA2DA4D53923C844D339EF2B2DF822F8DCBE5DE160D7458558FA21878A6045A035A
3,133,057 UART: [art] PUB.Y = D91A689697886E402389725978D9FC5AB5845ED28C3854AC9765DD95E58D3350178B3012CCC64D82142F31E09AF08EED
3,140,003 UART: [art] SIG.R = FF675C4C9BD843FCF55BA4444E19BB43B4D175A7EC76F33E13D881192C350DCFD5857C81FCD06F09072328218C92D41D
3,146,772 UART: [art] SIG.S = 4D173DF50CD12EBAAF3629728177049CAE7A6B4FF26529A91F2EEDA614745BC918DCC6FF05E8CE9FE588FB059308C295
3,170,786 UART: Caliptra RT
3,171,131 UART: [state] CFI Enabled
3,278,652 UART: [rt] RT listening for mailbox commands...
3,279,322 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,394 UART: [rt]cmd =0x41544d4e, len=14344
3,547,437 >>> mbox cmd response data (8 bytes)
3,547,438 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,611 UART: [rt]cmd =0x41545348, len=116
3,598,965 >>> mbox cmd response data (12 bytes)
3,598,966 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,599,621 UART:
3,599,637 UART: Running Caliptra ROM ...
3,600,045 UART:
3,600,187 UART: [state] CFI Enabled
3,603,067 UART: [state] LifecycleState = Unprovisioned
3,603,722 UART: [state] DebugLocked = No
3,604,220 UART: [state] WD Timer not started. Device not locked for debugging
3,605,494 UART: [kat] SHA2-256
4,411,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,415,269 UART: [kat] ++
4,415,421 UART: [kat] sha1
4,419,679 UART: [kat] SHA2-256
4,421,619 UART: [kat] SHA2-384
4,424,224 UART: [kat] SHA2-512-ACC
4,426,124 UART: [kat] ECC-384
4,436,045 UART: [kat] HMAC-384Kdf
4,440,669 UART: [kat] LMS
4,688,997 UART: [kat] --
4,689,755 UART: [update-reset] ++
5,593,269 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,594,336 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,690,718 >>> mbox cmd response: success
5,690,718 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,691,061 UART: [update-reset] Copying MAN_2 To MAN_1
5,699,075 UART: [update-reset Success] --
5,700,276 UART: [state] Locking Datavault
5,701,046 UART: [state] Locking PCR0, PCR1 and PCR31
5,701,650 UART: [state] Locking ICCM
5,702,272 UART: [exit] Launching FMC @ 0x40000130
5,707,601 UART:
5,707,617 UART: Running Caliptra FMC ...
5,708,025 UART:
5,708,168 UART: [state] CFI Enabled
5,797,521 UART: [art] Extend RT PCRs Done
5,797,949 UART: [art] Lock RT PCRs Done
5,799,024 UART: [art] Populate DV Done
5,807,073 UART: [fht] FMC Alias Private Key: 7
5,808,015 UART: [art] Derive CDI
5,808,295 UART: [art] Store in in slot 0x4
5,894,210 UART: [art] Derive Key Pair
5,894,570 UART: [art] Store priv key in slot 0x5
5,907,692 UART: [art] Derive Key Pair - Done
5,922,044 UART: [art] Signing Cert with AUTHO
5,922,524 UART: RITY.KEYID = 7
5,937,630 UART: [art] Erasing AUTHORITY.KEYID = 7
5,938,395 UART: [art] PUB.X = F3E30D05E0D406D289315826AC47890112FE980DB83D998BC819EBDFDF9BF5351637B41C1C69CA363DAE141776D38769
5,945,152 UART: [art] PUB.Y = 077B777E6FF31210DE8A719A9B274C75F8A2DD4B546CBB7E8B91162BC2D4C8C01A939BC4743E19E742551DB1F7FBBABA
5,952,115 UART: [art] SIG.R = B1B8C56DEDBAA634D611DED8ED430C43A7EEE6B53D634E83E36270BC574A8D8D2878BA231487EC6382A79D26B124B4E9
5,958,896 UART: [art] SIG.S = 10BCB0CCB964C15CA5ECDE23E493D26E7C60666BE444E2A5B11EBA16A4C9CCA405B4364529AD1638A49BD5926A1799C6
5,982,322 UART: mbox::rt_entry...
5,982,694 UART: ____ _ _ _ ____ _____
5,983,478 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,984,278 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,985,046 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,985,814 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,986,582 UART: |_|
5,986,894 UART:
6,265,122 UART: [rt] Runtime listening for mailbox commands...
6,266,312 >>> mbox cmd response data (48 bytes)
6,266,313 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,269,096 >>> mbox cmd response data (48 bytes)
6,269,097 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,284,234 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,370 ready_for_fw is high
1,061,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,020 >>> mbox cmd response: success
2,690,126 UART:
2,690,142 UART: Running Caliptra FMC ...
2,690,550 UART:
2,690,693 UART: [state] CFI Enabled
2,700,898 UART: [fht] FMC Alias Private Key: 7
2,808,733 UART: [art] Extend RT PCRs Done
2,809,161 UART: [art] Lock RT PCRs Done
2,810,435 UART: [art] Populate DV Done
2,818,778 UART: [fht] FMC Alias Private Key: 7
2,819,762 UART: [art] Derive CDI
2,820,042 UART: [art] Store in in slot 0x4
2,906,189 UART: [art] Derive Key Pair
2,906,549 UART: [art] Store priv key in slot 0x5
2,920,003 UART: [art] Derive Key Pair - Done
2,934,808 UART: [art] Signing Cert with AUTHO
2,935,288 UART: RITY.KEYID = 7
2,950,338 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,103 UART: [art] PUB.X = 9C8F8BD1FAF1339AC954ABF274619D4DDE306A5548B5351AD7C41266F941BFDD87DC15F72F84B05D87EFAE2BC9EDB252
2,957,893 UART: [art] PUB.Y = 547D683E229B9C889D7C0064612F1041F9A005F6FDABD877ADA40C15F5A932E1A99B4208E97F73992CF8A59E6E3131ED
2,964,816 UART: [art] SIG.R = AEE207A1E24E23B5E1C2046F42BF921D29FA1CB3AEF554E566086C432EF2F2DCFCB2B4D158EB7BC0FBAFDA28A083D252
2,971,603 UART: [art] SIG.S = CDF1B3227694F52BB3543942A115BD17B4AB42EAE4A93303D3A882B067794E40F4C7DFA890B8D9EB39E7F7226E781B79
2,996,205 UART: Caliptra RT
2,996,550 UART: [state] CFI Enabled
3,104,450 UART: [rt] RT listening for mailbox commands...
3,105,120 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,914 UART: [rt]cmd =0x41544d4e, len=14344
3,373,479 >>> mbox cmd response data (8 bytes)
3,373,480 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,497 UART: [rt]cmd =0x41545348, len=116
3,425,209 >>> mbox cmd response data (12 bytes)
3,425,210 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,402,481 >>> mbox cmd response: success
5,402,481 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,416,017 UART:
5,416,033 UART: Running Caliptra FMC ...
5,416,441 UART:
5,416,584 UART: [state] CFI Enabled
5,505,777 UART: [art] Extend RT PCRs Done
5,506,205 UART: [art] Lock RT PCRs Done
5,507,404 UART: [art] Populate DV Done
5,515,761 UART: [fht] FMC Alias Private Key: 7
5,516,923 UART: [art] Derive CDI
5,517,203 UART: [art] Store in in slot 0x4
5,602,836 UART: [art] Derive Key Pair
5,603,196 UART: [art] Store priv key in slot 0x5
5,616,440 UART: [art] Derive Key Pair - Done
5,631,208 UART: [art] Signing Cert with AUTHO
5,631,688 UART: RITY.KEYID = 7
5,646,806 UART: [art] Erasing AUTHORITY.KEYID = 7
5,647,571 UART: [art] PUB.X = 79414AD7C8AF7BFD820A4B95FB1629DED42210BD6BE8FC7FD4217A1D45ABFBE4450C411F932EC85A2C76AA6158CF4BD5
5,654,357 UART: [art] PUB.Y = BB7E5B4EEB30D38C301EA31C5ABACE77B1D79C863DFCE08D375FC2B1DC0C8E747D1AFE9E6D7967034016BBA38E9AB8E6
5,661,329 UART: [art] SIG.R = 9A46AB9AFD94BFA99EAC593E2D98BF191EA6323B550FF7740E1D41FE13F53ED16EB8548CEE627C7B514231299BC7BE29
5,668,109 UART: [art] SIG.S = 77EBE33EE5FBE15137B112215614F0A9761B883571F6115C95124514007D18023CE7D875712F4061214F83AF786D6B03
5,691,462 UART: mbox::rt_entry...
5,691,834 UART: ____ _ _ _ ____ _____
5,692,618 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,418 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,694,186 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,954 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,722 UART: |_|
5,696,034 UART:
5,975,396 UART: [rt] Runtime listening for mailbox commands...
5,976,586 >>> mbox cmd response data (48 bytes)
5,976,587 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,979,370 >>> mbox cmd response data (48 bytes)
5,979,371 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,994,508 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,048 UART: [kat] SHA2-512-ACC
905,949 UART: [kat] ECC-384
915,296 UART: [kat] HMAC-384Kdf
919,952 UART: [kat] LMS
1,168,264 UART: [kat] --
1,169,153 UART: [cold-reset] ++
1,169,513 UART: [fht] FHT @ 0x50003400
1,172,149 UART: [idev] ++
1,172,317 UART: [idev] CDI.KEYID = 6
1,172,678 UART: [idev] SUBJECT.KEYID = 7
1,173,103 UART: [idev] UDS.KEYID = 0
1,173,449 ready_for_fw is high
1,173,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,051 UART: [idev] Erasing UDS.KEYID = 0
1,198,067 UART: [idev] Sha1 KeyId Algorithm
1,207,007 UART: [idev] --
1,207,892 UART: [ldev] ++
1,208,060 UART: [ldev] CDI.KEYID = 6
1,208,424 UART: [ldev] SUBJECT.KEYID = 5
1,208,851 UART: [ldev] AUTHORITY.KEYID = 7
1,209,314 UART: [ldev] FE.KEYID = 1
1,214,476 UART: [ldev] Erasing FE.KEYID = 1
1,240,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,366 UART: [ldev] --
1,279,798 UART: [fwproc] Wait for Commands...
1,280,373 UART: [fwproc] Recv command 0x46574c44
1,281,106 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,634 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,638 >>> mbox cmd response: success
2,773,735 UART: [afmc] ++
2,773,903 UART: [afmc] CDI.KEYID = 6
2,774,266 UART: [afmc] SUBJECT.KEYID = 7
2,774,692 UART: [afmc] AUTHORITY.KEYID = 5
2,810,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,518 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,247 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,130 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,849 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,864 UART: [afmc] --
2,853,838 UART: [cold-reset] --
2,854,734 UART: [state] Locking Datavault
2,855,739 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,343 UART: [state] Locking ICCM
2,856,845 UART: [exit] Launching FMC @ 0x40000130
2,862,174 UART:
2,862,190 UART: Running Caliptra FMC ...
2,862,598 UART:
2,862,652 UART: [state] CFI Enabled
2,872,993 UART: [fht] FMC Alias Private Key: 7
2,981,250 UART: [art] Extend RT PCRs Done
2,981,678 UART: [art] Lock RT PCRs Done
2,983,152 UART: [art] Populate DV Done
2,991,497 UART: [fht] FMC Alias Private Key: 7
2,992,497 UART: [art] Derive CDI
2,992,777 UART: [art] Store in in slot 0x4
3,078,362 UART: [art] Derive Key Pair
3,078,722 UART: [art] Store priv key in slot 0x5
3,091,826 UART: [art] Derive Key Pair - Done
3,106,305 UART: [art] Signing Cert with AUTHO
3,106,785 UART: RITY.KEYID = 7
3,122,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,888 UART: [art] PUB.X = BF0F1E71A9978C20469871EF4EEE898551F10E594E402A35E6D2A6F3392C890D6B6DBB946E39E0342EB6E9BAC117CA82
3,129,657 UART: [art] PUB.Y = 00315B5D287CE5AA30FCF2552869E3D303A900E4C0CD9A614DC903AAC72D0576D74CE773E37FBB56AF2561F0738BD9D4
3,136,564 UART: [art] SIG.R = 252DC850D084628FD2A16CC8E472772A41D80784CE54A49A67087E18B35D0E05A508F09AE09C338C35BC135B86F92012
3,143,315 UART: [art] SIG.S = BC205B8B498106A32229FFF212693A220BFCF8B450C4B54FD9D93AA3EAD6D9810D3224CB5A79692E97C5CD9748B79374
3,167,251 UART: Caliptra RT
3,167,504 UART: [state] CFI Enabled
3,275,217 UART: [rt] RT listening for mailbox commands...
3,275,887 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,769 UART: [rt]cmd =0x41544d4e, len=14344
3,543,620 >>> mbox cmd response data (8 bytes)
3,543,621 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,818 UART: [rt]cmd =0x41545348, len=116
3,594,994 >>> mbox cmd response data (12 bytes)
3,594,995 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,840 UART:
3,595,856 UART: Running Caliptra ROM ...
3,596,264 UART:
3,596,319 UART: [state] CFI Enabled
3,599,007 UART: [state] LifecycleState = Unprovisioned
3,599,662 UART: [state] DebugLocked = No
3,600,270 UART: [state] WD Timer not started. Device not locked for debugging
3,601,560 UART: [kat] SHA2-256
4,405,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,409,239 UART: [kat] ++
4,409,391 UART: [kat] sha1
4,413,617 UART: [kat] SHA2-256
4,415,557 UART: [kat] SHA2-384
4,418,076 UART: [kat] SHA2-512-ACC
4,419,976 UART: [kat] ECC-384
4,429,403 UART: [kat] HMAC-384Kdf
4,434,039 UART: [kat] LMS
4,682,351 UART: [kat] --
4,683,327 UART: [update-reset] ++
5,588,132 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,589,273 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,685,655 >>> mbox cmd response: success
5,685,655 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,685,828 UART: [update-reset] Copying MAN_2 To MAN_1
5,693,842 UART: [update-reset Success] --
5,694,819 UART: [state] Locking Datavault
5,695,627 UART: [state] Locking PCR0, PCR1 and PCR31
5,696,231 UART: [state] Locking ICCM
5,696,757 UART: [exit] Launching FMC @ 0x40000130
5,702,086 UART:
5,702,102 UART: Running Caliptra FMC ...
5,702,510 UART:
5,702,564 UART: [state] CFI Enabled
5,791,571 UART: [art] Extend RT PCRs Done
5,791,999 UART: [art] Lock RT PCRs Done
5,793,336 UART: [art] Populate DV Done
5,801,665 UART: [fht] FMC Alias Private Key: 7
5,802,841 UART: [art] Derive CDI
5,803,121 UART: [art] Store in in slot 0x4
5,889,138 UART: [art] Derive Key Pair
5,889,498 UART: [art] Store priv key in slot 0x5
5,903,126 UART: [art] Derive Key Pair - Done
5,918,033 UART: [art] Signing Cert with AUTHO
5,918,513 UART: RITY.KEYID = 7
5,933,449 UART: [art] Erasing AUTHORITY.KEYID = 7
5,934,214 UART: [art] PUB.X = 23708EC8071C1B8EF58DCE43CBA46B6C9433F020217E50457500C1FEB54E4C7B7E674A32E0F0CF176A75543729C2AB92
5,940,963 UART: [art] PUB.Y = 2D744C99CE77386D5A2799A4A30FE9A8FE6B3AF0F9DD397CE4B43530CAC3BCBDCC4A1AE485B45EABA9DDD52B413197B0
5,947,936 UART: [art] SIG.R = EA9ADFC5DF5C53F762C09B489A90FA48E4229BB345D8ABBF7C61D0E5CFE5CFF199DA0C7BA5BC932BB7CA7BC5EC89C449
5,954,737 UART: [art] SIG.S = F8DB0C9A07DC61549A901FDEDE671BBCB08816AE861C7866AE8ADED1B404C223B41BBDD60A8A24DEFF494541D95717B6
5,978,592 UART: mbox::rt_entry...
5,978,964 UART: ____ _ _ _ ____ _____
5,979,748 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,980,548 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,981,316 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,982,084 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,982,852 UART: |_|
5,983,164 UART:
6,264,521 UART: [rt] Runtime listening for mailbox commands...
6,265,711 >>> mbox cmd response data (48 bytes)
6,265,712 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,268,495 >>> mbox cmd response data (48 bytes)
6,268,496 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,283,633 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,656 ready_for_fw is high
1,055,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,432 >>> mbox cmd response: success
2,685,740 UART:
2,685,756 UART: Running Caliptra FMC ...
2,686,164 UART:
2,686,218 UART: [state] CFI Enabled
2,696,687 UART: [fht] FMC Alias Private Key: 7
2,805,142 UART: [art] Extend RT PCRs Done
2,805,570 UART: [art] Lock RT PCRs Done
2,807,072 UART: [art] Populate DV Done
2,815,579 UART: [fht] FMC Alias Private Key: 7
2,816,753 UART: [art] Derive CDI
2,817,033 UART: [art] Store in in slot 0x4
2,902,608 UART: [art] Derive Key Pair
2,902,968 UART: [art] Store priv key in slot 0x5
2,915,898 UART: [art] Derive Key Pair - Done
2,930,703 UART: [art] Signing Cert with AUTHO
2,931,183 UART: RITY.KEYID = 7
2,946,679 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,444 UART: [art] PUB.X = 05DE66CF34F6E8A8E795E03E03DB828475B1E99E24C90711678E89F5EAD36E5285CC0BB6B301E89A1DE9CAF850487604
2,954,202 UART: [art] PUB.Y = 2E0644B639BD22F9419364FE0330150A92144B30EF6FDFDBFCD913CBD3D9FEE86BBB80CAE0760F63120947396B8F4426
2,961,145 UART: [art] SIG.R = ADADA3D127127F4FF91B4F840AC569DA4C07D17DF5D32D78D2FD1AD1A3B4D7E85D29C19F560812BC66DD50E051ACC996
2,967,926 UART: [art] SIG.S = 3B137AAC0F111010F155C6611552F1C533A4CDBEB87C8D76CA0126C5DB3C406F3F2C4E12E048EFC1631775F47AA84F57
2,991,555 UART: Caliptra RT
2,991,808 UART: [state] CFI Enabled
3,099,875 UART: [rt] RT listening for mailbox commands...
3,100,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,865 UART: [rt]cmd =0x41544d4e, len=14344
3,368,528 >>> mbox cmd response data (8 bytes)
3,368,529 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,670 UART: [rt]cmd =0x41545348, len=116
3,420,790 >>> mbox cmd response data (12 bytes)
3,420,791 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,393,452 >>> mbox cmd response: success
5,393,452 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,407,034 UART:
5,407,050 UART: Running Caliptra FMC ...
5,407,458 UART:
5,407,512 UART: [state] CFI Enabled
5,496,525 UART: [art] Extend RT PCRs Done
5,496,953 UART: [art] Lock RT PCRs Done
5,498,074 UART: [art] Populate DV Done
5,506,317 UART: [fht] FMC Alias Private Key: 7
5,507,327 UART: [art] Derive CDI
5,507,607 UART: [art] Store in in slot 0x4
5,593,718 UART: [art] Derive Key Pair
5,594,078 UART: [art] Store priv key in slot 0x5
5,606,440 UART: [art] Derive Key Pair - Done
5,620,912 UART: [art] Signing Cert with AUTHO
5,621,392 UART: RITY.KEYID = 7
5,636,398 UART: [art] Erasing AUTHORITY.KEYID = 7
5,637,163 UART: [art] PUB.X = D67DE53ECFBF44B4F81CD6F1A00D98D57B2C4FD392922E9C4A9F9E4D956CEE6497C6BF52F58D3F57081E7E6AB84C85A2
5,643,947 UART: [art] PUB.Y = DB5302B112CA0925CFEA5756CBF4F31BFEF38B96CF72464556CDC79F99CA727742B66C042823F1DD2D2F1441690B39E2
5,650,893 UART: [art] SIG.R = BAF3F03DA180A4C07FEE9A62C76E233FBBC100FD8233C20498F1D8074AACF1CC8512226FC4864CCC36637E5A981E89E1
5,657,649 UART: [art] SIG.S = B7E53E5603641D73F79FEEA11D78D123BB589334271B863474F4BD562F86630A0DE26E9DBCD35F6294802083D62C925B
5,681,625 UART: mbox::rt_entry...
5,681,997 UART: ____ _ _ _ ____ _____
5,682,781 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,683,581 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,684,349 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,685,117 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,685,885 UART: |_|
5,686,197 UART:
5,967,468 UART: [rt] Runtime listening for mailbox commands...
5,968,658 >>> mbox cmd response data (48 bytes)
5,968,659 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,971,442 >>> mbox cmd response data (48 bytes)
5,971,443 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,986,580 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,503 UART: [kat] SHA2-256
891,053 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,182 UART: [kat] ++
895,334 UART: [kat] sha1
899,568 UART: [kat] SHA2-256
901,508 UART: [kat] SHA2-384
904,139 UART: [kat] SHA2-512-ACC
906,040 UART: [kat] ECC-384
916,197 UART: [kat] HMAC-384Kdf
921,067 UART: [kat] LMS
1,169,379 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,842 UART: [fht] FHT @ 0x50003400
1,173,504 UART: [idev] ++
1,173,672 UART: [idev] CDI.KEYID = 6
1,174,033 UART: [idev] SUBJECT.KEYID = 7
1,174,458 UART: [idev] UDS.KEYID = 0
1,174,804 ready_for_fw is high
1,174,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,924 UART: [idev] Sha1 KeyId Algorithm
1,208,846 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,242,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,281,937 UART: [fwproc] Wait for Commands...
1,282,760 UART: [fwproc] Recv command 0x46574c44
1,283,493 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,247 >>> mbox cmd response: success
2,776,268 UART: [afmc] ++
2,776,436 UART: [afmc] CDI.KEYID = 6
2,776,799 UART: [afmc] SUBJECT.KEYID = 7
2,777,225 UART: [afmc] AUTHORITY.KEYID = 5
2,812,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,637 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,356 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,399 UART: [afmc] --
2,856,409 UART: [cold-reset] --
2,857,177 UART: [state] Locking Datavault
2,858,196 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,800 UART: [state] Locking ICCM
2,859,330 UART: [exit] Launching FMC @ 0x40000130
2,864,659 UART:
2,864,675 UART: Running Caliptra FMC ...
2,865,083 UART:
2,865,226 UART: [state] CFI Enabled
2,875,575 UART: [fht] FMC Alias Private Key: 7
2,983,932 UART: [art] Extend RT PCRs Done
2,984,360 UART: [art] Lock RT PCRs Done
2,985,694 UART: [art] Populate DV Done
2,994,091 UART: [fht] FMC Alias Private Key: 7
2,995,087 UART: [art] Derive CDI
2,995,367 UART: [art] Store in in slot 0x4
3,081,224 UART: [art] Derive Key Pair
3,081,584 UART: [art] Store priv key in slot 0x5
3,094,598 UART: [art] Derive Key Pair - Done
3,109,322 UART: [art] Signing Cert with AUTHO
3,109,802 UART: RITY.KEYID = 7
3,125,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,799 UART: [art] PUB.X = 4FE79CD0CD0AC2579551F2945C22FDC8CC5C68E7AE1AC0C3CEEA73E05160770CC976593E029C8827DCF60E1B7633C46C
3,132,571 UART: [art] PUB.Y = 96EC63F0947AC48C1153ACABEA3D9E56104EEEEFDCAD4E8F6BFC72012CC1BBA2FCCAD76533CB1395EDA74B486B4C8664
3,139,548 UART: [art] SIG.R = 928F57A486842614BD47C61D3196D9EF1128B96ED0450ADC73515E5B18E34C22C1B33AA851AF127E360E639279D2476C
3,146,308 UART: [art] SIG.S = 3DC9B08E3A28E5A5E8E2B6E3113A57C70FF79D2A027A0C1480185424F94B15E57E46127E4FB1C3B9DAFD7663BE10A4B7
3,170,342 UART: Caliptra RT
3,170,687 UART: [state] CFI Enabled
3,278,122 UART: [rt] RT listening for mailbox commands...
3,278,792 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,928 UART: [rt]cmd =0x41544d4e, len=14344
3,546,943 >>> mbox cmd response data (8 bytes)
3,546,944 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,143 UART: [rt]cmd =0x41545348, len=116
3,599,807 >>> mbox cmd response data (12 bytes)
3,599,808 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,447 UART:
3,600,463 UART: Running Caliptra ROM ...
3,600,871 UART:
3,601,013 UART: [state] CFI Enabled
3,603,761 UART: [state] LifecycleState = Unprovisioned
3,604,416 UART: [state] DebugLocked = No
3,604,996 UART: [state] WD Timer not started. Device not locked for debugging
3,606,238 UART: [kat] SHA2-256
4,409,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,413,917 UART: [kat] ++
4,414,069 UART: [kat] sha1
4,418,421 UART: [kat] SHA2-256
4,420,361 UART: [kat] SHA2-384
4,423,114 UART: [kat] SHA2-512-ACC
4,425,014 UART: [kat] ECC-384
4,434,707 UART: [kat] HMAC-384Kdf
4,439,347 UART: [kat] LMS
4,687,659 UART: [kat] --
4,688,279 UART: [update-reset] ++
5,592,764 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,593,733 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,690,115 >>> mbox cmd response: success
5,690,115 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,690,372 UART: [update-reset] Copying MAN_2 To MAN_1
5,698,386 UART: [update-reset Success] --
5,699,387 UART: [state] Locking Datavault
5,700,247 UART: [state] Locking PCR0, PCR1 and PCR31
5,700,851 UART: [state] Locking ICCM
5,701,389 UART: [exit] Launching FMC @ 0x40000130
5,706,718 UART:
5,706,734 UART: Running Caliptra FMC ...
5,707,142 UART:
5,707,285 UART: [state] CFI Enabled
5,796,404 UART: [art] Extend RT PCRs Done
5,796,832 UART: [art] Lock RT PCRs Done
5,798,119 UART: [art] Populate DV Done
5,806,398 UART: [fht] FMC Alias Private Key: 7
5,807,340 UART: [art] Derive CDI
5,807,620 UART: [art] Store in in slot 0x4
5,893,203 UART: [art] Derive Key Pair
5,893,563 UART: [art] Store priv key in slot 0x5
5,906,877 UART: [art] Derive Key Pair - Done
5,921,901 UART: [art] Signing Cert with AUTHO
5,922,381 UART: RITY.KEYID = 7
5,938,055 UART: [art] Erasing AUTHORITY.KEYID = 7
5,938,820 UART: [art] PUB.X = 494C59A84C1E2FB426733373308D153871E0F4D9C1251488BCA3420B05E2561D8223005A02383FAC473849618C93E758
5,945,543 UART: [art] PUB.Y = D6BCBC34A83CF5934402CA4034C6F4013D4B817F956F818203510CB7664A6D73E423EC44FD4F06B6BC8750F4CF62E824
5,952,482 UART: [art] SIG.R = 38D9A3E11B7FCC0171009F261C6CB02698E627FA29C30BD1EB1F80A3DD76B609465AC5F90D2AFA6AC5AF5EEA657454B3
5,959,234 UART: [art] SIG.S = B7499A744746AA38167A2D41734BD0FAB07ED64AD18986AFD2CE5542804E49442FA52D93F7603FC0321C45BB43D09CF9
5,983,559 UART: mbox::rt_entry...
5,983,931 UART: ____ _ _ _ ____ _____
5,984,715 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,985,515 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,986,283 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,987,051 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,987,819 UART: |_|
5,988,131 UART:
6,269,329 UART: [rt] Runtime listening for mailbox commands...
6,270,519 >>> mbox cmd response data (48 bytes)
6,270,520 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,273,303 >>> mbox cmd response data (48 bytes)
6,273,304 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,288,441 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,177 ready_for_fw is high
1,056,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,615 >>> mbox cmd response: success
2,685,003 UART:
2,685,019 UART: Running Caliptra FMC ...
2,685,427 UART:
2,685,570 UART: [state] CFI Enabled
2,696,399 UART: [fht] FMC Alias Private Key: 7
2,804,178 UART: [art] Extend RT PCRs Done
2,804,606 UART: [art] Lock RT PCRs Done
2,805,814 UART: [art] Populate DV Done
2,814,077 UART: [fht] FMC Alias Private Key: 7
2,815,207 UART: [art] Derive CDI
2,815,487 UART: [art] Store in in slot 0x4
2,901,586 UART: [art] Derive Key Pair
2,901,946 UART: [art] Store priv key in slot 0x5
2,915,516 UART: [art] Derive Key Pair - Done
2,930,209 UART: [art] Signing Cert with AUTHO
2,930,689 UART: RITY.KEYID = 7
2,945,409 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,174 UART: [art] PUB.X = ED4B8DF396A7A0FD2E5A503FA565E01F667E7972F71B679626B08D3C603036CB58BFC4A6625BAD5A4C0549FC9D0272EE
2,952,950 UART: [art] PUB.Y = 0B8548311BFF9E23E9AC2CC2E3A15679D11B683D1D02EB48A732321AEFB01E06CAB7ED311951A0EA738946C96693FDB6
2,959,901 UART: [art] SIG.R = 0D134C16237452147CB9E4570A32D06314460B2A18969D00190871322E5CE0DD189A3D3A8389CA5069EEE621DE24F223
2,966,627 UART: [art] SIG.S = 74FD8F25B416CE2CB71414E0652221A14D1B793C0767B37C32F27F1BC9334AE3738E225095EC2AF8F6F7BBD2D1E8D6D9
2,990,349 UART: Caliptra RT
2,990,694 UART: [state] CFI Enabled
3,098,041 UART: [rt] RT listening for mailbox commands...
3,098,711 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,695 UART: [rt]cmd =0x41544d4e, len=14344
3,366,186 >>> mbox cmd response data (8 bytes)
3,366,187 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,216 UART: [rt]cmd =0x41545348, len=116
3,417,220 >>> mbox cmd response data (12 bytes)
3,417,221 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,388,883 >>> mbox cmd response: success
5,388,883 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,402,153 UART:
5,402,169 UART: Running Caliptra FMC ...
5,402,577 UART:
5,402,720 UART: [state] CFI Enabled
5,491,725 UART: [art] Extend RT PCRs Done
5,492,153 UART: [art] Lock RT PCRs Done
5,493,298 UART: [art] Populate DV Done
5,501,589 UART: [fht] FMC Alias Private Key: 7
5,502,771 UART: [art] Derive CDI
5,503,051 UART: [art] Store in in slot 0x4
5,589,000 UART: [art] Derive Key Pair
5,589,360 UART: [art] Store priv key in slot 0x5
5,602,194 UART: [art] Derive Key Pair - Done
5,616,801 UART: [art] Signing Cert with AUTHO
5,617,281 UART: RITY.KEYID = 7
5,632,557 UART: [art] Erasing AUTHORITY.KEYID = 7
5,633,322 UART: [art] PUB.X = 5DDD40B6C6B8762CFC952589201FA484791FB4D9C2D145F483778A534877768BA0B50889DCCB21BA54EC5050D61DEDAE
5,640,097 UART: [art] PUB.Y = 8AE5BAEA8220AAE466AB0FE18B7CC5B117647698E2C3C4D86BE9BB83C466288ED49D272B1EAFFAD610DC5314C163928E
5,647,062 UART: [art] SIG.R = D5A7CD01D89F3B7099C9B29415F46EC40725FC9354BFD046E138369049418E1DD773A813577CA8128911ED7208C8B4E4
5,653,819 UART: [art] SIG.S = D0E0675E184F9AB89B914C2C0A92280457341E4EC674ED49B20F01F7B09B7991BF6CF7359A94FAB1D95B145C940E1795
5,677,285 UART: mbox::rt_entry...
5,677,657 UART: ____ _ _ _ ____ _____
5,678,441 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,679,241 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,680,009 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,680,777 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,681,545 UART: |_|
5,681,857 UART:
5,958,020 UART: [rt] Runtime listening for mailbox commands...
5,959,210 >>> mbox cmd response data (48 bytes)
5,959,211 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,961,994 >>> mbox cmd response data (48 bytes)
5,961,995 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,977,132 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,014 UART:
192,407 UART: Running Caliptra ROM ...
193,604 UART:
193,762 UART: [state] CFI Enabled
264,753 UART: [state] LifecycleState = Unprovisioned
266,655 UART: [state] DebugLocked = No
268,262 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,635 UART: [kat] SHA2-256
442,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,813 UART: [kat] ++
453,293 UART: [kat] sha1
463,957 UART: [kat] SHA2-256
466,678 UART: [kat] SHA2-384
473,797 UART: [kat] SHA2-512-ACC
476,161 UART: [kat] ECC-384
2,768,627 UART: [kat] HMAC-384Kdf
2,800,901 UART: [kat] LMS
3,991,199 UART: [kat] --
3,996,924 UART: [cold-reset] ++
3,998,435 UART: [fht] Storing FHT @ 0x50003400
4,009,136 UART: [idev] ++
4,009,710 UART: [idev] CDI.KEYID = 6
4,010,629 UART: [idev] SUBJECT.KEYID = 7
4,011,882 UART: [idev] UDS.KEYID = 0
4,012,930 ready_for_fw is high
4,013,136 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,677 UART: [idev] Erasing UDS.KEYID = 0
7,348,164 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,232 UART: [idev] --
7,374,549 UART: [ldev] ++
7,375,120 UART: [ldev] CDI.KEYID = 6
7,376,084 UART: [ldev] SUBJECT.KEYID = 5
7,377,302 UART: [ldev] AUTHORITY.KEYID = 7
7,378,504 UART: [ldev] FE.KEYID = 1
7,424,957 UART: [ldev] Erasing FE.KEYID = 1
10,757,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,630 UART: [ldev] --
13,139,267 UART: [fwproc] Waiting for Commands...
13,141,034 UART: [fwproc] Received command 0x46574c44
13,143,221 UART: [fwproc] Received Image of size 114124 bytes
17,202,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,278,245 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,347,119 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,663,836 >>> mbox cmd response: success
17,668,604 UART: [afmc] ++
17,669,217 UART: [afmc] CDI.KEYID = 6
17,670,138 UART: [afmc] SUBJECT.KEYID = 7
17,671,356 UART: [afmc] AUTHORITY.KEYID = 5
21,027,606 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,845 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,155 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,526 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,358 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,814 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,871 UART: [afmc] --
23,399,417 UART: [cold-reset] --
23,403,433 UART: [state] Locking Datavault
23,407,998 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,758 UART: [state] Locking ICCM
23,412,532 UART: [exit] Launching FMC @ 0x40000130
23,420,923 UART:
23,421,173 UART: Running Caliptra FMC ...
23,422,202 UART:
23,422,349 UART: [state] CFI Enabled
23,490,898 UART: [fht] FMC Alias Private Key: 7
25,828,818 UART: [art] Extend RT PCRs Done
25,830,031 UART: [art] Lock RT PCRs Done
25,831,865 UART: [art] Populate DV Done
25,837,120 UART: [fht] FMC Alias Private Key: 7
25,838,766 UART: [art] Derive CDI
25,839,506 UART: [art] Store in in slot 0x4
25,899,365 UART: [art] Derive Key Pair
25,900,397 UART: [art] Store priv key in slot 0x5
29,193,325 UART: [art] Derive Key Pair - Done
29,206,312 UART: [art] Signing Cert with AUTHO
29,207,610 UART: RITY.KEYID = 7
31,495,415 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,239 UART: [art] PUB.X = 60365E2BA271734E5E51E6F5947A117440F389D1C051B348DAE5213024D99609353F23E1F52C6F057AD3CE4CF2EC0CC6
31,504,138 UART: [art] PUB.Y = 8977FEDECC8FFC63AB120E2F6D30DB173C751EFC723EA5EEB4268D2AED38EEDB7AAC3C2893845160E5C0799B5C06E7E4
31,511,387 UART: [art] SIG.R = B31DDF860362EFB0B3D58F67061AB71210F2F0D22B174B0773E6DD3AE253273EFBB13CF72EB3A667357F0C54CE18C137
31,518,781 UART: [art] SIG.S = DC7CB1A04AC48C805C390AC35FD9EF11B86E48649C5BD30DFA4BCB77E7EC3751CF2FBB342CD9A854F54FF22E9FA573C7
32,823,704 UART: Caliptra RT
32,824,426 UART: [state] CFI Enabled
32,986,026 UART: [rt] RT listening for mailbox commands...
37,162,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,318,569 UART: [rt]cmd =0x41544d4e, len=14344
42,553,964 >>> mbox cmd response data (8 bytes)
42,555,214 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,586,158 UART: [rt]cmd =0x41545348, len=116
42,606,226 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,805,876 ready_for_fw is high
3,806,306 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,882,974 >>> mbox cmd response: success
23,570,529 UART:
23,571,283 UART: Running Caliptra FMC ...
23,572,410 UART:
23,572,588 UART: [state] CFI Enabled
23,639,534 UART: [fht] FMC Alias Private Key: 7
25,977,554 UART: [art] Extend RT PCRs Done
25,978,780 UART: [art] Lock RT PCRs Done
25,980,342 UART: [art] Populate DV Done
25,985,653 UART: [fht] FMC Alias Private Key: 7
25,987,197 UART: [art] Derive CDI
25,987,933 UART: [art] Store in in slot 0x4
26,047,518 UART: [art] Derive Key Pair
26,048,566 UART: [art] Store priv key in slot 0x5
29,342,086 UART: [art] Derive Key Pair - Done
29,355,095 UART: [art] Signing Cert with AUTHO
29,356,406 UART: RITY.KEYID = 7
31,643,919 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,429 UART: [art] PUB.X = AF512741B4ECAB01AC713CD4DA7F6EA133705CE3E77CEC486426F8A872A3304773B5819A4908070C73C6114983E83668
31,652,658 UART: [art] PUB.Y = 1F29A95DC4E350F5FBDBF764440A54268C2CC5D96F80C2FDFACCF69CCCD19194DCE0A7EF1A638D8DC17D090F932A1E1D
31,659,943 UART: [art] SIG.R = DA6D3E09CDA5A6E1EC8E50CD572C886D1158BA75D604CDA31313EC758ECC7CA47CDC3871FEA6BB8CF8AA152A8C428766
31,667,319 UART: [art] SIG.S = 695CB123A13397517094E6FCC7C4E566322926BA1F6EC982AC87705738B3DDE6D375B39A0EE182445C6BFC48B62FE2A9
32,972,948 UART: Caliptra RT
32,973,651 UART: [state] CFI Enabled
33,134,592 UART: [rt] RT listening for mailbox commands...
37,307,620 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,462,991 UART: [rt]cmd =0x41544d4e, len=14344
42,698,659 >>> mbox cmd response data (8 bytes)
42,699,266 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,729,971 UART: [rt]cmd =0x41545348, len=116
42,749,067 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
192,518 UART:
192,883 UART: Running Caliptra ROM ...
193,980 UART:
603,631 UART: [state] CFI Enabled
617,506 UART: [state] LifecycleState = Unprovisioned
619,371 UART: [state] DebugLocked = No
621,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,396 UART: [kat] SHA2-256
796,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,708 UART: [kat] ++
807,174 UART: [kat] sha1
818,721 UART: [kat] SHA2-256
821,452 UART: [kat] SHA2-384
828,664 UART: [kat] SHA2-512-ACC
831,033 UART: [kat] ECC-384
3,115,414 UART: [kat] HMAC-384Kdf
3,127,503 UART: [kat] LMS
4,317,592 UART: [kat] --
4,323,102 UART: [cold-reset] ++
4,324,537 UART: [fht] Storing FHT @ 0x50003400
4,335,731 UART: [idev] ++
4,336,287 UART: [idev] CDI.KEYID = 6
4,337,259 UART: [idev] SUBJECT.KEYID = 7
4,338,506 UART: [idev] UDS.KEYID = 0
4,339,479 ready_for_fw is high
4,339,674 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,993 UART: [idev] Erasing UDS.KEYID = 0
7,628,192 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,520 UART: [idev] --
7,653,742 UART: [ldev] ++
7,654,319 UART: [ldev] CDI.KEYID = 6
7,655,332 UART: [ldev] SUBJECT.KEYID = 5
7,656,487 UART: [ldev] AUTHORITY.KEYID = 7
7,657,713 UART: [ldev] FE.KEYID = 1
7,670,849 UART: [ldev] Erasing FE.KEYID = 1
10,959,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,984 UART: [ldev] --
13,320,114 UART: [fwproc] Waiting for Commands...
13,321,984 UART: [fwproc] Received command 0x46574c44
13,324,212 UART: [fwproc] Received Image of size 114124 bytes
17,375,589 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,289 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,170 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,840,827 >>> mbox cmd response: success
17,845,699 UART: [afmc] ++
17,846,296 UART: [afmc] CDI.KEYID = 6
17,847,202 UART: [afmc] SUBJECT.KEYID = 7
17,848,470 UART: [afmc] AUTHORITY.KEYID = 5
21,163,566 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,706 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,968 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,380 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,201 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,664 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,869 UART: [afmc] --
23,531,392 UART: [cold-reset] --
23,533,090 UART: [state] Locking Datavault
23,538,466 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,220 UART: [state] Locking ICCM
23,541,988 UART: [exit] Launching FMC @ 0x40000130
23,550,378 UART:
23,550,618 UART: Running Caliptra FMC ...
23,551,715 UART:
23,551,868 UART: [state] CFI Enabled
23,560,097 UART: [fht] FMC Alias Private Key: 7
25,890,581 UART: [art] Extend RT PCRs Done
25,891,793 UART: [art] Lock RT PCRs Done
25,893,194 UART: [art] Populate DV Done
25,898,760 UART: [fht] FMC Alias Private Key: 7
25,900,305 UART: [art] Derive CDI
25,901,061 UART: [art] Store in in slot 0x4
25,943,690 UART: [art] Derive Key Pair
25,944,723 UART: [art] Store priv key in slot 0x5
29,187,032 UART: [art] Derive Key Pair - Done
29,200,015 UART: [art] Signing Cert with AUTHO
29,201,320 UART: RITY.KEYID = 7
31,480,584 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,090 UART: [art] PUB.X = 41BE0D137C4E87EFD4A251E19DED12089ADC2CA1323079BE9CBC93CCC5D33CB19D64CBCB03DB4E635CCA48764FFDB4AC
31,489,377 UART: [art] PUB.Y = 433996583AF578AD67CBCDF9D30DD52DBF5B34E07BF338A823F04CFD1FA4D1A986D385485FB7D13FF3381F60BF587028
31,496,647 UART: [art] SIG.R = 65665A3C2106480EBC2B181DDD60392258DD76A04D31232CC30062B7368C93CDB301C43AF1F8BBC90A2552EAE51E981B
31,504,015 UART: [art] SIG.S = 92156D4AA5A9435FA837AE9D89BB846A15A61E9D41BFE6C25D8E29ED8544B2177297362BFADF31B68ECA8231A15572B1
32,809,520 UART: Caliptra RT
32,810,232 UART: [state] CFI Enabled
32,928,224 UART: [rt] RT listening for mailbox commands...
36,946,751 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,103,021 UART: [rt]cmd =0x41544d4e, len=14344
42,338,910 >>> mbox cmd response data (8 bytes)
42,339,511 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,370,516 UART: [rt]cmd =0x41545348, len=116
42,390,258 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
4,123,216 ready_for_fw is high
4,123,750 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,680 >>> mbox cmd response: success
23,714,851 UART:
23,715,240 UART: Running Caliptra FMC ...
23,716,338 UART:
23,716,494 UART: [state] CFI Enabled
23,724,553 UART: [fht] FMC Alias Private Key: 7
26,055,742 UART: [art] Extend RT PCRs Done
26,056,969 UART: [art] Lock RT PCRs Done
26,058,596 UART: [art] Populate DV Done
26,064,082 UART: [fht] FMC Alias Private Key: 7
26,065,682 UART: [art] Derive CDI
26,066,420 UART: [art] Store in in slot 0x4
26,108,907 UART: [art] Derive Key Pair
26,109,901 UART: [art] Store priv key in slot 0x5
29,352,126 UART: [art] Derive Key Pair - Done
29,365,062 UART: [art] Signing Cert with AUTHO
29,366,366 UART: RITY.KEYID = 7
31,645,217 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,714 UART: [art] PUB.X = 8E5C13FBF13BFF9E8F0F7861A2364F0895F12C8209EF339B088D8784B2C18BEB1D10493AF12ED677363990746ECDDE88
31,653,924 UART: [art] PUB.Y = 92F83A6D99CEBC322A239AD14652DDB7C9C7B1494230A2B306328CDBB7488A8F5498E61B43EFD2982D1FCF9D5CD1AB6F
31,661,232 UART: [art] SIG.R = 57B87BB314288B67D01FB19432EE6A470A4D4F57F23B5012F6AB24CE6D528D443918D58F5E6852CE612126B2740555B4
31,668,576 UART: [art] SIG.S = B836D854CE93029F7C3DAC62DCE8D7D063D3394E1F3AE46C57832828980E69ABCE1BA103A251B482F0FCE77B75A85F74
32,974,284 UART: Caliptra RT
32,974,998 UART: [state] CFI Enabled
33,092,171 UART: [rt] RT listening for mailbox commands...
37,115,909 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,271,424 UART: [rt]cmd =0x41544d4e, len=14344
42,506,914 >>> mbox cmd response data (8 bytes)
42,507,512 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,538,157 UART: [rt]cmd =0x41545348, len=116
42,557,300 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
191,971 UART:
192,342 UART: Running Caliptra ROM ...
193,542 UART:
193,693 UART: [state] CFI Enabled
262,188 UART: [state] LifecycleState = Unprovisioned
264,077 UART: [state] DebugLocked = No
266,535 UART: [state] WD Timer not started. Device not locked for debugging
270,594 UART: [kat] SHA2-256
449,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,301 UART: [kat] ++
461,842 UART: [kat] sha1
472,579 UART: [kat] SHA2-256
475,655 UART: [kat] SHA2-384
480,931 UART: [kat] SHA2-512-ACC
483,863 UART: [kat] ECC-384
2,951,362 UART: [kat] HMAC-384Kdf
2,973,965 UART: [kat] LMS
3,503,440 UART: [kat] --
3,505,802 UART: [cold-reset] ++
3,507,940 UART: [fht] FHT @ 0x50003400
3,519,853 UART: [idev] ++
3,520,417 UART: [idev] CDI.KEYID = 6
3,521,447 UART: [idev] SUBJECT.KEYID = 7
3,522,547 UART: [idev] UDS.KEYID = 0
3,523,472 ready_for_fw is high
3,523,668 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,612 UART: [idev] Erasing UDS.KEYID = 0
6,029,219 UART: [idev] Sha1 KeyId Algorithm
6,052,075 UART: [idev] --
6,056,072 UART: [ldev] ++
6,056,644 UART: [ldev] CDI.KEYID = 6
6,057,570 UART: [ldev] SUBJECT.KEYID = 5
6,058,735 UART: [ldev] AUTHORITY.KEYID = 7
6,059,972 UART: [ldev] FE.KEYID = 1
6,102,214 UART: [ldev] Erasing FE.KEYID = 1
8,605,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,868 UART: [ldev] --
10,409,186 UART: [fwproc] Wait for Commands...
10,411,818 UART: [fwproc] Recv command 0x46574c44
10,413,907 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,274,353 >>> mbox cmd response: success
14,278,120 UART: [afmc] ++
14,278,717 UART: [afmc] CDI.KEYID = 6
14,279,646 UART: [afmc] SUBJECT.KEYID = 7
14,280,809 UART: [afmc] AUTHORITY.KEYID = 5
16,823,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,544 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,589 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,493 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,552 UART: [afmc] --
18,625,367 UART: [cold-reset] --
18,628,260 UART: [state] Locking Datavault
18,634,098 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,798 UART: [state] Locking ICCM
18,637,032 UART: [exit] Launching FMC @ 0x40000130
18,645,482 UART:
18,645,725 UART: Running Caliptra FMC ...
18,646,776 UART:
18,646,930 UART: [state] CFI Enabled
18,706,865 UART: [fht] FMC Alias Private Key: 7
20,470,977 UART: [art] Extend RT PCRs Done
20,472,197 UART: [art] Lock RT PCRs Done
20,473,602 UART: [art] Populate DV Done
20,478,904 UART: [fht] FMC Alias Private Key: 7
20,480,439 UART: [art] Derive CDI
20,481,251 UART: [art] Store in in slot 0x4
20,539,539 UART: [art] Derive Key Pair
20,540,579 UART: [art] Store priv key in slot 0x5
23,003,537 UART: [art] Derive Key Pair - Done
23,016,636 UART: [art] Signing Cert with AUTHO
23,017,946 UART: RITY.KEYID = 7
24,729,785 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,286 UART: [art] PUB.X = CA47D8CC559F68C767EF8356AD3FC86C3529C9EBE3E57BFA466B38F3F9F5FC52EFA9EA3233B2202E5F4D11A9373811EC
24,738,532 UART: [art] PUB.Y = 2DC9B5944E3815AD8B86B1E5DA866DD259B3416895EEC6E6BA060ED469C9A3A0D3052094184AB742B786C94B58A7924E
24,745,817 UART: [art] SIG.R = 8353D861A4D486B845DAAB8F49E3756D8B4A479D9D2D4A8589DF77748A23AE654409804331FF7C669F4E33E516672B82
24,753,272 UART: [art] SIG.S = E4B1BFC88131D89C08664254EAA4653BFDC219FCD9E44AD9F8E17EB4D9B7DC5018200B580DDE11987FC16F1A3DCDBB91
25,731,835 UART: Caliptra RT
25,732,536 UART: [state] CFI Enabled
25,898,847 UART: [rt] RT listening for mailbox commands...
29,925,977 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,082,097 UART: [rt]cmd =0x41544d4e, len=14344
34,012,993 >>> mbox cmd response data (8 bytes)
34,013,600 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,044,617 UART: [rt]cmd =0x41545348, len=116
34,064,406 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,358,310 ready_for_fw is high
3,358,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,326 >>> mbox cmd response: success
18,385,981 UART:
18,386,366 UART: Running Caliptra FMC ...
18,387,572 UART:
18,387,740 UART: [state] CFI Enabled
18,454,334 UART: [fht] FMC Alias Private Key: 7
20,218,472 UART: [art] Extend RT PCRs Done
20,219,694 UART: [art] Lock RT PCRs Done
20,221,491 UART: [art] Populate DV Done
20,227,180 UART: [fht] FMC Alias Private Key: 7
20,228,674 UART: [art] Derive CDI
20,229,414 UART: [art] Store in in slot 0x4
20,286,942 UART: [art] Derive Key Pair
20,287,948 UART: [art] Store priv key in slot 0x5
22,750,858 UART: [art] Derive Key Pair - Done
22,764,027 UART: [art] Signing Cert with AUTHO
22,765,365 UART: RITY.KEYID = 7
24,477,542 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,048 UART: [art] PUB.X = 33212CD93D5C0DB490FC1DB70DB977421EE84E5C39A5A252BBD8C7AD611360D3C2C6507F7FFB5B5D93F1CB16F1B7CC6D
24,486,348 UART: [art] PUB.Y = 71E2BCD0BE4F5DDDD1D32E8D65A29E480EAB1D8B28969ADAD4794A00D51CDB071D11976E8056E0B29FB44C77C0E88F4D
24,493,662 UART: [art] SIG.R = 86581C4C754D2A348DEEDD044634904F9D2F9CACB3A8CCA955D3050B1160053FA5922BB1BB75F5540C8ED5CE5F478089
24,501,058 UART: [art] SIG.S = ECE934133AA846CB09C03676848E0007AF4DBF62E810CE652DFC7F19997E6DB51CD4805284B6C3C9FECA19833656C0F1
25,479,605 UART: Caliptra RT
25,480,309 UART: [state] CFI Enabled
25,646,029 UART: [rt] RT listening for mailbox commands...
29,668,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,824,706 UART: [rt]cmd =0x41544d4e, len=14344
33,754,654 >>> mbox cmd response data (8 bytes)
33,755,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,786,064 UART: [rt]cmd =0x41545348, len=116
33,804,867 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
192,359 UART:
192,725 UART: Running Caliptra ROM ...
193,860 UART:
603,542 UART: [state] CFI Enabled
615,925 UART: [state] LifecycleState = Unprovisioned
617,787 UART: [state] DebugLocked = No
620,729 UART: [state] WD Timer not started. Device not locked for debugging
624,632 UART: [kat] SHA2-256
803,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,377 UART: [kat] ++
815,904 UART: [kat] sha1
827,509 UART: [kat] SHA2-256
830,483 UART: [kat] SHA2-384
837,607 UART: [kat] SHA2-512-ACC
840,534 UART: [kat] ECC-384
3,281,748 UART: [kat] HMAC-384Kdf
3,294,532 UART: [kat] LMS
3,824,032 UART: [kat] --
3,828,338 UART: [cold-reset] ++
3,830,974 UART: [fht] FHT @ 0x50003400
3,842,011 UART: [idev] ++
3,842,569 UART: [idev] CDI.KEYID = 6
3,843,474 UART: [idev] SUBJECT.KEYID = 7
3,844,727 UART: [idev] UDS.KEYID = 0
3,845,645 ready_for_fw is high
3,845,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,117 UART: [idev] Erasing UDS.KEYID = 0
6,317,916 UART: [idev] Sha1 KeyId Algorithm
6,340,600 UART: [idev] --
6,344,371 UART: [ldev] ++
6,344,974 UART: [ldev] CDI.KEYID = 6
6,345,888 UART: [ldev] SUBJECT.KEYID = 5
6,347,039 UART: [ldev] AUTHORITY.KEYID = 7
6,348,318 UART: [ldev] FE.KEYID = 1
6,358,954 UART: [ldev] Erasing FE.KEYID = 1
8,829,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,074 UART: [ldev] --
10,621,118 UART: [fwproc] Wait for Commands...
10,622,880 UART: [fwproc] Recv command 0x46574c44
10,624,964 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,990 >>> mbox cmd response: success
14,488,610 UART: [afmc] ++
14,489,208 UART: [afmc] CDI.KEYID = 6
14,490,116 UART: [afmc] SUBJECT.KEYID = 7
14,491,325 UART: [afmc] AUTHORITY.KEYID = 5
16,992,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,703 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,628 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,175 UART: [afmc] --
18,789,168 UART: [cold-reset] --
18,792,697 UART: [state] Locking Datavault
18,797,667 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,299 UART: [state] Locking ICCM
18,800,685 UART: [exit] Launching FMC @ 0x40000130
18,809,073 UART:
18,809,303 UART: Running Caliptra FMC ...
18,810,397 UART:
18,810,546 UART: [state] CFI Enabled
18,818,855 UART: [fht] FMC Alias Private Key: 7
20,576,363 UART: [art] Extend RT PCRs Done
20,577,585 UART: [art] Lock RT PCRs Done
20,579,276 UART: [art] Populate DV Done
20,584,492 UART: [fht] FMC Alias Private Key: 7
20,586,132 UART: [art] Derive CDI
20,586,952 UART: [art] Store in in slot 0x4
20,629,483 UART: [art] Derive Key Pair
20,630,472 UART: [art] Store priv key in slot 0x5
23,057,376 UART: [art] Derive Key Pair - Done
23,070,417 UART: [art] Signing Cert with AUTHO
23,071,742 UART: RITY.KEYID = 7
24,776,773 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,271 UART: [art] PUB.X = 1062C53DD641EA437CD04C4C6CCEAB4F9D1F9B6C634E12A5ABFC3FA434914D756D4CA8BA06AC18B3B400AB3BABE0BB8F
24,785,550 UART: [art] PUB.Y = 1859FB66354476C184BE9026C92EC461696B915B1A508B5B63594327D1C46C60EB228174DB5C9F8E28B08D7FB3D9704F
24,792,813 UART: [art] SIG.R = 2229DD9357E8E9339C56DFFF3122E04D64B8491870B7FF2869BEE4B80FBD9E600B4EFE49C3A19BD523BA192B76888E1C
24,800,223 UART: [art] SIG.S = 6084FAD5E447E326552680191FDCAC9CF6F0DB57B3364C94A585CFA42E17AB6E7EFFB6119BD79BE3EA738546C7F974F7
25,779,711 UART: Caliptra RT
25,780,411 UART: [state] CFI Enabled
25,898,691 UART: [rt] RT listening for mailbox commands...
29,919,533 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,074,930 UART: [rt]cmd =0x41544d4e, len=14344
34,005,646 >>> mbox cmd response data (8 bytes)
34,006,273 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,037,079 UART: [rt]cmd =0x41545348, len=116
34,056,715 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
3,694,697 ready_for_fw is high
3,695,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,256,563 >>> mbox cmd response: success
18,509,237 UART:
18,509,659 UART: Running Caliptra FMC ...
18,510,963 UART:
18,511,124 UART: [state] CFI Enabled
18,519,024 UART: [fht] FMC Alias Private Key: 7
20,275,487 UART: [art] Extend RT PCRs Done
20,276,714 UART: [art] Lock RT PCRs Done
20,278,394 UART: [art] Populate DV Done
20,283,751 UART: [fht] FMC Alias Private Key: 7
20,285,343 UART: [art] Derive CDI
20,286,151 UART: [art] Store in in slot 0x4
20,328,850 UART: [art] Derive Key Pair
20,329,844 UART: [art] Store priv key in slot 0x5
22,756,330 UART: [art] Derive Key Pair - Done
22,769,491 UART: [art] Signing Cert with AUTHO
22,770,791 UART: RITY.KEYID = 7
24,476,247 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,767 UART: [art] PUB.X = D56CA01F5FAF527AAD0FA1961B7E5B7A8B45FA50FA6A960CE3480F355E032BD64214CAEDDDA606D47371DE8807DFC8A0
24,485,071 UART: [art] PUB.Y = C851656CEAED682B11F3AA117EE691FFDBF27D3032B348CE00EFC51F3B1CBF42FE9591BAA10D1FBE36A6C4003DFC761F
24,492,316 UART: [art] SIG.R = 27227E49CDFD5C700BC0899EA38CE57A92A23722F66FA35F6D236A9E40ED534E1C7B04D8FFEE23AFF1985A2456149C93
24,499,720 UART: [art] SIG.S = BD957F3B0DE55BB062D56076A59FCBA4AAF7D166BFC638C1A4D7AFD7CE127BFA53B77AF7764EE439CF0CF01600B9CA62
25,478,915 UART: Caliptra RT
25,479,618 UART: [state] CFI Enabled
25,597,382 UART: [rt] RT listening for mailbox commands...
29,619,482 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,775,058 UART: [rt]cmd =0x41544d4e, len=14344
33,705,532 >>> mbox cmd response data (8 bytes)
33,706,111 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,736,799 UART: [rt]cmd =0x41545348, len=116
33,756,270 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,414,069 ready_for_fw is high
3,414,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,722,761 >>> mbox cmd response: success
19,004,797 UART:
19,005,205 UART: Running Caliptra FMC ...
19,006,514 UART:
19,006,689 UART: [state] CFI Enabled
19,072,810 UART: [fht] FMC Alias Private Key: 7
20,837,053 UART: [art] Extend RT PCRs Done
20,838,283 UART: [art] Lock RT PCRs Done
20,839,914 UART: [art] Populate DV Done
20,845,436 UART: [fht] FMC Alias Private Key: 7
20,847,022 UART: [art] Derive CDI
20,847,765 UART: [art] Store in in slot 0x4
20,905,457 UART: [art] Derive Key Pair
20,906,487 UART: [art] Store priv key in slot 0x5
23,369,411 UART: [art] Derive Key Pair - Done
23,382,643 UART: [art] Signing Cert with AUTHO
23,383,947 UART: RITY.KEYID = 7
25,095,039 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,559 UART: [art] PUB.X = 381C14C88539AB6C6DE808F16AF0912BFC8BEC319C16AB258667319DFC76234D59C358D1463F5FE433DD4DE4576241D0
25,103,760 UART: [art] PUB.Y = 8EB8F9EE3B7821E07B528080BD0357E7D9258FA6BFA58E41D6E8EC2EF707783AD3D05BBADAC2F001829770F6F4E63A01
25,111,061 UART: [art] SIG.R = D873E01F03D7A48B83248778C3112D6E253BF17C8DD13B540CE59FA7E79E58ABED70BFAD0E79E2FDD1D446D8F461B67A
25,118,458 UART: [art] SIG.S = 84183081353F1BA9ACCACB33BE65E2C184EAC396A43503351E4347DA39F7E30D44B5E5AB7FBAB1ED9CD702CCE843A812
26,097,096 UART: Caliptra RT
26,097,811 UART: [state] CFI Enabled
26,262,847 UART: [rt] RT listening for mailbox commands...
30,322,204 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,478,298 UART: [rt]cmd =0x41544d4e, len=14344
34,408,500 >>> mbox cmd response data (8 bytes)
34,409,090 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,439,940 UART: [rt]cmd =0x41545348, len=116
34,459,054 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,756,950 ready_for_fw is high
3,757,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,961,165 >>> mbox cmd response: success
19,218,727 UART:
19,219,127 UART: Running Caliptra FMC ...
19,220,316 UART:
19,220,472 UART: [state] CFI Enabled
19,228,250 UART: [fht] FMC Alias Private Key: 7
20,985,079 UART: [art] Extend RT PCRs Done
20,986,316 UART: [art] Lock RT PCRs Done
20,988,047 UART: [art] Populate DV Done
20,993,520 UART: [fht] FMC Alias Private Key: 7
20,995,053 UART: [art] Derive CDI
20,995,863 UART: [art] Store in in slot 0x4
21,038,436 UART: [art] Derive Key Pair
21,039,486 UART: [art] Store priv key in slot 0x5
23,466,429 UART: [art] Derive Key Pair - Done
23,479,172 UART: [art] Signing Cert with AUTHO
23,480,475 UART: RITY.KEYID = 7
25,185,946 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,453 UART: [art] PUB.X = 55136113C024830E1F2022C248484B1CB9637AAF72422964CAF2FBEB19CB30A22CB3EE44B4BC7F38C8F45313E6700356
25,194,720 UART: [art] PUB.Y = 0B5CEC456641C0D8873747A7A1CDEE89DCBD1A98DEB9EA65F7392E7A5E7FB8A783E79652E237D504723C3E47852F2990
25,201,961 UART: [art] SIG.R = 32558EC15E7B4D99626D3CF939293F2E54D0FCA6A84B006997F2BA82A140DE40483842D71454D6B22CC88DA1661318CC
25,209,353 UART: [art] SIG.S = 699815AC41E9FF0BC094627E8EDF7D5382521E2BCECF60DD917DD0DAD1F0C0257892D3777C2CF08FAFC7CC590AD57C75
26,187,744 UART: Caliptra RT
26,188,431 UART: [state] CFI Enabled
26,305,896 UART: [rt] RT listening for mailbox commands...
30,342,711 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,498,512 UART: [rt]cmd =0x41544d4e, len=14344
34,429,126 >>> mbox cmd response data (8 bytes)
34,429,711 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,460,177 UART: [rt]cmd =0x41545348, len=116
34,479,403 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,313 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,025 UART: [kat] SHA2-256
881,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,071 UART: [kat] ++
886,223 UART: [kat] sha1
890,453 UART: [kat] SHA2-256
892,391 UART: [kat] SHA2-384
895,110 UART: [kat] SHA2-512-ACC
897,011 UART: [kat] ECC-384
902,434 UART: [kat] HMAC-384Kdf
906,980 UART: [kat] LMS
1,475,176 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,501 UART: [fht] Storing FHT @ 0x50003400
1,479,414 UART: [idev] ++
1,479,582 UART: [idev] CDI.KEYID = 6
1,479,942 UART: [idev] SUBJECT.KEYID = 7
1,480,366 UART: [idev] UDS.KEYID = 0
1,480,711 ready_for_fw is high
1,480,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,360 UART: [idev] Erasing UDS.KEYID = 0
1,505,434 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,984 UART: [idev] --
1,514,851 UART: [ldev] ++
1,515,019 UART: [ldev] CDI.KEYID = 6
1,515,382 UART: [ldev] SUBJECT.KEYID = 5
1,515,808 UART: [ldev] AUTHORITY.KEYID = 7
1,516,271 UART: [ldev] FE.KEYID = 1
1,521,557 UART: [ldev] Erasing FE.KEYID = 1
1,546,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,364 UART: [ldev] --
1,585,803 UART: [fwproc] Waiting for Commands...
1,586,514 UART: [fwproc] Received command 0x46574c44
1,587,305 UART: [fwproc] Received Image of size 114448 bytes
2,885,676 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,658 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,010 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,013 >>> mbox cmd response: success
3,079,069 UART: [afmc] ++
3,079,237 UART: [afmc] CDI.KEYID = 6
3,079,599 UART: [afmc] SUBJECT.KEYID = 7
3,080,024 UART: [afmc] AUTHORITY.KEYID = 5
3,115,383 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,258 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,948 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,959 UART: [afmc] --
3,158,843 UART: [cold-reset] --
3,159,717 UART: [state] Locking Datavault
3,160,944 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,548 UART: [state] Locking ICCM
3,162,180 UART: [exit] Launching FMC @ 0x40000130
3,167,509 UART:
3,167,525 UART: Running Caliptra FMC ...
3,167,933 UART:
3,167,987 UART: [state] CFI Enabled
3,178,630 UART: [fht] FMC Alias Private Key: 7
3,286,383 UART: [art] Extend RT PCRs Done
3,286,811 UART: [art] Lock RT PCRs Done
3,288,399 UART: [art] Populate DV Done
3,296,412 UART: [fht] FMC Alias Private Key: 7
3,297,444 UART: [art] Derive CDI
3,297,724 UART: [art] Store in in slot 0x4
3,383,467 UART: [art] Derive Key Pair
3,383,827 UART: [art] Store priv key in slot 0x5
3,396,595 UART: [art] Derive Key Pair - Done
3,411,390 UART: [art] Signing Cert with AUTHO
3,411,870 UART: RITY.KEYID = 7
3,427,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,947 UART: [art] PUB.X = 0DEBF43523B4E399AAA14DFA74F04EC1F648C6BDC6AEBD958BDA38439DDFBE6FE20E8CA3DB2AE8AD697A5469CCB7DEC0
3,434,749 UART: [art] PUB.Y = C9B38CDF59D55FACDD09E745B0A21FC57F6649FB096BAB035290B8E0D4A466B45EF46688E095AB48900AFD66B4FFD6F6
3,441,705 UART: [art] SIG.R = EEB782E138137B7CF43D55F962BCAD7AD7B45CC63898B3013CC867E69DC6FD50DE9A0BFAF40D5105B3768FBBAC401103
3,448,478 UART: [art] SIG.S = 4B06F9188E900C5362E9131D3AE0C54BA9C7D6A491A202E642A529BAEB17F4E23C744437C32B10F6200B2A882080C417
3,472,423 UART: Caliptra RT
3,472,676 UART: [state] CFI Enabled
3,581,097 UART: [rt] RT listening for mailbox commands...
3,581,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,809 UART: [rt]cmd =0x41544d4e, len=14344
3,849,558 >>> mbox cmd response data (8 bytes)
3,849,559 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,522 UART: [rt]cmd =0x41545348, len=116
3,900,828 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,965 ready_for_fw is high
1,361,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,985 >>> mbox cmd response: success
2,990,043 UART:
2,990,059 UART: Running Caliptra FMC ...
2,990,467 UART:
2,990,521 UART: [state] CFI Enabled
3,001,088 UART: [fht] FMC Alias Private Key: 7
3,108,859 UART: [art] Extend RT PCRs Done
3,109,287 UART: [art] Lock RT PCRs Done
3,110,837 UART: [art] Populate DV Done
3,119,102 UART: [fht] FMC Alias Private Key: 7
3,120,276 UART: [art] Derive CDI
3,120,556 UART: [art] Store in in slot 0x4
3,205,701 UART: [art] Derive Key Pair
3,206,061 UART: [art] Store priv key in slot 0x5
3,218,939 UART: [art] Derive Key Pair - Done
3,233,793 UART: [art] Signing Cert with AUTHO
3,234,273 UART: RITY.KEYID = 7
3,248,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,596 UART: [art] PUB.X = 12EB95CC04C362059D0A6C12CF06B57CEB6DEC0809EBC44BE2373BDF4A33E67FFF69DB78846FFEA1B33CE9DD10A0EF86
3,256,374 UART: [art] PUB.Y = 3B71A85EB821B9E1B8103E241D80AA49563232B25D517E2169EDEC11ADE8374EBC98BB63D9ABD3F39B279E9FD6A91037
3,263,334 UART: [art] SIG.R = E389D65F6DB2A8361D83AF5A80CBC2B609DF215E3AF86B5F8649FE0BC5995BF0C48AEDB443146948E6AA3A864C4AB53B
3,270,116 UART: [art] SIG.S = 57F91D4996175F072EF1BD1B78DDBD9CCE93EF0D2FB30ECC873716ECF96F770F7215FEFD7D394678E5BD7405192EA9C2
3,293,760 UART: Caliptra RT
3,294,013 UART: [state] CFI Enabled
3,401,710 UART: [rt] RT listening for mailbox commands...
3,402,380 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,442 UART: [rt]cmd =0x41544d4e, len=14344
3,669,977 >>> mbox cmd response data (8 bytes)
3,669,978 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,211 UART: [rt]cmd =0x41545348, len=116
3,721,607 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,843 UART: [state] LifecycleState = Unprovisioned
85,498 UART: [state] DebugLocked = No
86,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,826 UART: [kat] SHA2-256
881,757 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,872 UART: [kat] ++
886,024 UART: [kat] sha1
890,300 UART: [kat] SHA2-256
892,238 UART: [kat] SHA2-384
895,109 UART: [kat] SHA2-512-ACC
897,010 UART: [kat] ECC-384
902,627 UART: [kat] HMAC-384Kdf
907,243 UART: [kat] LMS
1,475,439 UART: [kat] --
1,476,544 UART: [cold-reset] ++
1,477,108 UART: [fht] Storing FHT @ 0x50003400
1,479,795 UART: [idev] ++
1,479,963 UART: [idev] CDI.KEYID = 6
1,480,323 UART: [idev] SUBJECT.KEYID = 7
1,480,747 UART: [idev] UDS.KEYID = 0
1,481,092 ready_for_fw is high
1,481,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,723 UART: [idev] Erasing UDS.KEYID = 0
1,505,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,205 UART: [idev] --
1,515,092 UART: [ldev] ++
1,515,260 UART: [ldev] CDI.KEYID = 6
1,515,623 UART: [ldev] SUBJECT.KEYID = 5
1,516,049 UART: [ldev] AUTHORITY.KEYID = 7
1,516,512 UART: [ldev] FE.KEYID = 1
1,521,586 UART: [ldev] Erasing FE.KEYID = 1
1,546,903 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,131 UART: [ldev] --
1,586,450 UART: [fwproc] Waiting for Commands...
1,587,319 UART: [fwproc] Received command 0x46574c44
1,588,110 UART: [fwproc] Received Image of size 114448 bytes
2,887,659 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,901 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,253 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,298 >>> mbox cmd response: success
3,081,380 UART: [afmc] ++
3,081,548 UART: [afmc] CDI.KEYID = 6
3,081,910 UART: [afmc] SUBJECT.KEYID = 7
3,082,335 UART: [afmc] AUTHORITY.KEYID = 5
3,117,638 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,098 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,878 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,491 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,181 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,030 UART: [afmc] --
3,161,128 UART: [cold-reset] --
3,162,152 UART: [state] Locking Datavault
3,163,419 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,023 UART: [state] Locking ICCM
3,164,673 UART: [exit] Launching FMC @ 0x40000130
3,170,002 UART:
3,170,018 UART: Running Caliptra FMC ...
3,170,426 UART:
3,170,569 UART: [state] CFI Enabled
3,181,082 UART: [fht] FMC Alias Private Key: 7
3,288,395 UART: [art] Extend RT PCRs Done
3,288,823 UART: [art] Lock RT PCRs Done
3,290,021 UART: [art] Populate DV Done
3,298,216 UART: [fht] FMC Alias Private Key: 7
3,299,228 UART: [art] Derive CDI
3,299,508 UART: [art] Store in in slot 0x4
3,385,513 UART: [art] Derive Key Pair
3,385,873 UART: [art] Store priv key in slot 0x5
3,399,917 UART: [art] Derive Key Pair - Done
3,414,631 UART: [art] Signing Cert with AUTHO
3,415,111 UART: RITY.KEYID = 7
3,430,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,104 UART: [art] PUB.X = 3ACC47838DD79F43656D1541C66C23D2FEF81F9438E79885BDA2B2933CBF0C55C9F38AB3FBFD19629724AC7E724FF7B6
3,437,883 UART: [art] PUB.Y = 6D450F536C445765C4D8E906C138DA28115D0993127CDB111F03BD558892712A04E2BF37DDB269C1B2C4DB75C6BB9D08
3,444,817 UART: [art] SIG.R = 9CF1A6D9C0A2BAEC765F9416FBC61CA2381296F4F0FC296C86897E46EA9482739DFD96B4C41D6C32F82986A33AFC6AF5
3,451,601 UART: [art] SIG.S = 2D7739522A9D82F15D64E5DE7DFBDD350C880DCE07F7925DD5EBF4FBD409D7E97AF2DCA8BFCCA4E8C644C6D3CB7C863C
3,476,088 UART: Caliptra RT
3,476,433 UART: [state] CFI Enabled
3,585,318 UART: [rt] RT listening for mailbox commands...
3,585,988 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,854 UART: [rt]cmd =0x41544d4e, len=14344
3,853,809 >>> mbox cmd response data (8 bytes)
3,853,810 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,713 UART: [rt]cmd =0x41545348, len=116
3,905,125 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,262 ready_for_fw is high
1,363,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,114 >>> mbox cmd response: success
2,990,992 UART:
2,991,008 UART: Running Caliptra FMC ...
2,991,416 UART:
2,991,559 UART: [state] CFI Enabled
3,002,020 UART: [fht] FMC Alias Private Key: 7
3,110,341 UART: [art] Extend RT PCRs Done
3,110,769 UART: [art] Lock RT PCRs Done
3,112,365 UART: [art] Populate DV Done
3,120,770 UART: [fht] FMC Alias Private Key: 7
3,121,744 UART: [art] Derive CDI
3,122,024 UART: [art] Store in in slot 0x4
3,207,869 UART: [art] Derive Key Pair
3,208,229 UART: [art] Store priv key in slot 0x5
3,221,069 UART: [art] Derive Key Pair - Done
3,235,663 UART: [art] Signing Cert with AUTHO
3,236,143 UART: RITY.KEYID = 7
3,251,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,674 UART: [art] PUB.X = 65CD3EA29EEA525C524F2D8693A744DE6A1EDFC1E9421B3E6364B10BCED5B69B67A4EEBD38064F81DDCC788D86C9633C
3,259,458 UART: [art] PUB.Y = 4A3196584F2CCCDDB41EF5C89C29FEC2A9F7C3D775EDF75E286408A258BE99401C1C6EE74731C7B2E880A2710DEDBA18
3,266,418 UART: [art] SIG.R = B5362CC4A7BB588512F7DE5640BA5FD0DACED02B7C92BC0C9C1E3465BF11042B284C93F26FB48BC679E80A6F10AD3496
3,273,195 UART: [art] SIG.S = FBB315CD17C67B48C1F9AA69BF320B7539AC56DD5DE4893CD6ADD021A81F2FF31A85ECEDEC570314D79DF284DD4C6EA6
3,297,004 UART: Caliptra RT
3,297,349 UART: [state] CFI Enabled
3,404,909 UART: [rt] RT listening for mailbox commands...
3,405,579 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,581 UART: [rt]cmd =0x41544d4e, len=14344
3,673,170 >>> mbox cmd response data (8 bytes)
3,673,171 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,296 UART: [rt]cmd =0x41545348, len=116
3,724,586 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,552 UART: [state] LifecycleState = Unprovisioned
86,207 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
87,976 UART: [kat] SHA2-256
893,626 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,751 UART: [kat] ++
897,903 UART: [kat] sha1
902,297 UART: [kat] SHA2-256
904,237 UART: [kat] SHA2-384
906,974 UART: [kat] SHA2-512-ACC
908,875 UART: [kat] ECC-384
918,448 UART: [kat] HMAC-384Kdf
923,006 UART: [kat] LMS
1,171,334 UART: [kat] --
1,172,347 UART: [cold-reset] ++
1,172,679 UART: [fht] FHT @ 0x50003400
1,175,294 UART: [idev] ++
1,175,462 UART: [idev] CDI.KEYID = 6
1,175,822 UART: [idev] SUBJECT.KEYID = 7
1,176,246 UART: [idev] UDS.KEYID = 0
1,176,591 ready_for_fw is high
1,176,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,408 UART: [idev] Erasing UDS.KEYID = 0
1,200,961 UART: [idev] Sha1 KeyId Algorithm
1,209,343 UART: [idev] --
1,210,503 UART: [ldev] ++
1,210,671 UART: [ldev] CDI.KEYID = 6
1,211,034 UART: [ldev] SUBJECT.KEYID = 5
1,211,460 UART: [ldev] AUTHORITY.KEYID = 7
1,211,923 UART: [ldev] FE.KEYID = 1
1,217,007 UART: [ldev] Erasing FE.KEYID = 1
1,242,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,565 UART: [ldev] --
1,281,978 UART: [fwproc] Wait for Commands...
1,282,646 UART: [fwproc] Recv command 0x46574c44
1,283,374 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,414 >>> mbox cmd response: success
2,776,448 UART: [afmc] ++
2,776,616 UART: [afmc] CDI.KEYID = 6
2,776,978 UART: [afmc] SUBJECT.KEYID = 7
2,777,403 UART: [afmc] AUTHORITY.KEYID = 5
2,812,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,693 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,306 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,025 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,783 UART: [afmc] --
2,855,671 UART: [cold-reset] --
2,856,441 UART: [state] Locking Datavault
2,857,486 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,090 UART: [state] Locking ICCM
2,858,762 UART: [exit] Launching FMC @ 0x40000130
2,864,091 UART:
2,864,107 UART: Running Caliptra FMC ...
2,864,515 UART:
2,864,569 UART: [state] CFI Enabled
2,875,106 UART: [fht] FMC Alias Private Key: 7
2,982,459 UART: [art] Extend RT PCRs Done
2,982,887 UART: [art] Lock RT PCRs Done
2,984,343 UART: [art] Populate DV Done
2,992,508 UART: [fht] FMC Alias Private Key: 7
2,993,644 UART: [art] Derive CDI
2,993,924 UART: [art] Store in in slot 0x4
3,079,379 UART: [art] Derive Key Pair
3,079,739 UART: [art] Store priv key in slot 0x5
3,093,031 UART: [art] Derive Key Pair - Done
3,107,638 UART: [art] Signing Cert with AUTHO
3,108,118 UART: RITY.KEYID = 7
3,123,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,787 UART: [art] PUB.X = 26F4C4D2810FBA6D9E11E03ADD6C1D06A24F2560BFBCA70DA347E6210FC99F803F7462A8341339E7B8DCDA9EB9DC420F
3,130,560 UART: [art] PUB.Y = 61ED1C8A64BD389780BA9C46AF089AF7184AB5F097FA351367DDBE4B9567011FBB954BA557A74FA942FC6D579DC84D93
3,137,516 UART: [art] SIG.R = 9F2CC1226373F3DF914B7ED6ECE9AD43F476859C16F5D0D6CAEB640DC289CEDD8BD901D9BDA8197708E18C451824B71B
3,144,293 UART: [art] SIG.S = 0B1FB2F16C1A40839F4AD8EC4C7DF37675BA4FF6EC48B7E430BC759DBE45E3F9214172B8BC9D5C9F2605FB0EC7DD04CB
3,168,528 UART: Caliptra RT
3,168,781 UART: [state] CFI Enabled
3,276,106 UART: [rt] RT listening for mailbox commands...
3,276,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,986 UART: [rt]cmd =0x41544d4e, len=14344
3,545,213 >>> mbox cmd response data (8 bytes)
3,545,214 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,339 UART: [rt]cmd =0x41545348, len=116
3,596,707 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,919 ready_for_fw is high
1,059,919 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,125 >>> mbox cmd response: success
2,689,857 UART:
2,689,873 UART: Running Caliptra FMC ...
2,690,281 UART:
2,690,335 UART: [state] CFI Enabled
2,700,816 UART: [fht] FMC Alias Private Key: 7
2,808,563 UART: [art] Extend RT PCRs Done
2,808,991 UART: [art] Lock RT PCRs Done
2,810,651 UART: [art] Populate DV Done
2,818,814 UART: [fht] FMC Alias Private Key: 7
2,819,928 UART: [art] Derive CDI
2,820,208 UART: [art] Store in in slot 0x4
2,905,903 UART: [art] Derive Key Pair
2,906,263 UART: [art] Store priv key in slot 0x5
2,919,099 UART: [art] Derive Key Pair - Done
2,933,840 UART: [art] Signing Cert with AUTHO
2,934,320 UART: RITY.KEYID = 7
2,949,276 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,041 UART: [art] PUB.X = 83E311E1F0E71AE9871AADE130DEA255BC22B14F6FC5B0DF40C6F863C3A65E486EAA15589672AAEA2D6279A78EE5A11F
2,956,829 UART: [art] PUB.Y = 4A53355CA6050AC1597F6B073A8EABC9BE41C86A92E974684ABD6DD22221DA0B6A37AB6F53FD5080CDBD5119D434AE85
2,963,781 UART: [art] SIG.R = 1C0FFF0B021C1CE05E80A57A9E1E188E4BBFE8DD2DDBF43F2D794CE097748B9826B7B26E74D122E539AD57CE51E5A5FE
2,970,564 UART: [art] SIG.S = 6B2AEB6872117BE63D56C9CC30EC04E6DC35ECC2FA880DB1933A4A67CA8004D5A601D9AC312569ABEC3FB407368107F2
2,994,121 UART: Caliptra RT
2,994,374 UART: [state] CFI Enabled
3,102,485 UART: [rt] RT listening for mailbox commands...
3,103,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,347 UART: [rt]cmd =0x41544d4e, len=14344
3,371,346 >>> mbox cmd response data (8 bytes)
3,371,347 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,344 UART: [rt]cmd =0x41545348, len=116
3,423,450 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
893,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,864 UART: [kat] ++
898,016 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
906,969 UART: [kat] SHA2-512-ACC
908,870 UART: [kat] ECC-384
918,715 UART: [kat] HMAC-384Kdf
923,377 UART: [kat] LMS
1,171,705 UART: [kat] --
1,172,446 UART: [cold-reset] ++
1,172,982 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 ready_for_fw is high
1,176,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,929 UART: [idev] Erasing UDS.KEYID = 0
1,202,024 UART: [idev] Sha1 KeyId Algorithm
1,210,498 UART: [idev] --
1,211,652 UART: [ldev] ++
1,211,820 UART: [ldev] CDI.KEYID = 6
1,212,183 UART: [ldev] SUBJECT.KEYID = 5
1,212,609 UART: [ldev] AUTHORITY.KEYID = 7
1,213,072 UART: [ldev] FE.KEYID = 1
1,218,424 UART: [ldev] Erasing FE.KEYID = 1
1,244,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,092 UART: [ldev] --
1,283,489 UART: [fwproc] Wait for Commands...
1,284,301 UART: [fwproc] Recv command 0x46574c44
1,285,029 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,454 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,435 >>> mbox cmd response: success
2,778,589 UART: [afmc] ++
2,778,757 UART: [afmc] CDI.KEYID = 6
2,779,119 UART: [afmc] SUBJECT.KEYID = 7
2,779,544 UART: [afmc] AUTHORITY.KEYID = 5
2,815,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,420 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,148 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,033 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,752 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,646 UART: [afmc] --
2,858,660 UART: [cold-reset] --
2,859,620 UART: [state] Locking Datavault
2,860,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,551 UART: [state] Locking ICCM
2,862,013 UART: [exit] Launching FMC @ 0x40000130
2,867,342 UART:
2,867,358 UART: Running Caliptra FMC ...
2,867,766 UART:
2,867,909 UART: [state] CFI Enabled
2,878,718 UART: [fht] FMC Alias Private Key: 7
2,985,987 UART: [art] Extend RT PCRs Done
2,986,415 UART: [art] Lock RT PCRs Done
2,987,781 UART: [art] Populate DV Done
2,996,254 UART: [fht] FMC Alias Private Key: 7
2,997,202 UART: [art] Derive CDI
2,997,482 UART: [art] Store in in slot 0x4
3,083,025 UART: [art] Derive Key Pair
3,083,385 UART: [art] Store priv key in slot 0x5
3,096,593 UART: [art] Derive Key Pair - Done
3,111,416 UART: [art] Signing Cert with AUTHO
3,111,896 UART: RITY.KEYID = 7
3,127,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,999 UART: [art] PUB.X = BAED14AE19E1739646EBDADB5277616B9AE3BDEE73F1D77ECFD824E3373BB8E601DF77133A092575276B33D7FD7D4621
3,134,777 UART: [art] PUB.Y = 8FC60FCD73FF5567F42EADE92869C9ECA4E6B6BEA450628E23BF89DA06DB26CAB66053DE61FB5102645691EA8546D641
3,141,732 UART: [art] SIG.R = 89853DA0FFDA08E4B40FB2013FFD232AF43578C17D5D657D3684A7DA11CCB3C550AD3F58361BDB0D20DB65569DACABCE
3,148,512 UART: [art] SIG.S = 63ED1CA93368D8D90699433D84E4A9A8ABBBE9A68D88E7385C21E689C933B17001EDD673D5DA189C34D0D8931435CE05
3,172,696 UART: Caliptra RT
3,173,041 UART: [state] CFI Enabled
3,281,516 UART: [rt] RT listening for mailbox commands...
3,282,186 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,920 UART: [rt]cmd =0x41544d4e, len=14344
3,549,677 >>> mbox cmd response data (8 bytes)
3,549,678 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,803 UART: [rt]cmd =0x41545348, len=116
3,601,271 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,084 ready_for_fw is high
1,061,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,384 >>> mbox cmd response: success
2,692,356 UART:
2,692,372 UART: Running Caliptra FMC ...
2,692,780 UART:
2,692,923 UART: [state] CFI Enabled
2,703,548 UART: [fht] FMC Alias Private Key: 7
2,812,187 UART: [art] Extend RT PCRs Done
2,812,615 UART: [art] Lock RT PCRs Done
2,813,969 UART: [art] Populate DV Done
2,822,216 UART: [fht] FMC Alias Private Key: 7
2,823,350 UART: [art] Derive CDI
2,823,630 UART: [art] Store in in slot 0x4
2,908,893 UART: [art] Derive Key Pair
2,909,253 UART: [art] Store priv key in slot 0x5
2,922,429 UART: [art] Derive Key Pair - Done
2,937,562 UART: [art] Signing Cert with AUTHO
2,938,042 UART: RITY.KEYID = 7
2,953,194 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,959 UART: [art] PUB.X = C50A859C33759EED28C8ABF3266EFE53F11C1EC83E7B35122307B6258AEEF3A9584F3A394A0602A7231FEBED10F32C05
2,960,724 UART: [art] PUB.Y = B4103E21A784A897092EB40895187EAFABFF705EF304825621FB99B81B9157E290198763E7889BE46507A295B3302FD2
2,967,654 UART: [art] SIG.R = 7B1F2C2846A0A986859DCC1415FBA45EB745F57D3B658FCB2114A0CBFFDFA71B67E226FD51A521AA28E460873BA26A7C
2,974,440 UART: [art] SIG.S = 3D09CF4148B1BA4E26BCCF1DB0A26B5F1C66415348D691019E287626E711FDB6E2BD0EFC06B1F21152555454496FAF4F
2,998,607 UART: Caliptra RT
2,998,952 UART: [state] CFI Enabled
3,106,435 UART: [rt] RT listening for mailbox commands...
3,107,105 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,017 UART: [rt]cmd =0x41544d4e, len=14344
3,375,062 >>> mbox cmd response data (8 bytes)
3,375,063 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,006 UART: [rt]cmd =0x41545348, len=116
3,426,630 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Unprovisioned
85,341 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,212 UART: [kat] SHA2-256
890,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,891 UART: [kat] ++
895,043 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
903,912 UART: [kat] SHA2-512-ACC
905,813 UART: [kat] ECC-384
915,662 UART: [kat] HMAC-384Kdf
920,272 UART: [kat] LMS
1,168,584 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,170,009 UART: [fht] FHT @ 0x50003400
1,172,695 UART: [idev] ++
1,172,863 UART: [idev] CDI.KEYID = 6
1,173,224 UART: [idev] SUBJECT.KEYID = 7
1,173,649 UART: [idev] UDS.KEYID = 0
1,173,995 ready_for_fw is high
1,173,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,095 UART: [idev] Erasing UDS.KEYID = 0
1,198,773 UART: [idev] Sha1 KeyId Algorithm
1,207,581 UART: [idev] --
1,208,530 UART: [ldev] ++
1,208,698 UART: [ldev] CDI.KEYID = 6
1,209,062 UART: [ldev] SUBJECT.KEYID = 5
1,209,489 UART: [ldev] AUTHORITY.KEYID = 7
1,209,952 UART: [ldev] FE.KEYID = 1
1,215,078 UART: [ldev] Erasing FE.KEYID = 1
1,241,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,634 UART: [ldev] --
1,281,042 UART: [fwproc] Wait for Commands...
1,281,789 UART: [fwproc] Recv command 0x46574c44
1,282,522 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,329 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,702 >>> mbox cmd response: success
2,774,763 UART: [afmc] ++
2,774,931 UART: [afmc] CDI.KEYID = 6
2,775,294 UART: [afmc] SUBJECT.KEYID = 7
2,775,720 UART: [afmc] AUTHORITY.KEYID = 5
2,811,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,318 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,037 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,716 UART: [afmc] --
2,854,704 UART: [cold-reset] --
2,855,694 UART: [state] Locking Datavault
2,856,781 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,385 UART: [state] Locking ICCM
2,857,907 UART: [exit] Launching FMC @ 0x40000130
2,863,236 UART:
2,863,252 UART: Running Caliptra FMC ...
2,863,660 UART:
2,863,714 UART: [state] CFI Enabled
2,873,985 UART: [fht] FMC Alias Private Key: 7
2,982,336 UART: [art] Extend RT PCRs Done
2,982,764 UART: [art] Lock RT PCRs Done
2,984,108 UART: [art] Populate DV Done
2,992,127 UART: [fht] FMC Alias Private Key: 7
2,993,125 UART: [art] Derive CDI
2,993,405 UART: [art] Store in in slot 0x4
3,079,060 UART: [art] Derive Key Pair
3,079,420 UART: [art] Store priv key in slot 0x5
3,092,502 UART: [art] Derive Key Pair - Done
3,107,324 UART: [art] Signing Cert with AUTHO
3,107,804 UART: RITY.KEYID = 7
3,123,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,037 UART: [art] PUB.X = 876D97062A6BA3646A3EEE8042581D72E9BF58FAD5050317106EE6E28F16413C18AC87D2385AE1697950360183EF0E0D
3,130,785 UART: [art] PUB.Y = AB99D1B7341B46049E98C19F0AFC1FFD1025C9A857A97141AA6070253C397F33E89E668AD50A6337DA49791C5BEB20D9
3,137,730 UART: [art] SIG.R = 5747A26B08BD221932B4038726D6C7ACA49CF97702DA11B10AEB2A093628F038DA31D4EEF6FBAC0399F53568DF42D144
3,144,488 UART: [art] SIG.S = 9531F2373B5B495B4C9D38CED08F6B61535A0DD7ED008BF825C98D4EA4C85E19E525F9F16EB8A0E48FBBA7DF01E71A65
3,168,223 UART: Caliptra RT
3,168,476 UART: [state] CFI Enabled
3,275,949 UART: [rt] RT listening for mailbox commands...
3,276,619 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,293 UART: [rt]cmd =0x41544d4e, len=14344
3,544,000 >>> mbox cmd response data (8 bytes)
3,544,001 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,258 UART: [rt]cmd =0x41545348, len=116
3,595,732 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,608 ready_for_fw is high
1,055,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,074 >>> mbox cmd response: success
2,687,634 UART:
2,687,650 UART: Running Caliptra FMC ...
2,688,058 UART:
2,688,112 UART: [state] CFI Enabled
2,698,745 UART: [fht] FMC Alias Private Key: 7
2,806,758 UART: [art] Extend RT PCRs Done
2,807,186 UART: [art] Lock RT PCRs Done
2,808,684 UART: [art] Populate DV Done
2,816,873 UART: [fht] FMC Alias Private Key: 7
2,817,901 UART: [art] Derive CDI
2,818,181 UART: [art] Store in in slot 0x4
2,903,820 UART: [art] Derive Key Pair
2,904,180 UART: [art] Store priv key in slot 0x5
2,917,098 UART: [art] Derive Key Pair - Done
2,932,175 UART: [art] Signing Cert with AUTHO
2,932,655 UART: RITY.KEYID = 7
2,948,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,016 UART: [art] PUB.X = 90EE59A162F2900C0FC61583ACF0C65BB2BDC7599678233B994FFBA28C27E6017DB0D04EDE67C0211C18C08735118599
2,955,779 UART: [art] PUB.Y = 73F3C33E30300FD2D389BDEFB26AF42D0303635FE1722F7306E832FFD5BFECB43F6182AD1EBCBC1127BFF23B8777107D
2,962,733 UART: [art] SIG.R = F248C9A69605D00452B95FD2F9148EBD280691DB3996A3EBD0B8CB8158478ACD67788866483806BF27553A1568C90DB9
2,969,484 UART: [art] SIG.S = 582C6A89FC9C58DF6D61E5BE8B428313C75DB3C35C330CF0C68E510C7BFE39FA0077F2FBF7882641EF1814BD4B5CCC9A
2,993,093 UART: Caliptra RT
2,993,346 UART: [state] CFI Enabled
3,100,467 UART: [rt] RT listening for mailbox commands...
3,101,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,249 UART: [rt]cmd =0x41544d4e, len=14344
3,369,080 >>> mbox cmd response data (8 bytes)
3,369,081 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,252 UART: [rt]cmd =0x41545348, len=116
3,420,296 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,011 UART: [state] LifecycleState = Unprovisioned
86,666 UART: [state] DebugLocked = No
87,366 UART: [state] WD Timer not started. Device not locked for debugging
88,485 UART: [kat] SHA2-256
892,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,164 UART: [kat] ++
896,316 UART: [kat] sha1
900,496 UART: [kat] SHA2-256
902,436 UART: [kat] SHA2-384
905,121 UART: [kat] SHA2-512-ACC
907,022 UART: [kat] ECC-384
916,751 UART: [kat] HMAC-384Kdf
921,485 UART: [kat] LMS
1,169,797 UART: [kat] --
1,170,526 UART: [cold-reset] ++
1,170,934 UART: [fht] FHT @ 0x50003400
1,173,582 UART: [idev] ++
1,173,750 UART: [idev] CDI.KEYID = 6
1,174,111 UART: [idev] SUBJECT.KEYID = 7
1,174,536 UART: [idev] UDS.KEYID = 0
1,174,882 ready_for_fw is high
1,174,882 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,414 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,215,821 UART: [ldev] Erasing FE.KEYID = 1
1,242,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,113 UART: [ldev] --
1,281,389 UART: [fwproc] Wait for Commands...
1,282,090 UART: [fwproc] Recv command 0x46574c44
1,282,823 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,397 >>> mbox cmd response: success
2,775,508 UART: [afmc] ++
2,775,676 UART: [afmc] CDI.KEYID = 6
2,776,039 UART: [afmc] SUBJECT.KEYID = 7
2,776,465 UART: [afmc] AUTHORITY.KEYID = 5
2,812,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,641 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,370 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,253 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,972 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,671 UART: [afmc] --
2,855,579 UART: [cold-reset] --
2,856,259 UART: [state] Locking Datavault
2,857,378 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,982 UART: [state] Locking ICCM
2,858,588 UART: [exit] Launching FMC @ 0x40000130
2,863,917 UART:
2,863,933 UART: Running Caliptra FMC ...
2,864,341 UART:
2,864,484 UART: [state] CFI Enabled
2,874,847 UART: [fht] FMC Alias Private Key: 7
2,982,362 UART: [art] Extend RT PCRs Done
2,982,790 UART: [art] Lock RT PCRs Done
2,984,430 UART: [art] Populate DV Done
2,992,811 UART: [fht] FMC Alias Private Key: 7
2,993,807 UART: [art] Derive CDI
2,994,087 UART: [art] Store in in slot 0x4
3,079,912 UART: [art] Derive Key Pair
3,080,272 UART: [art] Store priv key in slot 0x5
3,093,696 UART: [art] Derive Key Pair - Done
3,108,122 UART: [art] Signing Cert with AUTHO
3,108,602 UART: RITY.KEYID = 7
3,123,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,541 UART: [art] PUB.X = 854E2CF485AEA02325BEBA60CE250B1EC0BE80A6E0AA130323FFBCA9745EE7E8C182572F53B3747AC1615202CE7C288F
3,131,316 UART: [art] PUB.Y = AF14CB2C8AE55B310D2AC990D42223792935A2723665927BFE0CFDF0562EF77875C69ADAD5B80E7A3E9E0BFF601F7AF2
3,138,268 UART: [art] SIG.R = 72B7F2484DE8D0D24B248CFCAA1E6853914D26BFAEEF79E6231A8886612C232523B8937EEC00B35A3AF733831F0423DD
3,145,019 UART: [art] SIG.S = 1BD874D919448E4D79819A5B31572C0B956955582D59CBADA8C4A5D2E3BB0985398516E07455CAEEB8AF7C7360E3CC52
3,169,174 UART: Caliptra RT
3,169,519 UART: [state] CFI Enabled
3,277,174 UART: [rt] RT listening for mailbox commands...
3,277,844 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,878 UART: [rt]cmd =0x41544d4e, len=14344
3,545,819 >>> mbox cmd response data (8 bytes)
3,545,820 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,023 UART: [rt]cmd =0x41545348, len=116
3,597,519 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,767 ready_for_fw is high
1,056,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,519 >>> mbox cmd response: success
2,687,927 UART:
2,687,943 UART: Running Caliptra FMC ...
2,688,351 UART:
2,688,494 UART: [state] CFI Enabled
2,699,485 UART: [fht] FMC Alias Private Key: 7
2,807,860 UART: [art] Extend RT PCRs Done
2,808,288 UART: [art] Lock RT PCRs Done
2,809,664 UART: [art] Populate DV Done
2,817,885 UART: [fht] FMC Alias Private Key: 7
2,818,967 UART: [art] Derive CDI
2,819,247 UART: [art] Store in in slot 0x4
2,905,054 UART: [art] Derive Key Pair
2,905,414 UART: [art] Store priv key in slot 0x5
2,918,478 UART: [art] Derive Key Pair - Done
2,933,172 UART: [art] Signing Cert with AUTHO
2,933,652 UART: RITY.KEYID = 7
2,948,772 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,537 UART: [art] PUB.X = C3A19CF322266F04567CD20A1141ED202091DDA9BBB19DDAE0BBD27D97843B7BF4A43950F751C67B202E19F9EAED6FA7
2,956,317 UART: [art] PUB.Y = 3250E8C4D32E1D1842D109026888786211D85FA0066D429B2FD3266082D0A5B3AF15F7FE4FE6D9657A572E8D41579BC9
2,963,254 UART: [art] SIG.R = 3E958C83AF72B709F6CF59060E9B8D2C51E9E26D8DC310F9B702EE9D6641D315CBB5E5D1DB4F2D47B54200695B35C2D7
2,970,000 UART: [art] SIG.S = 0EE6612A5761D36D03184FD8459583C6A776D5A5C4887279FAB22C0C2A3A4278210DE5D8A115284D3ACC3211DE761C36
2,993,331 UART: Caliptra RT
2,993,676 UART: [state] CFI Enabled
3,101,473 UART: [rt] RT listening for mailbox commands...
3,102,143 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,365 UART: [rt]cmd =0x41544d4e, len=14344
3,370,082 >>> mbox cmd response data (8 bytes)
3,370,083 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,928 UART: [rt]cmd =0x41545348, len=116
3,420,604 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,129 UART:
192,485 UART: Running Caliptra ROM ...
193,698 UART:
193,855 UART: [state] CFI Enabled
267,691 UART: [state] LifecycleState = Unprovisioned
269,667 UART: [state] DebugLocked = No
270,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,351 UART: [kat] SHA2-256
445,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,578 UART: [kat] ++
456,028 UART: [kat] sha1
465,985 UART: [kat] SHA2-256
468,635 UART: [kat] SHA2-384
474,202 UART: [kat] SHA2-512-ACC
476,573 UART: [kat] ECC-384
2,768,339 UART: [kat] HMAC-384Kdf
2,799,258 UART: [kat] LMS
3,989,549 UART: [kat] --
3,994,270 UART: [cold-reset] ++
3,996,486 UART: [fht] Storing FHT @ 0x50003400
4,007,842 UART: [idev] ++
4,008,452 UART: [idev] CDI.KEYID = 6
4,009,397 UART: [idev] SUBJECT.KEYID = 7
4,010,578 UART: [idev] UDS.KEYID = 0
4,011,592 ready_for_fw is high
4,011,816 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,209 UART: [idev] Erasing UDS.KEYID = 0
7,345,248 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,322 UART: [idev] --
7,371,565 UART: [ldev] ++
7,372,196 UART: [ldev] CDI.KEYID = 6
7,373,084 UART: [ldev] SUBJECT.KEYID = 5
7,374,353 UART: [ldev] AUTHORITY.KEYID = 7
7,375,536 UART: [ldev] FE.KEYID = 1
7,422,317 UART: [ldev] Erasing FE.KEYID = 1
10,756,917 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,095 UART: [ldev] --
13,138,713 UART: [fwproc] Waiting for Commands...
13,141,023 UART: [fwproc] Received command 0x46574c44
13,143,206 UART: [fwproc] Received Image of size 114124 bytes
17,200,706 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,276,609 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,345,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,663,009 >>> mbox cmd response: success
17,666,432 UART: [afmc] ++
17,667,028 UART: [afmc] CDI.KEYID = 6
17,667,945 UART: [afmc] SUBJECT.KEYID = 7
17,669,162 UART: [afmc] AUTHORITY.KEYID = 5
21,024,312 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,323,189 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,325,444 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,339,857 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,354,702 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,369,165 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,391,013 UART: [afmc] --
23,395,644 UART: [cold-reset] --
23,399,615 UART: [state] Locking Datavault
23,404,700 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,458 UART: [state] Locking ICCM
23,407,746 UART: [exit] Launching FMC @ 0x40000130
23,416,144 UART:
23,416,384 UART: Running Caliptra FMC ...
23,417,486 UART:
23,417,644 UART: [state] CFI Enabled
23,482,060 UART: [fht] FMC Alias Private Key: 7
25,820,692 UART: [art] Extend RT PCRs Done
25,821,920 UART: [art] Lock RT PCRs Done
25,823,550 UART: [art] Populate DV Done
25,829,020 UART: [fht] FMC Alias Private Key: 7
25,830,691 UART: [art] Derive CDI
25,831,515 UART: [art] Store in in slot 0x4
25,890,089 UART: [art] Derive Key Pair
25,891,133 UART: [art] Store priv key in slot 0x5
29,183,750 UART: [art] Derive Key Pair - Done
29,196,693 UART: [art] Signing Cert with AUTHO
29,197,994 UART: RITY.KEYID = 7
31,485,373 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,880 UART: [art] PUB.X = CCBC88D3496A877A8F7740740F5DD16A4DF414771300C6DB7278C98782C7D998473C90603EB457604602DAB3822C6D9F
31,494,070 UART: [art] PUB.Y = 24B70E68BAA5D89FF93B512D656175C1429ADA309ADA9B4E264B6CFC87FC55EDB4AF0F81D2B4369B977AD6E60D03E5EF
31,501,364 UART: [art] SIG.R = 42FE4E8B815542694EAB6BD4AF95FD5799E6D1F7EE33976FE8500EC906422E3D4B4395161565BBD3B9E94AA1DDC91EBA
31,508,818 UART: [art] SIG.S = 988A0430FE61200F3FA49ADE7508B70DBCF6ACA3DAF8D4C02A3C61195D44CDC3FFDA1F28FDF9B9CD36B3450E888F1872
32,814,236 UART: Caliptra RT
32,814,942 UART: [state] CFI Enabled
32,973,882 UART: [rt] RT listening for mailbox commands...
32,976,311 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,131,666 UART: [rt]cmd =0x41544d4e, len=14344
38,366,849 >>> mbox cmd response data (8 bytes)
38,367,454 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,397,971 UART: [rt]cmd =0x41545348, len=116
38,417,843 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,782,581 ready_for_fw is high
3,782,962 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,838,007 >>> mbox cmd response: success
23,519,739 UART:
23,520,139 UART: Running Caliptra FMC ...
23,521,244 UART:
23,521,400 UART: [state] CFI Enabled
23,592,075 UART: [fht] FMC Alias Private Key: 7
25,930,028 UART: [art] Extend RT PCRs Done
25,931,250 UART: [art] Lock RT PCRs Done
25,933,037 UART: [art] Populate DV Done
25,938,505 UART: [fht] FMC Alias Private Key: 7
25,940,157 UART: [art] Derive CDI
25,940,978 UART: [art] Store in in slot 0x4
26,001,512 UART: [art] Derive Key Pair
26,002,554 UART: [art] Store priv key in slot 0x5
29,295,317 UART: [art] Derive Key Pair - Done
29,308,371 UART: [art] Signing Cert with AUTHO
29,309,679 UART: RITY.KEYID = 7
31,596,206 UART: [art] Erasing AUTHORITY.KEYID = 7
31,597,719 UART: [art] PUB.X = 6EFB737DB6F43288F1CB9BA96EF5F445FA55BAAE0169E4AF802F08CB680648D81D400AC875D6A2014BAF969DAF7333F0
31,604,944 UART: [art] PUB.Y = FCAE6C1DA5307FF07C778EFE6458606BC6E9F6783D29696A6D9DB94E8F20484B5721F01FA9329DE482098E9FF5D507E8
31,612,226 UART: [art] SIG.R = DC8FD2F6BE45DE701D5AF75FD02AB9700161FC733BAB0DADC2BF9696D6C9512AAF496DAE9D8A41A9342AE43B56645C95
31,619,595 UART: [art] SIG.S = DE6674FA239CED80925E2729B664016DDD1F501CD3F7E686AE4F42EE6CD00AF5A5F1161E762E0E1B195E7814C49BAF29
32,924,853 UART: Caliptra RT
32,925,558 UART: [state] CFI Enabled
33,085,221 UART: [rt] RT listening for mailbox commands...
33,087,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,243,414 UART: [rt]cmd =0x41544d4e, len=14344
38,478,887 >>> mbox cmd response data (8 bytes)
38,479,455 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,510,081 UART: [rt]cmd =0x41545348, len=116
38,530,010 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,450 UART:
192,826 UART: Running Caliptra ROM ...
193,936 UART:
603,833 UART: [state] CFI Enabled
616,443 UART: [state] LifecycleState = Unprovisioned
618,393 UART: [state] DebugLocked = No
620,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,995 UART: [kat] SHA2-256
795,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,282 UART: [kat] ++
806,795 UART: [kat] sha1
818,579 UART: [kat] SHA2-256
821,288 UART: [kat] SHA2-384
827,125 UART: [kat] SHA2-512-ACC
829,499 UART: [kat] ECC-384
3,112,954 UART: [kat] HMAC-384Kdf
3,124,190 UART: [kat] LMS
4,314,321 UART: [kat] --
4,317,898 UART: [cold-reset] ++
4,318,968 UART: [fht] Storing FHT @ 0x50003400
4,329,234 UART: [idev] ++
4,329,802 UART: [idev] CDI.KEYID = 6
4,330,701 UART: [idev] SUBJECT.KEYID = 7
4,331,937 UART: [idev] UDS.KEYID = 0
4,333,013 ready_for_fw is high
4,333,200 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,508 UART: [idev] Erasing UDS.KEYID = 0
7,619,525 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,740 UART: [idev] --
7,643,435 UART: [ldev] ++
7,643,997 UART: [ldev] CDI.KEYID = 6
7,644,928 UART: [ldev] SUBJECT.KEYID = 5
7,646,103 UART: [ldev] AUTHORITY.KEYID = 7
7,647,464 UART: [ldev] FE.KEYID = 1
7,658,515 UART: [ldev] Erasing FE.KEYID = 1
10,948,976 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,117 UART: [ldev] --
13,307,701 UART: [fwproc] Waiting for Commands...
13,310,597 UART: [fwproc] Received command 0x46574c44
13,312,775 UART: [fwproc] Received Image of size 114124 bytes
17,363,867 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,611 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,821,467 >>> mbox cmd response: success
17,825,790 UART: [afmc] ++
17,826,451 UART: [afmc] CDI.KEYID = 6
17,827,367 UART: [afmc] SUBJECT.KEYID = 7
17,828,470 UART: [afmc] AUTHORITY.KEYID = 5
21,142,247 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,000 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,226 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,639 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,455 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,896 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,804 UART: [afmc] --
23,508,160 UART: [cold-reset] --
23,512,331 UART: [state] Locking Datavault
23,516,395 UART: [state] Locking PCR0, PCR1 and PCR31
23,518,152 UART: [state] Locking ICCM
23,520,514 UART: [exit] Launching FMC @ 0x40000130
23,528,907 UART:
23,529,158 UART: Running Caliptra FMC ...
23,530,258 UART:
23,530,410 UART: [state] CFI Enabled
23,538,664 UART: [fht] FMC Alias Private Key: 7
25,869,640 UART: [art] Extend RT PCRs Done
25,870,858 UART: [art] Lock RT PCRs Done
25,872,747 UART: [art] Populate DV Done
25,878,157 UART: [fht] FMC Alias Private Key: 7
25,879,636 UART: [art] Derive CDI
25,880,391 UART: [art] Store in in slot 0x4
25,923,468 UART: [art] Derive Key Pair
25,924,508 UART: [art] Store priv key in slot 0x5
29,166,481 UART: [art] Derive Key Pair - Done
29,179,421 UART: [art] Signing Cert with AUTHO
29,180,731 UART: RITY.KEYID = 7
31,460,300 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,819 UART: [art] PUB.X = 581F2AE81797B55387D6C2526841633780AF4E2542E13BB86E117E99B634BD05668B9A37C704DFA877A3F58E5910F97D
31,469,026 UART: [art] PUB.Y = ABCE1CFDAE4A306536182BBB643C0F06CBCAA36D051ABE8B318DD789C84C10659EC537FBE177123EC83E56DD6BDB4556
31,476,289 UART: [art] SIG.R = B13FB53C4C15864772025DB56FBAD50E44C9C377639F8990D4D5385354B4D75EF905E24D639B37034F89E62DE0208614
31,483,654 UART: [art] SIG.S = A779701B456FC732698380C7D76D9076C84CFF9B767D5E5ED90DB894CE0DD241A5A37DA06EE82511930477B9A230BFA9
32,789,406 UART: Caliptra RT
32,790,146 UART: [state] CFI Enabled
32,907,803 UART: [rt] RT listening for mailbox commands...
32,910,234 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,065,541 UART: [rt]cmd =0x41544d4e, len=14344
38,301,170 >>> mbox cmd response data (8 bytes)
38,301,778 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,332,793 UART: [rt]cmd =0x41545348, len=116
38,353,058 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,596 writing to cptra_bootfsm_go
4,124,784 ready_for_fw is high
4,125,291 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,061,611 >>> mbox cmd response: success
23,700,074 UART:
23,700,460 UART: Running Caliptra FMC ...
23,701,564 UART:
23,701,711 UART: [state] CFI Enabled
23,710,037 UART: [fht] FMC Alias Private Key: 7
26,041,160 UART: [art] Extend RT PCRs Done
26,042,394 UART: [art] Lock RT PCRs Done
26,044,097 UART: [art] Populate DV Done
26,049,729 UART: [fht] FMC Alias Private Key: 7
26,051,343 UART: [art] Derive CDI
26,052,079 UART: [art] Store in in slot 0x4
26,094,627 UART: [art] Derive Key Pair
26,095,669 UART: [art] Store priv key in slot 0x5
29,337,826 UART: [art] Derive Key Pair - Done
29,350,557 UART: [art] Signing Cert with AUTHO
29,351,900 UART: RITY.KEYID = 7
31,631,389 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,894 UART: [art] PUB.X = D58B4A9CC733277B0B413C01AB5F96311A17AD89BFDFBF30CAA6F7BDC3BE7820DB7B447D0BA1F7508D5A7BFAEB9FA3FC
31,640,174 UART: [art] PUB.Y = 7722002858D8A4F083B8CDDC9CC19F79144E590627E2E0C6C7989A3785AD6980E1435F050A4500D4F0A3DFD19B72EE9C
31,647,364 UART: [art] SIG.R = 1F3761A8FA95456B250450AE99BE9DD4B4A31D2F2D3195657FD6ADEB7E0C99F3B31821EC2D4A8A645DBBA90C7460DDFA
31,654,795 UART: [art] SIG.S = 155D99427599D58706E6B4D3308B35CB1D2F2734EBE5CB0428E28831F40F6012C15A7A51E54071E79F7FE6B42E3A3B30
32,959,539 UART: Caliptra RT
32,960,250 UART: [state] CFI Enabled
33,078,447 UART: [rt] RT listening for mailbox commands...
33,080,822 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,236,166 UART: [rt]cmd =0x41544d4e, len=14344
38,471,360 >>> mbox cmd response data (8 bytes)
38,472,018 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,502,653 UART: [rt]cmd =0x41545348, len=116
38,522,891 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,065 UART:
192,428 UART: Running Caliptra ROM ...
193,634 UART:
193,785 UART: [state] CFI Enabled
253,625 UART: [state] LifecycleState = Unprovisioned
255,529 UART: [state] DebugLocked = No
258,264 UART: [state] WD Timer not started. Device not locked for debugging
261,355 UART: [kat] SHA2-256
440,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,078 UART: [kat] ++
452,617 UART: [kat] sha1
464,421 UART: [kat] SHA2-256
467,504 UART: [kat] SHA2-384
473,988 UART: [kat] SHA2-512-ACC
476,968 UART: [kat] ECC-384
2,933,447 UART: [kat] HMAC-384Kdf
2,958,589 UART: [kat] LMS
3,487,973 UART: [kat] --
3,493,740 UART: [cold-reset] ++
3,494,602 UART: [fht] FHT @ 0x50003400
3,505,077 UART: [idev] ++
3,505,650 UART: [idev] CDI.KEYID = 6
3,506,578 UART: [idev] SUBJECT.KEYID = 7
3,507,753 UART: [idev] UDS.KEYID = 0
3,508,678 ready_for_fw is high
3,508,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,652,919 UART: [idev] Erasing UDS.KEYID = 0
6,013,162 UART: [idev] Sha1 KeyId Algorithm
6,036,336 UART: [idev] --
6,039,294 UART: [ldev] ++
6,039,864 UART: [ldev] CDI.KEYID = 6
6,040,777 UART: [ldev] SUBJECT.KEYID = 5
6,041,957 UART: [ldev] AUTHORITY.KEYID = 7
6,043,193 UART: [ldev] FE.KEYID = 1
6,087,011 UART: [ldev] Erasing FE.KEYID = 1
8,591,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,516 UART: [ldev] --
10,402,010 UART: [fwproc] Wait for Commands...
10,404,869 UART: [fwproc] Recv command 0x46574c44
10,406,903 UART: [fwproc] Recv'd Img size: 114448 bytes
13,807,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,880,854 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,949,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,267,389 >>> mbox cmd response: success
14,272,242 UART: [afmc] ++
14,272,837 UART: [afmc] CDI.KEYID = 6
14,273,745 UART: [afmc] SUBJECT.KEYID = 7
14,274,904 UART: [afmc] AUTHORITY.KEYID = 5
16,816,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,540,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,542,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,558,205 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,574,200 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,590,085 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,611,952 UART: [afmc] --
18,615,865 UART: [cold-reset] --
18,620,151 UART: [state] Locking Datavault
18,626,803 UART: [state] Locking PCR0, PCR1 and PCR31
18,628,443 UART: [state] Locking ICCM
18,631,131 UART: [exit] Launching FMC @ 0x40000130
18,639,546 UART:
18,639,827 UART: Running Caliptra FMC ...
18,640,936 UART:
18,641,100 UART: [state] CFI Enabled
18,700,965 UART: [fht] FMC Alias Private Key: 7
20,465,714 UART: [art] Extend RT PCRs Done
20,466,927 UART: [art] Lock RT PCRs Done
20,468,704 UART: [art] Populate DV Done
20,474,273 UART: [fht] FMC Alias Private Key: 7
20,475,845 UART: [art] Derive CDI
20,476,592 UART: [art] Store in in slot 0x4
20,533,573 UART: [art] Derive Key Pair
20,534,572 UART: [art] Store priv key in slot 0x5
22,998,152 UART: [art] Derive Key Pair - Done
23,010,762 UART: [art] Signing Cert with AUTHO
23,012,068 UART: RITY.KEYID = 7
24,724,212 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,710 UART: [art] PUB.X = 210DA6A02D8EACB20535920487B9C1EE801A61F111B749E59755DD63E6F05689E1B7D02175020A4299C65CEB875CF224
24,732,964 UART: [art] PUB.Y = 0744CFDAC5097B135F49861BF70D8620F0420DBBAFEF7A3CDA076888B883A4745316D7D4954516473442B867C5867011
24,740,205 UART: [art] SIG.R = 789FF624BDFA84CD155139FAE172C3006A9EA31B962C6551218E41BE3747B609641293384ABC4BA7BEE3053FC0C546FD
24,747,555 UART: [art] SIG.S = 6AF0A13CBF22B25012F04290631AFDC7D9E8B0767D53926348F2B38E7E18A8EFF6304F2802925A2C6DCA3A06559C118E
25,725,854 UART: Caliptra RT
25,726,539 UART: [state] CFI Enabled
25,893,184 UART: [rt] RT listening for mailbox commands...
25,895,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,051,709 UART: [rt]cmd =0x41544d4e, len=14344
29,981,967 >>> mbox cmd response data (8 bytes)
29,982,619 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,013,495 UART: [rt]cmd =0x41545348, len=116
30,033,715 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,384,930 ready_for_fw is high
3,385,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,081,638 >>> mbox cmd response: success
18,364,411 UART:
18,364,801 UART: Running Caliptra FMC ...
18,365,996 UART:
18,366,354 UART: [state] CFI Enabled
18,430,885 UART: [fht] FMC Alias Private Key: 7
20,195,307 UART: [art] Extend RT PCRs Done
20,196,539 UART: [art] Lock RT PCRs Done
20,198,227 UART: [art] Populate DV Done
20,203,576 UART: [fht] FMC Alias Private Key: 7
20,205,170 UART: [art] Derive CDI
20,205,982 UART: [art] Store in in slot 0x4
20,263,632 UART: [art] Derive Key Pair
20,264,656 UART: [art] Store priv key in slot 0x5
22,727,611 UART: [art] Derive Key Pair - Done
22,740,182 UART: [art] Signing Cert with AUTHO
22,741,507 UART: RITY.KEYID = 7
24,453,049 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,558 UART: [art] PUB.X = E31997C7E788895C7AF3EA50A37B2F7C1D3443F90AF2E62C9182690E24D891C8EAFFDFAE3AC5352E07CDC3C2D9D58FE7
24,461,804 UART: [art] PUB.Y = 6AD98D6B60CFED92393E25568901C6E27884C3BB85CE263BE78D293D827D8DF01ED1854F10980746ADCCB8AC9F926386
24,469,125 UART: [art] SIG.R = FAE9198DF3422FB84ED397B834D0EA99803229DEDC569E89B438F73B19E52EFCAAD0E1576EC8A207D3D09681C8AA2D10
24,476,514 UART: [art] SIG.S = A0920A061643DF0485C114E7C8E7DBF93BF4BB23AFB84611EBF1FBF5CFAA6DFAF5CE77723817939EE5DC198CACE36064
25,455,609 UART: Caliptra RT
25,456,299 UART: [state] CFI Enabled
25,619,251 UART: [rt] RT listening for mailbox commands...
25,621,692 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,777,545 UART: [rt]cmd =0x41544d4e, len=14344
29,707,886 >>> mbox cmd response data (8 bytes)
29,708,458 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,739,413 UART: [rt]cmd =0x41545348, len=116
29,759,412 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,475 UART:
192,956 UART: Running Caliptra ROM ...
194,120 UART:
603,604 UART: [state] CFI Enabled
619,687 UART: [state] LifecycleState = Unprovisioned
621,570 UART: [state] DebugLocked = No
624,360 UART: [state] WD Timer not started. Device not locked for debugging
627,525 UART: [kat] SHA2-256
806,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,176 UART: [kat] ++
818,618 UART: [kat] sha1
830,472 UART: [kat] SHA2-256
833,493 UART: [kat] SHA2-384
841,179 UART: [kat] SHA2-512-ACC
844,178 UART: [kat] ECC-384
3,287,515 UART: [kat] HMAC-384Kdf
3,298,687 UART: [kat] LMS
3,828,169 UART: [kat] --
3,832,956 UART: [cold-reset] ++
3,834,812 UART: [fht] FHT @ 0x50003400
3,845,915 UART: [idev] ++
3,846,481 UART: [idev] CDI.KEYID = 6
3,847,361 UART: [idev] SUBJECT.KEYID = 7
3,848,594 UART: [idev] UDS.KEYID = 0
3,849,484 ready_for_fw is high
3,849,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,328 UART: [idev] Erasing UDS.KEYID = 0
6,318,250 UART: [idev] Sha1 KeyId Algorithm
6,342,144 UART: [idev] --
6,347,544 UART: [ldev] ++
6,348,105 UART: [ldev] CDI.KEYID = 6
6,348,983 UART: [ldev] SUBJECT.KEYID = 5
6,350,236 UART: [ldev] AUTHORITY.KEYID = 7
6,351,460 UART: [ldev] FE.KEYID = 1
6,362,287 UART: [ldev] Erasing FE.KEYID = 1
8,836,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,189 UART: [ldev] --
10,626,368 UART: [fwproc] Wait for Commands...
10,629,159 UART: [fwproc] Recv command 0x46574c44
10,631,241 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,306 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,494,886 >>> mbox cmd response: success
14,498,397 UART: [afmc] ++
14,498,982 UART: [afmc] CDI.KEYID = 6
14,499,861 UART: [afmc] SUBJECT.KEYID = 7
14,501,072 UART: [afmc] AUTHORITY.KEYID = 5
17,000,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,812 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,823 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,706 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,697 UART: [afmc] --
18,796,049 UART: [cold-reset] --
18,800,888 UART: [state] Locking Datavault
18,806,744 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,392 UART: [state] Locking ICCM
18,810,010 UART: [exit] Launching FMC @ 0x40000130
18,818,462 UART:
18,818,690 UART: Running Caliptra FMC ...
18,819,782 UART:
18,819,935 UART: [state] CFI Enabled
18,828,136 UART: [fht] FMC Alias Private Key: 7
20,584,721 UART: [art] Extend RT PCRs Done
20,585,952 UART: [art] Lock RT PCRs Done
20,587,709 UART: [art] Populate DV Done
20,593,121 UART: [fht] FMC Alias Private Key: 7
20,594,654 UART: [art] Derive CDI
20,595,381 UART: [art] Store in in slot 0x4
20,638,130 UART: [art] Derive Key Pair
20,639,186 UART: [art] Store priv key in slot 0x5
23,066,599 UART: [art] Derive Key Pair - Done
23,079,755 UART: [art] Signing Cert with AUTHO
23,081,058 UART: RITY.KEYID = 7
24,786,349 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,852 UART: [art] PUB.X = CFAF0044A7E90B3F8D9BA190DF9E25DD51F2847902362EFEDC16FA3979F99F860FEBC25E80C8755530FBB1A26C23764B
24,795,127 UART: [art] PUB.Y = EFCABDDE3350F64387A424F91CCB5F95676BF19665EDC19865008633AAA674B1690ADBAE407E522F0C37A386CBE88755
24,802,370 UART: [art] SIG.R = 5EE46ECF065E00FD21C116FCDDA2F038B4A55733C86C005D6C958E070BE3DDC318469337C2EFC67A0748D37561B2D158
24,809,753 UART: [art] SIG.S = AF8C2D5BFEEA245259DBE80A3EF71FC316DCEE205A6AF1EDC30FD7495964631A05A3DB7BC9262CA20F0CDB67CDF062B1
25,788,917 UART: Caliptra RT
25,789,602 UART: [state] CFI Enabled
25,906,423 UART: [rt] RT listening for mailbox commands...
25,908,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,064,114 UART: [rt]cmd =0x41544d4e, len=14344
29,994,520 >>> mbox cmd response data (8 bytes)
29,995,117 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,025,715 UART: [rt]cmd =0x41545348, len=116
30,045,507 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,695,999 ready_for_fw is high
3,697,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,112 >>> mbox cmd response: success
18,536,266 UART:
18,536,661 UART: Running Caliptra FMC ...
18,537,765 UART:
18,537,912 UART: [state] CFI Enabled
18,546,284 UART: [fht] FMC Alias Private Key: 7
20,302,844 UART: [art] Extend RT PCRs Done
20,304,060 UART: [art] Lock RT PCRs Done
20,305,826 UART: [art] Populate DV Done
20,311,382 UART: [fht] FMC Alias Private Key: 7
20,312,970 UART: [art] Derive CDI
20,313,704 UART: [art] Store in in slot 0x4
20,356,295 UART: [art] Derive Key Pair
20,357,358 UART: [art] Store priv key in slot 0x5
22,784,163 UART: [art] Derive Key Pair - Done
22,797,157 UART: [art] Signing Cert with AUTHO
22,798,459 UART: RITY.KEYID = 7
24,503,936 UART: [art] Erasing AUTHORITY.KEYID = 7
24,505,431 UART: [art] PUB.X = 88B2F2BAF062D8D4A8E22640515E7665FAE7BD37E7C75881904F20D7C10AD45E5735476239903047FBB799C09B115D50
24,512,645 UART: [art] PUB.Y = 910B8923CED47836DBADE9AAA3BDD8FBEFE58EAC19692EEC9325CF5AEB997007840A2BE50C9BA598858E0C68F578A7DD
24,519,935 UART: [art] SIG.R = AE83FD0A1E24193EC8AB4DF45291441C5E14F3443EC95372E7EE0EAAC3EC39201C7FC1DA3905F2DB78845D06045B7F16
24,527,370 UART: [art] SIG.S = 67819F36E94603DEDBDFB4CE89EFDE05820B859411C4EECBFF8A324361A7D6525DD86F8AD26EA0B08209893E5719FE7B
25,506,732 UART: Caliptra RT
25,507,441 UART: [state] CFI Enabled
25,625,162 UART: [rt] RT listening for mailbox commands...
25,627,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,782,624 UART: [rt]cmd =0x41544d4e, len=14344
29,712,962 >>> mbox cmd response data (8 bytes)
29,713,518 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,744,366 UART: [rt]cmd =0x41545348, len=116
29,764,401 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,437,464 ready_for_fw is high
3,437,898 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,891 >>> mbox cmd response: success
19,049,847 UART:
19,050,268 UART: Running Caliptra FMC ...
19,051,434 UART:
19,051,604 UART: [state] CFI Enabled
19,116,636 UART: [fht] FMC Alias Private Key: 7
20,880,328 UART: [art] Extend RT PCRs Done
20,881,552 UART: [art] Lock RT PCRs Done
20,883,016 UART: [art] Populate DV Done
20,888,431 UART: [fht] FMC Alias Private Key: 7
20,889,973 UART: [art] Derive CDI
20,890,737 UART: [art] Store in in slot 0x4
20,950,043 UART: [art] Derive Key Pair
20,951,111 UART: [art] Store priv key in slot 0x5
23,414,109 UART: [art] Derive Key Pair - Done
23,426,792 UART: [art] Signing Cert with AUTHO
23,428,100 UART: RITY.KEYID = 7
25,139,869 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,368 UART: [art] PUB.X = 7CD8A491F1A1AE38AAD0E029CF6D10C4A8C2E8424EAE06691D0DBBC7D2FD6BF0E2DCC7D20239209F2A745690C3E5E268
25,148,672 UART: [art] PUB.Y = 07930657E10DC4CBBDAC11A4BE90FC0DF2F5CC54A143737BEE7C3D61FDEE3235E67E0CC67B26E24450B0A6D78C1D52B5
25,155,937 UART: [art] SIG.R = 8E4BE827651ACE9FAB471826434834E2394574542541792150DC24BC2D4DE11851DFCB7907C828052AE4B90670F336E2
25,163,326 UART: [art] SIG.S = B1CD532FDCA1F14650EE68C86C4864705E13791B1AF5E7B28DBABEA72CFCB7509785E37F42D7EB726E10012B629BF714
26,142,033 UART: Caliptra RT
26,142,748 UART: [state] CFI Enabled
26,307,275 UART: [rt] RT listening for mailbox commands...
26,309,678 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,465,478 UART: [rt]cmd =0x41544d4e, len=14344
30,395,934 >>> mbox cmd response data (8 bytes)
30,396,511 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,427,258 UART: [rt]cmd =0x41545348, len=116
30,446,503 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,753,062 ready_for_fw is high
3,753,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,293 >>> mbox cmd response: success
19,203,661 UART:
19,204,759 UART: Running Caliptra FMC ...
19,205,895 UART:
19,206,046 UART: [state] CFI Enabled
19,213,058 UART: [fht] FMC Alias Private Key: 7
20,971,005 UART: [art] Extend RT PCRs Done
20,973,030 UART: [art] Lock RT PCRs Done
20,974,063 UART: [art] Populate DV Done
20,979,186 UART: [fht] FMC Alias Private Key: 7
20,980,815 UART: [art] Derive CDI
20,981,615 UART: [art] Store in in slot 0x4
21,024,099 UART: [art] Derive Key Pair
21,025,203 UART: [art] Store priv key in slot 0x5
23,451,947 UART: [art] Derive Key Pair - Done
23,464,827 UART: [art] Signing Cert with AUTHO
23,466,135 UART: RITY.KEYID = 7
25,171,254 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,756 UART: [art] PUB.X = 2F6679C4E6CF0C3138A21F0A7BDFCEB3964A8A2E60689F133F0BCF225320EAA3B4F930EB5B42F8B44D940EFAB18565EE
25,180,044 UART: [art] PUB.Y = A6C8F52A7A04E10A28B01EEA1A1CFD3995825ACD40283A058D52156B9C0E010793E58C827FFE7F305F1C0AD65ADEB17D
25,187,297 UART: [art] SIG.R = 35C31B804EF2C64671951BD8B2653E0F4266EE210D0EC922BB1DCAB7372C1A83160C863ABCB0530D16A5F61175F36D20
25,194,689 UART: [art] SIG.S = EDDCDE94F0F2A129D09BCEA15B934DA4A90C882E720BD2BEDE96FF7A6EE411855EC90412E5DCA2A6BA24EFBACDEFD7D0
26,173,403 UART: Caliptra RT
26,174,119 UART: [state] CFI Enabled
26,291,756 UART: [rt] RT listening for mailbox commands...
26,294,420 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,449,668 UART: [rt]cmd =0x41544d4e, len=14344
30,380,006 >>> mbox cmd response data (8 bytes)
30,380,598 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,411,227 UART: [rt]cmd =0x41545348, len=116
30,431,125 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,243 UART: [kat] SHA2-256
882,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,289 UART: [kat] ++
886,441 UART: [kat] sha1
890,535 UART: [kat] SHA2-256
892,473 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,492 UART: [kat] HMAC-384Kdf
907,192 UART: [kat] LMS
1,475,388 UART: [kat] --
1,476,019 UART: [cold-reset] ++
1,476,515 UART: [fht] Storing FHT @ 0x50003400
1,479,374 UART: [idev] ++
1,479,542 UART: [idev] CDI.KEYID = 6
1,479,902 UART: [idev] SUBJECT.KEYID = 7
1,480,326 UART: [idev] UDS.KEYID = 0
1,480,671 ready_for_fw is high
1,480,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,348 UART: [idev] Erasing UDS.KEYID = 0
1,504,354 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,092 UART: [idev] --
1,514,225 UART: [ldev] ++
1,514,393 UART: [ldev] CDI.KEYID = 6
1,514,756 UART: [ldev] SUBJECT.KEYID = 5
1,515,182 UART: [ldev] AUTHORITY.KEYID = 7
1,515,645 UART: [ldev] FE.KEYID = 1
1,520,795 UART: [ldev] Erasing FE.KEYID = 1
1,545,812 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,190 UART: [ldev] --
1,585,697 UART: [fwproc] Waiting for Commands...
1,586,478 UART: [fwproc] Received command 0x46574c44
1,587,269 UART: [fwproc] Received Image of size 114448 bytes
2,884,912 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,814 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,099 >>> mbox cmd response: success
3,078,165 UART: [afmc] ++
3,078,333 UART: [afmc] CDI.KEYID = 6
3,078,695 UART: [afmc] SUBJECT.KEYID = 7
3,079,120 UART: [afmc] AUTHORITY.KEYID = 5
3,113,845 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,373 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,766 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,456 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,347 UART: [afmc] --
3,157,325 UART: [cold-reset] --
3,158,093 UART: [state] Locking Datavault
3,159,296 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,900 UART: [state] Locking ICCM
3,160,434 UART: [exit] Launching FMC @ 0x40000130
3,165,763 UART:
3,165,779 UART: Running Caliptra FMC ...
3,166,187 UART:
3,166,241 UART: [state] CFI Enabled
3,176,296 UART: [fht] FMC Alias Private Key: 7
3,284,253 UART: [art] Extend RT PCRs Done
3,284,681 UART: [art] Lock RT PCRs Done
3,286,235 UART: [art] Populate DV Done
3,294,208 UART: [fht] FMC Alias Private Key: 7
3,295,362 UART: [art] Derive CDI
3,295,642 UART: [art] Store in in slot 0x4
3,381,557 UART: [art] Derive Key Pair
3,381,917 UART: [art] Store priv key in slot 0x5
3,395,151 UART: [art] Derive Key Pair - Done
3,410,050 UART: [art] Signing Cert with AUTHO
3,410,530 UART: RITY.KEYID = 7
3,425,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,287 UART: [art] PUB.X = 7324CFCFF4F97514E8BC10B0DBFD0EBEE0AC17497076F7B982A40F54558D3BE1FB2A02D950E9AFD482B909A5944F5397
3,433,059 UART: [art] PUB.Y = 0BA5F3C3471E2F331C728999B66D49242997AF5530CA99F50264AA969F1827191806D89623E58B3BAA716E11EB990D0A
3,439,988 UART: [art] SIG.R = EDF3175C4D5226DDA50A6408B38BE504416F7808C781531A5F804AEA18BC55230598849474ECE11C6CEC37CD55773D28
3,446,743 UART: [art] SIG.S = 8FBDCEE287CCA8421C2B9BCD63D8E9E3C73BB58522CE17465C17C3EA7741EC4A167B560262C5E7F7765BC5B535951888
3,469,955 UART: Caliptra RT
3,470,208 UART: [state] CFI Enabled
3,577,596 UART: [rt] RT listening for mailbox commands...
3,578,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,326 UART: [rt]cmd =0x41544d4e, len=14344
3,845,734 >>> mbox cmd response data (8 bytes)
3,845,735 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,875,942 UART: [rt]cmd =0x41545348, len=116
3,898,400 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,405 ready_for_fw is high
1,362,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,183 >>> mbox cmd response: success
2,990,493 UART:
2,990,509 UART: Running Caliptra FMC ...
2,990,917 UART:
2,990,971 UART: [state] CFI Enabled
3,001,706 UART: [fht] FMC Alias Private Key: 7
3,109,639 UART: [art] Extend RT PCRs Done
3,110,067 UART: [art] Lock RT PCRs Done
3,111,563 UART: [art] Populate DV Done
3,119,902 UART: [fht] FMC Alias Private Key: 7
3,120,960 UART: [art] Derive CDI
3,121,240 UART: [art] Store in in slot 0x4
3,207,219 UART: [art] Derive Key Pair
3,207,579 UART: [art] Store priv key in slot 0x5
3,220,519 UART: [art] Derive Key Pair - Done
3,235,208 UART: [art] Signing Cert with AUTHO
3,235,688 UART: RITY.KEYID = 7
3,250,838 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,603 UART: [art] PUB.X = 2270B59896C8F2D55ED9B4A5E24ABE92D26983C8DDB53F748CEC921764CD769CB7097AA993CD5D47CC035F252BAEA79D
3,258,381 UART: [art] PUB.Y = AE2969198B6834C27EC2FB84F7C3571682991449D8A7002A9531729CB6ADE7CC3DC3CA98F6B5686FF1E0D04785E79965
3,265,309 UART: [art] SIG.R = 01440C0B607D0D9659E765E03A37A3BE9883E4504F5063A46D5C3AAACEE61BB9782DB888E57DA59B2B045E83FF798552
3,272,068 UART: [art] SIG.S = 64511A4657B7FA7C5C79FF99CBB7126BC9736671368805965F1AC35B029E596352729F4ADEA5763D57E1578B43242260
3,296,107 UART: Caliptra RT
3,296,360 UART: [state] CFI Enabled
3,404,760 UART: [rt] RT listening for mailbox commands...
3,405,430 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,590 UART: [rt]cmd =0x41544d4e, len=14344
3,673,550 >>> mbox cmd response data (8 bytes)
3,673,551 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,492 UART: [rt]cmd =0x41545348, len=116
3,726,180 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,116 UART: [kat] SHA2-256
882,047 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,162 UART: [kat] ++
886,314 UART: [kat] sha1
890,554 UART: [kat] SHA2-256
892,492 UART: [kat] SHA2-384
895,101 UART: [kat] SHA2-512-ACC
897,002 UART: [kat] ECC-384
903,081 UART: [kat] HMAC-384Kdf
907,653 UART: [kat] LMS
1,475,849 UART: [kat] --
1,476,862 UART: [cold-reset] ++
1,477,438 UART: [fht] Storing FHT @ 0x50003400
1,480,425 UART: [idev] ++
1,480,593 UART: [idev] CDI.KEYID = 6
1,480,953 UART: [idev] SUBJECT.KEYID = 7
1,481,377 UART: [idev] UDS.KEYID = 0
1,481,722 ready_for_fw is high
1,481,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,439 UART: [idev] Erasing UDS.KEYID = 0
1,506,259 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,781 UART: [idev] --
1,515,762 UART: [ldev] ++
1,515,930 UART: [ldev] CDI.KEYID = 6
1,516,293 UART: [ldev] SUBJECT.KEYID = 5
1,516,719 UART: [ldev] AUTHORITY.KEYID = 7
1,517,182 UART: [ldev] FE.KEYID = 1
1,522,456 UART: [ldev] Erasing FE.KEYID = 1
1,547,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,627 UART: [ldev] --
1,586,940 UART: [fwproc] Waiting for Commands...
1,587,745 UART: [fwproc] Received command 0x46574c44
1,588,536 UART: [fwproc] Received Image of size 114448 bytes
2,887,393 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,587 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,939 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,094 >>> mbox cmd response: success
3,081,156 UART: [afmc] ++
3,081,324 UART: [afmc] CDI.KEYID = 6
3,081,686 UART: [afmc] SUBJECT.KEYID = 7
3,082,111 UART: [afmc] AUTHORITY.KEYID = 5
3,117,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,598 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,991 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,681 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,562 UART: [afmc] --
3,160,648 UART: [cold-reset] --
3,161,486 UART: [state] Locking Datavault
3,162,449 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,053 UART: [state] Locking ICCM
3,163,517 UART: [exit] Launching FMC @ 0x40000130
3,168,846 UART:
3,168,862 UART: Running Caliptra FMC ...
3,169,270 UART:
3,169,413 UART: [state] CFI Enabled
3,179,854 UART: [fht] FMC Alias Private Key: 7
3,288,063 UART: [art] Extend RT PCRs Done
3,288,491 UART: [art] Lock RT PCRs Done
3,290,211 UART: [art] Populate DV Done
3,298,600 UART: [fht] FMC Alias Private Key: 7
3,299,582 UART: [art] Derive CDI
3,299,862 UART: [art] Store in in slot 0x4
3,385,655 UART: [art] Derive Key Pair
3,386,015 UART: [art] Store priv key in slot 0x5
3,399,113 UART: [art] Derive Key Pair - Done
3,414,020 UART: [art] Signing Cert with AUTHO
3,414,500 UART: RITY.KEYID = 7
3,429,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,157 UART: [art] PUB.X = F6D03B3A74C02882FB9E174F9BF365881834339E67907B8313D7B1C475BC1A4495E96EF4CECDB7827BFD86F7E77A450B
3,436,930 UART: [art] PUB.Y = 2207C4561321AFFF26A17D1F111FF67A910328E2794291F42D2EA7A0C841C04172D94470F6DB107EA70B865369515CCA
3,443,867 UART: [art] SIG.R = 281B093001997DD0753FAE97AAE1994D497EA61451C09EA53A88158FAB13E434A699BDB30F02177E02233E75B17ED79C
3,450,622 UART: [art] SIG.S = 92C49964CBA1A98DC2A0073E57DFA3FCE9DA742095DC8C1274BA9DE5183BB6BC3EC1AC866E2CEAFD8878E84C372BCF53
3,474,138 UART: Caliptra RT
3,474,483 UART: [state] CFI Enabled
3,583,268 UART: [rt] RT listening for mailbox commands...
3,583,938 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,142 UART: [rt]cmd =0x41544d4e, len=14344
3,852,360 >>> mbox cmd response data (8 bytes)
3,852,361 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,308 UART: [rt]cmd =0x41545348, len=116
3,903,594 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,856 ready_for_fw is high
1,362,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,288 >>> mbox cmd response: success
2,991,392 UART:
2,991,408 UART: Running Caliptra FMC ...
2,991,816 UART:
2,991,959 UART: [state] CFI Enabled
3,002,606 UART: [fht] FMC Alias Private Key: 7
3,111,249 UART: [art] Extend RT PCRs Done
3,111,677 UART: [art] Lock RT PCRs Done
3,113,183 UART: [art] Populate DV Done
3,121,130 UART: [fht] FMC Alias Private Key: 7
3,122,234 UART: [art] Derive CDI
3,122,514 UART: [art] Store in in slot 0x4
3,208,273 UART: [art] Derive Key Pair
3,208,633 UART: [art] Store priv key in slot 0x5
3,221,713 UART: [art] Derive Key Pair - Done
3,236,372 UART: [art] Signing Cert with AUTHO
3,236,852 UART: RITY.KEYID = 7
3,252,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,983 UART: [art] PUB.X = EF530D14D25347552FACAE8B70CFB6EBE495F21A02EFFD15A0957EE11215F631AD89D5B7B5261562727EFB33CF03BA33
3,259,758 UART: [art] PUB.Y = 30C83100809908CE28FD5458C47A5AD22C9D105065AC68B5914A652B12763C526C9B840EA751D17E885D75699EEC5301
3,266,669 UART: [art] SIG.R = 74A07FE803117A47074106BF5DD16E71050186964F7A2115466142F61A414E9CC0137538C0315771CCF19A4E3273A935
3,273,408 UART: [art] SIG.S = 4C854B38D667D040FD4B95ED849CD704CDF222AFD2DC10C94E5771E99CDD25BE4AAC612D50006F4584C20B1DF00D27E2
3,297,100 UART: Caliptra RT
3,297,445 UART: [state] CFI Enabled
3,405,751 UART: [rt] RT listening for mailbox commands...
3,406,421 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,305 UART: [rt]cmd =0x41544d4e, len=14344
3,673,843 >>> mbox cmd response data (8 bytes)
3,673,844 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,963 UART: [rt]cmd =0x41545348, len=116
3,725,963 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
918,160 UART: [kat] HMAC-384Kdf
922,678 UART: [kat] LMS
1,171,006 UART: [kat] --
1,171,795 UART: [cold-reset] ++
1,172,171 UART: [fht] FHT @ 0x50003400
1,174,978 UART: [idev] ++
1,175,146 UART: [idev] CDI.KEYID = 6
1,175,506 UART: [idev] SUBJECT.KEYID = 7
1,175,930 UART: [idev] UDS.KEYID = 0
1,176,275 ready_for_fw is high
1,176,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,658 UART: [idev] Erasing UDS.KEYID = 0
1,200,675 UART: [idev] Sha1 KeyId Algorithm
1,209,069 UART: [idev] --
1,210,289 UART: [ldev] ++
1,210,457 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,246 UART: [ldev] AUTHORITY.KEYID = 7
1,211,709 UART: [ldev] FE.KEYID = 1
1,216,777 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,935 UART: [ldev] --
1,282,432 UART: [fwproc] Wait for Commands...
1,283,210 UART: [fwproc] Recv command 0x46574c44
1,283,938 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,364 >>> mbox cmd response: success
2,776,590 UART: [afmc] ++
2,776,758 UART: [afmc] CDI.KEYID = 6
2,777,120 UART: [afmc] SUBJECT.KEYID = 7
2,777,545 UART: [afmc] AUTHORITY.KEYID = 5
2,813,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,233 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,961 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,846 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,565 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,453 UART: [afmc] --
2,856,459 UART: [cold-reset] --
2,857,331 UART: [state] Locking Datavault
2,858,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,316 UART: [state] Locking ICCM
2,859,852 UART: [exit] Launching FMC @ 0x40000130
2,865,181 UART:
2,865,197 UART: Running Caliptra FMC ...
2,865,605 UART:
2,865,659 UART: [state] CFI Enabled
2,876,186 UART: [fht] FMC Alias Private Key: 7
2,984,447 UART: [art] Extend RT PCRs Done
2,984,875 UART: [art] Lock RT PCRs Done
2,986,333 UART: [art] Populate DV Done
2,994,306 UART: [fht] FMC Alias Private Key: 7
2,995,434 UART: [art] Derive CDI
2,995,714 UART: [art] Store in in slot 0x4
3,081,145 UART: [art] Derive Key Pair
3,081,505 UART: [art] Store priv key in slot 0x5
3,094,663 UART: [art] Derive Key Pair - Done
3,109,470 UART: [art] Signing Cert with AUTHO
3,109,950 UART: RITY.KEYID = 7
3,125,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,895 UART: [art] PUB.X = C00ED358B2DAB47F0D5E4FB35671EBC056B522F3B4444D599403C9C2D8FF9796434D6AC71204A5FE9461AE73CB1A673B
3,132,663 UART: [art] PUB.Y = F9CEC71BF85CE1B04F674EA1CBEC367C604B49FFF796C86E64E1C7659FF0F7983A7C093F54A2583982DF93876C8EBB62
3,139,624 UART: [art] SIG.R = DD6EBC3321AFF7D0CF0E2C8E6B1CD9225923D2E3E5B9390DCAA1AF9454153B7F9F6AF728648EF876B3C30F6B6F03330C
3,146,397 UART: [art] SIG.S = 34D30AD30BAE1D1F779995F2AEEE2A8A2F5C414F3A2826497B51045C0636C494B58356CA70C6C6692C52796400CBAEB0
3,169,828 UART: Caliptra RT
3,170,081 UART: [state] CFI Enabled
3,276,946 UART: [rt] RT listening for mailbox commands...
3,277,616 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,716 UART: [rt]cmd =0x41544d4e, len=14344
3,545,304 >>> mbox cmd response data (8 bytes)
3,545,305 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,424 UART: [rt]cmd =0x41545348, len=116
3,597,814 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,923 ready_for_fw is high
1,059,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,819 >>> mbox cmd response: success
2,690,171 UART:
2,690,187 UART: Running Caliptra FMC ...
2,690,595 UART:
2,690,649 UART: [state] CFI Enabled
2,701,426 UART: [fht] FMC Alias Private Key: 7
2,809,895 UART: [art] Extend RT PCRs Done
2,810,323 UART: [art] Lock RT PCRs Done
2,811,683 UART: [art] Populate DV Done
2,819,940 UART: [fht] FMC Alias Private Key: 7
2,820,876 UART: [art] Derive CDI
2,821,156 UART: [art] Store in in slot 0x4
2,906,663 UART: [art] Derive Key Pair
2,907,023 UART: [art] Store priv key in slot 0x5
2,920,637 UART: [art] Derive Key Pair - Done
2,934,916 UART: [art] Signing Cert with AUTHO
2,935,396 UART: RITY.KEYID = 7
2,950,336 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,101 UART: [art] PUB.X = 8C8553E36D29EF2533BAD64F9765BB4D1AC3A61C02122B391EA83B779E56650727A11E97BB9ED0DDA5F6354CDF27DF62
2,957,875 UART: [art] PUB.Y = 6B3B1DD48DE2E2AF80C5C6A4FF822DECCA938D5EC6A7CAB7682DDA29AA0FACFBCAA89DDBEE5299B93DDC72776D0FFEB6
2,964,863 UART: [art] SIG.R = 075D373AE1808FA8D33B3B69AC30E87BA2EF9073B7220ABBFE753BE989B0794CC9D95D2A688A44B18E9B7EE38AF43384
2,971,639 UART: [art] SIG.S = FB40F4D9AEE367EF207A063BD8249319D0C7F0329F460AF822192D20EB00F5CA10FD007FB8A52C6F6EA1F67841B4E2CE
2,995,930 UART: Caliptra RT
2,996,183 UART: [state] CFI Enabled
3,103,820 UART: [rt] RT listening for mailbox commands...
3,104,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,496 UART: [rt]cmd =0x41544d4e, len=14344
3,372,480 >>> mbox cmd response data (8 bytes)
3,372,481 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,688 UART: [rt]cmd =0x41545348, len=116
3,423,924 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
893,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,482 UART: [kat] ++
897,634 UART: [kat] sha1
902,072 UART: [kat] SHA2-256
904,012 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
918,901 UART: [kat] HMAC-384Kdf
923,533 UART: [kat] LMS
1,171,861 UART: [kat] --
1,172,630 UART: [cold-reset] ++
1,173,132 UART: [fht] FHT @ 0x50003400
1,175,853 UART: [idev] ++
1,176,021 UART: [idev] CDI.KEYID = 6
1,176,381 UART: [idev] SUBJECT.KEYID = 7
1,176,805 UART: [idev] UDS.KEYID = 0
1,177,150 ready_for_fw is high
1,177,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,101 UART: [idev] Erasing UDS.KEYID = 0
1,202,256 UART: [idev] Sha1 KeyId Algorithm
1,210,806 UART: [idev] --
1,211,710 UART: [ldev] ++
1,211,878 UART: [ldev] CDI.KEYID = 6
1,212,241 UART: [ldev] SUBJECT.KEYID = 5
1,212,667 UART: [ldev] AUTHORITY.KEYID = 7
1,213,130 UART: [ldev] FE.KEYID = 1
1,218,614 UART: [ldev] Erasing FE.KEYID = 1
1,244,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,656 UART: [ldev] --
1,283,989 UART: [fwproc] Wait for Commands...
1,284,689 UART: [fwproc] Recv command 0x46574c44
1,285,417 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,819 >>> mbox cmd response: success
2,779,965 UART: [afmc] ++
2,780,133 UART: [afmc] CDI.KEYID = 6
2,780,495 UART: [afmc] SUBJECT.KEYID = 7
2,780,920 UART: [afmc] AUTHORITY.KEYID = 5
2,815,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,755 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,474 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,404 UART: [afmc] --
2,859,434 UART: [cold-reset] --
2,860,502 UART: [state] Locking Datavault
2,861,709 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,313 UART: [state] Locking ICCM
2,862,897 UART: [exit] Launching FMC @ 0x40000130
2,868,226 UART:
2,868,242 UART: Running Caliptra FMC ...
2,868,650 UART:
2,868,793 UART: [state] CFI Enabled
2,879,416 UART: [fht] FMC Alias Private Key: 7
2,987,449 UART: [art] Extend RT PCRs Done
2,987,877 UART: [art] Lock RT PCRs Done
2,989,357 UART: [art] Populate DV Done
2,997,782 UART: [fht] FMC Alias Private Key: 7
2,998,830 UART: [art] Derive CDI
2,999,110 UART: [art] Store in in slot 0x4
3,084,629 UART: [art] Derive Key Pair
3,084,989 UART: [art] Store priv key in slot 0x5
3,097,477 UART: [art] Derive Key Pair - Done
3,112,127 UART: [art] Signing Cert with AUTHO
3,112,607 UART: RITY.KEYID = 7
3,127,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,394 UART: [art] PUB.X = 0473ADBBF5532589A73E1D1DCF0F300A0D59DA092917C9DF2A494F3F8D2A0227FDD3987D47703C4399C74D6A613F7644
3,135,150 UART: [art] PUB.Y = 0C5B4C51E7B0C3E7840F1D3AACF1DF4736B3F93766258EF04B0AA6D407E973A9C89B9229A2F9B8B88E2E103A6F8413C0
3,142,098 UART: [art] SIG.R = 25E8E5AF93D3A310AEB9E00CD18EF1FB14AD11B24DA2738B4E1B54106F9E484AE65929A95C73FD904B5E1BE0096DC913
3,148,876 UART: [art] SIG.S = BFADCEBCFB14897BBD74E5CAE6BB21B9E3049C3220177165468C946016A976F11700D200C1179AACF07083D588FAD4E3
3,172,748 UART: Caliptra RT
3,173,093 UART: [state] CFI Enabled
3,281,556 UART: [rt] RT listening for mailbox commands...
3,282,226 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,154 UART: [rt]cmd =0x41544d4e, len=14344
3,549,608 >>> mbox cmd response data (8 bytes)
3,549,609 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,828 UART: [rt]cmd =0x41545348, len=116
3,601,746 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,360 ready_for_fw is high
1,061,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,555 >>> mbox cmd response: success
2,691,557 UART:
2,691,573 UART: Running Caliptra FMC ...
2,691,981 UART:
2,692,124 UART: [state] CFI Enabled
2,703,061 UART: [fht] FMC Alias Private Key: 7
2,810,880 UART: [art] Extend RT PCRs Done
2,811,308 UART: [art] Lock RT PCRs Done
2,813,004 UART: [art] Populate DV Done
2,821,211 UART: [fht] FMC Alias Private Key: 7
2,822,339 UART: [art] Derive CDI
2,822,619 UART: [art] Store in in slot 0x4
2,908,430 UART: [art] Derive Key Pair
2,908,790 UART: [art] Store priv key in slot 0x5
2,921,604 UART: [art] Derive Key Pair - Done
2,936,016 UART: [art] Signing Cert with AUTHO
2,936,496 UART: RITY.KEYID = 7
2,951,734 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,499 UART: [art] PUB.X = 0E20E44166C915DA986B694481215F896CC925780FA333E270D9C56E0B67744CCD8F891DEC72065609A34E1561154F89
2,959,244 UART: [art] PUB.Y = 94239DB21A059F8B97140F6AFE4256A04CA0F1942BD02C17C81289CA942CFE1FD2064A9EB79357F2469AAD4ACD12DC99
2,966,195 UART: [art] SIG.R = 7FC268FA903E4B0B331AEFD695C8C68515A88253A188E07864352E7128FED4A7B20A5C638223007016714F16C64C33C5
2,972,931 UART: [art] SIG.S = 668C23E6ED079F5D04FC3D23FBBE2B4FBD6A3348A9434C0AD922B3346D5E6F03433C5DEF212A13D47EC3E59CA23ADE93
2,996,740 UART: Caliptra RT
2,997,085 UART: [state] CFI Enabled
3,104,166 UART: [rt] RT listening for mailbox commands...
3,104,836 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,522 UART: [rt]cmd =0x41544d4e, len=14344
3,372,762 >>> mbox cmd response data (8 bytes)
3,372,763 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,098 UART: [rt]cmd =0x41545348, len=116
3,425,000 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,994 UART: [kat] SHA2-256
891,544 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,673 UART: [kat] ++
895,825 UART: [kat] sha1
900,295 UART: [kat] SHA2-256
902,235 UART: [kat] SHA2-384
904,918 UART: [kat] SHA2-512-ACC
906,819 UART: [kat] ECC-384
916,560 UART: [kat] HMAC-384Kdf
921,190 UART: [kat] LMS
1,169,502 UART: [kat] --
1,170,231 UART: [cold-reset] ++
1,170,619 UART: [fht] FHT @ 0x50003400
1,173,223 UART: [idev] ++
1,173,391 UART: [idev] CDI.KEYID = 6
1,173,752 UART: [idev] SUBJECT.KEYID = 7
1,174,177 UART: [idev] UDS.KEYID = 0
1,174,523 ready_for_fw is high
1,174,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,393 UART: [idev] Erasing UDS.KEYID = 0
1,199,017 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,414 UART: [ldev] Erasing FE.KEYID = 1
1,242,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,270 UART: [ldev] --
1,281,648 UART: [fwproc] Wait for Commands...
1,282,261 UART: [fwproc] Recv command 0x46574c44
1,282,994 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,240 >>> mbox cmd response: success
2,774,301 UART: [afmc] ++
2,774,469 UART: [afmc] CDI.KEYID = 6
2,774,832 UART: [afmc] SUBJECT.KEYID = 7
2,775,258 UART: [afmc] AUTHORITY.KEYID = 5
2,811,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,710 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,429 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,450 UART: [afmc] --
2,854,576 UART: [cold-reset] --
2,855,460 UART: [state] Locking Datavault
2,856,587 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,191 UART: [state] Locking ICCM
2,857,629 UART: [exit] Launching FMC @ 0x40000130
2,862,958 UART:
2,862,974 UART: Running Caliptra FMC ...
2,863,382 UART:
2,863,436 UART: [state] CFI Enabled
2,873,645 UART: [fht] FMC Alias Private Key: 7
2,981,578 UART: [art] Extend RT PCRs Done
2,982,006 UART: [art] Lock RT PCRs Done
2,983,454 UART: [art] Populate DV Done
2,991,671 UART: [fht] FMC Alias Private Key: 7
2,992,635 UART: [art] Derive CDI
2,992,915 UART: [art] Store in in slot 0x4
3,078,480 UART: [art] Derive Key Pair
3,078,840 UART: [art] Store priv key in slot 0x5
3,092,134 UART: [art] Derive Key Pair - Done
3,106,845 UART: [art] Signing Cert with AUTHO
3,107,325 UART: RITY.KEYID = 7
3,122,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,290 UART: [art] PUB.X = 2E93A9F7A24083E9F1B30AE5192F65590090BCC9F62C1827F615C7BC77EBAB9A420332FBE54D4DEB77072CF198A5EE70
3,130,039 UART: [art] PUB.Y = 5DED0E1E7B6774D2FEE07762DBCE8435C2CA0DE60BAE8C519571A4EC7A62760B0F98F13EB26DD2B4FF3EA0FD7938C431
3,136,996 UART: [art] SIG.R = 3E1B4F85DEE7C25BD346EF3FCDF63DB308BDE5F33E140D4DB2D3600F4A31A9E6DF7C1E6FDEAC56262680022E04EC55B3
3,143,775 UART: [art] SIG.S = A537DD29D092C691E3017B563A0B997C146F9AC88939711712B5F997B7E9CAC184D6C0F28163BFD2155C4FCB34609887
3,167,702 UART: Caliptra RT
3,167,955 UART: [state] CFI Enabled
3,275,932 UART: [rt] RT listening for mailbox commands...
3,276,602 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,634 UART: [rt]cmd =0x41544d4e, len=14344
3,544,718 >>> mbox cmd response data (8 bytes)
3,544,719 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,992 UART: [rt]cmd =0x41545348, len=116
3,596,964 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,104 ready_for_fw is high
1,056,104 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,640 >>> mbox cmd response: success
2,686,682 UART:
2,686,698 UART: Running Caliptra FMC ...
2,687,106 UART:
2,687,160 UART: [state] CFI Enabled
2,697,465 UART: [fht] FMC Alias Private Key: 7
2,805,334 UART: [art] Extend RT PCRs Done
2,805,762 UART: [art] Lock RT PCRs Done
2,807,418 UART: [art] Populate DV Done
2,815,703 UART: [fht] FMC Alias Private Key: 7
2,816,801 UART: [art] Derive CDI
2,817,081 UART: [art] Store in in slot 0x4
2,902,658 UART: [art] Derive Key Pair
2,903,018 UART: [art] Store priv key in slot 0x5
2,915,994 UART: [art] Derive Key Pair - Done
2,930,908 UART: [art] Signing Cert with AUTHO
2,931,388 UART: RITY.KEYID = 7
2,946,368 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,133 UART: [art] PUB.X = B46F986DA8EAD29F603919E86CEB739D6C9850F31A3343B7199D47DE4BE726D305EC66BF9B89C0B663B2F3B11FB55730
2,953,908 UART: [art] PUB.Y = DCD8D1C7BC5310AAD6180FB6BD7A7426086B23FB19ADC1425442A8851847C1499FE789169959256A9F86F647C0FF86D3
2,960,854 UART: [art] SIG.R = F0770EBD7968B9AFAFFE44ED0448DC47498A5566D68E67441D183880F3516791337B91B7A173563DC01733E1F4B82125
2,967,612 UART: [art] SIG.S = 3C0842CE409A5D31CE614112923B38A3051C224E0F383F5A08E874588CE8726CEE7D2E008DEEB8559676A2971E50AAAE
2,991,329 UART: Caliptra RT
2,991,582 UART: [state] CFI Enabled
3,099,643 UART: [rt] RT listening for mailbox commands...
3,100,313 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,333 UART: [rt]cmd =0x41544d4e, len=14344
3,367,743 >>> mbox cmd response data (8 bytes)
3,367,744 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,789 UART: [rt]cmd =0x41545348, len=116
3,420,101 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,274 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
891,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,188 UART: [kat] ++
895,340 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,499 UART: [kat] LMS
1,168,811 UART: [kat] --
1,169,650 UART: [cold-reset] ++
1,170,212 UART: [fht] FHT @ 0x50003400
1,172,896 UART: [idev] ++
1,173,064 UART: [idev] CDI.KEYID = 6
1,173,425 UART: [idev] SUBJECT.KEYID = 7
1,173,850 UART: [idev] UDS.KEYID = 0
1,174,196 ready_for_fw is high
1,174,196 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,034 UART: [idev] Sha1 KeyId Algorithm
1,207,900 UART: [idev] --
1,208,793 UART: [ldev] ++
1,208,961 UART: [ldev] CDI.KEYID = 6
1,209,325 UART: [ldev] SUBJECT.KEYID = 5
1,209,752 UART: [ldev] AUTHORITY.KEYID = 7
1,210,215 UART: [ldev] FE.KEYID = 1
1,215,163 UART: [ldev] Erasing FE.KEYID = 1
1,241,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,225 UART: [ldev] --
1,280,725 UART: [fwproc] Wait for Commands...
1,281,388 UART: [fwproc] Recv command 0x46574c44
1,282,121 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,731 >>> mbox cmd response: success
2,772,838 UART: [afmc] ++
2,773,006 UART: [afmc] CDI.KEYID = 6
2,773,369 UART: [afmc] SUBJECT.KEYID = 7
2,773,795 UART: [afmc] AUTHORITY.KEYID = 5
2,808,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,847 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,459 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,178 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,981 UART: [afmc] --
2,851,943 UART: [cold-reset] --
2,852,889 UART: [state] Locking Datavault
2,854,148 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,752 UART: [state] Locking ICCM
2,855,394 UART: [exit] Launching FMC @ 0x40000130
2,860,723 UART:
2,860,739 UART: Running Caliptra FMC ...
2,861,147 UART:
2,861,290 UART: [state] CFI Enabled
2,871,821 UART: [fht] FMC Alias Private Key: 7
2,979,922 UART: [art] Extend RT PCRs Done
2,980,350 UART: [art] Lock RT PCRs Done
2,982,210 UART: [art] Populate DV Done
2,990,597 UART: [fht] FMC Alias Private Key: 7
2,991,537 UART: [art] Derive CDI
2,991,817 UART: [art] Store in in slot 0x4
3,077,434 UART: [art] Derive Key Pair
3,077,794 UART: [art] Store priv key in slot 0x5
3,091,328 UART: [art] Derive Key Pair - Done
3,105,990 UART: [art] Signing Cert with AUTHO
3,106,470 UART: RITY.KEYID = 7
3,121,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,443 UART: [art] PUB.X = 3016A92CE8D0C3332342C2C7F91A718190A49793F4B7F2A1CCA190FB2F092270698A7047CEF7FA3420A27FB733C02A60
3,129,210 UART: [art] PUB.Y = 31F90D4A7040265AD2A0AEDF44CBB350C91AC551C88A3BF311671F3B3B46C61EBF956F0AFB75F5F7FA5AB09695E09C03
3,136,167 UART: [art] SIG.R = 2CBD8D8F6135DA33552589FC1F50BD62B4D6AC99A924F255F8A6AE4D5AA9099DB0F1B3B56588589D5D02A7FC849A0646
3,142,938 UART: [art] SIG.S = 3963B2B14BB33A71406B65154DF58AA2C373F31311AB8B498D750C217EDA025F3147DC242359F0CADC112B69B9F36F99
3,166,477 UART: Caliptra RT
3,166,822 UART: [state] CFI Enabled
3,274,597 UART: [rt] RT listening for mailbox commands...
3,275,267 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,927 UART: [rt]cmd =0x41544d4e, len=14344
3,542,785 >>> mbox cmd response data (8 bytes)
3,542,786 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,865 UART: [rt]cmd =0x41545348, len=116
3,594,193 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,743 ready_for_fw is high
1,056,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,137 >>> mbox cmd response: success
2,687,003 UART:
2,687,019 UART: Running Caliptra FMC ...
2,687,427 UART:
2,687,570 UART: [state] CFI Enabled
2,698,359 UART: [fht] FMC Alias Private Key: 7
2,806,758 UART: [art] Extend RT PCRs Done
2,807,186 UART: [art] Lock RT PCRs Done
2,808,906 UART: [art] Populate DV Done
2,817,295 UART: [fht] FMC Alias Private Key: 7
2,818,305 UART: [art] Derive CDI
2,818,585 UART: [art] Store in in slot 0x4
2,904,246 UART: [art] Derive Key Pair
2,904,606 UART: [art] Store priv key in slot 0x5
2,917,456 UART: [art] Derive Key Pair - Done
2,932,148 UART: [art] Signing Cert with AUTHO
2,932,628 UART: RITY.KEYID = 7
2,948,134 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,899 UART: [art] PUB.X = E9357A877FCF9830B2523D125DCE5903EA1DD9D65E28EDD8E93EE2BDDE0308954E4FCA18AFD5336382E6A070FDF7E303
2,955,673 UART: [art] PUB.Y = 4087E8E02A42A2FAB9A19D0C2C180CCEADF9E9CFCAE39EA945E06E57531680D885A3AFB6BA3CBAA53C740B413F3399BD
2,962,638 UART: [art] SIG.R = 941BF8EA40ED9D120C31D2624198B28D3281B94631E0A2E18171122BD02E7EA14904637EAFFEAFB8BC0D32FD8BE00580
2,969,404 UART: [art] SIG.S = 7C6E67C3F174F62F48E767B8A69903C92D579DDD7840F618E8C0A2154483AAC892F94559648D5F9277BBC86EB8EE3F13
2,993,100 UART: Caliptra RT
2,993,445 UART: [state] CFI Enabled
3,100,756 UART: [rt] RT listening for mailbox commands...
3,101,426 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,454 UART: [rt]cmd =0x41544d4e, len=14344
3,369,170 >>> mbox cmd response data (8 bytes)
3,369,171 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,314 UART: [rt]cmd =0x41545348, len=116
3,421,254 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,008 UART:
192,406 UART: Running Caliptra ROM ...
193,584 UART:
193,730 UART: [state] CFI Enabled
267,551 UART: [state] LifecycleState = Unprovisioned
269,484 UART: [state] DebugLocked = No
271,733 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,374 UART: [kat] SHA2-256
447,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,563 UART: [kat] ++
458,037 UART: [kat] sha1
469,204 UART: [kat] SHA2-256
471,925 UART: [kat] SHA2-384
476,918 UART: [kat] SHA2-512-ACC
479,284 UART: [kat] ECC-384
2,767,238 UART: [kat] HMAC-384Kdf
2,778,477 UART: [kat] LMS
3,968,750 UART: [kat] --
3,973,493 UART: [cold-reset] ++
3,976,077 UART: [fht] Storing FHT @ 0x50003400
3,987,847 UART: [idev] ++
3,988,414 UART: [idev] CDI.KEYID = 6
3,989,329 UART: [idev] SUBJECT.KEYID = 7
3,990,571 UART: [idev] UDS.KEYID = 0
3,991,544 ready_for_fw is high
3,991,757 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,388 UART: [idev] Erasing UDS.KEYID = 0
7,324,090 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,299 UART: [idev] --
7,349,424 UART: [ldev] ++
7,350,001 UART: [ldev] CDI.KEYID = 6
7,351,024 UART: [ldev] SUBJECT.KEYID = 5
7,352,188 UART: [ldev] AUTHORITY.KEYID = 7
7,353,437 UART: [ldev] FE.KEYID = 1
7,380,512 UART: [ldev] Erasing FE.KEYID = 1
10,714,791 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,794 UART: [ldev] --
13,095,277 UART: [fwproc] Waiting for Commands...
13,097,761 UART: [fwproc] Received command 0x46574c44
13,099,944 UART: [fwproc] Received Image of size 114124 bytes
17,156,487 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,230,671 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,299,577 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,617,532 >>> mbox cmd response: success
17,622,104 UART: [afmc] ++
17,622,730 UART: [afmc] CDI.KEYID = 6
17,623,650 UART: [afmc] SUBJECT.KEYID = 7
17,624,868 UART: [afmc] AUTHORITY.KEYID = 5
20,987,440 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,049 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,305 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,755 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,563 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,026 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,310 UART: [afmc] --
23,358,456 UART: [cold-reset] --
23,362,155 UART: [state] Locking Datavault
23,367,507 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,263 UART: [state] Locking ICCM
23,371,446 UART: [exit] Launching FMC @ 0x40000130
23,379,791 UART:
23,380,056 UART: Running Caliptra FMC ...
23,381,162 UART:
23,381,329 UART: [state] CFI Enabled
23,448,666 UART: [fht] FMC Alias Private Key: 7
25,786,292 UART: [art] Extend RT PCRs Done
25,787,514 UART: [art] Lock RT PCRs Done
25,789,347 UART: [art] Populate DV Done
25,794,549 UART: [fht] FMC Alias Private Key: 7
25,796,250 UART: [art] Derive CDI
25,797,065 UART: [art] Store in in slot 0x4
25,857,197 UART: [art] Derive Key Pair
25,858,232 UART: [art] Store priv key in slot 0x5
29,150,849 UART: [art] Derive Key Pair - Done
29,163,976 UART: [art] Signing Cert with AUTHO
29,165,285 UART: RITY.KEYID = 7
31,454,097 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,620 UART: [art] PUB.X = F36291D829228FB5A6086011FD51A0789DF6F3F3FA7A75B466CBE89FC0BD1A35F79C8E995087DF49D09F21E12BCE1F23
31,462,862 UART: [art] PUB.Y = 7DD69AAA0633D652E3D8D5B05520B88A28F17D543CA62086D7332B034D34DCD287AAADE3964514F88B99528909E036EC
31,470,093 UART: [art] SIG.R = 72045D28756A35BB7A8CF7D17C4F4241D639CDF7F098EC761957D06BF173E3EFEBF47344D836856F067A5F53F065C656
31,477,432 UART: [art] SIG.S = 40B122FFE9670FE3295B00244BCBB7B5F10A77E1338ACABD86690DD0949476AB573EBD7456A0837A3413725E498E4AAF
32,783,042 UART: Caliptra RT
32,783,756 UART: [state] CFI Enabled
32,964,125 UART: [rt] RT listening for mailbox commands...
32,966,548 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,121,823 UART: [rt]cmd =0x41544d4e, len=14344
38,357,423 >>> mbox cmd response data (8 bytes)
38,358,037 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,388,821 UART: [rt]cmd =0x41545348, len=116
38,409,544 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,785,090 ready_for_fw is high
3,785,688 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,829,746 >>> mbox cmd response: success
23,527,665 UART:
23,528,058 UART: Running Caliptra FMC ...
23,529,197 UART:
23,529,360 UART: [state] CFI Enabled
23,595,268 UART: [fht] FMC Alias Private Key: 7
25,933,003 UART: [art] Extend RT PCRs Done
25,934,233 UART: [art] Lock RT PCRs Done
25,935,946 UART: [art] Populate DV Done
25,941,362 UART: [fht] FMC Alias Private Key: 7
25,943,019 UART: [art] Derive CDI
25,943,838 UART: [art] Store in in slot 0x4
26,004,409 UART: [art] Derive Key Pair
26,005,455 UART: [art] Store priv key in slot 0x5
29,298,219 UART: [art] Derive Key Pair - Done
29,311,378 UART: [art] Signing Cert with AUTHO
29,312,871 UART: RITY.KEYID = 7
31,599,604 UART: [art] Erasing AUTHORITY.KEYID = 7
31,601,113 UART: [art] PUB.X = E047237D78F60AF8EED82B0C53AE8FC56EDE602FD35DB46D20BD2BBF89E35CCEA1AF1C394DAE64643DA2347FE693D27F
31,608,391 UART: [art] PUB.Y = 20539E5E485A4C31FC6DA6F858B4AC80F0305706B9907D6B8A27D53C5600760314E1258CBF7B7321B2646EF105A5D928
31,615,612 UART: [art] SIG.R = F5B8B92572842EF4948F12AC95CB7A83BA3EFB98AEF6842613CD3C9C4CD7E2FF4BD19D72E868E891E4C0DD1DE1BB7EED
31,623,025 UART: [art] SIG.S = 7964FA3A4EBA5E13E1542D543AF39DB5A94D7BD12E50A4D90590AE750C54B13C25B37F64FCF81982A5DABC55D8AC3CB1
32,928,255 UART: Caliptra RT
32,928,958 UART: [state] CFI Enabled
33,089,093 UART: [rt] RT listening for mailbox commands...
33,091,521 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,246,862 UART: [rt]cmd =0x41544d4e, len=14344
38,482,476 >>> mbox cmd response data (8 bytes)
38,483,045 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,513,899 UART: [rt]cmd =0x41545348, len=116
38,534,119 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,417 UART:
192,819 UART: Running Caliptra ROM ...
193,991 UART:
603,766 UART: [state] CFI Enabled
616,091 UART: [state] LifecycleState = Unprovisioned
617,983 UART: [state] DebugLocked = No
620,154 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,862 UART: [kat] SHA2-256
795,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,117 UART: [kat] ++
806,560 UART: [kat] sha1
818,989 UART: [kat] SHA2-256
821,644 UART: [kat] SHA2-384
827,089 UART: [kat] SHA2-512-ACC
829,498 UART: [kat] ECC-384
3,113,677 UART: [kat] HMAC-384Kdf
3,125,292 UART: [kat] LMS
4,315,411 UART: [kat] --
4,320,013 UART: [cold-reset] ++
4,322,587 UART: [fht] Storing FHT @ 0x50003400
4,333,703 UART: [idev] ++
4,334,290 UART: [idev] CDI.KEYID = 6
4,335,202 UART: [idev] SUBJECT.KEYID = 7
4,336,443 UART: [idev] UDS.KEYID = 0
4,337,484 ready_for_fw is high
4,337,711 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,124 UART: [idev] Erasing UDS.KEYID = 0
7,619,794 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,436 UART: [idev] --
7,644,589 UART: [ldev] ++
7,645,158 UART: [ldev] CDI.KEYID = 6
7,646,114 UART: [ldev] SUBJECT.KEYID = 5
7,647,318 UART: [ldev] AUTHORITY.KEYID = 7
7,648,597 UART: [ldev] FE.KEYID = 1
7,660,911 UART: [ldev] Erasing FE.KEYID = 1
10,949,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,063 UART: [ldev] --
13,308,980 UART: [fwproc] Waiting for Commands...
13,311,064 UART: [fwproc] Received command 0x46574c44
13,313,312 UART: [fwproc] Received Image of size 114124 bytes
17,368,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,074 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,828,894 >>> mbox cmd response: success
17,833,193 UART: [afmc] ++
17,833,786 UART: [afmc] CDI.KEYID = 6
17,834,802 UART: [afmc] SUBJECT.KEYID = 7
17,835,956 UART: [afmc] AUTHORITY.KEYID = 5
21,149,076 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,362 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,667 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,990 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,842 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,327 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,159 UART: [afmc] --
23,511,453 UART: [cold-reset] --
23,515,148 UART: [state] Locking Datavault
23,520,227 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,985 UART: [state] Locking ICCM
23,523,479 UART: [exit] Launching FMC @ 0x40000130
23,531,817 UART:
23,532,045 UART: Running Caliptra FMC ...
23,533,142 UART:
23,533,296 UART: [state] CFI Enabled
23,541,068 UART: [fht] FMC Alias Private Key: 7
25,872,422 UART: [art] Extend RT PCRs Done
25,873,642 UART: [art] Lock RT PCRs Done
25,875,402 UART: [art] Populate DV Done
25,880,808 UART: [fht] FMC Alias Private Key: 7
25,882,336 UART: [art] Derive CDI
25,883,146 UART: [art] Store in in slot 0x4
25,925,789 UART: [art] Derive Key Pair
25,926,786 UART: [art] Store priv key in slot 0x5
29,168,711 UART: [art] Derive Key Pair - Done
29,181,815 UART: [art] Signing Cert with AUTHO
29,183,113 UART: RITY.KEYID = 7
31,462,253 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,760 UART: [art] PUB.X = B4BCE4161BCB63653663FDEC9C6172FD347F96AB49B2FE82807FB0CFE37235FE74A045B50A9C60F24DDB0589A892FA4F
31,471,067 UART: [art] PUB.Y = D9E95CB01E5B6C58E408568208008F5D6D28BF4B761B72A10377384D9F3558B275678B2CCAADC4D0DD732ED86DCA8A1D
31,478,293 UART: [art] SIG.R = 8C8A414CD1F6AF1CBCF980357F165C612967025E286F8B89018A15081C825772959319B5D7F533373ABF90DF4D9911EC
31,485,668 UART: [art] SIG.S = 209463B859E94708985BFB6E33312976EF0D850C5A1C5CA10DC28610B4E36699AC54B86A55F45FE299F506B484F427E0
32,791,097 UART: Caliptra RT
32,791,814 UART: [state] CFI Enabled
32,909,176 UART: [rt] RT listening for mailbox commands...
32,911,735 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,066,881 UART: [rt]cmd =0x41544d4e, len=14344
38,302,101 >>> mbox cmd response data (8 bytes)
38,302,710 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,333,546 UART: [rt]cmd =0x41545348, len=116
38,353,129 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
4,120,800 ready_for_fw is high
4,121,242 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,033 >>> mbox cmd response: success
23,716,185 UART:
23,716,571 UART: Running Caliptra FMC ...
23,717,702 UART:
23,717,852 UART: [state] CFI Enabled
23,725,731 UART: [fht] FMC Alias Private Key: 7
26,056,205 UART: [art] Extend RT PCRs Done
26,057,436 UART: [art] Lock RT PCRs Done
26,058,853 UART: [art] Populate DV Done
26,064,151 UART: [fht] FMC Alias Private Key: 7
26,065,862 UART: [art] Derive CDI
26,066,679 UART: [art] Store in in slot 0x4
26,109,397 UART: [art] Derive Key Pair
26,110,442 UART: [art] Store priv key in slot 0x5
29,352,737 UART: [art] Derive Key Pair - Done
29,365,814 UART: [art] Signing Cert with AUTHO
29,367,120 UART: RITY.KEYID = 7
31,646,686 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,195 UART: [art] PUB.X = 0061C072CC9AADDE6A174BCBB32EBCDF94FF321EC359B9FF276D199AE28DA83AA79EB102BDD0B276EEF3E8F26C6EC4C2
31,655,458 UART: [art] PUB.Y = 705438032777E739BBD7115CFECAEE48E8892543FD4D3D86AFCD49F968F93BDE9C3A1F5551DF81554BAB38863CCB4F07
31,662,756 UART: [art] SIG.R = A1704ED75BA7E3918D4CD7EE53647FCB391BA199C04CDF9A92A8E3330C634657F4DA42B1515B5CB061029BAD2C9D9E68
31,670,165 UART: [art] SIG.S = CCAE902A0F110FD8AD52B86D7BB48D7550D6D2035ED6C8DCB5A2E6A66BB9531B82F140502928ACCCF4D04FDE491DE4C2
32,975,482 UART: Caliptra RT
32,976,195 UART: [state] CFI Enabled
33,093,924 UART: [rt] RT listening for mailbox commands...
33,096,349 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,251,762 UART: [rt]cmd =0x41544d4e, len=14344
38,487,595 >>> mbox cmd response data (8 bytes)
38,488,168 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,518,854 UART: [rt]cmd =0x41545348, len=116
38,538,475 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
192,313 UART:
192,660 UART: Running Caliptra ROM ...
193,855 UART:
194,008 UART: [state] CFI Enabled
265,115 UART: [state] LifecycleState = Unprovisioned
267,029 UART: [state] DebugLocked = No
269,775 UART: [state] WD Timer not started. Device not locked for debugging
273,583 UART: [kat] SHA2-256
452,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,270 UART: [kat] ++
464,796 UART: [kat] sha1
476,908 UART: [kat] SHA2-256
479,887 UART: [kat] SHA2-384
487,512 UART: [kat] SHA2-512-ACC
490,469 UART: [kat] ECC-384
2,948,441 UART: [kat] HMAC-384Kdf
2,971,705 UART: [kat] LMS
3,501,202 UART: [kat] --
3,506,680 UART: [cold-reset] ++
3,508,181 UART: [fht] FHT @ 0x50003400
3,519,758 UART: [idev] ++
3,520,376 UART: [idev] CDI.KEYID = 6
3,521,265 UART: [idev] SUBJECT.KEYID = 7
3,522,509 UART: [idev] UDS.KEYID = 0
3,523,409 ready_for_fw is high
3,523,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,396 UART: [idev] Erasing UDS.KEYID = 0
6,028,439 UART: [idev] Sha1 KeyId Algorithm
6,050,317 UART: [idev] --
6,054,033 UART: [ldev] ++
6,054,620 UART: [ldev] CDI.KEYID = 6
6,055,509 UART: [ldev] SUBJECT.KEYID = 5
6,056,726 UART: [ldev] AUTHORITY.KEYID = 7
6,057,962 UART: [ldev] FE.KEYID = 1
6,102,124 UART: [ldev] Erasing FE.KEYID = 1
8,605,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,564 UART: [ldev] --
10,414,917 UART: [fwproc] Wait for Commands...
10,416,739 UART: [fwproc] Recv command 0x46574c44
10,418,838 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,846 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,324 >>> mbox cmd response: success
14,284,685 UART: [afmc] ++
14,285,287 UART: [afmc] CDI.KEYID = 6
14,286,203 UART: [afmc] SUBJECT.KEYID = 7
14,287,365 UART: [afmc] AUTHORITY.KEYID = 5
16,811,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,669 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,742 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,566 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,026 UART: [afmc] --
18,611,536 UART: [cold-reset] --
18,615,881 UART: [state] Locking Datavault
18,619,773 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,484 UART: [state] Locking ICCM
18,623,202 UART: [exit] Launching FMC @ 0x40000130
18,631,599 UART:
18,631,831 UART: Running Caliptra FMC ...
18,633,510 UART:
18,633,690 UART: [state] CFI Enabled
18,694,003 UART: [fht] FMC Alias Private Key: 7
20,458,091 UART: [art] Extend RT PCRs Done
20,459,288 UART: [art] Lock RT PCRs Done
20,460,904 UART: [art] Populate DV Done
20,466,310 UART: [fht] FMC Alias Private Key: 7
20,467,842 UART: [art] Derive CDI
20,468,656 UART: [art] Store in in slot 0x4
20,526,452 UART: [art] Derive Key Pair
20,527,488 UART: [art] Store priv key in slot 0x5
22,990,735 UART: [art] Derive Key Pair - Done
23,003,646 UART: [art] Signing Cert with AUTHO
23,004,956 UART: RITY.KEYID = 7
24,716,632 UART: [art] Erasing AUTHORITY.KEYID = 7
24,718,116 UART: [art] PUB.X = FC15701FCB300184C30389F43FBEE062EF8866A2656E7F52B63C5D5C8779E38426874620742647CC6B46AC66D8A6030C
24,725,369 UART: [art] PUB.Y = A407C1A2F7EACFF41EE5B40AE2113AF5974C813B5D7D37CD412BF095FA477DB95C4235B1965A0FC97697AED0E6F12544
24,732,662 UART: [art] SIG.R = E22C04E25AAF94695330C304357684D4FD7B3B8A7A2E84232CD00F9815549271577FE4B8869B10D999D9A613DF9EF182
24,740,001 UART: [art] SIG.S = 08CA2F4BB67F7B27E899C46F1C574F3E51E77A153259926C39A6CBEF666605502CC872630B53BEF46CEFFF6035EE5AE3
25,719,009 UART: Caliptra RT
25,719,713 UART: [state] CFI Enabled
25,885,253 UART: [rt] RT listening for mailbox commands...
25,887,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,043,758 UART: [rt]cmd =0x41544d4e, len=14344
29,973,964 >>> mbox cmd response data (8 bytes)
29,974,556 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,005,459 UART: [rt]cmd =0x41545348, len=116
30,025,948 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,383,825 ready_for_fw is high
3,384,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,087,397 >>> mbox cmd response: success
18,367,921 UART:
18,368,350 UART: Running Caliptra FMC ...
18,369,488 UART:
18,369,652 UART: [state] CFI Enabled
18,433,551 UART: [fht] FMC Alias Private Key: 7
20,197,660 UART: [art] Extend RT PCRs Done
20,198,862 UART: [art] Lock RT PCRs Done
20,200,758 UART: [art] Populate DV Done
20,206,261 UART: [fht] FMC Alias Private Key: 7
20,207,912 UART: [art] Derive CDI
20,208,747 UART: [art] Store in in slot 0x4
20,266,435 UART: [art] Derive Key Pair
20,267,504 UART: [art] Store priv key in slot 0x5
22,730,066 UART: [art] Derive Key Pair - Done
22,742,473 UART: [art] Signing Cert with AUTHO
22,743,802 UART: RITY.KEYID = 7
24,456,449 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,946 UART: [art] PUB.X = AB7CA9501AAA31DD68B8179221509C09B27797D4A9ED9442E12867F3E698D56ACE9F686BF057B2F7CF7C96996666BEB0
24,465,195 UART: [art] PUB.Y = E26D8839BD0D4FBE1849E43E3521660C0032E7D938854383F4EEF6A4EB98DAFC009105A9BEFC29379CD24BF3FC512BDD
24,472,459 UART: [art] SIG.R = 8CAB692B9794442FFD0695D00AD1745338D2E73F33E537F4F055CF0D9A3BE4BF2ADAB0D98316FE6CAFA54B0288FB73BD
24,479,851 UART: [art] SIG.S = 923B703486C2CF1BB2BF91A05C8776FC28DE2BAF9AAE83C8F24A33A8693E8AB0B9B2DA968FBC80F75695A1409CB7FB71
25,459,009 UART: Caliptra RT
25,459,702 UART: [state] CFI Enabled
25,625,376 UART: [rt] RT listening for mailbox commands...
25,627,774 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,783,684 UART: [rt]cmd =0x41544d4e, len=14344
29,714,286 >>> mbox cmd response data (8 bytes)
29,714,870 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,745,660 UART: [rt]cmd =0x41545348, len=116
29,765,580 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,554 UART:
192,911 UART: Running Caliptra ROM ...
194,096 UART:
603,810 UART: [state] CFI Enabled
616,284 UART: [state] LifecycleState = Unprovisioned
618,165 UART: [state] DebugLocked = No
620,669 UART: [state] WD Timer not started. Device not locked for debugging
624,184 UART: [kat] SHA2-256
803,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,914 UART: [kat] ++
815,354 UART: [kat] sha1
827,564 UART: [kat] SHA2-256
830,566 UART: [kat] SHA2-384
838,036 UART: [kat] SHA2-512-ACC
840,967 UART: [kat] ECC-384
3,282,624 UART: [kat] HMAC-384Kdf
3,295,638 UART: [kat] LMS
3,825,140 UART: [kat] --
3,830,487 UART: [cold-reset] ++
3,831,707 UART: [fht] FHT @ 0x50003400
3,842,103 UART: [idev] ++
3,842,671 UART: [idev] CDI.KEYID = 6
3,843,582 UART: [idev] SUBJECT.KEYID = 7
3,844,817 UART: [idev] UDS.KEYID = 0
3,845,755 ready_for_fw is high
3,845,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,603 UART: [idev] Erasing UDS.KEYID = 0
6,313,297 UART: [idev] Sha1 KeyId Algorithm
6,337,658 UART: [idev] --
6,340,997 UART: [ldev] ++
6,341,563 UART: [ldev] CDI.KEYID = 6
6,342,470 UART: [ldev] SUBJECT.KEYID = 5
6,343,617 UART: [ldev] AUTHORITY.KEYID = 7
6,344,893 UART: [ldev] FE.KEYID = 1
6,356,278 UART: [ldev] Erasing FE.KEYID = 1
8,835,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,174 UART: [ldev] --
10,624,842 UART: [fwproc] Wait for Commands...
10,627,254 UART: [fwproc] Recv command 0x46574c44
10,629,335 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,924 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,496,078 >>> mbox cmd response: success
14,499,468 UART: [afmc] ++
14,500,065 UART: [afmc] CDI.KEYID = 6
14,500,943 UART: [afmc] SUBJECT.KEYID = 7
14,502,153 UART: [afmc] AUTHORITY.KEYID = 5
16,997,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,427 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,457 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,287 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,313 UART: [afmc] --
18,793,177 UART: [cold-reset] --
18,797,504 UART: [state] Locking Datavault
18,801,950 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,589 UART: [state] Locking ICCM
18,805,273 UART: [exit] Launching FMC @ 0x40000130
18,813,661 UART:
18,813,886 UART: Running Caliptra FMC ...
18,814,904 UART:
18,815,043 UART: [state] CFI Enabled
18,823,249 UART: [fht] FMC Alias Private Key: 7
20,580,784 UART: [art] Extend RT PCRs Done
20,581,979 UART: [art] Lock RT PCRs Done
20,584,047 UART: [art] Populate DV Done
20,589,363 UART: [fht] FMC Alias Private Key: 7
20,590,840 UART: [art] Derive CDI
20,591,569 UART: [art] Store in in slot 0x4
20,634,233 UART: [art] Derive Key Pair
20,635,296 UART: [art] Store priv key in slot 0x5
23,061,444 UART: [art] Derive Key Pair - Done
23,074,448 UART: [art] Signing Cert with AUTHO
23,075,754 UART: RITY.KEYID = 7
24,781,658 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,155 UART: [art] PUB.X = A62DEE9B78445BCBB14A10AE0A07FB92723DF2686C722E1D80C02DD2EC05D5FB0CDA98CBF1DFFE5208DCE678E7F2A08F
24,790,466 UART: [art] PUB.Y = E8BB8746C03F157B21747DD6459418ECB9FC4FE6D2FA1D45C85D387CBBF7B6FD409CBF3766F6193A1CDF3222433FA60C
24,797,779 UART: [art] SIG.R = 839A60CF2EDEB49ED10E9752072EA30552216CF2257A302936ACE932D8D33D6CA229F2A30E3A1005865C4DCEC5EDB831
24,805,177 UART: [art] SIG.S = D7685178AB3969DA5019A165E8F8DDC3B99D0EC6832773C5461D2216F33C75EFB895578339596FB9B231DCE22CD612C4
25,783,823 UART: Caliptra RT
25,784,520 UART: [state] CFI Enabled
25,901,966 UART: [rt] RT listening for mailbox commands...
25,904,362 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,060,205 UART: [rt]cmd =0x41544d4e, len=14344
29,991,014 >>> mbox cmd response data (8 bytes)
29,991,617 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,022,427 UART: [rt]cmd =0x41545348, len=116
30,042,790 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,695,755 ready_for_fw is high
3,696,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,176 >>> mbox cmd response: success
18,526,622 UART:
18,527,027 UART: Running Caliptra FMC ...
18,528,164 UART:
18,528,318 UART: [state] CFI Enabled
18,536,600 UART: [fht] FMC Alias Private Key: 7
20,293,575 UART: [art] Extend RT PCRs Done
20,294,925 UART: [art] Lock RT PCRs Done
20,296,549 UART: [art] Populate DV Done
20,301,783 UART: [fht] FMC Alias Private Key: 7
20,303,321 UART: [art] Derive CDI
20,304,150 UART: [art] Store in in slot 0x4
20,346,964 UART: [art] Derive Key Pair
20,347,962 UART: [art] Store priv key in slot 0x5
22,775,043 UART: [art] Derive Key Pair - Done
22,787,933 UART: [art] Signing Cert with AUTHO
22,789,231 UART: RITY.KEYID = 7
24,494,923 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,427 UART: [art] PUB.X = 4998DAF75BBD8BAC4B68DF93DD5AF5D911CC917EE3FEC3BF5665A4E0160F18ABB94EEEB43F09A7E5BEED3C0BCCFACD7C
24,503,715 UART: [art] PUB.Y = F725665D294E7ACFD141B087896BA7EF32303F0A08FA49A9607763733EFB8683A613AFFB2677B223715BF0A2BCF67F33
24,510,988 UART: [art] SIG.R = 0058A66F7BBE10C44EF42396BAF77F0B5CECA176A5FFC3EE096C1527E82EBD4D6812311C6EFFD29403808CBF7F90CD84
24,518,366 UART: [art] SIG.S = 6870FF54BA111D3E30FF685116C5EBF06BD743C35120575AF1F2434C139CC1155E45447659D5D966498C42C176715860
25,497,181 UART: Caliptra RT
25,497,892 UART: [state] CFI Enabled
25,615,977 UART: [rt] RT listening for mailbox commands...
25,618,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,773,803 UART: [rt]cmd =0x41544d4e, len=14344
29,704,066 >>> mbox cmd response data (8 bytes)
29,704,639 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,735,262 UART: [rt]cmd =0x41545348, len=116
29,754,499 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,441,159 ready_for_fw is high
3,441,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,756,067 >>> mbox cmd response: success
19,046,214 UART:
19,046,683 UART: Running Caliptra FMC ...
19,047,807 UART:
19,047,978 UART: [state] CFI Enabled
19,114,000 UART: [fht] FMC Alias Private Key: 7
20,879,364 UART: [art] Extend RT PCRs Done
20,880,588 UART: [art] Lock RT PCRs Done
20,882,381 UART: [art] Populate DV Done
20,887,697 UART: [fht] FMC Alias Private Key: 7
20,889,186 UART: [art] Derive CDI
20,889,963 UART: [art] Store in in slot 0x4
20,947,288 UART: [art] Derive Key Pair
20,948,331 UART: [art] Store priv key in slot 0x5
23,411,564 UART: [art] Derive Key Pair - Done
23,424,075 UART: [art] Signing Cert with AUTHO
23,425,387 UART: RITY.KEYID = 7
25,137,540 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,045 UART: [art] PUB.X = 29FE646B2B1E15BB9DC598BAE5790D5924DBBA126EB2AD7BA172F9B5B7DDB3D7B9E309FF0AE8816E9202663921558A60
25,146,378 UART: [art] PUB.Y = 6EF665C25A53B1C83A08D9E65B40D5779B4E183AD3A00C2B6BF47E705A120146D92F67223E9593868E2CF570B83353F6
25,153,594 UART: [art] SIG.R = FF6CE9E50DF007F2B4E94111C69E0A5D3112FC39DFDCAB40194102DFFFE42242390F68E6D68BCE8EBE4D9B59229198C3
25,161,005 UART: [art] SIG.S = 8AEE7CC3829B27B59F6C1322ACD075A9AFC808AAC7C2D6D3007DF24BB82FCF22750883E7815360D405746D1F34FC1CA7
26,140,186 UART: Caliptra RT
26,140,906 UART: [state] CFI Enabled
26,306,675 UART: [rt] RT listening for mailbox commands...
26,309,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,465,024 UART: [rt]cmd =0x41544d4e, len=14344
30,395,608 >>> mbox cmd response data (8 bytes)
30,396,188 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,426,709 UART: [rt]cmd =0x41545348, len=116
30,446,171 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,754,197 ready_for_fw is high
3,754,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,943,415 >>> mbox cmd response: success
19,200,901 UART:
19,201,309 UART: Running Caliptra FMC ...
19,202,505 UART:
19,202,667 UART: [state] CFI Enabled
19,210,485 UART: [fht] FMC Alias Private Key: 7
20,967,835 UART: [art] Extend RT PCRs Done
20,969,054 UART: [art] Lock RT PCRs Done
20,970,869 UART: [art] Populate DV Done
20,976,279 UART: [fht] FMC Alias Private Key: 7
20,977,763 UART: [art] Derive CDI
20,978,492 UART: [art] Store in in slot 0x4
21,021,363 UART: [art] Derive Key Pair
21,022,402 UART: [art] Store priv key in slot 0x5
23,449,216 UART: [art] Derive Key Pair - Done
23,462,329 UART: [art] Signing Cert with AUTHO
23,463,627 UART: RITY.KEYID = 7
25,168,918 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,438 UART: [art] PUB.X = 90DC86B8269C61EF1BFDB9F6F3626111A239F3AD3651F803915F5E58536AE2A5213AAFA98005DCA8791EAC50FA7763C8
25,177,678 UART: [art] PUB.Y = A8151ECE847E0BEAC0AD165B85AB454C08CFCD43558552E1192588A39BDA121B107F1C0BFF39AEEA2918B3710E2BD787
25,184,970 UART: [art] SIG.R = C8F0C4D2B77634ABE441F4E189D3240C16C29FCDFA1DB70CCF384D56A283BBC5CB4E077713EA0C0F84AD3E8F5C2D235E
25,192,381 UART: [art] SIG.S = E5EAD424C7EB726EECCE106982FBBA23F8A0718023CC7253CBC82B2E528DA4A4891988722381C44B99ABC9E42BF9F9FC
26,171,425 UART: Caliptra RT
26,172,123 UART: [state] CFI Enabled
26,288,553 UART: [rt] RT listening for mailbox commands...
26,290,958 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,446,050 UART: [rt]cmd =0x41544d4e, len=14344
30,376,480 >>> mbox cmd response data (8 bytes)
30,377,042 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,407,984 UART: [rt]cmd =0x41545348, len=116
30,427,949 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
86,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,559 UART: [kat] SHA2-256
881,490 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,605 UART: [kat] ++
885,757 UART: [kat] sha1
889,999 UART: [kat] SHA2-256
891,937 UART: [kat] SHA2-384
894,808 UART: [kat] SHA2-512-ACC
896,709 UART: [kat] ECC-384
902,080 UART: [kat] HMAC-384Kdf
906,582 UART: [kat] LMS
1,474,778 UART: [kat] --
1,475,737 UART: [cold-reset] ++
1,476,127 UART: [fht] Storing FHT @ 0x50003400
1,478,972 UART: [idev] ++
1,479,140 UART: [idev] CDI.KEYID = 6
1,479,500 UART: [idev] SUBJECT.KEYID = 7
1,479,924 UART: [idev] UDS.KEYID = 0
1,480,269 ready_for_fw is high
1,480,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,104 UART: [idev] Erasing UDS.KEYID = 0
1,504,448 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,920 UART: [idev] --
1,514,025 UART: [ldev] ++
1,514,193 UART: [ldev] CDI.KEYID = 6
1,514,556 UART: [ldev] SUBJECT.KEYID = 5
1,514,982 UART: [ldev] AUTHORITY.KEYID = 7
1,515,445 UART: [ldev] FE.KEYID = 1
1,520,869 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,988 UART: [ldev] --
1,585,435 UART: [fwproc] Waiting for Commands...
1,586,210 UART: [fwproc] Received command 0x46574c44
1,587,001 UART: [fwproc] Received Image of size 114448 bytes
2,885,696 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,148 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,479 >>> mbox cmd response: success
3,079,497 UART: [afmc] ++
3,079,665 UART: [afmc] CDI.KEYID = 6
3,080,027 UART: [afmc] SUBJECT.KEYID = 7
3,080,452 UART: [afmc] AUTHORITY.KEYID = 5
3,115,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,785 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,178 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,868 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,785 UART: [afmc] --
3,158,705 UART: [cold-reset] --
3,159,613 UART: [state] Locking Datavault
3,160,692 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,296 UART: [state] Locking ICCM
3,161,862 UART: [exit] Launching FMC @ 0x40000130
3,167,191 UART:
3,167,207 UART: Running Caliptra FMC ...
3,167,615 UART:
3,167,669 UART: [state] CFI Enabled
3,177,992 UART: [fht] FMC Alias Private Key: 7
3,285,337 UART: [art] Extend RT PCRs Done
3,285,765 UART: [art] Lock RT PCRs Done
3,287,227 UART: [art] Populate DV Done
3,295,612 UART: [fht] FMC Alias Private Key: 7
3,296,580 UART: [art] Derive CDI
3,296,860 UART: [art] Store in in slot 0x4
3,382,259 UART: [art] Derive Key Pair
3,382,619 UART: [art] Store priv key in slot 0x5
3,396,175 UART: [art] Derive Key Pair - Done
3,411,095 UART: [art] Signing Cert with AUTHO
3,411,575 UART: RITY.KEYID = 7
3,426,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,426 UART: [art] PUB.X = 43C7D64796DC14714A02863D43AAE0C6575865173580156B09BA7F8FEEB5FF77BE1DDBA463E52A6F513A134BED9D56AA
3,434,200 UART: [art] PUB.Y = E6C69ABBF54722DBF8C593D70FC3E3FAEF05C819B2ABDE31C073A327870C16F9685BED810880BBAB007AE998343467ED
3,441,132 UART: [art] SIG.R = A47166E2F07A3BDBE84BFE4F867704B15C125122DB287B337FFDCCFDC62C7E92943444479818DA76C95830D04982785B
3,447,901 UART: [art] SIG.S = B64F63E6423206756ED8E02127CAD3A8A54B322713C19E13C1506C3AE2F23C748EA1CA42DA99AE0F776DA9B2B9FB80DD
3,472,360 UART: Caliptra RT
3,472,613 UART: [state] CFI Enabled
3,580,389 UART: [rt] RT listening for mailbox commands...
3,581,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,165 UART: [rt]cmd =0x41544d4e, len=14344
3,848,689 >>> mbox cmd response data (8 bytes)
3,848,690 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,871 UART: [rt]cmd =0x41545348, len=116
3,901,009 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,419 ready_for_fw is high
1,362,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,001 >>> mbox cmd response: success
2,990,319 UART:
2,990,335 UART: Running Caliptra FMC ...
2,990,743 UART:
2,990,797 UART: [state] CFI Enabled
3,001,682 UART: [fht] FMC Alias Private Key: 7
3,109,329 UART: [art] Extend RT PCRs Done
3,109,757 UART: [art] Lock RT PCRs Done
3,111,339 UART: [art] Populate DV Done
3,119,342 UART: [fht] FMC Alias Private Key: 7
3,120,366 UART: [art] Derive CDI
3,120,646 UART: [art] Store in in slot 0x4
3,206,587 UART: [art] Derive Key Pair
3,206,947 UART: [art] Store priv key in slot 0x5
3,220,275 UART: [art] Derive Key Pair - Done
3,234,928 UART: [art] Signing Cert with AUTHO
3,235,408 UART: RITY.KEYID = 7
3,250,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,359 UART: [art] PUB.X = 747EE3A0E2AE65AD70BD064B1826850392C3B8DD84CC50A2D3C9FC4250B022EDE5B2F4A3B1884E4983384BC744C02724
3,258,129 UART: [art] PUB.Y = 06B4F315404782D4A8C44E04ABFC81C276786726B8160345D4D4F72AA0154ED7E336148667A38895300A79F8DCC828E9
3,265,059 UART: [art] SIG.R = CA1274C1DA18963E4DE71C46D80DA19555904050615CBB7BC0490C38CB79F56C0E5351AD7CCBAC3F9E525A7E4E15493B
3,271,830 UART: [art] SIG.S = 351C87D69B99878E3AA6109AD9E070214361F9C0B6F7EC80CDB835B77769C384D9A110E9F2A1B3EED52ABCBD2E2C4D41
3,295,007 UART: Caliptra RT
3,295,260 UART: [state] CFI Enabled
3,403,239 UART: [rt] RT listening for mailbox commands...
3,403,909 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,197 UART: [rt]cmd =0x41544d4e, len=14344
3,672,327 >>> mbox cmd response data (8 bytes)
3,672,328 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,459 UART: [rt]cmd =0x41545348, len=116
3,724,647 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,252 UART: [kat] SHA2-256
882,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,298 UART: [kat] ++
886,450 UART: [kat] sha1
890,858 UART: [kat] SHA2-256
892,796 UART: [kat] SHA2-384
895,465 UART: [kat] SHA2-512-ACC
897,366 UART: [kat] ECC-384
903,317 UART: [kat] HMAC-384Kdf
907,935 UART: [kat] LMS
1,476,131 UART: [kat] --
1,476,782 UART: [cold-reset] ++
1,477,336 UART: [fht] Storing FHT @ 0x50003400
1,479,983 UART: [idev] ++
1,480,151 UART: [idev] CDI.KEYID = 6
1,480,511 UART: [idev] SUBJECT.KEYID = 7
1,480,935 UART: [idev] UDS.KEYID = 0
1,481,280 ready_for_fw is high
1,481,280 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,965 UART: [idev] Erasing UDS.KEYID = 0
1,505,721 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,279 UART: [idev] --
1,515,234 UART: [ldev] ++
1,515,402 UART: [ldev] CDI.KEYID = 6
1,515,765 UART: [ldev] SUBJECT.KEYID = 5
1,516,191 UART: [ldev] AUTHORITY.KEYID = 7
1,516,654 UART: [ldev] FE.KEYID = 1
1,521,826 UART: [ldev] Erasing FE.KEYID = 1
1,547,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,055 UART: [ldev] --
1,586,356 UART: [fwproc] Waiting for Commands...
1,587,083 UART: [fwproc] Received command 0x46574c44
1,587,874 UART: [fwproc] Received Image of size 114448 bytes
2,886,751 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,169 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,521 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,476 >>> mbox cmd response: success
3,080,506 UART: [afmc] ++
3,080,674 UART: [afmc] CDI.KEYID = 6
3,081,036 UART: [afmc] SUBJECT.KEYID = 7
3,081,461 UART: [afmc] AUTHORITY.KEYID = 5
3,116,540 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,084 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,864 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,592 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,477 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,167 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,102 UART: [afmc] --
3,160,210 UART: [cold-reset] --
3,161,196 UART: [state] Locking Datavault
3,162,455 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,059 UART: [state] Locking ICCM
3,163,677 UART: [exit] Launching FMC @ 0x40000130
3,169,006 UART:
3,169,022 UART: Running Caliptra FMC ...
3,169,430 UART:
3,169,573 UART: [state] CFI Enabled
3,180,264 UART: [fht] FMC Alias Private Key: 7
3,288,621 UART: [art] Extend RT PCRs Done
3,289,049 UART: [art] Lock RT PCRs Done
3,290,439 UART: [art] Populate DV Done
3,298,842 UART: [fht] FMC Alias Private Key: 7
3,299,836 UART: [art] Derive CDI
3,300,116 UART: [art] Store in in slot 0x4
3,385,669 UART: [art] Derive Key Pair
3,386,029 UART: [art] Store priv key in slot 0x5
3,399,227 UART: [art] Derive Key Pair - Done
3,413,809 UART: [art] Signing Cert with AUTHO
3,414,289 UART: RITY.KEYID = 7
3,429,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,006 UART: [art] PUB.X = 288F7F69044D505E8C8FB8993E07BE22CCF8088D2C21AA917569BFF9BDF0E8729F91EABE2E08B5910235129A1866DF4B
3,436,769 UART: [art] PUB.Y = 159965E7E0CA4A674A0C6898D31965FF8F6371BCEA3B2A8579A9C08332B258A1A61543BA2EE2CA30613253A10E5254F8
3,443,713 UART: [art] SIG.R = 31CE0E323E58F957F6E3C9476E2281A2AD74CB96068BC3460E2B52C4320AEA76CE7C5F8D3D7BA4BBC2846792DF8CA656
3,450,483 UART: [art] SIG.S = 181C015592BEC4215930C689C86B6741F1C4793D6A88621F83450B1A56B348FDFE294F7B337A10A981648ABDC09FAFA2
3,474,298 UART: Caliptra RT
3,474,643 UART: [state] CFI Enabled
3,582,883 UART: [rt] RT listening for mailbox commands...
3,583,553 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,635 UART: [rt]cmd =0x41544d4e, len=14344
3,851,479 >>> mbox cmd response data (8 bytes)
3,851,480 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,527 UART: [rt]cmd =0x41545348, len=116
3,902,771 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,748 ready_for_fw is high
1,362,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,570 >>> mbox cmd response: success
2,990,790 UART:
2,990,806 UART: Running Caliptra FMC ...
2,991,214 UART:
2,991,357 UART: [state] CFI Enabled
3,001,974 UART: [fht] FMC Alias Private Key: 7
3,110,065 UART: [art] Extend RT PCRs Done
3,110,493 UART: [art] Lock RT PCRs Done
3,111,967 UART: [art] Populate DV Done
3,120,364 UART: [fht] FMC Alias Private Key: 7
3,121,476 UART: [art] Derive CDI
3,121,756 UART: [art] Store in in slot 0x4
3,207,203 UART: [art] Derive Key Pair
3,207,563 UART: [art] Store priv key in slot 0x5
3,220,131 UART: [art] Derive Key Pair - Done
3,234,976 UART: [art] Signing Cert with AUTHO
3,235,456 UART: RITY.KEYID = 7
3,250,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,241 UART: [art] PUB.X = 87A345C7A60E1F509957A9C4B7ECDF706064FE2A03EE200C9CB98512C760956E69A516B1CD6F2A0C334274BE7D38804E
3,258,003 UART: [art] PUB.Y = 46D80188F97FA506B4A1538771EAF8BE79C1A096BABEBD1280E35DB61A722E6D9BE927F2A32B3BE38CF204A95D14C23A
3,264,958 UART: [art] SIG.R = 44B9B75C15BC89D5A5346444966D0164A0211E55CAF92893D74DE542E939C21CF367660EC2DDF1303EAD9EECD4722112
3,271,724 UART: [art] SIG.S = E87F1B85965067D7E5937EC83C0165A17FC184BE22195A439B72BA6543233B831D6E2F2D0D570BF1916C9BE6FDA753C7
3,295,330 UART: Caliptra RT
3,295,675 UART: [state] CFI Enabled
3,404,166 UART: [rt] RT listening for mailbox commands...
3,404,836 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,004 UART: [rt]cmd =0x41544d4e, len=14344
3,672,974 >>> mbox cmd response data (8 bytes)
3,672,975 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,042 UART: [rt]cmd =0x41545348, len=116
3,724,322 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
902,109 UART: [kat] SHA2-256
904,049 UART: [kat] SHA2-384
906,800 UART: [kat] SHA2-512-ACC
908,701 UART: [kat] ECC-384
918,630 UART: [kat] HMAC-384Kdf
923,190 UART: [kat] LMS
1,171,518 UART: [kat] --
1,172,167 UART: [cold-reset] ++
1,172,523 UART: [fht] FHT @ 0x50003400
1,175,190 UART: [idev] ++
1,175,358 UART: [idev] CDI.KEYID = 6
1,175,718 UART: [idev] SUBJECT.KEYID = 7
1,176,142 UART: [idev] UDS.KEYID = 0
1,176,487 ready_for_fw is high
1,176,487 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,252 UART: [idev] Erasing UDS.KEYID = 0
1,201,257 UART: [idev] Sha1 KeyId Algorithm
1,209,805 UART: [idev] --
1,210,965 UART: [ldev] ++
1,211,133 UART: [ldev] CDI.KEYID = 6
1,211,496 UART: [ldev] SUBJECT.KEYID = 5
1,211,922 UART: [ldev] AUTHORITY.KEYID = 7
1,212,385 UART: [ldev] FE.KEYID = 1
1,217,659 UART: [ldev] Erasing FE.KEYID = 1
1,243,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,767 UART: [ldev] --
1,283,178 UART: [fwproc] Wait for Commands...
1,283,806 UART: [fwproc] Recv command 0x46574c44
1,284,534 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,364 >>> mbox cmd response: success
2,776,372 UART: [afmc] ++
2,776,540 UART: [afmc] CDI.KEYID = 6
2,776,902 UART: [afmc] SUBJECT.KEYID = 7
2,777,327 UART: [afmc] AUTHORITY.KEYID = 5
2,813,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,309 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,037 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,922 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,641 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,411 UART: [afmc] --
2,856,467 UART: [cold-reset] --
2,857,343 UART: [state] Locking Datavault
2,858,730 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,334 UART: [state] Locking ICCM
2,859,990 UART: [exit] Launching FMC @ 0x40000130
2,865,319 UART:
2,865,335 UART: Running Caliptra FMC ...
2,865,743 UART:
2,865,797 UART: [state] CFI Enabled
2,876,268 UART: [fht] FMC Alias Private Key: 7
2,984,377 UART: [art] Extend RT PCRs Done
2,984,805 UART: [art] Lock RT PCRs Done
2,985,951 UART: [art] Populate DV Done
2,993,952 UART: [fht] FMC Alias Private Key: 7
2,995,108 UART: [art] Derive CDI
2,995,388 UART: [art] Store in in slot 0x4
3,080,547 UART: [art] Derive Key Pair
3,080,907 UART: [art] Store priv key in slot 0x5
3,094,217 UART: [art] Derive Key Pair - Done
3,108,796 UART: [art] Signing Cert with AUTHO
3,109,276 UART: RITY.KEYID = 7
3,124,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,071 UART: [art] PUB.X = 638736AAF9441945092493B1BD6BA07013728EC5729DA396ED5343732B37985FAD2E4FA0A583B3BBB36CA42D0F63F179
3,131,835 UART: [art] PUB.Y = 83BFF8A4BB5E0E2A63E85332C9E0DD52D7112ABA0BA80C38A186B10C7EA80C5692D711A6B6515E427D15D3A7DC712D32
3,138,782 UART: [art] SIG.R = F86B0EFD12BE4D3F3CB9EBFBC14BDD7C3F7A022741B9DE27B7BFCD2C131EFCA88C6964FD9DCCAC8BA525184526462B61
3,145,576 UART: [art] SIG.S = EE791EEEBA5E626D990EE5FF735FFD9D939BDFF7EFF2DBF87749711E1DDC5E42AC110DC5D2675EDA028447E0CC885A7C
3,169,150 UART: Caliptra RT
3,169,403 UART: [state] CFI Enabled
3,277,389 UART: [rt] RT listening for mailbox commands...
3,278,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,053 UART: [rt]cmd =0x41544d4e, len=14344
3,545,765 >>> mbox cmd response data (8 bytes)
3,545,766 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,887 UART: [rt]cmd =0x41545348, len=116
3,597,521 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,787 ready_for_fw is high
1,060,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,791 >>> mbox cmd response: success
2,688,487 UART:
2,688,503 UART: Running Caliptra FMC ...
2,688,911 UART:
2,688,965 UART: [state] CFI Enabled
2,699,492 UART: [fht] FMC Alias Private Key: 7
2,807,247 UART: [art] Extend RT PCRs Done
2,807,675 UART: [art] Lock RT PCRs Done
2,809,245 UART: [art] Populate DV Done
2,817,756 UART: [fht] FMC Alias Private Key: 7
2,818,914 UART: [art] Derive CDI
2,819,194 UART: [art] Store in in slot 0x4
2,904,707 UART: [art] Derive Key Pair
2,905,067 UART: [art] Store priv key in slot 0x5
2,917,727 UART: [art] Derive Key Pair - Done
2,932,570 UART: [art] Signing Cert with AUTHO
2,933,050 UART: RITY.KEYID = 7
2,948,078 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,843 UART: [art] PUB.X = 83D0359BB81ECB3568645D25812820C0A0D1B718701D830D2648A9DD2C55F46477E923FB026406C6675B34AC851B1241
2,955,594 UART: [art] PUB.Y = 96026A37AD2A39D52FC66FD5DDCD4174645076D9FF5F3454317E883CB8AA985BE7ED17D87A7B33B08730A0D983A934F0
2,962,547 UART: [art] SIG.R = 9E32F525AB6FF30DCAA5A47E0871E154C454456648DA2A7C8BAC360683FC1E69303861F0ED9B73C85C6E41559E280338
2,969,307 UART: [art] SIG.S = 6351AE55AD66377A9F058C6C4E2D1EA885F0F19CD7355878D4DC07600BADB2ABFAB7A2C6030355FF547EC28A2A67009D
2,993,023 UART: Caliptra RT
2,993,276 UART: [state] CFI Enabled
3,101,287 UART: [rt] RT listening for mailbox commands...
3,101,957 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,101 UART: [rt]cmd =0x41544d4e, len=14344
3,369,939 >>> mbox cmd response data (8 bytes)
3,369,940 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,979 UART: [rt]cmd =0x41545348, len=116
3,421,619 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
893,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,374 UART: [kat] ++
897,526 UART: [kat] sha1
901,700 UART: [kat] SHA2-256
903,640 UART: [kat] SHA2-384
906,253 UART: [kat] SHA2-512-ACC
908,154 UART: [kat] ECC-384
917,777 UART: [kat] HMAC-384Kdf
922,363 UART: [kat] LMS
1,170,691 UART: [kat] --
1,171,522 UART: [cold-reset] ++
1,171,920 UART: [fht] FHT @ 0x50003400
1,174,509 UART: [idev] ++
1,174,677 UART: [idev] CDI.KEYID = 6
1,175,037 UART: [idev] SUBJECT.KEYID = 7
1,175,461 UART: [idev] UDS.KEYID = 0
1,175,806 ready_for_fw is high
1,175,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,659 UART: [idev] Erasing UDS.KEYID = 0
1,200,546 UART: [idev] Sha1 KeyId Algorithm
1,209,128 UART: [idev] --
1,210,150 UART: [ldev] ++
1,210,318 UART: [ldev] CDI.KEYID = 6
1,210,681 UART: [ldev] SUBJECT.KEYID = 5
1,211,107 UART: [ldev] AUTHORITY.KEYID = 7
1,211,570 UART: [ldev] FE.KEYID = 1
1,216,864 UART: [ldev] Erasing FE.KEYID = 1
1,243,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,266 UART: [ldev] --
1,282,711 UART: [fwproc] Wait for Commands...
1,283,351 UART: [fwproc] Recv command 0x46574c44
1,284,079 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,585 >>> mbox cmd response: success
2,777,709 UART: [afmc] ++
2,777,877 UART: [afmc] CDI.KEYID = 6
2,778,239 UART: [afmc] SUBJECT.KEYID = 7
2,778,664 UART: [afmc] AUTHORITY.KEYID = 5
2,813,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,854 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,739 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,458 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,310 UART: [afmc] --
2,857,290 UART: [cold-reset] --
2,858,150 UART: [state] Locking Datavault
2,859,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,937 UART: [state] Locking ICCM
2,860,581 UART: [exit] Launching FMC @ 0x40000130
2,865,910 UART:
2,865,926 UART: Running Caliptra FMC ...
2,866,334 UART:
2,866,477 UART: [state] CFI Enabled
2,877,482 UART: [fht] FMC Alias Private Key: 7
2,985,161 UART: [art] Extend RT PCRs Done
2,985,589 UART: [art] Lock RT PCRs Done
2,987,149 UART: [art] Populate DV Done
2,995,536 UART: [fht] FMC Alias Private Key: 7
2,996,534 UART: [art] Derive CDI
2,996,814 UART: [art] Store in in slot 0x4
3,082,571 UART: [art] Derive Key Pair
3,082,931 UART: [art] Store priv key in slot 0x5
3,096,123 UART: [art] Derive Key Pair - Done
3,111,021 UART: [art] Signing Cert with AUTHO
3,111,501 UART: RITY.KEYID = 7
3,126,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,340 UART: [art] PUB.X = 6B7CB1BBCE6EC0B757232AAD68BFFCCAC79084C591F4E5C682BC4E5E5D3FB3EDFBFB3090B3288D3EFA0A12032CC2D702
3,134,131 UART: [art] PUB.Y = 3A625A96D85FF9D3BEAE040414049B2862F0E5233CB7E80199D288346C814771BF55FADD2530EFC6733D6847EFF4BE77
3,141,073 UART: [art] SIG.R = 6391D13200C6EF4CC8F96E2501ECBAD1C6684BB0CCD2C9827101318A859F5DCA4054CE71F9A4C68B4B90E4A3CE22A1CA
3,147,831 UART: [art] SIG.S = E16218065FF98277B568382D2E5B686CC272214AE3BFBD9F817E63EA3A5EDFD149B956D782497B9423205C6C1A4425B4
3,171,383 UART: Caliptra RT
3,171,728 UART: [state] CFI Enabled
3,279,781 UART: [rt] RT listening for mailbox commands...
3,280,451 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,619 UART: [rt]cmd =0x41544d4e, len=14344
3,548,559 >>> mbox cmd response data (8 bytes)
3,548,560 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,579 UART: [rt]cmd =0x41545348, len=116
3,600,389 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,970 ready_for_fw is high
1,060,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,042 >>> mbox cmd response: success
2,691,310 UART:
2,691,326 UART: Running Caliptra FMC ...
2,691,734 UART:
2,691,877 UART: [state] CFI Enabled
2,702,558 UART: [fht] FMC Alias Private Key: 7
2,810,777 UART: [art] Extend RT PCRs Done
2,811,205 UART: [art] Lock RT PCRs Done
2,812,709 UART: [art] Populate DV Done
2,821,032 UART: [fht] FMC Alias Private Key: 7
2,821,998 UART: [art] Derive CDI
2,822,278 UART: [art] Store in in slot 0x4
2,908,225 UART: [art] Derive Key Pair
2,908,585 UART: [art] Store priv key in slot 0x5
2,921,425 UART: [art] Derive Key Pair - Done
2,936,140 UART: [art] Signing Cert with AUTHO
2,936,620 UART: RITY.KEYID = 7
2,951,302 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,067 UART: [art] PUB.X = CCDB6C38D0104A31979461808068BC886F4AE96CC2B9203569E49ABB52A2D73882D64EEAA34661727FF4E84AC7B05C65
2,958,841 UART: [art] PUB.Y = C588DF8009EB6B521B03A4EF1AFE3CC74F9A41F7305B425D6861B1F7768985BE52DF4ECE0CBF79C21554AA4E65729D33
2,965,794 UART: [art] SIG.R = C24EAABCD921C80865D26598B7A73397416723737F0C2772910B82D48AE7434B3388204D39AD24403CA2DD0D24CDD322
2,972,548 UART: [art] SIG.S = 866D7F5DEF92AD2552A42FE05A8219AEEEF3B6572F8537A44CC36E700F1CC2C857EB5710E238E1854E3826946772DD37
2,996,506 UART: Caliptra RT
2,996,851 UART: [state] CFI Enabled
3,104,805 UART: [rt] RT listening for mailbox commands...
3,105,475 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,475 UART: [rt]cmd =0x41544d4e, len=14344
3,372,953 >>> mbox cmd response data (8 bytes)
3,372,954 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,749 UART: [rt]cmd =0x41545348, len=116
3,425,039 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,170,059 UART: [fht] FHT @ 0x50003400
1,172,533 UART: [idev] ++
1,172,701 UART: [idev] CDI.KEYID = 6
1,173,062 UART: [idev] SUBJECT.KEYID = 7
1,173,487 UART: [idev] UDS.KEYID = 0
1,173,833 ready_for_fw is high
1,173,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,817 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Sha1 KeyId Algorithm
1,208,417 UART: [idev] --
1,209,640 UART: [ldev] ++
1,209,808 UART: [ldev] CDI.KEYID = 6
1,210,172 UART: [ldev] SUBJECT.KEYID = 5
1,210,599 UART: [ldev] AUTHORITY.KEYID = 7
1,211,062 UART: [ldev] FE.KEYID = 1
1,215,996 UART: [ldev] Erasing FE.KEYID = 1
1,241,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,568 UART: [ldev] --
1,280,886 UART: [fwproc] Wait for Commands...
1,281,535 UART: [fwproc] Recv command 0x46574c44
1,282,268 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,032 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,120 >>> mbox cmd response: success
2,775,325 UART: [afmc] ++
2,775,493 UART: [afmc] CDI.KEYID = 6
2,775,856 UART: [afmc] SUBJECT.KEYID = 7
2,776,282 UART: [afmc] AUTHORITY.KEYID = 5
2,811,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,768 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,487 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,270 UART: [afmc] --
2,854,190 UART: [cold-reset] --
2,854,982 UART: [state] Locking Datavault
2,856,085 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,689 UART: [state] Locking ICCM
2,857,203 UART: [exit] Launching FMC @ 0x40000130
2,862,532 UART:
2,862,548 UART: Running Caliptra FMC ...
2,862,956 UART:
2,863,010 UART: [state] CFI Enabled
2,873,193 UART: [fht] FMC Alias Private Key: 7
2,980,938 UART: [art] Extend RT PCRs Done
2,981,366 UART: [art] Lock RT PCRs Done
2,983,210 UART: [art] Populate DV Done
2,991,343 UART: [fht] FMC Alias Private Key: 7
2,992,291 UART: [art] Derive CDI
2,992,571 UART: [art] Store in in slot 0x4
3,077,874 UART: [art] Derive Key Pair
3,078,234 UART: [art] Store priv key in slot 0x5
3,091,112 UART: [art] Derive Key Pair - Done
3,105,975 UART: [art] Signing Cert with AUTHO
3,106,455 UART: RITY.KEYID = 7
3,122,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,778 UART: [art] PUB.X = E5713CDED30DEF1E4F3FF5AF98EF8D0FF1CD69D99D9383BCC218FED4EDDC3D7E60865FDA77C4DFE1A42A038559C30ED2
3,129,568 UART: [art] PUB.Y = E9D6933DA669A8D3033C2D449860D3B32EBA2730D1EC00699AC9768F463626FF2B55B545C6E0360F49E7A15B01C8659F
3,136,487 UART: [art] SIG.R = 426CC770191EC59891603320F503A70763CC07EC4ABF04C41585471C5C3DEC3D418AB2DAE7AEBF0AC6CCB45CD7403803
3,143,249 UART: [art] SIG.S = 9B7373A4A5AA378C47271FEB8A47566500434EAB20D7C8E009F3427A99A027979FCF3541346CEEE304B548FD96F3E257
3,167,260 UART: Caliptra RT
3,167,513 UART: [state] CFI Enabled
3,275,774 UART: [rt] RT listening for mailbox commands...
3,276,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,418 UART: [rt]cmd =0x41544d4e, len=14344
3,544,250 >>> mbox cmd response data (8 bytes)
3,544,251 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,438 UART: [rt]cmd =0x41545348, len=116
3,596,560 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,732 ready_for_fw is high
1,055,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,359 >>> mbox cmd response: success
2,684,925 UART:
2,684,941 UART: Running Caliptra FMC ...
2,685,349 UART:
2,685,403 UART: [state] CFI Enabled
2,695,646 UART: [fht] FMC Alias Private Key: 7
2,803,097 UART: [art] Extend RT PCRs Done
2,803,525 UART: [art] Lock RT PCRs Done
2,805,035 UART: [art] Populate DV Done
2,813,578 UART: [fht] FMC Alias Private Key: 7
2,814,582 UART: [art] Derive CDI
2,814,862 UART: [art] Store in in slot 0x4
2,900,819 UART: [art] Derive Key Pair
2,901,179 UART: [art] Store priv key in slot 0x5
2,913,979 UART: [art] Derive Key Pair - Done
2,929,132 UART: [art] Signing Cert with AUTHO
2,929,612 UART: RITY.KEYID = 7
2,945,044 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,809 UART: [art] PUB.X = 894DD2F1D1D226C2C083FAF8703349269D467A96FAE4135195A7E75C6B612532EC126DC71E0D98A5F2456F7135DEE9F7
2,952,578 UART: [art] PUB.Y = 9C1EDE61CCF770AE32439394E9BEFE47EE845A896001B52BC7FC5983D7B1668CA64CC6FB5456A0B74F212AC0F01AC97D
2,959,541 UART: [art] SIG.R = 05214CBE45717237E7F9576B520C70998EF9190815D9AD1BDDF6C5F9EF3177FDAB2B24BB9E791851FB63BE12963608D7
2,966,303 UART: [art] SIG.S = BC2D3743C18E09CD970430980FCE252135C0913EA69954F0ADA61D105E37F66B08F4A2F21FCE98DB7C488644DB6E0E39
2,990,869 UART: Caliptra RT
2,991,122 UART: [state] CFI Enabled
3,099,243 UART: [rt] RT listening for mailbox commands...
3,099,913 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,023 UART: [rt]cmd =0x41544d4e, len=14344
3,367,919 >>> mbox cmd response data (8 bytes)
3,367,920 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,047 UART: [rt]cmd =0x41545348, len=116
3,420,063 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,786 UART: [kat] ++
895,938 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
916,527 UART: [kat] HMAC-384Kdf
921,145 UART: [kat] LMS
1,169,457 UART: [kat] --
1,170,212 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,198 UART: [idev] ++
1,173,366 UART: [idev] CDI.KEYID = 6
1,173,727 UART: [idev] SUBJECT.KEYID = 7
1,174,152 UART: [idev] UDS.KEYID = 0
1,174,498 ready_for_fw is high
1,174,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,208,036 UART: [idev] --
1,209,179 UART: [ldev] ++
1,209,347 UART: [ldev] CDI.KEYID = 6
1,209,711 UART: [ldev] SUBJECT.KEYID = 5
1,210,138 UART: [ldev] AUTHORITY.KEYID = 7
1,210,601 UART: [ldev] FE.KEYID = 1
1,215,903 UART: [ldev] Erasing FE.KEYID = 1
1,241,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,565 UART: [ldev] --
1,281,031 UART: [fwproc] Wait for Commands...
1,281,840 UART: [fwproc] Recv command 0x46574c44
1,282,573 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,795 >>> mbox cmd response: success
2,774,810 UART: [afmc] ++
2,774,978 UART: [afmc] CDI.KEYID = 6
2,775,341 UART: [afmc] SUBJECT.KEYID = 7
2,775,767 UART: [afmc] AUTHORITY.KEYID = 5
2,811,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,191 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,910 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,857 UART: [afmc] --
2,854,785 UART: [cold-reset] --
2,855,613 UART: [state] Locking Datavault
2,856,618 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,222 UART: [state] Locking ICCM
2,857,842 UART: [exit] Launching FMC @ 0x40000130
2,863,171 UART:
2,863,187 UART: Running Caliptra FMC ...
2,863,595 UART:
2,863,738 UART: [state] CFI Enabled
2,874,401 UART: [fht] FMC Alias Private Key: 7
2,982,290 UART: [art] Extend RT PCRs Done
2,982,718 UART: [art] Lock RT PCRs Done
2,984,406 UART: [art] Populate DV Done
2,992,573 UART: [fht] FMC Alias Private Key: 7
2,993,629 UART: [art] Derive CDI
2,993,909 UART: [art] Store in in slot 0x4
3,079,644 UART: [art] Derive Key Pair
3,080,004 UART: [art] Store priv key in slot 0x5
3,093,026 UART: [art] Derive Key Pair - Done
3,107,989 UART: [art] Signing Cert with AUTHO
3,108,469 UART: RITY.KEYID = 7
3,123,877 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,642 UART: [art] PUB.X = 675114A740605B5151D43415901EED2EB5E2FA715F2CE90255BFE9FDBB466BF20AC837CFF1E17FD912392813A63387C8
3,131,410 UART: [art] PUB.Y = 8EEB6C624EB9AA624FB3570B941B521C79DA2BACC0C50996B6E77CFE75651BBCB8E22D9700A214FE135DAE46048A7221
3,138,343 UART: [art] SIG.R = B86069F12A8165DA7C60CF20A93AF7960959DB7A0BA0922285741A61AA7D6CB21E47C5F7966ECFFB6099352960936855
3,145,105 UART: [art] SIG.S = A6C4C1E81FDF2D6CA38331ECB4423108928996FDB08CF86EDC5A653C65364EDEF48B1CDEF1B9E8251019D72335EED960
3,169,557 UART: Caliptra RT
3,169,902 UART: [state] CFI Enabled
3,277,410 UART: [rt] RT listening for mailbox commands...
3,278,080 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,298 UART: [rt]cmd =0x41544d4e, len=14344
3,545,906 >>> mbox cmd response data (8 bytes)
3,545,907 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,178 UART: [rt]cmd =0x41545348, len=116
3,597,334 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,785 ready_for_fw is high
1,055,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,315 >>> mbox cmd response: success
2,687,985 UART:
2,688,001 UART: Running Caliptra FMC ...
2,688,409 UART:
2,688,552 UART: [state] CFI Enabled
2,699,391 UART: [fht] FMC Alias Private Key: 7
2,807,326 UART: [art] Extend RT PCRs Done
2,807,754 UART: [art] Lock RT PCRs Done
2,809,342 UART: [art] Populate DV Done
2,817,547 UART: [fht] FMC Alias Private Key: 7
2,818,655 UART: [art] Derive CDI
2,818,935 UART: [art] Store in in slot 0x4
2,904,798 UART: [art] Derive Key Pair
2,905,158 UART: [art] Store priv key in slot 0x5
2,918,608 UART: [art] Derive Key Pair - Done
2,933,121 UART: [art] Signing Cert with AUTHO
2,933,601 UART: RITY.KEYID = 7
2,948,901 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,666 UART: [art] PUB.X = 845C1A4F80C9E2F0F35EB5D3C2CCE655C9577C1F788D3DED5A5ABD4600F69504BB0694A5E0BBB0BC822A37629D006B4A
2,956,402 UART: [art] PUB.Y = 74943CA2EB5AF002A597842C65CBB79E5FD5EF2FF4383B40A0AB8E6AB1441BF11FAA5DA472FD8E2971E8FE8077B92554
2,963,365 UART: [art] SIG.R = 8BB0224958B2300514910E033E81694246919F3E510EE15B57190D22D42CB35ADE54B7C3DD09367C5135186486B690F4
2,970,103 UART: [art] SIG.S = 8A6E8E5FC5FB275B437DEC709B21A5848018789FF51933D063A3CB01859D9F9C81384AD0EFD7419BF64A729693295D17
2,993,701 UART: Caliptra RT
2,994,046 UART: [state] CFI Enabled
3,102,612 UART: [rt] RT listening for mailbox commands...
3,103,282 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,454 UART: [rt]cmd =0x41544d4e, len=14344
3,371,262 >>> mbox cmd response data (8 bytes)
3,371,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,190 UART: [rt]cmd =0x41545348, len=116
3,423,018 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,143 UART:
192,510 UART: Running Caliptra ROM ...
193,610 UART:
193,752 UART: [state] CFI Enabled
266,686 UART: [state] LifecycleState = Unprovisioned
268,597 UART: [state] DebugLocked = No
270,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,982 UART: [kat] SHA2-256
445,680 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,200 UART: [kat] ++
456,641 UART: [kat] sha1
467,520 UART: [kat] SHA2-256
470,230 UART: [kat] SHA2-384
476,016 UART: [kat] SHA2-512-ACC
478,393 UART: [kat] ECC-384
2,767,426 UART: [kat] HMAC-384Kdf
2,798,435 UART: [kat] LMS
3,988,745 UART: [kat] --
3,992,208 UART: [cold-reset] ++
3,994,075 UART: [fht] Storing FHT @ 0x50003400
4,005,766 UART: [idev] ++
4,006,335 UART: [idev] CDI.KEYID = 6
4,007,269 UART: [idev] SUBJECT.KEYID = 7
4,008,523 UART: [idev] UDS.KEYID = 0
4,009,599 ready_for_fw is high
4,009,844 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,049,985 UART: [idev] Erasing UDS.KEYID = 0
7,345,505 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,917 UART: [idev] --
7,370,995 UART: [ldev] ++
7,371,568 UART: [ldev] CDI.KEYID = 6
7,372,509 UART: [ldev] SUBJECT.KEYID = 5
7,373,722 UART: [ldev] AUTHORITY.KEYID = 7
7,375,008 UART: [ldev] FE.KEYID = 1
7,421,252 UART: [ldev] Erasing FE.KEYID = 1
10,756,205 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,138 UART: [ldev] --
13,138,293 UART: [fwproc] Waiting for Commands...
13,140,120 UART: [fwproc] Received command 0x46574c44
13,142,356 UART: [fwproc] Received Image of size 31676 bytes
16,185,851 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,258,122 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,327,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,356,233 >>> mbox cmd response: success
16,360,289 UART: [afmc] ++
16,360,904 UART: [afmc] CDI.KEYID = 6
16,361,930 UART: [afmc] SUBJECT.KEYID = 7
16,363,082 UART: [afmc] AUTHORITY.KEYID = 5
19,727,030 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,028,476 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,030,773 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,045,182 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,060,000 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,074,459 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,094,915 UART: [afmc] --
22,098,563 UART: [cold-reset] --
22,101,666 UART: [state] Locking Datavault
22,105,090 UART: [state] Locking PCR0, PCR1 and PCR31
22,106,876 UART: [state] Locking ICCM
22,107,918 UART: [exit] Launching FMC @ 0x40000130
22,116,297 UART:
22,116,539 UART: Running Caliptra FMC ...
22,117,680 UART:
22,117,840 UART: [state] CFI Enabled
22,188,099 UART: [fht] FMC Alias Private Key: 7
24,525,929 UART: [art] Extend RT PCRs Done
24,527,190 UART: [art] Lock RT PCRs Done
24,528,600 UART: [art] Populate DV Done
24,533,986 UART: [fht] FMC Alias Private Key: 7
24,535,454 UART: [art] Derive CDI
24,536,249 UART: [art] Store in in slot 0x4
24,596,570 UART: [art] Derive Key Pair
24,597,652 UART: [art] Store priv key in slot 0x5
27,890,811 UART: [art] Derive Key Pair - Done
27,904,029 UART: [art] Signing Cert with AUTHO
27,905,403 UART: RITY.KEYID = 7
30,192,649 UART: [art] Erasing AUTHORITY.KEYID = 7
30,194,200 UART: [art] PUB.X = 49B10B8C71997AB9B5053F14FCEE0D9DFECFE451D190C7A199858FFB3D652A5964392B77BC546E3A1AF3FB96D4C4A7FE
30,201,423 UART: [art] PUB.Y = BE3DA4E82933C90DC9B089F10228D751AF03088DFA468EACE7769B65A76FBC6649B7C28D916AEC91F76FABB2CFE7D1A3
30,208,749 UART: [art] SIG.R = 8A87337949E1F10272BFED747E530FCABB9F06ABB1EAED0DA88FDF7BF304DA59654120416175BAD3E42F0E0744B28994
30,216,152 UART: [art] SIG.S = 86BA4304D24E1DB3E888D34FFA94130A4467F351F4941223E37BE9C156FE5DB560A0B58675771BF9F10B0A14909B044C
31,520,797 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,806,061 ready_for_fw is high
3,806,781 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,173,805 >>> mbox cmd response: success
21,860,934 UART:
21,861,318 UART: Running Caliptra FMC ...
21,862,466 UART:
21,862,629 UART: [state] CFI Enabled
21,929,273 UART: [fht] FMC Alias Private Key: 7
24,266,863 UART: [art] Extend RT PCRs Done
24,268,139 UART: [art] Lock RT PCRs Done
24,269,481 UART: [art] Populate DV Done
24,274,907 UART: [fht] FMC Alias Private Key: 7
24,276,523 UART: [art] Derive CDI
24,277,327 UART: [art] Store in in slot 0x4
24,338,187 UART: [art] Derive Key Pair
24,339,241 UART: [art] Store priv key in slot 0x5
27,631,680 UART: [art] Derive Key Pair - Done
27,644,565 UART: [art] Signing Cert with AUTHO
27,645,910 UART: RITY.KEYID = 7
29,934,097 UART: [art] Erasing AUTHORITY.KEYID = 7
29,935,720 UART: [art] PUB.X = 45E76445B19C5C67154B51CFB08B99B0A790B1B492F1135CCAD0048063B795A695760690D1D08CFAC7FB0207F1DF59FB
29,942,906 UART: [art] PUB.Y = 48D7B83A6B821A1F49983E83DCE6720689457A4B81EB80CB9E97B47AA07406001BEC4854DDD415FB68C823D9B9FA26D2
29,950,100 UART: [art] SIG.R = 57902A735B1B2226D92B1BCEF75DDDC00FC8FCE1FB304DE834057B7B83EEF23F0EC7CEAB68C0B35A9DB9E27B14CB5B1B
29,957,571 UART: [art] SIG.S = AA70A772EBCB25987AF8788D5DFB39F6B11071B28A45C551BDEA549C60166ABD9BEB010FA88A2ED68FDA7A8F36B07324
31,262,119 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,235 UART:
192,595 UART: Running Caliptra ROM ...
193,703 UART:
603,395 UART: [state] CFI Enabled
619,197 UART: [state] LifecycleState = Unprovisioned
621,142 UART: [state] DebugLocked = No
624,089 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,443 UART: [kat] SHA2-256
799,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,698 UART: [kat] ++
810,167 UART: [kat] sha1
821,746 UART: [kat] SHA2-256
824,468 UART: [kat] SHA2-384
830,171 UART: [kat] SHA2-512-ACC
832,536 UART: [kat] ECC-384
3,116,003 UART: [kat] HMAC-384Kdf
3,128,772 UART: [kat] LMS
4,318,882 UART: [kat] --
4,321,975 UART: [cold-reset] ++
4,324,473 UART: [fht] Storing FHT @ 0x50003400
4,335,238 UART: [idev] ++
4,335,799 UART: [idev] CDI.KEYID = 6
4,336,824 UART: [idev] SUBJECT.KEYID = 7
4,337,990 UART: [idev] UDS.KEYID = 0
4,339,079 ready_for_fw is high
4,339,314 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,379,509 UART: [idev] Erasing UDS.KEYID = 0
7,622,500 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,137 UART: [idev] --
7,648,896 UART: [ldev] ++
7,649,522 UART: [ldev] CDI.KEYID = 6
7,650,401 UART: [ldev] SUBJECT.KEYID = 5
7,651,659 UART: [ldev] AUTHORITY.KEYID = 7
7,652,943 UART: [ldev] FE.KEYID = 1
7,662,099 UART: [ldev] Erasing FE.KEYID = 1
10,946,369 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,730 UART: [ldev] --
13,304,124 UART: [fwproc] Waiting for Commands...
13,307,025 UART: [fwproc] Received command 0x46574c44
13,309,257 UART: [fwproc] Received Image of size 31676 bytes
16,359,022 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,432,392 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,501,257 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,529,512 >>> mbox cmd response: success
16,533,803 UART: [afmc] ++
16,534,418 UART: [afmc] CDI.KEYID = 6
16,535,355 UART: [afmc] SUBJECT.KEYID = 7
16,536,606 UART: [afmc] AUTHORITY.KEYID = 5
19,850,790 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,142,767 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,145,069 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,159,444 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,174,293 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,188,734 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,209,912 UART: [afmc] --
22,213,157 UART: [cold-reset] --
22,217,564 UART: [state] Locking Datavault
22,221,208 UART: [state] Locking PCR0, PCR1 and PCR31
22,222,962 UART: [state] Locking ICCM
22,224,766 UART: [exit] Launching FMC @ 0x40000130
22,233,125 UART:
22,233,378 UART: Running Caliptra FMC ...
22,234,522 UART:
22,234,676 UART: [state] CFI Enabled
22,242,898 UART: [fht] FMC Alias Private Key: 7
24,573,131 UART: [art] Extend RT PCRs Done
24,574,398 UART: [art] Lock RT PCRs Done
24,575,678 UART: [art] Populate DV Done
24,581,223 UART: [fht] FMC Alias Private Key: 7
24,582,958 UART: [art] Derive CDI
24,583,809 UART: [art] Store in in slot 0x4
24,626,283 UART: [art] Derive Key Pair
24,627,354 UART: [art] Store priv key in slot 0x5
27,869,305 UART: [art] Derive Key Pair - Done
27,882,185 UART: [art] Signing Cert with AUTHO
27,883,550 UART: RITY.KEYID = 7
30,162,647 UART: [art] Erasing AUTHORITY.KEYID = 7
30,164,199 UART: [art] PUB.X = 9BF48C0CA3BD58CC6F885C90116FBD094CA9DEDD5F5CC84694CD6F461F55D8FACE2D116FD65A382262ACDDC8B90B8FFD
30,171,426 UART: [art] PUB.Y = 484990FC45DD362C44AA025C3D9CAF7542584DB633BA37938E2C0F22F219C042FA9BC14170957FC61DE64E981E0A2CC2
30,178,666 UART: [art] SIG.R = BAE3FE4C8D2A0FE83F826509FF2B30B194307FDC6F3989D5EF9D4BF35444AEC10FCD1373355C1C747FE479F593E84712
30,186,081 UART: [art] SIG.S = AEE56A66C0D40E590EC5535ED3AAA3C0C5788ACBC49182C352A2C1C3E074658F29B336E66BB4403F7D58E80A94EA5B5D
31,491,045 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,127,967 ready_for_fw is high
4,128,406 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,389,412 >>> mbox cmd response: success
22,029,138 UART:
22,029,528 UART: Running Caliptra FMC ...
22,030,671 UART:
22,030,837 UART: [state] CFI Enabled
22,038,801 UART: [fht] FMC Alias Private Key: 7
24,368,995 UART: [art] Extend RT PCRs Done
24,370,275 UART: [art] Lock RT PCRs Done
24,371,990 UART: [art] Populate DV Done
24,377,212 UART: [fht] FMC Alias Private Key: 7
24,378,823 UART: [art] Derive CDI
24,379,680 UART: [art] Store in in slot 0x4
24,422,219 UART: [art] Derive Key Pair
24,423,305 UART: [art] Store priv key in slot 0x5
27,665,505 UART: [art] Derive Key Pair - Done
27,678,520 UART: [art] Signing Cert with AUTHO
27,679,866 UART: RITY.KEYID = 7
29,959,183 UART: [art] Erasing AUTHORITY.KEYID = 7
29,960,741 UART: [art] PUB.X = 5B58365768CEBD798F7C34F57F62985F19E287BC16A9740F22FB835F366CC7C1F22BA8CF2987D80A4D16214769F16CE9
29,967,889 UART: [art] PUB.Y = F1508699020DD51FCDEC5DFCE30C9C2A6109AA3B9E7130771B05DD2DDCF59197CE1D4032897571CDAE06A4DEA9F383EE
29,975,129 UART: [art] SIG.R = EF317243D336FAEF5963431BAA933584B186D6C0FFA537F798DFA0E7AAFBD254D3E46F49C5CFEBA7B3BC0F2547AE0903
29,982,563 UART: [art] SIG.S = 2DB4CC32B29E01F6D437A6EE6B95BFF2E194B0D24A6E6EBB4EF4B6E5DF41110130C9A86E884B079F9CD1C076012CD35E
31,287,513 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,156 UART:
192,510 UART: Running Caliptra ROM ...
193,700 UART:
193,855 UART: [state] CFI Enabled
266,520 UART: [state] LifecycleState = Unprovisioned
268,375 UART: [state] DebugLocked = No
271,257 UART: [state] WD Timer not started. Device not locked for debugging
275,861 UART: [kat] SHA2-256
454,981 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,560 UART: [kat] ++
467,107 UART: [kat] sha1
478,345 UART: [kat] SHA2-256
481,346 UART: [kat] SHA2-384
487,552 UART: [kat] SHA2-512-ACC
490,488 UART: [kat] ECC-384
2,951,793 UART: [kat] HMAC-384Kdf
2,971,689 UART: [kat] LMS
3,501,175 UART: [kat] --
3,506,234 UART: [cold-reset] ++
3,508,518 UART: [fht] FHT @ 0x50003400
3,518,995 UART: [idev] ++
3,519,555 UART: [idev] CDI.KEYID = 6
3,520,482 UART: [idev] SUBJECT.KEYID = 7
3,521,652 UART: [idev] UDS.KEYID = 0
3,522,579 ready_for_fw is high
3,522,770 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,562,825 UART: [idev] Erasing UDS.KEYID = 0
6,026,045 UART: [idev] Sha1 KeyId Algorithm
6,047,436 UART: [idev] --
6,051,682 UART: [ldev] ++
6,052,257 UART: [ldev] CDI.KEYID = 6
6,053,169 UART: [ldev] SUBJECT.KEYID = 5
6,054,377 UART: [ldev] AUTHORITY.KEYID = 7
6,055,543 UART: [ldev] FE.KEYID = 1
6,098,822 UART: [ldev] Erasing FE.KEYID = 1
8,602,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,695 UART: [ldev] --
10,412,656 UART: [fwproc] Wait for Commands...
10,414,768 UART: [fwproc] Recv command 0x46574c44
10,416,865 UART: [fwproc] Recv'd Img size: 31656 bytes
12,813,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,887,487 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,956,292 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,983,928 >>> mbox cmd response: success
12,988,197 UART: [afmc] ++
12,988,806 UART: [afmc] CDI.KEYID = 6
12,989,832 UART: [afmc] SUBJECT.KEYID = 7
12,990,970 UART: [afmc] AUTHORITY.KEYID = 5
15,525,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,251,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,253,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,269,160 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,285,189 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,301,082 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,322,941 UART: [afmc] --
17,326,138 UART: [cold-reset] --
17,331,484 UART: [state] Locking Datavault
17,336,720 UART: [state] Locking PCR0, PCR1 and PCR31
17,338,402 UART: [state] Locking ICCM
17,340,684 UART: [exit] Launching FMC @ 0x40000130
17,349,143 UART:
17,349,388 UART: Running Caliptra FMC ...
17,350,522 UART:
17,350,688 UART: [state] CFI Enabled
17,409,439 UART: [fht] FMC Alias Private Key: 7
19,172,858 UART: [art] Extend RT PCRs Done
19,174,122 UART: [art] Lock RT PCRs Done
19,175,663 UART: [art] Populate DV Done
19,181,244 UART: [fht] FMC Alias Private Key: 7
19,182,960 UART: [art] Derive CDI
19,183,748 UART: [art] Store in in slot 0x4
19,241,899 UART: [art] Derive Key Pair
19,242,930 UART: [art] Store priv key in slot 0x5
21,705,527 UART: [art] Derive Key Pair - Done
21,718,444 UART: [art] Signing Cert with AUTHO
21,719,775 UART: RITY.KEYID = 7
23,431,277 UART: [art] Erasing AUTHORITY.KEYID = 7
23,432,821 UART: [art] PUB.X = 6FC6E2AB82A3AC6CB74C01C8F82E11161C2B12D786C9B4A358E826B1B44BB932E1DEF6E4E283ECE51FA1D12B24B2225C
23,440,029 UART: [art] PUB.Y = 2F26E7F7032B988BF975C174D1954E26F1C2DA5546D7ED4B874AF971C5BAA6375FC3FAD8DE7EC2E4C1195514683F1BF3
23,447,345 UART: [art] SIG.R = AF0443EBF5A2A550F5A704CE9EEADAB84248A5D9D72FB3982CA14684E715ECD54A72A013300ED4353DFA33FBF6EDAA9F
23,454,741 UART: [art] SIG.S = 3013B15DE89B30BB1D6577E063CAD891F74B2032C569C1A10D7ADA07D433D25EB00A9F92047D4F2140EB9F32C14EBCE5
24,433,931 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,359,527 ready_for_fw is high
3,359,907 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,781,258 >>> mbox cmd response: success
17,076,138 UART:
17,076,543 UART: Running Caliptra FMC ...
17,077,703 UART:
17,077,869 UART: [state] CFI Enabled
17,145,598 UART: [fht] FMC Alias Private Key: 7
18,909,031 UART: [art] Extend RT PCRs Done
18,910,292 UART: [art] Lock RT PCRs Done
18,911,869 UART: [art] Populate DV Done
18,917,224 UART: [fht] FMC Alias Private Key: 7
18,918,723 UART: [art] Derive CDI
18,919,716 UART: [art] Store in in slot 0x4
18,978,232 UART: [art] Derive Key Pair
18,979,285 UART: [art] Store priv key in slot 0x5
21,441,859 UART: [art] Derive Key Pair - Done
21,454,928 UART: [art] Signing Cert with AUTHO
21,456,267 UART: RITY.KEYID = 7
23,167,778 UART: [art] Erasing AUTHORITY.KEYID = 7
23,169,326 UART: [art] PUB.X = E23C0BDD62E884F54A89EFF0EBDA084C58F8DEF134001FB7D9017F5CA4C7A515D66C0C99D2C2BAFDEEDC865DBF07FD05
23,176,535 UART: [art] PUB.Y = 385644AD497F3D4F4FC4B5ED4F86B31518A9C06C6D46DF424ABA23F924FCF099EFFC244D1183FA7A2ED39D5A55604DCB
23,183,843 UART: [art] SIG.R = 25449471948A0F09E76D8E89A88A432ECBA09EBBC4D05C39F5C8C94EEF68342892F18A3D8C70D80A4E874B3DFDB4714E
23,191,244 UART: [art] SIG.S = 94138D8C60D8423FD734FBFC5005CA8B6C72E587FDE495F6B20EC3AE3B5F9C3A0264F86ABA13391CE4E3D9442CC55A6A
24,169,621 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
192,340 UART:
192,707 UART: Running Caliptra ROM ...
193,833 UART:
603,424 UART: [state] CFI Enabled
614,591 UART: [state] LifecycleState = Unprovisioned
616,451 UART: [state] DebugLocked = No
617,972 UART: [state] WD Timer not started. Device not locked for debugging
620,862 UART: [kat] SHA2-256
799,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,584 UART: [kat] ++
812,029 UART: [kat] sha1
823,724 UART: [kat] SHA2-256
826,727 UART: [kat] SHA2-384
834,205 UART: [kat] SHA2-512-ACC
837,204 UART: [kat] ECC-384
3,280,889 UART: [kat] HMAC-384Kdf
3,293,206 UART: [kat] LMS
3,822,660 UART: [kat] --
3,828,920 UART: [cold-reset] ++
3,830,843 UART: [fht] FHT @ 0x50003400
3,841,953 UART: [idev] ++
3,842,503 UART: [idev] CDI.KEYID = 6
3,843,450 UART: [idev] SUBJECT.KEYID = 7
3,844,680 UART: [idev] UDS.KEYID = 0
3,845,569 ready_for_fw is high
3,845,758 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,885,922 UART: [idev] Erasing UDS.KEYID = 0
6,315,582 UART: [idev] Sha1 KeyId Algorithm
6,337,890 UART: [idev] --
6,340,743 UART: [ldev] ++
6,341,302 UART: [ldev] CDI.KEYID = 6
6,342,178 UART: [ldev] SUBJECT.KEYID = 5
6,343,299 UART: [ldev] AUTHORITY.KEYID = 7
6,344,617 UART: [ldev] FE.KEYID = 1
6,356,847 UART: [ldev] Erasing FE.KEYID = 1
8,829,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,876 UART: [ldev] --
10,620,072 UART: [fwproc] Wait for Commands...
10,622,227 UART: [fwproc] Recv command 0x46574c44
10,624,283 UART: [fwproc] Recv'd Img size: 31656 bytes
13,017,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,092,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,161,189 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,189,415 >>> mbox cmd response: success
13,193,873 UART: [afmc] ++
13,194,480 UART: [afmc] CDI.KEYID = 6
13,195,435 UART: [afmc] SUBJECT.KEYID = 7
13,196,575 UART: [afmc] AUTHORITY.KEYID = 5
15,690,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,410,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,412,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,428,454 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,444,475 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,460,312 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,483,271 UART: [afmc] --
17,487,110 UART: [cold-reset] --
17,491,412 UART: [state] Locking Datavault
17,496,135 UART: [state] Locking PCR0, PCR1 and PCR31
17,497,810 UART: [state] Locking ICCM
17,499,276 UART: [exit] Launching FMC @ 0x40000130
17,507,638 UART:
17,507,877 UART: Running Caliptra FMC ...
17,508,928 UART:
17,509,070 UART: [state] CFI Enabled
17,517,198 UART: [fht] FMC Alias Private Key: 7
19,274,295 UART: [art] Extend RT PCRs Done
19,275,558 UART: [art] Lock RT PCRs Done
19,277,184 UART: [art] Populate DV Done
19,282,560 UART: [fht] FMC Alias Private Key: 7
19,284,164 UART: [art] Derive CDI
19,285,011 UART: [art] Store in in slot 0x4
19,327,485 UART: [art] Derive Key Pair
19,328,578 UART: [art] Store priv key in slot 0x5
21,754,996 UART: [art] Derive Key Pair - Done
21,767,849 UART: [art] Signing Cert with AUTHO
21,769,175 UART: RITY.KEYID = 7
23,474,380 UART: [art] Erasing AUTHORITY.KEYID = 7
23,476,529 UART: [art] PUB.X = 4EFA910FF058B257842686617C3A37756233E00D15AF402B9183644A2F985DE39BF81FC8CD8D22EA6C625A358C12C9BA
23,483,131 UART: [art] PUB.Y = 4C1B90B2DC732255FFDD606802E75431552B452473A60BE7541DAFFC17C5871A976FBF8AFFD7247640F693317D2C4531
23,490,407 UART: [art] SIG.R = FDCA293C811590EF3EE238361DF1B208027401DC303CD4ED1E499BE89FF3A5D1A42523BAD05E4DD6D33E446966B153F0
23,497,759 UART: [art] SIG.S = 29F20BC2AFEA6F71224676298CD3FDF1CBF72E7F099E48C7A76358D8A7A6BD74A5DFD37B4AE0DD02953B12456D1B48DF
24,476,414 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,700,731 ready_for_fw is high
3,701,140 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,969,502 >>> mbox cmd response: success
17,219,282 UART:
17,219,737 UART: Running Caliptra FMC ...
17,220,869 UART:
17,221,022 UART: [state] CFI Enabled
17,228,623 UART: [fht] FMC Alias Private Key: 7
18,985,925 UART: [art] Extend RT PCRs Done
18,987,202 UART: [art] Lock RT PCRs Done
18,989,336 UART: [art] Populate DV Done
18,994,932 UART: [fht] FMC Alias Private Key: 7
18,996,598 UART: [art] Derive CDI
18,997,449 UART: [art] Store in in slot 0x4
19,040,007 UART: [art] Derive Key Pair
19,041,067 UART: [art] Store priv key in slot 0x5
21,467,542 UART: [art] Derive Key Pair - Done
21,480,549 UART: [art] Signing Cert with AUTHO
21,481,887 UART: RITY.KEYID = 7
23,187,573 UART: [art] Erasing AUTHORITY.KEYID = 7
23,189,138 UART: [art] PUB.X = BF5B3A8DD902066167E8017F9D4F53195AB3AC972985A5C183CC83AAC0E837C574DBD49CFC849330D6EF5E0E31933841
23,196,411 UART: [art] PUB.Y = 4D8DC9182CE5187444B5B91337C43E0BE32EE1847A9D15085D53A8CA2830C2A94043D2C5BCD76F08C3B1EA5E0E91F1E6
23,203,572 UART: [art] SIG.R = 314EA95C23E1EAA3FA33F13E21F9470EC7EA960671FACFD11344EB74B6B487D4EAFA9B8098F980D50A4C4AC6F64B71BE
23,211,030 UART: [art] SIG.S = 7401DC162A0706ADF059910213D3122DEFF0A05F3DD357A7A4642D208CE1039E143E6A115ED55B76EB01E6CDAE2DAA8D
24,189,781 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,835 writing to cptra_bootfsm_go
3,437,999 ready_for_fw is high
3,438,396 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,966,566 >>> mbox cmd response: success
17,264,609 UART:
17,264,990 UART: Running Caliptra FMC ...
17,266,178 UART:
17,266,345 UART: [state] CFI Enabled
17,335,286 UART: [fht] FMC Alias Private Key: 7
19,099,549 UART: [art] Extend RT PCRs Done
19,100,814 UART: [art] Lock RT PCRs Done
19,102,517 UART: [art] Populate DV Done
19,107,773 UART: [fht] FMC Alias Private Key: 7
19,109,446 UART: [art] Derive CDI
19,110,222 UART: [art] Store in in slot 0x4
19,168,637 UART: [art] Derive Key Pair
19,169,735 UART: [art] Store priv key in slot 0x5
21,632,940 UART: [art] Derive Key Pair - Done
21,646,073 UART: [art] Signing Cert with AUTHO
21,647,414 UART: RITY.KEYID = 7
23,358,442 UART: [art] Erasing AUTHORITY.KEYID = 7
23,360,003 UART: [art] PUB.X = 79430D90A06A94758EC0B2ADFE3993C15DCBBAFE186A75B1079D9AA882226076CDA92278562D01FDEB197994F9C10F0D
23,367,229 UART: [art] PUB.Y = 891ADD36F3EF7C454C035B21D010F786A90FA9B73759CA2296A5F166E51CC55239B2694FAD82E384C16C9232915796E5
23,374,460 UART: [art] SIG.R = 1C0FF68FFBBBB90023C79E08AEA176B5CC736B5E86E175AEEF7DC448784D5EA9A18903FA7EB83D7153B8F4692C3C6F38
23,381,867 UART: [art] SIG.S = CFCB485EDEDF3D0923577B41D620461C251F4501B5CC46B2BAA698B816B5E2F60DAE12BFEAADCEA43F2625473CC7FDD4
24,360,492 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,755,109 ready_for_fw is high
3,755,491 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,189,393 >>> mbox cmd response: success
17,442,653 UART:
17,443,037 UART: Running Caliptra FMC ...
17,444,331 UART:
17,444,496 UART: [state] CFI Enabled
17,452,225 UART: [fht] FMC Alias Private Key: 7
19,209,090 UART: [art] Extend RT PCRs Done
19,210,356 UART: [art] Lock RT PCRs Done
19,212,135 UART: [art] Populate DV Done
19,217,658 UART: [fht] FMC Alias Private Key: 7
19,219,249 UART: [art] Derive CDI
19,220,094 UART: [art] Store in in slot 0x4
19,262,724 UART: [art] Derive Key Pair
19,263,781 UART: [art] Store priv key in slot 0x5
21,689,905 UART: [art] Derive Key Pair - Done
21,703,300 UART: [art] Signing Cert with AUTHO
21,704,643 UART: RITY.KEYID = 7
23,410,065 UART: [art] Erasing AUTHORITY.KEYID = 7
23,411,624 UART: [art] PUB.X = FF9090B7D419EAA35055C93EBFCA7FE4246790E2BCAB094239DB0829F8F8AF04BA9B5DA09DBE954E911C5413B502567F
23,418,886 UART: [art] PUB.Y = 0417DCB85C1575C9D97C80081FF0B67A65EB22AFFC56323EA015333709F49086ABBF2EF8FE2B9EFFF6693276A8E10AB7
23,426,159 UART: [art] SIG.R = 37244A6CDB8F2398F6CED908CF484C9CB8A27D1F551F410DF82005396974B03FC17FFF0F88E59C0443981D97230265CD
23,433,510 UART: [art] SIG.S = 9A07DC64BA00B3811DA449BFCDA9F400C0B4ADADA7C39156CB892E0B714D4064CACBD3E18E1C752313CC893B8D0AAE1E
24,412,316 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,089 UART: [kat] SHA2-256
882,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,135 UART: [kat] ++
886,287 UART: [kat] sha1
890,575 UART: [kat] SHA2-256
892,513 UART: [kat] SHA2-384
895,370 UART: [kat] SHA2-512-ACC
897,271 UART: [kat] ECC-384
903,094 UART: [kat] HMAC-384Kdf
907,584 UART: [kat] LMS
1,475,780 UART: [kat] --
1,476,581 UART: [cold-reset] ++
1,477,081 UART: [fht] Storing FHT @ 0x50003400
1,479,912 UART: [idev] ++
1,480,080 UART: [idev] CDI.KEYID = 6
1,480,440 UART: [idev] SUBJECT.KEYID = 7
1,480,864 UART: [idev] UDS.KEYID = 0
1,481,209 ready_for_fw is high
1,481,209 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,818 UART: [idev] Erasing UDS.KEYID = 0
1,505,254 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,656 UART: [idev] --
1,514,579 UART: [ldev] ++
1,514,747 UART: [ldev] CDI.KEYID = 6
1,515,110 UART: [ldev] SUBJECT.KEYID = 5
1,515,536 UART: [ldev] AUTHORITY.KEYID = 7
1,515,999 UART: [ldev] FE.KEYID = 1
1,520,955 UART: [ldev] Erasing FE.KEYID = 1
1,546,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,314 UART: [ldev] --
1,585,661 UART: [fwproc] Waiting for Commands...
1,586,442 UART: [fwproc] Received command 0x46574c44
1,587,233 UART: [fwproc] Received Image of size 31656 bytes
1,937,126 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,000 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,269 >>> mbox cmd response: success
2,007,443 UART: [afmc] ++
2,007,611 UART: [afmc] CDI.KEYID = 6
2,007,973 UART: [afmc] SUBJECT.KEYID = 7
2,008,398 UART: [afmc] AUTHORITY.KEYID = 5
2,043,995 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,355 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,863 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,748 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,438 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,309 UART: [afmc] --
2,087,287 UART: [cold-reset] --
2,088,025 UART: [state] Locking Datavault
2,089,390 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,994 UART: [state] Locking ICCM
2,090,618 UART: [exit] Launching FMC @ 0x40000130
2,095,947 UART:
2,095,963 UART: Running Caliptra FMC ...
2,096,371 UART:
2,096,425 UART: [state] CFI Enabled
2,107,080 UART: [fht] FMC Alias Private Key: 7
2,214,521 UART: [art] Extend RT PCRs Done
2,214,949 UART: [art] Lock RT PCRs Done
2,216,483 UART: [art] Populate DV Done
2,224,822 UART: [fht] FMC Alias Private Key: 7
2,225,808 UART: [art] Derive CDI
2,226,088 UART: [art] Store in in slot 0x4
2,311,607 UART: [art] Derive Key Pair
2,311,967 UART: [art] Store priv key in slot 0x5
2,324,947 UART: [art] Derive Key Pair - Done
2,339,449 UART: [art] Signing Cert with AUTHO
2,339,929 UART: RITY.KEYID = 7
2,355,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,036 UART: [art] PUB.X = D011B4B76D685A17371A6299412E1106BDF34130EC392E4C73881E74774DED5D453D52EF824D3A75943C852DEEF11C41
2,362,801 UART: [art] PUB.Y = 60337F56C3698108B8253564DD8057D246624EDC698E07D7718CE2FC1A7E1509AAE44184D051E0E815D4009B37F3B4C9
2,369,714 UART: [art] SIG.R = 303E23D2C092053A559F783F8461C6A8D2A117EF9A1262E35F01AADC95B627069627C6E641FBFD56110C52A2D153C0A2
2,376,472 UART: [art] SIG.S = FB6DA2577B81FBBBCB509125AD49310468BF727D3D953FEC4F1849013142C9BF019A5592F71E27639DBDA22F23D9933D
2,400,613 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,969 ready_for_fw is high
1,362,969 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,858,759 >>> mbox cmd response: success
1,918,881 UART:
1,918,897 UART: Running Caliptra FMC ...
1,919,305 UART:
1,919,359 UART: [state] CFI Enabled
1,929,824 UART: [fht] FMC Alias Private Key: 7
2,037,813 UART: [art] Extend RT PCRs Done
2,038,241 UART: [art] Lock RT PCRs Done
2,040,023 UART: [art] Populate DV Done
2,048,062 UART: [fht] FMC Alias Private Key: 7
2,049,078 UART: [art] Derive CDI
2,049,358 UART: [art] Store in in slot 0x4
2,135,045 UART: [art] Derive Key Pair
2,135,405 UART: [art] Store priv key in slot 0x5
2,149,047 UART: [art] Derive Key Pair - Done
2,163,885 UART: [art] Signing Cert with AUTHO
2,164,365 UART: RITY.KEYID = 7
2,179,555 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,320 UART: [art] PUB.X = B0F245139F4316C6DF0B88AF65140D9A63582BD9DCD68CEF3AEF6DE7A2CC2FA6E1A6113336EC57B6CEF3B9B5922B7C7B
2,187,106 UART: [art] PUB.Y = 260C25B7CD28330E2D1203A8A79B45AD6850DE988EF353BFB7CA8D515B1C28C662762935705B904B89C57D87521C0F26
2,194,042 UART: [art] SIG.R = 8A825E378EA670EF727DEB569BA246E45F28C18A26FB676D62A7B728FC81ABD3B76FB7AFD9346C598815845E8CA22145
2,200,820 UART: [art] SIG.S = 59B3552381729C77FAAAE540D0CB562AC6B74B005D117681F2E540FACC4CB39BDAC078697609D226F327FCE9C25C77B3
2,224,773 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,370 UART: [kat] SHA2-256
882,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,416 UART: [kat] ++
886,568 UART: [kat] sha1
890,668 UART: [kat] SHA2-256
892,606 UART: [kat] SHA2-384
895,547 UART: [kat] SHA2-512-ACC
897,448 UART: [kat] ECC-384
903,083 UART: [kat] HMAC-384Kdf
907,747 UART: [kat] LMS
1,475,943 UART: [kat] --
1,476,612 UART: [cold-reset] ++
1,477,122 UART: [fht] Storing FHT @ 0x50003400
1,479,873 UART: [idev] ++
1,480,041 UART: [idev] CDI.KEYID = 6
1,480,401 UART: [idev] SUBJECT.KEYID = 7
1,480,825 UART: [idev] UDS.KEYID = 0
1,481,170 ready_for_fw is high
1,481,170 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,247 UART: [idev] Erasing UDS.KEYID = 0
1,505,645 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,141 UART: [idev] --
1,515,208 UART: [ldev] ++
1,515,376 UART: [ldev] CDI.KEYID = 6
1,515,739 UART: [ldev] SUBJECT.KEYID = 5
1,516,165 UART: [ldev] AUTHORITY.KEYID = 7
1,516,628 UART: [ldev] FE.KEYID = 1
1,521,822 UART: [ldev] Erasing FE.KEYID = 1
1,547,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,033 UART: [ldev] --
1,587,386 UART: [fwproc] Waiting for Commands...
1,588,107 UART: [fwproc] Received command 0x46574c44
1,588,898 UART: [fwproc] Received Image of size 31656 bytes
1,939,151 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,453 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,805 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,546 >>> mbox cmd response: success
2,008,648 UART: [afmc] ++
2,008,816 UART: [afmc] CDI.KEYID = 6
2,009,178 UART: [afmc] SUBJECT.KEYID = 7
2,009,603 UART: [afmc] AUTHORITY.KEYID = 5
2,044,960 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,210 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,990 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,718 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,603 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,293 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,100 UART: [afmc] --
2,088,156 UART: [cold-reset] --
2,088,960 UART: [state] Locking Datavault
2,090,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,789 UART: [state] Locking ICCM
2,091,345 UART: [exit] Launching FMC @ 0x40000130
2,096,674 UART:
2,096,690 UART: Running Caliptra FMC ...
2,097,098 UART:
2,097,241 UART: [state] CFI Enabled
2,108,046 UART: [fht] FMC Alias Private Key: 7
2,215,887 UART: [art] Extend RT PCRs Done
2,216,315 UART: [art] Lock RT PCRs Done
2,217,897 UART: [art] Populate DV Done
2,225,992 UART: [fht] FMC Alias Private Key: 7
2,227,024 UART: [art] Derive CDI
2,227,304 UART: [art] Store in in slot 0x4
2,312,867 UART: [art] Derive Key Pair
2,313,227 UART: [art] Store priv key in slot 0x5
2,325,671 UART: [art] Derive Key Pair - Done
2,340,323 UART: [art] Signing Cert with AUTHO
2,340,803 UART: RITY.KEYID = 7
2,356,627 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,392 UART: [art] PUB.X = B9B3BFA563494D56EE3DE0ED8E6B25C3EC8B2B1430EB72A316B8EACAFA5E686AADAE9577CB9665A0D9B12B7E2EC697C3
2,364,190 UART: [art] PUB.Y = C6A234A99AC89D886F81257FA7C6178192EBEC88B843A90031192E879F6D5DEBF0B8974DFD7EA93E402EE033AA5F0D1C
2,371,127 UART: [art] SIG.R = 10B1BFA3083390FF520EE005A8E01043D055858FC47E356430126835F1130376116D030910D720EF1AECC8FDEAF9AE2C
2,377,879 UART: [art] SIG.S = 5248AF11CD352D793FC5E8A4083F5D68CF1835BC74644F333E364A809EB12FE8BDA8296BE1EC0BF4B2BAEC07BFA60229
2,401,557 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,454 ready_for_fw is high
1,362,454 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,859,350 >>> mbox cmd response: success
1,921,172 UART:
1,921,188 UART: Running Caliptra FMC ...
1,921,596 UART:
1,921,739 UART: [state] CFI Enabled
1,931,916 UART: [fht] FMC Alias Private Key: 7
2,039,439 UART: [art] Extend RT PCRs Done
2,039,867 UART: [art] Lock RT PCRs Done
2,041,491 UART: [art] Populate DV Done
2,049,988 UART: [fht] FMC Alias Private Key: 7
2,050,970 UART: [art] Derive CDI
2,051,250 UART: [art] Store in in slot 0x4
2,136,953 UART: [art] Derive Key Pair
2,137,313 UART: [art] Store priv key in slot 0x5
2,151,477 UART: [art] Derive Key Pair - Done
2,165,983 UART: [art] Signing Cert with AUTHO
2,166,463 UART: RITY.KEYID = 7
2,181,861 UART: [art] Erasing AUTHORITY.KEYID = 7
2,182,626 UART: [art] PUB.X = 89E5C4C110873DE1005735B568DF227418FACD178EBFA6E68AB53783CE57BA0C905BBC891AF51458389F8F154A4A7508
2,189,372 UART: [art] PUB.Y = 3E33D0B96E74EEFD1E818681A74D2E86F985FFB032388D2BF84D274811DEE0AF4C4662F448B035EBDB4D5007583E5B53
2,196,327 UART: [art] SIG.R = B000D3419DAFDF175582F8E740DDCFF331CDB0F12D6E0058302918C1812AA77881BFCF845D22423F37DF2CD16C1A4F2F
2,203,065 UART: [art] SIG.S = 041DB53E62DF331CFF3A34557DE46AE4EDF2A17E6A1E68997DFF817242495C24A1CCD20859C94D4360466F73D6211F9E
2,226,819 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
893,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,343 UART: [kat] ++
897,495 UART: [kat] sha1
901,671 UART: [kat] SHA2-256
903,611 UART: [kat] SHA2-384
906,430 UART: [kat] SHA2-512-ACC
908,331 UART: [kat] ECC-384
917,732 UART: [kat] HMAC-384Kdf
922,288 UART: [kat] LMS
1,170,616 UART: [kat] --
1,171,479 UART: [cold-reset] ++
1,171,957 UART: [fht] FHT @ 0x50003400
1,174,830 UART: [idev] ++
1,174,998 UART: [idev] CDI.KEYID = 6
1,175,358 UART: [idev] SUBJECT.KEYID = 7
1,175,782 UART: [idev] UDS.KEYID = 0
1,176,127 ready_for_fw is high
1,176,127 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,756 UART: [idev] Erasing UDS.KEYID = 0
1,200,559 UART: [idev] Sha1 KeyId Algorithm
1,209,021 UART: [idev] --
1,210,219 UART: [ldev] ++
1,210,387 UART: [ldev] CDI.KEYID = 6
1,210,750 UART: [ldev] SUBJECT.KEYID = 5
1,211,176 UART: [ldev] AUTHORITY.KEYID = 7
1,211,639 UART: [ldev] FE.KEYID = 1
1,216,695 UART: [ldev] Erasing FE.KEYID = 1
1,243,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,525 UART: [ldev] --
1,283,036 UART: [fwproc] Wait for Commands...
1,283,684 UART: [fwproc] Recv command 0x46574c44
1,284,412 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,847 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,704,742 >>> mbox cmd response: success
1,705,762 UART: [afmc] ++
1,705,930 UART: [afmc] CDI.KEYID = 6
1,706,292 UART: [afmc] SUBJECT.KEYID = 7
1,706,717 UART: [afmc] AUTHORITY.KEYID = 5
1,742,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,647 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,123 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,771,008 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,727 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,473 UART: [afmc] --
1,785,507 UART: [cold-reset] --
1,786,527 UART: [state] Locking Datavault
1,787,872 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,476 UART: [state] Locking ICCM
1,789,128 UART: [exit] Launching FMC @ 0x40000130
1,794,457 UART:
1,794,473 UART: Running Caliptra FMC ...
1,794,881 UART:
1,794,935 UART: [state] CFI Enabled
1,805,446 UART: [fht] FMC Alias Private Key: 7
1,912,539 UART: [art] Extend RT PCRs Done
1,912,967 UART: [art] Lock RT PCRs Done
1,914,393 UART: [art] Populate DV Done
1,922,520 UART: [fht] FMC Alias Private Key: 7
1,923,490 UART: [art] Derive CDI
1,923,770 UART: [art] Store in in slot 0x4
2,009,665 UART: [art] Derive Key Pair
2,010,025 UART: [art] Store priv key in slot 0x5
2,022,415 UART: [art] Derive Key Pair - Done
2,037,016 UART: [art] Signing Cert with AUTHO
2,037,496 UART: RITY.KEYID = 7
2,053,212 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,977 UART: [art] PUB.X = A58014AB14533B96F2D7AD21ACF1260DF399C9EE270A02B58C19BC79DCE7D1F8C4AB752864250F4F00DF88FDD901D7E0
2,060,724 UART: [art] PUB.Y = D99DB598FC759001CA29188449DAE7F61F590AA83D23DC27705E93209EB79582AF195E5BCFFDCACA7E68CA2007A336E6
2,067,677 UART: [art] SIG.R = 144FF2F30995CB1213FED2CD8CCDFD7492CB71FA26694EE639593A97814B2866B1B8E958657863E84C75F737BAF23D43
2,074,448 UART: [art] SIG.S = 0123419E446532CE4EB90427DFD2CC671EB223EC8A19F4FCD61DADA3C402DF36617A278FA97E510695A9C9806DFEBAFB
2,097,808 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,343 ready_for_fw is high
1,059,343 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,703 >>> mbox cmd response: success
1,614,727 UART:
1,614,743 UART: Running Caliptra FMC ...
1,615,151 UART:
1,615,205 UART: [state] CFI Enabled
1,625,976 UART: [fht] FMC Alias Private Key: 7
1,733,467 UART: [art] Extend RT PCRs Done
1,733,895 UART: [art] Lock RT PCRs Done
1,735,523 UART: [art] Populate DV Done
1,743,718 UART: [fht] FMC Alias Private Key: 7
1,744,682 UART: [art] Derive CDI
1,744,962 UART: [art] Store in in slot 0x4
1,830,679 UART: [art] Derive Key Pair
1,831,039 UART: [art] Store priv key in slot 0x5
1,843,987 UART: [art] Derive Key Pair - Done
1,859,135 UART: [art] Signing Cert with AUTHO
1,859,615 UART: RITY.KEYID = 7
1,874,627 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,392 UART: [art] PUB.X = D13FA2D6E51098D2D391E6D9C6F620BC598AA39955BC8D76B5492FB040C074032985E32CD20A7DEE1E048DE850444CF1
1,882,159 UART: [art] PUB.Y = D7C16096969D8E8D246761ABD230E3E3FECC43E815D33964ADE383D0460E9983D4AF4C7F0CD22E3C93CC84D1C69A327D
1,889,113 UART: [art] SIG.R = F777B2BFBB4E1AB9F1BD55E7E9FB5BCCAE2CE710A3A98DA7F45671CB15F181101A2DC3EDE062F2C8C0627F0CE2297564
1,895,904 UART: [art] SIG.S = 4624D39C4A4D01350163F386964AA62613BC82212D43250B6FDB4A07E924119378ABE3DC4DBDECBFB68A664531E516DA
1,919,884 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,035 UART: [state] LifecycleState = Unprovisioned
86,690 UART: [state] DebugLocked = No
87,326 UART: [state] WD Timer not started. Device not locked for debugging
88,605 UART: [kat] SHA2-256
894,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,380 UART: [kat] ++
898,532 UART: [kat] sha1
903,024 UART: [kat] SHA2-256
904,964 UART: [kat] SHA2-384
907,821 UART: [kat] SHA2-512-ACC
909,722 UART: [kat] ECC-384
919,835 UART: [kat] HMAC-384Kdf
924,431 UART: [kat] LMS
1,172,759 UART: [kat] --
1,173,772 UART: [cold-reset] ++
1,174,124 UART: [fht] FHT @ 0x50003400
1,176,621 UART: [idev] ++
1,176,789 UART: [idev] CDI.KEYID = 6
1,177,149 UART: [idev] SUBJECT.KEYID = 7
1,177,573 UART: [idev] UDS.KEYID = 0
1,177,918 ready_for_fw is high
1,177,918 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,185,693 UART: [idev] Erasing UDS.KEYID = 0
1,202,686 UART: [idev] Sha1 KeyId Algorithm
1,211,354 UART: [idev] --
1,212,504 UART: [ldev] ++
1,212,672 UART: [ldev] CDI.KEYID = 6
1,213,035 UART: [ldev] SUBJECT.KEYID = 5
1,213,461 UART: [ldev] AUTHORITY.KEYID = 7
1,213,924 UART: [ldev] FE.KEYID = 1
1,219,072 UART: [ldev] Erasing FE.KEYID = 1
1,245,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,212 UART: [ldev] --
1,284,581 UART: [fwproc] Wait for Commands...
1,285,165 UART: [fwproc] Recv command 0x46574c44
1,285,893 UART: [fwproc] Recv'd Img size: 31656 bytes
1,636,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,664,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,693,840 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,705,597 >>> mbox cmd response: success
1,706,613 UART: [afmc] ++
1,706,781 UART: [afmc] CDI.KEYID = 6
1,707,143 UART: [afmc] SUBJECT.KEYID = 7
1,707,568 UART: [afmc] AUTHORITY.KEYID = 5
1,743,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,759,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,760,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,766,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,772,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,777,920 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,785,660 UART: [afmc] --
1,786,606 UART: [cold-reset] --
1,787,236 UART: [state] Locking Datavault
1,788,507 UART: [state] Locking PCR0, PCR1 and PCR31
1,789,111 UART: [state] Locking ICCM
1,789,677 UART: [exit] Launching FMC @ 0x40000130
1,795,006 UART:
1,795,022 UART: Running Caliptra FMC ...
1,795,430 UART:
1,795,573 UART: [state] CFI Enabled
1,806,292 UART: [fht] FMC Alias Private Key: 7
1,914,393 UART: [art] Extend RT PCRs Done
1,914,821 UART: [art] Lock RT PCRs Done
1,916,495 UART: [art] Populate DV Done
1,924,718 UART: [fht] FMC Alias Private Key: 7
1,925,702 UART: [art] Derive CDI
1,925,982 UART: [art] Store in in slot 0x4
2,012,047 UART: [art] Derive Key Pair
2,012,407 UART: [art] Store priv key in slot 0x5
2,025,861 UART: [art] Derive Key Pair - Done
2,040,574 UART: [art] Signing Cert with AUTHO
2,041,054 UART: RITY.KEYID = 7
2,056,726 UART: [art] Erasing AUTHORITY.KEYID = 7
2,057,491 UART: [art] PUB.X = 3FF99B76C0854CBEE359DC24E28AB1549D9A034FB490DB0846711F7254B41F3A5C47F5941A6FE4AABA6C734B5E037D78
2,064,262 UART: [art] PUB.Y = E2754F5859EDF57292CC8A6FF1C71B40FB139004B6A7678DAAB98BA925EE24191D46803B6037BC8178315BA9424D709B
2,071,211 UART: [art] SIG.R = CECC5D7E4A304F81F67BD5F47AA7A7C36561FD5E69239DFA7BB2845EF275B674758300C536FB34EF5DA3F171C07E499B
2,077,973 UART: [art] SIG.S = 80DF33D29051949045C90E8CFB708935E0667F36EBAF9138654B3AD0AA4A864A97725A2D97371A58DE68096561C6EB26
2,101,217 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,238 ready_for_fw is high
1,060,238 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,976 >>> mbox cmd response: success
1,617,618 UART:
1,617,634 UART: Running Caliptra FMC ...
1,618,042 UART:
1,618,185 UART: [state] CFI Enabled
1,628,554 UART: [fht] FMC Alias Private Key: 7
1,736,185 UART: [art] Extend RT PCRs Done
1,736,613 UART: [art] Lock RT PCRs Done
1,737,993 UART: [art] Populate DV Done
1,746,360 UART: [fht] FMC Alias Private Key: 7
1,747,502 UART: [art] Derive CDI
1,747,782 UART: [art] Store in in slot 0x4
1,833,693 UART: [art] Derive Key Pair
1,834,053 UART: [art] Store priv key in slot 0x5
1,847,169 UART: [art] Derive Key Pair - Done
1,861,781 UART: [art] Signing Cert with AUTHO
1,862,261 UART: RITY.KEYID = 7
1,877,515 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,280 UART: [art] PUB.X = F25A030A14E86542964662801BAA12CBD8EEE7A90676BEB1B636DA1FD23FC6300CC94732761DC8B2E416EF67D2EDAEDC
1,885,054 UART: [art] PUB.Y = 3E718003A61AA2F6DF0999C40ABD8A9CD2156B5E9B7F044041419D1A3F6E2CEC7E9DF2B20BBA0BEBD43E863F6AA8FDA9
1,892,010 UART: [art] SIG.R = 579F910FC25B9AEBD3848AC4DC65D93E861E865F4D410C5FFA5C56B94A5F3AB63FDC7C47259C347718FCC5046594D17D
1,898,783 UART: [art] SIG.S = FECC61D529CB50815165B207BD556FAE32BD5C7CAD17D08ED3769A050AE607E51E8DF39DAF5A62DC70B5F03141D11CD3
1,923,371 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,612 UART: [state] LifecycleState = Unprovisioned
86,267 UART: [state] DebugLocked = No
86,935 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
904,932 UART: [kat] SHA2-512-ACC
906,833 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
921,082 UART: [kat] LMS
1,169,394 UART: [kat] --
1,170,557 UART: [cold-reset] ++
1,171,129 UART: [fht] FHT @ 0x50003400
1,173,747 UART: [idev] ++
1,173,915 UART: [idev] CDI.KEYID = 6
1,174,276 UART: [idev] SUBJECT.KEYID = 7
1,174,701 UART: [idev] UDS.KEYID = 0
1,175,047 ready_for_fw is high
1,175,047 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,075 UART: [idev] Erasing UDS.KEYID = 0
1,200,087 UART: [idev] Sha1 KeyId Algorithm
1,209,005 UART: [idev] --
1,210,122 UART: [ldev] ++
1,210,290 UART: [ldev] CDI.KEYID = 6
1,210,654 UART: [ldev] SUBJECT.KEYID = 5
1,211,081 UART: [ldev] AUTHORITY.KEYID = 7
1,211,544 UART: [ldev] FE.KEYID = 1
1,216,786 UART: [ldev] Erasing FE.KEYID = 1
1,243,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,200 UART: [ldev] --
1,282,506 UART: [fwproc] Wait for Commands...
1,283,117 UART: [fwproc] Recv command 0x46574c44
1,283,850 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,166 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,860 >>> mbox cmd response: success
1,704,933 UART: [afmc] ++
1,705,101 UART: [afmc] CDI.KEYID = 6
1,705,464 UART: [afmc] SUBJECT.KEYID = 7
1,705,890 UART: [afmc] AUTHORITY.KEYID = 5
1,741,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,611 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,494 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,213 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,898 UART: [afmc] --
1,784,814 UART: [cold-reset] --
1,785,618 UART: [state] Locking Datavault
1,786,743 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,347 UART: [state] Locking ICCM
1,787,795 UART: [exit] Launching FMC @ 0x40000130
1,793,124 UART:
1,793,140 UART: Running Caliptra FMC ...
1,793,548 UART:
1,793,602 UART: [state] CFI Enabled
1,804,055 UART: [fht] FMC Alias Private Key: 7
1,912,132 UART: [art] Extend RT PCRs Done
1,912,560 UART: [art] Lock RT PCRs Done
1,914,128 UART: [art] Populate DV Done
1,922,503 UART: [fht] FMC Alias Private Key: 7
1,923,635 UART: [art] Derive CDI
1,923,915 UART: [art] Store in in slot 0x4
2,009,022 UART: [art] Derive Key Pair
2,009,382 UART: [art] Store priv key in slot 0x5
2,022,676 UART: [art] Derive Key Pair - Done
2,037,573 UART: [art] Signing Cert with AUTHO
2,038,053 UART: RITY.KEYID = 7
2,053,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,802 UART: [art] PUB.X = 2F81966C78BD067381EE8FFFE8940A234664698CFF923D7502AF6C0840CF3B3B2451A463C58D85505446C610721C3197
2,060,552 UART: [art] PUB.Y = 9A8B7262A8F5044284C7BF7C667D4444596589C2BE6D82BD8FCD9A82594A167BAE22161CB3088E46E1C752DDA11E8D4E
2,067,502 UART: [art] SIG.R = 63253C38633D8455616A8DC5133427AC9420AC3A620F811BADEB11B4E7A359EC7D5A4CEFAA66512B2008BB1E4F658492
2,074,270 UART: [art] SIG.S = 73E07087AF0FA218B0EC2FAAE7247CEC8697F678769990309B134DA600E8508F38A4D399FD5C07F272713ADC18BB5CDC
2,098,512 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,618 ready_for_fw is high
1,055,618 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,444 >>> mbox cmd response: success
1,613,530 UART:
1,613,546 UART: Running Caliptra FMC ...
1,613,954 UART:
1,614,008 UART: [state] CFI Enabled
1,624,061 UART: [fht] FMC Alias Private Key: 7
1,732,624 UART: [art] Extend RT PCRs Done
1,733,052 UART: [art] Lock RT PCRs Done
1,734,572 UART: [art] Populate DV Done
1,743,113 UART: [fht] FMC Alias Private Key: 7
1,744,255 UART: [art] Derive CDI
1,744,535 UART: [art] Store in in slot 0x4
1,830,158 UART: [art] Derive Key Pair
1,830,518 UART: [art] Store priv key in slot 0x5
1,843,690 UART: [art] Derive Key Pair - Done
1,858,661 UART: [art] Signing Cert with AUTHO
1,859,141 UART: RITY.KEYID = 7
1,873,835 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,600 UART: [art] PUB.X = 4FB015E5B800F68796348E8DF7E04176247E2D6F14AE3151D4B86071F5707D108EC7907F0B9589BCE454F1B84E00CF7B
1,881,323 UART: [art] PUB.Y = E4FDEB078286EEAC7310C31299AE714CC158B91F9FE50FCB3351832785AF3D79646191C03AC81561E44B64797633BCE8
1,888,269 UART: [art] SIG.R = 83E245D8C07B414910A085031B39A36F3DDFFE3C48FAB621980136C95A84C63E58692A07FBD00C1920751FAB04F1F461
1,895,024 UART: [art] SIG.S = 202E3B7BB7FC09ADCEF9B78ADFA3621055A1C2A47ECAF0C8F9577889A81F81CF68A27E30D47872038188B8641DFA45CF
1,918,392 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,987 UART: [kat] SHA2-512-ACC
906,888 UART: [kat] ECC-384
916,697 UART: [kat] HMAC-384Kdf
921,393 UART: [kat] LMS
1,169,705 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,794 UART: [fht] FHT @ 0x50003400
1,173,492 UART: [idev] ++
1,173,660 UART: [idev] CDI.KEYID = 6
1,174,021 UART: [idev] SUBJECT.KEYID = 7
1,174,446 UART: [idev] UDS.KEYID = 0
1,174,792 ready_for_fw is high
1,174,792 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,754 UART: [idev] Sha1 KeyId Algorithm
1,208,714 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,429 UART: [ldev] --
1,281,695 UART: [fwproc] Wait for Commands...
1,282,464 UART: [fwproc] Recv command 0x46574c44
1,283,197 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,326 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,635 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,421 >>> mbox cmd response: success
1,702,566 UART: [afmc] ++
1,702,734 UART: [afmc] CDI.KEYID = 6
1,703,097 UART: [afmc] SUBJECT.KEYID = 7
1,703,523 UART: [afmc] AUTHORITY.KEYID = 5
1,738,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,121 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,840 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,569 UART: [afmc] --
1,781,539 UART: [cold-reset] --
1,782,225 UART: [state] Locking Datavault
1,783,406 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,010 UART: [state] Locking ICCM
1,784,670 UART: [exit] Launching FMC @ 0x40000130
1,789,999 UART:
1,790,015 UART: Running Caliptra FMC ...
1,790,423 UART:
1,790,566 UART: [state] CFI Enabled
1,800,959 UART: [fht] FMC Alias Private Key: 7
1,909,008 UART: [art] Extend RT PCRs Done
1,909,436 UART: [art] Lock RT PCRs Done
1,911,218 UART: [art] Populate DV Done
1,919,539 UART: [fht] FMC Alias Private Key: 7
1,920,673 UART: [art] Derive CDI
1,920,953 UART: [art] Store in in slot 0x4
2,006,250 UART: [art] Derive Key Pair
2,006,610 UART: [art] Store priv key in slot 0x5
2,019,686 UART: [art] Derive Key Pair - Done
2,034,058 UART: [art] Signing Cert with AUTHO
2,034,538 UART: RITY.KEYID = 7
2,049,924 UART: [art] Erasing AUTHORITY.KEYID = 7
2,050,689 UART: [art] PUB.X = 7AB896D0CC246870361F27D8746604A03B9470F6A93CF350DEC779EFC6CE4AE76C08BEC9008CE87E0DAB7C5AF8864C9A
2,057,442 UART: [art] PUB.Y = 41E6574520B72F6C4EB72C01FD2AFAECEC1C80F187A61E99B627EC54D2B70D2475E5846D1D1A7E8867181989E874BA65
2,064,392 UART: [art] SIG.R = 8F053ECEA7520A1BB8C288CBA70F4CEFFE7C08F803C4D928929A581307768A4549DBA8DEA63051458D2C0BD119A7D672
2,071,151 UART: [art] SIG.S = 40E3B9CF6440A8A1CB87AA16987150BF32E389B2BF6D9B67CA0F6D52D11CDBF3835199CB4F148E7710021011AE42A48E
2,094,801 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,419 ready_for_fw is high
1,056,419 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,079 >>> mbox cmd response: success
1,613,037 UART:
1,613,053 UART: Running Caliptra FMC ...
1,613,461 UART:
1,613,604 UART: [state] CFI Enabled
1,624,055 UART: [fht] FMC Alias Private Key: 7
1,732,184 UART: [art] Extend RT PCRs Done
1,732,612 UART: [art] Lock RT PCRs Done
1,734,046 UART: [art] Populate DV Done
1,742,445 UART: [fht] FMC Alias Private Key: 7
1,743,577 UART: [art] Derive CDI
1,743,857 UART: [art] Store in in slot 0x4
1,829,560 UART: [art] Derive Key Pair
1,829,920 UART: [art] Store priv key in slot 0x5
1,843,034 UART: [art] Derive Key Pair - Done
1,857,663 UART: [art] Signing Cert with AUTHO
1,858,143 UART: RITY.KEYID = 7
1,873,237 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,002 UART: [art] PUB.X = 0A6832B04A8CD7CC61430C4F4C3CE5A9EF250AC3A69EAFB4A414E21C0F973B76326AA0B2904D7E2D0F3D08CDD32025DF
1,880,772 UART: [art] PUB.Y = 2A621A24FDF022A51E6AE83075C407DBC4199F2B32821E512F36A7B45AD22820A94ADCA70A63DB0EB8709103454D1F85
1,887,714 UART: [art] SIG.R = B8075E713DE99A81B0D4ECD4EBE750E9382E2FAFA47B0E41F540F7098642C1D50E1B772FAB2BC56A30989FAD42A0909F
1,894,486 UART: [art] SIG.S = 8C3B57F94598AFFEC1A0FD848D4941192E782FAD62F45F12E5D6A1ECE68786D1BDF151F805356B21D679D87542C05D75
1,918,157 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,411 UART:
192,790 UART: Running Caliptra ROM ...
193,942 UART:
194,097 UART: [state] CFI Enabled
264,528 UART: [state] LifecycleState = Unprovisioned
266,600 UART: [state] DebugLocked = No
269,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,066 UART: [kat] SHA2-256
444,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,272 UART: [kat] ++
455,868 UART: [kat] sha1
466,321 UART: [kat] SHA2-256
469,045 UART: [kat] SHA2-384
474,895 UART: [kat] SHA2-512-ACC
477,264 UART: [kat] ECC-384
2,768,047 UART: [kat] HMAC-384Kdf
2,799,117 UART: [kat] LMS
3,989,424 UART: [kat] --
3,994,341 UART: [cold-reset] ++
3,995,285 UART: [fht] Storing FHT @ 0x50003400
4,006,340 UART: [idev] ++
4,006,914 UART: [idev] CDI.KEYID = 6
4,007,951 UART: [idev] SUBJECT.KEYID = 7
4,009,134 UART: [idev] UDS.KEYID = 0
4,010,195 ready_for_fw is high
4,010,407 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,109,731 UART: [idev] Erasing UDS.KEYID = 0
7,346,852 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,412 UART: [idev] --
7,373,885 UART: [ldev] ++
7,374,456 UART: [ldev] CDI.KEYID = 6
7,375,394 UART: [ldev] SUBJECT.KEYID = 5
7,376,602 UART: [ldev] AUTHORITY.KEYID = 7
7,377,908 UART: [ldev] FE.KEYID = 1
7,420,684 UART: [ldev] Erasing FE.KEYID = 1
10,756,264 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,842 UART: [ldev] --
13,136,752 UART: [fwproc] Waiting for Commands...
13,139,713 UART: [fwproc] Received command 0x46574c44
13,141,900 UART: [fwproc] Received Image of size 78740 bytes
16,763,584 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,847,746 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,916,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,109,245 >>> mbox cmd response: success
17,109,716 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,113,875 UART: [afmc] ++
17,114,461 UART: [afmc] CDI.KEYID = 6
17,115,370 UART: [afmc] SUBJECT.KEYID = 7
17,116,646 UART: [afmc] AUTHORITY.KEYID = 5
20,472,852 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,769,297 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,771,550 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,785,958 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,800,802 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,815,206 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,837,474 UART: [afmc] --
22,840,697 UART: [cold-reset] --
22,844,075 UART: [state] Locking Datavault
22,850,138 UART: [state] Locking PCR0, PCR1 and PCR31
22,851,900 UART: [state] Locking ICCM
22,853,459 UART: [exit] Launching FMC @ 0x40000130
22,861,821 UART:
22,862,059 UART: Running Caliptra FMC ...
22,863,162 UART:
22,863,321 UART: [state] CFI Enabled
22,929,209 UART: [fht] FMC Alias Private Key: 7
25,267,653 UART: [art] Extend RT PCRs Done
25,268,875 UART: [art] Lock RT PCRs Done
25,270,500 UART: [art] Populate DV Done
25,276,067 UART: [fht] FMC Alias Private Key: 7
25,277,555 UART: [art] Derive CDI
25,278,325 UART: [art] Store in in slot 0x4
25,338,050 UART: [art] Derive Key Pair
25,339,091 UART: [art] Store priv key in slot 0x5
28,631,324 UART: [art] Derive Key Pair - Done
28,644,426 UART: [art] Signing Cert with AUTHO
28,645,737 UART: RITY.KEYID = 7
30,932,590 UART: [art] Erasing AUTHORITY.KEYID = 7
30,934,101 UART: [art] PUB.X = E8EAAADCACDD24753F2F9C96AE1824F76F9E5D2B9540707CEFB4FB0A14FF0DAA49B48F4740F8297B0DEAB75866C394CE
30,941,352 UART: [art] PUB.Y = FD17DA361CE6257B3D57D0783BC6DEE6697933F954FF927A60B865B7A528B0C6CD01D5D6C8F5E759D4FE6759925AE563
30,948,579 UART: [art] SIG.R = D3DB3E0537024521D174540B06F43E1CDB1619D1BDF69F52948C207BFB38AEFAD6AC5B9641FFE116062E1804070FFA5D
30,955,967 UART: [art] SIG.S = D975E27A42A4D0BF5E7BA963534507869C0560881C02987896803D76DBDE1AC18FFB8FD08852906E722B8948E824A4FA
32,260,300 UART: mbox::rt_entry...
32,261,261 UART: ____ _ _ _ ____ _____
32,263,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,265,250 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,267,380 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,269,318 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,271,251 UART: |_|
32,272,062 UART:
32,384,749 UART: [rt] Runtime listening for mailbox commands...
32,386,927 >>> mbox cmd response data (48 bytes)
32,387,522 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,389,866 >>> mbox cmd response data (48 bytes)
32,390,718 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,403,274 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,808,149 ready_for_fw is high
3,808,567 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,177,120 >>> mbox cmd response: success
17,177,847 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,860,232 UART:
22,860,618 UART: Running Caliptra FMC ...
22,861,756 UART:
22,861,941 UART: [state] CFI Enabled
22,931,214 UART: [fht] FMC Alias Private Key: 7
25,269,440 UART: [art] Extend RT PCRs Done
25,270,665 UART: [art] Lock RT PCRs Done
25,272,376 UART: [art] Populate DV Done
25,277,752 UART: [fht] FMC Alias Private Key: 7
25,279,360 UART: [art] Derive CDI
25,280,184 UART: [art] Store in in slot 0x4
25,340,022 UART: [art] Derive Key Pair
25,341,066 UART: [art] Store priv key in slot 0x5
28,633,749 UART: [art] Derive Key Pair - Done
28,646,860 UART: [art] Signing Cert with AUTHO
28,648,164 UART: RITY.KEYID = 7
30,936,128 UART: [art] Erasing AUTHORITY.KEYID = 7
30,937,642 UART: [art] PUB.X = F9266AF27F000A11CA399F94FACDF25845103D4DB39A3B5C94123F71ECF125223682D3DA60E73CE6B34223DD9B79AFC2
30,944,863 UART: [art] PUB.Y = CC7E08311CC969A5AA1D6E3386A93315187A738144636915EA6F50CC415E5B2F333034158221C556C834BD4777878DD0
30,952,095 UART: [art] SIG.R = 0424246EC02CEAC7B018B66319E668F844DBA5B0FD3AA32BCC50DDBCB525BBB54A0BB60DDC531A27DD70166EF80C4279
30,959,520 UART: [art] SIG.S = 16A3C2FE497BBD00266BFEE0A173C7723647257903904E0AAD39C5D2F0A28F6A1B0DC2F05CE9BF9953E3E51DEF58403F
32,263,770 UART: mbox::rt_entry...
32,264,721 UART: ____ _ _ _ ____ _____
32,266,656 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,268,668 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,270,601 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,272,560 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,274,490 UART: |_|
32,275,377 UART:
32,388,973 UART: [rt] Runtime listening for mailbox commands...
32,391,116 >>> mbox cmd response data (48 bytes)
32,391,726 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,394,056 >>> mbox cmd response data (48 bytes)
32,394,918 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,407,470 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
192,371 UART:
192,739 UART: Running Caliptra ROM ...
193,937 UART:
603,691 UART: [state] CFI Enabled
617,279 UART: [state] LifecycleState = Unprovisioned
619,146 UART: [state] DebugLocked = No
622,164 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,380 UART: [kat] SHA2-256
796,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,623 UART: [kat] ++
807,222 UART: [kat] sha1
819,230 UART: [kat] SHA2-256
821,938 UART: [kat] SHA2-384
828,271 UART: [kat] SHA2-512-ACC
830,644 UART: [kat] ECC-384
3,114,611 UART: [kat] HMAC-384Kdf
3,126,936 UART: [kat] LMS
4,317,025 UART: [kat] --
4,322,697 UART: [cold-reset] ++
4,323,852 UART: [fht] Storing FHT @ 0x50003400
4,336,586 UART: [idev] ++
4,337,232 UART: [idev] CDI.KEYID = 6
4,338,109 UART: [idev] SUBJECT.KEYID = 7
4,339,351 UART: [idev] UDS.KEYID = 0
4,340,312 ready_for_fw is high
4,340,504 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,439,461 UART: [idev] Erasing UDS.KEYID = 0
7,622,466 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,212 UART: [idev] --
7,648,681 UART: [ldev] ++
7,649,244 UART: [ldev] CDI.KEYID = 6
7,650,201 UART: [ldev] SUBJECT.KEYID = 5
7,651,406 UART: [ldev] AUTHORITY.KEYID = 7
7,652,689 UART: [ldev] FE.KEYID = 1
7,664,913 UART: [ldev] Erasing FE.KEYID = 1
10,951,316 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,427 UART: [ldev] --
13,312,443 UART: [fwproc] Waiting for Commands...
13,314,420 UART: [fwproc] Received command 0x46574c44
13,316,592 UART: [fwproc] Received Image of size 78740 bytes
16,937,134 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,015,093 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,083,946 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,277,177 >>> mbox cmd response: success
17,277,684 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,281,000 UART: [afmc] ++
17,281,600 UART: [afmc] CDI.KEYID = 6
17,282,508 UART: [afmc] SUBJECT.KEYID = 7
17,283,776 UART: [afmc] AUTHORITY.KEYID = 5
20,593,492 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,890,944 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,893,202 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,907,565 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,922,389 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,936,831 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,957,472 UART: [afmc] --
22,961,655 UART: [cold-reset] --
22,965,199 UART: [state] Locking Datavault
22,970,643 UART: [state] Locking PCR0, PCR1 and PCR31
22,972,407 UART: [state] Locking ICCM
22,973,449 UART: [exit] Launching FMC @ 0x40000130
22,981,832 UART:
22,982,081 UART: Running Caliptra FMC ...
22,983,183 UART:
22,983,334 UART: [state] CFI Enabled
22,991,588 UART: [fht] FMC Alias Private Key: 7
25,322,302 UART: [art] Extend RT PCRs Done
25,323,521 UART: [art] Lock RT PCRs Done
25,325,233 UART: [art] Populate DV Done
25,330,525 UART: [fht] FMC Alias Private Key: 7
25,332,114 UART: [art] Derive CDI
25,332,845 UART: [art] Store in in slot 0x4
25,375,323 UART: [art] Derive Key Pair
25,376,351 UART: [art] Store priv key in slot 0x5
28,618,429 UART: [art] Derive Key Pair - Done
28,631,528 UART: [art] Signing Cert with AUTHO
28,632,829 UART: RITY.KEYID = 7
30,911,933 UART: [art] Erasing AUTHORITY.KEYID = 7
30,913,452 UART: [art] PUB.X = DA686AE96C5A43A132250FDA912263796B292BED9AA22EC08EF8800E10A81ED15975E5441AEA4F21129D81A2EFA685D3
30,920,699 UART: [art] PUB.Y = 8BC862184EE59A1666E72F316C9E49D7F88CB90B5D3E59A2CD5D27742F1C535EAF53866411A1410DE64F85E3AA8DFD23
30,927,974 UART: [art] SIG.R = 79FB354A8D2107B6BAFB3A9EB8D5F3AF03536EE8D5A2594174F5810E13FC24A516786B50CCD8919D67DE286791EFC0A5
30,935,349 UART: [art] SIG.S = 2FD113DD3384720677447DD4F81425311CB7F3A8E686DCEC952BB2B92A8DB84FB13D69BCCCE4F177D078D8223A03E70F
32,239,812 UART: mbox::rt_entry...
32,240,752 UART: ____ _ _ _ ____ _____
32,242,644 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,244,639 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,246,761 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,248,698 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,250,624 UART: |_|
32,251,454 UART:
32,364,204 UART: [rt] Runtime listening for mailbox commands...
32,366,366 >>> mbox cmd response data (48 bytes)
32,366,984 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,369,403 >>> mbox cmd response data (48 bytes)
32,370,273 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,382,817 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
4,128,145 ready_for_fw is high
4,128,730 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,350,235 >>> mbox cmd response: success
17,350,835 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,988,137 UART:
22,988,523 UART: Running Caliptra FMC ...
22,989,643 UART:
22,989,790 UART: [state] CFI Enabled
22,997,698 UART: [fht] FMC Alias Private Key: 7
25,328,742 UART: [art] Extend RT PCRs Done
25,329,966 UART: [art] Lock RT PCRs Done
25,331,832 UART: [art] Populate DV Done
25,337,248 UART: [fht] FMC Alias Private Key: 7
25,338,780 UART: [art] Derive CDI
25,339,508 UART: [art] Store in in slot 0x4
25,382,361 UART: [art] Derive Key Pair
25,383,353 UART: [art] Store priv key in slot 0x5
28,625,541 UART: [art] Derive Key Pair - Done
28,638,540 UART: [art] Signing Cert with AUTHO
28,639,845 UART: RITY.KEYID = 7
30,918,963 UART: [art] Erasing AUTHORITY.KEYID = 7
30,920,467 UART: [art] PUB.X = C0F76B9BB2284A5D474C7E8165ECCB0211B87167F741DC5B49BA1F54815CBCD63EECC11C5B4001FEB7CAF398DAD8E1D2
30,927,729 UART: [art] PUB.Y = DF93D41CFF6A251017A9ECFE4899235A6F6706A285C77825F7DCF69764587DFA6F2651ECB865CFC9A5635A3F00CBCEB6
30,935,009 UART: [art] SIG.R = A1F780920EE84288991EC10B730BCA9DF12063BD0D7BB2B89ACC034FDBC47B18AB70BCDCB328D8F938A21E2F5D9CA0BD
30,942,407 UART: [art] SIG.S = F30DFF863DA09CF3A7184C4C56F3103E2770F6D0612F1C4540C9B08785645398F6423F861507D061367DC05895716178
32,248,153 UART: mbox::rt_entry...
32,249,115 UART: ____ _ _ _ ____ _____
32,251,043 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,253,042 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,254,972 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,927 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,258,850 UART: |_|
32,259,648 UART:
32,373,388 UART: [rt] Runtime listening for mailbox commands...
32,375,558 >>> mbox cmd response data (48 bytes)
32,376,147 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,378,472 >>> mbox cmd response data (48 bytes)
32,379,327 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,391,894 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,236 UART:
192,599 UART: Running Caliptra ROM ...
193,725 UART:
193,868 UART: [state] CFI Enabled
263,829 UART: [state] LifecycleState = Unprovisioned
265,728 UART: [state] DebugLocked = No
268,455 UART: [state] WD Timer not started. Device not locked for debugging
272,486 UART: [kat] SHA2-256
451,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,190 UART: [kat] ++
463,639 UART: [kat] sha1
474,569 UART: [kat] SHA2-256
477,622 UART: [kat] SHA2-384
483,759 UART: [kat] SHA2-512-ACC
486,699 UART: [kat] ECC-384
2,947,553 UART: [kat] HMAC-384Kdf
2,971,036 UART: [kat] LMS
3,500,508 UART: [kat] --
3,504,946 UART: [cold-reset] ++
3,507,231 UART: [fht] FHT @ 0x50003400
3,517,760 UART: [idev] ++
3,518,394 UART: [idev] CDI.KEYID = 6
3,519,329 UART: [idev] SUBJECT.KEYID = 7
3,520,436 UART: [idev] UDS.KEYID = 0
3,521,436 ready_for_fw is high
3,521,633 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,620,776 UART: [idev] Erasing UDS.KEYID = 0
6,025,076 UART: [idev] Sha1 KeyId Algorithm
6,048,256 UART: [idev] --
6,052,091 UART: [ldev] ++
6,052,664 UART: [ldev] CDI.KEYID = 6
6,053,578 UART: [ldev] SUBJECT.KEYID = 5
6,054,740 UART: [ldev] AUTHORITY.KEYID = 7
6,056,025 UART: [ldev] FE.KEYID = 1
6,099,813 UART: [ldev] Erasing FE.KEYID = 1
8,598,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,805 UART: [ldev] --
10,391,777 UART: [fwproc] Wait for Commands...
10,394,185 UART: [fwproc] Recv command 0x46574c44
10,396,232 UART: [fwproc] Recv'd Img size: 78704 bytes
13,360,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,432,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,500,946 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,694,337 >>> mbox cmd response: success
13,694,796 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,699,047 UART: [afmc] ++
13,699,686 UART: [afmc] CDI.KEYID = 6
13,700,604 UART: [afmc] SUBJECT.KEYID = 7
13,701,712 UART: [afmc] AUTHORITY.KEYID = 5
16,230,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,955,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,957,742 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,973,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,989,588 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,005,448 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,026,796 UART: [afmc] --
18,030,181 UART: [cold-reset] --
18,034,854 UART: [state] Locking Datavault
18,041,556 UART: [state] Locking PCR0, PCR1 and PCR31
18,043,263 UART: [state] Locking ICCM
18,045,906 UART: [exit] Launching FMC @ 0x40000130
18,054,360 UART:
18,054,618 UART: Running Caliptra FMC ...
18,055,726 UART:
18,055,892 UART: [state] CFI Enabled
18,113,293 UART: [fht] FMC Alias Private Key: 7
19,877,432 UART: [art] Extend RT PCRs Done
19,878,633 UART: [art] Lock RT PCRs Done
19,880,363 UART: [art] Populate DV Done
19,885,989 UART: [fht] FMC Alias Private Key: 7
19,887,586 UART: [art] Derive CDI
19,888,396 UART: [art] Store in in slot 0x4
19,945,678 UART: [art] Derive Key Pair
19,946,711 UART: [art] Store priv key in slot 0x5
22,409,943 UART: [art] Derive Key Pair - Done
22,422,544 UART: [art] Signing Cert with AUTHO
22,423,856 UART: RITY.KEYID = 7
24,135,847 UART: [art] Erasing AUTHORITY.KEYID = 7
24,137,360 UART: [art] PUB.X = 77291737530D1F1E20F8C4D645289F39548A58DA66725DC5A520F6021A0D34F843817402883E53135753EDE3DB8B53F2
24,144,571 UART: [art] PUB.Y = 6E412674736165871F0A89242A52F35178DA2CA1F2D07C2F285AD5BB0701BB9413C71774CD1E3548326E0FC5E116762E
24,151,806 UART: [art] SIG.R = 33CE0AD7A8537D14659A3EE8E8BF47DE94CD4BECEA96F443D85E97B95F1CA0EC36C6C735C05345F4EC36E59CB6A809E8
24,159,240 UART: [art] SIG.S = EAFE7276662221C20A02D53280852484021489E22088F923FAAF7E2FF3E83BAE7130C59418D6F43122ACBFFDA86D28A9
25,138,101 UART: mbox::rt_entry...
25,139,065 UART: ____ _ _ _ ____ _____
25,141,002 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,143,014 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,144,948 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,146,876 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,148,800 UART: |_|
25,149,631 UART:
25,262,718 UART: [rt] Runtime listening for mailbox commands...
25,264,889 >>> mbox cmd response data (48 bytes)
25,265,529 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,267,891 >>> mbox cmd response data (48 bytes)
25,268,775 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,281,343 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,382,694 ready_for_fw is high
3,383,091 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,510,602 >>> mbox cmd response: success
13,511,496 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,790,362 UART:
17,790,778 UART: Running Caliptra FMC ...
17,791,889 UART:
17,792,044 UART: [state] CFI Enabled
17,858,650 UART: [fht] FMC Alias Private Key: 7
19,622,065 UART: [art] Extend RT PCRs Done
19,623,292 UART: [art] Lock RT PCRs Done
19,625,106 UART: [art] Populate DV Done
19,630,410 UART: [fht] FMC Alias Private Key: 7
19,632,059 UART: [art] Derive CDI
19,632,800 UART: [art] Store in in slot 0x4
19,690,898 UART: [art] Derive Key Pair
19,691,895 UART: [art] Store priv key in slot 0x5
22,155,225 UART: [art] Derive Key Pair - Done
22,168,166 UART: [art] Signing Cert with AUTHO
22,169,470 UART: RITY.KEYID = 7
23,881,171 UART: [art] Erasing AUTHORITY.KEYID = 7
23,882,672 UART: [art] PUB.X = 998F36B16DBE36197E156775ECDAC8C3920B9D90951C783B24E1A6B241513DB9677FD33F8BA1F2CE529613EABF30F2AE
23,889,931 UART: [art] PUB.Y = B0F1E298D10919B7A097CAFBE72C91EE3EB317154075FD2293DEE9B5EE9E64EC84BEB2339E919CF77E1807CF2E901449
23,897,217 UART: [art] SIG.R = 4D27012F833865B7E5BA2C1D5900409E3E4AA95E273604A388AF8960643669B1A7F2BAC5EB881A32336436A18FDF65BD
23,904,551 UART: [art] SIG.S = 5BAD4721A41A80AEE2161D488EE7B3710342C69C6D5CD6EFAEDA240C4B1B60AF25EA6A9CDE2BECFEE20AF11D7D0262A1
24,882,790 UART: mbox::rt_entry...
24,884,535 UART: ____ _ _ _ ____ _____
24,886,449 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,888,371 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,890,311 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,892,381 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,894,337 UART: |_|
24,895,154 UART:
25,007,023 UART: [rt] Runtime listening for mailbox commands...
25,009,617 >>> mbox cmd response data (48 bytes)
25,010,348 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,012,717 >>> mbox cmd response data (48 bytes)
25,013,574 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,026,146 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,300 UART:
192,691 UART: Running Caliptra ROM ...
193,872 UART:
603,687 UART: [state] CFI Enabled
615,862 UART: [state] LifecycleState = Unprovisioned
617,738 UART: [state] DebugLocked = No
619,886 UART: [state] WD Timer not started. Device not locked for debugging
623,631 UART: [kat] SHA2-256
802,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,326 UART: [kat] ++
814,772 UART: [kat] sha1
826,983 UART: [kat] SHA2-256
830,053 UART: [kat] SHA2-384
837,104 UART: [kat] SHA2-512-ACC
840,030 UART: [kat] ECC-384
3,281,649 UART: [kat] HMAC-384Kdf
3,294,230 UART: [kat] LMS
3,823,744 UART: [kat] --
3,829,439 UART: [cold-reset] ++
3,831,439 UART: [fht] FHT @ 0x50003400
3,842,410 UART: [idev] ++
3,842,965 UART: [idev] CDI.KEYID = 6
3,843,943 UART: [idev] SUBJECT.KEYID = 7
3,845,106 UART: [idev] UDS.KEYID = 0
3,846,019 ready_for_fw is high
3,846,219 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,945,228 UART: [idev] Erasing UDS.KEYID = 0
6,318,203 UART: [idev] Sha1 KeyId Algorithm
6,341,392 UART: [idev] --
6,345,331 UART: [ldev] ++
6,345,895 UART: [ldev] CDI.KEYID = 6
6,346,848 UART: [ldev] SUBJECT.KEYID = 5
6,347,992 UART: [ldev] AUTHORITY.KEYID = 7
6,349,288 UART: [ldev] FE.KEYID = 1
6,359,149 UART: [ldev] Erasing FE.KEYID = 1
8,832,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,330 UART: [ldev] --
10,625,899 UART: [fwproc] Wait for Commands...
10,628,792 UART: [fwproc] Recv command 0x46574c44
10,630,872 UART: [fwproc] Recv'd Img size: 78704 bytes
13,603,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,675,688 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,744,486 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,937,880 >>> mbox cmd response: success
13,938,359 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,941,530 UART: [afmc] ++
13,942,110 UART: [afmc] CDI.KEYID = 6
13,943,012 UART: [afmc] SUBJECT.KEYID = 7
13,944,222 UART: [afmc] AUTHORITY.KEYID = 5
16,444,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,163,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,165,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,181,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,197,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,213,436 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,234,580 UART: [afmc] --
18,238,603 UART: [cold-reset] --
18,244,888 UART: [state] Locking Datavault
18,249,370 UART: [state] Locking PCR0, PCR1 and PCR31
18,251,006 UART: [state] Locking ICCM
18,253,693 UART: [exit] Launching FMC @ 0x40000130
18,262,108 UART:
18,262,337 UART: Running Caliptra FMC ...
18,263,431 UART:
18,263,584 UART: [state] CFI Enabled
18,271,348 UART: [fht] FMC Alias Private Key: 7
20,028,423 UART: [art] Extend RT PCRs Done
20,029,645 UART: [art] Lock RT PCRs Done
20,031,342 UART: [art] Populate DV Done
20,036,635 UART: [fht] FMC Alias Private Key: 7
20,038,230 UART: [art] Derive CDI
20,039,040 UART: [art] Store in in slot 0x4
20,081,759 UART: [art] Derive Key Pair
20,082,906 UART: [art] Store priv key in slot 0x5
22,510,029 UART: [art] Derive Key Pair - Done
22,522,809 UART: [art] Signing Cert with AUTHO
22,524,300 UART: RITY.KEYID = 7
24,229,335 UART: [art] Erasing AUTHORITY.KEYID = 7
24,230,847 UART: [art] PUB.X = 4D94C8BD4FDF660B15D21412E7012D715EC7A0C2CF418ABC09A25DBFDB4DD674AAA6B1B2ED9C579F0458C309D09D5319
24,238,138 UART: [art] PUB.Y = 2FA714E42379908B51AECD6C6F818D0E6E28C7B9376F047ABED5E6744D2CB5E705CB374E8ECB7B2BC7C14DBFC9F6A5DF
24,245,416 UART: [art] SIG.R = 5B4D1D774D63420632CE5523ED22A4AFEC66430CF4B1AEEA85AE958227C15F2F002A19507C16F90D821D83546D3FD017
24,252,752 UART: [art] SIG.S = E3C08BE1EA91E0C486A22A434C01D871D1C23FEB31637F4C37EE74F295C79F085FC59AEAAE273CE6B92A39BB3C2FBFB3
25,232,042 UART: mbox::rt_entry...
25,232,995 UART: ____ _ _ _ ____ _____
25,234,972 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,236,977 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,238,899 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,240,817 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,242,735 UART: |_|
25,243,730 UART:
25,357,352 UART: [rt] Runtime listening for mailbox commands...
25,359,509 >>> mbox cmd response data (48 bytes)
25,360,116 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,362,555 >>> mbox cmd response data (48 bytes)
25,363,421 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,375,962 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,695,328 ready_for_fw is high
3,695,709 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,707,264 >>> mbox cmd response: success
13,707,798 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,963,386 UART:
17,963,774 UART: Running Caliptra FMC ...
17,964,961 UART:
17,965,121 UART: [state] CFI Enabled
17,972,676 UART: [fht] FMC Alias Private Key: 7
19,729,970 UART: [art] Extend RT PCRs Done
19,731,193 UART: [art] Lock RT PCRs Done
19,732,903 UART: [art] Populate DV Done
19,738,489 UART: [fht] FMC Alias Private Key: 7
19,740,125 UART: [art] Derive CDI
19,740,940 UART: [art] Store in in slot 0x4
19,783,095 UART: [art] Derive Key Pair
19,784,094 UART: [art] Store priv key in slot 0x5
22,211,280 UART: [art] Derive Key Pair - Done
22,224,238 UART: [art] Signing Cert with AUTHO
22,225,572 UART: RITY.KEYID = 7
23,930,849 UART: [art] Erasing AUTHORITY.KEYID = 7
23,932,355 UART: [art] PUB.X = 64DD9316EE6D41E408F7E052D1AB34A0776CD644F07DA02758B9E514C0FB66AD62C17811745F0099282886C4266CCB66
23,939,608 UART: [art] PUB.Y = FB3162F48CEBA7893F17C4EA5F0A60EC3D2533584FD5A1B12203D5755ED5BCA6CDE026286536F11C1234CFF5145D33E9
23,946,834 UART: [art] SIG.R = 897D18897F3969521D2B30915B1843D2D535AAC711CDD06BD906C85EE2B98300298649CFF102A07DBFAD99D28F6A33DA
23,954,236 UART: [art] SIG.S = 56CF78FDFAD77C3E20AB38719BBB953E12C5B069F4304CFD6D7C5C69BECEBDCB913B6FADFF358D48F3B31EC53CEF02B7
24,932,290 UART: mbox::rt_entry...
24,933,232 UART: ____ _ _ _ ____ _____
24,935,893 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,937,832 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,939,757 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,941,665 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,943,590 UART: |_|
24,944,393 UART:
25,057,945 UART: [rt] Runtime listening for mailbox commands...
25,060,126 >>> mbox cmd response data (48 bytes)
25,060,732 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,063,051 >>> mbox cmd response data (48 bytes)
25,063,907 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,076,450 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,437,967 ready_for_fw is high
3,438,596 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,969,395 >>> mbox cmd response: success
13,970,019 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,262,211 UART:
18,262,595 UART: Running Caliptra FMC ...
18,263,730 UART:
18,263,889 UART: [state] CFI Enabled
18,329,667 UART: [fht] FMC Alias Private Key: 7
20,094,132 UART: [art] Extend RT PCRs Done
20,095,381 UART: [art] Lock RT PCRs Done
20,097,091 UART: [art] Populate DV Done
20,102,670 UART: [fht] FMC Alias Private Key: 7
20,104,177 UART: [art] Derive CDI
20,104,940 UART: [art] Store in in slot 0x4
20,162,219 UART: [art] Derive Key Pair
20,163,220 UART: [art] Store priv key in slot 0x5
22,626,126 UART: [art] Derive Key Pair - Done
22,639,011 UART: [art] Signing Cert with AUTHO
22,640,320 UART: RITY.KEYID = 7
24,352,008 UART: [art] Erasing AUTHORITY.KEYID = 7
24,353,517 UART: [art] PUB.X = E11EC24F6C9B0143829CD557EF4FAC5657BF5104719EA5A86B46A58A9F46FA5C518C9680A551E2D962B1C990B8A3C90D
24,360,765 UART: [art] PUB.Y = 087344D30E1B354018052F5A89A23788548E2BE0C475502D4BD820F52AE7803611974D29B431BFD3C86B55E7B6E79C99
24,368,048 UART: [art] SIG.R = D5C73D8E44EF7838D583AE7A9D33F3A08AFB3439E5095FC4A3CE0BEA3A262EE9213BBA9C8324F5220658C67A25F906C3
24,375,435 UART: [art] SIG.S = A64C0FF4180CDDE92368DCDF348591E8329AB2C8DA84B73887B82E0A3254C9069BECF718A9270F98CF1205353F26DF2A
25,353,433 UART: mbox::rt_entry...
25,354,425 UART: ____ _ _ _ ____ _____
25,356,414 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,358,369 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,360,300 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,362,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,364,116 UART: |_|
25,364,922 UART:
25,477,863 UART: [rt] Runtime listening for mailbox commands...
25,480,035 >>> mbox cmd response data (48 bytes)
25,480,650 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,482,976 >>> mbox cmd response data (48 bytes)
25,483,825 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,496,367 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,750,384 ready_for_fw is high
3,750,928 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,189,864 >>> mbox cmd response: success
14,190,558 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,443,347 UART:
18,443,755 UART: Running Caliptra FMC ...
18,444,949 UART:
18,445,110 UART: [state] CFI Enabled
18,452,736 UART: [fht] FMC Alias Private Key: 7
20,210,707 UART: [art] Extend RT PCRs Done
20,211,930 UART: [art] Lock RT PCRs Done
20,213,611 UART: [art] Populate DV Done
20,218,764 UART: [fht] FMC Alias Private Key: 7
20,220,354 UART: [art] Derive CDI
20,221,169 UART: [art] Store in in slot 0x4
20,264,040 UART: [art] Derive Key Pair
20,265,082 UART: [art] Store priv key in slot 0x5
22,691,861 UART: [art] Derive Key Pair - Done
22,705,134 UART: [art] Signing Cert with AUTHO
22,706,443 UART: RITY.KEYID = 7
24,412,075 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,757 UART: [art] PUB.X = E8E39225662AA4CA24E218B6880DED874E4C67C8633DF254DE0319A18CD0C45DE655AA84D8A0F883954DBB09C882DCEE
24,420,864 UART: [art] PUB.Y = B1E48F55E866A903DA3E48762093C593A894B7E01FBA681EB0C1158C187FAE827F7CB48714CD6D6BB1B835279F78B62A
24,428,109 UART: [art] SIG.R = FC8D1C7E900531B53E875FEDFAC70E91D3BD987F9E03F86FA3262A8227A78ACCDEDF74D24227EABF5ABBEE682CCF25D7
24,435,552 UART: [art] SIG.S = 35773C0E9800F524261C352FE58DF0771D34E8C62061803B2DB7BD9249EFAFA4A8AF43E639410B0DF1FC9FBF76D6D951
25,413,774 UART: mbox::rt_entry...
25,414,724 UART: ____ _ _ _ ____ _____
25,416,643 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,418,636 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,420,485 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,422,431 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,424,276 UART: |_|
25,425,147 UART:
25,538,083 UART: [rt] Runtime listening for mailbox commands...
25,540,257 >>> mbox cmd response data (48 bytes)
25,540,848 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,543,170 >>> mbox cmd response data (48 bytes)
25,544,033 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,556,617 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,309 UART: [kat] SHA2-256
892,247 UART: [kat] SHA2-384
894,906 UART: [kat] SHA2-512-ACC
896,807 UART: [kat] ECC-384
902,344 UART: [kat] HMAC-384Kdf
906,732 UART: [kat] LMS
1,474,928 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,741 UART: [fht] Storing FHT @ 0x50003400
1,479,604 UART: [idev] ++
1,479,772 UART: [idev] CDI.KEYID = 6
1,480,132 UART: [idev] SUBJECT.KEYID = 7
1,480,556 UART: [idev] UDS.KEYID = 0
1,480,901 ready_for_fw is high
1,480,901 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,512 UART: [idev] Erasing UDS.KEYID = 0
1,505,088 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,882 UART: [idev] --
1,515,057 UART: [ldev] ++
1,515,225 UART: [ldev] CDI.KEYID = 6
1,515,588 UART: [ldev] SUBJECT.KEYID = 5
1,516,014 UART: [ldev] AUTHORITY.KEYID = 7
1,516,477 UART: [ldev] FE.KEYID = 1
1,521,591 UART: [ldev] Erasing FE.KEYID = 1
1,546,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,446 UART: [ldev] --
1,585,845 UART: [fwproc] Waiting for Commands...
1,586,488 UART: [fwproc] Received command 0x46574c44
1,587,279 UART: [fwproc] Received Image of size 78704 bytes
2,477,671 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,829 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,181 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,626 >>> mbox cmd response: success
2,616,626 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,617,686 UART: [afmc] ++
2,617,854 UART: [afmc] CDI.KEYID = 6
2,618,216 UART: [afmc] SUBJECT.KEYID = 7
2,618,641 UART: [afmc] AUTHORITY.KEYID = 5
2,654,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,598 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,483 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,173 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,844 UART: [afmc] --
2,697,910 UART: [cold-reset] --
2,698,686 UART: [state] Locking Datavault
2,699,869 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,473 UART: [state] Locking ICCM
2,700,987 UART: [exit] Launching FMC @ 0x40000130
2,706,316 UART:
2,706,332 UART: Running Caliptra FMC ...
2,706,740 UART:
2,706,794 UART: [state] CFI Enabled
2,717,153 UART: [fht] FMC Alias Private Key: 7
2,825,676 UART: [art] Extend RT PCRs Done
2,826,104 UART: [art] Lock RT PCRs Done
2,827,826 UART: [art] Populate DV Done
2,836,115 UART: [fht] FMC Alias Private Key: 7
2,837,251 UART: [art] Derive CDI
2,837,531 UART: [art] Store in in slot 0x4
2,923,204 UART: [art] Derive Key Pair
2,923,564 UART: [art] Store priv key in slot 0x5
2,937,070 UART: [art] Derive Key Pair - Done
2,951,950 UART: [art] Signing Cert with AUTHO
2,952,430 UART: RITY.KEYID = 7
2,967,596 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,361 UART: [art] PUB.X = D38A1C7B29E5B64244D44A3637E2953E1DC2BC19E8A96E022E4E435DF0B425972471311FFDDB975A282F5A386FD3459A
2,975,132 UART: [art] PUB.Y = A30526B065D08AED1BDAE75E757577614F893A7D337576678EC519AF7848E4530950AFEE7F50F95C4A2A8F3F5338D314
2,982,076 UART: [art] SIG.R = EA790DBEA39CBD275BED76799F2DBFB92CC216E7E1DC9E871A5326C632A0C9729724178A9BDD2D629DC4319C65307945
2,988,853 UART: [art] SIG.S = 14AD8CA8F78E069CCDEA200EF694C5F18B1F9EB03579080BC5D45211A62434D9C214A3A283F43FF855E7E8F52CD1044C
3,012,633 UART: mbox::rt_entry...
3,013,005 UART: ____ _ _ _ ____ _____
3,013,789 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,589 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,357 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,016,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,893 UART: |_|
3,017,205 UART:
3,124,249 UART: [rt] Runtime listening for mailbox commands...
3,125,430 >>> mbox cmd response data (48 bytes)
3,125,431 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,128,214 >>> mbox cmd response data (48 bytes)
3,128,215 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,141,153 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,347 ready_for_fw is high
1,362,347 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,424 >>> mbox cmd response: success
2,465,424 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,526,978 UART:
2,526,994 UART: Running Caliptra FMC ...
2,527,402 UART:
2,527,456 UART: [state] CFI Enabled
2,538,107 UART: [fht] FMC Alias Private Key: 7
2,646,112 UART: [art] Extend RT PCRs Done
2,646,540 UART: [art] Lock RT PCRs Done
2,647,926 UART: [art] Populate DV Done
2,656,179 UART: [fht] FMC Alias Private Key: 7
2,657,155 UART: [art] Derive CDI
2,657,435 UART: [art] Store in in slot 0x4
2,743,712 UART: [art] Derive Key Pair
2,744,072 UART: [art] Store priv key in slot 0x5
2,758,080 UART: [art] Derive Key Pair - Done
2,772,849 UART: [art] Signing Cert with AUTHO
2,773,329 UART: RITY.KEYID = 7
2,788,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,310 UART: [art] PUB.X = 790D25F9BD431B2102F81A03D61AAEF59086B293043622766BEC53199CC89DD8B257CC86509EA4D28296E4C0A793C9DD
2,796,070 UART: [art] PUB.Y = A7126620CDC48AB7858018A85C63A313EDF2A43E67877A316AC6D8D4DAE2C64FD7A274F7789F83D151180E68C95F6A6A
2,803,023 UART: [art] SIG.R = 8A137B07AB4B3D208DE61E0156CF2E2F92AE98C0F96349161491E7928108F8A5F17AF2CEE68793BB412A3950E8593605
2,809,779 UART: [art] SIG.S = AA73C1AD940BEC49BDFCA29919CC49632190F4ED17FA4AEE18E9F33FB9766F41792D57288AECA230CE50780ECB316EE1
2,833,866 UART: mbox::rt_entry...
2,834,238 UART: ____ _ _ _ ____ _____
2,835,022 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,822 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,590 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,358 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,126 UART: |_|
2,838,438 UART:
2,945,887 UART: [rt] Runtime listening for mailbox commands...
2,947,068 >>> mbox cmd response data (48 bytes)
2,947,069 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,949,852 >>> mbox cmd response data (48 bytes)
2,949,853 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,962,791 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,153 UART: [state] LifecycleState = Unprovisioned
86,808 UART: [state] DebugLocked = No
87,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,022 UART: [kat] SHA2-256
882,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,068 UART: [kat] ++
887,220 UART: [kat] sha1
891,606 UART: [kat] SHA2-256
893,544 UART: [kat] SHA2-384
896,267 UART: [kat] SHA2-512-ACC
898,168 UART: [kat] ECC-384
903,773 UART: [kat] HMAC-384Kdf
908,443 UART: [kat] LMS
1,476,639 UART: [kat] --
1,477,672 UART: [cold-reset] ++
1,478,122 UART: [fht] Storing FHT @ 0x50003400
1,480,937 UART: [idev] ++
1,481,105 UART: [idev] CDI.KEYID = 6
1,481,465 UART: [idev] SUBJECT.KEYID = 7
1,481,889 UART: [idev] UDS.KEYID = 0
1,482,234 ready_for_fw is high
1,482,234 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,490,141 UART: [idev] Erasing UDS.KEYID = 0
1,506,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,271 UART: [idev] --
1,516,212 UART: [ldev] ++
1,516,380 UART: [ldev] CDI.KEYID = 6
1,516,743 UART: [ldev] SUBJECT.KEYID = 5
1,517,169 UART: [ldev] AUTHORITY.KEYID = 7
1,517,632 UART: [ldev] FE.KEYID = 1
1,523,088 UART: [ldev] Erasing FE.KEYID = 1
1,547,863 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,001 UART: [ldev] --
1,587,430 UART: [fwproc] Waiting for Commands...
1,588,261 UART: [fwproc] Received command 0x46574c44
1,589,052 UART: [fwproc] Received Image of size 78704 bytes
2,480,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,507,818 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,537,170 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,619,691 >>> mbox cmd response: success
2,619,691 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,620,795 UART: [afmc] ++
2,620,963 UART: [afmc] CDI.KEYID = 6
2,621,325 UART: [afmc] SUBJECT.KEYID = 7
2,621,750 UART: [afmc] AUTHORITY.KEYID = 5
2,657,789 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,673,745 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,674,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,680,253 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,686,138 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,691,828 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,699,865 UART: [afmc] --
2,700,939 UART: [cold-reset] --
2,701,679 UART: [state] Locking Datavault
2,702,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,703,572 UART: [state] Locking ICCM
2,703,998 UART: [exit] Launching FMC @ 0x40000130
2,709,327 UART:
2,709,343 UART: Running Caliptra FMC ...
2,709,751 UART:
2,709,894 UART: [state] CFI Enabled
2,720,609 UART: [fht] FMC Alias Private Key: 7
2,828,472 UART: [art] Extend RT PCRs Done
2,828,900 UART: [art] Lock RT PCRs Done
2,830,204 UART: [art] Populate DV Done
2,838,257 UART: [fht] FMC Alias Private Key: 7
2,839,349 UART: [art] Derive CDI
2,839,629 UART: [art] Store in in slot 0x4
2,925,670 UART: [art] Derive Key Pair
2,926,030 UART: [art] Store priv key in slot 0x5
2,939,426 UART: [art] Derive Key Pair - Done
2,954,192 UART: [art] Signing Cert with AUTHO
2,954,672 UART: RITY.KEYID = 7
2,969,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,970,387 UART: [art] PUB.X = 87A1A4E6DEC7BDD72E8457D2AFFC8A455FC5E2726FB093665E1F8BFCC1FA16B43CE715470F1996B2D7F281A70F22D3A9
2,977,169 UART: [art] PUB.Y = 93E23A9B33F956AE4A8DF55712ADA1FE600969DDE1E0590AA28564A24ACC0C7CE68227F7677D17457693C2EDBE6BBC30
2,984,122 UART: [art] SIG.R = BAFAC9A26F18BC07B74D731CD336EAC4E488A21B6375FC1E9FF7CB9954565074E8AC49049CEEA2A1C02FB1390FFA8821
2,990,901 UART: [art] SIG.S = 9007CCEF650DFDD5CED86B15A7ECE10014B33F736D36ACD8DA16450362D9C0DDF24937BCA9A02C78BC1417B8928678D5
3,014,125 UART: mbox::rt_entry...
3,014,497 UART: ____ _ _ _ ____ _____
3,015,281 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,081 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,849 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,617 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,385 UART: |_|
3,018,697 UART:
3,125,032 UART: [rt] Runtime listening for mailbox commands...
3,126,213 >>> mbox cmd response data (48 bytes)
3,126,214 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,128,997 >>> mbox cmd response data (48 bytes)
3,128,998 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,141,936 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,690 ready_for_fw is high
1,362,690 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,709 >>> mbox cmd response: success
2,467,709 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,529,087 UART:
2,529,103 UART: Running Caliptra FMC ...
2,529,511 UART:
2,529,654 UART: [state] CFI Enabled
2,540,451 UART: [fht] FMC Alias Private Key: 7
2,647,974 UART: [art] Extend RT PCRs Done
2,648,402 UART: [art] Lock RT PCRs Done
2,649,912 UART: [art] Populate DV Done
2,658,211 UART: [fht] FMC Alias Private Key: 7
2,659,241 UART: [art] Derive CDI
2,659,521 UART: [art] Store in in slot 0x4
2,745,350 UART: [art] Derive Key Pair
2,745,710 UART: [art] Store priv key in slot 0x5
2,758,884 UART: [art] Derive Key Pair - Done
2,773,996 UART: [art] Signing Cert with AUTHO
2,774,476 UART: RITY.KEYID = 7
2,790,408 UART: [art] Erasing AUTHORITY.KEYID = 7
2,791,173 UART: [art] PUB.X = 0BCC517665FDDC0D939F6060CA986E73D1DC9C16A97E2E73419C0B5E3D956E762DEFEA5B632689DB8A4DD3A740443BB9
2,797,948 UART: [art] PUB.Y = 55EB6FF8C297095587BFCCF8E4C39D2A0AB6E2B11B5150FD66BD941EB5F05DF4137ADEE1021F0FE83508DA82AA2B5F95
2,804,903 UART: [art] SIG.R = 44FD9121DC6566825B442EBA449A9ED192B399DE3EAFF02FB24988B9F1D76ACF8E4174D9E474305521007DF96EC415C8
2,811,657 UART: [art] SIG.S = 1F3FCD3EC25D37E9E4EDB52588050E27B1A7742FB80C8B582246E8F0E7F2A6A649D489848D05068EE0C45DF00195CCCA
2,835,314 UART: mbox::rt_entry...
2,835,686 UART: ____ _ _ _ ____ _____
2,836,470 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,837,270 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,838,038 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,806 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,574 UART: |_|
2,839,886 UART:
2,947,267 UART: [rt] Runtime listening for mailbox commands...
2,948,448 >>> mbox cmd response data (48 bytes)
2,948,449 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,951,232 >>> mbox cmd response data (48 bytes)
2,951,233 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,964,171 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,785 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
893,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,809 UART: [kat] ++
897,961 UART: [kat] sha1
902,281 UART: [kat] SHA2-256
904,221 UART: [kat] SHA2-384
906,980 UART: [kat] SHA2-512-ACC
908,881 UART: [kat] ECC-384
918,540 UART: [kat] HMAC-384Kdf
922,906 UART: [kat] LMS
1,171,234 UART: [kat] --
1,172,169 UART: [cold-reset] ++
1,172,513 UART: [fht] FHT @ 0x50003400
1,175,106 UART: [idev] ++
1,175,274 UART: [idev] CDI.KEYID = 6
1,175,634 UART: [idev] SUBJECT.KEYID = 7
1,176,058 UART: [idev] UDS.KEYID = 0
1,176,403 ready_for_fw is high
1,176,403 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,770 UART: [idev] Erasing UDS.KEYID = 0
1,200,827 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,291 UART: [ldev] ++
1,210,459 UART: [ldev] CDI.KEYID = 6
1,210,822 UART: [ldev] SUBJECT.KEYID = 5
1,211,248 UART: [ldev] AUTHORITY.KEYID = 7
1,211,711 UART: [ldev] FE.KEYID = 1
1,216,841 UART: [ldev] Erasing FE.KEYID = 1
1,243,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,831 UART: [ldev] --
1,282,286 UART: [fwproc] Wait for Commands...
1,282,912 UART: [fwproc] Recv command 0x46574c44
1,283,640 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,940 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,399 >>> mbox cmd response: success
2,312,399 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,313,573 UART: [afmc] ++
2,313,741 UART: [afmc] CDI.KEYID = 6
2,314,103 UART: [afmc] SUBJECT.KEYID = 7
2,314,528 UART: [afmc] AUTHORITY.KEYID = 5
2,349,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,618 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,346 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,950 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,690 UART: [afmc] --
2,392,604 UART: [cold-reset] --
2,393,264 UART: [state] Locking Datavault
2,394,605 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,209 UART: [state] Locking ICCM
2,395,865 UART: [exit] Launching FMC @ 0x40000130
2,401,194 UART:
2,401,210 UART: Running Caliptra FMC ...
2,401,618 UART:
2,401,672 UART: [state] CFI Enabled
2,412,473 UART: [fht] FMC Alias Private Key: 7
2,520,588 UART: [art] Extend RT PCRs Done
2,521,016 UART: [art] Lock RT PCRs Done
2,522,628 UART: [art] Populate DV Done
2,530,837 UART: [fht] FMC Alias Private Key: 7
2,531,767 UART: [art] Derive CDI
2,532,047 UART: [art] Store in in slot 0x4
2,617,688 UART: [art] Derive Key Pair
2,618,048 UART: [art] Store priv key in slot 0x5
2,631,304 UART: [art] Derive Key Pair - Done
2,645,977 UART: [art] Signing Cert with AUTHO
2,646,457 UART: RITY.KEYID = 7
2,662,047 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,812 UART: [art] PUB.X = 6EC8E8B2A6330A9A1A99B74F672ADD24AC4DCAE1707D074E007A1837E4EAFD2AA0D4313C695032E9F29A4CC3E524E0DB
2,669,572 UART: [art] PUB.Y = F4F0A4088EE09D4F619201A95A225F5D793B292407E69E570E34661AC7DF7FFDE01BCFB3C2983F9A9BF072719F25AFF2
2,676,520 UART: [art] SIG.R = AC73000AB0C3EE7EFE4F699D5FF2BBBB9CB0282E84E3C34B1C811D996FC75FCBA7176636D605B5ECD3C90FD2A6AEB29F
2,683,287 UART: [art] SIG.S = 6DF5F114809CBFDF0AC8BC9F99995ED7F36626261BAF46AD49B51B19C55D74CD050490C8E6DF3A6976DAB47649AB42B0
2,707,379 UART: mbox::rt_entry...
2,707,751 UART: ____ _ _ _ ____ _____
2,708,535 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,335 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,103 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,871 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,639 UART: |_|
2,711,951 UART:
2,819,721 UART: [rt] Runtime listening for mailbox commands...
2,820,902 >>> mbox cmd response data (48 bytes)
2,820,903 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,823,686 >>> mbox cmd response data (48 bytes)
2,823,687 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,836,625 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,325 ready_for_fw is high
1,060,325 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,032 >>> mbox cmd response: success
2,164,032 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,226,086 UART:
2,226,102 UART: Running Caliptra FMC ...
2,226,510 UART:
2,226,564 UART: [state] CFI Enabled
2,236,949 UART: [fht] FMC Alias Private Key: 7
2,344,906 UART: [art] Extend RT PCRs Done
2,345,334 UART: [art] Lock RT PCRs Done
2,347,242 UART: [art] Populate DV Done
2,355,447 UART: [fht] FMC Alias Private Key: 7
2,356,379 UART: [art] Derive CDI
2,356,659 UART: [art] Store in in slot 0x4
2,442,460 UART: [art] Derive Key Pair
2,442,820 UART: [art] Store priv key in slot 0x5
2,455,938 UART: [art] Derive Key Pair - Done
2,470,649 UART: [art] Signing Cert with AUTHO
2,471,129 UART: RITY.KEYID = 7
2,486,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,348 UART: [art] PUB.X = 80DDB80AEE1649BBCCD3C38A5B16E328AB6447A2E753B8A231A00FAE07445258963C3CB88FFE53A97E7AA481ED93390C
2,494,120 UART: [art] PUB.Y = 71BA7B817CA253AA39114E64F47CAE112466F542A80DDFA39A0FCAFCE96C34E10800FF44979E76FE5F304F1804ED9E6E
2,501,050 UART: [art] SIG.R = 4EA73E53E581029241A99EF8CB63EF61F668D946F6F4A6E6A45154DE3E5EE54CC9664F9D1F2A85AAB498E5E26C82BC19
2,507,829 UART: [art] SIG.S = D467A4E4DE4E2997CCEB96455AECCE7883B9E78688E92066DD9B17F074496C4F71F68176FA441F362B4C8C3CB39EA6F7
2,531,880 UART: mbox::rt_entry...
2,532,252 UART: ____ _ _ _ ____ _____
2,533,036 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,836 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,604 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,372 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,140 UART: |_|
2,536,452 UART:
2,642,614 UART: [rt] Runtime listening for mailbox commands...
2,643,795 >>> mbox cmd response data (48 bytes)
2,643,796 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,646,579 >>> mbox cmd response data (48 bytes)
2,646,580 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,659,518 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
893,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,774 UART: [kat] ++
897,926 UART: [kat] sha1
902,218 UART: [kat] SHA2-256
904,158 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
918,443 UART: [kat] HMAC-384Kdf
923,093 UART: [kat] LMS
1,171,421 UART: [kat] --
1,172,478 UART: [cold-reset] ++
1,172,948 UART: [fht] FHT @ 0x50003400
1,175,797 UART: [idev] ++
1,175,965 UART: [idev] CDI.KEYID = 6
1,176,325 UART: [idev] SUBJECT.KEYID = 7
1,176,749 UART: [idev] UDS.KEYID = 0
1,177,094 ready_for_fw is high
1,177,094 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,337 UART: [idev] Erasing UDS.KEYID = 0
1,201,056 UART: [idev] Sha1 KeyId Algorithm
1,209,646 UART: [idev] --
1,210,632 UART: [ldev] ++
1,210,800 UART: [ldev] CDI.KEYID = 6
1,211,163 UART: [ldev] SUBJECT.KEYID = 5
1,211,589 UART: [ldev] AUTHORITY.KEYID = 7
1,212,052 UART: [ldev] FE.KEYID = 1
1,217,354 UART: [ldev] Erasing FE.KEYID = 1
1,243,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,278 UART: [ldev] --
1,282,691 UART: [fwproc] Wait for Commands...
1,283,265 UART: [fwproc] Recv command 0x46574c44
1,283,993 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,903 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,207 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,494 >>> mbox cmd response: success
2,313,494 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,314,652 UART: [afmc] ++
2,314,820 UART: [afmc] CDI.KEYID = 6
2,315,182 UART: [afmc] SUBJECT.KEYID = 7
2,315,607 UART: [afmc] AUTHORITY.KEYID = 5
2,350,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,136 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,855 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,751 UART: [afmc] --
2,393,825 UART: [cold-reset] --
2,394,695 UART: [state] Locking Datavault
2,396,108 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,712 UART: [state] Locking ICCM
2,397,158 UART: [exit] Launching FMC @ 0x40000130
2,402,487 UART:
2,402,503 UART: Running Caliptra FMC ...
2,402,911 UART:
2,403,054 UART: [state] CFI Enabled
2,413,213 UART: [fht] FMC Alias Private Key: 7
2,521,130 UART: [art] Extend RT PCRs Done
2,521,558 UART: [art] Lock RT PCRs Done
2,523,196 UART: [art] Populate DV Done
2,531,077 UART: [fht] FMC Alias Private Key: 7
2,532,245 UART: [art] Derive CDI
2,532,525 UART: [art] Store in in slot 0x4
2,618,476 UART: [art] Derive Key Pair
2,618,836 UART: [art] Store priv key in slot 0x5
2,632,048 UART: [art] Derive Key Pair - Done
2,646,420 UART: [art] Signing Cert with AUTHO
2,646,900 UART: RITY.KEYID = 7
2,661,642 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,407 UART: [art] PUB.X = 565D306BD7ACA44EEDAA45A30CF359F435E9CCE3402201B1F5ACCF349C3C59E2C5A898422E3A95007437D04802AD5B1E
2,669,158 UART: [art] PUB.Y = 5194CBFCCD974689314AE37E1BF1F875CC2A26139BF5D611243EFFA434D1A93586167888AC1FB927BE22E8152CD7E504
2,676,111 UART: [art] SIG.R = EA1BCA62ACFF5EB14228B138A8F9ED777D1F640CD9ABD0ED99C346CDA3208F6C634C07C97F81D2D935FB723BC74C054E
2,682,894 UART: [art] SIG.S = B8428A00A84A3ACCA86CB13220A2B8D0354B0BEE53E7C9042A29B87441329E9092896D0C29FC01A6F6771901D5862523
2,706,504 UART: mbox::rt_entry...
2,706,876 UART: ____ _ _ _ ____ _____
2,707,660 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,460 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,228 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,996 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,764 UART: |_|
2,711,076 UART:
2,817,649 UART: [rt] Runtime listening for mailbox commands...
2,818,830 >>> mbox cmd response data (48 bytes)
2,818,831 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,821,614 >>> mbox cmd response data (48 bytes)
2,821,615 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,834,553 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,744 ready_for_fw is high
1,060,744 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,883 >>> mbox cmd response: success
2,165,883 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,228,947 UART:
2,228,963 UART: Running Caliptra FMC ...
2,229,371 UART:
2,229,514 UART: [state] CFI Enabled
2,240,203 UART: [fht] FMC Alias Private Key: 7
2,348,356 UART: [art] Extend RT PCRs Done
2,348,784 UART: [art] Lock RT PCRs Done
2,350,096 UART: [art] Populate DV Done
2,358,379 UART: [fht] FMC Alias Private Key: 7
2,359,479 UART: [art] Derive CDI
2,359,759 UART: [art] Store in in slot 0x4
2,445,266 UART: [art] Derive Key Pair
2,445,626 UART: [art] Store priv key in slot 0x5
2,458,394 UART: [art] Derive Key Pair - Done
2,473,227 UART: [art] Signing Cert with AUTHO
2,473,707 UART: RITY.KEYID = 7
2,488,659 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,424 UART: [art] PUB.X = EAE3D045558AE4997290AB85261BC86FADA1AE42C93D982EDEF24FB875AC441FBD65686EA1B7F2415E41F6CFBF06E15D
2,496,211 UART: [art] PUB.Y = 02F09B71D015B5D2238F4C6507E40EB1E2009E3FD4F90833B3B8C80B144170E610A6C3B5EF621031D77AAB21586EDBA2
2,503,128 UART: [art] SIG.R = D2A9F73D1260080919861001140A7EE8D3614E48849CDF17CB035218F8F19AA525FB037AEF770569227988E5B495F9BF
2,509,871 UART: [art] SIG.S = 80D2EAAC71A714D2E45450F5E1175111B722F94D16442A3663A617E4F5F49250BCFDBFAD7E570FA5864F21CC9C7A9CC1
2,533,695 UART: mbox::rt_entry...
2,534,067 UART: ____ _ _ _ ____ _____
2,534,851 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,651 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,419 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,955 UART: |_|
2,538,267 UART:
2,644,156 UART: [rt] Runtime listening for mailbox commands...
2,645,337 >>> mbox cmd response data (48 bytes)
2,645,338 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,648,121 >>> mbox cmd response data (48 bytes)
2,648,122 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,661,060 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,526 UART: [kat] HMAC-384Kdf
921,186 UART: [kat] LMS
1,169,498 UART: [kat] --
1,170,675 UART: [cold-reset] ++
1,171,141 UART: [fht] FHT @ 0x50003400
1,173,961 UART: [idev] ++
1,174,129 UART: [idev] CDI.KEYID = 6
1,174,490 UART: [idev] SUBJECT.KEYID = 7
1,174,915 UART: [idev] UDS.KEYID = 0
1,175,261 ready_for_fw is high
1,175,261 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,235 UART: [idev] Erasing UDS.KEYID = 0
1,200,591 UART: [idev] Sha1 KeyId Algorithm
1,209,519 UART: [idev] --
1,210,480 UART: [ldev] ++
1,210,648 UART: [ldev] CDI.KEYID = 6
1,211,012 UART: [ldev] SUBJECT.KEYID = 5
1,211,439 UART: [ldev] AUTHORITY.KEYID = 7
1,211,902 UART: [ldev] FE.KEYID = 1
1,216,718 UART: [ldev] Erasing FE.KEYID = 1
1,243,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,266 UART: [ldev] --
1,282,658 UART: [fwproc] Wait for Commands...
1,283,483 UART: [fwproc] Recv command 0x46574c44
1,284,216 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,331 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,761 >>> mbox cmd response: success
2,313,761 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,314,970 UART: [afmc] ++
2,315,138 UART: [afmc] CDI.KEYID = 6
2,315,501 UART: [afmc] SUBJECT.KEYID = 7
2,315,927 UART: [afmc] AUTHORITY.KEYID = 5
2,351,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,975 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,587 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,306 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,133 UART: [afmc] --
2,395,091 UART: [cold-reset] --
2,395,775 UART: [state] Locking Datavault
2,396,948 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,552 UART: [state] Locking ICCM
2,398,182 UART: [exit] Launching FMC @ 0x40000130
2,403,511 UART:
2,403,527 UART: Running Caliptra FMC ...
2,403,935 UART:
2,403,989 UART: [state] CFI Enabled
2,414,346 UART: [fht] FMC Alias Private Key: 7
2,521,511 UART: [art] Extend RT PCRs Done
2,521,939 UART: [art] Lock RT PCRs Done
2,523,615 UART: [art] Populate DV Done
2,531,770 UART: [fht] FMC Alias Private Key: 7
2,532,810 UART: [art] Derive CDI
2,533,090 UART: [art] Store in in slot 0x4
2,618,505 UART: [art] Derive Key Pair
2,618,865 UART: [art] Store priv key in slot 0x5
2,632,349 UART: [art] Derive Key Pair - Done
2,647,353 UART: [art] Signing Cert with AUTHO
2,647,833 UART: RITY.KEYID = 7
2,662,939 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,704 UART: [art] PUB.X = 488147222CD746EBB1E436508FBFB4E17E002DCE1C1A6FA51B7EB5CF550E2ECC1DFD48C465D00B776E481B3826309F3D
2,670,460 UART: [art] PUB.Y = 22D71F8ADD1A8819E39D17E92F6AF3CD0603E1B3266B333D78A527CDE2A4114E89D13BEE30089FBC7FA1EE41956E88F6
2,677,413 UART: [art] SIG.R = C83B870AE2D5A229847FF840BEB3F63A13B9D4B27EBBBFBD996E2577ABAFF51A6EFB5512047C21698EE51CCCB4B89EFC
2,684,203 UART: [art] SIG.S = 8C292B11DA91AE79924E5DA91E7B63E2DAC654F91E3DCA26B5C386AFFEC9659DFF700BACB2349CC75BEE61414E101C1D
2,707,627 UART: mbox::rt_entry...
2,707,999 UART: ____ _ _ _ ____ _____
2,708,783 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,583 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,351 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,119 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,887 UART: |_|
2,712,199 UART:
2,818,840 UART: [rt] Runtime listening for mailbox commands...
2,820,021 >>> mbox cmd response data (48 bytes)
2,820,022 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,822,805 >>> mbox cmd response data (48 bytes)
2,822,806 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,835,744 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,200 ready_for_fw is high
1,056,200 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,278 >>> mbox cmd response: success
2,162,278 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,224,478 UART:
2,224,494 UART: Running Caliptra FMC ...
2,224,902 UART:
2,224,956 UART: [state] CFI Enabled
2,235,527 UART: [fht] FMC Alias Private Key: 7
2,343,110 UART: [art] Extend RT PCRs Done
2,343,538 UART: [art] Lock RT PCRs Done
2,345,066 UART: [art] Populate DV Done
2,353,457 UART: [fht] FMC Alias Private Key: 7
2,354,513 UART: [art] Derive CDI
2,354,793 UART: [art] Store in in slot 0x4
2,440,426 UART: [art] Derive Key Pair
2,440,786 UART: [art] Store priv key in slot 0x5
2,454,740 UART: [art] Derive Key Pair - Done
2,469,819 UART: [art] Signing Cert with AUTHO
2,470,299 UART: RITY.KEYID = 7
2,485,557 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,322 UART: [art] PUB.X = E30E4FDF7345F258ADA2E8FE346C6F536383EF58FB4430195F59B3EB1E7031B1E4A70EED22DB02D68FD1AB2FD32550F8
2,493,099 UART: [art] PUB.Y = 5CAA02C1136CD10E4946FC2C2137EA3F0E5383D27793B4B1D85DC5718761CCC094F24B344D5481320D14C27A417804BC
2,500,034 UART: [art] SIG.R = 0F3C9BE87798C5041FDA4FC5910C1761E5BE8988C117910F473BB68F663EBF277FCEABC2654D3DEE6686A5727831ED0D
2,506,799 UART: [art] SIG.S = 96ACAF57D57D50AEE5E3BF588D872A2AFDF465F79932FDCBF83F585C2F4A972D1DE45E692EC634EDD2AEF8AED0F558CC
2,531,014 UART: mbox::rt_entry...
2,531,386 UART: ____ _ _ _ ____ _____
2,532,170 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,970 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,738 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,506 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,274 UART: |_|
2,535,586 UART:
2,642,846 UART: [rt] Runtime listening for mailbox commands...
2,644,027 >>> mbox cmd response data (48 bytes)
2,644,028 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,646,811 >>> mbox cmd response data (48 bytes)
2,646,812 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,659,750 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
920,991 UART: [kat] LMS
1,169,303 UART: [kat] --
1,169,966 UART: [cold-reset] ++
1,170,516 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,174,530 ready_for_fw is high
1,174,530 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,478 UART: [idev] Erasing UDS.KEYID = 0
1,199,678 UART: [idev] Sha1 KeyId Algorithm
1,208,480 UART: [idev] --
1,209,525 UART: [ldev] ++
1,209,693 UART: [ldev] CDI.KEYID = 6
1,210,057 UART: [ldev] SUBJECT.KEYID = 5
1,210,484 UART: [ldev] AUTHORITY.KEYID = 7
1,210,947 UART: [ldev] FE.KEYID = 1
1,216,215 UART: [ldev] Erasing FE.KEYID = 1
1,241,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,909 UART: [ldev] --
1,281,425 UART: [fwproc] Wait for Commands...
1,282,238 UART: [fwproc] Recv command 0x46574c44
1,282,971 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,614 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,116 >>> mbox cmd response: success
2,312,116 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,313,191 UART: [afmc] ++
2,313,359 UART: [afmc] CDI.KEYID = 6
2,313,722 UART: [afmc] SUBJECT.KEYID = 7
2,314,148 UART: [afmc] AUTHORITY.KEYID = 5
2,349,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,554 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,166 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,885 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,762 UART: [afmc] --
2,392,872 UART: [cold-reset] --
2,393,654 UART: [state] Locking Datavault
2,394,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,573 UART: [state] Locking ICCM
2,396,145 UART: [exit] Launching FMC @ 0x40000130
2,401,474 UART:
2,401,490 UART: Running Caliptra FMC ...
2,401,898 UART:
2,402,041 UART: [state] CFI Enabled
2,412,590 UART: [fht] FMC Alias Private Key: 7
2,521,035 UART: [art] Extend RT PCRs Done
2,521,463 UART: [art] Lock RT PCRs Done
2,522,717 UART: [art] Populate DV Done
2,531,146 UART: [fht] FMC Alias Private Key: 7
2,532,130 UART: [art] Derive CDI
2,532,410 UART: [art] Store in in slot 0x4
2,618,237 UART: [art] Derive Key Pair
2,618,597 UART: [art] Store priv key in slot 0x5
2,631,577 UART: [art] Derive Key Pair - Done
2,646,616 UART: [art] Signing Cert with AUTHO
2,647,096 UART: RITY.KEYID = 7
2,661,906 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,671 UART: [art] PUB.X = 0BBB211CBA15414E85A5896C6C582CAB9DDE44F2F3608283396B9FF17C0155EFC49C5D8E35B0C871A61AA2E0BB80E4AC
2,669,451 UART: [art] PUB.Y = C809AD26E9FC742E8532E5E6990D2C8FD2BD9BC4DA6E066EDF6B28CDB3CC9B8E6FA8FFB394003880721A864A79257992
2,676,384 UART: [art] SIG.R = BA4FC39C2F2A04BDF48CDE7A86D1B38BF81AE9B1A48F1F597A0EAA8701FB7ACFB11ACF65F488F31D0ED39C63C29D6173
2,683,170 UART: [art] SIG.S = AD98F8E7B56D37AEC5F193F318719AE575CCC3F10BADB578BE4FBEFD1D1FE6675C03D802D78C212279E04C60DD04C5DE
2,707,591 UART: mbox::rt_entry...
2,707,963 UART: ____ _ _ _ ____ _____
2,708,747 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,547 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,315 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,083 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,851 UART: |_|
2,712,163 UART:
2,818,384 UART: [rt] Runtime listening for mailbox commands...
2,819,565 >>> mbox cmd response data (48 bytes)
2,819,566 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,822,349 >>> mbox cmd response data (48 bytes)
2,822,350 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,835,288 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,829 ready_for_fw is high
1,056,829 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,528 >>> mbox cmd response: success
2,160,528 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,223,048 UART:
2,223,064 UART: Running Caliptra FMC ...
2,223,472 UART:
2,223,615 UART: [state] CFI Enabled
2,233,866 UART: [fht] FMC Alias Private Key: 7
2,341,799 UART: [art] Extend RT PCRs Done
2,342,227 UART: [art] Lock RT PCRs Done
2,343,739 UART: [art] Populate DV Done
2,351,932 UART: [fht] FMC Alias Private Key: 7
2,352,902 UART: [art] Derive CDI
2,353,182 UART: [art] Store in in slot 0x4
2,438,899 UART: [art] Derive Key Pair
2,439,259 UART: [art] Store priv key in slot 0x5
2,452,269 UART: [art] Derive Key Pair - Done
2,467,107 UART: [art] Signing Cert with AUTHO
2,467,587 UART: RITY.KEYID = 7
2,482,669 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,434 UART: [art] PUB.X = 274ABC85FEB722B3577F4F698E54A9159CCED8DE0C60C0F39EE7BBE13151035D284B72FB1BE1543144CDAF9884665515
2,490,206 UART: [art] PUB.Y = CBC520DF92AE8B326A88C32CA58749534B4E54F13D544E4D82016D57DAA84F0331064859826F192D84F62816C60495D2
2,497,138 UART: [art] SIG.R = 8F379E94CC75C3D878C8245BA7B881F7BC3A753325FCB9F247AB636067C3EAFD35B2DB71234716490E1AC055BC31D738
2,503,911 UART: [art] SIG.S = 4F147E376AA61CC0154C9823C2CB6BFA4FC3AE35E6BE6035A3C15F196C891331F384A0CFE587F6F6A699F9903B77F8AA
2,528,168 UART: mbox::rt_entry...
2,528,540 UART: ____ _ _ _ ____ _____
2,529,324 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,124 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,892 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,660 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,428 UART: |_|
2,532,740 UART:
2,638,880 UART: [rt] Runtime listening for mailbox commands...
2,640,061 >>> mbox cmd response data (48 bytes)
2,640,062 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,642,845 >>> mbox cmd response data (48 bytes)
2,642,846 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,655,784 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
192,000 UART:
192,378 UART: Running Caliptra ROM ...
193,579 UART:
193,735 UART: [state] CFI Enabled
263,814 UART: [state] LifecycleState = Unprovisioned
265,740 UART: [state] DebugLocked = No
268,769 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,869 UART: [kat] SHA2-256
442,516 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,069 UART: [kat] ++
453,564 UART: [kat] sha1
465,863 UART: [kat] SHA2-256
468,588 UART: [kat] SHA2-384
473,793 UART: [kat] SHA2-512-ACC
476,160 UART: [kat] ECC-384
2,767,418 UART: [kat] HMAC-384Kdf
2,781,510 UART: [kat] LMS
3,971,789 UART: [kat] --
3,975,367 UART: [cold-reset] ++
3,977,226 UART: [fht] Storing FHT @ 0x50003400
3,989,361 UART: [idev] ++
3,989,928 UART: [idev] CDI.KEYID = 6
3,990,813 UART: [idev] SUBJECT.KEYID = 7
3,992,058 UART: [idev] UDS.KEYID = 0
3,993,133 ready_for_fw is high
3,993,354 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,137 UART: [idev] Erasing UDS.KEYID = 0
7,330,405 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,799 UART: [idev] --
7,356,176 UART: [ldev] ++
7,356,800 UART: [ldev] CDI.KEYID = 6
7,357,728 UART: [ldev] SUBJECT.KEYID = 5
7,358,939 UART: [ldev] AUTHORITY.KEYID = 7
7,360,235 UART: [ldev] FE.KEYID = 1
7,404,531 UART: [ldev] Erasing FE.KEYID = 1
10,738,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,061,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,215 UART: [ldev] --
13,099,380 UART: [fwproc] Waiting for Commands...
13,101,105 UART: [fwproc] Received command 0x46574c44
13,103,301 UART: [fwproc] Received Image of size 114124 bytes
17,161,758 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,235,250 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,621,747 >>> mbox cmd response: success
17,626,051 UART: [afmc] ++
17,626,652 UART: [afmc] CDI.KEYID = 6
17,627,626 UART: [afmc] SUBJECT.KEYID = 7
17,628,844 UART: [afmc] AUTHORITY.KEYID = 5
20,991,762 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,391 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,646 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,010 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,333,890 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,311 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,492 UART: [afmc] --
23,374,029 UART: [cold-reset] --
23,378,113 UART: [state] Locking Datavault
23,382,606 UART: [state] Locking PCR0, PCR1 and PCR31
23,384,366 UART: [state] Locking ICCM
23,386,629 UART: [exit] Launching FMC @ 0x40000130
23,394,969 UART:
23,395,202 UART: Running Caliptra FMC ...
23,396,306 UART:
23,396,470 UART: [state] CFI Enabled
23,463,105 UART: [fht] FMC Alias Private Key: 7
25,801,027 UART: [art] Extend RT PCRs Done
25,802,248 UART: [art] Lock RT PCRs Done
25,804,022 UART: [art] Populate DV Done
25,809,599 UART: [fht] FMC Alias Private Key: 7
25,811,259 UART: [art] Derive CDI
25,812,014 UART: [art] Store in in slot 0x4
25,870,744 UART: [art] Derive Key Pair
25,871,746 UART: [art] Store priv key in slot 0x5
29,164,273 UART: [art] Derive Key Pair - Done
29,177,262 UART: [art] Signing Cert with AUTHO
29,178,592 UART: RITY.KEYID = 7
31,466,168 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,677 UART: [art] PUB.X = DDFF04AC65D5B8A8734C666C6CCADDE7112014D0A61F6784F6552E8004891C5276C827210FDE6C90179502D257C487DF
31,474,917 UART: [art] PUB.Y = 2A8440CF7B1A66E910F5E8CCE4977BA73D7C6F1AB490C4FECE2BFA592CD0AF3151A26C801CD679B916DBA27F93DB4626
31,482,210 UART: [art] SIG.R = 11C9BA16581BC61A5DCACEEAAB65A043DB28330BDC43DC2D9FFB9F0569D4DF60BB0BD1F1942F5492A7E7CB43A23FB044
31,489,616 UART: [art] SIG.S = 3E3B41F9B9F4F7B5A0A5FD2C02712DF9BD8F2FA64AE904CF3A73FBD95F717287768D51FE8F7304B90A2A181B2CFB5EE1
32,794,904 UART: Caliptra RT
32,795,623 UART: [state] CFI Enabled
32,957,471 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,805,863 ready_for_fw is high
3,806,461 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,887,415 >>> mbox cmd response: success
23,582,595 UART:
23,582,988 UART: Running Caliptra FMC ...
23,584,195 UART:
23,584,366 UART: [state] CFI Enabled
23,649,572 UART: [fht] FMC Alias Private Key: 7
25,987,223 UART: [art] Extend RT PCRs Done
25,988,441 UART: [art] Lock RT PCRs Done
25,990,129 UART: [art] Populate DV Done
25,995,394 UART: [fht] FMC Alias Private Key: 7
25,997,108 UART: [art] Derive CDI
25,997,926 UART: [art] Store in in slot 0x4
26,060,058 UART: [art] Derive Key Pair
26,061,108 UART: [art] Store priv key in slot 0x5
29,354,095 UART: [art] Derive Key Pair - Done
29,367,090 UART: [art] Signing Cert with AUTHO
29,368,413 UART: RITY.KEYID = 7
31,655,306 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,820 UART: [art] PUB.X = D09A90DEFECD3BED34C9BA5E3F75F1F5A0ACC9279D1E2D8ADF81FA8FC169EFEA0DFFFEC1D7B21F0C36ACEF46844AB8EE
31,664,136 UART: [art] PUB.Y = 4C234C2F4CC1DDAE73E662F8FDE2EA4A2B72DCDA179C8F5EA27BC4AD1B629E7366B99CEA5DB8761C3987BC8EF01ECF8F
31,671,400 UART: [art] SIG.R = ED737ADE2DF9B7D575D5872683E75984A0BAD0499CBC892918808D5C0C8CB715405E0B9F3B08541FE103FAC2C3107475
31,678,771 UART: [art] SIG.S = C5B59EA0A40F7DB8CF4BFDA9B1A3C5A413E1694F9BEF5C6A11B80DA237258171DDAA0D0F60CBF6E0D1AFEFFEFCE1D2C0
32,983,734 UART: Caliptra RT
32,984,447 UART: [state] CFI Enabled
33,145,645 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,342 UART:
192,711 UART: Running Caliptra ROM ...
193,813 UART:
603,510 UART: [state] CFI Enabled
614,851 UART: [state] LifecycleState = Unprovisioned
616,749 UART: [state] DebugLocked = No
619,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,978 UART: [kat] SHA2-256
794,709 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,296 UART: [kat] ++
805,740 UART: [kat] sha1
816,552 UART: [kat] SHA2-256
819,273 UART: [kat] SHA2-384
825,754 UART: [kat] SHA2-512-ACC
828,118 UART: [kat] ECC-384
3,113,418 UART: [kat] HMAC-384Kdf
3,125,601 UART: [kat] LMS
4,315,684 UART: [kat] --
4,321,561 UART: [cold-reset] ++
4,323,568 UART: [fht] Storing FHT @ 0x50003400
4,336,252 UART: [idev] ++
4,336,816 UART: [idev] CDI.KEYID = 6
4,337,803 UART: [idev] SUBJECT.KEYID = 7
4,338,971 UART: [idev] UDS.KEYID = 0
4,339,984 ready_for_fw is high
4,340,209 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,664 UART: [idev] Erasing UDS.KEYID = 0
7,625,417 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,654 UART: [idev] --
7,649,808 UART: [ldev] ++
7,650,412 UART: [ldev] CDI.KEYID = 6
7,651,317 UART: [ldev] SUBJECT.KEYID = 5
7,652,525 UART: [ldev] AUTHORITY.KEYID = 7
7,653,802 UART: [ldev] FE.KEYID = 1
7,663,609 UART: [ldev] Erasing FE.KEYID = 1
10,954,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,285 UART: [ldev] --
13,318,485 UART: [fwproc] Waiting for Commands...
13,321,163 UART: [fwproc] Received command 0x46574c44
13,323,356 UART: [fwproc] Received Image of size 114124 bytes
17,372,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,410 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,390 >>> mbox cmd response: success
17,835,188 UART: [afmc] ++
17,835,785 UART: [afmc] CDI.KEYID = 6
17,836,691 UART: [afmc] SUBJECT.KEYID = 7
17,837,955 UART: [afmc] AUTHORITY.KEYID = 5
21,150,779 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,273 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,627 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,502 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,942 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,905 UART: [afmc] --
23,517,218 UART: [cold-reset] --
23,520,914 UART: [state] Locking Datavault
23,525,357 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,111 UART: [state] Locking ICCM
23,528,981 UART: [exit] Launching FMC @ 0x40000130
23,537,375 UART:
23,537,605 UART: Running Caliptra FMC ...
23,538,702 UART:
23,538,854 UART: [state] CFI Enabled
23,547,012 UART: [fht] FMC Alias Private Key: 7
25,877,782 UART: [art] Extend RT PCRs Done
25,878,998 UART: [art] Lock RT PCRs Done
25,880,450 UART: [art] Populate DV Done
25,886,021 UART: [fht] FMC Alias Private Key: 7
25,887,661 UART: [art] Derive CDI
25,888,392 UART: [art] Store in in slot 0x4
25,931,046 UART: [art] Derive Key Pair
25,932,058 UART: [art] Store priv key in slot 0x5
29,174,257 UART: [art] Derive Key Pair - Done
29,187,365 UART: [art] Signing Cert with AUTHO
29,188,671 UART: RITY.KEYID = 7
31,467,788 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,289 UART: [art] PUB.X = 2493D878AA8FF61AE864E3B74E455530ED2BA27449925EC55144659B6AD379B6E8155239BA99EDE78A34C5979EEC7E7B
31,476,517 UART: [art] PUB.Y = F41F6CE687827D642AF286B0D0D6DBAE2CC3BC1E4FBD5692FE7E3DFBEABAB7B7CBF5228337B7FE954795B9FE93ADA953
31,483,785 UART: [art] SIG.R = 6F2F1E4A66D6AE81A5E1060C258205A5A2462A112C955B9B24F953F7D4C9E08320B2459FEB251BB9594D9D4CB30FDB08
31,491,198 UART: [art] SIG.S = AD1336CE09D268C3A92FA259690B9D2B6773D5E6018C8EF218C5E6448590BAE94AAF3E1714433064BC63979C4766578B
32,796,708 UART: Caliptra RT
32,797,421 UART: [state] CFI Enabled
32,914,585 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
4,128,590 ready_for_fw is high
4,128,968 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,987 >>> mbox cmd response: success
23,703,436 UART:
23,703,841 UART: Running Caliptra FMC ...
23,704,973 UART:
23,705,131 UART: [state] CFI Enabled
23,712,967 UART: [fht] FMC Alias Private Key: 7
26,043,788 UART: [art] Extend RT PCRs Done
26,045,020 UART: [art] Lock RT PCRs Done
26,046,982 UART: [art] Populate DV Done
26,052,243 UART: [fht] FMC Alias Private Key: 7
26,053,791 UART: [art] Derive CDI
26,054,576 UART: [art] Store in in slot 0x4
26,097,454 UART: [art] Derive Key Pair
26,098,496 UART: [art] Store priv key in slot 0x5
29,339,753 UART: [art] Derive Key Pair - Done
29,352,639 UART: [art] Signing Cert with AUTHO
29,353,972 UART: RITY.KEYID = 7
31,633,278 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,789 UART: [art] PUB.X = 4BBBA5FA9EE29FC2808AFD077E6BF8DFB36EDC4BFD1E7F5DBC1C82D22B9D59BF39715765618794B17CFD756009732392
31,642,049 UART: [art] PUB.Y = BF588B0286955A183E222A2D6D01B9B4D45C3A12B38C4264059AB79069B4F4323DD27F2FB82B1EEC27F2760701518B0E
31,649,279 UART: [art] SIG.R = DA3A71C143FD6CBB48322E35693A0EB5C52BFF44F2ECAEE126A4DA1FD33558D1B01C698BB4EA05B5E605A813EA1B6D57
31,656,653 UART: [art] SIG.S = 48BE72DBEEEB3F5B411113FB3B7798C515CA710B1F5B719303DF50200928BDEA5E23F516FC3FD890892A08FDEA5C61C8
32,962,001 UART: Caliptra RT
32,962,729 UART: [state] CFI Enabled
33,080,888 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,054 UART:
192,407 UART: Running Caliptra ROM ...
193,515 UART:
193,660 UART: [state] CFI Enabled
260,634 UART: [state] LifecycleState = Unprovisioned
262,566 UART: [state] DebugLocked = No
264,797 UART: [state] WD Timer not started. Device not locked for debugging
268,826 UART: [kat] SHA2-256
447,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,510 UART: [kat] ++
459,962 UART: [kat] sha1
471,902 UART: [kat] SHA2-256
474,970 UART: [kat] SHA2-384
480,246 UART: [kat] SHA2-512-ACC
483,185 UART: [kat] ECC-384
2,950,282 UART: [kat] HMAC-384Kdf
2,970,018 UART: [kat] LMS
3,499,435 UART: [kat] --
3,502,659 UART: [cold-reset] ++
3,503,806 UART: [fht] FHT @ 0x50003400
3,515,136 UART: [idev] ++
3,515,714 UART: [idev] CDI.KEYID = 6
3,516,747 UART: [idev] SUBJECT.KEYID = 7
3,517,849 UART: [idev] UDS.KEYID = 0
3,518,792 ready_for_fw is high
3,518,999 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,021 UART: [idev] Erasing UDS.KEYID = 0
6,030,577 UART: [idev] Sha1 KeyId Algorithm
6,053,639 UART: [idev] --
6,056,693 UART: [ldev] ++
6,057,276 UART: [ldev] CDI.KEYID = 6
6,058,193 UART: [ldev] SUBJECT.KEYID = 5
6,059,353 UART: [ldev] AUTHORITY.KEYID = 7
6,060,583 UART: [ldev] FE.KEYID = 1
6,100,289 UART: [ldev] Erasing FE.KEYID = 1
8,605,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,133 UART: [ldev] --
10,415,070 UART: [fwproc] Wait for Commands...
10,416,842 UART: [fwproc] Recv command 0x46574c44
10,418,934 UART: [fwproc] Recv'd Img size: 114448 bytes
13,824,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,289,005 >>> mbox cmd response: success
14,293,200 UART: [afmc] ++
14,293,821 UART: [afmc] CDI.KEYID = 6
14,294,710 UART: [afmc] SUBJECT.KEYID = 7
14,295,929 UART: [afmc] AUTHORITY.KEYID = 5
16,827,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,831 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,661 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,940 UART: [afmc] --
18,629,107 UART: [cold-reset] --
18,632,318 UART: [state] Locking Datavault
18,636,695 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,335 UART: [state] Locking ICCM
18,640,078 UART: [exit] Launching FMC @ 0x40000130
18,648,470 UART:
18,648,701 UART: Running Caliptra FMC ...
18,649,725 UART:
18,649,872 UART: [state] CFI Enabled
18,711,863 UART: [fht] FMC Alias Private Key: 7
20,475,785 UART: [art] Extend RT PCRs Done
20,477,004 UART: [art] Lock RT PCRs Done
20,478,605 UART: [art] Populate DV Done
20,484,012 UART: [fht] FMC Alias Private Key: 7
20,485,556 UART: [art] Derive CDI
20,486,292 UART: [art] Store in in slot 0x4
20,544,573 UART: [art] Derive Key Pair
20,545,607 UART: [art] Store priv key in slot 0x5
23,008,204 UART: [art] Derive Key Pair - Done
23,021,365 UART: [art] Signing Cert with AUTHO
23,022,696 UART: RITY.KEYID = 7
24,733,887 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,389 UART: [art] PUB.X = E4B7360BE6BEE919BFC1869E4B7EDF59C5EC18699C3F4EA82B6875209CFF2171643D9F6C48BC7693E0E98F286A08E6DB
24,742,708 UART: [art] PUB.Y = A9969B40D6A7A625821936369C39BEF46B048A15ADEDD107B96FA2F287626BAFC4F53BE6BAB1634C8995ACE880875C83
24,749,948 UART: [art] SIG.R = 8EE89A6893F1CEF968EAAD9BADD6BD89FA69F4DF2B4019B9663A7D3C47F932521B1DC6F0EC7412464A8C971D48D9D18E
24,757,344 UART: [art] SIG.S = A6FC8484754B692F129F367E1A19FF6A997BDC9FE3AE7DAEF345243C0C64B21B15434E3E70F19E92BC68FC913CB113CD
25,736,984 UART: Caliptra RT
25,737,696 UART: [state] CFI Enabled
25,901,707 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
3,382,886 ready_for_fw is high
3,383,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,094,539 >>> mbox cmd response: success
18,412,222 UART:
18,412,607 UART: Running Caliptra FMC ...
18,413,761 UART:
18,413,922 UART: [state] CFI Enabled
18,478,461 UART: [fht] FMC Alias Private Key: 7
20,242,744 UART: [art] Extend RT PCRs Done
20,243,981 UART: [art] Lock RT PCRs Done
20,245,394 UART: [art] Populate DV Done
20,250,914 UART: [fht] FMC Alias Private Key: 7
20,252,526 UART: [art] Derive CDI
20,253,269 UART: [art] Store in in slot 0x4
20,312,694 UART: [art] Derive Key Pair
20,313,735 UART: [art] Store priv key in slot 0x5
22,776,812 UART: [art] Derive Key Pair - Done
22,790,185 UART: [art] Signing Cert with AUTHO
22,791,489 UART: RITY.KEYID = 7
24,502,424 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,925 UART: [art] PUB.X = EF036ED87BF5523D2B96EBF70EB99A49C275F2ED75F999D7E21D01E1B462B0A1F40CEB302F10B124D845CB06BBDD6241
24,511,174 UART: [art] PUB.Y = CEA7E42E3DFA82E9377B5A1B873D661573DFA3B3BFA0D44C266761ADA7E933F1B0308F00865A8FC52397191C09D75FE2
24,518,425 UART: [art] SIG.R = AFDC9E913916F0B6642AC6BCF579292217680D0792AC24EC45F86EDC64CA2C03B54FF33715818555C9ECEC7F758F58F8
24,525,868 UART: [art] SIG.S = 68586218CB65D0513FA987D91A3D54F1BCE5919EC0AD0010B87DFF309E9247BE71218DDD33AE7957B2303DB738AE0526
25,505,294 UART: Caliptra RT
25,506,003 UART: [state] CFI Enabled
25,670,551 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
192,366 UART:
192,739 UART: Running Caliptra ROM ...
193,926 UART:
603,438 UART: [state] CFI Enabled
617,663 UART: [state] LifecycleState = Unprovisioned
619,546 UART: [state] DebugLocked = No
622,278 UART: [state] WD Timer not started. Device not locked for debugging
625,587 UART: [kat] SHA2-256
804,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,271 UART: [kat] ++
816,803 UART: [kat] sha1
828,600 UART: [kat] SHA2-256
831,612 UART: [kat] SHA2-384
837,806 UART: [kat] SHA2-512-ACC
840,739 UART: [kat] ECC-384
3,283,441 UART: [kat] HMAC-384Kdf
3,294,832 UART: [kat] LMS
3,824,322 UART: [kat] --
3,827,388 UART: [cold-reset] ++
3,828,672 UART: [fht] FHT @ 0x50003400
3,839,003 UART: [idev] ++
3,839,572 UART: [idev] CDI.KEYID = 6
3,840,473 UART: [idev] SUBJECT.KEYID = 7
3,841,640 UART: [idev] UDS.KEYID = 0
3,842,679 ready_for_fw is high
3,842,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,582 UART: [idev] Erasing UDS.KEYID = 0
6,311,065 UART: [idev] Sha1 KeyId Algorithm
6,334,257 UART: [idev] --
6,339,533 UART: [ldev] ++
6,340,108 UART: [ldev] CDI.KEYID = 6
6,341,039 UART: [ldev] SUBJECT.KEYID = 5
6,342,246 UART: [ldev] AUTHORITY.KEYID = 7
6,343,470 UART: [ldev] FE.KEYID = 1
6,355,242 UART: [ldev] Erasing FE.KEYID = 1
8,833,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,743 UART: [ldev] --
10,624,779 UART: [fwproc] Wait for Commands...
10,626,265 UART: [fwproc] Recv command 0x46574c44
10,628,350 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,497,423 >>> mbox cmd response: success
14,502,600 UART: [afmc] ++
14,503,190 UART: [afmc] CDI.KEYID = 6
14,504,095 UART: [afmc] SUBJECT.KEYID = 7
14,505,249 UART: [afmc] AUTHORITY.KEYID = 5
17,005,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,653 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,691 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,530 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,457 UART: [afmc] --
18,800,909 UART: [cold-reset] --
18,805,748 UART: [state] Locking Datavault
18,810,560 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,202 UART: [state] Locking ICCM
18,813,856 UART: [exit] Launching FMC @ 0x40000130
18,822,294 UART:
18,822,537 UART: Running Caliptra FMC ...
18,823,633 UART:
18,823,783 UART: [state] CFI Enabled
18,831,606 UART: [fht] FMC Alias Private Key: 7
20,588,832 UART: [art] Extend RT PCRs Done
20,590,050 UART: [art] Lock RT PCRs Done
20,591,723 UART: [art] Populate DV Done
20,597,182 UART: [fht] FMC Alias Private Key: 7
20,598,710 UART: [art] Derive CDI
20,599,461 UART: [art] Store in in slot 0x4
20,642,147 UART: [art] Derive Key Pair
20,643,157 UART: [art] Store priv key in slot 0x5
23,069,441 UART: [art] Derive Key Pair - Done
23,082,226 UART: [art] Signing Cert with AUTHO
23,083,524 UART: RITY.KEYID = 7
24,789,005 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,510 UART: [art] PUB.X = D60ECD068B06C06E8E2A1A0966BC8557C8B61D34B56528CDECD1BB80E53280CF471978A3A31518AE19FBF34AA8AAC409
24,797,792 UART: [art] PUB.Y = 91B936AEEC63E18663594D3716856181331DBF0E6467F873B86CF4821B8741AE09A8334FB14B8A90B6843FBF2B365AC4
24,805,056 UART: [art] SIG.R = 7C64A7DF70AFC1E4541E0E6EEE69184AC5C4763DF63B2617A9FFE1A5925F6C4705B08AF334DB8BB56C817491052B2C94
24,812,438 UART: [art] SIG.S = 3EA94352F68552F6F83E682A18CC9D75E1A008770A2EEB9AD0BC4AEFF0E3784C8CF815B2D2C9E1CCB756E9197F89E571
25,790,784 UART: Caliptra RT
25,791,482 UART: [state] CFI Enabled
25,908,384 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
3,696,528 ready_for_fw is high
3,697,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,278,727 >>> mbox cmd response: success
18,531,386 UART:
18,531,783 UART: Running Caliptra FMC ...
18,532,914 UART:
18,533,059 UART: [state] CFI Enabled
18,540,647 UART: [fht] FMC Alias Private Key: 7
20,297,197 UART: [art] Extend RT PCRs Done
20,298,424 UART: [art] Lock RT PCRs Done
20,300,153 UART: [art] Populate DV Done
20,305,781 UART: [fht] FMC Alias Private Key: 7
20,307,327 UART: [art] Derive CDI
20,308,058 UART: [art] Store in in slot 0x4
20,350,983 UART: [art] Derive Key Pair
20,352,029 UART: [art] Store priv key in slot 0x5
22,778,788 UART: [art] Derive Key Pair - Done
22,791,715 UART: [art] Signing Cert with AUTHO
22,793,021 UART: RITY.KEYID = 7
24,497,839 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,344 UART: [art] PUB.X = 94D501ABEFF0E5EE9A8ADADA16DDCA7BA2010A991DA016961FB88B9648BEF4D46BBC9B07D89E71F5D57E1316FF3F4228
24,506,608 UART: [art] PUB.Y = 1C0E4A6C0BF04A0FE75C98E2995FB4C6FCCF8E519992DA82AB4C69BE31800C08365E10EC72F8C4B7F91D0BDE93CDB2BB
24,513,917 UART: [art] SIG.R = 0606494706AC1816A651726849080EB38E74B0504E3003A610C97AAE71FCAF6FB035DE9B1F5E173044ADAC499AAACDEA
24,521,303 UART: [art] SIG.S = F689D99C34826B9791C8367FB401085AFD81C049E54D413EBC5102C1120B2AF6C85C13D59C9F3B3748B74B5EC3848E39
25,500,419 UART: Caliptra RT
25,501,137 UART: [state] CFI Enabled
25,618,301 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,434,916 ready_for_fw is high
3,435,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,739,254 >>> mbox cmd response: success
19,028,484 UART:
19,028,902 UART: Running Caliptra FMC ...
19,030,017 UART:
19,030,177 UART: [state] CFI Enabled
19,095,866 UART: [fht] FMC Alias Private Key: 7
20,859,731 UART: [art] Extend RT PCRs Done
20,860,957 UART: [art] Lock RT PCRs Done
20,862,285 UART: [art] Populate DV Done
20,867,537 UART: [fht] FMC Alias Private Key: 7
20,869,078 UART: [art] Derive CDI
20,869,819 UART: [art] Store in in slot 0x4
20,928,904 UART: [art] Derive Key Pair
20,929,902 UART: [art] Store priv key in slot 0x5
23,393,076 UART: [art] Derive Key Pair - Done
23,405,914 UART: [art] Signing Cert with AUTHO
23,407,225 UART: RITY.KEYID = 7
25,119,076 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,584 UART: [art] PUB.X = BC9F979B1344D1A07BCD22A5D5993B8F110818BEF152231CAF578F25D5858F471A4F086AB259AFEE1C69E1B125BE9687
25,127,838 UART: [art] PUB.Y = C9483BF37264F443320B0DF9BB0037827F9F935B5E660F07503B579A23AE1D1251C90945D74839630C19F47B0BD2CDD0
25,135,084 UART: [art] SIG.R = ADD94CEDF10FDC0A02048BA0177D28788BA2D0905EEB4205F82C0DA2D8061D8A8F6A239E1718320ECCDD6AD31223D8A3
25,142,481 UART: [art] SIG.S = 493CC06B12AB599303CAA99A1AEB6283D2D891C5B4AC65564256B6B41FA45B5F8DB76F53B9A9B89A2B7BD011AEE7A8F3
26,121,304 UART: Caliptra RT
26,122,023 UART: [state] CFI Enabled
26,287,149 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,570 writing to cptra_bootfsm_go
3,769,090 ready_for_fw is high
3,769,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,958,844 >>> mbox cmd response: success
19,214,638 UART:
19,215,021 UART: Running Caliptra FMC ...
19,216,155 UART:
19,216,312 UART: [state] CFI Enabled
19,224,293 UART: [fht] FMC Alias Private Key: 7
20,982,099 UART: [art] Extend RT PCRs Done
20,983,333 UART: [art] Lock RT PCRs Done
20,985,363 UART: [art] Populate DV Done
20,991,009 UART: [fht] FMC Alias Private Key: 7
20,992,450 UART: [art] Derive CDI
20,993,178 UART: [art] Store in in slot 0x4
21,035,759 UART: [art] Derive Key Pair
21,036,755 UART: [art] Store priv key in slot 0x5
23,463,258 UART: [art] Derive Key Pair - Done
23,476,366 UART: [art] Signing Cert with AUTHO
23,477,671 UART: RITY.KEYID = 7
25,182,985 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,497 UART: [art] PUB.X = 3F0EE4E99D1AC742C1C006C934C043C1C052071F6BF20CBEDA24DA535EA721A299F5D2C797D33F54F6B988DEE496A97A
25,191,766 UART: [art] PUB.Y = FE49346E247D5445CB4A2E882B72F3F53622D3DF2B316EE111F9C4D881DF42AC8D07578A6CD8B97B53DBE90D5FD0D81B
25,199,065 UART: [art] SIG.R = 775A0A89F2C8150D29B04BE323D4BBC8BD2F408C22CD666414FFD97AC84088A422A5BD9DBACD24DC8090DFCA9A83D523
25,206,509 UART: [art] SIG.S = 2C84C34C2042239EEA0DC6D9C7A18E3DCF649DB7128517494582D1958FC631D4DC53D82E60BBF0B4932204E187A87345
26,185,579 UART: Caliptra RT
26,186,263 UART: [state] CFI Enabled
26,304,015 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,081 UART: [kat] SHA2-256
882,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,127 UART: [kat] ++
886,279 UART: [kat] sha1
890,325 UART: [kat] SHA2-256
892,263 UART: [kat] SHA2-384
895,136 UART: [kat] SHA2-512-ACC
897,037 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,475,967 UART: [cold-reset] ++
1,476,327 UART: [fht] Storing FHT @ 0x50003400
1,478,906 UART: [idev] ++
1,479,074 UART: [idev] CDI.KEYID = 6
1,479,434 UART: [idev] SUBJECT.KEYID = 7
1,479,858 UART: [idev] UDS.KEYID = 0
1,480,203 ready_for_fw is high
1,480,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,932 UART: [idev] Erasing UDS.KEYID = 0
1,504,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,976 UART: [idev] --
1,513,889 UART: [ldev] ++
1,514,057 UART: [ldev] CDI.KEYID = 6
1,514,420 UART: [ldev] SUBJECT.KEYID = 5
1,514,846 UART: [ldev] AUTHORITY.KEYID = 7
1,515,309 UART: [ldev] FE.KEYID = 1
1,520,769 UART: [ldev] Erasing FE.KEYID = 1
1,546,192 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,060 UART: [ldev] --
1,585,415 UART: [fwproc] Waiting for Commands...
1,586,226 UART: [fwproc] Received command 0x46574c44
1,587,017 UART: [fwproc] Received Image of size 114448 bytes
2,886,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,488 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,840 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,003 >>> mbox cmd response: success
3,081,111 UART: [afmc] ++
3,081,279 UART: [afmc] CDI.KEYID = 6
3,081,641 UART: [afmc] SUBJECT.KEYID = 7
3,082,066 UART: [afmc] AUTHORITY.KEYID = 5
3,116,637 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,753 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,533 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,261 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,146 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,836 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,511 UART: [afmc] --
3,159,521 UART: [cold-reset] --
3,160,361 UART: [state] Locking Datavault
3,161,750 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,354 UART: [state] Locking ICCM
3,162,804 UART: [exit] Launching FMC @ 0x40000130
3,168,133 UART:
3,168,149 UART: Running Caliptra FMC ...
3,168,557 UART:
3,168,611 UART: [state] CFI Enabled
3,179,192 UART: [fht] FMC Alias Private Key: 7
3,287,425 UART: [art] Extend RT PCRs Done
3,287,853 UART: [art] Lock RT PCRs Done
3,289,699 UART: [art] Populate DV Done
3,297,940 UART: [fht] FMC Alias Private Key: 7
3,298,894 UART: [art] Derive CDI
3,299,174 UART: [art] Store in in slot 0x4
3,384,717 UART: [art] Derive Key Pair
3,385,077 UART: [art] Store priv key in slot 0x5
3,398,139 UART: [art] Derive Key Pair - Done
3,412,652 UART: [art] Signing Cert with AUTHO
3,413,132 UART: RITY.KEYID = 7
3,428,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,091 UART: [art] PUB.X = 34E134C24934E5F54840D488CC22BD3F3FAA6BD25B9754B29A9AAE6921A119A0E31598EE7D14FAC9A11A9BC76AC7E1F5
3,435,875 UART: [art] PUB.Y = C9D696CA1A32A2CB5913D30619EB705D9D1C7CDD8FAA23730BF23CF72FAB8C26915E853CBCD72DD077564C9F5FD9E6D2
3,442,839 UART: [art] SIG.R = ED2904CB3526812BAAAAB9AB0E7C12FC56A1C70DCC37FD3BCAEE9049DE40CB61BE56A4FFF371E00CEC42959EE20E5732
3,449,622 UART: [art] SIG.S = 568BB4567207F974850564832B9C2B2E5F10B6FA0B6DACB58958EAEE1FC9095A396F84E1499CFDFDA90FFB7E426F0D00
3,473,237 UART: Caliptra RT
3,473,490 UART: [state] CFI Enabled
3,581,147 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 ready_for_fw is high
1,362,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,971 >>> mbox cmd response: success
2,992,955 UART:
2,992,971 UART: Running Caliptra FMC ...
2,993,379 UART:
2,993,433 UART: [state] CFI Enabled
3,004,146 UART: [fht] FMC Alias Private Key: 7
3,112,529 UART: [art] Extend RT PCRs Done
3,112,957 UART: [art] Lock RT PCRs Done
3,114,375 UART: [art] Populate DV Done
3,122,614 UART: [fht] FMC Alias Private Key: 7
3,123,556 UART: [art] Derive CDI
3,123,836 UART: [art] Store in in slot 0x4
3,209,357 UART: [art] Derive Key Pair
3,209,717 UART: [art] Store priv key in slot 0x5
3,223,373 UART: [art] Derive Key Pair - Done
3,238,267 UART: [art] Signing Cert with AUTHO
3,238,747 UART: RITY.KEYID = 7
3,254,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,846 UART: [art] PUB.X = C55AA364DE33C05BC5E66D9BC16D29481DDEB0C3FC630274C5C6BF595A3A7A2009412E1DA34C2825CC463BBAF07F0B95
3,261,623 UART: [art] PUB.Y = 5D3BC644993C18AFC9D7F15EC8E8186A64C60D4721A002074B8B27DAF145291A33988387F8197CFC61F3F8CA16A97B0F
3,268,565 UART: [art] SIG.R = 3D4408959263B28F4AC3E892EEE575C6B8B3D3211E089921155472544F81F6F51B40702911C4A0223B002770926FC4AF
3,275,295 UART: [art] SIG.S = 5CA1D937880222445CA8889243EF04052C446EFC37660F4C687FE2340DEDAE81337FC85DAEDF9C7B2070C28D844C930E
3,298,940 UART: Caliptra RT
3,299,193 UART: [state] CFI Enabled
3,407,827 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,762 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,590 UART: [kat] SHA2-256
892,528 UART: [kat] SHA2-384
895,315 UART: [kat] SHA2-512-ACC
897,216 UART: [kat] ECC-384
902,701 UART: [kat] HMAC-384Kdf
907,425 UART: [kat] LMS
1,475,621 UART: [kat] --
1,476,348 UART: [cold-reset] ++
1,476,892 UART: [fht] Storing FHT @ 0x50003400
1,479,657 UART: [idev] ++
1,479,825 UART: [idev] CDI.KEYID = 6
1,480,185 UART: [idev] SUBJECT.KEYID = 7
1,480,609 UART: [idev] UDS.KEYID = 0
1,480,954 ready_for_fw is high
1,480,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,049 UART: [idev] Erasing UDS.KEYID = 0
1,505,667 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,347 UART: [idev] --
1,515,176 UART: [ldev] ++
1,515,344 UART: [ldev] CDI.KEYID = 6
1,515,707 UART: [ldev] SUBJECT.KEYID = 5
1,516,133 UART: [ldev] AUTHORITY.KEYID = 7
1,516,596 UART: [ldev] FE.KEYID = 1
1,521,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,391 UART: [ldev] --
1,586,866 UART: [fwproc] Waiting for Commands...
1,587,681 UART: [fwproc] Received command 0x46574c44
1,588,472 UART: [fwproc] Received Image of size 114448 bytes
2,887,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,868 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,199 >>> mbox cmd response: success
3,081,271 UART: [afmc] ++
3,081,439 UART: [afmc] CDI.KEYID = 6
3,081,801 UART: [afmc] SUBJECT.KEYID = 7
3,082,226 UART: [afmc] AUTHORITY.KEYID = 5
3,117,365 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,577 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,357 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,085 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,970 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,660 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,447 UART: [afmc] --
3,160,577 UART: [cold-reset] --
3,161,343 UART: [state] Locking Datavault
3,162,264 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,868 UART: [state] Locking ICCM
3,163,300 UART: [exit] Launching FMC @ 0x40000130
3,168,629 UART:
3,168,645 UART: Running Caliptra FMC ...
3,169,053 UART:
3,169,196 UART: [state] CFI Enabled
3,179,719 UART: [fht] FMC Alias Private Key: 7
3,287,576 UART: [art] Extend RT PCRs Done
3,288,004 UART: [art] Lock RT PCRs Done
3,289,590 UART: [art] Populate DV Done
3,297,821 UART: [fht] FMC Alias Private Key: 7
3,298,795 UART: [art] Derive CDI
3,299,075 UART: [art] Store in in slot 0x4
3,385,080 UART: [art] Derive Key Pair
3,385,440 UART: [art] Store priv key in slot 0x5
3,398,386 UART: [art] Derive Key Pair - Done
3,413,062 UART: [art] Signing Cert with AUTHO
3,413,542 UART: RITY.KEYID = 7
3,428,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,297 UART: [art] PUB.X = 4A45C430886888AEA4E483707DBDD2952F48ED9BD062EB7746C6E16F6780CC9F538A522284EBF136C19B9289418225DA
3,436,067 UART: [art] PUB.Y = 5DB7D888F20A2F3617DCB65C58CB5CD23307E91A92B88C8655517886E37153E5105B7D29DD230A601C5C98FBB98D61D4
3,443,010 UART: [art] SIG.R = 5F6A02A1049DFBEF4CFA3BA3F17674B6A74925F5B13ACD7204FEFFFF1EFE840340C63090B0A1C935AB1DD14EBAAE9559
3,449,792 UART: [art] SIG.S = 94868864DC48CEDB2D8AA53F205AE644B61562FE6A3482CFE8E0BD3CDBC836A1793EDC0C1FCB5F99BA092AAA41DAB826
3,473,663 UART: Caliptra RT
3,474,008 UART: [state] CFI Enabled
3,582,509 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,870 ready_for_fw is high
1,362,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,216 >>> mbox cmd response: success
2,991,100 UART:
2,991,116 UART: Running Caliptra FMC ...
2,991,524 UART:
2,991,667 UART: [state] CFI Enabled
3,002,136 UART: [fht] FMC Alias Private Key: 7
3,110,469 UART: [art] Extend RT PCRs Done
3,110,897 UART: [art] Lock RT PCRs Done
3,112,817 UART: [art] Populate DV Done
3,120,814 UART: [fht] FMC Alias Private Key: 7
3,121,754 UART: [art] Derive CDI
3,122,034 UART: [art] Store in in slot 0x4
3,207,893 UART: [art] Derive Key Pair
3,208,253 UART: [art] Store priv key in slot 0x5
3,221,283 UART: [art] Derive Key Pair - Done
3,235,996 UART: [art] Signing Cert with AUTHO
3,236,476 UART: RITY.KEYID = 7
3,251,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,085 UART: [art] PUB.X = D82040B02C6C5D2802DE7A5BDE1535BD25013D2F738038C3087BA6AAAE10D8E6E5296FBC8B1956CDF1DCB5431753B9E7
3,258,858 UART: [art] PUB.Y = 0E6209C9B8FEACAA316223BD976F31DF746BAFDAB91904BAB0E567533CEEC3B32EAD2787F194F43E2FF60C5B649D1C01
3,265,813 UART: [art] SIG.R = 3053E64DA68C03EC58D25D5788B14511232C23268375909ADACBF06593EBD405C84B8B1F1961DD84A0AF5A6483F68737
3,272,575 UART: [art] SIG.S = BB065B2246A2CD1CCE026B56EDC72FF4537AFF69126FCC2023847CDDE1E2DBD223A34501FD5F6636939F0A7788EC76F8
3,296,426 UART: Caliptra RT
3,296,771 UART: [state] CFI Enabled
3,403,962 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
893,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,535 UART: [kat] ++
897,687 UART: [kat] sha1
901,975 UART: [kat] SHA2-256
903,915 UART: [kat] SHA2-384
906,720 UART: [kat] SHA2-512-ACC
908,621 UART: [kat] ECC-384
918,264 UART: [kat] HMAC-384Kdf
922,716 UART: [kat] LMS
1,171,044 UART: [kat] --
1,171,945 UART: [cold-reset] ++
1,172,359 UART: [fht] FHT @ 0x50003400
1,175,086 UART: [idev] ++
1,175,254 UART: [idev] CDI.KEYID = 6
1,175,614 UART: [idev] SUBJECT.KEYID = 7
1,176,038 UART: [idev] UDS.KEYID = 0
1,176,383 ready_for_fw is high
1,176,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,026 UART: [idev] Erasing UDS.KEYID = 0
1,201,351 UART: [idev] Sha1 KeyId Algorithm
1,209,803 UART: [idev] --
1,210,927 UART: [ldev] ++
1,211,095 UART: [ldev] CDI.KEYID = 6
1,211,458 UART: [ldev] SUBJECT.KEYID = 5
1,211,884 UART: [ldev] AUTHORITY.KEYID = 7
1,212,347 UART: [ldev] FE.KEYID = 1
1,217,365 UART: [ldev] Erasing FE.KEYID = 1
1,244,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,819 UART: [ldev] --
1,284,126 UART: [fwproc] Wait for Commands...
1,284,706 UART: [fwproc] Recv command 0x46574c44
1,285,434 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,576 >>> mbox cmd response: success
2,777,782 UART: [afmc] ++
2,777,950 UART: [afmc] CDI.KEYID = 6
2,778,312 UART: [afmc] SUBJECT.KEYID = 7
2,778,737 UART: [afmc] AUTHORITY.KEYID = 5
2,814,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,761 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,489 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,374 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,093 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,977 UART: [afmc] --
2,857,999 UART: [cold-reset] --
2,858,873 UART: [state] Locking Datavault
2,860,014 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,618 UART: [state] Locking ICCM
2,861,140 UART: [exit] Launching FMC @ 0x40000130
2,866,469 UART:
2,866,485 UART: Running Caliptra FMC ...
2,866,893 UART:
2,866,947 UART: [state] CFI Enabled
2,877,350 UART: [fht] FMC Alias Private Key: 7
2,984,913 UART: [art] Extend RT PCRs Done
2,985,341 UART: [art] Lock RT PCRs Done
2,986,989 UART: [art] Populate DV Done
2,995,086 UART: [fht] FMC Alias Private Key: 7
2,996,052 UART: [art] Derive CDI
2,996,332 UART: [art] Store in in slot 0x4
3,081,791 UART: [art] Derive Key Pair
3,082,151 UART: [art] Store priv key in slot 0x5
3,095,273 UART: [art] Derive Key Pair - Done
3,110,043 UART: [art] Signing Cert with AUTHO
3,110,523 UART: RITY.KEYID = 7
3,125,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,300 UART: [art] PUB.X = F603135BB67E8121ED8963171CA24C811CA18AE0353E4FF4EE3FF39D28B84E61F74CAAA16DFF0F65E31567D56CA227A6
3,133,076 UART: [art] PUB.Y = 187D06A6D32D5D9423EC0BB0F8403CEBFD3BB5FB3777DAF1D6B7660A96F2FDD7FDFAFE1E602703D3AE9E41705391457D
3,140,034 UART: [art] SIG.R = 19D681656496A387D3F5F78DF9B0415702249FD83C8859C410EA12A0F8D603069223E357F34A5C84CC9E522E4B467219
3,146,785 UART: [art] SIG.S = 9A5F14DE698C2502E66352B0D7E54883387DBCC798B88562EB73038BCA4D3D41749AD7389E556355D5235ADF13B1E859
3,170,124 UART: Caliptra RT
3,170,377 UART: [state] CFI Enabled
3,278,416 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,487 ready_for_fw is high
1,060,487 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,443 >>> mbox cmd response: success
2,689,957 UART:
2,689,973 UART: Running Caliptra FMC ...
2,690,381 UART:
2,690,435 UART: [state] CFI Enabled
2,700,746 UART: [fht] FMC Alias Private Key: 7
2,808,647 UART: [art] Extend RT PCRs Done
2,809,075 UART: [art] Lock RT PCRs Done
2,810,477 UART: [art] Populate DV Done
2,818,762 UART: [fht] FMC Alias Private Key: 7
2,819,690 UART: [art] Derive CDI
2,819,970 UART: [art] Store in in slot 0x4
2,905,903 UART: [art] Derive Key Pair
2,906,263 UART: [art] Store priv key in slot 0x5
2,920,153 UART: [art] Derive Key Pair - Done
2,934,755 UART: [art] Signing Cert with AUTHO
2,935,235 UART: RITY.KEYID = 7
2,950,455 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,220 UART: [art] PUB.X = D666258C588A82BDF3169CC1AB6683BE5F089B15A5B493245569A986849967311219EFB33C28288113A5116A3F1CE692
2,957,977 UART: [art] PUB.Y = C81E08F0C225E64C5F85D61818DF01609614F5489D0C4D4BDB9CFA51E8FB9B432257DB2EA9655698A47BE5BC19C526FF
2,964,928 UART: [art] SIG.R = 4A09926BFCD08F8A99C926A1697F859FD68913A8F16E0FDE4A868422393B43D745A3D99F013FECDEC57AD29D047A9FB3
2,971,696 UART: [art] SIG.S = D1E229609BBA7B9C22272A2415C0C132E8A4BF659907C969C8484D4010BD548502022A8238EA0058843FBEBD95CBFF89
2,995,506 UART: Caliptra RT
2,995,759 UART: [state] CFI Enabled
3,103,860 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
893,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,890 UART: [kat] ++
898,042 UART: [kat] sha1
902,098 UART: [kat] SHA2-256
904,038 UART: [kat] SHA2-384
906,847 UART: [kat] SHA2-512-ACC
908,748 UART: [kat] ECC-384
918,943 UART: [kat] HMAC-384Kdf
923,425 UART: [kat] LMS
1,171,753 UART: [kat] --
1,172,834 UART: [cold-reset] ++
1,173,206 UART: [fht] FHT @ 0x50003400
1,175,779 UART: [idev] ++
1,175,947 UART: [idev] CDI.KEYID = 6
1,176,307 UART: [idev] SUBJECT.KEYID = 7
1,176,731 UART: [idev] UDS.KEYID = 0
1,177,076 ready_for_fw is high
1,177,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,785 UART: [idev] Erasing UDS.KEYID = 0
1,202,230 UART: [idev] Sha1 KeyId Algorithm
1,210,582 UART: [idev] --
1,211,772 UART: [ldev] ++
1,211,940 UART: [ldev] CDI.KEYID = 6
1,212,303 UART: [ldev] SUBJECT.KEYID = 5
1,212,729 UART: [ldev] AUTHORITY.KEYID = 7
1,213,192 UART: [ldev] FE.KEYID = 1
1,218,312 UART: [ldev] Erasing FE.KEYID = 1
1,245,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,742 UART: [ldev] --
1,284,237 UART: [fwproc] Wait for Commands...
1,284,987 UART: [fwproc] Recv command 0x46574c44
1,285,715 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,030 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,334 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,431 >>> mbox cmd response: success
2,779,599 UART: [afmc] ++
2,779,767 UART: [afmc] CDI.KEYID = 6
2,780,129 UART: [afmc] SUBJECT.KEYID = 7
2,780,554 UART: [afmc] AUTHORITY.KEYID = 5
2,815,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,100 UART: [afmc] --
2,859,012 UART: [cold-reset] --
2,859,726 UART: [state] Locking Datavault
2,861,015 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,619 UART: [state] Locking ICCM
2,862,213 UART: [exit] Launching FMC @ 0x40000130
2,867,542 UART:
2,867,558 UART: Running Caliptra FMC ...
2,867,966 UART:
2,868,109 UART: [state] CFI Enabled
2,878,898 UART: [fht] FMC Alias Private Key: 7
2,987,439 UART: [art] Extend RT PCRs Done
2,987,867 UART: [art] Lock RT PCRs Done
2,989,283 UART: [art] Populate DV Done
2,997,724 UART: [fht] FMC Alias Private Key: 7
2,998,700 UART: [art] Derive CDI
2,998,980 UART: [art] Store in in slot 0x4
3,084,617 UART: [art] Derive Key Pair
3,084,977 UART: [art] Store priv key in slot 0x5
3,098,231 UART: [art] Derive Key Pair - Done
3,112,736 UART: [art] Signing Cert with AUTHO
3,113,216 UART: RITY.KEYID = 7
3,128,260 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,025 UART: [art] PUB.X = 3D91DDD94D7C14982D935569F023A57DCC31EB82330987189566C0799191D703D703173FCF711131D36AD679B3DF8CC9
3,135,780 UART: [art] PUB.Y = FFDA39B6EE4C3BAA43A931D32204F5DA0F8E108C2172AD5F606115100358DBD10C7BCA1BB805689B4E07C7D2E16243E3
3,142,724 UART: [art] SIG.R = 2B360235D7C7CF1DC74150AAFC4F26371736F99522F4896B7A45C27ECDE401598E71091BFC244BD5989066D1AFBC8A2A
3,149,491 UART: [art] SIG.S = B5BC45F8A9DFB823559BC78E779D146700C20C41421D258AF792DB3A07A2BE1AA36D3FB6D668C7E1A12A2BB6BD950443
3,173,381 UART: Caliptra RT
3,173,726 UART: [state] CFI Enabled
3,281,923 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,890 ready_for_fw is high
1,060,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,770 >>> mbox cmd response: success
2,693,384 UART:
2,693,400 UART: Running Caliptra FMC ...
2,693,808 UART:
2,693,951 UART: [state] CFI Enabled
2,704,828 UART: [fht] FMC Alias Private Key: 7
2,813,223 UART: [art] Extend RT PCRs Done
2,813,651 UART: [art] Lock RT PCRs Done
2,815,029 UART: [art] Populate DV Done
2,823,290 UART: [fht] FMC Alias Private Key: 7
2,824,380 UART: [art] Derive CDI
2,824,660 UART: [art] Store in in slot 0x4
2,910,473 UART: [art] Derive Key Pair
2,910,833 UART: [art] Store priv key in slot 0x5
2,924,047 UART: [art] Derive Key Pair - Done
2,938,442 UART: [art] Signing Cert with AUTHO
2,938,922 UART: RITY.KEYID = 7
2,954,302 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,067 UART: [art] PUB.X = 15F1DC7E391EC49C834F810A0BAC0D40B0E9B65A3FCDEF81C45823013AF7EE9D0F54CF0BE79FD45E581F9492C8DA3E14
2,961,839 UART: [art] PUB.Y = A658804E20C07C5518FA2D3FE7A59D20185809BFCDB1E1E9076499DD8732ABAE6DC5DD4FD53D268DEE64820C54FC6951
2,968,792 UART: [art] SIG.R = 39EC69513D391EADA28905D686938B52FE0B9CCF0F28D731CB152AA71CB71F5D5CDBD73FEB99E0B50487D2C78D29266F
2,975,564 UART: [art] SIG.S = 5FE428C225F99013D3DE9E2A8648D7268BA172F9D810A853905317178E1B9FB489DFEEE4448DE0123EE22744E713A6DA
2,999,405 UART: Caliptra RT
2,999,750 UART: [state] CFI Enabled
3,108,243 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,788 UART: [kat] LMS
1,169,100 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,407 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,174,275 ready_for_fw is high
1,174,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,681 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,663 UART: [idev] --
1,208,746 UART: [ldev] ++
1,208,914 UART: [ldev] CDI.KEYID = 6
1,209,278 UART: [ldev] SUBJECT.KEYID = 5
1,209,705 UART: [ldev] AUTHORITY.KEYID = 7
1,210,168 UART: [ldev] FE.KEYID = 1
1,215,160 UART: [ldev] Erasing FE.KEYID = 1
1,242,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,042 UART: [ldev] --
1,281,310 UART: [fwproc] Wait for Commands...
1,281,907 UART: [fwproc] Recv command 0x46574c44
1,282,640 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,343 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,594 >>> mbox cmd response: success
2,774,613 UART: [afmc] ++
2,774,781 UART: [afmc] CDI.KEYID = 6
2,775,144 UART: [afmc] SUBJECT.KEYID = 7
2,775,570 UART: [afmc] AUTHORITY.KEYID = 5
2,811,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,954 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,018 UART: [afmc] --
2,854,910 UART: [cold-reset] --
2,855,866 UART: [state] Locking Datavault
2,857,139 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,743 UART: [state] Locking ICCM
2,858,259 UART: [exit] Launching FMC @ 0x40000130
2,863,588 UART:
2,863,604 UART: Running Caliptra FMC ...
2,864,012 UART:
2,864,066 UART: [state] CFI Enabled
2,874,681 UART: [fht] FMC Alias Private Key: 7
2,982,884 UART: [art] Extend RT PCRs Done
2,983,312 UART: [art] Lock RT PCRs Done
2,984,490 UART: [art] Populate DV Done
2,992,761 UART: [fht] FMC Alias Private Key: 7
2,993,729 UART: [art] Derive CDI
2,994,009 UART: [art] Store in in slot 0x4
3,079,652 UART: [art] Derive Key Pair
3,080,012 UART: [art] Store priv key in slot 0x5
3,093,124 UART: [art] Derive Key Pair - Done
3,107,903 UART: [art] Signing Cert with AUTHO
3,108,383 UART: RITY.KEYID = 7
3,123,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,502 UART: [art] PUB.X = F7C3B76607EBD17FA95327245EEBCAEB9EFF5F61F94B9CBBAEF79A98D1C3D759608915533E0ED458B9581A31EC747E47
3,131,282 UART: [art] PUB.Y = CC416BB2424B0A00EFF3A582E2F9BE98385E6CFF0E155280E0A64697786D12D17B9AEF1E5B70DC3F2B5AEBF9CC318780
3,138,220 UART: [art] SIG.R = 98DC9CA0B5F28F5E10891CC98C362BD49E5F6CFFCA98B6A9837A41CDE0CD2B882F8950E9DFC5EB4EF348EB9260C050F8
3,145,012 UART: [art] SIG.S = 9CA32730279FCCD6A50F0A9BD63F32B46577E621EA26F0C045CF5E77C6469840C484C3DF7451275F2BEBDD0C19B17235
3,169,310 UART: Caliptra RT
3,169,563 UART: [state] CFI Enabled
3,277,633 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,010 ready_for_fw is high
1,057,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,436 >>> mbox cmd response: success
2,687,384 UART:
2,687,400 UART: Running Caliptra FMC ...
2,687,808 UART:
2,687,862 UART: [state] CFI Enabled
2,698,081 UART: [fht] FMC Alias Private Key: 7
2,805,952 UART: [art] Extend RT PCRs Done
2,806,380 UART: [art] Lock RT PCRs Done
2,808,064 UART: [art] Populate DV Done
2,816,219 UART: [fht] FMC Alias Private Key: 7
2,817,279 UART: [art] Derive CDI
2,817,559 UART: [art] Store in in slot 0x4
2,903,400 UART: [art] Derive Key Pair
2,903,760 UART: [art] Store priv key in slot 0x5
2,917,196 UART: [art] Derive Key Pair - Done
2,931,915 UART: [art] Signing Cert with AUTHO
2,932,395 UART: RITY.KEYID = 7
2,947,827 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,592 UART: [art] PUB.X = F1B311AA76B018E9D96B262D906A55101B3786189BAE87D1B299C4C80E44FE6ACE6594AC27A32EB8AAF1896A7BAB8A46
2,955,371 UART: [art] PUB.Y = 903E9880E58E459C2EEE703319DF7922D6AFD8DFBE05C2258ACB4373EF7FCA4FA85C67E4C391A9F065442B3B4036DDC7
2,962,332 UART: [art] SIG.R = 1187A9CC9E106F162B6D769E53FCD805EFD4558E701F3605044566F61CC98DEFD68BFECEE3E3D5ACC7A6D5DE633DF54D
2,969,113 UART: [art] SIG.S = 692D82E65ACE98645AB0736B67742FBFDB6F155C18F87B2196FAEE4CCE2787491FC92649DBEFEA3E2E6D3B4CC59C3A35
2,992,194 UART: Caliptra RT
2,992,447 UART: [state] CFI Enabled
3,100,180 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,552 UART: [kat] ++
895,704 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
916,331 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,348 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,340 UART: [idev] ++
1,173,508 UART: [idev] CDI.KEYID = 6
1,173,869 UART: [idev] SUBJECT.KEYID = 7
1,174,294 UART: [idev] UDS.KEYID = 0
1,174,640 ready_for_fw is high
1,174,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,200,040 UART: [idev] Sha1 KeyId Algorithm
1,209,008 UART: [idev] --
1,210,045 UART: [ldev] ++
1,210,213 UART: [ldev] CDI.KEYID = 6
1,210,577 UART: [ldev] SUBJECT.KEYID = 5
1,211,004 UART: [ldev] AUTHORITY.KEYID = 7
1,211,467 UART: [ldev] FE.KEYID = 1
1,216,995 UART: [ldev] Erasing FE.KEYID = 1
1,243,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,107 UART: [ldev] --
1,282,601 UART: [fwproc] Wait for Commands...
1,283,404 UART: [fwproc] Recv command 0x46574c44
1,284,137 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,343 >>> mbox cmd response: success
2,776,398 UART: [afmc] ++
2,776,566 UART: [afmc] CDI.KEYID = 6
2,776,929 UART: [afmc] SUBJECT.KEYID = 7
2,777,355 UART: [afmc] AUTHORITY.KEYID = 5
2,813,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,123 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,852 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,735 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,454 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,293 UART: [afmc] --
2,856,361 UART: [cold-reset] --
2,857,243 UART: [state] Locking Datavault
2,858,212 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,816 UART: [state] Locking ICCM
2,859,284 UART: [exit] Launching FMC @ 0x40000130
2,864,613 UART:
2,864,629 UART: Running Caliptra FMC ...
2,865,037 UART:
2,865,180 UART: [state] CFI Enabled
2,875,827 UART: [fht] FMC Alias Private Key: 7
2,984,054 UART: [art] Extend RT PCRs Done
2,984,482 UART: [art] Lock RT PCRs Done
2,985,794 UART: [art] Populate DV Done
2,994,055 UART: [fht] FMC Alias Private Key: 7
2,995,061 UART: [art] Derive CDI
2,995,341 UART: [art] Store in in slot 0x4
3,081,094 UART: [art] Derive Key Pair
3,081,454 UART: [art] Store priv key in slot 0x5
3,094,688 UART: [art] Derive Key Pair - Done
3,109,427 UART: [art] Signing Cert with AUTHO
3,109,907 UART: RITY.KEYID = 7
3,124,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,602 UART: [art] PUB.X = 7F80FF2190FC43DF592CEA8D1A301FB9D448D8D24FF7A1DFD96DAF1D4BF29C62E6010682CE4CC205D7BFAF12EC53B676
3,132,387 UART: [art] PUB.Y = 7AEA3384BEF0EC552C567041B205195476245ED7CD36EE9775B878B24A3698D46F7DCED7FF9918AA3BB4FE5B28ED6EFD
3,139,350 UART: [art] SIG.R = CE119B05668BDCC724E136D0F4D59489A9D3A571229C4E77636725CB5A2479FAC9815147F41CB7E0F7EBF3A240A35F6E
3,146,123 UART: [art] SIG.S = 419C59263B818AF48756732DE2B8AC553B0C8DC0F6BF5592A5E25CDAB010FDCA732BB4F6C46174E42537F50A60FA4D51
3,169,642 UART: Caliptra RT
3,169,987 UART: [state] CFI Enabled
3,278,678 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,027 ready_for_fw is high
1,057,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,191 >>> mbox cmd response: success
2,687,249 UART:
2,687,265 UART: Running Caliptra FMC ...
2,687,673 UART:
2,687,816 UART: [state] CFI Enabled
2,698,409 UART: [fht] FMC Alias Private Key: 7
2,806,514 UART: [art] Extend RT PCRs Done
2,806,942 UART: [art] Lock RT PCRs Done
2,808,412 UART: [art] Populate DV Done
2,816,607 UART: [fht] FMC Alias Private Key: 7
2,817,565 UART: [art] Derive CDI
2,817,845 UART: [art] Store in in slot 0x4
2,903,334 UART: [art] Derive Key Pair
2,903,694 UART: [art] Store priv key in slot 0x5
2,916,838 UART: [art] Derive Key Pair - Done
2,931,525 UART: [art] Signing Cert with AUTHO
2,932,005 UART: RITY.KEYID = 7
2,947,357 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,122 UART: [art] PUB.X = 90EEB269F7FA4AC4B43986D0B7F8DCAD2F834DFF0084CA94D200A816FE75B67A13350EAFE8D98213F7FE743D0F2FEB90
2,954,862 UART: [art] PUB.Y = D68ED21CF959AE580459D5E1425671268F0545ED565B75285E0CB0BE7B9C3C8A314175BC2541CB4A41295668EB585AB6
2,961,803 UART: [art] SIG.R = AE75836C6DFCEFF9249AC91E8E159D66E7E852CB550402006F4454BBDBF9DEDB989EF391B6FB008C637E79955AAF8EAA
2,968,543 UART: [art] SIG.S = F45BF1C2F4341823F781E73C70BE3820BAA70A1530F662BBE8F08A8A098CF28E172B30A97688E2A23262CEAC22DBA32B
2,992,412 UART: Caliptra RT
2,992,757 UART: [state] CFI Enabled
3,101,349 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
2,279,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,281,112 UART:
2,281,368 UART: Running Caliptra ROM ...
2,282,453 UART:
2,282,611 UART: [state] CFI Enabled
2,283,503 UART: [state] LifecycleState = Unprovisioned
2,285,171 UART: [state] DebugLocked = No
2,286,260 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,289,567 UART: [kat] SHA2-256
2,290,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,293,263 UART: [kat] ++
2,293,717 UART: [kat] sha1
2,294,234 UART: [kat] SHA2-256
2,294,976 UART: [kat] SHA2-384
2,296,001 UART: [kat] SHA2-512-ACC
2,296,827 UART: [kat] ECC-384
2,767,047 UART: [kat] HMAC-384Kdf
2,798,491 UART: [kat] LMS
3,988,802 UART: [kat] --
3,992,340 UART: [cold-reset] ++
3,993,961 UART: [fht] Storing FHT @ 0x50003400
4,006,430 UART: [idev] ++
4,007,003 UART: [idev] CDI.KEYID = 6
4,007,942 UART: [idev] SUBJECT.KEYID = 7
4,009,166 UART: [idev] UDS.KEYID = 0
4,033,779 UART: [idev] Erasing UDS.KEYID = 0
7,345,073 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,978 UART: [idev] --
7,368,999 UART: [ldev] ++
7,369,625 UART: [ldev] CDI.KEYID = 6
7,370,518 UART: [ldev] SUBJECT.KEYID = 5
7,371,786 UART: [ldev] AUTHORITY.KEYID = 7
7,373,021 UART: [ldev] FE.KEYID = 1
7,421,114 UART: [ldev] Erasing FE.KEYID = 1
10,754,465 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,088 UART: [ldev] --
13,114,478 UART: [fwproc] Waiting for Commands...
13,117,827 UART: [fwproc] Received command 0x4d454153
13,126,721 >>> mbox cmd response data (12 bytes)
13,129,416 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
13,229,925 UART: [fwproc] Received command 0x46574c44
13,232,184 UART: [fwproc] Received Image of size 78740 bytes
16,855,500 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,929,487 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,998,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,191,810 >>> mbox cmd response: success
17,195,587 UART: [afmc] ++
17,196,173 UART: [afmc] CDI.KEYID = 6
17,197,143 UART: [afmc] SUBJECT.KEYID = 7
17,198,358 UART: [afmc] AUTHORITY.KEYID = 5
20,557,163 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,856,904 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,859,169 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,873,604 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,888,440 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,902,874 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,925,926 UART: [afmc] --
22,928,825 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,929,194 UART: [cold-reset] --
22,932,390 UART: [state] Locking Datavault
22,936,547 UART: [state] Locking PCR0, PCR1 and PCR31
22,938,347 UART: [state] Locking ICCM
22,939,749 UART: [exit] Launching FMC @ 0x40000130
22,948,098 UART:
22,948,336 UART: Running Caliptra FMC ...
22,949,442 UART:
22,949,608 UART: [state] CFI Enabled
23,014,706 UART: [fht] FMC Alias Private Key: 7
25,352,675 UART: [art] Extend RT PCRs Done
25,353,902 UART: [art] Lock RT PCRs Done
25,355,637 UART: [art] Populate DV Done
25,361,051 UART: [fht] FMC Alias Private Key: 7
25,362,749 UART: [art] Derive CDI
25,363,561 UART: [art] Store in in slot 0x4
25,422,739 UART: [art] Derive Key Pair
25,423,781 UART: [art] Store priv key in slot 0x5
28,716,709 UART: [art] Derive Key Pair - Done
28,729,749 UART: [art] Signing Cert with AUTHO
28,731,045 UART: RITY.KEYID = 7
31,017,710 UART: [art] Erasing AUTHORITY.KEYID = 7
31,019,224 UART: [art] PUB.X = 5903BB29C6D184B3F3150AE5918514375670AABB90253EAF600E67A0A19D5F9BA616FE13E79CB900B8C8022678BAEEA2
31,026,427 UART: [art] PUB.Y = 5783E55F333036F2E6926192D54584131849FB31819E354372BA564B3CF1CA49DD78584C7AB140ED4824CEB05E028FC2
31,033,714 UART: [art] SIG.R = 97ED0733C8F6BA5DA0EBB4B9754FBF07754D3F2936FC91F0B02F9E078B92F03D10BC830D086F71F6382EF1FE9B19B02B
31,041,127 UART: [art] SIG.S = 125A97B71E2774A9C55C31E33F86514B75569CBBFB66902B75720B62FBE0A4469919BA8BDE0FD490162C25A603F1B408
32,345,650 UART: mbox::rt_entry...
32,346,622 UART: ____ _ _ _ ____ _____
32,348,613 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,350,624 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,352,559 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,354,490 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,356,414 UART: |_|
32,357,425 UART:
32,482,038 UART: [rt] Runtime listening for mailbox commands...
32,484,209 >>> mbox cmd response data (48 bytes)
32,484,777 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,487,112 >>> mbox cmd response data (48 bytes)
32,487,986 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,501,830 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
2,284,547 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,849,924 >>> mbox cmd response data (12 bytes)
12,853,136 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,261,777 >>> mbox cmd response: success
22,931,756 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,948,608 UART:
22,948,947 UART: Running Caliptra FMC ...
22,950,129 UART:
22,950,305 UART: [state] CFI Enabled
23,015,536 UART: [fht] FMC Alias Private Key: 7
25,353,178 UART: [art] Extend RT PCRs Done
25,354,439 UART: [art] Lock RT PCRs Done
25,356,047 UART: [art] Populate DV Done
25,361,519 UART: [fht] FMC Alias Private Key: 7
25,363,061 UART: [art] Derive CDI
25,363,804 UART: [art] Store in in slot 0x4
25,423,796 UART: [art] Derive Key Pair
25,424,844 UART: [art] Store priv key in slot 0x5
28,716,748 UART: [art] Derive Key Pair - Done
28,729,923 UART: [art] Signing Cert with AUTHO
28,731,275 UART: RITY.KEYID = 7
31,018,132 UART: [art] Erasing AUTHORITY.KEYID = 7
31,019,659 UART: [art] PUB.X = 5B1DCB71EE6C057E8A17051C65DA1F6349D842797BFCB43CEDF0D1DB90BF4583BBAC3C985315E0FD318DE8C7891DFCD8
31,026,931 UART: [art] PUB.Y = E5A73B2C1AD38D93ACD611189643B2D64400C4B34E8B99C46C8E1B8D6F2C56BDE10722FCBB5D431EBBB9E6631C2D940B
31,034,197 UART: [art] SIG.R = CDC4C62EC82BDF2C4595DF37F74897AA50507B9DA01C583EDEBD43D3E1269A7773E023B701B3403FC17EF76D4AA04F99
31,041,621 UART: [art] SIG.S = DF1A6CB1664A4254C065960B612A8F229BD7CEBAF5EF08EFFF0F6CB01EFCA7ABC8AE0F0E41A23F0CBE9F7A0140281F71
32,346,555 UART: mbox::rt_entry...
32,347,512 UART: ____ _ _ _ ____ _____
32,349,493 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,351,498 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,353,426 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,355,418 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,357,349 UART: |_|
32,358,185 UART:
32,481,906 UART: [rt] Runtime listening for mailbox commands...
32,484,063 >>> mbox cmd response data (48 bytes)
32,484,681 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,487,016 >>> mbox cmd response data (48 bytes)
32,487,921 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,501,807 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
2,212,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,213,505 UART:
2,213,777 UART: Running Caliptra ROM ...
2,214,847 UART:
2,214,991 UART: [state] CFI Enabled
2,215,880 UART: [state] LifecycleState = Unprovisioned
2,217,534 UART: [state] DebugLocked = No
2,218,652 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,221,950 UART: [kat] SHA2-256
2,222,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,225,617 UART: [kat] ++
2,226,082 UART: [kat] sha1
2,226,596 UART: [kat] SHA2-256
2,227,335 UART: [kat] SHA2-384
2,227,998 UART: [kat] SHA2-512-ACC
2,228,874 UART: [kat] ECC-384
3,115,300 UART: [kat] HMAC-384Kdf
3,127,261 UART: [kat] LMS
4,317,409 UART: [kat] --
4,321,807 UART: [cold-reset] ++
4,323,796 UART: [fht] Storing FHT @ 0x50003400
4,334,613 UART: [idev] ++
4,335,196 UART: [idev] CDI.KEYID = 6
4,336,134 UART: [idev] SUBJECT.KEYID = 7
4,337,400 UART: [idev] UDS.KEYID = 0
4,354,691 UART: [idev] Erasing UDS.KEYID = 0
7,621,811 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,341 UART: [idev] --
7,647,739 UART: [ldev] ++
7,648,307 UART: [ldev] CDI.KEYID = 6
7,649,270 UART: [ldev] SUBJECT.KEYID = 5
7,650,479 UART: [ldev] AUTHORITY.KEYID = 7
7,651,758 UART: [ldev] FE.KEYID = 1
7,663,251 UART: [ldev] Erasing FE.KEYID = 1
10,951,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,568 UART: [ldev] --
13,312,488 UART: [fwproc] Waiting for Commands...
13,315,771 UART: [fwproc] Received command 0x4d454153
13,324,653 >>> mbox cmd response data (12 bytes)
13,327,360 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
13,426,944 UART: [fwproc] Received command 0x46574c44
13,429,202 UART: [fwproc] Received Image of size 78740 bytes
17,055,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,131,153 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,200,019 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,394,195 >>> mbox cmd response: success
17,397,693 UART: [afmc] ++
17,398,289 UART: [afmc] CDI.KEYID = 6
17,399,307 UART: [afmc] SUBJECT.KEYID = 7
17,400,461 UART: [afmc] AUTHORITY.KEYID = 5
20,715,818 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,008,884 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,011,136 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,025,509 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,040,345 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,054,833 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,075,675 UART: [afmc] --
23,079,276 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,079,633 UART: [cold-reset] --
23,083,257 UART: [state] Locking Datavault
23,088,180 UART: [state] Locking PCR0, PCR1 and PCR31
23,089,877 UART: [state] Locking ICCM
23,091,243 UART: [exit] Launching FMC @ 0x40000130
23,099,631 UART:
23,099,860 UART: Running Caliptra FMC ...
23,100,964 UART:
23,101,116 UART: [state] CFI Enabled
23,109,102 UART: [fht] FMC Alias Private Key: 7
25,439,529 UART: [art] Extend RT PCRs Done
25,440,745 UART: [art] Lock RT PCRs Done
25,442,476 UART: [art] Populate DV Done
25,448,016 UART: [fht] FMC Alias Private Key: 7
25,449,658 UART: [art] Derive CDI
25,450,481 UART: [art] Store in in slot 0x4
25,492,534 UART: [art] Derive Key Pair
25,493,526 UART: [art] Store priv key in slot 0x5
28,736,100 UART: [art] Derive Key Pair - Done
28,749,313 UART: [art] Signing Cert with AUTHO
28,750,622 UART: RITY.KEYID = 7
31,030,286 UART: [art] Erasing AUTHORITY.KEYID = 7
31,031,803 UART: [art] PUB.X = 87CE045EEFEABABCF8FFCB50BB2C555799B863EE07A6075698265D3A44A12BEB1E244CBA779BAB3AE307E8D08EE2B58E
31,039,047 UART: [art] PUB.Y = 176D70F41282B2109385DEB60AA849D8C8D23FD3076114CDC2506002BF58A36B14752B57785D9A4121C02284B5C835C7
31,046,257 UART: [art] SIG.R = 7B40195069861F9DFE2077A5B3C997FEE2C7C0F73991892385F78288AB812B12CCEDB8FCC82A37A362F470E8B8EE11EB
31,053,661 UART: [art] SIG.S = A97DFB186D5CCF7A073CEB422CD0EC9A5B155EAC777F6F598B615ECF245233A52792544DD4C7D8F831D55CD2150141D2
32,358,244 UART: mbox::rt_entry...
32,359,193 UART: ____ _ _ _ ____ _____
32,361,169 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,363,190 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,365,110 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,366,956 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,368,867 UART: |_|
32,369,670 UART:
32,495,442 UART: [rt] Runtime listening for mailbox commands...
32,497,557 >>> mbox cmd response data (48 bytes)
32,498,135 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,500,450 >>> mbox cmd response data (48 bytes)
32,501,323 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,515,170 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
2,214,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,050,447 >>> mbox cmd response data (12 bytes)
13,053,612 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,464,672 >>> mbox cmd response: success
23,087,888 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,105,762 UART:
23,106,122 UART: Running Caliptra FMC ...
23,107,240 UART:
23,107,396 UART: [state] CFI Enabled
23,115,465 UART: [fht] FMC Alias Private Key: 7
25,446,362 UART: [art] Extend RT PCRs Done
25,447,589 UART: [art] Lock RT PCRs Done
25,449,116 UART: [art] Populate DV Done
25,454,466 UART: [fht] FMC Alias Private Key: 7
25,456,015 UART: [art] Derive CDI
25,456,775 UART: [art] Store in in slot 0x4
25,499,541 UART: [art] Derive Key Pair
25,500,580 UART: [art] Store priv key in slot 0x5
28,742,410 UART: [art] Derive Key Pair - Done
28,755,589 UART: [art] Signing Cert with AUTHO
28,756,925 UART: RITY.KEYID = 7
31,036,155 UART: [art] Erasing AUTHORITY.KEYID = 7
31,037,663 UART: [art] PUB.X = 836CE608B64C4A57578226D88322A61BF9A8381C17474B464B3F14973354F75AAE52768A281F575F9EFF702704F224FD
31,044,860 UART: [art] PUB.Y = 8858B74085E01A9EB2D090FECC2749CF848AC06A430A530F247BE77AC607717D3837740BB3B0E351AE04E0A798567AF7
31,052,146 UART: [art] SIG.R = 4A18899EB2E42D890B1B870DF748403932BF9F80C6F44908BC4943E8D4F79A799C9D09FEFE74E17CEBB726E3A9EE556F
31,059,528 UART: [art] SIG.S = 325C72079DF63D0459708971918EE7C24BC8B10AD758020F8AB40F7B6960AFB7A433F86C59B4DEE864E5E90D7BD3ADC2
32,364,171 UART: mbox::rt_entry...
32,365,132 UART: ____ _ _ _ ____ _____
32,367,056 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,369,056 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,370,908 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,372,884 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,374,774 UART: |_|
32,375,595 UART:
32,501,093 UART: [rt] Runtime listening for mailbox commands...
32,503,229 >>> mbox cmd response data (48 bytes)
32,503,785 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,506,099 >>> mbox cmd response data (48 bytes)
32,506,973 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,520,829 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,205,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,207,548 UART:
2,207,817 UART: Running Caliptra ROM ...
2,208,886 UART:
2,209,041 UART: [state] CFI Enabled
2,209,933 UART: [state] LifecycleState = Unprovisioned
2,211,600 UART: [state] DebugLocked = No
2,212,718 UART: [state] WD Timer not started. Device not locked for debugging
2,215,193 UART: [kat] SHA2-256
2,215,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,881 UART: [kat] ++
2,219,336 UART: [kat] sha1
2,219,855 UART: [kat] SHA2-256
2,220,594 UART: [kat] SHA2-384
2,221,260 UART: [kat] SHA2-512-ACC
2,222,092 UART: [kat] ECC-384
2,926,865 UART: [kat] HMAC-384Kdf
2,949,011 UART: [kat] LMS
3,478,452 UART: [kat] --
3,482,391 UART: [cold-reset] ++
3,484,158 UART: [fht] FHT @ 0x50003400
3,494,603 UART: [idev] ++
3,495,166 UART: [idev] CDI.KEYID = 6
3,496,075 UART: [idev] SUBJECT.KEYID = 7
3,497,294 UART: [idev] UDS.KEYID = 0
3,521,182 UART: [idev] Erasing UDS.KEYID = 0
6,004,490 UART: [idev] Sha1 KeyId Algorithm
6,028,864 UART: [idev] --
6,033,319 UART: [ldev] ++
6,033,931 UART: [ldev] CDI.KEYID = 6
6,034,848 UART: [ldev] SUBJECT.KEYID = 5
6,035,954 UART: [ldev] AUTHORITY.KEYID = 7
6,037,245 UART: [ldev] FE.KEYID = 1
6,077,621 UART: [ldev] Erasing FE.KEYID = 1
8,580,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,320 UART: [ldev] --
10,391,990 UART: [fwproc] Wait for Commands...
10,394,948 UART: [fwproc] Recv command 0x4d454153
10,403,481 >>> mbox cmd response data (12 bytes)
10,406,136 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
10,505,600 UART: [fwproc] Recv command 0x46574c44
10,507,717 UART: [fwproc] Recv'd Img size: 78704 bytes
13,477,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,554,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,623,396 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,816,213 >>> mbox cmd response: success
13,821,110 UART: [afmc] ++
13,821,692 UART: [afmc] CDI.KEYID = 6
13,822,603 UART: [afmc] SUBJECT.KEYID = 7
13,823,815 UART: [afmc] AUTHORITY.KEYID = 5
16,357,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,082,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,084,791 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,100,578 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,116,603 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,132,432 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,154,261 UART: [afmc] --
18,158,719 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,159,075 UART: [cold-reset] --
18,161,672 UART: [state] Locking Datavault
18,168,157 UART: [state] Locking PCR0, PCR1 and PCR31
18,169,820 UART: [state] Locking ICCM
18,171,083 UART: [exit] Launching FMC @ 0x40000130
18,179,476 UART:
18,179,713 UART: Running Caliptra FMC ...
18,180,810 UART:
18,180,971 UART: [state] CFI Enabled
18,241,583 UART: [fht] FMC Alias Private Key: 7
20,006,279 UART: [art] Extend RT PCRs Done
20,007,504 UART: [art] Lock RT PCRs Done
20,009,240 UART: [art] Populate DV Done
20,014,707 UART: [fht] FMC Alias Private Key: 7
20,016,352 UART: [art] Derive CDI
20,017,168 UART: [art] Store in in slot 0x4
20,074,732 UART: [art] Derive Key Pair
20,075,773 UART: [art] Store priv key in slot 0x5
22,538,973 UART: [art] Derive Key Pair - Done
22,551,939 UART: [art] Signing Cert with AUTHO
22,553,234 UART: RITY.KEYID = 7
24,264,400 UART: [art] Erasing AUTHORITY.KEYID = 7
24,265,909 UART: [art] PUB.X = CF248E1A920CB1CF5C7D585B9DEA273F905844FD6483142692AE7E7CE2BCF5E262B11755A0DFD429BE285937DA606FFF
24,273,196 UART: [art] PUB.Y = 189BDDBDDA3F643B95904BBE33F4D7BC8AA158A5C50E29436D7D6390A5E919198BEBF66BFE93C1D4ED71F780C913310A
24,280,452 UART: [art] SIG.R = 2CCC5883FE0FB6335200D71E76EF01068E4BCE32BC9E9678D447D263A99B866062075F4401DB18695B170B7E3575C989
24,287,796 UART: [art] SIG.S = 2E2C7C821E2A806B6152B7224B81CDDFCD8BE7D4D4CC2EFDF74D3CC160331FCA62C5FA59E4217097567B201393B2CF33
25,266,168 UART: mbox::rt_entry...
25,267,129 UART: ____ _ _ _ ____ _____
25,269,055 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,271,074 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,273,008 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,274,939 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,276,868 UART: |_|
25,277,701 UART:
25,401,805 UART: [rt] Runtime listening for mailbox commands...
25,403,941 >>> mbox cmd response data (48 bytes)
25,404,486 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,406,809 >>> mbox cmd response data (48 bytes)
25,407,694 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,421,595 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
2,206,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,207,754 >>> mbox cmd response data (12 bytes)
10,210,125 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,612,696 >>> mbox cmd response: success
17,877,597 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,891,435 UART:
17,891,765 UART: Running Caliptra FMC ...
17,892,943 UART:
17,893,132 UART: [state] CFI Enabled
17,960,668 UART: [fht] FMC Alias Private Key: 7
19,724,554 UART: [art] Extend RT PCRs Done
19,725,773 UART: [art] Lock RT PCRs Done
19,727,300 UART: [art] Populate DV Done
19,732,760 UART: [fht] FMC Alias Private Key: 7
19,734,473 UART: [art] Derive CDI
19,735,295 UART: [art] Store in in slot 0x4
19,793,359 UART: [art] Derive Key Pair
19,794,401 UART: [art] Store priv key in slot 0x5
22,257,374 UART: [art] Derive Key Pair - Done
22,270,153 UART: [art] Signing Cert with AUTHO
22,271,488 UART: RITY.KEYID = 7
23,982,523 UART: [art] Erasing AUTHORITY.KEYID = 7
23,984,027 UART: [art] PUB.X = F3015950DE4BAC780319579CFF830C99420A7351B51084AF0E74219738165EBE2CD8969CC803F79DA4033FD0FC7F3361
23,991,280 UART: [art] PUB.Y = 29D72BFAB62DC61AAAD5570E380967C1C8287C337FDA81D08EB9F35F9E1151C46207F6C4CB472272A17F3E6BED8BEF60
23,998,534 UART: [art] SIG.R = E111A03FDCC926E8650A298A48ACC32D5ECFB186A8331BE648DD6DA4A4A61BCF93E2CD9174968CC999071BA6E46F2AE3
24,005,984 UART: [art] SIG.S = 10E350DECA1CC2BC61C4C7F905578F866C5045A7894E9C23010556DC90F89E8A98F29D0251541744161711DC496372D9
24,984,040 UART: mbox::rt_entry...
24,985,152 UART: ____ _ _ _ ____ _____
24,987,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,989,168 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,991,096 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,993,089 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,995,024 UART: |_|
24,995,838 UART:
25,120,746 UART: [rt] Runtime listening for mailbox commands...
25,122,906 >>> mbox cmd response data (48 bytes)
25,123,459 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,125,782 >>> mbox cmd response data (48 bytes)
25,126,664 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,140,566 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
2,207,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,208,942 UART:
2,209,209 UART: Running Caliptra ROM ...
2,210,274 UART:
2,210,441 UART: [state] CFI Enabled
2,211,321 UART: [state] LifecycleState = Unprovisioned
2,212,980 UART: [state] DebugLocked = No
2,214,040 UART: [state] WD Timer not started. Device not locked for debugging
2,216,749 UART: [kat] SHA2-256
2,217,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,220,435 UART: [kat] ++
2,220,884 UART: [kat] sha1
2,221,386 UART: [kat] SHA2-256
2,222,120 UART: [kat] SHA2-384
2,222,780 UART: [kat] SHA2-512-ACC
2,223,601 UART: [kat] ECC-384
3,282,121 UART: [kat] HMAC-384Kdf
3,294,129 UART: [kat] LMS
3,823,603 UART: [kat] --
3,827,831 UART: [cold-reset] ++
3,830,383 UART: [fht] FHT @ 0x50003400
3,841,627 UART: [idev] ++
3,842,188 UART: [idev] CDI.KEYID = 6
3,843,091 UART: [idev] SUBJECT.KEYID = 7
3,844,298 UART: [idev] UDS.KEYID = 0
3,859,995 UART: [idev] Erasing UDS.KEYID = 0
6,317,883 UART: [idev] Sha1 KeyId Algorithm
6,340,031 UART: [idev] --
6,344,777 UART: [ldev] ++
6,345,340 UART: [ldev] CDI.KEYID = 6
6,346,239 UART: [ldev] SUBJECT.KEYID = 5
6,347,445 UART: [ldev] AUTHORITY.KEYID = 7
6,348,668 UART: [ldev] FE.KEYID = 1
6,359,675 UART: [ldev] Erasing FE.KEYID = 1
8,829,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,478 UART: [ldev] --
10,617,785 UART: [fwproc] Wait for Commands...
10,619,432 UART: [fwproc] Recv command 0x4d454153
10,627,916 >>> mbox cmd response data (12 bytes)
10,630,673 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
10,731,112 UART: [fwproc] Recv command 0x46574c44
10,733,276 UART: [fwproc] Recv'd Img size: 78704 bytes
13,702,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,773,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,842,303 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
14,035,073 >>> mbox cmd response: success
14,040,241 UART: [afmc] ++
14,040,835 UART: [afmc] CDI.KEYID = 6
14,041,763 UART: [afmc] SUBJECT.KEYID = 7
14,042,925 UART: [afmc] AUTHORITY.KEYID = 5
16,542,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,264,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,266,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,282,008 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,298,052 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,313,928 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,337,683 UART: [afmc] --
18,342,302 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,342,657 UART: [cold-reset] --
18,344,879 UART: [state] Locking Datavault
18,350,227 UART: [state] Locking PCR0, PCR1 and PCR31
18,351,877 UART: [state] Locking ICCM
18,353,512 UART: [exit] Launching FMC @ 0x40000130
18,361,957 UART:
18,362,209 UART: Running Caliptra FMC ...
18,363,308 UART:
18,363,467 UART: [state] CFI Enabled
18,371,887 UART: [fht] FMC Alias Private Key: 7
20,129,116 UART: [art] Extend RT PCRs Done
20,130,319 UART: [art] Lock RT PCRs Done
20,131,825 UART: [art] Populate DV Done
20,137,013 UART: [fht] FMC Alias Private Key: 7
20,138,481 UART: [art] Derive CDI
20,139,247 UART: [art] Store in in slot 0x4
20,181,779 UART: [art] Derive Key Pair
20,182,775 UART: [art] Store priv key in slot 0x5
22,609,893 UART: [art] Derive Key Pair - Done
22,623,212 UART: [art] Signing Cert with AUTHO
22,624,544 UART: RITY.KEYID = 7
24,330,111 UART: [art] Erasing AUTHORITY.KEYID = 7
24,331,613 UART: [art] PUB.X = D5FADAFE06DE023E6FF2109B15A6FD509E79EC7CCB5D823A38EF317DFA9F63E9879A7A12037FD8CC26904F0FA4270CEA
24,338,907 UART: [art] PUB.Y = 8A4434DBC7665A0911B064CD9547BA94F19310E701B49F1EA581D4396661CE69C69324D053AF044D7D1EE063E8B8FA57
24,346,182 UART: [art] SIG.R = 014759726D771E8817BEF09352E6614288068B08C493F043A71243AF62C66F284BE8FDA7C035CA9398A53974FDF3789C
24,353,522 UART: [art] SIG.S = F554B7BC954CFCE69213868F7929CE9CCE966201061D1B0D16FEF007DAC2AB715EBDB09B235A3C2B386EEADEC4FD8CF2
25,331,980 UART: mbox::rt_entry...
25,332,947 UART: ____ _ _ _ ____ _____
25,334,876 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,337,082 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,339,145 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,341,070 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,342,926 UART: |_|
25,343,744 UART:
25,468,212 UART: [rt] Runtime listening for mailbox commands...
25,470,379 >>> mbox cmd response data (48 bytes)
25,470,998 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,473,329 >>> mbox cmd response data (48 bytes)
25,474,243 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,488,138 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,206,965 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,401,255 >>> mbox cmd response data (12 bytes)
10,403,460 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,812,870 >>> mbox cmd response: success
18,048,960 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,061,828 UART:
18,062,153 UART: Running Caliptra FMC ...
18,063,317 UART:
18,063,483 UART: [state] CFI Enabled
18,071,552 UART: [fht] FMC Alias Private Key: 7
19,828,051 UART: [art] Extend RT PCRs Done
19,829,306 UART: [art] Lock RT PCRs Done
19,830,824 UART: [art] Populate DV Done
19,836,416 UART: [fht] FMC Alias Private Key: 7
19,838,014 UART: [art] Derive CDI
19,838,827 UART: [art] Store in in slot 0x4
19,881,485 UART: [art] Derive Key Pair
19,882,531 UART: [art] Store priv key in slot 0x5
22,308,695 UART: [art] Derive Key Pair - Done
22,321,373 UART: [art] Signing Cert with AUTHO
22,322,674 UART: RITY.KEYID = 7
24,028,046 UART: [art] Erasing AUTHORITY.KEYID = 7
24,029,561 UART: [art] PUB.X = 280651767203E20B96CBFEA8A1C285A52C8F7FC5DAE9FF690DB067A6F113B177412898EF0D00585519392308F6779CEC
24,036,780 UART: [art] PUB.Y = 57B31EB08A050F1700232E25AE05FDA92CDF7AE86AD968BF69F698D208DB45206B79DF8F24554DEDAD1E40FFAD1C2F58
24,044,035 UART: [art] SIG.R = AD891FC75F56EA8D7371B14D27C7757529DB44CCC7B4532FB9C4FDF954AC61595BCF892339B8400E9BA35AFDA0F6C4E4
24,051,440 UART: [art] SIG.S = 7CEABDA9E530AA16BE54F680973046710A883A57542AC614206ABA62157AB069FB5CDE741A47DB4135B1C802A7A01480
25,030,268 UART: mbox::rt_entry...
25,031,264 UART: ____ _ _ _ ____ _____
25,033,252 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,035,253 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,037,178 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,039,164 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,041,092 UART: |_|
25,041,925 UART:
25,165,816 UART: [rt] Runtime listening for mailbox commands...
25,167,931 >>> mbox cmd response data (48 bytes)
25,168,500 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,170,849 >>> mbox cmd response data (48 bytes)
25,171,728 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,185,655 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
2,215,741 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,249,713 >>> mbox cmd response data (12 bytes)
10,253,054 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,087,860 >>> mbox cmd response: success
18,388,631 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,403,373 UART:
18,403,700 UART: Running Caliptra FMC ...
18,404,783 UART:
18,404,933 UART: [state] CFI Enabled
18,475,113 UART: [fht] FMC Alias Private Key: 7
20,238,648 UART: [art] Extend RT PCRs Done
20,239,869 UART: [art] Lock RT PCRs Done
20,241,467 UART: [art] Populate DV Done
20,247,035 UART: [fht] FMC Alias Private Key: 7
20,248,685 UART: [art] Derive CDI
20,249,422 UART: [art] Store in in slot 0x4
20,308,128 UART: [art] Derive Key Pair
20,309,169 UART: [art] Store priv key in slot 0x5
22,772,157 UART: [art] Derive Key Pair - Done
22,785,039 UART: [art] Signing Cert with AUTHO
22,786,346 UART: RITY.KEYID = 7
24,497,830 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,330 UART: [art] PUB.X = E71D1F34BBDB0891A37367C4E024DA00898A613B6D84A53543F1123BEC234C148E8E94028B4E813CDF80CB5A1DA67372
24,506,567 UART: [art] PUB.Y = 9C803630D267042160BEB0C13C5D08F487F226384EAD4F455BE283562911F6604373860A2F71D0D433F7E6C2B502DC3A
24,513,788 UART: [art] SIG.R = 5F4D18ECD1C0FE65629F584276FAC4B544A4BE25560CA7E6F348856BF4D052B1273922968A970C89B3C25D7CFE50450D
24,521,179 UART: [art] SIG.S = 756B73079BCD3C0AB918D7C3B3BFCEB1BD6FFE5236F4902C44F0FD1446B366F6676FFD898BD47D81319E043575EFF898
25,499,575 UART: mbox::rt_entry...
25,500,527 UART: ____ _ _ _ ____ _____
25,502,505 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,504,510 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,506,436 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,508,422 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,510,371 UART: |_|
25,511,207 UART:
25,636,251 UART: [rt] Runtime listening for mailbox commands...
25,638,369 >>> mbox cmd response data (48 bytes)
25,638,912 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,641,266 >>> mbox cmd response data (48 bytes)
25,642,140 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,656,069 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,212,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,460,959 >>> mbox cmd response data (12 bytes)
10,464,143 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,293,067 >>> mbox cmd response: success
18,531,610 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,546,744 UART:
18,547,067 UART: Running Caliptra FMC ...
18,548,236 UART:
18,548,395 UART: [state] CFI Enabled
18,556,405 UART: [fht] FMC Alias Private Key: 7
20,312,974 UART: [art] Extend RT PCRs Done
20,314,196 UART: [art] Lock RT PCRs Done
20,316,034 UART: [art] Populate DV Done
20,321,674 UART: [fht] FMC Alias Private Key: 7
20,323,210 UART: [art] Derive CDI
20,324,020 UART: [art] Store in in slot 0x4
20,366,509 UART: [art] Derive Key Pair
20,367,548 UART: [art] Store priv key in slot 0x5
22,794,659 UART: [art] Derive Key Pair - Done
22,807,506 UART: [art] Signing Cert with AUTHO
22,808,812 UART: RITY.KEYID = 7
24,514,688 UART: [art] Erasing AUTHORITY.KEYID = 7
24,516,187 UART: [art] PUB.X = 840FC1683789E5DAC3D4417C25595E7B5A7F28E9E039C80EC1211382B42A3DBFB2214565CA53C4BEA0FBDA5C45DCE6DC
24,523,431 UART: [art] PUB.Y = 4194B88F41BC9F8BE2E328EA36F5E8E1B094F9DAEC395DEB8D2F06F64E2E8A7CAB7905A5DCA0B8508EC8D7CE743696F4
24,530,721 UART: [art] SIG.R = C5132B9C70166DA5D584529862C36F19741ECAD180A2C9A2841ED891B312040B46E64A33F2910BE501102D3658DF1179
24,538,109 UART: [art] SIG.S = 422E3E514B72DF33B758B3CFE5D70E41B40F203CBA4B2D7980758FA30A439223F9401ECF28EA613FC0D5E28662D53017
25,516,900 UART: mbox::rt_entry...
25,517,855 UART: ____ _ _ _ ____ _____
25,519,832 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,521,834 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,523,760 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,525,747 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,527,593 UART: |_|
25,528,443 UART:
25,653,097 UART: [rt] Runtime listening for mailbox commands...
25,655,273 >>> mbox cmd response data (48 bytes)
25,655,810 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,658,156 >>> mbox cmd response data (48 bytes)
25,659,029 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,672,958 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,263 UART: [kat] SHA2-256
882,194 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,309 UART: [kat] ++
886,461 UART: [kat] sha1
890,713 UART: [kat] SHA2-256
892,651 UART: [kat] SHA2-384
895,246 UART: [kat] SHA2-512-ACC
897,147 UART: [kat] ECC-384
902,922 UART: [kat] HMAC-384Kdf
907,538 UART: [kat] LMS
1,475,734 UART: [kat] --
1,476,655 UART: [cold-reset] ++
1,477,207 UART: [fht] Storing FHT @ 0x50003400
1,479,942 UART: [idev] ++
1,480,110 UART: [idev] CDI.KEYID = 6
1,480,470 UART: [idev] SUBJECT.KEYID = 7
1,480,894 UART: [idev] UDS.KEYID = 0
1,488,756 UART: [idev] Erasing UDS.KEYID = 0
1,505,290 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,748 UART: [idev] --
1,515,029 UART: [ldev] ++
1,515,197 UART: [ldev] CDI.KEYID = 6
1,515,560 UART: [ldev] SUBJECT.KEYID = 5
1,515,986 UART: [ldev] AUTHORITY.KEYID = 7
1,516,449 UART: [ldev] FE.KEYID = 1
1,521,627 UART: [ldev] Erasing FE.KEYID = 1
1,547,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,930 UART: [ldev] --
1,586,235 UART: [fwproc] Waiting for Commands...
1,586,884 UART: [fwproc] Received command 0x4d454153
1,590,948 >>> mbox cmd response data (12 bytes)
1,590,949 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,591,129 UART: [fwproc] Received command 0x46574c44
1,591,920 UART: [fwproc] Received Image of size 78704 bytes
2,481,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,509,626 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,538,978 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,621,345 >>> mbox cmd response: success
2,622,447 UART: [afmc] ++
2,622,615 UART: [afmc] CDI.KEYID = 6
2,622,977 UART: [afmc] SUBJECT.KEYID = 7
2,623,402 UART: [afmc] AUTHORITY.KEYID = 5
2,658,627 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,674,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,675,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,680,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,686,858 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,692,548 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,700,471 UART: [afmc] --
2,701,351 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,701,373 UART: [cold-reset] --
2,702,281 UART: [state] Locking Datavault
2,703,518 UART: [state] Locking PCR0, PCR1 and PCR31
2,704,122 UART: [state] Locking ICCM
2,704,714 UART: [exit] Launching FMC @ 0x40000130
2,710,043 UART:
2,710,059 UART: Running Caliptra FMC ...
2,710,467 UART:
2,710,521 UART: [state] CFI Enabled
2,720,718 UART: [fht] FMC Alias Private Key: 7
2,828,279 UART: [art] Extend RT PCRs Done
2,828,707 UART: [art] Lock RT PCRs Done
2,830,595 UART: [art] Populate DV Done
2,838,838 UART: [fht] FMC Alias Private Key: 7
2,839,826 UART: [art] Derive CDI
2,840,106 UART: [art] Store in in slot 0x4
2,925,777 UART: [art] Derive Key Pair
2,926,137 UART: [art] Store priv key in slot 0x5
2,939,499 UART: [art] Derive Key Pair - Done
2,954,163 UART: [art] Signing Cert with AUTHO
2,954,643 UART: RITY.KEYID = 7
2,969,503 UART: [art] Erasing AUTHORITY.KEYID = 7
2,970,268 UART: [art] PUB.X = 939AFD2520599D74150E30A8BCE9EAFB5D3EFEDC636D09520B7C620518071826EAA8A4861EE771FBAD27B4B6EB445159
2,977,033 UART: [art] PUB.Y = D349E276802BECC1C6A6B82F215C99CC61244DB67C87E9927F76152119000410308B3109D590FA5A8F641CD91E3C8B47
2,983,951 UART: [art] SIG.R = 015CABB254289EB7EDE01990F951BE7777FC99C57FF9CCCB1EF7369ADCAF1F52A06F47D52B960CE6EC73346264C6B08B
2,990,733 UART: [art] SIG.S = 6063DA944561779CDBDC6D092F3A4F5646A577BAF649ED4EE7AA92EF390E6F7E1897EFDA7E55C6F1EA5313CA58B12D6F
3,014,944 UART: mbox::rt_entry...
3,015,316 UART: ____ _ _ _ ____ _____
3,016,100 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,900 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,017,668 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,018,436 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,019,204 UART: |_|
3,019,516 UART:
3,138,428 UART: [rt] Runtime listening for mailbox commands...
3,139,609 >>> mbox cmd response data (48 bytes)
3,139,610 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,142,393 >>> mbox cmd response data (48 bytes)
3,142,394 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,157,531 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,121 >>> mbox cmd response data (12 bytes)
1,445,122 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,471,015 >>> mbox cmd response: success
2,526,508 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,532,973 UART:
2,532,989 UART: Running Caliptra FMC ...
2,533,397 UART:
2,533,451 UART: [state] CFI Enabled
2,543,458 UART: [fht] FMC Alias Private Key: 7
2,651,127 UART: [art] Extend RT PCRs Done
2,651,555 UART: [art] Lock RT PCRs Done
2,653,213 UART: [art] Populate DV Done
2,661,470 UART: [fht] FMC Alias Private Key: 7
2,662,452 UART: [art] Derive CDI
2,662,732 UART: [art] Store in in slot 0x4
2,748,707 UART: [art] Derive Key Pair
2,749,067 UART: [art] Store priv key in slot 0x5
2,762,343 UART: [art] Derive Key Pair - Done
2,777,045 UART: [art] Signing Cert with AUTHO
2,777,525 UART: RITY.KEYID = 7
2,792,579 UART: [art] Erasing AUTHORITY.KEYID = 7
2,793,344 UART: [art] PUB.X = 7D6C22F5FAD9EC7AAADD9D639F1ED0717D8C1555720BC1E6457047AA5A2AF926FD257323F3C42EED8F8B29D116945792
2,800,123 UART: [art] PUB.Y = F4F9751E96496D76D726B2C93DE19C567890B95BB81F6D7798402097C46990F87FD207F9E6EFE9F5CE88EB84CD40C2DE
2,807,076 UART: [art] SIG.R = E8488764B539477897255C63124C74C927FFAFEB197E6E1D56140951527066939E949133C51876E73952AFEFE60D8052
2,813,824 UART: [art] SIG.S = 6CBD55F14C6603A600A67DD9BC74065FF929063E2187817FF5BC586C40FA649E1172F00F0567CD83613F2EAE563DACA4
2,837,092 UART: mbox::rt_entry...
2,837,464 UART: ____ _ _ _ ____ _____
2,838,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,839,048 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,816 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,840,584 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,841,352 UART: |_|
2,841,664 UART:
2,960,679 UART: [rt] Runtime listening for mailbox commands...
2,961,860 >>> mbox cmd response data (48 bytes)
2,961,861 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,964,644 >>> mbox cmd response data (48 bytes)
2,964,645 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,979,782 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,380 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,878 UART: [kat] SHA2-256
881,809 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,924 UART: [kat] ++
886,076 UART: [kat] sha1
890,354 UART: [kat] SHA2-256
892,292 UART: [kat] SHA2-384
895,101 UART: [kat] SHA2-512-ACC
897,002 UART: [kat] ECC-384
902,601 UART: [kat] HMAC-384Kdf
907,255 UART: [kat] LMS
1,475,451 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,798 UART: [fht] Storing FHT @ 0x50003400
1,479,639 UART: [idev] ++
1,479,807 UART: [idev] CDI.KEYID = 6
1,480,167 UART: [idev] SUBJECT.KEYID = 7
1,480,591 UART: [idev] UDS.KEYID = 0
1,488,925 UART: [idev] Erasing UDS.KEYID = 0
1,505,841 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,583 UART: [idev] --
1,515,552 UART: [ldev] ++
1,515,720 UART: [ldev] CDI.KEYID = 6
1,516,083 UART: [ldev] SUBJECT.KEYID = 5
1,516,509 UART: [ldev] AUTHORITY.KEYID = 7
1,516,972 UART: [ldev] FE.KEYID = 1
1,522,066 UART: [ldev] Erasing FE.KEYID = 1
1,546,969 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,797 UART: [ldev] --
1,586,058 UART: [fwproc] Waiting for Commands...
1,586,835 UART: [fwproc] Received command 0x4d454153
1,590,899 >>> mbox cmd response data (12 bytes)
1,590,900 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,591,032 UART: [fwproc] Received command 0x46574c44
1,591,823 UART: [fwproc] Received Image of size 78704 bytes
2,482,457 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,510,615 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,539,967 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,622,280 >>> mbox cmd response: success
2,623,426 UART: [afmc] ++
2,623,594 UART: [afmc] CDI.KEYID = 6
2,623,956 UART: [afmc] SUBJECT.KEYID = 7
2,624,381 UART: [afmc] AUTHORITY.KEYID = 5
2,659,206 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,675,314 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,676,094 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,681,822 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,687,707 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,693,397 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,701,420 UART: [afmc] --
2,702,400 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,702,422 UART: [cold-reset] --
2,703,144 UART: [state] Locking Datavault
2,704,153 UART: [state] Locking PCR0, PCR1 and PCR31
2,704,757 UART: [state] Locking ICCM
2,705,273 UART: [exit] Launching FMC @ 0x40000130
2,710,602 UART:
2,710,618 UART: Running Caliptra FMC ...
2,711,026 UART:
2,711,169 UART: [state] CFI Enabled
2,721,876 UART: [fht] FMC Alias Private Key: 7
2,830,257 UART: [art] Extend RT PCRs Done
2,830,685 UART: [art] Lock RT PCRs Done
2,832,451 UART: [art] Populate DV Done
2,840,554 UART: [fht] FMC Alias Private Key: 7
2,841,692 UART: [art] Derive CDI
2,841,972 UART: [art] Store in in slot 0x4
2,927,327 UART: [art] Derive Key Pair
2,927,687 UART: [art] Store priv key in slot 0x5
2,940,621 UART: [art] Derive Key Pair - Done
2,955,550 UART: [art] Signing Cert with AUTHO
2,956,030 UART: RITY.KEYID = 7
2,971,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,972,283 UART: [art] PUB.X = 5B60598EB9072FDE2FC4F077B39820575B4172CFF943B4BF6C911E92D02D8D4D02FCBB84BA8F36D16D9A5D24A5F2B74D
2,979,061 UART: [art] PUB.Y = 734FF6D5BF9B29DF891D18DE634D2F439A54DA5093CCE4AF15FAD2F1DB970971343F4A02C0BD820870EA5C1478D6B538
2,986,014 UART: [art] SIG.R = 44290CDD96AB8AE599C1A95604337F433B5CB97E4041E5BAAD5303D54734585CB26CC8658F71880422CF7983EABA7ED1
2,992,776 UART: [art] SIG.S = FCC502DB5557456BFF3FA476B4B389F44A2D2D4DB0D08F4E6A2D9899EF2953553ED731C8D73BE7AB818C3FC02BC4F063
3,016,516 UART: mbox::rt_entry...
3,016,888 UART: ____ _ _ _ ____ _____
3,017,672 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,018,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,019,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,020,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,020,776 UART: |_|
3,021,088 UART:
3,139,971 UART: [rt] Runtime listening for mailbox commands...
3,141,152 >>> mbox cmd response data (48 bytes)
3,141,153 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,143,936 >>> mbox cmd response data (48 bytes)
3,143,937 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,159,074 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,904 >>> mbox cmd response data (12 bytes)
1,445,905 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,473,138 >>> mbox cmd response: success
2,528,795 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,534,812 UART:
2,534,828 UART: Running Caliptra FMC ...
2,535,236 UART:
2,535,379 UART: [state] CFI Enabled
2,546,062 UART: [fht] FMC Alias Private Key: 7
2,654,369 UART: [art] Extend RT PCRs Done
2,654,797 UART: [art] Lock RT PCRs Done
2,656,491 UART: [art] Populate DV Done
2,664,690 UART: [fht] FMC Alias Private Key: 7
2,665,732 UART: [art] Derive CDI
2,666,012 UART: [art] Store in in slot 0x4
2,751,927 UART: [art] Derive Key Pair
2,752,287 UART: [art] Store priv key in slot 0x5
2,765,467 UART: [art] Derive Key Pair - Done
2,779,928 UART: [art] Signing Cert with AUTHO
2,780,408 UART: RITY.KEYID = 7
2,796,004 UART: [art] Erasing AUTHORITY.KEYID = 7
2,796,769 UART: [art] PUB.X = D32D09C533B85FEE1D7FE438A2328999C7EF8843793A1A05D500393D059B83F5F7366F1CC18E9290C589BBA008D38A7D
2,803,507 UART: [art] PUB.Y = 93096C75D6E4D24ED2F4928132F3E2B1F84094EF39BAEAD34B94EB5892F2CCF099EC9CF3FC1686D35F58B110E94CB793
2,810,466 UART: [art] SIG.R = 0755463F88ACE4A037698AB4A409875DE396EAD40B35629C997AC3A362B226CF56DF804BF60299D2C0DB403A8F8863CB
2,817,228 UART: [art] SIG.S = 595674701332813CCFE102D8C1FBE65C107D4F11B675B97B17C1CA267AE5D17FDC6BD3BF860184BB5F2C946B475B4EA7
2,840,489 UART: mbox::rt_entry...
2,840,861 UART: ____ _ _ _ ____ _____
2,841,645 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,842,445 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,843,213 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,843,981 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,844,749 UART: |_|
2,845,061 UART:
2,963,921 UART: [rt] Runtime listening for mailbox commands...
2,965,102 >>> mbox cmd response data (48 bytes)
2,965,103 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,967,886 >>> mbox cmd response data (48 bytes)
2,967,887 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,983,024 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
893,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,623 UART: [kat] ++
897,775 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,208 UART: [kat] HMAC-384Kdf
922,896 UART: [kat] LMS
1,171,224 UART: [kat] --
1,171,979 UART: [cold-reset] ++
1,172,315 UART: [fht] FHT @ 0x50003400
1,174,988 UART: [idev] ++
1,175,156 UART: [idev] CDI.KEYID = 6
1,175,516 UART: [idev] SUBJECT.KEYID = 7
1,175,940 UART: [idev] UDS.KEYID = 0
1,183,870 UART: [idev] Erasing UDS.KEYID = 0
1,201,365 UART: [idev] Sha1 KeyId Algorithm
1,209,931 UART: [idev] --
1,210,865 UART: [ldev] ++
1,211,033 UART: [ldev] CDI.KEYID = 6
1,211,396 UART: [ldev] SUBJECT.KEYID = 5
1,211,822 UART: [ldev] AUTHORITY.KEYID = 7
1,212,285 UART: [ldev] FE.KEYID = 1
1,217,477 UART: [ldev] Erasing FE.KEYID = 1
1,243,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,867 UART: [ldev] --
1,283,338 UART: [fwproc] Wait for Commands...
1,284,016 UART: [fwproc] Recv command 0x4d454153
1,288,025 >>> mbox cmd response data (12 bytes)
1,288,026 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,288,109 UART: [fwproc] Recv command 0x46574c44
1,288,837 UART: [fwproc] Recv'd Img size: 78704 bytes
2,178,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,205,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,235,225 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,317,558 >>> mbox cmd response: success
2,318,640 UART: [afmc] ++
2,318,808 UART: [afmc] CDI.KEYID = 6
2,319,170 UART: [afmc] SUBJECT.KEYID = 7
2,319,595 UART: [afmc] AUTHORITY.KEYID = 5
2,355,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,371,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,372,383 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,378,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,383,996 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,389,715 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,397,681 UART: [afmc] --
2,398,621 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,398,643 UART: [cold-reset] --
2,399,675 UART: [state] Locking Datavault
2,401,002 UART: [state] Locking PCR0, PCR1 and PCR31
2,401,606 UART: [state] Locking ICCM
2,402,268 UART: [exit] Launching FMC @ 0x40000130
2,407,597 UART:
2,407,613 UART: Running Caliptra FMC ...
2,408,021 UART:
2,408,075 UART: [state] CFI Enabled
2,418,642 UART: [fht] FMC Alias Private Key: 7
2,526,995 UART: [art] Extend RT PCRs Done
2,527,423 UART: [art] Lock RT PCRs Done
2,529,029 UART: [art] Populate DV Done
2,537,008 UART: [fht] FMC Alias Private Key: 7
2,537,938 UART: [art] Derive CDI
2,538,218 UART: [art] Store in in slot 0x4
2,623,943 UART: [art] Derive Key Pair
2,624,303 UART: [art] Store priv key in slot 0x5
2,638,019 UART: [art] Derive Key Pair - Done
2,652,913 UART: [art] Signing Cert with AUTHO
2,653,393 UART: RITY.KEYID = 7
2,668,493 UART: [art] Erasing AUTHORITY.KEYID = 7
2,669,258 UART: [art] PUB.X = 51B0466A0F6CAD67EBA87378D8F6F08B5E7810AC18E7ABE1A30CAB3C40EC31B0F1806754E6FDABB822ABDB985AF65FAC
2,676,048 UART: [art] PUB.Y = 1DF95B9E4C5A67E9577C67153668DF2B6F8806273F4CF32575C397FF75F1FF902540A8F0960428703A49CE5E7DE7F028
2,682,990 UART: [art] SIG.R = 3F1DF58D1953DFA1BFF164AE25707B770A872B9949CF662D2007FA9A1431A214B3098FD78624B9AD88FD12F5E775F51B
2,689,757 UART: [art] SIG.S = 5F4288ED2E96E9FC13B765236A6E0F44E0E3815473BA97B462C5E0268C3E68C8771D18F0B2B6766324700D81B8A6BE1F
2,713,926 UART: mbox::rt_entry...
2,714,298 UART: ____ _ _ _ ____ _____
2,715,082 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,715,882 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,716,650 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,717,418 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,718,186 UART: |_|
2,718,498 UART:
2,837,103 UART: [rt] Runtime listening for mailbox commands...
2,838,284 >>> mbox cmd response data (48 bytes)
2,838,285 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,841,068 >>> mbox cmd response data (48 bytes)
2,841,069 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,856,206 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,745 >>> mbox cmd response data (12 bytes)
1,142,746 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,167,979 >>> mbox cmd response: success
2,224,452 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,230,473 UART:
2,230,489 UART: Running Caliptra FMC ...
2,230,897 UART:
2,230,951 UART: [state] CFI Enabled
2,241,452 UART: [fht] FMC Alias Private Key: 7
2,349,933 UART: [art] Extend RT PCRs Done
2,350,361 UART: [art] Lock RT PCRs Done
2,351,887 UART: [art] Populate DV Done
2,360,118 UART: [fht] FMC Alias Private Key: 7
2,361,268 UART: [art] Derive CDI
2,361,548 UART: [art] Store in in slot 0x4
2,446,893 UART: [art] Derive Key Pair
2,447,253 UART: [art] Store priv key in slot 0x5
2,460,665 UART: [art] Derive Key Pair - Done
2,475,515 UART: [art] Signing Cert with AUTHO
2,475,995 UART: RITY.KEYID = 7
2,490,969 UART: [art] Erasing AUTHORITY.KEYID = 7
2,491,734 UART: [art] PUB.X = E8C8D99AF96BA27B0ECD6BDC7F6F662FF5326C047A9C4DA725262A10E45CA3884358D0D74BA9B4084C21C0452EFD25C7
2,498,509 UART: [art] PUB.Y = 1149FDB31D059D1668C8C644E583BFBE8929338E546415B812DAF6B87DAE264E9F440663BAABD68700C4FEF97BB7521B
2,505,439 UART: [art] SIG.R = 0A2346365B4F68B82D2AD0781F1E1801505362FBE6C89FF755BF03585A92C62E69833D24ACCD5333BDE0ABD27D5222C3
2,512,204 UART: [art] SIG.S = 3E4CE72729617EBF5E00E5AB8EAB4296124B517AD4A2A8AAF3D6FF3EBF391F2ADBCAD0B58977BB721C84F9D99942ABFF
2,536,053 UART: mbox::rt_entry...
2,536,425 UART: ____ _ _ _ ____ _____
2,537,209 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,538,009 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,538,777 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,539,545 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,540,313 UART: |_|
2,540,625 UART:
2,659,096 UART: [rt] Runtime listening for mailbox commands...
2,660,277 >>> mbox cmd response data (48 bytes)
2,660,278 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,663,061 >>> mbox cmd response data (48 bytes)
2,663,062 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,678,199 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
893,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,930 UART: [kat] ++
898,082 UART: [kat] sha1
902,394 UART: [kat] SHA2-256
904,334 UART: [kat] SHA2-384
907,155 UART: [kat] SHA2-512-ACC
909,056 UART: [kat] ECC-384
919,143 UART: [kat] HMAC-384Kdf
923,869 UART: [kat] LMS
1,172,197 UART: [kat] --
1,173,174 UART: [cold-reset] ++
1,173,574 UART: [fht] FHT @ 0x50003400
1,175,989 UART: [idev] ++
1,176,157 UART: [idev] CDI.KEYID = 6
1,176,517 UART: [idev] SUBJECT.KEYID = 7
1,176,941 UART: [idev] UDS.KEYID = 0
1,185,071 UART: [idev] Erasing UDS.KEYID = 0
1,202,616 UART: [idev] Sha1 KeyId Algorithm
1,211,072 UART: [idev] --
1,212,236 UART: [ldev] ++
1,212,404 UART: [ldev] CDI.KEYID = 6
1,212,767 UART: [ldev] SUBJECT.KEYID = 5
1,213,193 UART: [ldev] AUTHORITY.KEYID = 7
1,213,656 UART: [ldev] FE.KEYID = 1
1,218,692 UART: [ldev] Erasing FE.KEYID = 1
1,244,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,968 UART: [ldev] --
1,284,277 UART: [fwproc] Wait for Commands...
1,285,039 UART: [fwproc] Recv command 0x4d454153
1,289,048 >>> mbox cmd response data (12 bytes)
1,289,049 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,289,172 UART: [fwproc] Recv command 0x46574c44
1,289,900 UART: [fwproc] Recv'd Img size: 78704 bytes
2,178,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,205,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,234,538 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,316,847 >>> mbox cmd response: success
2,317,951 UART: [afmc] ++
2,318,119 UART: [afmc] CDI.KEYID = 6
2,318,481 UART: [afmc] SUBJECT.KEYID = 7
2,318,906 UART: [afmc] AUTHORITY.KEYID = 5
2,354,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,370,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,371,364 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,377,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,382,977 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,388,696 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,396,656 UART: [afmc] --
2,397,542 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,397,564 UART: [cold-reset] --
2,398,406 UART: [state] Locking Datavault
2,399,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,400,097 UART: [state] Locking ICCM
2,400,587 UART: [exit] Launching FMC @ 0x40000130
2,405,916 UART:
2,405,932 UART: Running Caliptra FMC ...
2,406,340 UART:
2,406,483 UART: [state] CFI Enabled
2,417,122 UART: [fht] FMC Alias Private Key: 7
2,525,735 UART: [art] Extend RT PCRs Done
2,526,163 UART: [art] Lock RT PCRs Done
2,527,757 UART: [art] Populate DV Done
2,535,834 UART: [fht] FMC Alias Private Key: 7
2,536,858 UART: [art] Derive CDI
2,537,138 UART: [art] Store in in slot 0x4
2,623,029 UART: [art] Derive Key Pair
2,623,389 UART: [art] Store priv key in slot 0x5
2,636,157 UART: [art] Derive Key Pair - Done
2,650,765 UART: [art] Signing Cert with AUTHO
2,651,245 UART: RITY.KEYID = 7
2,666,481 UART: [art] Erasing AUTHORITY.KEYID = 7
2,667,246 UART: [art] PUB.X = 0BD95501896D2F0BDF2283123976461249B68E1C857EAB7C4A7057884825AE3A5E1FC5D87AC8CC60DC8CDFB2758B6193
2,674,011 UART: [art] PUB.Y = 19B8561E3C72AC13A73942C58DD9C0B8AC5874EBBF20A6BADEE625E56BC2208DED43F4BF80EDA30CD2AFB741BE3B5F7C
2,680,986 UART: [art] SIG.R = FEE47E1AFFF10B87DA04DF73CF3EDB4C3F5CFA776B45E14AEB5E95716BBAFD3BB0117CBC4BAB4E9ED8FE838FEC3338D3
2,687,790 UART: [art] SIG.S = EE51F46F69E7CF2F41B332BD0E9737300661F850E7BC7A07CB22FA55BA1EB7C79777B691C431578CC22F772496FA6790
2,711,754 UART: mbox::rt_entry...
2,712,126 UART: ____ _ _ _ ____ _____
2,712,910 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,713,710 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,714,478 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,715,246 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,716,014 UART: |_|
2,716,326 UART:
2,834,314 UART: [rt] Runtime listening for mailbox commands...
2,835,495 >>> mbox cmd response data (48 bytes)
2,835,496 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,838,279 >>> mbox cmd response data (48 bytes)
2,838,280 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,853,417 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,320 >>> mbox cmd response data (12 bytes)
1,144,321 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,168,250 >>> mbox cmd response: success
2,224,915 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,231,178 UART:
2,231,194 UART: Running Caliptra FMC ...
2,231,602 UART:
2,231,745 UART: [state] CFI Enabled
2,242,172 UART: [fht] FMC Alias Private Key: 7
2,349,369 UART: [art] Extend RT PCRs Done
2,349,797 UART: [art] Lock RT PCRs Done
2,351,629 UART: [art] Populate DV Done
2,359,766 UART: [fht] FMC Alias Private Key: 7
2,360,780 UART: [art] Derive CDI
2,361,060 UART: [art] Store in in slot 0x4
2,446,201 UART: [art] Derive Key Pair
2,446,561 UART: [art] Store priv key in slot 0x5
2,459,443 UART: [art] Derive Key Pair - Done
2,474,496 UART: [art] Signing Cert with AUTHO
2,474,976 UART: RITY.KEYID = 7
2,490,370 UART: [art] Erasing AUTHORITY.KEYID = 7
2,491,135 UART: [art] PUB.X = 420C64D086021889F3FE5FCA4099828F9C25CB1B78C208B75F92D7A7C1E5595E97197474780C29F434164233E3B67B33
2,497,883 UART: [art] PUB.Y = 588E1C2F4CE4AB61520384A219BA8A81CF082FD778031FEEDBBE80C1C86CD920E806C713E6D60F2280129C3CBD3F762C
2,504,830 UART: [art] SIG.R = 7287907362347F94F03C10283A4C51C40416F014891928C1A4C2DCF6258F0DE707815EB5933E9DB7082DC15B647A6C42
2,511,578 UART: [art] SIG.S = 9CCC815DD4901A0FC68BBB484F696E4624350F7DDACAE82BBCF1D5489E23ACACAE6AE26A00F7E5BC493F18F6B24B74B4
2,535,463 UART: mbox::rt_entry...
2,535,835 UART: ____ _ _ _ ____ _____
2,536,619 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,537,419 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,538,187 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,538,955 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,539,723 UART: |_|
2,540,035 UART:
2,658,494 UART: [rt] Runtime listening for mailbox commands...
2,659,675 >>> mbox cmd response data (48 bytes)
2,659,676 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,662,459 >>> mbox cmd response data (48 bytes)
2,662,460 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,677,597 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,170,327 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,579 UART: [idev] ++
1,173,747 UART: [idev] CDI.KEYID = 6
1,174,108 UART: [idev] SUBJECT.KEYID = 7
1,174,533 UART: [idev] UDS.KEYID = 0
1,182,879 UART: [idev] Erasing UDS.KEYID = 0
1,200,117 UART: [idev] Sha1 KeyId Algorithm
1,208,945 UART: [idev] --
1,210,080 UART: [ldev] ++
1,210,248 UART: [ldev] CDI.KEYID = 6
1,210,612 UART: [ldev] SUBJECT.KEYID = 5
1,211,039 UART: [ldev] AUTHORITY.KEYID = 7
1,211,502 UART: [ldev] FE.KEYID = 1
1,216,596 UART: [ldev] Erasing FE.KEYID = 1
1,242,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,028 UART: [ldev] --
1,282,522 UART: [fwproc] Wait for Commands...
1,283,195 UART: [fwproc] Recv command 0x4d454153
1,287,222 >>> mbox cmd response data (12 bytes)
1,287,223 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,287,352 UART: [fwproc] Recv command 0x46574c44
1,288,085 UART: [fwproc] Recv'd Img size: 78704 bytes
2,178,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,205,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,234,566 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,316,832 >>> mbox cmd response: success
2,318,079 UART: [afmc] ++
2,318,247 UART: [afmc] CDI.KEYID = 6
2,318,610 UART: [afmc] SUBJECT.KEYID = 7
2,319,036 UART: [afmc] AUTHORITY.KEYID = 5
2,353,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,370,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,371,196 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,376,925 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,382,808 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,388,527 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,396,588 UART: [afmc] --
2,397,528 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,397,550 UART: [cold-reset] --
2,398,634 UART: [state] Locking Datavault
2,399,601 UART: [state] Locking PCR0, PCR1 and PCR31
2,400,205 UART: [state] Locking ICCM
2,400,795 UART: [exit] Launching FMC @ 0x40000130
2,406,124 UART:
2,406,140 UART: Running Caliptra FMC ...
2,406,548 UART:
2,406,602 UART: [state] CFI Enabled
2,417,113 UART: [fht] FMC Alias Private Key: 7
2,525,098 UART: [art] Extend RT PCRs Done
2,525,526 UART: [art] Lock RT PCRs Done
2,526,916 UART: [art] Populate DV Done
2,534,895 UART: [fht] FMC Alias Private Key: 7
2,535,925 UART: [art] Derive CDI
2,536,205 UART: [art] Store in in slot 0x4
2,622,246 UART: [art] Derive Key Pair
2,622,606 UART: [art] Store priv key in slot 0x5
2,635,608 UART: [art] Derive Key Pair - Done
2,650,225 UART: [art] Signing Cert with AUTHO
2,650,705 UART: RITY.KEYID = 7
2,665,959 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,724 UART: [art] PUB.X = 91B79C5DCFAF609D27725C8BA6A70FEBC81D4547B7C059F30D0CE58EEAC91B46271C8A597E7F91CEC399B7C9D56E42E8
2,673,503 UART: [art] PUB.Y = D17C221425FA754665266A096E854E33A0087255BCC73356F2C8E96ACC9087AE95A5479DD1B2967855A3C185F73C7B6F
2,680,443 UART: [art] SIG.R = 14996C7A7D89C6DFA8602770FFF8317105331D8FBD44DF3F8337F2642EC0ED982F0235F17424FFE702BBBD7F44D52730
2,687,208 UART: [art] SIG.S = E8233702A4E3A10BCF762DB0942F93CA1D1049961522D6B696386E4CAD128CFDCCE6CA1CB61452C9C7F9334169B28351
2,710,949 UART: mbox::rt_entry...
2,711,321 UART: ____ _ _ _ ____ _____
2,712,105 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,712,905 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,713,673 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,714,441 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,715,209 UART: |_|
2,715,521 UART:
2,834,884 UART: [rt] Runtime listening for mailbox commands...
2,836,065 >>> mbox cmd response data (48 bytes)
2,836,066 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,838,849 >>> mbox cmd response data (48 bytes)
2,838,850 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,853,987 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,062 >>> mbox cmd response data (12 bytes)
1,138,063 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,163,467 >>> mbox cmd response: success
2,219,542 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,225,715 UART:
2,225,731 UART: Running Caliptra FMC ...
2,226,139 UART:
2,226,193 UART: [state] CFI Enabled
2,236,694 UART: [fht] FMC Alias Private Key: 7
2,344,043 UART: [art] Extend RT PCRs Done
2,344,471 UART: [art] Lock RT PCRs Done
2,345,959 UART: [art] Populate DV Done
2,354,146 UART: [fht] FMC Alias Private Key: 7
2,355,216 UART: [art] Derive CDI
2,355,496 UART: [art] Store in in slot 0x4
2,441,307 UART: [art] Derive Key Pair
2,441,667 UART: [art] Store priv key in slot 0x5
2,454,741 UART: [art] Derive Key Pair - Done
2,469,946 UART: [art] Signing Cert with AUTHO
2,470,426 UART: RITY.KEYID = 7
2,485,796 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,561 UART: [art] PUB.X = 55FB69DDD2155F38ED0036DAE977839C51B0D86626EEA633450CAE1D9EC0E9228B5F424DF2AE1E83A159D59E6C3C2229
2,493,316 UART: [art] PUB.Y = 37B5C02DF039704585AD366905C6B3BCB89C82E2EB26C3EE1E158DE11FBF844F96696BE5F9EABAA080E4E25E7A72D871
2,500,277 UART: [art] SIG.R = 1A3B3EE5A35F920D408ADAF9D45F8BF797BBA3D95F9DBFB3A3BB931F08B9784B06AC9F8F9E6B292A9EE26499383701B1
2,507,053 UART: [art] SIG.S = AB811A969DBB8360C7FB75A28137ED3262AEDE7C4DE2C8C24FEB048C352926F0D05A18511C8D3A4394EA3578360098BF
2,531,201 UART: mbox::rt_entry...
2,531,573 UART: ____ _ _ _ ____ _____
2,532,357 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,157 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,925 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,693 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,461 UART: |_|
2,535,773 UART:
2,654,658 UART: [rt] Runtime listening for mailbox commands...
2,655,839 >>> mbox cmd response data (48 bytes)
2,655,840 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,658,623 >>> mbox cmd response data (48 bytes)
2,658,624 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,673,761 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
891,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,748 UART: [kat] ++
895,900 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
905,075 UART: [kat] SHA2-512-ACC
906,976 UART: [kat] ECC-384
916,717 UART: [kat] HMAC-384Kdf
921,461 UART: [kat] LMS
1,169,773 UART: [kat] --
1,170,566 UART: [cold-reset] ++
1,170,896 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,182,710 UART: [idev] Erasing UDS.KEYID = 0
1,199,898 UART: [idev] Sha1 KeyId Algorithm
1,208,912 UART: [idev] --
1,209,909 UART: [ldev] ++
1,210,077 UART: [ldev] CDI.KEYID = 6
1,210,441 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,605 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,273 UART: [fwproc] Wait for Commands...
1,282,920 UART: [fwproc] Recv command 0x4d454153
1,286,947 >>> mbox cmd response data (12 bytes)
1,286,948 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,287,037 UART: [fwproc] Recv command 0x46574c44
1,287,770 UART: [fwproc] Recv'd Img size: 78704 bytes
2,178,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,205,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,234,899 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,317,177 >>> mbox cmd response: success
2,318,316 UART: [afmc] ++
2,318,484 UART: [afmc] CDI.KEYID = 6
2,318,847 UART: [afmc] SUBJECT.KEYID = 7
2,319,273 UART: [afmc] AUTHORITY.KEYID = 5
2,354,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,371,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,372,177 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,377,906 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,383,789 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,389,508 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,397,501 UART: [afmc] --
2,398,489 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,398,511 UART: [cold-reset] --
2,399,131 UART: [state] Locking Datavault
2,400,568 UART: [state] Locking PCR0, PCR1 and PCR31
2,401,172 UART: [state] Locking ICCM
2,401,750 UART: [exit] Launching FMC @ 0x40000130
2,407,079 UART:
2,407,095 UART: Running Caliptra FMC ...
2,407,503 UART:
2,407,646 UART: [state] CFI Enabled
2,418,213 UART: [fht] FMC Alias Private Key: 7
2,526,354 UART: [art] Extend RT PCRs Done
2,526,782 UART: [art] Lock RT PCRs Done
2,528,084 UART: [art] Populate DV Done
2,536,365 UART: [fht] FMC Alias Private Key: 7
2,537,541 UART: [art] Derive CDI
2,537,821 UART: [art] Store in in slot 0x4
2,623,828 UART: [art] Derive Key Pair
2,624,188 UART: [art] Store priv key in slot 0x5
2,637,284 UART: [art] Derive Key Pair - Done
2,652,333 UART: [art] Signing Cert with AUTHO
2,652,813 UART: RITY.KEYID = 7
2,667,885 UART: [art] Erasing AUTHORITY.KEYID = 7
2,668,650 UART: [art] PUB.X = E96A296FCEBDB53182DAD003363F9A873A5C0DFD75631C43E20C9DD84A7688591BAC513AE6CD2AD115A96A2136DBBA90
2,675,427 UART: [art] PUB.Y = 45D9D256B1171582E7BC0F5D342A4D656E7C4035A5D4E443A300A2EE805DE6306F63D94EC90144E7280105186B26FE43
2,682,339 UART: [art] SIG.R = 32D868A2527E4C32E040CE2599A84CB1E5C0AC5D7C91CF6359851A5B4204A6338A0FDE5035F2FF0ECA08FDEAD7AB8988
2,689,111 UART: [art] SIG.S = D0B3753695EF0FB17C3FCBFC5C721D1A526E99523E2F2BC51BF030870AEC9E84E2E4C3A31EB3B72D6A9638E46090FAFE
2,713,130 UART: mbox::rt_entry...
2,713,502 UART: ____ _ _ _ ____ _____
2,714,286 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,715,086 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,715,854 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,716,622 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,717,390 UART: |_|
2,717,702 UART:
2,836,343 UART: [rt] Runtime listening for mailbox commands...
2,837,524 >>> mbox cmd response data (48 bytes)
2,837,525 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,840,308 >>> mbox cmd response data (48 bytes)
2,840,309 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,855,446 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,565 >>> mbox cmd response data (12 bytes)
1,139,566 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,176 >>> mbox cmd response: success
2,220,267 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,226,680 UART:
2,226,696 UART: Running Caliptra FMC ...
2,227,104 UART:
2,227,247 UART: [state] CFI Enabled
2,237,588 UART: [fht] FMC Alias Private Key: 7
2,345,417 UART: [art] Extend RT PCRs Done
2,345,845 UART: [art] Lock RT PCRs Done
2,347,481 UART: [art] Populate DV Done
2,355,720 UART: [fht] FMC Alias Private Key: 7
2,356,804 UART: [art] Derive CDI
2,357,084 UART: [art] Store in in slot 0x4
2,442,851 UART: [art] Derive Key Pair
2,443,211 UART: [art] Store priv key in slot 0x5
2,456,529 UART: [art] Derive Key Pair - Done
2,471,064 UART: [art] Signing Cert with AUTHO
2,471,544 UART: RITY.KEYID = 7
2,487,036 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,801 UART: [art] PUB.X = AF43A66EA7B9FE94258FE476054D669962825313313DF8957A3BF9142922B543D4BFE06BC1BEB6D33D45E81A7E4CA6A4
2,494,574 UART: [art] PUB.Y = A294B7E43B963589F64749CD18DD5FAC08BB03736A12BF3166DE6E5E90160AC9945AC78CFCACAD603DBD7790BFB7B069
2,501,531 UART: [art] SIG.R = 02381BDA608076852C961B5B94232F5C695DFE08784D607364B83C297750D3DCB730A001797750DDCC1F82AC961BD508
2,508,283 UART: [art] SIG.S = 5D3BA686DDF540148401245059DF07D4793F4698C39A3E740CF035C5397C3A2A4E84B4B598191333AF7E7A1850FD2F81
2,532,083 UART: mbox::rt_entry...
2,532,455 UART: ____ _ _ _ ____ _____
2,533,239 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,039 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,807 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,575 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,343 UART: |_|
2,536,655 UART:
2,655,342 UART: [rt] Runtime listening for mailbox commands...
2,656,523 >>> mbox cmd response data (48 bytes)
2,656,524 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,659,307 >>> mbox cmd response data (48 bytes)
2,659,308 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,674,445 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,929 UART:
193,294 UART: Running Caliptra ROM ...
194,394 UART:
194,544 UART: [state] CFI Enabled
265,054 UART: [state] LifecycleState = Unprovisioned
267,051 UART: [state] DebugLocked = No
268,949 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,377 UART: [kat] SHA2-256
444,052 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,585 UART: [kat] ++
455,084 UART: [kat] sha1
465,257 UART: [kat] SHA2-256
467,916 UART: [kat] SHA2-384
474,997 UART: [kat] SHA2-512-ACC
477,365 UART: [kat] ECC-384
2,769,671 UART: [kat] HMAC-384Kdf
2,794,054 UART: [kat] LMS
3,984,389 UART: [kat] --
3,990,824 UART: [cold-reset] ++
3,993,408 UART: [fht] Storing FHT @ 0x50003400
4,004,810 UART: [idev] ++
4,005,445 UART: [idev] CDI.KEYID = 6
4,006,375 UART: [idev] SUBJECT.KEYID = 7
4,007,562 UART: [idev] UDS.KEYID = 0
4,008,554 ready_for_fw is high
4,008,762 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
4,049,084 UART: [idev] Erasing UDS.KEYID = 0
7,344,221 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,289 UART: [idev] --
7,372,204 UART: [ldev] ++
7,372,783 UART: [ldev] CDI.KEYID = 6
7,373,754 UART: [ldev] SUBJECT.KEYID = 5
7,374,915 UART: [ldev] AUTHORITY.KEYID = 7
7,376,206 UART: [ldev] FE.KEYID = 1
7,418,012 UART: [ldev] Erasing FE.KEYID = 1
10,751,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,041,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,085,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,225 UART: [ldev] --
13,109,678 UART: [fwproc] Waiting for Commands...
13,111,879 UART: [fwproc] Received command 0x46574c44
13,114,067 UART: [fwproc] Received Image of size 31852 bytes
16,168,482 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,241,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,310,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
16,339,793 >>> mbox cmd response: success
16,343,311 UART: [afmc] ++
16,343,934 UART: [afmc] CDI.KEYID = 6
16,344,868 UART: [afmc] SUBJECT.KEYID = 7
16,346,148 UART: [afmc] AUTHORITY.KEYID = 5
19,699,684 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,001,581 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,003,840 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,018,232 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,033,099 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,047,550 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,068,000 UART: [afmc] --
22,071,104 UART: [cold-reset] --
22,073,750 UART: [state] Locking Datavault
22,078,227 UART: [state] Locking PCR0, PCR1 and PCR31
22,079,987 UART: [state] Locking ICCM
22,082,736 UART: [exit] Launching FMC @ 0x40000130
22,091,108 UART:
22,091,374 UART: Running Caliptra FMC ...
22,092,528 UART:
22,092,697 UART: [state] CFI Enabled
22,162,662 UART: [fht] FMC Alias Private Key: 7
24,500,697 UART: [art] Extend RT PCRs Done
24,501,959 UART: [art] Lock RT PCRs Done
24,503,595 UART: [art] Populate DV Done
24,508,978 UART: [fht] FMC Alias Private Key: 7
24,510,704 UART: [art] Derive CDI
24,511,551 UART: [art] Store in in slot 0x4
24,571,258 UART: [art] Derive Key Pair
24,572,336 UART: [art] Store priv key in slot 0x5
27,865,334 UART: [art] Derive Key Pair - Done
27,878,595 UART: [art] Signing Cert with AUTHO
27,879,943 UART: RITY.KEYID = 7
30,166,702 UART: [art] Erasing AUTHORITY.KEYID = 7
30,168,264 UART: [art] PUB.X = F032320068D617D5848A6651F1CB2D7D72F31E9A3DD56CE0B13DA6643CF32E5CECF077AC7E01DA9EE9E43FBB713A3171
30,175,494 UART: [art] PUB.Y = 5104016161BFC56FFECB60640F3A0C70942AEFBFED87912A3705726AB8D8918D8676E4D9EAEC0FFDABAE6302A36A5711
30,182,726 UART: [art] SIG.R = 67F8182032FCD92A5C4BC472F467B15A0E684DD72895E4E8A2BAEA159C0CA59FC04770F1295CF445D760E174F948C906
30,190,139 UART: [art] SIG.S = 32721DCEAA7F2B0101E328BCEB43EEE85B2690AC0F71C4F1C0659F448300833E2C9994136C86607BEC40E02F2DF45B4B
31,494,895 UART: persistent_rt::test_persistent_data_layout...[ok]
31,497,146 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,806,463 ready_for_fw is high
3,807,017 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
16,219,679 >>> mbox cmd response: success
21,901,775 UART:
21,902,147 UART: Running Caliptra FMC ...
21,903,286 UART:
21,903,448 UART: [state] CFI Enabled
21,973,584 UART: [fht] FMC Alias Private Key: 7
24,311,798 UART: [art] Extend RT PCRs Done
24,313,069 UART: [art] Lock RT PCRs Done
24,315,073 UART: [art] Populate DV Done
24,320,469 UART: [fht] FMC Alias Private Key: 7
24,322,074 UART: [art] Derive CDI
24,322,940 UART: [art] Store in in slot 0x4
24,382,497 UART: [art] Derive Key Pair
24,383,577 UART: [art] Store priv key in slot 0x5
27,676,446 UART: [art] Derive Key Pair - Done
27,689,577 UART: [art] Signing Cert with AUTHO
27,690,924 UART: RITY.KEYID = 7
29,979,115 UART: [art] Erasing AUTHORITY.KEYID = 7
29,980,678 UART: [art] PUB.X = 1989D37AFD0D4C6C36C74DF62077C565DE14519FA3B76C2D87153704E1A612C5B15C42EBDA58AD3F0DFBB25F932954A5
29,987,941 UART: [art] PUB.Y = EBC988C4EEC52D5DD18C0FEC43B9D13C28DF998006B43D8051E7A3D296FF1CC77CB23C2DEBABB826C23AFBAD0FA57074
29,995,187 UART: [art] SIG.R = 077FF1129CA1EE8833372AF7738424C253B217408D46A3055EB922A66597B5EFF0BEF21543603C8BC1A2D9C69E0F3C0A
30,002,541 UART: [art] SIG.S = 48F1FF338D54FC21CFAF49091C658811AEC75E2759515269EF112FABD092C8AB5E53D4AFB28C3C612D8B4E4BDF46E7E8
31,306,960 UART: persistent_rt::test_persistent_data_layout...[ok]
31,309,214 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,491 UART:
192,862 UART: Running Caliptra ROM ...
194,046 UART:
603,624 UART: [state] CFI Enabled
618,729 UART: [state] LifecycleState = Unprovisioned
620,669 UART: [state] DebugLocked = No
622,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,172 UART: [kat] SHA2-256
796,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,412 UART: [kat] ++
807,851 UART: [kat] sha1
819,090 UART: [kat] SHA2-256
821,778 UART: [kat] SHA2-384
827,196 UART: [kat] SHA2-512-ACC
829,559 UART: [kat] ECC-384
3,112,970 UART: [kat] HMAC-384Kdf
3,125,064 UART: [kat] LMS
4,315,108 UART: [kat] --
4,318,695 UART: [cold-reset] ++
4,319,707 UART: [fht] Storing FHT @ 0x50003400
4,332,468 UART: [idev] ++
4,333,032 UART: [idev] CDI.KEYID = 6
4,334,125 UART: [idev] SUBJECT.KEYID = 7
4,335,203 UART: [idev] UDS.KEYID = 0
4,336,207 ready_for_fw is high
4,336,424 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
4,376,644 UART: [idev] Erasing UDS.KEYID = 0
7,620,620 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,816 UART: [idev] --
7,644,538 UART: [ldev] ++
7,645,158 UART: [ldev] CDI.KEYID = 6
7,646,063 UART: [ldev] SUBJECT.KEYID = 5
7,647,321 UART: [ldev] AUTHORITY.KEYID = 7
7,648,543 UART: [ldev] FE.KEYID = 1
7,659,183 UART: [ldev] Erasing FE.KEYID = 1
10,944,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,558 UART: [ldev] --
13,305,403 UART: [fwproc] Waiting for Commands...
13,308,088 UART: [fwproc] Received command 0x46574c44
13,310,265 UART: [fwproc] Received Image of size 31852 bytes
16,361,727 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,440,041 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,508,946 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
16,538,366 >>> mbox cmd response: success
16,542,965 UART: [afmc] ++
16,543,588 UART: [afmc] CDI.KEYID = 6
16,544,490 UART: [afmc] SUBJECT.KEYID = 7
16,545,764 UART: [afmc] AUTHORITY.KEYID = 5
19,859,025 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,153,028 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,155,260 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,169,648 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,184,503 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,198,964 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,220,041 UART: [afmc] --
22,223,820 UART: [cold-reset] --
22,226,990 UART: [state] Locking Datavault
22,231,578 UART: [state] Locking PCR0, PCR1 and PCR31
22,233,328 UART: [state] Locking ICCM
22,234,967 UART: [exit] Launching FMC @ 0x40000130
22,243,399 UART:
22,243,640 UART: Running Caliptra FMC ...
22,244,774 UART:
22,244,927 UART: [state] CFI Enabled
22,252,600 UART: [fht] FMC Alias Private Key: 7
24,582,652 UART: [art] Extend RT PCRs Done
24,583,912 UART: [art] Lock RT PCRs Done
24,585,748 UART: [art] Populate DV Done
24,591,258 UART: [fht] FMC Alias Private Key: 7
24,592,978 UART: [art] Derive CDI
24,593,821 UART: [art] Store in in slot 0x4
24,636,441 UART: [art] Derive Key Pair
24,637,471 UART: [art] Store priv key in slot 0x5
27,879,495 UART: [art] Derive Key Pair - Done
27,892,210 UART: [art] Signing Cert with AUTHO
27,893,552 UART: RITY.KEYID = 7
30,172,773 UART: [art] Erasing AUTHORITY.KEYID = 7
30,174,471 UART: [art] PUB.X = 5CE531A2AC54CF4EACA60E36F1A686DF4DA978A4285A000BCC0863EB2FF50A023242C42BF83AF80386CAB1E966DF8533
30,181,517 UART: [art] PUB.Y = 59B890C5FC7DCC3AB01B6DE9374BA3EC8D8703D009A77C31265DD61A2B8BD9511BBB060032F0E3EFDE3936386BB88FAF
30,188,769 UART: [art] SIG.R = 5144B7FB093D9A26CE4CAFFDA9ED1235D92141ABCCB47974ACBAA66F89163B3EB7A25A63625373F2FDB6B14E1EB18213
30,196,210 UART: [art] SIG.S = 51BD5DD7E9A6659885BF139352ADF5B8FE1F740578BFFB93ED64478BA42170CD128CEF9BC200EF7B8BEC040F8CD5D5C1
31,501,008 UART: persistent_rt::test_persistent_data_layout...[ok]
31,503,284 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,126,283 ready_for_fw is high
4,126,676 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
16,397,593 >>> mbox cmd response: success
22,042,197 UART:
22,042,601 UART: Running Caliptra FMC ...
22,043,736 UART:
22,043,897 UART: [state] CFI Enabled
22,051,946 UART: [fht] FMC Alias Private Key: 7
24,383,022 UART: [art] Extend RT PCRs Done
24,384,301 UART: [art] Lock RT PCRs Done
24,385,759 UART: [art] Populate DV Done
24,391,279 UART: [fht] FMC Alias Private Key: 7
24,392,879 UART: [art] Derive CDI
24,393,729 UART: [art] Store in in slot 0x4
24,436,501 UART: [art] Derive Key Pair
24,437,568 UART: [art] Store priv key in slot 0x5
27,679,452 UART: [art] Derive Key Pair - Done
27,692,317 UART: [art] Signing Cert with AUTHO
27,693,669 UART: RITY.KEYID = 7
29,972,837 UART: [art] Erasing AUTHORITY.KEYID = 7
29,974,400 UART: [art] PUB.X = 99F5889CEC0B277FA5AB95AA242479F747C1E3514DDB592459F43A89EFFF21EC78C0B621E028A2BB5DF86617CDDB461A
29,981,549 UART: [art] PUB.Y = FB21595D7D8371EA12AD8BB412D876B72A092776E82D3D0635889FC0CEF2463FBC92D875925D7A1EA6B05DED7DBB61E6
29,988,876 UART: [art] SIG.R = 65C06EAC5FC9FFC1793BC1C939F94F82B3A5E8B4E0D9F9DEBBF3479D193923D3858BB4D4A29681E2799C09A755A610C7
29,996,198 UART: [art] SIG.S = EE18F819D49C9AC20DD3AED83365946241BA52F53FAA78F1312E88129B8A012261C576E6EC5873ABE9C977C5D48EF0B9
31,300,831 UART: persistent_rt::test_persistent_data_layout...[ok]
31,303,098 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,102 UART:
192,477 UART: Running Caliptra ROM ...
193,659 UART:
193,809 UART: [state] CFI Enabled
263,155 UART: [state] LifecycleState = Unprovisioned
265,070 UART: [state] DebugLocked = No
267,181 UART: [state] WD Timer not started. Device not locked for debugging
271,075 UART: [kat] SHA2-256
450,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,809 UART: [kat] ++
462,339 UART: [kat] sha1
473,075 UART: [kat] SHA2-256
476,097 UART: [kat] SHA2-384
482,517 UART: [kat] SHA2-512-ACC
485,457 UART: [kat] ECC-384
2,946,750 UART: [kat] HMAC-384Kdf
2,971,489 UART: [kat] LMS
3,500,930 UART: [kat] --
3,505,299 UART: [cold-reset] ++
3,507,229 UART: [fht] FHT @ 0x50003400
3,516,857 UART: [idev] ++
3,517,420 UART: [idev] CDI.KEYID = 6
3,518,326 UART: [idev] SUBJECT.KEYID = 7
3,519,568 UART: [idev] UDS.KEYID = 0
3,520,490 ready_for_fw is high
3,520,680 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,560,996 UART: [idev] Erasing UDS.KEYID = 0
6,025,019 UART: [idev] Sha1 KeyId Algorithm
6,049,522 UART: [idev] --
6,052,761 UART: [ldev] ++
6,053,332 UART: [ldev] CDI.KEYID = 6
6,054,222 UART: [ldev] SUBJECT.KEYID = 5
6,055,526 UART: [ldev] AUTHORITY.KEYID = 7
6,056,720 UART: [ldev] FE.KEYID = 1
6,099,271 UART: [ldev] Erasing FE.KEYID = 1
8,603,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,609 UART: [ldev] --
10,415,086 UART: [fwproc] Wait for Commands...
10,416,962 UART: [fwproc] Recv command 0x46574c44
10,419,054 UART: [fwproc] Recv'd Img size: 31832 bytes
12,814,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,890,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,959,071 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
12,987,677 >>> mbox cmd response: success
12,992,318 UART: [afmc] ++
12,992,924 UART: [afmc] CDI.KEYID = 6
12,993,850 UART: [afmc] SUBJECT.KEYID = 7
12,994,993 UART: [afmc] AUTHORITY.KEYID = 5
15,525,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,249,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,251,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,267,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,283,642 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,299,500 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,322,304 UART: [afmc] --
17,326,775 UART: [cold-reset] --
17,330,537 UART: [state] Locking Datavault
17,336,121 UART: [state] Locking PCR0, PCR1 and PCR31
17,337,838 UART: [state] Locking ICCM
17,340,129 UART: [exit] Launching FMC @ 0x40000130
17,348,511 UART:
17,348,755 UART: Running Caliptra FMC ...
17,349,886 UART:
17,350,053 UART: [state] CFI Enabled
17,408,357 UART: [fht] FMC Alias Private Key: 7
19,172,093 UART: [art] Extend RT PCRs Done
19,173,353 UART: [art] Lock RT PCRs Done
19,174,981 UART: [art] Populate DV Done
19,180,145 UART: [fht] FMC Alias Private Key: 7
19,181,807 UART: [art] Derive CDI
19,182,653 UART: [art] Store in in slot 0x4
19,240,939 UART: [art] Derive Key Pair
19,241,988 UART: [art] Store priv key in slot 0x5
21,705,239 UART: [art] Derive Key Pair - Done
21,718,222 UART: [art] Signing Cert with AUTHO
21,719,550 UART: RITY.KEYID = 7
23,430,931 UART: [art] Erasing AUTHORITY.KEYID = 7
23,432,483 UART: [art] PUB.X = 3ABA1866F74A4C8EF48E0A91C754D2D2AB729D53BBDC968BB68CFF25FA802CA4466EB82F0099AEF21E8F2E43FEA56FF9
23,439,690 UART: [art] PUB.Y = FD6EDF0D48917156BB172B115EF49F506E43427E70A6936B05A89F4D26CF03AE923E6C9F4D6063507A27DCFCA8BB7663
23,447,011 UART: [art] SIG.R = FD0E989346023483EE5B7AE086A9F5EE08AB2532702FC8FEC594525EAFE7D760A9E4D1E2E23D1845CDA66213EDC3201F
23,454,411 UART: [art] SIG.S = F96D5FFE01527FD3BC48F4CF4348CF6A36CA9A5617601724931E6F30CD61CC4C8EC145243A744D7BCAF808CBF380224F
24,432,772 UART: persistent_rt::test_persistent_data_layout...[ok]
24,435,035 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,360,385 ready_for_fw is high
3,360,767 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,752,980 >>> mbox cmd response: success
17,043,913 UART:
17,044,326 UART: Running Caliptra FMC ...
17,045,494 UART:
17,045,666 UART: [state] CFI Enabled
17,110,441 UART: [fht] FMC Alias Private Key: 7
18,874,618 UART: [art] Extend RT PCRs Done
18,875,875 UART: [art] Lock RT PCRs Done
18,877,668 UART: [art] Populate DV Done
18,882,983 UART: [fht] FMC Alias Private Key: 7
18,884,638 UART: [art] Derive CDI
18,885,418 UART: [art] Store in in slot 0x4
18,942,800 UART: [art] Derive Key Pair
18,943,840 UART: [art] Store priv key in slot 0x5
21,406,819 UART: [art] Derive Key Pair - Done
21,419,529 UART: [art] Signing Cert with AUTHO
21,420,880 UART: RITY.KEYID = 7
23,132,456 UART: [art] Erasing AUTHORITY.KEYID = 7
23,134,006 UART: [art] PUB.X = 5BB7349FB9BF5C624344FE67446EB46C1BC5116B1122BC2534381CBAB2C917D9EE3F6A12A216B778D5E4AC358FCDFC12
23,141,248 UART: [art] PUB.Y = 9EF6835EFBCBD6DD39C24694646C7580E92CFC895961066666ABD766A6501A175129D765ACB6E9957F7058E47F8A5811
23,148,477 UART: [art] SIG.R = 9777C373452CF1D7EF6A3E3657DF940DE971D8C3267D12A2A5285AB7DFD471F33A1A0B0056D1850983D370FC03206BD5
23,155,891 UART: [art] SIG.S = 05DEBA8F5D35B732CB9CD852F88BC89BFA344CE2FA05F546ECEA00D1181B12014A4D4E3BDD0B40A8F33F957C2FC88854
24,134,285 UART: persistent_rt::test_persistent_data_layout...[ok]
24,136,555 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,337 UART:
192,734 UART: Running Caliptra ROM ...
193,825 UART:
603,378 UART: [state] CFI Enabled
614,692 UART: [state] LifecycleState = Unprovisioned
616,568 UART: [state] DebugLocked = No
619,083 UART: [state] WD Timer not started. Device not locked for debugging
622,073 UART: [kat] SHA2-256
801,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,752 UART: [kat] ++
813,281 UART: [kat] sha1
824,457 UART: [kat] SHA2-256
827,502 UART: [kat] SHA2-384
832,924 UART: [kat] SHA2-512-ACC
835,925 UART: [kat] ECC-384
3,277,960 UART: [kat] HMAC-384Kdf
3,290,306 UART: [kat] LMS
3,819,775 UART: [kat] --
3,825,256 UART: [cold-reset] ++
3,827,325 UART: [fht] FHT @ 0x50003400
3,837,511 UART: [idev] ++
3,838,065 UART: [idev] CDI.KEYID = 6
3,838,942 UART: [idev] SUBJECT.KEYID = 7
3,840,193 UART: [idev] UDS.KEYID = 0
3,841,087 ready_for_fw is high
3,841,298 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,881,688 UART: [idev] Erasing UDS.KEYID = 0
6,310,319 UART: [idev] Sha1 KeyId Algorithm
6,333,381 UART: [idev] --
6,337,206 UART: [ldev] ++
6,337,766 UART: [ldev] CDI.KEYID = 6
6,338,698 UART: [ldev] SUBJECT.KEYID = 5
6,340,127 UART: [ldev] AUTHORITY.KEYID = 7
6,341,312 UART: [ldev] FE.KEYID = 1
6,352,844 UART: [ldev] Erasing FE.KEYID = 1
8,824,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,466 UART: [ldev] --
10,617,212 UART: [fwproc] Wait for Commands...
10,619,569 UART: [fwproc] Recv command 0x46574c44
10,621,599 UART: [fwproc] Recv'd Img size: 31832 bytes
13,018,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,092,761 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,161,503 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,191,021 >>> mbox cmd response: success
13,195,289 UART: [afmc] ++
13,195,893 UART: [afmc] CDI.KEYID = 6
13,196,792 UART: [afmc] SUBJECT.KEYID = 7
13,198,050 UART: [afmc] AUTHORITY.KEYID = 5
15,697,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,422,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,424,339 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,440,175 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,456,148 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,472,040 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,496,003 UART: [afmc] --
17,499,437 UART: [cold-reset] --
17,503,494 UART: [state] Locking Datavault
17,508,032 UART: [state] Locking PCR0, PCR1 and PCR31
17,509,704 UART: [state] Locking ICCM
17,510,851 UART: [exit] Launching FMC @ 0x40000130
17,519,229 UART:
17,519,480 UART: Running Caliptra FMC ...
17,520,614 UART:
17,520,770 UART: [state] CFI Enabled
17,529,038 UART: [fht] FMC Alias Private Key: 7
19,285,780 UART: [art] Extend RT PCRs Done
19,287,043 UART: [art] Lock RT PCRs Done
19,288,733 UART: [art] Populate DV Done
19,294,039 UART: [fht] FMC Alias Private Key: 7
19,295,555 UART: [art] Derive CDI
19,296,314 UART: [art] Store in in slot 0x4
19,338,959 UART: [art] Derive Key Pair
19,340,030 UART: [art] Store priv key in slot 0x5
21,766,984 UART: [art] Derive Key Pair - Done
21,780,135 UART: [art] Signing Cert with AUTHO
21,781,517 UART: RITY.KEYID = 7
23,487,293 UART: [art] Erasing AUTHORITY.KEYID = 7
23,488,850 UART: [art] PUB.X = F80BA21664DD8474BC8583AFEF8E918BA0622CF4077D8DFB7C214257D70026DDB9F08CD1B09FF36660E85D85790C3654
23,496,104 UART: [art] PUB.Y = 023E50AFA257E34C171D7E290B6BBAC9F5706AB19EB2350F86D17115A2571B51B7A2C0861F14F83E94CFB5395A4EF83E
23,503,351 UART: [art] SIG.R = 62AD5AA6C427512BDA942CE4F72B70B8503C564F624905D0D89913603575FF7C6A1606E51461905DD3E4A896967233E2
23,510,680 UART: [art] SIG.S = CD26AA6D730D6ABD0CD3662777113D19D1A9D06D7A8A51A67921CF4DC8348CE57BF9C6EAB4F4D1EC385E3331E924154E
24,489,207 UART: persistent_rt::test_persistent_data_layout...[ok]
24,491,476 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,693,645 ready_for_fw is high
3,694,020 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,951,413 >>> mbox cmd response: success
17,200,290 UART:
17,200,705 UART: Running Caliptra FMC ...
17,201,835 UART:
17,201,987 UART: [state] CFI Enabled
17,209,950 UART: [fht] FMC Alias Private Key: 7
18,966,936 UART: [art] Extend RT PCRs Done
18,968,213 UART: [art] Lock RT PCRs Done
18,969,793 UART: [art] Populate DV Done
18,975,174 UART: [fht] FMC Alias Private Key: 7
18,976,834 UART: [art] Derive CDI
18,977,687 UART: [art] Store in in slot 0x4
19,020,124 UART: [art] Derive Key Pair
19,021,167 UART: [art] Store priv key in slot 0x5
21,448,206 UART: [art] Derive Key Pair - Done
21,461,472 UART: [art] Signing Cert with AUTHO
21,462,813 UART: RITY.KEYID = 7
23,168,146 UART: [art] Erasing AUTHORITY.KEYID = 7
23,169,705 UART: [art] PUB.X = 7E082FB67857A5C4ECC003D647B57A879968D4C7D744F0F0AEAE62FD45B1F135F265D384572A696F04CE9486ABF356C2
23,176,953 UART: [art] PUB.Y = BA633990ACEB5C74CB5AEE11A6C55CCA3CF7FBAC8C627305CE8A165841FD8CE779DFE7E69C103C2BF5BBF5B9B0A46998
23,184,396 UART: [art] SIG.R = 5F310F7F3916EB5DDADE9FEDF63B69562FF88D4CEFAC06B111E7B2A412D35AE20951A49FED965360E5336B4C5503F1B2
23,191,679 UART: [art] SIG.S = 4B789E46D4E91E6D4D80FACEE18CE73681944A85A7DE9A20C1A901A947FF2AF0B1B7CEDB8C9A8BB5E1D156D9FF3A09BB
24,169,606 UART: persistent_rt::test_persistent_data_layout...[ok]
24,171,876 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
3,441,348 ready_for_fw is high
3,441,805 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,971,422 >>> mbox cmd response: success
17,255,996 UART:
17,256,386 UART: Running Caliptra FMC ...
17,257,680 UART:
17,257,858 UART: [state] CFI Enabled
17,323,425 UART: [fht] FMC Alias Private Key: 7
19,087,185 UART: [art] Extend RT PCRs Done
19,088,455 UART: [art] Lock RT PCRs Done
19,090,304 UART: [art] Populate DV Done
19,095,691 UART: [fht] FMC Alias Private Key: 7
19,097,427 UART: [art] Derive CDI
19,098,202 UART: [art] Store in in slot 0x4
19,156,337 UART: [art] Derive Key Pair
19,157,423 UART: [art] Store priv key in slot 0x5
21,619,938 UART: [art] Derive Key Pair - Done
21,633,068 UART: [art] Signing Cert with AUTHO
21,634,417 UART: RITY.KEYID = 7
23,346,206 UART: [art] Erasing AUTHORITY.KEYID = 7
23,347,768 UART: [art] PUB.X = 40FE2C86293F03BE8716ED02A338C4AC57C521D4E542E5D8D7B1545755912A2DDC828368B0374ED6BCA6A7DA305D56C1
23,354,990 UART: [art] PUB.Y = 1039CBEA59E372ED52E5FAB4D3A1A49B6C744E4857AEE58AF8D43040E0FD110A4E5F03E094EBEE21A62AF2116EF22551
23,362,302 UART: [art] SIG.R = 195B7A508C185806094557BEAF9F310B6CAAEE94880DE92F810D1199A04E596CB78E516DF83082772564B4D1006D36B7
23,369,611 UART: [art] SIG.S = 299EC0A14148246B52CDCACEC069FAED44610740CDE17D612827A7CEB4127514F5F0B0FD25276C696E940829FDE4B26F
24,348,247 UART: persistent_rt::test_persistent_data_layout...[ok]
24,350,489 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,761,045 ready_for_fw is high
3,761,500 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
13,194,024 >>> mbox cmd response: success
17,449,137 UART:
17,449,877 UART: Running Caliptra FMC ...
17,450,999 UART:
17,451,143 UART: [state] CFI Enabled
17,458,690 UART: [fht] FMC Alias Private Key: 7
19,215,606 UART: [art] Extend RT PCRs Done
19,217,247 UART: [art] Lock RT PCRs Done
19,218,601 UART: [art] Populate DV Done
19,224,305 UART: [fht] FMC Alias Private Key: 7
19,225,866 UART: [art] Derive CDI
19,226,639 UART: [art] Store in in slot 0x4
19,269,346 UART: [art] Derive Key Pair
19,270,401 UART: [art] Store priv key in slot 0x5
21,697,434 UART: [art] Derive Key Pair - Done
21,710,520 UART: [art] Signing Cert with AUTHO
21,711,867 UART: RITY.KEYID = 7
23,417,209 UART: [art] Erasing AUTHORITY.KEYID = 7
23,418,761 UART: [art] PUB.X = 23F5F045098132741055F4C2915631541B8FC1F3287CB7D3ECEC8FE0540FBD7102815BAA652D3F92574B78F2E31B9026
23,426,017 UART: [art] PUB.Y = 48B11C593B7B8084A09FAA94B0F5DC083C7083E8AD5CA2B0B77B3CCCC12BA12FD09FACBAE6E6BD0A8254F5BD5AC1C4C9
23,433,270 UART: [art] SIG.R = 14D1E897AB06B9B8F44A966B583581EBC7E4B362CFDDFD30EEC96A72439AB88602C012BAF103191362B29F25FF160AA3
23,440,725 UART: [art] SIG.S = 63EF3FA69B81150AB29AA3045D6D09E953DA72977345F049A475ABDB559D3C345EB36EDD4538E49F396E60DB7B6D2EA1
24,419,365 UART: persistent_rt::test_persistent_data_layout...[ok]
24,421,637 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,203 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,759 UART: [kat] SHA2-256
881,690 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,805 UART: [kat] ++
885,957 UART: [kat] sha1
890,177 UART: [kat] SHA2-256
892,115 UART: [kat] SHA2-384
894,906 UART: [kat] SHA2-512-ACC
896,807 UART: [kat] ECC-384
902,378 UART: [kat] HMAC-384Kdf
907,112 UART: [kat] LMS
1,475,308 UART: [kat] --
1,476,289 UART: [cold-reset] ++
1,476,635 UART: [fht] Storing FHT @ 0x50003400
1,479,314 UART: [idev] ++
1,479,482 UART: [idev] CDI.KEYID = 6
1,479,842 UART: [idev] SUBJECT.KEYID = 7
1,480,266 UART: [idev] UDS.KEYID = 0
1,480,611 ready_for_fw is high
1,480,611 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,488,220 UART: [idev] Erasing UDS.KEYID = 0
1,504,910 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,640 UART: [idev] --
1,514,601 UART: [ldev] ++
1,514,769 UART: [ldev] CDI.KEYID = 6
1,515,132 UART: [ldev] SUBJECT.KEYID = 5
1,515,558 UART: [ldev] AUTHORITY.KEYID = 7
1,516,021 UART: [ldev] FE.KEYID = 1
1,520,905 UART: [ldev] Erasing FE.KEYID = 1
1,545,992 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,294 UART: [ldev] --
1,585,691 UART: [fwproc] Waiting for Commands...
1,586,534 UART: [fwproc] Received command 0x46574c44
1,587,325 UART: [fwproc] Received Image of size 31832 bytes
1,939,460 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,786 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,008,309 >>> mbox cmd response: success
2,009,417 UART: [afmc] ++
2,009,585 UART: [afmc] CDI.KEYID = 6
2,009,947 UART: [afmc] SUBJECT.KEYID = 7
2,010,372 UART: [afmc] AUTHORITY.KEYID = 5
2,046,261 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,062,531 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,069,039 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,074,924 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,080,614 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,088,361 UART: [afmc] --
2,089,263 UART: [cold-reset] --
2,089,951 UART: [state] Locking Datavault
2,091,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,820 UART: [state] Locking ICCM
2,092,256 UART: [exit] Launching FMC @ 0x40000130
2,097,585 UART:
2,097,601 UART: Running Caliptra FMC ...
2,098,009 UART:
2,098,063 UART: [state] CFI Enabled
2,108,518 UART: [fht] FMC Alias Private Key: 7
2,216,699 UART: [art] Extend RT PCRs Done
2,217,127 UART: [art] Lock RT PCRs Done
2,218,977 UART: [art] Populate DV Done
2,227,062 UART: [fht] FMC Alias Private Key: 7
2,228,156 UART: [art] Derive CDI
2,228,436 UART: [art] Store in in slot 0x4
2,314,007 UART: [art] Derive Key Pair
2,314,367 UART: [art] Store priv key in slot 0x5
2,327,329 UART: [art] Derive Key Pair - Done
2,341,925 UART: [art] Signing Cert with AUTHO
2,342,405 UART: RITY.KEYID = 7
2,357,887 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,652 UART: [art] PUB.X = 815FF5C2AA96E34FDC9B5236DFD9464100984FFD5B16C2661FB95439316A60D6A4F4884E0FE8268E032326F0AF1E9EC5
2,365,400 UART: [art] PUB.Y = B5FE717C76A8E3F51D310B643FC4D8C56F9E2DF228627E60B6BAC7994BC7F6948D954422AD6DA176150C2EFC0A3A1075
2,372,351 UART: [art] SIG.R = 679ED36EF313B510F73C8B63CEADFCAB0ABFD041277C67B405982822F4B39834C3756E549D0DBFD653E23790E1535B3C
2,379,120 UART: [art] SIG.S = FA6E0086EBDDFBCFDE8F2F20238578A657AAC812732E9F03A78E2CD5016F05FC5032B2C09204C507CD8A957A62AD4171
2,402,891 UART: persistent_rt::test_persistent_data_layout...[ok]
2,404,134 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,195 ready_for_fw is high
1,363,195 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,859,585 >>> mbox cmd response: success
1,921,097 UART:
1,921,113 UART: Running Caliptra FMC ...
1,921,521 UART:
1,921,575 UART: [state] CFI Enabled
1,932,284 UART: [fht] FMC Alias Private Key: 7
2,040,241 UART: [art] Extend RT PCRs Done
2,040,669 UART: [art] Lock RT PCRs Done
2,042,151 UART: [art] Populate DV Done
2,049,966 UART: [fht] FMC Alias Private Key: 7
2,051,030 UART: [art] Derive CDI
2,051,310 UART: [art] Store in in slot 0x4
2,136,569 UART: [art] Derive Key Pair
2,136,929 UART: [art] Store priv key in slot 0x5
2,150,021 UART: [art] Derive Key Pair - Done
2,164,849 UART: [art] Signing Cert with AUTHO
2,165,329 UART: RITY.KEYID = 7
2,180,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,118 UART: [art] PUB.X = 5601E1596C34E0B348D5762E11D55EEC0977AEBF8DC78FC825D7942C087F98F6B853E497F23A478AA696CDB7070A3885
2,187,875 UART: [art] PUB.Y = ED2A05A8E511CC8F7A1A14259FEAF025818C72E890D8CA260D9BF2C99CB2FE731EBF5FC5F7FFD35B806B54D90A5FCD67
2,194,840 UART: [art] SIG.R = 9C8E0327D8834C345495B273C42AE12AA598196CF23EBB9BFA8E01A5C5EED595E2CD855300441B9BD0C8051341D0FF26
2,201,585 UART: [art] SIG.S = D9683E487857874C4774DB729A209AFC5C858845B091E2E40582D7ECDC5E02EF98D7A2AD5B73E392194E854F6EDBC4A7
2,225,471 UART: persistent_rt::test_persistent_data_layout...[ok]
2,226,714 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
86,954 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,512 UART: [kat] SHA2-256
882,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,558 UART: [kat] ++
886,710 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,635 UART: [kat] SHA2-512-ACC
897,536 UART: [kat] ECC-384
902,965 UART: [kat] HMAC-384Kdf
907,563 UART: [kat] LMS
1,475,759 UART: [kat] --
1,476,430 UART: [cold-reset] ++
1,476,814 UART: [fht] Storing FHT @ 0x50003400
1,479,411 UART: [idev] ++
1,479,579 UART: [idev] CDI.KEYID = 6
1,479,939 UART: [idev] SUBJECT.KEYID = 7
1,480,363 UART: [idev] UDS.KEYID = 0
1,480,708 ready_for_fw is high
1,480,708 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,488,177 UART: [idev] Erasing UDS.KEYID = 0
1,505,187 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,933 UART: [idev] --
1,515,164 UART: [ldev] ++
1,515,332 UART: [ldev] CDI.KEYID = 6
1,515,695 UART: [ldev] SUBJECT.KEYID = 5
1,516,121 UART: [ldev] AUTHORITY.KEYID = 7
1,516,584 UART: [ldev] FE.KEYID = 1
1,521,988 UART: [ldev] Erasing FE.KEYID = 1
1,547,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,077 UART: [ldev] --
1,587,376 UART: [fwproc] Waiting for Commands...
1,588,003 UART: [fwproc] Received command 0x46574c44
1,588,794 UART: [fwproc] Received Image of size 31832 bytes
1,940,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,435 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,008,936 >>> mbox cmd response: success
2,010,150 UART: [afmc] ++
2,010,318 UART: [afmc] CDI.KEYID = 6
2,010,680 UART: [afmc] SUBJECT.KEYID = 7
2,011,105 UART: [afmc] AUTHORITY.KEYID = 5
2,046,484 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,063,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,069,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,075,401 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,081,091 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,088,938 UART: [afmc] --
2,089,904 UART: [cold-reset] --
2,090,836 UART: [state] Locking Datavault
2,092,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,092,665 UART: [state] Locking ICCM
2,093,269 UART: [exit] Launching FMC @ 0x40000130
2,098,598 UART:
2,098,614 UART: Running Caliptra FMC ...
2,099,022 UART:
2,099,165 UART: [state] CFI Enabled
2,109,838 UART: [fht] FMC Alias Private Key: 7
2,217,469 UART: [art] Extend RT PCRs Done
2,217,897 UART: [art] Lock RT PCRs Done
2,219,301 UART: [art] Populate DV Done
2,227,522 UART: [fht] FMC Alias Private Key: 7
2,228,564 UART: [art] Derive CDI
2,228,844 UART: [art] Store in in slot 0x4
2,314,307 UART: [art] Derive Key Pair
2,314,667 UART: [art] Store priv key in slot 0x5
2,327,783 UART: [art] Derive Key Pair - Done
2,342,624 UART: [art] Signing Cert with AUTHO
2,343,104 UART: RITY.KEYID = 7
2,357,884 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,649 UART: [art] PUB.X = 9012650DCF0C6FD3137F9B45EBC92183A388905A6A2894F86E828D8A9548E14DD4547EA653671648A8063582621094B1
2,365,398 UART: [art] PUB.Y = 567B4364E2A5A15DB88B94D7D72BA893987873B7C8F020B1A9B4DCD3BEF89D107BD60106E01F31E44072F282E3BCF4D3
2,372,350 UART: [art] SIG.R = A05410DC95EB1B585253EF1D86EB5628A50040235CDAEB040D486EDBB9A1290BC4727779824741872008858D322C8C4E
2,379,082 UART: [art] SIG.S = CD432D5869F897488133BC61407E15C1D377418BBE517CAA4267B165276BADC8CB722736B46CBA6ADE531825FF9CBE41
2,402,992 UART: persistent_rt::test_persistent_data_layout...[ok]
2,404,235 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,846 ready_for_fw is high
1,362,846 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,858,862 >>> mbox cmd response: success
1,920,238 UART:
1,920,254 UART: Running Caliptra FMC ...
1,920,662 UART:
1,920,805 UART: [state] CFI Enabled
1,931,560 UART: [fht] FMC Alias Private Key: 7
2,039,963 UART: [art] Extend RT PCRs Done
2,040,391 UART: [art] Lock RT PCRs Done
2,041,721 UART: [art] Populate DV Done
2,050,008 UART: [fht] FMC Alias Private Key: 7
2,051,132 UART: [art] Derive CDI
2,051,412 UART: [art] Store in in slot 0x4
2,136,665 UART: [art] Derive Key Pair
2,137,025 UART: [art] Store priv key in slot 0x5
2,150,829 UART: [art] Derive Key Pair - Done
2,165,688 UART: [art] Signing Cert with AUTHO
2,166,168 UART: RITY.KEYID = 7
2,181,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,182,221 UART: [art] PUB.X = 5DB4BC3A961630B5D0D96843A6B754CB25CB5AECEE790F47C1D921EF230AAFBB311EF1B23B76CEF4EA144BE569805B01
2,189,002 UART: [art] PUB.Y = 5A5065776A4CEC8B6ACDC81A0C0D870889E8423F03E651022C8B47E462D8C87BFDA747288EE32EAE25689419CD9BC1BF
2,195,947 UART: [art] SIG.R = 7495575884CC5D79EA1D58A63F5B0ECA97A326453D04CAEF4C9414AE1F122BA192860BE3D4646142AE9EE48A22596C3B
2,202,714 UART: [art] SIG.S = 4C7B3CEECDD9CDBC4273B8E72EC475DAA5D162F9CD7AEF75B43A1B7FA5BC287548915935953E2454AC113FCCA2D6D661
2,226,508 UART: persistent_rt::test_persistent_data_layout...[ok]
2,227,751 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,559 UART: [kat] SHA2-256
903,499 UART: [kat] SHA2-384
906,270 UART: [kat] SHA2-512-ACC
908,171 UART: [kat] ECC-384
917,936 UART: [kat] HMAC-384Kdf
922,408 UART: [kat] LMS
1,170,736 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,172,177 UART: [fht] FHT @ 0x50003400
1,174,984 UART: [idev] ++
1,175,152 UART: [idev] CDI.KEYID = 6
1,175,512 UART: [idev] SUBJECT.KEYID = 7
1,175,936 UART: [idev] UDS.KEYID = 0
1,176,281 ready_for_fw is high
1,176,281 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,183,730 UART: [idev] Erasing UDS.KEYID = 0
1,200,191 UART: [idev] Sha1 KeyId Algorithm
1,208,703 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,494 UART: [ldev] SUBJECT.KEYID = 5
1,210,920 UART: [ldev] AUTHORITY.KEYID = 7
1,211,383 UART: [ldev] FE.KEYID = 1
1,216,405 UART: [ldev] Erasing FE.KEYID = 1
1,243,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,283 UART: [ldev] --
1,282,742 UART: [fwproc] Wait for Commands...
1,283,546 UART: [fwproc] Recv command 0x46574c44
1,284,274 UART: [fwproc] Recv'd Img size: 31832 bytes
1,636,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,439 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,743 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,704,690 >>> mbox cmd response: success
1,705,792 UART: [afmc] ++
1,705,960 UART: [afmc] CDI.KEYID = 6
1,706,322 UART: [afmc] SUBJECT.KEYID = 7
1,706,747 UART: [afmc] AUTHORITY.KEYID = 5
1,742,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,759,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,701 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,771,586 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,777,305 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,961 UART: [afmc] --
1,785,999 UART: [cold-reset] --
1,786,777 UART: [state] Locking Datavault
1,788,058 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,662 UART: [state] Locking ICCM
1,789,234 UART: [exit] Launching FMC @ 0x40000130
1,794,563 UART:
1,794,579 UART: Running Caliptra FMC ...
1,794,987 UART:
1,795,041 UART: [state] CFI Enabled
1,805,570 UART: [fht] FMC Alias Private Key: 7
1,913,633 UART: [art] Extend RT PCRs Done
1,914,061 UART: [art] Lock RT PCRs Done
1,915,443 UART: [art] Populate DV Done
1,923,820 UART: [fht] FMC Alias Private Key: 7
1,924,822 UART: [art] Derive CDI
1,925,102 UART: [art] Store in in slot 0x4
2,010,479 UART: [art] Derive Key Pair
2,010,839 UART: [art] Store priv key in slot 0x5
2,024,489 UART: [art] Derive Key Pair - Done
2,039,257 UART: [art] Signing Cert with AUTHO
2,039,737 UART: RITY.KEYID = 7
2,054,979 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,744 UART: [art] PUB.X = 0721DEFB493C6FF89D38F1661E1760A9592C021ED33C4BFD726470090F985A2768A8306122C52893CC3671241C62CC0A
2,062,493 UART: [art] PUB.Y = 17F54D81B6AA8BCFCD2B2AA4DBB93A72BEA268B07B4082135582B96A69CD7B6B40EF4DEAF2DDA3EA804F1C9DB85D6AC0
2,069,473 UART: [art] SIG.R = 4E4157E5FE902BD1CBBFE7606AA29CDE966569C4C8DEC89F406D313C8AA502265FBC295C9941E25D7377B20DA94EF0A5
2,076,251 UART: [art] SIG.S = EBCDD1FA15237244EEA48401FAA433C9BA2C86997827D95F1393F678A8148E0DECD8E561087193000C50B86EB09F3ADA
2,100,123 UART: persistent_rt::test_persistent_data_layout...[ok]
2,101,366 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,611 ready_for_fw is high
1,060,611 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,556,059 >>> mbox cmd response: success
1,618,089 UART:
1,618,105 UART: Running Caliptra FMC ...
1,618,513 UART:
1,618,567 UART: [state] CFI Enabled
1,629,284 UART: [fht] FMC Alias Private Key: 7
1,737,517 UART: [art] Extend RT PCRs Done
1,737,945 UART: [art] Lock RT PCRs Done
1,739,569 UART: [art] Populate DV Done
1,747,836 UART: [fht] FMC Alias Private Key: 7
1,748,838 UART: [art] Derive CDI
1,749,118 UART: [art] Store in in slot 0x4
1,835,405 UART: [art] Derive Key Pair
1,835,765 UART: [art] Store priv key in slot 0x5
1,849,143 UART: [art] Derive Key Pair - Done
1,863,755 UART: [art] Signing Cert with AUTHO
1,864,235 UART: RITY.KEYID = 7
1,879,799 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,564 UART: [art] PUB.X = A7252E71322BD5DEB6264B57603279D7A1BADA14F4397D8AD35E790409D2C9E8EF3997D7D8EF2C2CC26E130ADC49EECC
1,887,341 UART: [art] PUB.Y = 61E00901847B7AC356AC050B5E55205A66E327224E7AD547E1BCA6FB58A4E62FECD2B9687B4239D278A56BC31489ECFF
1,894,287 UART: [art] SIG.R = 4C30464B1A51AE1678E2E53A108CF66E36E45406C0EC9F4D81F8E6F38B6C132E0DBE19F1786466C9BC1EBF0EF212AF68
1,901,060 UART: [art] SIG.S = A95C12F875F703E2957209CDDA44DE4A7A00B68F710D8CD2CACC9FE611F2C1BD4D10B1E29F3C85E3F65A0BD49E91291E
1,925,040 UART: persistent_rt::test_persistent_data_layout...[ok]
1,926,283 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
901,836 UART: [kat] SHA2-256
903,776 UART: [kat] SHA2-384
906,459 UART: [kat] SHA2-512-ACC
908,360 UART: [kat] ECC-384
918,077 UART: [kat] HMAC-384Kdf
922,727 UART: [kat] LMS
1,171,055 UART: [kat] --
1,171,862 UART: [cold-reset] ++
1,172,234 UART: [fht] FHT @ 0x50003400
1,174,823 UART: [idev] ++
1,174,991 UART: [idev] CDI.KEYID = 6
1,175,351 UART: [idev] SUBJECT.KEYID = 7
1,175,775 UART: [idev] UDS.KEYID = 0
1,176,120 ready_for_fw is high
1,176,120 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,183,905 UART: [idev] Erasing UDS.KEYID = 0
1,200,894 UART: [idev] Sha1 KeyId Algorithm
1,209,376 UART: [idev] --
1,210,514 UART: [ldev] ++
1,210,682 UART: [ldev] CDI.KEYID = 6
1,211,045 UART: [ldev] SUBJECT.KEYID = 5
1,211,471 UART: [ldev] AUTHORITY.KEYID = 7
1,211,934 UART: [ldev] FE.KEYID = 1
1,217,372 UART: [ldev] Erasing FE.KEYID = 1
1,244,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,924 UART: [ldev] --
1,283,315 UART: [fwproc] Wait for Commands...
1,283,917 UART: [fwproc] Recv command 0x46574c44
1,284,645 UART: [fwproc] Recv'd Img size: 31832 bytes
1,636,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,664,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,693,370 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,705,375 >>> mbox cmd response: success
1,706,549 UART: [afmc] ++
1,706,717 UART: [afmc] CDI.KEYID = 6
1,707,079 UART: [afmc] SUBJECT.KEYID = 7
1,707,504 UART: [afmc] AUTHORITY.KEYID = 5
1,743,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,760,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,761,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,766,974 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,772,859 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,778,578 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,786,452 UART: [afmc] --
1,787,570 UART: [cold-reset] --
1,788,400 UART: [state] Locking Datavault
1,789,539 UART: [state] Locking PCR0, PCR1 and PCR31
1,790,143 UART: [state] Locking ICCM
1,790,593 UART: [exit] Launching FMC @ 0x40000130
1,795,922 UART:
1,795,938 UART: Running Caliptra FMC ...
1,796,346 UART:
1,796,489 UART: [state] CFI Enabled
1,807,130 UART: [fht] FMC Alias Private Key: 7
1,914,799 UART: [art] Extend RT PCRs Done
1,915,227 UART: [art] Lock RT PCRs Done
1,916,791 UART: [art] Populate DV Done
1,925,112 UART: [fht] FMC Alias Private Key: 7
1,926,070 UART: [art] Derive CDI
1,926,350 UART: [art] Store in in slot 0x4
2,012,139 UART: [art] Derive Key Pair
2,012,499 UART: [art] Store priv key in slot 0x5
2,026,083 UART: [art] Derive Key Pair - Done
2,040,690 UART: [art] Signing Cert with AUTHO
2,041,170 UART: RITY.KEYID = 7
2,056,686 UART: [art] Erasing AUTHORITY.KEYID = 7
2,057,451 UART: [art] PUB.X = F07BC6EC2662FB83DFEA93DB2418336D1DFE7FCA8BCBF9695616A003E0CBB9BAB8D9F95691E7F436AD97356B4AB04BB7
2,064,242 UART: [art] PUB.Y = 63CA384DE7FA2C073EAF9CDFCAFF57D820E815BA5DB7F0C8CBA3442CBC58052E5D340F51C1F2428BDD0107EB37FB1DEC
2,071,207 UART: [art] SIG.R = 85FE07A07ACF9104D7B920D9A69338FAFB815A23B5E4871485E9BBFA566C500161B4489A85BA8229B1E942065772B79F
2,077,965 UART: [art] SIG.S = 5A45C77ECD2F5ACB328739410A388E7717B1A56C03B891C59D3A0B90C9C3C25C36C5ED263AA90BFFDB70A4D4278AECCF
2,102,307 UART: persistent_rt::test_persistent_data_layout...[ok]
2,103,550 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,570 ready_for_fw is high
1,060,570 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,558,308 >>> mbox cmd response: success
1,621,158 UART:
1,621,174 UART: Running Caliptra FMC ...
1,621,582 UART:
1,621,725 UART: [state] CFI Enabled
1,632,362 UART: [fht] FMC Alias Private Key: 7
1,740,615 UART: [art] Extend RT PCRs Done
1,741,043 UART: [art] Lock RT PCRs Done
1,742,471 UART: [art] Populate DV Done
1,750,610 UART: [fht] FMC Alias Private Key: 7
1,751,562 UART: [art] Derive CDI
1,751,842 UART: [art] Store in in slot 0x4
1,837,215 UART: [art] Derive Key Pair
1,837,575 UART: [art] Store priv key in slot 0x5
1,850,875 UART: [art] Derive Key Pair - Done
1,865,473 UART: [art] Signing Cert with AUTHO
1,865,953 UART: RITY.KEYID = 7
1,880,967 UART: [art] Erasing AUTHORITY.KEYID = 7
1,881,732 UART: [art] PUB.X = 086B3E32C8CF856B3F0D9ECB4985439F2F725C8F6793FD183D079645CA0FC25E707855EEE968763578BF9E85B345E1E0
1,888,492 UART: [art] PUB.Y = 3D5AB5EC8BFA91B1536F651024AA16B0F39FDCFC3B8E9F9D2C2D17A19C8665F1E227D1CD05270BF4575AE73C30C8CF5E
1,895,456 UART: [art] SIG.R = D3CB2FA14E7861B19DA0A3E99521D9D611ABCC0B3C1732D5673DC84E5A9EC2E3A35C70240B7F58F646282D2AFFC89D87
1,902,234 UART: [art] SIG.S = D8A95C2B5BD03D3CCA6ADCA3E812CEB53E6B1774FD9139CC769AC8502320F5002CBD8876B7063A14CC8794B15A0DFBE2
1,925,786 UART: persistent_rt::test_persistent_data_layout...[ok]
1,927,029 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,783 UART: [kat] SHA2-256
901,723 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,661 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,174,707 ready_for_fw is high
1,174,707 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,182,201 UART: [idev] Erasing UDS.KEYID = 0
1,199,697 UART: [idev] Sha1 KeyId Algorithm
1,208,783 UART: [idev] --
1,209,984 UART: [ldev] ++
1,210,152 UART: [ldev] CDI.KEYID = 6
1,210,516 UART: [ldev] SUBJECT.KEYID = 5
1,210,943 UART: [ldev] AUTHORITY.KEYID = 7
1,211,406 UART: [ldev] FE.KEYID = 1
1,216,892 UART: [ldev] Erasing FE.KEYID = 1
1,243,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,194 UART: [ldev] --
1,282,490 UART: [fwproc] Wait for Commands...
1,283,099 UART: [fwproc] Recv command 0x46574c44
1,283,832 UART: [fwproc] Recv'd Img size: 31832 bytes
1,635,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,906 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,704,030 >>> mbox cmd response: success
1,705,277 UART: [afmc] ++
1,705,445 UART: [afmc] CDI.KEYID = 6
1,705,808 UART: [afmc] SUBJECT.KEYID = 7
1,706,234 UART: [afmc] AUTHORITY.KEYID = 5
1,741,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,795 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,678 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,397 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,276 UART: [afmc] --
1,785,362 UART: [cold-reset] --
1,786,368 UART: [state] Locking Datavault
1,787,715 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,319 UART: [state] Locking ICCM
1,788,819 UART: [exit] Launching FMC @ 0x40000130
1,794,148 UART:
1,794,164 UART: Running Caliptra FMC ...
1,794,572 UART:
1,794,626 UART: [state] CFI Enabled
1,805,179 UART: [fht] FMC Alias Private Key: 7
1,913,008 UART: [art] Extend RT PCRs Done
1,913,436 UART: [art] Lock RT PCRs Done
1,914,988 UART: [art] Populate DV Done
1,923,387 UART: [fht] FMC Alias Private Key: 7
1,924,449 UART: [art] Derive CDI
1,924,729 UART: [art] Store in in slot 0x4
2,010,098 UART: [art] Derive Key Pair
2,010,458 UART: [art] Store priv key in slot 0x5
2,024,144 UART: [art] Derive Key Pair - Done
2,038,932 UART: [art] Signing Cert with AUTHO
2,039,412 UART: RITY.KEYID = 7
2,054,546 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,311 UART: [art] PUB.X = 29159631F62309BA2010C67D68DB4077094C3DD114A6F1A14B0AF4BCCB33D3D28A2D273F037398702811087E7C1BE75F
2,062,064 UART: [art] PUB.Y = 9D577810066F03AA9773240FB78634B76A1D164D6B60D7C34FE53078125F0DD0CC7ECE4427D3D0A42A4BDB0AFEC9F054
2,069,007 UART: [art] SIG.R = 81EFEBAF0228DA6CD30007564817275611BD930F7264D68FED079403846EE13E2F08E6F4220F5D9F1D0CF1D91DA95D09
2,075,732 UART: [art] SIG.S = 2E444C6AD8F8259953040AC6D00D7164EF786887F4A9250928DBB52E1B84ABB394506383B7DED4C3FFEEDE67689FAA5B
2,099,336 UART: persistent_rt::test_persistent_data_layout...[ok]
2,100,579 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,278 ready_for_fw is high
1,055,278 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,550,958 >>> mbox cmd response: success
1,612,870 UART:
1,612,886 UART: Running Caliptra FMC ...
1,613,294 UART:
1,613,348 UART: [state] CFI Enabled
1,623,937 UART: [fht] FMC Alias Private Key: 7
1,731,282 UART: [art] Extend RT PCRs Done
1,731,710 UART: [art] Lock RT PCRs Done
1,733,356 UART: [art] Populate DV Done
1,741,785 UART: [fht] FMC Alias Private Key: 7
1,742,957 UART: [art] Derive CDI
1,743,237 UART: [art] Store in in slot 0x4
1,828,744 UART: [art] Derive Key Pair
1,829,104 UART: [art] Store priv key in slot 0x5
1,842,428 UART: [art] Derive Key Pair - Done
1,857,299 UART: [art] Signing Cert with AUTHO
1,857,779 UART: RITY.KEYID = 7
1,872,953 UART: [art] Erasing AUTHORITY.KEYID = 7
1,873,718 UART: [art] PUB.X = C1E509CFD40CFF459663C846BA3D7D96E9E976BEFA79A1BC2F413F080068B08A447BA521BA2889C65CDC65357BB9E885
1,880,469 UART: [art] PUB.Y = 4D322193C633CF8E03BF2EE33A33AC7A7F93BCADBD0387E455A1803202444D5EC83E56815D0708EE8AD59C584AEA9A05
1,887,411 UART: [art] SIG.R = F1D9F3EC828586AC6B46CED03241CCFBEF55A58B875BF4B6B81FFE939A45B30FCDDF067B1BBEA8887C10728600B537E4
1,894,173 UART: [art] SIG.S = 4A013DD0BF6C0EBE763E26F2F0FCC6CCAB2C2A77AFCD9197D8FCF8F27A87DF561ADA7D5CBE60499814089D1114042CEE
1,917,983 UART: persistent_rt::test_persistent_data_layout...[ok]
1,919,226 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
891,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
915,983 UART: [kat] HMAC-384Kdf
920,795 UART: [kat] LMS
1,169,107 UART: [kat] --
1,170,028 UART: [cold-reset] ++
1,170,432 UART: [fht] FHT @ 0x50003400
1,173,156 UART: [idev] ++
1,173,324 UART: [idev] CDI.KEYID = 6
1,173,685 UART: [idev] SUBJECT.KEYID = 7
1,174,110 UART: [idev] UDS.KEYID = 0
1,174,456 ready_for_fw is high
1,174,456 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,182,156 UART: [idev] Erasing UDS.KEYID = 0
1,199,540 UART: [idev] Sha1 KeyId Algorithm
1,208,440 UART: [idev] --
1,209,703 UART: [ldev] ++
1,209,871 UART: [ldev] CDI.KEYID = 6
1,210,235 UART: [ldev] SUBJECT.KEYID = 5
1,210,662 UART: [ldev] AUTHORITY.KEYID = 7
1,211,125 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,101 UART: [ldev] --
1,283,495 UART: [fwproc] Wait for Commands...
1,284,286 UART: [fwproc] Recv command 0x46574c44
1,285,019 UART: [fwproc] Recv'd Img size: 31832 bytes
1,637,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,664,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,693,937 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,706,055 >>> mbox cmd response: success
1,707,196 UART: [afmc] ++
1,707,364 UART: [afmc] CDI.KEYID = 6
1,707,727 UART: [afmc] SUBJECT.KEYID = 7
1,708,153 UART: [afmc] AUTHORITY.KEYID = 5
1,743,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,760,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,761,483 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,767,212 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,773,095 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,778,814 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,786,759 UART: [afmc] --
1,787,721 UART: [cold-reset] --
1,788,323 UART: [state] Locking Datavault
1,789,302 UART: [state] Locking PCR0, PCR1 and PCR31
1,789,906 UART: [state] Locking ICCM
1,790,484 UART: [exit] Launching FMC @ 0x40000130
1,795,813 UART:
1,795,829 UART: Running Caliptra FMC ...
1,796,237 UART:
1,796,380 UART: [state] CFI Enabled
1,807,235 UART: [fht] FMC Alias Private Key: 7
1,915,368 UART: [art] Extend RT PCRs Done
1,915,796 UART: [art] Lock RT PCRs Done
1,917,110 UART: [art] Populate DV Done
1,925,145 UART: [fht] FMC Alias Private Key: 7
1,926,091 UART: [art] Derive CDI
1,926,371 UART: [art] Store in in slot 0x4
2,012,210 UART: [art] Derive Key Pair
2,012,570 UART: [art] Store priv key in slot 0x5
2,026,132 UART: [art] Derive Key Pair - Done
2,040,975 UART: [art] Signing Cert with AUTHO
2,041,455 UART: RITY.KEYID = 7
2,056,647 UART: [art] Erasing AUTHORITY.KEYID = 7
2,057,412 UART: [art] PUB.X = 1A0507530E3EC255FC7C5FD1ED7EA4C04D5B70FAA46083C78EF8A194148434D47B8203EF19812ABEC2FA8324A7894A72
2,064,178 UART: [art] PUB.Y = 12F60C9EE8A4B1D9A76E590592524E11958FFDDB86CEAA1EB83466A87692D13AF4FB9069C1328A7753F75130E73BA94A
2,071,128 UART: [art] SIG.R = F2CC353CB0B0574290D5254C0DB3E9753250EB8EA4B98961F0C3F3D87105138003DC621DCA7E5DB534C62E59FE211F39
2,077,893 UART: [art] SIG.S = 826CF8A152665A9F28CB35F303B20FB2CF5EDEF5AE7E36610AB18DBB8254A768FAB88539B3C3BBBAF0DB02E06E206445
2,102,361 UART: persistent_rt::test_persistent_data_layout...[ok]
2,103,604 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,547 ready_for_fw is high
1,056,547 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,553,173 >>> mbox cmd response: success
1,615,665 UART:
1,615,681 UART: Running Caliptra FMC ...
1,616,089 UART:
1,616,232 UART: [state] CFI Enabled
1,627,045 UART: [fht] FMC Alias Private Key: 7
1,735,400 UART: [art] Extend RT PCRs Done
1,735,828 UART: [art] Lock RT PCRs Done
1,737,492 UART: [art] Populate DV Done
1,745,569 UART: [fht] FMC Alias Private Key: 7
1,746,601 UART: [art] Derive CDI
1,746,881 UART: [art] Store in in slot 0x4
1,832,718 UART: [art] Derive Key Pair
1,833,078 UART: [art] Store priv key in slot 0x5
1,846,654 UART: [art] Derive Key Pair - Done
1,861,256 UART: [art] Signing Cert with AUTHO
1,861,736 UART: RITY.KEYID = 7
1,876,844 UART: [art] Erasing AUTHORITY.KEYID = 7
1,877,609 UART: [art] PUB.X = 4E4CC6D7DA1930BF552674AB2D38B6C3D05961E9585A0613375FA20F52DE4F6DFAD12C4BA9E1BE6269A80495AEC3422E
1,884,382 UART: [art] PUB.Y = CE32EB65A6561C484CC409915714F3D4F8819B3FB7E648D1969B154F50F196F8DEA798E6DC10BC1EC67BA961B88C32AD
1,891,339 UART: [art] SIG.R = E403FBD7EE434612ED5F29A1D763F5B60D8BD3994B27CA2F5DF378AA15EC4B6252E332EB8ADD8D6BCC93A52EFF289FD8
1,898,127 UART: [art] SIG.S = 0B40475CADC4AA3464AFCF5E5E96B958DF088B255F5D639ED97F9E311FEDE0DF570448FCB6D6E92E0E7F2C9A86CA6CEB
1,921,905 UART: persistent_rt::test_persistent_data_layout...[ok]
1,923,148 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
191,969 UART:
192,351 UART: Running Caliptra ROM ...
193,539 UART:
193,700 UART: [state] CFI Enabled
262,420 UART: [state] LifecycleState = Unprovisioned
264,402 UART: [state] DebugLocked = No
267,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,721 UART: [kat] SHA2-256
441,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,946 UART: [kat] ++
452,444 UART: [kat] sha1
463,675 UART: [kat] SHA2-256
466,395 UART: [kat] SHA2-384
473,660 UART: [kat] SHA2-512-ACC
476,034 UART: [kat] ECC-384
2,769,277 UART: [kat] HMAC-384Kdf
2,799,715 UART: [kat] LMS
3,989,994 UART: [kat] --
3,995,989 UART: [cold-reset] ++
3,997,139 UART: [fht] Storing FHT @ 0x50003400
4,009,332 UART: [idev] ++
4,009,908 UART: [idev] CDI.KEYID = 6
4,010,833 UART: [idev] SUBJECT.KEYID = 7
4,012,083 UART: [idev] UDS.KEYID = 0
4,013,079 ready_for_fw is high
4,013,281 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,823 UART: [idev] Erasing UDS.KEYID = 0
7,346,238 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,633 UART: [idev] --
7,372,354 UART: [ldev] ++
7,372,977 UART: [ldev] CDI.KEYID = 6
7,373,865 UART: [ldev] SUBJECT.KEYID = 5
7,375,129 UART: [ldev] AUTHORITY.KEYID = 7
7,376,333 UART: [ldev] FE.KEYID = 1
7,421,872 UART: [ldev] Erasing FE.KEYID = 1
10,753,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,359 UART: [ldev] --
13,114,653 UART: [fwproc] Waiting for Commands...
13,117,509 UART: [fwproc] Received command 0x46574c44
13,119,696 UART: [fwproc] Received Image of size 114124 bytes
17,172,349 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,714 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,576 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,637,122 >>> mbox cmd response: success
17,641,754 UART: [afmc] ++
17,642,371 UART: [afmc] CDI.KEYID = 6
17,643,290 UART: [afmc] SUBJECT.KEYID = 7
17,644,511 UART: [afmc] AUTHORITY.KEYID = 5
21,003,181 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,026 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,282 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,704 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,530 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,991 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,141 UART: [afmc] --
23,376,113 UART: [cold-reset] --
23,379,386 UART: [state] Locking Datavault
23,385,988 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,686 UART: [state] Locking ICCM
23,389,460 UART: [exit] Launching FMC @ 0x40000130
23,397,856 UART:
23,398,116 UART: Running Caliptra FMC ...
23,399,222 UART:
23,399,384 UART: [state] CFI Enabled
23,466,890 UART: [fht] FMC Alias Private Key: 7
25,805,382 UART: [art] Extend RT PCRs Done
25,806,745 UART: [art] Lock RT PCRs Done
25,808,269 UART: [art] Populate DV Done
25,813,303 UART: [fht] FMC Alias Private Key: 7
25,814,787 UART: [art] Derive CDI
25,815,552 UART: [art] Store in in slot 0x4
25,875,892 UART: [art] Derive Key Pair
25,876,887 UART: [art] Store priv key in slot 0x5
29,169,519 UART: [art] Derive Key Pair - Done
29,182,945 UART: [art] Signing Cert with AUTHO
29,184,254 UART: RITY.KEYID = 7
31,471,553 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,087 UART: [art] PUB.X = B26006379660F4BE30B933D394038814004F6B96CF0197A4C533E3B80D678FE311969E9E75CE47D02E8B6C81203FFF2A
31,480,278 UART: [art] PUB.Y = 7DA90628A4F0F0FE60D42A908098A99300584C1C34BB327935904327704711FD102964CFC1B11BEAD792C472E5E01BF9
31,487,495 UART: [art] SIG.R = E01D23F60D2317A226035BF78CF9F67F1812122DDFC68F0485C3A9027267F907EFB5894CA09271454868C0721BAC3F07
31,494,903 UART: [art] SIG.S = 40AD26056CD3970C771E51FDF9A3DA704AEF7989E88C8CB1D9D2B53E501B95754752E0C5356E4D37FDC611D8866DA475
32,800,076 UART: Caliptra RT
32,800,796 UART: [state] CFI Enabled
32,962,481 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,805,281 ready_for_fw is high
3,805,717 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,886,309 >>> mbox cmd response: success
23,588,533 UART:
23,588,962 UART: Running Caliptra FMC ...
23,590,079 UART:
23,590,239 UART: [state] CFI Enabled
23,660,315 UART: [fht] FMC Alias Private Key: 7
25,998,371 UART: [art] Extend RT PCRs Done
25,999,594 UART: [art] Lock RT PCRs Done
26,001,191 UART: [art] Populate DV Done
26,006,395 UART: [fht] FMC Alias Private Key: 7
26,008,052 UART: [art] Derive CDI
26,008,803 UART: [art] Store in in slot 0x4
26,069,267 UART: [art] Derive Key Pair
26,070,312 UART: [art] Store priv key in slot 0x5
29,363,082 UART: [art] Derive Key Pair - Done
29,376,011 UART: [art] Signing Cert with AUTHO
29,377,323 UART: RITY.KEYID = 7
31,665,631 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,143 UART: [art] PUB.X = C41C406ED1F56D7A15C7F93F49B732F76FF40E78E32CCDD7A55ECF3FFDAEB6BB8EC9BF51F9EDD34FC192C612D200F03F
31,674,417 UART: [art] PUB.Y = 05A481A44A4284D85C9B5F989FB129532A732EA601E8BCFBA0D9225CA9ADF7A4690C37C1534B95C50AF022EE451FAE94
31,681,694 UART: [art] SIG.R = 015F8501BC4EDB299BAD2364EFD157736F25CA3A8C394B861E2576C1573D27E76E4A36479C19304A11E89864768F7FA3
31,689,059 UART: [art] SIG.S = 6202A173E3DAF74381035AD778B191D5F28330D42C8C0C27C66B70C730BF6297068C885560D3490A17081D3EE92CEACF
32,994,177 UART: Caliptra RT
32,994,879 UART: [state] CFI Enabled
33,156,529 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,548 UART:
192,919 UART: Running Caliptra ROM ...
194,117 UART:
603,657 UART: [state] CFI Enabled
619,449 UART: [state] LifecycleState = Unprovisioned
621,364 UART: [state] DebugLocked = No
623,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,621 UART: [kat] SHA2-256
797,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,933 UART: [kat] ++
808,372 UART: [kat] sha1
818,526 UART: [kat] SHA2-256
821,254 UART: [kat] SHA2-384
826,740 UART: [kat] SHA2-512-ACC
829,100 UART: [kat] ECC-384
3,112,666 UART: [kat] HMAC-384Kdf
3,125,259 UART: [kat] LMS
4,315,413 UART: [kat] --
4,319,764 UART: [cold-reset] ++
4,320,911 UART: [fht] Storing FHT @ 0x50003400
4,333,025 UART: [idev] ++
4,333,597 UART: [idev] CDI.KEYID = 6
4,334,502 UART: [idev] SUBJECT.KEYID = 7
4,335,734 UART: [idev] UDS.KEYID = 0
4,336,764 ready_for_fw is high
4,336,959 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,284 UART: [idev] Erasing UDS.KEYID = 0
7,623,198 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,026 UART: [idev] --
7,649,938 UART: [ldev] ++
7,650,558 UART: [ldev] CDI.KEYID = 6
7,651,439 UART: [ldev] SUBJECT.KEYID = 5
7,652,693 UART: [ldev] AUTHORITY.KEYID = 7
7,653,977 UART: [ldev] FE.KEYID = 1
7,664,605 UART: [ldev] Erasing FE.KEYID = 1
10,953,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,124 UART: [ldev] --
13,316,068 UART: [fwproc] Waiting for Commands...
13,318,536 UART: [fwproc] Received command 0x46574c44
13,320,709 UART: [fwproc] Received Image of size 114124 bytes
17,374,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,593 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,478 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,754 >>> mbox cmd response: success
17,842,817 UART: [afmc] ++
17,843,409 UART: [afmc] CDI.KEYID = 6
17,844,289 UART: [afmc] SUBJECT.KEYID = 7
17,845,550 UART: [afmc] AUTHORITY.KEYID = 5
21,157,696 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,908 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,218 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,576 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,405 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,849 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,336 UART: [afmc] --
23,525,163 UART: [cold-reset] --
23,530,612 UART: [state] Locking Datavault
23,536,342 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,090 UART: [state] Locking ICCM
23,539,483 UART: [exit] Launching FMC @ 0x40000130
23,547,872 UART:
23,548,099 UART: Running Caliptra FMC ...
23,549,196 UART:
23,549,348 UART: [state] CFI Enabled
23,557,333 UART: [fht] FMC Alias Private Key: 7
25,888,495 UART: [art] Extend RT PCRs Done
25,889,718 UART: [art] Lock RT PCRs Done
25,891,228 UART: [art] Populate DV Done
25,896,476 UART: [fht] FMC Alias Private Key: 7
25,898,170 UART: [art] Derive CDI
25,898,980 UART: [art] Store in in slot 0x4
25,941,423 UART: [art] Derive Key Pair
25,942,504 UART: [art] Store priv key in slot 0x5
29,184,545 UART: [art] Derive Key Pair - Done
29,197,485 UART: [art] Signing Cert with AUTHO
29,198,783 UART: RITY.KEYID = 7
31,477,940 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,443 UART: [art] PUB.X = 7DBFDE12F8170A67656547D639ADFF923E79E6E2D711BA096F1018D423558E235A56A901E99F58CE5474F20377F93A5A
31,486,680 UART: [art] PUB.Y = 589FCFF90D5CA93F26EF5DFF2A0326332FF1C1C47F030C9816DE0D1003B8D36D799791D3E87EAB7E0B5107930986FB45
31,493,908 UART: [art] SIG.R = C709697C1771B7D2F5AEC67B662A8CE8202CCF6D80285B20E5E222258B8B5C547CD7C2BAA83EB4F941F62A54C3566C3D
31,501,328 UART: [art] SIG.S = 589DE15027D7794CA3D4CA4A416E28BEA6F6B1771F5E712DFEA6B16DC8A3CA699DF7F17318899310AD8A4F98A81044D2
32,806,128 UART: Caliptra RT
32,806,844 UART: [state] CFI Enabled
32,924,716 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
4,126,092 ready_for_fw is high
4,126,543 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,060,475 >>> mbox cmd response: success
23,697,611 UART:
23,697,994 UART: Running Caliptra FMC ...
23,699,092 UART:
23,699,242 UART: [state] CFI Enabled
23,707,142 UART: [fht] FMC Alias Private Key: 7
26,037,397 UART: [art] Extend RT PCRs Done
26,038,625 UART: [art] Lock RT PCRs Done
26,040,171 UART: [art] Populate DV Done
26,045,621 UART: [fht] FMC Alias Private Key: 7
26,047,191 UART: [art] Derive CDI
26,047,963 UART: [art] Store in in slot 0x4
26,090,832 UART: [art] Derive Key Pair
26,091,855 UART: [art] Store priv key in slot 0x5
29,333,723 UART: [art] Derive Key Pair - Done
29,346,779 UART: [art] Signing Cert with AUTHO
29,348,088 UART: RITY.KEYID = 7
31,627,496 UART: [art] Erasing AUTHORITY.KEYID = 7
31,629,002 UART: [art] PUB.X = F8B4EC51E48B6F0A1638E564FE8532EAA5B7C130B5CC1F5CD5D82AE2C832BD95F6A09D0D1FE698EABC0C907F9A7F7A94
31,636,254 UART: [art] PUB.Y = F3FD037C119C04235A9C465DADFD7B4D837B1EDB5B2EBA4FB17E18FAB848ADD1B2013AC6212F44B1457320E82AC4FC1B
31,643,515 UART: [art] SIG.R = 0A9994776E107E8399AD24FF116E165AA783333FC3D8B16481F29D387AABF7CFF53BB26E91DFEE0B12248B2D3E0A5F5E
31,650,914 UART: [art] SIG.S = 86B981653592F5A780BD4B70CE5251EA121DD373B7646213478BFBBA83DD4E4B3E31A3F49B7E148B5E4F43D438812A23
32,956,522 UART: Caliptra RT
32,957,230 UART: [state] CFI Enabled
33,074,989 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,058 UART:
192,445 UART: Running Caliptra ROM ...
193,645 UART:
193,812 UART: [state] CFI Enabled
262,917 UART: [state] LifecycleState = Unprovisioned
264,845 UART: [state] DebugLocked = No
266,166 UART: [state] WD Timer not started. Device not locked for debugging
270,126 UART: [kat] SHA2-256
449,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,837 UART: [kat] ++
461,374 UART: [kat] sha1
472,470 UART: [kat] SHA2-256
475,501 UART: [kat] SHA2-384
480,568 UART: [kat] SHA2-512-ACC
483,500 UART: [kat] ECC-384
2,930,828 UART: [kat] HMAC-384Kdf
2,951,052 UART: [kat] LMS
3,480,528 UART: [kat] --
3,484,027 UART: [cold-reset] ++
3,485,955 UART: [fht] FHT @ 0x50003400
3,496,935 UART: [idev] ++
3,497,495 UART: [idev] CDI.KEYID = 6
3,498,455 UART: [idev] SUBJECT.KEYID = 7
3,499,626 UART: [idev] UDS.KEYID = 0
3,500,636 ready_for_fw is high
3,500,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,644,919 UART: [idev] Erasing UDS.KEYID = 0
6,004,232 UART: [idev] Sha1 KeyId Algorithm
6,027,998 UART: [idev] --
6,031,946 UART: [ldev] ++
6,032,517 UART: [ldev] CDI.KEYID = 6
6,033,402 UART: [ldev] SUBJECT.KEYID = 5
6,034,511 UART: [ldev] AUTHORITY.KEYID = 7
6,035,857 UART: [ldev] FE.KEYID = 1
6,079,423 UART: [ldev] Erasing FE.KEYID = 1
8,584,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,312 UART: [ldev] --
10,394,733 UART: [fwproc] Wait for Commands...
10,396,230 UART: [fwproc] Recv command 0x46574c44
10,398,269 UART: [fwproc] Recv'd Img size: 114448 bytes
13,810,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,952 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,273,019 >>> mbox cmd response: success
14,277,171 UART: [afmc] ++
14,277,769 UART: [afmc] CDI.KEYID = 6
14,278,680 UART: [afmc] SUBJECT.KEYID = 7
14,279,838 UART: [afmc] AUTHORITY.KEYID = 5
16,808,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,578 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,369 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,026 UART: [afmc] --
18,605,188 UART: [cold-reset] --
18,608,249 UART: [state] Locking Datavault
18,614,952 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,589 UART: [state] Locking ICCM
18,617,904 UART: [exit] Launching FMC @ 0x40000130
18,626,292 UART:
18,626,521 UART: Running Caliptra FMC ...
18,627,545 UART:
18,627,691 UART: [state] CFI Enabled
18,690,218 UART: [fht] FMC Alias Private Key: 7
20,453,237 UART: [art] Extend RT PCRs Done
20,454,454 UART: [art] Lock RT PCRs Done
20,456,214 UART: [art] Populate DV Done
20,461,464 UART: [fht] FMC Alias Private Key: 7
20,463,162 UART: [art] Derive CDI
20,463,976 UART: [art] Store in in slot 0x4
20,522,856 UART: [art] Derive Key Pair
20,523,913 UART: [art] Store priv key in slot 0x5
22,987,218 UART: [art] Derive Key Pair - Done
23,000,429 UART: [art] Signing Cert with AUTHO
23,001,729 UART: RITY.KEYID = 7
24,713,388 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,886 UART: [art] PUB.X = 3CF23EFF071BE7CE432A4825E96F93AB05B8C25D5BBBCE525916C66E6EEEEAC62C171A3D757FC6C03A501D70AEC2352D
24,722,194 UART: [art] PUB.Y = D903BED848BB231DE85F55DE05A25D480DF5F596296B7977207590B71D98CB1F18844C3C47E8CCC629531DE1A186E664
24,729,409 UART: [art] SIG.R = 46C3C14B63EBC86CB395AC51085EC1B8E7C81C6564ADFBB13B5894468F5599464669FCE7163BAFD96B72F676109AB9DC
24,736,814 UART: [art] SIG.S = E545CC27B89350CF9038147E55EA855286D50E14CF777E7AD479D0CC38CCF3C3A6F689309074F1F21DE842402B0407B3
25,716,419 UART: Caliptra RT
25,717,124 UART: [state] CFI Enabled
25,881,849 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,382,421 ready_for_fw is high
3,382,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,096,837 >>> mbox cmd response: success
18,384,262 UART:
18,384,644 UART: Running Caliptra FMC ...
18,385,840 UART:
18,386,006 UART: [state] CFI Enabled
18,453,209 UART: [fht] FMC Alias Private Key: 7
20,217,781 UART: [art] Extend RT PCRs Done
20,219,018 UART: [art] Lock RT PCRs Done
20,220,873 UART: [art] Populate DV Done
20,226,289 UART: [fht] FMC Alias Private Key: 7
20,227,884 UART: [art] Derive CDI
20,228,700 UART: [art] Store in in slot 0x4
20,286,366 UART: [art] Derive Key Pair
20,287,412 UART: [art] Store priv key in slot 0x5
22,750,861 UART: [art] Derive Key Pair - Done
22,763,858 UART: [art] Signing Cert with AUTHO
22,765,161 UART: RITY.KEYID = 7
24,476,397 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,896 UART: [art] PUB.X = 1445BF15BDDF1A27D61A5D323A332E6A2C9A72ADCE3125B101936FA6E7D9B441204A8DDF1922A50A39BE45430AAC19A3
24,485,149 UART: [art] PUB.Y = D8883EDEA137F1BC749FB3C9DEECD8F43BE97E4DC9FDE82689DEBC05FA3A921A16C1EF1F321FFE52BC5C837F2B93F1C6
24,492,460 UART: [art] SIG.R = E823D8CF62E036E3248F351092C3ED6EE41D95ABE18EE5A34D4D844E73CFC87F273111FAAE06EB1E679A88ABCCCC3FDD
24,499,916 UART: [art] SIG.S = A2A002ABCC8C9308A8BF1D8798FDE50A083A20292916FC9F990DB597767A92479802EBF69C9DB98EAF628CD7BA965AC5
25,478,297 UART: Caliptra RT
25,479,003 UART: [state] CFI Enabled
25,642,737 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,397 UART:
192,748 UART: Running Caliptra ROM ...
193,926 UART:
603,438 UART: [state] CFI Enabled
617,803 UART: [state] LifecycleState = Unprovisioned
619,673 UART: [state] DebugLocked = No
621,191 UART: [state] WD Timer not started. Device not locked for debugging
624,512 UART: [kat] SHA2-256
803,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,165 UART: [kat] ++
815,715 UART: [kat] sha1
826,587 UART: [kat] SHA2-256
829,579 UART: [kat] SHA2-384
834,846 UART: [kat] SHA2-512-ACC
837,782 UART: [kat] ECC-384
3,277,415 UART: [kat] HMAC-384Kdf
3,289,154 UART: [kat] LMS
3,818,645 UART: [kat] --
3,822,281 UART: [cold-reset] ++
3,824,703 UART: [fht] FHT @ 0x50003400
3,834,762 UART: [idev] ++
3,835,370 UART: [idev] CDI.KEYID = 6
3,836,248 UART: [idev] SUBJECT.KEYID = 7
3,837,375 UART: [idev] UDS.KEYID = 0
3,838,351 ready_for_fw is high
3,838,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,982,104 UART: [idev] Erasing UDS.KEYID = 0
6,312,665 UART: [idev] Sha1 KeyId Algorithm
6,335,809 UART: [idev] --
6,339,911 UART: [ldev] ++
6,340,478 UART: [ldev] CDI.KEYID = 6
6,341,382 UART: [ldev] SUBJECT.KEYID = 5
6,342,532 UART: [ldev] AUTHORITY.KEYID = 7
6,343,807 UART: [ldev] FE.KEYID = 1
6,356,226 UART: [ldev] Erasing FE.KEYID = 1
8,834,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,312 UART: [ldev] --
10,624,080 UART: [fwproc] Wait for Commands...
10,626,350 UART: [fwproc] Recv command 0x46574c44
10,628,448 UART: [fwproc] Recv'd Img size: 114448 bytes
14,034,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,511 >>> mbox cmd response: success
14,491,642 UART: [afmc] ++
14,492,233 UART: [afmc] CDI.KEYID = 6
14,493,114 UART: [afmc] SUBJECT.KEYID = 7
14,494,323 UART: [afmc] AUTHORITY.KEYID = 5
16,988,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,296 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,323 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,170 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,211 UART: [afmc] --
18,785,235 UART: [cold-reset] --
18,788,393 UART: [state] Locking Datavault
18,793,358 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,008 UART: [state] Locking ICCM
18,797,270 UART: [exit] Launching FMC @ 0x40000130
18,805,664 UART:
18,805,902 UART: Running Caliptra FMC ...
18,806,993 UART:
18,807,148 UART: [state] CFI Enabled
18,815,403 UART: [fht] FMC Alias Private Key: 7
20,572,402 UART: [art] Extend RT PCRs Done
20,573,619 UART: [art] Lock RT PCRs Done
20,575,453 UART: [art] Populate DV Done
20,580,862 UART: [fht] FMC Alias Private Key: 7
20,582,391 UART: [art] Derive CDI
20,583,214 UART: [art] Store in in slot 0x4
20,625,907 UART: [art] Derive Key Pair
20,626,901 UART: [art] Store priv key in slot 0x5
23,054,399 UART: [art] Derive Key Pair - Done
23,067,285 UART: [art] Signing Cert with AUTHO
23,068,586 UART: RITY.KEYID = 7
24,774,001 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,506 UART: [art] PUB.X = 33E0B288B975A4414EF73CACF8C539D4E2E82A1AE9177C2EE194DD754AEF0CDA8864CF80E9291816FB154C1D631246A4
24,782,810 UART: [art] PUB.Y = 5D92E7315440E85F881FE4E092313EC9C24B4D6048B3A6341F0FDBAF3E8576636778C0408128D8B0A8E5352E15C2EA9D
24,790,113 UART: [art] SIG.R = FD137759EBCEE5C5AF1CFB6A2497075F06AD128BE234C0EABDF983FE62E95E27EBA7B597842622D40530982299FBC2BF
24,797,453 UART: [art] SIG.S = 218D820F12A56ED2367948D1021BD099F1A5091352D62A104A5A0F309860BF9F375F691A8985BB15A8A628595A0FD6A9
25,776,327 UART: Caliptra RT
25,777,010 UART: [state] CFI Enabled
25,894,495 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,696,739 ready_for_fw is high
3,697,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,033 >>> mbox cmd response: success
18,524,806 UART:
18,525,205 UART: Running Caliptra FMC ...
18,526,406 UART:
18,526,569 UART: [state] CFI Enabled
18,534,681 UART: [fht] FMC Alias Private Key: 7
20,291,572 UART: [art] Extend RT PCRs Done
20,292,798 UART: [art] Lock RT PCRs Done
20,294,479 UART: [art] Populate DV Done
20,299,887 UART: [fht] FMC Alias Private Key: 7
20,301,423 UART: [art] Derive CDI
20,302,181 UART: [art] Store in in slot 0x4
20,344,821 UART: [art] Derive Key Pair
20,345,815 UART: [art] Store priv key in slot 0x5
22,772,435 UART: [art] Derive Key Pair - Done
22,785,711 UART: [art] Signing Cert with AUTHO
22,787,006 UART: RITY.KEYID = 7
24,492,133 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,655 UART: [art] PUB.X = CDB1841CBFE4E3F9473E5517D88467F40229A43C9B139F425B21BF6C472D2C15CB778B55BF88E3451228E9494C8027E6
24,500,906 UART: [art] PUB.Y = E14B5235095ED3A58CE1564546EE29B727675110331C4763ED85275A22D0CE107F51B5CE57668D0E4C808178B90EF8E7
24,508,164 UART: [art] SIG.R = 512649B8CD06DFD79E400333D0C56665D0AE4307893EB1F83A01050510197391BB67D5435AA8391BAA6C0E7CD1A0ED68
24,515,500 UART: [art] SIG.S = F3C6EB13AAC5820CA771B3AB1E2A37532C062C0A6700796A52B035955D50BD68AA466C9FAD5CB36717DBB786FB8466D0
25,494,369 UART: Caliptra RT
25,495,086 UART: [state] CFI Enabled
25,612,909 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,687 writing to cptra_bootfsm_go
3,437,446 ready_for_fw is high
3,437,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,605 >>> mbox cmd response: success
19,029,221 UART:
19,029,615 UART: Running Caliptra FMC ...
19,030,760 UART:
19,030,948 UART: [state] CFI Enabled
19,097,837 UART: [fht] FMC Alias Private Key: 7
20,861,785 UART: [art] Extend RT PCRs Done
20,862,997 UART: [art] Lock RT PCRs Done
20,864,564 UART: [art] Populate DV Done
20,870,136 UART: [fht] FMC Alias Private Key: 7
20,871,623 UART: [art] Derive CDI
20,872,385 UART: [art] Store in in slot 0x4
20,931,001 UART: [art] Derive Key Pair
20,932,045 UART: [art] Store priv key in slot 0x5
23,394,853 UART: [art] Derive Key Pair - Done
23,407,955 UART: [art] Signing Cert with AUTHO
23,409,255 UART: RITY.KEYID = 7
25,121,072 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,726 UART: [art] PUB.X = F93B1E228010C8392B7F0018790D172566B5B6CD26A12B43A2E2612965FCB0E4B689D4E5F9F1808B818201536CCE433D
25,129,816 UART: [art] PUB.Y = 329E2418FAE62AA1778BF5F7502FE5A2778147220E65ABB06226CF889AC903FAE7400312FDEAE101991F1AB557F6E4E2
25,137,090 UART: [art] SIG.R = 33450917BAD9D4C4A0F68E8AF6B75AF05840F7707829BBA2768B847F05335F2AA64C53554B5B925AC1A4EF2B2297500D
25,144,487 UART: [art] SIG.S = 17285665C21C305B82ECE5651EB0CD4C3BD4C8A71DE71F4F1288DD0E9D219E26EC710EAE5E0CC74BCE1B3A6B0F61EA66
26,123,309 UART: Caliptra RT
26,124,016 UART: [state] CFI Enabled
26,289,633 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,757,011 ready_for_fw is high
3,757,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,452 >>> mbox cmd response: success
19,208,978 UART:
19,209,362 UART: Running Caliptra FMC ...
19,210,556 UART:
19,210,714 UART: [state] CFI Enabled
19,218,543 UART: [fht] FMC Alias Private Key: 7
20,975,257 UART: [art] Extend RT PCRs Done
20,976,479 UART: [art] Lock RT PCRs Done
20,978,321 UART: [art] Populate DV Done
20,983,698 UART: [fht] FMC Alias Private Key: 7
20,985,353 UART: [art] Derive CDI
20,986,161 UART: [art] Store in in slot 0x4
21,028,744 UART: [art] Derive Key Pair
21,029,731 UART: [art] Store priv key in slot 0x5
23,456,514 UART: [art] Derive Key Pair - Done
23,469,235 UART: [art] Signing Cert with AUTHO
23,470,536 UART: RITY.KEYID = 7
25,176,120 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,627 UART: [art] PUB.X = 79EA8F2781B0CDC57FFAC56035A988D4C167BB15CAB16D633F33710AF1B6DEC6537B394F6961FD57815E4BE016E9B2D4
25,184,872 UART: [art] PUB.Y = B320B488C3AD1125BAC0F90B2EED592D0E231D984100B1D363EF1BBDF1A8C6DE6B0589EF94E81B597C68EC3ED4060521
25,192,118 UART: [art] SIG.R = E27F8BBE750B2DEED13E9B2F5331F2332831240FDB59505D4C3438A6AD45BBC39C617FA5FC6312D81C15BFCE91154ADE
25,199,542 UART: [art] SIG.S = 4A59345C91E3CB471A3E0D0106245F782FB6AA48580EACD24ACC02478D6F751F357FBFF93C5728E189BF92352776210E
26,178,388 UART: Caliptra RT
26,179,070 UART: [state] CFI Enabled
26,296,069 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,295 UART: [kat] SHA2-256
892,233 UART: [kat] SHA2-384
894,754 UART: [kat] SHA2-512-ACC
896,655 UART: [kat] ECC-384
901,998 UART: [kat] HMAC-384Kdf
906,504 UART: [kat] LMS
1,474,700 UART: [kat] --
1,475,497 UART: [cold-reset] ++
1,476,065 UART: [fht] Storing FHT @ 0x50003400
1,478,930 UART: [idev] ++
1,479,098 UART: [idev] CDI.KEYID = 6
1,479,458 UART: [idev] SUBJECT.KEYID = 7
1,479,882 UART: [idev] UDS.KEYID = 0
1,480,227 ready_for_fw is high
1,480,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,892 UART: [idev] Erasing UDS.KEYID = 0
1,504,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,860 UART: [idev] --
1,513,975 UART: [ldev] ++
1,514,143 UART: [ldev] CDI.KEYID = 6
1,514,506 UART: [ldev] SUBJECT.KEYID = 5
1,514,932 UART: [ldev] AUTHORITY.KEYID = 7
1,515,395 UART: [ldev] FE.KEYID = 1
1,520,623 UART: [ldev] Erasing FE.KEYID = 1
1,545,494 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,204 UART: [ldev] --
1,584,623 UART: [fwproc] Waiting for Commands...
1,585,488 UART: [fwproc] Received command 0x46574c44
1,586,279 UART: [fwproc] Received Image of size 114448 bytes
2,886,836 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,984 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,336 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,501 >>> mbox cmd response: success
3,081,545 UART: [afmc] ++
3,081,713 UART: [afmc] CDI.KEYID = 6
3,082,075 UART: [afmc] SUBJECT.KEYID = 7
3,082,500 UART: [afmc] AUTHORITY.KEYID = 5
3,117,727 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,921 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,701 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,429 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,314 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,004 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,893 UART: [afmc] --
3,160,943 UART: [cold-reset] --
3,161,895 UART: [state] Locking Datavault
3,163,150 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,754 UART: [state] Locking ICCM
3,164,336 UART: [exit] Launching FMC @ 0x40000130
3,169,665 UART:
3,169,681 UART: Running Caliptra FMC ...
3,170,089 UART:
3,170,143 UART: [state] CFI Enabled
3,180,640 UART: [fht] FMC Alias Private Key: 7
3,288,159 UART: [art] Extend RT PCRs Done
3,288,587 UART: [art] Lock RT PCRs Done
3,290,161 UART: [art] Populate DV Done
3,298,136 UART: [fht] FMC Alias Private Key: 7
3,299,150 UART: [art] Derive CDI
3,299,430 UART: [art] Store in in slot 0x4
3,385,291 UART: [art] Derive Key Pair
3,385,651 UART: [art] Store priv key in slot 0x5
3,398,525 UART: [art] Derive Key Pair - Done
3,413,418 UART: [art] Signing Cert with AUTHO
3,413,898 UART: RITY.KEYID = 7
3,428,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,679 UART: [art] PUB.X = 8FA3F9CE5B7F40E564B41BC03ECBD0FEEA03A11C0867FF3FC93D08407983D775F42E7FEA0EB5111F859F24873113BCCB
3,436,455 UART: [art] PUB.Y = CD133D2B27809BDEC99D09E974692349D89A9ACDB9F4B902F5B4E9532467D1B0436EBAC32F12C38E7254F610BBA3E967
3,443,407 UART: [art] SIG.R = 4D362B4F5470378F449F03FDD8CA2B2CD44D07FB3D543553A7EDAD28CE710EC4A86560F235005BDB28F9AF7FE2EDDBEF
3,450,168 UART: [art] SIG.S = 51D49D784DE762F4184E8F5D8A217AF5D10F6C640CC08D6867D512FB502B739E16E0CA61024EF999BA6C991ED4E96633
3,473,980 UART: Caliptra RT
3,474,233 UART: [state] CFI Enabled
3,582,455 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,597 ready_for_fw is high
1,362,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,873 >>> mbox cmd response: success
2,990,475 UART:
2,990,491 UART: Running Caliptra FMC ...
2,990,899 UART:
2,990,953 UART: [state] CFI Enabled
3,001,278 UART: [fht] FMC Alias Private Key: 7
3,110,149 UART: [art] Extend RT PCRs Done
3,110,577 UART: [art] Lock RT PCRs Done
3,112,103 UART: [art] Populate DV Done
3,120,312 UART: [fht] FMC Alias Private Key: 7
3,121,404 UART: [art] Derive CDI
3,121,684 UART: [art] Store in in slot 0x4
3,206,869 UART: [art] Derive Key Pair
3,207,229 UART: [art] Store priv key in slot 0x5
3,220,027 UART: [art] Derive Key Pair - Done
3,234,860 UART: [art] Signing Cert with AUTHO
3,235,340 UART: RITY.KEYID = 7
3,250,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,399 UART: [art] PUB.X = 44D7EC7686696493FE65E63BFE2E3EA3F1128F8DA1C41F0DBDBCE4B13DBC3EA1824A3D9BC2344259372D62A4C0D3AEFA
3,258,188 UART: [art] PUB.Y = C68B9965DA0D51978B193A447BAF472CCDB05F927AFE4FE02557B5028DC9DB1BFF8B5E21A07D496387E3D9F1968F3531
3,265,142 UART: [art] SIG.R = B0A9F45ABF03F4A4333C23879C385D51354E5A2BCE4D5F179D8408CBDBE98DA2222DF8E87852DE23679B95C98EDFA86F
3,271,920 UART: [art] SIG.S = 331B07BD147148BBA57CE710175EB6EA721955AC7058EE175D2B4CFC736B6A61A7388B4222323CF0EA3626C809AD9175
3,295,473 UART: Caliptra RT
3,295,726 UART: [state] CFI Enabled
3,404,621 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,854 UART: [kat] SHA2-256
881,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,900 UART: [kat] ++
886,052 UART: [kat] sha1
890,050 UART: [kat] SHA2-256
891,988 UART: [kat] SHA2-384
894,765 UART: [kat] SHA2-512-ACC
896,666 UART: [kat] ECC-384
902,271 UART: [kat] HMAC-384Kdf
907,059 UART: [kat] LMS
1,475,255 UART: [kat] --
1,476,434 UART: [cold-reset] ++
1,476,948 UART: [fht] Storing FHT @ 0x50003400
1,479,847 UART: [idev] ++
1,480,015 UART: [idev] CDI.KEYID = 6
1,480,375 UART: [idev] SUBJECT.KEYID = 7
1,480,799 UART: [idev] UDS.KEYID = 0
1,481,144 ready_for_fw is high
1,481,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,427 UART: [idev] Erasing UDS.KEYID = 0
1,504,799 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,637 UART: [idev] --
1,514,876 UART: [ldev] ++
1,515,044 UART: [ldev] CDI.KEYID = 6
1,515,407 UART: [ldev] SUBJECT.KEYID = 5
1,515,833 UART: [ldev] AUTHORITY.KEYID = 7
1,516,296 UART: [ldev] FE.KEYID = 1
1,521,622 UART: [ldev] Erasing FE.KEYID = 1
1,546,855 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,501 UART: [ldev] --
1,585,792 UART: [fwproc] Waiting for Commands...
1,586,489 UART: [fwproc] Received command 0x46574c44
1,587,280 UART: [fwproc] Received Image of size 114448 bytes
2,886,857 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,092 >>> mbox cmd response: success
3,080,312 UART: [afmc] ++
3,080,480 UART: [afmc] CDI.KEYID = 6
3,080,842 UART: [afmc] SUBJECT.KEYID = 7
3,081,267 UART: [afmc] AUTHORITY.KEYID = 5
3,117,168 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,660 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,440 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,053 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,743 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,608 UART: [afmc] --
3,160,642 UART: [cold-reset] --
3,161,474 UART: [state] Locking Datavault
3,162,589 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,193 UART: [state] Locking ICCM
3,163,635 UART: [exit] Launching FMC @ 0x40000130
3,168,964 UART:
3,168,980 UART: Running Caliptra FMC ...
3,169,388 UART:
3,169,531 UART: [state] CFI Enabled
3,179,982 UART: [fht] FMC Alias Private Key: 7
3,288,301 UART: [art] Extend RT PCRs Done
3,288,729 UART: [art] Lock RT PCRs Done
3,290,237 UART: [art] Populate DV Done
3,298,842 UART: [fht] FMC Alias Private Key: 7
3,299,824 UART: [art] Derive CDI
3,300,104 UART: [art] Store in in slot 0x4
3,385,745 UART: [art] Derive Key Pair
3,386,105 UART: [art] Store priv key in slot 0x5
3,399,687 UART: [art] Derive Key Pair - Done
3,414,407 UART: [art] Signing Cert with AUTHO
3,414,887 UART: RITY.KEYID = 7
3,430,085 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,850 UART: [art] PUB.X = B761D99789B54901F37F8CB8FB695691DCB1CE7854F0F16297DA118E1AE06169C5285C21A9EE7FEB52223F1E837EE723
3,437,621 UART: [art] PUB.Y = 73208318C08E564E0C065C5854D6D3243D4A6A5603556CE4582A3C34678F204916EA60F8B99B48A75CEC72EF5617B081
3,444,554 UART: [art] SIG.R = D770C59BD13DDD5FAC3191DFD17C84B0633780C0FC835D9A29F9B0054B4247FA85925FC395C6F41290BCEDF24BD67F6C
3,451,335 UART: [art] SIG.S = 1A3EBC5DF07B05782038646A18E672EBBFE3644CF6B39F460F4991CB75A4BAB69F5BD7D0C65082E240676931743D8543
3,475,150 UART: Caliptra RT
3,475,495 UART: [state] CFI Enabled
3,583,732 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,636 ready_for_fw is high
1,362,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,284 >>> mbox cmd response: success
2,991,342 UART:
2,991,358 UART: Running Caliptra FMC ...
2,991,766 UART:
2,991,909 UART: [state] CFI Enabled
3,002,572 UART: [fht] FMC Alias Private Key: 7
3,110,835 UART: [art] Extend RT PCRs Done
3,111,263 UART: [art] Lock RT PCRs Done
3,112,781 UART: [art] Populate DV Done
3,121,142 UART: [fht] FMC Alias Private Key: 7
3,122,204 UART: [art] Derive CDI
3,122,484 UART: [art] Store in in slot 0x4
3,208,291 UART: [art] Derive Key Pair
3,208,651 UART: [art] Store priv key in slot 0x5
3,221,821 UART: [art] Derive Key Pair - Done
3,236,539 UART: [art] Signing Cert with AUTHO
3,237,019 UART: RITY.KEYID = 7
3,252,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,106 UART: [art] PUB.X = FFB6417ED196B51A0B6455ABA407BD02DBEE576B6898E93AEF08B2BC81C613A87401F5B7A0529F9EDBF32DADBBF27FAA
3,259,887 UART: [art] PUB.Y = DA0147700740C86DBF761B23AD34C830D78575E88A7A9A0B2DB5B9BA353EB991CF32E55EF92A794CB7333F3A84FEE2D8
3,266,840 UART: [art] SIG.R = 730943F25DA5AA10A798FDBCFFC7860C6248A026314E24DAF19BBE3C200121521AFABF910866121A5918C0F610BDD6B9
3,273,606 UART: [art] SIG.S = 6A35B1F8A3AF21F00337A7D7006861E326C0BE1E19D9D61D8CFD9ACE84FC237D3F1BD0D2E92D48135E9243AFAC98A7EF
3,297,096 UART: Caliptra RT
3,297,441 UART: [state] CFI Enabled
3,406,741 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
893,200 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,325 UART: [kat] ++
897,477 UART: [kat] sha1
901,713 UART: [kat] SHA2-256
903,653 UART: [kat] SHA2-384
906,288 UART: [kat] SHA2-512-ACC
908,189 UART: [kat] ECC-384
917,708 UART: [kat] HMAC-384Kdf
922,296 UART: [kat] LMS
1,170,624 UART: [kat] --
1,171,609 UART: [cold-reset] ++
1,172,187 UART: [fht] FHT @ 0x50003400
1,174,916 UART: [idev] ++
1,175,084 UART: [idev] CDI.KEYID = 6
1,175,444 UART: [idev] SUBJECT.KEYID = 7
1,175,868 UART: [idev] UDS.KEYID = 0
1,176,213 ready_for_fw is high
1,176,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,030 UART: [idev] Erasing UDS.KEYID = 0
1,201,005 UART: [idev] Sha1 KeyId Algorithm
1,209,489 UART: [idev] --
1,210,593 UART: [ldev] ++
1,210,761 UART: [ldev] CDI.KEYID = 6
1,211,124 UART: [ldev] SUBJECT.KEYID = 5
1,211,550 UART: [ldev] AUTHORITY.KEYID = 7
1,212,013 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,370 UART: [fwproc] Wait for Commands...
1,282,980 UART: [fwproc] Recv command 0x46574c44
1,283,708 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,911 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,215 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,078 >>> mbox cmd response: success
2,776,300 UART: [afmc] ++
2,776,468 UART: [afmc] CDI.KEYID = 6
2,776,830 UART: [afmc] SUBJECT.KEYID = 7
2,777,255 UART: [afmc] AUTHORITY.KEYID = 5
2,812,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,134 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,853 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,735 UART: [afmc] --
2,855,815 UART: [cold-reset] --
2,856,885 UART: [state] Locking Datavault
2,858,088 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,692 UART: [state] Locking ICCM
2,859,286 UART: [exit] Launching FMC @ 0x40000130
2,864,615 UART:
2,864,631 UART: Running Caliptra FMC ...
2,865,039 UART:
2,865,093 UART: [state] CFI Enabled
2,875,280 UART: [fht] FMC Alias Private Key: 7
2,983,595 UART: [art] Extend RT PCRs Done
2,984,023 UART: [art] Lock RT PCRs Done
2,985,453 UART: [art] Populate DV Done
2,993,598 UART: [fht] FMC Alias Private Key: 7
2,994,742 UART: [art] Derive CDI
2,995,022 UART: [art] Store in in slot 0x4
3,080,919 UART: [art] Derive Key Pair
3,081,279 UART: [art] Store priv key in slot 0x5
3,094,377 UART: [art] Derive Key Pair - Done
3,109,204 UART: [art] Signing Cert with AUTHO
3,109,684 UART: RITY.KEYID = 7
3,124,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,595 UART: [art] PUB.X = 9694B730DEBBDA740B85FD8B165E65ABCC037F6338C78E49D97F3BAA1E9BC65BE81254AD22025C905D15FEAC5E1DFA0A
3,132,375 UART: [art] PUB.Y = EA3A9D3E8439C5C68DBFC0508713D4532AFA0EDF2DA637B0C8C859801F343FFC8E602080C26DA2CF77A23F3585743AF6
3,139,334 UART: [art] SIG.R = 7C210B91E1CA65DABB60C47A5A406832BAF9C6FEDF9A0233D3039B95B6290B41469311702F3A4B96594B9C292872A113
3,146,092 UART: [art] SIG.S = 811652ADBCED3F745781ABE20F5B04EEFC6EF34AE6E5D7010D49983F08C065327391FF865303CC045F9986677FCA6F6F
3,170,124 UART: Caliptra RT
3,170,377 UART: [state] CFI Enabled
3,277,546 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,763 ready_for_fw is high
1,060,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,191 >>> mbox cmd response: success
2,689,171 UART:
2,689,187 UART: Running Caliptra FMC ...
2,689,595 UART:
2,689,649 UART: [state] CFI Enabled
2,700,056 UART: [fht] FMC Alias Private Key: 7
2,808,119 UART: [art] Extend RT PCRs Done
2,808,547 UART: [art] Lock RT PCRs Done
2,810,081 UART: [art] Populate DV Done
2,818,596 UART: [fht] FMC Alias Private Key: 7
2,819,556 UART: [art] Derive CDI
2,819,836 UART: [art] Store in in slot 0x4
2,905,703 UART: [art] Derive Key Pair
2,906,063 UART: [art] Store priv key in slot 0x5
2,919,921 UART: [art] Derive Key Pair - Done
2,934,766 UART: [art] Signing Cert with AUTHO
2,935,246 UART: RITY.KEYID = 7
2,950,300 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,065 UART: [art] PUB.X = 7BD461FA0E7539CEF4CE0EE429CCA60B3A3EDE12D47AD6F875C1D2A1D0C04CE3618F5B12A957C41A3994521B0CF7B671
2,957,841 UART: [art] PUB.Y = FE1A9F90633027966485E088439C508B15C6A74D066C5A825D1B0F0BF410657C0EDB074B3586044447B59BEF9407D2B8
2,964,764 UART: [art] SIG.R = 53A2135D943CAF41F557F17FF98507E4F86EA7485B51859BF2604A84C090EF262FEDA906390C2F1A69AC2F6F0DB08FAB
2,971,532 UART: [art] SIG.S = 2920BAF5A9F9F6B698BE48DD43E6DD0FAEC49FD299A13BE3E4A7FA745D3A6749CA37700DEF57A5F5726B3949E0F1F2A6
2,994,779 UART: Caliptra RT
2,995,032 UART: [state] CFI Enabled
3,102,433 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
893,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,972 UART: [kat] ++
898,124 UART: [kat] sha1
902,362 UART: [kat] SHA2-256
904,302 UART: [kat] SHA2-384
907,155 UART: [kat] SHA2-512-ACC
909,056 UART: [kat] ECC-384
918,951 UART: [kat] HMAC-384Kdf
923,771 UART: [kat] LMS
1,172,099 UART: [kat] --
1,172,848 UART: [cold-reset] ++
1,173,232 UART: [fht] FHT @ 0x50003400
1,175,901 UART: [idev] ++
1,176,069 UART: [idev] CDI.KEYID = 6
1,176,429 UART: [idev] SUBJECT.KEYID = 7
1,176,853 UART: [idev] UDS.KEYID = 0
1,177,198 ready_for_fw is high
1,177,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,417 UART: [idev] Erasing UDS.KEYID = 0
1,201,692 UART: [idev] Sha1 KeyId Algorithm
1,210,088 UART: [idev] --
1,211,074 UART: [ldev] ++
1,211,242 UART: [ldev] CDI.KEYID = 6
1,211,605 UART: [ldev] SUBJECT.KEYID = 5
1,212,031 UART: [ldev] AUTHORITY.KEYID = 7
1,212,494 UART: [ldev] FE.KEYID = 1
1,217,632 UART: [ldev] Erasing FE.KEYID = 1
1,244,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,738 UART: [ldev] --
1,284,031 UART: [fwproc] Wait for Commands...
1,284,817 UART: [fwproc] Recv command 0x46574c44
1,285,545 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,303 >>> mbox cmd response: success
2,778,359 UART: [afmc] ++
2,778,527 UART: [afmc] CDI.KEYID = 6
2,778,889 UART: [afmc] SUBJECT.KEYID = 7
2,779,314 UART: [afmc] AUTHORITY.KEYID = 5
2,814,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,232 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,960 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,564 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,226 UART: [afmc] --
2,858,218 UART: [cold-reset] --
2,859,112 UART: [state] Locking Datavault
2,860,253 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,857 UART: [state] Locking ICCM
2,861,447 UART: [exit] Launching FMC @ 0x40000130
2,866,776 UART:
2,866,792 UART: Running Caliptra FMC ...
2,867,200 UART:
2,867,343 UART: [state] CFI Enabled
2,877,930 UART: [fht] FMC Alias Private Key: 7
2,985,291 UART: [art] Extend RT PCRs Done
2,985,719 UART: [art] Lock RT PCRs Done
2,987,217 UART: [art] Populate DV Done
2,995,610 UART: [fht] FMC Alias Private Key: 7
2,996,654 UART: [art] Derive CDI
2,996,934 UART: [art] Store in in slot 0x4
3,082,427 UART: [art] Derive Key Pair
3,082,787 UART: [art] Store priv key in slot 0x5
3,095,675 UART: [art] Derive Key Pair - Done
3,110,532 UART: [art] Signing Cert with AUTHO
3,111,012 UART: RITY.KEYID = 7
3,126,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,021 UART: [art] PUB.X = 658B8C91EDC39CD6B097E6ED2AF6246A0EC46FC5728177E2BEBD1940FBAAA4952504CE463D70579265579D1E437E231E
3,133,793 UART: [art] PUB.Y = E7D27629FA0A77CD8E70DC4095713ED1E140C3AE77478F9BCEAD460CEA17494D60A93CE9B5D58073E3CF6817CD4BD5C1
3,140,753 UART: [art] SIG.R = DBCD315B3DBDA79A09354D82B1E75E43E22A585C7A661B18FA3187C1AE80175907EADB8F3C54E36E6F73BD2A766DEE39
3,147,533 UART: [art] SIG.S = D309251B7377E6514128CDB5E1BB11E72253D359D88EDCFEF2F4079A701B0500DB4B8A8565E8461F7E03D698E12BEEBE
3,171,292 UART: Caliptra RT
3,171,637 UART: [state] CFI Enabled
3,279,121 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,672 ready_for_fw is high
1,060,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,184 >>> mbox cmd response: success
2,691,268 UART:
2,691,284 UART: Running Caliptra FMC ...
2,691,692 UART:
2,691,835 UART: [state] CFI Enabled
2,702,562 UART: [fht] FMC Alias Private Key: 7
2,811,145 UART: [art] Extend RT PCRs Done
2,811,573 UART: [art] Lock RT PCRs Done
2,813,427 UART: [art] Populate DV Done
2,821,742 UART: [fht] FMC Alias Private Key: 7
2,822,906 UART: [art] Derive CDI
2,823,186 UART: [art] Store in in slot 0x4
2,908,999 UART: [art] Derive Key Pair
2,909,359 UART: [art] Store priv key in slot 0x5
2,923,335 UART: [art] Derive Key Pair - Done
2,937,988 UART: [art] Signing Cert with AUTHO
2,938,468 UART: RITY.KEYID = 7
2,953,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,429 UART: [art] PUB.X = 40AD8D09AFF7C2AF16953AA116AF5ABA3C0DFF72C3A02C648C7C766B3A90C6E94901472D1AAF71F660B7B926681ADD45
2,961,206 UART: [art] PUB.Y = C073CE1AD6FE65C833868587890DEA6955EA1960691AF05023EDA74065BC91038C5C5AB0ADF0411741EA139712171104
2,968,143 UART: [art] SIG.R = E08282D7D18B2976248017285E106A7836B4841CB058B3CA4F3896A9CF1F7A5BDC9F04B4862C776CFFBEAB6BC85CB952
2,974,918 UART: [art] SIG.S = C67DC0FBEE378292067B7757855E9B24B8A7A3275AD641399CF379F686472B53F66270E187AE54F79184072AEB5FB249
2,998,367 UART: Caliptra RT
2,998,712 UART: [state] CFI Enabled
3,105,894 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,288 UART: [kat] SHA2-512-ACC
906,189 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,344 UART: [kat] LMS
1,168,656 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,655 UART: [idev] ++
1,172,823 UART: [idev] CDI.KEYID = 6
1,173,184 UART: [idev] SUBJECT.KEYID = 7
1,173,609 UART: [idev] UDS.KEYID = 0
1,173,955 ready_for_fw is high
1,173,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,198,897 UART: [idev] Sha1 KeyId Algorithm
1,207,695 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,215,194 UART: [ldev] Erasing FE.KEYID = 1
1,240,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,198 UART: [ldev] --
1,280,564 UART: [fwproc] Wait for Commands...
1,281,263 UART: [fwproc] Recv command 0x46574c44
1,281,996 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,024 >>> mbox cmd response: success
2,775,053 UART: [afmc] ++
2,775,221 UART: [afmc] CDI.KEYID = 6
2,775,584 UART: [afmc] SUBJECT.KEYID = 7
2,776,010 UART: [afmc] AUTHORITY.KEYID = 5
2,811,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,154 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,883 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,766 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,485 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,232 UART: [afmc] --
2,855,182 UART: [cold-reset] --
2,856,160 UART: [state] Locking Datavault
2,857,473 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,077 UART: [state] Locking ICCM
2,858,581 UART: [exit] Launching FMC @ 0x40000130
2,863,910 UART:
2,863,926 UART: Running Caliptra FMC ...
2,864,334 UART:
2,864,388 UART: [state] CFI Enabled
2,875,121 UART: [fht] FMC Alias Private Key: 7
2,982,706 UART: [art] Extend RT PCRs Done
2,983,134 UART: [art] Lock RT PCRs Done
2,984,680 UART: [art] Populate DV Done
2,992,713 UART: [fht] FMC Alias Private Key: 7
2,993,765 UART: [art] Derive CDI
2,994,045 UART: [art] Store in in slot 0x4
3,079,908 UART: [art] Derive Key Pair
3,080,268 UART: [art] Store priv key in slot 0x5
3,093,760 UART: [art] Derive Key Pair - Done
3,108,388 UART: [art] Signing Cert with AUTHO
3,108,868 UART: RITY.KEYID = 7
3,124,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,013 UART: [art] PUB.X = 8585114926466A64F40F664475B951B6D08740FEC1214653D90AAD1E72FDD79CE98C2E9FDB221CD8FF5E2C8CA74B30A9
3,131,783 UART: [art] PUB.Y = 3C1B2C535973CD3118D7C2B5225E7619693148FEA0E8782CF8A8E250CCF351132F8127E4DC8C90E1BFB7AC429BD554AB
3,138,741 UART: [art] SIG.R = 893A8D13CF4565A91BE029A1E43FAB60710D4D4D5CE55707C499F4BB12AEB66C6D5E993D30333941A0037C6B3CCC253D
3,145,510 UART: [art] SIG.S = 0511A21796D02D7A9C652D750BC7E1CA45B8EB00238FA07E2829C80EA4E25912DD319BCA4E4B72ACEC2E136C8AE04B1E
3,168,634 UART: Caliptra RT
3,168,887 UART: [state] CFI Enabled
3,276,568 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,606 ready_for_fw is high
1,056,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,556 >>> mbox cmd response: success
2,686,074 UART:
2,686,090 UART: Running Caliptra FMC ...
2,686,498 UART:
2,686,552 UART: [state] CFI Enabled
2,696,601 UART: [fht] FMC Alias Private Key: 7
2,804,664 UART: [art] Extend RT PCRs Done
2,805,092 UART: [art] Lock RT PCRs Done
2,806,916 UART: [art] Populate DV Done
2,814,963 UART: [fht] FMC Alias Private Key: 7
2,816,125 UART: [art] Derive CDI
2,816,405 UART: [art] Store in in slot 0x4
2,901,948 UART: [art] Derive Key Pair
2,902,308 UART: [art] Store priv key in slot 0x5
2,915,616 UART: [art] Derive Key Pair - Done
2,930,406 UART: [art] Signing Cert with AUTHO
2,930,886 UART: RITY.KEYID = 7
2,946,206 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,971 UART: [art] PUB.X = 0635F608F106545233AE7642B9EFB2039F1CC2A9F464A516011DE8694FBB637BEE0B67E74E86BAAB597EA5CF9501C6EA
2,953,730 UART: [art] PUB.Y = 7E77FAA5B2A58D74A59B6953B6DDBF7DE7D294E379314B55D3435857BE4C2492CDE994D530C8EBA46E355815B9C4DC15
2,960,690 UART: [art] SIG.R = ABDFE61C797CB0D2529FAA7F08515A4CCF8DC5F51F33E2976A31BE5CA7B3EC751E3FA00046D4D547140B791B785EF747
2,967,448 UART: [art] SIG.S = A1C6286B7E8BC081A3FFAB76EE73FDB19F0D29C17AA68ED20A3BEBD40B4D94EC1109FC72E559D53FCD8283105174D221
2,990,827 UART: Caliptra RT
2,991,080 UART: [state] CFI Enabled
3,098,670 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,901 UART: [state] LifecycleState = Unprovisioned
86,556 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,478 UART: [kat] SHA2-256
902,418 UART: [kat] SHA2-384
905,017 UART: [kat] SHA2-512-ACC
906,918 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,170,554 UART: [cold-reset] ++
1,171,060 UART: [fht] FHT @ 0x50003400
1,173,796 UART: [idev] ++
1,173,964 UART: [idev] CDI.KEYID = 6
1,174,325 UART: [idev] SUBJECT.KEYID = 7
1,174,750 UART: [idev] UDS.KEYID = 0
1,175,096 ready_for_fw is high
1,175,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,200,086 UART: [idev] Sha1 KeyId Algorithm
1,209,028 UART: [idev] --
1,210,175 UART: [ldev] ++
1,210,343 UART: [ldev] CDI.KEYID = 6
1,210,707 UART: [ldev] SUBJECT.KEYID = 5
1,211,134 UART: [ldev] AUTHORITY.KEYID = 7
1,211,597 UART: [ldev] FE.KEYID = 1
1,217,101 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,487 UART: [ldev] --
1,282,889 UART: [fwproc] Wait for Commands...
1,283,510 UART: [fwproc] Recv command 0x46574c44
1,284,243 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,750 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,059 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,963 >>> mbox cmd response: success
2,774,982 UART: [afmc] ++
2,775,150 UART: [afmc] CDI.KEYID = 6
2,775,513 UART: [afmc] SUBJECT.KEYID = 7
2,775,939 UART: [afmc] AUTHORITY.KEYID = 5
2,812,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,265 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,994 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,877 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,596 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,627 UART: [afmc] --
2,855,511 UART: [cold-reset] --
2,856,389 UART: [state] Locking Datavault
2,857,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,974 UART: [state] Locking ICCM
2,858,502 UART: [exit] Launching FMC @ 0x40000130
2,863,831 UART:
2,863,847 UART: Running Caliptra FMC ...
2,864,255 UART:
2,864,398 UART: [state] CFI Enabled
2,875,103 UART: [fht] FMC Alias Private Key: 7
2,982,510 UART: [art] Extend RT PCRs Done
2,982,938 UART: [art] Lock RT PCRs Done
2,984,344 UART: [art] Populate DV Done
2,992,745 UART: [fht] FMC Alias Private Key: 7
2,993,679 UART: [art] Derive CDI
2,993,959 UART: [art] Store in in slot 0x4
3,079,698 UART: [art] Derive Key Pair
3,080,058 UART: [art] Store priv key in slot 0x5
3,093,378 UART: [art] Derive Key Pair - Done
3,108,522 UART: [art] Signing Cert with AUTHO
3,109,002 UART: RITY.KEYID = 7
3,123,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,439 UART: [art] PUB.X = 32D2130A67E08AB418ABACB8CE32FB1DC26512F164614396A9F7FDD10C2D4F300FF794A150672039F2F0897A16BD7C46
3,131,206 UART: [art] PUB.Y = D796E08EE10965F9943DEEFB179743417C6FB56412F53D329B89EE57AEDAADBF531B05EB31D046A441EE022648275F9C
3,138,155 UART: [art] SIG.R = 6362497E8D4C2D777F855C5B56FABE1464F3244CFEB78E412F0F37D89CBBD441DC678305086BC6700CE160AC094DE333
3,144,916 UART: [art] SIG.S = 907E90FD1932504D24155202EB4C059CB7121B8F2EE547FC245E5774673A5A79D2F9616DBA642B00BF254EFE94A45A7E
3,168,859 UART: Caliptra RT
3,169,204 UART: [state] CFI Enabled
3,277,269 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,129 ready_for_fw is high
1,055,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,159 >>> mbox cmd response: success
2,687,443 UART:
2,687,459 UART: Running Caliptra FMC ...
2,687,867 UART:
2,688,010 UART: [state] CFI Enabled
2,698,701 UART: [fht] FMC Alias Private Key: 7
2,806,658 UART: [art] Extend RT PCRs Done
2,807,086 UART: [art] Lock RT PCRs Done
2,808,516 UART: [art] Populate DV Done
2,816,743 UART: [fht] FMC Alias Private Key: 7
2,817,901 UART: [art] Derive CDI
2,818,181 UART: [art] Store in in slot 0x4
2,903,916 UART: [art] Derive Key Pair
2,904,276 UART: [art] Store priv key in slot 0x5
2,917,772 UART: [art] Derive Key Pair - Done
2,932,513 UART: [art] Signing Cert with AUTHO
2,932,993 UART: RITY.KEYID = 7
2,948,055 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,820 UART: [art] PUB.X = B03F18A9F9B29CCB543549ED4C3D0F4149C451A9DA1E429CAD6AD0F35BC98E02EC2CA608E42A8FA58C08A29AB5B92B06
2,955,595 UART: [art] PUB.Y = 33D27AB93B7012A5B512CA1ABDA0D3309C70D9442D4452C87B6FF58C92E01C8D90A31D5B429469A38298C322294E1FE1
2,962,547 UART: [art] SIG.R = E7CB4CC50C7D43DC249241E1D0300DFFEA871DAB58ADE18390399835C918FD593E16DB2A4121F57B79FE5756F745EB7D
2,969,323 UART: [art] SIG.S = 1EC61EF1112EE2B1761365B0906F6EBB20ED99D4B1FA58E727A7C835DC8AF8F4AD65CF2D35643D22686E75F65A8DEEE3
2,993,474 UART: Caliptra RT
2,993,819 UART: [state] CFI Enabled
3,102,106 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
Truncated 1347969 bytes from beginning
UART: [art] Extend RT PCRs Done
3,633,900,451 UART: [art] Lock RT PCRs Done
3,633,901,851 UART: [art] Populate DV Done
3,633,907,537 UART: [fht] FMC Alias Private Key: 7
3,633,909,077 UART: [art] Derive CDI
3,633,909,816 UART: [art] Store in in slot 0x4
3,633,968,261 UART: [art] Derive Key Pair
3,633,969,296 UART: [art] Store priv key in slot 0x5
3,637,262,098 UART: [art] Derive Key Pair - Done
3,637,274,892 UART: [art] Signing Cert with AUTHO
3,637,276,201 UART: RITY.KEYID = 7
3,639,563,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,639,565,115 UART: [art] PUB.X = BA57AD11C6DE404CAB98613919BAE6A0C53A174657DA0544A90F71BC01FB484C98C05E3CDB7E58E2F7CD8DD9B617F779
3,639,572,367 UART: [art] PUB.Y = E6BFF4F4252692B5871C27FC1DCAF26D585161C9B5858F85CB5788A4728CBCC8B086C1B5919BCAE7B53EE67878C7F839
3,639,579,653 UART: [art] SIG.R = 49F8E5B175A186B34B74F8E1B7292C48CF13858ED70BA6D10CFC03371F6E01BDA6FB579439272F7259221F0C290177DF
3,639,587,053 UART: [art] SIG.S = 9691CB74539BCE603EC401F883729BC72550B266C5E5037E3C123FA8E58834BE8C10A1A1CA5326C2F28DB4969E3A3123
3,640,892,237 UART: Caliptra RT
3,640,892,943 UART: [state] CFI Enabled
3,641,226,691 UART: [rt] RT listening for mailbox commands...
3,641,228,566 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,641,372,673 UART:
3,641,372,981 UART: Running Caliptra ROM ...
3,641,374,049 UART:
3,641,374,211 UART: [state] CFI Enabled
3,641,441,839 UART: [state] LifecycleState = Unprovisioned
3,641,443,771 UART: [state] DebugLocked = No
3,641,445,972 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,641,450,229 UART: [kat] SHA2-256
3,641,619,911 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,641,630,388 UART: [kat] ++
3,641,630,879 UART: [kat] sha1
3,641,642,689 UART: [kat] SHA2-256
3,641,645,379 UART: [kat] SHA2-384
3,641,651,271 UART: [kat] SHA2-512-ACC
3,641,653,644 UART: [kat] ECC-384
3,643,944,280 UART: [kat] HMAC-384Kdf
3,643,975,723 UART: [kat] LMS
3,645,166,054 UART: [kat] --
3,645,168,231 UART: [update-reset] ++
3,649,316,751 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,649,320,745 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,649,702,982 >>> mbox cmd response: success
3,649,704,393 UART: [update-reset] Copying MAN_2 To MAN_1
3,649,726,842 UART: [update-reset Success] --
3,649,730,733 UART: [state] Locking Datavault
3,649,732,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,649,734,291 UART: [state] Locking ICCM
3,649,736,666 UART: [exit] Launching FMC @ 0x40000130
3,649,745,130 UART:
3,649,745,370 UART: Running Caliptra FMC ...
3,649,746,491 UART:
3,649,746,655 UART: [state] CFI Enabled
3,649,834,272 UART: [art] Extend RT PCRs Done
3,649,835,457 UART: [art] Lock RT PCRs Done
3,649,836,644 UART: [art] Populate DV Done
3,649,841,949 UART: [fht] FMC Alias Private Key: 7
3,649,843,554 UART: [art] Derive CDI
3,649,844,374 UART: [art] Store in in slot 0x4
3,649,902,881 UART: [art] Derive Key Pair
3,649,903,923 UART: [art] Store priv key in slot 0x5
3,653,196,523 UART: [art] Derive Key Pair - Done
3,653,209,411 UART: [art] Signing Cert with AUTHO
3,653,210,716 UART: RITY.KEYID = 7
3,655,499,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,655,500,572 UART: [art] PUB.X = 2EE935B87ABB4C02144818B12093F15282EBA071DE0B174B0720D52635BD229823B1D2DD591B710B27ECA55B4DCD1F71
3,655,507,814 UART: [art] PUB.Y = 0E20E5FBE8B54CD2F0C01AA33E0EF9C191B7B6C63787809FFC6512711C93649E34DE4137B289BE2341445D88BFFF6BD8
3,655,515,022 UART: [art] SIG.R = 60D7B827622C1A6ACE6A3AE7FB16D4E30CA98E32E33DC42A8FF53717ECA8AA2D07954DCE34AA88884583F56B8C4378A1
3,655,522,425 UART: [art] SIG.S = F6B1829EC04EEE36BA1FED3C2CCE005801F166F21AEBF36A1FCD8CFCF793D019DEB7E2C24498C3AAE48F25789CEF23CC
3,656,827,864 UART: Caliptra RT
3,656,828,582 UART: [state] CFI Enabled
3,657,159,267 UART: [rt] RT listening for mailbox commands...
3,657,161,293 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,657,305,564 UART:
3,657,305,854 UART: Running Caliptra ROM ...
3,657,306,894 UART:
3,657,307,050 UART: [state] CFI Enabled
3,657,374,248 UART: [state] LifecycleState = Unprovisioned
3,657,376,183 UART: [state] DebugLocked = No
3,657,377,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,657,382,067 UART: [kat] SHA2-256
3,657,551,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,657,562,206 UART: [kat] ++
3,657,562,696 UART: [kat] sha1
3,657,573,378 UART: [kat] SHA2-256
3,657,576,075 UART: [kat] SHA2-384
3,657,582,396 UART: [kat] SHA2-512-ACC
3,657,584,757 UART: [kat] ECC-384
3,659,878,402 UART: [kat] HMAC-384Kdf
3,659,911,804 UART: [kat] LMS
3,661,102,101 UART: [kat] --
3,661,106,630 UART: [update-reset] ++
3,665,242,738 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,665,246,794 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,665,629,071 >>> mbox cmd response: success
3,665,629,889 UART: [update-reset] Copying MAN_2 To MAN_1
3,665,652,336 UART: [update-reset Success] --
3,665,656,551 UART: [state] Locking Datavault
3,665,659,544 UART: [state] Locking PCR0, PCR1 and PCR31
3,665,661,326 UART: [state] Locking ICCM
3,665,662,894 UART: [exit] Launching FMC @ 0x40000130
3,665,671,349 UART:
3,665,671,587 UART: Running Caliptra FMC ...
3,665,672,695 UART:
3,665,672,861 UART: [state] CFI Enabled
3,665,767,075 UART: [art] Extend RT PCRs Done
3,665,768,272 UART: [art] Lock RT PCRs Done
3,665,769,353 UART: [art] Populate DV Done
3,665,774,852 UART: [fht] FMC Alias Private Key: 7
3,665,776,491 UART: [art] Derive CDI
3,665,777,306 UART: [art] Store in in slot 0x4
3,665,836,290 UART: [art] Derive Key Pair
3,665,837,357 UART: [art] Store priv key in slot 0x5
3,669,130,107 UART: [art] Derive Key Pair - Done
3,669,143,209 UART: [art] Signing Cert with AUTHO
3,669,144,540 UART: RITY.KEYID = 7
3,671,432,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,433,661 UART: [art] PUB.X = BA57AD11C6DE404CAB98613919BAE6A0C53A174657DA0544A90F71BC01FB484C98C05E3CDB7E58E2F7CD8DD9B617F779
3,671,440,910 UART: [art] PUB.Y = E6BFF4F4252692B5871C27FC1DCAF26D585161C9B5858F85CB5788A4728CBCC8B086C1B5919BCAE7B53EE67878C7F839
3,671,448,136 UART: [art] SIG.R = 49F8E5B175A186B34B74F8E1B7292C48CF13858ED70BA6D10CFC03371F6E01BDA6FB579439272F7259221F0C290177DF
3,671,455,526 UART: [art] SIG.S = 9691CB74539BCE603EC401F883729BC72550B266C5E5037E3C123FA8E58834BE8C10A1A1CA5326C2F28DB4969E3A3123
3,672,760,972 UART: Caliptra RT
3,672,761,821 UART: [state] CFI Enabled
3,673,096,558 UART: [rt] RT listening for mailbox commands...
3,673,098,463 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,673,242,996 UART:
3,673,243,312 UART: Running Caliptra ROM ...
3,673,244,438 UART:
3,673,244,607 UART: [state] CFI Enabled
3,673,309,958 UART: [state] LifecycleState = Unprovisioned
3,673,311,908 UART: [state] DebugLocked = No
3,673,314,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,673,319,135 UART: [kat] SHA2-256
3,673,488,831 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,673,499,316 UART: [kat] ++
3,673,499,809 UART: [kat] sha1
3,673,511,830 UART: [kat] SHA2-256
3,673,514,523 UART: [kat] SHA2-384
3,673,519,213 UART: [kat] SHA2-512-ACC
3,673,521,572 UART: [kat] ECC-384
3,675,814,120 UART: [kat] HMAC-384Kdf
3,675,846,394 UART: [kat] LMS
3,677,036,724 UART: [kat] --
3,677,041,445 UART: [update-reset] ++
3,681,187,623 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,681,191,952 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,681,574,210 >>> mbox cmd response: success
3,681,575,655 UART: [update-reset] Copying MAN_2 To MAN_1
3,681,598,105 UART: [update-reset Success] --
3,681,604,015 UART: [state] Locking Datavault
3,681,607,220 UART: [state] Locking PCR0, PCR1 and PCR31
3,681,608,980 UART: [state] Locking ICCM
3,681,611,547 UART: [exit] Launching FMC @ 0x40000130
3,681,619,939 UART:
3,681,620,179 UART: Running Caliptra FMC ...
3,681,621,284 UART:
3,681,621,462 UART: [state] CFI Enabled
3,681,723,681 UART: [art] Extend RT PCRs Done
3,681,724,883 UART: [art] Lock RT PCRs Done
3,681,726,400 UART: [art] Populate DV Done
3,681,731,977 UART: [fht] FMC Alias Private Key: 7
3,681,733,516 UART: [art] Derive CDI
3,681,734,336 UART: [art] Store in in slot 0x4
3,681,792,529 UART: [art] Derive Key Pair
3,681,793,535 UART: [art] Store priv key in slot 0x5
3,685,086,610 UART: [art] Derive Key Pair - Done
3,685,099,454 UART: [art] Signing Cert with AUTHO
3,685,100,777 UART: RITY.KEYID = 7
3,687,388,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,687,389,627 UART: [art] PUB.X = 2EE935B87ABB4C02144818B12093F15282EBA071DE0B174B0720D52635BD229823B1D2DD591B710B27ECA55B4DCD1F71
3,687,396,871 UART: [art] PUB.Y = 0E20E5FBE8B54CD2F0C01AA33E0EF9C191B7B6C63787809FFC6512711C93649E34DE4137B289BE2341445D88BFFF6BD8
3,687,404,088 UART: [art] SIG.R = 60D7B827622C1A6ACE6A3AE7FB16D4E30CA98E32E33DC42A8FF53717ECA8AA2D07954DCE34AA88884583F56B8C4378A1
3,687,411,501 UART: [art] SIG.S = F6B1829EC04EEE36BA1FED3C2CCE005801F166F21AEBF36A1FCD8CFCF793D019DEB7E2C24498C3AAE48F25789CEF23CC
3,688,716,916 UART: Caliptra RT
3,688,717,662 UART: [state] CFI Enabled
3,689,048,836 UART: [rt] RT listening for mailbox commands...
3,689,050,726 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,689,194,986 UART:
3,689,195,295 UART: Running Caliptra ROM ...
3,689,196,436 UART:
3,689,196,604 UART: [state] CFI Enabled
3,689,268,233 UART: [state] LifecycleState = Unprovisioned
3,689,270,166 UART: [state] DebugLocked = No
3,689,272,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,689,277,195 UART: [kat] SHA2-256
3,689,446,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,689,457,348 UART: [kat] ++
3,689,457,843 UART: [kat] sha1
3,689,468,306 UART: [kat] SHA2-256
3,689,470,994 UART: [kat] SHA2-384
3,689,475,736 UART: [kat] SHA2-512-ACC
3,689,478,086 UART: [kat] ECC-384
3,691,770,538 UART: [kat] HMAC-384Kdf
3,691,801,907 UART: [kat] LMS
3,692,992,229 UART: [kat] --
3,692,996,578 UART: [update-reset] ++
3,697,132,171 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,697,136,739 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,697,518,983 >>> mbox cmd response: success
3,697,520,559 UART: [update-reset] Copying MAN_2 To MAN_1
3,697,543,007 UART: [update-reset Success] --
3,697,548,497 UART: [state] Locking Datavault
3,697,552,355 UART: [state] Locking PCR0, PCR1 and PCR31
3,697,554,122 UART: [state] Locking ICCM
3,697,556,906 UART: [exit] Launching FMC @ 0x40000130
3,697,565,307 UART:
3,697,565,584 UART: Running Caliptra FMC ...
3,697,566,698 UART:
3,697,566,868 UART: [state] CFI Enabled
3,697,658,929 UART: [art] Extend RT PCRs Done
3,697,660,118 UART: [art] Lock RT PCRs Done
3,697,661,652 UART: [art] Populate DV Done
3,697,667,063 UART: [fht] FMC Alias Private Key: 7
3,697,668,606 UART: [art] Derive CDI
3,697,669,422 UART: [art] Store in in slot 0x4
3,697,727,424 UART: [art] Derive Key Pair
3,697,728,453 UART: [art] Store priv key in slot 0x5
3,701,021,254 UART: [art] Derive Key Pair - Done
3,701,034,308 UART: [art] Signing Cert with AUTHO
3,701,035,621 UART: RITY.KEYID = 7
3,703,323,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,703,324,890 UART: [art] PUB.X = BA57AD11C6DE404CAB98613919BAE6A0C53A174657DA0544A90F71BC01FB484C98C05E3CDB7E58E2F7CD8DD9B617F779
3,703,332,136 UART: [art] PUB.Y = E6BFF4F4252692B5871C27FC1DCAF26D585161C9B5858F85CB5788A4728CBCC8B086C1B5919BCAE7B53EE67878C7F839
3,703,339,422 UART: [art] SIG.R = 49F8E5B175A186B34B74F8E1B7292C48CF13858ED70BA6D10CFC03371F6E01BDA6FB579439272F7259221F0C290177DF
3,703,346,755 UART: [art] SIG.S = 9691CB74539BCE603EC401F883729BC72550B266C5E5037E3C123FA8E58834BE8C10A1A1CA5326C2F28DB4969E3A3123
3,704,651,889 UART: Caliptra RT
3,704,652,593 UART: [state] CFI Enabled
3,704,984,538 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 400.33s
Truncated 716399 bytes from beginning
ED9E58C8DF17E23B929FEF42EBDAA8A
3,705,183,270 UART: [art] SIG.R = BC73392116D7D9E9B013FD6754ED01C047B68D7BB2B44FA070F9B14D42D130B5CF9F16C2E64596B32351BB823B055C22
3,705,190,638 UART: [art] SIG.S = 7F8459ECC7BD817DF37E8FED2F28E5A979BC824C79646E842303DCFA5610D03E9127AE6D409EB5682CFC58FFF4F54E37
3,706,496,166 UART: Caliptra RT
3,706,496,878 UART: [state] CFI Enabled
3,706,830,562 UART: [rt] RT listening for mailbox commands...
3,706,832,446 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,715,552,757 >>> mbox cmd response: success
3,715,586,702 UART:
3,715,587,006 UART: Running Caliptra FMC ...
3,715,588,062 UART:
3,715,588,222 UART: [state] CFI Enabled
3,715,694,298 UART: [art] Extend RT PCRs Done
3,715,695,491 UART: [art] Lock RT PCRs Done
3,715,696,951 UART: [art] Populate DV Done
3,715,702,313 UART: [fht] FMC Alias Private Key: 7
3,715,703,872 UART: [art] Derive CDI
3,715,704,695 UART: [art] Store in in slot 0x4
3,715,763,203 UART: [art] Derive Key Pair
3,715,764,245 UART: [art] Store priv key in slot 0x5
3,719,057,334 UART: [art] Derive Key Pair - Done
3,719,070,345 UART: [art] Signing Cert with AUTHO
3,719,071,660 UART: RITY.KEYID = 7
3,721,358,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,721,360,119 UART: [art] PUB.X = B71C9DA3A90D40212E59256F1AB1A28424CBA3D372E4E67ED1872A64B42673A7B795FAF8879F897DFCF3880C43F7E9A7
3,721,367,359 UART: [art] PUB.Y = 591A47EB5A6767C5410ECE1D9E33E092224E0755F70B3904CE070DBE52E50D3A69CFF00E362118806FAD589A69779D16
3,721,374,565 UART: [art] SIG.R = 7ADF428B9CE8D82FD222677E725550EDCACD759550E1F28FA554865C188F2FF8AF5512232C63F406858E0A15C587E257
3,721,381,937 UART: [art] SIG.S = B84B556088FF9079AA3E3F7B3915CB35793F767D06562EA4AD2A33A97C25448BDA40307B98256BD68D07EC5415535298
3,722,687,399 UART: Caliptra RT
3,722,688,102 UART: [state] CFI Enabled
3,723,021,816 UART: [rt] RT listening for mailbox commands...
3,723,023,697 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,731,756,959 >>> mbox cmd response: success
3,731,790,870 UART:
3,731,791,141 UART: Running Caliptra FMC ...
3,731,792,186 UART:
3,731,792,342 UART: [state] CFI Enabled
3,731,880,322 UART: [art] Extend RT PCRs Done
3,731,881,526 UART: [art] Lock RT PCRs Done
3,731,882,960 UART: [art] Populate DV Done
3,731,888,505 UART: [fht] FMC Alias Private Key: 7
3,731,890,096 UART: [art] Derive CDI
3,731,890,852 UART: [art] Store in in slot 0x4
3,731,949,682 UART: [art] Derive Key Pair
3,731,950,690 UART: [art] Store priv key in slot 0x5
3,735,243,614 UART: [art] Derive Key Pair - Done
3,735,256,075 UART: [art] Signing Cert with AUTHO
3,735,257,385 UART: RITY.KEYID = 7
3,737,544,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,546,100 UART: [art] PUB.X = E86DB761EE9A741F967252B4A172044AF56DC52D519AF15B6DDA559392CE31D02D1F796BA479E20F5DE94BEBBC003891
3,737,553,319 UART: [art] PUB.Y = A4C6D83299FA978B0B94E3F2D45CDAF5E2BBAA4A2D35DFD839CA9A115847E47E5ED9E58C8DF17E23B929FEF42EBDAA8A
3,737,560,750 UART: [art] SIG.R = BC73392116D7D9E9B013FD6754ED01C047B68D7BB2B44FA070F9B14D42D130B5CF9F16C2E64596B32351BB823B055C22
3,737,568,029 UART: [art] SIG.S = 7F8459ECC7BD817DF37E8FED2F28E5A979BC824C79646E842303DCFA5610D03E9127AE6D409EB5682CFC58FFF4F54E37
3,738,873,517 UART: Caliptra RT
3,738,874,231 UART: [state] CFI Enabled
3,739,224,128 UART: [rt] RT listening for mailbox commands...
3,739,226,004 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,747,951,474 >>> mbox cmd response: success
3,747,985,158 UART:
3,747,985,453 UART: Running Caliptra FMC ...
3,747,986,580 UART:
3,747,986,756 UART: [state] CFI Enabled
3,748,089,100 UART: [art] Extend RT PCRs Done
3,748,090,305 UART: [art] Lock RT PCRs Done
3,748,091,575 UART: [art] Populate DV Done
3,748,097,212 UART: [fht] FMC Alias Private Key: 7
3,748,098,708 UART: [art] Derive CDI
3,748,099,490 UART: [art] Store in in slot 0x4
3,748,158,714 UART: [art] Derive Key Pair
3,748,159,763 UART: [art] Store priv key in slot 0x5
3,751,452,497 UART: [art] Derive Key Pair - Done
3,751,465,768 UART: [art] Signing Cert with AUTHO
3,751,467,079 UART: RITY.KEYID = 7
3,753,754,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,753,755,980 UART: [art] PUB.X = B71C9DA3A90D40212E59256F1AB1A28424CBA3D372E4E67ED1872A64B42673A7B795FAF8879F897DFCF3880C43F7E9A7
3,753,763,290 UART: [art] PUB.Y = 591A47EB5A6767C5410ECE1D9E33E092224E0755F70B3904CE070DBE52E50D3A69CFF00E362118806FAD589A69779D16
3,753,770,498 UART: [art] SIG.R = 7ADF428B9CE8D82FD222677E725550EDCACD759550E1F28FA554865C188F2FF8AF5512232C63F406858E0A15C587E257
3,753,777,866 UART: [art] SIG.S = B84B556088FF9079AA3E3F7B3915CB35793F767D06562EA4AD2A33A97C25448BDA40307B98256BD68D07EC5415535298
3,755,083,117 UART: Caliptra RT
3,755,083,839 UART: [state] CFI Enabled
3,755,413,889 UART: [rt] RT listening for mailbox commands...
3,755,415,765 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,764,138,966 >>> mbox cmd response: success
3,764,175,190 UART:
3,764,175,466 UART: Running Caliptra FMC ...
3,764,176,506 UART:
3,764,176,663 UART: [state] CFI Enabled
3,764,279,771 UART: [art] Extend RT PCRs Done
3,764,281,112 UART: [art] Lock RT PCRs Done
3,764,282,235 UART: [art] Populate DV Done
3,764,287,701 UART: [fht] FMC Alias Private Key: 7
3,764,289,202 UART: [art] Derive CDI
3,764,289,943 UART: [art] Store in in slot 0x4
3,764,348,660 UART: [art] Derive Key Pair
3,764,349,661 UART: [art] Store priv key in slot 0x5
3,767,644,476 UART: [art] Derive Key Pair - Done
3,767,657,671 UART: [art] Signing Cert with AUTHO
3,767,658,983 UART: RITY.KEYID = 7
3,769,946,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,769,947,918 UART: [art] PUB.X = E86DB761EE9A741F967252B4A172044AF56DC52D519AF15B6DDA559392CE31D02D1F796BA479E20F5DE94BEBBC003891
3,769,955,188 UART: [art] PUB.Y = A4C6D83299FA978B0B94E3F2D45CDAF5E2BBAA4A2D35DFD839CA9A115847E47E5ED9E58C8DF17E23B929FEF42EBDAA8A
3,769,962,476 UART: [art] SIG.R = BC73392116D7D9E9B013FD6754ED01C047B68D7BB2B44FA070F9B14D42D130B5CF9F16C2E64596B32351BB823B055C22
3,769,969,857 UART: [art] SIG.S = 7F8459ECC7BD817DF37E8FED2F28E5A979BC824C79646E842303DCFA5610D03E9127AE6D409EB5682CFC58FFF4F54E37
3,771,275,356 UART: Caliptra RT
3,771,276,074 UART: [state] CFI Enabled
3,771,607,959 UART: [rt] RT listening for mailbox commands...
3,771,609,837 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,780,333,123 >>> mbox cmd response: success
3,780,370,374 UART:
3,780,370,675 UART: Running Caliptra FMC ...
3,780,371,805 UART:
3,780,371,969 UART: [state] CFI Enabled
3,780,471,529 UART: [art] Extend RT PCRs Done
3,780,472,723 UART: [art] Lock RT PCRs Done
3,780,474,244 UART: [art] Populate DV Done
3,780,479,714 UART: [fht] FMC Alias Private Key: 7
3,780,481,308 UART: [art] Derive CDI
3,780,482,128 UART: [art] Store in in slot 0x4
3,780,540,850 UART: [art] Derive Key Pair
3,780,541,898 UART: [art] Store priv key in slot 0x5
3,783,834,496 UART: [art] Derive Key Pair - Done
3,783,847,560 UART: [art] Signing Cert with AUTHO
3,783,848,868 UART: RITY.KEYID = 7
3,786,136,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,786,137,629 UART: [art] PUB.X = B71C9DA3A90D40212E59256F1AB1A28424CBA3D372E4E67ED1872A64B42673A7B795FAF8879F897DFCF3880C43F7E9A7
3,786,144,905 UART: [art] PUB.Y = 591A47EB5A6767C5410ECE1D9E33E092224E0755F70B3904CE070DBE52E50D3A69CFF00E362118806FAD589A69779D16
3,786,152,105 UART: [art] SIG.R = 7ADF428B9CE8D82FD222677E725550EDCACD759550E1F28FA554865C188F2FF8AF5512232C63F406858E0A15C587E257
3,786,159,476 UART: [art] SIG.S = B84B556088FF9079AA3E3F7B3915CB35793F767D06562EA4AD2A33A97C25448BDA40307B98256BD68D07EC5415535298
3,787,464,162 UART: Caliptra RT
3,787,464,858 UART: [state] CFI Enabled
3,787,797,960 UART: [rt] RT listening for mailbox commands...
3,787,799,851 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,796,538,296 >>> mbox cmd response: success
3,796,570,414 UART:
3,796,570,717 UART: Running Caliptra FMC ...
3,796,571,769 UART:
3,796,571,925 UART: [state] CFI Enabled
3,796,663,953 UART: [art] Extend RT PCRs Done
3,796,665,156 UART: [art] Lock RT PCRs Done
3,796,666,864 UART: [art] Populate DV Done
3,796,672,570 UART: [fht] FMC Alias Private Key: 7
3,796,674,118 UART: [art] Derive CDI
3,796,674,940 UART: [art] Store in in slot 0x4
3,796,733,415 UART: [art] Derive Key Pair
3,796,734,486 UART: [art] Store priv key in slot 0x5
3,800,027,318 UART: [art] Derive Key Pair - Done
3,800,040,172 UART: [art] Signing Cert with AUTHO
3,800,042,022 UART: RITY.KEYID = 7
3,802,328,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,802,329,953 UART: [art] PUB.X = E86DB761EE9A741F967252B4A172044AF56DC52D519AF15B6DDA559392CE31D02D1F796BA479E20F5DE94BEBBC003891
3,802,337,189 UART: [art] PUB.Y = A4C6D83299FA978B0B94E3F2D45CDAF5E2BBAA4A2D35DFD839CA9A115847E47E5ED9E58C8DF17E23B929FEF42EBDAA8A
3,802,344,495 UART: [art] SIG.R = BC73392116D7D9E9B013FD6754ED01C047B68D7BB2B44FA070F9B14D42D130B5CF9F16C2E64596B32351BB823B055C22
3,802,351,873 UART: [art] SIG.S = 7F8459ECC7BD817DF37E8FED2F28E5A979BC824C79646E842303DCFA5610D03E9127AE6D409EB5682CFC58FFF4F54E37
3,803,656,886 UART: Caliptra RT
3,803,657,598 UART: [state] CFI Enabled
3,803,991,029 UART: [rt] RT listening for mailbox commands...
3,803,992,920 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,812,732,410 >>> mbox cmd response: success
3,812,770,036 UART:
3,812,770,346 UART: Running Caliptra FMC ...
3,812,771,492 UART:
3,812,771,664 UART: [state] CFI Enabled
3,812,873,685 UART: [art] Extend RT PCRs Done
3,812,874,884 UART: [art] Lock RT PCRs Done
3,812,876,348 UART: [art] Populate DV Done
3,812,881,821 UART: [fht] FMC Alias Private Key: 7
3,812,883,471 UART: [art] Derive CDI
3,812,884,292 UART: [art] Store in in slot 0x4
3,812,942,591 UART: [art] Derive Key Pair
3,812,943,639 UART: [art] Store priv key in slot 0x5
3,816,236,401 UART: [art] Derive Key Pair - Done
3,816,249,303 UART: [art] Signing Cert with AUTHO
3,816,250,610 UART: RITY.KEYID = 7
3,818,538,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,818,540,016 UART: [art] PUB.X = B71C9DA3A90D40212E59256F1AB1A28424CBA3D372E4E67ED1872A64B42673A7B795FAF8879F897DFCF3880C43F7E9A7
3,818,547,137 UART: [art] PUB.Y = 591A47EB5A6767C5410ECE1D9E33E092224E0755F70B3904CE070DBE52E50D3A69CFF00E362118806FAD589A69779D16
3,818,554,362 UART: [art] SIG.R = 7ADF428B9CE8D82FD222677E725550EDCACD759550E1F28FA554865C188F2FF8AF5512232C63F406858E0A15C587E257
3,818,561,734 UART: [art] SIG.S = B84B556088FF9079AA3E3F7B3915CB35793F767D06562EA4AD2A33A97C25448BDA40307B98256BD68D07EC5415535298
3,819,866,850 UART: Caliptra RT
3,819,867,566 UART: [state] CFI Enabled
3,820,203,237 UART: [rt] RT listening for mailbox commands...
3,820,205,129 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,828,940,786 >>> mbox cmd response: success
3,828,974,917 UART:
3,828,975,192 UART: Running Caliptra FMC ...
3,828,976,308 UART:
3,828,976,478 UART: [state] CFI Enabled
3,829,066,547 UART: [art] Extend RT PCRs Done
3,829,067,745 UART: [art] Lock RT PCRs Done
3,829,068,889 UART: [art] Populate DV Done
3,829,074,256 UART: [fht] FMC Alias Private Key: 7
3,829,075,800 UART: [art] Derive CDI
3,829,076,640 UART: [art] Store in in slot 0x4
3,829,135,586 UART: [art] Derive Key Pair
3,829,136,633 UART: [art] Store priv key in slot 0x5
3,832,429,020 UART: [art] Derive Key Pair - Done
3,832,442,181 UART: [art] Signing Cert with AUTHO
3,832,443,527 UART: RITY.KEYID = 7
3,834,730,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,834,732,322 UART: [art] PUB.X = E86DB761EE9A741F967252B4A172044AF56DC52D519AF15B6DDA559392CE31D02D1F796BA479E20F5DE94BEBBC003891
3,834,739,636 UART: [art] PUB.Y = A4C6D83299FA978B0B94E3F2D45CDAF5E2BBAA4A2D35DFD839CA9A115847E47E5ED9E58C8DF17E23B929FEF42EBDAA8A
3,834,746,896 UART: [art] SIG.R = BC73392116D7D9E9B013FD6754ED01C047B68D7BB2B44FA070F9B14D42D130B5CF9F16C2E64596B32351BB823B055C22
3,834,754,264 UART: [art] SIG.S = 7F8459ECC7BD817DF37E8FED2F28E5A979BC824C79646E842303DCFA5610D03E9127AE6D409EB5682CFC58FFF4F54E37
3,836,059,070 UART: Caliptra RT
3,836,059,800 UART: [state] CFI Enabled
3,836,394,598 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 406.90s
Truncated 1347769 bytes from beginning
UART: [art] Extend RT PCRs Done
3,518,309,521 UART: [art] Lock RT PCRs Done
3,518,311,023 UART: [art] Populate DV Done
3,518,316,591 UART: [fht] FMC Alias Private Key: 7
3,518,318,178 UART: [art] Derive CDI
3,518,318,987 UART: [art] Store in in slot 0x4
3,518,362,124 UART: [art] Derive Key Pair
3,518,363,163 UART: [art] Store priv key in slot 0x5
3,521,604,758 UART: [art] Derive Key Pair - Done
3,521,617,812 UART: [art] Signing Cert with AUTHO
3,521,619,155 UART: RITY.KEYID = 7
3,523,898,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,523,899,888 UART: [art] PUB.X = 4DCCA5E8B8CD2A618277F3558BA25EE40CD9E4936729460C01BB4551D5609FB0E959FD7D010DEB7F607E5E00DF753488
3,523,907,139 UART: [art] PUB.Y = C0AA3A1CA32844C4EBCB52EF4C6949B50784B072B2F4251EAD10D3BB91C7F0CDD018AEF96E96CB76FA37534D25D61A39
3,523,914,421 UART: [art] SIG.R = CCC9E8B04E1A605D18BF48B958250750FAFF77D7D0A41256016E18C682FEE873DC407D6B3CF56D5D85440C35AE6A50A0
3,523,921,808 UART: [art] SIG.S = 9627C2A2450086D49BBAFE169F921FD806B832899722196C56656C0F8A10517F2773563D54D34E001A159A05F21201D1
3,525,226,629 UART: Caliptra RT
3,525,227,343 UART: [state] CFI Enabled
3,525,517,021 UART: [rt] RT listening for mailbox commands...
3,525,518,904 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,525,663,657 UART:
3,525,663,988 UART: Running Caliptra ROM ...
3,525,665,113 UART:
3,525,665,275 UART: [state] CFI Enabled
3,525,682,241 UART: [state] LifecycleState = Unprovisioned
3,525,684,179 UART: [state] DebugLocked = No
3,525,685,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,525,690,732 UART: [kat] SHA2-256
3,525,860,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,525,870,953 UART: [kat] ++
3,525,871,493 UART: [kat] sha1
3,525,883,193 UART: [kat] SHA2-256
3,525,885,903 UART: [kat] SHA2-384
3,525,892,808 UART: [kat] SHA2-512-ACC
3,525,895,205 UART: [kat] ECC-384
3,528,180,884 UART: [kat] HMAC-384Kdf
3,528,192,301 UART: [kat] LMS
3,529,382,391 UART: [kat] --
3,529,386,779 UART: [update-reset] ++
3,533,525,918 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,533,530,520 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,533,912,786 >>> mbox cmd response: success
3,533,913,185 UART: [update-reset] Copying MAN_2 To MAN_1
3,533,935,519 UART: [update-reset Success] --
3,533,939,137 UART: [state] Locking Datavault
3,533,942,556 UART: [state] Locking PCR0, PCR1 and PCR31
3,533,944,257 UART: [state] Locking ICCM
3,533,945,865 UART: [exit] Launching FMC @ 0x40000130
3,533,954,284 UART:
3,533,954,525 UART: Running Caliptra FMC ...
3,533,955,628 UART:
3,533,955,789 UART: [state] CFI Enabled
3,533,999,642 UART: [art] Extend RT PCRs Done
3,534,000,779 UART: [art] Lock RT PCRs Done
3,534,002,340 UART: [art] Populate DV Done
3,534,007,647 UART: [fht] FMC Alias Private Key: 7
3,534,009,344 UART: [art] Derive CDI
3,534,010,183 UART: [art] Store in in slot 0x4
3,534,052,624 UART: [art] Derive Key Pair
3,534,053,624 UART: [art] Store priv key in slot 0x5
3,537,295,111 UART: [art] Derive Key Pair - Done
3,537,307,894 UART: [art] Signing Cert with AUTHO
3,537,309,206 UART: RITY.KEYID = 7
3,539,588,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,539,589,931 UART: [art] PUB.X = 503CEDDA0D3F81736D08586704A63ECE01E5E9CEE18F5A7EFE7A97629CE75526DD097AD521E062A34CADD1882DFDEAD2
3,539,597,176 UART: [art] PUB.Y = 3ACDAF216179FC6E4627C30B62A853D1AD747F755011CAF6DDC99D3C1ED35714055C74DC73F425CE0827423505BF960B
3,539,604,410 UART: [art] SIG.R = 67E5145ED22927FC1A213B94A4ED222C66B1590060A49BEA8559E15966D037B5C144C63172E658B26A59851FFF9782E9
3,539,611,797 UART: [art] SIG.S = 81F2BDC6573737B146AF3D8C175B61FEB959A73B9C28E43E65A9D7A65CE7B0383F5CAF2E07BBB2C6CBDAECB94C882F00
3,540,916,505 UART: Caliptra RT
3,540,917,211 UART: [state] CFI Enabled
3,541,206,295 UART: [rt] RT listening for mailbox commands...
3,541,208,165 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,541,352,818 UART:
3,541,353,137 UART: Running Caliptra ROM ...
3,541,354,175 UART:
3,541,354,488 UART: [state] CFI Enabled
3,541,369,319 UART: [state] LifecycleState = Unprovisioned
3,541,371,245 UART: [state] DebugLocked = No
3,541,373,897 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,541,378,517 UART: [kat] SHA2-256
3,541,548,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,541,558,751 UART: [kat] ++
3,541,559,292 UART: [kat] sha1
3,541,570,184 UART: [kat] SHA2-256
3,541,572,874 UART: [kat] SHA2-384
3,541,579,347 UART: [kat] SHA2-512-ACC
3,541,581,750 UART: [kat] ECC-384
3,543,863,398 UART: [kat] HMAC-384Kdf
3,543,875,888 UART: [kat] LMS
3,545,065,964 UART: [kat] --
3,545,072,496 UART: [update-reset] ++
3,549,211,127 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,549,215,115 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,549,597,373 >>> mbox cmd response: success
3,549,599,395 UART: [update-reset] Copying MAN_2 To MAN_1
3,549,621,803 UART: [update-reset Success] --
3,549,625,467 UART: [state] Locking Datavault
3,549,627,815 UART: [state] Locking PCR0, PCR1 and PCR31
3,549,629,519 UART: [state] Locking ICCM
3,549,630,708 UART: [exit] Launching FMC @ 0x40000130
3,549,639,154 UART:
3,549,639,397 UART: Running Caliptra FMC ...
3,549,640,499 UART:
3,549,640,656 UART: [state] CFI Enabled
3,549,684,827 UART: [art] Extend RT PCRs Done
3,549,685,969 UART: [art] Lock RT PCRs Done
3,549,687,415 UART: [art] Populate DV Done
3,549,692,666 UART: [fht] FMC Alias Private Key: 7
3,549,694,352 UART: [art] Derive CDI
3,549,695,173 UART: [art] Store in in slot 0x4
3,549,737,549 UART: [art] Derive Key Pair
3,549,738,551 UART: [art] Store priv key in slot 0x5
3,552,981,100 UART: [art] Derive Key Pair - Done
3,552,994,050 UART: [art] Signing Cert with AUTHO
3,552,995,369 UART: RITY.KEYID = 7
3,555,274,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,275,907 UART: [art] PUB.X = 4DCCA5E8B8CD2A618277F3558BA25EE40CD9E4936729460C01BB4551D5609FB0E959FD7D010DEB7F607E5E00DF753488
3,555,283,093 UART: [art] PUB.Y = C0AA3A1CA32844C4EBCB52EF4C6949B50784B072B2F4251EAD10D3BB91C7F0CDD018AEF96E96CB76FA37534D25D61A39
3,555,290,409 UART: [art] SIG.R = CCC9E8B04E1A605D18BF48B958250750FAFF77D7D0A41256016E18C682FEE873DC407D6B3CF56D5D85440C35AE6A50A0
3,555,297,814 UART: [art] SIG.S = 9627C2A2450086D49BBAFE169F921FD806B832899722196C56656C0F8A10517F2773563D54D34E001A159A05F21201D1
3,556,603,006 UART: Caliptra RT
3,556,603,727 UART: [state] CFI Enabled
3,556,896,969 UART: [rt] RT listening for mailbox commands...
3,556,898,842 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,557,042,970 UART:
3,557,043,276 UART: Running Caliptra ROM ...
3,557,044,313 UART:
3,557,044,627 UART: [state] CFI Enabled
3,557,059,688 UART: [state] LifecycleState = Unprovisioned
3,557,061,624 UART: [state] DebugLocked = No
3,557,063,203 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,557,068,427 UART: [kat] SHA2-256
3,557,238,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,557,248,677 UART: [kat] ++
3,557,249,134 UART: [kat] sha1
3,557,259,638 UART: [kat] SHA2-256
3,557,262,327 UART: [kat] SHA2-384
3,557,268,959 UART: [kat] SHA2-512-ACC
3,557,271,309 UART: [kat] ECC-384
3,559,556,374 UART: [kat] HMAC-384Kdf
3,559,568,537 UART: [kat] LMS
3,560,758,644 UART: [kat] --
3,560,760,550 UART: [update-reset] ++
3,564,900,194 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,564,903,234 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,565,285,549 >>> mbox cmd response: success
3,565,287,237 UART: [update-reset] Copying MAN_2 To MAN_1
3,565,309,663 UART: [update-reset Success] --
3,565,313,241 UART: [state] Locking Datavault
3,565,317,422 UART: [state] Locking PCR0, PCR1 and PCR31
3,565,319,172 UART: [state] Locking ICCM
3,565,321,677 UART: [exit] Launching FMC @ 0x40000130
3,565,330,132 UART:
3,565,330,367 UART: Running Caliptra FMC ...
3,565,331,388 UART:
3,565,331,533 UART: [state] CFI Enabled
3,565,375,926 UART: [art] Extend RT PCRs Done
3,565,377,109 UART: [art] Lock RT PCRs Done
3,565,378,586 UART: [art] Populate DV Done
3,565,384,206 UART: [fht] FMC Alias Private Key: 7
3,565,385,933 UART: [art] Derive CDI
3,565,386,673 UART: [art] Store in in slot 0x4
3,565,428,833 UART: [art] Derive Key Pair
3,565,429,832 UART: [art] Store priv key in slot 0x5
3,568,672,007 UART: [art] Derive Key Pair - Done
3,568,684,911 UART: [art] Signing Cert with AUTHO
3,568,686,220 UART: RITY.KEYID = 7
3,570,965,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,570,966,637 UART: [art] PUB.X = 503CEDDA0D3F81736D08586704A63ECE01E5E9CEE18F5A7EFE7A97629CE75526DD097AD521E062A34CADD1882DFDEAD2
3,570,973,939 UART: [art] PUB.Y = 3ACDAF216179FC6E4627C30B62A853D1AD747F755011CAF6DDC99D3C1ED35714055C74DC73F425CE0827423505BF960B
3,570,981,114 UART: [art] SIG.R = 67E5145ED22927FC1A213B94A4ED222C66B1590060A49BEA8559E15966D037B5C144C63172E658B26A59851FFF9782E9
3,570,988,513 UART: [art] SIG.S = 81F2BDC6573737B146AF3D8C175B61FEB959A73B9C28E43E65A9D7A65CE7B0383F5CAF2E07BBB2C6CBDAECB94C882F00
3,572,293,271 UART: Caliptra RT
3,572,293,966 UART: [state] CFI Enabled
3,572,579,448 UART: [rt] RT listening for mailbox commands...
3,572,581,338 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,572,725,720 UART:
3,572,726,033 UART: Running Caliptra ROM ...
3,572,727,160 UART:
3,572,727,377 UART: [state] CFI Enabled
3,572,744,185 UART: [state] LifecycleState = Unprovisioned
3,572,746,125 UART: [state] DebugLocked = No
3,572,748,863 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,572,754,300 UART: [kat] SHA2-256
3,572,924,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,572,934,578 UART: [kat] ++
3,572,935,116 UART: [kat] sha1
3,572,946,116 UART: [kat] SHA2-256
3,572,948,804 UART: [kat] SHA2-384
3,572,956,302 UART: [kat] SHA2-512-ACC
3,572,958,653 UART: [kat] ECC-384
3,575,241,046 UART: [kat] HMAC-384Kdf
3,575,254,321 UART: [kat] LMS
3,576,444,414 UART: [kat] --
3,576,450,346 UART: [update-reset] ++
3,580,596,041 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,580,599,935 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
3,580,982,217 >>> mbox cmd response: success
3,580,982,617 UART: [update-reset] Copying MAN_2 To MAN_1
3,581,004,899 UART: [update-reset Success] --
3,581,009,734 UART: [state] Locking Datavault
3,581,012,082 UART: [state] Locking PCR0, PCR1 and PCR31
3,581,013,787 UART: [state] Locking ICCM
3,581,015,941 UART: [exit] Launching FMC @ 0x40000130
3,581,024,337 UART:
3,581,024,575 UART: Running Caliptra FMC ...
3,581,025,678 UART:
3,581,025,836 UART: [state] CFI Enabled
3,581,070,419 UART: [art] Extend RT PCRs Done
3,581,071,612 UART: [art] Lock RT PCRs Done
3,581,072,962 UART: [art] Populate DV Done
3,581,078,426 UART: [fht] FMC Alias Private Key: 7
3,581,079,963 UART: [art] Derive CDI
3,581,080,778 UART: [art] Store in in slot 0x4
3,581,123,643 UART: [art] Derive Key Pair
3,581,124,642 UART: [art] Store priv key in slot 0x5
3,584,366,787 UART: [art] Derive Key Pair - Done
3,584,379,931 UART: [art] Signing Cert with AUTHO
3,584,381,229 UART: RITY.KEYID = 7
3,586,660,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,586,662,445 UART: [art] PUB.X = 4DCCA5E8B8CD2A618277F3558BA25EE40CD9E4936729460C01BB4551D5609FB0E959FD7D010DEB7F607E5E00DF753488
3,586,669,688 UART: [art] PUB.Y = C0AA3A1CA32844C4EBCB52EF4C6949B50784B072B2F4251EAD10D3BB91C7F0CDD018AEF96E96CB76FA37534D25D61A39
3,586,677,023 UART: [art] SIG.R = CCC9E8B04E1A605D18BF48B958250750FAFF77D7D0A41256016E18C682FEE873DC407D6B3CF56D5D85440C35AE6A50A0
3,586,684,412 UART: [art] SIG.S = 9627C2A2450086D49BBAFE169F921FD806B832899722196C56656C0F8A10517F2773563D54D34E001A159A05F21201D1
3,587,989,688 UART: Caliptra RT
3,587,990,401 UART: [state] CFI Enabled
3,588,278,909 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 394.48s
Truncated 716351 bytes from beginning
15740A2FB11DFD7D93A8E23D7A8C6E9
3,631,550,006 UART: [art] SIG.R = 84214D6FEF49A84FCAF217FC25A204BB97389599A6558EEE773BC5358EA915A8577BDF49E66B88FECDD4B63CE2478D85
3,631,557,406 UART: [art] SIG.S = 0703B65DFCE575EE450E4E023D7612A262FD2EB82E3AAF4E6A67CD5C338F31A9DE2FDF5EB7997295F52CD9CB562AF5AF
3,632,862,185 UART: Caliptra RT
3,632,862,884 UART: [state] CFI Enabled
3,633,151,432 UART: [rt] RT listening for mailbox commands...
3,633,153,298 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,641,812,151 >>> mbox cmd response: success
3,641,843,780 UART:
3,641,844,079 UART: Running Caliptra FMC ...
3,641,845,225 UART:
3,641,845,386 UART: [state] CFI Enabled
3,641,889,470 UART: [art] Extend RT PCRs Done
3,641,890,615 UART: [art] Lock RT PCRs Done
3,641,892,171 UART: [art] Populate DV Done
3,641,897,689 UART: [fht] FMC Alias Private Key: 7
3,641,899,343 UART: [art] Derive CDI
3,641,900,082 UART: [art] Store in in slot 0x4
3,641,942,791 UART: [art] Derive Key Pair
3,641,943,854 UART: [art] Store priv key in slot 0x5
3,645,186,090 UART: [art] Derive Key Pair - Done
3,645,199,083 UART: [art] Signing Cert with AUTHO
3,645,200,426 UART: RITY.KEYID = 7
3,647,479,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,647,481,238 UART: [art] PUB.X = F8F3A4826A0120154E2E5CDEE0450DE3D568E7A4FD409CA26133A1E0C9172FEC54E9F3DCB1A1B8BD77B87D394937BC3D
3,647,488,551 UART: [art] PUB.Y = 4BCBC16DF88247215CA1169249696C1B3D33AF5E94E54149A5C3C93FD3CA9FB1BFBB52406CBC10CCD7D9D92E68C4EE6A
3,647,495,764 UART: [art] SIG.R = F4C6E6D2303BB2B1F38D11086BA43C70650C27ED69C51819363961D42C936E0589320015A3ADD3D4039369DD1C93877A
3,647,503,106 UART: [art] SIG.S = 43D6AA3A6F6439464A849D3BA211597E03B1200554A604D21A1B2E8E8B41F4ACC796A386D8C83DAA22AA6162E7483788
3,648,808,579 UART: Caliptra RT
3,648,809,296 UART: [state] CFI Enabled
3,649,096,264 UART: [rt] RT listening for mailbox commands...
3,649,098,146 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,658,288,361 >>> mbox cmd response: success
3,658,324,963 UART:
3,658,325,262 UART: Running Caliptra FMC ...
3,658,326,385 UART:
3,658,326,551 UART: [state] CFI Enabled
3,658,370,456 UART: [art] Extend RT PCRs Done
3,658,371,600 UART: [art] Lock RT PCRs Done
3,658,372,838 UART: [art] Populate DV Done
3,658,378,189 UART: [fht] FMC Alias Private Key: 7
3,658,379,893 UART: [art] Derive CDI
3,658,380,726 UART: [art] Store in in slot 0x4
3,658,423,540 UART: [art] Derive Key Pair
3,658,424,583 UART: [art] Store priv key in slot 0x5
3,661,666,608 UART: [art] Derive Key Pair - Done
3,661,680,021 UART: [art] Signing Cert with AUTHO
3,661,681,363 UART: RITY.KEYID = 7
3,663,960,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,962,392 UART: [art] PUB.X = C3671492FD06583AF58FDD7F2FFADF06DC2B646001E8A79B74CC35C87BD1F7B284083A55CC317D9D14C5EF09606B5868
3,663,969,634 UART: [art] PUB.Y = 1FD75EA10679EAF7BB639FAE2D2E572F9BC791FB6E3460624DD50C1A456EA501A15740A2FB11DFD7D93A8E23D7A8C6E9
3,663,976,861 UART: [art] SIG.R = 84214D6FEF49A84FCAF217FC25A204BB97389599A6558EEE773BC5358EA915A8577BDF49E66B88FECDD4B63CE2478D85
3,663,984,258 UART: [art] SIG.S = 0703B65DFCE575EE450E4E023D7612A262FD2EB82E3AAF4E6A67CD5C338F31A9DE2FDF5EB7997295F52CD9CB562AF5AF
3,665,289,384 UART: Caliptra RT
3,665,290,098 UART: [state] CFI Enabled
3,665,576,027 UART: [rt] RT listening for mailbox commands...
3,665,577,903 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,674,235,122 >>> mbox cmd response: success
3,674,268,573 UART:
3,674,268,850 UART: Running Caliptra FMC ...
3,674,269,967 UART:
3,674,270,130 UART: [state] CFI Enabled
3,674,314,264 UART: [art] Extend RT PCRs Done
3,674,315,454 UART: [art] Lock RT PCRs Done
3,674,316,915 UART: [art] Populate DV Done
3,674,322,326 UART: [fht] FMC Alias Private Key: 7
3,674,324,023 UART: [art] Derive CDI
3,674,324,839 UART: [art] Store in in slot 0x4
3,674,367,216 UART: [art] Derive Key Pair
3,674,368,215 UART: [art] Store priv key in slot 0x5
3,677,610,333 UART: [art] Derive Key Pair - Done
3,677,623,127 UART: [art] Signing Cert with AUTHO
3,677,624,430 UART: RITY.KEYID = 7
3,679,904,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,905,802 UART: [art] PUB.X = F8F3A4826A0120154E2E5CDEE0450DE3D568E7A4FD409CA26133A1E0C9172FEC54E9F3DCB1A1B8BD77B87D394937BC3D
3,679,913,118 UART: [art] PUB.Y = 4BCBC16DF88247215CA1169249696C1B3D33AF5E94E54149A5C3C93FD3CA9FB1BFBB52406CBC10CCD7D9D92E68C4EE6A
3,679,920,367 UART: [art] SIG.R = F4C6E6D2303BB2B1F38D11086BA43C70650C27ED69C51819363961D42C936E0589320015A3ADD3D4039369DD1C93877A
3,679,927,700 UART: [art] SIG.S = 43D6AA3A6F6439464A849D3BA211597E03B1200554A604D21A1B2E8E8B41F4ACC796A386D8C83DAA22AA6162E7483788
3,681,232,629 UART: Caliptra RT
3,681,233,322 UART: [state] CFI Enabled
3,681,519,618 UART: [rt] RT listening for mailbox commands...
3,681,521,508 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,690,174,397 >>> mbox cmd response: success
3,690,207,384 UART:
3,690,207,657 UART: Running Caliptra FMC ...
3,690,208,779 UART:
3,690,208,932 UART: [state] CFI Enabled
3,690,252,841 UART: [art] Extend RT PCRs Done
3,690,254,028 UART: [art] Lock RT PCRs Done
3,690,255,438 UART: [art] Populate DV Done
3,690,260,706 UART: [fht] FMC Alias Private Key: 7
3,690,262,408 UART: [art] Derive CDI
3,690,263,223 UART: [art] Store in in slot 0x4
3,690,305,601 UART: [art] Derive Key Pair
3,690,306,602 UART: [art] Store priv key in slot 0x5
3,693,548,767 UART: [art] Derive Key Pair - Done
3,693,561,444 UART: [art] Signing Cert with AUTHO
3,693,562,745 UART: RITY.KEYID = 7
3,695,842,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,695,843,684 UART: [art] PUB.X = C3671492FD06583AF58FDD7F2FFADF06DC2B646001E8A79B74CC35C87BD1F7B284083A55CC317D9D14C5EF09606B5868
3,695,850,925 UART: [art] PUB.Y = 1FD75EA10679EAF7BB639FAE2D2E572F9BC791FB6E3460624DD50C1A456EA501A15740A2FB11DFD7D93A8E23D7A8C6E9
3,695,858,216 UART: [art] SIG.R = 84214D6FEF49A84FCAF217FC25A204BB97389599A6558EEE773BC5358EA915A8577BDF49E66B88FECDD4B63CE2478D85
3,695,865,610 UART: [art] SIG.S = 0703B65DFCE575EE450E4E023D7612A262FD2EB82E3AAF4E6A67CD5C338F31A9DE2FDF5EB7997295F52CD9CB562AF5AF
3,697,170,613 UART: Caliptra RT
3,697,171,332 UART: [state] CFI Enabled
3,697,458,672 UART: [rt] RT listening for mailbox commands...
3,697,460,566 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,706,112,138 >>> mbox cmd response: success
3,706,147,455 UART:
3,706,147,726 UART: Running Caliptra FMC ...
3,706,148,838 UART:
3,706,149,003 UART: [state] CFI Enabled
3,706,193,124 UART: [art] Extend RT PCRs Done
3,706,194,284 UART: [art] Lock RT PCRs Done
3,706,195,795 UART: [art] Populate DV Done
3,706,201,417 UART: [fht] FMC Alias Private Key: 7
3,706,202,951 UART: [art] Derive CDI
3,706,203,767 UART: [art] Store in in slot 0x4
3,706,246,632 UART: [art] Derive Key Pair
3,706,247,671 UART: [art] Store priv key in slot 0x5
3,709,490,380 UART: [art] Derive Key Pair - Done
3,709,503,556 UART: [art] Signing Cert with AUTHO
3,709,504,875 UART: RITY.KEYID = 7
3,711,784,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,711,786,106 UART: [art] PUB.X = F8F3A4826A0120154E2E5CDEE0450DE3D568E7A4FD409CA26133A1E0C9172FEC54E9F3DCB1A1B8BD77B87D394937BC3D
3,711,792,807 UART: [art] PUB.Y = 4BCBC16DF88247215CA1169249696C1B3D33AF5E94E54149A5C3C93FD3CA9FB1BFBB52406CBC10CCD7D9D92E68C4EE6A
3,711,800,095 UART: [art] SIG.R = F4C6E6D2303BB2B1F38D11086BA43C70650C27ED69C51819363961D42C936E0589320015A3ADD3D4039369DD1C93877A
3,711,807,437 UART: [art] SIG.S = 43D6AA3A6F6439464A849D3BA211597E03B1200554A604D21A1B2E8E8B41F4ACC796A386D8C83DAA22AA6162E7483788
3,713,112,457 UART: Caliptra RT
3,713,113,529 UART: [state] CFI Enabled
3,713,401,885 UART: [rt] RT listening for mailbox commands...
3,713,403,783 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,722,055,018 >>> mbox cmd response: success
3,722,086,034 UART:
3,722,086,347 UART: Running Caliptra FMC ...
3,722,087,473 UART:
3,722,087,633 UART: [state] CFI Enabled
3,722,131,921 UART: [art] Extend RT PCRs Done
3,722,133,088 UART: [art] Lock RT PCRs Done
3,722,134,384 UART: [art] Populate DV Done
3,722,139,855 UART: [fht] FMC Alias Private Key: 7
3,722,141,401 UART: [art] Derive CDI
3,722,142,219 UART: [art] Store in in slot 0x4
3,722,185,149 UART: [art] Derive Key Pair
3,722,186,193 UART: [art] Store priv key in slot 0x5
3,725,428,176 UART: [art] Derive Key Pair - Done
3,725,441,477 UART: [art] Signing Cert with AUTHO
3,725,442,799 UART: RITY.KEYID = 7
3,727,722,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,724,251 UART: [art] PUB.X = C3671492FD06583AF58FDD7F2FFADF06DC2B646001E8A79B74CC35C87BD1F7B284083A55CC317D9D14C5EF09606B5868
3,727,731,504 UART: [art] PUB.Y = 1FD75EA10679EAF7BB639FAE2D2E572F9BC791FB6E3460624DD50C1A456EA501A15740A2FB11DFD7D93A8E23D7A8C6E9
3,727,738,786 UART: [art] SIG.R = 84214D6FEF49A84FCAF217FC25A204BB97389599A6558EEE773BC5358EA915A8577BDF49E66B88FECDD4B63CE2478D85
3,727,746,122 UART: [art] SIG.S = 0703B65DFCE575EE450E4E023D7612A262FD2EB82E3AAF4E6A67CD5C338F31A9DE2FDF5EB7997295F52CD9CB562AF5AF
3,729,051,120 UART: Caliptra RT
3,729,051,846 UART: [state] CFI Enabled
3,729,338,132 UART: [rt] RT listening for mailbox commands...
3,729,340,021 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,738,533,086 >>> mbox cmd response: success
3,738,569,261 UART:
3,738,569,555 UART: Running Caliptra FMC ...
3,738,570,680 UART:
3,738,570,842 UART: [state] CFI Enabled
3,738,615,510 UART: [art] Extend RT PCRs Done
3,738,616,652 UART: [art] Lock RT PCRs Done
3,738,618,100 UART: [art] Populate DV Done
3,738,623,560 UART: [fht] FMC Alias Private Key: 7
3,738,625,040 UART: [art] Derive CDI
3,738,625,806 UART: [art] Store in in slot 0x4
3,738,668,448 UART: [art] Derive Key Pair
3,738,669,480 UART: [art] Store priv key in slot 0x5
3,741,911,753 UART: [art] Derive Key Pair - Done
3,741,924,866 UART: [art] Signing Cert with AUTHO
3,741,926,164 UART: RITY.KEYID = 7
3,744,205,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,744,207,437 UART: [art] PUB.X = F8F3A4826A0120154E2E5CDEE0450DE3D568E7A4FD409CA26133A1E0C9172FEC54E9F3DCB1A1B8BD77B87D394937BC3D
3,744,214,682 UART: [art] PUB.Y = 4BCBC16DF88247215CA1169249696C1B3D33AF5E94E54149A5C3C93FD3CA9FB1BFBB52406CBC10CCD7D9D92E68C4EE6A
3,744,221,967 UART: [art] SIG.R = F4C6E6D2303BB2B1F38D11086BA43C70650C27ED69C51819363961D42C936E0589320015A3ADD3D4039369DD1C93877A
3,744,229,300 UART: [art] SIG.S = 43D6AA3A6F6439464A849D3BA211597E03B1200554A604D21A1B2E8E8B41F4ACC796A386D8C83DAA22AA6162E7483788
3,745,534,818 UART: Caliptra RT
3,745,535,503 UART: [state] CFI Enabled
3,745,827,929 UART: [rt] RT listening for mailbox commands...
3,745,829,913 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,754,499,341 >>> mbox cmd response: success
3,754,532,381 UART:
3,754,532,650 UART: Running Caliptra FMC ...
3,754,533,766 UART:
3,754,533,947 UART: [state] CFI Enabled
3,754,578,238 UART: [art] Extend RT PCRs Done
3,754,579,423 UART: [art] Lock RT PCRs Done
3,754,580,667 UART: [art] Populate DV Done
3,754,586,129 UART: [fht] FMC Alias Private Key: 7
3,754,587,716 UART: [art] Derive CDI
3,754,588,532 UART: [art] Store in in slot 0x4
3,754,630,967 UART: [art] Derive Key Pair
3,754,632,008 UART: [art] Store priv key in slot 0x5
3,757,874,394 UART: [art] Derive Key Pair - Done
3,757,887,065 UART: [art] Signing Cert with AUTHO
3,757,888,373 UART: RITY.KEYID = 7
3,760,167,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,760,169,050 UART: [art] PUB.X = C3671492FD06583AF58FDD7F2FFADF06DC2B646001E8A79B74CC35C87BD1F7B284083A55CC317D9D14C5EF09606B5868
3,760,176,301 UART: [art] PUB.Y = 1FD75EA10679EAF7BB639FAE2D2E572F9BC791FB6E3460624DD50C1A456EA501A15740A2FB11DFD7D93A8E23D7A8C6E9
3,760,183,590 UART: [art] SIG.R = 84214D6FEF49A84FCAF217FC25A204BB97389599A6558EEE773BC5358EA915A8577BDF49E66B88FECDD4B63CE2478D85
3,760,190,995 UART: [art] SIG.S = 0703B65DFCE575EE450E4E023D7612A262FD2EB82E3AAF4E6A67CD5C338F31A9DE2FDF5EB7997295F52CD9CB562AF5AF
3,761,496,364 UART: Caliptra RT
3,761,497,079 UART: [state] CFI Enabled
3,761,783,835 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 403.15s
Truncated 1329516 bytes from beginning
RT:
2,178,905,989 UART: Running Caliptra FMC ...
2,178,907,090 UART:
2,178,907,252 UART: [state] CFI Enabled
2,179,005,407 UART: [art] Extend RT PCRs Done
2,179,006,609 UART: [art] Lock RT PCRs Done
2,179,007,868 UART: [art] Populate DV Done
2,179,013,339 UART: [fht] FMC Alias Private Key: 7
2,179,014,931 UART: [art] Derive CDI
2,179,015,748 UART: [art] Store in in slot 0x4
2,179,075,121 UART: [art] Derive Key Pair
2,179,076,160 UART: [art] Store priv key in slot 0x5
2,181,539,263 UART: [art] Derive Key Pair - Done
2,181,552,033 UART: [art] Signing Cert with AUTHO
2,181,553,375 UART: RITY.KEYID = 7
2,183,264,794 UART: [art] Erasing AUTHORITY.KEYID = 7
2,183,266,300 UART: [art] PUB.X = 3CE2F8D9D43C3F360F181BC363167852771F01A7F9BA43E21F0951DD92C7EE456819770F8934D94F4396D8A1B6E7D683
2,183,273,557 UART: [art] PUB.Y = A4D3E96498C941479469599D5D3820DEA333214A719CE1E25BEF96135917EDF2B64EA0C4E1C3B7119D66AD046EB5AC52
2,183,280,789 UART: [art] SIG.R = 2E43E4B14B521F7C5B5D65D122AF8E523FC899E57D33CADCC508853EABFDDFC731578367CD6030A928719EAB66D493DD
2,183,288,196 UART: [art] SIG.S = E30B43D0806671BAC67EC81060FF9B07A56CF1984A0C6D96BE07CE03D2708BA3E52D484FCD6E033CE624698E1985E0CE
2,184,267,752 UART: Caliptra RT
2,184,268,468 UART: [state] CFI Enabled
2,184,602,518 UART: [rt] RT listening for mailbox commands...
2,184,604,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,184,748,782 UART:
2,184,749,241 UART: Running Caliptra ROM ...
2,184,750,373 UART:
2,184,750,553 UART: [state] CFI Enabled
2,184,821,042 UART: [state] LifecycleState = Unprovisioned
2,184,822,886 UART: [state] DebugLocked = No
2,184,825,893 UART: [state] WD Timer not started. Device not locked for debugging
2,184,829,170 UART: [kat] SHA2-256
2,185,008,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,019,851 UART: [kat] ++
2,185,020,404 UART: [kat] sha1
2,185,031,412 UART: [kat] SHA2-256
2,185,034,434 UART: [kat] SHA2-384
2,185,040,639 UART: [kat] SHA2-512-ACC
2,185,043,582 UART: [kat] ECC-384
2,187,506,683 UART: [kat] HMAC-384Kdf
2,187,528,742 UART: [kat] LMS
2,188,058,193 UART: [kat] --
2,188,062,476 UART: [update-reset] ++
2,191,496,130 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,191,500,197 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,191,883,493 >>> mbox cmd response: success
2,191,884,228 UART: [update-reset] Copying MAN_2 To MAN_1
2,191,906,592 UART: [update-reset Success] --
2,191,912,122 UART: [state] Locking Datavault
2,191,915,698 UART: [state] Locking PCR0, PCR1 and PCR31
2,191,917,348 UART: [state] Locking ICCM
2,191,918,425 UART: [exit] Launching FMC @ 0x40000130
2,191,926,821 UART:
2,191,927,069 UART: Running Caliptra FMC ...
2,191,928,182 UART:
2,191,928,341 UART: [state] CFI Enabled
2,192,019,255 UART: [art] Extend RT PCRs Done
2,192,020,437 UART: [art] Lock RT PCRs Done
2,192,021,623 UART: [art] Populate DV Done
2,192,027,355 UART: [fht] FMC Alias Private Key: 7
2,192,029,169 UART: [art] Derive CDI
2,192,030,036 UART: [art] Store in in slot 0x4
2,192,088,713 UART: [art] Derive Key Pair
2,192,089,734 UART: [art] Store priv key in slot 0x5
2,194,552,514 UART: [art] Derive Key Pair - Done
2,194,565,398 UART: [art] Signing Cert with AUTHO
2,194,566,694 UART: RITY.KEYID = 7
2,196,278,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,196,280,073 UART: [art] PUB.X = EB1AA6F08A905B47AA44A42E96F25ACD6F792C03A82A42438735B897BA84747956F139BBA6A30DCF910BE1D4876B7B42
2,196,287,343 UART: [art] PUB.Y = 72F565BBB6F145BD650C2799738D8D7A06E98BAF23997019FDE2A730B52365B2BDD855BCABA0A375213FD7F4AAA28462
2,196,294,642 UART: [art] SIG.R = 9AC1021E630909B993A91789AF8AE19A80DF5F3D43535390ED956847C12EF35A4C07C25E3ED699AC17046BB6E83B3BD3
2,196,301,995 UART: [art] SIG.S = 0C6FA73A8812ACB40EDF0CEEBCD4F0BE09AD5EFA42F966046EA2E3FBDBBB1AED554795B4EDFE6A3873FC93908A2332FE
2,197,280,999 UART: Caliptra RT
2,197,281,687 UART: [state] CFI Enabled
2,197,616,900 UART: [rt] RT listening for mailbox commands...
2,197,618,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,197,763,581 UART:
2,197,763,889 UART: Running Caliptra ROM ...
2,197,765,019 UART:
2,197,765,205 UART: [state] CFI Enabled
2,197,834,999 UART: [state] LifecycleState = Unprovisioned
2,197,836,877 UART: [state] DebugLocked = No
2,197,839,291 UART: [state] WD Timer not started. Device not locked for debugging
2,197,843,199 UART: [kat] SHA2-256
2,198,022,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,198,033,894 UART: [kat] ++
2,198,034,438 UART: [kat] sha1
2,198,046,849 UART: [kat] SHA2-256
2,198,049,865 UART: [kat] SHA2-384
2,198,055,637 UART: [kat] SHA2-512-ACC
2,198,058,578 UART: [kat] ECC-384
2,200,514,637 UART: [kat] HMAC-384Kdf
2,200,542,846 UART: [kat] LMS
2,201,072,339 UART: [kat] --
2,201,077,685 UART: [update-reset] ++
2,204,502,584 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,204,505,085 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,204,888,434 >>> mbox cmd response: success
2,204,889,627 UART: [update-reset] Copying MAN_2 To MAN_1
2,204,911,962 UART: [update-reset Success] --
2,204,916,453 UART: [state] Locking Datavault
2,204,918,418 UART: [state] Locking PCR0, PCR1 and PCR31
2,204,920,068 UART: [state] Locking ICCM
2,204,922,332 UART: [exit] Launching FMC @ 0x40000130
2,204,930,733 UART:
2,204,930,983 UART: Running Caliptra FMC ...
2,204,932,091 UART:
2,204,932,261 UART: [state] CFI Enabled
2,205,032,970 UART: [art] Extend RT PCRs Done
2,205,034,157 UART: [art] Lock RT PCRs Done
2,205,035,617 UART: [art] Populate DV Done
2,205,041,102 UART: [fht] FMC Alias Private Key: 7
2,205,042,648 UART: [art] Derive CDI
2,205,043,469 UART: [art] Store in in slot 0x4
2,205,102,457 UART: [art] Derive Key Pair
2,205,103,498 UART: [art] Store priv key in slot 0x5
2,207,565,943 UART: [art] Derive Key Pair - Done
2,207,578,942 UART: [art] Signing Cert with AUTHO
2,207,580,252 UART: RITY.KEYID = 7
2,209,292,120 UART: [art] Erasing AUTHORITY.KEYID = 7
2,209,293,628 UART: [art] PUB.X = 3CE2F8D9D43C3F360F181BC363167852771F01A7F9BA43E21F0951DD92C7EE456819770F8934D94F4396D8A1B6E7D683
2,209,300,892 UART: [art] PUB.Y = A4D3E96498C941479469599D5D3820DEA333214A719CE1E25BEF96135917EDF2B64EA0C4E1C3B7119D66AD046EB5AC52
2,209,308,138 UART: [art] SIG.R = 2E43E4B14B521F7C5B5D65D122AF8E523FC899E57D33CADCC508853EABFDDFC731578367CD6030A928719EAB66D493DD
2,209,315,579 UART: [art] SIG.S = E30B43D0806671BAC67EC81060FF9B07A56CF1984A0C6D96BE07CE03D2708BA3E52D484FCD6E033CE624698E1985E0CE
2,210,294,909 UART: Caliptra RT
2,210,295,599 UART: [state] CFI Enabled
2,210,629,889 UART: [rt] RT listening for mailbox commands...
2,210,631,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,210,776,737 UART:
2,210,777,046 UART: Running Caliptra ROM ...
2,210,778,174 UART:
2,210,778,338 UART: [state] CFI Enabled
2,210,847,804 UART: [state] LifecycleState = Unprovisioned
2,210,849,681 UART: [state] DebugLocked = No
2,210,851,178 UART: [state] WD Timer not started. Device not locked for debugging
2,210,854,537 UART: [kat] SHA2-256
2,211,033,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,045,200 UART: [kat] ++
2,211,045,744 UART: [kat] sha1
2,211,056,644 UART: [kat] SHA2-256
2,211,059,667 UART: [kat] SHA2-384
2,211,065,978 UART: [kat] SHA2-512-ACC
2,211,068,922 UART: [kat] ECC-384
2,213,532,283 UART: [kat] HMAC-384Kdf
2,213,555,228 UART: [kat] LMS
2,214,084,664 UART: [kat] --
2,214,090,170 UART: [update-reset] ++
2,217,519,835 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,217,522,505 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,217,905,787 >>> mbox cmd response: success
2,217,906,437 UART: [update-reset] Copying MAN_2 To MAN_1
2,217,928,767 UART: [update-reset Success] --
2,217,932,729 UART: [state] Locking Datavault
2,217,936,145 UART: [state] Locking PCR0, PCR1 and PCR31
2,217,937,791 UART: [state] Locking ICCM
2,217,940,428 UART: [exit] Launching FMC @ 0x40000130
2,217,948,881 UART:
2,217,949,117 UART: Running Caliptra FMC ...
2,217,950,431 UART:
2,217,950,623 UART: [state] CFI Enabled
2,218,044,905 UART: [art] Extend RT PCRs Done
2,218,046,093 UART: [art] Lock RT PCRs Done
2,218,047,715 UART: [art] Populate DV Done
2,218,053,075 UART: [fht] FMC Alias Private Key: 7
2,218,054,669 UART: [art] Derive CDI
2,218,055,486 UART: [art] Store in in slot 0x4
2,218,113,720 UART: [art] Derive Key Pair
2,218,114,757 UART: [art] Store priv key in slot 0x5
2,220,577,499 UART: [art] Derive Key Pair - Done
2,220,590,565 UART: [art] Signing Cert with AUTHO
2,220,591,903 UART: RITY.KEYID = 7
2,222,302,706 UART: [art] Erasing AUTHORITY.KEYID = 7
2,222,304,220 UART: [art] PUB.X = EB1AA6F08A905B47AA44A42E96F25ACD6F792C03A82A42438735B897BA84747956F139BBA6A30DCF910BE1D4876B7B42
2,222,311,537 UART: [art] PUB.Y = 72F565BBB6F145BD650C2799738D8D7A06E98BAF23997019FDE2A730B52365B2BDD855BCABA0A375213FD7F4AAA28462
2,222,318,746 UART: [art] SIG.R = 9AC1021E630909B993A91789AF8AE19A80DF5F3D43535390ED956847C12EF35A4C07C25E3ED699AC17046BB6E83B3BD3
2,222,326,170 UART: [art] SIG.S = 0C6FA73A8812ACB40EDF0CEEBCD4F0BE09AD5EFA42F966046EA2E3FBDBBB1AED554795B4EDFE6A3873FC93908A2332FE
2,223,305,613 UART: Caliptra RT
2,223,306,325 UART: [state] CFI Enabled
2,223,641,695 UART: [rt] RT listening for mailbox commands...
2,223,643,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,223,788,405 UART:
2,223,788,706 UART: Running Caliptra ROM ...
2,223,789,930 UART:
2,223,790,096 UART: [state] CFI Enabled
2,223,857,004 UART: [state] LifecycleState = Unprovisioned
2,223,858,908 UART: [state] DebugLocked = No
2,223,861,274 UART: [state] WD Timer not started. Device not locked for debugging
2,223,865,448 UART: [kat] SHA2-256
2,224,044,600 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,224,056,182 UART: [kat] ++
2,224,056,648 UART: [kat] sha1
2,224,067,609 UART: [kat] SHA2-256
2,224,070,682 UART: [kat] SHA2-384
2,224,075,913 UART: [kat] SHA2-512-ACC
2,224,078,810 UART: [kat] ECC-384
2,226,540,138 UART: [kat] HMAC-384Kdf
2,226,563,220 UART: [kat] LMS
2,227,092,639 UART: [kat] --
2,227,095,654 UART: [update-reset] ++
2,230,525,349 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,230,529,201 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,230,912,536 >>> mbox cmd response: success
2,230,913,189 UART: [update-reset] Copying MAN_2 To MAN_1
2,230,935,526 UART: [update-reset Success] --
2,230,941,212 UART: [state] Locking Datavault
2,230,945,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,230,947,080 UART: [state] Locking ICCM
2,230,948,340 UART: [exit] Launching FMC @ 0x40000130
2,230,956,792 UART:
2,230,957,035 UART: Running Caliptra FMC ...
2,230,958,140 UART:
2,230,958,307 UART: [state] CFI Enabled
2,231,054,755 UART: [art] Extend RT PCRs Done
2,231,055,946 UART: [art] Lock RT PCRs Done
2,231,057,624 UART: [art] Populate DV Done
2,231,062,937 UART: [fht] FMC Alias Private Key: 7
2,231,064,580 UART: [art] Derive CDI
2,231,065,398 UART: [art] Store in in slot 0x4
2,231,123,258 UART: [art] Derive Key Pair
2,231,124,298 UART: [art] Store priv key in slot 0x5
2,233,587,252 UART: [art] Derive Key Pair - Done
2,233,600,175 UART: [art] Signing Cert with AUTHO
2,233,601,505 UART: RITY.KEYID = 7
2,235,307,808 UART: [art] Erasing AUTHORITY.KEYID = 7
2,235,309,464 UART: [art] PUB.X = 3CE2F8D9D43C3F360F181BC363167852771F01A7F9BA43E21F0951DD92C7EE456819770F8934D94F4396D8A1B6E7D683
2,235,316,608 UART: [art] PUB.Y = A4D3E96498C941479469599D5D3820DEA333214A719CE1E25BEF96135917EDF2B64EA0C4E1C3B7119D66AD046EB5AC52
2,235,323,810 UART: [art] SIG.R = 2E43E4B14B521F7C5B5D65D122AF8E523FC899E57D33CADCC508853EABFDDFC731578367CD6030A928719EAB66D493DD
2,235,331,214 UART: [art] SIG.S = E30B43D0806671BAC67EC81060FF9B07A56CF1984A0C6D96BE07CE03D2708BA3E52D484FCD6E033CE624698E1985E0CE
2,236,310,353 UART: Caliptra RT
2,236,311,075 UART: [state] CFI Enabled
2,236,644,231 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 326.90s
Truncated 714801 bytes from beginning
F8A1140689A876CE1CE2E1B0BE40833
2,057,537,287 UART: [art] SIG.R = 1B91251CD5687C3BF635B4694ABB09C8DB433228F89FC34BD748A137260A189EAF8A4A11AA26E8F9E2FD7665C52662D7
2,057,544,682 UART: [art] SIG.S = 084306BF40185B64F3FB0CA96E279042F95B352E2D102411A316FFCBFDE8A64B1312C53B35F23D0D58C46B60D6839311
2,058,523,859 UART: Caliptra RT
2,058,524,577 UART: [state] CFI Enabled
2,058,863,004 UART: [rt] RT listening for mailbox commands...
2,058,864,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,066,008,987 >>> mbox cmd response: success
2,066,047,488 UART:
2,066,047,793 UART: Running Caliptra FMC ...
2,066,048,928 UART:
2,066,049,104 UART: [state] CFI Enabled
2,066,147,941 UART: [art] Extend RT PCRs Done
2,066,149,137 UART: [art] Lock RT PCRs Done
2,066,150,221 UART: [art] Populate DV Done
2,066,155,634 UART: [fht] FMC Alias Private Key: 7
2,066,157,229 UART: [art] Derive CDI
2,066,158,049 UART: [art] Store in in slot 0x4
2,066,216,886 UART: [art] Derive Key Pair
2,066,217,937 UART: [art] Store priv key in slot 0x5
2,068,680,856 UART: [art] Derive Key Pair - Done
2,068,693,532 UART: [art] Signing Cert with AUTHO
2,068,694,864 UART: RITY.KEYID = 7
2,070,406,432 UART: [art] Erasing AUTHORITY.KEYID = 7
2,070,407,930 UART: [art] PUB.X = D45CA1137072C1BD5EBB2A17815562904CB6D9559A991880B17102ACD556A59E180A7262882AFCDAD5BBD554B635263D
2,070,415,182 UART: [art] PUB.Y = FCC28A93A9BFEB9504831DF552A03E93E631C8960F0BBEE6E4FC607F972724A6AA789F9C270BC4AE58EF1CA8CE34D15E
2,070,422,490 UART: [art] SIG.R = 0CE97BFCD81C587C75E5EC0A80E2962002E1FE4886B226063B0ED3B1DFA4A971D070100C820B0BA977F3654265F34D74
2,070,429,834 UART: [art] SIG.S = 37A6EA4F2E7023429D66DAB343602298C756D1D549449F1746C7E4116929AFE83EC765A09C6F953E6046A7B23370CE1F
2,071,408,831 UART: Caliptra RT
2,071,409,549 UART: [state] CFI Enabled
2,071,746,729 UART: [rt] RT listening for mailbox commands...
2,071,748,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,078,874,773 >>> mbox cmd response: success
2,078,907,382 UART:
2,078,907,659 UART: Running Caliptra FMC ...
2,078,908,788 UART:
2,078,908,960 UART: [state] CFI Enabled
2,079,010,682 UART: [art] Extend RT PCRs Done
2,079,011,924 UART: [art] Lock RT PCRs Done
2,079,013,208 UART: [art] Populate DV Done
2,079,018,787 UART: [fht] FMC Alias Private Key: 7
2,079,020,505 UART: [art] Derive CDI
2,079,021,333 UART: [art] Store in in slot 0x4
2,079,080,498 UART: [art] Derive Key Pair
2,079,081,545 UART: [art] Store priv key in slot 0x5
2,081,544,635 UART: [art] Derive Key Pair - Done
2,081,557,689 UART: [art] Signing Cert with AUTHO
2,081,558,999 UART: RITY.KEYID = 7
2,083,270,797 UART: [art] Erasing AUTHORITY.KEYID = 7
2,083,272,309 UART: [art] PUB.X = C6D4D0F61B8B9FE57CCEDEADEE6974F2972B16F0A6A4873B7117C2DD22A3CADDBEE061A365C146EF2F87E553567DD86F
2,083,279,613 UART: [art] PUB.Y = 38218E4FDE5523FDE83CD6414ACC3DAD10EC20AB96A0B3512B8AED410C825D85DF8A1140689A876CE1CE2E1B0BE40833
2,083,286,901 UART: [art] SIG.R = 1B91251CD5687C3BF635B4694ABB09C8DB433228F89FC34BD748A137260A189EAF8A4A11AA26E8F9E2FD7665C52662D7
2,083,294,293 UART: [art] SIG.S = 084306BF40185B64F3FB0CA96E279042F95B352E2D102411A316FFCBFDE8A64B1312C53B35F23D0D58C46B60D6839311
2,084,272,737 UART: Caliptra RT
2,084,273,451 UART: [state] CFI Enabled
2,084,611,643 UART: [rt] RT listening for mailbox commands...
2,084,613,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,091,730,035 >>> mbox cmd response: success
2,091,765,025 UART:
2,091,765,307 UART: Running Caliptra FMC ...
2,091,766,433 UART:
2,091,766,605 UART: [state] CFI Enabled
2,091,855,764 UART: [art] Extend RT PCRs Done
2,091,856,961 UART: [art] Lock RT PCRs Done
2,091,858,372 UART: [art] Populate DV Done
2,091,864,001 UART: [fht] FMC Alias Private Key: 7
2,091,865,712 UART: [art] Derive CDI
2,091,866,534 UART: [art] Store in in slot 0x4
2,091,924,554 UART: [art] Derive Key Pair
2,091,925,606 UART: [art] Store priv key in slot 0x5
2,094,388,354 UART: [art] Derive Key Pair - Done
2,094,401,410 UART: [art] Signing Cert with AUTHO
2,094,402,725 UART: RITY.KEYID = 7
2,096,114,241 UART: [art] Erasing AUTHORITY.KEYID = 7
2,096,115,759 UART: [art] PUB.X = D45CA1137072C1BD5EBB2A17815562904CB6D9559A991880B17102ACD556A59E180A7262882AFCDAD5BBD554B635263D
2,096,123,038 UART: [art] PUB.Y = FCC28A93A9BFEB9504831DF552A03E93E631C8960F0BBEE6E4FC607F972724A6AA789F9C270BC4AE58EF1CA8CE34D15E
2,096,130,289 UART: [art] SIG.R = 0CE97BFCD81C587C75E5EC0A80E2962002E1FE4886B226063B0ED3B1DFA4A971D070100C820B0BA977F3654265F34D74
2,096,137,700 UART: [art] SIG.S = 37A6EA4F2E7023429D66DAB343602298C756D1D549449F1746C7E4116929AFE83EC765A09C6F953E6046A7B23370CE1F
2,097,116,762 UART: Caliptra RT
2,097,117,471 UART: [state] CFI Enabled
2,097,451,408 UART: [rt] RT listening for mailbox commands...
2,097,453,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,104,594,698 >>> mbox cmd response: success
2,104,631,069 UART:
2,104,631,378 UART: Running Caliptra FMC ...
2,104,632,502 UART:
2,104,632,684 UART: [state] CFI Enabled
2,104,719,339 UART: [art] Extend RT PCRs Done
2,104,720,542 UART: [art] Lock RT PCRs Done
2,104,722,112 UART: [art] Populate DV Done
2,104,727,682 UART: [fht] FMC Alias Private Key: 7
2,104,729,221 UART: [art] Derive CDI
2,104,730,036 UART: [art] Store in in slot 0x4
2,104,788,440 UART: [art] Derive Key Pair
2,104,789,486 UART: [art] Store priv key in slot 0x5
2,107,252,307 UART: [art] Derive Key Pair - Done
2,107,265,202 UART: [art] Signing Cert with AUTHO
2,107,266,508 UART: RITY.KEYID = 7
2,108,978,317 UART: [art] Erasing AUTHORITY.KEYID = 7
2,108,979,820 UART: [art] PUB.X = C6D4D0F61B8B9FE57CCEDEADEE6974F2972B16F0A6A4873B7117C2DD22A3CADDBEE061A365C146EF2F87E553567DD86F
2,108,987,126 UART: [art] PUB.Y = 38218E4FDE5523FDE83CD6414ACC3DAD10EC20AB96A0B3512B8AED410C825D85DF8A1140689A876CE1CE2E1B0BE40833
2,108,994,409 UART: [art] SIG.R = 1B91251CD5687C3BF635B4694ABB09C8DB433228F89FC34BD748A137260A189EAF8A4A11AA26E8F9E2FD7665C52662D7
2,109,001,854 UART: [art] SIG.S = 084306BF40185B64F3FB0CA96E279042F95B352E2D102411A316FFCBFDE8A64B1312C53B35F23D0D58C46B60D6839311
2,109,980,890 UART: Caliptra RT
2,109,981,589 UART: [state] CFI Enabled
2,110,313,616 UART: [rt] RT listening for mailbox commands...
2,110,315,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,117,460,160 >>> mbox cmd response: success
2,117,495,676 UART:
2,117,495,984 UART: Running Caliptra FMC ...
2,117,497,112 UART:
2,117,497,280 UART: [state] CFI Enabled
2,117,603,339 UART: [art] Extend RT PCRs Done
2,117,604,520 UART: [art] Lock RT PCRs Done
2,117,606,166 UART: [art] Populate DV Done
2,117,611,368 UART: [fht] FMC Alias Private Key: 7
2,117,612,854 UART: [art] Derive CDI
2,117,613,593 UART: [art] Store in in slot 0x4
2,117,672,116 UART: [art] Derive Key Pair
2,117,673,156 UART: [art] Store priv key in slot 0x5
2,120,135,309 UART: [art] Derive Key Pair - Done
2,120,148,309 UART: [art] Signing Cert with AUTHO
2,120,149,616 UART: RITY.KEYID = 7
2,121,861,378 UART: [art] Erasing AUTHORITY.KEYID = 7
2,121,862,890 UART: [art] PUB.X = D45CA1137072C1BD5EBB2A17815562904CB6D9559A991880B17102ACD556A59E180A7262882AFCDAD5BBD554B635263D
2,121,870,094 UART: [art] PUB.Y = FCC28A93A9BFEB9504831DF552A03E93E631C8960F0BBEE6E4FC607F972724A6AA789F9C270BC4AE58EF1CA8CE34D15E
2,121,877,394 UART: [art] SIG.R = 0CE97BFCD81C587C75E5EC0A80E2962002E1FE4886B226063B0ED3B1DFA4A971D070100C820B0BA977F3654265F34D74
2,121,884,824 UART: [art] SIG.S = 37A6EA4F2E7023429D66DAB343602298C756D1D549449F1746C7E4116929AFE83EC765A09C6F953E6046A7B23370CE1F
2,122,863,802 UART: Caliptra RT
2,122,864,515 UART: [state] CFI Enabled
2,123,199,887 UART: [rt] RT listening for mailbox commands...
2,123,201,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,130,342,942 >>> mbox cmd response: success
2,130,377,643 UART:
2,130,377,964 UART: Running Caliptra FMC ...
2,130,379,008 UART:
2,130,379,172 UART: [state] CFI Enabled
2,130,484,368 UART: [art] Extend RT PCRs Done
2,130,485,547 UART: [art] Lock RT PCRs Done
2,130,487,139 UART: [art] Populate DV Done
2,130,492,690 UART: [fht] FMC Alias Private Key: 7
2,130,494,289 UART: [art] Derive CDI
2,130,495,028 UART: [art] Store in in slot 0x4
2,130,553,267 UART: [art] Derive Key Pair
2,130,554,308 UART: [art] Store priv key in slot 0x5
2,133,017,471 UART: [art] Derive Key Pair - Done
2,133,030,421 UART: [art] Signing Cert with AUTHO
2,133,031,733 UART: RITY.KEYID = 7
2,134,743,259 UART: [art] Erasing AUTHORITY.KEYID = 7
2,134,744,759 UART: [art] PUB.X = C6D4D0F61B8B9FE57CCEDEADEE6974F2972B16F0A6A4873B7117C2DD22A3CADDBEE061A365C146EF2F87E553567DD86F
2,134,752,082 UART: [art] PUB.Y = 38218E4FDE5523FDE83CD6414ACC3DAD10EC20AB96A0B3512B8AED410C825D85DF8A1140689A876CE1CE2E1B0BE40833
2,134,759,374 UART: [art] SIG.R = 1B91251CD5687C3BF635B4694ABB09C8DB433228F89FC34BD748A137260A189EAF8A4A11AA26E8F9E2FD7665C52662D7
2,134,766,754 UART: [art] SIG.S = 084306BF40185B64F3FB0CA96E279042F95B352E2D102411A316FFCBFDE8A64B1312C53B35F23D0D58C46B60D6839311
2,135,745,874 UART: Caliptra RT
2,135,746,597 UART: [state] CFI Enabled
2,136,085,245 UART: [rt] RT listening for mailbox commands...
2,136,087,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,143,202,271 >>> mbox cmd response: success
2,143,239,736 UART:
2,143,240,009 UART: Running Caliptra FMC ...
2,143,241,342 UART:
2,143,241,519 UART: [state] CFI Enabled
2,143,344,277 UART: [art] Extend RT PCRs Done
2,143,345,468 UART: [art] Lock RT PCRs Done
2,143,346,905 UART: [art] Populate DV Done
2,143,352,425 UART: [fht] FMC Alias Private Key: 7
2,143,354,038 UART: [art] Derive CDI
2,143,354,784 UART: [art] Store in in slot 0x4
2,143,413,374 UART: [art] Derive Key Pair
2,143,414,439 UART: [art] Store priv key in slot 0x5
2,145,876,619 UART: [art] Derive Key Pair - Done
2,145,889,503 UART: [art] Signing Cert with AUTHO
2,145,890,829 UART: RITY.KEYID = 7
2,147,602,273 UART: [art] Erasing AUTHORITY.KEYID = 7
2,147,603,774 UART: [art] PUB.X = D45CA1137072C1BD5EBB2A17815562904CB6D9559A991880B17102ACD556A59E180A7262882AFCDAD5BBD554B635263D
2,147,611,015 UART: [art] PUB.Y = FCC28A93A9BFEB9504831DF552A03E93E631C8960F0BBEE6E4FC607F972724A6AA789F9C270BC4AE58EF1CA8CE34D15E
2,147,618,315 UART: [art] SIG.R = 0CE97BFCD81C587C75E5EC0A80E2962002E1FE4886B226063B0ED3B1DFA4A971D070100C820B0BA977F3654265F34D74
2,147,625,708 UART: [art] SIG.S = 37A6EA4F2E7023429D66DAB343602298C756D1D549449F1746C7E4116929AFE83EC765A09C6F953E6046A7B23370CE1F
2,148,604,408 UART: Caliptra RT
2,148,605,102 UART: [state] CFI Enabled
2,148,941,085 UART: [rt] RT listening for mailbox commands...
2,148,942,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,156,087,651 >>> mbox cmd response: success
2,156,122,424 UART:
2,156,122,744 UART: Running Caliptra FMC ...
2,156,123,790 UART:
2,156,123,944 UART: [state] CFI Enabled
2,156,226,123 UART: [art] Extend RT PCRs Done
2,156,227,312 UART: [art] Lock RT PCRs Done
2,156,228,639 UART: [art] Populate DV Done
2,156,233,945 UART: [fht] FMC Alias Private Key: 7
2,156,235,540 UART: [art] Derive CDI
2,156,236,278 UART: [art] Store in in slot 0x4
2,156,294,722 UART: [art] Derive Key Pair
2,156,295,760 UART: [art] Store priv key in slot 0x5
2,158,758,197 UART: [art] Derive Key Pair - Done
2,158,771,348 UART: [art] Signing Cert with AUTHO
2,158,772,680 UART: RITY.KEYID = 7
2,160,483,804 UART: [art] Erasing AUTHORITY.KEYID = 7
2,160,485,309 UART: [art] PUB.X = C6D4D0F61B8B9FE57CCEDEADEE6974F2972B16F0A6A4873B7117C2DD22A3CADDBEE061A365C146EF2F87E553567DD86F
2,160,492,605 UART: [art] PUB.Y = 38218E4FDE5523FDE83CD6414ACC3DAD10EC20AB96A0B3512B8AED410C825D85DF8A1140689A876CE1CE2E1B0BE40833
2,160,499,887 UART: [art] SIG.R = 1B91251CD5687C3BF635B4694ABB09C8DB433228F89FC34BD748A137260A189EAF8A4A11AA26E8F9E2FD7665C52662D7
2,160,507,277 UART: [art] SIG.S = 084306BF40185B64F3FB0CA96E279042F95B352E2D102411A316FFCBFDE8A64B1312C53B35F23D0D58C46B60D6839311
2,161,486,159 UART: Caliptra RT
2,161,486,867 UART: [state] CFI Enabled
2,161,821,563 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 323.16s
Truncated 1329916 bytes from beginning
RT:
2,358,257,471 UART: Running Caliptra FMC ...
2,358,258,572 UART:
2,358,258,725 UART: [state] CFI Enabled
2,358,302,959 UART: [art] Extend RT PCRs Done
2,358,304,143 UART: [art] Lock RT PCRs Done
2,358,305,437 UART: [art] Populate DV Done
2,358,310,898 UART: [fht] FMC Alias Private Key: 7
2,358,312,602 UART: [art] Derive CDI
2,358,313,414 UART: [art] Store in in slot 0x4
2,358,356,222 UART: [art] Derive Key Pair
2,358,357,268 UART: [art] Store priv key in slot 0x5
2,360,784,092 UART: [art] Derive Key Pair - Done
2,360,797,103 UART: [art] Signing Cert with AUTHO
2,360,798,408 UART: RITY.KEYID = 7
2,362,503,735 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,505,232 UART: [art] PUB.X = 257FD14FDF10032C18C14F09F541F0D6F51CEB5EAC61730AA2D4872A29CC1C48DF9A55397F662E80AB28D88B3606C2D2
2,362,512,524 UART: [art] PUB.Y = 283B19F87321CB5F46B30EEF6D43DD9E643CD17FE27F34FC2389D14C0C2A0173EF82E615317921A3858E1F83E9B8657D
2,362,519,809 UART: [art] SIG.R = 1209C8E1601683D19EF476E0E2F38A67360A0D2EDF1C5E31496BA6E5D9BA84A9FB9168EDFC49C4B077888AFA9CF09769
2,362,527,203 UART: [art] SIG.S = 2ADD9C833546A63B26BE3300D0A0FA2324382A6EABA28239A35AC6F3A60F7BE7E0692BC4F8CE7C38959E43BA8E489AF5
2,363,506,313 UART: Caliptra RT
2,363,507,069 UART: [state] CFI Enabled
2,363,793,896 UART: [rt] RT listening for mailbox commands...
2,363,795,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,363,940,449 UART:
2,363,940,901 UART: Running Caliptra ROM ...
2,363,941,937 UART:
2,363,942,088 UART: [state] CFI Enabled
2,365,788,762 UART: [state] LifecycleState = Unprovisioned
2,365,790,683 UART: [state] DebugLocked = No
2,365,792,911 UART: [state] WD Timer not started. Device not locked for debugging
2,365,796,679 UART: [kat] SHA2-256
2,365,975,828 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,365,987,404 UART: [kat] ++
2,365,987,950 UART: [kat] sha1
2,366,000,031 UART: [kat] SHA2-256
2,366,003,046 UART: [kat] SHA2-384
2,366,009,685 UART: [kat] SHA2-512-ACC
2,366,012,639 UART: [kat] ECC-384
2,368,454,862 UART: [kat] HMAC-384Kdf
2,368,466,709 UART: [kat] LMS
2,368,996,269 UART: [kat] --
2,369,001,303 UART: [update-reset] ++
2,372,424,476 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,428,611 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,372,811,948 >>> mbox cmd response: success
2,372,812,942 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,835,294 UART: [update-reset Success] --
2,372,838,759 UART: [state] Locking Datavault
2,372,841,213 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,842,861 UART: [state] Locking ICCM
2,372,843,934 UART: [exit] Launching FMC @ 0x40000130
2,372,852,387 UART:
2,372,852,625 UART: Running Caliptra FMC ...
2,372,853,729 UART:
2,372,853,885 UART: [state] CFI Enabled
2,372,897,949 UART: [art] Extend RT PCRs Done
2,372,899,093 UART: [art] Lock RT PCRs Done
2,372,900,921 UART: [art] Populate DV Done
2,372,906,482 UART: [fht] FMC Alias Private Key: 7
2,372,908,198 UART: [art] Derive CDI
2,372,909,018 UART: [art] Store in in slot 0x4
2,372,951,506 UART: [art] Derive Key Pair
2,372,952,523 UART: [art] Store priv key in slot 0x5
2,375,380,101 UART: [art] Derive Key Pair - Done
2,375,393,071 UART: [art] Signing Cert with AUTHO
2,375,394,382 UART: RITY.KEYID = 7
2,377,099,963 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,101,454 UART: [art] PUB.X = 6D667AD74D3886230C995F13381D1AC7CB649BE09349D14E44880936A83B51B327CC5F7A822D4C0C50A7C54D4781D025
2,377,108,689 UART: [art] PUB.Y = 53DE20EEE1B46693F23878D09A5A621C3350215F4111FE7D838D4E254BCE7E9F569DE47D47581B51F8E1BB48478B28D1
2,377,115,973 UART: [art] SIG.R = F50A6234CC1C01CDDA04F229FC187D7C25BD9EEB880C227242E42DBDB31F35E707A5C9949C1FAA269050D4FD598609D4
2,377,123,369 UART: [art] SIG.S = 8A3D954EF05B1AACC7F9105BF7D84FEB5C7DB3CE24A0989DB7D2056BFBACFE8DFE284AAACF726B59B794E4795EBA2ADE
2,378,102,519 UART: Caliptra RT
2,378,103,240 UART: [state] CFI Enabled
2,378,390,698 UART: [rt] RT listening for mailbox commands...
2,378,392,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,378,537,142 UART:
2,378,537,445 UART: Running Caliptra ROM ...
2,378,538,561 UART:
2,378,538,740 UART: [state] CFI Enabled
2,378,553,219 UART: [state] LifecycleState = Unprovisioned
2,378,555,058 UART: [state] DebugLocked = No
2,378,557,151 UART: [state] WD Timer not started. Device not locked for debugging
2,378,560,133 UART: [kat] SHA2-256
2,378,739,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,378,750,838 UART: [kat] ++
2,378,751,386 UART: [kat] sha1
2,378,762,709 UART: [kat] SHA2-256
2,378,765,726 UART: [kat] SHA2-384
2,378,771,332 UART: [kat] SHA2-512-ACC
2,378,774,273 UART: [kat] ECC-384
2,381,213,543 UART: [kat] HMAC-384Kdf
2,381,226,353 UART: [kat] LMS
2,381,755,860 UART: [kat] --
2,381,760,027 UART: [update-reset] ++
2,385,187,644 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,385,190,911 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,385,574,204 >>> mbox cmd response: success
2,385,574,611 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,596,899 UART: [update-reset Success] --
2,385,599,626 UART: [state] Locking Datavault
2,385,603,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,385,604,795 UART: [state] Locking ICCM
2,385,606,029 UART: [exit] Launching FMC @ 0x40000130
2,385,614,434 UART:
2,385,614,670 UART: Running Caliptra FMC ...
2,385,615,768 UART:
2,385,615,927 UART: [state] CFI Enabled
2,385,659,930 UART: [art] Extend RT PCRs Done
2,385,661,257 UART: [art] Lock RT PCRs Done
2,385,662,656 UART: [art] Populate DV Done
2,385,667,947 UART: [fht] FMC Alias Private Key: 7
2,385,669,583 UART: [art] Derive CDI
2,385,670,339 UART: [art] Store in in slot 0x4
2,385,712,905 UART: [art] Derive Key Pair
2,385,713,944 UART: [art] Store priv key in slot 0x5
2,388,141,096 UART: [art] Derive Key Pair - Done
2,388,154,038 UART: [art] Signing Cert with AUTHO
2,388,155,343 UART: RITY.KEYID = 7
2,389,860,661 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,862,316 UART: [art] PUB.X = 257FD14FDF10032C18C14F09F541F0D6F51CEB5EAC61730AA2D4872A29CC1C48DF9A55397F662E80AB28D88B3606C2D2
2,389,869,397 UART: [art] PUB.Y = 283B19F87321CB5F46B30EEF6D43DD9E643CD17FE27F34FC2389D14C0C2A0173EF82E615317921A3858E1F83E9B8657D
2,389,876,693 UART: [art] SIG.R = 1209C8E1601683D19EF476E0E2F38A67360A0D2EDF1C5E31496BA6E5D9BA84A9FB9168EDFC49C4B077888AFA9CF09769
2,389,884,080 UART: [art] SIG.S = 2ADD9C833546A63B26BE3300D0A0FA2324382A6EABA28239A35AC6F3A60F7BE7E0692BC4F8CE7C38959E43BA8E489AF5
2,390,863,503 UART: Caliptra RT
2,390,864,189 UART: [state] CFI Enabled
2,391,152,799 UART: [rt] RT listening for mailbox commands...
2,391,154,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,391,299,718 UART:
2,391,300,020 UART: Running Caliptra ROM ...
2,391,301,145 UART:
2,391,301,501 UART: [state] CFI Enabled
2,391,316,797 UART: [state] LifecycleState = Unprovisioned
2,391,318,633 UART: [state] DebugLocked = No
2,391,321,201 UART: [state] WD Timer not started. Device not locked for debugging
2,391,324,938 UART: [kat] SHA2-256
2,391,504,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,391,515,670 UART: [kat] ++
2,391,516,204 UART: [kat] sha1
2,391,525,960 UART: [kat] SHA2-256
2,391,529,023 UART: [kat] SHA2-384
2,391,535,499 UART: [kat] SHA2-512-ACC
2,391,538,437 UART: [kat] ECC-384
2,393,977,534 UART: [kat] HMAC-384Kdf
2,393,989,436 UART: [kat] LMS
2,394,518,940 UART: [kat] --
2,394,523,038 UART: [update-reset] ++
2,397,945,813 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,397,949,140 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,398,332,462 >>> mbox cmd response: success
2,398,333,411 UART: [update-reset] Copying MAN_2 To MAN_1
2,398,355,755 UART: [update-reset Success] --
2,398,359,381 UART: [state] Locking Datavault
2,398,361,890 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,363,592 UART: [state] Locking ICCM
2,398,364,718 UART: [exit] Launching FMC @ 0x40000130
2,398,373,182 UART:
2,398,373,418 UART: Running Caliptra FMC ...
2,398,374,523 UART:
2,398,374,702 UART: [state] CFI Enabled
2,398,418,610 UART: [art] Extend RT PCRs Done
2,398,419,755 UART: [art] Lock RT PCRs Done
2,398,421,365 UART: [art] Populate DV Done
2,398,426,817 UART: [fht] FMC Alias Private Key: 7
2,398,428,524 UART: [art] Derive CDI
2,398,429,340 UART: [art] Store in in slot 0x4
2,398,472,041 UART: [art] Derive Key Pair
2,398,473,047 UART: [art] Store priv key in slot 0x5
2,400,899,952 UART: [art] Derive Key Pair - Done
2,400,912,839 UART: [art] Signing Cert with AUTHO
2,400,914,178 UART: RITY.KEYID = 7
2,402,619,722 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,621,228 UART: [art] PUB.X = 6D667AD74D3886230C995F13381D1AC7CB649BE09349D14E44880936A83B51B327CC5F7A822D4C0C50A7C54D4781D025
2,402,628,499 UART: [art] PUB.Y = 53DE20EEE1B46693F23878D09A5A621C3350215F4111FE7D838D4E254BCE7E9F569DE47D47581B51F8E1BB48478B28D1
2,402,635,741 UART: [art] SIG.R = F50A6234CC1C01CDDA04F229FC187D7C25BD9EEB880C227242E42DBDB31F35E707A5C9949C1FAA269050D4FD598609D4
2,402,643,150 UART: [art] SIG.S = 8A3D954EF05B1AACC7F9105BF7D84FEB5C7DB3CE24A0989DB7D2056BFBACFE8DFE284AAACF726B59B794E4795EBA2ADE
2,403,622,077 UART: Caliptra RT
2,403,622,780 UART: [state] CFI Enabled
2,403,914,336 UART: [rt] RT listening for mailbox commands...
2,403,916,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,404,060,839 UART:
2,404,061,140 UART: Running Caliptra ROM ...
2,404,062,263 UART:
2,404,062,427 UART: [state] CFI Enabled
2,405,914,368 UART: [state] LifecycleState = Unprovisioned
2,405,916,285 UART: [state] DebugLocked = No
2,405,918,272 UART: [state] WD Timer not started. Device not locked for debugging
2,405,922,015 UART: [kat] SHA2-256
2,406,101,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,406,112,779 UART: [kat] ++
2,406,113,330 UART: [kat] sha1
2,406,124,731 UART: [kat] SHA2-256
2,406,127,751 UART: [kat] SHA2-384
2,406,133,362 UART: [kat] SHA2-512-ACC
2,406,136,314 UART: [kat] ECC-384
2,408,574,240 UART: [kat] HMAC-384Kdf
2,408,587,550 UART: [kat] LMS
2,409,117,057 UART: [kat] --
2,409,122,290 UART: [update-reset] ++
2,412,546,511 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,550,481 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
2,412,933,791 >>> mbox cmd response: success
2,412,934,581 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,956,917 UART: [update-reset Success] --
2,412,961,153 UART: [state] Locking Datavault
2,412,964,354 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,966,055 UART: [state] Locking ICCM
2,412,968,123 UART: [exit] Launching FMC @ 0x40000130
2,412,976,587 UART:
2,412,976,828 UART: Running Caliptra FMC ...
2,412,977,931 UART:
2,412,978,089 UART: [state] CFI Enabled
2,413,022,591 UART: [art] Extend RT PCRs Done
2,413,023,784 UART: [art] Lock RT PCRs Done
2,413,025,138 UART: [art] Populate DV Done
2,413,030,766 UART: [fht] FMC Alias Private Key: 7
2,413,032,359 UART: [art] Derive CDI
2,413,033,177 UART: [art] Store in in slot 0x4
2,413,075,426 UART: [art] Derive Key Pair
2,413,076,470 UART: [art] Store priv key in slot 0x5
2,415,502,733 UART: [art] Derive Key Pair - Done
2,415,515,622 UART: [art] Signing Cert with AUTHO
2,415,516,917 UART: RITY.KEYID = 7
2,417,222,480 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,223,988 UART: [art] PUB.X = 257FD14FDF10032C18C14F09F541F0D6F51CEB5EAC61730AA2D4872A29CC1C48DF9A55397F662E80AB28D88B3606C2D2
2,417,231,229 UART: [art] PUB.Y = 283B19F87321CB5F46B30EEF6D43DD9E643CD17FE27F34FC2389D14C0C2A0173EF82E615317921A3858E1F83E9B8657D
2,417,238,512 UART: [art] SIG.R = 1209C8E1601683D19EF476E0E2F38A67360A0D2EDF1C5E31496BA6E5D9BA84A9FB9168EDFC49C4B077888AFA9CF09769
2,417,245,904 UART: [art] SIG.S = 2ADD9C833546A63B26BE3300D0A0FA2324382A6EABA28239A35AC6F3A60F7BE7E0692BC4F8CE7C38959E43BA8E489AF5
2,418,225,090 UART: Caliptra RT
2,418,225,788 UART: [state] CFI Enabled
2,418,515,681 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 335.99s
Truncated 715075 bytes from beginning
800DB3089F92857593CA6FFD6914DBF
2,309,179,194 UART: [art] SIG.R = 4FDF45C21B8A6DDB79D923E8132A6E6020EA8D3AD148DE39E970E6DB3DEFFB1C04D62C9EFA41E952EF39206E7BB507C4
2,309,186,589 UART: [art] SIG.S = BF4028676B4758249DB44964906915DBA142675C1B568AADCB537677F29C5E76E57EEB15A44464F727A494ED2CD8D105
2,310,165,116 UART: Caliptra RT
2,310,165,807 UART: [state] CFI Enabled
2,310,451,800 UART: [rt] RT listening for mailbox commands...
2,310,453,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,317,499,811 >>> mbox cmd response: success
2,317,537,811 UART:
2,317,538,078 UART: Running Caliptra FMC ...
2,317,539,115 UART:
2,317,539,262 UART: [state] CFI Enabled
2,317,583,115 UART: [art] Extend RT PCRs Done
2,317,584,302 UART: [art] Lock RT PCRs Done
2,317,585,624 UART: [art] Populate DV Done
2,317,590,820 UART: [fht] FMC Alias Private Key: 7
2,317,592,410 UART: [art] Derive CDI
2,317,593,240 UART: [art] Store in in slot 0x4
2,317,636,319 UART: [art] Derive Key Pair
2,317,637,317 UART: [art] Store priv key in slot 0x5
2,320,064,065 UART: [art] Derive Key Pair - Done
2,320,077,498 UART: [art] Signing Cert with AUTHO
2,320,078,801 UART: RITY.KEYID = 7
2,321,784,539 UART: [art] Erasing AUTHORITY.KEYID = 7
2,321,786,042 UART: [art] PUB.X = E4504EBA5C243B1A8090DB99F34048AAF4C1F7FD83BD5210AB827E0ABA6170AAFE87B0773AD461B1329917056551298D
2,321,793,310 UART: [art] PUB.Y = 355A861734CAC3052939CE877DDF4F1BC27DB8C79F359B454AF0D7D57156A0FA8AB449FD28CB44FD7CC1639F02E2AC59
2,321,800,605 UART: [art] SIG.R = 3ACB533E57DA7C09783202E8851F417CADE2696FB72F8313417F056306AA14A1074D095612110BF7213B47098AC69C63
2,321,807,948 UART: [art] SIG.S = F8D99EEA5669BF9FEF841873C6DD38D3B15661E228B3ABA1FE8AAED8C5AFA0C5D18C76215CDB520737F8387044237BE9
2,322,786,669 UART: Caliptra RT
2,322,787,373 UART: [state] CFI Enabled
2,323,076,333 UART: [rt] RT listening for mailbox commands...
2,323,078,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,332,392,529 >>> mbox cmd response: success
2,332,426,009 UART:
2,332,426,292 UART: Running Caliptra FMC ...
2,332,427,399 UART:
2,332,427,557 UART: [state] CFI Enabled
2,332,471,684 UART: [art] Extend RT PCRs Done
2,332,472,874 UART: [art] Lock RT PCRs Done
2,332,474,273 UART: [art] Populate DV Done
2,332,479,566 UART: [fht] FMC Alias Private Key: 7
2,332,481,162 UART: [art] Derive CDI
2,332,481,974 UART: [art] Store in in slot 0x4
2,332,524,941 UART: [art] Derive Key Pair
2,332,525,938 UART: [art] Store priv key in slot 0x5
2,334,952,223 UART: [art] Derive Key Pair - Done
2,334,965,173 UART: [art] Signing Cert with AUTHO
2,334,966,470 UART: RITY.KEYID = 7
2,336,671,449 UART: [art] Erasing AUTHORITY.KEYID = 7
2,336,672,973 UART: [art] PUB.X = 2E6DD57A4F47736078FD8A1B856CFE7C9FEAF1A7515A5A117B4BAB19C4EB7AD33229E39C4B5087037C0E2D88589AD2A7
2,336,680,223 UART: [art] PUB.Y = 8D4AF787C23A11E081743F685749BDF329C70AB08491D11C990C80D44C2F3996C800DB3089F92857593CA6FFD6914DBF
2,336,687,455 UART: [art] SIG.R = 4FDF45C21B8A6DDB79D923E8132A6E6020EA8D3AD148DE39E970E6DB3DEFFB1C04D62C9EFA41E952EF39206E7BB507C4
2,336,694,955 UART: [art] SIG.S = BF4028676B4758249DB44964906915DBA142675C1B568AADCB537677F29C5E76E57EEB15A44464F727A494ED2CD8D105
2,337,673,734 UART: Caliptra RT
2,337,674,440 UART: [state] CFI Enabled
2,337,961,776 UART: [rt] RT listening for mailbox commands...
2,337,963,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,345,009,278 >>> mbox cmd response: success
2,345,044,281 UART:
2,345,044,592 UART: Running Caliptra FMC ...
2,345,045,717 UART:
2,345,045,875 UART: [state] CFI Enabled
2,345,090,381 UART: [art] Extend RT PCRs Done
2,345,091,730 UART: [art] Lock RT PCRs Done
2,345,093,084 UART: [art] Populate DV Done
2,345,098,679 UART: [fht] FMC Alias Private Key: 7
2,345,100,381 UART: [art] Derive CDI
2,345,101,194 UART: [art] Store in in slot 0x4
2,345,143,946 UART: [art] Derive Key Pair
2,345,144,948 UART: [art] Store priv key in slot 0x5
2,347,572,438 UART: [art] Derive Key Pair - Done
2,347,585,332 UART: [art] Signing Cert with AUTHO
2,347,586,640 UART: RITY.KEYID = 7
2,349,292,332 UART: [art] Erasing AUTHORITY.KEYID = 7
2,349,293,836 UART: [art] PUB.X = E4504EBA5C243B1A8090DB99F34048AAF4C1F7FD83BD5210AB827E0ABA6170AAFE87B0773AD461B1329917056551298D
2,349,301,086 UART: [art] PUB.Y = 355A861734CAC3052939CE877DDF4F1BC27DB8C79F359B454AF0D7D57156A0FA8AB449FD28CB44FD7CC1639F02E2AC59
2,349,308,379 UART: [art] SIG.R = 3ACB533E57DA7C09783202E8851F417CADE2696FB72F8313417F056306AA14A1074D095612110BF7213B47098AC69C63
2,349,315,772 UART: [art] SIG.S = F8D99EEA5669BF9FEF841873C6DD38D3B15661E228B3ABA1FE8AAED8C5AFA0C5D18C76215CDB520737F8387044237BE9
2,350,294,713 UART: Caliptra RT
2,350,295,414 UART: [state] CFI Enabled
2,350,584,823 UART: [rt] RT listening for mailbox commands...
2,350,586,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,357,638,394 >>> mbox cmd response: success
2,357,671,215 UART:
2,357,671,517 UART: Running Caliptra FMC ...
2,357,672,633 UART:
2,357,672,792 UART: [state] CFI Enabled
2,357,716,858 UART: [art] Extend RT PCRs Done
2,357,717,998 UART: [art] Lock RT PCRs Done
2,357,719,442 UART: [art] Populate DV Done
2,357,725,002 UART: [fht] FMC Alias Private Key: 7
2,357,726,539 UART: [art] Derive CDI
2,357,727,351 UART: [art] Store in in slot 0x4
2,357,769,976 UART: [art] Derive Key Pair
2,357,771,016 UART: [art] Store priv key in slot 0x5
2,360,197,330 UART: [art] Derive Key Pair - Done
2,360,210,328 UART: [art] Signing Cert with AUTHO
2,360,211,839 UART: RITY.KEYID = 7
2,361,916,799 UART: [art] Erasing AUTHORITY.KEYID = 7
2,361,918,312 UART: [art] PUB.X = 2E6DD57A4F47736078FD8A1B856CFE7C9FEAF1A7515A5A117B4BAB19C4EB7AD33229E39C4B5087037C0E2D88589AD2A7
2,361,925,570 UART: [art] PUB.Y = 8D4AF787C23A11E081743F685749BDF329C70AB08491D11C990C80D44C2F3996C800DB3089F92857593CA6FFD6914DBF
2,361,932,803 UART: [art] SIG.R = 4FDF45C21B8A6DDB79D923E8132A6E6020EA8D3AD148DE39E970E6DB3DEFFB1C04D62C9EFA41E952EF39206E7BB507C4
2,361,940,252 UART: [art] SIG.S = BF4028676B4758249DB44964906915DBA142675C1B568AADCB537677F29C5E76E57EEB15A44464F727A494ED2CD8D105
2,362,919,181 UART: Caliptra RT
2,362,919,885 UART: [state] CFI Enabled
2,363,206,151 UART: [rt] RT listening for mailbox commands...
2,363,208,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,372,506,652 >>> mbox cmd response: success
2,372,541,404 UART:
2,372,541,707 UART: Running Caliptra FMC ...
2,372,542,766 UART:
2,372,542,915 UART: [state] CFI Enabled
2,372,587,146 UART: [art] Extend RT PCRs Done
2,372,588,320 UART: [art] Lock RT PCRs Done
2,372,589,700 UART: [art] Populate DV Done
2,372,595,115 UART: [fht] FMC Alias Private Key: 7
2,372,596,648 UART: [art] Derive CDI
2,372,597,383 UART: [art] Store in in slot 0x4
2,372,639,760 UART: [art] Derive Key Pair
2,372,640,802 UART: [art] Store priv key in slot 0x5
2,375,067,291 UART: [art] Derive Key Pair - Done
2,375,080,130 UART: [art] Signing Cert with AUTHO
2,375,081,433 UART: RITY.KEYID = 7
2,376,786,885 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,788,391 UART: [art] PUB.X = E4504EBA5C243B1A8090DB99F34048AAF4C1F7FD83BD5210AB827E0ABA6170AAFE87B0773AD461B1329917056551298D
2,376,795,643 UART: [art] PUB.Y = 355A861734CAC3052939CE877DDF4F1BC27DB8C79F359B454AF0D7D57156A0FA8AB449FD28CB44FD7CC1639F02E2AC59
2,376,802,927 UART: [art] SIG.R = 3ACB533E57DA7C09783202E8851F417CADE2696FB72F8313417F056306AA14A1074D095612110BF7213B47098AC69C63
2,376,810,316 UART: [art] SIG.S = F8D99EEA5669BF9FEF841873C6DD38D3B15661E228B3ABA1FE8AAED8C5AFA0C5D18C76215CDB520737F8387044237BE9
2,377,789,290 UART: Caliptra RT
2,377,790,022 UART: [state] CFI Enabled
2,378,078,235 UART: [rt] RT listening for mailbox commands...
2,378,080,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,385,132,650 >>> mbox cmd response: success
2,385,165,960 UART:
2,385,166,234 UART: Running Caliptra FMC ...
2,385,167,267 UART:
2,385,167,411 UART: [state] CFI Enabled
2,385,211,969 UART: [art] Extend RT PCRs Done
2,385,213,153 UART: [art] Lock RT PCRs Done
2,385,214,686 UART: [art] Populate DV Done
2,385,220,027 UART: [fht] FMC Alias Private Key: 7
2,385,221,570 UART: [art] Derive CDI
2,385,222,305 UART: [art] Store in in slot 0x4
2,385,264,847 UART: [art] Derive Key Pair
2,385,265,888 UART: [art] Store priv key in slot 0x5
2,387,692,687 UART: [art] Derive Key Pair - Done
2,387,705,791 UART: [art] Signing Cert with AUTHO
2,387,707,095 UART: RITY.KEYID = 7
2,389,412,710 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,414,212 UART: [art] PUB.X = 2E6DD57A4F47736078FD8A1B856CFE7C9FEAF1A7515A5A117B4BAB19C4EB7AD33229E39C4B5087037C0E2D88589AD2A7
2,389,421,512 UART: [art] PUB.Y = 8D4AF787C23A11E081743F685749BDF329C70AB08491D11C990C80D44C2F3996C800DB3089F92857593CA6FFD6914DBF
2,389,428,740 UART: [art] SIG.R = 4FDF45C21B8A6DDB79D923E8132A6E6020EA8D3AD148DE39E970E6DB3DEFFB1C04D62C9EFA41E952EF39206E7BB507C4
2,389,436,128 UART: [art] SIG.S = BF4028676B4758249DB44964906915DBA142675C1B568AADCB537677F29C5E76E57EEB15A44464F727A494ED2CD8D105
2,390,415,165 UART: Caliptra RT
2,390,415,881 UART: [state] CFI Enabled
2,390,706,575 UART: [rt] RT listening for mailbox commands...
2,390,708,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,397,754,020 >>> mbox cmd response: success
2,397,790,886 UART:
2,397,791,155 UART: Running Caliptra FMC ...
2,397,792,186 UART:
2,397,792,351 UART: [state] CFI Enabled
2,397,836,914 UART: [art] Extend RT PCRs Done
2,397,838,100 UART: [art] Lock RT PCRs Done
2,397,839,423 UART: [art] Populate DV Done
2,397,844,668 UART: [fht] FMC Alias Private Key: 7
2,397,846,415 UART: [art] Derive CDI
2,397,847,149 UART: [art] Store in in slot 0x4
2,397,889,949 UART: [art] Derive Key Pair
2,397,890,944 UART: [art] Store priv key in slot 0x5
2,400,317,695 UART: [art] Derive Key Pair - Done
2,400,330,590 UART: [art] Signing Cert with AUTHO
2,400,331,901 UART: RITY.KEYID = 7
2,402,037,231 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,038,747 UART: [art] PUB.X = E4504EBA5C243B1A8090DB99F34048AAF4C1F7FD83BD5210AB827E0ABA6170AAFE87B0773AD461B1329917056551298D
2,402,046,003 UART: [art] PUB.Y = 355A861734CAC3052939CE877DDF4F1BC27DB8C79F359B454AF0D7D57156A0FA8AB449FD28CB44FD7CC1639F02E2AC59
2,402,053,277 UART: [art] SIG.R = 3ACB533E57DA7C09783202E8851F417CADE2696FB72F8313417F056306AA14A1074D095612110BF7213B47098AC69C63
2,402,060,649 UART: [art] SIG.S = F8D99EEA5669BF9FEF841873C6DD38D3B15661E228B3ABA1FE8AAED8C5AFA0C5D18C76215CDB520737F8387044237BE9
2,403,039,524 UART: Caliptra RT
2,403,040,239 UART: [state] CFI Enabled
2,403,328,289 UART: [rt] RT listening for mailbox commands...
2,403,330,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,412,623,210 >>> mbox cmd response: success
2,412,659,053 UART:
2,412,659,327 UART: Running Caliptra FMC ...
2,412,660,356 UART:
2,412,660,502 UART: [state] CFI Enabled
2,412,704,143 UART: [art] Extend RT PCRs Done
2,412,705,327 UART: [art] Lock RT PCRs Done
2,412,707,020 UART: [art] Populate DV Done
2,412,712,645 UART: [fht] FMC Alias Private Key: 7
2,412,714,340 UART: [art] Derive CDI
2,412,715,076 UART: [art] Store in in slot 0x4
2,412,757,904 UART: [art] Derive Key Pair
2,412,758,904 UART: [art] Store priv key in slot 0x5
2,415,185,558 UART: [art] Derive Key Pair - Done
2,415,198,669 UART: [art] Signing Cert with AUTHO
2,415,199,973 UART: RITY.KEYID = 7
2,416,905,142 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,906,636 UART: [art] PUB.X = 2E6DD57A4F47736078FD8A1B856CFE7C9FEAF1A7515A5A117B4BAB19C4EB7AD33229E39C4B5087037C0E2D88589AD2A7
2,416,913,889 UART: [art] PUB.Y = 8D4AF787C23A11E081743F685749BDF329C70AB08491D11C990C80D44C2F3996C800DB3089F92857593CA6FFD6914DBF
2,416,921,123 UART: [art] SIG.R = 4FDF45C21B8A6DDB79D923E8132A6E6020EA8D3AD148DE39E970E6DB3DEFFB1C04D62C9EFA41E952EF39206E7BB507C4
2,416,928,569 UART: [art] SIG.S = BF4028676B4758249DB44964906915DBA142675C1B568AADCB537677F29C5E76E57EEB15A44464F727A494ED2CD8D105
2,417,907,898 UART: Caliptra RT
2,417,908,624 UART: [state] CFI Enabled
2,418,197,315 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 335.98s
Truncated 715201 bytes from beginning
C12AB7AC99E04A5755EFCB64CE404F6
2,397,967,072 UART: [art] SIG.R = FF2253ED300D88E1E34C5CFA1E5576D8BD20BE853CF26AB7BB36A21B1A1CEE7E762747BF0A1CE94DFCF3546C21A958D1
2,397,974,470 UART: [art] SIG.S = 528DC6D156FE50CBCF9165F6B86D21275F0A406645D444FE28395C2AEE295D91FB86F08852A6DBD5066BFB6F271D7162
2,398,953,470 UART: Caliptra RT
2,398,954,182 UART: [state] CFI Enabled
2,399,299,581 UART: [rt] RT listening for mailbox commands...
2,399,301,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,407,114,162 >>> mbox cmd response: success
2,407,146,833 UART:
2,407,147,129 UART: Running Caliptra FMC ...
2,407,148,253 UART:
2,407,148,430 UART: [state] CFI Enabled
2,407,238,973 UART: [art] Extend RT PCRs Done
2,407,240,155 UART: [art] Lock RT PCRs Done
2,407,241,632 UART: [art] Populate DV Done
2,407,247,259 UART: [fht] FMC Alias Private Key: 7
2,407,248,957 UART: [art] Derive CDI
2,407,249,771 UART: [art] Store in in slot 0x4
2,407,307,836 UART: [art] Derive Key Pair
2,407,308,870 UART: [art] Store priv key in slot 0x5
2,409,771,233 UART: [art] Derive Key Pair - Done
2,409,783,808 UART: [art] Signing Cert with AUTHO
2,409,785,111 UART: RITY.KEYID = 7
2,411,497,911 UART: [art] Erasing AUTHORITY.KEYID = 7
2,411,499,416 UART: [art] PUB.X = 9250799C8C57B830772C82FA685497D49E357E1BFDE4DE3DC1DDE8750569489D999E633DF95301CB8D1D8A59665799EB
2,411,506,667 UART: [art] PUB.Y = 2E8BA83F35F2B94EB754F12AA54B4E92BE61E8B0C723181C915B68B9B89AE926AF34E0AEEAA574E1E469C61B63E91B29
2,411,513,914 UART: [art] SIG.R = CF79198F095BFDC73E8D2FA7771D1538E6583EAA62B64FC8CB9CDEA83AD8D37F208A49F2F093479CB5F5112032FF4FED
2,411,521,409 UART: [art] SIG.S = 9CE6B80E6EC26F63350CCA293E19BAD01CDE3DD43F8ECBB060C6AE15FF443D3DDE7627B75E2DEAE488FED9A6D372D5D3
2,412,500,792 UART: Caliptra RT
2,412,501,495 UART: [state] CFI Enabled
2,412,840,831 UART: [rt] RT listening for mailbox commands...
2,412,842,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,420,647,672 >>> mbox cmd response: success
2,420,683,198 UART:
2,420,683,468 UART: Running Caliptra FMC ...
2,420,684,589 UART:
2,420,684,753 UART: [state] CFI Enabled
2,420,785,580 UART: [art] Extend RT PCRs Done
2,420,786,764 UART: [art] Lock RT PCRs Done
2,420,788,220 UART: [art] Populate DV Done
2,420,793,684 UART: [fht] FMC Alias Private Key: 7
2,420,795,218 UART: [art] Derive CDI
2,420,796,185 UART: [art] Store in in slot 0x4
2,420,854,591 UART: [art] Derive Key Pair
2,420,855,595 UART: [art] Store priv key in slot 0x5
2,423,318,575 UART: [art] Derive Key Pair - Done
2,423,331,280 UART: [art] Signing Cert with AUTHO
2,423,332,580 UART: RITY.KEYID = 7
2,425,044,686 UART: [art] Erasing AUTHORITY.KEYID = 7
2,425,046,254 UART: [art] PUB.X = CCFAE1F10776872D0275A259BA16166B9721710935FD9EE5367654CA089C74BEC80263745E32FE6A5D8D9259356A78C3
2,425,053,454 UART: [art] PUB.Y = F4DAC4A253BF9D01135A2D9E1963871ED3730EED819807ADA723927E6D6BAA77DC12AB7AC99E04A5755EFCB64CE404F6
2,425,060,758 UART: [art] SIG.R = FF2253ED300D88E1E34C5CFA1E5576D8BD20BE853CF26AB7BB36A21B1A1CEE7E762747BF0A1CE94DFCF3546C21A958D1
2,425,068,155 UART: [art] SIG.S = 528DC6D156FE50CBCF9165F6B86D21275F0A406645D444FE28395C2AEE295D91FB86F08852A6DBD5066BFB6F271D7162
2,426,047,202 UART: Caliptra RT
2,426,047,917 UART: [state] CFI Enabled
2,426,380,208 UART: [rt] RT listening for mailbox commands...
2,426,382,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,184,664 >>> mbox cmd response: success
2,434,219,753 UART:
2,434,220,030 UART: Running Caliptra FMC ...
2,434,221,073 UART:
2,434,221,230 UART: [state] CFI Enabled
2,434,311,528 UART: [art] Extend RT PCRs Done
2,434,312,718 UART: [art] Lock RT PCRs Done
2,434,313,989 UART: [art] Populate DV Done
2,434,319,233 UART: [fht] FMC Alias Private Key: 7
2,434,320,827 UART: [art] Derive CDI
2,434,321,575 UART: [art] Store in in slot 0x4
2,434,380,343 UART: [art] Derive Key Pair
2,434,381,351 UART: [art] Store priv key in slot 0x5
2,436,844,352 UART: [art] Derive Key Pair - Done
2,436,857,086 UART: [art] Signing Cert with AUTHO
2,436,858,395 UART: RITY.KEYID = 7
2,438,570,145 UART: [art] Erasing AUTHORITY.KEYID = 7
2,438,571,655 UART: [art] PUB.X = 9250799C8C57B830772C82FA685497D49E357E1BFDE4DE3DC1DDE8750569489D999E633DF95301CB8D1D8A59665799EB
2,438,578,905 UART: [art] PUB.Y = 2E8BA83F35F2B94EB754F12AA54B4E92BE61E8B0C723181C915B68B9B89AE926AF34E0AEEAA574E1E469C61B63E91B29
2,438,586,195 UART: [art] SIG.R = CF79198F095BFDC73E8D2FA7771D1538E6583EAA62B64FC8CB9CDEA83AD8D37F208A49F2F093479CB5F5112032FF4FED
2,438,593,584 UART: [art] SIG.S = 9CE6B80E6EC26F63350CCA293E19BAD01CDE3DD43F8ECBB060C6AE15FF443D3DDE7627B75E2DEAE488FED9A6D372D5D3
2,439,571,928 UART: Caliptra RT
2,439,572,630 UART: [state] CFI Enabled
2,439,911,584 UART: [rt] RT listening for mailbox commands...
2,439,913,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,447,740,646 >>> mbox cmd response: success
2,447,775,841 UART:
2,447,776,147 UART: Running Caliptra FMC ...
2,447,777,188 UART:
2,447,777,346 UART: [state] CFI Enabled
2,447,879,029 UART: [art] Extend RT PCRs Done
2,447,880,221 UART: [art] Lock RT PCRs Done
2,447,881,599 UART: [art] Populate DV Done
2,447,886,908 UART: [fht] FMC Alias Private Key: 7
2,447,888,559 UART: [art] Derive CDI
2,447,889,297 UART: [art] Store in in slot 0x4
2,447,948,288 UART: [art] Derive Key Pair
2,447,949,352 UART: [art] Store priv key in slot 0x5
2,450,412,448 UART: [art] Derive Key Pair - Done
2,450,425,072 UART: [art] Signing Cert with AUTHO
2,450,426,378 UART: RITY.KEYID = 7
2,452,138,535 UART: [art] Erasing AUTHORITY.KEYID = 7
2,452,140,046 UART: [art] PUB.X = CCFAE1F10776872D0275A259BA16166B9721710935FD9EE5367654CA089C74BEC80263745E32FE6A5D8D9259356A78C3
2,452,147,298 UART: [art] PUB.Y = F4DAC4A253BF9D01135A2D9E1963871ED3730EED819807ADA723927E6D6BAA77DC12AB7AC99E04A5755EFCB64CE404F6
2,452,154,534 UART: [art] SIG.R = FF2253ED300D88E1E34C5CFA1E5576D8BD20BE853CF26AB7BB36A21B1A1CEE7E762747BF0A1CE94DFCF3546C21A958D1
2,452,161,979 UART: [art] SIG.S = 528DC6D156FE50CBCF9165F6B86D21275F0A406645D444FE28395C2AEE295D91FB86F08852A6DBD5066BFB6F271D7162
2,453,141,077 UART: Caliptra RT
2,453,141,791 UART: [state] CFI Enabled
2,453,481,145 UART: [rt] RT listening for mailbox commands...
2,453,483,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,461,298,445 >>> mbox cmd response: success
2,461,333,954 UART:
2,461,334,225 UART: Running Caliptra FMC ...
2,461,335,284 UART:
2,461,335,439 UART: [state] CFI Enabled
2,461,426,318 UART: [art] Extend RT PCRs Done
2,461,427,506 UART: [art] Lock RT PCRs Done
2,461,428,881 UART: [art] Populate DV Done
2,461,434,346 UART: [fht] FMC Alias Private Key: 7
2,461,436,103 UART: [art] Derive CDI
2,461,436,875 UART: [art] Store in in slot 0x4
2,461,495,293 UART: [art] Derive Key Pair
2,461,496,303 UART: [art] Store priv key in slot 0x5
2,463,958,718 UART: [art] Derive Key Pair - Done
2,463,971,717 UART: [art] Signing Cert with AUTHO
2,463,973,018 UART: RITY.KEYID = 7
2,465,684,815 UART: [art] Erasing AUTHORITY.KEYID = 7
2,465,686,321 UART: [art] PUB.X = 9250799C8C57B830772C82FA685497D49E357E1BFDE4DE3DC1DDE8750569489D999E633DF95301CB8D1D8A59665799EB
2,465,693,570 UART: [art] PUB.Y = 2E8BA83F35F2B94EB754F12AA54B4E92BE61E8B0C723181C915B68B9B89AE926AF34E0AEEAA574E1E469C61B63E91B29
2,465,700,880 UART: [art] SIG.R = CF79198F095BFDC73E8D2FA7771D1538E6583EAA62B64FC8CB9CDEA83AD8D37F208A49F2F093479CB5F5112032FF4FED
2,465,708,275 UART: [art] SIG.S = 9CE6B80E6EC26F63350CCA293E19BAD01CDE3DD43F8ECBB060C6AE15FF443D3DDE7627B75E2DEAE488FED9A6D372D5D3
2,466,687,385 UART: Caliptra RT
2,466,688,092 UART: [state] CFI Enabled
2,467,022,932 UART: [rt] RT listening for mailbox commands...
2,467,024,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,474,844,893 >>> mbox cmd response: success
2,474,877,347 UART:
2,474,877,653 UART: Running Caliptra FMC ...
2,474,878,695 UART:
2,474,878,849 UART: [state] CFI Enabled
2,474,970,313 UART: [art] Extend RT PCRs Done
2,474,971,507 UART: [art] Lock RT PCRs Done
2,474,972,993 UART: [art] Populate DV Done
2,474,978,467 UART: [fht] FMC Alias Private Key: 7
2,474,980,117 UART: [art] Derive CDI
2,474,980,952 UART: [art] Store in in slot 0x4
2,475,038,501 UART: [art] Derive Key Pair
2,475,039,546 UART: [art] Store priv key in slot 0x5
2,477,502,809 UART: [art] Derive Key Pair - Done
2,477,515,752 UART: [art] Signing Cert with AUTHO
2,477,517,249 UART: RITY.KEYID = 7
2,479,228,434 UART: [art] Erasing AUTHORITY.KEYID = 7
2,479,229,979 UART: [art] PUB.X = CCFAE1F10776872D0275A259BA16166B9721710935FD9EE5367654CA089C74BEC80263745E32FE6A5D8D9259356A78C3
2,479,237,178 UART: [art] PUB.Y = F4DAC4A253BF9D01135A2D9E1963871ED3730EED819807ADA723927E6D6BAA77DC12AB7AC99E04A5755EFCB64CE404F6
2,479,244,466 UART: [art] SIG.R = FF2253ED300D88E1E34C5CFA1E5576D8BD20BE853CF26AB7BB36A21B1A1CEE7E762747BF0A1CE94DFCF3546C21A958D1
2,479,251,867 UART: [art] SIG.S = 528DC6D156FE50CBCF9165F6B86D21275F0A406645D444FE28395C2AEE295D91FB86F08852A6DBD5066BFB6F271D7162
2,480,230,843 UART: Caliptra RT
2,480,231,548 UART: [state] CFI Enabled
2,480,565,182 UART: [rt] RT listening for mailbox commands...
2,480,567,070 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,488,368,573 >>> mbox cmd response: success
2,488,406,121 UART:
2,488,406,430 UART: Running Caliptra FMC ...
2,488,407,470 UART:
2,488,407,630 UART: [state] CFI Enabled
2,488,514,806 UART: [art] Extend RT PCRs Done
2,488,515,995 UART: [art] Lock RT PCRs Done
2,488,517,489 UART: [art] Populate DV Done
2,488,522,849 UART: [fht] FMC Alias Private Key: 7
2,488,524,547 UART: [art] Derive CDI
2,488,525,285 UART: [art] Store in in slot 0x4
2,488,583,850 UART: [art] Derive Key Pair
2,488,584,890 UART: [art] Store priv key in slot 0x5
2,491,048,083 UART: [art] Derive Key Pair - Done
2,491,061,204 UART: [art] Signing Cert with AUTHO
2,491,062,519 UART: RITY.KEYID = 7
2,492,773,779 UART: [art] Erasing AUTHORITY.KEYID = 7
2,492,775,309 UART: [art] PUB.X = 9250799C8C57B830772C82FA685497D49E357E1BFDE4DE3DC1DDE8750569489D999E633DF95301CB8D1D8A59665799EB
2,492,782,510 UART: [art] PUB.Y = 2E8BA83F35F2B94EB754F12AA54B4E92BE61E8B0C723181C915B68B9B89AE926AF34E0AEEAA574E1E469C61B63E91B29
2,492,789,798 UART: [art] SIG.R = CF79198F095BFDC73E8D2FA7771D1538E6583EAA62B64FC8CB9CDEA83AD8D37F208A49F2F093479CB5F5112032FF4FED
2,492,797,237 UART: [art] SIG.S = 9CE6B80E6EC26F63350CCA293E19BAD01CDE3DD43F8ECBB060C6AE15FF443D3DDE7627B75E2DEAE488FED9A6D372D5D3
2,493,776,206 UART: Caliptra RT
2,493,776,896 UART: [state] CFI Enabled
2,494,113,995 UART: [rt] RT listening for mailbox commands...
2,494,115,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,501,940,765 >>> mbox cmd response: success
2,501,978,609 UART:
2,501,978,890 UART: Running Caliptra FMC ...
2,501,980,015 UART:
2,501,980,189 UART: [state] CFI Enabled
2,502,082,948 UART: [art] Extend RT PCRs Done
2,502,084,151 UART: [art] Lock RT PCRs Done
2,502,085,348 UART: [art] Populate DV Done
2,502,090,893 UART: [fht] FMC Alias Private Key: 7
2,502,092,600 UART: [art] Derive CDI
2,502,093,420 UART: [art] Store in in slot 0x4
2,502,151,766 UART: [art] Derive Key Pair
2,502,152,770 UART: [art] Store priv key in slot 0x5
2,504,615,905 UART: [art] Derive Key Pair - Done
2,504,629,067 UART: [art] Signing Cert with AUTHO
2,504,630,382 UART: RITY.KEYID = 7
2,506,341,862 UART: [art] Erasing AUTHORITY.KEYID = 7
2,506,343,373 UART: [art] PUB.X = CCFAE1F10776872D0275A259BA16166B9721710935FD9EE5367654CA089C74BEC80263745E32FE6A5D8D9259356A78C3
2,506,350,617 UART: [art] PUB.Y = F4DAC4A253BF9D01135A2D9E1963871ED3730EED819807ADA723927E6D6BAA77DC12AB7AC99E04A5755EFCB64CE404F6
2,506,357,903 UART: [art] SIG.R = FF2253ED300D88E1E34C5CFA1E5576D8BD20BE853CF26AB7BB36A21B1A1CEE7E762747BF0A1CE94DFCF3546C21A958D1
2,506,365,303 UART: [art] SIG.S = 528DC6D156FE50CBCF9165F6B86D21275F0A406645D444FE28395C2AEE295D91FB86F08852A6DBD5066BFB6F271D7162
2,507,344,106 UART: Caliptra RT
2,507,344,821 UART: [state] CFI Enabled
2,507,680,564 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 340.45s
Truncated 715103 bytes from beginning
A0A0744013FD00A237CE73F3ECCA0CA
2,310,764,311 UART: [art] SIG.R = B63DD9E2095A93565ED50E4E287F57DC5BD4B68958D4C37F377762F1EADD9706729F3FF8B3D38454599CE1A4DDAD31FE
2,310,771,709 UART: [art] SIG.S = 3C1CBCA452EF3C51E24422484B3FADF7C798EFF55772C204604D7E423D7B83A5BB48B05524676B8CE071F376560131D6
2,311,750,477 UART: Caliptra RT
2,311,751,162 UART: [state] CFI Enabled
2,312,040,277 UART: [rt] RT listening for mailbox commands...
2,312,042,180 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,319,773,023 >>> mbox cmd response: success
2,319,808,958 UART:
2,319,809,283 UART: Running Caliptra FMC ...
2,319,810,545 UART:
2,319,810,705 UART: [state] CFI Enabled
2,319,854,339 UART: [art] Extend RT PCRs Done
2,319,855,481 UART: [art] Lock RT PCRs Done
2,319,856,953 UART: [art] Populate DV Done
2,319,862,141 UART: [fht] FMC Alias Private Key: 7
2,319,863,843 UART: [art] Derive CDI
2,319,864,579 UART: [art] Store in in slot 0x4
2,319,907,282 UART: [art] Derive Key Pair
2,319,908,322 UART: [art] Store priv key in slot 0x5
2,322,335,247 UART: [art] Derive Key Pair - Done
2,322,348,347 UART: [art] Signing Cert with AUTHO
2,322,349,647 UART: RITY.KEYID = 7
2,324,055,226 UART: [art] Erasing AUTHORITY.KEYID = 7
2,324,056,733 UART: [art] PUB.X = DE9C21F88D776139046A61D72E78A9160880F187BC4E452376BEC1C1C29FDAED7761E3AC839F7B4337213C50DD15EF3C
2,324,064,043 UART: [art] PUB.Y = 237774AE770182DCC9557A526B88049408D1CCC5EBFF7A8823C7D8A4DF09E2300A80AA1859BD40E36AF7058BED6C0466
2,324,071,240 UART: [art] SIG.R = 1D884457C12F1FA9FD73D5D21ED24B0ECF149EF2D103BC27A7EF0B316B6B8E5A53E493876069EE7114B234957C1BB971
2,324,078,652 UART: [art] SIG.S = CFDCC40392C8BDCCCFB53BCA0DA7DB2E1896076EE4C8EC1866490E45D1C0882FBBAE73DD0C80D8AB65B05A69FACA7E46
2,325,057,696 UART: Caliptra RT
2,325,058,404 UART: [state] CFI Enabled
2,325,347,825 UART: [rt] RT listening for mailbox commands...
2,325,349,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,333,283,511 >>> mbox cmd response: success
2,333,317,222 UART:
2,333,317,516 UART: Running Caliptra FMC ...
2,333,318,635 UART:
2,333,318,796 UART: [state] CFI Enabled
2,333,362,699 UART: [art] Extend RT PCRs Done
2,333,363,838 UART: [art] Lock RT PCRs Done
2,333,365,234 UART: [art] Populate DV Done
2,333,370,637 UART: [fht] FMC Alias Private Key: 7
2,333,372,130 UART: [art] Derive CDI
2,333,372,868 UART: [art] Store in in slot 0x4
2,333,415,769 UART: [art] Derive Key Pair
2,333,416,814 UART: [art] Store priv key in slot 0x5
2,335,843,651 UART: [art] Derive Key Pair - Done
2,335,856,384 UART: [art] Signing Cert with AUTHO
2,335,857,685 UART: RITY.KEYID = 7
2,337,563,458 UART: [art] Erasing AUTHORITY.KEYID = 7
2,337,564,963 UART: [art] PUB.X = 64D1B2561492C7C5B52AFAC3706ACF603A588EDAC62B6C08E1D9726F3A5F335115EAC4342666A24C5AB5AA7CFCB42F95
2,337,572,266 UART: [art] PUB.Y = 6D507728121896FBE12F874231BE49FF15494C706953CC15C386B971CED231A60A0A0744013FD00A237CE73F3ECCA0CA
2,337,579,496 UART: [art] SIG.R = B63DD9E2095A93565ED50E4E287F57DC5BD4B68958D4C37F377762F1EADD9706729F3FF8B3D38454599CE1A4DDAD31FE
2,337,586,898 UART: [art] SIG.S = 3C1CBCA452EF3C51E24422484B3FADF7C798EFF55772C204604D7E423D7B83A5BB48B05524676B8CE071F376560131D6
2,338,565,450 UART: Caliptra RT
2,338,566,147 UART: [state] CFI Enabled
2,338,852,888 UART: [rt] RT listening for mailbox commands...
2,338,854,758 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,346,585,290 >>> mbox cmd response: success
2,346,617,627 UART:
2,346,617,937 UART: Running Caliptra FMC ...
2,346,619,057 UART:
2,346,619,226 UART: [state] CFI Enabled
2,346,663,402 UART: [art] Extend RT PCRs Done
2,346,664,549 UART: [art] Lock RT PCRs Done
2,346,666,106 UART: [art] Populate DV Done
2,346,671,778 UART: [fht] FMC Alias Private Key: 7
2,346,673,472 UART: [art] Derive CDI
2,346,674,280 UART: [art] Store in in slot 0x4
2,346,716,878 UART: [art] Derive Key Pair
2,346,717,924 UART: [art] Store priv key in slot 0x5
2,349,144,484 UART: [art] Derive Key Pair - Done
2,349,157,476 UART: [art] Signing Cert with AUTHO
2,349,158,808 UART: RITY.KEYID = 7
2,350,864,143 UART: [art] Erasing AUTHORITY.KEYID = 7
2,350,865,651 UART: [art] PUB.X = DE9C21F88D776139046A61D72E78A9160880F187BC4E452376BEC1C1C29FDAED7761E3AC839F7B4337213C50DD15EF3C
2,350,872,949 UART: [art] PUB.Y = 237774AE770182DCC9557A526B88049408D1CCC5EBFF7A8823C7D8A4DF09E2300A80AA1859BD40E36AF7058BED6C0466
2,350,880,189 UART: [art] SIG.R = 1D884457C12F1FA9FD73D5D21ED24B0ECF149EF2D103BC27A7EF0B316B6B8E5A53E493876069EE7114B234957C1BB971
2,350,887,576 UART: [art] SIG.S = CFDCC40392C8BDCCCFB53BCA0DA7DB2E1896076EE4C8EC1866490E45D1C0882FBBAE73DD0C80D8AB65B05A69FACA7E46
2,351,866,673 UART: Caliptra RT
2,351,867,386 UART: [state] CFI Enabled
2,352,158,530 UART: [rt] RT listening for mailbox commands...
2,352,160,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,359,885,924 >>> mbox cmd response: success
2,359,921,658 UART:
2,359,921,935 UART: Running Caliptra FMC ...
2,359,923,051 UART:
2,359,923,207 UART: [state] CFI Enabled
2,359,967,432 UART: [art] Extend RT PCRs Done
2,359,968,632 UART: [art] Lock RT PCRs Done
2,359,969,947 UART: [art] Populate DV Done
2,359,975,360 UART: [fht] FMC Alias Private Key: 7
2,359,976,897 UART: [art] Derive CDI
2,359,977,709 UART: [art] Store in in slot 0x4
2,360,020,519 UART: [art] Derive Key Pair
2,360,021,521 UART: [art] Store priv key in slot 0x5
2,362,448,452 UART: [art] Derive Key Pair - Done
2,362,461,725 UART: [art] Signing Cert with AUTHO
2,362,463,035 UART: RITY.KEYID = 7
2,364,168,226 UART: [art] Erasing AUTHORITY.KEYID = 7
2,364,169,735 UART: [art] PUB.X = 64D1B2561492C7C5B52AFAC3706ACF603A588EDAC62B6C08E1D9726F3A5F335115EAC4342666A24C5AB5AA7CFCB42F95
2,364,177,043 UART: [art] PUB.Y = 6D507728121896FBE12F874231BE49FF15494C706953CC15C386B971CED231A60A0A0744013FD00A237CE73F3ECCA0CA
2,364,184,281 UART: [art] SIG.R = B63DD9E2095A93565ED50E4E287F57DC5BD4B68958D4C37F377762F1EADD9706729F3FF8B3D38454599CE1A4DDAD31FE
2,364,191,678 UART: [art] SIG.S = 3C1CBCA452EF3C51E24422484B3FADF7C798EFF55772C204604D7E423D7B83A5BB48B05524676B8CE071F376560131D6
2,365,170,868 UART: Caliptra RT
2,365,171,572 UART: [state] CFI Enabled
2,365,461,583 UART: [rt] RT listening for mailbox commands...
2,365,463,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,373,402,122 >>> mbox cmd response: success
2,373,436,557 UART:
2,373,436,830 UART: Running Caliptra FMC ...
2,373,437,859 UART:
2,373,438,006 UART: [state] CFI Enabled
2,373,482,516 UART: [art] Extend RT PCRs Done
2,373,483,702 UART: [art] Lock RT PCRs Done
2,373,485,022 UART: [art] Populate DV Done
2,373,490,382 UART: [fht] FMC Alias Private Key: 7
2,373,492,024 UART: [art] Derive CDI
2,373,492,761 UART: [art] Store in in slot 0x4
2,373,535,562 UART: [art] Derive Key Pair
2,373,536,555 UART: [art] Store priv key in slot 0x5
2,375,963,098 UART: [art] Derive Key Pair - Done
2,375,975,852 UART: [art] Signing Cert with AUTHO
2,375,977,156 UART: RITY.KEYID = 7
2,377,682,344 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,683,852 UART: [art] PUB.X = DE9C21F88D776139046A61D72E78A9160880F187BC4E452376BEC1C1C29FDAED7761E3AC839F7B4337213C50DD15EF3C
2,377,691,099 UART: [art] PUB.Y = 237774AE770182DCC9557A526B88049408D1CCC5EBFF7A8823C7D8A4DF09E2300A80AA1859BD40E36AF7058BED6C0466
2,377,698,336 UART: [art] SIG.R = 1D884457C12F1FA9FD73D5D21ED24B0ECF149EF2D103BC27A7EF0B316B6B8E5A53E493876069EE7114B234957C1BB971
2,377,705,739 UART: [art] SIG.S = CFDCC40392C8BDCCCFB53BCA0DA7DB2E1896076EE4C8EC1866490E45D1C0882FBBAE73DD0C80D8AB65B05A69FACA7E46
2,378,685,072 UART: Caliptra RT
2,378,685,791 UART: [state] CFI Enabled
2,378,973,524 UART: [rt] RT listening for mailbox commands...
2,378,975,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,386,707,582 >>> mbox cmd response: success
2,386,742,832 UART:
2,386,743,104 UART: Running Caliptra FMC ...
2,386,744,133 UART:
2,386,744,278 UART: [state] CFI Enabled
2,386,788,047 UART: [art] Extend RT PCRs Done
2,386,789,242 UART: [art] Lock RT PCRs Done
2,386,790,679 UART: [art] Populate DV Done
2,386,796,306 UART: [fht] FMC Alias Private Key: 7
2,386,797,792 UART: [art] Derive CDI
2,386,798,525 UART: [art] Store in in slot 0x4
2,386,841,070 UART: [art] Derive Key Pair
2,386,842,110 UART: [art] Store priv key in slot 0x5
2,389,269,107 UART: [art] Derive Key Pair - Done
2,389,282,595 UART: [art] Signing Cert with AUTHO
2,389,283,908 UART: RITY.KEYID = 7
2,390,989,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,990,906 UART: [art] PUB.X = 64D1B2561492C7C5B52AFAC3706ACF603A588EDAC62B6C08E1D9726F3A5F335115EAC4342666A24C5AB5AA7CFCB42F95
2,390,998,174 UART: [art] PUB.Y = 6D507728121896FBE12F874231BE49FF15494C706953CC15C386B971CED231A60A0A0744013FD00A237CE73F3ECCA0CA
2,391,005,422 UART: [art] SIG.R = B63DD9E2095A93565ED50E4E287F57DC5BD4B68958D4C37F377762F1EADD9706729F3FF8B3D38454599CE1A4DDAD31FE
2,391,012,822 UART: [art] SIG.S = 3C1CBCA452EF3C51E24422484B3FADF7C798EFF55772C204604D7E423D7B83A5BB48B05524676B8CE071F376560131D6
2,391,991,362 UART: Caliptra RT
2,391,992,076 UART: [state] CFI Enabled
2,392,280,844 UART: [rt] RT listening for mailbox commands...
2,392,282,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,400,019,325 >>> mbox cmd response: success
2,400,054,409 UART:
2,400,054,716 UART: Running Caliptra FMC ...
2,400,055,838 UART:
2,400,056,002 UART: [state] CFI Enabled
2,400,099,324 UART: [art] Extend RT PCRs Done
2,400,100,478 UART: [art] Lock RT PCRs Done
2,400,101,869 UART: [art] Populate DV Done
2,400,107,065 UART: [fht] FMC Alias Private Key: 7
2,400,108,710 UART: [art] Derive CDI
2,400,109,521 UART: [art] Store in in slot 0x4
2,400,152,817 UART: [art] Derive Key Pair
2,400,153,878 UART: [art] Store priv key in slot 0x5
2,402,581,205 UART: [art] Derive Key Pair - Done
2,402,594,366 UART: [art] Signing Cert with AUTHO
2,402,595,683 UART: RITY.KEYID = 7
2,404,301,439 UART: [art] Erasing AUTHORITY.KEYID = 7
2,404,302,948 UART: [art] PUB.X = DE9C21F88D776139046A61D72E78A9160880F187BC4E452376BEC1C1C29FDAED7761E3AC839F7B4337213C50DD15EF3C
2,404,310,194 UART: [art] PUB.Y = 237774AE770182DCC9557A526B88049408D1CCC5EBFF7A8823C7D8A4DF09E2300A80AA1859BD40E36AF7058BED6C0466
2,404,317,497 UART: [art] SIG.R = 1D884457C12F1FA9FD73D5D21ED24B0ECF149EF2D103BC27A7EF0B316B6B8E5A53E493876069EE7114B234957C1BB971
2,404,324,841 UART: [art] SIG.S = CFDCC40392C8BDCCCFB53BCA0DA7DB2E1896076EE4C8EC1866490E45D1C0882FBBAE73DD0C80D8AB65B05A69FACA7E46
2,405,303,874 UART: Caliptra RT
2,405,304,582 UART: [state] CFI Enabled
2,405,593,715 UART: [rt] RT listening for mailbox commands...
2,405,595,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,413,540,390 >>> mbox cmd response: success
2,413,574,934 UART:
2,413,575,236 UART: Running Caliptra FMC ...
2,413,576,373 UART:
2,413,576,536 UART: [state] CFI Enabled
2,413,620,509 UART: [art] Extend RT PCRs Done
2,413,621,652 UART: [art] Lock RT PCRs Done
2,413,623,076 UART: [art] Populate DV Done
2,413,628,430 UART: [fht] FMC Alias Private Key: 7
2,413,630,016 UART: [art] Derive CDI
2,413,630,753 UART: [art] Store in in slot 0x4
2,413,673,701 UART: [art] Derive Key Pair
2,413,674,741 UART: [art] Store priv key in slot 0x5
2,416,101,225 UART: [art] Derive Key Pair - Done
2,416,114,385 UART: [art] Signing Cert with AUTHO
2,416,115,692 UART: RITY.KEYID = 7
2,417,821,395 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,822,891 UART: [art] PUB.X = 64D1B2561492C7C5B52AFAC3706ACF603A588EDAC62B6C08E1D9726F3A5F335115EAC4342666A24C5AB5AA7CFCB42F95
2,417,830,189 UART: [art] PUB.Y = 6D507728121896FBE12F874231BE49FF15494C706953CC15C386B971CED231A60A0A0744013FD00A237CE73F3ECCA0CA
2,417,837,437 UART: [art] SIG.R = B63DD9E2095A93565ED50E4E287F57DC5BD4B68958D4C37F377762F1EADD9706729F3FF8B3D38454599CE1A4DDAD31FE
2,417,844,838 UART: [art] SIG.S = 3C1CBCA452EF3C51E24422484B3FADF7C798EFF55772C204604D7E423D7B83A5BB48B05524676B8CE071F376560131D6
2,418,823,617 UART: Caliptra RT
2,418,824,330 UART: [state] CFI Enabled
2,419,110,455 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 336.02s
Truncated 1358308 bytes from beginning
4 UART: [art] Store in in slot 0x4
1,718,165,305 UART: [art] Derive Key Pair
1,718,165,665 UART: [art] Store priv key in slot 0x5
1,718,179,695 UART: [art] Derive Key Pair - Done
1,718,194,027 UART: [art] Signing Cert with AUTHO
1,718,194,507 UART: RITY.KEYID = 7
1,718,209,753 UART: [art] Erasing AUTHORITY.KEYID = 7
1,718,210,518 UART: [art] PUB.X = 6CFE863368488A65233EF4C0752B5B6FFAD8469D4E8C14A643DC9ACEF260210023EC531007CDA072A7A19997C146C242
1,718,217,265 UART: [art] PUB.Y = D9F42E2D92C2678EE00684444391D233D4A7418C96A2EBF1C967A132AB730A299E9BEADC7765AAD42C0AF6A9C8EEEFF9
1,718,224,222 UART: [art] SIG.R = 2CC48C62DB0378CC7C7AD681D4FAB544530004680C7CFA2CD768D52919B481921B90DACEBA1C6BE3213C80A98ED2150A
1,718,230,970 UART: [art] SIG.S = 14A9E9862666D04CB105D99BD39347DC7AC7F11F42E75493F715558C8A98C3A124BB26A95456D2DC1489848ED9DC5CDB
1,718,254,954 UART: Caliptra RT
1,718,255,207 UART: [state] CFI Enabled
1,718,536,991 UART: [rt] RT listening for mailbox commands...
1,718,537,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,718,538,487 UART:
1,718,538,503 UART: Running Caliptra ROM ...
1,718,538,911 UART:
1,718,538,965 UART: [state] CFI Enabled
1,718,541,843 UART: [state] LifecycleState = Unprovisioned
1,718,542,498 UART: [state] DebugLocked = No
1,718,543,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,718,544,673 UART: [kat] SHA2-256
1,719,338,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,719,342,719 UART: [kat] ++
1,719,342,871 UART: [kat] sha1
1,719,347,229 UART: [kat] SHA2-256
1,719,349,167 UART: [kat] SHA2-384
1,719,352,096 UART: [kat] SHA2-512-ACC
1,719,353,996 UART: [kat] ECC-384
1,719,359,555 UART: [kat] HMAC-384Kdf
1,719,364,165 UART: [kat] LMS
1,719,932,361 UART: [kat] --
1,719,933,084 UART: [update-reset] ++
1,721,268,585 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,721,269,711 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,721,419,761 >>> mbox cmd response: success
1,721,419,952 UART: [update-reset] Copying MAN_2 To MAN_1
1,721,427,966 UART: [update-reset Success] --
1,721,428,993 UART: [state] Locking Datavault
1,721,429,929 UART: [state] Locking PCR0, PCR1 and PCR31
1,721,430,533 UART: [state] Locking ICCM
1,721,431,011 UART: [exit] Launching FMC @ 0x40000130
1,721,436,340 UART:
1,721,436,356 UART: Running Caliptra FMC ...
1,721,436,764 UART:
1,721,436,818 UART: [state] CFI Enabled
1,721,525,929 UART: [art] Extend RT PCRs Done
1,721,526,357 UART: [art] Lock RT PCRs Done
1,721,527,640 UART: [art] Populate DV Done
1,721,536,095 UART: [fht] FMC Alias Private Key: 7
1,721,537,115 UART: [art] Derive CDI
1,721,537,395 UART: [art] Store in in slot 0x4
1,721,623,000 UART: [art] Derive Key Pair
1,721,623,360 UART: [art] Store priv key in slot 0x5
1,721,636,606 UART: [art] Derive Key Pair - Done
1,721,651,267 UART: [art] Signing Cert with AUTHO
1,721,651,747 UART: RITY.KEYID = 7
1,721,667,047 UART: [art] Erasing AUTHORITY.KEYID = 7
1,721,667,812 UART: [art] PUB.X = 38F90981EBCA4AB86A76C4CFF67276360675CB2BB4F6FB1A50D7EEF3065CC416AE6306CD35C67FC926360C5316052478
1,721,674,570 UART: [art] PUB.Y = 3B8DAD65194221061E79278CED3A0CD5C8D14E569073CF5C84BD95D72B941DF350FED90009B9D6D53AA3F381739460BA
1,721,681,495 UART: [art] SIG.R = 225221D6EA17085562E3B8A831BE7AEEB958E50180E6A6C19DED0338986CE66165FA6B3F673C801741AA4D2F7147095D
1,721,688,253 UART: [art] SIG.S = 73FF4171116947F5ACFF49D2D8A376FAB3ABFE123B06E25FC296319051C1D14C01E1C81DB2B850058F15C5A8F7ED3828
1,721,712,191 UART: Caliptra RT
1,721,712,444 UART: [state] CFI Enabled
1,721,998,374 UART: [rt] RT listening for mailbox commands...
1,721,999,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,722,000,012 UART:
1,722,000,028 UART: Running Caliptra ROM ...
1,722,000,436 UART:
1,722,000,490 UART: [state] CFI Enabled
1,722,002,810 UART: [state] LifecycleState = Unprovisioned
1,722,003,465 UART: [state] DebugLocked = No
1,722,004,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,722,005,596 UART: [kat] SHA2-256
1,722,799,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,722,803,642 UART: [kat] ++
1,722,803,794 UART: [kat] sha1
1,722,808,054 UART: [kat] SHA2-256
1,722,809,992 UART: [kat] SHA2-384
1,722,812,755 UART: [kat] SHA2-512-ACC
1,722,814,655 UART: [kat] ECC-384
1,722,820,238 UART: [kat] HMAC-384Kdf
1,722,824,920 UART: [kat] LMS
1,723,393,116 UART: [kat] --
1,723,393,985 UART: [update-reset] ++
1,724,730,764 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,724,732,018 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,724,882,068 >>> mbox cmd response: success
1,724,882,323 UART: [update-reset] Copying MAN_2 To MAN_1
1,724,890,337 UART: [update-reset Success] --
1,724,891,578 UART: [state] Locking Datavault
1,724,892,276 UART: [state] Locking PCR0, PCR1 and PCR31
1,724,892,880 UART: [state] Locking ICCM
1,724,893,410 UART: [exit] Launching FMC @ 0x40000130
1,724,898,739 UART:
1,724,898,755 UART: Running Caliptra FMC ...
1,724,899,163 UART:
1,724,899,217 UART: [state] CFI Enabled
1,724,987,204 UART: [art] Extend RT PCRs Done
1,724,987,632 UART: [art] Lock RT PCRs Done
1,724,988,901 UART: [art] Populate DV Done
1,724,997,226 UART: [fht] FMC Alias Private Key: 7
1,724,998,162 UART: [art] Derive CDI
1,724,998,442 UART: [art] Store in in slot 0x4
1,725,083,967 UART: [art] Derive Key Pair
1,725,084,327 UART: [art] Store priv key in slot 0x5
1,725,098,069 UART: [art] Derive Key Pair - Done
1,725,112,765 UART: [art] Signing Cert with AUTHO
1,725,113,245 UART: RITY.KEYID = 7
1,725,128,567 UART: [art] Erasing AUTHORITY.KEYID = 7
1,725,129,332 UART: [art] PUB.X = 6CFE863368488A65233EF4C0752B5B6FFAD8469D4E8C14A643DC9ACEF260210023EC531007CDA072A7A19997C146C242
1,725,136,079 UART: [art] PUB.Y = D9F42E2D92C2678EE00684444391D233D4A7418C96A2EBF1C967A132AB730A299E9BEADC7765AAD42C0AF6A9C8EEEFF9
1,725,143,036 UART: [art] SIG.R = 2CC48C62DB0378CC7C7AD681D4FAB544530004680C7CFA2CD768D52919B481921B90DACEBA1C6BE3213C80A98ED2150A
1,725,149,784 UART: [art] SIG.S = 14A9E9862666D04CB105D99BD39347DC7AC7F11F42E75493F715558C8A98C3A124BB26A95456D2DC1489848ED9DC5CDB
1,725,173,956 UART: Caliptra RT
1,725,174,209 UART: [state] CFI Enabled
1,725,456,971 UART: [rt] RT listening for mailbox commands...
1,725,457,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,725,458,469 UART:
1,725,458,485 UART: Running Caliptra ROM ...
1,725,458,893 UART:
1,725,458,947 UART: [state] CFI Enabled
1,725,462,027 UART: [state] LifecycleState = Unprovisioned
1,725,462,682 UART: [state] DebugLocked = No
1,725,463,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,725,464,685 UART: [kat] SHA2-256
1,726,258,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,726,262,731 UART: [kat] ++
1,726,262,883 UART: [kat] sha1
1,726,267,159 UART: [kat] SHA2-256
1,726,269,097 UART: [kat] SHA2-384
1,726,271,908 UART: [kat] SHA2-512-ACC
1,726,273,808 UART: [kat] ECC-384
1,726,279,205 UART: [kat] HMAC-384Kdf
1,726,283,833 UART: [kat] LMS
1,726,852,029 UART: [kat] --
1,726,852,836 UART: [update-reset] ++
1,728,188,957 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,728,190,003 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,728,340,053 >>> mbox cmd response: success
1,728,340,260 UART: [update-reset] Copying MAN_2 To MAN_1
1,728,348,274 UART: [update-reset Success] --
1,728,349,347 UART: [state] Locking Datavault
1,728,350,287 UART: [state] Locking PCR0, PCR1 and PCR31
1,728,350,891 UART: [state] Locking ICCM
1,728,351,435 UART: [exit] Launching FMC @ 0x40000130
1,728,356,764 UART:
1,728,356,780 UART: Running Caliptra FMC ...
1,728,357,188 UART:
1,728,357,242 UART: [state] CFI Enabled
1,728,445,821 UART: [art] Extend RT PCRs Done
1,728,446,249 UART: [art] Lock RT PCRs Done
1,728,447,596 UART: [art] Populate DV Done
1,728,455,663 UART: [fht] FMC Alias Private Key: 7
1,728,456,699 UART: [art] Derive CDI
1,728,456,979 UART: [art] Store in in slot 0x4
1,728,542,648 UART: [art] Derive Key Pair
1,728,543,008 UART: [art] Store priv key in slot 0x5
1,728,555,912 UART: [art] Derive Key Pair - Done
1,728,570,687 UART: [art] Signing Cert with AUTHO
1,728,571,167 UART: RITY.KEYID = 7
1,728,586,593 UART: [art] Erasing AUTHORITY.KEYID = 7
1,728,587,358 UART: [art] PUB.X = 38F90981EBCA4AB86A76C4CFF67276360675CB2BB4F6FB1A50D7EEF3065CC416AE6306CD35C67FC926360C5316052478
1,728,594,116 UART: [art] PUB.Y = 3B8DAD65194221061E79278CED3A0CD5C8D14E569073CF5C84BD95D72B941DF350FED90009B9D6D53AA3F381739460BA
1,728,601,041 UART: [art] SIG.R = 225221D6EA17085562E3B8A831BE7AEEB958E50180E6A6C19DED0338986CE66165FA6B3F673C801741AA4D2F7147095D
1,728,607,799 UART: [art] SIG.S = 73FF4171116947F5ACFF49D2D8A376FAB3ABFE123B06E25FC296319051C1D14C01E1C81DB2B850058F15C5A8F7ED3828
1,728,631,509 UART: Caliptra RT
1,728,631,762 UART: [state] CFI Enabled
1,728,912,248 UART: [rt] RT listening for mailbox commands...
1,728,912,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,728,913,886 UART:
1,728,913,902 UART: Running Caliptra ROM ...
1,728,914,310 UART:
1,728,914,364 UART: [state] CFI Enabled
1,728,917,178 UART: [state] LifecycleState = Unprovisioned
1,728,917,833 UART: [state] DebugLocked = No
1,728,918,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,728,919,972 UART: [kat] SHA2-256
1,729,713,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,729,718,018 UART: [kat] ++
1,729,718,170 UART: [kat] sha1
1,729,722,504 UART: [kat] SHA2-256
1,729,724,442 UART: [kat] SHA2-384
1,729,727,219 UART: [kat] SHA2-512-ACC
1,729,729,119 UART: [kat] ECC-384
1,729,734,686 UART: [kat] HMAC-384Kdf
1,729,739,254 UART: [kat] LMS
1,730,307,450 UART: [kat] --
1,730,308,475 UART: [update-reset] ++
1,731,644,432 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,731,645,496 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,731,795,546 >>> mbox cmd response: success
1,731,795,869 UART: [update-reset] Copying MAN_2 To MAN_1
1,731,803,883 UART: [update-reset Success] --
1,731,804,790 UART: [state] Locking Datavault
1,731,805,704 UART: [state] Locking PCR0, PCR1 and PCR31
1,731,806,308 UART: [state] Locking ICCM
1,731,806,844 UART: [exit] Launching FMC @ 0x40000130
1,731,812,173 UART:
1,731,812,189 UART: Running Caliptra FMC ...
1,731,812,597 UART:
1,731,812,651 UART: [state] CFI Enabled
1,731,901,496 UART: [art] Extend RT PCRs Done
1,731,901,924 UART: [art] Lock RT PCRs Done
1,731,902,875 UART: [art] Populate DV Done
1,731,911,018 UART: [fht] FMC Alias Private Key: 7
1,731,912,012 UART: [art] Derive CDI
1,731,912,292 UART: [art] Store in in slot 0x4
1,731,997,847 UART: [art] Derive Key Pair
1,731,998,207 UART: [art] Store priv key in slot 0x5
1,732,010,597 UART: [art] Derive Key Pair - Done
1,732,025,749 UART: [art] Signing Cert with AUTHO
1,732,026,229 UART: RITY.KEYID = 7
1,732,041,437 UART: [art] Erasing AUTHORITY.KEYID = 7
1,732,042,202 UART: [art] PUB.X = 6CFE863368488A65233EF4C0752B5B6FFAD8469D4E8C14A643DC9ACEF260210023EC531007CDA072A7A19997C146C242
1,732,048,949 UART: [art] PUB.Y = D9F42E2D92C2678EE00684444391D233D4A7418C96A2EBF1C967A132AB730A299E9BEADC7765AAD42C0AF6A9C8EEEFF9
1,732,055,906 UART: [art] SIG.R = 2CC48C62DB0378CC7C7AD681D4FAB544530004680C7CFA2CD768D52919B481921B90DACEBA1C6BE3213C80A98ED2150A
1,732,062,654 UART: [art] SIG.S = 14A9E9862666D04CB105D99BD39347DC7AC7F11F42E75493F715558C8A98C3A124BB26A95456D2DC1489848ED9DC5CDB
1,732,086,672 UART: Caliptra RT
1,732,086,925 UART: [state] CFI Enabled
1,732,365,723 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 332.27s
Truncated 735002 bytes from beginning
0 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,647,303,618 >>> mbox cmd response: success
1,647,316,929 UART:
1,647,316,945 UART: Running Caliptra FMC ...
1,647,317,353 UART:
1,647,317,407 UART: [state] CFI Enabled
1,647,406,520 UART: [art] Extend RT PCRs Done
1,647,406,948 UART: [art] Lock RT PCRs Done
1,647,408,491 UART: [art] Populate DV Done
1,647,416,918 UART: [fht] FMC Alias Private Key: 7
1,647,418,018 UART: [art] Derive CDI
1,647,418,298 UART: [art] Store in in slot 0x4
1,647,503,687 UART: [art] Derive Key Pair
1,647,504,047 UART: [art] Store priv key in slot 0x5
1,647,516,827 UART: [art] Derive Key Pair - Done
1,647,531,908 UART: [art] Signing Cert with AUTHO
1,647,532,388 UART: RITY.KEYID = 7
1,647,547,066 UART: [art] Erasing AUTHORITY.KEYID = 7
1,647,547,831 UART: [art] PUB.X = 5543BA68B68B8AF6DD7053C57989DCA06BDE6F4346DE51F3631864DDE8966151BF6B9C8C185E534774BD77501EEDBC8B
1,647,554,611 UART: [art] PUB.Y = 7C3E2972B3E7AB995ED0D7AF1122335D03DBCF721604DEA5E46EB9DB479543040198465254B1488B51A14D7C2BABCB1C
1,647,561,557 UART: [art] SIG.R = BB891CE93FC5DE0BC7B4ECFB295B5060173384F3D3775FB9D7D9D3DDC4E60D52015472732A6E59C50C193A7D2778DDAF
1,647,568,329 UART: [art] SIG.S = 0182D8CEB3234664AC961B8379ADCCE4BB8A99EBC3BC774B20773AE626DCBA354FAEF5B6B66623D83C74ED52C6C143F5
1,647,591,529 UART: Caliptra RT
1,647,591,782 UART: [state] CFI Enabled
1,647,871,231 UART: [rt] RT listening for mailbox commands...
1,647,871,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,650,634,547 >>> mbox cmd response: success
1,650,647,796 UART:
1,650,647,812 UART: Running Caliptra FMC ...
1,650,648,220 UART:
1,650,648,274 UART: [state] CFI Enabled
1,650,737,283 UART: [art] Extend RT PCRs Done
1,650,737,711 UART: [art] Lock RT PCRs Done
1,650,739,290 UART: [art] Populate DV Done
1,650,747,525 UART: [fht] FMC Alias Private Key: 7
1,650,748,577 UART: [art] Derive CDI
1,650,748,857 UART: [art] Store in in slot 0x4
1,650,834,392 UART: [art] Derive Key Pair
1,650,834,752 UART: [art] Store priv key in slot 0x5
1,650,847,992 UART: [art] Derive Key Pair - Done
1,650,862,847 UART: [art] Signing Cert with AUTHO
1,650,863,327 UART: RITY.KEYID = 7
1,650,878,531 UART: [art] Erasing AUTHORITY.KEYID = 7
1,650,879,296 UART: [art] PUB.X = 86E172BA75CDA72798B73B607E1CD2003C1B40D1F7B0F2F320D41E9BF9A3DDE718E8282F353DF32919EA4F9AADE18F43
1,650,886,058 UART: [art] PUB.Y = 03BADE50945903201CB44A1C1F0BEDADED949F842702589F6D8C4B02ECD80356F685BFEB96D83C54712829C161B95FE4
1,650,892,998 UART: [art] SIG.R = 740DA84CBA54E98CADEAA689104696DC9179B8DDB446AF0B301FAE8473299833A746B2E92D3812B4789989529AB7E553
1,650,899,764 UART: [art] SIG.S = 58ED68D9C1E2BE7E63EF42366400D367660FE8DCD18B587C257ED7EC67EAE58832A9A73F7B80D4639C2BF07629AE9E63
1,650,923,688 UART: Caliptra RT
1,650,923,941 UART: [state] CFI Enabled
1,651,207,869 UART: [rt] RT listening for mailbox commands...
1,651,208,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,653,972,755 >>> mbox cmd response: success
1,653,986,208 UART:
1,653,986,224 UART: Running Caliptra FMC ...
1,653,986,632 UART:
1,653,986,686 UART: [state] CFI Enabled
1,654,075,433 UART: [art] Extend RT PCRs Done
1,654,075,861 UART: [art] Lock RT PCRs Done
1,654,077,046 UART: [art] Populate DV Done
1,654,085,097 UART: [fht] FMC Alias Private Key: 7
1,654,086,083 UART: [art] Derive CDI
1,654,086,363 UART: [art] Store in in slot 0x4
1,654,171,786 UART: [art] Derive Key Pair
1,654,172,146 UART: [art] Store priv key in slot 0x5
1,654,185,000 UART: [art] Derive Key Pair - Done
1,654,199,711 UART: [art] Signing Cert with AUTHO
1,654,200,191 UART: RITY.KEYID = 7
1,654,215,541 UART: [art] Erasing AUTHORITY.KEYID = 7
1,654,216,306 UART: [art] PUB.X = 5543BA68B68B8AF6DD7053C57989DCA06BDE6F4346DE51F3631864DDE8966151BF6B9C8C185E534774BD77501EEDBC8B
1,654,223,086 UART: [art] PUB.Y = 7C3E2972B3E7AB995ED0D7AF1122335D03DBCF721604DEA5E46EB9DB479543040198465254B1488B51A14D7C2BABCB1C
1,654,230,032 UART: [art] SIG.R = BB891CE93FC5DE0BC7B4ECFB295B5060173384F3D3775FB9D7D9D3DDC4E60D52015472732A6E59C50C193A7D2778DDAF
1,654,236,804 UART: [art] SIG.S = 0182D8CEB3234664AC961B8379ADCCE4BB8A99EBC3BC774B20773AE626DCBA354FAEF5B6B66623D83C74ED52C6C143F5
1,654,260,200 UART: Caliptra RT
1,654,260,453 UART: [state] CFI Enabled
1,654,540,640 UART: [rt] RT listening for mailbox commands...
1,654,541,310 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,657,304,314 >>> mbox cmd response: success
1,657,317,735 UART:
1,657,317,751 UART: Running Caliptra FMC ...
1,657,318,159 UART:
1,657,318,213 UART: [state] CFI Enabled
1,657,407,434 UART: [art] Extend RT PCRs Done
1,657,407,862 UART: [art] Lock RT PCRs Done
1,657,409,141 UART: [art] Populate DV Done
1,657,417,158 UART: [fht] FMC Alias Private Key: 7
1,657,418,132 UART: [art] Derive CDI
1,657,418,412 UART: [art] Store in in slot 0x4
1,657,504,079 UART: [art] Derive Key Pair
1,657,504,439 UART: [art] Store priv key in slot 0x5
1,657,517,995 UART: [art] Derive Key Pair - Done
1,657,532,734 UART: [art] Signing Cert with AUTHO
1,657,533,214 UART: RITY.KEYID = 7
1,657,548,544 UART: [art] Erasing AUTHORITY.KEYID = 7
1,657,549,309 UART: [art] PUB.X = 86E172BA75CDA72798B73B607E1CD2003C1B40D1F7B0F2F320D41E9BF9A3DDE718E8282F353DF32919EA4F9AADE18F43
1,657,556,071 UART: [art] PUB.Y = 03BADE50945903201CB44A1C1F0BEDADED949F842702589F6D8C4B02ECD80356F685BFEB96D83C54712829C161B95FE4
1,657,563,011 UART: [art] SIG.R = 740DA84CBA54E98CADEAA689104696DC9179B8DDB446AF0B301FAE8473299833A746B2E92D3812B4789989529AB7E553
1,657,569,777 UART: [art] SIG.S = 58ED68D9C1E2BE7E63EF42366400D367660FE8DCD18B587C257ED7EC67EAE58832A9A73F7B80D4639C2BF07629AE9E63
1,657,593,305 UART: Caliptra RT
1,657,593,558 UART: [state] CFI Enabled
1,657,879,570 UART: [rt] RT listening for mailbox commands...
1,657,880,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,660,644,034 >>> mbox cmd response: success
1,660,657,411 UART:
1,660,657,427 UART: Running Caliptra FMC ...
1,660,657,835 UART:
1,660,657,889 UART: [state] CFI Enabled
1,660,746,774 UART: [art] Extend RT PCRs Done
1,660,747,202 UART: [art] Lock RT PCRs Done
1,660,748,487 UART: [art] Populate DV Done
1,660,756,502 UART: [fht] FMC Alias Private Key: 7
1,660,757,490 UART: [art] Derive CDI
1,660,757,770 UART: [art] Store in in slot 0x4
1,660,843,257 UART: [art] Derive Key Pair
1,660,843,617 UART: [art] Store priv key in slot 0x5
1,660,856,767 UART: [art] Derive Key Pair - Done
1,660,871,456 UART: [art] Signing Cert with AUTHO
1,660,871,936 UART: RITY.KEYID = 7
1,660,887,178 UART: [art] Erasing AUTHORITY.KEYID = 7
1,660,887,943 UART: [art] PUB.X = 5543BA68B68B8AF6DD7053C57989DCA06BDE6F4346DE51F3631864DDE8966151BF6B9C8C185E534774BD77501EEDBC8B
1,660,894,723 UART: [art] PUB.Y = 7C3E2972B3E7AB995ED0D7AF1122335D03DBCF721604DEA5E46EB9DB479543040198465254B1488B51A14D7C2BABCB1C
1,660,901,669 UART: [art] SIG.R = BB891CE93FC5DE0BC7B4ECFB295B5060173384F3D3775FB9D7D9D3DDC4E60D52015472732A6E59C50C193A7D2778DDAF
1,660,908,441 UART: [art] SIG.S = 0182D8CEB3234664AC961B8379ADCCE4BB8A99EBC3BC774B20773AE626DCBA354FAEF5B6B66623D83C74ED52C6C143F5
1,660,931,639 UART: Caliptra RT
1,660,931,892 UART: [state] CFI Enabled
1,661,210,699 UART: [rt] RT listening for mailbox commands...
1,661,211,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,663,973,753 >>> mbox cmd response: success
1,663,987,132 UART:
1,663,987,148 UART: Running Caliptra FMC ...
1,663,987,556 UART:
1,663,987,610 UART: [state] CFI Enabled
1,664,077,001 UART: [art] Extend RT PCRs Done
1,664,077,429 UART: [art] Lock RT PCRs Done
1,664,078,618 UART: [art] Populate DV Done
1,664,086,649 UART: [fht] FMC Alias Private Key: 7
1,664,087,593 UART: [art] Derive CDI
1,664,087,873 UART: [art] Store in in slot 0x4
1,664,173,730 UART: [art] Derive Key Pair
1,664,174,090 UART: [art] Store priv key in slot 0x5
1,664,186,722 UART: [art] Derive Key Pair - Done
1,664,200,987 UART: [art] Signing Cert with AUTHO
1,664,201,467 UART: RITY.KEYID = 7
1,664,216,929 UART: [art] Erasing AUTHORITY.KEYID = 7
1,664,217,694 UART: [art] PUB.X = 86E172BA75CDA72798B73B607E1CD2003C1B40D1F7B0F2F320D41E9BF9A3DDE718E8282F353DF32919EA4F9AADE18F43
1,664,224,456 UART: [art] PUB.Y = 03BADE50945903201CB44A1C1F0BEDADED949F842702589F6D8C4B02ECD80356F685BFEB96D83C54712829C161B95FE4
1,664,231,396 UART: [art] SIG.R = 740DA84CBA54E98CADEAA689104696DC9179B8DDB446AF0B301FAE8473299833A746B2E92D3812B4789989529AB7E553
1,664,238,162 UART: [art] SIG.S = 58ED68D9C1E2BE7E63EF42366400D367660FE8DCD18B587C257ED7EC67EAE58832A9A73F7B80D4639C2BF07629AE9E63
1,664,262,420 UART: Caliptra RT
1,664,262,673 UART: [state] CFI Enabled
1,664,544,221 UART: [rt] RT listening for mailbox commands...
1,664,544,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,667,308,173 >>> mbox cmd response: success
1,667,321,866 UART:
1,667,321,882 UART: Running Caliptra FMC ...
1,667,322,290 UART:
1,667,322,344 UART: [state] CFI Enabled
1,667,411,439 UART: [art] Extend RT PCRs Done
1,667,411,867 UART: [art] Lock RT PCRs Done
1,667,413,306 UART: [art] Populate DV Done
1,667,421,471 UART: [fht] FMC Alias Private Key: 7
1,667,422,519 UART: [art] Derive CDI
1,667,422,799 UART: [art] Store in in slot 0x4
1,667,508,750 UART: [art] Derive Key Pair
1,667,509,110 UART: [art] Store priv key in slot 0x5
1,667,522,162 UART: [art] Derive Key Pair - Done
1,667,536,945 UART: [art] Signing Cert with AUTHO
1,667,537,425 UART: RITY.KEYID = 7
1,667,552,545 UART: [art] Erasing AUTHORITY.KEYID = 7
1,667,553,310 UART: [art] PUB.X = 5543BA68B68B8AF6DD7053C57989DCA06BDE6F4346DE51F3631864DDE8966151BF6B9C8C185E534774BD77501EEDBC8B
1,667,560,090 UART: [art] PUB.Y = 7C3E2972B3E7AB995ED0D7AF1122335D03DBCF721604DEA5E46EB9DB479543040198465254B1488B51A14D7C2BABCB1C
1,667,567,036 UART: [art] SIG.R = BB891CE93FC5DE0BC7B4ECFB295B5060173384F3D3775FB9D7D9D3DDC4E60D52015472732A6E59C50C193A7D2778DDAF
1,667,573,808 UART: [art] SIG.S = 0182D8CEB3234664AC961B8379ADCCE4BB8A99EBC3BC774B20773AE626DCBA354FAEF5B6B66623D83C74ED52C6C143F5
1,667,597,636 UART: Caliptra RT
1,667,597,889 UART: [state] CFI Enabled
1,667,878,886 UART: [rt] RT listening for mailbox commands...
1,667,879,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,670,643,274 >>> mbox cmd response: success
1,670,656,655 UART:
1,670,656,671 UART: Running Caliptra FMC ...
1,670,657,079 UART:
1,670,657,133 UART: [state] CFI Enabled
1,670,745,724 UART: [art] Extend RT PCRs Done
1,670,746,152 UART: [art] Lock RT PCRs Done
1,670,747,589 UART: [art] Populate DV Done
1,670,755,772 UART: [fht] FMC Alias Private Key: 7
1,670,756,730 UART: [art] Derive CDI
1,670,757,010 UART: [art] Store in in slot 0x4
1,670,842,683 UART: [art] Derive Key Pair
1,670,843,043 UART: [art] Store priv key in slot 0x5
1,670,856,105 UART: [art] Derive Key Pair - Done
1,670,871,214 UART: [art] Signing Cert with AUTHO
1,670,871,694 UART: RITY.KEYID = 7
1,670,887,052 UART: [art] Erasing AUTHORITY.KEYID = 7
1,670,887,817 UART: [art] PUB.X = 86E172BA75CDA72798B73B607E1CD2003C1B40D1F7B0F2F320D41E9BF9A3DDE718E8282F353DF32919EA4F9AADE18F43
1,670,894,579 UART: [art] PUB.Y = 03BADE50945903201CB44A1C1F0BEDADED949F842702589F6D8C4B02ECD80356F685BFEB96D83C54712829C161B95FE4
1,670,901,519 UART: [art] SIG.R = 740DA84CBA54E98CADEAA689104696DC9179B8DDB446AF0B301FAE8473299833A746B2E92D3812B4789989529AB7E553
1,670,908,285 UART: [art] SIG.S = 58ED68D9C1E2BE7E63EF42366400D367660FE8DCD18B587C257ED7EC67EAE58832A9A73F7B80D4639C2BF07629AE9E63
1,670,932,295 UART: Caliptra RT
1,670,932,548 UART: [state] CFI Enabled
1,671,213,258 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 326.14s
Truncated 1358308 bytes from beginning
5 UART: [art] Store in in slot 0x4
1,718,604,010 UART: [art] Derive Key Pair
1,718,604,370 UART: [art] Store priv key in slot 0x5
1,718,617,230 UART: [art] Derive Key Pair - Done
1,718,632,163 UART: [art] Signing Cert with AUTHO
1,718,632,643 UART: RITY.KEYID = 7
1,718,647,943 UART: [art] Erasing AUTHORITY.KEYID = 7
1,718,648,708 UART: [art] PUB.X = DC2C14044D0C99DBFD1F7292FE5AEE871FEA22E5C9D54044481CBA53E232665AC5C3164EFC7983B8273B51081469C86B
1,718,655,477 UART: [art] PUB.Y = C0B03EAD56DAF7F236830DAA7E8C63F9BAB46B723FAA35A9AD308B50065EC822B4992672C1E001159A1C944CEE5BD945
1,718,662,432 UART: [art] SIG.R = 4A67ADFC846D1F34D58BCC8095528AB4015566C5D7A99CE22C1CCC40A4C7BB7B05F054955964E5A948F78116967D581C
1,718,669,200 UART: [art] SIG.S = 2E008A86FD775149AE764A96F6E6B71B37EC713380C086714B11C2FCBDEDCDFABBD8D15A1A4E85935B53A891096C036D
1,718,693,047 UART: Caliptra RT
1,718,693,392 UART: [state] CFI Enabled
1,718,972,626 UART: [rt] RT listening for mailbox commands...
1,718,973,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,718,974,108 UART:
1,718,974,124 UART: Running Caliptra ROM ...
1,718,974,532 UART:
1,718,974,673 UART: [state] CFI Enabled
1,718,977,815 UART: [state] LifecycleState = Unprovisioned
1,718,978,470 UART: [state] DebugLocked = No
1,718,979,086 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,718,980,679 UART: [kat] SHA2-256
1,719,774,610 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,719,778,725 UART: [kat] ++
1,719,778,877 UART: [kat] sha1
1,719,783,115 UART: [kat] SHA2-256
1,719,785,053 UART: [kat] SHA2-384
1,719,787,882 UART: [kat] SHA2-512-ACC
1,719,789,782 UART: [kat] ECC-384
1,719,795,543 UART: [kat] HMAC-384Kdf
1,719,800,213 UART: [kat] LMS
1,720,368,409 UART: [kat] --
1,720,369,444 UART: [update-reset] ++
1,721,703,977 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,721,705,103 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,721,855,153 >>> mbox cmd response: success
1,721,855,396 UART: [update-reset] Copying MAN_2 To MAN_1
1,721,863,410 UART: [update-reset Success] --
1,721,864,283 UART: [state] Locking Datavault
1,721,865,101 UART: [state] Locking PCR0, PCR1 and PCR31
1,721,865,705 UART: [state] Locking ICCM
1,721,866,369 UART: [exit] Launching FMC @ 0x40000130
1,721,871,698 UART:
1,721,871,714 UART: Running Caliptra FMC ...
1,721,872,122 UART:
1,721,872,265 UART: [state] CFI Enabled
1,721,961,482 UART: [art] Extend RT PCRs Done
1,721,961,910 UART: [art] Lock RT PCRs Done
1,721,962,909 UART: [art] Populate DV Done
1,721,971,044 UART: [fht] FMC Alias Private Key: 7
1,721,971,998 UART: [art] Derive CDI
1,721,972,278 UART: [art] Store in in slot 0x4
1,722,057,769 UART: [art] Derive Key Pair
1,722,058,129 UART: [art] Store priv key in slot 0x5
1,722,071,373 UART: [art] Derive Key Pair - Done
1,722,085,979 UART: [art] Signing Cert with AUTHO
1,722,086,459 UART: RITY.KEYID = 7
1,722,101,877 UART: [art] Erasing AUTHORITY.KEYID = 7
1,722,102,642 UART: [art] PUB.X = 1044104132E2CDC10223CBE2045D33C46F277978266D3EA181EAEC6836ECD21A2AD79C1EBD8EE3A1114FF8B64F26F837
1,722,109,414 UART: [art] PUB.Y = 693D84A95C90E96783D63FE95D8867F01298F9D803F40B630D030245C4DA7C018388A4B046345D5A04D4605249EB819E
1,722,116,333 UART: [art] SIG.R = BA1E08ED990C862B3456E83F570C0F8F6D8899464BF3258471465E7B061887BE3D582BEC77045E4D041A3CCA5CF4734D
1,722,123,084 UART: [art] SIG.S = 0352CF1693912FADE97DEF3C2489EF6BE3035CF3EEE9E8BB7B540A353027C5BC57446661F216CFD72A0C0DF77DD95ED2
1,722,146,168 UART: Caliptra RT
1,722,146,513 UART: [state] CFI Enabled
1,722,430,128 UART: [rt] RT listening for mailbox commands...
1,722,430,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,722,431,962 UART:
1,722,431,978 UART: Running Caliptra ROM ...
1,722,432,386 UART:
1,722,432,527 UART: [state] CFI Enabled
1,722,435,067 UART: [state] LifecycleState = Unprovisioned
1,722,435,722 UART: [state] DebugLocked = No
1,722,436,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,722,438,113 UART: [kat] SHA2-256
1,723,232,044 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,723,236,159 UART: [kat] ++
1,723,236,311 UART: [kat] sha1
1,723,240,493 UART: [kat] SHA2-256
1,723,242,431 UART: [kat] SHA2-384
1,723,244,976 UART: [kat] SHA2-512-ACC
1,723,246,876 UART: [kat] ECC-384
1,723,252,373 UART: [kat] HMAC-384Kdf
1,723,257,087 UART: [kat] LMS
1,723,825,283 UART: [kat] --
1,723,826,176 UART: [update-reset] ++
1,725,162,363 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,725,163,525 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,725,313,575 >>> mbox cmd response: success
1,725,313,758 UART: [update-reset] Copying MAN_2 To MAN_1
1,725,321,772 UART: [update-reset Success] --
1,725,322,845 UART: [state] Locking Datavault
1,725,323,581 UART: [state] Locking PCR0, PCR1 and PCR31
1,725,324,185 UART: [state] Locking ICCM
1,725,324,829 UART: [exit] Launching FMC @ 0x40000130
1,725,330,158 UART:
1,725,330,174 UART: Running Caliptra FMC ...
1,725,330,582 UART:
1,725,330,725 UART: [state] CFI Enabled
1,725,419,276 UART: [art] Extend RT PCRs Done
1,725,419,704 UART: [art] Lock RT PCRs Done
1,725,420,841 UART: [art] Populate DV Done
1,725,429,120 UART: [fht] FMC Alias Private Key: 7
1,725,430,112 UART: [art] Derive CDI
1,725,430,392 UART: [art] Store in in slot 0x4
1,725,516,477 UART: [art] Derive Key Pair
1,725,516,837 UART: [art] Store priv key in slot 0x5
1,725,530,627 UART: [art] Derive Key Pair - Done
1,725,545,458 UART: [art] Signing Cert with AUTHO
1,725,545,938 UART: RITY.KEYID = 7
1,725,561,310 UART: [art] Erasing AUTHORITY.KEYID = 7
1,725,562,075 UART: [art] PUB.X = DC2C14044D0C99DBFD1F7292FE5AEE871FEA22E5C9D54044481CBA53E232665AC5C3164EFC7983B8273B51081469C86B
1,725,568,844 UART: [art] PUB.Y = C0B03EAD56DAF7F236830DAA7E8C63F9BAB46B723FAA35A9AD308B50065EC822B4992672C1E001159A1C944CEE5BD945
1,725,575,799 UART: [art] SIG.R = 4A67ADFC846D1F34D58BCC8095528AB4015566C5D7A99CE22C1CCC40A4C7BB7B05F054955964E5A948F78116967D581C
1,725,582,567 UART: [art] SIG.S = 2E008A86FD775149AE764A96F6E6B71B37EC713380C086714B11C2FCBDEDCDFABBD8D15A1A4E85935B53A891096C036D
1,725,606,188 UART: Caliptra RT
1,725,606,533 UART: [state] CFI Enabled
1,725,888,973 UART: [rt] RT listening for mailbox commands...
1,725,889,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,725,890,567 UART:
1,725,890,583 UART: Running Caliptra ROM ...
1,725,890,991 UART:
1,725,891,132 UART: [state] CFI Enabled
1,725,894,274 UART: [state] LifecycleState = Unprovisioned
1,725,894,929 UART: [state] DebugLocked = No
1,725,895,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,725,896,972 UART: [kat] SHA2-256
1,726,690,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,726,695,018 UART: [kat] ++
1,726,695,170 UART: [kat] sha1
1,726,699,364 UART: [kat] SHA2-256
1,726,701,302 UART: [kat] SHA2-384
1,726,703,941 UART: [kat] SHA2-512-ACC
1,726,705,841 UART: [kat] ECC-384
1,726,711,658 UART: [kat] HMAC-384Kdf
1,726,716,270 UART: [kat] LMS
1,727,284,466 UART: [kat] --
1,727,285,303 UART: [update-reset] ++
1,728,622,146 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,728,623,224 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,728,773,274 >>> mbox cmd response: success
1,728,773,473 UART: [update-reset] Copying MAN_2 To MAN_1
1,728,781,487 UART: [update-reset Success] --
1,728,782,500 UART: [state] Locking Datavault
1,728,783,282 UART: [state] Locking PCR0, PCR1 and PCR31
1,728,783,886 UART: [state] Locking ICCM
1,728,784,316 UART: [exit] Launching FMC @ 0x40000130
1,728,789,645 UART:
1,728,789,661 UART: Running Caliptra FMC ...
1,728,790,069 UART:
1,728,790,212 UART: [state] CFI Enabled
1,728,879,463 UART: [art] Extend RT PCRs Done
1,728,879,891 UART: [art] Lock RT PCRs Done
1,728,881,014 UART: [art] Populate DV Done
1,728,889,143 UART: [fht] FMC Alias Private Key: 7
1,728,890,103 UART: [art] Derive CDI
1,728,890,383 UART: [art] Store in in slot 0x4
1,728,975,904 UART: [art] Derive Key Pair
1,728,976,264 UART: [art] Store priv key in slot 0x5
1,728,989,514 UART: [art] Derive Key Pair - Done
1,729,004,180 UART: [art] Signing Cert with AUTHO
1,729,004,660 UART: RITY.KEYID = 7
1,729,019,900 UART: [art] Erasing AUTHORITY.KEYID = 7
1,729,020,665 UART: [art] PUB.X = 1044104132E2CDC10223CBE2045D33C46F277978266D3EA181EAEC6836ECD21A2AD79C1EBD8EE3A1114FF8B64F26F837
1,729,027,437 UART: [art] PUB.Y = 693D84A95C90E96783D63FE95D8867F01298F9D803F40B630D030245C4DA7C018388A4B046345D5A04D4605249EB819E
1,729,034,356 UART: [art] SIG.R = BA1E08ED990C862B3456E83F570C0F8F6D8899464BF3258471465E7B061887BE3D582BEC77045E4D041A3CCA5CF4734D
1,729,041,107 UART: [art] SIG.S = 0352CF1693912FADE97DEF3C2489EF6BE3035CF3EEE9E8BB7B540A353027C5BC57446661F216CFD72A0C0DF77DD95ED2
1,729,065,031 UART: Caliptra RT
1,729,065,376 UART: [state] CFI Enabled
1,729,350,361 UART: [rt] RT listening for mailbox commands...
1,729,351,031 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,729,351,953 UART:
1,729,351,969 UART: Running Caliptra ROM ...
1,729,352,377 UART:
1,729,352,518 UART: [state] CFI Enabled
1,729,355,642 UART: [state] LifecycleState = Unprovisioned
1,729,356,297 UART: [state] DebugLocked = No
1,729,357,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,729,358,664 UART: [kat] SHA2-256
1,730,152,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,730,156,710 UART: [kat] ++
1,730,156,862 UART: [kat] sha1
1,730,161,104 UART: [kat] SHA2-256
1,730,163,042 UART: [kat] SHA2-384
1,730,165,797 UART: [kat] SHA2-512-ACC
1,730,167,697 UART: [kat] ECC-384
1,730,173,264 UART: [kat] HMAC-384Kdf
1,730,178,016 UART: [kat] LMS
1,730,746,212 UART: [kat] --
1,730,747,183 UART: [update-reset] ++
1,732,084,416 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,732,085,648 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
1,732,235,698 >>> mbox cmd response: success
1,732,236,015 UART: [update-reset] Copying MAN_2 To MAN_1
1,732,244,029 UART: [update-reset Success] --
1,732,244,924 UART: [state] Locking Datavault
1,732,245,744 UART: [state] Locking PCR0, PCR1 and PCR31
1,732,246,348 UART: [state] Locking ICCM
1,732,246,804 UART: [exit] Launching FMC @ 0x40000130
1,732,252,133 UART:
1,732,252,149 UART: Running Caliptra FMC ...
1,732,252,557 UART:
1,732,252,700 UART: [state] CFI Enabled
1,732,341,817 UART: [art] Extend RT PCRs Done
1,732,342,245 UART: [art] Lock RT PCRs Done
1,732,343,344 UART: [art] Populate DV Done
1,732,351,697 UART: [fht] FMC Alias Private Key: 7
1,732,352,743 UART: [art] Derive CDI
1,732,353,023 UART: [art] Store in in slot 0x4
1,732,439,000 UART: [art] Derive Key Pair
1,732,439,360 UART: [art] Store priv key in slot 0x5
1,732,452,800 UART: [art] Derive Key Pair - Done
1,732,468,063 UART: [art] Signing Cert with AUTHO
1,732,468,543 UART: RITY.KEYID = 7
1,732,483,985 UART: [art] Erasing AUTHORITY.KEYID = 7
1,732,484,750 UART: [art] PUB.X = DC2C14044D0C99DBFD1F7292FE5AEE871FEA22E5C9D54044481CBA53E232665AC5C3164EFC7983B8273B51081469C86B
1,732,491,519 UART: [art] PUB.Y = C0B03EAD56DAF7F236830DAA7E8C63F9BAB46B723FAA35A9AD308B50065EC822B4992672C1E001159A1C944CEE5BD945
1,732,498,474 UART: [art] SIG.R = 4A67ADFC846D1F34D58BCC8095528AB4015566C5D7A99CE22C1CCC40A4C7BB7B05F054955964E5A948F78116967D581C
1,732,505,242 UART: [art] SIG.S = 2E008A86FD775149AE764A96F6E6B71B37EC713380C086714B11C2FCBDEDCDFABBD8D15A1A4E85935B53A891096C036D
1,732,528,977 UART: Caliptra RT
1,732,529,322 UART: [state] CFI Enabled
1,732,811,078 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 339.30s
Truncated 735002 bytes from beginning
3 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,647,837,224 >>> mbox cmd response: success
1,647,850,621 UART:
1,647,850,637 UART: Running Caliptra FMC ...
1,647,851,045 UART:
1,647,851,188 UART: [state] CFI Enabled
1,647,940,467 UART: [art] Extend RT PCRs Done
1,647,940,895 UART: [art] Lock RT PCRs Done
1,647,942,186 UART: [art] Populate DV Done
1,647,950,575 UART: [fht] FMC Alias Private Key: 7
1,647,951,533 UART: [art] Derive CDI
1,647,951,813 UART: [art] Store in in slot 0x4
1,648,037,690 UART: [art] Derive Key Pair
1,648,038,050 UART: [art] Store priv key in slot 0x5
1,648,051,760 UART: [art] Derive Key Pair - Done
1,648,066,611 UART: [art] Signing Cert with AUTHO
1,648,067,091 UART: RITY.KEYID = 7
1,648,081,749 UART: [art] Erasing AUTHORITY.KEYID = 7
1,648,082,514 UART: [art] PUB.X = 9BB937566BBCCC7BD1D8915DC36B1B6D298BAFE3AC4E071BCE95BD988A979C473A46597235D1CA98FBA345F77DA3A9EA
1,648,089,303 UART: [art] PUB.Y = 339FC02744C6D55D56A309691A6B875DAA46A3923EDB4CD4F7FA8962B5970C2453EC289F047E7A8CCB53A48998BF72D3
1,648,096,250 UART: [art] SIG.R = DD83CCC4D57D14DE6F5EA2AF7EA83CF3E9DB37A6FA45EE2C2A7F7A124B01F87168C89BFE8E32794C262B955710F8830F
1,648,103,034 UART: [art] SIG.S = 3B796718254AF263841A9F0FB0967A884413E2B2572051801BFE6329F6966B0B2A46011AF545A7F65E61FB981E6690DB
1,648,126,710 UART: Caliptra RT
1,648,127,055 UART: [state] CFI Enabled
1,648,410,310 UART: [rt] RT listening for mailbox commands...
1,648,410,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,651,174,505 >>> mbox cmd response: success
1,651,187,686 UART:
1,651,187,702 UART: Running Caliptra FMC ...
1,651,188,110 UART:
1,651,188,253 UART: [state] CFI Enabled
1,651,277,042 UART: [art] Extend RT PCRs Done
1,651,277,470 UART: [art] Lock RT PCRs Done
1,651,278,801 UART: [art] Populate DV Done
1,651,287,094 UART: [fht] FMC Alias Private Key: 7
1,651,288,164 UART: [art] Derive CDI
1,651,288,444 UART: [art] Store in in slot 0x4
1,651,374,499 UART: [art] Derive Key Pair
1,651,374,859 UART: [art] Store priv key in slot 0x5
1,651,388,115 UART: [art] Derive Key Pair - Done
1,651,403,168 UART: [art] Signing Cert with AUTHO
1,651,403,648 UART: RITY.KEYID = 7
1,651,418,620 UART: [art] Erasing AUTHORITY.KEYID = 7
1,651,419,385 UART: [art] PUB.X = 54DB8E1121818BAB8AAA4B956E011E2F2EADF178B43F49129CBAE4392CD5806C22C2B628D0E27518EF95904E201671BE
1,651,426,160 UART: [art] PUB.Y = 1B4FF45D73EB958BE94314E1F405C03F6C56C6CB4BF2803DF93ED36AB7AA91F42FE1EC49063691230470DE3DF80BE4E6
1,651,433,112 UART: [art] SIG.R = 5D5FBD98F89B123B85CF515DB3B759D27262DD26711CB585FA2104A7D2021EE1EF83B40F8E678188DFE5630AB6405C4D
1,651,439,878 UART: [art] SIG.S = 85A30906A75C4539341F574F076CEAA8261DBC7F1E26CAFD866EE0BBFF62B11A901C52D5576F9017E0A47D228C9DE3F7
1,651,463,998 UART: Caliptra RT
1,651,464,343 UART: [state] CFI Enabled
1,651,746,410 UART: [rt] RT listening for mailbox commands...
1,651,747,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,654,511,231 >>> mbox cmd response: success
1,654,524,648 UART:
1,654,524,664 UART: Running Caliptra FMC ...
1,654,525,072 UART:
1,654,525,215 UART: [state] CFI Enabled
1,654,614,358 UART: [art] Extend RT PCRs Done
1,654,614,786 UART: [art] Lock RT PCRs Done
1,654,615,899 UART: [art] Populate DV Done
1,654,624,034 UART: [fht] FMC Alias Private Key: 7
1,654,625,180 UART: [art] Derive CDI
1,654,625,460 UART: [art] Store in in slot 0x4
1,654,711,099 UART: [art] Derive Key Pair
1,654,711,459 UART: [art] Store priv key in slot 0x5
1,654,725,185 UART: [art] Derive Key Pair - Done
1,654,740,098 UART: [art] Signing Cert with AUTHO
1,654,740,578 UART: RITY.KEYID = 7
1,654,755,718 UART: [art] Erasing AUTHORITY.KEYID = 7
1,654,756,483 UART: [art] PUB.X = 9BB937566BBCCC7BD1D8915DC36B1B6D298BAFE3AC4E071BCE95BD988A979C473A46597235D1CA98FBA345F77DA3A9EA
1,654,763,272 UART: [art] PUB.Y = 339FC02744C6D55D56A309691A6B875DAA46A3923EDB4CD4F7FA8962B5970C2453EC289F047E7A8CCB53A48998BF72D3
1,654,770,219 UART: [art] SIG.R = DD83CCC4D57D14DE6F5EA2AF7EA83CF3E9DB37A6FA45EE2C2A7F7A124B01F87168C89BFE8E32794C262B955710F8830F
1,654,777,003 UART: [art] SIG.S = 3B796718254AF263841A9F0FB0967A884413E2B2572051801BFE6329F6966B0B2A46011AF545A7F65E61FB981E6690DB
1,654,801,297 UART: Caliptra RT
1,654,801,642 UART: [state] CFI Enabled
1,655,088,659 UART: [rt] RT listening for mailbox commands...
1,655,089,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,657,853,510 >>> mbox cmd response: success
1,657,866,595 UART:
1,657,866,611 UART: Running Caliptra FMC ...
1,657,867,019 UART:
1,657,867,162 UART: [state] CFI Enabled
1,657,956,865 UART: [art] Extend RT PCRs Done
1,657,957,293 UART: [art] Lock RT PCRs Done
1,657,958,618 UART: [art] Populate DV Done
1,657,966,779 UART: [fht] FMC Alias Private Key: 7
1,657,967,727 UART: [art] Derive CDI
1,657,968,007 UART: [art] Store in in slot 0x4
1,658,053,632 UART: [art] Derive Key Pair
1,658,053,992 UART: [art] Store priv key in slot 0x5
1,658,067,126 UART: [art] Derive Key Pair - Done
1,658,082,025 UART: [art] Signing Cert with AUTHO
1,658,082,505 UART: RITY.KEYID = 7
1,658,097,815 UART: [art] Erasing AUTHORITY.KEYID = 7
1,658,098,580 UART: [art] PUB.X = 54DB8E1121818BAB8AAA4B956E011E2F2EADF178B43F49129CBAE4392CD5806C22C2B628D0E27518EF95904E201671BE
1,658,105,355 UART: [art] PUB.Y = 1B4FF45D73EB958BE94314E1F405C03F6C56C6CB4BF2803DF93ED36AB7AA91F42FE1EC49063691230470DE3DF80BE4E6
1,658,112,307 UART: [art] SIG.R = 5D5FBD98F89B123B85CF515DB3B759D27262DD26711CB585FA2104A7D2021EE1EF83B40F8E678188DFE5630AB6405C4D
1,658,119,073 UART: [art] SIG.S = 85A30906A75C4539341F574F076CEAA8261DBC7F1E26CAFD866EE0BBFF62B11A901C52D5576F9017E0A47D228C9DE3F7
1,658,142,267 UART: Caliptra RT
1,658,142,612 UART: [state] CFI Enabled
1,658,422,275 UART: [rt] RT listening for mailbox commands...
1,658,422,945 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,661,186,172 >>> mbox cmd response: success
1,661,199,225 UART:
1,661,199,241 UART: Running Caliptra FMC ...
1,661,199,649 UART:
1,661,199,792 UART: [state] CFI Enabled
1,661,288,337 UART: [art] Extend RT PCRs Done
1,661,288,765 UART: [art] Lock RT PCRs Done
1,661,290,240 UART: [art] Populate DV Done
1,661,298,461 UART: [fht] FMC Alias Private Key: 7
1,661,299,475 UART: [art] Derive CDI
1,661,299,755 UART: [art] Store in in slot 0x4
1,661,385,720 UART: [art] Derive Key Pair
1,661,386,080 UART: [art] Store priv key in slot 0x5
1,661,398,966 UART: [art] Derive Key Pair - Done
1,661,413,967 UART: [art] Signing Cert with AUTHO
1,661,414,447 UART: RITY.KEYID = 7
1,661,429,471 UART: [art] Erasing AUTHORITY.KEYID = 7
1,661,430,236 UART: [art] PUB.X = 9BB937566BBCCC7BD1D8915DC36B1B6D298BAFE3AC4E071BCE95BD988A979C473A46597235D1CA98FBA345F77DA3A9EA
1,661,437,025 UART: [art] PUB.Y = 339FC02744C6D55D56A309691A6B875DAA46A3923EDB4CD4F7FA8962B5970C2453EC289F047E7A8CCB53A48998BF72D3
1,661,443,972 UART: [art] SIG.R = DD83CCC4D57D14DE6F5EA2AF7EA83CF3E9DB37A6FA45EE2C2A7F7A124B01F87168C89BFE8E32794C262B955710F8830F
1,661,450,756 UART: [art] SIG.S = 3B796718254AF263841A9F0FB0967A884413E2B2572051801BFE6329F6966B0B2A46011AF545A7F65E61FB981E6690DB
1,661,474,248 UART: Caliptra RT
1,661,474,593 UART: [state] CFI Enabled
1,661,762,228 UART: [rt] RT listening for mailbox commands...
1,661,762,898 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,664,526,961 >>> mbox cmd response: success
1,664,540,404 UART:
1,664,540,420 UART: Running Caliptra FMC ...
1,664,540,828 UART:
1,664,540,971 UART: [state] CFI Enabled
1,664,630,054 UART: [art] Extend RT PCRs Done
1,664,630,482 UART: [art] Lock RT PCRs Done
1,664,631,639 UART: [art] Populate DV Done
1,664,639,734 UART: [fht] FMC Alias Private Key: 7
1,664,640,766 UART: [art] Derive CDI
1,664,641,046 UART: [art] Store in in slot 0x4
1,664,726,943 UART: [art] Derive Key Pair
1,664,727,303 UART: [art] Store priv key in slot 0x5
1,664,740,815 UART: [art] Derive Key Pair - Done
1,664,755,836 UART: [art] Signing Cert with AUTHO
1,664,756,316 UART: RITY.KEYID = 7
1,664,771,918 UART: [art] Erasing AUTHORITY.KEYID = 7
1,664,772,683 UART: [art] PUB.X = 54DB8E1121818BAB8AAA4B956E011E2F2EADF178B43F49129CBAE4392CD5806C22C2B628D0E27518EF95904E201671BE
1,664,779,458 UART: [art] PUB.Y = 1B4FF45D73EB958BE94314E1F405C03F6C56C6CB4BF2803DF93ED36AB7AA91F42FE1EC49063691230470DE3DF80BE4E6
1,664,786,410 UART: [art] SIG.R = 5D5FBD98F89B123B85CF515DB3B759D27262DD26711CB585FA2104A7D2021EE1EF83B40F8E678188DFE5630AB6405C4D
1,664,793,176 UART: [art] SIG.S = 85A30906A75C4539341F574F076CEAA8261DBC7F1E26CAFD866EE0BBFF62B11A901C52D5576F9017E0A47D228C9DE3F7
1,664,817,244 UART: Caliptra RT
1,664,817,589 UART: [state] CFI Enabled
1,665,104,612 UART: [rt] RT listening for mailbox commands...
1,665,105,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,667,868,827 >>> mbox cmd response: success
1,667,882,404 UART:
1,667,882,420 UART: Running Caliptra FMC ...
1,667,882,828 UART:
1,667,882,971 UART: [state] CFI Enabled
1,667,971,866 UART: [art] Extend RT PCRs Done
1,667,972,294 UART: [art] Lock RT PCRs Done
1,667,973,419 UART: [art] Populate DV Done
1,667,981,712 UART: [fht] FMC Alias Private Key: 7
1,667,982,796 UART: [art] Derive CDI
1,667,983,076 UART: [art] Store in in slot 0x4
1,668,068,829 UART: [art] Derive Key Pair
1,668,069,189 UART: [art] Store priv key in slot 0x5
1,668,082,615 UART: [art] Derive Key Pair - Done
1,668,096,964 UART: [art] Signing Cert with AUTHO
1,668,097,444 UART: RITY.KEYID = 7
1,668,112,396 UART: [art] Erasing AUTHORITY.KEYID = 7
1,668,113,161 UART: [art] PUB.X = 9BB937566BBCCC7BD1D8915DC36B1B6D298BAFE3AC4E071BCE95BD988A979C473A46597235D1CA98FBA345F77DA3A9EA
1,668,119,950 UART: [art] PUB.Y = 339FC02744C6D55D56A309691A6B875DAA46A3923EDB4CD4F7FA8962B5970C2453EC289F047E7A8CCB53A48998BF72D3
1,668,126,897 UART: [art] SIG.R = DD83CCC4D57D14DE6F5EA2AF7EA83CF3E9DB37A6FA45EE2C2A7F7A124B01F87168C89BFE8E32794C262B955710F8830F
1,668,133,681 UART: [art] SIG.S = 3B796718254AF263841A9F0FB0967A884413E2B2572051801BFE6329F6966B0B2A46011AF545A7F65E61FB981E6690DB
1,668,157,671 UART: Caliptra RT
1,668,158,016 UART: [state] CFI Enabled
1,668,442,185 UART: [rt] RT listening for mailbox commands...
1,668,442,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,671,207,312 >>> mbox cmd response: success
1,671,220,337 UART:
1,671,220,353 UART: Running Caliptra FMC ...
1,671,220,761 UART:
1,671,220,904 UART: [state] CFI Enabled
1,671,309,361 UART: [art] Extend RT PCRs Done
1,671,309,789 UART: [art] Lock RT PCRs Done
1,671,310,994 UART: [art] Populate DV Done
1,671,319,321 UART: [fht] FMC Alias Private Key: 7
1,671,320,493 UART: [art] Derive CDI
1,671,320,773 UART: [art] Store in in slot 0x4
1,671,406,314 UART: [art] Derive Key Pair
1,671,406,674 UART: [art] Store priv key in slot 0x5
1,671,419,892 UART: [art] Derive Key Pair - Done
1,671,434,603 UART: [art] Signing Cert with AUTHO
1,671,435,083 UART: RITY.KEYID = 7
1,671,450,357 UART: [art] Erasing AUTHORITY.KEYID = 7
1,671,451,122 UART: [art] PUB.X = 54DB8E1121818BAB8AAA4B956E011E2F2EADF178B43F49129CBAE4392CD5806C22C2B628D0E27518EF95904E201671BE
1,671,457,897 UART: [art] PUB.Y = 1B4FF45D73EB958BE94314E1F405C03F6C56C6CB4BF2803DF93ED36AB7AA91F42FE1EC49063691230470DE3DF80BE4E6
1,671,464,849 UART: [art] SIG.R = 5D5FBD98F89B123B85CF515DB3B759D27262DD26711CB585FA2104A7D2021EE1EF83B40F8E678188DFE5630AB6405C4D
1,671,471,615 UART: [art] SIG.S = 85A30906A75C4539341F574F076CEAA8261DBC7F1E26CAFD866EE0BBFF62B11A901C52D5576F9017E0A47D228C9DE3F7
1,671,494,969 UART: Caliptra RT
1,671,495,314 UART: [state] CFI Enabled
1,671,774,505 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 326.23s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,555,456,814 UART: [fht] FMC Alias Private Key: 7
1,555,457,752 UART: [art] Derive CDI
1,555,458,032 UART: [art] Store in in slot 0x4
1,555,544,139 UART: [art] Derive Key Pair
1,555,544,499 UART: [art] Store priv key in slot 0x5
1,555,557,737 UART: [art] Derive Key Pair - Done
1,555,572,325 UART: [art] Signing Cert with AUTHO
1,555,572,805 UART: RITY.KEYID = 7
1,555,587,985 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,588,750 UART: [art] PUB.X = B45814A7B21983D1E9FF17190104B01B84D7A97B843D511F06890B0290A38B5AFDD883EEE5D81309091C7ECD9472A36C
1,555,595,499 UART: [art] PUB.Y = 5E3E2A883035C489EEA347BC30069049C9C31F3F7015FDE60DC5B907B317A017DDCEBD7A4CBFBBCCE3E42736CFCA0A08
1,555,602,456 UART: [art] SIG.R = 51F4729169027CE57D48A16D73ECC045B6478FB3AD661E5FBBAF07FE4E88A676A98970B21F093A8B171D904F542CEB20
1,555,609,223 UART: [art] SIG.S = 6EBDD540EB1C9CEEB53BB66DF90A5624AEF1B2B145AF194EC86FC881F9BB3CE9A92142C5951593AA96D312530E36BA56
1,555,632,978 UART: Caliptra RT
1,555,633,231 UART: [state] CFI Enabled
1,555,914,798 UART: [rt] RT listening for mailbox commands...
1,555,915,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,916,379 UART:
1,555,916,395 UART: Running Caliptra ROM ...
1,555,916,803 UART:
1,555,916,858 UART: [state] CFI Enabled
1,555,919,816 UART: [state] LifecycleState = Unprovisioned
1,555,920,471 UART: [state] DebugLocked = No
1,555,920,975 UART: [state] WD Timer not started. Device not locked for debugging
1,555,922,127 UART: [kat] SHA2-256
1,556,727,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,556,731,902 UART: [kat] ++
1,556,732,054 UART: [kat] sha1
1,556,736,380 UART: [kat] SHA2-256
1,556,738,320 UART: [kat] SHA2-384
1,556,741,007 UART: [kat] SHA2-512-ACC
1,556,742,907 UART: [kat] ECC-384
1,556,752,524 UART: [kat] HMAC-384Kdf
1,556,757,212 UART: [kat] LMS
1,557,005,540 UART: [kat] --
1,557,006,576 UART: [update-reset] ++
1,558,320,333 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,558,321,406 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,558,471,404 >>> mbox cmd response: success
1,558,471,521 UART: [update-reset] Copying MAN_2 To MAN_1
1,558,479,535 UART: [update-reset Success] --
1,558,480,540 UART: [state] Locking Datavault
1,558,481,336 UART: [state] Locking PCR0, PCR1 and PCR31
1,558,481,940 UART: [state] Locking ICCM
1,558,482,572 UART: [exit] Launching FMC @ 0x40000130
1,558,487,901 UART:
1,558,487,917 UART: Running Caliptra FMC ...
1,558,488,325 UART:
1,558,488,379 UART: [state] CFI Enabled
1,558,577,588 UART: [art] Extend RT PCRs Done
1,558,578,016 UART: [art] Lock RT PCRs Done
1,558,579,429 UART: [art] Populate DV Done
1,558,587,502 UART: [fht] FMC Alias Private Key: 7
1,558,588,514 UART: [art] Derive CDI
1,558,588,794 UART: [art] Store in in slot 0x4
1,558,674,347 UART: [art] Derive Key Pair
1,558,674,707 UART: [art] Store priv key in slot 0x5
1,558,688,559 UART: [art] Derive Key Pair - Done
1,558,703,335 UART: [art] Signing Cert with AUTHO
1,558,703,815 UART: RITY.KEYID = 7
1,558,719,209 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,719,974 UART: [art] PUB.X = 0A9EAA5DC64AFD6A9A9D1E1736EB510847DC24782E9C70025464F905DF4A8604068781DCA8464ABCB8381A2B03EF4863
1,558,726,729 UART: [art] PUB.Y = 4850C237B6C39A864E7F6C57A34F0371D2BB396CE95B9928A79BE3F588BF1A861233BD261ECFDA8BC1C7ED0364A31A34
1,558,733,683 UART: [art] SIG.R = EE74751235F0B56EE31CD8C565574242B8520830CA9E1AC3039E91BD9CEF93F6AC7D3E9ACF5D31DC80DAAEB65D88CF02
1,558,740,462 UART: [art] SIG.S = 3DBE6FB2970A98C2563A001BE4F4335D8FE65FE92964E6E91FE32F8265C3D77C2472670DFA4DDC25CE184922DCCCB259
1,558,764,443 UART: Caliptra RT
1,558,764,696 UART: [state] CFI Enabled
1,559,046,475 UART: [rt] RT listening for mailbox commands...
1,559,047,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,559,048,138 UART:
1,559,048,154 UART: Running Caliptra ROM ...
1,559,048,562 UART:
1,559,048,617 UART: [state] CFI Enabled
1,559,051,101 UART: [state] LifecycleState = Unprovisioned
1,559,051,756 UART: [state] DebugLocked = No
1,559,052,256 UART: [state] WD Timer not started. Device not locked for debugging
1,559,053,518 UART: [kat] SHA2-256
1,559,859,168 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,559,863,293 UART: [kat] ++
1,559,863,445 UART: [kat] sha1
1,559,867,625 UART: [kat] SHA2-256
1,559,869,565 UART: [kat] SHA2-384
1,559,872,320 UART: [kat] SHA2-512-ACC
1,559,874,220 UART: [kat] ECC-384
1,559,884,249 UART: [kat] HMAC-384Kdf
1,559,888,955 UART: [kat] LMS
1,560,137,283 UART: [kat] --
1,560,138,221 UART: [update-reset] ++
1,561,452,370 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,561,453,443 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,561,603,441 >>> mbox cmd response: success
1,561,603,588 UART: [update-reset] Copying MAN_2 To MAN_1
1,561,611,602 UART: [update-reset Success] --
1,561,612,457 UART: [state] Locking Datavault
1,561,613,127 UART: [state] Locking PCR0, PCR1 and PCR31
1,561,613,731 UART: [state] Locking ICCM
1,561,614,219 UART: [exit] Launching FMC @ 0x40000130
1,561,619,548 UART:
1,561,619,564 UART: Running Caliptra FMC ...
1,561,619,972 UART:
1,561,620,026 UART: [state] CFI Enabled
1,561,709,209 UART: [art] Extend RT PCRs Done
1,561,709,637 UART: [art] Lock RT PCRs Done
1,561,710,742 UART: [art] Populate DV Done
1,561,719,129 UART: [fht] FMC Alias Private Key: 7
1,561,720,185 UART: [art] Derive CDI
1,561,720,465 UART: [art] Store in in slot 0x4
1,561,806,130 UART: [art] Derive Key Pair
1,561,806,490 UART: [art] Store priv key in slot 0x5
1,561,819,936 UART: [art] Derive Key Pair - Done
1,561,834,940 UART: [art] Signing Cert with AUTHO
1,561,835,420 UART: RITY.KEYID = 7
1,561,850,316 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,851,081 UART: [art] PUB.X = B45814A7B21983D1E9FF17190104B01B84D7A97B843D511F06890B0290A38B5AFDD883EEE5D81309091C7ECD9472A36C
1,561,857,830 UART: [art] PUB.Y = 5E3E2A883035C489EEA347BC30069049C9C31F3F7015FDE60DC5B907B317A017DDCEBD7A4CBFBBCCE3E42736CFCA0A08
1,561,864,787 UART: [art] SIG.R = 51F4729169027CE57D48A16D73ECC045B6478FB3AD661E5FBBAF07FE4E88A676A98970B21F093A8B171D904F542CEB20
1,561,871,554 UART: [art] SIG.S = 6EBDD540EB1C9CEEB53BB66DF90A5624AEF1B2B145AF194EC86FC881F9BB3CE9A92142C5951593AA96D312530E36BA56
1,561,895,727 UART: Caliptra RT
1,561,895,980 UART: [state] CFI Enabled
1,562,182,751 UART: [rt] RT listening for mailbox commands...
1,562,183,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,562,184,536 UART:
1,562,184,552 UART: Running Caliptra ROM ...
1,562,184,960 UART:
1,562,185,015 UART: [state] CFI Enabled
1,562,187,657 UART: [state] LifecycleState = Unprovisioned
1,562,188,312 UART: [state] DebugLocked = No
1,562,188,864 UART: [state] WD Timer not started. Device not locked for debugging
1,562,190,152 UART: [kat] SHA2-256
1,562,995,802 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,562,999,927 UART: [kat] ++
1,563,000,079 UART: [kat] sha1
1,563,004,261 UART: [kat] SHA2-256
1,563,006,201 UART: [kat] SHA2-384
1,563,008,766 UART: [kat] SHA2-512-ACC
1,563,010,666 UART: [kat] ECC-384
1,563,020,469 UART: [kat] HMAC-384Kdf
1,563,024,997 UART: [kat] LMS
1,563,273,325 UART: [kat] --
1,563,274,411 UART: [update-reset] ++
1,564,588,422 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,564,589,381 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,564,739,379 >>> mbox cmd response: success
1,564,739,726 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,747,740 UART: [update-reset Success] --
1,564,748,711 UART: [state] Locking Datavault
1,564,749,713 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,750,317 UART: [state] Locking ICCM
1,564,750,957 UART: [exit] Launching FMC @ 0x40000130
1,564,756,286 UART:
1,564,756,302 UART: Running Caliptra FMC ...
1,564,756,710 UART:
1,564,756,764 UART: [state] CFI Enabled
1,564,846,347 UART: [art] Extend RT PCRs Done
1,564,846,775 UART: [art] Lock RT PCRs Done
1,564,848,312 UART: [art] Populate DV Done
1,564,856,721 UART: [fht] FMC Alias Private Key: 7
1,564,857,903 UART: [art] Derive CDI
1,564,858,183 UART: [art] Store in in slot 0x4
1,564,943,468 UART: [art] Derive Key Pair
1,564,943,828 UART: [art] Store priv key in slot 0x5
1,564,956,314 UART: [art] Derive Key Pair - Done
1,564,971,018 UART: [art] Signing Cert with AUTHO
1,564,971,498 UART: RITY.KEYID = 7
1,564,986,598 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,987,363 UART: [art] PUB.X = 0A9EAA5DC64AFD6A9A9D1E1736EB510847DC24782E9C70025464F905DF4A8604068781DCA8464ABCB8381A2B03EF4863
1,564,994,118 UART: [art] PUB.Y = 4850C237B6C39A864E7F6C57A34F0371D2BB396CE95B9928A79BE3F588BF1A861233BD261ECFDA8BC1C7ED0364A31A34
1,565,001,072 UART: [art] SIG.R = EE74751235F0B56EE31CD8C565574242B8520830CA9E1AC3039E91BD9CEF93F6AC7D3E9ACF5D31DC80DAAEB65D88CF02
1,565,007,851 UART: [art] SIG.S = 3DBE6FB2970A98C2563A001BE4F4335D8FE65FE92964E6E91FE32F8265C3D77C2472670DFA4DDC25CE184922DCCCB259
1,565,031,230 UART: Caliptra RT
1,565,031,483 UART: [state] CFI Enabled
1,565,313,108 UART: [rt] RT listening for mailbox commands...
1,565,313,778 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,565,314,593 UART:
1,565,314,609 UART: Running Caliptra ROM ...
1,565,315,017 UART:
1,565,315,072 UART: [state] CFI Enabled
1,565,317,436 UART: [state] LifecycleState = Unprovisioned
1,565,318,091 UART: [state] DebugLocked = No
1,565,318,675 UART: [state] WD Timer not started. Device not locked for debugging
1,565,320,007 UART: [kat] SHA2-256
1,566,125,657 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,566,129,782 UART: [kat] ++
1,566,129,934 UART: [kat] sha1
1,566,134,300 UART: [kat] SHA2-256
1,566,136,240 UART: [kat] SHA2-384
1,566,139,099 UART: [kat] SHA2-512-ACC
1,566,140,999 UART: [kat] ECC-384
1,566,150,590 UART: [kat] HMAC-384Kdf
1,566,155,242 UART: [kat] LMS
1,566,403,570 UART: [kat] --
1,566,404,622 UART: [update-reset] ++
1,567,718,333 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,567,719,466 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,567,869,464 >>> mbox cmd response: success
1,567,869,763 UART: [update-reset] Copying MAN_2 To MAN_1
1,567,877,777 UART: [update-reset Success] --
1,567,878,930 UART: [state] Locking Datavault
1,567,879,746 UART: [state] Locking PCR0, PCR1 and PCR31
1,567,880,350 UART: [state] Locking ICCM
1,567,880,922 UART: [exit] Launching FMC @ 0x40000130
1,567,886,251 UART:
1,567,886,267 UART: Running Caliptra FMC ...
1,567,886,675 UART:
1,567,886,729 UART: [state] CFI Enabled
1,567,975,586 UART: [art] Extend RT PCRs Done
1,567,976,014 UART: [art] Lock RT PCRs Done
1,567,977,599 UART: [art] Populate DV Done
1,567,985,546 UART: [fht] FMC Alias Private Key: 7
1,567,986,524 UART: [art] Derive CDI
1,567,986,804 UART: [art] Store in in slot 0x4
1,568,072,219 UART: [art] Derive Key Pair
1,568,072,579 UART: [art] Store priv key in slot 0x5
1,568,086,367 UART: [art] Derive Key Pair - Done
1,568,101,019 UART: [art] Signing Cert with AUTHO
1,568,101,499 UART: RITY.KEYID = 7
1,568,117,103 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,117,868 UART: [art] PUB.X = B45814A7B21983D1E9FF17190104B01B84D7A97B843D511F06890B0290A38B5AFDD883EEE5D81309091C7ECD9472A36C
1,568,124,617 UART: [art] PUB.Y = 5E3E2A883035C489EEA347BC30069049C9C31F3F7015FDE60DC5B907B317A017DDCEBD7A4CBFBBCCE3E42736CFCA0A08
1,568,131,574 UART: [art] SIG.R = 51F4729169027CE57D48A16D73ECC045B6478FB3AD661E5FBBAF07FE4E88A676A98970B21F093A8B171D904F542CEB20
1,568,138,341 UART: [art] SIG.S = 6EBDD540EB1C9CEEB53BB66DF90A5624AEF1B2B145AF194EC86FC881F9BB3CE9A92142C5951593AA96D312530E36BA56
1,568,162,368 UART: Caliptra RT
1,568,162,621 UART: [state] CFI Enabled
1,568,448,690 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 313.04s
Truncated 733352 bytes from beginning
5 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,866,474 >>> mbox cmd response: success
1,486,879,768 UART:
1,486,879,784 UART: Running Caliptra FMC ...
1,486,880,192 UART:
1,486,880,246 UART: [state] CFI Enabled
1,486,969,839 UART: [art] Extend RT PCRs Done
1,486,970,267 UART: [art] Lock RT PCRs Done
1,486,971,594 UART: [art] Populate DV Done
1,486,979,769 UART: [fht] FMC Alias Private Key: 7
1,486,980,889 UART: [art] Derive CDI
1,486,981,169 UART: [art] Store in in slot 0x4
1,487,067,030 UART: [art] Derive Key Pair
1,487,067,390 UART: [art] Store priv key in slot 0x5
1,487,081,014 UART: [art] Derive Key Pair - Done
1,487,096,053 UART: [art] Signing Cert with AUTHO
1,487,096,533 UART: RITY.KEYID = 7
1,487,111,685 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,112,450 UART: [art] PUB.X = E77F619E17BF52525CFE8130EF076348537635FAB4A9EF036DB7E1D11DA4363D4D4BFD99E8A6668228A553607EBDE12A
1,487,119,222 UART: [art] PUB.Y = 722E6806890B4674E4BDF5112F031417EB6F5F2D464A290B606D7A58EB9AB9FCA7AECB261B294FB987F6E26F65767D07
1,487,126,163 UART: [art] SIG.R = D12E8C5914C396EF3AA6EEC5A24AB777954DC4EE23F196A924F37C45D41A813445F7781575033262ECA962F542788097
1,487,132,926 UART: [art] SIG.S = E836C2CE3543018611E1C7A33DD02CF831E314337F10A30F921C7C9AD04A7B0443EEADD6A9780C3156E833F5E4BDCAE3
1,487,156,497 UART: Caliptra RT
1,487,156,750 UART: [state] CFI Enabled
1,487,437,736 UART: [rt] RT listening for mailbox commands...
1,487,438,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,878,887 >>> mbox cmd response: success
1,489,891,963 UART:
1,489,891,979 UART: Running Caliptra FMC ...
1,489,892,387 UART:
1,489,892,441 UART: [state] CFI Enabled
1,489,980,964 UART: [art] Extend RT PCRs Done
1,489,981,392 UART: [art] Lock RT PCRs Done
1,489,982,693 UART: [art] Populate DV Done
1,489,991,070 UART: [fht] FMC Alias Private Key: 7
1,489,992,212 UART: [art] Derive CDI
1,489,992,492 UART: [art] Store in in slot 0x4
1,490,077,721 UART: [art] Derive Key Pair
1,490,078,081 UART: [art] Store priv key in slot 0x5
1,490,091,369 UART: [art] Derive Key Pair - Done
1,490,105,704 UART: [art] Signing Cert with AUTHO
1,490,106,184 UART: RITY.KEYID = 7
1,490,121,222 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,121,987 UART: [art] PUB.X = D71E6D4AFD1F50CD0AA6A51032B82991B81F23BB7157FF2E40BC29FA8C8DF4212FFFE5D9AA3BF2A173B6D5563A7161FE
1,490,128,776 UART: [art] PUB.Y = 88CE75DC9D95DE7A93157962D6652E36ADE5D2CFB49A8999430FBF17FE45F72F61E56254AA8375439BB485441F165117
1,490,135,723 UART: [art] SIG.R = 978B282DED4393B199613F906D7267FEBB1AC9E381EAFBBCE8F80F099BE77BB482D31745C4DBA84F7B5F3D388788DED5
1,490,142,503 UART: [art] SIG.S = 240B0CC0124B40303941B30B7412317F3940384C69D14F6D406AB70BDC0BA7003DF8CB81DE8A31F273E7FB101D4C7F77
1,490,166,299 UART: Caliptra RT
1,490,166,552 UART: [state] CFI Enabled
1,490,445,417 UART: [rt] RT listening for mailbox commands...
1,490,446,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,886,182 >>> mbox cmd response: success
1,492,899,162 UART:
1,492,899,178 UART: Running Caliptra FMC ...
1,492,899,586 UART:
1,492,899,640 UART: [state] CFI Enabled
1,492,988,287 UART: [art] Extend RT PCRs Done
1,492,988,715 UART: [art] Lock RT PCRs Done
1,492,990,182 UART: [art] Populate DV Done
1,492,998,417 UART: [fht] FMC Alias Private Key: 7
1,492,999,353 UART: [art] Derive CDI
1,492,999,633 UART: [art] Store in in slot 0x4
1,493,085,436 UART: [art] Derive Key Pair
1,493,085,796 UART: [art] Store priv key in slot 0x5
1,493,098,968 UART: [art] Derive Key Pair - Done
1,493,113,993 UART: [art] Signing Cert with AUTHO
1,493,114,473 UART: RITY.KEYID = 7
1,493,129,625 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,130,390 UART: [art] PUB.X = E77F619E17BF52525CFE8130EF076348537635FAB4A9EF036DB7E1D11DA4363D4D4BFD99E8A6668228A553607EBDE12A
1,493,137,162 UART: [art] PUB.Y = 722E6806890B4674E4BDF5112F031417EB6F5F2D464A290B606D7A58EB9AB9FCA7AECB261B294FB987F6E26F65767D07
1,493,144,103 UART: [art] SIG.R = D12E8C5914C396EF3AA6EEC5A24AB777954DC4EE23F196A924F37C45D41A813445F7781575033262ECA962F542788097
1,493,150,866 UART: [art] SIG.S = E836C2CE3543018611E1C7A33DD02CF831E314337F10A30F921C7C9AD04A7B0443EEADD6A9780C3156E833F5E4BDCAE3
1,493,174,389 UART: Caliptra RT
1,493,174,642 UART: [state] CFI Enabled
1,493,457,758 UART: [rt] RT listening for mailbox commands...
1,493,458,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,898,743 >>> mbox cmd response: success
1,495,911,737 UART:
1,495,911,753 UART: Running Caliptra FMC ...
1,495,912,161 UART:
1,495,912,215 UART: [state] CFI Enabled
1,496,001,068 UART: [art] Extend RT PCRs Done
1,496,001,496 UART: [art] Lock RT PCRs Done
1,496,002,879 UART: [art] Populate DV Done
1,496,010,974 UART: [fht] FMC Alias Private Key: 7
1,496,012,020 UART: [art] Derive CDI
1,496,012,300 UART: [art] Store in in slot 0x4
1,496,097,627 UART: [art] Derive Key Pair
1,496,097,987 UART: [art] Store priv key in slot 0x5
1,496,111,711 UART: [art] Derive Key Pair - Done
1,496,126,444 UART: [art] Signing Cert with AUTHO
1,496,126,924 UART: RITY.KEYID = 7
1,496,141,848 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,142,613 UART: [art] PUB.X = D71E6D4AFD1F50CD0AA6A51032B82991B81F23BB7157FF2E40BC29FA8C8DF4212FFFE5D9AA3BF2A173B6D5563A7161FE
1,496,149,402 UART: [art] PUB.Y = 88CE75DC9D95DE7A93157962D6652E36ADE5D2CFB49A8999430FBF17FE45F72F61E56254AA8375439BB485441F165117
1,496,156,349 UART: [art] SIG.R = 978B282DED4393B199613F906D7267FEBB1AC9E381EAFBBCE8F80F099BE77BB482D31745C4DBA84F7B5F3D388788DED5
1,496,163,129 UART: [art] SIG.S = 240B0CC0124B40303941B30B7412317F3940384C69D14F6D406AB70BDC0BA7003DF8CB81DE8A31F273E7FB101D4C7F77
1,496,187,169 UART: Caliptra RT
1,496,187,422 UART: [state] CFI Enabled
1,496,468,439 UART: [rt] RT listening for mailbox commands...
1,496,469,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,909,262 >>> mbox cmd response: success
1,498,922,942 UART:
1,498,922,958 UART: Running Caliptra FMC ...
1,498,923,366 UART:
1,498,923,420 UART: [state] CFI Enabled
1,499,011,945 UART: [art] Extend RT PCRs Done
1,499,012,373 UART: [art] Lock RT PCRs Done
1,499,013,524 UART: [art] Populate DV Done
1,499,021,469 UART: [fht] FMC Alias Private Key: 7
1,499,022,499 UART: [art] Derive CDI
1,499,022,779 UART: [art] Store in in slot 0x4
1,499,108,218 UART: [art] Derive Key Pair
1,499,108,578 UART: [art] Store priv key in slot 0x5
1,499,121,454 UART: [art] Derive Key Pair - Done
1,499,136,145 UART: [art] Signing Cert with AUTHO
1,499,136,625 UART: RITY.KEYID = 7
1,499,151,673 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,152,438 UART: [art] PUB.X = E77F619E17BF52525CFE8130EF076348537635FAB4A9EF036DB7E1D11DA4363D4D4BFD99E8A6668228A553607EBDE12A
1,499,159,210 UART: [art] PUB.Y = 722E6806890B4674E4BDF5112F031417EB6F5F2D464A290B606D7A58EB9AB9FCA7AECB261B294FB987F6E26F65767D07
1,499,166,151 UART: [art] SIG.R = D12E8C5914C396EF3AA6EEC5A24AB777954DC4EE23F196A924F37C45D41A813445F7781575033262ECA962F542788097
1,499,172,914 UART: [art] SIG.S = E836C2CE3543018611E1C7A33DD02CF831E314337F10A30F921C7C9AD04A7B0443EEADD6A9780C3156E833F5E4BDCAE3
1,499,196,445 UART: Caliptra RT
1,499,196,698 UART: [state] CFI Enabled
1,499,480,158 UART: [rt] RT listening for mailbox commands...
1,499,480,828 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,920,547 >>> mbox cmd response: success
1,501,933,875 UART:
1,501,933,891 UART: Running Caliptra FMC ...
1,501,934,299 UART:
1,501,934,353 UART: [state] CFI Enabled
1,502,023,460 UART: [art] Extend RT PCRs Done
1,502,023,888 UART: [art] Lock RT PCRs Done
1,502,025,125 UART: [art] Populate DV Done
1,502,033,434 UART: [fht] FMC Alias Private Key: 7
1,502,034,512 UART: [art] Derive CDI
1,502,034,792 UART: [art] Store in in slot 0x4
1,502,120,611 UART: [art] Derive Key Pair
1,502,120,971 UART: [art] Store priv key in slot 0x5
1,502,134,565 UART: [art] Derive Key Pair - Done
1,502,149,338 UART: [art] Signing Cert with AUTHO
1,502,149,818 UART: RITY.KEYID = 7
1,502,165,146 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,165,911 UART: [art] PUB.X = D71E6D4AFD1F50CD0AA6A51032B82991B81F23BB7157FF2E40BC29FA8C8DF4212FFFE5D9AA3BF2A173B6D5563A7161FE
1,502,172,700 UART: [art] PUB.Y = 88CE75DC9D95DE7A93157962D6652E36ADE5D2CFB49A8999430FBF17FE45F72F61E56254AA8375439BB485441F165117
1,502,179,647 UART: [art] SIG.R = 978B282DED4393B199613F906D7267FEBB1AC9E381EAFBBCE8F80F099BE77BB482D31745C4DBA84F7B5F3D388788DED5
1,502,186,427 UART: [art] SIG.S = 240B0CC0124B40303941B30B7412317F3940384C69D14F6D406AB70BDC0BA7003DF8CB81DE8A31F273E7FB101D4C7F77
1,502,210,153 UART: Caliptra RT
1,502,210,406 UART: [state] CFI Enabled
1,502,490,745 UART: [rt] RT listening for mailbox commands...
1,502,491,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,932,240 >>> mbox cmd response: success
1,504,945,654 UART:
1,504,945,670 UART: Running Caliptra FMC ...
1,504,946,078 UART:
1,504,946,132 UART: [state] CFI Enabled
1,505,034,829 UART: [art] Extend RT PCRs Done
1,505,035,257 UART: [art] Lock RT PCRs Done
1,505,036,716 UART: [art] Populate DV Done
1,505,045,017 UART: [fht] FMC Alias Private Key: 7
1,505,046,129 UART: [art] Derive CDI
1,505,046,409 UART: [art] Store in in slot 0x4
1,505,132,094 UART: [art] Derive Key Pair
1,505,132,454 UART: [art] Store priv key in slot 0x5
1,505,145,908 UART: [art] Derive Key Pair - Done
1,505,160,703 UART: [art] Signing Cert with AUTHO
1,505,161,183 UART: RITY.KEYID = 7
1,505,176,161 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,176,926 UART: [art] PUB.X = E77F619E17BF52525CFE8130EF076348537635FAB4A9EF036DB7E1D11DA4363D4D4BFD99E8A6668228A553607EBDE12A
1,505,183,698 UART: [art] PUB.Y = 722E6806890B4674E4BDF5112F031417EB6F5F2D464A290B606D7A58EB9AB9FCA7AECB261B294FB987F6E26F65767D07
1,505,190,639 UART: [art] SIG.R = D12E8C5914C396EF3AA6EEC5A24AB777954DC4EE23F196A924F37C45D41A813445F7781575033262ECA962F542788097
1,505,197,402 UART: [art] SIG.S = E836C2CE3543018611E1C7A33DD02CF831E314337F10A30F921C7C9AD04A7B0443EEADD6A9780C3156E833F5E4BDCAE3
1,505,221,585 UART: Caliptra RT
1,505,221,838 UART: [state] CFI Enabled
1,505,501,396 UART: [rt] RT listening for mailbox commands...
1,505,502,066 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,507,939,427 >>> mbox cmd response: success
1,507,952,411 UART:
1,507,952,427 UART: Running Caliptra FMC ...
1,507,952,835 UART:
1,507,952,889 UART: [state] CFI Enabled
1,508,041,732 UART: [art] Extend RT PCRs Done
1,508,042,160 UART: [art] Lock RT PCRs Done
1,508,043,291 UART: [art] Populate DV Done
1,508,051,536 UART: [fht] FMC Alias Private Key: 7
1,508,052,556 UART: [art] Derive CDI
1,508,052,836 UART: [art] Store in in slot 0x4
1,508,138,041 UART: [art] Derive Key Pair
1,508,138,401 UART: [art] Store priv key in slot 0x5
1,508,151,879 UART: [art] Derive Key Pair - Done
1,508,166,878 UART: [art] Signing Cert with AUTHO
1,508,167,358 UART: RITY.KEYID = 7
1,508,183,068 UART: [art] Erasing AUTHORITY.KEYID = 7
1,508,183,833 UART: [art] PUB.X = D71E6D4AFD1F50CD0AA6A51032B82991B81F23BB7157FF2E40BC29FA8C8DF4212FFFE5D9AA3BF2A173B6D5563A7161FE
1,508,190,622 UART: [art] PUB.Y = 88CE75DC9D95DE7A93157962D6652E36ADE5D2CFB49A8999430FBF17FE45F72F61E56254AA8375439BB485441F165117
1,508,197,569 UART: [art] SIG.R = 978B282DED4393B199613F906D7267FEBB1AC9E381EAFBBCE8F80F099BE77BB482D31745C4DBA84F7B5F3D388788DED5
1,508,204,349 UART: [art] SIG.S = 240B0CC0124B40303941B30B7412317F3940384C69D14F6D406AB70BDC0BA7003DF8CB81DE8A31F273E7FB101D4C7F77
1,508,228,743 UART: Caliptra RT
1,508,228,996 UART: [state] CFI Enabled
1,508,508,115 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 303.30s
Truncated 1339597 bytes from beginning
[art] Populate DV Done
1,555,969,524 UART: [fht] FMC Alias Private Key: 7
1,555,970,484 UART: [art] Derive CDI
1,555,970,764 UART: [art] Store in in slot 0x4
1,556,056,577 UART: [art] Derive Key Pair
1,556,056,937 UART: [art] Store priv key in slot 0x5
1,556,070,339 UART: [art] Derive Key Pair - Done
1,556,085,137 UART: [art] Signing Cert with AUTHO
1,556,085,617 UART: RITY.KEYID = 7
1,556,100,907 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,101,672 UART: [art] PUB.X = 98C1EF67A603901E5E443B549B3CDCD1E214E1823E98DDB70B09E67B0046DFABBF5FFFD17DA365C2712FE072CD230944
1,556,108,422 UART: [art] PUB.Y = 3CE644E483C4976164AEF12A423036510402FB36BEAA43E3B7A88B62BB90E0249919C45CE62D22CAA30DE19FD9E23384
1,556,115,367 UART: [art] SIG.R = B946D8AF5D3A8A44B29BA647AE8055430D3D320648DE9F2E992392A8C4FEE34D1C8AE00D6024F76FA28F596471B03A88
1,556,122,134 UART: [art] SIG.S = FC11B809FC4C589251650AC790AD2D3C228BBAB9AC3C1FB6C39ABF4363DA7ECA05D6FC039471ACFFADF68035A1CDAE24
1,556,145,389 UART: Caliptra RT
1,556,145,734 UART: [state] CFI Enabled
1,556,425,672 UART: [rt] RT listening for mailbox commands...
1,556,426,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,556,427,151 UART:
1,556,427,167 UART: Running Caliptra ROM ...
1,556,427,575 UART:
1,556,427,717 UART: [state] CFI Enabled
1,556,430,551 UART: [state] LifecycleState = Unprovisioned
1,556,431,206 UART: [state] DebugLocked = No
1,556,431,920 UART: [state] WD Timer not started. Device not locked for debugging
1,556,433,204 UART: [kat] SHA2-256
1,557,238,854 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,557,242,979 UART: [kat] ++
1,557,243,131 UART: [kat] sha1
1,557,247,461 UART: [kat] SHA2-256
1,557,249,401 UART: [kat] SHA2-384
1,557,252,056 UART: [kat] SHA2-512-ACC
1,557,253,956 UART: [kat] ECC-384
1,557,264,037 UART: [kat] HMAC-384Kdf
1,557,268,791 UART: [kat] LMS
1,557,517,119 UART: [kat] --
1,557,518,017 UART: [update-reset] ++
1,558,832,042 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,558,833,243 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,558,983,241 >>> mbox cmd response: success
1,558,983,392 UART: [update-reset] Copying MAN_2 To MAN_1
1,558,991,406 UART: [update-reset Success] --
1,558,992,581 UART: [state] Locking Datavault
1,558,993,403 UART: [state] Locking PCR0, PCR1 and PCR31
1,558,994,007 UART: [state] Locking ICCM
1,558,994,569 UART: [exit] Launching FMC @ 0x40000130
1,558,999,898 UART:
1,558,999,914 UART: Running Caliptra FMC ...
1,559,000,322 UART:
1,559,000,465 UART: [state] CFI Enabled
1,559,089,974 UART: [art] Extend RT PCRs Done
1,559,090,402 UART: [art] Lock RT PCRs Done
1,559,091,781 UART: [art] Populate DV Done
1,559,100,100 UART: [fht] FMC Alias Private Key: 7
1,559,101,186 UART: [art] Derive CDI
1,559,101,466 UART: [art] Store in in slot 0x4
1,559,187,599 UART: [art] Derive Key Pair
1,559,187,959 UART: [art] Store priv key in slot 0x5
1,559,200,833 UART: [art] Derive Key Pair - Done
1,559,215,298 UART: [art] Signing Cert with AUTHO
1,559,215,778 UART: RITY.KEYID = 7
1,559,231,098 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,231,863 UART: [art] PUB.X = B4A5A501F552640A6B8166847BB12672027D0739C03B78D5C28C0383E2E5004FF48EDEB880EDFCF44909D22FB5335DF3
1,559,238,595 UART: [art] PUB.Y = 354E8F5F9BB010DDCA31420FF2B5C114AE12193B84C1A781BE41604E588D32C2B3F7FB6E96B18DB3908CDA21DD270519
1,559,245,549 UART: [art] SIG.R = E4DAAB534D42EA332C50834D9FA15EB790C2DAC9F33F0C86143D1B3EBB5F8B4E7C384F0E871206185148E78D4F9C4D64
1,559,252,322 UART: [art] SIG.S = 5A88F51B666D1955D5CC26A416674F786382A8D25FDAF630D89BB8FE0800F484551C3D5568E0F632E13A7C88BB447216
1,559,276,226 UART: Caliptra RT
1,559,276,571 UART: [state] CFI Enabled
1,559,563,498 UART: [rt] RT listening for mailbox commands...
1,559,564,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,559,565,255 UART:
1,559,565,271 UART: Running Caliptra ROM ...
1,559,565,679 UART:
1,559,565,821 UART: [state] CFI Enabled
1,559,568,671 UART: [state] LifecycleState = Unprovisioned
1,559,569,326 UART: [state] DebugLocked = No
1,559,570,024 UART: [state] WD Timer not started. Device not locked for debugging
1,559,571,186 UART: [kat] SHA2-256
1,560,376,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,560,380,961 UART: [kat] ++
1,560,381,113 UART: [kat] sha1
1,560,385,321 UART: [kat] SHA2-256
1,560,387,261 UART: [kat] SHA2-384
1,560,389,928 UART: [kat] SHA2-512-ACC
1,560,391,828 UART: [kat] ECC-384
1,560,401,683 UART: [kat] HMAC-384Kdf
1,560,406,317 UART: [kat] LMS
1,560,654,645 UART: [kat] --
1,560,655,679 UART: [update-reset] ++
1,561,970,170 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,561,971,363 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,562,121,361 >>> mbox cmd response: success
1,562,121,534 UART: [update-reset] Copying MAN_2 To MAN_1
1,562,129,548 UART: [update-reset Success] --
1,562,130,573 UART: [state] Locking Datavault
1,562,131,497 UART: [state] Locking PCR0, PCR1 and PCR31
1,562,132,101 UART: [state] Locking ICCM
1,562,132,667 UART: [exit] Launching FMC @ 0x40000130
1,562,137,996 UART:
1,562,138,012 UART: Running Caliptra FMC ...
1,562,138,420 UART:
1,562,138,563 UART: [state] CFI Enabled
1,562,227,434 UART: [art] Extend RT PCRs Done
1,562,227,862 UART: [art] Lock RT PCRs Done
1,562,229,065 UART: [art] Populate DV Done
1,562,237,156 UART: [fht] FMC Alias Private Key: 7
1,562,238,124 UART: [art] Derive CDI
1,562,238,404 UART: [art] Store in in slot 0x4
1,562,324,311 UART: [art] Derive Key Pair
1,562,324,671 UART: [art] Store priv key in slot 0x5
1,562,337,861 UART: [art] Derive Key Pair - Done
1,562,352,543 UART: [art] Signing Cert with AUTHO
1,562,353,023 UART: RITY.KEYID = 7
1,562,368,643 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,369,408 UART: [art] PUB.X = 98C1EF67A603901E5E443B549B3CDCD1E214E1823E98DDB70B09E67B0046DFABBF5FFFD17DA365C2712FE072CD230944
1,562,376,158 UART: [art] PUB.Y = 3CE644E483C4976164AEF12A423036510402FB36BEAA43E3B7A88B62BB90E0249919C45CE62D22CAA30DE19FD9E23384
1,562,383,103 UART: [art] SIG.R = B946D8AF5D3A8A44B29BA647AE8055430D3D320648DE9F2E992392A8C4FEE34D1C8AE00D6024F76FA28F596471B03A88
1,562,389,870 UART: [art] SIG.S = FC11B809FC4C589251650AC790AD2D3C228BBAB9AC3C1FB6C39ABF4363DA7ECA05D6FC039471ACFFADF68035A1CDAE24
1,562,413,613 UART: Caliptra RT
1,562,413,958 UART: [state] CFI Enabled
1,562,697,392 UART: [rt] RT listening for mailbox commands...
1,562,698,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,562,698,991 UART:
1,562,699,007 UART: Running Caliptra ROM ...
1,562,699,415 UART:
1,562,699,557 UART: [state] CFI Enabled
1,562,702,053 UART: [state] LifecycleState = Unprovisioned
1,562,702,708 UART: [state] DebugLocked = No
1,562,703,360 UART: [state] WD Timer not started. Device not locked for debugging
1,562,704,694 UART: [kat] SHA2-256
1,563,510,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,563,514,469 UART: [kat] ++
1,563,514,621 UART: [kat] sha1
1,563,518,861 UART: [kat] SHA2-256
1,563,520,801 UART: [kat] SHA2-384
1,563,523,480 UART: [kat] SHA2-512-ACC
1,563,525,380 UART: [kat] ECC-384
1,563,535,179 UART: [kat] HMAC-384Kdf
1,563,539,629 UART: [kat] LMS
1,563,787,957 UART: [kat] --
1,563,789,065 UART: [update-reset] ++
1,565,104,070 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,565,105,065 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,565,255,063 >>> mbox cmd response: success
1,565,255,200 UART: [update-reset] Copying MAN_2 To MAN_1
1,565,263,214 UART: [update-reset Success] --
1,565,264,285 UART: [state] Locking Datavault
1,565,265,129 UART: [state] Locking PCR0, PCR1 and PCR31
1,565,265,733 UART: [state] Locking ICCM
1,565,266,235 UART: [exit] Launching FMC @ 0x40000130
1,565,271,564 UART:
1,565,271,580 UART: Running Caliptra FMC ...
1,565,271,988 UART:
1,565,272,131 UART: [state] CFI Enabled
1,565,361,302 UART: [art] Extend RT PCRs Done
1,565,361,730 UART: [art] Lock RT PCRs Done
1,565,363,019 UART: [art] Populate DV Done
1,565,371,322 UART: [fht] FMC Alias Private Key: 7
1,565,372,472 UART: [art] Derive CDI
1,565,372,752 UART: [art] Store in in slot 0x4
1,565,458,559 UART: [art] Derive Key Pair
1,565,458,919 UART: [art] Store priv key in slot 0x5
1,565,472,137 UART: [art] Derive Key Pair - Done
1,565,486,948 UART: [art] Signing Cert with AUTHO
1,565,487,428 UART: RITY.KEYID = 7
1,565,502,200 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,502,965 UART: [art] PUB.X = B4A5A501F552640A6B8166847BB12672027D0739C03B78D5C28C0383E2E5004FF48EDEB880EDFCF44909D22FB5335DF3
1,565,509,697 UART: [art] PUB.Y = 354E8F5F9BB010DDCA31420FF2B5C114AE12193B84C1A781BE41604E588D32C2B3F7FB6E96B18DB3908CDA21DD270519
1,565,516,651 UART: [art] SIG.R = E4DAAB534D42EA332C50834D9FA15EB790C2DAC9F33F0C86143D1B3EBB5F8B4E7C384F0E871206185148E78D4F9C4D64
1,565,523,424 UART: [art] SIG.S = 5A88F51B666D1955D5CC26A416674F786382A8D25FDAF630D89BB8FE0800F484551C3D5568E0F632E13A7C88BB447216
1,565,547,414 UART: Caliptra RT
1,565,547,759 UART: [state] CFI Enabled
1,565,827,836 UART: [rt] RT listening for mailbox commands...
1,565,828,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,565,829,259 UART:
1,565,829,275 UART: Running Caliptra ROM ...
1,565,829,683 UART:
1,565,829,825 UART: [state] CFI Enabled
1,565,832,725 UART: [state] LifecycleState = Unprovisioned
1,565,833,380 UART: [state] DebugLocked = No
1,565,834,098 UART: [state] WD Timer not started. Device not locked for debugging
1,565,835,404 UART: [kat] SHA2-256
1,566,641,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,566,645,179 UART: [kat] ++
1,566,645,331 UART: [kat] sha1
1,566,649,575 UART: [kat] SHA2-256
1,566,651,515 UART: [kat] SHA2-384
1,566,654,086 UART: [kat] SHA2-512-ACC
1,566,655,986 UART: [kat] ECC-384
1,566,665,427 UART: [kat] HMAC-384Kdf
1,566,670,091 UART: [kat] LMS
1,566,918,419 UART: [kat] --
1,566,919,315 UART: [update-reset] ++
1,568,232,072 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,568,233,111 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,568,383,109 >>> mbox cmd response: success
1,568,383,238 UART: [update-reset] Copying MAN_2 To MAN_1
1,568,391,252 UART: [update-reset Success] --
1,568,392,209 UART: [state] Locking Datavault
1,568,393,003 UART: [state] Locking PCR0, PCR1 and PCR31
1,568,393,607 UART: [state] Locking ICCM
1,568,394,231 UART: [exit] Launching FMC @ 0x40000130
1,568,399,560 UART:
1,568,399,576 UART: Running Caliptra FMC ...
1,568,399,984 UART:
1,568,400,127 UART: [state] CFI Enabled
1,568,489,298 UART: [art] Extend RT PCRs Done
1,568,489,726 UART: [art] Lock RT PCRs Done
1,568,491,197 UART: [art] Populate DV Done
1,568,499,260 UART: [fht] FMC Alias Private Key: 7
1,568,500,262 UART: [art] Derive CDI
1,568,500,542 UART: [art] Store in in slot 0x4
1,568,586,335 UART: [art] Derive Key Pair
1,568,586,695 UART: [art] Store priv key in slot 0x5
1,568,599,865 UART: [art] Derive Key Pair - Done
1,568,614,471 UART: [art] Signing Cert with AUTHO
1,568,614,951 UART: RITY.KEYID = 7
1,568,629,751 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,630,516 UART: [art] PUB.X = 98C1EF67A603901E5E443B549B3CDCD1E214E1823E98DDB70B09E67B0046DFABBF5FFFD17DA365C2712FE072CD230944
1,568,637,266 UART: [art] PUB.Y = 3CE644E483C4976164AEF12A423036510402FB36BEAA43E3B7A88B62BB90E0249919C45CE62D22CAA30DE19FD9E23384
1,568,644,211 UART: [art] SIG.R = B946D8AF5D3A8A44B29BA647AE8055430D3D320648DE9F2E992392A8C4FEE34D1C8AE00D6024F76FA28F596471B03A88
1,568,650,978 UART: [art] SIG.S = FC11B809FC4C589251650AC790AD2D3C228BBAB9AC3C1FB6C39ABF4363DA7ECA05D6FC039471ACFFADF68035A1CDAE24
1,568,675,251 UART: Caliptra RT
1,568,675,596 UART: [state] CFI Enabled
1,568,959,460 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 318.51s
Truncated 733356 bytes from beginning
0 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,487,468,108 >>> mbox cmd response: success
1,487,481,112 UART:
1,487,481,128 UART: Running Caliptra FMC ...
1,487,481,536 UART:
1,487,481,679 UART: [state] CFI Enabled
1,487,570,932 UART: [art] Extend RT PCRs Done
1,487,571,360 UART: [art] Lock RT PCRs Done
1,487,572,689 UART: [art] Populate DV Done
1,487,580,936 UART: [fht] FMC Alias Private Key: 7
1,487,581,890 UART: [art] Derive CDI
1,487,582,170 UART: [art] Store in in slot 0x4
1,487,668,019 UART: [art] Derive Key Pair
1,487,668,379 UART: [art] Store priv key in slot 0x5
1,487,681,879 UART: [art] Derive Key Pair - Done
1,487,696,590 UART: [art] Signing Cert with AUTHO
1,487,697,070 UART: RITY.KEYID = 7
1,487,712,186 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,712,951 UART: [art] PUB.X = 6A099CBAF68C2B3EEAAC56467C82AEF31B297065A2590E8A5C1330F3D65A3FF127926DACEFC4386F6F1747301C94B57D
1,487,719,727 UART: [art] PUB.Y = 6E98E24AD008E2D683EBA47C932A8D41B1D922A7BF5C4BB1A9828769FD7DDC8AE615C5578915669490718361CD1EC43F
1,487,726,680 UART: [art] SIG.R = A3FF7277A05E9C50C0B78F0EA652E29A06412FEF27A4810F76E5FA4444B1BFBF352108B5BA2265310EB4728E8F95730C
1,487,733,438 UART: [art] SIG.S = 37A5B5AB523418372B7A9584024F4791C91A16F9319833340460F465B7304C32DAB2FF92459E0FB327757E83E1FF56DF
1,487,757,272 UART: Caliptra RT
1,487,757,617 UART: [state] CFI Enabled
1,488,038,972 UART: [rt] RT listening for mailbox commands...
1,488,039,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,490,478,662 >>> mbox cmd response: success
1,490,492,042 UART:
1,490,492,058 UART: Running Caliptra FMC ...
1,490,492,466 UART:
1,490,492,609 UART: [state] CFI Enabled
1,490,581,498 UART: [art] Extend RT PCRs Done
1,490,581,926 UART: [art] Lock RT PCRs Done
1,490,583,293 UART: [art] Populate DV Done
1,490,591,474 UART: [fht] FMC Alias Private Key: 7
1,490,592,450 UART: [art] Derive CDI
1,490,592,730 UART: [art] Store in in slot 0x4
1,490,678,729 UART: [art] Derive Key Pair
1,490,679,089 UART: [art] Store priv key in slot 0x5
1,490,692,403 UART: [art] Derive Key Pair - Done
1,490,707,291 UART: [art] Signing Cert with AUTHO
1,490,707,771 UART: RITY.KEYID = 7
1,490,722,673 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,723,438 UART: [art] PUB.X = 6A96799230CFE3A2208F00E2FC21A64B47DB4F48207A97918F12282B078C747D988C879000AFDF548AF889AE2404F1D4
1,490,730,156 UART: [art] PUB.Y = 091F3517FE13C805D5AEC17EB08E73B4E558A2DD16B536DADF2A622F56A4AF0EDDF5A369C499D4994D3D7C09C1F8193B
1,490,737,110 UART: [art] SIG.R = E48EFB3582C5C71B5124EF6452CCC763532A4D218AE1BC93D1135458A69A22CC42AF265A9AE8E951BA1087F7AFAB0E86
1,490,743,889 UART: [art] SIG.S = A78D527AEAD5AB943CDCD00CE534311CBFD7344619F75368A8C98A4EED92602DE7302BA5569465A0A2BB7DCA58464BA5
1,490,767,539 UART: Caliptra RT
1,490,767,884 UART: [state] CFI Enabled
1,491,053,828 UART: [rt] RT listening for mailbox commands...
1,491,054,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,493,494,426 >>> mbox cmd response: success
1,493,507,724 UART:
1,493,507,740 UART: Running Caliptra FMC ...
1,493,508,148 UART:
1,493,508,291 UART: [state] CFI Enabled
1,493,597,844 UART: [art] Extend RT PCRs Done
1,493,598,272 UART: [art] Lock RT PCRs Done
1,493,599,595 UART: [art] Populate DV Done
1,493,607,892 UART: [fht] FMC Alias Private Key: 7
1,493,608,912 UART: [art] Derive CDI
1,493,609,192 UART: [art] Store in in slot 0x4
1,493,695,157 UART: [art] Derive Key Pair
1,493,695,517 UART: [art] Store priv key in slot 0x5
1,493,709,327 UART: [art] Derive Key Pair - Done
1,493,723,974 UART: [art] Signing Cert with AUTHO
1,493,724,454 UART: RITY.KEYID = 7
1,493,739,608 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,740,373 UART: [art] PUB.X = 6A099CBAF68C2B3EEAAC56467C82AEF31B297065A2590E8A5C1330F3D65A3FF127926DACEFC4386F6F1747301C94B57D
1,493,747,149 UART: [art] PUB.Y = 6E98E24AD008E2D683EBA47C932A8D41B1D922A7BF5C4BB1A9828769FD7DDC8AE615C5578915669490718361CD1EC43F
1,493,754,102 UART: [art] SIG.R = A3FF7277A05E9C50C0B78F0EA652E29A06412FEF27A4810F76E5FA4444B1BFBF352108B5BA2265310EB4728E8F95730C
1,493,760,860 UART: [art] SIG.S = 37A5B5AB523418372B7A9584024F4791C91A16F9319833340460F465B7304C32DAB2FF92459E0FB327757E83E1FF56DF
1,493,785,062 UART: Caliptra RT
1,493,785,407 UART: [state] CFI Enabled
1,494,070,362 UART: [rt] RT listening for mailbox commands...
1,494,071,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,496,511,758 >>> mbox cmd response: success
1,496,525,240 UART:
1,496,525,256 UART: Running Caliptra FMC ...
1,496,525,664 UART:
1,496,525,807 UART: [state] CFI Enabled
1,496,614,978 UART: [art] Extend RT PCRs Done
1,496,615,406 UART: [art] Lock RT PCRs Done
1,496,616,581 UART: [art] Populate DV Done
1,496,624,830 UART: [fht] FMC Alias Private Key: 7
1,496,625,794 UART: [art] Derive CDI
1,496,626,074 UART: [art] Store in in slot 0x4
1,496,711,901 UART: [art] Derive Key Pair
1,496,712,261 UART: [art] Store priv key in slot 0x5
1,496,725,665 UART: [art] Derive Key Pair - Done
1,496,740,639 UART: [art] Signing Cert with AUTHO
1,496,741,119 UART: RITY.KEYID = 7
1,496,756,353 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,757,118 UART: [art] PUB.X = 6A96799230CFE3A2208F00E2FC21A64B47DB4F48207A97918F12282B078C747D988C879000AFDF548AF889AE2404F1D4
1,496,763,836 UART: [art] PUB.Y = 091F3517FE13C805D5AEC17EB08E73B4E558A2DD16B536DADF2A622F56A4AF0EDDF5A369C499D4994D3D7C09C1F8193B
1,496,770,790 UART: [art] SIG.R = E48EFB3582C5C71B5124EF6452CCC763532A4D218AE1BC93D1135458A69A22CC42AF265A9AE8E951BA1087F7AFAB0E86
1,496,777,569 UART: [art] SIG.S = A78D527AEAD5AB943CDCD00CE534311CBFD7344619F75368A8C98A4EED92602DE7302BA5569465A0A2BB7DCA58464BA5
1,496,802,157 UART: Caliptra RT
1,496,802,502 UART: [state] CFI Enabled
1,497,082,902 UART: [rt] RT listening for mailbox commands...
1,497,083,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,499,522,810 >>> mbox cmd response: success
1,499,535,930 UART:
1,499,535,946 UART: Running Caliptra FMC ...
1,499,536,354 UART:
1,499,536,497 UART: [state] CFI Enabled
1,499,625,862 UART: [art] Extend RT PCRs Done
1,499,626,290 UART: [art] Lock RT PCRs Done
1,499,627,609 UART: [art] Populate DV Done
1,499,636,026 UART: [fht] FMC Alias Private Key: 7
1,499,636,986 UART: [art] Derive CDI
1,499,637,266 UART: [art] Store in in slot 0x4
1,499,722,943 UART: [art] Derive Key Pair
1,499,723,303 UART: [art] Store priv key in slot 0x5
1,499,737,383 UART: [art] Derive Key Pair - Done
1,499,752,464 UART: [art] Signing Cert with AUTHO
1,499,752,944 UART: RITY.KEYID = 7
1,499,768,112 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,768,877 UART: [art] PUB.X = 6A099CBAF68C2B3EEAAC56467C82AEF31B297065A2590E8A5C1330F3D65A3FF127926DACEFC4386F6F1747301C94B57D
1,499,775,653 UART: [art] PUB.Y = 6E98E24AD008E2D683EBA47C932A8D41B1D922A7BF5C4BB1A9828769FD7DDC8AE615C5578915669490718361CD1EC43F
1,499,782,606 UART: [art] SIG.R = A3FF7277A05E9C50C0B78F0EA652E29A06412FEF27A4810F76E5FA4444B1BFBF352108B5BA2265310EB4728E8F95730C
1,499,789,364 UART: [art] SIG.S = 37A5B5AB523418372B7A9584024F4791C91A16F9319833340460F465B7304C32DAB2FF92459E0FB327757E83E1FF56DF
1,499,813,234 UART: Caliptra RT
1,499,813,579 UART: [state] CFI Enabled
1,500,092,470 UART: [rt] RT listening for mailbox commands...
1,500,093,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,502,532,256 >>> mbox cmd response: success
1,502,545,306 UART:
1,502,545,322 UART: Running Caliptra FMC ...
1,502,545,730 UART:
1,502,545,873 UART: [state] CFI Enabled
1,502,634,442 UART: [art] Extend RT PCRs Done
1,502,634,870 UART: [art] Lock RT PCRs Done
1,502,636,335 UART: [art] Populate DV Done
1,502,644,580 UART: [fht] FMC Alias Private Key: 7
1,502,645,594 UART: [art] Derive CDI
1,502,645,874 UART: [art] Store in in slot 0x4
1,502,731,617 UART: [art] Derive Key Pair
1,502,731,977 UART: [art] Store priv key in slot 0x5
1,502,744,895 UART: [art] Derive Key Pair - Done
1,502,760,047 UART: [art] Signing Cert with AUTHO
1,502,760,527 UART: RITY.KEYID = 7
1,502,775,761 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,776,526 UART: [art] PUB.X = 6A96799230CFE3A2208F00E2FC21A64B47DB4F48207A97918F12282B078C747D988C879000AFDF548AF889AE2404F1D4
1,502,783,244 UART: [art] PUB.Y = 091F3517FE13C805D5AEC17EB08E73B4E558A2DD16B536DADF2A622F56A4AF0EDDF5A369C499D4994D3D7C09C1F8193B
1,502,790,198 UART: [art] SIG.R = E48EFB3582C5C71B5124EF6452CCC763532A4D218AE1BC93D1135458A69A22CC42AF265A9AE8E951BA1087F7AFAB0E86
1,502,796,977 UART: [art] SIG.S = A78D527AEAD5AB943CDCD00CE534311CBFD7344619F75368A8C98A4EED92602DE7302BA5569465A0A2BB7DCA58464BA5
1,502,820,031 UART: Caliptra RT
1,502,820,376 UART: [state] CFI Enabled
1,503,104,030 UART: [rt] RT listening for mailbox commands...
1,503,104,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,505,544,594 >>> mbox cmd response: success
1,505,558,218 UART:
1,505,558,234 UART: Running Caliptra FMC ...
1,505,558,642 UART:
1,505,558,785 UART: [state] CFI Enabled
1,505,647,832 UART: [art] Extend RT PCRs Done
1,505,648,260 UART: [art] Lock RT PCRs Done
1,505,649,693 UART: [art] Populate DV Done
1,505,657,970 UART: [fht] FMC Alias Private Key: 7
1,505,659,080 UART: [art] Derive CDI
1,505,659,360 UART: [art] Store in in slot 0x4
1,505,745,077 UART: [art] Derive Key Pair
1,505,745,437 UART: [art] Store priv key in slot 0x5
1,505,758,905 UART: [art] Derive Key Pair - Done
1,505,773,504 UART: [art] Signing Cert with AUTHO
1,505,773,984 UART: RITY.KEYID = 7
1,505,789,792 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,790,557 UART: [art] PUB.X = 6A099CBAF68C2B3EEAAC56467C82AEF31B297065A2590E8A5C1330F3D65A3FF127926DACEFC4386F6F1747301C94B57D
1,505,797,333 UART: [art] PUB.Y = 6E98E24AD008E2D683EBA47C932A8D41B1D922A7BF5C4BB1A9828769FD7DDC8AE615C5578915669490718361CD1EC43F
1,505,804,286 UART: [art] SIG.R = A3FF7277A05E9C50C0B78F0EA652E29A06412FEF27A4810F76E5FA4444B1BFBF352108B5BA2265310EB4728E8F95730C
1,505,811,044 UART: [art] SIG.S = 37A5B5AB523418372B7A9584024F4791C91A16F9319833340460F465B7304C32DAB2FF92459E0FB327757E83E1FF56DF
1,505,834,172 UART: Caliptra RT
1,505,834,517 UART: [state] CFI Enabled
1,506,116,140 UART: [rt] RT listening for mailbox commands...
1,506,116,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,508,556,628 >>> mbox cmd response: success
1,508,569,684 UART:
1,508,569,700 UART: Running Caliptra FMC ...
1,508,570,108 UART:
1,508,570,251 UART: [state] CFI Enabled
1,508,659,406 UART: [art] Extend RT PCRs Done
1,508,659,834 UART: [art] Lock RT PCRs Done
1,508,661,061 UART: [art] Populate DV Done
1,508,669,392 UART: [fht] FMC Alias Private Key: 7
1,508,670,508 UART: [art] Derive CDI
1,508,670,788 UART: [art] Store in in slot 0x4
1,508,756,189 UART: [art] Derive Key Pair
1,508,756,549 UART: [art] Store priv key in slot 0x5
1,508,769,903 UART: [art] Derive Key Pair - Done
1,508,784,855 UART: [art] Signing Cert with AUTHO
1,508,785,335 UART: RITY.KEYID = 7
1,508,800,439 UART: [art] Erasing AUTHORITY.KEYID = 7
1,508,801,204 UART: [art] PUB.X = 6A96799230CFE3A2208F00E2FC21A64B47DB4F48207A97918F12282B078C747D988C879000AFDF548AF889AE2404F1D4
1,508,807,922 UART: [art] PUB.Y = 091F3517FE13C805D5AEC17EB08E73B4E558A2DD16B536DADF2A622F56A4AF0EDDF5A369C499D4994D3D7C09C1F8193B
1,508,814,876 UART: [art] SIG.R = E48EFB3582C5C71B5124EF6452CCC763532A4D218AE1BC93D1135458A69A22CC42AF265A9AE8E951BA1087F7AFAB0E86
1,508,821,655 UART: [art] SIG.S = A78D527AEAD5AB943CDCD00CE534311CBFD7344619F75368A8C98A4EED92602DE7302BA5569465A0A2BB7DCA58464BA5
1,508,845,857 UART: Caliptra RT
1,508,846,202 UART: [state] CFI Enabled
1,509,126,644 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 309.80s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,204,862 UART: [fht] FMC Alias Private Key: 7
1,554,205,952 UART: [art] Derive CDI
1,554,206,232 UART: [art] Store in in slot 0x4
1,554,291,971 UART: [art] Derive Key Pair
1,554,292,331 UART: [art] Store priv key in slot 0x5
1,554,305,223 UART: [art] Derive Key Pair - Done
1,554,319,724 UART: [art] Signing Cert with AUTHO
1,554,320,204 UART: RITY.KEYID = 7
1,554,335,490 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,336,255 UART: [art] PUB.X = 6BE5FF77A20C7E4B278F85873DFDC63E4492EA3E78C232352754D75BD54D629679D8D4CCB4D53507154F8DFAA49CD8E6
1,554,343,029 UART: [art] PUB.Y = 44742C9091F6BC637EFBF94B9CFD7F6AAB898CA4F7F13DE10421F8CAE17CBB46A0AE7FC809E44E8348340AF860E4BD04
1,554,349,987 UART: [art] SIG.R = E89E3BD47DED251E799DD9090B3B905D4EA1C5BF3922BF21CBA0B45E873F6F774A18345CE7C2A47CD1613102C1B2EE40
1,554,356,762 UART: [art] SIG.S = 99764DDE1672E2A2351ACF263217D0B9258687F9CE0F55D6C53EE212AD3083504A5E967DDEE2C9FD249E159866F3E707
1,554,380,487 UART: Caliptra RT
1,554,380,740 UART: [state] CFI Enabled
1,554,659,648 UART: [rt] RT listening for mailbox commands...
1,554,660,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,554,661,305 UART:
1,554,661,321 UART: Running Caliptra ROM ...
1,554,661,729 UART:
1,554,661,784 UART: [state] CFI Enabled
1,554,664,850 UART: [state] LifecycleState = Unprovisioned
1,554,665,505 UART: [state] DebugLocked = No
1,554,666,117 UART: [state] WD Timer not started. Device not locked for debugging
1,554,667,269 UART: [kat] SHA2-256
1,555,470,819 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,555,474,948 UART: [kat] ++
1,555,475,100 UART: [kat] sha1
1,555,479,244 UART: [kat] SHA2-256
1,555,481,184 UART: [kat] SHA2-384
1,555,483,981 UART: [kat] SHA2-512-ACC
1,555,485,881 UART: [kat] ECC-384
1,555,495,504 UART: [kat] HMAC-384Kdf
1,555,500,156 UART: [kat] LMS
1,555,748,468 UART: [kat] --
1,555,749,152 UART: [update-reset] ++
1,557,062,562 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,557,063,657 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,557,213,655 >>> mbox cmd response: success
1,557,213,958 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,221,972 UART: [update-reset Success] --
1,557,223,033 UART: [state] Locking Datavault
1,557,223,695 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,224,299 UART: [state] Locking ICCM
1,557,224,925 UART: [exit] Launching FMC @ 0x40000130
1,557,230,254 UART:
1,557,230,270 UART: Running Caliptra FMC ...
1,557,230,678 UART:
1,557,230,732 UART: [state] CFI Enabled
1,557,320,231 UART: [art] Extend RT PCRs Done
1,557,320,659 UART: [art] Lock RT PCRs Done
1,557,321,690 UART: [art] Populate DV Done
1,557,329,867 UART: [fht] FMC Alias Private Key: 7
1,557,330,981 UART: [art] Derive CDI
1,557,331,261 UART: [art] Store in in slot 0x4
1,557,416,906 UART: [art] Derive Key Pair
1,557,417,266 UART: [art] Store priv key in slot 0x5
1,557,430,042 UART: [art] Derive Key Pair - Done
1,557,444,933 UART: [art] Signing Cert with AUTHO
1,557,445,413 UART: RITY.KEYID = 7
1,557,460,379 UART: [art] Erasing AUTHORITY.KEYID = 7
1,557,461,144 UART: [art] PUB.X = F5409DC913A9B90F68A7C9A007C84BD744C2795CA790EE3F1EF6E9684F8C9711DD601A71056039178D5B9C7AA3418E4D
1,557,467,909 UART: [art] PUB.Y = 356BCABA00B9D20C504487337015E2088E99A8AC7CB2505297950EFFC4E027FE801F304A7BB44EC6DDE0D267D82EC96C
1,557,474,838 UART: [art] SIG.R = D776790719BD3BFB420EBB641DA2BEBA7A317A81D9E19E9CD847122169A5DA3F7CF9FA3C1A6B664220F86546CE524187
1,557,481,612 UART: [art] SIG.S = A303D15F4551631501E91E7F6E03544895475BD33E0F442F193346101E03E512B85B5FE66260483BA4034BEC4FBD0FAD
1,557,505,128 UART: Caliptra RT
1,557,505,381 UART: [state] CFI Enabled
1,557,781,149 UART: [rt] RT listening for mailbox commands...
1,557,781,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,782,940 UART:
1,557,782,956 UART: Running Caliptra ROM ...
1,557,783,364 UART:
1,557,783,419 UART: [state] CFI Enabled
1,557,786,471 UART: [state] LifecycleState = Unprovisioned
1,557,787,126 UART: [state] DebugLocked = No
1,557,787,838 UART: [state] WD Timer not started. Device not locked for debugging
1,557,789,142 UART: [kat] SHA2-256
1,558,592,692 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,558,596,821 UART: [kat] ++
1,558,596,973 UART: [kat] sha1
1,558,601,123 UART: [kat] SHA2-256
1,558,603,063 UART: [kat] SHA2-384
1,558,605,758 UART: [kat] SHA2-512-ACC
1,558,607,658 UART: [kat] ECC-384
1,558,617,415 UART: [kat] HMAC-384Kdf
1,558,622,077 UART: [kat] LMS
1,558,870,389 UART: [kat] --
1,558,871,419 UART: [update-reset] ++
1,560,185,273 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,560,186,442 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,560,336,440 >>> mbox cmd response: success
1,560,336,729 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,344,743 UART: [update-reset Success] --
1,560,345,486 UART: [state] Locking Datavault
1,560,346,276 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,346,880 UART: [state] Locking ICCM
1,560,347,330 UART: [exit] Launching FMC @ 0x40000130
1,560,352,659 UART:
1,560,352,675 UART: Running Caliptra FMC ...
1,560,353,083 UART:
1,560,353,137 UART: [state] CFI Enabled
1,560,441,822 UART: [art] Extend RT PCRs Done
1,560,442,250 UART: [art] Lock RT PCRs Done
1,560,443,363 UART: [art] Populate DV Done
1,560,451,524 UART: [fht] FMC Alias Private Key: 7
1,560,452,492 UART: [art] Derive CDI
1,560,452,772 UART: [art] Store in in slot 0x4
1,560,538,687 UART: [art] Derive Key Pair
1,560,539,047 UART: [art] Store priv key in slot 0x5
1,560,552,031 UART: [art] Derive Key Pair - Done
1,560,566,518 UART: [art] Signing Cert with AUTHO
1,560,566,998 UART: RITY.KEYID = 7
1,560,582,426 UART: [art] Erasing AUTHORITY.KEYID = 7
1,560,583,191 UART: [art] PUB.X = 6BE5FF77A20C7E4B278F85873DFDC63E4492EA3E78C232352754D75BD54D629679D8D4CCB4D53507154F8DFAA49CD8E6
1,560,589,965 UART: [art] PUB.Y = 44742C9091F6BC637EFBF94B9CFD7F6AAB898CA4F7F13DE10421F8CAE17CBB46A0AE7FC809E44E8348340AF860E4BD04
1,560,596,923 UART: [art] SIG.R = E89E3BD47DED251E799DD9090B3B905D4EA1C5BF3922BF21CBA0B45E873F6F774A18345CE7C2A47CD1613102C1B2EE40
1,560,603,698 UART: [art] SIG.S = 99764DDE1672E2A2351ACF263217D0B9258687F9CE0F55D6C53EE212AD3083504A5E967DDEE2C9FD249E159866F3E707
1,560,627,161 UART: Caliptra RT
1,560,627,414 UART: [state] CFI Enabled
1,560,910,358 UART: [rt] RT listening for mailbox commands...
1,560,911,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,560,911,821 UART:
1,560,911,837 UART: Running Caliptra ROM ...
1,560,912,245 UART:
1,560,912,300 UART: [state] CFI Enabled
1,560,914,700 UART: [state] LifecycleState = Unprovisioned
1,560,915,355 UART: [state] DebugLocked = No
1,560,916,001 UART: [state] WD Timer not started. Device not locked for debugging
1,560,917,297 UART: [kat] SHA2-256
1,561,720,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,561,724,976 UART: [kat] ++
1,561,725,128 UART: [kat] sha1
1,561,729,342 UART: [kat] SHA2-256
1,561,731,282 UART: [kat] SHA2-384
1,561,734,025 UART: [kat] SHA2-512-ACC
1,561,735,925 UART: [kat] ECC-384
1,561,745,220 UART: [kat] HMAC-384Kdf
1,561,749,642 UART: [kat] LMS
1,561,997,954 UART: [kat] --
1,561,998,944 UART: [update-reset] ++
1,563,312,502 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,313,537 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,563,463,535 >>> mbox cmd response: success
1,563,463,860 UART: [update-reset] Copying MAN_2 To MAN_1
1,563,471,874 UART: [update-reset Success] --
1,563,473,035 UART: [state] Locking Datavault
1,563,473,995 UART: [state] Locking PCR0, PCR1 and PCR31
1,563,474,599 UART: [state] Locking ICCM
1,563,475,085 UART: [exit] Launching FMC @ 0x40000130
1,563,480,414 UART:
1,563,480,430 UART: Running Caliptra FMC ...
1,563,480,838 UART:
1,563,480,892 UART: [state] CFI Enabled
1,563,570,155 UART: [art] Extend RT PCRs Done
1,563,570,583 UART: [art] Lock RT PCRs Done
1,563,572,070 UART: [art] Populate DV Done
1,563,580,309 UART: [fht] FMC Alias Private Key: 7
1,563,581,263 UART: [art] Derive CDI
1,563,581,543 UART: [art] Store in in slot 0x4
1,563,667,016 UART: [art] Derive Key Pair
1,563,667,376 UART: [art] Store priv key in slot 0x5
1,563,680,684 UART: [art] Derive Key Pair - Done
1,563,695,257 UART: [art] Signing Cert with AUTHO
1,563,695,737 UART: RITY.KEYID = 7
1,563,710,493 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,711,258 UART: [art] PUB.X = F5409DC913A9B90F68A7C9A007C84BD744C2795CA790EE3F1EF6E9684F8C9711DD601A71056039178D5B9C7AA3418E4D
1,563,718,023 UART: [art] PUB.Y = 356BCABA00B9D20C504487337015E2088E99A8AC7CB2505297950EFFC4E027FE801F304A7BB44EC6DDE0D267D82EC96C
1,563,724,952 UART: [art] SIG.R = D776790719BD3BFB420EBB641DA2BEBA7A317A81D9E19E9CD847122169A5DA3F7CF9FA3C1A6B664220F86546CE524187
1,563,731,726 UART: [art] SIG.S = A303D15F4551631501E91E7F6E03544895475BD33E0F442F193346101E03E512B85B5FE66260483BA4034BEC4FBD0FAD
1,563,754,854 UART: Caliptra RT
1,563,755,107 UART: [state] CFI Enabled
1,564,035,645 UART: [rt] RT listening for mailbox commands...
1,564,036,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,564,037,194 UART:
1,564,037,210 UART: Running Caliptra ROM ...
1,564,037,618 UART:
1,564,037,673 UART: [state] CFI Enabled
1,564,040,413 UART: [state] LifecycleState = Unprovisioned
1,564,041,068 UART: [state] DebugLocked = No
1,564,041,674 UART: [state] WD Timer not started. Device not locked for debugging
1,564,042,954 UART: [kat] SHA2-256
1,564,846,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,564,850,633 UART: [kat] ++
1,564,850,785 UART: [kat] sha1
1,564,854,805 UART: [kat] SHA2-256
1,564,856,745 UART: [kat] SHA2-384
1,564,859,498 UART: [kat] SHA2-512-ACC
1,564,861,398 UART: [kat] ECC-384
1,564,870,821 UART: [kat] HMAC-384Kdf
1,564,875,329 UART: [kat] LMS
1,565,123,641 UART: [kat] --
1,565,124,815 UART: [update-reset] ++
1,566,438,027 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,566,439,194 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,566,589,192 >>> mbox cmd response: success
1,566,589,525 UART: [update-reset] Copying MAN_2 To MAN_1
1,566,597,539 UART: [update-reset Success] --
1,566,598,760 UART: [state] Locking Datavault
1,566,599,546 UART: [state] Locking PCR0, PCR1 and PCR31
1,566,600,150 UART: [state] Locking ICCM
1,566,600,714 UART: [exit] Launching FMC @ 0x40000130
1,566,606,043 UART:
1,566,606,059 UART: Running Caliptra FMC ...
1,566,606,467 UART:
1,566,606,521 UART: [state] CFI Enabled
1,566,695,450 UART: [art] Extend RT PCRs Done
1,566,695,878 UART: [art] Lock RT PCRs Done
1,566,696,783 UART: [art] Populate DV Done
1,566,704,786 UART: [fht] FMC Alias Private Key: 7
1,566,705,870 UART: [art] Derive CDI
1,566,706,150 UART: [art] Store in in slot 0x4
1,566,791,663 UART: [art] Derive Key Pair
1,566,792,023 UART: [art] Store priv key in slot 0x5
1,566,805,127 UART: [art] Derive Key Pair - Done
1,566,819,932 UART: [art] Signing Cert with AUTHO
1,566,820,412 UART: RITY.KEYID = 7
1,566,835,754 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,836,519 UART: [art] PUB.X = 6BE5FF77A20C7E4B278F85873DFDC63E4492EA3E78C232352754D75BD54D629679D8D4CCB4D53507154F8DFAA49CD8E6
1,566,843,293 UART: [art] PUB.Y = 44742C9091F6BC637EFBF94B9CFD7F6AAB898CA4F7F13DE10421F8CAE17CBB46A0AE7FC809E44E8348340AF860E4BD04
1,566,850,251 UART: [art] SIG.R = E89E3BD47DED251E799DD9090B3B905D4EA1C5BF3922BF21CBA0B45E873F6F774A18345CE7C2A47CD1613102C1B2EE40
1,566,857,026 UART: [art] SIG.S = 99764DDE1672E2A2351ACF263217D0B9258687F9CE0F55D6C53EE212AD3083504A5E967DDEE2C9FD249E159866F3E707
1,566,880,783 UART: Caliptra RT
1,566,881,036 UART: [state] CFI Enabled
1,567,165,640 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 316.34s
Truncated 733352 bytes from beginning
4 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,484,800,866 >>> mbox cmd response: success
1,484,813,988 UART:
1,484,814,004 UART: Running Caliptra FMC ...
1,484,814,412 UART:
1,484,814,466 UART: [state] CFI Enabled
1,484,903,631 UART: [art] Extend RT PCRs Done
1,484,904,059 UART: [art] Lock RT PCRs Done
1,484,905,106 UART: [art] Populate DV Done
1,484,913,407 UART: [fht] FMC Alias Private Key: 7
1,484,914,387 UART: [art] Derive CDI
1,484,914,667 UART: [art] Store in in slot 0x4
1,485,000,166 UART: [art] Derive Key Pair
1,485,000,526 UART: [art] Store priv key in slot 0x5
1,485,013,356 UART: [art] Derive Key Pair - Done
1,485,027,881 UART: [art] Signing Cert with AUTHO
1,485,028,361 UART: RITY.KEYID = 7
1,485,043,347 UART: [art] Erasing AUTHORITY.KEYID = 7
1,485,044,112 UART: [art] PUB.X = 8B27D588C4BE7CF853FAA520D29C1D8816CB442B9807AE85089C60DA9293BC2D173D7715B44A2947C2819AFF1C5BE26A
1,485,050,884 UART: [art] PUB.Y = 1AD3C8F3F3DDF49A98AF54024CF36B197CD4F0405C2C7EB3EFCC3752EF36884BBAF06C4D234B18C67962A8F05419813B
1,485,057,845 UART: [art] SIG.R = 7CDB6F2995E506310677C6A3B1BCF4EB6BA4F2B750EA77C418A4AF52F55E32939ED21D0829950202FE9AD6C48AA0CCF0
1,485,064,614 UART: [art] SIG.S = 855630D92441C13017CF6ECDFBD4CB972837BE4F100E47A1C0D91203FF36A74BA18083AF90C4D6E98119146BA03CD713
1,485,088,163 UART: Caliptra RT
1,485,088,416 UART: [state] CFI Enabled
1,485,369,417 UART: [rt] RT listening for mailbox commands...
1,485,370,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,487,805,697 >>> mbox cmd response: success
1,487,819,155 UART:
1,487,819,171 UART: Running Caliptra FMC ...
1,487,819,579 UART:
1,487,819,633 UART: [state] CFI Enabled
1,487,909,016 UART: [art] Extend RT PCRs Done
1,487,909,444 UART: [art] Lock RT PCRs Done
1,487,910,929 UART: [art] Populate DV Done
1,487,919,348 UART: [fht] FMC Alias Private Key: 7
1,487,920,336 UART: [art] Derive CDI
1,487,920,616 UART: [art] Store in in slot 0x4
1,488,006,333 UART: [art] Derive Key Pair
1,488,006,693 UART: [art] Store priv key in slot 0x5
1,488,020,099 UART: [art] Derive Key Pair - Done
1,488,034,498 UART: [art] Signing Cert with AUTHO
1,488,034,978 UART: RITY.KEYID = 7
1,488,049,762 UART: [art] Erasing AUTHORITY.KEYID = 7
1,488,050,527 UART: [art] PUB.X = 0B2E367F2AC727D23A22BFA311ADD64CA4A0267EEE94909DF4F8F8CB600375CC5E74B04BD65C6CD1796894D1C54E6728
1,488,057,303 UART: [art] PUB.Y = C0ED1C281D8B71D7153585A09AB57579D314E7608CB0E7DF16683D6FDA2FAE8D5B9957D8FD00972969111D0040D713B0
1,488,064,211 UART: [art] SIG.R = 6E34DCCD98EF39625CA1BEF16C24111E01150D8A28E27DCC53C8D9AFA7293166457C330CB13C9072B721DDF7AD7D9E65
1,488,070,984 UART: [art] SIG.S = 19E64547F8A1F97FD081DF168B72BCA28F08F81F98DC198762651A11D4A655757451BE1AB765F1C9A5B5A40F4487C87A
1,488,094,653 UART: Caliptra RT
1,488,094,906 UART: [state] CFI Enabled
1,488,380,791 UART: [rt] RT listening for mailbox commands...
1,488,381,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,490,815,373 >>> mbox cmd response: success
1,490,829,075 UART:
1,490,829,091 UART: Running Caliptra FMC ...
1,490,829,499 UART:
1,490,829,553 UART: [state] CFI Enabled
1,490,918,252 UART: [art] Extend RT PCRs Done
1,490,918,680 UART: [art] Lock RT PCRs Done
1,490,919,845 UART: [art] Populate DV Done
1,490,928,028 UART: [fht] FMC Alias Private Key: 7
1,490,929,168 UART: [art] Derive CDI
1,490,929,448 UART: [art] Store in in slot 0x4
1,491,015,219 UART: [art] Derive Key Pair
1,491,015,579 UART: [art] Store priv key in slot 0x5
1,491,028,757 UART: [art] Derive Key Pair - Done
1,491,043,834 UART: [art] Signing Cert with AUTHO
1,491,044,314 UART: RITY.KEYID = 7
1,491,059,670 UART: [art] Erasing AUTHORITY.KEYID = 7
1,491,060,435 UART: [art] PUB.X = 8B27D588C4BE7CF853FAA520D29C1D8816CB442B9807AE85089C60DA9293BC2D173D7715B44A2947C2819AFF1C5BE26A
1,491,067,207 UART: [art] PUB.Y = 1AD3C8F3F3DDF49A98AF54024CF36B197CD4F0405C2C7EB3EFCC3752EF36884BBAF06C4D234B18C67962A8F05419813B
1,491,074,168 UART: [art] SIG.R = 7CDB6F2995E506310677C6A3B1BCF4EB6BA4F2B750EA77C418A4AF52F55E32939ED21D0829950202FE9AD6C48AA0CCF0
1,491,080,937 UART: [art] SIG.S = 855630D92441C13017CF6ECDFBD4CB972837BE4F100E47A1C0D91203FF36A74BA18083AF90C4D6E98119146BA03CD713
1,491,104,534 UART: Caliptra RT
1,491,104,787 UART: [state] CFI Enabled
1,491,385,718 UART: [rt] RT listening for mailbox commands...
1,491,386,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,493,821,694 >>> mbox cmd response: success
1,493,835,156 UART:
1,493,835,172 UART: Running Caliptra FMC ...
1,493,835,580 UART:
1,493,835,634 UART: [state] CFI Enabled
1,493,924,789 UART: [art] Extend RT PCRs Done
1,493,925,217 UART: [art] Lock RT PCRs Done
1,493,926,338 UART: [art] Populate DV Done
1,493,934,491 UART: [fht] FMC Alias Private Key: 7
1,493,935,503 UART: [art] Derive CDI
1,493,935,783 UART: [art] Store in in slot 0x4
1,494,021,606 UART: [art] Derive Key Pair
1,494,021,966 UART: [art] Store priv key in slot 0x5
1,494,035,238 UART: [art] Derive Key Pair - Done
1,494,050,231 UART: [art] Signing Cert with AUTHO
1,494,050,711 UART: RITY.KEYID = 7
1,494,065,857 UART: [art] Erasing AUTHORITY.KEYID = 7
1,494,066,622 UART: [art] PUB.X = 0B2E367F2AC727D23A22BFA311ADD64CA4A0267EEE94909DF4F8F8CB600375CC5E74B04BD65C6CD1796894D1C54E6728
1,494,073,398 UART: [art] PUB.Y = C0ED1C281D8B71D7153585A09AB57579D314E7608CB0E7DF16683D6FDA2FAE8D5B9957D8FD00972969111D0040D713B0
1,494,080,306 UART: [art] SIG.R = 6E34DCCD98EF39625CA1BEF16C24111E01150D8A28E27DCC53C8D9AFA7293166457C330CB13C9072B721DDF7AD7D9E65
1,494,087,079 UART: [art] SIG.S = 19E64547F8A1F97FD081DF168B72BCA28F08F81F98DC198762651A11D4A655757451BE1AB765F1C9A5B5A40F4487C87A
1,494,111,036 UART: Caliptra RT
1,494,111,289 UART: [state] CFI Enabled
1,494,392,424 UART: [rt] RT listening for mailbox commands...
1,494,393,094 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,496,829,156 >>> mbox cmd response: success
1,496,842,368 UART:
1,496,842,384 UART: Running Caliptra FMC ...
1,496,842,792 UART:
1,496,842,846 UART: [state] CFI Enabled
1,496,932,049 UART: [art] Extend RT PCRs Done
1,496,932,477 UART: [art] Lock RT PCRs Done
1,496,933,710 UART: [art] Populate DV Done
1,496,941,873 UART: [fht] FMC Alias Private Key: 7
1,496,942,949 UART: [art] Derive CDI
1,496,943,229 UART: [art] Store in in slot 0x4
1,497,029,054 UART: [art] Derive Key Pair
1,497,029,414 UART: [art] Store priv key in slot 0x5
1,497,042,634 UART: [art] Derive Key Pair - Done
1,497,057,435 UART: [art] Signing Cert with AUTHO
1,497,057,915 UART: RITY.KEYID = 7
1,497,072,799 UART: [art] Erasing AUTHORITY.KEYID = 7
1,497,073,564 UART: [art] PUB.X = 8B27D588C4BE7CF853FAA520D29C1D8816CB442B9807AE85089C60DA9293BC2D173D7715B44A2947C2819AFF1C5BE26A
1,497,080,336 UART: [art] PUB.Y = 1AD3C8F3F3DDF49A98AF54024CF36B197CD4F0405C2C7EB3EFCC3752EF36884BBAF06C4D234B18C67962A8F05419813B
1,497,087,297 UART: [art] SIG.R = 7CDB6F2995E506310677C6A3B1BCF4EB6BA4F2B750EA77C418A4AF52F55E32939ED21D0829950202FE9AD6C48AA0CCF0
1,497,094,066 UART: [art] SIG.S = 855630D92441C13017CF6ECDFBD4CB972837BE4F100E47A1C0D91203FF36A74BA18083AF90C4D6E98119146BA03CD713
1,497,117,753 UART: Caliptra RT
1,497,118,006 UART: [state] CFI Enabled
1,497,399,525 UART: [rt] RT listening for mailbox commands...
1,497,400,195 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,499,836,243 >>> mbox cmd response: success
1,499,849,401 UART:
1,499,849,417 UART: Running Caliptra FMC ...
1,499,849,825 UART:
1,499,849,879 UART: [state] CFI Enabled
1,499,938,896 UART: [art] Extend RT PCRs Done
1,499,939,324 UART: [art] Lock RT PCRs Done
1,499,940,321 UART: [art] Populate DV Done
1,499,948,498 UART: [fht] FMC Alias Private Key: 7
1,499,949,666 UART: [art] Derive CDI
1,499,949,946 UART: [art] Store in in slot 0x4
1,500,034,837 UART: [art] Derive Key Pair
1,500,035,197 UART: [art] Store priv key in slot 0x5
1,500,047,903 UART: [art] Derive Key Pair - Done
1,500,062,432 UART: [art] Signing Cert with AUTHO
1,500,062,912 UART: RITY.KEYID = 7
1,500,077,988 UART: [art] Erasing AUTHORITY.KEYID = 7
1,500,078,753 UART: [art] PUB.X = 0B2E367F2AC727D23A22BFA311ADD64CA4A0267EEE94909DF4F8F8CB600375CC5E74B04BD65C6CD1796894D1C54E6728
1,500,085,529 UART: [art] PUB.Y = C0ED1C281D8B71D7153585A09AB57579D314E7608CB0E7DF16683D6FDA2FAE8D5B9957D8FD00972969111D0040D713B0
1,500,092,437 UART: [art] SIG.R = 6E34DCCD98EF39625CA1BEF16C24111E01150D8A28E27DCC53C8D9AFA7293166457C330CB13C9072B721DDF7AD7D9E65
1,500,099,210 UART: [art] SIG.S = 19E64547F8A1F97FD081DF168B72BCA28F08F81F98DC198762651A11D4A655757451BE1AB765F1C9A5B5A40F4487C87A
1,500,122,903 UART: Caliptra RT
1,500,123,156 UART: [state] CFI Enabled
1,500,405,853 UART: [rt] RT listening for mailbox commands...
1,500,406,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,502,841,569 >>> mbox cmd response: success
1,502,854,971 UART:
1,502,854,987 UART: Running Caliptra FMC ...
1,502,855,395 UART:
1,502,855,449 UART: [state] CFI Enabled
1,502,944,316 UART: [art] Extend RT PCRs Done
1,502,944,744 UART: [art] Lock RT PCRs Done
1,502,946,235 UART: [art] Populate DV Done
1,502,954,492 UART: [fht] FMC Alias Private Key: 7
1,502,955,614 UART: [art] Derive CDI
1,502,955,894 UART: [art] Store in in slot 0x4
1,503,041,689 UART: [art] Derive Key Pair
1,503,042,049 UART: [art] Store priv key in slot 0x5
1,503,055,649 UART: [art] Derive Key Pair - Done
1,503,070,702 UART: [art] Signing Cert with AUTHO
1,503,071,182 UART: RITY.KEYID = 7
1,503,086,238 UART: [art] Erasing AUTHORITY.KEYID = 7
1,503,087,003 UART: [art] PUB.X = 8B27D588C4BE7CF853FAA520D29C1D8816CB442B9807AE85089C60DA9293BC2D173D7715B44A2947C2819AFF1C5BE26A
1,503,093,775 UART: [art] PUB.Y = 1AD3C8F3F3DDF49A98AF54024CF36B197CD4F0405C2C7EB3EFCC3752EF36884BBAF06C4D234B18C67962A8F05419813B
1,503,100,736 UART: [art] SIG.R = 7CDB6F2995E506310677C6A3B1BCF4EB6BA4F2B750EA77C418A4AF52F55E32939ED21D0829950202FE9AD6C48AA0CCF0
1,503,107,505 UART: [art] SIG.S = 855630D92441C13017CF6ECDFBD4CB972837BE4F100E47A1C0D91203FF36A74BA18083AF90C4D6E98119146BA03CD713
1,503,131,710 UART: Caliptra RT
1,503,131,963 UART: [state] CFI Enabled
1,503,411,960 UART: [rt] RT listening for mailbox commands...
1,503,412,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,505,848,948 >>> mbox cmd response: success
1,505,862,322 UART:
1,505,862,338 UART: Running Caliptra FMC ...
1,505,862,746 UART:
1,505,862,800 UART: [state] CFI Enabled
1,505,952,115 UART: [art] Extend RT PCRs Done
1,505,952,543 UART: [art] Lock RT PCRs Done
1,505,953,654 UART: [art] Populate DV Done
1,505,961,693 UART: [fht] FMC Alias Private Key: 7
1,505,962,765 UART: [art] Derive CDI
1,505,963,045 UART: [art] Store in in slot 0x4
1,506,048,640 UART: [art] Derive Key Pair
1,506,049,000 UART: [art] Store priv key in slot 0x5
1,506,062,424 UART: [art] Derive Key Pair - Done
1,506,077,413 UART: [art] Signing Cert with AUTHO
1,506,077,893 UART: RITY.KEYID = 7
1,506,093,249 UART: [art] Erasing AUTHORITY.KEYID = 7
1,506,094,014 UART: [art] PUB.X = 0B2E367F2AC727D23A22BFA311ADD64CA4A0267EEE94909DF4F8F8CB600375CC5E74B04BD65C6CD1796894D1C54E6728
1,506,100,790 UART: [art] PUB.Y = C0ED1C281D8B71D7153585A09AB57579D314E7608CB0E7DF16683D6FDA2FAE8D5B9957D8FD00972969111D0040D713B0
1,506,107,698 UART: [art] SIG.R = 6E34DCCD98EF39625CA1BEF16C24111E01150D8A28E27DCC53C8D9AFA7293166457C330CB13C9072B721DDF7AD7D9E65
1,506,114,471 UART: [art] SIG.S = 19E64547F8A1F97FD081DF168B72BCA28F08F81F98DC198762651A11D4A655757451BE1AB765F1C9A5B5A40F4487C87A
1,506,137,784 UART: Caliptra RT
1,506,138,037 UART: [state] CFI Enabled
1,506,414,112 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 305.32s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,858,385 UART: [fht] FMC Alias Private Key: 7
1,554,859,329 UART: [art] Derive CDI
1,554,859,609 UART: [art] Store in in slot 0x4
1,554,945,414 UART: [art] Derive Key Pair
1,554,945,774 UART: [art] Store priv key in slot 0x5
1,554,959,282 UART: [art] Derive Key Pair - Done
1,554,973,552 UART: [art] Signing Cert with AUTHO
1,554,974,032 UART: RITY.KEYID = 7
1,554,989,338 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,990,103 UART: [art] PUB.X = 377F2C68FCAEA8545593A5375DEEABA2DE92AC1394ECD3BE3F9407379983B9D7395AC3B87E036E6591DAFDF5F9C13948
1,554,996,881 UART: [art] PUB.Y = 492702A2491F361B7B646DBB302E47E8B66314CFA069DB6CFEBC6A48B92060C56FE5C137568F387CB344A1FFB8867897
1,555,003,832 UART: [art] SIG.R = FEB060A21BD6F2BDAD8E2296B24278382A022812F6E2F4D4E7463BE007F25AF103FBBAB4513F37D5CC1D055BDCD8747F
1,555,010,606 UART: [art] SIG.S = 12FF17EAB0EE2535255C932E9A3E7F0C1B7002AC2CFF12B8A68FFA6FD78D251E8CE54FCBB6BB010209D534C06E96FCD0
1,555,033,992 UART: Caliptra RT
1,555,034,337 UART: [state] CFI Enabled
1,555,317,974 UART: [rt] RT listening for mailbox commands...
1,555,318,644 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,319,627 UART:
1,555,319,643 UART: Running Caliptra ROM ...
1,555,320,051 UART:
1,555,320,193 UART: [state] CFI Enabled
1,555,323,041 UART: [state] LifecycleState = Unprovisioned
1,555,323,696 UART: [state] DebugLocked = No
1,555,324,278 UART: [state] WD Timer not started. Device not locked for debugging
1,555,325,392 UART: [kat] SHA2-256
1,556,128,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,556,133,071 UART: [kat] ++
1,556,133,223 UART: [kat] sha1
1,556,137,327 UART: [kat] SHA2-256
1,556,139,267 UART: [kat] SHA2-384
1,556,141,998 UART: [kat] SHA2-512-ACC
1,556,143,898 UART: [kat] ECC-384
1,556,153,835 UART: [kat] HMAC-384Kdf
1,556,158,531 UART: [kat] LMS
1,556,406,843 UART: [kat] --
1,556,407,647 UART: [update-reset] ++
1,557,720,707 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,557,721,842 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,557,871,840 >>> mbox cmd response: success
1,557,872,071 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,880,085 UART: [update-reset Success] --
1,557,881,180 UART: [state] Locking Datavault
1,557,882,024 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,882,628 UART: [state] Locking ICCM
1,557,883,132 UART: [exit] Launching FMC @ 0x40000130
1,557,888,461 UART:
1,557,888,477 UART: Running Caliptra FMC ...
1,557,888,885 UART:
1,557,889,028 UART: [state] CFI Enabled
1,557,978,191 UART: [art] Extend RT PCRs Done
1,557,978,619 UART: [art] Lock RT PCRs Done
1,557,979,568 UART: [art] Populate DV Done
1,557,987,917 UART: [fht] FMC Alias Private Key: 7
1,557,989,001 UART: [art] Derive CDI
1,557,989,281 UART: [art] Store in in slot 0x4
1,558,074,644 UART: [art] Derive Key Pair
1,558,075,004 UART: [art] Store priv key in slot 0x5
1,558,088,348 UART: [art] Derive Key Pair - Done
1,558,102,887 UART: [art] Signing Cert with AUTHO
1,558,103,367 UART: RITY.KEYID = 7
1,558,118,717 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,119,482 UART: [art] PUB.X = 351CE5BBCD51730B22F9B82EFF91B1682FA4898418A6D33EF484A7CC4250B50603E0701015AD3E860E1C49236E5F120C
1,558,126,239 UART: [art] PUB.Y = FE5D7BBAA0A82126D7E4F0F663081C9B55903E7A764154FC2BC7B6B77C4B9A78C2741474947AD63DB03FE1A1BB325E58
1,558,133,196 UART: [art] SIG.R = 35AC0D4098CDEBA843E14ABB8D84E05FDE6AE34D7E71C7517C19A4C8054B5216ED3816533D05ED5D8522FD4572A36CFA
1,558,139,971 UART: [art] SIG.S = E2644A82EF44FD5C1B1B23E8681F358DCEE7DDB5026EF2015083F692FC5F4BD117F782F811FA7968F6603707EBD67EAC
1,558,163,291 UART: Caliptra RT
1,558,163,636 UART: [state] CFI Enabled
1,558,445,773 UART: [rt] RT listening for mailbox commands...
1,558,446,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,558,447,190 UART:
1,558,447,206 UART: Running Caliptra ROM ...
1,558,447,614 UART:
1,558,447,756 UART: [state] CFI Enabled
1,558,450,432 UART: [state] LifecycleState = Unprovisioned
1,558,451,087 UART: [state] DebugLocked = No
1,558,451,667 UART: [state] WD Timer not started. Device not locked for debugging
1,558,452,887 UART: [kat] SHA2-256
1,559,256,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,559,260,566 UART: [kat] ++
1,559,260,718 UART: [kat] sha1
1,559,265,068 UART: [kat] SHA2-256
1,559,267,008 UART: [kat] SHA2-384
1,559,269,851 UART: [kat] SHA2-512-ACC
1,559,271,751 UART: [kat] ECC-384
1,559,281,832 UART: [kat] HMAC-384Kdf
1,559,286,372 UART: [kat] LMS
1,559,534,684 UART: [kat] --
1,559,535,480 UART: [update-reset] ++
1,560,849,416 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,560,850,481 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,561,000,479 >>> mbox cmd response: success
1,561,000,728 UART: [update-reset] Copying MAN_2 To MAN_1
1,561,008,742 UART: [update-reset Success] --
1,561,009,807 UART: [state] Locking Datavault
1,561,010,657 UART: [state] Locking PCR0, PCR1 and PCR31
1,561,011,261 UART: [state] Locking ICCM
1,561,011,839 UART: [exit] Launching FMC @ 0x40000130
1,561,017,168 UART:
1,561,017,184 UART: Running Caliptra FMC ...
1,561,017,592 UART:
1,561,017,735 UART: [state] CFI Enabled
1,561,106,222 UART: [art] Extend RT PCRs Done
1,561,106,650 UART: [art] Lock RT PCRs Done
1,561,107,711 UART: [art] Populate DV Done
1,561,116,094 UART: [fht] FMC Alias Private Key: 7
1,561,117,174 UART: [art] Derive CDI
1,561,117,454 UART: [art] Store in in slot 0x4
1,561,203,121 UART: [art] Derive Key Pair
1,561,203,481 UART: [art] Store priv key in slot 0x5
1,561,216,595 UART: [art] Derive Key Pair - Done
1,561,231,299 UART: [art] Signing Cert with AUTHO
1,561,231,779 UART: RITY.KEYID = 7
1,561,246,885 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,247,650 UART: [art] PUB.X = 377F2C68FCAEA8545593A5375DEEABA2DE92AC1394ECD3BE3F9407379983B9D7395AC3B87E036E6591DAFDF5F9C13948
1,561,254,428 UART: [art] PUB.Y = 492702A2491F361B7B646DBB302E47E8B66314CFA069DB6CFEBC6A48B92060C56FE5C137568F387CB344A1FFB8867897
1,561,261,379 UART: [art] SIG.R = FEB060A21BD6F2BDAD8E2296B24278382A022812F6E2F4D4E7463BE007F25AF103FBBAB4513F37D5CC1D055BDCD8747F
1,561,268,153 UART: [art] SIG.S = 12FF17EAB0EE2535255C932E9A3E7F0C1B7002AC2CFF12B8A68FFA6FD78D251E8CE54FCBB6BB010209D534C06E96FCD0
1,561,292,567 UART: Caliptra RT
1,561,292,912 UART: [state] CFI Enabled
1,561,577,861 UART: [rt] RT listening for mailbox commands...
1,561,578,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,561,579,290 UART:
1,561,579,306 UART: Running Caliptra ROM ...
1,561,579,714 UART:
1,561,579,856 UART: [state] CFI Enabled
1,561,582,460 UART: [state] LifecycleState = Unprovisioned
1,561,583,115 UART: [state] DebugLocked = No
1,561,583,717 UART: [state] WD Timer not started. Device not locked for debugging
1,561,584,829 UART: [kat] SHA2-256
1,562,388,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,562,392,508 UART: [kat] ++
1,562,392,660 UART: [kat] sha1
1,562,396,778 UART: [kat] SHA2-256
1,562,398,718 UART: [kat] SHA2-384
1,562,401,513 UART: [kat] SHA2-512-ACC
1,562,403,413 UART: [kat] ECC-384
1,562,413,134 UART: [kat] HMAC-384Kdf
1,562,417,724 UART: [kat] LMS
1,562,666,036 UART: [kat] --
1,562,666,850 UART: [update-reset] ++
1,563,980,102 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,981,219 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,564,131,217 >>> mbox cmd response: success
1,564,131,510 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,139,524 UART: [update-reset Success] --
1,564,140,499 UART: [state] Locking Datavault
1,564,141,199 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,141,803 UART: [state] Locking ICCM
1,564,142,343 UART: [exit] Launching FMC @ 0x40000130
1,564,147,672 UART:
1,564,147,688 UART: Running Caliptra FMC ...
1,564,148,096 UART:
1,564,148,239 UART: [state] CFI Enabled
1,564,237,160 UART: [art] Extend RT PCRs Done
1,564,237,588 UART: [art] Lock RT PCRs Done
1,564,238,767 UART: [art] Populate DV Done
1,564,247,098 UART: [fht] FMC Alias Private Key: 7
1,564,248,212 UART: [art] Derive CDI
1,564,248,492 UART: [art] Store in in slot 0x4
1,564,334,375 UART: [art] Derive Key Pair
1,564,334,735 UART: [art] Store priv key in slot 0x5
1,564,348,035 UART: [art] Derive Key Pair - Done
1,564,362,908 UART: [art] Signing Cert with AUTHO
1,564,363,388 UART: RITY.KEYID = 7
1,564,378,488 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,379,253 UART: [art] PUB.X = 351CE5BBCD51730B22F9B82EFF91B1682FA4898418A6D33EF484A7CC4250B50603E0701015AD3E860E1C49236E5F120C
1,564,386,010 UART: [art] PUB.Y = FE5D7BBAA0A82126D7E4F0F663081C9B55903E7A764154FC2BC7B6B77C4B9A78C2741474947AD63DB03FE1A1BB325E58
1,564,392,967 UART: [art] SIG.R = 35AC0D4098CDEBA843E14ABB8D84E05FDE6AE34D7E71C7517C19A4C8054B5216ED3816533D05ED5D8522FD4572A36CFA
1,564,399,742 UART: [art] SIG.S = E2644A82EF44FD5C1B1B23E8681F358DCEE7DDB5026EF2015083F692FC5F4BD117F782F811FA7968F6603707EBD67EAC
1,564,423,668 UART: Caliptra RT
1,564,424,013 UART: [state] CFI Enabled
1,564,705,166 UART: [rt] RT listening for mailbox commands...
1,564,705,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,564,707,075 UART:
1,564,707,091 UART: Running Caliptra ROM ...
1,564,707,499 UART:
1,564,707,641 UART: [state] CFI Enabled
1,564,710,451 UART: [state] LifecycleState = Unprovisioned
1,564,711,106 UART: [state] DebugLocked = No
1,564,711,626 UART: [state] WD Timer not started. Device not locked for debugging
1,564,712,772 UART: [kat] SHA2-256
1,565,516,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,565,520,451 UART: [kat] ++
1,565,520,603 UART: [kat] sha1
1,565,524,651 UART: [kat] SHA2-256
1,565,526,591 UART: [kat] SHA2-384
1,565,529,302 UART: [kat] SHA2-512-ACC
1,565,531,202 UART: [kat] ECC-384
1,565,540,813 UART: [kat] HMAC-384Kdf
1,565,545,589 UART: [kat] LMS
1,565,793,901 UART: [kat] --
1,565,794,729 UART: [update-reset] ++
1,567,109,621 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,567,110,720 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
1,567,260,718 >>> mbox cmd response: success
1,567,260,843 UART: [update-reset] Copying MAN_2 To MAN_1
1,567,268,857 UART: [update-reset Success] --
1,567,269,954 UART: [state] Locking Datavault
1,567,270,780 UART: [state] Locking PCR0, PCR1 and PCR31
1,567,271,384 UART: [state] Locking ICCM
1,567,271,964 UART: [exit] Launching FMC @ 0x40000130
1,567,277,293 UART:
1,567,277,309 UART: Running Caliptra FMC ...
1,567,277,717 UART:
1,567,277,860 UART: [state] CFI Enabled
1,567,366,773 UART: [art] Extend RT PCRs Done
1,567,367,201 UART: [art] Lock RT PCRs Done
1,567,368,476 UART: [art] Populate DV Done
1,567,376,791 UART: [fht] FMC Alias Private Key: 7
1,567,377,735 UART: [art] Derive CDI
1,567,378,015 UART: [art] Store in in slot 0x4
1,567,463,202 UART: [art] Derive Key Pair
1,567,463,562 UART: [art] Store priv key in slot 0x5
1,567,477,426 UART: [art] Derive Key Pair - Done
1,567,492,498 UART: [art] Signing Cert with AUTHO
1,567,492,978 UART: RITY.KEYID = 7
1,567,508,344 UART: [art] Erasing AUTHORITY.KEYID = 7
1,567,509,109 UART: [art] PUB.X = 377F2C68FCAEA8545593A5375DEEABA2DE92AC1394ECD3BE3F9407379983B9D7395AC3B87E036E6591DAFDF5F9C13948
1,567,515,887 UART: [art] PUB.Y = 492702A2491F361B7B646DBB302E47E8B66314CFA069DB6CFEBC6A48B92060C56FE5C137568F387CB344A1FFB8867897
1,567,522,838 UART: [art] SIG.R = FEB060A21BD6F2BDAD8E2296B24278382A022812F6E2F4D4E7463BE007F25AF103FBBAB4513F37D5CC1D055BDCD8747F
1,567,529,612 UART: [art] SIG.S = 12FF17EAB0EE2535255C932E9A3E7F0C1B7002AC2CFF12B8A68FFA6FD78D251E8CE54FCBB6BB010209D534C06E96FCD0
1,567,553,494 UART: Caliptra RT
1,567,553,839 UART: [state] CFI Enabled
1,567,840,452 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 326.51s
Truncated 733352 bytes from beginning
9 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,485,286,124 >>> mbox cmd response: success
1,485,299,538 UART:
1,485,299,554 UART: Running Caliptra FMC ...
1,485,299,962 UART:
1,485,300,105 UART: [state] CFI Enabled
1,485,389,440 UART: [art] Extend RT PCRs Done
1,485,389,868 UART: [art] Lock RT PCRs Done
1,485,391,339 UART: [art] Populate DV Done
1,485,399,396 UART: [fht] FMC Alias Private Key: 7
1,485,400,374 UART: [art] Derive CDI
1,485,400,654 UART: [art] Store in in slot 0x4
1,485,486,041 UART: [art] Derive Key Pair
1,485,486,401 UART: [art] Store priv key in slot 0x5
1,485,499,567 UART: [art] Derive Key Pair - Done
1,485,514,095 UART: [art] Signing Cert with AUTHO
1,485,514,575 UART: RITY.KEYID = 7
1,485,530,031 UART: [art] Erasing AUTHORITY.KEYID = 7
1,485,530,796 UART: [art] PUB.X = E2DD5667FF7976AD31B307E524C09CCD34856A6387E0C7B9302EE5BCBA7C5C639E1EE8167844069DF9BC73E5C3CF3BE1
1,485,537,574 UART: [art] PUB.Y = CC831193D1CF4CD490AEC11F99FA6CA1D44B52AA248D2C8343D334DF1D64F3BC92DEC568F9EC5E22D276D828CF591137
1,485,544,540 UART: [art] SIG.R = E6AC4E76A1B7135E68594836CE5F22EADD76F2876FEB072D90008ED92B5700CC5F904103034806B49FF9DA57F5A4E74C
1,485,551,260 UART: [art] SIG.S = 75E15742C9A5C004D76A71FAC3EA46256C7D9C4741785FCF1AA01C74F9638C72DFE2BD011B7B2A82E6DA7064292EEAC7
1,485,575,601 UART: Caliptra RT
1,485,575,946 UART: [state] CFI Enabled
1,485,854,157 UART: [rt] RT listening for mailbox commands...
1,485,854,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,488,290,186 >>> mbox cmd response: success
1,488,303,282 UART:
1,488,303,298 UART: Running Caliptra FMC ...
1,488,303,706 UART:
1,488,303,849 UART: [state] CFI Enabled
1,488,393,108 UART: [art] Extend RT PCRs Done
1,488,393,536 UART: [art] Lock RT PCRs Done
1,488,394,851 UART: [art] Populate DV Done
1,488,402,982 UART: [fht] FMC Alias Private Key: 7
1,488,404,098 UART: [art] Derive CDI
1,488,404,378 UART: [art] Store in in slot 0x4
1,488,490,163 UART: [art] Derive Key Pair
1,488,490,523 UART: [art] Store priv key in slot 0x5
1,488,504,211 UART: [art] Derive Key Pair - Done
1,488,519,092 UART: [art] Signing Cert with AUTHO
1,488,519,572 UART: RITY.KEYID = 7
1,488,534,370 UART: [art] Erasing AUTHORITY.KEYID = 7
1,488,535,135 UART: [art] PUB.X = 181036948502C4AA63306050D9E4036972CAFA5C9C2A40FFD5ACEA8C3268DC1AF72910B94510C33307F7F5CD5429EFB3
1,488,541,900 UART: [art] PUB.Y = 8CB10251ABBA4E7B22B54E9AA7ABEEF26CCCD4C1731E161E64180495C6F52A7F22D62FE6872B787CD02013AD997AAE3D
1,488,548,862 UART: [art] SIG.R = 4CDE7CAC11C76F35A688AA2910F21A22318D8FDE9083B6465CE03600E471D4F2F004F10624175186C396F15590EE99A2
1,488,555,602 UART: [art] SIG.S = 804B7965ABDE208E59A591166C3B82A9B18CED0B86A23027269DD50F30B7B7114AA63960F342D336A0C44D379A924590
1,488,579,121 UART: Caliptra RT
1,488,579,466 UART: [state] CFI Enabled
1,488,860,749 UART: [rt] RT listening for mailbox commands...
1,488,861,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,491,297,486 >>> mbox cmd response: success
1,491,310,864 UART:
1,491,310,880 UART: Running Caliptra FMC ...
1,491,311,288 UART:
1,491,311,431 UART: [state] CFI Enabled
1,491,400,430 UART: [art] Extend RT PCRs Done
1,491,400,858 UART: [art] Lock RT PCRs Done
1,491,401,985 UART: [art] Populate DV Done
1,491,410,562 UART: [fht] FMC Alias Private Key: 7
1,491,411,744 UART: [art] Derive CDI
1,491,412,024 UART: [art] Store in in slot 0x4
1,491,498,095 UART: [art] Derive Key Pair
1,491,498,455 UART: [art] Store priv key in slot 0x5
1,491,512,149 UART: [art] Derive Key Pair - Done
1,491,526,671 UART: [art] Signing Cert with AUTHO
1,491,527,151 UART: RITY.KEYID = 7
1,491,542,369 UART: [art] Erasing AUTHORITY.KEYID = 7
1,491,543,134 UART: [art] PUB.X = E2DD5667FF7976AD31B307E524C09CCD34856A6387E0C7B9302EE5BCBA7C5C639E1EE8167844069DF9BC73E5C3CF3BE1
1,491,549,912 UART: [art] PUB.Y = CC831193D1CF4CD490AEC11F99FA6CA1D44B52AA248D2C8343D334DF1D64F3BC92DEC568F9EC5E22D276D828CF591137
1,491,556,878 UART: [art] SIG.R = E6AC4E76A1B7135E68594836CE5F22EADD76F2876FEB072D90008ED92B5700CC5F904103034806B49FF9DA57F5A4E74C
1,491,563,598 UART: [art] SIG.S = 75E15742C9A5C004D76A71FAC3EA46256C7D9C4741785FCF1AA01C74F9638C72DFE2BD011B7B2A82E6DA7064292EEAC7
1,491,587,545 UART: Caliptra RT
1,491,587,890 UART: [state] CFI Enabled
1,491,867,673 UART: [rt] RT listening for mailbox commands...
1,491,868,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,494,302,784 >>> mbox cmd response: success
1,494,316,090 UART:
1,494,316,106 UART: Running Caliptra FMC ...
1,494,316,514 UART:
1,494,316,657 UART: [state] CFI Enabled
1,494,405,522 UART: [art] Extend RT PCRs Done
1,494,405,950 UART: [art] Lock RT PCRs Done
1,494,407,161 UART: [art] Populate DV Done
1,494,415,112 UART: [fht] FMC Alias Private Key: 7
1,494,416,224 UART: [art] Derive CDI
1,494,416,504 UART: [art] Store in in slot 0x4
1,494,502,383 UART: [art] Derive Key Pair
1,494,502,743 UART: [art] Store priv key in slot 0x5
1,494,516,359 UART: [art] Derive Key Pair - Done
1,494,531,050 UART: [art] Signing Cert with AUTHO
1,494,531,530 UART: RITY.KEYID = 7
1,494,546,508 UART: [art] Erasing AUTHORITY.KEYID = 7
1,494,547,273 UART: [art] PUB.X = 181036948502C4AA63306050D9E4036972CAFA5C9C2A40FFD5ACEA8C3268DC1AF72910B94510C33307F7F5CD5429EFB3
1,494,554,038 UART: [art] PUB.Y = 8CB10251ABBA4E7B22B54E9AA7ABEEF26CCCD4C1731E161E64180495C6F52A7F22D62FE6872B787CD02013AD997AAE3D
1,494,561,000 UART: [art] SIG.R = 4CDE7CAC11C76F35A688AA2910F21A22318D8FDE9083B6465CE03600E471D4F2F004F10624175186C396F15590EE99A2
1,494,567,740 UART: [art] SIG.S = 804B7965ABDE208E59A591166C3B82A9B18CED0B86A23027269DD50F30B7B7114AA63960F342D336A0C44D379A924590
1,494,591,783 UART: Caliptra RT
1,494,592,128 UART: [state] CFI Enabled
1,494,875,055 UART: [rt] RT listening for mailbox commands...
1,494,875,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,497,309,496 >>> mbox cmd response: success
1,497,322,728 UART:
1,497,322,744 UART: Running Caliptra FMC ...
1,497,323,152 UART:
1,497,323,295 UART: [state] CFI Enabled
1,497,412,342 UART: [art] Extend RT PCRs Done
1,497,412,770 UART: [art] Lock RT PCRs Done
1,497,413,765 UART: [art] Populate DV Done
1,497,422,278 UART: [fht] FMC Alias Private Key: 7
1,497,423,402 UART: [art] Derive CDI
1,497,423,682 UART: [art] Store in in slot 0x4
1,497,509,589 UART: [art] Derive Key Pair
1,497,509,949 UART: [art] Store priv key in slot 0x5
1,497,523,131 UART: [art] Derive Key Pair - Done
1,497,537,991 UART: [art] Signing Cert with AUTHO
1,497,538,471 UART: RITY.KEYID = 7
1,497,553,887 UART: [art] Erasing AUTHORITY.KEYID = 7
1,497,554,652 UART: [art] PUB.X = E2DD5667FF7976AD31B307E524C09CCD34856A6387E0C7B9302EE5BCBA7C5C639E1EE8167844069DF9BC73E5C3CF3BE1
1,497,561,430 UART: [art] PUB.Y = CC831193D1CF4CD490AEC11F99FA6CA1D44B52AA248D2C8343D334DF1D64F3BC92DEC568F9EC5E22D276D828CF591137
1,497,568,396 UART: [art] SIG.R = E6AC4E76A1B7135E68594836CE5F22EADD76F2876FEB072D90008ED92B5700CC5F904103034806B49FF9DA57F5A4E74C
1,497,575,116 UART: [art] SIG.S = 75E15742C9A5C004D76A71FAC3EA46256C7D9C4741785FCF1AA01C74F9638C72DFE2BD011B7B2A82E6DA7064292EEAC7
1,497,598,517 UART: Caliptra RT
1,497,598,862 UART: [state] CFI Enabled
1,497,883,867 UART: [rt] RT listening for mailbox commands...
1,497,884,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,500,318,938 >>> mbox cmd response: success
1,500,332,332 UART:
1,500,332,348 UART: Running Caliptra FMC ...
1,500,332,756 UART:
1,500,332,899 UART: [state] CFI Enabled
1,500,421,682 UART: [art] Extend RT PCRs Done
1,500,422,110 UART: [art] Lock RT PCRs Done
1,500,423,245 UART: [art] Populate DV Done
1,500,431,738 UART: [fht] FMC Alias Private Key: 7
1,500,432,820 UART: [art] Derive CDI
1,500,433,100 UART: [art] Store in in slot 0x4
1,500,518,363 UART: [art] Derive Key Pair
1,500,518,723 UART: [art] Store priv key in slot 0x5
1,500,532,211 UART: [art] Derive Key Pair - Done
1,500,547,362 UART: [art] Signing Cert with AUTHO
1,500,547,842 UART: RITY.KEYID = 7
1,500,563,164 UART: [art] Erasing AUTHORITY.KEYID = 7
1,500,563,929 UART: [art] PUB.X = 181036948502C4AA63306050D9E4036972CAFA5C9C2A40FFD5ACEA8C3268DC1AF72910B94510C33307F7F5CD5429EFB3
1,500,570,694 UART: [art] PUB.Y = 8CB10251ABBA4E7B22B54E9AA7ABEEF26CCCD4C1731E161E64180495C6F52A7F22D62FE6872B787CD02013AD997AAE3D
1,500,577,656 UART: [art] SIG.R = 4CDE7CAC11C76F35A688AA2910F21A22318D8FDE9083B6465CE03600E471D4F2F004F10624175186C396F15590EE99A2
1,500,584,396 UART: [art] SIG.S = 804B7965ABDE208E59A591166C3B82A9B18CED0B86A23027269DD50F30B7B7114AA63960F342D336A0C44D379A924590
1,500,608,497 UART: Caliptra RT
1,500,608,842 UART: [state] CFI Enabled
1,500,890,255 UART: [rt] RT listening for mailbox commands...
1,500,890,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,503,325,590 >>> mbox cmd response: success
1,503,338,822 UART:
1,503,338,838 UART: Running Caliptra FMC ...
1,503,339,246 UART:
1,503,339,389 UART: [state] CFI Enabled
1,503,428,060 UART: [art] Extend RT PCRs Done
1,503,428,488 UART: [art] Lock RT PCRs Done
1,503,429,637 UART: [art] Populate DV Done
1,503,437,798 UART: [fht] FMC Alias Private Key: 7
1,503,438,806 UART: [art] Derive CDI
1,503,439,086 UART: [art] Store in in slot 0x4
1,503,524,841 UART: [art] Derive Key Pair
1,503,525,201 UART: [art] Store priv key in slot 0x5
1,503,538,541 UART: [art] Derive Key Pair - Done
1,503,553,653 UART: [art] Signing Cert with AUTHO
1,503,554,133 UART: RITY.KEYID = 7
1,503,569,617 UART: [art] Erasing AUTHORITY.KEYID = 7
1,503,570,382 UART: [art] PUB.X = E2DD5667FF7976AD31B307E524C09CCD34856A6387E0C7B9302EE5BCBA7C5C639E1EE8167844069DF9BC73E5C3CF3BE1
1,503,577,160 UART: [art] PUB.Y = CC831193D1CF4CD490AEC11F99FA6CA1D44B52AA248D2C8343D334DF1D64F3BC92DEC568F9EC5E22D276D828CF591137
1,503,584,126 UART: [art] SIG.R = E6AC4E76A1B7135E68594836CE5F22EADD76F2876FEB072D90008ED92B5700CC5F904103034806B49FF9DA57F5A4E74C
1,503,590,846 UART: [art] SIG.S = 75E15742C9A5C004D76A71FAC3EA46256C7D9C4741785FCF1AA01C74F9638C72DFE2BD011B7B2A82E6DA7064292EEAC7
1,503,614,825 UART: Caliptra RT
1,503,615,170 UART: [state] CFI Enabled
1,503,895,841 UART: [rt] RT listening for mailbox commands...
1,503,896,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,506,332,172 >>> mbox cmd response: success
1,506,345,576 UART:
1,506,345,592 UART: Running Caliptra FMC ...
1,506,346,000 UART:
1,506,346,143 UART: [state] CFI Enabled
1,506,435,750 UART: [art] Extend RT PCRs Done
1,506,436,178 UART: [art] Lock RT PCRs Done
1,506,437,737 UART: [art] Populate DV Done
1,506,446,052 UART: [fht] FMC Alias Private Key: 7
1,506,447,170 UART: [art] Derive CDI
1,506,447,450 UART: [art] Store in in slot 0x4
1,506,533,059 UART: [art] Derive Key Pair
1,506,533,419 UART: [art] Store priv key in slot 0x5
1,506,546,679 UART: [art] Derive Key Pair - Done
1,506,561,382 UART: [art] Signing Cert with AUTHO
1,506,561,862 UART: RITY.KEYID = 7
1,506,576,882 UART: [art] Erasing AUTHORITY.KEYID = 7
1,506,577,647 UART: [art] PUB.X = 181036948502C4AA63306050D9E4036972CAFA5C9C2A40FFD5ACEA8C3268DC1AF72910B94510C33307F7F5CD5429EFB3
1,506,584,412 UART: [art] PUB.Y = 8CB10251ABBA4E7B22B54E9AA7ABEEF26CCCD4C1731E161E64180495C6F52A7F22D62FE6872B787CD02013AD997AAE3D
1,506,591,374 UART: [art] SIG.R = 4CDE7CAC11C76F35A688AA2910F21A22318D8FDE9083B6465CE03600E471D4F2F004F10624175186C396F15590EE99A2
1,506,598,114 UART: [art] SIG.S = 804B7965ABDE208E59A591166C3B82A9B18CED0B86A23027269DD50F30B7B7114AA63960F342D336A0C44D379A924590
1,506,621,951 UART: Caliptra RT
1,506,622,296 UART: [state] CFI Enabled
1,506,908,865 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 308.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,207 UART:
192,564 UART: Running Caliptra ROM ...
193,770 UART:
193,931 UART: [state] CFI Enabled
267,486 UART: [state] LifecycleState = Unprovisioned
269,422 UART: [state] DebugLocked = No
271,047 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,412 UART: [kat] SHA2-256
446,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,615 UART: [kat] ++
457,100 UART: [kat] sha1
467,807 UART: [kat] SHA2-256
470,544 UART: [kat] SHA2-384
475,685 UART: [kat] SHA2-512-ACC
478,050 UART: [kat] ECC-384
2,767,084 UART: [kat] HMAC-384Kdf
2,783,834 UART: [kat] LMS
3,974,097 UART: [kat] --
3,979,300 UART: [cold-reset] ++
3,980,623 UART: [fht] Storing FHT @ 0x50003400
3,993,400 UART: [idev] ++
3,993,968 UART: [idev] CDI.KEYID = 6
3,995,018 UART: [idev] SUBJECT.KEYID = 7
3,996,135 UART: [idev] UDS.KEYID = 0
3,997,289 ready_for_fw is high
3,997,523 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,141,153 UART: [idev] Erasing UDS.KEYID = 0
7,329,617 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,801 UART: [idev] --
7,356,255 UART: [ldev] ++
7,356,841 UART: [ldev] CDI.KEYID = 6
7,357,780 UART: [ldev] SUBJECT.KEYID = 5
7,358,995 UART: [ldev] AUTHORITY.KEYID = 7
7,360,226 UART: [ldev] FE.KEYID = 1
7,405,564 UART: [ldev] Erasing FE.KEYID = 1
10,755,409 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,126,640 UART: [ldev] --
13,132,013 UART: [fwproc] Waiting for Commands...
13,133,622 UART: [fwproc] Received command 0x46574c44
13,135,805 UART: [fwproc] Received Image of size 114124 bytes
17,191,133 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,132 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,045 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,652,637 >>> mbox cmd response: success
17,653,166 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,796,850 UART: [afmc] ++
17,797,508 UART: [afmc] CDI.KEYID = 6
17,798,430 UART: [afmc] SUBJECT.KEYID = 7
17,799,547 UART: [afmc] AUTHORITY.KEYID = 5
21,022,392 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,320,524 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,322,840 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,337,253 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,352,066 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,366,507 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,387,075 UART: [afmc] --
23,391,436 UART: [cold-reset] --
23,394,923 UART: [state] Locking Datavault
23,398,983 UART: [state] Locking PCR0, PCR1 and PCR31
23,400,750 UART: [state] Locking ICCM
23,403,283 UART: [exit] Launching FMC @ 0x40000130
23,411,688 UART:
23,411,924 UART: Running Caliptra FMC ...
23,413,031 UART:
23,413,198 UART: [state] CFI Enabled
23,482,398 UART: [fht] FMC Alias Private Key: 7
25,820,085 UART: [art] Extend RT PCRs Done
25,821,315 UART: [art] Lock RT PCRs Done
25,822,887 UART: [art] Populate DV Done
25,828,410 UART: [fht] FMC Alias Private Key: 7
25,829,953 UART: [art] Derive CDI
25,830,768 UART: [art] Store in in slot 0x4
25,893,461 UART: [art] Derive Key Pair
25,894,463 UART: [art] Store priv key in slot 0x5
29,187,164 UART: [art] Derive Key Pair - Done
29,200,003 UART: [art] Signing Cert with AUTHO
29,201,315 UART: RITY.KEYID = 7
31,487,985 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,500 UART: [art] PUB.X = 906B599124F712D9D38ABB4728F1D16D82630FAD16C695E4BC86D30851EF6FFDFB576DDE30CB6584ADEFA3EC6A25AFC1
31,496,935 UART: [art] PUB.Y = E6EB6F9147866618A7179D3AF5D4CDBFAE3F3347BB1CA579F5A4C472930037BD1514EC1C06D47CEAA4F1E62DC9177290
31,504,010 UART: [art] SIG.R = B5DC31D506CCED3947F0269AE994351984568647E8197BAE0944382DB24CC973983431A5F5B7E58F443255C85C6378FF
31,511,347 UART: [art] SIG.S = A7322CD2891B1FEBAD807AB2C7C64D757AF63C1CC6F0683DC2FC6F66262CC54138721441066C5B48CFE02927E24D3C92
32,816,113 UART: Caliptra RT
32,816,832 UART: [state] CFI Enabled
32,977,658 UART: [rt] RT listening for mailbox commands...
32,980,778 UART:
32,981,029 UART: Running Caliptra ROM ...
32,982,137 UART:
32,982,297 UART: [state] CFI Enabled
33,044,847 UART: [state] LifecycleState = Unprovisioned
33,046,784 UART: [state] DebugLocked = No
33,049,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,053,865 UART: [kat] SHA2-256
33,223,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,234,013 UART: [kat] ++
33,234,472 UART: [kat] sha1
33,244,386 UART: [kat] SHA2-256
33,247,071 UART: [kat] SHA2-384
33,252,537 UART: [kat] SHA2-512-ACC
33,254,940 UART: [kat] ECC-384
35,548,906 UART: [kat] HMAC-384Kdf
35,578,780 UART: [kat] LMS
36,769,134 UART: [kat] --
36,773,088 UART: [update-reset] ++
40,919,059 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,922,523 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
41,304,798 >>> mbox cmd response: success
41,305,851 UART: [update-reset] Copying MAN_2 To MAN_1
41,328,242 UART: [update-reset Success] --
41,332,902 UART: [state] Locking Datavault
41,335,875 UART: [state] Locking PCR0, PCR1 and PCR31
41,337,663 UART: [state] Locking ICCM
41,338,826 UART: [exit] Launching FMC @ 0x40000130
41,347,278 UART:
41,347,534 UART: Running Caliptra FMC ...
41,348,638 UART:
41,348,799 UART: [state] CFI Enabled
41,454,002 UART: [art] Extend RT PCRs Done
41,455,197 UART: [art] Lock RT PCRs Done
41,456,600 UART: [art] Populate DV Done
41,462,004 UART: [fht] FMC Alias Private Key: 7
41,463,552 UART: [art] Derive CDI
41,464,364 UART: [art] Store in in slot 0x4
41,522,872 UART: [art] Derive Key Pair
41,523,918 UART: [art] Store priv key in slot 0x5
44,816,240 UART: [art] Derive Key Pair - Done
44,829,396 UART: [art] Signing Cert with AUTHO
44,830,703 UART: RITY.KEYID = 7
47,117,715 UART: [art] Erasing AUTHORITY.KEYID = 7
47,119,220 UART: [art] PUB.X = 443778F6AABC79DA167B32F3C8FC6E8EC04AE13D79FC3E3E932DB5FDAAD91358C89DEFE5DD3CE1C62AAA98D8A25CF698
47,126,484 UART: [art] PUB.Y = C9B949A0680BBB451C9CD771118E47B43451E03C1898809E341A38EDEAECB68F9280C37663BA60BE67AFCAA417AC4B76
47,133,715 UART: [art] SIG.R = 8C3B765D5CE30A4D80D074D758E353A39493097589904E733E9D6D04BABFD89E786376ED0118FB9955A261D1ED3BEE59
47,141,109 UART: [art] SIG.S = 94A1EE0C7B29043B50CE5D5CC8843140C733F9BF5139B4ACC684E3193E7DFD88AED2CC4B1101D737A7B9AE4274169935
48,446,491 UART: Caliptra RT
48,447,202 UART: [state] CFI Enabled
48,802,375 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,808,056 ready_for_fw is high
3,808,710 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,872,821 >>> mbox cmd response: success
17,873,458 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,566,151 UART:
23,566,566 UART: Running Caliptra FMC ...
23,567,743 UART:
23,567,903 UART: [state] CFI Enabled
23,636,431 UART: [fht] FMC Alias Private Key: 7
25,974,597 UART: [art] Extend RT PCRs Done
25,975,823 UART: [art] Lock RT PCRs Done
25,977,560 UART: [art] Populate DV Done
25,982,932 UART: [fht] FMC Alias Private Key: 7
25,984,477 UART: [art] Derive CDI
25,985,289 UART: [art] Store in in slot 0x4
26,044,426 UART: [art] Derive Key Pair
26,045,470 UART: [art] Store priv key in slot 0x5
29,337,683 UART: [art] Derive Key Pair - Done
29,350,789 UART: [art] Signing Cert with AUTHO
29,352,094 UART: RITY.KEYID = 7
31,639,140 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,678 UART: [art] PUB.X = F836963E59159DB6AE4548E947748A765EA68EBF5C5E7680B255DBBC875F73DB4C08B95BD1E2D5EE8989CF7E06F5724D
31,647,893 UART: [art] PUB.Y = DC2E8C4964839544ED79349442D016484BB264EA1FC2310A02DE0F8440F40FFACE8F852E73E80CE152C361E54C4B59C1
31,655,129 UART: [art] SIG.R = AAC78D5BE2869ACBADC45742A5C5FEAE9D7255E20B6D79B21A2CAABC72C468E900DE180477C6F2A4121E41BA893E5255
31,662,551 UART: [art] SIG.S = CAD885DC2E833B6D5531FD7734D0BF03140CBAA81D60510D8469E770FB1133D87D91DE7F89F70C56FE5A8821A858A201
32,967,629 UART: Caliptra RT
32,968,355 UART: [state] CFI Enabled
33,128,953 UART: [rt] RT listening for mailbox commands...
41,724,227 >>> mbox cmd response: success
41,758,010 UART:
41,758,283 UART: Running Caliptra FMC ...
41,759,398 UART:
41,759,566 UART: [state] CFI Enabled
41,862,482 UART: [art] Extend RT PCRs Done
41,863,674 UART: [art] Lock RT PCRs Done
41,864,866 UART: [art] Populate DV Done
41,870,265 UART: [fht] FMC Alias Private Key: 7
41,871,935 UART: [art] Derive CDI
41,872,758 UART: [art] Store in in slot 0x4
41,931,367 UART: [art] Derive Key Pair
41,932,403 UART: [art] Store priv key in slot 0x5
45,225,118 UART: [art] Derive Key Pair - Done
45,238,278 UART: [art] Signing Cert with AUTHO
45,239,586 UART: RITY.KEYID = 7
47,526,789 UART: [art] Erasing AUTHORITY.KEYID = 7
47,528,530 UART: [art] PUB.X = 7757AB8FE72708E87677C2FA30C6E0668C0F44C9B0F5BE62E33AF28CBCDD270C5B05855A524A5DF2DFE6BAAA6A825E67
47,535,580 UART: [art] PUB.Y = F9A3C93885E88B8729B0E9BECD043867683D2A8F111C8BE02120756F303F9719771B184F2ED0CD81B53E1C372AE8BE91
47,542,847 UART: [art] SIG.R = 8028CB98B79011AD8CEE28EC8A42E2BE138BB2A9BF3CAE5CCACD76DE26B18AAA4A38B86D58C96FB70803B70C7B8A95FA
47,550,260 UART: [art] SIG.S = AEAF9D8697428A40023682347359CE21A82E7D240AE55198C699452293A5250870DD57D2F7A0E32A12EAF79FCE42ACBB
48,855,609 UART: Caliptra RT
48,856,302 UART: [state] CFI Enabled
49,204,829 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,941 writing to cptra_bootfsm_go
194,199 UART:
194,551 UART: Running Caliptra ROM ...
195,713 UART:
605,567 UART: [state] CFI Enabled
615,902 UART: [state] LifecycleState = Unprovisioned
617,795 UART: [state] DebugLocked = No
619,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,094 UART: [kat] SHA2-256
793,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,397 UART: [kat] ++
804,878 UART: [kat] sha1
816,026 UART: [kat] SHA2-256
818,682 UART: [kat] SHA2-384
824,949 UART: [kat] SHA2-512-ACC
827,331 UART: [kat] ECC-384
3,111,954 UART: [kat] HMAC-384Kdf
3,124,496 UART: [kat] LMS
4,314,637 UART: [kat] --
4,319,340 UART: [cold-reset] ++
4,321,505 UART: [fht] Storing FHT @ 0x50003400
4,332,379 UART: [idev] ++
4,332,952 UART: [idev] CDI.KEYID = 6
4,333,833 UART: [idev] SUBJECT.KEYID = 7
4,335,135 UART: [idev] UDS.KEYID = 0
4,336,299 ready_for_fw is high
4,336,540 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,831 UART: [idev] Erasing UDS.KEYID = 0
7,620,117 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,711 UART: [idev] --
7,644,509 UART: [ldev] ++
7,645,093 UART: [ldev] CDI.KEYID = 6
7,646,008 UART: [ldev] SUBJECT.KEYID = 5
7,647,218 UART: [ldev] AUTHORITY.KEYID = 7
7,648,495 UART: [ldev] FE.KEYID = 1
7,660,969 UART: [ldev] Erasing FE.KEYID = 1
10,949,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,702 UART: [ldev] --
13,309,966 UART: [fwproc] Waiting for Commands...
13,311,845 UART: [fwproc] Received command 0x46574c44
13,314,019 UART: [fwproc] Received Image of size 114124 bytes
17,360,878 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,858 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,733 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,822,734 >>> mbox cmd response: success
17,823,287 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,966,707 UART: [afmc] ++
17,967,351 UART: [afmc] CDI.KEYID = 6
17,968,237 UART: [afmc] SUBJECT.KEYID = 7
17,969,279 UART: [afmc] AUTHORITY.KEYID = 5
21,145,050 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,152 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,518 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,358 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,815 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,566 UART: [afmc] --
23,513,612 UART: [cold-reset] --
23,517,680 UART: [state] Locking Datavault
23,523,175 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,925 UART: [state] Locking ICCM
23,526,726 UART: [exit] Launching FMC @ 0x40000130
23,535,110 UART:
23,535,340 UART: Running Caliptra FMC ...
23,536,359 UART:
23,536,494 UART: [state] CFI Enabled
23,544,914 UART: [fht] FMC Alias Private Key: 7
25,875,570 UART: [art] Extend RT PCRs Done
25,876,790 UART: [art] Lock RT PCRs Done
25,878,095 UART: [art] Populate DV Done
25,883,237 UART: [fht] FMC Alias Private Key: 7
25,884,768 UART: [art] Derive CDI
25,885,527 UART: [art] Store in in slot 0x4
25,928,151 UART: [art] Derive Key Pair
25,929,192 UART: [art] Store priv key in slot 0x5
29,171,561 UART: [art] Derive Key Pair - Done
29,184,764 UART: [art] Signing Cert with AUTHO
29,186,058 UART: RITY.KEYID = 7
31,465,509 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,013 UART: [art] PUB.X = 8C32F1281DEC25CF6D3BF4E549500A8623EB24807A683839F0D83F65F6963087DAF378F9863D00CABC8393A57147ED98
31,474,260 UART: [art] PUB.Y = 7E8EC389DF981608B284D03467C131BFA2A36351F8A8ABE944918824C59B53525173200DD30D7A05235CB5048605BFFB
31,481,478 UART: [art] SIG.R = 989035C3B7C86F12EE02694B5F674B9236625962022DE69D53951233BCB4ABEB0138A469DD736760B5111B3187FA25EC
31,488,860 UART: [art] SIG.S = FCBF5724F726EE5A46AC0CC1D867F2A83A067DFA8A0E5FD4085674B59E0B871E83358EF101131654EAB0EE319A55AA84
32,793,634 UART: Caliptra RT
32,794,353 UART: [state] CFI Enabled
32,911,826 UART: [rt] RT listening for mailbox commands...
32,914,795 UART:
32,915,040 UART: Running Caliptra ROM ...
32,916,141 UART:
32,916,404 UART: [state] CFI Enabled
32,929,955 UART: [state] LifecycleState = Unprovisioned
32,931,859 UART: [state] DebugLocked = No
32,934,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,939,474 UART: [kat] SHA2-256
33,109,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,119,729 UART: [kat] ++
33,120,268 UART: [kat] sha1
33,130,239 UART: [kat] SHA2-256
33,132,968 UART: [kat] SHA2-384
33,140,255 UART: [kat] SHA2-512-ACC
33,142,598 UART: [kat] ECC-384
35,425,377 UART: [kat] HMAC-384Kdf
35,438,084 UART: [kat] LMS
36,628,148 UART: [kat] --
36,633,768 UART: [update-reset] ++
40,772,433 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,775,505 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
41,157,738 >>> mbox cmd response: success
41,159,762 UART: [update-reset] Copying MAN_2 To MAN_1
41,182,145 UART: [update-reset Success] --
41,187,347 UART: [state] Locking Datavault
41,189,567 UART: [state] Locking PCR0, PCR1 and PCR31
41,191,261 UART: [state] Locking ICCM
41,193,945 UART: [exit] Launching FMC @ 0x40000130
41,202,390 UART:
41,202,666 UART: Running Caliptra FMC ...
41,203,775 UART:
41,203,925 UART: [state] CFI Enabled
41,248,094 UART: [art] Extend RT PCRs Done
41,249,237 UART: [art] Lock RT PCRs Done
41,250,352 UART: [art] Populate DV Done
41,255,861 UART: [fht] FMC Alias Private Key: 7
41,257,495 UART: [art] Derive CDI
41,258,319 UART: [art] Store in in slot 0x4
41,300,869 UART: [art] Derive Key Pair
41,301,907 UART: [art] Store priv key in slot 0x5
44,544,002 UART: [art] Derive Key Pair - Done
44,557,007 UART: [art] Signing Cert with AUTHO
44,558,310 UART: RITY.KEYID = 7
46,837,399 UART: [art] Erasing AUTHORITY.KEYID = 7
46,838,906 UART: [art] PUB.X = 8EA615A20907CDC54D3E18639C0F510A056F79C374C43AFF46D6A33656E9029830D467967D01949D85C8915B04335305
46,846,156 UART: [art] PUB.Y = FF00421602C50BADFB6606769C9DF311269B1C4FAFAA9B9AAB2FF58A73FF67F4E37533C96E7DEEC66C9CA9F4B6DF7532
46,853,434 UART: [art] SIG.R = DA44ADE8FE4E3CF7E306C85ECB7D64733F413DFDD84BD65081DF6D7B682D8D18F2B246023E85875A614753F66531954D
46,860,818 UART: [art] SIG.S = BDCBC75FD5FDF76A1A4CCBD56BD27EA478B8B6B5832E67AB7C0A9E7C75BDC39C06BA754FF56E2109610CEE7B033CA285
48,165,782 UART: Caliptra RT
48,166,480 UART: [state] CFI Enabled
48,457,882 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
4,126,825 ready_for_fw is high
4,127,240 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,058,144 >>> mbox cmd response: success
18,059,122 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,700,094 UART:
23,700,511 UART: Running Caliptra FMC ...
23,701,642 UART:
23,701,791 UART: [state] CFI Enabled
23,709,577 UART: [fht] FMC Alias Private Key: 7
26,040,258 UART: [art] Extend RT PCRs Done
26,041,530 UART: [art] Lock RT PCRs Done
26,043,296 UART: [art] Populate DV Done
26,048,918 UART: [fht] FMC Alias Private Key: 7
26,050,516 UART: [art] Derive CDI
26,051,252 UART: [art] Store in in slot 0x4
26,093,742 UART: [art] Derive Key Pair
26,094,782 UART: [art] Store priv key in slot 0x5
29,336,733 UART: [art] Derive Key Pair - Done
29,349,949 UART: [art] Signing Cert with AUTHO
29,351,254 UART: RITY.KEYID = 7
31,630,868 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,375 UART: [art] PUB.X = 7107BFF1A8C5C290006E6F04581F0430749AB791806E7F71864B9CA219CBFD3A80F1C2AC631970CDCD004030A3B62133
31,639,578 UART: [art] PUB.Y = AEE3F4579B4F030427B760BC207240577F070FA3DF2B45B3D83440639BB074BC4033A5224057AA3D01A1D9C45192D6C4
31,646,844 UART: [art] SIG.R = 8C242F3204C67608102E062A233A42B5B7017DE7061EC452C4BBB876559523F82771CDB0E67A72D1490672E7AA3FA971
31,654,173 UART: [art] SIG.S = 20839935A51518D1DBFC493DA5D62C8FDDEC2C07BA95AB66FC471896BC62C65E5FDD0F913828C988354B756CD87B75EC
32,958,649 UART: Caliptra RT
32,959,363 UART: [state] CFI Enabled
33,077,295 UART: [rt] RT listening for mailbox commands...
41,594,540 >>> mbox cmd response: success
41,629,432 UART:
41,629,730 UART: Running Caliptra FMC ...
41,630,851 UART:
41,631,008 UART: [state] CFI Enabled
41,675,182 UART: [art] Extend RT PCRs Done
41,676,324 UART: [art] Lock RT PCRs Done
41,678,095 UART: [art] Populate DV Done
41,683,777 UART: [fht] FMC Alias Private Key: 7
41,685,492 UART: [art] Derive CDI
41,686,309 UART: [art] Store in in slot 0x4
41,728,844 UART: [art] Derive Key Pair
41,729,840 UART: [art] Store priv key in slot 0x5
44,971,262 UART: [art] Derive Key Pair - Done
44,984,366 UART: [art] Signing Cert with AUTHO
44,985,673 UART: RITY.KEYID = 7
47,265,478 UART: [art] Erasing AUTHORITY.KEYID = 7
47,266,981 UART: [art] PUB.X = 7A85BDC3624649406DCCD39CBA4FE6530D7178E64CB060F3D41E63F911DF8BB58453E9EDE9AA57D6B6871074D69AAC6C
47,274,223 UART: [art] PUB.Y = 24538EE7E648DFB340B10F153018C38AA0B26249FC0E15C648A6EAC10A359AABA1CE879143BD37501DE118E56B9CAB48
47,281,490 UART: [art] SIG.R = D9BA5FA65B1F805685AA6A177998A1F39A7638AA60A185C8A76DEA9A26CCB6DFC9AF679E408DAD0B18194BFFD59F6189
47,288,896 UART: [art] SIG.S = 21C77856171CA428351CCE372BA213FBBF6CC5AFAF70118F7AF54A15F691D7EF7CC5B6E25CE9E838DB6E4B04BBD585A0
48,593,942 UART: Caliptra RT
48,594,658 UART: [state] CFI Enabled
48,883,638 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,165 UART:
192,541 UART: Running Caliptra ROM ...
193,744 UART:
193,903 UART: [state] CFI Enabled
264,743 UART: [state] LifecycleState = Unprovisioned
266,587 UART: [state] DebugLocked = No
267,906 UART: [state] WD Timer not started. Device not locked for debugging
271,726 UART: [kat] SHA2-256
450,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,433 UART: [kat] ++
462,965 UART: [kat] sha1
473,581 UART: [kat] SHA2-256
476,667 UART: [kat] SHA2-384
482,442 UART: [kat] SHA2-512-ACC
485,374 UART: [kat] ECC-384
2,946,854 UART: [kat] HMAC-384Kdf
2,972,365 UART: [kat] LMS
3,501,830 UART: [kat] --
3,504,992 UART: [cold-reset] ++
3,505,934 UART: [fht] FHT @ 0x50003400
3,515,696 UART: [idev] ++
3,516,264 UART: [idev] CDI.KEYID = 6
3,517,194 UART: [idev] SUBJECT.KEYID = 7
3,518,369 UART: [idev] UDS.KEYID = 0
3,519,365 ready_for_fw is high
3,519,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,639 UART: [idev] Erasing UDS.KEYID = 0
6,029,380 UART: [idev] Sha1 KeyId Algorithm
6,051,920 UART: [idev] --
6,054,397 UART: [ldev] ++
6,054,968 UART: [ldev] CDI.KEYID = 6
6,055,885 UART: [ldev] SUBJECT.KEYID = 5
6,057,104 UART: [ldev] AUTHORITY.KEYID = 7
6,058,339 UART: [ldev] FE.KEYID = 1
6,102,803 UART: [ldev] Erasing FE.KEYID = 1
8,607,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,865 UART: [ldev] --
10,416,884 UART: [fwproc] Wait for Commands...
10,418,756 UART: [fwproc] Recv command 0x46574c44
10,420,813 UART: [fwproc] Recv'd Img size: 114448 bytes
13,825,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,285,753 >>> mbox cmd response: success
14,290,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,435,552 UART: [afmc] ++
14,436,207 UART: [afmc] CDI.KEYID = 6
14,437,105 UART: [afmc] SUBJECT.KEYID = 7
14,438,158 UART: [afmc] AUTHORITY.KEYID = 5
16,826,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,794 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,664 UART: [afmc] --
18,630,791 UART: [cold-reset] --
18,635,034 UART: [state] Locking Datavault
18,640,337 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,033 UART: [state] Locking ICCM
18,643,484 UART: [exit] Launching FMC @ 0x40000130
18,651,878 UART:
18,652,119 UART: Running Caliptra FMC ...
18,653,218 UART:
18,653,372 UART: [state] CFI Enabled
18,712,076 UART: [fht] FMC Alias Private Key: 7
20,476,237 UART: [art] Extend RT PCRs Done
20,477,480 UART: [art] Lock RT PCRs Done
20,479,054 UART: [art] Populate DV Done
20,484,411 UART: [fht] FMC Alias Private Key: 7
20,485,999 UART: [art] Derive CDI
20,486,813 UART: [art] Store in in slot 0x4
20,544,318 UART: [art] Derive Key Pair
20,545,353 UART: [art] Store priv key in slot 0x5
23,008,292 UART: [art] Derive Key Pair - Done
23,021,302 UART: [art] Signing Cert with AUTHO
23,022,611 UART: RITY.KEYID = 7
24,734,269 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,777 UART: [art] PUB.X = FE18B41F128A4091696D704510451D86EB20B706BEDDF6F3FBC419E93F52B4442AC5693C5B3D8452C6F01E89D1888D96
24,743,056 UART: [art] PUB.Y = 01DB9F4BA9A9F7DB7A90FCB3DCACE1C4D6A0FC11728049684351E0194332676A1FCF5F0B9F97108E90AAFD1F2509E256
24,750,310 UART: [art] SIG.R = A88F01BF68B29AB5507853A6F7A3D1A2B30A51A0A0359C76C9FE26ACEF34BB50D100F7C036B48185858CAFF603A51AB8
24,757,662 UART: [art] SIG.S = DC2B74CD5E760322052D6E49B70C73107C437F9C0F563C071BC186BDB172E33F5AB7A82E56856F44886EF7DD71C4CF26
25,737,021 UART: Caliptra RT
25,737,795 UART: [state] CFI Enabled
25,903,283 UART: [rt] RT listening for mailbox commands...
25,906,617 UART:
25,906,862 UART: Running Caliptra ROM ...
25,907,966 UART:
25,908,131 UART: [state] CFI Enabled
25,972,342 UART: [state] LifecycleState = Unprovisioned
25,974,212 UART: [state] DebugLocked = No
25,975,915 UART: [state] WD Timer not started. Device not locked for debugging
25,980,242 UART: [kat] SHA2-256
26,159,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,170,891 UART: [kat] ++
26,171,346 UART: [kat] sha1
26,182,657 UART: [kat] SHA2-256
26,185,659 UART: [kat] SHA2-384
26,190,900 UART: [kat] SHA2-512-ACC
26,193,860 UART: [kat] ECC-384
28,654,555 UART: [kat] HMAC-384Kdf
28,678,269 UART: [kat] LMS
29,207,734 UART: [kat] --
29,211,175 UART: [update-reset] ++
32,630,423 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,633,202 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
33,016,498 >>> mbox cmd response: success
33,016,936 UART: [update-reset] Copying MAN_2 To MAN_1
33,039,169 UART: [update-reset Success] --
33,042,051 UART: [state] Locking Datavault
33,044,710 UART: [state] Locking PCR0, PCR1 and PCR31
33,046,353 UART: [state] Locking ICCM
33,047,969 UART: [exit] Launching FMC @ 0x40000130
33,056,422 UART:
33,056,656 UART: Running Caliptra FMC ...
33,057,776 UART:
33,057,941 UART: [state] CFI Enabled
33,146,891 UART: [art] Extend RT PCRs Done
33,148,078 UART: [art] Lock RT PCRs Done
33,149,530 UART: [art] Populate DV Done
33,155,093 UART: [fht] FMC Alias Private Key: 7
33,156,573 UART: [art] Derive CDI
33,157,333 UART: [art] Store in in slot 0x4
33,216,693 UART: [art] Derive Key Pair
33,217,689 UART: [art] Store priv key in slot 0x5
35,680,560 UART: [art] Derive Key Pair - Done
35,693,996 UART: [art] Signing Cert with AUTHO
35,695,297 UART: RITY.KEYID = 7
37,405,958 UART: [art] Erasing AUTHORITY.KEYID = 7
37,407,737 UART: [art] PUB.X = 167189F94FC596452686C4353A8A233D19BE067CEB94EFE0EA0013EFC71B434AEEB53534F66BE5EBABC28FF845205017
37,414,737 UART: [art] PUB.Y = 37D445AE2BFA73F27D7A6FEB5B65499D0DE6F7EB14E3A4481075D34D84A96EC96B6D4CB322E01C4191B560BFA66D8B49
37,422,007 UART: [art] SIG.R = 8DB33ABB9CC623055AC5695033D5877E7DD82FF376F543FBE5CC7BC972406ED6DA5FC6770CA813E380A9EF62E24FE31E
37,429,415 UART: [art] SIG.S = 2B590943D2776BE3EB938A834A3419461FCE39E389CBE438FC4608DFCA5946E7D6B276A6EB6D111EA1219346BF023FF3
38,407,810 UART: Caliptra RT
38,408,540 UART: [state] CFI Enabled
38,747,680 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,384,160 ready_for_fw is high
3,384,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,091,979 >>> mbox cmd response: success
14,097,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,388,479 UART:
18,388,882 UART: Running Caliptra FMC ...
18,390,083 UART:
18,390,257 UART: [state] CFI Enabled
18,457,160 UART: [fht] FMC Alias Private Key: 7
20,220,974 UART: [art] Extend RT PCRs Done
20,222,165 UART: [art] Lock RT PCRs Done
20,223,914 UART: [art] Populate DV Done
20,229,537 UART: [fht] FMC Alias Private Key: 7
20,231,129 UART: [art] Derive CDI
20,231,941 UART: [art] Store in in slot 0x4
20,290,471 UART: [art] Derive Key Pair
20,291,509 UART: [art] Store priv key in slot 0x5
22,754,438 UART: [art] Derive Key Pair - Done
22,766,950 UART: [art] Signing Cert with AUTHO
22,768,262 UART: RITY.KEYID = 7
24,480,319 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,828 UART: [art] PUB.X = 320B937E397F98870A6F32194F74A04E8EE1B22A9DEB4F7A92B8175D99DC20AAAD3E315629A44732AB9E5360507FC221
24,489,070 UART: [art] PUB.Y = 67AD4490E9CD297FF0F7A0292FD1AF96CC10B6524E249BB2FFD83BC275EEE33CAF0D086020545C5AA67B500016435D65
24,496,337 UART: [art] SIG.R = 8E24862F40E7042D4D391629C1CB621811F6C1AAFC593D90D694433085CFA33B0CCD4A09A503B5B8CB775669EE13023E
24,503,753 UART: [art] SIG.S = 3C8B5B64B08D473B13F03F472D269498486CDBF33293C982529CA4463DB92D503469EF110F64FFA20E5F885000742CA4
25,482,159 UART: Caliptra RT
25,482,870 UART: [state] CFI Enabled
25,649,056 UART: [rt] RT listening for mailbox commands...
32,614,579 >>> mbox cmd response: success
32,648,702 UART:
32,648,965 UART: Running Caliptra FMC ...
32,650,079 UART:
32,650,248 UART: [state] CFI Enabled
32,741,056 UART: [art] Extend RT PCRs Done
32,742,249 UART: [art] Lock RT PCRs Done
32,743,709 UART: [art] Populate DV Done
32,749,372 UART: [fht] FMC Alias Private Key: 7
32,750,857 UART: [art] Derive CDI
32,751,980 UART: [art] Store in in slot 0x4
32,810,496 UART: [art] Derive Key Pair
32,811,519 UART: [art] Store priv key in slot 0x5
35,274,057 UART: [art] Derive Key Pair - Done
35,287,169 UART: [art] Signing Cert with AUTHO
35,288,474 UART: RITY.KEYID = 7
37,001,552 UART: [art] Erasing AUTHORITY.KEYID = 7
37,003,044 UART: [art] PUB.X = 569F8E02BE70215A2F00596CA6FB196E262B89231D23A2D2749DDA3FF5DAAA214F7E0F49993F229C8785A4C384EDD18D
37,010,293 UART: [art] PUB.Y = 93B7EEA51415626F8E30D74CD236A1A03969B94F1093370CCC2B6D5A9D7E85C8B335E892EC0C4BF843D555CB089556BA
37,017,575 UART: [art] SIG.R = 13CA448A04160BC4FF76B995A8CED7776FD91355B21D239B2DBD9FFE67EC6616B2F032CF00700BA8B5FC3186FED49E5F
37,024,969 UART: [art] SIG.S = 3DFEF75739EEB79CA4324ADE545CD77DA32E7C17DAD4FDB630C404878057D9FE582DE46ECA9047FD1504194AC16FDFC0
38,004,340 UART: Caliptra RT
38,005,060 UART: [state] CFI Enabled
38,338,305 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,371 UART:
192,748 UART: Running Caliptra ROM ...
193,930 UART:
603,463 UART: [state] CFI Enabled
614,674 UART: [state] LifecycleState = Unprovisioned
616,595 UART: [state] DebugLocked = No
618,339 UART: [state] WD Timer not started. Device not locked for debugging
622,385 UART: [kat] SHA2-256
801,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,013 UART: [kat] ++
813,541 UART: [kat] sha1
823,352 UART: [kat] SHA2-256
826,417 UART: [kat] SHA2-384
833,469 UART: [kat] SHA2-512-ACC
836,467 UART: [kat] ECC-384
3,275,732 UART: [kat] HMAC-384Kdf
3,287,725 UART: [kat] LMS
3,817,268 UART: [kat] --
3,820,846 UART: [cold-reset] ++
3,822,406 UART: [fht] FHT @ 0x50003400
3,833,304 UART: [idev] ++
3,833,857 UART: [idev] CDI.KEYID = 6
3,834,760 UART: [idev] SUBJECT.KEYID = 7
3,835,944 UART: [idev] UDS.KEYID = 0
3,836,916 ready_for_fw is high
3,837,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,981,009 UART: [idev] Erasing UDS.KEYID = 0
6,312,807 UART: [idev] Sha1 KeyId Algorithm
6,336,140 UART: [idev] --
6,338,773 UART: [ldev] ++
6,339,335 UART: [ldev] CDI.KEYID = 6
6,340,237 UART: [ldev] SUBJECT.KEYID = 5
6,341,451 UART: [ldev] AUTHORITY.KEYID = 7
6,342,673 UART: [ldev] FE.KEYID = 1
6,351,778 UART: [ldev] Erasing FE.KEYID = 1
8,825,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,056 UART: [ldev] --
10,618,115 UART: [fwproc] Wait for Commands...
10,620,333 UART: [fwproc] Recv command 0x46574c44
10,622,422 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,307 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,103 >>> mbox cmd response: success
14,492,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,637,168 UART: [afmc] ++
14,637,815 UART: [afmc] CDI.KEYID = 6
14,638,749 UART: [afmc] SUBJECT.KEYID = 7
14,639,852 UART: [afmc] AUTHORITY.KEYID = 5
16,992,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,454 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,524 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,371 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,088 UART: [afmc] --
18,791,067 UART: [cold-reset] --
18,796,438 UART: [state] Locking Datavault
18,801,179 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,880 UART: [state] Locking ICCM
18,804,434 UART: [exit] Launching FMC @ 0x40000130
18,812,879 UART:
18,813,110 UART: Running Caliptra FMC ...
18,814,225 UART:
18,814,382 UART: [state] CFI Enabled
18,822,527 UART: [fht] FMC Alias Private Key: 7
20,579,328 UART: [art] Extend RT PCRs Done
20,580,561 UART: [art] Lock RT PCRs Done
20,582,264 UART: [art] Populate DV Done
20,587,563 UART: [fht] FMC Alias Private Key: 7
20,589,043 UART: [art] Derive CDI
20,589,804 UART: [art] Store in in slot 0x4
20,632,018 UART: [art] Derive Key Pair
20,633,065 UART: [art] Store priv key in slot 0x5
23,059,829 UART: [art] Derive Key Pair - Done
23,073,104 UART: [art] Signing Cert with AUTHO
23,074,405 UART: RITY.KEYID = 7
24,779,928 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,428 UART: [art] PUB.X = AEFC863EB764200D158954B283864394B34D35068694AD0436D7A485A94272A9AB00651358D7EFB428A19676F7FCE603
24,788,686 UART: [art] PUB.Y = DB89219925E7B27FFE90252AB1DF4E82E1354ABC79502E9A562088E7E1C18F94696631478220944D752F596A34DB92D4
24,795,914 UART: [art] SIG.R = FC8F41D720F294A60EF26CA7B14BC76AD6B4E282A40B71E122E504A030CAFE3E954E1DFFF7FCD7AC189FD65586DAEE78
24,803,296 UART: [art] SIG.S = D5EDDA45DAD5BB0DFBCFD7167AA2AC7D0986FE825822B60761667B70C128E339990E81A7C40B3469361F56D234449E91
25,782,436 UART: Caliptra RT
25,783,153 UART: [state] CFI Enabled
25,901,095 UART: [rt] RT listening for mailbox commands...
25,904,105 UART:
25,904,347 UART: Running Caliptra ROM ...
25,905,366 UART:
25,905,680 UART: [state] CFI Enabled
25,916,876 UART: [state] LifecycleState = Unprovisioned
25,918,745 UART: [state] DebugLocked = No
25,920,442 UART: [state] WD Timer not started. Device not locked for debugging
25,923,635 UART: [kat] SHA2-256
26,102,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,114,393 UART: [kat] ++
26,114,861 UART: [kat] sha1
26,126,607 UART: [kat] SHA2-256
26,129,678 UART: [kat] SHA2-384
26,136,308 UART: [kat] SHA2-512-ACC
26,139,230 UART: [kat] ECC-384
28,581,386 UART: [kat] HMAC-384Kdf
28,594,371 UART: [kat] LMS
29,123,876 UART: [kat] --
29,127,263 UART: [update-reset] ++
32,558,077 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,561,123 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
32,944,450 >>> mbox cmd response: success
32,945,082 UART: [update-reset] Copying MAN_2 To MAN_1
32,967,410 UART: [update-reset Success] --
32,970,120 UART: [state] Locking Datavault
32,974,010 UART: [state] Locking PCR0, PCR1 and PCR31
32,975,680 UART: [state] Locking ICCM
32,977,050 UART: [exit] Launching FMC @ 0x40000130
32,985,443 UART:
32,985,674 UART: Running Caliptra FMC ...
32,986,770 UART:
32,986,918 UART: [state] CFI Enabled
33,030,826 UART: [art] Extend RT PCRs Done
33,032,000 UART: [art] Lock RT PCRs Done
33,033,463 UART: [art] Populate DV Done
33,039,032 UART: [fht] FMC Alias Private Key: 7
33,040,562 UART: [art] Derive CDI
33,041,298 UART: [art] Store in in slot 0x4
33,083,882 UART: [art] Derive Key Pair
33,084,880 UART: [art] Store priv key in slot 0x5
35,512,345 UART: [art] Derive Key Pair - Done
35,525,288 UART: [art] Signing Cert with AUTHO
35,526,607 UART: RITY.KEYID = 7
37,232,214 UART: [art] Erasing AUTHORITY.KEYID = 7
37,233,725 UART: [art] PUB.X = BAAB6EDF26947E436875B338DE7BE5855844A6F781DAA6AAB4294EDF4DAF4FF248F560A9BBC33F12B673456CD458414A
37,241,021 UART: [art] PUB.Y = 0CD6B0860EC1BBE3FEDA808294300E771B2D507C256BCA0AA75DA0610F46F33D2932623120135073260B9E9A4E989FDF
37,248,248 UART: [art] SIG.R = 788F499EB57938A2E30E95488FC21D34DDB65CF9E5CE087408F73DF1E4483479EC518BAE0FC01CA4EFDDF33CEA33EB4B
37,255,682 UART: [art] SIG.S = 0597DBDD5FB5A7F3AE779EDFCE1E880608E2E819868525D8A65FF6A387E3E832723C348C1192FD3AD9E6CD105C54B894
38,234,801 UART: Caliptra RT
38,235,513 UART: [state] CFI Enabled
38,526,634 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,704,342 ready_for_fw is high
3,705,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,283,916 >>> mbox cmd response: success
14,288,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,537,886 UART:
18,538,321 UART: Running Caliptra FMC ...
18,539,431 UART:
18,539,576 UART: [state] CFI Enabled
18,547,576 UART: [fht] FMC Alias Private Key: 7
20,304,032 UART: [art] Extend RT PCRs Done
20,305,255 UART: [art] Lock RT PCRs Done
20,307,175 UART: [art] Populate DV Done
20,312,691 UART: [fht] FMC Alias Private Key: 7
20,314,388 UART: [art] Derive CDI
20,315,119 UART: [art] Store in in slot 0x4
20,357,602 UART: [art] Derive Key Pair
20,358,639 UART: [art] Store priv key in slot 0x5
22,786,268 UART: [art] Derive Key Pair - Done
22,798,832 UART: [art] Signing Cert with AUTHO
22,800,132 UART: RITY.KEYID = 7
24,505,789 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,310 UART: [art] PUB.X = 2F48C663BB8EF635356B0B53FB10B0B59E34CEA42771DB974A4B3A4A14717749F0C4058106FA618AD2F55E7B2DA8087C
24,514,557 UART: [art] PUB.Y = 7871C087D89404FD0D877E7801D2FF60BC3FB2C6AB53BC16C865E71478B7119CC919D9FFA30A7F15F09479A93E9469DF
24,521,825 UART: [art] SIG.R = 7565E06A4DE73570B77139BD915039BCD8AAC40E64C7430F3D85B87B1B47FF470E44F6776C47646817A7F369D48E7C5F
24,529,218 UART: [art] SIG.S = 219F8B7C9FB646F7A7D7CA03839FF2B68E36C354AD94C9DFDB52368EBBB180F3E0678F9B4E1AB7EAB96004DADCB65C21
25,508,375 UART: Caliptra RT
25,509,076 UART: [state] CFI Enabled
25,626,477 UART: [rt] RT listening for mailbox commands...
32,531,309 >>> mbox cmd response: success
32,565,413 UART:
32,565,677 UART: Running Caliptra FMC ...
32,566,784 UART:
32,566,935 UART: [state] CFI Enabled
32,611,383 UART: [art] Extend RT PCRs Done
32,612,591 UART: [art] Lock RT PCRs Done
32,614,104 UART: [art] Populate DV Done
32,619,710 UART: [fht] FMC Alias Private Key: 7
32,621,425 UART: [art] Derive CDI
32,622,229 UART: [art] Store in in slot 0x4
32,664,599 UART: [art] Derive Key Pair
32,665,586 UART: [art] Store priv key in slot 0x5
35,092,774 UART: [art] Derive Key Pair - Done
35,105,612 UART: [art] Signing Cert with AUTHO
35,106,916 UART: RITY.KEYID = 7
36,811,882 UART: [art] Erasing AUTHORITY.KEYID = 7
36,813,382 UART: [art] PUB.X = 177D3A0A756CB6E93DDBA497DEED15C73199D479D2EFECA24CC60C97025C8E5AE91E99500B60C15AC961339D5492B816
36,820,683 UART: [art] PUB.Y = 3AB325DDB5D043BD41ABC2F314C281F2FB9FB88C9F84A92E5E30F3C96608EDBDB1B7EFDDDD34543345023D555B8663F8
36,827,965 UART: [art] SIG.R = 061741F3678EBCEEB71F96A080B5A80511179444D74BD2289AEA8700FB129C00BD2CF0C53E4AF424863FCB56FB4A1083
36,835,309 UART: [art] SIG.S = 8D9F7E8AFE86F1E77537A1B569CE3122BC4BD474C3BED08236BEE2AE8807E0481538AED63C1B4A0388CE300DE769EA0B
37,814,323 UART: Caliptra RT
37,815,022 UART: [state] CFI Enabled
38,105,574 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,439,710 ready_for_fw is high
3,440,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,711,490 >>> mbox cmd response: success
14,712,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,003,930 UART:
19,004,334 UART: Running Caliptra FMC ...
19,005,447 UART:
19,005,606 UART: [state] CFI Enabled
19,069,811 UART: [fht] FMC Alias Private Key: 7
20,833,910 UART: [art] Extend RT PCRs Done
20,835,134 UART: [art] Lock RT PCRs Done
20,836,376 UART: [art] Populate DV Done
20,841,631 UART: [fht] FMC Alias Private Key: 7
20,843,231 UART: [art] Derive CDI
20,843,971 UART: [art] Store in in slot 0x4
20,902,447 UART: [art] Derive Key Pair
20,903,487 UART: [art] Store priv key in slot 0x5
23,366,773 UART: [art] Derive Key Pair - Done
23,379,226 UART: [art] Signing Cert with AUTHO
23,380,551 UART: RITY.KEYID = 7
25,092,091 UART: [art] Erasing AUTHORITY.KEYID = 7
25,093,597 UART: [art] PUB.X = 78714C92C337948245E491D9EF40C8A0E3C6A58CDA6F4C553479E874004886881BFB57367187A52E809AF03AD4DFDBC6
25,100,843 UART: [art] PUB.Y = 505CEA0F13D14D9B9B057CEB95B6C7CF9D0C1EA442A440581CD7946345B4BB2F2D18EDE91D68CBD49A23C70300F9F733
25,108,104 UART: [art] SIG.R = 9D3DBBD39C6AE607C24544FC067C474989FFDC92BD647E3167D43B67484CE345C8060BFC411391667EBC9E28703CE6BB
25,115,488 UART: [art] SIG.S = E3CA950B71E487366006AFB3D9B6590BD5C33836184CD4ADE240E9399933D994679F749931E2FEC8CF7A6D0EE2AE602B
26,094,491 UART: Caliptra RT
26,095,198 UART: [state] CFI Enabled
26,260,378 UART: [rt] RT listening for mailbox commands...
33,937,409 >>> mbox cmd response: success
33,971,728 UART:
33,972,014 UART: Running Caliptra FMC ...
33,973,134 UART:
33,973,290 UART: [state] CFI Enabled
34,077,626 UART: [art] Extend RT PCRs Done
34,078,809 UART: [art] Lock RT PCRs Done
34,080,371 UART: [art] Populate DV Done
34,085,651 UART: [fht] FMC Alias Private Key: 7
34,087,314 UART: [art] Derive CDI
34,088,131 UART: [art] Store in in slot 0x4
34,147,148 UART: [art] Derive Key Pair
34,148,191 UART: [art] Store priv key in slot 0x5
36,611,107 UART: [art] Derive Key Pair - Done
36,623,733 UART: [art] Signing Cert with AUTHO
36,625,060 UART: RITY.KEYID = 7
38,336,498 UART: [art] Erasing AUTHORITY.KEYID = 7
38,337,993 UART: [art] PUB.X = AED97B907465C4628C15A041480EBF0D557F178CD98C0FBCE3DB18B2F27EDD208980FADB461BC973C2702CF07C1FD768
38,345,321 UART: [art] PUB.Y = 058D76BD3C8388584D93B664C9607941E0CEE6CCE681310CF6FB4C38DDAF12811F5F758FF3343F775E90A9D99E1B2B6F
38,352,554 UART: [art] SIG.R = CAD0422001B92469C5D2FF03DAD4A3F04BE0BEC154E870F044EB6122BE9950ECC686E090CAE037BCD087E87CACC39B60
38,359,943 UART: [art] SIG.S = F4B5582954CCC235BCB0EC31B014AF21BD4CA8FE8990F3133E9B8465EF223EF0949998AAEC9A7D59222747823EEF38A8
39,338,689 UART: Caliptra RT
39,339,401 UART: [state] CFI Enabled
39,671,677 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,757,193 ready_for_fw is high
3,757,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,966,761 >>> mbox cmd response: success
14,967,402 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,218,941 UART:
19,219,342 UART: Running Caliptra FMC ...
19,220,534 UART:
19,220,691 UART: [state] CFI Enabled
19,228,855 UART: [fht] FMC Alias Private Key: 7
20,985,862 UART: [art] Extend RT PCRs Done
20,987,081 UART: [art] Lock RT PCRs Done
20,988,712 UART: [art] Populate DV Done
20,994,065 UART: [fht] FMC Alias Private Key: 7
20,995,570 UART: [art] Derive CDI
20,996,327 UART: [art] Store in in slot 0x4
21,038,391 UART: [art] Derive Key Pair
21,039,437 UART: [art] Store priv key in slot 0x5
23,466,026 UART: [art] Derive Key Pair - Done
23,478,981 UART: [art] Signing Cert with AUTHO
23,480,286 UART: RITY.KEYID = 7
25,185,408 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,911 UART: [art] PUB.X = B18148E601D71550FF49DB68FFEDA9FF1ADF7127BBE53D71C59268260F175A38389231B5C06A76A589C15BB7AC804096
25,194,161 UART: [art] PUB.Y = B1E9E99F345E869C49F65566FBD585E3DDED343222B00FEF972CB550A0983B596FFB1674E8506F32CD51CD71B4DB3048
25,201,418 UART: [art] SIG.R = B267BDC7C18A9003B7B6E2766185E89B854CD5755E467508F1BDF82FB55FF4B581771466F1EFCF407E5192E70587B9B8
25,208,808 UART: [art] SIG.S = 16CF958D64E1B0837B44DB8A439DC67A2590BD13DF29E447B5415F1371CBD97031947914D20CE8480508F0AA7E71126C
26,188,275 UART: Caliptra RT
26,188,974 UART: [state] CFI Enabled
26,306,154 UART: [rt] RT listening for mailbox commands...
33,886,068 >>> mbox cmd response: success
33,918,420 UART:
33,918,716 UART: Running Caliptra FMC ...
33,919,828 UART:
33,919,988 UART: [state] CFI Enabled
33,964,266 UART: [art] Extend RT PCRs Done
33,965,402 UART: [art] Lock RT PCRs Done
33,966,987 UART: [art] Populate DV Done
33,972,498 UART: [fht] FMC Alias Private Key: 7
33,974,087 UART: [art] Derive CDI
33,974,898 UART: [art] Store in in slot 0x4
34,017,013 UART: [art] Derive Key Pair
34,018,056 UART: [art] Store priv key in slot 0x5
36,444,444 UART: [art] Derive Key Pair - Done
36,457,066 UART: [art] Signing Cert with AUTHO
36,458,370 UART: RITY.KEYID = 7
38,163,638 UART: [art] Erasing AUTHORITY.KEYID = 7
38,165,162 UART: [art] PUB.X = 8C6286A5A9951FE7BA0A4FB5F5B4B405ED368F7395F4C8CE9EA300A73800DFC21C438A6D1C9FCB24172A1F6C8FDE9770
38,172,355 UART: [art] PUB.Y = 4B1F753251F5201CD010BA6345AF5B8ADEBF0AA8B3601DA2C9952DB4A96E9E3122851D3CD6A1DAA5BEF0755943A28B35
38,179,647 UART: [art] SIG.R = 4CAF6AD9EB610F04808FFF1B058A55DB8379EBAD3E2B5CE24EAA57F8154F64D31A9A2D01698548E2063A804C3A1A16CA
38,187,035 UART: [art] SIG.S = 9943844D6D02F348E6BC590BAB341BCFBEDAF2A95C9DF33EBC4107C3B950BA9D796E239DF25CF13050C3FA132F21F220
39,166,165 UART: Caliptra RT
39,166,853 UART: [state] CFI Enabled
39,454,965 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,475 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,181 UART: [kat] SHA2-256
882,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,227 UART: [kat] ++
886,379 UART: [kat] sha1
890,721 UART: [kat] SHA2-256
892,659 UART: [kat] SHA2-384
895,448 UART: [kat] SHA2-512-ACC
897,349 UART: [kat] ECC-384
902,574 UART: [kat] HMAC-384Kdf
907,094 UART: [kat] LMS
1,475,290 UART: [kat] --
1,476,241 UART: [cold-reset] ++
1,476,637 UART: [fht] Storing FHT @ 0x50003400
1,479,356 UART: [idev] ++
1,479,524 UART: [idev] CDI.KEYID = 6
1,479,884 UART: [idev] SUBJECT.KEYID = 7
1,480,308 UART: [idev] UDS.KEYID = 0
1,480,653 ready_for_fw is high
1,480,653 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,592 UART: [idev] Erasing UDS.KEYID = 0
1,505,300 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,880 UART: [idev] --
1,514,991 UART: [ldev] ++
1,515,159 UART: [ldev] CDI.KEYID = 6
1,515,522 UART: [ldev] SUBJECT.KEYID = 5
1,515,948 UART: [ldev] AUTHORITY.KEYID = 7
1,516,411 UART: [ldev] FE.KEYID = 1
1,521,483 UART: [ldev] Erasing FE.KEYID = 1
1,547,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,144 UART: [ldev] --
1,586,495 UART: [fwproc] Waiting for Commands...
1,587,168 UART: [fwproc] Received command 0x46574c44
1,587,959 UART: [fwproc] Received Image of size 114448 bytes
2,887,480 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,278 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,630 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,565 >>> mbox cmd response: success
3,079,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,080,627 UART: [afmc] ++
3,080,795 UART: [afmc] CDI.KEYID = 6
3,081,157 UART: [afmc] SUBJECT.KEYID = 7
3,081,582 UART: [afmc] AUTHORITY.KEYID = 5
3,116,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,941 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,334 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,024 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,005 UART: [afmc] --
3,159,907 UART: [cold-reset] --
3,160,901 UART: [state] Locking Datavault
3,162,006 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,610 UART: [state] Locking ICCM
3,163,180 UART: [exit] Launching FMC @ 0x40000130
3,168,509 UART:
3,168,525 UART: Running Caliptra FMC ...
3,168,933 UART:
3,168,987 UART: [state] CFI Enabled
3,179,382 UART: [fht] FMC Alias Private Key: 7
3,287,363 UART: [art] Extend RT PCRs Done
3,287,791 UART: [art] Lock RT PCRs Done
3,289,609 UART: [art] Populate DV Done
3,297,852 UART: [fht] FMC Alias Private Key: 7
3,298,942 UART: [art] Derive CDI
3,299,222 UART: [art] Store in in slot 0x4
3,385,355 UART: [art] Derive Key Pair
3,385,715 UART: [art] Store priv key in slot 0x5
3,398,217 UART: [art] Derive Key Pair - Done
3,412,954 UART: [art] Signing Cert with AUTHO
3,413,434 UART: RITY.KEYID = 7
3,428,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,485 UART: [art] PUB.X = 5EB93CAC751FC9ED5AB2E39F10441032E097D2A255E253A2AAD3D210CEDB12D15B59ED61B87B6678BE8CA9B15F3D674A
3,436,273 UART: [art] PUB.Y = 4DF91EAEB11FA331DB504EE8D5B7CB9D4A98C6CC8412051F7137E738847942D32BF3BBE7ED4C6CA51293DF73937280B4
3,443,232 UART: [art] SIG.R = D93DC57F4CDF493435E160742532D61300C19C9B14AD2B4CD296DA6364AAC5DA8A303F9C7747E9B817E4EF41F8393E8D
3,449,988 UART: [art] SIG.S = 3FB65430667C1D9B00C238718EAF0882D1E0A4FB81C09AE099600535ED428A9D29209441E97AB3E06A39621A1240A8C1
3,474,355 UART: Caliptra RT
3,474,608 UART: [state] CFI Enabled
3,581,829 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,754 UART:
3,583,770 UART: Running Caliptra ROM ...
3,584,178 UART:
3,584,232 UART: [state] CFI Enabled
3,586,908 UART: [state] LifecycleState = Unprovisioned
3,587,563 UART: [state] DebugLocked = No
3,588,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,684 UART: [kat] SHA2-256
4,383,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,730 UART: [kat] ++
4,387,882 UART: [kat] sha1
4,392,154 UART: [kat] SHA2-256
4,394,092 UART: [kat] SHA2-384
4,396,791 UART: [kat] SHA2-512-ACC
4,398,691 UART: [kat] ECC-384
4,404,160 UART: [kat] HMAC-384Kdf
4,408,916 UART: [kat] LMS
4,977,112 UART: [kat] --
4,977,911 UART: [update-reset] ++
6,313,980 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,315,084 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,465,134 >>> mbox cmd response: success
6,465,459 UART: [update-reset] Copying MAN_2 To MAN_1
6,473,473 UART: [update-reset Success] --
6,474,282 UART: [state] Locking Datavault
6,475,086 UART: [state] Locking PCR0, PCR1 and PCR31
6,475,690 UART: [state] Locking ICCM
6,476,302 UART: [exit] Launching FMC @ 0x40000130
6,481,631 UART:
6,481,647 UART: Running Caliptra FMC ...
6,482,055 UART:
6,482,109 UART: [state] CFI Enabled
6,571,068 UART: [art] Extend RT PCRs Done
6,571,496 UART: [art] Lock RT PCRs Done
6,572,637 UART: [art] Populate DV Done
6,580,698 UART: [fht] FMC Alias Private Key: 7
6,581,656 UART: [art] Derive CDI
6,581,936 UART: [art] Store in in slot 0x4
6,667,579 UART: [art] Derive Key Pair
6,667,939 UART: [art] Store priv key in slot 0x5
6,680,787 UART: [art] Derive Key Pair - Done
6,695,795 UART: [art] Signing Cert with AUTHO
6,696,275 UART: RITY.KEYID = 7
6,711,089 UART: [art] Erasing AUTHORITY.KEYID = 7
6,711,854 UART: [art] PUB.X = 4C0CCEC12413C91BBDC687CC15D4D889A9A3B1AFA1C7B02FD9BD447D94AEC739F5BA267DC00C2D6046A55182469090C0
6,718,634 UART: [art] PUB.Y = 3ADFC836ABF0A0EFB0CD3D518E137C7EB41DE631646B0682BCAE9D7F54CCBD406AC667CB927DA825552E8320AC06747A
6,725,598 UART: [art] SIG.R = 9BE1B8F19771E5F202191B410F36FE3ACF663755B2596872FB0EAE3A78E927DF3035E6E54429A50C8ADECD46AF87717D
6,732,364 UART: [art] SIG.S = 64FBC315B90D8AE800D0F085E4AAAC872E15C43441E61EB5E7A6457F65BC6B2934ACE7D36AA69D20D2CB5ECDE6848A70
6,756,730 UART: Caliptra RT
6,756,983 UART: [state] CFI Enabled
7,040,546 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,575 ready_for_fw is high
1,362,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,749 >>> mbox cmd response: success
2,930,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,993,159 UART:
2,993,175 UART: Running Caliptra FMC ...
2,993,583 UART:
2,993,637 UART: [state] CFI Enabled
3,004,212 UART: [fht] FMC Alias Private Key: 7
3,112,925 UART: [art] Extend RT PCRs Done
3,113,353 UART: [art] Lock RT PCRs Done
3,115,043 UART: [art] Populate DV Done
3,123,320 UART: [fht] FMC Alias Private Key: 7
3,124,404 UART: [art] Derive CDI
3,124,684 UART: [art] Store in in slot 0x4
3,210,773 UART: [art] Derive Key Pair
3,211,133 UART: [art] Store priv key in slot 0x5
3,224,013 UART: [art] Derive Key Pair - Done
3,239,054 UART: [art] Signing Cert with AUTHO
3,239,534 UART: RITY.KEYID = 7
3,254,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,459 UART: [art] PUB.X = 6BDDAA647D4181EE99926D476A9DF4F20D30522FC822378552572B4B1D46D99A7641E4D29737F4993C283E840F8E9270
3,262,217 UART: [art] PUB.Y = FAC39DB0BC97ADFCD0FF4914ABF0A4840D82BF0C6E2632D6A7156BC7C582C92130AC5067F9165F9B19A7A60B69B8A67E
3,269,176 UART: [art] SIG.R = DEE1F0FE19555F87886D90FA3E0822231465E80405A17D5675A3200D67E17F4A158CAFBFD9B2E21057415674FF0A4927
3,275,929 UART: [art] SIG.S = 8AEE1AFA7943618825261E7862ED8905A477BDC028DE004E561E23C00EC05EA20CC56875991A62B4D9BC228CD034F5E9
3,299,643 UART: Caliptra RT
3,299,896 UART: [state] CFI Enabled
3,407,610 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,172,871 >>> mbox cmd response: success
6,186,326 UART:
6,186,342 UART: Running Caliptra FMC ...
6,186,750 UART:
6,186,804 UART: [state] CFI Enabled
6,275,439 UART: [art] Extend RT PCRs Done
6,275,867 UART: [art] Lock RT PCRs Done
6,277,150 UART: [art] Populate DV Done
6,285,423 UART: [fht] FMC Alias Private Key: 7
6,286,549 UART: [art] Derive CDI
6,286,829 UART: [art] Store in in slot 0x4
6,372,434 UART: [art] Derive Key Pair
6,372,794 UART: [art] Store priv key in slot 0x5
6,385,540 UART: [art] Derive Key Pair - Done
6,400,143 UART: [art] Signing Cert with AUTHO
6,400,623 UART: RITY.KEYID = 7
6,415,809 UART: [art] Erasing AUTHORITY.KEYID = 7
6,416,574 UART: [art] PUB.X = 56C6DBC28C976ADA846D43E573CDE3FF0D868F5B3D1DF229DBC24CCC467B70156811B5CEAE6E6DD22A6BF20EB08F57EE
6,423,364 UART: [art] PUB.Y = 91B2D68BAA5C3996697D5A56BB972171F6A2E15AB1D2457049F16799CCABB9F24710ABCE2AD6AB8E48A3A7FC9B888D9C
6,430,330 UART: [art] SIG.R = 46C2C0FFCCA595B9CD90221371B9B3AD6DFF748C72D3CA57FF869583915BA2FDA9C8491A8C35B878EB7B58EA1CCDE3C9
6,437,122 UART: [art] SIG.S = 7BA7400852ECD9B1DCCCFE497D0664EED1ADBF09FEFCFF04FDDE046716C7461C0A64EB67920A4134DE2BD751D6382150
6,460,760 UART: Caliptra RT
6,461,013 UART: [state] CFI Enabled
6,747,601 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,464 UART: [kat] SHA2-256
882,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,510 UART: [kat] ++
886,662 UART: [kat] sha1
890,818 UART: [kat] SHA2-256
892,756 UART: [kat] SHA2-384
895,609 UART: [kat] SHA2-512-ACC
897,510 UART: [kat] ECC-384
902,753 UART: [kat] HMAC-384Kdf
907,477 UART: [kat] LMS
1,475,673 UART: [kat] --
1,476,702 UART: [cold-reset] ++
1,477,032 UART: [fht] Storing FHT @ 0x50003400
1,479,691 UART: [idev] ++
1,479,859 UART: [idev] CDI.KEYID = 6
1,480,219 UART: [idev] SUBJECT.KEYID = 7
1,480,643 UART: [idev] UDS.KEYID = 0
1,480,988 ready_for_fw is high
1,480,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,003 UART: [idev] Erasing UDS.KEYID = 0
1,505,609 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,173 UART: [idev] --
1,515,238 UART: [ldev] ++
1,515,406 UART: [ldev] CDI.KEYID = 6
1,515,769 UART: [ldev] SUBJECT.KEYID = 5
1,516,195 UART: [ldev] AUTHORITY.KEYID = 7
1,516,658 UART: [ldev] FE.KEYID = 1
1,522,020 UART: [ldev] Erasing FE.KEYID = 1
1,547,549 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,499 UART: [ldev] --
1,586,762 UART: [fwproc] Waiting for Commands...
1,587,491 UART: [fwproc] Received command 0x46574c44
1,588,282 UART: [fwproc] Received Image of size 114448 bytes
2,886,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,115 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,467 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,566 >>> mbox cmd response: success
3,079,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,080,746 UART: [afmc] ++
3,080,914 UART: [afmc] CDI.KEYID = 6
3,081,276 UART: [afmc] SUBJECT.KEYID = 7
3,081,701 UART: [afmc] AUTHORITY.KEYID = 5
3,116,902 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,448 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,228 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,956 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,841 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,531 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,606 UART: [afmc] --
3,160,630 UART: [cold-reset] --
3,161,234 UART: [state] Locking Datavault
3,162,375 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,979 UART: [state] Locking ICCM
3,163,619 UART: [exit] Launching FMC @ 0x40000130
3,168,948 UART:
3,168,964 UART: Running Caliptra FMC ...
3,169,372 UART:
3,169,515 UART: [state] CFI Enabled
3,180,310 UART: [fht] FMC Alias Private Key: 7
3,288,637 UART: [art] Extend RT PCRs Done
3,289,065 UART: [art] Lock RT PCRs Done
3,290,623 UART: [art] Populate DV Done
3,298,612 UART: [fht] FMC Alias Private Key: 7
3,299,768 UART: [art] Derive CDI
3,300,048 UART: [art] Store in in slot 0x4
3,385,383 UART: [art] Derive Key Pair
3,385,743 UART: [art] Store priv key in slot 0x5
3,399,637 UART: [art] Derive Key Pair - Done
3,414,418 UART: [art] Signing Cert with AUTHO
3,414,898 UART: RITY.KEYID = 7
3,430,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,021 UART: [art] PUB.X = DCF9FF3E1DF58C17F0472809694C77DD81C36F453A5F48066D935815525226AB30CA0A5578438E55B18D34041F2E1938
3,437,773 UART: [art] PUB.Y = D49FCA9CC553CEC46050870C4478B50EBE176B11E1F16D8721AD731FBDDA8C85C7C2032E86160D0405B4622BE1AC081E
3,444,712 UART: [art] SIG.R = CA1D6455F37D3780800CBEC736B39BAE2DBDA458D615FEF9DAECA96CCD632D7F2C7249B41C1BDDCB9DD7304694F782FA
3,451,505 UART: [art] SIG.S = 4C43EAAA38D00FA7024B47D72865D7A5C9E59A66093159A3FD2CFF7841A0D2F74ADFB10519416F10ADD439BF535FBA45
3,474,596 UART: Caliptra RT
3,474,941 UART: [state] CFI Enabled
3,583,944 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,767 UART:
3,585,783 UART: Running Caliptra ROM ...
3,586,191 UART:
3,586,332 UART: [state] CFI Enabled
3,589,126 UART: [state] LifecycleState = Unprovisioned
3,589,781 UART: [state] DebugLocked = No
3,590,365 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,592,062 UART: [kat] SHA2-256
4,385,993 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,390,108 UART: [kat] ++
4,390,260 UART: [kat] sha1
4,394,444 UART: [kat] SHA2-256
4,396,382 UART: [kat] SHA2-384
4,399,205 UART: [kat] SHA2-512-ACC
4,401,105 UART: [kat] ECC-384
4,406,628 UART: [kat] HMAC-384Kdf
4,411,068 UART: [kat] LMS
4,979,264 UART: [kat] --
4,980,027 UART: [update-reset] ++
6,314,798 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,315,880 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,465,930 >>> mbox cmd response: success
6,466,043 UART: [update-reset] Copying MAN_2 To MAN_1
6,474,057 UART: [update-reset Success] --
6,475,228 UART: [state] Locking Datavault
6,475,870 UART: [state] Locking PCR0, PCR1 and PCR31
6,476,474 UART: [state] Locking ICCM
6,477,102 UART: [exit] Launching FMC @ 0x40000130
6,482,431 UART:
6,482,447 UART: Running Caliptra FMC ...
6,482,855 UART:
6,482,998 UART: [state] CFI Enabled
6,572,355 UART: [art] Extend RT PCRs Done
6,572,783 UART: [art] Lock RT PCRs Done
6,573,906 UART: [art] Populate DV Done
6,582,095 UART: [fht] FMC Alias Private Key: 7
6,583,127 UART: [art] Derive CDI
6,583,407 UART: [art] Store in in slot 0x4
6,668,746 UART: [art] Derive Key Pair
6,669,106 UART: [art] Store priv key in slot 0x5
6,681,830 UART: [art] Derive Key Pair - Done
6,696,309 UART: [art] Signing Cert with AUTHO
6,696,789 UART: RITY.KEYID = 7
6,712,443 UART: [art] Erasing AUTHORITY.KEYID = 7
6,713,208 UART: [art] PUB.X = 669E7F4B3E73C6B537C9CC83321743677FF13E52AADF51419DF66B6519EACE557E7F4AE84713DAF8A30F7598BC7195DE
6,719,985 UART: [art] PUB.Y = 1B6E25DC96BC0AB045F81262F16A0B904BAF8C2D20A341E88134002E358CCB5467EDB51E94CFED649F418411AA78741D
6,726,915 UART: [art] SIG.R = 0598092AE4221EA265F3052D5D3524CB6F489336BC3DCD6A12C8F4B6D8A50C6DC66EC7DED2524BD97E3801EA34158767
6,733,676 UART: [art] SIG.S = 1EBC765C07D1C18B7C6443A35348EAA16894F8C6DA2325382A45B3F297ACA03687D6C3C9A16D28E0EA6468CDC2D91C7F
6,757,264 UART: Caliptra RT
6,757,609 UART: [state] CFI Enabled
7,039,259 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,420 ready_for_fw is high
1,362,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,538 >>> mbox cmd response: success
2,928,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,990,384 UART:
2,990,400 UART: Running Caliptra FMC ...
2,990,808 UART:
2,990,951 UART: [state] CFI Enabled
3,001,384 UART: [fht] FMC Alias Private Key: 7
3,109,233 UART: [art] Extend RT PCRs Done
3,109,661 UART: [art] Lock RT PCRs Done
3,111,477 UART: [art] Populate DV Done
3,119,782 UART: [fht] FMC Alias Private Key: 7
3,120,822 UART: [art] Derive CDI
3,121,102 UART: [art] Store in in slot 0x4
3,206,569 UART: [art] Derive Key Pair
3,206,929 UART: [art] Store priv key in slot 0x5
3,219,837 UART: [art] Derive Key Pair - Done
3,234,955 UART: [art] Signing Cert with AUTHO
3,235,435 UART: RITY.KEYID = 7
3,250,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,432 UART: [art] PUB.X = 6E21A08077C31FDDEBA0DD1D8C71EF865E51207073D2193CF94782A9F44F4294CD14BEAC97200E9757B29DA3197BC960
3,258,205 UART: [art] PUB.Y = 31F37C29F005F1E721C81C389C6C21650F57185BF38A8F2F0CCC87690CAA871A36A3703387B907DBF7C553321F024191
3,265,133 UART: [art] SIG.R = 80104510C851CC9CD40436F61DF3FC6B6A5534CC5939685355D2C6DE5ECC33EB2B021969ECA37574C1CBF8AE1D348444
3,271,903 UART: [art] SIG.S = 78281496935354C9C2DCB6FABFBC3E6E451364762E935B6C0BDAC8943FBC3041F189C908E8A16E83A7610ECD0EC9B094
3,295,532 UART: Caliptra RT
3,295,877 UART: [state] CFI Enabled
3,404,112 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,168,968 >>> mbox cmd response: success
6,182,357 UART:
6,182,373 UART: Running Caliptra FMC ...
6,182,781 UART:
6,182,924 UART: [state] CFI Enabled
6,271,785 UART: [art] Extend RT PCRs Done
6,272,213 UART: [art] Lock RT PCRs Done
6,273,440 UART: [art] Populate DV Done
6,281,365 UART: [fht] FMC Alias Private Key: 7
6,282,381 UART: [art] Derive CDI
6,282,661 UART: [art] Store in in slot 0x4
6,368,264 UART: [art] Derive Key Pair
6,368,624 UART: [art] Store priv key in slot 0x5
6,381,720 UART: [art] Derive Key Pair - Done
6,396,518 UART: [art] Signing Cert with AUTHO
6,396,998 UART: RITY.KEYID = 7
6,412,446 UART: [art] Erasing AUTHORITY.KEYID = 7
6,413,211 UART: [art] PUB.X = 4C7DA6C91B9D0F78E7803C34C407440D22322741887BF0C4D7EB39B873FE4059280F6EA70EFB3E71BC52A8DA374DE7C3
6,419,974 UART: [art] PUB.Y = 6FED667D33449EB0BACB8913B50206221101A3BFE25FA8BF3449E93261A5582702BBA4DC189E1181BEC02B53B8B7F14C
6,426,920 UART: [art] SIG.R = 63FD6238241E57D958BF8B24676DA5324172E69D9E73221C1A89AE751AFE74A0B4572696355B11CCB50477EABF85BDA0
6,433,689 UART: [art] SIG.S = 93747A61F4471652E7D83DD650724E32456D2759341C98DBABF2FE0FAC12A37D33309A79F53528557FE0471003A2E65E
6,457,612 UART: Caliptra RT
6,457,957 UART: [state] CFI Enabled
6,736,636 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
893,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,357 UART: [kat] ++
897,509 UART: [kat] sha1
901,741 UART: [kat] SHA2-256
903,681 UART: [kat] SHA2-384
906,386 UART: [kat] SHA2-512-ACC
908,287 UART: [kat] ECC-384
917,900 UART: [kat] HMAC-384Kdf
922,452 UART: [kat] LMS
1,170,780 UART: [kat] --
1,171,655 UART: [cold-reset] ++
1,172,133 UART: [fht] FHT @ 0x50003400
1,174,752 UART: [idev] ++
1,174,920 UART: [idev] CDI.KEYID = 6
1,175,280 UART: [idev] SUBJECT.KEYID = 7
1,175,704 UART: [idev] UDS.KEYID = 0
1,176,049 ready_for_fw is high
1,176,049 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,918 UART: [idev] Erasing UDS.KEYID = 0
1,201,119 UART: [idev] Sha1 KeyId Algorithm
1,209,413 UART: [idev] --
1,210,635 UART: [ldev] ++
1,210,803 UART: [ldev] CDI.KEYID = 6
1,211,166 UART: [ldev] SUBJECT.KEYID = 5
1,211,592 UART: [ldev] AUTHORITY.KEYID = 7
1,212,055 UART: [ldev] FE.KEYID = 1
1,217,039 UART: [ldev] Erasing FE.KEYID = 1
1,243,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,527 UART: [ldev] --
1,282,996 UART: [fwproc] Wait for Commands...
1,283,656 UART: [fwproc] Recv command 0x46574c44
1,284,384 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,795 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,822 >>> mbox cmd response: success
2,774,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,776,078 UART: [afmc] ++
2,776,246 UART: [afmc] CDI.KEYID = 6
2,776,608 UART: [afmc] SUBJECT.KEYID = 7
2,777,033 UART: [afmc] AUTHORITY.KEYID = 5
2,813,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,225 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,953 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,838 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,557 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,355 UART: [afmc] --
2,856,279 UART: [cold-reset] --
2,857,053 UART: [state] Locking Datavault
2,858,366 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,970 UART: [state] Locking ICCM
2,859,622 UART: [exit] Launching FMC @ 0x40000130
2,864,951 UART:
2,864,967 UART: Running Caliptra FMC ...
2,865,375 UART:
2,865,429 UART: [state] CFI Enabled
2,876,088 UART: [fht] FMC Alias Private Key: 7
2,984,227 UART: [art] Extend RT PCRs Done
2,984,655 UART: [art] Lock RT PCRs Done
2,986,341 UART: [art] Populate DV Done
2,994,496 UART: [fht] FMC Alias Private Key: 7
2,995,468 UART: [art] Derive CDI
2,995,748 UART: [art] Store in in slot 0x4
3,080,997 UART: [art] Derive Key Pair
3,081,357 UART: [art] Store priv key in slot 0x5
3,094,243 UART: [art] Derive Key Pair - Done
3,108,853 UART: [art] Signing Cert with AUTHO
3,109,333 UART: RITY.KEYID = 7
3,124,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,370 UART: [art] PUB.X = FD1126E857159BA85D81A496FD4FC1730A489114BB477221F2EF0B6E2AEABF9D16911D6B6876426920B2694938940AAF
3,132,131 UART: [art] PUB.Y = C677654BA5DC14F9B452DCC2B7BEB0DFE1A9CC70B18B7EF5813DD409611D66041517B3FC9F29391EFC2295976C4850EB
3,139,087 UART: [art] SIG.R = C526273A8B6A91FA99A23BBEE4A4D855B05F782C310D42461F0112C4A868B31AEC5235894B89C5AD8E260743FBD79A46
3,145,852 UART: [art] SIG.S = 9A1261A323E195F18D6E7F13D04C7F3307ED387263D3AC2CFCAE4F28FA1F9D00EF55BDD62E8DB2B5CEB0DC731A1D3306
3,169,645 UART: Caliptra RT
3,169,898 UART: [state] CFI Enabled
3,277,378 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,424 UART:
3,279,440 UART: Running Caliptra ROM ...
3,279,848 UART:
3,279,903 UART: [state] CFI Enabled
3,282,777 UART: [state] LifecycleState = Unprovisioned
3,283,432 UART: [state] DebugLocked = No
3,283,940 UART: [state] WD Timer not started. Device not locked for debugging
3,285,228 UART: [kat] SHA2-256
4,090,878 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,003 UART: [kat] ++
4,095,155 UART: [kat] sha1
4,099,375 UART: [kat] SHA2-256
4,101,315 UART: [kat] SHA2-384
4,104,240 UART: [kat] SHA2-512-ACC
4,106,140 UART: [kat] ECC-384
4,115,773 UART: [kat] HMAC-384Kdf
4,120,455 UART: [kat] LMS
4,368,783 UART: [kat] --
4,369,597 UART: [update-reset] ++
5,682,208 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,683,351 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,833,349 >>> mbox cmd response: success
5,833,626 UART: [update-reset] Copying MAN_2 To MAN_1
5,841,640 UART: [update-reset Success] --
5,842,547 UART: [state] Locking Datavault
5,843,305 UART: [state] Locking PCR0, PCR1 and PCR31
5,843,909 UART: [state] Locking ICCM
5,844,411 UART: [exit] Launching FMC @ 0x40000130
5,849,740 UART:
5,849,756 UART: Running Caliptra FMC ...
5,850,164 UART:
5,850,218 UART: [state] CFI Enabled
5,939,419 UART: [art] Extend RT PCRs Done
5,939,847 UART: [art] Lock RT PCRs Done
5,941,456 UART: [art] Populate DV Done
5,949,607 UART: [fht] FMC Alias Private Key: 7
5,950,575 UART: [art] Derive CDI
5,950,855 UART: [art] Store in in slot 0x4
6,036,910 UART: [art] Derive Key Pair
6,037,270 UART: [art] Store priv key in slot 0x5
6,050,448 UART: [art] Derive Key Pair - Done
6,065,267 UART: [art] Signing Cert with AUTHO
6,065,747 UART: RITY.KEYID = 7
6,080,995 UART: [art] Erasing AUTHORITY.KEYID = 7
6,081,760 UART: [art] PUB.X = D85EFF8C15682161B0AEB4F6A75FACC5DE7D342E54A6AFB3AF8F3FEF001365670F90FB178137C9C2088588A4EE107B63
6,088,516 UART: [art] PUB.Y = 5473B62C4CFBA12BBF78F0D6A5DB95808A4CE12ED5F3D569BA5E59F2BCB30999DC6E6CB038F51B1D781C2F0DE142851B
6,095,480 UART: [art] SIG.R = C837F3DB717E58C4750A375FD0BE193F2DE2F6FE5B273C7A3C6D8CDA9C426B2B1F42A5D82FEF5366E70DAD688C05757D
6,102,259 UART: [art] SIG.S = DD7576C8AF99314CDB864FD02290C12C663A2D561AC8BD80074F85E93E622CA1A2D64FAC8AC8CEED314367E28A72E61D
6,126,189 UART: Caliptra RT
6,126,442 UART: [state] CFI Enabled
6,408,086 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,547 ready_for_fw is high
1,060,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,985 >>> mbox cmd response: success
2,628,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,691,043 UART:
2,691,059 UART: Running Caliptra FMC ...
2,691,467 UART:
2,691,521 UART: [state] CFI Enabled
2,702,182 UART: [fht] FMC Alias Private Key: 7
2,809,973 UART: [art] Extend RT PCRs Done
2,810,401 UART: [art] Lock RT PCRs Done
2,812,001 UART: [art] Populate DV Done
2,820,206 UART: [fht] FMC Alias Private Key: 7
2,821,266 UART: [art] Derive CDI
2,821,546 UART: [art] Store in in slot 0x4
2,907,159 UART: [art] Derive Key Pair
2,907,519 UART: [art] Store priv key in slot 0x5
2,920,595 UART: [art] Derive Key Pair - Done
2,935,312 UART: [art] Signing Cert with AUTHO
2,935,792 UART: RITY.KEYID = 7
2,950,656 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,421 UART: [art] PUB.X = 764C8261D89BA63717A515952C22FD972347754AFCEC758640F532C927307F28EE43E429F55DCF1F8165F78123D64238
2,958,181 UART: [art] PUB.Y = 6BFDA4707F0567AFCC9CC2EBD19DC6D0F1C8429CD5EADD80E1C75621FC67034D3740E7C06D5A4E6C190DE07E091611D7
2,965,137 UART: [art] SIG.R = D856004735DE668D5CD0100767BDF524621725F31557570D488D307D08753EA135A2EC7538B3C2D25AA59478CB835954
2,971,864 UART: [art] SIG.S = 952E5BA9B4B079A2B089295EAC13882997D34A6323F22BE4034225453DA85EFA2BCC71AB5E85AD695754D166E90118F9
2,995,691 UART: Caliptra RT
2,995,944 UART: [state] CFI Enabled
3,103,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,543,566 >>> mbox cmd response: success
5,556,952 UART:
5,556,968 UART: Running Caliptra FMC ...
5,557,376 UART:
5,557,430 UART: [state] CFI Enabled
5,646,553 UART: [art] Extend RT PCRs Done
5,646,981 UART: [art] Lock RT PCRs Done
5,648,164 UART: [art] Populate DV Done
5,656,507 UART: [fht] FMC Alias Private Key: 7
5,657,523 UART: [art] Derive CDI
5,657,803 UART: [art] Store in in slot 0x4
5,743,168 UART: [art] Derive Key Pair
5,743,528 UART: [art] Store priv key in slot 0x5
5,756,958 UART: [art] Derive Key Pair - Done
5,772,031 UART: [art] Signing Cert with AUTHO
5,772,511 UART: RITY.KEYID = 7
5,787,795 UART: [art] Erasing AUTHORITY.KEYID = 7
5,788,560 UART: [art] PUB.X = 98A503D2374E4E45EBA0072DD91BE484AE5AC0CF6B469170BA381025D4101FC8383FEED5D74A4CFA1291141F799E899C
5,795,332 UART: [art] PUB.Y = F961BF30F95A1CB93A93A720A812B817FEEA616C325183197711BF36E6735A9E107CF8B3C2E562E6457FC92B85C737D4
5,802,284 UART: [art] SIG.R = 5CF3F5C8B9DAED344487AFD39516662BF521F48BA98E9F89103152E6A07B883276923750CFF13EA66C64AE6E7F796D24
5,809,058 UART: [art] SIG.S = E503AEDCD679AEF8108195CA1B3F8513A368E5B059E5E2F6672C521B1D3C2F5A5DEBF4AAB4E640FEAD91A820770E4EB3
5,832,889 UART: Caliptra RT
5,833,142 UART: [state] CFI Enabled
6,117,819 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
893,647 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,772 UART: [kat] ++
897,924 UART: [kat] sha1
902,052 UART: [kat] SHA2-256
903,992 UART: [kat] SHA2-384
906,567 UART: [kat] SHA2-512-ACC
908,468 UART: [kat] ECC-384
918,643 UART: [kat] HMAC-384Kdf
923,155 UART: [kat] LMS
1,171,483 UART: [kat] --
1,172,422 UART: [cold-reset] ++
1,172,820 UART: [fht] FHT @ 0x50003400
1,175,415 UART: [idev] ++
1,175,583 UART: [idev] CDI.KEYID = 6
1,175,943 UART: [idev] SUBJECT.KEYID = 7
1,176,367 UART: [idev] UDS.KEYID = 0
1,176,712 ready_for_fw is high
1,176,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,989 UART: [idev] Erasing UDS.KEYID = 0
1,201,912 UART: [idev] Sha1 KeyId Algorithm
1,210,416 UART: [idev] --
1,211,540 UART: [ldev] ++
1,211,708 UART: [ldev] CDI.KEYID = 6
1,212,071 UART: [ldev] SUBJECT.KEYID = 5
1,212,497 UART: [ldev] AUTHORITY.KEYID = 7
1,212,960 UART: [ldev] FE.KEYID = 1
1,218,032 UART: [ldev] Erasing FE.KEYID = 1
1,244,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,888 UART: [ldev] --
1,284,265 UART: [fwproc] Wait for Commands...
1,284,939 UART: [fwproc] Recv command 0x46574c44
1,285,667 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,381 >>> mbox cmd response: success
2,777,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,778,605 UART: [afmc] ++
2,778,773 UART: [afmc] CDI.KEYID = 6
2,779,135 UART: [afmc] SUBJECT.KEYID = 7
2,779,560 UART: [afmc] AUTHORITY.KEYID = 5
2,815,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,328 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,213 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,932 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,740 UART: [afmc] --
2,858,732 UART: [cold-reset] --
2,859,490 UART: [state] Locking Datavault
2,860,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,159 UART: [state] Locking ICCM
2,861,775 UART: [exit] Launching FMC @ 0x40000130
2,867,104 UART:
2,867,120 UART: Running Caliptra FMC ...
2,867,528 UART:
2,867,671 UART: [state] CFI Enabled
2,878,588 UART: [fht] FMC Alias Private Key: 7
2,986,841 UART: [art] Extend RT PCRs Done
2,987,269 UART: [art] Lock RT PCRs Done
2,989,381 UART: [art] Populate DV Done
2,997,676 UART: [fht] FMC Alias Private Key: 7
2,998,792 UART: [art] Derive CDI
2,999,072 UART: [art] Store in in slot 0x4
3,084,817 UART: [art] Derive Key Pair
3,085,177 UART: [art] Store priv key in slot 0x5
3,098,289 UART: [art] Derive Key Pair - Done
3,113,070 UART: [art] Signing Cert with AUTHO
3,113,550 UART: RITY.KEYID = 7
3,128,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,303 UART: [art] PUB.X = E9264FCD63E5D88B4A12EBA2DC937FC938B5A6702BA657C1607751F9CA65CC1ADB7CD1898E5517299A94499E2F49B4F4
3,136,083 UART: [art] PUB.Y = D47C6169846CC70C0B8DA0252A9DE79F655C77797C9C2840BF5414C19F9D9C94FE98BE1E0C732322B8F967F9EDF5A1B1
3,143,032 UART: [art] SIG.R = D5753268F2C79C367115191CDBFB660E6EB0AC5B14819FC8CBE9D69441E0D5B92636892B981F742B31E221AF524179F4
3,149,799 UART: [art] SIG.S = E158BC2699D29A4A7E2CB1588F0508C708F9C0D8C3CF5AF538885764B8AFF45E9AB99385AB8E1E2476134106C2413224
3,173,688 UART: Caliptra RT
3,174,033 UART: [state] CFI Enabled
3,282,427 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,284,379 UART:
3,284,395 UART: Running Caliptra ROM ...
3,284,803 UART:
3,284,945 UART: [state] CFI Enabled
3,287,589 UART: [state] LifecycleState = Unprovisioned
3,288,244 UART: [state] DebugLocked = No
3,288,758 UART: [state] WD Timer not started. Device not locked for debugging
3,290,086 UART: [kat] SHA2-256
4,095,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,099,861 UART: [kat] ++
4,100,013 UART: [kat] sha1
4,104,379 UART: [kat] SHA2-256
4,106,319 UART: [kat] SHA2-384
4,109,012 UART: [kat] SHA2-512-ACC
4,110,912 UART: [kat] ECC-384
4,120,407 UART: [kat] HMAC-384Kdf
4,125,007 UART: [kat] LMS
4,373,335 UART: [kat] --
4,374,299 UART: [update-reset] ++
5,688,114 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,689,191 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,839,189 >>> mbox cmd response: success
5,839,328 UART: [update-reset] Copying MAN_2 To MAN_1
5,847,342 UART: [update-reset Success] --
5,848,327 UART: [state] Locking Datavault
5,849,213 UART: [state] Locking PCR0, PCR1 and PCR31
5,849,817 UART: [state] Locking ICCM
5,850,395 UART: [exit] Launching FMC @ 0x40000130
5,855,724 UART:
5,855,740 UART: Running Caliptra FMC ...
5,856,148 UART:
5,856,291 UART: [state] CFI Enabled
5,945,790 UART: [art] Extend RT PCRs Done
5,946,218 UART: [art] Lock RT PCRs Done
5,947,505 UART: [art] Populate DV Done
5,956,162 UART: [fht] FMC Alias Private Key: 7
5,957,180 UART: [art] Derive CDI
5,957,460 UART: [art] Store in in slot 0x4
6,043,353 UART: [art] Derive Key Pair
6,043,713 UART: [art] Store priv key in slot 0x5
6,057,267 UART: [art] Derive Key Pair - Done
6,071,654 UART: [art] Signing Cert with AUTHO
6,072,134 UART: RITY.KEYID = 7
6,087,184 UART: [art] Erasing AUTHORITY.KEYID = 7
6,087,949 UART: [art] PUB.X = 0FF4380AAC8D825CEAE71B09BF82A2537275957E030B3F04ED727993B90B40D88B0EB7A8061E0989D7959CB4DB2EF792
6,094,695 UART: [art] PUB.Y = 1E5D2117B40F0659ED7B40F766D0A5B0B98B697634ECE9201CAF709F310939909D46D7D4C96160451247E514916B002D
6,101,606 UART: [art] SIG.R = 1F22F13366668ACAA508CE6797CBD41E61C0A1C9DD27E8C2954CBAEB085EA8234AE9C98808C010E7109CEFC0E0BF84C5
6,108,383 UART: [art] SIG.S = C7D936347225B30C0C857200E236E1F6D5A691F6AD8BA3DE513FF77F7EB7DDA9DD4154FE0178835D15D7FB002DDCFD34
6,132,305 UART: Caliptra RT
6,132,650 UART: [state] CFI Enabled
6,417,879 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,988 ready_for_fw is high
1,060,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,190 >>> mbox cmd response: success
2,628,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,689,340 UART:
2,689,356 UART: Running Caliptra FMC ...
2,689,764 UART:
2,689,907 UART: [state] CFI Enabled
2,700,406 UART: [fht] FMC Alias Private Key: 7
2,808,873 UART: [art] Extend RT PCRs Done
2,809,301 UART: [art] Lock RT PCRs Done
2,810,673 UART: [art] Populate DV Done
2,818,838 UART: [fht] FMC Alias Private Key: 7
2,819,930 UART: [art] Derive CDI
2,820,210 UART: [art] Store in in slot 0x4
2,905,799 UART: [art] Derive Key Pair
2,906,159 UART: [art] Store priv key in slot 0x5
2,919,413 UART: [art] Derive Key Pair - Done
2,934,411 UART: [art] Signing Cert with AUTHO
2,934,891 UART: RITY.KEYID = 7
2,950,257 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,022 UART: [art] PUB.X = 7E861856DDB7375F1432EC1804542E1B372261C9A76D3F1E16452987468E8B0AEB2812D3834142B3B31CEE88E233412B
2,957,778 UART: [art] PUB.Y = 7856667EE063E5EA2764B263C63EEFA38550277B0D7E2C660662DD41C7DB9A3D8866B38139F217D631411E13A2BFBA33
2,964,722 UART: [art] SIG.R = A9A49F8493E5A6B0A452001FF5BC065539E788BACE92DE77D7E1D54A920247704417FBCAF3E2F40E850186BD4E9A0010
2,971,442 UART: [art] SIG.S = 3CC9D0458150428C12B6CD83E36E4AE095E5FF81D80E59A8787B69F676A982F1EDA796AE583115F71172ED38878E8A6F
2,995,590 UART: Caliptra RT
2,995,935 UART: [state] CFI Enabled
3,104,060 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,544,971 >>> mbox cmd response: success
5,558,315 UART:
5,558,331 UART: Running Caliptra FMC ...
5,558,739 UART:
5,558,882 UART: [state] CFI Enabled
5,648,337 UART: [art] Extend RT PCRs Done
5,648,765 UART: [art] Lock RT PCRs Done
5,650,016 UART: [art] Populate DV Done
5,658,559 UART: [fht] FMC Alias Private Key: 7
5,659,595 UART: [art] Derive CDI
5,659,875 UART: [art] Store in in slot 0x4
5,745,752 UART: [art] Derive Key Pair
5,746,112 UART: [art] Store priv key in slot 0x5
5,759,444 UART: [art] Derive Key Pair - Done
5,774,127 UART: [art] Signing Cert with AUTHO
5,774,607 UART: RITY.KEYID = 7
5,790,241 UART: [art] Erasing AUTHORITY.KEYID = 7
5,791,006 UART: [art] PUB.X = 5AA503A55D1C7C46148371FE876036C12602C5FE4C43706E6AA7BA49FDF71E33307DBE437A46A365F4AE08843D82BD74
5,797,771 UART: [art] PUB.Y = 833C1FE1AE69438EEE8A77BD47363148E5D36A6D448F33194D4FA2DDF39FDEC23FEE24AA8CCF8ADCD8F1735B6B30C963
5,804,743 UART: [art] SIG.R = 70682A158E5C1341EEFF480CE542F193DEA41E6C4DB07DF848FDA3BB612ADD8820D39219B865047127B81069DADD62F5
5,811,515 UART: [art] SIG.S = A5FE163979760183CE380FB56F962A2F5A824F73562844C0612B194D79C337A29F0F06FC283465D6C6499E9674291877
5,835,210 UART: Caliptra RT
5,835,555 UART: [state] CFI Enabled
6,111,402 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,821 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,173,015 UART: [idev] ++
1,173,183 UART: [idev] CDI.KEYID = 6
1,173,544 UART: [idev] SUBJECT.KEYID = 7
1,173,969 UART: [idev] UDS.KEYID = 0
1,174,315 ready_for_fw is high
1,174,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,753 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,233 UART: [idev] --
1,208,140 UART: [ldev] ++
1,208,308 UART: [ldev] CDI.KEYID = 6
1,208,672 UART: [ldev] SUBJECT.KEYID = 5
1,209,099 UART: [ldev] AUTHORITY.KEYID = 7
1,209,562 UART: [ldev] FE.KEYID = 1
1,214,430 UART: [ldev] Erasing FE.KEYID = 1
1,241,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,112 UART: [ldev] --
1,281,464 UART: [fwproc] Wait for Commands...
1,282,237 UART: [fwproc] Recv command 0x46574c44
1,282,970 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,284 >>> mbox cmd response: success
2,775,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,776,305 UART: [afmc] ++
2,776,473 UART: [afmc] CDI.KEYID = 6
2,776,836 UART: [afmc] SUBJECT.KEYID = 7
2,777,262 UART: [afmc] AUTHORITY.KEYID = 5
2,812,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,116 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,845 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,728 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,447 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,348 UART: [afmc] --
2,856,424 UART: [cold-reset] --
2,857,216 UART: [state] Locking Datavault
2,858,705 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,309 UART: [state] Locking ICCM
2,859,967 UART: [exit] Launching FMC @ 0x40000130
2,865,296 UART:
2,865,312 UART: Running Caliptra FMC ...
2,865,720 UART:
2,865,774 UART: [state] CFI Enabled
2,876,295 UART: [fht] FMC Alias Private Key: 7
2,984,618 UART: [art] Extend RT PCRs Done
2,985,046 UART: [art] Lock RT PCRs Done
2,986,326 UART: [art] Populate DV Done
2,994,453 UART: [fht] FMC Alias Private Key: 7
2,995,441 UART: [art] Derive CDI
2,995,721 UART: [art] Store in in slot 0x4
3,081,352 UART: [art] Derive Key Pair
3,081,712 UART: [art] Store priv key in slot 0x5
3,094,482 UART: [art] Derive Key Pair - Done
3,108,761 UART: [art] Signing Cert with AUTHO
3,109,241 UART: RITY.KEYID = 7
3,124,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,116 UART: [art] PUB.X = 2BAEC326959127E37216D8DBC1CF3835E8E15151A505E72945EF294FD45AB5AEF54C7BBDD116362C3B2A92753524E019
3,131,887 UART: [art] PUB.Y = E229295A04022BFEF1F3B8B360DE6991EBD3C4A8D4491EFFC4303A2970E0F8AAB1536D31413B72460B40596FBC45E373
3,138,834 UART: [art] SIG.R = 0DC5CB3DC26FA2248B44A00546AD9D582D30ABF79AC8448CB2BDF6136A71B26EEA4AC52901DAEE637636B574865F5EE5
3,145,611 UART: [art] SIG.S = 4B11F4EDAB2B12CEB206E307E509380507F0B6B387255D8E7732AB54BD44BB7CB29A537521F5EAF542536F9524CE11D5
3,169,375 UART: Caliptra RT
3,169,628 UART: [state] CFI Enabled
3,276,921 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,669 UART:
3,278,685 UART: Running Caliptra ROM ...
3,279,093 UART:
3,279,148 UART: [state] CFI Enabled
3,281,838 UART: [state] LifecycleState = Unprovisioned
3,282,493 UART: [state] DebugLocked = No
3,283,153 UART: [state] WD Timer not started. Device not locked for debugging
3,284,291 UART: [kat] SHA2-256
4,087,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,970 UART: [kat] ++
4,092,122 UART: [kat] sha1
4,096,260 UART: [kat] SHA2-256
4,098,200 UART: [kat] SHA2-384
4,100,927 UART: [kat] SHA2-512-ACC
4,102,827 UART: [kat] ECC-384
4,112,288 UART: [kat] HMAC-384Kdf
4,116,818 UART: [kat] LMS
4,365,130 UART: [kat] --
4,366,120 UART: [update-reset] ++
5,679,556 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,701 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,830,699 >>> mbox cmd response: success
5,831,026 UART: [update-reset] Copying MAN_2 To MAN_1
5,839,040 UART: [update-reset Success] --
5,839,975 UART: [state] Locking Datavault
5,840,761 UART: [state] Locking PCR0, PCR1 and PCR31
5,841,365 UART: [state] Locking ICCM
5,841,913 UART: [exit] Launching FMC @ 0x40000130
5,847,242 UART:
5,847,258 UART: Running Caliptra FMC ...
5,847,666 UART:
5,847,720 UART: [state] CFI Enabled
5,937,495 UART: [art] Extend RT PCRs Done
5,937,923 UART: [art] Lock RT PCRs Done
5,939,206 UART: [art] Populate DV Done
5,947,555 UART: [fht] FMC Alias Private Key: 7
5,948,555 UART: [art] Derive CDI
5,948,835 UART: [art] Store in in slot 0x4
6,034,424 UART: [art] Derive Key Pair
6,034,784 UART: [art] Store priv key in slot 0x5
6,047,992 UART: [art] Derive Key Pair - Done
6,062,709 UART: [art] Signing Cert with AUTHO
6,063,189 UART: RITY.KEYID = 7
6,078,221 UART: [art] Erasing AUTHORITY.KEYID = 7
6,078,986 UART: [art] PUB.X = 71AA3710458153491271C0F28536C41153C0F800AE8FCE002D99BA169C448070F931B49931412A7D86FCEE289DBE9BF5
6,085,708 UART: [art] PUB.Y = 769961826EFB0FBE241FF5F0F52F8CBAFABB8C44D1A3ED0A960A74C21EC3DCED3063CAC0351DBC476E6CE3476C838B1C
6,092,675 UART: [art] SIG.R = 905BB543F5C3570F20ACD69C3FB2EEB4A96CCA409F00DCA20836BAB5192CDEAC60D9CD2C57841158D51D7C88175B492F
6,099,433 UART: [art] SIG.S = 9190BC3368AD56311C8EDCD4D0122D13CFAC4EDE34DD360F22A6E689036C508C50A5177FE16BD76009F0942B15C4B91A
6,122,949 UART: Caliptra RT
6,123,202 UART: [state] CFI Enabled
6,404,450 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,194 ready_for_fw is high
1,056,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,708 >>> mbox cmd response: success
2,624,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,686,976 UART:
2,686,992 UART: Running Caliptra FMC ...
2,687,400 UART:
2,687,454 UART: [state] CFI Enabled
2,698,225 UART: [fht] FMC Alias Private Key: 7
2,805,922 UART: [art] Extend RT PCRs Done
2,806,350 UART: [art] Lock RT PCRs Done
2,807,902 UART: [art] Populate DV Done
2,816,107 UART: [fht] FMC Alias Private Key: 7
2,817,047 UART: [art] Derive CDI
2,817,327 UART: [art] Store in in slot 0x4
2,903,268 UART: [art] Derive Key Pair
2,903,628 UART: [art] Store priv key in slot 0x5
2,916,702 UART: [art] Derive Key Pair - Done
2,931,458 UART: [art] Signing Cert with AUTHO
2,931,938 UART: RITY.KEYID = 7
2,947,120 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,885 UART: [art] PUB.X = F37C1A34B2CE257EB29EE1C9C6D3C29DFBBDFD444C116C24A87B19981EE607BEB4C90DDE77158E048BA139736335CF0E
2,954,661 UART: [art] PUB.Y = 6096667172B0F7AD0F1862A45B8EEC72FA24D4EDC343D79E35005A23DA35DD798A5CA79B01824FD3115FF4B72D18ED7E
2,961,593 UART: [art] SIG.R = 7228BB0C62FD5D353E4C165F67A5992E34190507352A6927F6B2BD5A66B435A58567584A686B7D9FBC974B036062A03B
2,968,345 UART: [art] SIG.S = 1ECB826AEC5A300BDD4A0B303C5FAF45824D23169365178E3F916BBF14B64CC66578DD95AA7BD6A4FC8B93AB773799D8
2,992,098 UART: Caliptra RT
2,992,351 UART: [state] CFI Enabled
3,100,890 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,535,867 >>> mbox cmd response: success
5,549,149 UART:
5,549,165 UART: Running Caliptra FMC ...
5,549,573 UART:
5,549,627 UART: [state] CFI Enabled
5,638,666 UART: [art] Extend RT PCRs Done
5,639,094 UART: [art] Lock RT PCRs Done
5,640,433 UART: [art] Populate DV Done
5,648,702 UART: [fht] FMC Alias Private Key: 7
5,649,706 UART: [art] Derive CDI
5,649,986 UART: [art] Store in in slot 0x4
5,735,663 UART: [art] Derive Key Pair
5,736,023 UART: [art] Store priv key in slot 0x5
5,749,307 UART: [art] Derive Key Pair - Done
5,764,121 UART: [art] Signing Cert with AUTHO
5,764,601 UART: RITY.KEYID = 7
5,780,013 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,778 UART: [art] PUB.X = EF434DBF47C14E545E4A27242D782EB0B3E289EF1CEFD2208CB4C3E7A7BB0030D35A1E191477F5975940770B1E906670
5,787,527 UART: [art] PUB.Y = DA0D223B76D4A28471123411249CA7EA9EC76C389F3AEC9CA4B41FD8E46EA5BCBE4417EBF4D18FCAF27FA486A908F9E7
5,794,493 UART: [art] SIG.R = 6D9139E6489540263603507C3A31517866FDCE2D0DB90ECFD61BBD95042A0B3462D3A7DC59A72B8D295CC5EE32B29565
5,801,250 UART: [art] SIG.S = A710129EC5C00D6456079E8B5B2FE1FF2B577DAECFA22C65D26770DEF5528D38406EBF0130476DA0F712C35CEE46BC33
5,825,170 UART: Caliptra RT
5,825,423 UART: [state] CFI Enabled
6,112,020 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
891,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,930 UART: [kat] ++
896,082 UART: [kat] sha1
900,464 UART: [kat] SHA2-256
902,404 UART: [kat] SHA2-384
905,137 UART: [kat] SHA2-512-ACC
907,038 UART: [kat] ECC-384
916,991 UART: [kat] HMAC-384Kdf
921,725 UART: [kat] LMS
1,170,037 UART: [kat] --
1,170,842 UART: [cold-reset] ++
1,171,262 UART: [fht] FHT @ 0x50003400
1,173,956 UART: [idev] ++
1,174,124 UART: [idev] CDI.KEYID = 6
1,174,485 UART: [idev] SUBJECT.KEYID = 7
1,174,910 UART: [idev] UDS.KEYID = 0
1,175,256 ready_for_fw is high
1,175,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,480 UART: [idev] Sha1 KeyId Algorithm
1,208,116 UART: [idev] --
1,209,319 UART: [ldev] ++
1,209,487 UART: [ldev] CDI.KEYID = 6
1,209,851 UART: [ldev] SUBJECT.KEYID = 5
1,210,278 UART: [ldev] AUTHORITY.KEYID = 7
1,210,741 UART: [ldev] FE.KEYID = 1
1,216,151 UART: [ldev] Erasing FE.KEYID = 1
1,242,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,183 UART: [ldev] --
1,281,635 UART: [fwproc] Wait for Commands...
1,282,250 UART: [fwproc] Recv command 0x46574c44
1,282,983 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,079 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,997 >>> mbox cmd response: success
2,775,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,777,240 UART: [afmc] ++
2,777,408 UART: [afmc] CDI.KEYID = 6
2,777,771 UART: [afmc] SUBJECT.KEYID = 7
2,778,197 UART: [afmc] AUTHORITY.KEYID = 5
2,813,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,635 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,364 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,247 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,966 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,785 UART: [afmc] --
2,856,833 UART: [cold-reset] --
2,857,459 UART: [state] Locking Datavault
2,858,476 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,080 UART: [state] Locking ICCM
2,859,738 UART: [exit] Launching FMC @ 0x40000130
2,865,067 UART:
2,865,083 UART: Running Caliptra FMC ...
2,865,491 UART:
2,865,634 UART: [state] CFI Enabled
2,876,121 UART: [fht] FMC Alias Private Key: 7
2,983,120 UART: [art] Extend RT PCRs Done
2,983,548 UART: [art] Lock RT PCRs Done
2,985,022 UART: [art] Populate DV Done
2,993,025 UART: [fht] FMC Alias Private Key: 7
2,994,045 UART: [art] Derive CDI
2,994,325 UART: [art] Store in in slot 0x4
3,079,498 UART: [art] Derive Key Pair
3,079,858 UART: [art] Store priv key in slot 0x5
3,092,568 UART: [art] Derive Key Pair - Done
3,106,984 UART: [art] Signing Cert with AUTHO
3,107,464 UART: RITY.KEYID = 7
3,122,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,361 UART: [art] PUB.X = FEDBA6074B2AD98D7D2BBE30D4A3C3F6B21BC1CF6347B24D967C31968182490BBC29FA45E86FC0DDEDAF899BBAA0FAB4
3,130,155 UART: [art] PUB.Y = 692A398975CDA0DA1C9526744D7AC70174C432A7E01C4DE4759C212443F5D7212D6850795FCE4AEF4BCD5365806AE1BA
3,137,106 UART: [art] SIG.R = A312DFEC17C5BE582107B7617DA28C8FCFC18BF15E17EB3E46E8A2234020CBD6A5C3C65ADC303F0FCC37C0C6A1008A8E
3,143,870 UART: [art] SIG.S = BC9BED6CA776B55962710B53626163913692634DDEFAF7D161FAE6363834E3B1A91B7DB4E51C8A55F097EF412E72B9D6
3,167,280 UART: Caliptra RT
3,167,625 UART: [state] CFI Enabled
3,274,925 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,617 UART:
3,276,633 UART: Running Caliptra ROM ...
3,277,041 UART:
3,277,183 UART: [state] CFI Enabled
3,280,285 UART: [state] LifecycleState = Unprovisioned
3,280,940 UART: [state] DebugLocked = No
3,281,650 UART: [state] WD Timer not started. Device not locked for debugging
3,282,990 UART: [kat] SHA2-256
4,086,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,669 UART: [kat] ++
4,090,821 UART: [kat] sha1
4,094,851 UART: [kat] SHA2-256
4,096,791 UART: [kat] SHA2-384
4,099,482 UART: [kat] SHA2-512-ACC
4,101,382 UART: [kat] ECC-384
4,111,237 UART: [kat] HMAC-384Kdf
4,116,075 UART: [kat] LMS
4,364,387 UART: [kat] --
4,365,385 UART: [update-reset] ++
5,679,029 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,190 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,830,188 >>> mbox cmd response: success
5,830,487 UART: [update-reset] Copying MAN_2 To MAN_1
5,838,501 UART: [update-reset Success] --
5,839,490 UART: [state] Locking Datavault
5,840,338 UART: [state] Locking PCR0, PCR1 and PCR31
5,840,942 UART: [state] Locking ICCM
5,841,606 UART: [exit] Launching FMC @ 0x40000130
5,846,935 UART:
5,846,951 UART: Running Caliptra FMC ...
5,847,359 UART:
5,847,502 UART: [state] CFI Enabled
5,936,871 UART: [art] Extend RT PCRs Done
5,937,299 UART: [art] Lock RT PCRs Done
5,938,672 UART: [art] Populate DV Done
5,946,997 UART: [fht] FMC Alias Private Key: 7
5,948,013 UART: [art] Derive CDI
5,948,293 UART: [art] Store in in slot 0x4
6,034,138 UART: [art] Derive Key Pair
6,034,498 UART: [art] Store priv key in slot 0x5
6,048,060 UART: [art] Derive Key Pair - Done
6,063,016 UART: [art] Signing Cert with AUTHO
6,063,496 UART: RITY.KEYID = 7
6,078,586 UART: [art] Erasing AUTHORITY.KEYID = 7
6,079,351 UART: [art] PUB.X = E6428029E9A6C4F658AA59FF84A4C9072788B93B74D7DB176EBC670CA52BBA03988280AB697BFF872DEC9FF915D0D115
6,086,122 UART: [art] PUB.Y = E6C1B41BA56DEE534F318C3FCF928771F7EDD3BB872375AF2A21AC58982BB8F9109237101BFEBCB9CB45836E11484E45
6,093,084 UART: [art] SIG.R = 39C953B3D82F6505A172464B5FACEA39494374EA60533182011A3F37C197176D81B4F8E529BC5589C98F97E33DB39A93
6,099,842 UART: [art] SIG.S = 823EF08B4CF16A32B3666C9805052790A8E47E15C59F67C8CC40D812E9DB8EA93456C7B71105FC4FB92C6D05D7333D28
6,123,763 UART: Caliptra RT
6,124,108 UART: [state] CFI Enabled
6,408,215 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,569 ready_for_fw is high
1,056,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,257 >>> mbox cmd response: success
2,624,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,686,373 UART:
2,686,389 UART: Running Caliptra FMC ...
2,686,797 UART:
2,686,940 UART: [state] CFI Enabled
2,697,557 UART: [fht] FMC Alias Private Key: 7
2,805,450 UART: [art] Extend RT PCRs Done
2,805,878 UART: [art] Lock RT PCRs Done
2,807,778 UART: [art] Populate DV Done
2,815,863 UART: [fht] FMC Alias Private Key: 7
2,816,919 UART: [art] Derive CDI
2,817,199 UART: [art] Store in in slot 0x4
2,902,724 UART: [art] Derive Key Pair
2,903,084 UART: [art] Store priv key in slot 0x5
2,915,992 UART: [art] Derive Key Pair - Done
2,930,602 UART: [art] Signing Cert with AUTHO
2,931,082 UART: RITY.KEYID = 7
2,945,752 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,517 UART: [art] PUB.X = CD11ACCAEF0915E112BAE1408ED0A5DED36E271D8F4BEE5D75A23E2039B3B3B7677F66DC0043251A2F1E4AB9A13D7BFC
2,953,286 UART: [art] PUB.Y = 17A46A7E3F778F266F17BCC2AE94945CE62F476B015DF25E22FEC6227C75D8F0DDBE76C242B0F4A989F13DC9CA53B6A4
2,960,249 UART: [art] SIG.R = DDB1D617B4AE9DAF092C8328EFBBE2BA2E095EDEDADDE6D96F8A5FBBA53336632F6D4F0227C7EA7B10BDFC4A2AE33D52
2,967,046 UART: [art] SIG.S = CA5B344813899295B88274BF391496F8157FA65FF718D18C61FDA8F1DFE7B3F03036E62296C32E739B39EE996F2A324F
2,990,491 UART: Caliptra RT
2,990,836 UART: [state] CFI Enabled
3,099,238 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,536,002 >>> mbox cmd response: success
5,549,662 UART:
5,549,678 UART: Running Caliptra FMC ...
5,550,086 UART:
5,550,229 UART: [state] CFI Enabled
5,639,016 UART: [art] Extend RT PCRs Done
5,639,444 UART: [art] Lock RT PCRs Done
5,640,639 UART: [art] Populate DV Done
5,648,904 UART: [fht] FMC Alias Private Key: 7
5,650,062 UART: [art] Derive CDI
5,650,342 UART: [art] Store in in slot 0x4
5,735,863 UART: [art] Derive Key Pair
5,736,223 UART: [art] Store priv key in slot 0x5
5,749,521 UART: [art] Derive Key Pair - Done
5,764,285 UART: [art] Signing Cert with AUTHO
5,764,765 UART: RITY.KEYID = 7
5,780,209 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,974 UART: [art] PUB.X = A3AF19FB7F51C4F493BACA0E19E303A6AA6ED3E28DAD221E9595E8E2845833230FE4913703A69B6F0D430D335F173454
5,787,732 UART: [art] PUB.Y = D6D328D80CBE7BF90C186B06D5FF0261C869F0D60D142C6E659F0B03953841F64CC893705F27AFDD28A430D8A1E82B99
5,794,667 UART: [art] SIG.R = 488DA5DA5BEB9F5DFF0D1C720E714E2D01532A9D1DDBF679BBC27699ABD1D3B9A9C937188AB5F42AE023225F6BADB6C5
5,801,452 UART: [art] SIG.S = 7192172C294BF6E8E62767197A506207405C39F9035CC3306CC8A8F625FC4CB502B20D5CFF94EE8DE180DF404E0557C8
5,825,598 UART: Caliptra RT
5,825,943 UART: [state] CFI Enabled
6,108,540 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,113 UART:
192,492 UART: Running Caliptra ROM ...
193,647 UART:
193,801 UART: [state] CFI Enabled
265,602 UART: [state] LifecycleState = Unprovisioned
267,512 UART: [state] DebugLocked = No
269,406 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,565 UART: [kat] SHA2-256
443,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,769 UART: [kat] ++
454,249 UART: [kat] sha1
465,410 UART: [kat] SHA2-256
468,130 UART: [kat] SHA2-384
473,850 UART: [kat] SHA2-512-ACC
476,228 UART: [kat] ECC-384
2,767,261 UART: [kat] HMAC-384Kdf
2,779,503 UART: [kat] LMS
3,969,821 UART: [kat] --
3,973,340 UART: [cold-reset] ++
3,975,497 UART: [fht] Storing FHT @ 0x50003400
3,988,255 UART: [idev] ++
3,988,818 UART: [idev] CDI.KEYID = 6
3,989,849 UART: [idev] SUBJECT.KEYID = 7
3,991,022 UART: [idev] UDS.KEYID = 0
3,992,073 ready_for_fw is high
3,992,282 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,841 UART: [idev] Erasing UDS.KEYID = 0
7,324,621 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,828 UART: [idev] --
7,348,704 UART: [ldev] ++
7,349,276 UART: [ldev] CDI.KEYID = 6
7,350,219 UART: [ldev] SUBJECT.KEYID = 5
7,351,442 UART: [ldev] AUTHORITY.KEYID = 7
7,352,724 UART: [ldev] FE.KEYID = 1
7,382,207 UART: [ldev] Erasing FE.KEYID = 1
10,713,466 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,009,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,024,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,039,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,053,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,072,762 UART: [ldev] --
13,077,976 UART: [fwproc] Waiting for Commands...
13,080,024 UART: [fwproc] Received command 0x46574c44
13,082,211 UART: [fwproc] Received Image of size 114124 bytes
17,133,559 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,213,164 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,282,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,599,415 >>> mbox cmd response: success
17,604,391 UART: [afmc] ++
17,604,990 UART: [afmc] CDI.KEYID = 6
17,605,964 UART: [afmc] SUBJECT.KEYID = 7
17,607,691 UART: [afmc] AUTHORITY.KEYID = 5
20,969,519 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,266,554 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,268,807 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,283,187 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,298,020 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,312,498 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,335,202 UART: [afmc] --
23,339,562 UART: [cold-reset] --
23,344,556 UART: [state] Locking Datavault
23,347,715 UART: [state] Locking PCR0, PCR1 and PCR31
23,349,470 UART: [state] Locking ICCM
23,350,703 UART: [exit] Launching FMC @ 0x40000130
23,359,109 UART:
23,359,343 UART: Running Caliptra FMC ...
23,360,441 UART:
23,360,607 UART: [state] CFI Enabled
23,426,880 UART: [fht] FMC Alias Private Key: 7
25,765,239 UART: [art] Extend RT PCRs Done
25,766,583 UART: [art] Lock RT PCRs Done
25,768,002 UART: [art] Populate DV Done
25,773,590 UART: [fht] FMC Alias Private Key: 7
25,775,291 UART: [art] Derive CDI
25,776,105 UART: [art] Store in in slot 0x4
25,836,015 UART: [art] Derive Key Pair
25,837,014 UART: [art] Store priv key in slot 0x5
29,130,190 UART: [art] Derive Key Pair - Done
29,142,975 UART: [art] Signing Cert with AUTHO
29,144,284 UART: RITY.KEYID = 7
31,432,414 UART: [art] Erasing AUTHORITY.KEYID = 7
31,433,925 UART: [art] PUB.X = A159285C7AAEA2A2711F558C4A030D703CCF4DDE28E810BD49B85FB30B70ECDFF19AD1371669920BAD195077F2CDD688
31,441,170 UART: [art] PUB.Y = 3AD826486DC55E61F552BF4C8218685A5B3495AA6275938522BEFC352E27D6E85DF482C52B3FBEDD001242F86068EEDE
31,448,379 UART: [art] SIG.R = E44670F5CEBFA4402D6929303410964C59839BE408325D0150E0F969BD0356B32B2832E446EDF220A1D60E83424AB1E0
31,455,781 UART: [art] SIG.S = ED768BCE1B44591E9217FC1DFAEFF6E8512A8B72C7ADF9609924B3E1252A04FE8FD4ED850B2068C019BE521F7E40E6E0
32,761,316 UART: Caliptra RT
32,762,028 UART: [state] CFI Enabled
32,923,116 UART: [rt] RT listening for mailbox commands...
32,925,005 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,955,206 UART: [rt]cmd =0x434b4558, len=80
38,687,171 >>> mbox cmd response data (6280 bytes)
38,721,468 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,751,828 UART: [rt]cmd =0x414c544e, len=41
38,754,109 >>> mbox cmd response data (8 bytes)
38,754,704 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,785,398 UART: [rt]cmd =0x434b4558, len=80
44,532,069 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,781,576 ready_for_fw is high
3,782,259 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,851,826 >>> mbox cmd response: success
23,548,909 UART:
23,549,300 UART: Running Caliptra FMC ...
23,550,512 UART:
23,550,687 UART: [state] CFI Enabled
23,617,448 UART: [fht] FMC Alias Private Key: 7
25,954,925 UART: [art] Extend RT PCRs Done
25,956,194 UART: [art] Lock RT PCRs Done
25,958,016 UART: [art] Populate DV Done
25,963,387 UART: [fht] FMC Alias Private Key: 7
25,965,095 UART: [art] Derive CDI
25,965,839 UART: [art] Store in in slot 0x4
26,025,602 UART: [art] Derive Key Pair
26,026,817 UART: [art] Store priv key in slot 0x5
29,319,107 UART: [art] Derive Key Pair - Done
29,332,479 UART: [art] Signing Cert with AUTHO
29,333,784 UART: RITY.KEYID = 7
31,619,444 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,957 UART: [art] PUB.X = E627E6AE845F388707343D70C865727E63ACDF1519E03E2F50778F0F620094CC82B0D6E55F239F5B3B8E704783567FDA
31,628,212 UART: [art] PUB.Y = 7FA02A161132A0B057D7E887694CFCCAAE004BBBC7BC98238D9C3AC51A53C558D80CB6A9BBA7E83FCF5EA2CB013B5EEA
31,635,439 UART: [art] SIG.R = 23FBE1500B12BBD65836953962C18B7C4C69872CC56C3A0B7050395938F9D3E7E24B51397616825AB9EA1A9B17CEC2E7
31,642,856 UART: [art] SIG.S = B1ABA3E1B1144C51FD89AA6F4E32ED96E35E66C0CACAAD2556B9FD6D33337BE539287A4B5D23ED1E06493812DE10BB51
32,947,683 UART: Caliptra RT
32,948,399 UART: [state] CFI Enabled
33,109,888 UART: [rt] RT listening for mailbox commands...
33,111,789 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,142,321 UART: [rt]cmd =0x434b4558, len=80
38,893,931 >>> mbox cmd response data (6280 bytes)
38,927,967 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,958,086 UART: [rt]cmd =0x414c544e, len=41
38,960,490 >>> mbox cmd response data (8 bytes)
38,961,073 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,991,597 UART: [rt]cmd =0x434b4558, len=80
44,736,399 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,491 UART:
192,872 UART: Running Caliptra ROM ...
194,053 UART:
603,548 UART: [state] CFI Enabled
615,237 UART: [state] LifecycleState = Unprovisioned
617,163 UART: [state] DebugLocked = No
620,102 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,111 UART: [kat] SHA2-256
793,826 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,336 UART: [kat] ++
804,772 UART: [kat] sha1
817,055 UART: [kat] SHA2-256
819,770 UART: [kat] SHA2-384
825,613 UART: [kat] SHA2-512-ACC
827,973 UART: [kat] ECC-384
3,112,259 UART: [kat] HMAC-384Kdf
3,123,448 UART: [kat] LMS
4,313,591 UART: [kat] --
4,319,308 UART: [cold-reset] ++
4,320,745 UART: [fht] Storing FHT @ 0x50003400
4,332,292 UART: [idev] ++
4,332,874 UART: [idev] CDI.KEYID = 6
4,333,796 UART: [idev] SUBJECT.KEYID = 7
4,335,043 UART: [idev] UDS.KEYID = 0
4,336,107 ready_for_fw is high
4,336,335 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,721 UART: [idev] Erasing UDS.KEYID = 0
7,618,860 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,549 UART: [idev] --
7,644,852 UART: [ldev] ++
7,645,423 UART: [ldev] CDI.KEYID = 6
7,646,377 UART: [ldev] SUBJECT.KEYID = 5
7,647,637 UART: [ldev] AUTHORITY.KEYID = 7
7,648,863 UART: [ldev] FE.KEYID = 1
7,660,226 UART: [ldev] Erasing FE.KEYID = 1
10,948,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,066 UART: [ldev] --
13,308,782 UART: [fwproc] Waiting for Commands...
13,311,893 UART: [fwproc] Received command 0x46574c44
13,314,065 UART: [fwproc] Received Image of size 114124 bytes
17,368,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,824,592 >>> mbox cmd response: success
17,828,015 UART: [afmc] ++
17,828,606 UART: [afmc] CDI.KEYID = 6
17,829,625 UART: [afmc] SUBJECT.KEYID = 7
17,830,782 UART: [afmc] AUTHORITY.KEYID = 5
21,148,965 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,936 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,195 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,583 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,406 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,861 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,442 UART: [afmc] --
23,515,759 UART: [cold-reset] --
23,520,369 UART: [state] Locking Datavault
23,527,077 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,833 UART: [state] Locking ICCM
23,531,139 UART: [exit] Launching FMC @ 0x40000130
23,539,529 UART:
23,539,767 UART: Running Caliptra FMC ...
23,540,865 UART:
23,541,018 UART: [state] CFI Enabled
23,549,252 UART: [fht] FMC Alias Private Key: 7
25,880,075 UART: [art] Extend RT PCRs Done
25,881,302 UART: [art] Lock RT PCRs Done
25,883,190 UART: [art] Populate DV Done
25,888,704 UART: [fht] FMC Alias Private Key: 7
25,890,396 UART: [art] Derive CDI
25,891,167 UART: [art] Store in in slot 0x4
25,933,701 UART: [art] Derive Key Pair
25,934,702 UART: [art] Store priv key in slot 0x5
29,176,878 UART: [art] Derive Key Pair - Done
29,189,973 UART: [art] Signing Cert with AUTHO
29,191,272 UART: RITY.KEYID = 7
31,470,347 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,844 UART: [art] PUB.X = 08E00BE9B372B7E69993E05773D024A68D89F3E945777F99396C8019ABF644167944602AAD677A592829A6E7F158CAB0
31,479,051 UART: [art] PUB.Y = B049523DE4308D3CC0A67F0F0CEC887E99BEDF218E0E8D050637B8E3A01D720AFBAC5714CD932A97C027D9FB75D778DC
31,486,321 UART: [art] SIG.R = 3354857C514AF8FF9CB30D69ACA7C3804D4FB8ACF46AB81D7F40B6C8DF91662757F40BAF33F55023071B5727EADA122D
31,493,728 UART: [art] SIG.S = C58A3049D34E59962736D04F044A4994B7BA1834DF72D65D974998111CDCAE5A778A1B100F7502A914E0BD81445875C3
32,799,117 UART: Caliptra RT
32,799,822 UART: [state] CFI Enabled
32,917,533 UART: [rt] RT listening for mailbox commands...
32,919,438 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,949,756 UART: [rt]cmd =0x434b4558, len=80
38,609,495 >>> mbox cmd response data (6280 bytes)
38,643,047 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,673,173 UART: [rt]cmd =0x414c544e, len=41
38,675,569 >>> mbox cmd response data (8 bytes)
38,676,132 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,706,264 UART: [rt]cmd =0x434b4558, len=80
44,365,509 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
4,129,907 ready_for_fw is high
4,130,442 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,706 >>> mbox cmd response: success
23,711,690 UART:
23,712,079 UART: Running Caliptra FMC ...
23,713,184 UART:
23,713,343 UART: [state] CFI Enabled
23,721,348 UART: [fht] FMC Alias Private Key: 7
26,051,987 UART: [art] Extend RT PCRs Done
26,053,231 UART: [art] Lock RT PCRs Done
26,054,994 UART: [art] Populate DV Done
26,060,436 UART: [fht] FMC Alias Private Key: 7
26,062,032 UART: [art] Derive CDI
26,062,868 UART: [art] Store in in slot 0x4
26,105,638 UART: [art] Derive Key Pair
26,106,675 UART: [art] Store priv key in slot 0x5
29,348,451 UART: [art] Derive Key Pair - Done
29,361,610 UART: [art] Signing Cert with AUTHO
29,362,903 UART: RITY.KEYID = 7
31,642,339 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,835 UART: [art] PUB.X = 2DB35AAF8897F286F6C25E5A070249B956069860F2A67FA8E570F2D782396A53A732BE2D5C17B249CB107509CAC5F4FC
31,651,058 UART: [art] PUB.Y = CE6E20048095620F58019C8CF83203D5858689D57085F1E797A5CAED44438CEDF6C92052A186370EA346FBE289207494
31,658,339 UART: [art] SIG.R = 409742BD966F967D803691329BEF8BF85DDB98BB967841824F0236BBA3C9FFD22C52F416CCE9FD1708248E5A59D8ECF1
31,665,707 UART: [art] SIG.S = 6974441B56B407A57F5DDD4110C23B3FC2F4CC7FBDE07510680F220505AC8B8C812B1B329C0908A6156B19E181228BA7
32,970,415 UART: Caliptra RT
32,971,135 UART: [state] CFI Enabled
33,088,536 UART: [rt] RT listening for mailbox commands...
33,090,446 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,121,080 UART: [rt]cmd =0x434b4558, len=80
38,780,237 >>> mbox cmd response data (6280 bytes)
38,814,190 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,844,353 UART: [rt]cmd =0x414c544e, len=41
38,846,574 >>> mbox cmd response data (8 bytes)
38,847,160 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,877,517 UART: [rt]cmd =0x434b4558, len=80
44,537,381 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,180 UART:
192,535 UART: Running Caliptra ROM ...
193,629 UART:
193,773 UART: [state] CFI Enabled
263,684 UART: [state] LifecycleState = Unprovisioned
265,608 UART: [state] DebugLocked = No
267,998 UART: [state] WD Timer not started. Device not locked for debugging
271,814 UART: [kat] SHA2-256
450,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,507 UART: [kat] ++
463,017 UART: [kat] sha1
473,841 UART: [kat] SHA2-256
476,923 UART: [kat] SHA2-384
483,198 UART: [kat] SHA2-512-ACC
486,139 UART: [kat] ECC-384
2,952,499 UART: [kat] HMAC-384Kdf
2,977,011 UART: [kat] LMS
3,506,453 UART: [kat] --
3,511,457 UART: [cold-reset] ++
3,513,225 UART: [fht] FHT @ 0x50003400
3,523,505 UART: [idev] ++
3,524,079 UART: [idev] CDI.KEYID = 6
3,525,006 UART: [idev] SUBJECT.KEYID = 7
3,526,189 UART: [idev] UDS.KEYID = 0
3,527,244 ready_for_fw is high
3,527,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,672,047 UART: [idev] Erasing UDS.KEYID = 0
6,034,965 UART: [idev] Sha1 KeyId Algorithm
6,057,181 UART: [idev] --
6,061,315 UART: [ldev] ++
6,061,902 UART: [ldev] CDI.KEYID = 6
6,062,838 UART: [ldev] SUBJECT.KEYID = 5
6,063,997 UART: [ldev] AUTHORITY.KEYID = 7
6,065,230 UART: [ldev] FE.KEYID = 1
6,110,747 UART: [ldev] Erasing FE.KEYID = 1
8,617,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,384,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,420,399 UART: [ldev] --
10,425,611 UART: [fwproc] Wait for Commands...
10,428,455 UART: [fwproc] Recv command 0x46574c44
10,430,548 UART: [fwproc] Recv'd Img size: 114448 bytes
13,837,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,913,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,982,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,301,166 >>> mbox cmd response: success
14,305,223 UART: [afmc] ++
14,305,895 UART: [afmc] CDI.KEYID = 6
14,306,804 UART: [afmc] SUBJECT.KEYID = 7
14,307,823 UART: [afmc] AUTHORITY.KEYID = 5
16,840,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,561,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,563,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,579,245 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,595,208 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,611,094 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,634,667 UART: [afmc] --
18,637,930 UART: [cold-reset] --
18,640,828 UART: [state] Locking Datavault
18,647,434 UART: [state] Locking PCR0, PCR1 and PCR31
18,649,095 UART: [state] Locking ICCM
18,650,241 UART: [exit] Launching FMC @ 0x40000130
18,658,508 UART:
18,658,748 UART: Running Caliptra FMC ...
18,659,881 UART:
18,660,059 UART: [state] CFI Enabled
18,726,765 UART: [fht] FMC Alias Private Key: 7
20,490,815 UART: [art] Extend RT PCRs Done
20,492,644 UART: [art] Lock RT PCRs Done
20,493,829 UART: [art] Populate DV Done
20,498,998 UART: [fht] FMC Alias Private Key: 7
20,500,712 UART: [art] Derive CDI
20,501,529 UART: [art] Store in in slot 0x4
20,558,733 UART: [art] Derive Key Pair
20,560,093 UART: [art] Store priv key in slot 0x5
23,031,827 UART: [art] Derive Key Pair - Done
23,044,863 UART: [art] Signing Cert with AUTHO
23,046,260 UART: RITY.KEYID = 7
24,761,505 UART: [art] Erasing AUTHORITY.KEYID = 7
24,763,478 UART: [art] PUB.X = 65A676086704AC03D89EBFC59F6457153FB9A76FF5172D9145C53200A7D85134939C126255EEE804049A7EDC08B3EE7F
24,770,317 UART: [art] PUB.Y = 823879E210DAF3F4405EE04D1EA12F5C7D142BE94950FE9E8F774F04E305316F31F8DBC87C4D67AB759CA17C09976699
24,777,787 UART: [art] SIG.R = AEDFA94E9D5CA67186961B56ECCE86823C25E722C97E140C599DAF5C7860AF11B053756B760602DD6C00E6A7CDCECBAF
24,784,899 UART: [art] SIG.S = 69B8060D3791207DC2C339940135326EABB7F9F90DA0D3B2032008D9F372511E05414BFCBEA2F3C601B037AAE2A4D8C6
25,764,123 UART: Caliptra RT
25,765,194 UART: [state] CFI Enabled
25,930,148 UART: [rt] RT listening for mailbox commands...
25,932,242 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,963,588 UART: [rt]cmd =0x434b4558, len=80
30,313,843 >>> mbox cmd response data (6280 bytes)
30,348,611 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,379,071 UART: [rt]cmd =0x414c544e, len=41
30,381,581 >>> mbox cmd response data (8 bytes)
30,382,342 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,412,710 UART: [rt]cmd =0x434b4558, len=80
34,751,790 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,380,143 ready_for_fw is high
3,380,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,092,040 >>> mbox cmd response: success
18,389,316 UART:
18,389,773 UART: Running Caliptra FMC ...
18,390,933 UART:
18,391,101 UART: [state] CFI Enabled
18,453,757 UART: [fht] FMC Alias Private Key: 7
20,217,711 UART: [art] Extend RT PCRs Done
20,218,933 UART: [art] Lock RT PCRs Done
20,220,612 UART: [art] Populate DV Done
20,226,185 UART: [fht] FMC Alias Private Key: 7
20,227,779 UART: [art] Derive CDI
20,228,595 UART: [art] Store in in slot 0x4
20,286,781 UART: [art] Derive Key Pair
20,287,850 UART: [art] Store priv key in slot 0x5
22,750,730 UART: [art] Derive Key Pair - Done
22,763,344 UART: [art] Signing Cert with AUTHO
22,764,662 UART: RITY.KEYID = 7
24,477,059 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,604 UART: [art] PUB.X = ED68994F0988491F860215AB23B0BFEBFB4385F64A17BBA8CC168D1E69113D9F913825656D2F81C7489483836D0AB7C7
24,485,815 UART: [art] PUB.Y = 82378F44ED355EB8396129C179750406D66ECD6E49A9CE36DC61EEE0C27EFC9760F86BEC5519327D4AE7E34032DB2E36
24,493,046 UART: [art] SIG.R = C1F1CE180FDE72C78C63EFE8B7C2C0472AF77FD46D88A47017D63FB57499761207CB54692560CE6FEA7267DDFC09E764
24,500,446 UART: [art] SIG.S = 180D20CEA4D999A596BFF79B241D759296215B9A9258E57FFB0685F87CDCC1144A24DD310F7F9F4D7C222DE304FEE8EB
25,479,400 UART: Caliptra RT
25,480,107 UART: [state] CFI Enabled
25,644,649 UART: [rt] RT listening for mailbox commands...
25,646,546 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,677,493 UART: [rt]cmd =0x434b4558, len=80
30,003,676 >>> mbox cmd response data (6280 bytes)
30,037,518 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,067,803 UART: [rt]cmd =0x414c544e, len=41
30,070,305 >>> mbox cmd response data (8 bytes)
30,070,794 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,101,301 UART: [rt]cmd =0x434b4558, len=80
34,439,224 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,386 UART:
192,752 UART: Running Caliptra ROM ...
193,931 UART:
603,655 UART: [state] CFI Enabled
619,177 UART: [state] LifecycleState = Unprovisioned
621,085 UART: [state] DebugLocked = No
622,978 UART: [state] WD Timer not started. Device not locked for debugging
626,158 UART: [kat] SHA2-256
805,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,854 UART: [kat] ++
817,384 UART: [kat] sha1
827,618 UART: [kat] SHA2-256
830,617 UART: [kat] SHA2-384
836,951 UART: [kat] SHA2-512-ACC
839,898 UART: [kat] ECC-384
3,278,771 UART: [kat] HMAC-384Kdf
3,291,033 UART: [kat] LMS
3,820,565 UART: [kat] --
3,824,483 UART: [cold-reset] ++
3,826,832 UART: [fht] FHT @ 0x50003400
3,837,654 UART: [idev] ++
3,838,217 UART: [idev] CDI.KEYID = 6
3,839,207 UART: [idev] SUBJECT.KEYID = 7
3,840,374 UART: [idev] UDS.KEYID = 0
3,841,445 ready_for_fw is high
3,841,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,913 UART: [idev] Erasing UDS.KEYID = 0
6,317,997 UART: [idev] Sha1 KeyId Algorithm
6,342,364 UART: [idev] --
6,346,680 UART: [ldev] ++
6,347,261 UART: [ldev] CDI.KEYID = 6
6,348,148 UART: [ldev] SUBJECT.KEYID = 5
6,349,296 UART: [ldev] AUTHORITY.KEYID = 7
6,350,627 UART: [ldev] FE.KEYID = 1
6,361,454 UART: [ldev] Erasing FE.KEYID = 1
8,837,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,494 UART: [ldev] --
10,629,494 UART: [fwproc] Wait for Commands...
10,632,399 UART: [fwproc] Recv command 0x46574c44
10,634,491 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,031 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,843 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,307 >>> mbox cmd response: success
14,489,737 UART: [afmc] ++
14,490,326 UART: [afmc] CDI.KEYID = 6
14,491,227 UART: [afmc] SUBJECT.KEYID = 7
14,492,438 UART: [afmc] AUTHORITY.KEYID = 5
16,994,936 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,986 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,743 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,639 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,857 UART: [afmc] --
18,792,211 UART: [cold-reset] --
18,796,830 UART: [state] Locking Datavault
18,802,233 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,945 UART: [state] Locking ICCM
18,805,225 UART: [exit] Launching FMC @ 0x40000130
18,813,670 UART:
18,813,903 UART: Running Caliptra FMC ...
18,814,997 UART:
18,815,145 UART: [state] CFI Enabled
18,822,857 UART: [fht] FMC Alias Private Key: 7
20,579,656 UART: [art] Extend RT PCRs Done
20,580,874 UART: [art] Lock RT PCRs Done
20,582,384 UART: [art] Populate DV Done
20,587,787 UART: [fht] FMC Alias Private Key: 7
20,589,423 UART: [art] Derive CDI
20,590,228 UART: [art] Store in in slot 0x4
20,632,606 UART: [art] Derive Key Pair
20,633,638 UART: [art] Store priv key in slot 0x5
23,060,471 UART: [art] Derive Key Pair - Done
23,073,489 UART: [art] Signing Cert with AUTHO
23,074,797 UART: RITY.KEYID = 7
24,780,456 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,957 UART: [art] PUB.X = 9543EF9DF115B1A1DF23C2BEA676CB7E2E3AC4EF888C2A6B4BEB1F9683E110F689278125E102BC180AF9FEA82AF374A6
24,789,246 UART: [art] PUB.Y = BF8800103249820393D318104D2D8FD3C7E345EC2BE9B933EE15B8BCEA53873737E4F6FA909FFF5408DA94A92816DBE2
24,796,513 UART: [art] SIG.R = EFBDC06E1945A352C257F8171AFD1E2F60466040C0166419322AE35637D7D5782ABE4EDC9713A3AA4F9807484341F740
24,803,829 UART: [art] SIG.S = 58044FAFC919B835C423F1477727913F3A290BEBE7C6F32E311E808E0744939EFB547F7625E589CC8500F4D303DC87BC
25,783,055 UART: Caliptra RT
25,783,768 UART: [state] CFI Enabled
25,901,474 UART: [rt] RT listening for mailbox commands...
25,903,363 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,933,867 UART: [rt]cmd =0x434b4558, len=80
30,205,094 >>> mbox cmd response data (6280 bytes)
30,238,893 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,269,184 UART: [rt]cmd =0x414c544e, len=41
30,271,535 >>> mbox cmd response data (8 bytes)
30,272,025 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,302,197 UART: [rt]cmd =0x434b4558, len=80
34,572,387 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,693,637 ready_for_fw is high
3,694,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,287,577 >>> mbox cmd response: success
18,539,641 UART:
18,540,038 UART: Running Caliptra FMC ...
18,541,230 UART:
18,541,390 UART: [state] CFI Enabled
18,549,224 UART: [fht] FMC Alias Private Key: 7
20,306,412 UART: [art] Extend RT PCRs Done
20,307,637 UART: [art] Lock RT PCRs Done
20,309,367 UART: [art] Populate DV Done
20,314,627 UART: [fht] FMC Alias Private Key: 7
20,316,274 UART: [art] Derive CDI
20,317,007 UART: [art] Store in in slot 0x4
20,359,767 UART: [art] Derive Key Pair
20,360,763 UART: [art] Store priv key in slot 0x5
22,786,727 UART: [art] Derive Key Pair - Done
22,799,611 UART: [art] Signing Cert with AUTHO
22,800,948 UART: RITY.KEYID = 7
24,506,437 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,937 UART: [art] PUB.X = 8FEE156785BF87F0B022BABF8C604751521E839BDCD75D29C0927A503580CC3C32FBB33DC3FFB1283667FA93BBA52403
24,515,228 UART: [art] PUB.Y = 1E9FD3B2B111EDAF05CCFF3EE7DFF1F9CF91D67D5A121EADC2FFCE3FB5DA4ED27AB1BE115D72A909A5BA0E63C6B03D1C
24,522,578 UART: [art] SIG.R = D36B2C9CCD4F19853A8E992C406ADD80213C51D7947ED8C1CA69D981743BF6AC8D009AC43B720D6209FA9A4925E35F87
24,529,921 UART: [art] SIG.S = FFC066A1722AADFE144D73C3793C3B2FD157AC8103597201B71F56ADDAFCCF4F5934F77E2732EFDB112B3AF4D178630F
25,508,822 UART: Caliptra RT
25,509,527 UART: [state] CFI Enabled
25,625,838 UART: [rt] RT listening for mailbox commands...
25,627,723 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,658,031 UART: [rt]cmd =0x434b4558, len=80
29,928,702 >>> mbox cmd response data (6280 bytes)
29,962,655 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
29,992,704 UART: [rt]cmd =0x414c544e, len=41
29,994,981 >>> mbox cmd response data (8 bytes)
29,995,565 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,025,977 UART: [rt]cmd =0x434b4558, len=80
34,296,617 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,439,580 ready_for_fw is high
3,440,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,931 >>> mbox cmd response: success
19,048,679 UART:
19,049,089 UART: Running Caliptra FMC ...
19,050,317 UART:
19,050,490 UART: [state] CFI Enabled
19,118,555 UART: [fht] FMC Alias Private Key: 7
20,882,816 UART: [art] Extend RT PCRs Done
20,884,032 UART: [art] Lock RT PCRs Done
20,885,662 UART: [art] Populate DV Done
20,891,181 UART: [fht] FMC Alias Private Key: 7
20,892,670 UART: [art] Derive CDI
20,893,407 UART: [art] Store in in slot 0x4
20,951,862 UART: [art] Derive Key Pair
20,952,902 UART: [art] Store priv key in slot 0x5
23,415,930 UART: [art] Derive Key Pair - Done
23,428,922 UART: [art] Signing Cert with AUTHO
23,430,221 UART: RITY.KEYID = 7
25,141,921 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,431 UART: [art] PUB.X = 6ED311B45F7EF5A3BD7B18A752577071FF8BBE6D2A3F178DAA63D7F64F4A95C33D4DF311E327D41FDF33C9337390260A
25,150,703 UART: [art] PUB.Y = EB3F26D2BE48351A51048284C65DC0CE72E972FE0B7ACF6A3E399987165158FADE7A024672F1A73BFB46A90C33993BD0
25,157,960 UART: [art] SIG.R = 69F54C18494CA4224F3ADCB4858445787A365F526C885DA25C042619625E8A47847ED3B0C17FB508BB375AB8D598DB6B
25,165,368 UART: [art] SIG.S = 9EE303CE78D33D53AF41F20808E89E33D57161A3B146664C418FAFBC24689DE98D473A1AA048EA52110D8826CC54442E
26,144,156 UART: Caliptra RT
26,144,843 UART: [state] CFI Enabled
26,310,444 UART: [rt] RT listening for mailbox commands...
26,312,328 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,343,123 UART: [rt]cmd =0x434b4558, len=80
30,668,866 >>> mbox cmd response data (6280 bytes)
30,702,578 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,732,711 UART: [rt]cmd =0x414c544e, len=41
30,735,057 >>> mbox cmd response data (8 bytes)
30,735,643 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,765,889 UART: [rt]cmd =0x434b4558, len=80
35,105,890 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,755,273 ready_for_fw is high
3,755,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,767 >>> mbox cmd response: success
19,208,590 UART:
19,208,977 UART: Running Caliptra FMC ...
19,210,168 UART:
19,210,352 UART: [state] CFI Enabled
19,218,408 UART: [fht] FMC Alias Private Key: 7
20,974,763 UART: [art] Extend RT PCRs Done
20,975,990 UART: [art] Lock RT PCRs Done
20,977,717 UART: [art] Populate DV Done
20,983,176 UART: [fht] FMC Alias Private Key: 7
20,984,656 UART: [art] Derive CDI
20,985,410 UART: [art] Store in in slot 0x4
21,027,954 UART: [art] Derive Key Pair
21,028,998 UART: [art] Store priv key in slot 0x5
23,455,217 UART: [art] Derive Key Pair - Done
23,468,152 UART: [art] Signing Cert with AUTHO
23,469,459 UART: RITY.KEYID = 7
25,174,868 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,368 UART: [art] PUB.X = BAD73F07F8741BACC3FC68502A2E1857ABE9FCED0AF5034A79430EE8955F8F46E8BF88DE076E0A66151D155AD11A9340
25,183,847 UART: [art] PUB.Y = D36A47C366C38137369C65E41E405BEF0ECDFCF78A41BB02C498082C00D8EFBEB9D67B557347F60913489BE919060584
25,190,868 UART: [art] SIG.R = 36D1EE09E96FE85E2192D568EAC17E2FA09A60C8BBDB31A6905FE391B487F2F69199DC84BBE8E5A4621D9B2DF0838A31
25,198,307 UART: [art] SIG.S = 9489C2813928070B134FC7315939A115E87C43427FF5186B397CC6DF66C4B61D4AF3EB7B8E629678B4C551F44AC3BB2C
26,177,420 UART: Caliptra RT
26,178,107 UART: [state] CFI Enabled
26,294,893 UART: [rt] RT listening for mailbox commands...
26,296,770 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,327,021 UART: [rt]cmd =0x434b4558, len=80
30,596,845 >>> mbox cmd response data (6280 bytes)
30,630,618 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,660,895 UART: [rt]cmd =0x414c544e, len=41
30,663,452 >>> mbox cmd response data (8 bytes)
30,664,025 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,694,221 UART: [rt]cmd =0x434b4558, len=80
34,963,809 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,787 UART: [kat] SHA2-256
881,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,833 UART: [kat] ++
885,985 UART: [kat] sha1
890,379 UART: [kat] SHA2-256
892,317 UART: [kat] SHA2-384
894,910 UART: [kat] SHA2-512-ACC
896,811 UART: [kat] ECC-384
902,124 UART: [kat] HMAC-384Kdf
906,736 UART: [kat] LMS
1,474,932 UART: [kat] --
1,475,877 UART: [cold-reset] ++
1,476,295 UART: [fht] Storing FHT @ 0x50003400
1,479,018 UART: [idev] ++
1,479,186 UART: [idev] CDI.KEYID = 6
1,479,546 UART: [idev] SUBJECT.KEYID = 7
1,479,970 UART: [idev] UDS.KEYID = 0
1,480,315 ready_for_fw is high
1,480,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,224 UART: [idev] Erasing UDS.KEYID = 0
1,504,506 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,054 UART: [idev] --
1,514,239 UART: [ldev] ++
1,514,407 UART: [ldev] CDI.KEYID = 6
1,514,770 UART: [ldev] SUBJECT.KEYID = 5
1,515,196 UART: [ldev] AUTHORITY.KEYID = 7
1,515,659 UART: [ldev] FE.KEYID = 1
1,520,857 UART: [ldev] Erasing FE.KEYID = 1
1,546,592 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,368 UART: [ldev] --
1,585,635 UART: [fwproc] Waiting for Commands...
1,586,474 UART: [fwproc] Received command 0x46574c44
1,587,265 UART: [fwproc] Received Image of size 114448 bytes
2,887,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,684 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,187 >>> mbox cmd response: success
3,080,291 UART: [afmc] ++
3,080,459 UART: [afmc] CDI.KEYID = 6
3,080,821 UART: [afmc] SUBJECT.KEYID = 7
3,081,246 UART: [afmc] AUTHORITY.KEYID = 5
3,115,991 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,041 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,821 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,549 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,434 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,124 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,029 UART: [afmc] --
3,159,075 UART: [cold-reset] --
3,160,171 UART: [state] Locking Datavault
3,161,332 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,936 UART: [state] Locking ICCM
3,162,446 UART: [exit] Launching FMC @ 0x40000130
3,167,775 UART:
3,167,791 UART: Running Caliptra FMC ...
3,168,199 UART:
3,168,253 UART: [state] CFI Enabled
3,178,436 UART: [fht] FMC Alias Private Key: 7
3,286,687 UART: [art] Extend RT PCRs Done
3,287,115 UART: [art] Lock RT PCRs Done
3,288,797 UART: [art] Populate DV Done
3,296,952 UART: [fht] FMC Alias Private Key: 7
3,298,080 UART: [art] Derive CDI
3,298,360 UART: [art] Store in in slot 0x4
3,384,171 UART: [art] Derive Key Pair
3,384,531 UART: [art] Store priv key in slot 0x5
3,397,599 UART: [art] Derive Key Pair - Done
3,412,464 UART: [art] Signing Cert with AUTHO
3,412,944 UART: RITY.KEYID = 7
3,427,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,459 UART: [art] PUB.X = 5B4F12A244274D756EDBB6435DF4833B85C92816A6D74CD42E5774EA92FF17D3CD1237FC25B3CF64C46C895B7FF4997C
3,435,237 UART: [art] PUB.Y = F88B4462CBA7B3E3800EE27ED479A194F78A4A2711E967803D86498D7DE3474BF658E8B25DD3C7E95321237254CA0425
3,442,179 UART: [art] SIG.R = 6B29C88AC3916D3785ADD2587722113177F1ECE0B4F8C8993DFDCFD78CF1C6B12A70EFCA2864D2517893B3762608ADE7
3,448,954 UART: [art] SIG.S = F86EB3D632A0B7ACD03538C0C560B7AD507655F615250AB664C2302D8EBADF921F7BC6492A8CB05E0985879DB5415935
3,472,727 UART: Caliptra RT
3,472,980 UART: [state] CFI Enabled
3,580,915 UART: [rt] RT listening for mailbox commands...
3,581,585 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,031 UART: [rt]cmd =0x434b4558, len=80
3,781,487 >>> mbox cmd response data (6280 bytes)
3,781,488 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,094 UART: [rt]cmd =0x414c544e, len=41
3,813,046 >>> mbox cmd response data (8 bytes)
3,813,047 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,858 UART: [rt]cmd =0x434b4558, len=80
4,010,800 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,877 ready_for_fw is high
1,362,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,541 >>> mbox cmd response: success
2,990,981 UART:
2,990,997 UART: Running Caliptra FMC ...
2,991,405 UART:
2,991,459 UART: [state] CFI Enabled
3,002,148 UART: [fht] FMC Alias Private Key: 7
3,110,209 UART: [art] Extend RT PCRs Done
3,110,637 UART: [art] Lock RT PCRs Done
3,112,371 UART: [art] Populate DV Done
3,120,824 UART: [fht] FMC Alias Private Key: 7
3,121,788 UART: [art] Derive CDI
3,122,068 UART: [art] Store in in slot 0x4
3,208,019 UART: [art] Derive Key Pair
3,208,379 UART: [art] Store priv key in slot 0x5
3,221,375 UART: [art] Derive Key Pair - Done
3,236,010 UART: [art] Signing Cert with AUTHO
3,236,490 UART: RITY.KEYID = 7
3,251,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,541 UART: [art] PUB.X = BC2F63FEAE4FE35B9496917277B1C80BFEDD529B510BE5F9BD2E2EB40ECD16C1E22730E1C05C90D1D0DC357D3CA0F2E9
3,259,326 UART: [art] PUB.Y = AE06417A9D29F2627D885614C959BF8F00DC1BB53B02B8813B2BB6862082D3D96DB8BE55A21D6CFD562BDBA160845DBF
3,266,260 UART: [art] SIG.R = A8EFAC1A903C7B6F15EF3C368F56CC7BDE8A6CE7A685147EB53775B456277C128045583E30BFF44E04C41AE0FD69A6A1
3,273,041 UART: [art] SIG.S = FEB9098113EDE6C67F87A73E9CE9FE35F790F4B30BEDBFD3661BC9B50AE41DF4086B4AF7A2D776A33B06CE6F0DE74953
3,296,584 UART: Caliptra RT
3,296,837 UART: [state] CFI Enabled
3,404,737 UART: [rt] RT listening for mailbox commands...
3,405,407 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,777 UART: [rt]cmd =0x434b4558, len=80
3,603,629 >>> mbox cmd response data (6280 bytes)
3,603,630 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,270 UART: [rt]cmd =0x414c544e, len=41
3,635,244 >>> mbox cmd response data (8 bytes)
3,635,245 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,132 UART: [rt]cmd =0x434b4558, len=80
3,833,428 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,570 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,790 UART: [kat] SHA2-256
892,728 UART: [kat] SHA2-384
895,507 UART: [kat] SHA2-512-ACC
897,408 UART: [kat] ECC-384
903,035 UART: [kat] HMAC-384Kdf
907,769 UART: [kat] LMS
1,475,965 UART: [kat] --
1,476,586 UART: [cold-reset] ++
1,476,990 UART: [fht] Storing FHT @ 0x50003400
1,479,931 UART: [idev] ++
1,480,099 UART: [idev] CDI.KEYID = 6
1,480,459 UART: [idev] SUBJECT.KEYID = 7
1,480,883 UART: [idev] UDS.KEYID = 0
1,481,228 ready_for_fw is high
1,481,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,765 UART: [idev] Erasing UDS.KEYID = 0
1,505,971 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,617 UART: [idev] --
1,515,570 UART: [ldev] ++
1,515,738 UART: [ldev] CDI.KEYID = 6
1,516,101 UART: [ldev] SUBJECT.KEYID = 5
1,516,527 UART: [ldev] AUTHORITY.KEYID = 7
1,516,990 UART: [ldev] FE.KEYID = 1
1,521,964 UART: [ldev] Erasing FE.KEYID = 1
1,547,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,699 UART: [ldev] --
1,586,988 UART: [fwproc] Waiting for Commands...
1,587,839 UART: [fwproc] Received command 0x46574c44
1,588,630 UART: [fwproc] Received Image of size 114448 bytes
2,887,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,989 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,341 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,442 >>> mbox cmd response: success
3,082,564 UART: [afmc] ++
3,082,732 UART: [afmc] CDI.KEYID = 6
3,083,094 UART: [afmc] SUBJECT.KEYID = 7
3,083,519 UART: [afmc] AUTHORITY.KEYID = 5
3,118,240 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,250 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,030 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,758 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,643 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,333 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,262 UART: [afmc] --
3,161,290 UART: [cold-reset] --
3,162,112 UART: [state] Locking Datavault
3,163,265 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,869 UART: [state] Locking ICCM
3,164,523 UART: [exit] Launching FMC @ 0x40000130
3,169,852 UART:
3,169,868 UART: Running Caliptra FMC ...
3,170,276 UART:
3,170,419 UART: [state] CFI Enabled
3,181,152 UART: [fht] FMC Alias Private Key: 7
3,289,787 UART: [art] Extend RT PCRs Done
3,290,215 UART: [art] Lock RT PCRs Done
3,291,801 UART: [art] Populate DV Done
3,300,012 UART: [fht] FMC Alias Private Key: 7
3,301,124 UART: [art] Derive CDI
3,301,404 UART: [art] Store in in slot 0x4
3,387,091 UART: [art] Derive Key Pair
3,387,451 UART: [art] Store priv key in slot 0x5
3,401,021 UART: [art] Derive Key Pair - Done
3,415,868 UART: [art] Signing Cert with AUTHO
3,416,348 UART: RITY.KEYID = 7
3,431,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,141 UART: [art] PUB.X = 27349B14CEC4057346644C3B4CC7EE9699EDCCA620C3617A00F46037B0B12AFBC82AE982857F751D3625303746308E6F
3,438,884 UART: [art] PUB.Y = 34E408FE2834C68156FBE16DDB7772E018A67D7D4440E8F90B9CB2FEB7FEED60DCF52A4BA1F14D6D4A49DF115B4A3905
3,445,843 UART: [art] SIG.R = 685E66D845488DB4E030A54FA2A891F04E65FD964FB2A440A3F1D646E652184429816BD88350ABDFCDC8F9928E2921F0
3,452,615 UART: [art] SIG.S = 25721216EDC65978050033B6D587625C3D0FD7823389824EA54E243AEECFC17759E614578D4752483C7C10A2E280DD22
3,476,440 UART: Caliptra RT
3,476,785 UART: [state] CFI Enabled
3,585,991 UART: [rt] RT listening for mailbox commands...
3,586,661 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,859 UART: [rt]cmd =0x434b4558, len=80
3,786,867 >>> mbox cmd response data (6280 bytes)
3,786,868 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,780 UART: [rt]cmd =0x414c544e, len=41
3,818,860 >>> mbox cmd response data (8 bytes)
3,818,861 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,848,542 UART: [rt]cmd =0x434b4558, len=80
4,018,784 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,794 ready_for_fw is high
1,362,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,376 >>> mbox cmd response: success
2,990,582 UART:
2,990,598 UART: Running Caliptra FMC ...
2,991,006 UART:
2,991,149 UART: [state] CFI Enabled
3,002,002 UART: [fht] FMC Alias Private Key: 7
3,110,405 UART: [art] Extend RT PCRs Done
3,110,833 UART: [art] Lock RT PCRs Done
3,112,307 UART: [art] Populate DV Done
3,120,652 UART: [fht] FMC Alias Private Key: 7
3,121,780 UART: [art] Derive CDI
3,122,060 UART: [art] Store in in slot 0x4
3,207,867 UART: [art] Derive Key Pair
3,208,227 UART: [art] Store priv key in slot 0x5
3,221,813 UART: [art] Derive Key Pair - Done
3,236,545 UART: [art] Signing Cert with AUTHO
3,237,025 UART: RITY.KEYID = 7
3,252,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,192 UART: [art] PUB.X = 887E8AC429D16C8703AAF3A65D208878E03986B0D694FCA8EA863B1422C465B9B0C858C9274D8049D2117B1D0C6DEC04
3,259,955 UART: [art] PUB.Y = 205FDE3BEA61E0B5DB0A9C621038C7B01D7197390D860E5EB1A7B020DC9966C86A70B766418B74C78AA391C37E215B08
3,266,897 UART: [art] SIG.R = 5778F957BC760401A04F1E48893CF901ECFF93A2A66B3A167DDC16F878F6C1CD0869BD0EBBE30D262B273F748DBE2C42
3,273,661 UART: [art] SIG.S = 4ADDE916F2B9F1ACDDA45AD7B1BDC53B5A499F36812A764959F5A938726198AD5FBF3DD682EFA8B399726F530FDFBE06
3,297,436 UART: Caliptra RT
3,297,781 UART: [state] CFI Enabled
3,406,683 UART: [rt] RT listening for mailbox commands...
3,407,353 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,601 UART: [rt]cmd =0x434b4558, len=80
3,606,766 >>> mbox cmd response data (6280 bytes)
3,606,767 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,359 UART: [rt]cmd =0x414c544e, len=41
3,638,323 >>> mbox cmd response data (8 bytes)
3,638,324 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,273 UART: [rt]cmd =0x434b4558, len=80
3,837,720 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
893,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,435 UART: [kat] ++
897,587 UART: [kat] sha1
901,759 UART: [kat] SHA2-256
903,699 UART: [kat] SHA2-384
906,442 UART: [kat] SHA2-512-ACC
908,343 UART: [kat] ECC-384
917,886 UART: [kat] HMAC-384Kdf
922,346 UART: [kat] LMS
1,170,674 UART: [kat] --
1,171,271 UART: [cold-reset] ++
1,171,819 UART: [fht] FHT @ 0x50003400
1,174,452 UART: [idev] ++
1,174,620 UART: [idev] CDI.KEYID = 6
1,174,980 UART: [idev] SUBJECT.KEYID = 7
1,175,404 UART: [idev] UDS.KEYID = 0
1,175,749 ready_for_fw is high
1,175,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,578 UART: [idev] Erasing UDS.KEYID = 0
1,200,115 UART: [idev] Sha1 KeyId Algorithm
1,208,685 UART: [idev] --
1,209,827 UART: [ldev] ++
1,209,995 UART: [ldev] CDI.KEYID = 6
1,210,358 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,157 UART: [ldev] Erasing FE.KEYID = 1
1,242,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,171 UART: [ldev] --
1,281,670 UART: [fwproc] Wait for Commands...
1,282,438 UART: [fwproc] Recv command 0x46574c44
1,283,166 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,095 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,190 >>> mbox cmd response: success
2,775,420 UART: [afmc] ++
2,775,588 UART: [afmc] CDI.KEYID = 6
2,775,950 UART: [afmc] SUBJECT.KEYID = 7
2,776,375 UART: [afmc] AUTHORITY.KEYID = 5
2,811,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,189 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,917 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,802 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,521 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,325 UART: [afmc] --
2,854,293 UART: [cold-reset] --
2,855,099 UART: [state] Locking Datavault
2,856,082 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,686 UART: [state] Locking ICCM
2,857,226 UART: [exit] Launching FMC @ 0x40000130
2,862,555 UART:
2,862,571 UART: Running Caliptra FMC ...
2,862,979 UART:
2,863,033 UART: [state] CFI Enabled
2,873,750 UART: [fht] FMC Alias Private Key: 7
2,981,561 UART: [art] Extend RT PCRs Done
2,981,989 UART: [art] Lock RT PCRs Done
2,983,603 UART: [art] Populate DV Done
2,991,914 UART: [fht] FMC Alias Private Key: 7
2,993,076 UART: [art] Derive CDI
2,993,356 UART: [art] Store in in slot 0x4
3,079,131 UART: [art] Derive Key Pair
3,079,491 UART: [art] Store priv key in slot 0x5
3,093,065 UART: [art] Derive Key Pair - Done
3,107,924 UART: [art] Signing Cert with AUTHO
3,108,404 UART: RITY.KEYID = 7
3,123,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,291 UART: [art] PUB.X = 9AE7E766CA10EC26AD110197D56EA371E4F1B335A72909A1FF669A074472509690F47DBFC2A3383B5511E7FF21F05A4E
3,131,056 UART: [art] PUB.Y = 03DB22BC3678B5A3BAF482430EF34B5AEF991785575F158CD2AEB02906CD94E4309476E3F077FB3925181421CA2BD490
3,137,999 UART: [art] SIG.R = 563283A6DC5C04B2339A5673682B59C5ECA11B1A921AA3A864FA2D6934246794A8A2CD6741828CE135F07D8E29F42D54
3,144,764 UART: [art] SIG.S = 900B3465C44F6D0F60DA3004C25C89DC8FA3FC7E1F5FC7E903CA94B0CB7A744F5FA1DBC68E0636CFDBDB7EBF573426AB
3,169,118 UART: Caliptra RT
3,169,371 UART: [state] CFI Enabled
3,276,324 UART: [rt] RT listening for mailbox commands...
3,276,994 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,690 UART: [rt]cmd =0x434b4558, len=80
3,476,060 >>> mbox cmd response data (6280 bytes)
3,476,061 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,727 UART: [rt]cmd =0x414c544e, len=41
3,507,779 >>> mbox cmd response data (8 bytes)
3,507,780 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,713 UART: [rt]cmd =0x434b4558, len=80
3,706,067 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,759 ready_for_fw is high
1,060,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,627 >>> mbox cmd response: success
2,690,235 UART:
2,690,251 UART: Running Caliptra FMC ...
2,690,659 UART:
2,690,713 UART: [state] CFI Enabled
2,701,130 UART: [fht] FMC Alias Private Key: 7
2,809,511 UART: [art] Extend RT PCRs Done
2,809,939 UART: [art] Lock RT PCRs Done
2,811,479 UART: [art] Populate DV Done
2,819,594 UART: [fht] FMC Alias Private Key: 7
2,820,614 UART: [art] Derive CDI
2,820,894 UART: [art] Store in in slot 0x4
2,906,197 UART: [art] Derive Key Pair
2,906,557 UART: [art] Store priv key in slot 0x5
2,919,609 UART: [art] Derive Key Pair - Done
2,934,272 UART: [art] Signing Cert with AUTHO
2,934,752 UART: RITY.KEYID = 7
2,950,416 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,181 UART: [art] PUB.X = 94D640F36EAC7A25DC853861692CB4937A797E8CDDB0547AE35FB6A5BE3EA8E3EACAF2B923E9BACCD3B4FBA103CC9BD4
2,957,978 UART: [art] PUB.Y = 8717A1F12D03EEC1CF1DD1DCFFE17D60BF47FA894ECD689C2673995D154AC67341ACADB16307E945918376447EDF58AC
2,964,936 UART: [art] SIG.R = E84FA95186FF5EC0B74EE2A5AFF36491C18D3C22D7AB8D9199ED843E1AA7757A486F4E5DABC1085B8DC64FAFF9F2956A
2,971,725 UART: [art] SIG.S = 8EFA54FD5FB0A43918EABFA44C5C31C7BD040E5EE6DF26E9A9A68B18FF28640411365035B52C2E57D74232E0D021717B
2,994,989 UART: Caliptra RT
2,995,242 UART: [state] CFI Enabled
3,103,010 UART: [rt] RT listening for mailbox commands...
3,103,680 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,864 UART: [rt]cmd =0x434b4558, len=80
3,303,222 >>> mbox cmd response data (6280 bytes)
3,303,223 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,967 UART: [rt]cmd =0x414c544e, len=41
3,335,027 >>> mbox cmd response data (8 bytes)
3,335,028 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,777 UART: [rt]cmd =0x434b4558, len=80
3,533,871 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,158 UART: [kat] SHA2-256
904,098 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,135 UART: [kat] HMAC-384Kdf
922,679 UART: [kat] LMS
1,171,007 UART: [kat] --
1,171,814 UART: [cold-reset] ++
1,172,314 UART: [fht] FHT @ 0x50003400
1,175,007 UART: [idev] ++
1,175,175 UART: [idev] CDI.KEYID = 6
1,175,535 UART: [idev] SUBJECT.KEYID = 7
1,175,959 UART: [idev] UDS.KEYID = 0
1,176,304 ready_for_fw is high
1,176,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,203 UART: [idev] Erasing UDS.KEYID = 0
1,200,616 UART: [idev] Sha1 KeyId Algorithm
1,209,000 UART: [idev] --
1,210,102 UART: [ldev] ++
1,210,270 UART: [ldev] CDI.KEYID = 6
1,210,633 UART: [ldev] SUBJECT.KEYID = 5
1,211,059 UART: [ldev] AUTHORITY.KEYID = 7
1,211,522 UART: [ldev] FE.KEYID = 1
1,216,678 UART: [ldev] Erasing FE.KEYID = 1
1,242,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,988 UART: [ldev] --
1,282,311 UART: [fwproc] Wait for Commands...
1,282,981 UART: [fwproc] Recv command 0x46574c44
1,283,709 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,546 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,850 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,715 >>> mbox cmd response: success
2,776,909 UART: [afmc] ++
2,777,077 UART: [afmc] CDI.KEYID = 6
2,777,439 UART: [afmc] SUBJECT.KEYID = 7
2,777,864 UART: [afmc] AUTHORITY.KEYID = 5
2,813,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,712 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,440 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,325 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,044 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,848 UART: [afmc] --
2,856,740 UART: [cold-reset] --
2,857,692 UART: [state] Locking Datavault
2,858,889 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,493 UART: [state] Locking ICCM
2,860,077 UART: [exit] Launching FMC @ 0x40000130
2,865,406 UART:
2,865,422 UART: Running Caliptra FMC ...
2,865,830 UART:
2,865,973 UART: [state] CFI Enabled
2,876,508 UART: [fht] FMC Alias Private Key: 7
2,984,669 UART: [art] Extend RT PCRs Done
2,985,097 UART: [art] Lock RT PCRs Done
2,986,147 UART: [art] Populate DV Done
2,994,372 UART: [fht] FMC Alias Private Key: 7
2,995,546 UART: [art] Derive CDI
2,995,826 UART: [art] Store in in slot 0x4
3,081,321 UART: [art] Derive Key Pair
3,081,681 UART: [art] Store priv key in slot 0x5
3,094,767 UART: [art] Derive Key Pair - Done
3,109,684 UART: [art] Signing Cert with AUTHO
3,110,164 UART: RITY.KEYID = 7
3,125,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,151 UART: [art] PUB.X = 2FBA0028A4EB9692A35D6D1A67B20E1810950691A9B63078A9FC09D45A9A89FBC13B7120ACAA8D978B3E17AB61C31041
3,132,896 UART: [art] PUB.Y = E0F7157AC26F538B473E765E307C93B932C791FFEFDE88F5158E0A3691617437B6A36DC2A559107F7EBA19B99BB9EFFE
3,139,853 UART: [art] SIG.R = 424E2DB541848BFFA50C7D1B36C660A039F2CDFFE08925125761EAE46E8A5AACDA8B41F4594698825208E1B909476FE2
3,146,620 UART: [art] SIG.S = CCDF37F659077CFDC841F09D55DDE113E394A38808DD435ACAC97780E59AE43D6A43CBEAD6ED56DA07F8AA315C5213A1
3,170,462 UART: Caliptra RT
3,170,807 UART: [state] CFI Enabled
3,277,758 UART: [rt] RT listening for mailbox commands...
3,278,428 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,928 UART: [rt]cmd =0x434b4558, len=80
3,477,834 >>> mbox cmd response data (6280 bytes)
3,477,835 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,431 UART: [rt]cmd =0x414c544e, len=41
3,509,213 >>> mbox cmd response data (8 bytes)
3,509,214 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,025 UART: [rt]cmd =0x434b4558, len=80
3,708,543 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,024 ready_for_fw is high
1,061,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,158 >>> mbox cmd response: success
2,690,018 UART:
2,690,034 UART: Running Caliptra FMC ...
2,690,442 UART:
2,690,585 UART: [state] CFI Enabled
2,701,136 UART: [fht] FMC Alias Private Key: 7
2,808,947 UART: [art] Extend RT PCRs Done
2,809,375 UART: [art] Lock RT PCRs Done
2,810,777 UART: [art] Populate DV Done
2,819,112 UART: [fht] FMC Alias Private Key: 7
2,820,196 UART: [art] Derive CDI
2,820,476 UART: [art] Store in in slot 0x4
2,906,217 UART: [art] Derive Key Pair
2,906,577 UART: [art] Store priv key in slot 0x5
2,920,449 UART: [art] Derive Key Pair - Done
2,935,082 UART: [art] Signing Cert with AUTHO
2,935,562 UART: RITY.KEYID = 7
2,950,642 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,407 UART: [art] PUB.X = 4EEA5C5C34B17FF9452E9D76724E835E6FF95DEFC1974F59F778A0B237441DA0605CF3876C28A49F06FDC38396DB075A
2,958,179 UART: [art] PUB.Y = 51FDB7937418A28905B0BB0409F40D72D15F15D1DF7CC286A42F5EBABA8198E30646B0B5C7A516ED488DCFDEA6AF19AA
2,965,132 UART: [art] SIG.R = 5295535DD8782FB552FF69C8445D88EA72B5D7A44A5DDB9259D32A783FA42CEA25073EB350502E91359CB5FDF14E965F
2,971,905 UART: [art] SIG.S = E774BDD17A48433AF253E96584BF75D11F947945801FE5A3C1F2E44342225BA38145F21022A51DDE1205B52FB29E09DE
2,995,896 UART: Caliptra RT
2,996,241 UART: [state] CFI Enabled
3,105,124 UART: [rt] RT listening for mailbox commands...
3,105,794 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,070 UART: [rt]cmd =0x434b4558, len=80
3,305,399 >>> mbox cmd response data (6280 bytes)
3,305,400 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,134 UART: [rt]cmd =0x414c544e, len=41
3,337,160 >>> mbox cmd response data (8 bytes)
3,337,161 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,032 UART: [rt]cmd =0x434b4558, len=80
3,535,937 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,706 UART: [kat] SHA2-512-ACC
906,607 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,878 UART: [kat] LMS
1,169,190 UART: [kat] --
1,170,007 UART: [cold-reset] ++
1,170,407 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 ready_for_fw is high
1,174,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,061 UART: [idev] Erasing UDS.KEYID = 0
1,199,205 UART: [idev] Sha1 KeyId Algorithm
1,207,915 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,576 UART: [ldev] Erasing FE.KEYID = 1
1,241,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,650 UART: [ldev] --
1,280,980 UART: [fwproc] Wait for Commands...
1,281,629 UART: [fwproc] Recv command 0x46574c44
1,282,362 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,225 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,534 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,602 >>> mbox cmd response: success
2,774,681 UART: [afmc] ++
2,774,849 UART: [afmc] CDI.KEYID = 6
2,775,212 UART: [afmc] SUBJECT.KEYID = 7
2,775,638 UART: [afmc] AUTHORITY.KEYID = 5
2,811,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,823 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,574 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,303 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,186 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,905 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,692 UART: [afmc] --
2,854,590 UART: [cold-reset] --
2,855,590 UART: [state] Locking Datavault
2,856,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,211 UART: [state] Locking ICCM
2,857,631 UART: [exit] Launching FMC @ 0x40000130
2,862,960 UART:
2,862,976 UART: Running Caliptra FMC ...
2,863,384 UART:
2,863,438 UART: [state] CFI Enabled
2,874,291 UART: [fht] FMC Alias Private Key: 7
2,982,318 UART: [art] Extend RT PCRs Done
2,982,746 UART: [art] Lock RT PCRs Done
2,984,042 UART: [art] Populate DV Done
2,992,307 UART: [fht] FMC Alias Private Key: 7
2,993,259 UART: [art] Derive CDI
2,993,539 UART: [art] Store in in slot 0x4
3,079,434 UART: [art] Derive Key Pair
3,079,794 UART: [art] Store priv key in slot 0x5
3,093,012 UART: [art] Derive Key Pair - Done
3,107,514 UART: [art] Signing Cert with AUTHO
3,107,994 UART: RITY.KEYID = 7
3,123,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,941 UART: [art] PUB.X = AC471A9F2FE72EAC1F847AEAE7580B909FB368B6EB5681C0C6FB2A8F20D7E127D8BC7DA007FA28BED347AFE90BE3D478
3,130,728 UART: [art] PUB.Y = DA64E5E3E3B7D9CF22839B5E8C35CB15ECDAEA44CD8EB9321BF219274A26CC97DDD58CEB0BA54508EB1C15D364E3C37C
3,137,698 UART: [art] SIG.R = 7ECF7DD1725909C954EE7AF3F65F2391C9CD3770FA4E8C3E09AB626E658DA3A756D5030300188DAF44F3948166AD987B
3,144,440 UART: [art] SIG.S = C5EEEDA3091B54AB475160489109C1394311C1A4E09B13E1AA223B78D3108F3132666CEC871422EDFA38EF71E2FE66CE
3,168,295 UART: Caliptra RT
3,168,548 UART: [state] CFI Enabled
3,275,863 UART: [rt] RT listening for mailbox commands...
3,276,533 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,767 UART: [rt]cmd =0x434b4558, len=80
3,476,635 >>> mbox cmd response data (6280 bytes)
3,476,636 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,360 UART: [rt]cmd =0x414c544e, len=41
3,508,340 >>> mbox cmd response data (8 bytes)
3,508,341 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,252 UART: [rt]cmd =0x434b4558, len=80
3,707,580 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,154 ready_for_fw is high
1,055,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,286 >>> mbox cmd response: success
2,685,242 UART:
2,685,258 UART: Running Caliptra FMC ...
2,685,666 UART:
2,685,720 UART: [state] CFI Enabled
2,696,453 UART: [fht] FMC Alias Private Key: 7
2,804,374 UART: [art] Extend RT PCRs Done
2,804,802 UART: [art] Lock RT PCRs Done
2,806,196 UART: [art] Populate DV Done
2,814,277 UART: [fht] FMC Alias Private Key: 7
2,815,363 UART: [art] Derive CDI
2,815,643 UART: [art] Store in in slot 0x4
2,901,328 UART: [art] Derive Key Pair
2,901,688 UART: [art] Store priv key in slot 0x5
2,914,790 UART: [art] Derive Key Pair - Done
2,929,719 UART: [art] Signing Cert with AUTHO
2,930,199 UART: RITY.KEYID = 7
2,945,327 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,092 UART: [art] PUB.X = 826DB8EF6700742C059C271DFB6AAB6D091D95D07CFDB09A7CE814DD0E5FC2AE89CB23B886831978A4186A953B8C60EC
2,952,845 UART: [art] PUB.Y = B2158633251C15F78182D69771117ECFC4812839AC3FC60322FD03C72909D4C4E48530208EF5189C0E0CF5364B131B44
2,959,770 UART: [art] SIG.R = BE1D8303AAD9D984D00E4138E2E6A35CB4033793465A69F50435D70636F47F3CA3115B5D6DABAB0245989934E03FCB27
2,966,524 UART: [art] SIG.S = 3D7525A6618ABE4F3FB5CDE04ECCD0C870D1152117532EEDC7FC5D0AC5B28459844F8D3AA1EB2FDD348E4E57650805BD
2,989,854 UART: Caliptra RT
2,990,107 UART: [state] CFI Enabled
3,097,218 UART: [rt] RT listening for mailbox commands...
3,097,888 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,022 UART: [rt]cmd =0x434b4558, len=80
3,296,340 >>> mbox cmd response data (6280 bytes)
3,296,341 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,067 UART: [rt]cmd =0x414c544e, len=41
3,327,913 >>> mbox cmd response data (8 bytes)
3,327,914 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,695 UART: [rt]cmd =0x434b4558, len=80
3,525,931 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
891,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,642 UART: [kat] ++
895,794 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,169,800 UART: [cold-reset] ++
1,170,160 UART: [fht] FHT @ 0x50003400
1,172,860 UART: [idev] ++
1,173,028 UART: [idev] CDI.KEYID = 6
1,173,389 UART: [idev] SUBJECT.KEYID = 7
1,173,814 UART: [idev] UDS.KEYID = 0
1,174,160 ready_for_fw is high
1,174,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,966 UART: [idev] Erasing UDS.KEYID = 0
1,199,366 UART: [idev] Sha1 KeyId Algorithm
1,208,354 UART: [idev] --
1,209,511 UART: [ldev] ++
1,209,679 UART: [ldev] CDI.KEYID = 6
1,210,043 UART: [ldev] SUBJECT.KEYID = 5
1,210,470 UART: [ldev] AUTHORITY.KEYID = 7
1,210,933 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,241,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,737 UART: [ldev] --
1,281,027 UART: [fwproc] Wait for Commands...
1,281,622 UART: [fwproc] Recv command 0x46574c44
1,282,355 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,434 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,743 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,673 >>> mbox cmd response: success
2,775,838 UART: [afmc] ++
2,776,006 UART: [afmc] CDI.KEYID = 6
2,776,369 UART: [afmc] SUBJECT.KEYID = 7
2,776,795 UART: [afmc] AUTHORITY.KEYID = 5
2,812,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,152 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,035 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,754 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,499 UART: [afmc] --
2,855,427 UART: [cold-reset] --
2,856,517 UART: [state] Locking Datavault
2,857,960 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,564 UART: [state] Locking ICCM
2,859,154 UART: [exit] Launching FMC @ 0x40000130
2,864,483 UART:
2,864,499 UART: Running Caliptra FMC ...
2,864,907 UART:
2,865,050 UART: [state] CFI Enabled
2,875,193 UART: [fht] FMC Alias Private Key: 7
2,983,010 UART: [art] Extend RT PCRs Done
2,983,438 UART: [art] Lock RT PCRs Done
2,985,078 UART: [art] Populate DV Done
2,993,563 UART: [fht] FMC Alias Private Key: 7
2,994,551 UART: [art] Derive CDI
2,994,831 UART: [art] Store in in slot 0x4
3,080,260 UART: [art] Derive Key Pair
3,080,620 UART: [art] Store priv key in slot 0x5
3,093,652 UART: [art] Derive Key Pair - Done
3,108,833 UART: [art] Signing Cert with AUTHO
3,109,313 UART: RITY.KEYID = 7
3,124,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,372 UART: [art] PUB.X = 75A5C87986F9450F76EECCC0AC072BA9C1FB09AEAD455AEC800D4DAE5594E4A5F2B2BD34F38416360477427A1698F571
3,132,137 UART: [art] PUB.Y = 560D1998CC072EF3C08463020C2B1244B4DFE277AD218EA1A59044DDBCF28E4EB84E4539926DEE9A1741C8390341A845
3,139,074 UART: [art] SIG.R = D5978C8042FE9733FCB7C4B84CA558B2531065026E98EE525F5A8C1CD4DC058EFDF6B7767873426676B5FAD7C4AFCC96
3,145,848 UART: [art] SIG.S = 1C39DB5A131323174E3DD20D13AFEBCE29848B78D5A5E514E65D217ADB821686E7EA823BB023733C464F7A560C8591BC
3,169,799 UART: Caliptra RT
3,170,144 UART: [state] CFI Enabled
3,279,123 UART: [rt] RT listening for mailbox commands...
3,279,793 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,933 UART: [rt]cmd =0x434b4558, len=80
3,479,025 >>> mbox cmd response data (6280 bytes)
3,479,026 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,554 UART: [rt]cmd =0x414c544e, len=41
3,510,438 >>> mbox cmd response data (8 bytes)
3,510,439 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,234 UART: [rt]cmd =0x434b4558, len=80
3,710,436 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,603 ready_for_fw is high
1,056,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,079 >>> mbox cmd response: success
2,686,393 UART:
2,686,409 UART: Running Caliptra FMC ...
2,686,817 UART:
2,686,960 UART: [state] CFI Enabled
2,697,593 UART: [fht] FMC Alias Private Key: 7
2,805,372 UART: [art] Extend RT PCRs Done
2,805,800 UART: [art] Lock RT PCRs Done
2,807,330 UART: [art] Populate DV Done
2,815,403 UART: [fht] FMC Alias Private Key: 7
2,816,529 UART: [art] Derive CDI
2,816,809 UART: [art] Store in in slot 0x4
2,902,552 UART: [art] Derive Key Pair
2,902,912 UART: [art] Store priv key in slot 0x5
2,916,420 UART: [art] Derive Key Pair - Done
2,931,029 UART: [art] Signing Cert with AUTHO
2,931,509 UART: RITY.KEYID = 7
2,947,253 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,018 UART: [art] PUB.X = 68ACB12E676757EC88D7E3E431DED65360F68C99DE8463E4C7A92188DBC947B037EEEA7589DDBF3F96DE26DD3D59C292
2,954,802 UART: [art] PUB.Y = 7CE914F3C13A8EFAB335B9D34CFAAAC2E9C71CC82EE36AA1686D93218C8290D2231F3066C27646119D28AA18AA5A0398
2,961,759 UART: [art] SIG.R = 16EB2DD951953302A04CF97DAC5D573BC6D8A6F5F20E62146F93BF8B5DDB44EAEA24A9F7C77C2EB54098B870573D89C3
2,968,537 UART: [art] SIG.S = 79EB5F9E011ABCD0EBB2790E896603CBB2B73FF37C8740F8F6E9AD2843C8CAADA1EBDC65E79C2B5B27C96CD62D5D71D0
2,992,515 UART: Caliptra RT
2,992,860 UART: [state] CFI Enabled
3,100,405 UART: [rt] RT listening for mailbox commands...
3,101,075 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,511 UART: [rt]cmd =0x434b4558, len=80
3,300,282 >>> mbox cmd response data (6280 bytes)
3,300,283 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,995 UART: [rt]cmd =0x414c544e, len=41
3,331,981 >>> mbox cmd response data (8 bytes)
3,331,982 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,995 UART: [rt]cmd =0x434b4558, len=80
3,531,572 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,029 UART:
192,397 UART: Running Caliptra ROM ...
193,507 UART:
193,656 UART: [state] CFI Enabled
263,040 UART: [state] LifecycleState = Unprovisioned
264,980 UART: [state] DebugLocked = No
266,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,224 UART: [kat] SHA2-256
441,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,425 UART: [kat] ++
452,873 UART: [kat] sha1
462,627 UART: [kat] SHA2-256
465,357 UART: [kat] SHA2-384
470,429 UART: [kat] SHA2-512-ACC
472,799 UART: [kat] ECC-384
2,768,594 UART: [kat] HMAC-384Kdf
2,799,935 UART: [kat] LMS
3,990,250 UART: [kat] --
3,995,686 UART: [cold-reset] ++
3,997,187 UART: [fht] Storing FHT @ 0x50003400
4,008,587 UART: [idev] ++
4,009,162 UART: [idev] CDI.KEYID = 6
4,010,054 UART: [idev] SUBJECT.KEYID = 7
4,011,301 UART: [idev] UDS.KEYID = 0
4,012,265 ready_for_fw is high
4,012,465 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,046 UART: [idev] Erasing UDS.KEYID = 0
7,345,962 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,426 UART: [idev] --
7,371,637 UART: [ldev] ++
7,372,208 UART: [ldev] CDI.KEYID = 6
7,373,223 UART: [ldev] SUBJECT.KEYID = 5
7,374,380 UART: [ldev] AUTHORITY.KEYID = 7
7,375,661 UART: [ldev] FE.KEYID = 1
7,421,524 UART: [ldev] Erasing FE.KEYID = 1
10,753,876 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,693 UART: [ldev] --
13,136,528 UART: [fwproc] Waiting for Commands...
13,138,776 UART: [fwproc] Received command 0x46574c44
13,140,979 UART: [fwproc] Received Image of size 114124 bytes
17,187,746 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,268 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,161 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,652,109 >>> mbox cmd response: success
17,656,251 UART: [afmc] ++
17,656,847 UART: [afmc] CDI.KEYID = 6
17,657,796 UART: [afmc] SUBJECT.KEYID = 7
17,659,010 UART: [afmc] AUTHORITY.KEYID = 5
21,025,276 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,324,791 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,052 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,425 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,308 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,370,703 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,658 UART: [afmc] --
23,397,230 UART: [cold-reset] --
23,400,994 UART: [state] Locking Datavault
23,407,056 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,770 UART: [state] Locking ICCM
23,410,870 UART: [exit] Launching FMC @ 0x40000130
23,419,266 UART:
23,419,499 UART: Running Caliptra FMC ...
23,420,600 UART:
23,420,772 UART: [state] CFI Enabled
23,485,842 UART: [fht] FMC Alias Private Key: 7
25,824,088 UART: [art] Extend RT PCRs Done
25,825,314 UART: [art] Lock RT PCRs Done
25,827,319 UART: [art] Populate DV Done
25,832,521 UART: [fht] FMC Alias Private Key: 7
25,834,116 UART: [art] Derive CDI
25,834,931 UART: [art] Store in in slot 0x4
25,895,035 UART: [art] Derive Key Pair
25,896,082 UART: [art] Store priv key in slot 0x5
29,188,594 UART: [art] Derive Key Pair - Done
29,201,604 UART: [art] Signing Cert with AUTHO
29,202,910 UART: RITY.KEYID = 7
31,490,900 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,405 UART: [art] PUB.X = A9279B4075A62128E39429BB3DD0CE468D04FC6FFAFFFDCAEC198C8BA37A2872E20D3E1FD17F3D5F44615C05084EC86F
31,499,659 UART: [art] PUB.Y = C9EB58C4E8E0D5A19568F5D66191A082A74EB2A4427D66C329CA10D47D3CEC406CC51A41D1E5F961C975E0BBCA320347
31,506,887 UART: [art] SIG.R = 0FD2920E461E02B1D3A62408874D3BC841C31F1980398A4AAFDD1B9BFD05A330098EEA60BEB2FA6706E88609210086D5
31,514,276 UART: [art] SIG.S = 053FB45ED07C9274244F1C0068159A092B82CA5CF557D8BF0E49F14AF07262F41A4DCD528BD1488A61EB03C3DA0FA4B1
32,819,743 UART: Caliptra RT
32,820,461 UART: [state] CFI Enabled
32,983,211 UART: [rt] RT listening for mailbox commands...
32,985,117 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,015,382 UART: [rt]cmd =0x414c544e, len=41
33,017,801 >>> mbox cmd response data (8 bytes)
33,018,852 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,049,338 UART: [rt]cmd =0x434b4558, len=80
38,789,091 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,610 writing to cptra_bootfsm_go
3,785,884 ready_for_fw is high
3,786,249 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,882,644 >>> mbox cmd response: success
23,570,448 UART:
23,570,838 UART: Running Caliptra FMC ...
23,572,042 UART:
23,572,222 UART: [state] CFI Enabled
23,640,231 UART: [fht] FMC Alias Private Key: 7
25,977,624 UART: [art] Extend RT PCRs Done
25,978,846 UART: [art] Lock RT PCRs Done
25,980,450 UART: [art] Populate DV Done
25,986,051 UART: [fht] FMC Alias Private Key: 7
25,987,759 UART: [art] Derive CDI
25,988,577 UART: [art] Store in in slot 0x4
26,048,824 UART: [art] Derive Key Pair
26,049,873 UART: [art] Store priv key in slot 0x5
29,342,453 UART: [art] Derive Key Pair - Done
29,355,669 UART: [art] Signing Cert with AUTHO
29,356,973 UART: RITY.KEYID = 7
31,643,887 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,392 UART: [art] PUB.X = E0C6137A40D56EA4AFE1B18D28BC897A8FA7270B06A54247703368A2B9EF1F62DFCF351B09FCE1443DAF7BE3465FBC62
31,652,601 UART: [art] PUB.Y = 4AF5AC522590BAC31644E5E0DF4A7162AE80468EB002F6FBFA71E520078260B41FE1B2403AD6B793F4C471F92974D8E5
31,659,863 UART: [art] SIG.R = 0A339AA7E0229FAC03601E4B07A6C8BED9385C04851D62D09F56C6832D3BF4550A6DF9B6EF74737750F55B6473E532E1
31,667,229 UART: [art] SIG.S = D961E7E4DEEFC68B4C1AA7A050782245E77618CCB9AA4DF32C2DBE78D129FB1B3575020D1EA5E509FCE3247CF6ECACA4
32,972,272 UART: Caliptra RT
32,972,976 UART: [state] CFI Enabled
33,133,918 UART: [rt] RT listening for mailbox commands...
33,135,801 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,165,959 UART: [rt]cmd =0x414c544e, len=41
33,168,333 >>> mbox cmd response data (8 bytes)
33,169,228 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,199,642 UART: [rt]cmd =0x434b4558, len=80
38,939,233 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,450 UART:
192,835 UART: Running Caliptra ROM ...
193,958 UART:
603,807 UART: [state] CFI Enabled
617,252 UART: [state] LifecycleState = Unprovisioned
619,200 UART: [state] DebugLocked = No
620,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,816 UART: [kat] SHA2-256
794,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,118 UART: [kat] ++
805,643 UART: [kat] sha1
815,879 UART: [kat] SHA2-256
818,595 UART: [kat] SHA2-384
823,802 UART: [kat] SHA2-512-ACC
826,163 UART: [kat] ECC-384
3,107,952 UART: [kat] HMAC-384Kdf
3,120,122 UART: [kat] LMS
4,310,197 UART: [kat] --
4,315,129 UART: [cold-reset] ++
4,317,236 UART: [fht] Storing FHT @ 0x50003400
4,328,500 UART: [idev] ++
4,329,061 UART: [idev] CDI.KEYID = 6
4,329,970 UART: [idev] SUBJECT.KEYID = 7
4,331,206 UART: [idev] UDS.KEYID = 0
4,332,204 ready_for_fw is high
4,332,424 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,475,770 UART: [idev] Erasing UDS.KEYID = 0
7,621,779 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,807 UART: [idev] --
7,646,883 UART: [ldev] ++
7,647,445 UART: [ldev] CDI.KEYID = 6
7,648,379 UART: [ldev] SUBJECT.KEYID = 5
7,649,638 UART: [ldev] AUTHORITY.KEYID = 7
7,650,935 UART: [ldev] FE.KEYID = 1
7,659,766 UART: [ldev] Erasing FE.KEYID = 1
10,952,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,497 UART: [ldev] --
13,310,410 UART: [fwproc] Waiting for Commands...
13,313,363 UART: [fwproc] Received command 0x46574c44
13,315,591 UART: [fwproc] Received Image of size 114124 bytes
17,360,455 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,063 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,503,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,820,694 >>> mbox cmd response: success
17,824,851 UART: [afmc] ++
17,825,465 UART: [afmc] CDI.KEYID = 6
17,826,373 UART: [afmc] SUBJECT.KEYID = 7
17,827,580 UART: [afmc] AUTHORITY.KEYID = 5
21,140,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,355 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,629 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,034 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,466,866 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,309 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,521 UART: [afmc] --
23,507,984 UART: [cold-reset] --
23,511,843 UART: [state] Locking Datavault
23,517,131 UART: [state] Locking PCR0, PCR1 and PCR31
23,518,894 UART: [state] Locking ICCM
23,520,443 UART: [exit] Launching FMC @ 0x40000130
23,528,837 UART:
23,529,086 UART: Running Caliptra FMC ...
23,530,187 UART:
23,530,343 UART: [state] CFI Enabled
23,538,327 UART: [fht] FMC Alias Private Key: 7
25,869,450 UART: [art] Extend RT PCRs Done
25,870,667 UART: [art] Lock RT PCRs Done
25,872,090 UART: [art] Populate DV Done
25,877,609 UART: [fht] FMC Alias Private Key: 7
25,879,193 UART: [art] Derive CDI
25,879,923 UART: [art] Store in in slot 0x4
25,922,724 UART: [art] Derive Key Pair
25,923,761 UART: [art] Store priv key in slot 0x5
29,165,681 UART: [art] Derive Key Pair - Done
29,178,629 UART: [art] Signing Cert with AUTHO
29,179,934 UART: RITY.KEYID = 7
31,459,647 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,165 UART: [art] PUB.X = 8E499457E2DF87823D37B052DB6527FE3B560434F2C1351000CED6C27092D1D8A090322E8AECA8CDAFC1B391383D5A60
31,468,376 UART: [art] PUB.Y = E1A25F066530B9156A1FD1A21A38CB2646D84281266FC852424EED6B675F2A0AA48EF5E8B54894E33A3CC55B3F283E54
31,475,637 UART: [art] SIG.R = BDB7C2106918231E9C4FFF68CF2E55FE70534E0E1BF3B5C61E6785B63BFE9BFD903FD9250E14C58A2CAF2DCEB8F60DB0
31,483,015 UART: [art] SIG.S = B36BFE346594C01E7F692E1E624F8C982675F245CB987D8095FC82BDB0BEB1655501E555B63BE85D9356D96A0B49891D
32,788,545 UART: Caliptra RT
32,789,256 UART: [state] CFI Enabled
32,906,992 UART: [rt] RT listening for mailbox commands...
32,908,886 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
32,939,002 UART: [rt]cmd =0x414c544e, len=41
32,941,383 >>> mbox cmd response data (8 bytes)
32,942,430 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,972,627 UART: [rt]cmd =0x434b4558, len=80
38,634,220 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,132,345 ready_for_fw is high
4,132,768 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,796 >>> mbox cmd response: success
23,706,659 UART:
23,707,046 UART: Running Caliptra FMC ...
23,708,154 UART:
23,708,330 UART: [state] CFI Enabled
23,716,544 UART: [fht] FMC Alias Private Key: 7
26,047,564 UART: [art] Extend RT PCRs Done
26,048,797 UART: [art] Lock RT PCRs Done
26,050,749 UART: [art] Populate DV Done
26,056,164 UART: [fht] FMC Alias Private Key: 7
26,057,765 UART: [art] Derive CDI
26,058,580 UART: [art] Store in in slot 0x4
26,100,903 UART: [art] Derive Key Pair
26,101,901 UART: [art] Store priv key in slot 0x5
29,344,367 UART: [art] Derive Key Pair - Done
29,357,582 UART: [art] Signing Cert with AUTHO
29,358,891 UART: RITY.KEYID = 7
31,638,177 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,687 UART: [art] PUB.X = E30A8AB6C0D385C825EC64812A069B6B34739F49D6261E987C2D70FC1D7DBC9A53932D1C86665AB2F1AFB442C073D618
31,646,956 UART: [art] PUB.Y = 527BC056F73C098FAF88072C11F88A87AB340A2B09BFF18BB00FF4BFB13D992980BA42AB1CCB30505AD54210A5EFAF9A
31,654,158 UART: [art] SIG.R = B720E9B5B239285BC7B09B60C21FB1AD2C13902FB5E7FBDB56CF34E911BAEDD27C0AA8D00F452E83618AAAA94449E739
31,661,543 UART: [art] SIG.S = FCFB40DA1C9D8E0EA5D110BF41C405C6C806C67FF5BA34052C3FBE072D512B1F3A104AF5B30CF0693ABC1B43A239D59D
32,966,531 UART: Caliptra RT
32,967,248 UART: [state] CFI Enabled
33,084,332 UART: [rt] RT listening for mailbox commands...
33,086,230 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,116,601 UART: [rt]cmd =0x414c544e, len=41
33,118,970 >>> mbox cmd response data (8 bytes)
33,119,921 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,150,307 UART: [rt]cmd =0x434b4558, len=80
38,812,215 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
192,482 UART:
193,379 UART: Running Caliptra ROM ...
194,510 UART:
194,659 UART: [state] CFI Enabled
267,721 UART: [state] LifecycleState = Unprovisioned
269,693 UART: [state] DebugLocked = No
270,939 UART: [state] WD Timer not started. Device not locked for debugging
275,125 UART: [kat] SHA2-256
454,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,884 UART: [kat] ++
466,354 UART: [kat] sha1
477,441 UART: [kat] SHA2-256
480,517 UART: [kat] SHA2-384
486,891 UART: [kat] SHA2-512-ACC
489,886 UART: [kat] ECC-384
2,953,045 UART: [kat] HMAC-384Kdf
2,975,965 UART: [kat] LMS
3,505,437 UART: [kat] --
3,509,337 UART: [cold-reset] ++
3,511,434 UART: [fht] FHT @ 0x50003400
3,521,634 UART: [idev] ++
3,522,198 UART: [idev] CDI.KEYID = 6
3,523,201 UART: [idev] SUBJECT.KEYID = 7
3,524,608 UART: [idev] UDS.KEYID = 0
3,525,556 ready_for_fw is high
3,525,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,790 UART: [idev] Erasing UDS.KEYID = 0
6,034,546 UART: [idev] Sha1 KeyId Algorithm
6,056,991 UART: [idev] --
6,060,997 UART: [ldev] ++
6,061,572 UART: [ldev] CDI.KEYID = 6
6,062,522 UART: [ldev] SUBJECT.KEYID = 5
6,063,638 UART: [ldev] AUTHORITY.KEYID = 7
6,064,929 UART: [ldev] FE.KEYID = 1
6,108,428 UART: [ldev] Erasing FE.KEYID = 1
8,615,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,074 UART: [ldev] --
10,427,348 UART: [fwproc] Wait for Commands...
10,429,555 UART: [fwproc] Recv command 0x46574c44
10,431,658 UART: [fwproc] Recv'd Img size: 114448 bytes
13,835,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,908,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,977,109 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,296,032 >>> mbox cmd response: success
14,300,390 UART: [afmc] ++
14,301,051 UART: [afmc] CDI.KEYID = 6
14,301,957 UART: [afmc] SUBJECT.KEYID = 7
14,303,060 UART: [afmc] AUTHORITY.KEYID = 5
16,847,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,568,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,570,456 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,586,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,602,212 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,618,044 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,641,061 UART: [afmc] --
18,645,514 UART: [cold-reset] --
18,648,979 UART: [state] Locking Datavault
18,653,866 UART: [state] Locking PCR0, PCR1 and PCR31
18,655,512 UART: [state] Locking ICCM
18,657,966 UART: [exit] Launching FMC @ 0x40000130
18,666,367 UART:
18,666,607 UART: Running Caliptra FMC ...
18,667,710 UART:
18,667,876 UART: [state] CFI Enabled
18,728,132 UART: [fht] FMC Alias Private Key: 7
20,491,852 UART: [art] Extend RT PCRs Done
20,493,618 UART: [art] Lock RT PCRs Done
20,494,641 UART: [art] Populate DV Done
20,499,757 UART: [fht] FMC Alias Private Key: 7
20,501,245 UART: [art] Derive CDI
20,502,010 UART: [art] Store in in slot 0x4
20,563,592 UART: [art] Derive Key Pair
20,564,816 UART: [art] Store priv key in slot 0x5
23,041,856 UART: [art] Derive Key Pair - Done
23,054,847 UART: [art] Signing Cert with AUTHO
23,056,204 UART: RITY.KEYID = 7
24,767,644 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,166 UART: [art] PUB.X = EDFE5274BE68E9DC47DBEA9A4AF36EF135E1134DDACCF33A85AC5DF4A44B5EC44576BE492765B24F2DB95B1C8E6ED487
24,776,489 UART: [art] PUB.Y = 9D48E0F7F0465C78FE822AB70DB0A1AA191FA275CA86EBAFFC3C0B34FF032F2AA6070870132C956FC72C781A43D24B4A
24,783,737 UART: [art] SIG.R = 6415A1352249B87CADE79A4735F46622C2FCDB033F87B4336857F7D6523676E5BB249CA89A223F5EF7CD090DF029680D
24,791,132 UART: [art] SIG.S = 1A97C2DC778DE60EED60FAA24683C2053FB022313E1C3AB29B8A5EFB71389BC734C395DD908010CF2600D655CAF8252A
25,770,390 UART: Caliptra RT
25,771,083 UART: [state] CFI Enabled
25,936,377 UART: [rt] RT listening for mailbox commands...
25,938,272 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,969,336 UART: [rt]cmd =0x414c544e, len=41
25,971,851 >>> mbox cmd response data (8 bytes)
25,972,837 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,003,232 UART: [rt]cmd =0x434b4558, len=80
30,336,452 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,359,708 ready_for_fw is high
3,360,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,043,815 >>> mbox cmd response: success
18,340,386 UART:
18,340,789 UART: Running Caliptra FMC ...
18,341,905 UART:
18,342,056 UART: [state] CFI Enabled
18,407,419 UART: [fht] FMC Alias Private Key: 7
20,170,434 UART: [art] Extend RT PCRs Done
20,171,663 UART: [art] Lock RT PCRs Done
20,173,422 UART: [art] Populate DV Done
20,179,100 UART: [fht] FMC Alias Private Key: 7
20,180,694 UART: [art] Derive CDI
20,181,439 UART: [art] Store in in slot 0x4
20,240,097 UART: [art] Derive Key Pair
20,241,137 UART: [art] Store priv key in slot 0x5
22,703,891 UART: [art] Derive Key Pair - Done
22,716,667 UART: [art] Signing Cert with AUTHO
22,717,999 UART: RITY.KEYID = 7
24,430,130 UART: [art] Erasing AUTHORITY.KEYID = 7
24,431,632 UART: [art] PUB.X = BB45A2AF3FB52F0EFA9EDC7985B448B94A804BBB7FC1777EABEC72F3A1FB331A35F92E56CF18864832B0C8C6EE325AF3
24,438,881 UART: [art] PUB.Y = AACA536D85F0B73AC2234002DB184AD2829F4B029ABCBBB9FF550134C395D590A12399BF1BFC3C03AB7F8E82A8F02592
24,446,188 UART: [art] SIG.R = 25CDEF2EA338634E97DCCE6A6B229F11A126D5A0E984C61B97964500D9F45C4E13A1D9500D26CE9B3251F5BF9A148780
24,453,581 UART: [art] SIG.S = 107DEF8A82FCAEFF0CCF9789CB1D7C403B6BA5970DB1179BCF7848BD1BE672EC837CDD2DDFB13DD3CD9DCE79AFFEBEE2
25,432,653 UART: Caliptra RT
25,433,351 UART: [state] CFI Enabled
25,597,808 UART: [rt] RT listening for mailbox commands...
25,599,712 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,630,339 UART: [rt]cmd =0x414c544e, len=41
25,632,592 >>> mbox cmd response data (8 bytes)
25,633,363 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,663,873 UART: [rt]cmd =0x434b4558, len=80
29,998,972 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,468 UART:
192,839 UART: Running Caliptra ROM ...
194,059 UART:
603,591 UART: [state] CFI Enabled
618,460 UART: [state] LifecycleState = Unprovisioned
620,330 UART: [state] DebugLocked = No
622,062 UART: [state] WD Timer not started. Device not locked for debugging
625,820 UART: [kat] SHA2-256
804,951 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,539 UART: [kat] ++
816,987 UART: [kat] sha1
828,560 UART: [kat] SHA2-256
831,630 UART: [kat] SHA2-384
836,688 UART: [kat] SHA2-512-ACC
839,685 UART: [kat] ECC-384
3,279,594 UART: [kat] HMAC-384Kdf
3,292,266 UART: [kat] LMS
3,821,758 UART: [kat] --
3,826,416 UART: [cold-reset] ++
3,827,925 UART: [fht] FHT @ 0x50003400
3,838,351 UART: [idev] ++
3,838,955 UART: [idev] CDI.KEYID = 6
3,839,837 UART: [idev] SUBJECT.KEYID = 7
3,840,848 UART: [idev] UDS.KEYID = 0
3,842,068 ready_for_fw is high
3,842,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,834 UART: [idev] Erasing UDS.KEYID = 0
6,312,249 UART: [idev] Sha1 KeyId Algorithm
6,334,791 UART: [idev] --
6,338,600 UART: [ldev] ++
6,339,173 UART: [ldev] CDI.KEYID = 6
6,340,051 UART: [ldev] SUBJECT.KEYID = 5
6,341,316 UART: [ldev] AUTHORITY.KEYID = 7
6,342,581 UART: [ldev] FE.KEYID = 1
6,355,202 UART: [ldev] Erasing FE.KEYID = 1
8,828,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,408 UART: [ldev] --
10,617,230 UART: [fwproc] Wait for Commands...
10,619,580 UART: [fwproc] Recv command 0x46574c44
10,621,607 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,484,953 >>> mbox cmd response: success
14,489,327 UART: [afmc] ++
14,489,915 UART: [afmc] CDI.KEYID = 6
14,490,817 UART: [afmc] SUBJECT.KEYID = 7
14,491,971 UART: [afmc] AUTHORITY.KEYID = 5
16,990,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,946 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,723 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,733 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,572 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,693 UART: [afmc] --
18,790,036 UART: [cold-reset] --
18,793,459 UART: [state] Locking Datavault
18,797,242 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,089 UART: [state] Locking ICCM
18,800,763 UART: [exit] Launching FMC @ 0x40000130
18,809,213 UART:
18,809,442 UART: Running Caliptra FMC ...
18,810,556 UART:
18,810,710 UART: [state] CFI Enabled
18,818,967 UART: [fht] FMC Alias Private Key: 7
20,575,603 UART: [art] Extend RT PCRs Done
20,576,825 UART: [art] Lock RT PCRs Done
20,578,308 UART: [art] Populate DV Done
20,583,877 UART: [fht] FMC Alias Private Key: 7
20,585,464 UART: [art] Derive CDI
20,586,189 UART: [art] Store in in slot 0x4
20,628,982 UART: [art] Derive Key Pair
20,629,974 UART: [art] Store priv key in slot 0x5
23,057,034 UART: [art] Derive Key Pair - Done
23,070,199 UART: [art] Signing Cert with AUTHO
23,071,493 UART: RITY.KEYID = 7
24,776,792 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,297 UART: [art] PUB.X = 90E3C24F33D7842A15F57657CAB795138126BB91E47D9A4EE930E26D1928B00E26B23B9D56B20FC21B37D1A67B8ED41A
24,785,596 UART: [art] PUB.Y = 368689B7786A10A0CEED2B409C6608188D3C409E0D7891FE4E26F983E8D65E83C9BD50ABF5DF0329E33BAF7552A12FFB
24,792,855 UART: [art] SIG.R = 8323B4D977850197E0AEFE3E3AAA6D7A8B741BDD7D02EDDE726CFCBE30F8E42ECEB86A8F1F067DCFA35058EEB931705C
24,800,274 UART: [art] SIG.S = 73A88301D47F90BCAEE8DC1ACA2BA588DA4FBB3F2BBEF96916A26571DA31341262910CA74FEF68DA7B105FE5D1C03D94
25,779,041 UART: Caliptra RT
25,779,739 UART: [state] CFI Enabled
25,897,484 UART: [rt] RT listening for mailbox commands...
25,899,392 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,929,879 UART: [rt]cmd =0x414c544e, len=41
25,932,225 >>> mbox cmd response data (8 bytes)
25,933,203 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,963,725 UART: [rt]cmd =0x434b4558, len=80
30,235,532 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,696,749 ready_for_fw is high
3,697,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,128 >>> mbox cmd response: success
18,529,066 UART:
18,529,462 UART: Running Caliptra FMC ...
18,530,590 UART:
18,530,754 UART: [state] CFI Enabled
18,538,245 UART: [fht] FMC Alias Private Key: 7
20,294,816 UART: [art] Extend RT PCRs Done
20,296,043 UART: [art] Lock RT PCRs Done
20,297,879 UART: [art] Populate DV Done
20,303,444 UART: [fht] FMC Alias Private Key: 7
20,304,929 UART: [art] Derive CDI
20,305,686 UART: [art] Store in in slot 0x4
20,348,455 UART: [art] Derive Key Pair
20,349,448 UART: [art] Store priv key in slot 0x5
22,776,699 UART: [art] Derive Key Pair - Done
22,789,162 UART: [art] Signing Cert with AUTHO
22,790,463 UART: RITY.KEYID = 7
24,495,886 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,393 UART: [art] PUB.X = 710068801AD7D8B514C8C564BDE41C2BFE6C822C98B9E73AAD2A1C29EC2DDA8D3260B4DCF35AF0B8270679556B3E56DB
24,504,681 UART: [art] PUB.Y = F0CD9490DC4ACE480F9E3B28CD0C7F04A4640876C6C07648CC364E3FBA496EF8F96A441B9439881C430CD19B581D9E60
24,511,922 UART: [art] SIG.R = B715671C8167B65BA2B8DABD16D1E3B9E2F90D3F9B6931051997A8C45ACEB9DE35D4AEB27BB2EFB16F41E3FDE56E1054
24,519,367 UART: [art] SIG.S = 12CB8B6D2600A46AC048FA48D840350C82879E709907F999425291390432A61852B64285BFFAF1C37F97E80DDB59C880
25,498,568 UART: Caliptra RT
25,499,264 UART: [state] CFI Enabled
25,616,737 UART: [rt] RT listening for mailbox commands...
25,618,618 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,648,727 UART: [rt]cmd =0x414c544e, len=41
25,651,283 >>> mbox cmd response data (8 bytes)
25,652,272 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,682,627 UART: [rt]cmd =0x434b4558, len=80
29,955,682 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,441,509 ready_for_fw is high
3,442,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,741,769 >>> mbox cmd response: success
19,021,560 UART:
19,021,949 UART: Running Caliptra FMC ...
19,023,099 UART:
19,023,271 UART: [state] CFI Enabled
19,091,845 UART: [fht] FMC Alias Private Key: 7
20,855,610 UART: [art] Extend RT PCRs Done
20,856,835 UART: [art] Lock RT PCRs Done
20,858,642 UART: [art] Populate DV Done
20,864,110 UART: [fht] FMC Alias Private Key: 7
20,865,823 UART: [art] Derive CDI
20,866,640 UART: [art] Store in in slot 0x4
20,924,157 UART: [art] Derive Key Pair
20,925,158 UART: [art] Store priv key in slot 0x5
23,388,033 UART: [art] Derive Key Pair - Done
23,401,246 UART: [art] Signing Cert with AUTHO
23,402,551 UART: RITY.KEYID = 7
25,114,353 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,862 UART: [art] PUB.X = CFA8592F5FD3C88D98C8EDA8819A35B707AF963C8DCC0C374263EA69A53C28239024368068D96C4D22E10D0FC0C438AE
25,123,114 UART: [art] PUB.Y = 744DB1BA85744945F6889DAA72A3AEB39AEBF1D298576C75D43E89EC3BF42388B5E8C1EE3400B06A5EEFAA672CFA600E
25,130,365 UART: [art] SIG.R = B53641F5B93AED8A865C38D2D572F2D462B9FFCA35DB3CC12BD78F48F0DD2145843D1D9180775A898DB3DDB18B5801E8
25,137,811 UART: [art] SIG.S = E752642C4AD6DE20D79C92174C44C60FC51BFD8A2979D11EF83150AD2C06B24111FEEFF1E48B5AC09B1A34619C85C427
26,116,977 UART: Caliptra RT
26,117,669 UART: [state] CFI Enabled
26,283,024 UART: [rt] RT listening for mailbox commands...
26,284,932 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,315,622 UART: [rt]cmd =0x414c544e, len=41
26,317,993 >>> mbox cmd response data (8 bytes)
26,318,854 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,349,157 UART: [rt]cmd =0x434b4558, len=80
30,683,823 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,752,864 ready_for_fw is high
3,753,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,680 >>> mbox cmd response: success
19,205,408 UART:
19,205,784 UART: Running Caliptra FMC ...
19,206,889 UART:
19,207,035 UART: [state] CFI Enabled
19,214,445 UART: [fht] FMC Alias Private Key: 7
20,971,572 UART: [art] Extend RT PCRs Done
20,972,800 UART: [art] Lock RT PCRs Done
20,974,503 UART: [art] Populate DV Done
20,979,993 UART: [fht] FMC Alias Private Key: 7
20,981,597 UART: [art] Derive CDI
20,982,412 UART: [art] Store in in slot 0x4
21,025,339 UART: [art] Derive Key Pair
21,026,387 UART: [art] Store priv key in slot 0x5
23,453,004 UART: [art] Derive Key Pair - Done
23,466,170 UART: [art] Signing Cert with AUTHO
23,467,469 UART: RITY.KEYID = 7
25,172,697 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,213 UART: [art] PUB.X = 94F5A8311C4D5E60233AB30FC88554042D6207B89D1BCBC7937AA40A920E8DECEFAB5E74937163D8C02E076F86B95299
25,181,528 UART: [art] PUB.Y = E0B791529676B4E25A67DF5E3C1530CE1B61B2FA9EB981D6E932C29CFA8B539361CD595FBBD578FAF371AE24D0D8E951
25,188,728 UART: [art] SIG.R = 8952DF0A2496AB59D738F1726BB85DBDCB05B2A3890DBB3D904AA002F20DB9C9B0EB5766FF63FE8DB6D16A8AFBDC1A7C
25,196,174 UART: [art] SIG.S = B071D4F315D7F356BD144D9AF51B73DC945F4EDE9B532190CCD2D4F32EEF839FDDBE1689C4DAD776C627CE37F73731AF
26,174,967 UART: Caliptra RT
26,175,654 UART: [state] CFI Enabled
26,293,027 UART: [rt] RT listening for mailbox commands...
26,294,940 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,325,496 UART: [rt]cmd =0x414c544e, len=41
26,327,764 >>> mbox cmd response data (8 bytes)
26,328,763 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,358,967 UART: [rt]cmd =0x434b4558, len=80
30,631,572 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,045 UART: [kat] SHA2-256
881,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,091 UART: [kat] ++
886,243 UART: [kat] sha1
890,465 UART: [kat] SHA2-256
892,403 UART: [kat] SHA2-384
895,274 UART: [kat] SHA2-512-ACC
897,175 UART: [kat] ECC-384
902,702 UART: [kat] HMAC-384Kdf
907,336 UART: [kat] LMS
1,475,532 UART: [kat] --
1,476,511 UART: [cold-reset] ++
1,476,943 UART: [fht] Storing FHT @ 0x50003400
1,479,658 UART: [idev] ++
1,479,826 UART: [idev] CDI.KEYID = 6
1,480,186 UART: [idev] SUBJECT.KEYID = 7
1,480,610 UART: [idev] UDS.KEYID = 0
1,480,955 ready_for_fw is high
1,480,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,504 UART: [idev] Erasing UDS.KEYID = 0
1,504,824 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,456 UART: [idev] --
1,514,629 UART: [ldev] ++
1,514,797 UART: [ldev] CDI.KEYID = 6
1,515,160 UART: [ldev] SUBJECT.KEYID = 5
1,515,586 UART: [ldev] AUTHORITY.KEYID = 7
1,516,049 UART: [ldev] FE.KEYID = 1
1,521,245 UART: [ldev] Erasing FE.KEYID = 1
1,546,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,536 UART: [ldev] --
1,586,037 UART: [fwproc] Waiting for Commands...
1,586,826 UART: [fwproc] Received command 0x46574c44
1,587,617 UART: [fwproc] Received Image of size 114448 bytes
2,886,750 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,564 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,916 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,943 >>> mbox cmd response: success
3,081,081 UART: [afmc] ++
3,081,249 UART: [afmc] CDI.KEYID = 6
3,081,611 UART: [afmc] SUBJECT.KEYID = 7
3,082,036 UART: [afmc] AUTHORITY.KEYID = 5
3,117,137 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,713 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,493 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,221 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,106 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,796 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,469 UART: [afmc] --
3,160,375 UART: [cold-reset] --
3,161,199 UART: [state] Locking Datavault
3,162,490 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,094 UART: [state] Locking ICCM
3,163,638 UART: [exit] Launching FMC @ 0x40000130
3,168,967 UART:
3,168,983 UART: Running Caliptra FMC ...
3,169,391 UART:
3,169,445 UART: [state] CFI Enabled
3,179,804 UART: [fht] FMC Alias Private Key: 7
3,287,551 UART: [art] Extend RT PCRs Done
3,287,979 UART: [art] Lock RT PCRs Done
3,289,457 UART: [art] Populate DV Done
3,297,876 UART: [fht] FMC Alias Private Key: 7
3,298,980 UART: [art] Derive CDI
3,299,260 UART: [art] Store in in slot 0x4
3,385,027 UART: [art] Derive Key Pair
3,385,387 UART: [art] Store priv key in slot 0x5
3,398,519 UART: [art] Derive Key Pair - Done
3,413,334 UART: [art] Signing Cert with AUTHO
3,413,814 UART: RITY.KEYID = 7
3,428,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,357 UART: [art] PUB.X = 09302FF85AAE2051419A0E16E95F37BBFB0C4D2E36555FE51699B315564165178196F55C1982D4D1B6C70B81D410E521
3,436,109 UART: [art] PUB.Y = F38FAA941C7460EAE237C6F0E7329CBC31F54D0A202419D86581352A786ADAED8FC06E8C5BC933330E9BE53D0E4887B0
3,443,060 UART: [art] SIG.R = 8C525C4C5C4FEA1D4EAF23D471971C66F0C5462EB3E05539262412437DBAAC33DAD35F08689D6A7B2F7462E378331708
3,449,826 UART: [art] SIG.S = 6A39319A885A36D3D4348AD3DAF9175DCA90A293B0A9BC49623A7AD4B888E5EAD8813F97F2BD425F9567834EDC6C07F2
3,473,542 UART: Caliptra RT
3,473,795 UART: [state] CFI Enabled
3,581,422 UART: [rt] RT listening for mailbox commands...
3,582,092 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,009 UART: [rt]cmd =0x414c544e, len=41
3,613,971 >>> mbox cmd response data (8 bytes)
3,613,972 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,937 UART: [rt]cmd =0x434b4558, len=80
3,815,851 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,399 ready_for_fw is high
1,362,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,051 >>> mbox cmd response: success
2,991,977 UART:
2,991,993 UART: Running Caliptra FMC ...
2,992,401 UART:
2,992,455 UART: [state] CFI Enabled
3,003,306 UART: [fht] FMC Alias Private Key: 7
3,110,889 UART: [art] Extend RT PCRs Done
3,111,317 UART: [art] Lock RT PCRs Done
3,113,039 UART: [art] Populate DV Done
3,121,194 UART: [fht] FMC Alias Private Key: 7
3,122,156 UART: [art] Derive CDI
3,122,436 UART: [art] Store in in slot 0x4
3,208,031 UART: [art] Derive Key Pair
3,208,391 UART: [art] Store priv key in slot 0x5
3,221,659 UART: [art] Derive Key Pair - Done
3,236,266 UART: [art] Signing Cert with AUTHO
3,236,746 UART: RITY.KEYID = 7
3,251,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,701 UART: [art] PUB.X = 12CE3C96CD3F2BD20E7B8D27DDD87CD5CD2BA350B6C0D42BB4D22FD5BC5F21CFB0E2024EF97933543FC4792D2B70FEC4
3,259,491 UART: [art] PUB.Y = C68ACDB3B15E77B88473E1CD35D377204AA4FFC5F5F31A152F19AD1F11BB9AC59C361476529F3F34E6B928D8CFB8A33E
3,266,457 UART: [art] SIG.R = D075A9A038A0825024CDFF15D48EA58841F027EBE312973EBABC8B49F247ADC4121804205DB8169C102A043F79509D4B
3,273,223 UART: [art] SIG.S = AB987FB2A17012AA66CA68D00495D8459479DB3EB3AB9691B03105ED9CC4D2A4A59167900A4CC473F9B6D1A4FFFF2857
3,296,959 UART: Caliptra RT
3,297,212 UART: [state] CFI Enabled
3,404,826 UART: [rt] RT listening for mailbox commands...
3,405,496 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,473 UART: [rt]cmd =0x414c544e, len=41
3,437,319 >>> mbox cmd response data (8 bytes)
3,437,320 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,041 UART: [rt]cmd =0x434b4558, len=80
3,638,019 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,884 UART: [kat] SHA2-256
892,822 UART: [kat] SHA2-384
895,607 UART: [kat] SHA2-512-ACC
897,508 UART: [kat] ECC-384
903,105 UART: [kat] HMAC-384Kdf
907,871 UART: [kat] LMS
1,476,067 UART: [kat] --
1,476,860 UART: [cold-reset] ++
1,477,212 UART: [fht] Storing FHT @ 0x50003400
1,480,043 UART: [idev] ++
1,480,211 UART: [idev] CDI.KEYID = 6
1,480,571 UART: [idev] SUBJECT.KEYID = 7
1,480,995 UART: [idev] UDS.KEYID = 0
1,481,340 ready_for_fw is high
1,481,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,041 UART: [idev] Erasing UDS.KEYID = 0
1,505,801 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,455 UART: [idev] --
1,515,286 UART: [ldev] ++
1,515,454 UART: [ldev] CDI.KEYID = 6
1,515,817 UART: [ldev] SUBJECT.KEYID = 5
1,516,243 UART: [ldev] AUTHORITY.KEYID = 7
1,516,706 UART: [ldev] FE.KEYID = 1
1,522,004 UART: [ldev] Erasing FE.KEYID = 1
1,547,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,995 UART: [ldev] --
1,586,446 UART: [fwproc] Waiting for Commands...
1,587,141 UART: [fwproc] Received command 0x46574c44
1,587,932 UART: [fwproc] Received Image of size 114448 bytes
2,886,509 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,555 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,907 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,002 >>> mbox cmd response: success
3,079,094 UART: [afmc] ++
3,079,262 UART: [afmc] CDI.KEYID = 6
3,079,624 UART: [afmc] SUBJECT.KEYID = 7
3,080,049 UART: [afmc] AUTHORITY.KEYID = 5
3,114,638 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,738 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,518 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,246 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,131 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,821 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,714 UART: [afmc] --
3,157,754 UART: [cold-reset] --
3,158,696 UART: [state] Locking Datavault
3,159,595 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,199 UART: [state] Locking ICCM
3,160,861 UART: [exit] Launching FMC @ 0x40000130
3,166,190 UART:
3,166,206 UART: Running Caliptra FMC ...
3,166,614 UART:
3,166,757 UART: [state] CFI Enabled
3,177,692 UART: [fht] FMC Alias Private Key: 7
3,285,717 UART: [art] Extend RT PCRs Done
3,286,145 UART: [art] Lock RT PCRs Done
3,287,807 UART: [art] Populate DV Done
3,296,246 UART: [fht] FMC Alias Private Key: 7
3,297,214 UART: [art] Derive CDI
3,297,494 UART: [art] Store in in slot 0x4
3,382,843 UART: [art] Derive Key Pair
3,383,203 UART: [art] Store priv key in slot 0x5
3,396,575 UART: [art] Derive Key Pair - Done
3,411,245 UART: [art] Signing Cert with AUTHO
3,411,725 UART: RITY.KEYID = 7
3,427,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,878 UART: [art] PUB.X = 1D059A9242C177947675B08F7993F779B353B7F245DA85C4B17E0AC8D053C30EAB5565C02B0DC2DE02D110C208191247
3,434,626 UART: [art] PUB.Y = 848B6462F0D8D96E70C07EACEA72FBEDA7878FA09DFB54CBEDA6786F18D1160ABEF9BBAF1757782D08071B70AEF2BC9F
3,441,593 UART: [art] SIG.R = AFFA1BDF29BB7514EC9F0F954B3EE514E0D6C5E692CEF80E3D6DD3EFF3163D54FC6CA0FF2CD9C3FB6CA4E0BA066152FF
3,448,390 UART: [art] SIG.S = DF9E19F9B818960EC3C1415B9AA85E263006963B8F701F21142546B76850B049F0C0DF6D700900CB450F68814795D34B
3,472,563 UART: Caliptra RT
3,472,908 UART: [state] CFI Enabled
3,580,156 UART: [rt] RT listening for mailbox commands...
3,580,826 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,837 UART: [rt]cmd =0x414c544e, len=41
3,612,847 >>> mbox cmd response data (8 bytes)
3,612,848 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,741 UART: [rt]cmd =0x434b4558, len=80
3,813,976 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,102 ready_for_fw is high
1,363,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,526 >>> mbox cmd response: success
2,991,540 UART:
2,991,556 UART: Running Caliptra FMC ...
2,991,964 UART:
2,992,107 UART: [state] CFI Enabled
3,002,446 UART: [fht] FMC Alias Private Key: 7
3,110,207 UART: [art] Extend RT PCRs Done
3,110,635 UART: [art] Lock RT PCRs Done
3,112,427 UART: [art] Populate DV Done
3,120,698 UART: [fht] FMC Alias Private Key: 7
3,121,678 UART: [art] Derive CDI
3,121,958 UART: [art] Store in in slot 0x4
3,207,921 UART: [art] Derive Key Pair
3,208,281 UART: [art] Store priv key in slot 0x5
3,221,461 UART: [art] Derive Key Pair - Done
3,236,379 UART: [art] Signing Cert with AUTHO
3,236,859 UART: RITY.KEYID = 7
3,252,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,776 UART: [art] PUB.X = FEA5B53E98416EEE0F1BB649853BBE57FE8F0E87CD1CDFB704E553FB4D79B3D344BCDBD9EF59466FA852BBAB5D59510C
3,259,562 UART: [art] PUB.Y = F207474C3E6F4CD37351E2F3E779FC70597AC92B32217F7380C69509A48CCB92CD2C4FA2465F19CAE2FA05ABF7C9EB4B
3,266,517 UART: [art] SIG.R = 3FB0EB15F631EA29F72C52A696041478BCBA74FC1C874CE4DC4BC5D062024AADE26067D9EF8BCCF7B77AC2D09AB5B977
3,273,303 UART: [art] SIG.S = 7B1CB8FC5A993FABAA027BDE8579C700184A39B3EDE61A0BAF2BB583D6D8752B2098F40289DEFBD418CC092D86E5EA18
3,296,760 UART: Caliptra RT
3,297,105 UART: [state] CFI Enabled
3,404,479 UART: [rt] RT listening for mailbox commands...
3,405,149 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,194 UART: [rt]cmd =0x414c544e, len=41
3,437,144 >>> mbox cmd response data (8 bytes)
3,437,145 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,156 UART: [rt]cmd =0x434b4558, len=80
3,639,088 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
893,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,429 UART: [kat] ++
897,581 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,728 UART: [kat] SHA2-512-ACC
908,629 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,578 UART: [kat] LMS
1,170,906 UART: [kat] --
1,171,853 UART: [cold-reset] ++
1,172,335 UART: [fht] FHT @ 0x50003400
1,175,114 UART: [idev] ++
1,175,282 UART: [idev] CDI.KEYID = 6
1,175,642 UART: [idev] SUBJECT.KEYID = 7
1,176,066 UART: [idev] UDS.KEYID = 0
1,176,411 ready_for_fw is high
1,176,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,026 UART: [idev] Erasing UDS.KEYID = 0
1,201,851 UART: [idev] Sha1 KeyId Algorithm
1,210,545 UART: [idev] --
1,211,465 UART: [ldev] ++
1,211,633 UART: [ldev] CDI.KEYID = 6
1,211,996 UART: [ldev] SUBJECT.KEYID = 5
1,212,422 UART: [ldev] AUTHORITY.KEYID = 7
1,212,885 UART: [ldev] FE.KEYID = 1
1,218,065 UART: [ldev] Erasing FE.KEYID = 1
1,244,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,047 UART: [ldev] --
1,283,534 UART: [fwproc] Wait for Commands...
1,284,216 UART: [fwproc] Recv command 0x46574c44
1,284,944 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,685 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,632 >>> mbox cmd response: success
2,777,832 UART: [afmc] ++
2,778,000 UART: [afmc] CDI.KEYID = 6
2,778,362 UART: [afmc] SUBJECT.KEYID = 7
2,778,787 UART: [afmc] AUTHORITY.KEYID = 5
2,813,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,899 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,512 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,231 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,041 UART: [afmc] --
2,856,921 UART: [cold-reset] --
2,857,853 UART: [state] Locking Datavault
2,859,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,612 UART: [state] Locking ICCM
2,860,216 UART: [exit] Launching FMC @ 0x40000130
2,865,545 UART:
2,865,561 UART: Running Caliptra FMC ...
2,865,969 UART:
2,866,023 UART: [state] CFI Enabled
2,876,374 UART: [fht] FMC Alias Private Key: 7
2,984,535 UART: [art] Extend RT PCRs Done
2,984,963 UART: [art] Lock RT PCRs Done
2,986,429 UART: [art] Populate DV Done
2,994,960 UART: [fht] FMC Alias Private Key: 7
2,996,034 UART: [art] Derive CDI
2,996,314 UART: [art] Store in in slot 0x4
3,081,869 UART: [art] Derive Key Pair
3,082,229 UART: [art] Store priv key in slot 0x5
3,095,823 UART: [art] Derive Key Pair - Done
3,110,687 UART: [art] Signing Cert with AUTHO
3,111,167 UART: RITY.KEYID = 7
3,126,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,856 UART: [art] PUB.X = CAE94543EFBB01CE372F599B922C21A546F8E06B974A15270BE5BE3FDB8417A25CB7EEE25C90B328F8E3647AEEB90A8D
3,133,635 UART: [art] PUB.Y = 4A3E04C5946BB72A80B272B290472C8AC55C568428E7744F33B74700177D387132BAB808F95FB385571607C972FCD8B3
3,140,546 UART: [art] SIG.R = 7A6030B9921E9D221A0BF3612A5AEB1162262C4EBF6A3343E4F10CC7FA76F20AF7D3FDFA29D4E429CCE86C40F4D17158
3,147,321 UART: [art] SIG.S = BB1754250314FB20ACCCD00714FDE0CBD1BD2D1D592765C6F4CFF3160E52DA2E406B5EE026A0408B4B5C65DAE87F5B4E
3,170,989 UART: Caliptra RT
3,171,242 UART: [state] CFI Enabled
3,279,161 UART: [rt] RT listening for mailbox commands...
3,279,831 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,958 UART: [rt]cmd =0x414c544e, len=41
3,312,002 >>> mbox cmd response data (8 bytes)
3,312,003 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,862 UART: [rt]cmd =0x434b4558, len=80
3,512,569 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,021 ready_for_fw is high
1,060,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,485 >>> mbox cmd response: success
2,689,115 UART:
2,689,131 UART: Running Caliptra FMC ...
2,689,539 UART:
2,689,593 UART: [state] CFI Enabled
2,699,898 UART: [fht] FMC Alias Private Key: 7
2,807,521 UART: [art] Extend RT PCRs Done
2,807,949 UART: [art] Lock RT PCRs Done
2,809,927 UART: [art] Populate DV Done
2,818,082 UART: [fht] FMC Alias Private Key: 7
2,819,010 UART: [art] Derive CDI
2,819,290 UART: [art] Store in in slot 0x4
2,904,929 UART: [art] Derive Key Pair
2,905,289 UART: [art] Store priv key in slot 0x5
2,917,779 UART: [art] Derive Key Pair - Done
2,932,691 UART: [art] Signing Cert with AUTHO
2,933,171 UART: RITY.KEYID = 7
2,948,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,036 UART: [art] PUB.X = DBC4139682EECFB3C99846C34305F0CD443BFF6D9BAC9852DF9DBF7A74439591EB0D3A56D3441A78A8BFBA0ACD658AC2
2,955,819 UART: [art] PUB.Y = EE94FAC3702239546C6BB7F0EC3C162535C51B5A6E708769C9F2CA4C0A6BC4023BEC0F47E382B6B2046198D3B8EC009F
2,962,745 UART: [art] SIG.R = 5017248A45FE70E58982B368543265C064868CE29B8AF1D3F500BBE56870B2482698E0DE41462146CCB43BF5E0215E43
2,969,485 UART: [art] SIG.S = E3994660B609B3886A52B44933F4860A8F96F6A930D712BF778684D5EE813CFAABB2D50D75C5D7F1C896F8C4677EDD9C
2,993,397 UART: Caliptra RT
2,993,650 UART: [state] CFI Enabled
3,101,741 UART: [rt] RT listening for mailbox commands...
3,102,411 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,660 UART: [rt]cmd =0x414c544e, len=41
3,134,434 >>> mbox cmd response data (8 bytes)
3,134,435 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,388 UART: [rt]cmd =0x434b4558, len=80
3,335,196 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,158 UART: [state] WD Timer not started. Device not locked for debugging
88,457 UART: [kat] SHA2-256
894,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,232 UART: [kat] ++
898,384 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,337 UART: [kat] SHA2-512-ACC
909,238 UART: [kat] ECC-384
919,135 UART: [kat] HMAC-384Kdf
923,727 UART: [kat] LMS
1,172,055 UART: [kat] --
1,173,068 UART: [cold-reset] ++
1,173,406 UART: [fht] FHT @ 0x50003400
1,176,135 UART: [idev] ++
1,176,303 UART: [idev] CDI.KEYID = 6
1,176,663 UART: [idev] SUBJECT.KEYID = 7
1,177,087 UART: [idev] UDS.KEYID = 0
1,177,432 ready_for_fw is high
1,177,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,985 UART: [idev] Erasing UDS.KEYID = 0
1,202,422 UART: [idev] Sha1 KeyId Algorithm
1,210,990 UART: [idev] --
1,211,996 UART: [ldev] ++
1,212,164 UART: [ldev] CDI.KEYID = 6
1,212,527 UART: [ldev] SUBJECT.KEYID = 5
1,212,953 UART: [ldev] AUTHORITY.KEYID = 7
1,213,416 UART: [ldev] FE.KEYID = 1
1,218,484 UART: [ldev] Erasing FE.KEYID = 1
1,244,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,372 UART: [ldev] --
1,283,647 UART: [fwproc] Wait for Commands...
1,284,461 UART: [fwproc] Recv command 0x46574c44
1,285,189 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,707 >>> mbox cmd response: success
2,778,769 UART: [afmc] ++
2,778,937 UART: [afmc] CDI.KEYID = 6
2,779,299 UART: [afmc] SUBJECT.KEYID = 7
2,779,724 UART: [afmc] AUTHORITY.KEYID = 5
2,814,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,106 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,834 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,719 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,438 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,144 UART: [afmc] --
2,858,026 UART: [cold-reset] --
2,859,044 UART: [state] Locking Datavault
2,860,071 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,675 UART: [state] Locking ICCM
2,861,185 UART: [exit] Launching FMC @ 0x40000130
2,866,514 UART:
2,866,530 UART: Running Caliptra FMC ...
2,866,938 UART:
2,867,081 UART: [state] CFI Enabled
2,877,728 UART: [fht] FMC Alias Private Key: 7
2,985,489 UART: [art] Extend RT PCRs Done
2,985,917 UART: [art] Lock RT PCRs Done
2,987,227 UART: [art] Populate DV Done
2,995,734 UART: [fht] FMC Alias Private Key: 7
2,996,850 UART: [art] Derive CDI
2,997,130 UART: [art] Store in in slot 0x4
3,083,003 UART: [art] Derive Key Pair
3,083,363 UART: [art] Store priv key in slot 0x5
3,096,509 UART: [art] Derive Key Pair - Done
3,111,611 UART: [art] Signing Cert with AUTHO
3,112,091 UART: RITY.KEYID = 7
3,127,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,148 UART: [art] PUB.X = 6EE1A2032C5A14AC3E21D8B421C5F9B7BA88504BB3581860539FF2B4FEB490E7547AAC9FBF6602C68F164DABC37CB5AE
3,134,930 UART: [art] PUB.Y = 991927B31920FBE5DC1E06A5ABA1D604FD00BAC86B2C8F16C4E8721930BA032091A6D45633C33441893FFAFB96595D8C
3,141,855 UART: [art] SIG.R = ED872D22D1EB00C236B48275DD6BA3ECCEF522F157B5FFCA57FD0FFB36932E2BBC14ED3BBE9D335ACC0D40401E664717
3,148,621 UART: [art] SIG.S = CED51DA1E960D4DD8D198B5FAB2CD1E898A8A9952B63699F1C9FE7D9D1D7765C5A6719D7D71212456162965B286BC3F0
3,172,446 UART: Caliptra RT
3,172,791 UART: [state] CFI Enabled
3,280,109 UART: [rt] RT listening for mailbox commands...
3,280,779 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,662 UART: [rt]cmd =0x414c544e, len=41
3,312,786 >>> mbox cmd response data (8 bytes)
3,312,787 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,824 UART: [rt]cmd =0x434b4558, len=80
3,514,352 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,032 ready_for_fw is high
1,061,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,276 >>> mbox cmd response: success
2,690,748 UART:
2,690,764 UART: Running Caliptra FMC ...
2,691,172 UART:
2,691,315 UART: [state] CFI Enabled
2,701,942 UART: [fht] FMC Alias Private Key: 7
2,809,355 UART: [art] Extend RT PCRs Done
2,809,783 UART: [art] Lock RT PCRs Done
2,811,459 UART: [art] Populate DV Done
2,819,834 UART: [fht] FMC Alias Private Key: 7
2,820,848 UART: [art] Derive CDI
2,821,128 UART: [art] Store in in slot 0x4
2,907,045 UART: [art] Derive Key Pair
2,907,405 UART: [art] Store priv key in slot 0x5
2,920,899 UART: [art] Derive Key Pair - Done
2,935,916 UART: [art] Signing Cert with AUTHO
2,936,396 UART: RITY.KEYID = 7
2,951,458 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,223 UART: [art] PUB.X = FACC01B99D44293B12E87D15EE0BEB22A1944EE89CA06944ED4835DDA1235881A02B304115D050A0CD93553BAE0B7768
2,958,990 UART: [art] PUB.Y = FE165FC0D225FD8D1AB60F30D85A44BC933A7BCA123AA22EFE1A09D024B8375ED4AA467578912F30750940313DE2D758
2,965,939 UART: [art] SIG.R = 240F13E2219554E274D16E6DFF58EE4B81FD7187D55625B7A34E0807F501DF2B03515E153DABFB770518D5ADD238BC10
2,972,695 UART: [art] SIG.S = 302E54C2C509D0E01F9F1902B7570174211C9DF82BAE3F03C9DB6BB3A63E38280EC50F13EF800C16DE8F1BB54C34E624
2,996,599 UART: Caliptra RT
2,996,944 UART: [state] CFI Enabled
3,106,139 UART: [rt] RT listening for mailbox commands...
3,106,809 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,644 UART: [rt]cmd =0x414c544e, len=41
3,138,560 >>> mbox cmd response data (8 bytes)
3,138,561 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,550 UART: [rt]cmd =0x434b4558, len=80
3,339,731 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,453 UART: [kat] SHA2-256
901,393 UART: [kat] SHA2-384
904,056 UART: [kat] SHA2-512-ACC
905,957 UART: [kat] ECC-384
915,150 UART: [kat] HMAC-384Kdf
919,624 UART: [kat] LMS
1,167,936 UART: [kat] --
1,168,701 UART: [cold-reset] ++
1,169,027 UART: [fht] FHT @ 0x50003400
1,171,471 UART: [idev] ++
1,171,639 UART: [idev] CDI.KEYID = 6
1,172,000 UART: [idev] SUBJECT.KEYID = 7
1,172,425 UART: [idev] UDS.KEYID = 0
1,172,771 ready_for_fw is high
1,172,771 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,553 UART: [idev] Erasing UDS.KEYID = 0
1,197,199 UART: [idev] Sha1 KeyId Algorithm
1,206,069 UART: [idev] --
1,206,988 UART: [ldev] ++
1,207,156 UART: [ldev] CDI.KEYID = 6
1,207,520 UART: [ldev] SUBJECT.KEYID = 5
1,207,947 UART: [ldev] AUTHORITY.KEYID = 7
1,208,410 UART: [ldev] FE.KEYID = 1
1,213,406 UART: [ldev] Erasing FE.KEYID = 1
1,239,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,090 UART: [ldev] --
1,278,544 UART: [fwproc] Wait for Commands...
1,279,319 UART: [fwproc] Recv command 0x46574c44
1,280,052 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,900 >>> mbox cmd response: success
2,772,927 UART: [afmc] ++
2,773,095 UART: [afmc] CDI.KEYID = 6
2,773,458 UART: [afmc] SUBJECT.KEYID = 7
2,773,884 UART: [afmc] AUTHORITY.KEYID = 5
2,809,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,044 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,773 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,656 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,375 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,214 UART: [afmc] --
2,853,200 UART: [cold-reset] --
2,854,028 UART: [state] Locking Datavault
2,855,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,687 UART: [state] Locking ICCM
2,856,285 UART: [exit] Launching FMC @ 0x40000130
2,861,614 UART:
2,861,630 UART: Running Caliptra FMC ...
2,862,038 UART:
2,862,092 UART: [state] CFI Enabled
2,872,547 UART: [fht] FMC Alias Private Key: 7
2,980,080 UART: [art] Extend RT PCRs Done
2,980,508 UART: [art] Lock RT PCRs Done
2,982,032 UART: [art] Populate DV Done
2,989,991 UART: [fht] FMC Alias Private Key: 7
2,990,921 UART: [art] Derive CDI
2,991,201 UART: [art] Store in in slot 0x4
3,076,770 UART: [art] Derive Key Pair
3,077,130 UART: [art] Store priv key in slot 0x5
3,090,768 UART: [art] Derive Key Pair - Done
3,105,389 UART: [art] Signing Cert with AUTHO
3,105,869 UART: RITY.KEYID = 7
3,120,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,728 UART: [art] PUB.X = F6A9728FE7C2D99631E74EC20D4F9B75B2F87D0AC4753CE3ED4BD33ECC4256E64FD8329FE10C449253866B5AA1FB74C3
3,128,503 UART: [art] PUB.Y = B4C4BB6E0A2AEB967BF755D8D67B958C2B83BF5EF143E878906895A9D7A5531C428B6B22728EC8F50484F6B05356995C
3,135,451 UART: [art] SIG.R = B1E144149AF164A2A5F04DCD01A446F4EFF722D7DB7BAA4746C314A2A0C7F2F44CDB0CFC888F2521C6A7ABADFA84DFC7
3,142,243 UART: [art] SIG.S = 96CA8432E8DEFEE6791A439A266121818F11296DDB20B888945ABFF91898540BBCAF5B1010F0A15E22A6CDF6FC20D926
3,165,759 UART: Caliptra RT
3,166,012 UART: [state] CFI Enabled
3,272,746 UART: [rt] RT listening for mailbox commands...
3,273,416 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,255 UART: [rt]cmd =0x414c544e, len=41
3,305,241 >>> mbox cmd response data (8 bytes)
3,305,242 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,981 UART: [rt]cmd =0x434b4558, len=80
3,505,986 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,950 ready_for_fw is high
1,056,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,940 >>> mbox cmd response: success
2,687,770 UART:
2,687,786 UART: Running Caliptra FMC ...
2,688,194 UART:
2,688,248 UART: [state] CFI Enabled
2,698,967 UART: [fht] FMC Alias Private Key: 7
2,807,076 UART: [art] Extend RT PCRs Done
2,807,504 UART: [art] Lock RT PCRs Done
2,809,188 UART: [art] Populate DV Done
2,817,447 UART: [fht] FMC Alias Private Key: 7
2,818,445 UART: [art] Derive CDI
2,818,725 UART: [art] Store in in slot 0x4
2,904,574 UART: [art] Derive Key Pair
2,904,934 UART: [art] Store priv key in slot 0x5
2,917,738 UART: [art] Derive Key Pair - Done
2,932,844 UART: [art] Signing Cert with AUTHO
2,933,324 UART: RITY.KEYID = 7
2,948,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,579 UART: [art] PUB.X = 5B1D4E01199332FD7A00D644344C91646B1878163AC0155630213DA1109210EB63F05E775D7182683D307725FA541E2C
2,956,308 UART: [art] PUB.Y = 51629C449F3BE8507A6473A3D5A069BC0B3D4330FC6E0F1C681C4F6673C9D02C48F6601732490E206EE2B301A8792289
2,963,240 UART: [art] SIG.R = FE6A2D4B8C84A572022978203140A8CD5FF843584FA4328B94CF753FAC6CB5DF68D7211D2A5B9C57C7C9A3041FE73D98
2,970,012 UART: [art] SIG.S = C747D9F8C83E455CF0DD4E6320A38FCF094F0EADB5EA5997FF8B46676975379131CB1558A75CCC145D7855B531005573
2,993,751 UART: Caliptra RT
2,994,004 UART: [state] CFI Enabled
3,102,094 UART: [rt] RT listening for mailbox commands...
3,102,764 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,815 UART: [rt]cmd =0x414c544e, len=41
3,134,727 >>> mbox cmd response data (8 bytes)
3,134,728 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,719 UART: [rt]cmd =0x434b4558, len=80
3,335,857 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,809 UART: [kat] SHA2-512-ACC
906,710 UART: [kat] ECC-384
915,975 UART: [kat] HMAC-384Kdf
920,671 UART: [kat] LMS
1,168,983 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,218 UART: [fht] FHT @ 0x50003400
1,172,850 UART: [idev] ++
1,173,018 UART: [idev] CDI.KEYID = 6
1,173,379 UART: [idev] SUBJECT.KEYID = 7
1,173,804 UART: [idev] UDS.KEYID = 0
1,174,150 ready_for_fw is high
1,174,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,180 UART: [idev] Erasing UDS.KEYID = 0
1,199,164 UART: [idev] Sha1 KeyId Algorithm
1,208,182 UART: [idev] --
1,209,199 UART: [ldev] ++
1,209,367 UART: [ldev] CDI.KEYID = 6
1,209,731 UART: [ldev] SUBJECT.KEYID = 5
1,210,158 UART: [ldev] AUTHORITY.KEYID = 7
1,210,621 UART: [ldev] FE.KEYID = 1
1,215,675 UART: [ldev] Erasing FE.KEYID = 1
1,241,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,963 UART: [ldev] --
1,281,231 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,148 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,369 >>> mbox cmd response: success
2,775,528 UART: [afmc] ++
2,775,696 UART: [afmc] CDI.KEYID = 6
2,776,059 UART: [afmc] SUBJECT.KEYID = 7
2,776,485 UART: [afmc] AUTHORITY.KEYID = 5
2,811,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,946 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,829 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,548 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,357 UART: [afmc] --
2,855,367 UART: [cold-reset] --
2,856,119 UART: [state] Locking Datavault
2,857,662 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,266 UART: [state] Locking ICCM
2,858,904 UART: [exit] Launching FMC @ 0x40000130
2,864,233 UART:
2,864,249 UART: Running Caliptra FMC ...
2,864,657 UART:
2,864,800 UART: [state] CFI Enabled
2,875,967 UART: [fht] FMC Alias Private Key: 7
2,984,000 UART: [art] Extend RT PCRs Done
2,984,428 UART: [art] Lock RT PCRs Done
2,986,312 UART: [art] Populate DV Done
2,994,651 UART: [fht] FMC Alias Private Key: 7
2,995,625 UART: [art] Derive CDI
2,995,905 UART: [art] Store in in slot 0x4
3,081,636 UART: [art] Derive Key Pair
3,081,996 UART: [art] Store priv key in slot 0x5
3,095,140 UART: [art] Derive Key Pair - Done
3,109,599 UART: [art] Signing Cert with AUTHO
3,110,079 UART: RITY.KEYID = 7
3,125,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,216 UART: [art] PUB.X = CF280668FE969DDF6A84D96DE31D70EC3DD06F8FCDE740CF364D8B6871061F7B04E790E3D4121BE9D08C57A25BB8C0A8
3,132,993 UART: [art] PUB.Y = B4BD7FA97026AE5764BBADB10D41E11C1BE1B880860D1F2A2E3E61608F82B10CDB0C3106D34EEA2E50CB2147E72DACCE
3,139,950 UART: [art] SIG.R = DC049B1E1041ED6A3307AEF2BBBEC2BF87A4C4FE435909F93BE3611F997471AE51EB33EF8565ECE9E14F21C5090967D0
3,146,719 UART: [art] SIG.S = 37430D3879D3C934FCCA060399A1D7D8D2FCF8BBCD40897416733F4BC9BFDF76806F923FE2686D8BEBDFA7BE46A6E34A
3,170,469 UART: Caliptra RT
3,170,814 UART: [state] CFI Enabled
3,278,887 UART: [rt] RT listening for mailbox commands...
3,279,557 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,760 UART: [rt]cmd =0x414c544e, len=41
3,311,554 >>> mbox cmd response data (8 bytes)
3,311,555 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,598 UART: [rt]cmd =0x434b4558, len=80
3,512,123 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,409 ready_for_fw is high
1,056,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,203 >>> mbox cmd response: success
2,688,493 UART:
2,688,509 UART: Running Caliptra FMC ...
2,688,917 UART:
2,689,060 UART: [state] CFI Enabled
2,699,745 UART: [fht] FMC Alias Private Key: 7
2,807,704 UART: [art] Extend RT PCRs Done
2,808,132 UART: [art] Lock RT PCRs Done
2,809,842 UART: [art] Populate DV Done
2,817,959 UART: [fht] FMC Alias Private Key: 7
2,818,979 UART: [art] Derive CDI
2,819,259 UART: [art] Store in in slot 0x4
2,905,232 UART: [art] Derive Key Pair
2,905,592 UART: [art] Store priv key in slot 0x5
2,918,348 UART: [art] Derive Key Pair - Done
2,933,147 UART: [art] Signing Cert with AUTHO
2,933,627 UART: RITY.KEYID = 7
2,948,219 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,984 UART: [art] PUB.X = A5D95917B93D4FEEB048EB217F6F23BA78F113251141D02E24EBC9C62E527288822B7C89DC67508478FDD1F79DA0EE4D
2,955,762 UART: [art] PUB.Y = 4057F057CF786C61E97F2ED4C54D6F8F86331B19201E80D0459473F82F062C74F78E3AA85614471AE03396BCD23F89E8
2,962,705 UART: [art] SIG.R = 7C355936175B768F9C05C32825C20EA45791054CDC467F0BA38FA7B030A21B8551560D33AB71D56E8BC0B395ED449110
2,969,456 UART: [art] SIG.S = 9AD518834D7D007BE9302F19C98005FD3C464EAA9C33D9A90E7537703515B8E25A56B257E9CD47DBFD48C79205DFC46E
2,993,018 UART: Caliptra RT
2,993,363 UART: [state] CFI Enabled
3,100,794 UART: [rt] RT listening for mailbox commands...
3,101,464 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,403 UART: [rt]cmd =0x414c544e, len=41
3,133,345 >>> mbox cmd response data (8 bytes)
3,133,346 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,143 UART: [rt]cmd =0x434b4558, len=80
3,334,502 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
191,984 UART:
192,352 UART: Running Caliptra ROM ...
193,553 UART:
193,712 UART: [state] CFI Enabled
266,548 UART: [state] LifecycleState = Unprovisioned
268,478 UART: [state] DebugLocked = No
271,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,575 UART: [kat] SHA2-256
445,252 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,767 UART: [kat] ++
456,249 UART: [kat] sha1
468,637 UART: [kat] SHA2-256
471,292 UART: [kat] SHA2-384
478,132 UART: [kat] SHA2-512-ACC
480,566 UART: [kat] ECC-384
2,767,640 UART: [kat] HMAC-384Kdf
2,798,434 UART: [kat] LMS
3,988,685 UART: [kat] --
3,994,771 UART: [cold-reset] ++
3,996,568 UART: [fht] Storing FHT @ 0x50003400
4,008,187 UART: [idev] ++
4,008,761 UART: [idev] CDI.KEYID = 6
4,009,722 UART: [idev] SUBJECT.KEYID = 7
4,010,974 UART: [idev] UDS.KEYID = 0
4,011,945 ready_for_fw is high
4,012,140 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,688 UART: [idev] Erasing UDS.KEYID = 0
7,344,633 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,591 UART: [idev] --
7,370,115 UART: [ldev] ++
7,370,693 UART: [ldev] CDI.KEYID = 6
7,371,634 UART: [ldev] SUBJECT.KEYID = 5
7,372,902 UART: [ldev] AUTHORITY.KEYID = 7
7,374,150 UART: [ldev] FE.KEYID = 1
7,413,728 UART: [ldev] Erasing FE.KEYID = 1
10,751,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,293 UART: [ldev] --
13,129,634 UART: [fwproc] Waiting for Commands...
13,132,429 UART: [fwproc] Received command 0x46574c44
13,134,627 UART: [fwproc] Received Image of size 114124 bytes
17,189,837 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,305 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,165 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,651,623 >>> mbox cmd response: success
17,655,844 UART: [afmc] ++
17,656,445 UART: [afmc] CDI.KEYID = 6
17,657,424 UART: [afmc] SUBJECT.KEYID = 7
17,658,642 UART: [afmc] AUTHORITY.KEYID = 5
21,020,995 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,319,864 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,322,122 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,336,549 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,351,392 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,365,796 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,388,127 UART: [afmc] --
23,391,472 UART: [cold-reset] --
23,396,252 UART: [state] Locking Datavault
23,402,104 UART: [state] Locking PCR0, PCR1 and PCR31
23,403,808 UART: [state] Locking ICCM
23,405,479 UART: [exit] Launching FMC @ 0x40000130
23,413,884 UART:
23,414,126 UART: Running Caliptra FMC ...
23,415,231 UART:
23,415,391 UART: [state] CFI Enabled
23,479,604 UART: [fht] FMC Alias Private Key: 7
25,817,568 UART: [art] Extend RT PCRs Done
25,818,795 UART: [art] Lock RT PCRs Done
25,820,584 UART: [art] Populate DV Done
25,826,107 UART: [fht] FMC Alias Private Key: 7
25,827,708 UART: [art] Derive CDI
25,828,527 UART: [art] Store in in slot 0x4
25,888,456 UART: [art] Derive Key Pair
25,889,502 UART: [art] Store priv key in slot 0x5
29,182,527 UART: [art] Derive Key Pair - Done
29,195,158 UART: [art] Signing Cert with AUTHO
29,196,459 UART: RITY.KEYID = 7
31,484,928 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,455 UART: [art] PUB.X = A73C16CD055DE2CE4B72283D738826A075CB008C42ED72B299110AF98FD5C113E7A0ACD7A739A5CB88BBB14CE080641C
31,493,655 UART: [art] PUB.Y = 6E8327D9AD69F9B5BEE7013B407322182C105FBF1487C20C279585391264DA377D90E44314784D053F1260A63468CAC9
31,500,880 UART: [art] SIG.R = 0CB16DB077A5826979F4906CF7535E3D8877EF34A7370EB58904ED0184D7923DEDF158542DD7C41211CDC5D3E240EC2C
31,508,274 UART: [art] SIG.S = 87C2657B5D72217D735234A68A89DD98C0D94DB4A77571D333705247AEFF620FD371A963DDAF0F96F0BE37E69880D7CD
32,813,491 UART: Caliptra RT
32,814,207 UART: [state] CFI Enabled
32,975,699 UART: [rt] RT listening for mailbox commands...
32,977,621 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,007,545 UART: [rt]cmd =0x414c544e, len=20
33,009,184 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,805,971 ready_for_fw is high
3,806,563 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,865,021 >>> mbox cmd response: success
23,548,982 UART:
23,549,376 UART: Running Caliptra FMC ...
23,550,593 UART:
23,550,772 UART: [state] CFI Enabled
23,615,042 UART: [fht] FMC Alias Private Key: 7
25,952,571 UART: [art] Extend RT PCRs Done
25,953,792 UART: [art] Lock RT PCRs Done
25,955,371 UART: [art] Populate DV Done
25,961,012 UART: [fht] FMC Alias Private Key: 7
25,962,611 UART: [art] Derive CDI
25,963,354 UART: [art] Store in in slot 0x4
26,022,565 UART: [art] Derive Key Pair
26,023,611 UART: [art] Store priv key in slot 0x5
29,316,091 UART: [art] Derive Key Pair - Done
29,329,203 UART: [art] Signing Cert with AUTHO
29,330,513 UART: RITY.KEYID = 7
31,617,922 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,426 UART: [art] PUB.X = EBE02CBE18A07C1D5D42AF12DB5DE3B18F3864FB7F51469854F97D1585B7093FEB6BE76465636C136E42CA7781FC4D15
31,626,722 UART: [art] PUB.Y = 06E70D45BE760B43EB29F35882D1E7351CE94C91C47BDF928B34A5C14C620903AB6560E3C02DD053BB596AC261EC302B
31,633,932 UART: [art] SIG.R = 0DAA8F6B8309D5BB0F0354EADF75795137E8AE2F8ECCD359E7E32ACA1898E64905C47E0FF4C4EF5C44EAE0BE74DF90B0
31,641,355 UART: [art] SIG.S = C15C4228967A884520A765CDD15F3B4655372DFDE77167D4BAFF939697DB83B19D770424BBC2077DF82B7CF2711DACC0
32,946,073 UART: Caliptra RT
32,946,792 UART: [state] CFI Enabled
33,108,001 UART: [rt] RT listening for mailbox commands...
33,109,898 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,139,977 UART: [rt]cmd =0x414c544e, len=20
33,141,508 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,384 UART:
192,746 UART: Running Caliptra ROM ...
193,937 UART:
603,610 UART: [state] CFI Enabled
621,744 UART: [state] LifecycleState = Unprovisioned
623,693 UART: [state] DebugLocked = No
625,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,158 UART: [kat] SHA2-256
799,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,474 UART: [kat] ++
810,918 UART: [kat] sha1
823,202 UART: [kat] SHA2-256
825,928 UART: [kat] SHA2-384
832,692 UART: [kat] SHA2-512-ACC
835,058 UART: [kat] ECC-384
3,119,666 UART: [kat] HMAC-384Kdf
3,131,705 UART: [kat] LMS
4,321,867 UART: [kat] --
4,324,904 UART: [cold-reset] ++
4,327,326 UART: [fht] Storing FHT @ 0x50003400
4,339,365 UART: [idev] ++
4,339,991 UART: [idev] CDI.KEYID = 6
4,340,887 UART: [idev] SUBJECT.KEYID = 7
4,342,127 UART: [idev] UDS.KEYID = 0
4,343,198 ready_for_fw is high
4,343,418 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,487,068 UART: [idev] Erasing UDS.KEYID = 0
7,630,017 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,152 UART: [idev] --
7,655,874 UART: [ldev] ++
7,656,443 UART: [ldev] CDI.KEYID = 6
7,657,415 UART: [ldev] SUBJECT.KEYID = 5
7,658,617 UART: [ldev] AUTHORITY.KEYID = 7
7,659,893 UART: [ldev] FE.KEYID = 1
7,671,067 UART: [ldev] Erasing FE.KEYID = 1
10,958,323 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,453 UART: [ldev] --
13,319,007 UART: [fwproc] Waiting for Commands...
13,321,318 UART: [fwproc] Received command 0x46574c44
13,323,498 UART: [fwproc] Received Image of size 114124 bytes
17,380,608 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,674 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,557 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,842,700 >>> mbox cmd response: success
17,846,057 UART: [afmc] ++
17,846,653 UART: [afmc] CDI.KEYID = 6
17,847,572 UART: [afmc] SUBJECT.KEYID = 7
17,848,786 UART: [afmc] AUTHORITY.KEYID = 5
21,164,112 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,734 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,000 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,393 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,211 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,625 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,180 UART: [afmc] --
23,530,271 UART: [cold-reset] --
23,534,559 UART: [state] Locking Datavault
23,538,400 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,151 UART: [state] Locking ICCM
23,541,323 UART: [exit] Launching FMC @ 0x40000130
23,549,664 UART:
23,549,895 UART: Running Caliptra FMC ...
23,550,987 UART:
23,551,143 UART: [state] CFI Enabled
23,559,182 UART: [fht] FMC Alias Private Key: 7
25,889,875 UART: [art] Extend RT PCRs Done
25,891,119 UART: [art] Lock RT PCRs Done
25,892,743 UART: [art] Populate DV Done
25,898,155 UART: [fht] FMC Alias Private Key: 7
25,899,636 UART: [art] Derive CDI
25,900,391 UART: [art] Store in in slot 0x4
25,943,519 UART: [art] Derive Key Pair
25,944,557 UART: [art] Store priv key in slot 0x5
29,186,443 UART: [art] Derive Key Pair - Done
29,199,592 UART: [art] Signing Cert with AUTHO
29,200,927 UART: RITY.KEYID = 7
31,480,410 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,911 UART: [art] PUB.X = 7C54322F7D6CE8B01696289B43B6C5987CF36AF4357FBDAF395943CA395513992C2A9C424BA1DE8DC28C1A887A400B8D
31,489,144 UART: [art] PUB.Y = 3CBE28B175226CBEAEFE34CCBE81AE237E36CA141C8F72F75480C14CACD354E9736D65272C26222F8EC771B1E9E84CCF
31,496,410 UART: [art] SIG.R = 957ADBC8241851F86C7B8575905A1068977CF0B46D7C187975E9B3F2C92EF962A6851B503A7A024E4A60764D9199F4A8
31,503,782 UART: [art] SIG.S = 16CC7A8D7FCCA205C6FC59CF569C72E9CCED8EBF153AE01FC81B91A194881D10FBE4EA278B661286FBC09B678469A314
32,808,508 UART: Caliptra RT
32,809,239 UART: [state] CFI Enabled
32,927,036 UART: [rt] RT listening for mailbox commands...
32,928,914 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
32,959,034 UART: [rt]cmd =0x414c544e, len=20
32,960,823 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,132,842 ready_for_fw is high
4,133,415 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,078,279 >>> mbox cmd response: success
23,722,042 UART:
23,722,434 UART: Running Caliptra FMC ...
23,723,559 UART:
23,723,712 UART: [state] CFI Enabled
23,731,873 UART: [fht] FMC Alias Private Key: 7
26,063,264 UART: [art] Extend RT PCRs Done
26,064,498 UART: [art] Lock RT PCRs Done
26,066,231 UART: [art] Populate DV Done
26,071,754 UART: [fht] FMC Alias Private Key: 7
26,073,327 UART: [art] Derive CDI
26,074,151 UART: [art] Store in in slot 0x4
26,116,653 UART: [art] Derive Key Pair
26,117,695 UART: [art] Store priv key in slot 0x5
29,359,483 UART: [art] Derive Key Pair - Done
29,372,649 UART: [art] Signing Cert with AUTHO
29,373,950 UART: RITY.KEYID = 7
31,652,909 UART: [art] Erasing AUTHORITY.KEYID = 7
31,654,415 UART: [art] PUB.X = 2D63163FA86789FE151EB938F9374C9B82B08FEF6C0D7607C0286D0318D5AAA0AB0CD30A4155C88C0C13DCD17F0CC61D
31,661,647 UART: [art] PUB.Y = A1C3F3ECBF1C85EBF995E392076FD64448B9DD2E93C678BF26AE9C143FAD7F87D2F444844C3E2535EF28DC1DCB4967F9
31,668,919 UART: [art] SIG.R = A3FEF0747F584BCB9BC4DBC1A88BCBE1347250E3923B541BA00F639A35580D5977B0831D3713EEDA0D5649135DB780F6
31,676,305 UART: [art] SIG.S = EB4F83899E94D8C58639BA932190136324D366E6385140A25C84B310552D18AC369B9D3B7FE041C992B35D1CE50FD33C
32,981,416 UART: Caliptra RT
32,982,127 UART: [state] CFI Enabled
33,099,409 UART: [rt] RT listening for mailbox commands...
33,101,313 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,131,228 UART: [rt]cmd =0x414c544e, len=20
33,132,879 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,152 UART:
192,527 UART: Running Caliptra ROM ...
193,628 UART:
193,789 UART: [state] CFI Enabled
263,263 UART: [state] LifecycleState = Unprovisioned
265,176 UART: [state] DebugLocked = No
266,557 UART: [state] WD Timer not started. Device not locked for debugging
271,006 UART: [kat] SHA2-256
450,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,700 UART: [kat] ++
462,152 UART: [kat] sha1
474,085 UART: [kat] SHA2-256
477,099 UART: [kat] SHA2-384
482,947 UART: [kat] SHA2-512-ACC
485,952 UART: [kat] ECC-384
2,949,631 UART: [kat] HMAC-384Kdf
2,970,673 UART: [kat] LMS
3,500,175 UART: [kat] --
3,501,993 UART: [cold-reset] ++
3,502,882 UART: [fht] FHT @ 0x50003400
3,513,789 UART: [idev] ++
3,514,361 UART: [idev] CDI.KEYID = 6
3,515,245 UART: [idev] SUBJECT.KEYID = 7
3,516,487 UART: [idev] UDS.KEYID = 0
3,517,413 ready_for_fw is high
3,517,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,661,544 UART: [idev] Erasing UDS.KEYID = 0
6,030,660 UART: [idev] Sha1 KeyId Algorithm
6,052,494 UART: [idev] --
6,054,865 UART: [ldev] ++
6,055,444 UART: [ldev] CDI.KEYID = 6
6,056,357 UART: [ldev] SUBJECT.KEYID = 5
6,057,512 UART: [ldev] AUTHORITY.KEYID = 7
6,058,742 UART: [ldev] FE.KEYID = 1
6,100,500 UART: [ldev] Erasing FE.KEYID = 1
8,604,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,616 UART: [ldev] --
10,407,769 UART: [fwproc] Wait for Commands...
10,410,403 UART: [fwproc] Recv command 0x46574c44
10,412,442 UART: [fwproc] Recv'd Img size: 114448 bytes
13,822,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,604 >>> mbox cmd response: success
14,286,092 UART: [afmc] ++
14,286,701 UART: [afmc] CDI.KEYID = 6
14,287,614 UART: [afmc] SUBJECT.KEYID = 7
14,288,797 UART: [afmc] AUTHORITY.KEYID = 5
16,822,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,544,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,546,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,562,432 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,578,458 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,594,345 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,616,109 UART: [afmc] --
18,619,484 UART: [cold-reset] --
18,623,667 UART: [state] Locking Datavault
18,628,803 UART: [state] Locking PCR0, PCR1 and PCR31
18,630,510 UART: [state] Locking ICCM
18,632,041 UART: [exit] Launching FMC @ 0x40000130
18,640,495 UART:
18,640,731 UART: Running Caliptra FMC ...
18,641,828 UART:
18,642,029 UART: [state] CFI Enabled
18,704,304 UART: [fht] FMC Alias Private Key: 7
20,468,656 UART: [art] Extend RT PCRs Done
20,469,865 UART: [art] Lock RT PCRs Done
20,471,546 UART: [art] Populate DV Done
20,477,172 UART: [fht] FMC Alias Private Key: 7
20,478,814 UART: [art] Derive CDI
20,479,627 UART: [art] Store in in slot 0x4
20,537,161 UART: [art] Derive Key Pair
20,538,200 UART: [art] Store priv key in slot 0x5
23,001,202 UART: [art] Derive Key Pair - Done
23,014,086 UART: [art] Signing Cert with AUTHO
23,015,394 UART: RITY.KEYID = 7
24,727,582 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,094 UART: [art] PUB.X = 4902AE52CF1F1DBD8BF995C02297461F0B7F7989CF310BD1D903979DC635F1DC22CCBA75970E2F7702C19EF258485904
24,736,383 UART: [art] PUB.Y = 24F928986B777D2A286FC6188282FFDD6AF7011052AD492314CAEC3399362F2705B9B27A4D8B694F4D4DE48156D8C63E
24,743,595 UART: [art] SIG.R = 8BC87CDE2381F4F22DF55A995912B32289487E36BD61783D5E6FB8607B37FF102F5F201C556B282E749564B7B6350F2C
24,750,991 UART: [art] SIG.S = 6BB3B5CE2B5C4520C2D630891A1A0A332EBCA52A53334689D5FA5902EDBCCF82E3E4A885DE860884939F9A855BDB87EB
25,729,349 UART: Caliptra RT
25,730,037 UART: [state] CFI Enabled
25,895,454 UART: [rt] RT listening for mailbox commands...
25,897,333 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,927,836 UART: [rt]cmd =0x414c544e, len=20
25,929,622 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
3,360,683 ready_for_fw is high
3,361,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,047,584 >>> mbox cmd response: success
18,342,173 UART:
18,342,598 UART: Running Caliptra FMC ...
18,343,721 UART:
18,343,874 UART: [state] CFI Enabled
18,412,416 UART: [fht] FMC Alias Private Key: 7
20,176,299 UART: [art] Extend RT PCRs Done
20,177,524 UART: [art] Lock RT PCRs Done
20,179,231 UART: [art] Populate DV Done
20,184,798 UART: [fht] FMC Alias Private Key: 7
20,186,445 UART: [art] Derive CDI
20,187,185 UART: [art] Store in in slot 0x4
20,244,390 UART: [art] Derive Key Pair
20,245,430 UART: [art] Store priv key in slot 0x5
22,708,367 UART: [art] Derive Key Pair - Done
22,721,528 UART: [art] Signing Cert with AUTHO
22,722,828 UART: RITY.KEYID = 7
24,434,481 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,010 UART: [art] PUB.X = AF49C7A70CACA4865BF17A22A0D1B89E3C1F448358955B8429B5CB048D9DAF23C9690DCC66A664798FC7286A5C60E499
24,443,262 UART: [art] PUB.Y = 8914A31A231E5ABA751A6FF67E1AA50BC3A878DC6367E14938DC358D1516F68FB232E46502A082BDE4F786FF39249E98
24,450,509 UART: [art] SIG.R = 0C5D512DDCFB03F97FF82207098F825150BBC7D6F13C3B88812ABF84F1AAF60E897EA0F6BB75E7BFF64899D419C97C68
24,457,902 UART: [art] SIG.S = 24EC21A7A69656CC8BF9FE9A0AC73EAE89ACAADBA456A983C4E3D4B9C821FB3DBF9B582B4C3D90DBB1FA5070AA12D496
25,436,706 UART: Caliptra RT
25,437,404 UART: [state] CFI Enabled
25,601,874 UART: [rt] RT listening for mailbox commands...
25,603,760 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,634,457 UART: [rt]cmd =0x414c544e, len=20
25,636,320 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,330 UART:
192,705 UART: Running Caliptra ROM ...
193,780 UART:
603,414 UART: [state] CFI Enabled
616,216 UART: [state] LifecycleState = Unprovisioned
618,085 UART: [state] DebugLocked = No
620,808 UART: [state] WD Timer not started. Device not locked for debugging
624,757 UART: [kat] SHA2-256
803,881 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,465 UART: [kat] ++
815,903 UART: [kat] sha1
826,877 UART: [kat] SHA2-256
829,705 UART: [kat] SHA2-384
836,121 UART: [kat] SHA2-512-ACC
839,050 UART: [kat] ECC-384
3,280,240 UART: [kat] HMAC-384Kdf
3,293,178 UART: [kat] LMS
3,822,683 UART: [kat] --
3,826,771 UART: [cold-reset] ++
3,829,269 UART: [fht] FHT @ 0x50003400
3,841,161 UART: [idev] ++
3,841,722 UART: [idev] CDI.KEYID = 6
3,842,597 UART: [idev] SUBJECT.KEYID = 7
3,843,829 UART: [idev] UDS.KEYID = 0
3,844,723 ready_for_fw is high
3,844,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,733 UART: [idev] Erasing UDS.KEYID = 0
6,318,186 UART: [idev] Sha1 KeyId Algorithm
6,340,226 UART: [idev] --
6,344,486 UART: [ldev] ++
6,345,049 UART: [ldev] CDI.KEYID = 6
6,345,926 UART: [ldev] SUBJECT.KEYID = 5
6,347,232 UART: [ldev] AUTHORITY.KEYID = 7
6,348,420 UART: [ldev] FE.KEYID = 1
6,357,742 UART: [ldev] Erasing FE.KEYID = 1
8,830,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,880 UART: [ldev] --
10,620,090 UART: [fwproc] Wait for Commands...
10,622,452 UART: [fwproc] Recv command 0x46574c44
10,624,561 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,404 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,493,081 >>> mbox cmd response: success
14,497,680 UART: [afmc] ++
14,498,276 UART: [afmc] CDI.KEYID = 6
14,499,181 UART: [afmc] SUBJECT.KEYID = 7
14,500,385 UART: [afmc] AUTHORITY.KEYID = 5
17,003,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,910 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,916 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,208 UART: [afmc] --
18,800,137 UART: [cold-reset] --
18,804,265 UART: [state] Locking Datavault
18,810,635 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,281 UART: [state] Locking ICCM
18,814,805 UART: [exit] Launching FMC @ 0x40000130
18,823,254 UART:
18,823,482 UART: Running Caliptra FMC ...
18,824,575 UART:
18,824,725 UART: [state] CFI Enabled
18,832,989 UART: [fht] FMC Alias Private Key: 7
20,590,022 UART: [art] Extend RT PCRs Done
20,591,234 UART: [art] Lock RT PCRs Done
20,593,079 UART: [art] Populate DV Done
20,598,161 UART: [fht] FMC Alias Private Key: 7
20,599,689 UART: [art] Derive CDI
20,600,422 UART: [art] Store in in slot 0x4
20,642,757 UART: [art] Derive Key Pair
20,643,750 UART: [art] Store priv key in slot 0x5
23,070,211 UART: [art] Derive Key Pair - Done
23,083,527 UART: [art] Signing Cert with AUTHO
23,084,820 UART: RITY.KEYID = 7
24,790,498 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,010 UART: [art] PUB.X = 8D0769811188F29AD14A76BE9FD7F6B1EF9095913CEB0566C47ED2BFA3B6F077A2FD053DECCAAC10832696C656849D57
24,799,291 UART: [art] PUB.Y = 689BF4E4AB6FA675F1CCCB850F99A15187E4C56281E7F74A2F9A8ED2D65D1DD0D96F2825468288301A40307B550145AA
24,806,555 UART: [art] SIG.R = 5F09E476C5C2C873DD892F3FEBD3810277D9B9589177DE358F061E2FB4AEB21BAB7D639836D5B33D4DCC4F240F9D5943
24,813,961 UART: [art] SIG.S = 94CD939DBBD44899D80C1F4629FC2E6F9A507BEEF8E2BA1A87D9C43FFD1F4958CF15DD7C5C577AD929C7FCBDDCC5858A
25,792,882 UART: Caliptra RT
25,793,573 UART: [state] CFI Enabled
25,910,841 UART: [rt] RT listening for mailbox commands...
25,912,713 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,942,662 UART: [rt]cmd =0x414c544e, len=20
25,944,415 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,696,905 ready_for_fw is high
3,697,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,462 >>> mbox cmd response: success
18,519,438 UART:
18,519,832 UART: Running Caliptra FMC ...
18,521,014 UART:
18,521,200 UART: [state] CFI Enabled
18,528,926 UART: [fht] FMC Alias Private Key: 7
20,285,900 UART: [art] Extend RT PCRs Done
20,287,125 UART: [art] Lock RT PCRs Done
20,288,991 UART: [art] Populate DV Done
20,294,250 UART: [fht] FMC Alias Private Key: 7
20,295,727 UART: [art] Derive CDI
20,296,458 UART: [art] Store in in slot 0x4
20,339,263 UART: [art] Derive Key Pair
20,340,261 UART: [art] Store priv key in slot 0x5
22,767,476 UART: [art] Derive Key Pair - Done
22,780,258 UART: [art] Signing Cert with AUTHO
22,781,565 UART: RITY.KEYID = 7
24,487,080 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,595 UART: [art] PUB.X = 761F3E2BCB30817677F8DAC06A1ED228DEFD397553B0E245EB01E9D9DC7A94AA745504E37B51F464805F2AC81E5E95BD
24,495,887 UART: [art] PUB.Y = E9952C997B10E779BE787B78C61AFF475F7C300E8C16F0A02D476016865646C2ED67641E4AA13801707456FBF5D34D87
24,503,126 UART: [art] SIG.R = A54C661C6EB8C830D18FF22541814B77DCBB7D102C6CB62AE84DC1CD5FCBAF08DB34859EC3BCF37C974589B564919D52
24,510,567 UART: [art] SIG.S = E11437D9E77F0C2259295B60B0C89F4021B2BE513BBB92C665D02D3BC8966D5734992A7E31F91169ABC2FBB4295D3682
25,489,973 UART: Caliptra RT
25,490,671 UART: [state] CFI Enabled
25,607,884 UART: [rt] RT listening for mailbox commands...
25,609,752 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,639,429 UART: [rt]cmd =0x414c544e, len=20
25,641,055 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
3,438,906 ready_for_fw is high
3,439,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,727,568 >>> mbox cmd response: success
19,032,872 UART:
19,033,269 UART: Running Caliptra FMC ...
19,034,370 UART:
19,034,522 UART: [state] CFI Enabled
19,096,349 UART: [fht] FMC Alias Private Key: 7
20,860,304 UART: [art] Extend RT PCRs Done
20,861,524 UART: [art] Lock RT PCRs Done
20,863,500 UART: [art] Populate DV Done
20,868,910 UART: [fht] FMC Alias Private Key: 7
20,870,364 UART: [art] Derive CDI
20,871,137 UART: [art] Store in in slot 0x4
20,929,210 UART: [art] Derive Key Pair
20,930,242 UART: [art] Store priv key in slot 0x5
23,393,298 UART: [art] Derive Key Pair - Done
23,406,293 UART: [art] Signing Cert with AUTHO
23,407,597 UART: RITY.KEYID = 7
25,119,979 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,480 UART: [art] PUB.X = E2023C19A8B1D15431F0DC3C02B27E00AB3AC8091F9DCC11ABB5502535D70FDE9EA079B2760261157C05A58940D4E337
25,128,724 UART: [art] PUB.Y = 7E9CD2AF032C53F867C069FA853A2BB2D40D0EC6AD96AA83FB08FBD13D72F9139480DDD7B3B309F300298551406DEBBB
25,135,972 UART: [art] SIG.R = 1D2E2CD37A41A227F3D793D3CA0B01724C5E872A4C5E68CAB4BE5D39136766FAE943626E0898CDF66319460FF63C24E4
25,143,358 UART: [art] SIG.S = C9A7601557CAA7B543F0BA9904561B64ADAB7ABDD404B1ECA4468CAF6B36C5D5F7009FE7DED3038ADCD130B84CC2A34F
26,122,122 UART: Caliptra RT
26,122,806 UART: [state] CFI Enabled
26,288,897 UART: [rt] RT listening for mailbox commands...
26,290,777 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,321,136 UART: [rt]cmd =0x414c544e, len=20
26,322,672 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,752,053 ready_for_fw is high
3,752,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,954,632 >>> mbox cmd response: success
19,209,796 UART:
19,210,173 UART: Running Caliptra FMC ...
19,211,364 UART:
19,211,524 UART: [state] CFI Enabled
19,219,457 UART: [fht] FMC Alias Private Key: 7
20,976,311 UART: [art] Extend RT PCRs Done
20,977,535 UART: [art] Lock RT PCRs Done
20,979,161 UART: [art] Populate DV Done
20,984,674 UART: [fht] FMC Alias Private Key: 7
20,986,265 UART: [art] Derive CDI
20,987,069 UART: [art] Store in in slot 0x4
21,029,832 UART: [art] Derive Key Pair
21,030,889 UART: [art] Store priv key in slot 0x5
23,457,823 UART: [art] Derive Key Pair - Done
23,471,096 UART: [art] Signing Cert with AUTHO
23,472,404 UART: RITY.KEYID = 7
25,177,861 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,366 UART: [art] PUB.X = B259B8CB2D3ED297349C2B9131A1F8481D7D6C2AC4712616F0C33473FACA87868224BEB84AB8D597C57E78B6375879A9
25,186,649 UART: [art] PUB.Y = 9932E2DC079F22BC951A243228DAA9280D9F1E44ABB8B1F4A787A301CAD8915058E8E3CD1F2E4A58E2EF6BDDCEE8F048
25,193,888 UART: [art] SIG.R = 52260266A5E43562D984F0900F5DB316E956D937AE8C2C47ECB1BEEC7916B0CBA34C063660D6DC1D8A9A1F97C167086E
25,201,265 UART: [art] SIG.S = EB717C8B330C216D13ED39C719F8859E522CE5A2E832579CF34CA578085E3105330ACE560F0ACE279912C200596EA782
26,180,412 UART: Caliptra RT
26,181,098 UART: [state] CFI Enabled
26,298,474 UART: [rt] RT listening for mailbox commands...
26,300,353 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,330,307 UART: [rt]cmd =0x414c544e, len=20
26,332,006 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,511 UART: [kat] SHA2-256
892,449 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,422 UART: [kat] HMAC-384Kdf
907,030 UART: [kat] LMS
1,475,226 UART: [kat] --
1,476,037 UART: [cold-reset] ++
1,476,541 UART: [fht] Storing FHT @ 0x50003400
1,479,410 UART: [idev] ++
1,479,578 UART: [idev] CDI.KEYID = 6
1,479,938 UART: [idev] SUBJECT.KEYID = 7
1,480,362 UART: [idev] UDS.KEYID = 0
1,480,707 ready_for_fw is high
1,480,707 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,654 UART: [idev] Erasing UDS.KEYID = 0
1,504,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,524 UART: [idev] --
1,514,451 UART: [ldev] ++
1,514,619 UART: [ldev] CDI.KEYID = 6
1,514,982 UART: [ldev] SUBJECT.KEYID = 5
1,515,408 UART: [ldev] AUTHORITY.KEYID = 7
1,515,871 UART: [ldev] FE.KEYID = 1
1,521,117 UART: [ldev] Erasing FE.KEYID = 1
1,545,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,062 UART: [ldev] --
1,585,571 UART: [fwproc] Waiting for Commands...
1,586,186 UART: [fwproc] Received command 0x46574c44
1,586,977 UART: [fwproc] Received Image of size 114448 bytes
2,886,880 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,332 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,684 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,685 >>> mbox cmd response: success
3,080,859 UART: [afmc] ++
3,081,027 UART: [afmc] CDI.KEYID = 6
3,081,389 UART: [afmc] SUBJECT.KEYID = 7
3,081,814 UART: [afmc] AUTHORITY.KEYID = 5
3,116,737 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,061 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,454 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,144 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,003 UART: [afmc] --
3,160,097 UART: [cold-reset] --
3,161,111 UART: [state] Locking Datavault
3,162,026 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,630 UART: [state] Locking ICCM
3,163,226 UART: [exit] Launching FMC @ 0x40000130
3,168,555 UART:
3,168,571 UART: Running Caliptra FMC ...
3,168,979 UART:
3,169,033 UART: [state] CFI Enabled
3,179,624 UART: [fht] FMC Alias Private Key: 7
3,287,055 UART: [art] Extend RT PCRs Done
3,287,483 UART: [art] Lock RT PCRs Done
3,289,241 UART: [art] Populate DV Done
3,297,180 UART: [fht] FMC Alias Private Key: 7
3,298,196 UART: [art] Derive CDI
3,298,476 UART: [art] Store in in slot 0x4
3,384,039 UART: [art] Derive Key Pair
3,384,399 UART: [art] Store priv key in slot 0x5
3,396,997 UART: [art] Derive Key Pair - Done
3,411,805 UART: [art] Signing Cert with AUTHO
3,412,285 UART: RITY.KEYID = 7
3,427,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,468 UART: [art] PUB.X = E9678771D1030C66A57643D92D57739324C78FDCFFBAECBE1104C9D5B6674D9A6CBA1718424A19D22F79DD66DD727E8C
3,435,237 UART: [art] PUB.Y = 7DF20AE8A73B046A6D8D54943EAA1A16A486016C81F73F6EED2F395451D7F18E0C77E3AAAA13E9BBA1113637DC6C2165
3,442,187 UART: [art] SIG.R = B9057F3E38A32988F81724F61BAF653BA375732215FF137AB70E487ECFC32B863BE22220B3CC9419625E572B95C873FA
3,448,951 UART: [art] SIG.S = 70AE2CA25D7B5FB40A2B3509AEC377BE3347DE9696DD9CDC899A5AF21DA313BEADBBB7161EFAEE4F75A70BC8300AE6E4
3,472,838 UART: Caliptra RT
3,473,091 UART: [state] CFI Enabled
3,581,662 UART: [rt] RT listening for mailbox commands...
3,582,332 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,358 UART: [rt]cmd =0x414c544e, len=20
3,613,753 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,379 ready_for_fw is high
1,362,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,481 >>> mbox cmd response: success
2,990,731 UART:
2,990,747 UART: Running Caliptra FMC ...
2,991,155 UART:
2,991,209 UART: [state] CFI Enabled
3,001,224 UART: [fht] FMC Alias Private Key: 7
3,109,203 UART: [art] Extend RT PCRs Done
3,109,631 UART: [art] Lock RT PCRs Done
3,110,873 UART: [art] Populate DV Done
3,119,186 UART: [fht] FMC Alias Private Key: 7
3,120,230 UART: [art] Derive CDI
3,120,510 UART: [art] Store in in slot 0x4
3,205,891 UART: [art] Derive Key Pair
3,206,251 UART: [art] Store priv key in slot 0x5
3,219,993 UART: [art] Derive Key Pair - Done
3,234,863 UART: [art] Signing Cert with AUTHO
3,235,343 UART: RITY.KEYID = 7
3,250,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,116 UART: [art] PUB.X = 55120EB5C18504897488AFF47EA500081A82D24F66AAAC2A3FFCF38D79D1F1C1534624E6DB18A1B4BA4D4E2CDAEA1C52
3,257,871 UART: [art] PUB.Y = A8CB1253FB90C4F324DDC9B2FD6970188B223E3D04989C260D35F6A983B6E094AA38860D69D422F478327C1A4CFB5B22
3,264,816 UART: [art] SIG.R = 5955E6363651F115BFBE81D4C6336268A3EBFE292512ECF0779F2B43CCF15A239F0BA8CDD28CA5892F6CB5301C813560
3,271,589 UART: [art] SIG.S = 43BE49F594C2259AB6E7EF3A917C24DE1B4B6C8C6437DC8D5BE96F732F3989B9C131D609F553DBA61A1A76C8C20123CA
3,295,758 UART: Caliptra RT
3,296,011 UART: [state] CFI Enabled
3,405,027 UART: [rt] RT listening for mailbox commands...
3,405,697 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,545 UART: [rt]cmd =0x414c544e, len=20
3,436,678 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,552 UART: [kat] SHA2-256
892,490 UART: [kat] SHA2-384
895,217 UART: [kat] SHA2-512-ACC
897,118 UART: [kat] ECC-384
902,731 UART: [kat] HMAC-384Kdf
907,371 UART: [kat] LMS
1,475,567 UART: [kat] --
1,476,438 UART: [cold-reset] ++
1,476,846 UART: [fht] Storing FHT @ 0x50003400
1,479,663 UART: [idev] ++
1,479,831 UART: [idev] CDI.KEYID = 6
1,480,191 UART: [idev] SUBJECT.KEYID = 7
1,480,615 UART: [idev] UDS.KEYID = 0
1,480,960 ready_for_fw is high
1,480,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,417 UART: [idev] Erasing UDS.KEYID = 0
1,505,491 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,287 UART: [idev] --
1,515,468 UART: [ldev] ++
1,515,636 UART: [ldev] CDI.KEYID = 6
1,515,999 UART: [ldev] SUBJECT.KEYID = 5
1,516,425 UART: [ldev] AUTHORITY.KEYID = 7
1,516,888 UART: [ldev] FE.KEYID = 1
1,521,984 UART: [ldev] Erasing FE.KEYID = 1
1,547,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,625 UART: [ldev] --
1,587,126 UART: [fwproc] Waiting for Commands...
1,587,925 UART: [fwproc] Received command 0x46574c44
1,588,716 UART: [fwproc] Received Image of size 114448 bytes
2,887,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,679 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,084 >>> mbox cmd response: success
3,081,144 UART: [afmc] ++
3,081,312 UART: [afmc] CDI.KEYID = 6
3,081,674 UART: [afmc] SUBJECT.KEYID = 7
3,082,099 UART: [afmc] AUTHORITY.KEYID = 5
3,116,878 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,258 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,038 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,766 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,651 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,341 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,378 UART: [afmc] --
3,160,262 UART: [cold-reset] --
3,161,224 UART: [state] Locking Datavault
3,162,431 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,035 UART: [state] Locking ICCM
3,163,463 UART: [exit] Launching FMC @ 0x40000130
3,168,792 UART:
3,168,808 UART: Running Caliptra FMC ...
3,169,216 UART:
3,169,359 UART: [state] CFI Enabled
3,179,950 UART: [fht] FMC Alias Private Key: 7
3,287,573 UART: [art] Extend RT PCRs Done
3,288,001 UART: [art] Lock RT PCRs Done
3,289,455 UART: [art] Populate DV Done
3,297,738 UART: [fht] FMC Alias Private Key: 7
3,298,912 UART: [art] Derive CDI
3,299,192 UART: [art] Store in in slot 0x4
3,384,787 UART: [art] Derive Key Pair
3,385,147 UART: [art] Store priv key in slot 0x5
3,399,027 UART: [art] Derive Key Pair - Done
3,413,464 UART: [art] Signing Cert with AUTHO
3,413,944 UART: RITY.KEYID = 7
3,428,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,749 UART: [art] PUB.X = 58B37FD0905C06E51EE6DA4A4F3C7211FCBCB0D0023AB7389C7AAD87C9D073051847164D7A88C0E270B72C25352063A5
3,436,514 UART: [art] PUB.Y = 721E42EFD3223105B9F5ED0FF7F0E70D9D81373427076F3F550176E2FEE3E04EEC2774443E0509A71BBE6BB2F8E2126D
3,443,449 UART: [art] SIG.R = 0D57FBE5D61FB03B0324421B6515107CC7EFB10A90C58643CB450A25333DC5C385AC63BB5FECDDF18B799840D251C16A
3,450,217 UART: [art] SIG.S = FBB8BD31E9B0005920847B41878FBE16D2E5A56789C79D460163F1C547F8B5D5B5D8CC9FD3C3459ADC692FA0FA598481
3,473,757 UART: Caliptra RT
3,474,102 UART: [state] CFI Enabled
3,582,015 UART: [rt] RT listening for mailbox commands...
3,582,685 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,525 UART: [rt]cmd =0x414c544e, len=20
3,613,816 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,832 ready_for_fw is high
1,362,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,934 >>> mbox cmd response: success
2,991,660 UART:
2,991,676 UART: Running Caliptra FMC ...
2,992,084 UART:
2,992,227 UART: [state] CFI Enabled
3,002,928 UART: [fht] FMC Alias Private Key: 7
3,110,649 UART: [art] Extend RT PCRs Done
3,111,077 UART: [art] Lock RT PCRs Done
3,112,665 UART: [art] Populate DV Done
3,120,798 UART: [fht] FMC Alias Private Key: 7
3,121,906 UART: [art] Derive CDI
3,122,186 UART: [art] Store in in slot 0x4
3,207,925 UART: [art] Derive Key Pair
3,208,285 UART: [art] Store priv key in slot 0x5
3,221,449 UART: [art] Derive Key Pair - Done
3,236,031 UART: [art] Signing Cert with AUTHO
3,236,511 UART: RITY.KEYID = 7
3,251,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,550 UART: [art] PUB.X = 221D2AF30FB1F3057F68A25414AD2F72E06FAB75F0E24B4A52F27987F5281A1946B90DC37155B920FC480355CEE0916D
3,259,310 UART: [art] PUB.Y = 8DDAD84A86735997707071C15F5AE4DDAE6D262CB5C733FFAAE510168A5124C01F1851800513588E11083ACA5A403428
3,266,252 UART: [art] SIG.R = D42B228ACA2CB73EDDD7DF88995CA0E88AD9CF231CD2E29DAB8F93062FA9EA52838F86903C3D99B20FB109162DFA1C14
3,273,033 UART: [art] SIG.S = 6BD6BA1819AA09C42A3F4A219949FE9518CE1CF0B374859EF0A6488E399AB11365952A36E26753CC2B5A901FE01E45F7
3,297,289 UART: Caliptra RT
3,297,634 UART: [state] CFI Enabled
3,404,383 UART: [rt] RT listening for mailbox commands...
3,405,053 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,923 UART: [rt]cmd =0x414c544e, len=20
3,436,382 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
893,264 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,389 UART: [kat] ++
897,541 UART: [kat] sha1
901,831 UART: [kat] SHA2-256
903,771 UART: [kat] SHA2-384
906,522 UART: [kat] SHA2-512-ACC
908,423 UART: [kat] ECC-384
918,176 UART: [kat] HMAC-384Kdf
922,746 UART: [kat] LMS
1,171,074 UART: [kat] --
1,172,059 UART: [cold-reset] ++
1,172,545 UART: [fht] FHT @ 0x50003400
1,175,026 UART: [idev] ++
1,175,194 UART: [idev] CDI.KEYID = 6
1,175,554 UART: [idev] SUBJECT.KEYID = 7
1,175,978 UART: [idev] UDS.KEYID = 0
1,176,323 ready_for_fw is high
1,176,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,258 UART: [idev] Erasing UDS.KEYID = 0
1,200,229 UART: [idev] Sha1 KeyId Algorithm
1,208,659 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,710 UART: [ldev] AUTHORITY.KEYID = 7
1,211,173 UART: [ldev] FE.KEYID = 1
1,216,237 UART: [ldev] Erasing FE.KEYID = 1
1,242,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,643 UART: [ldev] --
1,281,980 UART: [fwproc] Wait for Commands...
1,282,638 UART: [fwproc] Recv command 0x46574c44
1,283,366 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,863 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,818 >>> mbox cmd response: success
2,776,052 UART: [afmc] ++
2,776,220 UART: [afmc] CDI.KEYID = 6
2,776,582 UART: [afmc] SUBJECT.KEYID = 7
2,777,007 UART: [afmc] AUTHORITY.KEYID = 5
2,811,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,454 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,173 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,913 UART: [afmc] --
2,855,021 UART: [cold-reset] --
2,855,863 UART: [state] Locking Datavault
2,857,254 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,858 UART: [state] Locking ICCM
2,858,370 UART: [exit] Launching FMC @ 0x40000130
2,863,699 UART:
2,863,715 UART: Running Caliptra FMC ...
2,864,123 UART:
2,864,177 UART: [state] CFI Enabled
2,874,698 UART: [fht] FMC Alias Private Key: 7
2,982,529 UART: [art] Extend RT PCRs Done
2,982,957 UART: [art] Lock RT PCRs Done
2,984,673 UART: [art] Populate DV Done
2,993,016 UART: [fht] FMC Alias Private Key: 7
2,994,152 UART: [art] Derive CDI
2,994,432 UART: [art] Store in in slot 0x4
3,080,195 UART: [art] Derive Key Pair
3,080,555 UART: [art] Store priv key in slot 0x5
3,093,949 UART: [art] Derive Key Pair - Done
3,108,431 UART: [art] Signing Cert with AUTHO
3,108,911 UART: RITY.KEYID = 7
3,123,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,676 UART: [art] PUB.X = 297570ACA24ABA4868F7A529C60FB7566A85FEDC0CF97B6E48A02A264FB8438F624322AFF67A648A61BD11674D7CB28A
3,131,450 UART: [art] PUB.Y = 0C6A85C547DAF3F2724B826C5E35525B36536BB745630FD3FE13FA1D8F087EFD80D776DB838CB464D54BDA52FFED9043
3,138,403 UART: [art] SIG.R = F8644B971FD39211D4DAA94F1B1FEF3A79084A7371B02930B96384DA0FC690F4B4CCD3CD66A75F76D40B48F08D4DC2CC
3,145,178 UART: [art] SIG.S = FB9FD578B090291D1A547E685A9F2ED5F4A8008CE91E4964143DAD1F374E0727C237AB844A8F9EDA356C815D135AC52F
3,168,966 UART: Caliptra RT
3,169,219 UART: [state] CFI Enabled
3,276,833 UART: [rt] RT listening for mailbox commands...
3,277,503 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,319 UART: [rt]cmd =0x414c544e, len=20
3,308,726 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,439 ready_for_fw is high
1,060,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,343 >>> mbox cmd response: success
2,688,219 UART:
2,688,235 UART: Running Caliptra FMC ...
2,688,643 UART:
2,688,697 UART: [state] CFI Enabled
2,699,170 UART: [fht] FMC Alias Private Key: 7
2,806,615 UART: [art] Extend RT PCRs Done
2,807,043 UART: [art] Lock RT PCRs Done
2,808,687 UART: [art] Populate DV Done
2,816,980 UART: [fht] FMC Alias Private Key: 7
2,817,908 UART: [art] Derive CDI
2,818,188 UART: [art] Store in in slot 0x4
2,903,517 UART: [art] Derive Key Pair
2,903,877 UART: [art] Store priv key in slot 0x5
2,916,951 UART: [art] Derive Key Pair - Done
2,931,829 UART: [art] Signing Cert with AUTHO
2,932,309 UART: RITY.KEYID = 7
2,947,327 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,092 UART: [art] PUB.X = 2C41C2CF1C82862441FDF146D39BAF5526DDCC1AF7FB3CDE1D9374A6CE2F00F5983C7BD540628618C1098D1BCF01AC71
2,954,850 UART: [art] PUB.Y = 8E14ECBEAF1D05A5D5972E43BBFA3902702919D081A4D6E92624723C868CE98B0471B9772C168A5378EFF6D6716C1ECA
2,961,797 UART: [art] SIG.R = DD161B360274886A79EB0C81E3E1CFE2274F1173E56AFAFAAE0019D4B9699C48A632762D5844FF601D48D370E6710E03
2,968,535 UART: [art] SIG.S = B8EB767177C9ACEBFF2DB1B02D5467F452914E65E1C27C6B5A3130DC2C8D289932F5792DFAE227E57E793A69B6FA140E
2,992,679 UART: Caliptra RT
2,992,932 UART: [state] CFI Enabled
3,100,654 UART: [rt] RT listening for mailbox commands...
3,101,324 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,006 UART: [rt]cmd =0x414c544e, len=20
3,132,303 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,915 UART: [kat] SHA2-512-ACC
908,816 UART: [kat] ECC-384
918,667 UART: [kat] HMAC-384Kdf
923,131 UART: [kat] LMS
1,171,459 UART: [kat] --
1,172,252 UART: [cold-reset] ++
1,172,712 UART: [fht] FHT @ 0x50003400
1,175,489 UART: [idev] ++
1,175,657 UART: [idev] CDI.KEYID = 6
1,176,017 UART: [idev] SUBJECT.KEYID = 7
1,176,441 UART: [idev] UDS.KEYID = 0
1,176,786 ready_for_fw is high
1,176,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,705 UART: [idev] Erasing UDS.KEYID = 0
1,201,690 UART: [idev] Sha1 KeyId Algorithm
1,210,092 UART: [idev] --
1,211,128 UART: [ldev] ++
1,211,296 UART: [ldev] CDI.KEYID = 6
1,211,659 UART: [ldev] SUBJECT.KEYID = 5
1,212,085 UART: [ldev] AUTHORITY.KEYID = 7
1,212,548 UART: [ldev] FE.KEYID = 1
1,217,958 UART: [ldev] Erasing FE.KEYID = 1
1,244,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,286 UART: [ldev] --
1,283,699 UART: [fwproc] Wait for Commands...
1,284,399 UART: [fwproc] Recv command 0x46574c44
1,285,127 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,816 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,795 >>> mbox cmd response: success
2,778,845 UART: [afmc] ++
2,779,013 UART: [afmc] CDI.KEYID = 6
2,779,375 UART: [afmc] SUBJECT.KEYID = 7
2,779,800 UART: [afmc] AUTHORITY.KEYID = 5
2,814,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,088 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,816 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,701 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,420 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,126 UART: [afmc] --
2,858,158 UART: [cold-reset] --
2,859,056 UART: [state] Locking Datavault
2,860,371 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,975 UART: [state] Locking ICCM
2,861,501 UART: [exit] Launching FMC @ 0x40000130
2,866,830 UART:
2,866,846 UART: Running Caliptra FMC ...
2,867,254 UART:
2,867,397 UART: [state] CFI Enabled
2,877,934 UART: [fht] FMC Alias Private Key: 7
2,985,935 UART: [art] Extend RT PCRs Done
2,986,363 UART: [art] Lock RT PCRs Done
2,987,931 UART: [art] Populate DV Done
2,995,980 UART: [fht] FMC Alias Private Key: 7
2,996,912 UART: [art] Derive CDI
2,997,192 UART: [art] Store in in slot 0x4
3,082,873 UART: [art] Derive Key Pair
3,083,233 UART: [art] Store priv key in slot 0x5
3,096,457 UART: [art] Derive Key Pair - Done
3,111,325 UART: [art] Signing Cert with AUTHO
3,111,805 UART: RITY.KEYID = 7
3,126,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,682 UART: [art] PUB.X = 92FF844131259E5F7AB9FF3CEA68A6F65C4443BA7768A4356127F522D2DD0610D9D58924ACEDB727D536E3E57D30901B
3,134,453 UART: [art] PUB.Y = 2D54E782D1ACA58D8F0D0D6077557519CAE13054DF6AFFE67634CF775F3FA833089FB76D5B93B3D6F9FC73B38623A8AE
3,141,406 UART: [art] SIG.R = 5A4FA3997B46F3911A3809955337206E73BB447370504E2CC04F07D779507D47C9720E538DA5B1BFD46BC9BCAE665BD4
3,148,167 UART: [art] SIG.S = DAE0E013FDDC54F697FCFA03AB8F72DFE376C6B07241D7AFF47EB4C3B7B86FF75F4262E2770C1F651827A61D865B1533
3,171,862 UART: Caliptra RT
3,172,207 UART: [state] CFI Enabled
3,279,690 UART: [rt] RT listening for mailbox commands...
3,280,360 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,118 UART: [rt]cmd =0x414c544e, len=20
3,311,433 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,278 ready_for_fw is high
1,061,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,606 >>> mbox cmd response: success
2,691,372 UART:
2,691,388 UART: Running Caliptra FMC ...
2,691,796 UART:
2,691,939 UART: [state] CFI Enabled
2,702,280 UART: [fht] FMC Alias Private Key: 7
2,809,777 UART: [art] Extend RT PCRs Done
2,810,205 UART: [art] Lock RT PCRs Done
2,811,865 UART: [art] Populate DV Done
2,819,788 UART: [fht] FMC Alias Private Key: 7
2,820,942 UART: [art] Derive CDI
2,821,222 UART: [art] Store in in slot 0x4
2,906,753 UART: [art] Derive Key Pair
2,907,113 UART: [art] Store priv key in slot 0x5
2,920,841 UART: [art] Derive Key Pair - Done
2,935,706 UART: [art] Signing Cert with AUTHO
2,936,186 UART: RITY.KEYID = 7
2,951,662 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,427 UART: [art] PUB.X = 7B6CAE0BDAF99D4C8B5E5E797D903CF592B0A55EA9BE46FF4308CA3915423389494C9821A0B128185F534C27A907B829
2,959,192 UART: [art] PUB.Y = B29B5537E5A9FBFA7BBD33A354EE68AAE558B839421D81DD380AF0D5B8D393017D8D219B7A0ECFB87AF656460B41F31F
2,966,146 UART: [art] SIG.R = 3193784164592BF40ADF53B6ABF037A00B45AE7FE20B0F1443DB03BB508967BBF31D999D00284C48A0012E80C239F714
2,972,876 UART: [art] SIG.S = 18F5853AC0559B4CCEE5D741E4E41114E399DB004C5FDE5850A50DD85655D0B5B48D23816C3E42FC783AC5FBAD5CA12D
2,996,608 UART: Caliptra RT
2,996,953 UART: [state] CFI Enabled
3,103,992 UART: [rt] RT listening for mailbox commands...
3,104,662 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,620 UART: [rt]cmd =0x414c544e, len=20
3,135,889 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,532 UART: [kat] LMS
1,168,844 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,355 UART: [fht] FHT @ 0x50003400
1,173,101 UART: [idev] ++
1,173,269 UART: [idev] CDI.KEYID = 6
1,173,630 UART: [idev] SUBJECT.KEYID = 7
1,174,055 UART: [idev] UDS.KEYID = 0
1,174,401 ready_for_fw is high
1,174,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,381 UART: [idev] Erasing UDS.KEYID = 0
1,199,061 UART: [idev] Sha1 KeyId Algorithm
1,207,913 UART: [idev] --
1,209,118 UART: [ldev] ++
1,209,286 UART: [ldev] CDI.KEYID = 6
1,209,650 UART: [ldev] SUBJECT.KEYID = 5
1,210,077 UART: [ldev] AUTHORITY.KEYID = 7
1,210,540 UART: [ldev] FE.KEYID = 1
1,215,686 UART: [ldev] Erasing FE.KEYID = 1
1,241,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,402 UART: [ldev] --
1,280,790 UART: [fwproc] Wait for Commands...
1,281,517 UART: [fwproc] Recv command 0x46574c44
1,282,250 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,814 >>> mbox cmd response: success
2,775,031 UART: [afmc] ++
2,775,199 UART: [afmc] CDI.KEYID = 6
2,775,562 UART: [afmc] SUBJECT.KEYID = 7
2,775,988 UART: [afmc] AUTHORITY.KEYID = 5
2,811,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,809 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,692 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,411 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,166 UART: [afmc] --
2,855,134 UART: [cold-reset] --
2,856,056 UART: [state] Locking Datavault
2,856,773 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,377 UART: [state] Locking ICCM
2,857,867 UART: [exit] Launching FMC @ 0x40000130
2,863,196 UART:
2,863,212 UART: Running Caliptra FMC ...
2,863,620 UART:
2,863,674 UART: [state] CFI Enabled
2,873,697 UART: [fht] FMC Alias Private Key: 7
2,982,212 UART: [art] Extend RT PCRs Done
2,982,640 UART: [art] Lock RT PCRs Done
2,984,344 UART: [art] Populate DV Done
2,992,739 UART: [fht] FMC Alias Private Key: 7
2,993,735 UART: [art] Derive CDI
2,994,015 UART: [art] Store in in slot 0x4
3,079,450 UART: [art] Derive Key Pair
3,079,810 UART: [art] Store priv key in slot 0x5
3,093,592 UART: [art] Derive Key Pair - Done
3,108,264 UART: [art] Signing Cert with AUTHO
3,108,744 UART: RITY.KEYID = 7
3,124,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,869 UART: [art] PUB.X = A5E4DFEC61C8746C45914AB52720E581472B0AA3E4B89DED600EDC89BDEDDC572385494731F6BE92A22995B9FB7CCA93
3,131,647 UART: [art] PUB.Y = 9E6A9894E0F2FDEB8031B81294E3D686C09A1E1ADD2A0B5D826C4FDACCFEC3C328FB9042DEDD975F767F695E51962C18
3,138,612 UART: [art] SIG.R = 74E4ABB8AF961420FADC3CEB83E02A2F1F9C17AA6DB7D6E2962A46B68A2834FC100C02C6B1E59924C9E754000A0F7BBD
3,145,366 UART: [art] SIG.S = DB1DFA30315A36E5D6C4B337C537069CEE0A786A955FA5612EC9ECBEE01EFFAB956763B909AF63209EC39C07E86CB4C1
3,168,937 UART: Caliptra RT
3,169,190 UART: [state] CFI Enabled
3,277,601 UART: [rt] RT listening for mailbox commands...
3,278,271 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,275 UART: [rt]cmd =0x414c544e, len=20
3,309,650 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,218 ready_for_fw is high
1,056,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,188 >>> mbox cmd response: success
2,684,572 UART:
2,684,588 UART: Running Caliptra FMC ...
2,684,996 UART:
2,685,050 UART: [state] CFI Enabled
2,695,569 UART: [fht] FMC Alias Private Key: 7
2,803,120 UART: [art] Extend RT PCRs Done
2,803,548 UART: [art] Lock RT PCRs Done
2,805,082 UART: [art] Populate DV Done
2,813,437 UART: [fht] FMC Alias Private Key: 7
2,814,587 UART: [art] Derive CDI
2,814,867 UART: [art] Store in in slot 0x4
2,900,326 UART: [art] Derive Key Pair
2,900,686 UART: [art] Store priv key in slot 0x5
2,913,978 UART: [art] Derive Key Pair - Done
2,928,932 UART: [art] Signing Cert with AUTHO
2,929,412 UART: RITY.KEYID = 7
2,944,594 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,359 UART: [art] PUB.X = 6179D052F7F73CDE1266681F1A5629162B5F514B378CF92797B1998EA5BCE493C8472F1F822639185C019AEEE9823925
2,952,118 UART: [art] PUB.Y = 7799BED8B683CF5ED7E68BDC3764FD6618E88E7F774C80279E15AEE576B045136DA293E43F2BB08D566D0A183F2C80F0
2,959,073 UART: [art] SIG.R = 5E5B0D71A11403A758A4F5243175E193F086C1D06F41CF1B39D6424A1DD56840D9C0B62FF6A7BBACD6A3B3F87525482A
2,965,843 UART: [art] SIG.S = 9AB3F605985504825151E7E832A4F80AD9DBF16DE3A1C9783F5B83DB3F8FDD45695AD77CE455F1BB427B3FF65A996180
2,988,987 UART: Caliptra RT
2,989,240 UART: [state] CFI Enabled
3,095,871 UART: [rt] RT listening for mailbox commands...
3,096,541 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,115 UART: [rt]cmd =0x414c544e, len=20
3,127,530 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,489 UART: [kat] SHA2-256
891,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,168 UART: [kat] ++
895,320 UART: [kat] sha1
899,500 UART: [kat] SHA2-256
901,440 UART: [kat] SHA2-384
904,135 UART: [kat] SHA2-512-ACC
906,036 UART: [kat] ECC-384
915,945 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,238 UART: [idev] ++
1,173,406 UART: [idev] CDI.KEYID = 6
1,173,767 UART: [idev] SUBJECT.KEYID = 7
1,174,192 UART: [idev] UDS.KEYID = 0
1,174,538 ready_for_fw is high
1,174,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,199,976 UART: [idev] Sha1 KeyId Algorithm
1,208,926 UART: [idev] --
1,209,995 UART: [ldev] ++
1,210,163 UART: [ldev] CDI.KEYID = 6
1,210,527 UART: [ldev] SUBJECT.KEYID = 5
1,210,954 UART: [ldev] AUTHORITY.KEYID = 7
1,211,417 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,291 UART: [ldev] --
1,282,737 UART: [fwproc] Wait for Commands...
1,283,534 UART: [fwproc] Recv command 0x46574c44
1,284,267 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,816 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,125 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,231 >>> mbox cmd response: success
2,775,428 UART: [afmc] ++
2,775,596 UART: [afmc] CDI.KEYID = 6
2,775,959 UART: [afmc] SUBJECT.KEYID = 7
2,776,385 UART: [afmc] AUTHORITY.KEYID = 5
2,812,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,774 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,657 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,376 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,207 UART: [afmc] --
2,856,265 UART: [cold-reset] --
2,856,835 UART: [state] Locking Datavault
2,857,754 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,358 UART: [state] Locking ICCM
2,858,898 UART: [exit] Launching FMC @ 0x40000130
2,864,227 UART:
2,864,243 UART: Running Caliptra FMC ...
2,864,651 UART:
2,864,794 UART: [state] CFI Enabled
2,875,623 UART: [fht] FMC Alias Private Key: 7
2,983,832 UART: [art] Extend RT PCRs Done
2,984,260 UART: [art] Lock RT PCRs Done
2,985,702 UART: [art] Populate DV Done
2,993,935 UART: [fht] FMC Alias Private Key: 7
2,995,031 UART: [art] Derive CDI
2,995,311 UART: [art] Store in in slot 0x4
3,080,924 UART: [art] Derive Key Pair
3,081,284 UART: [art] Store priv key in slot 0x5
3,094,302 UART: [art] Derive Key Pair - Done
3,109,130 UART: [art] Signing Cert with AUTHO
3,109,610 UART: RITY.KEYID = 7
3,124,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,547 UART: [art] PUB.X = D8BCD11D0E93AA270BDE5AF136251AA017C7797DA2C68C97D7B427294813DAC004BF4DBB7A98CFE3768F23ECA8B47981
3,132,324 UART: [art] PUB.Y = DE7CECCEF49109196D67DFF2B44649103B18E80EEAD09AA73DA33A81FB08822015711B1CF54C0F8EAB691CBFE77AED63
3,139,282 UART: [art] SIG.R = E9B724699FA220CEC4CF791E4671D295528223D370312CE37AED3D981D9D3227305CDD39117EAACB6708BDD5BA995F37
3,146,055 UART: [art] SIG.S = 35C08094B5BB56B51D53D7B5C2113F51AF25EBFCFF2C60D06A76091E36DB872B2820024AFAA76B34C7301907E7A8750C
3,170,040 UART: Caliptra RT
3,170,385 UART: [state] CFI Enabled
3,278,612 UART: [rt] RT listening for mailbox commands...
3,279,282 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,292 UART: [rt]cmd =0x414c544e, len=20
3,310,777 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,575 ready_for_fw is high
1,056,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,473 >>> mbox cmd response: success
2,687,001 UART:
2,687,017 UART: Running Caliptra FMC ...
2,687,425 UART:
2,687,568 UART: [state] CFI Enabled
2,697,869 UART: [fht] FMC Alias Private Key: 7
2,806,060 UART: [art] Extend RT PCRs Done
2,806,488 UART: [art] Lock RT PCRs Done
2,807,822 UART: [art] Populate DV Done
2,815,879 UART: [fht] FMC Alias Private Key: 7
2,816,903 UART: [art] Derive CDI
2,817,183 UART: [art] Store in in slot 0x4
2,902,964 UART: [art] Derive Key Pair
2,903,324 UART: [art] Store priv key in slot 0x5
2,916,638 UART: [art] Derive Key Pair - Done
2,931,372 UART: [art] Signing Cert with AUTHO
2,931,852 UART: RITY.KEYID = 7
2,946,716 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,481 UART: [art] PUB.X = 19732D897F37A0955B0B02B6B373B2B9C6028F6BD1772DBCCB99BF799A0736C581C587C1C9332A6297BF8BE8486C7432
2,954,239 UART: [art] PUB.Y = 09258FD0F6246FD3B1B4251452B67143C7B5182AC561F72D4ED2B8DBC094D1E500EAD6312134FE79DECE8DB8137EA6E1
2,961,174 UART: [art] SIG.R = 6AE7C328C65EBCF02AFDEAF952DA0CC75727314B826A30072070021A999B1900384BC26E3CF53F0A942D8953E2AD0CD6
2,967,915 UART: [art] SIG.S = 2EBC77114D897C13E5ECE8F79661A6E6EE35D44E5C317DC55A1B5D2EBDE58359CC0FF0840713803E0F0BE0A1BC79175F
2,991,616 UART: Caliptra RT
2,991,961 UART: [state] CFI Enabled
3,100,004 UART: [rt] RT listening for mailbox commands...
3,100,674 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,894 UART: [rt]cmd =0x414c544e, len=20
3,131,993 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
Truncated 4094 bytes from beginning
UART: [state] Locking Datavault
23,535,282 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,038 UART: [state] Locking ICCM
23,539,626 UART: [exit] Launching FMC @ 0x40000130
23,548,030 UART:
23,548,269 UART: Running Caliptra FMC ...
23,549,372 UART:
23,549,531 UART: [state] CFI Enabled
23,615,688 UART: [fht] FMC Alias Private Key: 7
25,953,141 UART: [art] Extend RT PCRs Done
25,954,354 UART: [art] Lock RT PCRs Done
25,956,035 UART: [art] Populate DV Done
25,961,338 UART: [fht] FMC Alias Private Key: 7
25,962,934 UART: [art] Derive CDI
25,963,745 UART: [art] Store in in slot 0x4
26,023,570 UART: [art] Derive Key Pair
26,024,623 UART: [art] Store priv key in slot 0x5
29,317,270 UART: [art] Derive Key Pair - Done
29,330,219 UART: [art] Signing Cert with AUTHO
29,331,526 UART: RITY.KEYID = 7
31,618,445 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,950 UART: [art] PUB.X = 62F8215B216E903877F1C89BB1C266E38C633EB297D39527BEE96B7E91B33BEEC842EB59726B4DD5D8626EECB3620FF8
31,627,201 UART: [art] PUB.Y = 56B6C6CD665719083A4A9CE4625D17CA77C68C5258E5A510EA18922CAF901F6A6262D2592C1F556FBD8E73CD3A9A8C3A
31,634,442 UART: [art] SIG.R = 8532D5AE6645891A3225B9C75B9A0D8654030EC8E83C99F74C6040ADAFA740DF0196E03B71FB51D9DA4D73A8DDF4405B
31,641,832 UART: [art] SIG.S = 519D7BD03A176938C377E46B1FA9E78B053101E5F86629A1CFD98349D24EDF7DE541D71BB10861AB926459EC91264938
32,947,386 UART: Caliptra RT
32,948,099 UART: [state] CFI Enabled
33,118,963 UART: [rt] RT listening for mailbox commands...
33,151,161 UART: [rt]cmd =0x44504543, len=92
38,907,470 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,076 writing to cptra_bootfsm_go
190,231 UART:
190,532 UART: Running Caliptra ROM ...
191,651 UART:
191,802 UART: [state] CFI Enabled
254,454 UART: [state] LifecycleState = Unprovisioned
256,420 UART: [state] DebugLocked = No
259,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,615 UART: [kat] SHA2-256
433,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,851 UART: [kat] ++
444,297 UART: [kat] sha1
455,384 UART: [kat] SHA2-256
458,029 UART: [kat] SHA2-384
464,172 UART: [kat] SHA2-512-ACC
466,541 UART: [kat] ECC-384
2,758,709 UART: [kat] HMAC-384Kdf
2,789,142 UART: [kat] LMS
3,979,415 UART: [kat] --
3,984,143 UART: [cold-reset] ++
3,986,645 UART: [fht] Storing FHT @ 0x50003400
3,997,772 UART: [idev] ++
3,998,333 UART: [idev] CDI.KEYID = 6
3,999,290 UART: [idev] SUBJECT.KEYID = 7
4,000,536 UART: [idev] UDS.KEYID = 0
4,001,443 ready_for_fw is high
4,001,636 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,145,095 UART: [idev] Erasing UDS.KEYID = 0
7,335,657 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,446 UART: [idev] --
7,362,441 UART: [ldev] ++
7,363,012 UART: [ldev] CDI.KEYID = 6
7,363,963 UART: [ldev] SUBJECT.KEYID = 5
7,365,199 UART: [ldev] AUTHORITY.KEYID = 7
7,366,431 UART: [ldev] FE.KEYID = 1
7,411,510 UART: [ldev] Erasing FE.KEYID = 1
10,746,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,068,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,082,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,121 UART: [ldev] --
13,106,697 UART: [fwproc] Waiting for Commands...
13,109,281 UART: [fwproc] Received command 0x46574c44
13,111,472 UART: [fwproc] Received Image of size 114124 bytes
17,169,797 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,118 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,988 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,638,718 >>> mbox cmd response: success
17,639,090 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,642,482 UART: [afmc] ++
17,643,066 UART: [afmc] CDI.KEYID = 6
17,643,981 UART: [afmc] SUBJECT.KEYID = 7
17,645,195 UART: [afmc] AUTHORITY.KEYID = 5
21,000,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,297,997 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,300,249 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,314,691 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,329,541 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,343,947 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,366,051 UART: [afmc] --
23,369,058 UART: [cold-reset] --
23,372,489 UART: [state] Locking Datavault
23,377,953 UART: [state] Locking PCR0, PCR1 and PCR31
23,379,713 UART: [state] Locking ICCM
23,381,942 UART: [exit] Launching FMC @ 0x40000130
23,390,334 UART:
23,390,582 UART: Running Caliptra FMC ...
23,391,689 UART:
23,391,851 UART: [state] CFI Enabled
23,457,205 UART: [fht] FMC Alias Private Key: 7
25,795,500 UART: [art] Extend RT PCRs Done
25,796,726 UART: [art] Lock RT PCRs Done
25,798,788 UART: [art] Populate DV Done
25,804,203 UART: [fht] FMC Alias Private Key: 7
25,805,901 UART: [art] Derive CDI
25,806,716 UART: [art] Store in in slot 0x4
25,865,260 UART: [art] Derive Key Pair
25,866,302 UART: [art] Store priv key in slot 0x5
29,158,622 UART: [art] Derive Key Pair - Done
29,171,462 UART: [art] Signing Cert with AUTHO
29,172,791 UART: RITY.KEYID = 7
31,460,033 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,548 UART: [art] PUB.X = 62F8215B216E903877F1C89BB1C266E38C633EB297D39527BEE96B7E91B33BEEC842EB59726B4DD5D8626EECB3620FF8
31,468,809 UART: [art] PUB.Y = 56B6C6CD665719083A4A9CE4625D17CA77C68C5258E5A510EA18922CAF901F6A6262D2592C1F556FBD8E73CD3A9A8C3A
31,476,060 UART: [art] SIG.R = 8532D5AE6645891A3225B9C75B9A0D8654030EC8E83C99F74C6040ADAFA740DF0196E03B71FB51D9DA4D73A8DDF4405B
31,483,400 UART: [art] SIG.S = 519D7BD03A176938C377E46B1FA9E78B053101E5F86629A1CFD98349D24EDF7DE541D71BB10861AB926459EC91264938
32,788,044 UART: Caliptra RT
32,788,751 UART: [state] CFI Enabled
32,951,252 UART: [rt] RT listening for mailbox commands...
32,983,573 UART: [rt]cmd =0x4d454153, len=108
33,001,882 >>> mbox cmd response data (12 bytes)
33,002,376 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,032,868 UART: [rt]cmd =0x44504543, len=92
38,790,969 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,025 writing to cptra_bootfsm_go
190,158 UART:
190,454 UART: Running Caliptra ROM ...
191,487 UART:
191,633 UART: [state] CFI Enabled
253,388 UART: [state] LifecycleState = Unprovisioned
255,325 UART: [state] DebugLocked = No
257,772 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,527 UART: [kat] SHA2-256
432,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,758 UART: [kat] ++
443,205 UART: [kat] sha1
453,725 UART: [kat] SHA2-256
456,374 UART: [kat] SHA2-384
461,298 UART: [kat] SHA2-512-ACC
463,666 UART: [kat] ECC-384
2,755,366 UART: [kat] HMAC-384Kdf
2,766,191 UART: [kat] LMS
3,956,515 UART: [kat] --
3,961,448 UART: [cold-reset] ++
3,962,453 UART: [fht] Storing FHT @ 0x50003400
3,973,114 UART: [idev] ++
3,973,678 UART: [idev] CDI.KEYID = 6
3,974,565 UART: [idev] SUBJECT.KEYID = 7
3,975,884 UART: [idev] UDS.KEYID = 0
3,976,784 ready_for_fw is high
3,976,967 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,120,412 UART: [idev] Erasing UDS.KEYID = 0
7,311,584 UART: [idev] Using Sha1 for KeyId Algorithm
7,333,238 UART: [idev] --
7,337,992 UART: [ldev] ++
7,338,563 UART: [ldev] CDI.KEYID = 6
7,339,532 UART: [ldev] SUBJECT.KEYID = 5
7,340,756 UART: [ldev] AUTHORITY.KEYID = 7
7,341,910 UART: [ldev] FE.KEYID = 1
7,387,730 UART: [ldev] Erasing FE.KEYID = 1
10,721,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,508 UART: [ldev] --
13,100,027 UART: [fwproc] Waiting for Commands...
13,102,193 UART: [fwproc] Received command 0x46574c44
13,104,382 UART: [fwproc] Received Image of size 114124 bytes
17,156,555 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,237,818 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,306,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,623,782 >>> mbox cmd response: success
17,624,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,628,150 UART: [afmc] ++
17,628,736 UART: [afmc] CDI.KEYID = 6
17,629,756 UART: [afmc] SUBJECT.KEYID = 7
17,630,911 UART: [afmc] AUTHORITY.KEYID = 5
20,994,919 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,291,498 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,293,734 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,308,143 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,322,979 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,337,426 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,358,841 UART: [afmc] --
23,363,525 UART: [cold-reset] --
23,366,292 UART: [state] Locking Datavault
23,372,577 UART: [state] Locking PCR0, PCR1 and PCR31
23,374,334 UART: [state] Locking ICCM
23,376,671 UART: [exit] Launching FMC @ 0x40000130
23,385,078 UART:
23,385,321 UART: Running Caliptra FMC ...
23,386,416 UART:
23,386,576 UART: [state] CFI Enabled
23,451,513 UART: [fht] FMC Alias Private Key: 7
25,788,763 UART: [art] Extend RT PCRs Done
25,789,983 UART: [art] Lock RT PCRs Done
25,791,585 UART: [art] Populate DV Done
25,797,000 UART: [fht] FMC Alias Private Key: 7
25,798,704 UART: [art] Derive CDI
25,799,519 UART: [art] Store in in slot 0x4
25,859,182 UART: [art] Derive Key Pair
25,860,224 UART: [art] Store priv key in slot 0x5
29,153,775 UART: [art] Derive Key Pair - Done
29,166,776 UART: [art] Signing Cert with AUTHO
29,168,106 UART: RITY.KEYID = 7
31,455,349 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,862 UART: [art] PUB.X = 62F8215B216E903877F1C89BB1C266E38C633EB297D39527BEE96B7E91B33BEEC842EB59726B4DD5D8626EECB3620FF8
31,464,112 UART: [art] PUB.Y = 56B6C6CD665719083A4A9CE4625D17CA77C68C5258E5A510EA18922CAF901F6A6262D2592C1F556FBD8E73CD3A9A8C3A
31,471,342 UART: [art] SIG.R = 8532D5AE6645891A3225B9C75B9A0D8654030EC8E83C99F74C6040ADAFA740DF0196E03B71FB51D9DA4D73A8DDF4405B
31,478,730 UART: [art] SIG.S = 519D7BD03A176938C377E46B1FA9E78B053101E5F86629A1CFD98349D24EDF7DE541D71BB10861AB926459EC91264938
32,783,219 UART: Caliptra RT
32,783,918 UART: [state] CFI Enabled
32,945,391 UART: [rt] RT listening for mailbox commands...
32,977,612 UART: [rt]cmd =0x44504543, len=96
33,009,679 >>> mbox cmd response data (56 bytes)
33,010,506 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,041,051 UART: [rt]cmd =0x44504543, len=92
38,809,370 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
4,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,832,889 >>> mbox cmd response data (12 bytes)
12,834,372 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,003,703 >>> mbox cmd response: success
18,004,204 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,699,207 UART:
23,699,585 UART: Running Caliptra FMC ...
23,700,837 UART:
23,701,005 UART: [state] CFI Enabled
23,768,095 UART: [fht] FMC Alias Private Key: 7
26,105,709 UART: [art] Extend RT PCRs Done
26,106,954 UART: [art] Lock RT PCRs Done
26,108,825 UART: [art] Populate DV Done
26,114,027 UART: [fht] FMC Alias Private Key: 7
26,115,738 UART: [art] Derive CDI
26,116,562 UART: [art] Store in in slot 0x4
26,178,248 UART: [art] Derive Key Pair
26,179,288 UART: [art] Store priv key in slot 0x5
29,472,445 UART: [art] Derive Key Pair - Done
29,485,444 UART: [art] Signing Cert with AUTHO
29,486,750 UART: RITY.KEYID = 7
31,773,523 UART: [art] Erasing AUTHORITY.KEYID = 7
31,775,025 UART: [art] PUB.X = 0F61A96154D34591AB224BC0C4014241909BFEBB468AE879C3251AF128DE2D01A9E81C5B7184ECB326380A4F7853B077
31,782,246 UART: [art] PUB.Y = B3312BDC0DDD3CF856ED2EEFD8AE4CA58F4E41482EE238FB79956028B0DB5D759C98E80D90E7E8B2ECB65B3A72118327
31,789,500 UART: [art] SIG.R = ED3C0C95B95AF84A954241746C35E0D9C400542B27ADACA4F863DA96EE6304E9970D5871D761666BC044403E31BEDF5C
31,796,857 UART: [art] SIG.S = 6972D003D1332669BA688F6FD269349C786DC7FC9E119C9E216F131D69F2F9FD4D55B94530DC84C885E0F811A0DC59F7
33,100,861 UART: Caliptra RT
33,101,582 UART: [state] CFI Enabled
33,274,948 UART: [rt] RT listening for mailbox commands...
33,306,874 UART: [rt]cmd =0x44504543, len=92
39,063,099 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,101 writing to cptra_bootfsm_go
3,776,849 ready_for_fw is high
3,777,684 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,869,687 >>> mbox cmd response: success
17,870,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,556,079 UART:
23,556,429 UART: Running Caliptra FMC ...
23,557,507 UART:
23,557,669 UART: [state] CFI Enabled
23,610,058 UART: [fht] FMC Alias Private Key: 7
25,948,170 UART: [art] Extend RT PCRs Done
25,949,414 UART: [art] Lock RT PCRs Done
25,951,209 UART: [art] Populate DV Done
25,956,417 UART: [fht] FMC Alias Private Key: 7
25,957,943 UART: [art] Derive CDI
25,958,712 UART: [art] Store in in slot 0x4
26,017,776 UART: [art] Derive Key Pair
26,018,787 UART: [art] Store priv key in slot 0x5
29,311,022 UART: [art] Derive Key Pair - Done
29,324,073 UART: [art] Signing Cert with AUTHO
29,325,417 UART: RITY.KEYID = 7
31,612,584 UART: [art] Erasing AUTHORITY.KEYID = 7
31,614,096 UART: [art] PUB.X = 0F61A96154D34591AB224BC0C4014241909BFEBB468AE879C3251AF128DE2D01A9E81C5B7184ECB326380A4F7853B077
31,621,312 UART: [art] PUB.Y = B3312BDC0DDD3CF856ED2EEFD8AE4CA58F4E41482EE238FB79956028B0DB5D759C98E80D90E7E8B2ECB65B3A72118327
31,628,567 UART: [art] SIG.R = ED3C0C95B95AF84A954241746C35E0D9C400542B27ADACA4F863DA96EE6304E9970D5871D761666BC044403E31BEDF5C
31,635,960 UART: [art] SIG.S = 6972D003D1332669BA688F6FD269349C786DC7FC9E119C9E216F131D69F2F9FD4D55B94530DC84C885E0F811A0DC59F7
32,941,662 UART: Caliptra RT
32,942,384 UART: [state] CFI Enabled
33,123,796 UART: [rt] RT listening for mailbox commands...
33,155,730 UART: [rt]cmd =0x4d454153, len=108
33,174,472 >>> mbox cmd response data (12 bytes)
33,175,053 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,205,750 UART: [rt]cmd =0x44504543, len=92
38,963,326 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,294 writing to cptra_bootfsm_go
3,795,990 ready_for_fw is high
3,796,341 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,877,490 >>> mbox cmd response: success
17,877,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,578,935 UART:
23,579,263 UART: Running Caliptra FMC ...
23,580,308 UART:
23,580,477 UART: [state] CFI Enabled
23,646,345 UART: [fht] FMC Alias Private Key: 7
25,984,384 UART: [art] Extend RT PCRs Done
25,985,646 UART: [art] Lock RT PCRs Done
25,987,167 UART: [art] Populate DV Done
25,992,697 UART: [fht] FMC Alias Private Key: 7
25,994,350 UART: [art] Derive CDI
25,995,167 UART: [art] Store in in slot 0x4
26,054,410 UART: [art] Derive Key Pair
26,055,453 UART: [art] Store priv key in slot 0x5
29,348,086 UART: [art] Derive Key Pair - Done
29,361,301 UART: [art] Signing Cert with AUTHO
29,362,636 UART: RITY.KEYID = 7
31,650,194 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,711 UART: [art] PUB.X = 0F61A96154D34591AB224BC0C4014241909BFEBB468AE879C3251AF128DE2D01A9E81C5B7184ECB326380A4F7853B077
31,658,931 UART: [art] PUB.Y = B3312BDC0DDD3CF856ED2EEFD8AE4CA58F4E41482EE238FB79956028B0DB5D759C98E80D90E7E8B2ECB65B3A72118327
31,666,218 UART: [art] SIG.R = ED3C0C95B95AF84A954241746C35E0D9C400542B27ADACA4F863DA96EE6304E9970D5871D761666BC044403E31BEDF5C
31,673,576 UART: [art] SIG.S = 6972D003D1332669BA688F6FD269349C786DC7FC9E119C9E216F131D69F2F9FD4D55B94530DC84C885E0F811A0DC59F7
32,979,292 UART: Caliptra RT
32,980,000 UART: [state] CFI Enabled
33,142,676 UART: [rt] RT listening for mailbox commands...
33,174,744 UART: [rt]cmd =0x44504543, len=96
33,205,732 >>> mbox cmd response data (56 bytes)
33,206,627 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,237,177 UART: [rt]cmd =0x44504543, len=92
39,004,257 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.97s
Truncated 4094 bytes from beginning
UART: [state] Locking Datavault
23,681,318 UART: [state] Locking PCR0, PCR1 and PCR31
23,683,063 UART: [state] Locking ICCM
23,685,751 UART: [exit] Launching FMC @ 0x40000130
23,694,143 UART:
23,694,371 UART: Running Caliptra FMC ...
23,695,469 UART:
23,695,620 UART: [state] CFI Enabled
23,703,712 UART: [fht] FMC Alias Private Key: 7
26,034,852 UART: [art] Extend RT PCRs Done
26,036,071 UART: [art] Lock RT PCRs Done
26,038,130 UART: [art] Populate DV Done
26,043,755 UART: [fht] FMC Alias Private Key: 7
26,045,368 UART: [art] Derive CDI
26,046,184 UART: [art] Store in in slot 0x4
26,088,664 UART: [art] Derive Key Pair
26,089,652 UART: [art] Store priv key in slot 0x5
29,331,343 UART: [art] Derive Key Pair - Done
29,344,228 UART: [art] Signing Cert with AUTHO
29,345,523 UART: RITY.KEYID = 7
31,624,564 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,057 UART: [art] PUB.X = 62C9D9FC732D0AF26220539E689781B6121EF77EB048093128AD2D45BB51E7930640CC33414EA49F35CB4867CA2170C4
31,633,324 UART: [art] PUB.Y = 9B50AE9E6CEF17CA91F052866E98B555EB4C2001EB3E53289F7A9819AF2975BCDD377DB2A274CC51A455B590BE857C47
31,640,554 UART: [art] SIG.R = C0EF5803CF0D0A1D9C917F4BAB95B5DB86A2A8AF796855EFE7326C05971622BEC6CACFA46F1ADDF5E1074824C27D26E7
31,647,933 UART: [art] SIG.S = CBA15E0170935598D94B53F5F8C636BAF6502D6B7ADFB0A245CD29C54FDD86C54033A9E8194F8052E485771A65479372
32,953,270 UART: Caliptra RT
32,953,962 UART: [state] CFI Enabled
33,083,394 UART: [rt] RT listening for mailbox commands...
33,115,301 UART: [rt]cmd =0x44504543, len=92
38,795,170 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,115 writing to cptra_bootfsm_go
190,224 UART:
190,522 UART: Running Caliptra ROM ...
191,574 UART:
1,710,720 UART: [state] CFI Enabled
1,722,532 UART: [state] LifecycleState = Unprovisioned
1,724,455 UART: [state] DebugLocked = No
1,725,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,729,914 UART: [kat] SHA2-256
1,899,653 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,910,175 UART: [kat] ++
1,910,629 UART: [kat] sha1
1,921,859 UART: [kat] SHA2-256
1,924,587 UART: [kat] SHA2-384
1,930,661 UART: [kat] SHA2-512-ACC
1,933,060 UART: [kat] ECC-384
4,218,405 UART: [kat] HMAC-384Kdf
4,229,641 UART: [kat] LMS
5,419,711 UART: [kat] --
5,424,291 UART: [cold-reset] ++
5,426,292 UART: [fht] Storing FHT @ 0x50003400
5,438,620 UART: [idev] ++
5,439,300 UART: [idev] CDI.KEYID = 6
5,440,184 UART: [idev] SUBJECT.KEYID = 7
5,441,427 UART: [idev] UDS.KEYID = 0
5,442,348 ready_for_fw is high
5,442,535 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,585,777 UART: [idev] Erasing UDS.KEYID = 0
8,730,354 UART: [idev] Using Sha1 for KeyId Algorithm
8,751,945 UART: [idev] --
8,756,442 UART: [ldev] ++
8,757,010 UART: [ldev] CDI.KEYID = 6
8,757,943 UART: [ldev] SUBJECT.KEYID = 5
8,759,146 UART: [ldev] AUTHORITY.KEYID = 7
8,760,426 UART: [ldev] FE.KEYID = 1
8,772,936 UART: [ldev] Erasing FE.KEYID = 1
12,059,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,354,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,369,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,384,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,398,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,417,483 UART: [ldev] --
14,421,679 UART: [fwproc] Waiting for Commands...
14,424,968 UART: [fwproc] Received command 0x46574c44
14,427,150 UART: [fwproc] Received Image of size 114124 bytes
18,478,240 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,554,712 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
18,623,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
18,941,822 >>> mbox cmd response: success
18,942,181 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,945,459 UART: [afmc] ++
18,946,100 UART: [afmc] CDI.KEYID = 6
18,947,005 UART: [afmc] SUBJECT.KEYID = 7
18,948,277 UART: [afmc] AUTHORITY.KEYID = 5
22,267,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,561,165 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,563,443 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,577,802 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,592,657 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
24,607,058 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
24,627,195 UART: [afmc] --
24,631,699 UART: [cold-reset] --
24,636,003 UART: [state] Locking Datavault
24,640,721 UART: [state] Locking PCR0, PCR1 and PCR31
24,642,482 UART: [state] Locking ICCM
24,645,044 UART: [exit] Launching FMC @ 0x40000130
24,653,262 UART:
24,653,503 UART: Running Caliptra FMC ...
24,654,601 UART:
24,654,760 UART: [state] CFI Enabled
24,662,857 UART: [fht] FMC Alias Private Key: 7
26,993,456 UART: [art] Extend RT PCRs Done
26,994,684 UART: [art] Lock RT PCRs Done
26,996,441 UART: [art] Populate DV Done
27,001,794 UART: [fht] FMC Alias Private Key: 7
27,003,386 UART: [art] Derive CDI
27,004,200 UART: [art] Store in in slot 0x4
27,046,475 UART: [art] Derive Key Pair
27,047,540 UART: [art] Store priv key in slot 0x5
30,289,809 UART: [art] Derive Key Pair - Done
30,303,075 UART: [art] Signing Cert with AUTHO
30,304,380 UART: RITY.KEYID = 7
32,583,867 UART: [art] Erasing AUTHORITY.KEYID = 7
32,585,366 UART: [art] PUB.X = 62C9D9FC732D0AF26220539E689781B6121EF77EB048093128AD2D45BB51E7930640CC33414EA49F35CB4867CA2170C4
32,592,557 UART: [art] PUB.Y = 9B50AE9E6CEF17CA91F052866E98B555EB4C2001EB3E53289F7A9819AF2975BCDD377DB2A274CC51A455B590BE857C47
32,599,831 UART: [art] SIG.R = C0EF5803CF0D0A1D9C917F4BAB95B5DB86A2A8AF796855EFE7326C05971622BEC6CACFA46F1ADDF5E1074824C27D26E7
32,607,211 UART: [art] SIG.S = CBA15E0170935598D94B53F5F8C636BAF6502D6B7ADFB0A245CD29C54FDD86C54033A9E8194F8052E485771A65479372
33,912,426 UART: Caliptra RT
33,913,123 UART: [state] CFI Enabled
34,030,298 UART: [rt] RT listening for mailbox commands...
34,062,513 UART: [rt]cmd =0x4d454153, len=108
34,081,117 >>> mbox cmd response data (12 bytes)
34,081,766 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,112,125 UART: [rt]cmd =0x44504543, len=92
39,792,177 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,099 writing to cptra_bootfsm_go
190,226 UART:
190,519 UART: Running Caliptra ROM ...
191,536 UART:
2,006,766 UART: [state] CFI Enabled
2,019,790 UART: [state] LifecycleState = Unprovisioned
2,021,718 UART: [state] DebugLocked = No
2,024,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,029,786 UART: [kat] SHA2-256
2,199,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,210,031 UART: [kat] ++
2,210,484 UART: [kat] sha1
2,221,365 UART: [kat] SHA2-256
2,224,018 UART: [kat] SHA2-384
2,229,681 UART: [kat] SHA2-512-ACC
2,232,058 UART: [kat] ECC-384
4,516,010 UART: [kat] HMAC-384Kdf
4,528,387 UART: [kat] LMS
5,718,475 UART: [kat] --
5,722,704 UART: [cold-reset] ++
5,725,204 UART: [fht] Storing FHT @ 0x50003400
5,735,973 UART: [idev] ++
5,736,532 UART: [idev] CDI.KEYID = 6
5,737,508 UART: [idev] SUBJECT.KEYID = 7
5,738,745 UART: [idev] UDS.KEYID = 0
5,739,666 ready_for_fw is high
5,739,853 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,883,196 UART: [idev] Erasing UDS.KEYID = 0
9,028,327 UART: [idev] Using Sha1 for KeyId Algorithm
9,050,795 UART: [idev] --
9,053,890 UART: [ldev] ++
9,054,460 UART: [ldev] CDI.KEYID = 6
9,055,397 UART: [ldev] SUBJECT.KEYID = 5
9,056,550 UART: [ldev] AUTHORITY.KEYID = 7
9,057,886 UART: [ldev] FE.KEYID = 1
9,067,925 UART: [ldev] Erasing FE.KEYID = 1
12,352,726 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,644,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,659,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,674,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,688,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,706,330 UART: [ldev] --
14,711,100 UART: [fwproc] Waiting for Commands...
14,713,732 UART: [fwproc] Received command 0x46574c44
14,715,971 UART: [fwproc] Received Image of size 114124 bytes
18,764,997 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,847,460 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
18,916,381 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,233,957 >>> mbox cmd response: success
19,234,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,238,189 UART: [afmc] ++
19,238,762 UART: [afmc] CDI.KEYID = 6
19,239,695 UART: [afmc] SUBJECT.KEYID = 7
19,240,956 UART: [afmc] AUTHORITY.KEYID = 5
22,553,399 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,848,293 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,850,557 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,864,970 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,879,794 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
24,894,228 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
24,917,362 UART: [afmc] --
24,921,563 UART: [cold-reset] --
24,925,551 UART: [state] Locking Datavault
24,930,847 UART: [state] Locking PCR0, PCR1 and PCR31
24,932,593 UART: [state] Locking ICCM
24,933,900 UART: [exit] Launching FMC @ 0x40000130
24,942,284 UART:
24,942,511 UART: Running Caliptra FMC ...
24,943,528 UART:
24,943,670 UART: [state] CFI Enabled
24,951,708 UART: [fht] FMC Alias Private Key: 7
27,282,774 UART: [art] Extend RT PCRs Done
27,283,990 UART: [art] Lock RT PCRs Done
27,285,530 UART: [art] Populate DV Done
27,291,047 UART: [fht] FMC Alias Private Key: 7
27,292,636 UART: [art] Derive CDI
27,293,375 UART: [art] Store in in slot 0x4
27,336,448 UART: [art] Derive Key Pair
27,337,508 UART: [art] Store priv key in slot 0x5
30,579,376 UART: [art] Derive Key Pair - Done
30,592,309 UART: [art] Signing Cert with AUTHO
30,593,636 UART: RITY.KEYID = 7
32,872,932 UART: [art] Erasing AUTHORITY.KEYID = 7
32,874,434 UART: [art] PUB.X = 62C9D9FC732D0AF26220539E689781B6121EF77EB048093128AD2D45BB51E7930640CC33414EA49F35CB4867CA2170C4
32,881,670 UART: [art] PUB.Y = 9B50AE9E6CEF17CA91F052866E98B555EB4C2001EB3E53289F7A9819AF2975BCDD377DB2A274CC51A455B590BE857C47
32,888,894 UART: [art] SIG.R = C0EF5803CF0D0A1D9C917F4BAB95B5DB86A2A8AF796855EFE7326C05971622BEC6CACFA46F1ADDF5E1074824C27D26E7
32,896,328 UART: [art] SIG.S = CBA15E0170935598D94B53F5F8C636BAF6502D6B7ADFB0A245CD29C54FDD86C54033A9E8194F8052E485771A65479372
34,201,710 UART: Caliptra RT
34,202,420 UART: [state] CFI Enabled
34,319,263 UART: [rt] RT listening for mailbox commands...
34,351,527 UART: [rt]cmd =0x44504543, len=96
34,382,762 >>> mbox cmd response data (56 bytes)
34,383,675 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,414,047 UART: [rt]cmd =0x44504543, len=92
40,094,472 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 6.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,223 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,042,149 >>> mbox cmd response data (12 bytes)
13,043,886 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,216,005 >>> mbox cmd response: success
18,217,121 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,857,810 UART:
23,858,232 UART: Running Caliptra FMC ...
23,859,444 UART:
23,859,602 UART: [state] CFI Enabled
23,867,454 UART: [fht] FMC Alias Private Key: 7
26,197,759 UART: [art] Extend RT PCRs Done
26,199,003 UART: [art] Lock RT PCRs Done
26,200,260 UART: [art] Populate DV Done
26,205,948 UART: [fht] FMC Alias Private Key: 7
26,207,649 UART: [art] Derive CDI
26,208,464 UART: [art] Store in in slot 0x4
26,251,115 UART: [art] Derive Key Pair
26,252,113 UART: [art] Store priv key in slot 0x5
29,494,219 UART: [art] Derive Key Pair - Done
29,507,539 UART: [art] Signing Cert with AUTHO
29,508,846 UART: RITY.KEYID = 7
31,788,198 UART: [art] Erasing AUTHORITY.KEYID = 7
31,789,709 UART: [art] PUB.X = 320A48D1E275EE902B9A364DE1560E013A8569EBFBCD10EAFC7AA9F9AF4F8C01881B6F8A40C9F1A932ADDBA5A4841CF3
31,796,956 UART: [art] PUB.Y = F5B00AE6B461C57660C955EFC3BF930922B374EE6DB9CBA4BDD8AAFD5F08C171FBD35A1F7A1D8443B49FE4EFAB6FD151
31,804,252 UART: [art] SIG.R = 78786366A24C3A791C05981C9BDC1A38363F0C060486BBD351D7B2858E756E154AAF911C1497EB5BA55496F98270098E
31,811,598 UART: [art] SIG.S = 08B60D988296A48BEC30EBE20C7C6CB9C57164FBF8F753791ADC716AB769BE57D36AAB008A40CBCC6330E6B2F68B5E2F
33,116,711 UART: Caliptra RT
33,117,438 UART: [state] CFI Enabled
33,246,456 UART: [rt] RT listening for mailbox commands...
33,278,253 UART: [rt]cmd =0x44504543, len=92
38,958,078 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,142 writing to cptra_bootfsm_go
5,073,983 ready_for_fw is high
5,074,352 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,024,312 >>> mbox cmd response: success
19,024,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,663,690 UART:
24,664,030 UART: Running Caliptra FMC ...
24,665,102 UART:
24,665,250 UART: [state] CFI Enabled
24,673,678 UART: [fht] FMC Alias Private Key: 7
27,004,237 UART: [art] Extend RT PCRs Done
27,005,478 UART: [art] Lock RT PCRs Done
27,007,436 UART: [art] Populate DV Done
27,012,956 UART: [fht] FMC Alias Private Key: 7
27,014,594 UART: [art] Derive CDI
27,015,405 UART: [art] Store in in slot 0x4
27,057,889 UART: [art] Derive Key Pair
27,058,936 UART: [art] Store priv key in slot 0x5
30,301,358 UART: [art] Derive Key Pair - Done
30,314,498 UART: [art] Signing Cert with AUTHO
30,315,826 UART: RITY.KEYID = 7
32,595,427 UART: [art] Erasing AUTHORITY.KEYID = 7
32,596,934 UART: [art] PUB.X = 320A48D1E275EE902B9A364DE1560E013A8569EBFBCD10EAFC7AA9F9AF4F8C01881B6F8A40C9F1A932ADDBA5A4841CF3
32,604,230 UART: [art] PUB.Y = F5B00AE6B461C57660C955EFC3BF930922B374EE6DB9CBA4BDD8AAFD5F08C171FBD35A1F7A1D8443B49FE4EFAB6FD151
32,611,509 UART: [art] SIG.R = 78786366A24C3A791C05981C9BDC1A38363F0C060486BBD351D7B2858E756E154AAF911C1497EB5BA55496F98270098E
32,618,837 UART: [art] SIG.S = 08B60D988296A48BEC30EBE20C7C6CB9C57164FBF8F753791ADC716AB769BE57D36AAB008A40CBCC6330E6B2F68B5E2F
33,924,486 UART: Caliptra RT
33,925,200 UART: [state] CFI Enabled
34,043,592 UART: [rt] RT listening for mailbox commands...
34,075,803 UART: [rt]cmd =0x4d454153, len=108
34,094,063 >>> mbox cmd response data (12 bytes)
34,094,597 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,124,968 UART: [rt]cmd =0x44504543, len=92
39,804,586 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,099 writing to cptra_bootfsm_go
5,360,456 ready_for_fw is high
5,360,811 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,301,204 >>> mbox cmd response: success
19,301,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,939,261 UART:
24,939,674 UART: Running Caliptra FMC ...
24,940,711 UART:
24,940,874 UART: [state] CFI Enabled
24,948,888 UART: [fht] FMC Alias Private Key: 7
27,279,409 UART: [art] Extend RT PCRs Done
27,280,624 UART: [art] Lock RT PCRs Done
27,282,610 UART: [art] Populate DV Done
27,287,701 UART: [fht] FMC Alias Private Key: 7
27,289,181 UART: [art] Derive CDI
27,289,911 UART: [art] Store in in slot 0x4
27,332,493 UART: [art] Derive Key Pair
27,333,484 UART: [art] Store priv key in slot 0x5
30,575,713 UART: [art] Derive Key Pair - Done
30,588,927 UART: [art] Signing Cert with AUTHO
30,590,235 UART: RITY.KEYID = 7
32,869,337 UART: [art] Erasing AUTHORITY.KEYID = 7
32,870,851 UART: [art] PUB.X = 320A48D1E275EE902B9A364DE1560E013A8569EBFBCD10EAFC7AA9F9AF4F8C01881B6F8A40C9F1A932ADDBA5A4841CF3
32,878,130 UART: [art] PUB.Y = F5B00AE6B461C57660C955EFC3BF930922B374EE6DB9CBA4BDD8AAFD5F08C171FBD35A1F7A1D8443B49FE4EFAB6FD151
32,885,386 UART: [art] SIG.R = 78786366A24C3A791C05981C9BDC1A38363F0C060486BBD351D7B2858E756E154AAF911C1497EB5BA55496F98270098E
32,892,783 UART: [art] SIG.S = 08B60D988296A48BEC30EBE20C7C6CB9C57164FBF8F753791ADC716AB769BE57D36AAB008A40CBCC6330E6B2F68B5E2F
34,197,971 UART: Caliptra RT
34,198,684 UART: [state] CFI Enabled
34,316,301 UART: [rt] RT listening for mailbox commands...
34,348,576 UART: [rt]cmd =0x44504543, len=96
34,380,052 >>> mbox cmd response data (56 bytes)
34,380,928 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,411,463 UART: [rt]cmd =0x44504543, len=92
40,091,932 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 6.06s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,775,712 UART: [afmc] --
18,779,918 UART: [cold-reset] --
18,784,192 UART: [state] Locking Datavault
18,788,576 UART: [state] Locking PCR0, PCR1 and PCR31
18,790,299 UART: [state] Locking ICCM
18,791,730 UART: [exit] Launching FMC @ 0x40000130
18,800,180 UART:
18,800,418 UART: Running Caliptra FMC ...
18,801,519 UART:
18,801,681 UART: [state] CFI Enabled
18,861,537 UART: [fht] FMC Alias Private Key: 7
20,625,885 UART: [art] Extend RT PCRs Done
20,627,094 UART: [art] Lock RT PCRs Done
20,628,926 UART: [art] Populate DV Done
20,634,444 UART: [fht] FMC Alias Private Key: 7
20,636,083 UART: [art] Derive CDI
20,636,823 UART: [art] Store in in slot 0x4
20,695,185 UART: [art] Derive Key Pair
20,696,181 UART: [art] Store priv key in slot 0x5
23,158,759 UART: [art] Derive Key Pair - Done
23,172,022 UART: [art] Signing Cert with AUTHO
23,173,329 UART: RITY.KEYID = 7
24,884,473 UART: [art] Erasing AUTHORITY.KEYID = 7
24,885,974 UART: [art] PUB.X = 6C2F2636341BA4CDB572E71E3DEEC2A71CF07A07443DDF3CB91336217080068441E3B1792493156B0FC38327A2B36604
24,893,230 UART: [art] PUB.Y = 528889189B66AD678A3A1BF17C3F384B51912B4EF6A6EEE46261C53A20A0BEBCAE53BCABD3A31D0140F8CA44E6E1D0B6
24,900,521 UART: [art] SIG.R = 0C7E42A69FFBBDB9958A17184DA1438B45A801B46E56381BF48F01C494BC446A8CE3EE583C4B343009C478B162939D99
24,907,867 UART: [art] SIG.S = 612E0782B1F89F58679E67AE60CF69830E663C6BBF25E76E96E60E2A975BF6A0E4E772D334A4A1DF9B9BEFD0CA2968BA
25,886,644 UART: Caliptra RT
25,887,337 UART: [state] CFI Enabled
26,064,443 UART: [rt] RT listening for mailbox commands...
26,096,454 UART: [rt]cmd =0x44504543, len=92
30,445,143 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,134 writing to cptra_bootfsm_go
190,279 UART:
190,573 UART: Running Caliptra ROM ...
191,631 UART:
191,779 UART: [state] CFI Enabled
250,320 UART: [state] LifecycleState = Unprovisioned
252,202 UART: [state] DebugLocked = No
254,523 UART: [state] WD Timer not started. Device not locked for debugging
258,800 UART: [kat] SHA2-256
437,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
449,538 UART: [kat] ++
450,069 UART: [kat] sha1
462,499 UART: [kat] SHA2-256
465,544 UART: [kat] SHA2-384
472,534 UART: [kat] SHA2-512-ACC
475,480 UART: [kat] ECC-384
2,932,266 UART: [kat] HMAC-384Kdf
2,958,013 UART: [kat] LMS
3,487,464 UART: [kat] --
3,493,088 UART: [cold-reset] ++
3,494,744 UART: [fht] FHT @ 0x50003400
3,506,022 UART: [idev] ++
3,506,624 UART: [idev] CDI.KEYID = 6
3,507,539 UART: [idev] SUBJECT.KEYID = 7
3,508,716 UART: [idev] UDS.KEYID = 0
3,509,643 ready_for_fw is high
3,509,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,653,562 UART: [idev] Erasing UDS.KEYID = 0
6,011,516 UART: [idev] Sha1 KeyId Algorithm
6,035,944 UART: [idev] --
6,039,294 UART: [ldev] ++
6,039,863 UART: [ldev] CDI.KEYID = 6
6,040,774 UART: [ldev] SUBJECT.KEYID = 5
6,041,938 UART: [ldev] AUTHORITY.KEYID = 7
6,043,225 UART: [ldev] FE.KEYID = 1
6,086,099 UART: [ldev] Erasing FE.KEYID = 1
8,590,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,001 UART: [ldev] --
10,402,119 UART: [fwproc] Wait for Commands...
10,404,972 UART: [fwproc] Recv command 0x46574c44
10,407,087 UART: [fwproc] Recv'd Img size: 114448 bytes
13,812,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,465 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,278,067 >>> mbox cmd response: success
14,278,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,283,209 UART: [afmc] ++
14,283,789 UART: [afmc] CDI.KEYID = 6
14,284,669 UART: [afmc] SUBJECT.KEYID = 7
14,285,881 UART: [afmc] AUTHORITY.KEYID = 5
16,810,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,537,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,539,388 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,555,204 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,571,209 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,587,040 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,610,267 UART: [afmc] --
18,614,238 UART: [cold-reset] --
18,617,230 UART: [state] Locking Datavault
18,622,150 UART: [state] Locking PCR0, PCR1 and PCR31
18,623,883 UART: [state] Locking ICCM
18,625,449 UART: [exit] Launching FMC @ 0x40000130
18,633,852 UART:
18,634,096 UART: Running Caliptra FMC ...
18,635,201 UART:
18,635,359 UART: [state] CFI Enabled
18,696,009 UART: [fht] FMC Alias Private Key: 7
20,459,871 UART: [art] Extend RT PCRs Done
20,461,097 UART: [art] Lock RT PCRs Done
20,462,725 UART: [art] Populate DV Done
20,468,016 UART: [fht] FMC Alias Private Key: 7
20,469,450 UART: [art] Derive CDI
20,470,232 UART: [art] Store in in slot 0x4
20,527,193 UART: [art] Derive Key Pair
20,528,192 UART: [art] Store priv key in slot 0x5
22,991,007 UART: [art] Derive Key Pair - Done
23,004,111 UART: [art] Signing Cert with AUTHO
23,005,422 UART: RITY.KEYID = 7
24,716,788 UART: [art] Erasing AUTHORITY.KEYID = 7
24,718,289 UART: [art] PUB.X = 6C2F2636341BA4CDB572E71E3DEEC2A71CF07A07443DDF3CB91336217080068441E3B1792493156B0FC38327A2B36604
24,725,546 UART: [art] PUB.Y = 528889189B66AD678A3A1BF17C3F384B51912B4EF6A6EEE46261C53A20A0BEBCAE53BCABD3A31D0140F8CA44E6E1D0B6
24,732,837 UART: [art] SIG.R = 0C7E42A69FFBBDB9958A17184DA1438B45A801B46E56381BF48F01C494BC446A8CE3EE583C4B343009C478B162939D99
24,740,238 UART: [art] SIG.S = 612E0782B1F89F58679E67AE60CF69830E663C6BBF25E76E96E60E2A975BF6A0E4E772D334A4A1DF9B9BEFD0CA2968BA
25,718,934 UART: Caliptra RT
25,719,641 UART: [state] CFI Enabled
25,885,926 UART: [rt] RT listening for mailbox commands...
25,918,026 UART: [rt]cmd =0x4d454153, len=108
25,936,875 >>> mbox cmd response data (12 bytes)
25,937,437 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,967,703 UART: [rt]cmd =0x44504543, len=92
30,321,432 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,090 writing to cptra_bootfsm_go
190,149 UART:
190,440 UART: Running Caliptra ROM ...
191,465 UART:
191,818 UART: [state] CFI Enabled
251,565 UART: [state] LifecycleState = Unprovisioned
253,458 UART: [state] DebugLocked = No
254,759 UART: [state] WD Timer not started. Device not locked for debugging
257,685 UART: [kat] SHA2-256
436,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
448,371 UART: [kat] ++
448,898 UART: [kat] sha1
460,725 UART: [kat] SHA2-256
463,736 UART: [kat] SHA2-384
469,439 UART: [kat] SHA2-512-ACC
472,379 UART: [kat] ECC-384
2,937,921 UART: [kat] HMAC-384Kdf
2,958,745 UART: [kat] LMS
3,488,209 UART: [kat] --
3,492,786 UART: [cold-reset] ++
3,495,354 UART: [fht] FHT @ 0x50003400
3,507,464 UART: [idev] ++
3,508,033 UART: [idev] CDI.KEYID = 6
3,508,948 UART: [idev] SUBJECT.KEYID = 7
3,510,123 UART: [idev] UDS.KEYID = 0
3,511,051 ready_for_fw is high
3,511,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,655,093 UART: [idev] Erasing UDS.KEYID = 0
6,014,898 UART: [idev] Sha1 KeyId Algorithm
6,038,010 UART: [idev] --
6,040,741 UART: [ldev] ++
6,041,318 UART: [ldev] CDI.KEYID = 6
6,042,204 UART: [ldev] SUBJECT.KEYID = 5
6,043,341 UART: [ldev] AUTHORITY.KEYID = 7
6,044,680 UART: [ldev] FE.KEYID = 1
6,088,349 UART: [ldev] Erasing FE.KEYID = 1
8,591,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,197 UART: [ldev] --
10,399,380 UART: [fwproc] Wait for Commands...
10,402,333 UART: [fwproc] Recv command 0x46574c44
10,404,445 UART: [fwproc] Recv'd Img size: 114448 bytes
13,805,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,272 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,263,159 >>> mbox cmd response: success
14,263,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,267,770 UART: [afmc] ++
14,268,346 UART: [afmc] CDI.KEYID = 6
14,269,228 UART: [afmc] SUBJECT.KEYID = 7
14,270,440 UART: [afmc] AUTHORITY.KEYID = 5
16,790,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,515,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,517,284 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,533,044 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,549,057 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,564,964 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,587,096 UART: [afmc] --
18,591,341 UART: [cold-reset] --
18,594,484 UART: [state] Locking Datavault
18,598,777 UART: [state] Locking PCR0, PCR1 and PCR31
18,600,422 UART: [state] Locking ICCM
18,602,303 UART: [exit] Launching FMC @ 0x40000130
18,610,696 UART:
18,610,938 UART: Running Caliptra FMC ...
18,612,044 UART:
18,612,208 UART: [state] CFI Enabled
18,674,201 UART: [fht] FMC Alias Private Key: 7
20,438,541 UART: [art] Extend RT PCRs Done
20,439,760 UART: [art] Lock RT PCRs Done
20,441,221 UART: [art] Populate DV Done
20,446,631 UART: [fht] FMC Alias Private Key: 7
20,448,218 UART: [art] Derive CDI
20,449,049 UART: [art] Store in in slot 0x4
20,507,361 UART: [art] Derive Key Pair
20,508,362 UART: [art] Store priv key in slot 0x5
22,971,188 UART: [art] Derive Key Pair - Done
22,984,068 UART: [art] Signing Cert with AUTHO
22,985,369 UART: RITY.KEYID = 7
24,696,346 UART: [art] Erasing AUTHORITY.KEYID = 7
24,697,846 UART: [art] PUB.X = 6C2F2636341BA4CDB572E71E3DEEC2A71CF07A07443DDF3CB91336217080068441E3B1792493156B0FC38327A2B36604
24,705,106 UART: [art] PUB.Y = 528889189B66AD678A3A1BF17C3F384B51912B4EF6A6EEE46261C53A20A0BEBCAE53BCABD3A31D0140F8CA44E6E1D0B6
24,712,405 UART: [art] SIG.R = 0C7E42A69FFBBDB9958A17184DA1438B45A801B46E56381BF48F01C494BC446A8CE3EE583C4B343009C478B162939D99
24,719,800 UART: [art] SIG.S = 612E0782B1F89F58679E67AE60CF69830E663C6BBF25E76E96E60E2A975BF6A0E4E772D334A4A1DF9B9BEFD0CA2968BA
25,698,933 UART: Caliptra RT
25,699,623 UART: [state] CFI Enabled
25,864,013 UART: [rt] RT listening for mailbox commands...
25,896,177 UART: [rt]cmd =0x44504543, len=96
25,927,187 >>> mbox cmd response data (56 bytes)
25,927,957 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,958,505 UART: [rt]cmd =0x44504543, len=92
30,320,066 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,190,835 >>> mbox cmd response data (12 bytes)
10,192,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,203,451 >>> mbox cmd response: success
14,203,932 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,499,169 UART:
18,499,573 UART: Running Caliptra FMC ...
18,500,770 UART:
18,500,924 UART: [state] CFI Enabled
18,566,860 UART: [fht] FMC Alias Private Key: 7
20,331,133 UART: [art] Extend RT PCRs Done
20,332,358 UART: [art] Lock RT PCRs Done
20,333,775 UART: [art] Populate DV Done
20,339,136 UART: [fht] FMC Alias Private Key: 7
20,340,726 UART: [art] Derive CDI
20,341,561 UART: [art] Store in in slot 0x4
20,399,237 UART: [art] Derive Key Pair
20,400,280 UART: [art] Store priv key in slot 0x5
22,863,309 UART: [art] Derive Key Pair - Done
22,875,932 UART: [art] Signing Cert with AUTHO
22,877,235 UART: RITY.KEYID = 7
24,588,853 UART: [art] Erasing AUTHORITY.KEYID = 7
24,590,338 UART: [art] PUB.X = 70F77F791C58ABEDC1BDF0F814FAD81045B9349FDC9E27760079E0BCE92F430CE75E442D117D1E373BE6C40EB725F47B
24,597,643 UART: [art] PUB.Y = 66EA002F0B51CA97CD7F6744863F5FE72D55C9FE6D27A5469B9103DC1BDC37C0F423337D6506F41105FEC5B4D27FCCD7
24,604,871 UART: [art] SIG.R = 7EF181D513B698AF8E0FFBD492E114A8B6CCCFCF8706C2E316BD37B173098424EF25F9A8432AFEF9B8E8DD01B84BB515
24,612,302 UART: [art] SIG.S = 50BC0BA7D4513FE50C081459726B636BBFBF6436BC2D34DD5621ECB3AF9D2F1833CD5C1ADCA5A3E9FF2B61852E4640CE
25,591,183 UART: Caliptra RT
25,591,904 UART: [state] CFI Enabled
25,767,598 UART: [rt] RT listening for mailbox commands...
25,799,828 UART: [rt]cmd =0x44504543, len=92
30,149,909 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,126 writing to cptra_bootfsm_go
3,348,712 ready_for_fw is high
3,349,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,039,492 >>> mbox cmd response: success
14,039,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,327,114 UART:
18,327,517 UART: Running Caliptra FMC ...
18,328,564 UART:
18,328,729 UART: [state] CFI Enabled
18,397,419 UART: [fht] FMC Alias Private Key: 7
20,161,706 UART: [art] Extend RT PCRs Done
20,162,924 UART: [art] Lock RT PCRs Done
20,164,602 UART: [art] Populate DV Done
20,170,342 UART: [fht] FMC Alias Private Key: 7
20,171,931 UART: [art] Derive CDI
20,172,717 UART: [art] Store in in slot 0x4
20,230,387 UART: [art] Derive Key Pair
20,231,427 UART: [art] Store priv key in slot 0x5
22,694,754 UART: [art] Derive Key Pair - Done
22,707,588 UART: [art] Signing Cert with AUTHO
22,708,887 UART: RITY.KEYID = 7
24,420,893 UART: [art] Erasing AUTHORITY.KEYID = 7
24,422,392 UART: [art] PUB.X = 70F77F791C58ABEDC1BDF0F814FAD81045B9349FDC9E27760079E0BCE92F430CE75E442D117D1E373BE6C40EB725F47B
24,429,716 UART: [art] PUB.Y = 66EA002F0B51CA97CD7F6744863F5FE72D55C9FE6D27A5469B9103DC1BDC37C0F423337D6506F41105FEC5B4D27FCCD7
24,436,962 UART: [art] SIG.R = 7EF181D513B698AF8E0FFBD492E114A8B6CCCFCF8706C2E316BD37B173098424EF25F9A8432AFEF9B8E8DD01B84BB515
24,444,356 UART: [art] SIG.S = 50BC0BA7D4513FE50C081459726B636BBFBF6436BC2D34DD5621ECB3AF9D2F1833CD5C1ADCA5A3E9FF2B61852E4640CE
25,423,304 UART: Caliptra RT
25,424,006 UART: [state] CFI Enabled
25,589,859 UART: [rt] RT listening for mailbox commands...
25,622,032 UART: [rt]cmd =0x4d454153, len=108
25,640,314 >>> mbox cmd response data (12 bytes)
25,640,921 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,671,728 UART: [rt]cmd =0x44504543, len=92
30,025,285 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,104 writing to cptra_bootfsm_go
3,370,485 ready_for_fw is high
3,370,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,056,616 >>> mbox cmd response: success
14,057,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,355,981 UART:
18,356,320 UART: Running Caliptra FMC ...
18,357,363 UART:
18,357,512 UART: [state] CFI Enabled
18,422,617 UART: [fht] FMC Alias Private Key: 7
20,186,286 UART: [art] Extend RT PCRs Done
20,187,502 UART: [art] Lock RT PCRs Done
20,188,999 UART: [art] Populate DV Done
20,194,258 UART: [fht] FMC Alias Private Key: 7
20,195,910 UART: [art] Derive CDI
20,196,646 UART: [art] Store in in slot 0x4
20,255,509 UART: [art] Derive Key Pair
20,256,546 UART: [art] Store priv key in slot 0x5
22,719,507 UART: [art] Derive Key Pair - Done
22,732,395 UART: [art] Signing Cert with AUTHO
22,733,702 UART: RITY.KEYID = 7
24,445,828 UART: [art] Erasing AUTHORITY.KEYID = 7
24,447,337 UART: [art] PUB.X = 70F77F791C58ABEDC1BDF0F814FAD81045B9349FDC9E27760079E0BCE92F430CE75E442D117D1E373BE6C40EB725F47B
24,454,618 UART: [art] PUB.Y = 66EA002F0B51CA97CD7F6744863F5FE72D55C9FE6D27A5469B9103DC1BDC37C0F423337D6506F41105FEC5B4D27FCCD7
24,461,856 UART: [art] SIG.R = 7EF181D513B698AF8E0FFBD492E114A8B6CCCFCF8706C2E316BD37B173098424EF25F9A8432AFEF9B8E8DD01B84BB515
24,469,248 UART: [art] SIG.S = 50BC0BA7D4513FE50C081459726B636BBFBF6436BC2D34DD5621ECB3AF9D2F1833CD5C1ADCA5A3E9FF2B61852E4640CE
25,448,350 UART: Caliptra RT
25,449,065 UART: [state] CFI Enabled
25,614,369 UART: [rt] RT listening for mailbox commands...
25,646,068 UART: [rt]cmd =0x44504543, len=96
25,678,171 >>> mbox cmd response data (56 bytes)
25,679,058 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,709,815 UART: [rt]cmd =0x44504543, len=92
30,071,408 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.63s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,939,359 UART: [afmc] --
18,943,816 UART: [cold-reset] --
18,946,210 UART: [state] Locking Datavault
18,950,911 UART: [state] Locking PCR0, PCR1 and PCR31
18,952,602 UART: [state] Locking ICCM
18,954,610 UART: [exit] Launching FMC @ 0x40000130
18,963,010 UART:
18,963,285 UART: Running Caliptra FMC ...
18,964,393 UART:
18,964,565 UART: [state] CFI Enabled
18,972,665 UART: [fht] FMC Alias Private Key: 7
20,729,481 UART: [art] Extend RT PCRs Done
20,730,689 UART: [art] Lock RT PCRs Done
20,732,308 UART: [art] Populate DV Done
20,737,660 UART: [fht] FMC Alias Private Key: 7
20,739,309 UART: [art] Derive CDI
20,740,115 UART: [art] Store in in slot 0x4
20,782,426 UART: [art] Derive Key Pair
20,783,420 UART: [art] Store priv key in slot 0x5
23,210,659 UART: [art] Derive Key Pair - Done
23,223,827 UART: [art] Signing Cert with AUTHO
23,225,130 UART: RITY.KEYID = 7
24,930,224 UART: [art] Erasing AUTHORITY.KEYID = 7
24,931,727 UART: [art] PUB.X = AD28FFE40B5FD021B2271BC7CF892A80EC972E50FBD08C0EED97FB9B90AE76BB7E9A9C0A90E09225E4CE146881611E8E
24,939,026 UART: [art] PUB.Y = D071D85B79864615636AFE673284AB5C3514949337399747AD5FE1A2EC561CDE61642198425A5F2F1FA513704DE0CA8A
24,946,270 UART: [art] SIG.R = D2007B3F18510AB249FDAF46B55C081462AF6E31E97F7C1D2D232A9A3CE830C047AF1828606CDEA701CF9D45C4A9CB22
24,953,655 UART: [art] SIG.S = B093840CA8F295F2A6A9119404CEF65839731BC433D156CC741F5F20DA333B0D3748D70368ADB9A025377365BD743870
25,932,946 UART: Caliptra RT
25,933,643 UART: [state] CFI Enabled
26,062,791 UART: [rt] RT listening for mailbox commands...
26,094,673 UART: [rt]cmd =0x44504543, len=92
30,385,662 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,124 writing to cptra_bootfsm_go
190,261 UART:
190,552 UART: Running Caliptra ROM ...
191,656 UART:
10,114,513 UART: [state] CFI Enabled
10,128,106 UART: [state] LifecycleState = Unprovisioned
10,129,960 UART: [state] DebugLocked = No
10,132,847 UART: [state] WD Timer not started. Device not locked for debugging
10,137,219 UART: [kat] SHA2-256
10,316,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,327,944 UART: [kat] ++
10,328,485 UART: [kat] sha1
10,339,441 UART: [kat] SHA2-256
10,342,453 UART: [kat] SHA2-384
10,348,513 UART: [kat] SHA2-512-ACC
10,351,449 UART: [kat] ECC-384
12,795,796 UART: [kat] HMAC-384Kdf
12,807,592 UART: [kat] LMS
13,337,085 UART: [kat] --
13,340,600 UART: [cold-reset] ++
13,342,239 UART: [fht] FHT @ 0x50003400
13,353,592 UART: [idev] ++
13,354,197 UART: [idev] CDI.KEYID = 6
13,355,076 UART: [idev] SUBJECT.KEYID = 7
13,356,214 UART: [idev] UDS.KEYID = 0
13,357,263 ready_for_fw is high
13,357,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,500,967 UART: [idev] Erasing UDS.KEYID = 0
15,826,366 UART: [idev] Sha1 KeyId Algorithm
15,850,240 UART: [idev] --
15,854,393 UART: [ldev] ++
15,854,955 UART: [ldev] CDI.KEYID = 6
15,855,886 UART: [ldev] SUBJECT.KEYID = 5
15,857,089 UART: [ldev] AUTHORITY.KEYID = 7
15,858,315 UART: [ldev] FE.KEYID = 1
15,868,117 UART: [ldev] Erasing FE.KEYID = 1
18,343,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,061,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,077,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,093,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,109,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,129,795 UART: [ldev] --
20,134,403 UART: [fwproc] Wait for Commands...
20,136,595 UART: [fwproc] Recv command 0x46574c44
20,138,628 UART: [fwproc] Recv'd Img size: 114448 bytes
23,544,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,616,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,684,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
24,003,247 >>> mbox cmd response: success
24,003,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,006,898 UART: [afmc] ++
24,007,470 UART: [afmc] CDI.KEYID = 6
24,008,349 UART: [afmc] SUBJECT.KEYID = 7
24,009,614 UART: [afmc] AUTHORITY.KEYID = 5
26,503,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,225,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,226,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,242,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,258,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,274,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,295,837 UART: [afmc] --
28,298,824 UART: [cold-reset] --
28,303,588 UART: [state] Locking Datavault
28,308,468 UART: [state] Locking PCR0, PCR1 and PCR31
28,310,206 UART: [state] Locking ICCM
28,311,601 UART: [exit] Launching FMC @ 0x40000130
28,320,049 UART:
28,320,281 UART: Running Caliptra FMC ...
28,321,377 UART:
28,321,528 UART: [state] CFI Enabled
28,329,948 UART: [fht] FMC Alias Private Key: 7
30,087,048 UART: [art] Extend RT PCRs Done
30,088,288 UART: [art] Lock RT PCRs Done
30,090,313 UART: [art] Populate DV Done
30,095,720 UART: [fht] FMC Alias Private Key: 7
30,097,306 UART: [art] Derive CDI
30,098,042 UART: [art] Store in in slot 0x4
30,140,838 UART: [art] Derive Key Pair
30,141,829 UART: [art] Store priv key in slot 0x5
32,568,841 UART: [art] Derive Key Pair - Done
32,581,943 UART: [art] Signing Cert with AUTHO
32,583,252 UART: RITY.KEYID = 7
34,288,132 UART: [art] Erasing AUTHORITY.KEYID = 7
34,289,642 UART: [art] PUB.X = AD28FFE40B5FD021B2271BC7CF892A80EC972E50FBD08C0EED97FB9B90AE76BB7E9A9C0A90E09225E4CE146881611E8E
34,296,928 UART: [art] PUB.Y = D071D85B79864615636AFE673284AB5C3514949337399747AD5FE1A2EC561CDE61642198425A5F2F1FA513704DE0CA8A
34,304,209 UART: [art] SIG.R = D2007B3F18510AB249FDAF46B55C081462AF6E31E97F7C1D2D232A9A3CE830C047AF1828606CDEA701CF9D45C4A9CB22
34,311,583 UART: [art] SIG.S = B093840CA8F295F2A6A9119404CEF65839731BC433D156CC741F5F20DA333B0D3748D70368ADB9A025377365BD743870
35,290,295 UART: Caliptra RT
35,291,001 UART: [state] CFI Enabled
35,408,169 UART: [rt] RT listening for mailbox commands...
35,440,269 UART: [rt]cmd =0x4d454153, len=108
35,459,491 >>> mbox cmd response data (12 bytes)
35,460,014 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,490,495 UART: [rt]cmd =0x44504543, len=92
39,781,233 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,049 writing to cptra_bootfsm_go
190,112 UART:
190,420 UART: Running Caliptra ROM ...
191,445 UART:
10,421,953 UART: [state] CFI Enabled
10,439,062 UART: [state] LifecycleState = Unprovisioned
10,440,925 UART: [state] DebugLocked = No
10,442,946 UART: [state] WD Timer not started. Device not locked for debugging
10,446,457 UART: [kat] SHA2-256
10,625,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,637,149 UART: [kat] ++
10,637,599 UART: [kat] sha1
10,648,404 UART: [kat] SHA2-256
10,651,488 UART: [kat] SHA2-384
10,658,432 UART: [kat] SHA2-512-ACC
10,661,354 UART: [kat] ECC-384
13,102,920 UART: [kat] HMAC-384Kdf
13,115,997 UART: [kat] LMS
13,645,480 UART: [kat] --
13,651,527 UART: [cold-reset] ++
13,653,803 UART: [fht] FHT @ 0x50003400
13,664,702 UART: [idev] ++
13,665,263 UART: [idev] CDI.KEYID = 6
13,666,208 UART: [idev] SUBJECT.KEYID = 7
13,667,391 UART: [idev] UDS.KEYID = 0
13,668,306 ready_for_fw is high
13,668,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,812,141 UART: [idev] Erasing UDS.KEYID = 0
16,143,576 UART: [idev] Sha1 KeyId Algorithm
16,166,121 UART: [idev] --
16,168,651 UART: [ldev] ++
16,169,213 UART: [ldev] CDI.KEYID = 6
16,170,144 UART: [ldev] SUBJECT.KEYID = 5
16,171,266 UART: [ldev] AUTHORITY.KEYID = 7
16,172,590 UART: [ldev] FE.KEYID = 1
16,182,484 UART: [ldev] Erasing FE.KEYID = 1
18,655,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,375,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,391,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,407,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,423,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,444,166 UART: [ldev] --
20,449,050 UART: [fwproc] Wait for Commands...
20,450,710 UART: [fwproc] Recv command 0x46574c44
20,452,751 UART: [fwproc] Recv'd Img size: 114448 bytes
23,860,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,936,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
24,005,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
24,324,403 >>> mbox cmd response: success
24,324,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,328,045 UART: [afmc] ++
24,328,623 UART: [afmc] CDI.KEYID = 6
24,329,494 UART: [afmc] SUBJECT.KEYID = 7
24,330,701 UART: [afmc] AUTHORITY.KEYID = 5
26,828,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,548,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,550,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,566,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,582,360 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,598,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,621,150 UART: [afmc] --
28,624,406 UART: [cold-reset] --
28,627,450 UART: [state] Locking Datavault
28,632,415 UART: [state] Locking PCR0, PCR1 and PCR31
28,634,116 UART: [state] Locking ICCM
28,635,448 UART: [exit] Launching FMC @ 0x40000130
28,643,893 UART:
28,644,119 UART: Running Caliptra FMC ...
28,645,211 UART:
28,645,360 UART: [state] CFI Enabled
28,653,722 UART: [fht] FMC Alias Private Key: 7
30,411,231 UART: [art] Extend RT PCRs Done
30,412,469 UART: [art] Lock RT PCRs Done
30,414,061 UART: [art] Populate DV Done
30,419,428 UART: [fht] FMC Alias Private Key: 7
30,421,052 UART: [art] Derive CDI
30,421,801 UART: [art] Store in in slot 0x4
30,464,656 UART: [art] Derive Key Pair
30,465,662 UART: [art] Store priv key in slot 0x5
32,892,579 UART: [art] Derive Key Pair - Done
32,905,742 UART: [art] Signing Cert with AUTHO
32,907,073 UART: RITY.KEYID = 7
34,612,335 UART: [art] Erasing AUTHORITY.KEYID = 7
34,613,885 UART: [art] PUB.X = AD28FFE40B5FD021B2271BC7CF892A80EC972E50FBD08C0EED97FB9B90AE76BB7E9A9C0A90E09225E4CE146881611E8E
34,621,130 UART: [art] PUB.Y = D071D85B79864615636AFE673284AB5C3514949337399747AD5FE1A2EC561CDE61642198425A5F2F1FA513704DE0CA8A
34,628,348 UART: [art] SIG.R = D2007B3F18510AB249FDAF46B55C081462AF6E31E97F7C1D2D232A9A3CE830C047AF1828606CDEA701CF9D45C4A9CB22
34,635,731 UART: [art] SIG.S = B093840CA8F295F2A6A9119404CEF65839731BC433D156CC741F5F20DA333B0D3748D70368ADB9A025377365BD743870
35,614,376 UART: Caliptra RT
35,615,096 UART: [state] CFI Enabled
35,732,368 UART: [rt] RT listening for mailbox commands...
35,764,651 UART: [rt]cmd =0x44504543, len=96
35,796,284 >>> mbox cmd response data (56 bytes)
35,797,210 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,827,641 UART: [rt]cmd =0x44504543, len=92
40,118,672 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
4,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,409,709 >>> mbox cmd response data (12 bytes)
10,410,838 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,417,970 >>> mbox cmd response: success
14,418,438 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,668,031 UART:
18,668,441 UART: Running Caliptra FMC ...
18,669,680 UART:
18,669,841 UART: [state] CFI Enabled
18,677,214 UART: [fht] FMC Alias Private Key: 7
20,434,520 UART: [art] Extend RT PCRs Done
20,435,746 UART: [art] Lock RT PCRs Done
20,437,097 UART: [art] Populate DV Done
20,442,415 UART: [fht] FMC Alias Private Key: 7
20,444,055 UART: [art] Derive CDI
20,444,870 UART: [art] Store in in slot 0x4
20,487,635 UART: [art] Derive Key Pair
20,488,672 UART: [art] Store priv key in slot 0x5
22,915,547 UART: [art] Derive Key Pair - Done
22,928,550 UART: [art] Signing Cert with AUTHO
22,929,852 UART: RITY.KEYID = 7
24,635,005 UART: [art] Erasing AUTHORITY.KEYID = 7
24,636,529 UART: [art] PUB.X = 1D4039186FEC6686713023B2460EEA4C676A573830FE9F4859755D67A5EB8C301468C853F4F35C8542A18F5124A856EE
24,643,769 UART: [art] PUB.Y = 9B4768AB50BF54B00424F094B7E119FDC87AB32B690946E5941F34A6B46C16B90410E57486AF1989849EA35B135CF70F
24,650,997 UART: [art] SIG.R = 8A9BF29AD87A2292D81AE82247316E3B307E78667C44870390ED3B1CF9D7C06978D67ECC0BD5A01E3F9318C829F18F48
24,658,386 UART: [art] SIG.S = 1EEB15C74B1970410599463C2B0D38AE71884A15398605EAE288871FC2A4DD306EA239676DAB8FFD5CA0055E15543948
25,636,675 UART: Caliptra RT
25,637,377 UART: [state] CFI Enabled
25,766,009 UART: [rt] RT listening for mailbox commands...
25,797,858 UART: [rt]cmd =0x44504543, len=92
30,088,524 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,105 writing to cptra_bootfsm_go
13,500,293 ready_for_fw is high
13,500,664 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,087,448 >>> mbox cmd response: success
24,087,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,337,224 UART:
28,337,578 UART: Running Caliptra FMC ...
28,338,617 UART:
28,338,761 UART: [state] CFI Enabled
28,346,554 UART: [fht] FMC Alias Private Key: 7
30,104,095 UART: [art] Extend RT PCRs Done
30,105,337 UART: [art] Lock RT PCRs Done
30,107,145 UART: [art] Populate DV Done
30,112,338 UART: [fht] FMC Alias Private Key: 7
30,113,980 UART: [art] Derive CDI
30,115,005 UART: [art] Store in in slot 0x4
30,157,513 UART: [art] Derive Key Pair
30,158,510 UART: [art] Store priv key in slot 0x5
32,585,407 UART: [art] Derive Key Pair - Done
32,598,825 UART: [art] Signing Cert with AUTHO
32,600,153 UART: RITY.KEYID = 7
34,305,358 UART: [art] Erasing AUTHORITY.KEYID = 7
34,306,877 UART: [art] PUB.X = 1D4039186FEC6686713023B2460EEA4C676A573830FE9F4859755D67A5EB8C301468C853F4F35C8542A18F5124A856EE
34,314,133 UART: [art] PUB.Y = 9B4768AB50BF54B00424F094B7E119FDC87AB32B690946E5941F34A6B46C16B90410E57486AF1989849EA35B135CF70F
34,321,363 UART: [art] SIG.R = 8A9BF29AD87A2292D81AE82247316E3B307E78667C44870390ED3B1CF9D7C06978D67ECC0BD5A01E3F9318C829F18F48
34,328,743 UART: [art] SIG.S = 1EEB15C74B1970410599463C2B0D38AE71884A15398605EAE288871FC2A4DD306EA239676DAB8FFD5CA0055E15543948
35,307,115 UART: Caliptra RT
35,307,806 UART: [state] CFI Enabled
35,424,717 UART: [rt] RT listening for mailbox commands...
35,456,939 UART: [rt]cmd =0x4d454153, len=108
35,475,867 >>> mbox cmd response data (12 bytes)
35,476,401 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,506,721 UART: [rt]cmd =0x44504543, len=92
39,797,354 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,039 writing to cptra_bootfsm_go
13,793,423 ready_for_fw is high
13,793,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,364,504 >>> mbox cmd response: success
24,364,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,608,524 UART:
28,608,863 UART: Running Caliptra FMC ...
28,610,122 UART:
28,610,280 UART: [state] CFI Enabled
28,618,105 UART: [fht] FMC Alias Private Key: 7
30,375,318 UART: [art] Extend RT PCRs Done
30,376,737 UART: [art] Lock RT PCRs Done
30,378,136 UART: [art] Populate DV Done
30,383,280 UART: [fht] FMC Alias Private Key: 7
30,384,791 UART: [art] Derive CDI
30,385,544 UART: [art] Store in in slot 0x4
30,428,121 UART: [art] Derive Key Pair
30,429,108 UART: [art] Store priv key in slot 0x5
32,855,805 UART: [art] Derive Key Pair - Done
32,868,658 UART: [art] Signing Cert with AUTHO
32,869,971 UART: RITY.KEYID = 7
34,574,943 UART: [art] Erasing AUTHORITY.KEYID = 7
34,576,453 UART: [art] PUB.X = 1D4039186FEC6686713023B2460EEA4C676A573830FE9F4859755D67A5EB8C301468C853F4F35C8542A18F5124A856EE
34,583,700 UART: [art] PUB.Y = 9B4768AB50BF54B00424F094B7E119FDC87AB32B690946E5941F34A6B46C16B90410E57486AF1989849EA35B135CF70F
34,590,926 UART: [art] SIG.R = 8A9BF29AD87A2292D81AE82247316E3B307E78667C44870390ED3B1CF9D7C06978D67ECC0BD5A01E3F9318C829F18F48
34,598,312 UART: [art] SIG.S = 1EEB15C74B1970410599463C2B0D38AE71884A15398605EAE288871FC2A4DD306EA239676DAB8FFD5CA0055E15543948
35,577,192 UART: Caliptra RT
35,577,899 UART: [state] CFI Enabled
35,694,470 UART: [rt] RT listening for mailbox commands...
35,726,156 UART: [rt]cmd =0x44504543, len=96
35,757,562 >>> mbox cmd response data (56 bytes)
35,758,472 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,789,219 UART: [rt]cmd =0x44504543, len=92
40,080,343 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,252,113 >>> mbox cmd response data (12 bytes)
10,253,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,894,333 >>> mbox cmd response: success
14,894,840 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,176,059 UART:
19,176,443 UART: Running Caliptra FMC ...
19,177,680 UART:
19,177,847 UART: [state] CFI Enabled
19,244,695 UART: [fht] FMC Alias Private Key: 7
21,008,926 UART: [art] Extend RT PCRs Done
21,010,148 UART: [art] Lock RT PCRs Done
21,011,821 UART: [art] Populate DV Done
21,017,191 UART: [fht] FMC Alias Private Key: 7
21,018,745 UART: [art] Derive CDI
21,019,567 UART: [art] Store in in slot 0x4
21,078,107 UART: [art] Derive Key Pair
21,079,150 UART: [art] Store priv key in slot 0x5
23,542,670 UART: [art] Derive Key Pair - Done
23,555,669 UART: [art] Signing Cert with AUTHO
23,556,969 UART: RITY.KEYID = 7
25,268,584 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,078 UART: [art] PUB.X = 4E5EAA7727BEA603073DE1D4B0AE703947BB592C11E97D5149DB75DFCBE512306CACC2965CA85C7D5B7BE81C46837073
25,277,376 UART: [art] PUB.Y = A8F5C3078D0F791231C2EC1EFE5866847AEDD15FC12A08AEFBFADB6DA6EA973F0AA991484697A3ED5A3769EAD13D87D8
25,284,810 UART: [art] SIG.R = BC8588A02B7AF0FACA5FF699A5848F5572C855B52670A15B68FEB4E57CFF74012AD3FF1E25540A1BB660FB78121346A4
25,292,046 UART: [art] SIG.S = F725B7772568493B8802F45B49C73CDE6A7DC2A26C2AF614266CF5DF5B6E6D655D40CA0FAE2ECED530E243010E12B24F
26,271,370 UART: Caliptra RT
26,272,051 UART: [state] CFI Enabled
26,448,393 UART: [rt] RT listening for mailbox commands...
26,480,348 UART: [rt]cmd =0x44504543, len=92
30,830,420 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,113 writing to cptra_bootfsm_go
3,426,125 ready_for_fw is high
3,426,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,716,664 >>> mbox cmd response: success
14,717,067 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
19,015,719 UART:
19,016,070 UART: Running Caliptra FMC ...
19,017,145 UART:
19,017,305 UART: [state] CFI Enabled
19,080,892 UART: [fht] FMC Alias Private Key: 7
20,844,982 UART: [art] Extend RT PCRs Done
20,846,198 UART: [art] Lock RT PCRs Done
20,847,628 UART: [art] Populate DV Done
20,853,202 UART: [fht] FMC Alias Private Key: 7
20,854,737 UART: [art] Derive CDI
20,855,553 UART: [art] Store in in slot 0x4
20,914,043 UART: [art] Derive Key Pair
20,915,085 UART: [art] Store priv key in slot 0x5
23,378,462 UART: [art] Derive Key Pair - Done
23,391,142 UART: [art] Signing Cert with AUTHO
23,392,476 UART: RITY.KEYID = 7
25,104,086 UART: [art] Erasing AUTHORITY.KEYID = 7
25,105,585 UART: [art] PUB.X = 4E5EAA7727BEA603073DE1D4B0AE703947BB592C11E97D5149DB75DFCBE512306CACC2965CA85C7D5B7BE81C46837073
25,112,878 UART: [art] PUB.Y = A8F5C3078D0F791231C2EC1EFE5866847AEDD15FC12A08AEFBFADB6DA6EA973F0AA991484697A3ED5A3769EAD13D87D8
25,120,158 UART: [art] SIG.R = BC8588A02B7AF0FACA5FF699A5848F5572C855B52670A15B68FEB4E57CFF74012AD3FF1E25540A1BB660FB78121346A4
25,127,539 UART: [art] SIG.S = F725B7772568493B8802F45B49C73CDE6A7DC2A26C2AF614266CF5DF5B6E6D655D40CA0FAE2ECED530E243010E12B24F
26,106,653 UART: Caliptra RT
26,107,375 UART: [state] CFI Enabled
26,271,845 UART: [rt] RT listening for mailbox commands...
26,304,021 UART: [rt]cmd =0x4d454153, len=108
26,322,689 >>> mbox cmd response data (12 bytes)
26,323,250 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,353,844 UART: [rt]cmd =0x44504543, len=92
30,707,683 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,071 writing to cptra_bootfsm_go
3,426,446 ready_for_fw is high
3,426,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,707,420 >>> mbox cmd response: success
14,708,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,005,366 UART:
19,005,737 UART: Running Caliptra FMC ...
19,006,979 UART:
19,007,149 UART: [state] CFI Enabled
19,071,073 UART: [fht] FMC Alias Private Key: 7
20,834,960 UART: [art] Extend RT PCRs Done
20,836,175 UART: [art] Lock RT PCRs Done
20,837,953 UART: [art] Populate DV Done
20,843,364 UART: [fht] FMC Alias Private Key: 7
20,844,960 UART: [art] Derive CDI
20,845,777 UART: [art] Store in in slot 0x4
20,903,663 UART: [art] Derive Key Pair
20,904,698 UART: [art] Store priv key in slot 0x5
23,367,734 UART: [art] Derive Key Pair - Done
23,380,504 UART: [art] Signing Cert with AUTHO
23,381,802 UART: RITY.KEYID = 7
25,093,496 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,988 UART: [art] PUB.X = 4E5EAA7727BEA603073DE1D4B0AE703947BB592C11E97D5149DB75DFCBE512306CACC2965CA85C7D5B7BE81C46837073
25,102,288 UART: [art] PUB.Y = A8F5C3078D0F791231C2EC1EFE5866847AEDD15FC12A08AEFBFADB6DA6EA973F0AA991484697A3ED5A3769EAD13D87D8
25,109,568 UART: [art] SIG.R = BC8588A02B7AF0FACA5FF699A5848F5572C855B52670A15B68FEB4E57CFF74012AD3FF1E25540A1BB660FB78121346A4
25,116,970 UART: [art] SIG.S = F725B7772568493B8802F45B49C73CDE6A7DC2A26C2AF614266CF5DF5B6E6D655D40CA0FAE2ECED530E243010E12B24F
26,096,095 UART: Caliptra RT
26,096,803 UART: [state] CFI Enabled
26,260,837 UART: [rt] RT listening for mailbox commands...
26,292,689 UART: [rt]cmd =0x44504543, len=96
26,323,731 >>> mbox cmd response data (56 bytes)
26,324,588 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,354,871 UART: [rt]cmd =0x44504543, len=92
30,698,326 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
4,332 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,476,238 >>> mbox cmd response data (12 bytes)
10,477,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,111,116 >>> mbox cmd response: success
15,111,627 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,361,004 UART:
19,361,402 UART: Running Caliptra FMC ...
19,362,560 UART:
19,362,710 UART: [state] CFI Enabled
19,370,415 UART: [fht] FMC Alias Private Key: 7
21,127,154 UART: [art] Extend RT PCRs Done
21,128,373 UART: [art] Lock RT PCRs Done
21,129,946 UART: [art] Populate DV Done
21,135,356 UART: [fht] FMC Alias Private Key: 7
21,136,947 UART: [art] Derive CDI
21,137,755 UART: [art] Store in in slot 0x4
21,180,303 UART: [art] Derive Key Pair
21,181,332 UART: [art] Store priv key in slot 0x5
23,607,533 UART: [art] Derive Key Pair - Done
23,620,901 UART: [art] Signing Cert with AUTHO
23,622,211 UART: RITY.KEYID = 7
25,327,566 UART: [art] Erasing AUTHORITY.KEYID = 7
25,329,076 UART: [art] PUB.X = C89F5C1A77E8F4D7181C96D9DEC9DCC4DFB2A3EFB7B896E2DE318E3FF52043F66DCEF982D2662C43E74DE20A69FBE7FC
25,336,348 UART: [art] PUB.Y = F33B0C6FD2B470E0DA67CB98EC60984FAA877815DE4CA0BAC2D41599F0B56E538AAD015D5C063CA177DE63309C27E3FE
25,343,655 UART: [art] SIG.R = F7B0B23EBB756EEACC0DD61AEF6B2368BFCCEA4C580BE4E8E614F46F83E9911702B78814405CBF9ABFDEDE6BD76C5CA1
25,351,046 UART: [art] SIG.S = D66A4641A58AD05B38D7B93C0681365AB5629D38CC428609E93A99657C0BAA424206D8FDC4C0603EB34285F425FC4FAB
26,329,630 UART: Caliptra RT
26,330,318 UART: [state] CFI Enabled
26,459,265 UART: [rt] RT listening for mailbox commands...
26,490,999 UART: [rt]cmd =0x44504543, len=92
30,781,811 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,108 writing to cptra_bootfsm_go
12,869,707 ready_for_fw is high
12,870,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,073,381 >>> mbox cmd response: success
24,073,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,330,892 UART:
28,331,223 UART: Running Caliptra FMC ...
28,332,264 UART:
28,332,410 UART: [state] CFI Enabled
28,340,442 UART: [fht] FMC Alias Private Key: 7
30,097,469 UART: [art] Extend RT PCRs Done
30,098,697 UART: [art] Lock RT PCRs Done
30,100,181 UART: [art] Populate DV Done
30,105,640 UART: [fht] FMC Alias Private Key: 7
30,107,221 UART: [art] Derive CDI
30,107,947 UART: [art] Store in in slot 0x4
30,151,129 UART: [art] Derive Key Pair
30,152,164 UART: [art] Store priv key in slot 0x5
32,579,175 UART: [art] Derive Key Pair - Done
32,592,163 UART: [art] Signing Cert with AUTHO
32,593,525 UART: RITY.KEYID = 7
34,298,814 UART: [art] Erasing AUTHORITY.KEYID = 7
34,300,319 UART: [art] PUB.X = C89F5C1A77E8F4D7181C96D9DEC9DCC4DFB2A3EFB7B896E2DE318E3FF52043F66DCEF982D2662C43E74DE20A69FBE7FC
34,307,561 UART: [art] PUB.Y = F33B0C6FD2B470E0DA67CB98EC60984FAA877815DE4CA0BAC2D41599F0B56E538AAD015D5C063CA177DE63309C27E3FE
34,314,904 UART: [art] SIG.R = F7B0B23EBB756EEACC0DD61AEF6B2368BFCCEA4C580BE4E8E614F46F83E9911702B78814405CBF9ABFDEDE6BD76C5CA1
34,322,288 UART: [art] SIG.S = D66A4641A58AD05B38D7B93C0681365AB5629D38CC428609E93A99657C0BAA424206D8FDC4C0603EB34285F425FC4FAB
35,300,732 UART: Caliptra RT
35,301,420 UART: [state] CFI Enabled
35,419,025 UART: [rt] RT listening for mailbox commands...
35,450,945 UART: [rt]cmd =0x4d454153, len=108
35,470,034 >>> mbox cmd response data (12 bytes)
35,470,549 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,501,091 UART: [rt]cmd =0x44504543, len=92
39,792,262 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,049 writing to cptra_bootfsm_go
13,171,399 ready_for_fw is high
13,171,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,371,269 >>> mbox cmd response: success
24,371,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,623,450 UART:
28,623,772 UART: Running Caliptra FMC ...
28,624,838 UART:
28,624,984 UART: [state] CFI Enabled
28,633,073 UART: [fht] FMC Alias Private Key: 7
30,390,220 UART: [art] Extend RT PCRs Done
30,391,440 UART: [art] Lock RT PCRs Done
30,393,183 UART: [art] Populate DV Done
30,398,592 UART: [fht] FMC Alias Private Key: 7
30,400,175 UART: [art] Derive CDI
30,400,980 UART: [art] Store in in slot 0x4
30,443,728 UART: [art] Derive Key Pair
30,444,737 UART: [art] Store priv key in slot 0x5
32,871,611 UART: [art] Derive Key Pair - Done
32,884,495 UART: [art] Signing Cert with AUTHO
32,885,789 UART: RITY.KEYID = 7
34,591,456 UART: [art] Erasing AUTHORITY.KEYID = 7
34,592,960 UART: [art] PUB.X = C89F5C1A77E8F4D7181C96D9DEC9DCC4DFB2A3EFB7B896E2DE318E3FF52043F66DCEF982D2662C43E74DE20A69FBE7FC
34,600,253 UART: [art] PUB.Y = F33B0C6FD2B470E0DA67CB98EC60984FAA877815DE4CA0BAC2D41599F0B56E538AAD015D5C063CA177DE63309C27E3FE
34,607,535 UART: [art] SIG.R = F7B0B23EBB756EEACC0DD61AEF6B2368BFCCEA4C580BE4E8E614F46F83E9911702B78814405CBF9ABFDEDE6BD76C5CA1
34,614,981 UART: [art] SIG.S = D66A4641A58AD05B38D7B93C0681365AB5629D38CC428609E93A99657C0BAA424206D8FDC4C0603EB34285F425FC4FAB
35,594,053 UART: Caliptra RT
35,594,755 UART: [state] CFI Enabled
35,712,138 UART: [rt] RT listening for mailbox commands...
35,743,959 UART: [rt]cmd =0x44504543, len=96
35,775,193 >>> mbox cmd response data (56 bytes)
35,776,002 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,806,376 UART: [rt]cmd =0x44504543, len=92
40,098,030 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.65s
Truncated 5006 bytes from beginning
010DB7765E8A784CEAB146F7EB37EE7CF826F
3,439,676 UART: [art] PUB.Y = DA3427E07B34CD5524F8AA3D1CAAFB1643978EE3EA5D825375B13768BBAABC0B089B581FDE9849F7CE24B776FA94A21E
3,446,638 UART: [art] SIG.R = 2FBA4F8B99181DCFCDEAC8773BFB37CDE76FCD83C9E498E05189EF6590A0347C746681BF43B531C10A1A6ABCCF38C0E2
3,453,427 UART: [art] SIG.S = 71663A6F9EA7220EAF56F73112FDC65C1B90E4A6FB36E93B3DF18B91CB424ABCD9B4552194B10DDC9085CAD8BB595095
3,477,144 UART: Caliptra RT
3,477,397 UART: [state] CFI Enabled
3,598,435 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,267 UART: [rt]cmd =0x44504543, len=92
3,819,963 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,909 UART: [kat] SHA2-256
881,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,955 UART: [kat] ++
886,107 UART: [kat] sha1
890,383 UART: [kat] SHA2-256
892,321 UART: [kat] SHA2-384
895,152 UART: [kat] SHA2-512-ACC
897,053 UART: [kat] ECC-384
902,884 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,525 UART: [cold-reset] ++
1,476,877 UART: [fht] Storing FHT @ 0x50003400
1,479,678 UART: [idev] ++
1,479,846 UART: [idev] CDI.KEYID = 6
1,480,206 UART: [idev] SUBJECT.KEYID = 7
1,480,630 UART: [idev] UDS.KEYID = 0
1,480,975 ready_for_fw is high
1,480,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,792 UART: [idev] Erasing UDS.KEYID = 0
1,505,056 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,610 UART: [idev] --
1,514,501 UART: [ldev] ++
1,514,669 UART: [ldev] CDI.KEYID = 6
1,515,032 UART: [ldev] SUBJECT.KEYID = 5
1,515,458 UART: [ldev] AUTHORITY.KEYID = 7
1,515,921 UART: [ldev] FE.KEYID = 1
1,521,271 UART: [ldev] Erasing FE.KEYID = 1
1,546,734 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,506 UART: [ldev] --
1,585,943 UART: [fwproc] Waiting for Commands...
1,586,674 UART: [fwproc] Received command 0x46574c44
1,587,465 UART: [fwproc] Received Image of size 114448 bytes
2,886,218 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,480 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,832 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,819 >>> mbox cmd response: success
3,079,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,081,025 UART: [afmc] ++
3,081,193 UART: [afmc] CDI.KEYID = 6
3,081,555 UART: [afmc] SUBJECT.KEYID = 7
3,081,980 UART: [afmc] AUTHORITY.KEYID = 5
3,117,105 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,299 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,807 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,692 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,382 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,117 UART: [afmc] --
3,160,149 UART: [cold-reset] --
3,160,929 UART: [state] Locking Datavault
3,162,010 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,614 UART: [state] Locking ICCM
3,163,110 UART: [exit] Launching FMC @ 0x40000130
3,168,439 UART:
3,168,455 UART: Running Caliptra FMC ...
3,168,863 UART:
3,168,917 UART: [state] CFI Enabled
3,179,546 UART: [fht] FMC Alias Private Key: 7
3,287,783 UART: [art] Extend RT PCRs Done
3,288,211 UART: [art] Lock RT PCRs Done
3,289,677 UART: [art] Populate DV Done
3,298,012 UART: [fht] FMC Alias Private Key: 7
3,299,038 UART: [art] Derive CDI
3,299,318 UART: [art] Store in in slot 0x4
3,384,439 UART: [art] Derive Key Pair
3,384,799 UART: [art] Store priv key in slot 0x5
3,397,517 UART: [art] Derive Key Pair - Done
3,412,232 UART: [art] Signing Cert with AUTHO
3,412,712 UART: RITY.KEYID = 7
3,428,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,031 UART: [art] PUB.X = 19893AF87AAD8E370A5F15CE9A43C58CE05D1461018C119FA3A1D73C130010DB7765E8A784CEAB146F7EB37EE7CF826F
3,435,785 UART: [art] PUB.Y = DA3427E07B34CD5524F8AA3D1CAAFB1643978EE3EA5D825375B13768BBAABC0B089B581FDE9849F7CE24B776FA94A21E
3,442,747 UART: [art] SIG.R = 2FBA4F8B99181DCFCDEAC8773BFB37CDE76FCD83C9E498E05189EF6590A0347C746681BF43B531C10A1A6ABCCF38C0E2
3,449,536 UART: [art] SIG.S = 71663A6F9EA7220EAF56F73112FDC65C1B90E4A6FB36E93B3DF18B91CB424ABCD9B4552194B10DDC9085CAD8BB595095
3,473,493 UART: Caliptra RT
3,473,746 UART: [state] CFI Enabled
3,581,672 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,806 UART: [rt]cmd =0x4d454153, len=108
3,633,346 >>> mbox cmd response data (12 bytes)
3,633,347 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,192 UART: [rt]cmd =0x44504543, len=92
3,854,174 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
85,953 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,553 UART: [kat] SHA2-256
881,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,599 UART: [kat] ++
885,751 UART: [kat] sha1
890,039 UART: [kat] SHA2-256
891,977 UART: [kat] SHA2-384
894,698 UART: [kat] SHA2-512-ACC
896,599 UART: [kat] ECC-384
902,062 UART: [kat] HMAC-384Kdf
906,540 UART: [kat] LMS
1,474,736 UART: [kat] --
1,475,461 UART: [cold-reset] ++
1,475,905 UART: [fht] Storing FHT @ 0x50003400
1,478,726 UART: [idev] ++
1,478,894 UART: [idev] CDI.KEYID = 6
1,479,254 UART: [idev] SUBJECT.KEYID = 7
1,479,678 UART: [idev] UDS.KEYID = 0
1,480,023 ready_for_fw is high
1,480,023 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,516 UART: [idev] Erasing UDS.KEYID = 0
1,503,628 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,270 UART: [idev] --
1,513,311 UART: [ldev] ++
1,513,479 UART: [ldev] CDI.KEYID = 6
1,513,842 UART: [ldev] SUBJECT.KEYID = 5
1,514,268 UART: [ldev] AUTHORITY.KEYID = 7
1,514,731 UART: [ldev] FE.KEYID = 1
1,519,965 UART: [ldev] Erasing FE.KEYID = 1
1,545,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,706 UART: [ldev] --
1,585,211 UART: [fwproc] Waiting for Commands...
1,585,848 UART: [fwproc] Received command 0x46574c44
1,586,639 UART: [fwproc] Received Image of size 114448 bytes
2,885,534 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,950 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,425 >>> mbox cmd response: success
3,078,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,079,433 UART: [afmc] ++
3,079,601 UART: [afmc] CDI.KEYID = 6
3,079,963 UART: [afmc] SUBJECT.KEYID = 7
3,080,388 UART: [afmc] AUTHORITY.KEYID = 5
3,115,913 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,181 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,961 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,689 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,574 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,264 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,989 UART: [afmc] --
3,158,911 UART: [cold-reset] --
3,159,693 UART: [state] Locking Datavault
3,160,852 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,456 UART: [state] Locking ICCM
3,161,984 UART: [exit] Launching FMC @ 0x40000130
3,167,313 UART:
3,167,329 UART: Running Caliptra FMC ...
3,167,737 UART:
3,167,791 UART: [state] CFI Enabled
3,178,184 UART: [fht] FMC Alias Private Key: 7
3,286,497 UART: [art] Extend RT PCRs Done
3,286,925 UART: [art] Lock RT PCRs Done
3,288,407 UART: [art] Populate DV Done
3,296,708 UART: [fht] FMC Alias Private Key: 7
3,297,818 UART: [art] Derive CDI
3,298,098 UART: [art] Store in in slot 0x4
3,383,669 UART: [art] Derive Key Pair
3,384,029 UART: [art] Store priv key in slot 0x5
3,397,483 UART: [art] Derive Key Pair - Done
3,412,696 UART: [art] Signing Cert with AUTHO
3,413,176 UART: RITY.KEYID = 7
3,428,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,159 UART: [art] PUB.X = 19893AF87AAD8E370A5F15CE9A43C58CE05D1461018C119FA3A1D73C130010DB7765E8A784CEAB146F7EB37EE7CF826F
3,435,913 UART: [art] PUB.Y = DA3427E07B34CD5524F8AA3D1CAAFB1643978EE3EA5D825375B13768BBAABC0B089B581FDE9849F7CE24B776FA94A21E
3,442,875 UART: [art] SIG.R = 2FBA4F8B99181DCFCDEAC8773BFB37CDE76FCD83C9E498E05189EF6590A0347C746681BF43B531C10A1A6ABCCF38C0E2
3,449,664 UART: [art] SIG.S = 71663A6F9EA7220EAF56F73112FDC65C1B90E4A6FB36E93B3DF18B91CB424ABCD9B4552194B10DDC9085CAD8BB595095
3,473,995 UART: Caliptra RT
3,474,248 UART: [state] CFI Enabled
3,582,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,088 UART: [rt]cmd =0x44504543, len=96
3,646,190 >>> mbox cmd response data (56 bytes)
3,646,191 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,144 UART: [rt]cmd =0x44504543, len=92
3,867,890 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,443,387 >>> mbox cmd response data (12 bytes)
1,443,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,252 >>> mbox cmd response: success
2,931,252 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,993,176 UART:
2,993,192 UART: Running Caliptra FMC ...
2,993,600 UART:
2,993,654 UART: [state] CFI Enabled
3,004,105 UART: [fht] FMC Alias Private Key: 7
3,111,642 UART: [art] Extend RT PCRs Done
3,112,070 UART: [art] Lock RT PCRs Done
3,113,716 UART: [art] Populate DV Done
3,122,165 UART: [fht] FMC Alias Private Key: 7
3,123,169 UART: [art] Derive CDI
3,123,449 UART: [art] Store in in slot 0x4
3,209,178 UART: [art] Derive Key Pair
3,209,538 UART: [art] Store priv key in slot 0x5
3,222,848 UART: [art] Derive Key Pair - Done
3,237,902 UART: [art] Signing Cert with AUTHO
3,238,382 UART: RITY.KEYID = 7
3,253,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,485 UART: [art] PUB.X = 75F766A03848AA89163B0BB69E51E10F50B13069CC674F65E959FCBB69F15A7C3CB4FE4088322659BE6ED1B511353F74
3,261,251 UART: [art] PUB.Y = 4AD8E2EC1DED2D35EA5A3BA8C7D1B1F1BD0341637C2123AFB8E434A3F1805FDB8F94120102D769F1ACCE8575A619B200
3,268,186 UART: [art] SIG.R = 11E3FAFF5367107BD42D2810E5019E67439EB860AF14425F2375DB476ED8ACF1FD3A40B3A875629BF7C9E0511B594132
3,274,955 UART: [art] SIG.S = 004350A84E0C2366B2B956790917BC30CDD2077EC701669A5CF186CFCD335B25FEEF5F1854F82CC8F182973CDB3DD949
3,298,950 UART: Caliptra RT
3,299,203 UART: [state] CFI Enabled
3,417,207 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,331 UART: [rt]cmd =0x44504543, len=92
3,639,566 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,465 ready_for_fw is high
1,362,465 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,551 >>> mbox cmd response: success
2,927,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,988,767 UART:
2,988,783 UART: Running Caliptra FMC ...
2,989,191 UART:
2,989,245 UART: [state] CFI Enabled
2,999,806 UART: [fht] FMC Alias Private Key: 7
3,106,987 UART: [art] Extend RT PCRs Done
3,107,415 UART: [art] Lock RT PCRs Done
3,109,243 UART: [art] Populate DV Done
3,117,480 UART: [fht] FMC Alias Private Key: 7
3,118,422 UART: [art] Derive CDI
3,118,702 UART: [art] Store in in slot 0x4
3,204,557 UART: [art] Derive Key Pair
3,204,917 UART: [art] Store priv key in slot 0x5
3,217,683 UART: [art] Derive Key Pair - Done
3,232,429 UART: [art] Signing Cert with AUTHO
3,232,909 UART: RITY.KEYID = 7
3,248,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,876 UART: [art] PUB.X = 75F766A03848AA89163B0BB69E51E10F50B13069CC674F65E959FCBB69F15A7C3CB4FE4088322659BE6ED1B511353F74
3,255,642 UART: [art] PUB.Y = 4AD8E2EC1DED2D35EA5A3BA8C7D1B1F1BD0341637C2123AFB8E434A3F1805FDB8F94120102D769F1ACCE8575A619B200
3,262,577 UART: [art] SIG.R = 11E3FAFF5367107BD42D2810E5019E67439EB860AF14425F2375DB476ED8ACF1FD3A40B3A875629BF7C9E0511B594132
3,269,346 UART: [art] SIG.S = 004350A84E0C2366B2B956790917BC30CDD2077EC701669A5CF186CFCD335B25FEEF5F1854F82CC8F182973CDB3DD949
3,293,579 UART: Caliptra RT
3,293,832 UART: [state] CFI Enabled
3,402,076 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,092 UART: [rt]cmd =0x4d454153, len=108
3,453,916 >>> mbox cmd response data (12 bytes)
3,453,917 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,892 UART: [rt]cmd =0x44504543, len=92
3,675,611 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,113 ready_for_fw is high
1,363,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,407 >>> mbox cmd response: success
2,930,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,992,309 UART:
2,992,325 UART: Running Caliptra FMC ...
2,992,733 UART:
2,992,787 UART: [state] CFI Enabled
3,003,420 UART: [fht] FMC Alias Private Key: 7
3,111,343 UART: [art] Extend RT PCRs Done
3,111,771 UART: [art] Lock RT PCRs Done
3,113,695 UART: [art] Populate DV Done
3,121,804 UART: [fht] FMC Alias Private Key: 7
3,122,856 UART: [art] Derive CDI
3,123,136 UART: [art] Store in in slot 0x4
3,208,705 UART: [art] Derive Key Pair
3,209,065 UART: [art] Store priv key in slot 0x5
3,222,419 UART: [art] Derive Key Pair - Done
3,237,117 UART: [art] Signing Cert with AUTHO
3,237,597 UART: RITY.KEYID = 7
3,252,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,548 UART: [art] PUB.X = 75F766A03848AA89163B0BB69E51E10F50B13069CC674F65E959FCBB69F15A7C3CB4FE4088322659BE6ED1B511353F74
3,260,314 UART: [art] PUB.Y = 4AD8E2EC1DED2D35EA5A3BA8C7D1B1F1BD0341637C2123AFB8E434A3F1805FDB8F94120102D769F1ACCE8575A619B200
3,267,249 UART: [art] SIG.R = 11E3FAFF5367107BD42D2810E5019E67439EB860AF14425F2375DB476ED8ACF1FD3A40B3A875629BF7C9E0511B594132
3,274,018 UART: [art] SIG.S = 004350A84E0C2366B2B956790917BC30CDD2077EC701669A5CF186CFCD335B25FEEF5F1854F82CC8F182973CDB3DD949
3,298,087 UART: Caliptra RT
3,298,340 UART: [state] CFI Enabled
3,407,370 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,168 UART: [rt]cmd =0x44504543, len=96
3,470,250 >>> mbox cmd response data (56 bytes)
3,470,251 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,038 UART: [rt]cmd =0x44504543, len=92
3,691,935 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.79s
Truncated 5006 bytes from beginning
E7351DFEF21643B56D92C3318743EC48C4F9B
3,440,524 UART: [art] PUB.Y = BC0C288C43121C6F364F220C79988C77E7CA7BC2F4D34E7BD15862259D8F062E5FD6C50174632A6B351CF737F3FFC3D5
3,447,468 UART: [art] SIG.R = 44EEEE2741BD5F3B46C95DA4D3CF68DE8FADCCC94777ADBB9645128316785D11C58D6770512DF8493C344274FDDD47ED
3,454,252 UART: [art] SIG.S = AADC5A391724250A04DE3AE22786E22AE74978CDF4432FBB0ABC959046D00EFE9F3FB7EE34DD1A27B8E3DA9D49140412
3,477,558 UART: Caliptra RT
3,477,903 UART: [state] CFI Enabled
3,598,400 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,464 UART: [rt]cmd =0x44504543, len=92
3,821,305 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,924 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,402 UART: [kat] SHA2-256
882,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,448 UART: [kat] ++
886,600 UART: [kat] sha1
890,818 UART: [kat] SHA2-256
892,756 UART: [kat] SHA2-384
895,581 UART: [kat] SHA2-512-ACC
897,482 UART: [kat] ECC-384
903,247 UART: [kat] HMAC-384Kdf
908,081 UART: [kat] LMS
1,476,277 UART: [kat] --
1,477,072 UART: [cold-reset] ++
1,477,590 UART: [fht] Storing FHT @ 0x50003400
1,480,321 UART: [idev] ++
1,480,489 UART: [idev] CDI.KEYID = 6
1,480,849 UART: [idev] SUBJECT.KEYID = 7
1,481,273 UART: [idev] UDS.KEYID = 0
1,481,618 ready_for_fw is high
1,481,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,979 UART: [idev] Erasing UDS.KEYID = 0
1,505,825 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,287 UART: [idev] --
1,515,362 UART: [ldev] ++
1,515,530 UART: [ldev] CDI.KEYID = 6
1,515,893 UART: [ldev] SUBJECT.KEYID = 5
1,516,319 UART: [ldev] AUTHORITY.KEYID = 7
1,516,782 UART: [ldev] FE.KEYID = 1
1,522,226 UART: [ldev] Erasing FE.KEYID = 1
1,547,527 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,791 UART: [ldev] --
1,587,192 UART: [fwproc] Waiting for Commands...
1,587,917 UART: [fwproc] Received command 0x46574c44
1,588,708 UART: [fwproc] Received Image of size 114448 bytes
2,888,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,783 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,135 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,072 >>> mbox cmd response: success
3,080,072 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,081,200 UART: [afmc] ++
3,081,368 UART: [afmc] CDI.KEYID = 6
3,081,730 UART: [afmc] SUBJECT.KEYID = 7
3,082,155 UART: [afmc] AUTHORITY.KEYID = 5
3,116,738 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,356 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,749 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,439 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,198 UART: [afmc] --
3,160,214 UART: [cold-reset] --
3,161,074 UART: [state] Locking Datavault
3,162,413 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,017 UART: [state] Locking ICCM
3,163,549 UART: [exit] Launching FMC @ 0x40000130
3,168,878 UART:
3,168,894 UART: Running Caliptra FMC ...
3,169,302 UART:
3,169,445 UART: [state] CFI Enabled
3,180,206 UART: [fht] FMC Alias Private Key: 7
3,288,077 UART: [art] Extend RT PCRs Done
3,288,505 UART: [art] Lock RT PCRs Done
3,289,625 UART: [art] Populate DV Done
3,297,696 UART: [fht] FMC Alias Private Key: 7
3,298,626 UART: [art] Derive CDI
3,298,906 UART: [art] Store in in slot 0x4
3,384,685 UART: [art] Derive Key Pair
3,385,045 UART: [art] Store priv key in slot 0x5
3,398,165 UART: [art] Derive Key Pair - Done
3,412,927 UART: [art] Signing Cert with AUTHO
3,413,407 UART: RITY.KEYID = 7
3,428,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,204 UART: [art] PUB.X = 470893EC9B48AA973AD1DBFBE41057C9E55193C3BC075973029652B02D7E7351DFEF21643B56D92C3318743EC48C4F9B
3,435,967 UART: [art] PUB.Y = BC0C288C43121C6F364F220C79988C77E7CA7BC2F4D34E7BD15862259D8F062E5FD6C50174632A6B351CF737F3FFC3D5
3,442,911 UART: [art] SIG.R = 44EEEE2741BD5F3B46C95DA4D3CF68DE8FADCCC94777ADBB9645128316785D11C58D6770512DF8493C344274FDDD47ED
3,449,695 UART: [art] SIG.S = AADC5A391724250A04DE3AE22786E22AE74978CDF4432FBB0ABC959046D00EFE9F3FB7EE34DD1A27B8E3DA9D49140412
3,473,781 UART: Caliptra RT
3,474,126 UART: [state] CFI Enabled
3,583,309 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,467 UART: [rt]cmd =0x4d454153, len=108
3,635,153 >>> mbox cmd response data (12 bytes)
3,635,154 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,257 UART: [rt]cmd =0x44504543, len=92
3,856,604 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,955 UART: [state] LifecycleState = Unprovisioned
85,610 UART: [state] DebugLocked = No
86,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,960 UART: [kat] SHA2-256
881,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,006 UART: [kat] ++
886,158 UART: [kat] sha1
890,246 UART: [kat] SHA2-256
892,184 UART: [kat] SHA2-384
894,913 UART: [kat] SHA2-512-ACC
896,814 UART: [kat] ECC-384
902,243 UART: [kat] HMAC-384Kdf
906,817 UART: [kat] LMS
1,475,013 UART: [kat] --
1,475,754 UART: [cold-reset] ++
1,476,166 UART: [fht] Storing FHT @ 0x50003400
1,479,167 UART: [idev] ++
1,479,335 UART: [idev] CDI.KEYID = 6
1,479,695 UART: [idev] SUBJECT.KEYID = 7
1,480,119 UART: [idev] UDS.KEYID = 0
1,480,464 ready_for_fw is high
1,480,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,941 UART: [idev] Erasing UDS.KEYID = 0
1,505,177 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,901 UART: [idev] --
1,514,902 UART: [ldev] ++
1,515,070 UART: [ldev] CDI.KEYID = 6
1,515,433 UART: [ldev] SUBJECT.KEYID = 5
1,515,859 UART: [ldev] AUTHORITY.KEYID = 7
1,516,322 UART: [ldev] FE.KEYID = 1
1,521,558 UART: [ldev] Erasing FE.KEYID = 1
1,546,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,761 UART: [ldev] --
1,586,124 UART: [fwproc] Waiting for Commands...
1,586,867 UART: [fwproc] Received command 0x46574c44
1,587,658 UART: [fwproc] Received Image of size 114448 bytes
2,886,629 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,909 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,261 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,306 >>> mbox cmd response: success
3,078,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,079,538 UART: [afmc] ++
3,079,706 UART: [afmc] CDI.KEYID = 6
3,080,068 UART: [afmc] SUBJECT.KEYID = 7
3,080,493 UART: [afmc] AUTHORITY.KEYID = 5
3,116,218 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,254 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,647 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,337 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,030 UART: [afmc] --
3,159,016 UART: [cold-reset] --
3,159,756 UART: [state] Locking Datavault
3,160,717 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,321 UART: [state] Locking ICCM
3,161,889 UART: [exit] Launching FMC @ 0x40000130
3,167,218 UART:
3,167,234 UART: Running Caliptra FMC ...
3,167,642 UART:
3,167,785 UART: [state] CFI Enabled
3,178,326 UART: [fht] FMC Alias Private Key: 7
3,285,233 UART: [art] Extend RT PCRs Done
3,285,661 UART: [art] Lock RT PCRs Done
3,287,299 UART: [art] Populate DV Done
3,295,346 UART: [fht] FMC Alias Private Key: 7
3,296,414 UART: [art] Derive CDI
3,296,694 UART: [art] Store in in slot 0x4
3,382,195 UART: [art] Derive Key Pair
3,382,555 UART: [art] Store priv key in slot 0x5
3,395,827 UART: [art] Derive Key Pair - Done
3,410,575 UART: [art] Signing Cert with AUTHO
3,411,055 UART: RITY.KEYID = 7
3,426,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,150 UART: [art] PUB.X = 470893EC9B48AA973AD1DBFBE41057C9E55193C3BC075973029652B02D7E7351DFEF21643B56D92C3318743EC48C4F9B
3,433,913 UART: [art] PUB.Y = BC0C288C43121C6F364F220C79988C77E7CA7BC2F4D34E7BD15862259D8F062E5FD6C50174632A6B351CF737F3FFC3D5
3,440,857 UART: [art] SIG.R = 44EEEE2741BD5F3B46C95DA4D3CF68DE8FADCCC94777ADBB9645128316785D11C58D6770512DF8493C344274FDDD47ED
3,447,641 UART: [art] SIG.S = AADC5A391724250A04DE3AE22786E22AE74978CDF4432FBB0ABC959046D00EFE9F3FB7EE34DD1A27B8E3DA9D49140412
3,471,739 UART: Caliptra RT
3,472,084 UART: [state] CFI Enabled
3,580,263 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,281 UART: [rt]cmd =0x44504543, len=96
3,643,627 >>> mbox cmd response data (56 bytes)
3,643,628 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,725 UART: [rt]cmd =0x44504543, len=92
3,865,076 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 5.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,443,204 >>> mbox cmd response data (12 bytes)
1,443,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,155 >>> mbox cmd response: success
2,930,155 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,991,013 UART:
2,991,029 UART: Running Caliptra FMC ...
2,991,437 UART:
2,991,580 UART: [state] CFI Enabled
3,002,311 UART: [fht] FMC Alias Private Key: 7
3,110,206 UART: [art] Extend RT PCRs Done
3,110,634 UART: [art] Lock RT PCRs Done
3,112,468 UART: [art] Populate DV Done
3,120,553 UART: [fht] FMC Alias Private Key: 7
3,121,559 UART: [art] Derive CDI
3,121,839 UART: [art] Store in in slot 0x4
3,207,508 UART: [art] Derive Key Pair
3,207,868 UART: [art] Store priv key in slot 0x5
3,221,880 UART: [art] Derive Key Pair - Done
3,236,632 UART: [art] Signing Cert with AUTHO
3,237,112 UART: RITY.KEYID = 7
3,252,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,437 UART: [art] PUB.X = A8B9ABC384C2BE8D0D514E788FBDF1CB207F436B1C853DC0CB5A85E3E5C8EB0A845B94BEA19D319360E8EB906828A052
3,260,219 UART: [art] PUB.Y = 746EB3ADC79D20457A7C57D20E3A9A3A9F3E59E1DB1FFA847BF06DDC19E40F755358D7C77801C5C1C434DDFC0CDEDEEF
3,267,183 UART: [art] SIG.R = 589F1C9FD1B0A8AFDEC0CD677861CDACC03C395FBEB1C0941BE5CA470B0BC4A28AA61662B770B35CCE331FFD3014E47F
3,273,973 UART: [art] SIG.S = 8A9C3BC459E2D1483D8EF693E20E2A036FD56E0351085F7B73171F686C55C41C035A60046FDBAB080EE853588610C8F9
3,297,838 UART: Caliptra RT
3,298,183 UART: [state] CFI Enabled
3,418,460 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,662 UART: [rt]cmd =0x44504543, len=92
3,640,421 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,186 ready_for_fw is high
1,363,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,300 >>> mbox cmd response: success
2,929,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,992,014 UART:
2,992,030 UART: Running Caliptra FMC ...
2,992,438 UART:
2,992,581 UART: [state] CFI Enabled
3,002,938 UART: [fht] FMC Alias Private Key: 7
3,110,159 UART: [art] Extend RT PCRs Done
3,110,587 UART: [art] Lock RT PCRs Done
3,112,233 UART: [art] Populate DV Done
3,120,178 UART: [fht] FMC Alias Private Key: 7
3,121,164 UART: [art] Derive CDI
3,121,444 UART: [art] Store in in slot 0x4
3,207,161 UART: [art] Derive Key Pair
3,207,521 UART: [art] Store priv key in slot 0x5
3,220,667 UART: [art] Derive Key Pair - Done
3,235,545 UART: [art] Signing Cert with AUTHO
3,236,025 UART: RITY.KEYID = 7
3,250,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,602 UART: [art] PUB.X = A8B9ABC384C2BE8D0D514E788FBDF1CB207F436B1C853DC0CB5A85E3E5C8EB0A845B94BEA19D319360E8EB906828A052
3,258,384 UART: [art] PUB.Y = 746EB3ADC79D20457A7C57D20E3A9A3A9F3E59E1DB1FFA847BF06DDC19E40F755358D7C77801C5C1C434DDFC0CDEDEEF
3,265,348 UART: [art] SIG.R = 589F1C9FD1B0A8AFDEC0CD677861CDACC03C395FBEB1C0941BE5CA470B0BC4A28AA61662B770B35CCE331FFD3014E47F
3,272,138 UART: [art] SIG.S = 8A9C3BC459E2D1483D8EF693E20E2A036FD56E0351085F7B73171F686C55C41C035A60046FDBAB080EE853588610C8F9
3,295,969 UART: Caliptra RT
3,296,314 UART: [state] CFI Enabled
3,404,471 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,893 UART: [rt]cmd =0x4d454153, len=108
3,456,371 >>> mbox cmd response data (12 bytes)
3,456,372 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,321 UART: [rt]cmd =0x44504543, len=92
3,677,918 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,294 ready_for_fw is high
1,363,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,302 >>> mbox cmd response: success
2,931,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,992,810 UART:
2,992,826 UART: Running Caliptra FMC ...
2,993,234 UART:
2,993,377 UART: [state] CFI Enabled
3,004,042 UART: [fht] FMC Alias Private Key: 7
3,111,803 UART: [art] Extend RT PCRs Done
3,112,231 UART: [art] Lock RT PCRs Done
3,113,669 UART: [art] Populate DV Done
3,122,204 UART: [fht] FMC Alias Private Key: 7
3,123,288 UART: [art] Derive CDI
3,123,568 UART: [art] Store in in slot 0x4
3,209,145 UART: [art] Derive Key Pair
3,209,505 UART: [art] Store priv key in slot 0x5
3,223,071 UART: [art] Derive Key Pair - Done
3,238,187 UART: [art] Signing Cert with AUTHO
3,238,667 UART: RITY.KEYID = 7
3,253,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,694 UART: [art] PUB.X = A8B9ABC384C2BE8D0D514E788FBDF1CB207F436B1C853DC0CB5A85E3E5C8EB0A845B94BEA19D319360E8EB906828A052
3,261,476 UART: [art] PUB.Y = 746EB3ADC79D20457A7C57D20E3A9A3A9F3E59E1DB1FFA847BF06DDC19E40F755358D7C77801C5C1C434DDFC0CDEDEEF
3,268,440 UART: [art] SIG.R = 589F1C9FD1B0A8AFDEC0CD677861CDACC03C395FBEB1C0941BE5CA470B0BC4A28AA61662B770B35CCE331FFD3014E47F
3,275,230 UART: [art] SIG.S = 8A9C3BC459E2D1483D8EF693E20E2A036FD56E0351085F7B73171F686C55C41C035A60046FDBAB080EE853588610C8F9
3,299,429 UART: Caliptra RT
3,299,774 UART: [state] CFI Enabled
3,407,641 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,915 UART: [rt]cmd =0x44504543, len=96
3,471,079 >>> mbox cmd response data (56 bytes)
3,471,080 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,847 UART: [rt]cmd =0x44504543, len=92
3,692,038 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.97s
Truncated 4783 bytes from beginning
7
3,130,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,121 UART: [art] PUB.X = 5CC1E89810B31B983551E54B358CC946B0813594C4F514E850B2EBD21F463B0AE571DDD45182E0FF07622BFAC46E3E1B
3,137,891 UART: [art] PUB.Y = 59FA441CB5F19DC29943F9FF43BFC3A799506EE7EDC4E2B5C0403F04846CAF883B0F55BBCC442D3852B20CAA1F5A2B00
3,144,828 UART: [art] SIG.R = 3694A0316375C0815124BA2918B34B55B00D3EFABDA1B251AA913B2FC4559EBCC771728633039B0DC648D2868B7FD506
3,151,586 UART: [art] SIG.S = FE0FDDE49A966238326041DD80F75EE5C9E6A93134CBDCEDAC6621A94920053872095C8620A7D24938B3745CFF8A38A5
3,174,996 UART: Caliptra RT
3,175,249 UART: [state] CFI Enabled
3,295,900 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,946 UART: [rt]cmd =0x44504543, len=92
3,517,912 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
893,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,487 UART: [kat] ++
897,639 UART: [kat] sha1
901,645 UART: [kat] SHA2-256
903,585 UART: [kat] SHA2-384
906,216 UART: [kat] SHA2-512-ACC
908,117 UART: [kat] ECC-384
917,794 UART: [kat] HMAC-384Kdf
922,148 UART: [kat] LMS
1,170,476 UART: [kat] --
1,171,551 UART: [cold-reset] ++
1,171,939 UART: [fht] FHT @ 0x50003400
1,174,534 UART: [idev] ++
1,174,702 UART: [idev] CDI.KEYID = 6
1,175,062 UART: [idev] SUBJECT.KEYID = 7
1,175,486 UART: [idev] UDS.KEYID = 0
1,175,831 ready_for_fw is high
1,175,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,668 UART: [idev] Erasing UDS.KEYID = 0
1,200,255 UART: [idev] Sha1 KeyId Algorithm
1,208,755 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,356 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,242,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,539 UART: [ldev] --
1,281,994 UART: [fwproc] Wait for Commands...
1,282,758 UART: [fwproc] Recv command 0x46574c44
1,283,486 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,738 >>> mbox cmd response: success
2,775,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,776,772 UART: [afmc] ++
2,776,940 UART: [afmc] CDI.KEYID = 6
2,777,302 UART: [afmc] SUBJECT.KEYID = 7
2,777,727 UART: [afmc] AUTHORITY.KEYID = 5
2,813,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,581 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,309 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,194 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,913 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,747 UART: [afmc] --
2,856,669 UART: [cold-reset] --
2,857,387 UART: [state] Locking Datavault
2,858,662 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,266 UART: [state] Locking ICCM
2,859,892 UART: [exit] Launching FMC @ 0x40000130
2,865,221 UART:
2,865,237 UART: Running Caliptra FMC ...
2,865,645 UART:
2,865,699 UART: [state] CFI Enabled
2,876,468 UART: [fht] FMC Alias Private Key: 7
2,984,695 UART: [art] Extend RT PCRs Done
2,985,123 UART: [art] Lock RT PCRs Done
2,986,655 UART: [art] Populate DV Done
2,995,008 UART: [fht] FMC Alias Private Key: 7
2,996,044 UART: [art] Derive CDI
2,996,324 UART: [art] Store in in slot 0x4
3,082,065 UART: [art] Derive Key Pair
3,082,425 UART: [art] Store priv key in slot 0x5
3,095,311 UART: [art] Derive Key Pair - Done
3,110,213 UART: [art] Signing Cert with AUTHO
3,110,693 UART: RITY.KEYID = 7
3,125,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,702 UART: [art] PUB.X = 5CC1E89810B31B983551E54B358CC946B0813594C4F514E850B2EBD21F463B0AE571DDD45182E0FF07622BFAC46E3E1B
3,133,472 UART: [art] PUB.Y = 59FA441CB5F19DC29943F9FF43BFC3A799506EE7EDC4E2B5C0403F04846CAF883B0F55BBCC442D3852B20CAA1F5A2B00
3,140,409 UART: [art] SIG.R = 3694A0316375C0815124BA2918B34B55B00D3EFABDA1B251AA913B2FC4559EBCC771728633039B0DC648D2868B7FD506
3,147,167 UART: [art] SIG.S = FE0FDDE49A966238326041DD80F75EE5C9E6A93134CBDCEDAC6621A94920053872095C8620A7D24938B3745CFF8A38A5
3,170,835 UART: Caliptra RT
3,171,088 UART: [state] CFI Enabled
3,278,797 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,005 UART: [rt]cmd =0x4d454153, len=108
3,330,295 >>> mbox cmd response data (12 bytes)
3,330,296 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,903 UART: [rt]cmd =0x44504543, len=92
3,550,539 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
893,594 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,719 UART: [kat] ++
897,871 UART: [kat] sha1
902,155 UART: [kat] SHA2-256
904,095 UART: [kat] SHA2-384
906,888 UART: [kat] SHA2-512-ACC
908,789 UART: [kat] ECC-384
918,592 UART: [kat] HMAC-384Kdf
923,206 UART: [kat] LMS
1,171,534 UART: [kat] --
1,172,111 UART: [cold-reset] ++
1,172,645 UART: [fht] FHT @ 0x50003400
1,175,440 UART: [idev] ++
1,175,608 UART: [idev] CDI.KEYID = 6
1,175,968 UART: [idev] SUBJECT.KEYID = 7
1,176,392 UART: [idev] UDS.KEYID = 0
1,176,737 ready_for_fw is high
1,176,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,612 UART: [idev] Erasing UDS.KEYID = 0
1,201,213 UART: [idev] Sha1 KeyId Algorithm
1,209,523 UART: [idev] --
1,210,515 UART: [ldev] ++
1,210,683 UART: [ldev] CDI.KEYID = 6
1,211,046 UART: [ldev] SUBJECT.KEYID = 5
1,211,472 UART: [ldev] AUTHORITY.KEYID = 7
1,211,935 UART: [ldev] FE.KEYID = 1
1,216,939 UART: [ldev] Erasing FE.KEYID = 1
1,243,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,519 UART: [ldev] --
1,282,954 UART: [fwproc] Wait for Commands...
1,283,720 UART: [fwproc] Recv command 0x46574c44
1,284,448 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,218 >>> mbox cmd response: success
2,776,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,777,458 UART: [afmc] ++
2,777,626 UART: [afmc] CDI.KEYID = 6
2,777,988 UART: [afmc] SUBJECT.KEYID = 7
2,778,413 UART: [afmc] AUTHORITY.KEYID = 5
2,813,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,549 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,277 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,881 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,817 UART: [afmc] --
2,856,735 UART: [cold-reset] --
2,857,533 UART: [state] Locking Datavault
2,858,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,064 UART: [state] Locking ICCM
2,859,538 UART: [exit] Launching FMC @ 0x40000130
2,864,867 UART:
2,864,883 UART: Running Caliptra FMC ...
2,865,291 UART:
2,865,345 UART: [state] CFI Enabled
2,876,044 UART: [fht] FMC Alias Private Key: 7
2,984,027 UART: [art] Extend RT PCRs Done
2,984,455 UART: [art] Lock RT PCRs Done
2,985,953 UART: [art] Populate DV Done
2,994,114 UART: [fht] FMC Alias Private Key: 7
2,995,168 UART: [art] Derive CDI
2,995,448 UART: [art] Store in in slot 0x4
3,081,065 UART: [art] Derive Key Pair
3,081,425 UART: [art] Store priv key in slot 0x5
3,094,169 UART: [art] Derive Key Pair - Done
3,109,149 UART: [art] Signing Cert with AUTHO
3,109,629 UART: RITY.KEYID = 7
3,125,207 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,972 UART: [art] PUB.X = 5CC1E89810B31B983551E54B358CC946B0813594C4F514E850B2EBD21F463B0AE571DDD45182E0FF07622BFAC46E3E1B
3,132,742 UART: [art] PUB.Y = 59FA441CB5F19DC29943F9FF43BFC3A799506EE7EDC4E2B5C0403F04846CAF883B0F55BBCC442D3852B20CAA1F5A2B00
3,139,679 UART: [art] SIG.R = 3694A0316375C0815124BA2918B34B55B00D3EFABDA1B251AA913B2FC4559EBCC771728633039B0DC648D2868B7FD506
3,146,437 UART: [art] SIG.S = FE0FDDE49A966238326041DD80F75EE5C9E6A93134CBDCEDAC6621A94920053872095C8620A7D24938B3745CFF8A38A5
3,170,145 UART: Caliptra RT
3,170,398 UART: [state] CFI Enabled
3,277,779 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,771 UART: [rt]cmd =0x44504543, len=96
3,341,257 >>> mbox cmd response data (56 bytes)
3,341,258 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,113 UART: [rt]cmd =0x44504543, len=92
3,562,439 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,211 >>> mbox cmd response data (12 bytes)
1,142,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,528 >>> mbox cmd response: success
2,630,528 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,692,628 UART:
2,692,644 UART: Running Caliptra FMC ...
2,693,052 UART:
2,693,106 UART: [state] CFI Enabled
2,703,465 UART: [fht] FMC Alias Private Key: 7
2,811,980 UART: [art] Extend RT PCRs Done
2,812,408 UART: [art] Lock RT PCRs Done
2,813,864 UART: [art] Populate DV Done
2,821,863 UART: [fht] FMC Alias Private Key: 7
2,823,015 UART: [art] Derive CDI
2,823,295 UART: [art] Store in in slot 0x4
2,909,050 UART: [art] Derive Key Pair
2,909,410 UART: [art] Store priv key in slot 0x5
2,922,486 UART: [art] Derive Key Pair - Done
2,937,249 UART: [art] Signing Cert with AUTHO
2,937,729 UART: RITY.KEYID = 7
2,952,611 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,376 UART: [art] PUB.X = 6115118BA0145B108105E7177B75BE2FAE300A255484FAE70C1C3F3DB59873257F4F4A043A473B65D68F6DB9FA5E9F64
2,960,136 UART: [art] PUB.Y = 1888826BD6BE52E26B38E87E0EA5BC24AEF71D92FE374DA29434C765728F48F023CDCCDCB2D2BF62CCAE8D60BBFF789F
2,967,107 UART: [art] SIG.R = 3778D594F3D476FCFBCB24D014B7B41A4C6CAA7E26B9EFDF8192E9B9F20B3CDB8DA324C9F99C55AE01F56B64B982BF59
2,973,893 UART: [art] SIG.S = B321348F76BDC5C53B84732168D66B903EBF039B7E1841DA3BF9819C83361FFCD23DE8F23766DABF0179ED456316A0E1
2,997,416 UART: Caliptra RT
2,997,669 UART: [state] CFI Enabled
3,118,194 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,290 UART: [rt]cmd =0x44504543, len=92
3,340,588 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,069 ready_for_fw is high
1,061,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,395 >>> mbox cmd response: success
2,629,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,690,399 UART:
2,690,415 UART: Running Caliptra FMC ...
2,690,823 UART:
2,690,877 UART: [state] CFI Enabled
2,701,118 UART: [fht] FMC Alias Private Key: 7
2,809,245 UART: [art] Extend RT PCRs Done
2,809,673 UART: [art] Lock RT PCRs Done
2,811,109 UART: [art] Populate DV Done
2,819,272 UART: [fht] FMC Alias Private Key: 7
2,820,258 UART: [art] Derive CDI
2,820,538 UART: [art] Store in in slot 0x4
2,906,263 UART: [art] Derive Key Pair
2,906,623 UART: [art] Store priv key in slot 0x5
2,918,797 UART: [art] Derive Key Pair - Done
2,933,466 UART: [art] Signing Cert with AUTHO
2,933,946 UART: RITY.KEYID = 7
2,948,610 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,375 UART: [art] PUB.X = 6115118BA0145B108105E7177B75BE2FAE300A255484FAE70C1C3F3DB59873257F4F4A043A473B65D68F6DB9FA5E9F64
2,956,135 UART: [art] PUB.Y = 1888826BD6BE52E26B38E87E0EA5BC24AEF71D92FE374DA29434C765728F48F023CDCCDCB2D2BF62CCAE8D60BBFF789F
2,963,106 UART: [art] SIG.R = 3778D594F3D476FCFBCB24D014B7B41A4C6CAA7E26B9EFDF8192E9B9F20B3CDB8DA324C9F99C55AE01F56B64B982BF59
2,969,892 UART: [art] SIG.S = B321348F76BDC5C53B84732168D66B903EBF039B7E1841DA3BF9819C83361FFCD23DE8F23766DABF0179ED456316A0E1
2,994,227 UART: Caliptra RT
2,994,480 UART: [state] CFI Enabled
3,102,047 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,193 UART: [rt]cmd =0x4d454153, len=108
3,153,781 >>> mbox cmd response data (12 bytes)
3,153,782 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,689 UART: [rt]cmd =0x44504543, len=92
3,373,961 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,479 ready_for_fw is high
1,060,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,229 >>> mbox cmd response: success
2,629,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,690,621 UART:
2,690,637 UART: Running Caliptra FMC ...
2,691,045 UART:
2,691,099 UART: [state] CFI Enabled
2,701,650 UART: [fht] FMC Alias Private Key: 7
2,809,577 UART: [art] Extend RT PCRs Done
2,810,005 UART: [art] Lock RT PCRs Done
2,811,523 UART: [art] Populate DV Done
2,819,582 UART: [fht] FMC Alias Private Key: 7
2,820,594 UART: [art] Derive CDI
2,820,874 UART: [art] Store in in slot 0x4
2,906,699 UART: [art] Derive Key Pair
2,907,059 UART: [art] Store priv key in slot 0x5
2,920,061 UART: [art] Derive Key Pair - Done
2,934,914 UART: [art] Signing Cert with AUTHO
2,935,394 UART: RITY.KEYID = 7
2,950,026 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,791 UART: [art] PUB.X = 6115118BA0145B108105E7177B75BE2FAE300A255484FAE70C1C3F3DB59873257F4F4A043A473B65D68F6DB9FA5E9F64
2,957,551 UART: [art] PUB.Y = 1888826BD6BE52E26B38E87E0EA5BC24AEF71D92FE374DA29434C765728F48F023CDCCDCB2D2BF62CCAE8D60BBFF789F
2,964,522 UART: [art] SIG.R = 3778D594F3D476FCFBCB24D014B7B41A4C6CAA7E26B9EFDF8192E9B9F20B3CDB8DA324C9F99C55AE01F56B64B982BF59
2,971,308 UART: [art] SIG.S = B321348F76BDC5C53B84732168D66B903EBF039B7E1841DA3BF9819C83361FFCD23DE8F23766DABF0179ED456316A0E1
2,994,835 UART: Caliptra RT
2,995,088 UART: [state] CFI Enabled
3,103,193 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,491 UART: [rt]cmd =0x44504543, len=96
3,167,133 >>> mbox cmd response data (56 bytes)
3,167,134 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,179 UART: [rt]cmd =0x44504543, len=92
3,388,635 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.61s
Truncated 4783 bytes from beginning
7
3,133,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,388 UART: [art] PUB.X = CD7AF25C9C5F0A00AFC9DED290392253D733EA4C3DDE87474CD2316E02FF7ECE062F1847835DBE0B4CDF93909655DA92
3,141,140 UART: [art] PUB.Y = 7BCE5C41BB76ADEDB3A22A63C83D5F15D46A3E8F0E14A65A6D5A58104F480E51E2E5289FCE835937F8C4E6557DBFB6A7
3,148,102 UART: [art] SIG.R = C73B305781C3C0A1F4C7C9C3ECEA7A56D878FEB7D1E99B711FD04FF8A19521DDD951840AC89B24D17C0772128811E15D
3,154,876 UART: [art] SIG.S = 6BA65F71BB93A7CB26D770B4B1C4C51B971DF143C88CFBCF32D1B1021BDEBA32C1698B431DA18A2D80DB008CA7AD9711
3,178,532 UART: Caliptra RT
3,178,877 UART: [state] CFI Enabled
3,299,096 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,024 UART: [rt]cmd =0x44504543, len=92
3,521,433 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
893,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,634 UART: [kat] ++
897,786 UART: [kat] sha1
902,052 UART: [kat] SHA2-256
903,992 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,189 UART: [kat] HMAC-384Kdf
922,937 UART: [kat] LMS
1,171,265 UART: [kat] --
1,172,248 UART: [cold-reset] ++
1,172,808 UART: [fht] FHT @ 0x50003400
1,175,455 UART: [idev] ++
1,175,623 UART: [idev] CDI.KEYID = 6
1,175,983 UART: [idev] SUBJECT.KEYID = 7
1,176,407 UART: [idev] UDS.KEYID = 0
1,176,752 ready_for_fw is high
1,176,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,161 UART: [idev] Erasing UDS.KEYID = 0
1,202,032 UART: [idev] Sha1 KeyId Algorithm
1,210,446 UART: [idev] --
1,211,450 UART: [ldev] ++
1,211,618 UART: [ldev] CDI.KEYID = 6
1,211,981 UART: [ldev] SUBJECT.KEYID = 5
1,212,407 UART: [ldev] AUTHORITY.KEYID = 7
1,212,870 UART: [ldev] FE.KEYID = 1
1,218,262 UART: [ldev] Erasing FE.KEYID = 1
1,244,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,398 UART: [ldev] --
1,283,729 UART: [fwproc] Wait for Commands...
1,284,365 UART: [fwproc] Recv command 0x46574c44
1,285,093 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,581 >>> mbox cmd response: success
2,775,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,776,601 UART: [afmc] ++
2,776,769 UART: [afmc] CDI.KEYID = 6
2,777,131 UART: [afmc] SUBJECT.KEYID = 7
2,777,556 UART: [afmc] AUTHORITY.KEYID = 5
2,814,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,920 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,805 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,538 UART: [afmc] --
2,857,570 UART: [cold-reset] --
2,858,324 UART: [state] Locking Datavault
2,859,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,939 UART: [state] Locking ICCM
2,860,417 UART: [exit] Launching FMC @ 0x40000130
2,865,746 UART:
2,865,762 UART: Running Caliptra FMC ...
2,866,170 UART:
2,866,313 UART: [state] CFI Enabled
2,877,082 UART: [fht] FMC Alias Private Key: 7
2,984,825 UART: [art] Extend RT PCRs Done
2,985,253 UART: [art] Lock RT PCRs Done
2,986,913 UART: [art] Populate DV Done
2,995,052 UART: [fht] FMC Alias Private Key: 7
2,996,116 UART: [art] Derive CDI
2,996,396 UART: [art] Store in in slot 0x4
3,081,919 UART: [art] Derive Key Pair
3,082,279 UART: [art] Store priv key in slot 0x5
3,095,197 UART: [art] Derive Key Pair - Done
3,109,886 UART: [art] Signing Cert with AUTHO
3,110,366 UART: RITY.KEYID = 7
3,125,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,623 UART: [art] PUB.X = CD7AF25C9C5F0A00AFC9DED290392253D733EA4C3DDE87474CD2316E02FF7ECE062F1847835DBE0B4CDF93909655DA92
3,133,375 UART: [art] PUB.Y = 7BCE5C41BB76ADEDB3A22A63C83D5F15D46A3E8F0E14A65A6D5A58104F480E51E2E5289FCE835937F8C4E6557DBFB6A7
3,140,337 UART: [art] SIG.R = C73B305781C3C0A1F4C7C9C3ECEA7A56D878FEB7D1E99B711FD04FF8A19521DDD951840AC89B24D17C0772128811E15D
3,147,111 UART: [art] SIG.S = 6BA65F71BB93A7CB26D770B4B1C4C51B971DF143C88CFBCF32D1B1021BDEBA32C1698B431DA18A2D80DB008CA7AD9711
3,170,763 UART: Caliptra RT
3,171,108 UART: [state] CFI Enabled
3,278,387 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,735 UART: [rt]cmd =0x4d454153, len=108
3,330,391 >>> mbox cmd response data (12 bytes)
3,330,392 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,213 UART: [rt]cmd =0x44504543, len=92
3,551,472 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,725 UART: [kat] SHA2-256
893,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,500 UART: [kat] ++
897,652 UART: [kat] sha1
901,868 UART: [kat] SHA2-256
903,808 UART: [kat] SHA2-384
906,439 UART: [kat] SHA2-512-ACC
908,340 UART: [kat] ECC-384
918,185 UART: [kat] HMAC-384Kdf
922,641 UART: [kat] LMS
1,170,969 UART: [kat] --
1,171,634 UART: [cold-reset] ++
1,172,152 UART: [fht] FHT @ 0x50003400
1,174,805 UART: [idev] ++
1,174,973 UART: [idev] CDI.KEYID = 6
1,175,333 UART: [idev] SUBJECT.KEYID = 7
1,175,757 UART: [idev] UDS.KEYID = 0
1,176,102 ready_for_fw is high
1,176,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,829 UART: [idev] Erasing UDS.KEYID = 0
1,200,596 UART: [idev] Sha1 KeyId Algorithm
1,208,978 UART: [idev] --
1,209,798 UART: [ldev] ++
1,209,966 UART: [ldev] CDI.KEYID = 6
1,210,329 UART: [ldev] SUBJECT.KEYID = 5
1,210,755 UART: [ldev] AUTHORITY.KEYID = 7
1,211,218 UART: [ldev] FE.KEYID = 1
1,216,484 UART: [ldev] Erasing FE.KEYID = 1
1,242,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,832 UART: [ldev] --
1,282,339 UART: [fwproc] Wait for Commands...
1,283,025 UART: [fwproc] Recv command 0x46574c44
1,283,753 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,805 >>> mbox cmd response: success
2,774,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,775,873 UART: [afmc] ++
2,776,041 UART: [afmc] CDI.KEYID = 6
2,776,403 UART: [afmc] SUBJECT.KEYID = 7
2,776,828 UART: [afmc] AUTHORITY.KEYID = 5
2,812,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,654 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,539 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,258 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,946 UART: [afmc] --
2,855,876 UART: [cold-reset] --
2,857,008 UART: [state] Locking Datavault
2,858,147 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,751 UART: [state] Locking ICCM
2,859,209 UART: [exit] Launching FMC @ 0x40000130
2,864,538 UART:
2,864,554 UART: Running Caliptra FMC ...
2,864,962 UART:
2,865,105 UART: [state] CFI Enabled
2,875,562 UART: [fht] FMC Alias Private Key: 7
2,983,727 UART: [art] Extend RT PCRs Done
2,984,155 UART: [art] Lock RT PCRs Done
2,985,627 UART: [art] Populate DV Done
2,993,458 UART: [fht] FMC Alias Private Key: 7
2,994,412 UART: [art] Derive CDI
2,994,692 UART: [art] Store in in slot 0x4
3,080,481 UART: [art] Derive Key Pair
3,080,841 UART: [art] Store priv key in slot 0x5
3,093,873 UART: [art] Derive Key Pair - Done
3,108,566 UART: [art] Signing Cert with AUTHO
3,109,046 UART: RITY.KEYID = 7
3,124,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,167 UART: [art] PUB.X = CD7AF25C9C5F0A00AFC9DED290392253D733EA4C3DDE87474CD2316E02FF7ECE062F1847835DBE0B4CDF93909655DA92
3,131,919 UART: [art] PUB.Y = 7BCE5C41BB76ADEDB3A22A63C83D5F15D46A3E8F0E14A65A6D5A58104F480E51E2E5289FCE835937F8C4E6557DBFB6A7
3,138,881 UART: [art] SIG.R = C73B305781C3C0A1F4C7C9C3ECEA7A56D878FEB7D1E99B711FD04FF8A19521DDD951840AC89B24D17C0772128811E15D
3,145,655 UART: [art] SIG.S = 6BA65F71BB93A7CB26D770B4B1C4C51B971DF143C88CFBCF32D1B1021BDEBA32C1698B431DA18A2D80DB008CA7AD9711
3,169,845 UART: Caliptra RT
3,170,190 UART: [state] CFI Enabled
3,278,335 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,653 UART: [rt]cmd =0x44504543, len=96
3,343,171 >>> mbox cmd response data (56 bytes)
3,343,172 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,173 UART: [rt]cmd =0x44504543, len=92
3,564,566 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,640 >>> mbox cmd response data (12 bytes)
1,143,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,632,797 >>> mbox cmd response: success
2,632,797 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,694,927 UART:
2,694,943 UART: Running Caliptra FMC ...
2,695,351 UART:
2,695,494 UART: [state] CFI Enabled
2,705,775 UART: [fht] FMC Alias Private Key: 7
2,813,252 UART: [art] Extend RT PCRs Done
2,813,680 UART: [art] Lock RT PCRs Done
2,815,180 UART: [art] Populate DV Done
2,823,243 UART: [fht] FMC Alias Private Key: 7
2,824,413 UART: [art] Derive CDI
2,824,693 UART: [art] Store in in slot 0x4
2,910,232 UART: [art] Derive Key Pair
2,910,592 UART: [art] Store priv key in slot 0x5
2,923,498 UART: [art] Derive Key Pair - Done
2,938,134 UART: [art] Signing Cert with AUTHO
2,938,614 UART: RITY.KEYID = 7
2,954,224 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,989 UART: [art] PUB.X = 6C63B7E04A54CC1CA9246F17D8E19890C18C3E349A6FB3E90F2432FEF38E7958095A82BFFDC2D741E8BAA202811193AB
2,961,760 UART: [art] PUB.Y = 50D9C84E67E65EE9704778610AD8BDD51A8F02E6B15438CC0043A0B9952BDD38861F3FA07E4C07C983CED2F0B1E80C43
2,968,684 UART: [art] SIG.R = 7C77124AAD5D9D46BF2116560DBA6DF570FF793310014AED7BF389688E5FFF4F3E2EC1AA3A2C0D0B5D4B9BF0135E7E59
2,975,460 UART: [art] SIG.S = 08162267FE95254428064F2CA8B32ED2605FD7DF7BF02E9B226A33897BE7E7C27470D675784A0B1464B3CE5E997D1303
2,998,699 UART: Caliptra RT
2,999,044 UART: [state] CFI Enabled
3,119,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,305 UART: [rt]cmd =0x44504543, len=92
3,341,735 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,438 ready_for_fw is high
1,060,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,426 >>> mbox cmd response: success
2,628,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,691,238 UART:
2,691,254 UART: Running Caliptra FMC ...
2,691,662 UART:
2,691,805 UART: [state] CFI Enabled
2,702,886 UART: [fht] FMC Alias Private Key: 7
2,810,067 UART: [art] Extend RT PCRs Done
2,810,495 UART: [art] Lock RT PCRs Done
2,811,917 UART: [art] Populate DV Done
2,819,790 UART: [fht] FMC Alias Private Key: 7
2,820,896 UART: [art] Derive CDI
2,821,176 UART: [art] Store in in slot 0x4
2,906,855 UART: [art] Derive Key Pair
2,907,215 UART: [art] Store priv key in slot 0x5
2,920,047 UART: [art] Derive Key Pair - Done
2,934,779 UART: [art] Signing Cert with AUTHO
2,935,259 UART: RITY.KEYID = 7
2,950,795 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,560 UART: [art] PUB.X = 6C63B7E04A54CC1CA9246F17D8E19890C18C3E349A6FB3E90F2432FEF38E7958095A82BFFDC2D741E8BAA202811193AB
2,958,331 UART: [art] PUB.Y = 50D9C84E67E65EE9704778610AD8BDD51A8F02E6B15438CC0043A0B9952BDD38861F3FA07E4C07C983CED2F0B1E80C43
2,965,255 UART: [art] SIG.R = 7C77124AAD5D9D46BF2116560DBA6DF570FF793310014AED7BF389688E5FFF4F3E2EC1AA3A2C0D0B5D4B9BF0135E7E59
2,972,031 UART: [art] SIG.S = 08162267FE95254428064F2CA8B32ED2605FD7DF7BF02E9B226A33897BE7E7C27470D675784A0B1464B3CE5E997D1303
2,996,056 UART: Caliptra RT
2,996,401 UART: [state] CFI Enabled
3,104,700 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,836 UART: [rt]cmd =0x4d454153, len=108
3,156,282 >>> mbox cmd response data (12 bytes)
3,156,283 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,122 UART: [rt]cmd =0x44504543, len=92
3,377,964 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,488 ready_for_fw is high
1,060,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,710 >>> mbox cmd response: success
2,626,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,689,710 UART:
2,689,726 UART: Running Caliptra FMC ...
2,690,134 UART:
2,690,277 UART: [state] CFI Enabled
2,701,240 UART: [fht] FMC Alias Private Key: 7
2,809,051 UART: [art] Extend RT PCRs Done
2,809,479 UART: [art] Lock RT PCRs Done
2,810,995 UART: [art] Populate DV Done
2,819,340 UART: [fht] FMC Alias Private Key: 7
2,820,308 UART: [art] Derive CDI
2,820,588 UART: [art] Store in in slot 0x4
2,905,943 UART: [art] Derive Key Pair
2,906,303 UART: [art] Store priv key in slot 0x5
2,919,567 UART: [art] Derive Key Pair - Done
2,934,611 UART: [art] Signing Cert with AUTHO
2,935,091 UART: RITY.KEYID = 7
2,950,333 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,098 UART: [art] PUB.X = 6C63B7E04A54CC1CA9246F17D8E19890C18C3E349A6FB3E90F2432FEF38E7958095A82BFFDC2D741E8BAA202811193AB
2,957,869 UART: [art] PUB.Y = 50D9C84E67E65EE9704778610AD8BDD51A8F02E6B15438CC0043A0B9952BDD38861F3FA07E4C07C983CED2F0B1E80C43
2,964,793 UART: [art] SIG.R = 7C77124AAD5D9D46BF2116560DBA6DF570FF793310014AED7BF389688E5FFF4F3E2EC1AA3A2C0D0B5D4B9BF0135E7E59
2,971,569 UART: [art] SIG.S = 08162267FE95254428064F2CA8B32ED2605FD7DF7BF02E9B226A33897BE7E7C27470D675784A0B1464B3CE5E997D1303
2,995,238 UART: Caliptra RT
2,995,583 UART: [state] CFI Enabled
3,103,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,824 UART: [rt]cmd =0x44504543, len=96
3,167,338 >>> mbox cmd response data (56 bytes)
3,167,339 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,304 UART: [rt]cmd =0x44504543, len=92
3,388,718 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.33s
Truncated 4783 bytes from beginning
7
3,125,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,332 UART: [art] PUB.X = 4C890850BA03953CC7B2376A66960C3B45C54D43E24B78B8FE4569B12500901E52E391C2ED03030CC570A7A6507E61DF
3,133,058 UART: [art] PUB.Y = C8AE2DE6D0296F7DDA4721E1454612605CC3ECAECE1BA40D4D8689BDEABDF606C6AEAF535A0386DEB1A6BBB27528BF22
3,140,027 UART: [art] SIG.R = 336E3A26C43E33D6A58BEFAA83DE17D4F9E64C963D2A410D0421B9C91E243BB7AE989102877999D5F070B937A1BE2AF2
3,146,796 UART: [art] SIG.S = 6EBBA097EF8212B3A6D473540921FA67F957AA669D7A70CBA0329CC2ACABB59978336B90A2CFB5DFDCC800894DBB0B7D
3,170,397 UART: Caliptra RT
3,170,650 UART: [state] CFI Enabled
3,289,781 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,037 UART: [rt]cmd =0x44504543, len=92
3,512,150 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
899,931 UART: [kat] SHA2-256
901,871 UART: [kat] SHA2-384
904,720 UART: [kat] SHA2-512-ACC
906,621 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
920,904 UART: [kat] LMS
1,169,216 UART: [kat] --
1,170,191 UART: [cold-reset] ++
1,170,549 UART: [fht] FHT @ 0x50003400
1,173,223 UART: [idev] ++
1,173,391 UART: [idev] CDI.KEYID = 6
1,173,752 UART: [idev] SUBJECT.KEYID = 7
1,174,177 UART: [idev] UDS.KEYID = 0
1,174,523 ready_for_fw is high
1,174,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,133 UART: [idev] Erasing UDS.KEYID = 0
1,199,259 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,112 UART: [ldev] ++
1,209,280 UART: [ldev] CDI.KEYID = 6
1,209,644 UART: [ldev] SUBJECT.KEYID = 5
1,210,071 UART: [ldev] AUTHORITY.KEYID = 7
1,210,534 UART: [ldev] FE.KEYID = 1
1,215,382 UART: [ldev] Erasing FE.KEYID = 1
1,241,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,540 UART: [ldev] --
1,280,854 UART: [fwproc] Wait for Commands...
1,281,597 UART: [fwproc] Recv command 0x46574c44
1,282,330 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,882 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,870 >>> mbox cmd response: success
2,773,870 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,775,001 UART: [afmc] ++
2,775,169 UART: [afmc] CDI.KEYID = 6
2,775,532 UART: [afmc] SUBJECT.KEYID = 7
2,775,958 UART: [afmc] AUTHORITY.KEYID = 5
2,811,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,256 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,985 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,868 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,587 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,528 UART: [afmc] --
2,854,538 UART: [cold-reset] --
2,855,234 UART: [state] Locking Datavault
2,856,279 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,883 UART: [state] Locking ICCM
2,857,447 UART: [exit] Launching FMC @ 0x40000130
2,862,776 UART:
2,862,792 UART: Running Caliptra FMC ...
2,863,200 UART:
2,863,254 UART: [state] CFI Enabled
2,873,653 UART: [fht] FMC Alias Private Key: 7
2,981,114 UART: [art] Extend RT PCRs Done
2,981,542 UART: [art] Lock RT PCRs Done
2,982,970 UART: [art] Populate DV Done
2,991,129 UART: [fht] FMC Alias Private Key: 7
2,992,129 UART: [art] Derive CDI
2,992,409 UART: [art] Store in in slot 0x4
3,077,954 UART: [art] Derive Key Pair
3,078,314 UART: [art] Store priv key in slot 0x5
3,091,096 UART: [art] Derive Key Pair - Done
3,105,960 UART: [art] Signing Cert with AUTHO
3,106,440 UART: RITY.KEYID = 7
3,121,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,653 UART: [art] PUB.X = 4C890850BA03953CC7B2376A66960C3B45C54D43E24B78B8FE4569B12500901E52E391C2ED03030CC570A7A6507E61DF
3,129,379 UART: [art] PUB.Y = C8AE2DE6D0296F7DDA4721E1454612605CC3ECAECE1BA40D4D8689BDEABDF606C6AEAF535A0386DEB1A6BBB27528BF22
3,136,348 UART: [art] SIG.R = 336E3A26C43E33D6A58BEFAA83DE17D4F9E64C963D2A410D0421B9C91E243BB7AE989102877999D5F070B937A1BE2AF2
3,143,117 UART: [art] SIG.S = 6EBBA097EF8212B3A6D473540921FA67F957AA669D7A70CBA0329CC2ACABB59978336B90A2CFB5DFDCC800894DBB0B7D
3,167,288 UART: Caliptra RT
3,167,541 UART: [state] CFI Enabled
3,275,094 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,482 UART: [rt]cmd =0x4d454153, len=108
3,326,894 >>> mbox cmd response data (12 bytes)
3,326,895 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,872 UART: [rt]cmd =0x44504543, len=92
3,547,545 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,570 UART: [state] LifecycleState = Unprovisioned
85,225 UART: [state] DebugLocked = No
85,835 UART: [state] WD Timer not started. Device not locked for debugging
87,034 UART: [kat] SHA2-256
890,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,713 UART: [kat] ++
894,865 UART: [kat] sha1
899,073 UART: [kat] SHA2-256
901,013 UART: [kat] SHA2-384
903,748 UART: [kat] SHA2-512-ACC
905,649 UART: [kat] ECC-384
915,252 UART: [kat] HMAC-384Kdf
919,870 UART: [kat] LMS
1,168,182 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,675 UART: [fht] FHT @ 0x50003400
1,172,323 UART: [idev] ++
1,172,491 UART: [idev] CDI.KEYID = 6
1,172,852 UART: [idev] SUBJECT.KEYID = 7
1,173,277 UART: [idev] UDS.KEYID = 0
1,173,623 ready_for_fw is high
1,173,623 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,325 UART: [idev] Erasing UDS.KEYID = 0
1,198,471 UART: [idev] Sha1 KeyId Algorithm
1,207,491 UART: [idev] --
1,208,618 UART: [ldev] ++
1,208,786 UART: [ldev] CDI.KEYID = 6
1,209,150 UART: [ldev] SUBJECT.KEYID = 5
1,209,577 UART: [ldev] AUTHORITY.KEYID = 7
1,210,040 UART: [ldev] FE.KEYID = 1
1,215,052 UART: [ldev] Erasing FE.KEYID = 1
1,241,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,002 UART: [ldev] --
1,280,410 UART: [fwproc] Wait for Commands...
1,281,051 UART: [fwproc] Recv command 0x46574c44
1,281,784 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,646 >>> mbox cmd response: success
2,773,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,831 UART: [afmc] ++
2,774,999 UART: [afmc] CDI.KEYID = 6
2,775,362 UART: [afmc] SUBJECT.KEYID = 7
2,775,788 UART: [afmc] AUTHORITY.KEYID = 5
2,811,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,512 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,124 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,843 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,742 UART: [afmc] --
2,854,652 UART: [cold-reset] --
2,855,454 UART: [state] Locking Datavault
2,856,773 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,377 UART: [state] Locking ICCM
2,857,911 UART: [exit] Launching FMC @ 0x40000130
2,863,240 UART:
2,863,256 UART: Running Caliptra FMC ...
2,863,664 UART:
2,863,718 UART: [state] CFI Enabled
2,874,055 UART: [fht] FMC Alias Private Key: 7
2,982,322 UART: [art] Extend RT PCRs Done
2,982,750 UART: [art] Lock RT PCRs Done
2,984,256 UART: [art] Populate DV Done
2,992,643 UART: [fht] FMC Alias Private Key: 7
2,993,647 UART: [art] Derive CDI
2,993,927 UART: [art] Store in in slot 0x4
3,079,274 UART: [art] Derive Key Pair
3,079,634 UART: [art] Store priv key in slot 0x5
3,092,946 UART: [art] Derive Key Pair - Done
3,107,328 UART: [art] Signing Cert with AUTHO
3,107,808 UART: RITY.KEYID = 7
3,122,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,175 UART: [art] PUB.X = 4C890850BA03953CC7B2376A66960C3B45C54D43E24B78B8FE4569B12500901E52E391C2ED03030CC570A7A6507E61DF
3,129,901 UART: [art] PUB.Y = C8AE2DE6D0296F7DDA4721E1454612605CC3ECAECE1BA40D4D8689BDEABDF606C6AEAF535A0386DEB1A6BBB27528BF22
3,136,870 UART: [art] SIG.R = 336E3A26C43E33D6A58BEFAA83DE17D4F9E64C963D2A410D0421B9C91E243BB7AE989102877999D5F070B937A1BE2AF2
3,143,639 UART: [art] SIG.S = 6EBBA097EF8212B3A6D473540921FA67F957AA669D7A70CBA0329CC2ACABB59978336B90A2CFB5DFDCC800894DBB0B7D
3,167,172 UART: Caliptra RT
3,167,425 UART: [state] CFI Enabled
3,274,518 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,750 UART: [rt]cmd =0x44504543, len=96
3,338,078 >>> mbox cmd response data (56 bytes)
3,338,079 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,994 UART: [rt]cmd =0x44504543, len=92
3,558,671 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,156 >>> mbox cmd response data (12 bytes)
1,139,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,722 >>> mbox cmd response: success
2,626,722 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,688,916 UART:
2,688,932 UART: Running Caliptra FMC ...
2,689,340 UART:
2,689,394 UART: [state] CFI Enabled
2,699,711 UART: [fht] FMC Alias Private Key: 7
2,807,304 UART: [art] Extend RT PCRs Done
2,807,732 UART: [art] Lock RT PCRs Done
2,809,270 UART: [art] Populate DV Done
2,817,461 UART: [fht] FMC Alias Private Key: 7
2,818,623 UART: [art] Derive CDI
2,818,903 UART: [art] Store in in slot 0x4
2,904,750 UART: [art] Derive Key Pair
2,905,110 UART: [art] Store priv key in slot 0x5
2,918,066 UART: [art] Derive Key Pair - Done
2,932,634 UART: [art] Signing Cert with AUTHO
2,933,114 UART: RITY.KEYID = 7
2,948,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,091 UART: [art] PUB.X = 1B81C212CEFABB1CF42895A3811F0BFA51DD4BA1A8C4212408465D4059C6F19ADFA8C2F8E38411D3784A634309A30FFD
2,955,861 UART: [art] PUB.Y = BA36675FF9DCF1AE51DE8B3D9822308A30D752AE7995E9F269492920593AEBD6A6947764F3FA616D979CD5C3E83902BB
2,962,814 UART: [art] SIG.R = E1994D01B59072959083406E5EB8045FBD82355AD2FB9D72B5FCD26E1ED972B0071D2084D4A4A6BD2EB3A4249D1733F4
2,969,579 UART: [art] SIG.S = 9CBB5F89B51792AC41B8F03578F9A45E62A6ACDB9B8F13DD64F9D10C47596392C873FC23B56011D11414B3CD42A8BBF9
2,993,477 UART: Caliptra RT
2,993,730 UART: [state] CFI Enabled
3,113,352 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,300 UART: [rt]cmd =0x44504543, len=92
3,335,847 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,826 ready_for_fw is high
1,056,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,452 >>> mbox cmd response: success
2,625,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,686,458 UART:
2,686,474 UART: Running Caliptra FMC ...
2,686,882 UART:
2,686,936 UART: [state] CFI Enabled
2,697,521 UART: [fht] FMC Alias Private Key: 7
2,805,322 UART: [art] Extend RT PCRs Done
2,805,750 UART: [art] Lock RT PCRs Done
2,807,674 UART: [art] Populate DV Done
2,816,055 UART: [fht] FMC Alias Private Key: 7
2,817,047 UART: [art] Derive CDI
2,817,327 UART: [art] Store in in slot 0x4
2,902,606 UART: [art] Derive Key Pair
2,902,966 UART: [art] Store priv key in slot 0x5
2,916,156 UART: [art] Derive Key Pair - Done
2,930,956 UART: [art] Signing Cert with AUTHO
2,931,436 UART: RITY.KEYID = 7
2,946,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,319 UART: [art] PUB.X = 1B81C212CEFABB1CF42895A3811F0BFA51DD4BA1A8C4212408465D4059C6F19ADFA8C2F8E38411D3784A634309A30FFD
2,954,089 UART: [art] PUB.Y = BA36675FF9DCF1AE51DE8B3D9822308A30D752AE7995E9F269492920593AEBD6A6947764F3FA616D979CD5C3E83902BB
2,961,042 UART: [art] SIG.R = E1994D01B59072959083406E5EB8045FBD82355AD2FB9D72B5FCD26E1ED972B0071D2084D4A4A6BD2EB3A4249D1733F4
2,967,807 UART: [art] SIG.S = 9CBB5F89B51792AC41B8F03578F9A45E62A6ACDB9B8F13DD64F9D10C47596392C873FC23B56011D11414B3CD42A8BBF9
2,992,043 UART: Caliptra RT
2,992,296 UART: [state] CFI Enabled
3,099,968 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,006 UART: [rt]cmd =0x4d454153, len=108
3,150,996 >>> mbox cmd response data (12 bytes)
3,150,997 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,910 UART: [rt]cmd =0x44504543, len=92
3,371,239 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,054 ready_for_fw is high
1,055,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,154 >>> mbox cmd response: success
2,623,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,684,772 UART:
2,684,788 UART: Running Caliptra FMC ...
2,685,196 UART:
2,685,250 UART: [state] CFI Enabled
2,695,527 UART: [fht] FMC Alias Private Key: 7
2,803,108 UART: [art] Extend RT PCRs Done
2,803,536 UART: [art] Lock RT PCRs Done
2,805,114 UART: [art] Populate DV Done
2,813,337 UART: [fht] FMC Alias Private Key: 7
2,814,491 UART: [art] Derive CDI
2,814,771 UART: [art] Store in in slot 0x4
2,900,748 UART: [art] Derive Key Pair
2,901,108 UART: [art] Store priv key in slot 0x5
2,914,194 UART: [art] Derive Key Pair - Done
2,928,722 UART: [art] Signing Cert with AUTHO
2,929,202 UART: RITY.KEYID = 7
2,944,158 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,923 UART: [art] PUB.X = 1B81C212CEFABB1CF42895A3811F0BFA51DD4BA1A8C4212408465D4059C6F19ADFA8C2F8E38411D3784A634309A30FFD
2,951,693 UART: [art] PUB.Y = BA36675FF9DCF1AE51DE8B3D9822308A30D752AE7995E9F269492920593AEBD6A6947764F3FA616D979CD5C3E83902BB
2,958,646 UART: [art] SIG.R = E1994D01B59072959083406E5EB8045FBD82355AD2FB9D72B5FCD26E1ED972B0071D2084D4A4A6BD2EB3A4249D1733F4
2,965,411 UART: [art] SIG.S = 9CBB5F89B51792AC41B8F03578F9A45E62A6ACDB9B8F13DD64F9D10C47596392C873FC23B56011D11414B3CD42A8BBF9
2,989,263 UART: Caliptra RT
2,989,516 UART: [state] CFI Enabled
3,097,680 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,860 UART: [rt]cmd =0x44504543, len=96
3,161,430 >>> mbox cmd response data (56 bytes)
3,161,431 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,196 UART: [rt]cmd =0x44504543, len=92
3,383,119 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.86s
Truncated 4783 bytes from beginning
7
3,126,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,670 UART: [art] PUB.X = 7589298F896F1474467B85345A731E51CA3B5B87F343FA1C947FC065E2E3FB6E44BFB8BA51460E6612C517E6A7D4056D
3,134,434 UART: [art] PUB.Y = 7BC0CA37DEFD09FA58D5D020782DF209F49A5CE2D2D9F0D3D46BE5C18D19669F36B3D7C77DB030780D0D684A26DFBC36
3,141,390 UART: [art] SIG.R = 34A07F60D5F58F40F8C440F346228BEA563A47E33963D0C284F7EDF99A816713CE21B26AB42C96FA10D4A67AED35D284
3,148,166 UART: [art] SIG.S = ED56A2E80C201C352B932CD265C8D0072134202CA70D8F499119458465797141FF0F5A02C5DCAD2ADD4807116C6EE1E9
3,171,941 UART: Caliptra RT
3,172,286 UART: [state] CFI Enabled
3,291,367 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,259 UART: [rt]cmd =0x44504543, len=92
3,513,242 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
891,339 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,468 UART: [kat] ++
895,620 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,871 UART: [kat] LMS
1,169,183 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,452 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,174,470 ready_for_fw is high
1,174,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,952 UART: [idev] Erasing UDS.KEYID = 0
1,198,612 UART: [idev] Sha1 KeyId Algorithm
1,207,490 UART: [idev] --
1,208,699 UART: [ldev] ++
1,208,867 UART: [ldev] CDI.KEYID = 6
1,209,231 UART: [ldev] SUBJECT.KEYID = 5
1,209,658 UART: [ldev] AUTHORITY.KEYID = 7
1,210,121 UART: [ldev] FE.KEYID = 1
1,215,177 UART: [ldev] Erasing FE.KEYID = 1
1,240,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,711 UART: [ldev] --
1,280,209 UART: [fwproc] Wait for Commands...
1,280,992 UART: [fwproc] Recv command 0x46574c44
1,281,725 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,593 >>> mbox cmd response: success
2,773,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,774,858 UART: [afmc] ++
2,775,026 UART: [afmc] CDI.KEYID = 6
2,775,389 UART: [afmc] SUBJECT.KEYID = 7
2,775,815 UART: [afmc] AUTHORITY.KEYID = 5
2,811,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,641 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,370 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,253 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,972 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,811 UART: [afmc] --
2,854,721 UART: [cold-reset] --
2,855,341 UART: [state] Locking Datavault
2,856,478 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,082 UART: [state] Locking ICCM
2,857,742 UART: [exit] Launching FMC @ 0x40000130
2,863,071 UART:
2,863,087 UART: Running Caliptra FMC ...
2,863,495 UART:
2,863,638 UART: [state] CFI Enabled
2,873,907 UART: [fht] FMC Alias Private Key: 7
2,981,910 UART: [art] Extend RT PCRs Done
2,982,338 UART: [art] Lock RT PCRs Done
2,983,752 UART: [art] Populate DV Done
2,992,009 UART: [fht] FMC Alias Private Key: 7
2,993,085 UART: [art] Derive CDI
2,993,365 UART: [art] Store in in slot 0x4
3,079,150 UART: [art] Derive Key Pair
3,079,510 UART: [art] Store priv key in slot 0x5
3,093,070 UART: [art] Derive Key Pair - Done
3,107,946 UART: [art] Signing Cert with AUTHO
3,108,426 UART: RITY.KEYID = 7
3,123,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,111 UART: [art] PUB.X = 7589298F896F1474467B85345A731E51CA3B5B87F343FA1C947FC065E2E3FB6E44BFB8BA51460E6612C517E6A7D4056D
3,130,875 UART: [art] PUB.Y = 7BC0CA37DEFD09FA58D5D020782DF209F49A5CE2D2D9F0D3D46BE5C18D19669F36B3D7C77DB030780D0D684A26DFBC36
3,137,831 UART: [art] SIG.R = 34A07F60D5F58F40F8C440F346228BEA563A47E33963D0C284F7EDF99A816713CE21B26AB42C96FA10D4A67AED35D284
3,144,607 UART: [art] SIG.S = ED56A2E80C201C352B932CD265C8D0072134202CA70D8F499119458465797141FF0F5A02C5DCAD2ADD4807116C6EE1E9
3,168,586 UART: Caliptra RT
3,168,931 UART: [state] CFI Enabled
3,277,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,554 UART: [rt]cmd =0x4d454153, len=108
3,329,762 >>> mbox cmd response data (12 bytes)
3,329,763 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,742 UART: [rt]cmd =0x44504543, len=92
3,551,819 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
921,103 UART: [kat] LMS
1,169,415 UART: [kat] --
1,170,362 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,602 UART: [idev] ++
1,173,770 UART: [idev] CDI.KEYID = 6
1,174,131 UART: [idev] SUBJECT.KEYID = 7
1,174,556 UART: [idev] UDS.KEYID = 0
1,174,902 ready_for_fw is high
1,174,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,522 UART: [idev] Sha1 KeyId Algorithm
1,208,392 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,751 UART: [ldev] --
1,282,087 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x46574c44
1,283,435 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,769 >>> mbox cmd response: success
2,774,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,775,856 UART: [afmc] ++
2,776,024 UART: [afmc] CDI.KEYID = 6
2,776,387 UART: [afmc] SUBJECT.KEYID = 7
2,776,813 UART: [afmc] AUTHORITY.KEYID = 5
2,812,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,125 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,854 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,737 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,456 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,209 UART: [afmc] --
2,856,231 UART: [cold-reset] --
2,857,175 UART: [state] Locking Datavault
2,858,508 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,112 UART: [state] Locking ICCM
2,859,740 UART: [exit] Launching FMC @ 0x40000130
2,865,069 UART:
2,865,085 UART: Running Caliptra FMC ...
2,865,493 UART:
2,865,636 UART: [state] CFI Enabled
2,875,903 UART: [fht] FMC Alias Private Key: 7
2,984,304 UART: [art] Extend RT PCRs Done
2,984,732 UART: [art] Lock RT PCRs Done
2,986,290 UART: [art] Populate DV Done
2,994,341 UART: [fht] FMC Alias Private Key: 7
2,995,319 UART: [art] Derive CDI
2,995,599 UART: [art] Store in in slot 0x4
3,081,658 UART: [art] Derive Key Pair
3,082,018 UART: [art] Store priv key in slot 0x5
3,095,086 UART: [art] Derive Key Pair - Done
3,109,836 UART: [art] Signing Cert with AUTHO
3,110,316 UART: RITY.KEYID = 7
3,125,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,419 UART: [art] PUB.X = 7589298F896F1474467B85345A731E51CA3B5B87F343FA1C947FC065E2E3FB6E44BFB8BA51460E6612C517E6A7D4056D
3,133,183 UART: [art] PUB.Y = 7BC0CA37DEFD09FA58D5D020782DF209F49A5CE2D2D9F0D3D46BE5C18D19669F36B3D7C77DB030780D0D684A26DFBC36
3,140,139 UART: [art] SIG.R = 34A07F60D5F58F40F8C440F346228BEA563A47E33963D0C284F7EDF99A816713CE21B26AB42C96FA10D4A67AED35D284
3,146,915 UART: [art] SIG.S = ED56A2E80C201C352B932CD265C8D0072134202CA70D8F499119458465797141FF0F5A02C5DCAD2ADD4807116C6EE1E9
3,170,340 UART: Caliptra RT
3,170,685 UART: [state] CFI Enabled
3,278,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,982 UART: [rt]cmd =0x44504543, len=96
3,342,344 >>> mbox cmd response data (56 bytes)
3,342,345 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,178 UART: [rt]cmd =0x44504543, len=92
3,563,327 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,247 >>> mbox cmd response data (12 bytes)
1,140,248 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,929 >>> mbox cmd response: success
2,627,929 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,690,005 UART:
2,690,021 UART: Running Caliptra FMC ...
2,690,429 UART:
2,690,572 UART: [state] CFI Enabled
2,701,377 UART: [fht] FMC Alias Private Key: 7
2,809,438 UART: [art] Extend RT PCRs Done
2,809,866 UART: [art] Lock RT PCRs Done
2,811,272 UART: [art] Populate DV Done
2,819,597 UART: [fht] FMC Alias Private Key: 7
2,820,683 UART: [art] Derive CDI
2,820,963 UART: [art] Store in in slot 0x4
2,906,910 UART: [art] Derive Key Pair
2,907,270 UART: [art] Store priv key in slot 0x5
2,920,666 UART: [art] Derive Key Pair - Done
2,935,699 UART: [art] Signing Cert with AUTHO
2,936,179 UART: RITY.KEYID = 7
2,950,913 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,678 UART: [art] PUB.X = E727C907CD84444D5D360A25C2717FA7E8A1AA03BD4F716E098F8FD89E3C4390DAC423DDD10C2867F7F7A9FA434D64AE
2,958,447 UART: [art] PUB.Y = EC95AB047DC56767252E122C950E8A7BF1938335FD7445B924BC90CBB91D7A15475B490C740338421DD2B2E0D31FEB5B
2,965,389 UART: [art] SIG.R = 492EAFCC8C0EB136ECFD8C24C50CE982741155F95FCB7A6B8093DEA2F6F02F8F0F7B628FD0CD18076D241A5751B829B0
2,972,163 UART: [art] SIG.S = B6D7C5C02293FD232D88898366BDF5B97A99F6D26D10AE11195AC817D3700EED091BD7E5FC338AB5EAEA07E43521A4D0
2,995,447 UART: Caliptra RT
2,995,792 UART: [state] CFI Enabled
3,115,485 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,779 UART: [rt]cmd =0x44504543, len=92
3,337,842 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,353 ready_for_fw is high
1,056,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,677 >>> mbox cmd response: success
2,624,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,686,661 UART:
2,686,677 UART: Running Caliptra FMC ...
2,687,085 UART:
2,687,228 UART: [state] CFI Enabled
2,697,891 UART: [fht] FMC Alias Private Key: 7
2,806,314 UART: [art] Extend RT PCRs Done
2,806,742 UART: [art] Lock RT PCRs Done
2,808,638 UART: [art] Populate DV Done
2,816,857 UART: [fht] FMC Alias Private Key: 7
2,817,937 UART: [art] Derive CDI
2,818,217 UART: [art] Store in in slot 0x4
2,904,108 UART: [art] Derive Key Pair
2,904,468 UART: [art] Store priv key in slot 0x5
2,917,852 UART: [art] Derive Key Pair - Done
2,933,003 UART: [art] Signing Cert with AUTHO
2,933,483 UART: RITY.KEYID = 7
2,949,113 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,878 UART: [art] PUB.X = E727C907CD84444D5D360A25C2717FA7E8A1AA03BD4F716E098F8FD89E3C4390DAC423DDD10C2867F7F7A9FA434D64AE
2,956,647 UART: [art] PUB.Y = EC95AB047DC56767252E122C950E8A7BF1938335FD7445B924BC90CBB91D7A15475B490C740338421DD2B2E0D31FEB5B
2,963,589 UART: [art] SIG.R = 492EAFCC8C0EB136ECFD8C24C50CE982741155F95FCB7A6B8093DEA2F6F02F8F0F7B628FD0CD18076D241A5751B829B0
2,970,363 UART: [art] SIG.S = B6D7C5C02293FD232D88898366BDF5B97A99F6D26D10AE11195AC817D3700EED091BD7E5FC338AB5EAEA07E43521A4D0
2,994,133 UART: Caliptra RT
2,994,478 UART: [state] CFI Enabled
3,101,767 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,779 UART: [rt]cmd =0x4d454153, len=108
3,154,571 >>> mbox cmd response data (12 bytes)
3,154,572 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,439 UART: [rt]cmd =0x44504543, len=92
3,375,038 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,655 ready_for_fw is high
1,056,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,797 >>> mbox cmd response: success
2,624,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,686,375 UART:
2,686,391 UART: Running Caliptra FMC ...
2,686,799 UART:
2,686,942 UART: [state] CFI Enabled
2,697,585 UART: [fht] FMC Alias Private Key: 7
2,805,998 UART: [art] Extend RT PCRs Done
2,806,426 UART: [art] Lock RT PCRs Done
2,808,018 UART: [art] Populate DV Done
2,816,135 UART: [fht] FMC Alias Private Key: 7
2,817,139 UART: [art] Derive CDI
2,817,419 UART: [art] Store in in slot 0x4
2,903,182 UART: [art] Derive Key Pair
2,903,542 UART: [art] Store priv key in slot 0x5
2,916,886 UART: [art] Derive Key Pair - Done
2,931,695 UART: [art] Signing Cert with AUTHO
2,932,175 UART: RITY.KEYID = 7
2,947,491 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,256 UART: [art] PUB.X = E727C907CD84444D5D360A25C2717FA7E8A1AA03BD4F716E098F8FD89E3C4390DAC423DDD10C2867F7F7A9FA434D64AE
2,955,025 UART: [art] PUB.Y = EC95AB047DC56767252E122C950E8A7BF1938335FD7445B924BC90CBB91D7A15475B490C740338421DD2B2E0D31FEB5B
2,961,967 UART: [art] SIG.R = 492EAFCC8C0EB136ECFD8C24C50CE982741155F95FCB7A6B8093DEA2F6F02F8F0F7B628FD0CD18076D241A5751B829B0
2,968,741 UART: [art] SIG.S = B6D7C5C02293FD232D88898366BDF5B97A99F6D26D10AE11195AC817D3700EED091BD7E5FC338AB5EAEA07E43521A4D0
2,993,337 UART: Caliptra RT
2,993,682 UART: [state] CFI Enabled
3,102,001 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,359 UART: [rt]cmd =0x44504543, len=96
3,165,481 >>> mbox cmd response data (56 bytes)
3,165,482 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,477 UART: [rt]cmd =0x44504543, len=92
3,387,184 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,147 UART:
192,504 UART: Running Caliptra ROM ...
193,709 UART:
193,891 UART: [state] CFI Enabled
263,477 UART: [state] LifecycleState = Unprovisioned
265,464 UART: [state] DebugLocked = No
268,283 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,368 UART: [kat] SHA2-256
442,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,499 UART: [kat] ++
453,023 UART: [kat] sha1
463,688 UART: [kat] SHA2-256
466,396 UART: [kat] SHA2-384
473,886 UART: [kat] SHA2-512-ACC
476,263 UART: [kat] ECC-384
2,765,075 UART: [kat] HMAC-384Kdf
2,777,387 UART: [kat] LMS
3,967,655 UART: [kat] --
3,972,539 UART: [cold-reset] ++
3,975,188 UART: [fht] Storing FHT @ 0x50003400
3,985,960 UART: [idev] ++
3,986,524 UART: [idev] CDI.KEYID = 6
3,987,479 UART: [idev] SUBJECT.KEYID = 7
3,988,726 UART: [idev] UDS.KEYID = 0
3,989,720 ready_for_fw is high
3,989,938 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,554 UART: [idev] Erasing UDS.KEYID = 0
7,323,139 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,849 UART: [idev] --
7,348,270 UART: [ldev] ++
7,348,845 UART: [ldev] CDI.KEYID = 6
7,349,824 UART: [ldev] SUBJECT.KEYID = 5
7,351,041 UART: [ldev] AUTHORITY.KEYID = 7
7,352,278 UART: [ldev] FE.KEYID = 1
7,398,881 UART: [ldev] Erasing FE.KEYID = 1
10,731,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,055 UART: [ldev] --
13,114,134 UART: [fwproc] Waiting for Commands...
13,116,441 UART: [fwproc] Received command 0x46574c44
13,118,669 UART: [fwproc] Received Image of size 114124 bytes
17,174,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,802 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,694 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,638,561 >>> mbox cmd response: success
17,639,094 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,641,939 UART: [afmc] ++
17,642,598 UART: [afmc] CDI.KEYID = 6
17,643,486 UART: [afmc] SUBJECT.KEYID = 7
17,644,756 UART: [afmc] AUTHORITY.KEYID = 5
21,005,557 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,253 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,558 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,935 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,814 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,199 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,271 UART: [afmc] --
23,377,628 UART: [cold-reset] --
23,381,492 UART: [state] Locking Datavault
23,387,168 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,921 UART: [state] Locking ICCM
23,390,314 UART: [exit] Launching FMC @ 0x40000130
23,398,713 UART:
23,398,975 UART: Running Caliptra FMC ...
23,400,078 UART:
23,400,241 UART: [state] CFI Enabled
23,466,388 UART: [fht] FMC Alias Private Key: 7
25,804,115 UART: [art] Extend RT PCRs Done
25,805,331 UART: [art] Lock RT PCRs Done
25,806,945 UART: [art] Populate DV Done
25,812,575 UART: [fht] FMC Alias Private Key: 7
25,814,273 UART: [art] Derive CDI
25,815,006 UART: [art] Store in in slot 0x4
25,875,604 UART: [art] Derive Key Pair
25,876,644 UART: [art] Store priv key in slot 0x5
29,169,081 UART: [art] Derive Key Pair - Done
29,182,455 UART: [art] Signing Cert with AUTHO
29,183,750 UART: RITY.KEYID = 7
31,471,581 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,109 UART: [art] PUB.X = FA0AF1091CE3D53D3E815E8CB8CA272DF962F20425EDE61336F9CCDFAF2FF9AE025E000835470F614C19EA8A2A6280C5
31,480,356 UART: [art] PUB.Y = 97E8163077E62F3FD2594F601660653E096449CDA8961E8D258521D13ABB69CD76F035F7389586450437369DCDF0E678
31,487,589 UART: [art] SIG.R = A0BDD72582B79FA082A6FF4878770457567BD622D8279B8CE69E9C524970983CA8A21F7801362591A142A440BDEC54D0
31,494,988 UART: [art] SIG.S = AB9793A3BFC3C59CB7AEB715AFB6BDA723D16AA79AF4F84DA65616E4C8CE6768D2194135C9065CD8E9B61C5A6EED7B87
32,800,186 UART: Caliptra RT
32,800,895 UART: [state] CFI Enabled
32,962,702 UART: [rt] RT listening for mailbox commands...
32,993,795 UART: [rt]cmd =0x43455252, len=4
33,005,207 >>> mbox cmd response data (784 bytes)
33,048,744 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,079,391 UART: [rt]cmd =0x44504543, len=92
38,846,491 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,809,494 ready_for_fw is high
3,809,916 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,898,863 >>> mbox cmd response: success
17,899,884 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,589,922 UART:
23,590,320 UART: Running Caliptra FMC ...
23,591,437 UART:
23,591,614 UART: [state] CFI Enabled
23,661,370 UART: [fht] FMC Alias Private Key: 7
25,999,676 UART: [art] Extend RT PCRs Done
26,000,903 UART: [art] Lock RT PCRs Done
26,003,136 UART: [art] Populate DV Done
26,008,504 UART: [fht] FMC Alias Private Key: 7
26,010,225 UART: [art] Derive CDI
26,011,050 UART: [art] Store in in slot 0x4
26,069,923 UART: [art] Derive Key Pair
26,070,968 UART: [art] Store priv key in slot 0x5
29,363,878 UART: [art] Derive Key Pair - Done
29,376,775 UART: [art] Signing Cert with AUTHO
29,378,080 UART: RITY.KEYID = 7
31,665,902 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,411 UART: [art] PUB.X = 89C71885E2620223A9A6BC19E5DEDBB452FFABE4C07036163D940DE6CFD45916A43F5F9CF23FD050C5B8776D0FC23D43
31,674,687 UART: [art] PUB.Y = 1028F95E8A60753DD61371D2231EFEC6158B4BC67EE5033060A053E5C14BBF8B7111B47B1D7C5CBF715F7B4A7884E551
31,681,912 UART: [art] SIG.R = B045220809176C18B77B6F4315FD2F68AB97C8BE316767D8F25778FE67931919C6F970B1F42F32166EAB6957527E0C6A
31,689,279 UART: [art] SIG.S = 5D8F59BEBAD9CB360D1F8B1F8BAEFC8810722009E49806565B97808F727F1EDEE784CD208F513DE6D314347F9A7365FC
32,994,273 UART: Caliptra RT
32,994,991 UART: [state] CFI Enabled
33,157,230 UART: [rt] RT listening for mailbox commands...
33,188,544 UART: [rt]cmd =0x43455252, len=4
33,199,911 >>> mbox cmd response data (783 bytes)
33,243,493 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,274,304 UART: [rt]cmd =0x44504543, len=92
39,022,025 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,508 UART:
192,859 UART: Running Caliptra ROM ...
194,039 UART:
603,620 UART: [state] CFI Enabled
618,921 UART: [state] LifecycleState = Unprovisioned
620,863 UART: [state] DebugLocked = No
623,912 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,734 UART: [kat] SHA2-256
798,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,026 UART: [kat] ++
809,632 UART: [kat] sha1
819,951 UART: [kat] SHA2-256
822,663 UART: [kat] SHA2-384
829,705 UART: [kat] SHA2-512-ACC
832,075 UART: [kat] ECC-384
3,115,939 UART: [kat] HMAC-384Kdf
3,127,746 UART: [kat] LMS
4,317,913 UART: [kat] --
4,323,819 UART: [cold-reset] ++
4,326,049 UART: [fht] Storing FHT @ 0x50003400
4,337,664 UART: [idev] ++
4,338,224 UART: [idev] CDI.KEYID = 6
4,339,195 UART: [idev] SUBJECT.KEYID = 7
4,340,434 UART: [idev] UDS.KEYID = 0
4,341,411 ready_for_fw is high
4,341,592 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,263 UART: [idev] Erasing UDS.KEYID = 0
7,626,197 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,000 UART: [idev] --
7,650,644 UART: [ldev] ++
7,651,212 UART: [ldev] CDI.KEYID = 6
7,652,168 UART: [ldev] SUBJECT.KEYID = 5
7,653,374 UART: [ldev] AUTHORITY.KEYID = 7
7,654,652 UART: [ldev] FE.KEYID = 1
7,664,374 UART: [ldev] Erasing FE.KEYID = 1
10,952,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,358 UART: [ldev] --
13,313,210 UART: [fwproc] Waiting for Commands...
13,316,541 UART: [fwproc] Received command 0x46574c44
13,318,770 UART: [fwproc] Received Image of size 114124 bytes
17,367,456 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,554 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,402 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,829,351 >>> mbox cmd response: success
17,829,899 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,834,197 UART: [afmc] ++
17,834,783 UART: [afmc] CDI.KEYID = 6
17,835,764 UART: [afmc] SUBJECT.KEYID = 7
17,836,980 UART: [afmc] AUTHORITY.KEYID = 5
21,150,623 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,427 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,839 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,670 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,111 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,632 UART: [afmc] --
23,516,588 UART: [cold-reset] --
23,519,654 UART: [state] Locking Datavault
23,523,065 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,818 UART: [state] Locking ICCM
23,527,292 UART: [exit] Launching FMC @ 0x40000130
23,535,679 UART:
23,535,903 UART: Running Caliptra FMC ...
23,537,015 UART:
23,537,176 UART: [state] CFI Enabled
23,545,159 UART: [fht] FMC Alias Private Key: 7
25,875,937 UART: [art] Extend RT PCRs Done
25,877,152 UART: [art] Lock RT PCRs Done
25,878,792 UART: [art] Populate DV Done
25,884,573 UART: [fht] FMC Alias Private Key: 7
25,886,100 UART: [art] Derive CDI
25,886,827 UART: [art] Store in in slot 0x4
25,929,572 UART: [art] Derive Key Pair
25,930,605 UART: [art] Store priv key in slot 0x5
29,172,361 UART: [art] Derive Key Pair - Done
29,185,404 UART: [art] Signing Cert with AUTHO
29,186,705 UART: RITY.KEYID = 7
31,465,980 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,477 UART: [art] PUB.X = DB032DC8CC02D32D0AA2F2429536BDA950BF863D84F45969BB40F5D7BB556187653A31C6D6FB202541AC5005EB3EE725
31,474,732 UART: [art] PUB.Y = 62D2F7626823FA066422D9C73415B18A0DB9546E28196B185AF27BE593E9CA9C2C311654B3A37370E28D2E170EC0BF01
31,481,950 UART: [art] SIG.R = F9AF848B4651A027DA5EF3131C1ABFA563F5C99F552E875A17FF974D46962A2B6C3F19820416D6801C20FC56FCDD3FC1
31,489,340 UART: [art] SIG.S = 0C48D03E4975D2F7D3A5E0BF2CB09C5F0DA5640965DA7C8B217896C6B39F0F5B1604A9A331F9340B06E3ED162AB00D7D
32,794,843 UART: Caliptra RT
32,795,546 UART: [state] CFI Enabled
32,913,523 UART: [rt] RT listening for mailbox commands...
32,944,934 UART: [rt]cmd =0x43455252, len=4
32,956,333 >>> mbox cmd response data (783 bytes)
32,999,558 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,030,134 UART: [rt]cmd =0x44504543, len=92
38,704,240 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
4,122,546 ready_for_fw is high
4,122,935 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,200 >>> mbox cmd response: success
18,072,108 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,710,664 UART:
23,711,046 UART: Running Caliptra FMC ...
23,712,253 UART:
23,712,411 UART: [state] CFI Enabled
23,720,629 UART: [fht] FMC Alias Private Key: 7
26,051,337 UART: [art] Extend RT PCRs Done
26,052,563 UART: [art] Lock RT PCRs Done
26,054,514 UART: [art] Populate DV Done
26,059,655 UART: [fht] FMC Alias Private Key: 7
26,061,359 UART: [art] Derive CDI
26,062,391 UART: [art] Store in in slot 0x4
26,104,833 UART: [art] Derive Key Pair
26,105,833 UART: [art] Store priv key in slot 0x5
29,348,446 UART: [art] Derive Key Pair - Done
29,361,450 UART: [art] Signing Cert with AUTHO
29,362,755 UART: RITY.KEYID = 7
31,642,516 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,024 UART: [art] PUB.X = CA5010D4D84F29B8E849E738170FD15BC0669D0BCC9840B9AA3A84F7FED33527E1C1C452DF5C089FE54C0853A76F3CEB
31,651,273 UART: [art] PUB.Y = EB21A8F18778D30C7D13E80DE2AFEF2A87DD9FDAB3771B905700983454A16439669A00FB7A4969F81E371139A5D70952
31,658,493 UART: [art] SIG.R = 195C99B30A2798C0ED31BDB026B11A2CCD6FF27F479B4CAB144F8BFBD0E67C674D396BE7D1954E194D865150061CC25E
31,665,939 UART: [art] SIG.S = B0E6FDA0BAF0CF784E203EA2AFA1F14DA8F8D34912978B4F6061228BD8973B8825A4C97BFA6E8D9B6F9BE227FBED8B90
32,970,570 UART: Caliptra RT
32,971,273 UART: [state] CFI Enabled
33,087,949 UART: [rt] RT listening for mailbox commands...
33,119,404 UART: [rt]cmd =0x43455252, len=4
33,130,950 >>> mbox cmd response data (783 bytes)
33,173,981 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,204,821 UART: [rt]cmd =0x44504543, len=92
38,879,321 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,157 UART:
192,520 UART: Running Caliptra ROM ...
193,706 UART:
193,866 UART: [state] CFI Enabled
264,871 UART: [state] LifecycleState = Unprovisioned
266,786 UART: [state] DebugLocked = No
269,383 UART: [state] WD Timer not started. Device not locked for debugging
273,275 UART: [kat] SHA2-256
452,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,016 UART: [kat] ++
464,578 UART: [kat] sha1
476,485 UART: [kat] SHA2-256
479,536 UART: [kat] SHA2-384
485,886 UART: [kat] SHA2-512-ACC
488,889 UART: [kat] ECC-384
2,950,658 UART: [kat] HMAC-384Kdf
2,971,413 UART: [kat] LMS
3,500,844 UART: [kat] --
3,507,040 UART: [cold-reset] ++
3,509,372 UART: [fht] FHT @ 0x50003400
3,520,215 UART: [idev] ++
3,520,777 UART: [idev] CDI.KEYID = 6
3,521,807 UART: [idev] SUBJECT.KEYID = 7
3,522,907 UART: [idev] UDS.KEYID = 0
3,523,952 ready_for_fw is high
3,524,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,086 UART: [idev] Erasing UDS.KEYID = 0
6,030,685 UART: [idev] Sha1 KeyId Algorithm
6,055,411 UART: [idev] --
6,058,333 UART: [ldev] ++
6,058,905 UART: [ldev] CDI.KEYID = 6
6,059,831 UART: [ldev] SUBJECT.KEYID = 5
6,060,998 UART: [ldev] AUTHORITY.KEYID = 7
6,062,232 UART: [ldev] FE.KEYID = 1
6,102,895 UART: [ldev] Erasing FE.KEYID = 1
8,601,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,394 UART: [ldev] --
10,395,059 UART: [fwproc] Wait for Commands...
10,396,855 UART: [fwproc] Recv command 0x46574c44
10,398,949 UART: [fwproc] Recv'd Img size: 114448 bytes
13,803,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,880,432 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,949,210 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,267,593 >>> mbox cmd response: success
14,268,119 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,271,877 UART: [afmc] ++
14,272,458 UART: [afmc] CDI.KEYID = 6
14,273,368 UART: [afmc] SUBJECT.KEYID = 7
14,274,529 UART: [afmc] AUTHORITY.KEYID = 5
16,815,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,684 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,544 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,263 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,315 UART: [afmc] --
18,609,713 UART: [cold-reset] --
18,614,593 UART: [state] Locking Datavault
18,620,107 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,800 UART: [state] Locking ICCM
18,624,327 UART: [exit] Launching FMC @ 0x40000130
18,632,725 UART:
18,633,004 UART: Running Caliptra FMC ...
18,634,118 UART:
18,634,283 UART: [state] CFI Enabled
18,694,366 UART: [fht] FMC Alias Private Key: 7
20,458,096 UART: [art] Extend RT PCRs Done
20,459,302 UART: [art] Lock RT PCRs Done
20,461,141 UART: [art] Populate DV Done
20,466,549 UART: [fht] FMC Alias Private Key: 7
20,468,435 UART: [art] Derive CDI
20,469,189 UART: [art] Store in in slot 0x4
20,526,640 UART: [art] Derive Key Pair
20,527,647 UART: [art] Store priv key in slot 0x5
22,990,493 UART: [art] Derive Key Pair - Done
23,003,813 UART: [art] Signing Cert with AUTHO
23,005,122 UART: RITY.KEYID = 7
24,716,782 UART: [art] Erasing AUTHORITY.KEYID = 7
24,718,291 UART: [art] PUB.X = 1C0FA290687F3D5439EC95B231FCDA48E4A54D1E6659B801778A7B15A91FB4157B3E4086D926CEA76021F1D4260F668E
24,725,541 UART: [art] PUB.Y = 194E77D8B3666A8604191022CB3C3101DD32EA8D41FF12A2AAE34A57292C0559FDC1E96C2AF90D67E5D459A21A52AB01
24,732,831 UART: [art] SIG.R = 010E91C188CB2288A60287CA6A86793D8BFC96E35947671430FA5378D4ABFD01512D6983178DB30A9321A1A2274ED2E7
24,740,176 UART: [art] SIG.S = A36FECA05117E8B46813F648E4BC76EF9C25F51254DBA61E3493EA8245C726A00703A72FEB2A472DE705D377B81F9857
25,719,301 UART: Caliptra RT
25,720,002 UART: [state] CFI Enabled
25,884,395 UART: [rt] RT listening for mailbox commands...
25,915,696 UART: [rt]cmd =0x43455252, len=4
25,927,152 >>> mbox cmd response data (783 bytes)
25,971,452 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,002,500 UART: [rt]cmd =0x44504543, len=92
30,342,653 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,381,012 ready_for_fw is high
3,381,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,092,819 >>> mbox cmd response: success
14,093,484 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,387,192 UART:
18,387,574 UART: Running Caliptra FMC ...
18,388,720 UART:
18,388,877 UART: [state] CFI Enabled
18,455,214 UART: [fht] FMC Alias Private Key: 7
20,219,347 UART: [art] Extend RT PCRs Done
20,220,569 UART: [art] Lock RT PCRs Done
20,222,139 UART: [art] Populate DV Done
20,227,340 UART: [fht] FMC Alias Private Key: 7
20,229,052 UART: [art] Derive CDI
20,229,870 UART: [art] Store in in slot 0x4
20,288,222 UART: [art] Derive Key Pair
20,289,267 UART: [art] Store priv key in slot 0x5
22,752,092 UART: [art] Derive Key Pair - Done
22,764,987 UART: [art] Signing Cert with AUTHO
22,766,364 UART: RITY.KEYID = 7
24,478,087 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,586 UART: [art] PUB.X = D8135668F9BF60EA3272730EB09425A2F0E54A356FF590CEA350932AB0D3B9E9DE7EC4D5A26339332CF1DD730F894AFB
24,486,833 UART: [art] PUB.Y = BB1DBEFFC310BD6375D82C64516404EC34C688CD44EED10603C10B9D12DE2BD70354CE08E8824DE1A73FD5C13F4BA56A
24,494,137 UART: [art] SIG.R = F622410081ADB5A7570014437057EC0B1CF5790DDEEFC6E545DAF7AE9124950C1A54A3BAFE809809CDAF304B4184F651
24,501,474 UART: [art] SIG.S = AE40791FA0303C65C058E4DA3EA62E02C77B2E22D5184F5073B466E77B9F9C073D30597E4C2EF658B46620272BF22302
25,480,659 UART: Caliptra RT
25,481,371 UART: [state] CFI Enabled
25,646,966 UART: [rt] RT listening for mailbox commands...
25,678,431 UART: [rt]cmd =0x43455252, len=4
25,689,737 >>> mbox cmd response data (784 bytes)
25,733,669 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,764,609 UART: [rt]cmd =0x44504543, len=92
30,125,390 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,868 writing to cptra_bootfsm_go
194,075 UART:
194,448 UART: Running Caliptra ROM ...
195,646 UART:
605,243 UART: [state] CFI Enabled
621,181 UART: [state] LifecycleState = Unprovisioned
623,089 UART: [state] DebugLocked = No
624,761 UART: [state] WD Timer not started. Device not locked for debugging
627,945 UART: [kat] SHA2-256
807,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,610 UART: [kat] ++
819,137 UART: [kat] sha1
830,081 UART: [kat] SHA2-256
833,074 UART: [kat] SHA2-384
839,773 UART: [kat] SHA2-512-ACC
842,703 UART: [kat] ECC-384
3,283,909 UART: [kat] HMAC-384Kdf
3,297,446 UART: [kat] LMS
3,826,948 UART: [kat] --
3,830,798 UART: [cold-reset] ++
3,831,807 UART: [fht] FHT @ 0x50003400
3,842,579 UART: [idev] ++
3,843,177 UART: [idev] CDI.KEYID = 6
3,844,089 UART: [idev] SUBJECT.KEYID = 7
3,845,255 UART: [idev] UDS.KEYID = 0
3,846,295 ready_for_fw is high
3,846,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,166 UART: [idev] Erasing UDS.KEYID = 0
6,324,426 UART: [idev] Sha1 KeyId Algorithm
6,346,562 UART: [idev] --
6,350,754 UART: [ldev] ++
6,351,317 UART: [ldev] CDI.KEYID = 6
6,352,325 UART: [ldev] SUBJECT.KEYID = 5
6,353,441 UART: [ldev] AUTHORITY.KEYID = 7
6,354,715 UART: [ldev] FE.KEYID = 1
6,364,220 UART: [ldev] Erasing FE.KEYID = 1
8,839,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,235 UART: [ldev] --
10,632,655 UART: [fwproc] Wait for Commands...
10,635,550 UART: [fwproc] Recv command 0x46574c44
10,637,630 UART: [fwproc] Recv'd Img size: 114448 bytes
14,041,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,184,404 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,502,344 >>> mbox cmd response: success
14,502,854 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,507,044 UART: [afmc] ++
14,507,642 UART: [afmc] CDI.KEYID = 6
14,508,525 UART: [afmc] SUBJECT.KEYID = 7
14,509,672 UART: [afmc] AUTHORITY.KEYID = 5
17,007,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,653 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,412 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,481 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,327 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,244 UART: [afmc] --
18,802,641 UART: [cold-reset] --
18,807,188 UART: [state] Locking Datavault
18,811,583 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,279 UART: [state] Locking ICCM
18,815,443 UART: [exit] Launching FMC @ 0x40000130
18,823,892 UART:
18,824,125 UART: Running Caliptra FMC ...
18,825,214 UART:
18,825,367 UART: [state] CFI Enabled
18,833,672 UART: [fht] FMC Alias Private Key: 7
20,590,505 UART: [art] Extend RT PCRs Done
20,591,724 UART: [art] Lock RT PCRs Done
20,593,261 UART: [art] Populate DV Done
20,598,831 UART: [fht] FMC Alias Private Key: 7
20,600,466 UART: [art] Derive CDI
20,601,275 UART: [art] Store in in slot 0x4
20,643,709 UART: [art] Derive Key Pair
20,644,783 UART: [art] Store priv key in slot 0x5
23,071,409 UART: [art] Derive Key Pair - Done
23,084,506 UART: [art] Signing Cert with AUTHO
23,085,833 UART: RITY.KEYID = 7
24,791,356 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,891 UART: [art] PUB.X = CF26F14E0A1FA95633D7578CD2FE650FC7318CD9A93FBDEE713D93E6BCC301A4DFA2CF1F4E9B654C70094BF80B1A699E
24,800,192 UART: [art] PUB.Y = E7F9EF0C1CB84ACAF21B6603696F29D844258EB696249077A007A21E754470B4DAB98AB633C9D30F2421DC492CD4ADCA
24,807,405 UART: [art] SIG.R = 4C8287F0C6EC07CC52850EB5171B2FE68219D224D1FBCB4F24CF3277CBC986ACD24037C611D8EDEC415CCD21D582AFA0
24,814,801 UART: [art] SIG.S = 63B9CEB1BE15C2043C7B58E6C27F375489D57F0BCEDB0685F210DF47D147AB7A0802DD079D96B189ACE1C7B78D92141C
25,793,452 UART: Caliptra RT
25,794,146 UART: [state] CFI Enabled
25,910,989 UART: [rt] RT listening for mailbox commands...
25,942,112 UART: [rt]cmd =0x43455252, len=4
25,953,815 >>> mbox cmd response data (782 bytes)
25,996,859 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,027,800 UART: [rt]cmd =0x44504543, len=92
30,312,381 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,698,768 ready_for_fw is high
3,699,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,498 >>> mbox cmd response: success
14,281,600 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,528,378 UART:
18,528,770 UART: Running Caliptra FMC ...
18,529,902 UART:
18,530,054 UART: [state] CFI Enabled
18,538,107 UART: [fht] FMC Alias Private Key: 7
20,295,149 UART: [art] Extend RT PCRs Done
20,296,355 UART: [art] Lock RT PCRs Done
20,297,814 UART: [art] Populate DV Done
20,303,385 UART: [fht] FMC Alias Private Key: 7
20,304,916 UART: [art] Derive CDI
20,305,672 UART: [art] Store in in slot 0x4
20,348,374 UART: [art] Derive Key Pair
20,349,407 UART: [art] Store priv key in slot 0x5
22,776,412 UART: [art] Derive Key Pair - Done
22,789,675 UART: [art] Signing Cert with AUTHO
22,790,981 UART: RITY.KEYID = 7
24,496,612 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,119 UART: [art] PUB.X = 25795B8F1D49A9533321201C524F6A23C75D381B8529C660EB74B6A5216597B20A4369FE6DEA5FC79956E0E03CBF3A92
24,505,393 UART: [art] PUB.Y = 0FF8B7A3161979ABFEFD175BC8312DAD5ED3675436645AA63085A53F8B0D4A42E5F18F16B2EF4B74C922F04F46AF8D35
24,512,655 UART: [art] SIG.R = 8671FB0231744BBBC18057D2479465D86C6CEF63C185AA13550387F02F7963234BBA7D51639106A637CF0731F4C8AD9B
24,519,993 UART: [art] SIG.S = 1818D0C2CB0BB790FE63DBDD9BB166F1CDB27B7626B4506A744873BDD30F48548044B16AE74B0B20A0064AE9BEC1933F
25,498,582 UART: Caliptra RT
25,499,293 UART: [state] CFI Enabled
25,616,086 UART: [rt] RT listening for mailbox commands...
25,647,772 UART: [rt]cmd =0x43455252, len=4
25,659,207 >>> mbox cmd response data (783 bytes)
25,702,046 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,732,909 UART: [rt]cmd =0x44504543, len=92
30,017,593 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,440,196 ready_for_fw is high
3,440,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,739,725 >>> mbox cmd response: success
14,740,521 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,027,268 UART:
19,027,680 UART: Running Caliptra FMC ...
19,028,856 UART:
19,029,021 UART: [state] CFI Enabled
19,097,311 UART: [fht] FMC Alias Private Key: 7
20,861,572 UART: [art] Extend RT PCRs Done
20,862,797 UART: [art] Lock RT PCRs Done
20,864,368 UART: [art] Populate DV Done
20,869,720 UART: [fht] FMC Alias Private Key: 7
20,871,376 UART: [art] Derive CDI
20,872,189 UART: [art] Store in in slot 0x4
20,929,912 UART: [art] Derive Key Pair
20,930,951 UART: [art] Store priv key in slot 0x5
23,394,044 UART: [art] Derive Key Pair - Done
23,407,144 UART: [art] Signing Cert with AUTHO
23,408,448 UART: RITY.KEYID = 7
25,119,791 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,340 UART: [art] PUB.X = 850A06B8A2235EBFF7B7CA93FB2576B40C6646ED6BD681A0AB268DDFD83258EA7C5717EC3947E015DE74627F861270AF
25,128,560 UART: [art] PUB.Y = 5BF45BF301CA92499118D3E6C3ED50A0606EB9822C50E3BDE774BC7249C909B1A44E358F6018FE80F0892D455E14AF7D
25,135,821 UART: [art] SIG.R = 6967F9B1F35B68B88E1BB4A4084B30C5C0D070A6A71839AACFA0992EB0B823AB032B0309439EDE5A8B46239F902CF60A
25,143,208 UART: [art] SIG.S = 30AA49849FB5986F0AF2E639C207B0732F6A23DF84D2DEDE753691E6F51E1A9DEC01D6194F6CFB3950B172244ABFB587
26,122,416 UART: Caliptra RT
26,123,128 UART: [state] CFI Enabled
26,290,335 UART: [rt] RT listening for mailbox commands...
26,321,745 UART: [rt]cmd =0x43455252, len=4
26,333,292 >>> mbox cmd response data (782 bytes)
26,377,782 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,408,483 UART: [rt]cmd =0x44504543, len=92
30,767,571 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,754,867 ready_for_fw is high
3,755,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,952,986 >>> mbox cmd response: success
14,953,749 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,208,344 UART:
19,208,994 UART: Running Caliptra FMC ...
19,210,115 UART:
19,210,259 UART: [state] CFI Enabled
19,218,109 UART: [fht] FMC Alias Private Key: 7
20,974,932 UART: [art] Extend RT PCRs Done
20,976,170 UART: [art] Lock RT PCRs Done
20,978,046 UART: [art] Populate DV Done
20,983,759 UART: [fht] FMC Alias Private Key: 7
20,985,300 UART: [art] Derive CDI
20,986,025 UART: [art] Store in in slot 0x4
21,028,784 UART: [art] Derive Key Pair
21,029,827 UART: [art] Store priv key in slot 0x5
23,456,977 UART: [art] Derive Key Pair - Done
23,469,919 UART: [art] Signing Cert with AUTHO
23,471,217 UART: RITY.KEYID = 7
25,177,461 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,968 UART: [art] PUB.X = 87AA44FB93B59DFD06756FD585824B454EAB7C5D130D512753E97943B27A2D6856B2859B9B4521D86009CA0593A4B806
25,186,213 UART: [art] PUB.Y = 37B93C353646BDE9CFB59F6016D2DAE7889D1402455839F7114902A8858D371AC7BF45173A4724A13C11B67CC6627CB7
25,193,417 UART: [art] SIG.R = 9E7B054608430397D0AD3FE850A16DFD797F7E7C7681947A301BFDF6E57C10BDFC36CE776FB878AA100A53F8C565DEBE
25,200,804 UART: [art] SIG.S = 451B3F4DCA4250933074479AC12F4C2A1112BE5951A69C48097B971B0AB222FBF51865924162716FD3DEC5890341D9CC
26,179,698 UART: Caliptra RT
26,180,711 UART: [state] CFI Enabled
26,298,035 UART: [rt] RT listening for mailbox commands...
26,329,696 UART: [rt]cmd =0x43455252, len=4
26,341,007 >>> mbox cmd response data (783 bytes)
26,384,512 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,415,381 UART: [rt]cmd =0x44504543, len=92
30,700,726 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,575 UART: [kat] SHA2-256
881,506 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,621 UART: [kat] ++
885,773 UART: [kat] sha1
889,933 UART: [kat] SHA2-256
891,871 UART: [kat] SHA2-384
894,596 UART: [kat] SHA2-512-ACC
896,497 UART: [kat] ECC-384
902,236 UART: [kat] HMAC-384Kdf
906,946 UART: [kat] LMS
1,475,142 UART: [kat] --
1,476,053 UART: [cold-reset] ++
1,476,421 UART: [fht] Storing FHT @ 0x50003400
1,479,266 UART: [idev] ++
1,479,434 UART: [idev] CDI.KEYID = 6
1,479,794 UART: [idev] SUBJECT.KEYID = 7
1,480,218 UART: [idev] UDS.KEYID = 0
1,480,563 ready_for_fw is high
1,480,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,350 UART: [idev] Erasing UDS.KEYID = 0
1,505,432 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,108 UART: [idev] --
1,515,065 UART: [ldev] ++
1,515,233 UART: [ldev] CDI.KEYID = 6
1,515,596 UART: [ldev] SUBJECT.KEYID = 5
1,516,022 UART: [ldev] AUTHORITY.KEYID = 7
1,516,485 UART: [ldev] FE.KEYID = 1
1,521,677 UART: [ldev] Erasing FE.KEYID = 1
1,546,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,636 UART: [ldev] --
1,586,057 UART: [fwproc] Waiting for Commands...
1,586,926 UART: [fwproc] Received command 0x46574c44
1,587,717 UART: [fwproc] Received Image of size 114448 bytes
2,887,286 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,816 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,285 >>> mbox cmd response: success
3,080,285 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,081,463 UART: [afmc] ++
3,081,631 UART: [afmc] CDI.KEYID = 6
3,081,993 UART: [afmc] SUBJECT.KEYID = 7
3,082,418 UART: [afmc] AUTHORITY.KEYID = 5
3,116,875 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,451 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,959 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,844 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,534 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,415 UART: [afmc] --
3,160,397 UART: [cold-reset] --
3,161,003 UART: [state] Locking Datavault
3,162,256 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,860 UART: [state] Locking ICCM
3,163,426 UART: [exit] Launching FMC @ 0x40000130
3,168,755 UART:
3,168,771 UART: Running Caliptra FMC ...
3,169,179 UART:
3,169,233 UART: [state] CFI Enabled
3,179,736 UART: [fht] FMC Alias Private Key: 7
3,288,067 UART: [art] Extend RT PCRs Done
3,288,495 UART: [art] Lock RT PCRs Done
3,289,795 UART: [art] Populate DV Done
3,298,152 UART: [fht] FMC Alias Private Key: 7
3,299,320 UART: [art] Derive CDI
3,299,600 UART: [art] Store in in slot 0x4
3,385,299 UART: [art] Derive Key Pair
3,385,659 UART: [art] Store priv key in slot 0x5
3,398,905 UART: [art] Derive Key Pair - Done
3,413,208 UART: [art] Signing Cert with AUTHO
3,413,688 UART: RITY.KEYID = 7
3,429,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,787 UART: [art] PUB.X = 426A02FD6F55DB4674031804025E3D5D091D71A188EAE8640CA3C5F65B36D8B3DD4C16499EC40FA22D71D261E9907804
3,436,533 UART: [art] PUB.Y = D5615AACDBB3830D0B380AC5BCBEFA858F34F1D626D874F9879E0E72D8903B1992E24A65015B2776AA2976441EF88E81
3,443,474 UART: [art] SIG.R = 2F0D85074967E2EBCF3CC909827BA28436AACDE9E6FE9EF3666E3C6B8E6AB1D7D8122AEFDF981424B0C05A221BB34D46
3,450,253 UART: [art] SIG.S = 0F8544DB4B64BE40285F82F164FD6092C8B6BDD22474F0F36DD0F581D08B837AF1FE89206B5D10AEE3692F10EE792E4D
3,473,425 UART: Caliptra RT
3,473,678 UART: [state] CFI Enabled
3,581,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,822 UART: [rt]cmd =0x43455252, len=4
3,622,639 >>> mbox cmd response data (782 bytes)
3,622,640 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,387 UART: [rt]cmd =0x44504543, len=92
3,835,907 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,895 ready_for_fw is high
1,362,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,433 >>> mbox cmd response: success
2,930,433 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,991,425 UART:
2,991,441 UART: Running Caliptra FMC ...
2,991,849 UART:
2,991,903 UART: [state] CFI Enabled
3,002,232 UART: [fht] FMC Alias Private Key: 7
3,110,563 UART: [art] Extend RT PCRs Done
3,110,991 UART: [art] Lock RT PCRs Done
3,112,595 UART: [art] Populate DV Done
3,120,830 UART: [fht] FMC Alias Private Key: 7
3,121,970 UART: [art] Derive CDI
3,122,250 UART: [art] Store in in slot 0x4
3,207,579 UART: [art] Derive Key Pair
3,207,939 UART: [art] Store priv key in slot 0x5
3,221,237 UART: [art] Derive Key Pair - Done
3,235,591 UART: [art] Signing Cert with AUTHO
3,236,071 UART: RITY.KEYID = 7
3,251,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,296 UART: [art] PUB.X = D05613F80F1EB8FBD8C10FEE322AE6A70BFB7008F9DCA5DA30586E997035D5186DCAB8F4008A256271263C7EFB8F0EA3
3,259,045 UART: [art] PUB.Y = E72C56A49B6CF53ED51A2AEDB5BE4B046F5E498846C02CDA6DFC26A574A6B1A699632BE42A2E155789A5310520FF111C
3,266,001 UART: [art] SIG.R = 0A13786006CA9656DA0DA95C3502BB1E6EBFF3DE3EF4BB2AF41C251668DE224906674D1752404319C04D8722C1B7B773
3,272,758 UART: [art] SIG.S = FF7B2166FEB1C26FA8C54DBF28379E68572F750E1CACBA271D0E7A5FEFC5D30121E592C892799DA6260D1B1830BE94CA
3,297,015 UART: Caliptra RT
3,297,268 UART: [state] CFI Enabled
3,404,741 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,379 UART: [rt]cmd =0x43455252, len=4
3,446,292 >>> mbox cmd response data (783 bytes)
3,446,293 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,488 UART: [rt]cmd =0x44504543, len=92
3,660,290 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
87,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,540 UART: [kat] SHA2-256
882,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,586 UART: [kat] ++
886,738 UART: [kat] sha1
891,000 UART: [kat] SHA2-256
892,938 UART: [kat] SHA2-384
895,613 UART: [kat] SHA2-512-ACC
897,514 UART: [kat] ECC-384
902,931 UART: [kat] HMAC-384Kdf
907,667 UART: [kat] LMS
1,475,863 UART: [kat] --
1,476,814 UART: [cold-reset] ++
1,477,180 UART: [fht] Storing FHT @ 0x50003400
1,479,971 UART: [idev] ++
1,480,139 UART: [idev] CDI.KEYID = 6
1,480,499 UART: [idev] SUBJECT.KEYID = 7
1,480,923 UART: [idev] UDS.KEYID = 0
1,481,268 ready_for_fw is high
1,481,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,817 UART: [idev] Erasing UDS.KEYID = 0
1,506,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,083 UART: [idev] --
1,516,208 UART: [ldev] ++
1,516,376 UART: [ldev] CDI.KEYID = 6
1,516,739 UART: [ldev] SUBJECT.KEYID = 5
1,517,165 UART: [ldev] AUTHORITY.KEYID = 7
1,517,628 UART: [ldev] FE.KEYID = 1
1,522,992 UART: [ldev] Erasing FE.KEYID = 1
1,548,587 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,405 UART: [ldev] --
1,587,844 UART: [fwproc] Waiting for Commands...
1,588,665 UART: [fwproc] Received command 0x46574c44
1,589,456 UART: [fwproc] Received Image of size 114448 bytes
2,887,897 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,027 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,379 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,416 >>> mbox cmd response: success
3,081,416 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,082,452 UART: [afmc] ++
3,082,620 UART: [afmc] CDI.KEYID = 6
3,082,982 UART: [afmc] SUBJECT.KEYID = 7
3,083,407 UART: [afmc] AUTHORITY.KEYID = 5
3,118,714 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,150 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,543 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,233 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,118 UART: [afmc] --
3,162,020 UART: [cold-reset] --
3,162,910 UART: [state] Locking Datavault
3,164,117 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,721 UART: [state] Locking ICCM
3,165,321 UART: [exit] Launching FMC @ 0x40000130
3,170,650 UART:
3,170,666 UART: Running Caliptra FMC ...
3,171,074 UART:
3,171,217 UART: [state] CFI Enabled
3,181,400 UART: [fht] FMC Alias Private Key: 7
3,289,799 UART: [art] Extend RT PCRs Done
3,290,227 UART: [art] Lock RT PCRs Done
3,291,733 UART: [art] Populate DV Done
3,299,962 UART: [fht] FMC Alias Private Key: 7
3,300,910 UART: [art] Derive CDI
3,301,190 UART: [art] Store in in slot 0x4
3,387,237 UART: [art] Derive Key Pair
3,387,597 UART: [art] Store priv key in slot 0x5
3,400,925 UART: [art] Derive Key Pair - Done
3,415,397 UART: [art] Signing Cert with AUTHO
3,415,877 UART: RITY.KEYID = 7
3,430,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,682 UART: [art] PUB.X = 6B969749B1D357A1D84A663C952CEAF8E6E007E7C92BC35B2DD93E51B34CF43FD2FEDD81C0C37D08C476B700A4CE49EF
3,438,442 UART: [art] PUB.Y = A43A09A42ACDE694838B30B0B811A6967893ECD61AC24055347B4233136B53CEC346C0B688502176ED25B61583B54C51
3,445,383 UART: [art] SIG.R = 6148FACEC3B164D43AC37E7B5723D5617D2F94675AD9BE7FA13F44BBEDE45A96852F6174065BC66EA7FF7EB57DAD3268
3,452,166 UART: [art] SIG.S = 5328069914B5706F5A583DD1C9A7182A6160A2DC7049FF2B4BBBD6191F8E68086CAA0132DF2F82091399EE99CCFF4F2B
3,476,421 UART: Caliptra RT
3,476,766 UART: [state] CFI Enabled
3,584,772 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,064 UART: [rt]cmd =0x43455252, len=4
3,626,029 >>> mbox cmd response data (782 bytes)
3,626,030 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,655,919 UART: [rt]cmd =0x44504543, len=92
3,839,080 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,648 ready_for_fw is high
1,362,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,690 >>> mbox cmd response: success
2,928,690 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,990,754 UART:
2,990,770 UART: Running Caliptra FMC ...
2,991,178 UART:
2,991,321 UART: [state] CFI Enabled
3,001,758 UART: [fht] FMC Alias Private Key: 7
3,109,395 UART: [art] Extend RT PCRs Done
3,109,823 UART: [art] Lock RT PCRs Done
3,111,511 UART: [art] Populate DV Done
3,120,122 UART: [fht] FMC Alias Private Key: 7
3,121,272 UART: [art] Derive CDI
3,121,552 UART: [art] Store in in slot 0x4
3,207,319 UART: [art] Derive Key Pair
3,207,679 UART: [art] Store priv key in slot 0x5
3,221,253 UART: [art] Derive Key Pair - Done
3,235,755 UART: [art] Signing Cert with AUTHO
3,236,235 UART: RITY.KEYID = 7
3,251,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,374 UART: [art] PUB.X = 40EF9FC05541CE37BC7FC8F0D3B0C732C4AC08835AFFA2AD80596CF58891D06A05EFA284ED8E0F1A895EF0DC6DAA8CDF
3,259,163 UART: [art] PUB.Y = 35648F90F25DFCFDEC869180846B4DCCF012F20311B3BAF9E2D51C3C63F7B00267BFEDE2234D975953707DCE4A5E3AFB
3,266,123 UART: [art] SIG.R = 7FD5918CBEEAEB449B3FD09DBFFF5ED3490DBC4952540150DFFFB088C8EF810BEA5A3DCCEBA3E1ADC2E1FF8AF67479FD
3,272,924 UART: [art] SIG.S = 2DB1B00C11CE2B212191278FB9F545CC6F3D53AB7BBB9AC0F693862A50D10B5EC01944015A0FFB24A998F454E0FDFA52
3,296,665 UART: Caliptra RT
3,297,010 UART: [state] CFI Enabled
3,405,094 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,532 UART: [rt]cmd =0x43455252, len=4
3,446,275 >>> mbox cmd response data (782 bytes)
3,446,276 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,127 UART: [rt]cmd =0x44504543, len=92
3,660,307 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
893,118 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,243 UART: [kat] ++
897,395 UART: [kat] sha1
901,735 UART: [kat] SHA2-256
903,675 UART: [kat] SHA2-384
906,460 UART: [kat] SHA2-512-ACC
908,361 UART: [kat] ECC-384
917,882 UART: [kat] HMAC-384Kdf
922,598 UART: [kat] LMS
1,170,926 UART: [kat] --
1,171,707 UART: [cold-reset] ++
1,172,123 UART: [fht] FHT @ 0x50003400
1,174,680 UART: [idev] ++
1,174,848 UART: [idev] CDI.KEYID = 6
1,175,208 UART: [idev] SUBJECT.KEYID = 7
1,175,632 UART: [idev] UDS.KEYID = 0
1,175,977 ready_for_fw is high
1,175,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,582 UART: [idev] Erasing UDS.KEYID = 0
1,200,635 UART: [idev] Sha1 KeyId Algorithm
1,209,103 UART: [idev] --
1,210,231 UART: [ldev] ++
1,210,399 UART: [ldev] CDI.KEYID = 6
1,210,762 UART: [ldev] SUBJECT.KEYID = 5
1,211,188 UART: [ldev] AUTHORITY.KEYID = 7
1,211,651 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,243,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,007 UART: [ldev] --
1,282,518 UART: [fwproc] Wait for Commands...
1,283,124 UART: [fwproc] Recv command 0x46574c44
1,283,852 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,312 >>> mbox cmd response: success
2,775,312 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,776,324 UART: [afmc] ++
2,776,492 UART: [afmc] CDI.KEYID = 6
2,776,854 UART: [afmc] SUBJECT.KEYID = 7
2,777,279 UART: [afmc] AUTHORITY.KEYID = 5
2,811,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,917 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,645 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,530 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,249 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,119 UART: [afmc] --
2,855,195 UART: [cold-reset] --
2,855,765 UART: [state] Locking Datavault
2,857,040 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,644 UART: [state] Locking ICCM
2,858,122 UART: [exit] Launching FMC @ 0x40000130
2,863,451 UART:
2,863,467 UART: Running Caliptra FMC ...
2,863,875 UART:
2,863,929 UART: [state] CFI Enabled
2,874,238 UART: [fht] FMC Alias Private Key: 7
2,982,175 UART: [art] Extend RT PCRs Done
2,982,603 UART: [art] Lock RT PCRs Done
2,984,179 UART: [art] Populate DV Done
2,992,358 UART: [fht] FMC Alias Private Key: 7
2,993,502 UART: [art] Derive CDI
2,993,782 UART: [art] Store in in slot 0x4
3,079,287 UART: [art] Derive Key Pair
3,079,647 UART: [art] Store priv key in slot 0x5
3,092,577 UART: [art] Derive Key Pair - Done
3,107,222 UART: [art] Signing Cert with AUTHO
3,107,702 UART: RITY.KEYID = 7
3,123,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,033 UART: [art] PUB.X = 13B5AE599677B7218B23E97DE362AA5D3102DD37C6D82B091351A82599B03839ACCA1FA6F56A31A45D1CD21E087F3371
3,130,796 UART: [art] PUB.Y = 97E3F7CE4DB5A02231359503B93DB5F686F0DB383DA6531891BFCA02D114661178E5305E6373C2EBB9765A8B835AB627
3,137,740 UART: [art] SIG.R = EA258180FB584F42BE9AC07C3229189B639CD93910B5ECCFE480FACAA1FD7DD2E1E3D15D7C50219BC0536F47FCC35842
3,144,526 UART: [art] SIG.S = 26C6CF160297283EFD7867987E67685962B226AB8B94393EF0B20022F367CB4BDC0664F0A0D2F769D7DACB1F686125A6
3,168,695 UART: Caliptra RT
3,168,948 UART: [state] CFI Enabled
3,277,835 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,665 UART: [rt]cmd =0x43455252, len=4
3,319,584 >>> mbox cmd response data (783 bytes)
3,319,585 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,438 UART: [rt]cmd =0x44504543, len=92
3,531,977 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,051 ready_for_fw is high
1,060,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,791 >>> mbox cmd response: success
2,627,791 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,690,429 UART:
2,690,445 UART: Running Caliptra FMC ...
2,690,853 UART:
2,690,907 UART: [state] CFI Enabled
2,701,224 UART: [fht] FMC Alias Private Key: 7
2,809,269 UART: [art] Extend RT PCRs Done
2,809,697 UART: [art] Lock RT PCRs Done
2,811,515 UART: [art] Populate DV Done
2,819,788 UART: [fht] FMC Alias Private Key: 7
2,820,882 UART: [art] Derive CDI
2,821,162 UART: [art] Store in in slot 0x4
2,907,337 UART: [art] Derive Key Pair
2,907,697 UART: [art] Store priv key in slot 0x5
2,921,329 UART: [art] Derive Key Pair - Done
2,936,092 UART: [art] Signing Cert with AUTHO
2,936,572 UART: RITY.KEYID = 7
2,951,936 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,701 UART: [art] PUB.X = D4B841D7EA90CADBF2A95EDF99F9EF128827A57F45FBD01548D0746C5541BB7D476DDC44A449416CFCEABB9981BA477C
2,959,491 UART: [art] PUB.Y = 38BCBC062684179BDB2FC392B37A8B53B3729664E13C113B69205495ED7A47AB8A84BDA1BDB9A1A0D93891DA787E74F6
2,966,446 UART: [art] SIG.R = 5BD627A0CDFCB4EC4C187E03B793FBDA448A50EC845C75BE74C575FE6CF646A8849F36192CEB5A6E4175EB29101FB3E5
2,973,231 UART: [art] SIG.S = F1E17B375E569D47A3D04EE8267D82E870F263AF2FC04DD09B3B8DAC4CE9BE4EBA96D1931E57AEC73B6DD6B4DC395B05
2,996,881 UART: Caliptra RT
2,997,134 UART: [state] CFI Enabled
3,106,233 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,971 UART: [rt]cmd =0x43455252, len=4
3,147,830 >>> mbox cmd response data (783 bytes)
3,147,831 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,177,996 UART: [rt]cmd =0x44504543, len=92
3,361,497 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
893,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,800 UART: [kat] ++
897,952 UART: [kat] sha1
902,144 UART: [kat] SHA2-256
904,084 UART: [kat] SHA2-384
906,995 UART: [kat] SHA2-512-ACC
908,896 UART: [kat] ECC-384
918,917 UART: [kat] HMAC-384Kdf
923,417 UART: [kat] LMS
1,171,745 UART: [kat] --
1,172,882 UART: [cold-reset] ++
1,173,380 UART: [fht] FHT @ 0x50003400
1,175,935 UART: [idev] ++
1,176,103 UART: [idev] CDI.KEYID = 6
1,176,463 UART: [idev] SUBJECT.KEYID = 7
1,176,887 UART: [idev] UDS.KEYID = 0
1,177,232 ready_for_fw is high
1,177,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,855 UART: [idev] Erasing UDS.KEYID = 0
1,201,476 UART: [idev] Sha1 KeyId Algorithm
1,210,006 UART: [idev] --
1,211,002 UART: [ldev] ++
1,211,170 UART: [ldev] CDI.KEYID = 6
1,211,533 UART: [ldev] SUBJECT.KEYID = 5
1,211,959 UART: [ldev] AUTHORITY.KEYID = 7
1,212,422 UART: [ldev] FE.KEYID = 1
1,217,442 UART: [ldev] Erasing FE.KEYID = 1
1,243,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,542 UART: [ldev] --
1,282,901 UART: [fwproc] Wait for Commands...
1,283,563 UART: [fwproc] Recv command 0x46574c44
1,284,291 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,940 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,199 >>> mbox cmd response: success
2,775,199 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,776,395 UART: [afmc] ++
2,776,563 UART: [afmc] CDI.KEYID = 6
2,776,925 UART: [afmc] SUBJECT.KEYID = 7
2,777,350 UART: [afmc] AUTHORITY.KEYID = 5
2,812,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,894 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,779 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,498 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,378 UART: [afmc] --
2,856,478 UART: [cold-reset] --
2,857,372 UART: [state] Locking Datavault
2,858,465 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,069 UART: [state] Locking ICCM
2,859,601 UART: [exit] Launching FMC @ 0x40000130
2,864,930 UART:
2,864,946 UART: Running Caliptra FMC ...
2,865,354 UART:
2,865,497 UART: [state] CFI Enabled
2,876,150 UART: [fht] FMC Alias Private Key: 7
2,984,165 UART: [art] Extend RT PCRs Done
2,984,593 UART: [art] Lock RT PCRs Done
2,986,101 UART: [art] Populate DV Done
2,994,016 UART: [fht] FMC Alias Private Key: 7
2,995,150 UART: [art] Derive CDI
2,995,430 UART: [art] Store in in slot 0x4
3,081,037 UART: [art] Derive Key Pair
3,081,397 UART: [art] Store priv key in slot 0x5
3,094,879 UART: [art] Derive Key Pair - Done
3,109,519 UART: [art] Signing Cert with AUTHO
3,109,999 UART: RITY.KEYID = 7
3,124,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,476 UART: [art] PUB.X = 7F3CF6C2B2A326DFC392DD2CEA4D43CFF401681A489827CE7CE4A067ED86ADD4B6F345D217D74A183084B48D806B6D76
3,132,257 UART: [art] PUB.Y = DE75AD03B63C147863BA4416D8C1AC2C2EA26169918F5E4DAE4590F2D5270DBF5567F8298CD1D27E21BE03B1E18C3A95
3,139,208 UART: [art] SIG.R = 92F1E878BB84A71FD2F8C1803CAC0BBB72278B48901F7B9560F100A06F3DAC6FE381AA47F3191AC2FCA9C015A1A10394
3,145,962 UART: [art] SIG.S = C8E2C00B33304461A84F1597FB72A3547F5E8AA2FE63B03C7E89B0FED57F770CCEFA481E4145CC36238F68386DA4344A
3,169,681 UART: Caliptra RT
3,170,026 UART: [state] CFI Enabled
3,277,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,086 UART: [rt]cmd =0x43455252, len=4
3,318,980 >>> mbox cmd response data (784 bytes)
3,318,981 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,954 UART: [rt]cmd =0x44504543, len=92
3,532,386 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,200 ready_for_fw is high
1,060,200 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,060 >>> mbox cmd response: success
2,628,060 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,690,578 UART:
2,690,594 UART: Running Caliptra FMC ...
2,691,002 UART:
2,691,145 UART: [state] CFI Enabled
2,701,620 UART: [fht] FMC Alias Private Key: 7
2,809,895 UART: [art] Extend RT PCRs Done
2,810,323 UART: [art] Lock RT PCRs Done
2,812,175 UART: [art] Populate DV Done
2,820,472 UART: [fht] FMC Alias Private Key: 7
2,821,496 UART: [art] Derive CDI
2,821,776 UART: [art] Store in in slot 0x4
2,907,449 UART: [art] Derive Key Pair
2,907,809 UART: [art] Store priv key in slot 0x5
2,921,005 UART: [art] Derive Key Pair - Done
2,935,928 UART: [art] Signing Cert with AUTHO
2,936,408 UART: RITY.KEYID = 7
2,951,450 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,215 UART: [art] PUB.X = B91AB216E6DF4AE68214847379222E2A7211A16D1B9426FC62395365AEDF05145B6762B2577810984ECBA7FB61C581FE
2,958,980 UART: [art] PUB.Y = 84C821C693C7A2F8DA14716730F03CB8E12F39515618DA166FE697CD72D5B95A8B7616FAB02CA18389D520D4E815AE12
2,965,932 UART: [art] SIG.R = 7ED29A01849D0C4AA7D3BCF9E0982A81DBE3811CFF83115FBF34031D371BA981BFDAD774779D0F672798635ADCCE398E
2,972,704 UART: [art] SIG.S = 5E71CC6D81CD27A06B0BB3EB3C0477D905703E22AD5ABDABA68F5830BC108DE9C428B08C2C60A4DC19DDC33CEF6D4896
2,996,234 UART: Caliptra RT
2,996,579 UART: [state] CFI Enabled
3,103,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,964 UART: [rt]cmd =0x43455252, len=4
3,144,973 >>> mbox cmd response data (782 bytes)
3,144,974 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,947 UART: [rt]cmd =0x44504543, len=92
3,358,866 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,236 UART: [kat] SHA2-256
890,786 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,915 UART: [kat] ++
895,067 UART: [kat] sha1
899,217 UART: [kat] SHA2-256
901,157 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,390 UART: [kat] HMAC-384Kdf
919,964 UART: [kat] LMS
1,168,276 UART: [kat] --
1,169,221 UART: [cold-reset] ++
1,169,665 UART: [fht] FHT @ 0x50003400
1,172,287 UART: [idev] ++
1,172,455 UART: [idev] CDI.KEYID = 6
1,172,816 UART: [idev] SUBJECT.KEYID = 7
1,173,241 UART: [idev] UDS.KEYID = 0
1,173,587 ready_for_fw is high
1,173,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,179 UART: [idev] Erasing UDS.KEYID = 0
1,198,295 UART: [idev] Sha1 KeyId Algorithm
1,207,179 UART: [idev] --
1,208,282 UART: [ldev] ++
1,208,450 UART: [ldev] CDI.KEYID = 6
1,208,814 UART: [ldev] SUBJECT.KEYID = 5
1,209,241 UART: [ldev] AUTHORITY.KEYID = 7
1,209,704 UART: [ldev] FE.KEYID = 1
1,215,164 UART: [ldev] Erasing FE.KEYID = 1
1,241,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,214 UART: [ldev] --
1,280,632 UART: [fwproc] Wait for Commands...
1,281,413 UART: [fwproc] Recv command 0x46574c44
1,282,146 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,120 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,148 >>> mbox cmd response: success
2,775,148 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,776,377 UART: [afmc] ++
2,776,545 UART: [afmc] CDI.KEYID = 6
2,776,908 UART: [afmc] SUBJECT.KEYID = 7
2,777,334 UART: [afmc] AUTHORITY.KEYID = 5
2,812,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,630 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,242 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,756 UART: [afmc] --
2,855,822 UART: [cold-reset] --
2,856,712 UART: [state] Locking Datavault
2,857,693 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,297 UART: [state] Locking ICCM
2,858,779 UART: [exit] Launching FMC @ 0x40000130
2,864,108 UART:
2,864,124 UART: Running Caliptra FMC ...
2,864,532 UART:
2,864,586 UART: [state] CFI Enabled
2,874,997 UART: [fht] FMC Alias Private Key: 7
2,982,612 UART: [art] Extend RT PCRs Done
2,983,040 UART: [art] Lock RT PCRs Done
2,984,732 UART: [art] Populate DV Done
2,992,903 UART: [fht] FMC Alias Private Key: 7
2,993,911 UART: [art] Derive CDI
2,994,191 UART: [art] Store in in slot 0x4
3,079,628 UART: [art] Derive Key Pair
3,079,988 UART: [art] Store priv key in slot 0x5
3,093,262 UART: [art] Derive Key Pair - Done
3,107,787 UART: [art] Signing Cert with AUTHO
3,108,267 UART: RITY.KEYID = 7
3,123,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,288 UART: [art] PUB.X = ED1789A327E1D7D6EBA3F7F15F7DB501D4125863D2989DDFCE6FB2B8B2798864AAEEBD1909549701C00CB2B567279F5F
3,131,058 UART: [art] PUB.Y = 081EAF86D91D3D8C2F14691131ECA98A7A9265511A5B4BDE0719185AC78E177CB325C9ACA7AA305C84B8C1A75A0969AB
3,138,009 UART: [art] SIG.R = 42C5FAB318DA9A59EAE174CADF1912B0A6D6315ADA2C8C66E191071580E10893222270F445753BD5B0AB6639E98B72D8
3,144,777 UART: [art] SIG.S = 0F72819A3E5355AD7170BB184D17CEBF413CE8D5A623C5AD0CD2E03372CEBF8C27E57BFFCC914249903A7C38A6961601
3,168,109 UART: Caliptra RT
3,168,362 UART: [state] CFI Enabled
3,274,551 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,991 UART: [rt]cmd =0x43455252, len=4
3,316,016 >>> mbox cmd response data (782 bytes)
3,316,017 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,094 UART: [rt]cmd =0x44504543, len=92
3,529,445 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,952 ready_for_fw is high
1,055,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,796 >>> mbox cmd response: success
2,622,796 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,685,006 UART:
2,685,022 UART: Running Caliptra FMC ...
2,685,430 UART:
2,685,484 UART: [state] CFI Enabled
2,695,973 UART: [fht] FMC Alias Private Key: 7
2,803,692 UART: [art] Extend RT PCRs Done
2,804,120 UART: [art] Lock RT PCRs Done
2,805,666 UART: [art] Populate DV Done
2,814,031 UART: [fht] FMC Alias Private Key: 7
2,815,187 UART: [art] Derive CDI
2,815,467 UART: [art] Store in in slot 0x4
2,901,146 UART: [art] Derive Key Pair
2,901,506 UART: [art] Store priv key in slot 0x5
2,914,882 UART: [art] Derive Key Pair - Done
2,929,734 UART: [art] Signing Cert with AUTHO
2,930,214 UART: RITY.KEYID = 7
2,945,528 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,293 UART: [art] PUB.X = ADA4266527A49C900178B551B34EC7683F59DF573182E5900812C56146B198615F5E0A9DD83C054DF6FC851320824517
2,953,039 UART: [art] PUB.Y = 34B7EFBD4BEA61527CECD007889B07BC4C4AD95DC0A1F02EE5E2FEBB4C6BDE6F757BD69B61B6E2BFC9ED217AB34D7969
2,960,015 UART: [art] SIG.R = E2CD4D08BFCA68D22E64F4949A4390FD13514B134532B2F5652889C1A88C36E04D334A5E02877B6D928538F8129C461C
2,966,775 UART: [art] SIG.S = 00BDF7D83D38549253B81259262DE8472C801D0A144F97C74D006634EFD6DAD9BE31C838B9CD667C5B7AAEE39A0F608C
2,990,384 UART: Caliptra RT
2,990,637 UART: [state] CFI Enabled
3,098,631 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,087 UART: [rt]cmd =0x43455252, len=4
3,140,039 >>> mbox cmd response data (783 bytes)
3,140,040 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,153 UART: [rt]cmd =0x44504543, len=92
3,353,854 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,308 UART: [kat] SHA2-256
902,248 UART: [kat] SHA2-384
905,027 UART: [kat] SHA2-512-ACC
906,928 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,374 UART: [cold-reset] ++
1,170,900 UART: [fht] FHT @ 0x50003400
1,173,682 UART: [idev] ++
1,173,850 UART: [idev] CDI.KEYID = 6
1,174,211 UART: [idev] SUBJECT.KEYID = 7
1,174,636 UART: [idev] UDS.KEYID = 0
1,174,982 ready_for_fw is high
1,174,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,634 UART: [idev] Erasing UDS.KEYID = 0
1,199,606 UART: [idev] Sha1 KeyId Algorithm
1,208,448 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,119 UART: [ldev] SUBJECT.KEYID = 5
1,210,546 UART: [ldev] AUTHORITY.KEYID = 7
1,211,009 UART: [ldev] FE.KEYID = 1
1,216,385 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,565 UART: [ldev] --
1,281,917 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,253 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,963 >>> mbox cmd response: success
2,773,963 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,120 UART: [afmc] ++
2,775,288 UART: [afmc] CDI.KEYID = 6
2,775,651 UART: [afmc] SUBJECT.KEYID = 7
2,776,077 UART: [afmc] AUTHORITY.KEYID = 5
2,811,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,414 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,297 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,016 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,977 UART: [afmc] --
2,855,105 UART: [cold-reset] --
2,855,747 UART: [state] Locking Datavault
2,856,858 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,462 UART: [state] Locking ICCM
2,858,084 UART: [exit] Launching FMC @ 0x40000130
2,863,413 UART:
2,863,429 UART: Running Caliptra FMC ...
2,863,837 UART:
2,863,980 UART: [state] CFI Enabled
2,874,055 UART: [fht] FMC Alias Private Key: 7
2,982,694 UART: [art] Extend RT PCRs Done
2,983,122 UART: [art] Lock RT PCRs Done
2,984,986 UART: [art] Populate DV Done
2,993,281 UART: [fht] FMC Alias Private Key: 7
2,994,437 UART: [art] Derive CDI
2,994,717 UART: [art] Store in in slot 0x4
3,080,332 UART: [art] Derive Key Pair
3,080,692 UART: [art] Store priv key in slot 0x5
3,094,260 UART: [art] Derive Key Pair - Done
3,109,120 UART: [art] Signing Cert with AUTHO
3,109,600 UART: RITY.KEYID = 7
3,125,084 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,849 UART: [art] PUB.X = A8DDF32BA83DE18B01E6C3A49902598DA04670C90695EF293FF6D4C93A6C99D3E7FFB9B768F21D4C0EA5AF4480B03FAD
3,132,625 UART: [art] PUB.Y = 40E133A066AC9B8769FB4E70C5710E6D7491D0B45CA121B48BBEF7AF02395654C45C23819EDB0E490E489CB48D90E9DE
3,139,571 UART: [art] SIG.R = F781F0535AE565C019441C569551BA35D89AC09E2526F2DDDB31DD9FAD6D8F008F779C24EB67D8BE9B648BAE5DD43F67
3,146,333 UART: [art] SIG.S = 41C7260A9090245F2AD72A988AA4D8BD046FDB06637654F1486457B5D139FE84F500C8790A62B7F0B251960C3ACB4F97
3,169,637 UART: Caliptra RT
3,169,982 UART: [state] CFI Enabled
3,277,805 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,173 UART: [rt]cmd =0x43455252, len=4
3,319,026 >>> mbox cmd response data (783 bytes)
3,319,027 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,938 UART: [rt]cmd =0x44504543, len=92
3,531,888 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,839 ready_for_fw is high
1,055,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,803 >>> mbox cmd response: success
2,621,803 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,684,587 UART:
2,684,603 UART: Running Caliptra FMC ...
2,685,011 UART:
2,685,154 UART: [state] CFI Enabled
2,695,849 UART: [fht] FMC Alias Private Key: 7
2,803,914 UART: [art] Extend RT PCRs Done
2,804,342 UART: [art] Lock RT PCRs Done
2,805,888 UART: [art] Populate DV Done
2,813,943 UART: [fht] FMC Alias Private Key: 7
2,815,071 UART: [art] Derive CDI
2,815,351 UART: [art] Store in in slot 0x4
2,901,258 UART: [art] Derive Key Pair
2,901,618 UART: [art] Store priv key in slot 0x5
2,914,806 UART: [art] Derive Key Pair - Done
2,929,835 UART: [art] Signing Cert with AUTHO
2,930,315 UART: RITY.KEYID = 7
2,945,575 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,340 UART: [art] PUB.X = 9FD6D783B774AC9A7C215C91C9318F7B469C738CCA6C5F10B2C730945D3109C1E032555D143EF22F8AA88CECB0501FD7
2,953,115 UART: [art] PUB.Y = B8FC4C89F1712A7B5D96814FAB4BE3129F3061E14A08E71CD23B7B858DD90467C03E509370C5DE0A12BC19157AAF8599
2,960,062 UART: [art] SIG.R = 9C4164FDE81B4182C7EC5A9931C7D30C079EB7BFB55EB6147CA8166BAC5F092AE54A0848E253847524AF35036F5D5387
2,966,821 UART: [art] SIG.S = 97C8DDC6591A8B71B9AABC646AFA8E8EBB26A854C0BEA1CD32E474181E391622A53D84368FABB024A9FB0A44E382CCC2
2,990,397 UART: Caliptra RT
2,990,742 UART: [state] CFI Enabled
3,098,976 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,374 UART: [rt]cmd =0x43455252, len=4
3,140,188 >>> mbox cmd response data (784 bytes)
3,140,189 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,984 UART: [rt]cmd =0x44504543, len=92
3,353,921 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,035 UART:
192,410 UART: Running Caliptra ROM ...
193,579 UART:
193,729 UART: [state] CFI Enabled
260,399 UART: [state] LifecycleState = Unprovisioned
262,381 UART: [state] DebugLocked = No
264,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,049 UART: [kat] SHA2-256
438,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,207 UART: [kat] ++
449,661 UART: [kat] sha1
460,108 UART: [kat] SHA2-256
462,840 UART: [kat] SHA2-384
467,907 UART: [kat] SHA2-512-ACC
470,273 UART: [kat] ECC-384
2,767,359 UART: [kat] HMAC-384Kdf
2,778,615 UART: [kat] LMS
3,968,940 UART: [kat] --
3,973,308 UART: [cold-reset] ++
3,974,956 UART: [fht] Storing FHT @ 0x50003400
3,987,362 UART: [idev] ++
3,987,926 UART: [idev] CDI.KEYID = 6
3,988,909 UART: [idev] SUBJECT.KEYID = 7
3,990,152 UART: [idev] UDS.KEYID = 0
3,991,206 ready_for_fw is high
3,991,415 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,979 UART: [idev] Erasing UDS.KEYID = 0
7,324,864 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,776 UART: [idev] --
7,350,222 UART: [ldev] ++
7,350,791 UART: [ldev] CDI.KEYID = 6
7,351,759 UART: [ldev] SUBJECT.KEYID = 5
7,352,969 UART: [ldev] AUTHORITY.KEYID = 7
7,354,250 UART: [ldev] FE.KEYID = 1
7,401,856 UART: [ldev] Erasing FE.KEYID = 1
10,736,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,080 UART: [ldev] --
13,117,645 UART: [fwproc] Waiting for Commands...
13,120,338 UART: [fwproc] Received command 0x46574c44
13,122,522 UART: [fwproc] Received Image of size 114124 bytes
17,179,930 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,587 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,327,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,644,707 >>> mbox cmd response: success
17,645,230 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,648,241 UART: [afmc] ++
17,648,852 UART: [afmc] CDI.KEYID = 6
17,649,735 UART: [afmc] SUBJECT.KEYID = 7
17,651,009 UART: [afmc] AUTHORITY.KEYID = 5
21,010,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,000 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,444 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,240 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,695 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,050 UART: [afmc] --
23,381,603 UART: [cold-reset] --
23,386,863 UART: [state] Locking Datavault
23,392,702 UART: [state] Locking PCR0, PCR1 and PCR31
23,394,466 UART: [state] Locking ICCM
23,395,513 UART: [exit] Launching FMC @ 0x40000130
23,403,909 UART:
23,404,160 UART: Running Caliptra FMC ...
23,405,418 UART:
23,405,581 UART: [state] CFI Enabled
23,470,226 UART: [fht] FMC Alias Private Key: 7
25,809,248 UART: [art] Extend RT PCRs Done
25,810,473 UART: [art] Lock RT PCRs Done
25,812,184 UART: [art] Populate DV Done
25,817,484 UART: [fht] FMC Alias Private Key: 7
25,819,019 UART: [art] Derive CDI
25,819,757 UART: [art] Store in in slot 0x4
25,879,090 UART: [art] Derive Key Pair
25,880,092 UART: [art] Store priv key in slot 0x5
29,173,169 UART: [art] Derive Key Pair - Done
29,186,382 UART: [art] Signing Cert with AUTHO
29,187,695 UART: RITY.KEYID = 7
31,475,672 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,195 UART: [art] PUB.X = B48B7236B56C22EB9006BDB9709A31A7CDC5E16039D8EDC21E129CD079DEA11D67C55D561FF15C0616A9941EE0787204
31,484,662 UART: [art] PUB.Y = DF514894C200F021E43EE64681F02C6496E33757D57150AF1E58CF11F77CEB2DB81A53D367B04B8FAC0059CF5E039B65
31,491,649 UART: [art] SIG.R = 3EAA4DD23DD9CC222A82B2CFBBBFA8535B4BDD299753187698EA39AE7BB262A37CC62597E877C017FEEB7C27A9E5E082
31,499,097 UART: [art] SIG.S = D8A661DE5EB5382CAA6D14365F63F35781FF2EF8E8931BAB802846631F00B47F42614DA8ABBCF0759A2ABFDA7A049D28
32,804,372 UART: Caliptra RT
32,805,088 UART: [state] CFI Enabled
32,966,794 UART: [rt] RT listening for mailbox commands...
32,998,374 UART: [rt]cmd =0x4c444556, len=4
33,009,521 >>> mbox cmd response data (687 bytes)
33,050,838 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,080,945 UART: [rt]cmd =0x43455246, len=4
33,093,864 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,806,234 ready_for_fw is high
3,806,621 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,884,722 >>> mbox cmd response: success
17,885,547 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,565,379 UART:
23,565,758 UART: Running Caliptra FMC ...
23,566,897 UART:
23,567,053 UART: [state] CFI Enabled
23,637,422 UART: [fht] FMC Alias Private Key: 7
25,975,361 UART: [art] Extend RT PCRs Done
25,976,584 UART: [art] Lock RT PCRs Done
25,978,371 UART: [art] Populate DV Done
25,983,792 UART: [fht] FMC Alias Private Key: 7
25,985,284 UART: [art] Derive CDI
25,986,060 UART: [art] Store in in slot 0x4
26,046,703 UART: [art] Derive Key Pair
26,047,717 UART: [art] Store priv key in slot 0x5
29,340,044 UART: [art] Derive Key Pair - Done
29,352,986 UART: [art] Signing Cert with AUTHO
29,354,321 UART: RITY.KEYID = 7
31,642,578 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,085 UART: [art] PUB.X = 4AE80B1F9BE0BDCABAC42458FD9C7D3C79BA0B32A0508862756A569A96FEDFF4453FD298244270E3272E8BDAE427B5A0
31,651,359 UART: [art] PUB.Y = D43D96DD09DCD6FF544EB503933196EEB8AA7A755B01BBBDE668F8F1D0CE4F7B2276734C2C1B35457413530361EC5CB1
31,658,605 UART: [art] SIG.R = 74A7703F695178D950EB4DB04038E0B0E37D081C5DBA1CDE149E966FD157D9FFC8D0BD9A94094819FDCA023307579A0E
31,666,031 UART: [art] SIG.S = C25C44BC06C96E955E79666BD0EA0B00A073D2C749DA0F10B6470674C4E182AB20D9E05A7D1380949653BF16429A1086
32,970,862 UART: Caliptra RT
32,971,570 UART: [state] CFI Enabled
33,134,304 UART: [rt] RT listening for mailbox commands...
33,165,566 UART: [rt]cmd =0x4c444556, len=4
33,176,600 >>> mbox cmd response data (687 bytes)
33,218,452 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,248,257 UART: [rt]cmd =0x43455246, len=4
33,261,218 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,431 UART:
192,794 UART: Running Caliptra ROM ...
193,947 UART:
603,486 UART: [state] CFI Enabled
618,714 UART: [state] LifecycleState = Unprovisioned
620,590 UART: [state] DebugLocked = No
622,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,426 UART: [kat] SHA2-256
797,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,747 UART: [kat] ++
808,186 UART: [kat] sha1
819,423 UART: [kat] SHA2-256
822,119 UART: [kat] SHA2-384
828,755 UART: [kat] SHA2-512-ACC
831,121 UART: [kat] ECC-384
3,114,610 UART: [kat] HMAC-384Kdf
3,126,703 UART: [kat] LMS
4,316,803 UART: [kat] --
4,321,660 UART: [cold-reset] ++
4,323,231 UART: [fht] Storing FHT @ 0x50003400
4,333,686 UART: [idev] ++
4,334,290 UART: [idev] CDI.KEYID = 6
4,335,210 UART: [idev] SUBJECT.KEYID = 7
4,336,454 UART: [idev] UDS.KEYID = 0
4,337,457 ready_for_fw is high
4,337,676 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,987 UART: [idev] Erasing UDS.KEYID = 0
7,625,494 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,957 UART: [idev] --
7,651,995 UART: [ldev] ++
7,652,559 UART: [ldev] CDI.KEYID = 6
7,653,490 UART: [ldev] SUBJECT.KEYID = 5
7,654,693 UART: [ldev] AUTHORITY.KEYID = 7
7,655,972 UART: [ldev] FE.KEYID = 1
7,667,552 UART: [ldev] Erasing FE.KEYID = 1
10,954,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,263 UART: [ldev] --
13,315,425 UART: [fwproc] Waiting for Commands...
13,318,647 UART: [fwproc] Received command 0x46574c44
13,320,876 UART: [fwproc] Received Image of size 114124 bytes
17,376,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,443 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,330 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,757 >>> mbox cmd response: success
17,835,299 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,839,762 UART: [afmc] ++
17,840,366 UART: [afmc] CDI.KEYID = 6
17,841,244 UART: [afmc] SUBJECT.KEYID = 7
17,842,510 UART: [afmc] AUTHORITY.KEYID = 5
21,152,927 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,949 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,199 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,607 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,404 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,858 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,011 UART: [afmc] --
23,517,472 UART: [cold-reset] --
23,520,789 UART: [state] Locking Datavault
23,527,215 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,971 UART: [state] Locking ICCM
23,530,249 UART: [exit] Launching FMC @ 0x40000130
23,538,646 UART:
23,538,940 UART: Running Caliptra FMC ...
23,540,056 UART:
23,540,218 UART: [state] CFI Enabled
23,548,159 UART: [fht] FMC Alias Private Key: 7
25,878,613 UART: [art] Extend RT PCRs Done
25,879,827 UART: [art] Lock RT PCRs Done
25,881,497 UART: [art] Populate DV Done
25,887,060 UART: [fht] FMC Alias Private Key: 7
25,888,651 UART: [art] Derive CDI
25,889,459 UART: [art] Store in in slot 0x4
25,932,268 UART: [art] Derive Key Pair
25,933,481 UART: [art] Store priv key in slot 0x5
29,175,361 UART: [art] Derive Key Pair - Done
29,188,300 UART: [art] Signing Cert with AUTHO
29,189,603 UART: RITY.KEYID = 7
31,469,368 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,892 UART: [art] PUB.X = 8035F3328CC3841EF45220458E39898F653AE09DF203CB4D7C518B3425E6A601713F7FFA8FFFE8D84FB7C6BD009A892D
31,478,132 UART: [art] PUB.Y = 85B58FFB27EA7A34085C61E91DEABC637536E2BC61C7C8C08037099E1A9AB5AE364522A7B95ECD53346633213538EBAF
31,485,404 UART: [art] SIG.R = 5D35E2F3E47C04E7D798EAEFDE422C316A52147F35D3D6762C06A3ABA194F83100ECFD3A046236036FFF95BB52FEBCD2
31,492,778 UART: [art] SIG.S = 59CAF3060838198737BD61AB068B1827C9671CCBE6BDA737BB8BF3A4B9A6F275C1F3352F18901F7283F4747E91AD937B
32,797,648 UART: Caliptra RT
32,798,358 UART: [state] CFI Enabled
32,916,075 UART: [rt] RT listening for mailbox commands...
32,947,336 UART: [rt]cmd =0x4c444556, len=4
32,958,465 >>> mbox cmd response data (687 bytes)
33,000,690 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,030,642 UART: [rt]cmd =0x43455246, len=4
33,043,440 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
4,122,848 ready_for_fw is high
4,123,206 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,076,494 >>> mbox cmd response: success
18,077,261 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,718,358 UART:
23,718,746 UART: Running Caliptra FMC ...
23,719,840 UART:
23,720,016 UART: [state] CFI Enabled
23,728,031 UART: [fht] FMC Alias Private Key: 7
26,058,875 UART: [art] Extend RT PCRs Done
26,060,100 UART: [art] Lock RT PCRs Done
26,061,789 UART: [art] Populate DV Done
26,067,261 UART: [fht] FMC Alias Private Key: 7
26,068,807 UART: [art] Derive CDI
26,069,623 UART: [art] Store in in slot 0x4
26,111,945 UART: [art] Derive Key Pair
26,112,944 UART: [art] Store priv key in slot 0x5
29,354,961 UART: [art] Derive Key Pair - Done
29,367,735 UART: [art] Signing Cert with AUTHO
29,369,035 UART: RITY.KEYID = 7
31,648,477 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,987 UART: [art] PUB.X = 90137B6D00C723A2797F4BE243F74C57E37B817300C472968C3ADF5868E1B8471CA45AA926F716B5064E059E10D19927
31,657,202 UART: [art] PUB.Y = E9523F48A18F150B4BF303E16F9DB10C7C51E446499A30CBB1931448713521F649F72A46341A7C8034B213F477B32DCA
31,664,401 UART: [art] SIG.R = B850C231AE78BA6D96CFA34C0E8218209D1BC00A73E0E82EB969A15CA16CED69000C2ED6005B90BFFAC710A75433E31F
31,671,792 UART: [art] SIG.S = 27E386B4C7D2D9F5ED3B7E07946CC8B81411711DF202188F4270F168C8C19D5A552CF18C62122CA6D8EABA736250F64E
32,977,149 UART: Caliptra RT
32,977,866 UART: [state] CFI Enabled
33,096,454 UART: [rt] RT listening for mailbox commands...
33,127,875 UART: [rt]cmd =0x4c444556, len=4
33,139,060 >>> mbox cmd response data (687 bytes)
33,181,196 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,211,335 UART: [rt]cmd =0x43455246, len=4
33,224,404 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,140 UART:
192,509 UART: Running Caliptra ROM ...
193,705 UART:
193,858 UART: [state] CFI Enabled
263,389 UART: [state] LifecycleState = Unprovisioned
265,304 UART: [state] DebugLocked = No
266,843 UART: [state] WD Timer not started. Device not locked for debugging
269,740 UART: [kat] SHA2-256
448,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,504 UART: [kat] ++
461,034 UART: [kat] sha1
473,108 UART: [kat] SHA2-256
476,162 UART: [kat] SHA2-384
483,862 UART: [kat] SHA2-512-ACC
486,796 UART: [kat] ECC-384
2,947,178 UART: [kat] HMAC-384Kdf
2,970,429 UART: [kat] LMS
3,499,849 UART: [kat] --
3,504,506 UART: [cold-reset] ++
3,507,081 UART: [fht] FHT @ 0x50003400
3,518,245 UART: [idev] ++
3,518,857 UART: [idev] CDI.KEYID = 6
3,519,777 UART: [idev] SUBJECT.KEYID = 7
3,520,954 UART: [idev] UDS.KEYID = 0
3,521,879 ready_for_fw is high
3,522,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,951 UART: [idev] Erasing UDS.KEYID = 0
6,026,140 UART: [idev] Sha1 KeyId Algorithm
6,050,409 UART: [idev] --
6,054,735 UART: [ldev] ++
6,055,307 UART: [ldev] CDI.KEYID = 6
6,056,225 UART: [ldev] SUBJECT.KEYID = 5
6,057,443 UART: [ldev] AUTHORITY.KEYID = 7
6,058,678 UART: [ldev] FE.KEYID = 1
6,099,356 UART: [ldev] Erasing FE.KEYID = 1
8,606,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,286 UART: [ldev] --
10,412,587 UART: [fwproc] Wait for Commands...
10,415,607 UART: [fwproc] Recv command 0x46574c44
10,417,700 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,178 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,764 >>> mbox cmd response: success
14,283,280 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,287,678 UART: [afmc] ++
14,288,257 UART: [afmc] CDI.KEYID = 6
14,289,140 UART: [afmc] SUBJECT.KEYID = 7
14,290,378 UART: [afmc] AUTHORITY.KEYID = 5
16,825,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,526 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,260 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,314 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,179 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,716 UART: [afmc] --
18,629,148 UART: [cold-reset] --
18,633,581 UART: [state] Locking Datavault
18,639,212 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,857 UART: [state] Locking ICCM
18,642,740 UART: [exit] Launching FMC @ 0x40000130
18,651,136 UART:
18,651,366 UART: Running Caliptra FMC ...
18,652,467 UART:
18,652,646 UART: [state] CFI Enabled
18,711,203 UART: [fht] FMC Alias Private Key: 7
20,475,177 UART: [art] Extend RT PCRs Done
20,476,393 UART: [art] Lock RT PCRs Done
20,477,859 UART: [art] Populate DV Done
20,483,158 UART: [fht] FMC Alias Private Key: 7
20,484,743 UART: [art] Derive CDI
20,485,561 UART: [art] Store in in slot 0x4
20,543,977 UART: [art] Derive Key Pair
20,544,974 UART: [art] Store priv key in slot 0x5
23,007,789 UART: [art] Derive Key Pair - Done
23,020,525 UART: [art] Signing Cert with AUTHO
23,021,835 UART: RITY.KEYID = 7
24,734,304 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,813 UART: [art] PUB.X = B13CC4A1FE43B2DB59E197D04152AE1F2D739C85AF788C1822B9E1D90E3C51999E1790CC071B43C8BCAD72A172DDA9F4
24,743,073 UART: [art] PUB.Y = 7D40B8D5EC92631072F6AB8701640162B88418CB46C9CA0ABFE48D00E2DC774AC2A7F7E84053F987C52E2ED02C32B8EB
24,750,333 UART: [art] SIG.R = 375AC3E421D1F670F8D2E9F720D8717E1DA308E55836D01BF926087615591A88C3101935650CFE21AC591447F2625CC7
24,757,683 UART: [art] SIG.S = C35E014EE508CE23A4DC235E5EE7F5BA43BD7C879CAC8B3EDDA4E8C56FCE1E57686BD4A3F211651D299766AE861C9F60
25,737,100 UART: Caliptra RT
25,737,789 UART: [state] CFI Enabled
25,903,907 UART: [rt] RT listening for mailbox commands...
25,935,529 UART: [rt]cmd =0x4c444556, len=4
25,946,518 >>> mbox cmd response data (687 bytes)
25,988,165 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,018,214 UART: [rt]cmd =0x43455246, len=4
26,030,875 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,381,302 ready_for_fw is high
3,381,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,075,919 >>> mbox cmd response: success
14,076,516 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,365,329 UART:
18,365,713 UART: Running Caliptra FMC ...
18,366,821 UART:
18,366,975 UART: [state] CFI Enabled
18,433,912 UART: [fht] FMC Alias Private Key: 7
20,197,729 UART: [art] Extend RT PCRs Done
20,198,954 UART: [art] Lock RT PCRs Done
20,200,612 UART: [art] Populate DV Done
20,205,969 UART: [fht] FMC Alias Private Key: 7
20,207,564 UART: [art] Derive CDI
20,208,304 UART: [art] Store in in slot 0x4
20,266,877 UART: [art] Derive Key Pair
20,267,876 UART: [art] Store priv key in slot 0x5
22,731,241 UART: [art] Derive Key Pair - Done
22,744,132 UART: [art] Signing Cert with AUTHO
22,745,455 UART: RITY.KEYID = 7
24,457,412 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,920 UART: [art] PUB.X = A890BCAA0CFD335E3E445F3FBB74CFC61CA835F0DC4FF843C13D092243378A83FD2E1CE8AD4D9E8F38AEE248A8C7345E
24,466,224 UART: [art] PUB.Y = 85B5F4CB501F451DA5BF6FE6B3BF6FB8469A071E91855B4116ACA0203BC96E1773FEB56AC458B9AE362FB2128953DBBD
24,473,478 UART: [art] SIG.R = E18FF4AA83BD63980A4BB60F34B5328FC751C43FE5E0353DEF035BAFFE7AE8F44A5A62D08767904F2A630A90DBAF22CB
24,480,933 UART: [art] SIG.S = D6BE00A77CF5092C06CE3BD90073D975ABC2492A2A6008A99C763C510ADC4F59AC3A9C71CBF4493F517DB02A6527B0EB
25,460,323 UART: Caliptra RT
25,461,023 UART: [state] CFI Enabled
25,625,297 UART: [rt] RT listening for mailbox commands...
25,656,704 UART: [rt]cmd =0x4c444556, len=4
25,667,868 >>> mbox cmd response data (687 bytes)
25,708,982 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,738,938 UART: [rt]cmd =0x43455246, len=4
25,751,667 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,420 UART:
192,812 UART: Running Caliptra ROM ...
193,992 UART:
603,594 UART: [state] CFI Enabled
616,342 UART: [state] LifecycleState = Unprovisioned
618,241 UART: [state] DebugLocked = No
620,345 UART: [state] WD Timer not started. Device not locked for debugging
623,620 UART: [kat] SHA2-256
802,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,254 UART: [kat] ++
814,781 UART: [kat] sha1
826,579 UART: [kat] SHA2-256
829,644 UART: [kat] SHA2-384
836,971 UART: [kat] SHA2-512-ACC
839,977 UART: [kat] ECC-384
3,280,912 UART: [kat] HMAC-384Kdf
3,293,855 UART: [kat] LMS
3,823,360 UART: [kat] --
3,828,799 UART: [cold-reset] ++
3,830,870 UART: [fht] FHT @ 0x50003400
3,840,637 UART: [idev] ++
3,841,196 UART: [idev] CDI.KEYID = 6
3,842,143 UART: [idev] SUBJECT.KEYID = 7
3,843,396 UART: [idev] UDS.KEYID = 0
3,844,290 ready_for_fw is high
3,844,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,170 UART: [idev] Erasing UDS.KEYID = 0
6,321,770 UART: [idev] Sha1 KeyId Algorithm
6,344,511 UART: [idev] --
6,348,878 UART: [ldev] ++
6,349,440 UART: [ldev] CDI.KEYID = 6
6,350,400 UART: [ldev] SUBJECT.KEYID = 5
6,351,558 UART: [ldev] AUTHORITY.KEYID = 7
6,352,781 UART: [ldev] FE.KEYID = 1
6,364,875 UART: [ldev] Erasing FE.KEYID = 1
8,839,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,464 UART: [ldev] --
10,630,789 UART: [fwproc] Wait for Commands...
10,632,988 UART: [fwproc] Recv command 0x46574c44
10,635,021 UART: [fwproc] Recv'd Img size: 114448 bytes
14,043,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,120,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,189,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,506,602 >>> mbox cmd response: success
14,507,097 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,511,615 UART: [afmc] ++
14,512,198 UART: [afmc] CDI.KEYID = 6
14,513,260 UART: [afmc] SUBJECT.KEYID = 7
14,514,356 UART: [afmc] AUTHORITY.KEYID = 5
17,015,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,737,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,739,871 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,755,640 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,771,643 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,787,497 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,810,464 UART: [afmc] --
18,814,162 UART: [cold-reset] --
18,818,012 UART: [state] Locking Datavault
18,823,628 UART: [state] Locking PCR0, PCR1 and PCR31
18,825,317 UART: [state] Locking ICCM
18,826,865 UART: [exit] Launching FMC @ 0x40000130
18,835,307 UART:
18,835,532 UART: Running Caliptra FMC ...
18,836,626 UART:
18,836,774 UART: [state] CFI Enabled
18,844,704 UART: [fht] FMC Alias Private Key: 7
20,601,652 UART: [art] Extend RT PCRs Done
20,602,885 UART: [art] Lock RT PCRs Done
20,604,348 UART: [art] Populate DV Done
20,609,807 UART: [fht] FMC Alias Private Key: 7
20,611,391 UART: [art] Derive CDI
20,612,154 UART: [art] Store in in slot 0x4
20,654,803 UART: [art] Derive Key Pair
20,655,799 UART: [art] Store priv key in slot 0x5
23,082,296 UART: [art] Derive Key Pair - Done
23,094,957 UART: [art] Signing Cert with AUTHO
23,096,296 UART: RITY.KEYID = 7
24,802,004 UART: [art] Erasing AUTHORITY.KEYID = 7
24,803,514 UART: [art] PUB.X = C498CBCBAF978A5EF74D152991B9A782027CF603B67BF323516CCAC3A32B4EEA55EDC1A5F731B44CE5817B083B9D5403
24,810,813 UART: [art] PUB.Y = 0EF109593DBCD79F11DC3154F5B4B82CC6BD1AAC4C888418921F3477FEAE2FF152240F17629898795052D015BF0C553F
24,818,090 UART: [art] SIG.R = 995F9160BDDF9C47609614D4CD547DC83F90A39561A600C49598590E8BAF07198F3F596CA38CA27461B38B45FDA3B5EE
24,825,415 UART: [art] SIG.S = 1DC8819EBEE3FBE8E073301BBB95850F1081677588075752CE10144A84C93682498E141C6D35A97CB294FE8C58638A6B
25,803,896 UART: Caliptra RT
25,804,600 UART: [state] CFI Enabled
25,921,651 UART: [rt] RT listening for mailbox commands...
25,953,275 UART: [rt]cmd =0x4c444556, len=4
25,964,410 >>> mbox cmd response data (687 bytes)
26,006,561 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,036,661 UART: [rt]cmd =0x43455246, len=4
26,049,509 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,693,737 ready_for_fw is high
3,694,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,382 >>> mbox cmd response: success
14,267,190 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,518,052 UART:
18,518,448 UART: Running Caliptra FMC ...
18,519,590 UART:
18,519,737 UART: [state] CFI Enabled
18,527,495 UART: [fht] FMC Alias Private Key: 7
20,284,222 UART: [art] Extend RT PCRs Done
20,285,453 UART: [art] Lock RT PCRs Done
20,287,133 UART: [art] Populate DV Done
20,292,748 UART: [fht] FMC Alias Private Key: 7
20,294,183 UART: [art] Derive CDI
20,294,944 UART: [art] Store in in slot 0x4
20,337,749 UART: [art] Derive Key Pair
20,338,745 UART: [art] Store priv key in slot 0x5
22,765,906 UART: [art] Derive Key Pair - Done
22,778,994 UART: [art] Signing Cert with AUTHO
22,780,306 UART: RITY.KEYID = 7
24,485,263 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,767 UART: [art] PUB.X = 94FBF5D0C690A9E71286576570AB5B9503FA728014E6185C5B615575FD510C13FDAA0454AC181A5B63890B8359196113
24,493,963 UART: [art] PUB.Y = 29CF930AAFEF0359D9DCD411CC39F9D395143C5FEFD752FDA6A1A63E5F32B9D40464C259BBA17721902EF5D3C0F4EACD
24,501,279 UART: [art] SIG.R = AA86788A18A7D931FC59560B831C80DB1E08DD8ABB552B7451D9AACC6C562636FA7FBD4AAF685E9E81B42B1F4DE7E96D
24,508,686 UART: [art] SIG.S = 760586AF3432150FC6EC17970B8E98A53FEB5FF2A06ECE52DF4706FF17B91406DC1B756FF35712B707DF0EA4426B363B
25,487,306 UART: Caliptra RT
25,488,020 UART: [state] CFI Enabled
25,604,275 UART: [rt] RT listening for mailbox commands...
25,635,469 UART: [rt]cmd =0x4c444556, len=4
25,646,659 >>> mbox cmd response data (687 bytes)
25,688,155 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,718,137 UART: [rt]cmd =0x43455246, len=4
25,730,719 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,441,929 ready_for_fw is high
3,442,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,761,773 >>> mbox cmd response: success
14,762,566 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,049,236 UART:
19,049,617 UART: Running Caliptra FMC ...
19,050,786 UART:
19,050,949 UART: [state] CFI Enabled
19,116,385 UART: [fht] FMC Alias Private Key: 7
20,880,324 UART: [art] Extend RT PCRs Done
20,881,553 UART: [art] Lock RT PCRs Done
20,883,263 UART: [art] Populate DV Done
20,888,623 UART: [fht] FMC Alias Private Key: 7
20,890,166 UART: [art] Derive CDI
20,890,906 UART: [art] Store in in slot 0x4
20,948,845 UART: [art] Derive Key Pair
20,949,883 UART: [art] Store priv key in slot 0x5
23,413,588 UART: [art] Derive Key Pair - Done
23,426,684 UART: [art] Signing Cert with AUTHO
23,427,981 UART: RITY.KEYID = 7
25,139,290 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,803 UART: [art] PUB.X = 5384EA06AC52496F14DEEC07C59F88B8D2357C7A3F923207EA3AAFEF1BF20CDA22FC99E2D4929D5B05538276D7744530
25,148,073 UART: [art] PUB.Y = 84C40F72A53B40C33644A588A6F53D4349BF7BB4005287EAB286756FF339C7CDC0B1C24F23249EFE362E4477249B3CB2
25,155,275 UART: [art] SIG.R = A296127067A4DD2952E5E8F3BE3B022EB5C589FB324E41574ECD96E5F41C233BB859E962CCC98772DA966E80510C75CF
25,162,703 UART: [art] SIG.S = C02E8C92D4249BFC28779DFA9896B1FB672CDABAFD6E802BD7F2295A6724D7F75AEA803B0534663B8C3D9D1625ACDA91
26,141,212 UART: Caliptra RT
26,141,936 UART: [state] CFI Enabled
26,307,731 UART: [rt] RT listening for mailbox commands...
26,338,826 UART: [rt]cmd =0x4c444556, len=4
26,349,799 >>> mbox cmd response data (687 bytes)
26,391,693 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,421,509 UART: [rt]cmd =0x43455246, len=4
26,434,145 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
3,757,995 ready_for_fw is high
3,758,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,960,934 >>> mbox cmd response: success
14,961,562 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,214,520 UART:
19,214,909 UART: Running Caliptra FMC ...
19,216,022 UART:
19,216,170 UART: [state] CFI Enabled
19,224,121 UART: [fht] FMC Alias Private Key: 7
20,980,645 UART: [art] Extend RT PCRs Done
20,981,876 UART: [art] Lock RT PCRs Done
20,983,470 UART: [art] Populate DV Done
20,988,772 UART: [fht] FMC Alias Private Key: 7
20,990,307 UART: [art] Derive CDI
20,991,036 UART: [art] Store in in slot 0x4
21,033,680 UART: [art] Derive Key Pair
21,034,721 UART: [art] Store priv key in slot 0x5
23,461,022 UART: [art] Derive Key Pair - Done
23,473,912 UART: [art] Signing Cert with AUTHO
23,475,207 UART: RITY.KEYID = 7
25,181,239 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,742 UART: [art] PUB.X = 6D19A4E77719A7E86F5C9EBA294D381D0C6726E3BAFF2689483EF7CCBDCFF3B8766D04CC69A4A95491F86AD34DAB00CA
25,190,060 UART: [art] PUB.Y = D47D6BFFD69F8CFF121CF4AEFB82044469197E794E9FC386AC659982F220DC592F39E2A8E2636437EDEECBA73EEE1D7D
25,197,322 UART: [art] SIG.R = 82972C37267D02DD7D050A6C018DC2ECF22B750456B486D5A1B979DE5892CCF0F240D48F95D76B635504500685A7A741
25,204,712 UART: [art] SIG.S = B54DD9112E518625B9CDEB5760201E734E127BE0629471BE57EA0900BD23E7A7E3CE2029A6488A3D398D5639268F786A
26,183,772 UART: Caliptra RT
26,184,461 UART: [state] CFI Enabled
26,301,469 UART: [rt] RT listening for mailbox commands...
26,332,817 UART: [rt]cmd =0x4c444556, len=4
26,343,843 >>> mbox cmd response data (687 bytes)
26,386,471 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,416,351 UART: [rt]cmd =0x43455246, len=4
26,429,042 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,961 UART: [kat] SHA2-256
881,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,007 UART: [kat] ++
886,159 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,466 UART: [kat] SHA2-512-ACC
897,367 UART: [kat] ECC-384
902,868 UART: [kat] HMAC-384Kdf
907,482 UART: [kat] LMS
1,475,678 UART: [kat] --
1,476,829 UART: [cold-reset] ++
1,477,309 UART: [fht] Storing FHT @ 0x50003400
1,480,240 UART: [idev] ++
1,480,408 UART: [idev] CDI.KEYID = 6
1,480,768 UART: [idev] SUBJECT.KEYID = 7
1,481,192 UART: [idev] UDS.KEYID = 0
1,481,537 ready_for_fw is high
1,481,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,206 UART: [idev] Erasing UDS.KEYID = 0
1,505,642 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,128 UART: [idev] --
1,515,121 UART: [ldev] ++
1,515,289 UART: [ldev] CDI.KEYID = 6
1,515,652 UART: [ldev] SUBJECT.KEYID = 5
1,516,078 UART: [ldev] AUTHORITY.KEYID = 7
1,516,541 UART: [ldev] FE.KEYID = 1
1,521,783 UART: [ldev] Erasing FE.KEYID = 1
1,547,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,652 UART: [ldev] --
1,586,993 UART: [fwproc] Waiting for Commands...
1,587,640 UART: [fwproc] Received command 0x46574c44
1,588,431 UART: [fwproc] Received Image of size 114448 bytes
2,888,864 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,582 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,934 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,947 >>> mbox cmd response: success
3,080,947 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,082,065 UART: [afmc] ++
3,082,233 UART: [afmc] CDI.KEYID = 6
3,082,595 UART: [afmc] SUBJECT.KEYID = 7
3,083,020 UART: [afmc] AUTHORITY.KEYID = 5
3,118,199 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,869 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,649 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,377 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,262 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,952 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,815 UART: [afmc] --
3,161,801 UART: [cold-reset] --
3,162,761 UART: [state] Locking Datavault
3,163,846 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,450 UART: [state] Locking ICCM
3,164,908 UART: [exit] Launching FMC @ 0x40000130
3,170,237 UART:
3,170,253 UART: Running Caliptra FMC ...
3,170,661 UART:
3,170,715 UART: [state] CFI Enabled
3,181,458 UART: [fht] FMC Alias Private Key: 7
3,289,483 UART: [art] Extend RT PCRs Done
3,289,911 UART: [art] Lock RT PCRs Done
3,291,491 UART: [art] Populate DV Done
3,299,648 UART: [fht] FMC Alias Private Key: 7
3,300,588 UART: [art] Derive CDI
3,300,868 UART: [art] Store in in slot 0x4
3,386,679 UART: [art] Derive Key Pair
3,387,039 UART: [art] Store priv key in slot 0x5
3,399,847 UART: [art] Derive Key Pair - Done
3,414,730 UART: [art] Signing Cert with AUTHO
3,415,210 UART: RITY.KEYID = 7
3,430,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,121 UART: [art] PUB.X = 658E991EC8539261345CFE2EF28426CEFAD01D4B4CAA86EDF29AC6EE430D2A73980DCEE0F0D0297E5F995053E85A0D95
3,437,896 UART: [art] PUB.Y = 14E5D7D899085523168B303C1938DB63AFA19B78DB78211713CA8049D3096FC165DE9B444A92C13F5E6135EE9341D40A
3,444,833 UART: [art] SIG.R = 3A2B0603A6C1C1C7209DEF2B0E51695E7889A76C4CDDBB87244DE971B42EB3C75415B9A3F6D86E204E85A107FA86BBEA
3,451,605 UART: [art] SIG.S = CC8B97764408C346BFF09E34FA3D3659DD6D1BA04C13D37B3404141A85A1EDD903FF587A19ACC9059DCCBD3B5EAEA150
3,476,216 UART: Caliptra RT
3,476,469 UART: [state] CFI Enabled
3,583,968 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,614 UART: [rt]cmd =0x4c444556, len=4
3,625,250 >>> mbox cmd response data (687 bytes)
3,625,251 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,654,756 UART: [rt]cmd =0x43455246, len=4
3,667,032 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,513 ready_for_fw is high
1,362,513 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,979 >>> mbox cmd response: success
2,927,979 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,989,245 UART:
2,989,261 UART: Running Caliptra FMC ...
2,989,669 UART:
2,989,723 UART: [state] CFI Enabled
3,000,134 UART: [fht] FMC Alias Private Key: 7
3,107,969 UART: [art] Extend RT PCRs Done
3,108,397 UART: [art] Lock RT PCRs Done
3,109,987 UART: [art] Populate DV Done
3,118,174 UART: [fht] FMC Alias Private Key: 7
3,119,334 UART: [art] Derive CDI
3,119,614 UART: [art] Store in in slot 0x4
3,204,613 UART: [art] Derive Key Pair
3,204,973 UART: [art] Store priv key in slot 0x5
3,218,807 UART: [art] Derive Key Pair - Done
3,233,704 UART: [art] Signing Cert with AUTHO
3,234,184 UART: RITY.KEYID = 7
3,249,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,337 UART: [art] PUB.X = E461B38556C514ECB71FC8D65E0A3184DC6A125F2966DED9C5DC76C70CCFDC87E3AB01814589D3885F37A460621B976B
3,257,106 UART: [art] PUB.Y = 25223D5A483E5B33E06AE0B7D32F261BD2439D3C52BB48B479A890984AD54CD89ACB400D4790B2E65DE074C2D28B8181
3,264,057 UART: [art] SIG.R = 173F08CA45892479E93CD9F444B7E6AA411C4E234444DF610B2CE8CD5ECBED3903BED2B02776AE08C60F972E9D4EA952
3,270,824 UART: [art] SIG.S = F36CC32AF6EB87D2676EA0D77360EDE11FF9940046755E634494A9A62DB4A28CCE9BB43CFDA135EB4F3A166D74A2DACD
3,294,359 UART: Caliptra RT
3,294,612 UART: [state] CFI Enabled
3,403,021 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,835 UART: [rt]cmd =0x4c444556, len=4
3,444,333 >>> mbox cmd response data (687 bytes)
3,444,334 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,741 UART: [rt]cmd =0x43455246, len=4
3,486,157 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,945 UART: [state] LifecycleState = Unprovisioned
86,600 UART: [state] DebugLocked = No
87,100 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,710 UART: [kat] SHA2-256
882,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,756 UART: [kat] ++
886,908 UART: [kat] sha1
891,292 UART: [kat] SHA2-256
893,230 UART: [kat] SHA2-384
895,983 UART: [kat] SHA2-512-ACC
897,884 UART: [kat] ECC-384
903,853 UART: [kat] HMAC-384Kdf
908,543 UART: [kat] LMS
1,476,739 UART: [kat] --
1,477,846 UART: [cold-reset] ++
1,478,188 UART: [fht] Storing FHT @ 0x50003400
1,480,865 UART: [idev] ++
1,481,033 UART: [idev] CDI.KEYID = 6
1,481,393 UART: [idev] SUBJECT.KEYID = 7
1,481,817 UART: [idev] UDS.KEYID = 0
1,482,162 ready_for_fw is high
1,482,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,909 UART: [idev] Erasing UDS.KEYID = 0
1,506,451 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,119 UART: [idev] --
1,516,348 UART: [ldev] ++
1,516,516 UART: [ldev] CDI.KEYID = 6
1,516,879 UART: [ldev] SUBJECT.KEYID = 5
1,517,305 UART: [ldev] AUTHORITY.KEYID = 7
1,517,768 UART: [ldev] FE.KEYID = 1
1,522,818 UART: [ldev] Erasing FE.KEYID = 1
1,548,149 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,983 UART: [ldev] --
1,587,468 UART: [fwproc] Waiting for Commands...
1,588,179 UART: [fwproc] Received command 0x46574c44
1,588,970 UART: [fwproc] Received Image of size 114448 bytes
2,888,449 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,829 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,181 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,176 >>> mbox cmd response: success
3,081,176 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,082,232 UART: [afmc] ++
3,082,400 UART: [afmc] CDI.KEYID = 6
3,082,762 UART: [afmc] SUBJECT.KEYID = 7
3,083,187 UART: [afmc] AUTHORITY.KEYID = 5
3,118,304 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,076 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,856 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,584 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,469 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,159 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,086 UART: [afmc] --
3,160,984 UART: [cold-reset] --
3,161,682 UART: [state] Locking Datavault
3,162,659 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,263 UART: [state] Locking ICCM
3,163,919 UART: [exit] Launching FMC @ 0x40000130
3,169,248 UART:
3,169,264 UART: Running Caliptra FMC ...
3,169,672 UART:
3,169,815 UART: [state] CFI Enabled
3,180,372 UART: [fht] FMC Alias Private Key: 7
3,288,575 UART: [art] Extend RT PCRs Done
3,289,003 UART: [art] Lock RT PCRs Done
3,290,709 UART: [art] Populate DV Done
3,298,918 UART: [fht] FMC Alias Private Key: 7
3,300,076 UART: [art] Derive CDI
3,300,356 UART: [art] Store in in slot 0x4
3,385,789 UART: [art] Derive Key Pair
3,386,149 UART: [art] Store priv key in slot 0x5
3,400,063 UART: [art] Derive Key Pair - Done
3,415,087 UART: [art] Signing Cert with AUTHO
3,415,567 UART: RITY.KEYID = 7
3,430,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,732 UART: [art] PUB.X = A2B2C8CDB9DD00875D3C8104855438D4BD144420029CC8CB7E76510FB569B924F509F120CB54923AD10DF5A3F723ACBA
3,438,473 UART: [art] PUB.Y = C3A43B91455C1D1D3FBAA4E2439EF0329414F54E9A52977793F9508C5B81AA2371920D56A45C6026EC20DB09F4B015E4
3,445,417 UART: [art] SIG.R = E082BAF7200EE321367C3E8642F0FF244F986354022BCB10A7673FBED5A5EA2B666F2AF170863062A1F82B9DD4BB4A1C
3,452,191 UART: [art] SIG.S = 7C406A7D42B55750E5B55C6A7F76AA16B1D3DE770D30943C7B11AC407E8FB63D376C5401EB5751AFD389DD7AB60BD39E
3,475,673 UART: Caliptra RT
3,476,018 UART: [state] CFI Enabled
3,583,327 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,585 UART: [rt]cmd =0x4c444556, len=4
3,624,249 >>> mbox cmd response data (687 bytes)
3,624,250 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,447 UART: [rt]cmd =0x43455246, len=4
3,665,815 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,206 ready_for_fw is high
1,363,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,792 >>> mbox cmd response: success
2,930,792 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,991,814 UART:
2,991,830 UART: Running Caliptra FMC ...
2,992,238 UART:
2,992,381 UART: [state] CFI Enabled
3,003,202 UART: [fht] FMC Alias Private Key: 7
3,111,127 UART: [art] Extend RT PCRs Done
3,111,555 UART: [art] Lock RT PCRs Done
3,113,055 UART: [art] Populate DV Done
3,121,324 UART: [fht] FMC Alias Private Key: 7
3,122,406 UART: [art] Derive CDI
3,122,686 UART: [art] Store in in slot 0x4
3,208,305 UART: [art] Derive Key Pair
3,208,665 UART: [art] Store priv key in slot 0x5
3,221,231 UART: [art] Derive Key Pair - Done
3,235,878 UART: [art] Signing Cert with AUTHO
3,236,358 UART: RITY.KEYID = 7
3,251,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,503 UART: [art] PUB.X = 2A3B9FA68127A703A604C12BD11D2F56332705B839E67C2691A72756CAB70CC8BBA04DF273F507914A6616B967ECD446
3,259,258 UART: [art] PUB.Y = 0A21DC61D38788082A4814C5ED0D9E9208247FCEF0849A92A1AA82437222EE610B0A5E1B42891769A6A1BAD3C241C9D0
3,266,192 UART: [art] SIG.R = 13F21D81377ABA49B382583F85A9AE805C1770AC4C394227FDA2EB14D7505CD1FCB90C469AD61A610CFFE1B7ED3F9E26
3,272,970 UART: [art] SIG.S = B43E8C01578FE118C74FFB63E848D59093326672A405CA4EFD86CE39EC49E6BABBFE0BF839AA81CBC13AAC72BB9FD902
3,296,565 UART: Caliptra RT
3,296,910 UART: [state] CFI Enabled
3,404,371 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,959 UART: [rt]cmd =0x4c444556, len=4
3,445,309 >>> mbox cmd response data (687 bytes)
3,445,310 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,719 UART: [rt]cmd =0x43455246, len=4
3,487,053 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
893,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,615 UART: [kat] ++
897,767 UART: [kat] sha1
902,105 UART: [kat] SHA2-256
904,045 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,134 UART: [kat] HMAC-384Kdf
922,820 UART: [kat] LMS
1,171,148 UART: [kat] --
1,171,969 UART: [cold-reset] ++
1,172,477 UART: [fht] FHT @ 0x50003400
1,175,156 UART: [idev] ++
1,175,324 UART: [idev] CDI.KEYID = 6
1,175,684 UART: [idev] SUBJECT.KEYID = 7
1,176,108 UART: [idev] UDS.KEYID = 0
1,176,453 ready_for_fw is high
1,176,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,196 UART: [idev] Erasing UDS.KEYID = 0
1,200,989 UART: [idev] Sha1 KeyId Algorithm
1,209,333 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,732 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,729 UART: [ldev] Erasing FE.KEYID = 1
1,243,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,277 UART: [ldev] --
1,282,616 UART: [fwproc] Wait for Commands...
1,283,244 UART: [fwproc] Recv command 0x46574c44
1,283,972 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,396 >>> mbox cmd response: success
2,776,396 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,526 UART: [afmc] ++
2,777,694 UART: [afmc] CDI.KEYID = 6
2,778,056 UART: [afmc] SUBJECT.KEYID = 7
2,778,481 UART: [afmc] AUTHORITY.KEYID = 5
2,813,980 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,429 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,157 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,042 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,761 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,717 UART: [afmc] --
2,857,625 UART: [cold-reset] --
2,858,427 UART: [state] Locking Datavault
2,859,554 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,158 UART: [state] Locking ICCM
2,860,640 UART: [exit] Launching FMC @ 0x40000130
2,865,969 UART:
2,865,985 UART: Running Caliptra FMC ...
2,866,393 UART:
2,866,447 UART: [state] CFI Enabled
2,876,854 UART: [fht] FMC Alias Private Key: 7
2,985,221 UART: [art] Extend RT PCRs Done
2,985,649 UART: [art] Lock RT PCRs Done
2,987,031 UART: [art] Populate DV Done
2,995,314 UART: [fht] FMC Alias Private Key: 7
2,996,412 UART: [art] Derive CDI
2,996,692 UART: [art] Store in in slot 0x4
3,082,663 UART: [art] Derive Key Pair
3,083,023 UART: [art] Store priv key in slot 0x5
3,096,039 UART: [art] Derive Key Pair - Done
3,110,705 UART: [art] Signing Cert with AUTHO
3,111,185 UART: RITY.KEYID = 7
3,126,409 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,174 UART: [art] PUB.X = 31BC23C52136249CA576A2B4A5AF03666E9C0E773C9972B0952F4B6A6C15C1C7EE79B51379C5C135BD25D4C6EAC56E75
3,133,944 UART: [art] PUB.Y = 387188862EF59620D40D81CB95C8B8CF1A7EB4178F90392419A9151239837EF20857CD69C3011BEA041C35E439C26492
3,140,872 UART: [art] SIG.R = 81E8015407A0F57C37A2D7F1F457A0E54CA005689498A82D2FEEF059F25828EB24B4E73A0A33079380BAC0D651D3F594
3,147,627 UART: [art] SIG.S = 50C11DF538BAB684DA4AC26B02F7E6DAC8F11F7EFB4FCFB6D9634B8C08B970349C7D3D63F30ABD33B781DC5B0A9CCF0C
3,171,579 UART: Caliptra RT
3,171,832 UART: [state] CFI Enabled
3,279,347 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,749 UART: [rt]cmd =0x4c444556, len=4
3,320,229 >>> mbox cmd response data (687 bytes)
3,320,230 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,699 UART: [rt]cmd =0x43455246, len=4
3,361,761 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,809 ready_for_fw is high
1,059,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,299 >>> mbox cmd response: success
2,628,299 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,690,815 UART:
2,690,831 UART: Running Caliptra FMC ...
2,691,239 UART:
2,691,293 UART: [state] CFI Enabled
2,701,486 UART: [fht] FMC Alias Private Key: 7
2,809,021 UART: [art] Extend RT PCRs Done
2,809,449 UART: [art] Lock RT PCRs Done
2,810,939 UART: [art] Populate DV Done
2,819,222 UART: [fht] FMC Alias Private Key: 7
2,820,344 UART: [art] Derive CDI
2,820,624 UART: [art] Store in in slot 0x4
2,906,261 UART: [art] Derive Key Pair
2,906,621 UART: [art] Store priv key in slot 0x5
2,919,501 UART: [art] Derive Key Pair - Done
2,933,927 UART: [art] Signing Cert with AUTHO
2,934,407 UART: RITY.KEYID = 7
2,949,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,354 UART: [art] PUB.X = EFBEE1197249F6D112B7DA6834A644E5DE984EB0138DCDB0488A75EE72774BC222E774A0772BD88208932942EDB06872
2,957,123 UART: [art] PUB.Y = 1027A692FFB31F0CA754232094719EBE1015A87D9EC163033D2C1359820B118D5DF827FD258D455B48433090F0BE96D1
2,964,058 UART: [art] SIG.R = 945E90306A0A4D1E482A1FB53964EF0E5ED81220226959C2ACABBC0556353C093936C394A1727AE6C14D765E1467B594
2,970,812 UART: [art] SIG.S = 818104330098DE403270C9C64750DAFDABD184F641B0560A1B3CCF7A5AC8303AC56CB927EB65F0C9624E75F364D6B184
2,994,371 UART: Caliptra RT
2,994,624 UART: [state] CFI Enabled
3,101,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,296 UART: [rt]cmd =0x4c444556, len=4
3,142,696 >>> mbox cmd response data (687 bytes)
3,142,697 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,222 UART: [rt]cmd =0x43455246, len=4
3,184,260 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
893,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,794 UART: [kat] ++
897,946 UART: [kat] sha1
901,966 UART: [kat] SHA2-256
903,906 UART: [kat] SHA2-384
906,601 UART: [kat] SHA2-512-ACC
908,502 UART: [kat] ECC-384
918,131 UART: [kat] HMAC-384Kdf
922,717 UART: [kat] LMS
1,171,045 UART: [kat] --
1,171,756 UART: [cold-reset] ++
1,172,136 UART: [fht] FHT @ 0x50003400
1,174,671 UART: [idev] ++
1,174,839 UART: [idev] CDI.KEYID = 6
1,175,199 UART: [idev] SUBJECT.KEYID = 7
1,175,623 UART: [idev] UDS.KEYID = 0
1,175,968 ready_for_fw is high
1,175,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,537 UART: [idev] Erasing UDS.KEYID = 0
1,200,646 UART: [idev] Sha1 KeyId Algorithm
1,208,996 UART: [idev] --
1,209,982 UART: [ldev] ++
1,210,150 UART: [ldev] CDI.KEYID = 6
1,210,513 UART: [ldev] SUBJECT.KEYID = 5
1,210,939 UART: [ldev] AUTHORITY.KEYID = 7
1,211,402 UART: [ldev] FE.KEYID = 1
1,216,522 UART: [ldev] Erasing FE.KEYID = 1
1,242,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,918 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,989 UART: [fwproc] Recv command 0x46574c44
1,283,717 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,581 >>> mbox cmd response: success
2,774,581 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,657 UART: [afmc] ++
2,775,825 UART: [afmc] CDI.KEYID = 6
2,776,187 UART: [afmc] SUBJECT.KEYID = 7
2,776,612 UART: [afmc] AUTHORITY.KEYID = 5
2,812,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,056 UART: [afmc] --
2,856,056 UART: [cold-reset] --
2,856,676 UART: [state] Locking Datavault
2,857,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,195 UART: [state] Locking ICCM
2,858,713 UART: [exit] Launching FMC @ 0x40000130
2,864,042 UART:
2,864,058 UART: Running Caliptra FMC ...
2,864,466 UART:
2,864,609 UART: [state] CFI Enabled
2,875,128 UART: [fht] FMC Alias Private Key: 7
2,983,609 UART: [art] Extend RT PCRs Done
2,984,037 UART: [art] Lock RT PCRs Done
2,985,483 UART: [art] Populate DV Done
2,993,442 UART: [fht] FMC Alias Private Key: 7
2,994,624 UART: [art] Derive CDI
2,994,904 UART: [art] Store in in slot 0x4
3,081,037 UART: [art] Derive Key Pair
3,081,397 UART: [art] Store priv key in slot 0x5
3,095,661 UART: [art] Derive Key Pair - Done
3,110,299 UART: [art] Signing Cert with AUTHO
3,110,779 UART: RITY.KEYID = 7
3,126,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,164 UART: [art] PUB.X = 109A4A0B623E06E95EBC560F876C45E8DF74D4E1EA8D37C30A86FCB5F36A614DF1C73ACC7EB7077594C27B668443B65C
3,133,931 UART: [art] PUB.Y = 3D6AE04E739FDA66A428544C4FA8B48BD8CB92524297CE65C19B67E9E4EB799B8279C912E8EE85EB886F7C23D71EA6AF
3,140,895 UART: [art] SIG.R = AAE07326CAD145D7CA78AC3923CD34A7E62DE8C7A7E2C161E3EA0A9B64103F253D1D75278BEC9388E0F3F864D6A1DAB0
3,147,680 UART: [art] SIG.S = 2C9765146481FE54EA8E7A7E174B41AD539C9EA71222548468BCA7D1DE9737B913C59E38F763C637B1626EBDE53F2063
3,171,605 UART: Caliptra RT
3,171,950 UART: [state] CFI Enabled
3,280,541 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,307 UART: [rt]cmd =0x4c444556, len=4
3,321,851 >>> mbox cmd response data (687 bytes)
3,321,852 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,287 UART: [rt]cmd =0x43455246, len=4
3,363,359 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,776 ready_for_fw is high
1,060,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,582 >>> mbox cmd response: success
2,629,582 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,692,026 UART:
2,692,042 UART: Running Caliptra FMC ...
2,692,450 UART:
2,692,593 UART: [state] CFI Enabled
2,703,300 UART: [fht] FMC Alias Private Key: 7
2,811,037 UART: [art] Extend RT PCRs Done
2,811,465 UART: [art] Lock RT PCRs Done
2,813,221 UART: [art] Populate DV Done
2,821,468 UART: [fht] FMC Alias Private Key: 7
2,822,540 UART: [art] Derive CDI
2,822,820 UART: [art] Store in in slot 0x4
2,908,179 UART: [art] Derive Key Pair
2,908,539 UART: [art] Store priv key in slot 0x5
2,921,507 UART: [art] Derive Key Pair - Done
2,936,738 UART: [art] Signing Cert with AUTHO
2,937,218 UART: RITY.KEYID = 7
2,952,464 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,229 UART: [art] PUB.X = 779E548A7BD0B4E10C97AD5B86075CE57B9C240999A17634E0723186C72E42576F7C22BB9EA5BA4C9CBB9C5E522B9BFE
2,960,000 UART: [art] PUB.Y = FCC57E77456892E633B33D6058C630231D750C6E18FFD2791DFBA92012E489B24F729E9383F08541E5B6BE2B55934DA8
2,966,945 UART: [art] SIG.R = 01FD8BF62E9065ECCB3C0BBDB02DD519C5D745ED26F8226DB4AC6372CE38909EA32F95E611B0E3BF6ED6B8D83E87D06F
2,973,731 UART: [art] SIG.S = B1CAA673B945FC0818AFB583124C1DF8ACD1F64969C834E39C054EB2B00D600BDE619FEB0F75EBF4673502036EA7D214
2,997,469 UART: Caliptra RT
2,997,814 UART: [state] CFI Enabled
3,105,499 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,965 UART: [rt]cmd =0x4c444556, len=4
3,146,457 >>> mbox cmd response data (687 bytes)
3,146,458 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,175,851 UART: [rt]cmd =0x43455246, len=4
3,187,837 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
916,264 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,091 UART: [fht] FHT @ 0x50003400
1,172,953 UART: [idev] ++
1,173,121 UART: [idev] CDI.KEYID = 6
1,173,482 UART: [idev] SUBJECT.KEYID = 7
1,173,907 UART: [idev] UDS.KEYID = 0
1,174,253 ready_for_fw is high
1,174,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,199,187 UART: [idev] Sha1 KeyId Algorithm
1,207,901 UART: [idev] --
1,209,114 UART: [ldev] ++
1,209,282 UART: [ldev] CDI.KEYID = 6
1,209,646 UART: [ldev] SUBJECT.KEYID = 5
1,210,073 UART: [ldev] AUTHORITY.KEYID = 7
1,210,536 UART: [ldev] FE.KEYID = 1
1,215,894 UART: [ldev] Erasing FE.KEYID = 1
1,242,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,970 UART: [ldev] --
1,281,290 UART: [fwproc] Wait for Commands...
1,282,105 UART: [fwproc] Recv command 0x46574c44
1,282,838 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,707 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,016 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,046 >>> mbox cmd response: success
2,773,046 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,097 UART: [afmc] ++
2,774,265 UART: [afmc] CDI.KEYID = 6
2,774,628 UART: [afmc] SUBJECT.KEYID = 7
2,775,054 UART: [afmc] AUTHORITY.KEYID = 5
2,810,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,568 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,297 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,180 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,899 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,628 UART: [afmc] --
2,853,708 UART: [cold-reset] --
2,854,354 UART: [state] Locking Datavault
2,855,569 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,173 UART: [state] Locking ICCM
2,856,843 UART: [exit] Launching FMC @ 0x40000130
2,862,172 UART:
2,862,188 UART: Running Caliptra FMC ...
2,862,596 UART:
2,862,650 UART: [state] CFI Enabled
2,873,253 UART: [fht] FMC Alias Private Key: 7
2,981,634 UART: [art] Extend RT PCRs Done
2,982,062 UART: [art] Lock RT PCRs Done
2,983,732 UART: [art] Populate DV Done
2,991,795 UART: [fht] FMC Alias Private Key: 7
2,992,931 UART: [art] Derive CDI
2,993,211 UART: [art] Store in in slot 0x4
3,078,906 UART: [art] Derive Key Pair
3,079,266 UART: [art] Store priv key in slot 0x5
3,092,706 UART: [art] Derive Key Pair - Done
3,107,321 UART: [art] Signing Cert with AUTHO
3,107,801 UART: RITY.KEYID = 7
3,122,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,728 UART: [art] PUB.X = EE94949813B1322E3580890916BAAF51F338055301DBC813F8148FEE3370ACBA622CE0D78E0AD1B84CCC79B2148EBB8D
3,130,494 UART: [art] PUB.Y = A034D06F560B24C8ADDA2C5A0BA8B4CBFC2D92242BC6C2D97ED9CDD9DB3958409C9C65F7DF6CAEF0CB9AA3F68811BEF3
3,137,470 UART: [art] SIG.R = EF7620CA17EA0D97ABAD15C85AB0CA389ED614B8091C3F0E8911B032907F565C2164FC0BC1F17C30287380B6811E071A
3,144,231 UART: [art] SIG.S = 84D6BB51754F82D0D7F25DD4E278683FA4069B50FD5C6C899B5F50C186A9EC8F7B40B1653144205F022B9A5452ED706A
3,168,362 UART: Caliptra RT
3,168,615 UART: [state] CFI Enabled
3,276,315 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,965 UART: [rt]cmd =0x4c444556, len=4
3,317,345 >>> mbox cmd response data (687 bytes)
3,317,346 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,703 UART: [rt]cmd =0x43455246, len=4
3,358,659 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,296 ready_for_fw is high
1,056,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,114 >>> mbox cmd response: success
2,624,114 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,130 UART:
2,686,146 UART: Running Caliptra FMC ...
2,686,554 UART:
2,686,608 UART: [state] CFI Enabled
2,696,925 UART: [fht] FMC Alias Private Key: 7
2,804,846 UART: [art] Extend RT PCRs Done
2,805,274 UART: [art] Lock RT PCRs Done
2,806,704 UART: [art] Populate DV Done
2,814,993 UART: [fht] FMC Alias Private Key: 7
2,816,011 UART: [art] Derive CDI
2,816,291 UART: [art] Store in in slot 0x4
2,901,550 UART: [art] Derive Key Pair
2,901,910 UART: [art] Store priv key in slot 0x5
2,915,306 UART: [art] Derive Key Pair - Done
2,929,820 UART: [art] Signing Cert with AUTHO
2,930,300 UART: RITY.KEYID = 7
2,945,786 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,551 UART: [art] PUB.X = 6A9DB5F008550D2B65D0521BDD3E8A7BE9D5769C81571BFD798DE2F22E9435757463EF610603C2D5BABFC2924BE68137
2,953,315 UART: [art] PUB.Y = 7A99BE8E7BB52102C454044ED51B4FB1A76E321F006B85675B4628A6C827B7E2F553E3E684CBC8427089D6D737488F19
2,960,235 UART: [art] SIG.R = D94FF72E6E852CE8AF6AC7683D86593CE4C03C8D50CC13FA2C64EB60A5B63DFAC651011956762A552E662B270BF598DA
2,967,011 UART: [art] SIG.S = 9A4D0340DEAF58C8D8FC46D364650045C5A287453C6140869D4F4B9C2467E84E968EF6D2B759CE395201018EA6E9A48C
2,990,929 UART: Caliptra RT
2,991,182 UART: [state] CFI Enabled
3,098,448 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,038 UART: [rt]cmd =0x4c444556, len=4
3,139,488 >>> mbox cmd response data (687 bytes)
3,139,489 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,816 UART: [rt]cmd =0x43455246, len=4
3,180,794 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,768 UART: [kat] ++
895,920 UART: [kat] sha1
900,212 UART: [kat] SHA2-256
902,152 UART: [kat] SHA2-384
905,041 UART: [kat] SHA2-512-ACC
906,942 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,220 UART: [idev] ++
1,173,388 UART: [idev] CDI.KEYID = 6
1,173,749 UART: [idev] SUBJECT.KEYID = 7
1,174,174 UART: [idev] UDS.KEYID = 0
1,174,520 ready_for_fw is high
1,174,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,464 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] --
1,209,333 UART: [ldev] ++
1,209,501 UART: [ldev] CDI.KEYID = 6
1,209,865 UART: [ldev] SUBJECT.KEYID = 5
1,210,292 UART: [ldev] AUTHORITY.KEYID = 7
1,210,755 UART: [ldev] FE.KEYID = 1
1,216,019 UART: [ldev] Erasing FE.KEYID = 1
1,242,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,282,021 UART: [fwproc] Wait for Commands...
1,282,644 UART: [fwproc] Recv command 0x46574c44
1,283,377 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,834 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,143 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,063 >>> mbox cmd response: success
2,776,063 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,194 UART: [afmc] ++
2,777,362 UART: [afmc] CDI.KEYID = 6
2,777,725 UART: [afmc] SUBJECT.KEYID = 7
2,778,151 UART: [afmc] AUTHORITY.KEYID = 5
2,813,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,051 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,780 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,663 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,382 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,215 UART: [afmc] --
2,857,297 UART: [cold-reset] --
2,857,947 UART: [state] Locking Datavault
2,859,068 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,672 UART: [state] Locking ICCM
2,860,094 UART: [exit] Launching FMC @ 0x40000130
2,865,423 UART:
2,865,439 UART: Running Caliptra FMC ...
2,865,847 UART:
2,865,990 UART: [state] CFI Enabled
2,876,853 UART: [fht] FMC Alias Private Key: 7
2,984,658 UART: [art] Extend RT PCRs Done
2,985,086 UART: [art] Lock RT PCRs Done
2,986,760 UART: [art] Populate DV Done
2,994,993 UART: [fht] FMC Alias Private Key: 7
2,996,173 UART: [art] Derive CDI
2,996,453 UART: [art] Store in in slot 0x4
3,082,192 UART: [art] Derive Key Pair
3,082,552 UART: [art] Store priv key in slot 0x5
3,096,184 UART: [art] Derive Key Pair - Done
3,111,025 UART: [art] Signing Cert with AUTHO
3,111,505 UART: RITY.KEYID = 7
3,126,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,124 UART: [art] PUB.X = 11F17C1A36DB42443983D82D8E19F9F34D342083C7B58AEFA19DF1FDBFED0BDE31784A7C10681F003EECAD5ECE65519C
3,133,887 UART: [art] PUB.Y = 5E546CC93E6A2391613836159FDC6C8A1BCC5B028E4B23691ED7300EE6620B187C415678FCE7BD2F1A4F8562A22FAA7E
3,140,836 UART: [art] SIG.R = 4FA6BD2D493E780E693B31BE76887FAF07AA5B0CF9F44933AE5BEDBF7FD302CDCC74149BEAAA940D5D30F249F8A946A3
3,147,615 UART: [art] SIG.S = C50F9C628F50F127544145E3C51A02C08D2588FF94A9EDDE0B94BEEAFDBD9C744F93D551AA97FA07F502BD0A56537ADF
3,171,560 UART: Caliptra RT
3,171,905 UART: [state] CFI Enabled
3,279,112 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,916 UART: [rt]cmd =0x4c444556, len=4
3,320,384 >>> mbox cmd response data (687 bytes)
3,320,385 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,740 UART: [rt]cmd =0x43455246, len=4
3,361,674 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,687 ready_for_fw is high
1,056,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,113 >>> mbox cmd response: success
2,623,113 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,685,619 UART:
2,685,635 UART: Running Caliptra FMC ...
2,686,043 UART:
2,686,186 UART: [state] CFI Enabled
2,696,933 UART: [fht] FMC Alias Private Key: 7
2,805,002 UART: [art] Extend RT PCRs Done
2,805,430 UART: [art] Lock RT PCRs Done
2,806,800 UART: [art] Populate DV Done
2,815,053 UART: [fht] FMC Alias Private Key: 7
2,815,983 UART: [art] Derive CDI
2,816,263 UART: [art] Store in in slot 0x4
2,902,302 UART: [art] Derive Key Pair
2,902,662 UART: [art] Store priv key in slot 0x5
2,915,672 UART: [art] Derive Key Pair - Done
2,930,422 UART: [art] Signing Cert with AUTHO
2,930,902 UART: RITY.KEYID = 7
2,946,228 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,993 UART: [art] PUB.X = 94ED37C9281A8C64ED9C2F80B6DCEC46372A18C7B87CF33D44A5EDCD81ECD7FCDC4A9D565D12501D47ACC0F0CACD1242
2,953,789 UART: [art] PUB.Y = FB1CB48CEF12A4262DA4031B9E3E0D31D634C96C0DA643F60687B55AFA9585F4A90D7D6E184056E508AEFF90D11ED84D
2,960,735 UART: [art] SIG.R = D8A6B4AC0DDB3F178F2F4FEC9A3E3D59C97198B7406829C83BD20E26430F741470C349D40F0286ADFD40D86F78395433
2,967,494 UART: [art] SIG.S = 5EA913CCC125F1A5F7DDE77255F091ECAA7A6D18B55D127D5D0E4498C14150CB4D0AA28CDFE9DF30A4122965E18B8D43
2,991,401 UART: Caliptra RT
2,991,746 UART: [state] CFI Enabled
3,099,287 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,567 UART: [rt]cmd =0x4c444556, len=4
3,139,995 >>> mbox cmd response data (687 bytes)
3,139,996 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,261 UART: [rt]cmd =0x43455246, len=4
3,181,207 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
191,994 UART:
192,369 UART: Running Caliptra ROM ...
193,569 UART:
193,724 UART: [state] CFI Enabled
265,355 UART: [state] LifecycleState = Unprovisioned
267,215 UART: [state] DebugLocked = No
269,913 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,662 UART: [kat] SHA2-256
444,384 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,900 UART: [kat] ++
455,382 UART: [kat] sha1
466,261 UART: [kat] SHA2-256
468,989 UART: [kat] SHA2-384
474,913 UART: [kat] SHA2-512-ACC
477,284 UART: [kat] ECC-384
2,766,826 UART: [kat] HMAC-384Kdf
2,800,160 UART: [kat] LMS
3,990,401 UART: [kat] --
3,995,626 UART: [cold-reset] ++
3,997,419 UART: [fht] Storing FHT @ 0x50003400
4,009,185 UART: [idev] ++
4,009,757 UART: [idev] CDI.KEYID = 6
4,010,696 UART: [idev] SUBJECT.KEYID = 7
4,011,947 UART: [idev] UDS.KEYID = 0
4,013,021 ready_for_fw is high
4,013,253 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,861 UART: [idev] Erasing UDS.KEYID = 0
7,348,338 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,448 UART: [idev] --
7,375,498 UART: [ldev] ++
7,376,068 UART: [ldev] CDI.KEYID = 6
7,377,013 UART: [ldev] SUBJECT.KEYID = 5
7,378,231 UART: [ldev] AUTHORITY.KEYID = 7
7,379,514 UART: [ldev] FE.KEYID = 1
7,422,360 UART: [ldev] Erasing FE.KEYID = 1
10,756,189 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,368 UART: [ldev] --
13,136,634 UART: [fwproc] Waiting for Commands...
13,138,615 UART: [fwproc] Received command 0x46574c44
13,140,796 UART: [fwproc] Received Image of size 114124 bytes
17,193,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,448 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,344,340 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,661,060 >>> mbox cmd response: success
17,661,579 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,665,396 UART: [afmc] ++
17,665,978 UART: [afmc] CDI.KEYID = 6
17,666,946 UART: [afmc] SUBJECT.KEYID = 7
17,668,164 UART: [afmc] AUTHORITY.KEYID = 5
21,029,176 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,616 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,011 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,866 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,297 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,806 UART: [afmc] --
23,396,332 UART: [cold-reset] --
23,401,178 UART: [state] Locking Datavault
23,405,188 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,944 UART: [state] Locking ICCM
23,408,172 UART: [exit] Launching FMC @ 0x40000130
23,416,519 UART:
23,416,753 UART: Running Caliptra FMC ...
23,417,855 UART:
23,418,023 UART: [state] CFI Enabled
23,486,188 UART: [fht] FMC Alias Private Key: 7
25,824,728 UART: [art] Extend RT PCRs Done
25,825,948 UART: [art] Lock RT PCRs Done
25,827,788 UART: [art] Populate DV Done
25,833,530 UART: [fht] FMC Alias Private Key: 7
25,835,013 UART: [art] Derive CDI
25,835,777 UART: [art] Store in in slot 0x4
25,894,528 UART: [art] Derive Key Pair
25,895,568 UART: [art] Store priv key in slot 0x5
29,188,779 UART: [art] Derive Key Pair - Done
29,201,946 UART: [art] Signing Cert with AUTHO
29,203,303 UART: RITY.KEYID = 7
31,490,841 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,344 UART: [art] PUB.X = A611DD90FA8D05031C39CF1A86E6D363B994E43FB67743163B4F8E943688CB06DC8C1572B1035C68E2B6CEB81B640E4D
31,499,594 UART: [art] PUB.Y = 064BD765BD946389627D3BA003EBE270A5B69422BF3501F381AA05966F140FA6CE8B91EF61DA2C4D9962396156A30114
31,506,822 UART: [art] SIG.R = 832FE7A577FE777264113F700FD6C2A15109F20B0231C402CE2DD2E23DD49265B3D33971702DA0C40C3E0C06671322EF
31,514,159 UART: [art] SIG.S = 3E5045C81A14E01E555351BFFA8B6E8BD5540624389A8112D3534947B955B9A6AED5B5F8D4508C10A0C8A9AF0DD733F0
32,819,014 UART: Caliptra RT
32,819,740 UART: [state] CFI Enabled
32,982,465 UART: [rt] RT listening for mailbox commands...
33,014,028 UART: [rt]cmd =0x4c444556, len=4
33,025,090 >>> mbox cmd response data (687 bytes)
33,066,625 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,096,778 UART: [rt]cmd =0x43455246, len=4
33,109,661 >>> mbox cmd response data (920 bytes)
33,126,776 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,156,698 UART: [rt]cmd =0x43455252, len=4
33,168,039 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,799,211 ready_for_fw is high
3,799,655 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,865,206 >>> mbox cmd response: success
17,865,796 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,559,770 UART:
23,560,139 UART: Running Caliptra FMC ...
23,561,287 UART:
23,561,448 UART: [state] CFI Enabled
23,630,705 UART: [fht] FMC Alias Private Key: 7
25,969,316 UART: [art] Extend RT PCRs Done
25,970,546 UART: [art] Lock RT PCRs Done
25,972,191 UART: [art] Populate DV Done
25,977,620 UART: [fht] FMC Alias Private Key: 7
25,979,272 UART: [art] Derive CDI
25,980,088 UART: [art] Store in in slot 0x4
26,039,555 UART: [art] Derive Key Pair
26,040,605 UART: [art] Store priv key in slot 0x5
29,333,166 UART: [art] Derive Key Pair - Done
29,345,955 UART: [art] Signing Cert with AUTHO
29,347,265 UART: RITY.KEYID = 7
31,635,594 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,101 UART: [art] PUB.X = ED236D59808C02B56B2CFE44D37E0A7E18DEBF6083B941A4A79BFCC776A37C893AED85CC899F8B0D8CE9D7F58F4CD025
31,644,396 UART: [art] PUB.Y = DB616A81169AF7364866001D16C8A4B58E14C424D83A6F4BB113792A08C43F475D02A10547B81DD1731FEB1E1A829808
31,651,560 UART: [art] SIG.R = 969735E4109CE69714D7A3CA1B8416BE0005E4119FD523D793529D0C8771134AA270F4560386D23A83FD581EF0CC5AFC
31,658,931 UART: [art] SIG.S = 1E5B6A369AF108C263F3AB2FD8EAC9BC6392B450F056A22C66AF910236A4B161D8BE560D6BC355FC4B52DC33E7B170E8
32,964,269 UART: Caliptra RT
32,964,969 UART: [state] CFI Enabled
33,126,342 UART: [rt] RT listening for mailbox commands...
33,157,863 UART: [rt]cmd =0x4c444556, len=4
33,168,848 >>> mbox cmd response data (687 bytes)
33,209,971 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,240,055 UART: [rt]cmd =0x43455246, len=4
33,252,938 >>> mbox cmd response data (920 bytes)
33,269,599 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,299,619 UART: [rt]cmd =0x43455252, len=4
33,310,790 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
192,353 UART:
192,724 UART: Running Caliptra ROM ...
193,850 UART:
603,525 UART: [state] CFI Enabled
616,337 UART: [state] LifecycleState = Unprovisioned
618,236 UART: [state] DebugLocked = No
620,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,535 UART: [kat] SHA2-256
795,328 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,849 UART: [kat] ++
806,289 UART: [kat] sha1
816,091 UART: [kat] SHA2-256
818,811 UART: [kat] SHA2-384
824,442 UART: [kat] SHA2-512-ACC
826,813 UART: [kat] ECC-384
3,112,601 UART: [kat] HMAC-384Kdf
3,123,964 UART: [kat] LMS
4,314,035 UART: [kat] --
4,317,817 UART: [cold-reset] ++
4,319,777 UART: [fht] Storing FHT @ 0x50003400
4,330,903 UART: [idev] ++
4,331,468 UART: [idev] CDI.KEYID = 6
4,332,504 UART: [idev] SUBJECT.KEYID = 7
4,333,674 UART: [idev] UDS.KEYID = 0
4,334,759 ready_for_fw is high
4,335,003 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,498 UART: [idev] Erasing UDS.KEYID = 0
7,619,049 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,332 UART: [idev] --
7,644,865 UART: [ldev] ++
7,645,470 UART: [ldev] CDI.KEYID = 6
7,646,389 UART: [ldev] SUBJECT.KEYID = 5
7,647,595 UART: [ldev] AUTHORITY.KEYID = 7
7,648,875 UART: [ldev] FE.KEYID = 1
7,658,972 UART: [ldev] Erasing FE.KEYID = 1
10,947,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,207 UART: [ldev] --
13,308,140 UART: [fwproc] Waiting for Commands...
13,310,764 UART: [fwproc] Received command 0x46574c44
13,312,987 UART: [fwproc] Received Image of size 114124 bytes
17,364,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,305 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,186 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,822,809 >>> mbox cmd response: success
17,823,316 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,827,234 UART: [afmc] ++
17,827,811 UART: [afmc] CDI.KEYID = 6
17,828,767 UART: [afmc] SUBJECT.KEYID = 7
17,829,976 UART: [afmc] AUTHORITY.KEYID = 5
21,148,403 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,302 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,548 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,951 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,787 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,219 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,851 UART: [afmc] --
23,513,905 UART: [cold-reset] --
23,516,908 UART: [state] Locking Datavault
23,524,042 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,738 UART: [state] Locking ICCM
23,527,072 UART: [exit] Launching FMC @ 0x40000130
23,535,464 UART:
23,535,702 UART: Running Caliptra FMC ...
23,536,819 UART:
23,536,974 UART: [state] CFI Enabled
23,545,069 UART: [fht] FMC Alias Private Key: 7
25,876,488 UART: [art] Extend RT PCRs Done
25,877,711 UART: [art] Lock RT PCRs Done
25,879,330 UART: [art] Populate DV Done
25,884,638 UART: [fht] FMC Alias Private Key: 7
25,886,139 UART: [art] Derive CDI
25,886,883 UART: [art] Store in in slot 0x4
25,929,368 UART: [art] Derive Key Pair
25,930,364 UART: [art] Store priv key in slot 0x5
29,173,125 UART: [art] Derive Key Pair - Done
29,186,284 UART: [art] Signing Cert with AUTHO
29,187,593 UART: RITY.KEYID = 7
31,466,743 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,251 UART: [art] PUB.X = 807A7FE1ABE7EBB38BE648BED77D10B5BE706CF5F71A0438D8352437592348ED1D00AEDD27014A0B4020C9142CA8FAF4
31,475,504 UART: [art] PUB.Y = 3E9A3D140EC511A21767F5F35BA663FA605345AAD96C87965AFD9BFA27E9528569FC30C355C5CD2B1C01564D12509FCB
31,482,726 UART: [art] SIG.R = 142F9953658C3D802923063C6732273042E1F890B7E23F03B8C8EA621185651DF273AA8E255B4FCEB669525A76F77F07
31,490,143 UART: [art] SIG.S = DBE6FFEBBDEF290F1C9E6AABCF54D139F0EB1C7B5138708885F6A5FC1701690D45439B2C6905146C92CB05B2CFA56F93
32,795,201 UART: Caliptra RT
32,795,897 UART: [state] CFI Enabled
32,912,798 UART: [rt] RT listening for mailbox commands...
32,943,826 UART: [rt]cmd =0x4c444556, len=4
32,954,882 >>> mbox cmd response data (687 bytes)
32,996,751 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,026,694 UART: [rt]cmd =0x43455246, len=4
33,039,693 >>> mbox cmd response data (920 bytes)
33,057,050 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,086,778 UART: [rt]cmd =0x43455252, len=4
33,098,151 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
4,127,793 ready_for_fw is high
4,128,173 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,268 >>> mbox cmd response: success
18,072,851 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,712,427 UART:
23,712,808 UART: Running Caliptra FMC ...
23,713,900 UART:
23,714,044 UART: [state] CFI Enabled
23,722,310 UART: [fht] FMC Alias Private Key: 7
26,052,869 UART: [art] Extend RT PCRs Done
26,054,111 UART: [art] Lock RT PCRs Done
26,056,009 UART: [art] Populate DV Done
26,061,778 UART: [fht] FMC Alias Private Key: 7
26,063,363 UART: [art] Derive CDI
26,064,185 UART: [art] Store in in slot 0x4
26,106,996 UART: [art] Derive Key Pair
26,107,997 UART: [art] Store priv key in slot 0x5
29,350,220 UART: [art] Derive Key Pair - Done
29,363,430 UART: [art] Signing Cert with AUTHO
29,364,725 UART: RITY.KEYID = 7
31,644,292 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,801 UART: [art] PUB.X = C56EC05D40D93E5F4BB8B21A18B0A235065ABE44120D95D57682DE5C5B0E685AC460F543E1644D4989EE979E2574DE5A
31,653,048 UART: [art] PUB.Y = 0473D98A04497FEDCED721D2F18871FD54AEFBF7ABB0950F91893B5BAFA4A796E067F124D62BF6C4B0007D81F2D522C8
31,660,264 UART: [art] SIG.R = 292C1E2FB7F52833C0687AE412F621225BE39A5A86A3F5F11764B76DFE99EA3AE50D80D5E93F6CB987A88B148A849965
31,667,666 UART: [art] SIG.S = FA35D07DBD220AE32D9514583FB551168E080F143A848567C8B5E06671B0545A927FB26B25C0443497EA6AC89EB1A9BC
32,973,392 UART: Caliptra RT
32,974,118 UART: [state] CFI Enabled
33,089,860 UART: [rt] RT listening for mailbox commands...
33,121,530 UART: [rt]cmd =0x4c444556, len=4
33,132,694 >>> mbox cmd response data (687 bytes)
33,174,263 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,204,308 UART: [rt]cmd =0x43455246, len=4
33,217,185 >>> mbox cmd response data (920 bytes)
33,233,889 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,263,693 UART: [rt]cmd =0x43455252, len=4
33,275,005 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
192,182 UART:
192,560 UART: Running Caliptra ROM ...
193,766 UART:
193,934 UART: [state] CFI Enabled
263,998 UART: [state] LifecycleState = Unprovisioned
266,182 UART: [state] DebugLocked = No
268,003 UART: [state] WD Timer not started. Device not locked for debugging
271,266 UART: [kat] SHA2-256
450,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,967 UART: [kat] ++
462,414 UART: [kat] sha1
473,358 UART: [kat] SHA2-256
476,427 UART: [kat] SHA2-384
482,196 UART: [kat] SHA2-512-ACC
485,205 UART: [kat] ECC-384
2,947,105 UART: [kat] HMAC-384Kdf
2,971,571 UART: [kat] LMS
3,500,988 UART: [kat] --
3,504,293 UART: [cold-reset] ++
3,505,443 UART: [fht] FHT @ 0x50003400
3,517,058 UART: [idev] ++
3,517,627 UART: [idev] CDI.KEYID = 6
3,518,550 UART: [idev] SUBJECT.KEYID = 7
3,519,726 UART: [idev] UDS.KEYID = 0
3,520,653 ready_for_fw is high
3,520,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,827 UART: [idev] Erasing UDS.KEYID = 0
6,027,109 UART: [idev] Sha1 KeyId Algorithm
6,049,828 UART: [idev] --
6,054,475 UART: [ldev] ++
6,055,050 UART: [ldev] CDI.KEYID = 6
6,055,944 UART: [ldev] SUBJECT.KEYID = 5
6,057,117 UART: [ldev] AUTHORITY.KEYID = 7
6,058,408 UART: [ldev] FE.KEYID = 1
6,101,056 UART: [ldev] Erasing FE.KEYID = 1
8,602,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,247 UART: [ldev] --
10,410,999 UART: [fwproc] Wait for Commands...
10,413,417 UART: [fwproc] Recv command 0x46574c44
10,415,513 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,586 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,275,945 >>> mbox cmd response: success
14,276,437 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,280,730 UART: [afmc] ++
14,281,334 UART: [afmc] CDI.KEYID = 6
14,282,251 UART: [afmc] SUBJECT.KEYID = 7
14,283,410 UART: [afmc] AUTHORITY.KEYID = 5
16,808,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,558 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,343 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,312 UART: [afmc] --
18,609,000 UART: [cold-reset] --
18,614,163 UART: [state] Locking Datavault
18,619,673 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,310 UART: [state] Locking ICCM
18,622,358 UART: [exit] Launching FMC @ 0x40000130
18,630,798 UART:
18,631,048 UART: Running Caliptra FMC ...
18,632,078 UART:
18,632,227 UART: [state] CFI Enabled
18,688,887 UART: [fht] FMC Alias Private Key: 7
20,452,883 UART: [art] Extend RT PCRs Done
20,454,103 UART: [art] Lock RT PCRs Done
20,455,967 UART: [art] Populate DV Done
20,461,214 UART: [fht] FMC Alias Private Key: 7
20,462,965 UART: [art] Derive CDI
20,463,775 UART: [art] Store in in slot 0x4
20,521,819 UART: [art] Derive Key Pair
20,522,859 UART: [art] Store priv key in slot 0x5
22,985,669 UART: [art] Derive Key Pair - Done
22,998,781 UART: [art] Signing Cert with AUTHO
23,000,082 UART: RITY.KEYID = 7
24,712,414 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,918 UART: [art] PUB.X = 0C35E4AD5529661C1C0E106AC71C551520D4544FE7DBE94B2E81F6E5033D95DD7ACF7859B6AD4494E8EA1E68664A0490
24,721,229 UART: [art] PUB.Y = CCA32A5A42BCD6C3FC898E6399F1E81983DDF6FB8DBA236FBB716B6E441521F1EAAF977EA45F8312B51C5947E5FFBDF0
24,728,526 UART: [art] SIG.R = 5F874C96898DD4754200E7C381029FB951881B9DAB3FAE351A6CDEDBBE8E8DADD83AFD3859AE66A24AD815C5FB3DD55A
24,735,921 UART: [art] SIG.S = 487FF51BF71479A68C404EA640095E9590455884795BA0C10F1E43CA0D7D0CA82DE0E7EE9B4B96B836CDDF6FB82F85DE
25,714,802 UART: Caliptra RT
25,715,511 UART: [state] CFI Enabled
25,880,826 UART: [rt] RT listening for mailbox commands...
25,912,242 UART: [rt]cmd =0x4c444556, len=4
25,923,433 >>> mbox cmd response data (687 bytes)
25,965,446 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,995,502 UART: [rt]cmd =0x43455246, len=4
26,008,190 >>> mbox cmd response data (887 bytes)
26,025,138 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,054,956 UART: [rt]cmd =0x43455252, len=4
26,066,294 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,381,360 ready_for_fw is high
3,381,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,072,463 >>> mbox cmd response: success
14,073,141 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,367,049 UART:
18,367,451 UART: Running Caliptra FMC ...
18,368,585 UART:
18,368,746 UART: [state] CFI Enabled
18,435,399 UART: [fht] FMC Alias Private Key: 7
20,199,853 UART: [art] Extend RT PCRs Done
20,201,076 UART: [art] Lock RT PCRs Done
20,202,817 UART: [art] Populate DV Done
20,208,392 UART: [fht] FMC Alias Private Key: 7
20,210,040 UART: [art] Derive CDI
20,210,854 UART: [art] Store in in slot 0x4
20,268,119 UART: [art] Derive Key Pair
20,269,163 UART: [art] Store priv key in slot 0x5
22,732,064 UART: [art] Derive Key Pair - Done
22,744,573 UART: [art] Signing Cert with AUTHO
22,745,871 UART: RITY.KEYID = 7
24,458,493 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,995 UART: [art] PUB.X = C41EBEFFAEB834B0755CCED3A18A66DC47EC11F566A92292FB27E09A4A2D2B182BA04772B8E5DB0B2492E3659067D2BE
24,467,289 UART: [art] PUB.Y = 26110A872184F7E100B275314B5A423BADB9C5F6A71EF49A2D4BFB5BCE830E0F9F9002ACE7F5536E4E993C45674B6ED5
24,474,522 UART: [art] SIG.R = 85A394FC29647C1760D735158299929AC4D592EC3662F247A83653817C3E9DE6B674D20E2E0AE9686A1A8703E71E1418
24,481,907 UART: [art] SIG.S = 368F6AEAC651E4F3D773EC7E85ADFEBDB5A85B8C92E58B359A876F0C7794719F8A274AF2A6A611ED9C4576D14F1A9E86
25,460,068 UART: Caliptra RT
25,460,771 UART: [state] CFI Enabled
25,627,516 UART: [rt] RT listening for mailbox commands...
25,658,806 UART: [rt]cmd =0x4c444556, len=4
25,669,895 >>> mbox cmd response data (687 bytes)
25,711,335 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,741,335 UART: [rt]cmd =0x43455246, len=4
25,754,071 >>> mbox cmd response data (887 bytes)
25,770,765 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,800,553 UART: [rt]cmd =0x43455252, len=4
25,811,972 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,205 UART:
192,582 UART: Running Caliptra ROM ...
193,785 UART:
603,379 UART: [state] CFI Enabled
615,482 UART: [state] LifecycleState = Unprovisioned
617,370 UART: [state] DebugLocked = No
618,672 UART: [state] WD Timer not started. Device not locked for debugging
621,941 UART: [kat] SHA2-256
801,037 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,624 UART: [kat] ++
813,068 UART: [kat] sha1
824,082 UART: [kat] SHA2-256
827,090 UART: [kat] SHA2-384
833,008 UART: [kat] SHA2-512-ACC
835,945 UART: [kat] ECC-384
3,278,491 UART: [kat] HMAC-384Kdf
3,291,079 UART: [kat] LMS
3,820,555 UART: [kat] --
3,826,187 UART: [cold-reset] ++
3,828,521 UART: [fht] FHT @ 0x50003400
3,839,928 UART: [idev] ++
3,840,508 UART: [idev] CDI.KEYID = 6
3,841,416 UART: [idev] SUBJECT.KEYID = 7
3,842,648 UART: [idev] UDS.KEYID = 0
3,843,562 ready_for_fw is high
3,843,741 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,455 UART: [idev] Erasing UDS.KEYID = 0
6,311,535 UART: [idev] Sha1 KeyId Algorithm
6,334,431 UART: [idev] --
6,337,377 UART: [ldev] ++
6,337,938 UART: [ldev] CDI.KEYID = 6
6,338,816 UART: [ldev] SUBJECT.KEYID = 5
6,340,015 UART: [ldev] AUTHORITY.KEYID = 7
6,341,296 UART: [ldev] FE.KEYID = 1
6,350,366 UART: [ldev] Erasing FE.KEYID = 1
8,824,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,323 UART: [ldev] --
10,614,227 UART: [fwproc] Wait for Commands...
10,615,716 UART: [fwproc] Recv command 0x46574c44
10,617,803 UART: [fwproc] Recv'd Img size: 114448 bytes
14,019,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,478,658 >>> mbox cmd response: success
14,479,152 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,483,441 UART: [afmc] ++
14,484,018 UART: [afmc] CDI.KEYID = 6
14,484,926 UART: [afmc] SUBJECT.KEYID = 7
14,486,140 UART: [afmc] AUTHORITY.KEYID = 5
16,985,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,704,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,706,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,722,438 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,738,455 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,754,298 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,775,637 UART: [afmc] --
18,780,257 UART: [cold-reset] --
18,784,607 UART: [state] Locking Datavault
18,788,870 UART: [state] Locking PCR0, PCR1 and PCR31
18,790,511 UART: [state] Locking ICCM
18,792,653 UART: [exit] Launching FMC @ 0x40000130
18,801,101 UART:
18,801,338 UART: Running Caliptra FMC ...
18,802,435 UART:
18,802,587 UART: [state] CFI Enabled
18,810,698 UART: [fht] FMC Alias Private Key: 7
20,567,108 UART: [art] Extend RT PCRs Done
20,568,325 UART: [art] Lock RT PCRs Done
20,570,003 UART: [art] Populate DV Done
20,575,409 UART: [fht] FMC Alias Private Key: 7
20,576,939 UART: [art] Derive CDI
20,577,695 UART: [art] Store in in slot 0x4
20,620,550 UART: [art] Derive Key Pair
20,621,543 UART: [art] Store priv key in slot 0x5
23,048,530 UART: [art] Derive Key Pair - Done
23,061,684 UART: [art] Signing Cert with AUTHO
23,062,990 UART: RITY.KEYID = 7
24,768,188 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,682 UART: [art] PUB.X = 0731EB744BF2E0036351B8B64AF5D8C30DA6B66DF13460F70089D61ABC48F42DC522411F257424E5138667F81CD3BA54
24,776,917 UART: [art] PUB.Y = AE554ECC21B00F7895846F1CD21A8DC3F0E9901B4741831A0DDBD8A747CE491B7950C88289A43389F102664AA19C1396
24,784,174 UART: [art] SIG.R = 27C304F0A9761BAF619751198FAAA8419BD58C4EA255A18D6F9A3761BFD4106FC4B6A6DD98ED412559712B41249AA73A
24,791,595 UART: [art] SIG.S = 1854629C4961A1E72D2C0A56D90EF01A39FFCF1D9D1F1457AE8AB81AADD63C6B509B3400A3907DA003313F2B742374DE
25,770,426 UART: Caliptra RT
25,771,119 UART: [state] CFI Enabled
25,888,982 UART: [rt] RT listening for mailbox commands...
25,920,421 UART: [rt]cmd =0x4c444556, len=4
25,931,740 >>> mbox cmd response data (687 bytes)
25,973,473 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,003,507 UART: [rt]cmd =0x43455246, len=4
26,016,283 >>> mbox cmd response data (887 bytes)
26,032,887 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,062,596 UART: [rt]cmd =0x43455252, len=4
26,074,019 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
3,699,089 ready_for_fw is high
3,699,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,464 >>> mbox cmd response: success
14,281,644 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,527,203 UART:
18,527,610 UART: Running Caliptra FMC ...
18,528,710 UART:
18,528,855 UART: [state] CFI Enabled
18,536,518 UART: [fht] FMC Alias Private Key: 7
20,293,461 UART: [art] Extend RT PCRs Done
20,294,701 UART: [art] Lock RT PCRs Done
20,296,312 UART: [art] Populate DV Done
20,301,665 UART: [fht] FMC Alias Private Key: 7
20,303,362 UART: [art] Derive CDI
20,304,172 UART: [art] Store in in slot 0x4
20,346,552 UART: [art] Derive Key Pair
20,347,594 UART: [art] Store priv key in slot 0x5
22,774,034 UART: [art] Derive Key Pair - Done
22,787,175 UART: [art] Signing Cert with AUTHO
22,788,483 UART: RITY.KEYID = 7
24,493,965 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,466 UART: [art] PUB.X = 3EF261DB693D795BFE40634B59DD888F768A1E391E8FCD42549FF493E4E41368F4F70D38444BCDA50C2FAF3123CC24FA
24,502,713 UART: [art] PUB.Y = 44049C9AF7CDFAEC26C5F3AAD0931E98810F96B23A3210DE990C2099240F4262540E04EE1F367DB16C507E6336B9F367
24,509,968 UART: [art] SIG.R = 3194621C600E6A55E18DB08778357EB20D1EEB647D3CDF4A0D77A3D14B47A5F70C30EF6E9448ABD2BB353833405643A0
24,517,360 UART: [art] SIG.S = 6F279AB2A4F5218928AF79F12F724B73AAA622C06B5ACFD1630A4C3B46D688F48EB7BB798F73E84766705DC197543404
25,496,394 UART: Caliptra RT
25,497,084 UART: [state] CFI Enabled
25,614,411 UART: [rt] RT listening for mailbox commands...
25,645,578 UART: [rt]cmd =0x4c444556, len=4
25,656,507 >>> mbox cmd response data (687 bytes)
25,698,273 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,728,107 UART: [rt]cmd =0x43455246, len=4
25,740,810 >>> mbox cmd response data (887 bytes)
25,757,458 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,787,544 UART: [rt]cmd =0x43455252, len=4
25,799,124 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
3,441,113 ready_for_fw is high
3,441,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,733,811 >>> mbox cmd response: success
14,734,457 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,025,695 UART:
19,026,092 UART: Running Caliptra FMC ...
19,027,234 UART:
19,027,394 UART: [state] CFI Enabled
19,094,778 UART: [fht] FMC Alias Private Key: 7
20,858,395 UART: [art] Extend RT PCRs Done
20,859,604 UART: [art] Lock RT PCRs Done
20,861,390 UART: [art] Populate DV Done
20,866,789 UART: [fht] FMC Alias Private Key: 7
20,868,485 UART: [art] Derive CDI
20,869,296 UART: [art] Store in in slot 0x4
20,927,532 UART: [art] Derive Key Pair
20,928,571 UART: [art] Store priv key in slot 0x5
23,391,087 UART: [art] Derive Key Pair - Done
23,403,861 UART: [art] Signing Cert with AUTHO
23,405,174 UART: RITY.KEYID = 7
25,116,889 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,377 UART: [art] PUB.X = 58D47980EEBBEB30F55B8355D3D7B313A9C0DA1EC54F49DFBB0E95BDDAB66516FFD95089911FF1801FA84071CF3BB9D1
25,125,669 UART: [art] PUB.Y = C04A7128181AB467B1B37C5E90A6277D19E894877EA6F550A448ACA8ACEC6D2125E88FACB19379ED381F0EF9A39945E6
25,132,962 UART: [art] SIG.R = B1108B5C9A6B5BF517A8E9C662347AB6217C12FB209AB1A0E180F9474F765E600373ED7FD4272F3CF89E9EB47409CD0D
25,140,356 UART: [art] SIG.S = 05EEF09FEC0800BE4FE0F46E39550A50C13F076072534C179E96FBAC359C25A7AD5D071DE25CF6EF6389A39D104E17D6
26,119,694 UART: Caliptra RT
26,120,402 UART: [state] CFI Enabled
26,283,717 UART: [rt] RT listening for mailbox commands...
26,315,022 UART: [rt]cmd =0x4c444556, len=4
26,326,001 >>> mbox cmd response data (687 bytes)
26,367,952 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,397,925 UART: [rt]cmd =0x43455246, len=4
26,410,563 >>> mbox cmd response data (887 bytes)
26,427,326 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,457,181 UART: [rt]cmd =0x43455252, len=4
26,468,495 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,756,242 ready_for_fw is high
3,756,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,968,508 >>> mbox cmd response: success
14,969,081 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,223,074 UART:
19,223,458 UART: Running Caliptra FMC ...
19,224,560 UART:
19,224,705 UART: [state] CFI Enabled
19,233,194 UART: [fht] FMC Alias Private Key: 7
20,989,843 UART: [art] Extend RT PCRs Done
20,991,069 UART: [art] Lock RT PCRs Done
20,992,882 UART: [art] Populate DV Done
20,998,291 UART: [fht] FMC Alias Private Key: 7
20,999,771 UART: [art] Derive CDI
21,000,528 UART: [art] Store in in slot 0x4
21,043,206 UART: [art] Derive Key Pair
21,044,250 UART: [art] Store priv key in slot 0x5
23,470,449 UART: [art] Derive Key Pair - Done
23,483,126 UART: [art] Signing Cert with AUTHO
23,484,430 UART: RITY.KEYID = 7
25,189,946 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,458 UART: [art] PUB.X = E4739414470218CCDAF618CAE0A99F3EB49F5DDDF3647E5304939317D12257434875DEEDF4A639BC506EA50AE9CB9778
25,198,708 UART: [art] PUB.Y = 00742D9BDA50642FF021A3CC4D226E8355B018D284174EE70A220357035CB5B2ED84A27B51ECEBB9C81CF2B5242F20EA
25,205,911 UART: [art] SIG.R = 305F912B4911AD3F84FC2DD1D87A1F74BDA28F77D76E3672B5BB63347719FC501002A290F33D28EC358F7EAF25D21394
25,213,355 UART: [art] SIG.S = 31580B2E01963C99697D04A187DE0935139FF226FB0D6E23172506D3BCDAB0DB28BCF8DAE9EA6B98BEC9F50F48920048
26,192,684 UART: Caliptra RT
26,193,400 UART: [state] CFI Enabled
26,309,940 UART: [rt] RT listening for mailbox commands...
26,341,410 UART: [rt]cmd =0x4c444556, len=4
26,352,382 >>> mbox cmd response data (687 bytes)
26,394,436 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,424,182 UART: [rt]cmd =0x43455246, len=4
26,436,929 >>> mbox cmd response data (887 bytes)
26,453,544 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,483,455 UART: [rt]cmd =0x43455252, len=4
26,494,930 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,135 UART: [kat] SHA2-256
882,066 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,181 UART: [kat] ++
886,333 UART: [kat] sha1
890,711 UART: [kat] SHA2-256
892,649 UART: [kat] SHA2-384
895,426 UART: [kat] SHA2-512-ACC
897,327 UART: [kat] ECC-384
902,816 UART: [kat] HMAC-384Kdf
907,230 UART: [kat] LMS
1,475,426 UART: [kat] --
1,476,463 UART: [cold-reset] ++
1,476,841 UART: [fht] Storing FHT @ 0x50003400
1,479,524 UART: [idev] ++
1,479,692 UART: [idev] CDI.KEYID = 6
1,480,052 UART: [idev] SUBJECT.KEYID = 7
1,480,476 UART: [idev] UDS.KEYID = 0
1,480,821 ready_for_fw is high
1,480,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,598 UART: [idev] Erasing UDS.KEYID = 0
1,505,454 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,906 UART: [idev] --
1,514,899 UART: [ldev] ++
1,515,067 UART: [ldev] CDI.KEYID = 6
1,515,430 UART: [ldev] SUBJECT.KEYID = 5
1,515,856 UART: [ldev] AUTHORITY.KEYID = 7
1,516,319 UART: [ldev] FE.KEYID = 1
1,521,465 UART: [ldev] Erasing FE.KEYID = 1
1,546,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,828 UART: [ldev] --
1,586,147 UART: [fwproc] Waiting for Commands...
1,587,014 UART: [fwproc] Received command 0x46574c44
1,587,805 UART: [fwproc] Received Image of size 114448 bytes
2,887,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,026 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,289 >>> mbox cmd response: success
3,079,289 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,080,523 UART: [afmc] ++
3,080,691 UART: [afmc] CDI.KEYID = 6
3,081,053 UART: [afmc] SUBJECT.KEYID = 7
3,081,478 UART: [afmc] AUTHORITY.KEYID = 5
3,116,337 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,373 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,766 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,456 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,421 UART: [afmc] --
3,159,471 UART: [cold-reset] --
3,160,219 UART: [state] Locking Datavault
3,161,708 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,312 UART: [state] Locking ICCM
3,162,928 UART: [exit] Launching FMC @ 0x40000130
3,168,257 UART:
3,168,273 UART: Running Caliptra FMC ...
3,168,681 UART:
3,168,735 UART: [state] CFI Enabled
3,179,136 UART: [fht] FMC Alias Private Key: 7
3,287,215 UART: [art] Extend RT PCRs Done
3,287,643 UART: [art] Lock RT PCRs Done
3,289,329 UART: [art] Populate DV Done
3,297,680 UART: [fht] FMC Alias Private Key: 7
3,298,842 UART: [art] Derive CDI
3,299,122 UART: [art] Store in in slot 0x4
3,385,075 UART: [art] Derive Key Pair
3,385,435 UART: [art] Store priv key in slot 0x5
3,398,173 UART: [art] Derive Key Pair - Done
3,412,873 UART: [art] Signing Cert with AUTHO
3,413,353 UART: RITY.KEYID = 7
3,428,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,998 UART: [art] PUB.X = DCF7E962DCF43E444F0DD8D22B1EB610264608501D97E914A5EF6C13F9FD4FDE62F8735B9CB69937DF44FC379E060370
3,435,766 UART: [art] PUB.Y = 31695DB7AF27C5D96E488AB95387F54CFF563566C06FE50002E2F1BA40C55C74DBF99B6409D220B2DDC79E76CBC08D10
3,442,698 UART: [art] SIG.R = CC70720A523FA98716DB039BB8803B0436610CA31AC88164BDE25D25D71137546ECBABBFDE11863B555C01E71A8E8C0E
3,449,458 UART: [art] SIG.S = 6A7FFAEDF7C2FF2859B193C4C7AD3E11E163F715B5A1DCB01D305CB136CCA349082DEA40939F0196FF83CD582D528D24
3,473,435 UART: Caliptra RT
3,473,688 UART: [state] CFI Enabled
3,581,937 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,595 UART: [rt]cmd =0x4c444556, len=4
3,622,917 >>> mbox cmd response data (687 bytes)
3,622,918 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,341 UART: [rt]cmd =0x43455246, len=4
3,664,665 >>> mbox cmd response data (920 bytes)
3,664,666 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,173 UART: [rt]cmd =0x43455252, len=4
3,704,910 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,213 ready_for_fw is high
1,362,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,943 >>> mbox cmd response: success
2,928,943 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,989,975 UART:
2,989,991 UART: Running Caliptra FMC ...
2,990,399 UART:
2,990,453 UART: [state] CFI Enabled
3,000,812 UART: [fht] FMC Alias Private Key: 7
3,108,315 UART: [art] Extend RT PCRs Done
3,108,743 UART: [art] Lock RT PCRs Done
3,110,227 UART: [art] Populate DV Done
3,118,550 UART: [fht] FMC Alias Private Key: 7
3,119,542 UART: [art] Derive CDI
3,119,822 UART: [art] Store in in slot 0x4
3,205,255 UART: [art] Derive Key Pair
3,205,615 UART: [art] Store priv key in slot 0x5
3,218,639 UART: [art] Derive Key Pair - Done
3,233,127 UART: [art] Signing Cert with AUTHO
3,233,607 UART: RITY.KEYID = 7
3,248,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,996 UART: [art] PUB.X = 0E55EBF977CD84BE602F98E606BDBBE67390D0344A9F60C59708EE4AAB07A22C0254C4D1C9B1BCC7E82E928A6937B747
3,255,763 UART: [art] PUB.Y = 72D363D546019233C7842A7D74B6C5CC8EF7FD2DDED8DCAFC674D166B7D725F223D42D1CC96B6AD6625756E5A0C8AEBB
3,262,728 UART: [art] SIG.R = 370B6CA87DB9025CF7C2414E80CB39891F20A54CDD3A9468D1E47B62A01BD9ACF7FB540AF4F13994AB8C87951553F647
3,269,497 UART: [art] SIG.S = 3D525FD163CD6983B8218148F704408D39FBC6C948B5B0CD5F95D978DF2251AE182D2A79F199F90E2C5B76BAB748837D
3,292,842 UART: Caliptra RT
3,293,095 UART: [state] CFI Enabled
3,401,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,403 UART: [rt]cmd =0x4c444556, len=4
3,441,741 >>> mbox cmd response data (687 bytes)
3,441,742 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,935 UART: [rt]cmd =0x43455246, len=4
3,483,295 >>> mbox cmd response data (920 bytes)
3,483,296 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,609 UART: [rt]cmd =0x43455252, len=4
3,523,244 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,570 UART: [kat] SHA2-256
882,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,616 UART: [kat] ++
886,768 UART: [kat] sha1
891,046 UART: [kat] SHA2-256
892,984 UART: [kat] SHA2-384
895,797 UART: [kat] SHA2-512-ACC
897,698 UART: [kat] ECC-384
903,241 UART: [kat] HMAC-384Kdf
907,779 UART: [kat] LMS
1,475,975 UART: [kat] --
1,476,942 UART: [cold-reset] ++
1,477,420 UART: [fht] Storing FHT @ 0x50003400
1,480,211 UART: [idev] ++
1,480,379 UART: [idev] CDI.KEYID = 6
1,480,739 UART: [idev] SUBJECT.KEYID = 7
1,481,163 UART: [idev] UDS.KEYID = 0
1,481,508 ready_for_fw is high
1,481,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,985 UART: [idev] Erasing UDS.KEYID = 0
1,505,461 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,175 UART: [idev] --
1,515,100 UART: [ldev] ++
1,515,268 UART: [ldev] CDI.KEYID = 6
1,515,631 UART: [ldev] SUBJECT.KEYID = 5
1,516,057 UART: [ldev] AUTHORITY.KEYID = 7
1,516,520 UART: [ldev] FE.KEYID = 1
1,521,638 UART: [ldev] Erasing FE.KEYID = 1
1,547,145 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,985 UART: [ldev] --
1,586,278 UART: [fwproc] Waiting for Commands...
1,586,941 UART: [fwproc] Received command 0x46574c44
1,587,732 UART: [fwproc] Received Image of size 114448 bytes
2,887,095 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,233 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,508 >>> mbox cmd response: success
3,079,508 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,080,528 UART: [afmc] ++
3,080,696 UART: [afmc] CDI.KEYID = 6
3,081,058 UART: [afmc] SUBJECT.KEYID = 7
3,081,483 UART: [afmc] AUTHORITY.KEYID = 5
3,116,554 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,794 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,574 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,302 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,187 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,877 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,704 UART: [afmc] --
3,159,644 UART: [cold-reset] --
3,160,586 UART: [state] Locking Datavault
3,161,543 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,147 UART: [state] Locking ICCM
3,162,573 UART: [exit] Launching FMC @ 0x40000130
3,167,902 UART:
3,167,918 UART: Running Caliptra FMC ...
3,168,326 UART:
3,168,469 UART: [state] CFI Enabled
3,179,374 UART: [fht] FMC Alias Private Key: 7
3,287,457 UART: [art] Extend RT PCRs Done
3,287,885 UART: [art] Lock RT PCRs Done
3,289,749 UART: [art] Populate DV Done
3,298,260 UART: [fht] FMC Alias Private Key: 7
3,299,424 UART: [art] Derive CDI
3,299,704 UART: [art] Store in in slot 0x4
3,385,127 UART: [art] Derive Key Pair
3,385,487 UART: [art] Store priv key in slot 0x5
3,398,431 UART: [art] Derive Key Pair - Done
3,413,328 UART: [art] Signing Cert with AUTHO
3,413,808 UART: RITY.KEYID = 7
3,428,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,553 UART: [art] PUB.X = 69DDEAC871C909F38A6C98DF52DEE16008BEBE6EE2EA97CD731A6A44D7810D3E92B798CBC1619C0B466E3AB0C83536B0
3,436,329 UART: [art] PUB.Y = 08F646A282318F47BC67EAE4860B6FE839465B5B56E57F2F71C1AF98ECA56E92E3E8B0E17D467E36C2E416EED5C08187
3,443,281 UART: [art] SIG.R = 643FC527D0728858E64D9480A9752FE531E8636035825419A964C75CDC4A930BF6A8A5D4D8BF3AB795124125728F8C57
3,450,040 UART: [art] SIG.S = 160C9DAA2ED7D7F578605A032778BAD14074D36D11D75440162F272169393AB6CDBEE49E1AA3D8A2E0D4BF6BE760C525
3,474,275 UART: Caliptra RT
3,474,620 UART: [state] CFI Enabled
3,582,918 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,468 UART: [rt]cmd =0x4c444556, len=4
3,624,094 >>> mbox cmd response data (687 bytes)
3,624,095 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,522 UART: [rt]cmd =0x43455246, len=4
3,665,966 >>> mbox cmd response data (920 bytes)
3,665,967 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,695,292 UART: [rt]cmd =0x43455252, len=4
3,706,193 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,540 ready_for_fw is high
1,362,540 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,218 >>> mbox cmd response: success
2,929,218 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,990,986 UART:
2,991,002 UART: Running Caliptra FMC ...
2,991,410 UART:
2,991,553 UART: [state] CFI Enabled
3,001,950 UART: [fht] FMC Alias Private Key: 7
3,109,869 UART: [art] Extend RT PCRs Done
3,110,297 UART: [art] Lock RT PCRs Done
3,111,731 UART: [art] Populate DV Done
3,119,746 UART: [fht] FMC Alias Private Key: 7
3,120,790 UART: [art] Derive CDI
3,121,070 UART: [art] Store in in slot 0x4
3,206,845 UART: [art] Derive Key Pair
3,207,205 UART: [art] Store priv key in slot 0x5
3,220,565 UART: [art] Derive Key Pair - Done
3,235,089 UART: [art] Signing Cert with AUTHO
3,235,569 UART: RITY.KEYID = 7
3,250,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,402 UART: [art] PUB.X = FEB9A06C0F582071D9D9912B6E9A0E85A6D88D2226EBD3E751466D56A1FE822CCE74DE63ADCF2AC113B9A75374C010CD
3,258,182 UART: [art] PUB.Y = C01FE72A1DB075CDD67E0D2FC5A58A5E92126868D4B6742D097E47D23AE8426B124DAFDB78E282E899583C1A55BD8A42
3,265,136 UART: [art] SIG.R = E937297B787005C3A31094F3C737AA6482E777E496E43834F2E8DAC295B1FC042B42131BBCDCA7A961909494694349DC
3,271,896 UART: [art] SIG.S = D425DF4B23DA63ADFF2840D692F3817DFB7AD551572676FE18FB347FC554D431777AA700EF7034ADE502F3553AEC3F2F
3,295,416 UART: Caliptra RT
3,295,761 UART: [state] CFI Enabled
3,403,919 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,555 UART: [rt]cmd =0x4c444556, len=4
3,445,239 >>> mbox cmd response data (687 bytes)
3,445,240 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,413 UART: [rt]cmd =0x43455246, len=4
3,486,933 >>> mbox cmd response data (920 bytes)
3,486,934 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,063 UART: [rt]cmd =0x43455252, len=4
3,526,885 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
893,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,621 UART: [kat] ++
897,773 UART: [kat] sha1
901,947 UART: [kat] SHA2-256
903,887 UART: [kat] SHA2-384
906,506 UART: [kat] SHA2-512-ACC
908,407 UART: [kat] ECC-384
918,118 UART: [kat] HMAC-384Kdf
922,788 UART: [kat] LMS
1,171,116 UART: [kat] --
1,171,975 UART: [cold-reset] ++
1,172,365 UART: [fht] FHT @ 0x50003400
1,174,986 UART: [idev] ++
1,175,154 UART: [idev] CDI.KEYID = 6
1,175,514 UART: [idev] SUBJECT.KEYID = 7
1,175,938 UART: [idev] UDS.KEYID = 0
1,176,283 ready_for_fw is high
1,176,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,738 UART: [idev] Erasing UDS.KEYID = 0
1,200,775 UART: [idev] Sha1 KeyId Algorithm
1,209,267 UART: [idev] --
1,210,333 UART: [ldev] ++
1,210,501 UART: [ldev] CDI.KEYID = 6
1,210,864 UART: [ldev] SUBJECT.KEYID = 5
1,211,290 UART: [ldev] AUTHORITY.KEYID = 7
1,211,753 UART: [ldev] FE.KEYID = 1
1,217,241 UART: [ldev] Erasing FE.KEYID = 1
1,243,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,115 UART: [ldev] --
1,283,628 UART: [fwproc] Wait for Commands...
1,284,380 UART: [fwproc] Recv command 0x46574c44
1,285,108 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,262 >>> mbox cmd response: success
2,776,262 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,492 UART: [afmc] ++
2,777,660 UART: [afmc] CDI.KEYID = 6
2,778,022 UART: [afmc] SUBJECT.KEYID = 7
2,778,447 UART: [afmc] AUTHORITY.KEYID = 5
2,814,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,883 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,681 UART: [afmc] --
2,857,743 UART: [cold-reset] --
2,858,517 UART: [state] Locking Datavault
2,859,860 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,464 UART: [state] Locking ICCM
2,861,098 UART: [exit] Launching FMC @ 0x40000130
2,866,427 UART:
2,866,443 UART: Running Caliptra FMC ...
2,866,851 UART:
2,866,905 UART: [state] CFI Enabled
2,877,060 UART: [fht] FMC Alias Private Key: 7
2,984,605 UART: [art] Extend RT PCRs Done
2,985,033 UART: [art] Lock RT PCRs Done
2,986,743 UART: [art] Populate DV Done
2,994,958 UART: [fht] FMC Alias Private Key: 7
2,995,898 UART: [art] Derive CDI
2,996,178 UART: [art] Store in in slot 0x4
3,082,425 UART: [art] Derive Key Pair
3,082,785 UART: [art] Store priv key in slot 0x5
3,096,105 UART: [art] Derive Key Pair - Done
3,110,786 UART: [art] Signing Cert with AUTHO
3,111,266 UART: RITY.KEYID = 7
3,126,478 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,243 UART: [art] PUB.X = 415C86F8BB995C1362A5C8B4EB5426722D0F16F5E3BB001CA46C25900431100689D863ED21C51F42466989166CA2F865
3,133,974 UART: [art] PUB.Y = DE1B0A09348DEB9988172738B663E4B5951A2AEBE7D0F23E3FA990368310E357C837BE7991947142121225B0619A6FEE
3,140,914 UART: [art] SIG.R = A3FAA7A21AC94A17F2F826BF8C4B35BFA16392D3FCAB4283AF1DF65FEA7ADE86942AFB0C4FFC7CAADCC863E82FB4670A
3,147,714 UART: [art] SIG.S = 648787E042A4F4292D8D54F9E66143768ED19AD4FD7D1AB9971D2F28CB2EB0557F0B57682E30B0E888F62A654FB792C7
3,171,410 UART: Caliptra RT
3,171,663 UART: [state] CFI Enabled
3,280,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,560 UART: [rt]cmd =0x4c444556, len=4
3,320,922 >>> mbox cmd response data (687 bytes)
3,320,923 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,300 UART: [rt]cmd =0x43455246, len=4
3,362,192 >>> mbox cmd response data (887 bytes)
3,362,193 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,391,708 UART: [rt]cmd =0x43455252, len=4
3,402,683 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,079 ready_for_fw is high
1,060,079 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,975 >>> mbox cmd response: success
2,627,975 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,690,461 UART:
2,690,477 UART: Running Caliptra FMC ...
2,690,885 UART:
2,690,939 UART: [state] CFI Enabled
2,701,492 UART: [fht] FMC Alias Private Key: 7
2,809,615 UART: [art] Extend RT PCRs Done
2,810,043 UART: [art] Lock RT PCRs Done
2,811,449 UART: [art] Populate DV Done
2,819,818 UART: [fht] FMC Alias Private Key: 7
2,820,776 UART: [art] Derive CDI
2,821,056 UART: [art] Store in in slot 0x4
2,906,481 UART: [art] Derive Key Pair
2,906,841 UART: [art] Store priv key in slot 0x5
2,920,127 UART: [art] Derive Key Pair - Done
2,934,694 UART: [art] Signing Cert with AUTHO
2,935,174 UART: RITY.KEYID = 7
2,950,436 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,201 UART: [art] PUB.X = B1890AA831F5CD14435B28CEC58EE40B8AD2087389790E3413CD66F4B400200E18AE9B7EA613C1719732EC4341028BB5
2,957,931 UART: [art] PUB.Y = 0EB28CE55900EBCBBF7FF21225B788FCA125FFC87BDB27EC3779B1E261E2B38296571E44BCD9B0D0A396C0AB70F6DA51
2,964,876 UART: [art] SIG.R = 82CD56D52E9457A134E641CAE591D0F6CD8E4B7563E99DA527BC7BA89757C0D752F8DE651AE992ED3908D22B0B32F635
2,971,648 UART: [art] SIG.S = AAE3142DD7B7B82582F10A50BC9558E5C5E01330325CABDE153F20D1ED9BB3E04C029FD9304B27D9C8BABAF414BCE3D5
2,995,505 UART: Caliptra RT
2,995,758 UART: [state] CFI Enabled
3,103,506 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,272 UART: [rt]cmd =0x4c444556, len=4
3,144,882 >>> mbox cmd response data (687 bytes)
3,144,883 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,498 UART: [rt]cmd =0x43455246, len=4
3,186,560 >>> mbox cmd response data (887 bytes)
3,186,561 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,215,946 UART: [rt]cmd =0x43455252, len=4
3,226,796 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
901,958 UART: [kat] SHA2-256
903,898 UART: [kat] SHA2-384
906,521 UART: [kat] SHA2-512-ACC
908,422 UART: [kat] ECC-384
918,269 UART: [kat] HMAC-384Kdf
922,939 UART: [kat] LMS
1,171,267 UART: [kat] --
1,171,924 UART: [cold-reset] ++
1,172,388 UART: [fht] FHT @ 0x50003400
1,174,879 UART: [idev] ++
1,175,047 UART: [idev] CDI.KEYID = 6
1,175,407 UART: [idev] SUBJECT.KEYID = 7
1,175,831 UART: [idev] UDS.KEYID = 0
1,176,176 ready_for_fw is high
1,176,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,931 UART: [idev] Erasing UDS.KEYID = 0
1,201,010 UART: [idev] Sha1 KeyId Algorithm
1,209,308 UART: [idev] --
1,210,222 UART: [ldev] ++
1,210,390 UART: [ldev] CDI.KEYID = 6
1,210,753 UART: [ldev] SUBJECT.KEYID = 5
1,211,179 UART: [ldev] AUTHORITY.KEYID = 7
1,211,642 UART: [ldev] FE.KEYID = 1
1,216,940 UART: [ldev] Erasing FE.KEYID = 1
1,243,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,844 UART: [ldev] --
1,282,231 UART: [fwproc] Wait for Commands...
1,282,993 UART: [fwproc] Recv command 0x46574c44
1,283,721 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,167 >>> mbox cmd response: success
2,776,167 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,317 UART: [afmc] ++
2,777,485 UART: [afmc] CDI.KEYID = 6
2,777,847 UART: [afmc] SUBJECT.KEYID = 7
2,778,272 UART: [afmc] AUTHORITY.KEYID = 5
2,813,589 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,736 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,464 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,349 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,068 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,910 UART: [afmc] --
2,856,884 UART: [cold-reset] --
2,857,472 UART: [state] Locking Datavault
2,858,635 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,239 UART: [state] Locking ICCM
2,859,819 UART: [exit] Launching FMC @ 0x40000130
2,865,148 UART:
2,865,164 UART: Running Caliptra FMC ...
2,865,572 UART:
2,865,715 UART: [state] CFI Enabled
2,876,444 UART: [fht] FMC Alias Private Key: 7
2,983,623 UART: [art] Extend RT PCRs Done
2,984,051 UART: [art] Lock RT PCRs Done
2,985,851 UART: [art] Populate DV Done
2,994,084 UART: [fht] FMC Alias Private Key: 7
2,995,236 UART: [art] Derive CDI
2,995,516 UART: [art] Store in in slot 0x4
3,081,457 UART: [art] Derive Key Pair
3,081,817 UART: [art] Store priv key in slot 0x5
3,095,587 UART: [art] Derive Key Pair - Done
3,110,349 UART: [art] Signing Cert with AUTHO
3,110,829 UART: RITY.KEYID = 7
3,125,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,744 UART: [art] PUB.X = 03F8D8997A632AB75B61AA9C70F93965E7992709E7FE0BC1A3EFC74B8A67DD2AAAB73E01F923DB8EC10412380420FBAF
3,133,510 UART: [art] PUB.Y = 3263B7FE0865568272F071E774AECBA4B8DD4FE34E26482ACC36728224249F20330A9612ACBA39E6E7547A42B853FABC
3,140,458 UART: [art] SIG.R = 1E7E965E2772F5591045A62EFB99E13312692FFDCC056C9D4E5BCDC8479C7F9407917B47A1B39CA25F2817A5BC3ABAF1
3,147,232 UART: [art] SIG.S = 3460A132937868F4ACB7524AE77C59F0883E3FE1433278E8580A989B017F0DB6A1D23ABFE5A54BB604CA352865C4B409
3,171,422 UART: Caliptra RT
3,171,767 UART: [state] CFI Enabled
3,279,772 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,372 UART: [rt]cmd =0x4c444556, len=4
3,320,872 >>> mbox cmd response data (687 bytes)
3,320,873 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,336 UART: [rt]cmd =0x43455246, len=4
3,362,482 >>> mbox cmd response data (887 bytes)
3,362,483 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,034 UART: [rt]cmd =0x43455252, len=4
3,402,917 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,410 ready_for_fw is high
1,061,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,346 >>> mbox cmd response: success
2,629,346 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,692,572 UART:
2,692,588 UART: Running Caliptra FMC ...
2,692,996 UART:
2,693,139 UART: [state] CFI Enabled
2,703,444 UART: [fht] FMC Alias Private Key: 7
2,811,395 UART: [art] Extend RT PCRs Done
2,811,823 UART: [art] Lock RT PCRs Done
2,813,147 UART: [art] Populate DV Done
2,821,424 UART: [fht] FMC Alias Private Key: 7
2,822,564 UART: [art] Derive CDI
2,822,844 UART: [art] Store in in slot 0x4
2,908,789 UART: [art] Derive Key Pair
2,909,149 UART: [art] Store priv key in slot 0x5
2,922,343 UART: [art] Derive Key Pair - Done
2,937,365 UART: [art] Signing Cert with AUTHO
2,937,845 UART: RITY.KEYID = 7
2,952,955 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,720 UART: [art] PUB.X = E0E736470BF85CBE8B684D151FADA29687D898BB34E9C9F44C12B4D53316D0B05D6A7EEACA1F2B20D77AECF41D2100C5
2,960,483 UART: [art] PUB.Y = 00886D3EB035DA802C2E92FE4A117BE565CAE936940C011E4A3F1499B2D01EFD65BA0BAB2CA56DB74D539BCC96E98E30
2,967,418 UART: [art] SIG.R = DD4C3F69993A9484CB01DDD96994A03250AFAFD85BD8CD02E017C21BE2DF70BEEDF238A2F5442A3A50EAF984E536DEF9
2,974,204 UART: [art] SIG.S = B006F8F69E70D366D8BBC0044BDF04F7BEFC2EF88E3271D2528F76590776D22F92B1F0DEB051A5E386089637F6B568B6
2,998,074 UART: Caliptra RT
2,998,419 UART: [state] CFI Enabled
3,105,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,813 UART: [rt]cmd =0x4c444556, len=4
3,146,263 >>> mbox cmd response data (687 bytes)
3,146,264 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,175,727 UART: [rt]cmd =0x43455246, len=4
3,187,631 >>> mbox cmd response data (887 bytes)
3,187,632 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,965 UART: [rt]cmd =0x43455252, len=4
3,227,883 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,305 UART: [kat] SHA2-256
901,245 UART: [kat] SHA2-384
903,926 UART: [kat] SHA2-512-ACC
905,827 UART: [kat] ECC-384
915,700 UART: [kat] HMAC-384Kdf
920,042 UART: [kat] LMS
1,168,354 UART: [kat] --
1,169,143 UART: [cold-reset] ++
1,169,561 UART: [fht] FHT @ 0x50003400
1,172,367 UART: [idev] ++
1,172,535 UART: [idev] CDI.KEYID = 6
1,172,896 UART: [idev] SUBJECT.KEYID = 7
1,173,321 UART: [idev] UDS.KEYID = 0
1,173,667 ready_for_fw is high
1,173,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,015 UART: [idev] Erasing UDS.KEYID = 0
1,198,011 UART: [idev] Sha1 KeyId Algorithm
1,206,919 UART: [idev] --
1,207,908 UART: [ldev] ++
1,208,076 UART: [ldev] CDI.KEYID = 6
1,208,440 UART: [ldev] SUBJECT.KEYID = 5
1,208,867 UART: [ldev] AUTHORITY.KEYID = 7
1,209,330 UART: [ldev] FE.KEYID = 1
1,214,712 UART: [ldev] Erasing FE.KEYID = 1
1,240,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,312 UART: [ldev] --
1,279,802 UART: [fwproc] Wait for Commands...
1,280,565 UART: [fwproc] Recv command 0x46574c44
1,281,298 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,716 >>> mbox cmd response: success
2,772,716 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,773,967 UART: [afmc] ++
2,774,135 UART: [afmc] CDI.KEYID = 6
2,774,498 UART: [afmc] SUBJECT.KEYID = 7
2,774,924 UART: [afmc] AUTHORITY.KEYID = 5
2,810,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,570 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,289 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,168 UART: [afmc] --
2,854,126 UART: [cold-reset] --
2,855,228 UART: [state] Locking Datavault
2,856,179 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,783 UART: [state] Locking ICCM
2,857,313 UART: [exit] Launching FMC @ 0x40000130
2,862,642 UART:
2,862,658 UART: Running Caliptra FMC ...
2,863,066 UART:
2,863,120 UART: [state] CFI Enabled
2,873,561 UART: [fht] FMC Alias Private Key: 7
2,982,246 UART: [art] Extend RT PCRs Done
2,982,674 UART: [art] Lock RT PCRs Done
2,984,420 UART: [art] Populate DV Done
2,992,661 UART: [fht] FMC Alias Private Key: 7
2,993,687 UART: [art] Derive CDI
2,993,967 UART: [art] Store in in slot 0x4
3,079,650 UART: [art] Derive Key Pair
3,080,010 UART: [art] Store priv key in slot 0x5
3,092,958 UART: [art] Derive Key Pair - Done
3,107,815 UART: [art] Signing Cert with AUTHO
3,108,295 UART: RITY.KEYID = 7
3,123,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,450 UART: [art] PUB.X = D774C51B672AF1B5CE8B6418259311DFB14CEEC24DB3054D67D3D63C558EC57D3F6BA463F21BD75160F1413C51B31FFF
3,131,229 UART: [art] PUB.Y = 9A53E0D651D7A5C4C0F31B65FA938021A75D8196DF4BF208DF15F1233C6E1BEA53BBB037558116A95D6C78FB7392BEA1
3,138,186 UART: [art] SIG.R = E57B376EFD204215D2E7A6198AD6751B729301F79E0903AB1931446B4C230DD4B2615EB15A68F8FE4E30845ED67327C7
3,144,942 UART: [art] SIG.S = 1F73966876D5B9BFA64ECDBF9B6E0E0E8C580051A489F6D6A930795656802CCF902C1342345D711D7F8A061262DEB97A
3,169,108 UART: Caliptra RT
3,169,361 UART: [state] CFI Enabled
3,276,958 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,542 UART: [rt]cmd =0x4c444556, len=4
3,317,980 >>> mbox cmd response data (687 bytes)
3,317,981 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,356 UART: [rt]cmd =0x43455246, len=4
3,359,518 >>> mbox cmd response data (887 bytes)
3,359,519 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,388,762 UART: [rt]cmd =0x43455252, len=4
3,399,667 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,712 ready_for_fw is high
1,055,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,852 >>> mbox cmd response: success
2,623,852 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,684,868 UART:
2,684,884 UART: Running Caliptra FMC ...
2,685,292 UART:
2,685,346 UART: [state] CFI Enabled
2,695,885 UART: [fht] FMC Alias Private Key: 7
2,804,698 UART: [art] Extend RT PCRs Done
2,805,126 UART: [art] Lock RT PCRs Done
2,806,782 UART: [art] Populate DV Done
2,814,743 UART: [fht] FMC Alias Private Key: 7
2,815,901 UART: [art] Derive CDI
2,816,181 UART: [art] Store in in slot 0x4
2,902,048 UART: [art] Derive Key Pair
2,902,408 UART: [art] Store priv key in slot 0x5
2,915,744 UART: [art] Derive Key Pair - Done
2,930,258 UART: [art] Signing Cert with AUTHO
2,930,738 UART: RITY.KEYID = 7
2,945,708 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,473 UART: [art] PUB.X = DDF9209892E1A25DBAF20314FD4457AE9D8D6103BD66FF95D9029A5BC2037088B9BAEDDD6CFAF9C4127772C73A49F11D
2,953,247 UART: [art] PUB.Y = 6C36693A865F645FAF4327C444FDF06FD516BEC4ADE91BF16108D3D2BB1A721EE7FEB4E82F9B8D4AE5B0FDCF7CA81BD0
2,960,222 UART: [art] SIG.R = 3541D01C9385D87F92FC5A89EF071AAA76DCDAF3E55FB2964BD98C8CE3D79BA2DAE438DD4E3EE4A97C9C702B0BC23A6D
2,967,012 UART: [art] SIG.S = BB94C441DC0585304502C5B3FB1608AD180AEC0B7F6DC9D95964EF96EB2FE8963365EF7A70761E77EDCFBE4E1AD6B7C9
2,990,498 UART: Caliptra RT
2,990,751 UART: [state] CFI Enabled
3,098,484 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,190 UART: [rt]cmd =0x4c444556, len=4
3,139,654 >>> mbox cmd response data (687 bytes)
3,139,655 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,980 UART: [rt]cmd =0x43455246, len=4
3,181,112 >>> mbox cmd response data (887 bytes)
3,181,113 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,210,442 UART: [rt]cmd =0x43455252, len=4
3,221,311 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,898 UART: [kat] ++
896,050 UART: [kat] sha1
900,304 UART: [kat] SHA2-256
902,244 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,087 UART: [kat] LMS
1,169,399 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,684 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,174,774 ready_for_fw is high
1,174,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,930 UART: [idev] Erasing UDS.KEYID = 0
1,199,090 UART: [idev] Sha1 KeyId Algorithm
1,207,872 UART: [idev] --
1,208,879 UART: [ldev] ++
1,209,047 UART: [ldev] CDI.KEYID = 6
1,209,411 UART: [ldev] SUBJECT.KEYID = 5
1,209,838 UART: [ldev] AUTHORITY.KEYID = 7
1,210,301 UART: [ldev] FE.KEYID = 1
1,215,543 UART: [ldev] Erasing FE.KEYID = 1
1,241,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,889 UART: [ldev] --
1,281,325 UART: [fwproc] Wait for Commands...
1,282,134 UART: [fwproc] Recv command 0x46574c44
1,282,867 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,764 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,155 >>> mbox cmd response: success
2,774,155 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,230 UART: [afmc] ++
2,775,398 UART: [afmc] CDI.KEYID = 6
2,775,761 UART: [afmc] SUBJECT.KEYID = 7
2,776,187 UART: [afmc] AUTHORITY.KEYID = 5
2,811,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,693 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,422 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,305 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,859 UART: [afmc] --
2,854,863 UART: [cold-reset] --
2,855,435 UART: [state] Locking Datavault
2,856,578 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,182 UART: [state] Locking ICCM
2,857,628 UART: [exit] Launching FMC @ 0x40000130
2,862,957 UART:
2,862,973 UART: Running Caliptra FMC ...
2,863,381 UART:
2,863,524 UART: [state] CFI Enabled
2,874,487 UART: [fht] FMC Alias Private Key: 7
2,983,134 UART: [art] Extend RT PCRs Done
2,983,562 UART: [art] Lock RT PCRs Done
2,984,832 UART: [art] Populate DV Done
2,993,115 UART: [fht] FMC Alias Private Key: 7
2,994,077 UART: [art] Derive CDI
2,994,357 UART: [art] Store in in slot 0x4
3,079,870 UART: [art] Derive Key Pair
3,080,230 UART: [art] Store priv key in slot 0x5
3,093,748 UART: [art] Derive Key Pair - Done
3,108,465 UART: [art] Signing Cert with AUTHO
3,108,945 UART: RITY.KEYID = 7
3,124,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,952 UART: [art] PUB.X = 0A45839ADD922418D3EBFEE4E7590B2ECB1816FA724F632DA4A1622FE053A4432F423E4FCB062F2F02F26C3395B6D7CE
3,131,722 UART: [art] PUB.Y = 0460172DB294B07AB4FD27F7F8DA897E58B0889C4DA30EE020F7A110D0891EE4D5719D49B5F2EF8C9A546A233FBFF027
3,138,676 UART: [art] SIG.R = DEF362F537A88CF8BF09DD0EE46C75EA03283AD9606461144266F37B75EE84362A5875B01A848484A2769675C7B450F8
3,145,433 UART: [art] SIG.S = 29E7B6E35C0F73D26E00BF7C2D30138E45F38EEC1123E3CD270E921E3E4CA03B8963AD08E5EB501D54CE5F282A8E1F70
3,169,095 UART: Caliptra RT
3,169,440 UART: [state] CFI Enabled
3,277,167 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,607 UART: [rt]cmd =0x4c444556, len=4
3,317,829 >>> mbox cmd response data (687 bytes)
3,317,830 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,113 UART: [rt]cmd =0x43455246, len=4
3,359,033 >>> mbox cmd response data (887 bytes)
3,359,034 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,388,457 UART: [rt]cmd =0x43455252, len=4
3,399,384 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,979 ready_for_fw is high
1,055,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,351 >>> mbox cmd response: success
2,624,351 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,165 UART:
2,686,181 UART: Running Caliptra FMC ...
2,686,589 UART:
2,686,732 UART: [state] CFI Enabled
2,697,391 UART: [fht] FMC Alias Private Key: 7
2,804,990 UART: [art] Extend RT PCRs Done
2,805,418 UART: [art] Lock RT PCRs Done
2,806,702 UART: [art] Populate DV Done
2,815,129 UART: [fht] FMC Alias Private Key: 7
2,816,229 UART: [art] Derive CDI
2,816,509 UART: [art] Store in in slot 0x4
2,902,258 UART: [art] Derive Key Pair
2,902,618 UART: [art] Store priv key in slot 0x5
2,916,280 UART: [art] Derive Key Pair - Done
2,931,014 UART: [art] Signing Cert with AUTHO
2,931,494 UART: RITY.KEYID = 7
2,946,604 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,369 UART: [art] PUB.X = EC5404497D65C67E9F430EF43E0F0F8133EDC23A4BF2C5F3DBBE6353D06105B5E53C164DB1E5D41572C94718AF851B31
2,954,132 UART: [art] PUB.Y = 788DED27ABA7F60CC819791E8BD64F528FF2608BF91397E46BF04EBF5D1BEF72C65586BBD41BF7EC94A5C34C5517D1B4
2,961,097 UART: [art] SIG.R = 89A370EB6C801639E72279C1C3E097B65A381E6D2F893B2977DC01B4A97901D104606038632C976D332C79B317A02A72
2,967,846 UART: [art] SIG.S = D9FE712685BB4B2865286546DB8E0EE13CB016352682B0E7F6E8F2BFC856E314D0369C13D54F7A337D8F961502EB7EA4
2,991,531 UART: Caliptra RT
2,991,876 UART: [state] CFI Enabled
3,100,324 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,052 UART: [rt]cmd =0x4c444556, len=4
3,141,492 >>> mbox cmd response data (687 bytes)
3,141,493 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,602 UART: [rt]cmd =0x43455246, len=4
3,182,704 >>> mbox cmd response data (887 bytes)
3,182,705 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,212,064 UART: [rt]cmd =0x43455252, len=4
3,222,868 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
191,993 UART:
192,357 UART: Running Caliptra ROM ...
193,550 UART:
193,707 UART: [state] CFI Enabled
267,836 UART: [state] LifecycleState = Unprovisioned
269,815 UART: [state] DebugLocked = No
271,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,712 UART: [kat] SHA2-256
446,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,961 UART: [kat] ++
457,410 UART: [kat] sha1
468,069 UART: [kat] SHA2-256
470,796 UART: [kat] SHA2-384
476,213 UART: [kat] SHA2-512-ACC
478,599 UART: [kat] ECC-384
2,769,525 UART: [kat] HMAC-384Kdf
2,800,369 UART: [kat] LMS
3,990,657 UART: [kat] --
3,995,530 UART: [cold-reset] ++
3,996,554 UART: [fht] Storing FHT @ 0x50003400
4,006,757 UART: [idev] ++
4,007,329 UART: [idev] CDI.KEYID = 6
4,008,370 UART: [idev] SUBJECT.KEYID = 7
4,009,554 UART: [idev] UDS.KEYID = 0
4,010,604 ready_for_fw is high
4,010,821 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,383 UART: [idev] Erasing UDS.KEYID = 0
7,347,821 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,611 UART: [idev] --
7,375,516 UART: [ldev] ++
7,376,103 UART: [ldev] CDI.KEYID = 6
7,377,023 UART: [ldev] SUBJECT.KEYID = 5
7,378,237 UART: [ldev] AUTHORITY.KEYID = 7
7,379,518 UART: [ldev] FE.KEYID = 1
7,424,407 UART: [ldev] Erasing FE.KEYID = 1
10,754,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,935 UART: [ldev] --
13,118,765 UART: [fwproc] Waiting for Commands...
13,120,594 UART: [fwproc] Received command 0x46574c44
13,122,830 UART: [fwproc] Received Image of size 114124 bytes
17,174,313 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,227 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,635,597 >>> mbox cmd response: success
18,097,286 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,098,365 UART: [afmc] ++
18,098,889 UART: [afmc] CDI.KEYID = 6
18,099,785 UART: [afmc] SUBJECT.KEYID = 7
18,100,809 UART: [afmc] AUTHORITY.KEYID = 5
21,010,840 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,782 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,042 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,477 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,281 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,753 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,976 UART: [afmc] --
23,382,014 UART: [cold-reset] --
23,385,500 UART: [state] Locking Datavault
23,392,103 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,871 UART: [state] Locking ICCM
23,395,292 UART: [exit] Launching FMC @ 0x40000130
23,403,641 UART:
23,403,880 UART: Running Caliptra FMC ...
23,404,981 UART:
23,405,326 UART: [state] CFI Enabled
23,471,854 UART: [fht] FMC Alias Private Key: 7
25,809,411 UART: [art] Extend RT PCRs Done
25,810,637 UART: [art] Lock RT PCRs Done
25,812,575 UART: [art] Populate DV Done
25,818,042 UART: [fht] FMC Alias Private Key: 7
25,819,689 UART: [art] Derive CDI
25,820,506 UART: [art] Store in in slot 0x4
25,880,432 UART: [art] Derive Key Pair
25,881,429 UART: [art] Store priv key in slot 0x5
29,174,576 UART: [art] Derive Key Pair - Done
29,187,740 UART: [art] Signing Cert with AUTHO
29,189,068 UART: RITY.KEYID = 7
31,476,285 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,794 UART: [art] PUB.X = 4CE6DC8A81DB42570A766A359AD51A717BDC13FAB80681DCA96CC86F9CE8438866609DF160D6697E88F1A61D572ADA74
31,485,122 UART: [art] PUB.Y = A034B306274BF7044D11C22567118EBE76836B0190CB0506132F11817581B35FDA448F491E805C08D1517D1E4670D215
31,492,231 UART: [art] SIG.R = FE32BB205FABF4C146A4A2BA03AB52262A1E687C3CF3C2AEFC752D3538912244A25AB2B159C33500BFA67401CDB69407
31,499,631 UART: [art] SIG.S = 0392AECA2CC5D4EE9EEA189A6B0545DDC110F28BE7F5294B3B09E0EAAC22EFD1F07AD327CE7A41D94D0AFD55CE3CDD75
32,804,285 UART: Caliptra RT
32,805,005 UART: [state] CFI Enabled
32,966,715 UART: [rt] RT listening for mailbox commands...
33,000,506 UART: [rt]cmd =0x49444543, len=327
33,009,716 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,784,853 ready_for_fw is high
3,785,420 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,833,690 >>> mbox cmd response: success
18,295,436 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,521,908 UART:
23,522,319 UART: Running Caliptra FMC ...
23,523,428 UART:
23,523,583 UART: [state] CFI Enabled
23,593,414 UART: [fht] FMC Alias Private Key: 7
25,931,765 UART: [art] Extend RT PCRs Done
25,932,990 UART: [art] Lock RT PCRs Done
25,934,740 UART: [art] Populate DV Done
25,940,195 UART: [fht] FMC Alias Private Key: 7
25,941,692 UART: [art] Derive CDI
25,942,459 UART: [art] Store in in slot 0x4
26,002,024 UART: [art] Derive Key Pair
26,003,070 UART: [art] Store priv key in slot 0x5
29,295,498 UART: [art] Derive Key Pair - Done
29,308,287 UART: [art] Signing Cert with AUTHO
29,309,592 UART: RITY.KEYID = 7
31,597,597 UART: [art] Erasing AUTHORITY.KEYID = 7
31,599,107 UART: [art] PUB.X = 3BD06660A14E1EC17AE45EDBDA70B8626679233F67671E2FED1FF9A65A56A8F5DA7EA8CE880323532A3E38CDACA84715
31,606,379 UART: [art] PUB.Y = 316BFE2A07E770C40186DBC597AF5837C9D2503795C531159A3EAE4AAB96BDE2EB55C9D3E44E5576C951ED836127C075
31,613,619 UART: [art] SIG.R = 4472E1419D8FE1CF61BB103EFF81FF4AED70A48F33DADC2D1A98945CB9292324051464AFF2FF8E6A998F3D5A7B7F69A2
31,621,045 UART: [art] SIG.S = 521916E1AE0A553D4514E67F7A02229117B49DC547914F265C9518B0AC467F952BA8C3ABC7CD4A51722CE9845E2A348C
32,926,188 UART: Caliptra RT
32,926,900 UART: [state] CFI Enabled
33,090,002 UART: [rt] RT listening for mailbox commands...
33,123,523 UART: [rt]cmd =0x49444543, len=327
33,132,498 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,427 UART:
192,790 UART: Running Caliptra ROM ...
193,922 UART:
603,525 UART: [state] CFI Enabled
617,896 UART: [state] LifecycleState = Unprovisioned
619,843 UART: [state] DebugLocked = No
621,729 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,517 UART: [kat] SHA2-256
796,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,829 UART: [kat] ++
807,351 UART: [kat] sha1
816,827 UART: [kat] SHA2-256
819,544 UART: [kat] SHA2-384
825,381 UART: [kat] SHA2-512-ACC
827,738 UART: [kat] ECC-384
3,112,268 UART: [kat] HMAC-384Kdf
3,123,326 UART: [kat] LMS
4,313,455 UART: [kat] --
4,317,831 UART: [cold-reset] ++
4,319,761 UART: [fht] Storing FHT @ 0x50003400
4,331,599 UART: [idev] ++
4,332,232 UART: [idev] CDI.KEYID = 6
4,333,143 UART: [idev] SUBJECT.KEYID = 7
4,334,377 UART: [idev] UDS.KEYID = 0
4,335,385 ready_for_fw is high
4,335,606 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,040 UART: [idev] Erasing UDS.KEYID = 0
7,621,816 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,988 UART: [idev] --
7,648,996 UART: [ldev] ++
7,649,567 UART: [ldev] CDI.KEYID = 6
7,650,525 UART: [ldev] SUBJECT.KEYID = 5
7,651,735 UART: [ldev] AUTHORITY.KEYID = 7
7,653,015 UART: [ldev] FE.KEYID = 1
7,664,417 UART: [ldev] Erasing FE.KEYID = 1
10,952,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,755 UART: [ldev] --
13,311,091 UART: [fwproc] Waiting for Commands...
13,313,605 UART: [fwproc] Received command 0x46574c44
13,315,867 UART: [fwproc] Received Image of size 114124 bytes
17,371,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,578 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,430 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,587 >>> mbox cmd response: success
18,301,294 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,302,340 UART: [afmc] ++
18,302,864 UART: [afmc] CDI.KEYID = 6
18,303,737 UART: [afmc] SUBJECT.KEYID = 7
18,304,744 UART: [afmc] AUTHORITY.KEYID = 5
21,156,379 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,179 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,463 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,829 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,669 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,088 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,763 UART: [afmc] --
23,522,385 UART: [cold-reset] --
23,526,207 UART: [state] Locking Datavault
23,531,556 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,309 UART: [state] Locking ICCM
23,535,290 UART: [exit] Launching FMC @ 0x40000130
23,543,678 UART:
23,543,907 UART: Running Caliptra FMC ...
23,545,003 UART:
23,545,168 UART: [state] CFI Enabled
23,553,012 UART: [fht] FMC Alias Private Key: 7
25,883,951 UART: [art] Extend RT PCRs Done
25,885,172 UART: [art] Lock RT PCRs Done
25,887,002 UART: [art] Populate DV Done
25,892,578 UART: [fht] FMC Alias Private Key: 7
25,894,115 UART: [art] Derive CDI
25,894,923 UART: [art] Store in in slot 0x4
25,937,190 UART: [art] Derive Key Pair
25,938,204 UART: [art] Store priv key in slot 0x5
29,180,033 UART: [art] Derive Key Pair - Done
29,193,146 UART: [art] Signing Cert with AUTHO
29,194,479 UART: RITY.KEYID = 7
31,473,545 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,044 UART: [art] PUB.X = E1C234B01AF898591C57ED1585EF8F14B5198E0EE5D5D6F6BBD76E2069730409D58D3DF2BD6BBEA2A39C469E7FB40F94
31,482,297 UART: [art] PUB.Y = AA709B18F501F05D9EDD8236E9DEDAA1D452978D8C23DC6AE73507D595458005CAF948E0757496EBDD9EA148E7F0AE8F
31,489,518 UART: [art] SIG.R = B2114EC671791B1AEF4A0C67294CE2540053EEBCF579B6DA0FE1C62D3ACA3368CFC122EFD87135EB35555294F3CD4563
31,496,900 UART: [art] SIG.S = D95A9336919CA8545E3D9A555F0CE36EADFD22B55978975C3468FDD239E62778978B5DFA0A25C01F9E057CA47950FBC8
32,801,963 UART: Caliptra RT
32,802,682 UART: [state] CFI Enabled
32,920,355 UART: [rt] RT listening for mailbox commands...
32,954,087 UART: [rt]cmd =0x49444543, len=327
32,963,137 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
4,128,605 ready_for_fw is high
4,129,203 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,282 >>> mbox cmd response: success
18,535,409 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,714,397 UART:
23,714,834 UART: Running Caliptra FMC ...
23,715,936 UART:
23,716,091 UART: [state] CFI Enabled
23,723,922 UART: [fht] FMC Alias Private Key: 7
26,054,518 UART: [art] Extend RT PCRs Done
26,055,798 UART: [art] Lock RT PCRs Done
26,057,403 UART: [art] Populate DV Done
26,062,792 UART: [fht] FMC Alias Private Key: 7
26,064,280 UART: [art] Derive CDI
26,065,053 UART: [art] Store in in slot 0x4
26,107,806 UART: [art] Derive Key Pair
26,108,803 UART: [art] Store priv key in slot 0x5
29,351,558 UART: [art] Derive Key Pair - Done
29,364,454 UART: [art] Signing Cert with AUTHO
29,365,764 UART: RITY.KEYID = 7
31,645,314 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,839 UART: [art] PUB.X = 4F92D209C12B5FB2AEC28F8097ACB81182AA9A5A78A5AA1AAF66047439165FB0070435F450F6D32A0146F4A94E3A020B
31,654,088 UART: [art] PUB.Y = 0173B55C3FDEE4B7BDB493EFEAFAE90AA4BEBF1B6C30115472B1B47E7DD387D631E16B25ECBBB41389993AC8A499CE38
31,661,348 UART: [art] SIG.R = B1C5120E20C1A797BD897FF639056CEFF910A60A93E987614D512B83920DA1765B66BAC89542B8487F2561D04B2CE71B
31,668,734 UART: [art] SIG.S = E03D1BE13A37905A4761FC32ECC17F3E0724F6A4824C75D9538E9577D3EEA1028A11E8E3C9B67CA73C77723FB5CE14EE
32,973,248 UART: Caliptra RT
32,973,963 UART: [state] CFI Enabled
33,091,370 UART: [rt] RT listening for mailbox commands...
33,125,214 UART: [rt]cmd =0x49444543, len=327
33,134,316 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,087 UART:
192,446 UART: Running Caliptra ROM ...
193,642 UART:
193,795 UART: [state] CFI Enabled
265,297 UART: [state] LifecycleState = Unprovisioned
267,239 UART: [state] DebugLocked = No
268,850 UART: [state] WD Timer not started. Device not locked for debugging
272,247 UART: [kat] SHA2-256
451,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,948 UART: [kat] ++
463,480 UART: [kat] sha1
473,578 UART: [kat] SHA2-256
476,648 UART: [kat] SHA2-384
481,213 UART: [kat] SHA2-512-ACC
484,154 UART: [kat] ECC-384
2,946,460 UART: [kat] HMAC-384Kdf
2,970,409 UART: [kat] LMS
3,499,899 UART: [kat] --
3,505,165 UART: [cold-reset] ++
3,506,238 UART: [fht] FHT @ 0x50003400
3,517,353 UART: [idev] ++
3,517,918 UART: [idev] CDI.KEYID = 6
3,518,836 UART: [idev] SUBJECT.KEYID = 7
3,520,010 UART: [idev] UDS.KEYID = 0
3,521,082 ready_for_fw is high
3,521,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,216 UART: [idev] Erasing UDS.KEYID = 0
6,024,861 UART: [idev] Sha1 KeyId Algorithm
6,048,602 UART: [idev] --
6,053,029 UART: [ldev] ++
6,053,600 UART: [ldev] CDI.KEYID = 6
6,054,490 UART: [ldev] SUBJECT.KEYID = 5
6,055,605 UART: [ldev] AUTHORITY.KEYID = 7
6,056,944 UART: [ldev] FE.KEYID = 1
6,098,435 UART: [ldev] Erasing FE.KEYID = 1
8,598,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,325 UART: [ldev] --
10,388,167 UART: [fwproc] Wait for Commands...
10,391,232 UART: [fwproc] Recv command 0x46574c44
10,393,268 UART: [fwproc] Recv'd Img size: 114448 bytes
13,795,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,869,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,937,968 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,256,296 >>> mbox cmd response: success
14,717,725 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,718,869 UART: [afmc] ++
14,719,393 UART: [afmc] CDI.KEYID = 6
14,720,316 UART: [afmc] SUBJECT.KEYID = 7
14,721,340 UART: [afmc] AUTHORITY.KEYID = 5
16,807,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,969 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,812 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,650 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,379 UART: [afmc] --
18,625,042 UART: [cold-reset] --
18,628,156 UART: [state] Locking Datavault
18,634,697 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,394 UART: [state] Locking ICCM
18,637,465 UART: [exit] Launching FMC @ 0x40000130
18,645,912 UART:
18,646,147 UART: Running Caliptra FMC ...
18,647,244 UART:
18,647,408 UART: [state] CFI Enabled
18,706,016 UART: [fht] FMC Alias Private Key: 7
20,470,079 UART: [art] Extend RT PCRs Done
20,471,310 UART: [art] Lock RT PCRs Done
20,472,830 UART: [art] Populate DV Done
20,478,240 UART: [fht] FMC Alias Private Key: 7
20,479,902 UART: [art] Derive CDI
20,480,720 UART: [art] Store in in slot 0x4
20,537,783 UART: [art] Derive Key Pair
20,538,983 UART: [art] Store priv key in slot 0x5
23,002,078 UART: [art] Derive Key Pair - Done
23,015,305 UART: [art] Signing Cert with AUTHO
23,016,610 UART: RITY.KEYID = 7
24,727,377 UART: [art] Erasing AUTHORITY.KEYID = 7
24,728,891 UART: [art] PUB.X = E88BB0AC9D4F76BDADA78800076D9E49A363C52EB1CF952DBDB22F2776B65FCDA30B314DFEB7F43D8033B68C424E7AC9
24,736,198 UART: [art] PUB.Y = 0B535ED3AFC1F493F65F94FDC46752A9A96569C6AFBA9419DFFAC42D159A26A5A09FE06A1D33AD4D207D08015A2DDCD6
24,743,502 UART: [art] SIG.R = 059861EF3F43FAF819ADD02FD283C48B339E881275C482B2F6BAC8A9FD60FA020999817CF5EE0CA489E2BA1CFD70F8E7
24,750,897 UART: [art] SIG.S = 0151C948835B56EBE7AE43D8922C717C7665E41C37EF253ACF582CABA9102D9BF0216F5E0BA6324A893F062E437FA31B
25,730,122 UART: Caliptra RT
25,730,836 UART: [state] CFI Enabled
25,896,318 UART: [rt] RT listening for mailbox commands...
25,930,176 UART: [rt]cmd =0x49444543, len=327
25,939,222 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,385,038 ready_for_fw is high
3,385,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,063,598 >>> mbox cmd response: success
14,524,784 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,348,290 UART:
18,348,686 UART: Running Caliptra FMC ...
18,349,792 UART:
18,349,951 UART: [state] CFI Enabled
18,414,234 UART: [fht] FMC Alias Private Key: 7
20,178,054 UART: [art] Extend RT PCRs Done
20,179,276 UART: [art] Lock RT PCRs Done
20,181,105 UART: [art] Populate DV Done
20,186,601 UART: [fht] FMC Alias Private Key: 7
20,188,305 UART: [art] Derive CDI
20,189,046 UART: [art] Store in in slot 0x4
20,246,878 UART: [art] Derive Key Pair
20,247,938 UART: [art] Store priv key in slot 0x5
22,711,180 UART: [art] Derive Key Pair - Done
22,724,084 UART: [art] Signing Cert with AUTHO
22,725,436 UART: RITY.KEYID = 7
24,436,860 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,352 UART: [art] PUB.X = 9196E0AD253D302588F49C79216D85F52EAEF1C45DEDAACBF4E395DC8C305F2D784141CF333BD13CE78638A2BC38F16F
24,445,600 UART: [art] PUB.Y = 9DDF5162B519DCB26547CAD510CC14CB5D5004D8D953B57566990D6838ABDB2F3FA3BD52F3EF83B6771894E6C87E8623
24,452,908 UART: [art] SIG.R = 3954A2AAA32FCAD3D21B3F92E93BEEA55B295408A0864C1817A65CEF230A7B9B2AEBBFB44B466DE77FBD7A9372B1E0E7
24,460,292 UART: [art] SIG.S = 16C24C92E2095D47FAE77BAFF5F0E9ABD8ECDD12F03F4A98BB4EE0C70B78A7FA776B2F441DB79F6326F5BA8C53B6FC83
25,439,731 UART: Caliptra RT
25,440,435 UART: [state] CFI Enabled
25,605,917 UART: [rt] RT listening for mailbox commands...
25,639,381 UART: [rt]cmd =0x49444543, len=327
25,648,486 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
192,525 UART:
192,885 UART: Running Caliptra ROM ...
193,977 UART:
603,649 UART: [state] CFI Enabled
618,255 UART: [state] LifecycleState = Unprovisioned
620,018 UART: [state] DebugLocked = No
621,308 UART: [state] WD Timer not started. Device not locked for debugging
624,515 UART: [kat] SHA2-256
803,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,211 UART: [kat] ++
815,655 UART: [kat] sha1
826,542 UART: [kat] SHA2-256
829,556 UART: [kat] SHA2-384
837,034 UART: [kat] SHA2-512-ACC
839,969 UART: [kat] ECC-384
3,285,319 UART: [kat] HMAC-384Kdf
3,298,196 UART: [kat] LMS
3,827,627 UART: [kat] --
3,830,868 UART: [cold-reset] ++
3,831,745 UART: [fht] FHT @ 0x50003400
3,841,935 UART: [idev] ++
3,842,490 UART: [idev] CDI.KEYID = 6
3,843,470 UART: [idev] SUBJECT.KEYID = 7
3,844,636 UART: [idev] UDS.KEYID = 0
3,845,553 ready_for_fw is high
3,845,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,474 UART: [idev] Erasing UDS.KEYID = 0
6,315,212 UART: [idev] Sha1 KeyId Algorithm
6,338,118 UART: [idev] --
6,342,537 UART: [ldev] ++
6,343,099 UART: [ldev] CDI.KEYID = 6
6,344,062 UART: [ldev] SUBJECT.KEYID = 5
6,345,214 UART: [ldev] AUTHORITY.KEYID = 7
6,346,490 UART: [ldev] FE.KEYID = 1
6,356,911 UART: [ldev] Erasing FE.KEYID = 1
8,833,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,556 UART: [ldev] --
10,622,944 UART: [fwproc] Wait for Commands...
10,626,223 UART: [fwproc] Recv command 0x46574c44
10,628,319 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,487,794 >>> mbox cmd response: success
14,949,977 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,951,022 UART: [afmc] ++
14,951,542 UART: [afmc] CDI.KEYID = 6
14,952,510 UART: [afmc] SUBJECT.KEYID = 7
14,953,616 UART: [afmc] AUTHORITY.KEYID = 5
16,998,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,004 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,863 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,160 UART: [afmc] --
18,792,735 UART: [cold-reset] --
18,796,614 UART: [state] Locking Datavault
18,801,317 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,951 UART: [state] Locking ICCM
18,804,314 UART: [exit] Launching FMC @ 0x40000130
18,812,699 UART:
18,812,931 UART: Running Caliptra FMC ...
18,814,025 UART:
18,814,176 UART: [state] CFI Enabled
18,822,024 UART: [fht] FMC Alias Private Key: 7
20,578,677 UART: [art] Extend RT PCRs Done
20,579,888 UART: [art] Lock RT PCRs Done
20,581,349 UART: [art] Populate DV Done
20,586,914 UART: [fht] FMC Alias Private Key: 7
20,588,509 UART: [art] Derive CDI
20,589,319 UART: [art] Store in in slot 0x4
20,632,073 UART: [art] Derive Key Pair
20,633,129 UART: [art] Store priv key in slot 0x5
23,059,638 UART: [art] Derive Key Pair - Done
23,072,422 UART: [art] Signing Cert with AUTHO
23,073,719 UART: RITY.KEYID = 7
24,779,265 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,766 UART: [art] PUB.X = 9733CE2F878539AFAC22EA10A27C576619BBE7471AACA18474A20553CA78F7570DEF5991AEDC8789A924653828A3256F
24,788,030 UART: [art] PUB.Y = 22CBB36A444B3954108C52DC8179C70C52E79E939AB131A5C75E1601DD2BCC3542E210B2034EF4FC9BB228149E1650AF
24,795,270 UART: [art] SIG.R = 44A0F5458DEA51A94E251F1F5918D9C06F7CB3A61814E96101E7BDB1977D7C024C664C6E20AF865DD8CE08563ED50FB9
24,802,665 UART: [art] SIG.S = 8822F104DD0547E8FF7A8757CC23D4C830E5635A47795E19FD203F0730DA06F62392B90468EA9827EB1CDFB8E346901D
25,781,858 UART: Caliptra RT
25,782,541 UART: [state] CFI Enabled
25,899,706 UART: [rt] RT listening for mailbox commands...
25,933,107 UART: [rt]cmd =0x49444543, len=327
25,942,028 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,700,494 ready_for_fw is high
3,701,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,284,119 >>> mbox cmd response: success
14,746,971 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,539,447 UART:
18,539,874 UART: Running Caliptra FMC ...
18,540,964 UART:
18,541,110 UART: [state] CFI Enabled
18,549,045 UART: [fht] FMC Alias Private Key: 7
20,306,396 UART: [art] Extend RT PCRs Done
20,307,616 UART: [art] Lock RT PCRs Done
20,309,478 UART: [art] Populate DV Done
20,314,867 UART: [fht] FMC Alias Private Key: 7
20,316,422 UART: [art] Derive CDI
20,317,233 UART: [art] Store in in slot 0x4
20,359,663 UART: [art] Derive Key Pair
20,360,657 UART: [art] Store priv key in slot 0x5
22,786,907 UART: [art] Derive Key Pair - Done
22,800,177 UART: [art] Signing Cert with AUTHO
22,801,470 UART: RITY.KEYID = 7
24,507,166 UART: [art] Erasing AUTHORITY.KEYID = 7
24,508,672 UART: [art] PUB.X = 6E24FF852FFA77558C302859A34B59C641FB6146649B793A1660E8773E9E9BBEBB97BFAC158A2C415DB66858DC7F3D7D
24,515,920 UART: [art] PUB.Y = C6D88921D768742E707ED2F19604AE73773E6EA351E7A49DEA749154A455967D771AE4EBB21DDE8F339021CAAB2AD52E
24,523,184 UART: [art] SIG.R = 7104CE558E2ADAD7E7F65EAD5FAA9934859B21A99068D6DC0370140F74064108526E2225FD0ABD3141EDDF2707A23239
24,530,572 UART: [art] SIG.S = AFAE84C27F44A99AFB82E2F00D9F8483B6FCAD1E59DC6BD74B5AAFCD29418891663860C005B6F24C2ECDA1EF1538B781
25,509,907 UART: Caliptra RT
25,510,623 UART: [state] CFI Enabled
25,627,635 UART: [rt] RT listening for mailbox commands...
25,661,314 UART: [rt]cmd =0x49444543, len=327
25,670,267 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,438,328 ready_for_fw is high
3,438,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,732,186 >>> mbox cmd response: success
15,193,686 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,048,050 UART:
19,048,453 UART: Running Caliptra FMC ...
19,049,643 UART:
19,049,820 UART: [state] CFI Enabled
19,116,724 UART: [fht] FMC Alias Private Key: 7
20,881,420 UART: [art] Extend RT PCRs Done
20,882,628 UART: [art] Lock RT PCRs Done
20,884,385 UART: [art] Populate DV Done
20,889,820 UART: [fht] FMC Alias Private Key: 7
20,891,491 UART: [art] Derive CDI
20,892,337 UART: [art] Store in in slot 0x4
20,949,086 UART: [art] Derive Key Pair
20,950,093 UART: [art] Store priv key in slot 0x5
23,412,834 UART: [art] Derive Key Pair - Done
23,425,942 UART: [art] Signing Cert with AUTHO
23,427,244 UART: RITY.KEYID = 7
25,138,017 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,527 UART: [art] PUB.X = CBCADD65683B098F2CB26F77B99DEBE736C7A73976DA4409DF7E984686A7D3240C30F4EF815C1C03058339F42F3C640B
25,146,824 UART: [art] PUB.Y = A7B6EE8C4BBD8DECF7F3B719E869BD0CB3FF6EB8645EFA4A7C1562C358EC707D03168B09CF5C96F55938639A84F78F65
25,154,101 UART: [art] SIG.R = BFE6B03C7BF28F3EE3D86AC91A3638926411BD924C990432706872351449DBFBE031EA61BAE8410A9DED3EA79EC6A5EB
25,161,496 UART: [art] SIG.S = 8A9D6951C3A101B0D8C54FB45892B45078FF65634A6D438F5FED1D846F1B6B5C1AD7581EFA5E1A0AFC5F297E5F3C0EDF
26,140,460 UART: Caliptra RT
26,141,176 UART: [state] CFI Enabled
26,307,660 UART: [rt] RT listening for mailbox commands...
26,341,392 UART: [rt]cmd =0x49444543, len=327
26,350,364 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
3,749,878 ready_for_fw is high
3,750,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,958,428 >>> mbox cmd response: success
15,424,134 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,212,996 UART:
19,213,390 UART: Running Caliptra FMC ...
19,214,734 UART:
19,214,915 UART: [state] CFI Enabled
19,222,795 UART: [fht] FMC Alias Private Key: 7
20,979,769 UART: [art] Extend RT PCRs Done
20,980,996 UART: [art] Lock RT PCRs Done
20,982,510 UART: [art] Populate DV Done
20,988,110 UART: [fht] FMC Alias Private Key: 7
20,989,592 UART: [art] Derive CDI
20,990,321 UART: [art] Store in in slot 0x4
21,033,335 UART: [art] Derive Key Pair
21,034,324 UART: [art] Store priv key in slot 0x5
23,461,052 UART: [art] Derive Key Pair - Done
23,473,729 UART: [art] Signing Cert with AUTHO
23,475,026 UART: RITY.KEYID = 7
25,180,512 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,004 UART: [art] PUB.X = 4EADC574485C888C308A0C77515CD51833C00F9E6E3E4D3EEC6B506A1EC928437179D361667B95AD499FF10D7D7CDE57
25,189,306 UART: [art] PUB.Y = E945EDA656FD7FD3AE56F7267049FC6854007FD2375EEC7D265DD2B4B9BC5FFB81955953DD14D308C23378B7B0327623
25,196,513 UART: [art] SIG.R = F73363A70E864D73E9049090E76C3E36FF5FE22B5EF81759DC63DC7A07CC61D3A1079DC8EC3DF7FAB3C056B1987E8844
25,203,960 UART: [art] SIG.S = 7868FD286915C745A85B2CD77B41A6A902E604F328A59F6D89198861C3215C2A19B3438967780D1CCCFBCDBB1961DEAE
26,183,287 UART: Caliptra RT
26,183,999 UART: [state] CFI Enabled
26,300,349 UART: [rt] RT listening for mailbox commands...
26,333,813 UART: [rt]cmd =0x49444543, len=327
26,342,765 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,388 UART: [state] LifecycleState = Unprovisioned
85,043 UART: [state] DebugLocked = No
85,657 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,231 UART: [kat] SHA2-256
881,162 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,277 UART: [kat] ++
885,429 UART: [kat] sha1
889,761 UART: [kat] SHA2-256
891,699 UART: [kat] SHA2-384
894,400 UART: [kat] SHA2-512-ACC
896,301 UART: [kat] ECC-384
901,860 UART: [kat] HMAC-384Kdf
906,566 UART: [kat] LMS
1,474,762 UART: [kat] --
1,475,983 UART: [cold-reset] ++
1,476,539 UART: [fht] Storing FHT @ 0x50003400
1,479,234 UART: [idev] ++
1,479,402 UART: [idev] CDI.KEYID = 6
1,479,762 UART: [idev] SUBJECT.KEYID = 7
1,480,186 UART: [idev] UDS.KEYID = 0
1,480,531 ready_for_fw is high
1,480,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,052 UART: [idev] Erasing UDS.KEYID = 0
1,504,772 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,506 UART: [idev] --
1,514,411 UART: [ldev] ++
1,514,579 UART: [ldev] CDI.KEYID = 6
1,514,942 UART: [ldev] SUBJECT.KEYID = 5
1,515,368 UART: [ldev] AUTHORITY.KEYID = 7
1,515,831 UART: [ldev] FE.KEYID = 1
1,520,995 UART: [ldev] Erasing FE.KEYID = 1
1,546,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,582 UART: [ldev] --
1,585,905 UART: [fwproc] Waiting for Commands...
1,586,680 UART: [fwproc] Received command 0x46574c44
1,587,471 UART: [fwproc] Received Image of size 114448 bytes
2,887,740 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,068 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,420 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,479 >>> mbox cmd response: success
3,080,479 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,081,551 UART: [afmc] ++
3,081,719 UART: [afmc] CDI.KEYID = 6
3,082,081 UART: [afmc] SUBJECT.KEYID = 7
3,082,506 UART: [afmc] AUTHORITY.KEYID = 5
3,117,617 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,809 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,317 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,202 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,892 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,679 UART: [afmc] --
3,160,627 UART: [cold-reset] --
3,161,647 UART: [state] Locking Datavault
3,162,760 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,364 UART: [state] Locking ICCM
3,163,820 UART: [exit] Launching FMC @ 0x40000130
3,169,149 UART:
3,169,165 UART: Running Caliptra FMC ...
3,169,573 UART:
3,169,627 UART: [state] CFI Enabled
3,179,978 UART: [fht] FMC Alias Private Key: 7
3,287,703 UART: [art] Extend RT PCRs Done
3,288,131 UART: [art] Lock RT PCRs Done
3,289,649 UART: [art] Populate DV Done
3,297,938 UART: [fht] FMC Alias Private Key: 7
3,298,956 UART: [art] Derive CDI
3,299,236 UART: [art] Store in in slot 0x4
3,384,653 UART: [art] Derive Key Pair
3,385,013 UART: [art] Store priv key in slot 0x5
3,398,363 UART: [art] Derive Key Pair - Done
3,413,038 UART: [art] Signing Cert with AUTHO
3,413,518 UART: RITY.KEYID = 7
3,428,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,339 UART: [art] PUB.X = 8FBA4EC24298B652421CA0E05BF5A9E99961952F17F7C915A817FDDDC439846006A2B0E1679810A95B915F727B06022E
3,436,098 UART: [art] PUB.Y = D3831CB20642270F8F95E84BF94D150CE5340C16030B2350B1253F2CDB741C29E92D8F9D69485B65BC8374FCB91DD067
3,443,030 UART: [art] SIG.R = CFE5D4826AD29056E0D719ABA2E26643D16317C802E4E3B0350D5DAEB575A7DF8067E8EA5AC00F1C7EF76F729D14B696
3,449,803 UART: [art] SIG.S = AFEB06F93386340EC1AA693EB2618EC782463ECD9E02798DA759220E1B65F499B0D9CD425C816E42EB32FC6524E306BA
3,473,907 UART: Caliptra RT
3,474,160 UART: [state] CFI Enabled
3,581,798 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,489 UART: [rt]cmd =0x49444543, len=327
3,622,960 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,549 ready_for_fw is high
1,362,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,005 >>> mbox cmd response: success
2,930,005 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,990,991 UART:
2,991,007 UART: Running Caliptra FMC ...
2,991,415 UART:
2,991,469 UART: [state] CFI Enabled
3,002,026 UART: [fht] FMC Alias Private Key: 7
3,109,769 UART: [art] Extend RT PCRs Done
3,110,197 UART: [art] Lock RT PCRs Done
3,111,409 UART: [art] Populate DV Done
3,119,630 UART: [fht] FMC Alias Private Key: 7
3,120,578 UART: [art] Derive CDI
3,120,858 UART: [art] Store in in slot 0x4
3,206,747 UART: [art] Derive Key Pair
3,207,107 UART: [art] Store priv key in slot 0x5
3,219,997 UART: [art] Derive Key Pair - Done
3,235,301 UART: [art] Signing Cert with AUTHO
3,235,781 UART: RITY.KEYID = 7
3,250,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,746 UART: [art] PUB.X = 5E0A4CDF30A9189F9C334F10596C00315D93D59F37DB66CABF06E0A7BD982DBEECFBEA8AE645EC641A87FABAE8A62351
3,258,512 UART: [art] PUB.Y = 5A9C2F833FE22C858C5899451CEADC0B014F39C6A5B876418FB8F5FFEBA7B74E6E9943FDF3FAAD766C77378CE5A99D3D
3,265,476 UART: [art] SIG.R = 20328106E01D8B844D15760E0FD6DE49E3406100ADD2CA64EC6BC23013237450A3072DA4307BE1B3553AED3AD704DCB2
3,272,213 UART: [art] SIG.S = 3AC3B2FC9D8064AD9EC31E8BA2851774A406E430E78146F0447C7FFD7C24EC8D48B9DE156C14A569D64EDCDEBA635522
3,295,811 UART: Caliptra RT
3,296,064 UART: [state] CFI Enabled
3,404,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,727 UART: [rt]cmd =0x49444543, len=327
3,445,161 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
86,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,598 UART: [kat] SHA2-256
882,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,644 UART: [kat] ++
886,796 UART: [kat] sha1
890,938 UART: [kat] SHA2-256
892,876 UART: [kat] SHA2-384
895,787 UART: [kat] SHA2-512-ACC
897,688 UART: [kat] ECC-384
903,653 UART: [kat] HMAC-384Kdf
908,389 UART: [kat] LMS
1,476,585 UART: [kat] --
1,477,592 UART: [cold-reset] ++
1,478,034 UART: [fht] Storing FHT @ 0x50003400
1,480,805 UART: [idev] ++
1,480,973 UART: [idev] CDI.KEYID = 6
1,481,333 UART: [idev] SUBJECT.KEYID = 7
1,481,757 UART: [idev] UDS.KEYID = 0
1,482,102 ready_for_fw is high
1,482,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,165 UART: [idev] Erasing UDS.KEYID = 0
1,507,045 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,649 UART: [idev] --
1,516,836 UART: [ldev] ++
1,517,004 UART: [ldev] CDI.KEYID = 6
1,517,367 UART: [ldev] SUBJECT.KEYID = 5
1,517,793 UART: [ldev] AUTHORITY.KEYID = 7
1,518,256 UART: [ldev] FE.KEYID = 1
1,523,442 UART: [ldev] Erasing FE.KEYID = 1
1,548,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,699 UART: [ldev] --
1,588,182 UART: [fwproc] Waiting for Commands...
1,588,969 UART: [fwproc] Received command 0x46574c44
1,589,760 UART: [fwproc] Received Image of size 114448 bytes
2,888,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,773 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,125 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,120 >>> mbox cmd response: success
3,081,120 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,082,160 UART: [afmc] ++
3,082,328 UART: [afmc] CDI.KEYID = 6
3,082,690 UART: [afmc] SUBJECT.KEYID = 7
3,083,115 UART: [afmc] AUTHORITY.KEYID = 5
3,118,322 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,336 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,116 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,844 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,729 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,419 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,524 UART: [afmc] --
3,161,404 UART: [cold-reset] --
3,162,372 UART: [state] Locking Datavault
3,163,411 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,015 UART: [state] Locking ICCM
3,164,647 UART: [exit] Launching FMC @ 0x40000130
3,169,976 UART:
3,169,992 UART: Running Caliptra FMC ...
3,170,400 UART:
3,170,543 UART: [state] CFI Enabled
3,180,914 UART: [fht] FMC Alias Private Key: 7
3,288,947 UART: [art] Extend RT PCRs Done
3,289,375 UART: [art] Lock RT PCRs Done
3,290,881 UART: [art] Populate DV Done
3,298,936 UART: [fht] FMC Alias Private Key: 7
3,300,010 UART: [art] Derive CDI
3,300,290 UART: [art] Store in in slot 0x4
3,385,491 UART: [art] Derive Key Pair
3,385,851 UART: [art] Store priv key in slot 0x5
3,399,159 UART: [art] Derive Key Pair - Done
3,413,898 UART: [art] Signing Cert with AUTHO
3,414,378 UART: RITY.KEYID = 7
3,429,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,169 UART: [art] PUB.X = 466BF5DC2E65F90EA0886BF44F4500C26A4E9F67CB068AAC5AB542E56CDDF0B15E92476DE9906409D8D23DFCC851EE70
3,436,924 UART: [art] PUB.Y = 10A22EBBC0EB034217D29C7F38F8C3502E55A853228FFBD03D2D04C95300A7BAFF348C555B2DACC356331AA097A34D14
3,443,856 UART: [art] SIG.R = A79E16F830557599F15C11A4708787243D8ECE50C226A801B7B19752D2DC6D7C8457A2630AFB8D6EDDAE4841877D9C6F
3,450,622 UART: [art] SIG.S = 23F8B0D859AACF827BBB103F4DEBED74C78C12859496658431A760D7EFEF957E2386B84E8313C5D7C87F2C75D10DAF43
3,474,532 UART: Caliptra RT
3,474,877 UART: [state] CFI Enabled
3,582,622 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,179 UART: [rt]cmd =0x49444543, len=327
3,623,542 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,298 ready_for_fw is high
1,363,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,842 >>> mbox cmd response: success
2,929,842 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,991,516 UART:
2,991,532 UART: Running Caliptra FMC ...
2,991,940 UART:
2,992,083 UART: [state] CFI Enabled
3,003,174 UART: [fht] FMC Alias Private Key: 7
3,110,499 UART: [art] Extend RT PCRs Done
3,110,927 UART: [art] Lock RT PCRs Done
3,112,541 UART: [art] Populate DV Done
3,120,580 UART: [fht] FMC Alias Private Key: 7
3,121,530 UART: [art] Derive CDI
3,121,810 UART: [art] Store in in slot 0x4
3,207,375 UART: [art] Derive Key Pair
3,207,735 UART: [art] Store priv key in slot 0x5
3,220,923 UART: [art] Derive Key Pair - Done
3,235,671 UART: [art] Signing Cert with AUTHO
3,236,151 UART: RITY.KEYID = 7
3,251,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,870 UART: [art] PUB.X = BF7EE0B3889AC409A44625B6A006A69498CAEBE78F0614E6167E6316DEAC809A9D739870D16BC7A27CFC2CA936FCFCB3
3,258,647 UART: [art] PUB.Y = 4DF4186172B73DE32550A835922B3668C94C0C5870F35956278E391106BD70ECE945910AE1BA2296BEE4BB776C458C07
3,265,579 UART: [art] SIG.R = CAAF933E9915C112D789B80FC3F899D7A7866D9122B860EF711DD80749687E7B624171BBD1D52B741A0CE84307B2868C
3,272,337 UART: [art] SIG.S = AAA09BD8729CED1974D68A8E775C351916DF2A174FF8960229A90BAEA29F6FDC154403757C76D417D89D4509B78A0E9B
3,296,057 UART: Caliptra RT
3,296,402 UART: [state] CFI Enabled
3,404,356 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,269 UART: [rt]cmd =0x49444543, len=327
3,445,920 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
893,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,171 UART: [kat] ++
897,323 UART: [kat] sha1
901,649 UART: [kat] SHA2-256
903,589 UART: [kat] SHA2-384
906,530 UART: [kat] SHA2-512-ACC
908,431 UART: [kat] ECC-384
918,048 UART: [kat] HMAC-384Kdf
922,618 UART: [kat] LMS
1,170,946 UART: [kat] --
1,171,761 UART: [cold-reset] ++
1,172,099 UART: [fht] FHT @ 0x50003400
1,174,836 UART: [idev] ++
1,175,004 UART: [idev] CDI.KEYID = 6
1,175,364 UART: [idev] SUBJECT.KEYID = 7
1,175,788 UART: [idev] UDS.KEYID = 0
1,176,133 ready_for_fw is high
1,176,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,564 UART: [idev] Erasing UDS.KEYID = 0
1,200,115 UART: [idev] Sha1 KeyId Algorithm
1,208,683 UART: [idev] --
1,209,911 UART: [ldev] ++
1,210,079 UART: [ldev] CDI.KEYID = 6
1,210,442 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,665 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,736 UART: [fwproc] Recv command 0x46574c44
1,283,464 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,954 >>> mbox cmd response: success
2,775,954 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,777,020 UART: [afmc] ++
2,777,188 UART: [afmc] CDI.KEYID = 6
2,777,550 UART: [afmc] SUBJECT.KEYID = 7
2,777,975 UART: [afmc] AUTHORITY.KEYID = 5
2,812,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,491 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,141 UART: [afmc] --
2,856,091 UART: [cold-reset] --
2,856,725 UART: [state] Locking Datavault
2,858,108 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,712 UART: [state] Locking ICCM
2,859,134 UART: [exit] Launching FMC @ 0x40000130
2,864,463 UART:
2,864,479 UART: Running Caliptra FMC ...
2,864,887 UART:
2,864,941 UART: [state] CFI Enabled
2,875,452 UART: [fht] FMC Alias Private Key: 7
2,983,449 UART: [art] Extend RT PCRs Done
2,983,877 UART: [art] Lock RT PCRs Done
2,985,173 UART: [art] Populate DV Done
2,993,230 UART: [fht] FMC Alias Private Key: 7
2,994,270 UART: [art] Derive CDI
2,994,550 UART: [art] Store in in slot 0x4
3,080,191 UART: [art] Derive Key Pair
3,080,551 UART: [art] Store priv key in slot 0x5
3,093,495 UART: [art] Derive Key Pair - Done
3,108,653 UART: [art] Signing Cert with AUTHO
3,109,133 UART: RITY.KEYID = 7
3,124,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,190 UART: [art] PUB.X = 9675EE6D3F8F0E3E607D772E6A8B4266F5DA325813616342192992004A6205C9634270AB0DEC394C41F13A016F243578
3,131,914 UART: [art] PUB.Y = C914573F764A802534BE6A777EA68C2ACF805279062B19E702BB33B6B7A3BF313894A20EA956701EAE90B43DBFE1D20F
3,138,858 UART: [art] SIG.R = B4B9B116A27487613CC4653EC8F02EF471B3C613CAA673BECE8993A5286D22798066167EB26A3A5C0F726A398FD0E645
3,145,627 UART: [art] SIG.S = 5C052663DB04EBA362D4FDF0D26C5C58EE920568A3EB51A9C33B48B826CE4FA77E12E870C576A9CC0C8D7481C9D123DC
3,169,264 UART: Caliptra RT
3,169,517 UART: [state] CFI Enabled
3,278,052 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,751 UART: [rt]cmd =0x49444543, len=327
3,319,163 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,109 ready_for_fw is high
1,060,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,857 >>> mbox cmd response: success
2,627,857 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,690,629 UART:
2,690,645 UART: Running Caliptra FMC ...
2,691,053 UART:
2,691,107 UART: [state] CFI Enabled
2,701,260 UART: [fht] FMC Alias Private Key: 7
2,809,401 UART: [art] Extend RT PCRs Done
2,809,829 UART: [art] Lock RT PCRs Done
2,811,769 UART: [art] Populate DV Done
2,820,096 UART: [fht] FMC Alias Private Key: 7
2,821,086 UART: [art] Derive CDI
2,821,366 UART: [art] Store in in slot 0x4
2,907,021 UART: [art] Derive Key Pair
2,907,381 UART: [art] Store priv key in slot 0x5
2,920,495 UART: [art] Derive Key Pair - Done
2,935,088 UART: [art] Signing Cert with AUTHO
2,935,568 UART: RITY.KEYID = 7
2,950,292 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,057 UART: [art] PUB.X = BC9BE49150840EBC0064783D17D81E0BB7F5CDEDC629A31595ABAF75C33804C569E28CFFAFAE5B25578ACD7B852B50D5
2,957,814 UART: [art] PUB.Y = 304E75AC2E05F179B92DD0D9A7C807B6AF4921745D2D6EC203EC273A6C96A8BBC80B3F2CCD6EE65A79F36AD2E18F5409
2,964,765 UART: [art] SIG.R = 26FA37E8326E4ACE5DBC679F53A10C07204B006C200F23FC940BCFE6B2A2A8694BFA0A6F06FFA108ABA06D641A6A94CA
2,971,512 UART: [art] SIG.S = 8763704C34F53EDF5BA49A10C6236434CBC707AE6BEF12B28568F26BC9A827214AF37D7CB388E4BBB830526F4EE96750
2,995,218 UART: Caliptra RT
2,995,471 UART: [state] CFI Enabled
3,103,596 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,891 UART: [rt]cmd =0x49444543, len=327
3,144,544 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,943 UART: [state] LifecycleState = Unprovisioned
85,598 UART: [state] DebugLocked = No
86,268 UART: [state] WD Timer not started. Device not locked for debugging
87,531 UART: [kat] SHA2-256
893,181 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,306 UART: [kat] ++
897,458 UART: [kat] sha1
901,892 UART: [kat] SHA2-256
903,832 UART: [kat] SHA2-384
906,589 UART: [kat] SHA2-512-ACC
908,490 UART: [kat] ECC-384
918,647 UART: [kat] HMAC-384Kdf
923,273 UART: [kat] LMS
1,171,601 UART: [kat] --
1,172,418 UART: [cold-reset] ++
1,172,896 UART: [fht] FHT @ 0x50003400
1,175,507 UART: [idev] ++
1,175,675 UART: [idev] CDI.KEYID = 6
1,176,035 UART: [idev] SUBJECT.KEYID = 7
1,176,459 UART: [idev] UDS.KEYID = 0
1,176,804 ready_for_fw is high
1,176,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,079 UART: [idev] Erasing UDS.KEYID = 0
1,201,150 UART: [idev] Sha1 KeyId Algorithm
1,209,404 UART: [idev] --
1,210,418 UART: [ldev] ++
1,210,586 UART: [ldev] CDI.KEYID = 6
1,210,949 UART: [ldev] SUBJECT.KEYID = 5
1,211,375 UART: [ldev] AUTHORITY.KEYID = 7
1,211,838 UART: [ldev] FE.KEYID = 1
1,217,068 UART: [ldev] Erasing FE.KEYID = 1
1,244,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,598 UART: [ldev] --
1,284,039 UART: [fwproc] Wait for Commands...
1,284,759 UART: [fwproc] Recv command 0x46574c44
1,285,487 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,760 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,123 >>> mbox cmd response: success
2,778,123 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,779,385 UART: [afmc] ++
2,779,553 UART: [afmc] CDI.KEYID = 6
2,779,915 UART: [afmc] SUBJECT.KEYID = 7
2,780,340 UART: [afmc] AUTHORITY.KEYID = 5
2,816,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,402 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,130 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,015 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,734 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,732 UART: [afmc] --
2,859,742 UART: [cold-reset] --
2,860,632 UART: [state] Locking Datavault
2,861,821 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,425 UART: [state] Locking ICCM
2,862,915 UART: [exit] Launching FMC @ 0x40000130
2,868,244 UART:
2,868,260 UART: Running Caliptra FMC ...
2,868,668 UART:
2,868,811 UART: [state] CFI Enabled
2,879,546 UART: [fht] FMC Alias Private Key: 7
2,987,365 UART: [art] Extend RT PCRs Done
2,987,793 UART: [art] Lock RT PCRs Done
2,989,367 UART: [art] Populate DV Done
2,997,740 UART: [fht] FMC Alias Private Key: 7
2,998,780 UART: [art] Derive CDI
2,999,060 UART: [art] Store in in slot 0x4
3,084,681 UART: [art] Derive Key Pair
3,085,041 UART: [art] Store priv key in slot 0x5
3,099,027 UART: [art] Derive Key Pair - Done
3,113,995 UART: [art] Signing Cert with AUTHO
3,114,475 UART: RITY.KEYID = 7
3,129,417 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,182 UART: [art] PUB.X = 3DC3CB407D9D6FF11CF0E9D9FE13ABE169D06FC1B6AC61567A87CFFEAF8E0CD866F5FB01EA83A7E3047570FE9668730A
3,136,964 UART: [art] PUB.Y = D795C32FD2B4466EBE63D1E5FCCBB10F3DCEAF9693EFCB4E09990E04C15CDCDE7FC6B7092ACC1C733C4FCE779A003A2C
3,143,909 UART: [art] SIG.R = 4DFB72A1931A348B970B9E20B942231282A58716AEDA058ED31AEBB9BEB635FB4015D8FA547B3A9BBBFCBFF1198461C9
3,150,689 UART: [art] SIG.S = 16E9A56686C05660ACDE88DF8CD01EC4C54478BA01C345CFEDC89A4FEC581B5771C23E69202C1DBEF7E1144386EA7C9B
3,174,861 UART: Caliptra RT
3,175,206 UART: [state] CFI Enabled
3,281,655 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,092 UART: [rt]cmd =0x49444543, len=327
3,322,648 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,526 ready_for_fw is high
1,060,526 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,890 >>> mbox cmd response: success
2,628,890 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,690,976 UART:
2,690,992 UART: Running Caliptra FMC ...
2,691,400 UART:
2,691,543 UART: [state] CFI Enabled
2,702,182 UART: [fht] FMC Alias Private Key: 7
2,810,171 UART: [art] Extend RT PCRs Done
2,810,599 UART: [art] Lock RT PCRs Done
2,812,281 UART: [art] Populate DV Done
2,820,556 UART: [fht] FMC Alias Private Key: 7
2,821,698 UART: [art] Derive CDI
2,821,978 UART: [art] Store in in slot 0x4
2,907,739 UART: [art] Derive Key Pair
2,908,099 UART: [art] Store priv key in slot 0x5
2,921,627 UART: [art] Derive Key Pair - Done
2,936,147 UART: [art] Signing Cert with AUTHO
2,936,627 UART: RITY.KEYID = 7
2,952,355 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,120 UART: [art] PUB.X = 707C9158787D32D5DD88A6F31399AD957BE058311913B12E7FF7A62CCEEBD0C38E0577E7AB6B93A78047189953C0CC8F
2,959,891 UART: [art] PUB.Y = BBBFE35272CE7961F46B96DF258B06C92140ECF3CD745C2B19BF6BCC5D531DDF9405F64F688E7FA40D3D4B2FF6215597
2,966,848 UART: [art] SIG.R = 194F2473694BC19374A95A1B1C39418BB086ADCB67E260BF65070CF3CCC061492FA2E624F2210522169B8741BF3E60DA
2,973,609 UART: [art] SIG.S = 5D826C8B7C9EE1939BB26997BE939EABB54B1A4B939DD103522277E2BDED511BABE9295F998449C5EB800EA5B7758844
2,998,084 UART: Caliptra RT
2,998,429 UART: [state] CFI Enabled
3,105,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,051 UART: [rt]cmd =0x49444543, len=327
3,146,470 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,504 UART: [kat] HMAC-384Kdf
921,130 UART: [kat] LMS
1,169,442 UART: [kat] --
1,170,487 UART: [cold-reset] ++
1,170,815 UART: [fht] FHT @ 0x50003400
1,173,503 UART: [idev] ++
1,173,671 UART: [idev] CDI.KEYID = 6
1,174,032 UART: [idev] SUBJECT.KEYID = 7
1,174,457 UART: [idev] UDS.KEYID = 0
1,174,803 ready_for_fw is high
1,174,803 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,241 UART: [idev] Erasing UDS.KEYID = 0
1,199,395 UART: [idev] Sha1 KeyId Algorithm
1,208,373 UART: [idev] --
1,209,296 UART: [ldev] ++
1,209,464 UART: [ldev] CDI.KEYID = 6
1,209,828 UART: [ldev] SUBJECT.KEYID = 5
1,210,255 UART: [ldev] AUTHORITY.KEYID = 7
1,210,718 UART: [ldev] FE.KEYID = 1
1,216,018 UART: [ldev] Erasing FE.KEYID = 1
1,242,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,836 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,282,105 UART: [fwproc] Recv command 0x46574c44
1,282,838 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,080 >>> mbox cmd response: success
2,774,080 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,775,175 UART: [afmc] ++
2,775,343 UART: [afmc] CDI.KEYID = 6
2,775,706 UART: [afmc] SUBJECT.KEYID = 7
2,776,132 UART: [afmc] AUTHORITY.KEYID = 5
2,811,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,818 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,547 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,430 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,149 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,002 UART: [afmc] --
2,855,042 UART: [cold-reset] --
2,855,634 UART: [state] Locking Datavault
2,856,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,201 UART: [state] Locking ICCM
2,857,671 UART: [exit] Launching FMC @ 0x40000130
2,863,000 UART:
2,863,016 UART: Running Caliptra FMC ...
2,863,424 UART:
2,863,478 UART: [state] CFI Enabled
2,873,913 UART: [fht] FMC Alias Private Key: 7
2,981,726 UART: [art] Extend RT PCRs Done
2,982,154 UART: [art] Lock RT PCRs Done
2,983,850 UART: [art] Populate DV Done
2,991,905 UART: [fht] FMC Alias Private Key: 7
2,992,909 UART: [art] Derive CDI
2,993,189 UART: [art] Store in in slot 0x4
3,078,946 UART: [art] Derive Key Pair
3,079,306 UART: [art] Store priv key in slot 0x5
3,092,380 UART: [art] Derive Key Pair - Done
3,107,362 UART: [art] Signing Cert with AUTHO
3,107,842 UART: RITY.KEYID = 7
3,123,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,139 UART: [art] PUB.X = 90257426A64093A208FDD7A078930F32D59EE9D52735628C62A82B69A585A33BF7B4BA437601ABDBAAFD8021273BC596
3,130,900 UART: [art] PUB.Y = F708DF7CE2E3503A7203AEE2B429536D8CF6437D8756DF4E7EFB34A9D66E98A36FEBA4A879436221EA49D6C81C6685FE
3,137,856 UART: [art] SIG.R = 495977F85DAFB8643B45AD8C3D0E70DEDF4A66AFF98D40FD27FC0DDDE4F536B76A7A05257BB80A81D1D71A60677B3691
3,144,630 UART: [art] SIG.S = 04604BB271221C857CD0B1041F7C411F32D7182205D7323F63DE761F88B65C98F3871AE4F504D84CCA02C6E4B41B6172
3,168,852 UART: Caliptra RT
3,169,105 UART: [state] CFI Enabled
3,275,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,243 UART: [rt]cmd =0x49444543, len=327
3,316,837 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,856 ready_for_fw is high
1,055,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,120 >>> mbox cmd response: success
2,624,120 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,687,104 UART:
2,687,120 UART: Running Caliptra FMC ...
2,687,528 UART:
2,687,582 UART: [state] CFI Enabled
2,698,107 UART: [fht] FMC Alias Private Key: 7
2,806,190 UART: [art] Extend RT PCRs Done
2,806,618 UART: [art] Lock RT PCRs Done
2,808,018 UART: [art] Populate DV Done
2,816,089 UART: [fht] FMC Alias Private Key: 7
2,817,211 UART: [art] Derive CDI
2,817,491 UART: [art] Store in in slot 0x4
2,903,072 UART: [art] Derive Key Pair
2,903,432 UART: [art] Store priv key in slot 0x5
2,916,734 UART: [art] Derive Key Pair - Done
2,931,331 UART: [art] Signing Cert with AUTHO
2,931,811 UART: RITY.KEYID = 7
2,946,507 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,272 UART: [art] PUB.X = 6046B68C46B0B5D560D23AF9021CCB4F96765109CB2367C7BB7A66926C3156006E733AE3A591071209B122087D42A901
2,953,992 UART: [art] PUB.Y = 35F5E2AEA7CDC11D5B9B005063D15B06EFD53F4FBD1078E51A680020DD0FEDFF43C3C94CDC5581BA51DB44BCA03B34D6
2,960,916 UART: [art] SIG.R = 163644E033F708DE651EA7F56FFE9FF1904AA75BD9D08EEF84D8E6B37BF6E9BB929200F60E181DFFEA90B64A597ED292
2,967,674 UART: [art] SIG.S = 02788D8404C1B5E1D737968D70BAF65B97DDC581ED7B78AD343B19F399CB544DB2227625B5A6305538E553F9ED61621A
2,991,793 UART: Caliptra RT
2,992,046 UART: [state] CFI Enabled
3,099,415 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,764 UART: [rt]cmd =0x49444543, len=327
3,140,422 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,209 UART: [kat] HMAC-384Kdf
920,719 UART: [kat] LMS
1,169,031 UART: [kat] --
1,169,530 UART: [cold-reset] ++
1,169,952 UART: [fht] FHT @ 0x50003400
1,172,604 UART: [idev] ++
1,172,772 UART: [idev] CDI.KEYID = 6
1,173,133 UART: [idev] SUBJECT.KEYID = 7
1,173,558 UART: [idev] UDS.KEYID = 0
1,173,904 ready_for_fw is high
1,173,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,634 UART: [idev] Erasing UDS.KEYID = 0
1,198,080 UART: [idev] Sha1 KeyId Algorithm
1,206,838 UART: [idev] --
1,207,993 UART: [ldev] ++
1,208,161 UART: [ldev] CDI.KEYID = 6
1,208,525 UART: [ldev] SUBJECT.KEYID = 5
1,208,952 UART: [ldev] AUTHORITY.KEYID = 7
1,209,415 UART: [ldev] FE.KEYID = 1
1,214,703 UART: [ldev] Erasing FE.KEYID = 1
1,240,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,671 UART: [ldev] --
1,279,941 UART: [fwproc] Wait for Commands...
1,280,598 UART: [fwproc] Recv command 0x46574c44
1,281,331 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,281 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,403 >>> mbox cmd response: success
2,773,403 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,774,568 UART: [afmc] ++
2,774,736 UART: [afmc] CDI.KEYID = 6
2,775,099 UART: [afmc] SUBJECT.KEYID = 7
2,775,525 UART: [afmc] AUTHORITY.KEYID = 5
2,811,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,881 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,610 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,493 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,212 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,021 UART: [afmc] --
2,855,103 UART: [cold-reset] --
2,855,965 UART: [state] Locking Datavault
2,857,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,662 UART: [state] Locking ICCM
2,858,144 UART: [exit] Launching FMC @ 0x40000130
2,863,473 UART:
2,863,489 UART: Running Caliptra FMC ...
2,863,897 UART:
2,864,040 UART: [state] CFI Enabled
2,874,635 UART: [fht] FMC Alias Private Key: 7
2,982,486 UART: [art] Extend RT PCRs Done
2,982,914 UART: [art] Lock RT PCRs Done
2,984,738 UART: [art] Populate DV Done
2,992,931 UART: [fht] FMC Alias Private Key: 7
2,994,065 UART: [art] Derive CDI
2,994,345 UART: [art] Store in in slot 0x4
3,079,918 UART: [art] Derive Key Pair
3,080,278 UART: [art] Store priv key in slot 0x5
3,093,816 UART: [art] Derive Key Pair - Done
3,108,654 UART: [art] Signing Cert with AUTHO
3,109,134 UART: RITY.KEYID = 7
3,124,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,149 UART: [art] PUB.X = 4B0CC0143C3B4C9BAFB2DA572144C4504E63B59899FCDF5391A4FCC6FF2A02F7514B997514FFD90540F97A5A7468F9C4
3,131,920 UART: [art] PUB.Y = 2A9F5B0E550F5DCE268C8C047A24D31179E778A3E73432AB30C8622F8C280C977C2B35E4E07A50923824D6D4D160CA6B
3,138,860 UART: [art] SIG.R = D341F80520EACF2D45FACFDAEA730B6A6E25039458559F5B966EBBB1CE5674134F17779523C20DBB9446D43107C010FF
3,145,623 UART: [art] SIG.S = 29CEF9437A564426B486048A960DCB7A2B3327464D117424D291B54D6B8490DDD2F6A6D5D61F0EABA6D078C15DC8B5C5
3,170,057 UART: Caliptra RT
3,170,402 UART: [state] CFI Enabled
3,278,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,284 UART: [rt]cmd =0x49444543, len=327
3,319,669 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,217 ready_for_fw is high
1,056,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,627 >>> mbox cmd response: success
2,625,627 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,687,107 UART:
2,687,123 UART: Running Caliptra FMC ...
2,687,531 UART:
2,687,674 UART: [state] CFI Enabled
2,698,347 UART: [fht] FMC Alias Private Key: 7
2,806,594 UART: [art] Extend RT PCRs Done
2,807,022 UART: [art] Lock RT PCRs Done
2,808,650 UART: [art] Populate DV Done
2,816,777 UART: [fht] FMC Alias Private Key: 7
2,817,935 UART: [art] Derive CDI
2,818,215 UART: [art] Store in in slot 0x4
2,904,142 UART: [art] Derive Key Pair
2,904,502 UART: [art] Store priv key in slot 0x5
2,918,144 UART: [art] Derive Key Pair - Done
2,932,673 UART: [art] Signing Cert with AUTHO
2,933,153 UART: RITY.KEYID = 7
2,948,651 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,416 UART: [art] PUB.X = 5030AFE5BE1E7F2828BAD3E9562C83DEDD4F73EEC74302FAFB2B99E104B9702BA9A102ACB4F0724A189984DDF18EBA0A
2,956,196 UART: [art] PUB.Y = 00196C0BC0505DEA0D6D45815C0C350ACE466BA6DB11E615E27EE0D513162D11ECDA8A09093907EE53A985498034BB0D
2,963,106 UART: [art] SIG.R = EB043D8333E805B2D535120ECBD64830C11689CAB6BCD4B7CF2224D252A36827D82348F3BA1B3CC963DD69E05D93F955
2,969,873 UART: [art] SIG.S = 2FEFAE02734223FC8AB7B4C1C3F5A49F64529A1D7C30100B70F763BC6FF0C37DA1D215927BB9BF96609AE427D1685E67
2,994,288 UART: Caliptra RT
2,994,633 UART: [state] CFI Enabled
3,102,782 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,517 UART: [rt]cmd =0x49444543, len=327
3,144,048 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,116 UART:
192,491 UART: Running Caliptra ROM ...
193,595 UART:
193,739 UART: [state] CFI Enabled
263,178 UART: [state] LifecycleState = Unprovisioned
265,161 UART: [state] DebugLocked = No
266,897 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,971 UART: [kat] SHA2-256
440,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,152 UART: [kat] ++
451,597 UART: [kat] sha1
461,691 UART: [kat] SHA2-256
464,341 UART: [kat] SHA2-384
470,530 UART: [kat] SHA2-512-ACC
472,847 UART: [kat] ECC-384
2,769,558 UART: [kat] HMAC-384Kdf
2,782,111 UART: [kat] LMS
3,972,412 UART: [kat] --
3,977,551 UART: [cold-reset] ++
3,978,774 UART: [fht] Storing FHT @ 0x50003400
3,989,992 UART: [idev] ++
3,990,557 UART: [idev] CDI.KEYID = 6
3,991,516 UART: [idev] SUBJECT.KEYID = 7
3,992,758 UART: [idev] UDS.KEYID = 0
3,993,751 ready_for_fw is high
3,993,970 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,602 UART: [idev] Erasing UDS.KEYID = 0
7,327,295 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,908 UART: [idev] --
7,354,228 UART: [ldev] ++
7,354,795 UART: [ldev] CDI.KEYID = 6
7,355,763 UART: [ldev] SUBJECT.KEYID = 5
7,356,972 UART: [ldev] AUTHORITY.KEYID = 7
7,358,279 UART: [ldev] FE.KEYID = 1
7,404,810 UART: [ldev] Erasing FE.KEYID = 1
10,738,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,597 UART: [ldev] --
13,102,135 UART: [fwproc] Waiting for Commands...
13,105,415 UART: [fwproc] Received command 0x46574c44
13,107,596 UART: [fwproc] Received Image of size 114124 bytes
17,157,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,229,674 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,298,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,616,199 >>> mbox cmd response: success
17,616,729 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,619,595 UART: [afmc] ++
17,620,189 UART: [afmc] CDI.KEYID = 6
17,621,077 UART: [afmc] SUBJECT.KEYID = 7
17,622,357 UART: [afmc] AUTHORITY.KEYID = 5
20,986,398 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,660 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,908 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,327 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,168 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,628 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,389 UART: [afmc] --
23,361,203 UART: [cold-reset] --
23,364,690 UART: [state] Locking Datavault
23,371,005 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,788 UART: [state] Locking ICCM
23,374,676 UART: [exit] Launching FMC @ 0x40000130
23,383,047 UART:
23,383,290 UART: Running Caliptra FMC ...
23,384,395 UART:
23,384,564 UART: [state] CFI Enabled
23,448,413 UART: [fht] FMC Alias Private Key: 7
25,786,401 UART: [art] Extend RT PCRs Done
25,787,624 UART: [art] Lock RT PCRs Done
25,789,410 UART: [art] Populate DV Done
25,794,772 UART: [fht] FMC Alias Private Key: 7
25,796,419 UART: [art] Derive CDI
25,797,241 UART: [art] Store in in slot 0x4
25,856,322 UART: [art] Derive Key Pair
25,857,363 UART: [art] Store priv key in slot 0x5
29,150,347 UART: [art] Derive Key Pair - Done
29,163,505 UART: [art] Signing Cert with AUTHO
29,164,816 UART: RITY.KEYID = 7
31,452,071 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,593 UART: [art] PUB.X = 6D61F94ABDAE3C82E331B255692C0A58C62AEBD3F0B82874A5DA845BB03B6AA567155D53382F6CD07160A17CDDDFB9C2
31,460,845 UART: [art] PUB.Y = 579EC44D4FA2C09E0043355CAEECA034D8BF9FA39F4AAEE178F867F584F09F33E1011198AB0ED759117B4D3462E9EAF8
31,468,138 UART: [art] SIG.R = B928374019FF1A485AE4AD4DA1D969EA379BCFC05829C283AF8930A7856FC7C58736C630064ED709D39BA34466151A20
31,475,473 UART: [art] SIG.S = E6E344F5616681D6FB9DD5EA4641E5B193630E040277BE1A15B7800BA3EE5EA21D0604ACE167BFF0782E8498982353AD
32,781,005 UART: Caliptra RT
32,781,721 UART: [state] CFI Enabled
32,943,309 UART: [rt] RT listening for mailbox commands...
32,974,501 UART: [rt]cmd =0x4c444556, len=4
32,985,625 >>> mbox cmd response data (687 bytes)
33,027,271 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,057,380 UART: [rt]cmd =0x49444549, len=4
33,060,326 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,783,655 ready_for_fw is high
3,784,072 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,871,625 >>> mbox cmd response: success
17,872,523 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,566,039 UART:
23,566,429 UART: Running Caliptra FMC ...
23,567,628 UART:
23,567,801 UART: [state] CFI Enabled
23,635,615 UART: [fht] FMC Alias Private Key: 7
25,973,709 UART: [art] Extend RT PCRs Done
25,974,934 UART: [art] Lock RT PCRs Done
25,976,486 UART: [art] Populate DV Done
25,981,699 UART: [fht] FMC Alias Private Key: 7
25,983,190 UART: [art] Derive CDI
25,983,961 UART: [art] Store in in slot 0x4
26,044,427 UART: [art] Derive Key Pair
26,045,469 UART: [art] Store priv key in slot 0x5
29,338,693 UART: [art] Derive Key Pair - Done
29,351,587 UART: [art] Signing Cert with AUTHO
29,352,892 UART: RITY.KEYID = 7
31,641,055 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,577 UART: [art] PUB.X = 0A1C7F45BF7C69F1098ECFEAE9C0D30CA552D92F09D42958781FC033D24381C3C07B430885472E6904ED46DC680DB562
31,649,808 UART: [art] PUB.Y = 5246D25FD3A9C9385626F5EF7408E86FCC3A077532268AF5838DD583432E757B83E1FE610D141EEBDDBB5AD5DDD0C713
31,657,071 UART: [art] SIG.R = 487D34BA22FABCD956E6919FCD28D0E039D289CFF4FFB3980BA445DB2E3B5E9B5AD6E98AD1AA3B9C15633958E5A870CA
31,664,493 UART: [art] SIG.S = 91D29C49B4F39FE6A2E83B8D1323D311254DD1A25EC3333D69019DCD91290630F7F6E206ABDA9C4018F60F554C48BF46
32,969,668 UART: Caliptra RT
32,970,386 UART: [state] CFI Enabled
33,133,437 UART: [rt] RT listening for mailbox commands...
33,165,070 UART: [rt]cmd =0x4c444556, len=4
33,176,273 >>> mbox cmd response data (687 bytes)
33,218,064 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,247,930 UART: [rt]cmd =0x49444549, len=4
33,250,685 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,481 UART:
192,838 UART: Running Caliptra ROM ...
194,019 UART:
603,739 UART: [state] CFI Enabled
617,245 UART: [state] LifecycleState = Unprovisioned
619,168 UART: [state] DebugLocked = No
620,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,589 UART: [kat] SHA2-256
794,332 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,855 UART: [kat] ++
805,335 UART: [kat] sha1
816,838 UART: [kat] SHA2-256
819,558 UART: [kat] SHA2-384
825,823 UART: [kat] SHA2-512-ACC
828,184 UART: [kat] ECC-384
3,112,471 UART: [kat] HMAC-384Kdf
3,124,614 UART: [kat] LMS
4,314,754 UART: [kat] --
4,318,601 UART: [cold-reset] ++
4,320,597 UART: [fht] Storing FHT @ 0x50003400
4,333,062 UART: [idev] ++
4,333,704 UART: [idev] CDI.KEYID = 6
4,334,604 UART: [idev] SUBJECT.KEYID = 7
4,335,859 UART: [idev] UDS.KEYID = 0
4,336,837 ready_for_fw is high
4,337,021 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,333 UART: [idev] Erasing UDS.KEYID = 0
7,624,294 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,702 UART: [idev] --
7,648,990 UART: [ldev] ++
7,649,556 UART: [ldev] CDI.KEYID = 6
7,650,514 UART: [ldev] SUBJECT.KEYID = 5
7,651,770 UART: [ldev] AUTHORITY.KEYID = 7
7,652,993 UART: [ldev] FE.KEYID = 1
7,663,970 UART: [ldev] Erasing FE.KEYID = 1
10,953,733 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,702 UART: [ldev] --
13,314,261 UART: [fwproc] Waiting for Commands...
13,316,727 UART: [fwproc] Received command 0x46574c44
13,318,952 UART: [fwproc] Received Image of size 114124 bytes
17,370,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,333 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,921 >>> mbox cmd response: success
17,832,446 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,836,854 UART: [afmc] ++
17,837,436 UART: [afmc] CDI.KEYID = 6
17,838,372 UART: [afmc] SUBJECT.KEYID = 7
17,839,635 UART: [afmc] AUTHORITY.KEYID = 5
21,151,606 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,426 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,801 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,647 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,049 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,422 UART: [afmc] --
23,513,488 UART: [cold-reset] --
23,516,696 UART: [state] Locking Datavault
23,521,071 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,771 UART: [state] Locking ICCM
23,523,943 UART: [exit] Launching FMC @ 0x40000130
23,532,329 UART:
23,532,554 UART: Running Caliptra FMC ...
23,533,654 UART:
23,533,811 UART: [state] CFI Enabled
23,542,063 UART: [fht] FMC Alias Private Key: 7
25,873,817 UART: [art] Extend RT PCRs Done
25,875,048 UART: [art] Lock RT PCRs Done
25,876,514 UART: [art] Populate DV Done
25,881,972 UART: [fht] FMC Alias Private Key: 7
25,883,612 UART: [art] Derive CDI
25,884,420 UART: [art] Store in in slot 0x4
25,927,555 UART: [art] Derive Key Pair
25,928,594 UART: [art] Store priv key in slot 0x5
29,170,649 UART: [art] Derive Key Pair - Done
29,183,690 UART: [art] Signing Cert with AUTHO
29,185,026 UART: RITY.KEYID = 7
31,464,645 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,143 UART: [art] PUB.X = BFB830BC63647CD175DAF5704BA1D73400F60169B2E127F23A75BFCFAA8B18FFDB6B3B9115F7CD8DE9C16FDBA060658F
31,473,431 UART: [art] PUB.Y = 140F8C441008A2A174106AAFE6698784AA5619822BB3BAAEC4D440C0370E82D740A48BBB98957164487FB7EB5345AF74
31,480,708 UART: [art] SIG.R = 81CC5E8A9044C70CAE610599D036C833F2DD23AD9E09AC9143764E254BF69882AB18A760D7EA5ED7C3C479169527B5A9
31,488,085 UART: [art] SIG.S = 06A6FB2D02F735FEF562CEF64DAA6301511DB3768EB3CAB2E542DC2D45F3A87EE040C18CEFC497B12C12DACDD6010855
32,793,281 UART: Caliptra RT
32,794,007 UART: [state] CFI Enabled
32,910,049 UART: [rt] RT listening for mailbox commands...
32,941,280 UART: [rt]cmd =0x4c444556, len=4
32,952,542 >>> mbox cmd response data (687 bytes)
32,994,567 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,024,799 UART: [rt]cmd =0x49444549, len=4
33,027,583 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,128,415 ready_for_fw is high
4,128,814 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,537 >>> mbox cmd response: success
18,071,359 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,707,652 UART:
23,708,031 UART: Running Caliptra FMC ...
23,709,142 UART:
23,709,297 UART: [state] CFI Enabled
23,717,413 UART: [fht] FMC Alias Private Key: 7
26,048,911 UART: [art] Extend RT PCRs Done
26,050,290 UART: [art] Lock RT PCRs Done
26,051,440 UART: [art] Populate DV Done
26,057,023 UART: [fht] FMC Alias Private Key: 7
26,058,677 UART: [art] Derive CDI
26,059,487 UART: [art] Store in in slot 0x4
26,102,240 UART: [art] Derive Key Pair
26,103,239 UART: [art] Store priv key in slot 0x5
29,345,757 UART: [art] Derive Key Pair - Done
29,358,591 UART: [art] Signing Cert with AUTHO
29,359,904 UART: RITY.KEYID = 7
31,639,465 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,994 UART: [art] PUB.X = B0A9A5F12210A3BBA27002D0D449E45631145306D1241E3D979123C8ED42788FD6F1D2D03A874B671757EFB2310C5E7C
31,648,246 UART: [art] PUB.Y = 83A753FA2626B1D54F63A67FE3CB1E84A9213B1A9BA5C2F0EFB04449DF1C65D298BF491FA8ECA0C7D059CCC47085EED0
31,655,466 UART: [art] SIG.R = 7052B351CC96B68C600DD208A559B0D176D412CC93E0FB8568A8765CB83CDF9C1A5013064A0B845E84658013DEFC04C6
31,662,877 UART: [art] SIG.S = 686483E7F793F08525C4E386CB9837CAAD0C60004D1206D0659E3EFB6E73E9B09FAA9D57EDE6412AA2AE25AC310497B3
32,968,551 UART: Caliptra RT
32,969,269 UART: [state] CFI Enabled
33,087,085 UART: [rt] RT listening for mailbox commands...
33,118,870 UART: [rt]cmd =0x4c444556, len=4
33,129,933 >>> mbox cmd response data (687 bytes)
33,172,122 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,202,087 UART: [rt]cmd =0x49444549, len=4
33,204,832 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,004 UART:
192,384 UART: Running Caliptra ROM ...
193,522 UART:
193,670 UART: [state] CFI Enabled
261,789 UART: [state] LifecycleState = Unprovisioned
263,626 UART: [state] DebugLocked = No
265,585 UART: [state] WD Timer not started. Device not locked for debugging
269,193 UART: [kat] SHA2-256
448,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,874 UART: [kat] ++
460,407 UART: [kat] sha1
470,882 UART: [kat] SHA2-256
473,896 UART: [kat] SHA2-384
479,529 UART: [kat] SHA2-512-ACC
482,461 UART: [kat] ECC-384
2,924,857 UART: [kat] HMAC-384Kdf
2,949,382 UART: [kat] LMS
3,478,806 UART: [kat] --
3,482,687 UART: [cold-reset] ++
3,484,346 UART: [fht] FHT @ 0x50003400
3,495,475 UART: [idev] ++
3,496,037 UART: [idev] CDI.KEYID = 6
3,497,069 UART: [idev] SUBJECT.KEYID = 7
3,498,173 UART: [idev] UDS.KEYID = 0
3,499,096 ready_for_fw is high
3,499,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,643,243 UART: [idev] Erasing UDS.KEYID = 0
6,002,053 UART: [idev] Sha1 KeyId Algorithm
6,026,303 UART: [idev] --
6,031,515 UART: [ldev] ++
6,032,090 UART: [ldev] CDI.KEYID = 6
6,033,024 UART: [ldev] SUBJECT.KEYID = 5
6,034,134 UART: [ldev] AUTHORITY.KEYID = 7
6,035,419 UART: [ldev] FE.KEYID = 1
6,077,391 UART: [ldev] Erasing FE.KEYID = 1
8,581,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,018 UART: [ldev] --
10,391,793 UART: [fwproc] Wait for Commands...
10,394,798 UART: [fwproc] Recv command 0x46574c44
10,396,854 UART: [fwproc] Recv'd Img size: 114448 bytes
13,803,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,264,535 >>> mbox cmd response: success
14,265,040 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,268,699 UART: [afmc] ++
14,269,287 UART: [afmc] CDI.KEYID = 6
14,270,195 UART: [afmc] SUBJECT.KEYID = 7
14,271,354 UART: [afmc] AUTHORITY.KEYID = 5
16,801,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,172 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,543,947 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,559,984 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,575,891 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,599,076 UART: [afmc] --
18,603,533 UART: [cold-reset] --
18,606,694 UART: [state] Locking Datavault
18,612,585 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,226 UART: [state] Locking ICCM
18,615,235 UART: [exit] Launching FMC @ 0x40000130
18,623,682 UART:
18,623,923 UART: Running Caliptra FMC ...
18,625,020 UART:
18,625,177 UART: [state] CFI Enabled
18,684,029 UART: [fht] FMC Alias Private Key: 7
20,448,292 UART: [art] Extend RT PCRs Done
20,449,507 UART: [art] Lock RT PCRs Done
20,451,159 UART: [art] Populate DV Done
20,456,944 UART: [fht] FMC Alias Private Key: 7
20,458,477 UART: [art] Derive CDI
20,459,230 UART: [art] Store in in slot 0x4
20,516,888 UART: [art] Derive Key Pair
20,517,929 UART: [art] Store priv key in slot 0x5
22,980,944 UART: [art] Derive Key Pair - Done
22,993,832 UART: [art] Signing Cert with AUTHO
22,995,138 UART: RITY.KEYID = 7
24,707,259 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,767 UART: [art] PUB.X = 1A17059BD13F369F200F9DB571EBF1E4007299FD8D4BBFA7097C0D74F803F87559B6DDF2BAFF6472FBA757E464B46986
24,715,973 UART: [art] PUB.Y = 57AA144A9A8A77BF15FB92A83DC3C9DC0FF4BA5DF11387AE88D98A370A97F651858F4979676E1E1917938C6432E72A00
24,723,272 UART: [art] SIG.R = 1373AC7CE4CA8F9765CF96B595982D9ACD3C0127FDA54C92A8A1423B7117C48AEF91D90419FF3137AD4ECEF24B960264
24,730,622 UART: [art] SIG.S = 3B9A652BE6AF962E37F8C0D14A9BACD124EA89574D5217D7C2F3FF57650EE9EB410AB9C4C4F68190B59336A46201E323
25,709,685 UART: Caliptra RT
25,710,397 UART: [state] CFI Enabled
25,874,625 UART: [rt] RT listening for mailbox commands...
25,905,502 UART: [rt]cmd =0x4c444556, len=4
25,916,534 >>> mbox cmd response data (687 bytes)
25,958,494 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,988,556 UART: [rt]cmd =0x49444549, len=4
25,991,462 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
3,377,360 ready_for_fw is high
3,377,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,067,832 >>> mbox cmd response: success
14,068,631 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,367,063 UART:
18,367,454 UART: Running Caliptra FMC ...
18,368,576 UART:
18,368,728 UART: [state] CFI Enabled
18,432,048 UART: [fht] FMC Alias Private Key: 7
20,195,149 UART: [art] Extend RT PCRs Done
20,196,373 UART: [art] Lock RT PCRs Done
20,198,082 UART: [art] Populate DV Done
20,203,658 UART: [fht] FMC Alias Private Key: 7
20,205,260 UART: [art] Derive CDI
20,206,002 UART: [art] Store in in slot 0x4
20,264,314 UART: [art] Derive Key Pair
20,265,310 UART: [art] Store priv key in slot 0x5
22,728,695 UART: [art] Derive Key Pair - Done
22,742,019 UART: [art] Signing Cert with AUTHO
22,743,347 UART: RITY.KEYID = 7
24,454,660 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,165 UART: [art] PUB.X = F52554FB6F3224A3810F3D87AE734EE7F31D499B816E88843D8191F48354C901E7C3B11F67C5BF4BAE0C622466B09361
24,463,416 UART: [art] PUB.Y = 4FF2713AA21F5D57ABE03899279D853B54E1D7621BD26980082ECF83B682633DB91E0E496026FB26110A09959FAB5F02
24,470,658 UART: [art] SIG.R = AFC2F014A96544C71032A05239D4DFA8B680C7560B4253BCB23B8756878F2C7C5DAC60C47C9FB2BF37D4EAD7C3A22976
24,478,046 UART: [art] SIG.S = BD5093703A77F340FFEF112D9D9EBA33C9EFE63912A698758044735964620C72F3F03A444FD11ACF0ADB999103BE9C51
25,457,501 UART: Caliptra RT
25,458,216 UART: [state] CFI Enabled
25,622,555 UART: [rt] RT listening for mailbox commands...
25,654,014 UART: [rt]cmd =0x4c444556, len=4
25,665,190 >>> mbox cmd response data (687 bytes)
25,706,551 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,736,335 UART: [rt]cmd =0x49444549, len=4
25,739,229 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,468 UART:
192,842 UART: Running Caliptra ROM ...
193,972 UART:
603,455 UART: [state] CFI Enabled
616,884 UART: [state] LifecycleState = Unprovisioned
618,775 UART: [state] DebugLocked = No
621,576 UART: [state] WD Timer not started. Device not locked for debugging
624,547 UART: [kat] SHA2-256
803,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,240 UART: [kat] ++
815,765 UART: [kat] sha1
828,017 UART: [kat] SHA2-256
831,064 UART: [kat] SHA2-384
836,344 UART: [kat] SHA2-512-ACC
839,293 UART: [kat] ECC-384
3,280,155 UART: [kat] HMAC-384Kdf
3,292,192 UART: [kat] LMS
3,821,636 UART: [kat] --
3,826,334 UART: [cold-reset] ++
3,827,402 UART: [fht] FHT @ 0x50003400
3,839,149 UART: [idev] ++
3,839,709 UART: [idev] CDI.KEYID = 6
3,840,614 UART: [idev] SUBJECT.KEYID = 7
3,841,777 UART: [idev] UDS.KEYID = 0
3,842,822 ready_for_fw is high
3,843,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,213 UART: [idev] Erasing UDS.KEYID = 0
6,310,512 UART: [idev] Sha1 KeyId Algorithm
6,332,656 UART: [idev] --
6,336,043 UART: [ldev] ++
6,336,625 UART: [ldev] CDI.KEYID = 6
6,337,534 UART: [ldev] SUBJECT.KEYID = 5
6,338,687 UART: [ldev] AUTHORITY.KEYID = 7
6,339,963 UART: [ldev] FE.KEYID = 1
6,350,605 UART: [ldev] Erasing FE.KEYID = 1
8,821,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,567 UART: [ldev] --
10,611,768 UART: [fwproc] Wait for Commands...
10,613,812 UART: [fwproc] Recv command 0x46574c44
10,615,900 UART: [fwproc] Recv'd Img size: 114448 bytes
14,013,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,477,560 >>> mbox cmd response: success
14,478,075 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,481,187 UART: [afmc] ++
14,481,765 UART: [afmc] CDI.KEYID = 6
14,482,669 UART: [afmc] SUBJECT.KEYID = 7
14,483,879 UART: [afmc] AUTHORITY.KEYID = 5
16,984,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,705,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,722,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,738,992 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,754,909 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,046 UART: [afmc] --
18,781,532 UART: [cold-reset] --
18,786,895 UART: [state] Locking Datavault
18,793,233 UART: [state] Locking PCR0, PCR1 and PCR31
18,794,935 UART: [state] Locking ICCM
18,797,567 UART: [exit] Launching FMC @ 0x40000130
18,805,952 UART:
18,806,180 UART: Running Caliptra FMC ...
18,807,272 UART:
18,807,422 UART: [state] CFI Enabled
18,816,054 UART: [fht] FMC Alias Private Key: 7
20,572,760 UART: [art] Extend RT PCRs Done
20,573,962 UART: [art] Lock RT PCRs Done
20,575,576 UART: [art] Populate DV Done
20,581,246 UART: [fht] FMC Alias Private Key: 7
20,582,936 UART: [art] Derive CDI
20,583,743 UART: [art] Store in in slot 0x4
20,626,016 UART: [art] Derive Key Pair
20,627,074 UART: [art] Store priv key in slot 0x5
23,054,133 UART: [art] Derive Key Pair - Done
23,067,118 UART: [art] Signing Cert with AUTHO
23,068,445 UART: RITY.KEYID = 7
24,773,493 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,986 UART: [art] PUB.X = D0A3FB2691CD40AE399AB63A92EB890C806CCE0F399BF4078FEDE744A3BDF8FA5EE903B0AADEC2556BFA2ABC4BAA3CAE
24,782,322 UART: [art] PUB.Y = D789EEB657B328600B79F1C08D3B95B49CC4C640ED1A11CFD97437BB4A1E349AEBF3D2E5C8C285126E8D6EFCC7C2CA87
24,789,602 UART: [art] SIG.R = 60B069D4880A4225828BC13D6D095AA96CA1AE8736BC880658E3CC661012BFEA0535283DA041CDACBAE3E572220E1BAE
24,796,983 UART: [art] SIG.S = CAACFFE7D3CE5A4B816CA79D17AF6533D349C892E2592B2EE86E2F502E74C024A27D714176E8D1D095E6F06EB06F943D
25,775,959 UART: Caliptra RT
25,776,657 UART: [state] CFI Enabled
25,893,343 UART: [rt] RT listening for mailbox commands...
25,924,365 UART: [rt]cmd =0x4c444556, len=4
25,935,710 >>> mbox cmd response data (687 bytes)
25,977,762 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,007,819 UART: [rt]cmd =0x49444549, len=4
26,010,576 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,695,382 ready_for_fw is high
3,695,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,344 >>> mbox cmd response: success
14,269,975 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,518,761 UART:
18,519,136 UART: Running Caliptra FMC ...
18,520,317 UART:
18,520,475 UART: [state] CFI Enabled
18,528,422 UART: [fht] FMC Alias Private Key: 7
20,285,576 UART: [art] Extend RT PCRs Done
20,286,786 UART: [art] Lock RT PCRs Done
20,288,521 UART: [art] Populate DV Done
20,293,710 UART: [fht] FMC Alias Private Key: 7
20,295,350 UART: [art] Derive CDI
20,296,155 UART: [art] Store in in slot 0x4
20,338,422 UART: [art] Derive Key Pair
20,339,488 UART: [art] Store priv key in slot 0x5
22,766,888 UART: [art] Derive Key Pair - Done
22,780,168 UART: [art] Signing Cert with AUTHO
22,781,488 UART: RITY.KEYID = 7
24,486,789 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,300 UART: [art] PUB.X = C243439F791187867CEA8E7E71F9930E774AAE8B8D969FD2F4D011EC423DF15481E3D07B272F75C920ABB9D0A05A3D93
24,495,546 UART: [art] PUB.Y = 9198E7E77AB473604E7AC8B44EDC77BFD7F93FD5C9E6567407415293DD84E0519C8A9B7E552E5049E6C30097FBA544D9
24,502,807 UART: [art] SIG.R = 3BEF3DB00C79C29AC15022E68B1C799BDF6A6F196F325839468FA39EE124DE4AC512133F9E1B28443A417789FBB2A1A5
24,510,202 UART: [art] SIG.S = 29671BD999020B9E569A3762621B077306D152146B6C19D53C3ADDA0A5C6D319DF5DE16D35799B749B3EB85536F8BA6F
25,488,559 UART: Caliptra RT
25,489,277 UART: [state] CFI Enabled
25,605,766 UART: [rt] RT listening for mailbox commands...
25,637,346 UART: [rt]cmd =0x4c444556, len=4
25,648,265 >>> mbox cmd response data (687 bytes)
25,689,871 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,719,844 UART: [rt]cmd =0x49444549, len=4
25,722,642 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,417,822 ready_for_fw is high
3,418,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,712,911 >>> mbox cmd response: success
14,713,723 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,006,032 UART:
19,006,434 UART: Running Caliptra FMC ...
19,007,543 UART:
19,007,701 UART: [state] CFI Enabled
19,073,171 UART: [fht] FMC Alias Private Key: 7
20,837,060 UART: [art] Extend RT PCRs Done
20,838,289 UART: [art] Lock RT PCRs Done
20,840,179 UART: [art] Populate DV Done
20,845,497 UART: [fht] FMC Alias Private Key: 7
20,847,202 UART: [art] Derive CDI
20,847,940 UART: [art] Store in in slot 0x4
20,906,104 UART: [art] Derive Key Pair
20,907,148 UART: [art] Store priv key in slot 0x5
23,370,141 UART: [art] Derive Key Pair - Done
23,383,128 UART: [art] Signing Cert with AUTHO
23,384,424 UART: RITY.KEYID = 7
25,095,672 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,180 UART: [art] PUB.X = 9CB2BA5322AEF763FD62A5C397F4A4E6BC4EC2BFB3135404302917A7B4C5584D94102B862422D300B19D445AF9A4B237
25,104,430 UART: [art] PUB.Y = 1A50096CE40540E1E675B66661C086A10415AAA3616C678932A6E75057A21CD7B702F14F3C824CE02614106A94648A74
25,111,662 UART: [art] SIG.R = 08589CF355F3C281B31B500E4167E4E6D0C594578795415FB82582E2BA865D7D90B1F85C3AF108A301DB2C2C681536A7
25,119,008 UART: [art] SIG.S = C6419CC0A2CFE62DCD26FCB41E8D0D69B84EE0A125B451627C00B34DED2413159879226D00331D7A82AAD287759BF294
26,097,892 UART: Caliptra RT
26,098,585 UART: [state] CFI Enabled
26,262,452 UART: [rt] RT listening for mailbox commands...
26,293,758 UART: [rt]cmd =0x4c444556, len=4
26,304,899 >>> mbox cmd response data (687 bytes)
26,346,824 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,376,699 UART: [rt]cmd =0x49444549, len=4
26,379,507 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,759,187 ready_for_fw is high
3,759,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,972,083 >>> mbox cmd response: success
14,973,063 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,223,887 UART:
19,224,275 UART: Running Caliptra FMC ...
19,225,394 UART:
19,225,544 UART: [state] CFI Enabled
19,233,574 UART: [fht] FMC Alias Private Key: 7
20,990,080 UART: [art] Extend RT PCRs Done
20,991,292 UART: [art] Lock RT PCRs Done
20,993,043 UART: [art] Populate DV Done
20,998,232 UART: [fht] FMC Alias Private Key: 7
20,999,935 UART: [art] Derive CDI
21,000,669 UART: [art] Store in in slot 0x4
21,043,480 UART: [art] Derive Key Pair
21,044,479 UART: [art] Store priv key in slot 0x5
23,471,660 UART: [art] Derive Key Pair - Done
23,484,558 UART: [art] Signing Cert with AUTHO
23,485,855 UART: RITY.KEYID = 7
25,191,140 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,656 UART: [art] PUB.X = 353CD35F8BAC6201376ACBD36B2B36FAC5060DDB1F2EE7EB17CA04105B5557856BBE5132E61CB0F3A7F64020ECA90C3A
25,199,962 UART: [art] PUB.Y = 26F72BAFDDC13B634C3CA9C4E892C7174C47B8A8D2D755DC3560A584167D2A1292B84F6C64F1406E0A955A73868DB60D
25,207,218 UART: [art] SIG.R = 340D374F3E1FF9E8CAB7F3CB1A329A88F529D1F14D0DE42EEFAFB253EF199107703136D1A80B0E6150F7E1722FCD9DC3
25,214,679 UART: [art] SIG.S = CFE17D7D3216297288E884E05C04EB081EB5B9B4443E8D4E190D47D037B485ECA6C29C953F218B33E8A1E95A44B7D417
26,194,668 UART: Caliptra RT
26,195,359 UART: [state] CFI Enabled
26,312,032 UART: [rt] RT listening for mailbox commands...
26,343,534 UART: [rt]cmd =0x4c444556, len=4
26,354,375 >>> mbox cmd response data (687 bytes)
26,396,039 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,426,053 UART: [rt]cmd =0x49444549, len=4
26,428,898 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,237 UART: [kat] SHA2-256
882,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,283 UART: [kat] ++
886,435 UART: [kat] sha1
890,741 UART: [kat] SHA2-256
892,679 UART: [kat] SHA2-384
895,348 UART: [kat] SHA2-512-ACC
897,249 UART: [kat] ECC-384
902,784 UART: [kat] HMAC-384Kdf
907,262 UART: [kat] LMS
1,475,458 UART: [kat] --
1,476,231 UART: [cold-reset] ++
1,476,631 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 ready_for_fw is high
1,480,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,920 UART: [idev] Erasing UDS.KEYID = 0
1,505,294 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,884 UART: [idev] --
1,514,965 UART: [ldev] ++
1,515,133 UART: [ldev] CDI.KEYID = 6
1,515,496 UART: [ldev] SUBJECT.KEYID = 5
1,515,922 UART: [ldev] AUTHORITY.KEYID = 7
1,516,385 UART: [ldev] FE.KEYID = 1
1,521,693 UART: [ldev] Erasing FE.KEYID = 1
1,546,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,722 UART: [ldev] --
1,586,219 UART: [fwproc] Waiting for Commands...
1,586,974 UART: [fwproc] Received command 0x46574c44
1,587,765 UART: [fwproc] Received Image of size 114448 bytes
2,887,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,614 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,966 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,943 >>> mbox cmd response: success
3,079,943 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,081,071 UART: [afmc] ++
3,081,239 UART: [afmc] CDI.KEYID = 6
3,081,601 UART: [afmc] SUBJECT.KEYID = 7
3,082,026 UART: [afmc] AUTHORITY.KEYID = 5
3,117,057 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,127 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,635 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,520 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,210 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,179 UART: [afmc] --
3,160,303 UART: [cold-reset] --
3,161,297 UART: [state] Locking Datavault
3,162,620 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,224 UART: [state] Locking ICCM
3,163,888 UART: [exit] Launching FMC @ 0x40000130
3,169,217 UART:
3,169,233 UART: Running Caliptra FMC ...
3,169,641 UART:
3,169,695 UART: [state] CFI Enabled
3,180,626 UART: [fht] FMC Alias Private Key: 7
3,287,493 UART: [art] Extend RT PCRs Done
3,287,921 UART: [art] Lock RT PCRs Done
3,289,599 UART: [art] Populate DV Done
3,297,880 UART: [fht] FMC Alias Private Key: 7
3,299,020 UART: [art] Derive CDI
3,299,300 UART: [art] Store in in slot 0x4
3,385,173 UART: [art] Derive Key Pair
3,385,533 UART: [art] Store priv key in slot 0x5
3,398,349 UART: [art] Derive Key Pair - Done
3,413,280 UART: [art] Signing Cert with AUTHO
3,413,760 UART: RITY.KEYID = 7
3,428,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,717 UART: [art] PUB.X = EEBF10A5A5A04233772FE286D0D4650A46063B34F823260B17174715E9F9E7C79E458C5714283752B9B0F4D51CC6A90F
3,436,471 UART: [art] PUB.Y = BA88A0D347C9EF2039E674012CF87F0F5FA72D880DBD7A24B216BA87445B28CAE70A562601B8DD3D37B4FAD2C6AA557B
3,443,422 UART: [art] SIG.R = AF7E62D44DC3D3ECD39A13E528C8261D469A912E140E5948917A85B1FB7FCF361FC3F0398A67FA4995AACF4E95CA0181
3,450,198 UART: [art] SIG.S = BBCB822F0DC246E3CD41D12083E89EDD47BE46959B44A1740CD5F53EDB3AEF90A7E1400119051456808921AEB905A53D
3,473,632 UART: Caliptra RT
3,473,885 UART: [state] CFI Enabled
3,581,447 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,057 UART: [rt]cmd =0x4c444556, len=4
3,622,537 >>> mbox cmd response data (687 bytes)
3,622,538 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,917 UART: [rt]cmd =0x49444549, len=4
3,654,371 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,377 ready_for_fw is high
1,362,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,135 >>> mbox cmd response: success
2,927,135 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,988,627 UART:
2,988,643 UART: Running Caliptra FMC ...
2,989,051 UART:
2,989,105 UART: [state] CFI Enabled
2,999,870 UART: [fht] FMC Alias Private Key: 7
3,107,937 UART: [art] Extend RT PCRs Done
3,108,365 UART: [art] Lock RT PCRs Done
3,110,253 UART: [art] Populate DV Done
3,118,624 UART: [fht] FMC Alias Private Key: 7
3,119,738 UART: [art] Derive CDI
3,120,018 UART: [art] Store in in slot 0x4
3,205,641 UART: [art] Derive Key Pair
3,206,001 UART: [art] Store priv key in slot 0x5
3,219,291 UART: [art] Derive Key Pair - Done
3,234,104 UART: [art] Signing Cert with AUTHO
3,234,584 UART: RITY.KEYID = 7
3,249,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,391 UART: [art] PUB.X = D7C74A9357EABC753AA5A07A81992B21A4D8AFD6D068FA8849D73BFB3B0C59D2D23CF6560B5CE167D843863AA54619D8
3,257,167 UART: [art] PUB.Y = 7D40AE71344B11A76BE5443FB6C388D1C569822C85BC98EE8C28FF80D7617677F5F8D5B6D701E28D3451169E1C6FC662
3,264,116 UART: [art] SIG.R = 5AD35D8BD6DFD41DCAE2B067E88F370718C17A0F390849E800D3A54328193FA74133372A1839BE187A339895124743B5
3,270,849 UART: [art] SIG.S = D18F2864D74B75A8AA3B44B82BF88380DEE37462EFCE5FCDDAE48D51249DA3DF7F281286BE6F52461DC59C180B783021
3,294,767 UART: Caliptra RT
3,295,020 UART: [state] CFI Enabled
3,403,195 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,845 UART: [rt]cmd =0x4c444556, len=4
3,444,347 >>> mbox cmd response data (687 bytes)
3,444,348 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,501 UART: [rt]cmd =0x49444549, len=4
3,475,731 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,808 UART: [kat] SHA2-256
882,739 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,854 UART: [kat] ++
887,006 UART: [kat] sha1
891,152 UART: [kat] SHA2-256
893,090 UART: [kat] SHA2-384
895,793 UART: [kat] SHA2-512-ACC
897,694 UART: [kat] ECC-384
903,347 UART: [kat] HMAC-384Kdf
907,935 UART: [kat] LMS
1,476,131 UART: [kat] --
1,476,862 UART: [cold-reset] ++
1,477,428 UART: [fht] Storing FHT @ 0x50003400
1,480,075 UART: [idev] ++
1,480,243 UART: [idev] CDI.KEYID = 6
1,480,603 UART: [idev] SUBJECT.KEYID = 7
1,481,027 UART: [idev] UDS.KEYID = 0
1,481,372 ready_for_fw is high
1,481,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,925 UART: [idev] Erasing UDS.KEYID = 0
1,505,247 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,753 UART: [idev] --
1,514,660 UART: [ldev] ++
1,514,828 UART: [ldev] CDI.KEYID = 6
1,515,191 UART: [ldev] SUBJECT.KEYID = 5
1,515,617 UART: [ldev] AUTHORITY.KEYID = 7
1,516,080 UART: [ldev] FE.KEYID = 1
1,521,412 UART: [ldev] Erasing FE.KEYID = 1
1,547,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,011 UART: [ldev] --
1,586,394 UART: [fwproc] Waiting for Commands...
1,587,257 UART: [fwproc] Received command 0x46574c44
1,588,048 UART: [fwproc] Received Image of size 114448 bytes
2,887,929 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,203 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,555 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,636 >>> mbox cmd response: success
3,080,636 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,081,674 UART: [afmc] ++
3,081,842 UART: [afmc] CDI.KEYID = 6
3,082,204 UART: [afmc] SUBJECT.KEYID = 7
3,082,629 UART: [afmc] AUTHORITY.KEYID = 5
3,117,824 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,932 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,712 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,440 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,325 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,015 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,956 UART: [afmc] --
3,161,012 UART: [cold-reset] --
3,161,812 UART: [state] Locking Datavault
3,163,131 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,735 UART: [state] Locking ICCM
3,164,397 UART: [exit] Launching FMC @ 0x40000130
3,169,726 UART:
3,169,742 UART: Running Caliptra FMC ...
3,170,150 UART:
3,170,293 UART: [state] CFI Enabled
3,181,008 UART: [fht] FMC Alias Private Key: 7
3,289,187 UART: [art] Extend RT PCRs Done
3,289,615 UART: [art] Lock RT PCRs Done
3,291,219 UART: [art] Populate DV Done
3,299,672 UART: [fht] FMC Alias Private Key: 7
3,300,752 UART: [art] Derive CDI
3,301,032 UART: [art] Store in in slot 0x4
3,386,991 UART: [art] Derive Key Pair
3,387,351 UART: [art] Store priv key in slot 0x5
3,400,861 UART: [art] Derive Key Pair - Done
3,416,153 UART: [art] Signing Cert with AUTHO
3,416,633 UART: RITY.KEYID = 7
3,431,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,426 UART: [art] PUB.X = EE96D46D79646B26FED79245D6CC928DAE1CA263DCF79A81D0DF3919163F60B58FE4C4C1FCDE0A3E86CDF3AFC241F7C2
3,439,217 UART: [art] PUB.Y = 3E321FA97DA953326F3CD2F634B3B1F1E5DCC5A0FE158FB566DDE81105620350607613E4620DEBBAC179789EB00479F5
3,446,161 UART: [art] SIG.R = 497F9AAA7EC8363A39AE07F9F4BF24F0A7FBBF77E039C05877A87C9AEEA74FEC1408F18525EEA60364DC71FBFA7CB2A8
3,452,946 UART: [art] SIG.S = 4121FD3AEE0E8BA425288591B74201637B25C909AE62F967DE04C80033FE63ECDFBDBBBF7162E7F597C9512EBF6816CD
3,476,685 UART: Caliptra RT
3,477,030 UART: [state] CFI Enabled
3,585,450 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,862 UART: [rt]cmd =0x4c444556, len=4
3,626,264 >>> mbox cmd response data (687 bytes)
3,626,265 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,655,890 UART: [rt]cmd =0x49444549, len=4
3,658,434 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,930 ready_for_fw is high
1,362,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,334 >>> mbox cmd response: success
2,928,334 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,989,330 UART:
2,989,346 UART: Running Caliptra FMC ...
2,989,754 UART:
2,989,897 UART: [state] CFI Enabled
3,000,378 UART: [fht] FMC Alias Private Key: 7
3,108,123 UART: [art] Extend RT PCRs Done
3,108,551 UART: [art] Lock RT PCRs Done
3,109,837 UART: [art] Populate DV Done
3,118,030 UART: [fht] FMC Alias Private Key: 7
3,119,022 UART: [art] Derive CDI
3,119,302 UART: [art] Store in in slot 0x4
3,205,047 UART: [art] Derive Key Pair
3,205,407 UART: [art] Store priv key in slot 0x5
3,218,569 UART: [art] Derive Key Pair - Done
3,233,427 UART: [art] Signing Cert with AUTHO
3,233,907 UART: RITY.KEYID = 7
3,249,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,928 UART: [art] PUB.X = 41CCA3AAFDC8A4C06EF6ACA6592FF38A17DB4696AB774EC21230E20CB8F0957867DBD1306EB51F74C32DBA74BC58A6C8
3,256,717 UART: [art] PUB.Y = 4AA99012FFFCB06B21754443E9CEE03E1F2C0CC6A4AA3FB4FF26F0C152FE2FB991B524C0A3B06B499EDFDC5F80D44B62
3,263,688 UART: [art] SIG.R = 8B8E2FF2E0CE9EE9E7FA75AEE4F93589BD5E104D65B289728E5AC4E7E7B0187229C03205BD1A94C153B52FEC620E54B0
3,270,466 UART: [art] SIG.S = B91532959492BB390E7EFDB0CDBA1F7B2697684AF4057A10EA4D882834B7D19F582DFEA3F8267289E03E5D98039AD1B7
3,294,308 UART: Caliptra RT
3,294,653 UART: [state] CFI Enabled
3,402,969 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,533 UART: [rt]cmd =0x4c444556, len=4
3,443,867 >>> mbox cmd response data (687 bytes)
3,443,868 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,087 UART: [rt]cmd =0x49444549, len=4
3,475,373 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
893,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,229 UART: [kat] ++
897,381 UART: [kat] sha1
901,691 UART: [kat] SHA2-256
903,631 UART: [kat] SHA2-384
906,368 UART: [kat] SHA2-512-ACC
908,269 UART: [kat] ECC-384
918,072 UART: [kat] HMAC-384Kdf
922,634 UART: [kat] LMS
1,170,962 UART: [kat] --
1,171,951 UART: [cold-reset] ++
1,172,497 UART: [fht] FHT @ 0x50003400
1,175,132 UART: [idev] ++
1,175,300 UART: [idev] CDI.KEYID = 6
1,175,660 UART: [idev] SUBJECT.KEYID = 7
1,176,084 UART: [idev] UDS.KEYID = 0
1,176,429 ready_for_fw is high
1,176,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,036 UART: [idev] Erasing UDS.KEYID = 0
1,201,511 UART: [idev] Sha1 KeyId Algorithm
1,209,925 UART: [idev] --
1,210,769 UART: [ldev] ++
1,210,937 UART: [ldev] CDI.KEYID = 6
1,211,300 UART: [ldev] SUBJECT.KEYID = 5
1,211,726 UART: [ldev] AUTHORITY.KEYID = 7
1,212,189 UART: [ldev] FE.KEYID = 1
1,217,431 UART: [ldev] Erasing FE.KEYID = 1
1,244,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,383 UART: [ldev] --
1,283,844 UART: [fwproc] Wait for Commands...
1,284,462 UART: [fwproc] Recv command 0x46574c44
1,285,190 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,114 >>> mbox cmd response: success
2,777,114 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,778,194 UART: [afmc] ++
2,778,362 UART: [afmc] CDI.KEYID = 6
2,778,724 UART: [afmc] SUBJECT.KEYID = 7
2,779,149 UART: [afmc] AUTHORITY.KEYID = 5
2,814,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,084 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,803 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,619 UART: [afmc] --
2,857,733 UART: [cold-reset] --
2,858,729 UART: [state] Locking Datavault
2,859,792 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,396 UART: [state] Locking ICCM
2,860,922 UART: [exit] Launching FMC @ 0x40000130
2,866,251 UART:
2,866,267 UART: Running Caliptra FMC ...
2,866,675 UART:
2,866,729 UART: [state] CFI Enabled
2,877,250 UART: [fht] FMC Alias Private Key: 7
2,985,095 UART: [art] Extend RT PCRs Done
2,985,523 UART: [art] Lock RT PCRs Done
2,986,697 UART: [art] Populate DV Done
2,994,796 UART: [fht] FMC Alias Private Key: 7
2,995,756 UART: [art] Derive CDI
2,996,036 UART: [art] Store in in slot 0x4
3,081,589 UART: [art] Derive Key Pair
3,081,949 UART: [art] Store priv key in slot 0x5
3,095,647 UART: [art] Derive Key Pair - Done
3,110,165 UART: [art] Signing Cert with AUTHO
3,110,645 UART: RITY.KEYID = 7
3,125,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,748 UART: [art] PUB.X = D348D32E051A056EF281279B102FB565EC581C6F6C4DCA04F7C4F91FAFD8D4A93DD3FAACA6A6E53C897D4D15BF88B146
3,133,529 UART: [art] PUB.Y = 918CCF4100B3B7C8DAEEF84030B5810FF7353C3DBDC18AA73ED7CEA374A9DE870225523C6067D6020D2A5FDAF161B640
3,140,459 UART: [art] SIG.R = E8FB7D4C29B117AD5A6949C3FD13BE120BE22650CC35FCD38FAEE3E449F2E6BC3DCF283AE6597FF7623FAB05FA44D24F
3,147,249 UART: [art] SIG.S = C0DA353503ED4F29D5086FEF1502FE4335A1D92AF0010A30A170F1D1CA3362B4871E891397F13953328EFDE4DB12B1C2
3,170,863 UART: Caliptra RT
3,171,116 UART: [state] CFI Enabled
3,279,532 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,104 UART: [rt]cmd =0x4c444556, len=4
3,320,520 >>> mbox cmd response data (687 bytes)
3,320,521 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,826 UART: [rt]cmd =0x49444549, len=4
3,352,168 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,539 ready_for_fw is high
1,060,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,129 >>> mbox cmd response: success
2,629,129 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,691,053 UART:
2,691,069 UART: Running Caliptra FMC ...
2,691,477 UART:
2,691,531 UART: [state] CFI Enabled
2,702,426 UART: [fht] FMC Alias Private Key: 7
2,810,943 UART: [art] Extend RT PCRs Done
2,811,371 UART: [art] Lock RT PCRs Done
2,813,111 UART: [art] Populate DV Done
2,821,424 UART: [fht] FMC Alias Private Key: 7
2,822,386 UART: [art] Derive CDI
2,822,666 UART: [art] Store in in slot 0x4
2,908,321 UART: [art] Derive Key Pair
2,908,681 UART: [art] Store priv key in slot 0x5
2,921,433 UART: [art] Derive Key Pair - Done
2,936,268 UART: [art] Signing Cert with AUTHO
2,936,748 UART: RITY.KEYID = 7
2,952,008 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,773 UART: [art] PUB.X = 19BFE44ED652EC6AF6FCF7398F7F06BFCD83C05CF323D26D56F18EC145F1E579410488C3CD775285BC90598F1FB849F1
2,959,549 UART: [art] PUB.Y = EADF17A4CAE6C9D98C2D936A4C7284A798B1E784C0224FF963038023787BC80AC8B6D1235022065E049157A12CBCA684
2,966,489 UART: [art] SIG.R = BA94563D6B5A97C309CFD05EF3936CBF0C2BEDE225DA40CA417DD04E4A1D37DBCC5D6422B686115E30944DDCD8FDF3D9
2,973,277 UART: [art] SIG.S = 10E85F5C88B4563691EB9B011CBD8FCB582372C50B322A3DA5D13DBEBB001844B58983C0F903BEDB1BB347B87D7210E8
2,997,391 UART: Caliptra RT
2,997,644 UART: [state] CFI Enabled
3,104,811 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,205 UART: [rt]cmd =0x4c444556, len=4
3,145,695 >>> mbox cmd response data (687 bytes)
3,145,696 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,175,091 UART: [rt]cmd =0x49444549, len=4
3,177,417 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
893,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,420 UART: [kat] ++
897,572 UART: [kat] sha1
901,736 UART: [kat] SHA2-256
903,676 UART: [kat] SHA2-384
906,445 UART: [kat] SHA2-512-ACC
908,346 UART: [kat] ECC-384
918,453 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,258 UART: [cold-reset] ++
1,172,584 UART: [fht] FHT @ 0x50003400
1,175,219 UART: [idev] ++
1,175,387 UART: [idev] CDI.KEYID = 6
1,175,747 UART: [idev] SUBJECT.KEYID = 7
1,176,171 UART: [idev] UDS.KEYID = 0
1,176,516 ready_for_fw is high
1,176,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,087 UART: [idev] Erasing UDS.KEYID = 0
1,201,310 UART: [idev] Sha1 KeyId Algorithm
1,209,892 UART: [idev] --
1,210,774 UART: [ldev] ++
1,210,942 UART: [ldev] CDI.KEYID = 6
1,211,305 UART: [ldev] SUBJECT.KEYID = 5
1,211,731 UART: [ldev] AUTHORITY.KEYID = 7
1,212,194 UART: [ldev] FE.KEYID = 1
1,217,680 UART: [ldev] Erasing FE.KEYID = 1
1,244,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,350 UART: [ldev] --
1,283,775 UART: [fwproc] Wait for Commands...
1,284,351 UART: [fwproc] Recv command 0x46574c44
1,285,079 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,583 >>> mbox cmd response: success
2,776,583 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,761 UART: [afmc] ++
2,777,929 UART: [afmc] CDI.KEYID = 6
2,778,291 UART: [afmc] SUBJECT.KEYID = 7
2,778,716 UART: [afmc] AUTHORITY.KEYID = 5
2,813,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,438 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,051 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,770 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,560 UART: [afmc] --
2,857,548 UART: [cold-reset] --
2,858,198 UART: [state] Locking Datavault
2,859,213 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,817 UART: [state] Locking ICCM
2,860,331 UART: [exit] Launching FMC @ 0x40000130
2,865,660 UART:
2,865,676 UART: Running Caliptra FMC ...
2,866,084 UART:
2,866,227 UART: [state] CFI Enabled
2,876,832 UART: [fht] FMC Alias Private Key: 7
2,984,109 UART: [art] Extend RT PCRs Done
2,984,537 UART: [art] Lock RT PCRs Done
2,985,893 UART: [art] Populate DV Done
2,994,168 UART: [fht] FMC Alias Private Key: 7
2,995,264 UART: [art] Derive CDI
2,995,544 UART: [art] Store in in slot 0x4
3,081,215 UART: [art] Derive Key Pair
3,081,575 UART: [art] Store priv key in slot 0x5
3,095,549 UART: [art] Derive Key Pair - Done
3,110,162 UART: [art] Signing Cert with AUTHO
3,110,642 UART: RITY.KEYID = 7
3,126,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,813 UART: [art] PUB.X = 2D0A7C5BE43CCC62FDB179E7765BA304ED143F7B6063A40F8925C4584CA3CDEF10086E67D715347EB1D6DF29D3FF5B65
3,133,585 UART: [art] PUB.Y = E992744882E0A7AF844584B15ACE5EAEE6E61179FA011EE12EB01C4843AC6895B8AE868B38442F87C5AC26586ED4199E
3,140,538 UART: [art] SIG.R = CCFB4B70D3C3C436C5858F620D4EDAF460D22220326707F166758AA2749E1427ADE88AE7BFD2B19966A1D65BBA6EE1CC
3,147,316 UART: [art] SIG.S = BA026D635EDAA2E80F412BBD660FC0B91CB47DA9A06733C658F098D962C5CC37FD8115C9E661C3EC4679707F8601BF49
3,170,995 UART: Caliptra RT
3,171,340 UART: [state] CFI Enabled
3,279,378 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,672 UART: [rt]cmd =0x4c444556, len=4
3,320,224 >>> mbox cmd response data (687 bytes)
3,320,225 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,406 UART: [rt]cmd =0x49444549, len=4
3,351,798 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,064 ready_for_fw is high
1,061,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,268 >>> mbox cmd response: success
2,629,268 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,690,946 UART:
2,690,962 UART: Running Caliptra FMC ...
2,691,370 UART:
2,691,513 UART: [state] CFI Enabled
2,702,014 UART: [fht] FMC Alias Private Key: 7
2,810,319 UART: [art] Extend RT PCRs Done
2,810,747 UART: [art] Lock RT PCRs Done
2,812,275 UART: [art] Populate DV Done
2,820,430 UART: [fht] FMC Alias Private Key: 7
2,821,410 UART: [art] Derive CDI
2,821,690 UART: [art] Store in in slot 0x4
2,907,003 UART: [art] Derive Key Pair
2,907,363 UART: [art] Store priv key in slot 0x5
2,920,641 UART: [art] Derive Key Pair - Done
2,935,441 UART: [art] Signing Cert with AUTHO
2,935,921 UART: RITY.KEYID = 7
2,950,793 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,558 UART: [art] PUB.X = 92A6AA3D1B3C303652FFEE7ED0691A97490883FF4F2B5A3EF5ACBFC66456A8615E908204B9292F1FCE35110F18772DCC
2,958,329 UART: [art] PUB.Y = 3A9F596E1E05EB31EDF08B0250D8D2E829678044677D46993B4FE9E4AC21E72C36AA469EDDF6E495117FA057DA1D0E0F
2,965,277 UART: [art] SIG.R = 6B115FD607C7F836E36F448D008D91241EAED7B12E75F823B5D16FE315E8EE55E9F0687F9EAEF333672859495BFB680D
2,972,025 UART: [art] SIG.S = 5DEE4FE1F1CE30D8AAF0B4D0A8BEF62284B6347AEE4DB8226F40BEB8863951F5D4C360901AA99A64434B8F794143D9B5
2,995,972 UART: Caliptra RT
2,996,317 UART: [state] CFI Enabled
3,103,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,546 UART: [rt]cmd =0x4c444556, len=4
3,144,842 >>> mbox cmd response data (687 bytes)
3,144,843 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,068 UART: [rt]cmd =0x49444549, len=4
3,176,360 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,314 UART: [kat] HMAC-384Kdf
921,052 UART: [kat] LMS
1,169,364 UART: [kat] --
1,170,209 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,174,757 ready_for_fw is high
1,174,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,247 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,405 UART: [idev] --
1,209,624 UART: [ldev] ++
1,209,792 UART: [ldev] CDI.KEYID = 6
1,210,156 UART: [ldev] SUBJECT.KEYID = 5
1,210,583 UART: [ldev] AUTHORITY.KEYID = 7
1,211,046 UART: [ldev] FE.KEYID = 1
1,216,052 UART: [ldev] Erasing FE.KEYID = 1
1,242,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,152 UART: [ldev] --
1,281,616 UART: [fwproc] Wait for Commands...
1,282,275 UART: [fwproc] Recv command 0x46574c44
1,283,008 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,168 >>> mbox cmd response: success
2,772,168 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,773,195 UART: [afmc] ++
2,773,363 UART: [afmc] CDI.KEYID = 6
2,773,726 UART: [afmc] SUBJECT.KEYID = 7
2,774,152 UART: [afmc] AUTHORITY.KEYID = 5
2,809,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,120 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,839 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,774 UART: [afmc] --
2,852,816 UART: [cold-reset] --
2,853,616 UART: [state] Locking Datavault
2,854,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,551 UART: [state] Locking ICCM
2,856,195 UART: [exit] Launching FMC @ 0x40000130
2,861,524 UART:
2,861,540 UART: Running Caliptra FMC ...
2,861,948 UART:
2,862,002 UART: [state] CFI Enabled
2,872,385 UART: [fht] FMC Alias Private Key: 7
2,980,576 UART: [art] Extend RT PCRs Done
2,981,004 UART: [art] Lock RT PCRs Done
2,982,568 UART: [art] Populate DV Done
2,990,759 UART: [fht] FMC Alias Private Key: 7
2,991,847 UART: [art] Derive CDI
2,992,127 UART: [art] Store in in slot 0x4
3,077,878 UART: [art] Derive Key Pair
3,078,238 UART: [art] Store priv key in slot 0x5
3,091,374 UART: [art] Derive Key Pair - Done
3,106,440 UART: [art] Signing Cert with AUTHO
3,106,920 UART: RITY.KEYID = 7
3,121,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,745 UART: [art] PUB.X = 9C1B0918CCBB13C6BB7080B38C0072304C2B3EB7BF5AF9D88A268955D84711D48B12D0E3CC6C2312BB2DAF0C392ED1B8
3,129,501 UART: [art] PUB.Y = 373F4FF8F84C29E2480DFFBB20359CB0EE811EE25CA316BB2E785FA8D426CBB858F94CF4D81FB715C672829A2A19DD0E
3,136,463 UART: [art] SIG.R = B0D68F18349DD4569D70B28199F96BCF196A2FCD2C8CA012CEE32FFECC036F41B2B38B3EED5A2CCB12B7526C2248ACDE
3,143,254 UART: [art] SIG.S = 537C9806FE2D2603DF774CF822EB6E1F17A5B1701136E7107F388BCEA32D8ADE783CA3291923893FEE8656BE5D3AF54E
3,167,391 UART: Caliptra RT
3,167,644 UART: [state] CFI Enabled
3,275,261 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,803 UART: [rt]cmd =0x4c444556, len=4
3,316,387 >>> mbox cmd response data (687 bytes)
3,316,388 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,605 UART: [rt]cmd =0x49444549, len=4
3,347,715 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,930 ready_for_fw is high
1,055,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,216 >>> mbox cmd response: success
2,623,216 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,684,360 UART:
2,684,376 UART: Running Caliptra FMC ...
2,684,784 UART:
2,684,838 UART: [state] CFI Enabled
2,695,077 UART: [fht] FMC Alias Private Key: 7
2,802,618 UART: [art] Extend RT PCRs Done
2,803,046 UART: [art] Lock RT PCRs Done
2,804,758 UART: [art] Populate DV Done
2,812,993 UART: [fht] FMC Alias Private Key: 7
2,814,169 UART: [art] Derive CDI
2,814,449 UART: [art] Store in in slot 0x4
2,900,230 UART: [art] Derive Key Pair
2,900,590 UART: [art] Store priv key in slot 0x5
2,913,634 UART: [art] Derive Key Pair - Done
2,928,524 UART: [art] Signing Cert with AUTHO
2,929,004 UART: RITY.KEYID = 7
2,944,148 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,913 UART: [art] PUB.X = 494F33F929751D4EE225A800FBDECD93C3CB839D45A7E8690C6BF9F71F05EF2E2001FAE59A98DE655D89B9B43E546333
2,951,662 UART: [art] PUB.Y = A929BB9B7855F1F8C5C2821E18A5009D51BDB7B9DC0B13C3648B8C18F5B360BEE9DE7303CBBF60417A95CA26203A0C2D
2,958,595 UART: [art] SIG.R = F54483148FAE0B8525C9E6F67FE92869D2D84D7E97DA9D15EB6461036ED444B9AB493826D9245008EF0ED76B8557B8E9
2,965,355 UART: [art] SIG.S = 8102FBDD6EF06E2A0962A0F4600CFB28E1FB7689C32B8C6C7EC170EE49EE6674747361319987930AC9DB894677FFCBF9
2,989,192 UART: Caliptra RT
2,989,445 UART: [state] CFI Enabled
3,096,837 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,401 UART: [rt]cmd =0x4c444556, len=4
3,137,893 >>> mbox cmd response data (687 bytes)
3,137,894 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,391 UART: [rt]cmd =0x49444549, len=4
3,169,707 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,611 UART: [kat] SHA2-512-ACC
906,512 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,109 UART: [kat] LMS
1,169,421 UART: [kat] --
1,170,392 UART: [cold-reset] ++
1,170,802 UART: [fht] FHT @ 0x50003400
1,173,640 UART: [idev] ++
1,173,808 UART: [idev] CDI.KEYID = 6
1,174,169 UART: [idev] SUBJECT.KEYID = 7
1,174,594 UART: [idev] UDS.KEYID = 0
1,174,940 ready_for_fw is high
1,174,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,104 UART: [idev] Sha1 KeyId Algorithm
1,208,992 UART: [idev] --
1,209,983 UART: [ldev] ++
1,210,151 UART: [ldev] CDI.KEYID = 6
1,210,515 UART: [ldev] SUBJECT.KEYID = 5
1,210,942 UART: [ldev] AUTHORITY.KEYID = 7
1,211,405 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,243,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,753 UART: [ldev] --
1,283,243 UART: [fwproc] Wait for Commands...
1,283,842 UART: [fwproc] Recv command 0x46574c44
1,284,575 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,375 >>> mbox cmd response: success
2,776,375 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,490 UART: [afmc] ++
2,777,658 UART: [afmc] CDI.KEYID = 6
2,778,021 UART: [afmc] SUBJECT.KEYID = 7
2,778,447 UART: [afmc] AUTHORITY.KEYID = 5
2,813,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,022 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,963 UART: [afmc] --
2,857,073 UART: [cold-reset] --
2,858,017 UART: [state] Locking Datavault
2,859,108 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,712 UART: [state] Locking ICCM
2,860,260 UART: [exit] Launching FMC @ 0x40000130
2,865,589 UART:
2,865,605 UART: Running Caliptra FMC ...
2,866,013 UART:
2,866,156 UART: [state] CFI Enabled
2,876,681 UART: [fht] FMC Alias Private Key: 7
2,984,610 UART: [art] Extend RT PCRs Done
2,985,038 UART: [art] Lock RT PCRs Done
2,986,636 UART: [art] Populate DV Done
2,995,015 UART: [fht] FMC Alias Private Key: 7
2,995,971 UART: [art] Derive CDI
2,996,251 UART: [art] Store in in slot 0x4
3,081,966 UART: [art] Derive Key Pair
3,082,326 UART: [art] Store priv key in slot 0x5
3,095,698 UART: [art] Derive Key Pair - Done
3,110,563 UART: [art] Signing Cert with AUTHO
3,111,043 UART: RITY.KEYID = 7
3,126,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,786 UART: [art] PUB.X = 25CCF376238FF9A0C3AE58A6D6B6059BE557250BB02390664394073B4769ED767A799960770C6C8FD3467FE28CB2B3B4
3,133,542 UART: [art] PUB.Y = 1E6100270F8DF83C6B13F34427488B828269F27447294D7D2F486DB2E5FC68CCD0FB785480559E72E439FCB264CC7972
3,140,463 UART: [art] SIG.R = 73DB8348D86C1CEB6A1352B8E79AE398F680AC8EF926264CFC78AEF33A40F3A37DE87AF8457845B93729AC7D2846837A
3,147,241 UART: [art] SIG.S = FE03BAD108C48D8F361A84583F56F1ED5149043066CEB36EFC86DBF5420DC24CF6AA2CF4659B71BABC6BA3A197461C22
3,170,750 UART: Caliptra RT
3,171,095 UART: [state] CFI Enabled
3,279,652 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,168 UART: [rt]cmd =0x4c444556, len=4
3,320,686 >>> mbox cmd response data (687 bytes)
3,320,687 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,982 UART: [rt]cmd =0x49444549, len=4
3,352,468 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,257 ready_for_fw is high
1,056,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,551 >>> mbox cmd response: success
2,624,551 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,543 UART:
2,687,559 UART: Running Caliptra FMC ...
2,687,967 UART:
2,688,110 UART: [state] CFI Enabled
2,698,979 UART: [fht] FMC Alias Private Key: 7
2,806,464 UART: [art] Extend RT PCRs Done
2,806,892 UART: [art] Lock RT PCRs Done
2,808,400 UART: [art] Populate DV Done
2,816,499 UART: [fht] FMC Alias Private Key: 7
2,817,445 UART: [art] Derive CDI
2,817,725 UART: [art] Store in in slot 0x4
2,903,530 UART: [art] Derive Key Pair
2,903,890 UART: [art] Store priv key in slot 0x5
2,917,446 UART: [art] Derive Key Pair - Done
2,931,830 UART: [art] Signing Cert with AUTHO
2,932,310 UART: RITY.KEYID = 7
2,947,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,467 UART: [art] PUB.X = 4EDB8CA8D86483B3D11E85A6E0CA13EB9CD7D38A9184B5943AAF0B351C1325DA81850320E59ACBBD7B8D7D00424C664C
2,955,223 UART: [art] PUB.Y = 57C0AEAFBD58E547BA40CC99741C1CA368F73B5DFF2BF3DA61BDB24C1C10BC18C44D61437F8C2E176535387192201397
2,962,183 UART: [art] SIG.R = AAD32D14D011805FFB9B8090B1B4ECDB9C89BE61B6D49D198992D3BCCEBA9A2AEDD570051B686AB7F630DCDB96DA37A9
2,968,976 UART: [art] SIG.S = DED761DFBCDA90ACE488CAE3E4CD020785338C82D3BF6F5521709A0CD66E1AF78696BBE5434534FCE33DD183A3D221D0
2,992,698 UART: Caliptra RT
2,993,043 UART: [state] CFI Enabled
3,100,639 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,991 UART: [rt]cmd =0x4c444556, len=4
3,141,377 >>> mbox cmd response data (687 bytes)
3,141,378 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,581 UART: [rt]cmd =0x49444549, len=4
3,172,763 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,031 UART:
192,430 UART: Running Caliptra ROM ...
193,629 UART:
193,788 UART: [state] CFI Enabled
262,726 UART: [state] LifecycleState = Unprovisioned
264,654 UART: [state] DebugLocked = No
266,824 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,706 UART: [kat] SHA2-256
441,472 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,936 UART: [kat] ++
452,392 UART: [kat] sha1
463,620 UART: [kat] SHA2-256
466,270 UART: [kat] SHA2-384
470,838 UART: [kat] SHA2-512-ACC
473,203 UART: [kat] ECC-384
2,769,303 UART: [kat] HMAC-384Kdf
2,800,653 UART: [kat] LMS
3,990,984 UART: [kat] --
3,996,563 UART: [cold-reset] ++
3,997,936 UART: [fht] Storing FHT @ 0x50003400
4,009,135 UART: [idev] ++
4,009,712 UART: [idev] CDI.KEYID = 6
4,010,642 UART: [idev] SUBJECT.KEYID = 7
4,011,890 UART: [idev] UDS.KEYID = 0
4,012,938 ready_for_fw is high
4,013,145 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,665 UART: [idev] Erasing UDS.KEYID = 0
7,344,179 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,085 UART: [idev] --
7,369,246 UART: [ldev] ++
7,369,871 UART: [ldev] CDI.KEYID = 6
7,370,752 UART: [ldev] SUBJECT.KEYID = 5
7,372,016 UART: [ldev] AUTHORITY.KEYID = 7
7,373,323 UART: [ldev] FE.KEYID = 1
7,399,797 UART: [ldev] Erasing FE.KEYID = 1
10,733,584 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,658 UART: [ldev] --
13,114,921 UART: [fwproc] Waiting for Commands...
13,117,932 UART: [fwproc] Received command 0x46574c44
13,120,111 UART: [fwproc] Received Image of size 114124 bytes
17,167,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,378 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,283 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,630,819 >>> mbox cmd response: success
17,631,343 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,635,874 UART: [afmc] ++
17,636,473 UART: [afmc] CDI.KEYID = 6
17,637,386 UART: [afmc] SUBJECT.KEYID = 7
17,638,602 UART: [afmc] AUTHORITY.KEYID = 5
21,006,489 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,483 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,740 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,195 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,333,981 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,442 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,368,992 UART: [afmc] --
23,373,182 UART: [cold-reset] --
23,379,044 UART: [state] Locking Datavault
23,386,290 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,983 UART: [state] Locking ICCM
23,390,228 UART: [exit] Launching FMC @ 0x40000130
23,398,578 UART:
23,398,820 UART: Running Caliptra FMC ...
23,399,850 UART:
23,399,997 UART: [state] CFI Enabled
23,463,731 UART: [fht] FMC Alias Private Key: 7
25,802,201 UART: [art] Extend RT PCRs Done
25,803,428 UART: [art] Lock RT PCRs Done
25,804,933 UART: [art] Populate DV Done
25,810,183 UART: [fht] FMC Alias Private Key: 7
25,811,881 UART: [art] Derive CDI
25,812,617 UART: [art] Store in in slot 0x4
25,872,229 UART: [art] Derive Key Pair
25,873,274 UART: [art] Store priv key in slot 0x5
29,165,761 UART: [art] Derive Key Pair - Done
29,178,761 UART: [art] Signing Cert with AUTHO
29,180,072 UART: RITY.KEYID = 7
31,466,922 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,432 UART: [art] PUB.X = F6311443491C8D255EAAEDA128043DFC7046C72BC144CE1C22E160D5EE640EF6D4E4A4EF0356AAE964D6538562DC751E
31,475,702 UART: [art] PUB.Y = B1C78FCB613999E0FB320CD195AC8399F42B8A8805146429F6408EBC811152F968FB80A0AA469A421789AF145ACB8AA8
31,482,880 UART: [art] SIG.R = 038EF35CBC6A65E9A4EC3E2E27A320AA436D039555AB6694ED490FC80ECF5D7B35D1D3B3EA245156440513EE020EF0C5
31,490,272 UART: [art] SIG.S = 645DA60E900E431CB4AA38177E8DEBA7316F9EB23072163F7C75136635D45E0F87C9B3E3F3374D526CBC473A2BF11D87
32,795,808 UART: Caliptra RT
32,796,520 UART: [state] CFI Enabled
32,957,563 UART: [rt] RT listening for mailbox commands...
32,988,605 UART: [rt]cmd =0x43455246, len=4
33,001,626 >>> mbox cmd response data (920 bytes)
33,044,256 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,074,011 UART: [rt]cmd =0x43455252, len=4
33,085,444 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,782,476 ready_for_fw is high
3,782,873 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,860,199 >>> mbox cmd response: success
17,860,786 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,563,359 UART:
23,563,737 UART: Running Caliptra FMC ...
23,564,942 UART:
23,565,114 UART: [state] CFI Enabled
23,631,306 UART: [fht] FMC Alias Private Key: 7
25,969,127 UART: [art] Extend RT PCRs Done
25,970,388 UART: [art] Lock RT PCRs Done
25,972,017 UART: [art] Populate DV Done
25,977,437 UART: [fht] FMC Alias Private Key: 7
25,979,141 UART: [art] Derive CDI
25,979,957 UART: [art] Store in in slot 0x4
26,042,079 UART: [art] Derive Key Pair
26,043,137 UART: [art] Store priv key in slot 0x5
29,335,495 UART: [art] Derive Key Pair - Done
29,348,462 UART: [art] Signing Cert with AUTHO
29,349,802 UART: RITY.KEYID = 7
31,637,182 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,687 UART: [art] PUB.X = 3588051AB94756C0987288B4FF0BD88D7B53613E11082A8C17E49B62194833E655D16EDA70A6B4B37B9A00CDCCBBDFE3
31,645,904 UART: [art] PUB.Y = DFBACA9AD2FD14D71E621C4D23D23040D337FAC90AF172941CE15E7A46A2811BA126D68A0BBAD53552DD40B527D9039A
31,653,216 UART: [art] SIG.R = 89930B97731B269597576247C8C2F103F63CB8C364CDF332D6B3B9583D288FDC51F24F039ACB1CD7F7E5C2EA10925034
31,660,580 UART: [art] SIG.S = C744C02935058C0C24D455F158CCD08449D5A30BDE4994537A7BB79B51580A73D9041868C1AB858E99593EE38F24982F
32,965,572 UART: Caliptra RT
32,966,286 UART: [state] CFI Enabled
33,126,792 UART: [rt] RT listening for mailbox commands...
33,158,044 UART: [rt]cmd =0x43455246, len=4
33,171,189 >>> mbox cmd response data (920 bytes)
33,213,836 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,244,069 UART: [rt]cmd =0x43455252, len=4
33,255,378 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,489 UART:
192,853 UART: Running Caliptra ROM ...
193,966 UART:
603,831 UART: [state] CFI Enabled
616,889 UART: [state] LifecycleState = Unprovisioned
618,854 UART: [state] DebugLocked = No
620,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,320 UART: [kat] SHA2-256
795,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,635 UART: [kat] ++
806,116 UART: [kat] sha1
817,764 UART: [kat] SHA2-256
820,476 UART: [kat] SHA2-384
826,483 UART: [kat] SHA2-512-ACC
828,816 UART: [kat] ECC-384
3,113,952 UART: [kat] HMAC-384Kdf
3,125,998 UART: [kat] LMS
4,316,041 UART: [kat] --
4,320,484 UART: [cold-reset] ++
4,323,058 UART: [fht] Storing FHT @ 0x50003400
4,335,114 UART: [idev] ++
4,335,676 UART: [idev] CDI.KEYID = 6
4,336,580 UART: [idev] SUBJECT.KEYID = 7
4,337,818 UART: [idev] UDS.KEYID = 0
4,338,865 ready_for_fw is high
4,339,101 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,494 UART: [idev] Erasing UDS.KEYID = 0
7,620,816 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,768 UART: [idev] --
7,646,697 UART: [ldev] ++
7,647,274 UART: [ldev] CDI.KEYID = 6
7,648,306 UART: [ldev] SUBJECT.KEYID = 5
7,649,406 UART: [ldev] AUTHORITY.KEYID = 7
7,650,683 UART: [ldev] FE.KEYID = 1
7,662,620 UART: [ldev] Erasing FE.KEYID = 1
10,948,289 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,599 UART: [ldev] --
13,307,721 UART: [fwproc] Waiting for Commands...
13,309,605 UART: [fwproc] Received command 0x46574c44
13,311,782 UART: [fwproc] Received Image of size 114124 bytes
17,367,924 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,970 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,878 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,827,405 >>> mbox cmd response: success
17,827,911 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,831,562 UART: [afmc] ++
17,832,201 UART: [afmc] CDI.KEYID = 6
17,833,104 UART: [afmc] SUBJECT.KEYID = 7
17,834,374 UART: [afmc] AUTHORITY.KEYID = 5
21,148,067 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,055 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,365 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,703 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,552 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,015 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,784 UART: [afmc] --
23,515,638 UART: [cold-reset] --
23,519,763 UART: [state] Locking Datavault
23,524,084 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,855 UART: [state] Locking ICCM
23,527,942 UART: [exit] Launching FMC @ 0x40000130
23,536,339 UART:
23,536,580 UART: Running Caliptra FMC ...
23,537,682 UART:
23,537,838 UART: [state] CFI Enabled
23,546,269 UART: [fht] FMC Alias Private Key: 7
25,877,561 UART: [art] Extend RT PCRs Done
25,878,769 UART: [art] Lock RT PCRs Done
25,880,410 UART: [art] Populate DV Done
25,885,760 UART: [fht] FMC Alias Private Key: 7
25,887,360 UART: [art] Derive CDI
25,888,116 UART: [art] Store in in slot 0x4
25,931,025 UART: [art] Derive Key Pair
25,932,023 UART: [art] Store priv key in slot 0x5
29,174,935 UART: [art] Derive Key Pair - Done
29,187,731 UART: [art] Signing Cert with AUTHO
29,189,027 UART: RITY.KEYID = 7
31,468,321 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,842 UART: [art] PUB.X = 0793217522941461CD53580ED6F1867DBAAFADC9E4BBE0D8CB1E7D627E98F8EEB8B52EC9AF540847855565453B7FCC05
31,477,079 UART: [art] PUB.Y = 90B89A29367C8D1AEB09AFAB157806CCFB647245CA5F3017AE4D4BE0D414935F981C35230DE49A6E71666F1253F43745
31,484,310 UART: [art] SIG.R = C2824E326B4FE762FA9E082DE1CB574BC8EB5C354742F4D6D05CF583DE9D06EA8BC8347987E9F7602DF1799B90F95211
31,491,689 UART: [art] SIG.S = 0F60645DE13954F4F30D1DC28D0409C5D193D2E182D1FAC9313789185531B516D1C22A4E2BA2FF0297E238BF1AABC257
32,796,181 UART: Caliptra RT
32,796,913 UART: [state] CFI Enabled
32,914,747 UART: [rt] RT listening for mailbox commands...
32,946,219 UART: [rt]cmd =0x43455246, len=4
32,959,135 >>> mbox cmd response data (920 bytes)
33,002,405 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,032,235 UART: [rt]cmd =0x43455252, len=4
33,043,760 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
4,129,076 ready_for_fw is high
4,129,645 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,385 >>> mbox cmd response: success
18,066,998 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,709,418 UART:
23,709,824 UART: Running Caliptra FMC ...
23,711,139 UART:
23,711,301 UART: [state] CFI Enabled
23,718,924 UART: [fht] FMC Alias Private Key: 7
26,049,461 UART: [art] Extend RT PCRs Done
26,050,693 UART: [art] Lock RT PCRs Done
26,052,323 UART: [art] Populate DV Done
26,057,792 UART: [fht] FMC Alias Private Key: 7
26,059,391 UART: [art] Derive CDI
26,060,207 UART: [art] Store in in slot 0x4
26,102,435 UART: [art] Derive Key Pair
26,103,500 UART: [art] Store priv key in slot 0x5
29,345,327 UART: [art] Derive Key Pair - Done
29,358,493 UART: [art] Signing Cert with AUTHO
29,359,825 UART: RITY.KEYID = 7
31,639,361 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,863 UART: [art] PUB.X = A485777D2788358109A4A7844FE2C6767F67D759011301D5D5DC42FB0512C580A7CBABD1FF126B4C5BD853186B65CEAC
31,648,101 UART: [art] PUB.Y = 8F06F2784BA4F39C5B0CC5B465397F36B845903F0041B4753B7AA1DB37FFCF9AEFC1FD57B9E7235D7CA699016B29FD53
31,655,383 UART: [art] SIG.R = F029EFE2225C8F05843D97146A7E8215DEAE6951EE6A17C8D29F95B66BCA2B066FB1D3B9C2DEB4FE13E2AD03B8C6133F
31,662,779 UART: [art] SIG.S = 24C2B690E6D6C8C7DD5440B3F77901D7566C25E06BDCC04645A24853BE622D2A793CBB5589BAC061616AAB61FE6A3BE7
32,967,724 UART: Caliptra RT
32,968,436 UART: [state] CFI Enabled
33,086,141 UART: [rt] RT listening for mailbox commands...
33,117,433 UART: [rt]cmd =0x43455246, len=4
33,130,330 >>> mbox cmd response data (920 bytes)
33,173,367 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,203,280 UART: [rt]cmd =0x43455252, len=4
33,214,551 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,092 UART:
192,464 UART: Running Caliptra ROM ...
193,565 UART:
193,710 UART: [state] CFI Enabled
263,959 UART: [state] LifecycleState = Unprovisioned
265,786 UART: [state] DebugLocked = No
267,676 UART: [state] WD Timer not started. Device not locked for debugging
271,492 UART: [kat] SHA2-256
450,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,201 UART: [kat] ++
462,729 UART: [kat] sha1
473,472 UART: [kat] SHA2-256
476,474 UART: [kat] SHA2-384
481,623 UART: [kat] SHA2-512-ACC
484,558 UART: [kat] ECC-384
2,926,626 UART: [kat] HMAC-384Kdf
2,952,362 UART: [kat] LMS
3,481,765 UART: [kat] --
3,487,181 UART: [cold-reset] ++
3,488,896 UART: [fht] FHT @ 0x50003400
3,499,946 UART: [idev] ++
3,500,508 UART: [idev] CDI.KEYID = 6
3,501,419 UART: [idev] SUBJECT.KEYID = 7
3,502,592 UART: [idev] UDS.KEYID = 0
3,503,520 ready_for_fw is high
3,503,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,647,657 UART: [idev] Erasing UDS.KEYID = 0
6,005,561 UART: [idev] Sha1 KeyId Algorithm
6,028,138 UART: [idev] --
6,030,833 UART: [ldev] ++
6,031,416 UART: [ldev] CDI.KEYID = 6
6,032,332 UART: [ldev] SUBJECT.KEYID = 5
6,033,492 UART: [ldev] AUTHORITY.KEYID = 7
6,034,781 UART: [ldev] FE.KEYID = 1
6,081,533 UART: [ldev] Erasing FE.KEYID = 1
8,586,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,285 UART: [ldev] --
10,391,143 UART: [fwproc] Wait for Commands...
10,393,829 UART: [fwproc] Recv command 0x46574c44
10,395,920 UART: [fwproc] Recv'd Img size: 114448 bytes
13,806,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,878,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,947,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,266,187 >>> mbox cmd response: success
14,266,692 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,270,874 UART: [afmc] ++
14,271,458 UART: [afmc] CDI.KEYID = 6
14,272,345 UART: [afmc] SUBJECT.KEYID = 7
14,273,562 UART: [afmc] AUTHORITY.KEYID = 5
16,808,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,030 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,030 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,955 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,069 UART: [afmc] --
18,608,749 UART: [cold-reset] --
18,612,574 UART: [state] Locking Datavault
18,616,794 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,434 UART: [state] Locking ICCM
18,620,312 UART: [exit] Launching FMC @ 0x40000130
18,628,707 UART:
18,628,947 UART: Running Caliptra FMC ...
18,630,049 UART:
18,630,216 UART: [state] CFI Enabled
18,690,069 UART: [fht] FMC Alias Private Key: 7
20,454,431 UART: [art] Extend RT PCRs Done
20,455,653 UART: [art] Lock RT PCRs Done
20,457,225 UART: [art] Populate DV Done
20,462,692 UART: [fht] FMC Alias Private Key: 7
20,464,334 UART: [art] Derive CDI
20,465,145 UART: [art] Store in in slot 0x4
20,522,541 UART: [art] Derive Key Pair
20,523,600 UART: [art] Store priv key in slot 0x5
22,986,306 UART: [art] Derive Key Pair - Done
22,999,464 UART: [art] Signing Cert with AUTHO
23,000,762 UART: RITY.KEYID = 7
24,711,674 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,181 UART: [art] PUB.X = 8EBAA7F2C836EFB10BD4A462EBBF631A26D628E1E62E4AA43D44400DC101A8E9E9423BA5DC96B04B23510C50E5A4144A
24,720,484 UART: [art] PUB.Y = 5A7EEEADB0A2F423D53498BC7CFC2E042317F394C9F442F5D169AD95214C8783946E9F305665365882F03C0918011633
24,727,731 UART: [art] SIG.R = EDA15307444D7B43F2E21E288F334FE86990946B62900620EA070E0568A949801DFA2143139CBAEE9F5350060C5C0961
24,735,081 UART: [art] SIG.S = B94067F4571EF6A103105A59F06D44BE39260842955C55568572B82CE35C4F42F4E1B4AFA209ADA621A988DB8F2EB754
25,713,607 UART: Caliptra RT
25,714,317 UART: [state] CFI Enabled
25,879,214 UART: [rt] RT listening for mailbox commands...
25,910,847 UART: [rt]cmd =0x43455246, len=4
25,923,661 >>> mbox cmd response data (887 bytes)
25,966,571 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,996,420 UART: [rt]cmd =0x43455252, len=4
26,007,810 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,360,336 ready_for_fw is high
3,361,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,064,450 >>> mbox cmd response: success
14,065,432 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,346,920 UART:
18,347,297 UART: Running Caliptra FMC ...
18,348,439 UART:
18,348,622 UART: [state] CFI Enabled
18,412,324 UART: [fht] FMC Alias Private Key: 7
20,176,116 UART: [art] Extend RT PCRs Done
20,177,342 UART: [art] Lock RT PCRs Done
20,179,237 UART: [art] Populate DV Done
20,184,481 UART: [fht] FMC Alias Private Key: 7
20,186,020 UART: [art] Derive CDI
20,186,837 UART: [art] Store in in slot 0x4
20,245,194 UART: [art] Derive Key Pair
20,246,220 UART: [art] Store priv key in slot 0x5
22,709,687 UART: [art] Derive Key Pair - Done
22,722,686 UART: [art] Signing Cert with AUTHO
22,723,997 UART: RITY.KEYID = 7
24,434,900 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,398 UART: [art] PUB.X = 49E94D7ECCD64F97380C9C87F7AFAF128FEAA6AAE174EFBFA9EA585AF8205FB7A916BEB470444B62D637524A155689FD
24,443,727 UART: [art] PUB.Y = 7BBB70057CEFD230D8427949DCCB547EAE8E9444AA5FD8478F3EF658135E916F7C96BB7921C7C75CD7EAEE0D816D34FA
24,451,004 UART: [art] SIG.R = 1EA9B4DF5D2267B6992C734DF061E2EC40EE5BBCF37CCFD1AA45FB3AD8A09C16582598D600559527905BE95AE64F4B83
24,458,415 UART: [art] SIG.S = 43761F2F85A9EE8E72941C4D817DD15F2DE5F2759C0B7CB0B08F2F649C6BBC1AC6ED4808D197DBB7FD5D841D48338213
25,437,247 UART: Caliptra RT
25,437,976 UART: [state] CFI Enabled
25,603,521 UART: [rt] RT listening for mailbox commands...
25,634,780 UART: [rt]cmd =0x43455246, len=4
25,647,327 >>> mbox cmd response data (887 bytes)
25,689,579 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,719,434 UART: [rt]cmd =0x43455252, len=4
25,730,965 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,343 UART:
192,714 UART: Running Caliptra ROM ...
193,844 UART:
603,321 UART: [state] CFI Enabled
616,835 UART: [state] LifecycleState = Unprovisioned
618,711 UART: [state] DebugLocked = No
620,007 UART: [state] WD Timer not started. Device not locked for debugging
623,601 UART: [kat] SHA2-256
802,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,273 UART: [kat] ++
814,716 UART: [kat] sha1
825,932 UART: [kat] SHA2-256
829,004 UART: [kat] SHA2-384
836,698 UART: [kat] SHA2-512-ACC
839,599 UART: [kat] ECC-384
3,282,549 UART: [kat] HMAC-384Kdf
3,296,180 UART: [kat] LMS
3,825,702 UART: [kat] --
3,831,985 UART: [cold-reset] ++
3,832,984 UART: [fht] FHT @ 0x50003400
3,845,088 UART: [idev] ++
3,845,660 UART: [idev] CDI.KEYID = 6
3,846,578 UART: [idev] SUBJECT.KEYID = 7
3,847,741 UART: [idev] UDS.KEYID = 0
3,848,781 ready_for_fw is high
3,848,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,805 UART: [idev] Erasing UDS.KEYID = 0
6,322,237 UART: [idev] Sha1 KeyId Algorithm
6,345,394 UART: [idev] --
6,350,600 UART: [ldev] ++
6,351,169 UART: [ldev] CDI.KEYID = 6
6,352,097 UART: [ldev] SUBJECT.KEYID = 5
6,353,255 UART: [ldev] AUTHORITY.KEYID = 7
6,354,529 UART: [ldev] FE.KEYID = 1
6,365,056 UART: [ldev] Erasing FE.KEYID = 1
8,839,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,226 UART: [ldev] --
10,630,455 UART: [fwproc] Wait for Commands...
10,631,947 UART: [fwproc] Recv command 0x46574c44
10,634,028 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,495,624 >>> mbox cmd response: success
14,496,128 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,500,365 UART: [afmc] ++
14,500,943 UART: [afmc] CDI.KEYID = 6
14,501,827 UART: [afmc] SUBJECT.KEYID = 7
14,503,030 UART: [afmc] AUTHORITY.KEYID = 5
17,003,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,194 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,224 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,063 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,675 UART: [afmc] --
18,800,318 UART: [cold-reset] --
18,804,601 UART: [state] Locking Datavault
18,811,293 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,195 UART: [state] Locking ICCM
18,814,897 UART: [exit] Launching FMC @ 0x40000130
18,823,297 UART:
18,823,526 UART: Running Caliptra FMC ...
18,824,618 UART:
18,824,776 UART: [state] CFI Enabled
18,833,148 UART: [fht] FMC Alias Private Key: 7
20,590,435 UART: [art] Extend RT PCRs Done
20,591,657 UART: [art] Lock RT PCRs Done
20,593,249 UART: [art] Populate DV Done
20,598,329 UART: [fht] FMC Alias Private Key: 7
20,599,861 UART: [art] Derive CDI
20,600,588 UART: [art] Store in in slot 0x4
20,643,760 UART: [art] Derive Key Pair
20,644,746 UART: [art] Store priv key in slot 0x5
23,071,304 UART: [art] Derive Key Pair - Done
23,084,532 UART: [art] Signing Cert with AUTHO
23,085,828 UART: RITY.KEYID = 7
24,791,371 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,867 UART: [art] PUB.X = 41FFBFB8A5C11CBAD53CBF20838D54529CBC42D40020BA96CC31010DF07A401C77363374990373BC97C5599364A92749
24,800,102 UART: [art] PUB.Y = CFA0102CA88A4A8D29692380500A0EDEF870B7B6D71B197518E2CD9BBA314DD1C709A9AEB254E3FBF4DD1422EDC74837
24,807,374 UART: [art] SIG.R = F828EAF8C2A1C48D0520E92CA2A6F75C1A6A67B93FA05C0E6AD24D2B1D23526150BDF70D90291BCD33A661C88B31AEF7
24,814,798 UART: [art] SIG.S = 7AF2A7BA4714BD062EF7D1554D4DFF8383224B47E73E0E44E2DE26CD62B92B37694C40EAFEC8E47A5C98F177DA99CBDD
25,793,507 UART: Caliptra RT
25,794,198 UART: [state] CFI Enabled
25,912,053 UART: [rt] RT listening for mailbox commands...
25,943,234 UART: [rt]cmd =0x43455246, len=4
25,956,120 >>> mbox cmd response data (887 bytes)
25,998,884 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,028,819 UART: [rt]cmd =0x43455252, len=4
26,040,054 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,696,212 ready_for_fw is high
3,696,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,570 >>> mbox cmd response: success
14,275,293 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,523,381 UART:
18,523,845 UART: Running Caliptra FMC ...
18,524,958 UART:
18,525,107 UART: [state] CFI Enabled
18,532,781 UART: [fht] FMC Alias Private Key: 7
20,290,411 UART: [art] Extend RT PCRs Done
20,291,640 UART: [art] Lock RT PCRs Done
20,293,157 UART: [art] Populate DV Done
20,298,626 UART: [fht] FMC Alias Private Key: 7
20,300,273 UART: [art] Derive CDI
20,301,087 UART: [art] Store in in slot 0x4
20,343,851 UART: [art] Derive Key Pair
20,344,891 UART: [art] Store priv key in slot 0x5
22,771,703 UART: [art] Derive Key Pair - Done
22,784,939 UART: [art] Signing Cert with AUTHO
22,786,252 UART: RITY.KEYID = 7
24,491,598 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,098 UART: [art] PUB.X = 8F84B7404C736DD38DC561C4BAC3559A7E7F05E2C8938B9C342D5F0D7AD140A6697D20D57EF9DF272A5795BAD1E2887D
24,500,352 UART: [art] PUB.Y = FB99DFB1A9C61A3D9DD7FEAFB7DB0D4C4C570F81FA8F3A812B59E4EEC56A51423A7C0E81D9CED138DDC8B799D0C9ED39
24,507,660 UART: [art] SIG.R = EA9B788A703D4C80996FB539DE93FB2A5FE422B499D2BCB377B89550C98A7B22A63F16B30F78DE2F303EEDAB2472CC93
24,515,064 UART: [art] SIG.S = C34C686C17EA5784C085C84A2A6407CFC129441ED78F172B4E3D37256CC7BA4A996EF3CBA3D201FD359A4BC7BB566350
25,494,002 UART: Caliptra RT
25,494,700 UART: [state] CFI Enabled
25,612,028 UART: [rt] RT listening for mailbox commands...
25,643,534 UART: [rt]cmd =0x43455246, len=4
25,656,158 >>> mbox cmd response data (887 bytes)
25,698,493 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,728,596 UART: [rt]cmd =0x43455252, len=4
25,739,932 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,439,221 ready_for_fw is high
3,439,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,724,299 >>> mbox cmd response: success
14,725,101 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,005,649 UART:
19,006,038 UART: Running Caliptra FMC ...
19,007,242 UART:
19,007,437 UART: [state] CFI Enabled
19,072,373 UART: [fht] FMC Alias Private Key: 7
20,836,035 UART: [art] Extend RT PCRs Done
20,837,263 UART: [art] Lock RT PCRs Done
20,838,782 UART: [art] Populate DV Done
20,844,310 UART: [fht] FMC Alias Private Key: 7
20,845,962 UART: [art] Derive CDI
20,846,790 UART: [art] Store in in slot 0x4
20,904,562 UART: [art] Derive Key Pair
20,905,562 UART: [art] Store priv key in slot 0x5
23,368,739 UART: [art] Derive Key Pair - Done
23,381,627 UART: [art] Signing Cert with AUTHO
23,382,928 UART: RITY.KEYID = 7
25,094,278 UART: [art] Erasing AUTHORITY.KEYID = 7
25,095,786 UART: [art] PUB.X = E93EDB69D4908EA7508022AE031A767C58491AC4B7B1306386EBDFB79E8B059733960623CF00EC8DBA7A14C78ADC18F2
25,103,035 UART: [art] PUB.Y = DBD57F888809D38C035987EFA870824B9DA26968475380E15B499CF16C20CD4ADB94010F4743C69AD6C088526DAF1FB0
25,110,238 UART: [art] SIG.R = 0072A24605F237658A75017BD63C6D20E6CDE7B8697F9B00F5E2C24F512CAD8CC4F09875C73AE9349BE0F0873BA3035C
25,117,571 UART: [art] SIG.S = F7ADF659ED6CA1DE2FF092059ED4D4A63F2B4C871AEB21F11826756E98AA9E27675279482007B17DF0EEE9CE76AA0B3F
26,096,199 UART: Caliptra RT
26,096,889 UART: [state] CFI Enabled
26,261,407 UART: [rt] RT listening for mailbox commands...
26,292,743 UART: [rt]cmd =0x43455246, len=4
26,305,494 >>> mbox cmd response data (887 bytes)
26,348,184 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,378,116 UART: [rt]cmd =0x43455252, len=4
26,389,600 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,752,632 ready_for_fw is high
3,753,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,949,203 >>> mbox cmd response: success
14,949,995 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,198,055 UART:
19,198,496 UART: Running Caliptra FMC ...
19,199,612 UART:
19,199,769 UART: [state] CFI Enabled
19,207,833 UART: [fht] FMC Alias Private Key: 7
20,964,926 UART: [art] Extend RT PCRs Done
20,966,148 UART: [art] Lock RT PCRs Done
20,967,634 UART: [art] Populate DV Done
20,972,937 UART: [fht] FMC Alias Private Key: 7
20,974,634 UART: [art] Derive CDI
20,975,364 UART: [art] Store in in slot 0x4
21,017,646 UART: [art] Derive Key Pair
21,018,694 UART: [art] Store priv key in slot 0x5
23,445,210 UART: [art] Derive Key Pair - Done
23,458,315 UART: [art] Signing Cert with AUTHO
23,459,617 UART: RITY.KEYID = 7
25,165,235 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,759 UART: [art] PUB.X = DE0A1CB505CCE179F801331C306C8A2BE54BDA69EBD20B5ABFCD12E45205BF015A634FEDFD3931E49511D1F372BAAE8A
25,174,009 UART: [art] PUB.Y = A448C50FF2EFF4F879D16A0FBC97A8A29A831BB84AB1849EA78D2014A86CD553057C2BEBCD05B8D4BEBF7CA2DF0F3C4C
25,181,322 UART: [art] SIG.R = 9FAB49906DDCB1212962D662581B2C5781F297FE4E6F11CBDBA48AFC5C7C3EF360D80359231610E713268EFDD5ECD564
25,188,705 UART: [art] SIG.S = D89A8DEA31EAEBA9864D6241E543529BDADA5B6C8855F81DF0719C869074CA63F17C3333AC7E076C3BBC8C5E15A7A514
26,167,314 UART: Caliptra RT
26,168,004 UART: [state] CFI Enabled
26,285,296 UART: [rt] RT listening for mailbox commands...
26,316,172 UART: [rt]cmd =0x43455246, len=4
26,328,709 >>> mbox cmd response data (887 bytes)
26,371,766 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,401,805 UART: [rt]cmd =0x43455252, len=4
26,413,143 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Unprovisioned
86,231 UART: [state] DebugLocked = No
86,879 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,435 UART: [kat] SHA2-256
882,366 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,481 UART: [kat] ++
886,633 UART: [kat] sha1
890,971 UART: [kat] SHA2-256
892,909 UART: [kat] SHA2-384
895,668 UART: [kat] SHA2-512-ACC
897,569 UART: [kat] ECC-384
902,822 UART: [kat] HMAC-384Kdf
907,450 UART: [kat] LMS
1,475,646 UART: [kat] --
1,476,587 UART: [cold-reset] ++
1,477,045 UART: [fht] Storing FHT @ 0x50003400
1,480,064 UART: [idev] ++
1,480,232 UART: [idev] CDI.KEYID = 6
1,480,592 UART: [idev] SUBJECT.KEYID = 7
1,481,016 UART: [idev] UDS.KEYID = 0
1,481,361 ready_for_fw is high
1,481,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,888 UART: [idev] Erasing UDS.KEYID = 0
1,505,632 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,398 UART: [idev] --
1,515,493 UART: [ldev] ++
1,515,661 UART: [ldev] CDI.KEYID = 6
1,516,024 UART: [ldev] SUBJECT.KEYID = 5
1,516,450 UART: [ldev] AUTHORITY.KEYID = 7
1,516,913 UART: [ldev] FE.KEYID = 1
1,522,183 UART: [ldev] Erasing FE.KEYID = 1
1,548,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,428 UART: [ldev] --
1,587,725 UART: [fwproc] Waiting for Commands...
1,588,580 UART: [fwproc] Received command 0x46574c44
1,589,371 UART: [fwproc] Received Image of size 114448 bytes
2,888,450 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,724 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,076 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,075 >>> mbox cmd response: success
3,081,075 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,082,135 UART: [afmc] ++
3,082,303 UART: [afmc] CDI.KEYID = 6
3,082,665 UART: [afmc] SUBJECT.KEYID = 7
3,083,090 UART: [afmc] AUTHORITY.KEYID = 5
3,117,739 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,695 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,475 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,203 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,088 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,778 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,609 UART: [afmc] --
3,160,683 UART: [cold-reset] --
3,161,533 UART: [state] Locking Datavault
3,162,828 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,432 UART: [state] Locking ICCM
3,164,060 UART: [exit] Launching FMC @ 0x40000130
3,169,389 UART:
3,169,405 UART: Running Caliptra FMC ...
3,169,813 UART:
3,169,867 UART: [state] CFI Enabled
3,180,244 UART: [fht] FMC Alias Private Key: 7
3,288,407 UART: [art] Extend RT PCRs Done
3,288,835 UART: [art] Lock RT PCRs Done
3,290,483 UART: [art] Populate DV Done
3,298,646 UART: [fht] FMC Alias Private Key: 7
3,299,786 UART: [art] Derive CDI
3,300,066 UART: [art] Store in in slot 0x4
3,385,797 UART: [art] Derive Key Pair
3,386,157 UART: [art] Store priv key in slot 0x5
3,398,851 UART: [art] Derive Key Pair - Done
3,413,675 UART: [art] Signing Cert with AUTHO
3,414,155 UART: RITY.KEYID = 7
3,429,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,142 UART: [art] PUB.X = 042BB79C4E3F2050844913AA98D51E522CF473640D396CADE341E5A849CED0E131D95911E8DB5A2EEA56B568FDD96339
3,436,912 UART: [art] PUB.Y = 30EA7C9BF88DBF38D5B209A5FA120F00C793286DEFF9F626D75EFC6A61DAB165E27F4AB34CA1AD3600303F0238C78429
3,443,823 UART: [art] SIG.R = 24FBE8A917157EE6FA6927B40525342C053E5F6FF1319ED14787A1295A9BD35C9D4475E0AD9BF25E43E268F0842B54E0
3,450,589 UART: [art] SIG.S = 9476B22F209EC0010325D519A05F4A35C7B29F3BE876D4E45C496B527AAE3B1197E526D36884AB9381B750AFEAB52B22
3,474,344 UART: Caliptra RT
3,474,597 UART: [state] CFI Enabled
3,582,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,088 UART: [rt]cmd =0x43455246, len=4
3,625,294 >>> mbox cmd response data (920 bytes)
3,625,295 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,654,684 UART: [rt]cmd =0x43455252, len=4
3,665,695 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,277 ready_for_fw is high
1,362,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,797 >>> mbox cmd response: success
2,928,797 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,989,447 UART:
2,989,463 UART: Running Caliptra FMC ...
2,989,871 UART:
2,989,925 UART: [state] CFI Enabled
2,999,838 UART: [fht] FMC Alias Private Key: 7
3,107,567 UART: [art] Extend RT PCRs Done
3,107,995 UART: [art] Lock RT PCRs Done
3,109,383 UART: [art] Populate DV Done
3,117,400 UART: [fht] FMC Alias Private Key: 7
3,118,566 UART: [art] Derive CDI
3,118,846 UART: [art] Store in in slot 0x4
3,204,239 UART: [art] Derive Key Pair
3,204,599 UART: [art] Store priv key in slot 0x5
3,217,543 UART: [art] Derive Key Pair - Done
3,232,262 UART: [art] Signing Cert with AUTHO
3,232,742 UART: RITY.KEYID = 7
3,247,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,739 UART: [art] PUB.X = D085994CF54EDBE2AE7C7474CE40DB24DBA3281337D10D5F7C780E7A79D4AC2A8DE091B75F16539C4CE9B654EFBD623D
3,255,521 UART: [art] PUB.Y = 6E5BC82782CA8BF42C287F6C6AC047D27DFBF2A6DECE633630907F0906C87D0D7A0E0CD3038575DB6151ECCA62E0B4BC
3,262,471 UART: [art] SIG.R = EAAAC130A19F538C04F0B02BEEACDA26FD79E6172B3634A57D64267295CA3EF0DFDC1263DF1BDED0CB269FF9F0B19357
3,269,262 UART: [art] SIG.S = 3DC23FB593A8D2C74ED4A5F4736543E0CB942DD4E6F12AEDF51E71C4B031F5DCAC8ED4CEAFD3C75739016DBFF81BFC57
3,292,298 UART: Caliptra RT
3,292,551 UART: [state] CFI Enabled
3,401,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,644 UART: [rt]cmd =0x43455246, len=4
3,444,086 >>> mbox cmd response data (920 bytes)
3,444,087 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,428 UART: [rt]cmd =0x43455252, len=4
3,484,145 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,878 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,526 UART: [kat] SHA2-256
882,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,572 UART: [kat] ++
886,724 UART: [kat] sha1
891,044 UART: [kat] SHA2-256
892,982 UART: [kat] SHA2-384
895,673 UART: [kat] SHA2-512-ACC
897,574 UART: [kat] ECC-384
903,351 UART: [kat] HMAC-384Kdf
908,119 UART: [kat] LMS
1,476,315 UART: [kat] --
1,477,322 UART: [cold-reset] ++
1,477,838 UART: [fht] Storing FHT @ 0x50003400
1,480,739 UART: [idev] ++
1,480,907 UART: [idev] CDI.KEYID = 6
1,481,267 UART: [idev] SUBJECT.KEYID = 7
1,481,691 UART: [idev] UDS.KEYID = 0
1,482,036 ready_for_fw is high
1,482,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,721 UART: [idev] Erasing UDS.KEYID = 0
1,506,497 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,147 UART: [idev] --
1,516,028 UART: [ldev] ++
1,516,196 UART: [ldev] CDI.KEYID = 6
1,516,559 UART: [ldev] SUBJECT.KEYID = 5
1,516,985 UART: [ldev] AUTHORITY.KEYID = 7
1,517,448 UART: [ldev] FE.KEYID = 1
1,522,660 UART: [ldev] Erasing FE.KEYID = 1
1,548,033 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,855 UART: [ldev] --
1,587,250 UART: [fwproc] Waiting for Commands...
1,587,955 UART: [fwproc] Received command 0x46574c44
1,588,746 UART: [fwproc] Received Image of size 114448 bytes
2,887,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,859 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,296 >>> mbox cmd response: success
3,080,296 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,081,408 UART: [afmc] ++
3,081,576 UART: [afmc] CDI.KEYID = 6
3,081,938 UART: [afmc] SUBJECT.KEYID = 7
3,082,363 UART: [afmc] AUTHORITY.KEYID = 5
3,116,978 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,492 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,272 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,000 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,885 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,575 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,348 UART: [afmc] --
3,160,230 UART: [cold-reset] --
3,160,880 UART: [state] Locking Datavault
3,162,031 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,635 UART: [state] Locking ICCM
3,163,095 UART: [exit] Launching FMC @ 0x40000130
3,168,424 UART:
3,168,440 UART: Running Caliptra FMC ...
3,168,848 UART:
3,168,991 UART: [state] CFI Enabled
3,179,832 UART: [fht] FMC Alias Private Key: 7
3,287,557 UART: [art] Extend RT PCRs Done
3,287,985 UART: [art] Lock RT PCRs Done
3,289,347 UART: [art] Populate DV Done
3,297,498 UART: [fht] FMC Alias Private Key: 7
3,298,600 UART: [art] Derive CDI
3,298,880 UART: [art] Store in in slot 0x4
3,384,815 UART: [art] Derive Key Pair
3,385,175 UART: [art] Store priv key in slot 0x5
3,398,897 UART: [art] Derive Key Pair - Done
3,413,290 UART: [art] Signing Cert with AUTHO
3,413,770 UART: RITY.KEYID = 7
3,429,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,987 UART: [art] PUB.X = E59E5F2A8B704F4F4CF478FC7AB5729B37A19A094A8B449936F1B57D3D28D05211DF9FB71E664E6BF399F595323AB952
3,436,760 UART: [art] PUB.Y = 636381233179A0337EB560171BFCAAD32A776457AC141D3DE702D7C4F871353CEA8FC2AA17129EA34B7A1B060A8D079D
3,443,702 UART: [art] SIG.R = FD41B62BEF3F47FEE98E3D1DB1FC358C29F3FE7C5D8E12611340A4CFA1041772C0A3DFF9848B10DDF3F3DF5891FED6C8
3,450,493 UART: [art] SIG.S = E8E348C5B8941885656322555AB8C4958490A04AD8280B452E47E9F84478E67675FDC436FE26C8212E9053D7E1A28663
3,474,167 UART: Caliptra RT
3,474,512 UART: [state] CFI Enabled
3,581,728 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,146 UART: [rt]cmd =0x43455246, len=4
3,624,394 >>> mbox cmd response data (920 bytes)
3,624,395 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,640 UART: [rt]cmd =0x43455252, len=4
3,664,530 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,202 ready_for_fw is high
1,362,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,384 >>> mbox cmd response: success
2,930,384 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,992,258 UART:
2,992,274 UART: Running Caliptra FMC ...
2,992,682 UART:
2,992,825 UART: [state] CFI Enabled
3,003,526 UART: [fht] FMC Alias Private Key: 7
3,111,579 UART: [art] Extend RT PCRs Done
3,112,007 UART: [art] Lock RT PCRs Done
3,113,329 UART: [art] Populate DV Done
3,121,578 UART: [fht] FMC Alias Private Key: 7
3,122,552 UART: [art] Derive CDI
3,122,832 UART: [art] Store in in slot 0x4
3,208,919 UART: [art] Derive Key Pair
3,209,279 UART: [art] Store priv key in slot 0x5
3,222,083 UART: [art] Derive Key Pair - Done
3,236,868 UART: [art] Signing Cert with AUTHO
3,237,348 UART: RITY.KEYID = 7
3,252,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,139 UART: [art] PUB.X = D79B06B6F9EEB030BD0D952547891F14E548342406DC2790CD4459C8F94F91E1EB8464457B672787793C44BD7552E33D
3,259,894 UART: [art] PUB.Y = 32A88A382B050FF593960DD93EEFA6A861C89FAD2263F30A52AB67B40BFADC82AF0575F09EB8F94569CB73A509D1A925
3,266,835 UART: [art] SIG.R = CA3899B6BCB1ACE4CBDA4F3030B46CCEA2D22DB0EB10AE63EBC20F9EF4F0509CC4697EA85EBCC5F2A896654D48DF2CC2
3,273,636 UART: [art] SIG.S = CD1DE6E2A554B4E699FF0BD5B39249149EB1A18BBA77F7667B2EA830BCDB9EAF6D3643EBCED35E87B3EF01DA7891AD99
3,297,289 UART: Caliptra RT
3,297,634 UART: [state] CFI Enabled
3,405,882 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,522 UART: [rt]cmd =0x43455246, len=4
3,448,874 >>> mbox cmd response data (920 bytes)
3,448,875 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,144 UART: [rt]cmd =0x43455252, len=4
3,488,978 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
892,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,055 UART: [kat] ++
897,207 UART: [kat] sha1
901,511 UART: [kat] SHA2-256
903,451 UART: [kat] SHA2-384
906,170 UART: [kat] SHA2-512-ACC
908,071 UART: [kat] ECC-384
917,786 UART: [kat] HMAC-384Kdf
922,254 UART: [kat] LMS
1,170,582 UART: [kat] --
1,171,219 UART: [cold-reset] ++
1,171,727 UART: [fht] FHT @ 0x50003400
1,174,430 UART: [idev] ++
1,174,598 UART: [idev] CDI.KEYID = 6
1,174,958 UART: [idev] SUBJECT.KEYID = 7
1,175,382 UART: [idev] UDS.KEYID = 0
1,175,727 ready_for_fw is high
1,175,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,558 UART: [idev] Erasing UDS.KEYID = 0
1,200,281 UART: [idev] Sha1 KeyId Algorithm
1,208,693 UART: [idev] --
1,209,577 UART: [ldev] ++
1,209,745 UART: [ldev] CDI.KEYID = 6
1,210,108 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,794 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,146 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,250 >>> mbox cmd response: success
2,774,250 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,775,316 UART: [afmc] ++
2,775,484 UART: [afmc] CDI.KEYID = 6
2,775,846 UART: [afmc] SUBJECT.KEYID = 7
2,776,271 UART: [afmc] AUTHORITY.KEYID = 5
2,811,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,827 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,303 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,188 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,907 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,689 UART: [afmc] --
2,854,569 UART: [cold-reset] --
2,855,413 UART: [state] Locking Datavault
2,856,644 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,248 UART: [state] Locking ICCM
2,857,872 UART: [exit] Launching FMC @ 0x40000130
2,863,201 UART:
2,863,217 UART: Running Caliptra FMC ...
2,863,625 UART:
2,863,679 UART: [state] CFI Enabled
2,874,220 UART: [fht] FMC Alias Private Key: 7
2,982,043 UART: [art] Extend RT PCRs Done
2,982,471 UART: [art] Lock RT PCRs Done
2,983,779 UART: [art] Populate DV Done
2,991,898 UART: [fht] FMC Alias Private Key: 7
2,993,040 UART: [art] Derive CDI
2,993,320 UART: [art] Store in in slot 0x4
3,079,051 UART: [art] Derive Key Pair
3,079,411 UART: [art] Store priv key in slot 0x5
3,092,567 UART: [art] Derive Key Pair - Done
3,107,089 UART: [art] Signing Cert with AUTHO
3,107,569 UART: RITY.KEYID = 7
3,122,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,466 UART: [art] PUB.X = ACB31B2309204A6521503B9B7819CD0C0900EC87053FD7A9BCB1C6E281AA5F17BDC4AE9E477E39687BD5B95D23E4C8F1
3,130,214 UART: [art] PUB.Y = 5C76AC108E400B36248185B1ABA0A53B98022AE99E2CB29B6E05D92A1C2CF8391ED842632B0EFA5C1D7A459C7AB05567
3,137,160 UART: [art] SIG.R = B0ECB966F23E99DDEB83670C305D22DECAF261669BED7E224FF51F0817D829DC3F745A4CEEDA7A157C9EDF9C1A04C9D2
3,143,945 UART: [art] SIG.S = 21EB61FE2B9536D0ECFB5CE0465201B804E55AA147F6D1CDC788301473DD7A7639EEF345B33EF54473236A3C19479EF0
3,167,596 UART: Caliptra RT
3,167,849 UART: [state] CFI Enabled
3,275,380 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,846 UART: [rt]cmd =0x43455246, len=4
3,317,860 >>> mbox cmd response data (887 bytes)
3,317,861 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,206 UART: [rt]cmd =0x43455252, len=4
3,357,787 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,979 ready_for_fw is high
1,059,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,307 >>> mbox cmd response: success
2,626,307 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,688,643 UART:
2,688,659 UART: Running Caliptra FMC ...
2,689,067 UART:
2,689,121 UART: [state] CFI Enabled
2,699,926 UART: [fht] FMC Alias Private Key: 7
2,808,395 UART: [art] Extend RT PCRs Done
2,808,823 UART: [art] Lock RT PCRs Done
2,810,571 UART: [art] Populate DV Done
2,819,014 UART: [fht] FMC Alias Private Key: 7
2,820,070 UART: [art] Derive CDI
2,820,350 UART: [art] Store in in slot 0x4
2,906,137 UART: [art] Derive Key Pair
2,906,497 UART: [art] Store priv key in slot 0x5
2,919,637 UART: [art] Derive Key Pair - Done
2,934,280 UART: [art] Signing Cert with AUTHO
2,934,760 UART: RITY.KEYID = 7
2,949,964 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,729 UART: [art] PUB.X = D067C39BA0E85F23CC8A926D1D16BEEF05CE1F2BF1CCFA92D51DE9E5FD09830A61B27D999F699F08EE581E0D0A17126A
2,957,501 UART: [art] PUB.Y = 0961D1C2726314FD67E90C5A01D620BDB0278867D4BB25907AB48B4F429FD2B74D55FE835D10A18BEB4A83AF228DE8E5
2,964,450 UART: [art] SIG.R = 5270A6722CD1339DFDF4DD2AF94E48234216C15B134A9022F54CBB3BD9F719EBFEA55028EEF25170DAC03F853D468701
2,971,225 UART: [art] SIG.S = 6D336A0BDB0073A89B8BE0694A6E2EEA3CF00778C32455D8DEBD0D26B01BD6FF6163AB11A24371188ABBDFB717F6E0E3
2,995,891 UART: Caliptra RT
2,996,144 UART: [state] CFI Enabled
3,104,029 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,489 UART: [rt]cmd =0x43455246, len=4
3,146,669 >>> mbox cmd response data (887 bytes)
3,146,670 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,175,949 UART: [rt]cmd =0x43455252, len=4
3,186,806 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
893,905 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,030 UART: [kat] ++
898,182 UART: [kat] sha1
902,312 UART: [kat] SHA2-256
904,252 UART: [kat] SHA2-384
906,915 UART: [kat] SHA2-512-ACC
908,816 UART: [kat] ECC-384
918,355 UART: [kat] HMAC-384Kdf
922,971 UART: [kat] LMS
1,171,299 UART: [kat] --
1,172,014 UART: [cold-reset] ++
1,172,476 UART: [fht] FHT @ 0x50003400
1,175,143 UART: [idev] ++
1,175,311 UART: [idev] CDI.KEYID = 6
1,175,671 UART: [idev] SUBJECT.KEYID = 7
1,176,095 UART: [idev] UDS.KEYID = 0
1,176,440 ready_for_fw is high
1,176,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,143 UART: [idev] Erasing UDS.KEYID = 0
1,201,314 UART: [idev] Sha1 KeyId Algorithm
1,209,818 UART: [idev] --
1,210,926 UART: [ldev] ++
1,211,094 UART: [ldev] CDI.KEYID = 6
1,211,457 UART: [ldev] SUBJECT.KEYID = 5
1,211,883 UART: [ldev] AUTHORITY.KEYID = 7
1,212,346 UART: [ldev] FE.KEYID = 1
1,217,442 UART: [ldev] Erasing FE.KEYID = 1
1,244,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,478 UART: [ldev] --
1,283,855 UART: [fwproc] Wait for Commands...
1,284,599 UART: [fwproc] Recv command 0x46574c44
1,285,327 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,652 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,899 >>> mbox cmd response: success
2,775,899 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,776,949 UART: [afmc] ++
2,777,117 UART: [afmc] CDI.KEYID = 6
2,777,479 UART: [afmc] SUBJECT.KEYID = 7
2,777,904 UART: [afmc] AUTHORITY.KEYID = 5
2,814,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,138 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,866 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,751 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,470 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,322 UART: [afmc] --
2,857,300 UART: [cold-reset] --
2,858,304 UART: [state] Locking Datavault
2,859,533 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,137 UART: [state] Locking ICCM
2,860,711 UART: [exit] Launching FMC @ 0x40000130
2,866,040 UART:
2,866,056 UART: Running Caliptra FMC ...
2,866,464 UART:
2,866,607 UART: [state] CFI Enabled
2,877,422 UART: [fht] FMC Alias Private Key: 7
2,985,365 UART: [art] Extend RT PCRs Done
2,985,793 UART: [art] Lock RT PCRs Done
2,987,111 UART: [art] Populate DV Done
2,995,280 UART: [fht] FMC Alias Private Key: 7
2,996,366 UART: [art] Derive CDI
2,996,646 UART: [art] Store in in slot 0x4
3,082,519 UART: [art] Derive Key Pair
3,082,879 UART: [art] Store priv key in slot 0x5
3,095,483 UART: [art] Derive Key Pair - Done
3,110,309 UART: [art] Signing Cert with AUTHO
3,110,789 UART: RITY.KEYID = 7
3,125,869 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,634 UART: [art] PUB.X = B4119EDB2C7A4F2AFFDA2E1B19DF38BEA47CD8D72BD7DE39A4A34347F251A6332A311651D129A5B5CA74C2EEED6CD970
3,133,428 UART: [art] PUB.Y = DE3E9754501B5711D3EC006E045FE26D75DA5059EBCEA2440650A0B9ECE632DDC28DA2B801837CB31ACFA6E84AA27DE1
3,140,365 UART: [art] SIG.R = 60939BF715EC872A6E67D2B76FCC712F53E4AE178D93C7045880B079513844ADEE9F3607F3B38A9923ED15C030A1FB28
3,147,131 UART: [art] SIG.S = 700475256DAB3009C6587643A56B8962D4445C221E445430903DFE4C321FB156BB100538A990CD7B1A579D1DB6F72187
3,171,231 UART: Caliptra RT
3,171,576 UART: [state] CFI Enabled
3,280,351 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,903 UART: [rt]cmd =0x43455246, len=4
3,323,009 >>> mbox cmd response data (887 bytes)
3,323,010 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,213 UART: [rt]cmd =0x43455252, len=4
3,362,988 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,180 ready_for_fw is high
1,061,180 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,972 >>> mbox cmd response: success
2,629,972 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,692,098 UART:
2,692,114 UART: Running Caliptra FMC ...
2,692,522 UART:
2,692,665 UART: [state] CFI Enabled
2,703,194 UART: [fht] FMC Alias Private Key: 7
2,811,429 UART: [art] Extend RT PCRs Done
2,811,857 UART: [art] Lock RT PCRs Done
2,813,483 UART: [art] Populate DV Done
2,821,720 UART: [fht] FMC Alias Private Key: 7
2,822,674 UART: [art] Derive CDI
2,822,954 UART: [art] Store in in slot 0x4
2,908,433 UART: [art] Derive Key Pair
2,908,793 UART: [art] Store priv key in slot 0x5
2,921,937 UART: [art] Derive Key Pair - Done
2,936,633 UART: [art] Signing Cert with AUTHO
2,937,113 UART: RITY.KEYID = 7
2,952,523 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,288 UART: [art] PUB.X = F91A262DA659698C9DCF039CF427D059D175D295FEB4E2587E067FFFDF68B67C424595F432937D49026C457DC79CF5AF
2,960,055 UART: [art] PUB.Y = 07A8424BA933B6E67286161E456A2D1AA582F18C8A9568946D31D8ABA1DD475276BA7C35248682138C209D5038CE392F
2,966,996 UART: [art] SIG.R = 0C822A941589C39C15F5469D1B4E85E8877E01F1C925C2D9E641ABB017C77EBA9309985DC0BCF2368BD479E89CDB25CC
2,973,765 UART: [art] SIG.S = F8D026A4BB0033548A3EF387CBA844410D50D2DD68C3E3F4AA12335F612E21310A8E131529EA5942E59ECD6C067A1284
2,996,829 UART: Caliptra RT
2,997,174 UART: [state] CFI Enabled
3,106,513 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,867 UART: [rt]cmd =0x43455246, len=4
3,148,991 >>> mbox cmd response data (887 bytes)
3,148,992 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,178,115 UART: [rt]cmd =0x43455252, len=4
3,188,932 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
916,276 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,172,823 UART: [idev] ++
1,172,991 UART: [idev] CDI.KEYID = 6
1,173,352 UART: [idev] SUBJECT.KEYID = 7
1,173,777 UART: [idev] UDS.KEYID = 0
1,174,123 ready_for_fw is high
1,174,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,817 UART: [idev] Sha1 KeyId Algorithm
1,207,569 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,215,064 UART: [ldev] Erasing FE.KEYID = 1
1,241,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,930 UART: [ldev] --
1,280,224 UART: [fwproc] Wait for Commands...
1,281,001 UART: [fwproc] Recv command 0x46574c44
1,281,734 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,418 >>> mbox cmd response: success
2,773,418 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,774,687 UART: [afmc] ++
2,774,855 UART: [afmc] CDI.KEYID = 6
2,775,218 UART: [afmc] SUBJECT.KEYID = 7
2,775,644 UART: [afmc] AUTHORITY.KEYID = 5
2,810,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,217 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,697 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,580 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,299 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,090 UART: [afmc] --
2,854,108 UART: [cold-reset] --
2,855,002 UART: [state] Locking Datavault
2,856,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,637 UART: [state] Locking ICCM
2,857,137 UART: [exit] Launching FMC @ 0x40000130
2,862,466 UART:
2,862,482 UART: Running Caliptra FMC ...
2,862,890 UART:
2,862,944 UART: [state] CFI Enabled
2,873,307 UART: [fht] FMC Alias Private Key: 7
2,981,390 UART: [art] Extend RT PCRs Done
2,981,818 UART: [art] Lock RT PCRs Done
2,983,646 UART: [art] Populate DV Done
2,991,739 UART: [fht] FMC Alias Private Key: 7
2,992,741 UART: [art] Derive CDI
2,993,021 UART: [art] Store in in slot 0x4
3,078,674 UART: [art] Derive Key Pair
3,079,034 UART: [art] Store priv key in slot 0x5
3,092,316 UART: [art] Derive Key Pair - Done
3,107,281 UART: [art] Signing Cert with AUTHO
3,107,761 UART: RITY.KEYID = 7
3,123,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,096 UART: [art] PUB.X = 47EB4B4E5A976AA96D1329617E5F3BBE768ABB03170798CD322A84B099C8589EAB2D8FA0C48414BAFE846AFE52F91780
3,130,870 UART: [art] PUB.Y = 8A1176EE247715D278EE0B4AFE4ECD55731AC3B8DFECA471DCEDC9AAD256A0CCB207124D430297843F17C652CA51F09B
3,137,829 UART: [art] SIG.R = 60B835C31B6E9EBD4E2AE941CCC661C3DB599A52849B92E4414B2B32C10E07F4769EA065D1D346CB69F6B3E10D9B8A33
3,144,600 UART: [art] SIG.S = 34E4C6047A3CBF8263BCE1B408FC6A88DD09A4306A3D17D902EBEB842E54A3DC44018A4EA04BE35C0237D04564A14B93
3,167,923 UART: Caliptra RT
3,168,176 UART: [state] CFI Enabled
3,275,337 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,697 UART: [rt]cmd =0x43455246, len=4
3,317,795 >>> mbox cmd response data (887 bytes)
3,317,796 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,281 UART: [rt]cmd =0x43455252, len=4
3,358,220 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,794 ready_for_fw is high
1,055,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,098 >>> mbox cmd response: success
2,623,098 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,685,532 UART:
2,685,548 UART: Running Caliptra FMC ...
2,685,956 UART:
2,686,010 UART: [state] CFI Enabled
2,696,963 UART: [fht] FMC Alias Private Key: 7
2,805,162 UART: [art] Extend RT PCRs Done
2,805,590 UART: [art] Lock RT PCRs Done
2,807,036 UART: [art] Populate DV Done
2,815,275 UART: [fht] FMC Alias Private Key: 7
2,816,447 UART: [art] Derive CDI
2,816,727 UART: [art] Store in in slot 0x4
2,902,440 UART: [art] Derive Key Pair
2,902,800 UART: [art] Store priv key in slot 0x5
2,916,120 UART: [art] Derive Key Pair - Done
2,930,788 UART: [art] Signing Cert with AUTHO
2,931,268 UART: RITY.KEYID = 7
2,946,472 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,237 UART: [art] PUB.X = 1C908AA5CAD3282EE822F9B9BD0E0466BE33CA9D449AC41584594670FCAD731994C4D199730DB275101047EF4CD940EB
2,954,004 UART: [art] PUB.Y = 992CAF6C9A594D2C86819B3B9D910FC18608A7B02A916654225CD44A923A3252B6C631716205BD4C914DF666E76B5E26
2,960,941 UART: [art] SIG.R = 458DEDBFE37BABCB511DE1057901A508545D41B8ABBA5EE5C4EA7A9A7F2F63C72A102CE4C0616AC9460BF8FE8B996E16
2,967,721 UART: [art] SIG.S = 9994707CAEB5724CB56D69904639CE26AD3544EF32393C7D4D9C1D381354994E105AAD9F434B9343D54FCAE634B2DFD3
2,991,858 UART: Caliptra RT
2,992,111 UART: [state] CFI Enabled
3,099,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,150 UART: [rt]cmd =0x43455246, len=4
3,142,334 >>> mbox cmd response data (887 bytes)
3,142,335 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,660 UART: [rt]cmd =0x43455252, len=4
3,182,423 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,836 UART: [kat] ++
895,988 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,895 UART: [kat] SHA2-512-ACC
906,796 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
920,991 UART: [kat] LMS
1,169,303 UART: [kat] --
1,170,334 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,320 UART: [idev] ++
1,173,488 UART: [idev] CDI.KEYID = 6
1,173,849 UART: [idev] SUBJECT.KEYID = 7
1,174,274 UART: [idev] UDS.KEYID = 0
1,174,620 ready_for_fw is high
1,174,620 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,226 UART: [idev] Erasing UDS.KEYID = 0
1,199,534 UART: [idev] Sha1 KeyId Algorithm
1,208,488 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,171 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,809 UART: [fwproc] Wait for Commands...
1,282,634 UART: [fwproc] Recv command 0x46574c44
1,283,367 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,891 >>> mbox cmd response: success
2,774,891 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,775,938 UART: [afmc] ++
2,776,106 UART: [afmc] CDI.KEYID = 6
2,776,469 UART: [afmc] SUBJECT.KEYID = 7
2,776,895 UART: [afmc] AUTHORITY.KEYID = 5
2,811,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,121 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,733 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,452 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,375 UART: [afmc] --
2,855,359 UART: [cold-reset] --
2,856,493 UART: [state] Locking Datavault
2,857,586 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,190 UART: [state] Locking ICCM
2,858,766 UART: [exit] Launching FMC @ 0x40000130
2,864,095 UART:
2,864,111 UART: Running Caliptra FMC ...
2,864,519 UART:
2,864,662 UART: [state] CFI Enabled
2,875,503 UART: [fht] FMC Alias Private Key: 7
2,984,044 UART: [art] Extend RT PCRs Done
2,984,472 UART: [art] Lock RT PCRs Done
2,986,042 UART: [art] Populate DV Done
2,994,139 UART: [fht] FMC Alias Private Key: 7
2,995,147 UART: [art] Derive CDI
2,995,427 UART: [art] Store in in slot 0x4
3,081,012 UART: [art] Derive Key Pair
3,081,372 UART: [art] Store priv key in slot 0x5
3,094,696 UART: [art] Derive Key Pair - Done
3,109,557 UART: [art] Signing Cert with AUTHO
3,110,037 UART: RITY.KEYID = 7
3,125,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,874 UART: [art] PUB.X = 524AF3A1A23E44E16011AD9A5C8CE1FFEF325D8A557AB71A6CD2A3924B5A723C2A8FCECDFEAB84B761A5975A0EEB89BD
3,132,669 UART: [art] PUB.Y = 084D3BAE794772CF8694965E8C3CAF74CA9FA7ACC6617ED56F28B29D92D27D568A0D2AAE62CD10BD123059131AADAE8E
3,139,631 UART: [art] SIG.R = 5306B766C324BC4226B6B9BF0F5D21AD32E47D6CA9A9248ABF89316E04C327A3F71F2B6027614B2193C73E692E36572E
3,146,392 UART: [art] SIG.S = D71728F26BCE55AF74CD1AD8339C16AB0DADDE81DD082D74A07858A450E379050A57A6B3769B9475E1A3EE7896D17983
3,170,061 UART: Caliptra RT
3,170,406 UART: [state] CFI Enabled
3,278,639 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,381 UART: [rt]cmd =0x43455246, len=4
3,321,429 >>> mbox cmd response data (887 bytes)
3,321,430 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,797 UART: [rt]cmd =0x43455252, len=4
3,361,660 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,721 ready_for_fw is high
1,056,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,063 >>> mbox cmd response: success
2,623,063 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,685,405 UART:
2,685,421 UART: Running Caliptra FMC ...
2,685,829 UART:
2,685,972 UART: [state] CFI Enabled
2,696,911 UART: [fht] FMC Alias Private Key: 7
2,805,140 UART: [art] Extend RT PCRs Done
2,805,568 UART: [art] Lock RT PCRs Done
2,806,804 UART: [art] Populate DV Done
2,815,273 UART: [fht] FMC Alias Private Key: 7
2,816,251 UART: [art] Derive CDI
2,816,531 UART: [art] Store in in slot 0x4
2,902,154 UART: [art] Derive Key Pair
2,902,514 UART: [art] Store priv key in slot 0x5
2,915,432 UART: [art] Derive Key Pair - Done
2,930,443 UART: [art] Signing Cert with AUTHO
2,930,923 UART: RITY.KEYID = 7
2,946,625 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,390 UART: [art] PUB.X = 7A362C1EE6A23C47BDA1A66F3FF55C1E03EDBA344C1CFB8483063DB8E02F1F9E45919AA9B8BDE10FA84C370A8748F080
2,954,166 UART: [art] PUB.Y = 1D5E18726DB6E2F125D8D072B7B4CEE949691FE78E7A0260C10B0D906B32F7D293C1C2BB9B72CC4E30B81F99534D37EC
2,961,117 UART: [art] SIG.R = 5CD3A393F9EB57E7CC6E20AEDB24B15058AEC1A3FA62F6FA143D301682006FB2FE8B227AB99B1E6AA93E3BCBFA50C03B
2,967,891 UART: [art] SIG.S = CEE39BB7E69620D21D5063EA851488DEC27B35AD5153E4F25A8D1391E8E6736E86B3FF1167A5BB623A17106B3C56E53A
2,991,702 UART: Caliptra RT
2,992,047 UART: [state] CFI Enabled
3,100,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,296 UART: [rt]cmd =0x43455246, len=4
3,143,494 >>> mbox cmd response data (887 bytes)
3,143,495 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,802 UART: [rt]cmd =0x43455252, len=4
3,183,697 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,189 UART:
192,544 UART: Running Caliptra ROM ...
193,747 UART:
193,913 UART: [state] CFI Enabled
263,967 UART: [state] LifecycleState = Unprovisioned
265,950 UART: [state] DebugLocked = No
268,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,564 UART: [kat] SHA2-256
442,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,756 UART: [kat] ++
453,212 UART: [kat] sha1
464,015 UART: [kat] SHA2-256
466,692 UART: [kat] SHA2-384
473,962 UART: [kat] SHA2-512-ACC
476,332 UART: [kat] ECC-384
2,769,098 UART: [kat] HMAC-384Kdf
2,800,916 UART: [kat] LMS
3,991,234 UART: [kat] --
3,995,179 UART: [cold-reset] ++
3,997,680 UART: [fht] Storing FHT @ 0x50003400
4,009,731 UART: [idev] ++
4,010,298 UART: [idev] CDI.KEYID = 6
4,011,186 UART: [idev] SUBJECT.KEYID = 7
4,012,432 UART: [idev] UDS.KEYID = 0
4,013,393 ready_for_fw is high
4,013,602 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,111 UART: [idev] Erasing UDS.KEYID = 0
7,345,305 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,973 UART: [idev] --
7,371,236 UART: [ldev] ++
7,371,858 UART: [ldev] CDI.KEYID = 6
7,372,786 UART: [ldev] SUBJECT.KEYID = 5
7,373,997 UART: [ldev] AUTHORITY.KEYID = 7
7,375,292 UART: [ldev] FE.KEYID = 1
7,422,241 UART: [ldev] Erasing FE.KEYID = 1
10,755,547 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,702 UART: [ldev] --
13,136,992 UART: [fwproc] Waiting for Commands...
13,139,893 UART: [fwproc] Received command 0x46574c44
13,142,240 UART: [fwproc] Received Image of size 114124 bytes
17,195,789 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,511 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,344,424 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,662,152 >>> mbox cmd response: success
17,662,654 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,666,255 UART: [afmc] ++
17,666,895 UART: [afmc] CDI.KEYID = 6
17,667,808 UART: [afmc] SUBJECT.KEYID = 7
17,669,024 UART: [afmc] AUTHORITY.KEYID = 5
21,031,367 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,496 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,923 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,765 UART: [afmc] SIG.R = D11B25590D224DF7895CB1E4C26F7FFB4CFC97CB1C4C5050B7E2C1A322DC460794B7515D7961874F763DCDB033F20153
23,377,107 UART: [afmc] SIG.S = 085B9B7C6AACF0BE487A5656E044DC9D1CC867877C499599594A48BFF86D7CBB77B13F91A8EB61DAFB12749364BB5B23
23,399,143 UART: [afmc] --
23,403,478 UART: [cold-reset] --
23,406,487 UART: [state] Locking Datavault
23,412,009 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,715 UART: [state] Locking ICCM
23,416,242 UART: [exit] Launching FMC @ 0x40000130
23,424,645 UART:
23,424,882 UART: Running Caliptra FMC ...
23,425,985 UART:
23,426,146 UART: [state] CFI Enabled
23,490,681 UART: [fht] FMC Alias Private Key: 7
25,828,763 UART: [art] Extend RT PCRs Done
25,829,974 UART: [art] Lock RT PCRs Done
25,831,792 UART: [art] Populate DV Done
25,837,155 UART: [fht] FMC Alias Private Key: 7
25,838,745 UART: [art] Derive CDI
25,839,562 UART: [art] Store in in slot 0x4
25,900,764 UART: [art] Derive Key Pair
25,901,811 UART: [art] Store priv key in slot 0x5
29,194,654 UART: [art] Derive Key Pair - Done
29,207,655 UART: [art] Signing Cert with AUTHO
29,208,969 UART: RITY.KEYID = 7
31,496,237 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,745 UART: [art] PUB.X = 122F3003B833B876DBD4AB9CAB8CDA91641D5BE638A6CFDF75E05DB3E5E9374C33C52B449F54B93EF334C5EDC7200C5B
31,505,047 UART: [art] PUB.Y = A5B5D1B8FD156E386E4A8977361D0A873E497A062F7A58B7492096FF6CC86D144F6791001C26821945BF50835A94FC90
31,512,219 UART: [art] SIG.R = A8EA20AC64062C70B871C70FFC3FAD905D68346265E1A418C1D5E9C3417A43251E333FA8155E7328269C744DF3F0BA7A
31,519,615 UART: [art] SIG.S = 62561B76B985445A5D3ECA9BB99C8FACD31A1C6604D0E5AF36EF07B9B70DB7CD8BEB98E5C3C50FD5041BD8BE106942A2
32,824,929 UART: Caliptra RT
32,825,639 UART: [state] CFI Enabled
32,985,754 UART: [rt] RT listening for mailbox commands...
33,017,165 UART: [rt]cmd =0x43455252, len=4
33,028,530 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,784,648 ready_for_fw is high
3,785,030 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,820,094 >>> mbox cmd response: success
17,820,895 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,521,376 UART:
23,521,763 UART: Running Caliptra FMC ...
23,522,903 UART:
23,523,060 UART: [state] CFI Enabled
23,592,867 UART: [fht] FMC Alias Private Key: 7
25,931,007 UART: [art] Extend RT PCRs Done
25,932,238 UART: [art] Lock RT PCRs Done
25,933,812 UART: [art] Populate DV Done
25,939,371 UART: [fht] FMC Alias Private Key: 7
25,941,029 UART: [art] Derive CDI
25,941,853 UART: [art] Store in in slot 0x4
26,001,365 UART: [art] Derive Key Pair
26,002,412 UART: [art] Store priv key in slot 0x5
29,294,860 UART: [art] Derive Key Pair - Done
29,308,347 UART: [art] Signing Cert with AUTHO
29,309,653 UART: RITY.KEYID = 7
31,595,322 UART: [art] Erasing AUTHORITY.KEYID = 7
31,596,821 UART: [art] PUB.X = 350D7E0910DD2594E8AED48B791CC502B558D6E61DE8F796E61F1FA9D026EB59835F3FA6FF666437EF46C27EBA9EFCBB
31,604,102 UART: [art] PUB.Y = 58B288A120950E058D21C1561C08642262CE3430CF2E9FB59C8C3620B63279BAAD9D1F8C46153D5B87E21CEDBE343472
31,611,350 UART: [art] SIG.R = 92FA35A57667E0F791D1A1044496B9AD6EFDD7568DE089033A6DAF56D5DD4C8EB53EBFDD73BC9C511E56A605305E9B9D
31,618,764 UART: [art] SIG.S = 898EA45E38E1455BE9E4973D9793F5CD845005BCBB5620E935628727BD5B291B357EA6361CC66B1E37754C51B4B3A921
32,924,468 UART: Caliptra RT
32,925,181 UART: [state] CFI Enabled
33,085,111 UART: [rt] RT listening for mailbox commands...
33,116,469 UART: [rt]cmd =0x43455252, len=4
33,127,776 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,499 UART:
192,853 UART: Running Caliptra ROM ...
194,051 UART:
603,900 UART: [state] CFI Enabled
615,932 UART: [state] LifecycleState = Unprovisioned
617,990 UART: [state] DebugLocked = No
620,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,125 UART: [kat] SHA2-256
795,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,392 UART: [kat] ++
806,836 UART: [kat] sha1
817,204 UART: [kat] SHA2-256
819,926 UART: [kat] SHA2-384
825,625 UART: [kat] SHA2-512-ACC
827,989 UART: [kat] ECC-384
3,112,075 UART: [kat] HMAC-384Kdf
3,122,502 UART: [kat] LMS
4,312,610 UART: [kat] --
4,317,246 UART: [cold-reset] ++
4,319,670 UART: [fht] Storing FHT @ 0x50003400
4,331,498 UART: [idev] ++
4,332,054 UART: [idev] CDI.KEYID = 6
4,333,022 UART: [idev] SUBJECT.KEYID = 7
4,334,267 UART: [idev] UDS.KEYID = 0
4,335,243 ready_for_fw is high
4,335,436 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,794 UART: [idev] Erasing UDS.KEYID = 0
7,617,988 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,410 UART: [idev] --
7,643,187 UART: [ldev] ++
7,643,808 UART: [ldev] CDI.KEYID = 6
7,644,720 UART: [ldev] SUBJECT.KEYID = 5
7,645,925 UART: [ldev] AUTHORITY.KEYID = 7
7,647,201 UART: [ldev] FE.KEYID = 1
7,659,691 UART: [ldev] Erasing FE.KEYID = 1
10,944,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,243 UART: [ldev] --
13,306,959 UART: [fwproc] Waiting for Commands...
13,309,150 UART: [fwproc] Received command 0x46574c44
13,311,325 UART: [fwproc] Received Image of size 114124 bytes
17,364,278 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,104 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,984 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,826,632 >>> mbox cmd response: success
17,827,189 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,832,246 UART: [afmc] ++
17,832,834 UART: [afmc] CDI.KEYID = 6
17,833,796 UART: [afmc] SUBJECT.KEYID = 7
17,835,006 UART: [afmc] AUTHORITY.KEYID = 5
21,148,647 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,431 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,678 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,083 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,920 UART: [afmc] SIG.R = D11B25590D224DF7895CB1E4C26F7FFB4CFC97CB1C4C5050B7E2C1A322DC460794B7515D7961874F763DCDB033F20153
23,489,251 UART: [afmc] SIG.S = 085B9B7C6AACF0BE487A5656E044DC9D1CC867877C499599594A48BFF86D7CBB77B13F91A8EB61DAFB12749364BB5B23
23,511,061 UART: [afmc] --
23,514,938 UART: [cold-reset] --
23,519,281 UART: [state] Locking Datavault
23,523,874 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,621 UART: [state] Locking ICCM
23,526,793 UART: [exit] Launching FMC @ 0x40000130
23,535,184 UART:
23,535,412 UART: Running Caliptra FMC ...
23,536,505 UART:
23,536,659 UART: [state] CFI Enabled
23,544,865 UART: [fht] FMC Alias Private Key: 7
25,875,844 UART: [art] Extend RT PCRs Done
25,877,067 UART: [art] Lock RT PCRs Done
25,878,906 UART: [art] Populate DV Done
25,884,476 UART: [fht] FMC Alias Private Key: 7
25,886,117 UART: [art] Derive CDI
25,886,927 UART: [art] Store in in slot 0x4
25,929,463 UART: [art] Derive Key Pair
25,930,504 UART: [art] Store priv key in slot 0x5
29,172,430 UART: [art] Derive Key Pair - Done
29,185,690 UART: [art] Signing Cert with AUTHO
29,187,016 UART: RITY.KEYID = 7
31,466,042 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,556 UART: [art] PUB.X = 53C1A33BC463005FE44512E0DFEE6C9D21EB7F9877DF73FE325F9E51B2F385814E45D1AC8A23E600BFFF26612328F28E
31,474,801 UART: [art] PUB.Y = BA61B68E96AB1B18A0D4B3A5B50E4D9B10E0FFBF021FF98ACB751C48E9217BC2002DB9176824E0C19C2E4C7D95CC535D
31,482,074 UART: [art] SIG.R = 585C03056B8430E409614F0C01D2787A80098C093A8E15351A2549BCC0C0B737FB0EEDD4813F44872C4D58E03CCAFDB7
31,489,449 UART: [art] SIG.S = 3CEF24BC5F205C91D784BD5253A85A01F01DB6C876B6EC6F1BF35163E536410AA3B60418A958DE50E5BD305C33E850D7
32,794,544 UART: Caliptra RT
32,795,261 UART: [state] CFI Enabled
32,913,023 UART: [rt] RT listening for mailbox commands...
32,944,372 UART: [rt]cmd =0x43455252, len=4
32,955,920 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,129,552 ready_for_fw is high
4,129,937 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,365 >>> mbox cmd response: success
18,075,121 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,712,770 UART:
23,713,143 UART: Running Caliptra FMC ...
23,714,233 UART:
23,714,377 UART: [state] CFI Enabled
23,722,109 UART: [fht] FMC Alias Private Key: 7
26,052,783 UART: [art] Extend RT PCRs Done
26,054,010 UART: [art] Lock RT PCRs Done
26,055,663 UART: [art] Populate DV Done
26,061,286 UART: [fht] FMC Alias Private Key: 7
26,062,770 UART: [art] Derive CDI
26,063,499 UART: [art] Store in in slot 0x4
26,105,957 UART: [art] Derive Key Pair
26,106,995 UART: [art] Store priv key in slot 0x5
29,348,957 UART: [art] Derive Key Pair - Done
29,362,382 UART: [art] Signing Cert with AUTHO
29,363,679 UART: RITY.KEYID = 7
31,642,967 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,478 UART: [art] PUB.X = 41C58D16BA1FBCB2686F42676156E52D70D00634B12782E1D929508D5E6F6A6F837CB788F3B39FB00E9FF67CA03FA298
31,651,721 UART: [art] PUB.Y = ACF98C595FB9B3F8702E7C0D3180E54A5DD6FBA795538DFDC373247BB4243C372766795609DF89C527BFB5C2D6070858
31,658,951 UART: [art] SIG.R = 33BE450EEDF610676D2C0B272C851C69F524E249A1749FBE18EE5E60342CC126901F30742654A400974E9DAE4A2887C8
31,666,338 UART: [art] SIG.S = 60B6A80E0394B8B1CDAB36C8A3069D745566AEC351A92225E080CBB62B12ADA19BB59308900ED01EC874E68493511B65
32,971,504 UART: Caliptra RT
32,972,216 UART: [state] CFI Enabled
33,091,250 UART: [rt] RT listening for mailbox commands...
33,122,826 UART: [rt]cmd =0x43455252, len=4
33,134,178 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,191 UART:
192,539 UART: Running Caliptra ROM ...
193,732 UART:
193,883 UART: [state] CFI Enabled
268,493 UART: [state] LifecycleState = Unprovisioned
270,430 UART: [state] DebugLocked = No
271,899 UART: [state] WD Timer not started. Device not locked for debugging
275,212 UART: [kat] SHA2-256
454,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,918 UART: [kat] ++
466,456 UART: [kat] sha1
475,919 UART: [kat] SHA2-256
478,920 UART: [kat] SHA2-384
484,619 UART: [kat] SHA2-512-ACC
487,558 UART: [kat] ECC-384
2,950,813 UART: [kat] HMAC-384Kdf
2,972,702 UART: [kat] LMS
3,502,128 UART: [kat] --
3,505,167 UART: [cold-reset] ++
3,506,349 UART: [fht] FHT @ 0x50003400
3,516,552 UART: [idev] ++
3,517,136 UART: [idev] CDI.KEYID = 6
3,518,097 UART: [idev] SUBJECT.KEYID = 7
3,519,205 UART: [idev] UDS.KEYID = 0
3,520,132 ready_for_fw is high
3,520,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,252 UART: [idev] Erasing UDS.KEYID = 0
6,026,951 UART: [idev] Sha1 KeyId Algorithm
6,050,563 UART: [idev] --
6,054,121 UART: [ldev] ++
6,054,690 UART: [ldev] CDI.KEYID = 6
6,055,602 UART: [ldev] SUBJECT.KEYID = 5
6,056,767 UART: [ldev] AUTHORITY.KEYID = 7
6,057,999 UART: [ldev] FE.KEYID = 1
6,101,710 UART: [ldev] Erasing FE.KEYID = 1
8,607,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,398 UART: [ldev] --
10,418,015 UART: [fwproc] Wait for Commands...
10,420,382 UART: [fwproc] Recv command 0x46574c44
10,422,418 UART: [fwproc] Recv'd Img size: 114448 bytes
13,834,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,975,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,294,184 >>> mbox cmd response: success
14,294,656 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,299,063 UART: [afmc] ++
14,299,651 UART: [afmc] CDI.KEYID = 6
14,300,565 UART: [afmc] SUBJECT.KEYID = 7
14,301,730 UART: [afmc] AUTHORITY.KEYID = 5
16,830,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,016 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,603,894 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,627,644 UART: [afmc] --
18,630,576 UART: [cold-reset] --
18,634,439 UART: [state] Locking Datavault
18,640,061 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,707 UART: [state] Locking ICCM
18,643,941 UART: [exit] Launching FMC @ 0x40000130
18,652,340 UART:
18,652,578 UART: Running Caliptra FMC ...
18,653,679 UART:
18,653,833 UART: [state] CFI Enabled
18,711,852 UART: [fht] FMC Alias Private Key: 7
20,476,149 UART: [art] Extend RT PCRs Done
20,477,359 UART: [art] Lock RT PCRs Done
20,479,112 UART: [art] Populate DV Done
20,484,409 UART: [fht] FMC Alias Private Key: 7
20,486,043 UART: [art] Derive CDI
20,486,784 UART: [art] Store in in slot 0x4
20,544,766 UART: [art] Derive Key Pair
20,545,805 UART: [art] Store priv key in slot 0x5
23,008,716 UART: [art] Derive Key Pair - Done
23,021,659 UART: [art] Signing Cert with AUTHO
23,022,956 UART: RITY.KEYID = 7
24,734,171 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,003 UART: [art] PUB.X = C6DBB5AE788AC5CBE47F34B8D5FCC28C9687BA4D59881E7252FB4FD095DC8B10D4AE392DEDFB57609DD252114FBF0FDF
24,743,010 UART: [art] PUB.Y = DA14F1A0D05C28F7C700550381BBEDC03266B1967661AB8BB9627614A904350221A31ED14847018F7A7490E19E0EB9B6
24,750,210 UART: [art] SIG.R = 0C0E7922E1823E0549C99E816617B70614F9F7A742C1D5693AB15468649ADA33D07005B28662356C62D448D1CF71FB52
24,757,570 UART: [art] SIG.S = 46C851ED5245B301F9A443E05C2A96AAC423E8430EA6ED1E5026C2453C9EDED72F84B7A4FDB914208B6BE0FCF2BE90F7
25,735,939 UART: Caliptra RT
25,736,657 UART: [state] CFI Enabled
25,903,260 UART: [rt] RT listening for mailbox commands...
25,934,719 UART: [rt]cmd =0x43455252, len=4
25,946,293 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,378,737 ready_for_fw is high
3,379,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,080,295 >>> mbox cmd response: success
14,081,357 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,360,995 UART:
18,361,406 UART: Running Caliptra FMC ...
18,362,520 UART:
18,362,674 UART: [state] CFI Enabled
18,428,529 UART: [fht] FMC Alias Private Key: 7
20,192,131 UART: [art] Extend RT PCRs Done
20,193,348 UART: [art] Lock RT PCRs Done
20,195,052 UART: [art] Populate DV Done
20,200,679 UART: [fht] FMC Alias Private Key: 7
20,202,379 UART: [art] Derive CDI
20,203,119 UART: [art] Store in in slot 0x4
20,260,902 UART: [art] Derive Key Pair
20,261,954 UART: [art] Store priv key in slot 0x5
22,724,688 UART: [art] Derive Key Pair - Done
22,737,577 UART: [art] Signing Cert with AUTHO
22,738,873 UART: RITY.KEYID = 7
24,449,902 UART: [art] Erasing AUTHORITY.KEYID = 7
24,451,399 UART: [art] PUB.X = 0AB8750957515481B2B65604FE470A5CA739275D86D79697368970A2F109C652DE0D3E0B06C46DF5EB21A5DE0FCBBEAD
24,458,648 UART: [art] PUB.Y = 7BB7E776EB488AC4617EE3C7AF39E0CC3DCDA890403C90C614037FD14C3D6326D7DFFC77A167B58A6F63E755C04B8E7D
24,465,959 UART: [art] SIG.R = C8EC98F0267E25962CEABABED186BF34E6F82023B079AECBD1007F60850CEB774F4D839C61C8624B68D97C20A9064164
24,473,356 UART: [art] SIG.S = 0587C0BE62617BF4647CF760D27FFA289275B0397F6A786A19AC0B4B2086F731C1A8045754C6FE8C46C06E7BF94EFE36
25,451,900 UART: Caliptra RT
25,452,595 UART: [state] CFI Enabled
25,618,877 UART: [rt] RT listening for mailbox commands...
25,650,419 UART: [rt]cmd =0x43455252, len=4
25,661,833 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,358 UART:
192,735 UART: Running Caliptra ROM ...
193,868 UART:
603,487 UART: [state] CFI Enabled
617,433 UART: [state] LifecycleState = Unprovisioned
619,319 UART: [state] DebugLocked = No
621,900 UART: [state] WD Timer not started. Device not locked for debugging
625,142 UART: [kat] SHA2-256
804,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,882 UART: [kat] ++
816,325 UART: [kat] sha1
827,827 UART: [kat] SHA2-256
830,896 UART: [kat] SHA2-384
836,303 UART: [kat] SHA2-512-ACC
839,229 UART: [kat] ECC-384
3,279,740 UART: [kat] HMAC-384Kdf
3,292,125 UART: [kat] LMS
3,821,597 UART: [kat] --
3,825,662 UART: [cold-reset] ++
3,828,225 UART: [fht] FHT @ 0x50003400
3,839,476 UART: [idev] ++
3,840,053 UART: [idev] CDI.KEYID = 6
3,840,977 UART: [idev] SUBJECT.KEYID = 7
3,842,141 UART: [idev] UDS.KEYID = 0
3,843,176 ready_for_fw is high
3,843,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,197 UART: [idev] Erasing UDS.KEYID = 0
6,312,171 UART: [idev] Sha1 KeyId Algorithm
6,333,833 UART: [idev] --
6,338,579 UART: [ldev] ++
6,339,149 UART: [ldev] CDI.KEYID = 6
6,340,031 UART: [ldev] SUBJECT.KEYID = 5
6,341,235 UART: [ldev] AUTHORITY.KEYID = 7
6,342,455 UART: [ldev] FE.KEYID = 1
6,353,208 UART: [ldev] Erasing FE.KEYID = 1
8,827,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,687 UART: [ldev] --
10,622,064 UART: [fwproc] Wait for Commands...
10,624,970 UART: [fwproc] Recv command 0x46574c44
10,627,056 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,493,004 >>> mbox cmd response: success
14,493,549 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,498,428 UART: [afmc] ++
14,499,004 UART: [afmc] CDI.KEYID = 6
14,499,913 UART: [afmc] SUBJECT.KEYID = 7
14,501,070 UART: [afmc] AUTHORITY.KEYID = 5
16,998,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,979 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,993 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,769,872 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,791,714 UART: [afmc] --
18,795,246 UART: [cold-reset] --
18,798,180 UART: [state] Locking Datavault
18,802,728 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,416 UART: [state] Locking ICCM
18,806,556 UART: [exit] Launching FMC @ 0x40000130
18,814,939 UART:
18,815,164 UART: Running Caliptra FMC ...
18,816,254 UART:
18,816,404 UART: [state] CFI Enabled
18,824,621 UART: [fht] FMC Alias Private Key: 7
20,581,681 UART: [art] Extend RT PCRs Done
20,582,889 UART: [art] Lock RT PCRs Done
20,584,612 UART: [art] Populate DV Done
20,590,013 UART: [fht] FMC Alias Private Key: 7
20,591,651 UART: [art] Derive CDI
20,592,455 UART: [art] Store in in slot 0x4
20,635,149 UART: [art] Derive Key Pair
20,636,184 UART: [art] Store priv key in slot 0x5
23,062,422 UART: [art] Derive Key Pair - Done
23,075,644 UART: [art] Signing Cert with AUTHO
23,076,946 UART: RITY.KEYID = 7
24,782,751 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,233 UART: [art] PUB.X = 6C05729A1923DB7D88BF3792D0C4B92A9A724740B4D25D4433F370A6FC571E6A21CFE210CF97AA62CCD10D642735EAD4
24,791,522 UART: [art] PUB.Y = DC923F73CEF3520E063F7E9CBC82BA99AFB3E89A3ECFE2E46941B35AF62D27430DAB0C8791B57A9D309FD4BCBA4C52F9
24,798,856 UART: [art] SIG.R = 393ED4906C83639B9998B0E520C6F1EAE250745DCFC0892C67375BF57E766E88935B3AB198B9D61A0458BE61E6806468
24,806,198 UART: [art] SIG.S = A48425B0A886FC0BD9B404558607EF5F5724B5BD928E6C2FE122965809E5FF8509C7DF5CA6035CA9DDAB416E3E4CDC85
25,785,335 UART: Caliptra RT
25,786,051 UART: [state] CFI Enabled
25,903,074 UART: [rt] RT listening for mailbox commands...
25,934,554 UART: [rt]cmd =0x43455252, len=4
25,946,116 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,694,562 ready_for_fw is high
3,694,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,584 >>> mbox cmd response: success
14,278,359 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,524,495 UART:
18,524,891 UART: Running Caliptra FMC ...
18,526,023 UART:
18,526,176 UART: [state] CFI Enabled
18,534,212 UART: [fht] FMC Alias Private Key: 7
20,291,210 UART: [art] Extend RT PCRs Done
20,292,432 UART: [art] Lock RT PCRs Done
20,294,165 UART: [art] Populate DV Done
20,299,575 UART: [fht] FMC Alias Private Key: 7
20,301,127 UART: [art] Derive CDI
20,301,943 UART: [art] Store in in slot 0x4
20,344,641 UART: [art] Derive Key Pair
20,345,639 UART: [art] Store priv key in slot 0x5
22,772,425 UART: [art] Derive Key Pair - Done
22,785,418 UART: [art] Signing Cert with AUTHO
22,786,716 UART: RITY.KEYID = 7
24,492,526 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,030 UART: [art] PUB.X = FD972578E0B6785B416D8476FD7BAB404F0F49B83B604158FFC05194A7C8C751EA69BEE3DAD363E72A4A21C82BE37357
24,501,332 UART: [art] PUB.Y = A4435BC5DB209CB751FD99340165F1CC27324131DEB16853C69D51A49DA37E01588F2B48AB668A79246DEAE7B523D400
24,508,525 UART: [art] SIG.R = 7B8ED45CEB62875B9BD07CE007E65E02FA580E092A758BE419CAF4247AB76FADAA03B5286D336244D9CFD323B31CBB70
24,515,980 UART: [art] SIG.S = 9FE24D83CDE494FAF45D1B64158F5AD96D29FFC3E9F5C6E469D0CD1995225423E6DF46DB269390F7361D85E70537FC53
25,494,833 UART: Caliptra RT
25,495,529 UART: [state] CFI Enabled
25,612,050 UART: [rt] RT listening for mailbox commands...
25,643,442 UART: [rt]cmd =0x43455252, len=4
25,654,782 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,416,056 ready_for_fw is high
3,416,477 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,703,014 >>> mbox cmd response: success
14,703,758 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,983,894 UART:
18,984,289 UART: Running Caliptra FMC ...
18,985,433 UART:
18,985,591 UART: [state] CFI Enabled
19,050,967 UART: [fht] FMC Alias Private Key: 7
20,814,852 UART: [art] Extend RT PCRs Done
20,816,083 UART: [art] Lock RT PCRs Done
20,817,880 UART: [art] Populate DV Done
20,823,242 UART: [fht] FMC Alias Private Key: 7
20,824,790 UART: [art] Derive CDI
20,825,611 UART: [art] Store in in slot 0x4
20,883,124 UART: [art] Derive Key Pair
20,884,125 UART: [art] Store priv key in slot 0x5
23,347,121 UART: [art] Derive Key Pair - Done
23,360,128 UART: [art] Signing Cert with AUTHO
23,361,432 UART: RITY.KEYID = 7
25,072,172 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,678 UART: [art] PUB.X = BD2B19D318213C41DCF4117539F7FD0B17765B007DBC23AD7F90DCE897474B05771E53FB4C460666F00ACF9223EB74B2
25,080,928 UART: [art] PUB.Y = 770CB8FCA0E92EB4063398C2F55826AFFD9026DE6FCDFF512C7E2829773AE09615E52B8F17BAFB2BEA767B465A440FC5
25,088,175 UART: [art] SIG.R = DFCE8BB4A6B09ECE6F136BDC32ACBC3D508E46AFC02C9C70629CDC437A2310D80BAF039A5364308DB97646A7210DCB72
25,095,563 UART: [art] SIG.S = 3C2451B9A16938236B1A5677FB0A14F63B12ED3C284C8E55240628D971CB0458D46875471086EF586ED0860BFED721AD
26,073,777 UART: Caliptra RT
26,074,473 UART: [state] CFI Enabled
26,239,948 UART: [rt] RT listening for mailbox commands...
26,271,305 UART: [rt]cmd =0x43455252, len=4
26,282,639 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
3,758,609 ready_for_fw is high
3,758,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,947,555 >>> mbox cmd response: success
14,948,383 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,193,689 UART:
19,194,069 UART: Running Caliptra FMC ...
19,195,172 UART:
19,195,335 UART: [state] CFI Enabled
19,203,340 UART: [fht] FMC Alias Private Key: 7
20,960,313 UART: [art] Extend RT PCRs Done
20,961,546 UART: [art] Lock RT PCRs Done
20,963,418 UART: [art] Populate DV Done
20,968,826 UART: [fht] FMC Alias Private Key: 7
20,970,535 UART: [art] Derive CDI
20,971,343 UART: [art] Store in in slot 0x4
21,014,049 UART: [art] Derive Key Pair
21,015,094 UART: [art] Store priv key in slot 0x5
23,441,807 UART: [art] Derive Key Pair - Done
23,454,808 UART: [art] Signing Cert with AUTHO
23,456,105 UART: RITY.KEYID = 7
25,161,366 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,867 UART: [art] PUB.X = D1C79A8AC7E7BBCE0B56F80259764F17EE124F74EAE1A39919851AF80653AA00EC83B4EA7E372106A01102CFE2893411
25,170,109 UART: [art] PUB.Y = 4289D993FDA997B605B58E5FEDC3FFDE53F10BBB0B39B1F00B69EB7E7BF356454343129C773412D062A39E1BEBC6064B
25,177,357 UART: [art] SIG.R = 3C6D1AAC2E438EDD4C265E5B81A2A3AB0AE0A624F2EE05789019253AAEAF613B4C47D4619F4CB7AB3FC33866367C6D8F
25,184,766 UART: [art] SIG.S = 1F154B2729B5F51B98431D4FE0567041C825FBB00B43B60E8C37E664E1E20276E65518BAAE1B919B110B00262E439927
26,163,710 UART: Caliptra RT
26,164,404 UART: [state] CFI Enabled
26,282,159 UART: [rt] RT listening for mailbox commands...
26,313,445 UART: [rt]cmd =0x43455252, len=4
26,324,930 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,085 UART: [kat] SHA2-256
882,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,131 UART: [kat] ++
886,283 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,902 UART: [kat] HMAC-384Kdf
907,350 UART: [kat] LMS
1,475,546 UART: [kat] --
1,476,573 UART: [cold-reset] ++
1,476,963 UART: [fht] Storing FHT @ 0x50003400
1,479,652 UART: [idev] ++
1,479,820 UART: [idev] CDI.KEYID = 6
1,480,180 UART: [idev] SUBJECT.KEYID = 7
1,480,604 UART: [idev] UDS.KEYID = 0
1,480,949 ready_for_fw is high
1,480,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,392 UART: [idev] Erasing UDS.KEYID = 0
1,504,464 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,972 UART: [idev] --
1,514,211 UART: [ldev] ++
1,514,379 UART: [ldev] CDI.KEYID = 6
1,514,742 UART: [ldev] SUBJECT.KEYID = 5
1,515,168 UART: [ldev] AUTHORITY.KEYID = 7
1,515,631 UART: [ldev] FE.KEYID = 1
1,520,917 UART: [ldev] Erasing FE.KEYID = 1
1,546,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,108 UART: [ldev] --
1,585,475 UART: [fwproc] Waiting for Commands...
1,586,100 UART: [fwproc] Received command 0x46574c44
1,586,891 UART: [fwproc] Received Image of size 114448 bytes
2,885,444 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,468 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,983 >>> mbox cmd response: success
3,078,983 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,080,377 UART: [afmc] ++
3,080,545 UART: [afmc] CDI.KEYID = 6
3,080,907 UART: [afmc] SUBJECT.KEYID = 7
3,081,332 UART: [afmc] AUTHORITY.KEYID = 5
3,116,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,159 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,939 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,552 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,150,264 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,158,074 UART: [afmc] --
3,159,090 UART: [cold-reset] --
3,159,932 UART: [state] Locking Datavault
3,160,975 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,579 UART: [state] Locking ICCM
3,162,171 UART: [exit] Launching FMC @ 0x40000130
3,167,500 UART:
3,167,516 UART: Running Caliptra FMC ...
3,167,924 UART:
3,167,978 UART: [state] CFI Enabled
3,178,189 UART: [fht] FMC Alias Private Key: 7
3,286,552 UART: [art] Extend RT PCRs Done
3,286,980 UART: [art] Lock RT PCRs Done
3,288,944 UART: [art] Populate DV Done
3,297,109 UART: [fht] FMC Alias Private Key: 7
3,298,281 UART: [art] Derive CDI
3,298,561 UART: [art] Store in in slot 0x4
3,384,112 UART: [art] Derive Key Pair
3,384,472 UART: [art] Store priv key in slot 0x5
3,397,764 UART: [art] Derive Key Pair - Done
3,412,896 UART: [art] Signing Cert with AUTHO
3,413,376 UART: RITY.KEYID = 7
3,428,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,307 UART: [art] PUB.X = CCD959C22E85B326DE91B77C06DA2742D18B813AC49823D58AD5A0D99122107AAB16964BDEFACE23782F6BB706A089EB
3,436,083 UART: [art] PUB.Y = 6CBF7232860B46BECC017DF7D0BCB6D3AB1178802AD9207308E72617B7A1CDAFD76724D53415641E6690E1B35F39C9F4
3,443,030 UART: [art] SIG.R = 9DEE1F7FD68B219EDE8149AAF5C4988BCD1E574BE9263BCF91129D790FE856E3F649B98F12BCD64BEB6308017B933868
3,449,803 UART: [art] SIG.S = 7AA6FA39D9F3D43B07E567FCF2333366DE1452118EE3985ACE83A9E6284D037DCCA0959593AA16697F69A490B764F833
3,472,942 UART: Caliptra RT
3,473,195 UART: [state] CFI Enabled
3,581,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,205 UART: [rt]cmd =0x43455252, len=4
3,623,042 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,781 ready_for_fw is high
1,362,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,941 >>> mbox cmd response: success
2,928,941 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,990,201 UART:
2,990,217 UART: Running Caliptra FMC ...
2,990,625 UART:
2,990,679 UART: [state] CFI Enabled
3,001,642 UART: [fht] FMC Alias Private Key: 7
3,109,601 UART: [art] Extend RT PCRs Done
3,110,029 UART: [art] Lock RT PCRs Done
3,111,445 UART: [art] Populate DV Done
3,119,728 UART: [fht] FMC Alias Private Key: 7
3,120,870 UART: [art] Derive CDI
3,121,150 UART: [art] Store in in slot 0x4
3,206,523 UART: [art] Derive Key Pair
3,206,883 UART: [art] Store priv key in slot 0x5
3,220,123 UART: [art] Derive Key Pair - Done
3,235,378 UART: [art] Signing Cert with AUTHO
3,235,858 UART: RITY.KEYID = 7
3,250,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,615 UART: [art] PUB.X = FB11B824E5DE35AAC0BBA29C76F3B61D1B9BFC5A90FDA471DCFCC803036992BB3EEA82CE28EC198EF0153005FCD25CF4
3,258,404 UART: [art] PUB.Y = C85702A4A0E5A0E7E5601503FC1BC6CD9EEFDF64DAB912A46AC7D1C36CEDE294B4E4451B4C960AB413A1DF100161ED89
3,265,362 UART: [art] SIG.R = E112EE05D76520A2E2AFFCFBF82AF9FC786FE3DB6329D0F7F06A06FBE810E898312E32FC616C1A1ACBE4ECBF25D043D7
3,272,152 UART: [art] SIG.S = F5871CA3611565B1BD92D5A0147F2B3A16E4F26FCE3B8F3D00F12F12786D968CACA4C62B115BAD4B0946C7B0F988727B
3,296,560 UART: Caliptra RT
3,296,813 UART: [state] CFI Enabled
3,405,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,300 UART: [rt]cmd =0x43455252, len=4
3,447,120 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,377 UART: [kat] SHA2-512-ACC
897,278 UART: [kat] ECC-384
902,969 UART: [kat] HMAC-384Kdf
907,591 UART: [kat] LMS
1,475,787 UART: [kat] --
1,476,660 UART: [cold-reset] ++
1,477,150 UART: [fht] Storing FHT @ 0x50003400
1,479,989 UART: [idev] ++
1,480,157 UART: [idev] CDI.KEYID = 6
1,480,517 UART: [idev] SUBJECT.KEYID = 7
1,480,941 UART: [idev] UDS.KEYID = 0
1,481,286 ready_for_fw is high
1,481,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,181 UART: [idev] Erasing UDS.KEYID = 0
1,506,133 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,685 UART: [idev] --
1,515,556 UART: [ldev] ++
1,515,724 UART: [ldev] CDI.KEYID = 6
1,516,087 UART: [ldev] SUBJECT.KEYID = 5
1,516,513 UART: [ldev] AUTHORITY.KEYID = 7
1,516,976 UART: [ldev] FE.KEYID = 1
1,522,036 UART: [ldev] Erasing FE.KEYID = 1
1,547,721 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,525 UART: [ldev] --
1,586,846 UART: [fwproc] Waiting for Commands...
1,587,669 UART: [fwproc] Received command 0x46574c44
1,588,460 UART: [fwproc] Received Image of size 114448 bytes
2,888,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,435 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,930 >>> mbox cmd response: success
3,079,930 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,081,158 UART: [afmc] ++
3,081,326 UART: [afmc] CDI.KEYID = 6
3,081,688 UART: [afmc] SUBJECT.KEYID = 7
3,082,113 UART: [afmc] AUTHORITY.KEYID = 5
3,117,218 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,598 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,991 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,151,703 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,159,463 UART: [afmc] --
3,160,341 UART: [cold-reset] --
3,161,101 UART: [state] Locking Datavault
3,162,304 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,908 UART: [state] Locking ICCM
3,163,378 UART: [exit] Launching FMC @ 0x40000130
3,168,707 UART:
3,168,723 UART: Running Caliptra FMC ...
3,169,131 UART:
3,169,274 UART: [state] CFI Enabled
3,180,217 UART: [fht] FMC Alias Private Key: 7
3,287,480 UART: [art] Extend RT PCRs Done
3,287,908 UART: [art] Lock RT PCRs Done
3,289,496 UART: [art] Populate DV Done
3,297,611 UART: [fht] FMC Alias Private Key: 7
3,298,791 UART: [art] Derive CDI
3,299,071 UART: [art] Store in in slot 0x4
3,384,292 UART: [art] Derive Key Pair
3,384,652 UART: [art] Store priv key in slot 0x5
3,397,470 UART: [art] Derive Key Pair - Done
3,412,560 UART: [art] Signing Cert with AUTHO
3,413,040 UART: RITY.KEYID = 7
3,428,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,513 UART: [art] PUB.X = F17E8A66A0DEBBAEA2C20AB62558DA1F06BA12C824B6DC6319A11C49FA37D8FD9511ACE2107C1384526C77762150C732
3,436,287 UART: [art] PUB.Y = D08C7812ACB85657DDCAC523E4788D4CF4CC53A8AE7F31A2F500651488B7D128AB179E485A5A47F76D9FEC4C69E8AD68
3,443,229 UART: [art] SIG.R = 648743B78DC0F117BA8876C2C49CAF2ACE99D454449150B98DEC5C93F0C130880F5B974351657B3F2E252CAA1A0E96E2
3,449,997 UART: [art] SIG.S = D826FF6C197EF9AA1193E22D068FFCBC85F4E7BC98CAA4A2FCA752C26386EBD892E53D13DC983FAD62FBA2E3B64ACC80
3,474,201 UART: Caliptra RT
3,474,546 UART: [state] CFI Enabled
3,582,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,798 UART: [rt]cmd =0x43455252, len=4
3,623,717 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,000 ready_for_fw is high
1,363,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,040 >>> mbox cmd response: success
2,930,040 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,992,178 UART:
2,992,194 UART: Running Caliptra FMC ...
2,992,602 UART:
2,992,745 UART: [state] CFI Enabled
3,003,384 UART: [fht] FMC Alias Private Key: 7
3,111,743 UART: [art] Extend RT PCRs Done
3,112,171 UART: [art] Lock RT PCRs Done
3,113,609 UART: [art] Populate DV Done
3,121,566 UART: [fht] FMC Alias Private Key: 7
3,122,534 UART: [art] Derive CDI
3,122,814 UART: [art] Store in in slot 0x4
3,208,339 UART: [art] Derive Key Pair
3,208,699 UART: [art] Store priv key in slot 0x5
3,221,843 UART: [art] Derive Key Pair - Done
3,236,845 UART: [art] Signing Cert with AUTHO
3,237,325 UART: RITY.KEYID = 7
3,252,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,430 UART: [art] PUB.X = D22EB9A2CC908164493DDE6CC476BACE0D8F1D0E1F4CA5F02C6923155A3E4D741850D1678A4F35CE2B4C4B173687958E
3,260,204 UART: [art] PUB.Y = 408C2039A92C5BB1C9A0619A2158FD1824ACB67C11DD0EDFA1FEE5A9E0CA61D0FF065B53F5DF0F71A121354664DC1104
3,267,156 UART: [art] SIG.R = BFB1369B8970F04FA1372513FBE780FD01532040F1DEEDC504F46C2516AA0A016F641DBDC9F7399BBBF64EFF40159806
3,273,921 UART: [art] SIG.S = CC25582C0D4C71B2031E9F211B8610DD3E132F95951CD8B6DDE4A1D155A85491CBA6C2D405ADCFA21290B66595032F2A
3,297,028 UART: Caliptra RT
3,297,373 UART: [state] CFI Enabled
3,405,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,774 UART: [rt]cmd =0x43455252, len=4
3,446,530 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
893,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,451 UART: [kat] ++
897,603 UART: [kat] sha1
901,863 UART: [kat] SHA2-256
903,803 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
918,198 UART: [kat] HMAC-384Kdf
922,868 UART: [kat] LMS
1,171,196 UART: [kat] --
1,171,843 UART: [cold-reset] ++
1,172,401 UART: [fht] FHT @ 0x50003400
1,175,092 UART: [idev] ++
1,175,260 UART: [idev] CDI.KEYID = 6
1,175,620 UART: [idev] SUBJECT.KEYID = 7
1,176,044 UART: [idev] UDS.KEYID = 0
1,176,389 ready_for_fw is high
1,176,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,830 UART: [idev] Erasing UDS.KEYID = 0
1,200,685 UART: [idev] Sha1 KeyId Algorithm
1,209,263 UART: [idev] --
1,210,205 UART: [ldev] ++
1,210,373 UART: [ldev] CDI.KEYID = 6
1,210,736 UART: [ldev] SUBJECT.KEYID = 5
1,211,162 UART: [ldev] AUTHORITY.KEYID = 7
1,211,625 UART: [ldev] FE.KEYID = 1
1,216,765 UART: [ldev] Erasing FE.KEYID = 1
1,243,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,093 UART: [ldev] --
1,282,436 UART: [fwproc] Wait for Commands...
1,283,114 UART: [fwproc] Recv command 0x46574c44
1,283,842 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,322 >>> mbox cmd response: success
2,776,322 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,777,638 UART: [afmc] ++
2,777,806 UART: [afmc] CDI.KEYID = 6
2,778,168 UART: [afmc] SUBJECT.KEYID = 7
2,778,593 UART: [afmc] AUTHORITY.KEYID = 5
2,813,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,451 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,064 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,847,774 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,855,690 UART: [afmc] --
2,856,778 UART: [cold-reset] --
2,857,626 UART: [state] Locking Datavault
2,858,823 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,427 UART: [state] Locking ICCM
2,860,035 UART: [exit] Launching FMC @ 0x40000130
2,865,364 UART:
2,865,380 UART: Running Caliptra FMC ...
2,865,788 UART:
2,865,842 UART: [state] CFI Enabled
2,875,891 UART: [fht] FMC Alias Private Key: 7
2,983,938 UART: [art] Extend RT PCRs Done
2,984,366 UART: [art] Lock RT PCRs Done
2,986,306 UART: [art] Populate DV Done
2,994,445 UART: [fht] FMC Alias Private Key: 7
2,995,549 UART: [art] Derive CDI
2,995,829 UART: [art] Store in in slot 0x4
3,081,466 UART: [art] Derive Key Pair
3,081,826 UART: [art] Store priv key in slot 0x5
3,094,486 UART: [art] Derive Key Pair - Done
3,109,358 UART: [art] Signing Cert with AUTHO
3,109,838 UART: RITY.KEYID = 7
3,124,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,189 UART: [art] PUB.X = 5235C71863C21F386254D87E86F7EB81153477CBB0366B78CE89C2A6D11B06EA11EC0D0D417FB8CDE7F4ECCE653B1D0F
3,131,959 UART: [art] PUB.Y = 52DB38692AC8E131B659D6C4007D9288CF3BA2C2D3DECE09564059043C9D57CB079C482CD0B81F5E8CDA57CC21C821BF
3,138,890 UART: [art] SIG.R = 5EABB02EA588CBE8DC5D2C61C4C67503950EF699D05866337A92D1730AC37B9C41067E73F6E569E8F7A0354D0C8BADF7
3,145,655 UART: [art] SIG.S = 4F6EF52ADAB429AC4131F443DFCC2259F48D1E0723291E28EBB22C2D3D9BF4F7B4861E68F2508D868EE47C0714DDC14B
3,169,360 UART: Caliptra RT
3,169,613 UART: [state] CFI Enabled
3,276,607 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,175 UART: [rt]cmd =0x43455252, len=4
3,318,140 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,769 ready_for_fw is high
1,059,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,997 >>> mbox cmd response: success
2,627,997 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,689,337 UART:
2,689,353 UART: Running Caliptra FMC ...
2,689,761 UART:
2,689,815 UART: [state] CFI Enabled
2,700,022 UART: [fht] FMC Alias Private Key: 7
2,807,353 UART: [art] Extend RT PCRs Done
2,807,781 UART: [art] Lock RT PCRs Done
2,809,591 UART: [art] Populate DV Done
2,817,918 UART: [fht] FMC Alias Private Key: 7
2,819,018 UART: [art] Derive CDI
2,819,298 UART: [art] Store in in slot 0x4
2,904,681 UART: [art] Derive Key Pair
2,905,041 UART: [art] Store priv key in slot 0x5
2,917,939 UART: [art] Derive Key Pair - Done
2,933,011 UART: [art] Signing Cert with AUTHO
2,933,491 UART: RITY.KEYID = 7
2,948,517 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,282 UART: [art] PUB.X = 9831B2D65CFE6D554B050A6F8CBDB544B1BEB7BD1F52DBAD1DE015BF4F6A92D76C5D8B9C34AC4FFEC6E454AF2921D7DB
2,956,078 UART: [art] PUB.Y = 1A7D9362D7B542DFF0ADEC06CF9ABBA6AF973840F67D50D64D2050A2E4EBED0AF4984788889506689828D4106BD4A1B6
2,963,029 UART: [art] SIG.R = FBD74347128C3FC87C42A206F999C4C546ABAA72965D80E72F499AAFDD7D77526F09F80E459215499635EEA23C72649A
2,969,792 UART: [art] SIG.S = 1EA6B005D262F19623D0474123A87F7D5186AC42EC1E8F6633C8592948122F4B49E462C4C37DB71637F759E0C94201CF
2,993,531 UART: Caliptra RT
2,993,784 UART: [state] CFI Enabled
3,100,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,318 UART: [rt]cmd =0x43455252, len=4
3,142,249 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
893,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,674 UART: [kat] ++
897,826 UART: [kat] sha1
902,164 UART: [kat] SHA2-256
904,104 UART: [kat] SHA2-384
906,869 UART: [kat] SHA2-512-ACC
908,770 UART: [kat] ECC-384
918,721 UART: [kat] HMAC-384Kdf
923,293 UART: [kat] LMS
1,171,621 UART: [kat] --
1,172,528 UART: [cold-reset] ++
1,172,864 UART: [fht] FHT @ 0x50003400
1,175,359 UART: [idev] ++
1,175,527 UART: [idev] CDI.KEYID = 6
1,175,887 UART: [idev] SUBJECT.KEYID = 7
1,176,311 UART: [idev] UDS.KEYID = 0
1,176,656 ready_for_fw is high
1,176,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,259 UART: [idev] Erasing UDS.KEYID = 0
1,201,176 UART: [idev] Sha1 KeyId Algorithm
1,209,472 UART: [idev] --
1,210,628 UART: [ldev] ++
1,210,796 UART: [ldev] CDI.KEYID = 6
1,211,159 UART: [ldev] SUBJECT.KEYID = 5
1,211,585 UART: [ldev] AUTHORITY.KEYID = 7
1,212,048 UART: [ldev] FE.KEYID = 1
1,217,548 UART: [ldev] Erasing FE.KEYID = 1
1,243,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,926 UART: [ldev] --
1,283,367 UART: [fwproc] Wait for Commands...
1,283,979 UART: [fwproc] Recv command 0x46574c44
1,284,707 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,338 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,207 >>> mbox cmd response: success
2,776,207 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,777,429 UART: [afmc] ++
2,777,597 UART: [afmc] CDI.KEYID = 6
2,777,959 UART: [afmc] SUBJECT.KEYID = 7
2,778,384 UART: [afmc] AUTHORITY.KEYID = 5
2,814,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,358 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,086 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,971 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,848,681 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,856,537 UART: [afmc] --
2,857,449 UART: [cold-reset] --
2,858,429 UART: [state] Locking Datavault
2,859,566 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,170 UART: [state] Locking ICCM
2,860,592 UART: [exit] Launching FMC @ 0x40000130
2,865,921 UART:
2,865,937 UART: Running Caliptra FMC ...
2,866,345 UART:
2,866,488 UART: [state] CFI Enabled
2,876,933 UART: [fht] FMC Alias Private Key: 7
2,984,862 UART: [art] Extend RT PCRs Done
2,985,290 UART: [art] Lock RT PCRs Done
2,986,700 UART: [art] Populate DV Done
2,994,975 UART: [fht] FMC Alias Private Key: 7
2,995,959 UART: [art] Derive CDI
2,996,239 UART: [art] Store in in slot 0x4
3,082,264 UART: [art] Derive Key Pair
3,082,624 UART: [art] Store priv key in slot 0x5
3,096,458 UART: [art] Derive Key Pair - Done
3,111,418 UART: [art] Signing Cert with AUTHO
3,111,898 UART: RITY.KEYID = 7
3,127,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,047 UART: [art] PUB.X = D0DCABAB7BFF6404A5BA0985149885E0519DE2A276FF587213465257297C72D70EAF41117A81EE46EEFE2002DE7FC43D
3,134,815 UART: [art] PUB.Y = 73FF58B4CDF01FBACC8C4D91211BCD689AAF70354EDF66F36E70F73689EF23B4704269C62361CBF5404B717F5CC951F4
3,141,777 UART: [art] SIG.R = 14F1651686C6085E9C36CC2964F4D1BD33FE8EE07770CC36B123EB57D86A9C673E54FC7806D69BF80F42BB10C84501E0
3,148,539 UART: [art] SIG.S = BDA79966BBF2228DE5795CDDB7E5BB1F2F73A4A8B67FC20B848EBD51DAFFC0CDEE710A107DD8610AC3D16ED85E30798B
3,171,779 UART: Caliptra RT
3,172,124 UART: [state] CFI Enabled
3,280,746 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,054 UART: [rt]cmd =0x43455252, len=4
3,321,853 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,350 ready_for_fw is high
1,060,350 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,398 >>> mbox cmd response: success
2,628,398 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,690,324 UART:
2,690,340 UART: Running Caliptra FMC ...
2,690,748 UART:
2,690,891 UART: [state] CFI Enabled
2,701,620 UART: [fht] FMC Alias Private Key: 7
2,810,339 UART: [art] Extend RT PCRs Done
2,810,767 UART: [art] Lock RT PCRs Done
2,812,501 UART: [art] Populate DV Done
2,820,792 UART: [fht] FMC Alias Private Key: 7
2,821,922 UART: [art] Derive CDI
2,822,202 UART: [art] Store in in slot 0x4
2,907,821 UART: [art] Derive Key Pair
2,908,181 UART: [art] Store priv key in slot 0x5
2,921,803 UART: [art] Derive Key Pair - Done
2,936,578 UART: [art] Signing Cert with AUTHO
2,937,058 UART: RITY.KEYID = 7
2,952,176 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,941 UART: [art] PUB.X = 3992890E1D02885453C1DE3E23533F8AAB3FA398EBE9398F7E22ED83B658DB6F123F0B56CB6DACA71D408715189E3BED
2,959,712 UART: [art] PUB.Y = DC15CAEEDC04E6066E1DEE5B8F9C736BB78FFCABEFC7D446553DA49685DBD072F545FB781DB796F08094E5EA2209DBC3
2,966,679 UART: [art] SIG.R = A2995ABE6AD163A0C85D8B8206FD8CAC403B923F95792A6C21501734F38E4A8F381E430F7FD53BDC4A4CC981D9E58ACB
2,973,457 UART: [art] SIG.S = 2BF2B440C18C6668E218F4C57B443E659B0ECCF2D038B7650BBBA8C0DF88BBD4CAADB92071142C48C611C0D783CB7688
2,997,554 UART: Caliptra RT
2,997,899 UART: [state] CFI Enabled
3,106,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,985 UART: [rt]cmd =0x43455252, len=4
3,147,650 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
88,148 UART: [kat] SHA2-256
891,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,827 UART: [kat] ++
895,979 UART: [kat] sha1
900,187 UART: [kat] SHA2-256
902,127 UART: [kat] SHA2-384
904,890 UART: [kat] SHA2-512-ACC
906,791 UART: [kat] ECC-384
916,742 UART: [kat] HMAC-384Kdf
921,374 UART: [kat] LMS
1,169,686 UART: [kat] --
1,170,685 UART: [cold-reset] ++
1,171,039 UART: [fht] FHT @ 0x50003400
1,173,801 UART: [idev] ++
1,173,969 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,755 UART: [idev] UDS.KEYID = 0
1,175,101 ready_for_fw is high
1,175,101 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,167 UART: [idev] Erasing UDS.KEYID = 0
1,199,567 UART: [idev] Sha1 KeyId Algorithm
1,208,563 UART: [idev] --
1,209,458 UART: [ldev] ++
1,209,626 UART: [ldev] CDI.KEYID = 6
1,209,990 UART: [ldev] SUBJECT.KEYID = 5
1,210,417 UART: [ldev] AUTHORITY.KEYID = 7
1,210,880 UART: [ldev] FE.KEYID = 1
1,215,804 UART: [ldev] Erasing FE.KEYID = 1
1,241,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,294 UART: [ldev] --
1,280,792 UART: [fwproc] Wait for Commands...
1,281,435 UART: [fwproc] Recv command 0x46574c44
1,282,168 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,308 >>> mbox cmd response: success
2,773,308 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,774,547 UART: [afmc] ++
2,774,715 UART: [afmc] CDI.KEYID = 6
2,775,078 UART: [afmc] SUBJECT.KEYID = 7
2,775,504 UART: [afmc] AUTHORITY.KEYID = 5
2,811,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,896 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,625 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,508 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,846,218 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,854,251 UART: [afmc] --
2,855,343 UART: [cold-reset] --
2,856,189 UART: [state] Locking Datavault
2,857,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,844 UART: [state] Locking ICCM
2,858,290 UART: [exit] Launching FMC @ 0x40000130
2,863,619 UART:
2,863,635 UART: Running Caliptra FMC ...
2,864,043 UART:
2,864,097 UART: [state] CFI Enabled
2,874,430 UART: [fht] FMC Alias Private Key: 7
2,982,507 UART: [art] Extend RT PCRs Done
2,982,935 UART: [art] Lock RT PCRs Done
2,984,249 UART: [art] Populate DV Done
2,992,276 UART: [fht] FMC Alias Private Key: 7
2,993,318 UART: [art] Derive CDI
2,993,598 UART: [art] Store in in slot 0x4
3,079,325 UART: [art] Derive Key Pair
3,079,685 UART: [art] Store priv key in slot 0x5
3,093,123 UART: [art] Derive Key Pair - Done
3,108,218 UART: [art] Signing Cert with AUTHO
3,108,698 UART: RITY.KEYID = 7
3,123,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,557 UART: [art] PUB.X = FC4BCD393ABC5583559E9224AF6AB2398EBF659E33F0B15789378A37665651E845CE9EA9BCA2D83F58A3EEF4760D4D1D
3,131,336 UART: [art] PUB.Y = 12E3D9FD7E3E5454681E9268C374CAD34A699333B6879F2098B8B39C447C39E32291627D104A2DDE218119B8E02CFA8E
3,138,284 UART: [art] SIG.R = 72F0707313E7093323CBDDB04A8B3727E48A502D05EE2EF254156255D945306299EF34F69D2CB4D874241347A115C2E1
3,145,040 UART: [art] SIG.S = F6143A18BD27FCB1296CD6D8C567C565152628D526C84AA9A9D19018EE7772159687CC06773F8948FB12A8EF926027D2
3,168,854 UART: Caliptra RT
3,169,107 UART: [state] CFI Enabled
3,276,385 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,917 UART: [rt]cmd =0x43455252, len=4
3,317,892 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,454 ready_for_fw is high
1,056,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,998 >>> mbox cmd response: success
2,623,998 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,686,196 UART:
2,686,212 UART: Running Caliptra FMC ...
2,686,620 UART:
2,686,674 UART: [state] CFI Enabled
2,697,213 UART: [fht] FMC Alias Private Key: 7
2,804,802 UART: [art] Extend RT PCRs Done
2,805,230 UART: [art] Lock RT PCRs Done
2,806,958 UART: [art] Populate DV Done
2,815,367 UART: [fht] FMC Alias Private Key: 7
2,816,493 UART: [art] Derive CDI
2,816,773 UART: [art] Store in in slot 0x4
2,902,734 UART: [art] Derive Key Pair
2,903,094 UART: [art] Store priv key in slot 0x5
2,915,778 UART: [art] Derive Key Pair - Done
2,930,618 UART: [art] Signing Cert with AUTHO
2,931,098 UART: RITY.KEYID = 7
2,945,964 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,729 UART: [art] PUB.X = 03B7AE3CFADFD94D22BEC46170EA63F25606F909A184DADDF6FD952F97A07CF14B6264625687026E524B17C38E34EB8F
2,953,499 UART: [art] PUB.Y = 388AF63B622A215E4B63B02C03788CE2C015C83DC210932A560FF75CE1AF406B7A489192FB7712130AC133356AC5C8FB
2,960,442 UART: [art] SIG.R = 2C21ED94D59144FF759EF42CDDCAC62024F376BEE5A40A8A44AB919326A068BDBA306B875FF0332CAFD0DC6B279BFC22
2,967,229 UART: [art] SIG.S = 974763EC0DA0598E57DA8569CFAB27DE5009E07FD6B74C33DDF35AFEC58A4BDBCE18CCF9C054FE26D2D03AE4B5A530B6
2,990,828 UART: Caliptra RT
2,991,081 UART: [state] CFI Enabled
3,098,517 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,807 UART: [rt]cmd =0x43455252, len=4
3,139,776 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,287 UART: [kat] SHA2-256
891,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,966 UART: [kat] ++
896,118 UART: [kat] sha1
900,368 UART: [kat] SHA2-256
902,308 UART: [kat] SHA2-384
904,993 UART: [kat] SHA2-512-ACC
906,894 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,632 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,174,574 ready_for_fw is high
1,174,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,198,646 UART: [idev] Sha1 KeyId Algorithm
1,207,368 UART: [idev] --
1,208,513 UART: [ldev] ++
1,208,681 UART: [ldev] CDI.KEYID = 6
1,209,045 UART: [ldev] SUBJECT.KEYID = 5
1,209,472 UART: [ldev] AUTHORITY.KEYID = 7
1,209,935 UART: [ldev] FE.KEYID = 1
1,215,207 UART: [ldev] Erasing FE.KEYID = 1
1,241,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,637 UART: [ldev] --
1,280,981 UART: [fwproc] Wait for Commands...
1,281,588 UART: [fwproc] Recv command 0x46574c44
1,282,321 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,565 >>> mbox cmd response: success
2,773,565 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,774,788 UART: [afmc] ++
2,774,956 UART: [afmc] CDI.KEYID = 6
2,775,319 UART: [afmc] SUBJECT.KEYID = 7
2,775,745 UART: [afmc] AUTHORITY.KEYID = 5
2,811,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,107 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,836 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,719 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,846,429 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,854,194 UART: [afmc] --
2,855,272 UART: [cold-reset] --
2,856,054 UART: [state] Locking Datavault
2,857,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,909 UART: [state] Locking ICCM
2,858,429 UART: [exit] Launching FMC @ 0x40000130
2,863,758 UART:
2,863,774 UART: Running Caliptra FMC ...
2,864,182 UART:
2,864,325 UART: [state] CFI Enabled
2,874,846 UART: [fht] FMC Alias Private Key: 7
2,982,929 UART: [art] Extend RT PCRs Done
2,983,357 UART: [art] Lock RT PCRs Done
2,985,059 UART: [art] Populate DV Done
2,993,286 UART: [fht] FMC Alias Private Key: 7
2,994,400 UART: [art] Derive CDI
2,994,680 UART: [art] Store in in slot 0x4
3,080,503 UART: [art] Derive Key Pair
3,080,863 UART: [art] Store priv key in slot 0x5
3,094,895 UART: [art] Derive Key Pair - Done
3,109,902 UART: [art] Signing Cert with AUTHO
3,110,382 UART: RITY.KEYID = 7
3,125,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,237 UART: [art] PUB.X = 6E9777F4A05F6D5D089B2962D8B99562BDA296478BBFE933CFAE4C600F607A431BC14C1C19E2EC3CACAB7955A8A3B35E
3,133,017 UART: [art] PUB.Y = 210C6F36F0AEA2CF2E937082BEA000EE1074E622B5930427C1252794166B7488D4ACF8B413D46E2AB8CB42F725348B06
3,139,936 UART: [art] SIG.R = 09573D63093DDA2E2BDB9D312C580D2C8C18DB32F26F602FED50A5D2C0B01BC09E92BC3E125DBD770F465D5B9028F8AA
3,146,710 UART: [art] SIG.S = E120B498C07716699F2D96B42B99F5996BC3928C54E79DC8C83070282F528793ABF8D9F7D5B3FB8817BDC5A166BA3A76
3,170,429 UART: Caliptra RT
3,170,774 UART: [state] CFI Enabled
3,279,218 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,788 UART: [rt]cmd =0x43455252, len=4
3,320,717 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,697 ready_for_fw is high
1,055,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,645 >>> mbox cmd response: success
2,623,645 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,686,613 UART:
2,686,629 UART: Running Caliptra FMC ...
2,687,037 UART:
2,687,180 UART: [state] CFI Enabled
2,697,943 UART: [fht] FMC Alias Private Key: 7
2,805,774 UART: [art] Extend RT PCRs Done
2,806,202 UART: [art] Lock RT PCRs Done
2,808,072 UART: [art] Populate DV Done
2,816,279 UART: [fht] FMC Alias Private Key: 7
2,817,447 UART: [art] Derive CDI
2,817,727 UART: [art] Store in in slot 0x4
2,903,476 UART: [art] Derive Key Pair
2,903,836 UART: [art] Store priv key in slot 0x5
2,917,524 UART: [art] Derive Key Pair - Done
2,932,599 UART: [art] Signing Cert with AUTHO
2,933,079 UART: RITY.KEYID = 7
2,948,231 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,996 UART: [art] PUB.X = 41DB52EA521ED8EAF380030F1738DB64958FBD225C3BF947F0C80FAB46A4904B3D4EBB5F5F70663F5EC2A34729301198
2,955,765 UART: [art] PUB.Y = 4247CAB0B8F83852EA11760B0011111A64B7AA8A9E9C8DF89517F9D4170C82726377CE98FAA696738E2B6D74CA556929
2,962,685 UART: [art] SIG.R = 16A327E18BF42F672FA2C722D08FADD301AFBD5FFAB8A168662B5062820C1D0C4A16E6419FFD95D76E0B16FFFE282B76
2,969,459 UART: [art] SIG.S = D165141FB37252219A200BA51FF7F87AE9BAD4A8AC2AD2CA7C18A39767C00618A7D03498D59BF1F510FE19C3B31D762B
2,993,346 UART: Caliptra RT
2,993,691 UART: [state] CFI Enabled
3,101,711 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,375 UART: [rt]cmd =0x43455252, len=4
3,143,198 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,955 UART:
192,330 UART: Running Caliptra ROM ...
193,482 UART:
193,635 UART: [state] CFI Enabled
265,302 UART: [state] LifecycleState = Unprovisioned
267,217 UART: [state] DebugLocked = No
268,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,639 UART: [kat] SHA2-256
443,312 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,825 UART: [kat] ++
454,299 UART: [kat] sha1
465,744 UART: [kat] SHA2-256
468,394 UART: [kat] SHA2-384
474,448 UART: [kat] SHA2-512-ACC
476,815 UART: [kat] ECC-384
2,768,534 UART: [kat] HMAC-384Kdf
2,780,275 UART: [kat] LMS
3,970,579 UART: [kat] --
3,975,858 UART: [cold-reset] ++
3,977,077 UART: [fht] Storing FHT @ 0x50003400
3,988,001 UART: [idev] ++
3,988,566 UART: [idev] CDI.KEYID = 6
3,989,450 UART: [idev] SUBJECT.KEYID = 7
3,990,713 UART: [idev] UDS.KEYID = 0
3,991,690 ready_for_fw is high
3,991,911 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,533 UART: [idev] Erasing UDS.KEYID = 0
7,326,940 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,171 UART: [idev] --
7,353,757 UART: [ldev] ++
7,354,325 UART: [ldev] CDI.KEYID = 6
7,355,340 UART: [ldev] SUBJECT.KEYID = 5
7,356,498 UART: [ldev] AUTHORITY.KEYID = 7
7,357,729 UART: [ldev] FE.KEYID = 1
7,401,484 UART: [ldev] Erasing FE.KEYID = 1
10,736,686 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,879 UART: [ldev] --
13,093,930 UART: [fwproc] Waiting for Commands...
13,096,413 UART: [fwproc] Received command 0x46574c44
13,098,597 UART: [fwproc] Received Image of size 114124 bytes
17,157,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,235,291 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,199 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,621,298 >>> mbox cmd response: success
17,622,215 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,626,077 UART: [afmc] ++
17,626,682 UART: [afmc] CDI.KEYID = 6
17,627,668 UART: [afmc] SUBJECT.KEYID = 7
17,628,831 UART: [afmc] AUTHORITY.KEYID = 5
21,080,535 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,377,997 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,380,397 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,394,705 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,409,507 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,423,899 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,445,125 UART: [afmc] --
23,449,527 UART: [cold-reset] --
23,454,737 UART: [state] Locking Datavault
23,458,529 UART: [state] Locking PCR0, PCR1 and PCR31
23,460,413 UART: [state] Locking ICCM
23,461,485 UART: [exit] Launching FMC @ 0x40000130
23,469,838 UART:
23,470,073 UART: Running Caliptra FMC ...
23,471,105 UART:
23,471,253 UART: [state] CFI Enabled
23,537,087 UART: [fht] FMC Alias Private Key: 7
25,875,616 UART: [art] Extend RT PCRs Done
25,876,851 UART: [art] Lock RT PCRs Done
25,878,828 UART: [art] Populate DV Done
25,884,240 UART: [fht] FMC Alias Private Key: 7
25,885,722 UART: [art] Derive CDI
25,886,457 UART: [art] Store in in slot 0x4
25,946,126 UART: [art] Derive Key Pair
25,947,161 UART: [art] Store priv key in slot 0x5
29,239,800 UART: [art] Derive Key Pair - Done
29,252,582 UART: [art] Signing Cert with AUTHO
29,253,878 UART: RITY.KEYID = 7
31,542,125 UART: [art] Erasing AUTHORITY.KEYID = 7
31,543,629 UART: [art] PUB.X = 451295CB426F35621BC76DD6929F27298F759C4FA63302D968D5262CE7F0F1AEC8F36D4B58DD2088D790DCF2EFBB2AD9
31,550,873 UART: [art] PUB.Y = 733E40356124D05A4B753179EACEE9133B82F52BD5AAB6F72455F04F009DFD4E9ACF73117E320FA671FFC29EC5F201ED
31,558,153 UART: [art] SIG.R = 27FEAFF9735E2A6408E2AA1235276103F92D4C64BCFAB978E77C79DE34DC4BFD4D3BB2A8BB2832B6D5A0EF50F8C92191
31,565,549 UART: [art] SIG.S = BC0B7D2DEE210049CFDE322C80DDCA58AFD9FE81577796249F8DEE612E2C4A7AD7CB3656FA29E520AA96778A1984950F
32,870,251 UART: Caliptra RT
32,870,985 UART: [state] CFI Enabled
33,033,051 UART: [rt] RT listening for mailbox commands...
33,064,466 UART: [rt]cmd =0x4453424c, len=4
36,365,755 >>> mbox cmd response data (8 bytes)
38,495,421 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
38,640,462 UART:
38,640,847 UART: Running Caliptra ROM ...
38,641,898 UART:
38,642,054 UART: [state] CFI Enabled
38,711,232 UART: [state] LifecycleState = Unprovisioned
38,713,178 UART: [state] DebugLocked = No
38,716,027 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,720,554 UART: [kat] SHA2-256
38,890,268 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,900,738 UART: [kat] ++
38,901,224 UART: [kat] sha1
38,912,279 UART: [kat] SHA2-256
38,914,985 UART: [kat] SHA2-384
38,921,568 UART: [kat] SHA2-512-ACC
38,923,915 UART: [kat] ECC-384
41,214,133 UART: [kat] HMAC-384Kdf
41,246,564 UART: [kat] LMS
42,436,883 UART: [kat] --
42,440,233 UART: [update-reset] ++
46,581,708 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,585,104 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
46,967,381 >>> mbox cmd response: success
46,967,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,968,646 UART: [update-reset] Copying MAN_2 To MAN_1
46,991,064 UART: [update-reset Success] --
46,996,574 UART: [state] Locking Datavault
46,999,460 UART: [state] Locking PCR0, PCR1 and PCR31
47,001,221 UART: [state] Locking ICCM
47,002,467 UART: [exit] Launching FMC @ 0x40000130
47,010,872 UART:
47,011,119 UART: Running Caliptra FMC ...
47,012,223 UART:
47,012,388 UART: [state] CFI Enabled
47,102,416 UART: [art] Extend RT PCRs Done
47,103,593 UART: [art] Lock RT PCRs Done
47,104,882 UART: [art] Populate DV Done
47,110,574 UART: [fht] FMC Alias Private Key: 7
47,112,248 UART: [art] Derive CDI
47,113,084 UART: [art] Store in in slot 0x4
47,171,826 UART: [art] Derive Key Pair
47,172,895 UART: [art] Store priv key in slot 0x5
50,465,457 UART: [art] Derive Key Pair - Done
50,478,507 UART: [art] Signing Cert with AUTHO
50,479,811 UART: RITY.KEYID = 7
52,767,069 UART: [art] Erasing AUTHORITY.KEYID = 7
52,768,574 UART: [art] PUB.X = 792911A6A5C25298D0F5BA53330D4EEA20E238ACBFF0520CACB4543505D1E84230337C2229D2E586B9EFE55FC9CB6B7E
52,775,826 UART: [art] PUB.Y = 16BC16E39EF3C7AFCDE6C276FE5A82B55B5BFA605B2C6C190FA510567F3C5DE6A6E260D251BAEC6A240971C6FF92E91C
52,783,105 UART: [art] SIG.R = B564FF257135C6C9701E180C8E64A0018FB3DA6F16B2150BEF55B752518F856355C27CAEB2D4D85EDC52D1390036989C
52,790,435 UART: [art] SIG.S = D20057B27D7235A8847349E55E282930DEB5C4120FD1497D3D5C8DFDE44F6910AFF235180F4BCC8A9E95843E6B216ECC
54,095,612 UART: Caliptra RT
54,096,343 UART: [state] CFI Enabled
57,706,020 UART: [rt] RT listening for mailbox commands...
57,736,930 UART: [rt]cmd =0x494e464f, len=4
57,740,679 >>> mbox cmd response data (264 bytes)
57,742,394 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,772,179 UART: [rt]cmd =0x43455252, len=4
57,783,435 >>> mbox cmd response data (784 bytes)
57,824,761 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,855,588 UART: [rt]cmd =0x44504543, len=92
63,615,850 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,802,697 ready_for_fw is high
3,803,099 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,884,056 >>> mbox cmd response: success
17,884,640 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,565,954 UART:
23,566,698 UART: Running Caliptra FMC ...
23,567,843 UART:
23,567,998 UART: [state] CFI Enabled
23,636,045 UART: [fht] FMC Alias Private Key: 7
25,973,286 UART: [art] Extend RT PCRs Done
25,974,523 UART: [art] Lock RT PCRs Done
25,976,076 UART: [art] Populate DV Done
25,981,557 UART: [fht] FMC Alias Private Key: 7
25,983,314 UART: [art] Derive CDI
25,984,058 UART: [art] Store in in slot 0x4
26,043,800 UART: [art] Derive Key Pair
26,044,845 UART: [art] Store priv key in slot 0x5
29,337,323 UART: [art] Derive Key Pair - Done
29,350,169 UART: [art] Signing Cert with AUTHO
29,351,502 UART: RITY.KEYID = 7
31,638,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,150 UART: [art] PUB.X = 77594CB157485B218120EA08DA4204EC9D7261197A847CCC78F72D45F48EAE8AEB55DC830FE318E5D3DF9918F1C076FB
31,647,377 UART: [art] PUB.Y = 60E6A8914D0CC03B00F7ECE2D9CBC7CB509716063B45A6FBB3C442D11AC1223B5839AA5C314E0FB2A978A8106E7DF237
31,654,644 UART: [art] SIG.R = 125F96484E769EA66C5604CC62D466C789B89050D01550479AB5F0D43DF241939955ADDB7FC2149EF62FF0DAC953E6D1
31,662,009 UART: [art] SIG.S = 892B0F5283BA904BF02F44976959BCBFFB1F458F757064E930583F728F91AF5A08B80C5A0EA07285625133C976F986E4
32,966,651 UART: Caliptra RT
32,967,356 UART: [state] CFI Enabled
33,130,771 UART: [rt] RT listening for mailbox commands...
33,162,215 UART: [rt]cmd =0x4453424c, len=4
36,462,050 >>> mbox cmd response data (8 bytes)
38,589,935 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
47,338,799 >>> mbox cmd response: success
47,339,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,372,503 UART:
47,372,791 UART: Running Caliptra FMC ...
47,373,828 UART:
47,373,979 UART: [state] CFI Enabled
47,473,511 UART: [art] Extend RT PCRs Done
47,474,704 UART: [art] Lock RT PCRs Done
47,476,210 UART: [art] Populate DV Done
47,482,006 UART: [fht] FMC Alias Private Key: 7
47,483,505 UART: [art] Derive CDI
47,484,242 UART: [art] Store in in slot 0x4
47,542,870 UART: [art] Derive Key Pair
47,543,869 UART: [art] Store priv key in slot 0x5
50,836,648 UART: [art] Derive Key Pair - Done
50,849,832 UART: [art] Signing Cert with AUTHO
50,851,137 UART: RITY.KEYID = 7
53,138,276 UART: [art] Erasing AUTHORITY.KEYID = 7
53,139,786 UART: [art] PUB.X = 8E67154EA6820D98A763EFAB39336181401A8E54C1A66AD0D154EFC0659AB10344BDD4E57B1CA89A863DE4ED7A4F8D1A
53,147,101 UART: [art] PUB.Y = E227966DEF18A6690D2C312B1E2A9093CA53ACE08BEFE11AFFC2BFDCAA83D2582A795D8CE58B7722D47D6952AC341A2C
53,154,313 UART: [art] SIG.R = BDA221BD9AD9EEEB1AC845B0EC66264E0219549E03D27D6ED3BD7ACD128CF1EFD7911A7A7D32416EC5D11761DE2D7797
53,161,723 UART: [art] SIG.S = 674BB0EE4110445AA19EFEF09628452742CE63AA23CD92F2EB48D996A9ECC6ECC238978A257F39D6D69D4C49F022A191
54,466,931 UART: Caliptra RT
54,467,642 UART: [state] CFI Enabled
58,081,701 UART: [rt] RT listening for mailbox commands...
58,112,617 UART: [rt]cmd =0x494e464f, len=4
58,116,558 >>> mbox cmd response data (264 bytes)
58,118,221 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
58,147,788 UART: [rt]cmd =0x43455252, len=4
58,159,140 >>> mbox cmd response data (783 bytes)
58,201,062 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,231,764 UART: [rt]cmd =0x44504543, len=92
63,990,012 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.33s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,413 UART:
192,789 UART: Running Caliptra ROM ...
193,941 UART:
603,450 UART: [state] CFI Enabled
619,358 UART: [state] LifecycleState = Unprovisioned
621,268 UART: [state] DebugLocked = No
623,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,735 UART: [kat] SHA2-256
798,514 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,031 UART: [kat] ++
809,512 UART: [kat] sha1
820,452 UART: [kat] SHA2-256
823,180 UART: [kat] SHA2-384
829,730 UART: [kat] SHA2-512-ACC
832,090 UART: [kat] ECC-384
3,116,970 UART: [kat] HMAC-384Kdf
3,129,204 UART: [kat] LMS
4,319,274 UART: [kat] --
4,325,203 UART: [cold-reset] ++
4,326,917 UART: [fht] Storing FHT @ 0x50003400
4,338,815 UART: [idev] ++
4,339,383 UART: [idev] CDI.KEYID = 6
4,340,354 UART: [idev] SUBJECT.KEYID = 7
4,341,595 UART: [idev] UDS.KEYID = 0
4,342,568 ready_for_fw is high
4,342,774 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,546 UART: [idev] Erasing UDS.KEYID = 0
7,625,180 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,359 UART: [idev] --
7,651,803 UART: [ldev] ++
7,652,378 UART: [ldev] CDI.KEYID = 6
7,653,487 UART: [ldev] SUBJECT.KEYID = 5
7,654,591 UART: [ldev] AUTHORITY.KEYID = 7
7,655,814 UART: [ldev] FE.KEYID = 1
7,666,776 UART: [ldev] Erasing FE.KEYID = 1
10,955,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,876 UART: [ldev] --
13,316,276 UART: [fwproc] Waiting for Commands...
13,318,307 UART: [fwproc] Received command 0x46574c44
13,320,479 UART: [fwproc] Received Image of size 114124 bytes
17,375,626 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,195 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,076 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,839,816 >>> mbox cmd response: success
17,840,290 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,843,131 UART: [afmc] ++
17,843,733 UART: [afmc] CDI.KEYID = 6
17,844,611 UART: [afmc] SUBJECT.KEYID = 7
17,845,873 UART: [afmc] AUTHORITY.KEYID = 5
21,160,043 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,695 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,950 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,326 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,152 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,578 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,700 UART: [afmc] --
23,526,043 UART: [cold-reset] --
23,531,096 UART: [state] Locking Datavault
23,534,666 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,416 UART: [state] Locking ICCM
23,537,532 UART: [exit] Launching FMC @ 0x40000130
23,545,916 UART:
23,546,172 UART: Running Caliptra FMC ...
23,547,272 UART:
23,547,423 UART: [state] CFI Enabled
23,555,298 UART: [fht] FMC Alias Private Key: 7
25,886,733 UART: [art] Extend RT PCRs Done
25,887,955 UART: [art] Lock RT PCRs Done
25,889,283 UART: [art] Populate DV Done
25,894,909 UART: [fht] FMC Alias Private Key: 7
25,896,503 UART: [art] Derive CDI
25,897,312 UART: [art] Store in in slot 0x4
25,940,219 UART: [art] Derive Key Pair
25,941,214 UART: [art] Store priv key in slot 0x5
29,183,415 UART: [art] Derive Key Pair - Done
29,196,572 UART: [art] Signing Cert with AUTHO
29,197,874 UART: RITY.KEYID = 7
31,477,322 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,848 UART: [art] PUB.X = D34D42CAB247406D424DE0C9DF8268EEB1B40D711F58965ADEE6B25FD5EC161A8ED1FF0759611742147D2436C471D709
31,486,082 UART: [art] PUB.Y = D33C15D151B98A2684C6C7A838F4FD199358AC3297DDA6C420E2683FE7638EE4381B5DD423DEEF64B1DBD76155263020
31,493,303 UART: [art] SIG.R = 78177262262DD9301AAA131EA88E1AAAE05E554099582FED09BA8ECA269C8155066D6571F5A2DC0E107193196B6EDA79
31,500,700 UART: [art] SIG.S = FDDF9A9A3055DABDC8C4390625886C5125A28A377C7B51BD74C9F00C45F7E12D729456E46EC59370D324081FC1FFA0E7
32,805,807 UART: Caliptra RT
32,806,507 UART: [state] CFI Enabled
32,924,318 UART: [rt] RT listening for mailbox commands...
32,955,847 UART: [rt]cmd =0x4453424c, len=4
36,199,254 >>> mbox cmd response data (8 bytes)
38,253,835 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
38,398,857 UART:
38,399,249 UART: Running Caliptra ROM ...
38,400,385 UART:
38,400,551 UART: [state] CFI Enabled
38,416,189 UART: [state] LifecycleState = Unprovisioned
38,418,082 UART: [state] DebugLocked = No
38,420,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,425,812 UART: [kat] SHA2-256
38,595,513 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,606,039 UART: [kat] ++
38,606,751 UART: [kat] sha1
38,617,215 UART: [kat] SHA2-256
38,619,908 UART: [kat] SHA2-384
38,626,809 UART: [kat] SHA2-512-ACC
38,629,160 UART: [kat] ECC-384
40,912,779 UART: [kat] HMAC-384Kdf
40,925,001 UART: [kat] LMS
42,115,040 UART: [kat] --
42,119,491 UART: [update-reset] ++
46,259,104 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,262,121 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
46,644,437 >>> mbox cmd response: success
46,644,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,645,170 UART: [update-reset] Copying MAN_2 To MAN_1
46,667,602 UART: [update-reset Success] --
46,673,553 UART: [state] Locking Datavault
46,676,582 UART: [state] Locking PCR0, PCR1 and PCR31
46,678,340 UART: [state] Locking ICCM
46,679,492 UART: [exit] Launching FMC @ 0x40000130
46,687,893 UART:
46,688,170 UART: Running Caliptra FMC ...
46,689,273 UART:
46,689,422 UART: [state] CFI Enabled
46,733,667 UART: [art] Extend RT PCRs Done
46,734,811 UART: [art] Lock RT PCRs Done
46,736,252 UART: [art] Populate DV Done
46,741,598 UART: [fht] FMC Alias Private Key: 7
46,743,104 UART: [art] Derive CDI
46,743,840 UART: [art] Store in in slot 0x4
46,786,212 UART: [art] Derive Key Pair
46,787,251 UART: [art] Store priv key in slot 0x5
50,029,049 UART: [art] Derive Key Pair - Done
50,041,783 UART: [art] Signing Cert with AUTHO
50,043,084 UART: RITY.KEYID = 7
52,322,460 UART: [art] Erasing AUTHORITY.KEYID = 7
52,323,968 UART: [art] PUB.X = 1839B206E16AE02F378DD252B4AAB6E05C89779F3B791BE765CE8B5F166453095B3FEF8CECC3422BFF9BFDAD144BFE64
52,331,199 UART: [art] PUB.Y = 90FDF7F10EBF95D63A57EF3662F3CC09C3C71D3791B1503AED5E4E764D3AA6F94AEFA1F5F3859A484639A79ECBD6C7C9
52,338,521 UART: [art] SIG.R = 97CE9CDA2F081184070A91DBF1726CDDCC365296E7E03E7E2840709AA11DA9A12551709EC2DD8022D6B860FC577BD712
52,345,848 UART: [art] SIG.S = C7467027D79D02185A5C2B7F11E9595CC16FC8AA3280B776A45EE21D6263C56F9CC0D009EF20700F6E8F209943BD8A7F
53,650,787 UART: Caliptra RT
53,651,477 UART: [state] CFI Enabled
57,178,197 UART: [rt] RT listening for mailbox commands...
57,209,269 UART: [rt]cmd =0x494e464f, len=4
57,213,117 >>> mbox cmd response data (264 bytes)
57,214,814 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,244,832 UART: [rt]cmd =0x43455252, len=4
57,256,148 >>> mbox cmd response data (784 bytes)
57,297,946 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,328,540 UART: [rt]cmd =0x44504543, len=92
63,003,186 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
4,127,290 ready_for_fw is high
4,127,663 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,205 >>> mbox cmd response: success
18,070,785 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,712,487 UART:
23,712,861 UART: Running Caliptra FMC ...
23,713,991 UART:
23,714,142 UART: [state] CFI Enabled
23,721,961 UART: [fht] FMC Alias Private Key: 7
26,052,958 UART: [art] Extend RT PCRs Done
26,054,333 UART: [art] Lock RT PCRs Done
26,055,857 UART: [art] Populate DV Done
26,061,440 UART: [fht] FMC Alias Private Key: 7
26,062,943 UART: [art] Derive CDI
26,063,703 UART: [art] Store in in slot 0x4
26,106,078 UART: [art] Derive Key Pair
26,107,078 UART: [art] Store priv key in slot 0x5
29,349,066 UART: [art] Derive Key Pair - Done
29,362,220 UART: [art] Signing Cert with AUTHO
29,363,521 UART: RITY.KEYID = 7
31,642,835 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,347 UART: [art] PUB.X = B6BA279747D9F344DA8817356BBE255BB76AEA673204B668118FB7AA9387EA6942832B53FED0039E0A8A3D01E6B26F5B
31,651,591 UART: [art] PUB.Y = DA51704AE8074B15B14EAEC340496400FEC495EECFE89C78038C435B1AD48B4EA239B604C31A6C1BAB1DD64F37594C28
31,658,810 UART: [art] SIG.R = E759C217DCCADBC8CEE1A5261F67205561C9B5144C495CD484E43096A504344E41631D0D2405BDE8B08A4FF7C60EF3F3
31,666,211 UART: [art] SIG.S = 59A84AFCA2BC57858E830ABB3393EC7FCB75D2CC6FCDF086D15B33EEF7768188FBAEF1583777C8BEBC925ADEA88E9187
32,971,916 UART: Caliptra RT
32,972,637 UART: [state] CFI Enabled
33,088,920 UART: [rt] RT listening for mailbox commands...
33,120,216 UART: [rt]cmd =0x4453424c, len=4
36,363,833 >>> mbox cmd response data (8 bytes)
38,416,312 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
47,069,814 >>> mbox cmd response: success
47,070,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,103,950 UART:
47,104,300 UART: Running Caliptra FMC ...
47,105,424 UART:
47,105,582 UART: [state] CFI Enabled
47,149,235 UART: [art] Extend RT PCRs Done
47,150,374 UART: [art] Lock RT PCRs Done
47,151,821 UART: [art] Populate DV Done
47,157,288 UART: [fht] FMC Alias Private Key: 7
47,158,887 UART: [art] Derive CDI
47,159,703 UART: [art] Store in in slot 0x4
47,202,359 UART: [art] Derive Key Pair
47,203,397 UART: [art] Store priv key in slot 0x5
50,445,938 UART: [art] Derive Key Pair - Done
50,459,044 UART: [art] Signing Cert with AUTHO
50,460,380 UART: RITY.KEYID = 7
52,739,871 UART: [art] Erasing AUTHORITY.KEYID = 7
52,741,381 UART: [art] PUB.X = 3E121A22BBB59E2EFB73FB8629843972B0F80773A199711F29B661C54CB143D35A91C3D189F5D28C3DA8FA8315321590
52,748,625 UART: [art] PUB.Y = 9795407A3E221A7EAB9E1CD8704F49E1D4A984D8962FD779C1FEF1B05C8340700210C6CC1EC8EA6475232271D2F673E6
52,755,862 UART: [art] SIG.R = 3F93A66DCAF819291C499E0FB05A0AE6781ECD546853895C7BA9302A8CC09DF389FC68E4B13F032652463B79C1F29314
52,763,195 UART: [art] SIG.S = 0B045030437AA725FD7BC583F144D5A95690E2BA9F9AF1806B4ACA7214204032096538C4549035998288B4BC0025923E
54,068,088 UART: Caliptra RT
54,068,783 UART: [state] CFI Enabled
57,601,859 UART: [rt] RT listening for mailbox commands...
57,632,771 UART: [rt]cmd =0x494e464f, len=4
57,636,627 >>> mbox cmd response data (264 bytes)
57,638,291 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,668,109 UART: [rt]cmd =0x43455252, len=4
57,679,664 >>> mbox cmd response data (782 bytes)
57,721,750 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,752,363 UART: [rt]cmd =0x44504543, len=92
63,426,454 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,009 UART:
192,374 UART: Running Caliptra ROM ...
193,485 UART:
193,626 UART: [state] CFI Enabled
266,008 UART: [state] LifecycleState = Unprovisioned
267,864 UART: [state] DebugLocked = No
269,103 UART: [state] WD Timer not started. Device not locked for debugging
273,490 UART: [kat] SHA2-256
452,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,208 UART: [kat] ++
464,661 UART: [kat] sha1
475,390 UART: [kat] SHA2-256
478,394 UART: [kat] SHA2-384
485,018 UART: [kat] SHA2-512-ACC
488,025 UART: [kat] ECC-384
2,951,622 UART: [kat] HMAC-384Kdf
2,974,367 UART: [kat] LMS
3,503,836 UART: [kat] --
3,508,197 UART: [cold-reset] ++
3,510,195 UART: [fht] FHT @ 0x50003400
3,520,243 UART: [idev] ++
3,520,831 UART: [idev] CDI.KEYID = 6
3,521,716 UART: [idev] SUBJECT.KEYID = 7
3,522,961 UART: [idev] UDS.KEYID = 0
3,523,860 ready_for_fw is high
3,524,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,999 UART: [idev] Erasing UDS.KEYID = 0
6,029,352 UART: [idev] Sha1 KeyId Algorithm
6,053,338 UART: [idev] --
6,058,119 UART: [ldev] ++
6,058,695 UART: [ldev] CDI.KEYID = 6
6,059,614 UART: [ldev] SUBJECT.KEYID = 5
6,060,779 UART: [ldev] AUTHORITY.KEYID = 7
6,062,008 UART: [ldev] FE.KEYID = 1
6,102,856 UART: [ldev] Erasing FE.KEYID = 1
8,607,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,933 UART: [ldev] --
10,417,003 UART: [fwproc] Wait for Commands...
10,419,107 UART: [fwproc] Recv command 0x46574c44
10,421,200 UART: [fwproc] Recv'd Img size: 114448 bytes
13,825,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,719 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,770 >>> mbox cmd response: success
14,284,245 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,287,300 UART: [afmc] ++
14,287,931 UART: [afmc] CDI.KEYID = 6
14,288,848 UART: [afmc] SUBJECT.KEYID = 7
14,289,957 UART: [afmc] AUTHORITY.KEYID = 5
16,833,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,020 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,863 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,716 UART: [afmc] --
18,632,263 UART: [cold-reset] --
18,637,091 UART: [state] Locking Datavault
18,641,048 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,693 UART: [state] Locking ICCM
18,645,488 UART: [exit] Launching FMC @ 0x40000130
18,653,881 UART:
18,654,115 UART: Running Caliptra FMC ...
18,655,212 UART:
18,655,373 UART: [state] CFI Enabled
18,716,131 UART: [fht] FMC Alias Private Key: 7
20,480,425 UART: [art] Extend RT PCRs Done
20,481,641 UART: [art] Lock RT PCRs Done
20,483,468 UART: [art] Populate DV Done
20,488,876 UART: [fht] FMC Alias Private Key: 7
20,490,518 UART: [art] Derive CDI
20,491,259 UART: [art] Store in in slot 0x4
20,549,296 UART: [art] Derive Key Pair
20,550,329 UART: [art] Store priv key in slot 0x5
23,013,257 UART: [art] Derive Key Pair - Done
23,026,304 UART: [art] Signing Cert with AUTHO
23,027,617 UART: RITY.KEYID = 7
24,738,564 UART: [art] Erasing AUTHORITY.KEYID = 7
24,740,070 UART: [art] PUB.X = 1779350701D8ED4F5E67B84458ED4C5F5AA58620374F6E9B8D176160CC35A77875552EBAA31E015446BF5FC0DCF1D273
24,747,331 UART: [art] PUB.Y = 69C379CDE342EBB9C4840A7197B10D49CAC1B4E6C583EC52444CF37C368BC13D7FD1EB7165F57DBEC189BECCC9606AE2
24,754,620 UART: [art] SIG.R = A7DF8AFAB33BD54B3EEE10EBA63AE18497C9073F181B43401BB203A6CEF5EEABF143FFAE2D3102A40ABFB6E3405DC1CD
24,762,095 UART: [art] SIG.S = 6075909A2DB384E0DF42E37935A1B38E89164B47F863F2173696DFE3B4D95B99047818E4CE10F264C978DC9F41AE14EA
25,740,845 UART: Caliptra RT
25,741,535 UART: [state] CFI Enabled
25,906,676 UART: [rt] RT listening for mailbox commands...
25,938,143 UART: [rt]cmd =0x4453424c, len=4
28,388,993 >>> mbox cmd response data (8 bytes)
30,442,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,588,716 UART:
30,589,092 UART: Running Caliptra ROM ...
30,590,172 UART:
30,590,333 UART: [state] CFI Enabled
30,643,775 UART: [state] LifecycleState = Unprovisioned
30,645,682 UART: [state] DebugLocked = No
30,647,943 UART: [state] WD Timer not started. Device not locked for debugging
30,651,792 UART: [kat] SHA2-256
30,830,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,842,516 UART: [kat] ++
30,843,057 UART: [kat] sha1
30,853,736 UART: [kat] SHA2-256
30,856,735 UART: [kat] SHA2-384
30,862,242 UART: [kat] SHA2-512-ACC
30,865,197 UART: [kat] ECC-384
33,310,084 UART: [kat] HMAC-384Kdf
33,334,022 UART: [kat] LMS
33,863,484 UART: [kat] --
33,868,278 UART: [update-reset] ++
37,306,738 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,309,745 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
37,693,080 >>> mbox cmd response: success
37,693,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,693,752 UART: [update-reset] Copying MAN_2 To MAN_1
37,715,590 UART: [update-reset Success] --
37,719,285 UART: [state] Locking Datavault
37,721,406 UART: [state] Locking PCR0, PCR1 and PCR31
37,723,049 UART: [state] Locking ICCM
37,725,306 UART: [exit] Launching FMC @ 0x40000130
37,733,692 UART:
37,733,937 UART: Running Caliptra FMC ...
37,735,039 UART:
37,735,199 UART: [state] CFI Enabled
37,824,585 UART: [art] Extend RT PCRs Done
37,825,767 UART: [art] Lock RT PCRs Done
37,827,221 UART: [art] Populate DV Done
37,832,518 UART: [fht] FMC Alias Private Key: 7
37,834,014 UART: [art] Derive CDI
37,834,830 UART: [art] Store in in slot 0x4
37,893,679 UART: [art] Derive Key Pair
37,894,713 UART: [art] Store priv key in slot 0x5
40,358,007 UART: [art] Derive Key Pair - Done
40,371,108 UART: [art] Signing Cert with AUTHO
40,372,439 UART: RITY.KEYID = 7
42,083,883 UART: [art] Erasing AUTHORITY.KEYID = 7
42,085,387 UART: [art] PUB.X = C2181513A22A146EDD1C020F45BFF6F143AD70A58FB23A3844200DC05543260B2648CEBFAD180A4A49B03C233D89471B
42,092,643 UART: [art] PUB.Y = 72D5585F32228AA023033125F3B76DDD3CFF302151CB6273D1620F67CE4B8ECF9866D644D64A3267252A9B73D682D7CC
42,099,931 UART: [art] SIG.R = C98C415C27926E18DFE81282F4879BD85D033D42DAF660F642B052326B90FCF8BB0A7A7AB9DF7248518186CB8170EBE3
42,107,274 UART: [art] SIG.S = 211D3FD5C095955B14F3982FC07CB5A9B4EDA86E7A88B142CDE2BE0188444DCDBC01DA2143685418FDC34DC68483CFDB
43,086,335 UART: Caliptra RT
43,087,170 UART: [state] CFI Enabled
45,872,170 UART: [rt] RT listening for mailbox commands...
45,903,228 UART: [rt]cmd =0x494e464f, len=4
45,907,338 >>> mbox cmd response data (264 bytes)
45,909,000 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,938,670 UART: [rt]cmd =0x43455252, len=4
45,949,970 >>> mbox cmd response data (783 bytes)
45,992,253 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,023,269 UART: [rt]cmd =0x44504543, len=92
50,374,564 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,361,387 ready_for_fw is high
3,361,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,032,430 >>> mbox cmd response: success
14,033,016 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,321,246 UART:
18,321,638 UART: Running Caliptra FMC ...
18,322,775 UART:
18,322,933 UART: [state] CFI Enabled
18,389,483 UART: [fht] FMC Alias Private Key: 7
20,153,412 UART: [art] Extend RT PCRs Done
20,154,639 UART: [art] Lock RT PCRs Done
20,156,375 UART: [art] Populate DV Done
20,162,119 UART: [fht] FMC Alias Private Key: 7
20,163,830 UART: [art] Derive CDI
20,164,669 UART: [art] Store in in slot 0x4
20,222,563 UART: [art] Derive Key Pair
20,223,598 UART: [art] Store priv key in slot 0x5
22,686,437 UART: [art] Derive Key Pair - Done
22,699,594 UART: [art] Signing Cert with AUTHO
22,700,897 UART: RITY.KEYID = 7
24,411,861 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,365 UART: [art] PUB.X = 40238FC8DC5D2E796D7CAF21432D9BE75662AF6785012275420A6F0FD3E1EAB3F00F44E071508E3673197D8F1B257416
24,420,618 UART: [art] PUB.Y = BFE6667B9056C731E015E93F680E5C3B18CEBEEA753D070CD812A9C5C0CA46B36EBEEA8C07C55EAD7B9A6867222552D3
24,427,930 UART: [art] SIG.R = 8F2558483FA97EFD1784FE61FA52A09DB0FB5907F14C62B057F200A77EFC53D5FF888D244DEC4513DC29CC93C62A05FF
24,435,333 UART: [art] SIG.S = 197E22D7D23DE32FB5E5695ECFBE6CEB5B4F06613CFBF2FE615B839EE2FEEA7CBC8C7F4569437E87F4B096B4C992D637
25,413,891 UART: Caliptra RT
25,414,602 UART: [state] CFI Enabled
25,579,639 UART: [rt] RT listening for mailbox commands...
25,611,215 UART: [rt]cmd =0x4453424c, len=4
28,082,108 >>> mbox cmd response data (8 bytes)
30,142,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
37,246,779 >>> mbox cmd response: success
37,247,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,281,847 UART:
37,282,130 UART: Running Caliptra FMC ...
37,283,169 UART:
37,283,317 UART: [state] CFI Enabled
37,381,361 UART: [art] Extend RT PCRs Done
37,382,557 UART: [art] Lock RT PCRs Done
37,384,130 UART: [art] Populate DV Done
37,389,704 UART: [fht] FMC Alias Private Key: 7
37,391,341 UART: [art] Derive CDI
37,392,104 UART: [art] Store in in slot 0x4
37,450,041 UART: [art] Derive Key Pair
37,451,047 UART: [art] Store priv key in slot 0x5
39,913,892 UART: [art] Derive Key Pair - Done
39,926,885 UART: [art] Signing Cert with AUTHO
39,928,191 UART: RITY.KEYID = 7
41,640,220 UART: [art] Erasing AUTHORITY.KEYID = 7
41,641,731 UART: [art] PUB.X = E1CBEA4B0508AED647378BB83C886F73906ED54871D58CE5CA8D9EE49C5635D9F5126C005D417E3914F7790DC58DB42F
41,648,976 UART: [art] PUB.Y = 159445746DFAD300DAAC99D7333F94281305F13EE368AA286BCCB445B914C14BDA38CA98292661662FE75BDCC49E1707
41,656,200 UART: [art] SIG.R = 70A163C0C23FFC81D994CAD6B239823FFAF39196892D2690CC4369954B797402CC80C83630FE30C2DD997832AD816BAC
41,663,593 UART: [art] SIG.S = 3CE4773BED4D452F6B0C4C8F12D0D58A15F1933C41D7F9F6135B230750289F4336A8DD2BFC4462E6C44F2EEC6A328C98
42,642,385 UART: Caliptra RT
42,643,096 UART: [state] CFI Enabled
45,429,511 UART: [rt] RT listening for mailbox commands...
45,460,523 UART: [rt]cmd =0x494e464f, len=4
45,464,543 >>> mbox cmd response data (264 bytes)
45,466,192 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,496,061 UART: [rt]cmd =0x43455252, len=4
45,507,510 >>> mbox cmd response data (782 bytes)
45,549,093 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,579,771 UART: [rt]cmd =0x44504543, len=92
49,933,625 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,446 UART:
192,812 UART: Running Caliptra ROM ...
193,949 UART:
603,731 UART: [state] CFI Enabled
617,670 UART: [state] LifecycleState = Unprovisioned
619,480 UART: [state] DebugLocked = No
622,213 UART: [state] WD Timer not started. Device not locked for debugging
626,673 UART: [kat] SHA2-256
805,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,374 UART: [kat] ++
817,903 UART: [kat] sha1
829,412 UART: [kat] SHA2-256
832,475 UART: [kat] SHA2-384
838,027 UART: [kat] SHA2-512-ACC
840,999 UART: [kat] ECC-384
3,280,465 UART: [kat] HMAC-384Kdf
3,292,568 UART: [kat] LMS
3,822,038 UART: [kat] --
3,827,945 UART: [cold-reset] ++
3,828,941 UART: [fht] FHT @ 0x50003400
3,839,617 UART: [idev] ++
3,840,170 UART: [idev] CDI.KEYID = 6
3,841,112 UART: [idev] SUBJECT.KEYID = 7
3,842,345 UART: [idev] UDS.KEYID = 0
3,843,424 ready_for_fw is high
3,843,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,339 UART: [idev] Erasing UDS.KEYID = 0
6,319,630 UART: [idev] Sha1 KeyId Algorithm
6,342,290 UART: [idev] --
6,347,624 UART: [ldev] ++
6,348,206 UART: [ldev] CDI.KEYID = 6
6,349,129 UART: [ldev] SUBJECT.KEYID = 5
6,350,274 UART: [ldev] AUTHORITY.KEYID = 7
6,351,553 UART: [ldev] FE.KEYID = 1
6,361,547 UART: [ldev] Erasing FE.KEYID = 1
8,835,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,146 UART: [ldev] --
10,625,159 UART: [fwproc] Wait for Commands...
10,627,405 UART: [fwproc] Recv command 0x46574c44
10,629,487 UART: [fwproc] Recv'd Img size: 114448 bytes
14,040,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,715 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,497,242 >>> mbox cmd response: success
14,497,749 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,501,183 UART: [afmc] ++
14,501,757 UART: [afmc] CDI.KEYID = 6
14,502,629 UART: [afmc] SUBJECT.KEYID = 7
14,503,890 UART: [afmc] AUTHORITY.KEYID = 5
16,999,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,320 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,342 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,220 UART: [afmc] --
18,797,021 UART: [cold-reset] --
18,801,092 UART: [state] Locking Datavault
18,804,674 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,320 UART: [state] Locking ICCM
18,807,461 UART: [exit] Launching FMC @ 0x40000130
18,815,848 UART:
18,816,075 UART: Running Caliptra FMC ...
18,817,167 UART:
18,817,317 UART: [state] CFI Enabled
18,825,516 UART: [fht] FMC Alias Private Key: 7
20,582,422 UART: [art] Extend RT PCRs Done
20,583,635 UART: [art] Lock RT PCRs Done
20,585,284 UART: [art] Populate DV Done
20,590,685 UART: [fht] FMC Alias Private Key: 7
20,592,319 UART: [art] Derive CDI
20,593,049 UART: [art] Store in in slot 0x4
20,635,151 UART: [art] Derive Key Pair
20,636,184 UART: [art] Store priv key in slot 0x5
23,062,629 UART: [art] Derive Key Pair - Done
23,075,490 UART: [art] Signing Cert with AUTHO
23,076,794 UART: RITY.KEYID = 7
24,782,429 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,953 UART: [art] PUB.X = 7EFA0A1B8259E394581EA02B67294F1553511CABB6D08F08923025D6A4A25C7C602CC726182134CF160D2040C87CAB7F
24,791,191 UART: [art] PUB.Y = 3119F333EC51E7A2A15660941277DFF674AD150116B0FFD72D4ABE91FE40AAF40048AE019B49684BBCD3B321B5091509
24,798,406 UART: [art] SIG.R = A2BEE9E0A6DFBDD4A2724556F7E4E7CC1A40D60223C9193AC3E8D84574407C55D46D3A59534EE95843FBFF99AA4164D0
24,805,799 UART: [art] SIG.S = E36A8C9F36919A3A2ABFF7D38CBC543865A24F620FFBCDA0769CCC1EB41CE42985CD2DB747071F6AADF02F9CE4443B2F
25,784,338 UART: Caliptra RT
25,785,025 UART: [state] CFI Enabled
25,902,865 UART: [rt] RT listening for mailbox commands...
25,934,302 UART: [rt]cmd =0x4453424c, len=4
28,361,962 >>> mbox cmd response data (8 bytes)
30,414,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,559,766 UART:
30,560,145 UART: Running Caliptra ROM ...
30,561,186 UART:
30,561,327 UART: [state] CFI Enabled
30,576,300 UART: [state] LifecycleState = Unprovisioned
30,578,132 UART: [state] DebugLocked = No
30,580,021 UART: [state] WD Timer not started. Device not locked for debugging
30,583,264 UART: [kat] SHA2-256
30,762,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,774,001 UART: [kat] ++
30,774,545 UART: [kat] sha1
30,785,810 UART: [kat] SHA2-256
30,788,817 UART: [kat] SHA2-384
30,794,688 UART: [kat] SHA2-512-ACC
30,797,644 UART: [kat] ECC-384
33,238,750 UART: [kat] HMAC-384Kdf
33,251,306 UART: [kat] LMS
33,780,812 UART: [kat] --
33,785,118 UART: [update-reset] ++
37,210,022 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,214,107 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
37,597,453 >>> mbox cmd response: success
37,597,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,599,196 UART: [update-reset] Copying MAN_2 To MAN_1
37,621,519 UART: [update-reset Success] --
37,626,232 UART: [state] Locking Datavault
37,630,012 UART: [state] Locking PCR0, PCR1 and PCR31
37,631,651 UART: [state] Locking ICCM
37,634,254 UART: [exit] Launching FMC @ 0x40000130
37,642,703 UART:
37,642,996 UART: Running Caliptra FMC ...
37,644,100 UART:
37,644,254 UART: [state] CFI Enabled
37,687,497 UART: [art] Extend RT PCRs Done
37,688,637 UART: [art] Lock RT PCRs Done
37,690,183 UART: [art] Populate DV Done
37,695,901 UART: [fht] FMC Alias Private Key: 7
37,697,532 UART: [art] Derive CDI
37,698,334 UART: [art] Store in in slot 0x4
37,741,404 UART: [art] Derive Key Pair
37,742,430 UART: [art] Store priv key in slot 0x5
40,169,373 UART: [art] Derive Key Pair - Done
40,182,191 UART: [art] Signing Cert with AUTHO
40,183,494 UART: RITY.KEYID = 7
41,889,204 UART: [art] Erasing AUTHORITY.KEYID = 7
41,890,700 UART: [art] PUB.X = F97C9EA78D1790D917397FB0D2B2AC5ACF6DF308DB3A185E397FB2E9DACD9FFA6BD40A061DF79989DA6C5107C8EF296C
41,898,075 UART: [art] PUB.Y = 43B34BC1BC071C142E1F7653605DB7C29B2CA207B74FBFABE2E54821E8DDCF82450ABFB71D43B084770273FC9686986B
41,905,306 UART: [art] SIG.R = 35018DA55B4BFE25F69AE33C118B57428E84E2A5F2559DE3E19B771D42AC2C7469F5B5A73F89EF59F3558D1AEDE1D3A3
41,912,682 UART: [art] SIG.S = 1D5661D1A7E155907A19C9EF4031837090AD5C51765A4A6B00C9658912E75CC29138271819D1CEDB021D53EE40B4EF59
42,891,488 UART: Caliptra RT
42,892,198 UART: [state] CFI Enabled
45,604,840 UART: [rt] RT listening for mailbox commands...
45,635,691 UART: [rt]cmd =0x494e464f, len=4
45,639,641 >>> mbox cmd response data (264 bytes)
45,641,305 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,670,955 UART: [rt]cmd =0x43455252, len=4
45,682,190 >>> mbox cmd response data (782 bytes)
45,724,499 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,755,251 UART: [rt]cmd =0x44504543, len=92
50,040,268 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,686,615 ready_for_fw is high
3,687,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,260,359 >>> mbox cmd response: success
14,261,045 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,511,021 UART:
18,511,413 UART: Running Caliptra FMC ...
18,512,549 UART:
18,512,699 UART: [state] CFI Enabled
18,520,705 UART: [fht] FMC Alias Private Key: 7
20,278,271 UART: [art] Extend RT PCRs Done
20,279,524 UART: [art] Lock RT PCRs Done
20,281,093 UART: [art] Populate DV Done
20,286,395 UART: [fht] FMC Alias Private Key: 7
20,287,927 UART: [art] Derive CDI
20,288,736 UART: [art] Store in in slot 0x4
20,331,285 UART: [art] Derive Key Pair
20,332,326 UART: [art] Store priv key in slot 0x5
22,758,882 UART: [art] Derive Key Pair - Done
22,771,777 UART: [art] Signing Cert with AUTHO
22,773,078 UART: RITY.KEYID = 7
24,478,700 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,355 UART: [art] PUB.X = 99130381F4F17E328FDF8B39A04C70D5C06A77F8FED8B762F0D8D58927FB516B948A49690393F18A40FDC34372B5B813
24,487,441 UART: [art] PUB.Y = AE68D072209CC3D7B13098FCF741208478235B2310FB939917467B35A4A3F02BAE8AFAA7BCEA7B880B9114C21E28E628
24,494,696 UART: [art] SIG.R = 9E9B4589B6E5931E8BDE548AE4814E0CD99766B2EE2D0485B178D0E213469B5982D3054EA36DF4A85BD33933C153E20D
24,502,084 UART: [art] SIG.S = 74CB180360773809EBCE2C61C1C423C2FE576937F8F49E3B6665EA2F40043D34184CB13B61E0A256B6BE3DADEBF882EC
25,481,223 UART: Caliptra RT
25,481,938 UART: [state] CFI Enabled
25,598,455 UART: [rt] RT listening for mailbox commands...
25,629,625 UART: [rt]cmd =0x4453424c, len=4
28,058,125 >>> mbox cmd response data (8 bytes)
30,112,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
37,157,585 >>> mbox cmd response: success
37,158,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,193,789 UART:
37,194,073 UART: Running Caliptra FMC ...
37,195,184 UART:
37,195,336 UART: [state] CFI Enabled
37,239,742 UART: [art] Extend RT PCRs Done
37,240,956 UART: [art] Lock RT PCRs Done
37,242,250 UART: [art] Populate DV Done
37,247,661 UART: [fht] FMC Alias Private Key: 7
37,249,354 UART: [art] Derive CDI
37,250,160 UART: [art] Store in in slot 0x4
37,292,811 UART: [art] Derive Key Pair
37,293,848 UART: [art] Store priv key in slot 0x5
39,721,233 UART: [art] Derive Key Pair - Done
39,734,178 UART: [art] Signing Cert with AUTHO
39,735,484 UART: RITY.KEYID = 7
41,440,724 UART: [art] Erasing AUTHORITY.KEYID = 7
41,442,229 UART: [art] PUB.X = 389973A410CE4A27244DF9CF52EF9F38D7809B7406195A7E5A31CC6576DA071733BB70A87346D2FC9A2E64F6BF68C6FC
41,449,530 UART: [art] PUB.Y = 1237F3DE6499E0A73561839D6B75E42A5AE1A692CEE6FFBB4A20F9E8D705ECE68732BD4D2F6D31610A7BE952CAD260CF
41,456,820 UART: [art] SIG.R = F2D26F8871F0066F44EB0D574CEF0E5E372243FDCCE5B7E48B6C1D335A76F539D51535964D81B377B12C348A65EFEB98
41,464,209 UART: [art] SIG.S = 35EC971FD130414EA35DBC12716EAF1BAA89CD90FAB143998DFF4EDFCFCB25DCDA03790BDED06E9816B42B639FCA1216
42,443,280 UART: Caliptra RT
42,444,000 UART: [state] CFI Enabled
45,160,559 UART: [rt] RT listening for mailbox commands...
45,191,526 UART: [rt]cmd =0x494e464f, len=4
45,195,480 >>> mbox cmd response data (264 bytes)
45,197,112 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,226,721 UART: [rt]cmd =0x43455252, len=4
45,238,021 >>> mbox cmd response data (783 bytes)
45,279,722 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,310,681 UART: [rt]cmd =0x44504543, len=92
49,596,115 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,436,874 ready_for_fw is high
3,437,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,737,395 >>> mbox cmd response: success
14,738,189 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,048,960 UART:
19,049,353 UART: Running Caliptra FMC ...
19,050,498 UART:
19,050,658 UART: [state] CFI Enabled
19,116,243 UART: [fht] FMC Alias Private Key: 7
20,879,309 UART: [art] Extend RT PCRs Done
20,880,530 UART: [art] Lock RT PCRs Done
20,882,393 UART: [art] Populate DV Done
20,887,700 UART: [fht] FMC Alias Private Key: 7
20,889,194 UART: [art] Derive CDI
20,889,955 UART: [art] Store in in slot 0x4
20,949,138 UART: [art] Derive Key Pair
20,950,183 UART: [art] Store priv key in slot 0x5
23,412,979 UART: [art] Derive Key Pair - Done
23,426,032 UART: [art] Signing Cert with AUTHO
23,427,337 UART: RITY.KEYID = 7
25,138,947 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,452 UART: [art] PUB.X = DEAC9B377148D5F8E601C63BC30E7F1375FF094CF8FF84D3C0110BDA5C4291C8D4DDA92EA1BF95956291448ABF602DB5
25,147,775 UART: [art] PUB.Y = 358BEFB981B665DC70A8C69E0BD45E2C8C2393BC96F71DDE929D8503B4678A403CC0192F728C63B823B783A913786306
25,155,031 UART: [art] SIG.R = 607F4AFBEF091EFFC0526B6BA26CDAE9E94663B20DE11E7EFD989EA7163561111B7D3CE224DBC14445DAD3D374C17527
25,162,423 UART: [art] SIG.S = 7CDC5166D778036E1B6F97D76081E1884F0A6C24C67805CE40D739B215545F0749705082312CCD49D8E67C031AB210B6
26,141,277 UART: Caliptra RT
26,141,968 UART: [state] CFI Enabled
26,308,107 UART: [rt] RT listening for mailbox commands...
26,339,462 UART: [rt]cmd =0x4453424c, len=4
28,811,406 >>> mbox cmd response data (8 bytes)
30,871,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,704,342 >>> mbox cmd response: success
38,704,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,737,691 UART:
38,737,978 UART: Running Caliptra FMC ...
38,739,095 UART:
38,739,260 UART: [state] CFI Enabled
38,840,992 UART: [art] Extend RT PCRs Done
38,842,201 UART: [art] Lock RT PCRs Done
38,843,669 UART: [art] Populate DV Done
38,849,366 UART: [fht] FMC Alias Private Key: 7
38,850,960 UART: [art] Derive CDI
38,851,698 UART: [art] Store in in slot 0x4
38,909,696 UART: [art] Derive Key Pair
38,910,734 UART: [art] Store priv key in slot 0x5
41,373,967 UART: [art] Derive Key Pair - Done
41,386,959 UART: [art] Signing Cert with AUTHO
41,388,288 UART: RITY.KEYID = 7
43,099,196 UART: [art] Erasing AUTHORITY.KEYID = 7
43,100,706 UART: [art] PUB.X = DFDCFDC39F3898854F156176A08E3A2549F7CE6C7777A8CA589A979417F70BB167420AE0BD2B4094D98B72649E9F008A
43,107,952 UART: [art] PUB.Y = 338E21A126E8EFA76A419585A41876748C6F4FF09DF623D39AD21488B9C9AC23F9464FFFBEFAEBEE8CAF0CB650ECEE76
43,115,236 UART: [art] SIG.R = 2E6F90CC9315E0ABA30C19521E3DB8868CAE0EE6D7D6C44E54F813E3B2126FA4D5AB76E185A0B2AA23FE31FDAE253B9F
43,122,676 UART: [art] SIG.S = 63D75D26A0F472E4AEE9304EE2AB0BFC713A368D1CB4F1CDDE45E7968BA52C92121B5CC4B38206DDFF4822EF004502BD
44,101,073 UART: Caliptra RT
44,101,808 UART: [state] CFI Enabled
46,883,949 UART: [rt] RT listening for mailbox commands...
46,914,998 UART: [rt]cmd =0x494e464f, len=4
46,918,880 >>> mbox cmd response data (264 bytes)
46,920,549 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,950,462 UART: [rt]cmd =0x43455252, len=4
46,961,862 >>> mbox cmd response data (782 bytes)
47,004,012 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
47,034,862 UART: [rt]cmd =0x44504543, len=92
51,389,735 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
3,756,680 ready_for_fw is high
3,757,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,968,825 >>> mbox cmd response: success
14,969,603 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,221,932 UART:
19,222,338 UART: Running Caliptra FMC ...
19,223,470 UART:
19,223,621 UART: [state] CFI Enabled
19,231,518 UART: [fht] FMC Alias Private Key: 7
20,988,311 UART: [art] Extend RT PCRs Done
20,989,544 UART: [art] Lock RT PCRs Done
20,991,192 UART: [art] Populate DV Done
20,996,396 UART: [fht] FMC Alias Private Key: 7
20,998,081 UART: [art] Derive CDI
20,998,905 UART: [art] Store in in slot 0x4
21,041,387 UART: [art] Derive Key Pair
21,042,385 UART: [art] Store priv key in slot 0x5
23,469,451 UART: [art] Derive Key Pair - Done
23,482,502 UART: [art] Signing Cert with AUTHO
23,483,826 UART: RITY.KEYID = 7
25,189,306 UART: [art] Erasing AUTHORITY.KEYID = 7
25,190,830 UART: [art] PUB.X = D18A8C7AC2B39000BA83000CA96EF9EFBA6FB719E8504BDC1AFCE1104C50E8A7F467A525A6C4F70F7654C9408E03049F
25,198,079 UART: [art] PUB.Y = 0B374FD58DF54776E73D45449FF144CB69C579B065762482E3DE5286B2E5464F11417B8B838BCAC70E99B0E758323636
25,205,278 UART: [art] SIG.R = 797EAD7A9361E58038491D3AB1B92BB5CF6DE0CB3501872ADBF2D2EDC5BF84D5D355086DEB0CBB7A7F9F539CC8EC131A
25,212,730 UART: [art] SIG.S = EE9B4614EF691D8F70EF23329AD64175B05A1B1CA90168B28238198038281E988A7C2ABCF00EFFF75571658299E93D1E
26,191,907 UART: Caliptra RT
26,192,612 UART: [state] CFI Enabled
26,310,757 UART: [rt] RT listening for mailbox commands...
26,341,902 UART: [rt]cmd =0x4453424c, len=4
28,769,387 >>> mbox cmd response data (8 bytes)
30,823,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
38,557,979 >>> mbox cmd response: success
38,558,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,592,362 UART:
38,592,660 UART: Running Caliptra FMC ...
38,593,773 UART:
38,593,923 UART: [state] CFI Enabled
38,638,083 UART: [art] Extend RT PCRs Done
38,639,270 UART: [art] Lock RT PCRs Done
38,640,644 UART: [art] Populate DV Done
38,646,273 UART: [fht] FMC Alias Private Key: 7
38,647,802 UART: [art] Derive CDI
38,648,570 UART: [art] Store in in slot 0x4
38,691,003 UART: [art] Derive Key Pair
38,692,044 UART: [art] Store priv key in slot 0x5
41,118,537 UART: [art] Derive Key Pair - Done
41,131,216 UART: [art] Signing Cert with AUTHO
41,132,523 UART: RITY.KEYID = 7
42,837,999 UART: [art] Erasing AUTHORITY.KEYID = 7
42,839,501 UART: [art] PUB.X = 8A0763257423C8EB8844688B80CA8BE2D656B0D30B7D0B6A19CE9461FC3A286421EF06F9191F93068D8C2338EAFE729A
42,846,805 UART: [art] PUB.Y = B8D97023DDB8E3CD36C6D970C46AB3B03213F6970E9DDCC805FBE6D13A7E6488785DE55E63644572FD77EB89BBA43620
42,854,026 UART: [art] SIG.R = 8C047BDDC0B2022195544B9A5019F00D4C102340E034E6CFB05D53E82621BFF706799B860AF2D1B191F4C2FAA64604DF
42,861,411 UART: [art] SIG.S = 19159F47ED7969339B1FFDBD9553D41E0140DAD2478CDAE67063FA93C777777B643E149C9BFD1D69B304C8A989959E0A
43,840,550 UART: Caliptra RT
43,841,255 UART: [state] CFI Enabled
46,557,941 UART: [rt] RT listening for mailbox commands...
46,589,226 UART: [rt]cmd =0x494e464f, len=4
46,593,120 >>> mbox cmd response data (264 bytes)
46,594,743 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,624,850 UART: [rt]cmd =0x43455252, len=4
46,636,217 >>> mbox cmd response data (783 bytes)
46,678,395 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,709,236 UART: [rt]cmd =0x44504543, len=92
50,994,470 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,131 UART: [kat] SHA2-256
882,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,177 UART: [kat] ++
886,329 UART: [kat] sha1
890,549 UART: [kat] SHA2-256
892,487 UART: [kat] SHA2-384
895,418 UART: [kat] SHA2-512-ACC
897,319 UART: [kat] ECC-384
903,084 UART: [kat] HMAC-384Kdf
907,572 UART: [kat] LMS
1,475,768 UART: [kat] --
1,476,859 UART: [cold-reset] ++
1,477,287 UART: [fht] Storing FHT @ 0x50003400
1,480,082 UART: [idev] ++
1,480,250 UART: [idev] CDI.KEYID = 6
1,480,610 UART: [idev] SUBJECT.KEYID = 7
1,481,034 UART: [idev] UDS.KEYID = 0
1,481,379 ready_for_fw is high
1,481,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,836 UART: [idev] Erasing UDS.KEYID = 0
1,505,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,290 UART: [idev] --
1,515,431 UART: [ldev] ++
1,515,599 UART: [ldev] CDI.KEYID = 6
1,515,962 UART: [ldev] SUBJECT.KEYID = 5
1,516,388 UART: [ldev] AUTHORITY.KEYID = 7
1,516,851 UART: [ldev] FE.KEYID = 1
1,522,003 UART: [ldev] Erasing FE.KEYID = 1
1,547,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,144 UART: [ldev] --
1,586,453 UART: [fwproc] Waiting for Commands...
1,587,078 UART: [fwproc] Received command 0x46574c44
1,587,869 UART: [fwproc] Received Image of size 114448 bytes
2,887,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,430 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,763 >>> mbox cmd response: success
3,079,763 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,080,861 UART: [afmc] ++
3,081,029 UART: [afmc] CDI.KEYID = 6
3,081,391 UART: [afmc] SUBJECT.KEYID = 7
3,081,816 UART: [afmc] AUTHORITY.KEYID = 5
3,116,675 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,765 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,545 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,273 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,158 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,848 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,635 UART: [afmc] --
3,159,535 UART: [cold-reset] --
3,160,513 UART: [state] Locking Datavault
3,161,790 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,394 UART: [state] Locking ICCM
3,163,052 UART: [exit] Launching FMC @ 0x40000130
3,168,381 UART:
3,168,397 UART: Running Caliptra FMC ...
3,168,805 UART:
3,168,859 UART: [state] CFI Enabled
3,179,256 UART: [fht] FMC Alias Private Key: 7
3,287,645 UART: [art] Extend RT PCRs Done
3,288,073 UART: [art] Lock RT PCRs Done
3,289,865 UART: [art] Populate DV Done
3,298,160 UART: [fht] FMC Alias Private Key: 7
3,299,276 UART: [art] Derive CDI
3,299,556 UART: [art] Store in in slot 0x4
3,385,359 UART: [art] Derive Key Pair
3,385,719 UART: [art] Store priv key in slot 0x5
3,398,923 UART: [art] Derive Key Pair - Done
3,413,673 UART: [art] Signing Cert with AUTHO
3,414,153 UART: RITY.KEYID = 7
3,429,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,312 UART: [art] PUB.X = E499918F8589D3E6515937948AB2769EA6808C93E9C8175F27E2D0EDA8F9B8FB03F91A284B3ADC3736FBC86C87DEAA4C
3,437,089 UART: [art] PUB.Y = 2E482FD8CEEF5D27105CCA5E091CEB0AC700E3B09C23CC9CB12B67490455F4A720B974A8083163B074CE9A48A57F16BD
3,444,017 UART: [art] SIG.R = 3ABBADF812847A2F26FD463AEF5897F7461F3DB29650D78FD4F387BAFDA3FD9CF2D96EF4246BA7C1CFC574683623A915
3,450,805 UART: [art] SIG.S = 955503015672791FFF06D4E5E9D09D23C0ACF1E6AE9A2209185D29DC60E04C221C7DC2D7E518656CA3D5AF1F4798941D
3,474,966 UART: Caliptra RT
3,475,219 UART: [state] CFI Enabled
3,583,390 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,002 UART: [rt]cmd =0x4453424c, len=4
3,628,064 >>> mbox cmd response data (8 bytes)
3,628,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,051 UART:
3,629,067 UART: Running Caliptra ROM ...
3,629,475 UART:
3,629,529 UART: [state] CFI Enabled
3,632,341 UART: [state] LifecycleState = Unprovisioned
3,632,996 UART: [state] DebugLocked = No
3,633,652 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,635,295 UART: [kat] SHA2-256
4,429,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,433,341 UART: [kat] ++
4,433,493 UART: [kat] sha1
4,437,603 UART: [kat] SHA2-256
4,439,541 UART: [kat] SHA2-384
4,442,372 UART: [kat] SHA2-512-ACC
4,444,272 UART: [kat] ECC-384
4,450,003 UART: [kat] HMAC-384Kdf
4,454,379 UART: [kat] LMS
5,022,575 UART: [kat] --
5,023,290 UART: [update-reset] ++
6,357,797 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,358,931 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,508,981 >>> mbox cmd response: success
6,508,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,509,250 UART: [update-reset] Copying MAN_2 To MAN_1
6,517,264 UART: [update-reset Success] --
6,518,165 UART: [state] Locking Datavault
6,518,943 UART: [state] Locking PCR0, PCR1 and PCR31
6,519,547 UART: [state] Locking ICCM
6,520,127 UART: [exit] Launching FMC @ 0x40000130
6,525,456 UART:
6,525,472 UART: Running Caliptra FMC ...
6,525,880 UART:
6,525,934 UART: [state] CFI Enabled
6,614,745 UART: [art] Extend RT PCRs Done
6,615,173 UART: [art] Lock RT PCRs Done
6,616,438 UART: [art] Populate DV Done
6,624,807 UART: [fht] FMC Alias Private Key: 7
6,625,903 UART: [art] Derive CDI
6,626,183 UART: [art] Store in in slot 0x4
6,711,970 UART: [art] Derive Key Pair
6,712,330 UART: [art] Store priv key in slot 0x5
6,724,872 UART: [art] Derive Key Pair - Done
6,739,560 UART: [art] Signing Cert with AUTHO
6,740,040 UART: RITY.KEYID = 7
6,755,338 UART: [art] Erasing AUTHORITY.KEYID = 7
6,756,103 UART: [art] PUB.X = 3B01948F16482E1530ACC2F557EBD352EE34C333DADCD2A8AD6E76C9B2F5C1B54B73FB2EB6B0F289861A3E8B85A17EF3
6,762,888 UART: [art] PUB.Y = 678AF41DF27C00E2C5EF82EF379FBB70882A13F04C3250758269C4F27CB4CE52F436D0C3B0324AA8D5041713320D9819
6,769,810 UART: [art] SIG.R = 8BE5F4BE30AADA6E8DE5D7EA64DB3E98F4EE092FE6D95F61A527D1C5B73EEB501B573EAB29F60BD38E309C0D3A749A17
6,776,597 UART: [art] SIG.S = CD81D43C4D64A08064550C45B5275B97B249FC36F3C320177FCA29807EFA085E2E8FCC551790F36C18115B67F7F3C514
6,799,586 UART: Caliptra RT
6,799,839 UART: [state] CFI Enabled
7,093,993 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,124,260 UART: [rt]cmd =0x494e464f, len=4
7,127,691 >>> mbox cmd response data (264 bytes)
7,127,692 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,156,913 UART: [rt]cmd =0x43455252, len=4
7,167,841 >>> mbox cmd response data (784 bytes)
7,167,842 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,197,767 UART: [rt]cmd =0x44504543, len=92
7,382,078 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,431 ready_for_fw is high
1,362,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,607 >>> mbox cmd response: success
2,928,607 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,989,887 UART:
2,989,903 UART: Running Caliptra FMC ...
2,990,311 UART:
2,990,365 UART: [state] CFI Enabled
3,000,480 UART: [fht] FMC Alias Private Key: 7
3,108,639 UART: [art] Extend RT PCRs Done
3,109,067 UART: [art] Lock RT PCRs Done
3,110,753 UART: [art] Populate DV Done
3,118,968 UART: [fht] FMC Alias Private Key: 7
3,120,064 UART: [art] Derive CDI
3,120,344 UART: [art] Store in in slot 0x4
3,206,277 UART: [art] Derive Key Pair
3,206,637 UART: [art] Store priv key in slot 0x5
3,220,395 UART: [art] Derive Key Pair - Done
3,235,192 UART: [art] Signing Cert with AUTHO
3,235,672 UART: RITY.KEYID = 7
3,250,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,519 UART: [art] PUB.X = 40F8D10CD909CCB848628B599B6837D460903A5AD9B9BC94FD4308FC53871BC95DF7038551665F715915AE19FA234032
3,258,273 UART: [art] PUB.Y = 966F7B46167781E0F3E0F4C32094791C1EE1FFCF345523BFCC3374F82B5E43DF6741EA499005C57824CC155F1634DCF2
3,265,222 UART: [art] SIG.R = 640F6D38F6CC999C82F63B13A2BA2DF8EDE13B3C7F85E1213F8DAD4F0EF5F2ED4F2126CF6DE10EFACA8C739D40AD32C3
3,272,011 UART: [art] SIG.S = 0D7B998B02FA3D7A30F674D9670569D7C4B369591B87CABFB93353E191A558CDC86F614952A1A187B91E93F563206137
3,295,623 UART: Caliptra RT
3,295,876 UART: [state] CFI Enabled
3,403,204 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,708 UART: [rt]cmd =0x4453424c, len=4
3,447,118 >>> mbox cmd response data (8 bytes)
3,447,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,210,025 >>> mbox cmd response: success
6,210,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,223,152 UART:
6,223,168 UART: Running Caliptra FMC ...
6,223,576 UART:
6,223,630 UART: [state] CFI Enabled
6,312,543 UART: [art] Extend RT PCRs Done
6,312,971 UART: [art] Lock RT PCRs Done
6,314,304 UART: [art] Populate DV Done
6,322,635 UART: [fht] FMC Alias Private Key: 7
6,323,565 UART: [art] Derive CDI
6,323,845 UART: [art] Store in in slot 0x4
6,409,360 UART: [art] Derive Key Pair
6,409,720 UART: [art] Store priv key in slot 0x5
6,423,282 UART: [art] Derive Key Pair - Done
6,437,932 UART: [art] Signing Cert with AUTHO
6,438,412 UART: RITY.KEYID = 7
6,453,816 UART: [art] Erasing AUTHORITY.KEYID = 7
6,454,581 UART: [art] PUB.X = 487B2DF2883764E930C6B9872445F77593980C6B7A058A18FCF240DD2B35CDE84CAEDA501E4B41FE7BD53A1FDB74EBFE
6,461,361 UART: [art] PUB.Y = 77CA9FD8FDACE3FF0A5AC9713DD464EFEF45CD88A75039D60ED31A3FE356A2A964051EBE21D6AF8955BE8DC2DDEABA44
6,468,334 UART: [art] SIG.R = 4E0DDBB69AED69A7886E7B69E977E74276AD439B810B39EA79D1F8D5DA499106D8C266EAD8981ADA51D3CB7ABD7024EF
6,475,113 UART: [art] SIG.S = 5F007783CA9C490DE3D8939CEE7A3EAE3EF2D9CC6133BBDE7568BB7E9B40AE3AA637AA22D49D943781337CAB99BD48B7
6,498,785 UART: Caliptra RT
6,499,038 UART: [state] CFI Enabled
6,789,324 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,819,613 UART: [rt]cmd =0x494e464f, len=4
6,822,936 >>> mbox cmd response data (264 bytes)
6,822,937 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,851,982 UART: [rt]cmd =0x43455252, len=4
6,862,869 >>> mbox cmd response data (782 bytes)
6,862,870 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,892,865 UART: [rt]cmd =0x44504543, len=92
7,075,266 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,572 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,252 UART: [kat] SHA2-256
882,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,298 UART: [kat] ++
886,450 UART: [kat] sha1
890,896 UART: [kat] SHA2-256
892,834 UART: [kat] SHA2-384
895,593 UART: [kat] SHA2-512-ACC
897,494 UART: [kat] ECC-384
903,159 UART: [kat] HMAC-384Kdf
907,941 UART: [kat] LMS
1,476,137 UART: [kat] --
1,476,898 UART: [cold-reset] ++
1,477,328 UART: [fht] Storing FHT @ 0x50003400
1,480,067 UART: [idev] ++
1,480,235 UART: [idev] CDI.KEYID = 6
1,480,595 UART: [idev] SUBJECT.KEYID = 7
1,481,019 UART: [idev] UDS.KEYID = 0
1,481,364 ready_for_fw is high
1,481,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,895 UART: [idev] Erasing UDS.KEYID = 0
1,505,645 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,313 UART: [idev] --
1,515,310 UART: [ldev] ++
1,515,478 UART: [ldev] CDI.KEYID = 6
1,515,841 UART: [ldev] SUBJECT.KEYID = 5
1,516,267 UART: [ldev] AUTHORITY.KEYID = 7
1,516,730 UART: [ldev] FE.KEYID = 1
1,522,106 UART: [ldev] Erasing FE.KEYID = 1
1,547,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,369 UART: [ldev] --
1,586,832 UART: [fwproc] Waiting for Commands...
1,587,639 UART: [fwproc] Received command 0x46574c44
1,588,430 UART: [fwproc] Received Image of size 114448 bytes
2,887,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,071 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,423 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,350 >>> mbox cmd response: success
3,080,350 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,081,500 UART: [afmc] ++
3,081,668 UART: [afmc] CDI.KEYID = 6
3,082,030 UART: [afmc] SUBJECT.KEYID = 7
3,082,455 UART: [afmc] AUTHORITY.KEYID = 5
3,117,692 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,744 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,524 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,137 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,827 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,734 UART: [afmc] --
3,160,642 UART: [cold-reset] --
3,161,548 UART: [state] Locking Datavault
3,162,963 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,567 UART: [state] Locking ICCM
3,163,993 UART: [exit] Launching FMC @ 0x40000130
3,169,322 UART:
3,169,338 UART: Running Caliptra FMC ...
3,169,746 UART:
3,169,889 UART: [state] CFI Enabled
3,180,828 UART: [fht] FMC Alias Private Key: 7
3,289,555 UART: [art] Extend RT PCRs Done
3,289,983 UART: [art] Lock RT PCRs Done
3,291,485 UART: [art] Populate DV Done
3,299,636 UART: [fht] FMC Alias Private Key: 7
3,300,732 UART: [art] Derive CDI
3,301,012 UART: [art] Store in in slot 0x4
3,386,609 UART: [art] Derive Key Pair
3,386,969 UART: [art] Store priv key in slot 0x5
3,400,537 UART: [art] Derive Key Pair - Done
3,415,123 UART: [art] Signing Cert with AUTHO
3,415,603 UART: RITY.KEYID = 7
3,430,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,350 UART: [art] PUB.X = 8B9678805D04FA1FED2FAB9735D77F46B9E1821605672F005047C7F98866430CBCB1E08AD66BE66D2984573E6F476689
3,438,085 UART: [art] PUB.Y = 849AF76CD98F0601D3106E7A6CEFC9FFD2782FC76E966C10FA9F29C2B0381E0CB7A43BFEE3361A3F75C516B4993B4B9B
3,445,042 UART: [art] SIG.R = 220CA60EE843306A9548457D16F7B47107F7F126C631DD50785B09E11D6793A15FD3EBA78E089664BD1321EFF69D9766
3,451,793 UART: [art] SIG.S = BF68ABAE35EA13B1B9E7A00D367EACBC68B126E5880F1BE9AA3912D418BBF9C43CE099644A9679AC417A2A6583385A08
3,474,941 UART: Caliptra RT
3,475,286 UART: [state] CFI Enabled
3,582,721 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,055 UART: [rt]cmd =0x4453424c, len=4
3,626,887 >>> mbox cmd response data (8 bytes)
3,626,888 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,900 UART:
3,627,916 UART: Running Caliptra ROM ...
3,628,324 UART:
3,628,465 UART: [state] CFI Enabled
3,631,371 UART: [state] LifecycleState = Unprovisioned
3,632,026 UART: [state] DebugLocked = No
3,632,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,634,069 UART: [kat] SHA2-256
4,428,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,432,115 UART: [kat] ++
4,432,267 UART: [kat] sha1
4,436,343 UART: [kat] SHA2-256
4,438,281 UART: [kat] SHA2-384
4,441,010 UART: [kat] SHA2-512-ACC
4,442,910 UART: [kat] ECC-384
4,448,583 UART: [kat] HMAC-384Kdf
4,453,397 UART: [kat] LMS
5,021,593 UART: [kat] --
5,022,290 UART: [update-reset] ++
6,357,607 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,358,765 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,508,815 >>> mbox cmd response: success
6,508,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,508,946 UART: [update-reset] Copying MAN_2 To MAN_1
6,516,960 UART: [update-reset Success] --
6,517,853 UART: [state] Locking Datavault
6,518,563 UART: [state] Locking PCR0, PCR1 and PCR31
6,519,167 UART: [state] Locking ICCM
6,519,767 UART: [exit] Launching FMC @ 0x40000130
6,525,096 UART:
6,525,112 UART: Running Caliptra FMC ...
6,525,520 UART:
6,525,663 UART: [state] CFI Enabled
6,614,920 UART: [art] Extend RT PCRs Done
6,615,348 UART: [art] Lock RT PCRs Done
6,616,395 UART: [art] Populate DV Done
6,624,518 UART: [fht] FMC Alias Private Key: 7
6,625,598 UART: [art] Derive CDI
6,625,878 UART: [art] Store in in slot 0x4
6,711,393 UART: [art] Derive Key Pair
6,711,753 UART: [art] Store priv key in slot 0x5
6,724,817 UART: [art] Derive Key Pair - Done
6,739,081 UART: [art] Signing Cert with AUTHO
6,739,561 UART: RITY.KEYID = 7
6,754,759 UART: [art] Erasing AUTHORITY.KEYID = 7
6,755,524 UART: [art] PUB.X = 81288EE63BF83FD4D466C799F39638F5FA5AB443682C406BC814F540991DC389EE268632209FCEA47FC820185A9C1F3F
6,762,296 UART: [art] PUB.Y = 932CEDA9D8501AEED72FE5D1CB5AC7154443BB906EEF174C842C27AF5A20A18539A147F5D0B5FF017CB1C657E7A33081
6,769,257 UART: [art] SIG.R = 697C4552FF6BEDCCA97DCDE0D3B8056F5A65C33F9957368D07F8DCE51342D19662270BC9717D214573A7206BD10473CA
6,776,019 UART: [art] SIG.S = 1E91E84B7CD1A5F51F180752E400AE4BD58AE40C94622077E98EF950D1CEA85C65A7626D425A8097CBECF31BA610B1DC
6,799,886 UART: Caliptra RT
6,800,231 UART: [state] CFI Enabled
7,094,071 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,124,150 UART: [rt]cmd =0x494e464f, len=4
7,127,461 >>> mbox cmd response data (264 bytes)
7,127,462 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,156,871 UART: [rt]cmd =0x43455252, len=4
7,167,712 >>> mbox cmd response data (782 bytes)
7,167,713 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,197,806 UART: [rt]cmd =0x44504543, len=92
7,382,043 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,270 ready_for_fw is high
1,363,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,372 >>> mbox cmd response: success
2,930,372 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,992,700 UART:
2,992,716 UART: Running Caliptra FMC ...
2,993,124 UART:
2,993,267 UART: [state] CFI Enabled
3,003,870 UART: [fht] FMC Alias Private Key: 7
3,112,093 UART: [art] Extend RT PCRs Done
3,112,521 UART: [art] Lock RT PCRs Done
3,113,965 UART: [art] Populate DV Done
3,122,106 UART: [fht] FMC Alias Private Key: 7
3,123,208 UART: [art] Derive CDI
3,123,488 UART: [art] Store in in slot 0x4
3,209,353 UART: [art] Derive Key Pair
3,209,713 UART: [art] Store priv key in slot 0x5
3,222,949 UART: [art] Derive Key Pair - Done
3,237,639 UART: [art] Signing Cert with AUTHO
3,238,119 UART: RITY.KEYID = 7
3,253,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,044 UART: [art] PUB.X = BC5B1080A88E9361B12E0F20CC7CD40A6DA7E6E056595F1BA3F43195C78C202F4D06ED050F06E488F249E5EC30503F4C
3,260,804 UART: [art] PUB.Y = B7C986660ECED0109376F1B8644803700721C667E09917CFDDE0584948FA4C67B1EE7CADC339A9A1BA3BC19BAB7B6954
3,267,753 UART: [art] SIG.R = 91EB16BCC42AE761E1017FC46B1218181698DC02C570676A0D728D24CC9B73F085B31CA3A9D18F3F2E0A92A9CD9D5E67
3,274,519 UART: [art] SIG.S = FF635B9F1AC150F7BC9F5EA10791DC47D9137A31598FB23F11882E35BC52CCF4FAC89103E915BD925D35BA10B34EE507
3,298,647 UART: Caliptra RT
3,298,992 UART: [state] CFI Enabled
3,406,988 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,452 UART: [rt]cmd =0x4453424c, len=4
3,452,204 >>> mbox cmd response data (8 bytes)
3,452,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,216,712 >>> mbox cmd response: success
6,216,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,229,893 UART:
6,229,909 UART: Running Caliptra FMC ...
6,230,317 UART:
6,230,460 UART: [state] CFI Enabled
6,319,389 UART: [art] Extend RT PCRs Done
6,319,817 UART: [art] Lock RT PCRs Done
6,321,168 UART: [art] Populate DV Done
6,329,677 UART: [fht] FMC Alias Private Key: 7
6,330,649 UART: [art] Derive CDI
6,330,929 UART: [art] Store in in slot 0x4
6,416,352 UART: [art] Derive Key Pair
6,416,712 UART: [art] Store priv key in slot 0x5
6,429,772 UART: [art] Derive Key Pair - Done
6,444,461 UART: [art] Signing Cert with AUTHO
6,444,941 UART: RITY.KEYID = 7
6,459,999 UART: [art] Erasing AUTHORITY.KEYID = 7
6,460,764 UART: [art] PUB.X = 01E944D1A013DBF33EA7B52043134BD8652F5849CE49BA89A2DA9AC714ABCCC0ACCB3E6F5841EA8EC9A344EB588743BC
6,467,551 UART: [art] PUB.Y = ADBD376F45682C515C7A39F6E1744DB984A0EF31F395A9D6E9CF8E952A83D5F15B404BFDAAFDD0EE6B8D8DE737B35F77
6,474,523 UART: [art] SIG.R = 98B9919F8B8035B6D51C9ECBEAA5B320D1C4EC28F56669FED6EEBEBFF9963C92143CB195206DF3DD699BC4AA29DFE685
6,481,315 UART: [art] SIG.S = 555430ADCF0146F33CD2476D6E768C183A5C84C5B9D5F54710E7636F4B8B5C730DD0F34EB01A700D97ABCF45C9A9E2DA
6,504,991 UART: Caliptra RT
6,505,336 UART: [state] CFI Enabled
6,800,671 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,831,058 UART: [rt]cmd =0x494e464f, len=4
6,834,451 >>> mbox cmd response data (264 bytes)
6,834,452 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,863,587 UART: [rt]cmd =0x43455252, len=4
6,874,466 >>> mbox cmd response data (783 bytes)
6,874,467 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,904,326 UART: [rt]cmd =0x44504543, len=92
7,087,355 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,574 UART: [state] LifecycleState = Unprovisioned
85,229 UART: [state] DebugLocked = No
85,759 UART: [state] WD Timer not started. Device not locked for debugging
87,032 UART: [kat] SHA2-256
892,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,807 UART: [kat] ++
896,959 UART: [kat] sha1
901,067 UART: [kat] SHA2-256
903,007 UART: [kat] SHA2-384
905,634 UART: [kat] SHA2-512-ACC
907,535 UART: [kat] ECC-384
917,260 UART: [kat] HMAC-384Kdf
921,644 UART: [kat] LMS
1,169,972 UART: [kat] --
1,170,827 UART: [cold-reset] ++
1,171,179 UART: [fht] FHT @ 0x50003400
1,173,866 UART: [idev] ++
1,174,034 UART: [idev] CDI.KEYID = 6
1,174,394 UART: [idev] SUBJECT.KEYID = 7
1,174,818 UART: [idev] UDS.KEYID = 0
1,175,163 ready_for_fw is high
1,175,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,706 UART: [idev] Erasing UDS.KEYID = 0
1,199,193 UART: [idev] Sha1 KeyId Algorithm
1,207,669 UART: [idev] --
1,208,689 UART: [ldev] ++
1,208,857 UART: [ldev] CDI.KEYID = 6
1,209,220 UART: [ldev] SUBJECT.KEYID = 5
1,209,646 UART: [ldev] AUTHORITY.KEYID = 7
1,210,109 UART: [ldev] FE.KEYID = 1
1,215,173 UART: [ldev] Erasing FE.KEYID = 1
1,241,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,297 UART: [ldev] --
1,280,566 UART: [fwproc] Wait for Commands...
1,281,148 UART: [fwproc] Recv command 0x46574c44
1,281,876 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,176 >>> mbox cmd response: success
2,774,176 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,775,374 UART: [afmc] ++
2,775,542 UART: [afmc] CDI.KEYID = 6
2,775,904 UART: [afmc] SUBJECT.KEYID = 7
2,776,329 UART: [afmc] AUTHORITY.KEYID = 5
2,812,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,475 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,360 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,079 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,897 UART: [afmc] --
2,855,833 UART: [cold-reset] --
2,856,557 UART: [state] Locking Datavault
2,857,564 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,168 UART: [state] Locking ICCM
2,858,628 UART: [exit] Launching FMC @ 0x40000130
2,863,957 UART:
2,863,973 UART: Running Caliptra FMC ...
2,864,381 UART:
2,864,435 UART: [state] CFI Enabled
2,875,394 UART: [fht] FMC Alias Private Key: 7
2,983,169 UART: [art] Extend RT PCRs Done
2,983,597 UART: [art] Lock RT PCRs Done
2,985,147 UART: [art] Populate DV Done
2,993,334 UART: [fht] FMC Alias Private Key: 7
2,994,418 UART: [art] Derive CDI
2,994,698 UART: [art] Store in in slot 0x4
3,080,581 UART: [art] Derive Key Pair
3,080,941 UART: [art] Store priv key in slot 0x5
3,094,251 UART: [art] Derive Key Pair - Done
3,109,208 UART: [art] Signing Cert with AUTHO
3,109,688 UART: RITY.KEYID = 7
3,124,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,697 UART: [art] PUB.X = FB03F668CE79F03A34BFCE634766CF0491D62736AB56659B7D52EC299273DF512D638C39D9D1B366772DDAAFC3235AC6
3,132,469 UART: [art] PUB.Y = BA487D43CABB184888CAA295178E1A4E54350005A94B86D68C971E562CB8287FED2CB100937A425F8270B1E1B9CE182A
3,139,376 UART: [art] SIG.R = 9FA99B11750066905D2BE372ED1D36DBFD137C95DF2B4B4CA1F4745D1A177051015883590020EE125638500977470EBB
3,146,087 UART: [art] SIG.S = B6E101139AE5905293551DE7D64740E74A3C033F4386AC477967BD0B606C841C6F07F26082DFB12ADE34A8EAAB38BE5E
3,170,068 UART: Caliptra RT
3,170,321 UART: [state] CFI Enabled
3,277,763 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,085 UART: [rt]cmd =0x4453424c, len=4
3,321,035 >>> mbox cmd response data (8 bytes)
3,321,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,707 UART:
3,321,723 UART: Running Caliptra ROM ...
3,322,131 UART:
3,322,186 UART: [state] CFI Enabled
3,324,458 UART: [state] LifecycleState = Unprovisioned
3,325,113 UART: [state] DebugLocked = No
3,325,787 UART: [state] WD Timer not started. Device not locked for debugging
3,327,143 UART: [kat] SHA2-256
4,132,793 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,136,918 UART: [kat] ++
4,137,070 UART: [kat] sha1
4,141,324 UART: [kat] SHA2-256
4,143,264 UART: [kat] SHA2-384
4,146,027 UART: [kat] SHA2-512-ACC
4,147,927 UART: [kat] ECC-384
4,157,392 UART: [kat] HMAC-384Kdf
4,162,062 UART: [kat] LMS
4,410,390 UART: [kat] --
4,411,146 UART: [update-reset] ++
5,725,819 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,726,820 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,876,818 >>> mbox cmd response: success
5,876,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,877,131 UART: [update-reset] Copying MAN_2 To MAN_1
5,885,145 UART: [update-reset Success] --
5,886,372 UART: [state] Locking Datavault
5,887,352 UART: [state] Locking PCR0, PCR1 and PCR31
5,887,956 UART: [state] Locking ICCM
5,888,416 UART: [exit] Launching FMC @ 0x40000130
5,893,745 UART:
5,893,761 UART: Running Caliptra FMC ...
5,894,169 UART:
5,894,223 UART: [state] CFI Enabled
5,983,410 UART: [art] Extend RT PCRs Done
5,983,838 UART: [art] Lock RT PCRs Done
5,985,327 UART: [art] Populate DV Done
5,993,536 UART: [fht] FMC Alias Private Key: 7
5,994,554 UART: [art] Derive CDI
5,994,834 UART: [art] Store in in slot 0x4
6,080,061 UART: [art] Derive Key Pair
6,080,421 UART: [art] Store priv key in slot 0x5
6,093,703 UART: [art] Derive Key Pair - Done
6,108,357 UART: [art] Signing Cert with AUTHO
6,108,837 UART: RITY.KEYID = 7
6,123,665 UART: [art] Erasing AUTHORITY.KEYID = 7
6,124,430 UART: [art] PUB.X = 3A82DF5B173772F19207B97A18F3326B06A43DFBA831B79B9E4CC47F9E18E874A24919209697FEE9327FB88BEDB8AB9B
6,131,202 UART: [art] PUB.Y = 3DDE2486632939A9DBFAA39E043677114B9611000B5049AA86F818071A363AFB9D8BE720C38AA4DA008FC04A11FC8537
6,138,101 UART: [art] SIG.R = 8EC7454151CF178A6EE4AA26D25A73568054AFD405B76D26F2089D46592FE84DA950294EF9424788206B741963205870
6,144,853 UART: [art] SIG.S = 965D63A37775730E21B51C84928C8F3D149C95C69B07B5499DA2395C42BF3B0A1ADE90B626B98D0F39D73588CFF52E22
6,168,268 UART: Caliptra RT
6,168,521 UART: [state] CFI Enabled
6,460,429 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,490,560 UART: [rt]cmd =0x494e464f, len=4
6,493,849 >>> mbox cmd response data (264 bytes)
6,493,850 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,523,129 UART: [rt]cmd =0x43455252, len=4
6,533,901 >>> mbox cmd response data (784 bytes)
6,533,902 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,563,839 UART: [rt]cmd =0x44504543, len=92
6,747,488 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,623 ready_for_fw is high
1,060,623 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,183 >>> mbox cmd response: success
2,626,183 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,688,989 UART:
2,689,005 UART: Running Caliptra FMC ...
2,689,413 UART:
2,689,467 UART: [state] CFI Enabled
2,699,962 UART: [fht] FMC Alias Private Key: 7
2,807,659 UART: [art] Extend RT PCRs Done
2,808,087 UART: [art] Lock RT PCRs Done
2,809,793 UART: [art] Populate DV Done
2,818,148 UART: [fht] FMC Alias Private Key: 7
2,819,102 UART: [art] Derive CDI
2,819,382 UART: [art] Store in in slot 0x4
2,905,147 UART: [art] Derive Key Pair
2,905,507 UART: [art] Store priv key in slot 0x5
2,918,565 UART: [art] Derive Key Pair - Done
2,933,260 UART: [art] Signing Cert with AUTHO
2,933,740 UART: RITY.KEYID = 7
2,948,952 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,717 UART: [art] PUB.X = C96C51F4E22A233CEF24693E4168F81D01EB3FF995347E66AA131C513CC3CB6489F0C8AA97285B7CE9D889ED0C974BD6
2,956,491 UART: [art] PUB.Y = 92CD5358A40698B70328C3B9E24A0A40064EFDB6C92F9AC861B46B1F6E532F294B94CB899ECB998377D28C8813BDAF61
2,963,435 UART: [art] SIG.R = C36B07D8515D17153093E99B02BA6B3E4DB42576BFEE41288EB52DFD22851FF0562063D0C903FC7D21431B6E8ED3B21B
2,970,202 UART: [art] SIG.S = 4408BC9AD041B16636EF15BF5D37AFD37D6F724F7694A6256E7B18A9AB9B7657D3D6D01423DA0436CD3B3037EE79B015
2,993,863 UART: Caliptra RT
2,994,116 UART: [state] CFI Enabled
3,101,235 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,531 UART: [rt]cmd =0x4453424c, len=4
3,145,469 >>> mbox cmd response data (8 bytes)
3,145,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,584,699 >>> mbox cmd response: success
5,584,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,598,163 UART:
5,598,179 UART: Running Caliptra FMC ...
5,598,587 UART:
5,598,641 UART: [state] CFI Enabled
5,687,168 UART: [art] Extend RT PCRs Done
5,687,596 UART: [art] Lock RT PCRs Done
5,688,689 UART: [art] Populate DV Done
5,696,830 UART: [fht] FMC Alias Private Key: 7
5,697,910 UART: [art] Derive CDI
5,698,190 UART: [art] Store in in slot 0x4
5,783,663 UART: [art] Derive Key Pair
5,784,023 UART: [art] Store priv key in slot 0x5
5,797,297 UART: [art] Derive Key Pair - Done
5,812,368 UART: [art] Signing Cert with AUTHO
5,812,848 UART: RITY.KEYID = 7
5,827,620 UART: [art] Erasing AUTHORITY.KEYID = 7
5,828,385 UART: [art] PUB.X = 133A8025E603315585B1AE586330CB34CDC5109A9BBCC8AD45E962F07218FAE2611DBF0A47149E3D07889A0D4759CD34
5,835,145 UART: [art] PUB.Y = 0C75C481CFB42D9752170D388849F51A4BBAA8D96CF53A8724E7DA64641E04655CCE2EB35A924B5FDD444722A3A8CE41
5,842,094 UART: [art] SIG.R = 47CF22EB7C5B2AAC259B46407EB5762327930FAE5F2A185FD893027FA2C2C58F39234EA172E1D92FFD8D09AA2695B3C8
5,848,865 UART: [art] SIG.S = 9C3B1518C6B74F8CD560F2AE197745586D48E87146561482B0D2D9616CF6B945488034DD378A4C16085D8394F0D546E5
5,872,315 UART: Caliptra RT
5,872,568 UART: [state] CFI Enabled
6,165,317 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,195,598 UART: [rt]cmd =0x494e464f, len=4
6,198,849 >>> mbox cmd response data (264 bytes)
6,198,850 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,228,315 UART: [rt]cmd =0x43455252, len=4
6,239,042 >>> mbox cmd response data (783 bytes)
6,239,043 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,269,020 UART: [rt]cmd =0x44504543, len=92
6,452,783 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,725 UART: [kat] SHA2-256
893,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,500 UART: [kat] ++
897,652 UART: [kat] sha1
901,688 UART: [kat] SHA2-256
903,628 UART: [kat] SHA2-384
906,313 UART: [kat] SHA2-512-ACC
908,214 UART: [kat] ECC-384
918,135 UART: [kat] HMAC-384Kdf
922,789 UART: [kat] LMS
1,171,117 UART: [kat] --
1,172,092 UART: [cold-reset] ++
1,172,518 UART: [fht] FHT @ 0x50003400
1,175,199 UART: [idev] ++
1,175,367 UART: [idev] CDI.KEYID = 6
1,175,727 UART: [idev] SUBJECT.KEYID = 7
1,176,151 UART: [idev] UDS.KEYID = 0
1,176,496 ready_for_fw is high
1,176,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,217 UART: [idev] Erasing UDS.KEYID = 0
1,200,786 UART: [idev] Sha1 KeyId Algorithm
1,209,190 UART: [idev] --
1,210,316 UART: [ldev] ++
1,210,484 UART: [ldev] CDI.KEYID = 6
1,210,847 UART: [ldev] SUBJECT.KEYID = 5
1,211,273 UART: [ldev] AUTHORITY.KEYID = 7
1,211,736 UART: [ldev] FE.KEYID = 1
1,216,822 UART: [ldev] Erasing FE.KEYID = 1
1,243,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,582 UART: [ldev] --
1,282,881 UART: [fwproc] Wait for Commands...
1,283,471 UART: [fwproc] Recv command 0x46574c44
1,284,199 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,051 >>> mbox cmd response: success
2,777,051 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,778,309 UART: [afmc] ++
2,778,477 UART: [afmc] CDI.KEYID = 6
2,778,839 UART: [afmc] SUBJECT.KEYID = 7
2,779,264 UART: [afmc] AUTHORITY.KEYID = 5
2,814,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,876 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,604 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,489 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,208 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,090 UART: [afmc] --
2,858,092 UART: [cold-reset] --
2,858,928 UART: [state] Locking Datavault
2,860,181 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,785 UART: [state] Locking ICCM
2,861,391 UART: [exit] Launching FMC @ 0x40000130
2,866,720 UART:
2,866,736 UART: Running Caliptra FMC ...
2,867,144 UART:
2,867,287 UART: [state] CFI Enabled
2,878,014 UART: [fht] FMC Alias Private Key: 7
2,986,395 UART: [art] Extend RT PCRs Done
2,986,823 UART: [art] Lock RT PCRs Done
2,988,229 UART: [art] Populate DV Done
2,996,344 UART: [fht] FMC Alias Private Key: 7
2,997,294 UART: [art] Derive CDI
2,997,574 UART: [art] Store in in slot 0x4
3,083,169 UART: [art] Derive Key Pair
3,083,529 UART: [art] Store priv key in slot 0x5
3,096,605 UART: [art] Derive Key Pair - Done
3,111,325 UART: [art] Signing Cert with AUTHO
3,111,805 UART: RITY.KEYID = 7
3,127,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,034 UART: [art] PUB.X = 30196CCDAD66CAE0BAEEDB973B0333244DD261977363846948B68D4226186D4506B4386251C90306D682FD1FDEAC572D
3,134,792 UART: [art] PUB.Y = B43D9472C28634785D2763762AEC65DECAAE018C2FCF9C94FA0686CA85294E693BA07256D00EBCFCCE35D4108F448147
3,141,741 UART: [art] SIG.R = 629A507EA9C491F6AE708E59345A0EB7E35C94AB8679EBB25548FB7E710445D2F0099421CFE81E1C31822A75B53E66C9
3,148,504 UART: [art] SIG.S = D847F76AC3FA3620984D59F1B6126CEDC3B407E1FE40C78D3A73EEE11E2316EFABCA5771B60D39DCA0FFBC8CEAE64741
3,172,403 UART: Caliptra RT
3,172,748 UART: [state] CFI Enabled
3,279,691 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,153 UART: [rt]cmd =0x4453424c, len=4
3,324,279 >>> mbox cmd response data (8 bytes)
3,324,280 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,199 UART:
3,325,215 UART: Running Caliptra ROM ...
3,325,623 UART:
3,325,765 UART: [state] CFI Enabled
3,328,661 UART: [state] LifecycleState = Unprovisioned
3,329,316 UART: [state] DebugLocked = No
3,329,952 UART: [state] WD Timer not started. Device not locked for debugging
3,331,194 UART: [kat] SHA2-256
4,136,844 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,140,969 UART: [kat] ++
4,141,121 UART: [kat] sha1
4,145,353 UART: [kat] SHA2-256
4,147,293 UART: [kat] SHA2-384
4,150,108 UART: [kat] SHA2-512-ACC
4,152,008 UART: [kat] ECC-384
4,161,387 UART: [kat] HMAC-384Kdf
4,165,975 UART: [kat] LMS
4,414,303 UART: [kat] --
4,415,161 UART: [update-reset] ++
5,730,298 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,731,315 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,881,313 >>> mbox cmd response: success
5,881,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,881,490 UART: [update-reset] Copying MAN_2 To MAN_1
5,889,504 UART: [update-reset Success] --
5,890,411 UART: [state] Locking Datavault
5,891,105 UART: [state] Locking PCR0, PCR1 and PCR31
5,891,709 UART: [state] Locking ICCM
5,892,235 UART: [exit] Launching FMC @ 0x40000130
5,897,564 UART:
5,897,580 UART: Running Caliptra FMC ...
5,897,988 UART:
5,898,131 UART: [state] CFI Enabled
5,987,202 UART: [art] Extend RT PCRs Done
5,987,630 UART: [art] Lock RT PCRs Done
5,989,093 UART: [art] Populate DV Done
5,997,354 UART: [fht] FMC Alias Private Key: 7
5,998,462 UART: [art] Derive CDI
5,998,742 UART: [art] Store in in slot 0x4
6,084,427 UART: [art] Derive Key Pair
6,084,787 UART: [art] Store priv key in slot 0x5
6,098,157 UART: [art] Derive Key Pair - Done
6,112,865 UART: [art] Signing Cert with AUTHO
6,113,345 UART: RITY.KEYID = 7
6,128,625 UART: [art] Erasing AUTHORITY.KEYID = 7
6,129,390 UART: [art] PUB.X = 63E9B8B0AB876AC27F7E2833536755A9A604011C7EBF3EF4FDADDD4E332E05ADBD9AC2F5AE2CCC612E830A831EE8AB40
6,136,172 UART: [art] PUB.Y = 5FC44756A9D57B05B0CAA786EC64DDB81B9C1A91946395203FE456C6E39EA290CE7AA40605FF83E014DB96B26CBA74A6
6,143,125 UART: [art] SIG.R = 2199A3ADA19A6FEC2989E2DB92BFA495A8A098A5A92EF9A2DCA778020BBD0562A20433C4AFCFA77BBEB0D6F0E473F125
6,149,905 UART: [art] SIG.S = E5FA2CA91FF38C6341A2472EBCE66FAAA19C90C5E150C0BAE081FF36934F865F4132BD4702A093D1EE55A8FA554388F2
6,173,639 UART: Caliptra RT
6,173,984 UART: [state] CFI Enabled
6,473,911 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,503,840 UART: [rt]cmd =0x494e464f, len=4
6,507,247 >>> mbox cmd response data (264 bytes)
6,507,248 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,536,289 UART: [rt]cmd =0x43455252, len=4
6,547,122 >>> mbox cmd response data (783 bytes)
6,547,123 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,577,078 UART: [rt]cmd =0x44504543, len=92
6,760,807 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,446 ready_for_fw is high
1,060,446 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,302 >>> mbox cmd response: success
2,629,302 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,692,346 UART:
2,692,362 UART: Running Caliptra FMC ...
2,692,770 UART:
2,692,913 UART: [state] CFI Enabled
2,703,648 UART: [fht] FMC Alias Private Key: 7
2,811,253 UART: [art] Extend RT PCRs Done
2,811,681 UART: [art] Lock RT PCRs Done
2,813,073 UART: [art] Populate DV Done
2,821,118 UART: [fht] FMC Alias Private Key: 7
2,822,104 UART: [art] Derive CDI
2,822,384 UART: [art] Store in in slot 0x4
2,907,851 UART: [art] Derive Key Pair
2,908,211 UART: [art] Store priv key in slot 0x5
2,921,537 UART: [art] Derive Key Pair - Done
2,936,194 UART: [art] Signing Cert with AUTHO
2,936,674 UART: RITY.KEYID = 7
2,951,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,579 UART: [art] PUB.X = C7AA5719CC339E3DE547E6DC4A38E71403ACA263E599E60FC55D3EE8A0A3B9E47C5E57767CEF4A5426755CC47F4EFA2E
2,959,361 UART: [art] PUB.Y = AC06D7864005F9B95CCB28AB3F4AD10D967783F43F7119E2E950525EFF48ABB7E8790E72096AD97784F4985E07CB2817
2,966,295 UART: [art] SIG.R = 4B6858ECE8BE824AD4D9710182512D568B69CE7F7196D6C59A03942567FD291804CDFF2995810FBC9452E911049EE973
2,973,046 UART: [art] SIG.S = 6F890AD74B79F76E2D76EE17B939CA08E7F5D35CEDFFC7D96638C1455A28F165A688E781F2EDDE4FA8E3EA9A50AF6CCC
2,996,849 UART: Caliptra RT
2,997,194 UART: [state] CFI Enabled
3,106,197 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,761 UART: [rt]cmd =0x4453424c, len=4
3,150,635 >>> mbox cmd response data (8 bytes)
3,150,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,590,010 >>> mbox cmd response: success
5,590,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,603,214 UART:
5,603,230 UART: Running Caliptra FMC ...
5,603,638 UART:
5,603,781 UART: [state] CFI Enabled
5,693,744 UART: [art] Extend RT PCRs Done
5,694,172 UART: [art] Lock RT PCRs Done
5,695,641 UART: [art] Populate DV Done
5,703,958 UART: [fht] FMC Alias Private Key: 7
5,705,104 UART: [art] Derive CDI
5,705,384 UART: [art] Store in in slot 0x4
5,791,139 UART: [art] Derive Key Pair
5,791,499 UART: [art] Store priv key in slot 0x5
5,804,903 UART: [art] Derive Key Pair - Done
5,819,447 UART: [art] Signing Cert with AUTHO
5,819,927 UART: RITY.KEYID = 7
5,835,331 UART: [art] Erasing AUTHORITY.KEYID = 7
5,836,096 UART: [art] PUB.X = 794C12F206D006B76EB7D033581EE2A52DEE631D1A64B87ADF40E658F24055ECC464CB54F9EF9E90C42916C2CB11FF25
5,842,870 UART: [art] PUB.Y = FABC84B56897612FB2A9CA96098C7B850283255B994B2CD1188D73CDCDBCEE2ED537BADE824C918F8C6B2CD17AA2524B
5,849,832 UART: [art] SIG.R = CBBBC4D33F8511EC2AAF9F544F59FB3324A14F060A0C85D9565E62292019C0AACEE992BAC80192BAF5111675118330C9
5,856,598 UART: [art] SIG.S = 206639B36D7B443AC65FDC2B4A82C4B16F60EFB3F3F9BC7697A96002D026AA5A049917D2C477D8A4FEEA28F35636E426
5,879,977 UART: Caliptra RT
5,880,322 UART: [state] CFI Enabled
6,171,959 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,202,352 UART: [rt]cmd =0x494e464f, len=4
6,205,685 >>> mbox cmd response data (264 bytes)
6,205,686 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,234,879 UART: [rt]cmd =0x43455252, len=4
6,245,702 >>> mbox cmd response data (783 bytes)
6,245,703 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,275,526 UART: [rt]cmd =0x44504543, len=92
6,459,209 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,341 UART: [kat] SHA2-256
901,281 UART: [kat] SHA2-384
904,120 UART: [kat] SHA2-512-ACC
906,021 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,174,269 ready_for_fw is high
1,174,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,198,661 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,714 UART: [ldev] ++
1,208,882 UART: [ldev] CDI.KEYID = 6
1,209,246 UART: [ldev] SUBJECT.KEYID = 5
1,209,673 UART: [ldev] AUTHORITY.KEYID = 7
1,210,136 UART: [ldev] FE.KEYID = 1
1,215,358 UART: [ldev] Erasing FE.KEYID = 1
1,242,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,670 UART: [ldev] --
1,282,082 UART: [fwproc] Wait for Commands...
1,282,855 UART: [fwproc] Recv command 0x46574c44
1,283,588 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,958 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,000 >>> mbox cmd response: success
2,776,000 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,777,015 UART: [afmc] ++
2,777,183 UART: [afmc] CDI.KEYID = 6
2,777,546 UART: [afmc] SUBJECT.KEYID = 7
2,777,972 UART: [afmc] AUTHORITY.KEYID = 5
2,812,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,042 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,761 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,566 UART: [afmc] --
2,856,468 UART: [cold-reset] --
2,857,268 UART: [state] Locking Datavault
2,858,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,909 UART: [state] Locking ICCM
2,859,463 UART: [exit] Launching FMC @ 0x40000130
2,864,792 UART:
2,864,808 UART: Running Caliptra FMC ...
2,865,216 UART:
2,865,270 UART: [state] CFI Enabled
2,875,643 UART: [fht] FMC Alias Private Key: 7
2,983,696 UART: [art] Extend RT PCRs Done
2,984,124 UART: [art] Lock RT PCRs Done
2,985,794 UART: [art] Populate DV Done
2,993,897 UART: [fht] FMC Alias Private Key: 7
2,994,837 UART: [art] Derive CDI
2,995,117 UART: [art] Store in in slot 0x4
3,080,884 UART: [art] Derive Key Pair
3,081,244 UART: [art] Store priv key in slot 0x5
3,094,472 UART: [art] Derive Key Pair - Done
3,109,568 UART: [art] Signing Cert with AUTHO
3,110,048 UART: RITY.KEYID = 7
3,125,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,281 UART: [art] PUB.X = EBF3F1098619001F6FA5D163C7AF58E53DE609474E40DF5B610620ACFFD818C177ED0881A759AE8A975B8B899F4F0D05
3,133,019 UART: [art] PUB.Y = DB311B2FDC51412691111C99D2A316E12160235F44CD4933D991C6B4F913679A66173AAAEB2E37B010066832A8B509E7
3,139,957 UART: [art] SIG.R = CB418BF12588290D3B4622DA62D1AEF80DE9473D8EC5308BFA8C3E56238BF37BAEC40C3D6E1BD17F2FF36C4284FE62A1
3,146,736 UART: [art] SIG.S = 1C0B60E10D92BD166E15C8C48B846CCE47C6618555771EA1E0B7238E295BFF492C663583355C60C59C29C42131763774
3,170,503 UART: Caliptra RT
3,170,756 UART: [state] CFI Enabled
3,278,771 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,203 UART: [rt]cmd =0x4453424c, len=4
3,322,567 >>> mbox cmd response data (8 bytes)
3,322,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,337 UART:
3,323,353 UART: Running Caliptra ROM ...
3,323,761 UART:
3,323,816 UART: [state] CFI Enabled
3,326,606 UART: [state] LifecycleState = Unprovisioned
3,327,261 UART: [state] DebugLocked = No
3,327,789 UART: [state] WD Timer not started. Device not locked for debugging
3,328,915 UART: [kat] SHA2-256
4,132,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,136,594 UART: [kat] ++
4,136,746 UART: [kat] sha1
4,141,174 UART: [kat] SHA2-256
4,143,114 UART: [kat] SHA2-384
4,145,957 UART: [kat] SHA2-512-ACC
4,147,857 UART: [kat] ECC-384
4,157,534 UART: [kat] HMAC-384Kdf
4,162,244 UART: [kat] LMS
4,410,556 UART: [kat] --
4,411,798 UART: [update-reset] ++
5,723,722 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,724,745 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,874,743 >>> mbox cmd response: success
5,874,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,874,994 UART: [update-reset] Copying MAN_2 To MAN_1
5,883,008 UART: [update-reset Success] --
5,884,053 UART: [state] Locking Datavault
5,884,835 UART: [state] Locking PCR0, PCR1 and PCR31
5,885,439 UART: [state] Locking ICCM
5,886,089 UART: [exit] Launching FMC @ 0x40000130
5,891,418 UART:
5,891,434 UART: Running Caliptra FMC ...
5,891,842 UART:
5,891,896 UART: [state] CFI Enabled
5,980,721 UART: [art] Extend RT PCRs Done
5,981,149 UART: [art] Lock RT PCRs Done
5,982,568 UART: [art] Populate DV Done
5,990,791 UART: [fht] FMC Alias Private Key: 7
5,991,875 UART: [art] Derive CDI
5,992,155 UART: [art] Store in in slot 0x4
6,078,054 UART: [art] Derive Key Pair
6,078,414 UART: [art] Store priv key in slot 0x5
6,091,164 UART: [art] Derive Key Pair - Done
6,105,745 UART: [art] Signing Cert with AUTHO
6,106,225 UART: RITY.KEYID = 7
6,121,203 UART: [art] Erasing AUTHORITY.KEYID = 7
6,121,968 UART: [art] PUB.X = F5C32A8A2BA05DADADD40DFA3C262BDB291E0DCAE2349A4E2ECD4D88333DD5E1DF5CF4D3DDB3A6BCB39031EF920744B4
6,128,763 UART: [art] PUB.Y = BF1484C3C455EF63553BE077A226EB113DD0A7BBA2D3B6B66CA75327A07F4C2616C20524477BE202F51CDF6D00C2B851
6,135,693 UART: [art] SIG.R = 10B0A75C0A088D0A44AFBB90E5BB9E761256F26101313CF0AB67649582FD395481FD37F6448CDEA54E1E399587D237EC
6,142,455 UART: [art] SIG.S = 6CFE57752B3D46000D1C52E2D824D05759838DF85809C64142754FEF37F589DA022CD47466D61F96433DC90938C32C16
6,166,348 UART: Caliptra RT
6,166,601 UART: [state] CFI Enabled
6,459,002 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,488,963 UART: [rt]cmd =0x494e464f, len=4
6,492,316 >>> mbox cmd response data (264 bytes)
6,492,317 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,521,624 UART: [rt]cmd =0x43455252, len=4
6,532,391 >>> mbox cmd response data (782 bytes)
6,532,392 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,562,213 UART: [rt]cmd =0x44504543, len=92
6,745,648 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,296 ready_for_fw is high
1,056,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,870 >>> mbox cmd response: success
2,622,870 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,685,260 UART:
2,685,276 UART: Running Caliptra FMC ...
2,685,684 UART:
2,685,738 UART: [state] CFI Enabled
2,696,421 UART: [fht] FMC Alias Private Key: 7
2,804,020 UART: [art] Extend RT PCRs Done
2,804,448 UART: [art] Lock RT PCRs Done
2,806,084 UART: [art] Populate DV Done
2,814,451 UART: [fht] FMC Alias Private Key: 7
2,815,419 UART: [art] Derive CDI
2,815,699 UART: [art] Store in in slot 0x4
2,901,784 UART: [art] Derive Key Pair
2,902,144 UART: [art] Store priv key in slot 0x5
2,915,730 UART: [art] Derive Key Pair - Done
2,930,686 UART: [art] Signing Cert with AUTHO
2,931,166 UART: RITY.KEYID = 7
2,946,458 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,223 UART: [art] PUB.X = 0C88EAF67CB0C54081DD5DC2C4EBDFE886BAB1DDE79BBDE696DA8948339759367CD17B1F5C1AB0B653620C8CAB69A51E
2,954,011 UART: [art] PUB.Y = F8938334DF4E5D4BFED03EF1F1DCFE02555A5CCDA67BB1EA3CFBC2B1A636D9BFE270589CB69B87494DDD625334B8BB7A
2,960,986 UART: [art] SIG.R = CCBC4C6DAFD2684CE4C96BC12D0C53603CDF5D1042C994B0C25DFFB55322378FE337943404D8519E711B0C32DD0C1688
2,967,754 UART: [art] SIG.S = 1FBAF71946A48EF8467533C7540F1552C50AEBCA3DCD870B247E1D2688703FF2B037EC7ADD314CACAADF2C40D7518359
2,991,668 UART: Caliptra RT
2,991,921 UART: [state] CFI Enabled
3,098,940 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,276 UART: [rt]cmd =0x4453424c, len=4
3,143,086 >>> mbox cmd response data (8 bytes)
3,143,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,576,433 >>> mbox cmd response: success
5,576,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,589,987 UART:
5,590,003 UART: Running Caliptra FMC ...
5,590,411 UART:
5,590,465 UART: [state] CFI Enabled
5,680,014 UART: [art] Extend RT PCRs Done
5,680,442 UART: [art] Lock RT PCRs Done
5,681,533 UART: [art] Populate DV Done
5,689,578 UART: [fht] FMC Alias Private Key: 7
5,690,622 UART: [art] Derive CDI
5,690,902 UART: [art] Store in in slot 0x4
5,776,767 UART: [art] Derive Key Pair
5,777,127 UART: [art] Store priv key in slot 0x5
5,790,135 UART: [art] Derive Key Pair - Done
5,804,677 UART: [art] Signing Cert with AUTHO
5,805,157 UART: RITY.KEYID = 7
5,820,119 UART: [art] Erasing AUTHORITY.KEYID = 7
5,820,884 UART: [art] PUB.X = 36940424E9C68CE6C05BEC8595170F4EA21C1E4FFDDF585088D37A220AAD680332693FEFEF2CF062712359AB2259CC14
5,827,648 UART: [art] PUB.Y = D8FA0387A6D9906A4F85742112650E0AD096C74B4C3F6A39BF64BC1EE78324C8D73AEABB2B0D527A911DDDF36DB6D843
5,834,600 UART: [art] SIG.R = DB88C270F18F2D218021093CECBABAF38F0469B7FAEF300A615603F7CFF64DEFF4C678CFC4635FA6C3A57FA27557FF91
5,841,378 UART: [art] SIG.S = 3A6C3DBFBE1089D0E716D88C2B8977D269E1D71C3188F037224B4C683E0CFB7B0B6ED36BC1AC39B9FA48288B0C9F480E
5,865,109 UART: Caliptra RT
5,865,362 UART: [state] CFI Enabled
6,155,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,185,506 UART: [rt]cmd =0x494e464f, len=4
6,188,823 >>> mbox cmd response data (264 bytes)
6,188,824 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,218,131 UART: [rt]cmd =0x43455252, len=4
6,228,742 >>> mbox cmd response data (783 bytes)
6,228,743 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,258,620 UART: [rt]cmd =0x44504543, len=92
6,441,745 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,564 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 ready_for_fw is high
1,174,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,380 UART: [idev] Erasing UDS.KEYID = 0
1,199,446 UART: [idev] Sha1 KeyId Algorithm
1,208,276 UART: [idev] --
1,209,345 UART: [ldev] ++
1,209,513 UART: [ldev] CDI.KEYID = 6
1,209,877 UART: [ldev] SUBJECT.KEYID = 5
1,210,304 UART: [ldev] AUTHORITY.KEYID = 7
1,210,767 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,163 UART: [fwproc] Wait for Commands...
1,282,770 UART: [fwproc] Recv command 0x46574c44
1,283,503 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,550 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,943 >>> mbox cmd response: success
2,775,943 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,777,002 UART: [afmc] ++
2,777,170 UART: [afmc] CDI.KEYID = 6
2,777,533 UART: [afmc] SUBJECT.KEYID = 7
2,777,959 UART: [afmc] AUTHORITY.KEYID = 5
2,812,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,123 UART: [afmc] --
2,856,149 UART: [cold-reset] --
2,856,897 UART: [state] Locking Datavault
2,858,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,834 UART: [state] Locking ICCM
2,859,446 UART: [exit] Launching FMC @ 0x40000130
2,864,775 UART:
2,864,791 UART: Running Caliptra FMC ...
2,865,199 UART:
2,865,342 UART: [state] CFI Enabled
2,875,869 UART: [fht] FMC Alias Private Key: 7
2,984,874 UART: [art] Extend RT PCRs Done
2,985,302 UART: [art] Lock RT PCRs Done
2,986,908 UART: [art] Populate DV Done
2,994,903 UART: [fht] FMC Alias Private Key: 7
2,995,851 UART: [art] Derive CDI
2,996,131 UART: [art] Store in in slot 0x4
3,081,994 UART: [art] Derive Key Pair
3,082,354 UART: [art] Store priv key in slot 0x5
3,095,630 UART: [art] Derive Key Pair - Done
3,110,083 UART: [art] Signing Cert with AUTHO
3,110,563 UART: RITY.KEYID = 7
3,125,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,142 UART: [art] PUB.X = 08CF4A62F9940B1A21F0AEF81B8CE4B0037E6B5F4C8A81750DC1371AD00727E942107C6DD987274220CFD7869047B3D3
3,132,899 UART: [art] PUB.Y = 676D8396575584253D4E367C1FB16F86192F84961D6C7715E5E9F8762FF2129429964064C0CA6C65EB1254E18FCF2838
3,139,837 UART: [art] SIG.R = 34B6889BF506794880BDA4CAB93EFCE0BBC9A29AE5FF69A6DF5B717013DB6927D44F40F920BD31B1D25E0204E60BC084
3,146,609 UART: [art] SIG.S = 77D3160174830C8F57AEACC7EAC7E6FE111C1636E0D2BD0D6B10F76AE48E69C23CC574FE6E332CF9BCE31FED71879EC5
3,170,553 UART: Caliptra RT
3,170,898 UART: [state] CFI Enabled
3,278,727 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,111 UART: [rt]cmd =0x4453424c, len=4
3,322,419 >>> mbox cmd response data (8 bytes)
3,322,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,143 UART:
3,323,159 UART: Running Caliptra ROM ...
3,323,567 UART:
3,323,709 UART: [state] CFI Enabled
3,326,025 UART: [state] LifecycleState = Unprovisioned
3,326,680 UART: [state] DebugLocked = No
3,327,346 UART: [state] WD Timer not started. Device not locked for debugging
3,328,482 UART: [kat] SHA2-256
4,132,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,136,161 UART: [kat] ++
4,136,313 UART: [kat] sha1
4,140,557 UART: [kat] SHA2-256
4,142,497 UART: [kat] SHA2-384
4,145,158 UART: [kat] SHA2-512-ACC
4,147,058 UART: [kat] ECC-384
4,156,979 UART: [kat] HMAC-384Kdf
4,161,545 UART: [kat] LMS
4,409,857 UART: [kat] --
4,410,575 UART: [update-reset] ++
5,722,633 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,723,822 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,873,820 >>> mbox cmd response: success
5,873,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,873,937 UART: [update-reset] Copying MAN_2 To MAN_1
5,881,951 UART: [update-reset Success] --
5,882,916 UART: [state] Locking Datavault
5,883,726 UART: [state] Locking PCR0, PCR1 and PCR31
5,884,330 UART: [state] Locking ICCM
5,884,830 UART: [exit] Launching FMC @ 0x40000130
5,890,159 UART:
5,890,175 UART: Running Caliptra FMC ...
5,890,583 UART:
5,890,726 UART: [state] CFI Enabled
5,980,095 UART: [art] Extend RT PCRs Done
5,980,523 UART: [art] Lock RT PCRs Done
5,981,650 UART: [art] Populate DV Done
5,989,797 UART: [fht] FMC Alias Private Key: 7
5,990,769 UART: [art] Derive CDI
5,991,049 UART: [art] Store in in slot 0x4
6,076,830 UART: [art] Derive Key Pair
6,077,190 UART: [art] Store priv key in slot 0x5
6,091,006 UART: [art] Derive Key Pair - Done
6,105,494 UART: [art] Signing Cert with AUTHO
6,105,974 UART: RITY.KEYID = 7
6,121,250 UART: [art] Erasing AUTHORITY.KEYID = 7
6,122,015 UART: [art] PUB.X = 3F64A12765A7CF47004544FDBBB162FAD5D7C939A0931958C6FDD9E505405FC29755722ADFD10C840C1610EBC15B0BF9
6,128,759 UART: [art] PUB.Y = CE243698EDE0E47BFD4AAD3D6B52B7FB4D98354AE800F9D0AB7C3E110EFB185E65D94F2E26B9F8C3A36C51A83E18685D
6,135,704 UART: [art] SIG.R = 8596388D80A87250818F4B9BFBA3E6E93ED63B4FDDD699D52A32C16EF8B7620D2930B0E12C107662A30F54FD60941FD0
6,142,472 UART: [art] SIG.S = AFDC3101A5A9D9ABD5C31292AF310359BDBD6B180816D7E869A7F40010864D4C1E062E6DCB1918232CAD5D28C569D947
6,166,493 UART: Caliptra RT
6,166,838 UART: [state] CFI Enabled
6,463,176 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,493,305 UART: [rt]cmd =0x494e464f, len=4
6,496,714 >>> mbox cmd response data (264 bytes)
6,496,715 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,525,916 UART: [rt]cmd =0x43455252, len=4
6,536,712 >>> mbox cmd response data (784 bytes)
6,536,713 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,566,614 UART: [rt]cmd =0x44504543, len=92
6,750,876 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,405 ready_for_fw is high
1,056,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,587 >>> mbox cmd response: success
2,622,587 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,684,613 UART:
2,684,629 UART: Running Caliptra FMC ...
2,685,037 UART:
2,685,180 UART: [state] CFI Enabled
2,695,471 UART: [fht] FMC Alias Private Key: 7
2,803,578 UART: [art] Extend RT PCRs Done
2,804,006 UART: [art] Lock RT PCRs Done
2,805,602 UART: [art] Populate DV Done
2,814,009 UART: [fht] FMC Alias Private Key: 7
2,815,017 UART: [art] Derive CDI
2,815,297 UART: [art] Store in in slot 0x4
2,900,858 UART: [art] Derive Key Pair
2,901,218 UART: [art] Store priv key in slot 0x5
2,914,360 UART: [art] Derive Key Pair - Done
2,929,101 UART: [art] Signing Cert with AUTHO
2,929,581 UART: RITY.KEYID = 7
2,945,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,128 UART: [art] PUB.X = 6AEAE30C4BF3289F7CF0C3B03FDA2687FF54B527025486124C3398BE7ACD2D1B02FEA964CF3611002BCA99A4A7AD1A81
2,952,883 UART: [art] PUB.Y = AC70F19D7C9E61EB8F2728EFC211350FCC12906BC44BCF6A41F8BBEA997171EBF494B262B0E250AF0943C097CE2C4B8C
2,959,845 UART: [art] SIG.R = 0AC58EA46007AD099D9D672720EA2A7AEDEC409AFBB5B607D684B30ADF67A16F2480E4E1C23EBBF90B52382A7D5707DE
2,966,612 UART: [art] SIG.S = C42E5AFA5B1AA3E10D7ABD057E40B3FCECA86F3C0BFC17594EE27720F47D597FB194177819199BEFA185275D8C5C6D4B
2,990,772 UART: Caliptra RT
2,991,117 UART: [state] CFI Enabled
3,100,112 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,382 UART: [rt]cmd =0x4453424c, len=4
3,144,322 >>> mbox cmd response data (8 bytes)
3,144,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,578,304 >>> mbox cmd response: success
5,578,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,591,952 UART:
5,591,968 UART: Running Caliptra FMC ...
5,592,376 UART:
5,592,519 UART: [state] CFI Enabled
5,681,730 UART: [art] Extend RT PCRs Done
5,682,158 UART: [art] Lock RT PCRs Done
5,683,355 UART: [art] Populate DV Done
5,691,410 UART: [fht] FMC Alias Private Key: 7
5,692,374 UART: [art] Derive CDI
5,692,654 UART: [art] Store in in slot 0x4
5,778,149 UART: [art] Derive Key Pair
5,778,509 UART: [art] Store priv key in slot 0x5
5,792,135 UART: [art] Derive Key Pair - Done
5,807,232 UART: [art] Signing Cert with AUTHO
5,807,712 UART: RITY.KEYID = 7
5,823,362 UART: [art] Erasing AUTHORITY.KEYID = 7
5,824,127 UART: [art] PUB.X = AB9B77EC101E5587A6A23E69BBFB84B2E4215780A19CBC639B28619EA92B8ACDD9A13B393014559D92680212BE32EB58
5,830,900 UART: [art] PUB.Y = 92602FA185AA859462D61ECABA32D288FF8FCE4BEFF04EC2C2CA425EA662ECC9A56CECB5A272E740D5774938B6A9F6ED
5,837,874 UART: [art] SIG.R = 6DE4C77C3BC2705B5AADDE208A00A3BC09B19507C60A1DE16C8A734D72AEA754DCE151A7B2F3CF7D344C2C81C2CD26C3
5,844,635 UART: [art] SIG.S = DE0993F326952A7993FABA607F0812B0A8A9EEEF5A8A94EA92866692F25085D61E20EF0BDECA9E5F284EFF13F8152FE9
5,868,119 UART: Caliptra RT
5,868,464 UART: [state] CFI Enabled
6,161,271 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,191,480 UART: [rt]cmd =0x494e464f, len=4
6,194,913 >>> mbox cmd response data (264 bytes)
6,194,914 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,224,277 UART: [rt]cmd =0x43455252, len=4
6,235,350 >>> mbox cmd response data (783 bytes)
6,235,351 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,265,366 UART: [rt]cmd =0x44504543, len=92
6,448,619 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,047 UART:
192,434 UART: Running Caliptra ROM ...
193,632 UART:
193,791 UART: [state] CFI Enabled
263,586 UART: [state] LifecycleState = Unprovisioned
265,509 UART: [state] DebugLocked = No
267,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,989 UART: [kat] SHA2-256
441,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,217 UART: [kat] ++
452,664 UART: [kat] sha1
462,825 UART: [kat] SHA2-256
465,546 UART: [kat] SHA2-384
471,393 UART: [kat] SHA2-512-ACC
473,765 UART: [kat] ECC-384
2,769,255 UART: [kat] HMAC-384Kdf
2,795,629 UART: [kat] LMS
3,985,947 UART: [kat] --
3,989,959 UART: [cold-reset] ++
3,992,179 UART: [fht] Storing FHT @ 0x50003400
4,004,801 UART: [idev] ++
4,005,372 UART: [idev] CDI.KEYID = 6
4,006,406 UART: [idev] SUBJECT.KEYID = 7
4,007,583 UART: [idev] UDS.KEYID = 0
4,008,639 ready_for_fw is high
4,008,852 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,152,423 UART: [idev] Erasing UDS.KEYID = 0
7,340,751 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,213 UART: [idev] --
7,365,899 UART: [ldev] ++
7,366,467 UART: [ldev] CDI.KEYID = 6
7,367,446 UART: [ldev] SUBJECT.KEYID = 5
7,368,607 UART: [ldev] AUTHORITY.KEYID = 7
7,369,900 UART: [ldev] FE.KEYID = 1
7,416,684 UART: [ldev] Erasing FE.KEYID = 1
10,750,077 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,644 UART: [ldev] --
13,109,614 UART: [fwproc] Waiting for Commands...
13,112,729 UART: [fwproc] Received command 0x46574c44
13,114,962 UART: [fwproc] Received Image of size 114124 bytes
17,164,196 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,849 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,703 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,620,397 >>> mbox cmd response: success
17,621,062 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,624,506 UART: [afmc] ++
17,625,115 UART: [afmc] CDI.KEYID = 6
17,625,999 UART: [afmc] SUBJECT.KEYID = 7
17,627,280 UART: [afmc] AUTHORITY.KEYID = 5
20,984,443 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,282,404 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,660 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,299,123 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,920 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,328,351 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,350,292 UART: [afmc] --
23,353,630 UART: [cold-reset] --
23,357,819 UART: [state] Locking Datavault
23,362,578 UART: [state] Locking PCR0, PCR1 and PCR31
23,364,327 UART: [state] Locking ICCM
23,367,047 UART: [exit] Launching FMC @ 0x40000130
23,375,441 UART:
23,375,671 UART: Running Caliptra FMC ...
23,376,697 UART:
23,376,844 UART: [state] CFI Enabled
23,441,292 UART: [fht] FMC Alias Private Key: 7
25,779,337 UART: [art] Extend RT PCRs Done
25,780,556 UART: [art] Lock RT PCRs Done
25,782,309 UART: [art] Populate DV Done
25,787,926 UART: [fht] FMC Alias Private Key: 7
25,789,484 UART: [art] Derive CDI
25,790,258 UART: [art] Store in in slot 0x4
25,850,894 UART: [art] Derive Key Pair
25,851,900 UART: [art] Store priv key in slot 0x5
29,144,045 UART: [art] Derive Key Pair - Done
29,157,313 UART: [art] Signing Cert with AUTHO
29,158,618 UART: RITY.KEYID = 7
31,445,392 UART: [art] Erasing AUTHORITY.KEYID = 7
31,446,912 UART: [art] PUB.X = 54FDF3B78B67A957E849E838737BB9700C5059240D67B58A52F38D51171A3B2CA5EB7052EEEC26EADDB21C669507D1B3
31,454,110 UART: [art] PUB.Y = 389EFEBC552D699FC0BEC584D513B1254946D6CDFD766B4FCD5AA4286C8025752B5F0E4C49156BB74370DF5B9DF42A91
31,461,574 UART: [art] SIG.R = 645AB8AA94E9E06B2D987E12CF1EC9B8779A4E97819F238153460D37F6360A1BCB0B991B375742EEF74C89E738F464D3
31,468,785 UART: [art] SIG.S = 58B1A63E06E19D47A8319EBDD33831737F37541C129D579CE56653BAB7F3E96C448A07238960919FEB30350A58CAC3EA
32,773,867 UART: Caliptra RT
32,774,579 UART: [state] CFI Enabled
32,955,526 UART: [rt] RT listening for mailbox commands...
32,987,909 UART: [rt]cmd =0x44504543, len=136
38,609,629 >>> mbox cmd response data (136 bytes)
38,611,021 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,640,783 UART: [rt]cmd =0x4453424c, len=4
41,938,870 >>> mbox cmd response data (8 bytes)
41,939,410 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,970,016 UART: [rt]cmd =0x44504543, len=92
47,730,239 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,785,684 ready_for_fw is high
3,786,305 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,860,433 >>> mbox cmd response: success
17,861,216 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,551,427 UART:
23,551,802 UART: Running Caliptra FMC ...
23,552,940 UART:
23,553,096 UART: [state] CFI Enabled
23,619,993 UART: [fht] FMC Alias Private Key: 7
25,957,643 UART: [art] Extend RT PCRs Done
25,958,888 UART: [art] Lock RT PCRs Done
25,960,361 UART: [art] Populate DV Done
25,965,689 UART: [fht] FMC Alias Private Key: 7
25,967,216 UART: [art] Derive CDI
25,967,990 UART: [art] Store in in slot 0x4
26,027,816 UART: [art] Derive Key Pair
26,028,823 UART: [art] Store priv key in slot 0x5
29,321,497 UART: [art] Derive Key Pair - Done
29,334,923 UART: [art] Signing Cert with AUTHO
29,336,265 UART: RITY.KEYID = 7
31,622,821 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,377 UART: [art] PUB.X = 5CDDEEB99C9848507157157FCBEFBFBD21A469E3656C9A9381B784BD8763079F7369BD355F5D15FA2F5C99626FC4B1EF
31,631,596 UART: [art] PUB.Y = C86883A15C3B02B3E9BFFC73E39FA8A4E94EC6C9566FA908B5C86AF51EA83F4A63D2A1323D767EA8469CB7B28F1F325E
31,638,867 UART: [art] SIG.R = 04BDF80D3B123DACBB2AD091DDF32F824AB087FF4C33043E0CCF0E78EE2E25EE756DE66FFD77F937C696F89E08F30044
31,646,266 UART: [art] SIG.S = 11C89B431164B4DD43BBF5FB3A1EF785DF4BD78E96C17A65E3D403DA6D4EEF69E9B45DC27383A41ED58CB8C6A3D5834A
32,951,576 UART: Caliptra RT
32,952,314 UART: [state] CFI Enabled
33,111,806 UART: [rt] RT listening for mailbox commands...
33,144,199 UART: [rt]cmd =0x44504543, len=136
38,767,396 >>> mbox cmd response data (136 bytes)
38,768,785 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,798,555 UART: [rt]cmd =0x4453424c, len=4
42,097,110 >>> mbox cmd response data (8 bytes)
42,097,675 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,128,084 UART: [rt]cmd =0x44504543, len=92
47,891,322 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,214 writing to cptra_bootfsm_go
193,553 UART:
193,928 UART: Running Caliptra ROM ...
195,108 UART:
604,807 UART: [state] CFI Enabled
620,030 UART: [state] LifecycleState = Unprovisioned
621,994 UART: [state] DebugLocked = No
624,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,997 UART: [kat] SHA2-256
799,726 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,312 UART: [kat] ++
810,758 UART: [kat] sha1
822,123 UART: [kat] SHA2-256
824,848 UART: [kat] SHA2-384
829,914 UART: [kat] SHA2-512-ACC
832,276 UART: [kat] ECC-384
3,117,092 UART: [kat] HMAC-384Kdf
3,129,845 UART: [kat] LMS
4,320,003 UART: [kat] --
4,326,247 UART: [cold-reset] ++
4,327,333 UART: [fht] Storing FHT @ 0x50003400
4,338,386 UART: [idev] ++
4,338,978 UART: [idev] CDI.KEYID = 6
4,340,010 UART: [idev] SUBJECT.KEYID = 7
4,341,183 UART: [idev] UDS.KEYID = 0
4,342,232 ready_for_fw is high
4,342,457 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,814 UART: [idev] Erasing UDS.KEYID = 0
7,627,985 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,634 UART: [idev] --
7,653,942 UART: [ldev] ++
7,654,506 UART: [ldev] CDI.KEYID = 6
7,655,479 UART: [ldev] SUBJECT.KEYID = 5
7,656,684 UART: [ldev] AUTHORITY.KEYID = 7
7,657,959 UART: [ldev] FE.KEYID = 1
7,667,169 UART: [ldev] Erasing FE.KEYID = 1
10,955,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,873 UART: [ldev] --
13,316,961 UART: [fwproc] Waiting for Commands...
13,319,758 UART: [fwproc] Received command 0x46574c44
13,321,938 UART: [fwproc] Received Image of size 114124 bytes
17,367,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,346 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,828,361 >>> mbox cmd response: success
17,828,973 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,832,321 UART: [afmc] ++
17,832,900 UART: [afmc] CDI.KEYID = 6
17,833,864 UART: [afmc] SUBJECT.KEYID = 7
17,835,071 UART: [afmc] AUTHORITY.KEYID = 5
21,150,454 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,121 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,429 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,794 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,624 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,042 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,130 UART: [afmc] --
23,516,527 UART: [cold-reset] --
23,520,821 UART: [state] Locking Datavault
23,525,783 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,546 UART: [state] Locking ICCM
23,528,775 UART: [exit] Launching FMC @ 0x40000130
23,537,165 UART:
23,537,394 UART: Running Caliptra FMC ...
23,538,489 UART:
23,538,639 UART: [state] CFI Enabled
23,546,644 UART: [fht] FMC Alias Private Key: 7
25,877,790 UART: [art] Extend RT PCRs Done
25,879,010 UART: [art] Lock RT PCRs Done
25,880,413 UART: [art] Populate DV Done
25,885,825 UART: [fht] FMC Alias Private Key: 7
25,887,465 UART: [art] Derive CDI
25,888,271 UART: [art] Store in in slot 0x4
25,930,845 UART: [art] Derive Key Pair
25,931,871 UART: [art] Store priv key in slot 0x5
29,174,528 UART: [art] Derive Key Pair - Done
29,187,803 UART: [art] Signing Cert with AUTHO
29,189,111 UART: RITY.KEYID = 7
31,468,308 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,817 UART: [art] PUB.X = DCB97CCB119658EC2E8FE2EDD5A8D142DE711EC4978CEB7A243E858F168842A17E921750A78B645F1432DC3BEDA75465
31,477,056 UART: [art] PUB.Y = 5F5CF310147B67C6ACCA02F32C54083807DD31FA3BBF104A04FCBF3CDE805B69BDAA3AEE05947270351AB961695E5E5F
31,484,329 UART: [art] SIG.R = 011C06F042D337EE84CBA479153D3E1AC076D75CBA7FCBC6B8FE958FE978FC869DD653336E909B320EFF4D312505E142
31,491,722 UART: [art] SIG.S = E35E9E0816D7D5A063110B4F307DFE240E9C3D729E4CB5048BE53922C593EF89D83E716E7B3D4975DF01BC0C040026BA
32,796,588 UART: Caliptra RT
32,797,300 UART: [state] CFI Enabled
32,915,198 UART: [rt] RT listening for mailbox commands...
32,947,429 UART: [rt]cmd =0x44504543, len=136
38,505,979 >>> mbox cmd response data (136 bytes)
38,507,380 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,537,229 UART: [rt]cmd =0x4453424c, len=4
41,779,588 >>> mbox cmd response data (8 bytes)
41,780,128 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,810,605 UART: [rt]cmd =0x44504543, len=92
47,484,742 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
4,126,756 ready_for_fw is high
4,127,265 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,371 >>> mbox cmd response: success
18,067,083 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,710,423 UART:
23,710,806 UART: Running Caliptra FMC ...
23,711,998 UART:
23,712,163 UART: [state] CFI Enabled
23,720,003 UART: [fht] FMC Alias Private Key: 7
26,051,070 UART: [art] Extend RT PCRs Done
26,052,298 UART: [art] Lock RT PCRs Done
26,053,652 UART: [art] Populate DV Done
26,059,076 UART: [fht] FMC Alias Private Key: 7
26,060,692 UART: [art] Derive CDI
26,061,650 UART: [art] Store in in slot 0x4
26,104,485 UART: [art] Derive Key Pair
26,105,489 UART: [art] Store priv key in slot 0x5
29,347,425 UART: [art] Derive Key Pair - Done
29,360,479 UART: [art] Signing Cert with AUTHO
29,361,779 UART: RITY.KEYID = 7
31,640,782 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,286 UART: [art] PUB.X = 347C4F21A3FB3BD1FDB68204A28C37E87D154B62FCD10FE85B9A54C1D602FFBCCE9F6A7990957494BE6198C0A13748AB
31,649,528 UART: [art] PUB.Y = 2E4EB300365CEA3852BF8894A669CF0AC467AD6F4882C607073459F1FBC27642C32CCB014C0251381F03CF9843448EC2
31,656,766 UART: [art] SIG.R = 3FE04933A5843DECF1BB003A3A2B82E7C3A71E58FAF92C3D8E7AC6929BBBAFE85F52A8F5443F2E874DC3172FA730B0BA
31,664,240 UART: [art] SIG.S = F796944D41AFA9A84225FC88B0CEB9DA8D34F8B34A732325513B7956C29CBED20CA3CA69159C76374238C6A6B3332FEC
32,969,323 UART: Caliptra RT
32,970,028 UART: [state] CFI Enabled
33,087,899 UART: [rt] RT listening for mailbox commands...
33,120,217 UART: [rt]cmd =0x44504543, len=136
38,679,221 >>> mbox cmd response data (136 bytes)
38,680,492 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,710,613 UART: [rt]cmd =0x4453424c, len=4
41,954,313 >>> mbox cmd response data (8 bytes)
41,954,831 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,985,373 UART: [rt]cmd =0x44504543, len=92
47,660,552 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,092 UART:
192,465 UART: Running Caliptra ROM ...
193,598 UART:
193,747 UART: [state] CFI Enabled
264,417 UART: [state] LifecycleState = Unprovisioned
266,323 UART: [state] DebugLocked = No
267,714 UART: [state] WD Timer not started. Device not locked for debugging
270,532 UART: [kat] SHA2-256
449,668 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,222 UART: [kat] ++
461,762 UART: [kat] sha1
471,948 UART: [kat] SHA2-256
475,033 UART: [kat] SHA2-384
481,164 UART: [kat] SHA2-512-ACC
484,094 UART: [kat] ECC-384
2,949,636 UART: [kat] HMAC-384Kdf
2,972,589 UART: [kat] LMS
3,501,989 UART: [kat] --
3,507,566 UART: [cold-reset] ++
3,508,993 UART: [fht] FHT @ 0x50003400
3,520,186 UART: [idev] ++
3,520,753 UART: [idev] CDI.KEYID = 6
3,521,704 UART: [idev] SUBJECT.KEYID = 7
3,522,875 UART: [idev] UDS.KEYID = 0
3,523,848 ready_for_fw is high
3,524,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,954 UART: [idev] Erasing UDS.KEYID = 0
6,025,428 UART: [idev] Sha1 KeyId Algorithm
6,049,273 UART: [idev] --
6,052,280 UART: [ldev] ++
6,052,859 UART: [ldev] CDI.KEYID = 6
6,053,780 UART: [ldev] SUBJECT.KEYID = 5
6,054,939 UART: [ldev] AUTHORITY.KEYID = 7
6,056,224 UART: [ldev] FE.KEYID = 1
6,101,605 UART: [ldev] Erasing FE.KEYID = 1
8,606,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,852 UART: [ldev] --
10,416,846 UART: [fwproc] Wait for Commands...
10,418,285 UART: [fwproc] Recv command 0x46574c44
10,420,375 UART: [fwproc] Recv'd Img size: 114448 bytes
13,828,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,144 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,940 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,288,528 >>> mbox cmd response: success
14,289,168 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,292,030 UART: [afmc] ++
14,292,677 UART: [afmc] CDI.KEYID = 6
14,293,571 UART: [afmc] SUBJECT.KEYID = 7
14,294,679 UART: [afmc] AUTHORITY.KEYID = 5
16,832,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,512 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,299 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,341 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,848 UART: [afmc] --
18,629,762 UART: [cold-reset] --
18,633,029 UART: [state] Locking Datavault
18,638,984 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,627 UART: [state] Locking ICCM
18,642,132 UART: [exit] Launching FMC @ 0x40000130
18,650,524 UART:
18,650,779 UART: Running Caliptra FMC ...
18,651,885 UART:
18,652,053 UART: [state] CFI Enabled
18,713,125 UART: [fht] FMC Alias Private Key: 7
20,476,791 UART: [art] Extend RT PCRs Done
20,478,007 UART: [art] Lock RT PCRs Done
20,479,579 UART: [art] Populate DV Done
20,485,099 UART: [fht] FMC Alias Private Key: 7
20,486,695 UART: [art] Derive CDI
20,487,512 UART: [art] Store in in slot 0x4
20,545,610 UART: [art] Derive Key Pair
20,546,645 UART: [art] Store priv key in slot 0x5
23,009,170 UART: [art] Derive Key Pair - Done
23,021,992 UART: [art] Signing Cert with AUTHO
23,023,302 UART: RITY.KEYID = 7
24,735,681 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,206 UART: [art] PUB.X = 3CD65983B543076CE9F46846651AEA0D90E94B83DFDADF135CD87628F5FAB521F402A6510E8CA71AA44ED59E125A285C
24,744,465 UART: [art] PUB.Y = B4BF2CA2DE14B08C60C9E721A1E1332650CABB28820C5016A8AC968FBFA6B52AF9005C57D535E42880C6567ABF993265
24,751,751 UART: [art] SIG.R = 995D0748106A0F2CAB1FFF625B5BD941851ED5D907784F62316DB5ECF00A3EA6D386CF8E128500DB8E89B34BA4BA2CF7
24,759,099 UART: [art] SIG.S = 2FA334AA0A65CC91B6305EC50A0B5B853C0B928A4D1904FFEB65588C3B68B2A5A827067364C3A1759B75FEE26C85DE1D
25,737,749 UART: Caliptra RT
25,738,463 UART: [state] CFI Enabled
25,903,929 UART: [rt] RT listening for mailbox commands...
25,936,583 UART: [rt]cmd =0x44504543, len=136
30,153,751 >>> mbox cmd response data (136 bytes)
30,155,157 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,184,961 UART: [rt]cmd =0x4453424c, len=4
32,651,437 >>> mbox cmd response data (8 bytes)
32,651,973 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,682,406 UART: [rt]cmd =0x44504543, len=92
37,036,285 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,362,191 ready_for_fw is high
3,362,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,025,048 >>> mbox cmd response: success
14,025,953 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,321,257 UART:
18,321,661 UART: Running Caliptra FMC ...
18,322,862 UART:
18,323,032 UART: [state] CFI Enabled
18,389,852 UART: [fht] FMC Alias Private Key: 7
20,154,094 UART: [art] Extend RT PCRs Done
20,155,301 UART: [art] Lock RT PCRs Done
20,156,768 UART: [art] Populate DV Done
20,162,175 UART: [fht] FMC Alias Private Key: 7
20,163,715 UART: [art] Derive CDI
20,164,529 UART: [art] Store in in slot 0x4
20,222,997 UART: [art] Derive Key Pair
20,223,990 UART: [art] Store priv key in slot 0x5
22,687,416 UART: [art] Derive Key Pair - Done
22,700,041 UART: [art] Signing Cert with AUTHO
22,701,342 UART: RITY.KEYID = 7
24,412,873 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,356 UART: [art] PUB.X = 13E64375A6BB5C97C73F95A75C45B82E4F6A4ED612BDE6780F829F9466A9285B25BACAF54CAE77BF447EA9AFE85C185D
24,421,695 UART: [art] PUB.Y = A79FD344116D2FA1548B81AEF57DF1CDE70BB88481E11C7D01991C897E72F986111008C79F8BC3AE2426609F7456278A
24,428,959 UART: [art] SIG.R = 4A0B09A2E04EBEE487FC64FFE8662A8C350F601F9C2A3E5CD94737F6505B8B266C7186602272217EA9FEC500E59F6981
24,436,294 UART: [art] SIG.S = A57E7C45EF643004524598B54513EF75E8D0C14F3A61C58F06F0297C96DCA32AAEF6A9188E819E3164127AA37B41D13E
25,414,701 UART: Caliptra RT
25,415,414 UART: [state] CFI Enabled
25,581,812 UART: [rt] RT listening for mailbox commands...
25,613,920 UART: [rt]cmd =0x44504543, len=136
29,833,080 >>> mbox cmd response data (136 bytes)
29,834,352 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
29,864,384 UART: [rt]cmd =0x4453424c, len=4
32,332,120 >>> mbox cmd response data (8 bytes)
32,332,647 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,363,240 UART: [rt]cmd =0x44504543, len=92
36,718,649 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,528 UART:
192,905 UART: Running Caliptra ROM ...
194,045 UART:
603,420 UART: [state] CFI Enabled
615,021 UART: [state] LifecycleState = Unprovisioned
616,904 UART: [state] DebugLocked = No
618,999 UART: [state] WD Timer not started. Device not locked for debugging
623,378 UART: [kat] SHA2-256
802,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,081 UART: [kat] ++
814,526 UART: [kat] sha1
825,881 UART: [kat] SHA2-256
828,877 UART: [kat] SHA2-384
835,446 UART: [kat] SHA2-512-ACC
838,376 UART: [kat] ECC-384
3,279,282 UART: [kat] HMAC-384Kdf
3,292,376 UART: [kat] LMS
3,821,829 UART: [kat] --
3,825,128 UART: [cold-reset] ++
3,826,475 UART: [fht] FHT @ 0x50003400
3,836,980 UART: [idev] ++
3,837,527 UART: [idev] CDI.KEYID = 6
3,838,401 UART: [idev] SUBJECT.KEYID = 7
3,839,629 UART: [idev] UDS.KEYID = 0
3,840,594 ready_for_fw is high
3,840,792 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,614 UART: [idev] Erasing UDS.KEYID = 0
6,316,895 UART: [idev] Sha1 KeyId Algorithm
6,339,956 UART: [idev] --
6,344,667 UART: [ldev] ++
6,345,233 UART: [ldev] CDI.KEYID = 6
6,346,131 UART: [ldev] SUBJECT.KEYID = 5
6,347,338 UART: [ldev] AUTHORITY.KEYID = 7
6,348,556 UART: [ldev] FE.KEYID = 1
6,358,381 UART: [ldev] Erasing FE.KEYID = 1
8,831,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,885 UART: [ldev] --
10,621,081 UART: [fwproc] Wait for Commands...
10,624,253 UART: [fwproc] Recv command 0x46574c44
10,626,337 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,328 >>> mbox cmd response: success
14,483,916 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,486,808 UART: [afmc] ++
14,487,386 UART: [afmc] CDI.KEYID = 6
14,488,287 UART: [afmc] SUBJECT.KEYID = 7
14,489,497 UART: [afmc] AUTHORITY.KEYID = 5
16,984,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,582 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,208 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,780,233 UART: [afmc] --
18,783,954 UART: [cold-reset] --
18,788,048 UART: [state] Locking Datavault
18,792,591 UART: [state] Locking PCR0, PCR1 and PCR31
18,794,232 UART: [state] Locking ICCM
18,795,245 UART: [exit] Launching FMC @ 0x40000130
18,803,688 UART:
18,803,916 UART: Running Caliptra FMC ...
18,805,007 UART:
18,805,164 UART: [state] CFI Enabled
18,813,311 UART: [fht] FMC Alias Private Key: 7
20,570,746 UART: [art] Extend RT PCRs Done
20,571,954 UART: [art] Lock RT PCRs Done
20,573,541 UART: [art] Populate DV Done
20,579,105 UART: [fht] FMC Alias Private Key: 7
20,580,693 UART: [art] Derive CDI
20,581,504 UART: [art] Store in in slot 0x4
20,624,321 UART: [art] Derive Key Pair
20,625,376 UART: [art] Store priv key in slot 0x5
23,052,093 UART: [art] Derive Key Pair - Done
23,065,200 UART: [art] Signing Cert with AUTHO
23,066,500 UART: RITY.KEYID = 7
24,772,200 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,713 UART: [art] PUB.X = 3CB73A6409D918234F16F313F72A75B4F2B392E42D165B2C80692E0482E158ADDDF3D4B3667C4639CC8198BDB9EAA222
24,780,999 UART: [art] PUB.Y = 7F070CC4659B14D562B2DEAE810624BFE86FC3ED9F6BF344A13DFD6DB28B4DA55B9CE430F344D9B5292AF84522C1095A
24,788,273 UART: [art] SIG.R = B63AD4FDE6DDFB2E1ABEFD8B2B84F1DFE7C2A1828743062AF195E93B14ADDF63B053549D7F073CDE9CED676B6715DD26
24,795,659 UART: [art] SIG.S = BFD55C065BDE52EB98CB1F381185AC8BBBC4C7F6A2F1ED0BFF4EBF26B22C8EA2052D4AEA7354846946032E093CBDD50A
25,774,284 UART: Caliptra RT
25,774,999 UART: [state] CFI Enabled
25,891,202 UART: [rt] RT listening for mailbox commands...
25,923,265 UART: [rt]cmd =0x44504543, len=136
30,093,559 >>> mbox cmd response data (136 bytes)
30,094,895 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,124,614 UART: [rt]cmd =0x4453424c, len=4
32,552,879 >>> mbox cmd response data (8 bytes)
32,553,419 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,584,004 UART: [rt]cmd =0x44504543, len=92
36,868,236 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,696,379 ready_for_fw is high
3,696,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,285 >>> mbox cmd response: success
14,280,019 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,531,940 UART:
18,532,322 UART: Running Caliptra FMC ...
18,533,415 UART:
18,533,559 UART: [state] CFI Enabled
18,541,507 UART: [fht] FMC Alias Private Key: 7
20,298,626 UART: [art] Extend RT PCRs Done
20,299,853 UART: [art] Lock RT PCRs Done
20,301,665 UART: [art] Populate DV Done
20,306,965 UART: [fht] FMC Alias Private Key: 7
20,308,502 UART: [art] Derive CDI
20,309,233 UART: [art] Store in in slot 0x4
20,351,597 UART: [art] Derive Key Pair
20,352,591 UART: [art] Store priv key in slot 0x5
22,779,366 UART: [art] Derive Key Pair - Done
22,791,982 UART: [art] Signing Cert with AUTHO
22,793,288 UART: RITY.KEYID = 7
24,498,958 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,456 UART: [art] PUB.X = 7CB3C6B389D193B159689DF4263047DF0118269327721154D03E1AB3383A6A3CD2E13BE8CF52AE50D36A32DAD98CFCE2
24,507,696 UART: [art] PUB.Y = 7B419FA62A44C7421837A1EBE7B709E6B3DE4713DD68256FFD8D20619DF7E7DEF8C7739AE0742B533D746F229FA048C6
24,515,016 UART: [art] SIG.R = 9ACC375E4B3FABF9CC48687C0B124A39FAA1DC2DC6222122E86933DED9E0E1196F378E357B313225FADAD59C3B7C1961
24,522,409 UART: [art] SIG.S = 53ECCC2457566F0F02823468AF183BA3B5ED98D22CA2D04F21281AF4813A5C5D021FDF55C7E213C8572F9CB850A6F102
25,500,530 UART: Caliptra RT
25,501,227 UART: [state] CFI Enabled
25,619,199 UART: [rt] RT listening for mailbox commands...
25,651,680 UART: [rt]cmd =0x44504543, len=136
29,821,877 >>> mbox cmd response data (136 bytes)
29,823,137 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
29,852,855 UART: [rt]cmd =0x4453424c, len=4
32,280,810 >>> mbox cmd response data (8 bytes)
32,281,302 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,311,631 UART: [rt]cmd =0x44504543, len=92
36,596,074 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,441,634 ready_for_fw is high
3,442,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,608 >>> mbox cmd response: success
14,741,353 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,030,344 UART:
19,030,741 UART: Running Caliptra FMC ...
19,031,948 UART:
19,032,119 UART: [state] CFI Enabled
19,096,363 UART: [fht] FMC Alias Private Key: 7
20,860,709 UART: [art] Extend RT PCRs Done
20,861,933 UART: [art] Lock RT PCRs Done
20,863,566 UART: [art] Populate DV Done
20,869,197 UART: [fht] FMC Alias Private Key: 7
20,870,739 UART: [art] Derive CDI
20,871,574 UART: [art] Store in in slot 0x4
20,929,056 UART: [art] Derive Key Pair
20,930,098 UART: [art] Store priv key in slot 0x5
23,392,883 UART: [art] Derive Key Pair - Done
23,405,781 UART: [art] Signing Cert with AUTHO
23,407,078 UART: RITY.KEYID = 7
25,118,882 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,390 UART: [art] PUB.X = C2702431CFC8EEC1D5568FF62FEBAE742A3132E02D8AECFFBDC725477CF1B5DEA2E7EFBACE5F9CF2886AC522EEA75F7B
25,127,717 UART: [art] PUB.Y = 81B401AEDDECF38AAF26396037B57E85C0CA29CF36899FF81FAFE4D4F83B96DD9128F65CE806457A4425A114774687FB
25,134,979 UART: [art] SIG.R = 91F9CCFB89884353DA64A89B97314E93F1D1BA70216E6B59189F99CE95B9AF968295173A3685CD1233864F1B4F9E7D97
25,142,314 UART: [art] SIG.S = 6A17B7F6C1EAF29688E31F54E91AE426C4F2BAFE02B25F5F0F89B6134CDBA4C8CD02BB0E1671BD6530E2748B88EB3FC6
26,121,138 UART: Caliptra RT
26,121,828 UART: [state] CFI Enabled
26,287,332 UART: [rt] RT listening for mailbox commands...
26,319,451 UART: [rt]cmd =0x44504543, len=136
30,537,138 >>> mbox cmd response data (136 bytes)
30,538,441 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,568,353 UART: [rt]cmd =0x4453424c, len=4
33,034,972 >>> mbox cmd response data (8 bytes)
33,035,484 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,065,961 UART: [rt]cmd =0x44504543, len=92
37,421,108 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,759,871 ready_for_fw is high
3,760,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,964,551 >>> mbox cmd response: success
14,965,255 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,215,320 UART:
19,215,701 UART: Running Caliptra FMC ...
19,216,832 UART:
19,216,987 UART: [state] CFI Enabled
19,224,892 UART: [fht] FMC Alias Private Key: 7
20,981,673 UART: [art] Extend RT PCRs Done
20,982,893 UART: [art] Lock RT PCRs Done
20,984,406 UART: [art] Populate DV Done
20,989,866 UART: [fht] FMC Alias Private Key: 7
20,991,306 UART: [art] Derive CDI
20,992,034 UART: [art] Store in in slot 0x4
21,034,728 UART: [art] Derive Key Pair
21,035,724 UART: [art] Store priv key in slot 0x5
23,463,118 UART: [art] Derive Key Pair - Done
23,476,010 UART: [art] Signing Cert with AUTHO
23,477,331 UART: RITY.KEYID = 7
25,182,528 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,040 UART: [art] PUB.X = CB4FDB220B03AC027C2BFC1444679523A68849AE3456D080BECE7B373B0ECD7508729AD0F95563CC3D0DC4A41FE24DE5
25,191,336 UART: [art] PUB.Y = C6B63BEE44980A4BD0843AA8E9B178601381B3646FBBE2E72DFC17A854CAB082866251EB106807792BED8C89778559E7
25,198,592 UART: [art] SIG.R = 8AB33B429D9B5CD9CCD8BAD8B666A1317F9581476FA6A09E51AF5287004BBB6316A0593129B2B5C0D1D0D5D64E23D513
25,205,986 UART: [art] SIG.S = 5674EFBF02EB0DA1914F8E6FCDC62E5EF21D5379A50AE7637E90FA4837E465E55DC1E3F9DF074C2A649B0E39434307AC
26,185,273 UART: Caliptra RT
26,185,958 UART: [state] CFI Enabled
26,302,900 UART: [rt] RT listening for mailbox commands...
26,335,058 UART: [rt]cmd =0x44504543, len=136
30,505,726 >>> mbox cmd response data (136 bytes)
30,507,017 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,536,845 UART: [rt]cmd =0x4453424c, len=4
32,964,512 >>> mbox cmd response data (8 bytes)
32,965,025 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,995,452 UART: [rt]cmd =0x44504543, len=92
37,280,118 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,909 UART: [kat] SHA2-256
881,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,955 UART: [kat] ++
886,107 UART: [kat] sha1
890,391 UART: [kat] SHA2-256
892,329 UART: [kat] SHA2-384
895,144 UART: [kat] SHA2-512-ACC
897,045 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
907,096 UART: [kat] LMS
1,475,292 UART: [kat] --
1,476,457 UART: [cold-reset] ++
1,476,889 UART: [fht] Storing FHT @ 0x50003400
1,479,758 UART: [idev] ++
1,479,926 UART: [idev] CDI.KEYID = 6
1,480,286 UART: [idev] SUBJECT.KEYID = 7
1,480,710 UART: [idev] UDS.KEYID = 0
1,481,055 ready_for_fw is high
1,481,055 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,740 UART: [idev] Erasing UDS.KEYID = 0
1,505,358 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,892 UART: [idev] --
1,515,087 UART: [ldev] ++
1,515,255 UART: [ldev] CDI.KEYID = 6
1,515,618 UART: [ldev] SUBJECT.KEYID = 5
1,516,044 UART: [ldev] AUTHORITY.KEYID = 7
1,516,507 UART: [ldev] FE.KEYID = 1
1,521,831 UART: [ldev] Erasing FE.KEYID = 1
1,547,016 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,946 UART: [ldev] --
1,586,347 UART: [fwproc] Waiting for Commands...
1,586,992 UART: [fwproc] Received command 0x46574c44
1,587,783 UART: [fwproc] Received Image of size 114448 bytes
2,886,484 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,366 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,718 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,779 >>> mbox cmd response: success
3,079,779 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,080,965 UART: [afmc] ++
3,081,133 UART: [afmc] CDI.KEYID = 6
3,081,495 UART: [afmc] SUBJECT.KEYID = 7
3,081,920 UART: [afmc] AUTHORITY.KEYID = 5
3,116,871 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,203 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,596 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,286 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,277 UART: [afmc] --
3,160,225 UART: [cold-reset] --
3,160,997 UART: [state] Locking Datavault
3,162,040 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,644 UART: [state] Locking ICCM
3,163,136 UART: [exit] Launching FMC @ 0x40000130
3,168,465 UART:
3,168,481 UART: Running Caliptra FMC ...
3,168,889 UART:
3,168,943 UART: [state] CFI Enabled
3,179,470 UART: [fht] FMC Alias Private Key: 7
3,287,325 UART: [art] Extend RT PCRs Done
3,287,753 UART: [art] Lock RT PCRs Done
3,289,253 UART: [art] Populate DV Done
3,297,474 UART: [fht] FMC Alias Private Key: 7
3,298,586 UART: [art] Derive CDI
3,298,866 UART: [art] Store in in slot 0x4
3,384,173 UART: [art] Derive Key Pair
3,384,533 UART: [art] Store priv key in slot 0x5
3,397,679 UART: [art] Derive Key Pair - Done
3,412,225 UART: [art] Signing Cert with AUTHO
3,412,705 UART: RITY.KEYID = 7
3,427,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,626 UART: [art] PUB.X = 15A33915B38C3E7B81B7EA10D31EDEA564FFE19CF98B310A7BDC7A42D3A6F90FAE4DE38654B70E00B30799C52422BAEB
3,435,380 UART: [art] PUB.Y = CD4EB23292F13D6C8C8E5AA959839E6CDBE1F8170D5EF1351E7C9DD3D1469BADC6A2B0407616D10FB2F8C839D957A62B
3,442,340 UART: [art] SIG.R = CE7127200FB6A712A54D3130C9D4AC4D22B4FAFBF004022A910A7B288AE983E859F11E76D9BC7F209006C1C850437903
3,449,094 UART: [art] SIG.S = F19A0583ED683BBCFC8A641D06EF96E6114D7C60759AEF36871321D0B96B693C5A72C0F292B6F3B287A390BC30E8D376
3,472,565 UART: Caliptra RT
3,472,818 UART: [state] CFI Enabled
3,581,678 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,772 UART: [rt]cmd =0x44504543, len=136
3,675,909 >>> mbox cmd response data (136 bytes)
3,675,910 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,135 UART: [rt]cmd =0x4453424c, len=4
3,719,115 >>> mbox cmd response data (8 bytes)
3,719,116 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,321 UART: [rt]cmd =0x44504543, len=92
3,931,655 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,911 ready_for_fw is high
1,361,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,517 >>> mbox cmd response: success
2,929,517 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,990,371 UART:
2,990,387 UART: Running Caliptra FMC ...
2,990,795 UART:
2,990,849 UART: [state] CFI Enabled
3,001,500 UART: [fht] FMC Alias Private Key: 7
3,109,535 UART: [art] Extend RT PCRs Done
3,109,963 UART: [art] Lock RT PCRs Done
3,111,593 UART: [art] Populate DV Done
3,119,690 UART: [fht] FMC Alias Private Key: 7
3,120,764 UART: [art] Derive CDI
3,121,044 UART: [art] Store in in slot 0x4
3,206,511 UART: [art] Derive Key Pair
3,206,871 UART: [art] Store priv key in slot 0x5
3,219,355 UART: [art] Derive Key Pair - Done
3,234,389 UART: [art] Signing Cert with AUTHO
3,234,869 UART: RITY.KEYID = 7
3,249,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,700 UART: [art] PUB.X = 0C03D3CA6D89EDB677BBC6B12C0D5A71F5FC2923954AAC10B47CD65A3A377FE1EDA2887F72ABC21AC187EBBEB83C01CE
3,257,486 UART: [art] PUB.Y = EC282BE4DA55CDF0617A0B40A6B541290BE6BB8DBF673E2CDF416D720A8A8846152F53D0F8C6B7691F545754A3BEFFB8
3,264,443 UART: [art] SIG.R = E5ED1B19ED1479AF91BE03FEB63409C80C13F751784C25A6BBE48D8B3259AED1957D81B6812B44DBFD56D98C96C0ACB7
3,271,220 UART: [art] SIG.S = F8253ED8F96BE1044F5C26FE1ABCD632F3629EA79A339FBDB0673A907FAD4250AC447D58DD990A931E1D311777D1E5BD
3,294,951 UART: Caliptra RT
3,295,204 UART: [state] CFI Enabled
3,403,256 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,778 UART: [rt]cmd =0x44504543, len=136
3,496,953 >>> mbox cmd response data (136 bytes)
3,496,954 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,217 UART: [rt]cmd =0x4453424c, len=4
3,540,711 >>> mbox cmd response data (8 bytes)
3,540,712 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,789 UART: [rt]cmd =0x44504543, len=92
3,754,760 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,410 UART: [kat] SHA2-256
882,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,456 UART: [kat] ++
886,608 UART: [kat] sha1
890,894 UART: [kat] SHA2-256
892,832 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
903,079 UART: [kat] HMAC-384Kdf
907,643 UART: [kat] LMS
1,475,839 UART: [kat] --
1,476,834 UART: [cold-reset] ++
1,477,364 UART: [fht] Storing FHT @ 0x50003400
1,479,935 UART: [idev] ++
1,480,103 UART: [idev] CDI.KEYID = 6
1,480,463 UART: [idev] SUBJECT.KEYID = 7
1,480,887 UART: [idev] UDS.KEYID = 0
1,481,232 ready_for_fw is high
1,481,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,793 UART: [idev] Erasing UDS.KEYID = 0
1,505,307 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,893 UART: [idev] --
1,514,946 UART: [ldev] ++
1,515,114 UART: [ldev] CDI.KEYID = 6
1,515,477 UART: [ldev] SUBJECT.KEYID = 5
1,515,903 UART: [ldev] AUTHORITY.KEYID = 7
1,516,366 UART: [ldev] FE.KEYID = 1
1,521,656 UART: [ldev] Erasing FE.KEYID = 1
1,547,255 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,327 UART: [ldev] --
1,586,696 UART: [fwproc] Waiting for Commands...
1,587,477 UART: [fwproc] Received command 0x46574c44
1,588,268 UART: [fwproc] Received Image of size 114448 bytes
2,886,945 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,517 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,869 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,022 >>> mbox cmd response: success
3,080,022 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,081,046 UART: [afmc] ++
3,081,214 UART: [afmc] CDI.KEYID = 6
3,081,576 UART: [afmc] SUBJECT.KEYID = 7
3,082,001 UART: [afmc] AUTHORITY.KEYID = 5
3,116,896 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,400 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,180 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,908 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,793 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,483 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,470 UART: [afmc] --
3,160,568 UART: [cold-reset] --
3,161,338 UART: [state] Locking Datavault
3,162,605 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,209 UART: [state] Locking ICCM
3,163,745 UART: [exit] Launching FMC @ 0x40000130
3,169,074 UART:
3,169,090 UART: Running Caliptra FMC ...
3,169,498 UART:
3,169,641 UART: [state] CFI Enabled
3,180,414 UART: [fht] FMC Alias Private Key: 7
3,288,181 UART: [art] Extend RT PCRs Done
3,288,609 UART: [art] Lock RT PCRs Done
3,290,235 UART: [art] Populate DV Done
3,298,398 UART: [fht] FMC Alias Private Key: 7
3,299,464 UART: [art] Derive CDI
3,299,744 UART: [art] Store in in slot 0x4
3,385,485 UART: [art] Derive Key Pair
3,385,845 UART: [art] Store priv key in slot 0x5
3,398,977 UART: [art] Derive Key Pair - Done
3,413,725 UART: [art] Signing Cert with AUTHO
3,414,205 UART: RITY.KEYID = 7
3,429,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,348 UART: [art] PUB.X = 7EE4AE039525E2CEFC27F10D5D37FA9677064F638ED7A0D56ABFEB0A11902A8D0CC3E2C9EBF75ADF258AC937AEBA3C40
3,437,129 UART: [art] PUB.Y = B099653A26E9E000A029916F67E2D4F005A1CC7E21BAC6D325266495C2736F7602B65ED9D5791C95C4247679A33CC453
3,444,045 UART: [art] SIG.R = DD721C4B952AED181401A24F2C49A2F7ACFB5D621AA400F94B2431E0EBD4A366C50A3B13F4B53E3D1B9563F970F76574
3,450,797 UART: [art] SIG.S = E93F2CAF1545FED1DB46CB3410356724975EB18070260262A9A8F22D9B5DEC7B884A1CF021224DDD5E1A0830721964CB
3,474,672 UART: Caliptra RT
3,475,017 UART: [state] CFI Enabled
3,582,641 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,151 UART: [rt]cmd =0x44504543, len=136
3,678,876 >>> mbox cmd response data (136 bytes)
3,678,877 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,318 UART: [rt]cmd =0x4453424c, len=4
3,722,400 >>> mbox cmd response data (8 bytes)
3,722,401 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,464 UART: [rt]cmd =0x44504543, len=92
3,936,267 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,540 ready_for_fw is high
1,362,540 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,520 >>> mbox cmd response: success
2,929,520 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,991,038 UART:
2,991,054 UART: Running Caliptra FMC ...
2,991,462 UART:
2,991,605 UART: [state] CFI Enabled
3,002,426 UART: [fht] FMC Alias Private Key: 7
3,110,143 UART: [art] Extend RT PCRs Done
3,110,571 UART: [art] Lock RT PCRs Done
3,111,967 UART: [art] Populate DV Done
3,120,138 UART: [fht] FMC Alias Private Key: 7
3,121,180 UART: [art] Derive CDI
3,121,460 UART: [art] Store in in slot 0x4
3,207,255 UART: [art] Derive Key Pair
3,207,615 UART: [art] Store priv key in slot 0x5
3,221,509 UART: [art] Derive Key Pair - Done
3,236,331 UART: [art] Signing Cert with AUTHO
3,236,811 UART: RITY.KEYID = 7
3,252,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,992 UART: [art] PUB.X = EE5E366540C1676FBBBCCE27CBFC0D59D585C53600317202DC9DB16E18E191D56CE65259E676475FAD51DD258354A0C6
3,259,742 UART: [art] PUB.Y = A995A2B5CD504D11F72A2679845869E42A66904E631D62F392BA7CF7F5A650566F4D8389443C89134458644573EA5639
3,266,678 UART: [art] SIG.R = 2AE4E04E87D865694C07701CF8BCBB34525B9E3502FDB36A45ADB7F052A5F7715D17CFD67F7AD1E1175576E405D4A179
3,273,447 UART: [art] SIG.S = E642C169EDCE16208256FE190ABBE18878370E2D66C73675BE8CBB22D58DA42499698076AE8E5FC259C02ECAED1921DA
3,297,876 UART: Caliptra RT
3,298,221 UART: [state] CFI Enabled
3,406,558 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,030 UART: [rt]cmd =0x44504543, len=136
3,501,517 >>> mbox cmd response data (136 bytes)
3,501,518 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,973 UART: [rt]cmd =0x4453424c, len=4
3,544,785 >>> mbox cmd response data (8 bytes)
3,544,786 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,697 UART: [rt]cmd =0x44504543, len=92
3,758,375 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
892,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,057 UART: [kat] ++
897,209 UART: [kat] sha1
901,319 UART: [kat] SHA2-256
903,259 UART: [kat] SHA2-384
905,938 UART: [kat] SHA2-512-ACC
907,839 UART: [kat] ECC-384
917,350 UART: [kat] HMAC-384Kdf
921,960 UART: [kat] LMS
1,170,288 UART: [kat] --
1,171,057 UART: [cold-reset] ++
1,171,557 UART: [fht] FHT @ 0x50003400
1,174,288 UART: [idev] ++
1,174,456 UART: [idev] CDI.KEYID = 6
1,174,816 UART: [idev] SUBJECT.KEYID = 7
1,175,240 UART: [idev] UDS.KEYID = 0
1,175,585 ready_for_fw is high
1,175,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,850 UART: [idev] Erasing UDS.KEYID = 0
1,199,851 UART: [idev] Sha1 KeyId Algorithm
1,208,139 UART: [idev] --
1,209,065 UART: [ldev] ++
1,209,233 UART: [ldev] CDI.KEYID = 6
1,209,596 UART: [ldev] SUBJECT.KEYID = 5
1,210,022 UART: [ldev] AUTHORITY.KEYID = 7
1,210,485 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,043 UART: [ldev] --
1,281,318 UART: [fwproc] Wait for Commands...
1,282,016 UART: [fwproc] Recv command 0x46574c44
1,282,744 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,609 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,532 >>> mbox cmd response: success
2,774,532 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,638 UART: [afmc] ++
2,775,806 UART: [afmc] CDI.KEYID = 6
2,776,168 UART: [afmc] SUBJECT.KEYID = 7
2,776,593 UART: [afmc] AUTHORITY.KEYID = 5
2,812,496 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,879 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,607 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,492 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,211 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,041 UART: [afmc] --
2,856,041 UART: [cold-reset] --
2,857,119 UART: [state] Locking Datavault
2,858,186 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,790 UART: [state] Locking ICCM
2,859,432 UART: [exit] Launching FMC @ 0x40000130
2,864,761 UART:
2,864,777 UART: Running Caliptra FMC ...
2,865,185 UART:
2,865,239 UART: [state] CFI Enabled
2,875,702 UART: [fht] FMC Alias Private Key: 7
2,983,493 UART: [art] Extend RT PCRs Done
2,983,921 UART: [art] Lock RT PCRs Done
2,985,405 UART: [art] Populate DV Done
2,993,554 UART: [fht] FMC Alias Private Key: 7
2,994,562 UART: [art] Derive CDI
2,994,842 UART: [art] Store in in slot 0x4
3,080,759 UART: [art] Derive Key Pair
3,081,119 UART: [art] Store priv key in slot 0x5
3,094,287 UART: [art] Derive Key Pair - Done
3,109,069 UART: [art] Signing Cert with AUTHO
3,109,549 UART: RITY.KEYID = 7
3,124,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,322 UART: [art] PUB.X = C75BEE5E56409A593403E0CD93368D213347954E6DADA5387DEC202DD31D3A80111E729B094BED3413D90C39C73F8617
3,132,083 UART: [art] PUB.Y = 0E9D8D265AEF547ACFE9E7C1C15ADAB5091369A6E0245CA84E9F706CA2C6C2E9411D338CE6F3C5E3193CB0A73E386DC8
3,139,045 UART: [art] SIG.R = F0D93DDC6655E409338A05047BB9AB01B1CF6488AEF07C6446DC98BA16B8FF2801A8106981FBB229FF7AF11D44A25DC5
3,145,812 UART: [art] SIG.S = 8431CBBFDE39103DA897AF3D7EF2DA3AA0D27FBB08101D7BA2136913F2037A704CF5EBF4902598087FE37F41FE299C6A
3,169,422 UART: Caliptra RT
3,169,675 UART: [state] CFI Enabled
3,277,947 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,513 UART: [rt]cmd =0x44504543, len=136
3,372,874 >>> mbox cmd response data (136 bytes)
3,372,875 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,370 UART: [rt]cmd =0x4453424c, len=4
3,416,242 >>> mbox cmd response data (8 bytes)
3,416,243 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,892 UART: [rt]cmd =0x44504543, len=92
3,629,243 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 ready_for_fw is high
1,060,025 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,885 >>> mbox cmd response: success
2,628,885 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,691,013 UART:
2,691,029 UART: Running Caliptra FMC ...
2,691,437 UART:
2,691,491 UART: [state] CFI Enabled
2,702,052 UART: [fht] FMC Alias Private Key: 7
2,809,661 UART: [art] Extend RT PCRs Done
2,810,089 UART: [art] Lock RT PCRs Done
2,811,575 UART: [art] Populate DV Done
2,819,654 UART: [fht] FMC Alias Private Key: 7
2,820,798 UART: [art] Derive CDI
2,821,078 UART: [art] Store in in slot 0x4
2,906,389 UART: [art] Derive Key Pair
2,906,749 UART: [art] Store priv key in slot 0x5
2,919,831 UART: [art] Derive Key Pair - Done
2,934,745 UART: [art] Signing Cert with AUTHO
2,935,225 UART: RITY.KEYID = 7
2,950,181 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,946 UART: [art] PUB.X = 9B48194FD96028A976915CD753C9A795C0BE507A4E15CC1FAAF8DC4A3BE123B99E01ABD82A87125BDF77D1EB37766868
2,957,723 UART: [art] PUB.Y = C301A9952FA01A7307F5223585B8B9C2E9498A150A74154539298C2A5622A87115E4F3F46A8A23B306D7A0A24730FCE6
2,964,653 UART: [art] SIG.R = 755D8DC8E96145DC9A2C61E77DB3EA7AD0A6634674F51854F20032E7F00969D37CFF0DFE857F7D780A9C2AABD094840C
2,971,399 UART: [art] SIG.S = ECF0A027069905710C9BEDDB0177CE58C6203A4AD0B00BD9C6D32A055AD7464598713FD6B8C0C13F63C945765700984D
2,995,382 UART: Caliptra RT
2,995,635 UART: [state] CFI Enabled
3,102,952 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,054 UART: [rt]cmd =0x44504543, len=136
3,197,783 >>> mbox cmd response data (136 bytes)
3,197,784 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,311 UART: [rt]cmd =0x4453424c, len=4
3,241,137 >>> mbox cmd response data (8 bytes)
3,241,138 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,270,977 UART: [rt]cmd =0x44504543, len=92
3,453,832 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
902,022 UART: [kat] SHA2-256
903,962 UART: [kat] SHA2-384
906,657 UART: [kat] SHA2-512-ACC
908,558 UART: [kat] ECC-384
918,387 UART: [kat] HMAC-384Kdf
922,945 UART: [kat] LMS
1,171,273 UART: [kat] --
1,172,268 UART: [cold-reset] ++
1,172,808 UART: [fht] FHT @ 0x50003400
1,175,613 UART: [idev] ++
1,175,781 UART: [idev] CDI.KEYID = 6
1,176,141 UART: [idev] SUBJECT.KEYID = 7
1,176,565 UART: [idev] UDS.KEYID = 0
1,176,910 ready_for_fw is high
1,176,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,811 UART: [idev] Erasing UDS.KEYID = 0
1,201,698 UART: [idev] Sha1 KeyId Algorithm
1,210,208 UART: [idev] --
1,211,302 UART: [ldev] ++
1,211,470 UART: [ldev] CDI.KEYID = 6
1,211,833 UART: [ldev] SUBJECT.KEYID = 5
1,212,259 UART: [ldev] AUTHORITY.KEYID = 7
1,212,722 UART: [ldev] FE.KEYID = 1
1,217,804 UART: [ldev] Erasing FE.KEYID = 1
1,244,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,826 UART: [ldev] --
1,283,097 UART: [fwproc] Wait for Commands...
1,283,851 UART: [fwproc] Recv command 0x46574c44
1,284,579 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,642 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,629 >>> mbox cmd response: success
2,775,629 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,776,681 UART: [afmc] ++
2,776,849 UART: [afmc] CDI.KEYID = 6
2,777,211 UART: [afmc] SUBJECT.KEYID = 7
2,777,636 UART: [afmc] AUTHORITY.KEYID = 5
2,813,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,826 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,554 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,439 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,158 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,744 UART: [afmc] --
2,856,674 UART: [cold-reset] --
2,857,594 UART: [state] Locking Datavault
2,858,585 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,189 UART: [state] Locking ICCM
2,859,793 UART: [exit] Launching FMC @ 0x40000130
2,865,122 UART:
2,865,138 UART: Running Caliptra FMC ...
2,865,546 UART:
2,865,689 UART: [state] CFI Enabled
2,876,314 UART: [fht] FMC Alias Private Key: 7
2,984,163 UART: [art] Extend RT PCRs Done
2,984,591 UART: [art] Lock RT PCRs Done
2,985,969 UART: [art] Populate DV Done
2,993,974 UART: [fht] FMC Alias Private Key: 7
2,995,038 UART: [art] Derive CDI
2,995,318 UART: [art] Store in in slot 0x4
3,081,311 UART: [art] Derive Key Pair
3,081,671 UART: [art] Store priv key in slot 0x5
3,094,875 UART: [art] Derive Key Pair - Done
3,109,276 UART: [art] Signing Cert with AUTHO
3,109,756 UART: RITY.KEYID = 7
3,124,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,617 UART: [art] PUB.X = AA8DE18336D7CD3D56CC845624EC8AF476E079A5A0C4DB4F42CD94F8A0D38042B36AE990914EE0769E9D5B3F51F889B0
3,132,399 UART: [art] PUB.Y = 50EBD9FAF9D599614AFF286D3B5015C3BB0C5E4C382C543D4B31DCB2EB82EF750B5619BC57141DBDB22F56B950483D8D
3,139,359 UART: [art] SIG.R = 37D75B2B10B92E338BD5420C462CEBEA8D262ED9A89E3EB4599487EB978061699DD9D1DC12C582CA99B416D90D99BC5A
3,146,133 UART: [art] SIG.S = BAEF529F6FEA692ACFB704299AFFC02F27D5374181E4609B3955561F82A36FE5093BFF78F66B4D9A5F98079667913111
3,170,503 UART: Caliptra RT
3,170,848 UART: [state] CFI Enabled
3,278,849 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,017 UART: [rt]cmd =0x44504543, len=136
3,372,480 >>> mbox cmd response data (136 bytes)
3,372,481 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,886 UART: [rt]cmd =0x4453424c, len=4
3,415,598 >>> mbox cmd response data (8 bytes)
3,415,599 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,540 UART: [rt]cmd =0x44504543, len=92
3,629,935 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,632 ready_for_fw is high
1,060,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,402 >>> mbox cmd response: success
2,629,402 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,691,942 UART:
2,691,958 UART: Running Caliptra FMC ...
2,692,366 UART:
2,692,509 UART: [state] CFI Enabled
2,703,150 UART: [fht] FMC Alias Private Key: 7
2,811,097 UART: [art] Extend RT PCRs Done
2,811,525 UART: [art] Lock RT PCRs Done
2,813,165 UART: [art] Populate DV Done
2,821,410 UART: [fht] FMC Alias Private Key: 7
2,822,534 UART: [art] Derive CDI
2,822,814 UART: [art] Store in in slot 0x4
2,908,493 UART: [art] Derive Key Pair
2,908,853 UART: [art] Store priv key in slot 0x5
2,922,083 UART: [art] Derive Key Pair - Done
2,937,297 UART: [art] Signing Cert with AUTHO
2,937,777 UART: RITY.KEYID = 7
2,953,267 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,032 UART: [art] PUB.X = DAB32D3EB56637E0BAC841ABE9215E4B7FA8205A69A0F3C039E40165B2832D4B6D17CB4C3DB85E496D567292633BF90C
2,960,806 UART: [art] PUB.Y = 059B97373B48FE67AD4EFB8F086FC48AB5B370BE832DE76AC20AAAEC5FAA561481335E3D2D7337DFE376181814FD636C
2,967,761 UART: [art] SIG.R = 0E167B1C27AF0CD13E9FA2C1FC392F4FB5FF4B96A6FB9A1B9EB2ABB5AB5D4834FB04BB1353297AFDF200A622F26DD3EB
2,974,530 UART: [art] SIG.S = 56CAA31843EFB4AE69035B55DBEA5ABC85127260FA0DEE78097309ABD46A6335B42B4A4003FA8D373264F2C6ACC494E0
2,998,758 UART: Caliptra RT
2,999,103 UART: [state] CFI Enabled
3,106,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,970 UART: [rt]cmd =0x44504543, len=136
3,201,751 >>> mbox cmd response data (136 bytes)
3,201,752 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,907 UART: [rt]cmd =0x4453424c, len=4
3,244,321 >>> mbox cmd response data (8 bytes)
3,244,322 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,507 UART: [rt]cmd =0x44504543, len=92
3,458,351 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,602 UART: [kat] LMS
1,168,914 UART: [kat] --
1,169,615 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,811 UART: [idev] ++
1,172,979 UART: [idev] CDI.KEYID = 6
1,173,340 UART: [idev] SUBJECT.KEYID = 7
1,173,765 UART: [idev] UDS.KEYID = 0
1,174,111 ready_for_fw is high
1,174,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,719 UART: [idev] Erasing UDS.KEYID = 0
1,199,013 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,246 UART: [ldev] Erasing FE.KEYID = 1
1,241,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,732 UART: [ldev] --
1,281,122 UART: [fwproc] Wait for Commands...
1,281,941 UART: [fwproc] Recv command 0x46574c44
1,282,674 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,722 >>> mbox cmd response: success
2,773,722 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,751 UART: [afmc] ++
2,774,919 UART: [afmc] CDI.KEYID = 6
2,775,282 UART: [afmc] SUBJECT.KEYID = 7
2,775,708 UART: [afmc] AUTHORITY.KEYID = 5
2,811,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,710 UART: [afmc] --
2,854,602 UART: [cold-reset] --
2,855,532 UART: [state] Locking Datavault
2,856,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,139 UART: [state] Locking ICCM
2,857,785 UART: [exit] Launching FMC @ 0x40000130
2,863,114 UART:
2,863,130 UART: Running Caliptra FMC ...
2,863,538 UART:
2,863,592 UART: [state] CFI Enabled
2,874,023 UART: [fht] FMC Alias Private Key: 7
2,981,454 UART: [art] Extend RT PCRs Done
2,981,882 UART: [art] Lock RT PCRs Done
2,983,484 UART: [art] Populate DV Done
2,991,555 UART: [fht] FMC Alias Private Key: 7
2,992,673 UART: [art] Derive CDI
2,992,953 UART: [art] Store in in slot 0x4
3,078,472 UART: [art] Derive Key Pair
3,078,832 UART: [art] Store priv key in slot 0x5
3,092,024 UART: [art] Derive Key Pair - Done
3,107,075 UART: [art] Signing Cert with AUTHO
3,107,555 UART: RITY.KEYID = 7
3,122,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,832 UART: [art] PUB.X = 24B498176E85FBBA4979E6252032699A0A4F01DF787E47520E908131726047DAF974ABA8AE22CFF52E643FEC14ED807E
3,129,595 UART: [art] PUB.Y = 3628D3D22A364E06717315FA9C099FDAE29D28D0A48E31DD683B73BF49B592C8DFFA8E969A7CE15A637D2B315B147CFC
3,136,551 UART: [art] SIG.R = 376A10BA237900B71871F95C8A82446D957A75B94924FA1A8ECF9B6C5290472B3E13A0AA183668523907117D60468CD0
3,143,286 UART: [art] SIG.S = 0ACC515C9FE90ED6B18866B525C404A2B29FB60226D2F98C650CB4EECEE101E425BB0C03A2D68588F00F47CDF6E5A454
3,166,910 UART: Caliptra RT
3,167,163 UART: [state] CFI Enabled
3,274,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,200 UART: [rt]cmd =0x44504543, len=136
3,369,431 >>> mbox cmd response data (136 bytes)
3,369,432 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,763 UART: [rt]cmd =0x4453424c, len=4
3,412,847 >>> mbox cmd response data (8 bytes)
3,412,848 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,935 UART: [rt]cmd =0x44504543, len=92
3,626,640 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,106 ready_for_fw is high
1,057,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,440 >>> mbox cmd response: success
2,624,440 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,687,438 UART:
2,687,454 UART: Running Caliptra FMC ...
2,687,862 UART:
2,687,916 UART: [state] CFI Enabled
2,698,361 UART: [fht] FMC Alias Private Key: 7
2,806,352 UART: [art] Extend RT PCRs Done
2,806,780 UART: [art] Lock RT PCRs Done
2,808,318 UART: [art] Populate DV Done
2,816,617 UART: [fht] FMC Alias Private Key: 7
2,817,783 UART: [art] Derive CDI
2,818,063 UART: [art] Store in in slot 0x4
2,904,146 UART: [art] Derive Key Pair
2,904,506 UART: [art] Store priv key in slot 0x5
2,918,070 UART: [art] Derive Key Pair - Done
2,932,837 UART: [art] Signing Cert with AUTHO
2,933,317 UART: RITY.KEYID = 7
2,948,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,172 UART: [art] PUB.X = 46F3587EFAD435FC42FE9EA6C07C8C2F0B09207151DDDBA63C0D8611BF4EEE9F2C0E71E4DECC7D709345EE48A339B524
2,955,950 UART: [art] PUB.Y = 46E1F495591B7CF165C1D2BD035FA9E5AC1FAF6AD632C19006BCF6BE4014FE33C8DA91B5D0594D1C31782CAC3ACF3728
2,962,912 UART: [art] SIG.R = D3CC5C2DAA98417DCB530D0646199141870B89B88DEC413CB7FCC8EA598D8B19073F45BD31E9C510BE947C7EF2251F74
2,969,680 UART: [art] SIG.S = 4BC8F353DF26F836DCF5FD69E3D249FF3FC63E6CFDC4D48764363ED5AB22116FE41B608CB9D940E29817CC77869C7D8B
2,993,209 UART: Caliptra RT
2,993,462 UART: [state] CFI Enabled
3,100,981 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,305 UART: [rt]cmd =0x44504543, len=136
3,195,494 >>> mbox cmd response data (136 bytes)
3,195,495 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,106 UART: [rt]cmd =0x4453424c, len=4
3,239,144 >>> mbox cmd response data (8 bytes)
3,239,145 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,269,038 UART: [rt]cmd =0x44504543, len=92
3,452,391 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
916,159 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,174,306 ready_for_fw is high
1,174,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,796 UART: [idev] Erasing UDS.KEYID = 0
1,199,414 UART: [idev] Sha1 KeyId Algorithm
1,208,286 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,905 UART: [ldev] SUBJECT.KEYID = 5
1,210,332 UART: [ldev] AUTHORITY.KEYID = 7
1,210,795 UART: [ldev] FE.KEYID = 1
1,216,049 UART: [ldev] Erasing FE.KEYID = 1
1,242,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,479 UART: [ldev] --
1,281,823 UART: [fwproc] Wait for Commands...
1,282,542 UART: [fwproc] Recv command 0x46574c44
1,283,275 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,107 >>> mbox cmd response: success
2,773,107 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,318 UART: [afmc] ++
2,774,486 UART: [afmc] CDI.KEYID = 6
2,774,849 UART: [afmc] SUBJECT.KEYID = 7
2,775,275 UART: [afmc] AUTHORITY.KEYID = 5
2,810,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,531 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,260 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,143 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,862 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,611 UART: [afmc] --
2,853,581 UART: [cold-reset] --
2,854,541 UART: [state] Locking Datavault
2,855,586 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,190 UART: [state] Locking ICCM
2,856,660 UART: [exit] Launching FMC @ 0x40000130
2,861,989 UART:
2,862,005 UART: Running Caliptra FMC ...
2,862,413 UART:
2,862,556 UART: [state] CFI Enabled
2,873,345 UART: [fht] FMC Alias Private Key: 7
2,980,886 UART: [art] Extend RT PCRs Done
2,981,314 UART: [art] Lock RT PCRs Done
2,982,976 UART: [art] Populate DV Done
2,991,177 UART: [fht] FMC Alias Private Key: 7
2,992,249 UART: [art] Derive CDI
2,992,529 UART: [art] Store in in slot 0x4
3,078,184 UART: [art] Derive Key Pair
3,078,544 UART: [art] Store priv key in slot 0x5
3,092,380 UART: [art] Derive Key Pair - Done
3,107,373 UART: [art] Signing Cert with AUTHO
3,107,853 UART: RITY.KEYID = 7
3,122,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,688 UART: [art] PUB.X = 6D683341D53DB2B86EA1C3CDB6D7F2722907A0B1CD08B47D7803466A8B57668F3EDEF33C625CE0375F0381F362F42EA2
3,130,452 UART: [art] PUB.Y = B7BFA02087CCD0CC24703170072369DE005E64266E3D4115EDEB2D3A30FC4E8BB54D3FA6B9663D773A4FF951438C694F
3,137,385 UART: [art] SIG.R = C12DEF04C92A2C0F58125A950ACCD26ED02EAD0AC7FFB1059E5B3A52C3EACE8D0E46E88A540A6428A465E19E63A4A889
3,144,154 UART: [art] SIG.S = E1F01F8E58A976691C60CCAC62BD24EEC575AB2E0D46A21BE3C82AF66DD8C406B85547ADEBBBC709A50E30D138EBB5B5
3,167,945 UART: Caliptra RT
3,168,290 UART: [state] CFI Enabled
3,276,732 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,092 UART: [rt]cmd =0x44504543, len=136
3,372,409 >>> mbox cmd response data (136 bytes)
3,372,410 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,633 UART: [rt]cmd =0x4453424c, len=4
3,415,443 >>> mbox cmd response data (8 bytes)
3,415,444 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,571 UART: [rt]cmd =0x44504543, len=92
3,629,134 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,099 ready_for_fw is high
1,057,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,977 >>> mbox cmd response: success
2,625,977 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,689,407 UART:
2,689,423 UART: Running Caliptra FMC ...
2,689,831 UART:
2,689,974 UART: [state] CFI Enabled
2,700,321 UART: [fht] FMC Alias Private Key: 7
2,808,524 UART: [art] Extend RT PCRs Done
2,808,952 UART: [art] Lock RT PCRs Done
2,810,342 UART: [art] Populate DV Done
2,818,571 UART: [fht] FMC Alias Private Key: 7
2,819,597 UART: [art] Derive CDI
2,819,877 UART: [art] Store in in slot 0x4
2,905,808 UART: [art] Derive Key Pair
2,906,168 UART: [art] Store priv key in slot 0x5
2,919,436 UART: [art] Derive Key Pair - Done
2,934,313 UART: [art] Signing Cert with AUTHO
2,934,793 UART: RITY.KEYID = 7
2,950,371 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,136 UART: [art] PUB.X = 423FD35CFB783D5DA8EFF0565EF2D0087C448D11DDE0C3A67AFCE1B1B573D8717F3F309BBC444E4AACCB07F7E117E38D
2,957,924 UART: [art] PUB.Y = 5C0C07DB173A40D28D6BCC74DB2F3F0AA4C36F02CA7135CF2697F232A9C62AED85E2A8BEC0A47708F7EB0E717F77B6E2
2,964,876 UART: [art] SIG.R = 53D384EC9F20777E644D8F9B4B7CE6508A4FECF63DC9F79DAD84F76759D7702C7A9CFF0F7BC48DF0475814AE7E8CB7CF
2,971,663 UART: [art] SIG.S = 72B4EDB382AE420BBABBF383A2725C05C1613A18CCDA9B0254CA19C185FBA622B16066D3E25329CA462ADB0D26C9C770
2,995,074 UART: Caliptra RT
2,995,419 UART: [state] CFI Enabled
3,103,402 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,764 UART: [rt]cmd =0x44504543, len=136
3,198,677 >>> mbox cmd response data (136 bytes)
3,198,678 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,145 UART: [rt]cmd =0x4453424c, len=4
3,241,967 >>> mbox cmd response data (8 bytes)
3,241,968 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,271,817 UART: [rt]cmd =0x44504543, len=92
3,454,686 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
Truncated 38223 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.29s
Truncated 34849 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.29s
Truncated 38223 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.28s
Truncated 34849 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.29s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.86s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.84s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.86s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.85s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.88s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.88s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.44s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.54s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.47s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.44s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.37s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 5.44s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.44s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.46s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.58s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.39s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.51s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,053 UART:
192,433 UART: Running Caliptra ROM ...
193,573 UART:
193,719 UART: [state] CFI Enabled
264,498 UART: [state] LifecycleState = Unprovisioned
266,435 UART: [state] DebugLocked = No
268,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,721 UART: [kat] SHA2-256
443,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,914 UART: [kat] ++
454,394 UART: [kat] sha1
465,485 UART: [kat] SHA2-256
468,154 UART: [kat] SHA2-384
473,085 UART: [kat] SHA2-512-ACC
475,462 UART: [kat] ECC-384
2,766,786 UART: [kat] HMAC-384Kdf
2,799,713 UART: [kat] LMS
3,989,971 UART: [kat] --
3,993,137 UART: [cold-reset] ++
3,995,780 UART: [fht] Storing FHT @ 0x50003400
4,007,473 UART: [idev] ++
4,008,041 UART: [idev] CDI.KEYID = 6
4,008,932 UART: [idev] SUBJECT.KEYID = 7
4,010,248 UART: [idev] UDS.KEYID = 0
4,011,237 ready_for_fw is high
4,011,446 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,001 UART: [idev] Erasing UDS.KEYID = 0
7,346,080 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,292 UART: [idev] --
7,371,742 UART: [ldev] ++
7,372,306 UART: [ldev] CDI.KEYID = 6
7,373,245 UART: [ldev] SUBJECT.KEYID = 5
7,374,454 UART: [ldev] AUTHORITY.KEYID = 7
7,375,737 UART: [ldev] FE.KEYID = 1
7,420,623 UART: [ldev] Erasing FE.KEYID = 1
10,756,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,873 UART: [ldev] --
13,114,732 UART: [fwproc] Waiting for Commands...
13,116,560 UART: [fwproc] Received command 0x46574c44
13,118,747 UART: [fwproc] Received Image of size 114124 bytes
17,177,420 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,535 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,643,051 >>> mbox cmd response: success
17,643,621 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,647,126 UART: [afmc] ++
17,647,709 UART: [afmc] CDI.KEYID = 6
17,648,656 UART: [afmc] SUBJECT.KEYID = 7
17,649,871 UART: [afmc] AUTHORITY.KEYID = 5
21,008,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,362 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,647 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,030 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,895 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,333 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,850 UART: [afmc] --
23,379,737 UART: [cold-reset] --
23,383,547 UART: [state] Locking Datavault
23,386,742 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,440 UART: [state] Locking ICCM
23,389,720 UART: [exit] Launching FMC @ 0x40000130
23,398,126 UART:
23,398,364 UART: Running Caliptra FMC ...
23,399,464 UART:
23,399,625 UART: [state] CFI Enabled
23,465,569 UART: [fht] FMC Alias Private Key: 7
25,803,976 UART: [art] Extend RT PCRs Done
25,805,200 UART: [art] Lock RT PCRs Done
25,806,853 UART: [art] Populate DV Done
25,812,634 UART: [fht] FMC Alias Private Key: 7
25,814,228 UART: [art] Derive CDI
25,815,042 UART: [art] Store in in slot 0x4
25,874,571 UART: [art] Derive Key Pair
25,875,603 UART: [art] Store priv key in slot 0x5
29,168,860 UART: [art] Derive Key Pair - Done
29,182,016 UART: [art] Signing Cert with AUTHO
29,183,331 UART: RITY.KEYID = 7
31,471,065 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,586 UART: [art] PUB.X = F787383C695F5BB5D87DB58027BDDDE972268733D1C7BD6D3860C1860A610F171BDFF93C4C22C03BD2AB586F58325ED5
31,479,779 UART: [art] PUB.Y = 438C9E99A6A3676A85CDBF536892F9893EEBBD0106B5281D53948E3CD2D677D59AF3E4A6D262FA999D20A14F9AF9998B
31,487,071 UART: [art] SIG.R = B9F4B7E94F51292809991D6AAA19A51A68E97B52E5B2575B0DA9344CC855768A9B424381C1C421A6C97BBA8296B1406F
31,494,415 UART: [art] SIG.S = F0A8CA9D517EF5FCF4A928F50B887B154CC8CEDBE81A1F30EB3B8652FAAE5BED031CFC86DCC07F8B72669E48ECC3B0C2
32,799,264 UART: Caliptra RT
32,799,972 UART: [state] CFI Enabled
32,961,412 UART: [rt] RT listening for mailbox commands...
32,994,064 UART: [rt]cmd =0x53494756, len=196
32,998,589 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,807,110 ready_for_fw is high
3,807,548 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,874,817 >>> mbox cmd response: success
17,875,576 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,567,231 UART:
23,567,922 UART: Running Caliptra FMC ...
23,569,049 UART:
23,569,207 UART: [state] CFI Enabled
23,621,810 UART: [fht] FMC Alias Private Key: 7
25,960,149 UART: [art] Extend RT PCRs Done
25,961,397 UART: [art] Lock RT PCRs Done
25,963,310 UART: [art] Populate DV Done
25,968,514 UART: [fht] FMC Alias Private Key: 7
25,970,116 UART: [art] Derive CDI
25,970,934 UART: [art] Store in in slot 0x4
26,029,966 UART: [art] Derive Key Pair
26,031,008 UART: [art] Store priv key in slot 0x5
29,323,772 UART: [art] Derive Key Pair - Done
29,336,771 UART: [art] Signing Cert with AUTHO
29,338,070 UART: RITY.KEYID = 7
31,624,953 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,453 UART: [art] PUB.X = C731091AB48896937EC947BA6232D6DA99B74D91B58EA68696A3CF710613EBB56C702E883B0B45740B91CD2683F6AA81
31,633,672 UART: [art] PUB.Y = 40DF12AC4BE5404695ADEAD1ED211F286AA39B0F4D97FF90F3B10FF0DB351409A2251852BDBBA30CB01D15C995A230C6
31,640,923 UART: [art] SIG.R = 282A50C03142D590E4C54413D1CD67A27F430203809CA7BBDA7CA4576FBDC1D60BEE5D089AACB4DC4F2E89881401CCBA
31,648,333 UART: [art] SIG.S = 533AD3D58C6210DD1AB7CA9BB2AD75DD5893F9132EE17830DBC9EC938E4D59859C030CDC701B7DE3A203015269E27C97
32,952,930 UART: Caliptra RT
32,953,662 UART: [state] CFI Enabled
33,115,115 UART: [rt] RT listening for mailbox commands...
33,148,037 UART: [rt]cmd =0x53494756, len=196
33,152,938 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,558 UART:
192,933 UART: Running Caliptra ROM ...
194,082 UART:
603,644 UART: [state] CFI Enabled
617,659 UART: [state] LifecycleState = Unprovisioned
619,609 UART: [state] DebugLocked = No
621,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,919 UART: [kat] SHA2-256
795,674 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,230 UART: [kat] ++
806,762 UART: [kat] sha1
817,949 UART: [kat] SHA2-256
820,659 UART: [kat] SHA2-384
826,307 UART: [kat] SHA2-512-ACC
828,672 UART: [kat] ECC-384
3,113,315 UART: [kat] HMAC-384Kdf
3,123,980 UART: [kat] LMS
4,314,062 UART: [kat] --
4,318,619 UART: [cold-reset] ++
4,320,758 UART: [fht] Storing FHT @ 0x50003400
4,332,088 UART: [idev] ++
4,332,648 UART: [idev] CDI.KEYID = 6
4,333,615 UART: [idev] SUBJECT.KEYID = 7
4,335,054 UART: [idev] UDS.KEYID = 0
4,336,038 ready_for_fw is high
4,336,238 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,430 UART: [idev] Erasing UDS.KEYID = 0
7,621,596 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,746 UART: [idev] --
7,647,248 UART: [ldev] ++
7,647,866 UART: [ldev] CDI.KEYID = 6
7,648,873 UART: [ldev] SUBJECT.KEYID = 5
7,650,021 UART: [ldev] AUTHORITY.KEYID = 7
7,651,303 UART: [ldev] FE.KEYID = 1
7,660,589 UART: [ldev] Erasing FE.KEYID = 1
10,953,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,491 UART: [ldev] --
13,315,490 UART: [fwproc] Waiting for Commands...
13,317,740 UART: [fwproc] Received command 0x46574c44
13,319,918 UART: [fwproc] Received Image of size 114124 bytes
17,366,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,467 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,314 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,832,421 >>> mbox cmd response: success
17,832,994 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,837,277 UART: [afmc] ++
17,837,860 UART: [afmc] CDI.KEYID = 6
17,838,829 UART: [afmc] SUBJECT.KEYID = 7
17,840,043 UART: [afmc] AUTHORITY.KEYID = 5
21,157,136 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,538 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,802 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,195 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,994 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,455 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,015 UART: [afmc] --
23,519,465 UART: [cold-reset] --
23,523,537 UART: [state] Locking Datavault
23,529,208 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,898 UART: [state] Locking ICCM
23,532,853 UART: [exit] Launching FMC @ 0x40000130
23,541,270 UART:
23,541,522 UART: Running Caliptra FMC ...
23,542,543 UART:
23,542,683 UART: [state] CFI Enabled
23,550,996 UART: [fht] FMC Alias Private Key: 7
25,882,317 UART: [art] Extend RT PCRs Done
25,883,529 UART: [art] Lock RT PCRs Done
25,885,230 UART: [art] Populate DV Done
25,890,796 UART: [fht] FMC Alias Private Key: 7
25,892,325 UART: [art] Derive CDI
25,893,054 UART: [art] Store in in slot 0x4
25,935,763 UART: [art] Derive Key Pair
25,936,801 UART: [art] Store priv key in slot 0x5
29,179,557 UART: [art] Derive Key Pair - Done
29,192,766 UART: [art] Signing Cert with AUTHO
29,194,057 UART: RITY.KEYID = 7
31,473,103 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,605 UART: [art] PUB.X = C46318B3B7C3154142C11E5E9CA91BF3CCB1732D2DB018C284D3C714BCE1F53EEEABE3C63F26280C23A44C61A896ED10
31,481,856 UART: [art] PUB.Y = 1901C91E15A41E4A931AD5005B8C8CF68043651328B45D5F3BE6D75727457CE2335E8711F0DB884AF3CE35A3350040CE
31,489,078 UART: [art] SIG.R = 16C62CA94BBE6C41080B717030546B86D51D9642EDF2C069EBEADF4155F6B2EA9D7289E118A967ABEB3EF8C422A8EE50
31,496,466 UART: [art] SIG.S = 58EF932178643970BFEA97E0182E26C92BD4F62887964D5BF3CB5AF61696E88C0F85EE471458646DF9C9DC384D17E687
32,801,511 UART: Caliptra RT
32,802,217 UART: [state] CFI Enabled
32,920,543 UART: [rt] RT listening for mailbox commands...
32,953,366 UART: [rt]cmd =0x53494756, len=196
32,958,122 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
4,126,732 ready_for_fw is high
4,127,099 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,934 >>> mbox cmd response: success
18,071,781 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,713,779 UART:
23,714,163 UART: Running Caliptra FMC ...
23,715,281 UART:
23,715,430 UART: [state] CFI Enabled
23,723,278 UART: [fht] FMC Alias Private Key: 7
26,054,013 UART: [art] Extend RT PCRs Done
26,055,246 UART: [art] Lock RT PCRs Done
26,056,739 UART: [art] Populate DV Done
26,062,110 UART: [fht] FMC Alias Private Key: 7
26,063,655 UART: [art] Derive CDI
26,064,418 UART: [art] Store in in slot 0x4
26,107,128 UART: [art] Derive Key Pair
26,108,176 UART: [art] Store priv key in slot 0x5
29,350,749 UART: [art] Derive Key Pair - Done
29,363,869 UART: [art] Signing Cert with AUTHO
29,365,182 UART: RITY.KEYID = 7
31,644,604 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,113 UART: [art] PUB.X = FCF3A5243CC5F827D4BA1F8C63907C254D55FE7D34C37AD95E4D81C4F437880C7A3C483254B15CCB1AA07EFB6F7097B8
31,653,378 UART: [art] PUB.Y = 993D99EE2028B3FFA12551F93B094FA32B97D22EF959B48B47779AAF532167EE7072A3F3B212EC08007BB4C9F7FE11B8
31,660,613 UART: [art] SIG.R = FB652525C52F2D841978C6D957A7C2D69586A5D9AE03F323CE6C1157778CCE475C34BF8014FFF4B30A79D27749B3DE2B
31,668,059 UART: [art] SIG.S = 0B15D47BF201A849530179E59A88B46650B660420E5FF01D9F7FF55A54F589C25B9CA6776F7AAEDA9DD5E18A91A507F5
32,972,802 UART: Caliptra RT
32,973,519 UART: [state] CFI Enabled
33,091,827 UART: [rt] RT listening for mailbox commands...
33,124,752 UART: [rt]cmd =0x53494756, len=196
33,129,486 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,118 UART:
192,489 UART: Running Caliptra ROM ...
193,590 UART:
193,736 UART: [state] CFI Enabled
265,162 UART: [state] LifecycleState = Unprovisioned
267,038 UART: [state] DebugLocked = No
269,637 UART: [state] WD Timer not started. Device not locked for debugging
273,664 UART: [kat] SHA2-256
452,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,395 UART: [kat] ++
464,950 UART: [kat] sha1
475,761 UART: [kat] SHA2-256
478,764 UART: [kat] SHA2-384
484,962 UART: [kat] SHA2-512-ACC
487,901 UART: [kat] ECC-384
2,946,652 UART: [kat] HMAC-384Kdf
2,971,332 UART: [kat] LMS
3,500,813 UART: [kat] --
3,505,895 UART: [cold-reset] ++
3,507,976 UART: [fht] FHT @ 0x50003400
3,519,017 UART: [idev] ++
3,519,582 UART: [idev] CDI.KEYID = 6
3,520,463 UART: [idev] SUBJECT.KEYID = 7
3,521,709 UART: [idev] UDS.KEYID = 0
3,522,612 ready_for_fw is high
3,522,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,804 UART: [idev] Erasing UDS.KEYID = 0
6,026,403 UART: [idev] Sha1 KeyId Algorithm
6,049,299 UART: [idev] --
6,053,127 UART: [ldev] ++
6,053,698 UART: [ldev] CDI.KEYID = 6
6,054,623 UART: [ldev] SUBJECT.KEYID = 5
6,055,784 UART: [ldev] AUTHORITY.KEYID = 7
6,057,016 UART: [ldev] FE.KEYID = 1
6,101,220 UART: [ldev] Erasing FE.KEYID = 1
8,600,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,737 UART: [ldev] --
10,392,110 UART: [fwproc] Wait for Commands...
10,394,219 UART: [fwproc] Recv command 0x46574c44
10,396,261 UART: [fwproc] Recv'd Img size: 114448 bytes
13,800,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,869,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,938,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,257,271 >>> mbox cmd response: success
14,257,801 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,261,514 UART: [afmc] ++
14,262,134 UART: [afmc] CDI.KEYID = 6
14,263,049 UART: [afmc] SUBJECT.KEYID = 7
14,264,230 UART: [afmc] AUTHORITY.KEYID = 5
16,808,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,770 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,552 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,491 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,456 UART: [afmc] --
18,606,154 UART: [cold-reset] --
18,611,099 UART: [state] Locking Datavault
18,616,131 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,831 UART: [state] Locking ICCM
18,619,172 UART: [exit] Launching FMC @ 0x40000130
18,627,568 UART:
18,627,810 UART: Running Caliptra FMC ...
18,628,913 UART:
18,629,075 UART: [state] CFI Enabled
18,689,769 UART: [fht] FMC Alias Private Key: 7
20,453,108 UART: [art] Extend RT PCRs Done
20,454,330 UART: [art] Lock RT PCRs Done
20,456,085 UART: [art] Populate DV Done
20,461,443 UART: [fht] FMC Alias Private Key: 7
20,463,055 UART: [art] Derive CDI
20,463,867 UART: [art] Store in in slot 0x4
20,521,754 UART: [art] Derive Key Pair
20,522,794 UART: [art] Store priv key in slot 0x5
22,985,841 UART: [art] Derive Key Pair - Done
22,999,044 UART: [art] Signing Cert with AUTHO
23,000,343 UART: RITY.KEYID = 7
24,711,027 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,527 UART: [art] PUB.X = FDAD29235F5A549C6DBD9576E8A0AA746B17AFD25DF44906F459964835EF637159F469F9F9C879A127320BA50578E3FF
24,719,838 UART: [art] PUB.Y = 204E39460374DF1A7CB96BADB658ADD70E671968B097ADD1C335BD39477AAD0C0FE2FDCA6A018713C009060F67561F3C
24,727,081 UART: [art] SIG.R = C8CB2813D690BB0672D5353B0515E32E0C1F38044B5CDF773B4C106F2BD2EE7E5E917F62971EC67896551B906AA28560
24,734,465 UART: [art] SIG.S = 441E54BD8DB7EEF2E5CED24EA8E90E14778D1E0FD3357A7BB0DE363ACD1B50E48B2E7E6071DF0DA8C575DCA5123F2BCA
25,713,531 UART: Caliptra RT
25,714,294 UART: [state] CFI Enabled
25,877,156 UART: [rt] RT listening for mailbox commands...
25,910,243 UART: [rt]cmd =0x53494756, len=196
25,915,024 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,383,373 ready_for_fw is high
3,383,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,091,518 >>> mbox cmd response: success
14,092,108 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,384,093 UART:
18,384,483 UART: Running Caliptra FMC ...
18,385,614 UART:
18,385,769 UART: [state] CFI Enabled
18,454,550 UART: [fht] FMC Alias Private Key: 7
20,218,378 UART: [art] Extend RT PCRs Done
20,219,605 UART: [art] Lock RT PCRs Done
20,221,148 UART: [art] Populate DV Done
20,226,447 UART: [fht] FMC Alias Private Key: 7
20,228,095 UART: [art] Derive CDI
20,228,915 UART: [art] Store in in slot 0x4
20,287,502 UART: [art] Derive Key Pair
20,288,548 UART: [art] Store priv key in slot 0x5
22,751,400 UART: [art] Derive Key Pair - Done
22,764,022 UART: [art] Signing Cert with AUTHO
22,765,326 UART: RITY.KEYID = 7
24,477,540 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,041 UART: [art] PUB.X = 1C48413189B88EAEE24301260366977ECAF8C53C2A8EB6B2A96B273AE8825D9114248C161B832E787D978FACAD8B65E9
24,486,357 UART: [art] PUB.Y = BA1DD7F9F9DDAEBECC2402C22E3C78D57D15CFE3EE27A32942BCE4CF6A607BD0DD17F0C645F3F0A327FCFA09BA9B81EE
24,493,619 UART: [art] SIG.R = 85DDCAC1C54732427E370D81E85A5F2FC97844104F66EB6CA1E4557AC98203FAC8D068C5A864B316819BDA83E9AA533B
24,501,046 UART: [art] SIG.S = F1E84616E823B9215130ECD6E50B1E133F1FABBC7939F3550D9599AF79676996E87A5A19D9DCE3997D16961A7D99DA18
25,479,457 UART: Caliptra RT
25,480,152 UART: [state] CFI Enabled
25,644,662 UART: [rt] RT listening for mailbox commands...
25,677,430 UART: [rt]cmd =0x53494756, len=196
25,682,026 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,462 UART:
192,845 UART: Running Caliptra ROM ...
194,033 UART:
603,782 UART: [state] CFI Enabled
615,909 UART: [state] LifecycleState = Unprovisioned
617,817 UART: [state] DebugLocked = No
620,041 UART: [state] WD Timer not started. Device not locked for debugging
623,148 UART: [kat] SHA2-256
802,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,817 UART: [kat] ++
814,262 UART: [kat] sha1
826,191 UART: [kat] SHA2-256
829,205 UART: [kat] SHA2-384
834,552 UART: [kat] SHA2-512-ACC
837,499 UART: [kat] ECC-384
3,279,348 UART: [kat] HMAC-384Kdf
3,293,494 UART: [kat] LMS
3,823,010 UART: [kat] --
3,827,925 UART: [cold-reset] ++
3,830,399 UART: [fht] FHT @ 0x50003400
3,840,593 UART: [idev] ++
3,841,183 UART: [idev] CDI.KEYID = 6
3,842,063 UART: [idev] SUBJECT.KEYID = 7
3,843,304 UART: [idev] UDS.KEYID = 0
3,844,228 ready_for_fw is high
3,844,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,269 UART: [idev] Erasing UDS.KEYID = 0
6,316,779 UART: [idev] Sha1 KeyId Algorithm
6,338,446 UART: [idev] --
6,342,976 UART: [ldev] ++
6,343,558 UART: [ldev] CDI.KEYID = 6
6,344,460 UART: [ldev] SUBJECT.KEYID = 5
6,345,610 UART: [ldev] AUTHORITY.KEYID = 7
6,346,887 UART: [ldev] FE.KEYID = 1
6,356,823 UART: [ldev] Erasing FE.KEYID = 1
8,830,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,849 UART: [ldev] --
10,622,691 UART: [fwproc] Wait for Commands...
10,624,835 UART: [fwproc] Recv command 0x46574c44
10,626,862 UART: [fwproc] Recv'd Img size: 114448 bytes
14,033,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,498,937 >>> mbox cmd response: success
14,499,492 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,503,000 UART: [afmc] ++
14,503,584 UART: [afmc] CDI.KEYID = 6
14,504,485 UART: [afmc] SUBJECT.KEYID = 7
14,505,638 UART: [afmc] AUTHORITY.KEYID = 5
17,002,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,353 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,377 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,271 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,226 UART: [afmc] --
18,800,068 UART: [cold-reset] --
18,803,764 UART: [state] Locking Datavault
18,810,319 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,017 UART: [state] Locking ICCM
18,813,787 UART: [exit] Launching FMC @ 0x40000130
18,822,232 UART:
18,822,461 UART: Running Caliptra FMC ...
18,823,558 UART:
18,823,708 UART: [state] CFI Enabled
18,831,904 UART: [fht] FMC Alias Private Key: 7
20,589,337 UART: [art] Extend RT PCRs Done
20,590,563 UART: [art] Lock RT PCRs Done
20,592,020 UART: [art] Populate DV Done
20,597,322 UART: [fht] FMC Alias Private Key: 7
20,598,907 UART: [art] Derive CDI
20,599,709 UART: [art] Store in in slot 0x4
20,642,086 UART: [art] Derive Key Pair
20,643,126 UART: [art] Store priv key in slot 0x5
23,069,950 UART: [art] Derive Key Pair - Done
23,082,890 UART: [art] Signing Cert with AUTHO
23,084,190 UART: RITY.KEYID = 7
24,789,376 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,859 UART: [art] PUB.X = 79C6EE59122A786786989DB65558C0CF1A4533374B3084E2F3088FB30D442169A4EAB0D0B6EFEE892B29CA0FF3D0229B
24,798,150 UART: [art] PUB.Y = CAEC186A1294A3B7B0FF90B3463894DABDF58DDCEDBCF1DF3F561686CACAEB823C0772D32288E9FAF06EFB6C0F1BAA53
24,805,476 UART: [art] SIG.R = 6C9644D1FA46564C4175E047C56250FBFE4F10B806228D96BF6A4E47DF9C162AAEDC235964FECCD6F9E7027B17CB5EA9
24,812,855 UART: [art] SIG.S = ECF762D774718CAC6FED753D582F90E0A8DAD592E01E9B95023D50E3D171940A947AFC84B6E636F5E3C389A874CCF98E
25,792,087 UART: Caliptra RT
25,792,800 UART: [state] CFI Enabled
25,910,735 UART: [rt] RT listening for mailbox commands...
25,943,493 UART: [rt]cmd =0x53494756, len=196
25,947,982 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,694,600 ready_for_fw is high
3,694,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,814 >>> mbox cmd response: success
14,273,649 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,523,264 UART:
18,523,669 UART: Running Caliptra FMC ...
18,524,865 UART:
18,525,019 UART: [state] CFI Enabled
18,532,845 UART: [fht] FMC Alias Private Key: 7
20,289,363 UART: [art] Extend RT PCRs Done
20,290,592 UART: [art] Lock RT PCRs Done
20,291,963 UART: [art] Populate DV Done
20,297,583 UART: [fht] FMC Alias Private Key: 7
20,299,173 UART: [art] Derive CDI
20,299,983 UART: [art] Store in in slot 0x4
20,342,796 UART: [art] Derive Key Pair
20,343,790 UART: [art] Store priv key in slot 0x5
22,770,528 UART: [art] Derive Key Pair - Done
22,783,313 UART: [art] Signing Cert with AUTHO
22,784,611 UART: RITY.KEYID = 7
24,489,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,390 UART: [art] PUB.X = 63828562AF870EB367CC0B118ED20757FAA833F6C143065E543FDEA964AE08514B1F2B9CC379C70E39422688D6057398
24,498,581 UART: [art] PUB.Y = DC1482528566208362D162A37A33A6564D44ACD415334BC05FB07A93634944E4227BA78B3257AD289E6CAA43F1CC5EBD
24,505,837 UART: [art] SIG.R = FBC975C47A103C4FFD74E91A1FBFD4B34513C95A0C2878783F70BB33F0C7F9B939A956063DFFC49AD50010BCDB1156BA
24,513,224 UART: [art] SIG.S = 5B8E0671D4DE01AAC334DC00278018B80607478EB25E9AD9A5142E035675BFB3D41BA8F6AC03004834DA4A9C2C4BAF24
25,492,173 UART: Caliptra RT
25,492,871 UART: [state] CFI Enabled
25,609,932 UART: [rt] RT listening for mailbox commands...
25,642,638 UART: [rt]cmd =0x53494756, len=196
25,647,311 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,439,266 ready_for_fw is high
3,439,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,733,023 >>> mbox cmd response: success
14,733,899 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,026,155 UART:
19,026,580 UART: Running Caliptra FMC ...
19,027,775 UART:
19,027,943 UART: [state] CFI Enabled
19,097,409 UART: [fht] FMC Alias Private Key: 7
20,861,958 UART: [art] Extend RT PCRs Done
20,863,176 UART: [art] Lock RT PCRs Done
20,864,748 UART: [art] Populate DV Done
20,870,321 UART: [fht] FMC Alias Private Key: 7
20,871,857 UART: [art] Derive CDI
20,872,671 UART: [art] Store in in slot 0x4
20,930,300 UART: [art] Derive Key Pair
20,931,342 UART: [art] Store priv key in slot 0x5
23,393,969 UART: [art] Derive Key Pair - Done
23,406,800 UART: [art] Signing Cert with AUTHO
23,408,138 UART: RITY.KEYID = 7
25,120,443 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,977 UART: [art] PUB.X = 0B5FA2DAB1546A131D50351DB0B6597BAD174B36398B98478AE16EF7D77119430D5F5CD667D343818F8B7065FC201838
25,129,172 UART: [art] PUB.Y = 0396D85ABA65AF253E64B75AFCFEA257131B4FD722000AE720E987B864CD808E8FF081F946B24A76FC1AB07075BE6910
25,136,475 UART: [art] SIG.R = A9D5306567238C039C452594C111864F8F039C3D093DB972EBBFA66935CB616FF89A7AF8E8927CC2C1839C22AE6B0E01
25,143,812 UART: [art] SIG.S = 38A757FCBB5BB543AEE8FAED69057422702573CA73E8F5BEF0C74F8768F87EBE5275E97754113B41CB7FBEBF3FC12EBD
26,123,201 UART: Caliptra RT
26,123,889 UART: [state] CFI Enabled
26,288,579 UART: [rt] RT listening for mailbox commands...
26,321,386 UART: [rt]cmd =0x53494756, len=196
26,325,983 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,751,999 ready_for_fw is high
3,752,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,967,780 >>> mbox cmd response: success
14,968,527 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,221,411 UART:
19,221,805 UART: Running Caliptra FMC ...
19,222,939 UART:
19,223,088 UART: [state] CFI Enabled
19,231,422 UART: [fht] FMC Alias Private Key: 7
20,988,164 UART: [art] Extend RT PCRs Done
20,989,364 UART: [art] Lock RT PCRs Done
20,991,041 UART: [art] Populate DV Done
20,996,502 UART: [fht] FMC Alias Private Key: 7
20,998,138 UART: [art] Derive CDI
20,998,958 UART: [art] Store in in slot 0x4
21,041,320 UART: [art] Derive Key Pair
21,042,392 UART: [art] Store priv key in slot 0x5
23,468,969 UART: [art] Derive Key Pair - Done
23,481,560 UART: [art] Signing Cert with AUTHO
23,482,865 UART: RITY.KEYID = 7
25,188,303 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,802 UART: [art] PUB.X = 045BCF736690527EF6133D644E622314803D07050248F56A56361FF4BB9A0941DEE1CB51390E162B3793A645A77CB2F8
25,197,002 UART: [art] PUB.Y = 902ABE6C9AC65AF4E434E0570A4F497E6C59FAC718E5A008744A9F1691E5E7A2A77ADA990F8DD1CB4E47E6ECE002A3A9
25,204,310 UART: [art] SIG.R = 4CDBA3E4508769BD49FF9323A35ECFD160B55076F97A32331B40E3B0A61F75DF21F6BB62FDA9BD05C1DB942EF6C2F834
25,211,693 UART: [art] SIG.S = 38AD593E23AA0D7371445EDC47ED75220EC7FA44995272AFB0BCBD3DA88DCDD9FFDDE82A9BC8FF0653216BA427A66878
26,190,498 UART: Caliptra RT
26,191,188 UART: [state] CFI Enabled
26,308,523 UART: [rt] RT listening for mailbox commands...
26,341,281 UART: [rt]cmd =0x53494756, len=196
26,345,491 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,107 UART:
192,477 UART: Running Caliptra ROM ...
193,668 UART:
193,824 UART: [state] CFI Enabled
263,630 UART: [state] LifecycleState = Unprovisioned
265,575 UART: [state] DebugLocked = No
267,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,337 UART: [kat] SHA2-256
443,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,519 UART: [kat] ++
454,076 UART: [kat] sha1
465,955 UART: [kat] SHA2-256
468,676 UART: [kat] SHA2-384
473,823 UART: [kat] SHA2-512-ACC
476,191 UART: [kat] ECC-384
2,767,568 UART: [kat] HMAC-384Kdf
2,779,311 UART: [kat] LMS
3,969,605 UART: [kat] --
3,972,442 UART: [cold-reset] ++
3,973,525 UART: [fht] Storing FHT @ 0x50003400
3,985,356 UART: [idev] ++
3,985,937 UART: [idev] CDI.KEYID = 6
3,986,825 UART: [idev] SUBJECT.KEYID = 7
3,988,068 UART: [idev] UDS.KEYID = 0
3,989,056 ready_for_fw is high
3,989,266 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,881 UART: [idev] Erasing UDS.KEYID = 0
7,326,353 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,787 UART: [idev] --
7,351,237 UART: [ldev] ++
7,351,807 UART: [ldev] CDI.KEYID = 6
7,352,785 UART: [ldev] SUBJECT.KEYID = 5
7,353,997 UART: [ldev] AUTHORITY.KEYID = 7
7,355,226 UART: [ldev] FE.KEYID = 1
7,401,511 UART: [ldev] Erasing FE.KEYID = 1
10,734,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,821 UART: [ldev] --
13,094,494 UART: [fwproc] Waiting for Commands...
13,096,163 UART: [fwproc] Received command 0x46574c44
13,098,349 UART: [fwproc] Received Image of size 114124 bytes
17,150,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,229,871 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,298,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,615,957 >>> mbox cmd response: success
17,616,633 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,620,175 UART: [afmc] ++
17,620,772 UART: [afmc] CDI.KEYID = 6
17,621,688 UART: [afmc] SUBJECT.KEYID = 7
17,622,907 UART: [afmc] AUTHORITY.KEYID = 5
20,991,700 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,289,093 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,356 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,786 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,619 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,037 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,690 UART: [afmc] --
23,360,063 UART: [cold-reset] --
23,363,384 UART: [state] Locking Datavault
23,368,250 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,011 UART: [state] Locking ICCM
23,371,190 UART: [exit] Launching FMC @ 0x40000130
23,379,576 UART:
23,379,844 UART: Running Caliptra FMC ...
23,380,872 UART:
23,381,021 UART: [state] CFI Enabled
23,448,125 UART: [fht] FMC Alias Private Key: 7
25,786,497 UART: [art] Extend RT PCRs Done
25,787,714 UART: [art] Lock RT PCRs Done
25,788,950 UART: [art] Populate DV Done
25,794,424 UART: [fht] FMC Alias Private Key: 7
25,795,903 UART: [art] Derive CDI
25,796,639 UART: [art] Store in in slot 0x4
25,856,795 UART: [art] Derive Key Pair
25,857,837 UART: [art] Store priv key in slot 0x5
29,150,297 UART: [art] Derive Key Pair - Done
29,163,393 UART: [art] Signing Cert with AUTHO
29,164,700 UART: RITY.KEYID = 7
31,452,879 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,383 UART: [art] PUB.X = A97045E3850C95A0685AA2AB46AA5C47BC36F3B8B4E6509D750BD8180EDEEB8F61C820122C8EBD2DC50390552E8666E1
31,461,650 UART: [art] PUB.Y = E88ECD96AAF8D7F010582E2606DCD313DBB5F0FA8F00A008FCED8A505AE6929607A60CAB4F778D9F1A19233E4AE1962B
31,468,904 UART: [art] SIG.R = 359D177C1DA2D9A8C687B2FC7D93D3B0755DB679DF3E08826838DDDF806E3A9EB8C4522C7DBED55F9024E04CD8FCC532
31,476,316 UART: [art] SIG.S = 6E0421E31893104D9475BB8D1B2E0B5879953E3F1BE4A74682202A7FB020BD97DFBD6CCE059C420639A950B956A091BC
32,781,810 UART: Caliptra RT
32,782,521 UART: [state] CFI Enabled
32,943,837 UART: [rt] RT listening for mailbox commands...
32,958,926 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,805,405 ready_for_fw is high
3,805,828 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,860,981 >>> mbox cmd response: success
17,861,642 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,544,223 UART:
23,544,589 UART: Running Caliptra FMC ...
23,545,730 UART:
23,545,893 UART: [state] CFI Enabled
23,616,190 UART: [fht] FMC Alias Private Key: 7
25,954,090 UART: [art] Extend RT PCRs Done
25,955,319 UART: [art] Lock RT PCRs Done
25,957,217 UART: [art] Populate DV Done
25,962,465 UART: [fht] FMC Alias Private Key: 7
25,964,066 UART: [art] Derive CDI
25,964,889 UART: [art] Store in in slot 0x4
26,025,025 UART: [art] Derive Key Pair
26,026,072 UART: [art] Store priv key in slot 0x5
29,319,476 UART: [art] Derive Key Pair - Done
29,332,656 UART: [art] Signing Cert with AUTHO
29,333,958 UART: RITY.KEYID = 7
31,621,331 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,838 UART: [art] PUB.X = 256DDDC70EFC97C6DC1E0DCC685B9361D28C6F1CA97E3C604F7A834AEF2BD91469957C3AE1A8A044525BAF6E9D3D5812
31,630,124 UART: [art] PUB.Y = 6E30445AFD22D5365991A4E2D879C07A96F0412B4A7A9F26818F70A9F4C678B106599762FC87ED44F6DF821311AF2FD1
31,637,332 UART: [art] SIG.R = 75158311E7864D32AFC2F6CC092115C579DC3014B704BE9031A55FD3FF46B1A188C797AF0C03D97CABD17C8A151B9FA7
31,644,700 UART: [art] SIG.S = 5F9079471C598302956FF86A67407241B9130E1B978F344ABE6C7896276F5FA66D4B41306ED3DF0A9552949B835B5EE3
32,949,950 UART: Caliptra RT
32,950,670 UART: [state] CFI Enabled
33,111,567 UART: [rt] RT listening for mailbox commands...
33,126,545 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
192,423 UART:
192,784 UART: Running Caliptra ROM ...
193,920 UART:
603,733 UART: [state] CFI Enabled
618,258 UART: [state] LifecycleState = Unprovisioned
620,205 UART: [state] DebugLocked = No
621,789 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,934 UART: [kat] SHA2-256
795,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,241 UART: [kat] ++
806,683 UART: [kat] sha1
817,189 UART: [kat] SHA2-256
819,901 UART: [kat] SHA2-384
824,607 UART: [kat] SHA2-512-ACC
826,968 UART: [kat] ECC-384
3,110,515 UART: [kat] HMAC-384Kdf
3,122,182 UART: [kat] LMS
4,312,297 UART: [kat] --
4,316,570 UART: [cold-reset] ++
4,317,876 UART: [fht] Storing FHT @ 0x50003400
4,329,494 UART: [idev] ++
4,330,130 UART: [idev] CDI.KEYID = 6
4,331,039 UART: [idev] SUBJECT.KEYID = 7
4,332,291 UART: [idev] UDS.KEYID = 0
4,333,281 ready_for_fw is high
4,333,502 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,886 UART: [idev] Erasing UDS.KEYID = 0
7,618,312 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,357 UART: [idev] --
7,644,935 UART: [ldev] ++
7,645,553 UART: [ldev] CDI.KEYID = 6
7,646,476 UART: [ldev] SUBJECT.KEYID = 5
7,647,683 UART: [ldev] AUTHORITY.KEYID = 7
7,648,961 UART: [ldev] FE.KEYID = 1
7,660,076 UART: [ldev] Erasing FE.KEYID = 1
10,943,954 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,499 UART: [ldev] --
13,305,381 UART: [fwproc] Waiting for Commands...
13,308,651 UART: [fwproc] Received command 0x46574c44
13,310,826 UART: [fwproc] Received Image of size 114124 bytes
17,358,220 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,434,384 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,503,282 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,820,675 >>> mbox cmd response: success
17,821,234 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,825,625 UART: [afmc] ++
17,826,208 UART: [afmc] CDI.KEYID = 6
17,827,196 UART: [afmc] SUBJECT.KEYID = 7
17,828,409 UART: [afmc] AUTHORITY.KEYID = 5
21,140,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,170 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,425 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,809 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,652 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,100 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,405 UART: [afmc] --
23,508,381 UART: [cold-reset] --
23,512,776 UART: [state] Locking Datavault
23,518,014 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,707 UART: [state] Locking ICCM
23,521,986 UART: [exit] Launching FMC @ 0x40000130
23,530,386 UART:
23,530,625 UART: Running Caliptra FMC ...
23,531,745 UART:
23,531,901 UART: [state] CFI Enabled
23,540,216 UART: [fht] FMC Alias Private Key: 7
25,870,966 UART: [art] Extend RT PCRs Done
25,872,194 UART: [art] Lock RT PCRs Done
25,873,657 UART: [art] Populate DV Done
25,879,225 UART: [fht] FMC Alias Private Key: 7
25,880,763 UART: [art] Derive CDI
25,881,580 UART: [art] Store in in slot 0x4
25,924,316 UART: [art] Derive Key Pair
25,925,386 UART: [art] Store priv key in slot 0x5
29,167,381 UART: [art] Derive Key Pair - Done
29,180,210 UART: [art] Signing Cert with AUTHO
29,181,510 UART: RITY.KEYID = 7
31,461,103 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,605 UART: [art] PUB.X = 2F5B542FC6C1937E46D038745EDF1D63B6D724ED6CA7656151EBB615773A444D98F7D6F5C52CCCD47C830666DE8E2E10
31,469,863 UART: [art] PUB.Y = EAF63C59E5CFFF413AB88C989906C6C2DA7A0BC79C20B6DCAE6BD78DE7B31625B1C2E5EDFD025F714AFBB6E5525095C6
31,477,134 UART: [art] SIG.R = D50910CE25C9F4E19F6E33549FBA069F075F82DF29093F378F4A8E10291A1DD704D1E26B8D8E12E6DD89E2504D7BBFE9
31,484,465 UART: [art] SIG.S = 67796E9A05D8E861B678372C9E058FB3305AD504F7FF0474C34FFEEB4260BA04C79FA602F7A1F070123AC69C0A9544CF
32,789,693 UART: Caliptra RT
32,790,408 UART: [state] CFI Enabled
32,908,229 UART: [rt] RT listening for mailbox commands...
32,923,537 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,273 writing to cptra_bootfsm_go
4,143,568 ready_for_fw is high
4,144,065 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,086,631 >>> mbox cmd response: success
18,087,286 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,727,931 UART:
23,728,313 UART: Running Caliptra FMC ...
23,729,503 UART:
23,729,661 UART: [state] CFI Enabled
23,737,768 UART: [fht] FMC Alias Private Key: 7
26,068,643 UART: [art] Extend RT PCRs Done
26,069,869 UART: [art] Lock RT PCRs Done
26,071,442 UART: [art] Populate DV Done
26,076,922 UART: [fht] FMC Alias Private Key: 7
26,078,602 UART: [art] Derive CDI
26,079,339 UART: [art] Store in in slot 0x4
26,122,098 UART: [art] Derive Key Pair
26,123,140 UART: [art] Store priv key in slot 0x5
29,365,354 UART: [art] Derive Key Pair - Done
29,378,558 UART: [art] Signing Cert with AUTHO
29,379,857 UART: RITY.KEYID = 7
31,659,020 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,532 UART: [art] PUB.X = 6FFA4934959BDDAD5F2B2E848853A0AA54947F78D2275B01F9051CA8F2BCB2AD9522C47AAF0C7C04A1FB917706D6AC09
31,667,777 UART: [art] PUB.Y = 3CBD5F5D240D49D2DDC2E82B9680A39A6F4AD36B3EBA579A57E46B905EDD5D7C84F0E0F6B2C3D46A60F65EA3740B110D
31,675,063 UART: [art] SIG.R = ADDDF81E44E720B09A1BA41BEA4C637A02E168334A810C27FA2E23ECD635ABEF2678CC23BAE98480DCC2566A8B184635
31,682,453 UART: [art] SIG.S = 9C4952187B3A264845E10C9CBD473BC8FE1C915DC6398F465D47351D8F2ADF93D83E51CF21675820B39D0928E9667CB9
32,986,862 UART: Caliptra RT
32,987,567 UART: [state] CFI Enabled
33,104,521 UART: [rt] RT listening for mailbox commands...
33,119,661 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,308 UART:
192,729 UART: Running Caliptra ROM ...
193,866 UART:
194,023 UART: [state] CFI Enabled
260,469 UART: [state] LifecycleState = Unprovisioned
262,309 UART: [state] DebugLocked = No
264,618 UART: [state] WD Timer not started. Device not locked for debugging
268,164 UART: [kat] SHA2-256
447,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,851 UART: [kat] ++
459,300 UART: [kat] sha1
470,103 UART: [kat] SHA2-256
473,364 UART: [kat] SHA2-384
478,981 UART: [kat] SHA2-512-ACC
481,997 UART: [kat] ECC-384
2,926,094 UART: [kat] HMAC-384Kdf
2,950,207 UART: [kat] LMS
3,479,678 UART: [kat] --
3,485,593 UART: [cold-reset] ++
3,486,601 UART: [fht] FHT @ 0x50003400
3,496,372 UART: [idev] ++
3,496,945 UART: [idev] CDI.KEYID = 6
3,497,872 UART: [idev] SUBJECT.KEYID = 7
3,499,045 UART: [idev] UDS.KEYID = 0
3,499,971 ready_for_fw is high
3,500,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,644,166 UART: [idev] Erasing UDS.KEYID = 0
6,004,547 UART: [idev] Sha1 KeyId Algorithm
6,027,521 UART: [idev] --
6,030,706 UART: [ldev] ++
6,031,283 UART: [ldev] CDI.KEYID = 6
6,032,198 UART: [ldev] SUBJECT.KEYID = 5
6,033,363 UART: [ldev] AUTHORITY.KEYID = 7
6,034,596 UART: [ldev] FE.KEYID = 1
6,078,407 UART: [ldev] Erasing FE.KEYID = 1
8,581,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,879 UART: [ldev] --
10,371,865 UART: [fwproc] Wait for Commands...
10,373,915 UART: [fwproc] Recv command 0x46574c44
10,376,008 UART: [fwproc] Recv'd Img size: 114448 bytes
13,780,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,857,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,926,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,244,845 >>> mbox cmd response: success
14,245,327 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,249,515 UART: [afmc] ++
14,250,135 UART: [afmc] CDI.KEYID = 6
14,251,053 UART: [afmc] SUBJECT.KEYID = 7
14,252,220 UART: [afmc] AUTHORITY.KEYID = 5
16,786,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,916 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,513,781 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,529,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,545,581 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,561,514 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,583,975 UART: [afmc] --
18,588,112 UART: [cold-reset] --
18,590,832 UART: [state] Locking Datavault
18,596,244 UART: [state] Locking PCR0, PCR1 and PCR31
18,597,886 UART: [state] Locking ICCM
18,599,849 UART: [exit] Launching FMC @ 0x40000130
18,608,290 UART:
18,608,518 UART: Running Caliptra FMC ...
18,609,541 UART:
18,609,687 UART: [state] CFI Enabled
18,669,542 UART: [fht] FMC Alias Private Key: 7
20,433,519 UART: [art] Extend RT PCRs Done
20,434,739 UART: [art] Lock RT PCRs Done
20,435,955 UART: [art] Populate DV Done
20,441,283 UART: [fht] FMC Alias Private Key: 7
20,442,981 UART: [art] Derive CDI
20,443,718 UART: [art] Store in in slot 0x4
20,501,867 UART: [art] Derive Key Pair
20,502,903 UART: [art] Store priv key in slot 0x5
22,965,929 UART: [art] Derive Key Pair - Done
22,978,986 UART: [art] Signing Cert with AUTHO
22,980,297 UART: RITY.KEYID = 7
24,691,154 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,733 UART: [art] PUB.X = EB6082977AFCFB8E35DBD9F8F970AC633ABD4E9C939574C79D9CED221D98326DC69802FF1AC5B40BB79C05C8AAE53487
24,699,943 UART: [art] PUB.Y = 16DC2C167A6151DE5DE1C2671F34EA0D4272D4561C241775830D9EF7F2FAA102F5CECDD9F57457D3894A128282C46994
24,707,183 UART: [art] SIG.R = 8C2B3B975A62C9975F26CDE78B72A14A40BE0008B89F18BEC215A7D93A24F75DEC73F825B149AD7411C204EC4E2F2574
24,714,609 UART: [art] SIG.S = A917F6CC4165372A8617B5657E753346DE5C90DF76163D62BDEBE56EDD5D26577D64F7D35A8CBD85A3DB259137E9A6EF
25,693,342 UART: Caliptra RT
25,694,065 UART: [state] CFI Enabled
25,858,856 UART: [rt] RT listening for mailbox commands...
25,873,651 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
3,379,650 ready_for_fw is high
3,380,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,051,590 >>> mbox cmd response: success
14,052,230 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,347,012 UART:
18,347,401 UART: Running Caliptra FMC ...
18,348,508 UART:
18,348,661 UART: [state] CFI Enabled
18,412,448 UART: [fht] FMC Alias Private Key: 7
20,176,324 UART: [art] Extend RT PCRs Done
20,177,556 UART: [art] Lock RT PCRs Done
20,179,158 UART: [art] Populate DV Done
20,184,411 UART: [fht] FMC Alias Private Key: 7
20,186,060 UART: [art] Derive CDI
20,186,804 UART: [art] Store in in slot 0x4
20,245,835 UART: [art] Derive Key Pair
20,246,875 UART: [art] Store priv key in slot 0x5
22,710,051 UART: [art] Derive Key Pair - Done
22,722,619 UART: [art] Signing Cert with AUTHO
22,723,919 UART: RITY.KEYID = 7
24,435,894 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,381 UART: [art] PUB.X = 11C2FDF15D622D4613C57E67FC8AE7DC576F4CD6CF0AD5956FA87D045DB6CDD5CEF40EF98A42AA8DEBDBFA9D83BA7E59
24,444,730 UART: [art] PUB.Y = 9208E909A0CA73C180883BEC506302C9B2769F4BED34C3183FE968ECAE7601761AE2C72375F86FDE5A3E8C548E621DCC
24,451,988 UART: [art] SIG.R = 5F2106D275AD65F15B0AA8F1D275AE6CDA58427DCD6C553F9F4E0BC5D529F10496F4591E14B1A2827BBC1E7BA73B93AE
24,459,382 UART: [art] SIG.S = 48386D11C1EF974865B8B7E383866E76530D19FB18BC09A074EF8A97A677F11DAD79BA3056487CF29481B9757BFEF501
25,438,563 UART: Caliptra RT
25,439,274 UART: [state] CFI Enabled
25,604,757 UART: [rt] RT listening for mailbox commands...
25,619,847 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,434 UART:
192,810 UART: Running Caliptra ROM ...
193,908 UART:
603,598 UART: [state] CFI Enabled
616,547 UART: [state] LifecycleState = Unprovisioned
618,416 UART: [state] DebugLocked = No
620,148 UART: [state] WD Timer not started. Device not locked for debugging
623,396 UART: [kat] SHA2-256
802,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,083 UART: [kat] ++
814,534 UART: [kat] sha1
826,850 UART: [kat] SHA2-256
829,860 UART: [kat] SHA2-384
835,207 UART: [kat] SHA2-512-ACC
838,162 UART: [kat] ECC-384
3,278,072 UART: [kat] HMAC-384Kdf
3,290,679 UART: [kat] LMS
3,820,113 UART: [kat] --
3,825,031 UART: [cold-reset] ++
3,826,037 UART: [fht] FHT @ 0x50003400
3,837,504 UART: [idev] ++
3,838,070 UART: [idev] CDI.KEYID = 6
3,838,975 UART: [idev] SUBJECT.KEYID = 7
3,840,142 UART: [idev] UDS.KEYID = 0
3,841,135 ready_for_fw is high
3,841,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,526 UART: [idev] Erasing UDS.KEYID = 0
6,317,257 UART: [idev] Sha1 KeyId Algorithm
6,341,325 UART: [idev] --
6,345,125 UART: [ldev] ++
6,345,714 UART: [ldev] CDI.KEYID = 6
6,346,622 UART: [ldev] SUBJECT.KEYID = 5
6,347,779 UART: [ldev] AUTHORITY.KEYID = 7
6,349,007 UART: [ldev] FE.KEYID = 1
6,358,895 UART: [ldev] Erasing FE.KEYID = 1
8,832,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,123 UART: [ldev] --
10,622,482 UART: [fwproc] Wait for Commands...
10,624,942 UART: [fwproc] Recv command 0x46574c44
10,626,973 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,494,629 >>> mbox cmd response: success
14,495,288 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,499,075 UART: [afmc] ++
14,499,661 UART: [afmc] CDI.KEYID = 6
14,500,538 UART: [afmc] SUBJECT.KEYID = 7
14,501,742 UART: [afmc] AUTHORITY.KEYID = 5
17,001,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,749 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,788 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,633 UART: [afmc] --
18,796,323 UART: [cold-reset] --
18,802,116 UART: [state] Locking Datavault
18,806,290 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,930 UART: [state] Locking ICCM
18,810,431 UART: [exit] Launching FMC @ 0x40000130
18,818,877 UART:
18,819,144 UART: Running Caliptra FMC ...
18,820,168 UART:
18,820,309 UART: [state] CFI Enabled
18,828,371 UART: [fht] FMC Alias Private Key: 7
20,585,488 UART: [art] Extend RT PCRs Done
20,586,713 UART: [art] Lock RT PCRs Done
20,588,463 UART: [art] Populate DV Done
20,593,821 UART: [fht] FMC Alias Private Key: 7
20,595,348 UART: [art] Derive CDI
20,596,081 UART: [art] Store in in slot 0x4
20,638,555 UART: [art] Derive Key Pair
20,639,543 UART: [art] Store priv key in slot 0x5
23,066,368 UART: [art] Derive Key Pair - Done
23,079,480 UART: [art] Signing Cert with AUTHO
23,080,776 UART: RITY.KEYID = 7
24,786,069 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,583 UART: [art] PUB.X = 6A39E903F65D68C5A14B1D7EEE8D8C120A70B86907AC1E378311695B2713350AA017D76176546991BDB23866106A2F25
24,794,862 UART: [art] PUB.Y = A0C5F29D65CB3040E7B2E416E724DD802FC324653E87ABB362A1B9F052A99303107690950E280D1673F17A0BCAD3B2D7
24,802,087 UART: [art] SIG.R = 4613776A6837E07B6C42027D899AE9E6F55024FE161D284164CE7EDF8C853C455D302041F467160E55C921C85C7672C6
24,809,424 UART: [art] SIG.S = 5D5DDC77A4ABE7CA7434940BE89A9BE82DA63B49607F87F360E0433F357F7789AF7CB3330073F07829DFB0A37C219DD5
25,788,194 UART: Caliptra RT
25,788,890 UART: [state] CFI Enabled
25,906,232 UART: [rt] RT listening for mailbox commands...
25,921,416 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,700,360 ready_for_fw is high
3,700,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,097 >>> mbox cmd response: success
14,272,688 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,517,759 UART:
18,518,144 UART: Running Caliptra FMC ...
18,519,235 UART:
18,519,378 UART: [state] CFI Enabled
18,527,159 UART: [fht] FMC Alias Private Key: 7
20,284,535 UART: [art] Extend RT PCRs Done
20,285,767 UART: [art] Lock RT PCRs Done
20,287,581 UART: [art] Populate DV Done
20,292,769 UART: [fht] FMC Alias Private Key: 7
20,294,478 UART: [art] Derive CDI
20,295,288 UART: [art] Store in in slot 0x4
20,337,403 UART: [art] Derive Key Pair
20,338,445 UART: [art] Store priv key in slot 0x5
22,764,911 UART: [art] Derive Key Pair - Done
22,777,799 UART: [art] Signing Cert with AUTHO
22,779,116 UART: RITY.KEYID = 7
24,484,808 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,294 UART: [art] PUB.X = E012FFB59576B47F2A76937F902DED9C2F68814322A7FD03406CDD911411ED86268910DB441EDE440C9A45657672DF7B
24,493,529 UART: [art] PUB.Y = FEB266FDDE8B3BD7C09C9107F6E3625C4EC05E23BB31A28572E5C67ACE570D2D8262E619A37069AACC7ACD7C77349E23
24,500,838 UART: [art] SIG.R = 086018BFA5C8D9177EC9D3C2AA75217BD3F6F03BAAB94C6977F46D372FCFC9CAA3ACD3D51C0B88C80E8D1E60ED0C4DF4
24,508,226 UART: [art] SIG.S = 496411C254BF9FE1F4E27763AA8D9277EEDA219579EDC33AA30A58C22042F0453C7C255497C479D33EBF9103330ABBB0
25,487,592 UART: Caliptra RT
25,488,303 UART: [state] CFI Enabled
25,605,596 UART: [rt] RT listening for mailbox commands...
25,620,746 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,440,624 ready_for_fw is high
3,441,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,737,929 >>> mbox cmd response: success
14,738,702 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,027,703 UART:
19,028,108 UART: Running Caliptra FMC ...
19,029,243 UART:
19,029,404 UART: [state] CFI Enabled
19,096,505 UART: [fht] FMC Alias Private Key: 7
20,860,259 UART: [art] Extend RT PCRs Done
20,861,471 UART: [art] Lock RT PCRs Done
20,863,186 UART: [art] Populate DV Done
20,868,763 UART: [fht] FMC Alias Private Key: 7
20,870,252 UART: [art] Derive CDI
20,870,987 UART: [art] Store in in slot 0x4
20,929,486 UART: [art] Derive Key Pair
20,930,555 UART: [art] Store priv key in slot 0x5
23,394,647 UART: [art] Derive Key Pair - Done
23,407,909 UART: [art] Signing Cert with AUTHO
23,409,394 UART: RITY.KEYID = 7
25,119,754 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,263 UART: [art] PUB.X = D1CBA1EAFE9701BCEB1FCB9466A99444C74417CD1A413ED7A886E1F5CE820651283F45714323AE3896B86194EAC9F928
25,128,532 UART: [art] PUB.Y = 936378117812F6D06E2EF43F5FB84A5C79DC98EC367990A7F8B66D9A78BB2669BBE3D02F989E96A55C1364467EBFE109
25,135,790 UART: [art] SIG.R = 66B6C6F646B116B154F242EB19A471A3CF5B02F5BCCCE2348A8C4C63A937493EE474134F77CCF629CCA26A0FF654B2F8
25,143,177 UART: [art] SIG.S = D6A0DA431B9710F78BE3F512DF6610099EFDEC6245E2142C07419F467E980CDE277E7BC22622FF5D3890E58F1E7A8D35
26,122,173 UART: Caliptra RT
26,122,866 UART: [state] CFI Enabled
26,288,181 UART: [rt] RT listening for mailbox commands...
26,303,082 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,751,806 ready_for_fw is high
3,752,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,971,150 >>> mbox cmd response: success
14,971,966 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,224,244 UART:
19,224,629 UART: Running Caliptra FMC ...
19,225,771 UART:
19,225,919 UART: [state] CFI Enabled
19,233,526 UART: [fht] FMC Alias Private Key: 7
20,990,656 UART: [art] Extend RT PCRs Done
20,991,865 UART: [art] Lock RT PCRs Done
20,993,187 UART: [art] Populate DV Done
20,998,643 UART: [fht] FMC Alias Private Key: 7
21,000,181 UART: [art] Derive CDI
21,000,945 UART: [art] Store in in slot 0x4
21,043,545 UART: [art] Derive Key Pair
21,044,585 UART: [art] Store priv key in slot 0x5
23,471,010 UART: [art] Derive Key Pair - Done
23,483,896 UART: [art] Signing Cert with AUTHO
23,485,216 UART: RITY.KEYID = 7
25,190,405 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,285 UART: [art] PUB.X = B6C49CE8BA568983D20F2BD173A0599F903D740FDD1FD16B24FE5972A59C522E6A0B58F020C8CAB6E77B926032856A5D
25,199,209 UART: [art] PUB.Y = 3B86BCCDC85B5D895B291735E7A2569B653A8D94A153933A55E8DA0B63399C939EB568A85B429DF65E1B6E526CC8DF85
25,206,474 UART: [art] SIG.R = C877FBA92B37347D20F1E43F26C7CC1961F9F2D12D263118BABFE6131B074F4C9D57C611AA90C363E6AB5A85B516C2E8
25,213,859 UART: [art] SIG.S = C2292291E355D9C668E0038CB2B302D524BD29DF18E95061F8E6393C6B1BE0F61550234A9444E9B807BE1A71E72B0B10
26,193,110 UART: Caliptra RT
26,193,857 UART: [state] CFI Enabled
26,310,830 UART: [rt] RT listening for mailbox commands...
26,326,025 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,545 UART: [kat] SHA2-256
892,483 UART: [kat] SHA2-384
895,226 UART: [kat] SHA2-512-ACC
897,127 UART: [kat] ECC-384
902,918 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,747 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,479,838 UART: [idev] ++
1,480,006 UART: [idev] CDI.KEYID = 6
1,480,366 UART: [idev] SUBJECT.KEYID = 7
1,480,790 UART: [idev] UDS.KEYID = 0
1,481,135 ready_for_fw is high
1,481,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,794 UART: [idev] Erasing UDS.KEYID = 0
1,504,958 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,676 UART: [idev] --
1,514,695 UART: [ldev] ++
1,514,863 UART: [ldev] CDI.KEYID = 6
1,515,226 UART: [ldev] SUBJECT.KEYID = 5
1,515,652 UART: [ldev] AUTHORITY.KEYID = 7
1,516,115 UART: [ldev] FE.KEYID = 1
1,521,161 UART: [ldev] Erasing FE.KEYID = 1
1,546,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,292 UART: [ldev] --
1,585,631 UART: [fwproc] Waiting for Commands...
1,586,288 UART: [fwproc] Received command 0x46574c44
1,587,079 UART: [fwproc] Received Image of size 114448 bytes
2,886,034 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,174 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,526 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,687 >>> mbox cmd response: success
3,078,687 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,079,705 UART: [afmc] ++
3,079,873 UART: [afmc] CDI.KEYID = 6
3,080,235 UART: [afmc] SUBJECT.KEYID = 7
3,080,660 UART: [afmc] AUTHORITY.KEYID = 5
3,116,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,905 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,298 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,988 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,883 UART: [afmc] --
3,159,793 UART: [cold-reset] --
3,160,553 UART: [state] Locking Datavault
3,161,702 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,306 UART: [state] Locking ICCM
3,162,866 UART: [exit] Launching FMC @ 0x40000130
3,168,195 UART:
3,168,211 UART: Running Caliptra FMC ...
3,168,619 UART:
3,168,673 UART: [state] CFI Enabled
3,179,554 UART: [fht] FMC Alias Private Key: 7
3,287,429 UART: [art] Extend RT PCRs Done
3,287,857 UART: [art] Lock RT PCRs Done
3,289,495 UART: [art] Populate DV Done
3,297,686 UART: [fht] FMC Alias Private Key: 7
3,298,808 UART: [art] Derive CDI
3,299,088 UART: [art] Store in in slot 0x4
3,384,961 UART: [art] Derive Key Pair
3,385,321 UART: [art] Store priv key in slot 0x5
3,398,789 UART: [art] Derive Key Pair - Done
3,413,859 UART: [art] Signing Cert with AUTHO
3,414,339 UART: RITY.KEYID = 7
3,429,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,414 UART: [art] PUB.X = 473320B7A596BCA03BEC66C637EB6EF4B434E5D211F47BCEE3A7A0D80675AC73A892AFF0F4D26EBB73991FFE8AF82C8D
3,437,203 UART: [art] PUB.Y = F2D72DEEBA1485490EE7C7E67B2EDE0B02E2F92A1C1C7FB722050C285C82F9E1686AE042B433F134C6F4EA4166CC0B27
3,444,149 UART: [art] SIG.R = BF86254FA70CA594B76B51D73952173F3FF334BEDCCD998843AF674D59D93272CC3C845032B777CA349C18AFD3A58793
3,450,920 UART: [art] SIG.S = 956A947E4E776F4D6B17ED41AA4AAE91140F0993F7A3466040E8314B1149B28129C8775B70B0123F4D355F07F2F35082
3,474,434 UART: Caliptra RT
3,474,687 UART: [state] CFI Enabled
3,582,197 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,596,132 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,321 ready_for_fw is high
1,362,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,001 >>> mbox cmd response: success
2,931,001 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,992,167 UART:
2,992,183 UART: Running Caliptra FMC ...
2,992,591 UART:
2,992,645 UART: [state] CFI Enabled
3,003,298 UART: [fht] FMC Alias Private Key: 7
3,110,795 UART: [art] Extend RT PCRs Done
3,111,223 UART: [art] Lock RT PCRs Done
3,112,891 UART: [art] Populate DV Done
3,120,938 UART: [fht] FMC Alias Private Key: 7
3,122,034 UART: [art] Derive CDI
3,122,314 UART: [art] Store in in slot 0x4
3,207,999 UART: [art] Derive Key Pair
3,208,359 UART: [art] Store priv key in slot 0x5
3,221,163 UART: [art] Derive Key Pair - Done
3,236,204 UART: [art] Signing Cert with AUTHO
3,236,684 UART: RITY.KEYID = 7
3,251,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,413 UART: [art] PUB.X = 2C3D62123996DA44BC95A3C8E98E89119CB86819447B6E7D1540A173166FC62B580300C6A48396B5CF2FA89277CFE418
3,259,154 UART: [art] PUB.Y = 03687D09807AE270F956C92474612D647EAB7B2D6AF58D63F48BE3E9AC4C2BD926D8A727B7C643EDED2A7AC05828163B
3,266,106 UART: [art] SIG.R = 1A6F712AF9AE080C5A8EB2D3F8AE0698ECAB0793123C5B407673AB7E6D7563E4EAD85619E8A939B23A03C787DCFB7E8A
3,272,877 UART: [art] SIG.S = 5FC8F244892CC5EBDB4367CDA1C8EEA1231902D6E340A39B2902BCBA94DD30A1ABB882B73795DC1297FF656BF2BCEC2F
3,296,160 UART: Caliptra RT
3,296,413 UART: [state] CFI Enabled
3,404,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,720 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,024 UART: [kat] SHA2-256
881,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,070 UART: [kat] ++
886,222 UART: [kat] sha1
890,454 UART: [kat] SHA2-256
892,392 UART: [kat] SHA2-384
895,107 UART: [kat] SHA2-512-ACC
897,008 UART: [kat] ECC-384
902,303 UART: [kat] HMAC-384Kdf
906,801 UART: [kat] LMS
1,474,997 UART: [kat] --
1,475,956 UART: [cold-reset] ++
1,476,338 UART: [fht] Storing FHT @ 0x50003400
1,479,267 UART: [idev] ++
1,479,435 UART: [idev] CDI.KEYID = 6
1,479,795 UART: [idev] SUBJECT.KEYID = 7
1,480,219 UART: [idev] UDS.KEYID = 0
1,480,564 ready_for_fw is high
1,480,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,873 UART: [idev] Erasing UDS.KEYID = 0
1,504,361 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,907 UART: [idev] --
1,514,096 UART: [ldev] ++
1,514,264 UART: [ldev] CDI.KEYID = 6
1,514,627 UART: [ldev] SUBJECT.KEYID = 5
1,515,053 UART: [ldev] AUTHORITY.KEYID = 7
1,515,516 UART: [ldev] FE.KEYID = 1
1,520,690 UART: [ldev] Erasing FE.KEYID = 1
1,545,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,707 UART: [ldev] --
1,585,186 UART: [fwproc] Waiting for Commands...
1,585,885 UART: [fwproc] Received command 0x46574c44
1,586,676 UART: [fwproc] Received Image of size 114448 bytes
2,885,745 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,507 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,638 >>> mbox cmd response: success
3,078,638 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,079,836 UART: [afmc] ++
3,080,004 UART: [afmc] CDI.KEYID = 6
3,080,366 UART: [afmc] SUBJECT.KEYID = 7
3,080,791 UART: [afmc] AUTHORITY.KEYID = 5
3,116,212 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,850 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,630 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,358 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,243 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,933 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,068 UART: [afmc] --
3,159,962 UART: [cold-reset] --
3,160,966 UART: [state] Locking Datavault
3,162,135 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,739 UART: [state] Locking ICCM
3,163,201 UART: [exit] Launching FMC @ 0x40000130
3,168,530 UART:
3,168,546 UART: Running Caliptra FMC ...
3,168,954 UART:
3,169,097 UART: [state] CFI Enabled
3,179,522 UART: [fht] FMC Alias Private Key: 7
3,287,603 UART: [art] Extend RT PCRs Done
3,288,031 UART: [art] Lock RT PCRs Done
3,289,457 UART: [art] Populate DV Done
3,297,748 UART: [fht] FMC Alias Private Key: 7
3,298,922 UART: [art] Derive CDI
3,299,202 UART: [art] Store in in slot 0x4
3,384,483 UART: [art] Derive Key Pair
3,384,843 UART: [art] Store priv key in slot 0x5
3,398,711 UART: [art] Derive Key Pair - Done
3,413,350 UART: [art] Signing Cert with AUTHO
3,413,830 UART: RITY.KEYID = 7
3,429,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,919 UART: [art] PUB.X = 12D600194AF2F7A7B5DAAD9AD2E3AD7CDC4BD32B99F4F3FB282E61BB34DA211D12AA09AEB08BF78083DBA584AD4ACBD4
3,436,696 UART: [art] PUB.Y = 7F27DFCDAFB27B7277CF8044FE277ABFB5F37A618B58FD399815BA7890E973C494A068096E0C6F669E7C9125178E52AB
3,443,648 UART: [art] SIG.R = A8C5CCA2722E05CD3CD235D7808558BD0BC8C4111C25B53B379A1DB5D001C14DD724EC588E91CC61EB55F09ECF4391E5
3,450,423 UART: [art] SIG.S = A263421E2F533F471D55E5F9A45B7B99F50305BE2161FE4BD5AF37305A0E5B59C7E4CD9ABF434FD154F5D1D6215F4684
3,473,943 UART: Caliptra RT
3,474,288 UART: [state] CFI Enabled
3,581,778 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,995 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,066 ready_for_fw is high
1,363,066 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,484 >>> mbox cmd response: success
2,929,484 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,991,222 UART:
2,991,238 UART: Running Caliptra FMC ...
2,991,646 UART:
2,991,789 UART: [state] CFI Enabled
3,002,236 UART: [fht] FMC Alias Private Key: 7
3,109,955 UART: [art] Extend RT PCRs Done
3,110,383 UART: [art] Lock RT PCRs Done
3,111,849 UART: [art] Populate DV Done
3,119,926 UART: [fht] FMC Alias Private Key: 7
3,120,890 UART: [art] Derive CDI
3,121,170 UART: [art] Store in in slot 0x4
3,206,873 UART: [art] Derive Key Pair
3,207,233 UART: [art] Store priv key in slot 0x5
3,220,339 UART: [art] Derive Key Pair - Done
3,234,998 UART: [art] Signing Cert with AUTHO
3,235,478 UART: RITY.KEYID = 7
3,250,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,325 UART: [art] PUB.X = D7F34E1EADC291B01D2660F49BE793A1EDD1E430B192D21D49302C249DDC517BB687AF655CC22413BD5F9CA9365C1B36
3,258,107 UART: [art] PUB.Y = 055F95C6683D846D3CE076200317B9C78E4F024FF7DCE09540DC551B75D7907A9FEF0F6EADA259AA1C35E83E140DE5FD
3,265,054 UART: [art] SIG.R = 4A3DA304ABBE67EEAEA17618E65185D030F77882C4D0A456CB7693433D67232D45905338E30D4524B1886FBECA6DBEF6
3,271,824 UART: [art] SIG.S = 6599331A177859E3C15B5F1EDD736D1810B6130AFA54CC5CC3B2692EF12B8BFC0777040264F31D6A00C7DC5EE9B91861
3,295,417 UART: Caliptra RT
3,295,762 UART: [state] CFI Enabled
3,404,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,407 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
893,374 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,499 UART: [kat] ++
897,651 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
918,210 UART: [kat] HMAC-384Kdf
922,802 UART: [kat] LMS
1,171,130 UART: [kat] --
1,172,035 UART: [cold-reset] ++
1,172,469 UART: [fht] FHT @ 0x50003400
1,175,094 UART: [idev] ++
1,175,262 UART: [idev] CDI.KEYID = 6
1,175,622 UART: [idev] SUBJECT.KEYID = 7
1,176,046 UART: [idev] UDS.KEYID = 0
1,176,391 ready_for_fw is high
1,176,391 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,952 UART: [idev] Erasing UDS.KEYID = 0
1,201,223 UART: [idev] Sha1 KeyId Algorithm
1,209,583 UART: [idev] --
1,210,695 UART: [ldev] ++
1,210,863 UART: [ldev] CDI.KEYID = 6
1,211,226 UART: [ldev] SUBJECT.KEYID = 5
1,211,652 UART: [ldev] AUTHORITY.KEYID = 7
1,212,115 UART: [ldev] FE.KEYID = 1
1,217,223 UART: [ldev] Erasing FE.KEYID = 1
1,243,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,217 UART: [ldev] --
1,282,584 UART: [fwproc] Wait for Commands...
1,283,276 UART: [fwproc] Recv command 0x46574c44
1,284,004 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,470 >>> mbox cmd response: success
2,775,470 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,776,576 UART: [afmc] ++
2,776,744 UART: [afmc] CDI.KEYID = 6
2,777,106 UART: [afmc] SUBJECT.KEYID = 7
2,777,531 UART: [afmc] AUTHORITY.KEYID = 5
2,812,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,803 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,688 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,407 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,167 UART: [afmc] --
2,856,279 UART: [cold-reset] --
2,856,985 UART: [state] Locking Datavault
2,858,212 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,816 UART: [state] Locking ICCM
2,859,410 UART: [exit] Launching FMC @ 0x40000130
2,864,739 UART:
2,864,755 UART: Running Caliptra FMC ...
2,865,163 UART:
2,865,217 UART: [state] CFI Enabled
2,875,890 UART: [fht] FMC Alias Private Key: 7
2,983,381 UART: [art] Extend RT PCRs Done
2,983,809 UART: [art] Lock RT PCRs Done
2,985,411 UART: [art] Populate DV Done
2,993,706 UART: [fht] FMC Alias Private Key: 7
2,994,756 UART: [art] Derive CDI
2,995,036 UART: [art] Store in in slot 0x4
3,080,989 UART: [art] Derive Key Pair
3,081,349 UART: [art] Store priv key in slot 0x5
3,094,749 UART: [art] Derive Key Pair - Done
3,109,360 UART: [art] Signing Cert with AUTHO
3,109,840 UART: RITY.KEYID = 7
3,125,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,029 UART: [art] PUB.X = 53A0D7DA48F170C9575F85374F721F5A4EFA07BC887C58B3B901776B99E5DA29536DD6005E925358944B4C53394BE889
3,132,767 UART: [art] PUB.Y = F04A423700772B63CC2511E7C1D8716FC7EA7E802D95B0E7BC185191B6BA8B728B288D8C67CB783013D50B4F82937B46
3,139,692 UART: [art] SIG.R = 41D8021738E3061387F495B272BA9CE0A5F32CE974495CBE5C45EAFCF711B7C4CB485A35A9AE1068890A7D952CBF6630
3,146,459 UART: [art] SIG.S = DB7E9AE00199B3AE491ACF1EE3AAB3269A49243BA0927493859B7E8599E596B81969A7C7EA059E33EE1496F0B0C60732
3,170,467 UART: Caliptra RT
3,170,720 UART: [state] CFI Enabled
3,279,619 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,293,582 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,643 ready_for_fw is high
1,059,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,308 >>> mbox cmd response: success
2,627,308 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,688,842 UART:
2,688,858 UART: Running Caliptra FMC ...
2,689,266 UART:
2,689,320 UART: [state] CFI Enabled
2,699,693 UART: [fht] FMC Alias Private Key: 7
2,807,982 UART: [art] Extend RT PCRs Done
2,808,410 UART: [art] Lock RT PCRs Done
2,810,066 UART: [art] Populate DV Done
2,818,445 UART: [fht] FMC Alias Private Key: 7
2,819,609 UART: [art] Derive CDI
2,819,889 UART: [art] Store in in slot 0x4
2,905,484 UART: [art] Derive Key Pair
2,905,844 UART: [art] Store priv key in slot 0x5
2,919,128 UART: [art] Derive Key Pair - Done
2,933,949 UART: [art] Signing Cert with AUTHO
2,934,429 UART: RITY.KEYID = 7
2,949,715 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,480 UART: [art] PUB.X = 752BB2B04584B6ADE0A29E5C47ADB4824B596906D16CCCA75467FCC113784164F912C7D53A16E3885325118249D609AE
2,957,242 UART: [art] PUB.Y = CF2A562AB7F947625A8628F06A8044D8B4C59B7E71E8549D59C014381E9110308F6E64BAFCD5287D5094484740630D04
2,964,178 UART: [art] SIG.R = C2D539CFC34F9366EDF82E6B252D5B560240CB098D9926AB7BA9AB565408595354CA58C7533B659B3708AF619DEB65CA
2,970,942 UART: [art] SIG.S = 264F7AAC4BCD5F61ECDB366CEBBA25C486D857D6FCE35CBD54890D8102E2798F339306A216004AE40ED06E591825BAD5
2,994,811 UART: Caliptra RT
2,995,064 UART: [state] CFI Enabled
3,102,925 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,116,736 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,190 UART: [state] WD Timer not started. Device not locked for debugging
88,453 UART: [kat] SHA2-256
894,103 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,228 UART: [kat] ++
898,380 UART: [kat] sha1
902,478 UART: [kat] SHA2-256
904,418 UART: [kat] SHA2-384
907,073 UART: [kat] SHA2-512-ACC
908,974 UART: [kat] ECC-384
918,811 UART: [kat] HMAC-384Kdf
923,245 UART: [kat] LMS
1,171,573 UART: [kat] --
1,172,544 UART: [cold-reset] ++
1,173,080 UART: [fht] FHT @ 0x50003400
1,175,767 UART: [idev] ++
1,175,935 UART: [idev] CDI.KEYID = 6
1,176,295 UART: [idev] SUBJECT.KEYID = 7
1,176,719 UART: [idev] UDS.KEYID = 0
1,177,064 ready_for_fw is high
1,177,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,609 UART: [idev] Erasing UDS.KEYID = 0
1,201,668 UART: [idev] Sha1 KeyId Algorithm
1,209,996 UART: [idev] --
1,211,166 UART: [ldev] ++
1,211,334 UART: [ldev] CDI.KEYID = 6
1,211,697 UART: [ldev] SUBJECT.KEYID = 5
1,212,123 UART: [ldev] AUTHORITY.KEYID = 7
1,212,586 UART: [ldev] FE.KEYID = 1
1,218,192 UART: [ldev] Erasing FE.KEYID = 1
1,244,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,756 UART: [ldev] --
1,284,239 UART: [fwproc] Wait for Commands...
1,284,829 UART: [fwproc] Recv command 0x46574c44
1,285,557 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,766 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,843 >>> mbox cmd response: success
2,778,843 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,780,039 UART: [afmc] ++
2,780,207 UART: [afmc] CDI.KEYID = 6
2,780,569 UART: [afmc] SUBJECT.KEYID = 7
2,780,994 UART: [afmc] AUTHORITY.KEYID = 5
2,816,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,647 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,366 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,130 UART: [afmc] --
2,860,246 UART: [cold-reset] --
2,861,166 UART: [state] Locking Datavault
2,862,403 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,007 UART: [state] Locking ICCM
2,863,621 UART: [exit] Launching FMC @ 0x40000130
2,868,950 UART:
2,868,966 UART: Running Caliptra FMC ...
2,869,374 UART:
2,869,517 UART: [state] CFI Enabled
2,880,434 UART: [fht] FMC Alias Private Key: 7
2,988,497 UART: [art] Extend RT PCRs Done
2,988,925 UART: [art] Lock RT PCRs Done
2,990,233 UART: [art] Populate DV Done
2,998,352 UART: [fht] FMC Alias Private Key: 7
2,999,504 UART: [art] Derive CDI
2,999,784 UART: [art] Store in in slot 0x4
3,085,579 UART: [art] Derive Key Pair
3,085,939 UART: [art] Store priv key in slot 0x5
3,099,035 UART: [art] Derive Key Pair - Done
3,113,746 UART: [art] Signing Cert with AUTHO
3,114,226 UART: RITY.KEYID = 7
3,128,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,649 UART: [art] PUB.X = B164A1A1ECF78F2A3FA0F9E85037BFF829582B319B2425329D4CD9BB936DF938A9F9168B5E67A5A72E0E58AC042D3881
3,136,421 UART: [art] PUB.Y = A5773B94E67C904F143DCB22DBDCF9A79F3E080709C1AD550F4E977D6F74A78FDDFB472D2E7F1D6D403C09376EA20137
3,143,365 UART: [art] SIG.R = 841A20799168CCF3127D0D4E3578C905AA8D6B0E230F69EEC668806C994F45AE9FCCB465F7A59502BCFE901C2CF5AE3F
3,150,132 UART: [art] SIG.S = 006C5C0BAA001C750A0CFDE17EBE9BE0D282427C807DA4A00B9C47195BEFF6438416A07D5CBB13651574FD4B1939146D
3,174,619 UART: Caliptra RT
3,174,964 UART: [state] CFI Enabled
3,283,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,297,991 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,790 ready_for_fw is high
1,060,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,000 >>> mbox cmd response: success
2,629,000 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,690,200 UART:
2,690,216 UART: Running Caliptra FMC ...
2,690,624 UART:
2,690,767 UART: [state] CFI Enabled
2,701,304 UART: [fht] FMC Alias Private Key: 7
2,809,199 UART: [art] Extend RT PCRs Done
2,809,627 UART: [art] Lock RT PCRs Done
2,811,047 UART: [art] Populate DV Done
2,819,528 UART: [fht] FMC Alias Private Key: 7
2,820,556 UART: [art] Derive CDI
2,820,836 UART: [art] Store in in slot 0x4
2,906,249 UART: [art] Derive Key Pair
2,906,609 UART: [art] Store priv key in slot 0x5
2,920,181 UART: [art] Derive Key Pair - Done
2,934,836 UART: [art] Signing Cert with AUTHO
2,935,316 UART: RITY.KEYID = 7
2,950,640 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,405 UART: [art] PUB.X = B5B641023F47C4FBCBE4527380F7785062847E4FE778CE523DF199AAF1DF71E057ECFD4F0A3B6CC33EFEE5B1C7C6BF78
2,958,189 UART: [art] PUB.Y = 30ED75916AEE036A7B6D73E8656F4A56F19F980D5E9967067CF706AA4FCC4AEB9E8589B81A9D746F9D090662AA491A90
2,965,127 UART: [art] SIG.R = 49C4E498F121ECE35A095C98F9D45E5199241D95607DAEC81D16EA6A42FF6B746CCF29ADCD53AA34EE240B84FA00B39C
2,971,885 UART: [art] SIG.S = B46D4931289C0B469B0EC1357AC313919D7F781515BD89BC2EF6195DC0C6E4EDE40EFE0B5555857D4972BC0EBD0A10FD
2,995,450 UART: Caliptra RT
2,995,795 UART: [state] CFI Enabled
3,103,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,118,285 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,763 UART: [cold-reset] ++
1,170,211 UART: [fht] FHT @ 0x50003400
1,172,829 UART: [idev] ++
1,172,997 UART: [idev] CDI.KEYID = 6
1,173,358 UART: [idev] SUBJECT.KEYID = 7
1,173,783 UART: [idev] UDS.KEYID = 0
1,174,129 ready_for_fw is high
1,174,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,198,637 UART: [idev] Sha1 KeyId Algorithm
1,207,581 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,241,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,880 UART: [ldev] --
1,281,276 UART: [fwproc] Wait for Commands...
1,282,061 UART: [fwproc] Recv command 0x46574c44
1,282,794 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,985 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,260 >>> mbox cmd response: success
2,774,260 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,775,445 UART: [afmc] ++
2,775,613 UART: [afmc] CDI.KEYID = 6
2,775,976 UART: [afmc] SUBJECT.KEYID = 7
2,776,402 UART: [afmc] AUTHORITY.KEYID = 5
2,812,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,526 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,255 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,138 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,857 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,786 UART: [afmc] --
2,855,694 UART: [cold-reset] --
2,856,552 UART: [state] Locking Datavault
2,857,861 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,465 UART: [state] Locking ICCM
2,858,911 UART: [exit] Launching FMC @ 0x40000130
2,864,240 UART:
2,864,256 UART: Running Caliptra FMC ...
2,864,664 UART:
2,864,718 UART: [state] CFI Enabled
2,874,989 UART: [fht] FMC Alias Private Key: 7
2,983,402 UART: [art] Extend RT PCRs Done
2,983,830 UART: [art] Lock RT PCRs Done
2,985,080 UART: [art] Populate DV Done
2,993,491 UART: [fht] FMC Alias Private Key: 7
2,994,557 UART: [art] Derive CDI
2,994,837 UART: [art] Store in in slot 0x4
3,079,868 UART: [art] Derive Key Pair
3,080,228 UART: [art] Store priv key in slot 0x5
3,092,622 UART: [art] Derive Key Pair - Done
3,107,558 UART: [art] Signing Cert with AUTHO
3,108,038 UART: RITY.KEYID = 7
3,123,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,043 UART: [art] PUB.X = E158A277D52F3EF641A3BA26C5E2CD258B6BE982AD89DC220B4215731B927875E0CDC22A799EE76E7C9425CD11A44121
3,130,816 UART: [art] PUB.Y = 95FF5ABC679236CD291E372320C8BCB7A4CAA46BC0719E757BF4AEC84D2DDC65E3A56D4D90701E52004532FD6B83C43D
3,137,758 UART: [art] SIG.R = 311A6C8E3079C05911A70F32E8278BC5D1AD2CFB9D8DDB45772B9E32AD6D349BABF8DFC6694B36C256BC82BE0CA7395E
3,144,540 UART: [art] SIG.S = 5DC5CAFF1F2F3D1016B8EC0457C9D8E82A963B8DB627CFB5BC9DDFF01A9FBDFFE09AD75F046944831D471E8DB9217A68
3,168,251 UART: Caliptra RT
3,168,504 UART: [state] CFI Enabled
3,276,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,290,292 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,894 ready_for_fw is high
1,055,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,452 >>> mbox cmd response: success
2,623,452 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,684,730 UART:
2,684,746 UART: Running Caliptra FMC ...
2,685,154 UART:
2,685,208 UART: [state] CFI Enabled
2,695,809 UART: [fht] FMC Alias Private Key: 7
2,803,852 UART: [art] Extend RT PCRs Done
2,804,280 UART: [art] Lock RT PCRs Done
2,806,214 UART: [art] Populate DV Done
2,814,451 UART: [fht] FMC Alias Private Key: 7
2,815,529 UART: [art] Derive CDI
2,815,809 UART: [art] Store in in slot 0x4
2,901,682 UART: [art] Derive Key Pair
2,902,042 UART: [art] Store priv key in slot 0x5
2,915,036 UART: [art] Derive Key Pair - Done
2,929,788 UART: [art] Signing Cert with AUTHO
2,930,268 UART: RITY.KEYID = 7
2,945,442 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,207 UART: [art] PUB.X = EAAFCA7F6334954B6D9D9AE324C73378C563B728F0A6A6B7075C8B222708B731DAF87F8C35AF6B094E399DED2BFA73A4
2,952,982 UART: [art] PUB.Y = 7FE75419753274F973A503D2C9FD5E50928C79584C3D03C7A2B96B5617F139C1268C36911ACCD38A94DE25EB93A5F37C
2,959,926 UART: [art] SIG.R = 9D204BB471EFB664F9FBE21BB4767C5AC188FAD95837E6F28C15AEC8345C7265399E8E1146CA09E55E9D26584ADF41EF
2,966,705 UART: [art] SIG.S = EF14AAB49E6940C0C5747D8A4ED38D1BB9A3509F9C8F995616B6AA4C48A3B8DC4C2C7449007C520FC933D7BDD036DE96
2,990,725 UART: Caliptra RT
2,990,978 UART: [state] CFI Enabled
3,098,314 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,112,401 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,188 UART: [kat] SHA2-256
902,128 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,917 UART: [kat] HMAC-384Kdf
921,569 UART: [kat] LMS
1,169,881 UART: [kat] --
1,170,930 UART: [cold-reset] ++
1,171,464 UART: [fht] FHT @ 0x50003400
1,174,078 UART: [idev] ++
1,174,246 UART: [idev] CDI.KEYID = 6
1,174,607 UART: [idev] SUBJECT.KEYID = 7
1,175,032 UART: [idev] UDS.KEYID = 0
1,175,378 ready_for_fw is high
1,175,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,056 UART: [idev] Erasing UDS.KEYID = 0
1,200,316 UART: [idev] Sha1 KeyId Algorithm
1,209,184 UART: [idev] --
1,210,309 UART: [ldev] ++
1,210,477 UART: [ldev] CDI.KEYID = 6
1,210,841 UART: [ldev] SUBJECT.KEYID = 5
1,211,268 UART: [ldev] AUTHORITY.KEYID = 7
1,211,731 UART: [ldev] FE.KEYID = 1
1,217,101 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,667 UART: [ldev] --
1,283,033 UART: [fwproc] Wait for Commands...
1,283,798 UART: [fwproc] Recv command 0x46574c44
1,284,531 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,945 >>> mbox cmd response: success
2,775,945 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,777,104 UART: [afmc] ++
2,777,272 UART: [afmc] CDI.KEYID = 6
2,777,635 UART: [afmc] SUBJECT.KEYID = 7
2,778,061 UART: [afmc] AUTHORITY.KEYID = 5
2,813,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,039 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,651 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,370 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,193 UART: [afmc] --
2,857,141 UART: [cold-reset] --
2,858,129 UART: [state] Locking Datavault
2,859,264 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,868 UART: [state] Locking ICCM
2,860,324 UART: [exit] Launching FMC @ 0x40000130
2,865,653 UART:
2,865,669 UART: Running Caliptra FMC ...
2,866,077 UART:
2,866,220 UART: [state] CFI Enabled
2,876,831 UART: [fht] FMC Alias Private Key: 7
2,985,370 UART: [art] Extend RT PCRs Done
2,985,798 UART: [art] Lock RT PCRs Done
2,987,110 UART: [art] Populate DV Done
2,995,229 UART: [fht] FMC Alias Private Key: 7
2,996,267 UART: [art] Derive CDI
2,996,547 UART: [art] Store in in slot 0x4
3,082,166 UART: [art] Derive Key Pair
3,082,526 UART: [art] Store priv key in slot 0x5
3,095,676 UART: [art] Derive Key Pair - Done
3,110,478 UART: [art] Signing Cert with AUTHO
3,110,958 UART: RITY.KEYID = 7
3,126,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,843 UART: [art] PUB.X = 0B613DBCB7B118553C6EEB1496611E1BD14E0BF821C5A1169BB9AD91102C6F11C623CBB06173AD6CFC5375A967AF50CA
3,133,621 UART: [art] PUB.Y = 3DE39A2598DA53EE15E65531AE95B0536B028C2914B3C4966D5F6F8F55FAFC41837A3A9E16AAEF0A923AA15DE429A57C
3,140,577 UART: [art] SIG.R = B46FB8A61A10D9008EBB646B432473A7E134BEE029C6BEDE3A682A29BC5E17C8CAD1FAFBF9BFA080006312AE7D95D843
3,147,323 UART: [art] SIG.S = C2391A2ADF1824F18E8A1FC7631ABCF6187BC1066AFB92365484970B4591F44B0FDC2A54462AB87E7F7DDC246F7D4281
3,170,971 UART: Caliptra RT
3,171,316 UART: [state] CFI Enabled
3,279,560 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,293,679 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,747 ready_for_fw is high
1,056,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,459 >>> mbox cmd response: success
2,623,459 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,686,291 UART:
2,686,307 UART: Running Caliptra FMC ...
2,686,715 UART:
2,686,858 UART: [state] CFI Enabled
2,697,297 UART: [fht] FMC Alias Private Key: 7
2,804,970 UART: [art] Extend RT PCRs Done
2,805,398 UART: [art] Lock RT PCRs Done
2,806,788 UART: [art] Populate DV Done
2,815,047 UART: [fht] FMC Alias Private Key: 7
2,816,017 UART: [art] Derive CDI
2,816,297 UART: [art] Store in in slot 0x4
2,901,468 UART: [art] Derive Key Pair
2,901,828 UART: [art] Store priv key in slot 0x5
2,915,178 UART: [art] Derive Key Pair - Done
2,929,729 UART: [art] Signing Cert with AUTHO
2,930,209 UART: RITY.KEYID = 7
2,945,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,530 UART: [art] PUB.X = 198E43DA1116ABC24677C2E229C0EB4F9EA662D179EC8AE96690AA4B828509CF0999E10C3DAEFD7B3C02C8FF7DAB2E95
2,953,306 UART: [art] PUB.Y = F9F5B381A40573B81DED2AC7864CE8D1C7D16F35B852E81658FA1E5CD38F1F229918C267C8D06F24CE276E51A24011B2
2,960,259 UART: [art] SIG.R = 689A83D1402DB9A835906D44C7321057EE5EEF95C222672295207BC7CD70594149A019E39A1294B62FA2BA0B05650424
2,967,010 UART: [art] SIG.S = 9BE0BAB3590E2CAA3F4133BF5E3191DB8FA7098231B7EE314052CFFD321C211E3F074F21AEC14909F16FFE2F61E42371
2,990,901 UART: Caliptra RT
2,991,246 UART: [state] CFI Enabled
3,098,113 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,112,120 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,087 UART:
192,604 UART: Running Caliptra ROM ...
193,720 UART:
193,872 UART: [state] CFI Enabled
263,959 UART: [state] LifecycleState = Unprovisioned
265,818 UART: [state] DebugLocked = No
268,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,920 UART: [kat] SHA2-256
442,582 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,103 UART: [kat] ++
453,554 UART: [kat] sha1
465,062 UART: [kat] SHA2-256
467,790 UART: [kat] SHA2-384
474,649 UART: [kat] SHA2-512-ACC
477,017 UART: [kat] ECC-384
2,766,178 UART: [kat] HMAC-384Kdf
2,777,927 UART: [kat] LMS
3,968,243 UART: [kat] --
3,971,676 UART: [cold-reset] ++
3,973,535 UART: [fht] Storing FHT @ 0x50003400
3,984,513 UART: [idev] ++
3,985,098 UART: [idev] CDI.KEYID = 6
3,985,986 UART: [idev] SUBJECT.KEYID = 7
3,987,300 UART: [idev] UDS.KEYID = 0
3,988,353 ready_for_fw is high
3,988,561 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,098 UART: [idev] Erasing UDS.KEYID = 0
7,323,167 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,931 UART: [idev] --
7,348,726 UART: [ldev] ++
7,349,300 UART: [ldev] CDI.KEYID = 6
7,350,241 UART: [ldev] SUBJECT.KEYID = 5
7,351,449 UART: [ldev] AUTHORITY.KEYID = 7
7,352,729 UART: [ldev] FE.KEYID = 1
7,379,882 UART: [ldev] Erasing FE.KEYID = 1
10,713,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,475 UART: [ldev] --
13,095,566 UART: [fwproc] Waiting for Commands...
13,098,851 UART: [fwproc] Received command 0x46574c44
13,101,089 UART: [fwproc] Received Image of size 114124 bytes
17,155,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,204 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,084 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,619,609 >>> mbox cmd response: success
17,623,138 UART: [afmc] ++
17,623,733 UART: [afmc] CDI.KEYID = 6
17,624,653 UART: [afmc] SUBJECT.KEYID = 7
17,625,928 UART: [afmc] AUTHORITY.KEYID = 5
20,983,635 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,879 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,159 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,545 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,403 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,804 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,364 UART: [afmc] --
23,357,499 UART: [cold-reset] --
23,362,609 UART: [state] Locking Datavault
23,368,576 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,278 UART: [state] Locking ICCM
23,372,864 UART: [exit] Launching FMC @ 0x40000130
23,381,261 UART:
23,381,503 UART: Running Caliptra FMC ...
23,382,604 UART:
23,382,767 UART: [state] CFI Enabled
23,443,180 UART: [fht] FMC Alias Private Key: 7
25,780,917 UART: [art] Extend RT PCRs Done
25,782,151 UART: [art] Lock RT PCRs Done
25,783,811 UART: [art] Populate DV Done
25,789,172 UART: [fht] FMC Alias Private Key: 7
25,790,939 UART: [art] Derive CDI
25,791,756 UART: [art] Store in in slot 0x4
25,851,056 UART: [art] Derive Key Pair
25,852,074 UART: [art] Store priv key in slot 0x5
29,144,786 UART: [art] Derive Key Pair - Done
29,157,450 UART: [art] Signing Cert with AUTHO
29,158,777 UART: RITY.KEYID = 7
31,445,712 UART: [art] Erasing AUTHORITY.KEYID = 7
31,447,213 UART: [art] PUB.X = 5EA235C2CE43B13D127348154BE3BCC86B8023952B57E2B87473BE2987FC48632BE32A355CAD40BDD952B7DC7AE635DD
31,454,465 UART: [art] PUB.Y = 6BB12AA3EBF36D6BD03C891C744CF70FD1CDEB4DD11767022A302C11D3E3B4FDECC2C36519A37C84E43AD700D3217841
31,461,742 UART: [art] SIG.R = 6BF7C83963791965F72933AEC79E4D40B4BBC97DC889418C73DC2CBF088985AB86C3F22A53514B3B2722BF1FAD3D020F
31,469,078 UART: [art] SIG.S = 4CFB393463BABC97F97B56DF3B02A453A650FA9FC9D7A56E6BFA3FF6F016C9A4897757DF49872C0CCAE4B89368BFFE4A
32,774,265 UART: Caliptra RT
32,774,981 UART: [state] CFI Enabled
32,935,563 UART: [rt] RT listening for mailbox commands...
32,938,386 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,970,096 UART: [rt]cmd =0x53494756, len=196
34,261,734 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,808,222 ready_for_fw is high
3,808,835 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,892,179 >>> mbox cmd response: success
23,590,549 UART:
23,590,936 UART: Running Caliptra FMC ...
23,592,086 UART:
23,592,252 UART: [state] CFI Enabled
23,659,388 UART: [fht] FMC Alias Private Key: 7
25,997,746 UART: [art] Extend RT PCRs Done
25,998,966 UART: [art] Lock RT PCRs Done
26,000,437 UART: [art] Populate DV Done
26,005,937 UART: [fht] FMC Alias Private Key: 7
26,007,544 UART: [art] Derive CDI
26,008,367 UART: [art] Store in in slot 0x4
26,068,532 UART: [art] Derive Key Pair
26,069,577 UART: [art] Store priv key in slot 0x5
29,362,673 UART: [art] Derive Key Pair - Done
29,375,732 UART: [art] Signing Cert with AUTHO
29,377,045 UART: RITY.KEYID = 7
31,665,111 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,627 UART: [art] PUB.X = FE29CFA95C618AAD2DCC105DE3C387398AA0C4445A1403C850158CACD0F8665B2FEA9A41F1164576AF3499A2DA91E772
31,673,912 UART: [art] PUB.Y = 2EAD5A2A46DF123300E0EEB65809257C6784CA1CE6791E66BA431E94F3D18F00FFCF8E517C9102CB4DC2477347D4A666
31,681,130 UART: [art] SIG.R = 37721608CF79B96B8017CA6A8FA4CBFC6815A894702FAB89B9076419014BE16B5988B72F0B33DCD37CB8E9272766A71E
31,688,503 UART: [art] SIG.S = 8A780BF166C0834C040169B1CE1DC1CD07009009EC979172ECBBB7B506720FE0095A9399132856E41911FB3ED925D75E
32,993,736 UART: Caliptra RT
32,994,455 UART: [state] CFI Enabled
33,155,602 UART: [rt] RT listening for mailbox commands...
33,158,447 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,190,044 UART: [rt]cmd =0x53494756, len=196
34,481,933 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,344 UART:
192,746 UART: Running Caliptra ROM ...
193,870 UART:
603,522 UART: [state] CFI Enabled
619,187 UART: [state] LifecycleState = Unprovisioned
621,053 UART: [state] DebugLocked = No
623,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,177 UART: [kat] SHA2-256
797,929 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,448 UART: [kat] ++
808,961 UART: [kat] sha1
819,611 UART: [kat] SHA2-256
822,328 UART: [kat] SHA2-384
827,887 UART: [kat] SHA2-512-ACC
830,251 UART: [kat] ECC-384
3,113,751 UART: [kat] HMAC-384Kdf
3,125,271 UART: [kat] LMS
4,315,409 UART: [kat] --
4,320,486 UART: [cold-reset] ++
4,322,554 UART: [fht] Storing FHT @ 0x50003400
4,334,167 UART: [idev] ++
4,334,734 UART: [idev] CDI.KEYID = 6
4,335,707 UART: [idev] SUBJECT.KEYID = 7
4,336,945 UART: [idev] UDS.KEYID = 0
4,337,924 ready_for_fw is high
4,338,121 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,469 UART: [idev] Erasing UDS.KEYID = 0
7,619,786 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,217 UART: [idev] --
7,647,205 UART: [ldev] ++
7,647,788 UART: [ldev] CDI.KEYID = 6
7,648,763 UART: [ldev] SUBJECT.KEYID = 5
7,649,920 UART: [ldev] AUTHORITY.KEYID = 7
7,651,219 UART: [ldev] FE.KEYID = 1
7,663,698 UART: [ldev] Erasing FE.KEYID = 1
10,952,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,312 UART: [ldev] --
13,312,249 UART: [fwproc] Waiting for Commands...
13,314,059 UART: [fwproc] Received command 0x46574c44
13,316,250 UART: [fwproc] Received Image of size 114124 bytes
17,373,473 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,458,440 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,527,319 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,844,732 >>> mbox cmd response: success
17,848,028 UART: [afmc] ++
17,848,637 UART: [afmc] CDI.KEYID = 6
17,849,519 UART: [afmc] SUBJECT.KEYID = 7
17,850,786 UART: [afmc] AUTHORITY.KEYID = 5
21,165,303 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,211 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,520 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,899 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,734 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,149 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,164 UART: [afmc] --
23,526,757 UART: [cold-reset] --
23,530,883 UART: [state] Locking Datavault
23,537,153 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,900 UART: [state] Locking ICCM
23,541,047 UART: [exit] Launching FMC @ 0x40000130
23,549,440 UART:
23,549,690 UART: Running Caliptra FMC ...
23,550,790 UART:
23,550,944 UART: [state] CFI Enabled
23,559,027 UART: [fht] FMC Alias Private Key: 7
25,889,912 UART: [art] Extend RT PCRs Done
25,891,127 UART: [art] Lock RT PCRs Done
25,892,687 UART: [art] Populate DV Done
25,898,197 UART: [fht] FMC Alias Private Key: 7
25,899,777 UART: [art] Derive CDI
25,900,580 UART: [art] Store in in slot 0x4
25,942,792 UART: [art] Derive Key Pair
25,943,780 UART: [art] Store priv key in slot 0x5
29,185,800 UART: [art] Derive Key Pair - Done
29,199,010 UART: [art] Signing Cert with AUTHO
29,200,314 UART: RITY.KEYID = 7
31,480,044 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,587 UART: [art] PUB.X = 5150791DC4A1A604AC1484928D59162DEBF4B0C09194694D4CFA036888B85A3F3238BA7900906AAE5F7AAA6EFF7F8057
31,488,819 UART: [art] PUB.Y = 6CF763752D598D02D450FC0448290C56E2FF800C3CEB9FF973F0F3122D4B83DA41FAE388BFD5C8F279B1BFEAB1CBF2E5
31,496,088 UART: [art] SIG.R = 9D2CEF963D7B99526165BF62C8790179126310B2F6F1A422161488D016910AF1951B6D587B2E33246E1FD9C189E3745C
31,503,463 UART: [art] SIG.S = F878459421A19FB5ADEF04DC8FA9652CEBC9DF67711E6FCEDFE897241B21D8EDBAAEEF7848ECCCAB3E37F78ECB46A6B6
32,808,507 UART: Caliptra RT
32,809,207 UART: [state] CFI Enabled
32,927,190 UART: [rt] RT listening for mailbox commands...
32,929,996 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,961,583 UART: [rt]cmd =0x53494756, len=196
34,252,868 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
4,133,209 ready_for_fw is high
4,133,599 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,944 >>> mbox cmd response: success
23,717,122 UART:
23,717,528 UART: Running Caliptra FMC ...
23,718,659 UART:
23,718,818 UART: [state] CFI Enabled
23,726,479 UART: [fht] FMC Alias Private Key: 7
26,056,780 UART: [art] Extend RT PCRs Done
26,058,010 UART: [art] Lock RT PCRs Done
26,059,445 UART: [art] Populate DV Done
26,064,918 UART: [fht] FMC Alias Private Key: 7
26,066,565 UART: [art] Derive CDI
26,067,321 UART: [art] Store in in slot 0x4
26,109,974 UART: [art] Derive Key Pair
26,111,016 UART: [art] Store priv key in slot 0x5
29,353,056 UART: [art] Derive Key Pair - Done
29,366,111 UART: [art] Signing Cert with AUTHO
29,367,413 UART: RITY.KEYID = 7
31,646,858 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,367 UART: [art] PUB.X = C87C8A53F657BBED2EFC8ECA21D21D6BE58D13F540D084C6F004900AE159064CB03E62D42047C2FAC5682B488C821FB1
31,655,627 UART: [art] PUB.Y = E0A0EF47334D06FF8C300B2C61234728C0D020E5D5AEB574C52DF66029D040072E52633D47EE75F33797FF59A2168A8F
31,662,853 UART: [art] SIG.R = 409182BB44BB177F34508A48B3D93AEA4303113D10462F3637835AA56C7CE4AE74E7ED81BCD44B67EB4AB24155117E58
31,670,234 UART: [art] SIG.S = 090DD4D072CA53238ED9BDD7D25AB77D5E4955CE2D25126BB8FA060461624D205EE5DED458EA0177C2EB84F95ED7DEF2
32,975,383 UART: Caliptra RT
32,976,085 UART: [state] CFI Enabled
33,092,524 UART: [rt] RT listening for mailbox commands...
33,095,348 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,126,868 UART: [rt]cmd =0x53494756, len=196
34,418,624 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,077 UART:
192,471 UART: Running Caliptra ROM ...
193,683 UART:
193,840 UART: [state] CFI Enabled
261,750 UART: [state] LifecycleState = Unprovisioned
263,667 UART: [state] DebugLocked = No
266,325 UART: [state] WD Timer not started. Device not locked for debugging
269,655 UART: [kat] SHA2-256
448,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,322 UART: [kat] ++
460,859 UART: [kat] sha1
471,671 UART: [kat] SHA2-256
474,672 UART: [kat] SHA2-384
480,196 UART: [kat] SHA2-512-ACC
483,109 UART: [kat] ECC-384
2,947,193 UART: [kat] HMAC-384Kdf
2,972,960 UART: [kat] LMS
3,502,411 UART: [kat] --
3,506,161 UART: [cold-reset] ++
3,508,308 UART: [fht] FHT @ 0x50003400
3,518,810 UART: [idev] ++
3,519,422 UART: [idev] CDI.KEYID = 6
3,520,346 UART: [idev] SUBJECT.KEYID = 7
3,521,518 UART: [idev] UDS.KEYID = 0
3,522,442 ready_for_fw is high
3,522,651 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,537 UART: [idev] Erasing UDS.KEYID = 0
6,027,599 UART: [idev] Sha1 KeyId Algorithm
6,050,241 UART: [idev] --
6,053,694 UART: [ldev] ++
6,054,262 UART: [ldev] CDI.KEYID = 6
6,055,179 UART: [ldev] SUBJECT.KEYID = 5
6,056,390 UART: [ldev] AUTHORITY.KEYID = 7
6,057,638 UART: [ldev] FE.KEYID = 1
6,101,243 UART: [ldev] Erasing FE.KEYID = 1
8,606,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,123 UART: [ldev] --
10,407,887 UART: [fwproc] Wait for Commands...
10,410,035 UART: [fwproc] Recv command 0x46574c44
10,412,128 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,280,517 >>> mbox cmd response: success
14,285,197 UART: [afmc] ++
14,285,814 UART: [afmc] CDI.KEYID = 6
14,286,702 UART: [afmc] SUBJECT.KEYID = 7
14,287,807 UART: [afmc] AUTHORITY.KEYID = 5
16,819,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,351 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,157 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,156 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,034 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,116 UART: [afmc] --
18,624,441 UART: [cold-reset] --
18,627,650 UART: [state] Locking Datavault
18,633,158 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,854 UART: [state] Locking ICCM
18,636,753 UART: [exit] Launching FMC @ 0x40000130
18,645,192 UART:
18,645,453 UART: Running Caliptra FMC ...
18,646,557 UART:
18,646,724 UART: [state] CFI Enabled
18,703,583 UART: [fht] FMC Alias Private Key: 7
20,467,928 UART: [art] Extend RT PCRs Done
20,469,142 UART: [art] Lock RT PCRs Done
20,470,764 UART: [art] Populate DV Done
20,476,011 UART: [fht] FMC Alias Private Key: 7
20,477,588 UART: [art] Derive CDI
20,478,332 UART: [art] Store in in slot 0x4
20,536,667 UART: [art] Derive Key Pair
20,537,668 UART: [art] Store priv key in slot 0x5
23,000,558 UART: [art] Derive Key Pair - Done
23,013,175 UART: [art] Signing Cert with AUTHO
23,014,477 UART: RITY.KEYID = 7
24,725,809 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,327 UART: [art] PUB.X = DBD22F867CF61B339F99DEBA459C940A4DBCA063291C664D07FF5728109251818BFB292BD50CE5F8FF0257D177D29A3E
24,734,579 UART: [art] PUB.Y = 08D97643195A8EE0BADD8199FC63967AD1C6EAC587029E0B140BDD88E5C7F373CB66E66846CD3942C69A169C09D6FA0C
24,741,822 UART: [art] SIG.R = BDE78B3021B8904BCB15DC9B74314E4F8A65431D22DFDE8BCC29215C4FFD6D81DBA8D0CF36E2DCAD9F6C31D899C07DB1
24,749,275 UART: [art] SIG.S = C333D19324DE1597411F8EC4D78F5DE14C4468BB3E1C7C7C0DF4694351161A02D5A728DCB5735A69ED217F7B23812DB5
25,727,700 UART: Caliptra RT
25,728,408 UART: [state] CFI Enabled
25,893,639 UART: [rt] RT listening for mailbox commands...
25,896,409 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,928,547 UART: [rt]cmd =0x53494756, len=196
26,894,545 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,381,114 ready_for_fw is high
3,381,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,064,868 >>> mbox cmd response: success
18,342,299 UART:
18,342,695 UART: Running Caliptra FMC ...
18,343,812 UART:
18,343,966 UART: [state] CFI Enabled
18,412,732 UART: [fht] FMC Alias Private Key: 7
20,177,306 UART: [art] Extend RT PCRs Done
20,178,522 UART: [art] Lock RT PCRs Done
20,180,392 UART: [art] Populate DV Done
20,185,777 UART: [fht] FMC Alias Private Key: 7
20,187,372 UART: [art] Derive CDI
20,188,123 UART: [art] Store in in slot 0x4
20,245,762 UART: [art] Derive Key Pair
20,246,767 UART: [art] Store priv key in slot 0x5
22,709,982 UART: [art] Derive Key Pair - Done
22,722,877 UART: [art] Signing Cert with AUTHO
22,724,183 UART: RITY.KEYID = 7
24,435,032 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,532 UART: [art] PUB.X = A2EE5A2B4B4CE49C5E6E9C3009D2D23E2FB5CAF7EF8BDFB1F5B1188B9AE377CC716C6C1E6C2C0FE6B4D3831C32FD3B3F
24,443,828 UART: [art] PUB.Y = B3F0B58DD256ED3BEE43648C949ADFFB4E8ADFFA50A14D1250E33DBB24176C5E847B1C9E73DCF0FCB3902E67112201B3
24,451,145 UART: [art] SIG.R = 5A5E8A5FE10E408B4995E01D0330AC7B734E560694B8827F62C52EF258ED038E6BF4609A0B9F81DD3BA408E93DA9FB02
24,458,532 UART: [art] SIG.S = 2DCC9206935D31BC9505303E1FEFBEC8A6BF9778065BBDB8414836D9079878CCF141E97E04DC113D8DB33752A393EF77
25,437,528 UART: Caliptra RT
25,438,255 UART: [state] CFI Enabled
25,602,235 UART: [rt] RT listening for mailbox commands...
25,605,040 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,637,341 UART: [rt]cmd =0x53494756, len=196
26,603,006 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,427 UART:
192,809 UART: Running Caliptra ROM ...
193,899 UART:
603,460 UART: [state] CFI Enabled
616,694 UART: [state] LifecycleState = Unprovisioned
618,558 UART: [state] DebugLocked = No
620,352 UART: [state] WD Timer not started. Device not locked for debugging
623,241 UART: [kat] SHA2-256
802,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,935 UART: [kat] ++
814,398 UART: [kat] sha1
824,908 UART: [kat] SHA2-256
827,986 UART: [kat] SHA2-384
832,976 UART: [kat] SHA2-512-ACC
835,983 UART: [kat] ECC-384
3,282,384 UART: [kat] HMAC-384Kdf
3,294,280 UART: [kat] LMS
3,823,723 UART: [kat] --
3,829,632 UART: [cold-reset] ++
3,831,708 UART: [fht] FHT @ 0x50003400
3,841,828 UART: [idev] ++
3,842,382 UART: [idev] CDI.KEYID = 6
3,843,401 UART: [idev] SUBJECT.KEYID = 7
3,844,493 UART: [idev] UDS.KEYID = 0
3,845,529 ready_for_fw is high
3,845,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,856 UART: [idev] Erasing UDS.KEYID = 0
6,313,541 UART: [idev] Sha1 KeyId Algorithm
6,337,561 UART: [idev] --
6,340,011 UART: [ldev] ++
6,340,591 UART: [ldev] CDI.KEYID = 6
6,341,494 UART: [ldev] SUBJECT.KEYID = 5
6,342,697 UART: [ldev] AUTHORITY.KEYID = 7
6,343,918 UART: [ldev] FE.KEYID = 1
6,354,230 UART: [ldev] Erasing FE.KEYID = 1
8,829,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,740 UART: [ldev] --
10,619,647 UART: [fwproc] Wait for Commands...
10,621,216 UART: [fwproc] Recv command 0x46574c44
10,623,306 UART: [fwproc] Recv'd Img size: 114448 bytes
14,021,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,446 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,480,399 >>> mbox cmd response: success
14,484,120 UART: [afmc] ++
14,484,727 UART: [afmc] CDI.KEYID = 6
14,485,638 UART: [afmc] SUBJECT.KEYID = 7
14,486,790 UART: [afmc] AUTHORITY.KEYID = 5
16,986,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,559 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,580 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,406 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,786 UART: [afmc] --
18,783,081 UART: [cold-reset] --
18,788,515 UART: [state] Locking Datavault
18,794,185 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,823 UART: [state] Locking ICCM
18,798,504 UART: [exit] Launching FMC @ 0x40000130
18,806,953 UART:
18,807,190 UART: Running Caliptra FMC ...
18,808,281 UART:
18,808,432 UART: [state] CFI Enabled
18,816,627 UART: [fht] FMC Alias Private Key: 7
20,573,637 UART: [art] Extend RT PCRs Done
20,574,855 UART: [art] Lock RT PCRs Done
20,576,413 UART: [art] Populate DV Done
20,581,824 UART: [fht] FMC Alias Private Key: 7
20,583,409 UART: [art] Derive CDI
20,584,233 UART: [art] Store in in slot 0x4
20,626,562 UART: [art] Derive Key Pair
20,627,559 UART: [art] Store priv key in slot 0x5
23,054,041 UART: [art] Derive Key Pair - Done
23,066,880 UART: [art] Signing Cert with AUTHO
23,068,180 UART: RITY.KEYID = 7
24,773,871 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,372 UART: [art] PUB.X = BA91D437DDB8BF0BD8E2E7A0303B334AAB77017A1C75EE2EDE8C56F5270F8F20C2F75ED5D5218AF31DEED7AAC635A1C6
24,782,659 UART: [art] PUB.Y = 2F2AE60FC0307F40F3CD184FFBD25F1D13DF36B7A52A29324DA3A663B9C5E901B254F3BC6B71719445896886E4EFD4D8
24,789,925 UART: [art] SIG.R = 766BA0769C20A493923AFF8CAD6ED30CDE59FB3F1AD8FA020534A8433B892DBC61209007A76BD7BDA67B34A606D6CB9E
24,797,297 UART: [art] SIG.S = 9A2E2AD738DCA2B300063BD3EAF70579086B4AE547A8C3920C1C2D0C67E9EDD1CD98E4EDCA3B7C5066F281CFC714C951
25,776,791 UART: Caliptra RT
25,777,489 UART: [state] CFI Enabled
25,893,895 UART: [rt] RT listening for mailbox commands...
25,896,730 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,928,317 UART: [rt]cmd =0x53494756, len=196
26,893,640 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,697,981 ready_for_fw is high
3,698,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,529 >>> mbox cmd response: success
18,526,170 UART:
18,526,555 UART: Running Caliptra FMC ...
18,527,739 UART:
18,527,895 UART: [state] CFI Enabled
18,536,000 UART: [fht] FMC Alias Private Key: 7
20,292,282 UART: [art] Extend RT PCRs Done
20,293,500 UART: [art] Lock RT PCRs Done
20,295,392 UART: [art] Populate DV Done
20,301,022 UART: [fht] FMC Alias Private Key: 7
20,302,551 UART: [art] Derive CDI
20,303,315 UART: [art] Store in in slot 0x4
20,345,748 UART: [art] Derive Key Pair
20,346,739 UART: [art] Store priv key in slot 0x5
22,773,860 UART: [art] Derive Key Pair - Done
22,786,653 UART: [art] Signing Cert with AUTHO
22,787,991 UART: RITY.KEYID = 7
24,493,582 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,070 UART: [art] PUB.X = 87E694D972782EAFF3A51F6804EBD407CF81956EB62DFA004B7B2A74F2451EC98CE71B2795F3950F7B1C5CF7AF092906
24,502,309 UART: [art] PUB.Y = 16D782E8B5D56F51B22003304D500AA668A83DB8188C6E6D998CC16BAFCD9F5102FFB48B8C55E9FCCA03DFD07972472D
24,509,598 UART: [art] SIG.R = 9E565C2CEC4FBA6CB6877869067D66771EED2AF9132E925C9B92ACE2D14BEF9F325590BAA956F4D52BFDBF5D1BD8A91C
24,517,029 UART: [art] SIG.S = C607417E01EE997987FB0B0D006742D5B620F0E02A1139060389E99B26DFA0243F2D1FC5BEA86108085CFC3AE470A937
25,495,453 UART: Caliptra RT
25,496,168 UART: [state] CFI Enabled
25,612,320 UART: [rt] RT listening for mailbox commands...
25,615,063 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,646,545 UART: [rt]cmd =0x53494756, len=196
26,611,768 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,435,449 ready_for_fw is high
3,435,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,741,360 >>> mbox cmd response: success
19,026,769 UART:
19,027,177 UART: Running Caliptra FMC ...
19,028,342 UART:
19,028,513 UART: [state] CFI Enabled
19,096,084 UART: [fht] FMC Alias Private Key: 7
20,859,762 UART: [art] Extend RT PCRs Done
20,860,976 UART: [art] Lock RT PCRs Done
20,862,605 UART: [art] Populate DV Done
20,868,231 UART: [fht] FMC Alias Private Key: 7
20,869,939 UART: [art] Derive CDI
20,870,755 UART: [art] Store in in slot 0x4
20,928,783 UART: [art] Derive Key Pair
20,929,825 UART: [art] Store priv key in slot 0x5
23,392,882 UART: [art] Derive Key Pair - Done
23,405,992 UART: [art] Signing Cert with AUTHO
23,407,301 UART: RITY.KEYID = 7
25,119,028 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,526 UART: [art] PUB.X = 17B7709594D515511992163BDB82ABA00976F527673D9B77330212C61861FD5816B8567E9578F625A9367CC98EB63C27
25,127,816 UART: [art] PUB.Y = 62B79D2EC404983C2ADDBF863BF08BF18444C53FF27185059329FFE698A9B13CF03CB5A5792F19454A68DF1ACE7A2B10
25,135,021 UART: [art] SIG.R = AA5206ADFFE0B7865937C4C85E636C9455D9B79299897866CA061E985691F93773A326A2C484D2591FDDCB48706AF1A6
25,142,420 UART: [art] SIG.S = C22160487C20512BDBA6E71B7D0145ABEAE21D3BB9C727A6288970FE42B993C837872AC5BBE244ED197E97001C23BE75
26,121,129 UART: Caliptra RT
26,121,861 UART: [state] CFI Enabled
26,288,080 UART: [rt] RT listening for mailbox commands...
26,290,891 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,323,241 UART: [rt]cmd =0x53494756, len=196
27,288,691 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,754,966 ready_for_fw is high
3,755,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,465 >>> mbox cmd response: success
19,211,932 UART:
19,212,317 UART: Running Caliptra FMC ...
19,213,419 UART:
19,213,559 UART: [state] CFI Enabled
19,221,722 UART: [fht] FMC Alias Private Key: 7
20,978,179 UART: [art] Extend RT PCRs Done
20,979,396 UART: [art] Lock RT PCRs Done
20,981,155 UART: [art] Populate DV Done
20,986,510 UART: [fht] FMC Alias Private Key: 7
20,987,988 UART: [art] Derive CDI
20,988,720 UART: [art] Store in in slot 0x4
21,031,143 UART: [art] Derive Key Pair
21,032,138 UART: [art] Store priv key in slot 0x5
23,458,679 UART: [art] Derive Key Pair - Done
23,471,887 UART: [art] Signing Cert with AUTHO
23,473,212 UART: RITY.KEYID = 7
25,178,879 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,385 UART: [art] PUB.X = 17D21FDA627F298E662B143BBD104F077BD2F3F38386797FF44D899B3EE33D82C1D3A3B43D0F92414E61887663E674E8
25,187,656 UART: [art] PUB.Y = 0856DFA0F7C541EDE1269DD6F3F11DF613F21DF944E61EE0F438011738A274D69E63DC3C59D53E7FA404D6F21C1ED12B
25,194,928 UART: [art] SIG.R = D7E8014647DBA0528791EE9EFEAF2B85909D16366536837CDBE6113BA5374B8574C467EDEC9B0DB23F0A457BEEB20687
25,202,283 UART: [art] SIG.S = 5E82E2483A233B6C7B5206B6FC9156EF3D9E0613A942B183E0BD52C4CA606958B0931C00D8E34F887555CA4EE92D9A0F
26,180,906 UART: Caliptra RT
26,181,606 UART: [state] CFI Enabled
26,298,324 UART: [rt] RT listening for mailbox commands...
26,301,117 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,332,656 UART: [rt]cmd =0x53494756, len=196
27,298,321 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,119 UART: [kat] SHA2-256
882,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,165 UART: [kat] ++
886,317 UART: [kat] sha1
890,583 UART: [kat] SHA2-256
892,521 UART: [kat] SHA2-384
895,424 UART: [kat] SHA2-512-ACC
897,325 UART: [kat] ECC-384
902,800 UART: [kat] HMAC-384Kdf
907,280 UART: [kat] LMS
1,475,476 UART: [kat] --
1,476,511 UART: [cold-reset] ++
1,476,919 UART: [fht] Storing FHT @ 0x50003400
1,479,566 UART: [idev] ++
1,479,734 UART: [idev] CDI.KEYID = 6
1,480,094 UART: [idev] SUBJECT.KEYID = 7
1,480,518 UART: [idev] UDS.KEYID = 0
1,480,863 ready_for_fw is high
1,480,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,420 UART: [idev] Erasing UDS.KEYID = 0
1,505,114 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,640 UART: [idev] --
1,514,665 UART: [ldev] ++
1,514,833 UART: [ldev] CDI.KEYID = 6
1,515,196 UART: [ldev] SUBJECT.KEYID = 5
1,515,622 UART: [ldev] AUTHORITY.KEYID = 7
1,516,085 UART: [ldev] FE.KEYID = 1
1,521,057 UART: [ldev] Erasing FE.KEYID = 1
1,546,098 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,964 UART: [ldev] --
1,585,273 UART: [fwproc] Waiting for Commands...
1,585,984 UART: [fwproc] Received command 0x46574c44
1,586,775 UART: [fwproc] Received Image of size 114448 bytes
2,886,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,564 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,916 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,869 >>> mbox cmd response: success
3,079,987 UART: [afmc] ++
3,080,155 UART: [afmc] CDI.KEYID = 6
3,080,517 UART: [afmc] SUBJECT.KEYID = 7
3,080,942 UART: [afmc] AUTHORITY.KEYID = 5
3,116,245 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,149 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,929 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,542 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,232 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,125 UART: [afmc] --
3,159,151 UART: [cold-reset] --
3,159,903 UART: [state] Locking Datavault
3,161,062 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,666 UART: [state] Locking ICCM
3,162,116 UART: [exit] Launching FMC @ 0x40000130
3,167,445 UART:
3,167,461 UART: Running Caliptra FMC ...
3,167,869 UART:
3,167,923 UART: [state] CFI Enabled
3,178,174 UART: [fht] FMC Alias Private Key: 7
3,285,663 UART: [art] Extend RT PCRs Done
3,286,091 UART: [art] Lock RT PCRs Done
3,287,559 UART: [art] Populate DV Done
3,295,604 UART: [fht] FMC Alias Private Key: 7
3,296,650 UART: [art] Derive CDI
3,296,930 UART: [art] Store in in slot 0x4
3,382,459 UART: [art] Derive Key Pair
3,382,819 UART: [art] Store priv key in slot 0x5
3,395,701 UART: [art] Derive Key Pair - Done
3,410,793 UART: [art] Signing Cert with AUTHO
3,411,273 UART: RITY.KEYID = 7
3,426,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,466 UART: [art] PUB.X = 808D09F253AA36D483FC0841181E6210040EF0862292D50F660E85964BD21A386259C0A6ECD1E017241C00A1A5EF4640
3,434,188 UART: [art] PUB.Y = 9ACA433EED43DF81C78689B26DF45BDED0AF954830FA41B87687F795DB880510DF0BA9F413CC97E9046AFDD2307C10C0
3,441,143 UART: [art] SIG.R = 01C8A6AE0FCD46B325BC3D43D860E2E4E65A515224F735A6AAA79508E945BBFC2ABC12A5DD1BEF7A689E715387A9FF38
3,447,922 UART: [art] SIG.S = 433CB8F55A819C7C30B53E4B6E07FA56CD02DD15D1B6E4A9D7C7A9409EA9EEE256AB1999C2836D155B0F20536254FA03
3,471,245 UART: Caliptra RT
3,471,498 UART: [state] CFI Enabled
3,579,034 UART: [rt] RT listening for mailbox commands...
3,579,704 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,538 UART: [rt]cmd =0x53494756, len=196
3,615,465 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,253 ready_for_fw is high
1,362,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,419 >>> mbox cmd response: success
2,990,629 UART:
2,990,645 UART: Running Caliptra FMC ...
2,991,053 UART:
2,991,107 UART: [state] CFI Enabled
3,001,596 UART: [fht] FMC Alias Private Key: 7
3,108,751 UART: [art] Extend RT PCRs Done
3,109,179 UART: [art] Lock RT PCRs Done
3,110,519 UART: [art] Populate DV Done
3,118,592 UART: [fht] FMC Alias Private Key: 7
3,119,638 UART: [art] Derive CDI
3,119,918 UART: [art] Store in in slot 0x4
3,205,297 UART: [art] Derive Key Pair
3,205,657 UART: [art] Store priv key in slot 0x5
3,219,047 UART: [art] Derive Key Pair - Done
3,233,833 UART: [art] Signing Cert with AUTHO
3,234,313 UART: RITY.KEYID = 7
3,249,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,420 UART: [art] PUB.X = D318C9CC7D07557BF6E8E7B948736F175C3B78EE4F2FE527EDFEA4137B4487F383C86AA3D19ACA527877D66EFA0C5A8D
3,257,200 UART: [art] PUB.Y = F6EFC3016917D79C033A9899DA6887A02C556F93EAA250F7E864A93E2D12ABA4CA259AF91BA1D1D9A3A024A2BDCEF9F9
3,264,162 UART: [art] SIG.R = AEBEAEE13E6F3F0A1D69C04A0EB6BDCED18803440C1AA3EF63851E7A5C75D77CD27517DCB751794C47FBE432A950B8B7
3,270,942 UART: [art] SIG.S = 8BB11CAC9C178E59BA5D25AFF0CCB446754750BEA726F863A1E21C1BF2C4E7F68B5A0116F7087E0EACA2C1EBF2573D86
3,294,320 UART: Caliptra RT
3,294,573 UART: [state] CFI Enabled
3,401,965 UART: [rt] RT listening for mailbox commands...
3,402,635 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,507 UART: [rt]cmd =0x53494756, len=196
3,438,656 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,594 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,274 UART: [kat] SHA2-256
882,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,320 UART: [kat] ++
886,472 UART: [kat] sha1
890,688 UART: [kat] SHA2-256
892,626 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
902,945 UART: [kat] HMAC-384Kdf
907,693 UART: [kat] LMS
1,475,889 UART: [kat] --
1,476,726 UART: [cold-reset] ++
1,477,074 UART: [fht] Storing FHT @ 0x50003400
1,479,899 UART: [idev] ++
1,480,067 UART: [idev] CDI.KEYID = 6
1,480,427 UART: [idev] SUBJECT.KEYID = 7
1,480,851 UART: [idev] UDS.KEYID = 0
1,481,196 ready_for_fw is high
1,481,196 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,145 UART: [idev] Erasing UDS.KEYID = 0
1,505,571 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,233 UART: [idev] --
1,515,312 UART: [ldev] ++
1,515,480 UART: [ldev] CDI.KEYID = 6
1,515,843 UART: [ldev] SUBJECT.KEYID = 5
1,516,269 UART: [ldev] AUTHORITY.KEYID = 7
1,516,732 UART: [ldev] FE.KEYID = 1
1,521,678 UART: [ldev] Erasing FE.KEYID = 1
1,547,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,121 UART: [ldev] --
1,586,542 UART: [fwproc] Waiting for Commands...
1,587,259 UART: [fwproc] Received command 0x46574c44
1,588,050 UART: [fwproc] Received Image of size 114448 bytes
2,887,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,607 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,959 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,994 >>> mbox cmd response: success
3,082,108 UART: [afmc] ++
3,082,276 UART: [afmc] CDI.KEYID = 6
3,082,638 UART: [afmc] SUBJECT.KEYID = 7
3,083,063 UART: [afmc] AUTHORITY.KEYID = 5
3,118,196 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,598 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,991 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,681 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,518 UART: [afmc] --
3,161,464 UART: [cold-reset] --
3,162,238 UART: [state] Locking Datavault
3,163,449 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,053 UART: [state] Locking ICCM
3,164,721 UART: [exit] Launching FMC @ 0x40000130
3,170,050 UART:
3,170,066 UART: Running Caliptra FMC ...
3,170,474 UART:
3,170,617 UART: [state] CFI Enabled
3,180,988 UART: [fht] FMC Alias Private Key: 7
3,289,433 UART: [art] Extend RT PCRs Done
3,289,861 UART: [art] Lock RT PCRs Done
3,291,591 UART: [art] Populate DV Done
3,299,836 UART: [fht] FMC Alias Private Key: 7
3,300,788 UART: [art] Derive CDI
3,301,068 UART: [art] Store in in slot 0x4
3,386,617 UART: [art] Derive Key Pair
3,386,977 UART: [art] Store priv key in slot 0x5
3,399,875 UART: [art] Derive Key Pair - Done
3,414,413 UART: [art] Signing Cert with AUTHO
3,414,893 UART: RITY.KEYID = 7
3,429,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,218 UART: [art] PUB.X = 3B5D4AC44F78541170307B92C72F21224452FF2E0BDC7547735F2B0C1F2D98191C4DE75D29730914FC19931F119A7A95
3,436,973 UART: [art] PUB.Y = BB33F845A5FCB1A799BB5E5BB0BD6A5207FFB7B3298DF1718AB3EBC6F92172B546E9BA0D4C4AE763EE4834144425DBAB
3,443,939 UART: [art] SIG.R = 5DD17D29BDF2D653045F164E4128064912672B504E4858945A639F9DA987929193D4C1E5482B0837EF704F694968FFA3
3,450,688 UART: [art] SIG.S = 34FA5459B8325811C306BC3B8DB149AC813FF007987520FDE25CB247F5EE01FD4AEF2D439ED7F72EFA7BDCDDB082AAD4
3,474,236 UART: Caliptra RT
3,474,581 UART: [state] CFI Enabled
3,582,061 UART: [rt] RT listening for mailbox commands...
3,582,731 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,663 UART: [rt]cmd =0x53494756, len=196
3,619,146 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,534 ready_for_fw is high
1,362,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,732 >>> mbox cmd response: success
2,991,732 UART:
2,991,748 UART: Running Caliptra FMC ...
2,992,156 UART:
2,992,299 UART: [state] CFI Enabled
3,002,820 UART: [fht] FMC Alias Private Key: 7
3,110,663 UART: [art] Extend RT PCRs Done
3,111,091 UART: [art] Lock RT PCRs Done
3,112,729 UART: [art] Populate DV Done
3,121,054 UART: [fht] FMC Alias Private Key: 7
3,122,146 UART: [art] Derive CDI
3,122,426 UART: [art] Store in in slot 0x4
3,208,349 UART: [art] Derive Key Pair
3,208,709 UART: [art] Store priv key in slot 0x5
3,221,853 UART: [art] Derive Key Pair - Done
3,236,937 UART: [art] Signing Cert with AUTHO
3,237,417 UART: RITY.KEYID = 7
3,252,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,406 UART: [art] PUB.X = 5CCD32BCBA00669D17B0D11B60336E2A8901CD20E6F189AA90428F2B887084CFC5B15F4AD4C0DD55B28D421A28AC66F9
3,260,163 UART: [art] PUB.Y = F408A85F8B97AA452ED0CF13D759174EF08C5FE71451454C9B89053B90472EF953CE6EC8589E4DF0317A0C1715CA94F5
3,267,108 UART: [art] SIG.R = A1A549FD79A52B9E886085E12A191CBF4AC433E2A1D385007B8353D6DB1995D21A0E4529A47DD30E330EF28E6B15024D
3,273,848 UART: [art] SIG.S = BDAAFB0FF5624BA68FA15B88332128B91391928633E5ED446F2FEA81AB68B8912CBF4A26B1BD7F5D832284B8CE60F20F
3,298,169 UART: Caliptra RT
3,298,514 UART: [state] CFI Enabled
3,407,254 UART: [rt] RT listening for mailbox commands...
3,407,924 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,672 UART: [rt]cmd =0x53494756, len=196
3,444,405 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
893,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,635 UART: [kat] ++
897,787 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,462 UART: [kat] SHA2-512-ACC
908,363 UART: [kat] ECC-384
917,934 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,172,033 UART: [cold-reset] ++
1,172,579 UART: [fht] FHT @ 0x50003400
1,175,058 UART: [idev] ++
1,175,226 UART: [idev] CDI.KEYID = 6
1,175,586 UART: [idev] SUBJECT.KEYID = 7
1,176,010 UART: [idev] UDS.KEYID = 0
1,176,355 ready_for_fw is high
1,176,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,084 UART: [idev] Erasing UDS.KEYID = 0
1,201,289 UART: [idev] Sha1 KeyId Algorithm
1,209,937 UART: [idev] --
1,210,953 UART: [ldev] ++
1,211,121 UART: [ldev] CDI.KEYID = 6
1,211,484 UART: [ldev] SUBJECT.KEYID = 5
1,211,910 UART: [ldev] AUTHORITY.KEYID = 7
1,212,373 UART: [ldev] FE.KEYID = 1
1,217,301 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,993 UART: [ldev] --
1,283,482 UART: [fwproc] Wait for Commands...
1,284,152 UART: [fwproc] Recv command 0x46574c44
1,284,880 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,007 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,336 >>> mbox cmd response: success
2,779,358 UART: [afmc] ++
2,779,526 UART: [afmc] CDI.KEYID = 6
2,779,888 UART: [afmc] SUBJECT.KEYID = 7
2,780,313 UART: [afmc] AUTHORITY.KEYID = 5
2,815,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,307 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,192 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,911 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,681 UART: [afmc] --
2,858,575 UART: [cold-reset] --
2,859,305 UART: [state] Locking Datavault
2,860,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,966 UART: [state] Locking ICCM
2,861,628 UART: [exit] Launching FMC @ 0x40000130
2,866,957 UART:
2,866,973 UART: Running Caliptra FMC ...
2,867,381 UART:
2,867,435 UART: [state] CFI Enabled
2,877,936 UART: [fht] FMC Alias Private Key: 7
2,985,475 UART: [art] Extend RT PCRs Done
2,985,903 UART: [art] Lock RT PCRs Done
2,987,515 UART: [art] Populate DV Done
2,995,664 UART: [fht] FMC Alias Private Key: 7
2,996,804 UART: [art] Derive CDI
2,997,084 UART: [art] Store in in slot 0x4
3,082,653 UART: [art] Derive Key Pair
3,083,013 UART: [art] Store priv key in slot 0x5
3,096,465 UART: [art] Derive Key Pair - Done
3,111,237 UART: [art] Signing Cert with AUTHO
3,111,717 UART: RITY.KEYID = 7
3,126,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,508 UART: [art] PUB.X = 5B09C8516AD5ABE98A003D83D35C34683144EA593EB0675FDCB72389FC526689240E68CB59D73B1A8419B47FD6DBC631
3,134,254 UART: [art] PUB.Y = AA13394E76B7D906B8EC5D003D480DA08DB7533ABDB4F68C2CAB6337A3FD0B2391F0DDB11D4E0A396A22E8117FA1757D
3,141,186 UART: [art] SIG.R = 06622F7DAF184BF9F2B3B951A93B69C45D2F90065329DA28330F0F325D1FAE5FC4389F6C91EAA7EE01BAFF116051BE75
3,147,953 UART: [art] SIG.S = 282B478560AC6F80E74FE30A88CCEC54CF4F3A0418DF64249438B49D6E0E4CA51EE72CBE46B577386FA685725AEA2471
3,172,023 UART: Caliptra RT
3,172,276 UART: [state] CFI Enabled
3,279,519 UART: [rt] RT listening for mailbox commands...
3,280,189 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,299 UART: [rt]cmd =0x53494756, len=196
3,316,728 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,825 ready_for_fw is high
1,060,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,415 >>> mbox cmd response: success
2,690,329 UART:
2,690,345 UART: Running Caliptra FMC ...
2,690,753 UART:
2,690,807 UART: [state] CFI Enabled
2,701,378 UART: [fht] FMC Alias Private Key: 7
2,808,903 UART: [art] Extend RT PCRs Done
2,809,331 UART: [art] Lock RT PCRs Done
2,810,749 UART: [art] Populate DV Done
2,818,954 UART: [fht] FMC Alias Private Key: 7
2,820,012 UART: [art] Derive CDI
2,820,292 UART: [art] Store in in slot 0x4
2,905,489 UART: [art] Derive Key Pair
2,905,849 UART: [art] Store priv key in slot 0x5
2,919,555 UART: [art] Derive Key Pair - Done
2,934,258 UART: [art] Signing Cert with AUTHO
2,934,738 UART: RITY.KEYID = 7
2,949,754 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,519 UART: [art] PUB.X = D77461A3C844CD1DEA483F80E24F117D059E8602FC3D1CD00CF36FF22A8EF1542855B214E0C6B5BBC8E183D02197FB76
2,957,290 UART: [art] PUB.Y = 08F3A98AB7FE4E338F029A7D2B31826147D543A35568CD82D8B900715A08E12C5D7B7413DB359DD87887FAD000610E16
2,964,182 UART: [art] SIG.R = A5DA3F203FB990B6479C5B0833A2247AB9D285D9E8C2F01F91C2057308F5691B488BB2A3CF3B2F365F4B51164B97C753
2,970,945 UART: [art] SIG.S = 4E598C74198907F52700FE9274A204C084BAB7908898AFFF8F8C7C9A172D48171AAD3A46CA9CE5015E2DC15F8F6759F7
2,994,567 UART: Caliptra RT
2,994,820 UART: [state] CFI Enabled
3,101,733 UART: [rt] RT listening for mailbox commands...
3,102,403 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,365 UART: [rt]cmd =0x53494756, len=196
3,138,552 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,968 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
893,809 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,934 UART: [kat] ++
898,086 UART: [kat] sha1
902,328 UART: [kat] SHA2-256
904,268 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,775 UART: [kat] HMAC-384Kdf
923,407 UART: [kat] LMS
1,171,735 UART: [kat] --
1,172,716 UART: [cold-reset] ++
1,173,066 UART: [fht] FHT @ 0x50003400
1,175,721 UART: [idev] ++
1,175,889 UART: [idev] CDI.KEYID = 6
1,176,249 UART: [idev] SUBJECT.KEYID = 7
1,176,673 UART: [idev] UDS.KEYID = 0
1,177,018 ready_for_fw is high
1,177,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,723 UART: [idev] Erasing UDS.KEYID = 0
1,202,190 UART: [idev] Sha1 KeyId Algorithm
1,210,472 UART: [idev] --
1,211,434 UART: [ldev] ++
1,211,602 UART: [ldev] CDI.KEYID = 6
1,211,965 UART: [ldev] SUBJECT.KEYID = 5
1,212,391 UART: [ldev] AUTHORITY.KEYID = 7
1,212,854 UART: [ldev] FE.KEYID = 1
1,217,822 UART: [ldev] Erasing FE.KEYID = 1
1,244,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,408 UART: [ldev] --
1,283,801 UART: [fwproc] Wait for Commands...
1,284,571 UART: [fwproc] Recv command 0x46574c44
1,285,299 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,389 >>> mbox cmd response: success
2,778,539 UART: [afmc] ++
2,778,707 UART: [afmc] CDI.KEYID = 6
2,779,069 UART: [afmc] SUBJECT.KEYID = 7
2,779,494 UART: [afmc] AUTHORITY.KEYID = 5
2,815,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,894 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,779 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,498 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,144 UART: [afmc] --
2,858,054 UART: [cold-reset] --
2,858,792 UART: [state] Locking Datavault
2,860,125 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,729 UART: [state] Locking ICCM
2,861,319 UART: [exit] Launching FMC @ 0x40000130
2,866,648 UART:
2,866,664 UART: Running Caliptra FMC ...
2,867,072 UART:
2,867,215 UART: [state] CFI Enabled
2,877,656 UART: [fht] FMC Alias Private Key: 7
2,986,047 UART: [art] Extend RT PCRs Done
2,986,475 UART: [art] Lock RT PCRs Done
2,988,063 UART: [art] Populate DV Done
2,996,364 UART: [fht] FMC Alias Private Key: 7
2,997,490 UART: [art] Derive CDI
2,997,770 UART: [art] Store in in slot 0x4
3,083,727 UART: [art] Derive Key Pair
3,084,087 UART: [art] Store priv key in slot 0x5
3,097,747 UART: [art] Derive Key Pair - Done
3,112,263 UART: [art] Signing Cert with AUTHO
3,112,743 UART: RITY.KEYID = 7
3,127,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,454 UART: [art] PUB.X = ECB85D0DACC1DB71CC645A9176517C4D8293C9DB70C006AFC9370F73DF0B8B78A0F524CAAA6F7E0E24BD02DE0698EEAD
3,135,229 UART: [art] PUB.Y = 397CBB4C1E88AF3CBEED8318D8F5E18FB36E5E3737E2EBE84F23E8B61B601451D8AF8366C1D078561E5BB152B5D37F40
3,142,193 UART: [art] SIG.R = 91FE9AF1BD98B86572B8CF6D2026EDCE77A5565E37BFF1EF9058E1BC9DD4E5CE306E16AE679F3D57F6A58FE0E20BF112
3,148,982 UART: [art] SIG.S = C145DB8EC634FB9A029D81BFF7187A70FF37660EBD3B4382EFEF47583D543DA214E61A338FFA236A97178E6AFF1572A2
3,173,323 UART: Caliptra RT
3,173,668 UART: [state] CFI Enabled
3,281,630 UART: [rt] RT listening for mailbox commands...
3,282,300 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,228 UART: [rt]cmd =0x53494756, len=196
3,318,419 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,788 ready_for_fw is high
1,060,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,380 >>> mbox cmd response: success
2,690,232 UART:
2,690,248 UART: Running Caliptra FMC ...
2,690,656 UART:
2,690,799 UART: [state] CFI Enabled
2,701,060 UART: [fht] FMC Alias Private Key: 7
2,809,393 UART: [art] Extend RT PCRs Done
2,809,821 UART: [art] Lock RT PCRs Done
2,811,547 UART: [art] Populate DV Done
2,819,850 UART: [fht] FMC Alias Private Key: 7
2,820,858 UART: [art] Derive CDI
2,821,138 UART: [art] Store in in slot 0x4
2,907,385 UART: [art] Derive Key Pair
2,907,745 UART: [art] Store priv key in slot 0x5
2,921,269 UART: [art] Derive Key Pair - Done
2,936,304 UART: [art] Signing Cert with AUTHO
2,936,784 UART: RITY.KEYID = 7
2,951,894 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,659 UART: [art] PUB.X = 5CC6A201849A283B52A2C1CC5C8D2B4EF785715211B7C03B2DAEA1D7B29DEE27A1A27146BC74CF87D18421921D7A394F
2,959,436 UART: [art] PUB.Y = 288AB4371C4D4FB423A17ACEF2E15B97F58C8BC0FF27321DEF161F12757934EC20D93CF1192880473F9B08BDD2346E36
2,966,389 UART: [art] SIG.R = 77AEE3CDF56AAAD6050848BB49578C7FF501FF0BCB5008E8B923A5E0369C560FA206450CCEA159806A908AE3185ED142
2,973,145 UART: [art] SIG.S = 5810909ADC91B052E1E7BF844D0DEAE91241C54387B7A129D766229ACB5F17666F750C484367D0A1B8727108F4950546
2,996,534 UART: Caliptra RT
2,996,879 UART: [state] CFI Enabled
3,103,990 UART: [rt] RT listening for mailbox commands...
3,104,660 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,126 UART: [rt]cmd =0x53494756, len=196
3,141,455 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,491 UART: [cold-reset] ++
1,169,943 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,173,899 ready_for_fw is high
1,173,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,206,877 UART: [idev] --
1,208,030 UART: [ldev] ++
1,208,198 UART: [ldev] CDI.KEYID = 6
1,208,562 UART: [ldev] SUBJECT.KEYID = 5
1,208,989 UART: [ldev] AUTHORITY.KEYID = 7
1,209,452 UART: [ldev] FE.KEYID = 1
1,214,594 UART: [ldev] Erasing FE.KEYID = 1
1,240,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,634 UART: [ldev] --
1,280,050 UART: [fwproc] Wait for Commands...
1,280,639 UART: [fwproc] Recv command 0x46574c44
1,281,372 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,630 >>> mbox cmd response: success
2,772,727 UART: [afmc] ++
2,772,895 UART: [afmc] CDI.KEYID = 6
2,773,258 UART: [afmc] SUBJECT.KEYID = 7
2,773,684 UART: [afmc] AUTHORITY.KEYID = 5
2,809,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,521 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,272 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,001 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,884 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,603 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,496 UART: [afmc] --
2,852,442 UART: [cold-reset] --
2,853,208 UART: [state] Locking Datavault
2,854,163 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,767 UART: [state] Locking ICCM
2,855,337 UART: [exit] Launching FMC @ 0x40000130
2,860,666 UART:
2,860,682 UART: Running Caliptra FMC ...
2,861,090 UART:
2,861,144 UART: [state] CFI Enabled
2,871,711 UART: [fht] FMC Alias Private Key: 7
2,979,696 UART: [art] Extend RT PCRs Done
2,980,124 UART: [art] Lock RT PCRs Done
2,981,850 UART: [art] Populate DV Done
2,989,773 UART: [fht] FMC Alias Private Key: 7
2,990,787 UART: [art] Derive CDI
2,991,067 UART: [art] Store in in slot 0x4
3,076,502 UART: [art] Derive Key Pair
3,076,862 UART: [art] Store priv key in slot 0x5
3,089,600 UART: [art] Derive Key Pair - Done
3,104,666 UART: [art] Signing Cert with AUTHO
3,105,146 UART: RITY.KEYID = 7
3,119,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,733 UART: [art] PUB.X = C3BA3868D47EB53F2D4928239C751CB85CF5A5E117392E7C25E57B746DDECE1CC5CD17E768E0A53C8191D0756DDAE210
3,127,515 UART: [art] PUB.Y = 5494106CAE281C485B2C2AE9299B30567D5E84D48235AC2AEA3162652DE257CCC477BBB75E20482007FE340A33756CC1
3,134,459 UART: [art] SIG.R = 9C8ABE1C209C7A81673D7EA844975EB164422B2BFDA1466DE1910238D2335CD31A4A644EF67360758ECFD950BCB626BD
3,141,234 UART: [art] SIG.S = AF81F66F7B16BF80A4FAD7AC115ACFD33F5DF86A4F5906373B6C1EC48A61103436F9D53D6B9CDF5E3E3FBBC75A6D9F25
3,165,104 UART: Caliptra RT
3,165,357 UART: [state] CFI Enabled
3,273,025 UART: [rt] RT listening for mailbox commands...
3,273,695 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,739 UART: [rt]cmd =0x53494756, len=196
3,309,800 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,208 ready_for_fw is high
1,056,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,192 >>> mbox cmd response: success
2,684,750 UART:
2,684,766 UART: Running Caliptra FMC ...
2,685,174 UART:
2,685,228 UART: [state] CFI Enabled
2,695,501 UART: [fht] FMC Alias Private Key: 7
2,804,014 UART: [art] Extend RT PCRs Done
2,804,442 UART: [art] Lock RT PCRs Done
2,805,686 UART: [art] Populate DV Done
2,813,807 UART: [fht] FMC Alias Private Key: 7
2,814,975 UART: [art] Derive CDI
2,815,255 UART: [art] Store in in slot 0x4
2,900,898 UART: [art] Derive Key Pair
2,901,258 UART: [art] Store priv key in slot 0x5
2,914,944 UART: [art] Derive Key Pair - Done
2,929,851 UART: [art] Signing Cert with AUTHO
2,930,331 UART: RITY.KEYID = 7
2,945,637 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,402 UART: [art] PUB.X = E8D7B2EA0E3E744474A5FA63F2B986696E9679481A8559C3143515D23C6532870EC07B2EA2F5702DD0C49593424ED807
2,953,157 UART: [art] PUB.Y = 2894F236CDF4825BA7B6090C541D0B7F5FF078832BE5500CE25F8BC077FB7176B8F23110A5301CE3D18E8DE0A28059E4
2,960,099 UART: [art] SIG.R = C731DDA0AB5B6D6DB56A785A52456F81F8D4FCF563E2D4254559F607890947DBBC74698E30F0C5D4BAB7B7E703F5B631
2,966,870 UART: [art] SIG.S = C54992E97D24ABB714B5AB5AC2B5C9D61FA6A507413F657CD79FA76B40B7CBED37E6762C81D30BA508655684D99A7D37
2,991,060 UART: Caliptra RT
2,991,313 UART: [state] CFI Enabled
3,099,371 UART: [rt] RT listening for mailbox commands...
3,100,041 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,059 UART: [rt]cmd =0x53494756, len=196
3,136,280 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
891,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,908 UART: [kat] ++
896,060 UART: [kat] sha1
900,204 UART: [kat] SHA2-256
902,144 UART: [kat] SHA2-384
904,943 UART: [kat] SHA2-512-ACC
906,844 UART: [kat] ECC-384
916,529 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,342 UART: [idev] ++
1,173,510 UART: [idev] CDI.KEYID = 6
1,173,871 UART: [idev] SUBJECT.KEYID = 7
1,174,296 UART: [idev] UDS.KEYID = 0
1,174,642 ready_for_fw is high
1,174,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,716 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,348 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,215,997 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,709 UART: [ldev] --
1,282,171 UART: [fwproc] Wait for Commands...
1,282,948 UART: [fwproc] Recv command 0x46574c44
1,283,681 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,652 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,961 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,999 >>> mbox cmd response: success
2,777,114 UART: [afmc] ++
2,777,282 UART: [afmc] CDI.KEYID = 6
2,777,645 UART: [afmc] SUBJECT.KEYID = 7
2,778,071 UART: [afmc] AUTHORITY.KEYID = 5
2,813,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,501 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,113 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,832 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,715 UART: [afmc] --
2,857,597 UART: [cold-reset] --
2,858,525 UART: [state] Locking Datavault
2,859,902 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,506 UART: [state] Locking ICCM
2,861,108 UART: [exit] Launching FMC @ 0x40000130
2,866,437 UART:
2,866,453 UART: Running Caliptra FMC ...
2,866,861 UART:
2,867,004 UART: [state] CFI Enabled
2,877,319 UART: [fht] FMC Alias Private Key: 7
2,985,442 UART: [art] Extend RT PCRs Done
2,985,870 UART: [art] Lock RT PCRs Done
2,987,322 UART: [art] Populate DV Done
2,995,419 UART: [fht] FMC Alias Private Key: 7
2,996,483 UART: [art] Derive CDI
2,996,763 UART: [art] Store in in slot 0x4
3,082,438 UART: [art] Derive Key Pair
3,082,798 UART: [art] Store priv key in slot 0x5
3,095,802 UART: [art] Derive Key Pair - Done
3,110,736 UART: [art] Signing Cert with AUTHO
3,111,216 UART: RITY.KEYID = 7
3,126,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,151 UART: [art] PUB.X = 7CEC3C5A0D63E787C4FA79759C5736AA00E3A1E043D4E47D0CCD12B47066C3FF4ECC9E86DAC764E4A3CDEDDAF4FC87D1
3,133,921 UART: [art] PUB.Y = 55C635A3C2898F63110BB6B417DC92A92AF55633135D5E64F991DC2BBB1A1884F0427219513AE31B9A463B238255D6FA
3,140,866 UART: [art] SIG.R = 885601962F4EEA41525EA86A2B440C0E8B112568E17EA7644A18D0972FFE168DDD4FFE280E2AE4A95277BFDD2A76A94A
3,147,634 UART: [art] SIG.S = 74B5A50C7D12CE771676A8F3F5419B0D714060A99182DBD0DD2B8529BB552947AB096755C5B6A9A3AFB954B56057A92A
3,171,760 UART: Caliptra RT
3,172,105 UART: [state] CFI Enabled
3,280,478 UART: [rt] RT listening for mailbox commands...
3,281,148 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,068 UART: [rt]cmd =0x53494756, len=196
3,317,635 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,983 ready_for_fw is high
1,055,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,779 >>> mbox cmd response: success
2,687,463 UART:
2,687,479 UART: Running Caliptra FMC ...
2,687,887 UART:
2,688,030 UART: [state] CFI Enabled
2,698,911 UART: [fht] FMC Alias Private Key: 7
2,806,348 UART: [art] Extend RT PCRs Done
2,806,776 UART: [art] Lock RT PCRs Done
2,808,528 UART: [art] Populate DV Done
2,816,367 UART: [fht] FMC Alias Private Key: 7
2,817,323 UART: [art] Derive CDI
2,817,603 UART: [art] Store in in slot 0x4
2,903,398 UART: [art] Derive Key Pair
2,903,758 UART: [art] Store priv key in slot 0x5
2,916,906 UART: [art] Derive Key Pair - Done
2,931,754 UART: [art] Signing Cert with AUTHO
2,932,234 UART: RITY.KEYID = 7
2,947,524 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,289 UART: [art] PUB.X = F6865577F4B3C26423DD1650B83FB5B4FA3B383F23FE25D4D8E349780A36C504BB1060023F7B89068C1DF902C7136043
2,955,040 UART: [art] PUB.Y = 58FDBA3C65B9F2F957EDA5BEE717368192827BB85B252FB3FA89F0774C9F3A3E9919E548A6C1604D07F94B2878D6F073
2,961,993 UART: [art] SIG.R = 0E18E7E4A58CAD94D9C6A9DC6706B3999C8B8633C77E0307D3C73515EFD581133CB9B3366EC9B41667706C904A89255B
2,968,751 UART: [art] SIG.S = B557881148B704A3FC3F09A70534007C0EC51C9E034E1F2463C84C00C7CCE28F41D361B90D5D14BB6FFF920225138351
2,991,997 UART: Caliptra RT
2,992,342 UART: [state] CFI Enabled
3,099,995 UART: [rt] RT listening for mailbox commands...
3,100,665 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,725 UART: [rt]cmd =0x53494756, len=196
3,137,050 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,193 UART:
192,553 UART: Running Caliptra ROM ...
193,745 UART:
193,924 UART: [state] CFI Enabled
263,611 UART: [state] LifecycleState = Unprovisioned
265,607 UART: [state] DebugLocked = No
268,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,924 UART: [kat] SHA2-256
443,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,172 UART: [kat] ++
454,656 UART: [kat] sha1
466,456 UART: [kat] SHA2-256
469,185 UART: [kat] SHA2-384
475,600 UART: [kat] SHA2-512-ACC
477,988 UART: [kat] ECC-384
2,765,136 UART: [kat] HMAC-384Kdf
2,778,254 UART: [kat] LMS
3,968,544 UART: [kat] --
3,972,990 UART: [cold-reset] ++
3,975,564 UART: [fht] Storing FHT @ 0x50003400
3,986,336 UART: [idev] ++
3,986,904 UART: [idev] CDI.KEYID = 6
3,987,787 UART: [idev] SUBJECT.KEYID = 7
3,989,028 UART: [idev] UDS.KEYID = 0
3,990,028 ready_for_fw is high
3,990,244 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,867 UART: [idev] Erasing UDS.KEYID = 0
7,323,490 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,102 UART: [idev] --
7,348,879 UART: [ldev] ++
7,349,474 UART: [ldev] CDI.KEYID = 6
7,350,445 UART: [ldev] SUBJECT.KEYID = 5
7,351,602 UART: [ldev] AUTHORITY.KEYID = 7
7,352,881 UART: [ldev] FE.KEYID = 1
7,400,414 UART: [ldev] Erasing FE.KEYID = 1
10,731,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,455 UART: [ldev] --
13,095,007 UART: [fwproc] Waiting for Commands...
13,097,923 UART: [fwproc] Received command 0x46574c44
13,100,163 UART: [fwproc] Received Image of size 114124 bytes
17,149,028 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,222,946 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,291,821 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,608,697 >>> mbox cmd response: success
17,609,229 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,613,045 UART: [afmc] ++
17,613,635 UART: [afmc] CDI.KEYID = 6
17,614,549 UART: [afmc] SUBJECT.KEYID = 7
17,615,829 UART: [afmc] AUTHORITY.KEYID = 5
20,987,893 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,283,785 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,041 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,300,435 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,280 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,329,745 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,204 UART: [afmc] --
23,355,580 UART: [cold-reset] --
23,359,773 UART: [state] Locking Datavault
23,365,095 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,807 UART: [state] Locking ICCM
23,368,581 UART: [exit] Launching FMC @ 0x40000130
23,376,980 UART:
23,377,215 UART: Running Caliptra FMC ...
23,378,316 UART:
23,378,476 UART: [state] CFI Enabled
23,446,534 UART: [fht] FMC Alias Private Key: 7
25,783,729 UART: [art] Extend RT PCRs Done
25,784,952 UART: [art] Lock RT PCRs Done
25,786,524 UART: [art] Populate DV Done
25,791,991 UART: [fht] FMC Alias Private Key: 7
25,793,585 UART: [art] Derive CDI
25,794,401 UART: [art] Store in in slot 0x4
25,855,423 UART: [art] Derive Key Pair
25,856,467 UART: [art] Store priv key in slot 0x5
29,149,305 UART: [art] Derive Key Pair - Done
29,162,521 UART: [art] Signing Cert with AUTHO
29,163,819 UART: RITY.KEYID = 7
31,451,475 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,980 UART: [art] PUB.X = C730BD18DCF986CC1A895F97717886BD17B2E023F9A74843FEBD6D582E9F38B2A59963891862D2CA6EFB102C2D3216E9
31,460,225 UART: [art] PUB.Y = 1EECEE7F6C6CF3FFDCA9CEC2090AE67BD1795E16C460470203AC05AE13A701C3A4A34BB0430657DFDF951DE3554E5582
31,467,506 UART: [art] SIG.R = 0A7AD79D2DAAAA0E9B58536CA36CA0DC0BA2A75E98C2FD3402DD5714E71D2BCC068A1A9D3B6A00A1ECC6C6DB92BE79AF
31,474,902 UART: [art] SIG.S = 68FD4D39004E1C75E7A16BB0D2DED79E72D4E2192A58B5A20F29949FD434D1E3F65EC52EA4C0C35CFB6FCDFF34E2D552
32,779,677 UART: Caliptra RT
32,780,389 UART: [state] CFI Enabled
32,941,411 UART: [rt] RT listening for mailbox commands...
32,972,453 UART: [rt]cmd =0x46505344, len=4
33,082,423 >>> mbox cmd response data (8 bytes)
33,082,966 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,083,258 UART: Fatal Error: 0x000E0008
33,084,380 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,805,342 ready_for_fw is high
3,805,734 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,870,678 >>> mbox cmd response: success
17,871,450 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,572,714 UART:
23,573,087 UART: Running Caliptra FMC ...
23,574,224 UART:
23,574,381 UART: [state] CFI Enabled
23,639,146 UART: [fht] FMC Alias Private Key: 7
25,977,083 UART: [art] Extend RT PCRs Done
25,978,347 UART: [art] Lock RT PCRs Done
25,979,957 UART: [art] Populate DV Done
25,985,106 UART: [fht] FMC Alias Private Key: 7
25,986,774 UART: [art] Derive CDI
25,987,518 UART: [art] Store in in slot 0x4
26,047,555 UART: [art] Derive Key Pair
26,048,561 UART: [art] Store priv key in slot 0x5
29,342,217 UART: [art] Derive Key Pair - Done
29,355,745 UART: [art] Signing Cert with AUTHO
29,357,047 UART: RITY.KEYID = 7
31,643,940 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,457 UART: [art] PUB.X = 53C2ADA44EAC3150837F8EAD0346C6BE9020661C306ECF663908E488F10215419C2E96FCB40CBE4DBCB40E1662C96F50
31,653,175 UART: [art] PUB.Y = 3C3F184A7A16B81C32E85391DCDD08002F8339EC2284573E76D34C1E5F0ECEC61C390093B227DEF0C5B961C115CF9F6E
31,659,932 UART: [art] SIG.R = B8255B01E1749F96472255B48F6F04F72CF0F4131BC49F1282FDDD7E38764959AB26BC36EE0FF8D673F5A56F396FA501
31,667,310 UART: [art] SIG.S = 3B9C2E6AD5A814215EC064C91A63922B88484EC447EF1AD9BFF86E8FE393579D3499FE899DAFE337538B6D5410F4D8A2
32,971,878 UART: Caliptra RT
32,972,583 UART: [state] CFI Enabled
33,135,279 UART: [rt] RT listening for mailbox commands...
33,166,698 UART: [rt]cmd =0x46505344, len=4
33,276,749 >>> mbox cmd response data (8 bytes)
33,277,283 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,277,573 UART: Fatal Error: 0x000E0008
33,278,750 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,327 UART:
192,695 UART: Running Caliptra ROM ...
194,007 UART:
603,633 UART: [state] CFI Enabled
615,587 UART: [state] LifecycleState = Unprovisioned
617,459 UART: [state] DebugLocked = No
619,695 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,850 UART: [kat] SHA2-256
794,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,155 UART: [kat] ++
805,632 UART: [kat] sha1
815,786 UART: [kat] SHA2-256
818,507 UART: [kat] SHA2-384
825,152 UART: [kat] SHA2-512-ACC
827,519 UART: [kat] ECC-384
3,111,230 UART: [kat] HMAC-384Kdf
3,123,105 UART: [kat] LMS
4,313,226 UART: [kat] --
4,317,363 UART: [cold-reset] ++
4,319,715 UART: [fht] Storing FHT @ 0x50003400
4,331,969 UART: [idev] ++
4,332,534 UART: [idev] CDI.KEYID = 6
4,333,563 UART: [idev] SUBJECT.KEYID = 7
4,334,726 UART: [idev] UDS.KEYID = 0
4,335,761 ready_for_fw is high
4,335,967 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,308 UART: [idev] Erasing UDS.KEYID = 0
7,627,724 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,386 UART: [idev] --
7,653,616 UART: [ldev] ++
7,654,246 UART: [ldev] CDI.KEYID = 6
7,655,152 UART: [ldev] SUBJECT.KEYID = 5
7,656,360 UART: [ldev] AUTHORITY.KEYID = 7
7,657,640 UART: [ldev] FE.KEYID = 1
7,669,413 UART: [ldev] Erasing FE.KEYID = 1
10,956,346 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,391 UART: [ldev] --
13,316,758 UART: [fwproc] Waiting for Commands...
13,319,493 UART: [fwproc] Received command 0x46574c44
13,321,667 UART: [fwproc] Received Image of size 114124 bytes
17,375,178 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,106 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,843,862 >>> mbox cmd response: success
17,844,401 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,847,290 UART: [afmc] ++
17,847,928 UART: [afmc] CDI.KEYID = 6
17,848,832 UART: [afmc] SUBJECT.KEYID = 7
17,850,097 UART: [afmc] AUTHORITY.KEYID = 5
21,159,857 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,453 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,707 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,100 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,942 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,362 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,894 UART: [afmc] --
23,524,223 UART: [cold-reset] --
23,527,991 UART: [state] Locking Datavault
23,534,853 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,600 UART: [state] Locking ICCM
23,538,798 UART: [exit] Launching FMC @ 0x40000130
23,547,188 UART:
23,547,426 UART: Running Caliptra FMC ...
23,548,523 UART:
23,548,678 UART: [state] CFI Enabled
23,557,149 UART: [fht] FMC Alias Private Key: 7
25,888,249 UART: [art] Extend RT PCRs Done
25,889,467 UART: [art] Lock RT PCRs Done
25,891,301 UART: [art] Populate DV Done
25,896,655 UART: [fht] FMC Alias Private Key: 7
25,898,186 UART: [art] Derive CDI
25,898,991 UART: [art] Store in in slot 0x4
25,941,360 UART: [art] Derive Key Pair
25,942,378 UART: [art] Store priv key in slot 0x5
29,183,804 UART: [art] Derive Key Pair - Done
29,196,749 UART: [art] Signing Cert with AUTHO
29,198,051 UART: RITY.KEYID = 7
31,477,317 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,825 UART: [art] PUB.X = 82CD1690677E07530E7C0D5B0EC1D54A60EE34C87E50CCBEADDAD035D0CA524067F8EFF75A4954D6BD004222B5465B04
31,486,084 UART: [art] PUB.Y = 720480AE2D32603001841725C41A35D0417F46A2892519B0D33470B08A7CEABCA1044FA484540CDA2C61F70CF25DF07B
31,493,327 UART: [art] SIG.R = 520B3682461DA1CAA024B96FBC590ACABE08CE9F9E9C36BA5095C8BF94C56537A48B76C331D04DD70F2DC65DEC9508A5
31,500,716 UART: [art] SIG.S = 56D5BA307FCBB60065FD1E1196D450531DDD4F7C77F5C685B0F398E7037B6625DD8BAA2653C751778BDF76404211E36A
32,805,945 UART: Caliptra RT
32,806,659 UART: [state] CFI Enabled
32,924,763 UART: [rt] RT listening for mailbox commands...
32,956,064 UART: [rt]cmd =0x46505344, len=4
33,065,959 >>> mbox cmd response data (8 bytes)
33,066,482 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,066,769 UART: Fatal Error: 0x000E0008
33,067,925 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
4,123,605 ready_for_fw is high
4,124,037 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,513 >>> mbox cmd response: success
18,078,112 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,717,552 UART:
23,717,949 UART: Running Caliptra FMC ...
23,719,079 UART:
23,719,231 UART: [state] CFI Enabled
23,727,318 UART: [fht] FMC Alias Private Key: 7
26,058,447 UART: [art] Extend RT PCRs Done
26,059,692 UART: [art] Lock RT PCRs Done
26,061,275 UART: [art] Populate DV Done
26,066,470 UART: [fht] FMC Alias Private Key: 7
26,067,967 UART: [art] Derive CDI
26,068,726 UART: [art] Store in in slot 0x4
26,111,422 UART: [art] Derive Key Pair
26,112,420 UART: [art] Store priv key in slot 0x5
29,354,285 UART: [art] Derive Key Pair - Done
29,367,446 UART: [art] Signing Cert with AUTHO
29,368,747 UART: RITY.KEYID = 7
31,648,081 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,588 UART: [art] PUB.X = 165DB740D08CB58E34CA6E4FAC55D47D8796B2F1D7D12458415197B1308096ED634CD65E2F55E5A5D7B8613E71128835
31,656,772 UART: [art] PUB.Y = 5EA5054BA0B79000CDEE9F7831F91F9B13F32894E0D58C12E16D99F20EBC5B69F4517B5C54BFB2BE036E0AF8D03294D6
31,664,050 UART: [art] SIG.R = 5961F8E374433E559FA2FD5E2090187536D438109E87BD5DAAD8E83A2DB955AD532D4A5E2151CA00558BC156433083C5
31,671,432 UART: [art] SIG.S = 03AA6BEC3E9DCEA0D57B1FCD8C05E3DF555936C515064EBD0442A642BEB6F400FE1F2C6DD5E36FFE50977DE53371872C
32,976,161 UART: Caliptra RT
32,976,883 UART: [state] CFI Enabled
33,094,176 UART: [rt] RT listening for mailbox commands...
33,125,541 UART: [rt]cmd =0x46505344, len=4
33,235,383 >>> mbox cmd response data (8 bytes)
33,235,892 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,236,172 UART: Fatal Error: 0x000E0008
33,237,360 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,044 UART:
192,415 UART: Running Caliptra ROM ...
193,516 UART:
193,655 UART: [state] CFI Enabled
261,621 UART: [state] LifecycleState = Unprovisioned
263,530 UART: [state] DebugLocked = No
264,765 UART: [state] WD Timer not started. Device not locked for debugging
267,657 UART: [kat] SHA2-256
446,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,339 UART: [kat] ++
458,794 UART: [kat] sha1
470,164 UART: [kat] SHA2-256
473,167 UART: [kat] SHA2-384
479,721 UART: [kat] SHA2-512-ACC
482,660 UART: [kat] ECC-384
2,947,071 UART: [kat] HMAC-384Kdf
2,971,881 UART: [kat] LMS
3,501,324 UART: [kat] --
3,506,626 UART: [cold-reset] ++
3,507,843 UART: [fht] FHT @ 0x50003400
3,519,172 UART: [idev] ++
3,519,745 UART: [idev] CDI.KEYID = 6
3,520,777 UART: [idev] SUBJECT.KEYID = 7
3,521,879 UART: [idev] UDS.KEYID = 0
3,522,819 ready_for_fw is high
3,523,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,092 UART: [idev] Erasing UDS.KEYID = 0
6,025,095 UART: [idev] Sha1 KeyId Algorithm
6,046,976 UART: [idev] --
6,050,722 UART: [ldev] ++
6,051,302 UART: [ldev] CDI.KEYID = 6
6,052,185 UART: [ldev] SUBJECT.KEYID = 5
6,053,400 UART: [ldev] AUTHORITY.KEYID = 7
6,054,696 UART: [ldev] FE.KEYID = 1
6,100,054 UART: [ldev] Erasing FE.KEYID = 1
8,600,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,685 UART: [ldev] --
10,393,129 UART: [fwproc] Wait for Commands...
10,396,142 UART: [fwproc] Recv command 0x46574c44
10,398,238 UART: [fwproc] Recv'd Img size: 114448 bytes
13,799,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,261,154 >>> mbox cmd response: success
14,261,678 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,265,001 UART: [afmc] ++
14,265,594 UART: [afmc] CDI.KEYID = 6
14,266,507 UART: [afmc] SUBJECT.KEYID = 7
14,267,723 UART: [afmc] AUTHORITY.KEYID = 5
16,808,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,357 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,136 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,148 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,032 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,505 UART: [afmc] --
18,609,129 UART: [cold-reset] --
18,612,698 UART: [state] Locking Datavault
18,618,866 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,517 UART: [state] Locking ICCM
18,622,883 UART: [exit] Launching FMC @ 0x40000130
18,631,278 UART:
18,631,513 UART: Running Caliptra FMC ...
18,632,613 UART:
18,632,774 UART: [state] CFI Enabled
18,689,739 UART: [fht] FMC Alias Private Key: 7
20,454,171 UART: [art] Extend RT PCRs Done
20,455,392 UART: [art] Lock RT PCRs Done
20,457,074 UART: [art] Populate DV Done
20,462,878 UART: [fht] FMC Alias Private Key: 7
20,464,585 UART: [art] Derive CDI
20,465,398 UART: [art] Store in in slot 0x4
20,522,357 UART: [art] Derive Key Pair
20,523,357 UART: [art] Store priv key in slot 0x5
22,986,382 UART: [art] Derive Key Pair - Done
22,999,461 UART: [art] Signing Cert with AUTHO
23,000,762 UART: RITY.KEYID = 7
24,713,015 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,527 UART: [art] PUB.X = 327EFB02BA62B02DCEE017B66BD644AE7A6AC14E55EF6B6F284D1B62E5A1BFFB50101E016F54C7554EB55412C89D0396
24,721,789 UART: [art] PUB.Y = BDFCC7B86A300D4968CD05E5E86EC0BB38D555D62B2102BE54AA2BCCCA610BB97ABE4700A7FA37B2DE1417B24629C66D
24,729,092 UART: [art] SIG.R = 4C8594A3E7A4DC417FABEE027E5EC529D2BD7CA68C575DECE6DF9422536B141DFF76135273B52B68072E62876C212EE4
24,736,488 UART: [art] SIG.S = 5C4E18C41DE8D4D22C06ABA082A74F07F1D752FC1644F9FBD2451CF639215D4F6DD32453FBA448DE5F4DBF9CF2EA3A67
25,715,665 UART: Caliptra RT
25,716,354 UART: [state] CFI Enabled
25,880,795 UART: [rt] RT listening for mailbox commands...
25,912,378 UART: [rt]cmd =0x46505344, len=4
26,022,194 >>> mbox cmd response data (8 bytes)
26,022,764 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,023,065 UART: Fatal Error: 0x000E0008
26,024,196 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,377,293 ready_for_fw is high
3,377,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,047,597 >>> mbox cmd response: success
14,048,358 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,344,670 UART:
18,345,058 UART: Running Caliptra FMC ...
18,346,196 UART:
18,346,363 UART: [state] CFI Enabled
18,412,792 UART: [fht] FMC Alias Private Key: 7
20,176,150 UART: [art] Extend RT PCRs Done
20,177,372 UART: [art] Lock RT PCRs Done
20,179,149 UART: [art] Populate DV Done
20,184,780 UART: [fht] FMC Alias Private Key: 7
20,186,434 UART: [art] Derive CDI
20,187,174 UART: [art] Store in in slot 0x4
20,245,658 UART: [art] Derive Key Pair
20,246,700 UART: [art] Store priv key in slot 0x5
22,709,905 UART: [art] Derive Key Pair - Done
22,722,477 UART: [art] Signing Cert with AUTHO
22,723,784 UART: RITY.KEYID = 7
24,436,095 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,582 UART: [art] PUB.X = B154853E0F10016E568CCEE8D1462CF190D0D530B15B5E6EDB194108C802A5D36CBB07D797D0DD854CE7F356093B30FF
24,444,889 UART: [art] PUB.Y = CF882B512BAB9CF34060F72E40F877DA33C274BE9FD4EAEF6309407313B08550443D71F61CADDB1390146C95FF4D1BC1
24,452,155 UART: [art] SIG.R = C52665D2D938BAB0DB226EBC17503AB660E510E71EACA68388245BEFF52B972307BFA9FAE11ADCC88E1EF16218988D2F
24,459,585 UART: [art] SIG.S = 2C73D35A50E8D669672A0D27F0F89F5F56B2B23CA3CEA4226C67352E9F369FB16D2A4C9A2C222A68444D2135EA7BEA57
25,438,385 UART: Caliptra RT
25,439,096 UART: [state] CFI Enabled
25,605,013 UART: [rt] RT listening for mailbox commands...
25,636,675 UART: [rt]cmd =0x46505344, len=4
25,746,552 >>> mbox cmd response data (8 bytes)
25,747,095 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,747,384 UART: Fatal Error: 0x000E0008
25,748,525 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,385 UART:
192,763 UART: Running Caliptra ROM ...
193,852 UART:
603,361 UART: [state] CFI Enabled
618,367 UART: [state] LifecycleState = Unprovisioned
620,370 UART: [state] DebugLocked = No
623,112 UART: [state] WD Timer not started. Device not locked for debugging
626,355 UART: [kat] SHA2-256
805,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,038 UART: [kat] ++
817,568 UART: [kat] sha1
828,440 UART: [kat] SHA2-256
831,430 UART: [kat] SHA2-384
837,771 UART: [kat] SHA2-512-ACC
840,701 UART: [kat] ECC-384
3,281,937 UART: [kat] HMAC-384Kdf
3,294,877 UART: [kat] LMS
3,824,353 UART: [kat] --
3,829,289 UART: [cold-reset] ++
3,830,300 UART: [fht] FHT @ 0x50003400
3,840,200 UART: [idev] ++
3,840,771 UART: [idev] CDI.KEYID = 6
3,841,646 UART: [idev] SUBJECT.KEYID = 7
3,842,883 UART: [idev] UDS.KEYID = 0
3,843,778 ready_for_fw is high
3,843,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,681 UART: [idev] Erasing UDS.KEYID = 0
6,312,851 UART: [idev] Sha1 KeyId Algorithm
6,335,221 UART: [idev] --
6,339,644 UART: [ldev] ++
6,340,208 UART: [ldev] CDI.KEYID = 6
6,341,107 UART: [ldev] SUBJECT.KEYID = 5
6,342,307 UART: [ldev] AUTHORITY.KEYID = 7
6,343,528 UART: [ldev] FE.KEYID = 1
6,355,235 UART: [ldev] Erasing FE.KEYID = 1
8,831,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,177 UART: [ldev] --
10,623,746 UART: [fwproc] Wait for Commands...
10,625,885 UART: [fwproc] Recv command 0x46574c44
10,627,980 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,991 >>> mbox cmd response: success
14,492,513 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,496,096 UART: [afmc] ++
14,496,676 UART: [afmc] CDI.KEYID = 6
14,497,575 UART: [afmc] SUBJECT.KEYID = 7
14,498,781 UART: [afmc] AUTHORITY.KEYID = 5
17,001,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,343 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,312 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,219 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,935 UART: [afmc] --
18,795,993 UART: [cold-reset] --
18,800,063 UART: [state] Locking Datavault
18,804,119 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,764 UART: [state] Locking ICCM
18,807,749 UART: [exit] Launching FMC @ 0x40000130
18,816,194 UART:
18,816,421 UART: Running Caliptra FMC ...
18,817,514 UART:
18,817,668 UART: [state] CFI Enabled
18,825,673 UART: [fht] FMC Alias Private Key: 7
20,582,793 UART: [art] Extend RT PCRs Done
20,584,012 UART: [art] Lock RT PCRs Done
20,585,528 UART: [art] Populate DV Done
20,590,934 UART: [fht] FMC Alias Private Key: 7
20,592,675 UART: [art] Derive CDI
20,593,482 UART: [art] Store in in slot 0x4
20,636,118 UART: [art] Derive Key Pair
20,637,146 UART: [art] Store priv key in slot 0x5
23,064,172 UART: [art] Derive Key Pair - Done
23,076,953 UART: [art] Signing Cert with AUTHO
23,078,245 UART: RITY.KEYID = 7
24,784,041 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,555 UART: [art] PUB.X = 40289D115FFDF67D8B516E3B8359C9F843ECB81B2B6504BA7956163DD383BAF3FE2DE70F1D101431D10BD22AAB86858C
24,792,850 UART: [art] PUB.Y = A4174B8D53C431DDB67A19D36485CFADFD6FAF2560BAFB73550315AEA93A0B618B3A401E53218B1C6156C2EDE274C1B5
24,800,122 UART: [art] SIG.R = 889F9378E22E2C5C6DA017272935791CF901EB887376F6088B7D4F317245D2E51E1D1387BEE7786272A37CD7CF42780F
24,807,465 UART: [art] SIG.S = 62A67BE4CBFF56E7A86BA3AD2CF7972F0D36BDEF77C0912B0319216AE82EAD6F23A636CFB50B8EC95921BBBFA1AB728F
25,785,623 UART: Caliptra RT
25,786,323 UART: [state] CFI Enabled
25,903,263 UART: [rt] RT listening for mailbox commands...
25,934,545 UART: [rt]cmd =0x46505344, len=4
26,044,605 >>> mbox cmd response data (8 bytes)
26,045,191 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,045,482 UART: Fatal Error: 0x000E0008
26,046,595 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
47 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,699,631 ready_for_fw is high
3,700,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,045 >>> mbox cmd response: success
14,268,663 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,524,767 UART:
18,525,154 UART: Running Caliptra FMC ...
18,526,302 UART:
18,526,452 UART: [state] CFI Enabled
18,534,296 UART: [fht] FMC Alias Private Key: 7
20,291,143 UART: [art] Extend RT PCRs Done
20,292,368 UART: [art] Lock RT PCRs Done
20,293,992 UART: [art] Populate DV Done
20,299,236 UART: [fht] FMC Alias Private Key: 7
20,300,882 UART: [art] Derive CDI
20,301,692 UART: [art] Store in in slot 0x4
20,344,078 UART: [art] Derive Key Pair
20,345,141 UART: [art] Store priv key in slot 0x5
22,771,768 UART: [art] Derive Key Pair - Done
22,784,765 UART: [art] Signing Cert with AUTHO
22,786,226 UART: RITY.KEYID = 7
24,491,496 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,029 UART: [art] PUB.X = 52FA64BBE9516D1A5FDAF2A80C9E13F5CAB78E1022F3F3CAC3CD0946BC859CD7825BA0AAC17D1AF239CC46733DD37EF4
24,500,333 UART: [art] PUB.Y = BEDCB635B1ED1ED4987ABC653C067C921E97A6E75B07CA6F8E993785C2D645C34457E1DE9CB8D4DC2D6C5B311D744C6E
24,507,613 UART: [art] SIG.R = F4335BB5B649007BA6028495AB20A610B8895BFBCFD846D556D472C76AB2BD3AC909594EDD858F8523E8FCB15B2D04BE
24,514,998 UART: [art] SIG.S = 4A5D0D0F815CDA6FAD5118478ED770F480A9B20FFA1BC9451FC935F95589727DD59B7165590F40B9FA0998AC2B4433B4
25,493,433 UART: Caliptra RT
25,494,147 UART: [state] CFI Enabled
25,611,173 UART: [rt] RT listening for mailbox commands...
25,642,809 UART: [rt]cmd =0x46505344, len=4
25,752,358 >>> mbox cmd response data (8 bytes)
25,752,892 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,753,180 UART: Fatal Error: 0x000E0008
25,754,322 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,437,644 ready_for_fw is high
3,438,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,719,350 >>> mbox cmd response: success
14,720,261 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,008,198 UART:
19,008,608 UART: Running Caliptra FMC ...
19,009,735 UART:
19,009,891 UART: [state] CFI Enabled
19,073,329 UART: [fht] FMC Alias Private Key: 7
20,837,406 UART: [art] Extend RT PCRs Done
20,838,625 UART: [art] Lock RT PCRs Done
20,840,441 UART: [art] Populate DV Done
20,845,689 UART: [fht] FMC Alias Private Key: 7
20,847,345 UART: [art] Derive CDI
20,848,081 UART: [art] Store in in slot 0x4
20,906,077 UART: [art] Derive Key Pair
20,907,117 UART: [art] Store priv key in slot 0x5
23,370,233 UART: [art] Derive Key Pair - Done
23,383,271 UART: [art] Signing Cert with AUTHO
23,384,609 UART: RITY.KEYID = 7
25,096,008 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,540 UART: [art] PUB.X = 9B255AE2E66D9119BDAF4E3FF55EAEA20CF10780AD35E98408820D359D488EE98ED00826C40F58E36483145ED0515188
25,104,792 UART: [art] PUB.Y = FD31E876A80FD9CD819571A0444238FDFC1A3A94D2B1BAF1CD58E2D82C73E6CE5CB26C7B426ED3F1FD0095CCF8D07320
25,112,037 UART: [art] SIG.R = FAF5E044A8C3F57C3F07C9BAC1D856D7A2C23C058840170176546D40C5E2B15ABC977FF1C270CADD4D7C3CB1DBB93191
25,119,420 UART: [art] SIG.S = 7704B52DF46AF996FA5AB61FB264829E84A6D28C1E1E380E74B255C54CA15D2A617D9ED891DE9EEDED2BB3C175EC4A01
26,098,860 UART: Caliptra RT
26,099,687 UART: [state] CFI Enabled
26,262,630 UART: [rt] RT listening for mailbox commands...
26,293,765 UART: [rt]cmd =0x46505344, len=4
26,404,025 >>> mbox cmd response data (8 bytes)
26,404,547 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,404,829 UART: Fatal Error: 0x000E0008
26,405,971 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,759,712 ready_for_fw is high
3,760,115 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,958,320 >>> mbox cmd response: success
14,959,152 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,209,319 UART:
19,209,723 UART: Running Caliptra FMC ...
19,210,818 UART:
19,210,991 UART: [state] CFI Enabled
19,219,122 UART: [fht] FMC Alias Private Key: 7
20,975,699 UART: [art] Extend RT PCRs Done
20,976,923 UART: [art] Lock RT PCRs Done
20,978,117 UART: [art] Populate DV Done
20,983,692 UART: [fht] FMC Alias Private Key: 7
20,985,273 UART: [art] Derive CDI
20,986,038 UART: [art] Store in in slot 0x4
21,028,748 UART: [art] Derive Key Pair
21,029,756 UART: [art] Store priv key in slot 0x5
23,457,306 UART: [art] Derive Key Pair - Done
23,470,347 UART: [art] Signing Cert with AUTHO
23,471,697 UART: RITY.KEYID = 7
25,177,397 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,908 UART: [art] PUB.X = F3EACCEC5DA38962439B75065E3F939A0E080AB657E7A1BBABF1E397681151DBF3DDEE533D70041AB7D16A9E5949B6AF
25,186,218 UART: [art] PUB.Y = 83B663E9869C9321EB1F9EC75F7A5E20D16BC49C5D9C6D4B4951A27DF460DE669B31A3EBDCE31A55173C954B7F5D1606
25,193,465 UART: [art] SIG.R = 42AA34F2BD9874B963DC9C1AA7DBFF715653F14ECE1D72FB214756BE612B2EC92A23605A233DB0A819CE6B0426E2C28B
25,200,851 UART: [art] SIG.S = 7AB80A2A8FC2C8F1E738C57C7D981BD8F471809ADF071F11E41BF21FDFC2B57129C11770483657CA8A179188270E3314
26,179,557 UART: Caliptra RT
26,180,265 UART: [state] CFI Enabled
26,296,620 UART: [rt] RT listening for mailbox commands...
26,328,458 UART: [rt]cmd =0x46505344, len=4
26,438,368 >>> mbox cmd response data (8 bytes)
26,438,890 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,439,183 UART: Fatal Error: 0x000E0008
26,440,350 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,173 UART: [kat] SHA2-256
892,111 UART: [kat] SHA2-384
894,912 UART: [kat] SHA2-512-ACC
896,813 UART: [kat] ECC-384
902,396 UART: [kat] HMAC-384Kdf
907,084 UART: [kat] LMS
1,475,280 UART: [kat] --
1,475,929 UART: [cold-reset] ++
1,476,431 UART: [fht] Storing FHT @ 0x50003400
1,479,036 UART: [idev] ++
1,479,204 UART: [idev] CDI.KEYID = 6
1,479,564 UART: [idev] SUBJECT.KEYID = 7
1,479,988 UART: [idev] UDS.KEYID = 0
1,480,333 ready_for_fw is high
1,480,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,860 UART: [idev] Erasing UDS.KEYID = 0
1,504,488 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,226 UART: [idev] --
1,514,279 UART: [ldev] ++
1,514,447 UART: [ldev] CDI.KEYID = 6
1,514,810 UART: [ldev] SUBJECT.KEYID = 5
1,515,236 UART: [ldev] AUTHORITY.KEYID = 7
1,515,699 UART: [ldev] FE.KEYID = 1
1,520,807 UART: [ldev] Erasing FE.KEYID = 1
1,545,890 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,938 UART: [ldev] --
1,585,341 UART: [fwproc] Waiting for Commands...
1,586,008 UART: [fwproc] Received command 0x46574c44
1,586,799 UART: [fwproc] Received Image of size 114448 bytes
2,885,912 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,576 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,928 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,055 >>> mbox cmd response: success
3,079,055 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,080,195 UART: [afmc] ++
3,080,363 UART: [afmc] CDI.KEYID = 6
3,080,725 UART: [afmc] SUBJECT.KEYID = 7
3,081,150 UART: [afmc] AUTHORITY.KEYID = 5
3,116,349 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,497 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,005 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,890 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,580 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,681 UART: [afmc] --
3,159,751 UART: [cold-reset] --
3,160,377 UART: [state] Locking Datavault
3,161,608 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,212 UART: [state] Locking ICCM
3,162,706 UART: [exit] Launching FMC @ 0x40000130
3,168,035 UART:
3,168,051 UART: Running Caliptra FMC ...
3,168,459 UART:
3,168,513 UART: [state] CFI Enabled
3,179,010 UART: [fht] FMC Alias Private Key: 7
3,287,621 UART: [art] Extend RT PCRs Done
3,288,049 UART: [art] Lock RT PCRs Done
3,289,465 UART: [art] Populate DV Done
3,297,782 UART: [fht] FMC Alias Private Key: 7
3,298,718 UART: [art] Derive CDI
3,298,998 UART: [art] Store in in slot 0x4
3,384,357 UART: [art] Derive Key Pair
3,384,717 UART: [art] Store priv key in slot 0x5
3,397,553 UART: [art] Derive Key Pair - Done
3,412,416 UART: [art] Signing Cert with AUTHO
3,412,896 UART: RITY.KEYID = 7
3,428,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,933 UART: [art] PUB.X = 93CBB348E8135E44C513E5C8D377257790ECD2F90A81F18D743F6B2A7403E79FBD65766316550B805C6CC35FF6582CFB
3,435,696 UART: [art] PUB.Y = 5A36A2A072C9802469410AB91C50E7C8CEBDB00819B45F0404FF685EB79B080927FC2341D29E8B4B6A6BD8BA5994670E
3,442,629 UART: [art] SIG.R = 04EF5B3C321C25987BF96EA98C2B4E51C8842F914164ED70A12E4D267D38CF523BE69EC70C34E5F46C2C72C23EC1610B
3,449,398 UART: [art] SIG.S = 92C4CA749C88611338A1CCB08AF15120B18BC0E3BD583E4C7725A4C1E4C690547F0EC07FE7E8CE5065ADADB75A617583
3,473,194 UART: Caliptra RT
3,473,447 UART: [state] CFI Enabled
3,581,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,238 UART: [rt]cmd =0x46505344, len=4
3,720,264 >>> mbox cmd response data (8 bytes)
3,720,265 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,720,301 UART: Fatal Error: 0x000E0008
3,721,435 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,381 ready_for_fw is high
1,362,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,427 >>> mbox cmd response: success
2,928,427 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,990,303 UART:
2,990,319 UART: Running Caliptra FMC ...
2,990,727 UART:
2,990,781 UART: [state] CFI Enabled
3,001,450 UART: [fht] FMC Alias Private Key: 7
3,108,809 UART: [art] Extend RT PCRs Done
3,109,237 UART: [art] Lock RT PCRs Done
3,110,707 UART: [art] Populate DV Done
3,118,984 UART: [fht] FMC Alias Private Key: 7
3,120,028 UART: [art] Derive CDI
3,120,308 UART: [art] Store in in slot 0x4
3,205,997 UART: [art] Derive Key Pair
3,206,357 UART: [art] Store priv key in slot 0x5
3,219,131 UART: [art] Derive Key Pair - Done
3,234,165 UART: [art] Signing Cert with AUTHO
3,234,645 UART: RITY.KEYID = 7
3,249,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,706 UART: [art] PUB.X = 82840C517D6BF1122EA85229EEF32A31CD47FBC21FE95EBD2932F91CA00D022CC9FA94FAA5221E404A8B3AB78E5D7059
3,257,481 UART: [art] PUB.Y = 0623DB84602E4238E723918DFF520AA55552EECA0851683E0A4DE3FBA6742E217084AA6325229F3F89AFDAA0674FE790
3,264,421 UART: [art] SIG.R = CF83F6EE6559297999DF10A84A512E7FCD0DB5C807B1FEC494026CE7C6A52952BDC714855980C06C627AA8205532E7CC
3,271,188 UART: [art] SIG.S = C5F98312B9CB1038B81DA78BBC7ECD0A4E3E23C742223433C3348711429D018C1AACC906133D5EF7DE36955A6C48509F
3,295,098 UART: Caliptra RT
3,295,351 UART: [state] CFI Enabled
3,403,417 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,089 UART: [rt]cmd =0x46505344, len=4
3,542,527 >>> mbox cmd response data (8 bytes)
3,542,528 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,542,564 UART: Fatal Error: 0x000E0008
3,543,698 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,210 UART: [kat] SHA2-256
882,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,256 UART: [kat] ++
886,408 UART: [kat] sha1
890,598 UART: [kat] SHA2-256
892,536 UART: [kat] SHA2-384
895,517 UART: [kat] SHA2-512-ACC
897,418 UART: [kat] ECC-384
903,261 UART: [kat] HMAC-384Kdf
907,975 UART: [kat] LMS
1,476,171 UART: [kat] --
1,477,054 UART: [cold-reset] ++
1,477,460 UART: [fht] Storing FHT @ 0x50003400
1,480,399 UART: [idev] ++
1,480,567 UART: [idev] CDI.KEYID = 6
1,480,927 UART: [idev] SUBJECT.KEYID = 7
1,481,351 UART: [idev] UDS.KEYID = 0
1,481,696 ready_for_fw is high
1,481,696 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,461 UART: [idev] Erasing UDS.KEYID = 0
1,506,277 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,869 UART: [idev] --
1,516,018 UART: [ldev] ++
1,516,186 UART: [ldev] CDI.KEYID = 6
1,516,549 UART: [ldev] SUBJECT.KEYID = 5
1,516,975 UART: [ldev] AUTHORITY.KEYID = 7
1,517,438 UART: [ldev] FE.KEYID = 1
1,522,704 UART: [ldev] Erasing FE.KEYID = 1
1,548,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,435 UART: [ldev] --
1,587,858 UART: [fwproc] Waiting for Commands...
1,588,661 UART: [fwproc] Received command 0x46574c44
1,589,452 UART: [fwproc] Received Image of size 114448 bytes
2,889,323 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,969 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,368 >>> mbox cmd response: success
3,082,368 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,083,568 UART: [afmc] ++
3,083,736 UART: [afmc] CDI.KEYID = 6
3,084,098 UART: [afmc] SUBJECT.KEYID = 7
3,084,523 UART: [afmc] AUTHORITY.KEYID = 5
3,119,718 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,260 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,137,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,653 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,343 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,068 UART: [afmc] --
3,163,162 UART: [cold-reset] --
3,164,116 UART: [state] Locking Datavault
3,165,523 UART: [state] Locking PCR0, PCR1 and PCR31
3,166,127 UART: [state] Locking ICCM
3,166,599 UART: [exit] Launching FMC @ 0x40000130
3,171,928 UART:
3,171,944 UART: Running Caliptra FMC ...
3,172,352 UART:
3,172,495 UART: [state] CFI Enabled
3,183,230 UART: [fht] FMC Alias Private Key: 7
3,292,021 UART: [art] Extend RT PCRs Done
3,292,449 UART: [art] Lock RT PCRs Done
3,293,901 UART: [art] Populate DV Done
3,302,246 UART: [fht] FMC Alias Private Key: 7
3,303,412 UART: [art] Derive CDI
3,303,692 UART: [art] Store in in slot 0x4
3,389,357 UART: [art] Derive Key Pair
3,389,717 UART: [art] Store priv key in slot 0x5
3,403,003 UART: [art] Derive Key Pair - Done
3,418,075 UART: [art] Signing Cert with AUTHO
3,418,555 UART: RITY.KEYID = 7
3,433,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,434,762 UART: [art] PUB.X = 7478543869DDFEA04DAC69DD4B255D76C6347CDC8FF129AE967885B07DAE0344AE20CEFA35D4C4BFD76E2E87EE631081
3,441,545 UART: [art] PUB.Y = 8CCB3C3CB85148DB23294B10116AEEBB230A1B25C0D4DF7D6C1E55DAF78872E41C186DFD19FAE1F45D306E3C64774025
3,448,506 UART: [art] SIG.R = 7180118726B94E766D02F09021E5D36E13582C8010409F57EA0573DD9287B771CA8D5800B583B2F29630D2C59F089514
3,455,229 UART: [art] SIG.S = A37EA2C29A0D20C75136AA1E199F428F8EA1690184BCDA7122F439B858FDA87DCBBDE9B187FFEC698924CCB3B56F6ECA
3,479,226 UART: Caliptra RT
3,479,571 UART: [state] CFI Enabled
3,587,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,922 UART: [rt]cmd =0x46505344, len=4
3,726,250 >>> mbox cmd response data (8 bytes)
3,726,251 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,726,287 UART: Fatal Error: 0x000E0008
3,727,421 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,608 ready_for_fw is high
1,362,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,011 >>> mbox cmd response: success
2,930,011 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,991,297 UART:
2,991,313 UART: Running Caliptra FMC ...
2,991,721 UART:
2,991,864 UART: [state] CFI Enabled
3,002,953 UART: [fht] FMC Alias Private Key: 7
3,111,194 UART: [art] Extend RT PCRs Done
3,111,622 UART: [art] Lock RT PCRs Done
3,112,840 UART: [art] Populate DV Done
3,121,283 UART: [fht] FMC Alias Private Key: 7
3,122,399 UART: [art] Derive CDI
3,122,679 UART: [art] Store in in slot 0x4
3,208,036 UART: [art] Derive Key Pair
3,208,396 UART: [art] Store priv key in slot 0x5
3,221,694 UART: [art] Derive Key Pair - Done
3,236,608 UART: [art] Signing Cert with AUTHO
3,237,088 UART: RITY.KEYID = 7
3,251,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,575 UART: [art] PUB.X = B14735A30325012EF93BB7C63109DC4F392F61098C27E07E4C5F4D8A6EAE284E9D1DB323A077DB08845BAAED7F897BD4
3,259,340 UART: [art] PUB.Y = D68819FA9013AC15E08C10C7198EAD37935F940D56674FA73ACC9E4D1FCAF2D917CBA77E3248FC71CF03430BEA3490DE
3,266,295 UART: [art] SIG.R = 15BD056EBDB367E631A79698355D9E52CE97851392E69918949F6515A0D0A32F0266244CF1F7D07B83507B7BE18A90C9
3,273,053 UART: [art] SIG.S = E1E32DD19EF32E41B11EAC2B30773700D55D0769B3BCA993538AEF07B5A2C6B0444E8B79985CEEB211CAC836F4DDEEF9
3,296,660 UART: Caliptra RT
3,297,005 UART: [state] CFI Enabled
3,405,362 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,728 UART: [rt]cmd =0x46505344, len=4
3,544,044 >>> mbox cmd response data (8 bytes)
3,544,045 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,544,081 UART: Fatal Error: 0x000E0008
3,545,215 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
893,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,577 UART: [kat] ++
897,729 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
917,930 UART: [kat] HMAC-384Kdf
922,484 UART: [kat] LMS
1,170,812 UART: [kat] --
1,171,429 UART: [cold-reset] ++
1,171,869 UART: [fht] FHT @ 0x50003400
1,174,460 UART: [idev] ++
1,174,628 UART: [idev] CDI.KEYID = 6
1,174,988 UART: [idev] SUBJECT.KEYID = 7
1,175,412 UART: [idev] UDS.KEYID = 0
1,175,757 ready_for_fw is high
1,175,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,510 UART: [idev] Erasing UDS.KEYID = 0
1,200,491 UART: [idev] Sha1 KeyId Algorithm
1,208,955 UART: [idev] --
1,209,969 UART: [ldev] ++
1,210,137 UART: [ldev] CDI.KEYID = 6
1,210,500 UART: [ldev] SUBJECT.KEYID = 5
1,210,926 UART: [ldev] AUTHORITY.KEYID = 7
1,211,389 UART: [ldev] FE.KEYID = 1
1,216,371 UART: [ldev] Erasing FE.KEYID = 1
1,242,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,159 UART: [ldev] --
1,281,532 UART: [fwproc] Wait for Commands...
1,282,288 UART: [fwproc] Recv command 0x46574c44
1,283,016 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,988 >>> mbox cmd response: success
2,775,988 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,777,176 UART: [afmc] ++
2,777,344 UART: [afmc] CDI.KEYID = 6
2,777,706 UART: [afmc] SUBJECT.KEYID = 7
2,778,131 UART: [afmc] AUTHORITY.KEYID = 5
2,813,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,317 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,202 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,921 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,855 UART: [afmc] --
2,856,909 UART: [cold-reset] --
2,857,881 UART: [state] Locking Datavault
2,859,444 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,048 UART: [state] Locking ICCM
2,860,506 UART: [exit] Launching FMC @ 0x40000130
2,865,835 UART:
2,865,851 UART: Running Caliptra FMC ...
2,866,259 UART:
2,866,313 UART: [state] CFI Enabled
2,876,814 UART: [fht] FMC Alias Private Key: 7
2,984,861 UART: [art] Extend RT PCRs Done
2,985,289 UART: [art] Lock RT PCRs Done
2,987,057 UART: [art] Populate DV Done
2,995,460 UART: [fht] FMC Alias Private Key: 7
2,996,574 UART: [art] Derive CDI
2,996,854 UART: [art] Store in in slot 0x4
3,082,491 UART: [art] Derive Key Pair
3,082,851 UART: [art] Store priv key in slot 0x5
3,096,209 UART: [art] Derive Key Pair - Done
3,111,066 UART: [art] Signing Cert with AUTHO
3,111,546 UART: RITY.KEYID = 7
3,126,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,131 UART: [art] PUB.X = 4F61BF6E6C12B22048A6BFCEBBD1E7F07F96A10385C507A769F3B657FE2038B3B5B3CA8A3AF715E66855AC1754B8DD6B
3,133,911 UART: [art] PUB.Y = 228DE2AE53DFC4F06847B3588D983AD2F11EE9058F4C4D88D170D70E501F717357B8E7BC44F942153A789EF1A7B6E80E
3,140,858 UART: [art] SIG.R = 6E569020DA33F489A2C919387DF57A491EFC1150F7BF383BC822192392B6376399F5A5AD6088CB67DA431425CE7A713A
3,147,626 UART: [art] SIG.S = 94E5B0E4B0078980AB8F885BDCF4E776D0E7B9716C6299D70B043047108B6F037E51864E8EF090DAB509BCC171CBB63F
3,170,922 UART: Caliptra RT
3,171,175 UART: [state] CFI Enabled
3,280,228 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,456 UART: [rt]cmd =0x46505344, len=4
3,418,768 >>> mbox cmd response data (8 bytes)
3,418,769 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,418,805 UART: Fatal Error: 0x000E0008
3,419,939 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,153 ready_for_fw is high
1,060,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,073 >>> mbox cmd response: success
2,626,073 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,688,751 UART:
2,688,767 UART: Running Caliptra FMC ...
2,689,175 UART:
2,689,229 UART: [state] CFI Enabled
2,699,758 UART: [fht] FMC Alias Private Key: 7
2,807,977 UART: [art] Extend RT PCRs Done
2,808,405 UART: [art] Lock RT PCRs Done
2,810,073 UART: [art] Populate DV Done
2,818,118 UART: [fht] FMC Alias Private Key: 7
2,819,256 UART: [art] Derive CDI
2,819,536 UART: [art] Store in in slot 0x4
2,905,267 UART: [art] Derive Key Pair
2,905,627 UART: [art] Store priv key in slot 0x5
2,918,503 UART: [art] Derive Key Pair - Done
2,933,529 UART: [art] Signing Cert with AUTHO
2,934,009 UART: RITY.KEYID = 7
2,948,677 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,442 UART: [art] PUB.X = 322AFCC7F29F7EC937FAB96511AEDF68ACEDA460115B08D5DF7C4D4239AB71A04E897A5C43647DAC20DEA21C2110BC2F
2,956,231 UART: [art] PUB.Y = 79DF0819CC30BF2B616D03F4B338974CD4ACA3C534F83779EC7DF4D830ABAE5BE50410BA2CB5536448BDF9B33F2E9FA7
2,963,190 UART: [art] SIG.R = 1F1D6377E79E8B423C356D1B8D756C46FE061564CCC563FCA45AD7EB7A84AF82F929AC3CAF6C9DC93D93F08022D6A6C0
2,969,973 UART: [art] SIG.S = 9C9AFB16401E74FE9C90F30CB8A67F2D49414D7DEFBF9E480BFDFDF838F2ED6C630D1B01775F7EB04488F54F47384FDD
2,993,676 UART: Caliptra RT
2,993,929 UART: [state] CFI Enabled
3,100,992 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,924 UART: [rt]cmd =0x46505344, len=4
3,240,388 >>> mbox cmd response data (8 bytes)
3,240,389 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,240,425 UART: Fatal Error: 0x000E0008
3,241,559 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
893,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,852 UART: [kat] ++
898,004 UART: [kat] sha1
902,394 UART: [kat] SHA2-256
904,334 UART: [kat] SHA2-384
907,131 UART: [kat] SHA2-512-ACC
909,032 UART: [kat] ECC-384
919,083 UART: [kat] HMAC-384Kdf
923,697 UART: [kat] LMS
1,172,025 UART: [kat] --
1,173,090 UART: [cold-reset] ++
1,173,444 UART: [fht] FHT @ 0x50003400
1,176,099 UART: [idev] ++
1,176,267 UART: [idev] CDI.KEYID = 6
1,176,627 UART: [idev] SUBJECT.KEYID = 7
1,177,051 UART: [idev] UDS.KEYID = 0
1,177,396 ready_for_fw is high
1,177,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,151 UART: [idev] Erasing UDS.KEYID = 0
1,202,082 UART: [idev] Sha1 KeyId Algorithm
1,210,714 UART: [idev] --
1,211,896 UART: [ldev] ++
1,212,064 UART: [ldev] CDI.KEYID = 6
1,212,427 UART: [ldev] SUBJECT.KEYID = 5
1,212,853 UART: [ldev] AUTHORITY.KEYID = 7
1,213,316 UART: [ldev] FE.KEYID = 1
1,218,726 UART: [ldev] Erasing FE.KEYID = 1
1,244,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,452 UART: [ldev] --
1,283,851 UART: [fwproc] Wait for Commands...
1,284,613 UART: [fwproc] Recv command 0x46574c44
1,285,341 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,464 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,813 >>> mbox cmd response: success
2,777,813 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,778,971 UART: [afmc] ++
2,779,139 UART: [afmc] CDI.KEYID = 6
2,779,501 UART: [afmc] SUBJECT.KEYID = 7
2,779,926 UART: [afmc] AUTHORITY.KEYID = 5
2,816,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,812 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,560 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,288 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,173 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,892 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,728 UART: [afmc] --
2,859,646 UART: [cold-reset] --
2,860,422 UART: [state] Locking Datavault
2,861,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,869 UART: [state] Locking ICCM
2,862,385 UART: [exit] Launching FMC @ 0x40000130
2,867,714 UART:
2,867,730 UART: Running Caliptra FMC ...
2,868,138 UART:
2,868,281 UART: [state] CFI Enabled
2,879,124 UART: [fht] FMC Alias Private Key: 7
2,987,143 UART: [art] Extend RT PCRs Done
2,987,571 UART: [art] Lock RT PCRs Done
2,989,033 UART: [art] Populate DV Done
2,997,312 UART: [fht] FMC Alias Private Key: 7
2,998,478 UART: [art] Derive CDI
2,998,758 UART: [art] Store in in slot 0x4
3,084,419 UART: [art] Derive Key Pair
3,084,779 UART: [art] Store priv key in slot 0x5
3,098,583 UART: [art] Derive Key Pair - Done
3,113,555 UART: [art] Signing Cert with AUTHO
3,114,035 UART: RITY.KEYID = 7
3,129,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,766 UART: [art] PUB.X = 76C4CD982168B6B84D41152FC24E7473D5341463F587E2C85024060DE4F283B10BC7D7E085763D14362D50E73641FB0A
3,136,516 UART: [art] PUB.Y = C8098B20212C626D3259E477F35CE5A61C7CD259D2D6DA5562A18D65ADBF8142959A696D903E0108ECA9485A3E7B9C6A
3,143,461 UART: [art] SIG.R = 85EC1961E0E679E89AC37972A5A6E094FA3E2BB9AB6ACBBE95C99D3CF5459BF550E14E9B3CDEA9BED929BCD6402A5FAE
3,150,259 UART: [art] SIG.S = 6936768D811C2FAD3885ABDF8D3F0322DC0677BBEB1707D63E5AD10D86CCF1AAD3EBBDF1A9B991BBDE31364FF49C1A60
3,174,310 UART: Caliptra RT
3,174,655 UART: [state] CFI Enabled
3,282,892 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,536 UART: [rt]cmd =0x46505344, len=4
3,422,122 >>> mbox cmd response data (8 bytes)
3,422,123 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,422,159 UART: Fatal Error: 0x000E0008
3,423,293 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,290 ready_for_fw is high
1,059,290 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,134 >>> mbox cmd response: success
2,627,134 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,690,398 UART:
2,690,414 UART: Running Caliptra FMC ...
2,690,822 UART:
2,690,965 UART: [state] CFI Enabled
2,701,922 UART: [fht] FMC Alias Private Key: 7
2,809,679 UART: [art] Extend RT PCRs Done
2,810,107 UART: [art] Lock RT PCRs Done
2,811,547 UART: [art] Populate DV Done
2,819,598 UART: [fht] FMC Alias Private Key: 7
2,820,778 UART: [art] Derive CDI
2,821,058 UART: [art] Store in in slot 0x4
2,906,505 UART: [art] Derive Key Pair
2,906,865 UART: [art] Store priv key in slot 0x5
2,920,129 UART: [art] Derive Key Pair - Done
2,934,768 UART: [art] Signing Cert with AUTHO
2,935,248 UART: RITY.KEYID = 7
2,950,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,393 UART: [art] PUB.X = E9C96C84DD0F72EBEB2BAC99837A1988C2386543913B6550E1725F692F1EC668F98D5C65C8763977AEACF8B64E768DA7
2,958,166 UART: [art] PUB.Y = 1BB2DC70C611053F4FBBE3062E6FAB08E3DC97DBE5C77479B1819F35FCCEE037A873E1D96D74985289D3737CE8FBF50C
2,965,120 UART: [art] SIG.R = 44515CD344473FCD1E852D6E4B1AABE187A9BD25BD479AFAC0A14EC10047BDDC71E6F068DCCE276D96E2135B6CDBEFF0
2,971,894 UART: [art] SIG.S = 41D48543C280BC3F60DC84626427299A4981D97B6601D6D1624DB1345CBC25697ADDB7AA03F01223C5756D424A5F0323
2,996,364 UART: Caliptra RT
2,996,709 UART: [state] CFI Enabled
3,104,502 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,036 UART: [rt]cmd =0x46505344, len=4
3,243,388 >>> mbox cmd response data (8 bytes)
3,243,389 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,243,425 UART: Fatal Error: 0x000E0008
3,244,559 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,134 UART: [kat] SHA2-256
890,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,813 UART: [kat] ++
894,965 UART: [kat] sha1
899,379 UART: [kat] SHA2-256
901,319 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,170,013 UART: [fht] FHT @ 0x50003400
1,172,785 UART: [idev] ++
1,172,953 UART: [idev] CDI.KEYID = 6
1,173,314 UART: [idev] SUBJECT.KEYID = 7
1,173,739 UART: [idev] UDS.KEYID = 0
1,174,085 ready_for_fw is high
1,174,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,703 UART: [idev] Erasing UDS.KEYID = 0
1,199,105 UART: [idev] Sha1 KeyId Algorithm
1,208,037 UART: [idev] --
1,209,108 UART: [ldev] ++
1,209,276 UART: [ldev] CDI.KEYID = 6
1,209,640 UART: [ldev] SUBJECT.KEYID = 5
1,210,067 UART: [ldev] AUTHORITY.KEYID = 7
1,210,530 UART: [ldev] FE.KEYID = 1
1,215,936 UART: [ldev] Erasing FE.KEYID = 1
1,242,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,456 UART: [ldev] --
1,281,892 UART: [fwproc] Wait for Commands...
1,282,697 UART: [fwproc] Recv command 0x46574c44
1,283,430 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,800 >>> mbox cmd response: success
2,773,800 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,774,923 UART: [afmc] ++
2,775,091 UART: [afmc] CDI.KEYID = 6
2,775,454 UART: [afmc] SUBJECT.KEYID = 7
2,775,880 UART: [afmc] AUTHORITY.KEYID = 5
2,810,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,768 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,487 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,284 UART: [afmc] --
2,854,166 UART: [cold-reset] --
2,855,176 UART: [state] Locking Datavault
2,856,423 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,027 UART: [state] Locking ICCM
2,857,621 UART: [exit] Launching FMC @ 0x40000130
2,862,950 UART:
2,862,966 UART: Running Caliptra FMC ...
2,863,374 UART:
2,863,428 UART: [state] CFI Enabled
2,873,909 UART: [fht] FMC Alias Private Key: 7
2,981,496 UART: [art] Extend RT PCRs Done
2,981,924 UART: [art] Lock RT PCRs Done
2,983,142 UART: [art] Populate DV Done
2,991,629 UART: [fht] FMC Alias Private Key: 7
2,992,769 UART: [art] Derive CDI
2,993,049 UART: [art] Store in in slot 0x4
3,078,848 UART: [art] Derive Key Pair
3,079,208 UART: [art] Store priv key in slot 0x5
3,092,300 UART: [art] Derive Key Pair - Done
3,107,009 UART: [art] Signing Cert with AUTHO
3,107,489 UART: RITY.KEYID = 7
3,122,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,540 UART: [art] PUB.X = 85774000A8D0DFBA93DC6127514EE1F2C9E4B4C10F68CB848396C80E1770B90610E01F54C9A2B511E92D7254884EFB03
3,130,276 UART: [art] PUB.Y = 73C91893B0729E95EA33164236F039CFAC6A48A4FBEF7392A31EDA585EFA554C78FBDC3DC559F1980068636C5258810E
3,137,205 UART: [art] SIG.R = 7E4C98A375A349FC0529D92D99E7903CBA28861180A8F1AD4C04CA0F8AC116B5AC4A3BFB40CD44DBB790CE6022E5E5EC
3,143,984 UART: [art] SIG.S = 086A5E93B05ED3A44AC44D5D6D2FFA89F4CC9CB1AC74932241FAA82B40F859792F11041442CA5DC66C060FEAED244BD8
3,167,433 UART: Caliptra RT
3,167,686 UART: [state] CFI Enabled
3,276,239 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,309 UART: [rt]cmd =0x46505344, len=4
3,414,749 >>> mbox cmd response data (8 bytes)
3,414,750 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,414,786 UART: Fatal Error: 0x000E0008
3,415,920 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,544 ready_for_fw is high
1,055,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,138 >>> mbox cmd response: success
2,624,138 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,685,404 UART:
2,685,420 UART: Running Caliptra FMC ...
2,685,828 UART:
2,685,882 UART: [state] CFI Enabled
2,696,349 UART: [fht] FMC Alias Private Key: 7
2,803,886 UART: [art] Extend RT PCRs Done
2,804,314 UART: [art] Lock RT PCRs Done
2,805,832 UART: [art] Populate DV Done
2,814,037 UART: [fht] FMC Alias Private Key: 7
2,815,031 UART: [art] Derive CDI
2,815,311 UART: [art] Store in in slot 0x4
2,901,128 UART: [art] Derive Key Pair
2,901,488 UART: [art] Store priv key in slot 0x5
2,915,456 UART: [art] Derive Key Pair - Done
2,930,745 UART: [art] Signing Cert with AUTHO
2,931,225 UART: RITY.KEYID = 7
2,946,605 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,370 UART: [art] PUB.X = C174227B73ABA0FDC5550D616AA92406F42714B554E202B1A63078DC5DC687091AF59BF3A53FE0F9BD12DB8E96A75588
2,954,134 UART: [art] PUB.Y = 8A1BF4D30B5FC67377CC2903919E74D444A003784D922AE9E43BD1735B267C4F0AAB3D5730C57510F458DB937AF6A385
2,961,074 UART: [art] SIG.R = D8C919ED72962FAA2BE722AA3D2FED66926E276D006CB78FC1EC6F27DE75F3F8D4F10474DE3DE8CD4021BC0E8F81A99D
2,967,838 UART: [art] SIG.S = 147EAABF492E48456854D204209A40717B6D22F4216E072A5D7ABBFC730D87A095C5D232BBE2E74CCC63D1FF5314DF87
2,992,238 UART: Caliptra RT
2,992,491 UART: [state] CFI Enabled
3,100,998 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,348 UART: [rt]cmd =0x46505344, len=4
3,239,920 >>> mbox cmd response data (8 bytes)
3,239,921 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,239,957 UART: Fatal Error: 0x000E0008
3,241,091 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,199 UART: [kat] HMAC-384Kdf
920,965 UART: [kat] LMS
1,169,277 UART: [kat] --
1,170,038 UART: [cold-reset] ++
1,170,516 UART: [fht] FHT @ 0x50003400
1,173,112 UART: [idev] ++
1,173,280 UART: [idev] CDI.KEYID = 6
1,173,641 UART: [idev] SUBJECT.KEYID = 7
1,174,066 UART: [idev] UDS.KEYID = 0
1,174,412 ready_for_fw is high
1,174,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,702 UART: [idev] Erasing UDS.KEYID = 0
1,199,318 UART: [idev] Sha1 KeyId Algorithm
1,208,236 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,955 UART: [ldev] Erasing FE.KEYID = 1
1,242,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,281,879 UART: [fwproc] Wait for Commands...
1,282,490 UART: [fwproc] Recv command 0x46574c44
1,283,223 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,327 >>> mbox cmd response: success
2,776,327 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,777,344 UART: [afmc] ++
2,777,512 UART: [afmc] CDI.KEYID = 6
2,777,875 UART: [afmc] SUBJECT.KEYID = 7
2,778,301 UART: [afmc] AUTHORITY.KEYID = 5
2,813,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,569 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,181 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,900 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,623 UART: [afmc] --
2,856,565 UART: [cold-reset] --
2,857,309 UART: [state] Locking Datavault
2,858,586 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,190 UART: [state] Locking ICCM
2,859,806 UART: [exit] Launching FMC @ 0x40000130
2,865,135 UART:
2,865,151 UART: Running Caliptra FMC ...
2,865,559 UART:
2,865,702 UART: [state] CFI Enabled
2,876,125 UART: [fht] FMC Alias Private Key: 7
2,983,770 UART: [art] Extend RT PCRs Done
2,984,198 UART: [art] Lock RT PCRs Done
2,985,782 UART: [art] Populate DV Done
2,994,135 UART: [fht] FMC Alias Private Key: 7
2,995,245 UART: [art] Derive CDI
2,995,525 UART: [art] Store in in slot 0x4
3,081,586 UART: [art] Derive Key Pair
3,081,946 UART: [art] Store priv key in slot 0x5
3,095,974 UART: [art] Derive Key Pair - Done
3,110,598 UART: [art] Signing Cert with AUTHO
3,111,078 UART: RITY.KEYID = 7
3,126,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,309 UART: [art] PUB.X = 493FE628C8A598B1FE1BBCCBB7E623F8888A755C0E53277592B7E3328E8FF16AA2C56EC60A44D14E2E47F25DFA844AD5
3,134,087 UART: [art] PUB.Y = BE590CD91DE95D9DC4EE46E81C8AEF90BE672145FB76C8E734402DB910E397ACC07F79928385BF392AB6BD2587E8D99E
3,141,048 UART: [art] SIG.R = 09A65C71E1D5C168AFAB1DF7A1066E3DC28D71F217A8A100CDE9ABA6E37A4A793F22400FBDF2F62E0D68AC558C7B6445
3,147,802 UART: [art] SIG.S = 7F2E8AA6E38708ED12274091B18B98FC5035162A08BB741246632092D9DE7AE644C6614E8DACB03F382D9124D03D3AE1
3,171,717 UART: Caliptra RT
3,172,062 UART: [state] CFI Enabled
3,280,109 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,317 UART: [rt]cmd =0x46505344, len=4
3,418,593 >>> mbox cmd response data (8 bytes)
3,418,594 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,418,630 UART: Fatal Error: 0x000E0008
3,419,764 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,071 ready_for_fw is high
1,056,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,643 >>> mbox cmd response: success
2,624,643 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,686,615 UART:
2,686,631 UART: Running Caliptra FMC ...
2,687,039 UART:
2,687,182 UART: [state] CFI Enabled
2,697,989 UART: [fht] FMC Alias Private Key: 7
2,806,436 UART: [art] Extend RT PCRs Done
2,806,864 UART: [art] Lock RT PCRs Done
2,808,500 UART: [art] Populate DV Done
2,816,711 UART: [fht] FMC Alias Private Key: 7
2,817,665 UART: [art] Derive CDI
2,817,945 UART: [art] Store in in slot 0x4
2,903,628 UART: [art] Derive Key Pair
2,903,988 UART: [art] Store priv key in slot 0x5
2,917,386 UART: [art] Derive Key Pair - Done
2,932,592 UART: [art] Signing Cert with AUTHO
2,933,072 UART: RITY.KEYID = 7
2,948,582 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,347 UART: [art] PUB.X = 29E7C3FDB374716996AD0234086384C385B1ECD84FE89807A5EA57474541F3DED22B2140AC3A68C4E3C2AE0C6C47609F
2,956,109 UART: [art] PUB.Y = 40C8BBC5DB9701D87D96C52A19AEA560AD499C61701C50C29B6F2A0F0375AEF7D71A4AE62C4413714388E1D486DA8BF3
2,963,060 UART: [art] SIG.R = 6A71A85BE1A71C9816BA32384D8585B4D8676EB4960D6A2AE1983687CE62F301E33B7D6EA97CFC7AF6D634768273215B
2,969,826 UART: [art] SIG.S = ACE9C2459D0D9085C49AB7C826CA01C1795D9C6FD791058A7A6F95B0617149CD1DCE9BA9229F50DE26FD320BF9B782BE
2,993,477 UART: Caliptra RT
2,993,822 UART: [state] CFI Enabled
3,101,989 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,811 UART: [rt]cmd =0x46505344, len=4
3,240,977 >>> mbox cmd response data (8 bytes)
3,240,978 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,241,014 UART: Fatal Error: 0x000E0008
3,242,148 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,072 UART:
192,432 UART: Running Caliptra ROM ...
193,637 UART:
193,796 UART: [state] CFI Enabled
265,716 UART: [state] LifecycleState = Unprovisioned
267,933 UART: [state] DebugLocked = No
269,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,508 UART: [kat] SHA2-256
445,191 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,716 UART: [kat] ++
456,204 UART: [kat] sha1
466,868 UART: [kat] SHA2-256
469,593 UART: [kat] SHA2-384
476,433 UART: [kat] SHA2-512-ACC
478,798 UART: [kat] ECC-384
2,770,144 UART: [kat] HMAC-384Kdf
2,799,158 UART: [kat] LMS
3,989,476 UART: [kat] --
3,994,131 UART: [cold-reset] ++
3,996,634 UART: [fht] Storing FHT @ 0x50003400
4,008,330 UART: [idev] ++
4,008,907 UART: [idev] CDI.KEYID = 6
4,009,916 UART: [idev] SUBJECT.KEYID = 7
4,011,100 UART: [idev] UDS.KEYID = 0
4,012,091 ready_for_fw is high
4,012,303 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,856 UART: [idev] Erasing UDS.KEYID = 0
7,346,409 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,441 UART: [idev] --
7,371,819 UART: [ldev] ++
7,372,448 UART: [ldev] CDI.KEYID = 6
7,373,365 UART: [ldev] SUBJECT.KEYID = 5
7,374,580 UART: [ldev] AUTHORITY.KEYID = 7
7,375,868 UART: [ldev] FE.KEYID = 1
7,423,430 UART: [ldev] Erasing FE.KEYID = 1
10,753,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,046 UART: [ldev] --
13,119,094 UART: [fwproc] Waiting for Commands...
13,122,434 UART: [fwproc] Received command 0x46574c44
13,124,617 UART: [fwproc] Received Image of size 114124 bytes
17,181,512 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,255,463 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,324,311 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,641,781 >>> mbox cmd response: success
17,642,332 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,645,132 UART: [afmc] ++
17,645,722 UART: [afmc] CDI.KEYID = 6
17,646,633 UART: [afmc] SUBJECT.KEYID = 7
17,647,853 UART: [afmc] AUTHORITY.KEYID = 5
21,010,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,468 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,860 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,713 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,120 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,980 UART: [afmc] --
23,382,600 UART: [cold-reset] --
23,386,522 UART: [state] Locking Datavault
23,393,130 UART: [state] Locking PCR0, PCR1 and PCR31
23,394,902 UART: [state] Locking ICCM
23,397,655 UART: [exit] Launching FMC @ 0x40000130
23,406,051 UART:
23,406,298 UART: Running Caliptra FMC ...
23,407,402 UART:
23,407,564 UART: [state] CFI Enabled
23,469,726 UART: [fht] FMC Alias Private Key: 7
25,808,402 UART: [art] Extend RT PCRs Done
25,809,639 UART: [art] Lock RT PCRs Done
25,811,404 UART: [art] Populate DV Done
25,816,874 UART: [fht] FMC Alias Private Key: 7
25,818,414 UART: [art] Derive CDI
25,819,150 UART: [art] Store in in slot 0x4
25,879,188 UART: [art] Derive Key Pair
25,880,227 UART: [art] Store priv key in slot 0x5
29,173,232 UART: [art] Derive Key Pair - Done
29,186,300 UART: [art] Signing Cert with AUTHO
29,187,599 UART: RITY.KEYID = 7
31,474,310 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,814 UART: [art] PUB.X = 7F19DFF63EC627BED56EAC64DA4EC858EFF29F92AFBC2A443B3CAE4078915599992175799970B46764EDDB41152F7DEE
31,483,057 UART: [art] PUB.Y = 9A7FEF282474B6E688B728B21BB8EA817D0D2615D2576F7BFA57B3A616AFB5B07FE63B582988BFC7BAE2A441ED9B1C69
31,490,343 UART: [art] SIG.R = 2C4C50DE1F88EC63CDA747FFA52A1A38E8FC4F8686C8576A72C24BEDFC80EFBA04220FD80705D2CA3BA86031D4AFFB05
31,497,740 UART: [art] SIG.S = E52EED1D8966B50832AF0216916E14BF54970E26928CD8EDC46F26B4A9ADE257925691EE0DC6D67EE4AEFD7125155D7A
32,802,972 UART: Caliptra RT
32,803,685 UART: [state] CFI Enabled
32,965,920 UART: [rt] RT listening for mailbox commands...
32,997,161 UART: [rt]cmd =0x46505652, len=4
32,998,438 UART: [rt] FIPS Version
32,999,823 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,784,872 ready_for_fw is high
3,785,265 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,851,965 >>> mbox cmd response: success
17,852,564 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,546,931 UART:
23,547,316 UART: Running Caliptra FMC ...
23,548,418 UART:
23,548,572 UART: [state] CFI Enabled
23,618,002 UART: [fht] FMC Alias Private Key: 7
25,956,717 UART: [art] Extend RT PCRs Done
25,957,942 UART: [art] Lock RT PCRs Done
25,959,333 UART: [art] Populate DV Done
25,964,500 UART: [fht] FMC Alias Private Key: 7
25,965,987 UART: [art] Derive CDI
25,966,727 UART: [art] Store in in slot 0x4
26,027,183 UART: [art] Derive Key Pair
26,028,230 UART: [art] Store priv key in slot 0x5
29,321,117 UART: [art] Derive Key Pair - Done
29,334,370 UART: [art] Signing Cert with AUTHO
29,335,676 UART: RITY.KEYID = 7
31,623,819 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,325 UART: [art] PUB.X = B6DAD880A735B45AEBFDE63CA7427FEF42B153F4E7BA8AABBD0B8D0D59310E160C01EF429DCD6B20D6A6E2BE476200ED
31,632,593 UART: [art] PUB.Y = EA9BB75930ED331211F563B5FD659BC45B6BB6C3D2984EC2FEFD1589E1C9C164C67F9B656CDC0CF8BCC11C279347C43D
31,639,862 UART: [art] SIG.R = 83AD0A83B6C90B69173C749E9781377C0B3DEB3D658DB76422FA66BDC6D6B374C673A65396CD49D9C6C904719B899237
31,647,237 UART: [art] SIG.S = 56241A65A70C97559BC47F30E85AC20AF7050203E700EBDCEA7319DB192B4E01F0F5EAD8B316DB8312144BFDF73F8A1A
32,952,732 UART: Caliptra RT
32,953,441 UART: [state] CFI Enabled
33,114,610 UART: [rt] RT listening for mailbox commands...
33,146,187 UART: [rt]cmd =0x46505652, len=4
33,147,498 UART: [rt] FIPS Version
33,148,716 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,357 UART:
192,726 UART: Running Caliptra ROM ...
193,863 UART:
603,506 UART: [state] CFI Enabled
614,492 UART: [state] LifecycleState = Unprovisioned
616,463 UART: [state] DebugLocked = No
617,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,279 UART: [kat] SHA2-256
793,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,590 UART: [kat] ++
804,089 UART: [kat] sha1
814,966 UART: [kat] SHA2-256
817,616 UART: [kat] SHA2-384
823,958 UART: [kat] SHA2-512-ACC
826,321 UART: [kat] ECC-384
3,108,014 UART: [kat] HMAC-384Kdf
3,120,246 UART: [kat] LMS
4,310,331 UART: [kat] --
4,314,896 UART: [cold-reset] ++
4,316,689 UART: [fht] Storing FHT @ 0x50003400
4,328,092 UART: [idev] ++
4,328,653 UART: [idev] CDI.KEYID = 6
4,329,688 UART: [idev] SUBJECT.KEYID = 7
4,330,859 UART: [idev] UDS.KEYID = 0
4,331,906 ready_for_fw is high
4,332,124 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,475,530 UART: [idev] Erasing UDS.KEYID = 0
7,621,579 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,827 UART: [idev] --
7,647,665 UART: [ldev] ++
7,648,270 UART: [ldev] CDI.KEYID = 6
7,649,183 UART: [ldev] SUBJECT.KEYID = 5
7,650,389 UART: [ldev] AUTHORITY.KEYID = 7
7,651,668 UART: [ldev] FE.KEYID = 1
7,662,035 UART: [ldev] Erasing FE.KEYID = 1
10,949,562 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,209 UART: [ldev] --
13,310,985 UART: [fwproc] Waiting for Commands...
13,312,713 UART: [fwproc] Received command 0x46574c44
13,314,894 UART: [fwproc] Received Image of size 114124 bytes
17,372,189 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,690 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,577 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,843,093 >>> mbox cmd response: success
17,843,667 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,847,003 UART: [afmc] ++
17,847,595 UART: [afmc] CDI.KEYID = 6
17,848,505 UART: [afmc] SUBJECT.KEYID = 7
17,849,767 UART: [afmc] AUTHORITY.KEYID = 5
21,163,478 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,807 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,069 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,444 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,275 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,773 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,447 UART: [afmc] --
23,529,550 UART: [cold-reset] --
23,533,622 UART: [state] Locking Datavault
23,540,049 UART: [state] Locking PCR0, PCR1 and PCR31
23,541,807 UART: [state] Locking ICCM
23,543,302 UART: [exit] Launching FMC @ 0x40000130
23,551,689 UART:
23,551,916 UART: Running Caliptra FMC ...
23,553,011 UART:
23,553,169 UART: [state] CFI Enabled
23,561,425 UART: [fht] FMC Alias Private Key: 7
25,891,710 UART: [art] Extend RT PCRs Done
25,892,932 UART: [art] Lock RT PCRs Done
25,894,659 UART: [art] Populate DV Done
25,900,333 UART: [fht] FMC Alias Private Key: 7
25,901,886 UART: [art] Derive CDI
25,902,698 UART: [art] Store in in slot 0x4
25,945,447 UART: [art] Derive Key Pair
25,946,441 UART: [art] Store priv key in slot 0x5
29,188,769 UART: [art] Derive Key Pair - Done
29,201,605 UART: [art] Signing Cert with AUTHO
29,202,914 UART: RITY.KEYID = 7
31,482,306 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,813 UART: [art] PUB.X = C2A0355E4CDCB7CE1D32A73B365FFA76679886E567BC52B7A2691C3DCA83744141D5164BE46B4E4AFFF7D4E9BFF61D7C
31,491,132 UART: [art] PUB.Y = AF0A874E2F43229B5C57F36A8BD3127CDA7BE117E9F22BC9C566D83A5E73B5F26BFA48CB5DFB25EDC0813FC76049CA67
31,498,366 UART: [art] SIG.R = B81D49A65237C030EAA40E3256D6ADDDFE96143AAE72D14A0C1F972CAECD8525719DF7F836F64C3F663A9BD04F44EC12
31,505,752 UART: [art] SIG.S = A835C09C94602737ACA24B08601FA993184ACBDBC980AF02D76EAF621491B166E3EC1B234FBD9AC0F5A1963A9A28E7E8
32,811,079 UART: Caliptra RT
32,811,795 UART: [state] CFI Enabled
32,929,417 UART: [rt] RT listening for mailbox commands...
32,960,778 UART: [rt]cmd =0x46505652, len=4
32,962,037 UART: [rt] FIPS Version
32,963,303 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
4,129,133 ready_for_fw is high
4,129,733 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,454 >>> mbox cmd response: success
18,073,097 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,711,767 UART:
23,712,148 UART: Running Caliptra FMC ...
23,713,295 UART:
23,713,449 UART: [state] CFI Enabled
23,721,341 UART: [fht] FMC Alias Private Key: 7
26,052,114 UART: [art] Extend RT PCRs Done
26,053,343 UART: [art] Lock RT PCRs Done
26,055,024 UART: [art] Populate DV Done
26,060,436 UART: [fht] FMC Alias Private Key: 7
26,061,977 UART: [art] Derive CDI
26,062,791 UART: [art] Store in in slot 0x4
26,105,185 UART: [art] Derive Key Pair
26,106,226 UART: [art] Store priv key in slot 0x5
29,348,199 UART: [art] Derive Key Pair - Done
29,361,311 UART: [art] Signing Cert with AUTHO
29,362,613 UART: RITY.KEYID = 7
31,642,312 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,814 UART: [art] PUB.X = 42C5453E9705A132490A167593B9D83A87D29CFB72514BE7D7E9D870F103785C9AF11E1AC4DA41A32CA4BC51FE36C39B
31,651,085 UART: [art] PUB.Y = 80E57B770A5B1B13F9D30EFC26B48F026B5D2F105A08D88F5D8E25A740C30FEBF0837531FE94B7CC41F40FEEEE16822E
31,658,326 UART: [art] SIG.R = 2EFF1A4FA1A140F7D3DC2AF60614C0C6A659AAB08E76A26BEE0A54CFE1F99215DB51B002ADCB2D9638CE2876B36E5D86
31,665,717 UART: [art] SIG.S = 5125F074D077D210DCC022CC9BDEFA1C981B3D013A12639097ADB7A374B0F03CFF3F159DF4002794CC3F54292BA683E8
32,970,738 UART: Caliptra RT
32,971,442 UART: [state] CFI Enabled
33,089,477 UART: [rt] RT listening for mailbox commands...
33,121,020 UART: [rt]cmd =0x46505652, len=4
33,122,277 UART: [rt] FIPS Version
33,123,544 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,351 writing to cptra_bootfsm_go
193,565 UART:
193,918 UART: Running Caliptra ROM ...
195,108 UART:
195,261 UART: [state] CFI Enabled
263,710 UART: [state] LifecycleState = Unprovisioned
265,610 UART: [state] DebugLocked = No
268,062 UART: [state] WD Timer not started. Device not locked for debugging
270,966 UART: [kat] SHA2-256
450,081 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,686 UART: [kat] ++
462,217 UART: [kat] sha1
472,814 UART: [kat] SHA2-256
475,881 UART: [kat] SHA2-384
482,033 UART: [kat] SHA2-512-ACC
485,016 UART: [kat] ECC-384
2,947,717 UART: [kat] HMAC-384Kdf
2,973,253 UART: [kat] LMS
3,502,717 UART: [kat] --
3,508,313 UART: [cold-reset] ++
3,510,451 UART: [fht] FHT @ 0x50003400
3,520,858 UART: [idev] ++
3,521,620 UART: [idev] CDI.KEYID = 6
3,522,542 UART: [idev] SUBJECT.KEYID = 7
3,523,647 UART: [idev] UDS.KEYID = 0
3,524,580 ready_for_fw is high
3,524,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,638 UART: [idev] Erasing UDS.KEYID = 0
6,031,949 UART: [idev] Sha1 KeyId Algorithm
6,054,267 UART: [idev] --
6,057,830 UART: [ldev] ++
6,058,411 UART: [ldev] CDI.KEYID = 6
6,059,324 UART: [ldev] SUBJECT.KEYID = 5
6,060,508 UART: [ldev] AUTHORITY.KEYID = 7
6,061,742 UART: [ldev] FE.KEYID = 1
6,100,941 UART: [ldev] Erasing FE.KEYID = 1
8,601,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,864 UART: [ldev] --
10,416,275 UART: [fwproc] Wait for Commands...
10,417,937 UART: [fwproc] Recv command 0x46574c44
10,420,031 UART: [fwproc] Recv'd Img size: 114448 bytes
13,833,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,292,360 >>> mbox cmd response: success
14,292,887 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,297,130 UART: [afmc] ++
14,297,718 UART: [afmc] CDI.KEYID = 6
14,298,633 UART: [afmc] SUBJECT.KEYID = 7
14,299,851 UART: [afmc] AUTHORITY.KEYID = 5
16,830,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,761 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,610 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,442 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,202 UART: [afmc] --
18,631,386 UART: [cold-reset] --
18,634,325 UART: [state] Locking Datavault
18,640,384 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,106 UART: [state] Locking ICCM
18,644,551 UART: [exit] Launching FMC @ 0x40000130
18,652,945 UART:
18,653,180 UART: Running Caliptra FMC ...
18,654,278 UART:
18,654,442 UART: [state] CFI Enabled
18,712,988 UART: [fht] FMC Alias Private Key: 7
20,476,610 UART: [art] Extend RT PCRs Done
20,477,808 UART: [art] Lock RT PCRs Done
20,479,589 UART: [art] Populate DV Done
20,485,003 UART: [fht] FMC Alias Private Key: 7
20,486,637 UART: [art] Derive CDI
20,487,457 UART: [art] Store in in slot 0x4
20,545,276 UART: [art] Derive Key Pair
20,546,265 UART: [art] Store priv key in slot 0x5
23,009,413 UART: [art] Derive Key Pair - Done
23,022,527 UART: [art] Signing Cert with AUTHO
23,023,847 UART: RITY.KEYID = 7
24,735,439 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,920 UART: [art] PUB.X = 3591AD09824AC240A17CB72D7F51FABD4A0B80456C112B232DBECCE78174FFA81B18DD977E4B0D784D9F8B0FCAE03F92
24,744,228 UART: [art] PUB.Y = BAD6A74168267394FD82D7E825AF56ABD527E2467E43CC55B72DE152D5BC9B2AB4F1598DDEBFC2E1F7987185BE23EFB2
24,751,468 UART: [art] SIG.R = 3FC836B684DC197C84A7207A4A69017BB88D901B4905BF7683A0BCCD71143B225485C50B8E85D36A357E1DB184025755
24,758,870 UART: [art] SIG.S = 76AC45E27A0FE53927DCCACD53A6C5B53622112697C37E8240883F7F28FF68CCC6AE41579963C92DD2E5F28FAF1B11DE
25,738,159 UART: Caliptra RT
25,738,870 UART: [state] CFI Enabled
25,904,778 UART: [rt] RT listening for mailbox commands...
25,936,074 UART: [rt]cmd =0x46505652, len=4
25,937,404 UART: [rt] FIPS Version
25,938,521 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,380,864 ready_for_fw is high
3,381,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,065,584 >>> mbox cmd response: success
14,066,392 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,361,604 UART:
18,361,998 UART: Running Caliptra FMC ...
18,363,108 UART:
18,363,441 UART: [state] CFI Enabled
18,430,516 UART: [fht] FMC Alias Private Key: 7
20,194,567 UART: [art] Extend RT PCRs Done
20,195,792 UART: [art] Lock RT PCRs Done
20,197,613 UART: [art] Populate DV Done
20,202,864 UART: [fht] FMC Alias Private Key: 7
20,204,465 UART: [art] Derive CDI
20,205,209 UART: [art] Store in in slot 0x4
20,263,204 UART: [art] Derive Key Pair
20,264,205 UART: [art] Store priv key in slot 0x5
22,726,661 UART: [art] Derive Key Pair - Done
22,739,279 UART: [art] Signing Cert with AUTHO
22,740,575 UART: RITY.KEYID = 7
24,452,879 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,384 UART: [art] PUB.X = 4ACECF49C3774F78DC8E007A72F5CDECEB2084A4E2E7D270A97763D4A2CA168916EB7436200AECAFCF25D0E41F5C38CE
24,461,683 UART: [art] PUB.Y = BA33CBB19C932A55348796030A00D73930F8FF1FF134AEED580A57162BA37C55BA7D7A92C188AF2FF2147D8C37A6C322
24,468,941 UART: [art] SIG.R = 0F9737CB7A45D5D5F656EC347C7C69A8241EDF33A05FC4DE24648FE8D9FB4B529A3B4850DF266772453D8B69F86FAE6D
24,476,331 UART: [art] SIG.S = 4F835FA6BE272E6DAADB9098C8FF9ECA719487BF75B7D9F2538CEBCD4A27D0F397E68079036E1A79923C371AABB66161
25,454,792 UART: Caliptra RT
25,455,492 UART: [state] CFI Enabled
25,620,861 UART: [rt] RT listening for mailbox commands...
25,652,603 UART: [rt]cmd =0x46505652, len=4
25,653,905 UART: [rt] FIPS Version
25,655,238 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,454 writing to cptra_bootfsm_go
193,711 UART:
194,070 UART: Running Caliptra ROM ...
195,266 UART:
604,840 UART: [state] CFI Enabled
618,789 UART: [state] LifecycleState = Unprovisioned
620,673 UART: [state] DebugLocked = No
623,402 UART: [state] WD Timer not started. Device not locked for debugging
626,425 UART: [kat] SHA2-256
805,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,080 UART: [kat] ++
817,611 UART: [kat] sha1
828,837 UART: [kat] SHA2-256
831,905 UART: [kat] SHA2-384
837,740 UART: [kat] SHA2-512-ACC
840,664 UART: [kat] ECC-384
3,285,566 UART: [kat] HMAC-384Kdf
3,298,601 UART: [kat] LMS
3,828,107 UART: [kat] --
3,832,551 UART: [cold-reset] ++
3,833,555 UART: [fht] FHT @ 0x50003400
3,843,830 UART: [idev] ++
3,844,430 UART: [idev] CDI.KEYID = 6
3,845,341 UART: [idev] SUBJECT.KEYID = 7
3,846,505 UART: [idev] UDS.KEYID = 0
3,847,575 ready_for_fw is high
3,847,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,335 UART: [idev] Erasing UDS.KEYID = 0
6,317,459 UART: [idev] Sha1 KeyId Algorithm
6,340,453 UART: [idev] --
6,343,168 UART: [ldev] ++
6,343,737 UART: [ldev] CDI.KEYID = 6
6,344,640 UART: [ldev] SUBJECT.KEYID = 5
6,345,862 UART: [ldev] AUTHORITY.KEYID = 7
6,347,088 UART: [ldev] FE.KEYID = 1
6,357,995 UART: [ldev] Erasing FE.KEYID = 1
8,831,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,616 UART: [ldev] --
10,622,167 UART: [fwproc] Wait for Commands...
10,624,788 UART: [fwproc] Recv command 0x46574c44
10,626,872 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,658 >>> mbox cmd response: success
14,490,189 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,493,133 UART: [afmc] ++
14,493,719 UART: [afmc] CDI.KEYID = 6
14,494,621 UART: [afmc] SUBJECT.KEYID = 7
14,495,773 UART: [afmc] AUTHORITY.KEYID = 5
16,995,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,966 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,777 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,605 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,283 UART: [afmc] --
18,792,631 UART: [cold-reset] --
18,796,387 UART: [state] Locking Datavault
18,803,359 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,094 UART: [state] Locking ICCM
18,807,376 UART: [exit] Launching FMC @ 0x40000130
18,815,772 UART:
18,816,013 UART: Running Caliptra FMC ...
18,817,110 UART:
18,817,271 UART: [state] CFI Enabled
18,825,253 UART: [fht] FMC Alias Private Key: 7
20,582,121 UART: [art] Extend RT PCRs Done
20,583,334 UART: [art] Lock RT PCRs Done
20,585,114 UART: [art] Populate DV Done
20,590,464 UART: [fht] FMC Alias Private Key: 7
20,591,993 UART: [art] Derive CDI
20,592,799 UART: [art] Store in in slot 0x4
20,635,274 UART: [art] Derive Key Pair
20,636,259 UART: [art] Store priv key in slot 0x5
23,062,450 UART: [art] Derive Key Pair - Done
23,075,341 UART: [art] Signing Cert with AUTHO
23,076,660 UART: RITY.KEYID = 7
24,782,508 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,006 UART: [art] PUB.X = 148FDD2EC5302C52B5B6FEEAE9AD0DB5694E218434D8DD2741E29A6F0305D25BDEE0E11127ECD75468315DDAE33AE194
24,791,315 UART: [art] PUB.Y = 3F826962F448EDC5AFD5F1A32877839BF993D757FBEBC48ADD55628762785308D42C8D0D3AD97270E22046C8D6F572E0
24,798,594 UART: [art] SIG.R = FE8E47DD15D9CC8ACBCE9F7B2F2B6D6594788E05B640373962B62219C265E7DF966456C50998BC62C0EF1318B5BFC9F1
24,805,964 UART: [art] SIG.S = DA57C9610399DD02278B2BB49B63FCAD5035E8EA0805740AF804D6CD59F598BC0E13D4610005CD5014A5C98B392CFC22
25,784,580 UART: Caliptra RT
25,785,271 UART: [state] CFI Enabled
25,902,056 UART: [rt] RT listening for mailbox commands...
25,933,401 UART: [rt]cmd =0x46505652, len=4
25,934,719 UART: [rt] FIPS Version
25,935,982 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,696,387 ready_for_fw is high
3,696,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,498 >>> mbox cmd response: success
14,275,123 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,522,128 UART:
18,522,513 UART: Running Caliptra FMC ...
18,523,618 UART:
18,523,767 UART: [state] CFI Enabled
18,531,236 UART: [fht] FMC Alias Private Key: 7
20,287,692 UART: [art] Extend RT PCRs Done
20,288,920 UART: [art] Lock RT PCRs Done
20,290,405 UART: [art] Populate DV Done
20,295,762 UART: [fht] FMC Alias Private Key: 7
20,297,351 UART: [art] Derive CDI
20,298,087 UART: [art] Store in in slot 0x4
20,340,678 UART: [art] Derive Key Pair
20,341,679 UART: [art] Store priv key in slot 0x5
22,768,737 UART: [art] Derive Key Pair - Done
22,781,739 UART: [art] Signing Cert with AUTHO
22,783,047 UART: RITY.KEYID = 7
24,488,556 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,052 UART: [art] PUB.X = 724D3F1375D8C024C749E65A4F293B9C3F6B1690FFA7A789FCAEA697DF1029C0BCE00258E180B8264A6E5EA389BFEBF4
24,497,352 UART: [art] PUB.Y = 37D4811E749C45A38752EA850A522688CA22F7CC18751F3FFE6CEC08C3154F6037273EAF910912580566F4F4C36380C8
24,504,599 UART: [art] SIG.R = 8E502EC56F5FD8B2D8387E504152D7138509460EAAF5E913666F6ADF5A922A9DC055B09E47F3C4E90FF744A5DE72DF76
24,511,985 UART: [art] SIG.S = 7EA03F0D84955C09036AF4EF437D7D9D3F5EB0DAA214E6E4A4FF3798E6802606C4AD3A297A63ACFB7F832FA3299A4C4F
25,490,674 UART: Caliptra RT
25,491,373 UART: [state] CFI Enabled
25,607,730 UART: [rt] RT listening for mailbox commands...
25,638,973 UART: [rt]cmd =0x46505652, len=4
25,640,212 UART: [rt] FIPS Version
25,641,631 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,439,398 ready_for_fw is high
3,439,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,720,538 >>> mbox cmd response: success
14,721,419 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,040,181 UART:
19,040,584 UART: Running Caliptra FMC ...
19,041,689 UART:
19,041,843 UART: [state] CFI Enabled
19,104,340 UART: [fht] FMC Alias Private Key: 7
20,868,640 UART: [art] Extend RT PCRs Done
20,869,873 UART: [art] Lock RT PCRs Done
20,871,489 UART: [art] Populate DV Done
20,876,797 UART: [fht] FMC Alias Private Key: 7
20,878,460 UART: [art] Derive CDI
20,879,201 UART: [art] Store in in slot 0x4
20,937,475 UART: [art] Derive Key Pair
20,938,513 UART: [art] Store priv key in slot 0x5
23,401,157 UART: [art] Derive Key Pair - Done
23,414,311 UART: [art] Signing Cert with AUTHO
23,415,639 UART: RITY.KEYID = 7
25,127,500 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,021 UART: [art] PUB.X = B310C75E7DD1EDD3A449A268DB9C581836624FCDDCF573E4AE18C06743A0FE2DA31A99677CFD0168A0C2734A72668EFE
25,136,283 UART: [art] PUB.Y = 8EA7A5E760A6B426D10D2ED92C198D0AAC4A2AE11F9A9D15EDE88493346233D398B23AE071471274787DC5956826309C
25,143,537 UART: [art] SIG.R = 16BCA6CFAAAC8C321B54482356FE60599D6024FB1ABF4E895FDA2B54280FFB234C948EAEAD17701893C16D01D2CB10B0
25,150,925 UART: [art] SIG.S = 9E6C49426A4CD8063602F5FDEB6F0B0947244BBA24BC7C3051A653FDE3FA5665DAA05E07D04BF5682A0F14F9F2DF7ECA
26,130,661 UART: Caliptra RT
26,131,356 UART: [state] CFI Enabled
26,295,253 UART: [rt] RT listening for mailbox commands...
26,326,877 UART: [rt]cmd =0x46505652, len=4
26,328,207 UART: [rt] FIPS Version
26,329,322 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,749,973 ready_for_fw is high
3,750,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,947,460 >>> mbox cmd response: success
14,948,038 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,205,407 UART:
19,205,782 UART: Running Caliptra FMC ...
19,206,904 UART:
19,207,055 UART: [state] CFI Enabled
19,215,318 UART: [fht] FMC Alias Private Key: 7
20,971,751 UART: [art] Extend RT PCRs Done
20,972,973 UART: [art] Lock RT PCRs Done
20,974,733 UART: [art] Populate DV Done
20,980,215 UART: [fht] FMC Alias Private Key: 7
20,981,717 UART: [art] Derive CDI
20,982,460 UART: [art] Store in in slot 0x4
21,025,051 UART: [art] Derive Key Pair
21,026,057 UART: [art] Store priv key in slot 0x5
23,452,868 UART: [art] Derive Key Pair - Done
23,465,833 UART: [art] Signing Cert with AUTHO
23,467,171 UART: RITY.KEYID = 7
25,172,579 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,079 UART: [art] PUB.X = 2D4D482F46F10F32BF2EF9989DE30CD400C3338B79660DF5330959CE9DC08AE9D76D32AB6B505FC8B1455DEE0268114E
25,181,320 UART: [art] PUB.Y = 6F501213FCD4700199F2839B69572C615E2278DF7C1F167F50030782E007C41ACDDE91E8C649A6AF3615CBDCDD2965A8
25,188,621 UART: [art] SIG.R = 447FFC3D29076F8FF765A6A620BC58B6A65A7463AE32E397C9CF4C2AC6E4EECF696C1E471B3A8071924EDDB4B0895D1C
25,196,005 UART: [art] SIG.S = A6762A5B0813EBAEB909918B8F6FC4B5054CC423A5DE52FDCDC424E2464A923184EDCC4F702773A1EBCF3A18CCDF3A27
26,174,697 UART: Caliptra RT
26,175,409 UART: [state] CFI Enabled
26,292,359 UART: [rt] RT listening for mailbox commands...
26,323,735 UART: [rt]cmd =0x46505652, len=4
26,324,980 UART: [rt] FIPS Version
26,326,349 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,069 UART: [kat] SHA2-256
882,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,115 UART: [kat] ++
886,267 UART: [kat] sha1
890,627 UART: [kat] SHA2-256
892,565 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,900 UART: [kat] HMAC-384Kdf
907,434 UART: [kat] LMS
1,475,630 UART: [kat] --
1,476,649 UART: [cold-reset] ++
1,477,111 UART: [fht] Storing FHT @ 0x50003400
1,479,756 UART: [idev] ++
1,479,924 UART: [idev] CDI.KEYID = 6
1,480,284 UART: [idev] SUBJECT.KEYID = 7
1,480,708 UART: [idev] UDS.KEYID = 0
1,481,053 ready_for_fw is high
1,481,053 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,596 UART: [idev] Erasing UDS.KEYID = 0
1,504,898 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,532 UART: [idev] --
1,514,591 UART: [ldev] ++
1,514,759 UART: [ldev] CDI.KEYID = 6
1,515,122 UART: [ldev] SUBJECT.KEYID = 5
1,515,548 UART: [ldev] AUTHORITY.KEYID = 7
1,516,011 UART: [ldev] FE.KEYID = 1
1,521,399 UART: [ldev] Erasing FE.KEYID = 1
1,546,704 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,842 UART: [ldev] --
1,586,205 UART: [fwproc] Waiting for Commands...
1,586,932 UART: [fwproc] Received command 0x46574c44
1,587,723 UART: [fwproc] Received Image of size 114448 bytes
2,887,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,082 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,079 >>> mbox cmd response: success
3,080,079 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,081,277 UART: [afmc] ++
3,081,445 UART: [afmc] CDI.KEYID = 6
3,081,807 UART: [afmc] SUBJECT.KEYID = 7
3,082,232 UART: [afmc] AUTHORITY.KEYID = 5
3,117,439 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,081 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,589 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,474 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,164 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,925 UART: [afmc] --
3,160,977 UART: [cold-reset] --
3,161,877 UART: [state] Locking Datavault
3,163,036 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,640 UART: [state] Locking ICCM
3,164,158 UART: [exit] Launching FMC @ 0x40000130
3,169,487 UART:
3,169,503 UART: Running Caliptra FMC ...
3,169,911 UART:
3,169,965 UART: [state] CFI Enabled
3,180,284 UART: [fht] FMC Alias Private Key: 7
3,288,423 UART: [art] Extend RT PCRs Done
3,288,851 UART: [art] Lock RT PCRs Done
3,290,247 UART: [art] Populate DV Done
3,298,552 UART: [fht] FMC Alias Private Key: 7
3,299,662 UART: [art] Derive CDI
3,299,942 UART: [art] Store in in slot 0x4
3,385,637 UART: [art] Derive Key Pair
3,385,997 UART: [art] Store priv key in slot 0x5
3,398,893 UART: [art] Derive Key Pair - Done
3,413,661 UART: [art] Signing Cert with AUTHO
3,414,141 UART: RITY.KEYID = 7
3,429,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,862 UART: [art] PUB.X = CCA77E0947348381CD21510831FDD19130785A632FE2CA8B46DABE226017CC86B6B948AEEF498F37B4CB8B48E00C8B28
3,436,631 UART: [art] PUB.Y = 53B46CA36418F53B59D1E68C99A23CF0247BE7BF0EA03D65C3503AE5C9A163EF9D939B96BF4E2EA33FE5575EB1911ADB
3,443,594 UART: [art] SIG.R = AE6E6F6075B91C198DE4EAFE717F460EB01B70B90FE9867432D21AAC4A0F46BA326D8709A14A88C151EF4979EAA9A06F
3,450,366 UART: [art] SIG.S = 8AF9F7DE21C4C9BFFD70645AFDF4EB665BB779CAE8C3CF9F58CE9817F0E1C4F33248EB890433874A9319C0FEFA32E859
3,474,156 UART: Caliptra RT
3,474,409 UART: [state] CFI Enabled
3,581,279 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,763 UART: [rt]cmd =0x46505652, len=4
3,612,434 UART: [rt] FIPS Version
3,613,355 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,867 ready_for_fw is high
1,361,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,351 >>> mbox cmd response: success
2,929,351 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,990,433 UART:
2,990,449 UART: Running Caliptra FMC ...
2,990,857 UART:
2,990,911 UART: [state] CFI Enabled
3,001,276 UART: [fht] FMC Alias Private Key: 7
3,109,471 UART: [art] Extend RT PCRs Done
3,109,899 UART: [art] Lock RT PCRs Done
3,111,197 UART: [art] Populate DV Done
3,119,406 UART: [fht] FMC Alias Private Key: 7
3,120,356 UART: [art] Derive CDI
3,120,636 UART: [art] Store in in slot 0x4
3,206,045 UART: [art] Derive Key Pair
3,206,405 UART: [art] Store priv key in slot 0x5
3,219,345 UART: [art] Derive Key Pair - Done
3,234,067 UART: [art] Signing Cert with AUTHO
3,234,547 UART: RITY.KEYID = 7
3,249,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,226 UART: [art] PUB.X = 8452A2B6AC4615CFE7561F8B81AF9AD727CC9C954FEE1771A31F370DBF7E383D16167A7842A573702BF3D91160D21C03
3,256,994 UART: [art] PUB.Y = 49648EC55B8BED6398A1E82792C5B33C970B11D84DB4C444ADC5E6AD781195751148F439823ADF149F38A170F3F18F34
3,263,941 UART: [art] SIG.R = C25E5E72BBC1001E66CD049CF1D5170C24F64A6F3CAB4827F9B82A7B66A3F40A1CD4962982DF2D42A2A3F5CEB641A549
3,270,694 UART: [art] SIG.S = 2FFD0E6F1A01832C8584B09617F640CDB2E5EE99828073E7E3A1785247AC05CFF5F20E9DEA0260609722FC1C53C6E60B
3,293,895 UART: Caliptra RT
3,294,148 UART: [state] CFI Enabled
3,401,465 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,113 UART: [rt]cmd =0x46505652, len=4
3,432,784 UART: [rt] FIPS Version
3,433,681 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,708 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,422 UART: [kat] SHA2-256
882,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,468 UART: [kat] ++
886,620 UART: [kat] sha1
890,910 UART: [kat] SHA2-256
892,848 UART: [kat] SHA2-384
895,647 UART: [kat] SHA2-512-ACC
897,548 UART: [kat] ECC-384
903,571 UART: [kat] HMAC-384Kdf
908,329 UART: [kat] LMS
1,476,525 UART: [kat] --
1,477,604 UART: [cold-reset] ++
1,477,986 UART: [fht] Storing FHT @ 0x50003400
1,480,867 UART: [idev] ++
1,481,035 UART: [idev] CDI.KEYID = 6
1,481,395 UART: [idev] SUBJECT.KEYID = 7
1,481,819 UART: [idev] UDS.KEYID = 0
1,482,164 ready_for_fw is high
1,482,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,947 UART: [idev] Erasing UDS.KEYID = 0
1,506,367 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,201 UART: [idev] --
1,516,306 UART: [ldev] ++
1,516,474 UART: [ldev] CDI.KEYID = 6
1,516,837 UART: [ldev] SUBJECT.KEYID = 5
1,517,263 UART: [ldev] AUTHORITY.KEYID = 7
1,517,726 UART: [ldev] FE.KEYID = 1
1,523,048 UART: [ldev] Erasing FE.KEYID = 1
1,548,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,657 UART: [ldev] --
1,588,142 UART: [fwproc] Waiting for Commands...
1,588,763 UART: [fwproc] Received command 0x46574c44
1,589,554 UART: [fwproc] Received Image of size 114448 bytes
2,888,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,321 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,673 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,746 >>> mbox cmd response: success
3,081,746 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,082,926 UART: [afmc] ++
3,083,094 UART: [afmc] CDI.KEYID = 6
3,083,456 UART: [afmc] SUBJECT.KEYID = 7
3,083,881 UART: [afmc] AUTHORITY.KEYID = 5
3,118,746 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,098 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,878 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,491 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,181 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,054 UART: [afmc] --
3,161,996 UART: [cold-reset] --
3,162,688 UART: [state] Locking Datavault
3,163,879 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,483 UART: [state] Locking ICCM
3,165,023 UART: [exit] Launching FMC @ 0x40000130
3,170,352 UART:
3,170,368 UART: Running Caliptra FMC ...
3,170,776 UART:
3,170,919 UART: [state] CFI Enabled
3,181,392 UART: [fht] FMC Alias Private Key: 7
3,289,701 UART: [art] Extend RT PCRs Done
3,290,129 UART: [art] Lock RT PCRs Done
3,291,631 UART: [art] Populate DV Done
3,299,858 UART: [fht] FMC Alias Private Key: 7
3,300,990 UART: [art] Derive CDI
3,301,270 UART: [art] Store in in slot 0x4
3,387,419 UART: [art] Derive Key Pair
3,387,779 UART: [art] Store priv key in slot 0x5
3,401,081 UART: [art] Derive Key Pair - Done
3,415,932 UART: [art] Signing Cert with AUTHO
3,416,412 UART: RITY.KEYID = 7
3,431,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,707 UART: [art] PUB.X = 63D51A770CBB0BB4C33DE553E085AF8BF18DB88C25E44A84DFA56B34BCEBB7B841D54DDC4FA1B6E744E078A0118A0321
3,439,488 UART: [art] PUB.Y = 2AD73BB57D754559FBD18F45D41F0D875C6AC28C171590D7A984958A98CEF2F809FD9270045234BD68D0613CBC9D1757
3,446,431 UART: [art] SIG.R = DFCC76F77F3C7329CFC1EE67AA5B2B6CE6B0ED6B4A31007100A64EC0A48E13FC48B2C0BB19F6A768C462341DB1BB2DD7
3,453,181 UART: [art] SIG.S = 46A0E46D385F27C3D12FA85A8C2C868BA14F53EAF18F2AB8BC931CEA20115F1A906ECFFF2E70B31D1C2ED0CFF5B9B831
3,476,752 UART: Caliptra RT
3,477,097 UART: [state] CFI Enabled
3,585,382 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,646 UART: [rt]cmd =0x46505652, len=4
3,616,317 UART: [rt] FIPS Version
3,617,386 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,234 ready_for_fw is high
1,363,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,170 >>> mbox cmd response: success
2,930,170 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,991,922 UART:
2,991,938 UART: Running Caliptra FMC ...
2,992,346 UART:
2,992,489 UART: [state] CFI Enabled
3,003,162 UART: [fht] FMC Alias Private Key: 7
3,110,517 UART: [art] Extend RT PCRs Done
3,110,945 UART: [art] Lock RT PCRs Done
3,112,415 UART: [art] Populate DV Done
3,120,566 UART: [fht] FMC Alias Private Key: 7
3,121,596 UART: [art] Derive CDI
3,121,876 UART: [art] Store in in slot 0x4
3,207,897 UART: [art] Derive Key Pair
3,208,257 UART: [art] Store priv key in slot 0x5
3,221,403 UART: [art] Derive Key Pair - Done
3,236,299 UART: [art] Signing Cert with AUTHO
3,236,779 UART: RITY.KEYID = 7
3,252,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,104 UART: [art] PUB.X = 52436BF2E5B0A925DFEA6B4D9A88F9A6CFDEF93756BC05E9B99F43737F98200FD40AB8F83BF552359D123B910D759F25
3,259,872 UART: [art] PUB.Y = 4D0E217EB39DD6B2F2AFC3D4EE05ED585DE4E63348ADA9B707B9335E61C74345BA72A4C56D8DBC2A487AC9C2A06A8CFC
3,266,837 UART: [art] SIG.R = 29413CB3F3A31F08E72E4727A1A3823F341EE1A25119993B36833602E989DC9CB2C2780F948495FBB973A613E2C7EB97
3,273,594 UART: [art] SIG.S = 0AE6D8AF06DDF3101E3254FEE826270EF5DF36F16A948EE537EE1E8986E034B22FC7FCB6CE0EEA2CC7E8D627A93A9011
3,297,451 UART: Caliptra RT
3,297,796 UART: [state] CFI Enabled
3,406,288 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,980 UART: [rt]cmd =0x46505652, len=4
3,437,651 UART: [rt] FIPS Version
3,438,560 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Unprovisioned
86,193 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
88,052 UART: [kat] SHA2-256
893,702 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,827 UART: [kat] ++
897,979 UART: [kat] sha1
902,077 UART: [kat] SHA2-256
904,017 UART: [kat] SHA2-384
906,822 UART: [kat] SHA2-512-ACC
908,723 UART: [kat] ECC-384
918,044 UART: [kat] HMAC-384Kdf
922,738 UART: [kat] LMS
1,171,066 UART: [kat] --
1,172,075 UART: [cold-reset] ++
1,172,499 UART: [fht] FHT @ 0x50003400
1,175,134 UART: [idev] ++
1,175,302 UART: [idev] CDI.KEYID = 6
1,175,662 UART: [idev] SUBJECT.KEYID = 7
1,176,086 UART: [idev] UDS.KEYID = 0
1,176,431 ready_for_fw is high
1,176,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,264 UART: [idev] Erasing UDS.KEYID = 0
1,201,083 UART: [idev] Sha1 KeyId Algorithm
1,209,559 UART: [idev] --
1,210,787 UART: [ldev] ++
1,210,955 UART: [ldev] CDI.KEYID = 6
1,211,318 UART: [ldev] SUBJECT.KEYID = 5
1,211,744 UART: [ldev] AUTHORITY.KEYID = 7
1,212,207 UART: [ldev] FE.KEYID = 1
1,217,409 UART: [ldev] Erasing FE.KEYID = 1
1,243,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,027 UART: [ldev] --
1,282,302 UART: [fwproc] Wait for Commands...
1,282,980 UART: [fwproc] Recv command 0x46574c44
1,283,708 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,150 >>> mbox cmd response: success
2,776,150 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,777,328 UART: [afmc] ++
2,777,496 UART: [afmc] CDI.KEYID = 6
2,777,858 UART: [afmc] SUBJECT.KEYID = 7
2,778,283 UART: [afmc] AUTHORITY.KEYID = 5
2,813,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,715 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,443 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,328 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,047 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,879 UART: [afmc] --
2,856,967 UART: [cold-reset] --
2,858,061 UART: [state] Locking Datavault
2,859,388 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,992 UART: [state] Locking ICCM
2,860,414 UART: [exit] Launching FMC @ 0x40000130
2,865,743 UART:
2,865,759 UART: Running Caliptra FMC ...
2,866,167 UART:
2,866,221 UART: [state] CFI Enabled
2,876,484 UART: [fht] FMC Alias Private Key: 7
2,984,397 UART: [art] Extend RT PCRs Done
2,984,825 UART: [art] Lock RT PCRs Done
2,986,473 UART: [art] Populate DV Done
2,994,610 UART: [fht] FMC Alias Private Key: 7
2,995,764 UART: [art] Derive CDI
2,996,044 UART: [art] Store in in slot 0x4
3,081,397 UART: [art] Derive Key Pair
3,081,757 UART: [art] Store priv key in slot 0x5
3,095,155 UART: [art] Derive Key Pair - Done
3,109,681 UART: [art] Signing Cert with AUTHO
3,110,161 UART: RITY.KEYID = 7
3,125,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,824 UART: [art] PUB.X = EFA92ECBAE1C8B7F3E61458A6BF943BC6EEE1C065A71B163957A927D8262ADC4203361BFFF888F46B869C4A3B88F8067
3,132,605 UART: [art] PUB.Y = CABF766B873BF5A05192409F220367136144B5A7B92F134B836261AAB978EC6193B6F5383BA293B0883DF499625F7A26
3,139,546 UART: [art] SIG.R = EEA5FB3E3EB94AD198C8A1E45339AF46BDFF114299480390D899CC1A8E3AF789DDA415D2489B1A52A2CB92851D343806
3,146,320 UART: [art] SIG.S = 275D04AD5711BC0784DB21285DBEE307A0704273A0A18A3B1CE9E668EAE428CFD82393C96E046EFE3B0A633D64AEC0D0
3,170,076 UART: Caliptra RT
3,170,329 UART: [state] CFI Enabled
3,278,186 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,808 UART: [rt]cmd =0x46505652, len=4
3,309,479 UART: [rt] FIPS Version
3,310,504 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,471 ready_for_fw is high
1,060,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,003 >>> mbox cmd response: success
2,629,003 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,691,039 UART:
2,691,055 UART: Running Caliptra FMC ...
2,691,463 UART:
2,691,517 UART: [state] CFI Enabled
2,702,200 UART: [fht] FMC Alias Private Key: 7
2,810,283 UART: [art] Extend RT PCRs Done
2,810,711 UART: [art] Lock RT PCRs Done
2,812,213 UART: [art] Populate DV Done
2,820,212 UART: [fht] FMC Alias Private Key: 7
2,821,316 UART: [art] Derive CDI
2,821,596 UART: [art] Store in in slot 0x4
2,907,253 UART: [art] Derive Key Pair
2,907,613 UART: [art] Store priv key in slot 0x5
2,920,607 UART: [art] Derive Key Pair - Done
2,935,191 UART: [art] Signing Cert with AUTHO
2,935,671 UART: RITY.KEYID = 7
2,950,971 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,736 UART: [art] PUB.X = BDC8DBBD5E6E7F6EF7D564EDD1B277E614E1325FDFA180607517F2790BE13F4995C1FF9D0711567B08E91E804BA48B91
2,958,509 UART: [art] PUB.Y = 2636FEE1E408E6A0056DA0DDF5F9ACFD46BB403519A6DCBFD0BA4F94C9E2A449E895274D61DE7CB3F8D87439360E903B
2,965,468 UART: [art] SIG.R = 7941E9D22CE540BAEF9F378A36BC1686D1A4BEFECA82237A43FDB703BBD4672AFB205CA70BB3FB0C3702DE029EE9FCE5
2,972,249 UART: [art] SIG.S = 9C07A439E86077CE58A5AFA25BA1670EAA220535AE1A7A94D7CF03067C8F2B12AC14BE95AC27FBCDB2C04EC42826C591
2,995,777 UART: Caliptra RT
2,996,030 UART: [state] CFI Enabled
3,103,917 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,367 UART: [rt]cmd =0x46505652, len=4
3,135,038 UART: [rt] FIPS Version
3,136,175 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,290 UART: [kat] SHA2-256
904,230 UART: [kat] SHA2-384
907,049 UART: [kat] SHA2-512-ACC
908,950 UART: [kat] ECC-384
918,795 UART: [kat] HMAC-384Kdf
923,619 UART: [kat] LMS
1,171,947 UART: [kat] --
1,172,652 UART: [cold-reset] ++
1,173,218 UART: [fht] FHT @ 0x50003400
1,175,813 UART: [idev] ++
1,175,981 UART: [idev] CDI.KEYID = 6
1,176,341 UART: [idev] SUBJECT.KEYID = 7
1,176,765 UART: [idev] UDS.KEYID = 0
1,177,110 ready_for_fw is high
1,177,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,793 UART: [idev] Erasing UDS.KEYID = 0
1,201,800 UART: [idev] Sha1 KeyId Algorithm
1,210,266 UART: [idev] --
1,211,226 UART: [ldev] ++
1,211,394 UART: [ldev] CDI.KEYID = 6
1,211,757 UART: [ldev] SUBJECT.KEYID = 5
1,212,183 UART: [ldev] AUTHORITY.KEYID = 7
1,212,646 UART: [ldev] FE.KEYID = 1
1,217,780 UART: [ldev] Erasing FE.KEYID = 1
1,244,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,214 UART: [ldev] --
1,283,655 UART: [fwproc] Wait for Commands...
1,284,429 UART: [fwproc] Recv command 0x46574c44
1,285,157 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,021 >>> mbox cmd response: success
2,778,021 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,779,065 UART: [afmc] ++
2,779,233 UART: [afmc] CDI.KEYID = 6
2,779,595 UART: [afmc] SUBJECT.KEYID = 7
2,780,020 UART: [afmc] AUTHORITY.KEYID = 5
2,815,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,104 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,989 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,708 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,606 UART: [afmc] --
2,858,554 UART: [cold-reset] --
2,859,332 UART: [state] Locking Datavault
2,860,435 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,039 UART: [state] Locking ICCM
2,861,577 UART: [exit] Launching FMC @ 0x40000130
2,866,906 UART:
2,866,922 UART: Running Caliptra FMC ...
2,867,330 UART:
2,867,473 UART: [state] CFI Enabled
2,877,836 UART: [fht] FMC Alias Private Key: 7
2,985,473 UART: [art] Extend RT PCRs Done
2,985,901 UART: [art] Lock RT PCRs Done
2,987,077 UART: [art] Populate DV Done
2,995,308 UART: [fht] FMC Alias Private Key: 7
2,996,246 UART: [art] Derive CDI
2,996,526 UART: [art] Store in in slot 0x4
3,082,365 UART: [art] Derive Key Pair
3,082,725 UART: [art] Store priv key in slot 0x5
3,096,361 UART: [art] Derive Key Pair - Done
3,111,101 UART: [art] Signing Cert with AUTHO
3,111,581 UART: RITY.KEYID = 7
3,127,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,818 UART: [art] PUB.X = 523A835CE0C81035DAF16FF57CC7C3F12A0F1BD1AA0B675EB33031061FF01D85FFF2E6096CE68082BCE90B6F24DC7DD6
3,134,591 UART: [art] PUB.Y = 8D79553D2B383E24F7D4C47499B05259C2D2D09526708E37BB3FB045271D2B6D19765516C9524CB736108E978B5828A3
3,141,529 UART: [art] SIG.R = E08FD220EC3BB89454FFFBCF7369BD16572FDC9485C363AB98C9C90B3775321302E1A7DB7947291581D44C42425AD395
3,148,295 UART: [art] SIG.S = 8E14C9148BBEE4D42A9F2BEB72B6962EEA8C3550E1F74366A491051F79DE18F3DE5364830F6F48AC95F94FAE844E0457
3,171,975 UART: Caliptra RT
3,172,320 UART: [state] CFI Enabled
3,280,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,354 UART: [rt]cmd =0x46505652, len=4
3,312,025 UART: [rt] FIPS Version
3,313,068 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,802 ready_for_fw is high
1,060,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,238 >>> mbox cmd response: success
2,628,238 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,690,538 UART:
2,690,554 UART: Running Caliptra FMC ...
2,690,962 UART:
2,691,105 UART: [state] CFI Enabled
2,701,696 UART: [fht] FMC Alias Private Key: 7
2,809,551 UART: [art] Extend RT PCRs Done
2,809,979 UART: [art] Lock RT PCRs Done
2,811,473 UART: [art] Populate DV Done
2,819,550 UART: [fht] FMC Alias Private Key: 7
2,820,708 UART: [art] Derive CDI
2,820,988 UART: [art] Store in in slot 0x4
2,906,531 UART: [art] Derive Key Pair
2,906,891 UART: [art] Store priv key in slot 0x5
2,920,253 UART: [art] Derive Key Pair - Done
2,935,148 UART: [art] Signing Cert with AUTHO
2,935,628 UART: RITY.KEYID = 7
2,950,930 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,695 UART: [art] PUB.X = 867788862C469891A0B9B4093BE9D9B64832102F5E6FBDE61B7B6FA31AD7F528E1877E38A6FA5285CCA7652C0F684579
2,958,459 UART: [art] PUB.Y = 82B1ABC7034C15EC9DC9AFDF5FC27F85DD6400C74CD784AC13B2EDE54852B8CABF829D10844BFE3C4F149CB577A60A7E
2,965,405 UART: [art] SIG.R = EDACBCF8699E489883E09C056CAE14937EF2CD7FFBB6ACC912EC9D367762127A0DECC689B8308BF088B87B046D8A882D
2,972,184 UART: [art] SIG.S = 414E113C011B1BA63EBE7DB65BEEED2A9768CCA5379A7316840CB5B757A05C956DBB7F5AA88C4FB36AD74D3D73774E61
2,995,555 UART: Caliptra RT
2,995,900 UART: [state] CFI Enabled
3,103,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,875 UART: [rt]cmd =0x46505652, len=4
3,134,546 UART: [rt] FIPS Version
3,135,761 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,256 UART: [kat] SHA2-512-ACC
906,157 UART: [kat] ECC-384
915,458 UART: [kat] HMAC-384Kdf
919,910 UART: [kat] LMS
1,168,222 UART: [kat] --
1,169,023 UART: [cold-reset] ++
1,169,479 UART: [fht] FHT @ 0x50003400
1,172,161 UART: [idev] ++
1,172,329 UART: [idev] CDI.KEYID = 6
1,172,690 UART: [idev] SUBJECT.KEYID = 7
1,173,115 UART: [idev] UDS.KEYID = 0
1,173,461 ready_for_fw is high
1,173,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,201 UART: [idev] Erasing UDS.KEYID = 0
1,198,447 UART: [idev] Sha1 KeyId Algorithm
1,207,249 UART: [idev] --
1,208,248 UART: [ldev] ++
1,208,416 UART: [ldev] CDI.KEYID = 6
1,208,780 UART: [ldev] SUBJECT.KEYID = 5
1,209,207 UART: [ldev] AUTHORITY.KEYID = 7
1,209,670 UART: [ldev] FE.KEYID = 1
1,215,082 UART: [ldev] Erasing FE.KEYID = 1
1,242,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,612 UART: [ldev] --
1,281,956 UART: [fwproc] Wait for Commands...
1,282,701 UART: [fwproc] Recv command 0x46574c44
1,283,434 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,784 >>> mbox cmd response: success
2,775,784 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,827 UART: [afmc] ++
2,776,995 UART: [afmc] CDI.KEYID = 6
2,777,358 UART: [afmc] SUBJECT.KEYID = 7
2,777,784 UART: [afmc] AUTHORITY.KEYID = 5
2,813,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,120 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,839 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,878 UART: [afmc] --
2,856,926 UART: [cold-reset] --
2,857,848 UART: [state] Locking Datavault
2,859,047 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,651 UART: [state] Locking ICCM
2,860,187 UART: [exit] Launching FMC @ 0x40000130
2,865,516 UART:
2,865,532 UART: Running Caliptra FMC ...
2,865,940 UART:
2,865,994 UART: [state] CFI Enabled
2,876,777 UART: [fht] FMC Alias Private Key: 7
2,984,744 UART: [art] Extend RT PCRs Done
2,985,172 UART: [art] Lock RT PCRs Done
2,987,072 UART: [art] Populate DV Done
2,995,269 UART: [fht] FMC Alias Private Key: 7
2,996,369 UART: [art] Derive CDI
2,996,649 UART: [art] Store in in slot 0x4
3,082,676 UART: [art] Derive Key Pair
3,083,036 UART: [art] Store priv key in slot 0x5
3,096,344 UART: [art] Derive Key Pair - Done
3,111,595 UART: [art] Signing Cert with AUTHO
3,112,075 UART: RITY.KEYID = 7
3,127,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,096 UART: [art] PUB.X = 933A4C03B60843357DCEFE817270A36F554927CD7E02DBD24A7FA1933F5495A0E1AC102EDB2F49AEC8619E273CA75497
3,134,863 UART: [art] PUB.Y = 3CF6B14DBE894085DC76364A7C687205FCDB9E3EF01D5A59853B1D46B986901EB7A73D62B3F1B7328B18D86B01B26EB0
3,141,815 UART: [art] SIG.R = A4A5D7396FEE59F50913D6565F399975BEADA4BC9A62E0ED0DAE502E23F53E34DBBA6F8A73E6AA026901800709B5C958
3,148,579 UART: [art] SIG.S = EFD235ED294F36559A100DB291B271049BC281382E5599DBACA45C9940EA3B58E62A0296E6FADB1F2A0389A6BDFCFA2E
3,172,166 UART: Caliptra RT
3,172,419 UART: [state] CFI Enabled
3,279,153 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,653 UART: [rt]cmd =0x46505652, len=4
3,310,324 UART: [rt] FIPS Version
3,311,621 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,240 ready_for_fw is high
1,055,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,712 >>> mbox cmd response: success
2,625,712 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,188 UART:
2,687,204 UART: Running Caliptra FMC ...
2,687,612 UART:
2,687,666 UART: [state] CFI Enabled
2,698,035 UART: [fht] FMC Alias Private Key: 7
2,805,794 UART: [art] Extend RT PCRs Done
2,806,222 UART: [art] Lock RT PCRs Done
2,807,722 UART: [art] Populate DV Done
2,816,089 UART: [fht] FMC Alias Private Key: 7
2,817,033 UART: [art] Derive CDI
2,817,313 UART: [art] Store in in slot 0x4
2,903,194 UART: [art] Derive Key Pair
2,903,554 UART: [art] Store priv key in slot 0x5
2,916,804 UART: [art] Derive Key Pair - Done
2,931,674 UART: [art] Signing Cert with AUTHO
2,932,154 UART: RITY.KEYID = 7
2,947,068 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,833 UART: [art] PUB.X = 707C71C519A3700886C8E9D6924E186498E90846A2BCE36D765A070F04295FA59F4B585E0A75A4E3CA6ACD0C47EB8835
2,954,582 UART: [art] PUB.Y = F8007D3BD1346FDA66292DCF288AAB617FB51D934F596D007629A0AEC06334884BE758D649FCF281088B283B4531998C
2,961,485 UART: [art] SIG.R = 34E80842799DE5A2715C9D7A366E5F592908BF1AEC3DE2D9ED13A8770C1E695350D4064A07C14714BC8A4D2D2E4F7F7E
2,968,246 UART: [art] SIG.S = 24C324563BC40C81A33A617F3394079B4C2121C2F985FF58D1543F6924F337D15166EAD95874EC2385E20656A2BD7676
2,991,696 UART: Caliptra RT
2,991,949 UART: [state] CFI Enabled
3,100,226 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,918 UART: [rt]cmd =0x46505652, len=4
3,131,589 UART: [rt] FIPS Version
3,132,806 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,696 UART: [fht] FHT @ 0x50003400
1,173,472 UART: [idev] ++
1,173,640 UART: [idev] CDI.KEYID = 6
1,174,001 UART: [idev] SUBJECT.KEYID = 7
1,174,426 UART: [idev] UDS.KEYID = 0
1,174,772 ready_for_fw is high
1,174,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,892 UART: [idev] Sha1 KeyId Algorithm
1,208,638 UART: [idev] --
1,209,707 UART: [ldev] ++
1,209,875 UART: [ldev] CDI.KEYID = 6
1,210,239 UART: [ldev] SUBJECT.KEYID = 5
1,210,666 UART: [ldev] AUTHORITY.KEYID = 7
1,211,129 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,845 UART: [fwproc] Wait for Commands...
1,282,490 UART: [fwproc] Recv command 0x46574c44
1,283,223 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,555 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,673 >>> mbox cmd response: success
2,774,673 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,846 UART: [afmc] ++
2,776,014 UART: [afmc] CDI.KEYID = 6
2,776,377 UART: [afmc] SUBJECT.KEYID = 7
2,776,803 UART: [afmc] AUTHORITY.KEYID = 5
2,812,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,644 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,527 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,246 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,057 UART: [afmc] --
2,855,941 UART: [cold-reset] --
2,856,601 UART: [state] Locking Datavault
2,857,960 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,564 UART: [state] Locking ICCM
2,859,010 UART: [exit] Launching FMC @ 0x40000130
2,864,339 UART:
2,864,355 UART: Running Caliptra FMC ...
2,864,763 UART:
2,864,906 UART: [state] CFI Enabled
2,875,487 UART: [fht] FMC Alias Private Key: 7
2,982,604 UART: [art] Extend RT PCRs Done
2,983,032 UART: [art] Lock RT PCRs Done
2,984,312 UART: [art] Populate DV Done
2,992,347 UART: [fht] FMC Alias Private Key: 7
2,993,491 UART: [art] Derive CDI
2,993,771 UART: [art] Store in in slot 0x4
3,079,438 UART: [art] Derive Key Pair
3,079,798 UART: [art] Store priv key in slot 0x5
3,092,808 UART: [art] Derive Key Pair - Done
3,107,672 UART: [art] Signing Cert with AUTHO
3,108,152 UART: RITY.KEYID = 7
3,123,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,089 UART: [art] PUB.X = 2CF1A356CB856FEFD8306EBCB85B22312CE80C63A6E9F1AA4E84041781FBFFC74EE990782A8840C6EE4002C569AB0DE9
3,130,863 UART: [art] PUB.Y = 40E3F098B7EC89E38F56A94405E79196B365C519E891AC4B7F8E8EDFEA9699CBE055A815F4C2552281EB41A7807BC62A
3,137,816 UART: [art] SIG.R = A12D3B25F138244B2CD4797D72EF214492409327FA210C6084BCF2AB1D168CE31F62DBCE5762813A573DE3BB2FF2209C
3,144,589 UART: [art] SIG.S = 9D9A9AB95ADBEAC7504696C12337F9E86E86F8E2C7E85FBDA6F6F2DE64E1BF005812F85DEB0C2546C9CE0EFBDACB8563
3,168,072 UART: Caliptra RT
3,168,417 UART: [state] CFI Enabled
3,275,789 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,335 UART: [rt]cmd =0x46505652, len=4
3,307,006 UART: [rt] FIPS Version
3,308,117 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,241 ready_for_fw is high
1,057,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,611 >>> mbox cmd response: success
2,624,611 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,199 UART:
2,687,215 UART: Running Caliptra FMC ...
2,687,623 UART:
2,687,766 UART: [state] CFI Enabled
2,698,695 UART: [fht] FMC Alias Private Key: 7
2,806,396 UART: [art] Extend RT PCRs Done
2,806,824 UART: [art] Lock RT PCRs Done
2,808,494 UART: [art] Populate DV Done
2,817,015 UART: [fht] FMC Alias Private Key: 7
2,817,945 UART: [art] Derive CDI
2,818,225 UART: [art] Store in in slot 0x4
2,903,980 UART: [art] Derive Key Pair
2,904,340 UART: [art] Store priv key in slot 0x5
2,917,688 UART: [art] Derive Key Pair - Done
2,932,496 UART: [art] Signing Cert with AUTHO
2,932,976 UART: RITY.KEYID = 7
2,948,256 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,021 UART: [art] PUB.X = 59A18BBF6EA03120626D5E43B868D87D528F4D488215E3C0D2B9A7CBDDE98F7F36B7B88FC0225AF653F5521AF29BA1C7
2,955,803 UART: [art] PUB.Y = C7FF8BC729DAD731767DAB48F7B12B2A7B4D4490FFE20B752C76754B8B2E957BBD24A73E131E9285716276F40BB80A13
2,962,752 UART: [art] SIG.R = 2584AE74CFABA3B795299C7C1BD1985FD3923624E06FCB3D42CC462BFE397CC28ED8287F1F356542DD42BD343B1F2829
2,969,532 UART: [art] SIG.S = FC68D739DDC64179CC5BC8E8C97F5F124DF83762E06BB5F440BD487CF81861F4ECD5C8E7D151899CFE74D33253B0CB7F
2,993,111 UART: Caliptra RT
2,993,456 UART: [state] CFI Enabled
3,102,057 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,421 UART: [rt]cmd =0x46505652, len=4
3,133,092 UART: [rt] FIPS Version
3,134,199 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,006 UART:
192,379 UART: Running Caliptra ROM ...
193,543 UART:
193,692 UART: [state] CFI Enabled
262,956 UART: [state] LifecycleState = Unprovisioned
264,871 UART: [state] DebugLocked = No
267,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,707 UART: [kat] SHA2-256
441,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,907 UART: [kat] ++
452,440 UART: [kat] sha1
463,240 UART: [kat] SHA2-256
465,963 UART: [kat] SHA2-384
470,881 UART: [kat] SHA2-512-ACC
473,255 UART: [kat] ECC-384
2,766,201 UART: [kat] HMAC-384Kdf
2,776,893 UART: [kat] LMS
3,967,276 UART: [kat] --
3,972,190 UART: [cold-reset] ++
3,973,193 UART: [fht] Storing FHT @ 0x50003400
3,985,478 UART: [idev] ++
3,986,038 UART: [idev] CDI.KEYID = 6
3,986,995 UART: [idev] SUBJECT.KEYID = 7
3,988,235 UART: [idev] UDS.KEYID = 0
3,989,190 ready_for_fw is high
3,989,383 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,944 UART: [idev] Erasing UDS.KEYID = 0
7,324,261 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,643 UART: [idev] --
7,351,257 UART: [ldev] ++
7,351,832 UART: [ldev] CDI.KEYID = 6
7,352,766 UART: [ldev] SUBJECT.KEYID = 5
7,353,995 UART: [ldev] AUTHORITY.KEYID = 7
7,355,183 UART: [ldev] FE.KEYID = 1
7,400,611 UART: [ldev] Erasing FE.KEYID = 1
10,734,162 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,466 UART: [ldev] --
13,115,915 UART: [fwproc] Waiting for Commands...
13,118,445 UART: [fwproc] Received command 0x46574c44
13,120,626 UART: [fwproc] Received Image of size 114124 bytes
17,175,508 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,280 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,638,844 >>> mbox cmd response: success
17,639,369 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,643,237 UART: [afmc] ++
17,643,823 UART: [afmc] CDI.KEYID = 6
17,644,709 UART: [afmc] SUBJECT.KEYID = 7
17,645,984 UART: [afmc] AUTHORITY.KEYID = 5
21,008,046 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,900 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,211 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,584 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,444 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,873 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,703 UART: [afmc] --
23,376,883 UART: [cold-reset] --
23,381,182 UART: [state] Locking Datavault
23,386,273 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,980 UART: [state] Locking ICCM
23,389,288 UART: [exit] Launching FMC @ 0x40000130
23,397,691 UART:
23,397,938 UART: Running Caliptra FMC ...
23,399,043 UART:
23,399,204 UART: [state] CFI Enabled
23,465,752 UART: [fht] FMC Alias Private Key: 7
25,803,595 UART: [art] Extend RT PCRs Done
25,804,807 UART: [art] Lock RT PCRs Done
25,806,298 UART: [art] Populate DV Done
25,811,329 UART: [fht] FMC Alias Private Key: 7
25,812,976 UART: [art] Derive CDI
25,813,715 UART: [art] Store in in slot 0x4
25,873,755 UART: [art] Derive Key Pair
25,874,795 UART: [art] Store priv key in slot 0x5
29,167,945 UART: [art] Derive Key Pair - Done
29,180,985 UART: [art] Signing Cert with AUTHO
29,182,310 UART: RITY.KEYID = 7
31,469,267 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,774 UART: [art] PUB.X = 9D5D6E91EE747B78BE843A604FFE46DCA5EC1F9409E9385FD04EF057A93657BAF075DC36CC90A25917FA4971BB935A9A
31,478,025 UART: [art] PUB.Y = D0E065773D9AC741EDD138D25C259E919643467A75366A252D851B0AF4A7061AB73BA7857931137558EDBBFE94C37BAF
31,485,257 UART: [art] SIG.R = 4191DC42553831F76F289BBA3F53FA3BBE6EAFCB6A516225EA6DCEF52A0FF2DA3D7E498135668D1D442FD4045D9355E2
31,492,649 UART: [art] SIG.S = A7C51FA550D68C93DF0DF054EBE275E353577BD92EEEB86A4B4BDB74EA7EB57D9E88697D290B2588573468BC6CEB6C2A
32,797,968 UART: Caliptra RT
32,798,667 UART: [state] CFI Enabled
32,959,436 UART: [rt] RT listening for mailbox commands...
32,990,667 UART: [rt]cmd =0x464d4352, len=4
32,998,268 >>> mbox cmd response data (524 bytes)
33,167,515 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,197,548 UART: [rt]cmd =0x43455252, len=4
33,208,912 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
3,803,405 ready_for_fw is high
3,803,939 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,874,271 >>> mbox cmd response: success
17,874,918 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,569,027 UART:
23,569,407 UART: Running Caliptra FMC ...
23,570,524 UART:
23,570,685 UART: [state] CFI Enabled
23,639,087 UART: [fht] FMC Alias Private Key: 7
25,977,782 UART: [art] Extend RT PCRs Done
25,979,017 UART: [art] Lock RT PCRs Done
25,980,959 UART: [art] Populate DV Done
25,986,530 UART: [fht] FMC Alias Private Key: 7
25,988,108 UART: [art] Derive CDI
25,988,850 UART: [art] Store in in slot 0x4
26,047,812 UART: [art] Derive Key Pair
26,048,815 UART: [art] Store priv key in slot 0x5
29,342,062 UART: [art] Derive Key Pair - Done
29,354,520 UART: [art] Signing Cert with AUTHO
29,355,859 UART: RITY.KEYID = 7
31,644,270 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,771 UART: [art] PUB.X = F936121FF7ECD0453210F4517D8D2E77748ABEB48642F1AEC745FB43CD05533160EDD2533901023FF7390EB7A78DA11E
31,653,037 UART: [art] PUB.Y = 44C5A8C3C8BFAAD54A1FFB67F60720EEF6FEF102D9ADAFCBD79961AD1CC37077719902E1A53076087EF305832B0AE0AB
31,660,291 UART: [art] SIG.R = CC60EC1000E13A7E947F354082CF1FF642A76500621CD5236E811ABE57AADDDFFF0B17EE63112E12A6D9EA088BD83C3F
31,667,686 UART: [art] SIG.S = 65969F9F557D708C51C1395863E4F171D78220EC0F48D75B4E35E0B6AFAFB526E3FFFC979DC1C8F9EA99E4677F37011E
32,972,805 UART: Caliptra RT
32,973,507 UART: [state] CFI Enabled
33,135,069 UART: [rt] RT listening for mailbox commands...
33,166,825 UART: [rt]cmd =0x464d4352, len=4
33,174,244 >>> mbox cmd response data (524 bytes)
33,343,218 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,373,522 UART: [rt]cmd =0x43455252, len=4
33,384,664 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,303 UART:
192,660 UART: Running Caliptra ROM ...
193,849 UART:
603,354 UART: [state] CFI Enabled
614,332 UART: [state] LifecycleState = Unprovisioned
616,388 UART: [state] DebugLocked = No
618,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,212 UART: [kat] SHA2-256
792,941 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,535 UART: [kat] ++
804,064 UART: [kat] sha1
814,446 UART: [kat] SHA2-256
817,156 UART: [kat] SHA2-384
821,716 UART: [kat] SHA2-512-ACC
824,076 UART: [kat] ECC-384
3,107,646 UART: [kat] HMAC-384Kdf
3,120,164 UART: [kat] LMS
4,310,255 UART: [kat] --
4,313,041 UART: [cold-reset] ++
4,315,605 UART: [fht] Storing FHT @ 0x50003400
4,326,859 UART: [idev] ++
4,327,424 UART: [idev] CDI.KEYID = 6
4,328,470 UART: [idev] SUBJECT.KEYID = 7
4,329,640 UART: [idev] UDS.KEYID = 0
4,330,670 ready_for_fw is high
4,330,864 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,474,558 UART: [idev] Erasing UDS.KEYID = 0
7,614,753 UART: [idev] Using Sha1 for KeyId Algorithm
7,636,232 UART: [idev] --
7,640,702 UART: [ldev] ++
7,641,270 UART: [ldev] CDI.KEYID = 6
7,642,199 UART: [ldev] SUBJECT.KEYID = 5
7,643,457 UART: [ldev] AUTHORITY.KEYID = 7
7,644,737 UART: [ldev] FE.KEYID = 1
7,654,919 UART: [ldev] Erasing FE.KEYID = 1
10,945,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,006 UART: [ldev] --
13,306,320 UART: [fwproc] Waiting for Commands...
13,309,492 UART: [fwproc] Received command 0x46574c44
13,311,668 UART: [fwproc] Received Image of size 114124 bytes
17,369,144 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,945 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,792 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,827,130 >>> mbox cmd response: success
17,827,609 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,830,608 UART: [afmc] ++
17,831,237 UART: [afmc] CDI.KEYID = 6
17,832,110 UART: [afmc] SUBJECT.KEYID = 7
17,833,371 UART: [afmc] AUTHORITY.KEYID = 5
21,146,223 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,265 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,525 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,930 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,768 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,167 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,684 UART: [afmc] --
23,511,226 UART: [cold-reset] --
23,514,220 UART: [state] Locking Datavault
23,519,080 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,830 UART: [state] Locking ICCM
23,523,571 UART: [exit] Launching FMC @ 0x40000130
23,531,956 UART:
23,532,184 UART: Running Caliptra FMC ...
23,533,277 UART:
23,533,429 UART: [state] CFI Enabled
23,541,250 UART: [fht] FMC Alias Private Key: 7
25,872,143 UART: [art] Extend RT PCRs Done
25,873,359 UART: [art] Lock RT PCRs Done
25,874,950 UART: [art] Populate DV Done
25,880,463 UART: [fht] FMC Alias Private Key: 7
25,882,153 UART: [art] Derive CDI
25,882,884 UART: [art] Store in in slot 0x4
25,925,150 UART: [art] Derive Key Pair
25,926,183 UART: [art] Store priv key in slot 0x5
29,168,333 UART: [art] Derive Key Pair - Done
29,181,527 UART: [art] Signing Cert with AUTHO
29,182,857 UART: RITY.KEYID = 7
31,461,839 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,341 UART: [art] PUB.X = D9DC0B08AFC49114318CC40EBF58A9EDE1B46334F2D02242A48F1B75D66D939B7E34FFD257B1BBE3584EF8AAF05CB399
31,470,571 UART: [art] PUB.Y = 733F9AFCF84781AE9631EBFADEF3C261DB70A67ACD33CB7AE6963ED7F29E17119CAAD96CB617623B7256B7726A4DC226
31,477,841 UART: [art] SIG.R = E2E0532F8DDD73549CD186DD31518A1F889605F2BCEF3FD2D8660AA77221025F3A1882D09EE9C2D1EE67E4330EC191AD
31,485,216 UART: [art] SIG.S = A3CCE433FC325C38127A9B61E8C6C5B8E4C1D3123D08416AFF3BAA44C2F3F0F6B872BAC848D69ADF1072C467DDE14F55
32,790,668 UART: Caliptra RT
32,791,364 UART: [state] CFI Enabled
32,909,279 UART: [rt] RT listening for mailbox commands...
32,940,614 UART: [rt]cmd =0x464d4352, len=4
32,947,998 >>> mbox cmd response data (524 bytes)
33,119,440 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,149,504 UART: [rt]cmd =0x43455252, len=4
33,160,686 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
4,126,924 ready_for_fw is high
4,127,335 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,068,133 >>> mbox cmd response: success
18,068,926 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,707,903 UART:
23,708,338 UART: Running Caliptra FMC ...
23,709,441 UART:
23,709,585 UART: [state] CFI Enabled
23,717,449 UART: [fht] FMC Alias Private Key: 7
26,047,550 UART: [art] Extend RT PCRs Done
26,048,782 UART: [art] Lock RT PCRs Done
26,050,218 UART: [art] Populate DV Done
26,055,685 UART: [fht] FMC Alias Private Key: 7
26,057,400 UART: [art] Derive CDI
26,058,156 UART: [art] Store in in slot 0x4
26,100,696 UART: [art] Derive Key Pair
26,101,700 UART: [art] Store priv key in slot 0x5
29,344,118 UART: [art] Derive Key Pair - Done
29,357,280 UART: [art] Signing Cert with AUTHO
29,358,585 UART: RITY.KEYID = 7
31,637,892 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,404 UART: [art] PUB.X = 195674EC63E557ED4F8FE2C4ADF05E930AFB43CA850A812C8B0F01EB6E20A67CF4EA76FF8B2DA5ACEA15F591B4EA53A9
31,646,706 UART: [art] PUB.Y = 9E8BD7D4D90E53330B3913269DBCE5A3D63EBB70208509B51A08D6CF2AB8ADF155DAE27AD33BE4F3DC23BEBB589DD653
31,653,980 UART: [art] SIG.R = 42BD708FB36091D37C429B89EAD3645A014231151395B7186839468CD9B438089C29F4DE60997FF319D69FB4757D0B18
31,661,321 UART: [art] SIG.S = C8C923D2BE86FEE1CA91E7205567CB3D6D303F8C26538840D6BFDF4AE7B5D9E555BE1144B11F72A67966EAD32BD87F2F
32,966,927 UART: Caliptra RT
32,967,622 UART: [state] CFI Enabled
33,085,004 UART: [rt] RT listening for mailbox commands...
33,116,394 UART: [rt]cmd =0x464d4352, len=4
33,124,019 >>> mbox cmd response data (524 bytes)
33,295,193 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,325,367 UART: [rt]cmd =0x43455252, len=4
33,336,713 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,065 UART:
192,449 UART: Running Caliptra ROM ...
193,649 UART:
193,803 UART: [state] CFI Enabled
264,648 UART: [state] LifecycleState = Unprovisioned
266,531 UART: [state] DebugLocked = No
269,258 UART: [state] WD Timer not started. Device not locked for debugging
273,831 UART: [kat] SHA2-256
452,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,520 UART: [kat] ++
465,043 UART: [kat] sha1
476,850 UART: [kat] SHA2-256
479,856 UART: [kat] SHA2-384
486,407 UART: [kat] SHA2-512-ACC
489,341 UART: [kat] ECC-384
2,949,275 UART: [kat] HMAC-384Kdf
2,972,238 UART: [kat] LMS
3,501,637 UART: [kat] --
3,504,703 UART: [cold-reset] ++
3,506,911 UART: [fht] FHT @ 0x50003400
3,517,534 UART: [idev] ++
3,518,121 UART: [idev] CDI.KEYID = 6
3,519,033 UART: [idev] SUBJECT.KEYID = 7
3,520,215 UART: [idev] UDS.KEYID = 0
3,521,144 ready_for_fw is high
3,521,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,511 UART: [idev] Erasing UDS.KEYID = 0
6,042,287 UART: [idev] Sha1 KeyId Algorithm
6,064,388 UART: [idev] --
6,068,387 UART: [ldev] ++
6,068,952 UART: [ldev] CDI.KEYID = 6
6,069,841 UART: [ldev] SUBJECT.KEYID = 5
6,071,051 UART: [ldev] AUTHORITY.KEYID = 7
6,072,285 UART: [ldev] FE.KEYID = 1
6,113,706 UART: [ldev] Erasing FE.KEYID = 1
8,617,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,371,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,387,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,403,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,066 UART: [ldev] --
10,426,981 UART: [fwproc] Wait for Commands...
10,429,264 UART: [fwproc] Recv command 0x46574c44
10,431,389 UART: [fwproc] Recv'd Img size: 114448 bytes
13,836,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,973,205 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,292,237 >>> mbox cmd response: success
14,292,751 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,295,696 UART: [afmc] ++
14,296,313 UART: [afmc] CDI.KEYID = 6
14,297,201 UART: [afmc] SUBJECT.KEYID = 7
14,298,364 UART: [afmc] AUTHORITY.KEYID = 5
16,839,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,563,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,565,582 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,581,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,597,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,613,254 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,636,150 UART: [afmc] --
18,639,967 UART: [cold-reset] --
18,644,312 UART: [state] Locking Datavault
18,649,988 UART: [state] Locking PCR0, PCR1 and PCR31
18,651,627 UART: [state] Locking ICCM
18,653,023 UART: [exit] Launching FMC @ 0x40000130
18,661,425 UART:
18,661,661 UART: Running Caliptra FMC ...
18,662,762 UART:
18,662,924 UART: [state] CFI Enabled
18,721,233 UART: [fht] FMC Alias Private Key: 7
20,485,636 UART: [art] Extend RT PCRs Done
20,486,838 UART: [art] Lock RT PCRs Done
20,488,485 UART: [art] Populate DV Done
20,493,840 UART: [fht] FMC Alias Private Key: 7
20,495,377 UART: [art] Derive CDI
20,496,108 UART: [art] Store in in slot 0x4
20,553,766 UART: [art] Derive Key Pair
20,554,797 UART: [art] Store priv key in slot 0x5
23,018,194 UART: [art] Derive Key Pair - Done
23,031,413 UART: [art] Signing Cert with AUTHO
23,032,713 UART: RITY.KEYID = 7
24,742,962 UART: [art] Erasing AUTHORITY.KEYID = 7
24,744,442 UART: [art] PUB.X = 53A48F4729E02F8869A9CEDF81D75DB41DC547E671829A6D11F5049052DF15D65122F794EA918B8A6F452204FF735F86
24,751,714 UART: [art] PUB.Y = DFEB33BBAB38D5FA9EE40F08B0F9C990BEA5BD61A82FC8742761FBE005B8985528898070CA5D2CD6D85AD9BD7B24D297
24,758,966 UART: [art] SIG.R = 03578CD4A9472D8EEB9CA14C36E22C085E78D81C07801C42D5980C14497B8539491301C69654A4344DB17655DB3F3AF8
24,766,376 UART: [art] SIG.S = 6254306505876775DF90430B543C7DE3C1F06FFCCD840D7C5EDAE2F7BE73C9245AC8289D78E7E49B2017E8FE59AE1415
25,745,428 UART: Caliptra RT
25,746,135 UART: [state] CFI Enabled
25,910,796 UART: [rt] RT listening for mailbox commands...
25,942,043 UART: [rt]cmd =0x464d4352, len=4
25,949,558 >>> mbox cmd response data (524 bytes)
26,118,589 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,148,649 UART: [rt]cmd =0x43455252, len=4
26,160,148 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,358,168 ready_for_fw is high
3,358,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,050,321 >>> mbox cmd response: success
14,051,130 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,345,896 UART:
18,346,294 UART: Running Caliptra FMC ...
18,347,430 UART:
18,347,614 UART: [state] CFI Enabled
18,411,207 UART: [fht] FMC Alias Private Key: 7
20,174,822 UART: [art] Extend RT PCRs Done
20,176,049 UART: [art] Lock RT PCRs Done
20,177,687 UART: [art] Populate DV Done
20,183,211 UART: [fht] FMC Alias Private Key: 7
20,184,700 UART: [art] Derive CDI
20,185,514 UART: [art] Store in in slot 0x4
20,243,625 UART: [art] Derive Key Pair
20,244,665 UART: [art] Store priv key in slot 0x5
22,707,421 UART: [art] Derive Key Pair - Done
22,720,633 UART: [art] Signing Cert with AUTHO
22,721,939 UART: RITY.KEYID = 7
24,433,001 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,509 UART: [art] PUB.X = 0E7F62E3F77F790D40F7F83CAF49B9A6339C07F84315ED057A9C27B8A0A64F507623973A7AE139E892EC8E8A2C7A9385
24,441,836 UART: [art] PUB.Y = AB2672A5C4B9DEF0060FAB82B891D420064D2F4FD0D70BDF71A84B1603E3CF59432FD9F4FD185851366AD1CEECDBB0BD
24,449,055 UART: [art] SIG.R = 0E7AB72CEDB9886FAD23ADEDD3240312D850DA0E3568C66E13A7984B378D9981E6056085522C226AC13B718B85831896
24,456,471 UART: [art] SIG.S = D622449CE55341C04BDF0D17355C951C8A5E581559F4A8537965F48024B9ECEB4F066FBBF7E46FFA0E9E6E7164DF32E1
25,434,838 UART: Caliptra RT
25,435,539 UART: [state] CFI Enabled
25,600,751 UART: [rt] RT listening for mailbox commands...
25,632,321 UART: [rt]cmd =0x464d4352, len=4
25,639,723 >>> mbox cmd response data (524 bytes)
25,807,513 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,837,753 UART: [rt]cmd =0x43455252, len=4
25,849,304 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,364 UART:
192,740 UART: Running Caliptra ROM ...
193,924 UART:
603,454 UART: [state] CFI Enabled
618,352 UART: [state] LifecycleState = Unprovisioned
620,240 UART: [state] DebugLocked = No
622,963 UART: [state] WD Timer not started. Device not locked for debugging
626,278 UART: [kat] SHA2-256
805,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,948 UART: [kat] ++
817,393 UART: [kat] sha1
828,824 UART: [kat] SHA2-256
831,829 UART: [kat] SHA2-384
837,459 UART: [kat] SHA2-512-ACC
840,385 UART: [kat] ECC-384
3,283,079 UART: [kat] HMAC-384Kdf
3,296,669 UART: [kat] LMS
3,826,172 UART: [kat] --
3,833,005 UART: [cold-reset] ++
3,835,501 UART: [fht] FHT @ 0x50003400
3,846,134 UART: [idev] ++
3,846,691 UART: [idev] CDI.KEYID = 6
3,847,606 UART: [idev] SUBJECT.KEYID = 7
3,848,768 UART: [idev] UDS.KEYID = 0
3,849,809 ready_for_fw is high
3,850,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,746 UART: [idev] Erasing UDS.KEYID = 0
6,321,608 UART: [idev] Sha1 KeyId Algorithm
6,345,421 UART: [idev] --
6,349,244 UART: [ldev] ++
6,349,801 UART: [ldev] CDI.KEYID = 6
6,350,706 UART: [ldev] SUBJECT.KEYID = 5
6,351,911 UART: [ldev] AUTHORITY.KEYID = 7
6,353,131 UART: [ldev] FE.KEYID = 1
6,363,121 UART: [ldev] Erasing FE.KEYID = 1
8,839,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,803 UART: [ldev] --
10,631,003 UART: [fwproc] Wait for Commands...
10,633,205 UART: [fwproc] Recv command 0x46574c44
10,635,287 UART: [fwproc] Recv'd Img size: 114448 bytes
14,032,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,497,020 >>> mbox cmd response: success
14,497,610 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,502,016 UART: [afmc] ++
14,502,613 UART: [afmc] CDI.KEYID = 6
14,503,493 UART: [afmc] SUBJECT.KEYID = 7
14,504,677 UART: [afmc] AUTHORITY.KEYID = 5
17,004,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,574 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,401 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,338 UART: [afmc] --
18,799,896 UART: [cold-reset] --
18,804,351 UART: [state] Locking Datavault
18,808,674 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,309 UART: [state] Locking ICCM
18,812,454 UART: [exit] Launching FMC @ 0x40000130
18,820,896 UART:
18,821,129 UART: Running Caliptra FMC ...
18,822,220 UART:
18,822,396 UART: [state] CFI Enabled
18,830,625 UART: [fht] FMC Alias Private Key: 7
20,587,556 UART: [art] Extend RT PCRs Done
20,588,770 UART: [art] Lock RT PCRs Done
20,590,632 UART: [art] Populate DV Done
20,596,038 UART: [fht] FMC Alias Private Key: 7
20,597,516 UART: [art] Derive CDI
20,598,272 UART: [art] Store in in slot 0x4
20,640,805 UART: [art] Derive Key Pair
20,641,839 UART: [art] Store priv key in slot 0x5
23,068,857 UART: [art] Derive Key Pair - Done
23,082,008 UART: [art] Signing Cert with AUTHO
23,083,315 UART: RITY.KEYID = 7
24,788,681 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,179 UART: [art] PUB.X = EBE2ACDAEBC977E817AE60008A8EBD8EFA05B6437A238477E9C624DDFDA67B95EF29AD343B77598227C90FBCE36D9C25
24,797,463 UART: [art] PUB.Y = F453434F779A495B9450FD47089CEA503B9D984B6FD58DCB84C50DEAF828133AA5BBC8BD6B34330B30818DE3D130EB3A
24,804,751 UART: [art] SIG.R = 363D453D595E4D8FBF87D3EE70DEE93350B3B0BA3FFAB02EA52DF6933FAFB895E91D92707A85C4642ED76644F5CDBD11
24,812,129 UART: [art] SIG.S = FA2220AB53AEA3F2AFAEC920C4775A8678B2D6A8E03EFCD3C7F2235C901380384118EECC7C2D6173266E1F9AF2078E80
25,791,368 UART: Caliptra RT
25,792,076 UART: [state] CFI Enabled
25,910,060 UART: [rt] RT listening for mailbox commands...
25,941,202 UART: [rt]cmd =0x464d4352, len=4
25,948,761 >>> mbox cmd response data (524 bytes)
26,119,813 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,150,010 UART: [rt]cmd =0x43455252, len=4
26,161,605 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,692,448 ready_for_fw is high
3,692,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,856 >>> mbox cmd response: success
14,278,644 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,529,324 UART:
18,529,708 UART: Running Caliptra FMC ...
18,530,839 UART:
18,530,987 UART: [state] CFI Enabled
18,539,165 UART: [fht] FMC Alias Private Key: 7
20,296,145 UART: [art] Extend RT PCRs Done
20,297,370 UART: [art] Lock RT PCRs Done
20,298,697 UART: [art] Populate DV Done
20,304,434 UART: [fht] FMC Alias Private Key: 7
20,306,139 UART: [art] Derive CDI
20,306,875 UART: [art] Store in in slot 0x4
20,349,470 UART: [art] Derive Key Pair
20,350,507 UART: [art] Store priv key in slot 0x5
22,777,044 UART: [art] Derive Key Pair - Done
22,790,151 UART: [art] Signing Cert with AUTHO
22,791,450 UART: RITY.KEYID = 7
24,497,203 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,706 UART: [art] PUB.X = 9F95FC50AAB0C3695D039379EB9FBBFFCCEB7FDDA2DAF49FF99F004C8E155513F98F7673AE667B0F2E724B8068C1FAE5
24,506,003 UART: [art] PUB.Y = 7666BBC6394A66045E0DF1D87EB452E9D76319EB6144FF3D270D8BB6F50C74A967C1AB028BF9255FB3DBAB597CA30CB4
24,513,257 UART: [art] SIG.R = 2281E0DA406C488FD896AA8ADAB26ECF498184C79BA10C202C010A1E8752B82F8D2F43B1CED0A79472912FB54C23A2DE
24,520,677 UART: [art] SIG.S = 290E0BDEAF7EEAF0BFA2A286695F4461C2B4C1FAA90AC5086CEAFB43773DE099A03169C2C3C3E184656EDE1445FC09B2
25,499,719 UART: Caliptra RT
25,500,431 UART: [state] CFI Enabled
25,617,617 UART: [rt] RT listening for mailbox commands...
25,648,650 UART: [rt]cmd =0x464d4352, len=4
25,655,952 >>> mbox cmd response data (524 bytes)
25,826,700 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,856,776 UART: [rt]cmd =0x43455252, len=4
25,867,993 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,416,948 ready_for_fw is high
3,417,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,718,726 >>> mbox cmd response: success
14,719,324 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,022,247 UART:
19,022,646 UART: Running Caliptra FMC ...
19,023,791 UART:
19,023,958 UART: [state] CFI Enabled
19,093,219 UART: [fht] FMC Alias Private Key: 7
20,857,498 UART: [art] Extend RT PCRs Done
20,858,721 UART: [art] Lock RT PCRs Done
20,860,395 UART: [art] Populate DV Done
20,865,715 UART: [fht] FMC Alias Private Key: 7
20,867,204 UART: [art] Derive CDI
20,867,965 UART: [art] Store in in slot 0x4
20,926,014 UART: [art] Derive Key Pair
20,927,056 UART: [art] Store priv key in slot 0x5
23,389,752 UART: [art] Derive Key Pair - Done
23,402,860 UART: [art] Signing Cert with AUTHO
23,404,161 UART: RITY.KEYID = 7
25,115,642 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,305 UART: [art] PUB.X = 0D096DC6FE7A4B79A76275EF4EB2C0CB8444311F9E612E424545BC7075772DF4428F76934FAC4AC6E0F66A425B1DE145
25,124,411 UART: [art] PUB.Y = CD21934A5657B4BEAA7E63F13F5E986B35A3616BBFC385B4C785565F70BEDA62CCB248CAC8CC13C835A526D7C9FF4972
25,131,672 UART: [art] SIG.R = 2005C37694FFB67EBF01B9C32A7B02755C6879A3044F45162B987CA175328ADB6F4A2FDD772781509001C90C6ED5751B
25,139,057 UART: [art] SIG.S = EA94B4B370B884C56096BBE245580EFB600DA993562103AE49DB25DF785D7F55E21174E8650A0CF72C8F639456A5B3EC
26,117,425 UART: Caliptra RT
26,118,113 UART: [state] CFI Enabled
26,284,065 UART: [rt] RT listening for mailbox commands...
26,315,658 UART: [rt]cmd =0x464d4352, len=4
26,323,127 >>> mbox cmd response data (524 bytes)
26,492,030 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,521,977 UART: [rt]cmd =0x43455252, len=4
26,533,526 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,754,688 ready_for_fw is high
3,755,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,171 >>> mbox cmd response: success
14,965,780 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,218,942 UART:
19,219,338 UART: Running Caliptra FMC ...
19,220,474 UART:
19,220,622 UART: [state] CFI Enabled
19,228,523 UART: [fht] FMC Alias Private Key: 7
20,986,054 UART: [art] Extend RT PCRs Done
20,987,287 UART: [art] Lock RT PCRs Done
20,989,287 UART: [art] Populate DV Done
20,994,653 UART: [fht] FMC Alias Private Key: 7
20,996,121 UART: [art] Derive CDI
20,996,887 UART: [art] Store in in slot 0x4
21,039,368 UART: [art] Derive Key Pair
21,040,371 UART: [art] Store priv key in slot 0x5
23,467,159 UART: [art] Derive Key Pair - Done
23,480,199 UART: [art] Signing Cert with AUTHO
23,481,550 UART: RITY.KEYID = 7
25,186,916 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,429 UART: [art] PUB.X = F0CA851AD2FBB1D774FC3E8020BD830533716F327F49ECE68DC05A499BB3E6676248D5FB06F5DA72080116FD1AEC24AF
25,195,679 UART: [art] PUB.Y = B8D80FADC48A500A9D849806AABBA093ED618F475245EB4B76D6DDBFC837DFDA7D08695281962D78BD5317622D08390F
25,202,937 UART: [art] SIG.R = D3CCEA3AFBDE92FE41602162FF1393EEED878D718BFF6BE6DC174B87E6C7218A4BC0B4D2B04B0DDB541D11283A4DCA29
25,210,380 UART: [art] SIG.S = 8D1678A3359671347E578763C65E6F1B8468BF4C4F23007708F50DA49D341F209ACCCD768825B2EAE21D5D5FC01C385C
26,190,021 UART: Caliptra RT
26,190,898 UART: [state] CFI Enabled
26,308,024 UART: [rt] RT listening for mailbox commands...
26,339,704 UART: [rt]cmd =0x464d4352, len=4
26,347,157 >>> mbox cmd response data (524 bytes)
26,518,273 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,548,008 UART: [rt]cmd =0x43455252, len=4
26,559,360 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,730 UART: [state] LifecycleState = Unprovisioned
86,385 UART: [state] DebugLocked = No
87,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,547 UART: [kat] SHA2-256
882,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,593 UART: [kat] ++
886,745 UART: [kat] sha1
891,183 UART: [kat] SHA2-256
893,121 UART: [kat] SHA2-384
895,900 UART: [kat] SHA2-512-ACC
897,801 UART: [kat] ECC-384
903,460 UART: [kat] HMAC-384Kdf
907,868 UART: [kat] LMS
1,476,064 UART: [kat] --
1,477,069 UART: [cold-reset] ++
1,477,397 UART: [fht] Storing FHT @ 0x50003400
1,480,188 UART: [idev] ++
1,480,356 UART: [idev] CDI.KEYID = 6
1,480,716 UART: [idev] SUBJECT.KEYID = 7
1,481,140 UART: [idev] UDS.KEYID = 0
1,481,485 ready_for_fw is high
1,481,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,998 UART: [idev] Erasing UDS.KEYID = 0
1,505,770 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,382 UART: [idev] --
1,515,313 UART: [ldev] ++
1,515,481 UART: [ldev] CDI.KEYID = 6
1,515,844 UART: [ldev] SUBJECT.KEYID = 5
1,516,270 UART: [ldev] AUTHORITY.KEYID = 7
1,516,733 UART: [ldev] FE.KEYID = 1
1,521,993 UART: [ldev] Erasing FE.KEYID = 1
1,547,710 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,406 UART: [ldev] --
1,586,907 UART: [fwproc] Waiting for Commands...
1,587,700 UART: [fwproc] Received command 0x46574c44
1,588,491 UART: [fwproc] Received Image of size 114448 bytes
2,889,346 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,512 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,864 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,939 >>> mbox cmd response: success
3,081,939 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,082,997 UART: [afmc] ++
3,083,165 UART: [afmc] CDI.KEYID = 6
3,083,527 UART: [afmc] SUBJECT.KEYID = 7
3,083,952 UART: [afmc] AUTHORITY.KEYID = 5
3,118,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,719 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,499 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,112 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,802 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,725 UART: [afmc] --
3,161,823 UART: [cold-reset] --
3,162,621 UART: [state] Locking Datavault
3,163,558 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,162 UART: [state] Locking ICCM
3,164,698 UART: [exit] Launching FMC @ 0x40000130
3,170,027 UART:
3,170,043 UART: Running Caliptra FMC ...
3,170,451 UART:
3,170,505 UART: [state] CFI Enabled
3,180,820 UART: [fht] FMC Alias Private Key: 7
3,288,655 UART: [art] Extend RT PCRs Done
3,289,083 UART: [art] Lock RT PCRs Done
3,290,477 UART: [art] Populate DV Done
3,298,626 UART: [fht] FMC Alias Private Key: 7
3,299,644 UART: [art] Derive CDI
3,299,924 UART: [art] Store in in slot 0x4
3,385,461 UART: [art] Derive Key Pair
3,385,821 UART: [art] Store priv key in slot 0x5
3,398,533 UART: [art] Derive Key Pair - Done
3,413,386 UART: [art] Signing Cert with AUTHO
3,413,866 UART: RITY.KEYID = 7
3,428,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,661 UART: [art] PUB.X = 30310C432BD3B7E7D64448F49B559B56CCBFB9769B12F1071698E661EE32C4F91649EE2AB510FFEE81F62CEB5269D9DF
3,436,435 UART: [art] PUB.Y = 09AE97ED3FC78DF9C9335081C7A23D19BBE4DF286389B81454DC4C1CA0622DD94A67DEABE285CAED50170B5FB0C78A8E
3,443,399 UART: [art] SIG.R = 3575D15E0D68792F024E35489B545DBC7E4FC434ECA507B281239E4C1CA8EB583FA0B16B094C91928D0816715814BDA7
3,450,154 UART: [art] SIG.S = 7071B0DD2C29A6E2043804AC5B7644E87E9BCEF6973A34690053E64B8E8115CE01E6CAB2659CD39CC5B575CB4156BC83
3,473,670 UART: Caliptra RT
3,473,923 UART: [state] CFI Enabled
3,582,083 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,669 UART: [rt]cmd =0x464d4352, len=4
3,619,797 >>> mbox cmd response data (524 bytes)
3,619,798 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,069 UART: [rt]cmd =0x43455252, len=4
3,659,680 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,211 ready_for_fw is high
1,362,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,853 >>> mbox cmd response: success
2,928,853 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,991,135 UART:
2,991,151 UART: Running Caliptra FMC ...
2,991,559 UART:
2,991,613 UART: [state] CFI Enabled
3,002,018 UART: [fht] FMC Alias Private Key: 7
3,110,597 UART: [art] Extend RT PCRs Done
3,111,025 UART: [art] Lock RT PCRs Done
3,112,701 UART: [art] Populate DV Done
3,120,732 UART: [fht] FMC Alias Private Key: 7
3,121,734 UART: [art] Derive CDI
3,122,014 UART: [art] Store in in slot 0x4
3,207,709 UART: [art] Derive Key Pair
3,208,069 UART: [art] Store priv key in slot 0x5
3,221,689 UART: [art] Derive Key Pair - Done
3,236,518 UART: [art] Signing Cert with AUTHO
3,236,998 UART: RITY.KEYID = 7
3,252,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,551 UART: [art] PUB.X = 9CE074B6CA83A26252C72A7E0709774032F7FD0D93C03694B905B36FA3D558FF60155E92C40AC976956B38C6DF511D63
3,260,304 UART: [art] PUB.Y = B441ECF397A17ADEC89D538F35AE24F8BBCCD2C5F7D82F4633D974D234E87C30A051A39F8B0365052D2B2E62D1029C33
3,267,255 UART: [art] SIG.R = 4B864B6A9B758B1F1E4DFC0FCD1A2631535B9C461CF7211BA0B357DB1CB93EC03F91F70752513928CFEED6F20DE7D5DA
3,274,034 UART: [art] SIG.S = 97D71454A908AE69527D01D132D93E141925CEC507909C60E0C3E2955359095CD5E8159A752E04287EB6D87E00783988
3,297,132 UART: Caliptra RT
3,297,385 UART: [state] CFI Enabled
3,406,470 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,952 UART: [rt]cmd =0x464d4352, len=4
3,444,114 >>> mbox cmd response data (524 bytes)
3,444,115 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,654 UART: [rt]cmd =0x43455252, len=4
3,484,411 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,626 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,140 UART: [kat] SHA2-256
882,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,186 UART: [kat] ++
886,338 UART: [kat] sha1
890,394 UART: [kat] SHA2-256
892,332 UART: [kat] SHA2-384
895,107 UART: [kat] SHA2-512-ACC
897,008 UART: [kat] ECC-384
902,449 UART: [kat] HMAC-384Kdf
907,121 UART: [kat] LMS
1,475,317 UART: [kat] --
1,476,020 UART: [cold-reset] ++
1,476,584 UART: [fht] Storing FHT @ 0x50003400
1,479,511 UART: [idev] ++
1,479,679 UART: [idev] CDI.KEYID = 6
1,480,039 UART: [idev] SUBJECT.KEYID = 7
1,480,463 UART: [idev] UDS.KEYID = 0
1,480,808 ready_for_fw is high
1,480,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,393 UART: [idev] Erasing UDS.KEYID = 0
1,505,063 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,881 UART: [idev] --
1,514,996 UART: [ldev] ++
1,515,164 UART: [ldev] CDI.KEYID = 6
1,515,527 UART: [ldev] SUBJECT.KEYID = 5
1,515,953 UART: [ldev] AUTHORITY.KEYID = 7
1,516,416 UART: [ldev] FE.KEYID = 1
1,521,600 UART: [ldev] Erasing FE.KEYID = 1
1,547,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,335 UART: [ldev] --
1,586,800 UART: [fwproc] Waiting for Commands...
1,587,447 UART: [fwproc] Received command 0x46574c44
1,588,238 UART: [fwproc] Received Image of size 114448 bytes
2,886,925 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,240 >>> mbox cmd response: success
3,079,240 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,080,322 UART: [afmc] ++
3,080,490 UART: [afmc] CDI.KEYID = 6
3,080,852 UART: [afmc] SUBJECT.KEYID = 7
3,081,277 UART: [afmc] AUTHORITY.KEYID = 5
3,116,802 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,482 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,262 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,990 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,875 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,565 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,396 UART: [afmc] --
3,160,466 UART: [cold-reset] --
3,161,428 UART: [state] Locking Datavault
3,162,541 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,145 UART: [state] Locking ICCM
3,163,743 UART: [exit] Launching FMC @ 0x40000130
3,169,072 UART:
3,169,088 UART: Running Caliptra FMC ...
3,169,496 UART:
3,169,639 UART: [state] CFI Enabled
3,180,096 UART: [fht] FMC Alias Private Key: 7
3,288,057 UART: [art] Extend RT PCRs Done
3,288,485 UART: [art] Lock RT PCRs Done
3,290,203 UART: [art] Populate DV Done
3,298,426 UART: [fht] FMC Alias Private Key: 7
3,299,532 UART: [art] Derive CDI
3,299,812 UART: [art] Store in in slot 0x4
3,385,699 UART: [art] Derive Key Pair
3,386,059 UART: [art] Store priv key in slot 0x5
3,399,177 UART: [art] Derive Key Pair - Done
3,414,166 UART: [art] Signing Cert with AUTHO
3,414,646 UART: RITY.KEYID = 7
3,430,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,887 UART: [art] PUB.X = 709DBBDFE18E76C06E7AB7C9CD19E9194A381E9422E1DDCD0C6927CEA78B66CE5B9D0CCC228390A0B8B825365F5666CC
3,437,669 UART: [art] PUB.Y = 4FAA3555B04664FCE251CA980433BE04F0E6168B6C03EAD227F398B580A82057CE8CE58985D9B294F392BEDF00883F5C
3,444,594 UART: [art] SIG.R = 651F9FAB00458297D4D58E42F28A7BB731FFE4EA08669AB588D4A91ACE69AF9B9518360D228256A5DC32A90B96656006
3,451,332 UART: [art] SIG.S = B28D43F85159EDDCB80FCD58AEAD59530168E69185DA4F80DE93C501C18B873141DEA40D85A2F15C4B8D51072A7A2679
3,475,162 UART: Caliptra RT
3,475,507 UART: [state] CFI Enabled
3,584,292 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,838 UART: [rt]cmd =0x464d4352, len=4
3,621,908 >>> mbox cmd response data (524 bytes)
3,621,909 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,214 UART: [rt]cmd =0x43455252, len=4
3,662,001 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,564 ready_for_fw is high
1,362,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,500 >>> mbox cmd response: success
2,930,500 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,991,756 UART:
2,991,772 UART: Running Caliptra FMC ...
2,992,180 UART:
2,992,323 UART: [state] CFI Enabled
3,002,968 UART: [fht] FMC Alias Private Key: 7
3,110,617 UART: [art] Extend RT PCRs Done
3,111,045 UART: [art] Lock RT PCRs Done
3,112,539 UART: [art] Populate DV Done
3,120,966 UART: [fht] FMC Alias Private Key: 7
3,121,938 UART: [art] Derive CDI
3,122,218 UART: [art] Store in in slot 0x4
3,208,049 UART: [art] Derive Key Pair
3,208,409 UART: [art] Store priv key in slot 0x5
3,221,833 UART: [art] Derive Key Pair - Done
3,236,369 UART: [art] Signing Cert with AUTHO
3,236,849 UART: RITY.KEYID = 7
3,252,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,410 UART: [art] PUB.X = 74E87D998D58200B1D4C32248D45190ADAF962E60312577274FCF699A19841BFDB9C66D4F211A05BE609DC2EF5720A78
3,260,165 UART: [art] PUB.Y = 86D7B8FC1CFD76D5223D8C21B5126F921F1A60DA6606914FE397EAB77FEB1D55211FEDB36F4DF784BE44CC2AF7DE1D15
3,267,132 UART: [art] SIG.R = 2203C89DF5FA17B71874BE300C44253A10A1C5106ACE6E7021BC6F66942C99C147E47C0477C0B8EE58CFB4F6D8B95D7A
3,273,901 UART: [art] SIG.S = 62213B24AB26A475720AB788AB107FFF5DE8FB78F1A1CBEF055897E7329776DF086C41A79D61B205453A895731582E92
3,297,492 UART: Caliptra RT
3,297,837 UART: [state] CFI Enabled
3,406,843 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,303 UART: [rt]cmd =0x464d4352, len=4
3,444,573 >>> mbox cmd response data (524 bytes)
3,444,574 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,737 UART: [rt]cmd =0x43455252, len=4
3,484,546 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
893,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,313 UART: [kat] ++
897,465 UART: [kat] sha1
901,641 UART: [kat] SHA2-256
903,581 UART: [kat] SHA2-384
906,368 UART: [kat] SHA2-512-ACC
908,269 UART: [kat] ECC-384
917,956 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,171,669 UART: [cold-reset] ++
1,172,219 UART: [fht] FHT @ 0x50003400
1,174,808 UART: [idev] ++
1,174,976 UART: [idev] CDI.KEYID = 6
1,175,336 UART: [idev] SUBJECT.KEYID = 7
1,175,760 UART: [idev] UDS.KEYID = 0
1,176,105 ready_for_fw is high
1,176,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,637 UART: [idev] Sha1 KeyId Algorithm
1,209,077 UART: [idev] --
1,210,155 UART: [ldev] ++
1,210,323 UART: [ldev] CDI.KEYID = 6
1,210,686 UART: [ldev] SUBJECT.KEYID = 5
1,211,112 UART: [ldev] AUTHORITY.KEYID = 7
1,211,575 UART: [ldev] FE.KEYID = 1
1,216,935 UART: [ldev] Erasing FE.KEYID = 1
1,243,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,395 UART: [ldev] --
1,282,718 UART: [fwproc] Wait for Commands...
1,283,472 UART: [fwproc] Recv command 0x46574c44
1,284,200 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,704 >>> mbox cmd response: success
2,776,704 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,777,952 UART: [afmc] ++
2,778,120 UART: [afmc] CDI.KEYID = 6
2,778,482 UART: [afmc] SUBJECT.KEYID = 7
2,778,907 UART: [afmc] AUTHORITY.KEYID = 5
2,815,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,677 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,405 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,290 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,815 UART: [afmc] --
2,858,877 UART: [cold-reset] --
2,859,847 UART: [state] Locking Datavault
2,861,118 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,722 UART: [state] Locking ICCM
2,862,248 UART: [exit] Launching FMC @ 0x40000130
2,867,577 UART:
2,867,593 UART: Running Caliptra FMC ...
2,868,001 UART:
2,868,055 UART: [state] CFI Enabled
2,878,470 UART: [fht] FMC Alias Private Key: 7
2,986,195 UART: [art] Extend RT PCRs Done
2,986,623 UART: [art] Lock RT PCRs Done
2,988,253 UART: [art] Populate DV Done
2,996,448 UART: [fht] FMC Alias Private Key: 7
2,997,554 UART: [art] Derive CDI
2,997,834 UART: [art] Store in in slot 0x4
3,083,153 UART: [art] Derive Key Pair
3,083,513 UART: [art] Store priv key in slot 0x5
3,096,171 UART: [art] Derive Key Pair - Done
3,110,818 UART: [art] Signing Cert with AUTHO
3,111,298 UART: RITY.KEYID = 7
3,126,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,307 UART: [art] PUB.X = 4A34564F6F55B25B10BF03D005B86C20F08838D5707E40E4D78C43D1D8407100B335B87D0897EA2DE56D98C16FC5269B
3,134,044 UART: [art] PUB.Y = 47F0C06E2B60D75A8C5961D24AF66B30C866A17169010B8E90FA071E39BBA68656AA56098180BA126BC0165C832D17CE
3,140,982 UART: [art] SIG.R = 00600FFD3ABCD76F7232CDA5965DD79323337067BB61DB077182210BAECE158DFB0B213032D7AF61DAECBACF9AD0200B
3,147,733 UART: [art] SIG.S = 21A0EECA12F717D3A25EE5AD51B386B6D217E4873FCA8A28BFD5638C4A79F52433260C6E216144E2AE9A4ED243246E8A
3,171,119 UART: Caliptra RT
3,171,372 UART: [state] CFI Enabled
3,279,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,015 UART: [rt]cmd =0x464d4352, len=4
3,316,833 >>> mbox cmd response data (524 bytes)
3,316,834 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,107 UART: [rt]cmd =0x43455252, len=4
3,356,885 >>> mbox cmd response data (781 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,175 ready_for_fw is high
1,059,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,759 >>> mbox cmd response: success
2,627,759 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,689,631 UART:
2,689,647 UART: Running Caliptra FMC ...
2,690,055 UART:
2,690,109 UART: [state] CFI Enabled
2,700,470 UART: [fht] FMC Alias Private Key: 7
2,808,567 UART: [art] Extend RT PCRs Done
2,808,995 UART: [art] Lock RT PCRs Done
2,810,279 UART: [art] Populate DV Done
2,818,372 UART: [fht] FMC Alias Private Key: 7
2,819,434 UART: [art] Derive CDI
2,819,714 UART: [art] Store in in slot 0x4
2,905,563 UART: [art] Derive Key Pair
2,905,923 UART: [art] Store priv key in slot 0x5
2,919,291 UART: [art] Derive Key Pair - Done
2,934,393 UART: [art] Signing Cert with AUTHO
2,934,873 UART: RITY.KEYID = 7
2,949,711 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,476 UART: [art] PUB.X = 868982A10191D63AAC2A7547D74F6347C3CF19BB2CF421715EC37C7C316D52CA221BA53DE00027B7EAE27320D69C4AD2
2,957,227 UART: [art] PUB.Y = 69A8888688D7E59D79A876EC3D89453A7C19EF80A1B50F3B0787CB265573B96D9EB606652F39FC2C87B9CB0A4747303B
2,964,165 UART: [art] SIG.R = 9577A66208D7895C79EDBDE0FBEA53241A4D0A21B5E50F2B7302725BE1D5E05449B66CDE1F2FFE56D6B7E25EEECFFB68
2,970,943 UART: [art] SIG.S = D59D06893127750CB1DDDD0CEEE4DC6A85AE28FBB0C676C19246D101096284029EFD79DC154A3C651726DD82F46E44A3
2,994,628 UART: Caliptra RT
2,994,881 UART: [state] CFI Enabled
3,101,905 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,507 UART: [rt]cmd =0x464d4352, len=4
3,139,423 >>> mbox cmd response data (524 bytes)
3,139,424 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,667 UART: [rt]cmd =0x43455252, len=4
3,179,629 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,082 UART: [state] WD Timer not started. Device not locked for debugging
88,439 UART: [kat] SHA2-256
894,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,214 UART: [kat] ++
898,366 UART: [kat] sha1
902,466 UART: [kat] SHA2-256
904,406 UART: [kat] SHA2-384
907,269 UART: [kat] SHA2-512-ACC
909,170 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,023 UART: [kat] LMS
1,172,351 UART: [kat] --
1,173,048 UART: [cold-reset] ++
1,173,526 UART: [fht] FHT @ 0x50003400
1,176,295 UART: [idev] ++
1,176,463 UART: [idev] CDI.KEYID = 6
1,176,823 UART: [idev] SUBJECT.KEYID = 7
1,177,247 UART: [idev] UDS.KEYID = 0
1,177,592 ready_for_fw is high
1,177,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,035 UART: [idev] Erasing UDS.KEYID = 0
1,202,552 UART: [idev] Sha1 KeyId Algorithm
1,211,098 UART: [idev] --
1,211,950 UART: [ldev] ++
1,212,118 UART: [ldev] CDI.KEYID = 6
1,212,481 UART: [ldev] SUBJECT.KEYID = 5
1,212,907 UART: [ldev] AUTHORITY.KEYID = 7
1,213,370 UART: [ldev] FE.KEYID = 1
1,218,676 UART: [ldev] Erasing FE.KEYID = 1
1,245,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,242 UART: [ldev] --
1,284,527 UART: [fwproc] Wait for Commands...
1,285,327 UART: [fwproc] Recv command 0x46574c44
1,286,055 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,982 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,359 >>> mbox cmd response: success
2,778,359 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,779,499 UART: [afmc] ++
2,779,667 UART: [afmc] CDI.KEYID = 6
2,780,029 UART: [afmc] SUBJECT.KEYID = 7
2,780,454 UART: [afmc] AUTHORITY.KEYID = 5
2,816,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,941 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,660 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,382 UART: [afmc] --
2,859,358 UART: [cold-reset] --
2,860,444 UART: [state] Locking Datavault
2,861,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,945 UART: [state] Locking ICCM
2,862,499 UART: [exit] Launching FMC @ 0x40000130
2,867,828 UART:
2,867,844 UART: Running Caliptra FMC ...
2,868,252 UART:
2,868,395 UART: [state] CFI Enabled
2,878,784 UART: [fht] FMC Alias Private Key: 7
2,986,279 UART: [art] Extend RT PCRs Done
2,986,707 UART: [art] Lock RT PCRs Done
2,988,287 UART: [art] Populate DV Done
2,996,340 UART: [fht] FMC Alias Private Key: 7
2,997,370 UART: [art] Derive CDI
2,997,650 UART: [art] Store in in slot 0x4
3,083,437 UART: [art] Derive Key Pair
3,083,797 UART: [art] Store priv key in slot 0x5
3,097,005 UART: [art] Derive Key Pair - Done
3,112,152 UART: [art] Signing Cert with AUTHO
3,112,632 UART: RITY.KEYID = 7
3,128,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,939 UART: [art] PUB.X = 4D4F18004BC8CB579A2B62236657FBD7DF989AEC13B850C6A4662C32DF331913079269FBA1B85691A34BD36B2E160011
3,135,662 UART: [art] PUB.Y = 1BCC342EF6027CF1C38F3715C6259C6D66C4B68D7BD1E5CAC69CF09E8A97C1230A323D67CD3045EFB06683C26F3E51AB
3,142,620 UART: [art] SIG.R = 7D1F5A2E1024B053C81F84F887E29BA3D44529B4458B9F9C29E27501CDE2654FF3B2E441E6B2F189771476E956502FD3
3,149,385 UART: [art] SIG.S = 75FD2BFA137E27766BC09412B1B88DCE8E27036F18AEAAE06D9CF1867F870FDE493E7B195B4A1230839F60969C76BCFD
3,172,822 UART: Caliptra RT
3,173,167 UART: [state] CFI Enabled
3,280,122 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,670 UART: [rt]cmd =0x464d4352, len=4
3,317,954 >>> mbox cmd response data (524 bytes)
3,317,955 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,568 UART: [rt]cmd =0x43455252, len=4
3,358,287 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,626 ready_for_fw is high
1,061,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,838 >>> mbox cmd response: success
2,628,838 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,691,210 UART:
2,691,226 UART: Running Caliptra FMC ...
2,691,634 UART:
2,691,777 UART: [state] CFI Enabled
2,702,358 UART: [fht] FMC Alias Private Key: 7
2,810,399 UART: [art] Extend RT PCRs Done
2,810,827 UART: [art] Lock RT PCRs Done
2,812,087 UART: [art] Populate DV Done
2,820,214 UART: [fht] FMC Alias Private Key: 7
2,821,218 UART: [art] Derive CDI
2,821,498 UART: [art] Store in in slot 0x4
2,907,147 UART: [art] Derive Key Pair
2,907,507 UART: [art] Store priv key in slot 0x5
2,920,299 UART: [art] Derive Key Pair - Done
2,935,167 UART: [art] Signing Cert with AUTHO
2,935,647 UART: RITY.KEYID = 7
2,950,639 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,404 UART: [art] PUB.X = 8E3A9ADEA184A1FE1880A05D567BC892611E2F14CB428DF5696C8702F6E235C74A3C9297DABDA609CDBBF1F66F135070
2,958,180 UART: [art] PUB.Y = B2A7FD3659FC324D412EAD452EFC156761E0DE2E5B6652FF0148CA46404CCA184926C23F80428C3B1A799AE7804F1993
2,965,131 UART: [art] SIG.R = 4DE704D2F39AD0055B80479F2F17FF0B5D87CF88885F5DEF29C176296DEE491DDF4B25CDB4B09592F09157ACD0E5D13E
2,971,906 UART: [art] SIG.S = 2E00FE8631ECF0A76CF7D438119390EE3EE0B8431989A212EE87C94C3BA7CFA514D65C67FCEB67C30EF98A5927E4FFD9
2,996,918 UART: Caliptra RT
2,997,263 UART: [state] CFI Enabled
3,106,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,524 UART: [rt]cmd =0x464d4352, len=4
3,143,632 >>> mbox cmd response data (524 bytes)
3,143,633 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,960 UART: [rt]cmd =0x43455252, len=4
3,183,903 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
85,995 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
890,860 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,989 UART: [kat] ++
895,141 UART: [kat] sha1
899,409 UART: [kat] SHA2-256
901,349 UART: [kat] SHA2-384
904,196 UART: [kat] SHA2-512-ACC
906,097 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,284 UART: [kat] LMS
1,168,596 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,221 UART: [fht] FHT @ 0x50003400
1,172,713 UART: [idev] ++
1,172,881 UART: [idev] CDI.KEYID = 6
1,173,242 UART: [idev] SUBJECT.KEYID = 7
1,173,667 UART: [idev] UDS.KEYID = 0
1,174,013 ready_for_fw is high
1,174,013 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,199,029 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] --
1,208,936 UART: [ldev] ++
1,209,104 UART: [ldev] CDI.KEYID = 6
1,209,468 UART: [ldev] SUBJECT.KEYID = 5
1,209,895 UART: [ldev] AUTHORITY.KEYID = 7
1,210,358 UART: [ldev] FE.KEYID = 1
1,215,570 UART: [ldev] Erasing FE.KEYID = 1
1,241,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,300 UART: [ldev] --
1,280,790 UART: [fwproc] Wait for Commands...
1,281,575 UART: [fwproc] Recv command 0x46574c44
1,282,308 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,392 >>> mbox cmd response: success
2,774,392 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,775,521 UART: [afmc] ++
2,775,689 UART: [afmc] CDI.KEYID = 6
2,776,052 UART: [afmc] SUBJECT.KEYID = 7
2,776,478 UART: [afmc] AUTHORITY.KEYID = 5
2,811,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,546 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,275 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,158 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,877 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,636 UART: [afmc] --
2,854,636 UART: [cold-reset] --
2,855,520 UART: [state] Locking Datavault
2,856,617 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,221 UART: [state] Locking ICCM
2,857,803 UART: [exit] Launching FMC @ 0x40000130
2,863,132 UART:
2,863,148 UART: Running Caliptra FMC ...
2,863,556 UART:
2,863,610 UART: [state] CFI Enabled
2,874,633 UART: [fht] FMC Alias Private Key: 7
2,982,578 UART: [art] Extend RT PCRs Done
2,983,006 UART: [art] Lock RT PCRs Done
2,984,546 UART: [art] Populate DV Done
2,992,779 UART: [fht] FMC Alias Private Key: 7
2,993,865 UART: [art] Derive CDI
2,994,145 UART: [art] Store in in slot 0x4
3,079,846 UART: [art] Derive Key Pair
3,080,206 UART: [art] Store priv key in slot 0x5
3,093,524 UART: [art] Derive Key Pair - Done
3,108,481 UART: [art] Signing Cert with AUTHO
3,108,961 UART: RITY.KEYID = 7
3,123,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,726 UART: [art] PUB.X = 4AB76063F6F6983C4E5FA2ACFC12A49270FCBE5662C04CBA8C63973591E9F765852D615D12380C28726D5CC6F646E0CB
3,131,499 UART: [art] PUB.Y = 5FA749B380F17224B2BC8377CE86D82C0C3B4813E3A386FB809AE5B0171875638CF604E97E3EE873CBCD1533545BBABF
3,138,451 UART: [art] SIG.R = AA2E068CA16B94CE5A912269C8F7B9F18A9E1BC34BB39A427BC39559F18DE00CC58FEAA286530B58ACDADF181092FCC6
3,145,232 UART: [art] SIG.S = 3030A5CC843F09AF0F38FDE136F77CA96004D1AE9BA29437BBF0238C6B6096286585AFF1E2B8446E2A7AC629C04D57B3
3,169,410 UART: Caliptra RT
3,169,663 UART: [state] CFI Enabled
3,277,280 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,620 UART: [rt]cmd =0x464d4352, len=4
3,314,902 >>> mbox cmd response data (524 bytes)
3,314,903 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,258 UART: [rt]cmd =0x43455252, len=4
3,354,929 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,650 ready_for_fw is high
1,056,650 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,102 >>> mbox cmd response: success
2,625,102 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,687,038 UART:
2,687,054 UART: Running Caliptra FMC ...
2,687,462 UART:
2,687,516 UART: [state] CFI Enabled
2,698,117 UART: [fht] FMC Alias Private Key: 7
2,806,212 UART: [art] Extend RT PCRs Done
2,806,640 UART: [art] Lock RT PCRs Done
2,808,226 UART: [art] Populate DV Done
2,816,615 UART: [fht] FMC Alias Private Key: 7
2,817,613 UART: [art] Derive CDI
2,817,893 UART: [art] Store in in slot 0x4
2,903,736 UART: [art] Derive Key Pair
2,904,096 UART: [art] Store priv key in slot 0x5
2,917,030 UART: [art] Derive Key Pair - Done
2,931,678 UART: [art] Signing Cert with AUTHO
2,932,158 UART: RITY.KEYID = 7
2,947,340 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,105 UART: [art] PUB.X = 767FDCA46898850EFEB516BED3EF124FEE75F5B1D58E97B44023A5EF7556A2392E5BD1560982CDBBE231014F4B619942
2,954,874 UART: [art] PUB.Y = 1AED07EDA8FEE4D675DCDF8413C95E2178138BCB5ED61CDAFC7556E581883FAA96126EA19B671684FAC126D4F959D58B
2,961,839 UART: [art] SIG.R = 63E36AB34503F6097547B670E5DB630A4D85B99FF671DF5DC0A5A4E01A1FDDC04E9C64A559BB70EE2428414DFA8CC30F
2,968,611 UART: [art] SIG.S = 39EAF86C28DC03ABB87265B6EA581DC7103F9D67E90D7F86794FE760757F0FD5FF0B3A92F2554321691CF4503A511AD0
2,992,528 UART: Caliptra RT
2,992,781 UART: [state] CFI Enabled
3,100,120 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,560 UART: [rt]cmd =0x464d4352, len=4
3,137,682 >>> mbox cmd response data (524 bytes)
3,137,683 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,074 UART: [rt]cmd =0x43455252, len=4
3,177,845 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
915,895 UART: [kat] HMAC-384Kdf
920,337 UART: [kat] LMS
1,168,649 UART: [kat] --
1,169,422 UART: [cold-reset] ++
1,169,774 UART: [fht] FHT @ 0x50003400
1,172,502 UART: [idev] ++
1,172,670 UART: [idev] CDI.KEYID = 6
1,173,031 UART: [idev] SUBJECT.KEYID = 7
1,173,456 UART: [idev] UDS.KEYID = 0
1,173,802 ready_for_fw is high
1,173,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,640 UART: [idev] Erasing UDS.KEYID = 0
1,198,496 UART: [idev] Sha1 KeyId Algorithm
1,207,220 UART: [idev] --
1,208,065 UART: [ldev] ++
1,208,233 UART: [ldev] CDI.KEYID = 6
1,208,597 UART: [ldev] SUBJECT.KEYID = 5
1,209,024 UART: [ldev] AUTHORITY.KEYID = 7
1,209,487 UART: [ldev] FE.KEYID = 1
1,214,659 UART: [ldev] Erasing FE.KEYID = 1
1,241,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,993 UART: [ldev] --
1,281,297 UART: [fwproc] Wait for Commands...
1,281,978 UART: [fwproc] Recv command 0x46574c44
1,282,711 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,546 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,859 >>> mbox cmd response: success
2,773,859 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,774,996 UART: [afmc] ++
2,775,164 UART: [afmc] CDI.KEYID = 6
2,775,527 UART: [afmc] SUBJECT.KEYID = 7
2,775,953 UART: [afmc] AUTHORITY.KEYID = 5
2,812,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,253 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,982 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,865 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,321 UART: [afmc] --
2,855,269 UART: [cold-reset] --
2,855,889 UART: [state] Locking Datavault
2,856,940 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,544 UART: [state] Locking ICCM
2,857,982 UART: [exit] Launching FMC @ 0x40000130
2,863,311 UART:
2,863,327 UART: Running Caliptra FMC ...
2,863,735 UART:
2,863,878 UART: [state] CFI Enabled
2,874,509 UART: [fht] FMC Alias Private Key: 7
2,982,502 UART: [art] Extend RT PCRs Done
2,982,930 UART: [art] Lock RT PCRs Done
2,984,514 UART: [art] Populate DV Done
2,992,567 UART: [fht] FMC Alias Private Key: 7
2,993,699 UART: [art] Derive CDI
2,993,979 UART: [art] Store in in slot 0x4
3,079,628 UART: [art] Derive Key Pair
3,079,988 UART: [art] Store priv key in slot 0x5
3,093,284 UART: [art] Derive Key Pair - Done
3,108,349 UART: [art] Signing Cert with AUTHO
3,108,829 UART: RITY.KEYID = 7
3,123,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,638 UART: [art] PUB.X = 60E6B5C87AC8547CCB6E1A1DF93E5267102A4D4133686C209BBED39FB90DE889E59C751C84DC4A13FD756220AAF98420
3,131,413 UART: [art] PUB.Y = 3CF004CEE1174C5868FBF82F73EE30D806D25DF98D1816D7393E9EDFEDF1431C9F71A41C4C4F309B603AC0EF8A1D953C
3,138,373 UART: [art] SIG.R = 524B512E571F225AC86E52389D95EE45BB4149547FF44BB0E05271E7FD11DF5AAFED88135ECE81C56419B83861A63534
3,145,145 UART: [art] SIG.S = 074CFA973F5064A110FBBAAE15D7EA231353A7285999710AAF3857AA64FC65D241A8530C7FFDA49E8517F6CD0B30820A
3,169,647 UART: Caliptra RT
3,169,992 UART: [state] CFI Enabled
3,277,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,243 UART: [rt]cmd =0x464d4352, len=4
3,315,343 >>> mbox cmd response data (524 bytes)
3,315,344 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,783 UART: [rt]cmd =0x43455252, len=4
3,355,640 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,163 ready_for_fw is high
1,056,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,403 >>> mbox cmd response: success
2,625,403 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,688,427 UART:
2,688,443 UART: Running Caliptra FMC ...
2,688,851 UART:
2,688,994 UART: [state] CFI Enabled
2,699,647 UART: [fht] FMC Alias Private Key: 7
2,807,526 UART: [art] Extend RT PCRs Done
2,807,954 UART: [art] Lock RT PCRs Done
2,809,666 UART: [art] Populate DV Done
2,817,763 UART: [fht] FMC Alias Private Key: 7
2,818,941 UART: [art] Derive CDI
2,819,221 UART: [art] Store in in slot 0x4
2,905,214 UART: [art] Derive Key Pair
2,905,574 UART: [art] Store priv key in slot 0x5
2,919,014 UART: [art] Derive Key Pair - Done
2,933,834 UART: [art] Signing Cert with AUTHO
2,934,314 UART: RITY.KEYID = 7
2,949,180 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,945 UART: [art] PUB.X = 594E1D12A714AA7B69FF4A69CC62356E68D45DAFDB0A8DD83281E252035F94052FEA34A14D13304900B00ADAE0427665
2,956,685 UART: [art] PUB.Y = A6739A284CA8657A16E292593E8E167B9CD45F7CF04B52BB7C262715F2B4A8225AC1C0216ACD90DC26F1ACBAA509B80D
2,963,641 UART: [art] SIG.R = A074DEA4007069BFE000832AD1B2CD790EF8BAEB2BA26AA9E783501493B3E1873DDAC366C506BB39FEC3CE72EDF0C703
2,970,378 UART: [art] SIG.S = 4B1465F3A3C7B7A956680FAD1CB05C6CB26AF0B05FCF14ABFC55E850B85B83DEFCA5410EC417CBEF414F361F149BC289
2,994,017 UART: Caliptra RT
2,994,362 UART: [state] CFI Enabled
3,102,193 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,653 UART: [rt]cmd =0x464d4352, len=4
3,139,841 >>> mbox cmd response data (524 bytes)
3,139,842 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,267 UART: [rt]cmd =0x43455252, len=4
3,180,006 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,037 UART:
192,408 UART: Running Caliptra ROM ...
193,601 UART:
193,757 UART: [state] CFI Enabled
264,497 UART: [state] LifecycleState = Unprovisioned
266,395 UART: [state] DebugLocked = No
268,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,795 UART: [kat] SHA2-256
443,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,007 UART: [kat] ++
454,465 UART: [kat] sha1
465,409 UART: [kat] SHA2-256
468,068 UART: [kat] SHA2-384
474,844 UART: [kat] SHA2-512-ACC
477,164 UART: [kat] ECC-384
2,768,362 UART: [kat] HMAC-384Kdf
2,799,440 UART: [kat] LMS
3,989,795 UART: [kat] --
3,994,420 UART: [cold-reset] ++
3,996,714 UART: [fht] Storing FHT @ 0x50003400
4,007,131 UART: [idev] ++
4,007,700 UART: [idev] CDI.KEYID = 6
4,008,737 UART: [idev] SUBJECT.KEYID = 7
4,009,913 UART: [idev] UDS.KEYID = 0
4,034,107 UART: [idev] Erasing UDS.KEYID = 0
7,344,368 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,687 UART: [idev] CSR upload requested
7,371,896 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,679,374 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,693,997 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,708,569 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,722,969 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
9,745,890 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
9,869,860 UART: [idev] CSR uploaded
9,883,098 ready_for_fw is high
9,883,404 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,027,598 UART: [idev] --
10,028,298 UART: [ldev] ++
10,028,805 UART: [ldev] CDI.KEYID = 6
10,029,686 UART: [ldev] SUBJECT.KEYID = 5
10,030,750 UART: [ldev] AUTHORITY.KEYID = 7
10,031,936 UART: [ldev] FE.KEYID = 1
10,032,787 UART: [ldev] Erasing FE.KEYID = 1
13,271,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,585,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,600,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,615,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,629,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,648,600 UART: [ldev] --
15,653,324 UART: [fwproc] Waiting for Commands...
15,656,261 UART: [fwproc] Received command 0x46574c44
15,658,451 UART: [fwproc] Received Image of size 114124 bytes
19,706,667 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,781,265 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,850,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,166,887 >>> mbox cmd response: success
20,167,410 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,171,501 UART: [afmc] ++
20,172,092 UART: [afmc] CDI.KEYID = 6
20,173,011 UART: [afmc] SUBJECT.KEYID = 7
20,174,296 UART: [afmc] AUTHORITY.KEYID = 5
23,544,500 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,845,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,847,443 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,861,867 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,876,679 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,891,343 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,912,151 UART: [afmc] --
25,915,641 UART: [cold-reset] --
25,919,828 UART: [state] Locking Datavault
25,925,019 UART: [state] Locking PCR0, PCR1 and PCR31
25,926,724 UART: [state] Locking ICCM
25,928,366 UART: [exit] Launching FMC @ 0x40000130
25,936,760 UART:
25,936,993 UART: Running Caliptra FMC ...
25,938,094 UART:
25,938,256 UART: [state] CFI Enabled
26,005,174 UART: [fht] FMC Alias Private Key: 7
28,343,887 UART: [art] Extend RT PCRs Done
28,345,112 UART: [art] Lock RT PCRs Done
28,346,507 UART: [art] Populate DV Done
28,352,031 UART: [fht] FMC Alias Private Key: 7
28,353,681 UART: [art] Derive CDI
28,354,415 UART: [art] Store in in slot 0x4
28,414,249 UART: [art] Derive Key Pair
28,415,289 UART: [art] Store priv key in slot 0x5
31,708,262 UART: [art] Derive Key Pair - Done
31,721,369 UART: [art] Signing Cert with AUTHO
31,722,682 UART: RITY.KEYID = 7
34,010,144 UART: [art] Erasing AUTHORITY.KEYID = 7
34,011,689 UART: [art] PUB.X = 285C6DE97B6941B7E60CD2DB636BABADE7D4D2DCEC64062E2DA93B954137219CB65F5D067EEBF8C7D22B2217475C02E9
34,018,889 UART: [art] PUB.Y = 346648C9BDF3E8D71352B903DCDC11352EF013D572F9616F5367B122E170D33F3CD231C327B29D705220C51854890E33
34,026,124 UART: [art] SIG.R = 08971DC0E1F6A0F5C86B7CE607D3B1F8C19B55F713D1C959E1933927F58DCBD3C2C848E14A9383E6A60469BDDB05ED5C
34,033,460 UART: [art] SIG.S = 864DC0247AAFFEDAF448C44EE67F2A3189B1427B2D9EA0254A21A744ADD81DE27D5FB5801A6083946D5D2A3626C85D34
35,338,835 UART: Caliptra RT
35,339,552 UART: [state] CFI Enabled
35,500,066 UART: [rt] RT listening for mailbox commands...
35,531,267 UART: [rt]cmd =0x49444352, len=4
35,532,932 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
9,485,021 ready_for_fw is high
9,485,636 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,223,764 >>> mbox cmd response: success
20,224,354 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,915,869 UART:
25,916,237 UART: Running Caliptra FMC ...
25,917,445 UART:
25,917,610 UART: [state] CFI Enabled
25,983,083 UART: [fht] FMC Alias Private Key: 7
28,320,527 UART: [art] Extend RT PCRs Done
28,321,752 UART: [art] Lock RT PCRs Done
28,323,545 UART: [art] Populate DV Done
28,328,960 UART: [fht] FMC Alias Private Key: 7
28,330,448 UART: [art] Derive CDI
28,331,187 UART: [art] Store in in slot 0x4
28,391,128 UART: [art] Derive Key Pair
28,392,164 UART: [art] Store priv key in slot 0x5
31,684,921 UART: [art] Derive Key Pair - Done
31,697,988 UART: [art] Signing Cert with AUTHO
31,699,321 UART: RITY.KEYID = 7
33,985,785 UART: [art] Erasing AUTHORITY.KEYID = 7
33,987,294 UART: [art] PUB.X = 6A697B1115F9E5C2F633E79D8D359B67EC69DD7A75808BED3BF1F3E3244D7E6D680C199F58121825D65F59DF97BCBDA1
33,994,571 UART: [art] PUB.Y = 087B87186FB7B20D5DF887A71CEB16F5CFE66640831BB4CD14F76D5033FF773D46B682A99C96E3708166B93185838CE7
34,001,773 UART: [art] SIG.R = BEC128D6246A46DD61029CAB5F54C4318C4B70CD8CE4186AEE185F35F97ADE79A8998EC7867A8EEAFA1117AEDF2BDD84
34,009,205 UART: [art] SIG.S = 364BC3B69CE131A6C9E398C451EDFF33E84D12675DD3B8FFC81818C775D533C799F7191FE941FEEB6285A05351C4B4CB
35,313,597 UART: Caliptra RT
35,314,298 UART: [state] CFI Enabled
35,475,998 UART: [rt] RT listening for mailbox commands...
35,507,251 UART: [rt]cmd =0x49444352, len=4
35,508,809 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,362 UART:
192,724 UART: Running Caliptra ROM ...
193,815 UART:
603,446 UART: [state] CFI Enabled
616,001 UART: [state] LifecycleState = Unprovisioned
617,917 UART: [state] DebugLocked = No
620,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,889 UART: [kat] SHA2-256
795,635 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,223 UART: [kat] ++
806,750 UART: [kat] sha1
817,839 UART: [kat] SHA2-256
820,555 UART: [kat] SHA2-384
827,385 UART: [kat] SHA2-512-ACC
829,742 UART: [kat] ECC-384
3,113,064 UART: [kat] HMAC-384Kdf
3,123,920 UART: [kat] LMS
4,314,000 UART: [kat] --
4,318,163 UART: [cold-reset] ++
4,319,386 UART: [fht] Storing FHT @ 0x50003400
4,330,716 UART: [idev] ++
4,331,283 UART: [idev] CDI.KEYID = 6
4,332,202 UART: [idev] SUBJECT.KEYID = 7
4,333,442 UART: [idev] UDS.KEYID = 0
4,348,922 UART: [idev] Erasing UDS.KEYID = 0
7,619,046 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,957 UART: [idev] CSR upload requested
7,644,099 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,936,412 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,950,949 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,965,567 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,979,942 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,002,871 UART: [idev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
10,126,860 UART: [idev] CSR uploaded
10,140,079 ready_for_fw is high
10,140,420 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,283,716 UART: [idev] --
10,284,389 UART: [ldev] ++
10,284,883 UART: [ldev] CDI.KEYID = 6
10,285,764 UART: [ldev] SUBJECT.KEYID = 5
10,286,795 UART: [ldev] AUTHORITY.KEYID = 7
10,287,880 UART: [ldev] FE.KEYID = 1
10,288,803 UART: [ldev] Erasing FE.KEYID = 1
13,450,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,743,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,758,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,773,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,787,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,805,252 UART: [ldev] --
15,810,459 UART: [fwproc] Waiting for Commands...
15,813,013 UART: [fwproc] Received command 0x46574c44
15,815,198 UART: [fwproc] Received Image of size 114124 bytes
19,872,564 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,952,182 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,021,067 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,338,191 >>> mbox cmd response: success
20,338,691 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,343,261 UART: [afmc] ++
20,343,838 UART: [afmc] CDI.KEYID = 6
20,344,770 UART: [afmc] SUBJECT.KEYID = 7
20,346,032 UART: [afmc] AUTHORITY.KEYID = 5
23,660,744 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,953,542 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,955,850 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,970,262 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,985,046 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,999,496 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
26,020,758 UART: [afmc] --
26,024,992 UART: [cold-reset] --
26,030,468 UART: [state] Locking Datavault
26,037,123 UART: [state] Locking PCR0, PCR1 and PCR31
26,038,872 UART: [state] Locking ICCM
26,041,143 UART: [exit] Launching FMC @ 0x40000130
26,049,551 UART:
26,049,836 UART: Running Caliptra FMC ...
26,050,951 UART:
26,051,110 UART: [state] CFI Enabled
26,059,701 UART: [fht] FMC Alias Private Key: 7
28,390,110 UART: [art] Extend RT PCRs Done
28,391,322 UART: [art] Lock RT PCRs Done
28,392,914 UART: [art] Populate DV Done
28,398,424 UART: [fht] FMC Alias Private Key: 7
28,400,017 UART: [art] Derive CDI
28,400,758 UART: [art] Store in in slot 0x4
28,443,668 UART: [art] Derive Key Pair
28,444,666 UART: [art] Store priv key in slot 0x5
31,686,433 UART: [art] Derive Key Pair - Done
31,699,550 UART: [art] Signing Cert with AUTHO
31,700,871 UART: RITY.KEYID = 7
33,979,899 UART: [art] Erasing AUTHORITY.KEYID = 7
33,981,469 UART: [art] PUB.X = CA11AD2FCD974098A8380008B6B407C1C557DE8DB9DF5F52329E9C47960ACB14220CA6F1D43E81E5191A3687AA3DDC4D
33,988,651 UART: [art] PUB.Y = 3C96D9C539342EC4DA08496BBEC46AD7FAAC853F6F1344BC1FC66C7F5BF632213C53945F630CE2812413AD01BB749826
33,995,920 UART: [art] SIG.R = C463A05718A21ABACD5433180271389DD24642B109A92DAE86A0027366C40E4402472D353B28FEE65C5A2757C5D44D23
34,003,304 UART: [art] SIG.S = 168DF551EEA8053D5147275A8263EABD4794340099F1B2A0BE2BCB3ED76D34915F9E521898ABA179CD852C68FEDE9167
35,308,353 UART: Caliptra RT
35,309,046 UART: [state] CFI Enabled
35,427,015 UART: [rt] RT listening for mailbox commands...
35,458,396 UART: [rt]cmd =0x49444352, len=4
35,459,902 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
9,742,850 ready_for_fw is high
9,743,295 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,374,935 >>> mbox cmd response: success
20,376,087 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,014,888 UART:
26,015,279 UART: Running Caliptra FMC ...
26,016,390 UART:
26,016,542 UART: [state] CFI Enabled
26,024,437 UART: [fht] FMC Alias Private Key: 7
28,355,658 UART: [art] Extend RT PCRs Done
28,356,877 UART: [art] Lock RT PCRs Done
28,358,635 UART: [art] Populate DV Done
28,364,052 UART: [fht] FMC Alias Private Key: 7
28,365,590 UART: [art] Derive CDI
28,366,316 UART: [art] Store in in slot 0x4
28,408,958 UART: [art] Derive Key Pair
28,409,953 UART: [art] Store priv key in slot 0x5
31,651,975 UART: [art] Derive Key Pair - Done
31,664,976 UART: [art] Signing Cert with AUTHO
31,666,295 UART: RITY.KEYID = 7
33,945,989 UART: [art] Erasing AUTHORITY.KEYID = 7
33,947,495 UART: [art] PUB.X = C434BCEAC9165A53B2D5B8CE398B2D37C35F857D6C0C76A9BAD90F8F093FC4F2C7886AEEA205E3729B978E1C1577AD51
33,954,815 UART: [art] PUB.Y = 280B07D1EA8DE8F631DD44F489CD37EFBF6C0A9F14F267DA180356B1FDBF06FBB0A1D1DDB19C8E58EE5A33E7E9F6B35A
33,962,005 UART: [art] SIG.R = 36A944C5B9979677059A00D657373749B22BF115AF796FADC721CCD4DE8EE937746C130DA7E7E38D064CA8894E5F73F2
33,969,415 UART: [art] SIG.S = 6DED19F96B686EF50730CE9B57CE20B882C19B587EDA4C778962E35ED80B5438735339B840F1CC510D30EEB5F19006C6
35,274,577 UART: Caliptra RT
35,275,273 UART: [state] CFI Enabled
35,393,592 UART: [rt] RT listening for mailbox commands...
35,425,169 UART: [rt]cmd =0x49444352, len=4
35,426,937 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,018 UART:
192,382 UART: Running Caliptra ROM ...
193,565 UART:
193,714 UART: [state] CFI Enabled
264,652 UART: [state] LifecycleState = Unprovisioned
266,502 UART: [state] DebugLocked = No
267,822 UART: [state] WD Timer not started. Device not locked for debugging
270,709 UART: [kat] SHA2-256
449,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,407 UART: [kat] ++
461,938 UART: [kat] sha1
473,176 UART: [kat] SHA2-256
476,189 UART: [kat] SHA2-384
481,890 UART: [kat] SHA2-512-ACC
484,903 UART: [kat] ECC-384
2,948,754 UART: [kat] HMAC-384Kdf
2,972,143 UART: [kat] LMS
3,501,618 UART: [kat] --
3,506,036 UART: [cold-reset] ++
3,507,751 UART: [fht] FHT @ 0x50003400
3,518,510 UART: [idev] ++
3,519,070 UART: [idev] CDI.KEYID = 6
3,520,138 UART: [idev] SUBJECT.KEYID = 7
3,521,243 UART: [idev] UDS.KEYID = 0
3,542,839 UART: [idev] Erasing UDS.KEYID = 0
6,027,107 UART: [idev] Sha1 KeyId Algorithm
6,047,002 UART: [idev] CSR upload begun
6,051,729 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,781,484 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,797,605 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,813,579 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,829,401 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,853,213 UART: [idev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
7,995,359 UART: [idev] CSR uploaded
8,011,419 ready_for_fw is high
8,011,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,155,847 UART: [idev] --
8,156,486 UART: [ldev] ++
8,156,984 UART: [ldev] CDI.KEYID = 6
8,157,895 UART: [ldev] SUBJECT.KEYID = 5
8,158,957 UART: [ldev] AUTHORITY.KEYID = 7
8,160,056 UART: [ldev] FE.KEYID = 1
8,160,894 UART: [ldev] Erasing FE.KEYID = 1
10,563,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,282,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,298,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,314,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,330,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,351,915 UART: [ldev] --
12,356,814 UART: [fwproc] Wait for Commands...
12,359,556 UART: [fwproc] Recv command 0x46574c44
12,361,592 UART: [fwproc] Recv'd Img size: 114448 bytes
15,765,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,840,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,909,330 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,227,056 >>> mbox cmd response: success
16,227,535 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,231,297 UART: [afmc] ++
16,231,914 UART: [afmc] CDI.KEYID = 6
16,232,827 UART: [afmc] SUBJECT.KEYID = 7
16,234,012 UART: [afmc] AUTHORITY.KEYID = 5
18,767,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,492,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,494,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,510,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,526,687 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,542,541 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,565,039 UART: [afmc] --
20,569,169 UART: [cold-reset] --
20,572,000 UART: [state] Locking Datavault
20,578,020 UART: [state] Locking PCR0, PCR1 and PCR31
20,579,759 UART: [state] Locking ICCM
20,580,753 UART: [exit] Launching FMC @ 0x40000130
20,589,148 UART:
20,589,386 UART: Running Caliptra FMC ...
20,590,488 UART:
20,590,665 UART: [state] CFI Enabled
20,651,054 UART: [fht] FMC Alias Private Key: 7
22,415,008 UART: [art] Extend RT PCRs Done
22,416,230 UART: [art] Lock RT PCRs Done
22,417,882 UART: [art] Populate DV Done
22,423,500 UART: [fht] FMC Alias Private Key: 7
22,425,246 UART: [art] Derive CDI
22,425,980 UART: [art] Store in in slot 0x4
22,483,371 UART: [art] Derive Key Pair
22,484,368 UART: [art] Store priv key in slot 0x5
24,946,823 UART: [art] Derive Key Pair - Done
24,959,989 UART: [art] Signing Cert with AUTHO
24,961,297 UART: RITY.KEYID = 7
26,671,702 UART: [art] Erasing AUTHORITY.KEYID = 7
26,673,203 UART: [art] PUB.X = FD0DDF8A01B6FD234B8BAEF85A5EF0FA68F5021DEA7187CA160D7CBCE0D429E9ACD2E2174219D019AB9DC422B6729E6E
26,680,571 UART: [art] PUB.Y = 2794636F9B771F1448403B5BD8A112545FB9F907984F1F982706E409E31D52D46E9D6AAFB05FDFD95115BE89881CD656
26,687,782 UART: [art] SIG.R = F2F2D91DE9064264FBBB86EECCEF355E0E241F7785954E9F2B8628587F36614F25805812EDB41DA8DF35F601D17FEA9D
26,695,178 UART: [art] SIG.S = 6C17D07F55E0CCF579EB74F47863C6784C0E9EFA32CE24889721C8B94B88DBD5048FCBD8569E2CA18502144EBF084FB9
27,673,588 UART: Caliptra RT
27,674,296 UART: [state] CFI Enabled
27,839,306 UART: [rt] RT listening for mailbox commands...
27,870,548 UART: [rt]cmd =0x49444352, len=4
27,877,932 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
7,662,690 ready_for_fw is high
7,663,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,797,780 >>> mbox cmd response: success
15,798,326 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,112,803 UART:
20,113,174 UART: Running Caliptra FMC ...
20,114,382 UART:
20,114,547 UART: [state] CFI Enabled
20,182,739 UART: [fht] FMC Alias Private Key: 7
21,946,905 UART: [art] Extend RT PCRs Done
21,948,127 UART: [art] Lock RT PCRs Done
21,949,593 UART: [art] Populate DV Done
21,954,954 UART: [fht] FMC Alias Private Key: 7
21,956,654 UART: [art] Derive CDI
21,957,466 UART: [art] Store in in slot 0x4
22,015,583 UART: [art] Derive Key Pair
22,016,654 UART: [art] Store priv key in slot 0x5
24,479,960 UART: [art] Derive Key Pair - Done
24,492,900 UART: [art] Signing Cert with AUTHO
24,494,204 UART: RITY.KEYID = 7
26,205,545 UART: [art] Erasing AUTHORITY.KEYID = 7
26,207,047 UART: [art] PUB.X = 712AD3F7013940DF6D4EAA086AE4F7E99C4A8DF9618845179AF95214BBD6E24FB125475AF2A4222FCB29734AAF980CCC
26,214,349 UART: [art] PUB.Y = 81985FB7966580B6AEBCE07DC50E8CE2B10E242D8AA01E6E07B1A25405492CB8A208DADDF9A2DCDE94FCE5C15B706E7C
26,221,647 UART: [art] SIG.R = 6ECA2FFA59BCC828F16A01B077ED958EF12C102E3810402A176E0A9CE4D4C1F85E10F7D7DDB790374DA5C23ED65A845E
26,229,046 UART: [art] SIG.S = 4900D75B1B5D98DAC489C247E2A563885C3C8F131FC86838D18570EAFF9AEA3EFE985694C563FD0A5884FFF2AEDD584A
27,207,962 UART: Caliptra RT
27,208,694 UART: [state] CFI Enabled
27,372,866 UART: [rt] RT listening for mailbox commands...
27,404,033 UART: [rt]cmd =0x49444352, len=4
27,411,645 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,523 UART:
192,908 UART: Running Caliptra ROM ...
194,115 UART:
603,829 UART: [state] CFI Enabled
617,236 UART: [state] LifecycleState = Unprovisioned
619,146 UART: [state] DebugLocked = No
621,249 UART: [state] WD Timer not started. Device not locked for debugging
625,565 UART: [kat] SHA2-256
804,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,258 UART: [kat] ++
816,784 UART: [kat] sha1
827,374 UART: [kat] SHA2-256
830,367 UART: [kat] SHA2-384
835,493 UART: [kat] SHA2-512-ACC
838,429 UART: [kat] ECC-384
3,281,509 UART: [kat] HMAC-384Kdf
3,293,571 UART: [kat] LMS
3,823,109 UART: [kat] --
3,828,682 UART: [cold-reset] ++
3,829,685 UART: [fht] FHT @ 0x50003400
3,840,156 UART: [idev] ++
3,840,713 UART: [idev] CDI.KEYID = 6
3,841,740 UART: [idev] SUBJECT.KEYID = 7
3,842,839 UART: [idev] UDS.KEYID = 0
3,859,905 UART: [idev] Erasing UDS.KEYID = 0
6,316,510 UART: [idev] Sha1 KeyId Algorithm
6,336,693 UART: [idev] CSR upload begun
6,341,406 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,058,998 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,075,041 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,091,018 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,106,835 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,130,652 UART: [idev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
8,272,852 UART: [idev] CSR uploaded
8,288,925 ready_for_fw is high
8,289,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
8,433,111 UART: [idev] --
8,433,750 UART: [ldev] ++
8,434,240 UART: [ldev] CDI.KEYID = 6
8,435,111 UART: [ldev] SUBJECT.KEYID = 5
8,436,242 UART: [ldev] AUTHORITY.KEYID = 7
8,437,416 UART: [ldev] FE.KEYID = 1
8,438,291 UART: [ldev] Erasing FE.KEYID = 1
10,776,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,493,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,509,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,525,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,541,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,562,369 UART: [ldev] --
12,566,927 UART: [fwproc] Wait for Commands...
12,568,874 UART: [fwproc] Recv command 0x46574c44
12,570,962 UART: [fwproc] Recv'd Img size: 114448 bytes
15,970,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,043,187 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,112,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,430,979 >>> mbox cmd response: success
16,431,464 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,435,212 UART: [afmc] ++
16,435,790 UART: [afmc] CDI.KEYID = 6
16,436,691 UART: [afmc] SUBJECT.KEYID = 7
16,437,900 UART: [afmc] AUTHORITY.KEYID = 5
18,934,809 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,656,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,658,626 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,674,550 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,690,564 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,706,439 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,728,564 UART: [afmc] --
20,732,903 UART: [cold-reset] --
20,737,779 UART: [state] Locking Datavault
20,742,917 UART: [state] Locking PCR0, PCR1 and PCR31
20,744,554 UART: [state] Locking ICCM
20,745,833 UART: [exit] Launching FMC @ 0x40000130
20,754,272 UART:
20,754,501 UART: Running Caliptra FMC ...
20,755,592 UART:
20,755,743 UART: [state] CFI Enabled
20,764,049 UART: [fht] FMC Alias Private Key: 7
22,520,645 UART: [art] Extend RT PCRs Done
22,521,856 UART: [art] Lock RT PCRs Done
22,523,633 UART: [art] Populate DV Done
22,529,198 UART: [fht] FMC Alias Private Key: 7
22,530,794 UART: [art] Derive CDI
22,531,538 UART: [art] Store in in slot 0x4
22,574,015 UART: [art] Derive Key Pair
22,575,010 UART: [art] Store priv key in slot 0x5
25,001,840 UART: [art] Derive Key Pair - Done
25,015,220 UART: [art] Signing Cert with AUTHO
25,016,555 UART: RITY.KEYID = 7
26,722,156 UART: [art] Erasing AUTHORITY.KEYID = 7
26,723,654 UART: [art] PUB.X = 8A8D261EF675BC9871797977C8E036EC7F3ECD50AF24250F11F4F1C74C12FC69B3DFABBF3CFF2ADD7E168E202B2E3A56
26,730,925 UART: [art] PUB.Y = 71B6A4FAD27F83B01CD185E8AF9C51A98FB6543910B66D26A7353A60F26553EBAF091439B19B8C3AA7B7E1064905EAEF
26,738,218 UART: [art] SIG.R = 26DAF633FE9BA1C881AA1C7C85F8AA4EA6F5E0B402AC1AE897FD29256FD3676D2EC9D061F356CFB841765153A4C95772
26,745,614 UART: [art] SIG.S = 55C29F67E3AC9FDAE552F6A984AB8B47762B382A1DEBC7D8CBA217AC837EAE230F88A77348C4FBA1CD5200F4BCC6F39C
27,724,960 UART: Caliptra RT
27,725,677 UART: [state] CFI Enabled
27,843,672 UART: [rt] RT listening for mailbox commands...
27,875,087 UART: [rt]cmd =0x49444352, len=4
27,882,842 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
7,934,340 ready_for_fw is high
7,934,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,010,829 >>> mbox cmd response: success
16,011,428 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,262,899 UART:
20,263,296 UART: Running Caliptra FMC ...
20,264,390 UART:
20,264,537 UART: [state] CFI Enabled
20,272,382 UART: [fht] FMC Alias Private Key: 7
22,029,357 UART: [art] Extend RT PCRs Done
22,030,568 UART: [art] Lock RT PCRs Done
22,032,220 UART: [art] Populate DV Done
22,037,568 UART: [fht] FMC Alias Private Key: 7
22,039,109 UART: [art] Derive CDI
22,039,922 UART: [art] Store in in slot 0x4
22,082,408 UART: [art] Derive Key Pair
22,083,452 UART: [art] Store priv key in slot 0x5
24,510,465 UART: [art] Derive Key Pair - Done
24,523,412 UART: [art] Signing Cert with AUTHO
24,524,744 UART: RITY.KEYID = 7
26,230,054 UART: [art] Erasing AUTHORITY.KEYID = 7
26,231,549 UART: [art] PUB.X = 3E68B7CE53E900452A8252BE6A91A87B2A339D5BA07CBB31A527D8F3E8A71AA982808DC35933ECD465187AFA20DA1B4C
26,238,794 UART: [art] PUB.Y = B33D32DF469B16B7CC2D888935D7A3E2DC2C388DE308046400F8003CC6BDFAFEA6D7AB744B7E196B5433B119FB9E4959
26,246,044 UART: [art] SIG.R = 17463BE0F08DD59DD5AACC7F090CD3BBAAB30E08034EA06B7426FE932953DBB0FB729BED7FA3AF406187492C328D9EB3
26,253,434 UART: [art] SIG.S = C873C39C85E56A824350715B60D8DF5C1A7EACC4015129A51ECCFE242189DBDE9943E0907F0BC40AB658E6BF43DA93B5
27,232,274 UART: Caliptra RT
27,232,985 UART: [state] CFI Enabled
27,349,948 UART: [rt] RT listening for mailbox commands...
27,381,209 UART: [rt]cmd =0x49444352, len=4
27,388,449 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
7,694,913 ready_for_fw is high
7,695,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,495,406 >>> mbox cmd response: success
16,496,022 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,777,448 UART:
20,777,832 UART: Running Caliptra FMC ...
20,778,964 UART:
20,779,121 UART: [state] CFI Enabled
20,846,917 UART: [fht] FMC Alias Private Key: 7
22,611,038 UART: [art] Extend RT PCRs Done
22,612,264 UART: [art] Lock RT PCRs Done
22,613,949 UART: [art] Populate DV Done
22,619,355 UART: [fht] FMC Alias Private Key: 7
22,620,847 UART: [art] Derive CDI
22,621,666 UART: [art] Store in in slot 0x4
22,679,578 UART: [art] Derive Key Pair
22,680,618 UART: [art] Store priv key in slot 0x5
25,143,248 UART: [art] Derive Key Pair - Done
25,156,410 UART: [art] Signing Cert with AUTHO
25,157,713 UART: RITY.KEYID = 7
26,869,782 UART: [art] Erasing AUTHORITY.KEYID = 7
26,871,278 UART: [art] PUB.X = 46FEBFF614092384AC4F6AE01ACD101C75A62AD37EA2C23FC1573DCF2C06DD8743E7E26539FBE753210F58E0A053D844
26,878,524 UART: [art] PUB.Y = E9AB06821496FCF8445198FF7740B73588062B22B3548553F198D4CB4B2A0AAE2D7F7C5231BFD9EA5C87211A9F3789C4
26,885,773 UART: [art] SIG.R = C218523B78C113EFF6B714BB4A055201E2EDF5C9EA02EB7A5A9AB36D11EDBE07516BA9668B4FD06890EFE69D77425041
26,893,157 UART: [art] SIG.S = C23C8402667CBF8FF1F8FBD4B6F710346C790B7379B2D4D59C89E968287020F643C2434D84508256FFB0849EABC50C8A
27,872,021 UART: Caliptra RT
27,872,725 UART: [state] CFI Enabled
28,037,880 UART: [rt] RT listening for mailbox commands...
28,069,230 UART: [rt]cmd =0x49444352, len=4
28,071,351 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
7,984,256 ready_for_fw is high
7,984,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,694,222 >>> mbox cmd response: success
16,694,784 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,943,369 UART:
20,943,756 UART: Running Caliptra FMC ...
20,944,881 UART:
20,945,029 UART: [state] CFI Enabled
20,952,868 UART: [fht] FMC Alias Private Key: 7
22,709,947 UART: [art] Extend RT PCRs Done
22,711,169 UART: [art] Lock RT PCRs Done
22,713,013 UART: [art] Populate DV Done
22,718,246 UART: [fht] FMC Alias Private Key: 7
22,719,962 UART: [art] Derive CDI
22,720,794 UART: [art] Store in in slot 0x4
22,763,599 UART: [art] Derive Key Pair
22,764,597 UART: [art] Store priv key in slot 0x5
25,190,690 UART: [art] Derive Key Pair - Done
25,203,261 UART: [art] Signing Cert with AUTHO
25,204,602 UART: RITY.KEYID = 7
26,910,061 UART: [art] Erasing AUTHORITY.KEYID = 7
26,911,574 UART: [art] PUB.X = DEC63CD62D79F712972145471700E7D9EC04D110D0EE8866AAF75D3DFC57B4C53954D24ACE12AA6AD93EC75A5F2F50E1
26,918,823 UART: [art] PUB.Y = FCAF03FE32350D5099372EDC8EB252CFC11EDA31BFFB12989B33E036EC8261F8625B3140C56D5447D0C1B59AD6433184
26,926,076 UART: [art] SIG.R = 270CAB2C561FC3997DE8A2341AD4B354ACA8081E68D9BF894175197D327A1DF9BA1D57CF1480221E9FEE96B961B851AE
26,933,467 UART: [art] SIG.S = 9615D52D78431C13486EA059BEF3B6D45B2B6CF2D1BD0881FBAD4FA1B73EA1DAF4C77161CC0A635B8C24E95B7D45D478
27,912,262 UART: Caliptra RT
27,912,960 UART: [state] CFI Enabled
28,030,247 UART: [rt] RT listening for mailbox commands...
28,061,825 UART: [rt]cmd =0x49444352, len=4
28,063,485 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,207 UART: [kat] SHA2-256
882,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,253 UART: [kat] ++
886,405 UART: [kat] sha1
890,547 UART: [kat] SHA2-256
892,485 UART: [kat] SHA2-384
895,260 UART: [kat] SHA2-512-ACC
897,161 UART: [kat] ECC-384
902,878 UART: [kat] HMAC-384Kdf
907,520 UART: [kat] LMS
1,475,716 UART: [kat] --
1,476,795 UART: [cold-reset] ++
1,477,137 UART: [fht] Storing FHT @ 0x50003400
1,479,946 UART: [idev] ++
1,480,114 UART: [idev] CDI.KEYID = 6
1,480,474 UART: [idev] SUBJECT.KEYID = 7
1,480,898 UART: [idev] UDS.KEYID = 0
1,488,676 UART: [idev] Erasing UDS.KEYID = 0
1,505,596 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,071 UART: [idev] CSR upload requested
1,515,917 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,527,140 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,847 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,729 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,544,434 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,854 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,603,002 UART: [idev] CSR uploaded
1,605,383 ready_for_fw is high
1,605,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,605,554 UART: [idev] --
1,606,759 UART: [ldev] ++
1,606,927 UART: [ldev] CDI.KEYID = 6
1,607,290 UART: [ldev] SUBJECT.KEYID = 5
1,607,716 UART: [ldev] AUTHORITY.KEYID = 7
1,608,179 UART: [ldev] FE.KEYID = 1
1,613,235 UART: [ldev] Erasing FE.KEYID = 1
1,638,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,651,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,657,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,663,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,669,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,676,248 UART: [ldev] --
1,677,649 UART: [fwproc] Waiting for Commands...
1,678,464 UART: [fwproc] Received command 0x46574c44
1,679,255 UART: [fwproc] Received Image of size 114448 bytes
2,978,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,005,512 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,034,864 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,170,985 >>> mbox cmd response: success
3,170,985 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,172,063 UART: [afmc] ++
3,172,231 UART: [afmc] CDI.KEYID = 6
3,172,593 UART: [afmc] SUBJECT.KEYID = 7
3,173,018 UART: [afmc] AUTHORITY.KEYID = 5
3,208,249 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,224,295 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,225,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,230,803 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,236,688 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,242,378 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,250,383 UART: [afmc] --
3,251,397 UART: [cold-reset] --
3,252,175 UART: [state] Locking Datavault
3,253,160 UART: [state] Locking PCR0, PCR1 and PCR31
3,253,764 UART: [state] Locking ICCM
3,254,432 UART: [exit] Launching FMC @ 0x40000130
3,259,761 UART:
3,259,777 UART: Running Caliptra FMC ...
3,260,185 UART:
3,260,239 UART: [state] CFI Enabled
3,270,612 UART: [fht] FMC Alias Private Key: 7
3,379,331 UART: [art] Extend RT PCRs Done
3,379,759 UART: [art] Lock RT PCRs Done
3,381,039 UART: [art] Populate DV Done
3,389,166 UART: [fht] FMC Alias Private Key: 7
3,390,348 UART: [art] Derive CDI
3,390,628 UART: [art] Store in in slot 0x4
3,476,267 UART: [art] Derive Key Pair
3,476,627 UART: [art] Store priv key in slot 0x5
3,489,343 UART: [art] Derive Key Pair - Done
3,504,235 UART: [art] Signing Cert with AUTHO
3,504,715 UART: RITY.KEYID = 7
3,519,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,520,682 UART: [art] PUB.X = C27CF7CB2EE38ED28E7EE7CF1C90047E586D587FA086FE7BB7E105FCCB4B3E3AEF76A174E60940EAD7627B39359A82DA
3,527,465 UART: [art] PUB.Y = 0B9E859AE37A5C60FB97A7D17FFC5505E3ACF9DFDDA271B28DA37CD8740F65B297655E6E368BFCCFC6189C34CED50C16
3,534,425 UART: [art] SIG.R = 40DD713459B185765182A5BB22F63A59CC169FBE38D1C22E3134E17669C6012CCC5CAF68D9D697728927DC545277EDDB
3,541,194 UART: [art] SIG.S = 553825DBD639EC8FA8EC485A52AA66D5D727FB9111587CFDC3EC4B984EB9BFA0C3D8C383A1CFFB64CC459156D0498020
3,564,925 UART: Caliptra RT
3,565,178 UART: [state] CFI Enabled
3,672,736 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,916 UART: [rt]cmd =0x49444352, len=4
3,704,304 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,410,696 ready_for_fw is high
1,410,696 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,946,252 >>> mbox cmd response: success
2,946,252 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,007,942 UART:
3,007,958 UART: Running Caliptra FMC ...
3,008,366 UART:
3,008,420 UART: [state] CFI Enabled
3,018,853 UART: [fht] FMC Alias Private Key: 7
3,126,426 UART: [art] Extend RT PCRs Done
3,126,854 UART: [art] Lock RT PCRs Done
3,128,486 UART: [art] Populate DV Done
3,136,691 UART: [fht] FMC Alias Private Key: 7
3,137,773 UART: [art] Derive CDI
3,138,053 UART: [art] Store in in slot 0x4
3,223,856 UART: [art] Derive Key Pair
3,224,216 UART: [art] Store priv key in slot 0x5
3,237,022 UART: [art] Derive Key Pair - Done
3,251,600 UART: [art] Signing Cert with AUTHO
3,252,080 UART: RITY.KEYID = 7
3,267,314 UART: [art] Erasing AUTHORITY.KEYID = 7
3,268,079 UART: [art] PUB.X = 9CD5A90947AE9588A960B4F5C0B08E26D00389EBCC5E294B18EE09AA0A3BA513FD0B99CD1DB0404AE6C0DBC2F55E7F4F
3,274,856 UART: [art] PUB.Y = CB2B7B3C7C7D0EDA65A81EEF82D98A4160D9F30F15453CB176702B14415426477BEFB0DCE6580D491AD4FB95BC9D0BDF
3,281,812 UART: [art] SIG.R = 450928FEF2DA5E4E5F64A0277A1FFB63F6D8B4F604A078C70218EBC0B4037CEC86010736EF4C06FFD6A1122A7AC70E61
3,288,570 UART: [art] SIG.S = CE4CA20237CF90377281818A9EC8CB157A9044DABA385191EFC93AC57BA609468439F11E777A3CCAD4F5A3A3A060A170
3,311,687 UART: Caliptra RT
3,311,940 UART: [state] CFI Enabled
3,419,837 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,225 UART: [rt]cmd =0x49444352, len=4
3,451,985 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,284 UART: [kat] SHA2-256
882,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,330 UART: [kat] ++
886,482 UART: [kat] sha1
890,712 UART: [kat] SHA2-256
892,650 UART: [kat] SHA2-384
895,553 UART: [kat] SHA2-512-ACC
897,454 UART: [kat] ECC-384
902,843 UART: [kat] HMAC-384Kdf
907,591 UART: [kat] LMS
1,475,787 UART: [kat] --
1,476,528 UART: [cold-reset] ++
1,476,884 UART: [fht] Storing FHT @ 0x50003400
1,479,751 UART: [idev] ++
1,479,919 UART: [idev] CDI.KEYID = 6
1,480,279 UART: [idev] SUBJECT.KEYID = 7
1,480,703 UART: [idev] UDS.KEYID = 0
1,488,535 UART: [idev] Erasing UDS.KEYID = 0
1,505,729 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,250 UART: [idev] CSR upload requested
1,516,096 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,527,083 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,790 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,672 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,544,377 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,797 UART: [idev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
1,602,945 UART: [idev] CSR uploaded
1,605,326 ready_for_fw is high
1,605,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,605,497 UART: [idev] --
1,606,686 UART: [ldev] ++
1,606,854 UART: [ldev] CDI.KEYID = 6
1,607,217 UART: [ldev] SUBJECT.KEYID = 5
1,607,643 UART: [ldev] AUTHORITY.KEYID = 7
1,608,106 UART: [ldev] FE.KEYID = 1
1,613,166 UART: [ldev] Erasing FE.KEYID = 1
1,639,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,652,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,658,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,664,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,669,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,677,047 UART: [ldev] --
1,678,366 UART: [fwproc] Waiting for Commands...
1,679,123 UART: [fwproc] Received command 0x46574c44
1,679,914 UART: [fwproc] Received Image of size 114448 bytes
2,978,787 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,006,435 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,035,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,171,900 >>> mbox cmd response: success
3,171,900 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,173,058 UART: [afmc] ++
3,173,226 UART: [afmc] CDI.KEYID = 6
3,173,588 UART: [afmc] SUBJECT.KEYID = 7
3,174,013 UART: [afmc] AUTHORITY.KEYID = 5
3,208,596 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,224,774 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,225,554 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,231,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,237,167 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,242,857 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,250,772 UART: [afmc] --
3,251,706 UART: [cold-reset] --
3,252,720 UART: [state] Locking Datavault
3,253,843 UART: [state] Locking PCR0, PCR1 and PCR31
3,254,447 UART: [state] Locking ICCM
3,255,011 UART: [exit] Launching FMC @ 0x40000130
3,260,340 UART:
3,260,356 UART: Running Caliptra FMC ...
3,260,764 UART:
3,260,907 UART: [state] CFI Enabled
3,271,592 UART: [fht] FMC Alias Private Key: 7
3,379,483 UART: [art] Extend RT PCRs Done
3,379,911 UART: [art] Lock RT PCRs Done
3,381,765 UART: [art] Populate DV Done
3,390,150 UART: [fht] FMC Alias Private Key: 7
3,391,262 UART: [art] Derive CDI
3,391,542 UART: [art] Store in in slot 0x4
3,477,153 UART: [art] Derive Key Pair
3,477,513 UART: [art] Store priv key in slot 0x5
3,491,627 UART: [art] Derive Key Pair - Done
3,506,287 UART: [art] Signing Cert with AUTHO
3,506,767 UART: RITY.KEYID = 7
3,521,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,522,758 UART: [art] PUB.X = 11978763E964F45ECA6B55B49F85685F5A76C9C42EBBFCF81929938E8D053125380D5AADFB05522622B4BFCD417FE3C5
3,529,525 UART: [art] PUB.Y = FD559F8FBBA4AD60C621D3222F3206AC7079535B0191CE8AD6BE597C7D0DD0D96306E3F203852326002E8617B929885D
3,536,438 UART: [art] SIG.R = 3E93B63D841A502E1EA4486E50E084D81F0BBAA6CF685427C9B5AAF376C83D94D524AE2FD4EE228BF41595DD88E7551A
3,543,217 UART: [art] SIG.S = C649B3A914B7341332DDD0082FAD9CE077994113EF651F8167E3B537C7155E1C05D0D65DED72AB886EF65AF43C608BAC
3,566,412 UART: Caliptra RT
3,566,757 UART: [state] CFI Enabled
3,674,548 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,734 UART: [rt]cmd =0x49444352, len=4
3,706,034 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,411,973 ready_for_fw is high
1,411,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,946,173 >>> mbox cmd response: success
2,946,173 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,007,837 UART:
3,007,853 UART: Running Caliptra FMC ...
3,008,261 UART:
3,008,404 UART: [state] CFI Enabled
3,018,863 UART: [fht] FMC Alias Private Key: 7
3,126,458 UART: [art] Extend RT PCRs Done
3,126,886 UART: [art] Lock RT PCRs Done
3,128,386 UART: [art] Populate DV Done
3,136,769 UART: [fht] FMC Alias Private Key: 7
3,137,797 UART: [art] Derive CDI
3,138,077 UART: [art] Store in in slot 0x4
3,223,760 UART: [art] Derive Key Pair
3,224,120 UART: [art] Store priv key in slot 0x5
3,237,844 UART: [art] Derive Key Pair - Done
3,252,460 UART: [art] Signing Cert with AUTHO
3,252,940 UART: RITY.KEYID = 7
3,268,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,269,241 UART: [art] PUB.X = 888FBD3F095E55DBF58A4EAD1E4B7C02628B1C21F9341F690DF932D18B0FA8AA1A9C29413C73B28177A8BF2C59EC23A3
3,276,013 UART: [art] PUB.Y = 200E6BE1A51D3231A13EDA198A56E5194FA1D8B14E80BD1FE6CAADBE7356082DB81830E304F0673314D415B1F93320F1
3,282,960 UART: [art] SIG.R = F5B11A5581C0A70F8DAAB3416F372464A9A96158AAA3B94495A9539546643CA3FB5FEE6BB44BCD9A5F3504174B1679B7
3,289,730 UART: [art] SIG.S = DB35E37F5F57D4B41DD232C42F1B9F5F6F206B475E455F3E4F62B75CF3EC391B875307DBD89CF4072F84457C12F7C6CA
3,313,337 UART: Caliptra RT
3,313,682 UART: [state] CFI Enabled
3,422,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,564 UART: [rt]cmd =0x49444352, len=4
3,454,332 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,803 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [kat] SHA2-256
893,632 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,757 UART: [kat] ++
897,909 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,764 UART: [kat] SHA2-512-ACC
908,665 UART: [kat] ECC-384
918,158 UART: [kat] HMAC-384Kdf
922,734 UART: [kat] LMS
1,171,062 UART: [kat] --
1,171,987 UART: [cold-reset] ++
1,172,401 UART: [fht] FHT @ 0x50003400
1,174,840 UART: [idev] ++
1,175,008 UART: [idev] CDI.KEYID = 6
1,175,368 UART: [idev] SUBJECT.KEYID = 7
1,175,792 UART: [idev] UDS.KEYID = 0
1,183,830 UART: [idev] Erasing UDS.KEYID = 0
1,201,143 UART: [idev] Sha1 KeyId Algorithm
1,209,499 UART: [idev] CSR upload begun
1,211,280 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,130 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,837 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,719 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,424 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,844 UART: [idev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
1,297,992 UART: [idev] CSR uploaded
1,300,371 ready_for_fw is high
1,300,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,542 UART: [idev] --
1,301,530 UART: [ldev] ++
1,301,698 UART: [ldev] CDI.KEYID = 6
1,302,061 UART: [ldev] SUBJECT.KEYID = 5
1,302,487 UART: [ldev] AUTHORITY.KEYID = 7
1,302,950 UART: [ldev] FE.KEYID = 1
1,308,296 UART: [ldev] Erasing FE.KEYID = 1
1,334,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,630 UART: [ldev] --
1,374,087 UART: [fwproc] Wait for Commands...
1,374,769 UART: [fwproc] Recv command 0x46574c44
1,375,497 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,170 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,247 >>> mbox cmd response: success
2,866,247 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,867,457 UART: [afmc] ++
2,867,625 UART: [afmc] CDI.KEYID = 6
2,867,987 UART: [afmc] SUBJECT.KEYID = 7
2,868,412 UART: [afmc] AUTHORITY.KEYID = 5
2,904,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,426 UART: [afmc] --
2,947,372 UART: [cold-reset] --
2,948,446 UART: [state] Locking Datavault
2,949,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,113 UART: [state] Locking ICCM
2,950,695 UART: [exit] Launching FMC @ 0x40000130
2,956,024 UART:
2,956,040 UART: Running Caliptra FMC ...
2,956,448 UART:
2,956,502 UART: [state] CFI Enabled
2,967,083 UART: [fht] FMC Alias Private Key: 7
3,075,782 UART: [art] Extend RT PCRs Done
3,076,210 UART: [art] Lock RT PCRs Done
3,077,822 UART: [art] Populate DV Done
3,085,963 UART: [fht] FMC Alias Private Key: 7
3,086,949 UART: [art] Derive CDI
3,087,229 UART: [art] Store in in slot 0x4
3,172,614 UART: [art] Derive Key Pair
3,172,974 UART: [art] Store priv key in slot 0x5
3,185,812 UART: [art] Derive Key Pair - Done
3,200,388 UART: [art] Signing Cert with AUTHO
3,200,868 UART: RITY.KEYID = 7
3,215,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,481 UART: [art] PUB.X = 162F61FFF3E08B564226B4D35A395549CE32232A26A4F38FCB66D5C119724B435FD223858B6009A025BA554A10F05298
3,223,242 UART: [art] PUB.Y = B1B5EA07998A268FE73C5FC59B998D465936E54C7670EC60B9819894AF6D26460C86380E9A0D7A704D7E2BBCABFABAED
3,230,194 UART: [art] SIG.R = B47936528A886044680180C3F7936C6F5A16E94E1EAC74CAF1AB98DE1AAA6A05EE21DDB76B5143C6304AF8A67C81CAEA
3,236,972 UART: [art] SIG.S = 07F41474A2AF570FA5B83210B04DA5DD4D139836986471C7DA8DFE4985DD13DB20C9A8E3951B42BF66C67DDA342D3A5B
3,260,217 UART: Caliptra RT
3,260,470 UART: [state] CFI Enabled
3,368,553 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,109 UART: [rt]cmd =0x49444352, len=4
3,400,701 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,638 ready_for_fw is high
1,108,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,357 >>> mbox cmd response: success
2,645,357 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,707,545 UART:
2,707,561 UART: Running Caliptra FMC ...
2,707,969 UART:
2,708,023 UART: [state] CFI Enabled
2,718,712 UART: [fht] FMC Alias Private Key: 7
2,826,329 UART: [art] Extend RT PCRs Done
2,826,757 UART: [art] Lock RT PCRs Done
2,828,395 UART: [art] Populate DV Done
2,836,632 UART: [fht] FMC Alias Private Key: 7
2,837,592 UART: [art] Derive CDI
2,837,872 UART: [art] Store in in slot 0x4
2,923,681 UART: [art] Derive Key Pair
2,924,041 UART: [art] Store priv key in slot 0x5
2,937,693 UART: [art] Derive Key Pair - Done
2,952,544 UART: [art] Signing Cert with AUTHO
2,953,024 UART: RITY.KEYID = 7
2,967,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,387 UART: [art] PUB.X = 76AEA2EC3141B1B1FD297EB87FD0AB04E1097B59541214ABBB3C5F5DBEE92BF6495DB8F686FA4F6F97AA455C450289D6
2,975,166 UART: [art] PUB.Y = 9030F754F6659766F0C7DBBE59B4A3BA5EDCA99887654C0AB7DFAB5DD27AF450C2D394AEB29474FB7E8DEF1351A590C8
2,982,131 UART: [art] SIG.R = 6A2AD64DD68B7061C100E4DB57DCC3BFB8ABD8BB53F63CB9CE14C63FC2A931ECA7003C2660DF9D88FEB0B1C05D66601A
2,988,883 UART: [art] SIG.S = 5272843FC30749A320E2E5208D29D796F77A3C77FE07D5922872E8A03BCBF0553F486DB176173F28A5AF2B7CB8514481
3,012,418 UART: Caliptra RT
3,012,671 UART: [state] CFI Enabled
3,120,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,594 UART: [rt]cmd =0x49444352, len=4
3,153,050 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
893,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,618 UART: [kat] ++
897,770 UART: [kat] sha1
901,970 UART: [kat] SHA2-256
903,910 UART: [kat] SHA2-384
906,625 UART: [kat] SHA2-512-ACC
908,526 UART: [kat] ECC-384
918,447 UART: [kat] HMAC-384Kdf
923,217 UART: [kat] LMS
1,171,545 UART: [kat] --
1,172,602 UART: [cold-reset] ++
1,173,080 UART: [fht] FHT @ 0x50003400
1,175,799 UART: [idev] ++
1,175,967 UART: [idev] CDI.KEYID = 6
1,176,327 UART: [idev] SUBJECT.KEYID = 7
1,176,751 UART: [idev] UDS.KEYID = 0
1,184,789 UART: [idev] Erasing UDS.KEYID = 0
1,201,760 UART: [idev] Sha1 KeyId Algorithm
1,210,090 UART: [idev] CSR upload begun
1,211,871 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,683 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,228,390 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,234,272 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,977 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,248,397 UART: [idev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
1,298,545 UART: [idev] CSR uploaded
1,300,924 ready_for_fw is high
1,300,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,301,095 UART: [idev] --
1,302,377 UART: [ldev] ++
1,302,545 UART: [ldev] CDI.KEYID = 6
1,302,908 UART: [ldev] SUBJECT.KEYID = 5
1,303,334 UART: [ldev] AUTHORITY.KEYID = 7
1,303,797 UART: [ldev] FE.KEYID = 1
1,309,033 UART: [ldev] Erasing FE.KEYID = 1
1,336,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,361,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,367,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,374,379 UART: [ldev] --
1,375,652 UART: [fwproc] Wait for Commands...
1,376,278 UART: [fwproc] Recv command 0x46574c44
1,377,006 UART: [fwproc] Recv'd Img size: 114448 bytes
2,675,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,703,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,732,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,868,582 >>> mbox cmd response: success
2,868,582 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,869,816 UART: [afmc] ++
2,869,984 UART: [afmc] CDI.KEYID = 6
2,870,346 UART: [afmc] SUBJECT.KEYID = 7
2,870,771 UART: [afmc] AUTHORITY.KEYID = 5
2,906,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,922,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,923,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,929,387 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,935,272 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,940,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,948,837 UART: [afmc] --
2,949,945 UART: [cold-reset] --
2,950,649 UART: [state] Locking Datavault
2,951,704 UART: [state] Locking PCR0, PCR1 and PCR31
2,952,308 UART: [state] Locking ICCM
2,952,948 UART: [exit] Launching FMC @ 0x40000130
2,958,277 UART:
2,958,293 UART: Running Caliptra FMC ...
2,958,701 UART:
2,958,844 UART: [state] CFI Enabled
2,969,745 UART: [fht] FMC Alias Private Key: 7
3,077,906 UART: [art] Extend RT PCRs Done
3,078,334 UART: [art] Lock RT PCRs Done
3,079,766 UART: [art] Populate DV Done
3,087,977 UART: [fht] FMC Alias Private Key: 7
3,088,939 UART: [art] Derive CDI
3,089,219 UART: [art] Store in in slot 0x4
3,175,270 UART: [art] Derive Key Pair
3,175,630 UART: [art] Store priv key in slot 0x5
3,188,722 UART: [art] Derive Key Pair - Done
3,203,805 UART: [art] Signing Cert with AUTHO
3,204,285 UART: RITY.KEYID = 7
3,219,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,220,516 UART: [art] PUB.X = DB8C38A8E72C69CF06E3FD2B773883417CB6C86E56F8896F710DA14B99127731A10472E117E16001F2F1968E21EEA944
3,227,272 UART: [art] PUB.Y = 881F629B46F53854AD165C0306CD5208A7053E6280A9AAB4ED0A3EBFA927A0D5134F44AF6D88E9219BB231ECF37139A7
3,234,213 UART: [art] SIG.R = F89C75DD282A4E8B74F1CEAC797253C90BBA079B74877DC0E370F9DB367BD2D02F435D1C801B6E08043BE5C13D64E44C
3,240,983 UART: [art] SIG.S = EBCB57CC2CA7AC0C0CFCDD471756397ED21F22698E95E027ADAE80615CB673F37F8D0DD2A45AB398F50EDA22EFB8E244
3,264,222 UART: Caliptra RT
3,264,567 UART: [state] CFI Enabled
3,372,467 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,091 UART: [rt]cmd =0x49444352, len=4
3,404,399 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,419 ready_for_fw is high
1,109,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,226 >>> mbox cmd response: success
2,645,226 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,706,664 UART:
2,706,680 UART: Running Caliptra FMC ...
2,707,088 UART:
2,707,231 UART: [state] CFI Enabled
2,717,952 UART: [fht] FMC Alias Private Key: 7
2,825,303 UART: [art] Extend RT PCRs Done
2,825,731 UART: [art] Lock RT PCRs Done
2,826,931 UART: [art] Populate DV Done
2,835,146 UART: [fht] FMC Alias Private Key: 7
2,836,182 UART: [art] Derive CDI
2,836,462 UART: [art] Store in in slot 0x4
2,922,169 UART: [art] Derive Key Pair
2,922,529 UART: [art] Store priv key in slot 0x5
2,934,727 UART: [art] Derive Key Pair - Done
2,949,395 UART: [art] Signing Cert with AUTHO
2,949,875 UART: RITY.KEYID = 7
2,964,581 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,346 UART: [art] PUB.X = 4B4D4F05CCA83F62017C5CCC74268DA5C5CD69594293076EC2826520E62446E92055F6057BB11AF132A7FE7C1B6AD94E
2,972,108 UART: [art] PUB.Y = 75CCE43912F186B9ECD41226426BFADE426D1472A012C3DC220B6FADCA72D4BFAB58D448A661061CFBFA8F736F2F2DA3
2,979,072 UART: [art] SIG.R = 596FF88ABD14F85F7588DEF0AA9E326133FFE19C72425AFEA49556730D561AE691C88A66AE024AC1F9A4D3520FAE1FD4
2,985,847 UART: [art] SIG.S = 5A15F9FB4D4252BAB09DBA979FC76415CD0A114A1754173F0851573254C552E1A8DD3C55220BEAC5B9DFD4FA2216C5B4
3,010,093 UART: Caliptra RT
3,010,438 UART: [state] CFI Enabled
3,118,301 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,851 UART: [rt]cmd =0x49444352, len=4
3,150,191 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
920,906 UART: [kat] LMS
1,169,218 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,167 UART: [idev] ++
1,173,335 UART: [idev] CDI.KEYID = 6
1,173,696 UART: [idev] SUBJECT.KEYID = 7
1,174,121 UART: [idev] UDS.KEYID = 0
1,182,095 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,207,301 UART: [idev] CSR upload begun
1,209,080 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,747 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,455 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,340 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,046 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,475 UART: [idev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
1,296,969 UART: [idev] CSR uploaded
1,300,014 ready_for_fw is high
1,300,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,183 UART: [idev] --
1,301,260 UART: [ldev] ++
1,301,428 UART: [ldev] CDI.KEYID = 6
1,301,792 UART: [ldev] SUBJECT.KEYID = 5
1,302,219 UART: [ldev] AUTHORITY.KEYID = 7
1,302,682 UART: [ldev] FE.KEYID = 1
1,308,158 UART: [ldev] Erasing FE.KEYID = 1
1,334,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,588 UART: [ldev] --
1,374,100 UART: [fwproc] Wait for Commands...
1,374,901 UART: [fwproc] Recv command 0x46574c44
1,375,634 UART: [fwproc] Recv'd Img size: 114448 bytes
2,674,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,642 >>> mbox cmd response: success
2,866,642 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,867,807 UART: [afmc] ++
2,867,975 UART: [afmc] CDI.KEYID = 6
2,868,338 UART: [afmc] SUBJECT.KEYID = 7
2,868,764 UART: [afmc] AUTHORITY.KEYID = 5
2,903,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,955 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,838 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,557 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,354 UART: [afmc] --
2,947,438 UART: [cold-reset] --
2,948,304 UART: [state] Locking Datavault
2,949,579 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,183 UART: [state] Locking ICCM
2,950,833 UART: [exit] Launching FMC @ 0x40000130
2,956,162 UART:
2,956,178 UART: Running Caliptra FMC ...
2,956,586 UART:
2,956,640 UART: [state] CFI Enabled
2,967,201 UART: [fht] FMC Alias Private Key: 7
3,075,676 UART: [art] Extend RT PCRs Done
3,076,104 UART: [art] Lock RT PCRs Done
3,077,468 UART: [art] Populate DV Done
3,085,529 UART: [fht] FMC Alias Private Key: 7
3,086,499 UART: [art] Derive CDI
3,086,779 UART: [art] Store in in slot 0x4
3,172,140 UART: [art] Derive Key Pair
3,172,500 UART: [art] Store priv key in slot 0x5
3,186,004 UART: [art] Derive Key Pair - Done
3,201,130 UART: [art] Signing Cert with AUTHO
3,201,610 UART: RITY.KEYID = 7
3,216,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,623 UART: [art] PUB.X = 448F3A875802CAD91730D37088752BB3A5EC011CDE9BBCB5FE0F867A52DDF92A0D1034ED6C8EBA5E579934A8D90C7CE3
3,224,394 UART: [art] PUB.Y = F8F0C393547568D5BA2A59060AC7499A0A63E5417D1ED8875BFC5F3FA93D6984902A4AABB49D67F6F77BA2F4AF371778
3,231,343 UART: [art] SIG.R = 60A1CC25559377542C914CE5FD93E1EF4EA7475B1E5067B54F132B9DFE6AEA12F704196EED759039EFB0E18146658250
3,238,112 UART: [art] SIG.S = B3A38D2447CB68EF0FB43AFC6BF60D8FD8E859D4B46A2267C438FBBFE6443B708FBD7762DE54BD6006EF80959436F8C0
3,261,498 UART: Caliptra RT
3,261,751 UART: [state] CFI Enabled
3,369,422 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,902 UART: [rt]cmd =0x49444352, len=4
3,406,867 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,725 ready_for_fw is high
1,106,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,642,505 >>> mbox cmd response: success
2,642,505 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,703,549 UART:
2,703,565 UART: Running Caliptra FMC ...
2,703,973 UART:
2,704,027 UART: [state] CFI Enabled
2,714,704 UART: [fht] FMC Alias Private Key: 7
2,822,361 UART: [art] Extend RT PCRs Done
2,822,789 UART: [art] Lock RT PCRs Done
2,824,647 UART: [art] Populate DV Done
2,832,956 UART: [fht] FMC Alias Private Key: 7
2,834,104 UART: [art] Derive CDI
2,834,384 UART: [art] Store in in slot 0x4
2,920,039 UART: [art] Derive Key Pair
2,920,399 UART: [art] Store priv key in slot 0x5
2,932,949 UART: [art] Derive Key Pair - Done
2,947,771 UART: [art] Signing Cert with AUTHO
2,948,251 UART: RITY.KEYID = 7
2,963,075 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,840 UART: [art] PUB.X = B9A164AC84B451D6A5B6EEDD8A53EDB9BD5DED659734F02D85B4E23DB8779FEBB2DB34D4D47D5A5483E098F85C412322
2,970,628 UART: [art] PUB.Y = 7C31AD47E9E6D8AD5C7F4C177B184796E985A802D33BF9F885B1C2142BFF68E6A49CFE72380E136C42810CF847AF620F
2,977,574 UART: [art] SIG.R = 35A23015532CDE121A354F40679D741C6E5238E416A2FF60C320EC1866040682ADD4B9C746C4F143305E09398418D524
2,984,323 UART: [art] SIG.S = CE0C5DD17EAC8656519B1CBB33E2AAA94BE3BB182966D017FBD6120A161D10FC6F12DFFE2D5F57A0A14BD837DA55654C
3,008,458 UART: Caliptra RT
3,008,711 UART: [state] CFI Enabled
3,116,018 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,340 UART: [rt]cmd =0x49444352, len=4
3,153,421 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,305 UART: [kat] HMAC-384Kdf
921,007 UART: [kat] LMS
1,169,319 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,550 UART: [fht] FHT @ 0x50003400
1,173,322 UART: [idev] ++
1,173,490 UART: [idev] CDI.KEYID = 6
1,173,851 UART: [idev] SUBJECT.KEYID = 7
1,174,276 UART: [idev] UDS.KEYID = 0
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,316 UART: [idev] Sha1 KeyId Algorithm
1,207,550 UART: [idev] CSR upload begun
1,209,329 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,848 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,556 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,441 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,147 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,576 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,070 UART: [idev] CSR uploaded
1,300,115 ready_for_fw is high
1,300,115 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,300,284 UART: [idev] --
1,301,471 UART: [ldev] ++
1,301,639 UART: [ldev] CDI.KEYID = 6
1,302,003 UART: [ldev] SUBJECT.KEYID = 5
1,302,430 UART: [ldev] AUTHORITY.KEYID = 7
1,302,893 UART: [ldev] FE.KEYID = 1
1,308,287 UART: [ldev] Erasing FE.KEYID = 1
1,334,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,793 UART: [ldev] --
1,374,077 UART: [fwproc] Wait for Commands...
1,374,750 UART: [fwproc] Recv command 0x46574c44
1,375,483 UART: [fwproc] Recv'd Img size: 114448 bytes
2,673,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,869 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,866,883 >>> mbox cmd response: success
2,866,883 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,867,944 UART: [afmc] ++
2,868,112 UART: [afmc] CDI.KEYID = 6
2,868,475 UART: [afmc] SUBJECT.KEYID = 7
2,868,901 UART: [afmc] AUTHORITY.KEYID = 5
2,904,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,904 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,787 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,371 UART: [afmc] --
2,947,305 UART: [cold-reset] --
2,947,905 UART: [state] Locking Datavault
2,948,792 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,396 UART: [state] Locking ICCM
2,950,064 UART: [exit] Launching FMC @ 0x40000130
2,955,393 UART:
2,955,409 UART: Running Caliptra FMC ...
2,955,817 UART:
2,955,960 UART: [state] CFI Enabled
2,966,551 UART: [fht] FMC Alias Private Key: 7
3,074,072 UART: [art] Extend RT PCRs Done
3,074,500 UART: [art] Lock RT PCRs Done
3,075,650 UART: [art] Populate DV Done
3,083,707 UART: [fht] FMC Alias Private Key: 7
3,084,669 UART: [art] Derive CDI
3,084,949 UART: [art] Store in in slot 0x4
3,170,826 UART: [art] Derive Key Pair
3,171,186 UART: [art] Store priv key in slot 0x5
3,184,180 UART: [art] Derive Key Pair - Done
3,198,986 UART: [art] Signing Cert with AUTHO
3,199,466 UART: RITY.KEYID = 7
3,215,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,871 UART: [art] PUB.X = 6244A6116DB0FF59B9053833AF4486AA8D8225601E9BE119918DFE630ABB9C6492CE6F6B919CCA2CDA5D9BE09235AF1B
3,222,647 UART: [art] PUB.Y = 588AE90D7D3BC75D4A3EC0ECA0BDCB812297896338DA3A4F864C8ED739A2C701E08E36A031DC8BC4A995B484E0BDFC9A
3,229,611 UART: [art] SIG.R = F89996DE26B5F6E6ACD88D4079A2298D467C1906667932F295D99E8130417C72F863085445FFE52AD43B7EFE8C3AF0C6
3,236,375 UART: [art] SIG.S = A14C33D581322275F5DB06FB88CF636F50CFA93FD5679F50F123F103096A0E07369F36A81DDE997B7B5E3799048E26DA
3,259,816 UART: Caliptra RT
3,260,161 UART: [state] CFI Enabled
3,367,799 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,105 UART: [rt]cmd =0x49444352, len=4
3,405,330 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,124 ready_for_fw is high
1,109,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,644,620 >>> mbox cmd response: success
2,644,620 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,707,280 UART:
2,707,296 UART: Running Caliptra FMC ...
2,707,704 UART:
2,707,847 UART: [state] CFI Enabled
2,718,236 UART: [fht] FMC Alias Private Key: 7
2,826,303 UART: [art] Extend RT PCRs Done
2,826,731 UART: [art] Lock RT PCRs Done
2,828,407 UART: [art] Populate DV Done
2,836,878 UART: [fht] FMC Alias Private Key: 7
2,837,860 UART: [art] Derive CDI
2,838,140 UART: [art] Store in in slot 0x4
2,923,953 UART: [art] Derive Key Pair
2,924,313 UART: [art] Store priv key in slot 0x5
2,937,851 UART: [art] Derive Key Pair - Done
2,952,770 UART: [art] Signing Cert with AUTHO
2,953,250 UART: RITY.KEYID = 7
2,968,392 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,157 UART: [art] PUB.X = 92580DB5F41CE96BAD4DD3B8EB75A2015ECEB71182736848A0BA80E5B1530E90E768FDCBFD89FEC837A3B39FD422FD67
2,975,936 UART: [art] PUB.Y = 17CCAF24440D2312FEC8D89867C393170307B924F9C7F615B23C6D4C6446EA0E00F980BFCF4738936CB10D9F307E4BF7
2,982,853 UART: [art] SIG.R = 11473128F196B4AF9FB9D232B569C15380EDED986C7D590CBF9ED676071154C7425E264545AC9A69649FC8A4B7BA2073
2,989,617 UART: [art] SIG.S = D3180C4E80DCA0FB163412D9B5E8310607D38BE18CE4E5EC2A1C8F85A799272187B7A58F057ACB2DA05745F92A5188EC
3,013,930 UART: Caliptra RT
3,014,275 UART: [state] CFI Enabled
3,122,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,153,372 UART: [rt]cmd =0x49444352, len=4
3,160,781 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,049 UART:
192,437 UART: Running Caliptra ROM ...
193,623 UART:
193,800 UART: [state] CFI Enabled
263,883 UART: [state] LifecycleState = Unprovisioned
265,795 UART: [state] DebugLocked = No
267,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,913 UART: [kat] SHA2-256
441,594 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,124 UART: [kat] ++
452,567 UART: [kat] sha1
464,029 UART: [kat] SHA2-256
466,740 UART: [kat] SHA2-384
472,520 UART: [kat] SHA2-512-ACC
474,889 UART: [kat] ECC-384
2,767,649 UART: [kat] HMAC-384Kdf
2,798,649 UART: [kat] LMS
3,988,911 UART: [kat] --
3,991,638 UART: [cold-reset] ++
3,993,166 UART: [fht] Storing FHT @ 0x50003400
4,005,507 UART: [idev] ++
4,006,087 UART: [idev] CDI.KEYID = 6
4,006,983 UART: [idev] SUBJECT.KEYID = 7
4,008,304 UART: [idev] UDS.KEYID = 0
4,009,268 ready_for_fw is high
4,009,462 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,035 UART: [idev] Erasing UDS.KEYID = 0
7,340,991 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,561 UART: [idev] --
7,366,938 UART: [ldev] ++
7,367,508 UART: [ldev] CDI.KEYID = 6
7,368,523 UART: [ldev] SUBJECT.KEYID = 5
7,369,684 UART: [ldev] AUTHORITY.KEYID = 7
7,370,970 UART: [ldev] FE.KEYID = 1
7,418,251 UART: [ldev] Erasing FE.KEYID = 1
10,753,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,711 UART: [ldev] --
13,134,624 UART: [fwproc] Waiting for Commands...
13,138,008 UART: [fwproc] Received command 0x46574c44
13,140,197 UART: [fwproc] Received Image of size 114124 bytes
17,187,592 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,720 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,650,293 >>> mbox cmd response: success
17,654,137 UART: [afmc] ++
17,654,738 UART: [afmc] CDI.KEYID = 6
17,655,882 UART: [afmc] SUBJECT.KEYID = 7
17,656,963 UART: [afmc] AUTHORITY.KEYID = 5
21,022,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,321,720 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,323,986 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,338,430 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,353,232 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,367,688 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,389,816 UART: [afmc] --
23,394,117 UART: [cold-reset] --
23,399,324 UART: [state] Locking Datavault
23,405,981 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,742 UART: [state] Locking ICCM
23,409,191 UART: [exit] Launching FMC @ 0x40000130
23,417,601 UART:
23,417,878 UART: Running Caliptra FMC ...
23,418,984 UART:
23,419,171 UART: [state] CFI Enabled
23,481,808 UART: [fht] FMC Alias Private Key: 7
25,820,528 UART: [art] Extend RT PCRs Done
25,821,769 UART: [art] Lock RT PCRs Done
25,823,330 UART: [art] Populate DV Done
25,828,733 UART: [fht] FMC Alias Private Key: 7
25,830,375 UART: [art] Derive CDI
25,831,117 UART: [art] Store in in slot 0x4
25,892,592 UART: [art] Derive Key Pair
25,893,591 UART: [art] Store priv key in slot 0x5
29,185,828 UART: [art] Derive Key Pair - Done
29,199,030 UART: [art] Signing Cert with AUTHO
29,200,335 UART: RITY.KEYID = 7
31,487,452 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,953 UART: [art] PUB.X = 21279D45D70A205EE8D169FD5AFEDAF285554267CC7D3BC5B7C2960A3BF07E12CE33A21669DDBFEE03A3CA95785280AD
31,496,278 UART: [art] PUB.Y = DBB971DE8BD84E3A3E75C074D0995F92E5DAD8FE02DE21AD3FE10916E774787527575A05FB34E6EAF2EDB0ADC46095C9
31,503,489 UART: [art] SIG.R = 9BE1EB1CDEB4C6CEE103940B28097B19AA41E7A2199254BF12D35A2F0D3250C4EEB2899E49A435474C0FDB063C2070B2
31,510,883 UART: [art] SIG.S = 0F5C2C53405F6EA76B34E20BC36BE13074A30F559C8634767E020BCCDE28302CA2E8F16DC449EC2EED8AEB41D317F617
32,815,435 UART: Caliptra RT
32,816,147 UART: [state] CFI Enabled
32,976,875 UART: [rt] RT listening for mailbox commands...
32,978,717 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,008,329 UART: [rt]cmd =0x49444352, len=4
33,010,218 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,785,614 ready_for_fw is high
3,786,012 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,852,595 >>> mbox cmd response: success
23,545,796 UART:
23,546,513 UART: Running Caliptra FMC ...
23,547,648 UART:
23,547,803 UART: [state] CFI Enabled
23,618,100 UART: [fht] FMC Alias Private Key: 7
25,955,882 UART: [art] Extend RT PCRs Done
25,957,112 UART: [art] Lock RT PCRs Done
25,958,735 UART: [art] Populate DV Done
25,964,386 UART: [fht] FMC Alias Private Key: 7
25,965,950 UART: [art] Derive CDI
25,966,687 UART: [art] Store in in slot 0x4
26,027,303 UART: [art] Derive Key Pair
26,028,354 UART: [art] Store priv key in slot 0x5
29,320,721 UART: [art] Derive Key Pair - Done
29,333,667 UART: [art] Signing Cert with AUTHO
29,334,982 UART: RITY.KEYID = 7
31,623,974 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,482 UART: [art] PUB.X = DAC7F443BEA8CB6B6D5E516BD9B7026C083BA3E167A8AD0D064E310EB47D892CB7739BAAD71947A6B4CD0F3AA7B96839
31,632,752 UART: [art] PUB.Y = E427CDC84FDD1ABA96572BFABE28ED2DF1FB075DD3E05AAB16866766E026E369DCF1A6772413118213F48B6B9003488F
31,640,015 UART: [art] SIG.R = 66CF8B979F96DBD8D3235B9E5AFB8887F0DC66E8C15A059B243AE5907F315FFCE5709C45D20FCB5CC0D62BE02332E5E0
31,647,433 UART: [art] SIG.S = 055161B496312B162C0FBCD10663EAE225E0E58DAC1E18D469FDF6201DF67A96DBE354B3F963B5D3546990130E687CE4
32,952,654 UART: Caliptra RT
32,953,359 UART: [state] CFI Enabled
33,113,603 UART: [rt] RT listening for mailbox commands...
33,115,451 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,145,313 UART: [rt]cmd =0x49444352, len=4
33,147,287 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,460 UART:
192,818 UART: Running Caliptra ROM ...
193,997 UART:
603,557 UART: [state] CFI Enabled
620,033 UART: [state] LifecycleState = Unprovisioned
622,015 UART: [state] DebugLocked = No
624,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,642 UART: [kat] SHA2-256
798,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,879 UART: [kat] ++
809,393 UART: [kat] sha1
821,036 UART: [kat] SHA2-256
823,752 UART: [kat] SHA2-384
829,875 UART: [kat] SHA2-512-ACC
832,246 UART: [kat] ECC-384
3,117,537 UART: [kat] HMAC-384Kdf
3,128,696 UART: [kat] LMS
4,318,836 UART: [kat] --
4,323,227 UART: [cold-reset] ++
4,325,370 UART: [fht] Storing FHT @ 0x50003400
4,337,629 UART: [idev] ++
4,338,197 UART: [idev] CDI.KEYID = 6
4,339,351 UART: [idev] SUBJECT.KEYID = 7
4,340,455 UART: [idev] UDS.KEYID = 0
4,341,523 ready_for_fw is high
4,341,756 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,149 UART: [idev] Erasing UDS.KEYID = 0
7,635,019 UART: [idev] Using Sha1 for KeyId Algorithm
7,656,853 UART: [idev] --
7,662,217 UART: [ldev] ++
7,662,782 UART: [ldev] CDI.KEYID = 6
7,663,713 UART: [ldev] SUBJECT.KEYID = 5
7,664,972 UART: [ldev] AUTHORITY.KEYID = 7
7,666,194 UART: [ldev] FE.KEYID = 1
7,678,468 UART: [ldev] Erasing FE.KEYID = 1
10,964,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,271,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,999 UART: [ldev] --
13,324,335 UART: [fwproc] Waiting for Commands...
13,326,321 UART: [fwproc] Received command 0x46574c44
13,328,552 UART: [fwproc] Received Image of size 114124 bytes
17,377,126 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,609 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,563 >>> mbox cmd response: success
17,841,617 UART: [afmc] ++
17,842,205 UART: [afmc] CDI.KEYID = 6
17,843,164 UART: [afmc] SUBJECT.KEYID = 7
17,844,373 UART: [afmc] AUTHORITY.KEYID = 5
21,158,203 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,701 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,974 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,355 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,176 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,651 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,517 UART: [afmc] --
23,525,083 UART: [cold-reset] --
23,528,832 UART: [state] Locking Datavault
23,532,512 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,266 UART: [state] Locking ICCM
23,535,763 UART: [exit] Launching FMC @ 0x40000130
23,544,156 UART:
23,544,385 UART: Running Caliptra FMC ...
23,545,482 UART:
23,545,635 UART: [state] CFI Enabled
23,553,617 UART: [fht] FMC Alias Private Key: 7
25,884,434 UART: [art] Extend RT PCRs Done
25,885,679 UART: [art] Lock RT PCRs Done
25,887,654 UART: [art] Populate DV Done
25,893,179 UART: [fht] FMC Alias Private Key: 7
25,894,700 UART: [art] Derive CDI
25,895,431 UART: [art] Store in in slot 0x4
25,937,755 UART: [art] Derive Key Pair
25,938,752 UART: [art] Store priv key in slot 0x5
29,180,522 UART: [art] Derive Key Pair - Done
29,193,372 UART: [art] Signing Cert with AUTHO
29,194,669 UART: RITY.KEYID = 7
31,473,687 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,189 UART: [art] PUB.X = 7E2F377610E5CFCDFB17B89549DF4A9A0EA724BB12BBF9166586163D67CE8D65F230A9AE89DA5C03541B6F2BD4123335
31,482,412 UART: [art] PUB.Y = D80F6641683A38D223352C0FEE4510FA60B88A9D748D3BD6DACD2DD0DB735935B240921E493017C1B8F22C43B609C66A
31,489,829 UART: [art] SIG.R = CA8A71A1E89D85118732F968A318D05CEA9738474D1DFEE76B600C9AE4A455BE806BF1BE88ED44587D14C595CE5AD769
31,497,054 UART: [art] SIG.S = 45CB3BEFD2FFB8378B8CC9D570429A19EA00172633BD6D37364CE783838C8A10425D5E3562E613E8C22BC689AB962692
32,801,855 UART: Caliptra RT
32,802,593 UART: [state] CFI Enabled
32,919,383 UART: [rt] RT listening for mailbox commands...
32,921,223 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
32,950,845 UART: [rt]cmd =0x49444352, len=4
32,952,646 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
4,122,228 ready_for_fw is high
4,122,798 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,064,073 >>> mbox cmd response: success
23,707,785 UART:
23,708,197 UART: Running Caliptra FMC ...
23,709,299 UART:
23,709,457 UART: [state] CFI Enabled
23,717,888 UART: [fht] FMC Alias Private Key: 7
26,048,609 UART: [art] Extend RT PCRs Done
26,049,840 UART: [art] Lock RT PCRs Done
26,051,529 UART: [art] Populate DV Done
26,057,268 UART: [fht] FMC Alias Private Key: 7
26,058,916 UART: [art] Derive CDI
26,059,736 UART: [art] Store in in slot 0x4
26,102,184 UART: [art] Derive Key Pair
26,103,225 UART: [art] Store priv key in slot 0x5
29,345,140 UART: [art] Derive Key Pair - Done
29,358,000 UART: [art] Signing Cert with AUTHO
29,359,317 UART: RITY.KEYID = 7
31,638,993 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,501 UART: [art] PUB.X = 270AE16132F7ADBB6BAE3AD5139088654D21C5C6F780F6559E5B54C31CC91E432C4D9D641F7E9B5AA03343EF48520D8B
31,647,730 UART: [art] PUB.Y = 99828689A536204C15FE1D1564C606AFCA01D5653DCFF4A67AF170AB5FCA458E7066F341AA49DE60851ADC612E81E66E
31,654,996 UART: [art] SIG.R = CC0FFD162026C0E506947C6C68F9AC8717CF9661791A5E0915C351967CD416F24EEBDF81BB34FA5D9789435E57DE477B
31,662,379 UART: [art] SIG.S = A636E3A7701C6CF005462E624C3B30CA394BB1AB15835B275F174F72EAF38E3890FAF5A674374A46A139772303C86839
32,967,319 UART: Caliptra RT
32,968,030 UART: [state] CFI Enabled
33,085,793 UART: [rt] RT listening for mailbox commands...
33,087,625 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,117,236 UART: [rt]cmd =0x49444352, len=4
33,119,096 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,064 UART:
192,425 UART: Running Caliptra ROM ...
193,621 UART:
193,773 UART: [state] CFI Enabled
262,150 UART: [state] LifecycleState = Unprovisioned
264,059 UART: [state] DebugLocked = No
266,875 UART: [state] WD Timer not started. Device not locked for debugging
270,399 UART: [kat] SHA2-256
449,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,126 UART: [kat] ++
461,591 UART: [kat] sha1
472,759 UART: [kat] SHA2-256
475,818 UART: [kat] SHA2-384
482,595 UART: [kat] SHA2-512-ACC
485,527 UART: [kat] ECC-384
2,947,507 UART: [kat] HMAC-384Kdf
2,971,337 UART: [kat] LMS
3,500,839 UART: [kat] --
3,505,112 UART: [cold-reset] ++
3,507,540 UART: [fht] FHT @ 0x50003400
3,517,673 UART: [idev] ++
3,518,280 UART: [idev] CDI.KEYID = 6
3,519,200 UART: [idev] SUBJECT.KEYID = 7
3,520,374 UART: [idev] UDS.KEYID = 0
3,521,300 ready_for_fw is high
3,521,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,280 UART: [idev] Erasing UDS.KEYID = 0
6,025,874 UART: [idev] Sha1 KeyId Algorithm
6,048,238 UART: [idev] --
6,052,397 UART: [ldev] ++
6,052,981 UART: [ldev] CDI.KEYID = 6
6,053,874 UART: [ldev] SUBJECT.KEYID = 5
6,054,991 UART: [ldev] AUTHORITY.KEYID = 7
6,056,441 UART: [ldev] FE.KEYID = 1
6,099,989 UART: [ldev] Erasing FE.KEYID = 1
8,607,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,011 UART: [ldev] --
10,413,419 UART: [fwproc] Wait for Commands...
10,415,481 UART: [fwproc] Recv command 0x46574c44
10,417,572 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,276,740 >>> mbox cmd response: success
14,280,681 UART: [afmc] ++
14,281,279 UART: [afmc] CDI.KEYID = 6
14,282,166 UART: [afmc] SUBJECT.KEYID = 7
14,283,267 UART: [afmc] AUTHORITY.KEYID = 5
16,806,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,308 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,114 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,114 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,987 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,710 UART: [afmc] --
18,608,759 UART: [cold-reset] --
18,611,161 UART: [state] Locking Datavault
18,617,755 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,393 UART: [state] Locking ICCM
18,620,782 UART: [exit] Launching FMC @ 0x40000130
18,629,229 UART:
18,629,460 UART: Running Caliptra FMC ...
18,630,681 UART:
18,630,881 UART: [state] CFI Enabled
18,692,571 UART: [fht] FMC Alias Private Key: 7
20,456,610 UART: [art] Extend RT PCRs Done
20,457,831 UART: [art] Lock RT PCRs Done
20,459,666 UART: [art] Populate DV Done
20,465,077 UART: [fht] FMC Alias Private Key: 7
20,466,722 UART: [art] Derive CDI
20,467,554 UART: [art] Store in in slot 0x4
20,525,336 UART: [art] Derive Key Pair
20,526,370 UART: [art] Store priv key in slot 0x5
22,989,644 UART: [art] Derive Key Pair - Done
23,002,588 UART: [art] Signing Cert with AUTHO
23,003,892 UART: RITY.KEYID = 7
24,714,949 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,447 UART: [art] PUB.X = C4724C87A91D5DB0CC3034039F605FA6F0C18500E914F14A005B29F9F71305722AB00BF049DF80B41A1A73595A8950A2
24,723,700 UART: [art] PUB.Y = 618CD57F52D7A58402D1E721085410AE9A11DBB23526886ECEA0489B3565D871C91A00DF3F9657EF8E0C6AE94EE3089E
24,730,934 UART: [art] SIG.R = 2B88C993C942B6202A0BF80D7B9BF3504C2706ADEF8CF3D3BFC0EF144475F7B96F73C791F25D2602334C74BC584AEA8C
24,738,331 UART: [art] SIG.S = 5A657C8BE10ACCB792AFA46B3268D9EA7C89EB675A3F06CC7B3509FAB6D4DEF140737B90311924FE7A4EF6CFCF39C499
25,717,487 UART: Caliptra RT
25,718,201 UART: [state] CFI Enabled
25,882,520 UART: [rt] RT listening for mailbox commands...
25,884,365 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,914,687 UART: [rt]cmd =0x49444352, len=4
25,916,370 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,379,490 ready_for_fw is high
3,379,875 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,065,463 >>> mbox cmd response: success
18,342,923 UART:
18,343,342 UART: Running Caliptra FMC ...
18,344,450 UART:
18,344,612 UART: [state] CFI Enabled
18,413,526 UART: [fht] FMC Alias Private Key: 7
20,177,620 UART: [art] Extend RT PCRs Done
20,178,856 UART: [art] Lock RT PCRs Done
20,180,620 UART: [art] Populate DV Done
20,185,814 UART: [fht] FMC Alias Private Key: 7
20,187,465 UART: [art] Derive CDI
20,188,282 UART: [art] Store in in slot 0x4
20,245,618 UART: [art] Derive Key Pair
20,246,662 UART: [art] Store priv key in slot 0x5
22,709,532 UART: [art] Derive Key Pair - Done
22,722,312 UART: [art] Signing Cert with AUTHO
22,723,631 UART: RITY.KEYID = 7
24,435,268 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,760 UART: [art] PUB.X = 1BE2DB1755993D14A0FF7812D9147E5A752A91C0BF8EBA30848F48854CADA7DD309ACB6903D4BEF7484A66B07D3A5FB6
24,444,056 UART: [art] PUB.Y = 0F755CA6D6B821B7D62665032F5CD024A0D8AE527DE858BCC2542612EDD047C6B046E1E213756A335255307375991D40
24,451,316 UART: [art] SIG.R = 7196A7BB015919D4E52ECE83765086072BFCCB0527CAB40225EC8C726D57D950D551861E9491B5BB22180E188B7111EB
24,458,711 UART: [art] SIG.S = D63D47E79531B2DCAAA2BEDCFAA5CAFFA0D95D15800D9AC242F4647F6C502524E347F07FC679C9329001A8CCAFF2D155
25,438,316 UART: Caliptra RT
25,439,014 UART: [state] CFI Enabled
25,603,733 UART: [rt] RT listening for mailbox commands...
25,605,578 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,635,958 UART: [rt]cmd =0x49444352, len=4
25,637,614 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
192,257 UART:
192,629 UART: Running Caliptra ROM ...
193,756 UART:
603,530 UART: [state] CFI Enabled
619,279 UART: [state] LifecycleState = Unprovisioned
621,193 UART: [state] DebugLocked = No
623,424 UART: [state] WD Timer not started. Device not locked for debugging
627,091 UART: [kat] SHA2-256
806,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,835 UART: [kat] ++
818,278 UART: [kat] sha1
829,229 UART: [kat] SHA2-256
832,275 UART: [kat] SHA2-384
838,902 UART: [kat] SHA2-512-ACC
841,901 UART: [kat] ECC-384
3,284,040 UART: [kat] HMAC-384Kdf
3,296,239 UART: [kat] LMS
3,825,704 UART: [kat] --
3,830,120 UART: [cold-reset] ++
3,832,185 UART: [fht] FHT @ 0x50003400
3,842,864 UART: [idev] ++
3,843,449 UART: [idev] CDI.KEYID = 6
3,844,357 UART: [idev] SUBJECT.KEYID = 7
3,845,524 UART: [idev] UDS.KEYID = 0
3,846,414 ready_for_fw is high
3,846,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,417 UART: [idev] Erasing UDS.KEYID = 0
6,322,931 UART: [idev] Sha1 KeyId Algorithm
6,346,894 UART: [idev] --
6,349,830 UART: [ldev] ++
6,350,397 UART: [ldev] CDI.KEYID = 6
6,351,406 UART: [ldev] SUBJECT.KEYID = 5
6,352,500 UART: [ldev] AUTHORITY.KEYID = 7
6,353,774 UART: [ldev] FE.KEYID = 1
6,363,923 UART: [ldev] Erasing FE.KEYID = 1
8,839,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,099 UART: [ldev] --
10,630,576 UART: [fwproc] Wait for Commands...
10,633,146 UART: [fwproc] Recv command 0x46574c44
10,635,228 UART: [fwproc] Recv'd Img size: 114448 bytes
14,040,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,184,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,503,319 >>> mbox cmd response: success
14,508,090 UART: [afmc] ++
14,508,714 UART: [afmc] CDI.KEYID = 6
14,509,622 UART: [afmc] SUBJECT.KEYID = 7
14,510,774 UART: [afmc] AUTHORITY.KEYID = 5
17,010,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,732,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,734,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,750,073 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,766,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,781,905 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,805,400 UART: [afmc] --
18,809,145 UART: [cold-reset] --
18,814,616 UART: [state] Locking Datavault
18,818,826 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,528 UART: [state] Locking ICCM
18,822,672 UART: [exit] Launching FMC @ 0x40000130
18,831,105 UART:
18,831,346 UART: Running Caliptra FMC ...
18,832,437 UART:
18,832,587 UART: [state] CFI Enabled
18,840,572 UART: [fht] FMC Alias Private Key: 7
20,597,529 UART: [art] Extend RT PCRs Done
20,598,749 UART: [art] Lock RT PCRs Done
20,600,456 UART: [art] Populate DV Done
20,605,485 UART: [fht] FMC Alias Private Key: 7
20,607,177 UART: [art] Derive CDI
20,607,980 UART: [art] Store in in slot 0x4
20,650,561 UART: [art] Derive Key Pair
20,651,555 UART: [art] Store priv key in slot 0x5
23,078,831 UART: [art] Derive Key Pair - Done
23,091,669 UART: [art] Signing Cert with AUTHO
23,092,970 UART: RITY.KEYID = 7
24,798,202 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,716 UART: [art] PUB.X = 5C3D026862A09579F6AEBE8579848C1FC0D5EFBB2C2CE093EDFE1757ED75D29DF3F327CB539C6938D40166E48E574E6D
24,807,003 UART: [art] PUB.Y = 4AD8F8F35E16FBE64174E332C111A80D56123557540D27F418F4C4B2E9C4F49F246541C811658702F46DDCACE3716E7C
24,814,271 UART: [art] SIG.R = 805D296D1DC7DE450B7D0CC75162F7E3F1C0B387D7E64F781233808D9CD5FF56D5FC5E04B28502364BE7D93F764D5D78
24,821,642 UART: [art] SIG.S = 19FD58F768EBAB31D40C63BF852774B42436ED231FE0635EDBA822D252FD192AB433E5487408CEEA489DF8A1ACAD3A19
25,800,673 UART: Caliptra RT
25,801,372 UART: [state] CFI Enabled
25,917,074 UART: [rt] RT listening for mailbox commands...
25,918,909 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,948,404 UART: [rt]cmd =0x49444352, len=4
25,950,210 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,699,632 ready_for_fw is high
3,700,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,262 >>> mbox cmd response: success
18,520,356 UART:
18,520,783 UART: Running Caliptra FMC ...
18,521,881 UART:
18,522,036 UART: [state] CFI Enabled
18,529,893 UART: [fht] FMC Alias Private Key: 7
20,287,243 UART: [art] Extend RT PCRs Done
20,288,451 UART: [art] Lock RT PCRs Done
20,289,962 UART: [art] Populate DV Done
20,295,430 UART: [fht] FMC Alias Private Key: 7
20,297,138 UART: [art] Derive CDI
20,297,874 UART: [art] Store in in slot 0x4
20,339,950 UART: [art] Derive Key Pair
20,340,951 UART: [art] Store priv key in slot 0x5
22,767,579 UART: [art] Derive Key Pair - Done
22,780,626 UART: [art] Signing Cert with AUTHO
22,781,939 UART: RITY.KEYID = 7
24,487,841 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,314 UART: [art] PUB.X = B604A8B34671309A7468817E4D1FF06AB646A54C850C5CCD67930906C7F0530C5F181C3A179276A05A6D0A4AB437DE41
24,496,585 UART: [art] PUB.Y = 6E10EB9C6471979D4C5ADF731BE504BA67C2B4797215819241A93AC27AE4C8D46CFF538D38422776E2A5AA7F5374B142
24,503,859 UART: [art] SIG.R = 71545B5B2A63865DB99DDD921E6C44DF0118E33EA77CA4FC4F4BFC6580A8F9B470CBB156896E838540397D6A87E7589A
24,511,246 UART: [art] SIG.S = 40CE2BDD39985A746DD3E305D01528981F3AF3CD3157C4ED02E0F7B8001AADD912202996C5DD888D82E3255DBC045ECA
25,490,175 UART: Caliptra RT
25,490,880 UART: [state] CFI Enabled
25,609,563 UART: [rt] RT listening for mailbox commands...
25,611,411 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,640,920 UART: [rt]cmd =0x49444352, len=4
25,642,372 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,441,332 ready_for_fw is high
3,441,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,608 >>> mbox cmd response: success
19,027,977 UART:
19,028,374 UART: Running Caliptra FMC ...
19,029,572 UART:
19,029,739 UART: [state] CFI Enabled
19,094,773 UART: [fht] FMC Alias Private Key: 7
20,858,661 UART: [art] Extend RT PCRs Done
20,859,878 UART: [art] Lock RT PCRs Done
20,861,401 UART: [art] Populate DV Done
20,866,700 UART: [fht] FMC Alias Private Key: 7
20,868,341 UART: [art] Derive CDI
20,869,149 UART: [art] Store in in slot 0x4
20,927,289 UART: [art] Derive Key Pair
20,928,327 UART: [art] Store priv key in slot 0x5
23,390,879 UART: [art] Derive Key Pair - Done
23,403,764 UART: [art] Signing Cert with AUTHO
23,405,065 UART: RITY.KEYID = 7
25,116,738 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,236 UART: [art] PUB.X = 8CA0E21E0E6C463CD8861CF12368AA267E3F181DBBAEF49752F8837CD4E8C4CD4564C081A862D4787481A7B7BE7FBE39
25,125,535 UART: [art] PUB.Y = 66CD862D98F2F2AF0DA474DDA4DDE2CC2382821EAC0E03A7BB539C2B0B56906F2BAFAACB2BD275AEE4393253BB27135B
25,132,836 UART: [art] SIG.R = 652859CF705CD8793C7DF49ABA583287F6932732E1FAA87B1D7F7C34840872493AED8E98D1ADAB3C332A0E15D22A2DAD
25,140,231 UART: [art] SIG.S = 5579D49F8B6C7F4ADD7C237984045D1F41A99319DDCB37E2939F5EA28A31DA414852FA4F5912B230F46B66D8008E41E2
26,118,710 UART: Caliptra RT
26,119,394 UART: [state] CFI Enabled
26,284,674 UART: [rt] RT listening for mailbox commands...
26,286,518 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,316,737 UART: [rt]cmd =0x49444352, len=4
26,318,543 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
3,752,809 ready_for_fw is high
3,753,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,949,592 >>> mbox cmd response: success
19,210,131 UART:
19,210,503 UART: Running Caliptra FMC ...
19,211,693 UART:
19,211,855 UART: [state] CFI Enabled
19,219,529 UART: [fht] FMC Alias Private Key: 7
20,976,518 UART: [art] Extend RT PCRs Done
20,977,764 UART: [art] Lock RT PCRs Done
20,979,334 UART: [art] Populate DV Done
20,984,769 UART: [fht] FMC Alias Private Key: 7
20,986,240 UART: [art] Derive CDI
20,986,978 UART: [art] Store in in slot 0x4
21,030,217 UART: [art] Derive Key Pair
21,031,213 UART: [art] Store priv key in slot 0x5
23,458,266 UART: [art] Derive Key Pair - Done
23,471,215 UART: [art] Signing Cert with AUTHO
23,472,566 UART: RITY.KEYID = 7
25,177,889 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,396 UART: [art] PUB.X = 27C09DC1D90F2D1A2714650289231F6092011359E7D839CFD144EFABFEDA005CFFA27BBB30ABE450EA30941C8D7F8174
25,186,664 UART: [art] PUB.Y = 164CEBB36215C5CB7CD14D52D35F2B667BBB88CE7510E6BC4CC45E3441FC5565CBCB20E629383E4ACC331952429EF59B
25,193,935 UART: [art] SIG.R = 79FA2130EE86EC5955CC058681DA4D2E8661D54155294E66D5D6F60817A3441F3F2805115A24E12C675044CDF768D7C8
25,201,314 UART: [art] SIG.S = D34E974B9A54FEABDD0DF6D35F209BD5A98EF3D9C0CBBFBCC5C03F696650D7D92AC44B2B91A6F06AB39FF3702EB61E36
26,180,311 UART: Caliptra RT
26,181,162 UART: [state] CFI Enabled
26,298,369 UART: [rt] RT listening for mailbox commands...
26,300,218 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,329,883 UART: [rt]cmd =0x49444352, len=4
26,331,770 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,727 UART: [kat] SHA2-256
881,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,773 UART: [kat] ++
885,925 UART: [kat] sha1
890,059 UART: [kat] SHA2-256
891,997 UART: [kat] SHA2-384
894,752 UART: [kat] SHA2-512-ACC
896,653 UART: [kat] ECC-384
902,092 UART: [kat] HMAC-384Kdf
906,594 UART: [kat] LMS
1,474,790 UART: [kat] --
1,475,845 UART: [cold-reset] ++
1,476,227 UART: [fht] Storing FHT @ 0x50003400
1,478,970 UART: [idev] ++
1,479,138 UART: [idev] CDI.KEYID = 6
1,479,498 UART: [idev] SUBJECT.KEYID = 7
1,479,922 UART: [idev] UDS.KEYID = 0
1,480,267 ready_for_fw is high
1,480,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,780 UART: [idev] Erasing UDS.KEYID = 0
1,504,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,888 UART: [idev] --
1,513,789 UART: [ldev] ++
1,513,957 UART: [ldev] CDI.KEYID = 6
1,514,320 UART: [ldev] SUBJECT.KEYID = 5
1,514,746 UART: [ldev] AUTHORITY.KEYID = 7
1,515,209 UART: [ldev] FE.KEYID = 1
1,520,387 UART: [ldev] Erasing FE.KEYID = 1
1,544,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,030 UART: [ldev] --
1,584,481 UART: [fwproc] Waiting for Commands...
1,585,114 UART: [fwproc] Received command 0x46574c44
1,585,905 UART: [fwproc] Received Image of size 114448 bytes
2,886,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,706 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,058 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,147 >>> mbox cmd response: success
3,080,259 UART: [afmc] ++
3,080,427 UART: [afmc] CDI.KEYID = 6
3,080,789 UART: [afmc] SUBJECT.KEYID = 7
3,081,214 UART: [afmc] AUTHORITY.KEYID = 5
3,116,159 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,441 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,949 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,834 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,524 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,319 UART: [afmc] --
3,159,291 UART: [cold-reset] --
3,160,099 UART: [state] Locking Datavault
3,161,282 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,886 UART: [state] Locking ICCM
3,162,554 UART: [exit] Launching FMC @ 0x40000130
3,167,883 UART:
3,167,899 UART: Running Caliptra FMC ...
3,168,307 UART:
3,168,361 UART: [state] CFI Enabled
3,178,176 UART: [fht] FMC Alias Private Key: 7
3,286,773 UART: [art] Extend RT PCRs Done
3,287,201 UART: [art] Lock RT PCRs Done
3,288,577 UART: [art] Populate DV Done
3,297,110 UART: [fht] FMC Alias Private Key: 7
3,298,182 UART: [art] Derive CDI
3,298,462 UART: [art] Store in in slot 0x4
3,383,923 UART: [art] Derive Key Pair
3,384,283 UART: [art] Store priv key in slot 0x5
3,397,563 UART: [art] Derive Key Pair - Done
3,412,334 UART: [art] Signing Cert with AUTHO
3,412,814 UART: RITY.KEYID = 7
3,428,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,945 UART: [art] PUB.X = 0CE41A50A59B4196A4A5B4A0FA9C3E1020BAA8A6120F8996E93B3F940D6ECE7F126BFF003F0DD86CE360DD1ABD93FCA1
3,435,703 UART: [art] PUB.Y = 52BCB6CCB27FA90544073185ED4F4F1FD468237A86D40F5C4272A9EF35411AC9330204AA19EE03754F9E000A3D97F9D2
3,442,614 UART: [art] SIG.R = 4F1785D24115CCF3AC9873F61235072F092BDEF288A9C2632023E1B4DE0257BA53935A3E77BF700154037CA3974C51D2
3,449,365 UART: [art] SIG.S = 050D069F7B9BE1006E37C97F167D975B1211F5DE5654E87833FC5FCC4688A8520DCF892743D0D459BA645AED76B5481A
3,472,528 UART: Caliptra RT
3,472,781 UART: [state] CFI Enabled
3,580,773 UART: [rt] RT listening for mailbox commands...
3,581,443 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,483 UART: [rt]cmd =0x49444352, len=4
3,612,835 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,077 ready_for_fw is high
1,362,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,231 >>> mbox cmd response: success
2,989,131 UART:
2,989,147 UART: Running Caliptra FMC ...
2,989,555 UART:
2,989,609 UART: [state] CFI Enabled
2,999,736 UART: [fht] FMC Alias Private Key: 7
3,107,633 UART: [art] Extend RT PCRs Done
3,108,061 UART: [art] Lock RT PCRs Done
3,109,749 UART: [art] Populate DV Done
3,118,274 UART: [fht] FMC Alias Private Key: 7
3,119,418 UART: [art] Derive CDI
3,119,698 UART: [art] Store in in slot 0x4
3,205,231 UART: [art] Derive Key Pair
3,205,591 UART: [art] Store priv key in slot 0x5
3,218,689 UART: [art] Derive Key Pair - Done
3,233,643 UART: [art] Signing Cert with AUTHO
3,234,123 UART: RITY.KEYID = 7
3,249,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,122 UART: [art] PUB.X = 2A25A6FBDDF4FB859B9C024492085BE90AB225EA67BE6E1908D723A5F25309BF63415F3D12AC5C872E5CDE8D254AA89F
3,256,891 UART: [art] PUB.Y = EBDA80E7E3127BDC90D040EFB50575E7EA2B92CB472DB03615791DF5B472CBF6D4FADBF9980E32C7745722375C279F20
3,263,847 UART: [art] SIG.R = CA39971B1BAD7DC12497C4576D91E3DE45F708C21F97AC4AB3E8DD941B9E62A2813C951E099D8BAB0E6B4D4F40FED338
3,270,624 UART: [art] SIG.S = AC1053EF0AB558EB299C9DF138CBF115433B3C3803E5BCC733DEB07C3F5419CB7E44CE2690BBF4E2EB51559ECED303D2
3,294,458 UART: Caliptra RT
3,294,711 UART: [state] CFI Enabled
3,403,877 UART: [rt] RT listening for mailbox commands...
3,404,547 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,025 UART: [rt]cmd =0x49444352, len=4
3,435,569 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,028 UART: [kat] SHA2-256
881,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,074 UART: [kat] ++
886,226 UART: [kat] sha1
890,490 UART: [kat] SHA2-256
892,428 UART: [kat] SHA2-384
895,159 UART: [kat] SHA2-512-ACC
897,060 UART: [kat] ECC-384
902,881 UART: [kat] HMAC-384Kdf
907,689 UART: [kat] LMS
1,475,885 UART: [kat] --
1,476,630 UART: [cold-reset] ++
1,477,076 UART: [fht] Storing FHT @ 0x50003400
1,479,843 UART: [idev] ++
1,480,011 UART: [idev] CDI.KEYID = 6
1,480,371 UART: [idev] SUBJECT.KEYID = 7
1,480,795 UART: [idev] UDS.KEYID = 0
1,481,140 ready_for_fw is high
1,481,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,701 UART: [idev] Erasing UDS.KEYID = 0
1,505,209 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,823 UART: [idev] --
1,514,846 UART: [ldev] ++
1,515,014 UART: [ldev] CDI.KEYID = 6
1,515,377 UART: [ldev] SUBJECT.KEYID = 5
1,515,803 UART: [ldev] AUTHORITY.KEYID = 7
1,516,266 UART: [ldev] FE.KEYID = 1
1,521,354 UART: [ldev] Erasing FE.KEYID = 1
1,546,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,687 UART: [ldev] --
1,586,082 UART: [fwproc] Waiting for Commands...
1,586,759 UART: [fwproc] Received command 0x46574c44
1,587,550 UART: [fwproc] Received Image of size 114448 bytes
2,886,859 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,587 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,939 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,104 >>> mbox cmd response: success
3,081,344 UART: [afmc] ++
3,081,512 UART: [afmc] CDI.KEYID = 6
3,081,874 UART: [afmc] SUBJECT.KEYID = 7
3,082,299 UART: [afmc] AUTHORITY.KEYID = 5
3,117,518 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,816 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,209 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,899 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,678 UART: [afmc] --
3,160,626 UART: [cold-reset] --
3,161,356 UART: [state] Locking Datavault
3,162,455 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,059 UART: [state] Locking ICCM
3,163,651 UART: [exit] Launching FMC @ 0x40000130
3,168,980 UART:
3,168,996 UART: Running Caliptra FMC ...
3,169,404 UART:
3,169,547 UART: [state] CFI Enabled
3,179,834 UART: [fht] FMC Alias Private Key: 7
3,287,871 UART: [art] Extend RT PCRs Done
3,288,299 UART: [art] Lock RT PCRs Done
3,290,131 UART: [art] Populate DV Done
3,298,408 UART: [fht] FMC Alias Private Key: 7
3,299,370 UART: [art] Derive CDI
3,299,650 UART: [art] Store in in slot 0x4
3,385,371 UART: [art] Derive Key Pair
3,385,731 UART: [art] Store priv key in slot 0x5
3,399,055 UART: [art] Derive Key Pair - Done
3,414,236 UART: [art] Signing Cert with AUTHO
3,414,716 UART: RITY.KEYID = 7
3,429,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,663 UART: [art] PUB.X = 1A473587F1C382CA0896C25112037CA9995EA46FC7C822358A88C6818FF63A335CE02C73A1FF29B04DA88755C0E3B580
3,437,425 UART: [art] PUB.Y = B0C669DC30A6EBB66515FF15457761D5E3FCCD9C0E4C679274056EB8C37A3F517735FC2DDFA1EFDE1218F39C822B8F60
3,444,383 UART: [art] SIG.R = D86EBE9F9E4F106139BFF4FE93C7798C20C8B13235F725584B6A1E3B302162ECA68DB270CD26EED388090583B9B774C9
3,451,153 UART: [art] SIG.S = 2EEE5FD314DBF0CA69040AA6F1A12A629C54DC21A6C524461C6FEDB3E56274BB6203913967B2D322F5BB9546E1BE514A
3,474,901 UART: Caliptra RT
3,475,246 UART: [state] CFI Enabled
3,583,491 UART: [rt] RT listening for mailbox commands...
3,584,161 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,571 UART: [rt]cmd =0x49444352, len=4
3,615,055 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,726 ready_for_fw is high
1,362,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,400 >>> mbox cmd response: success
2,991,568 UART:
2,991,584 UART: Running Caliptra FMC ...
2,991,992 UART:
2,992,135 UART: [state] CFI Enabled
3,002,676 UART: [fht] FMC Alias Private Key: 7
3,110,699 UART: [art] Extend RT PCRs Done
3,111,127 UART: [art] Lock RT PCRs Done
3,112,333 UART: [art] Populate DV Done
3,120,402 UART: [fht] FMC Alias Private Key: 7
3,121,348 UART: [art] Derive CDI
3,121,628 UART: [art] Store in in slot 0x4
3,207,381 UART: [art] Derive Key Pair
3,207,741 UART: [art] Store priv key in slot 0x5
3,221,365 UART: [art] Derive Key Pair - Done
3,236,015 UART: [art] Signing Cert with AUTHO
3,236,495 UART: RITY.KEYID = 7
3,251,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,410 UART: [art] PUB.X = 36120CF75A8031429A62C5A358096C3DA1014CCCA55EF079A3B9950B3AE5E5A39B1C79AA119EAF1AED269E629C3A567A
3,259,178 UART: [art] PUB.Y = C17CB9182574E26F5BB601B87E8F56BC8DE62E942DE862DF0D4449EB8123ECFC9DF9245D06F4A8E55145EABE68F84A9E
3,266,135 UART: [art] SIG.R = D43B50170AD660D26ED528B64D11351E31BDA2A398E1F949B6692F5A9E7ECE2591367341CEB2008FC2C7269F89F31C1D
3,272,884 UART: [art] SIG.S = 5C4EF545EDDB08FEEF2A566A68E5133B3F8DF32AFF10F8FC68FE032234643DD5564E6A0410AC541848DE8016E69A30A6
3,296,324 UART: Caliptra RT
3,296,669 UART: [state] CFI Enabled
3,405,178 UART: [rt] RT listening for mailbox commands...
3,405,848 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,480 UART: [rt]cmd =0x49444352, len=4
3,436,932 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
893,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,311 UART: [kat] ++
897,463 UART: [kat] sha1
901,655 UART: [kat] SHA2-256
903,595 UART: [kat] SHA2-384
906,352 UART: [kat] SHA2-512-ACC
908,253 UART: [kat] ECC-384
917,670 UART: [kat] HMAC-384Kdf
922,284 UART: [kat] LMS
1,170,612 UART: [kat] --
1,171,651 UART: [cold-reset] ++
1,172,119 UART: [fht] FHT @ 0x50003400
1,174,718 UART: [idev] ++
1,174,886 UART: [idev] CDI.KEYID = 6
1,175,246 UART: [idev] SUBJECT.KEYID = 7
1,175,670 UART: [idev] UDS.KEYID = 0
1,176,015 ready_for_fw is high
1,176,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,664 UART: [idev] Erasing UDS.KEYID = 0
1,201,017 UART: [idev] Sha1 KeyId Algorithm
1,209,547 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,006 UART: [ldev] SUBJECT.KEYID = 5
1,211,432 UART: [ldev] AUTHORITY.KEYID = 7
1,211,895 UART: [ldev] FE.KEYID = 1
1,217,409 UART: [ldev] Erasing FE.KEYID = 1
1,243,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,987 UART: [ldev] --
1,283,376 UART: [fwproc] Wait for Commands...
1,284,182 UART: [fwproc] Recv command 0x46574c44
1,284,910 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,521 >>> mbox cmd response: success
2,777,695 UART: [afmc] ++
2,777,863 UART: [afmc] CDI.KEYID = 6
2,778,225 UART: [afmc] SUBJECT.KEYID = 7
2,778,650 UART: [afmc] AUTHORITY.KEYID = 5
2,813,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,920 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,648 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,533 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,252 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,080 UART: [afmc] --
2,857,110 UART: [cold-reset] --
2,858,016 UART: [state] Locking Datavault
2,859,079 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,683 UART: [state] Locking ICCM
2,860,287 UART: [exit] Launching FMC @ 0x40000130
2,865,616 UART:
2,865,632 UART: Running Caliptra FMC ...
2,866,040 UART:
2,866,094 UART: [state] CFI Enabled
2,876,823 UART: [fht] FMC Alias Private Key: 7
2,984,986 UART: [art] Extend RT PCRs Done
2,985,414 UART: [art] Lock RT PCRs Done
2,987,018 UART: [art] Populate DV Done
2,995,199 UART: [fht] FMC Alias Private Key: 7
2,996,271 UART: [art] Derive CDI
2,996,551 UART: [art] Store in in slot 0x4
3,081,878 UART: [art] Derive Key Pair
3,082,238 UART: [art] Store priv key in slot 0x5
3,095,614 UART: [art] Derive Key Pair - Done
3,110,554 UART: [art] Signing Cert with AUTHO
3,111,034 UART: RITY.KEYID = 7
3,125,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,605 UART: [art] PUB.X = 6FE3D7A4FCC0DDE6DE0C0C0AC68413E5AF7D45E2C08E5EFB4F9A8FE83D5A441296E42B60261F2DA429BDBE2D06796EDD
3,133,391 UART: [art] PUB.Y = 53E607851C92B9BCEE4500C05205519B619540BF64B09CC25D4847A9FA5BAFA89C9716268E70E342331AAA4313E217F1
3,140,311 UART: [art] SIG.R = 1837C5527EF3FDD2EE213BB59840AA6AC958C4E84B246C76D75A4F9DD21CF6985A15DE6A469015F8E77FE2430FE97410
3,147,086 UART: [art] SIG.S = 1BE84C6406CB938ABE6713FA4DF7FD90830185C4B35E0521676226EDD89402570BA00230627BDA28888FD33EB4EA4A76
3,171,261 UART: Caliptra RT
3,171,514 UART: [state] CFI Enabled
3,278,823 UART: [rt] RT listening for mailbox commands...
3,279,493 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,083 UART: [rt]cmd =0x49444352, len=4
3,310,585 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,425 ready_for_fw is high
1,060,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,387 >>> mbox cmd response: success
2,690,147 UART:
2,690,163 UART: Running Caliptra FMC ...
2,690,571 UART:
2,690,625 UART: [state] CFI Enabled
2,701,068 UART: [fht] FMC Alias Private Key: 7
2,808,697 UART: [art] Extend RT PCRs Done
2,809,125 UART: [art] Lock RT PCRs Done
2,810,731 UART: [art] Populate DV Done
2,818,930 UART: [fht] FMC Alias Private Key: 7
2,820,002 UART: [art] Derive CDI
2,820,282 UART: [art] Store in in slot 0x4
2,905,505 UART: [art] Derive Key Pair
2,905,865 UART: [art] Store priv key in slot 0x5
2,918,871 UART: [art] Derive Key Pair - Done
2,934,022 UART: [art] Signing Cert with AUTHO
2,934,502 UART: RITY.KEYID = 7
2,949,618 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,383 UART: [art] PUB.X = E50023654B0A0A9682632FFFD56233D03A5C907707B5D90787136F865219CF092B9CE2D2D67002ECEEC45B25E7F1CCAD
2,957,117 UART: [art] PUB.Y = 0DFFC7980C07C9654E5FB27697DE99318818198FC3949EFC4215A6C50FE6CCBDCE5C5E05A1840D339211D78A33A8FE3A
2,964,059 UART: [art] SIG.R = 38CA744ACAB8CA5EA8B7F408EEEA73F4366C67DA5BCF4F67EB09062B7C90978B93833ADAC957393188A46BDF018C9958
2,970,831 UART: [art] SIG.S = 5F016A8E27B322444DB3C380BEB58ABE268E2AFD2E478A20122CC3D86ECE1A62D6F18ACE2558B29A305F42670562F35B
2,995,122 UART: Caliptra RT
2,995,375 UART: [state] CFI Enabled
3,103,072 UART: [rt] RT listening for mailbox commands...
3,103,742 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,454 UART: [rt]cmd =0x49444352, len=4
3,134,644 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
893,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,592 UART: [kat] ++
897,744 UART: [kat] sha1
901,952 UART: [kat] SHA2-256
903,892 UART: [kat] SHA2-384
906,719 UART: [kat] SHA2-512-ACC
908,620 UART: [kat] ECC-384
918,449 UART: [kat] HMAC-384Kdf
922,909 UART: [kat] LMS
1,171,237 UART: [kat] --
1,172,312 UART: [cold-reset] ++
1,172,648 UART: [fht] FHT @ 0x50003400
1,175,439 UART: [idev] ++
1,175,607 UART: [idev] CDI.KEYID = 6
1,175,967 UART: [idev] SUBJECT.KEYID = 7
1,176,391 UART: [idev] UDS.KEYID = 0
1,176,736 ready_for_fw is high
1,176,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,283 UART: [idev] Erasing UDS.KEYID = 0
1,201,622 UART: [idev] Sha1 KeyId Algorithm
1,210,278 UART: [idev] --
1,211,382 UART: [ldev] ++
1,211,550 UART: [ldev] CDI.KEYID = 6
1,211,913 UART: [ldev] SUBJECT.KEYID = 5
1,212,339 UART: [ldev] AUTHORITY.KEYID = 7
1,212,802 UART: [ldev] FE.KEYID = 1
1,218,118 UART: [ldev] Erasing FE.KEYID = 1
1,244,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,760 UART: [ldev] --
1,284,223 UART: [fwproc] Wait for Commands...
1,284,901 UART: [fwproc] Recv command 0x46574c44
1,285,629 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,131 >>> mbox cmd response: success
2,778,199 UART: [afmc] ++
2,778,367 UART: [afmc] CDI.KEYID = 6
2,778,729 UART: [afmc] SUBJECT.KEYID = 7
2,779,154 UART: [afmc] AUTHORITY.KEYID = 5
2,814,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,963 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,682 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,462 UART: [afmc] --
2,858,428 UART: [cold-reset] --
2,859,460 UART: [state] Locking Datavault
2,860,611 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,215 UART: [state] Locking ICCM
2,861,837 UART: [exit] Launching FMC @ 0x40000130
2,867,166 UART:
2,867,182 UART: Running Caliptra FMC ...
2,867,590 UART:
2,867,733 UART: [state] CFI Enabled
2,878,200 UART: [fht] FMC Alias Private Key: 7
2,986,119 UART: [art] Extend RT PCRs Done
2,986,547 UART: [art] Lock RT PCRs Done
2,988,157 UART: [art] Populate DV Done
2,996,520 UART: [fht] FMC Alias Private Key: 7
2,997,562 UART: [art] Derive CDI
2,997,842 UART: [art] Store in in slot 0x4
3,083,883 UART: [art] Derive Key Pair
3,084,243 UART: [art] Store priv key in slot 0x5
3,097,369 UART: [art] Derive Key Pair - Done
3,111,942 UART: [art] Signing Cert with AUTHO
3,112,422 UART: RITY.KEYID = 7
3,127,558 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,323 UART: [art] PUB.X = DC5DC86D5AE98993524EF7E5D219407B925793268A706B21FD4D52506C46E9FAA129B97CAFC402DFEB9EC21479EE0073
3,135,076 UART: [art] PUB.Y = 6CF0F20EAA1D013F2CBCBC25DF0434B443595FBFD43D4F2B81EA452C6E6ADDA52635D98AA2D6DAADF4DA86FA183804DE
3,142,044 UART: [art] SIG.R = 40A626886AE4488FAF798A97C48AA5A25298AB0CE345EDDA0A23D1ADAEE7BEF4360D08524FE151A637FCB6D76F96AFF2
3,148,822 UART: [art] SIG.S = 6F8E2C29EDD8E39ABDCD83DC169792388213812F5F8479DCCBEB660E267A7EF59A39D3EC8F8D8015DCDDD30CC5179055
3,173,003 UART: Caliptra RT
3,173,348 UART: [state] CFI Enabled
3,280,949 UART: [rt] RT listening for mailbox commands...
3,281,619 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,343 UART: [rt]cmd =0x49444352, len=4
3,312,531 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,346 ready_for_fw is high
1,060,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,136 >>> mbox cmd response: success
2,690,698 UART:
2,690,714 UART: Running Caliptra FMC ...
2,691,122 UART:
2,691,265 UART: [state] CFI Enabled
2,701,874 UART: [fht] FMC Alias Private Key: 7
2,809,677 UART: [art] Extend RT PCRs Done
2,810,105 UART: [art] Lock RT PCRs Done
2,811,825 UART: [art] Populate DV Done
2,819,834 UART: [fht] FMC Alias Private Key: 7
2,820,970 UART: [art] Derive CDI
2,821,250 UART: [art] Store in in slot 0x4
2,906,861 UART: [art] Derive Key Pair
2,907,221 UART: [art] Store priv key in slot 0x5
2,920,519 UART: [art] Derive Key Pair - Done
2,935,616 UART: [art] Signing Cert with AUTHO
2,936,096 UART: RITY.KEYID = 7
2,951,422 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,187 UART: [art] PUB.X = 2EE1C55FE3E17A10D1BE1FCEE509BF50663A9652425CBDA5DC271C8CBB7F4974B87B3DB54AFDFDD47FAF816D4694D603
2,958,975 UART: [art] PUB.Y = F40B9238BAE89E024752330CEBFF26FA88A8EF0AEF60EC2BFB367A6292E65C738574F904F110BFCD48020A439CBCE3AD
2,965,922 UART: [art] SIG.R = 8930AA2B8B4AAB9DBDC72818F59A8C652B62F39165FF89FAB58F6020981076A70E39E59FA1487E5ED58BE00EEEE4A407
2,972,695 UART: [art] SIG.S = 58FE725B67438564A02943937B2AD45AAE5AA5AEF1F945E27F017AD2342016F33BC21AC0F9A53AE2DA29AFA386FE9C5B
2,996,229 UART: Caliptra RT
2,996,574 UART: [state] CFI Enabled
3,104,045 UART: [rt] RT listening for mailbox commands...
3,104,715 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,175 UART: [rt]cmd =0x49444352, len=4
3,135,405 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,593 UART: [kat] ++
895,745 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,710 UART: [kat] SHA2-512-ACC
906,611 UART: [kat] ECC-384
916,064 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,174,375 ready_for_fw is high
1,174,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,805 UART: [idev] Erasing UDS.KEYID = 0
1,199,427 UART: [idev] Sha1 KeyId Algorithm
1,208,179 UART: [idev] --
1,209,266 UART: [ldev] ++
1,209,434 UART: [ldev] CDI.KEYID = 6
1,209,798 UART: [ldev] SUBJECT.KEYID = 5
1,210,225 UART: [ldev] AUTHORITY.KEYID = 7
1,210,688 UART: [ldev] FE.KEYID = 1
1,215,754 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,186 UART: [ldev] --
1,281,566 UART: [fwproc] Wait for Commands...
1,282,183 UART: [fwproc] Recv command 0x46574c44
1,282,916 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,265 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,349 >>> mbox cmd response: success
2,775,454 UART: [afmc] ++
2,775,622 UART: [afmc] CDI.KEYID = 6
2,775,985 UART: [afmc] SUBJECT.KEYID = 7
2,776,411 UART: [afmc] AUTHORITY.KEYID = 5
2,811,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,413 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,132 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,913 UART: [afmc] --
2,854,859 UART: [cold-reset] --
2,855,747 UART: [state] Locking Datavault
2,856,816 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,420 UART: [state] Locking ICCM
2,857,916 UART: [exit] Launching FMC @ 0x40000130
2,863,245 UART:
2,863,261 UART: Running Caliptra FMC ...
2,863,669 UART:
2,863,723 UART: [state] CFI Enabled
2,874,300 UART: [fht] FMC Alias Private Key: 7
2,982,179 UART: [art] Extend RT PCRs Done
2,982,607 UART: [art] Lock RT PCRs Done
2,983,959 UART: [art] Populate DV Done
2,991,964 UART: [fht] FMC Alias Private Key: 7
2,992,942 UART: [art] Derive CDI
2,993,222 UART: [art] Store in in slot 0x4
3,079,147 UART: [art] Derive Key Pair
3,079,507 UART: [art] Store priv key in slot 0x5
3,092,491 UART: [art] Derive Key Pair - Done
3,107,356 UART: [art] Signing Cert with AUTHO
3,107,836 UART: RITY.KEYID = 7
3,122,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,727 UART: [art] PUB.X = 14C6BCBF7E16B634AEB0C5FA439D94854813907CF2C75168D053486E2BE748826EDE8AE35C0E62101CDB36539CD99610
3,130,498 UART: [art] PUB.Y = 16F475F5CEC4AF3C12A18B4D9BD3EBF31B81A8BA44C3D476343491D2D4100EFC6BD4D8AE888D8E549BE2A10D744B2EC4
3,137,462 UART: [art] SIG.R = 161694E9FE9668AE48B159484C6FEB8C3A2AAEADDDB82E4900D0F300054CC1A19D23A4CA5CEA2200FB24081691723FDB
3,144,174 UART: [art] SIG.S = E3DC63B2538075C10D8A1387B22F9987CC4061510294567EC998C11FE562FB7660C314AB53D1C7736BFCBAA9CA619F2C
3,167,803 UART: Caliptra RT
3,168,056 UART: [state] CFI Enabled
3,275,835 UART: [rt] RT listening for mailbox commands...
3,276,505 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,325 UART: [rt]cmd =0x49444352, len=4
3,308,005 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,772 ready_for_fw is high
1,055,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,100 >>> mbox cmd response: success
2,685,510 UART:
2,685,526 UART: Running Caliptra FMC ...
2,685,934 UART:
2,685,988 UART: [state] CFI Enabled
2,696,311 UART: [fht] FMC Alias Private Key: 7
2,803,708 UART: [art] Extend RT PCRs Done
2,804,136 UART: [art] Lock RT PCRs Done
2,805,620 UART: [art] Populate DV Done
2,813,737 UART: [fht] FMC Alias Private Key: 7
2,814,745 UART: [art] Derive CDI
2,815,025 UART: [art] Store in in slot 0x4
2,900,554 UART: [art] Derive Key Pair
2,900,914 UART: [art] Store priv key in slot 0x5
2,914,194 UART: [art] Derive Key Pair - Done
2,929,303 UART: [art] Signing Cert with AUTHO
2,929,783 UART: RITY.KEYID = 7
2,944,715 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,480 UART: [art] PUB.X = 74E77FD622A444CE09ED36253397B43EA934E1BCA2B2E5DE723E9AA7CFAA9172874CF3430672B25A102833413EAE0840
2,952,245 UART: [art] PUB.Y = EB6ED9932F1B3BB9D9AC2BE93EF7244B181F0FDF6EFD5BCB467FB1368E83861FBCAEAE856F6F30E067D0C8CA3CEEF64E
2,959,226 UART: [art] SIG.R = 4C246896BEAD8E73741DCB89DF3EE9813A709413536EDC89E3622996FF58DA7E904D3F13CB8A54A1F64856BE49AFA4E6
2,966,006 UART: [art] SIG.S = 37E042A0E8E0CB2DFC983BD9F4E60F56890BBA489DBCC793DF95EC895BFBE4264EF1A0A6F6D37E6CFD1C00DDB8B49AD7
2,990,145 UART: Caliptra RT
2,990,398 UART: [state] CFI Enabled
3,098,423 UART: [rt] RT listening for mailbox commands...
3,099,093 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,751 UART: [rt]cmd =0x49444352, len=4
3,130,291 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,903 UART: [kat] LMS
1,169,215 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,486 UART: [fht] FHT @ 0x50003400
1,173,304 UART: [idev] ++
1,173,472 UART: [idev] CDI.KEYID = 6
1,173,833 UART: [idev] SUBJECT.KEYID = 7
1,174,258 UART: [idev] UDS.KEYID = 0
1,174,604 ready_for_fw is high
1,174,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,253 UART: [ldev] ++
1,209,421 UART: [ldev] CDI.KEYID = 6
1,209,785 UART: [ldev] SUBJECT.KEYID = 5
1,210,212 UART: [ldev] AUTHORITY.KEYID = 7
1,210,675 UART: [ldev] FE.KEYID = 1
1,215,855 UART: [ldev] Erasing FE.KEYID = 1
1,242,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,729 UART: [ldev] --
1,281,997 UART: [fwproc] Wait for Commands...
1,282,688 UART: [fwproc] Recv command 0x46574c44
1,283,421 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,815 >>> mbox cmd response: success
2,776,894 UART: [afmc] ++
2,777,062 UART: [afmc] CDI.KEYID = 6
2,777,425 UART: [afmc] SUBJECT.KEYID = 7
2,777,851 UART: [afmc] AUTHORITY.KEYID = 5
2,813,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,715 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,327 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,046 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,775 UART: [afmc] --
2,856,667 UART: [cold-reset] --
2,857,513 UART: [state] Locking Datavault
2,858,756 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,360 UART: [state] Locking ICCM
2,859,978 UART: [exit] Launching FMC @ 0x40000130
2,865,307 UART:
2,865,323 UART: Running Caliptra FMC ...
2,865,731 UART:
2,865,874 UART: [state] CFI Enabled
2,876,531 UART: [fht] FMC Alias Private Key: 7
2,985,130 UART: [art] Extend RT PCRs Done
2,985,558 UART: [art] Lock RT PCRs Done
2,987,138 UART: [art] Populate DV Done
2,995,271 UART: [fht] FMC Alias Private Key: 7
2,996,321 UART: [art] Derive CDI
2,996,601 UART: [art] Store in in slot 0x4
3,082,414 UART: [art] Derive Key Pair
3,082,774 UART: [art] Store priv key in slot 0x5
3,096,098 UART: [art] Derive Key Pair - Done
3,110,937 UART: [art] Signing Cert with AUTHO
3,111,417 UART: RITY.KEYID = 7
3,126,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,524 UART: [art] PUB.X = 88EE5FF06DF89D8916EA4B6405E8AF6C17C3DE8D2B549C054A9500C33BB11EF446AB6F5E77B57985C407718319147797
3,134,265 UART: [art] PUB.Y = 853528CAA0C7C9B6D8804D5520767F86EF47608C3DFB57C8DE9009752BEED856BB0581E768E152EA851BBF9472197B03
3,141,208 UART: [art] SIG.R = 188EFBC4D9D1C8BF1BB44488A1A2C5C44902F7E4232BCB4700BF2015DF14314A80D4F3326C21BD5777CCF006F5E71F05
3,147,957 UART: [art] SIG.S = ED1B2A72B4ACAFCF886F3708A2A827F85A5AEF56CE52504E65A5030D12267874E99E8C0ECBE4B92708CA554D0FF510A2
3,171,266 UART: Caliptra RT
3,171,611 UART: [state] CFI Enabled
3,277,708 UART: [rt] RT listening for mailbox commands...
3,278,378 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,098 UART: [rt]cmd =0x49444352, len=4
3,309,568 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,911 ready_for_fw is high
1,055,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,493 >>> mbox cmd response: success
2,686,559 UART:
2,686,575 UART: Running Caliptra FMC ...
2,686,983 UART:
2,687,126 UART: [state] CFI Enabled
2,697,685 UART: [fht] FMC Alias Private Key: 7
2,805,106 UART: [art] Extend RT PCRs Done
2,805,534 UART: [art] Lock RT PCRs Done
2,807,308 UART: [art] Populate DV Done
2,815,453 UART: [fht] FMC Alias Private Key: 7
2,816,591 UART: [art] Derive CDI
2,816,871 UART: [art] Store in in slot 0x4
2,902,324 UART: [art] Derive Key Pair
2,902,684 UART: [art] Store priv key in slot 0x5
2,915,778 UART: [art] Derive Key Pair - Done
2,930,396 UART: [art] Signing Cert with AUTHO
2,930,876 UART: RITY.KEYID = 7
2,946,236 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,001 UART: [art] PUB.X = F20D83BD84D049028B32EADC504E28A426A5D07926CF32F4A9588E76C3D05C0DD0371C442FB402B02FF9D8B77D724DA9
2,953,767 UART: [art] PUB.Y = 4B77DDF5990ED7D35A641C8CE7DF613386BCF1EB10E44B5CA555CB9AF4C58EC013AE2B5145F608D200938D57E0853B69
2,960,701 UART: [art] SIG.R = 4B864CD83BAB58DA17DAD2250929344567D44384B4653288C3F86EB0D7BCF6FBCE12351C87972CBEEED17B539D30E535
2,967,476 UART: [art] SIG.S = F6C8EE9823D30DB485780F21ED75D4E24FAFE08A243D091C4201075AB810C3C0A2FC73F10B1AB199BC2B86C517D89E56
2,990,843 UART: Caliptra RT
2,991,188 UART: [state] CFI Enabled
3,099,629 UART: [rt] RT listening for mailbox commands...
3,100,299 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,915 UART: [rt]cmd =0x49444352, len=4
3,131,269 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
192,367 UART:
192,721 UART: Running Caliptra ROM ...
193,907 UART:
194,067 UART: [state] CFI Enabled
261,621 UART: [state] LifecycleState = Unprovisioned
263,616 UART: [state] DebugLocked = No
266,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,150 UART: [kat] SHA2-256
441,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,331 UART: [kat] ++
452,816 UART: [kat] sha1
463,618 UART: [kat] SHA2-256
466,265 UART: [kat] SHA2-384
473,111 UART: [kat] SHA2-512-ACC
475,427 UART: [kat] ECC-384
2,767,554 UART: [kat] HMAC-384Kdf
2,800,034 UART: [kat] LMS
3,990,345 UART: [kat] --
3,995,712 UART: [cold-reset] ++
3,997,646 UART: [fht] Storing FHT @ 0x50003400
4,010,118 UART: [idev] ++
4,010,687 UART: [idev] CDI.KEYID = 6
4,011,579 UART: [idev] SUBJECT.KEYID = 7
4,012,894 UART: [idev] UDS.KEYID = 0
4,013,862 ready_for_fw is high
4,014,053 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,581 UART: [idev] Erasing UDS.KEYID = 0
7,345,749 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,289 UART: [idev] --
7,372,066 UART: [ldev] ++
7,372,712 UART: [ldev] CDI.KEYID = 6
7,373,642 UART: [ldev] SUBJECT.KEYID = 5
7,374,851 UART: [ldev] AUTHORITY.KEYID = 7
7,376,081 UART: [ldev] FE.KEYID = 1
7,404,990 UART: [ldev] Erasing FE.KEYID = 1
10,739,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,836 UART: [ldev] --
13,118,563 UART: [fwproc] Waiting for Commands...
13,120,824 UART: [fwproc] Received command 0x46574c44
13,123,004 UART: [fwproc] Received Image of size 114124 bytes
17,173,670 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,456 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,637,056 >>> mbox cmd response: success
17,637,588 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,640,555 UART: [afmc] ++
17,641,139 UART: [afmc] CDI.KEYID = 6
17,642,081 UART: [afmc] SUBJECT.KEYID = 7
17,643,211 UART: [afmc] AUTHORITY.KEYID = 5
21,010,696 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,097 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,414 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,791 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,619 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,079 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,867 UART: [afmc] --
23,381,973 UART: [cold-reset] --
23,385,081 UART: [state] Locking Datavault
23,392,726 UART: [state] Locking PCR0, PCR1 and PCR31
23,394,435 UART: [state] Locking ICCM
23,395,831 UART: [exit] Launching FMC @ 0x40000130
23,404,176 UART:
23,404,412 UART: Running Caliptra FMC ...
23,405,510 UART:
23,405,670 UART: [state] CFI Enabled
23,468,562 UART: [fht] FMC Alias Private Key: 7
25,806,944 UART: [art] Extend RT PCRs Done
25,808,308 UART: [art] Lock RT PCRs Done
25,809,790 UART: [art] Populate DV Done
25,815,286 UART: [fht] FMC Alias Private Key: 7
25,816,980 UART: [art] Derive CDI
25,817,717 UART: [art] Store in in slot 0x4
25,876,297 UART: [art] Derive Key Pair
25,877,294 UART: [art] Store priv key in slot 0x5
29,170,368 UART: [art] Derive Key Pair - Done
29,183,424 UART: [art] Signing Cert with AUTHO
29,184,730 UART: RITY.KEYID = 7
31,471,688 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,195 UART: [art] PUB.X = F18996C2386BA51CC41A77DA3D46E42CA0CB78E8C5720639E7EBB0B741F6F54EF54849A92B1B2CE28511D0589B0092FF
31,480,382 UART: [art] PUB.Y = 38287F1471E171B722ED8D4F647A3AFB8782C0E58C7F15AB6003EEAAC6A2B1B55E81D5726EEB4F6DA6EDE5CFB3D8E6AE
31,487,672 UART: [art] SIG.R = 2664E1BCD8DB4FEEFF381DB2617E725EF438AA618C7810808580FAC95EF636234BE6E2698AEB2F775456D43A961EDE6E
31,495,150 UART: [art] SIG.S = 136D3D348805F850A976162C98209C54E1C242E8CDD8A2BF0CBAFE8EB1388EFCEF135FF5900162C422EC703259FEC9ED
32,800,746 UART: Caliptra RT
32,801,456 UART: [state] CFI Enabled
32,976,929 UART: [rt] RT listening for mailbox commands...
33,008,333 UART: [rt]cmd =0x43415053, len=4
33,010,221 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,804,235 ready_for_fw is high
3,804,756 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,894,028 >>> mbox cmd response: success
17,894,901 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,588,652 UART:
23,589,035 UART: Running Caliptra FMC ...
23,590,146 UART:
23,590,301 UART: [state] CFI Enabled
23,659,075 UART: [fht] FMC Alias Private Key: 7
25,997,402 UART: [art] Extend RT PCRs Done
25,998,789 UART: [art] Lock RT PCRs Done
26,000,024 UART: [art] Populate DV Done
26,005,250 UART: [fht] FMC Alias Private Key: 7
26,006,745 UART: [art] Derive CDI
26,007,515 UART: [art] Store in in slot 0x4
26,068,534 UART: [art] Derive Key Pair
26,069,554 UART: [art] Store priv key in slot 0x5
29,362,403 UART: [art] Derive Key Pair - Done
29,375,298 UART: [art] Signing Cert with AUTHO
29,376,613 UART: RITY.KEYID = 7
31,664,327 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,835 UART: [art] PUB.X = F5A7953268DFB84B70768F6B370EA1EDBAFDDA1CEA9100CDF02B9225475C7C87B1CD057C3C01DBABCB8838B56DF49A7F
31,673,103 UART: [art] PUB.Y = 656D5AF4291BEC619BBD8DD1FED77B623445669DE547A7D5FBF453409352F752E43DF082CC2F8765DFE528F1278CF541
31,680,349 UART: [art] SIG.R = B57EEA7BD9597F300433BECA01F8AB95E71DE9E250A9008541B06CB3001AD8FCC82D28B7E4EC4BBE1AF306D48023DEB6
31,687,719 UART: [art] SIG.S = 0BAB72B120EC46FEA4FA3D89FBEFB945875ECBD5DB3D705165288B25D14BE68D6BE3A392A259829E19D811AAC4BDB381
32,993,217 UART: Caliptra RT
32,993,932 UART: [state] CFI Enabled
33,154,426 UART: [rt] RT listening for mailbox commands...
33,185,735 UART: [rt]cmd =0x43415053, len=4
33,187,585 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,531 UART:
192,900 UART: Running Caliptra ROM ...
194,099 UART:
603,830 UART: [state] CFI Enabled
615,928 UART: [state] LifecycleState = Unprovisioned
617,801 UART: [state] DebugLocked = No
620,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,631 UART: [kat] SHA2-256
795,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,887 UART: [kat] ++
806,404 UART: [kat] sha1
818,075 UART: [kat] SHA2-256
820,774 UART: [kat] SHA2-384
825,983 UART: [kat] SHA2-512-ACC
828,342 UART: [kat] ECC-384
3,113,817 UART: [kat] HMAC-384Kdf
3,125,639 UART: [kat] LMS
4,315,751 UART: [kat] --
4,320,338 UART: [cold-reset] ++
4,321,561 UART: [fht] Storing FHT @ 0x50003400
4,332,976 UART: [idev] ++
4,333,571 UART: [idev] CDI.KEYID = 6
4,334,521 UART: [idev] SUBJECT.KEYID = 7
4,335,757 UART: [idev] UDS.KEYID = 0
4,336,709 ready_for_fw is high
4,336,926 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,117 UART: [idev] Erasing UDS.KEYID = 0
7,622,253 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,656 UART: [idev] --
7,646,103 UART: [ldev] ++
7,646,669 UART: [ldev] CDI.KEYID = 6
7,647,678 UART: [ldev] SUBJECT.KEYID = 5
7,648,835 UART: [ldev] AUTHORITY.KEYID = 7
7,650,116 UART: [ldev] FE.KEYID = 1
7,662,326 UART: [ldev] Erasing FE.KEYID = 1
10,947,402 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,577 UART: [ldev] --
13,304,756 UART: [fwproc] Waiting for Commands...
13,307,057 UART: [fwproc] Received command 0x46574c44
13,309,236 UART: [fwproc] Received Image of size 114124 bytes
17,361,981 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,384 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,259 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,790 >>> mbox cmd response: success
17,832,286 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,836,685 UART: [afmc] ++
17,837,263 UART: [afmc] CDI.KEYID = 6
17,838,229 UART: [afmc] SUBJECT.KEYID = 7
17,839,436 UART: [afmc] AUTHORITY.KEYID = 5
21,157,208 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,164 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,420 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,793 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,652 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,053 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,805 UART: [afmc] --
23,523,983 UART: [cold-reset] --
23,527,021 UART: [state] Locking Datavault
23,532,118 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,853 UART: [state] Locking ICCM
23,536,244 UART: [exit] Launching FMC @ 0x40000130
23,544,631 UART:
23,544,863 UART: Running Caliptra FMC ...
23,545,969 UART:
23,546,119 UART: [state] CFI Enabled
23,554,377 UART: [fht] FMC Alias Private Key: 7
25,886,304 UART: [art] Extend RT PCRs Done
25,887,526 UART: [art] Lock RT PCRs Done
25,889,169 UART: [art] Populate DV Done
25,894,377 UART: [fht] FMC Alias Private Key: 7
25,896,083 UART: [art] Derive CDI
25,896,819 UART: [art] Store in in slot 0x4
25,939,463 UART: [art] Derive Key Pair
25,940,504 UART: [art] Store priv key in slot 0x5
29,181,937 UART: [art] Derive Key Pair - Done
29,194,932 UART: [art] Signing Cert with AUTHO
29,196,235 UART: RITY.KEYID = 7
31,475,469 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,978 UART: [art] PUB.X = F3749B677F93EE296E27FC9C7583C05DEB476CF5075AC8A7EFB3AACF1051259FF71A9298377E966DA17302E50F811E16
31,484,211 UART: [art] PUB.Y = 04C448E7645A01DB6BFE14BE69D557C774F5F6BD9BF330BED0173D93ABF4E2892747780A6893838F23F4A37C67B3D60F
31,491,482 UART: [art] SIG.R = EB00787361E451F26A5F359B3FAF798A9DC5223EEB64066D95850EA5DE9B9783813E4FAB2F8523280618045264C384DD
31,498,866 UART: [art] SIG.S = 4634BA760C37F3F81402C5C4447AA393D921882AD3DFB5F485D6C2CCCD0E1D910178F511A9C42D0BB2E22F0F6401E74B
32,804,292 UART: Caliptra RT
32,805,001 UART: [state] CFI Enabled
32,922,506 UART: [rt] RT listening for mailbox commands...
32,953,995 UART: [rt]cmd =0x43415053, len=4
32,955,619 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,128,011 ready_for_fw is high
4,128,439 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,787 >>> mbox cmd response: success
18,067,611 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,709,061 UART:
23,709,494 UART: Running Caliptra FMC ...
23,710,592 UART:
23,710,738 UART: [state] CFI Enabled
23,719,010 UART: [fht] FMC Alias Private Key: 7
26,049,638 UART: [art] Extend RT PCRs Done
26,050,870 UART: [art] Lock RT PCRs Done
26,052,417 UART: [art] Populate DV Done
26,057,857 UART: [fht] FMC Alias Private Key: 7
26,059,505 UART: [art] Derive CDI
26,060,237 UART: [art] Store in in slot 0x4
26,103,273 UART: [art] Derive Key Pair
26,104,315 UART: [art] Store priv key in slot 0x5
29,345,829 UART: [art] Derive Key Pair - Done
29,358,913 UART: [art] Signing Cert with AUTHO
29,360,224 UART: RITY.KEYID = 7
31,639,337 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,352 UART: [art] PUB.X = 189CD7D6793EB150DB4592A1D74264FAFE2F2039FAD73CD0D8407D78FFA57834368ED4047049431F1B2356C8A22472DE
31,648,111 UART: [art] PUB.Y = AB73F08916D59D8499546EA5147403DA9BCA6ED4D98B057159947541425DE56AFEF0A0851825A670DD8EFD75B025079B
31,655,309 UART: [art] SIG.R = AA795ADFFCE2CF3913E90ECFF7F284F3683DD1E6F94B38EF03D64D0836E04840CCBD6E3A919A0D062369033DA8155FE4
31,662,699 UART: [art] SIG.S = 69258FF3D8B8648F0559A4DFEA74D8DFA60C60BBEE1925994A6783AB9F206CA97536122594865B64D557D3D5314D1E9A
32,968,081 UART: Caliptra RT
32,968,802 UART: [state] CFI Enabled
33,086,157 UART: [rt] RT listening for mailbox commands...
33,117,221 UART: [rt]cmd =0x43415053, len=4
33,118,963 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,140 UART:
192,513 UART: Running Caliptra ROM ...
193,661 UART:
193,811 UART: [state] CFI Enabled
263,564 UART: [state] LifecycleState = Unprovisioned
265,399 UART: [state] DebugLocked = No
267,925 UART: [state] WD Timer not started. Device not locked for debugging
271,961 UART: [kat] SHA2-256
451,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,654 UART: [kat] ++
463,193 UART: [kat] sha1
474,289 UART: [kat] SHA2-256
477,305 UART: [kat] SHA2-384
483,792 UART: [kat] SHA2-512-ACC
486,745 UART: [kat] ECC-384
2,948,521 UART: [kat] HMAC-384Kdf
2,973,900 UART: [kat] LMS
3,503,296 UART: [kat] --
3,508,138 UART: [cold-reset] ++
3,509,992 UART: [fht] FHT @ 0x50003400
3,520,896 UART: [idev] ++
3,521,460 UART: [idev] CDI.KEYID = 6
3,522,444 UART: [idev] SUBJECT.KEYID = 7
3,523,617 UART: [idev] UDS.KEYID = 0
3,524,539 ready_for_fw is high
3,524,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,678 UART: [idev] Erasing UDS.KEYID = 0
6,029,429 UART: [idev] Sha1 KeyId Algorithm
6,051,620 UART: [idev] --
6,055,688 UART: [ldev] ++
6,056,322 UART: [ldev] CDI.KEYID = 6
6,057,239 UART: [ldev] SUBJECT.KEYID = 5
6,058,385 UART: [ldev] AUTHORITY.KEYID = 7
6,059,548 UART: [ldev] FE.KEYID = 1
6,103,465 UART: [ldev] Erasing FE.KEYID = 1
8,608,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,921 UART: [ldev] --
10,416,991 UART: [fwproc] Wait for Commands...
10,420,108 UART: [fwproc] Recv command 0x46574c44
10,422,195 UART: [fwproc] Recv'd Img size: 114448 bytes
13,824,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,285,423 >>> mbox cmd response: success
14,285,914 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,289,308 UART: [afmc] ++
14,289,917 UART: [afmc] CDI.KEYID = 6
14,290,805 UART: [afmc] SUBJECT.KEYID = 7
14,291,912 UART: [afmc] AUTHORITY.KEYID = 5
16,831,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,560,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,561,957 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,577,693 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,593,748 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,609,625 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,633,180 UART: [afmc] --
18,636,930 UART: [cold-reset] --
18,638,844 UART: [state] Locking Datavault
18,644,113 UART: [state] Locking PCR0, PCR1 and PCR31
18,645,811 UART: [state] Locking ICCM
18,647,450 UART: [exit] Launching FMC @ 0x40000130
18,655,848 UART:
18,656,080 UART: Running Caliptra FMC ...
18,657,183 UART:
18,657,337 UART: [state] CFI Enabled
18,716,588 UART: [fht] FMC Alias Private Key: 7
20,480,836 UART: [art] Extend RT PCRs Done
20,482,065 UART: [art] Lock RT PCRs Done
20,483,670 UART: [art] Populate DV Done
20,489,033 UART: [fht] FMC Alias Private Key: 7
20,490,574 UART: [art] Derive CDI
20,491,388 UART: [art] Store in in slot 0x4
20,549,308 UART: [art] Derive Key Pair
20,550,339 UART: [art] Store priv key in slot 0x5
23,013,571 UART: [art] Derive Key Pair - Done
23,026,899 UART: [art] Signing Cert with AUTHO
23,028,207 UART: RITY.KEYID = 7
24,739,718 UART: [art] Erasing AUTHORITY.KEYID = 7
24,741,201 UART: [art] PUB.X = 954710E3556A578E1C6B4CB85DC9A5FBD2F76EE0F3C09135609CC205C935183094A2ECA9A1DBD4B0398333A94CC5463E
24,748,453 UART: [art] PUB.Y = 8D4EA9B1D664FBBC36885C97340D7E5D549D4E87F2ACDED22F31A51F2A55CC357E24CB80C963859089261C3BB01AA83C
24,755,743 UART: [art] SIG.R = C5472F41401C1A2B63A09B82AFACB73295B0140F880CDEACEFDD197A9E4B3F7A8B5585B1908DE0EA8CB9636E1E2EFECA
24,763,200 UART: [art] SIG.S = 3344A0857DEACDD16CCA5EF7792F4587E9646AC2A7F96DEA2532EA37CC14F52DA5DBADB7934A23E899732391571DCAC0
25,742,266 UART: Caliptra RT
25,742,984 UART: [state] CFI Enabled
25,908,428 UART: [rt] RT listening for mailbox commands...
25,939,953 UART: [rt]cmd =0x43415053, len=4
25,941,694 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,358,589 ready_for_fw is high
3,358,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,065,147 >>> mbox cmd response: success
14,065,733 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,343,140 UART:
18,343,509 UART: Running Caliptra FMC ...
18,344,706 UART:
18,344,875 UART: [state] CFI Enabled
18,411,806 UART: [fht] FMC Alias Private Key: 7
20,175,418 UART: [art] Extend RT PCRs Done
20,176,642 UART: [art] Lock RT PCRs Done
20,178,532 UART: [art] Populate DV Done
20,183,894 UART: [fht] FMC Alias Private Key: 7
20,185,385 UART: [art] Derive CDI
20,186,118 UART: [art] Store in in slot 0x4
20,244,639 UART: [art] Derive Key Pair
20,245,635 UART: [art] Store priv key in slot 0x5
22,708,155 UART: [art] Derive Key Pair - Done
22,721,364 UART: [art] Signing Cert with AUTHO
22,722,669 UART: RITY.KEYID = 7
24,434,169 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,674 UART: [art] PUB.X = 45608A92A9242FDCB141AFEB5D29E7216EFEFCE1C76F1E11B22F361A333AE37C137191B68C9A0E7BB219815C4802DFB9
24,442,973 UART: [art] PUB.Y = 591578660FC485A9052BD8070C1B42819EB8DB11E4C61378F2438DE552752CDD370E89E4DC3E3AD956E8F3CB1D9CFF7F
24,450,221 UART: [art] SIG.R = 67D6396C45D3664EEDB7E0099CAACADB43D2137BD3804A89B8CD807F32F8C8A5AFF13A53AEFED1DE84F6B8B7BE76AC8F
24,457,676 UART: [art] SIG.S = 258B0DCF60A8B57056C7CDA92B035E585AEA35FA0BFE0FE96D27C21A16B250155C77FA3E76F2D3C9067B8D8DF5221C9C
25,436,382 UART: Caliptra RT
25,437,082 UART: [state] CFI Enabled
25,601,758 UART: [rt] RT listening for mailbox commands...
25,633,013 UART: [rt]cmd =0x43415053, len=4
25,634,785 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
192,139 UART:
192,525 UART: Running Caliptra ROM ...
193,663 UART:
603,194 UART: [state] CFI Enabled
617,397 UART: [state] LifecycleState = Unprovisioned
619,294 UART: [state] DebugLocked = No
621,888 UART: [state] WD Timer not started. Device not locked for debugging
624,845 UART: [kat] SHA2-256
804,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,595 UART: [kat] ++
816,126 UART: [kat] sha1
827,283 UART: [kat] SHA2-256
830,351 UART: [kat] SHA2-384
835,972 UART: [kat] SHA2-512-ACC
838,896 UART: [kat] ECC-384
3,280,859 UART: [kat] HMAC-384Kdf
3,294,383 UART: [kat] LMS
3,823,900 UART: [kat] --
3,828,504 UART: [cold-reset] ++
3,830,146 UART: [fht] FHT @ 0x50003400
3,840,918 UART: [idev] ++
3,841,485 UART: [idev] CDI.KEYID = 6
3,842,461 UART: [idev] SUBJECT.KEYID = 7
3,843,624 UART: [idev] UDS.KEYID = 0
3,844,543 ready_for_fw is high
3,844,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,606 UART: [idev] Erasing UDS.KEYID = 0
6,312,195 UART: [idev] Sha1 KeyId Algorithm
6,335,154 UART: [idev] --
6,339,411 UART: [ldev] ++
6,339,972 UART: [ldev] CDI.KEYID = 6
6,340,875 UART: [ldev] SUBJECT.KEYID = 5
6,342,079 UART: [ldev] AUTHORITY.KEYID = 7
6,343,306 UART: [ldev] FE.KEYID = 1
6,354,318 UART: [ldev] Erasing FE.KEYID = 1
8,828,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,444 UART: [ldev] --
10,618,983 UART: [fwproc] Wait for Commands...
10,621,078 UART: [fwproc] Recv command 0x46574c44
10,623,166 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,110 >>> mbox cmd response: success
14,488,608 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,492,566 UART: [afmc] ++
14,493,140 UART: [afmc] CDI.KEYID = 6
14,494,015 UART: [afmc] SUBJECT.KEYID = 7
14,495,242 UART: [afmc] AUTHORITY.KEYID = 5
16,999,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,797 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,585 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,434 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,519 UART: [afmc] --
18,793,852 UART: [cold-reset] --
18,796,358 UART: [state] Locking Datavault
18,802,142 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,778 UART: [state] Locking ICCM
18,805,679 UART: [exit] Launching FMC @ 0x40000130
18,814,059 UART:
18,814,299 UART: Running Caliptra FMC ...
18,815,393 UART:
18,815,561 UART: [state] CFI Enabled
18,823,629 UART: [fht] FMC Alias Private Key: 7
20,580,345 UART: [art] Extend RT PCRs Done
20,581,573 UART: [art] Lock RT PCRs Done
20,583,220 UART: [art] Populate DV Done
20,588,784 UART: [fht] FMC Alias Private Key: 7
20,590,371 UART: [art] Derive CDI
20,591,104 UART: [art] Store in in slot 0x4
20,633,857 UART: [art] Derive Key Pair
20,634,896 UART: [art] Store priv key in slot 0x5
23,061,527 UART: [art] Derive Key Pair - Done
23,074,520 UART: [art] Signing Cert with AUTHO
23,075,827 UART: RITY.KEYID = 7
24,781,222 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,727 UART: [art] PUB.X = F4E159F81B726C1E3F9F3D54D24F9D9E4A0E53A2C5F9967AF620CA115EFA44E2275496C3BE11660C39839CE9352333CD
24,789,968 UART: [art] PUB.Y = 36AF1E362A90DAA47502CAA2E857FCC9FF0EECBE9BE7012D5947CA7FA00035FD2DA3B7E3482902381E1D38AA750C0B75
24,797,264 UART: [art] SIG.R = 70BCE93EE74A501EC1EE3DC7CC17AD38E8E949196550C898B330C91B6558292BCEC68A06B11B5F03324BD9255CF3020D
24,804,642 UART: [art] SIG.S = EF24E9BFA69CED99124A6597513BBE5AB78BB337CFC7F0EECFD7C43CE280046391A6B7059A1A638ECA263C41EF6BD7F5
25,783,451 UART: Caliptra RT
25,784,149 UART: [state] CFI Enabled
25,901,645 UART: [rt] RT listening for mailbox commands...
25,932,785 UART: [rt]cmd =0x43415053, len=4
25,934,461 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,698,371 ready_for_fw is high
3,698,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,132 >>> mbox cmd response: success
14,271,854 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,523,862 UART:
18,524,255 UART: Running Caliptra FMC ...
18,525,355 UART:
18,525,501 UART: [state] CFI Enabled
18,533,883 UART: [fht] FMC Alias Private Key: 7
20,290,616 UART: [art] Extend RT PCRs Done
20,291,847 UART: [art] Lock RT PCRs Done
20,293,519 UART: [art] Populate DV Done
20,299,144 UART: [fht] FMC Alias Private Key: 7
20,300,842 UART: [art] Derive CDI
20,301,653 UART: [art] Store in in slot 0x4
20,344,443 UART: [art] Derive Key Pair
20,345,516 UART: [art] Store priv key in slot 0x5
22,771,943 UART: [art] Derive Key Pair - Done
22,784,944 UART: [art] Signing Cert with AUTHO
22,786,251 UART: RITY.KEYID = 7
24,491,985 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,489 UART: [art] PUB.X = 53D469D3B6B402C81C7D9A60A8D20F21FCC4021341DE2B6BF96F347916137678B5780E370A2B9FF40F5E96F441CDBB76
24,500,788 UART: [art] PUB.Y = 7CF2B2A6072B515F7D729343CE2C7EE947548414EE40F2EA388DDB6470D4453F1788617D4B533A90D04E01830FE9744C
24,508,032 UART: [art] SIG.R = 084AC957601F92AA5FF21B85D7A4995F3AE6957C49EEA78E1E8A0971BBAE045A3421F2A06DFDF1191841467C206C7F99
24,515,425 UART: [art] SIG.S = 59F2987840902B5AF5D59EBE68E72B730B2508BFF5EFC6965D53089A8A43E4E61D1EF4CC327F0D173286932DC290A8CB
25,494,511 UART: Caliptra RT
25,495,212 UART: [state] CFI Enabled
25,611,690 UART: [rt] RT listening for mailbox commands...
25,643,271 UART: [rt]cmd =0x43415053, len=4
25,644,846 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,437,846 ready_for_fw is high
3,438,281 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,730,867 >>> mbox cmd response: success
14,731,499 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,013,754 UART:
19,014,167 UART: Running Caliptra FMC ...
19,015,312 UART:
19,015,479 UART: [state] CFI Enabled
19,084,048 UART: [fht] FMC Alias Private Key: 7
20,847,840 UART: [art] Extend RT PCRs Done
20,849,050 UART: [art] Lock RT PCRs Done
20,850,570 UART: [art] Populate DV Done
20,855,988 UART: [fht] FMC Alias Private Key: 7
20,857,528 UART: [art] Derive CDI
20,858,343 UART: [art] Store in in slot 0x4
20,917,469 UART: [art] Derive Key Pair
20,918,500 UART: [art] Store priv key in slot 0x5
23,381,353 UART: [art] Derive Key Pair - Done
23,394,133 UART: [art] Signing Cert with AUTHO
23,395,462 UART: RITY.KEYID = 7
25,107,392 UART: [art] Erasing AUTHORITY.KEYID = 7
25,108,906 UART: [art] PUB.X = 31BFA335CF2778E2BA003655374D9D40BB5560BF649030C6D8F4C07A104503E85414C520A369CFFF75EE2A04457E667A
25,116,146 UART: [art] PUB.Y = 83B320D2FA06B676C23881AE23C1A040EF74D83F1E354A00B4ED357EFBDEE95A0119C227C23C5794F273530B709C71AE
25,123,399 UART: [art] SIG.R = C2176A299733BF8FEAADDC491634D3D42F8ADE5FFA3E51716DB24F5D96D80C9F8BA2A8A83811533CB4A5E50F26A9AACF
25,130,784 UART: [art] SIG.S = 5AE9114FD4E3BC9DA1C86CF0406B500DBE2B6C48584F2DFD522E8E0A4C1ACBF1E321060E36AA920E8FECB6F8F0FF1424
26,109,422 UART: Caliptra RT
26,110,136 UART: [state] CFI Enabled
26,275,728 UART: [rt] RT listening for mailbox commands...
26,306,982 UART: [rt]cmd =0x43415053, len=4
26,308,674 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,755,238 ready_for_fw is high
3,755,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,947,018 >>> mbox cmd response: success
14,947,605 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,201,727 UART:
19,202,133 UART: Running Caliptra FMC ...
19,203,323 UART:
19,203,482 UART: [state] CFI Enabled
19,211,254 UART: [fht] FMC Alias Private Key: 7
20,967,682 UART: [art] Extend RT PCRs Done
20,968,908 UART: [art] Lock RT PCRs Done
20,970,154 UART: [art] Populate DV Done
20,975,396 UART: [fht] FMC Alias Private Key: 7
20,976,933 UART: [art] Derive CDI
20,977,741 UART: [art] Store in in slot 0x4
21,020,395 UART: [art] Derive Key Pair
21,021,432 UART: [art] Store priv key in slot 0x5
23,447,234 UART: [art] Derive Key Pair - Done
23,460,393 UART: [art] Signing Cert with AUTHO
23,461,695 UART: RITY.KEYID = 7
25,167,751 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,412 UART: [art] PUB.X = 1E34631A94858CCD4CB1C1D44DBB4AEDE6586A557C45D7B526C516E6108C4D5EC1E1BAD149CD0BD1CD83318FA7F4579F
25,176,566 UART: [art] PUB.Y = 596FEC3D9B50A961FB3D7D22228449763105F901CB745E1CDF205385BCCD7E8FBCB1285367E3C57E9719B24F7B5B9BEB
25,183,817 UART: [art] SIG.R = 7F2210A1D5A23161B72B6A225CB3E1511E4A9AC3AFAB3E55CE76B23FEA1DB937BF4CCADE913B189CC61C3F414E86BE38
25,191,208 UART: [art] SIG.S = EC7BDCE4CCE1B75FBFC745B023ED4C4DE05C04056EDAEC8BD6637AEA81D5EDBACC7B9BB43B630C597E71322063F48EE6
26,170,085 UART: Caliptra RT
26,170,799 UART: [state] CFI Enabled
26,288,185 UART: [rt] RT listening for mailbox commands...
26,319,552 UART: [rt]cmd =0x43415053, len=4
26,321,123 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,689 UART: [kat] SHA2-256
881,620 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,735 UART: [kat] ++
885,887 UART: [kat] sha1
889,951 UART: [kat] SHA2-256
891,889 UART: [kat] SHA2-384
894,592 UART: [kat] SHA2-512-ACC
896,493 UART: [kat] ECC-384
901,838 UART: [kat] HMAC-384Kdf
906,452 UART: [kat] LMS
1,474,648 UART: [kat] --
1,475,311 UART: [cold-reset] ++
1,475,849 UART: [fht] Storing FHT @ 0x50003400
1,478,462 UART: [idev] ++
1,478,630 UART: [idev] CDI.KEYID = 6
1,478,990 UART: [idev] SUBJECT.KEYID = 7
1,479,414 UART: [idev] UDS.KEYID = 0
1,479,759 ready_for_fw is high
1,479,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,614 UART: [idev] Erasing UDS.KEYID = 0
1,504,374 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,986 UART: [idev] --
1,514,113 UART: [ldev] ++
1,514,281 UART: [ldev] CDI.KEYID = 6
1,514,644 UART: [ldev] SUBJECT.KEYID = 5
1,515,070 UART: [ldev] AUTHORITY.KEYID = 7
1,515,533 UART: [ldev] FE.KEYID = 1
1,520,445 UART: [ldev] Erasing FE.KEYID = 1
1,545,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,588 UART: [ldev] --
1,585,087 UART: [fwproc] Waiting for Commands...
1,585,778 UART: [fwproc] Received command 0x46574c44
1,586,569 UART: [fwproc] Received Image of size 114448 bytes
2,886,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,640 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,992 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,951 >>> mbox cmd response: success
3,078,951 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,080,023 UART: [afmc] ++
3,080,191 UART: [afmc] CDI.KEYID = 6
3,080,553 UART: [afmc] SUBJECT.KEYID = 7
3,080,978 UART: [afmc] AUTHORITY.KEYID = 5
3,116,015 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,497 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,005 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,890 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,580 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,463 UART: [afmc] --
3,159,353 UART: [cold-reset] --
3,160,305 UART: [state] Locking Datavault
3,161,530 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,134 UART: [state] Locking ICCM
3,162,720 UART: [exit] Launching FMC @ 0x40000130
3,168,049 UART:
3,168,065 UART: Running Caliptra FMC ...
3,168,473 UART:
3,168,527 UART: [state] CFI Enabled
3,178,934 UART: [fht] FMC Alias Private Key: 7
3,286,875 UART: [art] Extend RT PCRs Done
3,287,303 UART: [art] Lock RT PCRs Done
3,288,421 UART: [art] Populate DV Done
3,296,346 UART: [fht] FMC Alias Private Key: 7
3,297,522 UART: [art] Derive CDI
3,297,802 UART: [art] Store in in slot 0x4
3,383,207 UART: [art] Derive Key Pair
3,383,567 UART: [art] Store priv key in slot 0x5
3,396,687 UART: [art] Derive Key Pair - Done
3,411,349 UART: [art] Signing Cert with AUTHO
3,411,829 UART: RITY.KEYID = 7
3,427,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,794 UART: [art] PUB.X = DF4FC49CABAB283B8A2AC611BE32143B34063E8F09C90761F350065DE80A720270173CF4D0A9B7DFF0686EDBB4BEC94F
3,434,562 UART: [art] PUB.Y = BA70D39DFD3D7A41975E83CDD954E3F75F1F09178203861D922C8B653BB4A2171DDCCE7D4E5791FEB7E2F9AB272E95BF
3,441,522 UART: [art] SIG.R = 34D081C908101C138DFA49EB74BFA1CA151747834396E4B793549BC4498652AC178C0812C0ACB76755B5FFD3748AB04B
3,448,286 UART: [art] SIG.S = 565A13C3B4EE71FD6A12CAEC18B9A63007B71DA1C2E880CF392B7ECF19762EAA2230C65E3A1C412F86CD09358592ED8C
3,472,309 UART: Caliptra RT
3,472,562 UART: [state] CFI Enabled
3,580,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,214 UART: [rt]cmd =0x43415053, len=4
3,612,462 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,953 ready_for_fw is high
1,361,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,109 >>> mbox cmd response: success
2,930,109 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,991,501 UART:
2,991,517 UART: Running Caliptra FMC ...
2,991,925 UART:
2,991,979 UART: [state] CFI Enabled
3,002,056 UART: [fht] FMC Alias Private Key: 7
3,110,397 UART: [art] Extend RT PCRs Done
3,110,825 UART: [art] Lock RT PCRs Done
3,112,431 UART: [art] Populate DV Done
3,120,640 UART: [fht] FMC Alias Private Key: 7
3,121,610 UART: [art] Derive CDI
3,121,890 UART: [art] Store in in slot 0x4
3,207,303 UART: [art] Derive Key Pair
3,207,663 UART: [art] Store priv key in slot 0x5
3,220,783 UART: [art] Derive Key Pair - Done
3,235,582 UART: [art] Signing Cert with AUTHO
3,236,062 UART: RITY.KEYID = 7
3,251,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,931 UART: [art] PUB.X = 58051D81F5EDED15106652C93618AD052B6B894A21BFC0695CAF40B8A7FE5D3C1ADD9F93DA16E42CA464F1BE0E536017
3,258,704 UART: [art] PUB.Y = B20C1377BD9AD332A9C08F2D9DBEA2A0FAB91CF95788967E7C5042674BDA210C07C610489C0A30C42186872301F0F666
3,265,641 UART: [art] SIG.R = 278B93FC6B8B1BAEA3EEB5280EA41E083C807922407ACDF94713CC2E1D08FC8166E7762B705096F2259E4D6D7177EB4A
3,272,410 UART: [art] SIG.S = 010CC283631EBD45F78126A51064826A98B7C9BC6D199AD9E80FFE884B2D3824EE75811459BB564E12BABC38C184D2AB
3,296,054 UART: Caliptra RT
3,296,307 UART: [state] CFI Enabled
3,403,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,315 UART: [rt]cmd =0x43415053, len=4
3,434,533 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,626 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,766 UART: [kat] SHA2-256
892,704 UART: [kat] SHA2-384
895,467 UART: [kat] SHA2-512-ACC
897,368 UART: [kat] ECC-384
902,765 UART: [kat] HMAC-384Kdf
907,357 UART: [kat] LMS
1,475,553 UART: [kat] --
1,476,348 UART: [cold-reset] ++
1,476,880 UART: [fht] Storing FHT @ 0x50003400
1,479,719 UART: [idev] ++
1,479,887 UART: [idev] CDI.KEYID = 6
1,480,247 UART: [idev] SUBJECT.KEYID = 7
1,480,671 UART: [idev] UDS.KEYID = 0
1,481,016 ready_for_fw is high
1,481,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,601 UART: [idev] Erasing UDS.KEYID = 0
1,505,437 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,923 UART: [idev] --
1,514,862 UART: [ldev] ++
1,515,030 UART: [ldev] CDI.KEYID = 6
1,515,393 UART: [ldev] SUBJECT.KEYID = 5
1,515,819 UART: [ldev] AUTHORITY.KEYID = 7
1,516,282 UART: [ldev] FE.KEYID = 1
1,521,574 UART: [ldev] Erasing FE.KEYID = 1
1,547,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,335 UART: [ldev] --
1,586,780 UART: [fwproc] Waiting for Commands...
1,587,451 UART: [fwproc] Received command 0x46574c44
1,588,242 UART: [fwproc] Received Image of size 114448 bytes
2,887,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,751 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,103 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,202 >>> mbox cmd response: success
3,080,202 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,081,228 UART: [afmc] ++
3,081,396 UART: [afmc] CDI.KEYID = 6
3,081,758 UART: [afmc] SUBJECT.KEYID = 7
3,082,183 UART: [afmc] AUTHORITY.KEYID = 5
3,117,488 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,928 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,321 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,011 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,742 UART: [afmc] --
3,160,822 UART: [cold-reset] --
3,161,724 UART: [state] Locking Datavault
3,163,141 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,745 UART: [state] Locking ICCM
3,164,181 UART: [exit] Launching FMC @ 0x40000130
3,169,510 UART:
3,169,526 UART: Running Caliptra FMC ...
3,169,934 UART:
3,170,077 UART: [state] CFI Enabled
3,180,544 UART: [fht] FMC Alias Private Key: 7
3,289,115 UART: [art] Extend RT PCRs Done
3,289,543 UART: [art] Lock RT PCRs Done
3,290,811 UART: [art] Populate DV Done
3,299,004 UART: [fht] FMC Alias Private Key: 7
3,300,046 UART: [art] Derive CDI
3,300,326 UART: [art] Store in in slot 0x4
3,385,891 UART: [art] Derive Key Pair
3,386,251 UART: [art] Store priv key in slot 0x5
3,399,525 UART: [art] Derive Key Pair - Done
3,414,248 UART: [art] Signing Cert with AUTHO
3,414,728 UART: RITY.KEYID = 7
3,430,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,897 UART: [art] PUB.X = 3F9005040070480FB0DEE255C21214C6C1B2F1A0C42BB85692A2DD6DDE7C35EF636AF1334A50BF68DCE028019132D132
3,437,637 UART: [art] PUB.Y = E895035915EB9419C027530D0525278D39EBB941892384ED7975B96247D01CA58BA75903CB04B2E098C95327DE59A0C1
3,444,562 UART: [art] SIG.R = C03FB8B4647F25F897D873F5D6EA364259EA21DB86CCD8DEC6F18FE2FC7160D06D42E2D71365B9E13C9867AABED8CC62
3,451,350 UART: [art] SIG.S = 69733CABA377E132FCD6330E65C4B768352214244277A853D47883EF48A9A106C0CE2BC6821405E9DAD7DE9ED5D0AA33
3,475,272 UART: Caliptra RT
3,475,617 UART: [state] CFI Enabled
3,584,160 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,476 UART: [rt]cmd =0x43415053, len=4
3,615,882 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,422 ready_for_fw is high
1,362,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,360 >>> mbox cmd response: success
2,930,360 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,991,152 UART:
2,991,168 UART: Running Caliptra FMC ...
2,991,576 UART:
2,991,719 UART: [state] CFI Enabled
3,002,364 UART: [fht] FMC Alias Private Key: 7
3,110,151 UART: [art] Extend RT PCRs Done
3,110,579 UART: [art] Lock RT PCRs Done
3,112,135 UART: [art] Populate DV Done
3,120,600 UART: [fht] FMC Alias Private Key: 7
3,121,718 UART: [art] Derive CDI
3,121,998 UART: [art] Store in in slot 0x4
3,207,835 UART: [art] Derive Key Pair
3,208,195 UART: [art] Store priv key in slot 0x5
3,221,879 UART: [art] Derive Key Pair - Done
3,236,543 UART: [art] Signing Cert with AUTHO
3,237,023 UART: RITY.KEYID = 7
3,251,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,666 UART: [art] PUB.X = 0E6B85DB180AD6C87F2D72183F7864518CDE307C85A847BFF76AE09F5AD72C308A51C1430460894A5200CC7D566C1FC7
3,259,409 UART: [art] PUB.Y = 2F5C967911ABCE6D7849ABBEBC610CF45DF5E3EE48628F4F9FDE21BE9EE0A364A0BDA644F69D340E98EE17B1F0F8F7D9
3,266,379 UART: [art] SIG.R = B46072B02A1C33FAD3BE32381D786905C738357D7B0DF53D5A97946A349F372740635A81DCF5AC73B99390936F487112
3,273,135 UART: [art] SIG.S = 5FD780046EBF1AE728920015B9677EBA731A622CC4B845FDD2A8510743AEB1B653179FFA6DC6AE4DF66164F891637511
3,296,482 UART: Caliptra RT
3,296,827 UART: [state] CFI Enabled
3,404,286 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,702 UART: [rt]cmd =0x43415053, len=4
3,435,854 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
893,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,257 UART: [kat] ++
897,409 UART: [kat] sha1
901,653 UART: [kat] SHA2-256
903,593 UART: [kat] SHA2-384
906,468 UART: [kat] SHA2-512-ACC
908,369 UART: [kat] ECC-384
918,070 UART: [kat] HMAC-384Kdf
922,624 UART: [kat] LMS
1,170,952 UART: [kat] --
1,171,895 UART: [cold-reset] ++
1,172,243 UART: [fht] FHT @ 0x50003400
1,174,872 UART: [idev] ++
1,175,040 UART: [idev] CDI.KEYID = 6
1,175,400 UART: [idev] SUBJECT.KEYID = 7
1,175,824 UART: [idev] UDS.KEYID = 0
1,176,169 ready_for_fw is high
1,176,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,260 UART: [idev] Erasing UDS.KEYID = 0
1,200,621 UART: [idev] Sha1 KeyId Algorithm
1,209,113 UART: [idev] --
1,210,287 UART: [ldev] ++
1,210,455 UART: [ldev] CDI.KEYID = 6
1,210,818 UART: [ldev] SUBJECT.KEYID = 5
1,211,244 UART: [ldev] AUTHORITY.KEYID = 7
1,211,707 UART: [ldev] FE.KEYID = 1
1,216,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,929 UART: [ldev] --
1,282,356 UART: [fwproc] Wait for Commands...
1,283,064 UART: [fwproc] Recv command 0x46574c44
1,283,792 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,979 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,152 >>> mbox cmd response: success
2,775,152 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,776,256 UART: [afmc] ++
2,776,424 UART: [afmc] CDI.KEYID = 6
2,776,786 UART: [afmc] SUBJECT.KEYID = 7
2,777,211 UART: [afmc] AUTHORITY.KEYID = 5
2,812,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,945 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,673 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,558 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,277 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,053 UART: [afmc] --
2,855,991 UART: [cold-reset] --
2,856,871 UART: [state] Locking Datavault
2,857,734 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,338 UART: [state] Locking ICCM
2,858,784 UART: [exit] Launching FMC @ 0x40000130
2,864,113 UART:
2,864,129 UART: Running Caliptra FMC ...
2,864,537 UART:
2,864,591 UART: [state] CFI Enabled
2,874,668 UART: [fht] FMC Alias Private Key: 7
2,982,419 UART: [art] Extend RT PCRs Done
2,982,847 UART: [art] Lock RT PCRs Done
2,984,489 UART: [art] Populate DV Done
2,992,736 UART: [fht] FMC Alias Private Key: 7
2,993,822 UART: [art] Derive CDI
2,994,102 UART: [art] Store in in slot 0x4
3,079,641 UART: [art] Derive Key Pair
3,080,001 UART: [art] Store priv key in slot 0x5
3,093,853 UART: [art] Derive Key Pair - Done
3,108,649 UART: [art] Signing Cert with AUTHO
3,109,129 UART: RITY.KEYID = 7
3,124,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,348 UART: [art] PUB.X = 89B0E29F656F2B246DE22785E9005C6BD8FACB8D8A64E8F24F58545B20721DB71D91B519A9CC43CC235D45EA22A21A89
3,132,104 UART: [art] PUB.Y = F5F4CD1DA037E8F04E195161BD5F1C2065462AEDEF2AADCA5045B4346FB17AC5B0417FEED0B7A845448E7C38483FA936
3,139,070 UART: [art] SIG.R = EB681F165ACA82DD1A5F7CB5F6016C348565FE54481022D7C06516C2875CF2596E2EC9456DCB5F10509E74C17A94E759
3,145,839 UART: [art] SIG.S = 8AA2A6CD61745F357EBA208D19679AEE88DA73D0516D0202356F2420F6AFDD1085F99E62FD2D1FF74F99EF858C50213F
3,169,402 UART: Caliptra RT
3,169,655 UART: [state] CFI Enabled
3,279,089 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,651 UART: [rt]cmd =0x43415053, len=4
3,310,833 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,927 ready_for_fw is high
1,059,927 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,567 >>> mbox cmd response: success
2,628,567 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,689,883 UART:
2,689,899 UART: Running Caliptra FMC ...
2,690,307 UART:
2,690,361 UART: [state] CFI Enabled
2,700,502 UART: [fht] FMC Alias Private Key: 7
2,808,459 UART: [art] Extend RT PCRs Done
2,808,887 UART: [art] Lock RT PCRs Done
2,810,369 UART: [art] Populate DV Done
2,818,730 UART: [fht] FMC Alias Private Key: 7
2,819,870 UART: [art] Derive CDI
2,820,150 UART: [art] Store in in slot 0x4
2,905,541 UART: [art] Derive Key Pair
2,905,901 UART: [art] Store priv key in slot 0x5
2,918,983 UART: [art] Derive Key Pair - Done
2,933,919 UART: [art] Signing Cert with AUTHO
2,934,399 UART: RITY.KEYID = 7
2,949,921 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,686 UART: [art] PUB.X = DA85C7835512E78BE53933EE167E3CD66B6308DBE27D6C79AAF873B433400599BB166679DED7D14B6F7D8452D682CE38
2,957,454 UART: [art] PUB.Y = 9AB58D6E73CB3E5E2BE5725A137D4E65553A48F9CBB180BB91828A8A8E9A5115C76739C1E2496DA1BA8DC177097A9B3E
2,964,411 UART: [art] SIG.R = 530F541D0D5BCF02CAD34D967CEE64E84D79241A296EDE8094C6923E1AC2348BF3773D0314B5AA2541B0CFEED85E54FA
2,971,183 UART: [art] SIG.S = CAC007D9E168856485F1B5D5EED60B59E2AFDD8B5ECEF8E4DBEA71A1568B60E309C45DCA9E091DC0B8D27BA415C699A7
2,994,510 UART: Caliptra RT
2,994,763 UART: [state] CFI Enabled
3,103,304 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,986 UART: [rt]cmd =0x43415053, len=4
3,135,150 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
893,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,738 UART: [kat] ++
897,890 UART: [kat] sha1
902,062 UART: [kat] SHA2-256
904,002 UART: [kat] SHA2-384
906,673 UART: [kat] SHA2-512-ACC
908,574 UART: [kat] ECC-384
918,385 UART: [kat] HMAC-384Kdf
922,939 UART: [kat] LMS
1,171,267 UART: [kat] --
1,171,916 UART: [cold-reset] ++
1,172,496 UART: [fht] FHT @ 0x50003400
1,175,091 UART: [idev] ++
1,175,259 UART: [idev] CDI.KEYID = 6
1,175,619 UART: [idev] SUBJECT.KEYID = 7
1,176,043 UART: [idev] UDS.KEYID = 0
1,176,388 ready_for_fw is high
1,176,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,069 UART: [idev] Erasing UDS.KEYID = 0
1,201,146 UART: [idev] Sha1 KeyId Algorithm
1,209,568 UART: [idev] --
1,210,614 UART: [ldev] ++
1,210,782 UART: [ldev] CDI.KEYID = 6
1,211,145 UART: [ldev] SUBJECT.KEYID = 5
1,211,571 UART: [ldev] AUTHORITY.KEYID = 7
1,212,034 UART: [ldev] FE.KEYID = 1
1,217,566 UART: [ldev] Erasing FE.KEYID = 1
1,244,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,088 UART: [ldev] --
1,283,397 UART: [fwproc] Wait for Commands...
1,283,979 UART: [fwproc] Recv command 0x46574c44
1,284,707 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,015 >>> mbox cmd response: success
2,776,015 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,777,197 UART: [afmc] ++
2,777,365 UART: [afmc] CDI.KEYID = 6
2,777,727 UART: [afmc] SUBJECT.KEYID = 7
2,778,152 UART: [afmc] AUTHORITY.KEYID = 5
2,813,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,960 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,688 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,573 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,292 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,046 UART: [afmc] --
2,857,000 UART: [cold-reset] --
2,858,014 UART: [state] Locking Datavault
2,859,271 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,875 UART: [state] Locking ICCM
2,860,499 UART: [exit] Launching FMC @ 0x40000130
2,865,828 UART:
2,865,844 UART: Running Caliptra FMC ...
2,866,252 UART:
2,866,395 UART: [state] CFI Enabled
2,876,860 UART: [fht] FMC Alias Private Key: 7
2,985,215 UART: [art] Extend RT PCRs Done
2,985,643 UART: [art] Lock RT PCRs Done
2,987,165 UART: [art] Populate DV Done
2,995,306 UART: [fht] FMC Alias Private Key: 7
2,996,362 UART: [art] Derive CDI
2,996,642 UART: [art] Store in in slot 0x4
3,082,333 UART: [art] Derive Key Pair
3,082,693 UART: [art] Store priv key in slot 0x5
3,096,315 UART: [art] Derive Key Pair - Done
3,111,073 UART: [art] Signing Cert with AUTHO
3,111,553 UART: RITY.KEYID = 7
3,126,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,544 UART: [art] PUB.X = 24CA80B3221E4E457A713280FDBE1A16E8D970751F35AA38B47C924E4AE222AAC7C976B564D80C742219916B0E4F5F4C
3,134,312 UART: [art] PUB.Y = 681F9F28F946750C04914DBA843984CC73F7FA641A8F86FFD605A03C420CA69B2B6610878997A18B0E6430241E598BB6
3,141,243 UART: [art] SIG.R = 31CA0BFD15AC7A5C76E36C3A3C03BD3D395DB95E39B4D0931513BF55EB390B73EB0D7859577B6D54E3CFC825B0BD4F11
3,148,017 UART: [art] SIG.S = E7EC5271096A965D70908AD220ED14C8B65BFD11E11F51C00AD901757F6B6C8A18C16056D933438B7463B1200D321C20
3,171,984 UART: Caliptra RT
3,172,329 UART: [state] CFI Enabled
3,279,582 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,062 UART: [rt]cmd =0x43415053, len=4
3,311,168 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,834 ready_for_fw is high
1,060,834 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,668 >>> mbox cmd response: success
2,628,668 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,691,106 UART:
2,691,122 UART: Running Caliptra FMC ...
2,691,530 UART:
2,691,673 UART: [state] CFI Enabled
2,702,088 UART: [fht] FMC Alias Private Key: 7
2,810,351 UART: [art] Extend RT PCRs Done
2,810,779 UART: [art] Lock RT PCRs Done
2,812,501 UART: [art] Populate DV Done
2,820,670 UART: [fht] FMC Alias Private Key: 7
2,821,764 UART: [art] Derive CDI
2,822,044 UART: [art] Store in in slot 0x4
2,907,145 UART: [art] Derive Key Pair
2,907,505 UART: [art] Store priv key in slot 0x5
2,920,859 UART: [art] Derive Key Pair - Done
2,935,347 UART: [art] Signing Cert with AUTHO
2,935,827 UART: RITY.KEYID = 7
2,950,647 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,412 UART: [art] PUB.X = 60FF7AFE79DC1F7E3EB2696AC37D03F756218016AE0750AB8F27B207563A4EAE4F059F14E9D5AD0C8BD8F28309BD0707
2,958,170 UART: [art] PUB.Y = 4CFC572CB1A29BA5580624C524FC9FB93C32B3711E1D5F5910AA16C65DA710EFE16A00AA2BB0AF5ED4A98CD7A79C7D86
2,965,115 UART: [art] SIG.R = 29F3083AD4736807B35BE702C22BBFB490DC3BB1F1257BC71A24545A476C974ED6390CE74FBE2FB25FF6DFF913D93932
2,971,883 UART: [art] SIG.S = 0AF7779A77EF0444150AAA451FA0F2D9045B7A822E175B98A25D2BDBA0C9F9ADA90ED3E6912B4E7C65EAEC72658E9931
2,995,565 UART: Caliptra RT
2,995,910 UART: [state] CFI Enabled
3,103,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,221 UART: [rt]cmd =0x43415053, len=4
3,135,547 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,785 UART: [kat] SHA2-256
901,725 UART: [kat] SHA2-384
904,312 UART: [kat] SHA2-512-ACC
906,213 UART: [kat] ECC-384
915,956 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,319 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,174,261 ready_for_fw is high
1,174,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,541 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,425 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,706 UART: [ldev] --
1,281,006 UART: [fwproc] Wait for Commands...
1,281,681 UART: [fwproc] Recv command 0x46574c44
1,282,414 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,508 >>> mbox cmd response: success
2,773,508 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,774,625 UART: [afmc] ++
2,774,793 UART: [afmc] CDI.KEYID = 6
2,775,156 UART: [afmc] SUBJECT.KEYID = 7
2,775,582 UART: [afmc] AUTHORITY.KEYID = 5
2,810,483 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,852 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,571 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,290 UART: [afmc] --
2,853,398 UART: [cold-reset] --
2,854,024 UART: [state] Locking Datavault
2,855,111 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,715 UART: [state] Locking ICCM
2,856,365 UART: [exit] Launching FMC @ 0x40000130
2,861,694 UART:
2,861,710 UART: Running Caliptra FMC ...
2,862,118 UART:
2,862,172 UART: [state] CFI Enabled
2,872,403 UART: [fht] FMC Alias Private Key: 7
2,980,744 UART: [art] Extend RT PCRs Done
2,981,172 UART: [art] Lock RT PCRs Done
2,982,832 UART: [art] Populate DV Done
2,990,881 UART: [fht] FMC Alias Private Key: 7
2,991,965 UART: [art] Derive CDI
2,992,245 UART: [art] Store in in slot 0x4
3,077,962 UART: [art] Derive Key Pair
3,078,322 UART: [art] Store priv key in slot 0x5
3,091,678 UART: [art] Derive Key Pair - Done
3,106,578 UART: [art] Signing Cert with AUTHO
3,107,058 UART: RITY.KEYID = 7
3,121,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,729 UART: [art] PUB.X = C9119A1C57234EF748DBD02702F385AC8F35C93694913FDEE83BECB6A010AAB46EC7CE00E91C5D33936B9D60DA7BE1E1
3,129,490 UART: [art] PUB.Y = EE24F1429476A5E4865F3F1D909D87E8AC8EDBAE7703C2E6DC125071ADEED4C4B41FD223FECC0AC5FD80F8B43EE73604
3,136,453 UART: [art] SIG.R = D58D08DDBF76F912FB0EC900ECAC39A38908AF2DA71B58E99F094E861A31AB519672E79CA261FFDF4B562A73875E7171
3,143,201 UART: [art] SIG.S = 18380F71611AA8B13F8826B3228D76F3E16DEDDE20216200131C53C0E0E36FAC50091A658E4837F026C79F13360C1B92
3,166,707 UART: Caliptra RT
3,166,960 UART: [state] CFI Enabled
3,275,377 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,991 UART: [rt]cmd =0x43415053, len=4
3,307,229 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,344 ready_for_fw is high
1,056,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,482 >>> mbox cmd response: success
2,624,482 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,685,470 UART:
2,685,486 UART: Running Caliptra FMC ...
2,685,894 UART:
2,685,948 UART: [state] CFI Enabled
2,696,735 UART: [fht] FMC Alias Private Key: 7
2,804,938 UART: [art] Extend RT PCRs Done
2,805,366 UART: [art] Lock RT PCRs Done
2,806,900 UART: [art] Populate DV Done
2,815,271 UART: [fht] FMC Alias Private Key: 7
2,816,365 UART: [art] Derive CDI
2,816,645 UART: [art] Store in in slot 0x4
2,901,796 UART: [art] Derive Key Pair
2,902,156 UART: [art] Store priv key in slot 0x5
2,915,606 UART: [art] Derive Key Pair - Done
2,930,024 UART: [art] Signing Cert with AUTHO
2,930,504 UART: RITY.KEYID = 7
2,945,794 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,559 UART: [art] PUB.X = 9A81BF4FB0AD8C10722C5F8C4DBDFFC0C413EBC9C2546B00A48973EA74259E1749BBCB218E41C99AE0F0F3699064AAC1
2,953,325 UART: [art] PUB.Y = 335FE34968CA635733F72B642FF8A256C687E38B470C2D73B002B1674DE6D5BF150F592624DE030FC2EFDA1118FB1A1D
2,960,266 UART: [art] SIG.R = DA87A2835AE6380177D52083342832991E7A1BC6C1DC397A11B832549878BFDCA0667C2156672BE8006954DEEAD6CB16
2,967,009 UART: [art] SIG.S = 0FF640B6B736785FCDADF4811EF87E4BFB1DF124FA4983B5872C38AF9E1346AAD7B58EC6C2CDEE526EADE75BB07D2D9F
2,990,671 UART: Caliptra RT
2,990,924 UART: [state] CFI Enabled
3,098,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,119 UART: [rt]cmd =0x43415053, len=4
3,130,591 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,162 UART: [idev] ++
1,173,330 UART: [idev] CDI.KEYID = 6
1,173,691 UART: [idev] SUBJECT.KEYID = 7
1,174,116 UART: [idev] UDS.KEYID = 0
1,174,462 ready_for_fw is high
1,174,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,196 UART: [idev] Erasing UDS.KEYID = 0
1,199,456 UART: [idev] Sha1 KeyId Algorithm
1,208,316 UART: [idev] --
1,209,523 UART: [ldev] ++
1,209,691 UART: [ldev] CDI.KEYID = 6
1,210,055 UART: [ldev] SUBJECT.KEYID = 5
1,210,482 UART: [ldev] AUTHORITY.KEYID = 7
1,210,945 UART: [ldev] FE.KEYID = 1
1,216,309 UART: [ldev] Erasing FE.KEYID = 1
1,243,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,275 UART: [ldev] --
1,282,701 UART: [fwproc] Wait for Commands...
1,283,412 UART: [fwproc] Recv command 0x46574c44
1,284,145 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,791 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,851 >>> mbox cmd response: success
2,774,851 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,775,942 UART: [afmc] ++
2,776,110 UART: [afmc] CDI.KEYID = 6
2,776,473 UART: [afmc] SUBJECT.KEYID = 7
2,776,899 UART: [afmc] AUTHORITY.KEYID = 5
2,812,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,157 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,886 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,769 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,488 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,275 UART: [afmc] --
2,856,283 UART: [cold-reset] --
2,857,221 UART: [state] Locking Datavault
2,858,064 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,668 UART: [state] Locking ICCM
2,859,104 UART: [exit] Launching FMC @ 0x40000130
2,864,433 UART:
2,864,449 UART: Running Caliptra FMC ...
2,864,857 UART:
2,865,000 UART: [state] CFI Enabled
2,875,111 UART: [fht] FMC Alias Private Key: 7
2,983,198 UART: [art] Extend RT PCRs Done
2,983,626 UART: [art] Lock RT PCRs Done
2,984,862 UART: [art] Populate DV Done
2,993,077 UART: [fht] FMC Alias Private Key: 7
2,994,053 UART: [art] Derive CDI
2,994,333 UART: [art] Store in in slot 0x4
3,079,910 UART: [art] Derive Key Pair
3,080,270 UART: [art] Store priv key in slot 0x5
3,094,078 UART: [art] Derive Key Pair - Done
3,108,603 UART: [art] Signing Cert with AUTHO
3,109,083 UART: RITY.KEYID = 7
3,124,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,856 UART: [art] PUB.X = 951C651B8B4E9530B621E08564D01E478650E8B9BA89891B1840BBD04EAFC97564C9C97DB3AF451CE150AD34AE43A2AF
3,131,634 UART: [art] PUB.Y = 56F716DDA946FAEB819F94DAFB525444A60D9EEE502630B59315168E4FEFFCC84605477DD1CE8447CFC3C9B43E7BB710
3,138,592 UART: [art] SIG.R = 2EF82A9FFAEA28BD488FFA8BA9D7201ACAA549ADA2C7B3674818AE401228A92D3F2E1F17036FE3013D9BE0B2F5B95DCE
3,145,380 UART: [art] SIG.S = 07A273EA020A8046F548518230F7A10B7BF10B6321E7E356FA080D1CDD7142B2585091ADE6368EBA78F269A01F8AEE6D
3,169,398 UART: Caliptra RT
3,169,743 UART: [state] CFI Enabled
3,277,532 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,178 UART: [rt]cmd =0x43415053, len=4
3,309,408 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,531 ready_for_fw is high
1,055,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,295 >>> mbox cmd response: success
2,623,295 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,686,079 UART:
2,686,095 UART: Running Caliptra FMC ...
2,686,503 UART:
2,686,646 UART: [state] CFI Enabled
2,697,469 UART: [fht] FMC Alias Private Key: 7
2,805,296 UART: [art] Extend RT PCRs Done
2,805,724 UART: [art] Lock RT PCRs Done
2,807,374 UART: [art] Populate DV Done
2,815,635 UART: [fht] FMC Alias Private Key: 7
2,816,665 UART: [art] Derive CDI
2,816,945 UART: [art] Store in in slot 0x4
2,902,782 UART: [art] Derive Key Pair
2,903,142 UART: [art] Store priv key in slot 0x5
2,917,018 UART: [art] Derive Key Pair - Done
2,931,719 UART: [art] Signing Cert with AUTHO
2,932,199 UART: RITY.KEYID = 7
2,947,493 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,258 UART: [art] PUB.X = 89E4F54D8A41794BDB181FDEB02C176D9E78010B8D5B9DCF84653ED13D8DD4CFB3F8C8604EDC042D0DDB9AFEAC2A8859
2,955,040 UART: [art] PUB.Y = 79B8EE8529205A47BE559FBBB49FC29361EE1AADF0691D4E9517FFE7BD6A53103D7F65911A3C3FA886FA795C8CB69242
2,962,002 UART: [art] SIG.R = 1BCD0AA36BADA391F9C5C8FEF243E97CCB96092C40B4421545E7A1ED8CBA887FC529D3629A11D00CFE425CE230B57A70
2,968,781 UART: [art] SIG.S = 0D50DDBDAAF45C98CA388BB08A030B425D4CF77E6A20C2CBBA28011CC6F40621FC4BF71E0AC5C5880BA2AB80ABCCB69E
2,993,069 UART: Caliptra RT
2,993,414 UART: [state] CFI Enabled
3,101,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,591 UART: [rt]cmd =0x43415053, len=4
3,132,907 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
Truncated 1800 bytes from beginning
DI.KEYID = 6
7,353,394 UART: [ldev] SUBJECT.KEYID = 5
7,354,557 UART: [ldev] AUTHORITY.KEYID = 7
7,355,884 UART: [ldev] FE.KEYID = 1
7,402,139 UART: [ldev] Erasing FE.KEYID = 1
10,730,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,320 UART: [ldev] --
13,106,231 UART: [fwproc] Waiting for Commands...
13,109,032 UART: [fwproc] Received command 0x46574c44
13,111,242 UART: [fwproc] Received Image of size 114124 bytes
17,163,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,163 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,068 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,624,834 >>> mbox cmd response: success
17,625,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,629,897 UART: [afmc] ++
17,630,481 UART: [afmc] CDI.KEYID = 6
17,631,393 UART: [afmc] SUBJECT.KEYID = 7
17,632,663 UART: [afmc] AUTHORITY.KEYID = 5
21,002,179 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,509 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,767 UART: [afmc] PUB.X = 58869B145FC8A839D53FC6E5BE3D940FECEAEE2613F5D46CED8D5217DA34E93284C649DE649CF1FB360D4A8B9078C7BF
23,319,342 UART: [afmc] PUB.Y = 1ED4F8DEBE33D74A44A688A04CDC591E1B0F4468DC8B4DD11AFCC6F4B4CB3DBAD163E83E3F4F140E62CAC71F0B244458
23,334,131 UART: [afmc] SIG.R = A32F2EB2EA2ED491133AF4583EC0B9DFEFEC4DDEB8D7D5532B72B5C7F65FD418ADF34A9B09AD19B3FB5B3C1DBAC7506B
23,348,643 UART: [afmc] SIG.S = A385A20EC7B85D6B92927D55A3E741E77648405D323D471B48F02B8213BD0FC748FAB237AC679DF7398A53BCC0629E61
23,370,121 UART: [afmc] --
23,374,382 UART: [cold-reset] --
23,377,639 UART: [state] Locking Datavault
23,384,033 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,741 UART: [state] Locking ICCM
23,387,732 UART: [exit] Launching FMC @ 0x40000130
23,396,086 UART:
23,396,329 UART: Running Caliptra FMC ...
23,397,430 UART:
23,397,595 UART: [state] CFI Enabled
23,461,416 UART: [fht] FMC Alias Private Key: 7
25,799,684 UART: [art] Extend RT PCRs Done
25,800,898 UART: [art] Lock RT PCRs Done
25,802,643 UART: [art] Populate DV Done
25,808,164 UART: [fht] FMC Alias Private Key: 7
25,809,707 UART: [art] Derive CDI
25,810,491 UART: [art] Store in in slot 0x4
25,869,293 UART: [art] Derive Key Pair
25,870,338 UART: [art] Store priv key in slot 0x5
29,162,695 UART: [art] Derive Key Pair - Done
29,175,368 UART: [art] Signing Cert with AUTHO
29,176,667 UART: RITY.KEYID = 7
31,463,573 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,082 UART: [art] PUB.X = C918B561C5D7236202A5BC84EF77A12E8FDFC864BCBF39DCB028514FC1D1DED10E200A484724B48A66FDF3F1DCDC0DE4
31,472,333 UART: [art] PUB.Y = B0876FDDD71228FFE48BD37EC49A1AADA920E495F0D832F8E4263EE976D6203C4830AE8E4FD7B62DAB33DB38B010BACA
31,479,620 UART: [art] SIG.R = 9DCFE3B34D3B520F2C656C40B5BB9F9FC7A2641740F084375CE66BB1B5FF168ABD64F711E76AAC8F49884C4FECADA4C4
31,487,017 UART: [art] SIG.S = 65EFE93CEF74B16B47A011CFBD9B752499BCF90B2EFA80B86737CBB516A7B35DC9548E85F2A26FD910EE161C679B7063
32,791,536 UART: Caliptra RT
32,792,237 UART: [state] CFI Enabled
32,953,071 UART: [rt] RT listening for mailbox commands...
32,984,430 UART: [rt]cmd =0x494e464f, len=4
32,988,306 >>> mbox cmd response data (264 bytes)
35,120,818 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,265,801 UART:
35,266,166 UART: Running Caliptra ROM ...
35,267,294 UART:
35,267,476 UART: [state] CFI Enabled
35,324,772 UART: [state] LifecycleState = Unprovisioned
35,326,705 UART: [state] DebugLocked = No
35,328,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,333,225 UART: [kat] SHA2-256
35,502,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,513,411 UART: [kat] ++
35,513,871 UART: [kat] sha1
35,524,163 UART: [kat] SHA2-256
35,526,854 UART: [kat] SHA2-384
35,531,810 UART: [kat] SHA2-512-ACC
35,534,277 UART: [kat] ECC-384
37,827,769 UART: [kat] HMAC-384Kdf
37,858,858 UART: [kat] LMS
39,049,177 UART: [kat] --
39,051,925 UART: [update-reset] ++
43,190,200 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,194,530 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
43,576,817 >>> mbox cmd response: success
43,578,089 UART: [update-reset] Copying MAN_2 To MAN_1
43,600,485 UART: [update-reset Success] --
43,605,334 UART: [state] Locking Datavault
43,608,430 UART: [state] Locking PCR0, PCR1 and PCR31
43,610,183 UART: [state] Locking ICCM
43,611,853 UART: [exit] Launching FMC @ 0x40000130
43,620,253 UART:
43,620,529 UART: Running Caliptra FMC ...
43,621,634 UART:
43,621,794 UART: [state] CFI Enabled
43,714,355 UART: [art] Extend RT PCRs Done
43,715,534 UART: [art] Lock RT PCRs Done
43,716,991 UART: [art] Populate DV Done
43,722,509 UART: [fht] FMC Alias Private Key: 7
43,724,142 UART: [art] Derive CDI
43,724,955 UART: [art] Store in in slot 0x4
43,783,453 UART: [art] Derive Key Pair
43,784,494 UART: [art] Store priv key in slot 0x5
47,077,969 UART: [art] Derive Key Pair - Done
47,090,760 UART: [art] Signing Cert with AUTHO
47,092,077 UART: RITY.KEYID = 7
49,379,048 UART: [art] Erasing AUTHORITY.KEYID = 7
49,380,560 UART: [art] PUB.X = CC30351575A5BC50FDBBB408FF6BF99AE92C1FF6C28D622A4F34299E44A3D45C35DBF3E2DF9E4F0E7A2951D22126E932
49,387,856 UART: [art] PUB.Y = 2F2E2B66DDE1869AE829B6C79710B53A136A487E32AB1E4F4E41E45560148BC238AF5E7E591567799C8944A7D3088BAF
49,395,057 UART: [art] SIG.R = A7C8410E1D8722B0D96367C538F58AFDA9BBBF8D4D90E0760CEC15DFB4328384113C82B0999EB99E8B9D1767D406601C
49,402,400 UART: [art] SIG.S = F043E504696CFA705D78A8B966EC3326DBACCC611E558BAFE355B7F5F9E7D872885A5E29AD8B5A1E1AC63FFA68270F7B
50,707,567 UART: Caliptra RT
50,708,283 UART: [state] CFI Enabled
51,042,951 UART: [rt] RT listening for mailbox commands...
51,044,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,074,593 UART: [rt]cmd =0x494e464f, len=4
51,078,590 >>> mbox cmd response data (264 bytes)
53,207,815 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
53,352,807 UART:
53,353,172 UART: Running Caliptra ROM ...
53,354,262 UART:
53,354,425 UART: [state] CFI Enabled
53,431,745 UART: [state] LifecycleState = Unprovisioned
53,433,681 UART: [state] DebugLocked = No
53,435,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,439,876 UART: [kat] SHA2-256
53,609,569 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,620,082 UART: [kat] ++
53,620,569 UART: [kat] sha1
53,632,001 UART: [kat] SHA2-256
53,634,704 UART: [kat] SHA2-384
53,641,087 UART: [kat] SHA2-512-ACC
53,643,443 UART: [kat] ECC-384
55,933,299 UART: [kat] HMAC-384Kdf
55,965,057 UART: [kat] LMS
57,155,421 UART: [kat] --
57,160,244 UART: [update-reset] ++
61,300,370 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,303,221 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
61,685,496 >>> mbox cmd response: success
61,686,214 UART: [update-reset] Copying MAN_2 To MAN_1
61,708,641 UART: [update-reset Success] --
61,712,695 UART: [state] Locking Datavault
61,716,445 UART: [state] Locking PCR0, PCR1 and PCR31
61,718,203 UART: [state] Locking ICCM
61,719,657 UART: [exit] Launching FMC @ 0x40000130
61,728,054 UART:
61,728,321 UART: Running Caliptra FMC ...
61,729,429 UART:
61,729,594 UART: [state] CFI Enabled
61,823,759 UART: [art] Extend RT PCRs Done
61,824,947 UART: [art] Lock RT PCRs Done
61,826,438 UART: [art] Populate DV Done
61,831,735 UART: [fht] FMC Alias Private Key: 7
61,833,444 UART: [art] Derive CDI
61,834,264 UART: [art] Store in in slot 0x4
61,892,433 UART: [art] Derive Key Pair
61,893,474 UART: [art] Store priv key in slot 0x5
65,186,969 UART: [art] Derive Key Pair - Done
65,200,365 UART: [art] Signing Cert with AUTHO
65,201,665 UART: RITY.KEYID = 7
67,488,423 UART: [art] Erasing AUTHORITY.KEYID = 7
67,489,930 UART: [art] PUB.X = 63C5DE70C390679B3B3B3B293089F38150C11A324C859BFCAD27A4C48D0FC700DE1F20032985644B4CA17A4DDF1FB090
67,497,201 UART: [art] PUB.Y = D5C85573F4920E81E72A99F778F02640E4E59BF3FFA5414FD945D37031E7B21157643D4BB9F6393D199342D5B0C6BA26
67,504,377 UART: [art] SIG.R = 13B44E1482B9FC95FB024FA1F346E4F2BA694F57E3FB76969F5AAE7545C962B22343E471EC4632F2AA1A7D20F3DD77F9
67,511,772 UART: [art] SIG.S = 3DDFCBA171D11E2AD8E35DBAB17D126395550DA20FE40F7873F89EA2DFA27719BDA24892AFCFBA5F8C25D6500B76E30A
68,817,183 UART: Caliptra RT
68,817,866 UART: [state] CFI Enabled
69,152,285 UART: [rt] RT listening for mailbox commands...
69,154,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,183,998 UART: [rt]cmd =0x494e464f, len=4
69,187,898 >>> mbox cmd response data (264 bytes)
69,189,572 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
69,334,157 UART:
69,334,469 UART: Running Caliptra ROM ...
69,335,508 UART:
69,335,662 UART: [state] CFI Enabled
69,405,720 UART: [state] LifecycleState = Unprovisioned
69,407,654 UART: [state] DebugLocked = No
69,409,145 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,414,107 UART: [kat] SHA2-256
69,583,793 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,594,287 UART: [kat] ++
69,594,745 UART: [kat] sha1
69,605,416 UART: [kat] SHA2-256
69,608,102 UART: [kat] SHA2-384
69,614,303 UART: [kat] SHA2-512-ACC
69,616,638 UART: [kat] ECC-384
71,910,964 UART: [kat] HMAC-384Kdf
71,922,811 UART: [kat] LMS
73,113,128 UART: [kat] --
73,118,218 UART: [update-reset] ++
77,256,974 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,259,885 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
77,642,111 >>> mbox cmd response: success
77,643,865 UART: [update-reset] Copying MAN_2 To MAN_1
77,666,308 UART: [update-reset Success] --
77,671,030 UART: [state] Locking Datavault
77,673,523 UART: [state] Locking PCR0, PCR1 and PCR31
77,675,223 UART: [state] Locking ICCM
77,676,808 UART: [exit] Launching FMC @ 0x40000130
77,685,256 UART:
77,685,499 UART: Running Caliptra FMC ...
77,686,524 UART:
77,686,670 UART: [state] CFI Enabled
77,780,940 UART: [art] Extend RT PCRs Done
77,782,126 UART: [art] Lock RT PCRs Done
77,783,608 UART: [art] Populate DV Done
77,789,127 UART: [fht] FMC Alias Private Key: 7
77,790,616 UART: [art] Derive CDI
77,791,353 UART: [art] Store in in slot 0x4
77,849,550 UART: [art] Derive Key Pair
77,850,556 UART: [art] Store priv key in slot 0x5
81,143,228 UART: [art] Derive Key Pair - Done
81,156,015 UART: [art] Signing Cert with AUTHO
81,157,321 UART: RITY.KEYID = 7
83,445,260 UART: [art] Erasing AUTHORITY.KEYID = 7
83,446,767 UART: [art] PUB.X = CC30351575A5BC50FDBBB408FF6BF99AE92C1FF6C28D622A4F34299E44A3D45C35DBF3E2DF9E4F0E7A2951D22126E932
83,454,017 UART: [art] PUB.Y = 2F2E2B66DDE1869AE829B6C79710B53A136A487E32AB1E4F4E41E45560148BC238AF5E7E591567799C8944A7D3088BAF
83,461,263 UART: [art] SIG.R = A7C8410E1D8722B0D96367C538F58AFDA9BBBF8D4D90E0760CEC15DFB4328384113C82B0999EB99E8B9D1767D406601C
83,468,615 UART: [art] SIG.S = F043E504696CFA705D78A8B966EC3326DBACCC611E558BAFE355B7F5F9E7D872885A5E29AD8B5A1E1AC63FFA68270F7B
84,773,660 UART: Caliptra RT
84,774,381 UART: [state] CFI Enabled
85,111,051 UART: [rt] RT listening for mailbox commands...
85,112,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,142,458 UART: [rt]cmd =0x494e464f, len=4
85,146,389 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,785,814 ready_for_fw is high
3,786,303 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,831,352 >>> mbox cmd response: success
17,833,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,531,082 UART:
23,531,922 UART: Running Caliptra FMC ...
23,533,042 UART:
23,533,195 UART: [state] CFI Enabled
23,599,132 UART: [fht] FMC Alias Private Key: 7
25,937,472 UART: [art] Extend RT PCRs Done
25,938,698 UART: [art] Lock RT PCRs Done
25,940,262 UART: [art] Populate DV Done
25,945,776 UART: [fht] FMC Alias Private Key: 7
25,947,484 UART: [art] Derive CDI
25,948,395 UART: [art] Store in in slot 0x4
26,007,837 UART: [art] Derive Key Pair
26,008,855 UART: [art] Store priv key in slot 0x5
29,301,893 UART: [art] Derive Key Pair - Done
29,314,944 UART: [art] Signing Cert with AUTHO
29,316,278 UART: RITY.KEYID = 7
31,603,624 UART: [art] Erasing AUTHORITY.KEYID = 7
31,605,137 UART: [art] PUB.X = EE25FC8C3D50372F2565B4B053A2B596A7CF622DAA8B1D4F996F4FCF30D30E6F5D76F5BD223C921EBB5EA56DD51E7D2D
31,612,414 UART: [art] PUB.Y = 1D74A82D711553524E930CAA15FD4CE197FD586081AEE223415BA3B4E2FFE434567E19A75CDE90EC272DA88F5C079AB1
31,619,615 UART: [art] SIG.R = 57C84ADB9E630006F2CC3379DEC02EC6A45A70901D2FE9E480A7C192A01463E5758D1F88840CAD4953342207C7A4F936
31,627,039 UART: [art] SIG.S = 4A510175469F815DCE150D162830ECC4E679AF7EB66B8A8195782816F7FA999A5F95AB5C5966E4ACC036AC735DB546B6
32,932,090 UART: Caliptra RT
32,932,807 UART: [state] CFI Enabled
33,093,404 UART: [rt] RT listening for mailbox commands...
33,124,515 UART: [rt]cmd =0x494e464f, len=4
33,128,530 >>> mbox cmd response data (264 bytes)
35,262,365 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,996,266 >>> mbox cmd response: success
44,027,663 UART:
44,027,965 UART: Running Caliptra FMC ...
44,029,204 UART:
44,029,378 UART: [state] CFI Enabled
44,136,508 UART: [art] Extend RT PCRs Done
44,137,702 UART: [art] Lock RT PCRs Done
44,139,128 UART: [art] Populate DV Done
44,144,712 UART: [fht] FMC Alias Private Key: 7
44,146,209 UART: [art] Derive CDI
44,147,030 UART: [art] Store in in slot 0x4
44,205,387 UART: [art] Derive Key Pair
44,206,432 UART: [art] Store priv key in slot 0x5
47,499,145 UART: [art] Derive Key Pair - Done
47,512,492 UART: [art] Signing Cert with AUTHO
47,513,805 UART: RITY.KEYID = 7
49,800,602 UART: [art] Erasing AUTHORITY.KEYID = 7
49,802,114 UART: [art] PUB.X = 5A2690686C5DD3F67B890777A3704650E4F27880E677B8320781C2F156A0660F4C420FF938D02AD98EC717B046E076B1
49,809,333 UART: [art] PUB.Y = 06203E71EC16FE28A0927E19CEB9E60D78821F2F1347DCFA0AFA67256E3A8C31A32C59032AD9755E64E68A06B6B55D81
49,816,536 UART: [art] SIG.R = D1C5BAD7EFB6CEB7543807DD00DBC477AE1441D0DE28434F490FB46173B76C892483E20E0B32641B2A8EA81DA769A957
49,823,948 UART: [art] SIG.S = 65B17E0F5CA3DFF7E173B3155832EA21FD1097088E5F3B6D3247A0A8C59F653147A05D6A582DBC2CCC7B569F8E73E1D8
51,128,856 UART: Caliptra RT
51,129,554 UART: [state] CFI Enabled
51,464,335 UART: [rt] RT listening for mailbox commands...
51,466,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,495,855 UART: [rt]cmd =0x494e464f, len=4
51,499,636 >>> mbox cmd response data (264 bytes)
53,629,914 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
62,336,581 >>> mbox cmd response: success
62,369,720 UART:
62,370,053 UART: Running Caliptra FMC ...
62,371,107 UART:
62,371,263 UART: [state] CFI Enabled
62,478,149 UART: [art] Extend RT PCRs Done
62,479,364 UART: [art] Lock RT PCRs Done
62,480,528 UART: [art] Populate DV Done
62,486,103 UART: [fht] FMC Alias Private Key: 7
62,487,801 UART: [art] Derive CDI
62,488,537 UART: [art] Store in in slot 0x4
62,547,281 UART: [art] Derive Key Pair
62,548,330 UART: [art] Store priv key in slot 0x5
65,840,776 UART: [art] Derive Key Pair - Done
65,853,393 UART: [art] Signing Cert with AUTHO
65,854,706 UART: RITY.KEYID = 7
68,142,118 UART: [art] Erasing AUTHORITY.KEYID = 7
68,143,635 UART: [art] PUB.X = A62D8B2169F236409375DBAB21A1420991DAC80EDC031738178B58F87108B6874452C90F68A1A6250216E3E848054856
68,150,853 UART: [art] PUB.Y = EFE430FE0812A8A17F82C0181D088757ED05F137A0E96B174C3FC11CDF5705C60E7558D5929F637CEBE7E21D0155379D
68,158,116 UART: [art] SIG.R = 20FF0DAC100A9A8FCF55EF3969462D819ADB71036AD1CBA0EBEB62E677028E5FFC8A85A4860CA08C5C44B2D65118476C
68,165,481 UART: [art] SIG.S = 5CB5F7CA6A2FE0D608F26A592EC54CAFC5582B621F0D6B11D6CE20B90639D285DC1FC581C59E3EE0C8073CE1FB7BD2E2
69,469,950 UART: Caliptra RT
69,470,661 UART: [state] CFI Enabled
69,805,272 UART: [rt] RT listening for mailbox commands...
69,807,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,836,985 UART: [rt]cmd =0x494e464f, len=4
69,840,791 >>> mbox cmd response data (264 bytes)
69,842,443 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
78,567,986 >>> mbox cmd response: success
78,603,361 UART:
78,603,657 UART: Running Caliptra FMC ...
78,604,704 UART:
78,604,855 UART: [state] CFI Enabled
78,708,282 UART: [art] Extend RT PCRs Done
78,709,467 UART: [art] Lock RT PCRs Done
78,710,846 UART: [art] Populate DV Done
78,716,580 UART: [fht] FMC Alias Private Key: 7
78,718,224 UART: [art] Derive CDI
78,718,982 UART: [art] Store in in slot 0x4
78,777,420 UART: [art] Derive Key Pair
78,778,456 UART: [art] Store priv key in slot 0x5
82,070,860 UART: [art] Derive Key Pair - Done
82,083,699 UART: [art] Signing Cert with AUTHO
82,085,011 UART: RITY.KEYID = 7
84,371,752 UART: [art] Erasing AUTHORITY.KEYID = 7
84,373,252 UART: [art] PUB.X = 5A2690686C5DD3F67B890777A3704650E4F27880E677B8320781C2F156A0660F4C420FF938D02AD98EC717B046E076B1
84,380,468 UART: [art] PUB.Y = 06203E71EC16FE28A0927E19CEB9E60D78821F2F1347DCFA0AFA67256E3A8C31A32C59032AD9755E64E68A06B6B55D81
84,387,722 UART: [art] SIG.R = D1C5BAD7EFB6CEB7543807DD00DBC477AE1441D0DE28434F490FB46173B76C892483E20E0B32641B2A8EA81DA769A957
84,395,087 UART: [art] SIG.S = 65B17E0F5CA3DFF7E173B3155832EA21FD1097088E5F3B6D3247A0A8C59F653147A05D6A582DBC2CCC7B569F8E73E1D8
85,700,162 UART: Caliptra RT
85,700,873 UART: [state] CFI Enabled
86,031,862 UART: [rt] RT listening for mailbox commands...
86,033,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
86,063,485 UART: [rt]cmd =0x494e464f, len=4
86,067,198 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.42s
Truncated 1800 bytes from beginning
DI.KEYID = 6
7,644,751 UART: [ldev] SUBJECT.KEYID = 5
7,645,960 UART: [ldev] AUTHORITY.KEYID = 7
7,647,237 UART: [ldev] FE.KEYID = 1
7,657,232 UART: [ldev] Erasing FE.KEYID = 1
10,945,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,510 UART: [ldev] --
13,306,804 UART: [fwproc] Waiting for Commands...
13,309,160 UART: [fwproc] Received command 0x46574c44
13,311,384 UART: [fwproc] Received Image of size 114124 bytes
17,367,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,458 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,398 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,829,900 >>> mbox cmd response: success
17,831,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,833,968 UART: [afmc] ++
17,834,546 UART: [afmc] CDI.KEYID = 6
17,835,562 UART: [afmc] SUBJECT.KEYID = 7
17,836,719 UART: [afmc] AUTHORITY.KEYID = 5
21,151,584 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,762 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,017 UART: [afmc] PUB.X = 58869B145FC8A839D53FC6E5BE3D940FECEAEE2613F5D46CED8D5217DA34E93284C649DE649CF1FB360D4A8B9078C7BF
23,464,530 UART: [afmc] PUB.Y = 1ED4F8DEBE33D74A44A688A04CDC591E1B0F4468DC8B4DD11AFCC6F4B4CB3DBAD163E83E3F4F140E62CAC71F0B244458
23,479,311 UART: [afmc] SIG.R = A32F2EB2EA2ED491133AF4583EC0B9DFEFEC4DDEB8D7D5532B72B5C7F65FD418ADF34A9B09AD19B3FB5B3C1DBAC7506B
23,493,845 UART: [afmc] SIG.S = A385A20EC7B85D6B92927D55A3E741E77648405D323D471B48F02B8213BD0FC748FAB237AC679DF7398A53BCC0629E61
23,516,513 UART: [afmc] --
23,520,378 UART: [cold-reset] --
23,524,237 UART: [state] Locking Datavault
23,529,152 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,898 UART: [state] Locking ICCM
23,532,177 UART: [exit] Launching FMC @ 0x40000130
23,540,576 UART:
23,540,806 UART: Running Caliptra FMC ...
23,541,906 UART:
23,542,052 UART: [state] CFI Enabled
23,550,207 UART: [fht] FMC Alias Private Key: 7
25,881,415 UART: [art] Extend RT PCRs Done
25,882,637 UART: [art] Lock RT PCRs Done
25,884,332 UART: [art] Populate DV Done
25,889,687 UART: [fht] FMC Alias Private Key: 7
25,891,383 UART: [art] Derive CDI
25,892,192 UART: [art] Store in in slot 0x4
25,935,114 UART: [art] Derive Key Pair
25,936,110 UART: [art] Store priv key in slot 0x5
29,177,865 UART: [art] Derive Key Pair - Done
29,190,866 UART: [art] Signing Cert with AUTHO
29,192,166 UART: RITY.KEYID = 7
31,471,083 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,585 UART: [art] PUB.X = 180B248C23732627AD12D643479555B7F378BDB15A38E5CFB14A5090809495105DD7DD056521C3A36B2DD54D3D1ACFD5
31,479,819 UART: [art] PUB.Y = 16BCAB9C5878F5804EFE11116E98E66A11EA2686600E7A39ED9EE953F28D89C29267DC63549F1EE5BC78C0DBE626DF79
31,487,045 UART: [art] SIG.R = 2F17996CAE6D8100485A03EEA2DFA2E0EAA20BE7C4DB44D64D9E9B9CCAC9741DF105A8424F105422EBAC15D40D6522B8
31,494,423 UART: [art] SIG.S = E05D66D24A4CEA04ECBAD8B7BE4FAD41C19B90A0F9D9BC9819426E112EC0BF3C611500D4890B1FBEA9F36A6AD59BC297
32,799,665 UART: Caliptra RT
32,800,372 UART: [state] CFI Enabled
32,917,800 UART: [rt] RT listening for mailbox commands...
32,949,161 UART: [rt]cmd =0x494e464f, len=4
32,953,221 >>> mbox cmd response data (264 bytes)
35,011,989 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,157,004 UART:
35,157,390 UART: Running Caliptra ROM ...
35,158,440 UART:
35,158,642 UART: [state] CFI Enabled
35,170,544 UART: [state] LifecycleState = Unprovisioned
35,172,501 UART: [state] DebugLocked = No
35,174,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,178,723 UART: [kat] SHA2-256
35,348,448 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,358,985 UART: [kat] ++
35,359,522 UART: [kat] sha1
35,370,786 UART: [kat] SHA2-256
35,373,527 UART: [kat] SHA2-384
35,379,776 UART: [kat] SHA2-512-ACC
35,382,117 UART: [kat] ECC-384
37,665,889 UART: [kat] HMAC-384Kdf
37,678,445 UART: [kat] LMS
38,868,518 UART: [kat] --
38,875,259 UART: [update-reset] ++
43,006,795 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,011,286 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
43,393,538 >>> mbox cmd response: success
43,394,228 UART: [update-reset] Copying MAN_2 To MAN_1
43,416,682 UART: [update-reset Success] --
43,420,912 UART: [state] Locking Datavault
43,425,505 UART: [state] Locking PCR0, PCR1 and PCR31
43,427,195 UART: [state] Locking ICCM
43,429,748 UART: [exit] Launching FMC @ 0x40000130
43,438,134 UART:
43,438,368 UART: Running Caliptra FMC ...
43,439,386 UART:
43,439,525 UART: [state] CFI Enabled
43,483,986 UART: [art] Extend RT PCRs Done
43,485,170 UART: [art] Lock RT PCRs Done
43,486,430 UART: [art] Populate DV Done
43,491,887 UART: [fht] FMC Alias Private Key: 7
43,493,543 UART: [art] Derive CDI
43,494,377 UART: [art] Store in in slot 0x4
43,537,074 UART: [art] Derive Key Pair
43,538,077 UART: [art] Store priv key in slot 0x5
46,780,489 UART: [art] Derive Key Pair - Done
46,793,481 UART: [art] Signing Cert with AUTHO
46,794,781 UART: RITY.KEYID = 7
49,074,178 UART: [art] Erasing AUTHORITY.KEYID = 7
49,075,687 UART: [art] PUB.X = A82418EBA8C85BBD8EB0EAA156A6E8A109C881737D8AEB48C64E86AC01C93AF67B376410E2D827B5BA9023F143B40B25
49,082,926 UART: [art] PUB.Y = 901C9096DFD7576CD2665C39EF9E86F09E6E23361123212C2AC78FD944105F63FC4C56A5C10E6A5D13BA88B8544BD446
49,090,150 UART: [art] SIG.R = 01D1D2A9767DA2D60CDAB1D3ED7CCF5E5800981F5B0DE620A922A18ABD672C7C7FEAE79B5FC8D6B3F2C01013CC2FCEF1
49,097,584 UART: [art] SIG.S = F4C634C3DCF9B7BF31A0C2DA165565DB09F665D65B105F76C985136D8F0E8626F586A315C8130EDA15A4424C9E7BF4AD
50,402,574 UART: Caliptra RT
50,403,291 UART: [state] CFI Enabled
50,690,034 UART: [rt] RT listening for mailbox commands...
50,691,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,721,488 UART: [rt]cmd =0x494e464f, len=4
50,725,459 >>> mbox cmd response data (264 bytes)
52,779,083 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
52,924,243 UART:
52,924,620 UART: Running Caliptra ROM ...
52,925,666 UART:
52,925,925 UART: [state] CFI Enabled
52,941,825 UART: [state] LifecycleState = Unprovisioned
52,943,715 UART: [state] DebugLocked = No
52,945,226 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,950,927 UART: [kat] SHA2-256
53,120,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,131,161 UART: [kat] ++
53,131,637 UART: [kat] sha1
53,142,294 UART: [kat] SHA2-256
53,144,975 UART: [kat] SHA2-384
53,149,722 UART: [kat] SHA2-512-ACC
53,152,082 UART: [kat] ECC-384
55,437,022 UART: [kat] HMAC-384Kdf
55,450,022 UART: [kat] LMS
56,640,095 UART: [kat] --
56,643,785 UART: [update-reset] ++
60,786,648 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,790,749 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
61,173,046 >>> mbox cmd response: success
61,174,698 UART: [update-reset] Copying MAN_2 To MAN_1
61,197,141 UART: [update-reset Success] --
61,200,936 UART: [state] Locking Datavault
61,204,782 UART: [state] Locking PCR0, PCR1 and PCR31
61,206,495 UART: [state] Locking ICCM
61,208,802 UART: [exit] Launching FMC @ 0x40000130
61,217,195 UART:
61,217,423 UART: Running Caliptra FMC ...
61,218,518 UART:
61,218,673 UART: [state] CFI Enabled
61,262,955 UART: [art] Extend RT PCRs Done
61,264,138 UART: [art] Lock RT PCRs Done
61,265,697 UART: [art] Populate DV Done
61,271,423 UART: [fht] FMC Alias Private Key: 7
61,273,013 UART: [art] Derive CDI
61,273,828 UART: [art] Store in in slot 0x4
61,316,527 UART: [art] Derive Key Pair
61,317,564 UART: [art] Store priv key in slot 0x5
64,560,066 UART: [art] Derive Key Pair - Done
64,573,023 UART: [art] Signing Cert with AUTHO
64,574,348 UART: RITY.KEYID = 7
66,853,683 UART: [art] Erasing AUTHORITY.KEYID = 7
66,855,187 UART: [art] PUB.X = EB3F21CF7068D36A9C18FBD932311142F6E8E026A59D670B1BE3B950B3DF32159A064ABC148A1715D67F65DFA06B19C2
66,862,437 UART: [art] PUB.Y = FD50D0D104A623537AB64F3849382002DAC4597D15691CD1DE290FE5D9AD1FF2684BD150CDD355701A263263B90F16A4
66,869,665 UART: [art] SIG.R = 263E0FCC9B72C85488317EBEDC6C7582395C29D50B451A2C9F064B4C01021187538ECEFD6C7C081DEE77F6AB93C077C4
66,877,048 UART: [art] SIG.S = E45B6A9DAF729EF0DF7116024069F9BCBEA87F9153FEBD63F4A91158DF972E21AEED5D8F3DEBF2D02FA0859FC47C086D
68,182,097 UART: Caliptra RT
68,182,814 UART: [state] CFI Enabled
68,469,691 UART: [rt] RT listening for mailbox commands...
68,471,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,501,272 UART: [rt]cmd =0x494e464f, len=4
68,505,011 >>> mbox cmd response data (264 bytes)
68,506,690 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
68,650,995 UART:
68,651,294 UART: Running Caliptra ROM ...
68,652,413 UART:
68,652,642 UART: [state] CFI Enabled
68,668,464 UART: [state] LifecycleState = Unprovisioned
68,670,615 UART: [state] DebugLocked = No
68,673,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
68,677,542 UART: [kat] SHA2-256
68,847,306 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,857,799 UART: [kat] ++
68,858,278 UART: [kat] sha1
68,870,454 UART: [kat] SHA2-256
68,873,142 UART: [kat] SHA2-384
68,879,124 UART: [kat] SHA2-512-ACC
68,881,521 UART: [kat] ECC-384
71,166,843 UART: [kat] HMAC-384Kdf
71,178,957 UART: [kat] LMS
72,368,980 UART: [kat] --
72,373,261 UART: [update-reset] ++
76,517,950 UART: [update-reset] Image verified using Vendor ECC Key Index 0
76,521,231 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
76,903,535 >>> mbox cmd response: success
76,903,908 UART: [update-reset] Copying MAN_2 To MAN_1
76,926,325 UART: [update-reset Success] --
76,930,332 UART: [state] Locking Datavault
76,934,769 UART: [state] Locking PCR0, PCR1 and PCR31
76,936,520 UART: [state] Locking ICCM
76,938,426 UART: [exit] Launching FMC @ 0x40000130
76,946,873 UART:
76,947,106 UART: Running Caliptra FMC ...
76,948,202 UART:
76,948,353 UART: [state] CFI Enabled
76,992,210 UART: [art] Extend RT PCRs Done
76,993,386 UART: [art] Lock RT PCRs Done
76,995,105 UART: [art] Populate DV Done
77,000,419 UART: [fht] FMC Alias Private Key: 7
77,002,065 UART: [art] Derive CDI
77,002,882 UART: [art] Store in in slot 0x4
77,045,364 UART: [art] Derive Key Pair
77,046,364 UART: [art] Store priv key in slot 0x5
80,288,244 UART: [art] Derive Key Pair - Done
80,301,349 UART: [art] Signing Cert with AUTHO
80,302,648 UART: RITY.KEYID = 7
82,581,838 UART: [art] Erasing AUTHORITY.KEYID = 7
82,583,345 UART: [art] PUB.X = A82418EBA8C85BBD8EB0EAA156A6E8A109C881737D8AEB48C64E86AC01C93AF67B376410E2D827B5BA9023F143B40B25
82,591,149 UART: [art] PUB.Y = 901C9096DFD7576CD2665C39EF9E86F09E6E23361123212C2AC78FD944105F63FC4C56A5C10E6A5D13BA88B8544BD446
82,597,843 UART: [art] SIG.R = 01D1D2A9767DA2D60CDAB1D3ED7CCF5E5800981F5B0DE620A922A18ABD672C7C7FEAE79B5FC8D6B3F2C01013CC2FCEF1
82,605,286 UART: [art] SIG.S = F4C634C3DCF9B7BF31A0C2DA165565DB09F665D65B105F76C985136D8F0E8626F586A315C8130EDA15A4424C9E7BF4AD
83,911,169 UART: Caliptra RT
83,911,856 UART: [state] CFI Enabled
84,199,151 UART: [rt] RT listening for mailbox commands...
84,201,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
84,230,723 UART: [rt]cmd =0x494e464f, len=4
84,234,672 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,127,786 ready_for_fw is high
4,128,386 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,080,264 >>> mbox cmd response: success
18,081,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,723,110 UART:
23,723,517 UART: Running Caliptra FMC ...
23,724,619 UART:
23,724,764 UART: [state] CFI Enabled
23,732,612 UART: [fht] FMC Alias Private Key: 7
26,063,608 UART: [art] Extend RT PCRs Done
26,064,834 UART: [art] Lock RT PCRs Done
26,066,709 UART: [art] Populate DV Done
26,072,020 UART: [fht] FMC Alias Private Key: 7
26,073,667 UART: [art] Derive CDI
26,074,400 UART: [art] Store in in slot 0x4
26,117,636 UART: [art] Derive Key Pair
26,118,632 UART: [art] Store priv key in slot 0x5
29,360,083 UART: [art] Derive Key Pair - Done
29,373,083 UART: [art] Signing Cert with AUTHO
29,374,393 UART: RITY.KEYID = 7
31,653,694 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,218 UART: [art] PUB.X = 9F5F41C54CE1DF95815A173E8B9D21C10AF1BEAA9198612B6F97FDE03630D28C6D386E5FB8B55A741DF0C691EBD69B2E
31,662,469 UART: [art] PUB.Y = 8BB6DD4338A1EE1755D5620316A57B46496838FD53C25C87B67ECBC59879808C087A5925F1C59DD61E063A3683DC8BD6
31,669,700 UART: [art] SIG.R = CDECAE3207AE800A1582C491B37B716785FC82219ECAC0499F2D6C329981180E9AC1617B7CC6B54EDA21344E8EBBD889
31,677,097 UART: [art] SIG.S = 99FF41C2BC3D163AC8E06C8FA0531DA808F592450C270F13E47892ED127FCF49F5C3D88F46B568D15CDFFD96C3B9CAD3
32,981,891 UART: Caliptra RT
32,982,603 UART: [state] CFI Enabled
33,099,064 UART: [rt] RT listening for mailbox commands...
33,130,431 UART: [rt]cmd =0x494e464f, len=4
33,134,382 >>> mbox cmd response data (264 bytes)
35,191,400 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,851,216 >>> mbox cmd response: success
43,886,815 UART:
43,887,132 UART: Running Caliptra FMC ...
43,888,249 UART:
43,888,409 UART: [state] CFI Enabled
43,932,696 UART: [art] Extend RT PCRs Done
43,933,883 UART: [art] Lock RT PCRs Done
43,935,342 UART: [art] Populate DV Done
43,940,804 UART: [fht] FMC Alias Private Key: 7
43,942,336 UART: [art] Derive CDI
43,943,146 UART: [art] Store in in slot 0x4
43,985,785 UART: [art] Derive Key Pair
43,986,817 UART: [art] Store priv key in slot 0x5
47,229,094 UART: [art] Derive Key Pair - Done
47,242,287 UART: [art] Signing Cert with AUTHO
47,243,598 UART: RITY.KEYID = 7
49,523,397 UART: [art] Erasing AUTHORITY.KEYID = 7
49,524,913 UART: [art] PUB.X = E535CB70EAB2FDC1E66AD017E666984EE5E07491FCB26D7BB32E6372D9B379242DDFD4B6D677E4C91BDA84C90F45B61D
49,532,154 UART: [art] PUB.Y = BFDD978B0A4872C00F8893A5C1558D2A536516176E607F9EAF39FA4A9AE11CA5D29E787E6AD80CF00F5BF4BF2869B063
49,539,438 UART: [art] SIG.R = 736E9EAFF11B269984B8535456C7CD485CDD1DFE575F7336CBC6C9E0F95C3795879602F7A12B6F084E4952524E5AFE4D
49,546,779 UART: [art] SIG.S = B7DDB5D475A04BBCACC124A83D95DC6B919FBF3F9574359CB8D1E250ED4B7FFA15B27B81CBAC46AAF07F8D9613F0FCE8
50,852,058 UART: Caliptra RT
50,852,769 UART: [state] CFI Enabled
51,139,564 UART: [rt] RT listening for mailbox commands...
51,141,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,171,129 UART: [rt]cmd =0x494e464f, len=4
51,175,269 >>> mbox cmd response data (264 bytes)
53,229,526 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
61,890,621 >>> mbox cmd response: success
61,924,947 UART:
61,925,274 UART: Running Caliptra FMC ...
61,926,400 UART:
61,926,560 UART: [state] CFI Enabled
61,971,061 UART: [art] Extend RT PCRs Done
61,972,411 UART: [art] Lock RT PCRs Done
61,973,713 UART: [art] Populate DV Done
61,979,235 UART: [fht] FMC Alias Private Key: 7
61,980,884 UART: [art] Derive CDI
61,981,696 UART: [art] Store in in slot 0x4
62,024,447 UART: [art] Derive Key Pair
62,025,450 UART: [art] Store priv key in slot 0x5
65,267,316 UART: [art] Derive Key Pair - Done
65,280,480 UART: [art] Signing Cert with AUTHO
65,281,804 UART: RITY.KEYID = 7
67,561,452 UART: [art] Erasing AUTHORITY.KEYID = 7
67,562,968 UART: [art] PUB.X = 5724EFE95528A0029633F62CDC8494212A72FCB430848958F7515F1D699EBD344832A582A2CB8E18EF2897B9A1B96296
67,570,165 UART: [art] PUB.Y = BFA8E67ED87938C9DF8B01BF6C0406CF3314AE4C2A8F4482EE1C129EB0BF57894B24F6C52F1DE011234EF9CD2F86AAA8
67,577,453 UART: [art] SIG.R = 6EF2BCF0E637E0614840978A09F7CD49C1F5B711944085C5E7B54674B4C338AEE1000DECC2C1FD6849DB9362670BB281
67,584,804 UART: [art] SIG.S = B502932DA2DA29FCA5AD45CC63E65C42BABAE855902A3ECC9E622003A8B70E502A57A6516E6701142ABB8B69141E6F02
68,889,688 UART: Caliptra RT
68,890,392 UART: [state] CFI Enabled
69,182,056 UART: [rt] RT listening for mailbox commands...
69,183,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,213,594 UART: [rt]cmd =0x494e464f, len=4
69,217,601 >>> mbox cmd response data (264 bytes)
69,219,266 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
77,873,796 >>> mbox cmd response: success
77,908,326 UART:
77,908,625 UART: Running Caliptra FMC ...
77,909,681 UART:
77,909,830 UART: [state] CFI Enabled
77,953,953 UART: [art] Extend RT PCRs Done
77,955,094 UART: [art] Lock RT PCRs Done
77,956,619 UART: [art] Populate DV Done
77,962,074 UART: [fht] FMC Alias Private Key: 7
77,963,605 UART: [art] Derive CDI
77,964,329 UART: [art] Store in in slot 0x4
78,006,919 UART: [art] Derive Key Pair
78,007,970 UART: [art] Store priv key in slot 0x5
81,249,977 UART: [art] Derive Key Pair - Done
81,262,660 UART: [art] Signing Cert with AUTHO
81,263,991 UART: RITY.KEYID = 7
83,542,999 UART: [art] Erasing AUTHORITY.KEYID = 7
83,544,500 UART: [art] PUB.X = E535CB70EAB2FDC1E66AD017E666984EE5E07491FCB26D7BB32E6372D9B379242DDFD4B6D677E4C91BDA84C90F45B61D
83,551,799 UART: [art] PUB.Y = BFDD978B0A4872C00F8893A5C1558D2A536516176E607F9EAF39FA4A9AE11CA5D29E787E6AD80CF00F5BF4BF2869B063
83,559,045 UART: [art] SIG.R = 736E9EAFF11B269984B8535456C7CD485CDD1DFE575F7336CBC6C9E0F95C3795879602F7A12B6F084E4952524E5AFE4D
83,566,431 UART: [art] SIG.S = B7DDB5D475A04BBCACC124A83D95DC6B919FBF3F9574359CB8D1E250ED4B7FFA15B27B81CBAC46AAF07F8D9613F0FCE8
84,871,668 UART: Caliptra RT
84,872,376 UART: [state] CFI Enabled
85,160,917 UART: [rt] RT listening for mailbox commands...
85,162,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,192,363 UART: [rt]cmd =0x494e464f, len=4
85,196,348 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.38s
Truncated 1634 bytes from beginning
,003,365 UART: [idev] Sha1 KeyId Algorithm
6,025,403 UART: [idev] --
6,028,964 UART: [ldev] ++
6,029,532 UART: [ldev] CDI.KEYID = 6
6,030,416 UART: [ldev] SUBJECT.KEYID = 5
6,031,629 UART: [ldev] AUTHORITY.KEYID = 7
6,032,916 UART: [ldev] FE.KEYID = 1
6,078,276 UART: [ldev] Erasing FE.KEYID = 1
8,580,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,527 UART: [ldev] --
10,391,828 UART: [fwproc] Wait for Commands...
10,394,575 UART: [fwproc] Recv command 0x46574c44
10,396,663 UART: [fwproc] Recv'd Img size: 114448 bytes
13,797,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,881 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,253,461 >>> mbox cmd response: success
14,254,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,257,484 UART: [afmc] ++
14,258,085 UART: [afmc] CDI.KEYID = 6
14,259,021 UART: [afmc] SUBJECT.KEYID = 7
14,260,186 UART: [afmc] AUTHORITY.KEYID = 5
16,785,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,377 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,546,482 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,562,437 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,578,399 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,600,282 UART: [afmc] --
18,604,044 UART: [cold-reset] --
18,608,714 UART: [state] Locking Datavault
18,615,419 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,059 UART: [state] Locking ICCM
18,619,052 UART: [exit] Launching FMC @ 0x40000130
18,627,459 UART:
18,627,734 UART: Running Caliptra FMC ...
18,628,862 UART:
18,629,021 UART: [state] CFI Enabled
18,686,604 UART: [fht] FMC Alias Private Key: 7
20,450,136 UART: [art] Extend RT PCRs Done
20,451,358 UART: [art] Lock RT PCRs Done
20,452,768 UART: [art] Populate DV Done
20,458,075 UART: [fht] FMC Alias Private Key: 7
20,459,666 UART: [art] Derive CDI
20,460,478 UART: [art] Store in in slot 0x4
20,519,653 UART: [art] Derive Key Pair
20,520,696 UART: [art] Store priv key in slot 0x5
22,983,628 UART: [art] Derive Key Pair - Done
22,996,566 UART: [art] Signing Cert with AUTHO
22,997,866 UART: RITY.KEYID = 7
24,709,959 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,454 UART: [art] PUB.X = C799CD905EB1760D3AED1175497EB3E03953D66F58276C7E8649699B0137B4302B807EB5593D58CB02022A2C4F4B2AD5
24,718,730 UART: [art] PUB.Y = 1F25A7E9FC9156B3744946DE7733F2F6BACBBA9A76400E3555E9B8203B1112F576B6E5C30306170BEB24105594BF5F36
24,725,924 UART: [art] SIG.R = A353A1843DD1AB609FD9E79471DD4966DF70F0D9A32ABF1F83B733CDFA27BBEF4B90784F125D1826E6DD212119231935
24,733,321 UART: [art] SIG.S = F57AE7B2C7570A0AB4FC481F520557A07CB5C0E9E5E66CB8D9E8BF191861996FD7B5C25E9F24059ECB7F105DFEA3EEA3
25,712,517 UART: Caliptra RT
25,713,222 UART: [state] CFI Enabled
25,878,126 UART: [rt] RT listening for mailbox commands...
25,909,422 UART: [rt]cmd =0x494e464f, len=4
25,913,219 >>> mbox cmd response data (264 bytes)
27,979,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,125,628 UART:
28,126,024 UART: Running Caliptra ROM ...
28,127,125 UART:
28,127,289 UART: [state] CFI Enabled
28,186,079 UART: [state] LifecycleState = Unprovisioned
28,187,967 UART: [state] DebugLocked = No
28,189,250 UART: [state] WD Timer not started. Device not locked for debugging
28,193,312 UART: [kat] SHA2-256
28,372,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,384,027 UART: [kat] ++
28,384,568 UART: [kat] sha1
28,396,224 UART: [kat] SHA2-256
28,399,225 UART: [kat] SHA2-384
28,406,515 UART: [kat] SHA2-512-ACC
28,409,458 UART: [kat] ECC-384
30,869,532 UART: [kat] HMAC-384Kdf
30,892,050 UART: [kat] LMS
31,421,521 UART: [kat] --
31,425,351 UART: [update-reset] ++
34,858,987 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,861,934 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,245,204 >>> mbox cmd response: success
35,245,831 UART: [update-reset] Copying MAN_2 To MAN_1
35,268,164 UART: [update-reset Success] --
35,272,584 UART: [state] Locking Datavault
35,276,051 UART: [state] Locking PCR0, PCR1 and PCR31
35,277,755 UART: [state] Locking ICCM
35,279,905 UART: [exit] Launching FMC @ 0x40000130
35,288,354 UART:
35,288,590 UART: Running Caliptra FMC ...
35,289,686 UART:
35,289,844 UART: [state] CFI Enabled
35,383,265 UART: [art] Extend RT PCRs Done
35,384,454 UART: [art] Lock RT PCRs Done
35,386,231 UART: [art] Populate DV Done
35,391,580 UART: [fht] FMC Alias Private Key: 7
35,393,216 UART: [art] Derive CDI
35,394,025 UART: [art] Store in in slot 0x4
35,453,555 UART: [art] Derive Key Pair
35,454,588 UART: [art] Store priv key in slot 0x5
37,917,174 UART: [art] Derive Key Pair - Done
37,930,223 UART: [art] Signing Cert with AUTHO
37,931,523 UART: RITY.KEYID = 7
39,643,143 UART: [art] Erasing AUTHORITY.KEYID = 7
39,644,645 UART: [art] PUB.X = 91B478A27A7FEF3A9C2EF3F10DDBBDD60F0849BBAE7982B06E365211CEA957B8E94FAE4FC0E446AAE7757C8133DCBD59
39,651,969 UART: [art] PUB.Y = B35B0DE9913CEE8DE3D8B7F957A47BF23E2EABF30ADAF2EC975F47AB096091441794B2DC7523026CF5A7F2A8683A5E07
39,659,217 UART: [art] SIG.R = E2BFC7C7ED4DC00310B8753FBBDF6F13ED442CEA00F296DE9F6A1ABCFCDBC05A816BF672EC1D0721B4253F31F0B02609
39,666,710 UART: [art] SIG.S = C8013BC3FE249E30350BBCFB0CE0F54829CFEA3C3BAB71533E2CA23976C2E2AF91676CDE9228FCD7618CF93CF1265B0F
40,645,841 UART: Caliptra RT
40,646,554 UART: [state] CFI Enabled
40,983,410 UART: [rt] RT listening for mailbox commands...
40,985,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,014,878 UART: [rt]cmd =0x494e464f, len=4
41,018,836 >>> mbox cmd response data (264 bytes)
43,075,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
43,220,731 UART:
43,221,099 UART: Running Caliptra ROM ...
43,222,236 UART:
43,222,407 UART: [state] CFI Enabled
43,287,676 UART: [state] LifecycleState = Unprovisioned
43,289,576 UART: [state] DebugLocked = No
43,291,181 UART: [state] WD Timer not started. Device not locked for debugging
43,294,220 UART: [kat] SHA2-256
43,473,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
43,484,914 UART: [kat] ++
43,485,456 UART: [kat] sha1
43,496,079 UART: [kat] SHA2-256
43,499,153 UART: [kat] SHA2-384
43,504,158 UART: [kat] SHA2-512-ACC
43,507,098 UART: [kat] ECC-384
45,950,251 UART: [kat] HMAC-384Kdf
45,975,499 UART: [kat] LMS
46,504,976 UART: [kat] --
46,509,089 UART: [update-reset] ++
49,937,602 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,941,464 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
50,324,800 >>> mbox cmd response: success
50,325,405 UART: [update-reset] Copying MAN_2 To MAN_1
50,347,738 UART: [update-reset Success] --
50,353,636 UART: [state] Locking Datavault
50,355,854 UART: [state] Locking PCR0, PCR1 and PCR31
50,357,498 UART: [state] Locking ICCM
50,359,160 UART: [exit] Launching FMC @ 0x40000130
50,367,607 UART:
50,367,841 UART: Running Caliptra FMC ...
50,368,941 UART:
50,369,113 UART: [state] CFI Enabled
50,467,729 UART: [art] Extend RT PCRs Done
50,468,915 UART: [art] Lock RT PCRs Done
50,470,311 UART: [art] Populate DV Done
50,475,992 UART: [fht] FMC Alias Private Key: 7
50,477,640 UART: [art] Derive CDI
50,478,474 UART: [art] Store in in slot 0x4
50,535,951 UART: [art] Derive Key Pair
50,536,945 UART: [art] Store priv key in slot 0x5
52,999,446 UART: [art] Derive Key Pair - Done
53,012,397 UART: [art] Signing Cert with AUTHO
53,013,706 UART: RITY.KEYID = 7
54,726,049 UART: [art] Erasing AUTHORITY.KEYID = 7
54,727,543 UART: [art] PUB.X = EF06FBF9CEB2EA2329E55C842AF3CEDB6CF56A072DF3454AF293765568152AF3513DFD9DC5D51F1080AB0CE61C2010D8
54,734,803 UART: [art] PUB.Y = E0B5FD4415B250BCCEB2D565D5DFF5F9BA75FE4B7B577EB15C41A334DD0DBBF48910A13504E1DF4CC0E1789C563E53C6
54,742,153 UART: [art] SIG.R = 28EAD6CFE70DC3CF9BD75D5FE7D723071D7F49DE83BC7E9C7A6A23ADFDED9462C771535A5C30A9F9FACE9FC69AAD7A84
54,749,550 UART: [art] SIG.S = 9CD33775911FC7B07CD121A5B412AF5272324F92F142A666BA3F6B3C91DCA7F51410FC41C766D118D72EC88EE823A08E
55,728,509 UART: Caliptra RT
55,729,227 UART: [state] CFI Enabled
56,067,006 UART: [rt] RT listening for mailbox commands...
56,068,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,098,586 UART: [rt]cmd =0x494e464f, len=4
56,102,675 >>> mbox cmd response data (264 bytes)
56,104,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
56,249,101 UART:
56,249,404 UART: Running Caliptra ROM ...
56,250,518 UART:
56,250,688 UART: [state] CFI Enabled
56,320,519 UART: [state] LifecycleState = Unprovisioned
56,322,390 UART: [state] DebugLocked = No
56,323,883 UART: [state] WD Timer not started. Device not locked for debugging
56,327,579 UART: [kat] SHA2-256
56,506,739 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
56,518,314 UART: [kat] ++
56,518,766 UART: [kat] sha1
56,530,348 UART: [kat] SHA2-256
56,533,406 UART: [kat] SHA2-384
56,539,331 UART: [kat] SHA2-512-ACC
56,542,283 UART: [kat] ECC-384
58,987,395 UART: [kat] HMAC-384Kdf
59,008,865 UART: [kat] LMS
59,538,345 UART: [kat] --
59,543,575 UART: [update-reset] ++
62,982,590 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,986,181 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
63,369,503 >>> mbox cmd response: success
63,369,893 UART: [update-reset] Copying MAN_2 To MAN_1
63,392,228 UART: [update-reset Success] --
63,395,591 UART: [state] Locking Datavault
63,398,407 UART: [state] Locking PCR0, PCR1 and PCR31
63,400,104 UART: [state] Locking ICCM
63,401,765 UART: [exit] Launching FMC @ 0x40000130
63,410,217 UART:
63,410,451 UART: Running Caliptra FMC ...
63,411,573 UART:
63,411,735 UART: [state] CFI Enabled
63,498,379 UART: [art] Extend RT PCRs Done
63,499,560 UART: [art] Lock RT PCRs Done
63,501,009 UART: [art] Populate DV Done
63,506,472 UART: [fht] FMC Alias Private Key: 7
63,508,151 UART: [art] Derive CDI
63,508,982 UART: [art] Store in in slot 0x4
63,567,647 UART: [art] Derive Key Pair
63,568,645 UART: [art] Store priv key in slot 0x5
66,031,695 UART: [art] Derive Key Pair - Done
66,044,470 UART: [art] Signing Cert with AUTHO
66,045,777 UART: RITY.KEYID = 7
67,757,205 UART: [art] Erasing AUTHORITY.KEYID = 7
67,758,724 UART: [art] PUB.X = 91B478A27A7FEF3A9C2EF3F10DDBBDD60F0849BBAE7982B06E365211CEA957B8E94FAE4FC0E446AAE7757C8133DCBD59
67,765,990 UART: [art] PUB.Y = B35B0DE9913CEE8DE3D8B7F957A47BF23E2EABF30ADAF2EC975F47AB096091441794B2DC7523026CF5A7F2A8683A5E07
67,773,249 UART: [art] SIG.R = E2BFC7C7ED4DC00310B8753FBBDF6F13ED442CEA00F296DE9F6A1ABCFCDBC05A816BF672EC1D0721B4253F31F0B02609
67,780,658 UART: [art] SIG.S = C8013BC3FE249E30350BBCFB0CE0F54829CFEA3C3BAB71533E2CA23976C2E2AF91676CDE9228FCD7618CF93CF1265B0F
68,759,496 UART: Caliptra RT
68,760,186 UART: [state] CFI Enabled
69,102,210 UART: [rt] RT listening for mailbox commands...
69,104,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,133,871 UART: [rt]cmd =0x494e464f, len=4
69,137,852 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,374,705 ready_for_fw is high
3,375,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,091,146 >>> mbox cmd response: success
14,092,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,385,500 UART:
18,385,885 UART: Running Caliptra FMC ...
18,387,000 UART:
18,387,163 UART: [state] CFI Enabled
18,449,718 UART: [fht] FMC Alias Private Key: 7
20,213,752 UART: [art] Extend RT PCRs Done
20,215,005 UART: [art] Lock RT PCRs Done
20,216,239 UART: [art] Populate DV Done
20,221,706 UART: [fht] FMC Alias Private Key: 7
20,223,247 UART: [art] Derive CDI
20,224,061 UART: [art] Store in in slot 0x4
20,282,008 UART: [art] Derive Key Pair
20,283,053 UART: [art] Store priv key in slot 0x5
22,745,952 UART: [art] Derive Key Pair - Done
22,759,030 UART: [art] Signing Cert with AUTHO
22,760,331 UART: RITY.KEYID = 7
24,471,398 UART: [art] Erasing AUTHORITY.KEYID = 7
24,472,901 UART: [art] PUB.X = DB2B1F21A8B8A03D7FFC30E26CD31968F82BC7182A2FF25F98740F63E018D41B5913EBFAA2040B50D44ED463C5DE88A2
24,480,202 UART: [art] PUB.Y = 9E5423FA852F6233ECCDD980C89F0066778BA9F38ED4A87E015229706D1C7E1A93D777E1AA5825B876C23F33E1B2F438
24,487,418 UART: [art] SIG.R = 0AB65550E921C0F5FFBF12A136590253E6CA018DE90BB02A5ACCE0CBA70FCC6BCE413F523949AB0A7640289E939F8367
24,494,806 UART: [art] SIG.S = DBCF7FBAAA242C404DC3E3461B98AF8C1F8B8234C8376495B6133A09084F0B14927D13C161EBA2EDCF7E4DF190CD4B39
25,473,428 UART: Caliptra RT
25,474,148 UART: [state] CFI Enabled
25,638,699 UART: [rt] RT listening for mailbox commands...
25,669,952 UART: [rt]cmd =0x494e464f, len=4
25,673,907 >>> mbox cmd response data (264 bytes)
27,732,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,871,809 >>> mbox cmd response: success
34,908,565 UART:
34,908,889 UART: Running Caliptra FMC ...
34,910,018 UART:
34,910,208 UART: [state] CFI Enabled
35,014,652 UART: [art] Extend RT PCRs Done
35,015,846 UART: [art] Lock RT PCRs Done
35,017,086 UART: [art] Populate DV Done
35,022,554 UART: [fht] FMC Alias Private Key: 7
35,024,089 UART: [art] Derive CDI
35,024,902 UART: [art] Store in in slot 0x4
35,083,403 UART: [art] Derive Key Pair
35,084,448 UART: [art] Store priv key in slot 0x5
37,546,777 UART: [art] Derive Key Pair - Done
37,559,954 UART: [art] Signing Cert with AUTHO
37,561,266 UART: RITY.KEYID = 7
39,273,288 UART: [art] Erasing AUTHORITY.KEYID = 7
39,274,807 UART: [art] PUB.X = D6512BEAA037E7DCDB10E7297A1D8F285A00D86A0264A9A5D7A0D8D7C19881A15E37BE6E9FD69FB8710473F356498725
39,282,059 UART: [art] PUB.Y = C8B2D07C4CF1C6C4EB018EC8A5BEC8DBCA0A725E6C872FC1B51FB561C36A70C67CCAE7F38698C0513CD36740F8BBCEBF
39,289,346 UART: [art] SIG.R = AB16A893842D2E21C9926D48C809EFAB25FB3E328A62EF70757D5B2219A6AF6ABD2D17145A9A897BF2CE239D678C2315
39,296,814 UART: [art] SIG.S = 6102320EDBD9F40EB8B5CB2B0DC0189FF2C85554BB783095C57B955E25E5DB6A154E900230A7EA3C553A4B86C2491335
40,275,172 UART: Caliptra RT
40,275,890 UART: [state] CFI Enabled
40,612,013 UART: [rt] RT listening for mailbox commands...
40,613,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,643,706 UART: [rt]cmd =0x494e464f, len=4
40,647,562 >>> mbox cmd response data (264 bytes)
42,705,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
49,843,190 >>> mbox cmd response: success
49,875,669 UART:
49,875,995 UART: Running Caliptra FMC ...
49,877,040 UART:
49,877,217 UART: [state] CFI Enabled
49,967,501 UART: [art] Extend RT PCRs Done
49,968,689 UART: [art] Lock RT PCRs Done
49,970,122 UART: [art] Populate DV Done
49,975,480 UART: [fht] FMC Alias Private Key: 7
49,977,017 UART: [art] Derive CDI
49,977,753 UART: [art] Store in in slot 0x4
50,036,507 UART: [art] Derive Key Pair
50,037,550 UART: [art] Store priv key in slot 0x5
52,499,555 UART: [art] Derive Key Pair - Done
52,512,385 UART: [art] Signing Cert with AUTHO
52,513,718 UART: RITY.KEYID = 7
54,225,502 UART: [art] Erasing AUTHORITY.KEYID = 7
54,227,006 UART: [art] PUB.X = EF931A3444D588963D1F035CFDF9B1D666E358F245E603173DE2D9BD452ABB447FD9C661438A7724858DFC6D9D546B23
54,234,258 UART: [art] PUB.Y = 2C010B6C558E98F3C6741C321E7D7BAD0A8CE82252EA4861FBCB72DF54587CCF7C1CB91FE26DF48CA0CA3525D71556CD
54,241,533 UART: [art] SIG.R = B0263C678FF7220EB6488816D5A1ED61AFA8389CEF51DFB85133F6050DA34BDCA0B5A7A6A1CEBDC068D5C21A8B701431
54,248,947 UART: [art] SIG.S = 795C3F7B4AB48545E96F0EA835DDC9D631C2FD2DC66FB24133E62B0A20FF05B393053E9872623F28E40E98B00229ADE9
55,228,592 UART: Caliptra RT
55,229,304 UART: [state] CFI Enabled
55,562,289 UART: [rt] RT listening for mailbox commands...
55,564,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,594,094 UART: [rt]cmd =0x494e464f, len=4
55,598,161 >>> mbox cmd response data (264 bytes)
55,599,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
62,727,887 >>> mbox cmd response: success
62,764,278 UART:
62,764,580 UART: Running Caliptra FMC ...
62,765,622 UART:
62,765,770 UART: [state] CFI Enabled
62,870,816 UART: [art] Extend RT PCRs Done
62,872,003 UART: [art] Lock RT PCRs Done
62,873,659 UART: [art] Populate DV Done
62,879,083 UART: [fht] FMC Alias Private Key: 7
62,880,784 UART: [art] Derive CDI
62,881,519 UART: [art] Store in in slot 0x4
62,939,693 UART: [art] Derive Key Pair
62,940,731 UART: [art] Store priv key in slot 0x5
65,403,444 UART: [art] Derive Key Pair - Done
65,416,336 UART: [art] Signing Cert with AUTHO
65,417,631 UART: RITY.KEYID = 7
67,129,287 UART: [art] Erasing AUTHORITY.KEYID = 7
67,130,791 UART: [art] PUB.X = D6512BEAA037E7DCDB10E7297A1D8F285A00D86A0264A9A5D7A0D8D7C19881A15E37BE6E9FD69FB8710473F356498725
67,138,035 UART: [art] PUB.Y = C8B2D07C4CF1C6C4EB018EC8A5BEC8DBCA0A725E6C872FC1B51FB561C36A70C67CCAE7F38698C0513CD36740F8BBCEBF
67,145,318 UART: [art] SIG.R = AB16A893842D2E21C9926D48C809EFAB25FB3E328A62EF70757D5B2219A6AF6ABD2D17145A9A897BF2CE239D678C2315
67,152,743 UART: [art] SIG.S = 6102320EDBD9F40EB8B5CB2B0DC0189FF2C85554BB783095C57B955E25E5DB6A154E900230A7EA3C553A4B86C2491335
68,131,351 UART: Caliptra RT
68,132,055 UART: [state] CFI Enabled
68,469,350 UART: [rt] RT listening for mailbox commands...
68,471,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,500,912 UART: [rt]cmd =0x494e464f, len=4
68,504,866 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.54s
Truncated 1634 bytes from beginning
,321,882 UART: [idev] Sha1 KeyId Algorithm
6,345,449 UART: [idev] --
6,349,171 UART: [ldev] ++
6,349,753 UART: [ldev] CDI.KEYID = 6
6,350,631 UART: [ldev] SUBJECT.KEYID = 5
6,351,830 UART: [ldev] AUTHORITY.KEYID = 7
6,353,051 UART: [ldev] FE.KEYID = 1
6,360,316 UART: [ldev] Erasing FE.KEYID = 1
8,831,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,411 UART: [ldev] --
10,624,319 UART: [fwproc] Wait for Commands...
10,626,351 UART: [fwproc] Recv command 0x46574c44
10,628,462 UART: [fwproc] Recv'd Img size: 114448 bytes
14,041,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,183,018 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,709 >>> mbox cmd response: success
14,501,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,505,836 UART: [afmc] ++
14,506,455 UART: [afmc] CDI.KEYID = 6
14,507,364 UART: [afmc] SUBJECT.KEYID = 7
14,508,519 UART: [afmc] AUTHORITY.KEYID = 5
17,006,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,693 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,744,668 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,760,724 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,776,694 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,800,453 UART: [afmc] --
18,803,719 UART: [cold-reset] --
18,806,491 UART: [state] Locking Datavault
18,812,108 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,742 UART: [state] Locking ICCM
18,815,669 UART: [exit] Launching FMC @ 0x40000130
18,824,059 UART:
18,824,289 UART: Running Caliptra FMC ...
18,825,934 UART:
18,826,102 UART: [state] CFI Enabled
18,834,063 UART: [fht] FMC Alias Private Key: 7
20,591,289 UART: [art] Extend RT PCRs Done
20,592,502 UART: [art] Lock RT PCRs Done
20,594,252 UART: [art] Populate DV Done
20,599,761 UART: [fht] FMC Alias Private Key: 7
20,601,293 UART: [art] Derive CDI
20,602,071 UART: [art] Store in in slot 0x4
20,644,932 UART: [art] Derive Key Pair
20,645,918 UART: [art] Store priv key in slot 0x5
23,071,875 UART: [art] Derive Key Pair - Done
23,085,301 UART: [art] Signing Cert with AUTHO
23,086,599 UART: RITY.KEYID = 7
24,791,993 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,462 UART: [art] PUB.X = 681693FD6ABD11D59DF430D4D1E4F17BB5302BE5C61F115431B15D62D440307F428D744C254983C74954EB199C558BFB
24,800,744 UART: [art] PUB.Y = B8DB5014D1D724270446EB1A3F56304FC3F2AE7D5143D971362780ABA58E4917B87F0B26530D87709969E2230A73597B
24,807,969 UART: [art] SIG.R = AFA940A198D53B8E028BED670A0EA001ADBDEE4AFC63D4B212C8AB28DB724D6ADEBBE803469ED903C3688EC7A267B6FF
24,815,400 UART: [art] SIG.S = 411AB9E680AC6F28BE714E97F30273FD28883892AF0A51F92584B6E14612875ECA7EC802C3B6A303E0B974A86A54DB15
25,794,680 UART: Caliptra RT
25,795,383 UART: [state] CFI Enabled
25,914,649 UART: [rt] RT listening for mailbox commands...
25,945,827 UART: [rt]cmd =0x494e464f, len=4
25,949,967 >>> mbox cmd response data (264 bytes)
28,008,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,154,175 UART:
28,154,559 UART: Running Caliptra ROM ...
28,155,685 UART:
28,155,843 UART: [state] CFI Enabled
28,168,163 UART: [state] LifecycleState = Unprovisioned
28,169,995 UART: [state] DebugLocked = No
28,172,830 UART: [state] WD Timer not started. Device not locked for debugging
28,175,804 UART: [kat] SHA2-256
28,354,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,366,556 UART: [kat] ++
28,367,090 UART: [kat] sha1
28,378,197 UART: [kat] SHA2-256
28,381,220 UART: [kat] SHA2-384
28,386,713 UART: [kat] SHA2-512-ACC
28,389,650 UART: [kat] ECC-384
30,829,687 UART: [kat] HMAC-384Kdf
30,842,789 UART: [kat] LMS
31,372,284 UART: [kat] --
31,378,234 UART: [update-reset] ++
34,810,872 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,814,261 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
35,197,544 >>> mbox cmd response: success
35,198,174 UART: [update-reset] Copying MAN_2 To MAN_1
35,220,501 UART: [update-reset Success] --
35,223,996 UART: [state] Locking Datavault
35,227,195 UART: [state] Locking PCR0, PCR1 and PCR31
35,228,883 UART: [state] Locking ICCM
35,230,061 UART: [exit] Launching FMC @ 0x40000130
35,238,514 UART:
35,238,748 UART: Running Caliptra FMC ...
35,239,792 UART:
35,239,941 UART: [state] CFI Enabled
35,284,124 UART: [art] Extend RT PCRs Done
35,285,258 UART: [art] Lock RT PCRs Done
35,286,623 UART: [art] Populate DV Done
35,292,129 UART: [fht] FMC Alias Private Key: 7
35,293,710 UART: [art] Derive CDI
35,294,440 UART: [art] Store in in slot 0x4
35,336,972 UART: [art] Derive Key Pair
35,338,011 UART: [art] Store priv key in slot 0x5
37,765,018 UART: [art] Derive Key Pair - Done
37,778,296 UART: [art] Signing Cert with AUTHO
37,779,591 UART: RITY.KEYID = 7
39,484,705 UART: [art] Erasing AUTHORITY.KEYID = 7
39,486,183 UART: [art] PUB.X = 8EFF74C9524B446F64174C0FEA6554B65B26CA42D63F4A873316B6FB3744C77691023EF808CB9D7FB2C34BB23DD9F8EA
39,493,474 UART: [art] PUB.Y = AC6785FA3B8698BF283B36460FA016D20D38232F0C40B8DCDB1C0CBB5DD83CC52C68D8F7E92AE268B51E968A81F3EEE4
39,500,743 UART: [art] SIG.R = 197C165A81024104360DCC2DC754EBB91E86D601320CC0231F4CC93A95E7EB9ECD7677C712BD2ECC6FB9B2E56E187EA1
39,508,181 UART: [art] SIG.S = 8A8FAB6FBA401214830D88B562AFFEB6F8C2269E29990CE706B9B62A2373EF14C39CBAAA858B51CF5D8CDF2F36678104
40,487,093 UART: Caliptra RT
40,487,805 UART: [state] CFI Enabled
40,774,444 UART: [rt] RT listening for mailbox commands...
40,776,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,805,972 UART: [rt]cmd =0x494e464f, len=4
40,809,865 >>> mbox cmd response data (264 bytes)
42,866,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
43,011,970 UART:
43,012,358 UART: Running Caliptra ROM ...
43,013,402 UART:
43,013,551 UART: [state] CFI Enabled
43,027,556 UART: [state] LifecycleState = Unprovisioned
43,029,397 UART: [state] DebugLocked = No
43,031,209 UART: [state] WD Timer not started. Device not locked for debugging
43,034,513 UART: [kat] SHA2-256
43,213,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
43,225,259 UART: [kat] ++
43,225,945 UART: [kat] sha1
43,236,686 UART: [kat] SHA2-256
43,239,749 UART: [kat] SHA2-384
43,246,666 UART: [kat] SHA2-512-ACC
43,249,601 UART: [kat] ECC-384
45,690,334 UART: [kat] HMAC-384Kdf
45,703,265 UART: [kat] LMS
46,232,771 UART: [kat] --
46,239,263 UART: [update-reset] ++
49,673,738 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,677,389 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
50,060,700 >>> mbox cmd response: success
50,062,125 UART: [update-reset] Copying MAN_2 To MAN_1
50,084,463 UART: [update-reset Success] --
50,086,959 UART: [state] Locking Datavault
50,089,346 UART: [state] Locking PCR0, PCR1 and PCR31
50,090,982 UART: [state] Locking ICCM
50,092,001 UART: [exit] Launching FMC @ 0x40000130
50,100,452 UART:
50,100,709 UART: Running Caliptra FMC ...
50,101,808 UART:
50,101,961 UART: [state] CFI Enabled
50,145,871 UART: [art] Extend RT PCRs Done
50,147,041 UART: [art] Lock RT PCRs Done
50,148,546 UART: [art] Populate DV Done
50,154,163 UART: [fht] FMC Alias Private Key: 7
50,155,690 UART: [art] Derive CDI
50,156,497 UART: [art] Store in in slot 0x4
50,199,141 UART: [art] Derive Key Pair
50,200,169 UART: [art] Store priv key in slot 0x5
52,626,810 UART: [art] Derive Key Pair - Done
52,639,661 UART: [art] Signing Cert with AUTHO
52,640,967 UART: RITY.KEYID = 7
54,346,121 UART: [art] Erasing AUTHORITY.KEYID = 7
54,347,617 UART: [art] PUB.X = 4EC67D47B792EF9515D5DE4FF981EC7A56475C30BBFF8787D194B6A3BADA5DB5F1A29CD8B70CA31DF46D828473E891AE
54,354,942 UART: [art] PUB.Y = 2D073D7642E19B87FDBEE140B193D1857E3AB7A2CF62EFA37B7CDF97706016E2D9E24E7A4651EE8936C4E2B42AFE9F42
54,362,170 UART: [art] SIG.R = 2E6CA5E94893D1525B18511E18933A0A1A15B7B930F8F962E3A9353016A1977A1AD2654697A532FBD493D972B381B2D3
54,369,552 UART: [art] SIG.S = EA4523749B216ADA259F8CE5DAA1CB4F99B26DF8717F0C43534F415BA2772A62DFB3D4E26B83D60F8A5C14E509BBABC7
55,347,857 UART: Caliptra RT
55,348,552 UART: [state] CFI Enabled
55,639,506 UART: [rt] RT listening for mailbox commands...
55,641,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,671,243 UART: [rt]cmd =0x494e464f, len=4
55,675,127 >>> mbox cmd response data (264 bytes)
55,676,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
55,821,367 UART:
55,821,673 UART: Running Caliptra ROM ...
55,822,780 UART:
55,822,935 UART: [state] CFI Enabled
55,837,244 UART: [state] LifecycleState = Unprovisioned
55,839,063 UART: [state] DebugLocked = No
55,841,753 UART: [state] WD Timer not started. Device not locked for debugging
55,845,872 UART: [kat] SHA2-256
56,025,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
56,036,603 UART: [kat] ++
56,037,142 UART: [kat] sha1
56,049,323 UART: [kat] SHA2-256
56,052,377 UART: [kat] SHA2-384
56,059,279 UART: [kat] SHA2-512-ACC
56,062,219 UART: [kat] ECC-384
58,504,838 UART: [kat] HMAC-384Kdf
58,517,715 UART: [kat] LMS
59,047,225 UART: [kat] --
59,050,505 UART: [update-reset] ++
62,475,234 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,478,008 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
62,861,263 >>> mbox cmd response: success
62,861,677 UART: [update-reset] Copying MAN_2 To MAN_1
62,883,923 UART: [update-reset Success] --
62,887,824 UART: [state] Locking Datavault
62,890,049 UART: [state] Locking PCR0, PCR1 and PCR31
62,891,693 UART: [state] Locking ICCM
62,893,707 UART: [exit] Launching FMC @ 0x40000130
62,902,152 UART:
62,902,377 UART: Running Caliptra FMC ...
62,903,393 UART:
62,903,535 UART: [state] CFI Enabled
62,947,765 UART: [art] Extend RT PCRs Done
62,948,949 UART: [art] Lock RT PCRs Done
62,950,260 UART: [art] Populate DV Done
62,955,606 UART: [fht] FMC Alias Private Key: 7
62,957,083 UART: [art] Derive CDI
62,957,839 UART: [art] Store in in slot 0x4
63,000,337 UART: [art] Derive Key Pair
63,001,378 UART: [art] Store priv key in slot 0x5
65,428,125 UART: [art] Derive Key Pair - Done
65,441,274 UART: [art] Signing Cert with AUTHO
65,442,567 UART: RITY.KEYID = 7
67,148,104 UART: [art] Erasing AUTHORITY.KEYID = 7
67,149,610 UART: [art] PUB.X = 8EFF74C9524B446F64174C0FEA6554B65B26CA42D63F4A873316B6FB3744C77691023EF808CB9D7FB2C34BB23DD9F8EA
67,156,905 UART: [art] PUB.Y = AC6785FA3B8698BF283B36460FA016D20D38232F0C40B8DCDB1C0CBB5DD83CC52C68D8F7E92AE268B51E968A81F3EEE4
67,164,184 UART: [art] SIG.R = 197C165A81024104360DCC2DC754EBB91E86D601320CC0231F4CC93A95E7EB9ECD7677C712BD2ECC6FB9B2E56E187EA1
67,171,573 UART: [art] SIG.S = 8A8FAB6FBA401214830D88B562AFFEB6F8C2269E29990CE706B9B62A2373EF14C39CBAAA858B51CF5D8CDF2F36678104
68,150,190 UART: Caliptra RT
68,150,874 UART: [state] CFI Enabled
68,438,863 UART: [rt] RT listening for mailbox commands...
68,440,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,470,721 UART: [rt]cmd =0x494e464f, len=4
68,474,671 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,693,843 ready_for_fw is high
3,694,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,712 >>> mbox cmd response: success
14,271,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,513,325 UART:
18,513,731 UART: Running Caliptra FMC ...
18,514,900 UART:
18,515,055 UART: [state] CFI Enabled
18,523,169 UART: [fht] FMC Alias Private Key: 7
20,279,428 UART: [art] Extend RT PCRs Done
20,280,652 UART: [art] Lock RT PCRs Done
20,282,274 UART: [art] Populate DV Done
20,287,680 UART: [fht] FMC Alias Private Key: 7
20,289,324 UART: [art] Derive CDI
20,290,134 UART: [art] Store in in slot 0x4
20,332,615 UART: [art] Derive Key Pair
20,333,609 UART: [art] Store priv key in slot 0x5
22,760,568 UART: [art] Derive Key Pair - Done
22,773,405 UART: [art] Signing Cert with AUTHO
22,774,717 UART: RITY.KEYID = 7
24,480,322 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,825 UART: [art] PUB.X = B51ED3805DF764F9E428ECFA747709729AAD018D2D148AC54D988A8A4B02D544F963DC6B67F5D576F4AD9948E5740122
24,489,094 UART: [art] PUB.Y = FAA75D959E602AF6314CBCA64B395613C861A5880D79C06A99C71A44F24E4A6FB400E82CE3BF11125C2F336579AB1015
24,496,319 UART: [art] SIG.R = 521DBCB91A7FFBDE83CC5F670A56659C81D77999BA20D37D55B1ED0CC4B06DE33E7ACCA737C105DA992DBFFC86EF4408
24,503,767 UART: [art] SIG.S = B593DFF290E8847D55ED18BC21CC9ED92147695D3F552D150BED1209A86D99B544E586A2BAAC78621D38413A508FD25E
25,483,087 UART: Caliptra RT
25,483,789 UART: [state] CFI Enabled
25,601,170 UART: [rt] RT listening for mailbox commands...
25,632,361 UART: [rt]cmd =0x494e464f, len=4
25,636,217 >>> mbox cmd response data (264 bytes)
27,696,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,747,023 >>> mbox cmd response: success
34,784,144 UART:
34,784,491 UART: Running Caliptra FMC ...
34,785,532 UART:
34,785,684 UART: [state] CFI Enabled
34,829,435 UART: [art] Extend RT PCRs Done
34,830,578 UART: [art] Lock RT PCRs Done
34,831,914 UART: [art] Populate DV Done
34,837,558 UART: [fht] FMC Alias Private Key: 7
34,839,080 UART: [art] Derive CDI
34,839,818 UART: [art] Store in in slot 0x4
34,882,565 UART: [art] Derive Key Pair
34,883,559 UART: [art] Store priv key in slot 0x5
37,310,247 UART: [art] Derive Key Pair - Done
37,323,363 UART: [art] Signing Cert with AUTHO
37,324,693 UART: RITY.KEYID = 7
39,029,674 UART: [art] Erasing AUTHORITY.KEYID = 7
39,031,183 UART: [art] PUB.X = ADC8D1A7D7A89E05CE2F849020B2CB451F1992AA55FD7E816EF871630BCC06D7D98AE9EF12344C0044CBF1BA19259D89
39,038,434 UART: [art] PUB.Y = C4F448E8B2524672606E3BAE1B71CF5CEC57D343F4CB6BE5C6CD5F8803C192ED6B4BCF6AD1B7111998C841CD51218420
39,045,719 UART: [art] SIG.R = 05D389A4AEBC8C7267A95048160A727591E9BF597C9F88EF7CA6492B2B1EA3A37BB50560C69D966DFF9036D75AA6D833
39,053,117 UART: [art] SIG.S = 3E75A8E537AB7712E133ADBE05FD37C440B1AA73709DF8FBA59D79A07DAC3BF0D2CF23A217F213F0B0EBCBB3FD79762B
40,031,788 UART: Caliptra RT
40,032,492 UART: [state] CFI Enabled
40,316,934 UART: [rt] RT listening for mailbox commands...
40,318,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,348,409 UART: [rt]cmd =0x494e464f, len=4
40,352,517 >>> mbox cmd response data (264 bytes)
42,407,070 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
49,453,448 >>> mbox cmd response: success
49,487,729 UART:
49,488,062 UART: Running Caliptra FMC ...
49,489,190 UART:
49,489,356 UART: [state] CFI Enabled
49,533,582 UART: [art] Extend RT PCRs Done
49,534,733 UART: [art] Lock RT PCRs Done
49,536,258 UART: [art] Populate DV Done
49,541,764 UART: [fht] FMC Alias Private Key: 7
49,543,459 UART: [art] Derive CDI
49,544,268 UART: [art] Store in in slot 0x4
49,586,912 UART: [art] Derive Key Pair
49,587,953 UART: [art] Store priv key in slot 0x5
52,015,170 UART: [art] Derive Key Pair - Done
52,027,999 UART: [art] Signing Cert with AUTHO
52,029,312 UART: RITY.KEYID = 7
53,735,188 UART: [art] Erasing AUTHORITY.KEYID = 7
53,736,703 UART: [art] PUB.X = D2285BAF4409ED0E5DCE2661A38D10585B1546598669DA4B567CC84AAC5C4F1D036BD5816C9869EAB92934CF32C3B99F
53,744,014 UART: [art] PUB.Y = B5D7E51375BB73B1A831930F4D22ED6907E276044E917ED704CEC01AADFCB0F90B6CA764A70A92065FF9EC4AAF74634C
53,751,257 UART: [art] SIG.R = 334B388381AE5D85A7F1CD8F77605DD9EB1DB72E44FB26E065F1AE3D49A07A09E59BB365BA0EA0405DE9BAE547D2EC1E
53,758,644 UART: [art] SIG.S = A2EE50598EE6EE4E332BB5C79BFA9708324F727FC4D8CAA250F23DB7A041BEDCDD66AB623360D2B0D28694C96A2A9485
54,737,629 UART: Caliptra RT
54,738,334 UART: [state] CFI Enabled
55,022,175 UART: [rt] RT listening for mailbox commands...
55,024,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,053,832 UART: [rt]cmd =0x494e464f, len=4
55,057,894 >>> mbox cmd response data (264 bytes)
55,059,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
62,101,171 >>> mbox cmd response: success
62,135,024 UART:
62,135,319 UART: Running Caliptra FMC ...
62,136,351 UART:
62,136,514 UART: [state] CFI Enabled
62,180,740 UART: [art] Extend RT PCRs Done
62,181,887 UART: [art] Lock RT PCRs Done
62,183,196 UART: [art] Populate DV Done
62,188,814 UART: [fht] FMC Alias Private Key: 7
62,190,507 UART: [art] Derive CDI
62,191,233 UART: [art] Store in in slot 0x4
62,233,824 UART: [art] Derive Key Pair
62,234,861 UART: [art] Store priv key in slot 0x5
64,661,088 UART: [art] Derive Key Pair - Done
64,673,865 UART: [art] Signing Cert with AUTHO
64,675,363 UART: RITY.KEYID = 7
66,380,498 UART: [art] Erasing AUTHORITY.KEYID = 7
66,381,990 UART: [art] PUB.X = ADC8D1A7D7A89E05CE2F849020B2CB451F1992AA55FD7E816EF871630BCC06D7D98AE9EF12344C0044CBF1BA19259D89
66,389,283 UART: [art] PUB.Y = C4F448E8B2524672606E3BAE1B71CF5CEC57D343F4CB6BE5C6CD5F8803C192ED6B4BCF6AD1B7111998C841CD51218420
66,396,574 UART: [art] SIG.R = 05D389A4AEBC8C7267A95048160A727591E9BF597C9F88EF7CA6492B2B1EA3A37BB50560C69D966DFF9036D75AA6D833
66,403,982 UART: [art] SIG.S = 3E75A8E537AB7712E133ADBE05FD37C440B1AA73709DF8FBA59D79A07DAC3BF0D2CF23A217F213F0B0EBCBB3FD79762B
67,383,071 UART: Caliptra RT
67,383,773 UART: [state] CFI Enabled
67,671,725 UART: [rt] RT listening for mailbox commands...
67,673,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
67,703,401 UART: [rt]cmd =0x494e464f, len=4
67,707,244 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,437,814 ready_for_fw is high
3,438,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,282 >>> mbox cmd response: success
14,736,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,029,800 UART:
19,030,197 UART: Running Caliptra FMC ...
19,031,501 UART:
19,031,664 UART: [state] CFI Enabled
19,093,207 UART: [fht] FMC Alias Private Key: 7
20,856,742 UART: [art] Extend RT PCRs Done
20,857,962 UART: [art] Lock RT PCRs Done
20,859,662 UART: [art] Populate DV Done
20,865,082 UART: [fht] FMC Alias Private Key: 7
20,866,683 UART: [art] Derive CDI
20,867,453 UART: [art] Store in in slot 0x4
20,925,939 UART: [art] Derive Key Pair
20,926,979 UART: [art] Store priv key in slot 0x5
23,389,858 UART: [art] Derive Key Pair - Done
23,402,689 UART: [art] Signing Cert with AUTHO
23,403,992 UART: RITY.KEYID = 7
25,115,565 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,055 UART: [art] PUB.X = 5BE714583B13DDC6F5F76CF5DBF9BFC8196E88E94A16B986CAC455632ABED5FDC5E9B2E940111C4317A6931BF2DD81CD
25,124,304 UART: [art] PUB.Y = 47594D8846AE9C927CF678AD63B47B8A50FF02C5BA97C7992AB8F71F00D4FAC294ACD72ABF35EFB1CFF33750B5604799
25,131,599 UART: [art] SIG.R = DF66FE08E74408E05895611129747A3574E9ADC36E1C1BC62E3748FE7C7D7D5144BB1921E4C62D887B82AFA14AB698A4
25,138,982 UART: [art] SIG.S = 3B2B8B3FBE1545453A021FBB2997A883BDB37234D3D95D534EEBD607C3B4677C300431D59F203CA8677F21F4D50367D7
26,118,238 UART: Caliptra RT
26,118,943 UART: [state] CFI Enabled
26,283,420 UART: [rt] RT listening for mailbox commands...
26,314,718 UART: [rt]cmd =0x494e464f, len=4
26,318,757 >>> mbox cmd response data (264 bytes)
28,387,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
36,186,811 >>> mbox cmd response: success
36,222,229 UART:
36,222,529 UART: Running Caliptra FMC ...
36,223,606 UART:
36,223,763 UART: [state] CFI Enabled
36,322,664 UART: [art] Extend RT PCRs Done
36,323,856 UART: [art] Lock RT PCRs Done
36,325,159 UART: [art] Populate DV Done
36,330,840 UART: [fht] FMC Alias Private Key: 7
36,332,394 UART: [art] Derive CDI
36,333,212 UART: [art] Store in in slot 0x4
36,392,211 UART: [art] Derive Key Pair
36,393,253 UART: [art] Store priv key in slot 0x5
38,857,215 UART: [art] Derive Key Pair - Done
38,870,163 UART: [art] Signing Cert with AUTHO
38,871,626 UART: RITY.KEYID = 7
40,582,013 UART: [art] Erasing AUTHORITY.KEYID = 7
40,583,525 UART: [art] PUB.X = 8936BE1879982BCAC23E70BA16DCDA01E5704E7556D8DABF198745D59A8529462DC65F4F2D95244F17A06ED4B374D1D1
40,590,776 UART: [art] PUB.Y = 9F9EFE622EF8DDDDF7E83D46C05AD5596C367FA74B9AF2D7B348988E25FDB78AAF8D2BE6C38C7B64E647E344489CD905
40,598,071 UART: [art] SIG.R = 06443E2A77C9B6382A288094C1BE809AFEB1E1E3F04051B56E56D93DDF146C1BEDA30BB3296781DC12647737307E2A44
40,605,463 UART: [art] SIG.S = 0DB369AA4562DD17571977E06B8D51B7D6925802C2C4F8F430876F8403480607D6D3E7E0F2E324F4991B1B362C03DD95
41,584,592 UART: Caliptra RT
41,585,281 UART: [state] CFI Enabled
41,920,248 UART: [rt] RT listening for mailbox commands...
41,922,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,952,005 UART: [rt]cmd =0x494e464f, len=4
41,955,966 >>> mbox cmd response data (264 bytes)
44,041,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
51,860,920 >>> mbox cmd response: success
51,896,399 UART:
51,896,693 UART: Running Caliptra FMC ...
51,897,809 UART:
51,897,991 UART: [state] CFI Enabled
52,003,163 UART: [art] Extend RT PCRs Done
52,004,360 UART: [art] Lock RT PCRs Done
52,005,657 UART: [art] Populate DV Done
52,011,177 UART: [fht] FMC Alias Private Key: 7
52,012,876 UART: [art] Derive CDI
52,013,708 UART: [art] Store in in slot 0x4
52,072,416 UART: [art] Derive Key Pair
52,073,471 UART: [art] Store priv key in slot 0x5
54,536,652 UART: [art] Derive Key Pair - Done
54,549,710 UART: [art] Signing Cert with AUTHO
54,551,017 UART: RITY.KEYID = 7
56,262,379 UART: [art] Erasing AUTHORITY.KEYID = 7
56,263,865 UART: [art] PUB.X = 5B888C8B8D50A8CE671A8FF71E9B42D91F0A8E12A9039F528BC294226955300E039495AEBF538328FD0BBE04AC2EB115
56,271,160 UART: [art] PUB.Y = 4482C5B4F5DBCDA74D72B25637E31BBB6186C0FCC2F30D7F2F597A24D3FCB2176646E5F7A807C780BA2F7F84CB36745B
56,278,441 UART: [art] SIG.R = F03372718DB4409D9E854A998D089EA8455FB6F3532E1F28077897119FAD78EB4E4D23D2159EF81F316B753C7ABAE04A
56,285,833 UART: [art] SIG.S = 44D7AF2EE64F3BD1CA76C2F1ECDE2119B3E7E6236770820965E290F0C824CA98579600669CDDA83393E45C17BCFB88BD
57,264,801 UART: Caliptra RT
57,265,506 UART: [state] CFI Enabled
57,602,245 UART: [rt] RT listening for mailbox commands...
57,604,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,633,759 UART: [rt]cmd =0x494e464f, len=4
57,637,684 >>> mbox cmd response data (264 bytes)
57,639,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
65,448,450 >>> mbox cmd response: success
65,482,727 UART:
65,482,999 UART: Running Caliptra FMC ...
65,484,109 UART:
65,484,268 UART: [state] CFI Enabled
65,571,134 UART: [art] Extend RT PCRs Done
65,572,317 UART: [art] Lock RT PCRs Done
65,573,471 UART: [art] Populate DV Done
65,578,877 UART: [fht] FMC Alias Private Key: 7
65,580,410 UART: [art] Derive CDI
65,581,142 UART: [art] Store in in slot 0x4
65,640,508 UART: [art] Derive Key Pair
65,641,545 UART: [art] Store priv key in slot 0x5
68,104,446 UART: [art] Derive Key Pair - Done
68,117,237 UART: [art] Signing Cert with AUTHO
68,118,545 UART: RITY.KEYID = 7
69,831,369 UART: [art] Erasing AUTHORITY.KEYID = 7
69,833,009 UART: [art] PUB.X = 8936BE1879982BCAC23E70BA16DCDA01E5704E7556D8DABF198745D59A8529462DC65F4F2D95244F17A06ED4B374D1D1
69,840,152 UART: [art] PUB.Y = 9F9EFE622EF8DDDDF7E83D46C05AD5596C367FA74B9AF2D7B348988E25FDB78AAF8D2BE6C38C7B64E647E344489CD905
69,847,437 UART: [art] SIG.R = 06443E2A77C9B6382A288094C1BE809AFEB1E1E3F04051B56E56D93DDF146C1BEDA30BB3296781DC12647737307E2A44
69,854,827 UART: [art] SIG.S = 0DB369AA4562DD17571977E06B8D51B7D6925802C2C4F8F430876F8403480607D6D3E7E0F2E324F4991B1B362C03DD95
70,833,812 UART: Caliptra RT
70,834,494 UART: [state] CFI Enabled
71,172,580 UART: [rt] RT listening for mailbox commands...
71,174,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,204,042 UART: [rt]cmd =0x494e464f, len=4
71,207,950 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,757,317 ready_for_fw is high
3,757,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,969,062 >>> mbox cmd response: success
14,970,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,223,370 UART:
19,223,776 UART: Running Caliptra FMC ...
19,224,915 UART:
19,225,073 UART: [state] CFI Enabled
19,233,246 UART: [fht] FMC Alias Private Key: 7
20,989,930 UART: [art] Extend RT PCRs Done
20,991,142 UART: [art] Lock RT PCRs Done
20,992,769 UART: [art] Populate DV Done
20,998,182 UART: [fht] FMC Alias Private Key: 7
20,999,827 UART: [art] Derive CDI
21,000,656 UART: [art] Store in in slot 0x4
21,043,153 UART: [art] Derive Key Pair
21,044,189 UART: [art] Store priv key in slot 0x5
23,470,652 UART: [art] Derive Key Pair - Done
23,483,599 UART: [art] Signing Cert with AUTHO
23,484,907 UART: RITY.KEYID = 7
25,190,607 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,119 UART: [art] PUB.X = 49FE3BBF0AF82F12EABFE916D902302333D1E61E0D2A46DCF47E545B7D7662B8525C44F357A99C645085C89DE36761BE
25,199,431 UART: [art] PUB.Y = 3BC43B16B59289C7205FA50F6BFB1EA4A199AA841F422FF87C25D12B6F0095D723373EA654D474C61888E218BEA1F642
25,206,627 UART: [art] SIG.R = F2867B78876B2749DA171A0ED7A98D798D4E563F985EBC11B6AB714D20582B0A9C15CCE90594549B5F6E7B3D206DBDEF
25,214,009 UART: [art] SIG.S = D92D99B8A628373FACDD89652D7544DB014F93E4ABAB0C0BBB0A5377984D1535A9BC37EA6B0F12C1BAD75A9CCB859E67
26,192,840 UART: Caliptra RT
26,193,531 UART: [state] CFI Enabled
26,310,330 UART: [rt] RT listening for mailbox commands...
26,341,634 UART: [rt]cmd =0x494e464f, len=4
26,345,581 >>> mbox cmd response data (264 bytes)
28,403,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
36,142,786 >>> mbox cmd response: success
36,179,712 UART:
36,180,046 UART: Running Caliptra FMC ...
36,181,168 UART:
36,181,327 UART: [state] CFI Enabled
36,225,122 UART: [art] Extend RT PCRs Done
36,226,267 UART: [art] Lock RT PCRs Done
36,227,875 UART: [art] Populate DV Done
36,233,297 UART: [fht] FMC Alias Private Key: 7
36,234,787 UART: [art] Derive CDI
36,235,553 UART: [art] Store in in slot 0x4
36,277,983 UART: [art] Derive Key Pair
36,278,981 UART: [art] Store priv key in slot 0x5
38,705,729 UART: [art] Derive Key Pair - Done
38,718,556 UART: [art] Signing Cert with AUTHO
38,719,882 UART: RITY.KEYID = 7
40,425,671 UART: [art] Erasing AUTHORITY.KEYID = 7
40,427,177 UART: [art] PUB.X = FA16DC5211C4D29E070E1536EBB69B4A8BD50345AD84094AE06013CFC2EBA7850463FBAACBAFACE9FE2C5D96B37D6D72
40,434,470 UART: [art] PUB.Y = BC48C295376554ED8F130F2BE7B75D92F8D9FACAE4820E89DCA9ED074F2F5FAA0A7DAC1F74B31598D6A0A21824886425
40,441,748 UART: [art] SIG.R = D797BC6300874FD462498D4FD5C43F9AD819E99706A5CF122CB92B4F3F5B63B2ED73F791B7C4C923FD71D93E6C8AE9B0
40,449,133 UART: [art] SIG.S = 2D53D736F2D9F9989B10C933EC74C3D2C6344448A964B3AFD42E369E9919D24A191715C7E322AED67CB9ADE3D5013392
41,428,211 UART: Caliptra RT
41,428,902 UART: [state] CFI Enabled
41,715,988 UART: [rt] RT listening for mailbox commands...
41,717,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,747,433 UART: [rt]cmd =0x494e464f, len=4
41,751,394 >>> mbox cmd response data (264 bytes)
43,808,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
51,540,594 >>> mbox cmd response: success
51,575,248 UART:
51,575,548 UART: Running Caliptra FMC ...
51,576,661 UART:
51,576,822 UART: [state] CFI Enabled
51,619,980 UART: [art] Extend RT PCRs Done
51,621,171 UART: [art] Lock RT PCRs Done
51,622,592 UART: [art] Populate DV Done
51,627,887 UART: [fht] FMC Alias Private Key: 7
51,629,417 UART: [art] Derive CDI
51,630,166 UART: [art] Store in in slot 0x4
51,672,696 UART: [art] Derive Key Pair
51,673,736 UART: [art] Store priv key in slot 0x5
54,100,093 UART: [art] Derive Key Pair - Done
54,112,876 UART: [art] Signing Cert with AUTHO
54,114,172 UART: RITY.KEYID = 7
55,819,629 UART: [art] Erasing AUTHORITY.KEYID = 7
55,821,137 UART: [art] PUB.X = 051003AFA6639CB1FB5623CAC7D3C3AC4BFCB5D390BD0C0B9BAF7A08856DFB0D7C2482FD9B8E0E04286340218D14D4FB
55,828,381 UART: [art] PUB.Y = 7503009E3EFC48A9A2594246A0B4FE3AF81AE42E14EF05B94A32DDE8B6BFEA6E0926C784B368BC7B67E928125661F179
55,835,643 UART: [art] SIG.R = 5F6C5EF15B6F729B2E58E83E1600F5B84FB268F7413E27267B51BAB7CAF67182F0E2825854E22A3AACE83720CC4CA6E5
55,843,040 UART: [art] SIG.S = 51824C2A8668DA2934C3B2593CDBF270B3208E78A440DB0F8109C41815E1CE203FD96F3E77BED7C26CBA1B44F5C7B7E3
56,821,954 UART: Caliptra RT
56,822,669 UART: [state] CFI Enabled
57,112,224 UART: [rt] RT listening for mailbox commands...
57,114,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,143,897 UART: [rt]cmd =0x494e464f, len=4
57,147,818 >>> mbox cmd response data (264 bytes)
57,149,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
64,877,407 >>> mbox cmd response: success
64,910,829 UART:
64,911,091 UART: Running Caliptra FMC ...
64,912,200 UART:
64,912,349 UART: [state] CFI Enabled
64,956,252 UART: [art] Extend RT PCRs Done
64,957,431 UART: [art] Lock RT PCRs Done
64,958,771 UART: [art] Populate DV Done
64,964,178 UART: [fht] FMC Alias Private Key: 7
64,965,705 UART: [art] Derive CDI
64,966,434 UART: [art] Store in in slot 0x4
65,009,283 UART: [art] Derive Key Pair
65,010,284 UART: [art] Store priv key in slot 0x5
67,436,770 UART: [art] Derive Key Pair - Done
67,449,462 UART: [art] Signing Cert with AUTHO
67,450,760 UART: RITY.KEYID = 7
69,156,230 UART: [art] Erasing AUTHORITY.KEYID = 7
69,157,730 UART: [art] PUB.X = FA16DC5211C4D29E070E1536EBB69B4A8BD50345AD84094AE06013CFC2EBA7850463FBAACBAFACE9FE2C5D96B37D6D72
69,165,020 UART: [art] PUB.Y = BC48C295376554ED8F130F2BE7B75D92F8D9FACAE4820E89DCA9ED074F2F5FAA0A7DAC1F74B31598D6A0A21824886425
69,172,302 UART: [art] SIG.R = D797BC6300874FD462498D4FD5C43F9AD819E99706A5CF122CB92B4F3F5B63B2ED73F791B7C4C923FD71D93E6C8AE9B0
69,179,687 UART: [art] SIG.S = 2D53D736F2D9F9989B10C933EC74C3D2C6344448A964B3AFD42E369E9919D24A191715C7E322AED67CB9ADE3D5013392
70,158,679 UART: Caliptra RT
70,159,380 UART: [state] CFI Enabled
70,446,297 UART: [rt] RT listening for mailbox commands...
70,448,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,477,903 UART: [rt]cmd =0x494e464f, len=4
70,481,779 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.64s
Truncated 2120 bytes from beginning
,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,436 UART: [ldev] --
1,586,909 UART: [fwproc] Waiting for Commands...
1,587,542 UART: [fwproc] Received command 0x46574c44
1,588,333 UART: [fwproc] Received Image of size 114448 bytes
2,887,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,219 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,571 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,492 >>> mbox cmd response: success
3,079,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,080,522 UART: [afmc] ++
3,080,690 UART: [afmc] CDI.KEYID = 6
3,081,052 UART: [afmc] SUBJECT.KEYID = 7
3,081,477 UART: [afmc] AUTHORITY.KEYID = 5
3,116,265 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,355 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,135 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,138,827 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,144,700 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,150,414 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,158,221 UART: [afmc] --
3,159,145 UART: [cold-reset] --
3,160,095 UART: [state] Locking Datavault
3,161,072 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,676 UART: [state] Locking ICCM
3,162,336 UART: [exit] Launching FMC @ 0x40000130
3,167,665 UART:
3,167,681 UART: Running Caliptra FMC ...
3,168,089 UART:
3,168,143 UART: [state] CFI Enabled
3,178,655 UART: [fht] FMC Alias Private Key: 7
3,286,562 UART: [art] Extend RT PCRs Done
3,286,990 UART: [art] Lock RT PCRs Done
3,288,620 UART: [art] Populate DV Done
3,296,574 UART: [fht] FMC Alias Private Key: 7
3,297,684 UART: [art] Derive CDI
3,297,964 UART: [art] Store in in slot 0x4
3,383,473 UART: [art] Derive Key Pair
3,383,833 UART: [art] Store priv key in slot 0x5
3,397,009 UART: [art] Derive Key Pair - Done
3,411,901 UART: [art] Signing Cert with AUTHO
3,412,381 UART: RITY.KEYID = 7
3,427,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,190 UART: [art] PUB.X = 159B9277BFF48C1825FFC258C0A9ED39B7725E17AF8B73CED62829D73902D97005EB9A2DF0ECE2F515FEB0A7C791B892
3,434,966 UART: [art] PUB.Y = 5D4B1C41CFCF0D5D0E2CE363DDFF94F00E2B03DAFECF155C97419169E596C05C823EE52E5722ECF7E4D868760466E8EB
3,441,919 UART: [art] SIG.R = 95958C7F40A727C29D294E26011574CDEC220F3B0AA0EFD35310838136D2E297BBB00E5C3BC31EDAFA1D3479B5DF9921
3,448,685 UART: [art] SIG.S = 174C51968CDE20EF02237C7735FA6689BB5A48D6166FA43EF69E5AD8A30514C1E84D25D4B4C751E86D9E1C7290373D0E
3,473,009 UART: Caliptra RT
3,473,262 UART: [state] CFI Enabled
3,581,985 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,567 UART: [rt]cmd =0x494e464f, len=4
3,615,926 >>> mbox cmd response data (264 bytes)
3,615,927 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,747 UART:
3,616,763 UART: Running Caliptra ROM ...
3,617,171 UART:
3,617,225 UART: [state] CFI Enabled
3,619,875 UART: [state] LifecycleState = Unprovisioned
3,620,530 UART: [state] DebugLocked = No
3,621,240 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,622,831 UART: [kat] SHA2-256
4,416,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,420,877 UART: [kat] ++
4,421,029 UART: [kat] sha1
4,425,323 UART: [kat] SHA2-256
4,427,261 UART: [kat] SHA2-384
4,430,008 UART: [kat] SHA2-512-ACC
4,431,908 UART: [kat] ECC-384
4,437,519 UART: [kat] HMAC-384Kdf
4,442,007 UART: [kat] LMS
5,010,203 UART: [kat] --
5,011,152 UART: [update-reset] ++
6,346,936 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,348,008 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,498,058 >>> mbox cmd response: success
6,498,319 UART: [update-reset] Copying MAN_2 To MAN_1
6,506,333 UART: [update-reset Success] --
6,507,342 UART: [state] Locking Datavault
6,507,952 UART: [state] Locking PCR0, PCR1 and PCR31
6,508,556 UART: [state] Locking ICCM
6,509,048 UART: [exit] Launching FMC @ 0x40000130
6,514,377 UART:
6,514,393 UART: Running Caliptra FMC ...
6,514,801 UART:
6,514,855 UART: [state] CFI Enabled
6,603,056 UART: [art] Extend RT PCRs Done
6,603,484 UART: [art] Lock RT PCRs Done
6,604,895 UART: [art] Populate DV Done
6,613,347 UART: [fht] FMC Alias Private Key: 7
6,614,495 UART: [art] Derive CDI
6,614,775 UART: [art] Store in in slot 0x4
6,700,106 UART: [art] Derive Key Pair
6,700,466 UART: [art] Store priv key in slot 0x5
6,712,974 UART: [art] Derive Key Pair - Done
6,727,607 UART: [art] Signing Cert with AUTHO
6,728,087 UART: RITY.KEYID = 7
6,743,227 UART: [art] Erasing AUTHORITY.KEYID = 7
6,743,992 UART: [art] PUB.X = DA25517972D4CB90A71A570C06F9750AAF87A5AE846BB85E1C6A5809A41FBDF756B8A7EDEBD977385BCCFC1C3EE3EC9A
6,750,774 UART: [art] PUB.Y = 19AF80E5F5A5105CF8B47C05B011F266E10EBCFCDE8183984470D54DA822878A08B5AAB8ABAFFE35C99F832023F7487E
6,757,727 UART: [art] SIG.R = 6610B4DF2A5AC67CEC1074A848C1C7D5F3A4648F97C415B079B7E46C4ACF0842A9EE5A97F94C265DC0CC51B63552ABAF
6,764,510 UART: [art] SIG.S = E6D7150D2437AA094A8810A89AC51CCD45C81AA8A49A4BB98F024996FB6F91ECF82E528B042019DE96399D13E110C0FF
6,788,337 UART: Caliptra RT
6,788,590 UART: [state] CFI Enabled
7,072,371 UART: [rt] RT listening for mailbox commands...
7,073,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,102,410 UART: [rt]cmd =0x494e464f, len=4
7,105,809 >>> mbox cmd response data (264 bytes)
7,105,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,106,690 UART:
7,106,706 UART: Running Caliptra ROM ...
7,107,114 UART:
7,107,168 UART: [state] CFI Enabled
7,109,900 UART: [state] LifecycleState = Unprovisioned
7,110,555 UART: [state] DebugLocked = No
7,111,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,112,756 UART: [kat] SHA2-256
7,906,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,910,802 UART: [kat] ++
7,910,954 UART: [kat] sha1
7,915,386 UART: [kat] SHA2-256
7,917,324 UART: [kat] SHA2-384
7,920,133 UART: [kat] SHA2-512-ACC
7,922,033 UART: [kat] ECC-384
7,927,462 UART: [kat] HMAC-384Kdf
7,932,138 UART: [kat] LMS
8,500,334 UART: [kat] --
8,501,059 UART: [update-reset] ++
9,835,871 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,836,923 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
9,986,973 >>> mbox cmd response: success
9,987,120 UART: [update-reset] Copying MAN_2 To MAN_1
9,995,134 UART: [update-reset Success] --
9,996,111 UART: [state] Locking Datavault
9,997,033 UART: [state] Locking PCR0, PCR1 and PCR31
9,997,637 UART: [state] Locking ICCM
9,998,143 UART: [exit] Launching FMC @ 0x40000130
10,003,472 UART:
10,003,488 UART: Running Caliptra FMC ...
10,003,896 UART:
10,003,950 UART: [state] CFI Enabled
10,093,389 UART: [art] Extend RT PCRs Done
10,093,817 UART: [art] Lock RT PCRs Done
10,095,280 UART: [art] Populate DV Done
10,103,598 UART: [fht] FMC Alias Private Key: 7
10,104,574 UART: [art] Derive CDI
10,104,854 UART: [art] Store in in slot 0x4
10,190,253 UART: [art] Derive Key Pair
10,190,613 UART: [art] Store priv key in slot 0x5
10,203,839 UART: [art] Derive Key Pair - Done
10,218,136 UART: [art] Signing Cert with AUTHO
10,218,616 UART: RITY.KEYID = 7
10,233,866 UART: [art] Erasing AUTHORITY.KEYID = 7
10,234,631 UART: [art] PUB.X = BDB63BCC7802707264E945F410120ABE48EAAE7CA6B5CAD8971678928D61494038B5829414C50467BEAD3219660678EB
10,241,387 UART: [art] PUB.Y = CE6CB3254CA287A75DA34BBD86C8D7D13A13730C4BD3068F16B9524FCD4DD2F976ED7C1C38DB05640D0EC2A16CEE17F7
10,248,342 UART: [art] SIG.R = 8A3A5F97B279E5DC40E52F07D9E4E5A7A332711183EA1FE596BDADEF3EFC711A11AEAB6A6523110F149D4DC9E78F32AA
10,255,126 UART: [art] SIG.S = C447D66C282861C09D202A72F5BE6E5EEDA3CD00849A294FB7571DB23B3515DDFC570FEEA58448AC3157D9ED694B4C75
10,279,084 UART: Caliptra RT
10,279,337 UART: [state] CFI Enabled
10,559,053 UART: [rt] RT listening for mailbox commands...
10,559,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,589,132 UART: [rt]cmd =0x494e464f, len=4
10,592,691 >>> mbox cmd response data (264 bytes)
10,592,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,593,306 UART:
10,593,322 UART: Running Caliptra ROM ...
10,593,730 UART:
10,593,784 UART: [state] CFI Enabled
10,596,878 UART: [state] LifecycleState = Unprovisioned
10,597,533 UART: [state] DebugLocked = No
10,598,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,599,654 UART: [kat] SHA2-256
11,393,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,397,700 UART: [kat] ++
11,397,852 UART: [kat] sha1
11,401,972 UART: [kat] SHA2-256
11,403,910 UART: [kat] SHA2-384
11,406,843 UART: [kat] SHA2-512-ACC
11,408,743 UART: [kat] ECC-384
11,414,254 UART: [kat] HMAC-384Kdf
11,418,772 UART: [kat] LMS
11,986,968 UART: [kat] --
11,988,061 UART: [update-reset] ++
13,323,865 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,324,963 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
13,475,013 >>> mbox cmd response: success
13,475,302 UART: [update-reset] Copying MAN_2 To MAN_1
13,483,316 UART: [update-reset Success] --
13,484,487 UART: [state] Locking Datavault
13,485,161 UART: [state] Locking PCR0, PCR1 and PCR31
13,485,765 UART: [state] Locking ICCM
13,486,233 UART: [exit] Launching FMC @ 0x40000130
13,491,562 UART:
13,491,578 UART: Running Caliptra FMC ...
13,491,986 UART:
13,492,040 UART: [state] CFI Enabled
13,580,857 UART: [art] Extend RT PCRs Done
13,581,285 UART: [art] Lock RT PCRs Done
13,582,502 UART: [art] Populate DV Done
13,590,716 UART: [fht] FMC Alias Private Key: 7
13,591,804 UART: [art] Derive CDI
13,592,084 UART: [art] Store in in slot 0x4
13,677,833 UART: [art] Derive Key Pair
13,678,193 UART: [art] Store priv key in slot 0x5
13,691,669 UART: [art] Derive Key Pair - Done
13,706,120 UART: [art] Signing Cert with AUTHO
13,706,600 UART: RITY.KEYID = 7
13,721,260 UART: [art] Erasing AUTHORITY.KEYID = 7
13,722,025 UART: [art] PUB.X = DA25517972D4CB90A71A570C06F9750AAF87A5AE846BB85E1C6A5809A41FBDF756B8A7EDEBD977385BCCFC1C3EE3EC9A
13,728,807 UART: [art] PUB.Y = 19AF80E5F5A5105CF8B47C05B011F266E10EBCFCDE8183984470D54DA822878A08B5AAB8ABAFFE35C99F832023F7487E
13,735,760 UART: [art] SIG.R = 6610B4DF2A5AC67CEC1074A848C1C7D5F3A4648F97C415B079B7E46C4ACF0842A9EE5A97F94C265DC0CC51B63552ABAF
13,742,543 UART: [art] SIG.S = E6D7150D2437AA094A8810A89AC51CCD45C81AA8A49A4BB98F024996FB6F91ECF82E528B042019DE96399D13E110C0FF
13,766,436 UART: Caliptra RT
13,766,689 UART: [state] CFI Enabled
14,050,892 UART: [rt] RT listening for mailbox commands...
14,051,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,081,121 UART: [rt]cmd =0x494e464f, len=4
14,084,676 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,191 ready_for_fw is high
1,362,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,142 >>> mbox cmd response: success
2,928,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,990,805 UART:
2,990,821 UART: Running Caliptra FMC ...
2,991,229 UART:
2,991,283 UART: [state] CFI Enabled
3,001,911 UART: [fht] FMC Alias Private Key: 7
3,109,634 UART: [art] Extend RT PCRs Done
3,110,062 UART: [art] Lock RT PCRs Done
3,111,684 UART: [art] Populate DV Done
3,119,984 UART: [fht] FMC Alias Private Key: 7
3,121,024 UART: [art] Derive CDI
3,121,304 UART: [art] Store in in slot 0x4
3,206,821 UART: [art] Derive Key Pair
3,207,181 UART: [art] Store priv key in slot 0x5
3,219,941 UART: [art] Derive Key Pair - Done
3,234,596 UART: [art] Signing Cert with AUTHO
3,235,076 UART: RITY.KEYID = 7
3,250,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,247 UART: [art] PUB.X = 0A9C7B8D113F3A7515737563F2F28068BBA11ED7338EF9E7119E74EE35446D299F35A2F26F7A74F259FF95837B5278FF
3,258,014 UART: [art] PUB.Y = FF51186DECD83BA8F149268DD63A863F0A01CD055B5A1F5D7A92991269497BCBAD62276BA25797F9E60D1A55D7521182
3,264,956 UART: [art] SIG.R = 6EC16B6B7B35A6AC93C7FB5718F1FC58B6B61D60B1D8A18695BA20554A39EC1FBAD01EE38813FA533A5BE4E4BE00FA9B
3,271,726 UART: [art] SIG.S = 7E3591374B0106FC0C16DF1B00B62D66AD9A65827707D44978AF51BEC68A13F50D2F7A7B127C4BF09834018A277E74AC
3,295,059 UART: Caliptra RT
3,295,312 UART: [state] CFI Enabled
3,404,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,764 UART: [rt]cmd =0x494e464f, len=4
3,438,343 >>> mbox cmd response data (264 bytes)
3,438,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,201,881 >>> mbox cmd response: success
6,215,148 UART:
6,215,164 UART: Running Caliptra FMC ...
6,215,572 UART:
6,215,626 UART: [state] CFI Enabled
6,304,185 UART: [art] Extend RT PCRs Done
6,304,613 UART: [art] Lock RT PCRs Done
6,306,278 UART: [art] Populate DV Done
6,314,774 UART: [fht] FMC Alias Private Key: 7
6,315,830 UART: [art] Derive CDI
6,316,110 UART: [art] Store in in slot 0x4
6,401,161 UART: [art] Derive Key Pair
6,401,521 UART: [art] Store priv key in slot 0x5
6,415,173 UART: [art] Derive Key Pair - Done
6,429,990 UART: [art] Signing Cert with AUTHO
6,430,470 UART: RITY.KEYID = 7
6,445,524 UART: [art] Erasing AUTHORITY.KEYID = 7
6,446,289 UART: [art] PUB.X = AC8F969B29AEEECD91F0E5618480253AAFB03EAD7723A128EBF85CBFD6AA92A079F62404D8BC4B8F6108743C47C48A33
6,453,069 UART: [art] PUB.Y = 45ADC0459A665E65E66A2A2D6DE0B55209A8236C014863F7A3C756ECB2F63DA1B4CC839E679AEF6D576EC8B190638C7B
6,460,023 UART: [art] SIG.R = 0435708A9B317A4B934FDA667FBBE53DDA16A1D720225024F6B50432DAC580022324384352146A0967139EBE4FD7645B
6,466,775 UART: [art] SIG.S = F214394DF12858D3829E074AEF6732B7711B37171BED1B1ACD353699136185A40585A848464710E2E5C092B30F7E4B17
6,491,461 UART: Caliptra RT
6,491,714 UART: [state] CFI Enabled
6,771,953 UART: [rt] RT listening for mailbox commands...
6,772,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,802,262 UART: [rt]cmd =0x494e464f, len=4
6,805,687 >>> mbox cmd response data (264 bytes)
6,805,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,569,311 >>> mbox cmd response: success
9,582,648 UART:
9,582,664 UART: Running Caliptra FMC ...
9,583,072 UART:
9,583,126 UART: [state] CFI Enabled
9,671,911 UART: [art] Extend RT PCRs Done
9,672,339 UART: [art] Lock RT PCRs Done
9,673,516 UART: [art] Populate DV Done
9,681,572 UART: [fht] FMC Alias Private Key: 7
9,682,606 UART: [art] Derive CDI
9,682,886 UART: [art] Store in in slot 0x4
9,768,767 UART: [art] Derive Key Pair
9,769,127 UART: [art] Store priv key in slot 0x5
9,782,199 UART: [art] Derive Key Pair - Done
9,796,738 UART: [art] Signing Cert with AUTHO
9,797,218 UART: RITY.KEYID = 7
9,812,460 UART: [art] Erasing AUTHORITY.KEYID = 7
9,813,225 UART: [art] PUB.X = A9C3436ED898DE16C2B8875384B249852F809C2FF46BEDAF5850691C8ACBE2A932E3FFF51D8227EA2BEFA5D8142F30FF
9,820,011 UART: [art] PUB.Y = 3A8173B7F0A4BAA281E6E621EA6F019B6BEA3081BD70E296FA978DCDE1B92A2583E3E05294A24D57C0983ADBDCB12649
9,826,972 UART: [art] SIG.R = 998A1070369D320A37F482F95960A962174815482A8EAF0C8549F9124AFFE9A0626873A13FD21938908767DD93EDEBFE
9,833,730 UART: [art] SIG.S = 1D2AAAA52B65EBB71EE49C7A0DC859D4BB62E5E1A27BA2FC6999C3C9752E7A3D71E88D08877C8B04B548F9C1FE9E4568
9,858,140 UART: Caliptra RT
9,858,393 UART: [state] CFI Enabled
10,141,596 UART: [rt] RT listening for mailbox commands...
10,142,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,171,553 UART: [rt]cmd =0x494e464f, len=4
10,174,860 >>> mbox cmd response data (264 bytes)
10,174,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,938,076 >>> mbox cmd response: success
12,951,477 UART:
12,951,493 UART: Running Caliptra FMC ...
12,951,901 UART:
12,951,955 UART: [state] CFI Enabled
13,040,808 UART: [art] Extend RT PCRs Done
13,041,236 UART: [art] Lock RT PCRs Done
13,042,389 UART: [art] Populate DV Done
13,050,543 UART: [fht] FMC Alias Private Key: 7
13,051,555 UART: [art] Derive CDI
13,051,835 UART: [art] Store in in slot 0x4
13,137,602 UART: [art] Derive Key Pair
13,137,962 UART: [art] Store priv key in slot 0x5
13,151,008 UART: [art] Derive Key Pair - Done
13,165,895 UART: [art] Signing Cert with AUTHO
13,166,375 UART: RITY.KEYID = 7
13,181,801 UART: [art] Erasing AUTHORITY.KEYID = 7
13,182,566 UART: [art] PUB.X = AC8F969B29AEEECD91F0E5618480253AAFB03EAD7723A128EBF85CBFD6AA92A079F62404D8BC4B8F6108743C47C48A33
13,189,346 UART: [art] PUB.Y = 45ADC0459A665E65E66A2A2D6DE0B55209A8236C014863F7A3C756ECB2F63DA1B4CC839E679AEF6D576EC8B190638C7B
13,196,300 UART: [art] SIG.R = 0435708A9B317A4B934FDA667FBBE53DDA16A1D720225024F6B50432DAC580022324384352146A0967139EBE4FD7645B
13,203,052 UART: [art] SIG.S = F214394DF12858D3829E074AEF6732B7711B37171BED1B1ACD353699136185A40585A848464710E2E5C092B30F7E4B17
13,227,098 UART: Caliptra RT
13,227,351 UART: [state] CFI Enabled
13,515,308 UART: [rt] RT listening for mailbox commands...
13,515,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,545,461 UART: [rt]cmd =0x494e464f, len=4
13,548,820 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.84s
Truncated 2120 bytes from beginning
,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,697 UART: [ldev] --
1,587,024 UART: [fwproc] Waiting for Commands...
1,587,797 UART: [fwproc] Received command 0x46574c44
1,588,588 UART: [fwproc] Received Image of size 114448 bytes
2,887,614 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,452 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,804 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,779 >>> mbox cmd response: success
3,079,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,080,989 UART: [afmc] ++
3,081,157 UART: [afmc] CDI.KEYID = 6
3,081,519 UART: [afmc] SUBJECT.KEYID = 7
3,081,944 UART: [afmc] AUTHORITY.KEYID = 5
3,117,016 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,226 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,006 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,139,698 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,145,571 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,151,285 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,159,028 UART: [afmc] --
3,160,000 UART: [cold-reset] --
3,160,752 UART: [state] Locking Datavault
3,161,843 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,447 UART: [state] Locking ICCM
3,162,913 UART: [exit] Launching FMC @ 0x40000130
3,168,242 UART:
3,168,258 UART: Running Caliptra FMC ...
3,168,666 UART:
3,168,809 UART: [state] CFI Enabled
3,179,497 UART: [fht] FMC Alias Private Key: 7
3,287,090 UART: [art] Extend RT PCRs Done
3,287,518 UART: [art] Lock RT PCRs Done
3,289,002 UART: [art] Populate DV Done
3,297,376 UART: [fht] FMC Alias Private Key: 7
3,298,392 UART: [art] Derive CDI
3,298,672 UART: [art] Store in in slot 0x4
3,384,413 UART: [art] Derive Key Pair
3,384,773 UART: [art] Store priv key in slot 0x5
3,397,747 UART: [art] Derive Key Pair - Done
3,412,529 UART: [art] Signing Cert with AUTHO
3,413,009 UART: RITY.KEYID = 7
3,428,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,870 UART: [art] PUB.X = 4E5407895ACC192BD0952E374D4430A1EA16B41F48F8316921701606BD7BF4E2BA7C8714693DB194920646C7859B39DE
3,435,625 UART: [art] PUB.Y = 4A23944A5BF73826CA7C4D6C145BC75942B1C88067B47095077086FDD3BBDE8EAE4FB149C1ECAFBFBD5AD135255919A8
3,442,586 UART: [art] SIG.R = B8F4BB34DEA501CEB254CC79440D89587E47FC8EDF9D3BE4AFD78013CE49C49F558325C8CF2F3D7D565ADEB537B14500
3,449,346 UART: [art] SIG.S = 472A1334827D4DBD0C81A6620A373A6C686A1D71C28F71B5D754E868274E45FAA30EC8FBC8EAAD183AB998C522431C72
3,473,186 UART: Caliptra RT
3,473,531 UART: [state] CFI Enabled
3,580,894 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,308 UART: [rt]cmd =0x494e464f, len=4
3,614,719 >>> mbox cmd response data (264 bytes)
3,614,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,300 UART:
3,615,316 UART: Running Caliptra ROM ...
3,615,724 UART:
3,615,865 UART: [state] CFI Enabled
3,618,621 UART: [state] LifecycleState = Unprovisioned
3,619,276 UART: [state] DebugLocked = No
3,619,866 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,407 UART: [kat] SHA2-256
4,415,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,453 UART: [kat] ++
4,419,605 UART: [kat] sha1
4,423,791 UART: [kat] SHA2-256
4,425,729 UART: [kat] SHA2-384
4,428,506 UART: [kat] SHA2-512-ACC
4,430,406 UART: [kat] ECC-384
4,436,079 UART: [kat] HMAC-384Kdf
4,440,681 UART: [kat] LMS
5,008,877 UART: [kat] --
5,009,730 UART: [update-reset] ++
6,346,682 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,347,844 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,497,894 >>> mbox cmd response: success
6,498,191 UART: [update-reset] Copying MAN_2 To MAN_1
6,506,205 UART: [update-reset Success] --
6,507,272 UART: [state] Locking Datavault
6,508,070 UART: [state] Locking PCR0, PCR1 and PCR31
6,508,674 UART: [state] Locking ICCM
6,509,224 UART: [exit] Launching FMC @ 0x40000130
6,514,553 UART:
6,514,569 UART: Running Caliptra FMC ...
6,514,977 UART:
6,515,120 UART: [state] CFI Enabled
6,604,313 UART: [art] Extend RT PCRs Done
6,604,741 UART: [art] Lock RT PCRs Done
6,605,984 UART: [art] Populate DV Done
6,614,294 UART: [fht] FMC Alias Private Key: 7
6,615,232 UART: [art] Derive CDI
6,615,512 UART: [art] Store in in slot 0x4
6,701,467 UART: [art] Derive Key Pair
6,701,827 UART: [art] Store priv key in slot 0x5
6,714,667 UART: [art] Derive Key Pair - Done
6,729,612 UART: [art] Signing Cert with AUTHO
6,730,092 UART: RITY.KEYID = 7
6,745,028 UART: [art] Erasing AUTHORITY.KEYID = 7
6,745,793 UART: [art] PUB.X = F5CD8316B250D0A1A34D1A75B286CCD6B91F74E66F92B63C04E446D201B843358A74E5CA2169A229843C6F788690CBE0
6,752,559 UART: [art] PUB.Y = FF4DCD678D352C4F1828F5158AAD7EED18176D379375310203D3C5EF0B4EF26289CB07DFBC4F573F5234F3BC26F131F3
6,759,507 UART: [art] SIG.R = 5DA52EE5B220460E47BA2E19337DA322A193E5E93FE5018F36BC186E8B9CCB033AC15F424892CBA2915720B3388B1DCA
6,766,276 UART: [art] SIG.S = D2759973C7D032794A39CD41126B78FE70CEF19E5617AC3D49A11AD1441190841A778638DB13E709840576A4C6BEADE0
6,789,557 UART: Caliptra RT
6,789,902 UART: [state] CFI Enabled
7,070,463 UART: [rt] RT listening for mailbox commands...
7,071,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,100,778 UART: [rt]cmd =0x494e464f, len=4
7,104,063 >>> mbox cmd response data (264 bytes)
7,104,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,104,864 UART:
7,104,880 UART: Running Caliptra ROM ...
7,105,288 UART:
7,105,429 UART: [state] CFI Enabled
7,108,449 UART: [state] LifecycleState = Unprovisioned
7,109,104 UART: [state] DebugLocked = No
7,109,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,111,335 UART: [kat] SHA2-256
7,905,266 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,909,381 UART: [kat] ++
7,909,533 UART: [kat] sha1
7,913,653 UART: [kat] SHA2-256
7,915,591 UART: [kat] SHA2-384
7,918,210 UART: [kat] SHA2-512-ACC
7,920,110 UART: [kat] ECC-384
7,925,863 UART: [kat] HMAC-384Kdf
7,930,609 UART: [kat] LMS
8,498,805 UART: [kat] --
8,499,968 UART: [update-reset] ++
9,834,890 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,836,056 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
9,986,106 >>> mbox cmd response: success
9,986,239 UART: [update-reset] Copying MAN_2 To MAN_1
9,994,253 UART: [update-reset Success] --
9,995,140 UART: [state] Locking Datavault
9,995,868 UART: [state] Locking PCR0, PCR1 and PCR31
9,996,472 UART: [state] Locking ICCM
9,996,976 UART: [exit] Launching FMC @ 0x40000130
10,002,305 UART:
10,002,321 UART: Running Caliptra FMC ...
10,002,729 UART:
10,002,872 UART: [state] CFI Enabled
10,091,821 UART: [art] Extend RT PCRs Done
10,092,249 UART: [art] Lock RT PCRs Done
10,093,592 UART: [art] Populate DV Done
10,101,944 UART: [fht] FMC Alias Private Key: 7
10,102,960 UART: [art] Derive CDI
10,103,240 UART: [art] Store in in slot 0x4
10,188,989 UART: [art] Derive Key Pair
10,189,349 UART: [art] Store priv key in slot 0x5
10,202,973 UART: [art] Derive Key Pair - Done
10,217,996 UART: [art] Signing Cert with AUTHO
10,218,476 UART: RITY.KEYID = 7
10,233,720 UART: [art] Erasing AUTHORITY.KEYID = 7
10,234,485 UART: [art] PUB.X = E0C87E0F1276771C9F7597DB3671CC3B120511D8DCF0AE8C0B21F398E00FA5DFBE22CE48CCB4D6285E097804E6B2649E
10,241,249 UART: [art] PUB.Y = 5514D2E1C4024757D942BA2D2D9A04F8F2DABB82F9DD4B86ACDAF5D8D463A7E0606C68F409F7A81C5EACD2D45865FCB0
10,248,210 UART: [art] SIG.R = 9807909B92B4EBF7752CDFC8D205927B7B1D0EFFF3C83B9107BF21C0FFF21EBA74A91B00809B67E2A0BE825B575DDE24
10,254,962 UART: [art] SIG.S = F5AAA65D277B8EA9C95FFEC786FABE52D77A8AE03B564D87E6F171D8F636B30FBBA22AE323BA4FE2BD1F7E5BA4285C94
10,278,432 UART: Caliptra RT
10,278,777 UART: [state] CFI Enabled
10,559,523 UART: [rt] RT listening for mailbox commands...
10,560,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,589,402 UART: [rt]cmd =0x494e464f, len=4
10,592,723 >>> mbox cmd response data (264 bytes)
10,592,724 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,593,276 UART:
10,593,292 UART: Running Caliptra ROM ...
10,593,700 UART:
10,593,841 UART: [state] CFI Enabled
10,596,507 UART: [state] LifecycleState = Unprovisioned
10,597,162 UART: [state] DebugLocked = No
10,597,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,599,499 UART: [kat] SHA2-256
11,393,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,397,545 UART: [kat] ++
11,397,697 UART: [kat] sha1
11,401,919 UART: [kat] SHA2-256
11,403,857 UART: [kat] SHA2-384
11,406,402 UART: [kat] SHA2-512-ACC
11,408,302 UART: [kat] ECC-384
11,413,931 UART: [kat] HMAC-384Kdf
11,418,569 UART: [kat] LMS
11,986,765 UART: [kat] --
11,987,728 UART: [update-reset] ++
13,323,346 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,324,532 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
13,474,582 >>> mbox cmd response: success
13,474,859 UART: [update-reset] Copying MAN_2 To MAN_1
13,482,873 UART: [update-reset Success] --
13,484,044 UART: [state] Locking Datavault
13,484,768 UART: [state] Locking PCR0, PCR1 and PCR31
13,485,372 UART: [state] Locking ICCM
13,485,850 UART: [exit] Launching FMC @ 0x40000130
13,491,179 UART:
13,491,195 UART: Running Caliptra FMC ...
13,491,603 UART:
13,491,746 UART: [state] CFI Enabled
13,580,681 UART: [art] Extend RT PCRs Done
13,581,109 UART: [art] Lock RT PCRs Done
13,582,534 UART: [art] Populate DV Done
13,590,908 UART: [fht] FMC Alias Private Key: 7
13,592,032 UART: [art] Derive CDI
13,592,312 UART: [art] Store in in slot 0x4
13,677,749 UART: [art] Derive Key Pair
13,678,109 UART: [art] Store priv key in slot 0x5
13,691,905 UART: [art] Derive Key Pair - Done
13,706,606 UART: [art] Signing Cert with AUTHO
13,707,086 UART: RITY.KEYID = 7
13,722,582 UART: [art] Erasing AUTHORITY.KEYID = 7
13,723,347 UART: [art] PUB.X = F5CD8316B250D0A1A34D1A75B286CCD6B91F74E66F92B63C04E446D201B843358A74E5CA2169A229843C6F788690CBE0
13,730,113 UART: [art] PUB.Y = FF4DCD678D352C4F1828F5158AAD7EED18176D379375310203D3C5EF0B4EF26289CB07DFBC4F573F5234F3BC26F131F3
13,737,061 UART: [art] SIG.R = 5DA52EE5B220460E47BA2E19337DA322A193E5E93FE5018F36BC186E8B9CCB033AC15F424892CBA2915720B3388B1DCA
13,743,830 UART: [art] SIG.S = D2759973C7D032794A39CD41126B78FE70CEF19E5617AC3D49A11AD1441190841A778638DB13E709840576A4C6BEADE0
13,767,763 UART: Caliptra RT
13,768,108 UART: [state] CFI Enabled
14,047,861 UART: [rt] RT listening for mailbox commands...
14,048,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,078,022 UART: [rt]cmd =0x494e464f, len=4
14,081,513 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,656 ready_for_fw is high
1,362,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,221 >>> mbox cmd response: success
2,932,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,993,818 UART:
2,993,834 UART: Running Caliptra FMC ...
2,994,242 UART:
2,994,385 UART: [state] CFI Enabled
3,004,979 UART: [fht] FMC Alias Private Key: 7
3,113,498 UART: [art] Extend RT PCRs Done
3,113,926 UART: [art] Lock RT PCRs Done
3,115,306 UART: [art] Populate DV Done
3,123,634 UART: [fht] FMC Alias Private Key: 7
3,124,654 UART: [art] Derive CDI
3,124,934 UART: [art] Store in in slot 0x4
3,210,931 UART: [art] Derive Key Pair
3,211,291 UART: [art] Store priv key in slot 0x5
3,224,563 UART: [art] Derive Key Pair - Done
3,239,094 UART: [art] Signing Cert with AUTHO
3,239,574 UART: RITY.KEYID = 7
3,255,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,256,431 UART: [art] PUB.X = E319859C902B8893ADFA064989B7F1B8F2D1AA0C31DE17A124B3742D4F66471C9F87CB147C7DD4E7C8B26AF79CF86047
3,263,203 UART: [art] PUB.Y = 8A3C29E0A42CA188375B0D1B48BF669E822F9C03F21A9E3B6A4966E5C8D8459D4F8590D905DB6D373C97899012A614B0
3,270,144 UART: [art] SIG.R = BCD4A1764CC789AA2A14DE0AE1257B5080709C527B5ECE8566B17B0AC2EBBB86D57BA15967A23DDD4089728CB3ECB2C8
3,276,926 UART: [art] SIG.S = 162BD406B70BD5AFCDF7857822244AA63EABB53E59203D4ABA76CB65A391941BE977DC0BC91A8642D2E20D152F606CAC
3,301,531 UART: Caliptra RT
3,301,876 UART: [state] CFI Enabled
3,409,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,003 UART: [rt]cmd =0x494e464f, len=4
3,443,498 >>> mbox cmd response data (264 bytes)
3,443,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,207,075 >>> mbox cmd response: success
6,220,418 UART:
6,220,434 UART: Running Caliptra FMC ...
6,220,842 UART:
6,220,985 UART: [state] CFI Enabled
6,309,854 UART: [art] Extend RT PCRs Done
6,310,282 UART: [art] Lock RT PCRs Done
6,311,365 UART: [art] Populate DV Done
6,319,745 UART: [fht] FMC Alias Private Key: 7
6,320,817 UART: [art] Derive CDI
6,321,097 UART: [art] Store in in slot 0x4
6,406,220 UART: [art] Derive Key Pair
6,406,580 UART: [art] Store priv key in slot 0x5
6,419,822 UART: [art] Derive Key Pair - Done
6,434,379 UART: [art] Signing Cert with AUTHO
6,434,859 UART: RITY.KEYID = 7
6,450,309 UART: [art] Erasing AUTHORITY.KEYID = 7
6,451,074 UART: [art] PUB.X = CFD5ACA7FC14321B39D18C10F56D44F3980A567CD5E6514703C22B0EB5835303D1319AA786CB94329601D5A98057777F
6,457,827 UART: [art] PUB.Y = E1628C8991A128EDC1BC6C3ED9310E551319D3BC62A5B79CDB711C6FB26927610DE9908421E7B23408F9068FA79FFAC6
6,464,771 UART: [art] SIG.R = 2CACC525AEB27105F00A79EB751C44F3E368E6EE4BF9B3C508BF21D4E555664056934BA0EA198D9392ABD21B0EE003C6
6,471,538 UART: [art] SIG.S = D38DF454ADA12B7359DFC08E85CC8694D003A58E2CCC30BC5B0EB384A915832DB9154B4DE47C43D515601C13C52D5C65
6,495,521 UART: Caliptra RT
6,495,866 UART: [state] CFI Enabled
6,776,247 UART: [rt] RT listening for mailbox commands...
6,776,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,806,302 UART: [rt]cmd =0x494e464f, len=4
6,809,691 >>> mbox cmd response data (264 bytes)
6,809,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,574,584 >>> mbox cmd response: success
9,587,951 UART:
9,587,967 UART: Running Caliptra FMC ...
9,588,375 UART:
9,588,518 UART: [state] CFI Enabled
9,677,817 UART: [art] Extend RT PCRs Done
9,678,245 UART: [art] Lock RT PCRs Done
9,679,750 UART: [art] Populate DV Done
9,688,076 UART: [fht] FMC Alias Private Key: 7
9,689,180 UART: [art] Derive CDI
9,689,460 UART: [art] Store in in slot 0x4
9,774,747 UART: [art] Derive Key Pair
9,775,107 UART: [art] Store priv key in slot 0x5
9,788,161 UART: [art] Derive Key Pair - Done
9,803,069 UART: [art] Signing Cert with AUTHO
9,803,549 UART: RITY.KEYID = 7
9,818,823 UART: [art] Erasing AUTHORITY.KEYID = 7
9,819,588 UART: [art] PUB.X = 6DFACBF701DC118C815BABFC02FDD31394E0B4072C1F145060C0D0634C9D1FCD10C4D6DB9F2F8739C715EC5A5CD24B22
9,826,369 UART: [art] PUB.Y = 1C7962CC81B214944B4AEB321BCC278BA8A7830F021758FE85ED4EEA053F4ABFC39A434997AEEA55695ECEE7AA0063E0
9,833,304 UART: [art] SIG.R = B638A9A8C6E3939CB52E56E24FD74F530A225B108A75ED2D250B9E3EDBE35DA706FFD42B026BD19EE3B99788DBC3FC4A
9,840,082 UART: [art] SIG.S = 92A80DEC5A86F22AA6D0440261CD175C21E4F915EF90BB56108FC1E75DE55CA1DCBAFC64F9BD1EBAFE7A58344A71F10B
9,864,220 UART: Caliptra RT
9,864,565 UART: [state] CFI Enabled
10,148,799 UART: [rt] RT listening for mailbox commands...
10,149,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,179,006 UART: [rt]cmd =0x494e464f, len=4
10,182,333 >>> mbox cmd response data (264 bytes)
10,182,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,947,336 >>> mbox cmd response: success
12,960,375 UART:
12,960,391 UART: Running Caliptra FMC ...
12,960,799 UART:
12,960,942 UART: [state] CFI Enabled
13,050,219 UART: [art] Extend RT PCRs Done
13,050,647 UART: [art] Lock RT PCRs Done
13,051,646 UART: [art] Populate DV Done
13,059,864 UART: [fht] FMC Alias Private Key: 7
13,060,890 UART: [art] Derive CDI
13,061,170 UART: [art] Store in in slot 0x4
13,146,495 UART: [art] Derive Key Pair
13,146,855 UART: [art] Store priv key in slot 0x5
13,160,699 UART: [art] Derive Key Pair - Done
13,175,942 UART: [art] Signing Cert with AUTHO
13,176,422 UART: RITY.KEYID = 7
13,192,134 UART: [art] Erasing AUTHORITY.KEYID = 7
13,192,899 UART: [art] PUB.X = CFD5ACA7FC14321B39D18C10F56D44F3980A567CD5E6514703C22B0EB5835303D1319AA786CB94329601D5A98057777F
13,199,652 UART: [art] PUB.Y = E1628C8991A128EDC1BC6C3ED9310E551319D3BC62A5B79CDB711C6FB26927610DE9908421E7B23408F9068FA79FFAC6
13,206,596 UART: [art] SIG.R = 2CACC525AEB27105F00A79EB751C44F3E368E6EE4BF9B3C508BF21D4E555664056934BA0EA198D9392ABD21B0EE003C6
13,213,363 UART: [art] SIG.S = D38DF454ADA12B7359DFC08E85CC8694D003A58E2CCC30BC5B0EB384A915832DB9154B4DE47C43D515601C13C52D5C65
13,237,014 UART: Caliptra RT
13,237,359 UART: [state] CFI Enabled
13,515,600 UART: [rt] RT listening for mailbox commands...
13,516,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,545,839 UART: [rt]cmd =0x494e464f, len=4
13,549,138 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.73s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,463 UART: [ldev] --
1,282,942 UART: [fwproc] Wait for Commands...
1,283,728 UART: [fwproc] Recv command 0x46574c44
1,284,456 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,573 >>> mbox cmd response: success
2,776,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,777,685 UART: [afmc] ++
2,777,853 UART: [afmc] CDI.KEYID = 6
2,778,215 UART: [afmc] SUBJECT.KEYID = 7
2,778,640 UART: [afmc] AUTHORITY.KEYID = 5
2,814,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,167 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,836,859 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,842,732 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,848,434 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,856,313 UART: [afmc] --
2,857,225 UART: [cold-reset] --
2,858,053 UART: [state] Locking Datavault
2,859,078 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,682 UART: [state] Locking ICCM
2,860,224 UART: [exit] Launching FMC @ 0x40000130
2,865,553 UART:
2,865,569 UART: Running Caliptra FMC ...
2,865,977 UART:
2,866,031 UART: [state] CFI Enabled
2,876,657 UART: [fht] FMC Alias Private Key: 7
2,985,450 UART: [art] Extend RT PCRs Done
2,985,878 UART: [art] Lock RT PCRs Done
2,987,512 UART: [art] Populate DV Done
2,996,036 UART: [fht] FMC Alias Private Key: 7
2,997,012 UART: [art] Derive CDI
2,997,292 UART: [art] Store in in slot 0x4
3,083,335 UART: [art] Derive Key Pair
3,083,695 UART: [art] Store priv key in slot 0x5
3,097,355 UART: [art] Derive Key Pair - Done
3,112,055 UART: [art] Signing Cert with AUTHO
3,112,535 UART: RITY.KEYID = 7
3,127,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,684 UART: [art] PUB.X = A1FAAD38AB1ADAAFC651F6BFA4471F7482DA7BEB1F5946FFC886C3180F668DDC0048356A28E75183FE39AD8676E1DAD1
3,135,451 UART: [art] PUB.Y = 54DAAA12B1F16249CD5D8B1D4DB7DCFB296A494B5B53078ADE7729AC4055BD7730BF4343F775C4FEA4214766648990FB
3,142,408 UART: [art] SIG.R = D572BAC5A774C746EFC12D08E9B496967945A52F16678F009000579421D3C49B533A15639F805CD1B79920831B238C2B
3,149,121 UART: [art] SIG.S = DD3BF6819BA1995AB8A92CE9763E6D9B773E6B305999D05294032E520398ACB5134C4F4F175E2B2DCFD4654F1E802328
3,173,040 UART: Caliptra RT
3,173,293 UART: [state] CFI Enabled
3,280,642 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,936 UART: [rt]cmd =0x494e464f, len=4
3,314,197 >>> mbox cmd response data (264 bytes)
3,314,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,009 UART:
3,315,025 UART: Running Caliptra ROM ...
3,315,433 UART:
3,315,488 UART: [state] CFI Enabled
3,318,018 UART: [state] LifecycleState = Unprovisioned
3,318,673 UART: [state] DebugLocked = No
3,319,299 UART: [state] WD Timer not started. Device not locked for debugging
3,320,587 UART: [kat] SHA2-256
4,126,237 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,130,362 UART: [kat] ++
4,130,514 UART: [kat] sha1
4,134,726 UART: [kat] SHA2-256
4,136,666 UART: [kat] SHA2-384
4,139,513 UART: [kat] SHA2-512-ACC
4,141,413 UART: [kat] ECC-384
4,150,952 UART: [kat] HMAC-384Kdf
4,155,492 UART: [kat] LMS
4,403,820 UART: [kat] --
4,404,758 UART: [update-reset] ++
5,717,784 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,718,951 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,868,949 >>> mbox cmd response: success
5,869,102 UART: [update-reset] Copying MAN_2 To MAN_1
5,877,116 UART: [update-reset Success] --
5,878,249 UART: [state] Locking Datavault
5,879,089 UART: [state] Locking PCR0, PCR1 and PCR31
5,879,693 UART: [state] Locking ICCM
5,880,331 UART: [exit] Launching FMC @ 0x40000130
5,885,660 UART:
5,885,676 UART: Running Caliptra FMC ...
5,886,084 UART:
5,886,138 UART: [state] CFI Enabled
5,975,307 UART: [art] Extend RT PCRs Done
5,975,735 UART: [art] Lock RT PCRs Done
5,976,970 UART: [art] Populate DV Done
5,985,054 UART: [fht] FMC Alias Private Key: 7
5,986,018 UART: [art] Derive CDI
5,986,298 UART: [art] Store in in slot 0x4
6,071,763 UART: [art] Derive Key Pair
6,072,123 UART: [art] Store priv key in slot 0x5
6,085,529 UART: [art] Derive Key Pair - Done
6,100,060 UART: [art] Signing Cert with AUTHO
6,100,540 UART: RITY.KEYID = 7
6,115,522 UART: [art] Erasing AUTHORITY.KEYID = 7
6,116,287 UART: [art] PUB.X = 21E2EAD493476EE8B85AC38E5DEF1F8D1B10E5F7F0D52AF57A2371247D61FA3C48DA487C04EC0C0BA43F4E06226EB9E4
6,123,063 UART: [art] PUB.Y = 62A6771E6A127CAF7461104E0CCD236BBCCAC0752D52C55FBD334166428912378669DBA89B6D7D21AB3C206E12335C6D
6,130,014 UART: [art] SIG.R = DA221328B4C36233E24D4E5E37405C050DDF6567E2465357977C92C59AF0F1E442D4326C49FC08E427AAA3E0AA3E2203
6,136,772 UART: [art] SIG.S = E0764437912E4BC8EE99BD87E97A10BDCFF8B986856E5826A57744E528823B51FE97D664F1064FB6FA3C803A54881B56
6,161,150 UART: Caliptra RT
6,161,403 UART: [state] CFI Enabled
6,447,028 UART: [rt] RT listening for mailbox commands...
6,447,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,477,265 UART: [rt]cmd =0x494e464f, len=4
6,480,394 >>> mbox cmd response data (264 bytes)
6,480,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,481,360 UART:
6,481,376 UART: Running Caliptra ROM ...
6,481,784 UART:
6,481,839 UART: [state] CFI Enabled
6,484,333 UART: [state] LifecycleState = Unprovisioned
6,484,988 UART: [state] DebugLocked = No
6,485,582 UART: [state] WD Timer not started. Device not locked for debugging
6,486,718 UART: [kat] SHA2-256
7,292,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,296,493 UART: [kat] ++
7,296,645 UART: [kat] sha1
7,301,039 UART: [kat] SHA2-256
7,302,979 UART: [kat] SHA2-384
7,305,580 UART: [kat] SHA2-512-ACC
7,307,480 UART: [kat] ECC-384
7,316,977 UART: [kat] HMAC-384Kdf
7,321,325 UART: [kat] LMS
7,569,653 UART: [kat] --
7,570,391 UART: [update-reset] ++
8,884,245 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,885,434 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
9,035,432 >>> mbox cmd response: success
9,035,777 UART: [update-reset] Copying MAN_2 To MAN_1
9,043,791 UART: [update-reset Success] --
9,044,926 UART: [state] Locking Datavault
9,045,588 UART: [state] Locking PCR0, PCR1 and PCR31
9,046,192 UART: [state] Locking ICCM
9,046,638 UART: [exit] Launching FMC @ 0x40000130
9,051,967 UART:
9,051,983 UART: Running Caliptra FMC ...
9,052,391 UART:
9,052,445 UART: [state] CFI Enabled
9,141,526 UART: [art] Extend RT PCRs Done
9,141,954 UART: [art] Lock RT PCRs Done
9,142,879 UART: [art] Populate DV Done
9,151,193 UART: [fht] FMC Alias Private Key: 7
9,152,181 UART: [art] Derive CDI
9,152,461 UART: [art] Store in in slot 0x4
9,238,080 UART: [art] Derive Key Pair
9,238,440 UART: [art] Store priv key in slot 0x5
9,251,326 UART: [art] Derive Key Pair - Done
9,266,443 UART: [art] Signing Cert with AUTHO
9,266,923 UART: RITY.KEYID = 7
9,281,833 UART: [art] Erasing AUTHORITY.KEYID = 7
9,282,598 UART: [art] PUB.X = 3D10B202FE32FEB4F32E3A025DBC1BB280AAB966D91FB4E71D8085BF1954F23981B9AD6133BBDCE30119A7EE44E6CEDA
9,289,381 UART: [art] PUB.Y = 8CB1048339E6118EA3F900873E544E697FB574CDAD609479670B964926C59CF05F93D1920D14340E451FAB26C32FDBA4
9,296,295 UART: [art] SIG.R = 348AB3AC22A53EED10B6A7D6259E3C85431C6F428E0FDADE968C0EED16E75D8AA40D8FC64573C294601E288DE8E86C15
9,303,070 UART: [art] SIG.S = 974F55A14758A7FD16D8655555DEFF0934D290303BA80E99DB8349C5D5CC8DBEADE01E0CFBE95C8E517E3A29ABBF5DD1
9,326,186 UART: Caliptra RT
9,326,439 UART: [state] CFI Enabled
9,604,498 UART: [rt] RT listening for mailbox commands...
9,605,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,634,707 UART: [rt]cmd =0x494e464f, len=4
9,638,066 >>> mbox cmd response data (264 bytes)
9,638,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,638,816 UART:
9,638,832 UART: Running Caliptra ROM ...
9,639,240 UART:
9,639,295 UART: [state] CFI Enabled
9,641,959 UART: [state] LifecycleState = Unprovisioned
9,642,614 UART: [state] DebugLocked = No
9,643,272 UART: [state] WD Timer not started. Device not locked for debugging
9,644,460 UART: [kat] SHA2-256
10,450,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,454,235 UART: [kat] ++
10,454,387 UART: [kat] sha1
10,458,677 UART: [kat] SHA2-256
10,460,617 UART: [kat] SHA2-384
10,463,598 UART: [kat] SHA2-512-ACC
10,465,498 UART: [kat] ECC-384
10,475,479 UART: [kat] HMAC-384Kdf
10,479,933 UART: [kat] LMS
10,728,261 UART: [kat] --
10,729,241 UART: [update-reset] ++
12,042,251 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,043,386 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
12,193,384 >>> mbox cmd response: success
12,193,687 UART: [update-reset] Copying MAN_2 To MAN_1
12,201,701 UART: [update-reset Success] --
12,202,688 UART: [state] Locking Datavault
12,203,520 UART: [state] Locking PCR0, PCR1 and PCR31
12,204,124 UART: [state] Locking ICCM
12,204,764 UART: [exit] Launching FMC @ 0x40000130
12,210,093 UART:
12,210,109 UART: Running Caliptra FMC ...
12,210,517 UART:
12,210,571 UART: [state] CFI Enabled
12,299,334 UART: [art] Extend RT PCRs Done
12,299,762 UART: [art] Lock RT PCRs Done
12,300,967 UART: [art] Populate DV Done
12,309,371 UART: [fht] FMC Alias Private Key: 7
12,310,393 UART: [art] Derive CDI
12,310,673 UART: [art] Store in in slot 0x4
12,396,802 UART: [art] Derive Key Pair
12,397,162 UART: [art] Store priv key in slot 0x5
12,410,232 UART: [art] Derive Key Pair - Done
12,425,143 UART: [art] Signing Cert with AUTHO
12,425,623 UART: RITY.KEYID = 7
12,440,909 UART: [art] Erasing AUTHORITY.KEYID = 7
12,441,674 UART: [art] PUB.X = 21E2EAD493476EE8B85AC38E5DEF1F8D1B10E5F7F0D52AF57A2371247D61FA3C48DA487C04EC0C0BA43F4E06226EB9E4
12,448,450 UART: [art] PUB.Y = 62A6771E6A127CAF7461104E0CCD236BBCCAC0752D52C55FBD334166428912378669DBA89B6D7D21AB3C206E12335C6D
12,455,401 UART: [art] SIG.R = DA221328B4C36233E24D4E5E37405C050DDF6567E2465357977C92C59AF0F1E442D4326C49FC08E427AAA3E0AA3E2203
12,462,159 UART: [art] SIG.S = E0764437912E4BC8EE99BD87E97A10BDCFF8B986856E5826A57744E528823B51FE97D664F1064FB6FA3C803A54881B56
12,486,137 UART: Caliptra RT
12,486,390 UART: [state] CFI Enabled
12,769,527 UART: [rt] RT listening for mailbox commands...
12,770,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,799,832 UART: [rt]cmd =0x494e464f, len=4
12,803,165 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,693 ready_for_fw is high
1,059,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,746 >>> mbox cmd response: success
2,625,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,687,429 UART:
2,687,445 UART: Running Caliptra FMC ...
2,687,853 UART:
2,687,907 UART: [state] CFI Enabled
2,698,643 UART: [fht] FMC Alias Private Key: 7
2,806,464 UART: [art] Extend RT PCRs Done
2,806,892 UART: [art] Lock RT PCRs Done
2,808,612 UART: [art] Populate DV Done
2,816,858 UART: [fht] FMC Alias Private Key: 7
2,818,034 UART: [art] Derive CDI
2,818,314 UART: [art] Store in in slot 0x4
2,904,121 UART: [art] Derive Key Pair
2,904,481 UART: [art] Store priv key in slot 0x5
2,918,207 UART: [art] Derive Key Pair - Done
2,932,871 UART: [art] Signing Cert with AUTHO
2,933,351 UART: RITY.KEYID = 7
2,948,521 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,286 UART: [art] PUB.X = 6435E3E422805A1D50AB623592D09DAD2F444ECC5E15862C82DDFEEE363F0E41782868587D893895B667465746E71E08
2,956,044 UART: [art] PUB.Y = 3F7F4EC4EAD7E4B6A71FD933201F6B57D79DD0A2B79EF8291FEE5E3CD105D531B9CFA0E801C08641465BD04FE4CADEAD
2,963,014 UART: [art] SIG.R = 6082B399946CFC971E9113A1C61E1C0D4AD0B983D480EA5D7DD37FA21A27330A0F4458F096E4912B07BDE793BDF7E4F4
2,969,780 UART: [art] SIG.S = 68A891AF13FA59B888871779BDE6D0DEA994B57E9368DAA3266B3F832872FBB8A37B7AB7A16F2283995FFF15C1432140
2,993,859 UART: Caliptra RT
2,994,112 UART: [state] CFI Enabled
3,102,028 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,608 UART: [rt]cmd =0x494e464f, len=4
3,135,969 >>> mbox cmd response data (264 bytes)
3,135,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,573,474 >>> mbox cmd response: success
5,587,044 UART:
5,587,060 UART: Running Caliptra FMC ...
5,587,468 UART:
5,587,522 UART: [state] CFI Enabled
5,676,423 UART: [art] Extend RT PCRs Done
5,676,851 UART: [art] Lock RT PCRs Done
5,678,290 UART: [art] Populate DV Done
5,686,660 UART: [fht] FMC Alias Private Key: 7
5,687,588 UART: [art] Derive CDI
5,687,868 UART: [art] Store in in slot 0x4
5,773,523 UART: [art] Derive Key Pair
5,773,883 UART: [art] Store priv key in slot 0x5
5,786,533 UART: [art] Derive Key Pair - Done
5,801,117 UART: [art] Signing Cert with AUTHO
5,801,597 UART: RITY.KEYID = 7
5,816,765 UART: [art] Erasing AUTHORITY.KEYID = 7
5,817,530 UART: [art] PUB.X = 9BC56E2E016A63981F70898E376AE69855C80AC971271A7CCEDBF56F2DE39B890F41F1B7CC4C4086E6A5D14507BAA352
5,824,296 UART: [art] PUB.Y = A3B84ACB93556307336F9EB0EC9D25536486DD90804B02ABCEDC45F3A78A8D87A1C39B107D4F4D1BE54632C553BACDCD
5,831,256 UART: [art] SIG.R = 04FF7E6EFE094D2C085D43A79BFB18FF598FC18F6610A2D3D903DBA0B28CF955B718016833CF79B7F01D798379401F72
5,838,017 UART: [art] SIG.S = 14DD91ADFF75ECAD450FC37F6EAE1436563B02CB40432579377744F86A624E14FCFCC62FECE4A92DB2F78E262EB7866F
5,861,852 UART: Caliptra RT
5,862,105 UART: [state] CFI Enabled
6,146,063 UART: [rt] RT listening for mailbox commands...
6,146,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,176,286 UART: [rt]cmd =0x494e464f, len=4
6,179,633 >>> mbox cmd response data (264 bytes)
6,179,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,616,862 >>> mbox cmd response: success
8,629,968 UART:
8,629,984 UART: Running Caliptra FMC ...
8,630,392 UART:
8,630,446 UART: [state] CFI Enabled
8,719,467 UART: [art] Extend RT PCRs Done
8,719,895 UART: [art] Lock RT PCRs Done
8,720,876 UART: [art] Populate DV Done
8,729,026 UART: [fht] FMC Alias Private Key: 7
8,730,138 UART: [art] Derive CDI
8,730,418 UART: [art] Store in in slot 0x4
8,815,921 UART: [art] Derive Key Pair
8,816,281 UART: [art] Store priv key in slot 0x5
8,829,861 UART: [art] Derive Key Pair - Done
8,844,721 UART: [art] Signing Cert with AUTHO
8,845,201 UART: RITY.KEYID = 7
8,860,609 UART: [art] Erasing AUTHORITY.KEYID = 7
8,861,374 UART: [art] PUB.X = DE1BFD43626B9EA1193A15A490A48F78FC9E0A647D70839D18AFF9020CD8E9E536A4B024E48E3C90D994361775145869
8,868,135 UART: [art] PUB.Y = 4FC32A22AF6033E04B56DFE916AAC82ACC7BA1C84519C66D20EB7B705B2F28771EED15D8AE46D929D340533B7938428C
8,875,095 UART: [art] SIG.R = 210A254A0F1653AABABFDA734B613D0B91FD448A870046904DAC481A3575DE06F8F610EEBAAC797288DD88CE5A480A61
8,881,840 UART: [art] SIG.S = 7F839470D1E5C6AF81938F87CAFB5F34E2E78F3250429AEDE679E88E1748E492217D1132CAA18132AEE0087EE5BA93E7
8,905,714 UART: Caliptra RT
8,905,967 UART: [state] CFI Enabled
9,185,353 UART: [rt] RT listening for mailbox commands...
9,186,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,215,492 UART: [rt]cmd =0x494e464f, len=4
9,218,799 >>> mbox cmd response data (264 bytes)
9,218,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,657,524 >>> mbox cmd response: success
11,671,188 UART:
11,671,204 UART: Running Caliptra FMC ...
11,671,612 UART:
11,671,666 UART: [state] CFI Enabled
11,760,945 UART: [art] Extend RT PCRs Done
11,761,373 UART: [art] Lock RT PCRs Done
11,762,770 UART: [art] Populate DV Done
11,770,896 UART: [fht] FMC Alias Private Key: 7
11,771,950 UART: [art] Derive CDI
11,772,230 UART: [art] Store in in slot 0x4
11,857,985 UART: [art] Derive Key Pair
11,858,345 UART: [art] Store priv key in slot 0x5
11,871,265 UART: [art] Derive Key Pair - Done
11,885,655 UART: [art] Signing Cert with AUTHO
11,886,135 UART: RITY.KEYID = 7
11,901,201 UART: [art] Erasing AUTHORITY.KEYID = 7
11,901,966 UART: [art] PUB.X = 9BC56E2E016A63981F70898E376AE69855C80AC971271A7CCEDBF56F2DE39B890F41F1B7CC4C4086E6A5D14507BAA352
11,908,732 UART: [art] PUB.Y = A3B84ACB93556307336F9EB0EC9D25536486DD90804B02ABCEDC45F3A78A8D87A1C39B107D4F4D1BE54632C553BACDCD
11,915,692 UART: [art] SIG.R = 04FF7E6EFE094D2C085D43A79BFB18FF598FC18F6610A2D3D903DBA0B28CF955B718016833CF79B7F01D798379401F72
11,922,453 UART: [art] SIG.S = 14DD91ADFF75ECAD450FC37F6EAE1436563B02CB40432579377744F86A624E14FCFCC62FECE4A92DB2F78E262EB7866F
11,946,008 UART: Caliptra RT
11,946,261 UART: [state] CFI Enabled
12,229,469 UART: [rt] RT listening for mailbox commands...
12,230,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,259,666 UART: [rt]cmd =0x494e464f, len=4
12,262,909 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.49s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,560 UART: [ldev] --
1,283,067 UART: [fwproc] Wait for Commands...
1,283,759 UART: [fwproc] Recv command 0x46574c44
1,284,487 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,873 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,294 >>> mbox cmd response: success
2,776,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,777,492 UART: [afmc] ++
2,777,660 UART: [afmc] CDI.KEYID = 6
2,778,022 UART: [afmc] SUBJECT.KEYID = 7
2,778,447 UART: [afmc] AUTHORITY.KEYID = 5
2,814,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,300 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,836,992 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,842,865 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,848,567 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,856,288 UART: [afmc] --
2,857,328 UART: [cold-reset] --
2,858,404 UART: [state] Locking Datavault
2,859,611 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,215 UART: [state] Locking ICCM
2,860,719 UART: [exit] Launching FMC @ 0x40000130
2,866,048 UART:
2,866,064 UART: Running Caliptra FMC ...
2,866,472 UART:
2,866,615 UART: [state] CFI Enabled
2,877,261 UART: [fht] FMC Alias Private Key: 7
2,985,120 UART: [art] Extend RT PCRs Done
2,985,548 UART: [art] Lock RT PCRs Done
2,987,006 UART: [art] Populate DV Done
2,995,264 UART: [fht] FMC Alias Private Key: 7
2,996,282 UART: [art] Derive CDI
2,996,562 UART: [art] Store in in slot 0x4
3,082,163 UART: [art] Derive Key Pair
3,082,523 UART: [art] Store priv key in slot 0x5
3,096,025 UART: [art] Derive Key Pair - Done
3,110,915 UART: [art] Signing Cert with AUTHO
3,111,395 UART: RITY.KEYID = 7
3,126,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,206 UART: [art] PUB.X = 9C8A5CB49BDEA2E103755EADCB85F1B0093CD3AE9F853E6019B91415BE77BB946BAD4598FC38A9DC90D2AB3CAE17DEB0
3,133,996 UART: [art] PUB.Y = 86A58F9D9E292445CDFD474AD65A04E5959A1541247F0600FBE9FEF64CA361443E6611A34FB057D8B9BC2CF0F2F62EAD
3,140,930 UART: [art] SIG.R = E200088C4D212CA1CCC3D691009EDB6742FCA850A624F125DED3599E84FAACFAD5B2970171BD61F9E42D3504A48446EF
3,147,659 UART: [art] SIG.S = 771F97F2168CD84AD1272403452E8BA7756A2FA885E2091E7923E972E1A9D1FC47F390E8C38C71A385647CD36A08D1BD
3,171,293 UART: Caliptra RT
3,171,638 UART: [state] CFI Enabled
3,279,857 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,243 UART: [rt]cmd =0x494e464f, len=4
3,313,682 >>> mbox cmd response data (264 bytes)
3,313,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,254 UART:
3,314,270 UART: Running Caliptra ROM ...
3,314,678 UART:
3,314,820 UART: [state] CFI Enabled
3,317,730 UART: [state] LifecycleState = Unprovisioned
3,318,385 UART: [state] DebugLocked = No
3,318,923 UART: [state] WD Timer not started. Device not locked for debugging
3,320,257 UART: [kat] SHA2-256
4,125,907 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,130,032 UART: [kat] ++
4,130,184 UART: [kat] sha1
4,134,396 UART: [kat] SHA2-256
4,136,336 UART: [kat] SHA2-384
4,139,015 UART: [kat] SHA2-512-ACC
4,140,915 UART: [kat] ECC-384
4,150,744 UART: [kat] HMAC-384Kdf
4,155,184 UART: [kat] LMS
4,403,512 UART: [kat] --
4,404,336 UART: [update-reset] ++
5,717,368 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,718,547 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,868,545 >>> mbox cmd response: success
5,868,894 UART: [update-reset] Copying MAN_2 To MAN_1
5,876,908 UART: [update-reset Success] --
5,877,861 UART: [state] Locking Datavault
5,878,631 UART: [state] Locking PCR0, PCR1 and PCR31
5,879,235 UART: [state] Locking ICCM
5,879,751 UART: [exit] Launching FMC @ 0x40000130
5,885,080 UART:
5,885,096 UART: Running Caliptra FMC ...
5,885,504 UART:
5,885,647 UART: [state] CFI Enabled
5,974,786 UART: [art] Extend RT PCRs Done
5,975,214 UART: [art] Lock RT PCRs Done
5,976,539 UART: [art] Populate DV Done
5,984,863 UART: [fht] FMC Alias Private Key: 7
5,985,815 UART: [art] Derive CDI
5,986,095 UART: [art] Store in in slot 0x4
6,071,976 UART: [art] Derive Key Pair
6,072,336 UART: [art] Store priv key in slot 0x5
6,086,022 UART: [art] Derive Key Pair - Done
6,101,053 UART: [art] Signing Cert with AUTHO
6,101,533 UART: RITY.KEYID = 7
6,116,733 UART: [art] Erasing AUTHORITY.KEYID = 7
6,117,498 UART: [art] PUB.X = 5B9762A34EAD5A7BFC7F92DA3B94D58A5AA7EBB5EFEB18EAE4E9EA139174111AE2BAC7A2786355EF468F4FA95E85D6EB
6,124,296 UART: [art] PUB.Y = 66040A3C147547BF6559A5282D60ED00C109955074332D987992BB65B73722243953866150A6C15798B52B491F9891FC
6,131,193 UART: [art] SIG.R = 35DD49F60AF927448AF26688F5785B6707DEAD66FA2568555BCD660CEB44285471FCB1A7BF8537B9219D754397070366
6,137,944 UART: [art] SIG.S = 875A47D7B89A94C5C66277C0E0AE3F5EF8E42F95F39D2C5D059414393CBC573AAA7A70B251499392D708B1872567F964
6,161,681 UART: Caliptra RT
6,162,026 UART: [state] CFI Enabled
6,444,521 UART: [rt] RT listening for mailbox commands...
6,445,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,474,716 UART: [rt]cmd =0x494e464f, len=4
6,478,027 >>> mbox cmd response data (264 bytes)
6,478,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,478,925 UART:
6,478,941 UART: Running Caliptra ROM ...
6,479,349 UART:
6,479,491 UART: [state] CFI Enabled
6,482,071 UART: [state] LifecycleState = Unprovisioned
6,482,726 UART: [state] DebugLocked = No
6,483,448 UART: [state] WD Timer not started. Device not locked for debugging
6,484,770 UART: [kat] SHA2-256
7,290,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,294,545 UART: [kat] ++
7,294,697 UART: [kat] sha1
7,298,803 UART: [kat] SHA2-256
7,300,743 UART: [kat] SHA2-384
7,303,538 UART: [kat] SHA2-512-ACC
7,305,438 UART: [kat] ECC-384
7,315,159 UART: [kat] HMAC-384Kdf
7,319,949 UART: [kat] LMS
7,568,277 UART: [kat] --
7,569,271 UART: [update-reset] ++
8,882,293 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,883,360 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
9,033,358 >>> mbox cmd response: success
9,033,633 UART: [update-reset] Copying MAN_2 To MAN_1
9,041,647 UART: [update-reset Success] --
9,042,808 UART: [state] Locking Datavault
9,043,642 UART: [state] Locking PCR0, PCR1 and PCR31
9,044,246 UART: [state] Locking ICCM
9,044,734 UART: [exit] Launching FMC @ 0x40000130
9,050,063 UART:
9,050,079 UART: Running Caliptra FMC ...
9,050,487 UART:
9,050,630 UART: [state] CFI Enabled
9,139,517 UART: [art] Extend RT PCRs Done
9,139,945 UART: [art] Lock RT PCRs Done
9,141,420 UART: [art] Populate DV Done
9,149,772 UART: [fht] FMC Alias Private Key: 7
9,150,720 UART: [art] Derive CDI
9,151,000 UART: [art] Store in in slot 0x4
9,237,085 UART: [art] Derive Key Pair
9,237,445 UART: [art] Store priv key in slot 0x5
9,251,211 UART: [art] Derive Key Pair - Done
9,265,960 UART: [art] Signing Cert with AUTHO
9,266,440 UART: RITY.KEYID = 7
9,281,432 UART: [art] Erasing AUTHORITY.KEYID = 7
9,282,197 UART: [art] PUB.X = 8505EE57DA77439EFA8C7E0B1749F4597A2599647796899A56892360F1366E72D8DCFA2D105D808F35CB7B67C3C57771
9,288,955 UART: [art] PUB.Y = B50DF3E12CEE68A816EDC13239D6733C2DC732486A8FB1404EAAAD4B43E3CCEB6E1CA5A53BF5D9BF9F52A24D3198E1C2
9,295,926 UART: [art] SIG.R = 2B30B38F9F43CC658246342E2035A97B5D539818800C9926F4BAB333DB57FE363A688251F1AA36143D2588F3635035A9
9,302,683 UART: [art] SIG.S = 745D68533BE2AA2194935ABDA47CDB4D422D50F7ECD3226467B09083090033061C3E36999362235974964A11D7A468FA
9,326,498 UART: Caliptra RT
9,326,843 UART: [state] CFI Enabled
9,609,243 UART: [rt] RT listening for mailbox commands...
9,609,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,639,420 UART: [rt]cmd =0x494e464f, len=4
9,642,961 >>> mbox cmd response data (264 bytes)
9,642,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,643,831 UART:
9,643,847 UART: Running Caliptra ROM ...
9,644,255 UART:
9,644,397 UART: [state] CFI Enabled
9,647,429 UART: [state] LifecycleState = Unprovisioned
9,648,084 UART: [state] DebugLocked = No
9,648,676 UART: [state] WD Timer not started. Device not locked for debugging
9,649,846 UART: [kat] SHA2-256
10,455,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,459,621 UART: [kat] ++
10,459,773 UART: [kat] sha1
10,464,147 UART: [kat] SHA2-256
10,466,087 UART: [kat] SHA2-384
10,468,790 UART: [kat] SHA2-512-ACC
10,470,690 UART: [kat] ECC-384
10,480,701 UART: [kat] HMAC-384Kdf
10,485,327 UART: [kat] LMS
10,733,655 UART: [kat] --
10,734,751 UART: [update-reset] ++
12,048,579 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,049,566 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
12,199,564 >>> mbox cmd response: success
12,199,683 UART: [update-reset] Copying MAN_2 To MAN_1
12,207,697 UART: [update-reset Success] --
12,208,758 UART: [state] Locking Datavault
12,209,454 UART: [state] Locking PCR0, PCR1 and PCR31
12,210,058 UART: [state] Locking ICCM
12,210,624 UART: [exit] Launching FMC @ 0x40000130
12,215,953 UART:
12,215,969 UART: Running Caliptra FMC ...
12,216,377 UART:
12,216,520 UART: [state] CFI Enabled
12,305,873 UART: [art] Extend RT PCRs Done
12,306,301 UART: [art] Lock RT PCRs Done
12,307,454 UART: [art] Populate DV Done
12,315,650 UART: [fht] FMC Alias Private Key: 7
12,316,662 UART: [art] Derive CDI
12,316,942 UART: [art] Store in in slot 0x4
12,402,007 UART: [art] Derive Key Pair
12,402,367 UART: [art] Store priv key in slot 0x5
12,415,477 UART: [art] Derive Key Pair - Done
12,430,316 UART: [art] Signing Cert with AUTHO
12,430,796 UART: RITY.KEYID = 7
12,446,102 UART: [art] Erasing AUTHORITY.KEYID = 7
12,446,867 UART: [art] PUB.X = 5B9762A34EAD5A7BFC7F92DA3B94D58A5AA7EBB5EFEB18EAE4E9EA139174111AE2BAC7A2786355EF468F4FA95E85D6EB
12,453,665 UART: [art] PUB.Y = 66040A3C147547BF6559A5282D60ED00C109955074332D987992BB65B73722243953866150A6C15798B52B491F9891FC
12,460,562 UART: [art] SIG.R = 35DD49F60AF927448AF26688F5785B6707DEAD66FA2568555BCD660CEB44285471FCB1A7BF8537B9219D754397070366
12,467,313 UART: [art] SIG.S = 875A47D7B89A94C5C66277C0E0AE3F5EF8E42F95F39D2C5D059414393CBC573AAA7A70B251499392D708B1872567F964
12,490,958 UART: Caliptra RT
12,491,303 UART: [state] CFI Enabled
12,775,206 UART: [rt] RT listening for mailbox commands...
12,775,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,805,297 UART: [rt]cmd =0x494e464f, len=4
12,808,662 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,544 ready_for_fw is high
1,060,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,401 >>> mbox cmd response: success
2,628,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,690,994 UART:
2,691,010 UART: Running Caliptra FMC ...
2,691,418 UART:
2,691,561 UART: [state] CFI Enabled
2,702,255 UART: [fht] FMC Alias Private Key: 7
2,810,192 UART: [art] Extend RT PCRs Done
2,810,620 UART: [art] Lock RT PCRs Done
2,812,132 UART: [art] Populate DV Done
2,820,744 UART: [fht] FMC Alias Private Key: 7
2,821,712 UART: [art] Derive CDI
2,821,992 UART: [art] Store in in slot 0x4
2,907,627 UART: [art] Derive Key Pair
2,907,987 UART: [art] Store priv key in slot 0x5
2,921,673 UART: [art] Derive Key Pair - Done
2,936,591 UART: [art] Signing Cert with AUTHO
2,937,071 UART: RITY.KEYID = 7
2,952,341 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,106 UART: [art] PUB.X = CEA209BA3289D4044C2FE7A07B4FDC9CCF73E07ACAEFE76DE627723650282D247535442A332BFDA6E2702D70DC6EBF6A
2,959,888 UART: [art] PUB.Y = 0DB4EA73C134AAB09B444748A4261FE76AC501783E40CAC40A07A0D53449FFB64DB56BACDC323CB9FAEA2074EB2D53B1
2,966,846 UART: [art] SIG.R = AD5AC2C6B6BF20336EF683EDE5A6F314DE39814E096A158F352FADC38042AF1CE4C39DD21B6F6BD72C31ADC593C91EDA
2,973,637 UART: [art] SIG.S = 4DD469E54C44A611E1C86A6525B07B5ACF1FF48857F9CD87B124948BE97F9FC55A136581D347F3D7C8CD35BBF284B774
2,997,164 UART: Caliptra RT
2,997,509 UART: [state] CFI Enabled
3,104,804 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,110 UART: [rt]cmd =0x494e464f, len=4
3,138,393 >>> mbox cmd response data (264 bytes)
3,138,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,576,979 >>> mbox cmd response: success
5,590,359 UART:
5,590,375 UART: Running Caliptra FMC ...
5,590,783 UART:
5,590,926 UART: [state] CFI Enabled
5,680,029 UART: [art] Extend RT PCRs Done
5,680,457 UART: [art] Lock RT PCRs Done
5,681,670 UART: [art] Populate DV Done
5,689,794 UART: [fht] FMC Alias Private Key: 7
5,690,880 UART: [art] Derive CDI
5,691,160 UART: [art] Store in in slot 0x4
5,777,127 UART: [art] Derive Key Pair
5,777,487 UART: [art] Store priv key in slot 0x5
5,790,907 UART: [art] Derive Key Pair - Done
5,805,834 UART: [art] Signing Cert with AUTHO
5,806,314 UART: RITY.KEYID = 7
5,821,112 UART: [art] Erasing AUTHORITY.KEYID = 7
5,821,877 UART: [art] PUB.X = 662416FC989F79556439F5FC4619DB4058F6CF170740C801BBFE872E9ED86D2B3A420D27ED7057ADF13C818EEFF7C205
5,828,641 UART: [art] PUB.Y = C65E50D9553BC0F3030494F15D1EEF47C696FD46A13A3C5F5285A227225C7E8D32258F921386C6E435D490B0235E29F2
5,835,581 UART: [art] SIG.R = CA8EA4E95A9DFEAB6417592906B69C72BC8F78B517E346057C403998FFAE35E32093D7A79796DD8F65748BFF6E801754
5,842,349 UART: [art] SIG.S = CF5863BB077AAF11461F2E7BB5AD25FC6ADA50D42E2A8DCC064D07A5608FBBFE6E1D3347AF5149F2C511D2532DE38013
5,866,767 UART: Caliptra RT
5,867,112 UART: [state] CFI Enabled
6,149,677 UART: [rt] RT listening for mailbox commands...
6,150,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,180,038 UART: [rt]cmd =0x494e464f, len=4
6,183,555 >>> mbox cmd response data (264 bytes)
6,183,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,622,753 >>> mbox cmd response: success
8,636,069 UART:
8,636,085 UART: Running Caliptra FMC ...
8,636,493 UART:
8,636,636 UART: [state] CFI Enabled
8,725,337 UART: [art] Extend RT PCRs Done
8,725,765 UART: [art] Lock RT PCRs Done
8,727,000 UART: [art] Populate DV Done
8,735,130 UART: [fht] FMC Alias Private Key: 7
8,736,204 UART: [art] Derive CDI
8,736,484 UART: [art] Store in in slot 0x4
8,822,243 UART: [art] Derive Key Pair
8,822,603 UART: [art] Store priv key in slot 0x5
8,835,561 UART: [art] Derive Key Pair - Done
8,850,093 UART: [art] Signing Cert with AUTHO
8,850,573 UART: RITY.KEYID = 7
8,865,375 UART: [art] Erasing AUTHORITY.KEYID = 7
8,866,140 UART: [art] PUB.X = 95F3158718E5BABDCCBDBDB374F4D53318EA89CBE5208EB39D81676A692DE07F23D37A3055D6C0FC949E8F124A0C7974
8,872,919 UART: [art] PUB.Y = 799D7A182854507AF55631E5A02687D15C20A056293AA3A3E3D59A9291958B866E920587C686B15EDE1D33D6B7BA192A
8,879,860 UART: [art] SIG.R = 80E84C74954DE3C57C36B44257DE557E5963AAF2E4E9AE5CE80CFDA42A6FF2DB8C1E67F7C66306194E1E411439BD2DF5
8,886,638 UART: [art] SIG.S = 1710B0B996FE15D2E714132C66CF2E029AAB970376D42003B616C38402BB3CE32C55AEDFAB5F7D39A931BD796137641C
8,910,539 UART: Caliptra RT
8,910,884 UART: [state] CFI Enabled
9,191,413 UART: [rt] RT listening for mailbox commands...
9,192,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,221,744 UART: [rt]cmd =0x494e464f, len=4
9,224,957 >>> mbox cmd response data (264 bytes)
9,224,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,662,803 >>> mbox cmd response: success
11,675,963 UART:
11,675,979 UART: Running Caliptra FMC ...
11,676,387 UART:
11,676,530 UART: [state] CFI Enabled
11,765,461 UART: [art] Extend RT PCRs Done
11,765,889 UART: [art] Lock RT PCRs Done
11,767,384 UART: [art] Populate DV Done
11,775,824 UART: [fht] FMC Alias Private Key: 7
11,777,000 UART: [art] Derive CDI
11,777,280 UART: [art] Store in in slot 0x4
11,863,079 UART: [art] Derive Key Pair
11,863,439 UART: [art] Store priv key in slot 0x5
11,876,359 UART: [art] Derive Key Pair - Done
11,891,472 UART: [art] Signing Cert with AUTHO
11,891,952 UART: RITY.KEYID = 7
11,906,774 UART: [art] Erasing AUTHORITY.KEYID = 7
11,907,539 UART: [art] PUB.X = 662416FC989F79556439F5FC4619DB4058F6CF170740C801BBFE872E9ED86D2B3A420D27ED7057ADF13C818EEFF7C205
11,914,303 UART: [art] PUB.Y = C65E50D9553BC0F3030494F15D1EEF47C696FD46A13A3C5F5285A227225C7E8D32258F921386C6E435D490B0235E29F2
11,921,243 UART: [art] SIG.R = CA8EA4E95A9DFEAB6417592906B69C72BC8F78B517E346057C403998FFAE35E32093D7A79796DD8F65748BFF6E801754
11,928,011 UART: [art] SIG.S = CF5863BB077AAF11461F2E7BB5AD25FC6ADA50D42E2A8DCC064D07A5608FBBFE6E1D3347AF5149F2C511D2532DE38013
11,952,083 UART: Caliptra RT
11,952,428 UART: [state] CFI Enabled
12,237,437 UART: [rt] RT listening for mailbox commands...
12,238,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,267,676 UART: [rt]cmd =0x494e464f, len=4
12,270,865 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.70s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,666 UART: [fwproc] Wait for Commands...
1,281,267 UART: [fwproc] Recv command 0x46574c44
1,282,000 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,836 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,179 >>> mbox cmd response: success
2,774,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,775,420 UART: [afmc] ++
2,775,588 UART: [afmc] CDI.KEYID = 6
2,775,951 UART: [afmc] SUBJECT.KEYID = 7
2,776,377 UART: [afmc] AUTHORITY.KEYID = 5
2,812,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,202 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,834,895 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,840,766 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,846,468 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,854,300 UART: [afmc] --
2,855,268 UART: [cold-reset] --
2,856,096 UART: [state] Locking Datavault
2,857,423 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,027 UART: [state] Locking ICCM
2,858,545 UART: [exit] Launching FMC @ 0x40000130
2,863,874 UART:
2,863,890 UART: Running Caliptra FMC ...
2,864,298 UART:
2,864,352 UART: [state] CFI Enabled
2,875,028 UART: [fht] FMC Alias Private Key: 7
2,982,775 UART: [art] Extend RT PCRs Done
2,983,203 UART: [art] Lock RT PCRs Done
2,984,825 UART: [art] Populate DV Done
2,993,009 UART: [fht] FMC Alias Private Key: 7
2,993,983 UART: [art] Derive CDI
2,994,263 UART: [art] Store in in slot 0x4
3,080,014 UART: [art] Derive Key Pair
3,080,374 UART: [art] Store priv key in slot 0x5
3,093,324 UART: [art] Derive Key Pair - Done
3,107,978 UART: [art] Signing Cert with AUTHO
3,108,458 UART: RITY.KEYID = 7
3,123,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,399 UART: [art] PUB.X = E776F089F8E9EE6E0AE31812AF5533F3D18C429718C96E55FC4440469F3CB0292087D5848E22965F28D59E840A72E882
3,131,157 UART: [art] PUB.Y = B57347A48B7166EFAB12F2F00B49F402A54E1967FDCD1F6C4BC73FAE7712DEECA11B8E8A672CB084D6B6594B5E52B51F
3,138,119 UART: [art] SIG.R = 1598E8B8A352C7DD306A853FF86F122311DC952862E58029CF08DF489C375670A7B55DAAC900B125FE6728F8AE64ECBB
3,144,870 UART: [art] SIG.S = CB1BC3A5DC12C1C7B89107B27C042295F235A58C5CE6532BAB463DC23C1501D857CD058B8087034060288183E1980CBA
3,168,561 UART: Caliptra RT
3,168,814 UART: [state] CFI Enabled
3,275,917 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,599 UART: [rt]cmd =0x494e464f, len=4
3,309,858 >>> mbox cmd response data (264 bytes)
3,309,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,614 UART:
3,310,630 UART: Running Caliptra ROM ...
3,311,038 UART:
3,311,093 UART: [state] CFI Enabled
3,313,731 UART: [state] LifecycleState = Unprovisioned
3,314,386 UART: [state] DebugLocked = No
3,315,040 UART: [state] WD Timer not started. Device not locked for debugging
3,316,196 UART: [kat] SHA2-256
4,119,746 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,123,875 UART: [kat] ++
4,124,027 UART: [kat] sha1
4,128,205 UART: [kat] SHA2-256
4,130,145 UART: [kat] SHA2-384
4,132,760 UART: [kat] SHA2-512-ACC
4,134,660 UART: [kat] ECC-384
4,144,449 UART: [kat] HMAC-384Kdf
4,149,001 UART: [kat] LMS
4,397,313 UART: [kat] --
4,398,155 UART: [update-reset] ++
5,711,024 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,712,057 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,862,055 >>> mbox cmd response: success
5,862,288 UART: [update-reset] Copying MAN_2 To MAN_1
5,870,302 UART: [update-reset Success] --
5,871,487 UART: [state] Locking Datavault
5,872,145 UART: [state] Locking PCR0, PCR1 and PCR31
5,872,749 UART: [state] Locking ICCM
5,873,271 UART: [exit] Launching FMC @ 0x40000130
5,878,600 UART:
5,878,616 UART: Running Caliptra FMC ...
5,879,024 UART:
5,879,078 UART: [state] CFI Enabled
5,968,117 UART: [art] Extend RT PCRs Done
5,968,545 UART: [art] Lock RT PCRs Done
5,969,916 UART: [art] Populate DV Done
5,977,862 UART: [fht] FMC Alias Private Key: 7
5,978,880 UART: [art] Derive CDI
5,979,160 UART: [art] Store in in slot 0x4
6,064,619 UART: [art] Derive Key Pair
6,064,979 UART: [art] Store priv key in slot 0x5
6,078,323 UART: [art] Derive Key Pair - Done
6,093,337 UART: [art] Signing Cert with AUTHO
6,093,817 UART: RITY.KEYID = 7
6,109,567 UART: [art] Erasing AUTHORITY.KEYID = 7
6,110,332 UART: [art] PUB.X = 04230FC203CBFD0413178F6EA249F5CFEC6153250EF9787452BDEF13E59B781C3E863D9877A17400BEBF21FEFF321D28
6,117,073 UART: [art] PUB.Y = 489FEB215EF83F54C84484B9CAD2A8BC1E64752C6A5F1AD8997CC149E03615F0024F62E41DED184869972CA531844BF2
6,124,024 UART: [art] SIG.R = F8A251B957781B29D3F5859DFE8BAEF08C613085151F6F172DCA71A2072AE00BC612273A636DC6B689CB37BC7D2A4C48
6,130,796 UART: [art] SIG.S = 46500A42DC7BB61DA82B3B1FF142F357973291364782F27FABC175FA4EF1DC8D7E287140FD81C60A72A9DBD314CDDFB3
6,154,905 UART: Caliptra RT
6,155,158 UART: [state] CFI Enabled
6,435,681 UART: [rt] RT listening for mailbox commands...
6,436,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,465,904 UART: [rt]cmd =0x494e464f, len=4
6,469,157 >>> mbox cmd response data (264 bytes)
6,469,158 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,469,839 UART:
6,469,855 UART: Running Caliptra ROM ...
6,470,263 UART:
6,470,318 UART: [state] CFI Enabled
6,472,966 UART: [state] LifecycleState = Unprovisioned
6,473,621 UART: [state] DebugLocked = No
6,474,249 UART: [state] WD Timer not started. Device not locked for debugging
6,475,455 UART: [kat] SHA2-256
7,279,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,283,134 UART: [kat] ++
7,283,286 UART: [kat] sha1
7,287,546 UART: [kat] SHA2-256
7,289,486 UART: [kat] SHA2-384
7,292,319 UART: [kat] SHA2-512-ACC
7,294,219 UART: [kat] ECC-384
7,304,152 UART: [kat] HMAC-384Kdf
7,308,726 UART: [kat] LMS
7,557,038 UART: [kat] --
7,557,794 UART: [update-reset] ++
8,870,955 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,872,168 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
9,022,166 >>> mbox cmd response: success
9,022,273 UART: [update-reset] Copying MAN_2 To MAN_1
9,030,287 UART: [update-reset Success] --
9,031,154 UART: [state] Locking Datavault
9,031,844 UART: [state] Locking PCR0, PCR1 and PCR31
9,032,448 UART: [state] Locking ICCM
9,033,092 UART: [exit] Launching FMC @ 0x40000130
9,038,421 UART:
9,038,437 UART: Running Caliptra FMC ...
9,038,845 UART:
9,038,899 UART: [state] CFI Enabled
9,128,312 UART: [art] Extend RT PCRs Done
9,128,740 UART: [art] Lock RT PCRs Done
9,129,975 UART: [art] Populate DV Done
9,138,393 UART: [fht] FMC Alias Private Key: 7
9,139,465 UART: [art] Derive CDI
9,139,745 UART: [art] Store in in slot 0x4
9,225,578 UART: [art] Derive Key Pair
9,225,938 UART: [art] Store priv key in slot 0x5
9,238,570 UART: [art] Derive Key Pair - Done
9,253,078 UART: [art] Signing Cert with AUTHO
9,253,558 UART: RITY.KEYID = 7
9,269,004 UART: [art] Erasing AUTHORITY.KEYID = 7
9,269,769 UART: [art] PUB.X = D944923EA1A60219A87A214D7F287B2676E4D42D5358364E2108233DB8C0628F52546F63A109E08146F2BF43003EE574
9,276,496 UART: [art] PUB.Y = 210F7E10FEDB96EBF67E0270D7833013B23D80DAE330BDA4297590999CF14213FEC05CB1C6961015DD0ACA8BE7832E9E
9,283,447 UART: [art] SIG.R = AD08A5B7E1535576539CAA82C286C41639791ACA73016D03299869D970866EB435B717A040295AA9AF3360E795F6DAFB
9,290,204 UART: [art] SIG.S = 2DC4CCA863B68A7B0F14B4BE8A53C7F82B607EEF2BADBB8122C288EFC15C6C89081CFC01A40E97AC347ABE0898E51596
9,314,464 UART: Caliptra RT
9,314,717 UART: [state] CFI Enabled
9,594,328 UART: [rt] RT listening for mailbox commands...
9,594,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,624,515 UART: [rt]cmd =0x494e464f, len=4
9,627,924 >>> mbox cmd response data (264 bytes)
9,627,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,628,474 UART:
9,628,490 UART: Running Caliptra ROM ...
9,628,898 UART:
9,628,953 UART: [state] CFI Enabled
9,630,987 UART: [state] LifecycleState = Unprovisioned
9,631,642 UART: [state] DebugLocked = No
9,632,348 UART: [state] WD Timer not started. Device not locked for debugging
9,633,684 UART: [kat] SHA2-256
10,437,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,441,363 UART: [kat] ++
10,441,515 UART: [kat] sha1
10,445,853 UART: [kat] SHA2-256
10,447,793 UART: [kat] SHA2-384
10,450,434 UART: [kat] SHA2-512-ACC
10,452,334 UART: [kat] ECC-384
10,461,993 UART: [kat] HMAC-384Kdf
10,466,761 UART: [kat] LMS
10,715,073 UART: [kat] --
10,715,983 UART: [update-reset] ++
12,029,208 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,030,175 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
12,180,173 >>> mbox cmd response: success
12,180,356 UART: [update-reset] Copying MAN_2 To MAN_1
12,188,370 UART: [update-reset Success] --
12,189,357 UART: [state] Locking Datavault
12,190,229 UART: [state] Locking PCR0, PCR1 and PCR31
12,190,833 UART: [state] Locking ICCM
12,191,319 UART: [exit] Launching FMC @ 0x40000130
12,196,648 UART:
12,196,664 UART: Running Caliptra FMC ...
12,197,072 UART:
12,197,126 UART: [state] CFI Enabled
12,285,821 UART: [art] Extend RT PCRs Done
12,286,249 UART: [art] Lock RT PCRs Done
12,287,426 UART: [art] Populate DV Done
12,295,906 UART: [fht] FMC Alias Private Key: 7
12,296,990 UART: [art] Derive CDI
12,297,270 UART: [art] Store in in slot 0x4
12,383,055 UART: [art] Derive Key Pair
12,383,415 UART: [art] Store priv key in slot 0x5
12,397,033 UART: [art] Derive Key Pair - Done
12,411,485 UART: [art] Signing Cert with AUTHO
12,411,965 UART: RITY.KEYID = 7
12,427,571 UART: [art] Erasing AUTHORITY.KEYID = 7
12,428,336 UART: [art] PUB.X = 04230FC203CBFD0413178F6EA249F5CFEC6153250EF9787452BDEF13E59B781C3E863D9877A17400BEBF21FEFF321D28
12,435,077 UART: [art] PUB.Y = 489FEB215EF83F54C84484B9CAD2A8BC1E64752C6A5F1AD8997CC149E03615F0024F62E41DED184869972CA531844BF2
12,442,028 UART: [art] SIG.R = F8A251B957781B29D3F5859DFE8BAEF08C613085151F6F172DCA71A2072AE00BC612273A636DC6B689CB37BC7D2A4C48
12,448,800 UART: [art] SIG.S = 46500A42DC7BB61DA82B3B1FF142F357973291364782F27FABC175FA4EF1DC8D7E287140FD81C60A72A9DBD314CDDFB3
12,472,477 UART: Caliptra RT
12,472,730 UART: [state] CFI Enabled
12,754,227 UART: [rt] RT listening for mailbox commands...
12,754,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,784,312 UART: [rt]cmd =0x494e464f, len=4
12,787,765 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,748 ready_for_fw is high
1,055,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,237 >>> mbox cmd response: success
2,624,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,685,978 UART:
2,685,994 UART: Running Caliptra FMC ...
2,686,402 UART:
2,686,456 UART: [state] CFI Enabled
2,696,838 UART: [fht] FMC Alias Private Key: 7
2,805,105 UART: [art] Extend RT PCRs Done
2,805,533 UART: [art] Lock RT PCRs Done
2,807,223 UART: [art] Populate DV Done
2,815,425 UART: [fht] FMC Alias Private Key: 7
2,816,435 UART: [art] Derive CDI
2,816,715 UART: [art] Store in in slot 0x4
2,901,874 UART: [art] Derive Key Pair
2,902,234 UART: [art] Store priv key in slot 0x5
2,915,782 UART: [art] Derive Key Pair - Done
2,930,602 UART: [art] Signing Cert with AUTHO
2,931,082 UART: RITY.KEYID = 7
2,945,890 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,655 UART: [art] PUB.X = 73C5521D70B8057D6883D8E7DA7DD12740642420194CD8A3B15F47E0382F6B8E2D50A2A354164B262CDA62EFCBFBD8B8
2,953,428 UART: [art] PUB.Y = 093259156B3E32152543BA4CBD2C46688D02B7398905708061C7C3F2984DEFA0AE3A265F7535BFBD1973648041F87BF4
2,960,363 UART: [art] SIG.R = 107D7D5557A982D63A30AC8966F15FF31F17DFD8884DC89D2F89A53DA52DFA6C5FFFA82449FE56506D42B3F47F334707
2,967,138 UART: [art] SIG.S = AB29089169AEE5656D2D0F6DB3B39916321F8F97BFA6409DED731E0A4773DA1CF94406ED5866A5DC28C6234E04935910
2,990,578 UART: Caliptra RT
2,990,831 UART: [state] CFI Enabled
3,099,148 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,576 UART: [rt]cmd =0x494e464f, len=4
3,133,011 >>> mbox cmd response data (264 bytes)
3,133,012 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,567,357 >>> mbox cmd response: success
5,581,003 UART:
5,581,019 UART: Running Caliptra FMC ...
5,581,427 UART:
5,581,481 UART: [state] CFI Enabled
5,670,108 UART: [art] Extend RT PCRs Done
5,670,536 UART: [art] Lock RT PCRs Done
5,671,881 UART: [art] Populate DV Done
5,680,065 UART: [fht] FMC Alias Private Key: 7
5,681,071 UART: [art] Derive CDI
5,681,351 UART: [art] Store in in slot 0x4
5,767,196 UART: [art] Derive Key Pair
5,767,556 UART: [art] Store priv key in slot 0x5
5,780,552 UART: [art] Derive Key Pair - Done
5,795,080 UART: [art] Signing Cert with AUTHO
5,795,560 UART: RITY.KEYID = 7
5,810,570 UART: [art] Erasing AUTHORITY.KEYID = 7
5,811,335 UART: [art] PUB.X = FD4DB846741BD263A6C7B424C8E139D4FA07AD751A1EBB6658EE29BAF5D9245C87A5511844119904BE07EB6AFB3D8A05
5,818,105 UART: [art] PUB.Y = D9113D62AC051ACD4EFA348CCAD4BCF6A5520C76D3A461399507DDF5B559C17A0A830A086771D90DF758564BF93E1160
5,825,042 UART: [art] SIG.R = B7BD0F994D12C56E89F75A0069063B6388C93993D2B20960AE0E55DCF3C96BD255AEE0AC56BCDF715DE88AD48F0436CA
5,831,789 UART: [art] SIG.S = 0A041EC2B4B76221B5CE418C3838F8ED6BA1C23DE7ABCA5A693EB75975FF88FE53383535191A5BCB5E803DEC63F0E846
5,855,570 UART: Caliptra RT
5,855,823 UART: [state] CFI Enabled
6,139,962 UART: [rt] RT listening for mailbox commands...
6,140,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,170,343 UART: [rt]cmd =0x494e464f, len=4
6,173,602 >>> mbox cmd response data (264 bytes)
6,173,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,607,360 >>> mbox cmd response: success
8,620,536 UART:
8,620,552 UART: Running Caliptra FMC ...
8,620,960 UART:
8,621,014 UART: [state] CFI Enabled
8,710,247 UART: [art] Extend RT PCRs Done
8,710,675 UART: [art] Lock RT PCRs Done
8,711,996 UART: [art] Populate DV Done
8,720,498 UART: [fht] FMC Alias Private Key: 7
8,721,614 UART: [art] Derive CDI
8,721,894 UART: [art] Store in in slot 0x4
8,807,579 UART: [art] Derive Key Pair
8,807,939 UART: [art] Store priv key in slot 0x5
8,820,901 UART: [art] Derive Key Pair - Done
8,835,438 UART: [art] Signing Cert with AUTHO
8,835,918 UART: RITY.KEYID = 7
8,851,160 UART: [art] Erasing AUTHORITY.KEYID = 7
8,851,925 UART: [art] PUB.X = 3B56196A937B7620057A41F00E9C5C7855A805A8F2E0159D659BD5098873D3FBA96AF2AB6174832389CFCE608EEBD1E7
8,858,685 UART: [art] PUB.Y = D8A092EC132E080CC443AB00ABBAADD1AA6F5CDDF8295A2591E04894A37D8B94734D274E8441D15016A07F34A9369DC3
8,865,617 UART: [art] SIG.R = 9A48505C974C8C17B6250AC5F7419283D124E17E2645E92747CB00695C9D6204C2B954C036E083537F3AFCDA36AB76C1
8,872,355 UART: [art] SIG.S = E1F000846F80253A84C4E37F1453625F33B262DAA7997C9E0F39A02A90C448E4CA612D8632748D4F1D57655DB156305F
8,896,439 UART: Caliptra RT
8,896,692 UART: [state] CFI Enabled
9,174,663 UART: [rt] RT listening for mailbox commands...
9,175,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,204,486 UART: [rt]cmd =0x494e464f, len=4
9,207,691 >>> mbox cmd response data (264 bytes)
9,207,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,642,391 >>> mbox cmd response: success
11,655,707 UART:
11,655,723 UART: Running Caliptra FMC ...
11,656,131 UART:
11,656,185 UART: [state] CFI Enabled
11,745,444 UART: [art] Extend RT PCRs Done
11,745,872 UART: [art] Lock RT PCRs Done
11,747,323 UART: [art] Populate DV Done
11,755,883 UART: [fht] FMC Alias Private Key: 7
11,756,935 UART: [art] Derive CDI
11,757,215 UART: [art] Store in in slot 0x4
11,842,988 UART: [art] Derive Key Pair
11,843,348 UART: [art] Store priv key in slot 0x5
11,856,860 UART: [art] Derive Key Pair - Done
11,871,702 UART: [art] Signing Cert with AUTHO
11,872,182 UART: RITY.KEYID = 7
11,886,946 UART: [art] Erasing AUTHORITY.KEYID = 7
11,887,711 UART: [art] PUB.X = FD4DB846741BD263A6C7B424C8E139D4FA07AD751A1EBB6658EE29BAF5D9245C87A5511844119904BE07EB6AFB3D8A05
11,894,481 UART: [art] PUB.Y = D9113D62AC051ACD4EFA348CCAD4BCF6A5520C76D3A461399507DDF5B559C17A0A830A086771D90DF758564BF93E1160
11,901,418 UART: [art] SIG.R = B7BD0F994D12C56E89F75A0069063B6388C93993D2B20960AE0E55DCF3C96BD255AEE0AC56BCDF715DE88AD48F0436CA
11,908,165 UART: [art] SIG.S = 0A041EC2B4B76221B5CE418C3838F8ED6BA1C23DE7ABCA5A693EB75975FF88FE53383535191A5BCB5E803DEC63F0E846
11,932,002 UART: Caliptra RT
11,932,255 UART: [state] CFI Enabled
12,217,430 UART: [rt] RT listening for mailbox commands...
12,218,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,247,389 UART: [rt]cmd =0x494e464f, len=4
12,250,694 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.49s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,629 UART: [ldev] --
1,281,943 UART: [fwproc] Wait for Commands...
1,282,528 UART: [fwproc] Recv command 0x46574c44
1,283,261 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,506 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,434 >>> mbox cmd response: success
2,775,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,776,461 UART: [afmc] ++
2,776,629 UART: [afmc] CDI.KEYID = 6
2,776,992 UART: [afmc] SUBJECT.KEYID = 7
2,777,418 UART: [afmc] AUTHORITY.KEYID = 5
2,813,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,197 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,835,890 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,841,761 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,847,463 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,855,101 UART: [afmc] --
2,856,129 UART: [cold-reset] --
2,856,993 UART: [state] Locking Datavault
2,858,248 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,852 UART: [state] Locking ICCM
2,859,300 UART: [exit] Launching FMC @ 0x40000130
2,864,629 UART:
2,864,645 UART: Running Caliptra FMC ...
2,865,053 UART:
2,865,196 UART: [state] CFI Enabled
2,876,050 UART: [fht] FMC Alias Private Key: 7
2,984,591 UART: [art] Extend RT PCRs Done
2,985,019 UART: [art] Lock RT PCRs Done
2,986,845 UART: [art] Populate DV Done
2,994,875 UART: [fht] FMC Alias Private Key: 7
2,995,935 UART: [art] Derive CDI
2,996,215 UART: [art] Store in in slot 0x4
3,081,642 UART: [art] Derive Key Pair
3,082,002 UART: [art] Store priv key in slot 0x5
3,094,754 UART: [art] Derive Key Pair - Done
3,109,667 UART: [art] Signing Cert with AUTHO
3,110,147 UART: RITY.KEYID = 7
3,125,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,408 UART: [art] PUB.X = 17F351D2B89B05C727BB533AF1DD56A545183ECBA6E80108D025AFC84C5B966B3BC7B2E42DD9149CD29A0E55CD30B15C
3,133,180 UART: [art] PUB.Y = 840BF0A02867CFEA15D07F66C8DC4DA0780B57A7F7ED92793D92B20FAE7BFE56A4B59FBC2E8EC9828B4C5232CFB3597B
3,140,141 UART: [art] SIG.R = 503EF138C0935F314E56AA6A1B21EBE1F0DD6EFC30A73F3AEC3D090BE73F148A5DC42818E4872E7232E534893EF560E4
3,146,915 UART: [art] SIG.S = 32689E57188E7A36857D912178262F28C8AA405F7B00775E2D7D50B757D3920AE900DE6EEE081D0EED7B960764D11183
3,170,466 UART: Caliptra RT
3,170,811 UART: [state] CFI Enabled
3,277,787 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,117 UART: [rt]cmd =0x494e464f, len=4
3,311,530 >>> mbox cmd response data (264 bytes)
3,311,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,388 UART:
3,312,404 UART: Running Caliptra ROM ...
3,312,812 UART:
3,312,954 UART: [state] CFI Enabled
3,315,754 UART: [state] LifecycleState = Unprovisioned
3,316,409 UART: [state] DebugLocked = No
3,316,927 UART: [state] WD Timer not started. Device not locked for debugging
3,318,251 UART: [kat] SHA2-256
4,121,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,125,930 UART: [kat] ++
4,126,082 UART: [kat] sha1
4,130,274 UART: [kat] SHA2-256
4,132,214 UART: [kat] SHA2-384
4,135,003 UART: [kat] SHA2-512-ACC
4,136,903 UART: [kat] ECC-384
4,146,634 UART: [kat] HMAC-384Kdf
4,151,370 UART: [kat] LMS
4,399,682 UART: [kat] --
4,400,476 UART: [update-reset] ++
5,713,621 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,714,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,864,788 >>> mbox cmd response: success
5,865,079 UART: [update-reset] Copying MAN_2 To MAN_1
5,873,093 UART: [update-reset Success] --
5,874,014 UART: [state] Locking Datavault
5,874,696 UART: [state] Locking PCR0, PCR1 and PCR31
5,875,300 UART: [state] Locking ICCM
5,875,774 UART: [exit] Launching FMC @ 0x40000130
5,881,103 UART:
5,881,119 UART: Running Caliptra FMC ...
5,881,527 UART:
5,881,670 UART: [state] CFI Enabled
5,970,941 UART: [art] Extend RT PCRs Done
5,971,369 UART: [art] Lock RT PCRs Done
5,972,496 UART: [art] Populate DV Done
5,980,546 UART: [fht] FMC Alias Private Key: 7
5,981,530 UART: [art] Derive CDI
5,981,810 UART: [art] Store in in slot 0x4
6,067,623 UART: [art] Derive Key Pair
6,067,983 UART: [art] Store priv key in slot 0x5
6,081,605 UART: [art] Derive Key Pair - Done
6,096,574 UART: [art] Signing Cert with AUTHO
6,097,054 UART: RITY.KEYID = 7
6,112,114 UART: [art] Erasing AUTHORITY.KEYID = 7
6,112,879 UART: [art] PUB.X = D4402F5564A6E99B874DF44135008F7BD7AB295FD733F0F13A59A15A7B3AF8F80CB183C337F59EC16DCFEF9366C3D51A
6,119,636 UART: [art] PUB.Y = F3E49C0B54B0F3906F0FF3A4F033AB382E8E2426916B16CE09945E0B2DE67C4643A0BEFB16FA884D7E28C83D4DF18202
6,126,581 UART: [art] SIG.R = 12E81511EF52810941F059BBECAEBD1D62B25748DD9A6762C0DF0CC5AF77BB6530566A770F7B42B5F21C9E6782BBF76E
6,133,354 UART: [art] SIG.S = 5795023B6C254ED1B0F7A28083A97048E1D4759356F48465329F0F5134830A9A70F3085CDC281DD2B96D49D151FE0026
6,157,327 UART: Caliptra RT
6,157,672 UART: [state] CFI Enabled
6,438,570 UART: [rt] RT listening for mailbox commands...
6,439,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,468,795 UART: [rt]cmd =0x494e464f, len=4
6,472,138 >>> mbox cmd response data (264 bytes)
6,472,139 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,472,910 UART:
6,472,926 UART: Running Caliptra ROM ...
6,473,334 UART:
6,473,476 UART: [state] CFI Enabled
6,476,550 UART: [state] LifecycleState = Unprovisioned
6,477,205 UART: [state] DebugLocked = No
6,477,923 UART: [state] WD Timer not started. Device not locked for debugging
6,479,199 UART: [kat] SHA2-256
7,282,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,286,878 UART: [kat] ++
7,287,030 UART: [kat] sha1
7,291,152 UART: [kat] SHA2-256
7,293,092 UART: [kat] SHA2-384
7,295,865 UART: [kat] SHA2-512-ACC
7,297,765 UART: [kat] ECC-384
7,307,574 UART: [kat] HMAC-384Kdf
7,312,414 UART: [kat] LMS
7,560,726 UART: [kat] --
7,561,662 UART: [update-reset] ++
8,875,079 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,876,072 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
9,026,070 >>> mbox cmd response: success
9,026,273 UART: [update-reset] Copying MAN_2 To MAN_1
9,034,287 UART: [update-reset Success] --
9,035,290 UART: [state] Locking Datavault
9,036,194 UART: [state] Locking PCR0, PCR1 and PCR31
9,036,798 UART: [state] Locking ICCM
9,037,470 UART: [exit] Launching FMC @ 0x40000130
9,042,799 UART:
9,042,815 UART: Running Caliptra FMC ...
9,043,223 UART:
9,043,366 UART: [state] CFI Enabled
9,132,115 UART: [art] Extend RT PCRs Done
9,132,543 UART: [art] Lock RT PCRs Done
9,133,784 UART: [art] Populate DV Done
9,142,014 UART: [fht] FMC Alias Private Key: 7
9,143,032 UART: [art] Derive CDI
9,143,312 UART: [art] Store in in slot 0x4
9,229,145 UART: [art] Derive Key Pair
9,229,505 UART: [art] Store priv key in slot 0x5
9,242,717 UART: [art] Derive Key Pair - Done
9,257,849 UART: [art] Signing Cert with AUTHO
9,258,329 UART: RITY.KEYID = 7
9,273,451 UART: [art] Erasing AUTHORITY.KEYID = 7
9,274,216 UART: [art] PUB.X = 204E19D5E1DF3FD08F45C3E12933BDAEFABB2B43D51FDBD902238EEEF3569984D550656DB4175407DA7A55C97A7DC2DA
9,280,998 UART: [art] PUB.Y = A447AD2B14696BDD1975DEEFF5685D1F889C59751C32E8C43D39F65958F157E5F0FD64FC7AF9AEAF6CAD6A6E08EB2205
9,287,960 UART: [art] SIG.R = CEC6914E930FBD89FB5A6D14A5FC9593F497A9E50145D686B1FC2851758CC5EC9FE464FF9EA399C27AD4620D5040B3BF
9,294,735 UART: [art] SIG.S = E9845337CEA195FEFD1ACE5CDAEE492F390784CCE0C331967C055DBE2C487E13A7A31A95490932924192F5CF3E761653
9,318,773 UART: Caliptra RT
9,319,118 UART: [state] CFI Enabled
9,599,051 UART: [rt] RT listening for mailbox commands...
9,599,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,629,224 UART: [rt]cmd =0x494e464f, len=4
9,632,403 >>> mbox cmd response data (264 bytes)
9,632,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,633,187 UART:
9,633,203 UART: Running Caliptra ROM ...
9,633,611 UART:
9,633,753 UART: [state] CFI Enabled
9,636,347 UART: [state] LifecycleState = Unprovisioned
9,637,002 UART: [state] DebugLocked = No
9,637,612 UART: [state] WD Timer not started. Device not locked for debugging
9,638,950 UART: [kat] SHA2-256
10,442,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,446,629 UART: [kat] ++
10,446,781 UART: [kat] sha1
10,451,111 UART: [kat] SHA2-256
10,453,051 UART: [kat] SHA2-384
10,455,684 UART: [kat] SHA2-512-ACC
10,457,584 UART: [kat] ECC-384
10,466,947 UART: [kat] HMAC-384Kdf
10,471,683 UART: [kat] LMS
10,719,995 UART: [kat] --
10,720,865 UART: [update-reset] ++
12,034,514 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,035,541 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
12,185,539 >>> mbox cmd response: success
12,185,850 UART: [update-reset] Copying MAN_2 To MAN_1
12,193,864 UART: [update-reset Success] --
12,194,865 UART: [state] Locking Datavault
12,195,833 UART: [state] Locking PCR0, PCR1 and PCR31
12,196,437 UART: [state] Locking ICCM
12,196,927 UART: [exit] Launching FMC @ 0x40000130
12,202,256 UART:
12,202,272 UART: Running Caliptra FMC ...
12,202,680 UART:
12,202,823 UART: [state] CFI Enabled
12,292,088 UART: [art] Extend RT PCRs Done
12,292,516 UART: [art] Lock RT PCRs Done
12,293,969 UART: [art] Populate DV Done
12,302,143 UART: [fht] FMC Alias Private Key: 7
12,303,117 UART: [art] Derive CDI
12,303,397 UART: [art] Store in in slot 0x4
12,388,790 UART: [art] Derive Key Pair
12,389,150 UART: [art] Store priv key in slot 0x5
12,403,212 UART: [art] Derive Key Pair - Done
12,418,101 UART: [art] Signing Cert with AUTHO
12,418,581 UART: RITY.KEYID = 7
12,433,859 UART: [art] Erasing AUTHORITY.KEYID = 7
12,434,624 UART: [art] PUB.X = D4402F5564A6E99B874DF44135008F7BD7AB295FD733F0F13A59A15A7B3AF8F80CB183C337F59EC16DCFEF9366C3D51A
12,441,381 UART: [art] PUB.Y = F3E49C0B54B0F3906F0FF3A4F033AB382E8E2426916B16CE09945E0B2DE67C4643A0BEFB16FA884D7E28C83D4DF18202
12,448,326 UART: [art] SIG.R = 12E81511EF52810941F059BBECAEBD1D62B25748DD9A6762C0DF0CC5AF77BB6530566A770F7B42B5F21C9E6782BBF76E
12,455,099 UART: [art] SIG.S = 5795023B6C254ED1B0F7A28083A97048E1D4759356F48465329F0F5134830A9A70F3085CDC281DD2B96D49D151FE0026
12,478,668 UART: Caliptra RT
12,479,013 UART: [state] CFI Enabled
12,761,631 UART: [rt] RT listening for mailbox commands...
12,762,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,791,814 UART: [rt]cmd =0x494e464f, len=4
12,795,155 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,131 ready_for_fw is high
1,056,131 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,266 >>> mbox cmd response: success
2,623,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,685,745 UART:
2,685,761 UART: Running Caliptra FMC ...
2,686,169 UART:
2,686,312 UART: [state] CFI Enabled
2,697,088 UART: [fht] FMC Alias Private Key: 7
2,805,453 UART: [art] Extend RT PCRs Done
2,805,881 UART: [art] Lock RT PCRs Done
2,807,315 UART: [art] Populate DV Done
2,815,655 UART: [fht] FMC Alias Private Key: 7
2,816,805 UART: [art] Derive CDI
2,817,085 UART: [art] Store in in slot 0x4
2,902,460 UART: [art] Derive Key Pair
2,902,820 UART: [art] Store priv key in slot 0x5
2,915,726 UART: [art] Derive Key Pair - Done
2,930,423 UART: [art] Signing Cert with AUTHO
2,930,903 UART: RITY.KEYID = 7
2,946,479 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,244 UART: [art] PUB.X = 20763AD249457FAFEFE95CEE36A685EE71779F9C229E8C58FE0B621BAC6C7EE259E88901888237B2E7D892B8D8B7A90A
2,954,015 UART: [art] PUB.Y = CAF007DFB07BD1BB342AA5FD03C903BABB0C41AAC792EBACA13FFB5309F2E8BFB548D6C6447A227273BB5724B9766203
2,960,969 UART: [art] SIG.R = 9F795929196B3081793F265E3948C3652E9D8B8697EBBBEF9636BD1B68683DE87F0535FD76BBAD2B33DFD475DA1E02C6
2,967,739 UART: [art] SIG.S = B1EF8C2F53A15E9F4D06A516F42E4871BC634CF7A25C2608DFA1BBEEC4931BA0E791FFEAF55EEC58535EFABEE827EBE4
2,991,352 UART: Caliptra RT
2,991,697 UART: [state] CFI Enabled
3,100,178 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,450 UART: [rt]cmd =0x494e464f, len=4
3,133,835 >>> mbox cmd response data (264 bytes)
3,133,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,569,214 >>> mbox cmd response: success
5,582,370 UART:
5,582,386 UART: Running Caliptra FMC ...
5,582,794 UART:
5,582,937 UART: [state] CFI Enabled
5,672,014 UART: [art] Extend RT PCRs Done
5,672,442 UART: [art] Lock RT PCRs Done
5,673,805 UART: [art] Populate DV Done
5,682,059 UART: [fht] FMC Alias Private Key: 7
5,683,147 UART: [art] Derive CDI
5,683,427 UART: [art] Store in in slot 0x4
5,769,004 UART: [art] Derive Key Pair
5,769,364 UART: [art] Store priv key in slot 0x5
5,782,922 UART: [art] Derive Key Pair - Done
5,797,835 UART: [art] Signing Cert with AUTHO
5,798,315 UART: RITY.KEYID = 7
5,813,821 UART: [art] Erasing AUTHORITY.KEYID = 7
5,814,586 UART: [art] PUB.X = 325D418FEE45540280A5EF11A4D5FE0EF6C3798DE3C6321E221C94B9B33E0D67C015CDECD9BD0AA7122DA10739D5BEFC
5,821,359 UART: [art] PUB.Y = B86603AC5E10B49F65CFE8076D319F6FC2CEDA4E37CB352E218231EC180572604862A1517B3DB33D6C2FF25ADE864E84
5,828,308 UART: [art] SIG.R = 79CAE5E6774F941492CB77CA6B02F7253882260A2B975CE36F570F8E8916CEAF813F94C30EFEBD8F6BA9A74DF4CA9C4B
5,835,082 UART: [art] SIG.S = 5FCE00BA3AA1E229C829C988F598034C0D1EC74601FC52ADD2683BDE68E6C12D3B5EA2C68B7702054725FBCCA6AEB386
5,859,238 UART: Caliptra RT
5,859,583 UART: [state] CFI Enabled
6,137,761 UART: [rt] RT listening for mailbox commands...
6,138,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,898 UART: [rt]cmd =0x494e464f, len=4
6,171,193 >>> mbox cmd response data (264 bytes)
6,171,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,605,898 >>> mbox cmd response: success
8,619,272 UART:
8,619,288 UART: Running Caliptra FMC ...
8,619,696 UART:
8,619,839 UART: [state] CFI Enabled
8,709,106 UART: [art] Extend RT PCRs Done
8,709,534 UART: [art] Lock RT PCRs Done
8,711,121 UART: [art] Populate DV Done
8,719,493 UART: [fht] FMC Alias Private Key: 7
8,720,495 UART: [art] Derive CDI
8,720,775 UART: [art] Store in in slot 0x4
8,806,548 UART: [art] Derive Key Pair
8,806,908 UART: [art] Store priv key in slot 0x5
8,819,986 UART: [art] Derive Key Pair - Done
8,834,922 UART: [art] Signing Cert with AUTHO
8,835,402 UART: RITY.KEYID = 7
8,850,512 UART: [art] Erasing AUTHORITY.KEYID = 7
8,851,277 UART: [art] PUB.X = 0A87FE479D6F08E472475EE3F9F7DEA1602471DABFE459A0DE8CB5FDC6B7259395799198726E4D5FCE197A8709CAC0A6
8,858,050 UART: [art] PUB.Y = 34D0CD7EF06358A56DAAEFAED3715C140B87C520ACA8576BC6CFBDC9AAB03F9091EAC61DCE39199343BA7A4B6C498869
8,865,019 UART: [art] SIG.R = 8F773631D123571463B9771BE43619D901FEE197A866F66E467FB483C32615B28BB5E8A075A6D861A850A9FC1DB884F1
8,871,782 UART: [art] SIG.S = 9BBCFA4BE5DED4F4B6C831061CDD12D619E475F2278A2939B5E6BEB36C25DD4AE67AF1557C4FB57C9126339C6C29CFA8
8,895,182 UART: Caliptra RT
8,895,527 UART: [state] CFI Enabled
9,179,344 UART: [rt] RT listening for mailbox commands...
9,180,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,209,583 UART: [rt]cmd =0x494e464f, len=4
9,212,936 >>> mbox cmd response data (264 bytes)
9,212,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,647,861 >>> mbox cmd response: success
11,661,295 UART:
11,661,311 UART: Running Caliptra FMC ...
11,661,719 UART:
11,661,862 UART: [state] CFI Enabled
11,751,315 UART: [art] Extend RT PCRs Done
11,751,743 UART: [art] Lock RT PCRs Done
11,752,844 UART: [art] Populate DV Done
11,761,188 UART: [fht] FMC Alias Private Key: 7
11,762,330 UART: [art] Derive CDI
11,762,610 UART: [art] Store in in slot 0x4
11,848,641 UART: [art] Derive Key Pair
11,849,001 UART: [art] Store priv key in slot 0x5
11,862,073 UART: [art] Derive Key Pair - Done
11,877,076 UART: [art] Signing Cert with AUTHO
11,877,556 UART: RITY.KEYID = 7
11,892,520 UART: [art] Erasing AUTHORITY.KEYID = 7
11,893,285 UART: [art] PUB.X = 325D418FEE45540280A5EF11A4D5FE0EF6C3798DE3C6321E221C94B9B33E0D67C015CDECD9BD0AA7122DA10739D5BEFC
11,900,058 UART: [art] PUB.Y = B86603AC5E10B49F65CFE8076D319F6FC2CEDA4E37CB352E218231EC180572604862A1517B3DB33D6C2FF25ADE864E84
11,907,007 UART: [art] SIG.R = 79CAE5E6774F941492CB77CA6B02F7253882260A2B975CE36F570F8E8916CEAF813F94C30EFEBD8F6BA9A74DF4CA9C4B
11,913,781 UART: [art] SIG.S = 5FCE00BA3AA1E229C829C988F598034C0D1EC74601FC52ADD2683BDE68E6C12D3B5EA2C68B7702054725FBCCA6AEB386
11,937,649 UART: Caliptra RT
11,937,994 UART: [state] CFI Enabled
12,220,868 UART: [rt] RT listening for mailbox commands...
12,221,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,250,941 UART: [rt]cmd =0x494e464f, len=4
12,254,236 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,120 UART:
192,490 UART: Running Caliptra ROM ...
193,687 UART:
193,846 UART: [state] CFI Enabled
262,043 UART: [state] LifecycleState = Unprovisioned
263,965 UART: [state] DebugLocked = No
265,288 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,231 UART: [kat] SHA2-256
440,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,460 UART: [kat] ++
450,911 UART: [kat] sha1
461,575 UART: [kat] SHA2-256
464,300 UART: [kat] SHA2-384
469,581 UART: [kat] SHA2-512-ACC
471,946 UART: [kat] ECC-384
2,767,342 UART: [kat] HMAC-384Kdf
2,777,876 UART: [kat] LMS
3,968,207 UART: [kat] --
3,970,521 UART: [cold-reset] ++
3,972,741 UART: [fht] Storing FHT @ 0x50003400
3,984,932 UART: [idev] ++
3,985,527 UART: [idev] CDI.KEYID = 6
3,986,443 UART: [idev] SUBJECT.KEYID = 7
3,987,689 UART: [idev] UDS.KEYID = 0
3,988,737 ready_for_fw is high
3,988,944 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,486 UART: [idev] Erasing UDS.KEYID = 0
7,326,114 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,472 UART: [idev] --
7,350,198 UART: [ldev] ++
7,350,765 UART: [ldev] CDI.KEYID = 6
7,351,735 UART: [ldev] SUBJECT.KEYID = 5
7,352,948 UART: [ldev] AUTHORITY.KEYID = 7
7,354,236 UART: [ldev] FE.KEYID = 1
7,400,268 UART: [ldev] Erasing FE.KEYID = 1
10,733,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,597 UART: [ldev] --
13,092,949 UART: [fwproc] Waiting for Commands...
13,095,584 UART: [fwproc] Received command 0x46574c44
13,097,768 UART: [fwproc] Received Image of size 114124 bytes
17,148,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,177 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,094 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,612,146 >>> mbox cmd response: success
17,612,673 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,615,973 UART: [afmc] ++
17,616,591 UART: [afmc] CDI.KEYID = 6
17,617,508 UART: [afmc] SUBJECT.KEYID = 7
17,618,734 UART: [afmc] AUTHORITY.KEYID = 5
20,984,330 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,973 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,234 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,692 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,491 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,936 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,980 UART: [afmc] --
23,355,142 UART: [cold-reset] --
23,358,191 UART: [state] Locking Datavault
23,364,359 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,111 UART: [state] Locking ICCM
23,368,753 UART: [exit] Launching FMC @ 0x40000130
23,377,164 UART:
23,377,447 UART: Running Caliptra FMC ...
23,378,563 UART:
23,378,731 UART: [state] CFI Enabled
23,443,563 UART: [fht] FMC Alias Private Key: 7
25,781,571 UART: [art] Extend RT PCRs Done
25,782,791 UART: [art] Lock RT PCRs Done
25,784,467 UART: [art] Populate DV Done
25,789,774 UART: [fht] FMC Alias Private Key: 7
25,791,478 UART: [art] Derive CDI
25,792,299 UART: [art] Store in in slot 0x4
25,851,966 UART: [art] Derive Key Pair
25,852,964 UART: [art] Store priv key in slot 0x5
29,145,876 UART: [art] Derive Key Pair - Done
29,158,818 UART: [art] Signing Cert with AUTHO
29,160,120 UART: RITY.KEYID = 7
31,447,617 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,122 UART: [art] PUB.X = D3BA90B088F128023923A12F9E0A587707F0751DFD659AF268F97A027095FD4C40EA7353C6377DEEAD9F4AC7E522ABCE
31,456,391 UART: [art] PUB.Y = B3EE74948771D7CA2AF98D17A55C8FF07A6AB2152804A64A8165AA80759C67374FD7E9618E02D9E7548EC60ED5080231
31,463,626 UART: [art] SIG.R = 69847CBFF8C130EE251D83C7BF318F664F93C49690660E8773D94A18B2EF7DE8A83F13D59F86DDA941D6D4A9CA872ABA
31,471,040 UART: [art] SIG.S = 65499384303BEFC634DC1C30DEF4B5B9078B90A02B8948F3B876A7AE8C5353AADBA81F8656118BFCD5C0176E88773D73
32,775,913 UART: Caliptra RT
32,776,611 UART: [state] CFI Enabled
32,938,579 UART: [rt] RT listening for mailbox commands...
32,969,663 UART: [rt]cmd =0x49444549, len=4
32,972,594 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,783,737 ready_for_fw is high
3,784,128 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,824,059 >>> mbox cmd response: success
17,824,672 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,528,125 UART:
23,528,507 UART: Running Caliptra FMC ...
23,529,709 UART:
23,529,873 UART: [state] CFI Enabled
23,597,128 UART: [fht] FMC Alias Private Key: 7
25,934,646 UART: [art] Extend RT PCRs Done
25,935,881 UART: [art] Lock RT PCRs Done
25,937,572 UART: [art] Populate DV Done
25,942,889 UART: [fht] FMC Alias Private Key: 7
25,944,325 UART: [art] Derive CDI
25,945,117 UART: [art] Store in in slot 0x4
26,005,821 UART: [art] Derive Key Pair
26,006,872 UART: [art] Store priv key in slot 0x5
29,299,744 UART: [art] Derive Key Pair - Done
29,312,631 UART: [art] Signing Cert with AUTHO
29,313,931 UART: RITY.KEYID = 7
31,602,776 UART: [art] Erasing AUTHORITY.KEYID = 7
31,604,289 UART: [art] PUB.X = 1E6F332F6108734577719A5EB39337982A37BF1E3F37439ABDF29372CF35DB782CCCBDE10EB4F7809B550CD1C1944BD6
31,611,505 UART: [art] PUB.Y = 013C6B420A0C656B5530BBCF665756D9687D0AB037383B3260F5DF7431C115477F2C44C2D48A554F9A2D1F3FD2B78F66
31,618,759 UART: [art] SIG.R = 1AD7FC0F9ED20099A2BDB160556966EF304983DE44C22153812E4495781FF11183320DC36C0D0FB2AFA8480E898839B6
31,626,129 UART: [art] SIG.S = 8DC5331C9B05D537B2075986E9043CEEF90356D5476DB65018D49015BE59EA3C06B06444AF98F47A9AD7A6D0B4507C0C
32,931,456 UART: Caliptra RT
32,932,168 UART: [state] CFI Enabled
33,095,175 UART: [rt] RT listening for mailbox commands...
33,126,381 UART: [rt]cmd =0x49444549, len=4
33,129,155 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,328 UART:
192,696 UART: Running Caliptra ROM ...
193,791 UART:
603,363 UART: [state] CFI Enabled
616,272 UART: [state] LifecycleState = Unprovisioned
618,251 UART: [state] DebugLocked = No
619,845 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,348 UART: [kat] SHA2-256
795,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,685 UART: [kat] ++
806,126 UART: [kat] sha1
816,566 UART: [kat] SHA2-256
819,300 UART: [kat] SHA2-384
825,854 UART: [kat] SHA2-512-ACC
828,224 UART: [kat] ECC-384
3,112,259 UART: [kat] HMAC-384Kdf
3,122,575 UART: [kat] LMS
4,312,653 UART: [kat] --
4,316,030 UART: [cold-reset] ++
4,318,595 UART: [fht] Storing FHT @ 0x50003400
4,328,793 UART: [idev] ++
4,329,360 UART: [idev] CDI.KEYID = 6
4,330,307 UART: [idev] SUBJECT.KEYID = 7
4,331,545 UART: [idev] UDS.KEYID = 0
4,332,496 ready_for_fw is high
4,332,693 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,052 UART: [idev] Erasing UDS.KEYID = 0
7,620,474 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,042 UART: [idev] --
7,646,637 UART: [ldev] ++
7,647,244 UART: [ldev] CDI.KEYID = 6
7,648,128 UART: [ldev] SUBJECT.KEYID = 5
7,649,389 UART: [ldev] AUTHORITY.KEYID = 7
7,650,614 UART: [ldev] FE.KEYID = 1
7,662,009 UART: [ldev] Erasing FE.KEYID = 1
10,949,087 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,410 UART: [ldev] --
13,310,883 UART: [fwproc] Waiting for Commands...
13,313,238 UART: [fwproc] Received command 0x46574c44
13,315,409 UART: [fwproc] Received Image of size 114124 bytes
17,372,175 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,481 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,556 >>> mbox cmd response: success
17,832,059 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,836,146 UART: [afmc] ++
17,836,783 UART: [afmc] CDI.KEYID = 6
17,837,687 UART: [afmc] SUBJECT.KEYID = 7
17,838,900 UART: [afmc] AUTHORITY.KEYID = 5
21,151,221 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,738 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,995 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,379 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,172 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,690 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,068 UART: [afmc] --
23,518,122 UART: [cold-reset] --
23,524,034 UART: [state] Locking Datavault
23,530,143 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,842 UART: [state] Locking ICCM
23,533,879 UART: [exit] Launching FMC @ 0x40000130
23,542,217 UART:
23,542,445 UART: Running Caliptra FMC ...
23,543,539 UART:
23,543,692 UART: [state] CFI Enabled
23,552,056 UART: [fht] FMC Alias Private Key: 7
25,883,013 UART: [art] Extend RT PCRs Done
25,884,240 UART: [art] Lock RT PCRs Done
25,885,975 UART: [art] Populate DV Done
25,891,159 UART: [fht] FMC Alias Private Key: 7
25,892,702 UART: [art] Derive CDI
25,893,431 UART: [art] Store in in slot 0x4
25,936,250 UART: [art] Derive Key Pair
25,937,252 UART: [art] Store priv key in slot 0x5
29,179,029 UART: [art] Derive Key Pair - Done
29,192,083 UART: [art] Signing Cert with AUTHO
29,193,382 UART: RITY.KEYID = 7
31,472,454 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,958 UART: [art] PUB.X = 47D545567D9D8F2C19DB78EC9CA979A28669C81AEE873DDE1EF8971FE21B5D932EE4AB2514F083037DF15F2C06F59769
31,481,200 UART: [art] PUB.Y = 15989A3E315219FA872B258E7DD046B9628514ECCAC83DF008024BCFFB9081665480F4FE5E67C925D478781430898BB0
31,488,401 UART: [art] SIG.R = 257BC41110520800E17A79B6A49C48C6CBF1BC864059F332D431A3D8B044A6C734C80CEF07AAC76E0E7CE673D54DC19F
31,495,796 UART: [art] SIG.S = 8E5FC8B8513F6DEC295ECBC0BF127688C01F529F595DAE0D578D7CF36D8C69E9A1BADC2523D42B932E5460287B109460
32,801,158 UART: Caliptra RT
32,801,870 UART: [state] CFI Enabled
32,919,768 UART: [rt] RT listening for mailbox commands...
32,951,161 UART: [rt]cmd =0x49444549, len=4
32,953,953 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,128,488 ready_for_fw is high
4,129,121 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,202 >>> mbox cmd response: success
18,066,802 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,702,793 UART:
23,703,163 UART: Running Caliptra FMC ...
23,704,351 UART:
23,704,514 UART: [state] CFI Enabled
23,712,407 UART: [fht] FMC Alias Private Key: 7
26,043,204 UART: [art] Extend RT PCRs Done
26,044,426 UART: [art] Lock RT PCRs Done
26,046,105 UART: [art] Populate DV Done
26,051,573 UART: [fht] FMC Alias Private Key: 7
26,053,115 UART: [art] Derive CDI
26,053,928 UART: [art] Store in in slot 0x4
26,096,252 UART: [art] Derive Key Pair
26,097,289 UART: [art] Store priv key in slot 0x5
29,338,957 UART: [art] Derive Key Pair - Done
29,351,890 UART: [art] Signing Cert with AUTHO
29,353,228 UART: RITY.KEYID = 7
31,632,910 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,413 UART: [art] PUB.X = D28FB9780E7DAA500EE12C8A66BDE696DDCC83594BD8832D009BB2F6F61E80AABC608E3AC4874D561964F7FC07666ABF
31,641,714 UART: [art] PUB.Y = 63275233A935DD2A8A76B502C4395ADF982B28FDE2A0B8BC9D4910BA679D6FB9DF88BEFB16E0F7E191BAA1C073FE51C5
31,648,994 UART: [art] SIG.R = 5ED0871FD90AE4DEBB6FD258702E4A2EFA89A7AB7C23C37E96D9F97276F0A0EFF46FDD189364F1914A6CB0217ABC1790
31,656,373 UART: [art] SIG.S = BBD55136BF4AA6A13DF0946979E7CC1B2E8C845BACA9232CCD4B0F36710AF4BC14515701D9FE68C9840071538C8D7F78
32,961,089 UART: Caliptra RT
32,961,803 UART: [state] CFI Enabled
33,080,808 UART: [rt] RT listening for mailbox commands...
33,112,422 UART: [rt]cmd =0x49444549, len=4
33,115,321 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
191,982 UART:
192,346 UART: Running Caliptra ROM ...
193,500 UART:
193,653 UART: [state] CFI Enabled
263,232 UART: [state] LifecycleState = Unprovisioned
265,102 UART: [state] DebugLocked = No
267,004 UART: [state] WD Timer not started. Device not locked for debugging
271,133 UART: [kat] SHA2-256
450,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,880 UART: [kat] ++
462,415 UART: [kat] sha1
473,015 UART: [kat] SHA2-256
476,030 UART: [kat] SHA2-384
480,673 UART: [kat] SHA2-512-ACC
483,605 UART: [kat] ECC-384
2,950,421 UART: [kat] HMAC-384Kdf
2,972,612 UART: [kat] LMS
3,502,070 UART: [kat] --
3,505,283 UART: [cold-reset] ++
3,507,497 UART: [fht] FHT @ 0x50003400
3,517,411 UART: [idev] ++
3,517,972 UART: [idev] CDI.KEYID = 6
3,518,905 UART: [idev] SUBJECT.KEYID = 7
3,520,080 UART: [idev] UDS.KEYID = 0
3,521,010 ready_for_fw is high
3,521,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,143 UART: [idev] Erasing UDS.KEYID = 0
6,028,743 UART: [idev] Sha1 KeyId Algorithm
6,052,502 UART: [idev] --
6,055,802 UART: [ldev] ++
6,056,373 UART: [ldev] CDI.KEYID = 6
6,057,290 UART: [ldev] SUBJECT.KEYID = 5
6,058,507 UART: [ldev] AUTHORITY.KEYID = 7
6,059,743 UART: [ldev] FE.KEYID = 1
6,102,741 UART: [ldev] Erasing FE.KEYID = 1
8,603,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,737 UART: [ldev] --
10,415,896 UART: [fwproc] Wait for Commands...
10,417,666 UART: [fwproc] Recv command 0x46574c44
10,419,757 UART: [fwproc] Recv'd Img size: 114448 bytes
13,814,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,273,622 >>> mbox cmd response: success
14,274,132 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,278,592 UART: [afmc] ++
14,279,178 UART: [afmc] CDI.KEYID = 6
14,280,068 UART: [afmc] SUBJECT.KEYID = 7
14,281,288 UART: [afmc] AUTHORITY.KEYID = 5
16,809,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,644 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,496 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,576 UART: [afmc] --
18,610,725 UART: [cold-reset] --
18,614,643 UART: [state] Locking Datavault
18,619,508 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,147 UART: [state] Locking ICCM
18,622,491 UART: [exit] Launching FMC @ 0x40000130
18,630,946 UART:
18,631,190 UART: Running Caliptra FMC ...
18,632,291 UART:
18,632,452 UART: [state] CFI Enabled
18,694,574 UART: [fht] FMC Alias Private Key: 7
20,458,517 UART: [art] Extend RT PCRs Done
20,459,743 UART: [art] Lock RT PCRs Done
20,461,201 UART: [art] Populate DV Done
20,466,614 UART: [fht] FMC Alias Private Key: 7
20,468,258 UART: [art] Derive CDI
20,469,070 UART: [art] Store in in slot 0x4
20,527,548 UART: [art] Derive Key Pair
20,528,586 UART: [art] Store priv key in slot 0x5
22,991,858 UART: [art] Derive Key Pair - Done
23,004,755 UART: [art] Signing Cert with AUTHO
23,006,064 UART: RITY.KEYID = 7
24,718,844 UART: [art] Erasing AUTHORITY.KEYID = 7
24,720,328 UART: [art] PUB.X = FD36D20762E7BDD86DB6649CA14868F8ED688A5C72C4CFF90CF962BA8627A7023AC3AC074D3590BA17C04A3443F955A0
24,727,627 UART: [art] PUB.Y = DC78CCE68F880A51FEFFF57B53F031D28B9C8AFB2AE820E9677B65E0D1F9AA68721B03009C32D763C57E26E5B85C6DC3
24,734,926 UART: [art] SIG.R = 64DB1AFF54A3BB8817D87907B235968EBD108DAB029CCC5D378046C64E30AB08B31267FAD90D9984AEB5FF8513A5CBED
24,742,318 UART: [art] SIG.S = 81FB07D06968CB44BD6CDB46234063FE455353A77AC0A2A7C397BD18ECBF8BC8294F40178AB0B70527722D3F78BD6585
25,720,948 UART: Caliptra RT
25,721,659 UART: [state] CFI Enabled
25,887,625 UART: [rt] RT listening for mailbox commands...
25,918,991 UART: [rt]cmd =0x49444549, len=4
25,921,756 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,383,230 ready_for_fw is high
3,383,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,072,847 >>> mbox cmd response: success
14,073,420 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,365,078 UART:
18,365,464 UART: Running Caliptra FMC ...
18,366,668 UART:
18,366,857 UART: [state] CFI Enabled
18,432,063 UART: [fht] FMC Alias Private Key: 7
20,196,479 UART: [art] Extend RT PCRs Done
20,197,697 UART: [art] Lock RT PCRs Done
20,199,270 UART: [art] Populate DV Done
20,204,515 UART: [fht] FMC Alias Private Key: 7
20,206,225 UART: [art] Derive CDI
20,207,042 UART: [art] Store in in slot 0x4
20,265,206 UART: [art] Derive Key Pair
20,266,249 UART: [art] Store priv key in slot 0x5
22,729,284 UART: [art] Derive Key Pair - Done
22,742,172 UART: [art] Signing Cert with AUTHO
22,743,482 UART: RITY.KEYID = 7
24,454,783 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,281 UART: [art] PUB.X = D02A207978DA3949F949CE253E6EDB69A46332CAC04834B06A649C823D07AA76DA02897BBB23057C2087C306B6655B3E
24,463,526 UART: [art] PUB.Y = F6B91A2743758C0D86D8A4DC9C140088B2348A5105F5354160AA08EA2FAFFBBDCFC86AC007A5F37AD4A0CC91E64F92AD
24,470,829 UART: [art] SIG.R = 90513B6CF3382E8C4C18491406438BCED7387EDDB51D2A4C0CE10B9A09B80B0D21868EB070D3CF27F5424D30FEB1F303
24,478,230 UART: [art] SIG.S = E15F13CC7D23AAF2A100860D7E29A44AD6428EC02BAEFCECCB95FC9118312A43512B985F7CBF502421BF4F4AEE186F91
25,457,491 UART: Caliptra RT
25,458,191 UART: [state] CFI Enabled
25,621,930 UART: [rt] RT listening for mailbox commands...
25,653,287 UART: [rt]cmd =0x49444549, len=4
25,656,102 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,505 UART:
192,882 UART: Running Caliptra ROM ...
194,097 UART:
603,749 UART: [state] CFI Enabled
617,620 UART: [state] LifecycleState = Unprovisioned
619,500 UART: [state] DebugLocked = No
621,298 UART: [state] WD Timer not started. Device not locked for debugging
625,538 UART: [kat] SHA2-256
804,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,191 UART: [kat] ++
816,632 UART: [kat] sha1
828,488 UART: [kat] SHA2-256
831,478 UART: [kat] SHA2-384
837,245 UART: [kat] SHA2-512-ACC
840,242 UART: [kat] ECC-384
3,283,595 UART: [kat] HMAC-384Kdf
3,295,008 UART: [kat] LMS
3,824,498 UART: [kat] --
3,827,446 UART: [cold-reset] ++
3,828,664 UART: [fht] FHT @ 0x50003400
3,838,568 UART: [idev] ++
3,839,171 UART: [idev] CDI.KEYID = 6
3,840,090 UART: [idev] SUBJECT.KEYID = 7
3,841,261 UART: [idev] UDS.KEYID = 0
3,842,177 ready_for_fw is high
3,842,384 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,108 UART: [idev] Erasing UDS.KEYID = 0
6,316,093 UART: [idev] Sha1 KeyId Algorithm
6,337,977 UART: [idev] --
6,342,233 UART: [ldev] ++
6,342,789 UART: [ldev] CDI.KEYID = 6
6,343,745 UART: [ldev] SUBJECT.KEYID = 5
6,344,893 UART: [ldev] AUTHORITY.KEYID = 7
6,346,173 UART: [ldev] FE.KEYID = 1
6,356,502 UART: [ldev] Erasing FE.KEYID = 1
8,825,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,415 UART: [ldev] --
10,616,350 UART: [fwproc] Wait for Commands...
10,619,303 UART: [fwproc] Recv command 0x46574c44
10,621,384 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,379 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,484,303 >>> mbox cmd response: success
14,484,802 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,489,200 UART: [afmc] ++
14,489,794 UART: [afmc] CDI.KEYID = 6
14,490,677 UART: [afmc] SUBJECT.KEYID = 7
14,491,886 UART: [afmc] AUTHORITY.KEYID = 5
16,986,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,905 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,684 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,723 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,645 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,780,432 UART: [afmc] --
18,784,719 UART: [cold-reset] --
18,787,762 UART: [state] Locking Datavault
18,791,600 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,243 UART: [state] Locking ICCM
18,795,294 UART: [exit] Launching FMC @ 0x40000130
18,803,730 UART:
18,803,989 UART: Running Caliptra FMC ...
18,805,090 UART:
18,805,244 UART: [state] CFI Enabled
18,813,063 UART: [fht] FMC Alias Private Key: 7
20,569,596 UART: [art] Extend RT PCRs Done
20,570,828 UART: [art] Lock RT PCRs Done
20,572,529 UART: [art] Populate DV Done
20,578,041 UART: [fht] FMC Alias Private Key: 7
20,579,783 UART: [art] Derive CDI
20,580,508 UART: [art] Store in in slot 0x4
20,623,523 UART: [art] Derive Key Pair
20,624,512 UART: [art] Store priv key in slot 0x5
23,051,124 UART: [art] Derive Key Pair - Done
23,064,228 UART: [art] Signing Cert with AUTHO
23,065,528 UART: RITY.KEYID = 7
24,771,124 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,641 UART: [art] PUB.X = B4EFECAF02AC76E4B8BE2B04B26D6F2302984035FAF98AB6D6DDD2DA81F4094C3299B7EB2B740CF7843617DF907654C9
24,779,935 UART: [art] PUB.Y = 436D401568FBAFB10D2C17C05E2F8DF8AA9F50EF507D4F5CE6C4B228E2FDD4F365D214F148842CBCDD9BCFCC7879FFC2
24,787,264 UART: [art] SIG.R = 306131192E24EC33B8689D42DF03D46E54320149D6D8CB520C75D7AFF729742A08CFBCF398A3A9DA391A8E7D9ABD81BA
24,794,644 UART: [art] SIG.S = A76FF303785C319C0E555AF6BA6993BB1A332ECA2A94D30591BF7AA88AD80FBD43FE4E89D4475FEC94E4A5EA86D73618
25,773,520 UART: Caliptra RT
25,774,222 UART: [state] CFI Enabled
25,892,196 UART: [rt] RT listening for mailbox commands...
25,923,536 UART: [rt]cmd =0x49444549, len=4
25,926,490 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,698,015 ready_for_fw is high
3,698,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,674 >>> mbox cmd response: success
14,281,234 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,532,073 UART:
18,532,453 UART: Running Caliptra FMC ...
18,533,585 UART:
18,533,733 UART: [state] CFI Enabled
18,541,601 UART: [fht] FMC Alias Private Key: 7
20,298,549 UART: [art] Extend RT PCRs Done
20,299,760 UART: [art] Lock RT PCRs Done
20,301,270 UART: [art] Populate DV Done
20,306,686 UART: [fht] FMC Alias Private Key: 7
20,308,227 UART: [art] Derive CDI
20,309,034 UART: [art] Store in in slot 0x4
20,351,137 UART: [art] Derive Key Pair
20,352,171 UART: [art] Store priv key in slot 0x5
22,779,338 UART: [art] Derive Key Pair - Done
22,791,960 UART: [art] Signing Cert with AUTHO
22,793,258 UART: RITY.KEYID = 7
24,498,473 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,954 UART: [art] PUB.X = 0538EC0089E84EA397FA0CD3079DDD75ADA6D3D8BFEAB92C101F88CD3D9C342D04BA8142B91339F799588FFC4F5C6C40
24,507,245 UART: [art] PUB.Y = 6B7EBEC30BA2F23FCB42B49EC85582A28BC3409C4D4B27D419795564C4D73748474FBAE5EFA10F79157070039403E731
24,514,498 UART: [art] SIG.R = 4FC46379A6AA8EF8ED010CF7D223EF454C5F0741FE9646C9EE278BD579530005538EA7F1DACB1B314CFB2CC085D5EC50
24,521,882 UART: [art] SIG.S = BBFC3D200BA49E650E4A80C450F74917CB6F136AA3BA5538945AF8EB8E6EAA89C51C362434722D4CC3653CD6ADBDDCD6
25,500,615 UART: Caliptra RT
25,501,340 UART: [state] CFI Enabled
25,618,537 UART: [rt] RT listening for mailbox commands...
25,649,653 UART: [rt]cmd =0x49444549, len=4
25,652,423 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,440,066 ready_for_fw is high
3,440,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,744,188 >>> mbox cmd response: success
14,744,947 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,026,630 UART:
19,027,007 UART: Running Caliptra FMC ...
19,028,214 UART:
19,028,383 UART: [state] CFI Enabled
19,096,346 UART: [fht] FMC Alias Private Key: 7
20,860,428 UART: [art] Extend RT PCRs Done
20,861,675 UART: [art] Lock RT PCRs Done
20,863,254 UART: [art] Populate DV Done
20,868,343 UART: [fht] FMC Alias Private Key: 7
20,869,993 UART: [art] Derive CDI
20,871,030 UART: [art] Store in in slot 0x4
20,929,351 UART: [art] Derive Key Pair
20,930,352 UART: [art] Store priv key in slot 0x5
23,393,217 UART: [art] Derive Key Pair - Done
23,406,159 UART: [art] Signing Cert with AUTHO
23,407,466 UART: RITY.KEYID = 7
25,119,294 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,802 UART: [art] PUB.X = BD8582CC6FDF6CCB78A4B1D66A1B11CCEC134EED6E5C45186C957CEF2EA36554F5E9BBF7B6162D94B5199471D5F57695
25,128,096 UART: [art] PUB.Y = 55951FF69AB81A6942B45741C4461575F7AB7024A25443DCD3C87BC6AC53FD4FA37A8139F6C7227D7577AF862138A780
25,135,344 UART: [art] SIG.R = BBC1DB6E0687D89ABE790BC6D236D493C36E68AEBDC93E6C61BE3A10F2B3A375BA998A21D93ACBF759BD1FC08E856521
25,142,793 UART: [art] SIG.S = AC653705138B6A08387AAF7C761F064BA2D9B9DBD65EF30039764F4DF0C3B8EA083625EB9FC48B090815B6E1BFCACA24
26,121,963 UART: Caliptra RT
26,122,703 UART: [state] CFI Enabled
26,287,062 UART: [rt] RT listening for mailbox commands...
26,318,182 UART: [rt]cmd =0x49444549, len=4
26,321,146 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,760,451 ready_for_fw is high
3,760,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,963,504 >>> mbox cmd response: success
14,964,052 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,216,070 UART:
19,216,453 UART: Running Caliptra FMC ...
19,217,582 UART:
19,217,731 UART: [state] CFI Enabled
19,225,925 UART: [fht] FMC Alias Private Key: 7
20,983,169 UART: [art] Extend RT PCRs Done
20,984,394 UART: [art] Lock RT PCRs Done
20,985,968 UART: [art] Populate DV Done
20,991,322 UART: [fht] FMC Alias Private Key: 7
20,992,923 UART: [art] Derive CDI
20,993,733 UART: [art] Store in in slot 0x4
21,036,320 UART: [art] Derive Key Pair
21,037,340 UART: [art] Store priv key in slot 0x5
23,463,745 UART: [art] Derive Key Pair - Done
23,476,534 UART: [art] Signing Cert with AUTHO
23,477,844 UART: RITY.KEYID = 7
25,183,038 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,550 UART: [art] PUB.X = 77F7871CD2CCFF70E3F814356252576C5F34C5B47785153F96609B4D943FCC01D63AFA85EF685F606AEFF7EB5405A257
25,191,799 UART: [art] PUB.Y = A53E96FF3EF9DB249ED88BBB0DEF95F4CD3949454832E07C900863DD1FD26264FB065607231DD3440926D6D4EFFD4F12
25,199,051 UART: [art] SIG.R = 9319528AFCF197DD010E9509F417DC4A30342B0F02B1CBB4CD2031B559BA76919E11AF861D7AFB3E507D2DBAE86048C9
25,206,442 UART: [art] SIG.S = 4831996DC25F1E996F06AC5F41F9BA1C8CACD873225C46A6D10C57B7DEF08C15BA811ACDE779FCD0462D16A5F91A32B9
26,185,557 UART: Caliptra RT
26,186,244 UART: [state] CFI Enabled
26,303,309 UART: [rt] RT listening for mailbox commands...
26,334,858 UART: [rt]cmd =0x49444549, len=4
26,337,593 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,797 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,365 UART: [kat] SHA2-256
882,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,411 UART: [kat] ++
886,563 UART: [kat] sha1
890,979 UART: [kat] SHA2-256
892,917 UART: [kat] SHA2-384
895,684 UART: [kat] SHA2-512-ACC
897,585 UART: [kat] ECC-384
903,156 UART: [kat] HMAC-384Kdf
907,528 UART: [kat] LMS
1,475,724 UART: [kat] --
1,476,681 UART: [cold-reset] ++
1,477,111 UART: [fht] Storing FHT @ 0x50003400
1,479,886 UART: [idev] ++
1,480,054 UART: [idev] CDI.KEYID = 6
1,480,414 UART: [idev] SUBJECT.KEYID = 7
1,480,838 UART: [idev] UDS.KEYID = 0
1,481,183 ready_for_fw is high
1,481,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,886 UART: [idev] Erasing UDS.KEYID = 0
1,504,930 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,702 UART: [idev] --
1,514,653 UART: [ldev] ++
1,514,821 UART: [ldev] CDI.KEYID = 6
1,515,184 UART: [ldev] SUBJECT.KEYID = 5
1,515,610 UART: [ldev] AUTHORITY.KEYID = 7
1,516,073 UART: [ldev] FE.KEYID = 1
1,521,217 UART: [ldev] Erasing FE.KEYID = 1
1,546,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,342 UART: [ldev] --
1,585,721 UART: [fwproc] Waiting for Commands...
1,586,384 UART: [fwproc] Received command 0x46574c44
1,587,175 UART: [fwproc] Received Image of size 114448 bytes
2,885,928 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,750 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,102 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,221 >>> mbox cmd response: success
3,079,221 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,080,383 UART: [afmc] ++
3,080,551 UART: [afmc] CDI.KEYID = 6
3,080,913 UART: [afmc] SUBJECT.KEYID = 7
3,081,338 UART: [afmc] AUTHORITY.KEYID = 5
3,116,911 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,335 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,115 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,843 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,728 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,418 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,341 UART: [afmc] --
3,160,325 UART: [cold-reset] --
3,161,091 UART: [state] Locking Datavault
3,162,446 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,050 UART: [state] Locking ICCM
3,163,630 UART: [exit] Launching FMC @ 0x40000130
3,168,959 UART:
3,168,975 UART: Running Caliptra FMC ...
3,169,383 UART:
3,169,437 UART: [state] CFI Enabled
3,179,838 UART: [fht] FMC Alias Private Key: 7
3,287,973 UART: [art] Extend RT PCRs Done
3,288,401 UART: [art] Lock RT PCRs Done
3,289,969 UART: [art] Populate DV Done
3,298,112 UART: [fht] FMC Alias Private Key: 7
3,299,110 UART: [art] Derive CDI
3,299,390 UART: [art] Store in in slot 0x4
3,385,291 UART: [art] Derive Key Pair
3,385,651 UART: [art] Store priv key in slot 0x5
3,398,953 UART: [art] Derive Key Pair - Done
3,413,695 UART: [art] Signing Cert with AUTHO
3,414,175 UART: RITY.KEYID = 7
3,429,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,834 UART: [art] PUB.X = D2AFD50BE5EDA0E91CE7DDEA54AD557CAA0B23B700C59B3902F7307D8BF6FD664B950B2AEE63C898D9C69A59A7116F38
3,436,592 UART: [art] PUB.Y = CCF5AFF5DD291B3425E013FD461311F14391A7147084F18114408008E3F38F88B1B20BAE74E2C5B0786EB7D33893608B
3,443,534 UART: [art] SIG.R = C605C4D47877E1669C6C8FF3D92F7280AD24DF30A7096775905A3F23074949235C32EB621E7B99D6BDD594385C9BC374
3,450,291 UART: [art] SIG.S = 2B97916DE416EAAA35E1D89E15532AB09645A7B8890FFA612BCA6AD7F2F0B58714233DA6D7412E0992DC8EB59F245840
3,474,128 UART: Caliptra RT
3,474,381 UART: [state] CFI Enabled
3,582,958 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,576 UART: [rt]cmd =0x49444549, len=4
3,616,002 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,359 ready_for_fw is high
1,362,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,393 >>> mbox cmd response: success
2,927,393 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,989,173 UART:
2,989,189 UART: Running Caliptra FMC ...
2,989,597 UART:
2,989,651 UART: [state] CFI Enabled
3,000,144 UART: [fht] FMC Alias Private Key: 7
3,108,245 UART: [art] Extend RT PCRs Done
3,108,673 UART: [art] Lock RT PCRs Done
3,110,641 UART: [art] Populate DV Done
3,118,538 UART: [fht] FMC Alias Private Key: 7
3,119,622 UART: [art] Derive CDI
3,119,902 UART: [art] Store in in slot 0x4
3,205,379 UART: [art] Derive Key Pair
3,205,739 UART: [art] Store priv key in slot 0x5
3,218,613 UART: [art] Derive Key Pair - Done
3,233,268 UART: [art] Signing Cert with AUTHO
3,233,748 UART: RITY.KEYID = 7
3,248,454 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,219 UART: [art] PUB.X = 7D3E9201A6A8E0863BD866812C0AC6CBF72C59A501430A1AC23BE19BB34F1F6F42C213FD31013053B20691BACD8CE5FF
3,255,983 UART: [art] PUB.Y = 9940BE2E4544704B86EAD1B8605BD2829993D48FEE4525609651DA0837778830FB1AFB3619DFE244A62CD092EC16412E
3,262,928 UART: [art] SIG.R = 7090947CC3DBD42B68321774B45A841329F329ECC0CF7144F747D19AF14A149FFED5514D44A21F8D4D6F4A5E729965B4
3,269,700 UART: [art] SIG.S = E8B536F666E7D695457C41D5D70060A529CD5AB730A17B262D3CE1A033FEAB1F7EE6EF97DE9E5FC439AA33884A2B8044
3,294,095 UART: Caliptra RT
3,294,348 UART: [state] CFI Enabled
3,402,451 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,813 UART: [rt]cmd =0x49444549, len=4
3,435,297 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,070 UART: [kat] SHA2-256
882,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,116 UART: [kat] ++
886,268 UART: [kat] sha1
890,480 UART: [kat] SHA2-256
892,418 UART: [kat] SHA2-384
894,947 UART: [kat] SHA2-512-ACC
896,848 UART: [kat] ECC-384
902,453 UART: [kat] HMAC-384Kdf
907,093 UART: [kat] LMS
1,475,289 UART: [kat] --
1,476,158 UART: [cold-reset] ++
1,476,722 UART: [fht] Storing FHT @ 0x50003400
1,479,679 UART: [idev] ++
1,479,847 UART: [idev] CDI.KEYID = 6
1,480,207 UART: [idev] SUBJECT.KEYID = 7
1,480,631 UART: [idev] UDS.KEYID = 0
1,480,976 ready_for_fw is high
1,480,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,787 UART: [idev] Erasing UDS.KEYID = 0
1,505,595 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,267 UART: [idev] --
1,515,194 UART: [ldev] ++
1,515,362 UART: [ldev] CDI.KEYID = 6
1,515,725 UART: [ldev] SUBJECT.KEYID = 5
1,516,151 UART: [ldev] AUTHORITY.KEYID = 7
1,516,614 UART: [ldev] FE.KEYID = 1
1,522,098 UART: [ldev] Erasing FE.KEYID = 1
1,547,115 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,313 UART: [ldev] --
1,586,714 UART: [fwproc] Waiting for Commands...
1,587,375 UART: [fwproc] Received command 0x46574c44
1,588,166 UART: [fwproc] Received Image of size 114448 bytes
2,886,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,879 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,231 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,304 >>> mbox cmd response: success
3,079,304 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,080,536 UART: [afmc] ++
3,080,704 UART: [afmc] CDI.KEYID = 6
3,081,066 UART: [afmc] SUBJECT.KEYID = 7
3,081,491 UART: [afmc] AUTHORITY.KEYID = 5
3,116,984 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,522 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,302 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,030 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,915 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,605 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,410 UART: [afmc] --
3,160,354 UART: [cold-reset] --
3,161,392 UART: [state] Locking Datavault
3,162,455 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,059 UART: [state] Locking ICCM
3,163,585 UART: [exit] Launching FMC @ 0x40000130
3,168,914 UART:
3,168,930 UART: Running Caliptra FMC ...
3,169,338 UART:
3,169,481 UART: [state] CFI Enabled
3,180,368 UART: [fht] FMC Alias Private Key: 7
3,288,859 UART: [art] Extend RT PCRs Done
3,289,287 UART: [art] Lock RT PCRs Done
3,291,081 UART: [art] Populate DV Done
3,298,992 UART: [fht] FMC Alias Private Key: 7
3,299,960 UART: [art] Derive CDI
3,300,240 UART: [art] Store in in slot 0x4
3,386,079 UART: [art] Derive Key Pair
3,386,439 UART: [art] Store priv key in slot 0x5
3,400,385 UART: [art] Derive Key Pair - Done
3,414,978 UART: [art] Signing Cert with AUTHO
3,415,458 UART: RITY.KEYID = 7
3,430,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,431 UART: [art] PUB.X = 1DDDD65DBE95C07FBE76692754050BABB13E02477648E892ED8062B0F166613F37D8DDF7BF0FB7F8BF47E3014C4C0D6B
3,438,197 UART: [art] PUB.Y = B63914EA662F984D752D086DC11010A5E3223D8BCAAC54EB3F5532BA6D0F3936A000BF5138686BD7B8D009DD62B60712
3,445,117 UART: [art] SIG.R = 562FD57D2F90D86DBADC76909FBD87B4A39F64BC132D0526FF1DA88736B1E6BE3E58B7D36384DAD3B66FD4CFDF0B5FF1
3,451,905 UART: [art] SIG.S = EA3389346B92EA716C960BC386DFCD8AA9FC49978A8CFA0BA4BF27338F1760C0758440793E45848EA0CA039F8FEA7DE2
3,475,977 UART: Caliptra RT
3,476,322 UART: [state] CFI Enabled
3,584,743 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,373 UART: [rt]cmd =0x49444549, len=4
3,617,717 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,392 ready_for_fw is high
1,362,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,916 >>> mbox cmd response: success
2,928,916 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,990,214 UART:
2,990,230 UART: Running Caliptra FMC ...
2,990,638 UART:
2,990,781 UART: [state] CFI Enabled
3,001,208 UART: [fht] FMC Alias Private Key: 7
3,109,153 UART: [art] Extend RT PCRs Done
3,109,581 UART: [art] Lock RT PCRs Done
3,111,109 UART: [art] Populate DV Done
3,118,952 UART: [fht] FMC Alias Private Key: 7
3,120,030 UART: [art] Derive CDI
3,120,310 UART: [art] Store in in slot 0x4
3,206,195 UART: [art] Derive Key Pair
3,206,555 UART: [art] Store priv key in slot 0x5
3,220,091 UART: [art] Derive Key Pair - Done
3,234,959 UART: [art] Signing Cert with AUTHO
3,235,439 UART: RITY.KEYID = 7
3,251,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,810 UART: [art] PUB.X = 375DB9FF8059D75D4CD50FC535B3541D6F581ABD132C306050D38CBB4146444000C0E4DBA750A495498D07FA1D363276
3,258,552 UART: [art] PUB.Y = 62B7FCC1C42522362AE137BAF8E4CE4E697C70F07E6794BD84082327ECEA0F6387975A4C9142D224BC45F6AEBE1B78E8
3,265,506 UART: [art] SIG.R = 780071682B016E97198266BC11A1777EC96FE966C0FD35E35E1F02CF812AA2D6F65A5FCFADA0D4C7BBAA70656B77FB00
3,272,238 UART: [art] SIG.S = 11E88EF30746ABD3450DBEDE4D0E13840B30FA9BF8F255B0A440CA96E02690E1399AC5093F42221255FA4DD8932BCE07
3,296,245 UART: Caliptra RT
3,296,590 UART: [state] CFI Enabled
3,405,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,462 UART: [rt]cmd =0x49444549, len=4
3,437,648 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
893,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,201 UART: [kat] ++
897,353 UART: [kat] sha1
901,615 UART: [kat] SHA2-256
903,555 UART: [kat] SHA2-384
906,498 UART: [kat] SHA2-512-ACC
908,399 UART: [kat] ECC-384
917,824 UART: [kat] HMAC-384Kdf
922,490 UART: [kat] LMS
1,170,818 UART: [kat] --
1,171,629 UART: [cold-reset] ++
1,172,021 UART: [fht] FHT @ 0x50003400
1,174,704 UART: [idev] ++
1,174,872 UART: [idev] CDI.KEYID = 6
1,175,232 UART: [idev] SUBJECT.KEYID = 7
1,175,656 UART: [idev] UDS.KEYID = 0
1,176,001 ready_for_fw is high
1,176,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,470 UART: [idev] Erasing UDS.KEYID = 0
1,199,891 UART: [idev] Sha1 KeyId Algorithm
1,208,571 UART: [idev] --
1,209,861 UART: [ldev] ++
1,210,029 UART: [ldev] CDI.KEYID = 6
1,210,392 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,489 UART: [ldev] Erasing FE.KEYID = 1
1,243,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,505 UART: [ldev] --
1,282,996 UART: [fwproc] Wait for Commands...
1,283,638 UART: [fwproc] Recv command 0x46574c44
1,284,366 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,016 >>> mbox cmd response: success
2,774,016 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,775,026 UART: [afmc] ++
2,775,194 UART: [afmc] CDI.KEYID = 6
2,775,556 UART: [afmc] SUBJECT.KEYID = 7
2,775,981 UART: [afmc] AUTHORITY.KEYID = 5
2,811,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,599 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,327 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,212 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,931 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,881 UART: [afmc] --
2,854,775 UART: [cold-reset] --
2,855,715 UART: [state] Locking Datavault
2,857,166 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,770 UART: [state] Locking ICCM
2,858,290 UART: [exit] Launching FMC @ 0x40000130
2,863,619 UART:
2,863,635 UART: Running Caliptra FMC ...
2,864,043 UART:
2,864,097 UART: [state] CFI Enabled
2,874,188 UART: [fht] FMC Alias Private Key: 7
2,982,229 UART: [art] Extend RT PCRs Done
2,982,657 UART: [art] Lock RT PCRs Done
2,984,111 UART: [art] Populate DV Done
2,992,328 UART: [fht] FMC Alias Private Key: 7
2,993,308 UART: [art] Derive CDI
2,993,588 UART: [art] Store in in slot 0x4
3,079,457 UART: [art] Derive Key Pair
3,079,817 UART: [art] Store priv key in slot 0x5
3,093,005 UART: [art] Derive Key Pair - Done
3,107,586 UART: [art] Signing Cert with AUTHO
3,108,066 UART: RITY.KEYID = 7
3,123,336 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,101 UART: [art] PUB.X = 90FCC7DC9E1B50F4C14010C996D96F0F607E31B54EE625B3341F29945201DB23EC8A55B42F9EEA25E2AC6E4E0F147BA6
3,130,874 UART: [art] PUB.Y = 332E8EF48D74159FFA825978585CEFD199786CA16845AE284E68A423154F1A9BC45BD1E082AD65FF2E71253DED338075
3,137,826 UART: [art] SIG.R = CA0D22B82F450AA902DF3097C938559AC06AB8E8D553D464CEA0110FB3A1E59BE2A33E39EB84DE0BEA3A7E06C72D7453
3,144,594 UART: [art] SIG.S = 5F57D8178507D09E49AA2476A472D0A7F02AFF660C64E95B4235A95882674602BF68F2D4916C3219972979B44B9D9641
3,168,680 UART: Caliptra RT
3,168,933 UART: [state] CFI Enabled
3,277,158 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,804 UART: [rt]cmd =0x49444549, len=4
3,310,178 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,541 ready_for_fw is high
1,059,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,605 >>> mbox cmd response: success
2,627,605 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,689,485 UART:
2,689,501 UART: Running Caliptra FMC ...
2,689,909 UART:
2,689,963 UART: [state] CFI Enabled
2,700,600 UART: [fht] FMC Alias Private Key: 7
2,808,247 UART: [art] Extend RT PCRs Done
2,808,675 UART: [art] Lock RT PCRs Done
2,810,255 UART: [art] Populate DV Done
2,818,320 UART: [fht] FMC Alias Private Key: 7
2,819,404 UART: [art] Derive CDI
2,819,684 UART: [art] Store in in slot 0x4
2,905,141 UART: [art] Derive Key Pair
2,905,501 UART: [art] Store priv key in slot 0x5
2,918,623 UART: [art] Derive Key Pair - Done
2,933,514 UART: [art] Signing Cert with AUTHO
2,933,994 UART: RITY.KEYID = 7
2,949,370 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,135 UART: [art] PUB.X = 45674FFC17460D956B0E160A0296E4839FD3768A6074564CF90AD0577E1BDF56A53FB99B128C1047EBD5FD64FF9CED35
2,956,896 UART: [art] PUB.Y = 6DC9AEE9213DD15B2AD35B386B88AD01C6FEB4F5DB6AF3417BD3E47FD6C826E77690BFAEBADCDE54BB8FAE53B76CD359
2,963,877 UART: [art] SIG.R = 6D12D22F5918C1BDB960C9279F3B31175311AEEEF2DED6F810EDA45F763548BE0FA99ADD84382CC81569548B19DD2413
2,970,652 UART: [art] SIG.S = 0DD05C554C1315949EE3ABE4106B6062ADF597C0E463E8084073CA7B4D2E5E4816740DB91D42D2F813979CE4DF24BF44
2,994,880 UART: Caliptra RT
2,995,133 UART: [state] CFI Enabled
3,102,788 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,298 UART: [rt]cmd =0x49444549, len=4
3,135,528 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,937 UART: [state] LifecycleState = Unprovisioned
85,592 UART: [state] DebugLocked = No
86,208 UART: [state] WD Timer not started. Device not locked for debugging
87,367 UART: [kat] SHA2-256
893,017 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,142 UART: [kat] ++
897,294 UART: [kat] sha1
901,596 UART: [kat] SHA2-256
903,536 UART: [kat] SHA2-384
906,235 UART: [kat] SHA2-512-ACC
908,136 UART: [kat] ECC-384
918,187 UART: [kat] HMAC-384Kdf
922,747 UART: [kat] LMS
1,171,075 UART: [kat] --
1,172,092 UART: [cold-reset] ++
1,172,556 UART: [fht] FHT @ 0x50003400
1,175,109 UART: [idev] ++
1,175,277 UART: [idev] CDI.KEYID = 6
1,175,637 UART: [idev] SUBJECT.KEYID = 7
1,176,061 UART: [idev] UDS.KEYID = 0
1,176,406 ready_for_fw is high
1,176,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,677 UART: [idev] Erasing UDS.KEYID = 0
1,200,710 UART: [idev] Sha1 KeyId Algorithm
1,209,084 UART: [idev] --
1,210,236 UART: [ldev] ++
1,210,404 UART: [ldev] CDI.KEYID = 6
1,210,767 UART: [ldev] SUBJECT.KEYID = 5
1,211,193 UART: [ldev] AUTHORITY.KEYID = 7
1,211,656 UART: [ldev] FE.KEYID = 1
1,216,838 UART: [ldev] Erasing FE.KEYID = 1
1,243,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,854 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,282,955 UART: [fwproc] Recv command 0x46574c44
1,283,683 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,421 >>> mbox cmd response: success
2,773,421 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,774,519 UART: [afmc] ++
2,774,687 UART: [afmc] CDI.KEYID = 6
2,775,049 UART: [afmc] SUBJECT.KEYID = 7
2,775,474 UART: [afmc] AUTHORITY.KEYID = 5
2,810,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,490 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,103 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,822 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,596 UART: [afmc] --
2,854,480 UART: [cold-reset] --
2,855,252 UART: [state] Locking Datavault
2,856,307 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,911 UART: [state] Locking ICCM
2,857,505 UART: [exit] Launching FMC @ 0x40000130
2,862,834 UART:
2,862,850 UART: Running Caliptra FMC ...
2,863,258 UART:
2,863,401 UART: [state] CFI Enabled
2,873,974 UART: [fht] FMC Alias Private Key: 7
2,982,199 UART: [art] Extend RT PCRs Done
2,982,627 UART: [art] Lock RT PCRs Done
2,984,185 UART: [art] Populate DV Done
2,992,252 UART: [fht] FMC Alias Private Key: 7
2,993,404 UART: [art] Derive CDI
2,993,684 UART: [art] Store in in slot 0x4
3,079,767 UART: [art] Derive Key Pair
3,080,127 UART: [art] Store priv key in slot 0x5
3,093,881 UART: [art] Derive Key Pair - Done
3,108,892 UART: [art] Signing Cert with AUTHO
3,109,372 UART: RITY.KEYID = 7
3,124,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,029 UART: [art] PUB.X = E723A9641C0EA3DA56C7D2517981FA939B2E522929F3688049257750CA8DC070142D0CCE470FCC99DF90F7D2E4896A95
3,131,790 UART: [art] PUB.Y = 3FD9BF10F18C8CDF3742095A6F2C0D3326C289D2D9323152CA161E1D8657C9FB6F1D8AC83126B7CF6EE7E2F1164430CF
3,138,744 UART: [art] SIG.R = 5FA87356061760DDA9B37182CA956D4F58E8864A144186633D332984B6ED070BD68657925A2D52C333E204C4A1B77043
3,145,490 UART: [art] SIG.S = AB86A356865021CB7A73FDA51090BA2D00AA35A4428D46F597893D5939DFA211337CB65F9D08FC310C6382DDAA76674B
3,168,801 UART: Caliptra RT
3,169,146 UART: [state] CFI Enabled
3,276,475 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,801 UART: [rt]cmd =0x49444549, len=4
3,309,225 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,358 ready_for_fw is high
1,060,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,076 >>> mbox cmd response: success
2,629,076 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,690,554 UART:
2,690,570 UART: Running Caliptra FMC ...
2,690,978 UART:
2,691,121 UART: [state] CFI Enabled
2,701,434 UART: [fht] FMC Alias Private Key: 7
2,809,527 UART: [art] Extend RT PCRs Done
2,809,955 UART: [art] Lock RT PCRs Done
2,811,153 UART: [art] Populate DV Done
2,819,490 UART: [fht] FMC Alias Private Key: 7
2,820,426 UART: [art] Derive CDI
2,820,706 UART: [art] Store in in slot 0x4
2,906,751 UART: [art] Derive Key Pair
2,907,111 UART: [art] Store priv key in slot 0x5
2,920,603 UART: [art] Derive Key Pair - Done
2,935,569 UART: [art] Signing Cert with AUTHO
2,936,049 UART: RITY.KEYID = 7
2,951,055 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,820 UART: [art] PUB.X = C82551A56E6511C91071D823EEFDAB24D5CC3500656DF9636FCD57342F7F4622867D9D9DFD48C8F22BA99153FDB2ED21
2,958,576 UART: [art] PUB.Y = 1E73274526033EE710F67EE18C947DB73A373811E2227CA39A9A0B21BD3B68FA5FD66D29D4D9624133EF6469472C9FC9
2,965,520 UART: [art] SIG.R = A8D35C01DE23BE27CE35DBE31D04500E42D5F95EC33B8D7F3AC51D6086E936B7AB483F189AF19B9737E4C04B9E0128A1
2,972,290 UART: [art] SIG.S = B73FB2E10FD4470BA547204995E8F69853B0224FD9BB371B3C1A5ED998A68706605AF1A27AC31109EDEFE0D46BF2CAEB
2,995,787 UART: Caliptra RT
2,996,132 UART: [state] CFI Enabled
3,104,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,748 UART: [rt]cmd =0x49444549, len=4
3,137,016 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,290 UART: [kat] HMAC-384Kdf
919,866 UART: [kat] LMS
1,168,178 UART: [kat] --
1,169,015 UART: [cold-reset] ++
1,169,483 UART: [fht] FHT @ 0x50003400
1,172,125 UART: [idev] ++
1,172,293 UART: [idev] CDI.KEYID = 6
1,172,654 UART: [idev] SUBJECT.KEYID = 7
1,173,079 UART: [idev] UDS.KEYID = 0
1,173,425 ready_for_fw is high
1,173,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,159 UART: [idev] Erasing UDS.KEYID = 0
1,198,029 UART: [idev] Sha1 KeyId Algorithm
1,207,033 UART: [idev] --
1,208,112 UART: [ldev] ++
1,208,280 UART: [ldev] CDI.KEYID = 6
1,208,644 UART: [ldev] SUBJECT.KEYID = 5
1,209,071 UART: [ldev] AUTHORITY.KEYID = 7
1,209,534 UART: [ldev] FE.KEYID = 1
1,214,820 UART: [ldev] Erasing FE.KEYID = 1
1,240,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,750 UART: [ldev] --
1,280,152 UART: [fwproc] Wait for Commands...
1,280,783 UART: [fwproc] Recv command 0x46574c44
1,281,516 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,324 >>> mbox cmd response: success
2,772,324 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,773,569 UART: [afmc] ++
2,773,737 UART: [afmc] CDI.KEYID = 6
2,774,100 UART: [afmc] SUBJECT.KEYID = 7
2,774,526 UART: [afmc] AUTHORITY.KEYID = 5
2,809,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,216 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,828 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,547 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,298 UART: [afmc] --
2,853,302 UART: [cold-reset] --
2,854,160 UART: [state] Locking Datavault
2,855,451 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,055 UART: [state] Locking ICCM
2,856,577 UART: [exit] Launching FMC @ 0x40000130
2,861,906 UART:
2,861,922 UART: Running Caliptra FMC ...
2,862,330 UART:
2,862,384 UART: [state] CFI Enabled
2,873,067 UART: [fht] FMC Alias Private Key: 7
2,982,086 UART: [art] Extend RT PCRs Done
2,982,514 UART: [art] Lock RT PCRs Done
2,984,284 UART: [art] Populate DV Done
2,992,607 UART: [fht] FMC Alias Private Key: 7
2,993,765 UART: [art] Derive CDI
2,994,045 UART: [art] Store in in slot 0x4
3,079,700 UART: [art] Derive Key Pair
3,080,060 UART: [art] Store priv key in slot 0x5
3,092,906 UART: [art] Derive Key Pair - Done
3,107,813 UART: [art] Signing Cert with AUTHO
3,108,293 UART: RITY.KEYID = 7
3,123,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,516 UART: [art] PUB.X = 6C219F5B469AE341864351EE6CB0EE3CCC44F5F2BFA97BF939782E368342A209570CE1B679D3AAE69551C403EAE9F9D0
3,131,287 UART: [art] PUB.Y = A7934C12F7A2DF6DBA8D1675967E5C80AEE98D4E98D8466FBB65DF6093AC2BD69A6C63FD7AC113C632595A8C54030733
3,138,241 UART: [art] SIG.R = AEA835F97047B07C34BBDC25186E2292E5E983FA21ADE8B1F6D0FD9C127ADA1C708BCD7C3804EEFCAD762684200AB0B8
3,145,025 UART: [art] SIG.S = EB35AFDE4509ACB808071D758EB2FDA3BEED3FE6C0BE270776FCA0A07DC6B35730413185A69462B89E7B7BA1831F442E
3,169,110 UART: Caliptra RT
3,169,363 UART: [state] CFI Enabled
3,276,609 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,167 UART: [rt]cmd =0x49444549, len=4
3,309,561 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,734 ready_for_fw is high
1,055,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,620,816 >>> mbox cmd response: success
2,620,816 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,683,506 UART:
2,683,522 UART: Running Caliptra FMC ...
2,683,930 UART:
2,683,984 UART: [state] CFI Enabled
2,694,333 UART: [fht] FMC Alias Private Key: 7
2,802,256 UART: [art] Extend RT PCRs Done
2,802,684 UART: [art] Lock RT PCRs Done
2,804,174 UART: [art] Populate DV Done
2,812,369 UART: [fht] FMC Alias Private Key: 7
2,813,325 UART: [art] Derive CDI
2,813,605 UART: [art] Store in in slot 0x4
2,899,686 UART: [art] Derive Key Pair
2,900,046 UART: [art] Store priv key in slot 0x5
2,913,130 UART: [art] Derive Key Pair - Done
2,928,194 UART: [art] Signing Cert with AUTHO
2,928,674 UART: RITY.KEYID = 7
2,944,066 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,831 UART: [art] PUB.X = E0F280FEC031F17B5A3D5D9377A6DC7DB5A4054183F740B022F0744B1DCE537A638A9B5EDC887B3E8FE0487E33D6CD04
2,951,607 UART: [art] PUB.Y = E91A75CABAF33ABDAC2FD759C7B18273815AAE44A4756A90C67FCC5C04B467DED6FEB36C1A427EC46977D5BBBA50B72B
2,958,580 UART: [art] SIG.R = 1135B77EDEFF5AC244BB5205A758EC28D76D8170222E0C38F4483ECB1D4E91C820FCED03BE4CC8EC91DD051131F9A85B
2,965,354 UART: [art] SIG.S = 3313171EC3955EC61640FDFC0F2218525C254611F5906C4CD67042C9E22C443A6FB8B17F28A52FF4CF4F493E8FA74EA6
2,989,066 UART: Caliptra RT
2,989,319 UART: [state] CFI Enabled
3,097,010 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,642 UART: [rt]cmd =0x49444549, len=4
3,129,922 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
87,092 UART: [state] WD Timer not started. Device not locked for debugging
88,401 UART: [kat] SHA2-256
891,951 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,080 UART: [kat] ++
896,232 UART: [kat] sha1
900,584 UART: [kat] SHA2-256
902,524 UART: [kat] SHA2-384
905,119 UART: [kat] SHA2-512-ACC
907,020 UART: [kat] ECC-384
916,683 UART: [kat] HMAC-384Kdf
921,199 UART: [kat] LMS
1,169,511 UART: [kat] --
1,170,310 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,174,626 ready_for_fw is high
1,174,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,210 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,400 UART: [idev] --
1,209,457 UART: [ldev] ++
1,209,625 UART: [ldev] CDI.KEYID = 6
1,209,989 UART: [ldev] SUBJECT.KEYID = 5
1,210,416 UART: [ldev] AUTHORITY.KEYID = 7
1,210,879 UART: [ldev] FE.KEYID = 1
1,216,341 UART: [ldev] Erasing FE.KEYID = 1
1,243,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,783 UART: [fwproc] Wait for Commands...
1,283,558 UART: [fwproc] Recv command 0x46574c44
1,284,291 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,058 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,363 >>> mbox cmd response: success
2,777,363 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,778,602 UART: [afmc] ++
2,778,770 UART: [afmc] CDI.KEYID = 6
2,779,133 UART: [afmc] SUBJECT.KEYID = 7
2,779,559 UART: [afmc] AUTHORITY.KEYID = 5
2,815,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,314 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,916 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,841 UART: [afmc] --
2,858,863 UART: [cold-reset] --
2,859,661 UART: [state] Locking Datavault
2,860,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,298 UART: [state] Locking ICCM
2,861,796 UART: [exit] Launching FMC @ 0x40000130
2,867,125 UART:
2,867,141 UART: Running Caliptra FMC ...
2,867,549 UART:
2,867,692 UART: [state] CFI Enabled
2,878,585 UART: [fht] FMC Alias Private Key: 7
2,986,702 UART: [art] Extend RT PCRs Done
2,987,130 UART: [art] Lock RT PCRs Done
2,988,144 UART: [art] Populate DV Done
2,996,343 UART: [fht] FMC Alias Private Key: 7
2,997,509 UART: [art] Derive CDI
2,997,789 UART: [art] Store in in slot 0x4
3,083,176 UART: [art] Derive Key Pair
3,083,536 UART: [art] Store priv key in slot 0x5
3,097,062 UART: [art] Derive Key Pair - Done
3,111,941 UART: [art] Signing Cert with AUTHO
3,112,421 UART: RITY.KEYID = 7
3,127,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,386 UART: [art] PUB.X = DF21DE0DEC92B2EA019932B9EC1F35679E51C3A4CE2A1294180B0D6C0F4E969A745BD65E5DF74237096188F8418705F9
3,135,139 UART: [art] PUB.Y = BB75897DCCFD77928700ED4D0A47AA4F39AA099E02C4F8E7A87E2C1C3C6F56A1466588A53C210FF4EAC1A776707C5149
3,142,065 UART: [art] SIG.R = 8BC8F829036806F2ABFD0D821AB7E31A9978C440123EB7DC72CF8D92DAB7F6342C38AD37AC1F35BDA1890F83AE2D4640
3,148,837 UART: [art] SIG.S = A44676981DC4A13CDFCCEFD8B0938490517752B8C98F5C71E1905231BBB924CAC0403685C68FBBE47BCD32C527576395
3,172,164 UART: Caliptra RT
3,172,509 UART: [state] CFI Enabled
3,280,649 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,343 UART: [rt]cmd =0x49444549, len=4
3,313,577 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,009 ready_for_fw is high
1,056,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,387 >>> mbox cmd response: success
2,624,387 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,686,243 UART:
2,686,259 UART: Running Caliptra FMC ...
2,686,667 UART:
2,686,810 UART: [state] CFI Enabled
2,696,847 UART: [fht] FMC Alias Private Key: 7
2,804,882 UART: [art] Extend RT PCRs Done
2,805,310 UART: [art] Lock RT PCRs Done
2,806,750 UART: [art] Populate DV Done
2,815,105 UART: [fht] FMC Alias Private Key: 7
2,816,231 UART: [art] Derive CDI
2,816,511 UART: [art] Store in in slot 0x4
2,902,314 UART: [art] Derive Key Pair
2,902,674 UART: [art] Store priv key in slot 0x5
2,916,070 UART: [art] Derive Key Pair - Done
2,930,724 UART: [art] Signing Cert with AUTHO
2,931,204 UART: RITY.KEYID = 7
2,946,820 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,585 UART: [art] PUB.X = 11D7B647D805D185CAB28645DA29FD2669AF38F7223BCF83706558055860A587F9BD49AEE041EF5DD8F7098CCE81529A
2,954,350 UART: [art] PUB.Y = A738C6937054CF9A4A17F931779738C03370343A6DEDA7F1859E95C117AC8A10B3C4AC740ECC466AF94E70AF4A593390
2,961,299 UART: [art] SIG.R = A1823E8E3D29A855E6049D3F096C38A1DEE7FF3BE889626192B9D0CB016117AFABAE053D923E5BD29429169090AADD08
2,968,062 UART: [art] SIG.S = 0CFE0841D9EACA338493A8117C0671F4B946B729328C254A4044D3ADBA39B28619C9C73F15C4FE06F96D8C30223055D2
2,991,495 UART: Caliptra RT
2,991,840 UART: [state] CFI Enabled
3,099,771 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,211 UART: [rt]cmd =0x49444549, len=4
3,132,525 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,106 UART:
192,483 UART: Running Caliptra ROM ...
193,565 UART:
193,712 UART: [state] CFI Enabled
267,133 UART: [state] LifecycleState = Unprovisioned
269,123 UART: [state] DebugLocked = No
270,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,370 UART: [kat] SHA2-256
445,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,577 UART: [kat] ++
456,044 UART: [kat] sha1
466,569 UART: [kat] SHA2-256
469,287 UART: [kat] SHA2-384
476,342 UART: [kat] SHA2-512-ACC
478,644 UART: [kat] ECC-384
2,767,147 UART: [kat] HMAC-384Kdf
2,799,363 UART: [kat] LMS
3,989,653 UART: [kat] --
3,994,730 UART: [cold-reset] ++
3,996,307 UART: [fht] Storing FHT @ 0x50003400
4,006,722 UART: [idev] ++
4,007,291 UART: [idev] CDI.KEYID = 6
4,008,179 UART: [idev] SUBJECT.KEYID = 7
4,009,377 UART: [idev] UDS.KEYID = 0
4,010,443 ready_for_fw is high
4,010,644 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,063 UART: [idev] Erasing UDS.KEYID = 0
7,342,826 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,144 UART: [idev] --
7,369,788 UART: [ldev] ++
7,370,396 UART: [ldev] CDI.KEYID = 6
7,371,323 UART: [ldev] SUBJECT.KEYID = 5
7,372,538 UART: [ldev] AUTHORITY.KEYID = 7
7,373,769 UART: [ldev] FE.KEYID = 1
7,419,986 UART: [ldev] Erasing FE.KEYID = 1
10,752,244 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,646 UART: [ldev] --
13,135,062 UART: [fwproc] Waiting for Commands...
13,137,402 UART: [fwproc] Received command 0x46574c44
13,139,641 UART: [fwproc] Received Image of size 114124 bytes
17,197,459 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,773 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,658,556 >>> mbox cmd response: success
17,663,418 UART: [afmc] ++
17,664,017 UART: [afmc] CDI.KEYID = 6
17,664,937 UART: [afmc] SUBJECT.KEYID = 7
17,666,158 UART: [afmc] AUTHORITY.KEYID = 5
21,025,863 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,059 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,319 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,695 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,530 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,013 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,391,753 UART: [afmc] --
23,394,921 UART: [cold-reset] --
23,398,949 UART: [state] Locking Datavault
23,404,212 UART: [state] Locking PCR0, PCR1 and PCR31
23,405,916 UART: [state] Locking ICCM
23,408,069 UART: [exit] Launching FMC @ 0x40000130
23,416,414 UART:
23,416,651 UART: Running Caliptra FMC ...
23,417,756 UART:
23,417,918 UART: [state] CFI Enabled
23,486,015 UART: [fht] FMC Alias Private Key: 7
25,823,619 UART: [art] Extend RT PCRs Done
25,824,841 UART: [art] Lock RT PCRs Done
25,826,823 UART: [art] Populate DV Done
25,832,291 UART: [fht] FMC Alias Private Key: 7
25,833,781 UART: [art] Derive CDI
25,834,539 UART: [art] Store in in slot 0x4
25,893,474 UART: [art] Derive Key Pair
25,894,513 UART: [art] Store priv key in slot 0x5
29,187,244 UART: [art] Derive Key Pair - Done
29,199,974 UART: [art] Signing Cert with AUTHO
29,201,277 UART: RITY.KEYID = 7
31,488,233 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,727 UART: [art] PUB.X = C9267325B368E39D1F0E6933128EEB305B485CC63CE1B256D21D395D42463DC0B96E3D8878C641387F92A1D336A16A51
31,496,979 UART: [art] PUB.Y = 3F4D723B67B329A2641109B0E78DA01F2B2260EDC7C41BB16C2E206E17566EFF67979FDD49CAD5B29E977043A343F19C
31,504,203 UART: [art] SIG.R = A1D44E0F21DAC9824656AF6D05738BB382249D5B4A36EFFD68A88DF74990133BE6996AE96FB8848C4660B12BEC17FCB8
31,511,597 UART: [art] SIG.S = 9955FEAF890E2B4460587D89E66B9358DA06FDA84D8197819510EE85F589D29B7145227A51716E37F07D577BC30B68A3
32,816,991 UART: Caliptra RT
32,817,700 UART: [state] CFI Enabled
32,977,778 UART: [rt] RT listening for mailbox commands...
32,979,715 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,010,845 UART: [rt]cmd =0x44504543, len=136
38,633,055 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
3,792,922 ready_for_fw is high
3,793,312 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,862,795 >>> mbox cmd response: success
23,550,042 UART:
23,550,446 UART: Running Caliptra FMC ...
23,551,592 UART:
23,551,774 UART: [state] CFI Enabled
23,618,913 UART: [fht] FMC Alias Private Key: 7
25,956,809 UART: [art] Extend RT PCRs Done
25,958,033 UART: [art] Lock RT PCRs Done
25,959,318 UART: [art] Populate DV Done
25,964,687 UART: [fht] FMC Alias Private Key: 7
25,966,172 UART: [art] Derive CDI
25,966,915 UART: [art] Store in in slot 0x4
26,026,725 UART: [art] Derive Key Pair
26,027,765 UART: [art] Store priv key in slot 0x5
29,320,694 UART: [art] Derive Key Pair - Done
29,333,521 UART: [art] Signing Cert with AUTHO
29,334,854 UART: RITY.KEYID = 7
31,623,311 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,824 UART: [art] PUB.X = 68E27E22B557AD19924DA35005A651502D63024EEFA47FFFDE23D8E561B663FECC0035CDF58C247F606C758D33C32759
31,632,047 UART: [art] PUB.Y = 7524E92D2E12CEEC39B432E859BA19053BF67EF5617A2B07EB614FDA6E4C5739FBD0443206E686C11C37B24A5BE1FE29
31,639,289 UART: [art] SIG.R = C4E2199A49585B94F809D3EDAC7B3EE78A6361ED58DFD4C683F3D7B94A6B834335BB62C49B982DD6084DC16BD6826757
31,646,723 UART: [art] SIG.S = EF8E34E369B7FAB786426DB72A5B5CA83BC6FB262F405DD660ED9402307C72E234821647A3D55AF8A49E2E0618B6F524
32,951,699 UART: Caliptra RT
32,952,410 UART: [state] CFI Enabled
33,114,070 UART: [rt] RT listening for mailbox commands...
33,116,017 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,146,833 UART: [rt]cmd =0x44504543, len=136
38,769,160 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,434 UART:
192,809 UART: Running Caliptra ROM ...
194,003 UART:
603,482 UART: [state] CFI Enabled
615,947 UART: [state] LifecycleState = Unprovisioned
617,893 UART: [state] DebugLocked = No
619,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,137 UART: [kat] SHA2-256
794,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,495 UART: [kat] ++
805,936 UART: [kat] sha1
816,159 UART: [kat] SHA2-256
818,871 UART: [kat] SHA2-384
823,859 UART: [kat] SHA2-512-ACC
826,218 UART: [kat] ECC-384
3,110,490 UART: [kat] HMAC-384Kdf
3,121,544 UART: [kat] LMS
4,311,715 UART: [kat] --
4,316,999 UART: [cold-reset] ++
4,319,309 UART: [fht] Storing FHT @ 0x50003400
4,330,218 UART: [idev] ++
4,330,857 UART: [idev] CDI.KEYID = 6
4,331,754 UART: [idev] SUBJECT.KEYID = 7
4,332,994 UART: [idev] UDS.KEYID = 0
4,333,941 ready_for_fw is high
4,334,120 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,422 UART: [idev] Erasing UDS.KEYID = 0
7,620,112 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,840 UART: [idev] --
7,646,205 UART: [ldev] ++
7,646,764 UART: [ldev] CDI.KEYID = 6
7,647,739 UART: [ldev] SUBJECT.KEYID = 5
7,648,945 UART: [ldev] AUTHORITY.KEYID = 7
7,650,223 UART: [ldev] FE.KEYID = 1
7,659,780 UART: [ldev] Erasing FE.KEYID = 1
10,949,177 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,290 UART: [ldev] --
13,312,743 UART: [fwproc] Waiting for Commands...
13,314,831 UART: [fwproc] Received command 0x46574c44
13,317,007 UART: [fwproc] Received Image of size 114124 bytes
17,365,765 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,484 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,822,536 >>> mbox cmd response: success
17,826,751 UART: [afmc] ++
17,827,347 UART: [afmc] CDI.KEYID = 6
17,828,312 UART: [afmc] SUBJECT.KEYID = 7
17,829,522 UART: [afmc] AUTHORITY.KEYID = 5
21,149,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,857 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,139 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,550 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,371 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,812 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,943 UART: [afmc] --
23,513,103 UART: [cold-reset] --
23,517,940 UART: [state] Locking Datavault
23,524,150 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,911 UART: [state] Locking ICCM
23,528,383 UART: [exit] Launching FMC @ 0x40000130
23,536,779 UART:
23,537,009 UART: Running Caliptra FMC ...
23,538,108 UART:
23,538,262 UART: [state] CFI Enabled
23,546,030 UART: [fht] FMC Alias Private Key: 7
25,877,321 UART: [art] Extend RT PCRs Done
25,878,556 UART: [art] Lock RT PCRs Done
25,880,212 UART: [art] Populate DV Done
25,885,886 UART: [fht] FMC Alias Private Key: 7
25,887,525 UART: [art] Derive CDI
25,888,337 UART: [art] Store in in slot 0x4
25,931,060 UART: [art] Derive Key Pair
25,932,123 UART: [art] Store priv key in slot 0x5
29,174,433 UART: [art] Derive Key Pair - Done
29,187,412 UART: [art] Signing Cert with AUTHO
29,188,710 UART: RITY.KEYID = 7
31,468,384 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,886 UART: [art] PUB.X = FE4903D41D4ACA6701881F1185D0BF4CD0365E84565AE880AF2E53106C6A00F29497306969FF0A11564838528BADC83E
31,477,118 UART: [art] PUB.Y = EA891F15374F398C67D54100AF3230A951314D571F9C9627657EA5B418AE190C894BD1014F820C213B2D2AD031E5A64A
31,484,323 UART: [art] SIG.R = 4B13F408FDEE36AD187233C79CE48D62F167A1FDF911FCF39B9E56FE34F5DFA73187597CD0C4BB7558B9C6D6B10DDB77
31,491,707 UART: [art] SIG.S = F7BF5FE568D03F10C8A4A8B96D625A8A76555C57E7B8C924F11E138342AA8CA56C1F0B73ACFB7C8EBEC2019BD90E39C8
32,796,940 UART: Caliptra RT
32,797,668 UART: [state] CFI Enabled
32,915,297 UART: [rt] RT listening for mailbox commands...
32,917,215 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
32,947,978 UART: [rt]cmd =0x44504543, len=136
38,506,774 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
4,131,003 ready_for_fw is high
4,131,596 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,068,169 >>> mbox cmd response: success
23,705,941 UART:
23,706,358 UART: Running Caliptra FMC ...
23,707,558 UART:
23,707,717 UART: [state] CFI Enabled
23,715,344 UART: [fht] FMC Alias Private Key: 7
26,046,752 UART: [art] Extend RT PCRs Done
26,047,985 UART: [art] Lock RT PCRs Done
26,049,671 UART: [art] Populate DV Done
26,055,032 UART: [fht] FMC Alias Private Key: 7
26,056,589 UART: [art] Derive CDI
26,057,410 UART: [art] Store in in slot 0x4
26,100,017 UART: [art] Derive Key Pair
26,101,062 UART: [art] Store priv key in slot 0x5
29,342,082 UART: [art] Derive Key Pair - Done
29,354,978 UART: [art] Signing Cert with AUTHO
29,356,287 UART: RITY.KEYID = 7
31,635,275 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,806 UART: [art] PUB.X = 38783568488487A8BBC48828C1A8EBE24A064B21078A9E1C21AF4199C5C45BDD2177B8FE4CFEBBFEECECBA1FEF60202C
31,644,042 UART: [art] PUB.Y = 7C344ABAF6A4D99A170A6B20158A33F89181626F030FF239A407CDB261AF2FB51E737019DDE3BC90E78ADBF206317F43
31,651,321 UART: [art] SIG.R = 9D1D40E2F7C3DFBD99BA94E3018D8C6C74AE4047AA1E3EC06985524DEAB2353A05F06407BFD0DFE1C58BFDFB63F9A2AE
31,658,701 UART: [art] SIG.S = 31A824BA68450FD6AF5E8FAFCF84F152F3C2A058F656C86E9665FC9B3EF0B95EF33BD8244675908B05ABAAE898379A25
32,964,023 UART: Caliptra RT
32,964,742 UART: [state] CFI Enabled
33,082,841 UART: [rt] RT listening for mailbox commands...
33,084,786 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,115,658 UART: [rt]cmd =0x44504543, len=136
38,674,338 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,065 UART:
192,440 UART: Running Caliptra ROM ...
193,618 UART:
193,799 UART: [state] CFI Enabled
265,435 UART: [state] LifecycleState = Unprovisioned
267,277 UART: [state] DebugLocked = No
269,592 UART: [state] WD Timer not started. Device not locked for debugging
273,975 UART: [kat] SHA2-256
453,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,612 UART: [kat] ++
465,141 UART: [kat] sha1
475,736 UART: [kat] SHA2-256
478,818 UART: [kat] SHA2-384
485,683 UART: [kat] SHA2-512-ACC
488,658 UART: [kat] ECC-384
2,946,993 UART: [kat] HMAC-384Kdf
2,973,276 UART: [kat] LMS
3,502,773 UART: [kat] --
3,509,042 UART: [cold-reset] ++
3,510,426 UART: [fht] FHT @ 0x50003400
3,522,258 UART: [idev] ++
3,522,821 UART: [idev] CDI.KEYID = 6
3,523,986 UART: [idev] SUBJECT.KEYID = 7
3,525,102 UART: [idev] UDS.KEYID = 0
3,526,026 ready_for_fw is high
3,526,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,055 UART: [idev] Erasing UDS.KEYID = 0
6,027,183 UART: [idev] Sha1 KeyId Algorithm
6,049,885 UART: [idev] --
6,053,820 UART: [ldev] ++
6,054,388 UART: [ldev] CDI.KEYID = 6
6,055,272 UART: [ldev] SUBJECT.KEYID = 5
6,056,484 UART: [ldev] AUTHORITY.KEYID = 7
6,057,715 UART: [ldev] FE.KEYID = 1
6,100,907 UART: [ldev] Erasing FE.KEYID = 1
8,603,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,993 UART: [ldev] --
10,416,921 UART: [fwproc] Wait for Commands...
10,418,691 UART: [fwproc] Recv command 0x46574c44
10,420,725 UART: [fwproc] Recv'd Img size: 114448 bytes
13,825,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,701 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,338 >>> mbox cmd response: success
14,283,728 UART: [afmc] ++
14,284,318 UART: [afmc] CDI.KEYID = 6
14,285,227 UART: [afmc] SUBJECT.KEYID = 7
14,286,457 UART: [afmc] AUTHORITY.KEYID = 5
16,831,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,952 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,954 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,839 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,021 UART: [afmc] --
18,630,829 UART: [cold-reset] --
18,633,872 UART: [state] Locking Datavault
18,640,469 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,115 UART: [state] Locking ICCM
18,644,035 UART: [exit] Launching FMC @ 0x40000130
18,652,472 UART:
18,652,715 UART: Running Caliptra FMC ...
18,653,816 UART:
18,653,999 UART: [state] CFI Enabled
18,712,466 UART: [fht] FMC Alias Private Key: 7
20,476,516 UART: [art] Extend RT PCRs Done
20,477,730 UART: [art] Lock RT PCRs Done
20,479,462 UART: [art] Populate DV Done
20,484,821 UART: [fht] FMC Alias Private Key: 7
20,486,498 UART: [art] Derive CDI
20,487,321 UART: [art] Store in in slot 0x4
20,544,733 UART: [art] Derive Key Pair
20,545,731 UART: [art] Store priv key in slot 0x5
23,008,383 UART: [art] Derive Key Pair - Done
23,021,538 UART: [art] Signing Cert with AUTHO
23,022,846 UART: RITY.KEYID = 7
24,733,666 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,161 UART: [art] PUB.X = F66D3E335CFF5F0A4B988DBE65E8826DA81287F8553F4532A7E2140A9A80BDA668C7F8CB641F8A08D92FCF7E84971A61
24,742,463 UART: [art] PUB.Y = 2D72B2776390D3A8EF95E6B373AF25DDED73B9DECD5106A373070786F204E62780542AAAB160E9EECE7F14D84F229362
24,749,724 UART: [art] SIG.R = F572D45C1DCA0BE09BA41BA8E548F2BD6BEFF3FBB56F09847C1C9AE618CEAA7DB010E7BED1C215D2F9A63312D132D2A7
24,757,130 UART: [art] SIG.S = 6B5528C40FF8F5D0F24A4586A0E7816A46904302A6C8911A808CC66B2E0A0C10A7506E5D27C9A614831CBE393ABD5345
25,736,164 UART: Caliptra RT
25,736,859 UART: [state] CFI Enabled
25,900,872 UART: [rt] RT listening for mailbox commands...
25,902,822 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,934,275 UART: [rt]cmd =0x44504543, len=136
30,151,882 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,356,140 ready_for_fw is high
3,356,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,018,750 >>> mbox cmd response: success
18,302,156 UART:
18,302,568 UART: Running Caliptra FMC ...
18,303,714 UART:
18,303,873 UART: [state] CFI Enabled
18,367,651 UART: [fht] FMC Alias Private Key: 7
20,132,522 UART: [art] Extend RT PCRs Done
20,133,745 UART: [art] Lock RT PCRs Done
20,134,991 UART: [art] Populate DV Done
20,140,463 UART: [fht] FMC Alias Private Key: 7
20,141,975 UART: [art] Derive CDI
20,142,739 UART: [art] Store in in slot 0x4
20,200,232 UART: [art] Derive Key Pair
20,201,238 UART: [art] Store priv key in slot 0x5
22,664,499 UART: [art] Derive Key Pair - Done
22,677,346 UART: [art] Signing Cert with AUTHO
22,678,653 UART: RITY.KEYID = 7
24,391,696 UART: [art] Erasing AUTHORITY.KEYID = 7
24,393,183 UART: [art] PUB.X = 9C6FDA7F0A68F6BC7F4B4723A9E89704D8055CF7271A4B2C85B538864B2B0DBC0B56802FF04B567D5FD1FF29D0B513EC
24,400,471 UART: [art] PUB.Y = 51FB8D246E3E21F8DEB1CB6FE5964CF75C5AE34BE2C9D3BB7CF005DBFE4B08EC35FAAD27F8957E81D8759ABDE4B608AB
24,407,830 UART: [art] SIG.R = 2638BD2050D8262DE2DEAB16D8BBC06FB47D8C46A64E1BD5AF994D163C84AAEABB4DD70379A7D73B6F2DD807E5CE9BA0
24,415,221 UART: [art] SIG.S = 4846635FB43C4984691908F10BA1025C63BBDECFFBCBE57DFAB6AE95E4F04E86B4541E2B2108BACE7F470C1AB4CA1C64
25,394,231 UART: Caliptra RT
25,394,946 UART: [state] CFI Enabled
25,560,684 UART: [rt] RT listening for mailbox commands...
25,562,619 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,594,152 UART: [rt]cmd =0x44504543, len=136
29,810,391 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,298 UART:
192,668 UART: Running Caliptra ROM ...
193,806 UART:
603,442 UART: [state] CFI Enabled
616,104 UART: [state] LifecycleState = Unprovisioned
617,974 UART: [state] DebugLocked = No
620,706 UART: [state] WD Timer not started. Device not locked for debugging
623,997 UART: [kat] SHA2-256
803,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,730 UART: [kat] ++
815,276 UART: [kat] sha1
827,784 UART: [kat] SHA2-256
830,847 UART: [kat] SHA2-384
836,469 UART: [kat] SHA2-512-ACC
839,477 UART: [kat] ECC-384
3,279,412 UART: [kat] HMAC-384Kdf
3,293,133 UART: [kat] LMS
3,822,632 UART: [kat] --
3,828,501 UART: [cold-reset] ++
3,829,928 UART: [fht] FHT @ 0x50003400
3,840,188 UART: [idev] ++
3,840,749 UART: [idev] CDI.KEYID = 6
3,841,690 UART: [idev] SUBJECT.KEYID = 7
3,842,852 UART: [idev] UDS.KEYID = 0
3,843,841 ready_for_fw is high
3,844,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,755 UART: [idev] Erasing UDS.KEYID = 0
6,312,635 UART: [idev] Sha1 KeyId Algorithm
6,335,856 UART: [idev] --
6,339,569 UART: [ldev] ++
6,340,131 UART: [ldev] CDI.KEYID = 6
6,341,098 UART: [ldev] SUBJECT.KEYID = 5
6,342,249 UART: [ldev] AUTHORITY.KEYID = 7
6,343,470 UART: [ldev] FE.KEYID = 1
6,352,323 UART: [ldev] Erasing FE.KEYID = 1
8,825,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,638 UART: [ldev] --
10,614,782 UART: [fwproc] Wait for Commands...
10,616,781 UART: [fwproc] Recv command 0x46574c44
10,618,868 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,874 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,679 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,486,508 >>> mbox cmd response: success
14,490,651 UART: [afmc] ++
14,491,243 UART: [afmc] CDI.KEYID = 6
14,492,152 UART: [afmc] SUBJECT.KEYID = 7
14,493,302 UART: [afmc] AUTHORITY.KEYID = 5
16,996,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,195 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,056 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,815 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,831 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,708 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,189 UART: [afmc] --
18,795,200 UART: [cold-reset] --
18,799,544 UART: [state] Locking Datavault
18,804,840 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,537 UART: [state] Locking ICCM
18,809,116 UART: [exit] Launching FMC @ 0x40000130
18,817,503 UART:
18,817,732 UART: Running Caliptra FMC ...
18,818,826 UART:
18,818,972 UART: [state] CFI Enabled
18,827,010 UART: [fht] FMC Alias Private Key: 7
20,584,098 UART: [art] Extend RT PCRs Done
20,585,328 UART: [art] Lock RT PCRs Done
20,586,788 UART: [art] Populate DV Done
20,592,087 UART: [fht] FMC Alias Private Key: 7
20,593,791 UART: [art] Derive CDI
20,594,616 UART: [art] Store in in slot 0x4
20,636,832 UART: [art] Derive Key Pair
20,637,870 UART: [art] Store priv key in slot 0x5
23,064,811 UART: [art] Derive Key Pair - Done
23,077,593 UART: [art] Signing Cert with AUTHO
23,078,888 UART: RITY.KEYID = 7
24,784,106 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,618 UART: [art] PUB.X = 1B74DF9A80E5F0075C808C3660C12CCD569DDBE64D5E578D67C5B69831839E7C041050ACBFE8759E9659F01780542C76
24,792,899 UART: [art] PUB.Y = CA44B5AB012B137803C20454D7C4AF3E5A8FA91BE932BB0EA274E76DC77701F39AFE9431516A7F7DCEC08B1EF4AE266E
24,800,161 UART: [art] SIG.R = DB076809D4D1588712C24AB62AB901D888B0D0F644F4C3D618A812A7E13CAA5E1964366B925A55E7D08C88BAD4DFF706
24,807,543 UART: [art] SIG.S = 657BBC25A52F4F8E48665378E8135BD3BF283262850C88ED09201AB0C48E9D0A22BF08553633259854E3519E22CE1BD5
25,786,436 UART: Caliptra RT
25,787,146 UART: [state] CFI Enabled
25,904,900 UART: [rt] RT listening for mailbox commands...
25,906,808 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,937,654 UART: [rt]cmd =0x44504543, len=136
30,107,553 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,697,833 ready_for_fw is high
3,698,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,259,332 >>> mbox cmd response: success
18,512,960 UART:
18,513,355 UART: Running Caliptra FMC ...
18,514,548 UART:
18,514,713 UART: [state] CFI Enabled
18,522,605 UART: [fht] FMC Alias Private Key: 7
20,279,030 UART: [art] Extend RT PCRs Done
20,280,260 UART: [art] Lock RT PCRs Done
20,281,994 UART: [art] Populate DV Done
20,287,461 UART: [fht] FMC Alias Private Key: 7
20,289,111 UART: [art] Derive CDI
20,289,920 UART: [art] Store in in slot 0x4
20,332,746 UART: [art] Derive Key Pair
20,333,790 UART: [art] Store priv key in slot 0x5
22,760,440 UART: [art] Derive Key Pair - Done
22,773,173 UART: [art] Signing Cert with AUTHO
22,774,503 UART: RITY.KEYID = 7
24,479,773 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,275 UART: [art] PUB.X = 23E50845783B85A01B085A89EF6923164D92F7593A58625B55B32930D6F60D869901D1CDA6263DE1A101C2751ABFA154
24,488,577 UART: [art] PUB.Y = 45585773E4681ABF8933ADFF14708B1751BCCB3F5B24AFF53CCCE83B8EDC90902BF9943A2722164F513FDBA87C94BDF8
24,495,804 UART: [art] SIG.R = 54E64865039D9F6F5369D813BFF9DD02831AB54B34968283C8950678E7B2A92AAEAFFD3B669010B1AC99920B712BF2DD
24,503,157 UART: [art] SIG.S = E277E69F8E9B0B93E641BB2A1CF8C5B3A1D410D0E0FD43F0EB88FAB2630AD0BD8E71392E0AF002D8FFA0C20A8DB3B64B
25,482,130 UART: Caliptra RT
25,482,851 UART: [state] CFI Enabled
25,599,976 UART: [rt] RT listening for mailbox commands...
25,601,900 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,632,708 UART: [rt]cmd =0x44504543, len=136
29,802,715 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,436,365 ready_for_fw is high
3,436,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,233 >>> mbox cmd response: success
19,024,833 UART:
19,025,238 UART: Running Caliptra FMC ...
19,026,375 UART:
19,026,540 UART: [state] CFI Enabled
19,092,599 UART: [fht] FMC Alias Private Key: 7
20,856,391 UART: [art] Extend RT PCRs Done
20,857,606 UART: [art] Lock RT PCRs Done
20,859,341 UART: [art] Populate DV Done
20,864,667 UART: [fht] FMC Alias Private Key: 7
20,866,373 UART: [art] Derive CDI
20,867,189 UART: [art] Store in in slot 0x4
20,925,466 UART: [art] Derive Key Pair
20,926,464 UART: [art] Store priv key in slot 0x5
23,389,668 UART: [art] Derive Key Pair - Done
23,402,776 UART: [art] Signing Cert with AUTHO
23,404,079 UART: RITY.KEYID = 7
25,115,722 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,228 UART: [art] PUB.X = F434773987E4B8EF639F26F1D739FB6DD8BB1FD4C6F98014664B2888F6F721B1C8D1D66882248D359385624EFE9ECDD0
25,124,471 UART: [art] PUB.Y = 9FB75C64A0E2B3C9E502802AFFB4F59DAFC7F6E756BA65569EB4BCE4E71A7B16ABF92092F75FC7F78594C64D61F420C4
25,131,778 UART: [art] SIG.R = 39E7DE27C12A6F661EC83BAC6836EB0735F6E1CA221C0A0298D037A7564232C7EBF98698CC7D3281AD3F06B6E0EE6712
25,139,164 UART: [art] SIG.S = A41BBB78E9B1D2F40F23D758F4ED9D8680E49F3F4CD1E7C2A9F49D6006A9844B4FCE6C8C6C7097DD89F55BF01EF75C9E
26,118,197 UART: Caliptra RT
26,118,887 UART: [state] CFI Enabled
26,284,225 UART: [rt] RT listening for mailbox commands...
26,286,169 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,317,571 UART: [rt]cmd =0x44504543, len=136
30,534,980 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,759,599 ready_for_fw is high
3,760,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,960,620 >>> mbox cmd response: success
19,215,153 UART:
19,215,541 UART: Running Caliptra FMC ...
19,216,730 UART:
19,216,894 UART: [state] CFI Enabled
19,224,743 UART: [fht] FMC Alias Private Key: 7
20,981,419 UART: [art] Extend RT PCRs Done
20,982,639 UART: [art] Lock RT PCRs Done
20,984,536 UART: [art] Populate DV Done
20,989,886 UART: [fht] FMC Alias Private Key: 7
20,991,475 UART: [art] Derive CDI
20,992,303 UART: [art] Store in in slot 0x4
21,034,784 UART: [art] Derive Key Pair
21,035,788 UART: [art] Store priv key in slot 0x5
23,462,377 UART: [art] Derive Key Pair - Done
23,475,300 UART: [art] Signing Cert with AUTHO
23,476,605 UART: RITY.KEYID = 7
25,182,531 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,041 UART: [art] PUB.X = 62378EB2093542F6389BDE29D47442C387A6C0147FF406D35C8494E11CDBBF98882F4D990BEB81364D7A1ADAE82BA449
25,191,277 UART: [art] PUB.Y = 869A8B43402E8A1F7BAA043AEFCBC691A942FC3C58172AEDEE15B6823B3A97B7A5FAE75EC56C2968B3D218E225976BF5
25,198,555 UART: [art] SIG.R = DFE510340C71F16ADCB8ACE927DFA26A175C525FF368C90636724CD2711A7A74CF5454641E24FCBE779219972140DCB6
25,205,934 UART: [art] SIG.S = 61AD3922EC5DE5DA155CD1CD59E1AEF893D285CA8EDD1C1504C7A965C7D917E8ED8D4C3FFA7F2C756ABBF65164877D95
26,185,082 UART: Caliptra RT
26,185,768 UART: [state] CFI Enabled
26,303,568 UART: [rt] RT listening for mailbox commands...
26,305,484 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,336,289 UART: [rt]cmd =0x44504543, len=136
30,505,598 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,815 UART: [kat] SHA2-256
881,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,861 UART: [kat] ++
886,013 UART: [kat] sha1
890,299 UART: [kat] SHA2-256
892,237 UART: [kat] SHA2-384
895,130 UART: [kat] SHA2-512-ACC
897,031 UART: [kat] ECC-384
902,940 UART: [kat] HMAC-384Kdf
907,494 UART: [kat] LMS
1,475,690 UART: [kat] --
1,476,563 UART: [cold-reset] ++
1,477,015 UART: [fht] Storing FHT @ 0x50003400
1,480,042 UART: [idev] ++
1,480,210 UART: [idev] CDI.KEYID = 6
1,480,570 UART: [idev] SUBJECT.KEYID = 7
1,480,994 UART: [idev] UDS.KEYID = 0
1,481,339 ready_for_fw is high
1,481,339 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,270 UART: [idev] Erasing UDS.KEYID = 0
1,505,954 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,662 UART: [idev] --
1,515,685 UART: [ldev] ++
1,515,853 UART: [ldev] CDI.KEYID = 6
1,516,216 UART: [ldev] SUBJECT.KEYID = 5
1,516,642 UART: [ldev] AUTHORITY.KEYID = 7
1,517,105 UART: [ldev] FE.KEYID = 1
1,522,557 UART: [ldev] Erasing FE.KEYID = 1
1,548,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,352 UART: [ldev] --
1,587,713 UART: [fwproc] Waiting for Commands...
1,588,404 UART: [fwproc] Received command 0x46574c44
1,589,195 UART: [fwproc] Received Image of size 114448 bytes
2,887,942 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,412 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,764 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,905 >>> mbox cmd response: success
3,082,083 UART: [afmc] ++
3,082,251 UART: [afmc] CDI.KEYID = 6
3,082,613 UART: [afmc] SUBJECT.KEYID = 7
3,083,038 UART: [afmc] AUTHORITY.KEYID = 5
3,117,933 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,213 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,721 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,606 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,296 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,109 UART: [afmc] --
3,160,991 UART: [cold-reset] --
3,161,913 UART: [state] Locking Datavault
3,163,012 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,616 UART: [state] Locking ICCM
3,164,104 UART: [exit] Launching FMC @ 0x40000130
3,169,433 UART:
3,169,449 UART: Running Caliptra FMC ...
3,169,857 UART:
3,169,911 UART: [state] CFI Enabled
3,180,448 UART: [fht] FMC Alias Private Key: 7
3,288,921 UART: [art] Extend RT PCRs Done
3,289,349 UART: [art] Lock RT PCRs Done
3,290,915 UART: [art] Populate DV Done
3,299,542 UART: [fht] FMC Alias Private Key: 7
3,300,484 UART: [art] Derive CDI
3,300,764 UART: [art] Store in in slot 0x4
3,386,647 UART: [art] Derive Key Pair
3,387,007 UART: [art] Store priv key in slot 0x5
3,400,333 UART: [art] Derive Key Pair - Done
3,414,929 UART: [art] Signing Cert with AUTHO
3,415,409 UART: RITY.KEYID = 7
3,430,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,044 UART: [art] PUB.X = 1077DA05AFBDDACCF678F542CEE2B335580DE66C4D17C3F90D48FC413D323195AEFA2054DBCAFD873E1C44B3CED90B4A
3,437,828 UART: [art] PUB.Y = 02249253C152063A70352285AD7C8B71C88DDBF5CB83E52D9F874D41AB272B5ED2488A8C72DCF74E5307C41862A5C6A4
3,444,771 UART: [art] SIG.R = 29F6646CB5DBE45F0A7FC09FC16C7AA0B25EC71A5A4477C43BD36EA8C3017655BC4E1F80E77DD500747E9C8FDA5561A6
3,451,529 UART: [art] SIG.S = F7197450BA7244063123C12702968963E77DB66364393EB61E59BB0A5D31DE48ACA5374510E71DEE90F649509097DC4E
3,475,347 UART: Caliptra RT
3,475,600 UART: [state] CFI Enabled
3,583,323 UART: [rt] RT listening for mailbox commands...
3,583,993 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,611 UART: [rt]cmd =0x44504543, len=136
3,677,918 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,463 ready_for_fw is high
1,362,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,275 >>> mbox cmd response: success
2,990,471 UART:
2,990,487 UART: Running Caliptra FMC ...
2,990,895 UART:
2,990,949 UART: [state] CFI Enabled
3,001,718 UART: [fht] FMC Alias Private Key: 7
3,109,309 UART: [art] Extend RT PCRs Done
3,109,737 UART: [art] Lock RT PCRs Done
3,111,355 UART: [art] Populate DV Done
3,119,302 UART: [fht] FMC Alias Private Key: 7
3,120,250 UART: [art] Derive CDI
3,120,530 UART: [art] Store in in slot 0x4
3,206,165 UART: [art] Derive Key Pair
3,206,525 UART: [art] Store priv key in slot 0x5
3,219,223 UART: [art] Derive Key Pair - Done
3,233,602 UART: [art] Signing Cert with AUTHO
3,234,082 UART: RITY.KEYID = 7
3,249,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,847 UART: [art] PUB.X = AA94137BC67B240B650FD7872500F94B169845948A0F7EEFBB0E3477ECDEFB524E79A90A3C8FB8AC41CD58D90609435D
3,256,584 UART: [art] PUB.Y = AFC9A4052BC5BC68DC87A1A4744F92E198E50F546CF33382188628B83DEE04AA43510FC47B7D120514E283C02BE48C60
3,263,523 UART: [art] SIG.R = F998FFC02C159A656822500F69D2104598359674CA364957FF88CE2C588C469ADF0309569C9F87F0D55CE67FB7B264FC
3,270,282 UART: [art] SIG.S = E59B977C07BEDA5693BDE896863D799A8D34BD7AC51D0623A405A7ADA095D507699A0B7BFF00D0137146C7726386A83C
3,293,498 UART: Caliptra RT
3,293,751 UART: [state] CFI Enabled
3,401,765 UART: [rt] RT listening for mailbox commands...
3,402,435 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,163 UART: [rt]cmd =0x44504543, len=136
3,496,788 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,248 UART: [kat] SHA2-256
882,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,294 UART: [kat] ++
886,446 UART: [kat] sha1
890,660 UART: [kat] SHA2-256
892,598 UART: [kat] SHA2-384
895,549 UART: [kat] SHA2-512-ACC
897,450 UART: [kat] ECC-384
903,021 UART: [kat] HMAC-384Kdf
907,789 UART: [kat] LMS
1,475,985 UART: [kat] --
1,477,094 UART: [cold-reset] ++
1,477,454 UART: [fht] Storing FHT @ 0x50003400
1,480,439 UART: [idev] ++
1,480,607 UART: [idev] CDI.KEYID = 6
1,480,967 UART: [idev] SUBJECT.KEYID = 7
1,481,391 UART: [idev] UDS.KEYID = 0
1,481,736 ready_for_fw is high
1,481,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,993 UART: [idev] Erasing UDS.KEYID = 0
1,505,515 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,231 UART: [idev] --
1,515,212 UART: [ldev] ++
1,515,380 UART: [ldev] CDI.KEYID = 6
1,515,743 UART: [ldev] SUBJECT.KEYID = 5
1,516,169 UART: [ldev] AUTHORITY.KEYID = 7
1,516,632 UART: [ldev] FE.KEYID = 1
1,521,960 UART: [ldev] Erasing FE.KEYID = 1
1,548,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,549 UART: [ldev] --
1,587,810 UART: [fwproc] Waiting for Commands...
1,588,643 UART: [fwproc] Received command 0x46574c44
1,589,434 UART: [fwproc] Received Image of size 114448 bytes
2,889,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,219 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,571 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,580 >>> mbox cmd response: success
3,082,698 UART: [afmc] ++
3,082,866 UART: [afmc] CDI.KEYID = 6
3,083,228 UART: [afmc] SUBJECT.KEYID = 7
3,083,653 UART: [afmc] AUTHORITY.KEYID = 5
3,118,890 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,164 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,944 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,672 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,557 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,247 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,174 UART: [afmc] --
3,162,242 UART: [cold-reset] --
3,163,016 UART: [state] Locking Datavault
3,164,427 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,031 UART: [state] Locking ICCM
3,165,539 UART: [exit] Launching FMC @ 0x40000130
3,170,868 UART:
3,170,884 UART: Running Caliptra FMC ...
3,171,292 UART:
3,171,435 UART: [state] CFI Enabled
3,182,008 UART: [fht] FMC Alias Private Key: 7
3,289,731 UART: [art] Extend RT PCRs Done
3,290,159 UART: [art] Lock RT PCRs Done
3,291,507 UART: [art] Populate DV Done
3,299,762 UART: [fht] FMC Alias Private Key: 7
3,300,886 UART: [art] Derive CDI
3,301,166 UART: [art] Store in in slot 0x4
3,386,909 UART: [art] Derive Key Pair
3,387,269 UART: [art] Store priv key in slot 0x5
3,401,049 UART: [art] Derive Key Pair - Done
3,415,706 UART: [art] Signing Cert with AUTHO
3,416,186 UART: RITY.KEYID = 7
3,431,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,343 UART: [art] PUB.X = F734029D0FDD1473C77C7C4FCA9A6793459EE9830279CB14086F62A2DD6C542B7F58E9B9EF5EE064D4718F3CAF8F069C
3,439,108 UART: [art] PUB.Y = 5568CD93938A259E570AB140F424E666A8C44BB9CC871A936860CB507916260A2878207347DA13E4485CAA2D4BA42F1B
3,446,048 UART: [art] SIG.R = AE56403AEB418F83ACAA61DD79DDC7971C4014A5E709F474D44F83F8FE7F6923B835F8A5E0BF91EEAE89B53F9381C1CB
3,452,833 UART: [art] SIG.S = 97FADD1C9D1122A90AFD3F743C18416D4779BAA3E9FE5E836BBE4A5D224D6F3919772185D9FC27A8D98F223D841756E6
3,476,633 UART: Caliptra RT
3,476,978 UART: [state] CFI Enabled
3,585,638 UART: [rt] RT listening for mailbox commands...
3,586,308 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,904 UART: [rt]cmd =0x44504543, len=136
3,680,989 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,092 ready_for_fw is high
1,363,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,676 >>> mbox cmd response: success
2,993,288 UART:
2,993,304 UART: Running Caliptra FMC ...
2,993,712 UART:
2,993,855 UART: [state] CFI Enabled
3,004,528 UART: [fht] FMC Alias Private Key: 7
3,112,451 UART: [art] Extend RT PCRs Done
3,112,879 UART: [art] Lock RT PCRs Done
3,113,997 UART: [art] Populate DV Done
3,122,232 UART: [fht] FMC Alias Private Key: 7
3,123,338 UART: [art] Derive CDI
3,123,618 UART: [art] Store in in slot 0x4
3,209,583 UART: [art] Derive Key Pair
3,209,943 UART: [art] Store priv key in slot 0x5
3,223,399 UART: [art] Derive Key Pair - Done
3,238,504 UART: [art] Signing Cert with AUTHO
3,238,984 UART: RITY.KEYID = 7
3,253,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,585 UART: [art] PUB.X = 1C6A5EEA3EAA235DF51DF119E0591DA39D320BABD5D2DD1849746004851A7A505CE6186A1FEC8A5D2AB379FF73EA3C5A
3,261,369 UART: [art] PUB.Y = 510FC5208E130B3012ED542EA78127FB0C31FA1F962B25F78086C47F9F0ECBBCE5F9051911E33179B2B4C364F0D316D6
3,268,308 UART: [art] SIG.R = C390193D34297C5539A2908F2098B4A06C41E6D189A1A577E8427420813181F729D73D2625B08476B1299B47687579A5
3,275,056 UART: [art] SIG.S = F75F563B270F9F068FCE8AF5CFBED9E791AC5DF5881E1D5F80BC0804D0A52AD973D237B523F63957CD00BDB8AC7A6F19
3,299,193 UART: Caliptra RT
3,299,538 UART: [state] CFI Enabled
3,407,966 UART: [rt] RT listening for mailbox commands...
3,408,636 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,056 UART: [rt]cmd =0x44504543, len=136
3,502,439 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
893,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,343 UART: [kat] ++
897,495 UART: [kat] sha1
901,765 UART: [kat] SHA2-256
903,705 UART: [kat] SHA2-384
906,522 UART: [kat] SHA2-512-ACC
908,423 UART: [kat] ECC-384
918,174 UART: [kat] HMAC-384Kdf
922,570 UART: [kat] LMS
1,170,898 UART: [kat] --
1,171,551 UART: [cold-reset] ++
1,172,127 UART: [fht] FHT @ 0x50003400
1,174,622 UART: [idev] ++
1,174,790 UART: [idev] CDI.KEYID = 6
1,175,150 UART: [idev] SUBJECT.KEYID = 7
1,175,574 UART: [idev] UDS.KEYID = 0
1,175,919 ready_for_fw is high
1,175,919 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,554 UART: [idev] Erasing UDS.KEYID = 0
1,200,493 UART: [idev] Sha1 KeyId Algorithm
1,208,955 UART: [idev] --
1,210,069 UART: [ldev] ++
1,210,237 UART: [ldev] CDI.KEYID = 6
1,210,600 UART: [ldev] SUBJECT.KEYID = 5
1,211,026 UART: [ldev] AUTHORITY.KEYID = 7
1,211,489 UART: [ldev] FE.KEYID = 1
1,216,765 UART: [ldev] Erasing FE.KEYID = 1
1,243,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,219 UART: [ldev] --
1,282,724 UART: [fwproc] Wait for Commands...
1,283,312 UART: [fwproc] Recv command 0x46574c44
1,284,040 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,288 >>> mbox cmd response: success
2,777,482 UART: [afmc] ++
2,777,650 UART: [afmc] CDI.KEYID = 6
2,778,012 UART: [afmc] SUBJECT.KEYID = 7
2,778,437 UART: [afmc] AUTHORITY.KEYID = 5
2,813,808 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,883 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,629 UART: [afmc] --
2,856,753 UART: [cold-reset] --
2,857,533 UART: [state] Locking Datavault
2,858,630 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,234 UART: [state] Locking ICCM
2,859,772 UART: [exit] Launching FMC @ 0x40000130
2,865,101 UART:
2,865,117 UART: Running Caliptra FMC ...
2,865,525 UART:
2,865,579 UART: [state] CFI Enabled
2,875,750 UART: [fht] FMC Alias Private Key: 7
2,983,363 UART: [art] Extend RT PCRs Done
2,983,791 UART: [art] Lock RT PCRs Done
2,985,267 UART: [art] Populate DV Done
2,993,252 UART: [fht] FMC Alias Private Key: 7
2,994,242 UART: [art] Derive CDI
2,994,522 UART: [art] Store in in slot 0x4
3,080,111 UART: [art] Derive Key Pair
3,080,471 UART: [art] Store priv key in slot 0x5
3,094,003 UART: [art] Derive Key Pair - Done
3,108,738 UART: [art] Signing Cert with AUTHO
3,109,218 UART: RITY.KEYID = 7
3,124,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,105 UART: [art] PUB.X = 7D258BAF5AE22F5E77EDE365B41AAF9608C7EF361C9FA07134D368424828FE7E271377A9FEA4197910FBBA0871D11DC7
3,131,879 UART: [art] PUB.Y = A539BB0620E62B4BA956A0BF953BAD32DBA524F33E9CF72ED7A6D4DBC7E08A0B54131BE6FF877D5A2FFA3C378A5E6154
3,138,845 UART: [art] SIG.R = 2CBEE5CF505320948CBD730023475B86578391D0AE55CA0BB037E845A5BC5D296F03ECB6B501CD258F5D3F539ED25D33
3,145,592 UART: [art] SIG.S = 94DE026A3D2B7306F666DAC30522CEC7206486B54D19DC2061C1B9C2538D636E5439B8341F97FC23086EB7E42DD7B6F2
3,169,265 UART: Caliptra RT
3,169,518 UART: [state] CFI Enabled
3,277,025 UART: [rt] RT listening for mailbox commands...
3,277,695 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,395 UART: [rt]cmd =0x44504543, len=136
3,372,576 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,535 ready_for_fw is high
1,059,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,725 >>> mbox cmd response: success
2,689,679 UART:
2,689,695 UART: Running Caliptra FMC ...
2,690,103 UART:
2,690,157 UART: [state] CFI Enabled
2,700,542 UART: [fht] FMC Alias Private Key: 7
2,808,885 UART: [art] Extend RT PCRs Done
2,809,313 UART: [art] Lock RT PCRs Done
2,810,945 UART: [art] Populate DV Done
2,819,098 UART: [fht] FMC Alias Private Key: 7
2,820,092 UART: [art] Derive CDI
2,820,372 UART: [art] Store in in slot 0x4
2,905,835 UART: [art] Derive Key Pair
2,906,195 UART: [art] Store priv key in slot 0x5
2,919,369 UART: [art] Derive Key Pair - Done
2,934,048 UART: [art] Signing Cert with AUTHO
2,934,528 UART: RITY.KEYID = 7
2,950,242 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,007 UART: [art] PUB.X = 4EE4342DE9FC1DAE559E88B9C9388CA6901B4A74A08FF64AFDB5276723136BE90DA9E7D8033C78220DA2FBEFB5F3D292
2,957,784 UART: [art] PUB.Y = 95D7AEEA77C9DCD25A82081233B46638F50B0A5E8FF74C8F1C85DC6A508DDA391ADFBDF50F360F761F4ABE838ABFAB3B
2,964,745 UART: [art] SIG.R = C0E6CE0747D7BE50836FA8A3C2751E8E638BA35FC0813B2DCC7E950C9F098E010C7512CC57C3C634AD749F413C6BE731
2,971,510 UART: [art] SIG.S = CD0F4AC84AF9BE7C7BA1C135D0D2F527941D12DE9FE05B9DB084CFA83F399671154F63A03BCE130E7221B07F2FF7D17B
2,995,241 UART: Caliptra RT
2,995,494 UART: [state] CFI Enabled
3,103,668 UART: [rt] RT listening for mailbox commands...
3,104,338 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,182 UART: [rt]cmd =0x44504543, len=136
3,198,243 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
893,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,868 UART: [kat] ++
898,020 UART: [kat] sha1
902,066 UART: [kat] SHA2-256
904,006 UART: [kat] SHA2-384
906,681 UART: [kat] SHA2-512-ACC
908,582 UART: [kat] ECC-384
918,483 UART: [kat] HMAC-384Kdf
923,149 UART: [kat] LMS
1,171,477 UART: [kat] --
1,172,374 UART: [cold-reset] ++
1,172,740 UART: [fht] FHT @ 0x50003400
1,175,303 UART: [idev] ++
1,175,471 UART: [idev] CDI.KEYID = 6
1,175,831 UART: [idev] SUBJECT.KEYID = 7
1,176,255 UART: [idev] UDS.KEYID = 0
1,176,600 ready_for_fw is high
1,176,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,249 UART: [idev] Erasing UDS.KEYID = 0
1,201,274 UART: [idev] Sha1 KeyId Algorithm
1,209,794 UART: [idev] --
1,210,866 UART: [ldev] ++
1,211,034 UART: [ldev] CDI.KEYID = 6
1,211,397 UART: [ldev] SUBJECT.KEYID = 5
1,211,823 UART: [ldev] AUTHORITY.KEYID = 7
1,212,286 UART: [ldev] FE.KEYID = 1
1,217,554 UART: [ldev] Erasing FE.KEYID = 1
1,243,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,340 UART: [ldev] --
1,282,705 UART: [fwproc] Wait for Commands...
1,283,299 UART: [fwproc] Recv command 0x46574c44
1,284,027 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,765 >>> mbox cmd response: success
2,776,843 UART: [afmc] ++
2,777,011 UART: [afmc] CDI.KEYID = 6
2,777,373 UART: [afmc] SUBJECT.KEYID = 7
2,777,798 UART: [afmc] AUTHORITY.KEYID = 5
2,814,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,050 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,663 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,382 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,114 UART: [afmc] --
2,857,148 UART: [cold-reset] --
2,857,908 UART: [state] Locking Datavault
2,859,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,665 UART: [state] Locking ICCM
2,860,097 UART: [exit] Launching FMC @ 0x40000130
2,865,426 UART:
2,865,442 UART: Running Caliptra FMC ...
2,865,850 UART:
2,865,993 UART: [state] CFI Enabled
2,876,324 UART: [fht] FMC Alias Private Key: 7
2,983,819 UART: [art] Extend RT PCRs Done
2,984,247 UART: [art] Lock RT PCRs Done
2,985,777 UART: [art] Populate DV Done
2,993,872 UART: [fht] FMC Alias Private Key: 7
2,995,018 UART: [art] Derive CDI
2,995,298 UART: [art] Store in in slot 0x4
3,080,547 UART: [art] Derive Key Pair
3,080,907 UART: [art] Store priv key in slot 0x5
3,094,587 UART: [art] Derive Key Pair - Done
3,109,491 UART: [art] Signing Cert with AUTHO
3,109,971 UART: RITY.KEYID = 7
3,125,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,556 UART: [art] PUB.X = 1350F92AB18A8418A977487AA4155D7882840B1BA5CF1982272BCD005D59A2FF772D9D1E4012AE101F0BAC066CFA3AB6
3,133,301 UART: [art] PUB.Y = 76A0CD6545AF979A768AEF68E592A194EAFC12E99159D3E88A221A090D5B15D1CFE477191233ABC297121FF1D71E4441
3,140,249 UART: [art] SIG.R = A750B3830DBEA0B17966BCBCC007912DA164C16C4858339A8777226659FFB0048F89DA0018DDD6DF2362E83A38303CC6
3,146,990 UART: [art] SIG.S = D810B0D8AF907434026BD555C7F44EA7622B25E1FC5496C10D1739E102D61E827823A82A860198179B9025759B05E39F
3,170,114 UART: Caliptra RT
3,170,459 UART: [state] CFI Enabled
3,277,739 UART: [rt] RT listening for mailbox commands...
3,278,409 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,919 UART: [rt]cmd =0x44504543, len=136
3,372,410 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,940 ready_for_fw is high
1,060,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,728 >>> mbox cmd response: success
2,691,420 UART:
2,691,436 UART: Running Caliptra FMC ...
2,691,844 UART:
2,691,987 UART: [state] CFI Enabled
2,702,638 UART: [fht] FMC Alias Private Key: 7
2,810,649 UART: [art] Extend RT PCRs Done
2,811,077 UART: [art] Lock RT PCRs Done
2,812,509 UART: [art] Populate DV Done
2,820,878 UART: [fht] FMC Alias Private Key: 7
2,822,046 UART: [art] Derive CDI
2,822,326 UART: [art] Store in in slot 0x4
2,908,187 UART: [art] Derive Key Pair
2,908,547 UART: [art] Store priv key in slot 0x5
2,922,315 UART: [art] Derive Key Pair - Done
2,936,895 UART: [art] Signing Cert with AUTHO
2,937,375 UART: RITY.KEYID = 7
2,952,323 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,088 UART: [art] PUB.X = 84E1E9CB88C6D53E0B9EED657CBC80E1AA4E1E4F97B70A5CEE44B03868C424EB1B4FE021E961659660853EAE5CD42894
2,959,866 UART: [art] PUB.Y = E4BF490BE60210862E6FCA43BD5E68FC9436B153BDBA71066A3BBB945ECBB4FFE3DCB0841353DDE89E5C6189BC4E8683
2,966,827 UART: [art] SIG.R = 1ECBF44C3DDA866FE064BE9AFF1539F87B5282C34479123003724A7CD74159B5AFE9489F579EF609E50F8E585A02493B
2,973,589 UART: [art] SIG.S = 99A30F3B094B690949FFC0525C7141B4C0E1A890F176A0653F981F3EE38B4990E6B5EA071C3557E05709B734D90AA747
2,998,236 UART: Caliptra RT
2,998,581 UART: [state] CFI Enabled
3,106,684 UART: [rt] RT listening for mailbox commands...
3,107,354 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,068 UART: [rt]cmd =0x44504543, len=136
3,201,505 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,690 UART: [state] LifecycleState = Unprovisioned
85,345 UART: [state] DebugLocked = No
85,841 UART: [state] WD Timer not started. Device not locked for debugging
87,064 UART: [kat] SHA2-256
890,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,743 UART: [kat] ++
894,895 UART: [kat] sha1
898,927 UART: [kat] SHA2-256
900,867 UART: [kat] SHA2-384
903,726 UART: [kat] SHA2-512-ACC
905,627 UART: [kat] ECC-384
914,978 UART: [kat] HMAC-384Kdf
919,598 UART: [kat] LMS
1,167,910 UART: [kat] --
1,168,969 UART: [cold-reset] ++
1,169,495 UART: [fht] FHT @ 0x50003400
1,172,103 UART: [idev] ++
1,172,271 UART: [idev] CDI.KEYID = 6
1,172,632 UART: [idev] SUBJECT.KEYID = 7
1,173,057 UART: [idev] UDS.KEYID = 0
1,173,403 ready_for_fw is high
1,173,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,095 UART: [idev] Sha1 KeyId Algorithm
1,206,855 UART: [idev] --
1,207,920 UART: [ldev] ++
1,208,088 UART: [ldev] CDI.KEYID = 6
1,208,452 UART: [ldev] SUBJECT.KEYID = 5
1,208,879 UART: [ldev] AUTHORITY.KEYID = 7
1,209,342 UART: [ldev] FE.KEYID = 1
1,214,630 UART: [ldev] Erasing FE.KEYID = 1
1,241,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,864 UART: [ldev] --
1,280,222 UART: [fwproc] Wait for Commands...
1,280,957 UART: [fwproc] Recv command 0x46574c44
1,281,690 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,402 >>> mbox cmd response: success
2,773,671 UART: [afmc] ++
2,773,839 UART: [afmc] CDI.KEYID = 6
2,774,202 UART: [afmc] SUBJECT.KEYID = 7
2,774,628 UART: [afmc] AUTHORITY.KEYID = 5
2,809,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,732 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,344 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,063 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,884 UART: [afmc] --
2,852,898 UART: [cold-reset] --
2,853,726 UART: [state] Locking Datavault
2,854,745 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,349 UART: [state] Locking ICCM
2,855,905 UART: [exit] Launching FMC @ 0x40000130
2,861,234 UART:
2,861,250 UART: Running Caliptra FMC ...
2,861,658 UART:
2,861,712 UART: [state] CFI Enabled
2,872,071 UART: [fht] FMC Alias Private Key: 7
2,979,718 UART: [art] Extend RT PCRs Done
2,980,146 UART: [art] Lock RT PCRs Done
2,981,712 UART: [art] Populate DV Done
2,989,837 UART: [fht] FMC Alias Private Key: 7
2,990,887 UART: [art] Derive CDI
2,991,167 UART: [art] Store in in slot 0x4
3,077,050 UART: [art] Derive Key Pair
3,077,410 UART: [art] Store priv key in slot 0x5
3,090,534 UART: [art] Derive Key Pair - Done
3,105,577 UART: [art] Signing Cert with AUTHO
3,106,057 UART: RITY.KEYID = 7
3,121,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,338 UART: [art] PUB.X = 8E067A219E023C9ADC1BD1E473A530DD474D995BB4EE063D9D6EABBE6A3EF1F6A9B500E416DF03A888FFD4A3A6F72F46
3,129,096 UART: [art] PUB.Y = AD5D2EE49BFA398738FD02F8DD7131344A4ADE549FEDAAE61ED6C4715C36B487E84E8F7870E37E5D6C007B92A9BCB0A9
3,136,041 UART: [art] SIG.R = 12FD1F337C1AB2A88CE816F5CC2C12BE3DD964D61572367C66C9B8837135CA514F3BE6870B539CEB602DC677A7F1B05F
3,142,818 UART: [art] SIG.S = BE09FD24EDE539150F22A3616368D5CB9385C4D859F07DE127A637AF390649353750DC5A9A256EDE7C7F63D233BD34AE
3,166,892 UART: Caliptra RT
3,167,145 UART: [state] CFI Enabled
3,273,816 UART: [rt] RT listening for mailbox commands...
3,274,486 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,358 UART: [rt]cmd =0x44504543, len=136
3,369,391 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,324 ready_for_fw is high
1,055,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,572 >>> mbox cmd response: success
2,683,558 UART:
2,683,574 UART: Running Caliptra FMC ...
2,683,982 UART:
2,684,036 UART: [state] CFI Enabled
2,694,551 UART: [fht] FMC Alias Private Key: 7
2,802,352 UART: [art] Extend RT PCRs Done
2,802,780 UART: [art] Lock RT PCRs Done
2,804,494 UART: [art] Populate DV Done
2,812,675 UART: [fht] FMC Alias Private Key: 7
2,813,633 UART: [art] Derive CDI
2,813,913 UART: [art] Store in in slot 0x4
2,899,694 UART: [art] Derive Key Pair
2,900,054 UART: [art] Store priv key in slot 0x5
2,913,416 UART: [art] Derive Key Pair - Done
2,927,832 UART: [art] Signing Cert with AUTHO
2,928,312 UART: RITY.KEYID = 7
2,943,218 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,983 UART: [art] PUB.X = 7EB1B596F0F60CB5C00B8C5E9DEF3043263EE6CBDB414E47CA878027A2FE2D39B063D2C8458AB8647822A6C44A822A1A
2,950,759 UART: [art] PUB.Y = CA11FF77D106DDD4386208129B968485AEC4FC0080ACE6B47AD3B0E96DA21B843E88CBB22FB8897065E92F00BA2E4311
2,957,669 UART: [art] SIG.R = 57143723963E1404AD28B34174CABE4D1B2428D808956FFE164095B1E012ABF09FA0EF880C8C769507F1078720491847
2,964,414 UART: [art] SIG.S = FEF0B3552589856E3239846E77D5F338C865F73DD1FCFBCEB987426B8CC2B3882845D42811F51639A7E40CE9BC52137B
2,988,786 UART: Caliptra RT
2,989,039 UART: [state] CFI Enabled
3,095,720 UART: [rt] RT listening for mailbox commands...
3,096,390 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,188 UART: [rt]cmd =0x44504543, len=136
3,190,393 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
916,649 UART: [kat] HMAC-384Kdf
921,351 UART: [kat] LMS
1,169,663 UART: [kat] --
1,170,610 UART: [cold-reset] ++
1,171,110 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,175,046 ready_for_fw is high
1,175,046 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,086 UART: [idev] Erasing UDS.KEYID = 0
1,200,640 UART: [idev] Sha1 KeyId Algorithm
1,209,476 UART: [idev] --
1,210,685 UART: [ldev] ++
1,210,853 UART: [ldev] CDI.KEYID = 6
1,211,217 UART: [ldev] SUBJECT.KEYID = 5
1,211,644 UART: [ldev] AUTHORITY.KEYID = 7
1,212,107 UART: [ldev] FE.KEYID = 1
1,217,265 UART: [ldev] Erasing FE.KEYID = 1
1,244,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,265 UART: [ldev] --
1,283,579 UART: [fwproc] Wait for Commands...
1,284,162 UART: [fwproc] Recv command 0x46574c44
1,284,895 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,325 >>> mbox cmd response: success
2,777,494 UART: [afmc] ++
2,777,662 UART: [afmc] CDI.KEYID = 6
2,778,025 UART: [afmc] SUBJECT.KEYID = 7
2,778,451 UART: [afmc] AUTHORITY.KEYID = 5
2,814,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,127 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,856 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,739 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,458 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,451 UART: [afmc] --
2,857,513 UART: [cold-reset] --
2,858,585 UART: [state] Locking Datavault
2,859,866 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,470 UART: [state] Locking ICCM
2,860,922 UART: [exit] Launching FMC @ 0x40000130
2,866,251 UART:
2,866,267 UART: Running Caliptra FMC ...
2,866,675 UART:
2,866,818 UART: [state] CFI Enabled
2,877,497 UART: [fht] FMC Alias Private Key: 7
2,985,622 UART: [art] Extend RT PCRs Done
2,986,050 UART: [art] Lock RT PCRs Done
2,987,990 UART: [art] Populate DV Done
2,996,119 UART: [fht] FMC Alias Private Key: 7
2,997,057 UART: [art] Derive CDI
2,997,337 UART: [art] Store in in slot 0x4
3,083,284 UART: [art] Derive Key Pair
3,083,644 UART: [art] Store priv key in slot 0x5
3,096,626 UART: [art] Derive Key Pair - Done
3,111,815 UART: [art] Signing Cert with AUTHO
3,112,295 UART: RITY.KEYID = 7
3,127,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,296 UART: [art] PUB.X = 48D968312D80C5ABA8A81DD454B369D99146D4707FB35EDE2DB3753CCF815A55D4D184BDFCF98BF0CA0BE973A95A3A1C
3,135,081 UART: [art] PUB.Y = 1CFFEB1921DCF9A686204A10046C6DC4F5B91D5D42DEA478899EA6AFFF3F93A092113260BD21187899065B1E527FEF10
3,142,033 UART: [art] SIG.R = 2C776CCA66EFC33CF87D47A6C5752B58BB59980589ED5CBD5C972BBFF56A7B4DE3824DA69E36EB51D2711D4FBE5D4514
3,148,818 UART: [art] SIG.S = 47ECB7492AA2D3B5A84EDBF3666B39C87CCFBD5BA4AD9F2DC8998C0E35E0F8E98FCE3BE7F8B04061899B8EC6D9D981EA
3,172,564 UART: Caliptra RT
3,172,909 UART: [state] CFI Enabled
3,280,610 UART: [rt] RT listening for mailbox commands...
3,281,280 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,942 UART: [rt]cmd =0x44504543, len=136
3,374,865 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,043 ready_for_fw is high
1,056,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,513 >>> mbox cmd response: success
2,685,589 UART:
2,685,605 UART: Running Caliptra FMC ...
2,686,013 UART:
2,686,156 UART: [state] CFI Enabled
2,696,701 UART: [fht] FMC Alias Private Key: 7
2,804,972 UART: [art] Extend RT PCRs Done
2,805,400 UART: [art] Lock RT PCRs Done
2,806,886 UART: [art] Populate DV Done
2,815,151 UART: [fht] FMC Alias Private Key: 7
2,816,325 UART: [art] Derive CDI
2,816,605 UART: [art] Store in in slot 0x4
2,902,072 UART: [art] Derive Key Pair
2,902,432 UART: [art] Store priv key in slot 0x5
2,915,702 UART: [art] Derive Key Pair - Done
2,930,215 UART: [art] Signing Cert with AUTHO
2,930,695 UART: RITY.KEYID = 7
2,946,031 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,796 UART: [art] PUB.X = 00784DCAECE43D9F57B4023C7872CB379636EF14C087F4073DBE868CB5BD0ABA6BADC38BA619E4189568E61959897CDD
2,953,547 UART: [art] PUB.Y = 959B40058FAF366B3E396CB5F37658765518ED9A3EED42E5B20035CB67F9A1C54FB56F7BB612EC8FB4E62C7D61A6927B
2,960,482 UART: [art] SIG.R = 1677F0293DB13331DCD57A21D43B6262CF8DD96C12B4A3C1216DD582ACAFF347D7AF2AFF2232299B1462255E6EEF1D7B
2,967,264 UART: [art] SIG.S = D38620B6079770A9FFBFBF4716D44746DB98ED3A455F9FBA06C0F90FCAA2B3EB566829F916AFEAF333364B4CFBF27B02
2,990,605 UART: Caliptra RT
2,990,950 UART: [state] CFI Enabled
3,098,925 UART: [rt] RT listening for mailbox commands...
3,099,595 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,413 UART: [rt]cmd =0x44504543, len=136
3,193,636 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,130 UART:
192,527 UART: Running Caliptra ROM ...
193,740 UART:
193,899 UART: [state] CFI Enabled
261,633 UART: [state] LifecycleState = Unprovisioned
263,547 UART: [state] DebugLocked = No
265,296 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,584 UART: [kat] SHA2-256
440,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,777 UART: [kat] ++
451,312 UART: [kat] sha1
462,127 UART: [kat] SHA2-256
464,803 UART: [kat] SHA2-384
469,800 UART: [kat] SHA2-512-ACC
472,165 UART: [kat] ECC-384
2,765,847 UART: [kat] HMAC-384Kdf
2,778,016 UART: [kat] LMS
3,968,333 UART: [kat] --
3,973,151 UART: [cold-reset] ++
3,974,730 UART: [fht] Storing FHT @ 0x50003400
3,985,862 UART: [idev] ++
3,986,437 UART: [idev] CDI.KEYID = 6
3,987,327 UART: [idev] SUBJECT.KEYID = 7
3,988,569 UART: [idev] UDS.KEYID = 0
3,989,570 ready_for_fw is high
3,989,791 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,416 UART: [idev] Erasing UDS.KEYID = 0
7,325,590 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,745 UART: [idev] --
7,352,713 UART: [ldev] ++
7,353,286 UART: [ldev] CDI.KEYID = 6
7,354,227 UART: [ldev] SUBJECT.KEYID = 5
7,355,441 UART: [ldev] AUTHORITY.KEYID = 7
7,356,672 UART: [ldev] FE.KEYID = 1
7,400,960 UART: [ldev] Erasing FE.KEYID = 1
10,732,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,563 UART: [ldev] --
13,116,511 UART: [fwproc] Waiting for Commands...
13,118,982 UART: [fwproc] Received command 0x46574c44
13,121,164 UART: [fwproc] Received Image of size 114124 bytes
17,180,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,261,709 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,330,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,648,569 >>> mbox cmd response: success
17,652,147 UART: [afmc] ++
17,652,752 UART: [afmc] CDI.KEYID = 6
17,653,669 UART: [afmc] SUBJECT.KEYID = 7
17,654,886 UART: [afmc] AUTHORITY.KEYID = 5
21,029,685 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,512 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,771 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,137 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,974 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,482 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,126 UART: [afmc] --
23,399,375 UART: [cold-reset] --
23,402,119 UART: [state] Locking Datavault
23,408,192 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,948 UART: [state] Locking ICCM
23,412,696 UART: [exit] Launching FMC @ 0x40000130
23,421,089 UART:
23,421,363 UART: Running Caliptra FMC ...
23,422,400 UART:
23,422,558 UART: [state] CFI Enabled
23,487,599 UART: [fht] FMC Alias Private Key: 7
25,825,728 UART: [art] Extend RT PCRs Done
25,826,959 UART: [art] Lock RT PCRs Done
25,828,829 UART: [art] Populate DV Done
25,834,134 UART: [fht] FMC Alias Private Key: 7
25,835,834 UART: [art] Derive CDI
25,836,570 UART: [art] Store in in slot 0x4
25,895,618 UART: [art] Derive Key Pair
25,896,676 UART: [art] Store priv key in slot 0x5
29,189,273 UART: [art] Derive Key Pair - Done
29,202,320 UART: [art] Signing Cert with AUTHO
29,203,629 UART: RITY.KEYID = 7
31,490,361 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,869 UART: [art] PUB.X = E5EBF3465B5E6C130F29081F2655F36A1DAF0499922C1128410466D9AF58D788C4C1CD2BA675032C5EAA88E65C93FF69
31,499,121 UART: [art] PUB.Y = 6EFAB414F02B5655035AE0AEB52ABF4BE8D763935FA80E1901C6897686CEDEFC5A0D918021EA33F19125EE0F39AF9CD1
31,506,355 UART: [art] SIG.R = 5E82B74205DAB7BF49DFD87363CE9EEC565C5E3139F75A43B01EAC8682A641136989DAC8E62CC3AFBD01987493C0EB83
31,513,749 UART: [art] SIG.S = C3F8BFA39114EAE41CF41CC3B9208749C98C29C66BE42BDD9B190AB6233D7AA791655AF76E6D416CF1B1DA844738FB1E
32,819,258 UART: Caliptra RT
32,819,961 UART: [state] CFI Enabled
32,999,872 UART: [rt] RT listening for mailbox commands...
33,002,375 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,032,975 UART: [rt]cmd =0x44504543, len=92
41,085,270 >>> mbox cmd response data (6284 bytes)
41,114,618 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,144,446 UART: [rt]cmd =0x43455252, len=4
41,155,926 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,806,830 ready_for_fw is high
3,807,268 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,879,126 >>> mbox cmd response: success
23,566,531 UART:
23,566,914 UART: Running Caliptra FMC ...
23,568,027 UART:
23,568,185 UART: [state] CFI Enabled
23,634,946 UART: [fht] FMC Alias Private Key: 7
25,972,614 UART: [art] Extend RT PCRs Done
25,973,843 UART: [art] Lock RT PCRs Done
25,975,607 UART: [art] Populate DV Done
25,981,402 UART: [fht] FMC Alias Private Key: 7
25,983,051 UART: [art] Derive CDI
25,983,795 UART: [art] Store in in slot 0x4
26,043,695 UART: [art] Derive Key Pair
26,044,732 UART: [art] Store priv key in slot 0x5
29,337,537 UART: [art] Derive Key Pair - Done
29,350,374 UART: [art] Signing Cert with AUTHO
29,351,680 UART: RITY.KEYID = 7
31,639,982 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,492 UART: [art] PUB.X = 1E5E10AEBBC8607CFA0AE7878C9EA517C7ED3586ED6C93468364993999D1B498C7202294824F06079E7614BC724B03C0
31,648,709 UART: [art] PUB.Y = 4E5C2FA920FB02C7EAFB3D132DCD7682C3701C13B88D05354D7832DB9DB1A95DE0928C810BD450631C843BF48F65A0C9
31,655,968 UART: [art] SIG.R = 0FEBE16DE44B85FCD1446483E072964ADC2E92F848484E27316485F7D09EF53179760678B58FC2CCC18C08FAF1C93265
31,663,334 UART: [art] SIG.S = 5D4BFFCD8118F388EC8D018FEF600797D0856E9B9B13DB72745350B39320066FB085C64107FEAA952B610DBDAB679EBC
32,968,257 UART: Caliptra RT
32,968,980 UART: [state] CFI Enabled
33,130,988 UART: [rt] RT listening for mailbox commands...
33,133,403 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,164,025 UART: [rt]cmd =0x44504543, len=92
41,217,376 >>> mbox cmd response data (6284 bytes)
41,246,817 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,276,807 UART: [rt]cmd =0x43455252, len=4
41,288,398 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,500 UART:
192,863 UART: Running Caliptra ROM ...
193,952 UART:
603,672 UART: [state] CFI Enabled
618,339 UART: [state] LifecycleState = Unprovisioned
620,293 UART: [state] DebugLocked = No
622,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,841 UART: [kat] SHA2-256
797,607 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,198 UART: [kat] ++
808,638 UART: [kat] sha1
818,364 UART: [kat] SHA2-256
821,080 UART: [kat] SHA2-384
825,794 UART: [kat] SHA2-512-ACC
828,164 UART: [kat] ECC-384
3,111,425 UART: [kat] HMAC-384Kdf
3,123,457 UART: [kat] LMS
4,313,601 UART: [kat] --
4,316,651 UART: [cold-reset] ++
4,318,586 UART: [fht] Storing FHT @ 0x50003400
4,328,855 UART: [idev] ++
4,329,422 UART: [idev] CDI.KEYID = 6
4,330,324 UART: [idev] SUBJECT.KEYID = 7
4,331,501 UART: [idev] UDS.KEYID = 0
4,332,630 ready_for_fw is high
4,332,850 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,186 UART: [idev] Erasing UDS.KEYID = 0
7,618,147 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,898 UART: [idev] --
7,643,695 UART: [ldev] ++
7,644,257 UART: [ldev] CDI.KEYID = 6
7,645,216 UART: [ldev] SUBJECT.KEYID = 5
7,646,441 UART: [ldev] AUTHORITY.KEYID = 7
7,647,719 UART: [ldev] FE.KEYID = 1
7,657,981 UART: [ldev] Erasing FE.KEYID = 1
10,947,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,909 UART: [ldev] --
13,309,039 UART: [fwproc] Waiting for Commands...
13,311,728 UART: [fwproc] Received command 0x46574c44
13,313,956 UART: [fwproc] Received Image of size 114124 bytes
17,363,627 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,867 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,727 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,788 >>> mbox cmd response: success
17,827,613 UART: [afmc] ++
17,828,234 UART: [afmc] CDI.KEYID = 6
17,829,148 UART: [afmc] SUBJECT.KEYID = 7
17,830,250 UART: [afmc] AUTHORITY.KEYID = 5
21,145,480 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,135 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,562 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,334 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,804 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,237 UART: [afmc] --
23,510,608 UART: [cold-reset] --
23,515,340 UART: [state] Locking Datavault
23,521,406 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,156 UART: [state] Locking ICCM
23,525,547 UART: [exit] Launching FMC @ 0x40000130
23,533,954 UART:
23,534,184 UART: Running Caliptra FMC ...
23,535,206 UART:
23,535,346 UART: [state] CFI Enabled
23,543,870 UART: [fht] FMC Alias Private Key: 7
25,874,802 UART: [art] Extend RT PCRs Done
25,876,019 UART: [art] Lock RT PCRs Done
25,877,840 UART: [art] Populate DV Done
25,883,138 UART: [fht] FMC Alias Private Key: 7
25,884,666 UART: [art] Derive CDI
25,885,475 UART: [art] Store in in slot 0x4
25,928,607 UART: [art] Derive Key Pair
25,929,642 UART: [art] Store priv key in slot 0x5
29,171,598 UART: [art] Derive Key Pair - Done
29,184,905 UART: [art] Signing Cert with AUTHO
29,186,211 UART: RITY.KEYID = 7
31,465,377 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,881 UART: [art] PUB.X = 8E8416BC440CF53DFB99FD8C2034BA089482749C78F7FF2132510AA97A21E28733C3915084233EB854EB76D964CA541C
31,474,104 UART: [art] PUB.Y = A6420AFC78A158A18E707AB88473EAD6DC5A7316458F8FE66087057AB75C9510922038312CB861CE8F32D457C3E84602
31,481,368 UART: [art] SIG.R = D8A8907D77747ADFB5040C896F47D9DB3F335904961693333408DD5B71FADBB2A58D244CDBBCFED9F2D3299A0ACCF213
31,488,748 UART: [art] SIG.S = 401640B3462EEAD93E9FE1AD87137453C4070E19DEE609F097860FEFED0E347A8A4DD94558814FC4F243B6801F7CA275
32,794,310 UART: Caliptra RT
32,795,025 UART: [state] CFI Enabled
32,913,277 UART: [rt] RT listening for mailbox commands...
32,915,670 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,946,219 UART: [rt]cmd =0x44504543, len=92
40,918,030 >>> mbox cmd response data (6284 bytes)
40,948,074 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
40,978,304 UART: [rt]cmd =0x43455252, len=4
40,989,523 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
4,132,310 ready_for_fw is high
4,132,732 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,079,788 >>> mbox cmd response: success
23,721,279 UART:
23,721,676 UART: Running Caliptra FMC ...
23,722,812 UART:
23,722,962 UART: [state] CFI Enabled
23,730,513 UART: [fht] FMC Alias Private Key: 7
26,061,254 UART: [art] Extend RT PCRs Done
26,062,488 UART: [art] Lock RT PCRs Done
26,064,116 UART: [art] Populate DV Done
26,069,432 UART: [fht] FMC Alias Private Key: 7
26,070,973 UART: [art] Derive CDI
26,071,737 UART: [art] Store in in slot 0x4
26,114,498 UART: [art] Derive Key Pair
26,115,503 UART: [art] Store priv key in slot 0x5
29,357,532 UART: [art] Derive Key Pair - Done
29,370,470 UART: [art] Signing Cert with AUTHO
29,371,772 UART: RITY.KEYID = 7
31,651,245 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,751 UART: [art] PUB.X = 131B6E7FD309B56859BEE46ED3B7BF061980580726BDD018DFF7FC4866BF6C2C501B4211CB451817D14C963F7F066F62
31,659,983 UART: [art] PUB.Y = 77D671FDE611DCA2FD100DC0C15CD4BAB93D15381CF8A6D8F95C6049A008C3C3EE34EBD22D13E6AB9E5577B107183F88
31,667,255 UART: [art] SIG.R = E71F5C1EDE14220DF974D4AE4026F91A4E19DA12B1DD1A3C5C7B9E56FD2D38DC68186491B35414C02972BC40D409BD8D
31,674,674 UART: [art] SIG.S = 2DCA43B8EE88FFEBAD9E7E9CCBF962E7AA57DD836C37C853F92C6EB2B432D69F09093AE86D84DF5B9C53632EE9A46312
32,980,542 UART: Caliptra RT
32,981,257 UART: [state] CFI Enabled
33,098,913 UART: [rt] RT listening for mailbox commands...
33,101,249 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,131,761 UART: [rt]cmd =0x44504543, len=92
41,104,354 >>> mbox cmd response data (6284 bytes)
41,133,788 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,163,883 UART: [rt]cmd =0x43455252, len=4
41,175,419 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
192,066 UART:
192,432 UART: Running Caliptra ROM ...
193,537 UART:
193,684 UART: [state] CFI Enabled
262,649 UART: [state] LifecycleState = Unprovisioned
264,562 UART: [state] DebugLocked = No
266,804 UART: [state] WD Timer not started. Device not locked for debugging
270,345 UART: [kat] SHA2-256
449,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,023 UART: [kat] ++
461,564 UART: [kat] sha1
473,400 UART: [kat] SHA2-256
476,451 UART: [kat] SHA2-384
482,666 UART: [kat] SHA2-512-ACC
485,671 UART: [kat] ECC-384
2,947,823 UART: [kat] HMAC-384Kdf
2,971,455 UART: [kat] LMS
3,500,856 UART: [kat] --
3,505,719 UART: [cold-reset] ++
3,508,214 UART: [fht] FHT @ 0x50003400
3,518,423 UART: [idev] ++
3,519,003 UART: [idev] CDI.KEYID = 6
3,519,892 UART: [idev] SUBJECT.KEYID = 7
3,521,014 UART: [idev] UDS.KEYID = 0
3,522,066 ready_for_fw is high
3,522,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,046 UART: [idev] Erasing UDS.KEYID = 0
6,026,168 UART: [idev] Sha1 KeyId Algorithm
6,049,517 UART: [idev] --
6,053,030 UART: [ldev] ++
6,053,604 UART: [ldev] CDI.KEYID = 6
6,054,491 UART: [ldev] SUBJECT.KEYID = 5
6,055,621 UART: [ldev] AUTHORITY.KEYID = 7
6,056,917 UART: [ldev] FE.KEYID = 1
6,100,707 UART: [ldev] Erasing FE.KEYID = 1
8,603,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,072 UART: [ldev] --
10,413,556 UART: [fwproc] Wait for Commands...
10,416,134 UART: [fwproc] Recv command 0x46574c44
10,418,226 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,657 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,892 >>> mbox cmd response: success
14,288,763 UART: [afmc] ++
14,289,353 UART: [afmc] CDI.KEYID = 6
14,290,240 UART: [afmc] SUBJECT.KEYID = 7
14,291,453 UART: [afmc] AUTHORITY.KEYID = 5
16,824,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,767 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,501 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,553 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,611 UART: [afmc] --
18,629,150 UART: [cold-reset] --
18,634,507 UART: [state] Locking Datavault
18,640,191 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,844 UART: [state] Locking ICCM
18,644,565 UART: [exit] Launching FMC @ 0x40000130
18,652,978 UART:
18,653,215 UART: Running Caliptra FMC ...
18,654,313 UART:
18,654,472 UART: [state] CFI Enabled
18,710,563 UART: [fht] FMC Alias Private Key: 7
20,474,821 UART: [art] Extend RT PCRs Done
20,476,041 UART: [art] Lock RT PCRs Done
20,477,477 UART: [art] Populate DV Done
20,482,886 UART: [fht] FMC Alias Private Key: 7
20,484,428 UART: [art] Derive CDI
20,485,163 UART: [art] Store in in slot 0x4
20,543,763 UART: [art] Derive Key Pair
20,544,760 UART: [art] Store priv key in slot 0x5
23,007,560 UART: [art] Derive Key Pair - Done
23,021,204 UART: [art] Signing Cert with AUTHO
23,022,514 UART: RITY.KEYID = 7
24,734,266 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,771 UART: [art] PUB.X = 505869A234D5A32F6F6216AC063D97DDF5C2B267C99CA88C97C46C6BB8F78611CAB99016D3267F559B5B0301B42936F0
24,743,032 UART: [art] PUB.Y = A7967C83F459B34C9D9A4A32422301FB363791DE4A8F2BD798D0A6F2C2DDBD9D51C69C5ED5BDBB5B5235EA9BB60C2D24
24,750,325 UART: [art] SIG.R = 5F7E4202EDA145C8F377BCBA5B1841865A4509B9551EAD4FB924DF77022708D8815B526618DD47300E5F614ABF23CF04
24,757,670 UART: [art] SIG.S = 3BF2AF1A353F945CACCAFEA6C700CA510719B91A68481D0FF75E93C577489AB05766A7467D0411F24B73444E996A226D
25,735,947 UART: Caliptra RT
25,736,648 UART: [state] CFI Enabled
25,902,840 UART: [rt] RT listening for mailbox commands...
25,905,245 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,936,371 UART: [rt]cmd =0x44504543, len=92
32,006,963 >>> mbox cmd response data (6284 bytes)
32,036,555 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,066,532 UART: [rt]cmd =0x43455252, len=4
32,077,997 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,380,793 ready_for_fw is high
3,381,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,052,963 >>> mbox cmd response: success
18,344,146 UART:
18,344,536 UART: Running Caliptra FMC ...
18,345,670 UART:
18,345,829 UART: [state] CFI Enabled
18,412,915 UART: [fht] FMC Alias Private Key: 7
20,176,798 UART: [art] Extend RT PCRs Done
20,178,035 UART: [art] Lock RT PCRs Done
20,179,562 UART: [art] Populate DV Done
20,184,968 UART: [fht] FMC Alias Private Key: 7
20,186,560 UART: [art] Derive CDI
20,187,372 UART: [art] Store in in slot 0x4
20,245,559 UART: [art] Derive Key Pair
20,246,604 UART: [art] Store priv key in slot 0x5
22,709,527 UART: [art] Derive Key Pair - Done
22,722,633 UART: [art] Signing Cert with AUTHO
22,723,933 UART: RITY.KEYID = 7
24,436,385 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,884 UART: [art] PUB.X = 416FAE2E15465B18B297CC99254FF8560231D3C8E7623882309C806A44627964584D816BCA6500BF82C83BD7651AD0FD
24,445,123 UART: [art] PUB.Y = 19CBB68409AC9FE9AC021124C686B5300B6C188B4F1BED351067562F63D3B9BAE70FFC2FC5005342C18A279B84A626BE
24,452,377 UART: [art] SIG.R = 7662EED464514A0F2FA38467FFE6F42E9D1BE31B75D05C72B6FAC3E2B9843FE7221EB81EEAD2645DD501E5CC70428716
24,459,765 UART: [art] SIG.S = 1F861EC20E014285E10FDC89B829369DC9E52DE7D4AFF03256BEDC97E30331A1D14A558FDD56CE104291DCA9F2AA2F1F
25,438,752 UART: Caliptra RT
25,439,452 UART: [state] CFI Enabled
25,604,358 UART: [rt] RT listening for mailbox commands...
25,606,876 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,638,118 UART: [rt]cmd =0x44504543, len=92
31,709,752 >>> mbox cmd response data (6284 bytes)
31,739,265 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,769,165 UART: [rt]cmd =0x43455252, len=4
31,780,730 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,499 UART:
192,873 UART: Running Caliptra ROM ...
193,978 UART:
603,534 UART: [state] CFI Enabled
619,168 UART: [state] LifecycleState = Unprovisioned
621,037 UART: [state] DebugLocked = No
622,786 UART: [state] WD Timer not started. Device not locked for debugging
626,732 UART: [kat] SHA2-256
805,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,430 UART: [kat] ++
817,874 UART: [kat] sha1
828,080 UART: [kat] SHA2-256
831,103 UART: [kat] SHA2-384
837,088 UART: [kat] SHA2-512-ACC
840,020 UART: [kat] ECC-384
3,282,571 UART: [kat] HMAC-384Kdf
3,294,977 UART: [kat] LMS
3,824,418 UART: [kat] --
3,828,996 UART: [cold-reset] ++
3,831,289 UART: [fht] FHT @ 0x50003400
3,842,684 UART: [idev] ++
3,843,238 UART: [idev] CDI.KEYID = 6
3,844,158 UART: [idev] SUBJECT.KEYID = 7
3,845,323 UART: [idev] UDS.KEYID = 0
3,846,362 ready_for_fw is high
3,846,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,384 UART: [idev] Erasing UDS.KEYID = 0
6,318,776 UART: [idev] Sha1 KeyId Algorithm
6,342,043 UART: [idev] --
6,345,533 UART: [ldev] ++
6,346,106 UART: [ldev] CDI.KEYID = 6
6,347,006 UART: [ldev] SUBJECT.KEYID = 5
6,348,219 UART: [ldev] AUTHORITY.KEYID = 7
6,349,443 UART: [ldev] FE.KEYID = 1
6,358,350 UART: [ldev] Erasing FE.KEYID = 1
8,829,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,022 UART: [ldev] --
10,619,768 UART: [fwproc] Wait for Commands...
10,621,582 UART: [fwproc] Recv command 0x46574c44
10,623,614 UART: [fwproc] Recv'd Img size: 114448 bytes
14,022,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,174 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,481,438 >>> mbox cmd response: success
14,485,841 UART: [afmc] ++
14,486,434 UART: [afmc] CDI.KEYID = 6
14,487,336 UART: [afmc] SUBJECT.KEYID = 7
14,488,542 UART: [afmc] AUTHORITY.KEYID = 5
16,987,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,618 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,364 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,423 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,268 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,178 UART: [afmc] --
18,786,468 UART: [cold-reset] --
18,788,482 UART: [state] Locking Datavault
18,793,454 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,086 UART: [state] Locking ICCM
18,797,639 UART: [exit] Launching FMC @ 0x40000130
18,806,078 UART:
18,806,308 UART: Running Caliptra FMC ...
18,807,325 UART:
18,807,462 UART: [state] CFI Enabled
18,815,988 UART: [fht] FMC Alias Private Key: 7
20,573,000 UART: [art] Extend RT PCRs Done
20,574,241 UART: [art] Lock RT PCRs Done
20,575,728 UART: [art] Populate DV Done
20,580,987 UART: [fht] FMC Alias Private Key: 7
20,582,508 UART: [art] Derive CDI
20,583,241 UART: [art] Store in in slot 0x4
20,625,502 UART: [art] Derive Key Pair
20,626,488 UART: [art] Store priv key in slot 0x5
23,053,524 UART: [art] Derive Key Pair - Done
23,066,619 UART: [art] Signing Cert with AUTHO
23,067,952 UART: RITY.KEYID = 7
24,773,343 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,838 UART: [art] PUB.X = 04BCC8CFEDFDB49140F19241C46CBC72EFD2A6E2E8B8FF030F68C64F3827D7B46F713E569030E734FC1549F2136ACC2A
24,782,118 UART: [art] PUB.Y = 41BEBE2127F4D1A219539F711BBF26F8BA51CEC6C92AFA1B68076F227DC0B82EA7D7AAB4E418665A79AD86EF887F84FD
24,789,436 UART: [art] SIG.R = FB704AF0B9EDE520FA394FD1FC269060310D09EDA4FEBD0E64CB1A3EB42DD4CA9B6F7662F3DA925D83A33311B692D63B
24,796,803 UART: [art] SIG.S = EE29C1A5AFD7B37C1FEE28E9B57A30C3B7C386EA28DE4B1B0F6023220C8D56F5A114A02F01382993A1A388CEABCF7918
25,776,514 UART: Caliptra RT
25,777,226 UART: [state] CFI Enabled
25,893,831 UART: [rt] RT listening for mailbox commands...
25,896,273 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,927,033 UART: [rt]cmd =0x44504543, len=92
31,936,526 >>> mbox cmd response data (6284 bytes)
31,966,104 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,996,140 UART: [rt]cmd =0x43455252, len=4
32,007,453 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,693,717 ready_for_fw is high
3,694,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,064 >>> mbox cmd response: success
18,530,863 UART:
18,531,246 UART: Running Caliptra FMC ...
18,532,376 UART:
18,532,526 UART: [state] CFI Enabled
18,540,843 UART: [fht] FMC Alias Private Key: 7
20,297,600 UART: [art] Extend RT PCRs Done
20,298,813 UART: [art] Lock RT PCRs Done
20,300,322 UART: [art] Populate DV Done
20,305,727 UART: [fht] FMC Alias Private Key: 7
20,307,372 UART: [art] Derive CDI
20,308,178 UART: [art] Store in in slot 0x4
20,350,618 UART: [art] Derive Key Pair
20,351,677 UART: [art] Store priv key in slot 0x5
22,779,202 UART: [art] Derive Key Pair - Done
22,792,258 UART: [art] Signing Cert with AUTHO
22,793,566 UART: RITY.KEYID = 7
24,498,853 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,470 UART: [art] PUB.X = 4E9DC67106198C48DD4D1DB5253C7BA356D61D242E368A835F869D5961E43B49118C5F9A2B78E5F6F9E75E6F6B55E3A5
24,507,617 UART: [art] PUB.Y = 727D4B62CD9278998EF8CA966EDCC21968B4235AA6C2AA47A223EC719225BEB0EA71660766C06D726AD405873791A3B2
24,514,859 UART: [art] SIG.R = BD9793AF95FE0680BAA5D1E334D61EFF3F198E5685029C61FCF8A5006B7A528524BDFB4CB506B94AA2859CF1F3E41971
24,522,212 UART: [art] SIG.S = 7A8C93C3AAC1EFAD71BA7E5310D01C3474A7DC3B3F5A7F6515531B8EC3B19D1C36C309B46965BF4C6D87C0E398C752F9
25,500,812 UART: Caliptra RT
25,501,530 UART: [state] CFI Enabled
25,618,597 UART: [rt] RT listening for mailbox commands...
25,621,026 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,651,743 UART: [rt]cmd =0x44504543, len=92
31,660,130 >>> mbox cmd response data (6284 bytes)
31,689,627 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,719,790 UART: [rt]cmd =0x43455252, len=4
31,731,196 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,440,842 ready_for_fw is high
3,441,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,744,349 >>> mbox cmd response: success
19,030,176 UART:
19,030,581 UART: Running Caliptra FMC ...
19,031,776 UART:
19,031,944 UART: [state] CFI Enabled
19,097,304 UART: [fht] FMC Alias Private Key: 7
20,860,905 UART: [art] Extend RT PCRs Done
20,862,132 UART: [art] Lock RT PCRs Done
20,864,139 UART: [art] Populate DV Done
20,869,757 UART: [fht] FMC Alias Private Key: 7
20,871,456 UART: [art] Derive CDI
20,872,281 UART: [art] Store in in slot 0x4
20,930,256 UART: [art] Derive Key Pair
20,931,300 UART: [art] Store priv key in slot 0x5
23,394,256 UART: [art] Derive Key Pair - Done
23,407,089 UART: [art] Signing Cert with AUTHO
23,408,391 UART: RITY.KEYID = 7
25,120,943 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,438 UART: [art] PUB.X = 9140FC172E423EA830032D72EFD6E9BD3D6A6C5355BC30256028689DC41FA9C4D766CE3629F577C3A5ABC8A17DB7AC5A
25,129,686 UART: [art] PUB.Y = 4A9BBCBBF9D7A80E116D8BBE05A4CB57C4380EB5ACA8FEA24B23830BAD79D0807FE2EC47083CEEBB4B21945405C62CB6
25,136,985 UART: [art] SIG.R = 2659E7ADD2A315A07D3B9EE68E4F3BCD907794FE1A6D5FE48C54D8A87F301205B478B4A441CE1F7C79B091F4CF0AA76F
25,144,407 UART: [art] SIG.S = 58A4127EF07F679C459EA1DC2542FEB1D130EE0076A1BA0BBDF0E2668C10CAE81720D9F1077CB29B78B4CB9F709AD12E
26,123,022 UART: Caliptra RT
26,123,764 UART: [state] CFI Enabled
26,288,512 UART: [rt] RT listening for mailbox commands...
26,290,915 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,322,094 UART: [rt]cmd =0x44504543, len=92
32,394,053 >>> mbox cmd response data (6284 bytes)
32,423,605 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,453,633 UART: [rt]cmd =0x43455252, len=4
32,465,170 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,752,969 ready_for_fw is high
3,753,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,947,366 >>> mbox cmd response: success
19,201,289 UART:
19,201,678 UART: Running Caliptra FMC ...
19,202,806 UART:
19,202,958 UART: [state] CFI Enabled
19,211,140 UART: [fht] FMC Alias Private Key: 7
20,967,748 UART: [art] Extend RT PCRs Done
20,968,966 UART: [art] Lock RT PCRs Done
20,970,668 UART: [art] Populate DV Done
20,976,234 UART: [fht] FMC Alias Private Key: 7
20,977,933 UART: [art] Derive CDI
20,978,736 UART: [art] Store in in slot 0x4
21,021,701 UART: [art] Derive Key Pair
21,022,697 UART: [art] Store priv key in slot 0x5
23,450,298 UART: [art] Derive Key Pair - Done
23,463,291 UART: [art] Signing Cert with AUTHO
23,464,591 UART: RITY.KEYID = 7
25,169,956 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,464 UART: [art] PUB.X = 19AA1E50AE06906F5E0AF296757465988CAC10A744E6F3AF99DA90E20AF0C76565E3D10E64618D053EF451BC893F9B7D
25,178,741 UART: [art] PUB.Y = A047A4BE18847F38C813764FE3BD01C6D21CEE26C7651ACCB2697B4D5259C95389F62BA539069DDDAACBD3B2BFE4B918
25,186,011 UART: [art] SIG.R = 97EFDC3B3BCA908CAA1EFE55509734F1CC8E33610E2F8DBD2D5E610B1F9994DE03E9E53A04F05CF76DC1BCD76B6BBEE6
25,193,390 UART: [art] SIG.S = 553881DF065A88369D8D42ED1FF3884B4ADF79D11C4E0EB267641972E1A90CF3EBD8A3A4AD7BD5C241ABC2353F75CE96
26,172,030 UART: Caliptra RT
26,172,743 UART: [state] CFI Enabled
26,289,049 UART: [rt] RT listening for mailbox commands...
26,291,462 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,321,934 UART: [rt]cmd =0x44504543, len=92
32,330,972 >>> mbox cmd response data (6284 bytes)
32,360,200 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,390,066 UART: [rt]cmd =0x43455252, len=4
32,401,511 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,708 UART: [state] LifecycleState = Unprovisioned
85,363 UART: [state] DebugLocked = No
86,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,593 UART: [kat] SHA2-256
881,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,639 UART: [kat] ++
885,791 UART: [kat] sha1
889,925 UART: [kat] SHA2-256
891,863 UART: [kat] SHA2-384
894,564 UART: [kat] SHA2-512-ACC
896,465 UART: [kat] ECC-384
901,836 UART: [kat] HMAC-384Kdf
906,496 UART: [kat] LMS
1,474,692 UART: [kat] --
1,475,751 UART: [cold-reset] ++
1,476,099 UART: [fht] Storing FHT @ 0x50003400
1,478,952 UART: [idev] ++
1,479,120 UART: [idev] CDI.KEYID = 6
1,479,480 UART: [idev] SUBJECT.KEYID = 7
1,479,904 UART: [idev] UDS.KEYID = 0
1,480,249 ready_for_fw is high
1,480,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,340 UART: [idev] Erasing UDS.KEYID = 0
1,504,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,410 UART: [idev] --
1,514,303 UART: [ldev] ++
1,514,471 UART: [ldev] CDI.KEYID = 6
1,514,834 UART: [ldev] SUBJECT.KEYID = 5
1,515,260 UART: [ldev] AUTHORITY.KEYID = 7
1,515,723 UART: [ldev] FE.KEYID = 1
1,521,017 UART: [ldev] Erasing FE.KEYID = 1
1,546,142 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,144 UART: [ldev] --
1,585,597 UART: [fwproc] Waiting for Commands...
1,586,246 UART: [fwproc] Received command 0x46574c44
1,587,037 UART: [fwproc] Received Image of size 114448 bytes
2,886,400 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,158 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,510 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,479 >>> mbox cmd response: success
3,079,629 UART: [afmc] ++
3,079,797 UART: [afmc] CDI.KEYID = 6
3,080,159 UART: [afmc] SUBJECT.KEYID = 7
3,080,584 UART: [afmc] AUTHORITY.KEYID = 5
3,116,219 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,537 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,317 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,930 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,620 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,487 UART: [afmc] --
3,159,517 UART: [cold-reset] --
3,160,307 UART: [state] Locking Datavault
3,161,300 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,904 UART: [state] Locking ICCM
3,162,430 UART: [exit] Launching FMC @ 0x40000130
3,167,759 UART:
3,167,775 UART: Running Caliptra FMC ...
3,168,183 UART:
3,168,237 UART: [state] CFI Enabled
3,178,800 UART: [fht] FMC Alias Private Key: 7
3,286,989 UART: [art] Extend RT PCRs Done
3,287,417 UART: [art] Lock RT PCRs Done
3,288,969 UART: [art] Populate DV Done
3,296,984 UART: [fht] FMC Alias Private Key: 7
3,298,160 UART: [art] Derive CDI
3,298,440 UART: [art] Store in in slot 0x4
3,384,205 UART: [art] Derive Key Pair
3,384,565 UART: [art] Store priv key in slot 0x5
3,397,605 UART: [art] Derive Key Pair - Done
3,411,961 UART: [art] Signing Cert with AUTHO
3,412,441 UART: RITY.KEYID = 7
3,427,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,244 UART: [art] PUB.X = 09BF875E0219E3BA253D769B51EA03908BFE528FD3D4552610AE56285F9012C4FEB0FEF8CAF803DA2DEE2966D0BCF1F9
3,435,018 UART: [art] PUB.Y = D682651D96AA0809632DEAACBFC40566E0C0683030FC91FB8B4D650330B768342A9FF602D85AB8DC6F088C8DE9E5AFD7
3,441,962 UART: [art] SIG.R = 13B02199FE249C5ADB216195B5F4876D5D6367A7BFF116CEC733F7F396F701ADCE548F8980F9E963772A9AC235B5FB18
3,448,735 UART: [art] SIG.S = BD37FBD9FECD31A3255E50591F63E4E218BE56E51E12BF437FC033AEC5F6D6903BD599382A0469158763D743810E6C91
3,472,828 UART: Caliptra RT
3,473,081 UART: [state] CFI Enabled
3,580,810 UART: [rt] RT listening for mailbox commands...
3,581,480 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,864 UART: [rt]cmd =0x44504543, len=92
3,828,922 >>> mbox cmd response data (6284 bytes)
3,828,923 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,234 UART: [rt]cmd =0x43455252, len=4
3,869,211 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,121 ready_for_fw is high
1,363,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,709 >>> mbox cmd response: success
2,991,235 UART:
2,991,251 UART: Running Caliptra FMC ...
2,991,659 UART:
2,991,713 UART: [state] CFI Enabled
3,001,994 UART: [fht] FMC Alias Private Key: 7
3,109,895 UART: [art] Extend RT PCRs Done
3,110,323 UART: [art] Lock RT PCRs Done
3,111,849 UART: [art] Populate DV Done
3,119,904 UART: [fht] FMC Alias Private Key: 7
3,120,836 UART: [art] Derive CDI
3,121,116 UART: [art] Store in in slot 0x4
3,206,747 UART: [art] Derive Key Pair
3,207,107 UART: [art] Store priv key in slot 0x5
3,219,763 UART: [art] Derive Key Pair - Done
3,234,675 UART: [art] Signing Cert with AUTHO
3,235,155 UART: RITY.KEYID = 7
3,250,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,034 UART: [art] PUB.X = 8C4FA0F47DD7EB08D3EB6FAAB0375FEF5BBA17FF52281E2967A8C43C46DD262419FD153E48758BED3F62CC0C4D93239B
3,257,818 UART: [art] PUB.Y = 7C30296C95D24BF183D6DB3019464CCCD4C4E9E1E6605ED92190B96FF896B547CCBF9FCBE29B52E965D53D1D09A50BBE
3,264,778 UART: [art] SIG.R = AF90BD7AB41BF662C2392C94BDE0761D80D12DBC6A4070BCA369708EF50ADA0A3CD90DEB70067C3115C5619C7406C8C8
3,271,547 UART: [art] SIG.S = D5BB07116430E9F9D0B34B7C78DD575AE6FDE09A3D67506355F629A41C56F8181DC21B38EB6AC9603E01AFD0ECC9572B
3,295,064 UART: Caliptra RT
3,295,317 UART: [state] CFI Enabled
3,404,369 UART: [rt] RT listening for mailbox commands...
3,405,039 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,187 UART: [rt]cmd =0x44504543, len=92
3,651,642 >>> mbox cmd response data (6284 bytes)
3,651,643 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,868 UART: [rt]cmd =0x43455252, len=4
3,691,716 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,350 UART: [kat] SHA2-256
882,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,396 UART: [kat] ++
886,548 UART: [kat] sha1
890,878 UART: [kat] SHA2-256
892,816 UART: [kat] SHA2-384
895,623 UART: [kat] SHA2-512-ACC
897,524 UART: [kat] ECC-384
902,989 UART: [kat] HMAC-384Kdf
907,665 UART: [kat] LMS
1,475,861 UART: [kat] --
1,476,612 UART: [cold-reset] ++
1,476,950 UART: [fht] Storing FHT @ 0x50003400
1,479,695 UART: [idev] ++
1,479,863 UART: [idev] CDI.KEYID = 6
1,480,223 UART: [idev] SUBJECT.KEYID = 7
1,480,647 UART: [idev] UDS.KEYID = 0
1,480,992 ready_for_fw is high
1,480,992 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,713 UART: [idev] Erasing UDS.KEYID = 0
1,506,189 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,863 UART: [idev] --
1,515,766 UART: [ldev] ++
1,515,934 UART: [ldev] CDI.KEYID = 6
1,516,297 UART: [ldev] SUBJECT.KEYID = 5
1,516,723 UART: [ldev] AUTHORITY.KEYID = 7
1,517,186 UART: [ldev] FE.KEYID = 1
1,522,150 UART: [ldev] Erasing FE.KEYID = 1
1,547,333 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,285 UART: [ldev] --
1,586,800 UART: [fwproc] Waiting for Commands...
1,587,631 UART: [fwproc] Received command 0x46574c44
1,588,422 UART: [fwproc] Received Image of size 114448 bytes
2,887,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,457 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,809 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,938 >>> mbox cmd response: success
3,082,002 UART: [afmc] ++
3,082,170 UART: [afmc] CDI.KEYID = 6
3,082,532 UART: [afmc] SUBJECT.KEYID = 7
3,082,957 UART: [afmc] AUTHORITY.KEYID = 5
3,117,794 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,296 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,076 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,804 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,689 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,379 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,276 UART: [afmc] --
3,161,316 UART: [cold-reset] --
3,162,330 UART: [state] Locking Datavault
3,163,679 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,283 UART: [state] Locking ICCM
3,164,905 UART: [exit] Launching FMC @ 0x40000130
3,170,234 UART:
3,170,250 UART: Running Caliptra FMC ...
3,170,658 UART:
3,170,801 UART: [state] CFI Enabled
3,181,498 UART: [fht] FMC Alias Private Key: 7
3,289,931 UART: [art] Extend RT PCRs Done
3,290,359 UART: [art] Lock RT PCRs Done
3,291,739 UART: [art] Populate DV Done
3,299,742 UART: [fht] FMC Alias Private Key: 7
3,300,920 UART: [art] Derive CDI
3,301,200 UART: [art] Store in in slot 0x4
3,386,941 UART: [art] Derive Key Pair
3,387,301 UART: [art] Store priv key in slot 0x5
3,400,867 UART: [art] Derive Key Pair - Done
3,415,595 UART: [art] Signing Cert with AUTHO
3,416,075 UART: RITY.KEYID = 7
3,431,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,380 UART: [art] PUB.X = 917CBCEAB30BB08FA9EED0D0B4B26E28C55DD2A8E016AFC481DAC23145085CC940B84D67EABCCE7C8E1B26E06C78729D
3,439,170 UART: [art] PUB.Y = 7BD436C08F5F389F79A7F21707B174CF54A67C4DF843EA1E47DB4E04323D42BE9052FFB189024650B713B7A118446D1A
3,446,113 UART: [art] SIG.R = B1097471F72543E55F5D9C643006A374685908E073C56D3E2619AC02FDF8DF26B1EB22536A4799F9CABDCBFCFA69ED43
3,452,879 UART: [art] SIG.S = B6057B853EF57FC1EDCCA485D5A8910BCEE7C239F1D03186C862E5D35C59EAA5615C776D5C41EC1DD18444E71CCB51C2
3,476,790 UART: Caliptra RT
3,477,135 UART: [state] CFI Enabled
3,585,901 UART: [rt] RT listening for mailbox commands...
3,586,571 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,113 UART: [rt]cmd =0x44504543, len=92
3,834,358 >>> mbox cmd response data (6284 bytes)
3,834,359 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,550 UART: [rt]cmd =0x43455252, len=4
3,874,312 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,150 ready_for_fw is high
1,363,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,364 >>> mbox cmd response: success
2,992,750 UART:
2,992,766 UART: Running Caliptra FMC ...
2,993,174 UART:
2,993,317 UART: [state] CFI Enabled
3,004,332 UART: [fht] FMC Alias Private Key: 7
3,111,779 UART: [art] Extend RT PCRs Done
3,112,207 UART: [art] Lock RT PCRs Done
3,113,829 UART: [art] Populate DV Done
3,121,876 UART: [fht] FMC Alias Private Key: 7
3,123,006 UART: [art] Derive CDI
3,123,286 UART: [art] Store in in slot 0x4
3,208,879 UART: [art] Derive Key Pair
3,209,239 UART: [art] Store priv key in slot 0x5
3,222,693 UART: [art] Derive Key Pair - Done
3,237,697 UART: [art] Signing Cert with AUTHO
3,238,177 UART: RITY.KEYID = 7
3,253,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,112 UART: [art] PUB.X = F004F1124F8D4BCCE03B52DE313403FA7C4D3F588044267DF21BBF3E5FC074D864047ADED6B883B54B5BCEAE561CFADF
3,260,895 UART: [art] PUB.Y = FC6A08A39A94A8405A3540CAD45F1DF7C39813D0AB8485AD7F0653FECCE6509C648F2611C4B7F589451B3D4BF6C63CA8
3,267,851 UART: [art] SIG.R = 0550C9FCAE98F471224B73667844924E26F53EADCA6D7186F228B9F53E616DE83D0A307B635F21963EB5A8F2EA606F76
3,274,617 UART: [art] SIG.S = 311ECA107EEE3F3120164149BDA10DCD6CBD3AC7DA2E0E54345AC0E4DCC2B5DF7B0A97FEFFD7F018547C16F9173489FB
3,298,799 UART: Caliptra RT
3,299,144 UART: [state] CFI Enabled
3,407,206 UART: [rt] RT listening for mailbox commands...
3,407,876 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,528 UART: [rt]cmd =0x44504543, len=92
3,654,530 >>> mbox cmd response data (6284 bytes)
3,654,531 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,956 UART: [rt]cmd =0x43455252, len=4
3,694,801 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
893,264 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,389 UART: [kat] ++
897,541 UART: [kat] sha1
901,821 UART: [kat] SHA2-256
903,761 UART: [kat] SHA2-384
906,556 UART: [kat] SHA2-512-ACC
908,457 UART: [kat] ECC-384
918,082 UART: [kat] HMAC-384Kdf
922,662 UART: [kat] LMS
1,170,990 UART: [kat] --
1,171,979 UART: [cold-reset] ++
1,172,411 UART: [fht] FHT @ 0x50003400
1,174,960 UART: [idev] ++
1,175,128 UART: [idev] CDI.KEYID = 6
1,175,488 UART: [idev] SUBJECT.KEYID = 7
1,175,912 UART: [idev] UDS.KEYID = 0
1,176,257 ready_for_fw is high
1,176,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,194 UART: [idev] Erasing UDS.KEYID = 0
1,200,667 UART: [idev] Sha1 KeyId Algorithm
1,209,027 UART: [idev] --
1,210,325 UART: [ldev] ++
1,210,493 UART: [ldev] CDI.KEYID = 6
1,210,856 UART: [ldev] SUBJECT.KEYID = 5
1,211,282 UART: [ldev] AUTHORITY.KEYID = 7
1,211,745 UART: [ldev] FE.KEYID = 1
1,216,647 UART: [ldev] Erasing FE.KEYID = 1
1,242,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,508 UART: [fwproc] Wait for Commands...
1,282,232 UART: [fwproc] Recv command 0x46574c44
1,282,960 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,677 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,024 >>> mbox cmd response: success
2,777,160 UART: [afmc] ++
2,777,328 UART: [afmc] CDI.KEYID = 6
2,777,690 UART: [afmc] SUBJECT.KEYID = 7
2,778,115 UART: [afmc] AUTHORITY.KEYID = 5
2,813,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,587 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,315 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,200 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,919 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,781 UART: [afmc] --
2,856,801 UART: [cold-reset] --
2,857,709 UART: [state] Locking Datavault
2,858,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,526 UART: [state] Locking ICCM
2,860,090 UART: [exit] Launching FMC @ 0x40000130
2,865,419 UART:
2,865,435 UART: Running Caliptra FMC ...
2,865,843 UART:
2,865,897 UART: [state] CFI Enabled
2,876,868 UART: [fht] FMC Alias Private Key: 7
2,985,285 UART: [art] Extend RT PCRs Done
2,985,713 UART: [art] Lock RT PCRs Done
2,987,611 UART: [art] Populate DV Done
2,996,070 UART: [fht] FMC Alias Private Key: 7
2,997,156 UART: [art] Derive CDI
2,997,436 UART: [art] Store in in slot 0x4
3,082,593 UART: [art] Derive Key Pair
3,082,953 UART: [art] Store priv key in slot 0x5
3,096,317 UART: [art] Derive Key Pair - Done
3,111,230 UART: [art] Signing Cert with AUTHO
3,111,710 UART: RITY.KEYID = 7
3,126,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,653 UART: [art] PUB.X = D3F6468D9A56814696DE807F117557D56B9BB6B1A8658190566900D24A21A0AEB3578091B10F0C531FD16FDF255581C1
3,134,389 UART: [art] PUB.Y = B6216ECC740401574A10CB9A4BBB3D5CA3F6C07349E259FC741A9848BC392FA1C55457E0064399D4099C4A428EA7E652
3,141,329 UART: [art] SIG.R = B308BE2A852F9C49FD3AB94301A3F0F0AE616F1C762FD3C15640A3EF0FB86B5FBB69E2D4EDA7DBAC25E439B0E2AB97A4
3,148,116 UART: [art] SIG.S = D4242708B0B78CAC9CBA026C0743A79B1B69A5533D8CA5D2F4672710B8E0E4BDD5CD37E696A28BF0CACEEF5B96E44BB7
3,171,676 UART: Caliptra RT
3,171,929 UART: [state] CFI Enabled
3,279,031 UART: [rt] RT listening for mailbox commands...
3,279,701 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,127 UART: [rt]cmd =0x44504543, len=92
3,525,511 >>> mbox cmd response data (6284 bytes)
3,525,512 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,554,871 UART: [rt]cmd =0x43455252, len=4
3,565,477 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,919 ready_for_fw is high
1,059,919 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,397 >>> mbox cmd response: success
2,689,299 UART:
2,689,315 UART: Running Caliptra FMC ...
2,689,723 UART:
2,689,777 UART: [state] CFI Enabled
2,700,150 UART: [fht] FMC Alias Private Key: 7
2,808,095 UART: [art] Extend RT PCRs Done
2,808,523 UART: [art] Lock RT PCRs Done
2,810,279 UART: [art] Populate DV Done
2,818,438 UART: [fht] FMC Alias Private Key: 7
2,819,512 UART: [art] Derive CDI
2,819,792 UART: [art] Store in in slot 0x4
2,905,355 UART: [art] Derive Key Pair
2,905,715 UART: [art] Store priv key in slot 0x5
2,918,771 UART: [art] Derive Key Pair - Done
2,933,801 UART: [art] Signing Cert with AUTHO
2,934,281 UART: RITY.KEYID = 7
2,949,419 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,184 UART: [art] PUB.X = 4269898D4421737D2D4EC7A9B3A3F146840A32566901741B0DA27C0A29E0AB777A6FBD95341DD137290072CEC669714E
2,956,914 UART: [art] PUB.Y = AB7068DD05134556A3161CF38C36A497A7E7350BB30095FDF866E2A616785B008C9974DFF1A407C34E39073F922861F9
2,963,802 UART: [art] SIG.R = 4A3F00C2F51E3AF4F712DD51BB9A54F948256F767F08DFC8133C9C2E47C2472916710F609511DBB2122B9D6D5D01A926
2,970,543 UART: [art] SIG.S = 5E5D823E874B07D02D0BA126C0EF30F51FCDEBFFB7912C0D2286B53B313B0B9465031AF2A5CFD29BB3B3457595B76564
2,994,167 UART: Caliptra RT
2,994,420 UART: [state] CFI Enabled
3,102,193 UART: [rt] RT listening for mailbox commands...
3,102,863 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,229 UART: [rt]cmd =0x44504543, len=92
3,349,387 >>> mbox cmd response data (6284 bytes)
3,349,388 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,717 UART: [rt]cmd =0x43455252, len=4
3,389,450 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
893,443 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,568 UART: [kat] ++
897,720 UART: [kat] sha1
901,722 UART: [kat] SHA2-256
903,662 UART: [kat] SHA2-384
906,315 UART: [kat] SHA2-512-ACC
908,216 UART: [kat] ECC-384
918,303 UART: [kat] HMAC-384Kdf
922,889 UART: [kat] LMS
1,171,217 UART: [kat] --
1,172,286 UART: [cold-reset] ++
1,172,676 UART: [fht] FHT @ 0x50003400
1,175,327 UART: [idev] ++
1,175,495 UART: [idev] CDI.KEYID = 6
1,175,855 UART: [idev] SUBJECT.KEYID = 7
1,176,279 UART: [idev] UDS.KEYID = 0
1,176,624 ready_for_fw is high
1,176,624 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,549 UART: [idev] Erasing UDS.KEYID = 0
1,202,026 UART: [idev] Sha1 KeyId Algorithm
1,210,416 UART: [idev] --
1,211,254 UART: [ldev] ++
1,211,422 UART: [ldev] CDI.KEYID = 6
1,211,785 UART: [ldev] SUBJECT.KEYID = 5
1,212,211 UART: [ldev] AUTHORITY.KEYID = 7
1,212,674 UART: [ldev] FE.KEYID = 1
1,218,048 UART: [ldev] Erasing FE.KEYID = 1
1,244,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,360 UART: [ldev] --
1,283,807 UART: [fwproc] Wait for Commands...
1,284,533 UART: [fwproc] Recv command 0x46574c44
1,285,261 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,002 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,306 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,339 >>> mbox cmd response: success
2,779,497 UART: [afmc] ++
2,779,665 UART: [afmc] CDI.KEYID = 6
2,780,027 UART: [afmc] SUBJECT.KEYID = 7
2,780,452 UART: [afmc] AUTHORITY.KEYID = 5
2,816,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,980 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,638 UART: [afmc] --
2,859,632 UART: [cold-reset] --
2,860,434 UART: [state] Locking Datavault
2,861,761 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,365 UART: [state] Locking ICCM
2,863,021 UART: [exit] Launching FMC @ 0x40000130
2,868,350 UART:
2,868,366 UART: Running Caliptra FMC ...
2,868,774 UART:
2,868,917 UART: [state] CFI Enabled
2,878,996 UART: [fht] FMC Alias Private Key: 7
2,987,509 UART: [art] Extend RT PCRs Done
2,987,937 UART: [art] Lock RT PCRs Done
2,989,515 UART: [art] Populate DV Done
2,997,920 UART: [fht] FMC Alias Private Key: 7
2,998,980 UART: [art] Derive CDI
2,999,260 UART: [art] Store in in slot 0x4
3,084,737 UART: [art] Derive Key Pair
3,085,097 UART: [art] Store priv key in slot 0x5
3,098,113 UART: [art] Derive Key Pair - Done
3,112,953 UART: [art] Signing Cert with AUTHO
3,113,433 UART: RITY.KEYID = 7
3,128,449 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,214 UART: [art] PUB.X = 65BC1CE19364797429B29A09297060CB071681CDEEC4EAE320310A721E4A98130D6D77665F751A6421E38B538D5E0EC4
3,135,965 UART: [art] PUB.Y = 9BA94E709E23A78A00CE2F5F59E6441E7269633799682F9AED6D1C7270B0F9AEF35D55202FDF3619799D5B5B519F051E
3,142,892 UART: [art] SIG.R = C6B05DD89B57367910284487861E86671CECF6A9C9641BB597E26213358E7DC91E8816A7E5AEBDE78F1296E2992D5197
3,149,658 UART: [art] SIG.S = B7527461EF8FA955DE03480814D572600C30B19A316A01F655D355DDCC6417F3078694E036A62200D083D13D0012907C
3,173,514 UART: Caliptra RT
3,173,859 UART: [state] CFI Enabled
3,281,179 UART: [rt] RT listening for mailbox commands...
3,281,849 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,119 UART: [rt]cmd =0x44504543, len=92
3,526,932 >>> mbox cmd response data (6284 bytes)
3,526,933 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,370 UART: [rt]cmd =0x43455252, len=4
3,566,962 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,992 ready_for_fw is high
1,059,992 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,994 >>> mbox cmd response: success
2,688,760 UART:
2,688,776 UART: Running Caliptra FMC ...
2,689,184 UART:
2,689,327 UART: [state] CFI Enabled
2,699,778 UART: [fht] FMC Alias Private Key: 7
2,808,233 UART: [art] Extend RT PCRs Done
2,808,661 UART: [art] Lock RT PCRs Done
2,810,499 UART: [art] Populate DV Done
2,818,694 UART: [fht] FMC Alias Private Key: 7
2,819,732 UART: [art] Derive CDI
2,820,012 UART: [art] Store in in slot 0x4
2,905,247 UART: [art] Derive Key Pair
2,905,607 UART: [art] Store priv key in slot 0x5
2,919,011 UART: [art] Derive Key Pair - Done
2,933,336 UART: [art] Signing Cert with AUTHO
2,933,816 UART: RITY.KEYID = 7
2,949,010 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,775 UART: [art] PUB.X = 399074E5C00BE54A57A958127D500A9958A77BBF9F5C74F144412A8936C2031571BA47DA33E1121D0A07D635C0959D9C
2,956,524 UART: [art] PUB.Y = 1FBF6C4EB0487087E1ED644D24A5F522DB0635BE3F9172AA408C4640D2272CF36C71FDB56503651C4066291D313027A6
2,963,466 UART: [art] SIG.R = 705984B92BD01FD50E179C9D3F64C1F3E3DC28FB54253352A5F74D34234D54D9017512BD72DF5B7860BDEB22594CD349
2,970,232 UART: [art] SIG.S = 632CA22ADA55B86B9D577F38257A0A5E1AC781A027DA0A30AA990C5D64070C1ED880952057BD06F877DD8218A5631C9B
2,994,197 UART: Caliptra RT
2,994,542 UART: [state] CFI Enabled
3,102,941 UART: [rt] RT listening for mailbox commands...
3,103,611 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,347 UART: [rt]cmd =0x44504543, len=92
3,350,840 >>> mbox cmd response data (6284 bytes)
3,350,841 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,178 UART: [rt]cmd =0x43455252, len=4
3,391,033 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
900,099 UART: [kat] SHA2-256
902,039 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,559 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 ready_for_fw is high
1,174,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,905 UART: [idev] Sha1 KeyId Algorithm
1,207,821 UART: [idev] --
1,209,024 UART: [ldev] ++
1,209,192 UART: [ldev] CDI.KEYID = 6
1,209,556 UART: [ldev] SUBJECT.KEYID = 5
1,209,983 UART: [ldev] AUTHORITY.KEYID = 7
1,210,446 UART: [ldev] FE.KEYID = 1
1,215,338 UART: [ldev] Erasing FE.KEYID = 1
1,241,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,070 UART: [ldev] --
1,280,416 UART: [fwproc] Wait for Commands...
1,281,093 UART: [fwproc] Recv command 0x46574c44
1,281,826 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,206 >>> mbox cmd response: success
2,774,399 UART: [afmc] ++
2,774,567 UART: [afmc] CDI.KEYID = 6
2,774,930 UART: [afmc] SUBJECT.KEYID = 7
2,775,356 UART: [afmc] AUTHORITY.KEYID = 5
2,811,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,726 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,338 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,057 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,012 UART: [afmc] --
2,855,140 UART: [cold-reset] --
2,855,930 UART: [state] Locking Datavault
2,857,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,045 UART: [state] Locking ICCM
2,858,711 UART: [exit] Launching FMC @ 0x40000130
2,864,040 UART:
2,864,056 UART: Running Caliptra FMC ...
2,864,464 UART:
2,864,518 UART: [state] CFI Enabled
2,875,013 UART: [fht] FMC Alias Private Key: 7
2,982,890 UART: [art] Extend RT PCRs Done
2,983,318 UART: [art] Lock RT PCRs Done
2,984,740 UART: [art] Populate DV Done
2,993,101 UART: [fht] FMC Alias Private Key: 7
2,994,127 UART: [art] Derive CDI
2,994,407 UART: [art] Store in in slot 0x4
3,080,022 UART: [art] Derive Key Pair
3,080,382 UART: [art] Store priv key in slot 0x5
3,093,276 UART: [art] Derive Key Pair - Done
3,108,323 UART: [art] Signing Cert with AUTHO
3,108,803 UART: RITY.KEYID = 7
3,124,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,848 UART: [art] PUB.X = 55E0B7BFE4420120628C1767ECA386EC83D5DED7AB22B3EC04DBB0D14B6640DD6EF3327D5C09FF53E4628B54CBA11A94
3,131,625 UART: [art] PUB.Y = 25A5786E7851266D2F95DE514BAA45575DF88F14C90DD70580E7A311BCFC1AE395F39BBFC452F6B7A42DD91C23E18A51
3,138,579 UART: [art] SIG.R = E8BA78F12CA5AD0F9A7DD42F0CB2D8D6E3848D73DEA529A7AAA1137DECD967B2F478BA97A2D857D8C940F75171085A11
3,145,358 UART: [art] SIG.S = A2004DAD6DFD5265700EEF46C3868A908A5F0526B9C8FD0F6C4466495264915A6D943AB5A4ECD03E7F75C3A2DE67DA2B
3,169,076 UART: Caliptra RT
3,169,329 UART: [state] CFI Enabled
3,276,721 UART: [rt] RT listening for mailbox commands...
3,277,391 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,831 UART: [rt]cmd =0x44504543, len=92
3,523,565 >>> mbox cmd response data (6284 bytes)
3,523,566 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,553,099 UART: [rt]cmd =0x43455252, len=4
3,563,979 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,448 ready_for_fw is high
1,055,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,678 >>> mbox cmd response: success
2,685,824 UART:
2,685,840 UART: Running Caliptra FMC ...
2,686,248 UART:
2,686,302 UART: [state] CFI Enabled
2,697,191 UART: [fht] FMC Alias Private Key: 7
2,804,950 UART: [art] Extend RT PCRs Done
2,805,378 UART: [art] Lock RT PCRs Done
2,807,088 UART: [art] Populate DV Done
2,815,255 UART: [fht] FMC Alias Private Key: 7
2,816,281 UART: [art] Derive CDI
2,816,561 UART: [art] Store in in slot 0x4
2,902,326 UART: [art] Derive Key Pair
2,902,686 UART: [art] Store priv key in slot 0x5
2,915,788 UART: [art] Derive Key Pair - Done
2,930,548 UART: [art] Signing Cert with AUTHO
2,931,028 UART: RITY.KEYID = 7
2,946,292 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,057 UART: [art] PUB.X = 3DBCECA0E6F715EA8F366F92BE6B1EB49A1B276A0A512CD0711E00E4407EFFC13FFF829F2CFCE1C6FAAE753227CBC3AD
2,953,834 UART: [art] PUB.Y = 32E22CCB38C2AA93C82FE2BAAC2B12649AFFBC2F51677F7ECCA98F619ACA7D05A9F9486942EC5CC41BB156A8E52E7F99
2,960,805 UART: [art] SIG.R = 6200BB8617D177D5FE34A245009BE70A409F86B0854ACB04EF70E2BAFA3F51C9A16639FB5B871A52B9D0C686B842F80C
2,967,530 UART: [art] SIG.S = 8FF9C6D88323C9B51D96CA8C4EB059AD585FBAFADD7A51B7B370FD5D23B57CDFB25955FCA6ABB11F518085A67AA98654
2,991,409 UART: Caliptra RT
2,991,662 UART: [state] CFI Enabled
3,100,289 UART: [rt] RT listening for mailbox commands...
3,100,959 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,589 UART: [rt]cmd =0x44504543, len=92
3,347,846 >>> mbox cmd response data (6284 bytes)
3,347,847 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,254 UART: [rt]cmd =0x43455252, len=4
3,388,193 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
900,096 UART: [kat] SHA2-256
902,036 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,921 UART: [kat] LMS
1,169,233 UART: [kat] --
1,170,132 UART: [cold-reset] ++
1,170,692 UART: [fht] FHT @ 0x50003400
1,173,320 UART: [idev] ++
1,173,488 UART: [idev] CDI.KEYID = 6
1,173,849 UART: [idev] SUBJECT.KEYID = 7
1,174,274 UART: [idev] UDS.KEYID = 0
1,174,620 ready_for_fw is high
1,174,620 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,262 UART: [idev] Erasing UDS.KEYID = 0
1,199,466 UART: [idev] Sha1 KeyId Algorithm
1,208,454 UART: [idev] --
1,209,577 UART: [ldev] ++
1,209,745 UART: [ldev] CDI.KEYID = 6
1,210,109 UART: [ldev] SUBJECT.KEYID = 5
1,210,536 UART: [ldev] AUTHORITY.KEYID = 7
1,210,999 UART: [ldev] FE.KEYID = 1
1,216,121 UART: [ldev] Erasing FE.KEYID = 1
1,242,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,743 UART: [ldev] --
1,282,053 UART: [fwproc] Wait for Commands...
1,282,822 UART: [fwproc] Recv command 0x46574c44
1,283,555 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,645 >>> mbox cmd response: success
2,775,808 UART: [afmc] ++
2,775,976 UART: [afmc] CDI.KEYID = 6
2,776,339 UART: [afmc] SUBJECT.KEYID = 7
2,776,765 UART: [afmc] AUTHORITY.KEYID = 5
2,812,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,811 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,540 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,423 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,142 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,865 UART: [afmc] --
2,855,949 UART: [cold-reset] --
2,856,951 UART: [state] Locking Datavault
2,857,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,478 UART: [state] Locking ICCM
2,859,148 UART: [exit] Launching FMC @ 0x40000130
2,864,477 UART:
2,864,493 UART: Running Caliptra FMC ...
2,864,901 UART:
2,865,044 UART: [state] CFI Enabled
2,875,585 UART: [fht] FMC Alias Private Key: 7
2,984,042 UART: [art] Extend RT PCRs Done
2,984,470 UART: [art] Lock RT PCRs Done
2,986,220 UART: [art] Populate DV Done
2,994,373 UART: [fht] FMC Alias Private Key: 7
2,995,377 UART: [art] Derive CDI
2,995,657 UART: [art] Store in in slot 0x4
3,081,706 UART: [art] Derive Key Pair
3,082,066 UART: [art] Store priv key in slot 0x5
3,095,098 UART: [art] Derive Key Pair - Done
3,109,938 UART: [art] Signing Cert with AUTHO
3,110,418 UART: RITY.KEYID = 7
3,125,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,621 UART: [art] PUB.X = A16666862EA54E1879A69CA39597F1BFD4827E6BA4796980390E7D1368E91940B4F45A27EF356C9A63007161F9E76903
3,133,353 UART: [art] PUB.Y = 201FC44384D1077441F324D223B71A2E5A51B90A5AC41EB4F24F0EA70D88878B03F0D4A7A3739D92D794AA0BE31CA238
3,140,289 UART: [art] SIG.R = C77CF55AE06F1A5281F7FC042D59AE02901C907672C7E0735802B9AD986382469EEA8E87AD83B8CA4D0A5D613A012B91
3,147,048 UART: [art] SIG.S = B1D411228C90A83B57733BD0218951D4C95B2A8AD0C6490C635E278036E19AE41BA0EE19E8D5DC384EBF5322D988FA4D
3,170,784 UART: Caliptra RT
3,171,129 UART: [state] CFI Enabled
3,279,111 UART: [rt] RT listening for mailbox commands...
3,279,781 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,995 UART: [rt]cmd =0x44504543, len=92
3,526,808 >>> mbox cmd response data (6284 bytes)
3,526,809 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,242 UART: [rt]cmd =0x43455252, len=4
3,567,130 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,095 ready_for_fw is high
1,056,095 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,549 >>> mbox cmd response: success
2,686,101 UART:
2,686,117 UART: Running Caliptra FMC ...
2,686,525 UART:
2,686,668 UART: [state] CFI Enabled
2,697,083 UART: [fht] FMC Alias Private Key: 7
2,804,878 UART: [art] Extend RT PCRs Done
2,805,306 UART: [art] Lock RT PCRs Done
2,806,838 UART: [art] Populate DV Done
2,815,207 UART: [fht] FMC Alias Private Key: 7
2,816,275 UART: [art] Derive CDI
2,816,555 UART: [art] Store in in slot 0x4
2,902,434 UART: [art] Derive Key Pair
2,902,794 UART: [art] Store priv key in slot 0x5
2,916,130 UART: [art] Derive Key Pair - Done
2,930,911 UART: [art] Signing Cert with AUTHO
2,931,391 UART: RITY.KEYID = 7
2,946,561 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,326 UART: [art] PUB.X = F8B1A27353FDD3977880A0323E85A8B092E17B32F1551236D218702E2AA8D04058434C33C45DA6638E473AB7F1619504
2,954,083 UART: [art] PUB.Y = AEE2574D12C54FDA12D5DCB4ED22444A764BDA4EEE167AEE5A76D7F4CA5AFDC88D89DDB8DA0EB1A15463FD29B72799B1
2,961,060 UART: [art] SIG.R = F5AA44E5630D3080DB7382EF87DF0BFCC53D6B42B107E3ECBE55BFA86AC8ED015FE2B46B7A89B34B7CC03095BA4F4319
2,967,840 UART: [art] SIG.S = BE0FB63D3077112449B477D8D2EBBE1B73E7454767AC2579308000A7C97D4336711230724123C63AA3AD5AB964E07A89
2,991,788 UART: Caliptra RT
2,992,133 UART: [state] CFI Enabled
3,100,127 UART: [rt] RT listening for mailbox commands...
3,100,797 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,119 UART: [rt]cmd =0x44504543, len=92
3,348,550 >>> mbox cmd response data (6284 bytes)
3,348,551 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,934 UART: [rt]cmd =0x43455252, len=4
3,388,680 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,018 UART:
192,385 UART: Running Caliptra ROM ...
193,488 UART:
193,630 UART: [state] CFI Enabled
263,610 UART: [state] LifecycleState = Unprovisioned
265,526 UART: [state] DebugLocked = No
267,048 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,572 UART: [kat] SHA2-256
441,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,744 UART: [kat] ++
452,188 UART: [kat] sha1
463,632 UART: [kat] SHA2-256
466,354 UART: [kat] SHA2-384
472,765 UART: [kat] SHA2-512-ACC
475,140 UART: [kat] ECC-384
2,769,225 UART: [kat] HMAC-384Kdf
2,780,335 UART: [kat] LMS
3,970,592 UART: [kat] --
3,974,832 UART: [cold-reset] ++
3,977,271 UART: [fht] Storing FHT @ 0x50003400
3,987,970 UART: [idev] ++
3,988,531 UART: [idev] CDI.KEYID = 6
3,989,487 UART: [idev] SUBJECT.KEYID = 7
3,990,729 UART: [idev] UDS.KEYID = 0
3,991,684 ready_for_fw is high
3,991,873 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,405 UART: [idev] Erasing UDS.KEYID = 0
7,326,547 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,999 UART: [idev] --
7,351,155 UART: [ldev] ++
7,351,728 UART: [ldev] CDI.KEYID = 6
7,352,743 UART: [ldev] SUBJECT.KEYID = 5
7,353,919 UART: [ldev] AUTHORITY.KEYID = 7
7,355,146 UART: [ldev] FE.KEYID = 1
7,403,468 UART: [ldev] Erasing FE.KEYID = 1
10,737,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,154 UART: [ldev] --
13,117,877 UART: [fwproc] Waiting for Commands...
13,120,786 UART: [fwproc] Received command 0x46574c44
13,123,016 UART: [fwproc] Received Image of size 114124 bytes
17,171,404 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,634,218 >>> mbox cmd response: success
17,634,827 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,638,598 UART: [afmc] ++
17,639,189 UART: [afmc] CDI.KEYID = 6
17,640,220 UART: [afmc] SUBJECT.KEYID = 7
17,641,377 UART: [afmc] AUTHORITY.KEYID = 5
21,009,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,855 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,121 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,538 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,377 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,831 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,622 UART: [afmc] --
23,381,100 UART: [cold-reset] --
23,384,104 UART: [state] Locking Datavault
23,389,091 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,851 UART: [state] Locking ICCM
23,392,080 UART: [exit] Launching FMC @ 0x40000130
23,400,483 UART:
23,400,718 UART: Running Caliptra FMC ...
23,401,745 UART:
23,401,891 UART: [state] CFI Enabled
23,470,211 UART: [fht] FMC Alias Private Key: 7
25,808,331 UART: [art] Extend RT PCRs Done
25,809,551 UART: [art] Lock RT PCRs Done
25,810,988 UART: [art] Populate DV Done
25,816,456 UART: [fht] FMC Alias Private Key: 7
25,818,105 UART: [art] Derive CDI
25,818,919 UART: [art] Store in in slot 0x4
25,879,167 UART: [art] Derive Key Pair
25,880,205 UART: [art] Store priv key in slot 0x5
29,173,740 UART: [art] Derive Key Pair - Done
29,186,623 UART: [art] Signing Cert with AUTHO
29,187,949 UART: RITY.KEYID = 7
31,474,998 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,506 UART: [art] PUB.X = C0950BBD9167E602955C7D28E1347B63FE5A0A977EEB7BD9A11C6003E3A652955C40D9CA20A0F70772D88B6ADE51D608
31,483,751 UART: [art] PUB.Y = C1CD65F34D8DCDDD52D47D5EA969F9AB76958F67C20306424F76B910ABE157356271795458C9D383489E4031761994D9
31,490,985 UART: [art] SIG.R = D682186593B341570788F2E0ADB45B4476B4474A0AFA6180969B73821F341E08B665EBA03948EA610FFC9F21C6D5BA26
31,498,323 UART: [art] SIG.S = DCACF0960773B70A34E5A060F3E6A186C0A9BC68CA33BD791396AE68697B87FB5A193E124A255BCE556DB1242E41A1FB
32,803,385 UART: Caliptra RT
32,804,090 UART: [state] CFI Enabled
32,964,163 UART: [rt] RT listening for mailbox commands...
32,996,212 UART: [rt]cmd =0x44504543, len=92
38,762,727 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,783,228 ready_for_fw is high
3,783,896 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,866,150 >>> mbox cmd response: success
17,866,883 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,566,456 UART:
23,566,836 UART: Running Caliptra FMC ...
23,567,974 UART:
23,568,139 UART: [state] CFI Enabled
23,635,087 UART: [fht] FMC Alias Private Key: 7
25,972,631 UART: [art] Extend RT PCRs Done
25,973,856 UART: [art] Lock RT PCRs Done
25,975,292 UART: [art] Populate DV Done
25,980,446 UART: [fht] FMC Alias Private Key: 7
25,981,991 UART: [art] Derive CDI
25,982,755 UART: [art] Store in in slot 0x4
26,043,615 UART: [art] Derive Key Pair
26,044,654 UART: [art] Store priv key in slot 0x5
29,337,479 UART: [art] Derive Key Pair - Done
29,350,968 UART: [art] Signing Cert with AUTHO
29,352,283 UART: RITY.KEYID = 7
31,638,374 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,883 UART: [art] PUB.X = ED29D7623C86B4E501E313346D8D72FBBB37AA6952BBEE2EC78B324D9AB8E34AC4D31D86E1B0538C6A97FEA9E36AF251
31,647,099 UART: [art] PUB.Y = E111FEA2BB5B970C2BD74978811F1ACB3768858364DA235A0CE60C612E90F2CAF53FE1C16B139A9E7ECF375322885720
31,654,363 UART: [art] SIG.R = BD6E7D0B226876B5C415FCACD8B17E831D093C3CB26B458399F4B4A75B72B658E7013474254D7FA3D55A814FAE143F96
31,661,730 UART: [art] SIG.S = 8F0DF1899B0D56AB8B23FC197D3BF89A0F9A823DDD75388DEA4ED6AE223B7853B948673FB513BBD8596A387A191DFFDF
32,966,177 UART: Caliptra RT
32,966,881 UART: [state] CFI Enabled
33,128,281 UART: [rt] RT listening for mailbox commands...
33,160,393 UART: [rt]cmd =0x44504543, len=92
38,926,031 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,379 UART:
192,751 UART: Running Caliptra ROM ...
193,880 UART:
603,810 UART: [state] CFI Enabled
618,054 UART: [state] LifecycleState = Unprovisioned
620,007 UART: [state] DebugLocked = No
622,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,030 UART: [kat] SHA2-256
796,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,350 UART: [kat] ++
807,793 UART: [kat] sha1
819,296 UART: [kat] SHA2-256
822,011 UART: [kat] SHA2-384
827,221 UART: [kat] SHA2-512-ACC
829,586 UART: [kat] ECC-384
3,113,783 UART: [kat] HMAC-384Kdf
3,125,959 UART: [kat] LMS
4,316,028 UART: [kat] --
4,320,398 UART: [cold-reset] ++
4,322,185 UART: [fht] Storing FHT @ 0x50003400
4,333,088 UART: [idev] ++
4,333,656 UART: [idev] CDI.KEYID = 6
4,334,534 UART: [idev] SUBJECT.KEYID = 7
4,335,841 UART: [idev] UDS.KEYID = 0
4,336,822 ready_for_fw is high
4,337,020 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,310 UART: [idev] Erasing UDS.KEYID = 0
7,624,916 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,146 UART: [idev] --
7,652,986 UART: [ldev] ++
7,653,614 UART: [ldev] CDI.KEYID = 6
7,654,519 UART: [ldev] SUBJECT.KEYID = 5
7,655,725 UART: [ldev] AUTHORITY.KEYID = 7
7,657,010 UART: [ldev] FE.KEYID = 1
7,668,807 UART: [ldev] Erasing FE.KEYID = 1
10,957,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,173 UART: [ldev] --
13,319,944 UART: [fwproc] Waiting for Commands...
13,322,946 UART: [fwproc] Received command 0x46574c44
13,325,173 UART: [fwproc] Received Image of size 114124 bytes
17,386,745 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,465,887 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,534,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,852,829 >>> mbox cmd response: success
17,853,409 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,857,169 UART: [afmc] ++
17,857,826 UART: [afmc] CDI.KEYID = 6
17,858,737 UART: [afmc] SUBJECT.KEYID = 7
17,859,949 UART: [afmc] AUTHORITY.KEYID = 5
21,175,297 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,470,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,473,168 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,487,576 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,502,374 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,516,823 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,539,375 UART: [afmc] --
23,543,994 UART: [cold-reset] --
23,548,508 UART: [state] Locking Datavault
23,554,723 UART: [state] Locking PCR0, PCR1 and PCR31
23,556,471 UART: [state] Locking ICCM
23,558,777 UART: [exit] Launching FMC @ 0x40000130
23,567,176 UART:
23,567,478 UART: Running Caliptra FMC ...
23,568,591 UART:
23,568,745 UART: [state] CFI Enabled
23,577,001 UART: [fht] FMC Alias Private Key: 7
25,907,089 UART: [art] Extend RT PCRs Done
25,908,308 UART: [art] Lock RT PCRs Done
25,909,871 UART: [art] Populate DV Done
25,915,172 UART: [fht] FMC Alias Private Key: 7
25,916,758 UART: [art] Derive CDI
25,917,566 UART: [art] Store in in slot 0x4
25,960,310 UART: [art] Derive Key Pair
25,961,307 UART: [art] Store priv key in slot 0x5
29,203,144 UART: [art] Derive Key Pair - Done
29,216,348 UART: [art] Signing Cert with AUTHO
29,217,639 UART: RITY.KEYID = 7
31,497,130 UART: [art] Erasing AUTHORITY.KEYID = 7
31,498,667 UART: [art] PUB.X = 3EC29B2AF4C5E29289597FF6912EFCE8E011FFF82FBB5E5E1EA046F7DBFFBBF5610D8AF73581F66E03FBBAB445252236
31,505,915 UART: [art] PUB.Y = C8F3028E6810CD702F9B392C4C383F950CBB94A183B052B7E4E90B825AC1120C09762818757F56505ACE642E65601767
31,513,142 UART: [art] SIG.R = E759E523BF0DC04171C67A3930CA6E180AAD102FBB1BEA99C3AD893F702BECECB74140E47BAD53C885470A177A4CAE92
31,520,525 UART: [art] SIG.S = 4AEE61DD3710753F738BF4C28897073CE3D4828247435D7D314F33767E420A3426CCF2FD25E6B4E8220E6DC252726D8D
32,825,670 UART: Caliptra RT
32,826,385 UART: [state] CFI Enabled
32,944,635 UART: [rt] RT listening for mailbox commands...
32,976,538 UART: [rt]cmd =0x44504543, len=92
38,649,731 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
4,129,800 ready_for_fw is high
4,130,246 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,108 >>> mbox cmd response: success
18,073,990 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,712,619 UART:
23,712,998 UART: Running Caliptra FMC ...
23,714,097 UART:
23,714,246 UART: [state] CFI Enabled
23,722,241 UART: [fht] FMC Alias Private Key: 7
26,052,471 UART: [art] Extend RT PCRs Done
26,053,700 UART: [art] Lock RT PCRs Done
26,055,741 UART: [art] Populate DV Done
26,061,429 UART: [fht] FMC Alias Private Key: 7
26,063,026 UART: [art] Derive CDI
26,063,842 UART: [art] Store in in slot 0x4
26,106,495 UART: [art] Derive Key Pair
26,107,536 UART: [art] Store priv key in slot 0x5
29,349,514 UART: [art] Derive Key Pair - Done
29,362,754 UART: [art] Signing Cert with AUTHO
29,364,055 UART: RITY.KEYID = 7
31,643,447 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,954 UART: [art] PUB.X = EA9B05F801F8C561957B2299C7254D70F118202BB456F4D8AAFCFBAF30E316E02D7D4736575274B75DDB1AD5932B5726
31,652,199 UART: [art] PUB.Y = E41EF9C1FD015D08F4CD26A7C309C1F5ECF6A6FB01A56EAC7157338138187DC365A1495B06719CCBE21CEA41E36D0CBD
31,659,470 UART: [art] SIG.R = AEA0B6FA73D956DF92F0A3C9071B3C12A1E77CBAA52BEB704DD88A087756D373416D98EB55A7A394027EF97644FD29C8
31,666,863 UART: [art] SIG.S = 43B8DB262DB7D88B4054B2FD51E75580FCD4A98F09B7ECF0D11315CE22EDE36E8CDADE04F848CF5BDA09D05FC4B2273A
32,972,321 UART: Caliptra RT
32,973,031 UART: [state] CFI Enabled
33,090,511 UART: [rt] RT listening for mailbox commands...
33,122,795 UART: [rt]cmd =0x44504543, len=92
38,797,512 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,055 UART:
192,451 UART: Running Caliptra ROM ...
193,594 UART:
193,741 UART: [state] CFI Enabled
267,260 UART: [state] LifecycleState = Unprovisioned
269,116 UART: [state] DebugLocked = No
271,429 UART: [state] WD Timer not started. Device not locked for debugging
276,019 UART: [kat] SHA2-256
455,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,645 UART: [kat] ++
467,178 UART: [kat] sha1
477,421 UART: [kat] SHA2-256
480,425 UART: [kat] SHA2-384
487,120 UART: [kat] SHA2-512-ACC
490,122 UART: [kat] ECC-384
2,949,903 UART: [kat] HMAC-384Kdf
2,974,665 UART: [kat] LMS
3,504,119 UART: [kat] --
3,507,757 UART: [cold-reset] ++
3,509,329 UART: [fht] FHT @ 0x50003400
3,520,088 UART: [idev] ++
3,520,654 UART: [idev] CDI.KEYID = 6
3,521,563 UART: [idev] SUBJECT.KEYID = 7
3,522,738 UART: [idev] UDS.KEYID = 0
3,523,803 ready_for_fw is high
3,524,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,051 UART: [idev] Erasing UDS.KEYID = 0
6,025,574 UART: [idev] Sha1 KeyId Algorithm
6,048,149 UART: [idev] --
6,052,010 UART: [ldev] ++
6,052,585 UART: [ldev] CDI.KEYID = 6
6,053,494 UART: [ldev] SUBJECT.KEYID = 5
6,054,653 UART: [ldev] AUTHORITY.KEYID = 7
6,055,936 UART: [ldev] FE.KEYID = 1
6,102,549 UART: [ldev] Erasing FE.KEYID = 1
8,606,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,552 UART: [ldev] --
10,415,406 UART: [fwproc] Wait for Commands...
10,418,254 UART: [fwproc] Recv command 0x46574c44
10,420,345 UART: [fwproc] Recv'd Img size: 114448 bytes
13,825,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,289,389 >>> mbox cmd response: success
14,289,964 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,294,344 UART: [afmc] ++
14,294,955 UART: [afmc] CDI.KEYID = 6
14,295,842 UART: [afmc] SUBJECT.KEYID = 7
14,297,059 UART: [afmc] AUTHORITY.KEYID = 5
16,834,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,611 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,958 UART: [afmc] --
18,631,820 UART: [cold-reset] --
18,635,456 UART: [state] Locking Datavault
18,642,690 UART: [state] Locking PCR0, PCR1 and PCR31
18,644,336 UART: [state] Locking ICCM
18,645,322 UART: [exit] Launching FMC @ 0x40000130
18,653,764 UART:
18,653,994 UART: Running Caliptra FMC ...
18,655,017 UART:
18,655,165 UART: [state] CFI Enabled
18,714,660 UART: [fht] FMC Alias Private Key: 7
20,478,611 UART: [art] Extend RT PCRs Done
20,479,829 UART: [art] Lock RT PCRs Done
20,481,118 UART: [art] Populate DV Done
20,486,750 UART: [fht] FMC Alias Private Key: 7
20,488,447 UART: [art] Derive CDI
20,489,184 UART: [art] Store in in slot 0x4
20,546,757 UART: [art] Derive Key Pair
20,547,784 UART: [art] Store priv key in slot 0x5
23,010,879 UART: [art] Derive Key Pair - Done
23,024,093 UART: [art] Signing Cert with AUTHO
23,025,390 UART: RITY.KEYID = 7
24,736,745 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,242 UART: [art] PUB.X = 9F96F865C3C11FB00A653C9660027064C6ADCEE847D201812DB5D76A4F94ADFCD91D2C21B7E0BC20CD6BC3D4489246F6
24,745,545 UART: [art] PUB.Y = 644A682DC0AC3ACDE2321824AC85D494DBA9142CF63D364920CF3BE5830289526951C0D7AF55B443ED2A6C353929F72F
24,752,835 UART: [art] SIG.R = 2410FC95697282FDB6C218DF970D6DF319221D87182E25F87A5C01A5101E7E6549E16C86B79CD29B71F0F8CF970A4F78
24,760,214 UART: [art] SIG.S = 84118F3EF3CB5C46AE831231A21CE543C80ABE6C1124A7FAA9E075B003E2D58E15FF0151C8C25AC1286866A544C35D96
25,739,537 UART: Caliptra RT
25,740,244 UART: [state] CFI Enabled
25,905,416 UART: [rt] RT listening for mailbox commands...
25,937,208 UART: [rt]cmd =0x44504543, len=92
30,297,899 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,359,243 ready_for_fw is high
3,359,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,041,241 >>> mbox cmd response: success
14,042,146 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,325,960 UART:
18,326,367 UART: Running Caliptra FMC ...
18,327,519 UART:
18,327,682 UART: [state] CFI Enabled
18,391,939 UART: [fht] FMC Alias Private Key: 7
20,155,753 UART: [art] Extend RT PCRs Done
20,156,978 UART: [art] Lock RT PCRs Done
20,158,796 UART: [art] Populate DV Done
20,164,206 UART: [fht] FMC Alias Private Key: 7
20,165,696 UART: [art] Derive CDI
20,166,456 UART: [art] Store in in slot 0x4
20,224,677 UART: [art] Derive Key Pair
20,225,719 UART: [art] Store priv key in slot 0x5
22,688,818 UART: [art] Derive Key Pair - Done
22,701,757 UART: [art] Signing Cert with AUTHO
22,703,070 UART: RITY.KEYID = 7
24,414,620 UART: [art] Erasing AUTHORITY.KEYID = 7
24,416,115 UART: [art] PUB.X = B8B8F5A02CAFD9040CF0990E411EC42EAA0656BC026DB2C541DF76FAB7A9F2E026B467E9ACC1C1FBDD470D62BC4CD0CA
24,423,427 UART: [art] PUB.Y = 402851E075B957E97E645373EF3A3364AA62B95E4884F329705DB156A115F161BFA033FB256F26952765B3BF33E0EF70
24,430,649 UART: [art] SIG.R = 87A82CB4A06DC47E296191A2F74521AF58EE6BE26E2B66C0CC2C47A78B1835B2D49E134F03CE8A8257FAA52D4960489A
24,438,044 UART: [art] SIG.S = 855DC1A49115069D7956FAFD819218191C0EE063EF121E6F202F03A6357868D08ADFDCCA0BB82B7DB22F344A2978789C
25,417,059 UART: Caliptra RT
25,417,762 UART: [state] CFI Enabled
25,582,742 UART: [rt] RT listening for mailbox commands...
25,614,610 UART: [rt]cmd =0x44504543, len=92
29,955,553 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,476 UART:
192,845 UART: Running Caliptra ROM ...
194,036 UART:
603,650 UART: [state] CFI Enabled
617,042 UART: [state] LifecycleState = Unprovisioned
618,956 UART: [state] DebugLocked = No
620,419 UART: [state] WD Timer not started. Device not locked for debugging
624,656 UART: [kat] SHA2-256
803,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,371 UART: [kat] ++
815,900 UART: [kat] sha1
828,262 UART: [kat] SHA2-256
831,267 UART: [kat] SHA2-384
836,896 UART: [kat] SHA2-512-ACC
839,894 UART: [kat] ECC-384
3,277,639 UART: [kat] HMAC-384Kdf
3,290,314 UART: [kat] LMS
3,819,834 UART: [kat] --
3,825,461 UART: [cold-reset] ++
3,826,601 UART: [fht] FHT @ 0x50003400
3,838,492 UART: [idev] ++
3,839,046 UART: [idev] CDI.KEYID = 6
3,840,071 UART: [idev] SUBJECT.KEYID = 7
3,841,168 UART: [idev] UDS.KEYID = 0
3,842,205 ready_for_fw is high
3,842,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,795 UART: [idev] Erasing UDS.KEYID = 0
6,313,647 UART: [idev] Sha1 KeyId Algorithm
6,336,923 UART: [idev] --
6,341,396 UART: [ldev] ++
6,341,958 UART: [ldev] CDI.KEYID = 6
6,342,830 UART: [ldev] SUBJECT.KEYID = 5
6,344,050 UART: [ldev] AUTHORITY.KEYID = 7
6,345,283 UART: [ldev] FE.KEYID = 1
6,356,111 UART: [ldev] Erasing FE.KEYID = 1
8,827,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,656 UART: [ldev] --
10,617,525 UART: [fwproc] Wait for Commands...
10,620,142 UART: [fwproc] Recv command 0x46574c44
10,622,239 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,734 >>> mbox cmd response: success
14,490,344 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,494,856 UART: [afmc] ++
14,495,448 UART: [afmc] CDI.KEYID = 6
14,496,328 UART: [afmc] SUBJECT.KEYID = 7
14,497,536 UART: [afmc] AUTHORITY.KEYID = 5
16,999,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,244 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,013 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,041 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,890 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,227 UART: [afmc] --
18,794,765 UART: [cold-reset] --
18,799,158 UART: [state] Locking Datavault
18,803,102 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,739 UART: [state] Locking ICCM
18,807,464 UART: [exit] Launching FMC @ 0x40000130
18,815,910 UART:
18,816,146 UART: Running Caliptra FMC ...
18,817,243 UART:
18,817,399 UART: [state] CFI Enabled
18,825,765 UART: [fht] FMC Alias Private Key: 7
20,581,821 UART: [art] Extend RT PCRs Done
20,583,042 UART: [art] Lock RT PCRs Done
20,584,637 UART: [art] Populate DV Done
20,590,093 UART: [fht] FMC Alias Private Key: 7
20,591,681 UART: [art] Derive CDI
20,592,484 UART: [art] Store in in slot 0x4
20,635,195 UART: [art] Derive Key Pair
20,636,223 UART: [art] Store priv key in slot 0x5
23,062,849 UART: [art] Derive Key Pair - Done
23,075,629 UART: [art] Signing Cert with AUTHO
23,076,946 UART: RITY.KEYID = 7
24,782,858 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,367 UART: [art] PUB.X = 78AF2E4873A23EB9EAC0754913B04EA82F07C33E73A68245F02DF90FB915277B38D6446B41E06501427855D372B878DA
24,791,612 UART: [art] PUB.Y = 66BDC151B586A3AECBB3A76D556C618FFAC44087FC4279E2F1D6EFFBA31E3EFCC2B9195AA76576335C94684EE579AF02
24,798,940 UART: [art] SIG.R = C3D89BD7BD248F01F82AF1AB5C154ED175B55034E4511F6A159481AA174F94E1E0A62671662EFD1A3CF04A61DD2A22A0
24,806,318 UART: [art] SIG.S = C986F2C87979A451408E1246854F36DF94BABED4BD740181408FAE9BF3F51FDBF23749A665CE1BC28581E0759B535EC2
25,785,394 UART: Caliptra RT
25,786,080 UART: [state] CFI Enabled
25,902,610 UART: [rt] RT listening for mailbox commands...
25,934,832 UART: [rt]cmd =0x44504543, len=92
30,218,938 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,699,252 ready_for_fw is high
3,699,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,320 >>> mbox cmd response: success
14,277,108 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,527,921 UART:
18,528,311 UART: Running Caliptra FMC ...
18,529,438 UART:
18,529,587 UART: [state] CFI Enabled
18,537,244 UART: [fht] FMC Alias Private Key: 7
20,294,622 UART: [art] Extend RT PCRs Done
20,295,832 UART: [art] Lock RT PCRs Done
20,297,598 UART: [art] Populate DV Done
20,302,948 UART: [fht] FMC Alias Private Key: 7
20,304,540 UART: [art] Derive CDI
20,305,267 UART: [art] Store in in slot 0x4
20,348,283 UART: [art] Derive Key Pair
20,349,277 UART: [art] Store priv key in slot 0x5
22,776,112 UART: [art] Derive Key Pair - Done
22,788,902 UART: [art] Signing Cert with AUTHO
22,790,199 UART: RITY.KEYID = 7
24,495,175 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,655 UART: [art] PUB.X = 7366AA9276D597C05542E8D191A073BBA15309D08D311B87A93D501D22D6E573747271D3AE466E28378E094269BEDED9
24,503,889 UART: [art] PUB.Y = CAB914CB3DDEE121BFE54913CC93907CAC050F7AFE1AC2BE31F4FD8008A03584606F25E8B45DA45DF8624FB9848328CD
24,511,224 UART: [art] SIG.R = F53B88CFA7B130AE3D58B33DB58FEB43766A94018823C2D33B1C11F81977278844870D8EDF1734FB19371ECB18158421
24,518,581 UART: [art] SIG.S = 16621753EB078BE23225A7AE586E5C495815BAF6CDDF022143982EC5C7037FD8ABEEFDAA3C451B98EC3883D1C3EE140D
25,497,542 UART: Caliptra RT
25,498,266 UART: [state] CFI Enabled
25,614,581 UART: [rt] RT listening for mailbox commands...
25,646,315 UART: [rt]cmd =0x44504543, len=92
29,930,079 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,433,173 ready_for_fw is high
3,434,049 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,730,933 >>> mbox cmd response: success
14,731,928 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,041,477 UART:
19,041,879 UART: Running Caliptra FMC ...
19,043,083 UART:
19,043,272 UART: [state] CFI Enabled
19,109,079 UART: [fht] FMC Alias Private Key: 7
20,873,297 UART: [art] Extend RT PCRs Done
20,874,517 UART: [art] Lock RT PCRs Done
20,876,308 UART: [art] Populate DV Done
20,881,880 UART: [fht] FMC Alias Private Key: 7
20,883,584 UART: [art] Derive CDI
20,884,400 UART: [art] Store in in slot 0x4
20,942,092 UART: [art] Derive Key Pair
20,943,140 UART: [art] Store priv key in slot 0x5
23,406,157 UART: [art] Derive Key Pair - Done
23,418,829 UART: [art] Signing Cert with AUTHO
23,420,136 UART: RITY.KEYID = 7
25,132,038 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,546 UART: [art] PUB.X = 6715D2F41E7B0AA4E9CBC5847809E04EA93E31CA462FC3B19CD5D2A9C0D5B878C63940B58EA422653556AFFF61C2FFEC
25,140,795 UART: [art] PUB.Y = 334E7670D960C73512019DF44C1030508C7DCCC3E9CE95B080BFB0A9BE7E89CA5BF19D40B5B81FDA73818FA3A998BF83
25,148,065 UART: [art] SIG.R = 8E5EBA5F46129999D007B21342371DBD4D9783D5AE2846F57C2A4D12CE971021B2529806192E59952AFFCDE3E72C0948
25,155,531 UART: [art] SIG.S = C9AC1EB8B3CD81E0950371B6B9F3F63ED4A0DD0F0DE69BA9C6EEFCD5D59C5323DE779BA97A3537064A5C8241A2994D45
26,134,713 UART: Caliptra RT
26,135,408 UART: [state] CFI Enabled
26,300,893 UART: [rt] RT listening for mailbox commands...
26,332,735 UART: [rt]cmd =0x44504543, len=92
30,693,938 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,757,801 ready_for_fw is high
3,758,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,977,857 >>> mbox cmd response: success
14,978,525 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,228,980 UART:
19,229,373 UART: Running Caliptra FMC ...
19,230,518 UART:
19,230,672 UART: [state] CFI Enabled
19,238,391 UART: [fht] FMC Alias Private Key: 7
20,995,334 UART: [art] Extend RT PCRs Done
20,996,561 UART: [art] Lock RT PCRs Done
20,998,090 UART: [art] Populate DV Done
21,003,508 UART: [fht] FMC Alias Private Key: 7
21,005,159 UART: [art] Derive CDI
21,005,977 UART: [art] Store in in slot 0x4
21,048,375 UART: [art] Derive Key Pair
21,049,436 UART: [art] Store priv key in slot 0x5
23,475,704 UART: [art] Derive Key Pair - Done
23,488,746 UART: [art] Signing Cert with AUTHO
23,490,051 UART: RITY.KEYID = 7
25,195,647 UART: [art] Erasing AUTHORITY.KEYID = 7
25,197,144 UART: [art] PUB.X = F614CF327279D98BC64E903B1BE2DED83C1C7ED867EF23098465FC17AFEA6D0C26DFF1B5E6BD90A241B077F3EC824707
25,204,438 UART: [art] PUB.Y = A0BA5F92A61B05A57591DE1A0007906B91597F942A1230649748C6146A91CDB8F5C00A945AF0D0A4BAC13B06870F4D91
25,211,687 UART: [art] SIG.R = 78543AF1CE883C462BA75AA8F4B015598F9844CBC10B8219B66FF9B75EB19144B153FEB17A0AD7C780C01BFE5F59211A
25,219,031 UART: [art] SIG.S = 5271EB00B52B640E921ADD0A6F9F826E432015ADFC3B567B0EDE63A95349F346BC80E2681C0B393234153D2AE99BAF3B
26,198,353 UART: Caliptra RT
26,199,041 UART: [state] CFI Enabled
26,315,910 UART: [rt] RT listening for mailbox commands...
26,347,849 UART: [rt]cmd =0x44504543, len=92
30,633,244 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,837 UART: [kat] SHA2-256
881,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,883 UART: [kat] ++
886,035 UART: [kat] sha1
890,225 UART: [kat] SHA2-256
892,163 UART: [kat] SHA2-384
894,930 UART: [kat] SHA2-512-ACC
896,831 UART: [kat] ECC-384
902,398 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,476,245 UART: [cold-reset] ++
1,476,765 UART: [fht] Storing FHT @ 0x50003400
1,479,556 UART: [idev] ++
1,479,724 UART: [idev] CDI.KEYID = 6
1,480,084 UART: [idev] SUBJECT.KEYID = 7
1,480,508 UART: [idev] UDS.KEYID = 0
1,480,853 ready_for_fw is high
1,480,853 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,374 UART: [idev] Erasing UDS.KEYID = 0
1,505,082 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,708 UART: [idev] --
1,514,801 UART: [ldev] ++
1,514,969 UART: [ldev] CDI.KEYID = 6
1,515,332 UART: [ldev] SUBJECT.KEYID = 5
1,515,758 UART: [ldev] AUTHORITY.KEYID = 7
1,516,221 UART: [ldev] FE.KEYID = 1
1,521,705 UART: [ldev] Erasing FE.KEYID = 1
1,547,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,522 UART: [ldev] --
1,586,837 UART: [fwproc] Waiting for Commands...
1,587,536 UART: [fwproc] Received command 0x46574c44
1,588,327 UART: [fwproc] Received Image of size 114448 bytes
2,887,440 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,822 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,174 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,143 >>> mbox cmd response: success
3,079,143 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,080,379 UART: [afmc] ++
3,080,547 UART: [afmc] CDI.KEYID = 6
3,080,909 UART: [afmc] SUBJECT.KEYID = 7
3,081,334 UART: [afmc] AUTHORITY.KEYID = 5
3,116,653 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,147 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,540 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,230 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,067 UART: [afmc] --
3,160,099 UART: [cold-reset] --
3,161,189 UART: [state] Locking Datavault
3,162,460 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,064 UART: [state] Locking ICCM
3,163,598 UART: [exit] Launching FMC @ 0x40000130
3,168,927 UART:
3,168,943 UART: Running Caliptra FMC ...
3,169,351 UART:
3,169,405 UART: [state] CFI Enabled
3,180,004 UART: [fht] FMC Alias Private Key: 7
3,287,603 UART: [art] Extend RT PCRs Done
3,288,031 UART: [art] Lock RT PCRs Done
3,289,425 UART: [art] Populate DV Done
3,297,626 UART: [fht] FMC Alias Private Key: 7
3,298,648 UART: [art] Derive CDI
3,298,928 UART: [art] Store in in slot 0x4
3,384,879 UART: [art] Derive Key Pair
3,385,239 UART: [art] Store priv key in slot 0x5
3,398,299 UART: [art] Derive Key Pair - Done
3,412,996 UART: [art] Signing Cert with AUTHO
3,413,476 UART: RITY.KEYID = 7
3,428,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,703 UART: [art] PUB.X = 8C9D3120FE8B7365F8A89AB73B9049BFF28328482D7912214D3EF9DC00ECE826A87A276B68E80A8EB6F341B8F0B449C6
3,436,454 UART: [art] PUB.Y = D66B4D21F5143F1EB9E8B3F9EBDB7B97E1EC18743CAE8D7EB33610DC586D3CC9B771266FF3F7FF70A133ED7A82732484
3,443,420 UART: [art] SIG.R = 6907C945E657CC4D138855376E451F4F838A395C06E9B7D065C1388E6EB586D06D7E1D108EEE403E4F231054B6A33D4B
3,450,182 UART: [art] SIG.S = 8B465C44D7D2CAD63DABA292774F54BF1F20E29E7FA86D491801621EFDB186DA194B3BFDB71252F152CB89E4CDD1BFCD
3,474,104 UART: Caliptra RT
3,474,357 UART: [state] CFI Enabled
3,583,200 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,100 UART: [rt]cmd =0x44504543, len=92
3,797,620 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,169 ready_for_fw is high
1,363,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,093 >>> mbox cmd response: success
2,931,093 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,992,875 UART:
2,992,891 UART: Running Caliptra FMC ...
2,993,299 UART:
2,993,353 UART: [state] CFI Enabled
3,003,708 UART: [fht] FMC Alias Private Key: 7
3,112,393 UART: [art] Extend RT PCRs Done
3,112,821 UART: [art] Lock RT PCRs Done
3,114,247 UART: [art] Populate DV Done
3,122,410 UART: [fht] FMC Alias Private Key: 7
3,123,380 UART: [art] Derive CDI
3,123,660 UART: [art] Store in in slot 0x4
3,209,593 UART: [art] Derive Key Pair
3,209,953 UART: [art] Store priv key in slot 0x5
3,223,227 UART: [art] Derive Key Pair - Done
3,238,050 UART: [art] Signing Cert with AUTHO
3,238,530 UART: RITY.KEYID = 7
3,254,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,789 UART: [art] PUB.X = EFF86291502271AE2D81AC32B01182CA1DFD681EE3DEDC563BA5C9FA3DA5E2088D00FC794FC9BF5068521F802CC61632
3,261,548 UART: [art] PUB.Y = 6005E89396FE118668C44417D2720D93FA3AE18FF6A6A1D5D7B509E23DE806F6849AB56F1D5764F6C48FDBDB7AA44C54
3,268,494 UART: [art] SIG.R = 19147CEB35761C52F12E5D93402B990651780421A31FB7D6FDCF23DEBBF801F88C00738FCFDC635E1EFE3A24C9C7DEA3
3,275,247 UART: [art] SIG.S = BBD03A49ADAF1EC87AFE3A7DBC6493694FD424F64A9D2682E9408ED38782E2F6BFFA718263E6EF71D7BD64197913D9D7
3,299,386 UART: Caliptra RT
3,299,639 UART: [state] CFI Enabled
3,407,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,876 UART: [rt]cmd =0x44504543, len=92
3,621,767 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,152 UART: [kat] SHA2-256
882,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,198 UART: [kat] ++
886,350 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,413 UART: [kat] SHA2-512-ACC
897,314 UART: [kat] ECC-384
902,969 UART: [kat] HMAC-384Kdf
907,657 UART: [kat] LMS
1,475,853 UART: [kat] --
1,476,646 UART: [cold-reset] ++
1,477,182 UART: [fht] Storing FHT @ 0x50003400
1,480,013 UART: [idev] ++
1,480,181 UART: [idev] CDI.KEYID = 6
1,480,541 UART: [idev] SUBJECT.KEYID = 7
1,480,965 UART: [idev] UDS.KEYID = 0
1,481,310 ready_for_fw is high
1,481,310 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,363 UART: [idev] Erasing UDS.KEYID = 0
1,505,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,395 UART: [idev] --
1,515,586 UART: [ldev] ++
1,515,754 UART: [ldev] CDI.KEYID = 6
1,516,117 UART: [ldev] SUBJECT.KEYID = 5
1,516,543 UART: [ldev] AUTHORITY.KEYID = 7
1,517,006 UART: [ldev] FE.KEYID = 1
1,522,358 UART: [ldev] Erasing FE.KEYID = 1
1,548,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,347 UART: [ldev] --
1,587,608 UART: [fwproc] Waiting for Commands...
1,588,351 UART: [fwproc] Received command 0x46574c44
1,589,142 UART: [fwproc] Received Image of size 114448 bytes
2,888,855 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,533 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,814 >>> mbox cmd response: success
3,080,814 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,081,980 UART: [afmc] ++
3,082,148 UART: [afmc] CDI.KEYID = 6
3,082,510 UART: [afmc] SUBJECT.KEYID = 7
3,082,935 UART: [afmc] AUTHORITY.KEYID = 5
3,118,854 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,501 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,191 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,958 UART: [afmc] --
3,161,898 UART: [cold-reset] --
3,162,582 UART: [state] Locking Datavault
3,163,555 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,159 UART: [state] Locking ICCM
3,164,759 UART: [exit] Launching FMC @ 0x40000130
3,170,088 UART:
3,170,104 UART: Running Caliptra FMC ...
3,170,512 UART:
3,170,655 UART: [state] CFI Enabled
3,181,248 UART: [fht] FMC Alias Private Key: 7
3,289,005 UART: [art] Extend RT PCRs Done
3,289,433 UART: [art] Lock RT PCRs Done
3,291,293 UART: [art] Populate DV Done
3,299,670 UART: [fht] FMC Alias Private Key: 7
3,300,770 UART: [art] Derive CDI
3,301,050 UART: [art] Store in in slot 0x4
3,386,645 UART: [art] Derive Key Pair
3,387,005 UART: [art] Store priv key in slot 0x5
3,399,945 UART: [art] Derive Key Pair - Done
3,414,448 UART: [art] Signing Cert with AUTHO
3,414,928 UART: RITY.KEYID = 7
3,430,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,009 UART: [art] PUB.X = EE05B4489F45A3E55FF22C008C3C70504FA2A22CF3B54EB716870904DBD2D2285F5970AA90595ABE7DE5D19AC6992BCF
3,437,760 UART: [art] PUB.Y = 1182A0FEF589EE19317A4EC8F7324BF308342296DF2FC144CD4090A2068E2A60D9168E5B38C1DA3F504F5764C722F0CE
3,444,708 UART: [art] SIG.R = 99D635AD8BC37376A6DDB1248B5F78A6880D17ABBE692D2934245BD6802BF711C6BE66CD6B852269042CC17B6CB08B2E
3,451,480 UART: [art] SIG.S = 7DE6535BCEE46A0F010AA68E2FFD93384B0DD553A6072267100C268BE4D22A66AB3EF81647D1E2B8E3199B94DEA51E83
3,475,275 UART: Caliptra RT
3,475,620 UART: [state] CFI Enabled
3,583,933 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,687 UART: [rt]cmd =0x44504543, len=92
3,797,906 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,020 ready_for_fw is high
1,363,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,412 >>> mbox cmd response: success
2,932,412 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,994,374 UART:
2,994,390 UART: Running Caliptra FMC ...
2,994,798 UART:
2,994,941 UART: [state] CFI Enabled
3,006,086 UART: [fht] FMC Alias Private Key: 7
3,114,415 UART: [art] Extend RT PCRs Done
3,114,843 UART: [art] Lock RT PCRs Done
3,116,013 UART: [art] Populate DV Done
3,124,416 UART: [fht] FMC Alias Private Key: 7
3,125,596 UART: [art] Derive CDI
3,125,876 UART: [art] Store in in slot 0x4
3,211,235 UART: [art] Derive Key Pair
3,211,595 UART: [art] Store priv key in slot 0x5
3,224,509 UART: [art] Derive Key Pair - Done
3,239,089 UART: [art] Signing Cert with AUTHO
3,239,569 UART: RITY.KEYID = 7
3,254,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,364 UART: [art] PUB.X = 9570F2A8D628AFB3A548FF1CA4C4993C2A6D3C17EABBE18D65E064072415726E0F12574E9A1C33D6C3A9E5867968E03C
3,262,134 UART: [art] PUB.Y = 43C8013C0E7BFA352988CC40D398B5948485E2DE060B998247AB8D1B70BF89C9FE74BDCFD2A721891D161918C369448B
3,269,074 UART: [art] SIG.R = 4650BD2646768C605E2AF85B60914A21442B96ED08E64DC6C819902DE27014C545A6866519DDC362E77CDFC545B9CF3D
3,275,841 UART: [art] SIG.S = 7B2B1C166D4E92575C4C8A15361B39535E5077EBAAB61A1A5E8FEA11C27F071BFAB1D62F52BFC6C6DD4BE1E21546F637
3,299,825 UART: Caliptra RT
3,300,170 UART: [state] CFI Enabled
3,408,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,236 UART: [rt]cmd =0x44504543, len=92
3,622,808 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
893,616 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,741 UART: [kat] ++
897,893 UART: [kat] sha1
902,105 UART: [kat] SHA2-256
904,045 UART: [kat] SHA2-384
906,646 UART: [kat] SHA2-512-ACC
908,547 UART: [kat] ECC-384
918,654 UART: [kat] HMAC-384Kdf
923,190 UART: [kat] LMS
1,171,518 UART: [kat] --
1,172,437 UART: [cold-reset] ++
1,172,929 UART: [fht] FHT @ 0x50003400
1,175,596 UART: [idev] ++
1,175,764 UART: [idev] CDI.KEYID = 6
1,176,124 UART: [idev] SUBJECT.KEYID = 7
1,176,548 UART: [idev] UDS.KEYID = 0
1,176,893 ready_for_fw is high
1,176,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,580 UART: [idev] Erasing UDS.KEYID = 0
1,201,479 UART: [idev] Sha1 KeyId Algorithm
1,209,793 UART: [idev] --
1,210,845 UART: [ldev] ++
1,211,013 UART: [ldev] CDI.KEYID = 6
1,211,376 UART: [ldev] SUBJECT.KEYID = 5
1,211,802 UART: [ldev] AUTHORITY.KEYID = 7
1,212,265 UART: [ldev] FE.KEYID = 1
1,217,295 UART: [ldev] Erasing FE.KEYID = 1
1,244,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,443 UART: [ldev] --
1,283,812 UART: [fwproc] Wait for Commands...
1,284,486 UART: [fwproc] Recv command 0x46574c44
1,285,214 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,002 >>> mbox cmd response: success
2,777,002 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,778,178 UART: [afmc] ++
2,778,346 UART: [afmc] CDI.KEYID = 6
2,778,708 UART: [afmc] SUBJECT.KEYID = 7
2,779,133 UART: [afmc] AUTHORITY.KEYID = 5
2,814,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,883 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,535 UART: [afmc] --
2,857,613 UART: [cold-reset] --
2,858,537 UART: [state] Locking Datavault
2,859,972 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,576 UART: [state] Locking ICCM
2,861,136 UART: [exit] Launching FMC @ 0x40000130
2,866,465 UART:
2,866,481 UART: Running Caliptra FMC ...
2,866,889 UART:
2,866,943 UART: [state] CFI Enabled
2,877,178 UART: [fht] FMC Alias Private Key: 7
2,984,545 UART: [art] Extend RT PCRs Done
2,984,973 UART: [art] Lock RT PCRs Done
2,986,309 UART: [art] Populate DV Done
2,994,254 UART: [fht] FMC Alias Private Key: 7
2,995,326 UART: [art] Derive CDI
2,995,606 UART: [art] Store in in slot 0x4
3,081,505 UART: [art] Derive Key Pair
3,081,865 UART: [art] Store priv key in slot 0x5
3,094,427 UART: [art] Derive Key Pair - Done
3,108,928 UART: [art] Signing Cert with AUTHO
3,109,408 UART: RITY.KEYID = 7
3,124,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,565 UART: [art] PUB.X = 68CAE4ACE8CCF2CB5C3ECAD58E72F1637B14D707079C6FF78694FA0BF87C0DC7FB2A5D4BF2219BBECE81B7557CBA8FB7
3,132,355 UART: [art] PUB.Y = C103413CE11C22218F4E24E03CB1778F1DB1AA55126973392EC9BB86469A797490D90AEA623C0542C666DE147DA55433
3,139,292 UART: [art] SIG.R = 707D29406D0E3A2B0DAA1BAC83F61E929377A9263E30518BA356C04DC4D1E933809FA65B76C9AA74C58ED2883B4C463F
3,146,062 UART: [art] SIG.S = 0676000A48ECFD28A2C912DD28C1EB77E5749E76336959FE93F49BC35F990CC258D1A8A6D16DB950BE3AFBECBC9742AA
3,169,402 UART: Caliptra RT
3,169,655 UART: [state] CFI Enabled
3,278,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,448 UART: [rt]cmd =0x44504543, len=92
3,491,999 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 ready_for_fw is high
1,060,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,179 >>> mbox cmd response: success
2,627,179 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,401 UART:
2,689,417 UART: Running Caliptra FMC ...
2,689,825 UART:
2,689,879 UART: [state] CFI Enabled
2,700,134 UART: [fht] FMC Alias Private Key: 7
2,808,411 UART: [art] Extend RT PCRs Done
2,808,839 UART: [art] Lock RT PCRs Done
2,810,547 UART: [art] Populate DV Done
2,818,592 UART: [fht] FMC Alias Private Key: 7
2,819,590 UART: [art] Derive CDI
2,819,870 UART: [art] Store in in slot 0x4
2,905,867 UART: [art] Derive Key Pair
2,906,227 UART: [art] Store priv key in slot 0x5
2,919,425 UART: [art] Derive Key Pair - Done
2,934,038 UART: [art] Signing Cert with AUTHO
2,934,518 UART: RITY.KEYID = 7
2,949,660 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,425 UART: [art] PUB.X = DCF924071888CF157DAE284B2E89880182F10F456386664B8D1ED932DED63B0B9F47833305C7E0F29E4CEB8FE8F5F314
2,957,184 UART: [art] PUB.Y = 22829F2CD52F8B3B6B7891C11478913B12219EE75062D91E22DBEF6706FF9F902948AD0B035840B32B05402A3554E082
2,964,114 UART: [art] SIG.R = 637702E7E17B3FA1467FF5108B5854C326BA73887A2F9827432C78E03FC48BB410D84D2B612A37B44D2F4B0E36876533
2,970,872 UART: [art] SIG.S = DC3DF1F88A313016448ED657DEBCB14B41E8B45F0C0836FEF7D804FA4609DF06DF78A4A9A501175595E9061167FB223F
2,994,354 UART: Caliptra RT
2,994,607 UART: [state] CFI Enabled
3,102,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,380 UART: [rt]cmd =0x44504543, len=92
3,317,367 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,029 UART: [state] LifecycleState = Unprovisioned
85,684 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
893,253 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,378 UART: [kat] ++
897,530 UART: [kat] sha1
901,656 UART: [kat] SHA2-256
903,596 UART: [kat] SHA2-384
906,495 UART: [kat] SHA2-512-ACC
908,396 UART: [kat] ECC-384
918,167 UART: [kat] HMAC-384Kdf
922,757 UART: [kat] LMS
1,171,085 UART: [kat] --
1,171,974 UART: [cold-reset] ++
1,172,516 UART: [fht] FHT @ 0x50003400
1,175,335 UART: [idev] ++
1,175,503 UART: [idev] CDI.KEYID = 6
1,175,863 UART: [idev] SUBJECT.KEYID = 7
1,176,287 UART: [idev] UDS.KEYID = 0
1,176,632 ready_for_fw is high
1,176,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,656 UART: [idev] Sha1 KeyId Algorithm
1,210,136 UART: [idev] --
1,211,200 UART: [ldev] ++
1,211,368 UART: [ldev] CDI.KEYID = 6
1,211,731 UART: [ldev] SUBJECT.KEYID = 5
1,212,157 UART: [ldev] AUTHORITY.KEYID = 7
1,212,620 UART: [ldev] FE.KEYID = 1
1,217,834 UART: [ldev] Erasing FE.KEYID = 1
1,244,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,294 UART: [ldev] --
1,283,591 UART: [fwproc] Wait for Commands...
1,284,225 UART: [fwproc] Recv command 0x46574c44
1,284,953 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,856 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,241 >>> mbox cmd response: success
2,776,241 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,777,309 UART: [afmc] ++
2,777,477 UART: [afmc] CDI.KEYID = 6
2,777,839 UART: [afmc] SUBJECT.KEYID = 7
2,778,264 UART: [afmc] AUTHORITY.KEYID = 5
2,813,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,262 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,990 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,875 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,594 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,216 UART: [afmc] --
2,857,330 UART: [cold-reset] --
2,857,940 UART: [state] Locking Datavault
2,859,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,737 UART: [state] Locking ICCM
2,860,219 UART: [exit] Launching FMC @ 0x40000130
2,865,548 UART:
2,865,564 UART: Running Caliptra FMC ...
2,865,972 UART:
2,866,115 UART: [state] CFI Enabled
2,876,554 UART: [fht] FMC Alias Private Key: 7
2,984,429 UART: [art] Extend RT PCRs Done
2,984,857 UART: [art] Lock RT PCRs Done
2,986,287 UART: [art] Populate DV Done
2,994,584 UART: [fht] FMC Alias Private Key: 7
2,995,652 UART: [art] Derive CDI
2,995,932 UART: [art] Store in in slot 0x4
3,081,815 UART: [art] Derive Key Pair
3,082,175 UART: [art] Store priv key in slot 0x5
3,095,939 UART: [art] Derive Key Pair - Done
3,110,836 UART: [art] Signing Cert with AUTHO
3,111,316 UART: RITY.KEYID = 7
3,126,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,895 UART: [art] PUB.X = C8918E1E5368D14CFED846A7C7BF024341593BF03699DB61403ABBF2421B621B87E102F1A0D9AF74F251D9C8B2F4145C
3,133,665 UART: [art] PUB.Y = AF7B0D394661158E5F4FE3D79A990B6D4C4C2C50EA3172B9BEB697909B7FD8EED514626D2ED62C528BD3D3D1AFFD5F4E
3,140,629 UART: [art] SIG.R = 68DA99B89FDBC674EA4DD0ECB3BE367784FA4BCFE4BD0AE275D3D6C8C6AF9A8A3549152FDBFC8CB201EC2651C578CC9B
3,147,425 UART: [art] SIG.S = C6E47CD67DB5DC5F9EC372973EDC448A1DE8B42D34BFF8653B380F0B6EB3FA108A17985DF7A945F0DA04FE2E565287DB
3,171,341 UART: Caliptra RT
3,171,686 UART: [state] CFI Enabled
3,279,883 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,885 UART: [rt]cmd =0x44504543, len=92
3,494,195 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,618 ready_for_fw is high
1,060,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,174 >>> mbox cmd response: success
2,629,174 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,691,638 UART:
2,691,654 UART: Running Caliptra FMC ...
2,692,062 UART:
2,692,205 UART: [state] CFI Enabled
2,702,730 UART: [fht] FMC Alias Private Key: 7
2,810,991 UART: [art] Extend RT PCRs Done
2,811,419 UART: [art] Lock RT PCRs Done
2,812,959 UART: [art] Populate DV Done
2,821,170 UART: [fht] FMC Alias Private Key: 7
2,822,282 UART: [art] Derive CDI
2,822,562 UART: [art] Store in in slot 0x4
2,908,083 UART: [art] Derive Key Pair
2,908,443 UART: [art] Store priv key in slot 0x5
2,920,587 UART: [art] Derive Key Pair - Done
2,935,297 UART: [art] Signing Cert with AUTHO
2,935,777 UART: RITY.KEYID = 7
2,950,919 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,684 UART: [art] PUB.X = 5399FCA00DF021F497484FABF4E9D21FA1912EAEBCB4A907F9D5B4AF78F5D65C2543854E7A16D1B523C4DF9FCA94AB08
2,958,465 UART: [art] PUB.Y = CE184DDBD247C5B8D575B94C8736DD0A5D1C0FE3B7AB5A4D204B860FDBCA82F40AD8CE2D938F8B9CEFD2125BC300A110
2,965,407 UART: [art] SIG.R = 4FE0B22F0F6720B166AFD2DD7328271A8A56F029698578CB0D63B4598235D200D60CEB1B13D05202E0C68FC67DFF1944
2,972,145 UART: [art] SIG.S = 0BC3AF00AE185DEFADCC6639B73A2DFCC10208B588A0EAC48DAFB07F7F643762D79D0DBEC58C6067DA33200298ED6733
2,996,155 UART: Caliptra RT
2,996,500 UART: [state] CFI Enabled
3,104,121 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,299 UART: [rt]cmd =0x44504543, len=92
3,318,370 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,266 UART: [kat] SHA2-256
890,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,945 UART: [kat] ++
895,097 UART: [kat] sha1
899,495 UART: [kat] SHA2-256
901,435 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
916,072 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,435 UART: [cold-reset] ++
1,169,819 UART: [fht] FHT @ 0x50003400
1,172,499 UART: [idev] ++
1,172,667 UART: [idev] CDI.KEYID = 6
1,173,028 UART: [idev] SUBJECT.KEYID = 7
1,173,453 UART: [idev] UDS.KEYID = 0
1,173,799 ready_for_fw is high
1,173,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,251 UART: [idev] Erasing UDS.KEYID = 0
1,199,085 UART: [idev] Sha1 KeyId Algorithm
1,208,209 UART: [idev] --
1,209,324 UART: [ldev] ++
1,209,492 UART: [ldev] CDI.KEYID = 6
1,209,856 UART: [ldev] SUBJECT.KEYID = 5
1,210,283 UART: [ldev] AUTHORITY.KEYID = 7
1,210,746 UART: [ldev] FE.KEYID = 1
1,216,060 UART: [ldev] Erasing FE.KEYID = 1
1,241,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,200 UART: [ldev] --
1,281,614 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,719 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,150 >>> mbox cmd response: success
2,775,150 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,776,343 UART: [afmc] ++
2,776,511 UART: [afmc] CDI.KEYID = 6
2,776,874 UART: [afmc] SUBJECT.KEYID = 7
2,777,300 UART: [afmc] AUTHORITY.KEYID = 5
2,813,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,434 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,163 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,046 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,765 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,740 UART: [afmc] --
2,856,790 UART: [cold-reset] --
2,857,818 UART: [state] Locking Datavault
2,859,099 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,703 UART: [state] Locking ICCM
2,860,181 UART: [exit] Launching FMC @ 0x40000130
2,865,510 UART:
2,865,526 UART: Running Caliptra FMC ...
2,865,934 UART:
2,865,988 UART: [state] CFI Enabled
2,876,435 UART: [fht] FMC Alias Private Key: 7
2,984,088 UART: [art] Extend RT PCRs Done
2,984,516 UART: [art] Lock RT PCRs Done
2,986,032 UART: [art] Populate DV Done
2,994,163 UART: [fht] FMC Alias Private Key: 7
2,995,205 UART: [art] Derive CDI
2,995,485 UART: [art] Store in in slot 0x4
3,081,420 UART: [art] Derive Key Pair
3,081,780 UART: [art] Store priv key in slot 0x5
3,094,678 UART: [art] Derive Key Pair - Done
3,109,470 UART: [art] Signing Cert with AUTHO
3,109,950 UART: RITY.KEYID = 7
3,125,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,065 UART: [art] PUB.X = 074A8DF2A1E912046E8510842974F483810037C3B38ABB1E462304D43DDAD099B52D0206299F60D6F9C8A3C3E7834025
3,132,790 UART: [art] PUB.Y = 736A6D3C914B41E9F9D61BDC2ADD758815BB038C51ED66F2C3690163192FD33519A374BC152CE299EC4EC7D79E41DCAD
3,139,746 UART: [art] SIG.R = 7401D2CE5F02098626672C5AE6D9FA0986D19CAE3B396D3548E3B17982E43318542D63ED58319F6BF08B5B3E306DADD2
3,146,506 UART: [art] SIG.S = EE9A9682A8BCEC0BB449C456563ADBC19EB7249468A9793861A71B9AD40C26CD9B4E229F0D5B534D30858AE542C46A66
3,170,408 UART: Caliptra RT
3,170,661 UART: [state] CFI Enabled
3,278,442 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,472 UART: [rt]cmd =0x44504543, len=92
3,492,344 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,890 ready_for_fw is high
1,055,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,738 >>> mbox cmd response: success
2,623,738 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,685,856 UART:
2,685,872 UART: Running Caliptra FMC ...
2,686,280 UART:
2,686,334 UART: [state] CFI Enabled
2,696,551 UART: [fht] FMC Alias Private Key: 7
2,804,910 UART: [art] Extend RT PCRs Done
2,805,338 UART: [art] Lock RT PCRs Done
2,807,126 UART: [art] Populate DV Done
2,815,373 UART: [fht] FMC Alias Private Key: 7
2,816,417 UART: [art] Derive CDI
2,816,697 UART: [art] Store in in slot 0x4
2,902,076 UART: [art] Derive Key Pair
2,902,436 UART: [art] Store priv key in slot 0x5
2,915,410 UART: [art] Derive Key Pair - Done
2,930,027 UART: [art] Signing Cert with AUTHO
2,930,507 UART: RITY.KEYID = 7
2,946,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,862 UART: [art] PUB.X = 8C29356278EE1B97C24DEBC85DA2B87B6B8705F34767345CD61461C17A92B00E0B134600ECA2F262DDB2237491CB502F
2,953,603 UART: [art] PUB.Y = 1E711F04FF3DF61243FE603ECB3ED0C31D98D98C1C386CA7C3793C3F8992A6CDA2AEDD141BCC49CEF6C54B42C65C9AA8
2,960,574 UART: [art] SIG.R = E4088E3CDD3951B4E15D058F9551CB27E4E08C2D0D017D3E4725864FBE4B06F83AB0F3536DE82F8871025B1891FBC9E0
2,967,332 UART: [art] SIG.S = 6E6DB532EC7B73D4930196C98C0AD68A354D1C66924DF7F43C16CD32F24689E5F9F16437D6F59B1A414BF98B09B0CF71
2,991,152 UART: Caliptra RT
2,991,405 UART: [state] CFI Enabled
3,099,492 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,826 UART: [rt]cmd =0x44504543, len=92
3,315,015 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,169,882 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,030 UART: [idev] ++
1,173,198 UART: [idev] CDI.KEYID = 6
1,173,559 UART: [idev] SUBJECT.KEYID = 7
1,173,984 UART: [idev] UDS.KEYID = 0
1,174,330 ready_for_fw is high
1,174,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,220 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,518 UART: [idev] --
1,209,713 UART: [ldev] ++
1,209,881 UART: [ldev] CDI.KEYID = 6
1,210,245 UART: [ldev] SUBJECT.KEYID = 5
1,210,672 UART: [ldev] AUTHORITY.KEYID = 7
1,211,135 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,242,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,457 UART: [ldev] --
1,281,771 UART: [fwproc] Wait for Commands...
1,282,544 UART: [fwproc] Recv command 0x46574c44
1,283,277 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,503 >>> mbox cmd response: success
2,775,503 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,776,748 UART: [afmc] ++
2,776,916 UART: [afmc] CDI.KEYID = 6
2,777,279 UART: [afmc] SUBJECT.KEYID = 7
2,777,705 UART: [afmc] AUTHORITY.KEYID = 5
2,813,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,707 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,426 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,045 UART: [afmc] --
2,855,999 UART: [cold-reset] --
2,856,731 UART: [state] Locking Datavault
2,857,992 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,596 UART: [state] Locking ICCM
2,859,170 UART: [exit] Launching FMC @ 0x40000130
2,864,499 UART:
2,864,515 UART: Running Caliptra FMC ...
2,864,923 UART:
2,865,066 UART: [state] CFI Enabled
2,875,637 UART: [fht] FMC Alias Private Key: 7
2,983,816 UART: [art] Extend RT PCRs Done
2,984,244 UART: [art] Lock RT PCRs Done
2,985,960 UART: [art] Populate DV Done
2,994,073 UART: [fht] FMC Alias Private Key: 7
2,995,105 UART: [art] Derive CDI
2,995,385 UART: [art] Store in in slot 0x4
3,081,028 UART: [art] Derive Key Pair
3,081,388 UART: [art] Store priv key in slot 0x5
3,094,842 UART: [art] Derive Key Pair - Done
3,109,555 UART: [art] Signing Cert with AUTHO
3,110,035 UART: RITY.KEYID = 7
3,124,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,536 UART: [art] PUB.X = D721C19F2D74A23B9A40715BACD487AF6AECC2061C4FAD724A769EEA91240B7E1D2EF242A5996DE320E55F79B94E09C6
3,132,311 UART: [art] PUB.Y = AEF11B777DBFD0062996771DA957E6DDB7612A5B9044E53BF50252CEC31FA7734DE43213904CCC7CB919A9D3AC2251DC
3,139,267 UART: [art] SIG.R = D270057DA5D286023BFFF73EDBE686FDA1C3A70EF5F12944031EFD165C6D9FDB80FA8C545CA065A9B5605DB1802A4FED
3,146,045 UART: [art] SIG.S = E5B06A8890082A0E4131C7C1C879E6ABBACFE8B340566D897EF777DD904C29F3C4C011E74CF2361522F0FF5EEA25B214
3,169,474 UART: Caliptra RT
3,169,819 UART: [state] CFI Enabled
3,277,779 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,787 UART: [rt]cmd =0x44504543, len=92
3,491,633 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,979 ready_for_fw is high
1,055,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,825 >>> mbox cmd response: success
2,624,825 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,687,273 UART:
2,687,289 UART: Running Caliptra FMC ...
2,687,697 UART:
2,687,840 UART: [state] CFI Enabled
2,698,677 UART: [fht] FMC Alias Private Key: 7
2,806,256 UART: [art] Extend RT PCRs Done
2,806,684 UART: [art] Lock RT PCRs Done
2,808,262 UART: [art] Populate DV Done
2,816,367 UART: [fht] FMC Alias Private Key: 7
2,817,533 UART: [art] Derive CDI
2,817,813 UART: [art] Store in in slot 0x4
2,903,460 UART: [art] Derive Key Pair
2,903,820 UART: [art] Store priv key in slot 0x5
2,916,762 UART: [art] Derive Key Pair - Done
2,931,410 UART: [art] Signing Cert with AUTHO
2,931,890 UART: RITY.KEYID = 7
2,947,600 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,365 UART: [art] PUB.X = B01FF7D64AAF0FD0B548F969D50C58B92EA53BE6A91FA5087E845A1BDC35CA4D849A7A6136CBA3F95374E961123A02F2
2,955,137 UART: [art] PUB.Y = EBA05890BC2B860A2870DA92696A94AA843DC0B33B445FC826E1078A4ACFFEA4239B73A100B89CBA3B6F83F86AAA4FDB
2,962,079 UART: [art] SIG.R = 51A05F088F6AC3D38E55B61C839F8E948CE5FC7B23387BB92044D8741FA1982F428AD0C7FB7207AB78E6552FD02BFECD
2,968,855 UART: [art] SIG.S = DAD79CECD814085DE9C16BCED65D8B4D009E3C8EF683CD1DE676EF335F37C05759775E9296BE3DF88E22F6B6AD87FA20
2,992,641 UART: Caliptra RT
2,992,986 UART: [state] CFI Enabled
3,100,599 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,535 UART: [rt]cmd =0x44504543, len=92
3,314,670 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,028 UART:
192,389 UART: Running Caliptra ROM ...
193,530 UART:
193,678 UART: [state] CFI Enabled
264,778 UART: [state] LifecycleState = Unprovisioned
266,707 UART: [state] DebugLocked = No
269,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,404 UART: [kat] SHA2-256
444,126 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,595 UART: [kat] ++
455,046 UART: [kat] sha1
466,065 UART: [kat] SHA2-256
468,719 UART: [kat] SHA2-384
474,424 UART: [kat] SHA2-512-ACC
476,789 UART: [kat] ECC-384
2,768,354 UART: [kat] HMAC-384Kdf
2,800,290 UART: [kat] LMS
3,990,593 UART: [kat] --
3,993,474 UART: [cold-reset] ++
3,994,628 UART: [fht] Storing FHT @ 0x50003400
4,006,817 UART: [idev] ++
4,007,387 UART: [idev] CDI.KEYID = 6
4,008,302 UART: [idev] SUBJECT.KEYID = 7
4,009,554 UART: [idev] UDS.KEYID = 0
4,010,705 ready_for_fw is high
4,010,908 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,421 UART: [idev] Erasing UDS.KEYID = 0
7,347,204 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,128 UART: [idev] --
7,371,581 UART: [ldev] ++
7,372,154 UART: [ldev] CDI.KEYID = 6
7,373,124 UART: [ldev] SUBJECT.KEYID = 5
7,374,361 UART: [ldev] AUTHORITY.KEYID = 7
7,375,595 UART: [ldev] FE.KEYID = 1
7,422,901 UART: [ldev] Erasing FE.KEYID = 1
10,750,398 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,163 UART: [ldev] --
13,115,296 UART: [fwproc] Waiting for Commands...
13,117,129 UART: [fwproc] Received command 0x46574c44
13,119,311 UART: [fwproc] Received Image of size 114124 bytes
17,175,353 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,449 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,372 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,639,080 >>> mbox cmd response: success
17,642,982 UART: [afmc] ++
17,643,585 UART: [afmc] CDI.KEYID = 6
17,644,497 UART: [afmc] SUBJECT.KEYID = 7
17,645,783 UART: [afmc] AUTHORITY.KEYID = 5
21,006,167 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,574 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,836 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,253 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,096 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,546 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,226 UART: [afmc] --
23,376,775 UART: [cold-reset] --
23,381,442 UART: [state] Locking Datavault
23,385,881 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,577 UART: [state] Locking ICCM
23,390,430 UART: [exit] Launching FMC @ 0x40000130
23,398,798 UART:
23,399,035 UART: Running Caliptra FMC ...
23,400,139 UART:
23,400,306 UART: [state] CFI Enabled
23,466,187 UART: [fht] FMC Alias Private Key: 7
25,804,407 UART: [art] Extend RT PCRs Done
25,805,631 UART: [art] Lock RT PCRs Done
25,807,288 UART: [art] Populate DV Done
25,812,698 UART: [fht] FMC Alias Private Key: 7
25,814,417 UART: [art] Derive CDI
25,815,240 UART: [art] Store in in slot 0x4
25,874,720 UART: [art] Derive Key Pair
25,875,721 UART: [art] Store priv key in slot 0x5
29,168,844 UART: [art] Derive Key Pair - Done
29,181,893 UART: [art] Signing Cert with AUTHO
29,183,205 UART: RITY.KEYID = 7
31,470,500 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,001 UART: [art] PUB.X = F38ADDEFEDCD8141B130F6BEFEA6AE7D2775BD69BFA93D8FFFFF0CB1B1F9CB0EAF9DBE3515C01740B434CEBD90741280
31,479,312 UART: [art] PUB.Y = 1483A64E7CB4B1D4C5EDFF546A8E0F57C6C7D52C5DDD808A1127238CB09A8BEE009CD42109D9D948485162F9A44E2DBB
31,486,537 UART: [art] SIG.R = 3AAD607B2AC030AF0307C8861513B00B0413148B700BFFB17D358FD34E151F478BF1A60536F54B2B644F228B6257CFA6
31,493,973 UART: [art] SIG.S = 52911DD637A1D7E45722C5A43A0DE47EBCA41D53BC1211CF2AA5A5E0BC1B31870471D71473520EE6418D921EEF8BB3C9
32,799,544 UART: Caliptra RT
32,800,250 UART: [state] CFI Enabled
32,960,867 UART: [rt] RT listening for mailbox commands...
32,962,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,993,285 UART: [rt]cmd =0x44504543, len=96
38,757,138 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,782,695 ready_for_fw is high
3,783,096 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,828,865 >>> mbox cmd response: success
23,526,986 UART:
23,527,426 UART: Running Caliptra FMC ...
23,528,551 UART:
23,528,734 UART: [state] CFI Enabled
23,599,139 UART: [fht] FMC Alias Private Key: 7
25,937,217 UART: [art] Extend RT PCRs Done
25,938,449 UART: [art] Lock RT PCRs Done
25,940,159 UART: [art] Populate DV Done
25,945,696 UART: [fht] FMC Alias Private Key: 7
25,947,247 UART: [art] Derive CDI
25,948,063 UART: [art] Store in in slot 0x4
26,007,284 UART: [art] Derive Key Pair
26,008,332 UART: [art] Store priv key in slot 0x5
29,300,898 UART: [art] Derive Key Pair - Done
29,313,789 UART: [art] Signing Cert with AUTHO
29,315,093 UART: RITY.KEYID = 7
31,601,911 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,424 UART: [art] PUB.X = 058174749A2615AA9435EE382F69F98AB711676F67ED1815B59F7B1356D161EBB838FD41375DCEC1E9996F62F5FF7F6A
31,610,647 UART: [art] PUB.Y = 4A6ACE2BE0DEC9610D3C4974766FA435941A37A500AD35E10000DCB68C2E2E83C682BF35A6733894223AD80B9163BCEF
31,617,870 UART: [art] SIG.R = DEEAD9E693E54122FCC5BFE08EA0A22796C691636C4C9CDDC5B28EA674657749A4567A5BBF1BFFE2D67862F8139BCF3D
31,625,230 UART: [art] SIG.S = 598A68F6D604F9D51A2E33FE32B3AECF62D6128EFC082A437478A2F7F824E9C8093BA569F9D8C6161541B222EF6E3509
32,929,919 UART: Caliptra RT
32,930,628 UART: [state] CFI Enabled
33,091,925 UART: [rt] RT listening for mailbox commands...
33,093,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,124,581 UART: [rt]cmd =0x44504543, len=96
38,887,735 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,396 UART:
192,767 UART: Running Caliptra ROM ...
193,957 UART:
603,524 UART: [state] CFI Enabled
618,179 UART: [state] LifecycleState = Unprovisioned
620,113 UART: [state] DebugLocked = No
621,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,531 UART: [kat] SHA2-256
796,288 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,834 UART: [kat] ++
807,309 UART: [kat] sha1
816,969 UART: [kat] SHA2-256
819,701 UART: [kat] SHA2-384
824,638 UART: [kat] SHA2-512-ACC
827,001 UART: [kat] ECC-384
3,111,387 UART: [kat] HMAC-384Kdf
3,122,547 UART: [kat] LMS
4,312,652 UART: [kat] --
4,316,857 UART: [cold-reset] ++
4,317,787 UART: [fht] Storing FHT @ 0x50003400
4,330,533 UART: [idev] ++
4,331,162 UART: [idev] CDI.KEYID = 6
4,332,086 UART: [idev] SUBJECT.KEYID = 7
4,333,327 UART: [idev] UDS.KEYID = 0
4,334,355 ready_for_fw is high
4,334,560 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,866 UART: [idev] Erasing UDS.KEYID = 0
7,621,346 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,947 UART: [idev] --
7,647,311 UART: [ldev] ++
7,647,874 UART: [ldev] CDI.KEYID = 6
7,648,830 UART: [ldev] SUBJECT.KEYID = 5
7,650,031 UART: [ldev] AUTHORITY.KEYID = 7
7,651,312 UART: [ldev] FE.KEYID = 1
7,662,057 UART: [ldev] Erasing FE.KEYID = 1
10,953,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,079 UART: [ldev] --
13,314,353 UART: [fwproc] Waiting for Commands...
13,317,207 UART: [fwproc] Received command 0x46574c44
13,319,384 UART: [fwproc] Received Image of size 114124 bytes
17,369,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,753 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,626 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,134 >>> mbox cmd response: success
17,838,664 UART: [afmc] ++
17,839,252 UART: [afmc] CDI.KEYID = 6
17,840,268 UART: [afmc] SUBJECT.KEYID = 7
17,841,427 UART: [afmc] AUTHORITY.KEYID = 5
21,154,367 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,064 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,350 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,737 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,543 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,985 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,429 UART: [afmc] --
23,521,939 UART: [cold-reset] --
23,526,444 UART: [state] Locking Datavault
23,531,212 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,908 UART: [state] Locking ICCM
23,535,696 UART: [exit] Launching FMC @ 0x40000130
23,544,080 UART:
23,544,329 UART: Running Caliptra FMC ...
23,545,431 UART:
23,545,583 UART: [state] CFI Enabled
23,553,489 UART: [fht] FMC Alias Private Key: 7
25,884,154 UART: [art] Extend RT PCRs Done
25,885,390 UART: [art] Lock RT PCRs Done
25,887,123 UART: [art] Populate DV Done
25,892,589 UART: [fht] FMC Alias Private Key: 7
25,894,177 UART: [art] Derive CDI
25,894,986 UART: [art] Store in in slot 0x4
25,937,581 UART: [art] Derive Key Pair
25,938,614 UART: [art] Store priv key in slot 0x5
29,180,385 UART: [art] Derive Key Pair - Done
29,193,487 UART: [art] Signing Cert with AUTHO
29,194,796 UART: RITY.KEYID = 7
31,474,174 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,689 UART: [art] PUB.X = A7CDB304B6BA88CD37FA09231240A68914B8C7215A3582CF49B92708013B8B75092BB4D340E7243CD412EFCF0314A19C
31,482,921 UART: [art] PUB.Y = 58CF014951883B975F92AE9036D9DEF6A4D6F0B34735E83DCCF5126FA61982BB4DF3E44A2926549895F2CC787B892171
31,490,187 UART: [art] SIG.R = 4434E3D81C79932D26CBA81BF9A6F8E2037D53964FFE5815075F15F2607D84934F5DFEF26947421C409B020834B4B84C
31,497,512 UART: [art] SIG.S = 7B026A4C14E0C2A94EEDFF84A4F61CC57BB6B77A8391A71436ACF48CC61D601775D6A3CE45D6B4FEE8C7979168FB2D71
32,803,364 UART: Caliptra RT
32,804,104 UART: [state] CFI Enabled
32,922,965 UART: [rt] RT listening for mailbox commands...
32,924,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,955,588 UART: [rt]cmd =0x44504543, len=96
38,628,614 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,130,147 ready_for_fw is high
4,130,536 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,995 >>> mbox cmd response: success
23,715,195 UART:
23,715,598 UART: Running Caliptra FMC ...
23,716,789 UART:
23,716,955 UART: [state] CFI Enabled
23,724,792 UART: [fht] FMC Alias Private Key: 7
26,055,344 UART: [art] Extend RT PCRs Done
26,056,569 UART: [art] Lock RT PCRs Done
26,058,711 UART: [art] Populate DV Done
26,064,082 UART: [fht] FMC Alias Private Key: 7
26,065,671 UART: [art] Derive CDI
26,066,402 UART: [art] Store in in slot 0x4
26,109,486 UART: [art] Derive Key Pair
26,110,536 UART: [art] Store priv key in slot 0x5
29,352,359 UART: [art] Derive Key Pair - Done
29,365,378 UART: [art] Signing Cert with AUTHO
29,366,686 UART: RITY.KEYID = 7
31,645,887 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,388 UART: [art] PUB.X = 1B722AE97046859FA2D1EB26DCDFAD7C06878AFE1D3F26E904F69268B58CA68F76C2DFB5D869390B2418431AA4BC75C9
31,654,654 UART: [art] PUB.Y = B38649ED6B332F17F11EE214AF45F82ABF1DDAF87A353FEC5A775775229D7EC7BC9D86F88A19B00B2BD89B1F4117B1D7
31,661,914 UART: [art] SIG.R = 1A9639FE8AFA035D0943612C47B660EF04A0286A24BF58D0CDC17DD6864C6B201BD12B203534FBFB137117874619E0A0
31,669,289 UART: [art] SIG.S = B7B724B220745FDC4D415DA6F420762A5E93B2892A6E93AE3F2EDEA6B868B6EF40C25E72A35ABFA453E9209D2E29E987
32,974,552 UART: Caliptra RT
32,975,271 UART: [state] CFI Enabled
33,092,458 UART: [rt] RT listening for mailbox commands...
33,094,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,124,876 UART: [rt]cmd =0x44504543, len=96
38,796,434 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,041 UART:
192,442 UART: Running Caliptra ROM ...
193,545 UART:
193,691 UART: [state] CFI Enabled
265,502 UART: [state] LifecycleState = Unprovisioned
267,408 UART: [state] DebugLocked = No
269,000 UART: [state] WD Timer not started. Device not locked for debugging
272,611 UART: [kat] SHA2-256
451,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,354 UART: [kat] ++
463,805 UART: [kat] sha1
474,767 UART: [kat] SHA2-256
477,782 UART: [kat] SHA2-384
482,922 UART: [kat] SHA2-512-ACC
485,854 UART: [kat] ECC-384
2,946,332 UART: [kat] HMAC-384Kdf
2,970,497 UART: [kat] LMS
3,499,953 UART: [kat] --
3,504,515 UART: [cold-reset] ++
3,506,088 UART: [fht] FHT @ 0x50003400
3,517,419 UART: [idev] ++
3,517,979 UART: [idev] CDI.KEYID = 6
3,518,891 UART: [idev] SUBJECT.KEYID = 7
3,520,067 UART: [idev] UDS.KEYID = 0
3,520,993 ready_for_fw is high
3,521,192 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,166 UART: [idev] Erasing UDS.KEYID = 0
6,022,960 UART: [idev] Sha1 KeyId Algorithm
6,047,119 UART: [idev] --
6,050,246 UART: [ldev] ++
6,050,818 UART: [ldev] CDI.KEYID = 6
6,051,731 UART: [ldev] SUBJECT.KEYID = 5
6,052,946 UART: [ldev] AUTHORITY.KEYID = 7
6,054,178 UART: [ldev] FE.KEYID = 1
6,099,567 UART: [ldev] Erasing FE.KEYID = 1
8,602,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,020 UART: [ldev] --
10,409,877 UART: [fwproc] Wait for Commands...
10,411,372 UART: [fwproc] Recv command 0x46574c44
10,413,486 UART: [fwproc] Recv'd Img size: 114448 bytes
13,809,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,271,958 >>> mbox cmd response: success
14,276,849 UART: [afmc] ++
14,277,444 UART: [afmc] CDI.KEYID = 6
14,278,370 UART: [afmc] SUBJECT.KEYID = 7
14,279,537 UART: [afmc] AUTHORITY.KEYID = 5
16,807,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,286 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,329 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,193 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,389 UART: [afmc] --
18,606,625 UART: [cold-reset] --
18,610,764 UART: [state] Locking Datavault
18,616,497 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,193 UART: [state] Locking ICCM
18,619,479 UART: [exit] Launching FMC @ 0x40000130
18,627,928 UART:
18,628,162 UART: Running Caliptra FMC ...
18,629,257 UART:
18,629,419 UART: [state] CFI Enabled
18,691,381 UART: [fht] FMC Alias Private Key: 7
20,454,970 UART: [art] Extend RT PCRs Done
20,456,191 UART: [art] Lock RT PCRs Done
20,457,840 UART: [art] Populate DV Done
20,463,352 UART: [fht] FMC Alias Private Key: 7
20,464,886 UART: [art] Derive CDI
20,465,699 UART: [art] Store in in slot 0x4
20,523,632 UART: [art] Derive Key Pair
20,524,670 UART: [art] Store priv key in slot 0x5
22,987,671 UART: [art] Derive Key Pair - Done
23,000,669 UART: [art] Signing Cert with AUTHO
23,001,977 UART: RITY.KEYID = 7
24,713,258 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,736 UART: [art] PUB.X = C663F2143271703F198F86E5B145E24204705BFE96C94872DD3FCC5C2C5BFB52E88DA8264DBE88617745A4572C5B47F8
24,721,984 UART: [art] PUB.Y = B4F8A818FC80DFC3F9F220C172E5BDAFE26F80FFD6A78133D849B0E1A378FBF56A83F061828BBA201C8B58E97D5C9483
24,729,277 UART: [art] SIG.R = C3091EF5B3D70130C0ACA890283C8D8F31BD88D5B7B3AE275457D1B6512AF2729A719A758EA3A0DFFAA841A9756B2CDD
24,736,707 UART: [art] SIG.S = ACFAA378E700F0A213A4FE5335372B0F9D0921E50EC8F8B5EDC4F9BE688B55087777D57557F2C8D77CCF2AC5D2868E2B
25,715,346 UART: Caliptra RT
25,716,051 UART: [state] CFI Enabled
25,882,902 UART: [rt] RT listening for mailbox commands...
25,884,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,916,148 UART: [rt]cmd =0x44504543, len=96
30,274,424 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,375,943 ready_for_fw is high
3,376,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,056,964 >>> mbox cmd response: success
18,360,948 UART:
18,361,352 UART: Running Caliptra FMC ...
18,362,464 UART:
18,362,617 UART: [state] CFI Enabled
18,428,044 UART: [fht] FMC Alias Private Key: 7
20,192,193 UART: [art] Extend RT PCRs Done
20,193,409 UART: [art] Lock RT PCRs Done
20,195,004 UART: [art] Populate DV Done
20,200,635 UART: [fht] FMC Alias Private Key: 7
20,202,336 UART: [art] Derive CDI
20,203,074 UART: [art] Store in in slot 0x4
20,260,928 UART: [art] Derive Key Pair
20,261,924 UART: [art] Store priv key in slot 0x5
22,725,145 UART: [art] Derive Key Pair - Done
22,738,051 UART: [art] Signing Cert with AUTHO
22,739,351 UART: RITY.KEYID = 7
24,450,786 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,289 UART: [art] PUB.X = 28056CC7AE27EBDC158EFE6F8807A5FF086604B9A717740E2E150F8025EE42AC21B97156865BC45C33054296D99D50CD
24,459,598 UART: [art] PUB.Y = DED258A74C9F0F99F55B9AE2E6DE4D21CA5B93161F57DC4DF1BFC5ADAF28888DCB53DFA87C2621FA6F2CC6A42772AC46
24,466,903 UART: [art] SIG.R = 337E94A6F3CBBCB27AE1AC81BE815524316CFD8D3486FFABACDC28E5AB452953FCF3315F887C0D23106326B9F9067658
24,474,292 UART: [art] SIG.S = 5F30EFF19B91161CFBA5E2340046EB70848DCB9FB7DBC7F499F00BBC1995DF78389555A8E857E54C74A2EFE6ACD7D7FB
25,452,539 UART: Caliptra RT
25,453,241 UART: [state] CFI Enabled
25,620,539 UART: [rt] RT listening for mailbox commands...
25,622,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,653,725 UART: [rt]cmd =0x44504543, len=96
30,032,334 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,375 UART:
192,753 UART: Running Caliptra ROM ...
193,852 UART:
603,395 UART: [state] CFI Enabled
613,239 UART: [state] LifecycleState = Unprovisioned
615,117 UART: [state] DebugLocked = No
617,578 UART: [state] WD Timer not started. Device not locked for debugging
621,023 UART: [kat] SHA2-256
800,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,703 UART: [kat] ++
812,150 UART: [kat] sha1
824,009 UART: [kat] SHA2-256
827,019 UART: [kat] SHA2-384
833,997 UART: [kat] SHA2-512-ACC
836,924 UART: [kat] ECC-384
3,280,978 UART: [kat] HMAC-384Kdf
3,292,094 UART: [kat] LMS
3,821,612 UART: [kat] --
3,827,161 UART: [cold-reset] ++
3,828,235 UART: [fht] FHT @ 0x50003400
3,838,989 UART: [idev] ++
3,839,555 UART: [idev] CDI.KEYID = 6
3,840,482 UART: [idev] SUBJECT.KEYID = 7
3,841,649 UART: [idev] UDS.KEYID = 0
3,842,614 ready_for_fw is high
3,842,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,974 UART: [idev] Erasing UDS.KEYID = 0
6,314,056 UART: [idev] Sha1 KeyId Algorithm
6,336,613 UART: [idev] --
6,340,043 UART: [ldev] ++
6,340,615 UART: [ldev] CDI.KEYID = 6
6,341,579 UART: [ldev] SUBJECT.KEYID = 5
6,342,728 UART: [ldev] AUTHORITY.KEYID = 7
6,343,955 UART: [ldev] FE.KEYID = 1
6,355,021 UART: [ldev] Erasing FE.KEYID = 1
8,828,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,809 UART: [ldev] --
10,614,989 UART: [fwproc] Wait for Commands...
10,617,401 UART: [fwproc] Recv command 0x46574c44
10,619,483 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,318 >>> mbox cmd response: success
14,492,656 UART: [afmc] ++
14,493,243 UART: [afmc] CDI.KEYID = 6
14,494,147 UART: [afmc] SUBJECT.KEYID = 7
14,495,354 UART: [afmc] AUTHORITY.KEYID = 5
16,993,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,139 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,916 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,942 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,809 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,591 UART: [afmc] --
18,789,146 UART: [cold-reset] --
18,792,792 UART: [state] Locking Datavault
18,798,459 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,097 UART: [state] Locking ICCM
18,801,864 UART: [exit] Launching FMC @ 0x40000130
18,810,262 UART:
18,810,541 UART: Running Caliptra FMC ...
18,811,647 UART:
18,811,815 UART: [state] CFI Enabled
18,819,369 UART: [fht] FMC Alias Private Key: 7
20,576,059 UART: [art] Extend RT PCRs Done
20,577,318 UART: [art] Lock RT PCRs Done
20,579,183 UART: [art] Populate DV Done
20,584,477 UART: [fht] FMC Alias Private Key: 7
20,586,165 UART: [art] Derive CDI
20,586,967 UART: [art] Store in in slot 0x4
20,629,440 UART: [art] Derive Key Pair
20,630,431 UART: [art] Store priv key in slot 0x5
23,057,357 UART: [art] Derive Key Pair - Done
23,070,421 UART: [art] Signing Cert with AUTHO
23,071,733 UART: RITY.KEYID = 7
24,776,820 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,322 UART: [art] PUB.X = 627CF2D66A044A939C01241DDD6B00A59FD0D7DE775832012A6FBBEC4114C2B1E3E872E20D72CA6FAB0B98DA1630AF6F
24,785,612 UART: [art] PUB.Y = 1622D84E7D0489E900B0CF4A26EB9CF3817A2DFAE4A228A5294E9268F5E8AF3577450020BF9FDD9EE998C6C83981D966
24,792,822 UART: [art] SIG.R = 817AC7EBCEB7317E736234A543B949829BF3C5E32240A8D8C688E4D7AF6B6B3FE291B13BA6C82DEFD90253D1CB766DB0
24,800,253 UART: [art] SIG.S = AA0F1A55C3D75485C658C9868906DFF61CC44EE00C66B28B588763355318AC26D277B2197ACE1015628B9C18E5F49BAC
25,779,486 UART: Caliptra RT
25,780,221 UART: [state] CFI Enabled
25,896,849 UART: [rt] RT listening for mailbox commands...
25,898,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,929,277 UART: [rt]cmd =0x44504543, len=96
30,211,426 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,698,571 ready_for_fw is high
3,699,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,665 >>> mbox cmd response: success
18,530,442 UART:
18,530,843 UART: Running Caliptra FMC ...
18,531,970 UART:
18,532,118 UART: [state] CFI Enabled
18,540,054 UART: [fht] FMC Alias Private Key: 7
20,297,359 UART: [art] Extend RT PCRs Done
20,298,587 UART: [art] Lock RT PCRs Done
20,300,369 UART: [art] Populate DV Done
20,305,863 UART: [fht] FMC Alias Private Key: 7
20,307,566 UART: [art] Derive CDI
20,308,300 UART: [art] Store in in slot 0x4
20,350,831 UART: [art] Derive Key Pair
20,351,825 UART: [art] Store priv key in slot 0x5
22,778,630 UART: [art] Derive Key Pair - Done
22,792,049 UART: [art] Signing Cert with AUTHO
22,793,377 UART: RITY.KEYID = 7
24,499,241 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,738 UART: [art] PUB.X = 6857FB494C303D30EE2979D21AA4A482A2264FEF466630F18A2B2CB089E3416199516045A1DD3271C8EE55FFFF4134A5
24,508,037 UART: [art] PUB.Y = 144D91A78EA22145F64C95B0A72300E2C3311F3F781BD7CC3235499E57C006BCF812AF607D5B16F5C34313FF8078446D
24,515,280 UART: [art] SIG.R = B303FCE72097506BF8708E029F996AC73D24B8352BC6276C3ED3ECFAA0A08BBB96E51150FEE1E5CD1718BB998F654817
24,522,637 UART: [art] SIG.S = B8CD2EC0E24A7A588110D4419AC4580A96C7CE333FC9F4B42F258BF65A266382C56A2124E86FB1871A5ADAAED7A9440C
25,501,649 UART: Caliptra RT
25,502,387 UART: [state] CFI Enabled
25,619,570 UART: [rt] RT listening for mailbox commands...
25,621,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,651,775 UART: [rt]cmd =0x44504543, len=96
29,935,725 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,436,387 ready_for_fw is high
3,436,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,751 >>> mbox cmd response: success
19,031,224 UART:
19,031,617 UART: Running Caliptra FMC ...
19,032,721 UART:
19,032,879 UART: [state] CFI Enabled
19,096,621 UART: [fht] FMC Alias Private Key: 7
20,860,176 UART: [art] Extend RT PCRs Done
20,861,406 UART: [art] Lock RT PCRs Done
20,862,952 UART: [art] Populate DV Done
20,868,416 UART: [fht] FMC Alias Private Key: 7
20,870,115 UART: [art] Derive CDI
20,870,852 UART: [art] Store in in slot 0x4
20,918,420 UART: [art] Derive Key Pair
20,919,437 UART: [art] Store priv key in slot 0x5
23,382,390 UART: [art] Derive Key Pair - Done
23,395,540 UART: [art] Signing Cert with AUTHO
23,396,856 UART: RITY.KEYID = 7
25,109,015 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,876 UART: [art] PUB.X = 8CC7209544B0B52B1430BF47349E420D936911ABBEEB56D07F2679E4E82EC1F3971AC300838D86E7533BF1DE2588EA57
25,117,754 UART: [art] PUB.Y = B659753CCAC8F21CC659C9E97EB0401E675FC5D5BFE64C0ED2750E51DBB9F497E18E351A71A1FC921642F0F9F2011F30
25,125,008 UART: [art] SIG.R = 645D11835F9C0F5F96B6338385E0A3621302F813F2DACCDA4EAF3F1890DCD3409032C7655E08154746661F61F21C50E9
25,132,400 UART: [art] SIG.S = 255EA5AFCB7BA18AC7721E4D7873891D87AE9862B4CD6F45809A2AF5DCBAB287A9AE402D9BE62BCECEA0871DBD92C2EE
26,111,599 UART: Caliptra RT
26,112,303 UART: [state] CFI Enabled
26,277,048 UART: [rt] RT listening for mailbox commands...
26,278,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,310,358 UART: [rt]cmd =0x44504543, len=96
30,668,650 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,760,355 ready_for_fw is high
3,760,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,932 >>> mbox cmd response: success
19,202,962 UART:
19,203,347 UART: Running Caliptra FMC ...
19,204,480 UART:
19,204,637 UART: [state] CFI Enabled
19,212,412 UART: [fht] FMC Alias Private Key: 7
20,969,400 UART: [art] Extend RT PCRs Done
20,970,620 UART: [art] Lock RT PCRs Done
20,972,185 UART: [art] Populate DV Done
20,977,485 UART: [fht] FMC Alias Private Key: 7
20,979,020 UART: [art] Derive CDI
20,979,831 UART: [art] Store in in slot 0x4
21,022,224 UART: [art] Derive Key Pair
21,023,226 UART: [art] Store priv key in slot 0x5
23,449,990 UART: [art] Derive Key Pair - Done
23,462,622 UART: [art] Signing Cert with AUTHO
23,463,930 UART: RITY.KEYID = 7
25,169,888 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,394 UART: [art] PUB.X = A6DB64E17AC6B95D6FFBCB4E205C18FED0CFDE30661729A765930AB2BC6B4BBFA4151A8B4FCAE6A571E14162EBF3B73A
25,178,723 UART: [art] PUB.Y = 36F88022326CE2768BAF5D0DD2A869D84780B703DD603A1C0FA15FDCAD60FA66E96DCABB9A80575824DB9FDD15EC4267
25,185,961 UART: [art] SIG.R = 32B10AF9D2E0F2E79CB4DF5E3B3FD8F2915DAD89491ED144FCBBE7A0210C76EDCDD44FBAE70A27708B81744ED2DF4BF2
25,193,395 UART: [art] SIG.S = 1D6327775CB9B2F8857FB887DDB62D97712F2F173700DEA2B698989354C9162FF181AB864FFAEBA4D4A846C4C93FAC84
26,171,986 UART: Caliptra RT
26,172,673 UART: [state] CFI Enabled
26,288,869 UART: [rt] RT listening for mailbox commands...
26,290,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,321,238 UART: [rt]cmd =0x44504543, len=96
30,604,092 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
86,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,761 UART: [kat] SHA2-256
881,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,807 UART: [kat] ++
885,959 UART: [kat] sha1
890,307 UART: [kat] SHA2-256
892,245 UART: [kat] SHA2-384
894,928 UART: [kat] SHA2-512-ACC
896,829 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
907,008 UART: [kat] LMS
1,475,204 UART: [kat] --
1,476,165 UART: [cold-reset] ++
1,476,653 UART: [fht] Storing FHT @ 0x50003400
1,479,466 UART: [idev] ++
1,479,634 UART: [idev] CDI.KEYID = 6
1,479,994 UART: [idev] SUBJECT.KEYID = 7
1,480,418 UART: [idev] UDS.KEYID = 0
1,480,763 ready_for_fw is high
1,480,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,686 UART: [idev] Erasing UDS.KEYID = 0
1,505,372 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,032 UART: [idev] --
1,515,131 UART: [ldev] ++
1,515,299 UART: [ldev] CDI.KEYID = 6
1,515,662 UART: [ldev] SUBJECT.KEYID = 5
1,516,088 UART: [ldev] AUTHORITY.KEYID = 7
1,516,551 UART: [ldev] FE.KEYID = 1
1,521,715 UART: [ldev] Erasing FE.KEYID = 1
1,547,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,642 UART: [ldev] --
1,586,929 UART: [fwproc] Waiting for Commands...
1,587,544 UART: [fwproc] Received command 0x46574c44
1,588,335 UART: [fwproc] Received Image of size 114448 bytes
2,887,102 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,906 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,258 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,253 >>> mbox cmd response: success
3,081,311 UART: [afmc] ++
3,081,479 UART: [afmc] CDI.KEYID = 6
3,081,841 UART: [afmc] SUBJECT.KEYID = 7
3,082,266 UART: [afmc] AUTHORITY.KEYID = 5
3,117,043 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,461 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,241 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,854 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,544 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,463 UART: [afmc] --
3,160,407 UART: [cold-reset] --
3,161,225 UART: [state] Locking Datavault
3,162,230 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,834 UART: [state] Locking ICCM
3,163,494 UART: [exit] Launching FMC @ 0x40000130
3,168,823 UART:
3,168,839 UART: Running Caliptra FMC ...
3,169,247 UART:
3,169,301 UART: [state] CFI Enabled
3,180,126 UART: [fht] FMC Alias Private Key: 7
3,287,419 UART: [art] Extend RT PCRs Done
3,287,847 UART: [art] Lock RT PCRs Done
3,289,475 UART: [art] Populate DV Done
3,297,574 UART: [fht] FMC Alias Private Key: 7
3,298,748 UART: [art] Derive CDI
3,299,028 UART: [art] Store in in slot 0x4
3,384,391 UART: [art] Derive Key Pair
3,384,751 UART: [art] Store priv key in slot 0x5
3,398,165 UART: [art] Derive Key Pair - Done
3,412,637 UART: [art] Signing Cert with AUTHO
3,413,117 UART: RITY.KEYID = 7
3,428,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,870 UART: [art] PUB.X = 47E5A0B1688C5DEF5E6C18BEA72B4792D8267936091FB9BB8DB4183ED0D4E87D060C337B4FA6B1253812FB80B17666E1
3,435,637 UART: [art] PUB.Y = CBFF88E910DE18F4D7DCA96AC2F7FC841FAFF1FF05966F6293BF69623E246D4E4D12FB0ED609B17A9BA8F98E18401E98
3,442,598 UART: [art] SIG.R = 4A83F33919958EA9946429A5056091A3B3E5E5B6711F8E94FA64623B7361D5761D85590C8C43EB65DF5C36DA718E5985
3,449,354 UART: [art] SIG.S = 6F80B5B452501AD9B178DB84A99D931BB22FA0F75B8319238499B5A616DC79349C65FB7B4EFBA5307E20F9CC08299AB6
3,473,192 UART: Caliptra RT
3,473,445 UART: [state] CFI Enabled
3,580,583 UART: [rt] RT listening for mailbox commands...
3,581,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,673 UART: [rt]cmd =0x44504543, len=96
3,791,602 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,199 ready_for_fw is high
1,362,199 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,077 >>> mbox cmd response: success
2,988,829 UART:
2,988,845 UART: Running Caliptra FMC ...
2,989,253 UART:
2,989,307 UART: [state] CFI Enabled
2,999,536 UART: [fht] FMC Alias Private Key: 7
3,107,049 UART: [art] Extend RT PCRs Done
3,107,477 UART: [art] Lock RT PCRs Done
3,109,031 UART: [art] Populate DV Done
3,117,162 UART: [fht] FMC Alias Private Key: 7
3,118,194 UART: [art] Derive CDI
3,118,474 UART: [art] Store in in slot 0x4
3,203,641 UART: [art] Derive Key Pair
3,204,001 UART: [art] Store priv key in slot 0x5
3,217,071 UART: [art] Derive Key Pair - Done
3,231,984 UART: [art] Signing Cert with AUTHO
3,232,464 UART: RITY.KEYID = 7
3,247,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,335 UART: [art] PUB.X = 5466F34B0B279F4EC2F08FD7FCC9B18C5E338226B9A129293C9992B5DC09A55F8944825DC2795C8838B544798B2B706D
3,255,097 UART: [art] PUB.Y = A25AAA6E1E66D0DFFA0CEA1F0DECF6751F0ACB618BB8495A2E09A7D856A0303CB06F2BC4E68FB253F1AD7F146301B5DA
3,262,060 UART: [art] SIG.R = 96AF4AE8CBDA31A37756FABB2115C5B515516815F524221580DC0A523FC67F6F8EFE59B5D241C064E5E9BD95923A205E
3,268,835 UART: [art] SIG.S = 8C67F7D8214DDC6AFBBF6ADCED6DC9C2449BA8F3CFE477CC22D2C62F812F024129A274028A676274333E7A1908C8E277
3,292,855 UART: Caliptra RT
3,293,108 UART: [state] CFI Enabled
3,400,840 UART: [rt] RT listening for mailbox commands...
3,401,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,828 UART: [rt]cmd =0x44504543, len=96
3,611,540 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
87,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,664 UART: [kat] SHA2-256
882,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,710 UART: [kat] ++
886,862 UART: [kat] sha1
891,280 UART: [kat] SHA2-256
893,218 UART: [kat] SHA2-384
895,803 UART: [kat] SHA2-512-ACC
897,704 UART: [kat] ECC-384
903,257 UART: [kat] HMAC-384Kdf
907,741 UART: [kat] LMS
1,475,937 UART: [kat] --
1,476,896 UART: [cold-reset] ++
1,477,298 UART: [fht] Storing FHT @ 0x50003400
1,480,017 UART: [idev] ++
1,480,185 UART: [idev] CDI.KEYID = 6
1,480,545 UART: [idev] SUBJECT.KEYID = 7
1,480,969 UART: [idev] UDS.KEYID = 0
1,481,314 ready_for_fw is high
1,481,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,793 UART: [idev] Erasing UDS.KEYID = 0
1,505,355 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,927 UART: [idev] --
1,514,848 UART: [ldev] ++
1,515,016 UART: [ldev] CDI.KEYID = 6
1,515,379 UART: [ldev] SUBJECT.KEYID = 5
1,515,805 UART: [ldev] AUTHORITY.KEYID = 7
1,516,268 UART: [ldev] FE.KEYID = 1
1,521,488 UART: [ldev] Erasing FE.KEYID = 1
1,547,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,663 UART: [ldev] --
1,586,002 UART: [fwproc] Waiting for Commands...
1,586,723 UART: [fwproc] Received command 0x46574c44
1,587,514 UART: [fwproc] Received Image of size 114448 bytes
2,886,737 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,553 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,818 >>> mbox cmd response: success
3,081,024 UART: [afmc] ++
3,081,192 UART: [afmc] CDI.KEYID = 6
3,081,554 UART: [afmc] SUBJECT.KEYID = 7
3,081,979 UART: [afmc] AUTHORITY.KEYID = 5
3,118,100 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,214 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,607 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,297 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,014 UART: [afmc] --
3,160,958 UART: [cold-reset] --
3,161,658 UART: [state] Locking Datavault
3,162,775 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,379 UART: [state] Locking ICCM
3,163,987 UART: [exit] Launching FMC @ 0x40000130
3,169,316 UART:
3,169,332 UART: Running Caliptra FMC ...
3,169,740 UART:
3,169,883 UART: [state] CFI Enabled
3,180,254 UART: [fht] FMC Alias Private Key: 7
3,289,115 UART: [art] Extend RT PCRs Done
3,289,543 UART: [art] Lock RT PCRs Done
3,291,051 UART: [art] Populate DV Done
3,299,454 UART: [fht] FMC Alias Private Key: 7
3,300,564 UART: [art] Derive CDI
3,300,844 UART: [art] Store in in slot 0x4
3,386,661 UART: [art] Derive Key Pair
3,387,021 UART: [art] Store priv key in slot 0x5
3,400,469 UART: [art] Derive Key Pair - Done
3,414,981 UART: [art] Signing Cert with AUTHO
3,415,461 UART: RITY.KEYID = 7
3,429,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,666 UART: [art] PUB.X = D82D58DF5A68707264915A8612F33FC6EBBDEC7B98DA4C56D70C6BC503A3B4F9FF64801000BEA457CFFF369E6C12404C
3,437,422 UART: [art] PUB.Y = 6236E84CB793DDB7F0976222D39E2695E4AED60712435317F8E9228AE1DCE3DAF49049138316B87E3CF8F94366FA985F
3,444,369 UART: [art] SIG.R = 800D5558F061E2A36AE2AE7DD015829E783F8CA5C9A5BCA6FF2D163136676AD936FEBCEF43BD129961CCDF0CD7F053E4
3,451,151 UART: [art] SIG.S = 9015E96679DA5ABDA1F60794342EAA963B4E9A6FC81075C394E3A63B9AE649479C7312748BD786A1B9BF939A1F559BA7
3,474,751 UART: Caliptra RT
3,475,096 UART: [state] CFI Enabled
3,584,034 UART: [rt] RT listening for mailbox commands...
3,584,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,056 UART: [rt]cmd =0x44504543, len=96
3,794,989 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,606 ready_for_fw is high
1,363,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,298 >>> mbox cmd response: success
2,992,972 UART:
2,992,988 UART: Running Caliptra FMC ...
2,993,396 UART:
2,993,539 UART: [state] CFI Enabled
3,004,044 UART: [fht] FMC Alias Private Key: 7
3,111,933 UART: [art] Extend RT PCRs Done
3,112,361 UART: [art] Lock RT PCRs Done
3,113,911 UART: [art] Populate DV Done
3,122,164 UART: [fht] FMC Alias Private Key: 7
3,123,198 UART: [art] Derive CDI
3,123,478 UART: [art] Store in in slot 0x4
3,208,679 UART: [art] Derive Key Pair
3,209,039 UART: [art] Store priv key in slot 0x5
3,221,577 UART: [art] Derive Key Pair - Done
3,236,704 UART: [art] Signing Cert with AUTHO
3,237,184 UART: RITY.KEYID = 7
3,252,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,049 UART: [art] PUB.X = 2E2195CBF25BB1A323D962E572768326F8DB68E5B60BDB14C79513F46EE4F47414C4552E25722934A075B108A510BDC5
3,259,811 UART: [art] PUB.Y = B0F143DACE9046932793E122CAF53022BBF5779AC39154932D944966207CA3B75D50C5E75E9EC988DB8699EB4FB47187
3,266,761 UART: [art] SIG.R = 0946B6F0BBF6EE7E5EC6387E12A552C6F64B71D05582DAE24EE3F94F308C1E8945E467188F5F7E0FCEEE513FD75B382D
3,273,539 UART: [art] SIG.S = B769D122A39A033DB6B09B5CFB8615A0079165CF935E64D2606BE32DEA7D86C613D843E8503EA5FE0D4B0B710AA63F1D
3,297,145 UART: Caliptra RT
3,297,490 UART: [state] CFI Enabled
3,406,167 UART: [rt] RT listening for mailbox commands...
3,406,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,481 UART: [rt]cmd =0x44504543, len=96
3,618,365 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,651 UART: [kat] SHA2-256
903,591 UART: [kat] SHA2-384
906,430 UART: [kat] SHA2-512-ACC
908,331 UART: [kat] ECC-384
917,958 UART: [kat] HMAC-384Kdf
922,424 UART: [kat] LMS
1,170,752 UART: [kat] --
1,171,643 UART: [cold-reset] ++
1,172,015 UART: [fht] FHT @ 0x50003400
1,174,754 UART: [idev] ++
1,174,922 UART: [idev] CDI.KEYID = 6
1,175,282 UART: [idev] SUBJECT.KEYID = 7
1,175,706 UART: [idev] UDS.KEYID = 0
1,176,051 ready_for_fw is high
1,176,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,572 UART: [idev] Erasing UDS.KEYID = 0
1,201,043 UART: [idev] Sha1 KeyId Algorithm
1,209,565 UART: [idev] --
1,210,757 UART: [ldev] ++
1,210,925 UART: [ldev] CDI.KEYID = 6
1,211,288 UART: [ldev] SUBJECT.KEYID = 5
1,211,714 UART: [ldev] AUTHORITY.KEYID = 7
1,212,177 UART: [ldev] FE.KEYID = 1
1,217,417 UART: [ldev] Erasing FE.KEYID = 1
1,243,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,285 UART: [ldev] --
1,282,748 UART: [fwproc] Wait for Commands...
1,283,486 UART: [fwproc] Recv command 0x46574c44
1,284,214 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,554 >>> mbox cmd response: success
2,778,642 UART: [afmc] ++
2,778,810 UART: [afmc] CDI.KEYID = 6
2,779,172 UART: [afmc] SUBJECT.KEYID = 7
2,779,597 UART: [afmc] AUTHORITY.KEYID = 5
2,815,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,533 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,261 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,146 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,865 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,603 UART: [afmc] --
2,858,533 UART: [cold-reset] --
2,859,429 UART: [state] Locking Datavault
2,860,696 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,300 UART: [state] Locking ICCM
2,861,934 UART: [exit] Launching FMC @ 0x40000130
2,867,263 UART:
2,867,279 UART: Running Caliptra FMC ...
2,867,687 UART:
2,867,741 UART: [state] CFI Enabled
2,878,276 UART: [fht] FMC Alias Private Key: 7
2,986,109 UART: [art] Extend RT PCRs Done
2,986,537 UART: [art] Lock RT PCRs Done
2,988,221 UART: [art] Populate DV Done
2,996,518 UART: [fht] FMC Alias Private Key: 7
2,997,568 UART: [art] Derive CDI
2,997,848 UART: [art] Store in in slot 0x4
3,083,825 UART: [art] Derive Key Pair
3,084,185 UART: [art] Store priv key in slot 0x5
3,096,797 UART: [art] Derive Key Pair - Done
3,111,590 UART: [art] Signing Cert with AUTHO
3,112,070 UART: RITY.KEYID = 7
3,127,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,951 UART: [art] PUB.X = 4F39DF826C896C85FD483D539B8FD949337C1EE6F36623FC7E1808A7329D39925225342FFAAD9CEF9A67081C5D7A5476
3,134,717 UART: [art] PUB.Y = AE9D9D90C80AE7D9C9E5BD549B2238A20B9F4E07CDAF0E243B0BCA5031F0896C42E430ABE905C01E830F78C244B9A0A1
3,141,662 UART: [art] SIG.R = 5CA76B954CDF20DB4CC129FC24CBB1EB773E3E6B9E0B1BF0CB3B954408123284AEBB1C84844F04AF09C47D6DEA724C2D
3,148,442 UART: [art] SIG.S = D0299D3343C2EDC3932C79112059808D600C0E02387C8E8E71D5C2A094A2200E057ACD90CBD5AC18954F09E92F40D6F6
3,172,845 UART: Caliptra RT
3,173,098 UART: [state] CFI Enabled
3,280,973 UART: [rt] RT listening for mailbox commands...
3,281,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,831 UART: [rt]cmd =0x44504543, len=96
3,491,430 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,579 ready_for_fw is high
1,060,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,053 >>> mbox cmd response: success
2,689,961 UART:
2,689,977 UART: Running Caliptra FMC ...
2,690,385 UART:
2,690,439 UART: [state] CFI Enabled
2,700,838 UART: [fht] FMC Alias Private Key: 7
2,809,083 UART: [art] Extend RT PCRs Done
2,809,511 UART: [art] Lock RT PCRs Done
2,810,817 UART: [art] Populate DV Done
2,819,024 UART: [fht] FMC Alias Private Key: 7
2,820,018 UART: [art] Derive CDI
2,820,298 UART: [art] Store in in slot 0x4
2,906,165 UART: [art] Derive Key Pair
2,906,525 UART: [art] Store priv key in slot 0x5
2,920,449 UART: [art] Derive Key Pair - Done
2,935,096 UART: [art] Signing Cert with AUTHO
2,935,576 UART: RITY.KEYID = 7
2,950,770 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,535 UART: [art] PUB.X = 58ADA0A8C9EAAB68C873745DC15015FF830B681E7ACC34E76F0743FB1FF2696DF00352DE587445B4592671429B50D7A8
2,958,300 UART: [art] PUB.Y = 2C4DE2AE5E7B247A90D4337C9BAD1DB39EC52291B2DF6E5251542EF6045C2B9F762B9908EA1A21C3954950E159C3ABEE
2,965,256 UART: [art] SIG.R = 02D548B1A60A10D716758FAA31F9F535DD58297C0F14E74AB145E19C5A569255EC8302125B99C4B1F8F4E147133FA75B
2,972,014 UART: [art] SIG.S = 514AC240CFABF4A9044A15ADA919277C0A81F560CEBAD950674E742810D45489988A77CE04EC9C212FF7DCBF6C6A397F
2,995,364 UART: Caliptra RT
2,995,617 UART: [state] CFI Enabled
3,102,580 UART: [rt] RT listening for mailbox commands...
3,103,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,928 UART: [rt]cmd =0x44504543, len=96
3,313,900 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
893,569 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,694 UART: [kat] ++
897,846 UART: [kat] sha1
901,882 UART: [kat] SHA2-256
903,822 UART: [kat] SHA2-384
906,459 UART: [kat] SHA2-512-ACC
908,360 UART: [kat] ECC-384
917,735 UART: [kat] HMAC-384Kdf
922,455 UART: [kat] LMS
1,170,783 UART: [kat] --
1,171,698 UART: [cold-reset] ++
1,172,234 UART: [fht] FHT @ 0x50003400
1,174,865 UART: [idev] ++
1,175,033 UART: [idev] CDI.KEYID = 6
1,175,393 UART: [idev] SUBJECT.KEYID = 7
1,175,817 UART: [idev] UDS.KEYID = 0
1,176,162 ready_for_fw is high
1,176,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,197 UART: [idev] Erasing UDS.KEYID = 0
1,201,398 UART: [idev] Sha1 KeyId Algorithm
1,209,948 UART: [idev] --
1,211,026 UART: [ldev] ++
1,211,194 UART: [ldev] CDI.KEYID = 6
1,211,557 UART: [ldev] SUBJECT.KEYID = 5
1,211,983 UART: [ldev] AUTHORITY.KEYID = 7
1,212,446 UART: [ldev] FE.KEYID = 1
1,217,760 UART: [ldev] Erasing FE.KEYID = 1
1,243,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,086 UART: [ldev] --
1,283,351 UART: [fwproc] Wait for Commands...
1,283,939 UART: [fwproc] Recv command 0x46574c44
1,284,667 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,669 >>> mbox cmd response: success
2,776,739 UART: [afmc] ++
2,776,907 UART: [afmc] CDI.KEYID = 6
2,777,269 UART: [afmc] SUBJECT.KEYID = 7
2,777,694 UART: [afmc] AUTHORITY.KEYID = 5
2,812,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,476 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,906 UART: [afmc] --
2,855,790 UART: [cold-reset] --
2,856,792 UART: [state] Locking Datavault
2,858,243 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,847 UART: [state] Locking ICCM
2,859,435 UART: [exit] Launching FMC @ 0x40000130
2,864,764 UART:
2,864,780 UART: Running Caliptra FMC ...
2,865,188 UART:
2,865,331 UART: [state] CFI Enabled
2,875,746 UART: [fht] FMC Alias Private Key: 7
2,983,941 UART: [art] Extend RT PCRs Done
2,984,369 UART: [art] Lock RT PCRs Done
2,985,959 UART: [art] Populate DV Done
2,994,310 UART: [fht] FMC Alias Private Key: 7
2,995,264 UART: [art] Derive CDI
2,995,544 UART: [art] Store in in slot 0x4
3,081,365 UART: [art] Derive Key Pair
3,081,725 UART: [art] Store priv key in slot 0x5
3,094,723 UART: [art] Derive Key Pair - Done
3,109,641 UART: [art] Signing Cert with AUTHO
3,110,121 UART: RITY.KEYID = 7
3,125,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,076 UART: [art] PUB.X = EDDC7B17DBA57C501CBC4038856D96560DB5B9E5FE7BFCE7D613DF6A6E09570A80E9EA3F956639A2D2DDCA615AF3758C
3,132,859 UART: [art] PUB.Y = 02711F1EC64A2415A9237D2AFCF5C0B911DA15E4A81A9B9FEC3344B493EA10E4915063864C8DAED6E4C054DE038FA8EE
3,139,817 UART: [art] SIG.R = 583319EBEA547559F63E4920C082058F2BC31E19E05970288A8D9ACA9454A80EC5DE1935B9A14747F82A516CD64555C9
3,146,577 UART: [art] SIG.S = A488C532D01E157411D429A3EFF1DB6CCE7670C4D8D8BF50896704470A96E6A5BAA65ACFC5859AADFCAEC64F3B3F61FB
3,170,398 UART: Caliptra RT
3,170,743 UART: [state] CFI Enabled
3,279,856 UART: [rt] RT listening for mailbox commands...
3,280,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,150 UART: [rt]cmd =0x44504543, len=96
3,491,465 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,806 ready_for_fw is high
1,060,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,700 >>> mbox cmd response: success
2,690,094 UART:
2,690,110 UART: Running Caliptra FMC ...
2,690,518 UART:
2,690,661 UART: [state] CFI Enabled
2,701,502 UART: [fht] FMC Alias Private Key: 7
2,809,223 UART: [art] Extend RT PCRs Done
2,809,651 UART: [art] Lock RT PCRs Done
2,811,041 UART: [art] Populate DV Done
2,819,032 UART: [fht] FMC Alias Private Key: 7
2,819,972 UART: [art] Derive CDI
2,820,252 UART: [art] Store in in slot 0x4
2,906,275 UART: [art] Derive Key Pair
2,906,635 UART: [art] Store priv key in slot 0x5
2,919,687 UART: [art] Derive Key Pair - Done
2,934,931 UART: [art] Signing Cert with AUTHO
2,935,411 UART: RITY.KEYID = 7
2,950,481 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,246 UART: [art] PUB.X = DBC60BB921E25497C22F8A2ACB533EEB75DC8B06FE676836B93893FE2C37C536ACF5011A26B31A4883FB4199303D7935
2,958,013 UART: [art] PUB.Y = 0E28550AD40F77FC96DF5BAC676A835957A107C148D865F4D976EB8044B3F6447C33DFEC9F4499C27EE8D025585E23B4
2,964,955 UART: [art] SIG.R = E09CFD1D201A6184507B20D648BD038CD5953B9228A25C149E6DC36DF003B7F0FBE54D2A0F381C1BD835F388D5AB3A20
2,971,726 UART: [art] SIG.S = 4710AE8EF263D6091C2337BB2112F0A492D6442803E6CC426A6E188D14243567FFC0910F44D09CF05D5502ACE74F716A
2,995,569 UART: Caliptra RT
2,995,914 UART: [state] CFI Enabled
3,104,271 UART: [rt] RT listening for mailbox commands...
3,104,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,347 UART: [rt]cmd =0x44504543, len=96
3,316,324 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,061 UART: [kat] ++
895,213 UART: [kat] sha1
899,577 UART: [kat] SHA2-256
901,517 UART: [kat] SHA2-384
904,074 UART: [kat] SHA2-512-ACC
905,975 UART: [kat] ECC-384
915,102 UART: [kat] HMAC-384Kdf
919,740 UART: [kat] LMS
1,168,052 UART: [kat] --
1,168,829 UART: [cold-reset] ++
1,169,291 UART: [fht] FHT @ 0x50003400
1,171,789 UART: [idev] ++
1,171,957 UART: [idev] CDI.KEYID = 6
1,172,318 UART: [idev] SUBJECT.KEYID = 7
1,172,743 UART: [idev] UDS.KEYID = 0
1,173,089 ready_for_fw is high
1,173,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,023 UART: [idev] Erasing UDS.KEYID = 0
1,198,217 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,208,100 UART: [ldev] ++
1,208,268 UART: [ldev] CDI.KEYID = 6
1,208,632 UART: [ldev] SUBJECT.KEYID = 5
1,209,059 UART: [ldev] AUTHORITY.KEYID = 7
1,209,522 UART: [ldev] FE.KEYID = 1
1,214,836 UART: [ldev] Erasing FE.KEYID = 1
1,241,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,328 UART: [ldev] --
1,280,788 UART: [fwproc] Wait for Commands...
1,281,397 UART: [fwproc] Recv command 0x46574c44
1,282,130 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,793 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,102 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,042 >>> mbox cmd response: success
2,775,279 UART: [afmc] ++
2,775,447 UART: [afmc] CDI.KEYID = 6
2,775,810 UART: [afmc] SUBJECT.KEYID = 7
2,776,236 UART: [afmc] AUTHORITY.KEYID = 5
2,811,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,141 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,024 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,743 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,534 UART: [afmc] --
2,854,456 UART: [cold-reset] --
2,855,276 UART: [state] Locking Datavault
2,856,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,097 UART: [state] Locking ICCM
2,857,671 UART: [exit] Launching FMC @ 0x40000130
2,863,000 UART:
2,863,016 UART: Running Caliptra FMC ...
2,863,424 UART:
2,863,478 UART: [state] CFI Enabled
2,873,869 UART: [fht] FMC Alias Private Key: 7
2,982,002 UART: [art] Extend RT PCRs Done
2,982,430 UART: [art] Lock RT PCRs Done
2,984,072 UART: [art] Populate DV Done
2,992,071 UART: [fht] FMC Alias Private Key: 7
2,993,093 UART: [art] Derive CDI
2,993,373 UART: [art] Store in in slot 0x4
3,079,152 UART: [art] Derive Key Pair
3,079,512 UART: [art] Store priv key in slot 0x5
3,093,070 UART: [art] Derive Key Pair - Done
3,108,086 UART: [art] Signing Cert with AUTHO
3,108,566 UART: RITY.KEYID = 7
3,124,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,827 UART: [art] PUB.X = A5AC39107E10D561326BF13D3EA7580FBC8F5ECB2CB6442ADD7F137AFB6572AF4CAB3E47CB66C36452075573E2B354DD
3,131,607 UART: [art] PUB.Y = 759C11621616F858F70CAB8AFDEACD958B838F3C62A3EE15C31E5B0337CF7CED6E69C2FB7D85E45A2AD4252E157C6AAA
3,138,571 UART: [art] SIG.R = F98549D0C22C2100D9D44A7553AAC4ED58C250A5B1E3BD7465C66F956F9AF2895A0C04126F9ACDAA519FCB043388014E
3,145,315 UART: [art] SIG.S = 00C4EB829DB107C6AAB9B5B916A6C90D4D800C74E2D0634AD1CE14873D582AD68B572A67EDB2FF86D6C1CDD515E7C8B7
3,168,943 UART: Caliptra RT
3,169,196 UART: [state] CFI Enabled
3,276,896 UART: [rt] RT listening for mailbox commands...
3,277,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,034 UART: [rt]cmd =0x44504543, len=96
3,487,837 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,908 ready_for_fw is high
1,055,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,602 >>> mbox cmd response: success
2,685,244 UART:
2,685,260 UART: Running Caliptra FMC ...
2,685,668 UART:
2,685,722 UART: [state] CFI Enabled
2,696,013 UART: [fht] FMC Alias Private Key: 7
2,804,530 UART: [art] Extend RT PCRs Done
2,804,958 UART: [art] Lock RT PCRs Done
2,806,550 UART: [art] Populate DV Done
2,814,955 UART: [fht] FMC Alias Private Key: 7
2,815,905 UART: [art] Derive CDI
2,816,185 UART: [art] Store in in slot 0x4
2,901,976 UART: [art] Derive Key Pair
2,902,336 UART: [art] Store priv key in slot 0x5
2,915,172 UART: [art] Derive Key Pair - Done
2,930,128 UART: [art] Signing Cert with AUTHO
2,930,608 UART: RITY.KEYID = 7
2,945,808 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,573 UART: [art] PUB.X = 2BDE229CEEBEA4C7EFB7840A7783AC5EE6788C9659E78DF2802C2B26749C29CAD5301B05DF734EC40539AB214638E7C5
2,953,346 UART: [art] PUB.Y = BB8F6213264C6321228C0B35FD4030742278837E27976E31E73009D1A7FFF80B14E19F3D92475FEBE4A065780E4E1A11
2,960,278 UART: [art] SIG.R = 674FC4819312CED80BB78AD62307278B1E5CB5B49B577F688DEBFDF75A505EE243AD58AE9B8FAD4CA0C879AAD8D4E1B4
2,967,064 UART: [art] SIG.S = E3549F7F8BDFE544FE943438A4404A07F4ED00CF6A3CEE2C18C63621C1CB274CA68F3F1E6E055473D22A6F396F9334C3
2,990,491 UART: Caliptra RT
2,990,744 UART: [state] CFI Enabled
3,098,309 UART: [rt] RT listening for mailbox commands...
3,098,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,267 UART: [rt]cmd =0x44504543, len=96
3,309,216 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,979 UART: [state] LifecycleState = Unprovisioned
85,634 UART: [state] DebugLocked = No
86,190 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
891,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,380 UART: [kat] SHA2-256
901,320 UART: [kat] SHA2-384
904,163 UART: [kat] SHA2-512-ACC
906,064 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,689 UART: [kat] LMS
1,169,001 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,312 UART: [idev] ++
1,173,480 UART: [idev] CDI.KEYID = 6
1,173,841 UART: [idev] SUBJECT.KEYID = 7
1,174,266 UART: [idev] UDS.KEYID = 0
1,174,612 ready_for_fw is high
1,174,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,440 UART: [idev] Erasing UDS.KEYID = 0
1,199,094 UART: [idev] Sha1 KeyId Algorithm
1,207,770 UART: [idev] --
1,208,861 UART: [ldev] ++
1,209,029 UART: [ldev] CDI.KEYID = 6
1,209,393 UART: [ldev] SUBJECT.KEYID = 5
1,209,820 UART: [ldev] AUTHORITY.KEYID = 7
1,210,283 UART: [ldev] FE.KEYID = 1
1,215,781 UART: [ldev] Erasing FE.KEYID = 1
1,242,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,787 UART: [ldev] --
1,282,053 UART: [fwproc] Wait for Commands...
1,282,642 UART: [fwproc] Recv command 0x46574c44
1,283,375 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,239 >>> mbox cmd response: success
2,776,254 UART: [afmc] ++
2,776,422 UART: [afmc] CDI.KEYID = 6
2,776,785 UART: [afmc] SUBJECT.KEYID = 7
2,777,211 UART: [afmc] AUTHORITY.KEYID = 5
2,813,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,637 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,366 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,968 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,727 UART: [afmc] --
2,856,699 UART: [cold-reset] --
2,857,529 UART: [state] Locking Datavault
2,858,744 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,348 UART: [state] Locking ICCM
2,859,838 UART: [exit] Launching FMC @ 0x40000130
2,865,167 UART:
2,865,183 UART: Running Caliptra FMC ...
2,865,591 UART:
2,865,734 UART: [state] CFI Enabled
2,876,667 UART: [fht] FMC Alias Private Key: 7
2,985,116 UART: [art] Extend RT PCRs Done
2,985,544 UART: [art] Lock RT PCRs Done
2,987,178 UART: [art] Populate DV Done
2,995,555 UART: [fht] FMC Alias Private Key: 7
2,996,531 UART: [art] Derive CDI
2,996,811 UART: [art] Store in in slot 0x4
3,082,738 UART: [art] Derive Key Pair
3,083,098 UART: [art] Store priv key in slot 0x5
3,096,342 UART: [art] Derive Key Pair - Done
3,110,933 UART: [art] Signing Cert with AUTHO
3,111,413 UART: RITY.KEYID = 7
3,127,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,888 UART: [art] PUB.X = 1CABEF01EF44801596B3EB0BC5D85914C42C37A855822DCAC9801798C73DD5FB900748682574C877EF66E33B196031AA
3,134,651 UART: [art] PUB.Y = DE8F6AE17DFEE40E0FE21DADC2D9527A199606D36B9B744231D84139E268F41CFC839AB38838D49FBA86443CD28D61BC
3,141,606 UART: [art] SIG.R = 3A959A8B17FC75BE5D50DFD99A1A91C8D3728DD448078BF93EFCE3F89BA275516BB5666B39CB03C35F2E2947E2F12680
3,148,380 UART: [art] SIG.S = 157F633FB11D2D572F0ABE46B441C210B7B91E12FDB2B7D820258ED7BCAC30F4D8A15AC74815F08A6C34F9B6AF6210FE
3,172,446 UART: Caliptra RT
3,172,791 UART: [state] CFI Enabled
3,280,736 UART: [rt] RT listening for mailbox commands...
3,281,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,744 UART: [rt]cmd =0x44504543, len=96
3,491,959 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,415 ready_for_fw is high
1,056,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,377 >>> mbox cmd response: success
2,686,895 UART:
2,686,911 UART: Running Caliptra FMC ...
2,687,319 UART:
2,687,462 UART: [state] CFI Enabled
2,697,641 UART: [fht] FMC Alias Private Key: 7
2,805,482 UART: [art] Extend RT PCRs Done
2,805,910 UART: [art] Lock RT PCRs Done
2,807,508 UART: [art] Populate DV Done
2,815,827 UART: [fht] FMC Alias Private Key: 7
2,816,957 UART: [art] Derive CDI
2,817,237 UART: [art] Store in in slot 0x4
2,903,050 UART: [art] Derive Key Pair
2,903,410 UART: [art] Store priv key in slot 0x5
2,916,582 UART: [art] Derive Key Pair - Done
2,931,324 UART: [art] Signing Cert with AUTHO
2,931,804 UART: RITY.KEYID = 7
2,946,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,387 UART: [art] PUB.X = A6156660AAA40D563A7187EE267E957903C05B20C066624F5B23972EE6710BB1398CAC97A557E97640EF4360BF7A5EF5
2,954,146 UART: [art] PUB.Y = 799D33FEF6FD7C39FF312035EEC7CECED76951A66D988B649DAAD14DC13D60BEE50CB2A830E14711219FBB911CD715F2
2,961,111 UART: [art] SIG.R = BC7DB3200327364ED22528E706594C34223FA26753398B39C1AFF8E0843C18EB913D654B0AA00D2F8A1DC31C1B2DC763
2,967,871 UART: [art] SIG.S = 89645446DB2B8C53436BD57A9044D9915A03E4CABC91367AEFFC1D78E38EF965B0C190A384761E19FF41BA41FC09F69C
2,991,906 UART: Caliptra RT
2,992,251 UART: [state] CFI Enabled
3,100,367 UART: [rt] RT listening for mailbox commands...
3,101,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,253 UART: [rt]cmd =0x44504543, len=96
3,311,782 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,034 UART:
192,412 UART: Running Caliptra ROM ...
193,574 UART:
193,721 UART: [state] CFI Enabled
264,735 UART: [state] LifecycleState = Unprovisioned
266,656 UART: [state] DebugLocked = No
269,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,722 UART: [kat] SHA2-256
444,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,970 UART: [kat] ++
455,496 UART: [kat] sha1
465,175 UART: [kat] SHA2-256
467,893 UART: [kat] SHA2-384
473,241 UART: [kat] SHA2-512-ACC
475,618 UART: [kat] ECC-384
2,769,213 UART: [kat] HMAC-384Kdf
2,799,406 UART: [kat] LMS
3,989,707 UART: [kat] --
3,993,271 UART: [cold-reset] ++
3,994,562 UART: [fht] Storing FHT @ 0x50003400
4,006,395 UART: [idev] ++
4,006,985 UART: [idev] CDI.KEYID = 6
4,007,903 UART: [idev] SUBJECT.KEYID = 7
4,009,154 UART: [idev] UDS.KEYID = 0
4,010,365 ready_for_fw is high
4,010,573 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,962 UART: [idev] Erasing UDS.KEYID = 0
7,347,478 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,791 UART: [idev] --
7,372,949 UART: [ldev] ++
7,373,567 UART: [ldev] CDI.KEYID = 6
7,374,489 UART: [ldev] SUBJECT.KEYID = 5
7,375,708 UART: [ldev] AUTHORITY.KEYID = 7
7,376,945 UART: [ldev] FE.KEYID = 1
7,403,415 UART: [ldev] Erasing FE.KEYID = 1
10,736,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,933 UART: [ldev] --
13,094,794 UART: [fwproc] Waiting for Commands...
13,097,481 UART: [fwproc] Received command 0x46574c44
13,099,669 UART: [fwproc] Received Image of size 114124 bytes
17,160,791 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,487 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,343 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,623,943 >>> mbox cmd response: success
17,628,311 UART: [afmc] ++
17,628,926 UART: [afmc] CDI.KEYID = 6
17,629,840 UART: [afmc] SUBJECT.KEYID = 7
17,631,058 UART: [afmc] AUTHORITY.KEYID = 5
20,988,698 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,297,113 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,299,368 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,313,787 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,328,629 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,343,088 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,363,151 UART: [afmc] --
23,366,850 UART: [cold-reset] --
23,370,291 UART: [state] Locking Datavault
23,374,497 UART: [state] Locking PCR0, PCR1 and PCR31
23,376,266 UART: [state] Locking ICCM
23,379,095 UART: [exit] Launching FMC @ 0x40000130
23,387,442 UART:
23,387,674 UART: Running Caliptra FMC ...
23,388,699 UART:
23,388,849 UART: [state] CFI Enabled
23,457,711 UART: [fht] FMC Alias Private Key: 7
25,796,067 UART: [art] Extend RT PCRs Done
25,797,288 UART: [art] Lock RT PCRs Done
25,799,050 UART: [art] Populate DV Done
25,804,467 UART: [fht] FMC Alias Private Key: 7
25,806,005 UART: [art] Derive CDI
25,806,833 UART: [art] Store in in slot 0x4
25,866,365 UART: [art] Derive Key Pair
25,867,402 UART: [art] Store priv key in slot 0x5
29,160,236 UART: [art] Derive Key Pair - Done
29,173,336 UART: [art] Signing Cert with AUTHO
29,174,632 UART: RITY.KEYID = 7
31,462,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,658 UART: [art] PUB.X = 1A17D48AF76CD5EF560A1B1601DEEF177EE435623B8FE141B542C7E886FAC17D0D7919D437A3A4193D63701D5BCF0917
31,470,908 UART: [art] PUB.Y = A3C642F1BC580E4A4DA7F72ED0279A2F44DA502C072ECF5F4253811DF59C1E6AD489ABE0D544391578953930AC22A64C
31,478,134 UART: [art] SIG.R = E7969F2B6329868B5EEDC969ACD18D19FE7CD21C824A975A6909DDE5BDC48ECD7F94B009F1092471B347311F7AC556D6
31,485,527 UART: [art] SIG.S = 6DDB1B8E1FEA62A171E376DBCB87706539DF62258AF5D1FF48E3EBF722A47989875F113EF0133106BBAFA45A69E96955
32,790,553 UART: Caliptra RT
32,791,253 UART: [state] CFI Enabled
32,953,197 UART: [rt] RT listening for mailbox commands...
32,955,109 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,985,197 UART: [rt]cmd =0x44504543, len=28
33,028,228 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,803,888 ready_for_fw is high
3,804,314 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,887,891 >>> mbox cmd response: success
23,581,357 UART:
23,581,736 UART: Running Caliptra FMC ...
23,582,940 UART:
23,583,121 UART: [state] CFI Enabled
23,652,481 UART: [fht] FMC Alias Private Key: 7
25,990,538 UART: [art] Extend RT PCRs Done
25,991,761 UART: [art] Lock RT PCRs Done
25,993,395 UART: [art] Populate DV Done
25,998,717 UART: [fht] FMC Alias Private Key: 7
26,000,208 UART: [art] Derive CDI
26,000,982 UART: [art] Store in in slot 0x4
26,060,357 UART: [art] Derive Key Pair
26,061,396 UART: [art] Store priv key in slot 0x5
29,354,687 UART: [art] Derive Key Pair - Done
29,367,697 UART: [art] Signing Cert with AUTHO
29,369,008 UART: RITY.KEYID = 7
31,655,325 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,838 UART: [art] PUB.X = 3970D979852DBBF67C9887E757062F5DBB9552C007781A515B86186E9E194D895C9A7AD761CA15B46384F8A032A855A9
31,664,057 UART: [art] PUB.Y = 9A7B636497E5D7CCE58B0C39C771D9677021A95255504F78BCD3BA9B0E787C8889E5A8C6AA6C4F6FF5F35E274C0F0EE2
31,671,309 UART: [art] SIG.R = 96709DC15F37469B6CDC9CBB6127F2CAF1403CB5EB603AA4BE5DCA171A0F85123536EF23D02103BC897966956EA01F83
31,678,670 UART: [art] SIG.S = 2BE059D93F246243CC63BEDD788B8421C2C82FE9E894566CB2E006FB043F219D6DA041C58DACDBDB81BA264BEA5CB932
32,984,151 UART: Caliptra RT
32,984,867 UART: [state] CFI Enabled
33,144,465 UART: [rt] RT listening for mailbox commands...
33,146,387 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,176,493 UART: [rt]cmd =0x44504543, len=28
33,219,150 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,497 UART:
192,855 UART: Running Caliptra ROM ...
194,040 UART:
603,744 UART: [state] CFI Enabled
619,100 UART: [state] LifecycleState = Unprovisioned
621,046 UART: [state] DebugLocked = No
623,845 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,700 UART: [kat] SHA2-256
798,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,923 UART: [kat] ++
809,436 UART: [kat] sha1
819,395 UART: [kat] SHA2-256
822,104 UART: [kat] SHA2-384
827,955 UART: [kat] SHA2-512-ACC
830,315 UART: [kat] ECC-384
3,115,509 UART: [kat] HMAC-384Kdf
3,127,471 UART: [kat] LMS
4,317,535 UART: [kat] --
4,321,837 UART: [cold-reset] ++
4,322,778 UART: [fht] Storing FHT @ 0x50003400
4,333,045 UART: [idev] ++
4,333,684 UART: [idev] CDI.KEYID = 6
4,334,594 UART: [idev] SUBJECT.KEYID = 7
4,335,830 UART: [idev] UDS.KEYID = 0
4,336,808 ready_for_fw is high
4,337,010 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,343 UART: [idev] Erasing UDS.KEYID = 0
7,623,188 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,874 UART: [idev] --
7,647,799 UART: [ldev] ++
7,648,362 UART: [ldev] CDI.KEYID = 6
7,649,322 UART: [ldev] SUBJECT.KEYID = 5
7,650,522 UART: [ldev] AUTHORITY.KEYID = 7
7,651,794 UART: [ldev] FE.KEYID = 1
7,662,755 UART: [ldev] Erasing FE.KEYID = 1
10,950,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,002 UART: [ldev] --
13,310,622 UART: [fwproc] Waiting for Commands...
13,312,705 UART: [fwproc] Received command 0x46574c44
13,314,881 UART: [fwproc] Received Image of size 114124 bytes
17,361,898 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,434,755 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,503,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,821,583 >>> mbox cmd response: success
17,825,850 UART: [afmc] ++
17,826,443 UART: [afmc] CDI.KEYID = 6
17,827,379 UART: [afmc] SUBJECT.KEYID = 7
17,828,642 UART: [afmc] AUTHORITY.KEYID = 5
21,142,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,889 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,143 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,486 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,373 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,796 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,421 UART: [afmc] --
23,509,795 UART: [cold-reset] --
23,513,672 UART: [state] Locking Datavault
23,520,051 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,815 UART: [state] Locking ICCM
23,523,531 UART: [exit] Launching FMC @ 0x40000130
23,531,925 UART:
23,532,156 UART: Running Caliptra FMC ...
23,533,254 UART:
23,533,404 UART: [state] CFI Enabled
23,541,486 UART: [fht] FMC Alias Private Key: 7
25,872,514 UART: [art] Extend RT PCRs Done
25,873,730 UART: [art] Lock RT PCRs Done
25,875,242 UART: [art] Populate DV Done
25,880,706 UART: [fht] FMC Alias Private Key: 7
25,882,240 UART: [art] Derive CDI
25,883,045 UART: [art] Store in in slot 0x4
25,925,696 UART: [art] Derive Key Pair
25,926,710 UART: [art] Store priv key in slot 0x5
29,168,679 UART: [art] Derive Key Pair - Done
29,181,735 UART: [art] Signing Cert with AUTHO
29,183,041 UART: RITY.KEYID = 7
31,462,831 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,337 UART: [art] PUB.X = 08BBEC35C5F67FBBBF8A514F12EB0C60047C31E60D4D4E6FCD72A203095BFD5076844A24BD9A8F793FBC4C063D118304
31,471,602 UART: [art] PUB.Y = 57A8334D994923E32472D4CF7F8F1F4CDE09BBD8CB5513AA7E604674AF65E9C4B1CF389B3678F270413CE72DF860C7AA
31,478,866 UART: [art] SIG.R = 053976E970AE902D8EFD6658146A081765D886C446A1BA7F155A63FAB2E8317BCE23450E94A341CEACA8156FC3793CD7
31,486,209 UART: [art] SIG.S = 5FE71F64EA3256F8CBFABC9F5F1A0EA5AC88EAE1098359501B78710778D899F839B1E3C98E07DCAE236D2E26614D220A
32,791,619 UART: Caliptra RT
32,792,309 UART: [state] CFI Enabled
32,909,051 UART: [rt] RT listening for mailbox commands...
32,910,962 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,940,880 UART: [rt]cmd =0x44504543, len=28
32,983,542 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,130,872 ready_for_fw is high
4,131,467 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,079,120 >>> mbox cmd response: success
23,717,599 UART:
23,718,005 UART: Running Caliptra FMC ...
23,719,202 UART:
23,719,366 UART: [state] CFI Enabled
23,727,310 UART: [fht] FMC Alias Private Key: 7
26,057,910 UART: [art] Extend RT PCRs Done
26,059,132 UART: [art] Lock RT PCRs Done
26,060,813 UART: [art] Populate DV Done
26,066,445 UART: [fht] FMC Alias Private Key: 7
26,068,201 UART: [art] Derive CDI
26,069,019 UART: [art] Store in in slot 0x4
26,111,383 UART: [art] Derive Key Pair
26,112,423 UART: [art] Store priv key in slot 0x5
29,354,767 UART: [art] Derive Key Pair - Done
29,367,983 UART: [art] Signing Cert with AUTHO
29,369,292 UART: RITY.KEYID = 7
31,648,782 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,333 UART: [art] PUB.X = 6705EF05DF655195EDBA3C0F2FC704CEEEE88145241B099BB3311DA6744E3283C0447C1FB77D497EE273FB2B27F9698A
31,657,571 UART: [art] PUB.Y = 53E92550881B66A530013C5508898CDAC40AF22DA0FB460C20DC80DC062E1729285116193AA5C4F7E8D4AC5FB40D5F36
31,664,794 UART: [art] SIG.R = 7EBF235126BECBD0DD0154DE1666D4ACE261DA9DA8A53F38B2E2F72DA0F57338EA13B0E67FC32CCB511D4FF238D31A82
31,672,213 UART: [art] SIG.S = FC594A17979FAF64BADFCE7961D89061291696787E573B7C7EC8A61CBFB2E7C1D13C5C2315B02B3A17E03857A09D8327
32,977,613 UART: Caliptra RT
32,978,330 UART: [state] CFI Enabled
33,095,855 UART: [rt] RT listening for mailbox commands...
33,097,776 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,127,915 UART: [rt]cmd =0x44504543, len=28
33,170,804 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,007 UART:
192,380 UART: Running Caliptra ROM ...
193,593 UART:
193,754 UART: [state] CFI Enabled
265,041 UART: [state] LifecycleState = Unprovisioned
266,878 UART: [state] DebugLocked = No
269,045 UART: [state] WD Timer not started. Device not locked for debugging
273,434 UART: [kat] SHA2-256
452,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,162 UART: [kat] ++
464,693 UART: [kat] sha1
475,715 UART: [kat] SHA2-256
478,715 UART: [kat] SHA2-384
483,984 UART: [kat] SHA2-512-ACC
486,937 UART: [kat] ECC-384
2,946,787 UART: [kat] HMAC-384Kdf
2,970,189 UART: [kat] LMS
3,499,699 UART: [kat] --
3,503,211 UART: [cold-reset] ++
3,505,146 UART: [fht] FHT @ 0x50003400
3,515,627 UART: [idev] ++
3,516,190 UART: [idev] CDI.KEYID = 6
3,517,146 UART: [idev] SUBJECT.KEYID = 7
3,518,315 UART: [idev] UDS.KEYID = 0
3,519,287 ready_for_fw is high
3,519,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,402 UART: [idev] Erasing UDS.KEYID = 0
6,026,195 UART: [idev] Sha1 KeyId Algorithm
6,050,638 UART: [idev] --
6,053,334 UART: [ldev] ++
6,053,903 UART: [ldev] CDI.KEYID = 6
6,054,802 UART: [ldev] SUBJECT.KEYID = 5
6,055,937 UART: [ldev] AUTHORITY.KEYID = 7
6,057,223 UART: [ldev] FE.KEYID = 1
6,099,834 UART: [ldev] Erasing FE.KEYID = 1
8,604,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,378 UART: [ldev] --
10,414,728 UART: [fwproc] Wait for Commands...
10,416,282 UART: [fwproc] Recv command 0x46574c44
10,418,370 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,069 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,709 >>> mbox cmd response: success
14,287,506 UART: [afmc] ++
14,288,099 UART: [afmc] CDI.KEYID = 6
14,289,016 UART: [afmc] SUBJECT.KEYID = 7
14,290,125 UART: [afmc] AUTHORITY.KEYID = 5
16,831,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,883 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,648 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,660 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,534 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,817 UART: [afmc] --
18,629,434 UART: [cold-reset] --
18,631,785 UART: [state] Locking Datavault
18,636,329 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,971 UART: [state] Locking ICCM
18,640,011 UART: [exit] Launching FMC @ 0x40000130
18,648,466 UART:
18,648,746 UART: Running Caliptra FMC ...
18,649,877 UART:
18,650,047 UART: [state] CFI Enabled
18,709,602 UART: [fht] FMC Alias Private Key: 7
20,474,080 UART: [art] Extend RT PCRs Done
20,475,283 UART: [art] Lock RT PCRs Done
20,477,172 UART: [art] Populate DV Done
20,482,796 UART: [fht] FMC Alias Private Key: 7
20,484,543 UART: [art] Derive CDI
20,485,359 UART: [art] Store in in slot 0x4
20,542,636 UART: [art] Derive Key Pair
20,543,653 UART: [art] Store priv key in slot 0x5
23,006,628 UART: [art] Derive Key Pair - Done
23,019,365 UART: [art] Signing Cert with AUTHO
23,020,677 UART: RITY.KEYID = 7
24,732,580 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,087 UART: [art] PUB.X = F3BA0DEE340B58C214984C0CD60C34EA9D1F789A61338E29310629B904B012877086515866B7BBD35428F7435DF6DEAD
24,741,365 UART: [art] PUB.Y = 27D065BDE0EF36923E6A2450D99EC34C87039DBCD2E71062EED9BF9749D4610D5D15321AA8915E41FF48593D483064D9
24,748,607 UART: [art] SIG.R = 0B03545CE4826DB0B1EED09828FB5FECCE9F6F216443BB15F4BF8634C4B31BCF34C440BEA5DF3F59F2DFA576685A1B0E
24,755,999 UART: [art] SIG.S = E5E947A8C88B60E4A78FB66DDB9FD824153CB9AE64EDFAFC71BEE50163B683A06EB14EF5A667AA29CFC956CF5F1E9E41
25,734,956 UART: Caliptra RT
25,735,653 UART: [state] CFI Enabled
25,902,060 UART: [rt] RT listening for mailbox commands...
25,903,982 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,934,530 UART: [rt]cmd =0x44504543, len=28
25,977,292 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,379,595 ready_for_fw is high
3,380,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,087,482 >>> mbox cmd response: success
18,362,906 UART:
18,363,296 UART: Running Caliptra FMC ...
18,364,460 UART:
18,364,624 UART: [state] CFI Enabled
18,431,200 UART: [fht] FMC Alias Private Key: 7
20,195,074 UART: [art] Extend RT PCRs Done
20,196,305 UART: [art] Lock RT PCRs Done
20,197,772 UART: [art] Populate DV Done
20,203,295 UART: [fht] FMC Alias Private Key: 7
20,204,835 UART: [art] Derive CDI
20,205,786 UART: [art] Store in in slot 0x4
20,264,031 UART: [art] Derive Key Pair
20,265,039 UART: [art] Store priv key in slot 0x5
22,728,369 UART: [art] Derive Key Pair - Done
22,741,306 UART: [art] Signing Cert with AUTHO
22,742,609 UART: RITY.KEYID = 7
24,454,205 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,704 UART: [art] PUB.X = 0CC62C292942BF6131BFDE856E03115F65AEA461F0C7A609FC014382B643DE06DCDC584D54D3A35D729935DAA05F5981
24,462,966 UART: [art] PUB.Y = 4E7FF0004BADCD1F1E4F7E1FAAC9D864E3B05859F3DE87222DFBF1E53CF419460D7E3B6B05AC34FD96719DEDA5F3CA62
24,470,220 UART: [art] SIG.R = ECD833C3B0C5CDE3B94433CF4CF52B92836AC7FDFD77424336E0140CFA50B402D97138400B111818522A5E742D28002C
24,477,618 UART: [art] SIG.S = 7D9F3DCC82A696B7FB30F17F77966C13DE377112C4789768D4965045D5572629B91CF4A7374781FDDF524B9672037AFF
25,456,314 UART: Caliptra RT
25,457,015 UART: [state] CFI Enabled
25,621,543 UART: [rt] RT listening for mailbox commands...
25,623,457 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,654,142 UART: [rt]cmd =0x44504543, len=28
25,697,134 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,483 UART:
192,850 UART: Running Caliptra ROM ...
193,945 UART:
603,678 UART: [state] CFI Enabled
617,277 UART: [state] LifecycleState = Unprovisioned
619,117 UART: [state] DebugLocked = No
620,791 UART: [state] WD Timer not started. Device not locked for debugging
625,385 UART: [kat] SHA2-256
804,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,083 UART: [kat] ++
816,533 UART: [kat] sha1
828,697 UART: [kat] SHA2-256
831,706 UART: [kat] SHA2-384
837,333 UART: [kat] SHA2-512-ACC
840,261 UART: [kat] ECC-384
3,279,835 UART: [kat] HMAC-384Kdf
3,290,939 UART: [kat] LMS
3,820,394 UART: [kat] --
3,823,169 UART: [cold-reset] ++
3,825,590 UART: [fht] FHT @ 0x50003400
3,837,050 UART: [idev] ++
3,837,609 UART: [idev] CDI.KEYID = 6
3,838,557 UART: [idev] SUBJECT.KEYID = 7
3,839,787 UART: [idev] UDS.KEYID = 0
3,840,676 ready_for_fw is high
3,840,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,025 UART: [idev] Erasing UDS.KEYID = 0
6,311,494 UART: [idev] Sha1 KeyId Algorithm
6,333,424 UART: [idev] --
6,338,760 UART: [ldev] ++
6,339,317 UART: [ldev] CDI.KEYID = 6
6,340,245 UART: [ldev] SUBJECT.KEYID = 5
6,341,441 UART: [ldev] AUTHORITY.KEYID = 7
6,342,661 UART: [ldev] FE.KEYID = 1
6,354,236 UART: [ldev] Erasing FE.KEYID = 1
8,827,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,676 UART: [ldev] --
10,615,443 UART: [fwproc] Wait for Commands...
10,617,217 UART: [fwproc] Recv command 0x46574c44
10,619,336 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,622 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,484,487 >>> mbox cmd response: success
14,488,949 UART: [afmc] ++
14,489,543 UART: [afmc] CDI.KEYID = 6
14,490,446 UART: [afmc] SUBJECT.KEYID = 7
14,491,654 UART: [afmc] AUTHORITY.KEYID = 5
16,991,496 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,460 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,260 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,942 UART: [afmc] --
18,787,383 UART: [cold-reset] --
18,790,387 UART: [state] Locking Datavault
18,796,440 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,077 UART: [state] Locking ICCM
18,800,844 UART: [exit] Launching FMC @ 0x40000130
18,809,238 UART:
18,809,467 UART: Running Caliptra FMC ...
18,810,559 UART:
18,810,707 UART: [state] CFI Enabled
18,819,177 UART: [fht] FMC Alias Private Key: 7
20,575,839 UART: [art] Extend RT PCRs Done
20,577,053 UART: [art] Lock RT PCRs Done
20,578,757 UART: [art] Populate DV Done
20,584,114 UART: [fht] FMC Alias Private Key: 7
20,585,763 UART: [art] Derive CDI
20,586,493 UART: [art] Store in in slot 0x4
20,628,562 UART: [art] Derive Key Pair
20,629,602 UART: [art] Store priv key in slot 0x5
23,056,624 UART: [art] Derive Key Pair - Done
23,069,724 UART: [art] Signing Cert with AUTHO
23,071,014 UART: RITY.KEYID = 7
24,776,066 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,826 UART: [art] PUB.X = ED71A7152FCAD3D897CF11D28AB0569C0EB871240EFB94E9F78FEEE7CAD3739E85F0D8F4F53645CD37B863DAAD44A9F3
24,784,840 UART: [art] PUB.Y = 5C31E0A810B633D8BFB10C378917523841470F8A36CB67F8096613DE1F3F00B025977F611AB3FB1358B07F4631EA147C
24,792,082 UART: [art] SIG.R = 9C46E48A949B6ABF4701AE4D5926017A8D1EBC9CC44489C180E609A90978FAA78770C8651A60EE9A9C540C0722E27873
24,799,462 UART: [art] SIG.S = E4D86FC77D7545447F68F3C363053F3015AB75E1A361F1E40EA0CC364B7CB55391E9E021FDD94295AA9C2A04A66C0814
25,778,081 UART: Caliptra RT
25,778,764 UART: [state] CFI Enabled
25,895,542 UART: [rt] RT listening for mailbox commands...
25,897,593 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,927,556 UART: [rt]cmd =0x44504543, len=28
25,970,050 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,695,513 ready_for_fw is high
3,695,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,884 >>> mbox cmd response: success
18,526,021 UART:
18,526,409 UART: Running Caliptra FMC ...
18,527,536 UART:
18,527,682 UART: [state] CFI Enabled
18,535,304 UART: [fht] FMC Alias Private Key: 7
20,292,406 UART: [art] Extend RT PCRs Done
20,293,614 UART: [art] Lock RT PCRs Done
20,295,697 UART: [art] Populate DV Done
20,300,991 UART: [fht] FMC Alias Private Key: 7
20,302,596 UART: [art] Derive CDI
20,303,342 UART: [art] Store in in slot 0x4
20,345,826 UART: [art] Derive Key Pair
20,346,867 UART: [art] Store priv key in slot 0x5
22,774,003 UART: [art] Derive Key Pair - Done
22,786,477 UART: [art] Signing Cert with AUTHO
22,787,784 UART: RITY.KEYID = 7
24,492,822 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,300 UART: [art] PUB.X = 844D45245B2D061254392ACC5D4E6F5FE7BCF249612BE7AD2A4E53332B7F17616F2FA31EBE438190F2E9F80A0A3BFA4E
24,501,647 UART: [art] PUB.Y = CAD64D9F74D632BF02EA3D025BB26FBE22B2034B8643A507B4F2A4FF544BC626CEAAA68A022A9BA6BBB726F674F16D37
24,508,933 UART: [art] SIG.R = CC47C4E58A8A314CC87281E8E4618417117A11AB048D498323349EC9532C2596A65FA710961703BB7676ADE1B26223DD
24,516,285 UART: [art] SIG.S = B4F12F92CB68925F8D23BC420AFC44BDC2BA49436AAA240B23ECCB8C37C885A542297D89E2AFC60403F889353F11604E
25,495,272 UART: Caliptra RT
25,495,983 UART: [state] CFI Enabled
25,613,445 UART: [rt] RT listening for mailbox commands...
25,615,366 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,645,672 UART: [rt]cmd =0x44504543, len=28
25,688,303 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,441,615 ready_for_fw is high
3,442,025 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,767,240 >>> mbox cmd response: success
19,044,388 UART:
19,044,791 UART: Running Caliptra FMC ...
19,045,991 UART:
19,046,188 UART: [state] CFI Enabled
19,115,708 UART: [fht] FMC Alias Private Key: 7
20,879,875 UART: [art] Extend RT PCRs Done
20,881,085 UART: [art] Lock RT PCRs Done
20,882,655 UART: [art] Populate DV Done
20,888,230 UART: [fht] FMC Alias Private Key: 7
20,889,890 UART: [art] Derive CDI
20,890,708 UART: [art] Store in in slot 0x4
20,948,194 UART: [art] Derive Key Pair
20,949,224 UART: [art] Store priv key in slot 0x5
23,412,461 UART: [art] Derive Key Pair - Done
23,425,730 UART: [art] Signing Cert with AUTHO
23,427,080 UART: RITY.KEYID = 7
25,138,029 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,521 UART: [art] PUB.X = 84BE31ADE34F6B410DD7FCE79C5D696CCBEDCAB2F6AF3016B7AEB12198F36B92BE2A4456F35756A1854CCC015BB65DAD
25,146,825 UART: [art] PUB.Y = 568B80B3577F9453CEEC1C8FBA37867CEF2B200FDB03E01AB88B62B6B57C118F5481BB8EA130FC004726E12F40368A39
25,154,093 UART: [art] SIG.R = CD70A8B022CA15B50CED8B08F882D3EFA106D3923FDABF50A6068906846A7F329A529C15CA614BFED27FE8E66C60F77F
25,161,490 UART: [art] SIG.S = 0E549D625D4E73432EE4C276D021EE2BDE81C3CD02CEE669369F74785C93FE491E3E7B632D55DFD526D2D015E642A8B8
26,140,092 UART: Caliptra RT
26,140,804 UART: [state] CFI Enabled
26,305,510 UART: [rt] RT listening for mailbox commands...
26,307,465 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,338,279 UART: [rt]cmd =0x44504543, len=28
26,381,048 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,753,328 ready_for_fw is high
3,753,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,949,792 >>> mbox cmd response: success
19,196,461 UART:
19,196,870 UART: Running Caliptra FMC ...
19,197,969 UART:
19,198,116 UART: [state] CFI Enabled
19,205,921 UART: [fht] FMC Alias Private Key: 7
20,963,164 UART: [art] Extend RT PCRs Done
20,964,387 UART: [art] Lock RT PCRs Done
20,965,985 UART: [art] Populate DV Done
20,971,339 UART: [fht] FMC Alias Private Key: 7
20,972,928 UART: [art] Derive CDI
20,973,669 UART: [art] Store in in slot 0x4
21,016,220 UART: [art] Derive Key Pair
21,017,265 UART: [art] Store priv key in slot 0x5
23,444,083 UART: [art] Derive Key Pair - Done
23,456,916 UART: [art] Signing Cert with AUTHO
23,458,245 UART: RITY.KEYID = 7
25,163,900 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,407 UART: [art] PUB.X = 8575763332CE57412C1F5A53EF11C58763397CFF46D73A0F897070A5C0824E64E21C32D1FA500D09C81073149D3CBC17
25,172,628 UART: [art] PUB.Y = 533C966E573ED697F70BE7C9B2CE65C63ABEE2B2140E1C4FBEDF77D27974A95099AD23AFA41F253060ED2106F987079D
25,179,916 UART: [art] SIG.R = BB88A339BB1E043FF3D7DECBC25591C3B64CAB927D06ADDFBD5CCCA774031BF9D9CB7232307BF16A5A81453D5C2307B8
25,187,304 UART: [art] SIG.S = 3B8336FC71745F9038EBDD2442C6EAE65C3FEB911C5880C2708DBFE7B0087B0B3E12218A6D2CD2AC66945C127E9E2A8E
26,166,629 UART: Caliptra RT
26,167,315 UART: [state] CFI Enabled
26,284,551 UART: [rt] RT listening for mailbox commands...
26,286,482 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,316,461 UART: [rt]cmd =0x44504543, len=28
26,359,302 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,229 UART: [kat] SHA2-256
882,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,275 UART: [kat] ++
886,427 UART: [kat] sha1
890,659 UART: [kat] SHA2-256
892,597 UART: [kat] SHA2-384
895,458 UART: [kat] SHA2-512-ACC
897,359 UART: [kat] ECC-384
902,836 UART: [kat] HMAC-384Kdf
907,622 UART: [kat] LMS
1,475,818 UART: [kat] --
1,476,637 UART: [cold-reset] ++
1,477,031 UART: [fht] Storing FHT @ 0x50003400
1,479,820 UART: [idev] ++
1,479,988 UART: [idev] CDI.KEYID = 6
1,480,348 UART: [idev] SUBJECT.KEYID = 7
1,480,772 UART: [idev] UDS.KEYID = 0
1,481,117 ready_for_fw is high
1,481,117 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,026 UART: [idev] Erasing UDS.KEYID = 0
1,505,356 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,820 UART: [idev] --
1,514,817 UART: [ldev] ++
1,514,985 UART: [ldev] CDI.KEYID = 6
1,515,348 UART: [ldev] SUBJECT.KEYID = 5
1,515,774 UART: [ldev] AUTHORITY.KEYID = 7
1,516,237 UART: [ldev] FE.KEYID = 1
1,521,307 UART: [ldev] Erasing FE.KEYID = 1
1,546,722 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,542 UART: [ldev] --
1,585,889 UART: [fwproc] Waiting for Commands...
1,586,656 UART: [fwproc] Received command 0x46574c44
1,587,447 UART: [fwproc] Received Image of size 114448 bytes
2,886,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,928 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,280 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,401 >>> mbox cmd response: success
3,081,559 UART: [afmc] ++
3,081,727 UART: [afmc] CDI.KEYID = 6
3,082,089 UART: [afmc] SUBJECT.KEYID = 7
3,082,514 UART: [afmc] AUTHORITY.KEYID = 5
3,117,317 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,545 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,053 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,938 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,628 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,335 UART: [afmc] --
3,160,447 UART: [cold-reset] --
3,161,391 UART: [state] Locking Datavault
3,162,570 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,174 UART: [state] Locking ICCM
3,163,666 UART: [exit] Launching FMC @ 0x40000130
3,168,995 UART:
3,169,011 UART: Running Caliptra FMC ...
3,169,419 UART:
3,169,473 UART: [state] CFI Enabled
3,179,990 UART: [fht] FMC Alias Private Key: 7
3,287,299 UART: [art] Extend RT PCRs Done
3,287,727 UART: [art] Lock RT PCRs Done
3,289,397 UART: [art] Populate DV Done
3,297,626 UART: [fht] FMC Alias Private Key: 7
3,298,716 UART: [art] Derive CDI
3,298,996 UART: [art] Store in in slot 0x4
3,384,713 UART: [art] Derive Key Pair
3,385,073 UART: [art] Store priv key in slot 0x5
3,398,647 UART: [art] Derive Key Pair - Done
3,413,391 UART: [art] Signing Cert with AUTHO
3,413,871 UART: RITY.KEYID = 7
3,429,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,982 UART: [art] PUB.X = 9C39FE7EB23B2AE1F3BF0DE23131860350FF971BB68DBECD727A4CAE335A91BABE5CDAF57C6A6365B98689B2BDA6FDAD
3,436,776 UART: [art] PUB.Y = 21181DBCFF4A24E8A5EBCEBCDC66ACA0D8332E1A8ABD555C32D554E199C94A2BAA82B74FEE896318A43A105F40CA76CC
3,443,752 UART: [art] SIG.R = 206698AB3892C108C1B1EBA31BBB4BAB8C0ECD95528745A23305A41C6D6109BAD756D78E638FEA3BC0FE97D56C7F158E
3,450,524 UART: [art] SIG.S = BCE1427D9C4814132848DD518EB34B62D94ED42941D54F1FD9ED970769EE04C7296E2D50676863DFD15A0C0224C52E67
3,473,977 UART: Caliptra RT
3,474,230 UART: [state] CFI Enabled
3,582,079 UART: [rt] RT listening for mailbox commands...
3,582,749 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,755 UART: [rt]cmd =0x44504543, len=28
3,656,072 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,685 ready_for_fw is high
1,361,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,179 >>> mbox cmd response: success
2,988,203 UART:
2,988,219 UART: Running Caliptra FMC ...
2,988,627 UART:
2,988,681 UART: [state] CFI Enabled
2,999,070 UART: [fht] FMC Alias Private Key: 7
3,107,515 UART: [art] Extend RT PCRs Done
3,107,943 UART: [art] Lock RT PCRs Done
3,109,343 UART: [art] Populate DV Done
3,117,422 UART: [fht] FMC Alias Private Key: 7
3,118,458 UART: [art] Derive CDI
3,118,738 UART: [art] Store in in slot 0x4
3,204,699 UART: [art] Derive Key Pair
3,205,059 UART: [art] Store priv key in slot 0x5
3,218,715 UART: [art] Derive Key Pair - Done
3,233,560 UART: [art] Signing Cert with AUTHO
3,234,040 UART: RITY.KEYID = 7
3,249,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,023 UART: [art] PUB.X = C10C0DDB8869A1661A9FCA4EAE6FC20CE06DD3B77FBD83E5886E54050B856915CE0A2499A5D4DECA66672559AA44C5D8
3,256,791 UART: [art] PUB.Y = 5EE1DE87C25C32FCD74A5E2C4F910CD8D5AE9026868FBBFC65975CC4A648F71A7E6A916222E83083567FB1F9D1D62D93
3,263,750 UART: [art] SIG.R = B55408B859AF5B8F884979CCFC5675A67CFABBC7741A1DA6032C31C4AC5FD799681F6987F97109ADD7AE8608505D1E1F
3,270,518 UART: [art] SIG.S = 25A33BE85EB7C7FA378D0BC3527894265AA83B640FA0A5DD2FA7E64BC8258B4048C4B45E13F1EC13A15D3FD3E60B83A6
3,294,854 UART: Caliptra RT
3,295,107 UART: [state] CFI Enabled
3,403,020 UART: [rt] RT listening for mailbox commands...
3,403,690 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,742 UART: [rt]cmd =0x44504543, len=28
3,477,267 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,752 UART: [kat] SHA2-256
882,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,798 UART: [kat] ++
886,950 UART: [kat] sha1
891,150 UART: [kat] SHA2-256
893,088 UART: [kat] SHA2-384
895,869 UART: [kat] SHA2-512-ACC
897,770 UART: [kat] ECC-384
903,685 UART: [kat] HMAC-384Kdf
908,353 UART: [kat] LMS
1,476,549 UART: [kat] --
1,477,114 UART: [cold-reset] ++
1,477,448 UART: [fht] Storing FHT @ 0x50003400
1,480,321 UART: [idev] ++
1,480,489 UART: [idev] CDI.KEYID = 6
1,480,849 UART: [idev] SUBJECT.KEYID = 7
1,481,273 UART: [idev] UDS.KEYID = 0
1,481,618 ready_for_fw is high
1,481,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,389 UART: [idev] Erasing UDS.KEYID = 0
1,506,607 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,275 UART: [idev] --
1,516,256 UART: [ldev] ++
1,516,424 UART: [ldev] CDI.KEYID = 6
1,516,787 UART: [ldev] SUBJECT.KEYID = 5
1,517,213 UART: [ldev] AUTHORITY.KEYID = 7
1,517,676 UART: [ldev] FE.KEYID = 1
1,522,592 UART: [ldev] Erasing FE.KEYID = 1
1,547,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,541 UART: [ldev] --
1,586,840 UART: [fwproc] Waiting for Commands...
1,587,653 UART: [fwproc] Received command 0x46574c44
1,588,444 UART: [fwproc] Received Image of size 114448 bytes
2,886,733 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,545 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,897 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,922 >>> mbox cmd response: success
3,080,070 UART: [afmc] ++
3,080,238 UART: [afmc] CDI.KEYID = 6
3,080,600 UART: [afmc] SUBJECT.KEYID = 7
3,081,025 UART: [afmc] AUTHORITY.KEYID = 5
3,115,762 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,998 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,506 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,391 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,081 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,058 UART: [afmc] --
3,159,102 UART: [cold-reset] --
3,159,974 UART: [state] Locking Datavault
3,160,975 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,579 UART: [state] Locking ICCM
3,162,201 UART: [exit] Launching FMC @ 0x40000130
3,167,530 UART:
3,167,546 UART: Running Caliptra FMC ...
3,167,954 UART:
3,168,097 UART: [state] CFI Enabled
3,178,110 UART: [fht] FMC Alias Private Key: 7
3,285,623 UART: [art] Extend RT PCRs Done
3,286,051 UART: [art] Lock RT PCRs Done
3,287,343 UART: [art] Populate DV Done
3,295,552 UART: [fht] FMC Alias Private Key: 7
3,296,578 UART: [art] Derive CDI
3,296,858 UART: [art] Store in in slot 0x4
3,382,557 UART: [art] Derive Key Pair
3,382,917 UART: [art] Store priv key in slot 0x5
3,396,721 UART: [art] Derive Key Pair - Done
3,411,544 UART: [art] Signing Cert with AUTHO
3,412,024 UART: RITY.KEYID = 7
3,427,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,017 UART: [art] PUB.X = 1D2509DB0AD754C50784B8809F0EB00FA36B2FC1ACA46D26F43E4E6B1592E2CAA9B5396F14965CE4E84AE0D0C976D58F
3,434,786 UART: [art] PUB.Y = 580188B646BB170EB68E008E5BF630AAF5E95E34DDF715AD48008035963B091728E857B3187E7B465C984C7E64351A83
3,441,677 UART: [art] SIG.R = DA3B89FF5C41CE0D174678F9E968F6A7EEAFACFEBBDB96E6DF5AC007F0B08E45228189875687779919F7CA7E0FD71F85
3,448,456 UART: [art] SIG.S = 47504BDA4D1E977EEFD7E67CCFFE6BBCDF3C26357A3971569321A62CD9823843080E6AE7F85F11FE66E258E436066648
3,472,474 UART: Caliptra RT
3,472,819 UART: [state] CFI Enabled
3,580,848 UART: [rt] RT listening for mailbox commands...
3,581,518 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,408 UART: [rt]cmd =0x44504543, len=28
3,655,125 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,978 ready_for_fw is high
1,361,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,844 >>> mbox cmd response: success
2,992,256 UART:
2,992,272 UART: Running Caliptra FMC ...
2,992,680 UART:
2,992,823 UART: [state] CFI Enabled
3,003,034 UART: [fht] FMC Alias Private Key: 7
3,111,237 UART: [art] Extend RT PCRs Done
3,111,665 UART: [art] Lock RT PCRs Done
3,113,329 UART: [art] Populate DV Done
3,121,642 UART: [fht] FMC Alias Private Key: 7
3,122,762 UART: [art] Derive CDI
3,123,042 UART: [art] Store in in slot 0x4
3,209,137 UART: [art] Derive Key Pair
3,209,497 UART: [art] Store priv key in slot 0x5
3,222,409 UART: [art] Derive Key Pair - Done
3,237,079 UART: [art] Signing Cert with AUTHO
3,237,559 UART: RITY.KEYID = 7
3,252,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,184 UART: [art] PUB.X = C530959EF247877777FB6DD3C2AF7EE7C57D35A23F777245CA758325FC62A4F2DC9D1D7B896879EBFB493450CAE70CDF
3,259,963 UART: [art] PUB.Y = A497953D6B12DEE74AED3D510233A7424914AFF12FDFC22B8AAA24A09273E6E57AF3DBC715DE07D62962BD25691A021B
3,266,916 UART: [art] SIG.R = 797CEC6236614AFB3B11C13F04AD27E6B5F5FB3BBBA740C44F0D6C68BE02563A9C160E3DD5F64589F8CFED873FD32F12
3,273,692 UART: [art] SIG.S = F0BBDAC844B24714A9EE5608D4843E02C6F77AE91D6A00DA433E51A7FC85727C4AE63E7E28315E6A219C9EF6DA2AEC91
3,296,757 UART: Caliptra RT
3,297,102 UART: [state] CFI Enabled
3,406,491 UART: [rt] RT listening for mailbox commands...
3,407,161 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,447 UART: [rt]cmd =0x44504543, len=28
3,480,858 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
893,616 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,741 UART: [kat] ++
897,893 UART: [kat] sha1
902,065 UART: [kat] SHA2-256
904,005 UART: [kat] SHA2-384
906,692 UART: [kat] SHA2-512-ACC
908,593 UART: [kat] ECC-384
918,534 UART: [kat] HMAC-384Kdf
923,100 UART: [kat] LMS
1,171,428 UART: [kat] --
1,172,099 UART: [cold-reset] ++
1,172,669 UART: [fht] FHT @ 0x50003400
1,175,502 UART: [idev] ++
1,175,670 UART: [idev] CDI.KEYID = 6
1,176,030 UART: [idev] SUBJECT.KEYID = 7
1,176,454 UART: [idev] UDS.KEYID = 0
1,176,799 ready_for_fw is high
1,176,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,060 UART: [idev] Erasing UDS.KEYID = 0
1,201,115 UART: [idev] Sha1 KeyId Algorithm
1,209,477 UART: [idev] --
1,210,641 UART: [ldev] ++
1,210,809 UART: [ldev] CDI.KEYID = 6
1,211,172 UART: [ldev] SUBJECT.KEYID = 5
1,211,598 UART: [ldev] AUTHORITY.KEYID = 7
1,212,061 UART: [ldev] FE.KEYID = 1
1,217,353 UART: [ldev] Erasing FE.KEYID = 1
1,243,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,287 UART: [ldev] --
1,282,746 UART: [fwproc] Wait for Commands...
1,283,398 UART: [fwproc] Recv command 0x46574c44
1,284,126 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,014 >>> mbox cmd response: success
2,776,044 UART: [afmc] ++
2,776,212 UART: [afmc] CDI.KEYID = 6
2,776,574 UART: [afmc] SUBJECT.KEYID = 7
2,776,999 UART: [afmc] AUTHORITY.KEYID = 5
2,812,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,151 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,755 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,371 UART: [afmc] --
2,856,277 UART: [cold-reset] --
2,857,231 UART: [state] Locking Datavault
2,858,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,038 UART: [state] Locking ICCM
2,859,604 UART: [exit] Launching FMC @ 0x40000130
2,864,933 UART:
2,864,949 UART: Running Caliptra FMC ...
2,865,357 UART:
2,865,411 UART: [state] CFI Enabled
2,875,852 UART: [fht] FMC Alias Private Key: 7
2,984,243 UART: [art] Extend RT PCRs Done
2,984,671 UART: [art] Lock RT PCRs Done
2,986,265 UART: [art] Populate DV Done
2,994,664 UART: [fht] FMC Alias Private Key: 7
2,995,626 UART: [art] Derive CDI
2,995,906 UART: [art] Store in in slot 0x4
3,081,493 UART: [art] Derive Key Pair
3,081,853 UART: [art] Store priv key in slot 0x5
3,095,111 UART: [art] Derive Key Pair - Done
3,109,690 UART: [art] Signing Cert with AUTHO
3,110,170 UART: RITY.KEYID = 7
3,124,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,561 UART: [art] PUB.X = C793CD3443E5E2DD5A0FC67E57DE3CE2C9A98EC8AA334C5E98BC40287E938216E28650510F5537D85FED440371D65E87
3,132,328 UART: [art] PUB.Y = A642C452A2208625086968FFEB136686C21B4181FA92AFBB84E7246871D5A12680D33495966BA708DF20BC23B469AFAC
3,139,270 UART: [art] SIG.R = 5E6C0D4610BB2C1A20C22F1349B32BC6C8B4B6CEE2BDF33F7436902AB8F22D9E7157FE9326293CA9A1C8174F74353D1F
3,146,047 UART: [art] SIG.S = 670671970A04F72E60E0D637CC61A23029C2F2A2E5040699F332A4FE86AC5411C7D23DB55C8214273FC20F0ED60D45E9
3,169,850 UART: Caliptra RT
3,170,103 UART: [state] CFI Enabled
3,277,350 UART: [rt] RT listening for mailbox commands...
3,278,020 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,014 UART: [rt]cmd =0x44504543, len=28
3,351,131 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,999 ready_for_fw is high
1,059,999 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,799 >>> mbox cmd response: success
2,688,013 UART:
2,688,029 UART: Running Caliptra FMC ...
2,688,437 UART:
2,688,491 UART: [state] CFI Enabled
2,699,006 UART: [fht] FMC Alias Private Key: 7
2,807,045 UART: [art] Extend RT PCRs Done
2,807,473 UART: [art] Lock RT PCRs Done
2,808,873 UART: [art] Populate DV Done
2,816,818 UART: [fht] FMC Alias Private Key: 7
2,817,878 UART: [art] Derive CDI
2,818,158 UART: [art] Store in in slot 0x4
2,903,875 UART: [art] Derive Key Pair
2,904,235 UART: [art] Store priv key in slot 0x5
2,917,361 UART: [art] Derive Key Pair - Done
2,932,357 UART: [art] Signing Cert with AUTHO
2,932,837 UART: RITY.KEYID = 7
2,948,039 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,804 UART: [art] PUB.X = 51DC6DD38EDBA4355669EDBDF7D197FB37136A76223FD9E1153C6285BDACFAC4BCB1E1706B647D034ED6208B124DEEF8
2,955,591 UART: [art] PUB.Y = 8F24A2CE8E0A0AD9E49157B659DDFAC5F58E1233073F0509624F7D515EB26B4D697AD6AAEC53C338F72ED3E40DA8CF10
2,962,539 UART: [art] SIG.R = BBAF59BE245306D00671682E5328945B5AA2FC05108476831E56987DDDFE2B41BC1A81B026B41A0E407D258F6E988B9B
2,969,299 UART: [art] SIG.S = B18CAC089698D6EDB5DAE0B38057746DC524D6C6D82DFFAAA76CECD2ED36AB9BC6566D37972595DA44AEBA1D8393E321
2,993,221 UART: Caliptra RT
2,993,474 UART: [state] CFI Enabled
3,100,114 UART: [rt] RT listening for mailbox commands...
3,100,784 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,790 UART: [rt]cmd =0x44504543, len=28
3,173,829 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
902,286 UART: [kat] SHA2-256
904,226 UART: [kat] SHA2-384
906,937 UART: [kat] SHA2-512-ACC
908,838 UART: [kat] ECC-384
918,497 UART: [kat] HMAC-384Kdf
923,241 UART: [kat] LMS
1,171,569 UART: [kat] --
1,172,230 UART: [cold-reset] ++
1,172,600 UART: [fht] FHT @ 0x50003400
1,175,293 UART: [idev] ++
1,175,461 UART: [idev] CDI.KEYID = 6
1,175,821 UART: [idev] SUBJECT.KEYID = 7
1,176,245 UART: [idev] UDS.KEYID = 0
1,176,590 ready_for_fw is high
1,176,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,135 UART: [idev] Erasing UDS.KEYID = 0
1,201,028 UART: [idev] Sha1 KeyId Algorithm
1,209,598 UART: [idev] --
1,210,588 UART: [ldev] ++
1,210,756 UART: [ldev] CDI.KEYID = 6
1,211,119 UART: [ldev] SUBJECT.KEYID = 5
1,211,545 UART: [ldev] AUTHORITY.KEYID = 7
1,212,008 UART: [ldev] FE.KEYID = 1
1,217,260 UART: [ldev] Erasing FE.KEYID = 1
1,243,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,288 UART: [ldev] --
1,282,661 UART: [fwproc] Wait for Commands...
1,283,281 UART: [fwproc] Recv command 0x46574c44
1,284,009 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,575 >>> mbox cmd response: success
2,776,661 UART: [afmc] ++
2,776,829 UART: [afmc] CDI.KEYID = 6
2,777,191 UART: [afmc] SUBJECT.KEYID = 7
2,777,616 UART: [afmc] AUTHORITY.KEYID = 5
2,812,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,752 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,480 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,365 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,084 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,102 UART: [afmc] --
2,856,172 UART: [cold-reset] --
2,856,840 UART: [state] Locking Datavault
2,857,811 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,415 UART: [state] Locking ICCM
2,858,885 UART: [exit] Launching FMC @ 0x40000130
2,864,214 UART:
2,864,230 UART: Running Caliptra FMC ...
2,864,638 UART:
2,864,781 UART: [state] CFI Enabled
2,875,594 UART: [fht] FMC Alias Private Key: 7
2,983,607 UART: [art] Extend RT PCRs Done
2,984,035 UART: [art] Lock RT PCRs Done
2,985,663 UART: [art] Populate DV Done
2,993,730 UART: [fht] FMC Alias Private Key: 7
2,994,692 UART: [art] Derive CDI
2,994,972 UART: [art] Store in in slot 0x4
3,080,397 UART: [art] Derive Key Pair
3,080,757 UART: [art] Store priv key in slot 0x5
3,093,931 UART: [art] Derive Key Pair - Done
3,108,755 UART: [art] Signing Cert with AUTHO
3,109,235 UART: RITY.KEYID = 7
3,124,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,520 UART: [art] PUB.X = D5543999FCF5C5F3C47FA9BB7A97F3EA64DC1AED38E4F6BD64C1E613518E5D4F4AF83804709915F4F6D98FFD74FE24CE
3,132,307 UART: [art] PUB.Y = 8C5A8F29A1B8829056B3B74AB33F0E06F2DDBD2C575480209E0D582C1C6D0D20DC8FED64B8CF6111B2769613A8711A50
3,139,251 UART: [art] SIG.R = BB0F4CCD2690A2F47AE4DB7CB0B563443A27AB2E5D017B59DE5A131272C6DCB6F60338D333F84F1863F5A9AAE47383BD
3,146,028 UART: [art] SIG.S = 04120F33FE62D6042B425561B0CB60E9F5426052ABDAEECE86A6F2A65DA2349CC27B8EFF65380CE79B26CFB6559253D9
3,169,913 UART: Caliptra RT
3,170,258 UART: [state] CFI Enabled
3,278,021 UART: [rt] RT listening for mailbox commands...
3,278,691 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,659 UART: [rt]cmd =0x44504543, len=28
3,352,146 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,168 ready_for_fw is high
1,060,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,502 >>> mbox cmd response: success
2,691,846 UART:
2,691,862 UART: Running Caliptra FMC ...
2,692,270 UART:
2,692,413 UART: [state] CFI Enabled
2,702,904 UART: [fht] FMC Alias Private Key: 7
2,811,077 UART: [art] Extend RT PCRs Done
2,811,505 UART: [art] Lock RT PCRs Done
2,812,987 UART: [art] Populate DV Done
2,821,424 UART: [fht] FMC Alias Private Key: 7
2,822,360 UART: [art] Derive CDI
2,822,640 UART: [art] Store in in slot 0x4
2,908,225 UART: [art] Derive Key Pair
2,908,585 UART: [art] Store priv key in slot 0x5
2,921,883 UART: [art] Derive Key Pair - Done
2,936,808 UART: [art] Signing Cert with AUTHO
2,937,288 UART: RITY.KEYID = 7
2,952,354 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,119 UART: [art] PUB.X = 85655535935D1DF938678826EF3553E82C16F15A7177C905371E2CDAB65E67AEABC368C56E55CF230F29B692F0ED2280
2,959,881 UART: [art] PUB.Y = C9A593F57F61A8E2AD964BF7786F07E859DD82AD8FFF17332AD1216542F3C3A76CFF931FC8F25839ED932372B2E71D74
2,966,836 UART: [art] SIG.R = 74A0C59F7E3EE1F6B747B4390DFBE013230BE9AF88C58001C571C44433FF39C6F84C86F744DBE917622B08A6DD8BCC7A
2,973,606 UART: [art] SIG.S = D844E40EA0DEA9102F3FBFEFB3BFC99343B46B235B3EFBF18B03865B2F69A3B96AAB15F3D06BBFE006D3ACEED0A4C473
2,996,880 UART: Caliptra RT
2,997,225 UART: [state] CFI Enabled
3,104,588 UART: [rt] RT listening for mailbox commands...
3,105,258 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,430 UART: [rt]cmd =0x44504543, len=28
3,178,695 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
915,996 UART: [kat] HMAC-384Kdf
920,542 UART: [kat] LMS
1,168,854 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,079 UART: [fht] FHT @ 0x50003400
1,172,675 UART: [idev] ++
1,172,843 UART: [idev] CDI.KEYID = 6
1,173,204 UART: [idev] SUBJECT.KEYID = 7
1,173,629 UART: [idev] UDS.KEYID = 0
1,173,975 ready_for_fw is high
1,173,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,525 UART: [idev] Erasing UDS.KEYID = 0
1,198,987 UART: [idev] Sha1 KeyId Algorithm
1,208,057 UART: [idev] --
1,209,164 UART: [ldev] ++
1,209,332 UART: [ldev] CDI.KEYID = 6
1,209,696 UART: [ldev] SUBJECT.KEYID = 5
1,210,123 UART: [ldev] AUTHORITY.KEYID = 7
1,210,586 UART: [ldev] FE.KEYID = 1
1,215,694 UART: [ldev] Erasing FE.KEYID = 1
1,241,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,012 UART: [ldev] --
1,281,482 UART: [fwproc] Wait for Commands...
1,282,055 UART: [fwproc] Recv command 0x46574c44
1,282,788 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,549 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,952 >>> mbox cmd response: success
2,776,045 UART: [afmc] ++
2,776,213 UART: [afmc] CDI.KEYID = 6
2,776,576 UART: [afmc] SUBJECT.KEYID = 7
2,777,002 UART: [afmc] AUTHORITY.KEYID = 5
2,812,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,052 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,781 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,664 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,383 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,140 UART: [afmc] --
2,856,076 UART: [cold-reset] --
2,856,860 UART: [state] Locking Datavault
2,858,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,665 UART: [state] Locking ICCM
2,859,315 UART: [exit] Launching FMC @ 0x40000130
2,864,644 UART:
2,864,660 UART: Running Caliptra FMC ...
2,865,068 UART:
2,865,122 UART: [state] CFI Enabled
2,875,871 UART: [fht] FMC Alias Private Key: 7
2,983,864 UART: [art] Extend RT PCRs Done
2,984,292 UART: [art] Lock RT PCRs Done
2,986,042 UART: [art] Populate DV Done
2,994,125 UART: [fht] FMC Alias Private Key: 7
2,995,079 UART: [art] Derive CDI
2,995,359 UART: [art] Store in in slot 0x4
3,081,520 UART: [art] Derive Key Pair
3,081,880 UART: [art] Store priv key in slot 0x5
3,095,036 UART: [art] Derive Key Pair - Done
3,109,955 UART: [art] Signing Cert with AUTHO
3,110,435 UART: RITY.KEYID = 7
3,125,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,574 UART: [art] PUB.X = 1CCB957D83DA2DC9C8636DB0126B84169152E80AFC35716F0A807AFE36C8A3CD61472967972E41202900E70A8D267FA9
3,133,313 UART: [art] PUB.Y = 3A9147A8E8B1809789161FE7C295350B5055DEA793F96573773E27A13C22122794B57088D60B5AEE7A300F8C8BA31E32
3,140,246 UART: [art] SIG.R = B1FD54651B8C0E348574EC9403EA29D01539BE9DE97649A2FBFF74D45BCE492D5171A428E41BBACCF4C1B0B9BB895CCA
3,147,030 UART: [art] SIG.S = 936F0E61E730838ECDA27714447B17FDA40F91E643962C9EF617B50CF6590F5F2F31C02B274E4ECFF62449260730E5CE
3,171,520 UART: Caliptra RT
3,171,773 UART: [state] CFI Enabled
3,279,633 UART: [rt] RT listening for mailbox commands...
3,280,303 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,419 UART: [rt]cmd =0x44504543, len=28
3,353,844 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,600 ready_for_fw is high
1,055,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,040 >>> mbox cmd response: success
2,684,402 UART:
2,684,418 UART: Running Caliptra FMC ...
2,684,826 UART:
2,684,880 UART: [state] CFI Enabled
2,695,003 UART: [fht] FMC Alias Private Key: 7
2,802,820 UART: [art] Extend RT PCRs Done
2,803,248 UART: [art] Lock RT PCRs Done
2,804,836 UART: [art] Populate DV Done
2,813,095 UART: [fht] FMC Alias Private Key: 7
2,814,151 UART: [art] Derive CDI
2,814,431 UART: [art] Store in in slot 0x4
2,899,594 UART: [art] Derive Key Pair
2,899,954 UART: [art] Store priv key in slot 0x5
2,913,180 UART: [art] Derive Key Pair - Done
2,927,844 UART: [art] Signing Cert with AUTHO
2,928,324 UART: RITY.KEYID = 7
2,943,592 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,357 UART: [art] PUB.X = BEB7CF0BBF7CF4F9AED5C77873E241360BA530CF401713F19A98356BA4B6064E1A3578F9EFDFA386FFC43AEA2ADC0D46
2,951,139 UART: [art] PUB.Y = 741A9AC3A41CE5C564C33D40AFBBA2BFBDF78769AA41457847A346DEFD444300991F2476CB90CC04FA24906DE335C98D
2,958,076 UART: [art] SIG.R = 513452FBDF4EE37D3F082AA9133AD10A7C393305E32ED2E4348B9D4C3ED3B0C640A84822EBA4A0A862D38A7FCB2E9C7B
2,964,853 UART: [art] SIG.S = A8A7B4A6808C01CBD6B1986E544FB0EFA1219D3725FDCC21C60CD96EDE28EFA9083C706B551975FCC3483920C5A8CD5E
2,988,651 UART: Caliptra RT
2,988,904 UART: [state] CFI Enabled
3,097,327 UART: [rt] RT listening for mailbox commands...
3,097,997 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,173 UART: [rt]cmd =0x44504543, len=28
3,171,312 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,292 UART: [kat] SHA2-256
902,232 UART: [kat] SHA2-384
905,149 UART: [kat] SHA2-512-ACC
907,050 UART: [kat] ECC-384
916,527 UART: [kat] HMAC-384Kdf
921,153 UART: [kat] LMS
1,169,465 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,171,006 UART: [fht] FHT @ 0x50003400
1,173,624 UART: [idev] ++
1,173,792 UART: [idev] CDI.KEYID = 6
1,174,153 UART: [idev] SUBJECT.KEYID = 7
1,174,578 UART: [idev] UDS.KEYID = 0
1,174,924 ready_for_fw is high
1,174,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,199,980 UART: [idev] Sha1 KeyId Algorithm
1,208,852 UART: [idev] --
1,209,849 UART: [ldev] ++
1,210,017 UART: [ldev] CDI.KEYID = 6
1,210,381 UART: [ldev] SUBJECT.KEYID = 5
1,210,808 UART: [ldev] AUTHORITY.KEYID = 7
1,211,271 UART: [ldev] FE.KEYID = 1
1,216,347 UART: [ldev] Erasing FE.KEYID = 1
1,242,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,193 UART: [fwproc] Wait for Commands...
1,282,970 UART: [fwproc] Recv command 0x46574c44
1,283,703 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,563 >>> mbox cmd response: success
2,775,774 UART: [afmc] ++
2,775,942 UART: [afmc] CDI.KEYID = 6
2,776,305 UART: [afmc] SUBJECT.KEYID = 7
2,776,731 UART: [afmc] AUTHORITY.KEYID = 5
2,812,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,891 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,027 UART: [afmc] --
2,856,081 UART: [cold-reset] --
2,857,117 UART: [state] Locking Datavault
2,858,208 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,812 UART: [state] Locking ICCM
2,859,332 UART: [exit] Launching FMC @ 0x40000130
2,864,661 UART:
2,864,677 UART: Running Caliptra FMC ...
2,865,085 UART:
2,865,228 UART: [state] CFI Enabled
2,875,623 UART: [fht] FMC Alias Private Key: 7
2,983,768 UART: [art] Extend RT PCRs Done
2,984,196 UART: [art] Lock RT PCRs Done
2,985,652 UART: [art] Populate DV Done
2,994,073 UART: [fht] FMC Alias Private Key: 7
2,995,065 UART: [art] Derive CDI
2,995,345 UART: [art] Store in in slot 0x4
3,081,048 UART: [art] Derive Key Pair
3,081,408 UART: [art] Store priv key in slot 0x5
3,094,422 UART: [art] Derive Key Pair - Done
3,109,688 UART: [art] Signing Cert with AUTHO
3,110,168 UART: RITY.KEYID = 7
3,125,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,265 UART: [art] PUB.X = 41DC7E10A1719915BF896AE98D224F618EA8EA8EC0FA080591101D7A7BB1DC14B375AB3106D88678BC645A3529145F94
3,133,028 UART: [art] PUB.Y = F1B1C0FAE3A4FEE5B13477387FF497C183D91CE6BF77A2D76E29402D57846F368E0BD6E5AA119781F8FAE9033063DA79
3,139,982 UART: [art] SIG.R = AF3F35F17777B2FB940029E6EC20B80B930839CE70D503D3DB5711BA8BCB94430F2A955F9ECC7A8CAB51FE50808F7C64
3,146,730 UART: [art] SIG.S = 5686AC14DAC7BADA7D3739EB9BB504FB7E070D0EB551EAEB516C4B4DEF7B93C6CDDF9129B3FBCE3A1B9BC7E5048471DE
3,170,780 UART: Caliptra RT
3,171,125 UART: [state] CFI Enabled
3,278,734 UART: [rt] RT listening for mailbox commands...
3,279,404 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,466 UART: [rt]cmd =0x44504543, len=28
3,352,797 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,577 ready_for_fw is high
1,056,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,391 >>> mbox cmd response: success
2,687,521 UART:
2,687,537 UART: Running Caliptra FMC ...
2,687,945 UART:
2,688,088 UART: [state] CFI Enabled
2,698,933 UART: [fht] FMC Alias Private Key: 7
2,807,188 UART: [art] Extend RT PCRs Done
2,807,616 UART: [art] Lock RT PCRs Done
2,809,154 UART: [art] Populate DV Done
2,817,377 UART: [fht] FMC Alias Private Key: 7
2,818,531 UART: [art] Derive CDI
2,818,811 UART: [art] Store in in slot 0x4
2,904,582 UART: [art] Derive Key Pair
2,904,942 UART: [art] Store priv key in slot 0x5
2,917,894 UART: [art] Derive Key Pair - Done
2,932,532 UART: [art] Signing Cert with AUTHO
2,933,012 UART: RITY.KEYID = 7
2,948,246 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,011 UART: [art] PUB.X = C3B1A6DA95AF5BC9A5C2EF9378C114B211C872214B131208BCD05F74AC9B33134276AA808930E65328E245A1E6B31596
2,955,778 UART: [art] PUB.Y = 3E99533D76B0EF05BDC499D9D9724AA82CF354689F2E424ADBD5700119736E93EBE5199A940D841FF22D6C770D7263B4
2,962,718 UART: [art] SIG.R = 0B6B6257539A508E49424178D5C7B2CD91C438A51BE548CFEEACD0EE9D35AAED63B83E4F019B15C5A46670775663B393
2,969,488 UART: [art] SIG.S = 595236358F0B280696B6DAAFA064A3DAB765A805A6E59B05A8D8CEE1FCBA8024F5575DDEF6F4401DF2AAE27BFD67E7FC
2,993,521 UART: Caliptra RT
2,993,866 UART: [state] CFI Enabled
3,102,685 UART: [rt] RT listening for mailbox commands...
3,103,355 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,293 UART: [rt]cmd =0x44504543, len=28
3,176,314 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,176 UART:
192,542 UART: Running Caliptra ROM ...
193,843 UART:
194,002 UART: [state] CFI Enabled
259,902 UART: [state] LifecycleState = Unprovisioned
261,817 UART: [state] DebugLocked = No
264,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,209 UART: [kat] SHA2-256
439,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,388 UART: [kat] ++
450,875 UART: [kat] sha1
462,389 UART: [kat] SHA2-256
465,120 UART: [kat] SHA2-384
470,400 UART: [kat] SHA2-512-ACC
472,765 UART: [kat] ECC-384
2,767,270 UART: [kat] HMAC-384Kdf
2,780,271 UART: [kat] LMS
3,970,589 UART: [kat] --
3,974,506 UART: [cold-reset] ++
3,976,022 UART: [fht] Storing FHT @ 0x50003400
3,988,362 UART: [idev] ++
3,988,929 UART: [idev] CDI.KEYID = 6
3,989,813 UART: [idev] SUBJECT.KEYID = 7
3,991,128 UART: [idev] UDS.KEYID = 0
3,992,160 ready_for_fw is high
3,992,375 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,975 UART: [idev] Erasing UDS.KEYID = 0
7,328,714 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,982 UART: [idev] --
7,355,102 UART: [ldev] ++
7,355,734 UART: [ldev] CDI.KEYID = 6
7,356,627 UART: [ldev] SUBJECT.KEYID = 5
7,357,911 UART: [ldev] AUTHORITY.KEYID = 7
7,359,146 UART: [ldev] FE.KEYID = 1
7,402,214 UART: [ldev] Erasing FE.KEYID = 1
10,731,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,110 UART: [ldev] --
13,092,523 UART: [fwproc] Waiting for Commands...
13,094,896 UART: [fwproc] Received command 0x46574c44
13,097,088 UART: [fwproc] Received Image of size 114124 bytes
17,144,171 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,221,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,290,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,607,679 >>> mbox cmd response: success
17,611,748 UART: [afmc] ++
17,612,357 UART: [afmc] CDI.KEYID = 6
17,613,276 UART: [afmc] SUBJECT.KEYID = 7
17,614,547 UART: [afmc] AUTHORITY.KEYID = 5
20,981,733 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,609 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,863 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,282 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,122 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,566 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,207 UART: [afmc] --
23,357,133 UART: [cold-reset] --
23,361,220 UART: [state] Locking Datavault
23,367,061 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,824 UART: [state] Locking ICCM
23,370,055 UART: [exit] Launching FMC @ 0x40000130
23,378,473 UART:
23,378,718 UART: Running Caliptra FMC ...
23,379,819 UART:
23,379,978 UART: [state] CFI Enabled
23,448,259 UART: [fht] FMC Alias Private Key: 7
25,785,959 UART: [art] Extend RT PCRs Done
25,787,184 UART: [art] Lock RT PCRs Done
25,788,782 UART: [art] Populate DV Done
25,794,029 UART: [fht] FMC Alias Private Key: 7
25,795,737 UART: [art] Derive CDI
25,796,553 UART: [art] Store in in slot 0x4
25,857,161 UART: [art] Derive Key Pair
25,858,207 UART: [art] Store priv key in slot 0x5
29,150,891 UART: [art] Derive Key Pair - Done
29,163,770 UART: [art] Signing Cert with AUTHO
29,165,102 UART: RITY.KEYID = 7
31,452,536 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,038 UART: [art] PUB.X = B76AA19337A4AC3E6E8B6010C1E194C047E4A7B92F7E8B50026741E3A53DB9B9AC1F3D69F7A49F71719F66480FE93203
31,461,236 UART: [art] PUB.Y = F8B16E62D336032C893FDF64A9A8B00FF06D15CD20D5CFC04744F3BB1D38298F9A689EF4484385F0877D5798E5131921
31,468,517 UART: [art] SIG.R = 4A9ABA24E4A2CF4843AA645697E79740E6C8FCB79336C68B78DEF09EF1321B7F40401D135FA0DF1A85E27DCFACAA346B
31,475,914 UART: [art] SIG.S = 8658A2C57972EB0150A99AEB1A22AC18BC35B6906DD9BBCE3991B1F49E25F0E55763FBFD998B7C46B68D2E31F19EB128
32,781,186 UART: Caliptra RT
32,781,899 UART: [state] CFI Enabled
32,941,763 UART: [rt] RT listening for mailbox commands...
32,943,685 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
32,973,820 UART: [rt]cmd =0x44504543, len=20
32,994,295 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,783,659 ready_for_fw is high
3,784,268 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,855,878 >>> mbox cmd response: success
23,544,752 UART:
23,545,137 UART: Running Caliptra FMC ...
23,546,276 UART:
23,546,443 UART: [state] CFI Enabled
23,615,512 UART: [fht] FMC Alias Private Key: 7
25,953,564 UART: [art] Extend RT PCRs Done
25,954,794 UART: [art] Lock RT PCRs Done
25,956,455 UART: [art] Populate DV Done
25,961,925 UART: [fht] FMC Alias Private Key: 7
25,963,571 UART: [art] Derive CDI
25,964,313 UART: [art] Store in in slot 0x4
26,023,518 UART: [art] Derive Key Pair
26,024,567 UART: [art] Store priv key in slot 0x5
29,317,328 UART: [art] Derive Key Pair - Done
29,330,114 UART: [art] Signing Cert with AUTHO
29,331,448 UART: RITY.KEYID = 7
31,618,240 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,749 UART: [art] PUB.X = 7266648756A809077865414CC2FCD2A7DF7B14FC37DDC5FEF180BFE6D41F90272F9FB6AB0D80FA7BE14B183D6434E81D
31,627,021 UART: [art] PUB.Y = 2EDEC3B6E19E503514D2CEDB26F0629F6B7A5D77F8759E1B81591288D3752611E5874DDE73F7590E02927D0ED7C65EA8
31,634,282 UART: [art] SIG.R = 21C422F1A0CE4E17B59A285047E2038A87C4D1D8BA8132FE5902B5AD8DF2DBDFA23EE17BD9669809ADAA71D754758884
31,641,668 UART: [art] SIG.S = 5DA0A673FB5E4DB1C63D5397DC1AB1B8170E218701E35FF6E9657D65F830E86B6565FFC5E453CFC106C6502AD49C4CC9
32,947,162 UART: Caliptra RT
32,947,859 UART: [state] CFI Enabled
33,128,955 UART: [rt] RT listening for mailbox commands...
33,130,893 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,160,971 UART: [rt]cmd =0x44504543, len=20
33,181,195 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,220 writing to cptra_bootfsm_go
193,456 UART:
193,829 UART: Running Caliptra ROM ...
194,928 UART:
604,444 UART: [state] CFI Enabled
621,157 UART: [state] LifecycleState = Unprovisioned
623,103 UART: [state] DebugLocked = No
625,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,071 UART: [kat] SHA2-256
800,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,384 UART: [kat] ++
811,917 UART: [kat] sha1
822,363 UART: [kat] SHA2-256
825,078 UART: [kat] SHA2-384
830,993 UART: [kat] SHA2-512-ACC
833,354 UART: [kat] ECC-384
3,117,153 UART: [kat] HMAC-384Kdf
3,129,213 UART: [kat] LMS
4,319,316 UART: [kat] --
4,325,121 UART: [cold-reset] ++
4,327,734 UART: [fht] Storing FHT @ 0x50003400
4,338,298 UART: [idev] ++
4,338,858 UART: [idev] CDI.KEYID = 6
4,339,828 UART: [idev] SUBJECT.KEYID = 7
4,341,067 UART: [idev] UDS.KEYID = 0
4,342,049 ready_for_fw is high
4,342,256 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,664 UART: [idev] Erasing UDS.KEYID = 0
7,630,226 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,649 UART: [idev] --
7,655,310 UART: [ldev] ++
7,655,922 UART: [ldev] CDI.KEYID = 6
7,656,853 UART: [ldev] SUBJECT.KEYID = 5
7,658,053 UART: [ldev] AUTHORITY.KEYID = 7
7,659,330 UART: [ldev] FE.KEYID = 1
7,671,080 UART: [ldev] Erasing FE.KEYID = 1
10,961,737 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,942 UART: [ldev] --
13,323,980 UART: [fwproc] Waiting for Commands...
13,326,180 UART: [fwproc] Received command 0x46574c44
13,328,356 UART: [fwproc] Received Image of size 114124 bytes
17,375,145 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,841,075 >>> mbox cmd response: success
17,844,514 UART: [afmc] ++
17,845,126 UART: [afmc] CDI.KEYID = 6
17,846,004 UART: [afmc] SUBJECT.KEYID = 7
17,847,274 UART: [afmc] AUTHORITY.KEYID = 5
21,161,895 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,719 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,998 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,401 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,219 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,652 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,100 UART: [afmc] --
23,523,600 UART: [cold-reset] --
23,527,344 UART: [state] Locking Datavault
23,531,901 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,601 UART: [state] Locking ICCM
23,535,212 UART: [exit] Launching FMC @ 0x40000130
23,543,616 UART:
23,543,850 UART: Running Caliptra FMC ...
23,544,949 UART:
23,545,100 UART: [state] CFI Enabled
23,553,143 UART: [fht] FMC Alias Private Key: 7
25,883,828 UART: [art] Extend RT PCRs Done
25,885,059 UART: [art] Lock RT PCRs Done
25,886,870 UART: [art] Populate DV Done
25,892,329 UART: [fht] FMC Alias Private Key: 7
25,893,967 UART: [art] Derive CDI
25,894,775 UART: [art] Store in in slot 0x4
25,937,369 UART: [art] Derive Key Pair
25,938,404 UART: [art] Store priv key in slot 0x5
29,180,406 UART: [art] Derive Key Pair - Done
29,193,341 UART: [art] Signing Cert with AUTHO
29,194,642 UART: RITY.KEYID = 7
31,474,025 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,540 UART: [art] PUB.X = 28B7ACE81C70251E910EBFC9D8C7258878633E89F33F0658F47C157479F806EC5ECD970A0A5C0EDD95459F208CBCC0D7
31,482,767 UART: [art] PUB.Y = 67ADD1C4AF73608C50D3A7312958FB8ADFC5D578A5253F74BD1B92A2D188646AAD95569C221CF7BC5093F9D2664B6C71
31,490,041 UART: [art] SIG.R = CBEE37CF4591B4F5C13F1CEC75D7FEBB97615C62D464E51BFEC4C3E01B9D483C34B4B1155EFBE8531DE6ADA29AAF7544
31,497,474 UART: [art] SIG.S = 003AA3C5BA78B9CEFCDA82DEC2ED29B7C58FFD2EB2BFBEF7A0AEEF30B18D8CC78C38605EB81EDC4E7177DC25BDF53A83
32,802,645 UART: Caliptra RT
32,803,540 UART: [state] CFI Enabled
32,920,608 UART: [rt] RT listening for mailbox commands...
32,922,522 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
32,952,212 UART: [rt]cmd =0x44504543, len=20
32,972,356 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
4,126,682 ready_for_fw is high
4,127,097 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,061,827 >>> mbox cmd response: success
23,706,191 UART:
23,706,579 UART: Running Caliptra FMC ...
23,707,691 UART:
23,707,839 UART: [state] CFI Enabled
23,716,116 UART: [fht] FMC Alias Private Key: 7
26,046,762 UART: [art] Extend RT PCRs Done
26,047,986 UART: [art] Lock RT PCRs Done
26,049,336 UART: [art] Populate DV Done
26,054,597 UART: [fht] FMC Alias Private Key: 7
26,056,124 UART: [art] Derive CDI
26,056,893 UART: [art] Store in in slot 0x4
26,099,112 UART: [art] Derive Key Pair
26,100,118 UART: [art] Store priv key in slot 0x5
29,341,949 UART: [art] Derive Key Pair - Done
29,355,396 UART: [art] Signing Cert with AUTHO
29,356,702 UART: RITY.KEYID = 7
31,636,158 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,674 UART: [art] PUB.X = 871D006430ECAD5D4DC09FF25033B12824EA5433069DB38FC3473E126F1E5B27788496D410A3BEA30F7BB39074818B56
31,644,855 UART: [art] PUB.Y = 8D18C316AA4EDA0F51CCAABA0E77A88AC0A1ED1905F7E3ABD8DFC18EBFF281034DA09845D046448499FCE04BC5943290
31,652,119 UART: [art] SIG.R = B6DF0D67E4420401CF8D6D37D1732FBBE5A60FD63E4BA4E107DFE77060CFD858E905DDA6B72B333E9012E71AEAE75EE5
31,659,590 UART: [art] SIG.S = 7367831B45A9CF990473DA4CE0041DBAAB27A5EC1BC2835D2DB9513B288BF94038584223F02107B211EE6F54C2D94B22
32,965,062 UART: Caliptra RT
32,965,780 UART: [state] CFI Enabled
33,082,353 UART: [rt] RT listening for mailbox commands...
33,084,274 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,114,245 UART: [rt]cmd =0x44504543, len=20
33,134,469 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,088 UART:
192,452 UART: Running Caliptra ROM ...
193,643 UART:
193,796 UART: [state] CFI Enabled
266,602 UART: [state] LifecycleState = Unprovisioned
268,519 UART: [state] DebugLocked = No
271,049 UART: [state] WD Timer not started. Device not locked for debugging
275,442 UART: [kat] SHA2-256
454,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,191 UART: [kat] ++
466,641 UART: [kat] sha1
479,175 UART: [kat] SHA2-256
482,002 UART: [kat] SHA2-384
487,719 UART: [kat] SHA2-512-ACC
490,661 UART: [kat] ECC-384
2,947,203 UART: [kat] HMAC-384Kdf
2,963,214 UART: [kat] LMS
3,492,671 UART: [kat] --
3,495,529 UART: [cold-reset] ++
3,496,680 UART: [fht] FHT @ 0x50003400
3,506,232 UART: [idev] ++
3,506,800 UART: [idev] CDI.KEYID = 6
3,507,728 UART: [idev] SUBJECT.KEYID = 7
3,508,902 UART: [idev] UDS.KEYID = 0
3,509,825 ready_for_fw is high
3,510,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,653,961 UART: [idev] Erasing UDS.KEYID = 0
6,017,223 UART: [idev] Sha1 KeyId Algorithm
6,038,729 UART: [idev] --
6,041,471 UART: [ldev] ++
6,042,043 UART: [ldev] CDI.KEYID = 6
6,042,977 UART: [ldev] SUBJECT.KEYID = 5
6,044,149 UART: [ldev] AUTHORITY.KEYID = 7
6,045,387 UART: [ldev] FE.KEYID = 1
6,092,008 UART: [ldev] Erasing FE.KEYID = 1
8,597,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,729 UART: [ldev] --
10,406,680 UART: [fwproc] Wait for Commands...
10,408,999 UART: [fwproc] Recv command 0x46574c44
10,411,092 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,513 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,271,543 >>> mbox cmd response: success
14,275,497 UART: [afmc] ++
14,276,092 UART: [afmc] CDI.KEYID = 6
14,276,983 UART: [afmc] SUBJECT.KEYID = 7
14,278,090 UART: [afmc] AUTHORITY.KEYID = 5
16,817,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,542,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,543,970 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,559,947 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,575,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,591,639 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,613,072 UART: [afmc] --
18,616,176 UART: [cold-reset] --
18,619,981 UART: [state] Locking Datavault
18,624,306 UART: [state] Locking PCR0, PCR1 and PCR31
18,626,002 UART: [state] Locking ICCM
18,627,205 UART: [exit] Launching FMC @ 0x40000130
18,635,602 UART:
18,635,833 UART: Running Caliptra FMC ...
18,636,931 UART:
18,637,089 UART: [state] CFI Enabled
18,699,969 UART: [fht] FMC Alias Private Key: 7
20,464,113 UART: [art] Extend RT PCRs Done
20,465,330 UART: [art] Lock RT PCRs Done
20,467,277 UART: [art] Populate DV Done
20,472,793 UART: [fht] FMC Alias Private Key: 7
20,474,499 UART: [art] Derive CDI
20,475,311 UART: [art] Store in in slot 0x4
20,533,050 UART: [art] Derive Key Pair
20,534,424 UART: [art] Store priv key in slot 0x5
22,999,740 UART: [art] Derive Key Pair - Done
23,012,950 UART: [art] Signing Cert with AUTHO
23,014,279 UART: RITY.KEYID = 7
24,725,429 UART: [art] Erasing AUTHORITY.KEYID = 7
24,726,909 UART: [art] PUB.X = B3EA55BEF847B2730471B77797578FB61EA6762FD15B591018410E1B156BE269353E92A7A71F07A9B2E3BAB10BCF1631
24,734,230 UART: [art] PUB.Y = 305188197A15A3EB0623999C41A7DF9B575B7752A8DB21DFB68427E41F55F337C4CC213E49CCDE1FC367EABC37B6119E
24,741,472 UART: [art] SIG.R = 0F2AE6BA92D8F3A2667EA141CD2313727583242DDFB61309F726E25D93F321B7A4F03D31869D83566E9C71FF0E8216C9
24,748,821 UART: [art] SIG.S = CE5221FC629AC62C87F184E1859CB9FA28A8EBF3423EE80B244509024EF7AC32DA931D74DE733F70C75DB51BF529F8F5
25,728,219 UART: Caliptra RT
25,728,928 UART: [state] CFI Enabled
25,893,774 UART: [rt] RT listening for mailbox commands...
25,895,703 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,926,078 UART: [rt]cmd =0x44504543, len=20
25,946,378 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,357,069 ready_for_fw is high
3,357,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,039,211 >>> mbox cmd response: success
18,323,360 UART:
18,323,751 UART: Running Caliptra FMC ...
18,324,951 UART:
18,325,140 UART: [state] CFI Enabled
18,388,880 UART: [fht] FMC Alias Private Key: 7
20,152,866 UART: [art] Extend RT PCRs Done
20,154,094 UART: [art] Lock RT PCRs Done
20,155,673 UART: [art] Populate DV Done
20,161,144 UART: [fht] FMC Alias Private Key: 7
20,162,630 UART: [art] Derive CDI
20,163,393 UART: [art] Store in in slot 0x4
20,221,935 UART: [art] Derive Key Pair
20,222,967 UART: [art] Store priv key in slot 0x5
22,686,222 UART: [art] Derive Key Pair - Done
22,699,226 UART: [art] Signing Cert with AUTHO
22,700,530 UART: RITY.KEYID = 7
24,411,927 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,439 UART: [art] PUB.X = 5C25F9D0719DF8564E8F7A9CB122DD431B00ACB47CE1C1BB1E4196DC9BC5954CE507CA322D44ECCA94709399857E1752
24,420,689 UART: [art] PUB.Y = 42A04A3C98C8B0C2BA33E52BC87F0E694BB52AEAF732C703C02E890933B3041A6015EDB16050F6F9A9F905A230663397
24,427,966 UART: [art] SIG.R = B318198D2E8EF76F8DE8C1BBC4160127244D7B5130891A54966499C35F30C06B3E72471701D5A91758E2AB4D7EAB79D2
24,435,366 UART: [art] SIG.S = 215543774AC59581D165A30375E78708DE9C455FFF0E42DFF5E2B27FC9B5161A9C24A80FD77BFDFE0811B1092C1493BB
25,414,540 UART: Caliptra RT
25,415,245 UART: [state] CFI Enabled
25,579,933 UART: [rt] RT listening for mailbox commands...
25,581,845 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,612,260 UART: [rt]cmd =0x44504543, len=20
25,632,731 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,404 UART:
192,771 UART: Running Caliptra ROM ...
193,960 UART:
603,600 UART: [state] CFI Enabled
619,335 UART: [state] LifecycleState = Unprovisioned
621,219 UART: [state] DebugLocked = No
624,161 UART: [state] WD Timer not started. Device not locked for debugging
627,070 UART: [kat] SHA2-256
806,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,719 UART: [kat] ++
818,245 UART: [kat] sha1
829,898 UART: [kat] SHA2-256
832,899 UART: [kat] SHA2-384
838,166 UART: [kat] SHA2-512-ACC
841,091 UART: [kat] ECC-384
3,283,766 UART: [kat] HMAC-384Kdf
3,297,033 UART: [kat] LMS
3,826,516 UART: [kat] --
3,832,534 UART: [cold-reset] ++
3,834,208 UART: [fht] FHT @ 0x50003400
3,846,041 UART: [idev] ++
3,846,607 UART: [idev] CDI.KEYID = 6
3,847,482 UART: [idev] SUBJECT.KEYID = 7
3,848,736 UART: [idev] UDS.KEYID = 0
3,849,665 ready_for_fw is high
3,849,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,659 UART: [idev] Erasing UDS.KEYID = 0
6,320,419 UART: [idev] Sha1 KeyId Algorithm
6,344,772 UART: [idev] --
6,349,996 UART: [ldev] ++
6,350,556 UART: [ldev] CDI.KEYID = 6
6,351,457 UART: [ldev] SUBJECT.KEYID = 5
6,352,658 UART: [ldev] AUTHORITY.KEYID = 7
6,353,882 UART: [ldev] FE.KEYID = 1
6,364,733 UART: [ldev] Erasing FE.KEYID = 1
8,840,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,320 UART: [ldev] --
10,630,998 UART: [fwproc] Wait for Commands...
10,632,744 UART: [fwproc] Recv command 0x46574c44
10,634,841 UART: [fwproc] Recv'd Img size: 114448 bytes
14,042,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,116,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,185,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,504,122 >>> mbox cmd response: success
14,509,003 UART: [afmc] ++
14,509,592 UART: [afmc] CDI.KEYID = 6
14,510,469 UART: [afmc] SUBJECT.KEYID = 7
14,511,678 UART: [afmc] AUTHORITY.KEYID = 5
17,007,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,746,175 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,070 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,635 UART: [afmc] --
18,804,030 UART: [cold-reset] --
18,809,130 UART: [state] Locking Datavault
18,814,047 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,687 UART: [state] Locking ICCM
18,817,077 UART: [exit] Launching FMC @ 0x40000130
18,825,470 UART:
18,825,702 UART: Running Caliptra FMC ...
18,826,797 UART:
18,826,954 UART: [state] CFI Enabled
18,834,990 UART: [fht] FMC Alias Private Key: 7
20,591,862 UART: [art] Extend RT PCRs Done
20,593,082 UART: [art] Lock RT PCRs Done
20,594,837 UART: [art] Populate DV Done
20,600,191 UART: [fht] FMC Alias Private Key: 7
20,601,720 UART: [art] Derive CDI
20,602,525 UART: [art] Store in in slot 0x4
20,645,064 UART: [art] Derive Key Pair
20,646,102 UART: [art] Store priv key in slot 0x5
23,072,941 UART: [art] Derive Key Pair - Done
23,085,837 UART: [art] Signing Cert with AUTHO
23,087,147 UART: RITY.KEYID = 7
24,792,608 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,113 UART: [art] PUB.X = EE655E82972BE7BEA98D6CB3D7879F5DE44225BCD41FD1A1E3C686BF6DD1A2F3296F3EC17C30B31A4E08117E1268E27F
24,801,401 UART: [art] PUB.Y = F23E568366D644AF66C8D9B782A5AA49F64B575C1E43006BC31FDD1D414706B951F4D30A53B0354AB06F197CBC79CA4A
24,808,664 UART: [art] SIG.R = 05E1F1EE2143E3E0F339D890E2CA49AADE1ABDA980549234BB284BD09B57C0726AF3D3D674E26DCFAA6C08FC65DF04F5
24,816,035 UART: [art] SIG.S = A6205B699ED8FB6FB8314A57178115FAEC37733E99408E1AC68A3B30371F7DECAB3203FF86955504721957A0D6EFA435
25,794,944 UART: Caliptra RT
25,795,629 UART: [state] CFI Enabled
25,912,453 UART: [rt] RT listening for mailbox commands...
25,914,360 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,944,257 UART: [rt]cmd =0x44504543, len=20
25,964,444 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,699,071 ready_for_fw is high
3,699,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,232 >>> mbox cmd response: success
18,537,871 UART:
18,538,273 UART: Running Caliptra FMC ...
18,539,369 UART:
18,539,516 UART: [state] CFI Enabled
18,547,741 UART: [fht] FMC Alias Private Key: 7
20,304,655 UART: [art] Extend RT PCRs Done
20,305,880 UART: [art] Lock RT PCRs Done
20,307,421 UART: [art] Populate DV Done
20,312,826 UART: [fht] FMC Alias Private Key: 7
20,314,475 UART: [art] Derive CDI
20,315,206 UART: [art] Store in in slot 0x4
20,357,953 UART: [art] Derive Key Pair
20,358,948 UART: [art] Store priv key in slot 0x5
22,786,114 UART: [art] Derive Key Pair - Done
22,799,222 UART: [art] Signing Cert with AUTHO
22,800,537 UART: RITY.KEYID = 7
24,506,188 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,696 UART: [art] PUB.X = F0072BC9C7510AE37E65C91AA4F13B28BDB57C461808D453E57C0722F19B797D5C072D0917AA9C7453ED6953D2EB35AC
24,514,982 UART: [art] PUB.Y = DF81B8E3B1F8784E7E7967FC18399E06978C538DEF84B89FCACECF5F77405064F723E7ADD76EECE313477DEDD91F3AE4
24,522,264 UART: [art] SIG.R = 1D96126052867BAFE12DB4B7698262C6037BBEE321A752462EEACF9509FA472FC991F4D66AABF9DBBCE302014D581350
24,529,652 UART: [art] SIG.S = AD3843DDB83CB900A0FCB120E61E1BE3CF80ED617D0C0B54C0946C8988DC93312CFAA0ADA9A91F7F4E365A3FBC402729
25,508,788 UART: Caliptra RT
25,509,498 UART: [state] CFI Enabled
25,626,342 UART: [rt] RT listening for mailbox commands...
25,628,244 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,658,150 UART: [rt]cmd =0x44504543, len=20
25,678,432 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,438,848 ready_for_fw is high
3,439,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,744,011 >>> mbox cmd response: success
19,023,378 UART:
19,023,793 UART: Running Caliptra FMC ...
19,024,957 UART:
19,025,117 UART: [state] CFI Enabled
19,094,052 UART: [fht] FMC Alias Private Key: 7
20,857,817 UART: [art] Extend RT PCRs Done
20,859,020 UART: [art] Lock RT PCRs Done
20,860,701 UART: [art] Populate DV Done
20,866,073 UART: [fht] FMC Alias Private Key: 7
20,867,619 UART: [art] Derive CDI
20,868,435 UART: [art] Store in in slot 0x4
20,927,316 UART: [art] Derive Key Pair
20,928,352 UART: [art] Store priv key in slot 0x5
23,391,553 UART: [art] Derive Key Pair - Done
23,404,609 UART: [art] Signing Cert with AUTHO
23,405,941 UART: RITY.KEYID = 7
25,117,549 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,042 UART: [art] PUB.X = 847DB6F0569DF0302ACE0A5F6455FB961AB5D5A40BF1D043820BF03A1229694A9F2CA5FDA3276DACCE78A44F5CE79B2A
25,126,345 UART: [art] PUB.Y = 29B506F8CF73F7FC3F475A5C5ADCE1D4D6BAC4D28C902A473A5FCB4DB20307FFA269E13009A60C0CA6698CD6A4464D8B
25,133,644 UART: [art] SIG.R = 04E83973389C6E05926435DA9D0A58CCBE39D4370445DF1992DED2E6C1A4A21ABD430879C6393DABC6945CC5A63399FF
25,141,031 UART: [art] SIG.S = C481F65B1F930A3963DD399794D76B0F3820C9830F80F8AC69D047192632D9D1E3420BDF9D67B7C93C923FF30D0B29E5
26,119,536 UART: Caliptra RT
26,120,249 UART: [state] CFI Enabled
26,285,328 UART: [rt] RT listening for mailbox commands...
26,287,264 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,317,668 UART: [rt]cmd =0x44504543, len=20
26,337,840 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,759,195 ready_for_fw is high
3,759,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,522 >>> mbox cmd response: success
19,218,924 UART:
19,219,716 UART: Running Caliptra FMC ...
19,220,842 UART:
19,220,988 UART: [state] CFI Enabled
19,228,672 UART: [fht] FMC Alias Private Key: 7
20,985,935 UART: [art] Extend RT PCRs Done
20,987,172 UART: [art] Lock RT PCRs Done
20,989,121 UART: [art] Populate DV Done
20,994,694 UART: [fht] FMC Alias Private Key: 7
20,996,285 UART: [art] Derive CDI
20,997,094 UART: [art] Store in in slot 0x4
21,039,771 UART: [art] Derive Key Pair
21,040,818 UART: [art] Store priv key in slot 0x5
23,467,071 UART: [art] Derive Key Pair - Done
23,480,336 UART: [art] Signing Cert with AUTHO
23,481,636 UART: RITY.KEYID = 7
25,186,716 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,378 UART: [art] PUB.X = 505F917D47C65293189175BE3308901D8BC43F08127CDA95FD20C34056916496242A694A42DA6463F885D507F7108707
25,195,438 UART: [art] PUB.Y = E4624066DB9E3C16EEA67B3F07477F171187A1D7CD07D22E4C46E932FDC884F84224B7D807610C31328F5161C79098A2
25,202,676 UART: [art] SIG.R = 78F01595B413229EEFBF5BF106956E54D4FCF2417AEF485596F84D172928185D31C914DA79037BB8CB6DEFE3CD70D680
25,210,039 UART: [art] SIG.S = 6B064CA15F5DFB94CD7787019A8F61C88DED44D8490C42A4ECB360E36378D36B66EB4E56127D565280F18B171EE98874
26,189,440 UART: Caliptra RT
26,190,122 UART: [state] CFI Enabled
26,307,668 UART: [rt] RT listening for mailbox commands...
26,309,732 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,339,927 UART: [rt]cmd =0x44504543, len=20
26,360,228 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,837 UART: [kat] SHA2-256
881,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,883 UART: [kat] ++
886,035 UART: [kat] sha1
890,255 UART: [kat] SHA2-256
892,193 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,312 UART: [kat] HMAC-384Kdf
906,914 UART: [kat] LMS
1,475,110 UART: [kat] --
1,475,835 UART: [cold-reset] ++
1,476,391 UART: [fht] Storing FHT @ 0x50003400
1,478,976 UART: [idev] ++
1,479,144 UART: [idev] CDI.KEYID = 6
1,479,504 UART: [idev] SUBJECT.KEYID = 7
1,479,928 UART: [idev] UDS.KEYID = 0
1,480,273 ready_for_fw is high
1,480,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,120 UART: [idev] Erasing UDS.KEYID = 0
1,504,676 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,442 UART: [idev] --
1,514,467 UART: [ldev] ++
1,514,635 UART: [ldev] CDI.KEYID = 6
1,514,998 UART: [ldev] SUBJECT.KEYID = 5
1,515,424 UART: [ldev] AUTHORITY.KEYID = 7
1,515,887 UART: [ldev] FE.KEYID = 1
1,520,755 UART: [ldev] Erasing FE.KEYID = 1
1,546,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,850 UART: [ldev] --
1,585,181 UART: [fwproc] Waiting for Commands...
1,586,026 UART: [fwproc] Received command 0x46574c44
1,586,817 UART: [fwproc] Received Image of size 114448 bytes
2,887,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,554 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,906 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,023 >>> mbox cmd response: success
3,081,261 UART: [afmc] ++
3,081,429 UART: [afmc] CDI.KEYID = 6
3,081,791 UART: [afmc] SUBJECT.KEYID = 7
3,082,216 UART: [afmc] AUTHORITY.KEYID = 5
3,117,089 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,319 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,099 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,712 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,402 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,253 UART: [afmc] --
3,160,367 UART: [cold-reset] --
3,161,121 UART: [state] Locking Datavault
3,162,184 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,788 UART: [state] Locking ICCM
3,163,420 UART: [exit] Launching FMC @ 0x40000130
3,168,749 UART:
3,168,765 UART: Running Caliptra FMC ...
3,169,173 UART:
3,169,227 UART: [state] CFI Enabled
3,179,454 UART: [fht] FMC Alias Private Key: 7
3,287,035 UART: [art] Extend RT PCRs Done
3,287,463 UART: [art] Lock RT PCRs Done
3,289,083 UART: [art] Populate DV Done
3,297,402 UART: [fht] FMC Alias Private Key: 7
3,298,414 UART: [art] Derive CDI
3,298,694 UART: [art] Store in in slot 0x4
3,384,529 UART: [art] Derive Key Pair
3,384,889 UART: [art] Store priv key in slot 0x5
3,398,543 UART: [art] Derive Key Pair - Done
3,412,782 UART: [art] Signing Cert with AUTHO
3,413,262 UART: RITY.KEYID = 7
3,428,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,237 UART: [art] PUB.X = 26D1F2F84E8A879A9FB90113DCA3F4E5EAE32D8332D2F9FAED59055C717E53D9D25D96D9B014AD3737A70B3EFED4A6DF
3,436,018 UART: [art] PUB.Y = 9C043E9B95E7E82835FE382CB596B4B005ACD0C585F426BD9BDE37ED5B53ADDFB6D618038D618E7BCB774F1A81EF85A2
3,442,977 UART: [art] SIG.R = 1B9E60F4662BF2587069DF9CDC30B17D6BFF0C1E0F071969CD844AB2B30C2F94C45961CEE7BCF3CED5D691D4C0315465
3,449,749 UART: [art] SIG.S = 5DCE38B06FDE3EB1C435269BC4A602F8D27167F7431C81BCC088780AEEC891EF333C3B615E97A1E71CC9392002C2E22D
3,473,715 UART: Caliptra RT
3,473,968 UART: [state] CFI Enabled
3,582,356 UART: [rt] RT listening for mailbox commands...
3,583,026 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,926 UART: [rt]cmd =0x44504543, len=20
3,633,857 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,137 ready_for_fw is high
1,362,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,017 >>> mbox cmd response: success
2,989,569 UART:
2,989,585 UART: Running Caliptra FMC ...
2,989,993 UART:
2,990,047 UART: [state] CFI Enabled
3,000,430 UART: [fht] FMC Alias Private Key: 7
3,108,755 UART: [art] Extend RT PCRs Done
3,109,183 UART: [art] Lock RT PCRs Done
3,110,845 UART: [art] Populate DV Done
3,118,914 UART: [fht] FMC Alias Private Key: 7
3,119,936 UART: [art] Derive CDI
3,120,216 UART: [art] Store in in slot 0x4
3,205,617 UART: [art] Derive Key Pair
3,205,977 UART: [art] Store priv key in slot 0x5
3,218,671 UART: [art] Derive Key Pair - Done
3,233,390 UART: [art] Signing Cert with AUTHO
3,233,870 UART: RITY.KEYID = 7
3,249,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,795 UART: [art] PUB.X = 9EFADC84ADBDFB4DD087F6A3DD046BEA28D960B37FB18EFDDCCFCCE7ADF6C52A2E9997CD116C4F0EDF3C1E51E12C02D4
3,256,598 UART: [art] PUB.Y = FA297452EF66DAE21073C0BAFCFD3DD53DE4053BABC5E4052EA1DB94E1FB83936A56528F89958D08B0138DDB38E00AA3
3,263,554 UART: [art] SIG.R = 4634238D7786F50F9488A0E1C592D1ABF3A9765BA10E0B68A12E293D2934289139C64B3DFB3016799BD10349D7B8FF31
3,270,308 UART: [art] SIG.S = C75D9361089417150EF34C5DB48935BB76B5FBB56B4FAEB90733C5908D932031868176B3DC7C445F86E535862EFD811F
3,294,070 UART: Caliptra RT
3,294,323 UART: [state] CFI Enabled
3,401,900 UART: [rt] RT listening for mailbox commands...
3,402,570 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,458 UART: [rt]cmd =0x44504543, len=20
3,453,537 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,038 UART: [kat] SHA2-256
881,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,084 UART: [kat] ++
886,236 UART: [kat] sha1
890,306 UART: [kat] SHA2-256
892,244 UART: [kat] SHA2-384
894,851 UART: [kat] SHA2-512-ACC
896,752 UART: [kat] ECC-384
902,219 UART: [kat] HMAC-384Kdf
906,795 UART: [kat] LMS
1,474,991 UART: [kat] --
1,476,016 UART: [cold-reset] ++
1,476,530 UART: [fht] Storing FHT @ 0x50003400
1,479,263 UART: [idev] ++
1,479,431 UART: [idev] CDI.KEYID = 6
1,479,791 UART: [idev] SUBJECT.KEYID = 7
1,480,215 UART: [idev] UDS.KEYID = 0
1,480,560 ready_for_fw is high
1,480,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,383 UART: [idev] Erasing UDS.KEYID = 0
1,504,757 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,169 UART: [idev] --
1,514,238 UART: [ldev] ++
1,514,406 UART: [ldev] CDI.KEYID = 6
1,514,769 UART: [ldev] SUBJECT.KEYID = 5
1,515,195 UART: [ldev] AUTHORITY.KEYID = 7
1,515,658 UART: [ldev] FE.KEYID = 1
1,521,164 UART: [ldev] Erasing FE.KEYID = 1
1,546,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,039 UART: [ldev] --
1,585,328 UART: [fwproc] Waiting for Commands...
1,585,945 UART: [fwproc] Received command 0x46574c44
1,586,736 UART: [fwproc] Received Image of size 114448 bytes
2,885,801 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,945 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,404 >>> mbox cmd response: success
3,079,452 UART: [afmc] ++
3,079,620 UART: [afmc] CDI.KEYID = 6
3,079,982 UART: [afmc] SUBJECT.KEYID = 7
3,080,407 UART: [afmc] AUTHORITY.KEYID = 5
3,116,166 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,686 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,466 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,194 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,079 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,769 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,858 UART: [afmc] --
3,159,964 UART: [cold-reset] --
3,160,620 UART: [state] Locking Datavault
3,161,887 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,491 UART: [state] Locking ICCM
3,162,943 UART: [exit] Launching FMC @ 0x40000130
3,168,272 UART:
3,168,288 UART: Running Caliptra FMC ...
3,168,696 UART:
3,168,839 UART: [state] CFI Enabled
3,179,546 UART: [fht] FMC Alias Private Key: 7
3,287,475 UART: [art] Extend RT PCRs Done
3,287,903 UART: [art] Lock RT PCRs Done
3,289,441 UART: [art] Populate DV Done
3,297,556 UART: [fht] FMC Alias Private Key: 7
3,298,736 UART: [art] Derive CDI
3,299,016 UART: [art] Store in in slot 0x4
3,385,021 UART: [art] Derive Key Pair
3,385,381 UART: [art] Store priv key in slot 0x5
3,398,541 UART: [art] Derive Key Pair - Done
3,413,381 UART: [art] Signing Cert with AUTHO
3,413,861 UART: RITY.KEYID = 7
3,429,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,060 UART: [art] PUB.X = 914ABCC9F94611424AF62879F9A8DEE96B58E1A5E23E33160F6F0859A594A918947EEDFD80CCB03EA68DC60AC48F56B1
3,436,833 UART: [art] PUB.Y = 2E8E067395C70584B54143C62F4D5A934AEBB2F9F3EEA96254F1C076BE75E4480431292580620A7099579DE374EAFDEC
3,443,771 UART: [art] SIG.R = AF31D94ED1F5A18971AF36C181C3BF33D86D73679BB926FE67D3D2C124A71D587D96DE7AE8F2222074F4A1F5488A2597
3,450,547 UART: [art] SIG.S = 01F7F628FA36B073ABA17885322A7B8474FF42C2D79B77BE6A46E3CD4FBE557D253951510B0F97FF9684E4138CC1D116
3,474,261 UART: Caliptra RT
3,474,606 UART: [state] CFI Enabled
3,582,435 UART: [rt] RT listening for mailbox commands...
3,583,105 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,167 UART: [rt]cmd =0x44504543, len=20
3,634,358 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,372 ready_for_fw is high
1,363,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,426 >>> mbox cmd response: success
2,990,496 UART:
2,990,512 UART: Running Caliptra FMC ...
2,990,920 UART:
2,991,063 UART: [state] CFI Enabled
3,001,908 UART: [fht] FMC Alias Private Key: 7
3,110,007 UART: [art] Extend RT PCRs Done
3,110,435 UART: [art] Lock RT PCRs Done
3,111,851 UART: [art] Populate DV Done
3,120,122 UART: [fht] FMC Alias Private Key: 7
3,121,096 UART: [art] Derive CDI
3,121,376 UART: [art] Store in in slot 0x4
3,207,331 UART: [art] Derive Key Pair
3,207,691 UART: [art] Store priv key in slot 0x5
3,220,719 UART: [art] Derive Key Pair - Done
3,235,703 UART: [art] Signing Cert with AUTHO
3,236,183 UART: RITY.KEYID = 7
3,251,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,576 UART: [art] PUB.X = 09350B2A836CA72D26BA943009DF1F0CC64754252A1C7F781FA448E56F45FB98ABB40D5F496605AEE6CFEE208F038936
3,259,331 UART: [art] PUB.Y = 33DB6EFBE71D9EAAC8EF6DDC1F97470517EBDF53F05E7F5E79DDA2F5E641E2B8CDD06DBEB37D9A587EE4B61C777F17E5
3,266,310 UART: [art] SIG.R = A29897A86A4304E760383FC453BEAE9E8D95D50EA50F4C3C8BFC06BCC3D5B23D59CE17B6579543B731F94696479E3439
3,273,072 UART: [art] SIG.S = 17259E4725FCDC7FBF654FFD3604D64545CABB12A40C2816B7C8F377B071A99EC2E9C941ECD9BC62847D335CD86CBF0D
3,296,684 UART: Caliptra RT
3,297,029 UART: [state] CFI Enabled
3,404,726 UART: [rt] RT listening for mailbox commands...
3,405,396 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,470 UART: [rt]cmd =0x44504543, len=20
3,456,377 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,941 UART: [kat] SHA2-256
903,881 UART: [kat] SHA2-384
906,680 UART: [kat] SHA2-512-ACC
908,581 UART: [kat] ECC-384
918,406 UART: [kat] HMAC-384Kdf
922,974 UART: [kat] LMS
1,171,302 UART: [kat] --
1,171,993 UART: [cold-reset] ++
1,172,419 UART: [fht] FHT @ 0x50003400
1,175,058 UART: [idev] ++
1,175,226 UART: [idev] CDI.KEYID = 6
1,175,586 UART: [idev] SUBJECT.KEYID = 7
1,176,010 UART: [idev] UDS.KEYID = 0
1,176,355 ready_for_fw is high
1,176,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,506 UART: [idev] Erasing UDS.KEYID = 0
1,201,107 UART: [idev] Sha1 KeyId Algorithm
1,209,567 UART: [idev] --
1,210,539 UART: [ldev] ++
1,210,707 UART: [ldev] CDI.KEYID = 6
1,211,070 UART: [ldev] SUBJECT.KEYID = 5
1,211,496 UART: [ldev] AUTHORITY.KEYID = 7
1,211,959 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,698 UART: [fwproc] Recv command 0x46574c44
1,283,426 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,836 >>> mbox cmd response: success
2,775,068 UART: [afmc] ++
2,775,236 UART: [afmc] CDI.KEYID = 6
2,775,598 UART: [afmc] SUBJECT.KEYID = 7
2,776,023 UART: [afmc] AUTHORITY.KEYID = 5
2,810,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,089 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,817 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,215 UART: [afmc] --
2,854,221 UART: [cold-reset] --
2,855,197 UART: [state] Locking Datavault
2,856,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,924 UART: [state] Locking ICCM
2,857,426 UART: [exit] Launching FMC @ 0x40000130
2,862,755 UART:
2,862,771 UART: Running Caliptra FMC ...
2,863,179 UART:
2,863,233 UART: [state] CFI Enabled
2,873,784 UART: [fht] FMC Alias Private Key: 7
2,981,497 UART: [art] Extend RT PCRs Done
2,981,925 UART: [art] Lock RT PCRs Done
2,983,265 UART: [art] Populate DV Done
2,991,616 UART: [fht] FMC Alias Private Key: 7
2,992,544 UART: [art] Derive CDI
2,992,824 UART: [art] Store in in slot 0x4
3,078,631 UART: [art] Derive Key Pair
3,078,991 UART: [art] Store priv key in slot 0x5
3,092,375 UART: [art] Derive Key Pair - Done
3,106,958 UART: [art] Signing Cert with AUTHO
3,107,438 UART: RITY.KEYID = 7
3,122,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,491 UART: [art] PUB.X = 063F90D6653ECA64A0443D1BD5DFC54C1B66CC53728BE34A094583D704FE267D3D901D00D08F3A74CDCF0FA29B9A2A2D
3,130,241 UART: [art] PUB.Y = 6E300C2C9B944E5DAD09D257F529AAD6C940927B7D8CBF0D565A802E5EBBB11899BB22ABF65DEF403846169C43C1C279
3,137,194 UART: [art] SIG.R = 9368ABDB47320F0577C213F9E1C66257A8263711D2E241BC47C99493248FFFEE11E0AAC5225414B4F2EE842FFB4CACDC
3,143,968 UART: [art] SIG.S = 21ADC07C630ED6F77EBB75E21E9BE5071886F1FE90839C179EE3733DF6A64C5F7757A716FBAE2E6C6EFED3B8D0C70C31
3,167,672 UART: Caliptra RT
3,167,925 UART: [state] CFI Enabled
3,275,856 UART: [rt] RT listening for mailbox commands...
3,276,526 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,488 UART: [rt]cmd =0x44504543, len=20
3,327,395 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,867 ready_for_fw is high
1,059,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,047 >>> mbox cmd response: success
2,689,673 UART:
2,689,689 UART: Running Caliptra FMC ...
2,690,097 UART:
2,690,151 UART: [state] CFI Enabled
2,700,506 UART: [fht] FMC Alias Private Key: 7
2,808,905 UART: [art] Extend RT PCRs Done
2,809,333 UART: [art] Lock RT PCRs Done
2,810,727 UART: [art] Populate DV Done
2,818,992 UART: [fht] FMC Alias Private Key: 7
2,819,924 UART: [art] Derive CDI
2,820,204 UART: [art] Store in in slot 0x4
2,905,811 UART: [art] Derive Key Pair
2,906,171 UART: [art] Store priv key in slot 0x5
2,919,323 UART: [art] Derive Key Pair - Done
2,934,075 UART: [art] Signing Cert with AUTHO
2,934,555 UART: RITY.KEYID = 7
2,949,901 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,666 UART: [art] PUB.X = ED79AEF29B864889DC2A5B9F8B1941F8033C5551368BA596A66538EAAFA0E021E0152B90311CEF273884FEC4E69EBAF1
2,957,443 UART: [art] PUB.Y = EAF1D00F4B44D0694F819A177D9A9D97C4D8432058840DF8459C91B4F96B5340EA71EEF563F0E79BCF9186A79C7EB014
2,964,393 UART: [art] SIG.R = 58D7229A5181B9B3A91F9F1889C80BBE2224E653F3FFAC2FEEDFE26BC9DF16354E7D5B28DA74EB7B75D81C93C7840858
2,971,171 UART: [art] SIG.S = A303A8D2C2FE7E229FBBDF6E25FA34758A782AE8611BCAC423EA4DFC45409D9AF04362CB1032908FF945B2AF0C265F83
2,995,008 UART: Caliptra RT
2,995,261 UART: [state] CFI Enabled
3,103,050 UART: [rt] RT listening for mailbox commands...
3,103,720 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,710 UART: [rt]cmd =0x44504543, len=20
3,154,719 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
87,176 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [kat] SHA2-256
893,973 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,098 UART: [kat] ++
898,250 UART: [kat] sha1
902,430 UART: [kat] SHA2-256
904,370 UART: [kat] SHA2-384
907,147 UART: [kat] SHA2-512-ACC
909,048 UART: [kat] ECC-384
918,855 UART: [kat] HMAC-384Kdf
923,355 UART: [kat] LMS
1,171,683 UART: [kat] --
1,172,698 UART: [cold-reset] ++
1,173,134 UART: [fht] FHT @ 0x50003400
1,175,681 UART: [idev] ++
1,175,849 UART: [idev] CDI.KEYID = 6
1,176,209 UART: [idev] SUBJECT.KEYID = 7
1,176,633 UART: [idev] UDS.KEYID = 0
1,176,978 ready_for_fw is high
1,176,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,517 UART: [idev] Erasing UDS.KEYID = 0
1,201,556 UART: [idev] Sha1 KeyId Algorithm
1,210,138 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,744 UART: [ldev] Erasing FE.KEYID = 1
1,244,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,170 UART: [ldev] --
1,283,489 UART: [fwproc] Wait for Commands...
1,284,077 UART: [fwproc] Recv command 0x46574c44
1,284,805 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,181 >>> mbox cmd response: success
2,778,261 UART: [afmc] ++
2,778,429 UART: [afmc] CDI.KEYID = 6
2,778,791 UART: [afmc] SUBJECT.KEYID = 7
2,779,216 UART: [afmc] AUTHORITY.KEYID = 5
2,814,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,472 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,152 UART: [afmc] --
2,857,252 UART: [cold-reset] --
2,858,036 UART: [state] Locking Datavault
2,859,367 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,971 UART: [state] Locking ICCM
2,860,583 UART: [exit] Launching FMC @ 0x40000130
2,865,912 UART:
2,865,928 UART: Running Caliptra FMC ...
2,866,336 UART:
2,866,479 UART: [state] CFI Enabled
2,877,080 UART: [fht] FMC Alias Private Key: 7
2,985,543 UART: [art] Extend RT PCRs Done
2,985,971 UART: [art] Lock RT PCRs Done
2,987,545 UART: [art] Populate DV Done
2,995,572 UART: [fht] FMC Alias Private Key: 7
2,996,588 UART: [art] Derive CDI
2,996,868 UART: [art] Store in in slot 0x4
3,082,547 UART: [art] Derive Key Pair
3,082,907 UART: [art] Store priv key in slot 0x5
3,096,165 UART: [art] Derive Key Pair - Done
3,110,950 UART: [art] Signing Cert with AUTHO
3,111,430 UART: RITY.KEYID = 7
3,126,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,195 UART: [art] PUB.X = 07AA7E9C5A89729391A1203863198B947D9A26FE15F46E39C858DCD019C854EB59743403CA0910392374B32CFFB4A90B
3,133,949 UART: [art] PUB.Y = 026A1CA0CEBE6D5F5C83520EDB5298507A2FC2115D0983495BEBA899C69E4139052C9A3D992E8818B1C835BF9B1374B3
3,140,891 UART: [art] SIG.R = 62088D9F802AADF264121B4EB82F3A03636884841838EBEF7F2232B6349718DB0A9B7F0FC231240D0C0293430C206F33
3,147,631 UART: [art] SIG.S = 15531D4C653A9B4DD22B7BA3714049DB4BDAC1A5DD4B7A40C0F6F081E617860848744912E197B5CDDBFD6C478A72086D
3,171,556 UART: Caliptra RT
3,171,901 UART: [state] CFI Enabled
3,279,592 UART: [rt] RT listening for mailbox commands...
3,280,262 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,008 UART: [rt]cmd =0x44504543, len=20
3,330,755 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,236 ready_for_fw is high
1,060,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,430 >>> mbox cmd response: success
2,689,422 UART:
2,689,438 UART: Running Caliptra FMC ...
2,689,846 UART:
2,689,989 UART: [state] CFI Enabled
2,700,548 UART: [fht] FMC Alias Private Key: 7
2,808,455 UART: [art] Extend RT PCRs Done
2,808,883 UART: [art] Lock RT PCRs Done
2,810,185 UART: [art] Populate DV Done
2,818,248 UART: [fht] FMC Alias Private Key: 7
2,819,302 UART: [art] Derive CDI
2,819,582 UART: [art] Store in in slot 0x4
2,905,065 UART: [art] Derive Key Pair
2,905,425 UART: [art] Store priv key in slot 0x5
2,919,267 UART: [art] Derive Key Pair - Done
2,934,231 UART: [art] Signing Cert with AUTHO
2,934,711 UART: RITY.KEYID = 7
2,950,189 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,954 UART: [art] PUB.X = 233EDDE1F74B4AE04A7EB383F5007FD84136343D484D59A886122C684B405BFA12EBBE0D77E6BB1A217E79B1B59BC7DC
2,957,713 UART: [art] PUB.Y = 76D92E027673501FBFDF19DED53C765C9714CB2CEA8D162F6C4C961D1EE3F6A40BD97F711B256056B729F0D04369446F
2,964,663 UART: [art] SIG.R = 1617BABAAE67D31613211339B5A05C1A9E0E3B34FFE552143E2C09C6AD257C8C9D9476C89320004560A1A0FEF48C5F5B
2,971,411 UART: [art] SIG.S = AA5A0199C45F6CD262F6D92A80A62376C546C29A8DCB4BA6415F1DF28668D61C95E6A9A8C9E1894D085F7CE0E92CC0A3
2,995,460 UART: Caliptra RT
2,995,805 UART: [state] CFI Enabled
3,103,434 UART: [rt] RT listening for mailbox commands...
3,104,104 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,076 UART: [rt]cmd =0x44504543, len=20
3,154,881 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,766 UART: [kat] LMS
1,169,078 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,461 UART: [idev] ++
1,173,629 UART: [idev] CDI.KEYID = 6
1,173,990 UART: [idev] SUBJECT.KEYID = 7
1,174,415 UART: [idev] UDS.KEYID = 0
1,174,761 ready_for_fw is high
1,174,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,587 UART: [idev] Erasing UDS.KEYID = 0
1,199,779 UART: [idev] Sha1 KeyId Algorithm
1,208,545 UART: [idev] --
1,209,574 UART: [ldev] ++
1,209,742 UART: [ldev] CDI.KEYID = 6
1,210,106 UART: [ldev] SUBJECT.KEYID = 5
1,210,533 UART: [ldev] AUTHORITY.KEYID = 7
1,210,996 UART: [ldev] FE.KEYID = 1
1,215,966 UART: [ldev] Erasing FE.KEYID = 1
1,241,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,610 UART: [ldev] --
1,280,970 UART: [fwproc] Wait for Commands...
1,281,719 UART: [fwproc] Recv command 0x46574c44
1,282,452 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,964 >>> mbox cmd response: success
2,776,217 UART: [afmc] ++
2,776,385 UART: [afmc] CDI.KEYID = 6
2,776,748 UART: [afmc] SUBJECT.KEYID = 7
2,777,174 UART: [afmc] AUTHORITY.KEYID = 5
2,812,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,733 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,616 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,335 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,068 UART: [afmc] --
2,856,118 UART: [cold-reset] --
2,857,188 UART: [state] Locking Datavault
2,858,477 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,081 UART: [state] Locking ICCM
2,859,547 UART: [exit] Launching FMC @ 0x40000130
2,864,876 UART:
2,864,892 UART: Running Caliptra FMC ...
2,865,300 UART:
2,865,354 UART: [state] CFI Enabled
2,875,631 UART: [fht] FMC Alias Private Key: 7
2,983,690 UART: [art] Extend RT PCRs Done
2,984,118 UART: [art] Lock RT PCRs Done
2,985,204 UART: [art] Populate DV Done
2,993,247 UART: [fht] FMC Alias Private Key: 7
2,994,361 UART: [art] Derive CDI
2,994,641 UART: [art] Store in in slot 0x4
3,080,712 UART: [art] Derive Key Pair
3,081,072 UART: [art] Store priv key in slot 0x5
3,093,830 UART: [art] Derive Key Pair - Done
3,108,944 UART: [art] Signing Cert with AUTHO
3,109,424 UART: RITY.KEYID = 7
3,124,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,499 UART: [art] PUB.X = C00EB11350F3B534A6BFFF6DB8B68AC829F54E07D615E6F6592788509A452A3D458754682BD74A1DFD0F4CCB34822A36
3,132,266 UART: [art] PUB.Y = DF202D0DC5BC72310FFBFC0F003E1A81B07FE57490DF8B6C9654D79393E7683F6A21D4BBBFD83346C123BEC58F8F02D7
3,139,198 UART: [art] SIG.R = A5A16145DF7CDF991C83D2DB2B9B1D5205A3C8BDCFF0624A7978A3B6EF821360AC89488691333798823C8DBCCD2DB89C
3,145,977 UART: [art] SIG.S = CAB29F7B3C3F41B1E30FF2F6932916F5BBE9AB2B0D57B8F8CE0678632B007235527528A262CF434F2330032893442920
3,169,728 UART: Caliptra RT
3,169,981 UART: [state] CFI Enabled
3,277,925 UART: [rt] RT listening for mailbox commands...
3,278,595 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,839 UART: [rt]cmd =0x44504543, len=20
3,329,734 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,398 ready_for_fw is high
1,056,398 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,618 >>> mbox cmd response: success
2,687,110 UART:
2,687,126 UART: Running Caliptra FMC ...
2,687,534 UART:
2,687,588 UART: [state] CFI Enabled
2,697,985 UART: [fht] FMC Alias Private Key: 7
2,805,838 UART: [art] Extend RT PCRs Done
2,806,266 UART: [art] Lock RT PCRs Done
2,808,086 UART: [art] Populate DV Done
2,816,111 UART: [fht] FMC Alias Private Key: 7
2,817,255 UART: [art] Derive CDI
2,817,535 UART: [art] Store in in slot 0x4
2,903,010 UART: [art] Derive Key Pair
2,903,370 UART: [art] Store priv key in slot 0x5
2,916,402 UART: [art] Derive Key Pair - Done
2,930,818 UART: [art] Signing Cert with AUTHO
2,931,298 UART: RITY.KEYID = 7
2,946,298 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,063 UART: [art] PUB.X = 7AC5749567C68D389A106D57377D9260C5D30E59D590AFA85EF3D65DA210445C80AF5FC05190698010C34598FBADDA9A
2,953,832 UART: [art] PUB.Y = D91E8E982F56880A51EE4B1DD838083794E6B97BE5DEFD7DD279623D1B47AA7B923791C7450F40670D5AC4B3088B872F
2,960,771 UART: [art] SIG.R = 3E65863068E8D2CDE8871A356AE8748D0E6A65DA8F0271B3E736AA8A0864A1865CAF27EF0B6EAC03A5E13A656A80F7B4
2,967,536 UART: [art] SIG.S = AE2EA0A358AF3CF9CE1CD61109BF7ED508E0FEA2D2A5E1A8CA6652D482B744E790B53E073BBAA90C1C25FF4038E9EAA7
2,991,007 UART: Caliptra RT
2,991,260 UART: [state] CFI Enabled
3,098,347 UART: [rt] RT listening for mailbox commands...
3,099,017 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,897 UART: [rt]cmd =0x44504543, len=20
3,149,696 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,567 UART: [kat] SHA2-512-ACC
906,468 UART: [kat] ECC-384
916,451 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,014 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 ready_for_fw is high
1,174,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,346 UART: [idev] Erasing UDS.KEYID = 0
1,199,274 UART: [idev] Sha1 KeyId Algorithm
1,208,228 UART: [idev] --
1,209,137 UART: [ldev] ++
1,209,305 UART: [ldev] CDI.KEYID = 6
1,209,669 UART: [ldev] SUBJECT.KEYID = 5
1,210,096 UART: [ldev] AUTHORITY.KEYID = 7
1,210,559 UART: [ldev] FE.KEYID = 1
1,216,061 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,173 UART: [ldev] --
1,282,439 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x46574c44
1,283,987 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,123 >>> mbox cmd response: success
2,776,336 UART: [afmc] ++
2,776,504 UART: [afmc] CDI.KEYID = 6
2,776,867 UART: [afmc] SUBJECT.KEYID = 7
2,777,293 UART: [afmc] AUTHORITY.KEYID = 5
2,812,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,312 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,195 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,914 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,891 UART: [afmc] --
2,855,853 UART: [cold-reset] --
2,856,753 UART: [state] Locking Datavault
2,858,174 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,778 UART: [state] Locking ICCM
2,859,398 UART: [exit] Launching FMC @ 0x40000130
2,864,727 UART:
2,864,743 UART: Running Caliptra FMC ...
2,865,151 UART:
2,865,294 UART: [state] CFI Enabled
2,875,575 UART: [fht] FMC Alias Private Key: 7
2,983,980 UART: [art] Extend RT PCRs Done
2,984,408 UART: [art] Lock RT PCRs Done
2,986,150 UART: [art] Populate DV Done
2,994,381 UART: [fht] FMC Alias Private Key: 7
2,995,497 UART: [art] Derive CDI
2,995,777 UART: [art] Store in in slot 0x4
3,081,180 UART: [art] Derive Key Pair
3,081,540 UART: [art] Store priv key in slot 0x5
3,095,216 UART: [art] Derive Key Pair - Done
3,109,822 UART: [art] Signing Cert with AUTHO
3,110,302 UART: RITY.KEYID = 7
3,125,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,411 UART: [art] PUB.X = 91D04D25117A66730330249BD9B82AA48B83891BA36A4E4290C4D8508A1E33B6FC85C5CE34702EB48F8F3FECA205749D
3,133,177 UART: [art] PUB.Y = 3132414EC5FC1E57EEEF04CB22290DD2FCB96FAB49F3D04995E0B03BA760EACAF8061EDD1D0D126AE37D012657EDE8B7
3,140,134 UART: [art] SIG.R = 06CD3405EF070FB88AB00B1D99146EA3E04E768BCC013E601069D6DB55E4D4427842A0A3ABA6DF042FE91DB315E2CFAF
3,146,899 UART: [art] SIG.S = 56A0E1BF594C125A8454C8BB6F1521E4987E1D902A13B70BCF8C467CBCBA9FCDA73131F94BB0431CE38F3BF8884F89CD
3,170,979 UART: Caliptra RT
3,171,324 UART: [state] CFI Enabled
3,278,375 UART: [rt] RT listening for mailbox commands...
3,279,045 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,915 UART: [rt]cmd =0x44504543, len=20
3,329,762 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,487 ready_for_fw is high
1,056,487 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,611 >>> mbox cmd response: success
2,687,333 UART:
2,687,349 UART: Running Caliptra FMC ...
2,687,757 UART:
2,687,900 UART: [state] CFI Enabled
2,698,467 UART: [fht] FMC Alias Private Key: 7
2,806,862 UART: [art] Extend RT PCRs Done
2,807,290 UART: [art] Lock RT PCRs Done
2,808,966 UART: [art] Populate DV Done
2,817,139 UART: [fht] FMC Alias Private Key: 7
2,818,229 UART: [art] Derive CDI
2,818,509 UART: [art] Store in in slot 0x4
2,904,212 UART: [art] Derive Key Pair
2,904,572 UART: [art] Store priv key in slot 0x5
2,918,042 UART: [art] Derive Key Pair - Done
2,933,318 UART: [art] Signing Cert with AUTHO
2,933,798 UART: RITY.KEYID = 7
2,948,784 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,549 UART: [art] PUB.X = BF4B0D4D79B079A947E8B0C3BCA40CD7CFA5415B67A923B54EB82AF9B3FDAEDBCBD9F5B3FE7E6C31A13DC31AF8C5ED7B
2,956,351 UART: [art] PUB.Y = 7411FB8E64B9CB67DB991C62A3F679515DAD260181F3625AE0962108AD4DC9BE6348765F4D7E88EDDF9C3AAC244879E4
2,963,303 UART: [art] SIG.R = C750B27E3AE62909D0ED4AF30CD30CD7571270D2658E162C8E2FE05376CE873922C1CF3E7F15E689FB64C9E8AE33D30E
2,970,071 UART: [art] SIG.S = 8C645A8B00FAC2ADC46C0AD5C4523F36B9CB3B00907E9CD967153722222321483B1FEEDC8B6699114E7E0663DDD0DDD5
2,994,000 UART: Caliptra RT
2,994,345 UART: [state] CFI Enabled
3,101,421 UART: [rt] RT listening for mailbox commands...
3,102,091 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,003 UART: [rt]cmd =0x44504543, len=20
3,152,830 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
191,973 UART:
192,345 UART: Running Caliptra ROM ...
193,451 UART:
193,592 UART: [state] CFI Enabled
268,987 UART: [state] LifecycleState = Unprovisioned
270,894 UART: [state] DebugLocked = No
272,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,356 UART: [kat] SHA2-256
447,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,555 UART: [kat] ++
458,003 UART: [kat] sha1
469,164 UART: [kat] SHA2-256
471,832 UART: [kat] SHA2-384
478,317 UART: [kat] SHA2-512-ACC
480,682 UART: [kat] ECC-384
2,767,268 UART: [kat] HMAC-384Kdf
2,779,659 UART: [kat] LMS
3,969,946 UART: [kat] --
3,974,325 UART: [cold-reset] ++
3,976,627 UART: [fht] Storing FHT @ 0x50003400
3,988,037 UART: [idev] ++
3,988,607 UART: [idev] CDI.KEYID = 6
3,989,532 UART: [idev] SUBJECT.KEYID = 7
3,990,779 UART: [idev] UDS.KEYID = 0
3,991,765 ready_for_fw is high
3,991,965 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,555 UART: [idev] Erasing UDS.KEYID = 0
7,324,166 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,426 UART: [idev] --
7,349,052 UART: [ldev] ++
7,349,627 UART: [ldev] CDI.KEYID = 6
7,350,565 UART: [ldev] SUBJECT.KEYID = 5
7,351,835 UART: [ldev] AUTHORITY.KEYID = 7
7,353,064 UART: [ldev] FE.KEYID = 1
7,401,031 UART: [ldev] Erasing FE.KEYID = 1
10,732,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,839 UART: [ldev] --
13,115,667 UART: [fwproc] Waiting for Commands...
13,117,382 UART: [fwproc] Received command 0x46574c44
13,119,572 UART: [fwproc] Received Image of size 114124 bytes
17,174,920 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,652 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,636,162 >>> mbox cmd response: success
17,641,064 UART: [afmc] ++
17,641,666 UART: [afmc] CDI.KEYID = 6
17,642,762 UART: [afmc] SUBJECT.KEYID = 7
17,643,883 UART: [afmc] AUTHORITY.KEYID = 5
21,005,432 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,637 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,305,895 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,320,318 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,152 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,349,618 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,371,196 UART: [afmc] --
23,374,413 UART: [cold-reset] --
23,380,407 UART: [state] Locking Datavault
23,386,466 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,219 UART: [state] Locking ICCM
23,389,344 UART: [exit] Launching FMC @ 0x40000130
23,397,736 UART:
23,397,977 UART: Running Caliptra FMC ...
23,399,076 UART:
23,399,238 UART: [state] CFI Enabled
23,463,419 UART: [fht] FMC Alias Private Key: 7
25,801,251 UART: [art] Extend RT PCRs Done
25,802,614 UART: [art] Lock RT PCRs Done
25,804,139 UART: [art] Populate DV Done
25,809,657 UART: [fht] FMC Alias Private Key: 7
25,811,366 UART: [art] Derive CDI
25,812,186 UART: [art] Store in in slot 0x4
25,870,733 UART: [art] Derive Key Pair
25,871,750 UART: [art] Store priv key in slot 0x5
29,164,361 UART: [art] Derive Key Pair - Done
29,177,321 UART: [art] Signing Cert with AUTHO
29,178,629 UART: RITY.KEYID = 7
31,465,144 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,651 UART: [art] PUB.X = BEC653F88048AC77CAFE74FB7B8893F552DB45AFBFD489B73B842674A942EA57B3230C66D97EF08CA3FFB32E91D6C097
31,473,903 UART: [art] PUB.Y = B44A362B12D1F7A5F4E2D1C980F3C76390DABC35DB08876DD5410161435F5FE9C3148F9174566DDB2FFE55977CB0B4D6
31,481,185 UART: [art] SIG.R = 747C4E603D99F6D2B41548EC7ECBA4DBDDC7B6EB617B562CEA9458FBF5E578167E09FB5FD9DB82797FD0C7ABE441AD41
31,488,608 UART: [art] SIG.S = 7A82F557EB78FAC44D0C34CBDB14FA147BD27BF26AB787E665D621FC89690F1DB9251F825BFC1B698CB2BABB23225442
32,793,661 UART: Caliptra RT
32,794,373 UART: [state] CFI Enabled
32,975,229 UART: [rt] RT listening for mailbox commands...
32,977,148 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,007,158 UART: [rt]cmd =0x44504543, len=40
33,048,455 >>> mbox cmd response data (40 bytes)
33,049,498 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,079,626 UART: [rt]cmd =0x44504543, len=40
33,102,406 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,808,116 ready_for_fw is high
3,808,523 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,871,283 >>> mbox cmd response: success
23,569,076 UART:
23,569,478 UART: Running Caliptra FMC ...
23,570,586 UART:
23,570,740 UART: [state] CFI Enabled
23,639,187 UART: [fht] FMC Alias Private Key: 7
25,976,886 UART: [art] Extend RT PCRs Done
25,978,109 UART: [art] Lock RT PCRs Done
25,979,844 UART: [art] Populate DV Done
25,985,218 UART: [fht] FMC Alias Private Key: 7
25,986,922 UART: [art] Derive CDI
25,987,666 UART: [art] Store in in slot 0x4
26,048,200 UART: [art] Derive Key Pair
26,049,238 UART: [art] Store priv key in slot 0x5
29,342,123 UART: [art] Derive Key Pair - Done
29,355,121 UART: [art] Signing Cert with AUTHO
29,356,435 UART: RITY.KEYID = 7
31,644,320 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,819 UART: [art] PUB.X = 8249851B1AE3B3271A986BD4C314426A9338F09EEEC376C5B799BB1CB8F517224257B88E91E6B45CE9347FA7875A84DF
31,653,034 UART: [art] PUB.Y = 6CE5DDFC54E367D3C37B094F9F86C6445DE202A1679DB2524E913DA36D02C6B69EEF0EFE32DF04AB96784EE8A2D8E5DA
31,660,313 UART: [art] SIG.R = F2FC4B433B6E9C917C61042865301508898842A32686A8CE922D325DD379A027A80049F175BC6890AFDA7F921F5392BD
31,667,675 UART: [art] SIG.S = 760EC7DAB5194BD2904A87B0A731AE73EE0E43D7DA8D8A93AA9034D0AA708F5B72BB12E934B6F1AFD918250662502DB6
32,973,187 UART: Caliptra RT
32,973,906 UART: [state] CFI Enabled
33,135,037 UART: [rt] RT listening for mailbox commands...
33,136,959 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,167,279 UART: [rt]cmd =0x44504543, len=40
33,209,017 >>> mbox cmd response data (40 bytes)
33,210,278 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,240,460 UART: [rt]cmd =0x44504543, len=40
33,262,804 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,444 UART:
192,814 UART: Running Caliptra ROM ...
193,950 UART:
603,513 UART: [state] CFI Enabled
618,873 UART: [state] LifecycleState = Unprovisioned
620,809 UART: [state] DebugLocked = No
622,464 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,900 UART: [kat] SHA2-256
797,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,178 UART: [kat] ++
808,623 UART: [kat] sha1
821,121 UART: [kat] SHA2-256
823,845 UART: [kat] SHA2-384
828,698 UART: [kat] SHA2-512-ACC
831,060 UART: [kat] ECC-384
3,113,851 UART: [kat] HMAC-384Kdf
3,125,328 UART: [kat] LMS
4,315,324 UART: [kat] --
4,317,816 UART: [cold-reset] ++
4,320,310 UART: [fht] Storing FHT @ 0x50003400
4,332,797 UART: [idev] ++
4,333,396 UART: [idev] CDI.KEYID = 6
4,334,380 UART: [idev] SUBJECT.KEYID = 7
4,335,551 UART: [idev] UDS.KEYID = 0
4,336,587 ready_for_fw is high
4,336,789 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,965 UART: [idev] Erasing UDS.KEYID = 0
7,621,765 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,196 UART: [idev] --
7,649,005 UART: [ldev] ++
7,649,577 UART: [ldev] CDI.KEYID = 6
7,650,586 UART: [ldev] SUBJECT.KEYID = 5
7,651,759 UART: [ldev] AUTHORITY.KEYID = 7
7,652,984 UART: [ldev] FE.KEYID = 1
7,662,918 UART: [ldev] Erasing FE.KEYID = 1
10,953,146 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,419 UART: [ldev] --
13,313,296 UART: [fwproc] Waiting for Commands...
13,316,634 UART: [fwproc] Received command 0x46574c44
13,318,809 UART: [fwproc] Received Image of size 114124 bytes
17,364,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,228 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,829,004 >>> mbox cmd response: success
17,833,525 UART: [afmc] ++
17,834,126 UART: [afmc] CDI.KEYID = 6
17,835,035 UART: [afmc] SUBJECT.KEYID = 7
17,836,302 UART: [afmc] AUTHORITY.KEYID = 5
21,148,990 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,118 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,428 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,802 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,640 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,055 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,234 UART: [afmc] --
23,512,393 UART: [cold-reset] --
23,516,198 UART: [state] Locking Datavault
23,521,061 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,812 UART: [state] Locking ICCM
23,524,826 UART: [exit] Launching FMC @ 0x40000130
23,533,233 UART:
23,533,484 UART: Running Caliptra FMC ...
23,534,587 UART:
23,534,739 UART: [state] CFI Enabled
23,542,804 UART: [fht] FMC Alias Private Key: 7
25,874,053 UART: [art] Extend RT PCRs Done
25,875,284 UART: [art] Lock RT PCRs Done
25,876,853 UART: [art] Populate DV Done
25,881,989 UART: [fht] FMC Alias Private Key: 7
25,883,521 UART: [art] Derive CDI
25,884,277 UART: [art] Store in in slot 0x4
25,926,648 UART: [art] Derive Key Pair
25,927,680 UART: [art] Store priv key in slot 0x5
29,169,412 UART: [art] Derive Key Pair - Done
29,182,514 UART: [art] Signing Cert with AUTHO
29,183,812 UART: RITY.KEYID = 7
31,462,540 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,045 UART: [art] PUB.X = F8F8744701F22A0D1013EB7AC58A40A07DE756497D3571CF9D81387C9DB97F75435C970BB3086C5DDEC29443BB5094CD
31,471,302 UART: [art] PUB.Y = 0935E5276B33DA30E36EB11C1F761C3AC8CB96FC85C3EF581EE90F2AC7A139DF8143B3FB751451809F0B4C9877632EC1
31,478,578 UART: [art] SIG.R = A019B6FA72B35D28904034BBD65C49DE5FA9FE702445966A7506A10245DF7EB6897BD137BD12C2FCBD37642CFDCA5E50
31,485,948 UART: [art] SIG.S = 08B6CEC5389CA94B2930F091D4126366A25E2018F8E2F9B064304F44B31444DBF0756E26E65692F55F4D33C6CE51CBB4
32,790,723 UART: Caliptra RT
32,791,436 UART: [state] CFI Enabled
32,909,261 UART: [rt] RT listening for mailbox commands...
32,911,176 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,941,285 UART: [rt]cmd =0x44504543, len=40
32,967,423 >>> mbox cmd response data (40 bytes)
32,968,798 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,998,948 UART: [rt]cmd =0x44504543, len=40
33,021,248 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
4,129,500 ready_for_fw is high
4,130,051 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,083,537 >>> mbox cmd response: success
23,723,449 UART:
23,723,869 UART: Running Caliptra FMC ...
23,724,978 UART:
23,725,131 UART: [state] CFI Enabled
23,733,021 UART: [fht] FMC Alias Private Key: 7
26,064,215 UART: [art] Extend RT PCRs Done
26,065,441 UART: [art] Lock RT PCRs Done
26,067,068 UART: [art] Populate DV Done
26,072,622 UART: [fht] FMC Alias Private Key: 7
26,074,210 UART: [art] Derive CDI
26,075,033 UART: [art] Store in in slot 0x4
26,117,586 UART: [art] Derive Key Pair
26,118,587 UART: [art] Store priv key in slot 0x5
29,360,180 UART: [art] Derive Key Pair - Done
29,373,066 UART: [art] Signing Cert with AUTHO
29,374,375 UART: RITY.KEYID = 7
31,653,767 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,276 UART: [art] PUB.X = 4ECA1677D013EE7561F013A1B62F9B413E028C6638BF46A438A3E548A23F368E17C7A728B0A82BBC23DDC70828262EAB
31,662,564 UART: [art] PUB.Y = E09DD06D2A18FFDE3589359D15707E2630C6E8E06AB9CCEEDC405805D2F424300918ACB28326E685FEC6BEF73828094C
31,669,786 UART: [art] SIG.R = 259E9907729746285E1B4F119089CDF411D53CC89D14D3F3621B7B6F3530DEE3EB1392B0D48B6A14A13512015596BD45
31,677,208 UART: [art] SIG.S = 11F786E4E88D2E26B5B304AE16D5BE8C8FEC7FCD3C4199AB897A6F066F6DF6C3475AF3FA843B07820C93E8703D97CC2A
32,982,164 UART: Caliptra RT
32,982,862 UART: [state] CFI Enabled
33,100,727 UART: [rt] RT listening for mailbox commands...
33,102,662 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,132,978 UART: [rt]cmd =0x44504543, len=40
33,159,257 >>> mbox cmd response data (40 bytes)
33,160,520 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,190,457 UART: [rt]cmd =0x44504543, len=40
33,212,269 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,024 UART:
192,386 UART: Running Caliptra ROM ...
193,511 UART:
193,662 UART: [state] CFI Enabled
263,306 UART: [state] LifecycleState = Unprovisioned
265,218 UART: [state] DebugLocked = No
266,680 UART: [state] WD Timer not started. Device not locked for debugging
270,638 UART: [kat] SHA2-256
449,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,314 UART: [kat] ++
461,854 UART: [kat] sha1
471,881 UART: [kat] SHA2-256
474,886 UART: [kat] SHA2-384
480,374 UART: [kat] SHA2-512-ACC
483,305 UART: [kat] ECC-384
2,946,361 UART: [kat] HMAC-384Kdf
2,973,159 UART: [kat] LMS
3,502,564 UART: [kat] --
3,508,090 UART: [cold-reset] ++
3,509,606 UART: [fht] FHT @ 0x50003400
3,519,944 UART: [idev] ++
3,520,508 UART: [idev] CDI.KEYID = 6
3,521,417 UART: [idev] SUBJECT.KEYID = 7
3,522,662 UART: [idev] UDS.KEYID = 0
3,523,584 ready_for_fw is high
3,523,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,731 UART: [idev] Erasing UDS.KEYID = 0
6,026,962 UART: [idev] Sha1 KeyId Algorithm
6,051,052 UART: [idev] --
6,054,325 UART: [ldev] ++
6,054,910 UART: [ldev] CDI.KEYID = 6
6,055,795 UART: [ldev] SUBJECT.KEYID = 5
6,057,011 UART: [ldev] AUTHORITY.KEYID = 7
6,058,247 UART: [ldev] FE.KEYID = 1
6,101,324 UART: [ldev] Erasing FE.KEYID = 1
8,617,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,475 UART: [ldev] --
10,428,031 UART: [fwproc] Wait for Commands...
10,430,231 UART: [fwproc] Recv command 0x46574c44
10,432,323 UART: [fwproc] Recv'd Img size: 114448 bytes
13,840,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,914,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,983,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,301,829 >>> mbox cmd response: success
14,306,433 UART: [afmc] ++
14,307,029 UART: [afmc] CDI.KEYID = 6
14,307,963 UART: [afmc] SUBJECT.KEYID = 7
14,309,132 UART: [afmc] AUTHORITY.KEYID = 5
16,846,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,587,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,589,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,605,470 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,621,482 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,637,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,659,456 UART: [afmc] --
18,663,367 UART: [cold-reset] --
18,667,544 UART: [state] Locking Datavault
18,673,918 UART: [state] Locking PCR0, PCR1 and PCR31
18,675,574 UART: [state] Locking ICCM
18,678,079 UART: [exit] Launching FMC @ 0x40000130
18,686,475 UART:
18,686,724 UART: Running Caliptra FMC ...
18,687,847 UART:
18,688,014 UART: [state] CFI Enabled
18,747,023 UART: [fht] FMC Alias Private Key: 7
20,510,972 UART: [art] Extend RT PCRs Done
20,512,185 UART: [art] Lock RT PCRs Done
20,513,937 UART: [art] Populate DV Done
20,519,611 UART: [fht] FMC Alias Private Key: 7
20,521,246 UART: [art] Derive CDI
20,521,990 UART: [art] Store in in slot 0x4
20,579,191 UART: [art] Derive Key Pair
20,580,194 UART: [art] Store priv key in slot 0x5
23,043,236 UART: [art] Derive Key Pair - Done
23,056,275 UART: [art] Signing Cert with AUTHO
23,057,582 UART: RITY.KEYID = 7
24,768,315 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,816 UART: [art] PUB.X = 0D769963A170A3E504797FEE8D1F583F1941801B573FC23302C1680C60FF8E3F95F66BC1F844CFF3B089C5D1FBF30273
24,777,104 UART: [art] PUB.Y = 011E8B868959E75BD057AE7E03603D234A723D65EFA715575EE746E6100B25BA553562F6CAED2020769788B3A47E4C2D
24,784,297 UART: [art] SIG.R = 3CD2658F1D7C92722DAB2FBFE7D42E16664ABC035C1082CDDCA65E7E7496FFC9AFDE80A2E04BE0FA6D41B522A2234361
24,791,690 UART: [art] SIG.S = 427C41B12B0B66C3A7B5B03AF9F9BB75046D02814E20E8761DA63228F0DBF98974AEECFD604698E58637CF8AC721E6E9
25,770,761 UART: Caliptra RT
25,771,455 UART: [state] CFI Enabled
25,935,923 UART: [rt] RT listening for mailbox commands...
25,937,836 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,968,687 UART: [rt]cmd =0x44504543, len=40
26,010,753 >>> mbox cmd response data (40 bytes)
26,011,822 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,041,939 UART: [rt]cmd =0x44504543, len=40
26,064,544 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,381,598 ready_for_fw is high
3,381,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,342 >>> mbox cmd response: success
18,367,358 UART:
18,367,753 UART: Running Caliptra FMC ...
18,368,888 UART:
18,369,053 UART: [state] CFI Enabled
18,434,409 UART: [fht] FMC Alias Private Key: 7
20,198,515 UART: [art] Extend RT PCRs Done
20,199,728 UART: [art] Lock RT PCRs Done
20,201,564 UART: [art] Populate DV Done
20,207,131 UART: [fht] FMC Alias Private Key: 7
20,208,778 UART: [art] Derive CDI
20,209,591 UART: [art] Store in in slot 0x4
20,267,297 UART: [art] Derive Key Pair
20,268,330 UART: [art] Store priv key in slot 0x5
22,731,537 UART: [art] Derive Key Pair - Done
22,744,796 UART: [art] Signing Cert with AUTHO
22,746,088 UART: RITY.KEYID = 7
24,457,579 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,093 UART: [art] PUB.X = 3C0BB96C834A7FC1D0A55A00D09A1068ACB1832F9BFFB4EB1D0170CDFCE61312EE0637AD34CDC76229B33482C6FBBF60
24,466,338 UART: [art] PUB.Y = EB8D7078E35F26C71044F264811D044C67DB90FAED75C7B626EBC628443BE56121F6E0B0F092A99B8F54C5BB95A82302
24,473,614 UART: [art] SIG.R = 46AD9CFE0F3AFD64FC98A8E323F9C8549CA044ADF068B04337624E4EE71D7660A6B931E264A5C570549FB7CBB93732E1
24,481,007 UART: [art] SIG.S = B07945AF809CC6D572CDCD38C143B35FAA164548DAF4E272B4EAE405713D941E057FA60D56EBBA37EF97966A372CDF07
25,459,725 UART: Caliptra RT
25,460,432 UART: [state] CFI Enabled
25,626,066 UART: [rt] RT listening for mailbox commands...
25,627,997 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,658,833 UART: [rt]cmd =0x44504543, len=40
25,699,927 >>> mbox cmd response data (40 bytes)
25,701,092 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,731,095 UART: [rt]cmd =0x44504543, len=40
25,753,801 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,282 UART:
192,654 UART: Running Caliptra ROM ...
193,745 UART:
603,241 UART: [state] CFI Enabled
618,957 UART: [state] LifecycleState = Unprovisioned
620,837 UART: [state] DebugLocked = No
622,428 UART: [state] WD Timer not started. Device not locked for debugging
625,318 UART: [kat] SHA2-256
804,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,008 UART: [kat] ++
816,455 UART: [kat] sha1
827,193 UART: [kat] SHA2-256
830,246 UART: [kat] SHA2-384
836,308 UART: [kat] SHA2-512-ACC
839,237 UART: [kat] ECC-384
3,280,607 UART: [kat] HMAC-384Kdf
3,293,475 UART: [kat] LMS
3,822,956 UART: [kat] --
3,826,961 UART: [cold-reset] ++
3,829,474 UART: [fht] FHT @ 0x50003400
3,839,445 UART: [idev] ++
3,839,999 UART: [idev] CDI.KEYID = 6
3,840,898 UART: [idev] SUBJECT.KEYID = 7
3,842,136 UART: [idev] UDS.KEYID = 0
3,843,028 ready_for_fw is high
3,843,398 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,513 UART: [idev] Erasing UDS.KEYID = 0
6,315,249 UART: [idev] Sha1 KeyId Algorithm
6,338,378 UART: [idev] --
6,341,410 UART: [ldev] ++
6,342,018 UART: [ldev] CDI.KEYID = 6
6,342,934 UART: [ldev] SUBJECT.KEYID = 5
6,344,088 UART: [ldev] AUTHORITY.KEYID = 7
6,345,313 UART: [ldev] FE.KEYID = 1
6,357,133 UART: [ldev] Erasing FE.KEYID = 1
8,830,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,927 UART: [ldev] --
10,621,811 UART: [fwproc] Wait for Commands...
10,624,870 UART: [fwproc] Recv command 0x46574c44
10,626,952 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,490,414 >>> mbox cmd response: success
14,495,446 UART: [afmc] ++
14,496,052 UART: [afmc] CDI.KEYID = 6
14,496,932 UART: [afmc] SUBJECT.KEYID = 7
14,498,160 UART: [afmc] AUTHORITY.KEYID = 5
16,999,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,269 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,089 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,924 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,850 UART: [afmc] --
18,799,007 UART: [cold-reset] --
18,803,407 UART: [state] Locking Datavault
18,809,672 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,364 UART: [state] Locking ICCM
18,813,910 UART: [exit] Launching FMC @ 0x40000130
18,822,311 UART:
18,822,582 UART: Running Caliptra FMC ...
18,823,607 UART:
18,823,765 UART: [state] CFI Enabled
18,831,868 UART: [fht] FMC Alias Private Key: 7
20,589,147 UART: [art] Extend RT PCRs Done
20,590,358 UART: [art] Lock RT PCRs Done
20,592,052 UART: [art] Populate DV Done
20,597,511 UART: [fht] FMC Alias Private Key: 7
20,599,156 UART: [art] Derive CDI
20,599,884 UART: [art] Store in in slot 0x4
20,642,840 UART: [art] Derive Key Pair
20,643,831 UART: [art] Store priv key in slot 0x5
23,070,593 UART: [art] Derive Key Pair - Done
23,083,857 UART: [art] Signing Cert with AUTHO
23,085,152 UART: RITY.KEYID = 7
24,790,944 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,452 UART: [art] PUB.X = 50DC06F27593286E3A2830E2161F750DF552EE1A8B659474B96FEB94353F30FA6FFEFED7B3406D96BA54D056BE4D7FD1
24,799,729 UART: [art] PUB.Y = 8A260C19DF4156243E22E920086CC634890D6B148D27C045E73B23D2DB19E18635482D4D6CB35FA1A1CB00EE1DFBE369
24,807,008 UART: [art] SIG.R = DDB681243CA4DF11E723C89B9215652E2EFF79834B7F171304B311A303D7A7CEF3D46812BE39433C1FD28C40D66E4F7F
24,814,396 UART: [art] SIG.S = 74B405B5B6127A8B6524F7A254DE24EAF02AFD61BAD50AFC711D8C50476122ECE901858451FC5DA8ACE68BBF9EB8E578
25,793,694 UART: Caliptra RT
25,794,379 UART: [state] CFI Enabled
25,911,205 UART: [rt] RT listening for mailbox commands...
25,913,103 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,943,180 UART: [rt]cmd =0x44504543, len=40
25,969,244 >>> mbox cmd response data (40 bytes)
25,970,547 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,000,758 UART: [rt]cmd =0x44504543, len=40
26,023,633 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,692,878 ready_for_fw is high
3,693,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,258,997 >>> mbox cmd response: success
18,509,347 UART:
18,509,771 UART: Running Caliptra FMC ...
18,510,905 UART:
18,511,063 UART: [state] CFI Enabled
18,518,633 UART: [fht] FMC Alias Private Key: 7
20,274,701 UART: [art] Extend RT PCRs Done
20,275,934 UART: [art] Lock RT PCRs Done
20,277,894 UART: [art] Populate DV Done
20,282,991 UART: [fht] FMC Alias Private Key: 7
20,284,621 UART: [art] Derive CDI
20,285,436 UART: [art] Store in in slot 0x4
20,327,968 UART: [art] Derive Key Pair
20,328,960 UART: [art] Store priv key in slot 0x5
22,755,254 UART: [art] Derive Key Pair - Done
22,768,133 UART: [art] Signing Cert with AUTHO
22,769,472 UART: RITY.KEYID = 7
24,474,722 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,223 UART: [art] PUB.X = 30771F610D5F882BB08E7015D52EF4250C72C0340B516FD86C439B03379A29DB64C8AF7CE6B14E11EE73F078DF5ECEFA
24,483,506 UART: [art] PUB.Y = 80375D0460664E2C9E16E88D2A606100C93574AE24C31FC6E9C742CCC54922BF66DA9330E833F8ADEEB089183EC3F135
24,490,786 UART: [art] SIG.R = 23D2BDEF9493751AC76D48D9567D48C10544B418B28E95E3A2C16641A9AA8B25B2783F7522A62E0A2EFC47142DABAA02
24,498,145 UART: [art] SIG.S = 271AC44E658CCC09D35D7CAE9BA16B14D4BFA3BF9C69BD075011614BE12048AD4BCEDCE60AEB08DEC49286463EB9AAB4
25,477,048 UART: Caliptra RT
25,477,749 UART: [state] CFI Enabled
25,594,426 UART: [rt] RT listening for mailbox commands...
25,596,374 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,626,631 UART: [rt]cmd =0x44504543, len=40
25,653,160 >>> mbox cmd response data (40 bytes)
25,654,468 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,684,570 UART: [rt]cmd =0x44504543, len=40
25,707,142 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,440,433 ready_for_fw is high
3,440,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,750,402 >>> mbox cmd response: success
19,030,572 UART:
19,030,984 UART: Running Caliptra FMC ...
19,032,125 UART:
19,032,293 UART: [state] CFI Enabled
19,097,599 UART: [fht] FMC Alias Private Key: 7
20,861,002 UART: [art] Extend RT PCRs Done
20,862,225 UART: [art] Lock RT PCRs Done
20,864,231 UART: [art] Populate DV Done
20,869,645 UART: [fht] FMC Alias Private Key: 7
20,871,289 UART: [art] Derive CDI
20,872,105 UART: [art] Store in in slot 0x4
20,929,988 UART: [art] Derive Key Pair
20,931,029 UART: [art] Store priv key in slot 0x5
23,394,122 UART: [art] Derive Key Pair - Done
23,407,279 UART: [art] Signing Cert with AUTHO
23,408,585 UART: RITY.KEYID = 7
25,120,540 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,053 UART: [art] PUB.X = B56715E8FDB048E01CBFF91DF1D922A1EDBF9FDBFC42328EC024BE295EA7A543E45FDD3F106DB807825E1DC31EAB98B8
25,129,359 UART: [art] PUB.Y = 7A5D99DDDE29E44FACB1DC592C304D2230C0ACF28538BF329A403360511346376974E991D7EBF5D486F85C691D6D93B4
25,136,604 UART: [art] SIG.R = 873FA56D7F3F4793D696C7D7C7DC6EA63E3B22BD7D1A832291DF7E3BD517C60E3B8C65FB0BC032839ECDEC6138B5FFFB
25,144,050 UART: [art] SIG.S = AB98300FA96F44B434E68FEBC4AAB81571B3A20C4214502241147EB255F1AAB88EC75B7ADC46AEFA0555DB4E16AEDB5A
26,123,516 UART: Caliptra RT
26,124,230 UART: [state] CFI Enabled
26,289,305 UART: [rt] RT listening for mailbox commands...
26,291,358 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,322,130 UART: [rt]cmd =0x44504543, len=40
26,363,100 >>> mbox cmd response data (40 bytes)
26,364,278 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,394,460 UART: [rt]cmd =0x44504543, len=40
26,417,501 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,761,450 ready_for_fw is high
3,761,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,974,386 >>> mbox cmd response: success
19,227,681 UART:
19,228,069 UART: Running Caliptra FMC ...
19,229,225 UART:
19,229,385 UART: [state] CFI Enabled
19,237,378 UART: [fht] FMC Alias Private Key: 7
20,994,144 UART: [art] Extend RT PCRs Done
20,995,370 UART: [art] Lock RT PCRs Done
20,997,077 UART: [art] Populate DV Done
21,002,492 UART: [fht] FMC Alias Private Key: 7
21,003,984 UART: [art] Derive CDI
21,004,745 UART: [art] Store in in slot 0x4
21,047,176 UART: [art] Derive Key Pair
21,048,192 UART: [art] Store priv key in slot 0x5
23,474,559 UART: [art] Derive Key Pair - Done
23,487,492 UART: [art] Signing Cert with AUTHO
23,488,821 UART: RITY.KEYID = 7
25,194,471 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,979 UART: [art] PUB.X = 64232CF6789E7C098788F4B8B88087DA82061146C45CAC6D52E2498A4E479852DD5FBCA3EDBC156084EB5A69938D3758
25,203,278 UART: [art] PUB.Y = F4B60D7F1D9CE20ED85291B1CF13D919F01B5A10E05EFB8459003D30840D99FF853602B8279F287B4F3E18FF0B894C32
25,210,503 UART: [art] SIG.R = 703A5276092AE9FE2DD8FE9DE07AD393E6C7E0337BD584F95EC34ADB47957B955282FC93B2BCAFF3B71FCD0B5E2980FA
25,217,869 UART: [art] SIG.S = 7A69CBB00D1D47310411A89CEF347C8E6B4CD21603C7073D11F040463B7F8E130F86BCA5C160C16C59EC5A8F073543C9
26,196,895 UART: Caliptra RT
26,197,590 UART: [state] CFI Enabled
26,314,768 UART: [rt] RT listening for mailbox commands...
26,316,681 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,346,879 UART: [rt]cmd =0x44504543, len=40
26,373,280 >>> mbox cmd response data (40 bytes)
26,374,492 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,404,801 UART: [rt]cmd =0x44504543, len=40
26,427,315 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,351 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,953 UART: [kat] SHA2-256
881,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,999 UART: [kat] ++
886,151 UART: [kat] sha1
890,241 UART: [kat] SHA2-256
892,179 UART: [kat] SHA2-384
895,002 UART: [kat] SHA2-512-ACC
896,903 UART: [kat] ECC-384
902,332 UART: [kat] HMAC-384Kdf
906,804 UART: [kat] LMS
1,475,000 UART: [kat] --
1,475,705 UART: [cold-reset] ++
1,476,119 UART: [fht] Storing FHT @ 0x50003400
1,478,836 UART: [idev] ++
1,479,004 UART: [idev] CDI.KEYID = 6
1,479,364 UART: [idev] SUBJECT.KEYID = 7
1,479,788 UART: [idev] UDS.KEYID = 0
1,480,133 ready_for_fw is high
1,480,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,762 UART: [idev] Erasing UDS.KEYID = 0
1,503,810 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,230 UART: [idev] --
1,513,279 UART: [ldev] ++
1,513,447 UART: [ldev] CDI.KEYID = 6
1,513,810 UART: [ldev] SUBJECT.KEYID = 5
1,514,236 UART: [ldev] AUTHORITY.KEYID = 7
1,514,699 UART: [ldev] FE.KEYID = 1
1,519,981 UART: [ldev] Erasing FE.KEYID = 1
1,545,310 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,456 UART: [ldev] --
1,584,757 UART: [fwproc] Waiting for Commands...
1,585,472 UART: [fwproc] Received command 0x46574c44
1,586,263 UART: [fwproc] Received Image of size 114448 bytes
2,885,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,626 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,978 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,027 >>> mbox cmd response: success
3,079,053 UART: [afmc] ++
3,079,221 UART: [afmc] CDI.KEYID = 6
3,079,583 UART: [afmc] SUBJECT.KEYID = 7
3,080,008 UART: [afmc] AUTHORITY.KEYID = 5
3,115,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,413 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,806 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,496 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,267 UART: [afmc] --
3,158,179 UART: [cold-reset] --
3,158,977 UART: [state] Locking Datavault
3,160,268 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,872 UART: [state] Locking ICCM
3,161,376 UART: [exit] Launching FMC @ 0x40000130
3,166,705 UART:
3,166,721 UART: Running Caliptra FMC ...
3,167,129 UART:
3,167,183 UART: [state] CFI Enabled
3,177,560 UART: [fht] FMC Alias Private Key: 7
3,285,545 UART: [art] Extend RT PCRs Done
3,285,973 UART: [art] Lock RT PCRs Done
3,287,499 UART: [art] Populate DV Done
3,295,912 UART: [fht] FMC Alias Private Key: 7
3,296,920 UART: [art] Derive CDI
3,297,200 UART: [art] Store in in slot 0x4
3,382,547 UART: [art] Derive Key Pair
3,382,907 UART: [art] Store priv key in slot 0x5
3,396,157 UART: [art] Derive Key Pair - Done
3,411,338 UART: [art] Signing Cert with AUTHO
3,411,818 UART: RITY.KEYID = 7
3,426,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,425 UART: [art] PUB.X = F71B795E49065D8E4FC61E98B4DE1B95C380B09B28C74505151A3F9CB42610A5845F552D93C536E4AA9C744C5F196AD6
3,434,191 UART: [art] PUB.Y = 4B5EDFAFDDCBE29575A0F21D44D934C2BC9B911E87F31B6F206D6754E0869A5CC22C587E1B771EA038EB9E9ED031FBC9
3,441,161 UART: [art] SIG.R = 985077EDC4F4DA66CDF32EAFE414475F25FB7EA7458A507C049077F0A91487F4F2197960DF9EB95341816483B20D0E59
3,447,922 UART: [art] SIG.S = 8A7DC14DB00A42C7CCD029C20DC6E2BABB08474CE3D9B9A61641A116CA3C5003F09CA299ED55ADCFBBC5E5122AFAFC30
3,471,545 UART: Caliptra RT
3,471,798 UART: [state] CFI Enabled
3,580,028 UART: [rt] RT listening for mailbox commands...
3,580,698 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,588 UART: [rt]cmd =0x44504543, len=40
3,637,176 >>> mbox cmd response data (40 bytes)
3,637,177 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,700 UART: [rt]cmd =0x44504543, len=40
3,689,290 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,107 ready_for_fw is high
1,362,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,915 >>> mbox cmd response: success
2,989,505 UART:
2,989,521 UART: Running Caliptra FMC ...
2,989,929 UART:
2,989,983 UART: [state] CFI Enabled
3,000,704 UART: [fht] FMC Alias Private Key: 7
3,109,179 UART: [art] Extend RT PCRs Done
3,109,607 UART: [art] Lock RT PCRs Done
3,110,779 UART: [art] Populate DV Done
3,119,164 UART: [fht] FMC Alias Private Key: 7
3,120,194 UART: [art] Derive CDI
3,120,474 UART: [art] Store in in slot 0x4
3,206,087 UART: [art] Derive Key Pair
3,206,447 UART: [art] Store priv key in slot 0x5
3,219,495 UART: [art] Derive Key Pair - Done
3,234,498 UART: [art] Signing Cert with AUTHO
3,234,978 UART: RITY.KEYID = 7
3,250,314 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,079 UART: [art] PUB.X = 82102B8C612B1AE4E8CB2C5C1EDA1A9287E22F2AD49BC4760086E6F7A6AE71FECC5D20CD2A8193C4C4187A181B335D79
3,257,841 UART: [art] PUB.Y = FDF9ACDAF271F025946842529AB3C28785464FB20E35C6FB231EC3AD764CA714192E5024B031C0D7B6582377AB40CC0D
3,264,791 UART: [art] SIG.R = DED58DE37DC1DD7008EDA7EC61922CCC10017D601D81A7D626B680E3EE7F2B2B77835714F188DE2546712BA1CB7BC70D
3,271,566 UART: [art] SIG.S = EF1AD4DF482D7FD95C2707426CFABC1FE7AB07D63FD61768D193879F1DA7917EB749724B174C0EDB0B0749FAD7345781
3,295,702 UART: Caliptra RT
3,295,955 UART: [state] CFI Enabled
3,404,583 UART: [rt] RT listening for mailbox commands...
3,405,253 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,381 UART: [rt]cmd =0x44504543, len=40
3,461,769 >>> mbox cmd response data (40 bytes)
3,461,770 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,179 UART: [rt]cmd =0x44504543, len=40
3,513,683 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,918 UART: [kat] SHA2-256
881,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,964 UART: [kat] ++
886,116 UART: [kat] sha1
890,398 UART: [kat] SHA2-256
892,336 UART: [kat] SHA2-384
895,215 UART: [kat] SHA2-512-ACC
897,116 UART: [kat] ECC-384
903,061 UART: [kat] HMAC-384Kdf
907,585 UART: [kat] LMS
1,475,781 UART: [kat] --
1,476,530 UART: [cold-reset] ++
1,476,872 UART: [fht] Storing FHT @ 0x50003400
1,479,485 UART: [idev] ++
1,479,653 UART: [idev] CDI.KEYID = 6
1,480,013 UART: [idev] SUBJECT.KEYID = 7
1,480,437 UART: [idev] UDS.KEYID = 0
1,480,782 ready_for_fw is high
1,480,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,389 UART: [idev] Erasing UDS.KEYID = 0
1,504,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,597 UART: [idev] --
1,514,584 UART: [ldev] ++
1,514,752 UART: [ldev] CDI.KEYID = 6
1,515,115 UART: [ldev] SUBJECT.KEYID = 5
1,515,541 UART: [ldev] AUTHORITY.KEYID = 7
1,516,004 UART: [ldev] FE.KEYID = 1
1,521,196 UART: [ldev] Erasing FE.KEYID = 1
1,546,859 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,929 UART: [ldev] --
1,586,240 UART: [fwproc] Waiting for Commands...
1,587,101 UART: [fwproc] Received command 0x46574c44
1,587,892 UART: [fwproc] Received Image of size 114448 bytes
2,887,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,579 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,012 >>> mbox cmd response: success
3,080,024 UART: [afmc] ++
3,080,192 UART: [afmc] CDI.KEYID = 6
3,080,554 UART: [afmc] SUBJECT.KEYID = 7
3,080,979 UART: [afmc] AUTHORITY.KEYID = 5
3,116,316 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,632 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,140 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,025 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,715 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,608 UART: [afmc] --
3,159,488 UART: [cold-reset] --
3,160,606 UART: [state] Locking Datavault
3,161,663 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,267 UART: [state] Locking ICCM
3,162,839 UART: [exit] Launching FMC @ 0x40000130
3,168,168 UART:
3,168,184 UART: Running Caliptra FMC ...
3,168,592 UART:
3,168,735 UART: [state] CFI Enabled
3,179,304 UART: [fht] FMC Alias Private Key: 7
3,287,191 UART: [art] Extend RT PCRs Done
3,287,619 UART: [art] Lock RT PCRs Done
3,289,163 UART: [art] Populate DV Done
3,297,578 UART: [fht] FMC Alias Private Key: 7
3,298,708 UART: [art] Derive CDI
3,298,988 UART: [art] Store in in slot 0x4
3,384,827 UART: [art] Derive Key Pair
3,385,187 UART: [art] Store priv key in slot 0x5
3,397,777 UART: [art] Derive Key Pair - Done
3,412,333 UART: [art] Signing Cert with AUTHO
3,412,813 UART: RITY.KEYID = 7
3,427,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,542 UART: [art] PUB.X = 3843AB824C1A069CFE81C376AA842011645CF1B7453AA56E71D9663D8FD4D0CD3412F2277398027F0D8AFA12560EDB3C
3,435,304 UART: [art] PUB.Y = B5F2D732916F0ECCBD3CE6C8D2B4BB629CC7CECA847AE7507389EB22F641BC073373D86D61F37570BBC50F67DABA9C89
3,442,265 UART: [art] SIG.R = 9775B11E04681561E9B44672A5F7E57097071B812BD36677794B6F97D296F5D967BC851903AE55A22CBEC1FFDB660302
3,449,014 UART: [art] SIG.S = B38E70E5B4B5FB78C6F956250F8421AA50D4298A6BE2C39241412E22E5DF4B840F334B3145E9F5828C0F660B67596FF7
3,472,387 UART: Caliptra RT
3,472,732 UART: [state] CFI Enabled
3,580,860 UART: [rt] RT listening for mailbox commands...
3,581,530 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,504 UART: [rt]cmd =0x44504543, len=40
3,637,340 >>> mbox cmd response data (40 bytes)
3,637,341 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,016 UART: [rt]cmd =0x44504543, len=40
3,689,620 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,038 ready_for_fw is high
1,363,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,878 >>> mbox cmd response: success
2,990,288 UART:
2,990,304 UART: Running Caliptra FMC ...
2,990,712 UART:
2,990,855 UART: [state] CFI Enabled
3,001,602 UART: [fht] FMC Alias Private Key: 7
3,109,025 UART: [art] Extend RT PCRs Done
3,109,453 UART: [art] Lock RT PCRs Done
3,110,835 UART: [art] Populate DV Done
3,119,246 UART: [fht] FMC Alias Private Key: 7
3,120,364 UART: [art] Derive CDI
3,120,644 UART: [art] Store in in slot 0x4
3,205,943 UART: [art] Derive Key Pair
3,206,303 UART: [art] Store priv key in slot 0x5
3,219,571 UART: [art] Derive Key Pair - Done
3,234,332 UART: [art] Signing Cert with AUTHO
3,234,812 UART: RITY.KEYID = 7
3,249,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,485 UART: [art] PUB.X = C4EBBAA9F46F8B9F5FA80D04A0C5469CD197CAE566149479864B257466B8DD35DFA59E84260922B805A29CFED8E52A83
3,257,253 UART: [art] PUB.Y = B7DF693092B7A7A36D0E631AC5A4E275BF90B1637356C93D0660368765791E552C4F16B2DE5F2FE4F2B81B70E8007A01
3,264,172 UART: [art] SIG.R = EECD9B88F61FB99A7A640F728D9EEF16E563592F6AF6A3E3511780FCFC5AFDC9191C5FC2E6EB84A2E85A4F29B6C035A6
3,270,961 UART: [art] SIG.S = A07D86D298D2B7E822D3C70E5316C73CB71BBF16606CA5B7A27BFE91B1C1A599A6213E2CCA1BF65010543E5F4D4F412C
3,294,541 UART: Caliptra RT
3,294,886 UART: [state] CFI Enabled
3,403,140 UART: [rt] RT listening for mailbox commands...
3,403,810 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,790 UART: [rt]cmd =0x44504543, len=40
3,460,504 >>> mbox cmd response data (40 bytes)
3,460,505 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,324 UART: [rt]cmd =0x44504543, len=40
3,513,032 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
893,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,193 UART: [kat] ++
897,345 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,498 UART: [kat] SHA2-512-ACC
908,399 UART: [kat] ECC-384
918,542 UART: [kat] HMAC-384Kdf
923,068 UART: [kat] LMS
1,171,396 UART: [kat] --
1,172,385 UART: [cold-reset] ++
1,172,827 UART: [fht] FHT @ 0x50003400
1,175,264 UART: [idev] ++
1,175,432 UART: [idev] CDI.KEYID = 6
1,175,792 UART: [idev] SUBJECT.KEYID = 7
1,176,216 UART: [idev] UDS.KEYID = 0
1,176,561 ready_for_fw is high
1,176,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,266 UART: [idev] Erasing UDS.KEYID = 0
1,201,237 UART: [idev] Sha1 KeyId Algorithm
1,209,805 UART: [idev] --
1,210,697 UART: [ldev] ++
1,210,865 UART: [ldev] CDI.KEYID = 6
1,211,228 UART: [ldev] SUBJECT.KEYID = 5
1,211,654 UART: [ldev] AUTHORITY.KEYID = 7
1,212,117 UART: [ldev] FE.KEYID = 1
1,217,335 UART: [ldev] Erasing FE.KEYID = 1
1,243,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,741 UART: [ldev] --
1,283,156 UART: [fwproc] Wait for Commands...
1,283,878 UART: [fwproc] Recv command 0x46574c44
1,284,606 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,973 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,220 >>> mbox cmd response: success
2,777,372 UART: [afmc] ++
2,777,540 UART: [afmc] CDI.KEYID = 6
2,777,902 UART: [afmc] SUBJECT.KEYID = 7
2,778,327 UART: [afmc] AUTHORITY.KEYID = 5
2,813,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,235 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,963 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,848 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,567 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,461 UART: [afmc] --
2,857,393 UART: [cold-reset] --
2,858,119 UART: [state] Locking Datavault
2,859,020 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,624 UART: [state] Locking ICCM
2,860,148 UART: [exit] Launching FMC @ 0x40000130
2,865,477 UART:
2,865,493 UART: Running Caliptra FMC ...
2,865,901 UART:
2,865,955 UART: [state] CFI Enabled
2,876,618 UART: [fht] FMC Alias Private Key: 7
2,984,157 UART: [art] Extend RT PCRs Done
2,984,585 UART: [art] Lock RT PCRs Done
2,986,029 UART: [art] Populate DV Done
2,994,298 UART: [fht] FMC Alias Private Key: 7
2,995,378 UART: [art] Derive CDI
2,995,658 UART: [art] Store in in slot 0x4
3,080,919 UART: [art] Derive Key Pair
3,081,279 UART: [art] Store priv key in slot 0x5
3,094,519 UART: [art] Derive Key Pair - Done
3,109,334 UART: [art] Signing Cert with AUTHO
3,109,814 UART: RITY.KEYID = 7
3,125,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,247 UART: [art] PUB.X = B4AEA0F791CBF9731D6DA8934908959744DE73C6B418AE2E8170DEFA12528DC73724AA561BF3787B9073F294CEF84791
3,133,018 UART: [art] PUB.Y = CD58B3D77A8A5FBF1F7155CDD629D94DBB37375191F068B84BF5A2DE57875101577BFFC2F8111CA549361F70221E87F3
3,139,971 UART: [art] SIG.R = 8158A94F7F581210E8434C5D43575594FD10008006F4DA8E9C47340E0822D120652FA105FEA2576BA57E1A3622FAF75B
3,146,701 UART: [art] SIG.S = EBF1C0EEEFB219FE7DBC19241F24C78E07561A6F03D0911BFBDB2492A3B7931F008F30DC35AADF48250257E13742E02F
3,170,519 UART: Caliptra RT
3,170,772 UART: [state] CFI Enabled
3,278,066 UART: [rt] RT listening for mailbox commands...
3,278,736 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,736 UART: [rt]cmd =0x44504543, len=40
3,334,574 >>> mbox cmd response data (40 bytes)
3,334,575 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,232 UART: [rt]cmd =0x44504543, len=40
3,387,360 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,885 ready_for_fw is high
1,060,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,525 >>> mbox cmd response: success
2,690,353 UART:
2,690,369 UART: Running Caliptra FMC ...
2,690,777 UART:
2,690,831 UART: [state] CFI Enabled
2,701,244 UART: [fht] FMC Alias Private Key: 7
2,809,439 UART: [art] Extend RT PCRs Done
2,809,867 UART: [art] Lock RT PCRs Done
2,811,331 UART: [art] Populate DV Done
2,819,168 UART: [fht] FMC Alias Private Key: 7
2,820,260 UART: [art] Derive CDI
2,820,540 UART: [art] Store in in slot 0x4
2,906,387 UART: [art] Derive Key Pair
2,906,747 UART: [art] Store priv key in slot 0x5
2,919,625 UART: [art] Derive Key Pair - Done
2,934,611 UART: [art] Signing Cert with AUTHO
2,935,091 UART: RITY.KEYID = 7
2,949,803 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,568 UART: [art] PUB.X = 477F13B400C562071AE7A1A8AF25D8D55CB4836ED29A4DBA1AA00ECE17F944EB3801FBA0534577F1A8899F95DB3868EA
2,957,319 UART: [art] PUB.Y = C4A41933DA9553DA9E7ADC56B99C0C44BF74CBFD22FCE3D08219940183B5B32F94F8CF79D68EDB054BB0DE24FAE94E1A
2,964,282 UART: [art] SIG.R = 57056EDAEF325E3FDC3D7B1DBBECBA7E06A17AE1521A122AC1676540743CC1133FCBB9DC7345D82F092A3C73F799E6AF
2,971,063 UART: [art] SIG.S = 550CEF5A9860091F6659871418CC891F462C458FD52174A843A646537C5C3D3E0B20A1E8819AB15CA6E2FDA5C9E915E7
2,994,885 UART: Caliptra RT
2,995,138 UART: [state] CFI Enabled
3,101,757 UART: [rt] RT listening for mailbox commands...
3,102,427 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,435 UART: [rt]cmd =0x44504543, len=40
3,158,641 >>> mbox cmd response data (40 bytes)
3,158,642 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,323 UART: [rt]cmd =0x44504543, len=40
3,211,193 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,831 UART: [state] LifecycleState = Unprovisioned
85,486 UART: [state] DebugLocked = No
86,052 UART: [state] WD Timer not started. Device not locked for debugging
87,267 UART: [kat] SHA2-256
892,917 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,042 UART: [kat] ++
897,194 UART: [kat] sha1
901,454 UART: [kat] SHA2-256
903,394 UART: [kat] SHA2-384
906,031 UART: [kat] SHA2-512-ACC
907,932 UART: [kat] ECC-384
917,933 UART: [kat] HMAC-384Kdf
922,581 UART: [kat] LMS
1,170,909 UART: [kat] --
1,171,756 UART: [cold-reset] ++
1,172,126 UART: [fht] FHT @ 0x50003400
1,174,723 UART: [idev] ++
1,174,891 UART: [idev] CDI.KEYID = 6
1,175,251 UART: [idev] SUBJECT.KEYID = 7
1,175,675 UART: [idev] UDS.KEYID = 0
1,176,020 ready_for_fw is high
1,176,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,425 UART: [idev] Erasing UDS.KEYID = 0
1,201,126 UART: [idev] Sha1 KeyId Algorithm
1,209,734 UART: [idev] --
1,210,866 UART: [ldev] ++
1,211,034 UART: [ldev] CDI.KEYID = 6
1,211,397 UART: [ldev] SUBJECT.KEYID = 5
1,211,823 UART: [ldev] AUTHORITY.KEYID = 7
1,212,286 UART: [ldev] FE.KEYID = 1
1,217,644 UART: [ldev] Erasing FE.KEYID = 1
1,243,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,830 UART: [ldev] --
1,283,117 UART: [fwproc] Wait for Commands...
1,283,715 UART: [fwproc] Recv command 0x46574c44
1,284,443 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,556 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,841 >>> mbox cmd response: success
2,777,035 UART: [afmc] ++
2,777,203 UART: [afmc] CDI.KEYID = 6
2,777,565 UART: [afmc] SUBJECT.KEYID = 7
2,777,990 UART: [afmc] AUTHORITY.KEYID = 5
2,813,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,920 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,805 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,190 UART: [afmc] --
2,857,218 UART: [cold-reset] --
2,858,118 UART: [state] Locking Datavault
2,859,149 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,753 UART: [state] Locking ICCM
2,860,317 UART: [exit] Launching FMC @ 0x40000130
2,865,646 UART:
2,865,662 UART: Running Caliptra FMC ...
2,866,070 UART:
2,866,213 UART: [state] CFI Enabled
2,876,512 UART: [fht] FMC Alias Private Key: 7
2,984,101 UART: [art] Extend RT PCRs Done
2,984,529 UART: [art] Lock RT PCRs Done
2,986,037 UART: [art] Populate DV Done
2,994,334 UART: [fht] FMC Alias Private Key: 7
2,995,442 UART: [art] Derive CDI
2,995,722 UART: [art] Store in in slot 0x4
3,081,489 UART: [art] Derive Key Pair
3,081,849 UART: [art] Store priv key in slot 0x5
3,095,037 UART: [art] Derive Key Pair - Done
3,109,771 UART: [art] Signing Cert with AUTHO
3,110,251 UART: RITY.KEYID = 7
3,125,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,422 UART: [art] PUB.X = A81B0106EB8D9CF501D51768B4ACC06D183175B5696A2EC7ED348F359DA1072475F35D73C591246929FED279BB3C3F32
3,133,182 UART: [art] PUB.Y = 617113EDDB18C9CB68F56A1A68F006814D7CBCF0D7C3C94E6ABDA54E7A2590FD027B1A3E83A372D36C6C04C3AABD9060
3,140,141 UART: [art] SIG.R = 1F08685C04BA6AD6721C3A8A9AFF12ABB2550D8F542CD8EF916C832B38613346785F88D4B8CCE89AEE6E961B5E1221D2
3,146,912 UART: [art] SIG.S = 103EC10E5713F841201F7498A3D4B9DF196332F105C857CD991938418513A9177F4B84E81FC72C2CCD2FE1CED275ECBC
3,171,289 UART: Caliptra RT
3,171,634 UART: [state] CFI Enabled
3,278,853 UART: [rt] RT listening for mailbox commands...
3,279,523 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,443 UART: [rt]cmd =0x44504543, len=40
3,335,469 >>> mbox cmd response data (40 bytes)
3,335,470 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,897 UART: [rt]cmd =0x44504543, len=40
3,387,653 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,908 ready_for_fw is high
1,060,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,132 >>> mbox cmd response: success
2,692,354 UART:
2,692,370 UART: Running Caliptra FMC ...
2,692,778 UART:
2,692,921 UART: [state] CFI Enabled
2,703,744 UART: [fht] FMC Alias Private Key: 7
2,811,477 UART: [art] Extend RT PCRs Done
2,811,905 UART: [art] Lock RT PCRs Done
2,813,363 UART: [art] Populate DV Done
2,821,394 UART: [fht] FMC Alias Private Key: 7
2,822,376 UART: [art] Derive CDI
2,822,656 UART: [art] Store in in slot 0x4
2,908,181 UART: [art] Derive Key Pair
2,908,541 UART: [art] Store priv key in slot 0x5
2,922,327 UART: [art] Derive Key Pair - Done
2,936,998 UART: [art] Signing Cert with AUTHO
2,937,478 UART: RITY.KEYID = 7
2,952,836 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,601 UART: [art] PUB.X = 6AF8120A0AFD7935B687F37E4C7A1E2B427B7B768DAD5FC3E6D0E3798C848202F6371B59E95A7E6F9A1066574D93D5C1
2,960,368 UART: [art] PUB.Y = A6200FF7748AD26A011E10D547FADA6EDB5E3D80732153E9962B419DB97F83717511D0CC861B111D6BB039FA2C02B648
2,967,313 UART: [art] SIG.R = FC29A6B0CDFBC1A3D8A8A028124FF2E89109100560CA42C9F909153AB252CD00C5ED4220455D0E07DE5897BDE030735E
2,974,054 UART: [art] SIG.S = 83E61EC0252EF7561FFD741EFC29D2FC39CD5258ED92269D1947E9ED81159F2FF955553EC7C28F8AA1AD75803EE4F9C5
2,997,889 UART: Caliptra RT
2,998,234 UART: [state] CFI Enabled
3,106,422 UART: [rt] RT listening for mailbox commands...
3,107,092 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,148 UART: [rt]cmd =0x44504543, len=40
3,163,574 >>> mbox cmd response data (40 bytes)
3,163,575 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,908 UART: [rt]cmd =0x44504543, len=40
3,215,484 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
86,039 UART: [state] WD Timer not started. Device not locked for debugging
87,206 UART: [kat] SHA2-256
890,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,885 UART: [kat] ++
895,037 UART: [kat] sha1
899,287 UART: [kat] SHA2-256
901,227 UART: [kat] SHA2-384
903,940 UART: [kat] SHA2-512-ACC
905,841 UART: [kat] ECC-384
915,436 UART: [kat] HMAC-384Kdf
919,828 UART: [kat] LMS
1,168,140 UART: [kat] --
1,168,879 UART: [cold-reset] ++
1,169,367 UART: [fht] FHT @ 0x50003400
1,171,853 UART: [idev] ++
1,172,021 UART: [idev] CDI.KEYID = 6
1,172,382 UART: [idev] SUBJECT.KEYID = 7
1,172,807 UART: [idev] UDS.KEYID = 0
1,173,153 ready_for_fw is high
1,173,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,105 UART: [idev] Erasing UDS.KEYID = 0
1,197,819 UART: [idev] Sha1 KeyId Algorithm
1,206,697 UART: [idev] --
1,207,912 UART: [ldev] ++
1,208,080 UART: [ldev] CDI.KEYID = 6
1,208,444 UART: [ldev] SUBJECT.KEYID = 5
1,208,871 UART: [ldev] AUTHORITY.KEYID = 7
1,209,334 UART: [ldev] FE.KEYID = 1
1,214,424 UART: [ldev] Erasing FE.KEYID = 1
1,241,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,270 UART: [ldev] --
1,280,738 UART: [fwproc] Wait for Commands...
1,281,395 UART: [fwproc] Recv command 0x46574c44
1,282,128 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,776 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,045 >>> mbox cmd response: success
2,774,176 UART: [afmc] ++
2,774,344 UART: [afmc] CDI.KEYID = 6
2,774,707 UART: [afmc] SUBJECT.KEYID = 7
2,775,133 UART: [afmc] AUTHORITY.KEYID = 5
2,810,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,431 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,160 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,043 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,762 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,813 UART: [afmc] --
2,853,925 UART: [cold-reset] --
2,854,831 UART: [state] Locking Datavault
2,855,778 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,382 UART: [state] Locking ICCM
2,856,972 UART: [exit] Launching FMC @ 0x40000130
2,862,301 UART:
2,862,317 UART: Running Caliptra FMC ...
2,862,725 UART:
2,862,779 UART: [state] CFI Enabled
2,873,478 UART: [fht] FMC Alias Private Key: 7
2,981,623 UART: [art] Extend RT PCRs Done
2,982,051 UART: [art] Lock RT PCRs Done
2,983,729 UART: [art] Populate DV Done
2,991,928 UART: [fht] FMC Alias Private Key: 7
2,993,094 UART: [art] Derive CDI
2,993,374 UART: [art] Store in in slot 0x4
3,079,141 UART: [art] Derive Key Pair
3,079,501 UART: [art] Store priv key in slot 0x5
3,093,145 UART: [art] Derive Key Pair - Done
3,107,681 UART: [art] Signing Cert with AUTHO
3,108,161 UART: RITY.KEYID = 7
3,123,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,910 UART: [art] PUB.X = 9093570DF7A27EE880E4570F4B6281C3E319CC306B55B570EB0E5E69A1E2C4E1A0EC6FD4C0816782B773E50407DB2A3B
3,130,671 UART: [art] PUB.Y = 6787D106AA964C2BE73C97FA28AED8228196FC76175559B1A1AB66F5459796EA9BF37ECDA9C4A65FC4354179BD9481D9
3,137,624 UART: [art] SIG.R = C959FE491B420659DC6D0F63B6180648C93D9CC8B85653BFC53FB0DA4DDFFF100AB99A52E06CE8BC890A889D262AA162
3,144,393 UART: [art] SIG.S = 466583E9BB1114B2BBCB8852F344AF6851EF4C49EB949108940C2B70157181E7A12DB93FC5F18496A6D7ED6D13883CCD
3,168,294 UART: Caliptra RT
3,168,547 UART: [state] CFI Enabled
3,276,000 UART: [rt] RT listening for mailbox commands...
3,276,670 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,698 UART: [rt]cmd =0x44504543, len=40
3,332,926 >>> mbox cmd response data (40 bytes)
3,332,927 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,616 UART: [rt]cmd =0x44504543, len=40
3,385,152 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,666 ready_for_fw is high
1,055,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,620,872 >>> mbox cmd response: success
2,682,782 UART:
2,682,798 UART: Running Caliptra FMC ...
2,683,206 UART:
2,683,260 UART: [state] CFI Enabled
2,693,697 UART: [fht] FMC Alias Private Key: 7
2,801,860 UART: [art] Extend RT PCRs Done
2,802,288 UART: [art] Lock RT PCRs Done
2,804,022 UART: [art] Populate DV Done
2,812,201 UART: [fht] FMC Alias Private Key: 7
2,813,327 UART: [art] Derive CDI
2,813,607 UART: [art] Store in in slot 0x4
2,898,970 UART: [art] Derive Key Pair
2,899,330 UART: [art] Store priv key in slot 0x5
2,912,484 UART: [art] Derive Key Pair - Done
2,927,353 UART: [art] Signing Cert with AUTHO
2,927,833 UART: RITY.KEYID = 7
2,943,071 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,836 UART: [art] PUB.X = 0E6819D7E3C241D141EF088EA25507DCA6E2BA531EDA1DE91A1E4A03A2D09CB3CE34E906C870CB09AEA15AFD5406A372
2,950,603 UART: [art] PUB.Y = 04836D4753894CA8B1AE4D478FC90E1E77496DCBD465D33305B0D3085FCF7667AFE146BCCC87CCB80E98CA1DA085F80B
2,957,549 UART: [art] SIG.R = 581DE4D607CECB4D90FFB98437BFD562E33D9EF3F21FF1C4B1E526C130AFCE3E9DA4B267F0BC32F4CB3F6BE271EA621E
2,964,344 UART: [art] SIG.S = ED4D8063374F337DF62E09EA0D2959EADEB900AC0FF9735862D9C18C0CFAEA30B13631B08A7BAA8E45C3E9933FB62D4D
2,988,107 UART: Caliptra RT
2,988,360 UART: [state] CFI Enabled
3,096,045 UART: [rt] RT listening for mailbox commands...
3,096,715 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,895 UART: [rt]cmd =0x44504543, len=40
3,152,779 >>> mbox cmd response data (40 bytes)
3,152,780 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,319 UART: [rt]cmd =0x44504543, len=40
3,205,051 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,901 UART: [kat] HMAC-384Kdf
921,479 UART: [kat] LMS
1,169,791 UART: [kat] --
1,170,560 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,522 UART: [idev] ++
1,173,690 UART: [idev] CDI.KEYID = 6
1,174,051 UART: [idev] SUBJECT.KEYID = 7
1,174,476 UART: [idev] UDS.KEYID = 0
1,174,822 ready_for_fw is high
1,174,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,504 UART: [idev] Erasing UDS.KEYID = 0
1,199,622 UART: [idev] Sha1 KeyId Algorithm
1,208,440 UART: [idev] --
1,209,495 UART: [ldev] ++
1,209,663 UART: [ldev] CDI.KEYID = 6
1,210,027 UART: [ldev] SUBJECT.KEYID = 5
1,210,454 UART: [ldev] AUTHORITY.KEYID = 7
1,210,917 UART: [ldev] FE.KEYID = 1
1,216,179 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,281 UART: [ldev] --
1,282,641 UART: [fwproc] Wait for Commands...
1,283,252 UART: [fwproc] Recv command 0x46574c44
1,283,985 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,794 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,075 >>> mbox cmd response: success
2,775,172 UART: [afmc] ++
2,775,340 UART: [afmc] CDI.KEYID = 6
2,775,703 UART: [afmc] SUBJECT.KEYID = 7
2,776,129 UART: [afmc] AUTHORITY.KEYID = 5
2,811,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,238 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,989 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,718 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,601 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,320 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,099 UART: [afmc] --
2,855,199 UART: [cold-reset] --
2,856,043 UART: [state] Locking Datavault
2,857,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,796 UART: [state] Locking ICCM
2,858,248 UART: [exit] Launching FMC @ 0x40000130
2,863,577 UART:
2,863,593 UART: Running Caliptra FMC ...
2,864,001 UART:
2,864,144 UART: [state] CFI Enabled
2,875,055 UART: [fht] FMC Alias Private Key: 7
2,983,178 UART: [art] Extend RT PCRs Done
2,983,606 UART: [art] Lock RT PCRs Done
2,985,178 UART: [art] Populate DV Done
2,993,537 UART: [fht] FMC Alias Private Key: 7
2,994,575 UART: [art] Derive CDI
2,994,855 UART: [art] Store in in slot 0x4
3,080,474 UART: [art] Derive Key Pair
3,080,834 UART: [art] Store priv key in slot 0x5
3,094,262 UART: [art] Derive Key Pair - Done
3,109,127 UART: [art] Signing Cert with AUTHO
3,109,607 UART: RITY.KEYID = 7
3,124,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,364 UART: [art] PUB.X = 07E73313DC517E1DC0943742545513222953FE2156035F984D4A82C5F8410E8C2E215424BE36C595C231C0882D337C66
3,132,109 UART: [art] PUB.Y = FE4E90F9021239945B530001ECFA85CDC291BE06A6071FD52E891234DCDB90D92A8B7504BD8A9933E7FFDA1AE9D5D308
3,139,031 UART: [art] SIG.R = 820A8C7C90A2609626A384DBF166C5B17C86211B791204433AD891F91B205253C9B343D196EDA05EF08DE432FA0AFCA6
3,145,794 UART: [art] SIG.S = 685616266D02CDADAAD9EB1EAFDABD91BD4552FBF6BEE698F2FF410D583945BB3BBECDA4396B747C139F2BA7DC20C24D
3,169,633 UART: Caliptra RT
3,169,978 UART: [state] CFI Enabled
3,278,439 UART: [rt] RT listening for mailbox commands...
3,279,109 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,245 UART: [rt]cmd =0x44504543, len=40
3,335,373 >>> mbox cmd response data (40 bytes)
3,335,374 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,815 UART: [rt]cmd =0x44504543, len=40
3,388,275 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,607 ready_for_fw is high
1,055,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,793 >>> mbox cmd response: success
2,685,805 UART:
2,685,821 UART: Running Caliptra FMC ...
2,686,229 UART:
2,686,372 UART: [state] CFI Enabled
2,697,289 UART: [fht] FMC Alias Private Key: 7
2,804,822 UART: [art] Extend RT PCRs Done
2,805,250 UART: [art] Lock RT PCRs Done
2,806,912 UART: [art] Populate DV Done
2,815,071 UART: [fht] FMC Alias Private Key: 7
2,816,017 UART: [art] Derive CDI
2,816,297 UART: [art] Store in in slot 0x4
2,902,222 UART: [art] Derive Key Pair
2,902,582 UART: [art] Store priv key in slot 0x5
2,915,938 UART: [art] Derive Key Pair - Done
2,930,797 UART: [art] Signing Cert with AUTHO
2,931,277 UART: RITY.KEYID = 7
2,946,427 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,192 UART: [art] PUB.X = D08ED2C4508C3B7F2FEA6B3C75BDA916FC0728172905A7EFB3071768AD5E24A1B86651DF878F126436C9760D585292EB
2,953,954 UART: [art] PUB.Y = 01BC2887C10D8A7D7FE40854D395FABD39D1999A42D06F4FE30EFA92EEB01D21B79FC61C07AFA480140C5332DBB9C56B
2,960,902 UART: [art] SIG.R = 3E573CCFA537B5550B49CF675E5773D30020B776183EDFF371BC73868147173813F6E20322BEC2ACCE22481E05B8A618
2,967,639 UART: [art] SIG.S = DE3E6120FE21A176542D81B27C2D922361F00745EBA7E850D2131CDE0F0518DB1029C5B68D9EC722344933198E8683EE
2,991,671 UART: Caliptra RT
2,992,016 UART: [state] CFI Enabled
3,099,375 UART: [rt] RT listening for mailbox commands...
3,100,045 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,977 UART: [rt]cmd =0x44504543, len=40
3,156,269 >>> mbox cmd response data (40 bytes)
3,156,270 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,863 UART: [rt]cmd =0x44504543, len=40
3,208,885 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,038 UART:
192,402 UART: Running Caliptra ROM ...
193,595 UART:
193,752 UART: [state] CFI Enabled
263,563 UART: [state] LifecycleState = Unprovisioned
265,540 UART: [state] DebugLocked = No
267,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,650 UART: [kat] SHA2-256
442,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,843 UART: [kat] ++
453,335 UART: [kat] sha1
463,643 UART: [kat] SHA2-256
466,365 UART: [kat] SHA2-384
472,213 UART: [kat] SHA2-512-ACC
474,583 UART: [kat] ECC-384
2,768,200 UART: [kat] HMAC-384Kdf
2,799,213 UART: [kat] LMS
3,989,510 UART: [kat] --
3,992,373 UART: [cold-reset] ++
3,993,884 UART: [fht] Storing FHT @ 0x50003400
4,004,799 UART: [idev] ++
4,005,368 UART: [idev] CDI.KEYID = 6
4,006,454 UART: [idev] SUBJECT.KEYID = 7
4,007,576 UART: [idev] UDS.KEYID = 0
4,008,535 ready_for_fw is high
4,008,732 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,152,110 UART: [idev] Erasing UDS.KEYID = 0
7,346,100 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,988 UART: [idev] --
7,370,051 UART: [ldev] ++
7,370,628 UART: [ldev] CDI.KEYID = 6
7,371,596 UART: [ldev] SUBJECT.KEYID = 5
7,372,834 UART: [ldev] AUTHORITY.KEYID = 7
7,374,069 UART: [ldev] FE.KEYID = 1
7,400,280 UART: [ldev] Erasing FE.KEYID = 1
10,732,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,958 UART: [ldev] --
13,096,852 UART: [fwproc] Waiting for Commands...
13,098,727 UART: [fwproc] Received command 0x46574c44
13,100,918 UART: [fwproc] Received Image of size 114124 bytes
17,147,942 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,222,817 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,291,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,609,506 >>> mbox cmd response: success
17,610,107 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,614,411 UART: [afmc] ++
17,615,001 UART: [afmc] CDI.KEYID = 6
17,615,922 UART: [afmc] SUBJECT.KEYID = 7
17,617,204 UART: [afmc] AUTHORITY.KEYID = 5
20,982,247 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,951 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,205 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,637 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,439 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,911 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,090 UART: [afmc] --
23,360,771 UART: [cold-reset] --
23,365,991 UART: [state] Locking Datavault
23,371,981 UART: [state] Locking PCR0, PCR1 and PCR31
23,373,744 UART: [state] Locking ICCM
23,374,891 UART: [exit] Launching FMC @ 0x40000130
23,383,293 UART:
23,383,523 UART: Running Caliptra FMC ...
23,384,625 UART:
23,384,787 UART: [state] CFI Enabled
23,447,955 UART: [fht] FMC Alias Private Key: 7
25,785,930 UART: [art] Extend RT PCRs Done
25,787,140 UART: [art] Lock RT PCRs Done
25,788,792 UART: [art] Populate DV Done
25,794,091 UART: [fht] FMC Alias Private Key: 7
25,795,632 UART: [art] Derive CDI
25,796,367 UART: [art] Store in in slot 0x4
25,857,816 UART: [art] Derive Key Pair
25,858,850 UART: [art] Store priv key in slot 0x5
29,151,927 UART: [art] Derive Key Pair - Done
29,164,712 UART: [art] Signing Cert with AUTHO
29,166,040 UART: RITY.KEYID = 7
31,453,743 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,247 UART: [art] PUB.X = 569C98083CBF3265C709F26B73C9F397B6732325CEC411BF1C054339629F4DF5912A2F102B81C67589F9CD9DA773BB8F
31,462,492 UART: [art] PUB.Y = E5357D4A539193B0AE655EB283DB6BD65CACB708F9BFF1AF248789395E0541449005837CA6F2CCBE365CBB832C019A97
31,469,724 UART: [art] SIG.R = 65F12A1612DEB0A3CFC3FFE3563232C1C7FE377A630DB87CA4C4C8F16834F2C0370AA099C90CDA636AB399CF0865329B
31,477,106 UART: [art] SIG.S = 19A7BF9D7267D26A1B00D69EC5D589CA952ED8162D06EE69EF09452C895A4DAD4671C2DDA0CDB0DD618632583F8ED9EB
32,782,137 UART: Caliptra RT
32,782,856 UART: [state] CFI Enabled
32,946,065 UART: [rt] RT listening for mailbox commands...
32,978,350 UART: [rt]cmd =0x44504543, len=136
38,599,669 >>> mbox cmd response data (136 bytes)
38,601,002 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,631,652 UART: [rt]cmd =0x44504543, len=92
44,395,445 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,807,782 ready_for_fw is high
3,808,297 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,891,853 >>> mbox cmd response: success
17,892,922 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,588,678 UART:
23,589,047 UART: Running Caliptra FMC ...
23,590,193 UART:
23,590,356 UART: [state] CFI Enabled
23,658,103 UART: [fht] FMC Alias Private Key: 7
25,995,630 UART: [art] Extend RT PCRs Done
25,996,853 UART: [art] Lock RT PCRs Done
25,998,890 UART: [art] Populate DV Done
26,004,308 UART: [fht] FMC Alias Private Key: 7
26,005,834 UART: [art] Derive CDI
26,006,609 UART: [art] Store in in slot 0x4
26,066,826 UART: [art] Derive Key Pair
26,067,877 UART: [art] Store priv key in slot 0x5
29,360,849 UART: [art] Derive Key Pair - Done
29,374,014 UART: [art] Signing Cert with AUTHO
29,375,320 UART: RITY.KEYID = 7
31,663,282 UART: [art] Erasing AUTHORITY.KEYID = 7
31,664,787 UART: [art] PUB.X = 2F9DD8EAFB07D14C107D8E788D87419768B00F10348A2FECAFFFAB75C6BC52168CC6C5F4E2E55143E24584806E99ACC9
31,672,060 UART: [art] PUB.Y = ECCC76D92C8E5664F10402524FA5A1F6C29C08F47ECBE21A1A3BDC9CE99EA9834190E27A39A16AB3676D24B71E1C73AF
31,679,321 UART: [art] SIG.R = D19524DF259A244B5472C4D0068D25255C5E1989C6503CD347949E7C6A65C5BA967B29FA58C8841C997BD97FBAC9FFAD
31,686,694 UART: [art] SIG.S = A7D89A203E5794AFCA60DDA14D94F81983A2DB4CBADF2C7B1EF71B95060DE7AE6B1785D44B0CBEB3114D833EF844A7C3
32,991,722 UART: Caliptra RT
32,992,432 UART: [state] CFI Enabled
33,152,836 UART: [rt] RT listening for mailbox commands...
33,185,378 UART: [rt]cmd =0x44504543, len=136
38,809,809 >>> mbox cmd response data (136 bytes)
38,811,440 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,842,013 UART: [rt]cmd =0x44504543, len=92
44,605,924 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,393 UART:
192,758 UART: Running Caliptra ROM ...
193,944 UART:
603,394 UART: [state] CFI Enabled
616,563 UART: [state] LifecycleState = Unprovisioned
618,408 UART: [state] DebugLocked = No
621,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,590 UART: [kat] SHA2-256
795,310 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,904 UART: [kat] ++
806,350 UART: [kat] sha1
817,284 UART: [kat] SHA2-256
820,017 UART: [kat] SHA2-384
825,655 UART: [kat] SHA2-512-ACC
828,019 UART: [kat] ECC-384
3,114,642 UART: [kat] HMAC-384Kdf
3,127,585 UART: [kat] LMS
4,317,681 UART: [kat] --
4,322,479 UART: [cold-reset] ++
4,323,706 UART: [fht] Storing FHT @ 0x50003400
4,333,687 UART: [idev] ++
4,334,249 UART: [idev] CDI.KEYID = 6
4,335,276 UART: [idev] SUBJECT.KEYID = 7
4,336,464 UART: [idev] UDS.KEYID = 0
4,337,565 ready_for_fw is high
4,337,794 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,246 UART: [idev] Erasing UDS.KEYID = 0
7,630,105 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,350 UART: [idev] --
7,657,214 UART: [ldev] ++
7,657,876 UART: [ldev] CDI.KEYID = 6
7,658,789 UART: [ldev] SUBJECT.KEYID = 5
7,659,998 UART: [ldev] AUTHORITY.KEYID = 7
7,661,224 UART: [ldev] FE.KEYID = 1
7,673,968 UART: [ldev] Erasing FE.KEYID = 1
10,962,187 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,071 UART: [ldev] --
13,320,986 UART: [fwproc] Waiting for Commands...
13,323,881 UART: [fwproc] Received command 0x46574c44
13,326,053 UART: [fwproc] Received Image of size 114124 bytes
17,376,095 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,776 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,659 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,841,902 >>> mbox cmd response: success
17,842,516 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,846,327 UART: [afmc] ++
17,846,919 UART: [afmc] CDI.KEYID = 6
17,847,797 UART: [afmc] SUBJECT.KEYID = 7
17,849,063 UART: [afmc] AUTHORITY.KEYID = 5
21,164,410 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,681 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,954 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,317 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,160 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,503,646 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,737 UART: [afmc] --
23,528,433 UART: [cold-reset] --
23,532,999 UART: [state] Locking Datavault
23,539,862 UART: [state] Locking PCR0, PCR1 and PCR31
23,541,606 UART: [state] Locking ICCM
23,543,156 UART: [exit] Launching FMC @ 0x40000130
23,551,493 UART:
23,551,730 UART: Running Caliptra FMC ...
23,552,829 UART:
23,552,987 UART: [state] CFI Enabled
23,561,301 UART: [fht] FMC Alias Private Key: 7
25,891,802 UART: [art] Extend RT PCRs Done
25,893,034 UART: [art] Lock RT PCRs Done
25,895,037 UART: [art] Populate DV Done
25,900,189 UART: [fht] FMC Alias Private Key: 7
25,901,877 UART: [art] Derive CDI
25,902,700 UART: [art] Store in in slot 0x4
25,945,285 UART: [art] Derive Key Pair
25,946,279 UART: [art] Store priv key in slot 0x5
29,188,426 UART: [art] Derive Key Pair - Done
29,201,470 UART: [art] Signing Cert with AUTHO
29,202,768 UART: RITY.KEYID = 7
31,482,300 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,804 UART: [art] PUB.X = E51586FECFFDE1261186A7FCD90A4B86D2AF9A689D8E96C2E864B9B9F484F4162A135342AEC9A78590BEC975216DF306
31,491,036 UART: [art] PUB.Y = 438537EA23FEC1C782F30649669678F65804FFD968F101B3430CE85D68DC74A4607BB5B7FF550C8503D36CC8DFA34910
31,498,250 UART: [art] SIG.R = 60451CF299FABAD2FF95ECF687279215FDF57AF8419C6DA96125C4583AC04B3A1C2E4B8D18BF81EBBBDAEAA2514FF540
31,505,646 UART: [art] SIG.S = FDACA209AC32EEA395800556EBD347ADB3AE58F17FAF7B1E96DD15A47922EFC6559E8C23CFBB3026BE7E5ACAD0391969
32,811,016 UART: Caliptra RT
32,811,732 UART: [state] CFI Enabled
32,929,902 UART: [rt] RT listening for mailbox commands...
32,962,318 UART: [rt]cmd =0x44504543, len=136
38,522,310 >>> mbox cmd response data (136 bytes)
38,523,679 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,554,242 UART: [rt]cmd =0x44504543, len=92
44,227,902 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
4,124,418 ready_for_fw is high
4,124,828 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,058,757 >>> mbox cmd response: success
18,059,623 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,697,966 UART:
23,698,362 UART: Running Caliptra FMC ...
23,699,460 UART:
23,699,626 UART: [state] CFI Enabled
23,707,529 UART: [fht] FMC Alias Private Key: 7
26,038,488 UART: [art] Extend RT PCRs Done
26,039,719 UART: [art] Lock RT PCRs Done
26,041,371 UART: [art] Populate DV Done
26,046,739 UART: [fht] FMC Alias Private Key: 7
26,048,228 UART: [art] Derive CDI
26,048,989 UART: [art] Store in in slot 0x4
26,091,589 UART: [art] Derive Key Pair
26,092,633 UART: [art] Store priv key in slot 0x5
29,334,295 UART: [art] Derive Key Pair - Done
29,347,406 UART: [art] Signing Cert with AUTHO
29,348,719 UART: RITY.KEYID = 7
31,627,850 UART: [art] Erasing AUTHORITY.KEYID = 7
31,629,364 UART: [art] PUB.X = 128E2F25B5DA753E084D20B47FE73D092F56726384F2CD87858A015D2C7E8F05EABA625BC55BCBBA7EF359D3A317D1A9
31,636,605 UART: [art] PUB.Y = 066BCA88C0113A2CAF78B4CCED5BC343ADAAE79303F8A5765CCC1718FB081326CEA0FA628D3DD062F1023DFF100E4658
31,643,891 UART: [art] SIG.R = 8E5212A771A793FBB83DCDB923CA642CA6B726D3E8DEBEE6202719383CABE1C9A11E24C9495F54C636BDD0D9B0FFDF8E
31,651,289 UART: [art] SIG.S = CE53BEA266A1B7333AF69247F240FBE0FF8BB0003CFC57ADA0F5DF0D367C66A72A30B0AEACFA887D510BF694086E84F3
32,956,407 UART: Caliptra RT
32,957,129 UART: [state] CFI Enabled
33,074,923 UART: [rt] RT listening for mailbox commands...
33,107,322 UART: [rt]cmd =0x44504543, len=136
38,666,135 >>> mbox cmd response data (136 bytes)
38,667,502 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,698,162 UART: [rt]cmd =0x44504543, len=92
44,371,617 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,066 UART:
192,450 UART: Running Caliptra ROM ...
193,594 UART:
193,747 UART: [state] CFI Enabled
268,782 UART: [state] LifecycleState = Unprovisioned
270,898 UART: [state] DebugLocked = No
272,437 UART: [state] WD Timer not started. Device not locked for debugging
276,822 UART: [kat] SHA2-256
455,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,505 UART: [kat] ++
468,038 UART: [kat] sha1
480,289 UART: [kat] SHA2-256
483,306 UART: [kat] SHA2-384
489,158 UART: [kat] SHA2-512-ACC
492,090 UART: [kat] ECC-384
2,948,752 UART: [kat] HMAC-384Kdf
2,972,086 UART: [kat] LMS
3,501,496 UART: [kat] --
3,505,422 UART: [cold-reset] ++
3,506,427 UART: [fht] FHT @ 0x50003400
3,517,119 UART: [idev] ++
3,517,693 UART: [idev] CDI.KEYID = 6
3,518,727 UART: [idev] SUBJECT.KEYID = 7
3,519,833 UART: [idev] UDS.KEYID = 0
3,520,733 ready_for_fw is high
3,520,916 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,857 UART: [idev] Erasing UDS.KEYID = 0
6,027,180 UART: [idev] Sha1 KeyId Algorithm
6,050,606 UART: [idev] --
6,055,551 UART: [ldev] ++
6,056,127 UART: [ldev] CDI.KEYID = 6
6,057,018 UART: [ldev] SUBJECT.KEYID = 5
6,058,233 UART: [ldev] AUTHORITY.KEYID = 7
6,059,465 UART: [ldev] FE.KEYID = 1
6,100,009 UART: [ldev] Erasing FE.KEYID = 1
8,606,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,408 UART: [ldev] --
10,413,915 UART: [fwproc] Wait for Commands...
10,416,394 UART: [fwproc] Recv command 0x46574c44
10,418,509 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,289,474 >>> mbox cmd response: success
14,290,041 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,293,258 UART: [afmc] ++
14,293,884 UART: [afmc] CDI.KEYID = 6
14,294,772 UART: [afmc] SUBJECT.KEYID = 7
14,295,877 UART: [afmc] AUTHORITY.KEYID = 5
16,827,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,024 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,858 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,725 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,372 UART: [afmc] --
18,627,832 UART: [cold-reset] --
18,630,064 UART: [state] Locking Datavault
18,637,039 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,693 UART: [state] Locking ICCM
18,640,226 UART: [exit] Launching FMC @ 0x40000130
18,648,671 UART:
18,648,901 UART: Running Caliptra FMC ...
18,649,924 UART:
18,650,068 UART: [state] CFI Enabled
18,710,727 UART: [fht] FMC Alias Private Key: 7
20,474,907 UART: [art] Extend RT PCRs Done
20,476,122 UART: [art] Lock RT PCRs Done
20,477,769 UART: [art] Populate DV Done
20,483,336 UART: [fht] FMC Alias Private Key: 7
20,484,866 UART: [art] Derive CDI
20,485,620 UART: [art] Store in in slot 0x4
20,543,661 UART: [art] Derive Key Pair
20,544,695 UART: [art] Store priv key in slot 0x5
23,007,590 UART: [art] Derive Key Pair - Done
23,020,210 UART: [art] Signing Cert with AUTHO
23,021,515 UART: RITY.KEYID = 7
24,732,533 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,032 UART: [art] PUB.X = 4CC25C561EA07CCB83C00846495620390F6C50D6C99457BD585909BDA2BCA31FF51B584D025700782C65FBEE3C719505
24,741,300 UART: [art] PUB.Y = 19CA67584144D9E964A8B1C96D7CCE59610640FEFCD7D76ED07A31B0B515D61437577FE891FF27C5EF80F49870548C50
24,748,530 UART: [art] SIG.R = BD75430762348828FCE23CE0861DCE96C76581991D20108CCFAA6A423104F8BD19CABE008186EDE24F05F42BE44938A7
24,755,914 UART: [art] SIG.S = D832BE24278BBFD911B7A1499B8C93F4F67A8A998ECFCC35942D64C3AB269586E7AF135901DE252ED783FD29CB5D116B
25,735,239 UART: Caliptra RT
25,735,936 UART: [state] CFI Enabled
25,902,252 UART: [rt] RT listening for mailbox commands...
25,934,445 UART: [rt]cmd =0x44504543, len=136
30,151,901 >>> mbox cmd response data (136 bytes)
30,153,318 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,183,918 UART: [rt]cmd =0x44504543, len=92
34,539,858 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,360,061 ready_for_fw is high
3,360,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,032,998 >>> mbox cmd response: success
14,033,893 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,323,651 UART:
18,324,071 UART: Running Caliptra FMC ...
18,325,193 UART:
18,325,357 UART: [state] CFI Enabled
18,390,354 UART: [fht] FMC Alias Private Key: 7
20,153,895 UART: [art] Extend RT PCRs Done
20,155,120 UART: [art] Lock RT PCRs Done
20,156,808 UART: [art] Populate DV Done
20,162,493 UART: [fht] FMC Alias Private Key: 7
20,164,143 UART: [art] Derive CDI
20,164,959 UART: [art] Store in in slot 0x4
20,223,062 UART: [art] Derive Key Pair
20,224,112 UART: [art] Store priv key in slot 0x5
22,687,333 UART: [art] Derive Key Pair - Done
22,700,490 UART: [art] Signing Cert with AUTHO
22,701,811 UART: RITY.KEYID = 7
24,413,360 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,861 UART: [art] PUB.X = 6C32502B1933DEBEAE30E12B5DDF5BAA3C041DEA7CEEB4719B613853C40A5BCBEE3313F250872479B5AEBD2921862363
24,422,161 UART: [art] PUB.Y = 8898CDF157E87526EB4BA15F01A0F996FD8F37369ABA6B2DB429F8092AC8C4EE8E3B9BA70C718F8DD913BC33B4945F8D
24,429,473 UART: [art] SIG.R = B50B74DF0A86F2C51E916F8B3589E64BB0D783713E7F7EA79FE5A3C9C9835E9334000CE9C255F16F3E3D03815C63F98A
24,436,855 UART: [art] SIG.S = AC501BD7D18A7F6577252B5EDE6826CE3568179333C49195073A8C16B63874F52A1D33692FFF5AB213F9A3EBA412B7EA
25,415,976 UART: Caliptra RT
25,416,670 UART: [state] CFI Enabled
25,581,128 UART: [rt] RT listening for mailbox commands...
25,613,514 UART: [rt]cmd =0x44504543, len=136
29,831,001 >>> mbox cmd response data (136 bytes)
29,832,363 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
29,862,971 UART: [rt]cmd =0x44504543, len=92
34,219,052 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
192,500 UART:
192,876 UART: Running Caliptra ROM ...
194,062 UART:
603,478 UART: [state] CFI Enabled
614,766 UART: [state] LifecycleState = Unprovisioned
616,688 UART: [state] DebugLocked = No
619,353 UART: [state] WD Timer not started. Device not locked for debugging
623,521 UART: [kat] SHA2-256
802,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,193 UART: [kat] ++
814,721 UART: [kat] sha1
826,021 UART: [kat] SHA2-256
829,087 UART: [kat] SHA2-384
835,423 UART: [kat] SHA2-512-ACC
838,361 UART: [kat] ECC-384
3,277,800 UART: [kat] HMAC-384Kdf
3,290,670 UART: [kat] LMS
3,820,132 UART: [kat] --
3,824,760 UART: [cold-reset] ++
3,827,178 UART: [fht] FHT @ 0x50003400
3,838,783 UART: [idev] ++
3,839,363 UART: [idev] CDI.KEYID = 6
3,840,390 UART: [idev] SUBJECT.KEYID = 7
3,841,484 UART: [idev] UDS.KEYID = 0
3,842,525 ready_for_fw is high
3,842,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,061 UART: [idev] Erasing UDS.KEYID = 0
6,316,708 UART: [idev] Sha1 KeyId Algorithm
6,339,757 UART: [idev] --
6,342,779 UART: [ldev] ++
6,343,340 UART: [ldev] CDI.KEYID = 6
6,344,302 UART: [ldev] SUBJECT.KEYID = 5
6,345,451 UART: [ldev] AUTHORITY.KEYID = 7
6,346,725 UART: [ldev] FE.KEYID = 1
6,358,387 UART: [ldev] Erasing FE.KEYID = 1
8,836,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,849 UART: [ldev] --
10,626,311 UART: [fwproc] Wait for Commands...
10,628,997 UART: [fwproc] Recv command 0x46574c44
10,631,078 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,986 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,494,894 >>> mbox cmd response: success
14,495,489 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,499,624 UART: [afmc] ++
14,500,204 UART: [afmc] CDI.KEYID = 6
14,501,107 UART: [afmc] SUBJECT.KEYID = 7
14,502,259 UART: [afmc] AUTHORITY.KEYID = 5
17,004,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,337 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,911 UART: [afmc] --
18,800,797 UART: [cold-reset] --
18,805,297 UART: [state] Locking Datavault
18,809,670 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,314 UART: [state] Locking ICCM
18,813,997 UART: [exit] Launching FMC @ 0x40000130
18,822,382 UART:
18,822,613 UART: Running Caliptra FMC ...
18,823,707 UART:
18,823,860 UART: [state] CFI Enabled
18,832,165 UART: [fht] FMC Alias Private Key: 7
20,588,785 UART: [art] Extend RT PCRs Done
20,589,999 UART: [art] Lock RT PCRs Done
20,591,671 UART: [art] Populate DV Done
20,597,288 UART: [fht] FMC Alias Private Key: 7
20,598,923 UART: [art] Derive CDI
20,599,731 UART: [art] Store in in slot 0x4
20,642,323 UART: [art] Derive Key Pair
20,643,356 UART: [art] Store priv key in slot 0x5
23,070,589 UART: [art] Derive Key Pair - Done
23,083,527 UART: [art] Signing Cert with AUTHO
23,084,826 UART: RITY.KEYID = 7
24,790,125 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,640 UART: [art] PUB.X = F03E813DDAFBF4AB1228C92CA5F9A436A1C9EEA128F67748B7D877449319F8F65C53473D0CE286349C6B33A7ADD9BE60
24,798,931 UART: [art] PUB.Y = 6FD6C459B908C4E345508497191F48A76E9F84B3C25B68BB42C867336E0CF568CF3B0CE297C53C49B29642FB7FFE6D14
24,806,206 UART: [art] SIG.R = 4196951CC3A12EF36461D679702D25845E1E043233CE64ED5E256E5487D909FD6632F0B8C138879EA5404CBEA165FA03
24,813,551 UART: [art] SIG.S = F6E1A09F5ECBA81C7648876610B07C8EA990F6AA15B5EBB0E163878D81A79ACB7AE4F18D7A2E6FB3BC6F213712F3FAC9
25,792,681 UART: Caliptra RT
25,793,381 UART: [state] CFI Enabled
25,911,534 UART: [rt] RT listening for mailbox commands...
25,944,239 UART: [rt]cmd =0x44504543, len=136
30,113,759 >>> mbox cmd response data (136 bytes)
30,115,117 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,145,454 UART: [rt]cmd =0x44504543, len=92
34,430,586 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,699,034 ready_for_fw is high
3,699,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,076 >>> mbox cmd response: success
14,271,924 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,523,083 UART:
18,523,487 UART: Running Caliptra FMC ...
18,524,597 UART:
18,524,746 UART: [state] CFI Enabled
18,532,634 UART: [fht] FMC Alias Private Key: 7
20,289,595 UART: [art] Extend RT PCRs Done
20,290,811 UART: [art] Lock RT PCRs Done
20,292,240 UART: [art] Populate DV Done
20,297,649 UART: [fht] FMC Alias Private Key: 7
20,299,185 UART: [art] Derive CDI
20,299,912 UART: [art] Store in in slot 0x4
20,342,076 UART: [art] Derive Key Pair
20,343,120 UART: [art] Store priv key in slot 0x5
22,769,889 UART: [art] Derive Key Pair - Done
22,782,807 UART: [art] Signing Cert with AUTHO
22,784,110 UART: RITY.KEYID = 7
24,489,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,024 UART: [art] PUB.X = 9AB66B6C2913BBBDE4BB0065E18F980624E4E9F99532647E8EC14193F926C4C863CED748D0FF534959615BC2A061C85B
24,498,000 UART: [art] PUB.Y = D179325E6F46B46F87FE004002ED9340AAA6DAB637F4E790F3464B498A3167A6AC670EAF1FAB31572C497F1345459107
24,505,222 UART: [art] SIG.R = 86DE95528389EE6AAAC20BEBCF4B9042C76B4A3E764B5F1355CC6C57D5602EED0922C65D316FFDA86FA02DE7B20E9C62
24,512,627 UART: [art] SIG.S = E84BC4AA80ACF7EE9AB5C7EDB9C25A63725766DD44D7B7BC4F0D1A32F3BA9E05519BB24F0DF73222F597AB3705839705
25,491,635 UART: Caliptra RT
25,492,344 UART: [state] CFI Enabled
25,609,901 UART: [rt] RT listening for mailbox commands...
25,642,452 UART: [rt]cmd =0x44504543, len=136
29,812,251 >>> mbox cmd response data (136 bytes)
29,813,683 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
29,844,235 UART: [rt]cmd =0x44504543, len=92
34,129,073 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,439,430 ready_for_fw is high
3,439,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,752,443 >>> mbox cmd response: success
14,753,332 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,069,968 UART:
19,070,364 UART: Running Caliptra FMC ...
19,071,473 UART:
19,071,628 UART: [state] CFI Enabled
19,138,043 UART: [fht] FMC Alias Private Key: 7
20,902,399 UART: [art] Extend RT PCRs Done
20,903,638 UART: [art] Lock RT PCRs Done
20,904,917 UART: [art] Populate DV Done
20,910,332 UART: [fht] FMC Alias Private Key: 7
20,911,986 UART: [art] Derive CDI
20,912,802 UART: [art] Store in in slot 0x4
20,970,747 UART: [art] Derive Key Pair
20,971,788 UART: [art] Store priv key in slot 0x5
23,434,973 UART: [art] Derive Key Pair - Done
23,447,719 UART: [art] Signing Cert with AUTHO
23,449,023 UART: RITY.KEYID = 7
25,160,025 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,524 UART: [art] PUB.X = 9A227227279ED31B19895DBC92C2BA37544211ADC0D415A15CD0B0091E493A0797AF4B8E513D8C0C846C811D65D06E1E
25,168,769 UART: [art] PUB.Y = 6136F34FEE93B8C76171420A36E914E755EB6632136878F1BB0AE92B4642152C2AD84AF92AC9449C2BA25E33584D6BFA
25,176,055 UART: [art] SIG.R = A983829C91147A045178574B65B8EF64CE9B1A219D38BEDAB635A87F83DD767C22565DCA00DB2803707A6F4C8D7865DD
25,183,402 UART: [art] SIG.S = E396BED0A1EA0888CE174F1DB118475C57731E6C8B1EF6BD3943143ED5DCCD081D481288632D02527876C7DAD2F7FFE8
26,162,033 UART: Caliptra RT
26,162,747 UART: [state] CFI Enabled
26,327,718 UART: [rt] RT listening for mailbox commands...
26,359,730 UART: [rt]cmd =0x44504543, len=136
30,579,323 >>> mbox cmd response data (136 bytes)
30,580,609 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,611,043 UART: [rt]cmd =0x44504543, len=92
34,966,496 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,758,443 ready_for_fw is high
3,758,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,968,607 >>> mbox cmd response: success
14,969,282 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,223,665 UART:
19,224,059 UART: Running Caliptra FMC ...
19,225,152 UART:
19,225,326 UART: [state] CFI Enabled
19,233,331 UART: [fht] FMC Alias Private Key: 7
20,989,684 UART: [art] Extend RT PCRs Done
20,990,909 UART: [art] Lock RT PCRs Done
20,992,613 UART: [art] Populate DV Done
20,998,126 UART: [fht] FMC Alias Private Key: 7
20,999,818 UART: [art] Derive CDI
21,000,558 UART: [art] Store in in slot 0x4
21,043,098 UART: [art] Derive Key Pair
21,044,101 UART: [art] Store priv key in slot 0x5
23,471,317 UART: [art] Derive Key Pair - Done
23,484,209 UART: [art] Signing Cert with AUTHO
23,485,541 UART: RITY.KEYID = 7
25,191,161 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,667 UART: [art] PUB.X = 115E12D623811F85D93C39ED0E6CD0A2BF9A63DAB1781697630B7AC67E792A19507338D56C2990C5C1269C1D8812B90F
25,199,914 UART: [art] PUB.Y = 9C2EE2B1A32920FB5246207F3C75F71C3CBABC230FD7FADA2B03F612D2B1F4A50BCD0C4FFD77B550996961DE1BF3642F
25,207,179 UART: [art] SIG.R = 973DA1334F217CDB25E3F6BE78DE0B6FC2F0C038463FCD916F43D02B239A2AB7EB13C8766708D04125D40C7527B3925B
25,214,579 UART: [art] SIG.S = 4FD9BF49960BEB962F67F45E70B4615FEA88583E8563967EDB408A4CC5F850D8D563493EF03675A442EDD0E4FE76E702
26,193,175 UART: Caliptra RT
26,193,865 UART: [state] CFI Enabled
26,311,098 UART: [rt] RT listening for mailbox commands...
26,343,372 UART: [rt]cmd =0x44504543, len=136
30,512,889 >>> mbox cmd response data (136 bytes)
30,514,222 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,544,948 UART: [rt]cmd =0x44504543, len=92
34,829,539 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,113 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,681 UART: [kat] SHA2-256
881,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,727 UART: [kat] ++
885,879 UART: [kat] sha1
890,183 UART: [kat] SHA2-256
892,121 UART: [kat] SHA2-384
894,644 UART: [kat] SHA2-512-ACC
896,545 UART: [kat] ECC-384
902,108 UART: [kat] HMAC-384Kdf
906,782 UART: [kat] LMS
1,474,978 UART: [kat] --
1,475,911 UART: [cold-reset] ++
1,476,401 UART: [fht] Storing FHT @ 0x50003400
1,479,372 UART: [idev] ++
1,479,540 UART: [idev] CDI.KEYID = 6
1,479,900 UART: [idev] SUBJECT.KEYID = 7
1,480,324 UART: [idev] UDS.KEYID = 0
1,480,669 ready_for_fw is high
1,480,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,268 UART: [idev] Erasing UDS.KEYID = 0
1,505,160 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,954 UART: [idev] --
1,514,945 UART: [ldev] ++
1,515,113 UART: [ldev] CDI.KEYID = 6
1,515,476 UART: [ldev] SUBJECT.KEYID = 5
1,515,902 UART: [ldev] AUTHORITY.KEYID = 7
1,516,365 UART: [ldev] FE.KEYID = 1
1,521,465 UART: [ldev] Erasing FE.KEYID = 1
1,547,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,954 UART: [ldev] --
1,586,341 UART: [fwproc] Waiting for Commands...
1,587,100 UART: [fwproc] Received command 0x46574c44
1,587,891 UART: [fwproc] Received Image of size 114448 bytes
2,886,822 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,734 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,086 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,115 >>> mbox cmd response: success
3,079,115 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,080,215 UART: [afmc] ++
3,080,383 UART: [afmc] CDI.KEYID = 6
3,080,745 UART: [afmc] SUBJECT.KEYID = 7
3,081,170 UART: [afmc] AUTHORITY.KEYID = 5
3,116,117 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,203 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,596 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,286 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,139 UART: [afmc] --
3,159,231 UART: [cold-reset] --
3,159,939 UART: [state] Locking Datavault
3,161,236 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,840 UART: [state] Locking ICCM
3,162,262 UART: [exit] Launching FMC @ 0x40000130
3,167,591 UART:
3,167,607 UART: Running Caliptra FMC ...
3,168,015 UART:
3,168,069 UART: [state] CFI Enabled
3,178,534 UART: [fht] FMC Alias Private Key: 7
3,286,193 UART: [art] Extend RT PCRs Done
3,286,621 UART: [art] Lock RT PCRs Done
3,288,471 UART: [art] Populate DV Done
3,296,502 UART: [fht] FMC Alias Private Key: 7
3,297,546 UART: [art] Derive CDI
3,297,826 UART: [art] Store in in slot 0x4
3,383,149 UART: [art] Derive Key Pair
3,383,509 UART: [art] Store priv key in slot 0x5
3,396,499 UART: [art] Derive Key Pair - Done
3,411,245 UART: [art] Signing Cert with AUTHO
3,411,725 UART: RITY.KEYID = 7
3,426,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,382 UART: [art] PUB.X = 843E91738099088B4CF2DF543FBBB00A8A728ADC648400F1DDA782D04E5966C8BC515E7122963C6C280408ECB0176530
3,434,116 UART: [art] PUB.Y = EE2992DFD85A351CAC4D5CECC7AA3BF30BA7DBA5B536476B29918741C5CACCC338F2AD214F87EA3A56649EB5D7963A6B
3,441,087 UART: [art] SIG.R = 4F774818B8ADEC4A237324F71DEF842C3E41EECC9F383F16C3D770BB70A08A51F4BBFE37E416AFF1C85383CBF95040DD
3,447,875 UART: [art] SIG.S = 59E94874EDC6396B5F39EB799D7852AD8EC3E878E663A1498228281DFF7F12B3A2056B143D50583187872CAE40FE98BE
3,471,377 UART: Caliptra RT
3,471,630 UART: [state] CFI Enabled
3,579,266 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,630 UART: [rt]cmd =0x44504543, len=136
3,674,857 >>> mbox cmd response data (136 bytes)
3,674,858 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,085 UART: [rt]cmd =0x44504543, len=92
3,887,873 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,643 ready_for_fw is high
1,362,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,211 >>> mbox cmd response: success
2,929,211 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,991,267 UART:
2,991,283 UART: Running Caliptra FMC ...
2,991,691 UART:
2,991,745 UART: [state] CFI Enabled
3,002,504 UART: [fht] FMC Alias Private Key: 7
3,110,491 UART: [art] Extend RT PCRs Done
3,110,919 UART: [art] Lock RT PCRs Done
3,112,509 UART: [art] Populate DV Done
3,120,922 UART: [fht] FMC Alias Private Key: 7
3,121,908 UART: [art] Derive CDI
3,122,188 UART: [art] Store in in slot 0x4
3,207,457 UART: [art] Derive Key Pair
3,207,817 UART: [art] Store priv key in slot 0x5
3,221,183 UART: [art] Derive Key Pair - Done
3,235,813 UART: [art] Signing Cert with AUTHO
3,236,293 UART: RITY.KEYID = 7
3,251,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,050 UART: [art] PUB.X = EA0E4C0CA22C1379ABEFE20B83E693C55E429B24FA894A373754EFBF1DE6479970ED0B01DBEBA1AEA9D733B9B0B685E6
3,258,827 UART: [art] PUB.Y = BF5B2283FDAAC81DD57D53219590129ED84827D39DD061DC78FFE9C529967D623349710EFB657C4483F4357A27B4C562
3,265,774 UART: [art] SIG.R = A48A64BDD5CFE3C8D0404A1595DDD2AAE8A90705AC9527E14D79A8AAD1F5085DC2B3E71821AFF73CF8B1840D446BD71C
3,272,552 UART: [art] SIG.S = EE4C07A62570BE5C2C6B6F6F4A37C40D696E4C9AE9B26441CD46DF2CFF9525020C50E81FDFB9DA2B2D582107521BF4F7
3,295,574 UART: Caliptra RT
3,295,827 UART: [state] CFI Enabled
3,403,117 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,343 UART: [rt]cmd =0x44504543, len=136
3,497,956 >>> mbox cmd response data (136 bytes)
3,497,957 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,804 UART: [rt]cmd =0x44504543, len=92
3,710,989 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,972 UART: [kat] SHA2-256
881,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,018 UART: [kat] ++
886,170 UART: [kat] sha1
890,236 UART: [kat] SHA2-256
892,174 UART: [kat] SHA2-384
894,827 UART: [kat] SHA2-512-ACC
896,728 UART: [kat] ECC-384
902,293 UART: [kat] HMAC-384Kdf
906,917 UART: [kat] LMS
1,475,113 UART: [kat] --
1,475,846 UART: [cold-reset] ++
1,476,418 UART: [fht] Storing FHT @ 0x50003400
1,479,209 UART: [idev] ++
1,479,377 UART: [idev] CDI.KEYID = 6
1,479,737 UART: [idev] SUBJECT.KEYID = 7
1,480,161 UART: [idev] UDS.KEYID = 0
1,480,506 ready_for_fw is high
1,480,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,437 UART: [idev] Erasing UDS.KEYID = 0
1,504,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,455 UART: [idev] --
1,514,652 UART: [ldev] ++
1,514,820 UART: [ldev] CDI.KEYID = 6
1,515,183 UART: [ldev] SUBJECT.KEYID = 5
1,515,609 UART: [ldev] AUTHORITY.KEYID = 7
1,516,072 UART: [ldev] FE.KEYID = 1
1,521,590 UART: [ldev] Erasing FE.KEYID = 1
1,547,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,839 UART: [ldev] --
1,587,302 UART: [fwproc] Waiting for Commands...
1,587,977 UART: [fwproc] Received command 0x46574c44
1,588,768 UART: [fwproc] Received Image of size 114448 bytes
2,888,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,094 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,371 >>> mbox cmd response: success
3,081,371 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,082,425 UART: [afmc] ++
3,082,593 UART: [afmc] CDI.KEYID = 6
3,082,955 UART: [afmc] SUBJECT.KEYID = 7
3,083,380 UART: [afmc] AUTHORITY.KEYID = 5
3,118,919 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,258 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,948 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,941 UART: [afmc] --
3,162,021 UART: [cold-reset] --
3,163,023 UART: [state] Locking Datavault
3,164,052 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,656 UART: [state] Locking ICCM
3,165,264 UART: [exit] Launching FMC @ 0x40000130
3,170,593 UART:
3,170,609 UART: Running Caliptra FMC ...
3,171,017 UART:
3,171,160 UART: [state] CFI Enabled
3,181,803 UART: [fht] FMC Alias Private Key: 7
3,289,324 UART: [art] Extend RT PCRs Done
3,289,752 UART: [art] Lock RT PCRs Done
3,291,456 UART: [art] Populate DV Done
3,299,523 UART: [fht] FMC Alias Private Key: 7
3,300,587 UART: [art] Derive CDI
3,300,867 UART: [art] Store in in slot 0x4
3,386,972 UART: [art] Derive Key Pair
3,387,332 UART: [art] Store priv key in slot 0x5
3,400,848 UART: [art] Derive Key Pair - Done
3,415,773 UART: [art] Signing Cert with AUTHO
3,416,253 UART: RITY.KEYID = 7
3,431,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,630 UART: [art] PUB.X = DDADE1F19AA72FDCB66CC102A1A922ED7B07A92B391FDB20A4ABB655CB2750007D5286464DCFE7BF73A3FB4614772A11
3,439,392 UART: [art] PUB.Y = 417E696C85B3E023C4F7C46EE0AAFA5773EE3732BFA8EC5335AB628B9CD585E359AC3F4D9F1BB28D17EBBBF38C54E68C
3,446,364 UART: [art] SIG.R = 5EF757634FE814F56D1A27D8693832F3258979BB59DE6C182C848B28543ACAC747F2581F102722AECDB3F564BCA07937
3,453,134 UART: [art] SIG.S = F25F726BF891405D7043ABC56B66DEB59E67C8FB268FF22BF1A27AA98A227DCE7A21754E377B0A831A82A391ECF55FFF
3,477,376 UART: Caliptra RT
3,477,721 UART: [state] CFI Enabled
3,585,906 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,442 UART: [rt]cmd =0x44504543, len=136
3,681,341 >>> mbox cmd response data (136 bytes)
3,681,342 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,221 UART: [rt]cmd =0x44504543, len=92
3,895,057 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,546 ready_for_fw is high
1,362,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,304 >>> mbox cmd response: success
2,930,304 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,992,438 UART:
2,992,454 UART: Running Caliptra FMC ...
2,992,862 UART:
2,993,005 UART: [state] CFI Enabled
3,003,486 UART: [fht] FMC Alias Private Key: 7
3,111,803 UART: [art] Extend RT PCRs Done
3,112,231 UART: [art] Lock RT PCRs Done
3,113,665 UART: [art] Populate DV Done
3,121,772 UART: [fht] FMC Alias Private Key: 7
3,122,754 UART: [art] Derive CDI
3,123,034 UART: [art] Store in in slot 0x4
3,208,699 UART: [art] Derive Key Pair
3,209,059 UART: [art] Store priv key in slot 0x5
3,222,505 UART: [art] Derive Key Pair - Done
3,237,032 UART: [art] Signing Cert with AUTHO
3,237,512 UART: RITY.KEYID = 7
3,252,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,613 UART: [art] PUB.X = 3880BC1568FAC6E6AF175C431FE8D2BFB9305D9887CF5941AFA540DE6C0D041E60BE2804313B12F8D7EEF1B3C4DC17C1
3,260,390 UART: [art] PUB.Y = DC61E59B837BF9C662688C1320163D1D8AA8EC6739A3CAC7B93D7E9B5C0A5AB42FAF18B4316972170D0F1939157CBA5C
3,267,341 UART: [art] SIG.R = 6E0A39A034B8292476FB8EEAB52310741EB918D38A495D472B0CB73677CF7FDF8A5071CBA5E1E6184B0DBEE05595C31C
3,274,112 UART: [art] SIG.S = 55D283C6C2D21827016C9C3C45AEA3FD41BC576B33337C448DD582A67835D374BE9619178A0DCBEBFD0BDFD2559A1FC1
3,297,428 UART: Caliptra RT
3,297,773 UART: [state] CFI Enabled
3,406,255 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,835 UART: [rt]cmd =0x44504543, len=136
3,501,602 >>> mbox cmd response data (136 bytes)
3,501,603 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,538 UART: [rt]cmd =0x44504543, len=92
3,715,854 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
892,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,097 UART: [kat] ++
897,249 UART: [kat] sha1
901,421 UART: [kat] SHA2-256
903,361 UART: [kat] SHA2-384
905,974 UART: [kat] SHA2-512-ACC
907,875 UART: [kat] ECC-384
917,782 UART: [kat] HMAC-384Kdf
922,476 UART: [kat] LMS
1,170,804 UART: [kat] --
1,171,689 UART: [cold-reset] ++
1,172,235 UART: [fht] FHT @ 0x50003400
1,174,870 UART: [idev] ++
1,175,038 UART: [idev] CDI.KEYID = 6
1,175,398 UART: [idev] SUBJECT.KEYID = 7
1,175,822 UART: [idev] UDS.KEYID = 0
1,176,167 ready_for_fw is high
1,176,167 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,798 UART: [idev] Erasing UDS.KEYID = 0
1,199,887 UART: [idev] Sha1 KeyId Algorithm
1,208,341 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,886 UART: [ldev] SUBJECT.KEYID = 5
1,210,312 UART: [ldev] AUTHORITY.KEYID = 7
1,210,775 UART: [ldev] FE.KEYID = 1
1,216,249 UART: [ldev] Erasing FE.KEYID = 1
1,242,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,281,992 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,388 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,567 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,562 >>> mbox cmd response: success
2,775,562 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,776,586 UART: [afmc] ++
2,776,754 UART: [afmc] CDI.KEYID = 6
2,777,116 UART: [afmc] SUBJECT.KEYID = 7
2,777,541 UART: [afmc] AUTHORITY.KEYID = 5
2,813,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,213 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,941 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,826 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,545 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,371 UART: [afmc] --
2,856,493 UART: [cold-reset] --
2,857,127 UART: [state] Locking Datavault
2,858,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,860 UART: [state] Locking ICCM
2,859,434 UART: [exit] Launching FMC @ 0x40000130
2,864,763 UART:
2,864,779 UART: Running Caliptra FMC ...
2,865,187 UART:
2,865,241 UART: [state] CFI Enabled
2,875,684 UART: [fht] FMC Alias Private Key: 7
2,982,989 UART: [art] Extend RT PCRs Done
2,983,417 UART: [art] Lock RT PCRs Done
2,984,955 UART: [art] Populate DV Done
2,993,340 UART: [fht] FMC Alias Private Key: 7
2,994,502 UART: [art] Derive CDI
2,994,782 UART: [art] Store in in slot 0x4
3,080,633 UART: [art] Derive Key Pair
3,080,993 UART: [art] Store priv key in slot 0x5
3,094,221 UART: [art] Derive Key Pair - Done
3,108,690 UART: [art] Signing Cert with AUTHO
3,109,170 UART: RITY.KEYID = 7
3,124,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,257 UART: [art] PUB.X = 3C258AC50B135814115B086E6B1921B3E027E5EB39D9B0AF2280B93C2A1ECFBECB051B79F3A08942C56F1F227A3CAD6B
3,132,030 UART: [art] PUB.Y = 3089A043356C1255710A22C2633B89E7A29064171EC38FADA47373B5D72AE30A9E9A5EF5F76D5FF10D1030B1D180FFA4
3,138,973 UART: [art] SIG.R = 2D33CFC7D27C3BAF4D8EA81564EE2D80315D5DD98FF41D7E6472395366135D41EB76F82A04C3178A8C269739DC587C66
3,145,744 UART: [art] SIG.S = 21007DAE8B1311CB6F8FF96A19812EFC94EB8D4D3B0AB4534B7E38EF93490F9E03EACA3B39EA64D09B3D6BE71E819877
3,170,234 UART: Caliptra RT
3,170,487 UART: [state] CFI Enabled
3,278,356 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,552 UART: [rt]cmd =0x44504543, len=136
3,372,725 >>> mbox cmd response data (136 bytes)
3,372,726 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,693 UART: [rt]cmd =0x44504543, len=92
3,586,679 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,109 ready_for_fw is high
1,060,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,919 >>> mbox cmd response: success
2,627,919 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,689,219 UART:
2,689,235 UART: Running Caliptra FMC ...
2,689,643 UART:
2,689,697 UART: [state] CFI Enabled
2,700,216 UART: [fht] FMC Alias Private Key: 7
2,808,843 UART: [art] Extend RT PCRs Done
2,809,271 UART: [art] Lock RT PCRs Done
2,811,051 UART: [art] Populate DV Done
2,819,360 UART: [fht] FMC Alias Private Key: 7
2,820,294 UART: [art] Derive CDI
2,820,574 UART: [art] Store in in slot 0x4
2,905,907 UART: [art] Derive Key Pair
2,906,267 UART: [art] Store priv key in slot 0x5
2,919,299 UART: [art] Derive Key Pair - Done
2,933,948 UART: [art] Signing Cert with AUTHO
2,934,428 UART: RITY.KEYID = 7
2,949,520 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,285 UART: [art] PUB.X = 180676503A64F9AC680099B06C50C501C8FD951D09C0A950C248DA81E4D99CBE55D0FCC8E25A16F27568D9AB21620EC2
2,957,025 UART: [art] PUB.Y = FEA94E02E3EE9C804B55BBC97572ADFC614A94E5203E7D83DC2E0ECFCFC57C767D10DDB1A701F9B2956409C4D8103F9F
2,963,983 UART: [art] SIG.R = D5B8E74E14A3BC3A6BCFE2D475E7B66DF302C56F539018054A581883B881E10AF9B161AD58A74C3AB8AD0E290854033A
2,970,743 UART: [art] SIG.S = B285CF00A0302532C6C849763597EE78CF5B6C96DDDA6F1A5B593D2E3AD060AA33F41F7842D3FC01AD03296EEBF5B2AE
2,994,200 UART: Caliptra RT
2,994,453 UART: [state] CFI Enabled
3,102,261 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,577 UART: [rt]cmd =0x44504543, len=136
3,196,518 >>> mbox cmd response data (136 bytes)
3,196,519 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,358 UART: [rt]cmd =0x44504543, len=92
3,410,228 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,142 UART: [state] WD Timer not started. Device not locked for debugging
87,445 UART: [kat] SHA2-256
893,095 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,220 UART: [kat] ++
897,372 UART: [kat] sha1
901,578 UART: [kat] SHA2-256
903,518 UART: [kat] SHA2-384
906,047 UART: [kat] SHA2-512-ACC
907,948 UART: [kat] ECC-384
917,407 UART: [kat] HMAC-384Kdf
922,255 UART: [kat] LMS
1,170,583 UART: [kat] --
1,171,510 UART: [cold-reset] ++
1,171,862 UART: [fht] FHT @ 0x50003400
1,174,617 UART: [idev] ++
1,174,785 UART: [idev] CDI.KEYID = 6
1,175,145 UART: [idev] SUBJECT.KEYID = 7
1,175,569 UART: [idev] UDS.KEYID = 0
1,175,914 ready_for_fw is high
1,175,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,619 UART: [idev] Erasing UDS.KEYID = 0
1,200,556 UART: [idev] Sha1 KeyId Algorithm
1,208,884 UART: [idev] --
1,210,054 UART: [ldev] ++
1,210,222 UART: [ldev] CDI.KEYID = 6
1,210,585 UART: [ldev] SUBJECT.KEYID = 5
1,211,011 UART: [ldev] AUTHORITY.KEYID = 7
1,211,474 UART: [ldev] FE.KEYID = 1
1,216,900 UART: [ldev] Erasing FE.KEYID = 1
1,243,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,488 UART: [ldev] --
1,282,749 UART: [fwproc] Wait for Commands...
1,283,567 UART: [fwproc] Recv command 0x46574c44
1,284,295 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,907 >>> mbox cmd response: success
2,776,907 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,777,959 UART: [afmc] ++
2,778,127 UART: [afmc] CDI.KEYID = 6
2,778,489 UART: [afmc] SUBJECT.KEYID = 7
2,778,914 UART: [afmc] AUTHORITY.KEYID = 5
2,814,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,855 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,574 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,374 UART: [afmc] --
2,857,326 UART: [cold-reset] --
2,857,962 UART: [state] Locking Datavault
2,859,093 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,697 UART: [state] Locking ICCM
2,860,259 UART: [exit] Launching FMC @ 0x40000130
2,865,588 UART:
2,865,604 UART: Running Caliptra FMC ...
2,866,012 UART:
2,866,155 UART: [state] CFI Enabled
2,876,624 UART: [fht] FMC Alias Private Key: 7
2,984,741 UART: [art] Extend RT PCRs Done
2,985,169 UART: [art] Lock RT PCRs Done
2,986,847 UART: [art] Populate DV Done
2,995,150 UART: [fht] FMC Alias Private Key: 7
2,996,088 UART: [art] Derive CDI
2,996,368 UART: [art] Store in in slot 0x4
3,082,253 UART: [art] Derive Key Pair
3,082,613 UART: [art] Store priv key in slot 0x5
3,095,941 UART: [art] Derive Key Pair - Done
3,111,029 UART: [art] Signing Cert with AUTHO
3,111,509 UART: RITY.KEYID = 7
3,126,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,638 UART: [art] PUB.X = 3A722F0F39CA4443B0724FFE3E4028374F336D9F62BC1CEBE5120100DA01CA5BC69CD3D6C028573FF85EBA71DE6F49D0
3,134,391 UART: [art] PUB.Y = 1AEB5FE298E7FDBDA453494E55EF1AACCF8640DA70410D1DA22634718D1B895FC68AB08116CFBFE211E159C029E361D9
3,141,354 UART: [art] SIG.R = DA2D7CCDBFE4C9EDBC1E45F5E5113B5CA9CDEC5D93F14026019CECF793E5879A42000B4E6B082FCB17BA6629EA2DE126
3,148,119 UART: [art] SIG.S = 5311D511309AC6FC8528A2A18C92360AB41AB77E3DDAFA15DCDFD3656CF693A7B506FC5F2153ADC3A2CC1E9F2D10A812
3,171,828 UART: Caliptra RT
3,172,173 UART: [state] CFI Enabled
3,281,210 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,668 UART: [rt]cmd =0x44504543, len=136
3,377,083 >>> mbox cmd response data (136 bytes)
3,377,084 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,793 UART: [rt]cmd =0x44504543, len=92
3,590,594 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,700 ready_for_fw is high
1,060,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,270 >>> mbox cmd response: success
2,630,270 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,692,626 UART:
2,692,642 UART: Running Caliptra FMC ...
2,693,050 UART:
2,693,193 UART: [state] CFI Enabled
2,703,956 UART: [fht] FMC Alias Private Key: 7
2,811,969 UART: [art] Extend RT PCRs Done
2,812,397 UART: [art] Lock RT PCRs Done
2,813,935 UART: [art] Populate DV Done
2,821,984 UART: [fht] FMC Alias Private Key: 7
2,822,966 UART: [art] Derive CDI
2,823,246 UART: [art] Store in in slot 0x4
2,909,177 UART: [art] Derive Key Pair
2,909,537 UART: [art] Store priv key in slot 0x5
2,923,245 UART: [art] Derive Key Pair - Done
2,937,650 UART: [art] Signing Cert with AUTHO
2,938,130 UART: RITY.KEYID = 7
2,953,202 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,967 UART: [art] PUB.X = F75EDD50F914CFEEBB7A2B2BA82C658498D8BA496EE79E51B992852D58A5F27E46349A5DD53493E626F7DFE5D3873FAF
2,960,753 UART: [art] PUB.Y = F61679986412B6037F655237ADD443E002E7573A3A9FAC5F73D9A7D37C87996951BB7CFCF474C94E23206452EFD56BC2
2,967,697 UART: [art] SIG.R = 9A4E93FAF20F6A03A8D91BD392BCD7D1B2A4004D6F03B39E2AFDDA627E585D1F0644F35AEF2F80DCF55D1B0F7A22D119
2,974,452 UART: [art] SIG.S = 5628CEB1F52D84834CF28E6738B697786E8B71299D91D0D267FBE5DB25FCC097673F8E75C8D3605CD775B45A8F8756BD
2,997,467 UART: Caliptra RT
2,997,812 UART: [state] CFI Enabled
3,104,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,135 UART: [rt]cmd =0x44504543, len=136
3,199,956 >>> mbox cmd response data (136 bytes)
3,199,957 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,926 UART: [rt]cmd =0x44504543, len=92
3,413,991 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,149 UART: [kat] ++
895,301 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,216 UART: [kat] SHA2-512-ACC
906,117 UART: [kat] ECC-384
915,806 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,441 UART: [idev] ++
1,172,609 UART: [idev] CDI.KEYID = 6
1,172,970 UART: [idev] SUBJECT.KEYID = 7
1,173,395 UART: [idev] UDS.KEYID = 0
1,173,741 ready_for_fw is high
1,173,741 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,159 UART: [idev] Erasing UDS.KEYID = 0
1,198,163 UART: [idev] Sha1 KeyId Algorithm
1,206,993 UART: [idev] --
1,208,130 UART: [ldev] ++
1,208,298 UART: [ldev] CDI.KEYID = 6
1,208,662 UART: [ldev] SUBJECT.KEYID = 5
1,209,089 UART: [ldev] AUTHORITY.KEYID = 7
1,209,552 UART: [ldev] FE.KEYID = 1
1,214,822 UART: [ldev] Erasing FE.KEYID = 1
1,241,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,424 UART: [ldev] --
1,280,882 UART: [fwproc] Wait for Commands...
1,281,595 UART: [fwproc] Recv command 0x46574c44
1,282,328 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,868 >>> mbox cmd response: success
2,773,868 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,021 UART: [afmc] ++
2,775,189 UART: [afmc] CDI.KEYID = 6
2,775,552 UART: [afmc] SUBJECT.KEYID = 7
2,775,978 UART: [afmc] AUTHORITY.KEYID = 5
2,811,367 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,214 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,943 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,826 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,545 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,212 UART: [afmc] --
2,854,330 UART: [cold-reset] --
2,855,086 UART: [state] Locking Datavault
2,856,175 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,779 UART: [state] Locking ICCM
2,857,215 UART: [exit] Launching FMC @ 0x40000130
2,862,544 UART:
2,862,560 UART: Running Caliptra FMC ...
2,862,968 UART:
2,863,022 UART: [state] CFI Enabled
2,873,065 UART: [fht] FMC Alias Private Key: 7
2,981,212 UART: [art] Extend RT PCRs Done
2,981,640 UART: [art] Lock RT PCRs Done
2,983,154 UART: [art] Populate DV Done
2,991,335 UART: [fht] FMC Alias Private Key: 7
2,992,397 UART: [art] Derive CDI
2,992,677 UART: [art] Store in in slot 0x4
3,077,770 UART: [art] Derive Key Pair
3,078,130 UART: [art] Store priv key in slot 0x5
3,091,440 UART: [art] Derive Key Pair - Done
3,106,357 UART: [art] Signing Cert with AUTHO
3,106,837 UART: RITY.KEYID = 7
3,121,467 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,232 UART: [art] PUB.X = 9C1837524C1223FFBB68110AA495F1F58419246A9041D2BC18F77DF7DDFB4281EAC526D8647E5BB6E16EB389EEA689F2
3,129,007 UART: [art] PUB.Y = C341FD724E7D1E73374B6B9119BE8571D8D79F8F82AB84DA06FFFE5D4C5854621818429D256D69EC3FC3FD62881868F4
3,135,958 UART: [art] SIG.R = 2181493AEED4DF892B6874CD3DEF20DC70FB59B591102970743487E17193517AA11285FF8844DC16D7BC2CD001DD4F23
3,142,727 UART: [art] SIG.S = ED7B88E38983AEBD0A3878A80A8C279FB2AA60E503EDA5ADE9D86FC5280EC0B017D4EFF1BBA940A73ABD8C867AB16DCE
3,166,832 UART: Caliptra RT
3,167,085 UART: [state] CFI Enabled
3,274,930 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,334 UART: [rt]cmd =0x44504543, len=136
3,370,041 >>> mbox cmd response data (136 bytes)
3,370,042 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,031 UART: [rt]cmd =0x44504543, len=92
3,583,343 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,478 ready_for_fw is high
1,055,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,728 >>> mbox cmd response: success
2,622,728 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,684,580 UART:
2,684,596 UART: Running Caliptra FMC ...
2,685,004 UART:
2,685,058 UART: [state] CFI Enabled
2,695,631 UART: [fht] FMC Alias Private Key: 7
2,803,826 UART: [art] Extend RT PCRs Done
2,804,254 UART: [art] Lock RT PCRs Done
2,805,894 UART: [art] Populate DV Done
2,814,083 UART: [fht] FMC Alias Private Key: 7
2,815,205 UART: [art] Derive CDI
2,815,485 UART: [art] Store in in slot 0x4
2,900,896 UART: [art] Derive Key Pair
2,901,256 UART: [art] Store priv key in slot 0x5
2,914,246 UART: [art] Derive Key Pair - Done
2,929,280 UART: [art] Signing Cert with AUTHO
2,929,760 UART: RITY.KEYID = 7
2,945,066 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,831 UART: [art] PUB.X = 71F15E90DD19C50D13361DB9AE64CBBCC3D05CD477159728484BC3CC60427B67E135A83498AD5F1BBBE05D7F54C8B710
2,952,608 UART: [art] PUB.Y = E7E18335DAAD7F30210F6C77AE43AEDDC2BF428320DA0D585134D06E805B904D3A60F6C66120567FB6769F31F2541E05
2,959,553 UART: [art] SIG.R = E415D6BFA43F7776D87B0063739DAB4CF76876D8A30D9D4CBFACBA627EE9A9A97EFCBD20908A1C0F3C1B2E5B24F06D78
2,966,317 UART: [art] SIG.S = D0A2D4771D16E966F8BB18C84DC67A777D1801A311BA6740954BB993AB897B13DD127F325BEEC0CDC6B22D2E29C7C559
2,989,763 UART: Caliptra RT
2,990,016 UART: [state] CFI Enabled
3,098,442 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,956 UART: [rt]cmd =0x44504543, len=136
3,193,021 >>> mbox cmd response data (136 bytes)
3,193,022 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,945 UART: [rt]cmd =0x44504543, len=92
3,405,206 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
891,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
916,641 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,228 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,174,480 ready_for_fw is high
1,174,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,064 UART: [idev] Erasing UDS.KEYID = 0
1,198,744 UART: [idev] Sha1 KeyId Algorithm
1,207,570 UART: [idev] --
1,208,389 UART: [ldev] ++
1,208,557 UART: [ldev] CDI.KEYID = 6
1,208,921 UART: [ldev] SUBJECT.KEYID = 5
1,209,348 UART: [ldev] AUTHORITY.KEYID = 7
1,209,811 UART: [ldev] FE.KEYID = 1
1,215,027 UART: [ldev] Erasing FE.KEYID = 1
1,241,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,277 UART: [ldev] --
1,280,577 UART: [fwproc] Wait for Commands...
1,281,302 UART: [fwproc] Recv command 0x46574c44
1,282,035 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,776 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,117 >>> mbox cmd response: success
2,774,117 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,302 UART: [afmc] ++
2,775,470 UART: [afmc] CDI.KEYID = 6
2,775,833 UART: [afmc] SUBJECT.KEYID = 7
2,776,259 UART: [afmc] AUTHORITY.KEYID = 5
2,812,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,049 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,768 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,573 UART: [afmc] --
2,855,673 UART: [cold-reset] --
2,856,547 UART: [state] Locking Datavault
2,857,662 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,266 UART: [state] Locking ICCM
2,858,828 UART: [exit] Launching FMC @ 0x40000130
2,864,157 UART:
2,864,173 UART: Running Caliptra FMC ...
2,864,581 UART:
2,864,724 UART: [state] CFI Enabled
2,875,171 UART: [fht] FMC Alias Private Key: 7
2,982,822 UART: [art] Extend RT PCRs Done
2,983,250 UART: [art] Lock RT PCRs Done
2,985,010 UART: [art] Populate DV Done
2,993,229 UART: [fht] FMC Alias Private Key: 7
2,994,181 UART: [art] Derive CDI
2,994,461 UART: [art] Store in in slot 0x4
3,080,176 UART: [art] Derive Key Pair
3,080,536 UART: [art] Store priv key in slot 0x5
3,093,676 UART: [art] Derive Key Pair - Done
3,108,501 UART: [art] Signing Cert with AUTHO
3,108,981 UART: RITY.KEYID = 7
3,124,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,112 UART: [art] PUB.X = 5D5C2DBE5DF26EB7C4DAFCEFF89AB9045B8987B92644030E1CD1162075BCBFEAF36B3561EA8566413D6F1F07C1304758
3,131,884 UART: [art] PUB.Y = 718C200635A61C531D8680B983566719EFCD736563E1A54CEED3B82DEE01953ACFC33502E1C7D6BBFA540FE2B3097F88
3,138,825 UART: [art] SIG.R = F48AD8193203403B48C6952A391ECEEA3F11021815CCEF14B1FE64E3AC4B4161600F550FF600E2D4AABBDF7DF257A5EC
3,145,577 UART: [art] SIG.S = CF22D9D3D3E85FEF5E6CB1FCD6A8C6AF8B74613324C0E4D0924A81D96C10D705CBD738BB517E5F140C5B3EDA068057D2
3,169,075 UART: Caliptra RT
3,169,420 UART: [state] CFI Enabled
3,276,866 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,306 UART: [rt]cmd =0x44504543, len=136
3,372,281 >>> mbox cmd response data (136 bytes)
3,372,282 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,325 UART: [rt]cmd =0x44504543, len=92
3,585,472 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,291 ready_for_fw is high
1,056,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,495 >>> mbox cmd response: success
2,625,495 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,688,013 UART:
2,688,029 UART: Running Caliptra FMC ...
2,688,437 UART:
2,688,580 UART: [state] CFI Enabled
2,699,455 UART: [fht] FMC Alias Private Key: 7
2,807,790 UART: [art] Extend RT PCRs Done
2,808,218 UART: [art] Lock RT PCRs Done
2,809,936 UART: [art] Populate DV Done
2,818,279 UART: [fht] FMC Alias Private Key: 7
2,819,251 UART: [art] Derive CDI
2,819,531 UART: [art] Store in in slot 0x4
2,905,312 UART: [art] Derive Key Pair
2,905,672 UART: [art] Store priv key in slot 0x5
2,919,544 UART: [art] Derive Key Pair - Done
2,934,464 UART: [art] Signing Cert with AUTHO
2,934,944 UART: RITY.KEYID = 7
2,950,626 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,391 UART: [art] PUB.X = 9A3A107CED135E7027A087BF2A1B774F2E5AD8A52DB84B67C99D7915A2C095B224321EC9C5C9E0951C71357A64CBFEDB
2,958,173 UART: [art] PUB.Y = 6829027C0B7FAF4F7F18E21F79076976942F657B375F63711407FAF78EE96F54EDC61490D1907B3FB7A6F89D0D533B50
2,965,106 UART: [art] SIG.R = 05C98EB92362CAFEACF27FAF6498C761AE945321BD9DB46D4542ADB8952F584E05FD69429DBB9789E510E5F89BF22149
2,971,880 UART: [art] SIG.S = 7C79F352B4CAB01B4F1DC9734E9D8B72582EAB8B86BCBC720465DAE8EEED3BFA97E8A0B7060DC7D5C0B77F886A2A5285
2,995,840 UART: Caliptra RT
2,996,185 UART: [state] CFI Enabled
3,104,066 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,508 UART: [rt]cmd =0x44504543, len=136
3,198,607 >>> mbox cmd response data (136 bytes)
3,198,608 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,481 UART: [rt]cmd =0x44504543, len=92
3,410,992 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,110 UART:
192,473 UART: Running Caliptra ROM ...
193,584 UART:
193,744 UART: [state] CFI Enabled
263,418 UART: [state] LifecycleState = Unprovisioned
265,409 UART: [state] DebugLocked = No
267,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,300 UART: [kat] SHA2-256
443,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,507 UART: [kat] ++
453,991 UART: [kat] sha1
463,518 UART: [kat] SHA2-256
466,171 UART: [kat] SHA2-384
471,590 UART: [kat] SHA2-512-ACC
473,956 UART: [kat] ECC-384
2,768,867 UART: [kat] HMAC-384Kdf
2,800,789 UART: [kat] LMS
3,991,086 UART: [kat] --
3,996,688 UART: [cold-reset] ++
3,998,571 UART: [fht] Storing FHT @ 0x50003400
4,011,261 UART: [idev] ++
4,011,905 UART: [idev] CDI.KEYID = 6
4,012,826 UART: [idev] SUBJECT.KEYID = 7
4,014,077 UART: [idev] UDS.KEYID = 0
4,015,180 ready_for_fw is high
4,015,408 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,043 UART: [idev] Erasing UDS.KEYID = 0
7,350,026 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,905 UART: [idev] --
7,376,851 UART: [ldev] ++
7,377,419 UART: [ldev] CDI.KEYID = 6
7,378,439 UART: [ldev] SUBJECT.KEYID = 5
7,379,601 UART: [ldev] AUTHORITY.KEYID = 7
7,380,884 UART: [ldev] FE.KEYID = 1
7,424,480 UART: [ldev] Erasing FE.KEYID = 1
10,758,011 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,044 UART: [ldev] --
13,135,907 UART: [fwproc] Waiting for Commands...
13,138,003 UART: [fwproc] Received command 0x46574c44
13,140,188 UART: [fwproc] Received Image of size 114124 bytes
17,195,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,708 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,615 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,659,141 >>> mbox cmd response: success
17,663,333 UART: [afmc] ++
17,663,929 UART: [afmc] CDI.KEYID = 6
17,664,848 UART: [afmc] SUBJECT.KEYID = 7
17,666,085 UART: [afmc] AUTHORITY.KEYID = 5
21,027,528 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,323,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,326,174 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,340,541 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,355,373 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,369,825 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,391,034 UART: [afmc] --
23,394,472 UART: [cold-reset] --
23,398,765 UART: [state] Locking Datavault
23,404,449 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,212 UART: [state] Locking ICCM
23,407,936 UART: [exit] Launching FMC @ 0x40000130
23,416,332 UART:
23,416,566 UART: Running Caliptra FMC ...
23,417,665 UART:
23,417,845 UART: [state] CFI Enabled
23,484,062 UART: [fht] FMC Alias Private Key: 7
25,822,500 UART: [art] Extend RT PCRs Done
25,823,724 UART: [art] Lock RT PCRs Done
25,825,449 UART: [art] Populate DV Done
25,830,700 UART: [fht] FMC Alias Private Key: 7
25,832,189 UART: [art] Derive CDI
25,832,927 UART: [art] Store in in slot 0x4
25,892,016 UART: [art] Derive Key Pair
25,893,054 UART: [art] Store priv key in slot 0x5
29,185,871 UART: [art] Derive Key Pair - Done
29,198,869 UART: [art] Signing Cert with AUTHO
29,200,169 UART: RITY.KEYID = 7
31,487,064 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,561 UART: [art] PUB.X = B5ED699DBB25128257F9FC7E6A3A9F82D499BA96703ED4069B13A5D8D1260D8A00BBC573B844DFB26AF74A24AC6D40B9
31,495,858 UART: [art] PUB.Y = 9B7A36E813CF2B7F7B6DFD1C116E3985663E80A472D159D3D7326F145E9DADA3B38D34EE0A467743B71B5AF2350B58E8
31,503,101 UART: [art] SIG.R = DE67D970FE3986EE8F722107F9A8FA497C92FF64FDB856527C8EC4510E7C89363123CE2D6D8F19DF425120F921BE1B98
31,510,497 UART: [art] SIG.S = A43E5DE188A044491FF20F48FAD5873708449AFBC8AD569599EA1B3D7E67DA295B96F880F1EC981D490EF8CCF2023151
32,815,590 UART: Caliptra RT
32,816,300 UART: [state] CFI Enabled
32,976,647 UART: [rt] RT listening for mailbox commands...
32,980,611 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,025,076 UART: [rt]cmd =0x4c4d5356, len=1672
34,228,423 >>> mbox cmd response data (8 bytes)
34,230,885 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,275,385 UART: [rt]cmd =0x4c4d5356, len=1672
35,042,773 >>> mbox cmd response data (8 bytes)
35,045,190 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,089,908 UART: [rt]cmd =0x4c4d5356, len=1672
35,830,813 >>> mbox cmd response data (8 bytes)
35,833,185 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,877,567 UART: [rt]cmd =0x4c4d5356, len=1672
36,644,498 >>> mbox cmd response data (8 bytes)
36,645,760 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,690,193 UART: [rt]cmd =0x4c4d5356, len=1672
37,535,019 >>> mbox cmd response data (8 bytes)
37,536,309 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,580,859 UART: [rt]cmd =0x4c4d5356, len=1672
38,321,883 >>> mbox cmd response data (8 bytes)
38,323,143 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,367,682 UART: [rt]cmd =0x4c4d5356, len=1672
39,160,582 >>> mbox cmd response data (8 bytes)
39,161,878 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,206,150 UART: [rt]cmd =0x4c4d5356, len=1672
40,025,268 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,786,587 ready_for_fw is high
3,787,214 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,845,302 >>> mbox cmd response: success
23,544,996 UART:
23,545,385 UART: Running Caliptra FMC ...
23,546,523 UART:
23,546,684 UART: [state] CFI Enabled
23,614,157 UART: [fht] FMC Alias Private Key: 7
25,952,088 UART: [art] Extend RT PCRs Done
25,953,320 UART: [art] Lock RT PCRs Done
25,955,289 UART: [art] Populate DV Done
25,960,549 UART: [fht] FMC Alias Private Key: 7
25,962,150 UART: [art] Derive CDI
25,962,901 UART: [art] Store in in slot 0x4
26,023,575 UART: [art] Derive Key Pair
26,024,626 UART: [art] Store priv key in slot 0x5
29,317,351 UART: [art] Derive Key Pair - Done
29,330,058 UART: [art] Signing Cert with AUTHO
29,331,396 UART: RITY.KEYID = 7
31,619,115 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,624 UART: [art] PUB.X = 9A94CD486AEA4D02C5DB2A1CD5A9A2BC4A3C0571429810EF766309FFD384B8C4A6D3BE67D88DC08330298151F6D110C5
31,627,852 UART: [art] PUB.Y = 183182EFC9AA3DAE4184081F5894C856A3CF77A35673B592081CBC7074290E4EBB35073EFF0F17755FED3769CFB87F10
31,635,109 UART: [art] SIG.R = 7C00AB5EA8EA031241DE22DE57D4D6701E517FE26CBC53DED0D4FCB6BCCACDFF554F2C9734AEAFA350D5C7E7EAB52AA8
31,642,527 UART: [art] SIG.S = 89BBC2FC817C14DE7CE0808554B4A033FF380807E337AF9CAC6AA3841BBD48A6193CB0D7207569103710E00D17AC5F04
32,947,748 UART: Caliptra RT
32,948,466 UART: [state] CFI Enabled
33,109,779 UART: [rt] RT listening for mailbox commands...
33,113,723 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,158,166 UART: [rt]cmd =0x4c4d5356, len=1672
34,361,704 >>> mbox cmd response data (8 bytes)
34,364,358 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,408,881 UART: [rt]cmd =0x4c4d5356, len=1672
35,176,073 >>> mbox cmd response data (8 bytes)
35,178,481 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,222,803 UART: [rt]cmd =0x4c4d5356, len=1672
35,963,877 >>> mbox cmd response data (8 bytes)
35,966,415 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,010,769 UART: [rt]cmd =0x4c4d5356, len=1672
36,777,620 >>> mbox cmd response data (8 bytes)
36,778,904 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,823,337 UART: [rt]cmd =0x4c4d5356, len=1672
37,668,445 >>> mbox cmd response data (8 bytes)
37,669,734 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,714,271 UART: [rt]cmd =0x4c4d5356, len=1672
38,455,464 >>> mbox cmd response data (8 bytes)
38,456,753 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,501,291 UART: [rt]cmd =0x4c4d5356, len=1672
39,294,410 >>> mbox cmd response data (8 bytes)
39,295,688 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,339,968 UART: [rt]cmd =0x4c4d5356, len=1672
40,159,128 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,366 UART:
192,740 UART: Running Caliptra ROM ...
193,836 UART:
603,518 UART: [state] CFI Enabled
615,329 UART: [state] LifecycleState = Unprovisioned
617,272 UART: [state] DebugLocked = No
620,073 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,876 UART: [kat] SHA2-256
795,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,187 UART: [kat] ++
806,667 UART: [kat] sha1
817,677 UART: [kat] SHA2-256
820,393 UART: [kat] SHA2-384
827,023 UART: [kat] SHA2-512-ACC
829,389 UART: [kat] ECC-384
3,113,442 UART: [kat] HMAC-384Kdf
3,125,008 UART: [kat] LMS
4,315,152 UART: [kat] --
4,321,303 UART: [cold-reset] ++
4,322,671 UART: [fht] Storing FHT @ 0x50003400
4,334,133 UART: [idev] ++
4,334,725 UART: [idev] CDI.KEYID = 6
4,335,607 UART: [idev] SUBJECT.KEYID = 7
4,336,939 UART: [idev] UDS.KEYID = 0
4,337,914 ready_for_fw is high
4,338,125 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,356 UART: [idev] Erasing UDS.KEYID = 0
7,625,115 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,145 UART: [idev] --
7,650,756 UART: [ldev] ++
7,651,316 UART: [ldev] CDI.KEYID = 6
7,652,241 UART: [ldev] SUBJECT.KEYID = 5
7,653,494 UART: [ldev] AUTHORITY.KEYID = 7
7,654,770 UART: [ldev] FE.KEYID = 1
7,665,594 UART: [ldev] Erasing FE.KEYID = 1
10,953,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,618 UART: [ldev] --
13,313,984 UART: [fwproc] Waiting for Commands...
13,316,715 UART: [fwproc] Received command 0x46574c44
13,318,890 UART: [fwproc] Received Image of size 114124 bytes
17,374,829 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,202 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,076 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,832,739 >>> mbox cmd response: success
17,836,072 UART: [afmc] ++
17,836,663 UART: [afmc] CDI.KEYID = 6
17,837,540 UART: [afmc] SUBJECT.KEYID = 7
17,838,805 UART: [afmc] AUTHORITY.KEYID = 5
21,154,830 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,701 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,949 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,347 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,172 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,607 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,592 UART: [afmc] --
23,520,592 UART: [cold-reset] --
23,524,611 UART: [state] Locking Datavault
23,530,595 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,361 UART: [state] Locking ICCM
23,534,833 UART: [exit] Launching FMC @ 0x40000130
23,543,174 UART:
23,543,404 UART: Running Caliptra FMC ...
23,544,498 UART:
23,544,647 UART: [state] CFI Enabled
23,552,929 UART: [fht] FMC Alias Private Key: 7
25,884,266 UART: [art] Extend RT PCRs Done
25,885,480 UART: [art] Lock RT PCRs Done
25,887,310 UART: [art] Populate DV Done
25,892,564 UART: [fht] FMC Alias Private Key: 7
25,894,152 UART: [art] Derive CDI
25,894,960 UART: [art] Store in in slot 0x4
25,937,495 UART: [art] Derive Key Pair
25,938,523 UART: [art] Store priv key in slot 0x5
29,180,257 UART: [art] Derive Key Pair - Done
29,193,201 UART: [art] Signing Cert with AUTHO
29,194,504 UART: RITY.KEYID = 7
31,474,251 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,752 UART: [art] PUB.X = FF9D548A9A8F9578FDC6522B8F6CB299C2913EE43AC0A423A2D087BE9EEEAAE5526AB752A78A0ED0DF88F397C193068C
31,483,039 UART: [art] PUB.Y = 81BAC56A02C2A95CAE2769FBEDCEFB4D530C6556930FD621CA9FFED9093F2E9B2E41A49C0106E493359170187D8BE5ED
31,490,250 UART: [art] SIG.R = 446D4D74AAE92E1F60B3C6ACB5748EAC4DDA6DBDFCF03ABB0746F340FACAE8F894423BF4369BCE2F2593EAB504D8C070
31,497,679 UART: [art] SIG.S = 6C74DAAD6954357E1B9FB25177EEAB5E6B6073823867B649EEB8721AF8CA31FA8346C06801C9495EAE3D7C954EB4D653
32,803,006 UART: Caliptra RT
32,803,706 UART: [state] CFI Enabled
32,920,805 UART: [rt] RT listening for mailbox commands...
32,924,764 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,969,189 UART: [rt]cmd =0x4c4d5356, len=1672
34,172,504 >>> mbox cmd response data (8 bytes)
34,175,150 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,219,501 UART: [rt]cmd =0x4c4d5356, len=1672
34,986,425 >>> mbox cmd response data (8 bytes)
34,988,836 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,033,379 UART: [rt]cmd =0x4c4d5356, len=1672
35,774,322 >>> mbox cmd response data (8 bytes)
35,776,732 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,821,103 UART: [rt]cmd =0x4c4d5356, len=1672
36,588,245 >>> mbox cmd response data (8 bytes)
36,589,507 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,634,037 UART: [rt]cmd =0x4c4d5356, len=1672
37,479,093 >>> mbox cmd response data (8 bytes)
37,480,397 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,524,995 UART: [rt]cmd =0x4c4d5356, len=1672
38,266,258 >>> mbox cmd response data (8 bytes)
38,267,512 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,311,882 UART: [rt]cmd =0x4c4d5356, len=1672
39,104,815 >>> mbox cmd response data (8 bytes)
39,106,063 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,150,550 UART: [rt]cmd =0x4c4d5356, len=1672
39,969,652 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,128,418 ready_for_fw is high
4,128,819 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,064,512 >>> mbox cmd response: success
23,701,533 UART:
23,701,934 UART: Running Caliptra FMC ...
23,703,033 UART:
23,703,191 UART: [state] CFI Enabled
23,711,081 UART: [fht] FMC Alias Private Key: 7
26,041,472 UART: [art] Extend RT PCRs Done
26,042,699 UART: [art] Lock RT PCRs Done
26,044,702 UART: [art] Populate DV Done
26,049,958 UART: [fht] FMC Alias Private Key: 7
26,051,831 UART: [art] Derive CDI
26,052,601 UART: [art] Store in in slot 0x4
26,094,926 UART: [art] Derive Key Pair
26,095,920 UART: [art] Store priv key in slot 0x5
29,337,668 UART: [art] Derive Key Pair - Done
29,350,341 UART: [art] Signing Cert with AUTHO
29,351,645 UART: RITY.KEYID = 7
31,630,641 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,142 UART: [art] PUB.X = 18561744D59B2FE540DF9FFD9EC3AC52D5BFDA43D8B4577165EB0A4AC7499A6BD98D010C729F311BC71121F9B9219AB5
31,639,428 UART: [art] PUB.Y = 9B2AFE0CA08106BBF04C877F02DDAD5012C49207794361995293D0C69E5EF14BC8B7A78B0497A4225CD67A396147B642
31,646,647 UART: [art] SIG.R = 6A1EB3DD19981F396219A863B8E6E989A72400648D7AEEFF16C15F9D4C8E70AF61967141391054ECAEFAB091A8E62C5E
31,654,052 UART: [art] SIG.S = 78E98130AEFC4AB1D5318BEA790D7AA2124F16C48A4B1F4F873958E579BCD1A6DB9E179AC4B00843E5B7BDC1E6AF8B6B
32,959,315 UART: Caliptra RT
32,960,024 UART: [state] CFI Enabled
33,078,323 UART: [rt] RT listening for mailbox commands...
33,082,258 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,126,833 UART: [rt]cmd =0x4c4d5356, len=1672
34,330,551 >>> mbox cmd response data (8 bytes)
34,332,995 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,377,413 UART: [rt]cmd =0x4c4d5356, len=1672
35,144,068 >>> mbox cmd response data (8 bytes)
35,146,477 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,191,113 UART: [rt]cmd =0x4c4d5356, len=1672
35,932,068 >>> mbox cmd response data (8 bytes)
35,934,440 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,978,718 UART: [rt]cmd =0x4c4d5356, len=1672
36,745,399 >>> mbox cmd response data (8 bytes)
36,746,686 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,790,905 UART: [rt]cmd =0x4c4d5356, len=1672
37,635,353 >>> mbox cmd response data (8 bytes)
37,636,625 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,681,060 UART: [rt]cmd =0x4c4d5356, len=1672
38,421,966 >>> mbox cmd response data (8 bytes)
38,423,267 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,467,597 UART: [rt]cmd =0x4c4d5356, len=1672
39,259,983 >>> mbox cmd response data (8 bytes)
39,261,266 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,305,798 UART: [rt]cmd =0x4c4d5356, len=1672
40,124,126 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
191,983 UART:
192,356 UART: Running Caliptra ROM ...
193,549 UART:
193,726 UART: [state] CFI Enabled
263,016 UART: [state] LifecycleState = Unprovisioned
264,817 UART: [state] DebugLocked = No
266,694 UART: [state] WD Timer not started. Device not locked for debugging
270,899 UART: [kat] SHA2-256
449,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,595 UART: [kat] ++
462,046 UART: [kat] sha1
473,419 UART: [kat] SHA2-256
476,431 UART: [kat] SHA2-384
482,846 UART: [kat] SHA2-512-ACC
485,785 UART: [kat] ECC-384
2,951,872 UART: [kat] HMAC-384Kdf
2,975,052 UART: [kat] LMS
3,504,523 UART: [kat] --
3,508,730 UART: [cold-reset] ++
3,511,310 UART: [fht] FHT @ 0x50003400
3,521,784 UART: [idev] ++
3,522,339 UART: [idev] CDI.KEYID = 6
3,523,298 UART: [idev] SUBJECT.KEYID = 7
3,524,469 UART: [idev] UDS.KEYID = 0
3,525,396 ready_for_fw is high
3,525,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,661 UART: [idev] Erasing UDS.KEYID = 0
6,029,396 UART: [idev] Sha1 KeyId Algorithm
6,051,339 UART: [idev] --
6,056,153 UART: [ldev] ++
6,056,726 UART: [ldev] CDI.KEYID = 6
6,057,615 UART: [ldev] SUBJECT.KEYID = 5
6,058,832 UART: [ldev] AUTHORITY.KEYID = 7
6,060,071 UART: [ldev] FE.KEYID = 1
6,102,648 UART: [ldev] Erasing FE.KEYID = 1
8,607,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,720 UART: [ldev] --
10,415,554 UART: [fwproc] Wait for Commands...
10,417,380 UART: [fwproc] Recv command 0x46574c44
10,419,469 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,856 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,781 >>> mbox cmd response: success
14,284,035 UART: [afmc] ++
14,284,634 UART: [afmc] CDI.KEYID = 6
14,285,551 UART: [afmc] SUBJECT.KEYID = 7
14,286,734 UART: [afmc] AUTHORITY.KEYID = 5
16,832,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,303 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,337 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,185 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,693 UART: [afmc] --
18,633,771 UART: [cold-reset] --
18,638,114 UART: [state] Locking Datavault
18,640,928 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,622 UART: [state] Locking ICCM
18,644,396 UART: [exit] Launching FMC @ 0x40000130
18,652,845 UART:
18,653,078 UART: Running Caliptra FMC ...
18,654,182 UART:
18,654,368 UART: [state] CFI Enabled
18,715,006 UART: [fht] FMC Alias Private Key: 7
20,478,503 UART: [art] Extend RT PCRs Done
20,479,736 UART: [art] Lock RT PCRs Done
20,481,258 UART: [art] Populate DV Done
20,486,722 UART: [fht] FMC Alias Private Key: 7
20,488,263 UART: [art] Derive CDI
20,489,023 UART: [art] Store in in slot 0x4
20,548,284 UART: [art] Derive Key Pair
20,549,321 UART: [art] Store priv key in slot 0x5
23,013,681 UART: [art] Derive Key Pair - Done
23,026,568 UART: [art] Signing Cert with AUTHO
23,027,871 UART: RITY.KEYID = 7
24,753,915 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,414 UART: [art] PUB.X = 0BE946F6CF4AB44AC68CD3562089825E9D4D57268D6EE60CF5E79CB3100973748461F2FCCB787F865ED437D55DA42A32
24,762,671 UART: [art] PUB.Y = 72F8A1700C89C566CDF7D433EC0BBA0AD912AF32E422245A88BB65277A56655922E1FAB05256F777555070FF7FE7E150
24,769,938 UART: [art] SIG.R = 09942F80EAD2442E8CDDF0B483C72DCEBB81056A08EEB96A293F69D8162EDB87F8CC8E4F16CCF44C7CBEC9DE239E2695
24,777,394 UART: [art] SIG.S = 1E6422470E6389439175BEE5CB7451BF5493505FC56A08A7E6153B931104EA493ECCD4BAA4A5A9F0C79ED557128928C9
25,756,292 UART: Caliptra RT
25,757,005 UART: [state] CFI Enabled
25,920,491 UART: [rt] RT listening for mailbox commands...
25,924,530 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,969,603 UART: [rt]cmd =0x4c4d5356, len=1672
26,384,244 >>> mbox cmd response data (8 bytes)
26,386,725 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,431,117 UART: [rt]cmd =0x4c4d5356, len=1672
26,649,922 >>> mbox cmd response data (8 bytes)
26,652,308 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,696,759 UART: [rt]cmd =0x4c4d5356, len=1672
26,914,493 >>> mbox cmd response data (8 bytes)
26,916,869 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,961,203 UART: [rt]cmd =0x4c4d5356, len=1672
27,177,007 >>> mbox cmd response data (8 bytes)
27,178,271 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,222,712 UART: [rt]cmd =0x4c4d5356, len=1672
27,441,668 >>> mbox cmd response data (8 bytes)
27,442,932 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,487,071 UART: [rt]cmd =0x4c4d5356, len=1672
27,703,358 >>> mbox cmd response data (8 bytes)
27,704,645 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,749,185 UART: [rt]cmd =0x4c4d5356, len=1672
27,965,939 >>> mbox cmd response data (8 bytes)
27,967,189 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,011,412 UART: [rt]cmd =0x4c4d5356, len=1672
28,230,971 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,383,398 ready_for_fw is high
3,383,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,054,549 >>> mbox cmd response: success
18,345,787 UART:
18,346,187 UART: Running Caliptra FMC ...
18,347,295 UART:
18,347,447 UART: [state] CFI Enabled
18,411,725 UART: [fht] FMC Alias Private Key: 7
20,175,878 UART: [art] Extend RT PCRs Done
20,177,084 UART: [art] Lock RT PCRs Done
20,178,901 UART: [art] Populate DV Done
20,184,358 UART: [fht] FMC Alias Private Key: 7
20,185,952 UART: [art] Derive CDI
20,186,769 UART: [art] Store in in slot 0x4
20,244,364 UART: [art] Derive Key Pair
20,245,402 UART: [art] Store priv key in slot 0x5
22,707,679 UART: [art] Derive Key Pair - Done
22,720,189 UART: [art] Signing Cert with AUTHO
22,721,487 UART: RITY.KEYID = 7
24,433,538 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,020 UART: [art] PUB.X = F06C66C2FFDC243B8A13256B4A461D9AD967EC64D884C5A8EACCA996E8A1CD581DA52E6B6ABD1C88BE029C91004E1D00
24,442,278 UART: [art] PUB.Y = B89EF39639E2B375B8FD88460C2BA36075C03D07C7C6C35F7FE1DA7E97716E9A99A4C403A7161E2DCD511AFB190C76C2
24,449,536 UART: [art] SIG.R = 3F81C8BFD373BD6DE05507A87A9589627E85972FD0BB4741C382B411E1739449B543D579D7AEADDEAD40855DDFDD7497
24,456,927 UART: [art] SIG.S = B9EB77DF2D08BB7E6744934CBFC99D7436242241FB601949A476D166E9EE8A302AED5D224B64BC7B93766FF9E395BD7B
25,435,862 UART: Caliptra RT
25,436,576 UART: [state] CFI Enabled
25,601,227 UART: [rt] RT listening for mailbox commands...
25,605,119 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,650,026 UART: [rt]cmd =0x4c4d5356, len=1672
26,064,786 >>> mbox cmd response data (8 bytes)
26,067,238 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,111,641 UART: [rt]cmd =0x4c4d5356, len=1672
26,330,387 >>> mbox cmd response data (8 bytes)
26,332,777 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,377,069 UART: [rt]cmd =0x4c4d5356, len=1672
26,595,135 >>> mbox cmd response data (8 bytes)
26,597,505 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,642,451 UART: [rt]cmd =0x4c4d5356, len=1672
26,858,334 >>> mbox cmd response data (8 bytes)
26,859,617 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,903,900 UART: [rt]cmd =0x4c4d5356, len=1672
27,122,929 >>> mbox cmd response data (8 bytes)
27,124,190 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,168,697 UART: [rt]cmd =0x4c4d5356, len=1672
27,384,866 >>> mbox cmd response data (8 bytes)
27,386,112 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,430,438 UART: [rt]cmd =0x4c4d5356, len=1672
27,646,967 >>> mbox cmd response data (8 bytes)
27,648,240 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,692,770 UART: [rt]cmd =0x4c4d5356, len=1672
27,912,162 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,468 UART:
192,838 UART: Running Caliptra ROM ...
194,033 UART:
603,754 UART: [state] CFI Enabled
621,387 UART: [state] LifecycleState = Unprovisioned
623,261 UART: [state] DebugLocked = No
625,502 UART: [state] WD Timer not started. Device not locked for debugging
630,021 UART: [kat] SHA2-256
809,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,748 UART: [kat] ++
821,196 UART: [kat] sha1
832,344 UART: [kat] SHA2-256
835,352 UART: [kat] SHA2-384
842,258 UART: [kat] SHA2-512-ACC
845,187 UART: [kat] ECC-384
3,286,113 UART: [kat] HMAC-384Kdf
3,297,988 UART: [kat] LMS
3,827,541 UART: [kat] --
3,833,021 UART: [cold-reset] ++
3,834,240 UART: [fht] FHT @ 0x50003400
3,846,929 UART: [idev] ++
3,847,530 UART: [idev] CDI.KEYID = 6
3,848,461 UART: [idev] SUBJECT.KEYID = 7
3,849,558 UART: [idev] UDS.KEYID = 0
3,850,602 ready_for_fw is high
3,850,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,994,375 UART: [idev] Erasing UDS.KEYID = 0
6,320,140 UART: [idev] Sha1 KeyId Algorithm
6,344,165 UART: [idev] --
6,349,010 UART: [ldev] ++
6,349,584 UART: [ldev] CDI.KEYID = 6
6,350,487 UART: [ldev] SUBJECT.KEYID = 5
6,351,688 UART: [ldev] AUTHORITY.KEYID = 7
6,352,914 UART: [ldev] FE.KEYID = 1
6,363,443 UART: [ldev] Erasing FE.KEYID = 1
8,835,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,576 UART: [ldev] --
10,629,348 UART: [fwproc] Wait for Commands...
10,630,841 UART: [fwproc] Recv command 0x46574c44
10,632,930 UART: [fwproc] Recv'd Img size: 114448 bytes
14,033,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,082 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,818 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,490,912 >>> mbox cmd response: success
14,495,542 UART: [afmc] ++
14,496,131 UART: [afmc] CDI.KEYID = 6
14,497,037 UART: [afmc] SUBJECT.KEYID = 7
14,498,191 UART: [afmc] AUTHORITY.KEYID = 5
16,999,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,593 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,312 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,381 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,195 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,177 UART: [afmc] --
18,795,728 UART: [cold-reset] --
18,799,602 UART: [state] Locking Datavault
18,806,297 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,951 UART: [state] Locking ICCM
18,810,042 UART: [exit] Launching FMC @ 0x40000130
18,818,436 UART:
18,818,663 UART: Running Caliptra FMC ...
18,819,756 UART:
18,819,910 UART: [state] CFI Enabled
18,827,624 UART: [fht] FMC Alias Private Key: 7
20,584,078 UART: [art] Extend RT PCRs Done
20,585,299 UART: [art] Lock RT PCRs Done
20,586,969 UART: [art] Populate DV Done
20,592,425 UART: [fht] FMC Alias Private Key: 7
20,594,012 UART: [art] Derive CDI
20,594,816 UART: [art] Store in in slot 0x4
20,637,511 UART: [art] Derive Key Pair
20,638,544 UART: [art] Store priv key in slot 0x5
23,065,473 UART: [art] Derive Key Pair - Done
23,078,370 UART: [art] Signing Cert with AUTHO
23,079,672 UART: RITY.KEYID = 7
24,784,693 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,172 UART: [art] PUB.X = 58B6BDADEEA918694828BF98421752E66ACE611B5C06EA342B89F386807CADA85A34E52737F75E59A3E56A793CF4F704
24,793,446 UART: [art] PUB.Y = 3B8472B0EB326428D7E0BC7E6D518227BAEF564A6237832319E0FF3591FEA245DC0C859B6F7C2E67029480ACA3F604BF
24,800,736 UART: [art] SIG.R = 5A8866B75A17E1918404E05CF32DDF43D2DFFE135345DD6C7FF556653DD0456AED1C4A08037227933EA1BF13053FB910
24,808,123 UART: [art] SIG.S = AB2D5CAD90069293CC63894C490252F1621672DC04767B43266C699F2ED834DF6688EE86D4F7A54E728175BEB19D5342
25,787,480 UART: Caliptra RT
25,788,216 UART: [state] CFI Enabled
25,905,569 UART: [rt] RT listening for mailbox commands...
25,909,491 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,953,901 UART: [rt]cmd =0x4c4d5356, len=1672
26,368,212 >>> mbox cmd response data (8 bytes)
26,370,677 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,415,147 UART: [rt]cmd =0x4c4d5356, len=1672
26,634,380 >>> mbox cmd response data (8 bytes)
26,636,775 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,681,288 UART: [rt]cmd =0x4c4d5356, len=1672
26,899,403 >>> mbox cmd response data (8 bytes)
26,901,776 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,945,943 UART: [rt]cmd =0x4c4d5356, len=1672
27,161,764 >>> mbox cmd response data (8 bytes)
27,163,057 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,207,427 UART: [rt]cmd =0x4c4d5356, len=1672
27,426,039 >>> mbox cmd response data (8 bytes)
27,427,308 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,471,864 UART: [rt]cmd =0x4c4d5356, len=1672
27,687,855 >>> mbox cmd response data (8 bytes)
27,689,110 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,733,277 UART: [rt]cmd =0x4c4d5356, len=1672
27,949,975 >>> mbox cmd response data (8 bytes)
27,951,239 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,995,665 UART: [rt]cmd =0x4c4d5356, len=1672
28,214,903 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,695,217 ready_for_fw is high
3,695,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,284,091 >>> mbox cmd response: success
18,533,364 UART:
18,533,765 UART: Running Caliptra FMC ...
18,534,902 UART:
18,535,049 UART: [state] CFI Enabled
18,543,159 UART: [fht] FMC Alias Private Key: 7
20,300,639 UART: [art] Extend RT PCRs Done
20,301,875 UART: [art] Lock RT PCRs Done
20,303,882 UART: [art] Populate DV Done
20,309,076 UART: [fht] FMC Alias Private Key: 7
20,310,663 UART: [art] Derive CDI
20,311,471 UART: [art] Store in in slot 0x4
20,354,176 UART: [art] Derive Key Pair
20,355,206 UART: [art] Store priv key in slot 0x5
22,782,564 UART: [art] Derive Key Pair - Done
22,795,502 UART: [art] Signing Cert with AUTHO
22,796,799 UART: RITY.KEYID = 7
24,502,194 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,688 UART: [art] PUB.X = 575E3BEDA8D3DC51900BE5F67A041FFDE4C1BDEAC9D06E477C66454048DFFD5245ED4288D827F4C45335340F7F096F4B
24,510,992 UART: [art] PUB.Y = F88BE23ED5A21D845B0C0BF92D3EF085357AF58C38C27B53068F8B2FE56880ADE7DEC628BEC624D8CEFCA1E38719E251
24,518,274 UART: [art] SIG.R = 62360982B3130664388CF8B50D9C82EAEAF1BA365BD88A9E14744469E9E2BB22772EACC045435974DE146FC3F07C5B84
24,525,631 UART: [art] SIG.S = 81A94A13C1C762F7671C29B3B7CEE4A00CDACCF657B51BBACF7EA7BE2BBBC5AF879997823010477CF158FCCFA3162921
25,505,054 UART: Caliptra RT
25,505,775 UART: [state] CFI Enabled
25,623,286 UART: [rt] RT listening for mailbox commands...
25,627,293 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,671,784 UART: [rt]cmd =0x4c4d5356, len=1672
26,086,201 >>> mbox cmd response data (8 bytes)
26,088,646 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,132,996 UART: [rt]cmd =0x4c4d5356, len=1672
26,351,883 >>> mbox cmd response data (8 bytes)
26,354,277 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,398,611 UART: [rt]cmd =0x4c4d5356, len=1672
26,616,645 >>> mbox cmd response data (8 bytes)
26,619,023 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,663,244 UART: [rt]cmd =0x4c4d5356, len=1672
26,878,858 >>> mbox cmd response data (8 bytes)
26,880,129 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,924,346 UART: [rt]cmd =0x4c4d5356, len=1672
27,143,190 >>> mbox cmd response data (8 bytes)
27,144,450 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,188,865 UART: [rt]cmd =0x4c4d5356, len=1672
27,405,136 >>> mbox cmd response data (8 bytes)
27,406,397 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,450,913 UART: [rt]cmd =0x4c4d5356, len=1672
27,667,537 >>> mbox cmd response data (8 bytes)
27,668,814 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,713,094 UART: [rt]cmd =0x4c4d5356, len=1672
27,932,620 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,436,274 ready_for_fw is high
3,436,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,745,725 >>> mbox cmd response: success
19,023,454 UART:
19,023,849 UART: Running Caliptra FMC ...
19,025,050 UART:
19,025,221 UART: [state] CFI Enabled
19,093,557 UART: [fht] FMC Alias Private Key: 7
20,856,986 UART: [art] Extend RT PCRs Done
20,858,216 UART: [art] Lock RT PCRs Done
20,859,855 UART: [art] Populate DV Done
20,865,384 UART: [fht] FMC Alias Private Key: 7
20,866,945 UART: [art] Derive CDI
20,867,684 UART: [art] Store in in slot 0x4
20,926,418 UART: [art] Derive Key Pair
20,927,459 UART: [art] Store priv key in slot 0x5
23,390,589 UART: [art] Derive Key Pair - Done
23,403,259 UART: [art] Signing Cert with AUTHO
23,404,563 UART: RITY.KEYID = 7
25,116,384 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,902 UART: [art] PUB.X = 6582C18FE2409424BD1BF31BA9C81DEA76961B76C8B08E2C4E4F029006344991F5F03B905CCF3C47267383558FA48F02
25,125,153 UART: [art] PUB.Y = 04664D659F395850CBC3A2ACC07C25EFF0F009AD72A57049DABEBB5DF781FA5C84A1A9C9BCE8166EF48B0938EBBEDF5B
25,132,405 UART: [art] SIG.R = FE85C92AE194D5A5B4C8710BF04135B52FD2F8A615CAAF76A98D66ECBFDD57CF48402964EC720DF256E1D241402F164C
25,139,799 UART: [art] SIG.S = F975E31067B2A929C00DCE2C6686C75095624F88AF832A25DFE68DFD58095E2F1B3AAC745DF8FEE5DB77C3F4315DAC1C
26,119,230 UART: Caliptra RT
26,119,916 UART: [state] CFI Enabled
26,283,035 UART: [rt] RT listening for mailbox commands...
26,286,980 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,332,221 UART: [rt]cmd =0x4c4d5356, len=1672
26,746,630 >>> mbox cmd response data (8 bytes)
26,749,105 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,793,667 UART: [rt]cmd =0x4c4d5356, len=1672
27,012,442 >>> mbox cmd response data (8 bytes)
27,014,835 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,059,108 UART: [rt]cmd =0x4c4d5356, len=1672
27,277,002 >>> mbox cmd response data (8 bytes)
27,279,403 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,323,830 UART: [rt]cmd =0x4c4d5356, len=1672
27,539,602 >>> mbox cmd response data (8 bytes)
27,540,859 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,585,283 UART: [rt]cmd =0x4c4d5356, len=1672
27,803,990 >>> mbox cmd response data (8 bytes)
27,805,254 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,849,743 UART: [rt]cmd =0x4c4d5356, len=1672
28,066,148 >>> mbox cmd response data (8 bytes)
28,067,409 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,111,740 UART: [rt]cmd =0x4c4d5356, len=1672
28,328,605 >>> mbox cmd response data (8 bytes)
28,329,855 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,374,109 UART: [rt]cmd =0x4c4d5356, len=1672
28,593,237 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,756,595 ready_for_fw is high
3,757,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,958,288 >>> mbox cmd response: success
19,212,092 UART:
19,212,470 UART: Running Caliptra FMC ...
19,213,658 UART:
19,213,820 UART: [state] CFI Enabled
19,221,542 UART: [fht] FMC Alias Private Key: 7
20,978,017 UART: [art] Extend RT PCRs Done
20,979,244 UART: [art] Lock RT PCRs Done
20,981,106 UART: [art] Populate DV Done
20,986,294 UART: [fht] FMC Alias Private Key: 7
20,987,999 UART: [art] Derive CDI
20,988,742 UART: [art] Store in in slot 0x4
21,031,223 UART: [art] Derive Key Pair
21,032,222 UART: [art] Store priv key in slot 0x5
23,458,410 UART: [art] Derive Key Pair - Done
23,471,670 UART: [art] Signing Cert with AUTHO
23,473,014 UART: RITY.KEYID = 7
25,178,283 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,794 UART: [art] PUB.X = FF841FDAD00503873A6983CF8EF871DAF58C07A4630539960926D6090629851A448E820DB4208B83DBFB09CFA43DCA31
25,187,030 UART: [art] PUB.Y = DD574AA0241B0B2663672CF365E9124A43E53EE1E2D82C5134E69435C377BFC349B249596915CF4CB84E7397FDD47887
25,194,299 UART: [art] SIG.R = F5935A850D50E77B2E1D0747D6FF6E078F30E7CD4633BAC18FBBA0B35E1B37AC5D0441B68B2EDE04DFA3B4017C02E066
25,201,668 UART: [art] SIG.S = AF84E3EED468530A686BC4599F15143CF4EFAA74DAABC113E7A1313E00EE78FF2868EB4FB262B97112984C9FD0EDB020
26,180,506 UART: Caliptra RT
26,181,221 UART: [state] CFI Enabled
26,298,637 UART: [rt] RT listening for mailbox commands...
26,302,536 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,347,098 UART: [rt]cmd =0x4c4d5356, len=1672
26,761,357 >>> mbox cmd response data (8 bytes)
26,763,805 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,808,088 UART: [rt]cmd =0x4c4d5356, len=1672
27,026,899 >>> mbox cmd response data (8 bytes)
27,029,299 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,073,684 UART: [rt]cmd =0x4c4d5356, len=1672
27,291,682 >>> mbox cmd response data (8 bytes)
27,294,097 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,338,536 UART: [rt]cmd =0x4c4d5356, len=1672
27,554,262 >>> mbox cmd response data (8 bytes)
27,555,532 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,600,072 UART: [rt]cmd =0x4c4d5356, len=1672
27,818,939 >>> mbox cmd response data (8 bytes)
27,820,203 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,864,403 UART: [rt]cmd =0x4c4d5356, len=1672
28,080,716 >>> mbox cmd response data (8 bytes)
28,081,966 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,126,395 UART: [rt]cmd =0x4c4d5356, len=1672
28,342,974 >>> mbox cmd response data (8 bytes)
28,344,220 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,388,498 UART: [rt]cmd =0x4c4d5356, len=1672
28,607,703 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,240 UART: [kat] SHA2-512-ACC
897,141 UART: [kat] ECC-384
902,748 UART: [kat] HMAC-384Kdf
907,508 UART: [kat] LMS
1,475,704 UART: [kat] --
1,476,451 UART: [cold-reset] ++
1,476,967 UART: [fht] Storing FHT @ 0x50003400
1,479,830 UART: [idev] ++
1,479,998 UART: [idev] CDI.KEYID = 6
1,480,358 UART: [idev] SUBJECT.KEYID = 7
1,480,782 UART: [idev] UDS.KEYID = 0
1,481,127 ready_for_fw is high
1,481,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,790 UART: [idev] Erasing UDS.KEYID = 0
1,505,240 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,662 UART: [idev] --
1,514,593 UART: [ldev] ++
1,514,761 UART: [ldev] CDI.KEYID = 6
1,515,124 UART: [ldev] SUBJECT.KEYID = 5
1,515,550 UART: [ldev] AUTHORITY.KEYID = 7
1,516,013 UART: [ldev] FE.KEYID = 1
1,521,059 UART: [ldev] Erasing FE.KEYID = 1
1,545,648 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,592 UART: [ldev] --
1,585,089 UART: [fwproc] Waiting for Commands...
1,585,754 UART: [fwproc] Received command 0x46574c44
1,586,545 UART: [fwproc] Received Image of size 114448 bytes
2,886,066 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,888 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,240 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,325 >>> mbox cmd response: success
3,079,569 UART: [afmc] ++
3,079,737 UART: [afmc] CDI.KEYID = 6
3,080,099 UART: [afmc] SUBJECT.KEYID = 7
3,080,524 UART: [afmc] AUTHORITY.KEYID = 5
3,115,697 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,141 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,921 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,534 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,224 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,065 UART: [afmc] --
3,159,047 UART: [cold-reset] --
3,160,107 UART: [state] Locking Datavault
3,161,604 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,208 UART: [state] Locking ICCM
3,162,708 UART: [exit] Launching FMC @ 0x40000130
3,168,037 UART:
3,168,053 UART: Running Caliptra FMC ...
3,168,461 UART:
3,168,515 UART: [state] CFI Enabled
3,178,904 UART: [fht] FMC Alias Private Key: 7
3,286,529 UART: [art] Extend RT PCRs Done
3,286,957 UART: [art] Lock RT PCRs Done
3,288,237 UART: [art] Populate DV Done
3,296,682 UART: [fht] FMC Alias Private Key: 7
3,297,674 UART: [art] Derive CDI
3,297,954 UART: [art] Store in in slot 0x4
3,383,457 UART: [art] Derive Key Pair
3,383,817 UART: [art] Store priv key in slot 0x5
3,397,275 UART: [art] Derive Key Pair - Done
3,412,237 UART: [art] Signing Cert with AUTHO
3,412,717 UART: RITY.KEYID = 7
3,427,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,408 UART: [art] PUB.X = 95A24F40980FE70019346AD349649DB19130DC7CE123320165BBA465D1BB0620944E8ABDFB26DE758549C06BF17DCBC8
3,435,151 UART: [art] PUB.Y = 3A227A3497187675961409F39F7B342FD1CB019568E853A852241740558AAD37422F2EC63F7134E3536112B29224FA7D
3,442,079 UART: [art] SIG.R = F937471E4A3ABFC988BC079DDD0FBF5B599CED1F2EF52B2A3F884157A35275DB76A7CB8E8B83CCAC8EE09FD4220505D2
3,448,859 UART: [art] SIG.S = 39D8CCF1B39C3C2F032544872A01DF23ACD2893DDEB21087171FFE9C88B2511248B6F6D65BD8FF114DBD25CA3EFD21E0
3,472,400 UART: Caliptra RT
3,472,653 UART: [state] CFI Enabled
3,581,210 UART: [rt] RT listening for mailbox commands...
3,581,880 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,402 UART: [rt]cmd =0x4c4d5356, len=1672
4,142,874 >>> mbox cmd response data (8 bytes)
4,142,875 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,183,004 UART: [rt]cmd =0x4c4d5356, len=1672
4,459,454 >>> mbox cmd response data (8 bytes)
4,459,455 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,499,560 UART: [rt]cmd =0x4c4d5356, len=1672
4,775,960 >>> mbox cmd response data (8 bytes)
4,775,961 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,816,318 UART: [rt]cmd =0x4c4d5356, len=1672
5,087,760 >>> mbox cmd response data (8 bytes)
5,087,761 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,127,942 UART: [rt]cmd =0x4c4d5356, len=1672
5,399,792 >>> mbox cmd response data (8 bytes)
5,399,793 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,439,788 UART: [rt]cmd =0x4c4d5356, len=1672
5,713,835 >>> mbox cmd response data (8 bytes)
5,713,836 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,753,921 UART: [rt]cmd =0x4c4d5356, len=1672
6,025,781 >>> mbox cmd response data (8 bytes)
6,025,782 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,066,031 UART: [rt]cmd =0x4c4d5356, len=1672
6,340,090 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,737 ready_for_fw is high
1,362,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,473 >>> mbox cmd response: success
2,990,009 UART:
2,990,025 UART: Running Caliptra FMC ...
2,990,433 UART:
2,990,487 UART: [state] CFI Enabled
3,001,000 UART: [fht] FMC Alias Private Key: 7
3,109,357 UART: [art] Extend RT PCRs Done
3,109,785 UART: [art] Lock RT PCRs Done
3,111,341 UART: [art] Populate DV Done
3,119,518 UART: [fht] FMC Alias Private Key: 7
3,120,488 UART: [art] Derive CDI
3,120,768 UART: [art] Store in in slot 0x4
3,206,363 UART: [art] Derive Key Pair
3,206,723 UART: [art] Store priv key in slot 0x5
3,220,447 UART: [art] Derive Key Pair - Done
3,234,961 UART: [art] Signing Cert with AUTHO
3,235,441 UART: RITY.KEYID = 7
3,250,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,046 UART: [art] PUB.X = 380E5BB450A00F2040D5E9E31D085F67F43CFD477766BDCF64E5446E53E0279F68BEEE7E5926A5FBABE36CE36EF23AE9
3,257,823 UART: [art] PUB.Y = 0BDDD5004107A3963A3BE7C8ACE9FA0B6045806CC1B69281866529805FA85DC3E4A507FC36B725CE70B1DC915A8DEE86
3,264,749 UART: [art] SIG.R = 54DA75BA052F7379D68699B8F546576A0DE1C8E52B625EA12F3A527988129FBF5FAC16A490272CF2B987DEFD6A0DC3A5
3,271,520 UART: [art] SIG.S = EDCEAC60153CEA6D8771DCB3F1C9625CBC5092A9D0405E16C60206CC52A66152B2E24EC7D7A261FA513867004EFA2C76
3,295,669 UART: Caliptra RT
3,295,922 UART: [state] CFI Enabled
3,402,727 UART: [rt] RT listening for mailbox commands...
3,403,397 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,869 UART: [rt]cmd =0x4c4d5356, len=1672
3,964,069 >>> mbox cmd response data (8 bytes)
3,964,070 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,203 UART: [rt]cmd =0x4c4d5356, len=1672
4,280,695 >>> mbox cmd response data (8 bytes)
4,280,696 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,320,963 UART: [rt]cmd =0x4c4d5356, len=1672
4,597,515 >>> mbox cmd response data (8 bytes)
4,597,516 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,637,965 UART: [rt]cmd =0x4c4d5356, len=1672
4,909,461 >>> mbox cmd response data (8 bytes)
4,909,462 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,949,657 UART: [rt]cmd =0x4c4d5356, len=1672
5,221,149 >>> mbox cmd response data (8 bytes)
5,221,150 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,261,099 UART: [rt]cmd =0x4c4d5356, len=1672
5,535,082 >>> mbox cmd response data (8 bytes)
5,535,083 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,575,404 UART: [rt]cmd =0x4c4d5356, len=1672
5,847,092 >>> mbox cmd response data (8 bytes)
5,847,093 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,887,314 UART: [rt]cmd =0x4c4d5356, len=1672
6,161,639 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,972 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,660 UART: [kat] SHA2-256
882,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,706 UART: [kat] ++
886,858 UART: [kat] sha1
891,220 UART: [kat] SHA2-256
893,158 UART: [kat] SHA2-384
895,963 UART: [kat] SHA2-512-ACC
897,864 UART: [kat] ECC-384
903,247 UART: [kat] HMAC-384Kdf
908,079 UART: [kat] LMS
1,476,275 UART: [kat] --
1,476,870 UART: [cold-reset] ++
1,477,256 UART: [fht] Storing FHT @ 0x50003400
1,479,949 UART: [idev] ++
1,480,117 UART: [idev] CDI.KEYID = 6
1,480,477 UART: [idev] SUBJECT.KEYID = 7
1,480,901 UART: [idev] UDS.KEYID = 0
1,481,246 ready_for_fw is high
1,481,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,821 UART: [idev] Erasing UDS.KEYID = 0
1,505,817 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,391 UART: [idev] --
1,515,490 UART: [ldev] ++
1,515,658 UART: [ldev] CDI.KEYID = 6
1,516,021 UART: [ldev] SUBJECT.KEYID = 5
1,516,447 UART: [ldev] AUTHORITY.KEYID = 7
1,516,910 UART: [ldev] FE.KEYID = 1
1,522,088 UART: [ldev] Erasing FE.KEYID = 1
1,547,877 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,895 UART: [ldev] --
1,587,264 UART: [fwproc] Waiting for Commands...
1,587,899 UART: [fwproc] Received command 0x46574c44
1,588,690 UART: [fwproc] Received Image of size 114448 bytes
2,888,181 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,829 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,742 >>> mbox cmd response: success
3,081,834 UART: [afmc] ++
3,082,002 UART: [afmc] CDI.KEYID = 6
3,082,364 UART: [afmc] SUBJECT.KEYID = 7
3,082,789 UART: [afmc] AUTHORITY.KEYID = 5
3,118,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,542 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,322 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,935 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,625 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,630 UART: [afmc] --
3,161,528 UART: [cold-reset] --
3,162,534 UART: [state] Locking Datavault
3,163,561 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,165 UART: [state] Locking ICCM
3,164,773 UART: [exit] Launching FMC @ 0x40000130
3,170,102 UART:
3,170,118 UART: Running Caliptra FMC ...
3,170,526 UART:
3,170,669 UART: [state] CFI Enabled
3,181,510 UART: [fht] FMC Alias Private Key: 7
3,289,927 UART: [art] Extend RT PCRs Done
3,290,355 UART: [art] Lock RT PCRs Done
3,292,003 UART: [art] Populate DV Done
3,300,124 UART: [fht] FMC Alias Private Key: 7
3,301,304 UART: [art] Derive CDI
3,301,584 UART: [art] Store in in slot 0x4
3,386,817 UART: [art] Derive Key Pair
3,387,177 UART: [art] Store priv key in slot 0x5
3,400,299 UART: [art] Derive Key Pair - Done
3,414,988 UART: [art] Signing Cert with AUTHO
3,415,468 UART: RITY.KEYID = 7
3,430,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,569 UART: [art] PUB.X = 19EED0BA315BEAC10385EA96BCECB70D459555F22D2EC3625255C3EEC5E3019E1C4069BB4A94232D8AB0A4E88B2C7FFB
3,438,350 UART: [art] PUB.Y = F25971A948C94C1CA5683BFC37AA8BCB381638ACECCED1631D43178806B961A960AEE9B67BCCC5C4C14F67870F81C911
3,445,306 UART: [art] SIG.R = E94CB99F8029B97C00314DECB6C0D2D99F1E3FCEF7D7B4C09227B5390F1F5E7167858252C5EA1BAFF4329DC1BF3508E1
3,452,062 UART: [art] SIG.S = D4F4433904E68AB7CDD147D5F3229B1C8ADD61B510688770A4B1CDF18C8B16563463BA34DD377E1644760DA611234925
3,475,513 UART: Caliptra RT
3,475,858 UART: [state] CFI Enabled
3,584,122 UART: [rt] RT listening for mailbox commands...
3,584,792 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,522 UART: [rt]cmd =0x4c4d5356, len=1672
4,145,766 >>> mbox cmd response data (8 bytes)
4,145,767 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,185,956 UART: [rt]cmd =0x4c4d5356, len=1672
4,462,512 >>> mbox cmd response data (8 bytes)
4,462,513 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,502,726 UART: [rt]cmd =0x4c4d5356, len=1672
4,779,270 >>> mbox cmd response data (8 bytes)
4,779,271 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,819,520 UART: [rt]cmd =0x4c4d5356, len=1672
5,090,962 >>> mbox cmd response data (8 bytes)
5,090,963 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,131,180 UART: [rt]cmd =0x4c4d5356, len=1672
5,402,834 >>> mbox cmd response data (8 bytes)
5,402,835 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,442,926 UART: [rt]cmd =0x4c4d5356, len=1672
5,716,951 >>> mbox cmd response data (8 bytes)
5,716,952 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,756,977 UART: [rt]cmd =0x4c4d5356, len=1672
6,028,717 >>> mbox cmd response data (8 bytes)
6,028,718 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,069,041 UART: [rt]cmd =0x4c4d5356, len=1672
6,343,104 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,986 ready_for_fw is high
1,362,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,836 >>> mbox cmd response: success
2,993,058 UART:
2,993,074 UART: Running Caliptra FMC ...
2,993,482 UART:
2,993,625 UART: [state] CFI Enabled
3,004,314 UART: [fht] FMC Alias Private Key: 7
3,112,595 UART: [art] Extend RT PCRs Done
3,113,023 UART: [art] Lock RT PCRs Done
3,114,597 UART: [art] Populate DV Done
3,122,846 UART: [fht] FMC Alias Private Key: 7
3,123,870 UART: [art] Derive CDI
3,124,150 UART: [art] Store in in slot 0x4
3,209,889 UART: [art] Derive Key Pair
3,210,249 UART: [art] Store priv key in slot 0x5
3,223,613 UART: [art] Derive Key Pair - Done
3,238,421 UART: [art] Signing Cert with AUTHO
3,238,901 UART: RITY.KEYID = 7
3,253,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,654 UART: [art] PUB.X = C7D0309E54395CE6422D2047C651E6B2866BDCDE3ACCFBA2778D59714B51A21CAE683F449D88FCEFA108C3144F1D3987
3,261,431 UART: [art] PUB.Y = 8AECA738E827AA2BC3FA61EE5E7874E4FCB780081D8FDEF8BBDEE0608CA3CE6EFEE180F79BB28F56BAC9D2D9D4A386C6
3,268,412 UART: [art] SIG.R = 7E61084E35456CDE0539E5DC745BD6FA51C829D6C21671FF227C654C26A3370AB34B796F421A94FBFC88775DDA00E7B8
3,275,157 UART: [art] SIG.S = 6BDBF8A8C50C0AD9608C8F508A16F9613DD9CF8842EE607C9005AD8891CB9626DE985FCFBC70EDA795E970F2593B65D5
3,299,107 UART: Caliptra RT
3,299,452 UART: [state] CFI Enabled
3,407,352 UART: [rt] RT listening for mailbox commands...
3,408,022 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,310 UART: [rt]cmd =0x4c4d5356, len=1672
3,968,434 >>> mbox cmd response data (8 bytes)
3,968,435 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,008,734 UART: [rt]cmd =0x4c4d5356, len=1672
4,285,352 >>> mbox cmd response data (8 bytes)
4,285,353 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,325,518 UART: [rt]cmd =0x4c4d5356, len=1672
4,602,044 >>> mbox cmd response data (8 bytes)
4,602,045 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,642,152 UART: [rt]cmd =0x4c4d5356, len=1672
4,913,834 >>> mbox cmd response data (8 bytes)
4,913,835 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,953,970 UART: [rt]cmd =0x4c4d5356, len=1672
5,225,706 >>> mbox cmd response data (8 bytes)
5,225,707 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,265,892 UART: [rt]cmd =0x4c4d5356, len=1672
5,539,893 >>> mbox cmd response data (8 bytes)
5,539,894 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,579,909 UART: [rt]cmd =0x4c4d5356, len=1672
5,851,511 >>> mbox cmd response data (8 bytes)
5,851,512 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,891,763 UART: [rt]cmd =0x4c4d5356, len=1672
6,165,870 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
893,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,767 UART: [kat] ++
897,919 UART: [kat] sha1
902,143 UART: [kat] SHA2-256
904,083 UART: [kat] SHA2-384
906,836 UART: [kat] SHA2-512-ACC
908,737 UART: [kat] ECC-384
918,948 UART: [kat] HMAC-384Kdf
923,566 UART: [kat] LMS
1,171,894 UART: [kat] --
1,172,479 UART: [cold-reset] ++
1,172,933 UART: [fht] FHT @ 0x50003400
1,175,420 UART: [idev] ++
1,175,588 UART: [idev] CDI.KEYID = 6
1,175,948 UART: [idev] SUBJECT.KEYID = 7
1,176,372 UART: [idev] UDS.KEYID = 0
1,176,717 ready_for_fw is high
1,176,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,432 UART: [idev] Erasing UDS.KEYID = 0
1,201,283 UART: [idev] Sha1 KeyId Algorithm
1,209,693 UART: [idev] --
1,210,649 UART: [ldev] ++
1,210,817 UART: [ldev] CDI.KEYID = 6
1,211,180 UART: [ldev] SUBJECT.KEYID = 5
1,211,606 UART: [ldev] AUTHORITY.KEYID = 7
1,212,069 UART: [ldev] FE.KEYID = 1
1,217,201 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,537 UART: [ldev] --
1,283,040 UART: [fwproc] Wait for Commands...
1,283,704 UART: [fwproc] Recv command 0x46574c44
1,284,432 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,746 >>> mbox cmd response: success
2,778,786 UART: [afmc] ++
2,778,954 UART: [afmc] CDI.KEYID = 6
2,779,316 UART: [afmc] SUBJECT.KEYID = 7
2,779,741 UART: [afmc] AUTHORITY.KEYID = 5
2,815,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,385 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,113 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,998 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,717 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,717 UART: [afmc] --
2,858,601 UART: [cold-reset] --
2,859,587 UART: [state] Locking Datavault
2,860,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,990 UART: [state] Locking ICCM
2,861,554 UART: [exit] Launching FMC @ 0x40000130
2,866,883 UART:
2,866,899 UART: Running Caliptra FMC ...
2,867,307 UART:
2,867,361 UART: [state] CFI Enabled
2,878,000 UART: [fht] FMC Alias Private Key: 7
2,986,111 UART: [art] Extend RT PCRs Done
2,986,539 UART: [art] Lock RT PCRs Done
2,987,813 UART: [art] Populate DV Done
2,996,366 UART: [fht] FMC Alias Private Key: 7
2,997,488 UART: [art] Derive CDI
2,997,768 UART: [art] Store in in slot 0x4
3,083,351 UART: [art] Derive Key Pair
3,083,711 UART: [art] Store priv key in slot 0x5
3,096,957 UART: [art] Derive Key Pair - Done
3,111,635 UART: [art] Signing Cert with AUTHO
3,112,115 UART: RITY.KEYID = 7
3,127,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,364 UART: [art] PUB.X = 5009285A2E2E15D8CD7DD577BB685FDF616DB3B8416929C11F10BE0E7A3A94C9CC581694DC6575A48922F17B19D720C8
3,135,132 UART: [art] PUB.Y = 669EAD877AA10082999217A2E9C5B17FD59C48453CA1FD4AB6DDBBF7502EE87A0AD2039948F8270D90284B1BC18896F9
3,142,057 UART: [art] SIG.R = 06EDFEC1F46309713C2E2FD124BCEA77E29648C6CA20E655DBCA83A1566715BE51D42F3BCAFB2B2B94AD1B3349CA6C9E
3,148,843 UART: [art] SIG.S = ACFBCDEBA1681491A956760EB19A3315658D386FA5AFF5E6389F03276DE4DC1A00C99A73AC566E7A303803F87ACB98BB
3,173,407 UART: Caliptra RT
3,173,660 UART: [state] CFI Enabled
3,280,571 UART: [rt] RT listening for mailbox commands...
3,281,241 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,969 UART: [rt]cmd =0x4c4d5356, len=1672
3,842,133 >>> mbox cmd response data (8 bytes)
3,842,134 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,363 UART: [rt]cmd =0x4c4d5356, len=1672
4,158,905 >>> mbox cmd response data (8 bytes)
4,158,906 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,965 UART: [rt]cmd =0x4c4d5356, len=1672
4,475,647 >>> mbox cmd response data (8 bytes)
4,475,648 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,515,913 UART: [rt]cmd =0x4c4d5356, len=1672
4,787,363 >>> mbox cmd response data (8 bytes)
4,787,364 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,827,319 UART: [rt]cmd =0x4c4d5356, len=1672
5,098,797 >>> mbox cmd response data (8 bytes)
5,098,798 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,138,865 UART: [rt]cmd =0x4c4d5356, len=1672
5,413,006 >>> mbox cmd response data (8 bytes)
5,413,007 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,453,128 UART: [rt]cmd =0x4c4d5356, len=1672
5,724,644 >>> mbox cmd response data (8 bytes)
5,724,645 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,894 UART: [rt]cmd =0x4c4d5356, len=1672
6,038,737 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,383 ready_for_fw is high
1,059,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,691 >>> mbox cmd response: success
2,689,585 UART:
2,689,601 UART: Running Caliptra FMC ...
2,690,009 UART:
2,690,063 UART: [state] CFI Enabled
2,700,536 UART: [fht] FMC Alias Private Key: 7
2,808,699 UART: [art] Extend RT PCRs Done
2,809,127 UART: [art] Lock RT PCRs Done
2,810,739 UART: [art] Populate DV Done
2,818,958 UART: [fht] FMC Alias Private Key: 7
2,819,944 UART: [art] Derive CDI
2,820,224 UART: [art] Store in in slot 0x4
2,905,789 UART: [art] Derive Key Pair
2,906,149 UART: [art] Store priv key in slot 0x5
2,919,325 UART: [art] Derive Key Pair - Done
2,934,274 UART: [art] Signing Cert with AUTHO
2,934,754 UART: RITY.KEYID = 7
2,950,496 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,261 UART: [art] PUB.X = 71771333A0AD213B00712C7D5901C73824FADCF5C000C9536B06085600D3742A8AE0FCB99D90C4E5B1B18C2A6688A03C
2,957,956 UART: [art] PUB.Y = 34F6211F8F6DA3878253AF4DE2A00767C46A5C65DD2102F2BBEC93A264F0556CE30758899EF80C8B9C3C75049A21B13A
2,964,895 UART: [art] SIG.R = 8E2B84397264DAD1B24F198A4E10EFBF71F0D522FA4D92C7E00FAB7F27D5853B6CFB3451B498D0F5BBCC5F5A8F880496
2,971,675 UART: [art] SIG.S = 8138DADBA5B3A557F3CE072DF2072FD9EE56B0C01C3A3DEA2ED79FDB2F1FF0A547440B9E36BE3B849CFBD9155ECAE294
2,995,761 UART: Caliptra RT
2,996,014 UART: [state] CFI Enabled
3,104,688 UART: [rt] RT listening for mailbox commands...
3,105,358 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,018 UART: [rt]cmd =0x4c4d5356, len=1672
3,666,500 >>> mbox cmd response data (8 bytes)
3,666,501 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,668 UART: [rt]cmd =0x4c4d5356, len=1672
3,983,138 >>> mbox cmd response data (8 bytes)
3,983,139 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,023,314 UART: [rt]cmd =0x4c4d5356, len=1672
4,299,610 >>> mbox cmd response data (8 bytes)
4,299,611 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,339,600 UART: [rt]cmd =0x4c4d5356, len=1672
4,610,996 >>> mbox cmd response data (8 bytes)
4,610,997 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,651,316 UART: [rt]cmd =0x4c4d5356, len=1672
4,922,942 >>> mbox cmd response data (8 bytes)
4,922,943 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,963,256 UART: [rt]cmd =0x4c4d5356, len=1672
5,237,343 >>> mbox cmd response data (8 bytes)
5,237,344 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,277,725 UART: [rt]cmd =0x4c4d5356, len=1672
5,549,027 >>> mbox cmd response data (8 bytes)
5,549,028 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,589,267 UART: [rt]cmd =0x4c4d5356, len=1672
5,863,294 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
893,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,942 UART: [kat] ++
898,094 UART: [kat] sha1
902,516 UART: [kat] SHA2-256
904,456 UART: [kat] SHA2-384
907,031 UART: [kat] SHA2-512-ACC
908,932 UART: [kat] ECC-384
918,687 UART: [kat] HMAC-384Kdf
923,415 UART: [kat] LMS
1,171,743 UART: [kat] --
1,172,602 UART: [cold-reset] ++
1,173,130 UART: [fht] FHT @ 0x50003400
1,175,775 UART: [idev] ++
1,175,943 UART: [idev] CDI.KEYID = 6
1,176,303 UART: [idev] SUBJECT.KEYID = 7
1,176,727 UART: [idev] UDS.KEYID = 0
1,177,072 ready_for_fw is high
1,177,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,813 UART: [idev] Erasing UDS.KEYID = 0
1,202,302 UART: [idev] Sha1 KeyId Algorithm
1,210,778 UART: [idev] --
1,211,842 UART: [ldev] ++
1,212,010 UART: [ldev] CDI.KEYID = 6
1,212,373 UART: [ldev] SUBJECT.KEYID = 5
1,212,799 UART: [ldev] AUTHORITY.KEYID = 7
1,213,262 UART: [ldev] FE.KEYID = 1
1,218,754 UART: [ldev] Erasing FE.KEYID = 1
1,244,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,364 UART: [ldev] --
1,283,799 UART: [fwproc] Wait for Commands...
1,284,503 UART: [fwproc] Recv command 0x46574c44
1,285,231 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,980 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,271 >>> mbox cmd response: success
2,778,405 UART: [afmc] ++
2,778,573 UART: [afmc] CDI.KEYID = 6
2,778,935 UART: [afmc] SUBJECT.KEYID = 7
2,779,360 UART: [afmc] AUTHORITY.KEYID = 5
2,814,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,856 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,584 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,469 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,188 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,052 UART: [afmc] --
2,858,010 UART: [cold-reset] --
2,858,694 UART: [state] Locking Datavault
2,859,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,301 UART: [state] Locking ICCM
2,860,835 UART: [exit] Launching FMC @ 0x40000130
2,866,164 UART:
2,866,180 UART: Running Caliptra FMC ...
2,866,588 UART:
2,866,731 UART: [state] CFI Enabled
2,877,494 UART: [fht] FMC Alias Private Key: 7
2,985,545 UART: [art] Extend RT PCRs Done
2,985,973 UART: [art] Lock RT PCRs Done
2,987,273 UART: [art] Populate DV Done
2,995,680 UART: [fht] FMC Alias Private Key: 7
2,996,752 UART: [art] Derive CDI
2,997,032 UART: [art] Store in in slot 0x4
3,082,427 UART: [art] Derive Key Pair
3,082,787 UART: [art] Store priv key in slot 0x5
3,096,215 UART: [art] Derive Key Pair - Done
3,111,322 UART: [art] Signing Cert with AUTHO
3,111,802 UART: RITY.KEYID = 7
3,126,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,719 UART: [art] PUB.X = C411BCC37BB25A8AAD7DF96A729A180617E6B98C6CB9B1EFBDB5018A6E60474957DCD6B67FEF051A41B4FFB437EB8D1E
3,134,504 UART: [art] PUB.Y = 25E91AFF759E8605BB9B695523910DEAD0B3E80B4B36DEBA64AB7E17BCBB47C7AFA93C55FA26339BE68BF9FB24D6E5F7
3,141,469 UART: [art] SIG.R = 7EDDC8559874A0819C76C8A880E05DB6B0A77412E49321F2E12BFC7A70FAD2A7A4366EFB87245D56BF60AEC36E5629DB
3,148,251 UART: [art] SIG.S = F004CE8B2BB66A4CB397E78098F955D4EC46C3883B04B132B233E5B74CC8CD91E6E8973CDA994AF7653D07D04103FAE1
3,172,092 UART: Caliptra RT
3,172,437 UART: [state] CFI Enabled
3,279,578 UART: [rt] RT listening for mailbox commands...
3,280,248 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,792 UART: [rt]cmd =0x4c4d5356, len=1672
3,840,948 >>> mbox cmd response data (8 bytes)
3,840,949 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,060 UART: [rt]cmd =0x4c4d5356, len=1672
4,157,744 >>> mbox cmd response data (8 bytes)
4,157,745 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,052 UART: [rt]cmd =0x4c4d5356, len=1672
4,474,618 >>> mbox cmd response data (8 bytes)
4,474,619 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,514,768 UART: [rt]cmd =0x4c4d5356, len=1672
4,786,260 >>> mbox cmd response data (8 bytes)
4,786,261 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,826,632 UART: [rt]cmd =0x4c4d5356, len=1672
5,098,438 >>> mbox cmd response data (8 bytes)
5,098,439 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,138,532 UART: [rt]cmd =0x4c4d5356, len=1672
5,412,535 >>> mbox cmd response data (8 bytes)
5,412,536 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,452,891 UART: [rt]cmd =0x4c4d5356, len=1672
5,724,645 >>> mbox cmd response data (8 bytes)
5,724,646 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,709 UART: [rt]cmd =0x4c4d5356, len=1672
6,038,590 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,090 ready_for_fw is high
1,061,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,308 >>> mbox cmd response: success
2,691,200 UART:
2,691,216 UART: Running Caliptra FMC ...
2,691,624 UART:
2,691,767 UART: [state] CFI Enabled
2,702,398 UART: [fht] FMC Alias Private Key: 7
2,810,637 UART: [art] Extend RT PCRs Done
2,811,065 UART: [art] Lock RT PCRs Done
2,812,711 UART: [art] Populate DV Done
2,820,820 UART: [fht] FMC Alias Private Key: 7
2,821,892 UART: [art] Derive CDI
2,822,172 UART: [art] Store in in slot 0x4
2,907,925 UART: [art] Derive Key Pair
2,908,285 UART: [art] Store priv key in slot 0x5
2,921,615 UART: [art] Derive Key Pair - Done
2,936,010 UART: [art] Signing Cert with AUTHO
2,936,490 UART: RITY.KEYID = 7
2,951,684 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,449 UART: [art] PUB.X = 962F08992F49A1FF247EFD5CA7EC4D84EF30FEE004E1944DB3FD7B19C78F442735E012EB840D37F38FA14E09B92722ED
2,959,219 UART: [art] PUB.Y = 155153A370CBEC6AC9402F798B8458AEFCF18A44AD17EB65CE7504C6202CBF9B4504327CD0544C92BDD384E79AFC74CC
2,966,177 UART: [art] SIG.R = 46A579D6BDB1323540A3A68B10FAF90A31ED6804547E919EA54EDD4C3F858F0FBDB5C972AD951A8D1A5BDDBFA1995E45
2,972,956 UART: [art] SIG.S = 8FE5B209BA9E48259382ABB91B92BE02AACEA71BE555A0F0136F4FF9F43BE913DC8F10C2DDCD2F6CDB9A05DC5AF9939C
2,997,218 UART: Caliptra RT
2,997,563 UART: [state] CFI Enabled
3,105,942 UART: [rt] RT listening for mailbox commands...
3,106,612 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,258 UART: [rt]cmd =0x4c4d5356, len=1672
3,667,528 >>> mbox cmd response data (8 bytes)
3,667,529 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,554 UART: [rt]cmd =0x4c4d5356, len=1672
3,984,264 >>> mbox cmd response data (8 bytes)
3,984,265 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,024,486 UART: [rt]cmd =0x4c4d5356, len=1672
4,300,840 >>> mbox cmd response data (8 bytes)
4,300,841 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,340,902 UART: [rt]cmd =0x4c4d5356, len=1672
4,612,646 >>> mbox cmd response data (8 bytes)
4,612,647 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,653,140 UART: [rt]cmd =0x4c4d5356, len=1672
4,924,626 >>> mbox cmd response data (8 bytes)
4,924,627 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,964,720 UART: [rt]cmd =0x4c4d5356, len=1672
5,238,863 >>> mbox cmd response data (8 bytes)
5,238,864 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,279,011 UART: [rt]cmd =0x4c4d5356, len=1672
5,550,511 >>> mbox cmd response data (8 bytes)
5,550,512 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,590,813 UART: [rt]cmd =0x4c4d5356, len=1672
5,864,812 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
890,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,027 UART: [kat] ++
895,179 UART: [kat] sha1
899,397 UART: [kat] SHA2-256
901,337 UART: [kat] SHA2-384
904,106 UART: [kat] SHA2-512-ACC
906,007 UART: [kat] ECC-384
915,616 UART: [kat] HMAC-384Kdf
920,338 UART: [kat] LMS
1,168,650 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,557 UART: [idev] ++
1,172,725 UART: [idev] CDI.KEYID = 6
1,173,086 UART: [idev] SUBJECT.KEYID = 7
1,173,511 UART: [idev] UDS.KEYID = 0
1,173,857 ready_for_fw is high
1,173,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,198,749 UART: [idev] Sha1 KeyId Algorithm
1,207,667 UART: [idev] --
1,208,612 UART: [ldev] ++
1,208,780 UART: [ldev] CDI.KEYID = 6
1,209,144 UART: [ldev] SUBJECT.KEYID = 5
1,209,571 UART: [ldev] AUTHORITY.KEYID = 7
1,210,034 UART: [ldev] FE.KEYID = 1
1,215,324 UART: [ldev] Erasing FE.KEYID = 1
1,241,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,712 UART: [ldev] --
1,280,020 UART: [fwproc] Wait for Commands...
1,280,765 UART: [fwproc] Recv command 0x46574c44
1,281,498 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,132 >>> mbox cmd response: success
2,774,389 UART: [afmc] ++
2,774,557 UART: [afmc] CDI.KEYID = 6
2,774,920 UART: [afmc] SUBJECT.KEYID = 7
2,775,346 UART: [afmc] AUTHORITY.KEYID = 5
2,810,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,178 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,907 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,790 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,509 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,262 UART: [afmc] --
2,854,200 UART: [cold-reset] --
2,855,218 UART: [state] Locking Datavault
2,856,539 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,143 UART: [state] Locking ICCM
2,857,805 UART: [exit] Launching FMC @ 0x40000130
2,863,134 UART:
2,863,150 UART: Running Caliptra FMC ...
2,863,558 UART:
2,863,612 UART: [state] CFI Enabled
2,873,899 UART: [fht] FMC Alias Private Key: 7
2,981,818 UART: [art] Extend RT PCRs Done
2,982,246 UART: [art] Lock RT PCRs Done
2,983,598 UART: [art] Populate DV Done
2,992,031 UART: [fht] FMC Alias Private Key: 7
2,993,137 UART: [art] Derive CDI
2,993,417 UART: [art] Store in in slot 0x4
3,078,800 UART: [art] Derive Key Pair
3,079,160 UART: [art] Store priv key in slot 0x5
3,092,532 UART: [art] Derive Key Pair - Done
3,107,137 UART: [art] Signing Cert with AUTHO
3,107,617 UART: RITY.KEYID = 7
3,122,719 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,484 UART: [art] PUB.X = 9DEF0C080804865A289234F3B69253E749B7B80FA2ED0C9A9765D9E8334E91CCCC4D3C083350A44E1C813333E0C22CFA
3,130,237 UART: [art] PUB.Y = 51A5CE7E3F9F9256A5B485D7AB7A14A14E6EEE2919FC2AD81DC6F498ED0B6D7FFE0E7733A0B2209DAFF64E7757730AD3
3,137,198 UART: [art] SIG.R = 4333CC497FA9FE9F75F4930CB2395D0E9401766C87AC05FC3E23D27C0FBC865C78EABA974E7DCD9CCD368997DF10BCD1
3,143,971 UART: [art] SIG.S = DDA52F393A27364A58E19E8A7F9D64E722FC20B25C60A6F3B9D03CFB67561DDD08A91C7A92B1504C31FE5B6442BB455C
3,167,813 UART: Caliptra RT
3,168,066 UART: [state] CFI Enabled
3,275,753 UART: [rt] RT listening for mailbox commands...
3,276,423 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,079 UART: [rt]cmd =0x4c4d5356, len=1672
3,837,747 >>> mbox cmd response data (8 bytes)
3,837,748 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,029 UART: [rt]cmd =0x4c4d5356, len=1672
4,154,367 >>> mbox cmd response data (8 bytes)
4,154,368 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,473 UART: [rt]cmd =0x4c4d5356, len=1672
4,470,809 >>> mbox cmd response data (8 bytes)
4,470,810 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,510,923 UART: [rt]cmd =0x4c4d5356, len=1672
4,782,257 >>> mbox cmd response data (8 bytes)
4,782,258 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,822,427 UART: [rt]cmd =0x4c4d5356, len=1672
5,093,893 >>> mbox cmd response data (8 bytes)
5,093,894 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,133,983 UART: [rt]cmd =0x4c4d5356, len=1672
5,408,148 >>> mbox cmd response data (8 bytes)
5,408,149 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,448,512 UART: [rt]cmd =0x4c4d5356, len=1672
5,720,148 >>> mbox cmd response data (8 bytes)
5,720,149 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,760,626 UART: [rt]cmd =0x4c4d5356, len=1672
6,034,745 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,178 ready_for_fw is high
1,056,178 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,960 >>> mbox cmd response: success
2,686,532 UART:
2,686,548 UART: Running Caliptra FMC ...
2,686,956 UART:
2,687,010 UART: [state] CFI Enabled
2,697,215 UART: [fht] FMC Alias Private Key: 7
2,805,750 UART: [art] Extend RT PCRs Done
2,806,178 UART: [art] Lock RT PCRs Done
2,807,566 UART: [art] Populate DV Done
2,816,027 UART: [fht] FMC Alias Private Key: 7
2,817,135 UART: [art] Derive CDI
2,817,415 UART: [art] Store in in slot 0x4
2,903,200 UART: [art] Derive Key Pair
2,903,560 UART: [art] Store priv key in slot 0x5
2,916,392 UART: [art] Derive Key Pair - Done
2,930,979 UART: [art] Signing Cert with AUTHO
2,931,459 UART: RITY.KEYID = 7
2,946,763 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,528 UART: [art] PUB.X = 62AA38476CB382AA5452C91F235CB520345E71C6B4BB962A06EF46D19BAD7F30E2044629FFC6DAC15321C09B460F2C46
2,954,295 UART: [art] PUB.Y = 84237A30918A5A5ED7B84E495F54D692A5FF6CBDDE6392F93C8E5A04B0DFDC3C3F6529E6DA5A644890C0B035CC284CEA
2,961,258 UART: [art] SIG.R = 3A12712744270D9F9704C310E5BAD6427EAD8AE3AEA71B580E987B35B63F59A22323CD0126FA5837556B0CA534570622
2,968,006 UART: [art] SIG.S = AFF813DD52EA77BA4A020FCBE19C5C84E43F8CFB35889BC61850E3700EA24D9752EE0A1ACB9DEBA5DC2CC001B1E37D8F
2,991,852 UART: Caliptra RT
2,992,105 UART: [state] CFI Enabled
3,100,376 UART: [rt] RT listening for mailbox commands...
3,101,046 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,704 UART: [rt]cmd =0x4c4d5356, len=1672
3,661,796 >>> mbox cmd response data (8 bytes)
3,661,797 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,110 UART: [rt]cmd =0x4c4d5356, len=1672
3,978,562 >>> mbox cmd response data (8 bytes)
3,978,563 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,762 UART: [rt]cmd =0x4c4d5356, len=1672
4,295,422 >>> mbox cmd response data (8 bytes)
4,295,423 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,335,506 UART: [rt]cmd =0x4c4d5356, len=1672
4,606,858 >>> mbox cmd response data (8 bytes)
4,606,859 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,647,124 UART: [rt]cmd =0x4c4d5356, len=1672
4,918,670 >>> mbox cmd response data (8 bytes)
4,918,671 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,958,642 UART: [rt]cmd =0x4c4d5356, len=1672
5,232,703 >>> mbox cmd response data (8 bytes)
5,232,704 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,272,839 UART: [rt]cmd =0x4c4d5356, len=1672
5,544,345 >>> mbox cmd response data (8 bytes)
5,544,346 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,584,453 UART: [rt]cmd =0x4c4d5356, len=1672
5,858,568 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,985 UART: [state] LifecycleState = Unprovisioned
85,640 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [kat] SHA2-256
891,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,156 UART: [kat] ++
895,308 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,612 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,174,578 ready_for_fw is high
1,174,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,988 UART: [idev] Erasing UDS.KEYID = 0
1,199,112 UART: [idev] Sha1 KeyId Algorithm
1,207,974 UART: [idev] --
1,208,991 UART: [ldev] ++
1,209,159 UART: [ldev] CDI.KEYID = 6
1,209,523 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,879 UART: [ldev] Erasing FE.KEYID = 1
1,242,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,109 UART: [ldev] --
1,281,525 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,045 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,831 >>> mbox cmd response: success
2,774,846 UART: [afmc] ++
2,775,014 UART: [afmc] CDI.KEYID = 6
2,775,377 UART: [afmc] SUBJECT.KEYID = 7
2,775,803 UART: [afmc] AUTHORITY.KEYID = 5
2,811,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,209 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,938 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,821 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,427 UART: [afmc] --
2,854,371 UART: [cold-reset] --
2,855,365 UART: [state] Locking Datavault
2,856,600 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,204 UART: [state] Locking ICCM
2,857,842 UART: [exit] Launching FMC @ 0x40000130
2,863,171 UART:
2,863,187 UART: Running Caliptra FMC ...
2,863,595 UART:
2,863,738 UART: [state] CFI Enabled
2,874,793 UART: [fht] FMC Alias Private Key: 7
2,982,530 UART: [art] Extend RT PCRs Done
2,982,958 UART: [art] Lock RT PCRs Done
2,984,232 UART: [art] Populate DV Done
2,992,543 UART: [fht] FMC Alias Private Key: 7
2,993,679 UART: [art] Derive CDI
2,993,959 UART: [art] Store in in slot 0x4
3,079,072 UART: [art] Derive Key Pair
3,079,432 UART: [art] Store priv key in slot 0x5
3,092,940 UART: [art] Derive Key Pair - Done
3,108,085 UART: [art] Signing Cert with AUTHO
3,108,565 UART: RITY.KEYID = 7
3,123,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,656 UART: [art] PUB.X = DA611C4F099265E1BC7D40677E0A83BDA9AA1464159F96CDCA19DE2EF3D8114E88E3B64C401146BA2A8CED0AB45C2B28
3,131,433 UART: [art] PUB.Y = 9CDC2F79B5F56AA04B4FB00EF2B645C8A67F8A488E86FDDC952839E5E550F8667D4426D20105367DF72AE3ED248CCF68
3,138,386 UART: [art] SIG.R = 83EA77F4CE4B1BB4CFCF9CF00AE1212755DF8BE34A6BA2D819AC446AF842130069C31D9F316725C6FE2167414CBAC263
3,145,145 UART: [art] SIG.S = 4847DEAC4BDCE91E118B9BDB194EBC6CEB0F76F0FE26DC06D657547705F15504DE6C6CC96849601BD1327F8C5473C8B4
3,168,648 UART: Caliptra RT
3,168,993 UART: [state] CFI Enabled
3,277,024 UART: [rt] RT listening for mailbox commands...
3,277,694 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,596 UART: [rt]cmd =0x4c4d5356, len=1672
3,838,726 >>> mbox cmd response data (8 bytes)
3,838,727 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,988 UART: [rt]cmd =0x4c4d5356, len=1672
4,155,500 >>> mbox cmd response data (8 bytes)
4,155,501 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,630 UART: [rt]cmd =0x4c4d5356, len=1672
4,472,044 >>> mbox cmd response data (8 bytes)
4,472,045 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,512,216 UART: [rt]cmd =0x4c4d5356, len=1672
4,783,950 >>> mbox cmd response data (8 bytes)
4,783,951 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,824,072 UART: [rt]cmd =0x4c4d5356, len=1672
5,095,726 >>> mbox cmd response data (8 bytes)
5,095,727 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,135,678 UART: [rt]cmd =0x4c4d5356, len=1672
5,409,739 >>> mbox cmd response data (8 bytes)
5,409,740 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,449,733 UART: [rt]cmd =0x4c4d5356, len=1672
5,721,769 >>> mbox cmd response data (8 bytes)
5,721,770 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,965 UART: [rt]cmd =0x4c4d5356, len=1672
6,035,830 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,967 ready_for_fw is high
1,055,967 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,897 >>> mbox cmd response: success
2,685,947 UART:
2,685,963 UART: Running Caliptra FMC ...
2,686,371 UART:
2,686,514 UART: [state] CFI Enabled
2,696,955 UART: [fht] FMC Alias Private Key: 7
2,805,208 UART: [art] Extend RT PCRs Done
2,805,636 UART: [art] Lock RT PCRs Done
2,807,410 UART: [art] Populate DV Done
2,815,603 UART: [fht] FMC Alias Private Key: 7
2,816,689 UART: [art] Derive CDI
2,816,969 UART: [art] Store in in slot 0x4
2,902,918 UART: [art] Derive Key Pair
2,903,278 UART: [art] Store priv key in slot 0x5
2,916,208 UART: [art] Derive Key Pair - Done
2,930,847 UART: [art] Signing Cert with AUTHO
2,931,327 UART: RITY.KEYID = 7
2,946,729 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,494 UART: [art] PUB.X = 031E80EF362FEDD23599BF92B42F3F7BB26A531DA4B4771FB7988448ADABFA85EDAB0D91254C5A0A5A214F19EFFC0A2C
2,954,274 UART: [art] PUB.Y = 39FF6370CFBF24FC8A1CD7F4BCE325A5FD78FCCF18F691CA803944A74794226FD4E217F2E8286E45E4405A1DD37B0C8E
2,961,237 UART: [art] SIG.R = A0273799B57E14BAE2B59254CEB4A3331F4A4517F2F2AD5DF04E9D0130ABDB521B6CFA8967C24C2FFDDF78EA5502EED5
2,968,021 UART: [art] SIG.S = 538CF1CB068B02321B4DB3F80307A71C45DC49FDB8A8259E1F1038569BB78AE3622D47BBA2610F6BE2134B81B67C4A2E
2,991,875 UART: Caliptra RT
2,992,220 UART: [state] CFI Enabled
3,100,349 UART: [rt] RT listening for mailbox commands...
3,101,019 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,739 UART: [rt]cmd =0x4c4d5356, len=1672
3,662,313 >>> mbox cmd response data (8 bytes)
3,662,314 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,373 UART: [rt]cmd =0x4c4d5356, len=1672
3,978,751 >>> mbox cmd response data (8 bytes)
3,978,752 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,959 UART: [rt]cmd =0x4c4d5356, len=1672
4,295,739 >>> mbox cmd response data (8 bytes)
4,295,740 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,336,151 UART: [rt]cmd =0x4c4d5356, len=1672
4,607,721 >>> mbox cmd response data (8 bytes)
4,607,722 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,648,225 UART: [rt]cmd =0x4c4d5356, len=1672
4,919,789 >>> mbox cmd response data (8 bytes)
4,919,790 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,960,047 UART: [rt]cmd =0x4c4d5356, len=1672
5,234,138 >>> mbox cmd response data (8 bytes)
5,234,139 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,274,402 UART: [rt]cmd =0x4c4d5356, len=1672
5,545,784 >>> mbox cmd response data (8 bytes)
5,545,785 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,586,154 UART: [rt]cmd =0x4c4d5356, len=1672
5,860,325 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
192,105 UART:
192,471 UART: Running Caliptra ROM ...
193,665 UART:
193,822 UART: [state] CFI Enabled
265,109 UART: [state] LifecycleState = Unprovisioned
267,086 UART: [state] DebugLocked = No
269,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,492 UART: [kat] SHA2-256
445,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,715 UART: [kat] ++
456,171 UART: [kat] sha1
466,193 UART: [kat] SHA2-256
468,929 UART: [kat] SHA2-384
475,062 UART: [kat] SHA2-512-ACC
477,435 UART: [kat] ECC-384
2,768,998 UART: [kat] HMAC-384Kdf
2,801,567 UART: [kat] LMS
3,991,882 UART: [kat] --
3,995,167 UART: [cold-reset] ++
3,996,814 UART: [fht] Storing FHT @ 0x50003400
4,007,581 UART: [idev] ++
4,008,159 UART: [idev] CDI.KEYID = 6
4,009,067 UART: [idev] SUBJECT.KEYID = 7
4,010,327 UART: [idev] UDS.KEYID = 0
4,011,308 ready_for_fw is high
4,011,505 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,056 UART: [idev] Erasing UDS.KEYID = 0
7,348,236 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,483 UART: [idev] --
7,375,020 UART: [ldev] ++
7,375,593 UART: [ldev] CDI.KEYID = 6
7,376,533 UART: [ldev] SUBJECT.KEYID = 5
7,377,741 UART: [ldev] AUTHORITY.KEYID = 7
7,379,027 UART: [ldev] FE.KEYID = 1
7,422,944 UART: [ldev] Erasing FE.KEYID = 1
10,756,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,975 UART: [ldev] --
13,137,107 UART: [fwproc] Waiting for Commands...
13,138,820 UART: [fwproc] Received command 0x46574c44
13,141,005 UART: [fwproc] Received Image of size 114124 bytes
17,193,244 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,441 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,311 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,656,205 >>> mbox cmd response: success
17,661,147 UART: [afmc] ++
17,661,754 UART: [afmc] CDI.KEYID = 6
17,662,698 UART: [afmc] SUBJECT.KEYID = 7
17,663,922 UART: [afmc] AUTHORITY.KEYID = 5
21,029,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,332,259 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,334,541 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,944 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,776 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,378,203 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,399,685 UART: [afmc] --
23,404,410 UART: [cold-reset] --
23,407,830 UART: [state] Locking Datavault
23,412,544 UART: [state] Locking PCR0, PCR1 and PCR31
23,414,296 UART: [state] Locking ICCM
23,415,666 UART: [exit] Launching FMC @ 0x40000130
23,424,061 UART:
23,424,305 UART: Running Caliptra FMC ...
23,425,344 UART:
23,425,494 UART: [state] CFI Enabled
23,491,534 UART: [fht] FMC Alias Private Key: 7
25,829,969 UART: [art] Extend RT PCRs Done
25,831,208 UART: [art] Lock RT PCRs Done
25,832,973 UART: [art] Populate DV Done
25,838,287 UART: [fht] FMC Alias Private Key: 7
25,839,771 UART: [art] Derive CDI
25,840,534 UART: [art] Store in in slot 0x4
25,899,632 UART: [art] Derive Key Pair
25,900,672 UART: [art] Store priv key in slot 0x5
29,193,013 UART: [art] Derive Key Pair - Done
29,206,290 UART: [art] Signing Cert with AUTHO
29,207,594 UART: RITY.KEYID = 7
31,494,267 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,772 UART: [art] PUB.X = DF2E0E46FCDF61B504C6B8409E50AF2844A7602B5320C40FFE0B995033F086615D5766A32B7E953918B5948CEDE6F6F8
31,503,015 UART: [art] PUB.Y = BB634C1411CC6B8EC482780D5507525BAF4AF5D05F2D334BCBC399731C908BF94B033EF1C1AF4A3D6DCC7084BE397A71
31,510,242 UART: [art] SIG.R = C93EC8420DC6AD2CEAE79AACFB5198879E8FC6969CFA167C519DB1FABA049338C902C4C7B5B64565D2E2FE7B0B12BEF7
31,517,642 UART: [art] SIG.S = 37FBF4AA10C402A114BA7D43E02265A0A0CE06D6E0227C58BB5DDAD82B5B307CED866B021187AB4D572A8FAB1064590E
32,822,900 UART: Caliptra RT
32,823,634 UART: [state] CFI Enabled
33,004,437 UART: [rt] RT listening for mailbox commands...
33,008,601 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,053,184 UART: [rt]cmd =0x4c4d5356, len=1672
34,307,937 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,622 writing to cptra_bootfsm_go
3,802,752 ready_for_fw is high
3,803,139 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,856,341 >>> mbox cmd response: success
23,547,806 UART:
23,548,186 UART: Running Caliptra FMC ...
23,549,391 UART:
23,549,578 UART: [state] CFI Enabled
23,614,904 UART: [fht] FMC Alias Private Key: 7
25,952,325 UART: [art] Extend RT PCRs Done
25,953,555 UART: [art] Lock RT PCRs Done
25,955,459 UART: [art] Populate DV Done
25,960,934 UART: [fht] FMC Alias Private Key: 7
25,962,639 UART: [art] Derive CDI
25,963,457 UART: [art] Store in in slot 0x4
26,023,536 UART: [art] Derive Key Pair
26,024,587 UART: [art] Store priv key in slot 0x5
29,317,525 UART: [art] Derive Key Pair - Done
29,330,302 UART: [art] Signing Cert with AUTHO
29,331,611 UART: RITY.KEYID = 7
31,619,212 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,720 UART: [art] PUB.X = 7498327FFA08989913BA18769CDBF658CC083B562596A4A0A7C7260AA9F2588D82572A3DD0076CDD6BA3F2D4572F11B7
31,628,002 UART: [art] PUB.Y = B5FE93F91AC1C67E9B4D8D0C4390542198FBBCA67985D1D3E21D8F8839F40659120AAEA78B867148D559580B0B2BC0FE
31,635,235 UART: [art] SIG.R = ECB4E1329C810AAD9D6C8C2B91A4D61285A52EC2D92B64AE548173A91009E0029E931CB8FDA693FF13AD00F9AE1950CE
31,642,596 UART: [art] SIG.S = 1518E2091C3B0028C40BEAA9D320A3AD497EED5A370EFE5E0257761F36D269414397AC928211FB5CCB19C64111DA58E5
32,947,970 UART: Caliptra RT
32,948,669 UART: [state] CFI Enabled
33,108,631 UART: [rt] RT listening for mailbox commands...
33,112,569 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,157,050 UART: [rt]cmd =0x4c4d5356, len=1672
34,412,083 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,454 UART:
192,832 UART: Running Caliptra ROM ...
193,958 UART:
603,709 UART: [state] CFI Enabled
615,296 UART: [state] LifecycleState = Unprovisioned
617,225 UART: [state] DebugLocked = No
620,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,423 UART: [kat] SHA2-256
794,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,727 UART: [kat] ++
805,242 UART: [kat] sha1
815,679 UART: [kat] SHA2-256
818,393 UART: [kat] SHA2-384
824,512 UART: [kat] SHA2-512-ACC
826,867 UART: [kat] ECC-384
3,111,565 UART: [kat] HMAC-384Kdf
3,123,237 UART: [kat] LMS
4,313,301 UART: [kat] --
4,318,809 UART: [cold-reset] ++
4,321,382 UART: [fht] Storing FHT @ 0x50003400
4,332,448 UART: [idev] ++
4,333,005 UART: [idev] CDI.KEYID = 6
4,334,035 UART: [idev] SUBJECT.KEYID = 7
4,335,208 UART: [idev] UDS.KEYID = 0
4,336,183 ready_for_fw is high
4,336,411 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,776 UART: [idev] Erasing UDS.KEYID = 0
7,625,984 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,791 UART: [idev] --
7,651,400 UART: [ldev] ++
7,651,965 UART: [ldev] CDI.KEYID = 6
7,653,260 UART: [ldev] SUBJECT.KEYID = 5
7,654,303 UART: [ldev] AUTHORITY.KEYID = 7
7,655,473 UART: [ldev] FE.KEYID = 1
7,667,084 UART: [ldev] Erasing FE.KEYID = 1
10,958,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,567 UART: [ldev] --
13,320,279 UART: [fwproc] Waiting for Commands...
13,322,265 UART: [fwproc] Received command 0x46574c44
13,324,444 UART: [fwproc] Received Image of size 114124 bytes
17,378,955 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,213 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,095 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,843,943 >>> mbox cmd response: success
17,848,592 UART: [afmc] ++
17,849,187 UART: [afmc] CDI.KEYID = 6
17,850,094 UART: [afmc] SUBJECT.KEYID = 7
17,851,306 UART: [afmc] AUTHORITY.KEYID = 5
21,168,443 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,464,253 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,466,493 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,480,895 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,495,703 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,510,145 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,531,405 UART: [afmc] --
23,534,994 UART: [cold-reset] --
23,537,763 UART: [state] Locking Datavault
23,541,330 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,021 UART: [state] Locking ICCM
23,545,419 UART: [exit] Launching FMC @ 0x40000130
23,553,806 UART:
23,554,031 UART: Running Caliptra FMC ...
23,555,053 UART:
23,555,194 UART: [state] CFI Enabled
23,563,444 UART: [fht] FMC Alias Private Key: 7
25,894,723 UART: [art] Extend RT PCRs Done
25,895,940 UART: [art] Lock RT PCRs Done
25,897,242 UART: [art] Populate DV Done
25,902,598 UART: [fht] FMC Alias Private Key: 7
25,904,196 UART: [art] Derive CDI
25,904,964 UART: [art] Store in in slot 0x4
25,947,774 UART: [art] Derive Key Pair
25,948,771 UART: [art] Store priv key in slot 0x5
29,191,342 UART: [art] Derive Key Pair - Done
29,204,393 UART: [art] Signing Cert with AUTHO
29,205,699 UART: RITY.KEYID = 7
31,484,974 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,486 UART: [art] PUB.X = 95C749B2542DF0232CC95D173C7C1BEDFBCB3E61A360C27AF812A948936E919128828EA1A169254781003391D0F3CCEB
31,493,764 UART: [art] PUB.Y = 1DDE94339BF1F47CF4BA4F95DA7E6BA40B842BABD37F08F73E78210FA81AE223A8C55C0617D0C62B4D451ACD5C249ED8
31,501,016 UART: [art] SIG.R = FFC4CEE0CD3AA39FFDA0AD3EB252F6221B871297BCC0BCC67CBE26DFB6B5A69D8D0F352B0E83BE02E10F1424F525776E
31,508,481 UART: [art] SIG.S = 168CB13226AF6FC38B627F886E58F7CC5939B7CEA139FFC3267A4573234494B25F16144DD9F8F582DD82B775BC3CACEC
32,813,570 UART: Caliptra RT
32,814,265 UART: [state] CFI Enabled
32,931,925 UART: [rt] RT listening for mailbox commands...
32,936,037 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,980,551 UART: [rt]cmd =0x4c4d5356, len=1672
34,235,815 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,127,889 ready_for_fw is high
4,128,284 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,083,549 >>> mbox cmd response: success
23,725,655 UART:
23,726,049 UART: Running Caliptra FMC ...
23,727,153 UART:
23,727,297 UART: [state] CFI Enabled
23,735,249 UART: [fht] FMC Alias Private Key: 7
26,066,325 UART: [art] Extend RT PCRs Done
26,067,554 UART: [art] Lock RT PCRs Done
26,069,257 UART: [art] Populate DV Done
26,074,509 UART: [fht] FMC Alias Private Key: 7
26,076,103 UART: [art] Derive CDI
26,076,838 UART: [art] Store in in slot 0x4
26,119,705 UART: [art] Derive Key Pair
26,120,743 UART: [art] Store priv key in slot 0x5
29,362,518 UART: [art] Derive Key Pair - Done
29,375,355 UART: [art] Signing Cert with AUTHO
29,376,675 UART: RITY.KEYID = 7
31,656,369 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,877 UART: [art] PUB.X = 360FE79E6E5F4D8887330C5BB46E74D143CC8C6EBC384C756D8AD499A5D55630434F09E2A09DBD080689146DE399021F
31,665,119 UART: [art] PUB.Y = F39DED0612237B23A18F5511170F3AF693E66D62CA182733066FB9FAD562E90779E971850343FC3534710396BD835F80
31,672,329 UART: [art] SIG.R = 53D44E625B3D0BE57B4E7BE1140F3D297D34AC170C08512C91C6A9B97BD89409709B0A77E390A865127D61819A44F608
31,679,658 UART: [art] SIG.S = 3C7F64F3996A502E557B48E255A40E47C30BE8DE382A871EC9C196C5990A03C3B1864EAC215A8BE17FF7A0D1EF3A4AFA
32,984,792 UART: Caliptra RT
32,985,510 UART: [state] CFI Enabled
33,103,517 UART: [rt] RT listening for mailbox commands...
33,107,481 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,152,199 UART: [rt]cmd =0x4c4d5356, len=1672
34,407,049 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,079 UART:
192,448 UART: Running Caliptra ROM ...
193,541 UART:
193,685 UART: [state] CFI Enabled
262,766 UART: [state] LifecycleState = Unprovisioned
264,640 UART: [state] DebugLocked = No
265,814 UART: [state] WD Timer not started. Device not locked for debugging
269,933 UART: [kat] SHA2-256
449,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,606 UART: [kat] ++
461,140 UART: [kat] sha1
471,951 UART: [kat] SHA2-256
474,954 UART: [kat] SHA2-384
482,004 UART: [kat] SHA2-512-ACC
485,012 UART: [kat] ECC-384
2,952,019 UART: [kat] HMAC-384Kdf
2,972,564 UART: [kat] LMS
3,502,034 UART: [kat] --
3,506,692 UART: [cold-reset] ++
3,508,197 UART: [fht] FHT @ 0x50003400
3,519,529 UART: [idev] ++
3,520,109 UART: [idev] CDI.KEYID = 6
3,520,995 UART: [idev] SUBJECT.KEYID = 7
3,522,235 UART: [idev] UDS.KEYID = 0
3,523,179 ready_for_fw is high
3,523,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,406 UART: [idev] Erasing UDS.KEYID = 0
6,026,938 UART: [idev] Sha1 KeyId Algorithm
6,050,161 UART: [idev] --
6,053,936 UART: [ldev] ++
6,054,503 UART: [ldev] CDI.KEYID = 6
6,055,412 UART: [ldev] SUBJECT.KEYID = 5
6,056,573 UART: [ldev] AUTHORITY.KEYID = 7
6,057,860 UART: [ldev] FE.KEYID = 1
6,100,315 UART: [ldev] Erasing FE.KEYID = 1
8,602,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,347 UART: [ldev] --
10,415,717 UART: [fwproc] Wait for Commands...
10,418,451 UART: [fwproc] Recv command 0x46574c44
10,420,534 UART: [fwproc] Recv'd Img size: 114448 bytes
13,822,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,364 >>> mbox cmd response: success
14,285,637 UART: [afmc] ++
14,286,226 UART: [afmc] CDI.KEYID = 6
14,287,142 UART: [afmc] SUBJECT.KEYID = 7
14,288,245 UART: [afmc] AUTHORITY.KEYID = 5
16,827,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,307 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,307 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,955 UART: [afmc] --
18,627,924 UART: [cold-reset] --
18,631,561 UART: [state] Locking Datavault
18,636,909 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,551 UART: [state] Locking ICCM
18,639,711 UART: [exit] Launching FMC @ 0x40000130
18,648,159 UART:
18,648,391 UART: Running Caliptra FMC ...
18,649,489 UART:
18,649,645 UART: [state] CFI Enabled
18,709,142 UART: [fht] FMC Alias Private Key: 7
20,473,013 UART: [art] Extend RT PCRs Done
20,474,229 UART: [art] Lock RT PCRs Done
20,475,891 UART: [art] Populate DV Done
20,481,303 UART: [fht] FMC Alias Private Key: 7
20,482,839 UART: [art] Derive CDI
20,483,602 UART: [art] Store in in slot 0x4
20,541,240 UART: [art] Derive Key Pair
20,542,280 UART: [art] Store priv key in slot 0x5
23,005,346 UART: [art] Derive Key Pair - Done
23,018,614 UART: [art] Signing Cert with AUTHO
23,019,917 UART: RITY.KEYID = 7
24,730,481 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,971 UART: [art] PUB.X = 86DDC519B70DDCD7FC0547814D03807B18A503FA2DD8C568E533C473B364D856B7A81C386997E5354A16372A923F697C
24,739,277 UART: [art] PUB.Y = 82FF2704B2F6C2D844D7CE9B597042120D3AD94B44848FA4046A2C8BADFA51617E7A92F91A749CF18EAFFA1AD7576C17
24,746,658 UART: [art] SIG.R = DEF1CFD8A28F5AF0F625E98029382062ECC39ABF89531983C7E8F9265C37DA57B9D1579E86EF9BD00BCD9DD29B64CA63
24,753,975 UART: [art] SIG.S = B24D56229E1F9CB4C393A26FA41E808B1CAA4B220D8EBDA0FD870616AE6FDBE28AB5BA8D1FEC326A7F99AF6B2BBBEA82
25,732,604 UART: Caliptra RT
25,733,303 UART: [state] CFI Enabled
25,897,004 UART: [rt] RT listening for mailbox commands...
25,900,930 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,945,990 UART: [rt]cmd =0x4c4d5356, len=1672
26,368,565 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,363,373 ready_for_fw is high
3,363,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,072,365 >>> mbox cmd response: success
18,370,344 UART:
18,370,757 UART: Running Caliptra FMC ...
18,371,864 UART:
18,372,017 UART: [state] CFI Enabled
18,428,775 UART: [fht] FMC Alias Private Key: 7
20,192,720 UART: [art] Extend RT PCRs Done
20,193,947 UART: [art] Lock RT PCRs Done
20,195,459 UART: [art] Populate DV Done
20,200,878 UART: [fht] FMC Alias Private Key: 7
20,202,417 UART: [art] Derive CDI
20,203,179 UART: [art] Store in in slot 0x4
20,262,314 UART: [art] Derive Key Pair
20,263,324 UART: [art] Store priv key in slot 0x5
22,725,941 UART: [art] Derive Key Pair - Done
22,738,989 UART: [art] Signing Cert with AUTHO
22,740,290 UART: RITY.KEYID = 7
24,452,379 UART: [art] Erasing AUTHORITY.KEYID = 7
24,453,886 UART: [art] PUB.X = 5CCD50DCABC4C289CC56AB2E1C80C257241BF3582E1F124830A3551C38E9907E67EDE66AF8056EB99DB17904A507CE70
24,461,135 UART: [art] PUB.Y = C2E0A34C1A7328B334AB5C6EA73D54351D252DD2C562D2A11C4740D83BD1ED217781774C5B98E75D35F630A0DAAD8695
24,468,392 UART: [art] SIG.R = AD92D80BF5B9AEB1279B5E105D31E298E892D611F929CE101749E3213931C8E22DDB4876035D5E455FA3879AA2F3E0D3
24,475,785 UART: [art] SIG.S = 63EDB2FF26CFE716AF126F5C2EF2478A01FC20FF0AFE0E7F239C7F8F5C2CDA878667098F9F2636E28F3DD3B64FB0C986
25,454,588 UART: Caliptra RT
25,455,283 UART: [state] CFI Enabled
25,620,423 UART: [rt] RT listening for mailbox commands...
25,624,362 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,669,075 UART: [rt]cmd =0x4c4d5356, len=1672
26,091,618 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,115 writing to cptra_bootfsm_go
193,210 UART:
193,583 UART: Running Caliptra ROM ...
194,779 UART:
604,320 UART: [state] CFI Enabled
614,717 UART: [state] LifecycleState = Unprovisioned
616,593 UART: [state] DebugLocked = No
618,970 UART: [state] WD Timer not started. Device not locked for debugging
622,782 UART: [kat] SHA2-256
801,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,439 UART: [kat] ++
813,884 UART: [kat] sha1
825,387 UART: [kat] SHA2-256
828,385 UART: [kat] SHA2-384
834,864 UART: [kat] SHA2-512-ACC
837,882 UART: [kat] ECC-384
3,280,648 UART: [kat] HMAC-384Kdf
3,294,158 UART: [kat] LMS
3,823,647 UART: [kat] --
3,828,992 UART: [cold-reset] ++
3,830,559 UART: [fht] FHT @ 0x50003400
3,841,761 UART: [idev] ++
3,842,360 UART: [idev] CDI.KEYID = 6
3,843,236 UART: [idev] SUBJECT.KEYID = 7
3,844,531 UART: [idev] UDS.KEYID = 0
3,845,457 ready_for_fw is high
3,845,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,588 UART: [idev] Erasing UDS.KEYID = 0
6,318,368 UART: [idev] Sha1 KeyId Algorithm
6,342,184 UART: [idev] --
6,345,882 UART: [ldev] ++
6,346,472 UART: [ldev] CDI.KEYID = 6
6,347,376 UART: [ldev] SUBJECT.KEYID = 5
6,348,527 UART: [ldev] AUTHORITY.KEYID = 7
6,349,800 UART: [ldev] FE.KEYID = 1
6,361,410 UART: [ldev] Erasing FE.KEYID = 1
8,834,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,128 UART: [ldev] --
10,624,179 UART: [fwproc] Wait for Commands...
10,626,642 UART: [fwproc] Recv command 0x46574c44
10,628,722 UART: [fwproc] Recv'd Img size: 114448 bytes
14,042,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,847 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,438 >>> mbox cmd response: success
14,505,505 UART: [afmc] ++
14,506,097 UART: [afmc] CDI.KEYID = 6
14,507,002 UART: [afmc] SUBJECT.KEYID = 7
14,508,215 UART: [afmc] AUTHORITY.KEYID = 5
17,011,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,732,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,734,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,750,264 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,766,334 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,782,152 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,805,770 UART: [afmc] --
18,810,161 UART: [cold-reset] --
18,813,485 UART: [state] Locking Datavault
18,819,266 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,985 UART: [state] Locking ICCM
18,823,134 UART: [exit] Launching FMC @ 0x40000130
18,831,527 UART:
18,831,755 UART: Running Caliptra FMC ...
18,832,845 UART:
18,833,001 UART: [state] CFI Enabled
18,840,989 UART: [fht] FMC Alias Private Key: 7
20,598,531 UART: [art] Extend RT PCRs Done
20,599,757 UART: [art] Lock RT PCRs Done
20,601,728 UART: [art] Populate DV Done
20,607,021 UART: [fht] FMC Alias Private Key: 7
20,608,611 UART: [art] Derive CDI
20,609,338 UART: [art] Store in in slot 0x4
20,652,263 UART: [art] Derive Key Pair
20,653,300 UART: [art] Store priv key in slot 0x5
23,079,757 UART: [art] Derive Key Pair - Done
23,092,661 UART: [art] Signing Cert with AUTHO
23,093,957 UART: RITY.KEYID = 7
24,799,106 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,605 UART: [art] PUB.X = 55E8E8A986E8557647B1259AA6E1013EAA0F0C2B888C2912BF99E0E550148F20CA5C7A3246DE4BF33D7C15785DF221C0
24,807,908 UART: [art] PUB.Y = 963E620AA9D8F8931FAD24A9309FBEC05DDC737A53C1D705202FA9272BF8BDB06BE06CAF8AF137A8DD66597A9D5ED06C
24,815,177 UART: [art] SIG.R = 8600BB9F94A6BF9EFDCD8CCC838B0F97D617A60E8C892CE1F29AB650CA9AB3B592F1C8EFCC7AF7B876249BF508740C9F
24,822,552 UART: [art] SIG.S = 2E67697E78372CD2744913F95647B65299529D828E524651D199C34DD7A1BA64B4F5636E8D87929D29A06DF38F103559
25,801,590 UART: Caliptra RT
25,802,286 UART: [state] CFI Enabled
25,919,288 UART: [rt] RT listening for mailbox commands...
25,923,416 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,967,855 UART: [rt]cmd =0x4c4d5356, len=1672
26,390,618 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,696,671 ready_for_fw is high
3,697,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,114 >>> mbox cmd response: success
18,527,080 UART:
18,527,478 UART: Running Caliptra FMC ...
18,528,586 UART:
18,528,733 UART: [state] CFI Enabled
18,536,523 UART: [fht] FMC Alias Private Key: 7
20,294,244 UART: [art] Extend RT PCRs Done
20,295,468 UART: [art] Lock RT PCRs Done
20,296,960 UART: [art] Populate DV Done
20,302,321 UART: [fht] FMC Alias Private Key: 7
20,303,963 UART: [art] Derive CDI
20,304,690 UART: [art] Store in in slot 0x4
20,347,232 UART: [art] Derive Key Pair
20,348,271 UART: [art] Store priv key in slot 0x5
22,774,651 UART: [art] Derive Key Pair - Done
22,787,807 UART: [art] Signing Cert with AUTHO
22,789,114 UART: RITY.KEYID = 7
24,494,620 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,178 UART: [art] PUB.X = 500F744EA3C84C0A6E2231F151D8BAC3F46B7C067D3CD6071C645909765DCC579E742523C10F8C9B86D173FC45F9C518
24,503,410 UART: [art] PUB.Y = 0CF13E4B7E6D9401C066BE02F5219C22F1883A551CA83FA63BE0FAD05F276CF01596584822309B979D1309B90EA1B525
24,510,617 UART: [art] SIG.R = D31CE39D2894906DA3173C81256BEF6485017816DC6CE2C8B3075674B6DFC4AFE595331B36D4FA944745D179829CF126
24,517,994 UART: [art] SIG.S = 52B72FB158BBEC8ADC26E3972D8FF59F6E1C0F9F627DE1F143594BFE6334DCBFDD52FAE30AC38A09C35F65CBF1D9EC86
25,496,924 UART: Caliptra RT
25,497,623 UART: [state] CFI Enabled
25,614,754 UART: [rt] RT listening for mailbox commands...
25,618,790 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,663,400 UART: [rt]cmd =0x4c4d5356, len=1672
26,085,702 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,438,480 ready_for_fw is high
3,438,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,598 >>> mbox cmd response: success
19,051,367 UART:
19,051,774 UART: Running Caliptra FMC ...
19,052,920 UART:
19,053,084 UART: [state] CFI Enabled
19,117,784 UART: [fht] FMC Alias Private Key: 7
20,881,382 UART: [art] Extend RT PCRs Done
20,882,602 UART: [art] Lock RT PCRs Done
20,884,277 UART: [art] Populate DV Done
20,889,798 UART: [fht] FMC Alias Private Key: 7
20,891,388 UART: [art] Derive CDI
20,892,204 UART: [art] Store in in slot 0x4
20,949,960 UART: [art] Derive Key Pair
20,950,995 UART: [art] Store priv key in slot 0x5
23,414,686 UART: [art] Derive Key Pair - Done
23,427,788 UART: [art] Signing Cert with AUTHO
23,429,119 UART: RITY.KEYID = 7
25,140,169 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,670 UART: [art] PUB.X = 1C0EFA55AD81824914927E8941A5E9AB1B4E7535300546F671A9ADC43580D3F0EE853683203C506E564E50B424BFD05F
25,148,913 UART: [art] PUB.Y = CA6CFAD688690924BD8EA1277E11002FB6E8963DAF59775FBC49209C0EB84E9254EEAC4C52BE7D5EB51460B87C7F0321
25,156,170 UART: [art] SIG.R = E42C9F759A497E3698955D632AB1A6E9A3E0FD235DB0EB41AB48DACAA853F924E5386B7FE96CF20A8BFA5A72A8A6071D
25,163,559 UART: [art] SIG.S = 17B2969FBA15740FEA25F5CE0E838315C7AF5A13880AA75224B08F6A3DDE4A76DB524F180878659FB2D209EB712753A7
26,142,607 UART: Caliptra RT
26,143,300 UART: [state] CFI Enabled
26,308,675 UART: [rt] RT listening for mailbox commands...
26,312,657 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,357,702 UART: [rt]cmd =0x4c4d5356, len=1672
26,780,010 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,753,690 ready_for_fw is high
3,754,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,960,337 >>> mbox cmd response: success
19,216,066 UART:
19,216,455 UART: Running Caliptra FMC ...
19,217,581 UART:
19,217,727 UART: [state] CFI Enabled
19,225,560 UART: [fht] FMC Alias Private Key: 7
20,981,944 UART: [art] Extend RT PCRs Done
20,983,183 UART: [art] Lock RT PCRs Done
20,984,729 UART: [art] Populate DV Done
20,990,044 UART: [fht] FMC Alias Private Key: 7
20,991,745 UART: [art] Derive CDI
20,992,474 UART: [art] Store in in slot 0x4
21,035,013 UART: [art] Derive Key Pair
21,036,075 UART: [art] Store priv key in slot 0x5
23,462,770 UART: [art] Derive Key Pair - Done
23,475,658 UART: [art] Signing Cert with AUTHO
23,476,964 UART: RITY.KEYID = 7
25,182,724 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,228 UART: [art] PUB.X = 45F43405B3C9AC6A7B9C38AD09917C80455938F9C63052C7134435C62218971B281A4ECBF8E087739D6895B3AC7867E3
25,191,479 UART: [art] PUB.Y = E769D293BE8B552A60609861475F5E3799255FB3E3E3919E334368A01EAA0CBBDA568D7EFA0C085E8BC6B0AB453FA2C9
25,198,710 UART: [art] SIG.R = 8D92AA5F0244BB123F028052ABFBAD719CEA0F03D78B56475AD4EA11C084E5DCD80DACBF7562796440772C8F33FDB4DC
25,206,106 UART: [art] SIG.S = B36171A2824066DCCBFBA192BB73BACBD23BC84A9E70787DA5A2A8931825ABE185483C737F5A31B3014028991C3B542D
26,184,481 UART: Caliptra RT
26,185,169 UART: [state] CFI Enabled
26,302,659 UART: [rt] RT listening for mailbox commands...
26,306,572 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,350,911 UART: [rt]cmd =0x4c4d5356, len=1672
26,773,141 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,225 UART: [kat] SHA2-256
882,156 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,271 UART: [kat] ++
886,423 UART: [kat] sha1
890,685 UART: [kat] SHA2-256
892,623 UART: [kat] SHA2-384
895,262 UART: [kat] SHA2-512-ACC
897,163 UART: [kat] ECC-384
902,730 UART: [kat] HMAC-384Kdf
907,290 UART: [kat] LMS
1,475,486 UART: [kat] --
1,476,369 UART: [cold-reset] ++
1,476,929 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 ready_for_fw is high
1,480,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,456 UART: [idev] Erasing UDS.KEYID = 0
1,505,058 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,492 UART: [idev] --
1,514,529 UART: [ldev] ++
1,514,697 UART: [ldev] CDI.KEYID = 6
1,515,060 UART: [ldev] SUBJECT.KEYID = 5
1,515,486 UART: [ldev] AUTHORITY.KEYID = 7
1,515,949 UART: [ldev] FE.KEYID = 1
1,521,397 UART: [ldev] Erasing FE.KEYID = 1
1,546,726 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,544 UART: [ldev] --
1,585,891 UART: [fwproc] Waiting for Commands...
1,586,660 UART: [fwproc] Received command 0x46574c44
1,587,451 UART: [fwproc] Received Image of size 114448 bytes
2,885,516 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,390 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,781 >>> mbox cmd response: success
3,079,827 UART: [afmc] ++
3,079,995 UART: [afmc] CDI.KEYID = 6
3,080,357 UART: [afmc] SUBJECT.KEYID = 7
3,080,782 UART: [afmc] AUTHORITY.KEYID = 5
3,115,591 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,961 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,741 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,354 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,044 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,887 UART: [afmc] --
3,159,011 UART: [cold-reset] --
3,159,827 UART: [state] Locking Datavault
3,160,876 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,480 UART: [state] Locking ICCM
3,162,130 UART: [exit] Launching FMC @ 0x40000130
3,167,459 UART:
3,167,475 UART: Running Caliptra FMC ...
3,167,883 UART:
3,167,937 UART: [state] CFI Enabled
3,178,576 UART: [fht] FMC Alias Private Key: 7
3,286,717 UART: [art] Extend RT PCRs Done
3,287,145 UART: [art] Lock RT PCRs Done
3,288,945 UART: [art] Populate DV Done
3,297,196 UART: [fht] FMC Alias Private Key: 7
3,298,302 UART: [art] Derive CDI
3,298,582 UART: [art] Store in in slot 0x4
3,384,159 UART: [art] Derive Key Pair
3,384,519 UART: [art] Store priv key in slot 0x5
3,397,743 UART: [art] Derive Key Pair - Done
3,412,135 UART: [art] Signing Cert with AUTHO
3,412,615 UART: RITY.KEYID = 7
3,427,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,470 UART: [art] PUB.X = 2C217CDDEDC9068620A6B4E24BC7DF036992F609E1B612080C2FD4878A533E7E6C5C02FAA610B750D3D16CCCE7694F15
3,435,232 UART: [art] PUB.Y = F783627100AD78383D18AE383F29F1CAF9E756F2427B57D136FE8436DFBC03ECCE9E124E1227D3594C9A378EE0EFEB6B
3,442,169 UART: [art] SIG.R = A146EBED887F29F4FE0E71E0E442C38D3DD72217CB5DAEA8EFAF758379BF80B636CBD4814B7F2C26051F75D0EA5CC3F1
3,448,955 UART: [art] SIG.S = 82EB1A2A329A66CC617F92CBF328F678264207AAA8E1AA21DD41F15CE9BC03F9A800BD83BBDFCCEE9C47DE01E1AD962F
3,472,865 UART: Caliptra RT
3,473,118 UART: [state] CFI Enabled
3,580,966 UART: [rt] RT listening for mailbox commands...
3,581,636 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,256 UART: [rt]cmd =0x4c4d5356, len=1672
4,152,195 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,861 ready_for_fw is high
1,362,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,555 >>> mbox cmd response: success
2,989,129 UART:
2,989,145 UART: Running Caliptra FMC ...
2,989,553 UART:
2,989,607 UART: [state] CFI Enabled
2,999,968 UART: [fht] FMC Alias Private Key: 7
3,107,815 UART: [art] Extend RT PCRs Done
3,108,243 UART: [art] Lock RT PCRs Done
3,109,603 UART: [art] Populate DV Done
3,118,086 UART: [fht] FMC Alias Private Key: 7
3,119,076 UART: [art] Derive CDI
3,119,356 UART: [art] Store in in slot 0x4
3,204,877 UART: [art] Derive Key Pair
3,205,237 UART: [art] Store priv key in slot 0x5
3,217,985 UART: [art] Derive Key Pair - Done
3,232,721 UART: [art] Signing Cert with AUTHO
3,233,201 UART: RITY.KEYID = 7
3,247,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,704 UART: [art] PUB.X = 92B4F8C3F09E365DA9B13539692778C6A9A90593E055C4249ADFC4CA1987CC26B4AB8B349CDBE02D1BD3B3D0224499E1
3,255,479 UART: [art] PUB.Y = D346976469DD14A461F63A7FB48AD1D71B32A95C9EC84C46CE63F709182561BD6488953551F05FA4F4CAA21D38D44CEC
3,262,432 UART: [art] SIG.R = AA3D28A6151507A0D20B1B45790FFECF0C289E41AAA01054AB9A3A4AB3F587BC26182D996B16EB9ED3A41AA9E3DD4ACC
3,269,212 UART: [art] SIG.S = 44B8E11A8ACF1382D6524811D748E355AAE100ECEC7198D155CDC649F22E24866BBBB6B31890526F7EB2B73645FEA937
3,293,259 UART: Caliptra RT
3,293,512 UART: [state] CFI Enabled
3,401,025 UART: [rt] RT listening for mailbox commands...
3,401,695 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,555 UART: [rt]cmd =0x4c4d5356, len=1672
3,972,554 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,132 UART: [kat] SHA2-256
882,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,178 UART: [kat] ++
886,330 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,379 UART: [kat] SHA2-512-ACC
897,280 UART: [kat] ECC-384
903,383 UART: [kat] HMAC-384Kdf
907,869 UART: [kat] LMS
1,476,065 UART: [kat] --
1,476,816 UART: [cold-reset] ++
1,477,390 UART: [fht] Storing FHT @ 0x50003400
1,480,169 UART: [idev] ++
1,480,337 UART: [idev] CDI.KEYID = 6
1,480,697 UART: [idev] SUBJECT.KEYID = 7
1,481,121 UART: [idev] UDS.KEYID = 0
1,481,466 ready_for_fw is high
1,481,466 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,871 UART: [idev] Erasing UDS.KEYID = 0
1,505,893 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,735 UART: [idev] --
1,515,846 UART: [ldev] ++
1,516,014 UART: [ldev] CDI.KEYID = 6
1,516,377 UART: [ldev] SUBJECT.KEYID = 5
1,516,803 UART: [ldev] AUTHORITY.KEYID = 7
1,517,266 UART: [ldev] FE.KEYID = 1
1,522,458 UART: [ldev] Erasing FE.KEYID = 1
1,547,685 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,579 UART: [ldev] --
1,586,992 UART: [fwproc] Waiting for Commands...
1,587,839 UART: [fwproc] Received command 0x46574c44
1,588,630 UART: [fwproc] Received Image of size 114448 bytes
2,888,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,839 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,304 >>> mbox cmd response: success
3,081,358 UART: [afmc] ++
3,081,526 UART: [afmc] CDI.KEYID = 6
3,081,888 UART: [afmc] SUBJECT.KEYID = 7
3,082,313 UART: [afmc] AUTHORITY.KEYID = 5
3,117,578 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,168 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,561 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,251 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,150 UART: [afmc] --
3,161,278 UART: [cold-reset] --
3,162,096 UART: [state] Locking Datavault
3,163,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,191 UART: [state] Locking ICCM
3,164,683 UART: [exit] Launching FMC @ 0x40000130
3,170,012 UART:
3,170,028 UART: Running Caliptra FMC ...
3,170,436 UART:
3,170,579 UART: [state] CFI Enabled
3,181,408 UART: [fht] FMC Alias Private Key: 7
3,290,117 UART: [art] Extend RT PCRs Done
3,290,545 UART: [art] Lock RT PCRs Done
3,291,593 UART: [art] Populate DV Done
3,299,738 UART: [fht] FMC Alias Private Key: 7
3,300,858 UART: [art] Derive CDI
3,301,138 UART: [art] Store in in slot 0x4
3,386,847 UART: [art] Derive Key Pair
3,387,207 UART: [art] Store priv key in slot 0x5
3,400,683 UART: [art] Derive Key Pair - Done
3,415,416 UART: [art] Signing Cert with AUTHO
3,415,896 UART: RITY.KEYID = 7
3,431,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,223 UART: [art] PUB.X = E22BA1D67FBF2D362A1DBCC6B530034EF73EAA508495068A75CEFCA8A4EBE09D5AF3030D10B1479582DC78B830777619
3,438,993 UART: [art] PUB.Y = 2CF1374EFDFDF929AC651F921D80E671C9D7070D41A137B3AF1295FB1A7CC0D3D6E1BA21D82B34E8F6BB87C5B1FAE239
3,445,957 UART: [art] SIG.R = 00D48DB52C77A9E3CB2A67331792DA1E4E273D1ECB4F8BF9F85F2B48BED47ED000C973D95522D2E19A71AF9B65780D9D
3,452,694 UART: [art] SIG.S = 3506D6F1882574DEF88CAE9EDD9216F671E27A519CCF262591B64FB781787CF1B27D7FF9F6F6787FD07BCE5CF23828FB
3,477,084 UART: Caliptra RT
3,477,429 UART: [state] CFI Enabled
3,586,096 UART: [rt] RT listening for mailbox commands...
3,586,766 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,304 UART: [rt]cmd =0x4c4d5356, len=1672
4,157,193 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,978 ready_for_fw is high
1,362,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,926,950 >>> mbox cmd response: success
2,988,774 UART:
2,988,790 UART: Running Caliptra FMC ...
2,989,198 UART:
2,989,341 UART: [state] CFI Enabled
2,999,926 UART: [fht] FMC Alias Private Key: 7
3,108,743 UART: [art] Extend RT PCRs Done
3,109,171 UART: [art] Lock RT PCRs Done
3,110,887 UART: [art] Populate DV Done
3,119,166 UART: [fht] FMC Alias Private Key: 7
3,120,258 UART: [art] Derive CDI
3,120,538 UART: [art] Store in in slot 0x4
3,206,347 UART: [art] Derive Key Pair
3,206,707 UART: [art] Store priv key in slot 0x5
3,219,791 UART: [art] Derive Key Pair - Done
3,234,715 UART: [art] Signing Cert with AUTHO
3,235,195 UART: RITY.KEYID = 7
3,250,085 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,850 UART: [art] PUB.X = 7D809C38D018722699023EB68FCEA96D71D89838F398F9C71D38FD2BE8A9150A3B3CD26A23B928A013DBC760E84D26CE
3,257,620 UART: [art] PUB.Y = 2FD0E80C1C230D83ADD780C342581875B451F94259F127F8892A05476EB641BA6612A0E657DBE7415267EF70D40EC8A3
3,264,556 UART: [art] SIG.R = C30A71B6F5D436AA6AC3C544A6A352BB6300E00914AEC9C3F4A803A57CFF9242A21CB58A5387C8CC01D83A519E8C0522
3,271,299 UART: [art] SIG.S = E6CF0B6C3293F2FCC756C816E7A37418C7D41F2E02C719F936B55EE6F5EE87BDA65575BDA0929A847086A7D6AA52FC3F
3,295,288 UART: Caliptra RT
3,295,633 UART: [state] CFI Enabled
3,403,819 UART: [rt] RT listening for mailbox commands...
3,404,489 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,057 UART: [rt]cmd =0x4c4d5356, len=1672
3,975,094 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
893,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,539 UART: [kat] ++
897,691 UART: [kat] sha1
901,873 UART: [kat] SHA2-256
903,813 UART: [kat] SHA2-384
906,584 UART: [kat] SHA2-512-ACC
908,485 UART: [kat] ECC-384
918,502 UART: [kat] HMAC-384Kdf
922,950 UART: [kat] LMS
1,171,278 UART: [kat] --
1,172,205 UART: [cold-reset] ++
1,172,581 UART: [fht] FHT @ 0x50003400
1,175,318 UART: [idev] ++
1,175,486 UART: [idev] CDI.KEYID = 6
1,175,846 UART: [idev] SUBJECT.KEYID = 7
1,176,270 UART: [idev] UDS.KEYID = 0
1,176,615 ready_for_fw is high
1,176,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,326 UART: [idev] Erasing UDS.KEYID = 0
1,201,321 UART: [idev] Sha1 KeyId Algorithm
1,209,607 UART: [idev] --
1,210,623 UART: [ldev] ++
1,210,791 UART: [ldev] CDI.KEYID = 6
1,211,154 UART: [ldev] SUBJECT.KEYID = 5
1,211,580 UART: [ldev] AUTHORITY.KEYID = 7
1,212,043 UART: [ldev] FE.KEYID = 1
1,217,241 UART: [ldev] Erasing FE.KEYID = 1
1,243,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,139 UART: [ldev] --
1,282,438 UART: [fwproc] Wait for Commands...
1,283,014 UART: [fwproc] Recv command 0x46574c44
1,283,742 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,102 >>> mbox cmd response: success
2,776,262 UART: [afmc] ++
2,776,430 UART: [afmc] CDI.KEYID = 6
2,776,792 UART: [afmc] SUBJECT.KEYID = 7
2,777,217 UART: [afmc] AUTHORITY.KEYID = 5
2,812,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,737 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,622 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,341 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,313 UART: [afmc] --
2,856,203 UART: [cold-reset] --
2,856,883 UART: [state] Locking Datavault
2,857,960 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,564 UART: [state] Locking ICCM
2,859,232 UART: [exit] Launching FMC @ 0x40000130
2,864,561 UART:
2,864,577 UART: Running Caliptra FMC ...
2,864,985 UART:
2,865,039 UART: [state] CFI Enabled
2,875,368 UART: [fht] FMC Alias Private Key: 7
2,983,679 UART: [art] Extend RT PCRs Done
2,984,107 UART: [art] Lock RT PCRs Done
2,985,601 UART: [art] Populate DV Done
2,994,030 UART: [fht] FMC Alias Private Key: 7
2,995,190 UART: [art] Derive CDI
2,995,470 UART: [art] Store in in slot 0x4
3,081,449 UART: [art] Derive Key Pair
3,081,809 UART: [art] Store priv key in slot 0x5
3,095,089 UART: [art] Derive Key Pair - Done
3,109,855 UART: [art] Signing Cert with AUTHO
3,110,335 UART: RITY.KEYID = 7
3,125,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,498 UART: [art] PUB.X = 55D9BB2460ED2E7B135D01D307C703149EB57843DD5A1095130CDC80838F303CD8F3D2321819E8EF13BDD1375D9965FD
3,133,258 UART: [art] PUB.Y = 000DD56A9998CB0262E73376E932230785D20D8666BA5BDC2B64470D18F371A841BE9A4919916AAF7F94F98E399FFADC
3,140,173 UART: [art] SIG.R = DCC351FF9CD8A54ABA32DF2A61725A6E08CDE4C429B0B1B839E07C058D89764B5F628C23AA9A55A93D130255C4ABCADF
3,146,954 UART: [art] SIG.S = 59D4EC0EF749BD48E5B302B3EBA43F260DE2AFB37F6A43E3A273BBDAECC46AB848B0E2637FDA1C45936C3862E8A46770
3,170,696 UART: Caliptra RT
3,170,949 UART: [state] CFI Enabled
3,278,306 UART: [rt] RT listening for mailbox commands...
3,278,976 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,656 UART: [rt]cmd =0x4c4d5356, len=1672
3,849,357 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,693 ready_for_fw is high
1,059,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,251 >>> mbox cmd response: success
2,689,339 UART:
2,689,355 UART: Running Caliptra FMC ...
2,689,763 UART:
2,689,817 UART: [state] CFI Enabled
2,700,590 UART: [fht] FMC Alias Private Key: 7
2,807,653 UART: [art] Extend RT PCRs Done
2,808,081 UART: [art] Lock RT PCRs Done
2,809,777 UART: [art] Populate DV Done
2,818,064 UART: [fht] FMC Alias Private Key: 7
2,819,108 UART: [art] Derive CDI
2,819,388 UART: [art] Store in in slot 0x4
2,905,063 UART: [art] Derive Key Pair
2,905,423 UART: [art] Store priv key in slot 0x5
2,918,661 UART: [art] Derive Key Pair - Done
2,933,567 UART: [art] Signing Cert with AUTHO
2,934,047 UART: RITY.KEYID = 7
2,948,911 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,676 UART: [art] PUB.X = 9CAB50230FE207426B1F2A741012F870D27B595F4C9DE79A679BFC74BF4D3BC1BDC80EDE3F38EAAE853064641FFD79A4
2,956,453 UART: [art] PUB.Y = 13ADBFAFCC20B63A1254D05259B6C57A60F2C47B9A6E99E072BA7786AF42E10CB2EE70C249840B881D4D1A24C0410BC8
2,963,406 UART: [art] SIG.R = A79E5013E3ABBCB0EFC4E79BC35A70F82F0D3570CA5A290291400D2B3B8A303EDE71A18A5CC34B89AA62A5A1DD8E9BC5
2,970,189 UART: [art] SIG.S = 73020728CED6033ACC05AD6604F8ECD77A5C674D178888F74204F3ABF0669D57B8B34B566F69088D07ACFD7CAAEB01E3
2,994,133 UART: Caliptra RT
2,994,386 UART: [state] CFI Enabled
3,101,963 UART: [rt] RT listening for mailbox commands...
3,102,633 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,419 UART: [rt]cmd =0x4c4d5356, len=1672
3,673,490 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
901,822 UART: [kat] SHA2-256
903,762 UART: [kat] SHA2-384
906,525 UART: [kat] SHA2-512-ACC
908,426 UART: [kat] ECC-384
918,501 UART: [kat] HMAC-384Kdf
923,101 UART: [kat] LMS
1,171,429 UART: [kat] --
1,172,390 UART: [cold-reset] ++
1,172,894 UART: [fht] FHT @ 0x50003400
1,175,371 UART: [idev] ++
1,175,539 UART: [idev] CDI.KEYID = 6
1,175,899 UART: [idev] SUBJECT.KEYID = 7
1,176,323 UART: [idev] UDS.KEYID = 0
1,176,668 ready_for_fw is high
1,176,668 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,511 UART: [idev] Erasing UDS.KEYID = 0
1,201,482 UART: [idev] Sha1 KeyId Algorithm
1,210,068 UART: [idev] --
1,211,150 UART: [ldev] ++
1,211,318 UART: [ldev] CDI.KEYID = 6
1,211,681 UART: [ldev] SUBJECT.KEYID = 5
1,212,107 UART: [ldev] AUTHORITY.KEYID = 7
1,212,570 UART: [ldev] FE.KEYID = 1
1,217,820 UART: [ldev] Erasing FE.KEYID = 1
1,243,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,948 UART: [ldev] --
1,283,227 UART: [fwproc] Wait for Commands...
1,283,801 UART: [fwproc] Recv command 0x46574c44
1,284,529 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,564 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,803 >>> mbox cmd response: success
2,777,055 UART: [afmc] ++
2,777,223 UART: [afmc] CDI.KEYID = 6
2,777,585 UART: [afmc] SUBJECT.KEYID = 7
2,778,010 UART: [afmc] AUTHORITY.KEYID = 5
2,813,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,894 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,779 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,498 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,308 UART: [afmc] --
2,857,398 UART: [cold-reset] --
2,858,358 UART: [state] Locking Datavault
2,859,635 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,239 UART: [state] Locking ICCM
2,860,825 UART: [exit] Launching FMC @ 0x40000130
2,866,154 UART:
2,866,170 UART: Running Caliptra FMC ...
2,866,578 UART:
2,866,721 UART: [state] CFI Enabled
2,877,306 UART: [fht] FMC Alias Private Key: 7
2,985,215 UART: [art] Extend RT PCRs Done
2,985,643 UART: [art] Lock RT PCRs Done
2,987,381 UART: [art] Populate DV Done
2,995,378 UART: [fht] FMC Alias Private Key: 7
2,996,370 UART: [art] Derive CDI
2,996,650 UART: [art] Store in in slot 0x4
3,082,425 UART: [art] Derive Key Pair
3,082,785 UART: [art] Store priv key in slot 0x5
3,096,383 UART: [art] Derive Key Pair - Done
3,111,160 UART: [art] Signing Cert with AUTHO
3,111,640 UART: RITY.KEYID = 7
3,127,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,771 UART: [art] PUB.X = BAC62F6ACFFB8A2B8C517C966FD858E4E74C10C26CD76551307C0ECA09E299F9E34FE7D1DE4E368E5C094B1A13D2DD85
3,134,552 UART: [art] PUB.Y = 3BB9047BB2698D3217A16B87B7CD593BB76B75FB2B58C9EAFC79207246DCFD46D48E813586C343AABE06C7D5FD7E476B
3,141,510 UART: [art] SIG.R = C7B2F670C532233FDC4DF4F7735132B19D5AA637CD498889AE238C5D4ACF7EE8C4A3CF963C25879024E9575C4630F0D6
3,148,286 UART: [art] SIG.S = F0876494B078A86150F049948245E2463748C86828D76B6B3BA9610A46E2D3CF4E8235DE66A9FE510048392D16AA819E
3,172,178 UART: Caliptra RT
3,172,523 UART: [state] CFI Enabled
3,280,649 UART: [rt] RT listening for mailbox commands...
3,281,319 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,197 UART: [rt]cmd =0x4c4d5356, len=1672
3,852,098 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,058 ready_for_fw is high
1,061,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,892 >>> mbox cmd response: success
2,691,234 UART:
2,691,250 UART: Running Caliptra FMC ...
2,691,658 UART:
2,691,801 UART: [state] CFI Enabled
2,702,078 UART: [fht] FMC Alias Private Key: 7
2,810,361 UART: [art] Extend RT PCRs Done
2,810,789 UART: [art] Lock RT PCRs Done
2,812,293 UART: [art] Populate DV Done
2,820,496 UART: [fht] FMC Alias Private Key: 7
2,821,604 UART: [art] Derive CDI
2,821,884 UART: [art] Store in in slot 0x4
2,907,099 UART: [art] Derive Key Pair
2,907,459 UART: [art] Store priv key in slot 0x5
2,920,305 UART: [art] Derive Key Pair - Done
2,935,344 UART: [art] Signing Cert with AUTHO
2,935,824 UART: RITY.KEYID = 7
2,951,080 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,845 UART: [art] PUB.X = EB55F4DFFF80FCF8B596680E3F3AFA5B90DCD7F26797FD145E2770B82AD60531BC11B0F545E94DF667B44F8CC4C6D8F2
2,958,629 UART: [art] PUB.Y = 7BB72A44BE9E904E8ADA928B2A10F36BF2F94681B71DB5D51512B84FA491902F393A3B5992CD030A9E2572192FF9E324
2,965,577 UART: [art] SIG.R = 5905FF45EFE815C8110CED87C810C8EC6BDE005CCA192EC3D128375EE1597329D792C92E2EB80FD137CD0E5916539B7B
2,972,323 UART: [art] SIG.S = D9821A5D9752BB1E52E93582229710783DAF75F9007DF676EFEB265D5D6D493E9C26102FEA0B3FE243CFEAF9898B0838
2,996,024 UART: Caliptra RT
2,996,369 UART: [state] CFI Enabled
3,104,342 UART: [rt] RT listening for mailbox commands...
3,105,012 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,630 UART: [rt]cmd =0x4c4d5356, len=1672
3,675,453 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
915,786 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,743 UART: [cold-reset] ++
1,170,305 UART: [fht] FHT @ 0x50003400
1,172,959 UART: [idev] ++
1,173,127 UART: [idev] CDI.KEYID = 6
1,173,488 UART: [idev] SUBJECT.KEYID = 7
1,173,913 UART: [idev] UDS.KEYID = 0
1,174,259 ready_for_fw is high
1,174,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,477 UART: [idev] Erasing UDS.KEYID = 0
1,198,343 UART: [idev] Sha1 KeyId Algorithm
1,207,127 UART: [idev] --
1,208,156 UART: [ldev] ++
1,208,324 UART: [ldev] CDI.KEYID = 6
1,208,688 UART: [ldev] SUBJECT.KEYID = 5
1,209,115 UART: [ldev] AUTHORITY.KEYID = 7
1,209,578 UART: [ldev] FE.KEYID = 1
1,214,876 UART: [ldev] Erasing FE.KEYID = 1
1,240,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,632 UART: [ldev] --
1,279,970 UART: [fwproc] Wait for Commands...
1,280,731 UART: [fwproc] Recv command 0x46574c44
1,281,464 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,760 >>> mbox cmd response: success
2,773,797 UART: [afmc] ++
2,773,965 UART: [afmc] CDI.KEYID = 6
2,774,328 UART: [afmc] SUBJECT.KEYID = 7
2,774,754 UART: [afmc] AUTHORITY.KEYID = 5
2,810,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,176 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,895 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,870 UART: [afmc] --
2,853,938 UART: [cold-reset] --
2,854,632 UART: [state] Locking Datavault
2,855,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,125 UART: [state] Locking ICCM
2,856,707 UART: [exit] Launching FMC @ 0x40000130
2,862,036 UART:
2,862,052 UART: Running Caliptra FMC ...
2,862,460 UART:
2,862,514 UART: [state] CFI Enabled
2,872,963 UART: [fht] FMC Alias Private Key: 7
2,980,670 UART: [art] Extend RT PCRs Done
2,981,098 UART: [art] Lock RT PCRs Done
2,982,566 UART: [art] Populate DV Done
2,990,933 UART: [fht] FMC Alias Private Key: 7
2,991,937 UART: [art] Derive CDI
2,992,217 UART: [art] Store in in slot 0x4
3,078,138 UART: [art] Derive Key Pair
3,078,498 UART: [art] Store priv key in slot 0x5
3,091,704 UART: [art] Derive Key Pair - Done
3,106,542 UART: [art] Signing Cert with AUTHO
3,107,022 UART: RITY.KEYID = 7
3,122,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,037 UART: [art] PUB.X = 295CB7169BA697F24A1680FD025B2AC5F11BB164366759694E102D919AB08328614D913D7446BE9F3A751043E1AD57B8
3,129,798 UART: [art] PUB.Y = D069E9FB2D549766D70AE68E3E5A294E695A43C8FC9132D2D05C2C7B720CF9D81D6C8FA25C8A36524D701BE823733B5B
3,136,750 UART: [art] SIG.R = A04A1489B8F59D11A78C246475207EB00877B2F04B13A769D43B2D4934830531566935133B068B6D3C7412514756BDD1
3,143,495 UART: [art] SIG.S = 0207213F9FD5C51B9ABA6533D9B0E8BD0DBF1850BD2122DCBD647B514EC76BC6F8CB22F074C857627007B8D4A451C13A
3,167,342 UART: Caliptra RT
3,167,595 UART: [state] CFI Enabled
3,275,054 UART: [rt] RT listening for mailbox commands...
3,275,724 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,212 UART: [rt]cmd =0x4c4d5356, len=1672
3,846,341 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,480 ready_for_fw is high
1,055,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,656 >>> mbox cmd response: success
2,685,074 UART:
2,685,090 UART: Running Caliptra FMC ...
2,685,498 UART:
2,685,552 UART: [state] CFI Enabled
2,696,055 UART: [fht] FMC Alias Private Key: 7
2,804,300 UART: [art] Extend RT PCRs Done
2,804,728 UART: [art] Lock RT PCRs Done
2,806,298 UART: [art] Populate DV Done
2,814,493 UART: [fht] FMC Alias Private Key: 7
2,815,421 UART: [art] Derive CDI
2,815,701 UART: [art] Store in in slot 0x4
2,901,138 UART: [art] Derive Key Pair
2,901,498 UART: [art] Store priv key in slot 0x5
2,914,956 UART: [art] Derive Key Pair - Done
2,929,580 UART: [art] Signing Cert with AUTHO
2,930,060 UART: RITY.KEYID = 7
2,945,336 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,101 UART: [art] PUB.X = 5A55CDB1FC52BEEC44ED1D3AEFD417A6F914C664A5BC1A1D6A7F12B16F08332D36F7C74079A71B0BC53F9AFA8FDDF0DE
2,952,895 UART: [art] PUB.Y = 067058A8C9AD144B8928E25897C4122655296EA10591E06B70671A6CD9BB21CA8F97E56968D6305A1C59FCE8C6375C31
2,959,833 UART: [art] SIG.R = 7C7F021432EF4FDEA42F22B3C787E8C891EC56CF1C5DA6F561E4900C9A0127187DAC0E8E0DA2B41FDBD5DB128BB5DB28
2,966,610 UART: [art] SIG.S = 08129CB7B742072F81CCC3EF1FB2D653E8826194914BE0D98F70224B882237CE7ED95B6BC179DC3CF3955B2995C01F9F
2,990,365 UART: Caliptra RT
2,990,618 UART: [state] CFI Enabled
3,098,651 UART: [rt] RT listening for mailbox commands...
3,099,321 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,875 UART: [rt]cmd =0x4c4d5356, len=1672
3,669,638 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
891,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
921,195 UART: [kat] LMS
1,169,507 UART: [kat] --
1,170,646 UART: [cold-reset] ++
1,170,984 UART: [fht] FHT @ 0x50003400
1,173,540 UART: [idev] ++
1,173,708 UART: [idev] CDI.KEYID = 6
1,174,069 UART: [idev] SUBJECT.KEYID = 7
1,174,494 UART: [idev] UDS.KEYID = 0
1,174,840 ready_for_fw is high
1,174,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,452 UART: [idev] Erasing UDS.KEYID = 0
1,200,190 UART: [idev] Sha1 KeyId Algorithm
1,209,044 UART: [idev] --
1,210,241 UART: [ldev] ++
1,210,409 UART: [ldev] CDI.KEYID = 6
1,210,773 UART: [ldev] SUBJECT.KEYID = 5
1,211,200 UART: [ldev] AUTHORITY.KEYID = 7
1,211,663 UART: [ldev] FE.KEYID = 1
1,216,965 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,593 UART: [ldev] --
1,281,903 UART: [fwproc] Wait for Commands...
1,282,646 UART: [fwproc] Recv command 0x46574c44
1,283,379 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,251 >>> mbox cmd response: success
2,776,496 UART: [afmc] ++
2,776,664 UART: [afmc] CDI.KEYID = 6
2,777,027 UART: [afmc] SUBJECT.KEYID = 7
2,777,453 UART: [afmc] AUTHORITY.KEYID = 5
2,813,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,657 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,386 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,269 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,988 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,991 UART: [afmc] --
2,856,929 UART: [cold-reset] --
2,858,031 UART: [state] Locking Datavault
2,859,186 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,790 UART: [state] Locking ICCM
2,860,310 UART: [exit] Launching FMC @ 0x40000130
2,865,639 UART:
2,865,655 UART: Running Caliptra FMC ...
2,866,063 UART:
2,866,206 UART: [state] CFI Enabled
2,876,959 UART: [fht] FMC Alias Private Key: 7
2,984,562 UART: [art] Extend RT PCRs Done
2,984,990 UART: [art] Lock RT PCRs Done
2,986,604 UART: [art] Populate DV Done
2,994,801 UART: [fht] FMC Alias Private Key: 7
2,995,759 UART: [art] Derive CDI
2,996,039 UART: [art] Store in in slot 0x4
3,081,548 UART: [art] Derive Key Pair
3,081,908 UART: [art] Store priv key in slot 0x5
3,094,908 UART: [art] Derive Key Pair - Done
3,109,857 UART: [art] Signing Cert with AUTHO
3,110,337 UART: RITY.KEYID = 7
3,125,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,670 UART: [art] PUB.X = 5FCAF71BE74DF70B75BC3AD59675485B367557E69ADD72B76E5028DDD39114D993C178E03D7FB9159F233E0C1A81355D
3,133,440 UART: [art] PUB.Y = 66C23F99F19F41BB8CD4CC815FCF21442D11CAE0601F00433DE957E239CCABB606BA1FC1E30A4AD1E612257DD627A9A9
3,140,378 UART: [art] SIG.R = 7B2F6D1ADA1D41F09168854CB8C3F104BD854B6CB5AA0F6C444CF9960DCE5023CA15DA8AD8AC0066061ABF7F7DEF4028
3,147,134 UART: [art] SIG.S = 8F9AC3DBFA07BFE2D87AD65FA3365FF4B6A7B5B319E42269C78F0BEA9A031693F8ED0F4E03B8DDD6AC4FFF4D9A41F332
3,171,180 UART: Caliptra RT
3,171,525 UART: [state] CFI Enabled
3,279,600 UART: [rt] RT listening for mailbox commands...
3,280,270 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,964 UART: [rt]cmd =0x4c4d5356, len=1672
3,850,691 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,999 ready_for_fw is high
1,055,999 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,025 >>> mbox cmd response: success
2,687,361 UART:
2,687,377 UART: Running Caliptra FMC ...
2,687,785 UART:
2,687,928 UART: [state] CFI Enabled
2,698,329 UART: [fht] FMC Alias Private Key: 7
2,806,166 UART: [art] Extend RT PCRs Done
2,806,594 UART: [art] Lock RT PCRs Done
2,808,276 UART: [art] Populate DV Done
2,816,517 UART: [fht] FMC Alias Private Key: 7
2,817,555 UART: [art] Derive CDI
2,817,835 UART: [art] Store in in slot 0x4
2,903,274 UART: [art] Derive Key Pair
2,903,634 UART: [art] Store priv key in slot 0x5
2,916,732 UART: [art] Derive Key Pair - Done
2,931,565 UART: [art] Signing Cert with AUTHO
2,932,045 UART: RITY.KEYID = 7
2,946,921 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,686 UART: [art] PUB.X = 46510AD639E2DBB4EFE65D7C92D43DCBD0102E3CC364CA6721A2DF68A4942E3EF4F6B2CB319F89C0E28723E04DFAD5B2
2,954,473 UART: [art] PUB.Y = 2828D0FC9EDB7C2EB34EE39596B790DEA6D212482AB231E980AD47D4A2AE7A5E3E080FC076023EEB6693F29BDDA4C6F0
2,961,432 UART: [art] SIG.R = 65F818633A4652F18CAEE9793083EB50FCC3C965B17D6506E094094B2FEB3942ECBB5BACDEA82304436413DCDE55B94F
2,968,203 UART: [art] SIG.S = 4628C2A50CD74BD37B186AD47D3528270065F711252988AFECC3AA932BA33CB5E71EA95D5276D09DFFC821421BB5D199
2,991,989 UART: Caliptra RT
2,992,334 UART: [state] CFI Enabled
3,100,005 UART: [rt] RT listening for mailbox commands...
3,100,675 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,337 UART: [rt]cmd =0x4c4d5356, len=1672
3,671,270 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
191,924 UART:
192,301 UART: Running Caliptra ROM ...
193,496 UART:
193,652 UART: [state] CFI Enabled
264,504 UART: [state] LifecycleState = Unprovisioned
266,495 UART: [state] DebugLocked = No
268,164 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,887 UART: [kat] SHA2-256
443,566 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,087 UART: [kat] ++
454,538 UART: [kat] sha1
466,091 UART: [kat] SHA2-256
468,747 UART: [kat] SHA2-384
473,315 UART: [kat] SHA2-512-ACC
475,691 UART: [kat] ECC-384
2,767,760 UART: [kat] HMAC-384Kdf
2,801,306 UART: [kat] LMS
3,991,643 UART: [kat] --
3,994,028 UART: [cold-reset] ++
3,995,895 UART: [fht] Storing FHT @ 0x50003400
4,007,848 UART: [idev] ++
4,008,457 UART: [idev] CDI.KEYID = 6
4,009,396 UART: [idev] SUBJECT.KEYID = 7
4,010,646 UART: [idev] UDS.KEYID = 0
4,011,705 ready_for_fw is high
4,011,932 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,407 UART: [idev] Erasing UDS.KEYID = 0
7,346,135 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,858 UART: [idev] --
7,370,827 UART: [ldev] ++
7,371,409 UART: [ldev] CDI.KEYID = 6
7,372,382 UART: [ldev] SUBJECT.KEYID = 5
7,373,543 UART: [ldev] AUTHORITY.KEYID = 7
7,374,826 UART: [ldev] FE.KEYID = 1
7,421,494 UART: [ldev] Erasing FE.KEYID = 1
10,755,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,375 UART: [ldev] --
13,137,806 UART: [fwproc] Waiting for Commands...
13,139,913 UART: [fwproc] Received command 0x46574c44
13,142,095 UART: [fwproc] Received Image of size 114124 bytes
17,204,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,782 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,661,834 >>> mbox cmd response: success
17,665,288 UART: [afmc] ++
17,665,884 UART: [afmc] CDI.KEYID = 6
17,666,773 UART: [afmc] SUBJECT.KEYID = 7
17,668,046 UART: [afmc] AUTHORITY.KEYID = 5
21,027,516 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,795 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,060 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,484 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,321 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,767 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,405 UART: [afmc] --
23,399,682 UART: [cold-reset] --
23,403,657 UART: [state] Locking Datavault
23,408,255 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,008 UART: [state] Locking ICCM
23,411,276 UART: [exit] Launching FMC @ 0x40000130
23,419,666 UART:
23,419,900 UART: Running Caliptra FMC ...
23,420,925 UART:
23,421,072 UART: [state] CFI Enabled
23,489,751 UART: [fht] FMC Alias Private Key: 7
25,827,970 UART: [art] Extend RT PCRs Done
25,829,192 UART: [art] Lock RT PCRs Done
25,830,959 UART: [art] Populate DV Done
25,836,534 UART: [fht] FMC Alias Private Key: 7
25,838,238 UART: [art] Derive CDI
25,839,053 UART: [art] Store in in slot 0x4
25,898,376 UART: [art] Derive Key Pair
25,899,417 UART: [art] Store priv key in slot 0x5
29,192,287 UART: [art] Derive Key Pair - Done
29,205,110 UART: [art] Signing Cert with AUTHO
29,206,447 UART: RITY.KEYID = 7
31,494,281 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,804 UART: [art] PUB.X = 11FF3E270157F958816274A53B2FC625E20FA3F4D38B6E1E3F00B874FE5CC69F482E8D1D910590B66565BEAF20414F8D
31,503,048 UART: [art] PUB.Y = 6ED5212EC001F0997574B6EF335F3EDC19808B4B6B4B20E56EF309BEDCB3405F6F3FA188B416C6C236DDB358A6089536
31,510,291 UART: [art] SIG.R = A800B56FDDA2877B15657BDDA5CFE29765FE357DCB03698F59F521A94D41C4B33DBDA9B1EBF8AFAF050EEE50B52C631B
31,517,699 UART: [art] SIG.S = A0E9A229061921CE0B684703C7DB9DEFF845D9BCEF8953F3DFFB487204228396BD5DEA57ECF5DDD4D00B970312E3E81B
32,822,592 UART: Caliptra RT
32,823,297 UART: [state] CFI Enabled
32,983,860 UART: [rt] RT listening for mailbox commands...
32,987,884 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,032,520 UART: [rt]cmd =0x4c4d5356, len=1672
33,447,055 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,805,222 ready_for_fw is high
3,805,838 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,884,420 >>> mbox cmd response: success
23,592,347 UART:
23,592,722 UART: Running Caliptra FMC ...
23,593,924 UART:
23,594,093 UART: [state] CFI Enabled
23,658,277 UART: [fht] FMC Alias Private Key: 7
25,995,985 UART: [art] Extend RT PCRs Done
25,997,290 UART: [art] Lock RT PCRs Done
25,998,764 UART: [art] Populate DV Done
26,004,461 UART: [fht] FMC Alias Private Key: 7
26,005,957 UART: [art] Derive CDI
26,006,723 UART: [art] Store in in slot 0x4
26,066,700 UART: [art] Derive Key Pair
26,067,752 UART: [art] Store priv key in slot 0x5
29,360,811 UART: [art] Derive Key Pair - Done
29,373,867 UART: [art] Signing Cert with AUTHO
29,375,214 UART: RITY.KEYID = 7
31,661,619 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,127 UART: [art] PUB.X = 5D089797455AEF746AC4262BCB7BF0CB9CFAA917537D8590EFD931A3FDB236F4DFEFCA25C968CF3B2A76CD580627700C
31,670,352 UART: [art] PUB.Y = AFC2BEA3C2205DAD89F06232C0650AC905817B68E049AD7071F58CAD0172EDC935D1EFDE37DEBFE8579E165A64C6D11C
31,677,623 UART: [art] SIG.R = 9E1DCBDEA805FD234681AFA47DABF712412AA8FCF088DA85F96A941F96BD9908FF20AFB2DA525A79EB86A54B58F7536A
31,684,991 UART: [art] SIG.S = D3E804EE3E3C59D2C74AF42CC17884F915C3A1D974C41C0CF738899AF6800530897ACBAFB4254CABDF1466AFAE7DD035
32,989,806 UART: Caliptra RT
32,990,506 UART: [state] CFI Enabled
33,150,154 UART: [rt] RT listening for mailbox commands...
33,154,154 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,198,499 UART: [rt]cmd =0x4c4d5356, len=1672
33,612,965 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,454 UART:
192,816 UART: Running Caliptra ROM ...
194,012 UART:
603,808 UART: [state] CFI Enabled
620,015 UART: [state] LifecycleState = Unprovisioned
621,982 UART: [state] DebugLocked = No
624,225 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,729 UART: [kat] SHA2-256
798,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,976 UART: [kat] ++
809,674 UART: [kat] sha1
819,917 UART: [kat] SHA2-256
822,638 UART: [kat] SHA2-384
829,832 UART: [kat] SHA2-512-ACC
832,195 UART: [kat] ECC-384
3,117,774 UART: [kat] HMAC-384Kdf
3,129,735 UART: [kat] LMS
4,319,847 UART: [kat] --
4,325,425 UART: [cold-reset] ++
4,327,434 UART: [fht] Storing FHT @ 0x50003400
4,339,645 UART: [idev] ++
4,340,266 UART: [idev] CDI.KEYID = 6
4,341,335 UART: [idev] SUBJECT.KEYID = 7
4,342,436 UART: [idev] UDS.KEYID = 0
4,343,493 ready_for_fw is high
4,343,715 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,983 UART: [idev] Erasing UDS.KEYID = 0
7,629,162 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,642 UART: [idev] --
7,655,817 UART: [ldev] ++
7,656,384 UART: [ldev] CDI.KEYID = 6
7,657,321 UART: [ldev] SUBJECT.KEYID = 5
7,658,579 UART: [ldev] AUTHORITY.KEYID = 7
7,659,723 UART: [ldev] FE.KEYID = 1
7,671,839 UART: [ldev] Erasing FE.KEYID = 1
10,960,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,834 UART: [ldev] --
13,317,388 UART: [fwproc] Waiting for Commands...
13,320,443 UART: [fwproc] Received command 0x46574c44
13,322,669 UART: [fwproc] Received Image of size 114124 bytes
17,370,705 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,570 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,424 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,741 >>> mbox cmd response: success
17,842,203 UART: [afmc] ++
17,842,801 UART: [afmc] CDI.KEYID = 6
17,843,707 UART: [afmc] SUBJECT.KEYID = 7
17,844,972 UART: [afmc] AUTHORITY.KEYID = 5
21,155,091 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,567 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,960 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,787 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,195 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,020 UART: [afmc] --
23,518,533 UART: [cold-reset] --
23,521,746 UART: [state] Locking Datavault
23,526,990 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,742 UART: [state] Locking ICCM
23,531,112 UART: [exit] Launching FMC @ 0x40000130
23,539,528 UART:
23,539,769 UART: Running Caliptra FMC ...
23,540,872 UART:
23,541,026 UART: [state] CFI Enabled
23,549,174 UART: [fht] FMC Alias Private Key: 7
25,879,571 UART: [art] Extend RT PCRs Done
25,880,788 UART: [art] Lock RT PCRs Done
25,882,404 UART: [art] Populate DV Done
25,887,867 UART: [fht] FMC Alias Private Key: 7
25,889,521 UART: [art] Derive CDI
25,890,333 UART: [art] Store in in slot 0x4
25,933,197 UART: [art] Derive Key Pair
25,934,233 UART: [art] Store priv key in slot 0x5
29,176,416 UART: [art] Derive Key Pair - Done
29,189,414 UART: [art] Signing Cert with AUTHO
29,190,716 UART: RITY.KEYID = 7
31,470,361 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,863 UART: [art] PUB.X = 91D1AE45CEF17094EDB5D4BEFD7180CE5414067AE61A1B4FC875313E3692A43D9811750F04AAC40F08B1EEE01A469886
31,479,141 UART: [art] PUB.Y = 9F16DE40D3C59E0E849014AE49B275CFC3417B2923665EB3709AF365F1138792EC4E6DDCA518A0659567CBCDC8309E96
31,486,354 UART: [art] SIG.R = 65775B0459EFB29DA7C1DE4A5C98F294A06F629F35A090275482199E8CFC91D839FC10008742D353EC2BCFF23E68578B
31,493,721 UART: [art] SIG.S = BA1575A21B4D283107E43A9B615D2459E620C927DBBFD84011430857822660CE1AF230D78FE5D52F6BCAA4E1FAFEA25A
32,798,542 UART: Caliptra RT
32,799,252 UART: [state] CFI Enabled
32,916,542 UART: [rt] RT listening for mailbox commands...
32,920,506 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,964,956 UART: [rt]cmd =0x4c4d5356, len=1672
33,379,567 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,490 writing to cptra_bootfsm_go
4,125,647 ready_for_fw is high
4,126,038 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,063,955 >>> mbox cmd response: success
23,701,597 UART:
23,701,989 UART: Running Caliptra FMC ...
23,703,179 UART:
23,703,343 UART: [state] CFI Enabled
23,711,403 UART: [fht] FMC Alias Private Key: 7
26,042,728 UART: [art] Extend RT PCRs Done
26,043,961 UART: [art] Lock RT PCRs Done
26,045,590 UART: [art] Populate DV Done
26,050,792 UART: [fht] FMC Alias Private Key: 7
26,052,504 UART: [art] Derive CDI
26,053,242 UART: [art] Store in in slot 0x4
26,095,897 UART: [art] Derive Key Pair
26,096,942 UART: [art] Store priv key in slot 0x5
29,339,894 UART: [art] Derive Key Pair - Done
29,353,017 UART: [art] Signing Cert with AUTHO
29,354,331 UART: RITY.KEYID = 7
31,634,337 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,864 UART: [art] PUB.X = 23008C38227D1F572588939AA7C62085CFD4817F6859C033F3459FC6654B7D070F2622518D4FA79699DB4E0B92BF9954
31,643,040 UART: [art] PUB.Y = 0F84B7D6E2C360226A68BA582124475318D61FF5B9D19C8E333A5D58DBF39AA0CEF10BB28E798EA4CEF20C8D4A3F9B5D
31,650,281 UART: [art] SIG.R = 28928F4C616D66F6EA2AFF9A2F2785B30525FB85CBFD31AAA4EB2715EBDA99CBD359455F4491D04E212C724654C7AE18
31,657,717 UART: [art] SIG.S = 13864A901CEB24BB3A7E02A89D8557894419F6B31C904CC4EC53B112801B2EB76A08CCB37F5B0D7D0AAD1CE183F7DEE1
32,962,394 UART: Caliptra RT
32,963,098 UART: [state] CFI Enabled
33,080,595 UART: [rt] RT listening for mailbox commands...
33,084,538 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,128,916 UART: [rt]cmd =0x4c4d5356, len=1672
33,543,504 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,150 UART:
192,540 UART: Running Caliptra ROM ...
193,675 UART:
193,823 UART: [state] CFI Enabled
265,719 UART: [state] LifecycleState = Unprovisioned
267,635 UART: [state] DebugLocked = No
270,306 UART: [state] WD Timer not started. Device not locked for debugging
273,691 UART: [kat] SHA2-256
452,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,369 UART: [kat] ++
464,900 UART: [kat] sha1
475,065 UART: [kat] SHA2-256
478,148 UART: [kat] SHA2-384
483,922 UART: [kat] SHA2-512-ACC
486,907 UART: [kat] ECC-384
2,938,557 UART: [kat] HMAC-384Kdf
2,952,726 UART: [kat] LMS
3,482,163 UART: [kat] --
3,487,907 UART: [cold-reset] ++
3,489,731 UART: [fht] FHT @ 0x50003400
3,500,008 UART: [idev] ++
3,500,580 UART: [idev] CDI.KEYID = 6
3,501,612 UART: [idev] SUBJECT.KEYID = 7
3,502,719 UART: [idev] UDS.KEYID = 0
3,503,659 ready_for_fw is high
3,503,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,647,957 UART: [idev] Erasing UDS.KEYID = 0
6,006,713 UART: [idev] Sha1 KeyId Algorithm
6,029,405 UART: [idev] --
6,032,589 UART: [ldev] ++
6,033,160 UART: [ldev] CDI.KEYID = 6
6,034,091 UART: [ldev] SUBJECT.KEYID = 5
6,035,255 UART: [ldev] AUTHORITY.KEYID = 7
6,036,492 UART: [ldev] FE.KEYID = 1
6,082,422 UART: [ldev] Erasing FE.KEYID = 1
8,583,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,291 UART: [ldev] --
10,394,374 UART: [fwproc] Wait for Commands...
10,397,333 UART: [fwproc] Recv command 0x46574c44
10,399,424 UART: [fwproc] Recv'd Img size: 114448 bytes
13,810,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,880,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,949,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,267,487 >>> mbox cmd response: success
14,271,023 UART: [afmc] ++
14,271,625 UART: [afmc] CDI.KEYID = 6
14,272,537 UART: [afmc] SUBJECT.KEYID = 7
14,273,701 UART: [afmc] AUTHORITY.KEYID = 5
16,811,589 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,991 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,785 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,776 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,401 UART: [afmc] --
18,609,836 UART: [cold-reset] --
18,614,563 UART: [state] Locking Datavault
18,620,345 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,039 UART: [state] Locking ICCM
18,624,026 UART: [exit] Launching FMC @ 0x40000130
18,632,420 UART:
18,632,658 UART: Running Caliptra FMC ...
18,633,685 UART:
18,633,832 UART: [state] CFI Enabled
18,692,655 UART: [fht] FMC Alias Private Key: 7
20,456,759 UART: [art] Extend RT PCRs Done
20,457,981 UART: [art] Lock RT PCRs Done
20,459,665 UART: [art] Populate DV Done
20,464,858 UART: [fht] FMC Alias Private Key: 7
20,466,388 UART: [art] Derive CDI
20,467,123 UART: [art] Store in in slot 0x4
20,525,560 UART: [art] Derive Key Pair
20,526,597 UART: [art] Store priv key in slot 0x5
22,989,017 UART: [art] Derive Key Pair - Done
23,001,585 UART: [art] Signing Cert with AUTHO
23,002,917 UART: RITY.KEYID = 7
24,715,435 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,915 UART: [art] PUB.X = 2041B0725DA0B39E344149B7D2BC8CB80568B2F4BA5467D78034A30E2380B4417EFED2E24E6085B891DA82DE626BB533
24,724,166 UART: [art] PUB.Y = DEBA33720C543C3901B15C0C7A25E7039001F8608C5FB119E03F60AD10326CC71250CBE54BD5594B5FD9EC9AF2A7D21F
24,731,455 UART: [art] SIG.R = 0D422447DF292731071DCF505A6FEC24DBAA3815C606802F0F0923765ACBF2EE9EBEDBD877DD74ADD7DFA87BBB200990
24,738,852 UART: [art] SIG.S = 23D769FF29E8F74938BC405D9BA5086CF3E113CF502580C2FB963E12F5436FC9DD1EE75BFBCA462FF16EE647BBB19E41
25,718,213 UART: Caliptra RT
25,718,925 UART: [state] CFI Enabled
25,883,823 UART: [rt] RT listening for mailbox commands...
25,887,922 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,933,039 UART: [rt]cmd =0x4c4d5356, len=1672
26,134,970 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,382,606 ready_for_fw is high
3,383,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,049,022 >>> mbox cmd response: success
18,340,519 UART:
18,340,935 UART: Running Caliptra FMC ...
18,342,076 UART:
18,342,238 UART: [state] CFI Enabled
18,409,805 UART: [fht] FMC Alias Private Key: 7
20,174,503 UART: [art] Extend RT PCRs Done
20,175,727 UART: [art] Lock RT PCRs Done
20,177,496 UART: [art] Populate DV Done
20,182,845 UART: [fht] FMC Alias Private Key: 7
20,184,339 UART: [art] Derive CDI
20,185,076 UART: [art] Store in in slot 0x4
20,242,658 UART: [art] Derive Key Pair
20,243,655 UART: [art] Store priv key in slot 0x5
22,706,600 UART: [art] Derive Key Pair - Done
22,719,437 UART: [art] Signing Cert with AUTHO
22,720,737 UART: RITY.KEYID = 7
24,432,756 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,277 UART: [art] PUB.X = FE1A2A8FCB9E51D06826318A7B15EB73CF69859F93165144E20CAC50E3025AB4936883113EDB68A1028A36E664C97F00
24,441,521 UART: [art] PUB.Y = 8EBF6E721CDEA834282A9A7170139B396587AFD2521064A2B657BC3C8C23B56675D90F7F7240E5F54C7A10E7636FAFA1
24,448,782 UART: [art] SIG.R = 57B23B7C9A164D91751189AECA4BEA869182693F461983E6413087F85BF7D989F034B9E42324E47BDC9427BD67DAEFDE
24,456,127 UART: [art] SIG.S = B16079F79C9A680CF65D546FE08C08FB9BFBA8CE8D864BF3955C13E40979B887D6AC012B3180F9B230850E81BA362DD1
25,434,827 UART: Caliptra RT
25,435,526 UART: [state] CFI Enabled
25,600,921 UART: [rt] RT listening for mailbox commands...
25,604,851 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,649,977 UART: [rt]cmd =0x4c4d5356, len=1672
25,851,717 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,727 writing to cptra_bootfsm_go
193,836 UART:
194,201 UART: Running Caliptra ROM ...
195,391 UART:
605,108 UART: [state] CFI Enabled
620,036 UART: [state] LifecycleState = Unprovisioned
621,918 UART: [state] DebugLocked = No
624,567 UART: [state] WD Timer not started. Device not locked for debugging
629,012 UART: [kat] SHA2-256
808,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,677 UART: [kat] ++
820,192 UART: [kat] sha1
831,432 UART: [kat] SHA2-256
834,436 UART: [kat] SHA2-384
841,628 UART: [kat] SHA2-512-ACC
844,551 UART: [kat] ECC-384
3,285,304 UART: [kat] HMAC-384Kdf
3,297,966 UART: [kat] LMS
3,827,459 UART: [kat] --
3,831,378 UART: [cold-reset] ++
3,832,378 UART: [fht] FHT @ 0x50003400
3,843,793 UART: [idev] ++
3,844,389 UART: [idev] CDI.KEYID = 6
3,845,296 UART: [idev] SUBJECT.KEYID = 7
3,846,465 UART: [idev] UDS.KEYID = 0
3,847,386 ready_for_fw is high
3,847,576 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,190 UART: [idev] Erasing UDS.KEYID = 0
6,314,925 UART: [idev] Sha1 KeyId Algorithm
6,338,649 UART: [idev] --
6,342,785 UART: [ldev] ++
6,343,355 UART: [ldev] CDI.KEYID = 6
6,344,264 UART: [ldev] SUBJECT.KEYID = 5
6,345,469 UART: [ldev] AUTHORITY.KEYID = 7
6,346,690 UART: [ldev] FE.KEYID = 1
6,357,377 UART: [ldev] Erasing FE.KEYID = 1
8,832,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,003 UART: [ldev] --
10,624,260 UART: [fwproc] Wait for Commands...
10,626,190 UART: [fwproc] Recv command 0x46574c44
10,628,294 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,494,776 >>> mbox cmd response: success
14,499,465 UART: [afmc] ++
14,500,063 UART: [afmc] CDI.KEYID = 6
14,500,969 UART: [afmc] SUBJECT.KEYID = 7
14,502,119 UART: [afmc] AUTHORITY.KEYID = 5
17,004,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,184 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,190 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,059 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,207 UART: [afmc] --
18,800,782 UART: [cold-reset] --
18,805,998 UART: [state] Locking Datavault
18,812,908 UART: [state] Locking PCR0, PCR1 and PCR31
18,814,556 UART: [state] Locking ICCM
18,817,020 UART: [exit] Launching FMC @ 0x40000130
18,825,408 UART:
18,825,641 UART: Running Caliptra FMC ...
18,826,735 UART:
18,826,893 UART: [state] CFI Enabled
18,835,254 UART: [fht] FMC Alias Private Key: 7
20,592,085 UART: [art] Extend RT PCRs Done
20,593,286 UART: [art] Lock RT PCRs Done
20,595,010 UART: [art] Populate DV Done
20,600,305 UART: [fht] FMC Alias Private Key: 7
20,601,943 UART: [art] Derive CDI
20,602,745 UART: [art] Store in in slot 0x4
20,645,433 UART: [art] Derive Key Pair
20,646,489 UART: [art] Store priv key in slot 0x5
23,072,991 UART: [art] Derive Key Pair - Done
23,086,154 UART: [art] Signing Cert with AUTHO
23,087,458 UART: RITY.KEYID = 7
24,792,892 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,402 UART: [art] PUB.X = F5FD7B602E6C39F721BD57491595AD8192038A443387E48BDC51906FE4CF9FF01EA5A52071A6860E0BCA9FF29FEB83A3
24,801,687 UART: [art] PUB.Y = 31D672AEE60F20A02F53B41660246CB8A45E4C282E9A0AFEA2D7D9228B882D81A43BF9D3B4B25BFE9B30D32EC0FE60AE
24,808,996 UART: [art] SIG.R = EA8670F56DF29DBDF3013F921C7D6F4A118751F4E735126238F00405E9D36DFCE0F383C535569C549BA4331814C82246
24,816,338 UART: [art] SIG.S = 5AB7BFFF017FD0CE238B50EA7C9DB97C269A5332E9F93C7F168F85A1767A0EBB773349B92AAD92CF80037B4DB7065ADD
25,795,608 UART: Caliptra RT
25,796,307 UART: [state] CFI Enabled
25,913,370 UART: [rt] RT listening for mailbox commands...
25,917,361 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,961,666 UART: [rt]cmd =0x4c4d5356, len=1672
26,163,531 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,697,153 ready_for_fw is high
3,697,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,755 >>> mbox cmd response: success
18,523,470 UART:
18,523,890 UART: Running Caliptra FMC ...
18,524,998 UART:
18,525,141 UART: [state] CFI Enabled
18,533,214 UART: [fht] FMC Alias Private Key: 7
20,289,409 UART: [art] Extend RT PCRs Done
20,290,629 UART: [art] Lock RT PCRs Done
20,292,169 UART: [art] Populate DV Done
20,297,526 UART: [fht] FMC Alias Private Key: 7
20,299,169 UART: [art] Derive CDI
20,299,976 UART: [art] Store in in slot 0x4
20,342,564 UART: [art] Derive Key Pair
20,343,595 UART: [art] Store priv key in slot 0x5
22,770,903 UART: [art] Derive Key Pair - Done
22,784,223 UART: [art] Signing Cert with AUTHO
22,785,705 UART: RITY.KEYID = 7
24,490,851 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,365 UART: [art] PUB.X = B3A7544BF2D53483E2E88498D80AD0D7307AB52E6B565D0F7F44F9383B1855C51DE5119840A080404BF033AB6BE1B8D2
24,499,629 UART: [art] PUB.Y = 49BDB4C7301B39DE232EEF62B9BC803C4802D633BB0107A0358F99E10C3A3BA729570D80EBE6859C2C232B9AD5DD01C0
24,506,872 UART: [art] SIG.R = D611D9EF29C5F0C0D76CC041CD345B7DDEC8DB6263BA2D18177382006E85365B53224D0C5DBBFCD71AC0F3C9AA611EE8
24,514,274 UART: [art] SIG.S = 3C3E8DA1067073A9B50402E14346230A093DB06C113B8DCD43EB79135511A0074D6FAE5AEFC09849A7B6132365253D4B
25,493,036 UART: Caliptra RT
25,493,737 UART: [state] CFI Enabled
25,611,462 UART: [rt] RT listening for mailbox commands...
25,615,444 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,659,892 UART: [rt]cmd =0x4c4d5356, len=1672
25,861,607 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,439,097 ready_for_fw is high
3,439,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,741,844 >>> mbox cmd response: success
19,028,160 UART:
19,028,570 UART: Running Caliptra FMC ...
19,029,679 UART:
19,029,839 UART: [state] CFI Enabled
19,093,610 UART: [fht] FMC Alias Private Key: 7
20,856,945 UART: [art] Extend RT PCRs Done
20,858,181 UART: [art] Lock RT PCRs Done
20,859,724 UART: [art] Populate DV Done
20,865,199 UART: [fht] FMC Alias Private Key: 7
20,866,750 UART: [art] Derive CDI
20,867,568 UART: [art] Store in in slot 0x4
20,926,784 UART: [art] Derive Key Pair
20,927,828 UART: [art] Store priv key in slot 0x5
23,390,922 UART: [art] Derive Key Pair - Done
23,403,865 UART: [art] Signing Cert with AUTHO
23,405,170 UART: RITY.KEYID = 7
25,116,267 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,768 UART: [art] PUB.X = 1C36497B9708DDA153B5B38709678214D9B887E4D425ACA86D95E317DC5F2052284793A83C1513E83929EE2FDAF8A1CB
25,125,075 UART: [art] PUB.Y = 4E6FFF3857F5C5A8A93C10565A2B28A5B6E98A7CF903E91C3C3B87F744949295661AA96646CFD199AE3155ECDFA05E9D
25,132,333 UART: [art] SIG.R = 327749D8AB04B8969183F65C7C907D4E44D0BDE5C115B9E30AB34F718B66FCEA9FE95C979F642B99D16E88D6719EF9A7
25,139,717 UART: [art] SIG.S = B0D88AE878712EE4DF54D60EF27FF96138FE06B67A207E7D9D6E555AF1A20F3040A791277B6AEDD55AA0AAEAABB09374
26,119,015 UART: Caliptra RT
26,119,726 UART: [state] CFI Enabled
26,284,926 UART: [rt] RT listening for mailbox commands...
26,288,901 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,333,891 UART: [rt]cmd =0x4c4d5356, len=1672
26,535,678 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,759,336 ready_for_fw is high
3,759,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,972,969 >>> mbox cmd response: success
19,226,178 UART:
19,226,559 UART: Running Caliptra FMC ...
19,227,746 UART:
19,227,903 UART: [state] CFI Enabled
19,235,570 UART: [fht] FMC Alias Private Key: 7
20,991,879 UART: [art] Extend RT PCRs Done
20,993,103 UART: [art] Lock RT PCRs Done
20,994,912 UART: [art] Populate DV Done
21,000,235 UART: [fht] FMC Alias Private Key: 7
21,001,730 UART: [art] Derive CDI
21,002,649 UART: [art] Store in in slot 0x4
21,044,991 UART: [art] Derive Key Pair
21,046,035 UART: [art] Store priv key in slot 0x5
23,472,835 UART: [art] Derive Key Pair - Done
23,485,777 UART: [art] Signing Cert with AUTHO
23,487,072 UART: RITY.KEYID = 7
25,192,352 UART: [art] Erasing AUTHORITY.KEYID = 7
25,193,862 UART: [art] PUB.X = A5F5513703BCBCB15AB50241699041BB01DC4822CB8A4ED7D5DC5646B6AE177C858689FF5421F033123586EEAB7EC302
25,201,130 UART: [art] PUB.Y = 49211B0BF0E912C4B05EBE422CFFB160E3831D0E999A0B92A9D0B65B13B59A7FAF42181CC723C4BF586AEB30710DCE9C
25,208,450 UART: [art] SIG.R = 695BDBE5563B59D92C1645C353121F46BB1E48E13AEF7AE41F40A31F622CF149DD428F79FA0014FC8A3E549ECEF899CC
25,215,817 UART: [art] SIG.S = 1F777E00D79F2F6EB849E50D6FB5C98133C51C36145DEC7A16726028D75C582932437A99D4631A4DCCA2D07C50725726
26,194,963 UART: Caliptra RT
26,195,670 UART: [state] CFI Enabled
26,314,323 UART: [rt] RT listening for mailbox commands...
26,318,238 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,362,472 UART: [rt]cmd =0x4c4d5356, len=1672
26,564,491 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,827 UART: [kat] SHA2-256
881,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,873 UART: [kat] ++
886,025 UART: [kat] sha1
890,421 UART: [kat] SHA2-256
892,359 UART: [kat] SHA2-384
895,134 UART: [kat] SHA2-512-ACC
897,035 UART: [kat] ECC-384
902,390 UART: [kat] HMAC-384Kdf
906,940 UART: [kat] LMS
1,475,136 UART: [kat] --
1,476,177 UART: [cold-reset] ++
1,476,659 UART: [fht] Storing FHT @ 0x50003400
1,479,332 UART: [idev] ++
1,479,500 UART: [idev] CDI.KEYID = 6
1,479,860 UART: [idev] SUBJECT.KEYID = 7
1,480,284 UART: [idev] UDS.KEYID = 0
1,480,629 ready_for_fw is high
1,480,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,216 UART: [idev] Erasing UDS.KEYID = 0
1,504,680 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,384 UART: [idev] --
1,514,387 UART: [ldev] ++
1,514,555 UART: [ldev] CDI.KEYID = 6
1,514,918 UART: [ldev] SUBJECT.KEYID = 5
1,515,344 UART: [ldev] AUTHORITY.KEYID = 7
1,515,807 UART: [ldev] FE.KEYID = 1
1,521,117 UART: [ldev] Erasing FE.KEYID = 1
1,546,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,746 UART: [ldev] --
1,586,017 UART: [fwproc] Waiting for Commands...
1,586,640 UART: [fwproc] Received command 0x46574c44
1,587,431 UART: [fwproc] Received Image of size 114448 bytes
2,887,888 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,186 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,641 >>> mbox cmd response: success
3,081,683 UART: [afmc] ++
3,081,851 UART: [afmc] CDI.KEYID = 6
3,082,213 UART: [afmc] SUBJECT.KEYID = 7
3,082,638 UART: [afmc] AUTHORITY.KEYID = 5
3,117,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,989 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,769 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,497 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,382 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,072 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,017 UART: [afmc] --
3,160,985 UART: [cold-reset] --
3,161,845 UART: [state] Locking Datavault
3,163,122 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,726 UART: [state] Locking ICCM
3,164,258 UART: [exit] Launching FMC @ 0x40000130
3,169,587 UART:
3,169,603 UART: Running Caliptra FMC ...
3,170,011 UART:
3,170,065 UART: [state] CFI Enabled
3,180,174 UART: [fht] FMC Alias Private Key: 7
3,288,993 UART: [art] Extend RT PCRs Done
3,289,421 UART: [art] Lock RT PCRs Done
3,290,873 UART: [art] Populate DV Done
3,299,112 UART: [fht] FMC Alias Private Key: 7
3,300,080 UART: [art] Derive CDI
3,300,360 UART: [art] Store in in slot 0x4
3,386,107 UART: [art] Derive Key Pair
3,386,467 UART: [art] Store priv key in slot 0x5
3,399,683 UART: [art] Derive Key Pair - Done
3,414,599 UART: [art] Signing Cert with AUTHO
3,415,079 UART: RITY.KEYID = 7
3,430,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,952 UART: [art] PUB.X = 6E9CA4382A3CBB252338F13D9FAEE9A8AFED2F55E7DD0D07E8C014D7D681F91EFF6EDADAE7D13CD04E1636E31C143877
3,437,740 UART: [art] PUB.Y = 653775D57B3B06CC28DE9EC58CC590F71A698C0A4C6ACAD1EF3B4D25B0694494A6B129CC62596A2E992A7D5AA164959A
3,444,694 UART: [art] SIG.R = AD3B591E1207BD048B74E0D4E26236E39C85212D3A5354C5788488E07EE27D8706EA3AC1858FC65FF4FD10DA5435D2C1
3,451,459 UART: [art] SIG.S = 457A7013035BB1692BC4CFB9563E8764516C6A0680A3359D853073EC8AACE46BCFC38AEDE74F1F0575C3B8186A4E1D58
3,474,863 UART: Caliptra RT
3,475,116 UART: [state] CFI Enabled
3,583,033 UART: [rt] RT listening for mailbox commands...
3,583,703 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,361 UART: [rt]cmd =0x4c4d5356, len=1672
3,876,888 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,569 ready_for_fw is high
1,362,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,203 >>> mbox cmd response: success
2,990,287 UART:
2,990,303 UART: Running Caliptra FMC ...
2,990,711 UART:
2,990,765 UART: [state] CFI Enabled
3,001,556 UART: [fht] FMC Alias Private Key: 7
3,109,817 UART: [art] Extend RT PCRs Done
3,110,245 UART: [art] Lock RT PCRs Done
3,111,587 UART: [art] Populate DV Done
3,119,946 UART: [fht] FMC Alias Private Key: 7
3,121,088 UART: [art] Derive CDI
3,121,368 UART: [art] Store in in slot 0x4
3,206,579 UART: [art] Derive Key Pair
3,206,939 UART: [art] Store priv key in slot 0x5
3,219,975 UART: [art] Derive Key Pair - Done
3,234,820 UART: [art] Signing Cert with AUTHO
3,235,300 UART: RITY.KEYID = 7
3,250,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,371 UART: [art] PUB.X = 296513C128A3F45813F83D48C45A22BCD31D6DD3298761033B28788C78C39DB423CD04884474AE92C13099E0D8F0C365
3,258,127 UART: [art] PUB.Y = 6446C67A729F8E8C850AD814D6B118D729ED1BEBF2E6172D8B63EFBE34ECBFEA27B40040888357748A34A8C9F0D8216B
3,265,062 UART: [art] SIG.R = 5F911572148B92A4D11818E7B88B854CC65C540F101E805D6539EE81C3C57AEEB708CCABEDCC943BAFA5E9BE154E83DE
3,271,842 UART: [art] SIG.S = 5A7251A54AA2789E4AFA762D3204BD8034521604767CD0E6D54DCDC30A5260A485DF679D3F9873DF77DD00EB559E2896
3,295,592 UART: Caliptra RT
3,295,845 UART: [state] CFI Enabled
3,405,393 UART: [rt] RT listening for mailbox commands...
3,406,063 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,917 UART: [rt]cmd =0x4c4d5356, len=1672
3,699,252 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,600 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,076 UART: [kat] SHA2-256
882,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,122 UART: [kat] ++
886,274 UART: [kat] sha1
890,490 UART: [kat] SHA2-256
892,428 UART: [kat] SHA2-384
895,091 UART: [kat] SHA2-512-ACC
896,992 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,303 UART: [kat] LMS
1,475,499 UART: [kat] --
1,476,386 UART: [cold-reset] ++
1,476,954 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 ready_for_fw is high
1,481,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,749 UART: [idev] Erasing UDS.KEYID = 0
1,505,713 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,351 UART: [idev] --
1,515,254 UART: [ldev] ++
1,515,422 UART: [ldev] CDI.KEYID = 6
1,515,785 UART: [ldev] SUBJECT.KEYID = 5
1,516,211 UART: [ldev] AUTHORITY.KEYID = 7
1,516,674 UART: [ldev] FE.KEYID = 1
1,521,946 UART: [ldev] Erasing FE.KEYID = 1
1,547,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,919 UART: [ldev] --
1,586,240 UART: [fwproc] Waiting for Commands...
1,587,033 UART: [fwproc] Received command 0x46574c44
1,587,824 UART: [fwproc] Received Image of size 114448 bytes
2,887,965 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,073 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,380 >>> mbox cmd response: success
3,082,504 UART: [afmc] ++
3,082,672 UART: [afmc] CDI.KEYID = 6
3,083,034 UART: [afmc] SUBJECT.KEYID = 7
3,083,459 UART: [afmc] AUTHORITY.KEYID = 5
3,118,342 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,532 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,040 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,925 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,615 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,578 UART: [afmc] --
3,161,536 UART: [cold-reset] --
3,162,238 UART: [state] Locking Datavault
3,163,405 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,009 UART: [state] Locking ICCM
3,164,495 UART: [exit] Launching FMC @ 0x40000130
3,169,824 UART:
3,169,840 UART: Running Caliptra FMC ...
3,170,248 UART:
3,170,391 UART: [state] CFI Enabled
3,181,222 UART: [fht] FMC Alias Private Key: 7
3,289,483 UART: [art] Extend RT PCRs Done
3,289,911 UART: [art] Lock RT PCRs Done
3,291,343 UART: [art] Populate DV Done
3,299,560 UART: [fht] FMC Alias Private Key: 7
3,300,646 UART: [art] Derive CDI
3,300,926 UART: [art] Store in in slot 0x4
3,386,647 UART: [art] Derive Key Pair
3,387,007 UART: [art] Store priv key in slot 0x5
3,400,221 UART: [art] Derive Key Pair - Done
3,414,927 UART: [art] Signing Cert with AUTHO
3,415,407 UART: RITY.KEYID = 7
3,431,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,854 UART: [art] PUB.X = 45C92DE9DD5345DA91BC03CC185E8A48D3DADA83825E5F40BDC29E4F162EEC635195DE656D3DE614004AF6CECD8F7F29
3,438,619 UART: [art] PUB.Y = 03963B557D798640B5FA6C8353D8B4CE211D1F809C0AAB279F8668B49D6CBC7D012B0DD3615D07A5BB5B4B5D566A3188
3,445,560 UART: [art] SIG.R = E055E714552664B26D0D3704FA589702AF43D3687E1C9E47BF7E7D5A1248C0CE6412FDB78162C835A8E5D1F379254F89
3,452,319 UART: [art] SIG.S = 8786867FD0E50334276A3A82C48B07A5599F98247C13BBF941473B640BD6AA4ED905AECE40A245369D9784A284477FC9
3,476,140 UART: Caliptra RT
3,476,485 UART: [state] CFI Enabled
3,584,157 UART: [rt] RT listening for mailbox commands...
3,584,827 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,525 UART: [rt]cmd =0x4c4d5356, len=1672
3,877,848 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,468 ready_for_fw is high
1,363,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,712 >>> mbox cmd response: success
2,991,534 UART:
2,991,550 UART: Running Caliptra FMC ...
2,991,958 UART:
2,992,101 UART: [state] CFI Enabled
3,002,786 UART: [fht] FMC Alias Private Key: 7
3,111,059 UART: [art] Extend RT PCRs Done
3,111,487 UART: [art] Lock RT PCRs Done
3,112,919 UART: [art] Populate DV Done
3,121,310 UART: [fht] FMC Alias Private Key: 7
3,122,424 UART: [art] Derive CDI
3,122,704 UART: [art] Store in in slot 0x4
3,208,561 UART: [art] Derive Key Pair
3,208,921 UART: [art] Store priv key in slot 0x5
3,222,789 UART: [art] Derive Key Pair - Done
3,237,636 UART: [art] Signing Cert with AUTHO
3,238,116 UART: RITY.KEYID = 7
3,253,454 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,219 UART: [art] PUB.X = F1AF05D68400EF5911682FC3F4360768BBB3D85127B32220B467AC484484B512BC9C37B0FCD4B70D444E13974A52C6EE
3,260,960 UART: [art] PUB.Y = F47F17179BDFC674254B80337B4E70855EDC27CAB1AB47847D28C10490E4E54427E1508D48EDA3168D8D4443DD43FF71
3,267,909 UART: [art] SIG.R = 6C72005BC3F878D0CF66CB474784EEE951FAF4A221AF3F0019FEB693BBC1AAFE1F3D8CE6F4BBE2691242D5066BE160ED
3,274,654 UART: [art] SIG.S = 2B64A7D97C304A8704803B9C733FDDC7AD6520BAB34D3D284F4F633AA532910E86B6FAB904FECF0C3B367A047C091A5D
3,298,917 UART: Caliptra RT
3,299,262 UART: [state] CFI Enabled
3,407,058 UART: [rt] RT listening for mailbox commands...
3,407,728 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,010 UART: [rt]cmd =0x4c4d5356, len=1672
3,700,377 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
893,586 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,711 UART: [kat] ++
897,863 UART: [kat] sha1
902,131 UART: [kat] SHA2-256
904,071 UART: [kat] SHA2-384
906,782 UART: [kat] SHA2-512-ACC
908,683 UART: [kat] ECC-384
917,686 UART: [kat] HMAC-384Kdf
922,184 UART: [kat] LMS
1,170,512 UART: [kat] --
1,171,299 UART: [cold-reset] ++
1,171,825 UART: [fht] FHT @ 0x50003400
1,174,462 UART: [idev] ++
1,174,630 UART: [idev] CDI.KEYID = 6
1,174,990 UART: [idev] SUBJECT.KEYID = 7
1,175,414 UART: [idev] UDS.KEYID = 0
1,175,759 ready_for_fw is high
1,175,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,662 UART: [idev] Erasing UDS.KEYID = 0
1,200,623 UART: [idev] Sha1 KeyId Algorithm
1,208,865 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,417 UART: [ldev] Erasing FE.KEYID = 1
1,242,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,337 UART: [ldev] --
1,281,610 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,914 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,177 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,452 >>> mbox cmd response: success
2,776,574 UART: [afmc] ++
2,776,742 UART: [afmc] CDI.KEYID = 6
2,777,104 UART: [afmc] SUBJECT.KEYID = 7
2,777,529 UART: [afmc] AUTHORITY.KEYID = 5
2,813,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,513 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,126 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,845 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,735 UART: [afmc] --
2,856,679 UART: [cold-reset] --
2,857,619 UART: [state] Locking Datavault
2,858,594 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,198 UART: [state] Locking ICCM
2,859,722 UART: [exit] Launching FMC @ 0x40000130
2,865,051 UART:
2,865,067 UART: Running Caliptra FMC ...
2,865,475 UART:
2,865,529 UART: [state] CFI Enabled
2,876,408 UART: [fht] FMC Alias Private Key: 7
2,984,081 UART: [art] Extend RT PCRs Done
2,984,509 UART: [art] Lock RT PCRs Done
2,986,093 UART: [art] Populate DV Done
2,994,360 UART: [fht] FMC Alias Private Key: 7
2,995,362 UART: [art] Derive CDI
2,995,642 UART: [art] Store in in slot 0x4
3,081,451 UART: [art] Derive Key Pair
3,081,811 UART: [art] Store priv key in slot 0x5
3,094,091 UART: [art] Derive Key Pair - Done
3,109,197 UART: [art] Signing Cert with AUTHO
3,109,677 UART: RITY.KEYID = 7
3,125,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,060 UART: [art] PUB.X = 54D649CFAE2DEF55BB8DD02F0CBC59A068DD335F1831C0BD1B06C18B94B998E333F56CBF9E9E07C05608BF0836B31BE5
3,132,833 UART: [art] PUB.Y = 871B9AB8A5252A91ECF44BCFD6DDEDA78A780159CCFBB31E1F87879664AEF6775BC56FCD07B103C88B1032A060B675B1
3,139,790 UART: [art] SIG.R = 7344B46ECE77353DD529A71A1770012191AC16A09701BA58B052D6DEDCE51116FAAE714D57945B356740683E26DE51A7
3,146,552 UART: [art] SIG.S = 6312DC4108F83B5C2E5A610E384D8E9A541D5D0D598806D2207F396F608E2562E329C5696A797F06061CE4D683A19140
3,171,091 UART: Caliptra RT
3,171,344 UART: [state] CFI Enabled
3,279,439 UART: [rt] RT listening for mailbox commands...
3,280,109 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,447 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,836 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,545 ready_for_fw is high
1,059,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,331 >>> mbox cmd response: success
2,689,057 UART:
2,689,073 UART: Running Caliptra FMC ...
2,689,481 UART:
2,689,535 UART: [state] CFI Enabled
2,699,892 UART: [fht] FMC Alias Private Key: 7
2,807,859 UART: [art] Extend RT PCRs Done
2,808,287 UART: [art] Lock RT PCRs Done
2,809,699 UART: [art] Populate DV Done
2,817,892 UART: [fht] FMC Alias Private Key: 7
2,818,936 UART: [art] Derive CDI
2,819,216 UART: [art] Store in in slot 0x4
2,905,069 UART: [art] Derive Key Pair
2,905,429 UART: [art] Store priv key in slot 0x5
2,918,483 UART: [art] Derive Key Pair - Done
2,933,576 UART: [art] Signing Cert with AUTHO
2,934,056 UART: RITY.KEYID = 7
2,949,414 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,179 UART: [art] PUB.X = 28D33628BCDFF416359F9FA8502EDF38EFFE9CB754C895AAC8321692B41CD302056731551C5915ECA6ECFEE849396568
2,956,949 UART: [art] PUB.Y = DCCB79764E351D8CE767161F026820A78ABBF17287D58F029A4C6A135C6B345D803A61B72C1F8CBC9979A2D36C20C3EE
2,963,901 UART: [art] SIG.R = 529617DE12F7A6D57CEAB4B86873B7009F9F411CFF85A0270F719D1AA06BA36653B8ED4B74B73236518065BDA1C8D206
2,970,647 UART: [art] SIG.S = 5F979A6A816482FB8E4D71748EF8E369DEEBE7D78E45547D39BE14F3EAF990337D72B6A42FB5906008A45302FEE5178A
2,994,714 UART: Caliptra RT
2,994,967 UART: [state] CFI Enabled
3,102,368 UART: [rt] RT listening for mailbox commands...
3,103,038 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,620 UART: [rt]cmd =0x4c4d5356, len=1672
3,396,331 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
893,387 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,512 UART: [kat] ++
897,664 UART: [kat] sha1
901,870 UART: [kat] SHA2-256
903,810 UART: [kat] SHA2-384
906,625 UART: [kat] SHA2-512-ACC
908,526 UART: [kat] ECC-384
918,369 UART: [kat] HMAC-384Kdf
923,107 UART: [kat] LMS
1,171,435 UART: [kat] --
1,172,172 UART: [cold-reset] ++
1,172,716 UART: [fht] FHT @ 0x50003400
1,175,281 UART: [idev] ++
1,175,449 UART: [idev] CDI.KEYID = 6
1,175,809 UART: [idev] SUBJECT.KEYID = 7
1,176,233 UART: [idev] UDS.KEYID = 0
1,176,578 ready_for_fw is high
1,176,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,433 UART: [idev] Erasing UDS.KEYID = 0
1,201,484 UART: [idev] Sha1 KeyId Algorithm
1,209,808 UART: [idev] --
1,210,822 UART: [ldev] ++
1,210,990 UART: [ldev] CDI.KEYID = 6
1,211,353 UART: [ldev] SUBJECT.KEYID = 5
1,211,779 UART: [ldev] AUTHORITY.KEYID = 7
1,212,242 UART: [ldev] FE.KEYID = 1
1,217,642 UART: [ldev] Erasing FE.KEYID = 1
1,244,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,468 UART: [ldev] --
1,282,899 UART: [fwproc] Wait for Commands...
1,283,633 UART: [fwproc] Recv command 0x46574c44
1,284,361 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,199 >>> mbox cmd response: success
2,777,459 UART: [afmc] ++
2,777,627 UART: [afmc] CDI.KEYID = 6
2,777,989 UART: [afmc] SUBJECT.KEYID = 7
2,778,414 UART: [afmc] AUTHORITY.KEYID = 5
2,814,419 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,099 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,818 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,434 UART: [afmc] --
2,857,510 UART: [cold-reset] --
2,858,200 UART: [state] Locking Datavault
2,859,615 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,219 UART: [state] Locking ICCM
2,860,813 UART: [exit] Launching FMC @ 0x40000130
2,866,142 UART:
2,866,158 UART: Running Caliptra FMC ...
2,866,566 UART:
2,866,709 UART: [state] CFI Enabled
2,877,584 UART: [fht] FMC Alias Private Key: 7
2,985,337 UART: [art] Extend RT PCRs Done
2,985,765 UART: [art] Lock RT PCRs Done
2,987,215 UART: [art] Populate DV Done
2,995,544 UART: [fht] FMC Alias Private Key: 7
2,996,476 UART: [art] Derive CDI
2,996,756 UART: [art] Store in in slot 0x4
3,082,413 UART: [art] Derive Key Pair
3,082,773 UART: [art] Store priv key in slot 0x5
3,095,999 UART: [art] Derive Key Pair - Done
3,110,717 UART: [art] Signing Cert with AUTHO
3,111,197 UART: RITY.KEYID = 7
3,126,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,206 UART: [art] PUB.X = A30EDBF7CBB899C147A83FA437EF04C087FE09E162219B25DAC12C3D6B100A6F82DA4F4C2187EED2165B7F307C33BF5A
3,133,982 UART: [art] PUB.Y = 6A892D02406B0C2BDFA764D76AF3F1419CDA496A9864DAB78B8E637191ABF386ADBC02DAA7BA1B38493229888B3585CE
3,140,935 UART: [art] SIG.R = E03875A06CB071129960306CE2381E668B297C2D0BA570B465EE5FB7DA31932271BC05FA77377498C517C42918A16B3D
3,147,693 UART: [art] SIG.S = 3FAFBD0CCC88D84648CB99379B95B6FD7391DA0454A652E92CB124DA0B4C5F7D6149CE76A46D1E29E5F941984201F1A9
3,171,716 UART: Caliptra RT
3,172,061 UART: [state] CFI Enabled
3,279,818 UART: [rt] RT listening for mailbox commands...
3,280,488 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,170 UART: [rt]cmd =0x4c4d5356, len=1672
3,573,669 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,456 ready_for_fw is high
1,060,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,736 >>> mbox cmd response: success
2,690,108 UART:
2,690,124 UART: Running Caliptra FMC ...
2,690,532 UART:
2,690,675 UART: [state] CFI Enabled
2,701,284 UART: [fht] FMC Alias Private Key: 7
2,808,687 UART: [art] Extend RT PCRs Done
2,809,115 UART: [art] Lock RT PCRs Done
2,810,555 UART: [art] Populate DV Done
2,818,930 UART: [fht] FMC Alias Private Key: 7
2,820,010 UART: [art] Derive CDI
2,820,290 UART: [art] Store in in slot 0x4
2,906,077 UART: [art] Derive Key Pair
2,906,437 UART: [art] Store priv key in slot 0x5
2,919,351 UART: [art] Derive Key Pair - Done
2,933,843 UART: [art] Signing Cert with AUTHO
2,934,323 UART: RITY.KEYID = 7
2,949,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,048 UART: [art] PUB.X = F8A126BF9BF7AA082C883195B9F0551C465B97F974A4D0ADA577774A5F7056E2C42CAAC36B646923166E2FF5C1AE186C
2,956,823 UART: [art] PUB.Y = 0FC53B2C38FCF526C356EB0A3965E4A5C2AEC4F69B775737F19398E8C8253D841E56EBFFDE9AB260A8048F8C3EEF6D47
2,963,780 UART: [art] SIG.R = 398052EF269B8D92C82FB4639B63D8DA2164BF81C8E664538B6EA173B60C10DEE61120B80AE144E6DDDBB49925C2683F
2,970,550 UART: [art] SIG.S = CD50960E97FBE67EA7961C671E449ED66B39B7374D58E3523DB00DE0DDEB588267950AD6067CB6F0551D4206D5E128B8
2,994,484 UART: Caliptra RT
2,994,829 UART: [state] CFI Enabled
3,102,724 UART: [rt] RT listening for mailbox commands...
3,103,394 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,788 UART: [rt]cmd =0x4c4d5356, len=1672
3,396,313 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
915,692 UART: [kat] HMAC-384Kdf
920,200 UART: [kat] LMS
1,168,512 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,455 UART: [idev] ++
1,172,623 UART: [idev] CDI.KEYID = 6
1,172,984 UART: [idev] SUBJECT.KEYID = 7
1,173,409 UART: [idev] UDS.KEYID = 0
1,173,755 ready_for_fw is high
1,173,755 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,337 UART: [idev] Erasing UDS.KEYID = 0
1,198,767 UART: [idev] Sha1 KeyId Algorithm
1,207,621 UART: [idev] --
1,208,854 UART: [ldev] ++
1,209,022 UART: [ldev] CDI.KEYID = 6
1,209,386 UART: [ldev] SUBJECT.KEYID = 5
1,209,813 UART: [ldev] AUTHORITY.KEYID = 7
1,210,276 UART: [ldev] FE.KEYID = 1
1,215,470 UART: [ldev] Erasing FE.KEYID = 1
1,241,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,498 UART: [ldev] --
1,280,926 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,379 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,804 >>> mbox cmd response: success
2,774,827 UART: [afmc] ++
2,774,995 UART: [afmc] CDI.KEYID = 6
2,775,358 UART: [afmc] SUBJECT.KEYID = 7
2,775,784 UART: [afmc] AUTHORITY.KEYID = 5
2,811,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,722 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,451 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,334 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,053 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,990 UART: [afmc] --
2,854,964 UART: [cold-reset] --
2,855,996 UART: [state] Locking Datavault
2,857,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,669 UART: [state] Locking ICCM
2,858,251 UART: [exit] Launching FMC @ 0x40000130
2,863,580 UART:
2,863,596 UART: Running Caliptra FMC ...
2,864,004 UART:
2,864,058 UART: [state] CFI Enabled
2,874,365 UART: [fht] FMC Alias Private Key: 7
2,982,242 UART: [art] Extend RT PCRs Done
2,982,670 UART: [art] Lock RT PCRs Done
2,984,014 UART: [art] Populate DV Done
2,992,239 UART: [fht] FMC Alias Private Key: 7
2,993,293 UART: [art] Derive CDI
2,993,573 UART: [art] Store in in slot 0x4
3,079,400 UART: [art] Derive Key Pair
3,079,760 UART: [art] Store priv key in slot 0x5
3,092,884 UART: [art] Derive Key Pair - Done
3,107,477 UART: [art] Signing Cert with AUTHO
3,107,957 UART: RITY.KEYID = 7
3,123,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,028 UART: [art] PUB.X = 1729C0975959FB89429450AF069719F5035F792A12DE6C3D01B6271A64EBCBDDFD6343AA6F482A3D2801117F928581E1
3,130,782 UART: [art] PUB.Y = 7D207096B8B8845F8B74C08C7891ABB20D7B31FF94440E492F395AB60FB3CB014A9B1BD6D2E8FB47A9FE7C64CF7C29C0
3,137,734 UART: [art] SIG.R = 099C9AC58456E620C9A7CF888DF503B4407ED4A309F2D5A1F667A0E363E444C73B2CE128995140E68D663BADBDA887F1
3,144,501 UART: [art] SIG.S = 4422F2D6D8F6CEEF46435029D5FCA0C516610AE659B87EA301056562B6BF8021442F375A2E2E36D6043ED034F93D4270
3,168,160 UART: Caliptra RT
3,168,413 UART: [state] CFI Enabled
3,275,572 UART: [rt] RT listening for mailbox commands...
3,276,242 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,930 UART: [rt]cmd =0x4c4d5356, len=1672
3,569,301 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,204 ready_for_fw is high
1,056,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,115 >>> mbox cmd response: success
2,684,245 UART:
2,684,261 UART: Running Caliptra FMC ...
2,684,669 UART:
2,684,723 UART: [state] CFI Enabled
2,694,802 UART: [fht] FMC Alias Private Key: 7
2,801,873 UART: [art] Extend RT PCRs Done
2,802,301 UART: [art] Lock RT PCRs Done
2,803,773 UART: [art] Populate DV Done
2,812,204 UART: [fht] FMC Alias Private Key: 7
2,813,292 UART: [art] Derive CDI
2,813,572 UART: [art] Store in in slot 0x4
2,898,835 UART: [art] Derive Key Pair
2,899,195 UART: [art] Store priv key in slot 0x5
2,912,409 UART: [art] Derive Key Pair - Done
2,927,408 UART: [art] Signing Cert with AUTHO
2,927,888 UART: RITY.KEYID = 7
2,943,564 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,329 UART: [art] PUB.X = C0569BB7F857661A3B5B87AD187349F790D3563339A1CFE1A1492194B1EA21FF164928DE81A5B8F0FB3F57A1C0FA3E80
2,951,105 UART: [art] PUB.Y = 03E7D8DFED3A48E89A60E6D80BDAC47FF65DB520964CFDB870891DD8F4AAC34B205358D6D117D67D7C68C1F402B36F62
2,958,062 UART: [art] SIG.R = 78BC67F531CDE564A9AF2AA12806960E25E611EC5E8A635CD71E32757E29DCDDFE33EFA5547DDA71928454D4E4E1974C
2,964,838 UART: [art] SIG.S = D94023567AA23663078264E80014F5B25748D3E06D1A10DE5FE5205643AD231A952EF17A4EAE2AB799BE9895E1252F9A
2,988,762 UART: Caliptra RT
2,989,015 UART: [state] CFI Enabled
3,097,054 UART: [rt] RT listening for mailbox commands...
3,097,724 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,060 UART: [rt]cmd =0x4c4d5356, len=1672
3,390,719 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,786 UART: [kat] ++
895,938 UART: [kat] sha1
900,402 UART: [kat] SHA2-256
902,342 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,471 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,690 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 ready_for_fw is high
1,174,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,140 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,795 UART: [ldev] ++
1,209,963 UART: [ldev] CDI.KEYID = 6
1,210,327 UART: [ldev] SUBJECT.KEYID = 5
1,210,754 UART: [ldev] AUTHORITY.KEYID = 7
1,211,217 UART: [ldev] FE.KEYID = 1
1,216,561 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,297 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,697 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,809 >>> mbox cmd response: success
2,776,954 UART: [afmc] ++
2,777,122 UART: [afmc] CDI.KEYID = 6
2,777,485 UART: [afmc] SUBJECT.KEYID = 7
2,777,911 UART: [afmc] AUTHORITY.KEYID = 5
2,813,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,888 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,771 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,533 UART: [afmc] --
2,857,431 UART: [cold-reset] --
2,858,347 UART: [state] Locking Datavault
2,859,438 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,042 UART: [state] Locking ICCM
2,860,476 UART: [exit] Launching FMC @ 0x40000130
2,865,805 UART:
2,865,821 UART: Running Caliptra FMC ...
2,866,229 UART:
2,866,372 UART: [state] CFI Enabled
2,877,061 UART: [fht] FMC Alias Private Key: 7
2,984,794 UART: [art] Extend RT PCRs Done
2,985,222 UART: [art] Lock RT PCRs Done
2,986,770 UART: [art] Populate DV Done
2,994,997 UART: [fht] FMC Alias Private Key: 7
2,996,177 UART: [art] Derive CDI
2,996,457 UART: [art] Store in in slot 0x4
3,082,308 UART: [art] Derive Key Pair
3,082,668 UART: [art] Store priv key in slot 0x5
3,096,256 UART: [art] Derive Key Pair - Done
3,110,888 UART: [art] Signing Cert with AUTHO
3,111,368 UART: RITY.KEYID = 7
3,126,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,457 UART: [art] PUB.X = DCEC049BD7BCABDF6AB2E753CA0F9F3F6174B6D5168A1933312C15B15A0559C073A6067EF4F654B879DF28C0819BCD99
3,134,229 UART: [art] PUB.Y = 04EE143AC999A2E50966E6B0AEC775B459D62C09A3DC4B469BDD7E5BD9A7085540C296807A1B212FBE8E6AD10A815E13
3,141,174 UART: [art] SIG.R = DD6C03420B8703AF06BBFB2A62A1F56813E41F3848731556A4E0D488A02E8610896D124D1CB441AC4EDAC42E1ED433AD
3,147,940 UART: [art] SIG.S = E51DE9BB5A28D3B548C172BB67451F65DB830DDA638638E205ACF0ED4C30936BF4B9DFE8892266493E63A71686C8830F
3,172,354 UART: Caliptra RT
3,172,699 UART: [state] CFI Enabled
3,281,043 UART: [rt] RT listening for mailbox commands...
3,281,713 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,425 UART: [rt]cmd =0x4c4d5356, len=1672
3,574,568 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,319 ready_for_fw is high
1,056,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,419 >>> mbox cmd response: success
2,686,015 UART:
2,686,031 UART: Running Caliptra FMC ...
2,686,439 UART:
2,686,582 UART: [state] CFI Enabled
2,696,977 UART: [fht] FMC Alias Private Key: 7
2,805,318 UART: [art] Extend RT PCRs Done
2,805,746 UART: [art] Lock RT PCRs Done
2,807,386 UART: [art] Populate DV Done
2,815,759 UART: [fht] FMC Alias Private Key: 7
2,816,729 UART: [art] Derive CDI
2,817,009 UART: [art] Store in in slot 0x4
2,902,836 UART: [art] Derive Key Pair
2,903,196 UART: [art] Store priv key in slot 0x5
2,916,904 UART: [art] Derive Key Pair - Done
2,931,524 UART: [art] Signing Cert with AUTHO
2,932,004 UART: RITY.KEYID = 7
2,947,300 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,065 UART: [art] PUB.X = 5781CD57B37F10AC7C81CBF5C5442E03FC2589B4FDBA64D41E647734402F7C03955A3F9CEFD094C490A51F71C6FD4343
2,954,837 UART: [art] PUB.Y = 4279DBF514AB4BDBD24F41F3FCE6B78DB25FEBE22C6CD1ABDC88F809B56813AB1DB65D6636EF6031555BC28FF2A80E78
2,961,805 UART: [art] SIG.R = 62903471AA6CB644CD5ECB5C5924FF7425E48F6E42B3B4FC081926E1FB68EDC622CD3D95B3726CF1E9C621A40D154A78
2,968,579 UART: [art] SIG.S = E2DEBCE031804AE8F393F9A735C9F4E0EA25409216BB667B7842D36D24A70C195D5BC7D1D4E62F984E11803DBDA87751
2,992,081 UART: Caliptra RT
2,992,426 UART: [state] CFI Enabled
3,100,907 UART: [rt] RT listening for mailbox commands...
3,101,577 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,361 UART: [rt]cmd =0x4c4d5356, len=1672
3,394,776 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,056 UART:
192,447 UART: Running Caliptra ROM ...
193,648 UART:
193,801 UART: [state] CFI Enabled
265,108 UART: [state] LifecycleState = Unprovisioned
267,037 UART: [state] DebugLocked = No
269,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,080 UART: [kat] SHA2-256
444,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,283 UART: [kat] ++
455,734 UART: [kat] sha1
466,712 UART: [kat] SHA2-256
469,446 UART: [kat] SHA2-384
474,515 UART: [kat] SHA2-512-ACC
476,882 UART: [kat] ECC-384
2,768,490 UART: [kat] HMAC-384Kdf
2,800,322 UART: [kat] LMS
3,990,656 UART: [kat] --
3,994,230 UART: [cold-reset] ++
3,996,378 UART: [fht] Storing FHT @ 0x50003400
4,007,784 UART: [idev] ++
4,008,364 UART: [idev] CDI.KEYID = 6
4,009,292 UART: [idev] SUBJECT.KEYID = 7
4,010,544 UART: [idev] UDS.KEYID = 0
4,011,576 ready_for_fw is high
4,011,780 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,350 UART: [idev] Erasing UDS.KEYID = 0
7,347,014 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,762 UART: [idev] --
7,371,682 UART: [ldev] ++
7,372,255 UART: [ldev] CDI.KEYID = 6
7,373,275 UART: [ldev] SUBJECT.KEYID = 5
7,374,435 UART: [ldev] AUTHORITY.KEYID = 7
7,375,683 UART: [ldev] FE.KEYID = 1
7,422,153 UART: [ldev] Erasing FE.KEYID = 1
10,754,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,505 UART: [ldev] --
13,113,479 UART: [fwproc] Waiting for Commands...
13,115,467 UART: [fwproc] Received command 0x46574c44
13,117,650 UART: [fwproc] Received Image of size 114124 bytes
17,176,387 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,097 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,636,852 >>> mbox cmd response: success
17,640,201 UART: [afmc] ++
17,640,826 UART: [afmc] CDI.KEYID = 6
17,641,747 UART: [afmc] SUBJECT.KEYID = 7
17,642,968 UART: [afmc] AUTHORITY.KEYID = 5
21,007,665 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,216 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,486 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,909 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,744 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,207 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,439 UART: [afmc] --
23,381,256 UART: [cold-reset] --
23,384,567 UART: [state] Locking Datavault
23,388,049 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,815 UART: [state] Locking ICCM
23,392,400 UART: [exit] Launching FMC @ 0x40000130
23,400,796 UART:
23,401,050 UART: Running Caliptra FMC ...
23,402,159 UART:
23,402,324 UART: [state] CFI Enabled
23,468,317 UART: [fht] FMC Alias Private Key: 7
25,806,370 UART: [art] Extend RT PCRs Done
25,807,586 UART: [art] Lock RT PCRs Done
25,809,025 UART: [art] Populate DV Done
25,814,608 UART: [fht] FMC Alias Private Key: 7
25,816,208 UART: [art] Derive CDI
25,817,028 UART: [art] Store in in slot 0x4
25,877,377 UART: [art] Derive Key Pair
25,878,413 UART: [art] Store priv key in slot 0x5
29,171,593 UART: [art] Derive Key Pair - Done
29,184,750 UART: [art] Signing Cert with AUTHO
29,186,051 UART: RITY.KEYID = 7
31,471,909 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,429 UART: [art] PUB.X = DD7721D80ACE034274926F3E941209C223111B7D54D98A4B071D0E9BD473AEB8DDD76671950F59D0FAFA951AACCDC7CA
31,480,623 UART: [art] PUB.Y = 34C92846BC325BD1D9E4AA065286BF826AC76C53466B8948F74513E8B342EB9BE7A0A50A12AF85686CD2182B09327CC4
31,487,910 UART: [art] SIG.R = 9D24DE9F3DC2887F818B966BD1EFDA71A237C786666F111333AC0DCF19D2696EBCDCAC439969720F9C11C23B6F55D776
31,495,296 UART: [art] SIG.S = 380149BB188964560A510EFE7EB9C62938F871BCBCF11B9134CF52E6FA237B4D92843718614951833502D4BDC57B1FD8
32,800,602 UART: Caliptra RT
32,801,305 UART: [state] CFI Enabled
32,960,355 UART: [rt] RT listening for mailbox commands...
32,964,374 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,008,742 UART: [rt]cmd =0x4c4d5356, len=1672
33,423,443 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,805,349 ready_for_fw is high
3,805,744 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,859,530 >>> mbox cmd response: success
23,542,855 UART:
23,543,238 UART: Running Caliptra FMC ...
23,544,437 UART:
23,544,609 UART: [state] CFI Enabled
23,594,497 UART: [fht] FMC Alias Private Key: 7
25,932,266 UART: [art] Extend RT PCRs Done
25,933,496 UART: [art] Lock RT PCRs Done
25,935,098 UART: [art] Populate DV Done
25,940,487 UART: [fht] FMC Alias Private Key: 7
25,942,021 UART: [art] Derive CDI
25,942,770 UART: [art] Store in in slot 0x4
26,003,874 UART: [art] Derive Key Pair
26,004,878 UART: [art] Store priv key in slot 0x5
29,298,025 UART: [art] Derive Key Pair - Done
29,311,080 UART: [art] Signing Cert with AUTHO
29,312,420 UART: RITY.KEYID = 7
31,600,073 UART: [art] Erasing AUTHORITY.KEYID = 7
31,601,591 UART: [art] PUB.X = 860E722C1FDBB3E2AB82BD687F137130F1DBCBF652CB0C95CDE71FDDB0A3C859653134416C00911DDF68FBE92755E762
31,608,867 UART: [art] PUB.Y = 9F1C0411A58452C7193D9B347D8A635EBE324463FD272C271A5AA13D80662727D389924572CDB490ACA6DF75F16BF917
31,616,074 UART: [art] SIG.R = C0F7EB88297C51611E5A2E662C5451C08E2C0F49B01E1283DE5A267B3C7C37462A49CF889AC7F497E2C6410015AA363E
31,623,487 UART: [art] SIG.S = 84EAE6B041AD2375225CE20CD9D9AA41A727CB3FC1A11675629B5E59F4694DA08B4697D7CCFA1814912022950676135A
32,928,552 UART: Caliptra RT
32,929,268 UART: [state] CFI Enabled
33,091,358 UART: [rt] RT listening for mailbox commands...
33,095,352 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,139,839 UART: [rt]cmd =0x4c4d5356, len=1672
33,554,502 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,537 UART:
192,903 UART: Running Caliptra ROM ...
194,007 UART:
603,871 UART: [state] CFI Enabled
622,809 UART: [state] LifecycleState = Unprovisioned
624,694 UART: [state] DebugLocked = No
626,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,738 UART: [kat] SHA2-256
800,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,051 UART: [kat] ++
811,493 UART: [kat] sha1
821,457 UART: [kat] SHA2-256
824,218 UART: [kat] SHA2-384
829,882 UART: [kat] SHA2-512-ACC
832,237 UART: [kat] ECC-384
3,116,647 UART: [kat] HMAC-384Kdf
3,129,371 UART: [kat] LMS
4,319,463 UART: [kat] --
4,325,393 UART: [cold-reset] ++
4,327,328 UART: [fht] Storing FHT @ 0x50003400
4,339,467 UART: [idev] ++
4,340,140 UART: [idev] CDI.KEYID = 6
4,341,056 UART: [idev] SUBJECT.KEYID = 7
4,342,233 UART: [idev] UDS.KEYID = 0
4,343,209 ready_for_fw is high
4,343,398 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,594 UART: [idev] Erasing UDS.KEYID = 0
7,627,508 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,349 UART: [idev] --
7,652,729 UART: [ldev] ++
7,653,298 UART: [ldev] CDI.KEYID = 6
7,654,255 UART: [ldev] SUBJECT.KEYID = 5
7,655,458 UART: [ldev] AUTHORITY.KEYID = 7
7,656,746 UART: [ldev] FE.KEYID = 1
7,667,657 UART: [ldev] Erasing FE.KEYID = 1
10,951,078 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,652 UART: [ldev] --
13,313,924 UART: [fwproc] Waiting for Commands...
13,317,039 UART: [fwproc] Received command 0x46574c44
13,319,223 UART: [fwproc] Received Image of size 114124 bytes
17,371,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,814 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,690 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,324 >>> mbox cmd response: success
17,838,204 UART: [afmc] ++
17,838,803 UART: [afmc] CDI.KEYID = 6
17,839,762 UART: [afmc] SUBJECT.KEYID = 7
17,840,975 UART: [afmc] AUTHORITY.KEYID = 5
21,155,670 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,005 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,269 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,634 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,480 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,899 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,784 UART: [afmc] --
23,520,761 UART: [cold-reset] --
23,524,724 UART: [state] Locking Datavault
23,530,742 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,446 UART: [state] Locking ICCM
23,535,293 UART: [exit] Launching FMC @ 0x40000130
23,543,647 UART:
23,543,922 UART: Running Caliptra FMC ...
23,545,030 UART:
23,545,187 UART: [state] CFI Enabled
23,552,955 UART: [fht] FMC Alias Private Key: 7
25,883,854 UART: [art] Extend RT PCRs Done
25,885,068 UART: [art] Lock RT PCRs Done
25,886,822 UART: [art] Populate DV Done
25,892,226 UART: [fht] FMC Alias Private Key: 7
25,893,867 UART: [art] Derive CDI
25,894,597 UART: [art] Store in in slot 0x4
25,937,608 UART: [art] Derive Key Pair
25,938,805 UART: [art] Store priv key in slot 0x5
29,180,822 UART: [art] Derive Key Pair - Done
29,194,040 UART: [art] Signing Cert with AUTHO
29,195,349 UART: RITY.KEYID = 7
31,474,894 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,399 UART: [art] PUB.X = 0B3BC5AE49B728DC4991C27E141457CD2CB16DDAF5045057E996F7EEEE0ECB8E8576C2EEA43B30247C8C6283D21AFE3A
31,483,685 UART: [art] PUB.Y = FA819F1068F3413FF9042E669B50E375E098AD8E166C706B1569B3E18026766EC0A3E16092146B79DF40818E4026A930
31,490,896 UART: [art] SIG.R = 180D036701EB474CC101B885AE550AB8A62B4F1CE5954FD507546ED516682FC2A4C90922346926543189E090F83B76E4
31,498,204 UART: [art] SIG.S = 7815460B3B59972BE8C33B9F7FD0260F969F85AC1CB83ABB635B06A0E8B1B419AB903FDC636BB4B5EEB35C2BE55EF825
32,803,549 UART: Caliptra RT
32,804,245 UART: [state] CFI Enabled
32,922,442 UART: [rt] RT listening for mailbox commands...
32,926,412 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,970,722 UART: [rt]cmd =0x4c4d5356, len=1672
33,385,480 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
4,131,719 ready_for_fw is high
4,132,232 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,081,411 >>> mbox cmd response: success
23,724,761 UART:
23,725,141 UART: Running Caliptra FMC ...
23,726,273 UART:
23,726,427 UART: [state] CFI Enabled
23,734,113 UART: [fht] FMC Alias Private Key: 7
26,064,524 UART: [art] Extend RT PCRs Done
26,065,744 UART: [art] Lock RT PCRs Done
26,067,638 UART: [art] Populate DV Done
26,072,904 UART: [fht] FMC Alias Private Key: 7
26,074,605 UART: [art] Derive CDI
26,075,421 UART: [art] Store in in slot 0x4
26,117,634 UART: [art] Derive Key Pair
26,118,634 UART: [art] Store priv key in slot 0x5
29,360,768 UART: [art] Derive Key Pair - Done
29,373,774 UART: [art] Signing Cert with AUTHO
29,375,083 UART: RITY.KEYID = 7
31,654,643 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,154 UART: [art] PUB.X = 38AEB5D259FB917F52476C7F6FB4B005A58D75F4A9577459B5D57CEAAEF54E543C3914F8CFF1D2F612CE7D83D0B9109C
31,663,419 UART: [art] PUB.Y = 7E875E4BF686300BF30EF38D2CE9ADDA34759494A8972207EA01B00167B11F38070AD5B963326F52233E96FFD6DEA285
31,670,634 UART: [art] SIG.R = 180B10A0DB8BDDC1CBFCD32114F5E2884168AB1D8B2CD7121186F2E68C69CDEE47425A71DBF621E776B12F527940559A
31,678,010 UART: [art] SIG.S = 38218F67E263640C4A1D2B81634033048AD1A6B86AE1039F16FBD0920B346FE6161BCB642545CB29674C4738F01768A4
32,983,056 UART: Caliptra RT
32,983,776 UART: [state] CFI Enabled
33,101,778 UART: [rt] RT listening for mailbox commands...
33,105,714 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,150,010 UART: [rt]cmd =0x4c4d5356, len=1672
33,564,791 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,246 UART:
192,603 UART: Running Caliptra ROM ...
193,739 UART:
193,889 UART: [state] CFI Enabled
262,214 UART: [state] LifecycleState = Unprovisioned
264,132 UART: [state] DebugLocked = No
265,875 UART: [state] WD Timer not started. Device not locked for debugging
270,044 UART: [kat] SHA2-256
449,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,792 UART: [kat] ++
461,337 UART: [kat] sha1
472,362 UART: [kat] SHA2-256
475,440 UART: [kat] SHA2-384
481,852 UART: [kat] SHA2-512-ACC
484,858 UART: [kat] ECC-384
2,948,387 UART: [kat] HMAC-384Kdf
2,972,160 UART: [kat] LMS
3,501,581 UART: [kat] --
3,507,849 UART: [cold-reset] ++
3,508,710 UART: [fht] FHT @ 0x50003400
3,518,761 UART: [idev] ++
3,519,338 UART: [idev] CDI.KEYID = 6
3,520,252 UART: [idev] SUBJECT.KEYID = 7
3,521,496 UART: [idev] UDS.KEYID = 0
3,522,422 ready_for_fw is high
3,522,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,619 UART: [idev] Erasing UDS.KEYID = 0
6,025,799 UART: [idev] Sha1 KeyId Algorithm
6,050,108 UART: [idev] --
6,053,319 UART: [ldev] ++
6,053,896 UART: [ldev] CDI.KEYID = 6
6,054,814 UART: [ldev] SUBJECT.KEYID = 5
6,055,920 UART: [ldev] AUTHORITY.KEYID = 7
6,057,258 UART: [ldev] FE.KEYID = 1
6,099,819 UART: [ldev] Erasing FE.KEYID = 1
8,598,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,453 UART: [ldev] --
10,390,742 UART: [fwproc] Wait for Commands...
10,392,670 UART: [fwproc] Recv command 0x46574c44
10,394,762 UART: [fwproc] Recv'd Img size: 114448 bytes
13,797,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,285 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,937,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,255,213 >>> mbox cmd response: success
14,260,092 UART: [afmc] ++
14,260,688 UART: [afmc] CDI.KEYID = 6
14,261,577 UART: [afmc] SUBJECT.KEYID = 7
14,262,795 UART: [afmc] AUTHORITY.KEYID = 5
16,801,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,668 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,465 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,510 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,347 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,506 UART: [afmc] --
18,606,435 UART: [cold-reset] --
18,609,603 UART: [state] Locking Datavault
18,614,201 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,844 UART: [state] Locking ICCM
18,617,289 UART: [exit] Launching FMC @ 0x40000130
18,625,694 UART:
18,625,928 UART: Running Caliptra FMC ...
18,627,031 UART:
18,627,199 UART: [state] CFI Enabled
18,688,325 UART: [fht] FMC Alias Private Key: 7
20,452,926 UART: [art] Extend RT PCRs Done
20,454,141 UART: [art] Lock RT PCRs Done
20,455,815 UART: [art] Populate DV Done
20,461,286 UART: [fht] FMC Alias Private Key: 7
20,462,926 UART: [art] Derive CDI
20,463,738 UART: [art] Store in in slot 0x4
20,521,422 UART: [art] Derive Key Pair
20,522,485 UART: [art] Store priv key in slot 0x5
22,985,354 UART: [art] Derive Key Pair - Done
22,998,565 UART: [art] Signing Cert with AUTHO
23,000,049 UART: RITY.KEYID = 7
24,711,619 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,118 UART: [art] PUB.X = 69A5FDF793A869BDA71BF9887B8872871565356C335FC8B869922FBAA26AD80BF9BA9F2AFAD1134ECBF465F43AD3B9BA
24,720,423 UART: [art] PUB.Y = 56503466F46FF49231604B1482CA1D00FD43F9095A5F7266E9D2323F9EB63539EF7C32C242AB16450201E2F07D6E9EEF
24,727,616 UART: [art] SIG.R = 1C91C9A6255EF7836E16C488185CF903CDDBDDE1C866716A597F6490B9B669FA056673C4395F30E6EE37A82A373ED6C8
24,735,010 UART: [art] SIG.S = 6145AF3A143665AF76E3F7B7ADD61C0015624E0E407BBE1CCF1490FDCFD822E90C460BD4297535E5BECE8BFD9E7B48E3
25,713,467 UART: Caliptra RT
25,714,175 UART: [state] CFI Enabled
25,879,528 UART: [rt] RT listening for mailbox commands...
25,883,472 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,928,321 UART: [rt]cmd =0x4c4d5356, len=1672
26,130,461 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,380,242 ready_for_fw is high
3,380,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,064,697 >>> mbox cmd response: success
18,340,058 UART:
18,340,436 UART: Running Caliptra FMC ...
18,341,624 UART:
18,341,801 UART: [state] CFI Enabled
18,408,965 UART: [fht] FMC Alias Private Key: 7
20,172,217 UART: [art] Extend RT PCRs Done
20,173,454 UART: [art] Lock RT PCRs Done
20,175,465 UART: [art] Populate DV Done
20,180,709 UART: [fht] FMC Alias Private Key: 7
20,182,470 UART: [art] Derive CDI
20,183,285 UART: [art] Store in in slot 0x4
20,241,604 UART: [art] Derive Key Pair
20,242,634 UART: [art] Store priv key in slot 0x5
22,705,482 UART: [art] Derive Key Pair - Done
22,718,487 UART: [art] Signing Cert with AUTHO
22,719,823 UART: RITY.KEYID = 7
24,432,069 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,584 UART: [art] PUB.X = 9ECCD278588CBF4FEF66322188C9C25E15DE6285081057B9E7F920A968F1AFE87418B1F7250DB300E279CAED78770C3E
24,440,837 UART: [art] PUB.Y = 7439C7F7298D2E9B5E0BBF883CD5EA6258615A32E975C90924287E0172C558CF51B2CE3A9DF2816C4FCC31E6C9A76771
24,448,085 UART: [art] SIG.R = EE85177332C7A4C331C12CF25212D7E4C9B9FDF68E8BD75B363650C566487714C5C818DD6288B9F656184EA71A29B2C5
24,455,424 UART: [art] SIG.S = 8F139005614E4E5CA5871BB275506C11EB7613F3D1D2FEC6854A3A05F3C85D60CB1056CEE51593EF4B987FC74A9749F5
25,434,960 UART: Caliptra RT
25,435,687 UART: [state] CFI Enabled
25,600,222 UART: [rt] RT listening for mailbox commands...
25,604,196 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,649,232 UART: [rt]cmd =0x4c4d5356, len=1672
25,850,952 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,288 UART:
192,652 UART: Running Caliptra ROM ...
193,842 UART:
603,242 UART: [state] CFI Enabled
619,110 UART: [state] LifecycleState = Unprovisioned
621,013 UART: [state] DebugLocked = No
622,679 UART: [state] WD Timer not started. Device not locked for debugging
626,917 UART: [kat] SHA2-256
807,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,591 UART: [kat] ++
818,136 UART: [kat] sha1
829,436 UART: [kat] SHA2-256
832,500 UART: [kat] SHA2-384
837,557 UART: [kat] SHA2-512-ACC
840,555 UART: [kat] ECC-384
3,278,563 UART: [kat] HMAC-384Kdf
3,290,654 UART: [kat] LMS
3,820,163 UART: [kat] --
3,825,149 UART: [cold-reset] ++
3,827,304 UART: [fht] FHT @ 0x50003400
3,836,710 UART: [idev] ++
3,837,264 UART: [idev] CDI.KEYID = 6
3,838,236 UART: [idev] SUBJECT.KEYID = 7
3,839,398 UART: [idev] UDS.KEYID = 0
3,840,382 ready_for_fw is high
3,840,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,276 UART: [idev] Erasing UDS.KEYID = 0
6,312,580 UART: [idev] Sha1 KeyId Algorithm
6,334,348 UART: [idev] --
6,339,253 UART: [ldev] ++
6,339,814 UART: [ldev] CDI.KEYID = 6
6,340,718 UART: [ldev] SUBJECT.KEYID = 5
6,341,918 UART: [ldev] AUTHORITY.KEYID = 7
6,343,140 UART: [ldev] FE.KEYID = 1
6,352,860 UART: [ldev] Erasing FE.KEYID = 1
8,826,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,068 UART: [ldev] --
10,618,503 UART: [fwproc] Wait for Commands...
10,621,327 UART: [fwproc] Recv command 0x46574c44
10,623,365 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,481,250 >>> mbox cmd response: success
14,484,959 UART: [afmc] ++
14,485,549 UART: [afmc] CDI.KEYID = 6
14,486,454 UART: [afmc] SUBJECT.KEYID = 7
14,487,680 UART: [afmc] AUTHORITY.KEYID = 5
16,986,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,105 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,856 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,917 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,743 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,807 UART: [afmc] --
18,783,271 UART: [cold-reset] --
18,788,587 UART: [state] Locking Datavault
18,793,551 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,192 UART: [state] Locking ICCM
18,796,197 UART: [exit] Launching FMC @ 0x40000130
18,804,591 UART:
18,804,820 UART: Running Caliptra FMC ...
18,805,911 UART:
18,806,082 UART: [state] CFI Enabled
18,814,342 UART: [fht] FMC Alias Private Key: 7
20,570,835 UART: [art] Extend RT PCRs Done
20,572,053 UART: [art] Lock RT PCRs Done
20,573,644 UART: [art] Populate DV Done
20,579,266 UART: [fht] FMC Alias Private Key: 7
20,581,012 UART: [art] Derive CDI
20,581,820 UART: [art] Store in in slot 0x4
20,624,364 UART: [art] Derive Key Pair
20,625,395 UART: [art] Store priv key in slot 0x5
23,052,383 UART: [art] Derive Key Pair - Done
23,065,429 UART: [art] Signing Cert with AUTHO
23,066,723 UART: RITY.KEYID = 7
24,772,112 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,612 UART: [art] PUB.X = 6A7B7A139B60AA222F87FA44CC228A96F7B919955D0A04D2CCB8920A493A4A64BF1801D20C1B06AF6B52BA81936723B0
24,780,918 UART: [art] PUB.Y = 8B264C867998441113DCDB78AECF081DDF0C277975B7EECC4A3A9209E8FB526A9900FB5E1D7037390AE4711002C706E8
24,788,104 UART: [art] SIG.R = 4735ED56D0A7BB50098E50209677FD26D3ACC8F0F0BF8A624D1FF5D81C4A742AA7EB6846696D2E1BEB3CD7481CA6EE5C
24,795,546 UART: [art] SIG.S = C0B7371CA57E7AD974CCAB89A1C56F91A4A5C27F0610A192F705159035332DD989CAA5203CC8FED5E94435C89376E3BF
25,774,544 UART: Caliptra RT
25,775,250 UART: [state] CFI Enabled
25,892,744 UART: [rt] RT listening for mailbox commands...
25,896,841 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,941,250 UART: [rt]cmd =0x4c4d5356, len=1672
26,143,456 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
3,696,715 ready_for_fw is high
3,697,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,656 >>> mbox cmd response: success
18,527,008 UART:
18,527,406 UART: Running Caliptra FMC ...
18,528,590 UART:
18,528,752 UART: [state] CFI Enabled
18,536,326 UART: [fht] FMC Alias Private Key: 7
20,293,019 UART: [art] Extend RT PCRs Done
20,294,249 UART: [art] Lock RT PCRs Done
20,295,820 UART: [art] Populate DV Done
20,301,235 UART: [fht] FMC Alias Private Key: 7
20,302,956 UART: [art] Derive CDI
20,303,771 UART: [art] Store in in slot 0x4
20,346,694 UART: [art] Derive Key Pair
20,347,689 UART: [art] Store priv key in slot 0x5
22,774,643 UART: [art] Derive Key Pair - Done
22,787,381 UART: [art] Signing Cert with AUTHO
22,788,692 UART: RITY.KEYID = 7
24,493,968 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,472 UART: [art] PUB.X = 0574428014D3EB1A795D9805A7EFA316B7B9C9468A431DDE205D7CC8102503A5A161877424CFBF4BA57F04A059E2F653
24,502,704 UART: [art] PUB.Y = 665E5F5573629666383FED06800A5C02411B87BFBA7E0C8F31D0D283C9B655472EC6400E0E39E0BF4468A46A71EC6126
24,510,001 UART: [art] SIG.R = A9C72140695AC424E883D224C55469C1A2646485C66A91EEE99F8154270A4625C18DA02B6E70E4F7BCB55E9414B68AF7
24,517,351 UART: [art] SIG.S = C67D40A7054370FB300E8AE295D8EB63B58BB4D3332700F3003DDD0AAA55CA7C63AD9BDEB363F5901003C6DC9F2D2619
25,495,971 UART: Caliptra RT
25,496,687 UART: [state] CFI Enabled
25,614,243 UART: [rt] RT listening for mailbox commands...
25,618,165 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,662,585 UART: [rt]cmd =0x4c4d5356, len=1672
25,864,052 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,438,309 ready_for_fw is high
3,438,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,698 >>> mbox cmd response: success
19,044,143 UART:
19,044,539 UART: Running Caliptra FMC ...
19,045,640 UART:
19,045,797 UART: [state] CFI Enabled
19,112,445 UART: [fht] FMC Alias Private Key: 7
20,876,408 UART: [art] Extend RT PCRs Done
20,877,635 UART: [art] Lock RT PCRs Done
20,879,104 UART: [art] Populate DV Done
20,884,620 UART: [fht] FMC Alias Private Key: 7
20,886,165 UART: [art] Derive CDI
20,886,983 UART: [art] Store in in slot 0x4
20,944,940 UART: [art] Derive Key Pair
20,945,941 UART: [art] Store priv key in slot 0x5
23,409,144 UART: [art] Derive Key Pair - Done
23,422,134 UART: [art] Signing Cert with AUTHO
23,423,436 UART: RITY.KEYID = 7
25,134,592 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,098 UART: [art] PUB.X = E74F6910146373D342046D91DCA19AF69507DDF0244D783D1CADCDFA0B58EECFEF1FF2DD4AE5FD743E917CA836C97CC2
25,143,350 UART: [art] PUB.Y = 24A0EDB764970CB255ADCB9EDFD218B672D37AFDCA215A96D27961E97F5A5A31E36A5686523C593571E551737146EC86
25,150,661 UART: [art] SIG.R = 6471F05D5DBEA3BD3087A8E35A2F6EF4BEE62546AB82BEBF6EE765D14A7D7FCB596F56C28246E6D551812B4C3BE1CEA2
25,158,052 UART: [art] SIG.S = 2EB4478E3B9801A5687416E28B2102BD8B566274D9BE1101E81742A067180B4FD773F070BD91E296F703AA0FF94AE39F
26,137,494 UART: Caliptra RT
26,138,180 UART: [state] CFI Enabled
26,301,727 UART: [rt] RT listening for mailbox commands...
26,305,622 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,350,902 UART: [rt]cmd =0x4c4d5356, len=1672
26,552,870 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,755,462 ready_for_fw is high
3,755,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,946,673 >>> mbox cmd response: success
19,200,100 UART:
19,200,516 UART: Running Caliptra FMC ...
19,201,634 UART:
19,201,781 UART: [state] CFI Enabled
19,209,778 UART: [fht] FMC Alias Private Key: 7
20,966,879 UART: [art] Extend RT PCRs Done
20,968,106 UART: [art] Lock RT PCRs Done
20,969,921 UART: [art] Populate DV Done
20,975,331 UART: [fht] FMC Alias Private Key: 7
20,976,867 UART: [art] Derive CDI
20,977,597 UART: [art] Store in in slot 0x4
21,020,128 UART: [art] Derive Key Pair
21,021,126 UART: [art] Store priv key in slot 0x5
23,447,966 UART: [art] Derive Key Pair - Done
23,461,077 UART: [art] Signing Cert with AUTHO
23,462,380 UART: RITY.KEYID = 7
25,167,984 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,490 UART: [art] PUB.X = 36B096407665982962B82099B0580347B72183553678A2D2CD0E05319E2F49AED548A5A16AE65539C76EDDB2945211FC
25,176,744 UART: [art] PUB.Y = 6C3F581994BFF4755F014A21CC051246CFB8AFD2E8B994FE5194732F8CB5F7F005F7451F52E3BC6DB4B869883C420E2B
25,183,968 UART: [art] SIG.R = DBE9D042077C419C9A47A5EEFA8D7DE8D815CEAD82147FF7CA8031CBCD504C4C8974951D3F9A83FCF4CDAE53FD5C119E
25,191,613 UART: [art] SIG.S = 84008A9A76A59D5E9614D6E64D76B3CCE4F7234A032B852D06F3C0D5DFDBD3BAF2B7811AC06FAA19E3DE0D73B882FFEC
26,170,282 UART: Caliptra RT
26,170,989 UART: [state] CFI Enabled
26,288,322 UART: [rt] RT listening for mailbox commands...
26,292,336 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,336,861 UART: [rt]cmd =0x4c4d5356, len=1672
26,538,540 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,053 UART: [kat] SHA2-256
881,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,099 UART: [kat] ++
886,251 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
895,124 UART: [kat] SHA2-512-ACC
897,025 UART: [kat] ECC-384
902,730 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,631 UART: [cold-reset] ++
1,477,181 UART: [fht] Storing FHT @ 0x50003400
1,479,944 UART: [idev] ++
1,480,112 UART: [idev] CDI.KEYID = 6
1,480,472 UART: [idev] SUBJECT.KEYID = 7
1,480,896 UART: [idev] UDS.KEYID = 0
1,481,241 ready_for_fw is high
1,481,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,676 UART: [idev] Erasing UDS.KEYID = 0
1,504,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,358 UART: [idev] --
1,514,421 UART: [ldev] ++
1,514,589 UART: [ldev] CDI.KEYID = 6
1,514,952 UART: [ldev] SUBJECT.KEYID = 5
1,515,378 UART: [ldev] AUTHORITY.KEYID = 7
1,515,841 UART: [ldev] FE.KEYID = 1
1,521,123 UART: [ldev] Erasing FE.KEYID = 1
1,546,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,508 UART: [ldev] --
1,585,985 UART: [fwproc] Waiting for Commands...
1,586,754 UART: [fwproc] Received command 0x46574c44
1,587,545 UART: [fwproc] Received Image of size 114448 bytes
2,887,488 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,683 >>> mbox cmd response: success
3,080,713 UART: [afmc] ++
3,080,881 UART: [afmc] CDI.KEYID = 6
3,081,243 UART: [afmc] SUBJECT.KEYID = 7
3,081,668 UART: [afmc] AUTHORITY.KEYID = 5
3,116,803 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,795 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,303 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,188 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,878 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,713 UART: [afmc] --
3,159,599 UART: [cold-reset] --
3,160,477 UART: [state] Locking Datavault
3,161,738 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,342 UART: [state] Locking ICCM
3,162,970 UART: [exit] Launching FMC @ 0x40000130
3,168,299 UART:
3,168,315 UART: Running Caliptra FMC ...
3,168,723 UART:
3,168,777 UART: [state] CFI Enabled
3,179,244 UART: [fht] FMC Alias Private Key: 7
3,287,559 UART: [art] Extend RT PCRs Done
3,287,987 UART: [art] Lock RT PCRs Done
3,289,293 UART: [art] Populate DV Done
3,297,492 UART: [fht] FMC Alias Private Key: 7
3,298,562 UART: [art] Derive CDI
3,298,842 UART: [art] Store in in slot 0x4
3,384,473 UART: [art] Derive Key Pair
3,384,833 UART: [art] Store priv key in slot 0x5
3,398,489 UART: [art] Derive Key Pair - Done
3,413,561 UART: [art] Signing Cert with AUTHO
3,414,041 UART: RITY.KEYID = 7
3,429,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,834 UART: [art] PUB.X = 6B05066041F57D04AFD90C527FE1497E2FB5B848B4E1F1AE5A86E6B37C0C411EBE20C2F31397B329051DE8C81C698A94
3,436,592 UART: [art] PUB.Y = A4861CD5C4677E2BBDF063C76C44A942C945A3D197EBC8DDAC3FCA00EA039DC2D8DC101A5BA34FD908C09A32FF36773F
3,443,536 UART: [art] SIG.R = A9A90AE8956CC1CD5A29C8F080A9F4594F9BE1A9D738A64D328B41C02DC15E46192BF8835B6094AB49CE461E11DED108
3,450,310 UART: [art] SIG.S = 14BF491EECE4A2ACEAD19CF5521823C7619282B8DDF7283916D74B797AA8A837073C5A12E7B94A4B25B50317B806CFF5
3,473,994 UART: Caliptra RT
3,474,247 UART: [state] CFI Enabled
3,581,952 UART: [rt] RT listening for mailbox commands...
3,582,622 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,298 UART: [rt]cmd =0x4c4d5356, len=1672
3,875,494 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,821 ready_for_fw is high
1,361,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,067 >>> mbox cmd response: success
2,989,555 UART:
2,989,571 UART: Running Caliptra FMC ...
2,989,979 UART:
2,990,033 UART: [state] CFI Enabled
3,000,408 UART: [fht] FMC Alias Private Key: 7
3,108,421 UART: [art] Extend RT PCRs Done
3,108,849 UART: [art] Lock RT PCRs Done
3,110,267 UART: [art] Populate DV Done
3,118,570 UART: [fht] FMC Alias Private Key: 7
3,119,514 UART: [art] Derive CDI
3,119,794 UART: [art] Store in in slot 0x4
3,205,155 UART: [art] Derive Key Pair
3,205,515 UART: [art] Store priv key in slot 0x5
3,218,555 UART: [art] Derive Key Pair - Done
3,233,074 UART: [art] Signing Cert with AUTHO
3,233,554 UART: RITY.KEYID = 7
3,248,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,381 UART: [art] PUB.X = 96D85E5571CD74E2F0D19B5BCD7A80A24877F5B0577ACC72E04280AF8FDC08696DE25C294E0A2DA6ABAACD5D9171C361
3,256,161 UART: [art] PUB.Y = 5E628FCB53BC02B455FA9E13E9877792D5654558342FF7D1E3F87BEA3CCB955A6169CC49615ACDEF68F84C23E724DE88
3,263,118 UART: [art] SIG.R = 98E4344EC735B4D86BCFC80D4E07D33417E685C4EF7329A35FC0FB755CB345D9763208410AB4F23D50CFE195D786E863
3,269,880 UART: [art] SIG.S = B58779C3863131B36118DFD3AC762F515B87745B37802575CB5A91AE54EB9641DF97C4EFC94FDFEB94D37B4831DC73A1
3,293,715 UART: Caliptra RT
3,293,968 UART: [state] CFI Enabled
3,401,602 UART: [rt] RT listening for mailbox commands...
3,402,272 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,038 UART: [rt]cmd =0x4c4d5356, len=1672
3,695,554 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,596 UART: [kat] SHA2-256
892,534 UART: [kat] SHA2-384
895,307 UART: [kat] SHA2-512-ACC
897,208 UART: [kat] ECC-384
902,785 UART: [kat] HMAC-384Kdf
907,407 UART: [kat] LMS
1,475,603 UART: [kat] --
1,476,388 UART: [cold-reset] ++
1,476,880 UART: [fht] Storing FHT @ 0x50003400
1,479,711 UART: [idev] ++
1,479,879 UART: [idev] CDI.KEYID = 6
1,480,239 UART: [idev] SUBJECT.KEYID = 7
1,480,663 UART: [idev] UDS.KEYID = 0
1,481,008 ready_for_fw is high
1,481,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,655 UART: [idev] Erasing UDS.KEYID = 0
1,505,575 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,189 UART: [idev] --
1,515,386 UART: [ldev] ++
1,515,554 UART: [ldev] CDI.KEYID = 6
1,515,917 UART: [ldev] SUBJECT.KEYID = 5
1,516,343 UART: [ldev] AUTHORITY.KEYID = 7
1,516,806 UART: [ldev] FE.KEYID = 1
1,521,998 UART: [ldev] Erasing FE.KEYID = 1
1,547,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,721 UART: [ldev] --
1,587,146 UART: [fwproc] Waiting for Commands...
1,587,855 UART: [fwproc] Received command 0x46574c44
1,588,646 UART: [fwproc] Received Image of size 114448 bytes
2,888,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,503 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,855 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,954 >>> mbox cmd response: success
3,082,208 UART: [afmc] ++
3,082,376 UART: [afmc] CDI.KEYID = 6
3,082,738 UART: [afmc] SUBJECT.KEYID = 7
3,083,163 UART: [afmc] AUTHORITY.KEYID = 5
3,119,112 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,338 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,118 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,846 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,731 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,421 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,304 UART: [afmc] --
3,162,284 UART: [cold-reset] --
3,163,174 UART: [state] Locking Datavault
3,164,361 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,965 UART: [state] Locking ICCM
3,165,417 UART: [exit] Launching FMC @ 0x40000130
3,170,746 UART:
3,170,762 UART: Running Caliptra FMC ...
3,171,170 UART:
3,171,313 UART: [state] CFI Enabled
3,181,754 UART: [fht] FMC Alias Private Key: 7
3,290,575 UART: [art] Extend RT PCRs Done
3,291,003 UART: [art] Lock RT PCRs Done
3,292,415 UART: [art] Populate DV Done
3,300,830 UART: [fht] FMC Alias Private Key: 7
3,301,892 UART: [art] Derive CDI
3,302,172 UART: [art] Store in in slot 0x4
3,388,131 UART: [art] Derive Key Pair
3,388,491 UART: [art] Store priv key in slot 0x5
3,402,173 UART: [art] Derive Key Pair - Done
3,417,345 UART: [art] Signing Cert with AUTHO
3,417,825 UART: RITY.KEYID = 7
3,433,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,434,472 UART: [art] PUB.X = 4EB413AD7498C862302E4B095DCA2F0C98F28FE7A8EB7621FEF7471D6524084AA33941A578BAD89520F79D2B6EC95E74
3,441,239 UART: [art] PUB.Y = 61CF7B9BD45A1804FCE979F50E7DB2730FFD879FC4A6E6826FAC81FE5409317478F8465F4082AE7F6035FA667CBFCB76
3,448,189 UART: [art] SIG.R = 1F75D1091BBA389170FB73D8B05B732A21A2F7737B88901CBEDD93B4D50842DED84D4C2C1633803908E6EBA1EE337862
3,454,954 UART: [art] SIG.S = 5F766F8C9CC1395C975A77795D13C417CE333AE925AAE1C2FA574D646D133FE886DE72A5D9770B5A9927479173D316F9
3,478,176 UART: Caliptra RT
3,478,521 UART: [state] CFI Enabled
3,587,025 UART: [rt] RT listening for mailbox commands...
3,587,695 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,135 UART: [rt]cmd =0x4c4d5356, len=1672
3,880,679 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,682 ready_for_fw is high
1,362,682 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,944 >>> mbox cmd response: success
2,990,810 UART:
2,990,826 UART: Running Caliptra FMC ...
2,991,234 UART:
2,991,377 UART: [state] CFI Enabled
3,002,314 UART: [fht] FMC Alias Private Key: 7
3,109,915 UART: [art] Extend RT PCRs Done
3,110,343 UART: [art] Lock RT PCRs Done
3,111,899 UART: [art] Populate DV Done
3,119,824 UART: [fht] FMC Alias Private Key: 7
3,120,906 UART: [art] Derive CDI
3,121,186 UART: [art] Store in in slot 0x4
3,206,951 UART: [art] Derive Key Pair
3,207,311 UART: [art] Store priv key in slot 0x5
3,220,963 UART: [art] Derive Key Pair - Done
3,235,599 UART: [art] Signing Cert with AUTHO
3,236,079 UART: RITY.KEYID = 7
3,251,417 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,182 UART: [art] PUB.X = FFD432F28E0131FDF105F443E64F4F1A6220F1A94948AE4E26EBC7135078FC708634D8617293D3AFBFD70E8C0F8EE929
3,258,948 UART: [art] PUB.Y = 424DA401F14481A219DDCA6607CA7DD02D1F4A1F8AA0B5B5517554B80E5DD6BFFF9E34CBE5F78650B627219B5A08C99C
3,265,900 UART: [art] SIG.R = F86A897160A761145DC1B8E8E4F57CE2E8BF3B41250AEB2F0F7A65BA858AFB75CCDFFC75328A5C76FCA845CC0AD9BFC9
3,272,687 UART: [art] SIG.S = 5E8D8D18EC70B9A4125D5058C08D8A8EC6CC892F135C8B79AEF713CB4567AABE72907FD6BA1A78786EB19075533F7219
3,296,670 UART: Caliptra RT
3,297,015 UART: [state] CFI Enabled
3,406,260 UART: [rt] RT listening for mailbox commands...
3,406,930 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,474 UART: [rt]cmd =0x4c4d5356, len=1672
3,700,022 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
893,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,679 UART: [kat] ++
897,831 UART: [kat] sha1
902,237 UART: [kat] SHA2-256
904,177 UART: [kat] SHA2-384
906,962 UART: [kat] SHA2-512-ACC
908,863 UART: [kat] ECC-384
918,646 UART: [kat] HMAC-384Kdf
923,440 UART: [kat] LMS
1,171,768 UART: [kat] --
1,172,465 UART: [cold-reset] ++
1,172,869 UART: [fht] FHT @ 0x50003400
1,175,564 UART: [idev] ++
1,175,732 UART: [idev] CDI.KEYID = 6
1,176,092 UART: [idev] SUBJECT.KEYID = 7
1,176,516 UART: [idev] UDS.KEYID = 0
1,176,861 ready_for_fw is high
1,176,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,408 UART: [idev] Erasing UDS.KEYID = 0
1,201,487 UART: [idev] Sha1 KeyId Algorithm
1,209,931 UART: [idev] --
1,210,903 UART: [ldev] ++
1,211,071 UART: [ldev] CDI.KEYID = 6
1,211,434 UART: [ldev] SUBJECT.KEYID = 5
1,211,860 UART: [ldev] AUTHORITY.KEYID = 7
1,212,323 UART: [ldev] FE.KEYID = 1
1,217,617 UART: [ldev] Erasing FE.KEYID = 1
1,243,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,979 UART: [ldev] --
1,283,326 UART: [fwproc] Wait for Commands...
1,284,032 UART: [fwproc] Recv command 0x46574c44
1,284,760 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,248 >>> mbox cmd response: success
2,777,484 UART: [afmc] ++
2,777,652 UART: [afmc] CDI.KEYID = 6
2,778,014 UART: [afmc] SUBJECT.KEYID = 7
2,778,439 UART: [afmc] AUTHORITY.KEYID = 5
2,813,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,011 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,739 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,624 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,343 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,207 UART: [afmc] --
2,857,097 UART: [cold-reset] --
2,857,977 UART: [state] Locking Datavault
2,859,110 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,714 UART: [state] Locking ICCM
2,860,370 UART: [exit] Launching FMC @ 0x40000130
2,865,699 UART:
2,865,715 UART: Running Caliptra FMC ...
2,866,123 UART:
2,866,177 UART: [state] CFI Enabled
2,876,770 UART: [fht] FMC Alias Private Key: 7
2,984,303 UART: [art] Extend RT PCRs Done
2,984,731 UART: [art] Lock RT PCRs Done
2,986,277 UART: [art] Populate DV Done
2,994,406 UART: [fht] FMC Alias Private Key: 7
2,995,478 UART: [art] Derive CDI
2,995,758 UART: [art] Store in in slot 0x4
3,081,325 UART: [art] Derive Key Pair
3,081,685 UART: [art] Store priv key in slot 0x5
3,094,537 UART: [art] Derive Key Pair - Done
3,109,315 UART: [art] Signing Cert with AUTHO
3,109,795 UART: RITY.KEYID = 7
3,125,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,962 UART: [art] PUB.X = 5AE1FAE9FD0D473994F3733758588933D77D7DABCDD892DA47B89B239A52BE997737145ECE27B126F7EDA1BD1D6761A6
3,132,739 UART: [art] PUB.Y = EF2042CBDE2C2956C8142B4F7257E23951F971BD2FB9954D2AED48E25FE02E6767BCACA48918245AE0A1167E96F8DFC0
3,139,701 UART: [art] SIG.R = 344BA8725042BAB4565CA2CC67186B068A20BDB3888EBECF38793A1D32D78CC1C2B3CB546C614CB2B3420E4D2AD2C178
3,146,477 UART: [art] SIG.S = 506470EBA291005C13B0AE55131D206D8D745AFDDEAB64A2A706A5E2403F95F7A0C06B40537EFE3C361A86DE16BAD77E
3,170,423 UART: Caliptra RT
3,170,676 UART: [state] CFI Enabled
3,278,929 UART: [rt] RT listening for mailbox commands...
3,279,599 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,029 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,421 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,283 ready_for_fw is high
1,060,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,653 >>> mbox cmd response: success
2,689,109 UART:
2,689,125 UART: Running Caliptra FMC ...
2,689,533 UART:
2,689,587 UART: [state] CFI Enabled
2,700,192 UART: [fht] FMC Alias Private Key: 7
2,808,327 UART: [art] Extend RT PCRs Done
2,808,755 UART: [art] Lock RT PCRs Done
2,810,177 UART: [art] Populate DV Done
2,818,340 UART: [fht] FMC Alias Private Key: 7
2,819,306 UART: [art] Derive CDI
2,819,586 UART: [art] Store in in slot 0x4
2,905,623 UART: [art] Derive Key Pair
2,905,983 UART: [art] Store priv key in slot 0x5
2,918,483 UART: [art] Derive Key Pair - Done
2,933,018 UART: [art] Signing Cert with AUTHO
2,933,498 UART: RITY.KEYID = 7
2,948,534 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,299 UART: [art] PUB.X = B146AA269D226D151A990D9FA927DCDE907F48248C6767F0840848B89CCC8B81910A643084AD4FCDB7601A3BB4E2AB06
2,956,063 UART: [art] PUB.Y = 0082EDF27D327D48D87C5717368233859D58A467B6AC82FE1147A2CDDF14BD07E95F5B90CA330544C54F87C4608CA90B
2,962,984 UART: [art] SIG.R = 742AB96D68B84F4828AD42FA33B5D08C06B69EA73A6CA64858F6F6AC0A093A933E1D2D7FCD9EE1A0A30A28FD6A5016E5
2,969,758 UART: [art] SIG.S = CC2E03EE7BCB59A224D778FBF8284CFD246EFE555AAAACC2CE66B9383F1221D6E096D854872D90BABDE7E31F251249B9
2,993,604 UART: Caliptra RT
2,993,857 UART: [state] CFI Enabled
3,101,706 UART: [rt] RT listening for mailbox commands...
3,102,376 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,106 UART: [rt]cmd =0x4c4d5356, len=1672
3,395,594 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
893,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,744 UART: [kat] ++
897,896 UART: [kat] sha1
902,030 UART: [kat] SHA2-256
903,970 UART: [kat] SHA2-384
906,679 UART: [kat] SHA2-512-ACC
908,580 UART: [kat] ECC-384
918,301 UART: [kat] HMAC-384Kdf
922,977 UART: [kat] LMS
1,171,305 UART: [kat] --
1,171,950 UART: [cold-reset] ++
1,172,512 UART: [fht] FHT @ 0x50003400
1,175,165 UART: [idev] ++
1,175,333 UART: [idev] CDI.KEYID = 6
1,175,693 UART: [idev] SUBJECT.KEYID = 7
1,176,117 UART: [idev] UDS.KEYID = 0
1,176,462 ready_for_fw is high
1,176,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,125 UART: [idev] Erasing UDS.KEYID = 0
1,200,738 UART: [idev] Sha1 KeyId Algorithm
1,209,226 UART: [idev] --
1,210,296 UART: [ldev] ++
1,210,464 UART: [ldev] CDI.KEYID = 6
1,210,827 UART: [ldev] SUBJECT.KEYID = 5
1,211,253 UART: [ldev] AUTHORITY.KEYID = 7
1,211,716 UART: [ldev] FE.KEYID = 1
1,217,098 UART: [ldev] Erasing FE.KEYID = 1
1,244,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,034 UART: [ldev] --
1,283,487 UART: [fwproc] Wait for Commands...
1,284,261 UART: [fwproc] Recv command 0x46574c44
1,284,989 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,727 >>> mbox cmd response: success
2,776,981 UART: [afmc] ++
2,777,149 UART: [afmc] CDI.KEYID = 6
2,777,511 UART: [afmc] SUBJECT.KEYID = 7
2,777,936 UART: [afmc] AUTHORITY.KEYID = 5
2,813,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,476 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,204 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,089 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,808 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,564 UART: [afmc] --
2,856,516 UART: [cold-reset] --
2,857,362 UART: [state] Locking Datavault
2,858,407 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,011 UART: [state] Locking ICCM
2,859,497 UART: [exit] Launching FMC @ 0x40000130
2,864,826 UART:
2,864,842 UART: Running Caliptra FMC ...
2,865,250 UART:
2,865,393 UART: [state] CFI Enabled
2,875,886 UART: [fht] FMC Alias Private Key: 7
2,984,343 UART: [art] Extend RT PCRs Done
2,984,771 UART: [art] Lock RT PCRs Done
2,986,283 UART: [art] Populate DV Done
2,994,492 UART: [fht] FMC Alias Private Key: 7
2,995,544 UART: [art] Derive CDI
2,995,824 UART: [art] Store in in slot 0x4
3,081,747 UART: [art] Derive Key Pair
3,082,107 UART: [art] Store priv key in slot 0x5
3,095,363 UART: [art] Derive Key Pair - Done
3,110,067 UART: [art] Signing Cert with AUTHO
3,110,547 UART: RITY.KEYID = 7
3,125,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,282 UART: [art] PUB.X = 9315E66DEE1398E3FF339197FA3714EB9917362F71B823BBB8EBA7349F86B3812BBBDA99DEC2E3CCDB2F5044C5105985
3,133,062 UART: [art] PUB.Y = 91661A9AB108AAF41C9A22E30DEB027474D7C68E8320F39075716978C9743637DE2EB4EBFD09754C9215568A5C600735
3,139,991 UART: [art] SIG.R = F74C75C45435E58C39185CB98C9AED82E1FF5C5521698186D5E8AC6D6C365077E19EC2206F311A40041A32D599B5C3AC
3,146,760 UART: [art] SIG.S = DD9AB0388A9825019B6FE231AA6F3179F80857B59F09D42D71E207BBFDFD765C4E3D1ACFE83D03E09966BA00D4AD7A98
3,169,922 UART: Caliptra RT
3,170,267 UART: [state] CFI Enabled
3,277,925 UART: [rt] RT listening for mailbox commands...
3,278,595 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,543 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,007 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,334 ready_for_fw is high
1,060,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,374 >>> mbox cmd response: success
2,692,402 UART:
2,692,418 UART: Running Caliptra FMC ...
2,692,826 UART:
2,692,969 UART: [state] CFI Enabled
2,703,696 UART: [fht] FMC Alias Private Key: 7
2,811,151 UART: [art] Extend RT PCRs Done
2,811,579 UART: [art] Lock RT PCRs Done
2,812,933 UART: [art] Populate DV Done
2,821,338 UART: [fht] FMC Alias Private Key: 7
2,822,350 UART: [art] Derive CDI
2,822,630 UART: [art] Store in in slot 0x4
2,908,547 UART: [art] Derive Key Pair
2,908,907 UART: [art] Store priv key in slot 0x5
2,922,119 UART: [art] Derive Key Pair - Done
2,936,673 UART: [art] Signing Cert with AUTHO
2,937,153 UART: RITY.KEYID = 7
2,952,723 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,488 UART: [art] PUB.X = 1D0FE2987CE33E246E8BA6A0BE75D8306BB66DED416172C14EC3F8B48D0D84C2334EF3D3114A90DEA016CE497649D313
2,960,262 UART: [art] PUB.Y = 030041971724A1E3F0A85E906E842DAFE3E2D927C83BE5700731368FEE334248E620A67A56782C983C13558B05AFE5F7
2,967,175 UART: [art] SIG.R = 7225FB42ADD0D841AFA4184831685BC11FE5C22389ABB3B464D36E30B1B5024C4882DC792F679715106335A3F36ADE91
2,973,942 UART: [art] SIG.S = 77B4955E4C441B6C959A8AFB8D2D8DE6AC2D54F2ECDAAE9C1918F69912D2019F7C6253FB1A9FF6478DD489D485927FB5
2,998,720 UART: Caliptra RT
2,999,065 UART: [state] CFI Enabled
3,107,320 UART: [rt] RT listening for mailbox commands...
3,107,990 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,392 UART: [rt]cmd =0x4c4d5356, len=1672
3,400,718 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,385 UART: [cold-reset] ++
1,169,743 UART: [fht] FHT @ 0x50003400
1,172,349 UART: [idev] ++
1,172,517 UART: [idev] CDI.KEYID = 6
1,172,878 UART: [idev] SUBJECT.KEYID = 7
1,173,303 UART: [idev] UDS.KEYID = 0
1,173,649 ready_for_fw is high
1,173,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,165 UART: [idev] Erasing UDS.KEYID = 0
1,197,937 UART: [idev] Sha1 KeyId Algorithm
1,206,977 UART: [idev] --
1,208,108 UART: [ldev] ++
1,208,276 UART: [ldev] CDI.KEYID = 6
1,208,640 UART: [ldev] SUBJECT.KEYID = 5
1,209,067 UART: [ldev] AUTHORITY.KEYID = 7
1,209,530 UART: [ldev] FE.KEYID = 1
1,214,842 UART: [ldev] Erasing FE.KEYID = 1
1,240,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,748 UART: [ldev] --
1,279,132 UART: [fwproc] Wait for Commands...
1,279,867 UART: [fwproc] Recv command 0x46574c44
1,280,600 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,252 >>> mbox cmd response: success
2,774,323 UART: [afmc] ++
2,774,491 UART: [afmc] CDI.KEYID = 6
2,774,854 UART: [afmc] SUBJECT.KEYID = 7
2,775,280 UART: [afmc] AUTHORITY.KEYID = 5
2,810,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,760 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,489 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,372 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,091 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,006 UART: [afmc] --
2,853,944 UART: [cold-reset] --
2,854,724 UART: [state] Locking Datavault
2,855,813 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,417 UART: [state] Locking ICCM
2,857,053 UART: [exit] Launching FMC @ 0x40000130
2,862,382 UART:
2,862,398 UART: Running Caliptra FMC ...
2,862,806 UART:
2,862,860 UART: [state] CFI Enabled
2,873,289 UART: [fht] FMC Alias Private Key: 7
2,981,076 UART: [art] Extend RT PCRs Done
2,981,504 UART: [art] Lock RT PCRs Done
2,983,026 UART: [art] Populate DV Done
2,991,425 UART: [fht] FMC Alias Private Key: 7
2,992,529 UART: [art] Derive CDI
2,992,809 UART: [art] Store in in slot 0x4
3,078,524 UART: [art] Derive Key Pair
3,078,884 UART: [art] Store priv key in slot 0x5
3,091,914 UART: [art] Derive Key Pair - Done
3,106,464 UART: [art] Signing Cert with AUTHO
3,106,944 UART: RITY.KEYID = 7
3,122,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,943 UART: [art] PUB.X = 0CFEEF5717FF517B82F3A7C68ABA3CF9B2B50FB5BCFE1E3B2D716150DB9C52B83F4BFFD24F6B5FA255822EEE599A28E7
3,129,735 UART: [art] PUB.Y = 9E976ED279C86972CC6FDE303B412176D4044B59053D9E69DDE255F8644E1A3DAB32344E29C7F7FA564DA0819DAA8EC2
3,136,687 UART: [art] SIG.R = 2A75FC3E342A657B3E94399404540DAAB4110234938DFA7C8F1686EED419E94249374707E136E1A818091F7531F32C01
3,143,429 UART: [art] SIG.S = 1E3260677A773490F7567D7B1B7C0328DEF2AA8B00D0C1529FF4598F52062D39426B6E38E286012A53535B111E3D1B7B
3,167,045 UART: Caliptra RT
3,167,298 UART: [state] CFI Enabled
3,276,505 UART: [rt] RT listening for mailbox commands...
3,277,175 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,533 UART: [rt]cmd =0x4c4d5356, len=1672
3,569,899 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,184 ready_for_fw is high
1,056,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,002 >>> mbox cmd response: success
2,685,934 UART:
2,685,950 UART: Running Caliptra FMC ...
2,686,358 UART:
2,686,412 UART: [state] CFI Enabled
2,696,817 UART: [fht] FMC Alias Private Key: 7
2,804,276 UART: [art] Extend RT PCRs Done
2,804,704 UART: [art] Lock RT PCRs Done
2,806,380 UART: [art] Populate DV Done
2,814,589 UART: [fht] FMC Alias Private Key: 7
2,815,765 UART: [art] Derive CDI
2,816,045 UART: [art] Store in in slot 0x4
2,901,412 UART: [art] Derive Key Pair
2,901,772 UART: [art] Store priv key in slot 0x5
2,915,320 UART: [art] Derive Key Pair - Done
2,930,054 UART: [art] Signing Cert with AUTHO
2,930,534 UART: RITY.KEYID = 7
2,945,500 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,265 UART: [art] PUB.X = 0150250C414A30A0F3CD761359B5161CD9D0EC9410FB476DC756A4852D8B1C5BD3D1CEFF0DC90E054169B1D2EF0C86DE
2,953,029 UART: [art] PUB.Y = 81B63AB3412F58200D992C457A769C95E846D7C3935DB5123A81C2BA9EE021823DC723DA9DAA898DD3D484FA79227A79
2,959,978 UART: [art] SIG.R = 632408416487B0A2DC57693EE13ABC0204520D6D41CB99250ADF47D01B9CBCB694292EF93E85EA0C846C2C186D1932C3
2,966,732 UART: [art] SIG.S = 4AB332AD1F57DE830FFE2305F292CDAC5E21F7DABEEF73700F69F83E5CFA61CD97C225B0BBBFC173BADCD24F3E617772
2,991,134 UART: Caliptra RT
2,991,387 UART: [state] CFI Enabled
3,100,078 UART: [rt] RT listening for mailbox commands...
3,100,748 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,360 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,754 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,577 UART: [kat] SHA2-256
891,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,256 UART: [kat] ++
895,408 UART: [kat] sha1
899,608 UART: [kat] SHA2-256
901,548 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
916,121 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,169,946 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,174,572 ready_for_fw is high
1,174,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,892 UART: [idev] Erasing UDS.KEYID = 0
1,198,906 UART: [idev] Sha1 KeyId Algorithm
1,207,626 UART: [idev] --
1,208,885 UART: [ldev] ++
1,209,053 UART: [ldev] CDI.KEYID = 6
1,209,417 UART: [ldev] SUBJECT.KEYID = 5
1,209,844 UART: [ldev] AUTHORITY.KEYID = 7
1,210,307 UART: [ldev] FE.KEYID = 1
1,215,767 UART: [ldev] Erasing FE.KEYID = 1
1,242,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,297 UART: [ldev] --
1,281,735 UART: [fwproc] Wait for Commands...
1,282,472 UART: [fwproc] Recv command 0x46574c44
1,283,205 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,488 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,775 >>> mbox cmd response: success
2,775,008 UART: [afmc] ++
2,775,176 UART: [afmc] CDI.KEYID = 6
2,775,539 UART: [afmc] SUBJECT.KEYID = 7
2,775,965 UART: [afmc] AUTHORITY.KEYID = 5
2,811,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,573 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,302 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,665 UART: [afmc] --
2,854,777 UART: [cold-reset] --
2,855,771 UART: [state] Locking Datavault
2,856,786 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,390 UART: [state] Locking ICCM
2,857,854 UART: [exit] Launching FMC @ 0x40000130
2,863,183 UART:
2,863,199 UART: Running Caliptra FMC ...
2,863,607 UART:
2,863,750 UART: [state] CFI Enabled
2,874,381 UART: [fht] FMC Alias Private Key: 7
2,982,940 UART: [art] Extend RT PCRs Done
2,983,368 UART: [art] Lock RT PCRs Done
2,984,968 UART: [art] Populate DV Done
2,993,163 UART: [fht] FMC Alias Private Key: 7
2,994,205 UART: [art] Derive CDI
2,994,485 UART: [art] Store in in slot 0x4
3,079,872 UART: [art] Derive Key Pair
3,080,232 UART: [art] Store priv key in slot 0x5
3,093,264 UART: [art] Derive Key Pair - Done
3,108,075 UART: [art] Signing Cert with AUTHO
3,108,555 UART: RITY.KEYID = 7
3,123,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,730 UART: [art] PUB.X = 2D4302903A66090BD57BFD390539CD3AE4ADED8E8E2A51DFED8CF1F98152E6D802B2582F1D389E9EF4B235ABE61393A4
3,131,499 UART: [art] PUB.Y = 740846383B17E1DC2AB45CDA6AED8713AD5196C8199C389859743662AB98DB9974947AD0C6A976DE1C58913FD10CB6A3
3,138,445 UART: [art] SIG.R = 8207E0F09DD670579F169A3F3DFEA5CED602D9E6421E51192C476759B15FF8A8F595D3368A6FE8B684FCAE9953D3A8F0
3,145,217 UART: [art] SIG.S = 64DFBA85212E88FB6A31F5CD2181DC507DF5482F52D0ED1E58F13AFAF059B7817339182105DF785DCF97428D898758D4
3,168,977 UART: Caliptra RT
3,169,322 UART: [state] CFI Enabled
3,276,391 UART: [rt] RT listening for mailbox commands...
3,277,061 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,455 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,107 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,831 ready_for_fw is high
1,056,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,119 >>> mbox cmd response: success
2,688,515 UART:
2,688,531 UART: Running Caliptra FMC ...
2,688,939 UART:
2,689,082 UART: [state] CFI Enabled
2,699,657 UART: [fht] FMC Alias Private Key: 7
2,807,344 UART: [art] Extend RT PCRs Done
2,807,772 UART: [art] Lock RT PCRs Done
2,808,992 UART: [art] Populate DV Done
2,817,049 UART: [fht] FMC Alias Private Key: 7
2,818,131 UART: [art] Derive CDI
2,818,411 UART: [art] Store in in slot 0x4
2,903,968 UART: [art] Derive Key Pair
2,904,328 UART: [art] Store priv key in slot 0x5
2,917,302 UART: [art] Derive Key Pair - Done
2,932,064 UART: [art] Signing Cert with AUTHO
2,932,544 UART: RITY.KEYID = 7
2,947,748 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,513 UART: [art] PUB.X = 5F98E5AED5B2F728B84517FE438D0150CBAD9B88CF8645DE1A26810733EFF62F1699E75D35312171184CE971AFEB662E
2,955,283 UART: [art] PUB.Y = F4EE1EB2F87711594EEB4BF891908F79C962952CD507C1E266FDEABFE8F16E72772B6B6F77F7D1CA2475C08C7653021F
2,962,237 UART: [art] SIG.R = 85C081A0D102AC39D2A034E95CF5DD1DABBB626DC099D0B9EEF5DCE809871FEA8644340EF91751401B0A15DEC122C2CC
2,969,013 UART: [art] SIG.S = BDDB0A04483404ED6E7699E4B7E0620EEC772825D9D29EE3A74EA857A1ABC2528CC89A8385BB965DD48DD04411F48204
2,992,105 UART: Caliptra RT
2,992,450 UART: [state] CFI Enabled
3,100,684 UART: [rt] RT listening for mailbox commands...
3,101,354 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,998 UART: [rt]cmd =0x4c4d5356, len=1672
3,394,372 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,136 UART:
192,494 UART: Running Caliptra ROM ...
193,598 UART:
193,744 UART: [state] CFI Enabled
264,223 UART: [state] LifecycleState = Unprovisioned
266,238 UART: [state] DebugLocked = No
268,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,997 UART: [kat] SHA2-256
442,637 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,160 UART: [kat] ++
453,690 UART: [kat] sha1
465,228 UART: [kat] SHA2-256
467,922 UART: [kat] SHA2-384
474,767 UART: [kat] SHA2-512-ACC
477,143 UART: [kat] ECC-384
2,768,301 UART: [kat] HMAC-384Kdf
2,800,712 UART: [kat] LMS
3,991,025 UART: [kat] --
3,995,909 UART: [cold-reset] ++
3,998,487 UART: [fht] Storing FHT @ 0x50003400
4,010,682 UART: [idev] ++
4,011,269 UART: [idev] CDI.KEYID = 6
4,012,193 UART: [idev] SUBJECT.KEYID = 7
4,013,446 UART: [idev] UDS.KEYID = 0
4,014,589 ready_for_fw is high
4,014,828 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,499 UART: [idev] Erasing UDS.KEYID = 0
7,343,496 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,223 UART: [idev] --
7,369,894 UART: [ldev] ++
7,370,463 UART: [ldev] CDI.KEYID = 6
7,371,428 UART: [ldev] SUBJECT.KEYID = 5
7,372,635 UART: [ldev] AUTHORITY.KEYID = 7
7,373,869 UART: [ldev] FE.KEYID = 1
7,420,119 UART: [ldev] Erasing FE.KEYID = 1
10,753,312 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,508 UART: [ldev] --
13,132,741 UART: [fwproc] Waiting for Commands...
13,134,667 UART: [fwproc] Received command 0x46574c44
13,136,845 UART: [fwproc] Received Image of size 114124 bytes
17,187,486 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,598 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,649,378 >>> mbox cmd response: success
17,653,752 UART: [afmc] ++
17,654,351 UART: [afmc] CDI.KEYID = 6
17,655,241 UART: [afmc] SUBJECT.KEYID = 7
17,656,516 UART: [afmc] AUTHORITY.KEYID = 5
21,023,639 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,322,858 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,325,115 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,339,540 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,354,380 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,368,791 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,390,475 UART: [afmc] --
23,393,691 UART: [cold-reset] --
23,399,228 UART: [state] Locking Datavault
23,406,590 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,340 UART: [state] Locking ICCM
23,409,899 UART: [exit] Launching FMC @ 0x40000130
23,418,295 UART:
23,418,538 UART: Running Caliptra FMC ...
23,419,640 UART:
23,419,793 UART: [state] CFI Enabled
23,481,713 UART: [fht] FMC Alias Private Key: 7
25,819,295 UART: [art] Extend RT PCRs Done
25,820,649 UART: [art] Lock RT PCRs Done
25,822,006 UART: [art] Populate DV Done
25,827,153 UART: [fht] FMC Alias Private Key: 7
25,828,804 UART: [art] Derive CDI
25,829,631 UART: [art] Store in in slot 0x4
25,888,887 UART: [art] Derive Key Pair
25,889,876 UART: [art] Store priv key in slot 0x5
29,182,757 UART: [art] Derive Key Pair - Done
29,195,754 UART: [art] Signing Cert with AUTHO
29,197,057 UART: RITY.KEYID = 7
31,483,993 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,555 UART: [art] PUB.X = 0CFA3F763F2B838B5DFBBF800A01AA04F0F6FA471D1D05D1467F932363261D4FEA1B8FE26D0883E66A5954F6C8B32444
31,492,759 UART: [art] PUB.Y = ABCB3A2C49F75B0D95BB56DD491D4ABBA3C760E0A72F060B092038A2B82D223162F59E01AA013782766AEF0CA0B67934
31,499,989 UART: [art] SIG.R = E291A6006E3254431FFB8D848C0764ADE655CB2BAF59DF7B1A4593433BADB2B2DEC6CD15EC418C20E5D33F8146F8C5A3
31,507,430 UART: [art] SIG.S = B28C1D02798EBC9972D047ADFFE751179D5DE3046516F8A62FF8207C84296761B16A55A0C6316C294EABF254ED447F08
32,812,491 UART: Caliptra RT
32,813,211 UART: [state] CFI Enabled
32,994,384 UART: [rt] RT listening for mailbox commands...
32,998,417 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,043,011 UART: [rt]cmd =0x4c4d5356, len=1672
33,457,798 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,316 writing to cptra_bootfsm_go
3,803,192 ready_for_fw is high
3,803,573 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,905,079 >>> mbox cmd response: success
23,585,013 UART:
23,585,448 UART: Running Caliptra FMC ...
23,586,568 UART:
23,586,721 UART: [state] CFI Enabled
23,656,051 UART: [fht] FMC Alias Private Key: 7
25,993,904 UART: [art] Extend RT PCRs Done
25,995,128 UART: [art] Lock RT PCRs Done
25,996,897 UART: [art] Populate DV Done
26,002,446 UART: [fht] FMC Alias Private Key: 7
26,003,927 UART: [art] Derive CDI
26,004,702 UART: [art] Store in in slot 0x4
26,065,325 UART: [art] Derive Key Pair
26,066,332 UART: [art] Store priv key in slot 0x5
29,358,953 UART: [art] Derive Key Pair - Done
29,371,911 UART: [art] Signing Cert with AUTHO
29,373,246 UART: RITY.KEYID = 7
31,661,354 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,861 UART: [art] PUB.X = FD1F87B4AF4D87FF03FC4481EC98D7653BA2D5EF70017960B5501D7A032C2142B4D8C11E012BDAA130DA4EB1C0BCA084
31,670,142 UART: [art] PUB.Y = D536FF90CC393AF22AEB65B6FEE1A121672B9B282ADE026C1C3C6D54027199C1F381FA8110BC5AC66BA825F05CDBFE4E
31,677,394 UART: [art] SIG.R = D779D35CE3B5E90922DE0E44BFE4AF4BB577C89C64EFB452A9890E22400B6A45FDDD8A696E5A8509CC55B563B009544D
31,684,814 UART: [art] SIG.S = 49A303E95332E892F5C5A463DAC13F6229246EE995D6A63C9325E6FFEEEBCCB4A8D22583AFDC665F3A3BA9DA016CF320
32,989,714 UART: Caliptra RT
32,990,418 UART: [state] CFI Enabled
33,151,875 UART: [rt] RT listening for mailbox commands...
33,155,891 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,200,251 UART: [rt]cmd =0x4c4d5356, len=1672
33,614,751 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,442 UART:
192,819 UART: Running Caliptra ROM ...
193,910 UART:
603,468 UART: [state] CFI Enabled
617,196 UART: [state] LifecycleState = Unprovisioned
619,139 UART: [state] DebugLocked = No
622,140 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,435 UART: [kat] SHA2-256
796,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,734 UART: [kat] ++
807,173 UART: [kat] sha1
819,744 UART: [kat] SHA2-256
822,463 UART: [kat] SHA2-384
828,096 UART: [kat] SHA2-512-ACC
830,502 UART: [kat] ECC-384
3,113,221 UART: [kat] HMAC-384Kdf
3,125,477 UART: [kat] LMS
4,315,592 UART: [kat] --
4,320,748 UART: [cold-reset] ++
4,322,114 UART: [fht] Storing FHT @ 0x50003400
4,332,672 UART: [idev] ++
4,333,227 UART: [idev] CDI.KEYID = 6
4,334,179 UART: [idev] SUBJECT.KEYID = 7
4,335,419 UART: [idev] UDS.KEYID = 0
4,336,428 ready_for_fw is high
4,336,650 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,308 UART: [idev] Erasing UDS.KEYID = 0
7,624,379 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,285 UART: [idev] --
7,651,908 UART: [ldev] ++
7,652,483 UART: [ldev] CDI.KEYID = 6
7,653,414 UART: [ldev] SUBJECT.KEYID = 5
7,654,637 UART: [ldev] AUTHORITY.KEYID = 7
7,655,917 UART: [ldev] FE.KEYID = 1
7,666,452 UART: [ldev] Erasing FE.KEYID = 1
10,957,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,299 UART: [ldev] --
13,316,166 UART: [fwproc] Waiting for Commands...
13,318,579 UART: [fwproc] Received command 0x46574c44
13,320,809 UART: [fwproc] Received Image of size 114124 bytes
17,383,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,109 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,842,298 >>> mbox cmd response: success
17,846,072 UART: [afmc] ++
17,846,672 UART: [afmc] CDI.KEYID = 6
17,847,634 UART: [afmc] SUBJECT.KEYID = 7
17,848,846 UART: [afmc] AUTHORITY.KEYID = 5
21,163,325 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,180 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,499 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,879 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,665 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,098 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,069 UART: [afmc] --
23,526,176 UART: [cold-reset] --
23,529,283 UART: [state] Locking Datavault
23,534,259 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,008 UART: [state] Locking ICCM
23,537,937 UART: [exit] Launching FMC @ 0x40000130
23,546,361 UART:
23,546,637 UART: Running Caliptra FMC ...
23,547,748 UART:
23,547,903 UART: [state] CFI Enabled
23,555,946 UART: [fht] FMC Alias Private Key: 7
25,886,586 UART: [art] Extend RT PCRs Done
25,887,806 UART: [art] Lock RT PCRs Done
25,889,425 UART: [art] Populate DV Done
25,894,726 UART: [fht] FMC Alias Private Key: 7
25,896,323 UART: [art] Derive CDI
25,897,131 UART: [art] Store in in slot 0x4
25,939,826 UART: [art] Derive Key Pair
25,940,821 UART: [art] Store priv key in slot 0x5
29,182,666 UART: [art] Derive Key Pair - Done
29,195,336 UART: [art] Signing Cert with AUTHO
29,196,636 UART: RITY.KEYID = 7
31,475,711 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,219 UART: [art] PUB.X = F494F821BB2C0F083E0F89B52204507AE3E1C007675473D56438C8AD236E34F830A5CD3209427DDB25AC42D124653351
31,484,446 UART: [art] PUB.Y = 091AC579812CD8FA39D436694FA3466709F4A4F9DB431343AB91E9AA1392DB6D0AEBA378A6FC6724CF1CF00C323EC62F
31,491,652 UART: [art] SIG.R = 694D93B729DBE58376E2259DFE89B3FDB766A6839587950858E0C596C0090BC315A8036466118E6F7FE3B04EBD9D6603
31,499,028 UART: [art] SIG.S = A0942EE3CFE0FBF23524D2C4D5102085F69C0FA3D213D7919129AD17A409862B6C8DF8895FB677CA5CCD05F15A3802F7
32,804,429 UART: Caliptra RT
32,805,139 UART: [state] CFI Enabled
32,923,890 UART: [rt] RT listening for mailbox commands...
32,927,823 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,972,378 UART: [rt]cmd =0x4c4d5356, len=1672
33,386,944 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
4,126,559 ready_for_fw is high
4,126,961 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,114 >>> mbox cmd response: success
23,713,761 UART:
23,714,164 UART: Running Caliptra FMC ...
23,715,285 UART:
23,715,441 UART: [state] CFI Enabled
23,723,178 UART: [fht] FMC Alias Private Key: 7
26,053,117 UART: [art] Extend RT PCRs Done
26,054,358 UART: [art] Lock RT PCRs Done
26,056,094 UART: [art] Populate DV Done
26,061,357 UART: [fht] FMC Alias Private Key: 7
26,062,904 UART: [art] Derive CDI
26,063,668 UART: [art] Store in in slot 0x4
26,106,261 UART: [art] Derive Key Pair
26,107,258 UART: [art] Store priv key in slot 0x5
29,349,271 UART: [art] Derive Key Pair - Done
29,362,161 UART: [art] Signing Cert with AUTHO
29,363,467 UART: RITY.KEYID = 7
31,642,752 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,261 UART: [art] PUB.X = CA22377FB74FB4ECFB8F0268159F627D48A1B055B4C1AE0C22EBCF0A8AE25BAB99E04DA852176659DA29A76DCB92959A
31,651,458 UART: [art] PUB.Y = BE57827B0CF27DCE6E6C0BC1448C8AB2C58D658662FB10CA62D12E3171A68F6BF526275A95E599685498498A9C819773
31,658,693 UART: [art] SIG.R = 7F1F6672DCD7ED15FC01B896968506CE7DF53648B39313C4A2133C01E7789BA2E62C1CDED2165711BAB725F64345DB59
31,666,056 UART: [art] SIG.S = 539C20A42AC9A1B79D97B86BDFF8E0B3AC896EABB303A3D3B28AED4D4F56B49188C18A14C53F218B1268838F22659901
32,971,368 UART: Caliptra RT
32,972,087 UART: [state] CFI Enabled
33,090,574 UART: [rt] RT listening for mailbox commands...
33,094,598 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,138,959 UART: [rt]cmd =0x4c4d5356, len=1672
33,553,364 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,075 UART:
192,456 UART: Running Caliptra ROM ...
193,659 UART:
193,818 UART: [state] CFI Enabled
269,484 UART: [state] LifecycleState = Unprovisioned
271,390 UART: [state] DebugLocked = No
274,062 UART: [state] WD Timer not started. Device not locked for debugging
277,988 UART: [kat] SHA2-256
456,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
468,459 UART: [kat] ++
468,998 UART: [kat] sha1
479,741 UART: [kat] SHA2-256
482,751 UART: [kat] SHA2-384
487,529 UART: [kat] SHA2-512-ACC
490,535 UART: [kat] ECC-384
2,950,225 UART: [kat] HMAC-384Kdf
2,972,785 UART: [kat] LMS
3,502,206 UART: [kat] --
3,506,623 UART: [cold-reset] ++
3,507,699 UART: [fht] FHT @ 0x50003400
3,517,399 UART: [idev] ++
3,518,017 UART: [idev] CDI.KEYID = 6
3,518,909 UART: [idev] SUBJECT.KEYID = 7
3,520,083 UART: [idev] UDS.KEYID = 0
3,520,989 ready_for_fw is high
3,521,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,134 UART: [idev] Erasing UDS.KEYID = 0
6,028,856 UART: [idev] Sha1 KeyId Algorithm
6,051,692 UART: [idev] --
6,055,238 UART: [ldev] ++
6,055,820 UART: [ldev] CDI.KEYID = 6
6,056,734 UART: [ldev] SUBJECT.KEYID = 5
6,057,902 UART: [ldev] AUTHORITY.KEYID = 7
6,059,189 UART: [ldev] FE.KEYID = 1
6,102,745 UART: [ldev] Erasing FE.KEYID = 1
8,604,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,914 UART: [ldev] --
10,415,996 UART: [fwproc] Wait for Commands...
10,419,169 UART: [fwproc] Recv command 0x46574c44
10,421,259 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,511 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,286,943 >>> mbox cmd response: success
14,290,727 UART: [afmc] ++
14,291,333 UART: [afmc] CDI.KEYID = 6
14,292,251 UART: [afmc] SUBJECT.KEYID = 7
14,293,410 UART: [afmc] AUTHORITY.KEYID = 5
16,827,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,994 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,847 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,138 UART: [afmc] --
18,631,942 UART: [cold-reset] --
18,636,713 UART: [state] Locking Datavault
18,643,138 UART: [state] Locking PCR0, PCR1 and PCR31
18,644,834 UART: [state] Locking ICCM
18,647,111 UART: [exit] Launching FMC @ 0x40000130
18,655,505 UART:
18,655,747 UART: Running Caliptra FMC ...
18,656,845 UART:
18,657,010 UART: [state] CFI Enabled
18,711,834 UART: [fht] FMC Alias Private Key: 7
20,476,248 UART: [art] Extend RT PCRs Done
20,477,457 UART: [art] Lock RT PCRs Done
20,479,347 UART: [art] Populate DV Done
20,484,805 UART: [fht] FMC Alias Private Key: 7
20,486,393 UART: [art] Derive CDI
20,487,209 UART: [art] Store in in slot 0x4
20,545,014 UART: [art] Derive Key Pair
20,546,064 UART: [art] Store priv key in slot 0x5
23,009,324 UART: [art] Derive Key Pair - Done
23,022,226 UART: [art] Signing Cert with AUTHO
23,023,557 UART: RITY.KEYID = 7
24,735,022 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,527 UART: [art] PUB.X = 58D77E2E2233BDB1294A8C26614D82CB63A4AD7490F9AF4385A5C242FFB07A1B923C811761B4FA2AA7884F1A39B72B11
24,743,776 UART: [art] PUB.Y = 9665D0EB1932D0C64A649EABABD33C554E6B62A88118E6A544B8459ECD9CC5EB53E790FFBDF0619C44E70F1CA4EF3DC0
24,751,065 UART: [art] SIG.R = B3FCDA14F6DC9929D669B448CBBAE424A0AF1979140EED1375A3C28823ED479D78A7C7671BFD70D7BFEECE5AD772A82A
24,758,563 UART: [art] SIG.S = AB775097FB896CF59FF5C60E26741E4282CAE879C67F38ECF612EB51FB83D0274595A2AD9F8995606875AF825177378E
25,737,186 UART: Caliptra RT
25,737,888 UART: [state] CFI Enabled
25,903,984 UART: [rt] RT listening for mailbox commands...
25,907,988 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,952,978 UART: [rt]cmd =0x4c4d5356, len=1672
26,154,817 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,380,893 ready_for_fw is high
3,381,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,068,936 >>> mbox cmd response: success
18,360,490 UART:
18,360,879 UART: Running Caliptra FMC ...
18,362,198 UART:
18,362,374 UART: [state] CFI Enabled
18,412,580 UART: [fht] FMC Alias Private Key: 7
20,176,644 UART: [art] Extend RT PCRs Done
20,177,868 UART: [art] Lock RT PCRs Done
20,179,465 UART: [art] Populate DV Done
20,184,986 UART: [fht] FMC Alias Private Key: 7
20,186,525 UART: [art] Derive CDI
20,187,262 UART: [art] Store in in slot 0x4
20,245,386 UART: [art] Derive Key Pair
20,246,427 UART: [art] Store priv key in slot 0x5
22,709,477 UART: [art] Derive Key Pair - Done
22,722,694 UART: [art] Signing Cert with AUTHO
22,723,994 UART: RITY.KEYID = 7
24,435,172 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,670 UART: [art] PUB.X = D318EB7F1FFC0062179276A48D7079F086C7A798A0EDFD5DA8AA6D5AA21230F1F3FF2E36596A1421342E7E31E2406974
24,443,978 UART: [art] PUB.Y = 34E76955B0DF54A5DEFE4F61C8285250D11B08C9FE48A5F1071F93CB017ED97DAEE6B5D04FF9D739969794FE8937000D
24,451,186 UART: [art] SIG.R = 3210E09C95D0831CE85A10CE9332D8EDAD780BFB3DE8B84610851240210A7582900A466E8B048A8F3368228B45A058BA
24,458,531 UART: [art] SIG.S = EAFFE1F3DC9A9C7600A8A8E5F23C82A95408A55E14F158E202BFD2F9876E5831229253F45F498D36E1D6880C0C12388E
25,437,578 UART: Caliptra RT
25,438,276 UART: [state] CFI Enabled
25,602,791 UART: [rt] RT listening for mailbox commands...
25,606,755 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,652,172 UART: [rt]cmd =0x4c4d5356, len=1672
25,853,881 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,498 UART:
192,866 UART: Running Caliptra ROM ...
194,039 UART:
603,419 UART: [state] CFI Enabled
616,025 UART: [state] LifecycleState = Unprovisioned
617,924 UART: [state] DebugLocked = No
620,245 UART: [state] WD Timer not started. Device not locked for debugging
623,639 UART: [kat] SHA2-256
802,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,307 UART: [kat] ++
814,749 UART: [kat] sha1
826,218 UART: [kat] SHA2-256
829,220 UART: [kat] SHA2-384
836,550 UART: [kat] SHA2-512-ACC
839,478 UART: [kat] ECC-384
3,280,506 UART: [kat] HMAC-384Kdf
3,293,181 UART: [kat] LMS
3,822,709 UART: [kat] --
3,827,624 UART: [cold-reset] ++
3,829,334 UART: [fht] FHT @ 0x50003400
3,840,657 UART: [idev] ++
3,841,218 UART: [idev] CDI.KEYID = 6
3,842,143 UART: [idev] SUBJECT.KEYID = 7
3,843,309 UART: [idev] UDS.KEYID = 0
3,844,350 ready_for_fw is high
3,844,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,399 UART: [idev] Erasing UDS.KEYID = 0
6,316,241 UART: [idev] Sha1 KeyId Algorithm
6,339,033 UART: [idev] --
6,342,487 UART: [ldev] ++
6,343,050 UART: [ldev] CDI.KEYID = 6
6,343,954 UART: [ldev] SUBJECT.KEYID = 5
6,345,155 UART: [ldev] AUTHORITY.KEYID = 7
6,346,375 UART: [ldev] FE.KEYID = 1
6,357,333 UART: [ldev] Erasing FE.KEYID = 1
8,831,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,570 UART: [ldev] --
10,620,816 UART: [fwproc] Wait for Commands...
10,622,577 UART: [fwproc] Recv command 0x46574c44
10,624,657 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,855 >>> mbox cmd response: success
14,496,602 UART: [afmc] ++
14,497,190 UART: [afmc] CDI.KEYID = 6
14,498,067 UART: [afmc] SUBJECT.KEYID = 7
14,499,276 UART: [afmc] AUTHORITY.KEYID = 5
16,999,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,031 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,852 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,733 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,794,998 UART: [afmc] --
18,799,618 UART: [cold-reset] --
18,804,877 UART: [state] Locking Datavault
18,808,980 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,673 UART: [state] Locking ICCM
18,812,382 UART: [exit] Launching FMC @ 0x40000130
18,820,825 UART:
18,821,049 UART: Running Caliptra FMC ...
18,822,145 UART:
18,822,297 UART: [state] CFI Enabled
18,830,443 UART: [fht] FMC Alias Private Key: 7
20,587,338 UART: [art] Extend RT PCRs Done
20,588,569 UART: [art] Lock RT PCRs Done
20,590,351 UART: [art] Populate DV Done
20,595,810 UART: [fht] FMC Alias Private Key: 7
20,597,515 UART: [art] Derive CDI
20,598,324 UART: [art] Store in in slot 0x4
20,640,859 UART: [art] Derive Key Pair
20,641,897 UART: [art] Store priv key in slot 0x5
23,068,970 UART: [art] Derive Key Pair - Done
23,081,799 UART: [art] Signing Cert with AUTHO
23,083,134 UART: RITY.KEYID = 7
24,788,314 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,811 UART: [art] PUB.X = 7EA9B73A975CF097023B664284CD91E34BCC9B8791ADC7E8C038625157BBB393E26BE68712CE323AC221E5CCF71ED713
24,797,089 UART: [art] PUB.Y = 3CD1BC7B7D453818FDE9E2BBAA7A40DA0967C2389CDEF0F4466B43FEE671A03984D3D13B1FEF97D4C0623D9924413F12
24,804,355 UART: [art] SIG.R = 2E7B4ACC38F5E91472A7D42AEA9A3780B277A76CD6CA9B0379FE5C42541D26CD98EB9EC0090D965D91EBFCF6B5BCFD61
24,811,786 UART: [art] SIG.S = 8B3DF87C439EA208437A4532B0854F35C8D253CB7041EFAF69F872A2D8B39D617FF16DFCBC35782264E6604CA2491E02
25,790,626 UART: Caliptra RT
25,791,338 UART: [state] CFI Enabled
25,908,549 UART: [rt] RT listening for mailbox commands...
25,912,515 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,957,128 UART: [rt]cmd =0x4c4d5356, len=1672
26,159,120 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,698,836 ready_for_fw is high
3,699,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,873 >>> mbox cmd response: success
18,522,813 UART:
18,523,233 UART: Running Caliptra FMC ...
18,524,435 UART:
18,524,596 UART: [state] CFI Enabled
18,532,259 UART: [fht] FMC Alias Private Key: 7
20,288,653 UART: [art] Extend RT PCRs Done
20,289,872 UART: [art] Lock RT PCRs Done
20,291,386 UART: [art] Populate DV Done
20,296,739 UART: [fht] FMC Alias Private Key: 7
20,298,289 UART: [art] Derive CDI
20,299,102 UART: [art] Store in in slot 0x4
20,341,588 UART: [art] Derive Key Pair
20,342,628 UART: [art] Store priv key in slot 0x5
22,769,463 UART: [art] Derive Key Pair - Done
22,782,084 UART: [art] Signing Cert with AUTHO
22,783,388 UART: RITY.KEYID = 7
24,488,603 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,127 UART: [art] PUB.X = F76A35A0E2BF86315B1EAD1F267441D8C2A0778BB4212E5B46DA467BDF9ADB606BA7F7B110C7A5AB5BE2707C27F8B571
24,497,448 UART: [art] PUB.Y = 0FD4B51B3FE57010BFCE33DE1AD9FBE83186A2D89E71E8D495CAA5873DA4879BB21515ECFEE3E8EF32E41FD8F0CDC9ED
24,504,679 UART: [art] SIG.R = 4257CE2DF7ACBFC9C2BC0253B909425AAE71BE489A2723E1E433D30C3BCF3E15233C0C55D79BF1E13DA4CF443F17490B
24,512,122 UART: [art] SIG.S = B09D76B6D7AA00F5B0C10D0BB5573762F1FA4D0435C9178DE3CA84A30B8FC235C064AC5D4A01685F090AFEB9CDFFB047
25,491,130 UART: Caliptra RT
25,491,838 UART: [state] CFI Enabled
25,608,933 UART: [rt] RT listening for mailbox commands...
25,612,910 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,657,373 UART: [rt]cmd =0x4c4d5356, len=1672
25,859,236 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,439,371 ready_for_fw is high
3,439,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,766,439 >>> mbox cmd response: success
19,086,225 UART:
19,086,621 UART: Running Caliptra FMC ...
19,087,811 UART:
19,087,989 UART: [state] CFI Enabled
19,154,315 UART: [fht] FMC Alias Private Key: 7
20,918,341 UART: [art] Extend RT PCRs Done
20,919,551 UART: [art] Lock RT PCRs Done
20,921,187 UART: [art] Populate DV Done
20,926,756 UART: [fht] FMC Alias Private Key: 7
20,928,310 UART: [art] Derive CDI
20,929,133 UART: [art] Store in in slot 0x4
20,987,368 UART: [art] Derive Key Pair
20,988,429 UART: [art] Store priv key in slot 0x5
23,450,577 UART: [art] Derive Key Pair - Done
23,463,845 UART: [art] Signing Cert with AUTHO
23,465,152 UART: RITY.KEYID = 7
25,176,504 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,002 UART: [art] PUB.X = A88173FBF95C7DE0A451637D770F0F575CC9C630E8D0685A0E3E427A0A931F3E2964DBE02498519F31BFF7191DF4A3AC
25,185,251 UART: [art] PUB.Y = 6ECB957C49FB936CA07B763036DD8E0F6969A72AAF19234C3428AA96E9B2AA7DF864AF9635E993B68EF91D4483A85C9E
25,192,552 UART: [art] SIG.R = 4EC0188C19A2E84E3CEED5B14C012526E7F7931EAB1B47271705DB619033BD09F4208B2A3804D5CE916C1D79CF4DC658
25,199,937 UART: [art] SIG.S = 752D0F7462A530DBF63C8488B10E905E7F7ABCC0F18403E6BDC842CAB225535629A41C4AB9FF19D9E1C5F08BB26E57C3
26,179,374 UART: Caliptra RT
26,180,062 UART: [state] CFI Enabled
26,344,526 UART: [rt] RT listening for mailbox commands...
26,348,475 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,393,418 UART: [rt]cmd =0x4c4d5356, len=1672
26,595,503 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,751,358 ready_for_fw is high
3,752,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,862 >>> mbox cmd response: success
19,219,351 UART:
19,219,736 UART: Running Caliptra FMC ...
19,220,927 UART:
19,221,094 UART: [state] CFI Enabled
19,229,102 UART: [fht] FMC Alias Private Key: 7
20,986,610 UART: [art] Extend RT PCRs Done
20,987,835 UART: [art] Lock RT PCRs Done
20,989,408 UART: [art] Populate DV Done
20,994,823 UART: [fht] FMC Alias Private Key: 7
20,996,533 UART: [art] Derive CDI
20,997,297 UART: [art] Store in in slot 0x4
21,039,760 UART: [art] Derive Key Pair
21,040,772 UART: [art] Store priv key in slot 0x5
23,467,598 UART: [art] Derive Key Pair - Done
23,480,381 UART: [art] Signing Cert with AUTHO
23,481,715 UART: RITY.KEYID = 7
25,186,951 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,454 UART: [art] PUB.X = 60D7CD07082C68FF0DE3237F628038C02420BADB37694D54C0535F8817EB06E2B3D61E79BF763D0DF86B63448E58ED40
25,195,748 UART: [art] PUB.Y = 35A5246213CD223D9B8CE84901EDC37700C397BCC7AB4A412D8D82FEBD8CDEEBAC6DC7067D23CDB8B0C3EFF18C596180
25,203,028 UART: [art] SIG.R = 88CEFB905404AB63C16183F378A22BE874E5115216D9661EF560C33C458D98E8EC5584A982AC75121BC873E7E67A7784
25,210,358 UART: [art] SIG.S = 564857C0C3A5079FF9A477DCE38E896319C53D7FBCAF0DB0A5B17956295ACDE60206337A303EA8C41FB84F3B65032949
26,189,118 UART: Caliptra RT
26,189,835 UART: [state] CFI Enabled
26,307,078 UART: [rt] RT listening for mailbox commands...
26,311,014 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,355,469 UART: [rt]cmd =0x4c4d5356, len=1672
26,557,378 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,634 UART: [state] LifecycleState = Unprovisioned
86,289 UART: [state] DebugLocked = No
86,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,463 UART: [kat] SHA2-256
882,394 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,509 UART: [kat] ++
886,661 UART: [kat] sha1
890,965 UART: [kat] SHA2-256
892,903 UART: [kat] SHA2-384
895,860 UART: [kat] SHA2-512-ACC
897,761 UART: [kat] ECC-384
903,240 UART: [kat] HMAC-384Kdf
907,958 UART: [kat] LMS
1,476,154 UART: [kat] --
1,477,361 UART: [cold-reset] ++
1,477,815 UART: [fht] Storing FHT @ 0x50003400
1,480,752 UART: [idev] ++
1,480,920 UART: [idev] CDI.KEYID = 6
1,481,280 UART: [idev] SUBJECT.KEYID = 7
1,481,704 UART: [idev] UDS.KEYID = 0
1,482,049 ready_for_fw is high
1,482,049 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,774 UART: [idev] Erasing UDS.KEYID = 0
1,506,608 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,242 UART: [idev] --
1,516,399 UART: [ldev] ++
1,516,567 UART: [ldev] CDI.KEYID = 6
1,516,930 UART: [ldev] SUBJECT.KEYID = 5
1,517,356 UART: [ldev] AUTHORITY.KEYID = 7
1,517,819 UART: [ldev] FE.KEYID = 1
1,522,855 UART: [ldev] Erasing FE.KEYID = 1
1,547,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,552 UART: [ldev] --
1,586,879 UART: [fwproc] Waiting for Commands...
1,587,542 UART: [fwproc] Received command 0x46574c44
1,588,333 UART: [fwproc] Received Image of size 114448 bytes
2,887,589 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,487 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,998 >>> mbox cmd response: success
3,081,040 UART: [afmc] ++
3,081,208 UART: [afmc] CDI.KEYID = 6
3,081,570 UART: [afmc] SUBJECT.KEYID = 7
3,081,995 UART: [afmc] AUTHORITY.KEYID = 5
3,116,928 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,330 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,838 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,723 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,413 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,140 UART: [afmc] --
3,160,048 UART: [cold-reset] --
3,160,628 UART: [state] Locking Datavault
3,161,607 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,211 UART: [state] Locking ICCM
3,162,811 UART: [exit] Launching FMC @ 0x40000130
3,168,140 UART:
3,168,156 UART: Running Caliptra FMC ...
3,168,564 UART:
3,168,618 UART: [state] CFI Enabled
3,178,955 UART: [fht] FMC Alias Private Key: 7
3,286,942 UART: [art] Extend RT PCRs Done
3,287,370 UART: [art] Lock RT PCRs Done
3,288,602 UART: [art] Populate DV Done
3,296,659 UART: [fht] FMC Alias Private Key: 7
3,297,775 UART: [art] Derive CDI
3,298,055 UART: [art] Store in in slot 0x4
3,383,460 UART: [art] Derive Key Pair
3,383,820 UART: [art] Store priv key in slot 0x5
3,396,656 UART: [art] Derive Key Pair - Done
3,411,647 UART: [art] Signing Cert with AUTHO
3,412,127 UART: RITY.KEYID = 7
3,427,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,698 UART: [art] PUB.X = 5E01C68FC2D2C281B835F6219A07D109372FD15FA2A6C079393F21A33DF43BD5C2FCE1D325BFAA331FE6D4152E9908DA
3,435,468 UART: [art] PUB.Y = E35C0605F44E0B43135032B8A836DC2A9FD3968A1942611B7C6A00FB3418065279122A7B71F66B285F05E9970E12165E
3,442,368 UART: [art] SIG.R = 7258B69387629CB733D6D1F7BBE7DE063AC7EDA61422B0E17D7A78C864445E8444FA6E512EE936DC9078BD12BE78F1B7
3,449,143 UART: [art] SIG.S = 44CB51E38CF34AC044F66AFA2DE3D9F0CDEFB058A9901110EED9299FEC9A4F9BF7282180DF4B005FA23F8B96D52AB97A
3,473,368 UART: Caliptra RT
3,473,621 UART: [state] CFI Enabled
3,582,347 UART: [rt] RT listening for mailbox commands...
3,583,017 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,897 UART: [rt]cmd =0x4c4d5356, len=1672
3,876,559 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,247 ready_for_fw is high
1,363,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,733 >>> mbox cmd response: success
2,991,679 UART:
2,991,695 UART: Running Caliptra FMC ...
2,992,103 UART:
2,992,157 UART: [state] CFI Enabled
3,002,724 UART: [fht] FMC Alias Private Key: 7
3,110,347 UART: [art] Extend RT PCRs Done
3,110,775 UART: [art] Lock RT PCRs Done
3,112,197 UART: [art] Populate DV Done
3,120,372 UART: [fht] FMC Alias Private Key: 7
3,121,370 UART: [art] Derive CDI
3,121,650 UART: [art] Store in in slot 0x4
3,207,219 UART: [art] Derive Key Pair
3,207,579 UART: [art] Store priv key in slot 0x5
3,220,597 UART: [art] Derive Key Pair - Done
3,235,290 UART: [art] Signing Cert with AUTHO
3,235,770 UART: RITY.KEYID = 7
3,250,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,727 UART: [art] PUB.X = 92CC1C704B4027F886EF7A89047C6D35B0C73E87F04549A6DB819B1653CFB5053565E8D8FBBCC395F33E7FB594AED685
3,258,499 UART: [art] PUB.Y = 025123C0AA190D9E7391E2AAA21008DAE36138989CF86EE5717B06E210D2C54C6E7259F8D1CFDAA7A2CEC93CF0B8D801
3,265,446 UART: [art] SIG.R = 9FDCBF466C3B85B7658D565F619EFBF01F5362E75763CE96EC1F900A23A74216FAF5E131CF4353B490357BB9EB1BA650
3,272,223 UART: [art] SIG.S = B1FC1610E54232DD8C322CE50C3134D4839E35BF389FBF721C3FD6223FC67CD389516B6F8A45F4D061850E125007DDEE
3,296,275 UART: Caliptra RT
3,296,528 UART: [state] CFI Enabled
3,404,056 UART: [rt] RT listening for mailbox commands...
3,404,726 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,498 UART: [rt]cmd =0x4c4d5356, len=1672
3,698,096 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,508 UART: [kat] SHA2-256
882,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,554 UART: [kat] ++
886,706 UART: [kat] sha1
891,136 UART: [kat] SHA2-256
893,074 UART: [kat] SHA2-384
895,899 UART: [kat] SHA2-512-ACC
897,800 UART: [kat] ECC-384
903,707 UART: [kat] HMAC-384Kdf
908,511 UART: [kat] LMS
1,476,707 UART: [kat] --
1,477,730 UART: [cold-reset] ++
1,478,132 UART: [fht] Storing FHT @ 0x50003400
1,480,919 UART: [idev] ++
1,481,087 UART: [idev] CDI.KEYID = 6
1,481,447 UART: [idev] SUBJECT.KEYID = 7
1,481,871 UART: [idev] UDS.KEYID = 0
1,482,216 ready_for_fw is high
1,482,216 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,231 UART: [idev] Erasing UDS.KEYID = 0
1,506,905 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,617 UART: [idev] --
1,516,594 UART: [ldev] ++
1,516,762 UART: [ldev] CDI.KEYID = 6
1,517,125 UART: [ldev] SUBJECT.KEYID = 5
1,517,551 UART: [ldev] AUTHORITY.KEYID = 7
1,518,014 UART: [ldev] FE.KEYID = 1
1,523,192 UART: [ldev] Erasing FE.KEYID = 1
1,548,673 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,043 UART: [ldev] --
1,588,492 UART: [fwproc] Waiting for Commands...
1,589,353 UART: [fwproc] Received command 0x46574c44
1,590,144 UART: [fwproc] Received Image of size 114448 bytes
2,889,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,933 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,432 >>> mbox cmd response: success
3,083,440 UART: [afmc] ++
3,083,608 UART: [afmc] CDI.KEYID = 6
3,083,970 UART: [afmc] SUBJECT.KEYID = 7
3,084,395 UART: [afmc] AUTHORITY.KEYID = 5
3,119,386 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,692 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,472 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,200 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,085 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,775 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,728 UART: [afmc] --
3,162,644 UART: [cold-reset] --
3,163,226 UART: [state] Locking Datavault
3,164,213 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,817 UART: [state] Locking ICCM
3,165,305 UART: [exit] Launching FMC @ 0x40000130
3,170,634 UART:
3,170,650 UART: Running Caliptra FMC ...
3,171,058 UART:
3,171,201 UART: [state] CFI Enabled
3,181,704 UART: [fht] FMC Alias Private Key: 7
3,289,771 UART: [art] Extend RT PCRs Done
3,290,199 UART: [art] Lock RT PCRs Done
3,291,549 UART: [art] Populate DV Done
3,299,790 UART: [fht] FMC Alias Private Key: 7
3,300,972 UART: [art] Derive CDI
3,301,252 UART: [art] Store in in slot 0x4
3,386,927 UART: [art] Derive Key Pair
3,387,287 UART: [art] Store priv key in slot 0x5
3,400,697 UART: [art] Derive Key Pair - Done
3,415,523 UART: [art] Signing Cert with AUTHO
3,416,003 UART: RITY.KEYID = 7
3,431,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,804 UART: [art] PUB.X = 6E6A8A000090C76720CB87836B99FE848C6AA6415568C02640A097DCEA4D352C31E48EEA8B58B6BF562DC485C91F2722
3,438,532 UART: [art] PUB.Y = E78FEC8670ED52D2CB2349FC1E69960083B90F1C25FE276E41E32F8EDC0F9419705371A980D638A96CBD549C5B8F8B14
3,445,460 UART: [art] SIG.R = 21E7A5E181DF7337B48BA439E312451D6442C12B8069D2856D3D658D77847DAC6967E06CEA9E0A33503154B90B6C6DCC
3,452,224 UART: [art] SIG.S = 05182A106EAAC461677A19DFAD96DBEEA274FC430904A164A2A0153CC2FEDE8BFB70141F997D022C6C17B9D7510B81C0
3,475,818 UART: Caliptra RT
3,476,163 UART: [state] CFI Enabled
3,583,931 UART: [rt] RT listening for mailbox commands...
3,584,601 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,331 UART: [rt]cmd =0x4c4d5356, len=1672
3,877,975 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,226 ready_for_fw is high
1,363,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,450 >>> mbox cmd response: success
2,993,898 UART:
2,993,914 UART: Running Caliptra FMC ...
2,994,322 UART:
2,994,465 UART: [state] CFI Enabled
3,005,150 UART: [fht] FMC Alias Private Key: 7
3,113,203 UART: [art] Extend RT PCRs Done
3,113,631 UART: [art] Lock RT PCRs Done
3,115,427 UART: [art] Populate DV Done
3,123,574 UART: [fht] FMC Alias Private Key: 7
3,124,582 UART: [art] Derive CDI
3,124,862 UART: [art] Store in in slot 0x4
3,210,375 UART: [art] Derive Key Pair
3,210,735 UART: [art] Store priv key in slot 0x5
3,223,655 UART: [art] Derive Key Pair - Done
3,238,054 UART: [art] Signing Cert with AUTHO
3,238,534 UART: RITY.KEYID = 7
3,253,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,503 UART: [art] PUB.X = DCF989E7CBF98C0F8A85D614EF8F4D70B02698284F46035FE68754C27DAAED51E4BA20BC9836595D3D07549DBAB8D0A6
3,261,278 UART: [art] PUB.Y = 67116C2F946C8574B2B9C94188C15C5913D8118AE110D5EE0E414AA93418B4230B6B1A9A1ABE9C2C0861F385FBD487BC
3,268,223 UART: [art] SIG.R = 4C52CFBB33A0A67EBA68613BEF99FBEFF8F761B14CC01AD10AF1DE0326ECF3CE232E90BE99FD2008F8B47ACC7D76B5B7
3,275,014 UART: [art] SIG.S = AED7DEC2179A78DC0D1512847B2A02B5A3EC11CDC610CD29B6FBA7E73B6B8C774E02C0308628832496F5C6B3EA6F7422
3,298,240 UART: Caliptra RT
3,298,585 UART: [state] CFI Enabled
3,406,248 UART: [rt] RT listening for mailbox commands...
3,406,918 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,718 UART: [rt]cmd =0x4c4d5356, len=1672
3,700,138 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
893,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,311 UART: [kat] ++
897,463 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,456 UART: [kat] SHA2-512-ACC
908,357 UART: [kat] ECC-384
918,036 UART: [kat] HMAC-384Kdf
922,510 UART: [kat] LMS
1,170,838 UART: [kat] --
1,171,923 UART: [cold-reset] ++
1,172,315 UART: [fht] FHT @ 0x50003400
1,174,966 UART: [idev] ++
1,175,134 UART: [idev] CDI.KEYID = 6
1,175,494 UART: [idev] SUBJECT.KEYID = 7
1,175,918 UART: [idev] UDS.KEYID = 0
1,176,263 ready_for_fw is high
1,176,263 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,581 UART: [idev] Sha1 KeyId Algorithm
1,209,031 UART: [idev] --
1,210,241 UART: [ldev] ++
1,210,409 UART: [ldev] CDI.KEYID = 6
1,210,772 UART: [ldev] SUBJECT.KEYID = 5
1,211,198 UART: [ldev] AUTHORITY.KEYID = 7
1,211,661 UART: [ldev] FE.KEYID = 1
1,216,937 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,341 UART: [ldev] --
1,282,772 UART: [fwproc] Wait for Commands...
1,283,346 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,958 >>> mbox cmd response: success
2,776,986 UART: [afmc] ++
2,777,154 UART: [afmc] CDI.KEYID = 6
2,777,516 UART: [afmc] SUBJECT.KEYID = 7
2,777,941 UART: [afmc] AUTHORITY.KEYID = 5
2,813,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,125 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,853 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,738 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,457 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,339 UART: [afmc] --
2,857,385 UART: [cold-reset] --
2,858,191 UART: [state] Locking Datavault
2,859,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,892 UART: [state] Locking ICCM
2,860,544 UART: [exit] Launching FMC @ 0x40000130
2,865,873 UART:
2,865,889 UART: Running Caliptra FMC ...
2,866,297 UART:
2,866,351 UART: [state] CFI Enabled
2,876,772 UART: [fht] FMC Alias Private Key: 7
2,984,309 UART: [art] Extend RT PCRs Done
2,984,737 UART: [art] Lock RT PCRs Done
2,986,279 UART: [art] Populate DV Done
2,994,634 UART: [fht] FMC Alias Private Key: 7
2,995,748 UART: [art] Derive CDI
2,996,028 UART: [art] Store in in slot 0x4
3,081,549 UART: [art] Derive Key Pair
3,081,909 UART: [art] Store priv key in slot 0x5
3,095,247 UART: [art] Derive Key Pair - Done
3,110,030 UART: [art] Signing Cert with AUTHO
3,110,510 UART: RITY.KEYID = 7
3,125,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,217 UART: [art] PUB.X = 2985F1EC1F987D66EEBCCB079A8587B277F5E6EB860B2F6AFC9F63713D5DC886EBE03E73880287D7F73C42D6CEBA7E37
3,132,994 UART: [art] PUB.Y = F79D80A120C8C50678A55D7A4431279C024731FFD344279A2D687D49AB68A7A76FB002CCC5FCEBBA208211778F21AD20
3,139,939 UART: [art] SIG.R = 0D58A85D3A9A49790375B2F1E0E5AC9ABE06A97F08C87F254681E927AF4388C5C2FD8C6DC52AF9DA7328F945378B6022
3,146,703 UART: [art] SIG.S = 2223F084C3887CEF6ABE1298A6896063791DD45F4D0109A9261E8DEFDB52C7DC1B8877B6494479BFD44B4A212635FE08
3,170,619 UART: Caliptra RT
3,170,872 UART: [state] CFI Enabled
3,279,503 UART: [rt] RT listening for mailbox commands...
3,280,173 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,855 UART: [rt]cmd =0x4c4d5356, len=1672
3,573,347 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,591 ready_for_fw is high
1,060,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,299 >>> mbox cmd response: success
2,690,241 UART:
2,690,257 UART: Running Caliptra FMC ...
2,690,665 UART:
2,690,719 UART: [state] CFI Enabled
2,701,214 UART: [fht] FMC Alias Private Key: 7
2,809,137 UART: [art] Extend RT PCRs Done
2,809,565 UART: [art] Lock RT PCRs Done
2,811,377 UART: [art] Populate DV Done
2,819,618 UART: [fht] FMC Alias Private Key: 7
2,820,548 UART: [art] Derive CDI
2,820,828 UART: [art] Store in in slot 0x4
2,906,475 UART: [art] Derive Key Pair
2,906,835 UART: [art] Store priv key in slot 0x5
2,919,685 UART: [art] Derive Key Pair - Done
2,934,675 UART: [art] Signing Cert with AUTHO
2,935,155 UART: RITY.KEYID = 7
2,950,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,862 UART: [art] PUB.X = DCF5EA8087C164B208595F8E13E390A049B707B5F25CD4E0AFC4C89BF3192A14926281114CF005064535082B978A0FEC
2,957,614 UART: [art] PUB.Y = 0B6944B6CF643CA1825EEBFD4824279901113D0A0D4FFDD8E57C87E0BE4F1B2ABA94EE557A8305BF2580BF382E0B2919
2,964,558 UART: [art] SIG.R = 79844CBC09040AF1DB69E86EEBC1FBAA0F0BABD5D1D40081F519B8C8F64B99A63D6FD9D205995C78C3695C19883F1E2F
2,971,304 UART: [art] SIG.S = 9239A33474A407658733C210C0B893F7598A10C5C50965881AFB54A45DA2A4FABB3EB3D6096A5267014F9A9D63D8452E
2,995,457 UART: Caliptra RT
2,995,710 UART: [state] CFI Enabled
3,103,717 UART: [rt] RT listening for mailbox commands...
3,104,387 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,759 UART: [rt]cmd =0x4c4d5356, len=1672
3,397,261 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
893,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,986 UART: [kat] ++
898,138 UART: [kat] sha1
902,382 UART: [kat] SHA2-256
904,322 UART: [kat] SHA2-384
906,975 UART: [kat] SHA2-512-ACC
908,876 UART: [kat] ECC-384
918,533 UART: [kat] HMAC-384Kdf
923,337 UART: [kat] LMS
1,171,665 UART: [kat] --
1,172,546 UART: [cold-reset] ++
1,172,954 UART: [fht] FHT @ 0x50003400
1,175,607 UART: [idev] ++
1,175,775 UART: [idev] CDI.KEYID = 6
1,176,135 UART: [idev] SUBJECT.KEYID = 7
1,176,559 UART: [idev] UDS.KEYID = 0
1,176,904 ready_for_fw is high
1,176,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,543 UART: [idev] Erasing UDS.KEYID = 0
1,202,114 UART: [idev] Sha1 KeyId Algorithm
1,210,444 UART: [idev] --
1,211,366 UART: [ldev] ++
1,211,534 UART: [ldev] CDI.KEYID = 6
1,211,897 UART: [ldev] SUBJECT.KEYID = 5
1,212,323 UART: [ldev] AUTHORITY.KEYID = 7
1,212,786 UART: [ldev] FE.KEYID = 1
1,218,270 UART: [ldev] Erasing FE.KEYID = 1
1,244,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,360 UART: [ldev] --
1,283,827 UART: [fwproc] Wait for Commands...
1,284,443 UART: [fwproc] Recv command 0x46574c44
1,285,171 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,454 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,875 >>> mbox cmd response: success
2,777,941 UART: [afmc] ++
2,778,109 UART: [afmc] CDI.KEYID = 6
2,778,471 UART: [afmc] SUBJECT.KEYID = 7
2,778,896 UART: [afmc] AUTHORITY.KEYID = 5
2,814,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,762 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,094 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,092 UART: [afmc] --
2,858,088 UART: [cold-reset] --
2,858,952 UART: [state] Locking Datavault
2,859,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,537 UART: [state] Locking ICCM
2,860,971 UART: [exit] Launching FMC @ 0x40000130
2,866,300 UART:
2,866,316 UART: Running Caliptra FMC ...
2,866,724 UART:
2,866,867 UART: [state] CFI Enabled
2,877,256 UART: [fht] FMC Alias Private Key: 7
2,985,263 UART: [art] Extend RT PCRs Done
2,985,691 UART: [art] Lock RT PCRs Done
2,986,931 UART: [art] Populate DV Done
2,995,074 UART: [fht] FMC Alias Private Key: 7
2,996,074 UART: [art] Derive CDI
2,996,354 UART: [art] Store in in slot 0x4
3,082,011 UART: [art] Derive Key Pair
3,082,371 UART: [art] Store priv key in slot 0x5
3,095,577 UART: [art] Derive Key Pair - Done
3,110,306 UART: [art] Signing Cert with AUTHO
3,110,786 UART: RITY.KEYID = 7
3,126,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,847 UART: [art] PUB.X = B237626D2C8CEB3070526AFCD30D51883E072E34F0891E9551795B6CFD9D6BE39DF8267D4CE7F285CA78E24E23620C00
3,133,590 UART: [art] PUB.Y = 099F33CB1A490850CBE47F3AC37C2510EC27D7E1FF93F699A7A4D637087A560BD0FD489D9014CB14F1E9B9FA5FA910A8
3,140,540 UART: [art] SIG.R = E4EA46A6078E07AB47EB10AB099A68A6E76D25EA01341E3CBE0D0F9845DFDE2DF198BCD72DF901AA85DF74FEF4AF5D29
3,147,315 UART: [art] SIG.S = F284874B1D54CF4C5F0B9BE5D936D41C290FC7DBE8C0D91D446F5F5C3BC5D9912D2DD203CDB5C515C9BB8872969E2DB3
3,170,793 UART: Caliptra RT
3,171,138 UART: [state] CFI Enabled
3,279,600 UART: [rt] RT listening for mailbox commands...
3,280,270 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,716 UART: [rt]cmd =0x4c4d5356, len=1672
3,573,018 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,858 ready_for_fw is high
1,060,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,722 >>> mbox cmd response: success
2,691,728 UART:
2,691,744 UART: Running Caliptra FMC ...
2,692,152 UART:
2,692,295 UART: [state] CFI Enabled
2,702,996 UART: [fht] FMC Alias Private Key: 7
2,810,837 UART: [art] Extend RT PCRs Done
2,811,265 UART: [art] Lock RT PCRs Done
2,813,025 UART: [art] Populate DV Done
2,821,330 UART: [fht] FMC Alias Private Key: 7
2,822,410 UART: [art] Derive CDI
2,822,690 UART: [art] Store in in slot 0x4
2,908,209 UART: [art] Derive Key Pair
2,908,569 UART: [art] Store priv key in slot 0x5
2,922,341 UART: [art] Derive Key Pair - Done
2,937,205 UART: [art] Signing Cert with AUTHO
2,937,685 UART: RITY.KEYID = 7
2,953,057 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,822 UART: [art] PUB.X = D166132B313502EB348C1EB2F283F0AA39287A81836AD6FA1D1000E7AECD8A92AE1B7886698362325919BFB1914051E9
2,960,565 UART: [art] PUB.Y = 847B55E68D2949506EB21EFBE4E91EA5B60656672867152A5FBA78E961FF87639BEFD1353E53BEAD9F333B1713B3BA52
2,967,518 UART: [art] SIG.R = F7C30AB12B6C88278AE7FC9A8DFDFB028A97094D0BBEDF3F46FC817E38B1E12BDD5013303FB41B67691D0DAC30460AFF
2,974,292 UART: [art] SIG.S = FAF301E455301349F7A4B5BBF696F21D028D8D3432FEB32F1610164C6D21EF9A9B9E82D971BE46ED46AD903CBF7CF6F7
2,997,501 UART: Caliptra RT
2,997,846 UART: [state] CFI Enabled
3,105,576 UART: [rt] RT listening for mailbox commands...
3,106,246 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,870 UART: [rt]cmd =0x4c4d5356, len=1672
3,399,450 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,620 UART: [kat] HMAC-384Kdf
920,244 UART: [kat] LMS
1,168,556 UART: [kat] --
1,169,495 UART: [cold-reset] ++
1,170,009 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
1,173,939 ready_for_fw is high
1,173,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,409 UART: [idev] Erasing UDS.KEYID = 0
1,199,079 UART: [idev] Sha1 KeyId Algorithm
1,207,881 UART: [idev] --
1,208,928 UART: [ldev] ++
1,209,096 UART: [ldev] CDI.KEYID = 6
1,209,460 UART: [ldev] SUBJECT.KEYID = 5
1,209,887 UART: [ldev] AUTHORITY.KEYID = 7
1,210,350 UART: [ldev] FE.KEYID = 1
1,215,676 UART: [ldev] Erasing FE.KEYID = 1
1,242,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,062 UART: [ldev] --
1,281,554 UART: [fwproc] Wait for Commands...
1,282,187 UART: [fwproc] Recv command 0x46574c44
1,282,920 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,343 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,524 >>> mbox cmd response: success
2,775,679 UART: [afmc] ++
2,775,847 UART: [afmc] CDI.KEYID = 6
2,776,210 UART: [afmc] SUBJECT.KEYID = 7
2,776,636 UART: [afmc] AUTHORITY.KEYID = 5
2,812,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,838 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,567 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,450 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,169 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,148 UART: [afmc] --
2,855,150 UART: [cold-reset] --
2,855,924 UART: [state] Locking Datavault
2,857,037 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,641 UART: [state] Locking ICCM
2,858,189 UART: [exit] Launching FMC @ 0x40000130
2,863,518 UART:
2,863,534 UART: Running Caliptra FMC ...
2,863,942 UART:
2,863,996 UART: [state] CFI Enabled
2,874,453 UART: [fht] FMC Alias Private Key: 7
2,982,142 UART: [art] Extend RT PCRs Done
2,982,570 UART: [art] Lock RT PCRs Done
2,984,450 UART: [art] Populate DV Done
2,992,591 UART: [fht] FMC Alias Private Key: 7
2,993,755 UART: [art] Derive CDI
2,994,035 UART: [art] Store in in slot 0x4
3,079,740 UART: [art] Derive Key Pair
3,080,100 UART: [art] Store priv key in slot 0x5
3,093,568 UART: [art] Derive Key Pair - Done
3,108,402 UART: [art] Signing Cert with AUTHO
3,108,882 UART: RITY.KEYID = 7
3,123,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,755 UART: [art] PUB.X = C72DD3D067E790843EC3FB8C2DF1B7D5D14A144408C9C2CEF13912F05D8D233D1BDC8D696837CD1C1257927A243B3192
3,131,528 UART: [art] PUB.Y = D0F8F7915A7A88D110DBA9C46F35FDF9FA774208E700DE038CDF681EB4E183C11538F10142FE86D2F9C910A878E2E19C
3,138,457 UART: [art] SIG.R = 319BB5367C0BFAFE90896D667DE5E2220C07706402EE4704B6F6770403449E7B727C0D52C1B320F0EAC77DF88EBAB301
3,145,204 UART: [art] SIG.S = A8B8086BA1960BFA5F1A08F277657E65785685F8F3804C91999838830482BB19CF78951A984CCD5347DE6F7A5548E42B
3,168,955 UART: Caliptra RT
3,169,208 UART: [state] CFI Enabled
3,277,617 UART: [rt] RT listening for mailbox commands...
3,278,287 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,975 UART: [rt]cmd =0x4c4d5356, len=1672
3,571,469 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,308 ready_for_fw is high
1,056,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,726 >>> mbox cmd response: success
2,686,600 UART:
2,686,616 UART: Running Caliptra FMC ...
2,687,024 UART:
2,687,078 UART: [state] CFI Enabled
2,697,509 UART: [fht] FMC Alias Private Key: 7
2,805,756 UART: [art] Extend RT PCRs Done
2,806,184 UART: [art] Lock RT PCRs Done
2,808,064 UART: [art] Populate DV Done
2,816,341 UART: [fht] FMC Alias Private Key: 7
2,817,409 UART: [art] Derive CDI
2,817,689 UART: [art] Store in in slot 0x4
2,903,034 UART: [art] Derive Key Pair
2,903,394 UART: [art] Store priv key in slot 0x5
2,917,184 UART: [art] Derive Key Pair - Done
2,932,048 UART: [art] Signing Cert with AUTHO
2,932,528 UART: RITY.KEYID = 7
2,947,334 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,099 UART: [art] PUB.X = EC487E4C6536D8835D82FD52A3A9DCED3756E4D7A75542660B87961AB8F01FAE1B03F90296DA8EC77BC256207A931122
2,954,864 UART: [art] PUB.Y = 4EF6CAE4C3035121169E37E3E9A4D0F8491FDAD9DB9B742CA365DD4DC6C5D75C7C39CC179736BA46607545C8FB2596A8
2,961,823 UART: [art] SIG.R = 04F0BDDD6CE78D9DF1F65C798BA9B3D2418DFB587962E5908318B34E2CE24E66FC417D243BDAB854C694CFCC3B45E06A
2,968,608 UART: [art] SIG.S = 9B35F163C28468A1428175AA5D180C283CFEDFEBF4DFC7AA91477275141DC0EEC78D9818A79DA6B7FFC17B22D019045C
2,992,621 UART: Caliptra RT
2,992,874 UART: [state] CFI Enabled
3,100,557 UART: [rt] RT listening for mailbox commands...
3,101,227 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,003 UART: [rt]cmd =0x4c4d5356, len=1672
3,394,411 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,613 UART: [kat] LMS
1,168,925 UART: [kat] --
1,169,890 UART: [cold-reset] ++
1,170,460 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
1,174,508 ready_for_fw is high
1,174,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,322 UART: [idev] Erasing UDS.KEYID = 0
1,199,572 UART: [idev] Sha1 KeyId Algorithm
1,208,422 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,127 UART: [ldev] Erasing FE.KEYID = 1
1,242,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,281,975 UART: [fwproc] Wait for Commands...
1,282,698 UART: [fwproc] Recv command 0x46574c44
1,283,431 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,619 >>> mbox cmd response: success
2,775,698 UART: [afmc] ++
2,775,866 UART: [afmc] CDI.KEYID = 6
2,776,229 UART: [afmc] SUBJECT.KEYID = 7
2,776,655 UART: [afmc] AUTHORITY.KEYID = 5
2,812,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,485 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,097 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,816 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,567 UART: [afmc] --
2,855,625 UART: [cold-reset] --
2,856,693 UART: [state] Locking Datavault
2,858,186 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,790 UART: [state] Locking ICCM
2,859,220 UART: [exit] Launching FMC @ 0x40000130
2,864,549 UART:
2,864,565 UART: Running Caliptra FMC ...
2,864,973 UART:
2,865,116 UART: [state] CFI Enabled
2,875,721 UART: [fht] FMC Alias Private Key: 7
2,983,438 UART: [art] Extend RT PCRs Done
2,983,866 UART: [art] Lock RT PCRs Done
2,985,648 UART: [art] Populate DV Done
2,993,925 UART: [fht] FMC Alias Private Key: 7
2,995,045 UART: [art] Derive CDI
2,995,325 UART: [art] Store in in slot 0x4
3,080,928 UART: [art] Derive Key Pair
3,081,288 UART: [art] Store priv key in slot 0x5
3,095,008 UART: [art] Derive Key Pair - Done
3,109,496 UART: [art] Signing Cert with AUTHO
3,109,976 UART: RITY.KEYID = 7
3,125,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,005 UART: [art] PUB.X = 92DD267D6A1109930B3AA2C213A5A632E81AB154169D85F6D15DB00951337C94BDBB8309667C0197495F9493B2276EE1
3,132,754 UART: [art] PUB.Y = 78C0550EE2E1F1ED31440D3AF6B77909FE2BBE8AA9BAF98CBF3B39F6A0D4B49E069175DF9ED5A176A2F4471998076514
3,139,701 UART: [art] SIG.R = BA39390B8303740661F73B83BE186552E58D61A391BCD22A17C1917F009835B932707B24AEA2FDCFF5ACFAC268CD9CD9
3,146,448 UART: [art] SIG.S = 866E7982DCB6647B9BFC33F7F8CB4E3C34F4D9442082C88ADB7781E25AF6916B10B4FE711DCF2E2E54A1E787555E0E57
3,169,748 UART: Caliptra RT
3,170,093 UART: [state] CFI Enabled
3,278,051 UART: [rt] RT listening for mailbox commands...
3,278,721 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,581 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,229 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,153 ready_for_fw is high
1,056,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,357 >>> mbox cmd response: success
2,687,383 UART:
2,687,399 UART: Running Caliptra FMC ...
2,687,807 UART:
2,687,950 UART: [state] CFI Enabled
2,699,095 UART: [fht] FMC Alias Private Key: 7
2,806,972 UART: [art] Extend RT PCRs Done
2,807,400 UART: [art] Lock RT PCRs Done
2,809,234 UART: [art] Populate DV Done
2,817,563 UART: [fht] FMC Alias Private Key: 7
2,818,619 UART: [art] Derive CDI
2,818,899 UART: [art] Store in in slot 0x4
2,904,468 UART: [art] Derive Key Pair
2,904,828 UART: [art] Store priv key in slot 0x5
2,917,950 UART: [art] Derive Key Pair - Done
2,932,591 UART: [art] Signing Cert with AUTHO
2,933,071 UART: RITY.KEYID = 7
2,948,249 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,014 UART: [art] PUB.X = 94061C6D27CD74406C0AB2CB8289B64529A25485A6008045D08325C7AB5D3AE45FCEC033FF01AA4CCBDB2B51A2A7B585
2,955,763 UART: [art] PUB.Y = 4FB4AFB2115AAE0471FD23F644230CB07DF8539A027B5225099E5DA610F0280EA841FA547135ADD63B87D71DE29DD189
2,962,704 UART: [art] SIG.R = 9B611FE81DCA3AA9C6E26627D5B0891E0CA173A208B46CE7F5A277847F9C329DB4B30D55AFD80A92B0263D0D5EC35ABB
2,969,475 UART: [art] SIG.S = D7EA2B8228D5A5A6434D8447110882B37B883F57C10B8F7765D77E33E0D603F2153F2B82C0CF33142E62438DF7DCE4F1
2,993,667 UART: Caliptra RT
2,994,012 UART: [state] CFI Enabled
3,102,008 UART: [rt] RT listening for mailbox commands...
3,102,678 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,074 UART: [rt]cmd =0x4c4d5356, len=1672
3,395,426 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,014 writing to cptra_bootfsm_go
194,270 UART:
194,641 UART: Running Caliptra ROM ...
195,744 UART:
195,906 UART: [state] CFI Enabled
264,329 UART: [state] LifecycleState = Unprovisioned
266,323 UART: [state] DebugLocked = No
268,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,436 UART: [kat] SHA2-256
443,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,674 UART: [kat] ++
454,209 UART: [kat] sha1
464,027 UART: [kat] SHA2-256
466,700 UART: [kat] SHA2-384
472,793 UART: [kat] SHA2-512-ACC
475,166 UART: [kat] ECC-384
2,764,274 UART: [kat] HMAC-384Kdf
2,777,428 UART: [kat] LMS
3,967,743 UART: [kat] --
3,971,769 UART: [cold-reset] ++
3,972,721 UART: [fht] Storing FHT @ 0x50003400
3,984,699 UART: [idev] ++
3,985,276 UART: [idev] CDI.KEYID = 6
3,986,350 UART: [idev] SUBJECT.KEYID = 7
3,987,472 UART: [idev] UDS.KEYID = 0
3,988,531 ready_for_fw is high
3,988,748 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,601 UART: [idev] Erasing UDS.KEYID = 0
7,321,090 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,271 UART: [idev] --
7,347,209 UART: [ldev] ++
7,347,818 UART: [ldev] CDI.KEYID = 6
7,348,798 UART: [ldev] SUBJECT.KEYID = 5
7,349,962 UART: [ldev] AUTHORITY.KEYID = 7
7,351,251 UART: [ldev] FE.KEYID = 1
7,397,381 UART: [ldev] Erasing FE.KEYID = 1
10,730,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,645 UART: [ldev] --
13,092,265 UART: [fwproc] Waiting for Commands...
13,094,148 UART: [fwproc] Received command 0x46574c44
13,096,331 UART: [fwproc] Received Image of size 114124 bytes
17,149,430 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,961 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,617,884 >>> mbox cmd response: success
17,618,468 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,622,180 UART: [afmc] ++
17,622,770 UART: [afmc] CDI.KEYID = 6
17,623,702 UART: [afmc] SUBJECT.KEYID = 7
17,624,920 UART: [afmc] AUTHORITY.KEYID = 5
20,999,345 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,299,436 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,301,694 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,316,098 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,330,896 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,345,335 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,365,868 UART: [afmc] --
23,370,604 UART: [cold-reset] --
23,374,573 UART: [state] Locking Datavault
23,380,092 UART: [state] Locking PCR0, PCR1 and PCR31
23,381,791 UART: [state] Locking ICCM
23,383,702 UART: [exit] Launching FMC @ 0x40000130
23,392,041 UART:
23,392,277 UART: Running Caliptra FMC ...
23,393,400 UART:
23,393,570 UART: [state] CFI Enabled
23,459,893 UART: [fht] FMC Alias Private Key: 7
25,799,212 UART: [art] Extend RT PCRs Done
25,800,431 UART: [art] Lock RT PCRs Done
25,801,998 UART: [art] Populate DV Done
25,807,736 UART: [fht] FMC Alias Private Key: 7
25,809,445 UART: [art] Derive CDI
25,810,266 UART: [art] Store in in slot 0x4
25,869,796 UART: [art] Derive Key Pair
25,870,828 UART: [art] Store priv key in slot 0x5
29,163,176 UART: [art] Derive Key Pair - Done
29,176,443 UART: [art] Signing Cert with AUTHO
29,177,744 UART: RITY.KEYID = 7
31,464,929 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,444 UART: [art] PUB.X = B67AB1AD3C3D61710F2B4182C08D59332B17906DE1CE67AC99F6DDB02AB0E2DCD8996A1BEF9B7107377EAF86975075B2
31,473,718 UART: [art] PUB.Y = 5B9D8D8D5649B0907E1430B29859032F3C2111D89A704A82781294DB28279C3A26A3277AF6ED6462E1DDEBE9DA4DDAF5
31,480,896 UART: [art] SIG.R = E7E1D01555DC38E6D223C78C00812D0A1F15F7EC1ED65F1E0EDC878C89423671627014EE4CFEF32364C4DF44CB9F6FAA
31,488,281 UART: [art] SIG.S = A6812E33D1CADBC639D6399FBBA0B3FBD6AA81FE63F6D271473427D7C44BC1745C6EC6EA3E17BDDF5D800F6E1E91A0A1
32,793,708 UART: Caliptra RT
32,794,408 UART: [state] CFI Enabled
32,956,156 UART: [rt] RT listening for mailbox commands...
32,969,842 >>> mbox cmd response: failed
32,970,237 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
32,999,860 UART: [rt]cmd =0x46505652, len=4
33,001,157 UART: [rt] FIPS Version
33,002,433 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,783,236 ready_for_fw is high
3,783,815 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,869,903 >>> mbox cmd response: success
17,870,535 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,568,496 UART:
23,568,878 UART: Running Caliptra FMC ...
23,570,026 UART:
23,570,193 UART: [state] CFI Enabled
23,634,466 UART: [fht] FMC Alias Private Key: 7
25,972,664 UART: [art] Extend RT PCRs Done
25,973,891 UART: [art] Lock RT PCRs Done
25,975,389 UART: [art] Populate DV Done
25,980,799 UART: [fht] FMC Alias Private Key: 7
25,982,449 UART: [art] Derive CDI
25,983,266 UART: [art] Store in in slot 0x4
26,042,798 UART: [art] Derive Key Pair
26,043,844 UART: [art] Store priv key in slot 0x5
29,336,000 UART: [art] Derive Key Pair - Done
29,349,060 UART: [art] Signing Cert with AUTHO
29,350,370 UART: RITY.KEYID = 7
31,637,000 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,514 UART: [art] PUB.X = CD0EA443E8185E4886833F3564314984A425F62450E619E853ED271A98F98C61CF3EF7F5FF0050224263866E06938977
31,645,730 UART: [art] PUB.Y = 3C79F14C91D51F7580AAB153F3568556B2BF6EE1E10F8ECEB8C70F94527A44A29A0ED74366410E612BF867D6FC374A9C
31,652,984 UART: [art] SIG.R = 83A88F111BB4DE31DBC712B517A1680D7B35E46F68DF303B09D4762EADD5F3A41928A3B0DE94FAFE526CA8EDAE613A59
31,660,407 UART: [art] SIG.S = 8CF134A25D0E85BD47E230C8E9C27BDA69A4526251F51C36F801F5BB862FF9AABAEF52ACCDA6C4B734E7B6DDD6130FF0
32,965,638 UART: Caliptra RT
32,966,350 UART: [state] CFI Enabled
33,125,759 UART: [rt] RT listening for mailbox commands...
33,139,541 >>> mbox cmd response: failed
33,139,958 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,169,625 UART: [rt]cmd =0x46505652, len=4
33,170,892 UART: [rt] FIPS Version
33,172,270 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,540 UART:
192,911 UART: Running Caliptra ROM ...
194,024 UART:
603,840 UART: [state] CFI Enabled
618,779 UART: [state] LifecycleState = Unprovisioned
620,719 UART: [state] DebugLocked = No
622,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,020 UART: [kat] SHA2-256
796,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,316 UART: [kat] ++
807,758 UART: [kat] sha1
819,051 UART: [kat] SHA2-256
821,772 UART: [kat] SHA2-384
827,185 UART: [kat] SHA2-512-ACC
829,548 UART: [kat] ECC-384
3,111,716 UART: [kat] HMAC-384Kdf
3,123,574 UART: [kat] LMS
4,313,717 UART: [kat] --
4,319,681 UART: [cold-reset] ++
4,321,977 UART: [fht] Storing FHT @ 0x50003400
4,333,594 UART: [idev] ++
4,334,168 UART: [idev] CDI.KEYID = 6
4,335,153 UART: [idev] SUBJECT.KEYID = 7
4,336,320 UART: [idev] UDS.KEYID = 0
4,337,426 ready_for_fw is high
4,337,684 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,145 UART: [idev] Erasing UDS.KEYID = 0
7,623,775 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,814 UART: [idev] --
7,649,136 UART: [ldev] ++
7,649,711 UART: [ldev] CDI.KEYID = 6
7,650,681 UART: [ldev] SUBJECT.KEYID = 5
7,651,886 UART: [ldev] AUTHORITY.KEYID = 7
7,653,109 UART: [ldev] FE.KEYID = 1
7,662,884 UART: [ldev] Erasing FE.KEYID = 1
10,952,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,161 UART: [ldev] --
13,311,555 UART: [fwproc] Waiting for Commands...
13,314,385 UART: [fwproc] Received command 0x46574c44
13,316,623 UART: [fwproc] Received Image of size 114124 bytes
17,364,814 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,578 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,614 >>> mbox cmd response: success
17,824,204 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,827,750 UART: [afmc] ++
17,828,333 UART: [afmc] CDI.KEYID = 6
17,829,349 UART: [afmc] SUBJECT.KEYID = 7
17,830,500 UART: [afmc] AUTHORITY.KEYID = 5
21,143,388 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,157 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,410 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,797 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,657 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,103 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,213 UART: [afmc] --
23,510,476 UART: [cold-reset] --
23,513,521 UART: [state] Locking Datavault
23,519,297 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,054 UART: [state] Locking ICCM
23,523,202 UART: [exit] Launching FMC @ 0x40000130
23,531,591 UART:
23,531,824 UART: Running Caliptra FMC ...
23,532,922 UART:
23,533,070 UART: [state] CFI Enabled
23,541,111 UART: [fht] FMC Alias Private Key: 7
25,871,603 UART: [art] Extend RT PCRs Done
25,872,832 UART: [art] Lock RT PCRs Done
25,874,556 UART: [art] Populate DV Done
25,879,873 UART: [fht] FMC Alias Private Key: 7
25,881,570 UART: [art] Derive CDI
25,882,378 UART: [art] Store in in slot 0x4
25,924,438 UART: [art] Derive Key Pair
25,925,431 UART: [art] Store priv key in slot 0x5
29,167,274 UART: [art] Derive Key Pair - Done
29,180,276 UART: [art] Signing Cert with AUTHO
29,181,577 UART: RITY.KEYID = 7
31,461,450 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,959 UART: [art] PUB.X = 8E070FE79FAC8DB508EC7FEFB0017051B3C4D56347CDF9B9A86E454FB8E1E9736DB43A83A6AA3912782D4A69BC448D84
31,470,205 UART: [art] PUB.Y = F8E34A474E5919CD99210CEC4639FE3D18D2884C7548E1A998A1E9D7671E41C10E66E887C3B2F34C952F5128D01C03C9
31,477,461 UART: [art] SIG.R = 4DA79DA1F95CFA3B171B13DDE61537AA4AAD05CD6F7FBCF3566743F96125C0A542DA832FAC91A3329B8D4E912E020EF9
31,484,858 UART: [art] SIG.S = 99411ABDCB389FFF2C87148FAAC14F538D914DC0D1268A7E10B2E1A7E928CD4FFB3E312785D978A5F4175DCAE905ED39
32,790,090 UART: Caliptra RT
32,790,809 UART: [state] CFI Enabled
32,908,844 UART: [rt] RT listening for mailbox commands...
32,922,327 >>> mbox cmd response: failed
32,922,750 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
32,952,569 UART: [rt]cmd =0x46505652, len=4
32,953,814 UART: [rt] FIPS Version
32,955,070 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,125,985 ready_for_fw is high
4,126,467 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,402 >>> mbox cmd response: success
18,074,038 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,710,289 UART:
23,710,679 UART: Running Caliptra FMC ...
23,711,976 UART:
23,712,137 UART: [state] CFI Enabled
23,719,440 UART: [fht] FMC Alias Private Key: 7
26,050,528 UART: [art] Extend RT PCRs Done
26,051,774 UART: [art] Lock RT PCRs Done
26,053,196 UART: [art] Populate DV Done
26,058,677 UART: [fht] FMC Alias Private Key: 7
26,060,270 UART: [art] Derive CDI
26,061,084 UART: [art] Store in in slot 0x4
26,103,414 UART: [art] Derive Key Pair
26,104,408 UART: [art] Store priv key in slot 0x5
29,346,323 UART: [art] Derive Key Pair - Done
29,359,163 UART: [art] Signing Cert with AUTHO
29,360,473 UART: RITY.KEYID = 7
31,639,951 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,462 UART: [art] PUB.X = 5B176E4B760E8800BB13FA5A23D82641145A3518A0443216E5FE9C11893F8592CB602F566795A57090B149AD4BD13C66
31,648,742 UART: [art] PUB.Y = EB293D12DA9DC1B6DB82C31A26CE090CBEB3D1B4003D34051622B97E125B5F3F2F7D29442469E2B5605C4C05FF748019
31,655,923 UART: [art] SIG.R = EA65797699FCB45AEFCDEB386A12DE6B5EAD91F80386E1C04363688789C8A690774D4E5A8D4C3FBE30A22057A31F2C5C
31,663,317 UART: [art] SIG.S = 0E36BB88DD3091AB342F30AB7247CC545E8F0E6FD15F2E06377EB4FA21063816952A22839175E331639ED20CE9540C13
32,968,125 UART: Caliptra RT
32,968,839 UART: [state] CFI Enabled
33,086,131 UART: [rt] RT listening for mailbox commands...
33,099,976 >>> mbox cmd response: failed
33,100,371 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,130,078 UART: [rt]cmd =0x46505652, len=4
33,131,374 UART: [rt] FIPS Version
33,132,419 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,139 UART:
192,520 UART: Running Caliptra ROM ...
193,719 UART:
193,873 UART: [state] CFI Enabled
266,033 UART: [state] LifecycleState = Unprovisioned
267,948 UART: [state] DebugLocked = No
270,828 UART: [state] WD Timer not started. Device not locked for debugging
274,653 UART: [kat] SHA2-256
453,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,346 UART: [kat] ++
465,801 UART: [kat] sha1
475,819 UART: [kat] SHA2-256
478,896 UART: [kat] SHA2-384
484,243 UART: [kat] SHA2-512-ACC
487,174 UART: [kat] ECC-384
2,948,253 UART: [kat] HMAC-384Kdf
2,972,086 UART: [kat] LMS
3,501,545 UART: [kat] --
3,507,419 UART: [cold-reset] ++
3,509,352 UART: [fht] FHT @ 0x50003400
3,520,257 UART: [idev] ++
3,520,818 UART: [idev] CDI.KEYID = 6
3,521,701 UART: [idev] SUBJECT.KEYID = 7
3,522,942 UART: [idev] UDS.KEYID = 0
3,523,881 ready_for_fw is high
3,524,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,004 UART: [idev] Erasing UDS.KEYID = 0
6,025,984 UART: [idev] Sha1 KeyId Algorithm
6,049,163 UART: [idev] --
6,054,076 UART: [ldev] ++
6,054,652 UART: [ldev] CDI.KEYID = 6
6,055,542 UART: [ldev] SUBJECT.KEYID = 5
6,056,773 UART: [ldev] AUTHORITY.KEYID = 7
6,058,010 UART: [ldev] FE.KEYID = 1
6,098,436 UART: [ldev] Erasing FE.KEYID = 1
8,603,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,043 UART: [ldev] --
10,412,523 UART: [fwproc] Wait for Commands...
10,414,611 UART: [fwproc] Recv command 0x46574c44
10,416,642 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,287,095 >>> mbox cmd response: success
14,287,645 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,291,668 UART: [afmc] ++
14,292,247 UART: [afmc] CDI.KEYID = 6
14,293,129 UART: [afmc] SUBJECT.KEYID = 7
14,294,343 UART: [afmc] AUTHORITY.KEYID = 5
16,823,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,070 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,981 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,956 UART: [afmc] --
18,625,329 UART: [cold-reset] --
18,628,644 UART: [state] Locking Datavault
18,635,621 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,267 UART: [state] Locking ICCM
18,638,570 UART: [exit] Launching FMC @ 0x40000130
18,646,970 UART:
18,647,204 UART: Running Caliptra FMC ...
18,648,305 UART:
18,648,464 UART: [state] CFI Enabled
18,708,286 UART: [fht] FMC Alias Private Key: 7
20,472,376 UART: [art] Extend RT PCRs Done
20,473,594 UART: [art] Lock RT PCRs Done
20,475,013 UART: [art] Populate DV Done
20,480,050 UART: [fht] FMC Alias Private Key: 7
20,481,533 UART: [art] Derive CDI
20,482,294 UART: [art] Store in in slot 0x4
20,540,767 UART: [art] Derive Key Pair
20,541,808 UART: [art] Store priv key in slot 0x5
23,004,677 UART: [art] Derive Key Pair - Done
23,017,618 UART: [art] Signing Cert with AUTHO
23,018,941 UART: RITY.KEYID = 7
24,730,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,438 UART: [art] PUB.X = 9EFC0B38044F4E96CDAFCD569ACF42274CA234597593161F410D2F541BB51E55636676C31F1FBD2872BCA478EC0EDA3B
24,739,772 UART: [art] PUB.Y = 76C7CDF96A57B2B8A8BD80D098FAE205240268928554DD51A1AD0B07EA5B0BC63742E4A22AB62CFBCFDF6F7895D0291C
24,747,019 UART: [art] SIG.R = DA981CED482582A4AA6AB4EC9E1DEACBD1D6A4F90E4BF0FE4092D18C0A298EC2829BC87C59CC5FF0D7B520FE979D8DE7
24,754,425 UART: [art] SIG.S = DD213C5821DA84C9C03935F79D266C8CB6421AB6DA3B859306A995BC38C791B2D6ADB78FD6215C5115924A2CD3AAD156
25,733,451 UART: Caliptra RT
25,734,145 UART: [state] CFI Enabled
25,898,052 UART: [rt] RT listening for mailbox commands...
25,911,684 >>> mbox cmd response: failed
25,912,082 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,941,843 UART: [rt]cmd =0x46505652, len=4
25,943,173 UART: [rt] FIPS Version
25,944,552 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,380,097 ready_for_fw is high
3,380,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,088,319 >>> mbox cmd response: success
14,088,966 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,383,170 UART:
18,383,541 UART: Running Caliptra FMC ...
18,384,680 UART:
18,384,840 UART: [state] CFI Enabled
18,452,256 UART: [fht] FMC Alias Private Key: 7
20,215,995 UART: [art] Extend RT PCRs Done
20,217,202 UART: [art] Lock RT PCRs Done
20,218,763 UART: [art] Populate DV Done
20,223,958 UART: [fht] FMC Alias Private Key: 7
20,225,554 UART: [art] Derive CDI
20,226,368 UART: [art] Store in in slot 0x4
20,285,068 UART: [art] Derive Key Pair
20,286,103 UART: [art] Store priv key in slot 0x5
22,749,378 UART: [art] Derive Key Pair - Done
22,762,651 UART: [art] Signing Cert with AUTHO
22,763,955 UART: RITY.KEYID = 7
24,475,339 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,825 UART: [art] PUB.X = 7CC503A3AB07850116FBF2E6A417A1D532FE4CED9136AC1127927E69D7F72F0F47896E1069F467DADD775EE4FDFFFFC5
24,484,119 UART: [art] PUB.Y = A0678367C9C42EFA121A6492A6B438DE0645A1BDC70E5D6F69407135D67DD78D5E7815204D63E41DBA2D2EEC7672727F
24,491,416 UART: [art] SIG.R = 01CBD81D8E662CAD2026CDC3D1E8E24EF7308FB48C260A4BC433F78924F9C8DB183C677A6A54558AC0916A6D444DFF5F
24,499,068 UART: [art] SIG.S = 20D572A95809BCE7FB585F32BD498E09373A0E6722CC021428629A3985333A71FD92721FD8DC21D2503A49B60BAB2A4C
25,477,655 UART: Caliptra RT
25,478,352 UART: [state] CFI Enabled
25,643,138 UART: [rt] RT listening for mailbox commands...
25,656,497 >>> mbox cmd response: failed
25,656,884 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,686,590 UART: [rt]cmd =0x46505652, len=4
25,687,885 UART: [rt] FIPS Version
25,689,199 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,454 UART:
192,827 UART: Running Caliptra ROM ...
193,957 UART:
603,542 UART: [state] CFI Enabled
618,550 UART: [state] LifecycleState = Unprovisioned
620,359 UART: [state] DebugLocked = No
622,518 UART: [state] WD Timer not started. Device not locked for debugging
626,609 UART: [kat] SHA2-256
805,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,295 UART: [kat] ++
817,818 UART: [kat] sha1
828,192 UART: [kat] SHA2-256
831,204 UART: [kat] SHA2-384
836,774 UART: [kat] SHA2-512-ACC
839,773 UART: [kat] ECC-384
3,280,814 UART: [kat] HMAC-384Kdf
3,291,732 UART: [kat] LMS
3,821,219 UART: [kat] --
3,825,779 UART: [cold-reset] ++
3,828,272 UART: [fht] FHT @ 0x50003400
3,840,445 UART: [idev] ++
3,841,007 UART: [idev] CDI.KEYID = 6
3,841,915 UART: [idev] SUBJECT.KEYID = 7
3,843,079 UART: [idev] UDS.KEYID = 0
3,844,126 ready_for_fw is high
3,844,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,137 UART: [idev] Erasing UDS.KEYID = 0
6,310,767 UART: [idev] Sha1 KeyId Algorithm
6,333,561 UART: [idev] --
6,338,573 UART: [ldev] ++
6,339,137 UART: [ldev] CDI.KEYID = 6
6,340,185 UART: [ldev] SUBJECT.KEYID = 5
6,341,284 UART: [ldev] AUTHORITY.KEYID = 7
6,342,450 UART: [ldev] FE.KEYID = 1
6,351,845 UART: [ldev] Erasing FE.KEYID = 1
8,827,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,398 UART: [ldev] --
10,619,614 UART: [fwproc] Wait for Commands...
10,621,489 UART: [fwproc] Recv command 0x46574c44
10,623,597 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,977 >>> mbox cmd response: success
14,492,485 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,497,099 UART: [afmc] ++
14,497,676 UART: [afmc] CDI.KEYID = 6
14,498,549 UART: [afmc] SUBJECT.KEYID = 7
14,499,758 UART: [afmc] AUTHORITY.KEYID = 5
17,003,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,048 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,809 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,866 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,733 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,909 UART: [afmc] --
18,803,146 UART: [cold-reset] --
18,806,458 UART: [state] Locking Datavault
18,811,966 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,661 UART: [state] Locking ICCM
18,815,641 UART: [exit] Launching FMC @ 0x40000130
18,824,026 UART:
18,824,257 UART: Running Caliptra FMC ...
18,825,349 UART:
18,825,498 UART: [state] CFI Enabled
18,833,449 UART: [fht] FMC Alias Private Key: 7
20,589,907 UART: [art] Extend RT PCRs Done
20,591,134 UART: [art] Lock RT PCRs Done
20,593,000 UART: [art] Populate DV Done
20,598,539 UART: [fht] FMC Alias Private Key: 7
20,600,118 UART: [art] Derive CDI
20,600,950 UART: [art] Store in in slot 0x4
20,643,064 UART: [art] Derive Key Pair
20,644,059 UART: [art] Store priv key in slot 0x5
23,070,705 UART: [art] Derive Key Pair - Done
23,083,545 UART: [art] Signing Cert with AUTHO
23,084,843 UART: RITY.KEYID = 7
24,790,580 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,083 UART: [art] PUB.X = AAAEF0AD0263A5F1C932A92E4D5BED75F06AC5C58D703DEA1F9D45F89DE0274B4EC43A5D44A51BA3ED8D0923B33E9FBB
24,799,372 UART: [art] PUB.Y = 6E5B9D6518B8432BAF94CF84416F7EC8E625AF028C921ABAF54C54F53FAA7A39E054693BCDCA0030FE5709C1F45E4C52
24,806,647 UART: [art] SIG.R = 06016E138CFC5DBDD095A65FA4254F8217B9B44924851090FB5895718ACDA63740A8B2737413DD2B67B1535C069FA994
24,813,979 UART: [art] SIG.S = C00113CE22EB1A7AAAC030308F62A713155224D87074C8436FE6F4CF02D895C51D87E1194F151126947379D3D85512E7
25,792,885 UART: Caliptra RT
25,793,592 UART: [state] CFI Enabled
25,910,448 UART: [rt] RT listening for mailbox commands...
25,923,964 >>> mbox cmd response: failed
25,924,354 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,954,037 UART: [rt]cmd =0x46505652, len=4
25,955,362 UART: [rt] FIPS Version
25,956,513 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
3,693,897 ready_for_fw is high
3,694,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,257,621 >>> mbox cmd response: success
14,258,261 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,511,412 UART:
18,511,805 UART: Running Caliptra FMC ...
18,512,958 UART:
18,513,109 UART: [state] CFI Enabled
18,521,057 UART: [fht] FMC Alias Private Key: 7
20,277,940 UART: [art] Extend RT PCRs Done
20,279,168 UART: [art] Lock RT PCRs Done
20,280,846 UART: [art] Populate DV Done
20,286,524 UART: [fht] FMC Alias Private Key: 7
20,288,228 UART: [art] Derive CDI
20,289,035 UART: [art] Store in in slot 0x4
20,331,114 UART: [art] Derive Key Pair
20,332,156 UART: [art] Store priv key in slot 0x5
22,758,800 UART: [art] Derive Key Pair - Done
22,771,807 UART: [art] Signing Cert with AUTHO
22,773,111 UART: RITY.KEYID = 7
24,478,818 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,327 UART: [art] PUB.X = 14393F0E3A795CF465AB3DC1D1C0833F53E20285CD9F08C4B78E69EE5A3453F47B72627A27EBAD7F274844BDFA6D1117
24,487,637 UART: [art] PUB.Y = F3111D799ED7BE28FB2278DB3C661AD07138A71246BEA75B8F92D6DBF8C10CE56D606FDDB8E59D969A38AAC95260F1A0
24,494,859 UART: [art] SIG.R = 6E9390F8EA3EEFC7EB27504C3E6667961647423C46A02F4B4455B0582264753EBC0ADF2AC1D4F55DE5056EA5DD762272
24,502,250 UART: [art] SIG.S = 0D19CD3D687FACA520E9F37CF3E96CA43EBB97CD81174702D14DBDF6E1C780936AD99DE6A3DA4C48BF6A5A2D60A2B18C
25,481,328 UART: Caliptra RT
25,482,048 UART: [state] CFI Enabled
25,599,592 UART: [rt] RT listening for mailbox commands...
25,613,139 >>> mbox cmd response: failed
25,613,538 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,643,296 UART: [rt]cmd =0x46505652, len=4
25,644,555 UART: [rt] FIPS Version
25,645,712 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,444,443 ready_for_fw is high
3,444,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,749,786 >>> mbox cmd response: success
14,750,389 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,057,708 UART:
19,058,085 UART: Running Caliptra FMC ...
19,059,292 UART:
19,059,462 UART: [state] CFI Enabled
19,128,233 UART: [fht] FMC Alias Private Key: 7
20,892,607 UART: [art] Extend RT PCRs Done
20,893,824 UART: [art] Lock RT PCRs Done
20,895,507 UART: [art] Populate DV Done
20,900,964 UART: [fht] FMC Alias Private Key: 7
20,902,447 UART: [art] Derive CDI
20,903,256 UART: [art] Store in in slot 0x4
20,962,061 UART: [art] Derive Key Pair
20,963,098 UART: [art] Store priv key in slot 0x5
23,426,349 UART: [art] Derive Key Pair - Done
23,439,291 UART: [art] Signing Cert with AUTHO
23,440,585 UART: RITY.KEYID = 7
25,153,052 UART: [art] Erasing AUTHORITY.KEYID = 7
25,154,559 UART: [art] PUB.X = 193844B2F56C151229DCD1C57752DEB22F9431FED111E8A0E51C011373DA44F2189591BBE78DED47FA493ABC6FE0F4A5
25,161,798 UART: [art] PUB.Y = 023CF40B5FD7B46090BE49CDFEA208770C26235C2D8DADA73365DB406560A9FE57995225A2091AA1569375BBC8E3B098
25,169,101 UART: [art] SIG.R = C9C2CA92F7FCE9C3069FA464EA322B1F2982935B47E6E09EC277C761037C7B066670C9F267D8C6D85FB625AC327B9530
25,176,488 UART: [art] SIG.S = 77D300C1D18734B0AFD68BF7C91447F2109E5389826EAFDB570C3CBDEB2B3D668C5148B51FBEBFF2F8CA3F4A59DB7F1C
26,155,061 UART: Caliptra RT
26,155,770 UART: [state] CFI Enabled
26,330,996 UART: [rt] RT listening for mailbox commands...
26,344,572 >>> mbox cmd response: failed
26,344,962 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,374,566 UART: [rt]cmd =0x46505652, len=4
26,375,863 UART: [rt] FIPS Version
26,377,263 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,757,182 ready_for_fw is high
3,757,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,966,898 >>> mbox cmd response: success
14,967,523 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,223,106 UART:
19,223,493 UART: Running Caliptra FMC ...
19,224,622 UART:
19,224,768 UART: [state] CFI Enabled
19,232,871 UART: [fht] FMC Alias Private Key: 7
20,990,141 UART: [art] Extend RT PCRs Done
20,991,373 UART: [art] Lock RT PCRs Done
20,992,952 UART: [art] Populate DV Done
20,998,357 UART: [fht] FMC Alias Private Key: 7
20,999,940 UART: [art] Derive CDI
21,000,697 UART: [art] Store in in slot 0x4
21,043,335 UART: [art] Derive Key Pair
21,044,370 UART: [art] Store priv key in slot 0x5
23,471,126 UART: [art] Derive Key Pair - Done
23,484,386 UART: [art] Signing Cert with AUTHO
23,485,689 UART: RITY.KEYID = 7
25,191,483 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,985 UART: [art] PUB.X = DE06BC521A651BBACD9261CF3FC4C3606293D2D2D0BF2A2F02D7208CB72B97D2C318E5DED571B1E1BB562DFFE836D768
25,200,289 UART: [art] PUB.Y = DAC015390C467B5C22DAAAA975234D3C65B897FB357DCCCC9855487CE188AB25CC25819AFB4573051724DB2E0D5381AD
25,207,544 UART: [art] SIG.R = 6344C7EAEBF1D3DECADCD7E18CE340D8D9FD0085238B3016F0D51BC91E49FD151E7898938872C20F56350964D935FC89
25,214,929 UART: [art] SIG.S = C9F2EC2448BC09B83A5108FF3FA1AE263FBA69717B7FBA642556C734A46A2761EA1F61D7B2C344A8BD22AD4628D6063A
26,192,974 UART: Caliptra RT
26,193,666 UART: [state] CFI Enabled
26,311,437 UART: [rt] RT listening for mailbox commands...
26,325,336 >>> mbox cmd response: failed
26,325,725 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,355,434 UART: [rt]cmd =0x46505652, len=4
26,356,725 UART: [rt] FIPS Version
26,357,770 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,171 UART: [kat] SHA2-256
882,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,217 UART: [kat] ++
886,369 UART: [kat] sha1
890,527 UART: [kat] SHA2-256
892,465 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
903,042 UART: [kat] HMAC-384Kdf
907,570 UART: [kat] LMS
1,475,766 UART: [kat] --
1,476,693 UART: [cold-reset] ++
1,477,107 UART: [fht] Storing FHT @ 0x50003400
1,479,956 UART: [idev] ++
1,480,124 UART: [idev] CDI.KEYID = 6
1,480,484 UART: [idev] SUBJECT.KEYID = 7
1,480,908 UART: [idev] UDS.KEYID = 0
1,481,253 ready_for_fw is high
1,481,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,960 UART: [idev] Erasing UDS.KEYID = 0
1,505,308 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,900 UART: [idev] --
1,515,015 UART: [ldev] ++
1,515,183 UART: [ldev] CDI.KEYID = 6
1,515,546 UART: [ldev] SUBJECT.KEYID = 5
1,515,972 UART: [ldev] AUTHORITY.KEYID = 7
1,516,435 UART: [ldev] FE.KEYID = 1
1,521,717 UART: [ldev] Erasing FE.KEYID = 1
1,546,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,886 UART: [ldev] --
1,586,265 UART: [fwproc] Waiting for Commands...
1,587,106 UART: [fwproc] Received command 0x46574c44
1,587,897 UART: [fwproc] Received Image of size 114448 bytes
2,887,426 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,884 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,236 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,189 >>> mbox cmd response: success
3,080,189 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,081,207 UART: [afmc] ++
3,081,375 UART: [afmc] CDI.KEYID = 6
3,081,737 UART: [afmc] SUBJECT.KEYID = 7
3,082,162 UART: [afmc] AUTHORITY.KEYID = 5
3,117,589 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,331 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,724 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,414 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,191 UART: [afmc] --
3,160,185 UART: [cold-reset] --
3,161,127 UART: [state] Locking Datavault
3,162,460 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,064 UART: [state] Locking ICCM
3,163,514 UART: [exit] Launching FMC @ 0x40000130
3,168,843 UART:
3,168,859 UART: Running Caliptra FMC ...
3,169,267 UART:
3,169,321 UART: [state] CFI Enabled
3,179,754 UART: [fht] FMC Alias Private Key: 7
3,288,037 UART: [art] Extend RT PCRs Done
3,288,465 UART: [art] Lock RT PCRs Done
3,290,047 UART: [art] Populate DV Done
3,298,348 UART: [fht] FMC Alias Private Key: 7
3,299,474 UART: [art] Derive CDI
3,299,754 UART: [art] Store in in slot 0x4
3,385,201 UART: [art] Derive Key Pair
3,385,561 UART: [art] Store priv key in slot 0x5
3,398,891 UART: [art] Derive Key Pair - Done
3,413,972 UART: [art] Signing Cert with AUTHO
3,414,452 UART: RITY.KEYID = 7
3,429,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,481 UART: [art] PUB.X = 604BDDA1B853B2795E7ECE0A160D7F7DA9954C1734B1619A8E1B92EA185C8611FC78B7156A3B1E8E92903CF5C994EE57
3,437,253 UART: [art] PUB.Y = C12E158A44B49016BD290338B9B99CB03F9226D165A740377B5E6F8FD35ACA86175D30EDC93F0E7D5C764F5A292859D5
3,444,199 UART: [art] SIG.R = 5BEC34E2FDDF559AF135958F6DADE9505A99BBB66587401231D9E35EEB933AA3321193E9F315BE006FED115781F3AB47
3,450,957 UART: [art] SIG.S = 267116E2E22EE464909E2921EDEA5560E9C2383B047113570633D626FFC2D4B1F2C1E69868DD6EC5B609A3E45DE3874C
3,474,811 UART: Caliptra RT
3,475,064 UART: [state] CFI Enabled
3,583,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,596,215 >>> mbox cmd response: failed
3,596,215 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,787 UART: [rt]cmd =0x46505652, len=4
3,626,458 UART: [rt] FIPS Version
3,627,371 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,445 ready_for_fw is high
1,363,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,885 >>> mbox cmd response: success
2,929,885 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,991,673 UART:
2,991,689 UART: Running Caliptra FMC ...
2,992,097 UART:
2,992,151 UART: [state] CFI Enabled
3,002,444 UART: [fht] FMC Alias Private Key: 7
3,110,757 UART: [art] Extend RT PCRs Done
3,111,185 UART: [art] Lock RT PCRs Done
3,112,399 UART: [art] Populate DV Done
3,120,708 UART: [fht] FMC Alias Private Key: 7
3,121,676 UART: [art] Derive CDI
3,121,956 UART: [art] Store in in slot 0x4
3,207,265 UART: [art] Derive Key Pair
3,207,625 UART: [art] Store priv key in slot 0x5
3,220,915 UART: [art] Derive Key Pair - Done
3,235,556 UART: [art] Signing Cert with AUTHO
3,236,036 UART: RITY.KEYID = 7
3,251,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,105 UART: [art] PUB.X = 2B5A1E5ACC0CD337427C9F0CE281FCD3EE1C5C00BC7F3B89658D030D7B74ADFF394360B65FF0B990FC270A945F7691C8
3,258,854 UART: [art] PUB.Y = FB97ABD42E802D38D41401AD7FBAADA519897533FEF1CE59FEF9ED1ECC33AF845E2FA1CEA11AB136B3844799A31DED19
3,265,827 UART: [art] SIG.R = 29F6A4C306D1010A0B995B8E012D5ACF98EF1A274228105E803FCCEC67C37E5C224F4478D400F88552B4BB64B2C9C7A8
3,272,566 UART: [art] SIG.S = E5788911CF15D5ECB6AB959D16F7B4E5D1483E9B524115D50634C7BE4ECF7E12DB71E322EF373ADAE2A6C65945206F19
3,296,088 UART: Caliptra RT
3,296,341 UART: [state] CFI Enabled
3,404,978 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,663 >>> mbox cmd response: failed
3,417,663 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,047 UART: [rt]cmd =0x46505652, len=4
3,447,718 UART: [rt] FIPS Version
3,448,789 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,086 UART: [kat] SHA2-256
882,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,132 UART: [kat] ++
886,284 UART: [kat] sha1
890,478 UART: [kat] SHA2-256
892,416 UART: [kat] SHA2-384
895,243 UART: [kat] SHA2-512-ACC
897,144 UART: [kat] ECC-384
902,675 UART: [kat] HMAC-384Kdf
907,419 UART: [kat] LMS
1,475,615 UART: [kat] --
1,476,266 UART: [cold-reset] ++
1,476,714 UART: [fht] Storing FHT @ 0x50003400
1,479,277 UART: [idev] ++
1,479,445 UART: [idev] CDI.KEYID = 6
1,479,805 UART: [idev] SUBJECT.KEYID = 7
1,480,229 UART: [idev] UDS.KEYID = 0
1,480,574 ready_for_fw is high
1,480,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,367 UART: [idev] Erasing UDS.KEYID = 0
1,505,293 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,151 UART: [idev] --
1,515,138 UART: [ldev] ++
1,515,306 UART: [ldev] CDI.KEYID = 6
1,515,669 UART: [ldev] SUBJECT.KEYID = 5
1,516,095 UART: [ldev] AUTHORITY.KEYID = 7
1,516,558 UART: [ldev] FE.KEYID = 1
1,521,732 UART: [ldev] Erasing FE.KEYID = 1
1,547,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,609 UART: [ldev] --
1,587,098 UART: [fwproc] Waiting for Commands...
1,587,849 UART: [fwproc] Received command 0x46574c44
1,588,640 UART: [fwproc] Received Image of size 114448 bytes
2,888,109 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,583 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,935 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,990 >>> mbox cmd response: success
3,080,990 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,082,214 UART: [afmc] ++
3,082,382 UART: [afmc] CDI.KEYID = 6
3,082,744 UART: [afmc] SUBJECT.KEYID = 7
3,083,169 UART: [afmc] AUTHORITY.KEYID = 5
3,119,068 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,258 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,143 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,833 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,930 UART: [afmc] --
3,163,054 UART: [cold-reset] --
3,163,774 UART: [state] Locking Datavault
3,164,943 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,547 UART: [state] Locking ICCM
3,166,113 UART: [exit] Launching FMC @ 0x40000130
3,171,442 UART:
3,171,458 UART: Running Caliptra FMC ...
3,171,866 UART:
3,172,009 UART: [state] CFI Enabled
3,182,372 UART: [fht] FMC Alias Private Key: 7
3,290,195 UART: [art] Extend RT PCRs Done
3,290,623 UART: [art] Lock RT PCRs Done
3,291,987 UART: [art] Populate DV Done
3,300,608 UART: [fht] FMC Alias Private Key: 7
3,301,570 UART: [art] Derive CDI
3,301,850 UART: [art] Store in in slot 0x4
3,387,865 UART: [art] Derive Key Pair
3,388,225 UART: [art] Store priv key in slot 0x5
3,401,337 UART: [art] Derive Key Pair - Done
3,416,114 UART: [art] Signing Cert with AUTHO
3,416,594 UART: RITY.KEYID = 7
3,431,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,721 UART: [art] PUB.X = FADFF4242EB51904949B81F3562229B5791424AA4161B353C75C848F834C45AD89072DC83606336B251CA5570A20086B
3,439,466 UART: [art] PUB.Y = 48E49719CB7CFE020E532607F9280C1946B61EB256606D590A1E6B0CF0AF519BEFA3096A0162464968F11CC945F0DC15
3,446,392 UART: [art] SIG.R = 8B75CE751CDE081FD6365FC0ADD19A962BA44D453445231476FEC380620610C54B896C561580755DCE8E315EB73CC794
3,453,156 UART: [art] SIG.S = 024B55FD57ED99F7A87A2282FD547AF5380FD7E6BD71CBF02AD18815F1BDE6504D8D0DF5FB196F533793923F1BFDF7A9
3,476,528 UART: Caliptra RT
3,476,873 UART: [state] CFI Enabled
3,585,562 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,598,569 >>> mbox cmd response: failed
3,598,569 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,795 UART: [rt]cmd =0x46505652, len=4
3,628,466 UART: [rt] FIPS Version
3,629,567 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,266 ready_for_fw is high
1,363,266 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,096 >>> mbox cmd response: success
2,927,096 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,989,398 UART:
2,989,414 UART: Running Caliptra FMC ...
2,989,822 UART:
2,989,965 UART: [state] CFI Enabled
3,000,466 UART: [fht] FMC Alias Private Key: 7
3,108,091 UART: [art] Extend RT PCRs Done
3,108,519 UART: [art] Lock RT PCRs Done
3,109,981 UART: [art] Populate DV Done
3,118,300 UART: [fht] FMC Alias Private Key: 7
3,119,314 UART: [art] Derive CDI
3,119,594 UART: [art] Store in in slot 0x4
3,205,301 UART: [art] Derive Key Pair
3,205,661 UART: [art] Store priv key in slot 0x5
3,218,863 UART: [art] Derive Key Pair - Done
3,233,375 UART: [art] Signing Cert with AUTHO
3,233,855 UART: RITY.KEYID = 7
3,249,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,032 UART: [art] PUB.X = BE528C5C675A40E6B0F075BF13B01859496A2FC7B4E43B24764CD1D6774C842AC6008B299AA63031B5E61FF4DE18B5BF
3,256,788 UART: [art] PUB.Y = 115D7C23AFFBD27AA516218780C124A5B4DD5513ABAE653E047156CB1C6F9AADB43AF4BC507B71C298E3693C72A383CA
3,263,749 UART: [art] SIG.R = 819E52298380AC387DB7149F418CCB2914A9E8E230D50D2832AFDD9290721DFA454771706CBD733B47C2731D1BAD383B
3,270,516 UART: [art] SIG.S = 10AEF42EF44F4FA45696A254BFDFF95373C333591CE6445624080A3BD790B23146EFE634D4805B6A801BCC577BE2CA6A
3,294,383 UART: Caliptra RT
3,294,728 UART: [state] CFI Enabled
3,402,965 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,718 >>> mbox cmd response: failed
3,415,718 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,946 UART: [rt]cmd =0x46505652, len=4
3,445,617 UART: [rt] FIPS Version
3,446,666 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
893,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,423 UART: [kat] ++
897,575 UART: [kat] sha1
901,877 UART: [kat] SHA2-256
903,817 UART: [kat] SHA2-384
906,590 UART: [kat] SHA2-512-ACC
908,491 UART: [kat] ECC-384
918,404 UART: [kat] HMAC-384Kdf
923,128 UART: [kat] LMS
1,171,456 UART: [kat] --
1,172,183 UART: [cold-reset] ++
1,172,755 UART: [fht] FHT @ 0x50003400
1,175,516 UART: [idev] ++
1,175,684 UART: [idev] CDI.KEYID = 6
1,176,044 UART: [idev] SUBJECT.KEYID = 7
1,176,468 UART: [idev] UDS.KEYID = 0
1,176,813 ready_for_fw is high
1,176,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,240 UART: [idev] Erasing UDS.KEYID = 0
1,201,313 UART: [idev] Sha1 KeyId Algorithm
1,209,651 UART: [idev] --
1,210,623 UART: [ldev] ++
1,210,791 UART: [ldev] CDI.KEYID = 6
1,211,154 UART: [ldev] SUBJECT.KEYID = 5
1,211,580 UART: [ldev] AUTHORITY.KEYID = 7
1,212,043 UART: [ldev] FE.KEYID = 1
1,217,111 UART: [ldev] Erasing FE.KEYID = 1
1,243,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,983 UART: [ldev] --
1,282,460 UART: [fwproc] Wait for Commands...
1,283,220 UART: [fwproc] Recv command 0x46574c44
1,283,948 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,752 >>> mbox cmd response: success
2,775,752 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,776,838 UART: [afmc] ++
2,777,006 UART: [afmc] CDI.KEYID = 6
2,777,368 UART: [afmc] SUBJECT.KEYID = 7
2,777,793 UART: [afmc] AUTHORITY.KEYID = 5
2,812,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,157 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,770 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,489 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,373 UART: [afmc] --
2,856,461 UART: [cold-reset] --
2,857,257 UART: [state] Locking Datavault
2,858,538 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,142 UART: [state] Locking ICCM
2,859,760 UART: [exit] Launching FMC @ 0x40000130
2,865,089 UART:
2,865,105 UART: Running Caliptra FMC ...
2,865,513 UART:
2,865,567 UART: [state] CFI Enabled
2,876,028 UART: [fht] FMC Alias Private Key: 7
2,984,131 UART: [art] Extend RT PCRs Done
2,984,559 UART: [art] Lock RT PCRs Done
2,986,123 UART: [art] Populate DV Done
2,994,130 UART: [fht] FMC Alias Private Key: 7
2,995,128 UART: [art] Derive CDI
2,995,408 UART: [art] Store in in slot 0x4
3,080,899 UART: [art] Derive Key Pair
3,081,259 UART: [art] Store priv key in slot 0x5
3,094,607 UART: [art] Derive Key Pair - Done
3,109,050 UART: [art] Signing Cert with AUTHO
3,109,530 UART: RITY.KEYID = 7
3,124,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,537 UART: [art] PUB.X = 1A332F7CFC00BEB22E369C3AC6B921499AF56E3726DEF258FB3EBB2D85E9F841D12B598D2E098F9E33DBC9E0A4E65A88
3,132,300 UART: [art] PUB.Y = C5DD00A3A255E44D62E934E6DA8097B2285346CF8A9677AF43E9AE18A6D33254A080744BBE9B86EDB89CB9CC24E88907
3,139,233 UART: [art] SIG.R = 8788AEC297A9A9887482419F964EFCEE88804511D82F837E8315154AC2D7192E42AD557BE8053394969050757CB678D6
3,145,988 UART: [art] SIG.S = A3BCF662E6995BAEB3ECC67AE6AB51EF86D11094C888C223A576400EE0CF58BCD9AE6CC00E01910CA20462D8D143A18B
3,170,152 UART: Caliptra RT
3,170,405 UART: [state] CFI Enabled
3,277,905 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,290,842 >>> mbox cmd response: failed
3,290,842 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,350 UART: [rt]cmd =0x46505652, len=4
3,321,021 UART: [rt] FIPS Version
3,322,014 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,531 ready_for_fw is high
1,060,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,803 >>> mbox cmd response: success
2,627,803 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,690,837 UART:
2,690,853 UART: Running Caliptra FMC ...
2,691,261 UART:
2,691,315 UART: [state] CFI Enabled
2,701,676 UART: [fht] FMC Alias Private Key: 7
2,809,661 UART: [art] Extend RT PCRs Done
2,810,089 UART: [art] Lock RT PCRs Done
2,811,729 UART: [art] Populate DV Done
2,820,086 UART: [fht] FMC Alias Private Key: 7
2,821,192 UART: [art] Derive CDI
2,821,472 UART: [art] Store in in slot 0x4
2,907,151 UART: [art] Derive Key Pair
2,907,511 UART: [art] Store priv key in slot 0x5
2,921,019 UART: [art] Derive Key Pair - Done
2,935,776 UART: [art] Signing Cert with AUTHO
2,936,256 UART: RITY.KEYID = 7
2,951,604 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,369 UART: [art] PUB.X = D56F870B483FADC52BDF4A4826AF4B85247B645D50129C1FC63069D3A1281C3D8350FC4EF8B053F26792DD4DBC218380
2,959,142 UART: [art] PUB.Y = 0C4BC9F4294F5DB25D7A8007DBB1C46E98C90CE2FFCCDF150079EF6E4F01C02CEDCC1AB7F682F5D2939EBE55FAB47699
2,966,084 UART: [art] SIG.R = E39CD20B84E10CB93934733E039D0306F51B07419E30442CF4E72B188E7153CC8E840383648898D434B8CE0E030D8C43
2,972,816 UART: [art] SIG.S = 556B4AF917F22F308BF6AA89F89CCEDBC0A25EC3C6B56D12263A10686FFB576A88F290DD6F5E98F78D3FD28CCE419B78
2,997,551 UART: Caliptra RT
2,997,804 UART: [state] CFI Enabled
3,105,527 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,118,128 >>> mbox cmd response: failed
3,118,128 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,286 UART: [rt]cmd =0x46505652, len=4
3,147,957 UART: [rt] FIPS Version
3,149,126 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
893,759 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,884 UART: [kat] ++
898,036 UART: [kat] sha1
902,122 UART: [kat] SHA2-256
904,062 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,203 UART: [kat] HMAC-384Kdf
922,799 UART: [kat] LMS
1,171,127 UART: [kat] --
1,172,072 UART: [cold-reset] ++
1,172,636 UART: [fht] FHT @ 0x50003400
1,175,203 UART: [idev] ++
1,175,371 UART: [idev] CDI.KEYID = 6
1,175,731 UART: [idev] SUBJECT.KEYID = 7
1,176,155 UART: [idev] UDS.KEYID = 0
1,176,500 ready_for_fw is high
1,176,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,715 UART: [idev] Erasing UDS.KEYID = 0
1,200,398 UART: [idev] Sha1 KeyId Algorithm
1,208,756 UART: [idev] --
1,209,788 UART: [ldev] ++
1,209,956 UART: [ldev] CDI.KEYID = 6
1,210,319 UART: [ldev] SUBJECT.KEYID = 5
1,210,745 UART: [ldev] AUTHORITY.KEYID = 7
1,211,208 UART: [ldev] FE.KEYID = 1
1,216,346 UART: [ldev] Erasing FE.KEYID = 1
1,241,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,886 UART: [ldev] --
1,281,185 UART: [fwproc] Wait for Commands...
1,281,939 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,602 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,911 >>> mbox cmd response: success
2,773,911 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,775,031 UART: [afmc] ++
2,775,199 UART: [afmc] CDI.KEYID = 6
2,775,561 UART: [afmc] SUBJECT.KEYID = 7
2,775,986 UART: [afmc] AUTHORITY.KEYID = 5
2,811,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,636 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,364 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,968 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,826 UART: [afmc] --
2,854,800 UART: [cold-reset] --
2,855,878 UART: [state] Locking Datavault
2,857,127 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,731 UART: [state] Locking ICCM
2,858,189 UART: [exit] Launching FMC @ 0x40000130
2,863,518 UART:
2,863,534 UART: Running Caliptra FMC ...
2,863,942 UART:
2,864,085 UART: [state] CFI Enabled
2,874,816 UART: [fht] FMC Alias Private Key: 7
2,982,751 UART: [art] Extend RT PCRs Done
2,983,179 UART: [art] Lock RT PCRs Done
2,984,331 UART: [art] Populate DV Done
2,992,438 UART: [fht] FMC Alias Private Key: 7
2,993,494 UART: [art] Derive CDI
2,993,774 UART: [art] Store in in slot 0x4
3,079,515 UART: [art] Derive Key Pair
3,079,875 UART: [art] Store priv key in slot 0x5
3,093,121 UART: [art] Derive Key Pair - Done
3,108,146 UART: [art] Signing Cert with AUTHO
3,108,626 UART: RITY.KEYID = 7
3,123,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,703 UART: [art] PUB.X = 6CBF6C353E6D244609DE6A5C272235896BCC2FFDA9158E533B48A9873889647EE2422D6BC618DD30E71099185BF750B0
3,131,470 UART: [art] PUB.Y = 0DA363D4BE1223C3491699C2486119D6A778DE1A51F3DB7239CC2DAFC56A11311BDE2B4EBEC55798C7DD9EDCD3242D29
3,138,431 UART: [art] SIG.R = 0CC9182FD1EAECBEBFEA035F576ABC103A939F3E48C602777568953026389193DD9B95726C26ADFB370C84A7B7F002BE
3,145,196 UART: [art] SIG.S = 35007CB222C93364286F41C8A6D67A86E492D88375409E1AC27957D7925C308A6AFFAD1A37D5A0035933BB46A4E69AEE
3,169,120 UART: Caliptra RT
3,169,465 UART: [state] CFI Enabled
3,277,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,290,659 >>> mbox cmd response: failed
3,290,659 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,819 UART: [rt]cmd =0x46505652, len=4
3,320,490 UART: [rt] FIPS Version
3,321,533 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,448 ready_for_fw is high
1,061,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,280 >>> mbox cmd response: success
2,630,280 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,693,054 UART:
2,693,070 UART: Running Caliptra FMC ...
2,693,478 UART:
2,693,621 UART: [state] CFI Enabled
2,704,218 UART: [fht] FMC Alias Private Key: 7
2,812,375 UART: [art] Extend RT PCRs Done
2,812,803 UART: [art] Lock RT PCRs Done
2,814,125 UART: [art] Populate DV Done
2,822,422 UART: [fht] FMC Alias Private Key: 7
2,823,572 UART: [art] Derive CDI
2,823,852 UART: [art] Store in in slot 0x4
2,909,209 UART: [art] Derive Key Pair
2,909,569 UART: [art] Store priv key in slot 0x5
2,922,593 UART: [art] Derive Key Pair - Done
2,937,285 UART: [art] Signing Cert with AUTHO
2,937,765 UART: RITY.KEYID = 7
2,953,265 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,030 UART: [art] PUB.X = 90DED975FB7C1E4889CE4193A96496056F4DEDAA8FFAAA1FDF8B5AFFA34E6055BD887FF641EE84DAA74AC0B5F3AEC13E
2,960,829 UART: [art] PUB.Y = E81204762F32FCCDA0A7192A9E5B9A14043B9303E5F99F0C4F0EB2A170E2FBBA1C80286D24C1B694BF5BD1ABE43B8A44
2,967,780 UART: [art] SIG.R = A98B64C9A83ADD3F959A3DD4E58B9180810A936AB236C7357EECE9A4AEA9B1BFC91E6FAC532FB256115C650EEB784F96
2,974,562 UART: [art] SIG.S = 31EAFA7F722AC851B29FCD5F35625D2129D044D99291E4C6D9CDA1EC0F4DC2903753EFDA2C7CCC6B077B31E0DAF26974
2,998,127 UART: Caliptra RT
2,998,472 UART: [state] CFI Enabled
3,106,537 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,119,646 >>> mbox cmd response: failed
3,119,646 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,032 UART: [rt]cmd =0x46505652, len=4
3,149,703 UART: [rt] FIPS Version
3,150,620 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,997 UART: [kat] SHA2-256
901,937 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,250 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,170,035 UART: [cold-reset] ++
1,170,573 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,174,379 ready_for_fw is high
1,174,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,737 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,458 UART: [ldev] Erasing FE.KEYID = 1
1,241,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,066 UART: [ldev] --
1,280,542 UART: [fwproc] Wait for Commands...
1,281,329 UART: [fwproc] Recv command 0x46574c44
1,282,062 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,379 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,580 >>> mbox cmd response: success
2,773,580 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,774,739 UART: [afmc] ++
2,774,907 UART: [afmc] CDI.KEYID = 6
2,775,270 UART: [afmc] SUBJECT.KEYID = 7
2,775,696 UART: [afmc] AUTHORITY.KEYID = 5
2,811,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,646 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,375 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,258 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,977 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,900 UART: [afmc] --
2,854,846 UART: [cold-reset] --
2,855,832 UART: [state] Locking Datavault
2,856,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,531 UART: [state] Locking ICCM
2,858,149 UART: [exit] Launching FMC @ 0x40000130
2,863,478 UART:
2,863,494 UART: Running Caliptra FMC ...
2,863,902 UART:
2,863,956 UART: [state] CFI Enabled
2,874,517 UART: [fht] FMC Alias Private Key: 7
2,982,224 UART: [art] Extend RT PCRs Done
2,982,652 UART: [art] Lock RT PCRs Done
2,984,226 UART: [art] Populate DV Done
2,992,467 UART: [fht] FMC Alias Private Key: 7
2,993,573 UART: [art] Derive CDI
2,993,853 UART: [art] Store in in slot 0x4
3,079,720 UART: [art] Derive Key Pair
3,080,080 UART: [art] Store priv key in slot 0x5
3,093,176 UART: [art] Derive Key Pair - Done
3,107,916 UART: [art] Signing Cert with AUTHO
3,108,396 UART: RITY.KEYID = 7
3,123,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,647 UART: [art] PUB.X = 160F2F5CF1722A3B85D4D19B7307BFFFCEF21ACE6C97F928FFF8275C5F1AF8D01E9782B95A442733CD834BC016D7C6AC
3,131,429 UART: [art] PUB.Y = 1F3D4F1A21696E6D2B5514E1471BF5104FD5D00D8BD40466D18A924944927C2FA3C32FEA44B551804DDB42F7D3B99185
3,138,375 UART: [art] SIG.R = D8B4D68E910D33984EBD20488F6FD0ACA050B5217A8E8A61FD7D254284E9770FA5D87778A55748BA418B385FE2C9045A
3,145,140 UART: [art] SIG.S = D3CFAA26E42D34654A44A3D9278B32D115D24F10C0714EDA0E50259B1BD47C92C6A6FFCE9C05CF69F599E79F36AAF719
3,168,907 UART: Caliptra RT
3,169,160 UART: [state] CFI Enabled
3,276,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,003 >>> mbox cmd response: failed
3,289,003 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,243 UART: [rt]cmd =0x46505652, len=4
3,318,914 UART: [rt] FIPS Version
3,320,051 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,816 ready_for_fw is high
1,055,816 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,940 >>> mbox cmd response: success
2,623,940 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,686,124 UART:
2,686,140 UART: Running Caliptra FMC ...
2,686,548 UART:
2,686,602 UART: [state] CFI Enabled
2,697,103 UART: [fht] FMC Alias Private Key: 7
2,805,646 UART: [art] Extend RT PCRs Done
2,806,074 UART: [art] Lock RT PCRs Done
2,807,506 UART: [art] Populate DV Done
2,815,867 UART: [fht] FMC Alias Private Key: 7
2,816,995 UART: [art] Derive CDI
2,817,275 UART: [art] Store in in slot 0x4
2,903,038 UART: [art] Derive Key Pair
2,903,398 UART: [art] Store priv key in slot 0x5
2,917,106 UART: [art] Derive Key Pair - Done
2,932,018 UART: [art] Signing Cert with AUTHO
2,932,498 UART: RITY.KEYID = 7
2,947,818 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,583 UART: [art] PUB.X = 07914E4EAC6E835AA4918A083FD6033C856601D5165FFAB94B7191205975B61187F0AF54C558F1440B37A2A86C427F0E
2,955,331 UART: [art] PUB.Y = 207830B1C80C45DBC997E445160EE8A94F31FDA9CC3D3495FD7006218A133FB4A058C571297E1D0F3EAF676BA65F3ACB
2,962,279 UART: [art] SIG.R = 4DAD22B3CF67579A20A9A1884CB460CC55D36EE78703D9108D39F8AC36D7780D6E33F04E3D4CB79BD28CB9BC485F001F
2,969,033 UART: [art] SIG.S = 50EC2BFC01FA959318D704519BE6C6E045B8373505ED3A7BF2532334B219C7823511726600400CA679568016D70CCD82
2,992,523 UART: Caliptra RT
2,992,776 UART: [state] CFI Enabled
3,100,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,113,598 >>> mbox cmd response: failed
3,113,598 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,108 UART: [rt]cmd =0x46505652, len=4
3,143,779 UART: [rt] FIPS Version
3,144,966 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
900,272 UART: [kat] SHA2-256
902,212 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,754 UART: [fht] FHT @ 0x50003400
1,173,430 UART: [idev] ++
1,173,598 UART: [idev] CDI.KEYID = 6
1,173,959 UART: [idev] SUBJECT.KEYID = 7
1,174,384 UART: [idev] UDS.KEYID = 0
1,174,730 ready_for_fw is high
1,174,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,238 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,413 UART: [ldev] ++
1,209,581 UART: [ldev] CDI.KEYID = 6
1,209,945 UART: [ldev] SUBJECT.KEYID = 5
1,210,372 UART: [ldev] AUTHORITY.KEYID = 7
1,210,835 UART: [ldev] FE.KEYID = 1
1,216,109 UART: [ldev] Erasing FE.KEYID = 1
1,242,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,435 UART: [ldev] --
1,281,753 UART: [fwproc] Wait for Commands...
1,282,494 UART: [fwproc] Recv command 0x46574c44
1,283,227 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,760 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,069 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,069 >>> mbox cmd response: success
2,776,069 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,777,212 UART: [afmc] ++
2,777,380 UART: [afmc] CDI.KEYID = 6
2,777,743 UART: [afmc] SUBJECT.KEYID = 7
2,778,169 UART: [afmc] AUTHORITY.KEYID = 5
2,813,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,398 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,281 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,000 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,861 UART: [afmc] --
2,856,947 UART: [cold-reset] --
2,857,871 UART: [state] Locking Datavault
2,858,748 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,352 UART: [state] Locking ICCM
2,859,936 UART: [exit] Launching FMC @ 0x40000130
2,865,265 UART:
2,865,281 UART: Running Caliptra FMC ...
2,865,689 UART:
2,865,832 UART: [state] CFI Enabled
2,876,235 UART: [fht] FMC Alias Private Key: 7
2,984,052 UART: [art] Extend RT PCRs Done
2,984,480 UART: [art] Lock RT PCRs Done
2,985,890 UART: [art] Populate DV Done
2,994,085 UART: [fht] FMC Alias Private Key: 7
2,995,075 UART: [art] Derive CDI
2,995,355 UART: [art] Store in in slot 0x4
3,080,936 UART: [art] Derive Key Pair
3,081,296 UART: [art] Store priv key in slot 0x5
3,094,422 UART: [art] Derive Key Pair - Done
3,109,142 UART: [art] Signing Cert with AUTHO
3,109,622 UART: RITY.KEYID = 7
3,124,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,387 UART: [art] PUB.X = C69EF33F37DCAC0138351BBD906F8D4793F81165C22189B9E8EC7E1909F877C497898B50C826DC05A3AFA0CB3089C9D2
3,132,154 UART: [art] PUB.Y = C6B8A449E211C27780A909AE28BDDE51529CAEDEC97ECB63CE6E188FD0DD2937083DFA92A046CE4243CAA6DFF1849342
3,139,116 UART: [art] SIG.R = 1ABB566C5903B109990DCA06CCF201872C4B2F53CA9E64813C0ED9CF254FEE0BB600086101A0F8888916BA11F09E5AB1
3,145,845 UART: [art] SIG.S = 64BF75196F4F9AD27EF75CEAE497B0C78A5E0D64108FEBAC9773CE355ADA5640F668DCF367321BBA49B23D8C72F4F480
3,169,609 UART: Caliptra RT
3,169,954 UART: [state] CFI Enabled
3,277,345 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,290,090 >>> mbox cmd response: failed
3,290,090 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,532 UART: [rt]cmd =0x46505652, len=4
3,320,203 UART: [rt] FIPS Version
3,321,208 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,937 ready_for_fw is high
1,056,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,897 >>> mbox cmd response: success
2,623,897 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,685,705 UART:
2,685,721 UART: Running Caliptra FMC ...
2,686,129 UART:
2,686,272 UART: [state] CFI Enabled
2,697,235 UART: [fht] FMC Alias Private Key: 7
2,805,920 UART: [art] Extend RT PCRs Done
2,806,348 UART: [art] Lock RT PCRs Done
2,807,670 UART: [art] Populate DV Done
2,815,993 UART: [fht] FMC Alias Private Key: 7
2,817,117 UART: [art] Derive CDI
2,817,397 UART: [art] Store in in slot 0x4
2,902,960 UART: [art] Derive Key Pair
2,903,320 UART: [art] Store priv key in slot 0x5
2,916,610 UART: [art] Derive Key Pair - Done
2,931,230 UART: [art] Signing Cert with AUTHO
2,931,710 UART: RITY.KEYID = 7
2,947,254 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,019 UART: [art] PUB.X = 707C6FA4E08079EA325DE4C242E2FCBD220D28CA4E8361B0A073CAD7437D9DF54C94CB74C17D243394F8C5B90F563935
2,954,791 UART: [art] PUB.Y = B7FF1D05E197A7E4FD08753B46C3974374166A0A4F90DAA9163B106E6A53FA608D035385012ED5A222536A32F6E8BAF3
2,961,728 UART: [art] SIG.R = 15C755F22778AA85653D692143FA4B2BE4AD552F37A07F06273F5AB6C45423E26D8DD168F397CD39144E0851D10B3E3C
2,968,489 UART: [art] SIG.S = FB9219E070D8297092189FD58DA17287A243CAFABF3591B281CC16793176D0528856316A38B0EE07DA9D928BC20064F2
2,992,117 UART: Caliptra RT
2,992,462 UART: [state] CFI Enabled
3,100,859 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,113,814 >>> mbox cmd response: failed
3,113,814 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,166 UART: [rt]cmd =0x46505652, len=4
3,143,837 UART: [rt] FIPS Version
3,144,810 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
191,961 UART:
192,340 UART: Running Caliptra ROM ...
193,528 UART:
193,688 UART: [state] CFI Enabled
261,109 UART: [state] LifecycleState = Unprovisioned
263,088 UART: [state] DebugLocked = No
265,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,934 UART: [kat] SHA2-256
439,669 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,149 UART: [kat] ++
450,601 UART: [kat] sha1
461,185 UART: [kat] SHA2-256
463,868 UART: [kat] SHA2-384
470,011 UART: [kat] SHA2-512-ACC
472,383 UART: [kat] ECC-384
2,766,956 UART: [kat] HMAC-384Kdf
2,798,807 UART: [kat] LMS
3,989,078 UART: [kat] --
3,995,702 UART: [cold-reset] ++
3,996,922 UART: [fht] Storing FHT @ 0x50003400
4,007,984 UART: [idev] ++
4,008,549 UART: [idev] CDI.KEYID = 6
4,009,443 UART: [idev] SUBJECT.KEYID = 7
4,010,694 UART: [idev] UDS.KEYID = 0
4,011,660 ready_for_fw is high
4,011,857 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,398 UART: [idev] Erasing UDS.KEYID = 0
7,342,491 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,671 UART: [idev] --
7,368,938 UART: [ldev] ++
7,369,507 UART: [ldev] CDI.KEYID = 6
7,370,478 UART: [ldev] SUBJECT.KEYID = 5
7,371,690 UART: [ldev] AUTHORITY.KEYID = 7
7,372,945 UART: [ldev] FE.KEYID = 1
7,419,871 UART: [ldev] Erasing FE.KEYID = 1
10,756,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,750 UART: [ldev] --
13,133,983 UART: [fwproc] Waiting for Commands...
13,136,881 UART: [fwproc] Received command 0x46574c44
13,139,117 UART: [fwproc] Received Image of size 114124 bytes
17,192,639 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,216 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,650,035 >>> mbox cmd response: success
17,650,563 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,654,676 UART: [afmc] ++
17,655,288 UART: [afmc] CDI.KEYID = 6
17,656,173 UART: [afmc] SUBJECT.KEYID = 7
17,657,448 UART: [afmc] AUTHORITY.KEYID = 5
21,028,114 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,418 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,682 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,109 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,932 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,340 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,182 UART: [afmc] --
23,397,347 UART: [cold-reset] --
23,401,971 UART: [state] Locking Datavault
23,408,464 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,163 UART: [state] Locking ICCM
23,411,515 UART: [exit] Launching FMC @ 0x40000130
23,419,761 UART:
23,420,015 UART: Running Caliptra FMC ...
23,421,049 UART:
23,421,201 UART: [state] CFI Enabled
23,485,957 UART: [fht] FMC Alias Private Key: 7
25,824,046 UART: [art] Extend RT PCRs Done
25,825,273 UART: [art] Lock RT PCRs Done
25,826,602 UART: [art] Populate DV Done
25,832,170 UART: [fht] FMC Alias Private Key: 7
25,833,662 UART: [art] Derive CDI
25,834,426 UART: [art] Store in in slot 0x4
25,894,202 UART: [art] Derive Key Pair
25,895,240 UART: [art] Store priv key in slot 0x5
29,187,416 UART: [art] Derive Key Pair - Done
29,200,354 UART: [art] Signing Cert with AUTHO
29,201,654 UART: RITY.KEYID = 7
31,489,022 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,529 UART: [art] PUB.X = 8C99EB083FA28A5ECB0EE1A7C6DFCDA33D2D21648CB499A7C4B142311D74FB17F0FAC101C962948C635A73D80629FBAD
31,497,807 UART: [art] PUB.Y = 396C467EFB149E6E58EC8DFAB25074BC3588A2E5C6BC643078245258BD3C1691A2B912E1BEC4A595452CBFE97BBAD9DD
31,505,068 UART: [art] SIG.R = E196B2EB41677986D6A97439B720556DDCF4ABEBB89F4CE42C94FDE3F5868B250F4B56F73D1A7C113C0628D5657515C6
31,512,417 UART: [art] SIG.S = F17FF0E54C5E55672196F1369244AB566A8B48CD689F75FCC2E17950FDD11292DE3B3CBA45569A08A3169A119373B908
32,816,918 UART: Caliptra RT
32,817,620 UART: [state] CFI Enabled
32,979,513 UART: [rt] RT listening for mailbox commands...
32,982,076 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,781,798 ready_for_fw is high
3,782,193 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,854,021 >>> mbox cmd response: success
17,854,617 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,544,660 UART:
23,545,036 UART: Running Caliptra FMC ...
23,546,167 UART:
23,546,325 UART: [state] CFI Enabled
23,597,119 UART: [fht] FMC Alias Private Key: 7
25,935,000 UART: [art] Extend RT PCRs Done
25,936,233 UART: [art] Lock RT PCRs Done
25,937,781 UART: [art] Populate DV Done
25,943,464 UART: [fht] FMC Alias Private Key: 7
25,945,115 UART: [art] Derive CDI
25,945,852 UART: [art] Store in in slot 0x4
26,005,251 UART: [art] Derive Key Pair
26,006,299 UART: [art] Store priv key in slot 0x5
29,298,895 UART: [art] Derive Key Pair - Done
29,311,783 UART: [art] Signing Cert with AUTHO
29,313,095 UART: RITY.KEYID = 7
31,600,555 UART: [art] Erasing AUTHORITY.KEYID = 7
31,602,061 UART: [art] PUB.X = 439ABC4C32C21ABBC318C765D505D23FD560803F9CC236FE180E440115B9BA2B8B7363B81E69225C2BB68C33C8F6A394
31,609,301 UART: [art] PUB.Y = 69B6B12A9FC820F62DE1C0D1646277131FED1362D91EAA79626D80BF5932689E0E095E84272FDB3BC2A9C90D18DC4166
31,616,506 UART: [art] SIG.R = E569EA04EAEE7E47B37C8B552007A95E0BDD91494F9AFC36861453D768CB42C748F11CD2A9E971FDACE6EA96025A5412
31,623,928 UART: [art] SIG.S = A3067D92F6B214D2249E47AEF7F4BA735407BC3B4E0880CD52A6104585B25A7CDB76DA2BEEF23773687C49CF7DF1F3BB
32,929,079 UART: Caliptra RT
32,929,800 UART: [state] CFI Enabled
33,091,076 UART: [rt] RT listening for mailbox commands...
33,093,650 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
192,632 UART:
192,992 UART: Running Caliptra ROM ...
194,200 UART:
603,794 UART: [state] CFI Enabled
620,732 UART: [state] LifecycleState = Unprovisioned
622,700 UART: [state] DebugLocked = No
625,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,948 UART: [kat] SHA2-256
800,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,254 UART: [kat] ++
811,729 UART: [kat] sha1
823,523 UART: [kat] SHA2-256
826,246 UART: [kat] SHA2-384
832,442 UART: [kat] SHA2-512-ACC
834,803 UART: [kat] ECC-384
3,120,020 UART: [kat] HMAC-384Kdf
3,132,043 UART: [kat] LMS
4,322,146 UART: [kat] --
4,325,331 UART: [cold-reset] ++
4,326,558 UART: [fht] Storing FHT @ 0x50003400
4,338,746 UART: [idev] ++
4,339,385 UART: [idev] CDI.KEYID = 6
4,340,287 UART: [idev] SUBJECT.KEYID = 7
4,341,525 UART: [idev] UDS.KEYID = 0
4,342,505 ready_for_fw is high
4,342,708 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,034 UART: [idev] Erasing UDS.KEYID = 0
7,628,839 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,915 UART: [idev] --
7,655,204 UART: [ldev] ++
7,655,777 UART: [ldev] CDI.KEYID = 6
7,656,708 UART: [ldev] SUBJECT.KEYID = 5
7,657,966 UART: [ldev] AUTHORITY.KEYID = 7
7,659,110 UART: [ldev] FE.KEYID = 1
7,670,488 UART: [ldev] Erasing FE.KEYID = 1
10,960,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,521 UART: [ldev] --
13,317,483 UART: [fwproc] Waiting for Commands...
13,319,241 UART: [fwproc] Received command 0x46574c44
13,321,417 UART: [fwproc] Received Image of size 114124 bytes
17,372,516 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,984 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,822 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,832,061 >>> mbox cmd response: success
17,832,614 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,835,877 UART: [afmc] ++
17,836,476 UART: [afmc] CDI.KEYID = 6
17,837,352 UART: [afmc] SUBJECT.KEYID = 7
17,838,614 UART: [afmc] AUTHORITY.KEYID = 5
21,151,488 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,359 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,668 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,024 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,854 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,292 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,711 UART: [afmc] --
23,513,989 UART: [cold-reset] --
23,518,006 UART: [state] Locking Datavault
23,523,956 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,704 UART: [state] Locking ICCM
23,528,362 UART: [exit] Launching FMC @ 0x40000130
23,536,754 UART:
23,537,006 UART: Running Caliptra FMC ...
23,538,114 UART:
23,538,264 UART: [state] CFI Enabled
23,546,467 UART: [fht] FMC Alias Private Key: 7
25,877,492 UART: [art] Extend RT PCRs Done
25,878,754 UART: [art] Lock RT PCRs Done
25,880,564 UART: [art] Populate DV Done
25,885,975 UART: [fht] FMC Alias Private Key: 7
25,887,622 UART: [art] Derive CDI
25,888,430 UART: [art] Store in in slot 0x4
25,930,995 UART: [art] Derive Key Pair
25,932,041 UART: [art] Store priv key in slot 0x5
29,173,990 UART: [art] Derive Key Pair - Done
29,186,878 UART: [art] Signing Cert with AUTHO
29,188,174 UART: RITY.KEYID = 7
31,467,500 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,043 UART: [art] PUB.X = 4B8BA28FCB9F16146B23D7E55A97F955E23595218A7DC7566650D3C3045B1AF6B3B7DED083BF5E388383B0615E941953
31,476,306 UART: [art] PUB.Y = 19B08860A6D275C3A94526810E43545DFFBA3CB1C2CA26B0C8D20D8A8029273152C12C9A72748220DFF0B7A35C50AA41
31,483,530 UART: [art] SIG.R = 52A344B08F6C8487AEAA82CE45468519BFE10F74FA4AE232F5E1536170002F9C6187D6B57C3CFB34215662CDADBA4D04
31,490,904 UART: [art] SIG.S = 8A6B4BE6B100DD4B530BE17BBA0F28797D65F204207BFDB359DB97202D9346B2D06CA4ADCCADCE0561599972B9C9ABE8
32,796,223 UART: Caliptra RT
32,796,936 UART: [state] CFI Enabled
32,914,382 UART: [rt] RT listening for mailbox commands...
32,916,725 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,128,966 ready_for_fw is high
4,129,652 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,083,892 >>> mbox cmd response: success
18,084,553 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,726,681 UART:
23,727,058 UART: Running Caliptra FMC ...
23,728,198 UART:
23,728,350 UART: [state] CFI Enabled
23,736,285 UART: [fht] FMC Alias Private Key: 7
26,068,002 UART: [art] Extend RT PCRs Done
26,069,238 UART: [art] Lock RT PCRs Done
26,070,752 UART: [art] Populate DV Done
26,076,166 UART: [fht] FMC Alias Private Key: 7
26,077,812 UART: [art] Derive CDI
26,078,545 UART: [art] Store in in slot 0x4
26,120,972 UART: [art] Derive Key Pair
26,121,966 UART: [art] Store priv key in slot 0x5
29,363,896 UART: [art] Derive Key Pair - Done
29,377,054 UART: [art] Signing Cert with AUTHO
29,378,355 UART: RITY.KEYID = 7
31,657,894 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,417 UART: [art] PUB.X = 5AEA3384B55F3EF1BBC9FCA33A3D8DE0112262E367801EF0F5530A799684D4776A43138DC713B1CC3E340458E4E987DA
31,666,606 UART: [art] PUB.Y = D89D073A192F213E32290A5C6BB962D85C135BB6B4948A852A456FA51DBF0E1B995C49EF435EB477BED39499CB8671CF
31,673,843 UART: [art] SIG.R = 95464E56C38FC3F9DE79E671514436E7D6E541CCAB19D2303AD4D476584E027A28E2798A718CFA1FFEA53FA8A8BB7226
31,681,231 UART: [art] SIG.S = 423D14EC7D6E8771934C14F68BBDF5455D3D04A904554B546B45F1D7BAD0AD951A09F39C035F6379A4655743AF578C08
32,986,810 UART: Caliptra RT
32,987,528 UART: [state] CFI Enabled
33,105,219 UART: [rt] RT listening for mailbox commands...
33,107,839 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,318 UART:
192,673 UART: Running Caliptra ROM ...
193,866 UART:
194,016 UART: [state] CFI Enabled
262,351 UART: [state] LifecycleState = Unprovisioned
264,274 UART: [state] DebugLocked = No
266,448 UART: [state] WD Timer not started. Device not locked for debugging
269,552 UART: [kat] SHA2-256
448,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,286 UART: [kat] ++
460,762 UART: [kat] sha1
471,705 UART: [kat] SHA2-256
474,713 UART: [kat] SHA2-384
481,623 UART: [kat] SHA2-512-ACC
484,555 UART: [kat] ECC-384
2,946,705 UART: [kat] HMAC-384Kdf
2,973,928 UART: [kat] LMS
3,503,400 UART: [kat] --
3,508,339 UART: [cold-reset] ++
3,509,843 UART: [fht] FHT @ 0x50003400
3,520,221 UART: [idev] ++
3,520,793 UART: [idev] CDI.KEYID = 6
3,521,679 UART: [idev] SUBJECT.KEYID = 7
3,522,863 UART: [idev] UDS.KEYID = 0
3,523,845 ready_for_fw is high
3,524,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,973 UART: [idev] Erasing UDS.KEYID = 0
6,028,969 UART: [idev] Sha1 KeyId Algorithm
6,052,530 UART: [idev] --
6,055,712 UART: [ldev] ++
6,056,278 UART: [ldev] CDI.KEYID = 6
6,057,163 UART: [ldev] SUBJECT.KEYID = 5
6,058,376 UART: [ldev] AUTHORITY.KEYID = 7
6,059,660 UART: [ldev] FE.KEYID = 1
6,101,486 UART: [ldev] Erasing FE.KEYID = 1
8,605,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,018 UART: [ldev] --
10,415,040 UART: [fwproc] Wait for Commands...
10,417,786 UART: [fwproc] Recv command 0x46574c44
10,419,822 UART: [fwproc] Recv'd Img size: 114448 bytes
13,818,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,823 >>> mbox cmd response: success
14,284,380 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,287,337 UART: [afmc] ++
14,287,909 UART: [afmc] CDI.KEYID = 6
14,288,788 UART: [afmc] SUBJECT.KEYID = 7
14,289,965 UART: [afmc] AUTHORITY.KEYID = 5
16,827,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,580 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,312 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,378 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,228 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,404 UART: [afmc] --
18,630,345 UART: [cold-reset] --
18,631,994 UART: [state] Locking Datavault
18,638,048 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,696 UART: [state] Locking ICCM
18,641,680 UART: [exit] Launching FMC @ 0x40000130
18,650,073 UART:
18,650,308 UART: Running Caliptra FMC ...
18,651,408 UART:
18,651,587 UART: [state] CFI Enabled
18,712,463 UART: [fht] FMC Alias Private Key: 7
20,476,092 UART: [art] Extend RT PCRs Done
20,477,309 UART: [art] Lock RT PCRs Done
20,479,336 UART: [art] Populate DV Done
20,484,861 UART: [fht] FMC Alias Private Key: 7
20,486,398 UART: [art] Derive CDI
20,487,131 UART: [art] Store in in slot 0x4
20,545,446 UART: [art] Derive Key Pair
20,546,483 UART: [art] Store priv key in slot 0x5
23,009,666 UART: [art] Derive Key Pair - Done
23,022,875 UART: [art] Signing Cert with AUTHO
23,024,207 UART: RITY.KEYID = 7
24,735,618 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,114 UART: [art] PUB.X = 64F63C6B47AB4140D32D5958445E94BF810EA2194619DDD60D05A6AF64EAAEE468B03F98970E6038165635D6D7E05714
24,744,368 UART: [art] PUB.Y = 85F96CBE261FD3BE5EACFB987DF70ADC27C976EC439B541FAF94D0A22742277A1CC0DB2CEC03851B82A45C2727FE1A71
24,751,676 UART: [art] SIG.R = 138D90FC2F96D09689E86DEDF02725AF46983A46E69B96EBB10BB71766F908F0645F1A3E01AEB283880EFD91ABB98218
24,759,079 UART: [art] SIG.S = 09084607FB05767FDFC3B95F4C47122D27B6051576FD82ED24D93ED4FCBD12E9D90FC238737CB7D3E549CA365F9B142E
25,737,843 UART: Caliptra RT
25,738,563 UART: [state] CFI Enabled
25,905,013 UART: [rt] RT listening for mailbox commands...
25,907,424 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,384,917 ready_for_fw is high
3,385,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,081,041 >>> mbox cmd response: success
14,081,942 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,364,566 UART:
18,364,945 UART: Running Caliptra FMC ...
18,366,084 UART:
18,366,246 UART: [state] CFI Enabled
18,434,534 UART: [fht] FMC Alias Private Key: 7
20,198,645 UART: [art] Extend RT PCRs Done
20,199,852 UART: [art] Lock RT PCRs Done
20,201,366 UART: [art] Populate DV Done
20,206,668 UART: [fht] FMC Alias Private Key: 7
20,208,153 UART: [art] Derive CDI
20,208,928 UART: [art] Store in in slot 0x4
20,267,406 UART: [art] Derive Key Pair
20,268,436 UART: [art] Store priv key in slot 0x5
22,731,305 UART: [art] Derive Key Pair - Done
22,744,194 UART: [art] Signing Cert with AUTHO
22,745,492 UART: RITY.KEYID = 7
24,457,414 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,899 UART: [art] PUB.X = CE02DCDD30D35F64462AD10F85DB14C3181B522FB893B91A3DD0C7006543233B766185A65CCB4C27163466C68AFEA688
24,466,136 UART: [art] PUB.Y = BEDF3A774427F44043FB86836CBF7ABC70FDAD5D4EF9CAE3E6478806CE9F39271DBB359C98103F86547AE0808E42FD14
24,473,452 UART: [art] SIG.R = 22899DE2FCA291451CF5148128BAF63B32B5439D4C95CEF79E64DA91618E83EFFA720D8CBE16551C5A30475C41DD9EA8
24,480,841 UART: [art] SIG.S = 057843110E7E823A26A32D8DA4B6932E4E89372AFECAD68651F825B75E3CA8C985BD04AA9676CC3A2444640C147047F5
25,459,629 UART: Caliptra RT
25,460,350 UART: [state] CFI Enabled
25,625,617 UART: [rt] RT listening for mailbox commands...
25,628,020 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
192,216 UART:
192,592 UART: Running Caliptra ROM ...
193,782 UART:
603,367 UART: [state] CFI Enabled
614,133 UART: [state] LifecycleState = Unprovisioned
616,037 UART: [state] DebugLocked = No
618,623 UART: [state] WD Timer not started. Device not locked for debugging
622,859 UART: [kat] SHA2-256
801,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,568 UART: [kat] ++
814,012 UART: [kat] sha1
825,663 UART: [kat] SHA2-256
828,667 UART: [kat] SHA2-384
836,069 UART: [kat] SHA2-512-ACC
839,073 UART: [kat] ECC-384
3,281,196 UART: [kat] HMAC-384Kdf
3,293,714 UART: [kat] LMS
3,823,229 UART: [kat] --
3,826,940 UART: [cold-reset] ++
3,828,646 UART: [fht] FHT @ 0x50003400
3,840,466 UART: [idev] ++
3,841,019 UART: [idev] CDI.KEYID = 6
3,842,048 UART: [idev] SUBJECT.KEYID = 7
3,843,146 UART: [idev] UDS.KEYID = 0
3,844,205 ready_for_fw is high
3,844,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,607 UART: [idev] Erasing UDS.KEYID = 0
6,314,483 UART: [idev] Sha1 KeyId Algorithm
6,338,338 UART: [idev] --
6,342,493 UART: [ldev] ++
6,343,059 UART: [ldev] CDI.KEYID = 6
6,343,942 UART: [ldev] SUBJECT.KEYID = 5
6,345,145 UART: [ldev] AUTHORITY.KEYID = 7
6,346,421 UART: [ldev] FE.KEYID = 1
6,357,574 UART: [ldev] Erasing FE.KEYID = 1
8,830,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,862 UART: [ldev] --
10,622,972 UART: [fwproc] Wait for Commands...
10,625,438 UART: [fwproc] Recv command 0x46574c44
10,627,523 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,494,217 >>> mbox cmd response: success
14,494,773 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,497,828 UART: [afmc] ++
14,498,407 UART: [afmc] CDI.KEYID = 6
14,499,310 UART: [afmc] SUBJECT.KEYID = 7
14,500,524 UART: [afmc] AUTHORITY.KEYID = 5
16,996,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,047 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,853 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,708 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,797 UART: [afmc] --
18,793,879 UART: [cold-reset] --
18,797,142 UART: [state] Locking Datavault
18,803,417 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,112 UART: [state] Locking ICCM
18,807,579 UART: [exit] Launching FMC @ 0x40000130
18,815,964 UART:
18,816,193 UART: Running Caliptra FMC ...
18,817,290 UART:
18,817,442 UART: [state] CFI Enabled
18,825,919 UART: [fht] FMC Alias Private Key: 7
20,582,082 UART: [art] Extend RT PCRs Done
20,583,292 UART: [art] Lock RT PCRs Done
20,585,004 UART: [art] Populate DV Done
20,590,576 UART: [fht] FMC Alias Private Key: 7
20,592,054 UART: [art] Derive CDI
20,592,811 UART: [art] Store in in slot 0x4
20,635,399 UART: [art] Derive Key Pair
20,636,459 UART: [art] Store priv key in slot 0x5
23,063,672 UART: [art] Derive Key Pair - Done
23,076,399 UART: [art] Signing Cert with AUTHO
23,077,700 UART: RITY.KEYID = 7
24,783,236 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,730 UART: [art] PUB.X = 003E74091BA6BB06F299019F1270BD3ED419D55D450EEA1F5BFB156177CAD840367B33E5FE54315FE4CB65A2211F2FF8
24,791,963 UART: [art] PUB.Y = 2EC1ADA2D096F08217A134015FE3B5C92FE16AE397D3E2AC6062BB97CCAFD1F248A88F6CD561AFF29B37CDD31B063CC5
24,799,245 UART: [art] SIG.R = 6575C1CDD903F58CDB2F4EA279C9709EBD39CD66D20E8F0FC122E17464A5D226A9F7F2D8E0817E2158E0BA150D43CC7B
24,806,677 UART: [art] SIG.S = 4945740364D1F4FCC4206F4625D24643CAFCD9CBEEFE5918AECB39D4BFB38AD7C1D35B772A2A559B999D4FFE5C656E29
25,785,265 UART: Caliptra RT
25,785,963 UART: [state] CFI Enabled
25,903,051 UART: [rt] RT listening for mailbox commands...
25,905,669 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,697,610 ready_for_fw is high
3,698,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,285,005 >>> mbox cmd response: success
14,285,832 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,536,493 UART:
18,536,914 UART: Running Caliptra FMC ...
18,538,020 UART:
18,538,173 UART: [state] CFI Enabled
18,546,184 UART: [fht] FMC Alias Private Key: 7
20,302,523 UART: [art] Extend RT PCRs Done
20,303,761 UART: [art] Lock RT PCRs Done
20,305,222 UART: [art] Populate DV Done
20,310,479 UART: [fht] FMC Alias Private Key: 7
20,312,016 UART: [art] Derive CDI
20,312,773 UART: [art] Store in in slot 0x4
20,355,602 UART: [art] Derive Key Pair
20,356,640 UART: [art] Store priv key in slot 0x5
22,783,592 UART: [art] Derive Key Pair - Done
22,796,557 UART: [art] Signing Cert with AUTHO
22,797,866 UART: RITY.KEYID = 7
24,503,510 UART: [art] Erasing AUTHORITY.KEYID = 7
24,505,017 UART: [art] PUB.X = BA6DCE8F377792E4127FA85F1A7943EE8F4057EC60DC8DDC8EA5A12E63B828A9FF31BD95DE22E2BB000ECC7554849B85
24,512,291 UART: [art] PUB.Y = E138BB346E3161FB27D687C223F64A8B5B494EF1056661A8FAA36C5E8AE0C113F19C4AA4D458256CD4A2B5B938B5BD42
24,519,510 UART: [art] SIG.R = 13359EFAAC9C7E630458A7DC15C2FEC9B0A467D703C91911ED4F90395BC5A7B2F79FB3BAFD3C5F21856F0DFC6CA9B05A
24,526,959 UART: [art] SIG.S = C3F496563AD2871A258EB4C9A832DBAEBA515C2F266D3376D4AE455728C6B55169540346187378365B49E7D5D6064F85
25,506,429 UART: Caliptra RT
25,507,126 UART: [state] CFI Enabled
25,624,236 UART: [rt] RT listening for mailbox commands...
25,626,679 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,437,753 ready_for_fw is high
3,438,444 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,153 >>> mbox cmd response: success
14,736,885 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,026,322 UART:
19,026,722 UART: Running Caliptra FMC ...
19,027,873 UART:
19,028,036 UART: [state] CFI Enabled
19,097,630 UART: [fht] FMC Alias Private Key: 7
20,861,741 UART: [art] Extend RT PCRs Done
20,862,958 UART: [art] Lock RT PCRs Done
20,864,443 UART: [art] Populate DV Done
20,869,750 UART: [fht] FMC Alias Private Key: 7
20,871,243 UART: [art] Derive CDI
20,871,979 UART: [art] Store in in slot 0x4
20,930,509 UART: [art] Derive Key Pair
20,931,549 UART: [art] Store priv key in slot 0x5
23,394,480 UART: [art] Derive Key Pair - Done
23,407,425 UART: [art] Signing Cert with AUTHO
23,408,748 UART: RITY.KEYID = 7
25,120,621 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,137 UART: [art] PUB.X = 512F46EED8F30E49D3ECAC4038BE380719C815D0E35039C8D99C048B8F153EE9318F866ABF6E2D6B54EE0C2C1DFBC8FC
25,129,394 UART: [art] PUB.Y = C471218C9755DC8B4AB280C8DFA75E9C74EDBCEC6B0D08104D9B1F359F0589F4EAD25862FD8BCAD901F213FAF57D5687
25,136,638 UART: [art] SIG.R = 6B34D94E37DA89F8147CCE5621A08DE4EBA9FB1BFEB6EC00BEF4D26378BD168C84DEC6BBA0934E28E07F01FCCAF4B582
25,144,081 UART: [art] SIG.S = CF9C21D15F2E3EAE8DCA3D0E4DB1D4EF3DDA354BC6214F5E9A6517F001FC3FB4504365FAA1B5ECDB488272B178330D53
26,123,277 UART: Caliptra RT
26,123,968 UART: [state] CFI Enabled
26,288,739 UART: [rt] RT listening for mailbox commands...
26,291,407 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,762,747 ready_for_fw is high
3,763,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,958,349 >>> mbox cmd response: success
14,958,950 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,209,340 UART:
19,209,726 UART: Running Caliptra FMC ...
19,210,912 UART:
19,211,066 UART: [state] CFI Enabled
19,218,903 UART: [fht] FMC Alias Private Key: 7
20,975,618 UART: [art] Extend RT PCRs Done
20,976,832 UART: [art] Lock RT PCRs Done
20,978,559 UART: [art] Populate DV Done
20,984,132 UART: [fht] FMC Alias Private Key: 7
20,985,774 UART: [art] Derive CDI
20,986,502 UART: [art] Store in in slot 0x4
21,029,474 UART: [art] Derive Key Pair
21,030,523 UART: [art] Store priv key in slot 0x5
23,457,324 UART: [art] Derive Key Pair - Done
23,470,018 UART: [art] Signing Cert with AUTHO
23,471,318 UART: RITY.KEYID = 7
25,177,231 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,865 UART: [art] PUB.X = 33BD0FC1BDF34CF143B9769C14061188E38337F358295620AF719EDAE86A25B96C3BF42BCFB7C72912DF799F95745BC0
25,185,948 UART: [art] PUB.Y = C0A3087CD60671C69951F2AB4386FE31B94F2A312E0211822E7BBBCB955A752CCB959E11BAEE38DED2318E9CF46FA402
25,193,252 UART: [art] SIG.R = 5BBA71671EDD9AADE4D27FC981C92A76A611C41706D27021EB54FAD227C014EE611D251273867E82093771630D3D4D40
25,200,641 UART: [art] SIG.S = 78C0EC4AA8C7751E9579DFAAD5C427A6BA05A3E4D9C915EE6B37272C86ADF09B05B9BC3A1F042D63E82AF26A5F85CFF8
26,179,852 UART: Caliptra RT
26,180,533 UART: [state] CFI Enabled
26,298,410 UART: [rt] RT listening for mailbox commands...
26,301,186 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,185 UART:
192,538 UART: Running Caliptra ROM ...
193,645 UART:
193,807 UART: [state] CFI Enabled
263,960 UART: [state] LifecycleState = Unprovisioned
265,957 UART: [state] DebugLocked = No
267,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,496 UART: [kat] SHA2-256
442,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,722 UART: [kat] ++
453,171 UART: [kat] sha1
464,280 UART: [kat] SHA2-256
466,971 UART: [kat] SHA2-384
474,027 UART: [kat] SHA2-512-ACC
476,401 UART: [kat] ECC-384
2,766,897 UART: [kat] HMAC-384Kdf
2,781,024 UART: [kat] LMS
3,971,276 UART: [kat] --
3,975,075 UART: [cold-reset] ++
3,976,958 UART: [fht] Storing FHT @ 0x50003400
3,987,602 UART: [idev] ++
3,988,203 UART: [idev] CDI.KEYID = 6
3,989,130 UART: [idev] SUBJECT.KEYID = 7
3,990,381 UART: [idev] UDS.KEYID = 0
3,991,491 ready_for_fw is high
3,991,714 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,189 UART: [idev] Erasing UDS.KEYID = 0
7,329,910 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,015 UART: [idev] --
7,356,827 UART: [ldev] ++
7,357,408 UART: [ldev] CDI.KEYID = 6
7,358,351 UART: [ldev] SUBJECT.KEYID = 5
7,359,613 UART: [ldev] AUTHORITY.KEYID = 7
7,360,845 UART: [ldev] FE.KEYID = 1
7,403,228 UART: [ldev] Erasing FE.KEYID = 1
10,734,494 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,653 UART: [ldev] --
13,096,384 UART: [fwproc] Waiting for Commands...
13,099,237 UART: [fwproc] Received command 0x46574c44
13,101,423 UART: [fwproc] Received Image of size 114124 bytes
17,148,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,966 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,867 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,605,331 >>> mbox cmd response: success
17,605,873 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,609,043 UART: [afmc] ++
17,609,634 UART: [afmc] CDI.KEYID = 6
17,610,572 UART: [afmc] SUBJECT.KEYID = 7
17,611,796 UART: [afmc] AUTHORITY.KEYID = 5
20,982,851 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,408 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,671 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,092 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,929 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,324 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,890 UART: [afmc] --
23,356,391 UART: [cold-reset] --
23,359,986 UART: [state] Locking Datavault
23,366,427 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,181 UART: [state] Locking ICCM
23,369,742 UART: [exit] Launching FMC @ 0x40000130
23,378,135 UART:
23,378,371 UART: Running Caliptra FMC ...
23,379,501 UART:
23,379,666 UART: [state] CFI Enabled
23,447,188 UART: [fht] FMC Alias Private Key: 7
25,784,675 UART: [art] Extend RT PCRs Done
25,785,911 UART: [art] Lock RT PCRs Done
25,787,433 UART: [art] Populate DV Done
25,792,798 UART: [fht] FMC Alias Private Key: 7
25,794,401 UART: [art] Derive CDI
25,795,218 UART: [art] Store in in slot 0x4
25,855,858 UART: [art] Derive Key Pair
25,856,898 UART: [art] Store priv key in slot 0x5
29,149,432 UART: [art] Derive Key Pair - Done
29,162,572 UART: [art] Signing Cert with AUTHO
29,163,879 UART: RITY.KEYID = 7
31,455,305 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,858 UART: [art] PUB.X = AA927D831E175C9334D057E05EB288DD4ADAF686A1D6C99A8E4167B62FA2A31DF55E5F4589BFE6308404B098625ECE21
31,464,069 UART: [art] PUB.Y = 16AD975AEBDCB2152F494AA8C0CB064A8EE69C50E6015FA70C71CEC6399C6276590C3775B64D28A4C5F989AF9D7E5079
31,471,303 UART: [art] SIG.R = 665DF9B742C8A2A73BA0054556A17B67B54877483EF7647AD7EC69CFE0C88CEA6C4A527AFDC054DE21FC0C03F1756A9E
31,478,698 UART: [art] SIG.S = 4E4B96AB8258A008EBBC4F354EC969E1A90FD4E65AC32203E6978DD0887830FE8E1E15E3501F9D6637D4E6793BE19241
32,783,481 UART: Caliptra RT
32,784,332 UART: [state] CFI Enabled
32,945,604 UART: [rt] RT listening for mailbox commands...
32,976,752 UART: [rt]cmd =0xaabbccdd, len=4
32,978,257 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,797,990 ready_for_fw is high
3,798,548 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,867,305 >>> mbox cmd response: success
17,867,945 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,579,607 UART:
23,579,982 UART: Running Caliptra FMC ...
23,581,125 UART:
23,581,284 UART: [state] CFI Enabled
23,644,867 UART: [fht] FMC Alias Private Key: 7
25,982,567 UART: [art] Extend RT PCRs Done
25,983,797 UART: [art] Lock RT PCRs Done
25,985,670 UART: [art] Populate DV Done
25,991,149 UART: [fht] FMC Alias Private Key: 7
25,992,691 UART: [art] Derive CDI
25,993,432 UART: [art] Store in in slot 0x4
26,053,210 UART: [art] Derive Key Pair
26,054,278 UART: [art] Store priv key in slot 0x5
29,347,143 UART: [art] Derive Key Pair - Done
29,360,374 UART: [art] Signing Cert with AUTHO
29,361,681 UART: RITY.KEYID = 7
31,648,916 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,423 UART: [art] PUB.X = F8CA7DBA3409C0F4FC37CE49F2AE6FC1FFEC9B53C99D49D51DE3474FEFA0BA20BE54632B1CCDA6AB1977B19556892196
31,657,693 UART: [art] PUB.Y = D08BD318E87D9C6E3EF935A3F543555479D9F71B37C83C5637F122B857D747D513F460F03617A94E4029AB4770684DD5
31,664,955 UART: [art] SIG.R = 197F8E3E420F98CE2317F807C7833FA8B1E27E06847969B1E4DB40306E25B20A0DE0F70D9E9A0AA41463441B285DA84A
31,672,323 UART: [art] SIG.S = 0918A5FCC13855FACA71B0FDBBEC9C411436CC29EF8E2FECC3421A7E69C8ABC10AB2AC759124E93CB1C22881F13B48CD
32,978,144 UART: Caliptra RT
32,978,864 UART: [state] CFI Enabled
33,140,083 UART: [rt] RT listening for mailbox commands...
33,171,716 UART: [rt]cmd =0xaabbccdd, len=4
33,173,137 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,422 UART:
192,786 UART: Running Caliptra ROM ...
193,965 UART:
603,473 UART: [state] CFI Enabled
621,335 UART: [state] LifecycleState = Unprovisioned
623,271 UART: [state] DebugLocked = No
624,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,313 UART: [kat] SHA2-256
800,052 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,574 UART: [kat] ++
811,176 UART: [kat] sha1
821,767 UART: [kat] SHA2-256
824,485 UART: [kat] SHA2-384
829,971 UART: [kat] SHA2-512-ACC
832,351 UART: [kat] ECC-384
3,116,015 UART: [kat] HMAC-384Kdf
3,128,678 UART: [kat] LMS
4,318,777 UART: [kat] --
4,322,085 UART: [cold-reset] ++
4,324,022 UART: [fht] Storing FHT @ 0x50003400
4,334,645 UART: [idev] ++
4,335,202 UART: [idev] CDI.KEYID = 6
4,336,149 UART: [idev] SUBJECT.KEYID = 7
4,337,454 UART: [idev] UDS.KEYID = 0
4,338,421 ready_for_fw is high
4,338,628 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,071 UART: [idev] Erasing UDS.KEYID = 0
7,626,137 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,214 UART: [idev] --
7,651,373 UART: [ldev] ++
7,651,995 UART: [ldev] CDI.KEYID = 6
7,652,885 UART: [ldev] SUBJECT.KEYID = 5
7,654,089 UART: [ldev] AUTHORITY.KEYID = 7
7,655,319 UART: [ldev] FE.KEYID = 1
7,667,297 UART: [ldev] Erasing FE.KEYID = 1
10,954,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,238 UART: [ldev] --
13,314,793 UART: [fwproc] Waiting for Commands...
13,316,445 UART: [fwproc] Received command 0x46574c44
13,318,627 UART: [fwproc] Received Image of size 114124 bytes
17,374,366 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,069 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,932 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,300 >>> mbox cmd response: success
17,837,836 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,840,627 UART: [afmc] ++
17,841,207 UART: [afmc] CDI.KEYID = 6
17,842,139 UART: [afmc] SUBJECT.KEYID = 7
17,843,401 UART: [afmc] AUTHORITY.KEYID = 5
21,165,606 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,497 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,753 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,116 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,984 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,503,460 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,911 UART: [afmc] --
23,529,503 UART: [cold-reset] --
23,533,033 UART: [state] Locking Datavault
23,539,006 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,709 UART: [state] Locking ICCM
23,542,636 UART: [exit] Launching FMC @ 0x40000130
23,551,024 UART:
23,551,252 UART: Running Caliptra FMC ...
23,552,344 UART:
23,552,496 UART: [state] CFI Enabled
23,560,480 UART: [fht] FMC Alias Private Key: 7
25,892,147 UART: [art] Extend RT PCRs Done
25,893,364 UART: [art] Lock RT PCRs Done
25,895,150 UART: [art] Populate DV Done
25,900,499 UART: [fht] FMC Alias Private Key: 7
25,902,097 UART: [art] Derive CDI
25,902,911 UART: [art] Store in in slot 0x4
25,945,395 UART: [art] Derive Key Pair
25,946,386 UART: [art] Store priv key in slot 0x5
29,188,451 UART: [art] Derive Key Pair - Done
29,201,797 UART: [art] Signing Cert with AUTHO
29,203,102 UART: RITY.KEYID = 7
31,482,563 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,069 UART: [art] PUB.X = 49D6CB425848DDC16D3656BAE4D813A9118C9C1FB69DCA7C76D9036A2BFFF42C401F0AD945BAC80E0AA17693BC2882F1
31,491,328 UART: [art] PUB.Y = 158D64C1915DA253010923F75DF7D55F90433E31B756E5FDCB1CA372323FB54A64FBDDFC4F14FB0077508B12CD6F306F
31,498,551 UART: [art] SIG.R = 3EFE40E4C8813C4D4B52486C4164D02094E4810A82DC1FAB0D3D49FAE9CB6D8F1F676F54A3BB746FA7092E1779938CA9
31,505,939 UART: [art] SIG.S = 85C468489581711F6F7D43CABDFDBB9898BFC921FB06DF3DAA3529FFA61CCDB9AF106462AB1A19E3C403803C6E9B1AFA
32,811,283 UART: Caliptra RT
32,811,999 UART: [state] CFI Enabled
32,930,375 UART: [rt] RT listening for mailbox commands...
32,961,465 UART: [rt]cmd =0xaabbccdd, len=4
32,962,851 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,129,071 ready_for_fw is high
4,129,481 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,064,963 >>> mbox cmd response: success
18,065,548 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,707,087 UART:
23,707,475 UART: Running Caliptra FMC ...
23,708,592 UART:
23,708,745 UART: [state] CFI Enabled
23,716,589 UART: [fht] FMC Alias Private Key: 7
26,047,878 UART: [art] Extend RT PCRs Done
26,049,111 UART: [art] Lock RT PCRs Done
26,050,924 UART: [art] Populate DV Done
26,056,505 UART: [fht] FMC Alias Private Key: 7
26,058,214 UART: [art] Derive CDI
26,059,035 UART: [art] Store in in slot 0x4
26,101,650 UART: [art] Derive Key Pair
26,102,693 UART: [art] Store priv key in slot 0x5
29,344,947 UART: [art] Derive Key Pair - Done
29,358,013 UART: [art] Signing Cert with AUTHO
29,359,322 UART: RITY.KEYID = 7
31,638,478 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,988 UART: [art] PUB.X = 0AE4C1F1CFF2F13E9E9AB9610B2934D4530E7560DCB6A789D90444462C05F5537691AAB48B6FEDFCFD53F3C2B66A783D
31,647,295 UART: [art] PUB.Y = EEC86CBE108AB30740DD28BB1105D2C33AFBECA4E83E74A9384E7357C8C7B2ABBD6A9149BF6928E58664D6E5DF5FB897
31,654,542 UART: [art] SIG.R = 854039E6A546EC730FBD221554A686FE40459F84FCEF3005D9C43060E4443C89D5F50A55EFBBFD0417E9526DC2F46790
31,661,932 UART: [art] SIG.S = D679DE2A2E40B1C82D4856FA6DBC1A7B6C448BAFD35A5C37CA7E150A2470B0D0CA77763023CDFEE2BFCDBF20703753FE
32,967,115 UART: Caliptra RT
32,967,829 UART: [state] CFI Enabled
33,085,368 UART: [rt] RT listening for mailbox commands...
33,116,678 UART: [rt]cmd =0xaabbccdd, len=4
33,118,018 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,256 UART:
192,622 UART: Running Caliptra ROM ...
193,746 UART:
193,891 UART: [state] CFI Enabled
258,365 UART: [state] LifecycleState = Unprovisioned
260,270 UART: [state] DebugLocked = No
261,803 UART: [state] WD Timer not started. Device not locked for debugging
266,331 UART: [kat] SHA2-256
445,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,001 UART: [kat] ++
457,543 UART: [kat] sha1
468,191 UART: [kat] SHA2-256
471,238 UART: [kat] SHA2-384
477,158 UART: [kat] SHA2-512-ACC
480,098 UART: [kat] ECC-384
2,926,853 UART: [kat] HMAC-384Kdf
2,948,508 UART: [kat] LMS
3,477,974 UART: [kat] --
3,483,532 UART: [cold-reset] ++
3,485,244 UART: [fht] FHT @ 0x50003400
3,496,641 UART: [idev] ++
3,497,211 UART: [idev] CDI.KEYID = 6
3,498,121 UART: [idev] SUBJECT.KEYID = 7
3,499,361 UART: [idev] UDS.KEYID = 0
3,500,426 ready_for_fw is high
3,500,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,644,494 UART: [idev] Erasing UDS.KEYID = 0
6,011,796 UART: [idev] Sha1 KeyId Algorithm
6,034,848 UART: [idev] --
6,040,411 UART: [ldev] ++
6,040,978 UART: [ldev] CDI.KEYID = 6
6,041,928 UART: [ldev] SUBJECT.KEYID = 5
6,043,089 UART: [ldev] AUTHORITY.KEYID = 7
6,044,249 UART: [ldev] FE.KEYID = 1
6,081,833 UART: [ldev] Erasing FE.KEYID = 1
8,587,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,265 UART: [ldev] --
10,398,258 UART: [fwproc] Wait for Commands...
10,400,460 UART: [fwproc] Recv command 0x46574c44
10,402,550 UART: [fwproc] Recv'd Img size: 114448 bytes
13,804,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,882,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,268,489 >>> mbox cmd response: success
14,269,043 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,272,806 UART: [afmc] ++
14,273,388 UART: [afmc] CDI.KEYID = 6
14,274,266 UART: [afmc] SUBJECT.KEYID = 7
14,275,479 UART: [afmc] AUTHORITY.KEYID = 5
16,811,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,073 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,897 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,725 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,885 UART: [afmc] --
18,609,933 UART: [cold-reset] --
18,612,490 UART: [state] Locking Datavault
18,616,650 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,354 UART: [state] Locking ICCM
18,619,428 UART: [exit] Launching FMC @ 0x40000130
18,627,826 UART:
18,628,077 UART: Running Caliptra FMC ...
18,629,187 UART:
18,629,343 UART: [state] CFI Enabled
18,691,671 UART: [fht] FMC Alias Private Key: 7
20,455,305 UART: [art] Extend RT PCRs Done
20,456,512 UART: [art] Lock RT PCRs Done
20,458,107 UART: [art] Populate DV Done
20,463,638 UART: [fht] FMC Alias Private Key: 7
20,465,134 UART: [art] Derive CDI
20,465,891 UART: [art] Store in in slot 0x4
20,523,937 UART: [art] Derive Key Pair
20,524,928 UART: [art] Store priv key in slot 0x5
22,988,179 UART: [art] Derive Key Pair - Done
23,001,014 UART: [art] Signing Cert with AUTHO
23,002,326 UART: RITY.KEYID = 7
24,714,280 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,755 UART: [art] PUB.X = 0D370BE599D2C21B2498178D9498CCA2AD264E4A6115E73E491DDF9D3436AE0DDA63A3EDE453F9E8D0415EF3774C0F39
24,723,065 UART: [art] PUB.Y = D20D43297D3F8DB086790F6D5C4E7D11A9B79D9A8736A7A7D9AC0DCDF4F6D3025EED4551860B92B89EDAD2139C966638
24,730,357 UART: [art] SIG.R = 56D8F069281D3F8A18024C5182E93716026D24BBDD7981E5E5E6333717B293BB79C04A7C3739525B01BCB3DC402FBFB2
24,737,745 UART: [art] SIG.S = C12420024D90262F7E988FE6A23243B3808A35DD16CF74E94056B720F876DB884BA597304A379DAF38E14016751F025B
25,716,838 UART: Caliptra RT
25,717,547 UART: [state] CFI Enabled
25,882,349 UART: [rt] RT listening for mailbox commands...
25,913,616 UART: [rt]cmd =0xaabbccdd, len=4
25,914,935 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,379,302 ready_for_fw is high
3,379,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,046,611 >>> mbox cmd response: success
14,047,443 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,344,492 UART:
18,344,892 UART: Running Caliptra FMC ...
18,346,041 UART:
18,346,207 UART: [state] CFI Enabled
18,412,707 UART: [fht] FMC Alias Private Key: 7
20,177,571 UART: [art] Extend RT PCRs Done
20,178,802 UART: [art] Lock RT PCRs Done
20,180,326 UART: [art] Populate DV Done
20,185,792 UART: [fht] FMC Alias Private Key: 7
20,187,494 UART: [art] Derive CDI
20,188,309 UART: [art] Store in in slot 0x4
20,245,852 UART: [art] Derive Key Pair
20,246,885 UART: [art] Store priv key in slot 0x5
22,709,882 UART: [art] Derive Key Pair - Done
22,723,041 UART: [art] Signing Cert with AUTHO
22,724,359 UART: RITY.KEYID = 7
24,436,137 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,633 UART: [art] PUB.X = E1637FF4D8EA1D46287E2A198694ABA41A819FFE82589D7A542E1FF95ACA8CBB27E3199EAB776FF5D0ED291500D9247D
24,444,959 UART: [art] PUB.Y = EA91A66CD04730D1D03A7DFA51A6802E440F7E84E39BD6338EF1DFA24E3914EAC9ACD0C56505B54535D834B58E833A56
24,452,209 UART: [art] SIG.R = 556F2A92CB70CB8CF71DA07C9E2927458701B380720B699111E756D859D75BF148B0643A5DD62B3C11AC07A8D9F51FD8
24,459,601 UART: [art] SIG.S = E2A4349831EA0997BBBB710B04EACBCDE63DD165F5A5C2FC1FA9E05B0FD403D9EE1CB1F3123E7A03D60FB95EA0B43169
25,438,942 UART: Caliptra RT
25,439,637 UART: [state] CFI Enabled
25,604,083 UART: [rt] RT listening for mailbox commands...
25,635,715 UART: [rt]cmd =0xaabbccdd, len=4
25,637,164 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
192,446 UART:
192,830 UART: Running Caliptra ROM ...
194,026 UART:
603,344 UART: [state] CFI Enabled
617,872 UART: [state] LifecycleState = Unprovisioned
619,708 UART: [state] DebugLocked = No
621,522 UART: [state] WD Timer not started. Device not locked for debugging
625,900 UART: [kat] SHA2-256
804,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,579 UART: [kat] ++
817,110 UART: [kat] sha1
828,268 UART: [kat] SHA2-256
831,343 UART: [kat] SHA2-384
837,248 UART: [kat] SHA2-512-ACC
840,174 UART: [kat] ECC-384
3,283,984 UART: [kat] HMAC-384Kdf
3,297,066 UART: [kat] LMS
3,826,524 UART: [kat] --
3,829,267 UART: [cold-reset] ++
3,830,698 UART: [fht] FHT @ 0x50003400
3,842,448 UART: [idev] ++
3,843,002 UART: [idev] CDI.KEYID = 6
3,843,906 UART: [idev] SUBJECT.KEYID = 7
3,845,137 UART: [idev] UDS.KEYID = 0
3,846,051 ready_for_fw is high
3,846,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,396 UART: [idev] Erasing UDS.KEYID = 0
6,312,739 UART: [idev] Sha1 KeyId Algorithm
6,335,644 UART: [idev] --
6,339,523 UART: [ldev] ++
6,340,091 UART: [ldev] CDI.KEYID = 6
6,340,996 UART: [ldev] SUBJECT.KEYID = 5
6,342,196 UART: [ldev] AUTHORITY.KEYID = 7
6,343,434 UART: [ldev] FE.KEYID = 1
6,354,613 UART: [ldev] Erasing FE.KEYID = 1
8,830,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,488 UART: [ldev] --
10,623,327 UART: [fwproc] Wait for Commands...
10,626,496 UART: [fwproc] Recv command 0x46574c44
10,628,523 UART: [fwproc] Recv'd Img size: 114448 bytes
14,036,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,653 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,496,396 >>> mbox cmd response: success
14,496,947 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,500,602 UART: [afmc] ++
14,501,189 UART: [afmc] CDI.KEYID = 6
14,502,062 UART: [afmc] SUBJECT.KEYID = 7
14,503,273 UART: [afmc] AUTHORITY.KEYID = 5
17,004,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,041 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,797 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,810 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,698 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,354 UART: [afmc] --
18,799,901 UART: [cold-reset] --
18,803,320 UART: [state] Locking Datavault
18,809,207 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,897 UART: [state] Locking ICCM
18,813,577 UART: [exit] Launching FMC @ 0x40000130
18,821,981 UART:
18,822,217 UART: Running Caliptra FMC ...
18,823,309 UART:
18,823,461 UART: [state] CFI Enabled
18,831,820 UART: [fht] FMC Alias Private Key: 7
20,588,414 UART: [art] Extend RT PCRs Done
20,589,617 UART: [art] Lock RT PCRs Done
20,591,288 UART: [art] Populate DV Done
20,596,688 UART: [fht] FMC Alias Private Key: 7
20,598,319 UART: [art] Derive CDI
20,599,125 UART: [art] Store in in slot 0x4
20,641,747 UART: [art] Derive Key Pair
20,642,808 UART: [art] Store priv key in slot 0x5
23,069,469 UART: [art] Derive Key Pair - Done
23,082,790 UART: [art] Signing Cert with AUTHO
23,084,093 UART: RITY.KEYID = 7
24,789,530 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,029 UART: [art] PUB.X = 0FFD3483AFF4FBAC52E3B81E9E946EF1FB32E89E17B46679EBCACA3967C36B4107AAA8838C1CC44CEB7F72D46AD278EF
24,798,379 UART: [art] PUB.Y = 98CBABDBC58C2823F46D8B3F55FD226E4FF8D7A837224CD836451972CA313D84A9591AD7CA335DF8A8B0535CC49BC8D1
24,805,659 UART: [art] SIG.R = 6A1311B452282779B40CE777CDF5513166062E5C160186C14AE2C5A6EB50704C898C816D841E0294FD3954EBF07BCDF3
24,813,040 UART: [art] SIG.S = ECFD6E0232E26DFF166BC65E68663D32C5E242F43A295856C557956D057FD547F0DC128CE84B40388D273A4092DB61BB
25,792,193 UART: Caliptra RT
25,792,892 UART: [state] CFI Enabled
25,910,289 UART: [rt] RT listening for mailbox commands...
25,941,590 UART: [rt]cmd =0xaabbccdd, len=4
25,942,975 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,695,343 ready_for_fw is high
3,695,718 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,558 >>> mbox cmd response: success
14,271,386 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,520,735 UART:
18,521,122 UART: Running Caliptra FMC ...
18,522,315 UART:
18,522,480 UART: [state] CFI Enabled
18,530,143 UART: [fht] FMC Alias Private Key: 7
20,286,290 UART: [art] Extend RT PCRs Done
20,287,502 UART: [art] Lock RT PCRs Done
20,289,343 UART: [art] Populate DV Done
20,294,582 UART: [fht] FMC Alias Private Key: 7
20,296,275 UART: [art] Derive CDI
20,297,083 UART: [art] Store in in slot 0x4
20,339,408 UART: [art] Derive Key Pair
20,340,470 UART: [art] Store priv key in slot 0x5
22,767,592 UART: [art] Derive Key Pair - Done
22,780,798 UART: [art] Signing Cert with AUTHO
22,782,095 UART: RITY.KEYID = 7
24,487,719 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,214 UART: [art] PUB.X = 61A76E86A81BDD0BE5096A4E868AFC716878932ED5F36CEB0417632300C28516861E1069096B58A0AD6E8466FC0C1785
24,496,461 UART: [art] PUB.Y = 87F429F457AFC43AB8ECBDE00F2C5FCF958AB1FC478290B58E35CF01AF007659CA020E1053C5CE12B8A4394406E1E152
24,503,706 UART: [art] SIG.R = 834F68C7535BB6B8AD9C0091FCFF6EBB5A6D625D5B6840CB1B74F7F1D808DC7008F698B7A719A74BCEED0FF25212518B
24,511,096 UART: [art] SIG.S = 2CEF9EB2C116586B1C12B8CCE6C96F6FAC8617360BC9B4F4F3EC74D796F67C2C8F3FAE031AA9FE502984DF8B923AE8F7
25,489,880 UART: Caliptra RT
25,490,586 UART: [state] CFI Enabled
25,607,984 UART: [rt] RT listening for mailbox commands...
25,639,565 UART: [rt]cmd =0xaabbccdd, len=4
25,640,907 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,439,619 ready_for_fw is high
3,440,220 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,757,748 >>> mbox cmd response: success
14,758,453 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,046,444 UART:
19,046,848 UART: Running Caliptra FMC ...
19,047,988 UART:
19,048,169 UART: [state] CFI Enabled
19,115,553 UART: [fht] FMC Alias Private Key: 7
20,879,581 UART: [art] Extend RT PCRs Done
20,880,799 UART: [art] Lock RT PCRs Done
20,882,371 UART: [art] Populate DV Done
20,887,888 UART: [fht] FMC Alias Private Key: 7
20,889,481 UART: [art] Derive CDI
20,890,293 UART: [art] Store in in slot 0x4
20,948,180 UART: [art] Derive Key Pair
20,949,221 UART: [art] Store priv key in slot 0x5
23,412,307 UART: [art] Derive Key Pair - Done
23,424,921 UART: [art] Signing Cert with AUTHO
23,426,223 UART: RITY.KEYID = 7
25,138,086 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,595 UART: [art] PUB.X = 87226179D38A5EE283C0710F563A522B049EEED57097729A04842B750B9478EBC6CF9FABED108E755C595847764D8EC0
25,146,844 UART: [art] PUB.Y = EDF6C1B6FD736EDE40AD9FE81C0CD290F2B7DCC1C68995B2B4291AB5357DE2D9F4EF4E215818901C3755D0FFB47076D2
25,154,109 UART: [art] SIG.R = 73276BE65DD4C83B6EBFA870065D1090096A5D50E4532D17806AABC738D749F35D10C35D70EC20D2C9D83630DE1C5141
25,161,502 UART: [art] SIG.S = 80E3A560BC6B50BBC08AEC9FF8C29F01DBCA0F6830BAAD4D19D57AA49717DEC8A940DB84DFFD426CA71CC65EFDB1C997
26,140,693 UART: Caliptra RT
26,141,377 UART: [state] CFI Enabled
26,307,051 UART: [rt] RT listening for mailbox commands...
26,338,468 UART: [rt]cmd =0xaabbccdd, len=4
26,339,810 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,757,503 ready_for_fw is high
3,757,892 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,946,342 >>> mbox cmd response: success
14,947,171 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,192,553 UART:
19,192,943 UART: Running Caliptra FMC ...
19,194,043 UART:
19,194,192 UART: [state] CFI Enabled
19,202,464 UART: [fht] FMC Alias Private Key: 7
20,959,436 UART: [art] Extend RT PCRs Done
20,960,656 UART: [art] Lock RT PCRs Done
20,962,032 UART: [art] Populate DV Done
20,967,278 UART: [fht] FMC Alias Private Key: 7
20,968,762 UART: [art] Derive CDI
20,969,517 UART: [art] Store in in slot 0x4
21,012,307 UART: [art] Derive Key Pair
21,013,337 UART: [art] Store priv key in slot 0x5
23,439,955 UART: [art] Derive Key Pair - Done
23,452,537 UART: [art] Signing Cert with AUTHO
23,453,863 UART: RITY.KEYID = 7
25,159,366 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,867 UART: [art] PUB.X = B64602BD30A025855F5B731269D94A7A49A997484E77F7091A29C32FCD3ABBA7642B0F137827DE3E5ECEA7AF493C0FCC
25,168,115 UART: [art] PUB.Y = F59402334154E3754FC875F6D320778F92F3C4BEDAA8A99AB83385E505970F1239D14F17EA8589311119C3260DD04E6A
25,175,363 UART: [art] SIG.R = 6FCD2BCD121C9D1530354851587B6A2E1E7CF32AEC7CB9332BA6FB4618C2C86B620675B45780F5B3B1B039171F736369
25,182,747 UART: [art] SIG.S = B2693BC5F7D131C0864F410E407682E59D392243D661A9334F0586331F360228053699ADC715658C79E75B3CE4C21360
26,161,442 UART: Caliptra RT
26,162,136 UART: [state] CFI Enabled
26,279,316 UART: [rt] RT listening for mailbox commands...
26,310,991 UART: [rt]cmd =0xaabbccdd, len=4
26,312,483 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,863 UART: [kat] SHA2-256
881,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,909 UART: [kat] ++
886,061 UART: [kat] sha1
890,265 UART: [kat] SHA2-256
892,203 UART: [kat] SHA2-384
894,984 UART: [kat] SHA2-512-ACC
896,885 UART: [kat] ECC-384
902,268 UART: [kat] HMAC-384Kdf
906,856 UART: [kat] LMS
1,475,052 UART: [kat] --
1,475,925 UART: [cold-reset] ++
1,476,405 UART: [fht] Storing FHT @ 0x50003400
1,479,208 UART: [idev] ++
1,479,376 UART: [idev] CDI.KEYID = 6
1,479,736 UART: [idev] SUBJECT.KEYID = 7
1,480,160 UART: [idev] UDS.KEYID = 0
1,480,505 ready_for_fw is high
1,480,505 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,776 UART: [idev] Erasing UDS.KEYID = 0
1,504,268 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,650 UART: [idev] --
1,513,609 UART: [ldev] ++
1,513,777 UART: [ldev] CDI.KEYID = 6
1,514,140 UART: [ldev] SUBJECT.KEYID = 5
1,514,566 UART: [ldev] AUTHORITY.KEYID = 7
1,515,029 UART: [ldev] FE.KEYID = 1
1,519,975 UART: [ldev] Erasing FE.KEYID = 1
1,545,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,146 UART: [ldev] --
1,584,547 UART: [fwproc] Waiting for Commands...
1,585,210 UART: [fwproc] Received command 0x46574c44
1,586,001 UART: [fwproc] Received Image of size 114448 bytes
2,885,984 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,276 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,628 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,655 >>> mbox cmd response: success
3,078,655 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,079,665 UART: [afmc] ++
3,079,833 UART: [afmc] CDI.KEYID = 6
3,080,195 UART: [afmc] SUBJECT.KEYID = 7
3,080,620 UART: [afmc] AUTHORITY.KEYID = 5
3,115,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,783 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,563 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,291 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,176 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,866 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,619 UART: [afmc] --
3,158,513 UART: [cold-reset] --
3,159,105 UART: [state] Locking Datavault
3,160,272 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,876 UART: [state] Locking ICCM
3,161,402 UART: [exit] Launching FMC @ 0x40000130
3,166,731 UART:
3,166,747 UART: Running Caliptra FMC ...
3,167,155 UART:
3,167,209 UART: [state] CFI Enabled
3,177,620 UART: [fht] FMC Alias Private Key: 7
3,284,823 UART: [art] Extend RT PCRs Done
3,285,251 UART: [art] Lock RT PCRs Done
3,286,837 UART: [art] Populate DV Done
3,294,964 UART: [fht] FMC Alias Private Key: 7
3,296,146 UART: [art] Derive CDI
3,296,426 UART: [art] Store in in slot 0x4
3,381,945 UART: [art] Derive Key Pair
3,382,305 UART: [art] Store priv key in slot 0x5
3,395,849 UART: [art] Derive Key Pair - Done
3,411,110 UART: [art] Signing Cert with AUTHO
3,411,590 UART: RITY.KEYID = 7
3,426,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,515 UART: [art] PUB.X = 45DFAFC6099AFF6A1E283385C34260765E6656D1C49710D8B985D23CA8E7D0D110441D8A4342A433A6265A6C0DBC391B
3,434,281 UART: [art] PUB.Y = 7491894686EB9195255BFC4510FC736981B66FEB57B0524A56088E7A2CED538F136C742EA73DF36C4FC40361B913C24C
3,441,223 UART: [art] SIG.R = 8E3C2A307C05B9F768A5B03B809FACA5DDFFE2EB8A66118063287EB22072CA0F95DAC27DFE6BC1632C7B62D5D95CB508
3,448,002 UART: [art] SIG.S = 16CB108B990276D27EE2330B680CC37AA952A2B8629F529DEEA5D1BB983EA465F6180BC511F527F157509761EB9C2105
3,471,600 UART: Caliptra RT
3,471,853 UART: [state] CFI Enabled
3,579,048 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,404 UART: [rt]cmd =0xaabbccdd, len=4
3,610,601 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,667 ready_for_fw is high
1,362,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,791 >>> mbox cmd response: success
2,928,791 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,991,209 UART:
2,991,225 UART: Running Caliptra FMC ...
2,991,633 UART:
2,991,687 UART: [state] CFI Enabled
3,001,968 UART: [fht] FMC Alias Private Key: 7
3,110,431 UART: [art] Extend RT PCRs Done
3,110,859 UART: [art] Lock RT PCRs Done
3,112,461 UART: [art] Populate DV Done
3,120,598 UART: [fht] FMC Alias Private Key: 7
3,121,580 UART: [art] Derive CDI
3,121,860 UART: [art] Store in in slot 0x4
3,207,085 UART: [art] Derive Key Pair
3,207,445 UART: [art] Store priv key in slot 0x5
3,220,665 UART: [art] Derive Key Pair - Done
3,235,243 UART: [art] Signing Cert with AUTHO
3,235,723 UART: RITY.KEYID = 7
3,250,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,574 UART: [art] PUB.X = 815A6EA5693DF1D5ADBAAF4AA806DE4303020ABCCC78536A991679061276679BC29BF9C5B7E044A7DFA785A4FB71415B
3,258,341 UART: [art] PUB.Y = C4A79F368859719B0720A5FD5E4AD2D18761B763996900DA9E40BCA12E673E40FA9A1E469601CE896C717CF9FCB84CD2
3,265,269 UART: [art] SIG.R = 5567AB9A5C60F29366723FA2CAA5756DC70A29B1154D5D0B066089D4AD140500010BEAA6D61A4DFC38DB2F9980E190A1
3,272,005 UART: [art] SIG.S = 061233AF7F83C6FB1ABDBC83A2EF27A959CF0CE4771E35D0FD9ADD1947E29DD40D1AD8DF77C3521CB8F444D7F4B542A5
3,295,905 UART: Caliptra RT
3,296,158 UART: [state] CFI Enabled
3,403,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,338 UART: [rt]cmd =0xaabbccdd, len=4
3,435,469 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,306 UART: [kat] SHA2-256
882,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,352 UART: [kat] ++
886,504 UART: [kat] sha1
890,646 UART: [kat] SHA2-256
892,584 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
903,075 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,594 UART: [cold-reset] ++
1,477,070 UART: [fht] Storing FHT @ 0x50003400
1,479,893 UART: [idev] ++
1,480,061 UART: [idev] CDI.KEYID = 6
1,480,421 UART: [idev] SUBJECT.KEYID = 7
1,480,845 UART: [idev] UDS.KEYID = 0
1,481,190 ready_for_fw is high
1,481,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,869 UART: [idev] Erasing UDS.KEYID = 0
1,505,431 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,945 UART: [idev] --
1,515,230 UART: [ldev] ++
1,515,398 UART: [ldev] CDI.KEYID = 6
1,515,761 UART: [ldev] SUBJECT.KEYID = 5
1,516,187 UART: [ldev] AUTHORITY.KEYID = 7
1,516,650 UART: [ldev] FE.KEYID = 1
1,521,624 UART: [ldev] Erasing FE.KEYID = 1
1,546,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,197 UART: [ldev] --
1,586,546 UART: [fwproc] Waiting for Commands...
1,587,171 UART: [fwproc] Received command 0x46574c44
1,587,962 UART: [fwproc] Received Image of size 114448 bytes
2,886,547 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,547 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,046 >>> mbox cmd response: success
3,079,046 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,080,286 UART: [afmc] ++
3,080,454 UART: [afmc] CDI.KEYID = 6
3,080,816 UART: [afmc] SUBJECT.KEYID = 7
3,081,241 UART: [afmc] AUTHORITY.KEYID = 5
3,116,994 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,390 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,118 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,003 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,693 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,384 UART: [afmc] --
3,160,332 UART: [cold-reset] --
3,161,358 UART: [state] Locking Datavault
3,162,515 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,119 UART: [state] Locking ICCM
3,163,665 UART: [exit] Launching FMC @ 0x40000130
3,168,994 UART:
3,169,010 UART: Running Caliptra FMC ...
3,169,418 UART:
3,169,561 UART: [state] CFI Enabled
3,180,132 UART: [fht] FMC Alias Private Key: 7
3,288,377 UART: [art] Extend RT PCRs Done
3,288,805 UART: [art] Lock RT PCRs Done
3,290,189 UART: [art] Populate DV Done
3,298,136 UART: [fht] FMC Alias Private Key: 7
3,299,288 UART: [art] Derive CDI
3,299,568 UART: [art] Store in in slot 0x4
3,384,945 UART: [art] Derive Key Pair
3,385,305 UART: [art] Store priv key in slot 0x5
3,398,563 UART: [art] Derive Key Pair - Done
3,413,512 UART: [art] Signing Cert with AUTHO
3,413,992 UART: RITY.KEYID = 7
3,428,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,731 UART: [art] PUB.X = DDEDFA3F710D6BC0D80DF3E6FEE171A37A5C2AFBC5AE7BF93833B7349B0C75FD6A0E06FDD295B05A3B0080B8100DD7A0
3,436,489 UART: [art] PUB.Y = 3F7603B4394F463BBEB2C581409CB9C33056E67DBB3CE88FCEE8160CA8BF7EF7EA52050436F1278A84A919DBF3EC17E0
3,443,441 UART: [art] SIG.R = D910F257CE821B46803348C58B62BFD1812B695E5B2DBF8055C2C1A6C5B0A6A48ED18D3B884E7205211253BA879A8E53
3,450,210 UART: [art] SIG.S = 71F62FFF6731003505F2993E10CCF256D2690B6ADD9438DA7B8735C9F518AEDA69B71BFC061F48547D53764AA1B14D29
3,474,522 UART: Caliptra RT
3,474,867 UART: [state] CFI Enabled
3,583,462 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,828 UART: [rt]cmd =0xaabbccdd, len=4
3,614,843 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,958 ready_for_fw is high
1,362,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,992 >>> mbox cmd response: success
2,928,992 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,990,418 UART:
2,990,434 UART: Running Caliptra FMC ...
2,990,842 UART:
2,990,985 UART: [state] CFI Enabled
3,001,642 UART: [fht] FMC Alias Private Key: 7
3,109,979 UART: [art] Extend RT PCRs Done
3,110,407 UART: [art] Lock RT PCRs Done
3,112,019 UART: [art] Populate DV Done
3,120,516 UART: [fht] FMC Alias Private Key: 7
3,121,636 UART: [art] Derive CDI
3,121,916 UART: [art] Store in in slot 0x4
3,207,715 UART: [art] Derive Key Pair
3,208,075 UART: [art] Store priv key in slot 0x5
3,221,333 UART: [art] Derive Key Pair - Done
3,236,248 UART: [art] Signing Cert with AUTHO
3,236,728 UART: RITY.KEYID = 7
3,251,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,687 UART: [art] PUB.X = 94AE46229509F06CAFF8A7915C9F9A442BE90A70B8BCBF057EC42BE4F4D65F02C75ADE0F3A4388870398343F1F54288C
3,259,447 UART: [art] PUB.Y = 43B1E72662CBCBBF341D74396E150BA7592E54AA33B6E6A72944B97B101F67E9CD3BEC90B413C62D9505FA68DE1F49E4
3,266,401 UART: [art] SIG.R = AD881F39D34B90D1346EB432C83FC6B0AA124A2AC88386F0BCE97E233188FA118EA57BD15F986D044925193EEB6190F8
3,273,174 UART: [art] SIG.S = A6933909CD358583341B430C445A7369B6054AAEF1731139ED668196538747405C8DB917B9285EA381D899C8C84A4575
3,296,736 UART: Caliptra RT
3,297,081 UART: [state] CFI Enabled
3,404,649 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,245 UART: [rt]cmd =0xaabbccdd, len=4
3,436,350 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
893,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,775 UART: [kat] ++
897,927 UART: [kat] sha1
902,307 UART: [kat] SHA2-256
904,247 UART: [kat] SHA2-384
907,188 UART: [kat] SHA2-512-ACC
909,089 UART: [kat] ECC-384
918,474 UART: [kat] HMAC-384Kdf
923,266 UART: [kat] LMS
1,171,594 UART: [kat] --
1,172,519 UART: [cold-reset] ++
1,173,001 UART: [fht] FHT @ 0x50003400
1,175,712 UART: [idev] ++
1,175,880 UART: [idev] CDI.KEYID = 6
1,176,240 UART: [idev] SUBJECT.KEYID = 7
1,176,664 UART: [idev] UDS.KEYID = 0
1,177,009 ready_for_fw is high
1,177,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,420 UART: [idev] Erasing UDS.KEYID = 0
1,201,017 UART: [idev] Sha1 KeyId Algorithm
1,209,495 UART: [idev] --
1,210,597 UART: [ldev] ++
1,210,765 UART: [ldev] CDI.KEYID = 6
1,211,128 UART: [ldev] SUBJECT.KEYID = 5
1,211,554 UART: [ldev] AUTHORITY.KEYID = 7
1,212,017 UART: [ldev] FE.KEYID = 1
1,217,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,113 UART: [ldev] --
1,283,524 UART: [fwproc] Wait for Commands...
1,284,136 UART: [fwproc] Recv command 0x46574c44
1,284,864 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,610 >>> mbox cmd response: success
2,776,610 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,777,742 UART: [afmc] ++
2,777,910 UART: [afmc] CDI.KEYID = 6
2,778,272 UART: [afmc] SUBJECT.KEYID = 7
2,778,697 UART: [afmc] AUTHORITY.KEYID = 5
2,814,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,858 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,577 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,421 UART: [afmc] --
2,857,417 UART: [cold-reset] --
2,858,305 UART: [state] Locking Datavault
2,859,378 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,982 UART: [state] Locking ICCM
2,860,520 UART: [exit] Launching FMC @ 0x40000130
2,865,849 UART:
2,865,865 UART: Running Caliptra FMC ...
2,866,273 UART:
2,866,327 UART: [state] CFI Enabled
2,876,998 UART: [fht] FMC Alias Private Key: 7
2,984,743 UART: [art] Extend RT PCRs Done
2,985,171 UART: [art] Lock RT PCRs Done
2,986,611 UART: [art] Populate DV Done
2,994,660 UART: [fht] FMC Alias Private Key: 7
2,995,640 UART: [art] Derive CDI
2,995,920 UART: [art] Store in in slot 0x4
3,081,687 UART: [art] Derive Key Pair
3,082,047 UART: [art] Store priv key in slot 0x5
3,094,947 UART: [art] Derive Key Pair - Done
3,109,328 UART: [art] Signing Cert with AUTHO
3,109,808 UART: RITY.KEYID = 7
3,125,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,837 UART: [art] PUB.X = 8469130FAA460685834A9C7149B32C6E934711C1F3384ACD5BCCDB2FC4B75688201AAF91134CF47D5503E676E4B16D42
3,132,598 UART: [art] PUB.Y = 2162AB2010840690AE757601D832CA5B17E7D139C587BA2AADDF4D59BF94764DAD21D8741C5F614B60691F260C90F282
3,139,539 UART: [art] SIG.R = 5D6CDA03531153B4816CD903D47D368388692275BDC36BFC3C7A11D2A5FEC909F3BDEC691F8987C648FF808B7BD9C3EE
3,146,312 UART: [art] SIG.S = 2C7E99B6B4F67F97FFC0DEC24409AF79F2D39A3A0352C9DFD2AE2A9490732956B85C15D2CD40724368E5F9749905C687
3,170,478 UART: Caliptra RT
3,170,731 UART: [state] CFI Enabled
3,278,638 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,130 UART: [rt]cmd =0xaabbccdd, len=4
3,310,259 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,837 ready_for_fw is high
1,059,837 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,809 >>> mbox cmd response: success
2,627,809 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,690,197 UART:
2,690,213 UART: Running Caliptra FMC ...
2,690,621 UART:
2,690,675 UART: [state] CFI Enabled
2,700,820 UART: [fht] FMC Alias Private Key: 7
2,808,397 UART: [art] Extend RT PCRs Done
2,808,825 UART: [art] Lock RT PCRs Done
2,810,239 UART: [art] Populate DV Done
2,818,508 UART: [fht] FMC Alias Private Key: 7
2,819,506 UART: [art] Derive CDI
2,819,786 UART: [art] Store in in slot 0x4
2,905,129 UART: [art] Derive Key Pair
2,905,489 UART: [art] Store priv key in slot 0x5
2,918,667 UART: [art] Derive Key Pair - Done
2,933,567 UART: [art] Signing Cert with AUTHO
2,934,047 UART: RITY.KEYID = 7
2,949,539 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,304 UART: [art] PUB.X = 012D9EBC27C30DC0067E4CED2E177000AC7A792CBF08D75EAE0CE90C0CF36A6F40D775A1F5388AC996D4A18BBC8526C5
2,957,049 UART: [art] PUB.Y = 3F596F43AF5BF0F1C6BAF7B7FE2844D9E6596B361554EC5BC18D3DFCB4D9B97CD4DBA93BCE9989B659CF33364D6AF9DF
2,964,025 UART: [art] SIG.R = 6732903A053C89432014F1D3CFE2E9FEB665C6E600B6317169A76DFBB24B2A041B4E81FDD7B1EE07FB3D8BA1EEF42192
2,970,776 UART: [art] SIG.S = 883C8B2854985436EC8C8DE1934FCE59D35602907D81EE72376026C6ACDF6B35DCDD631B40AA665C1002B2DD9999FB04
2,994,792 UART: Caliptra RT
2,995,045 UART: [state] CFI Enabled
3,103,094 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,764 UART: [rt]cmd =0xaabbccdd, len=4
3,134,673 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
893,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,766 UART: [kat] ++
897,918 UART: [kat] sha1
902,204 UART: [kat] SHA2-256
904,144 UART: [kat] SHA2-384
906,901 UART: [kat] SHA2-512-ACC
908,802 UART: [kat] ECC-384
918,267 UART: [kat] HMAC-384Kdf
922,657 UART: [kat] LMS
1,170,985 UART: [kat] --
1,171,650 UART: [cold-reset] ++
1,172,052 UART: [fht] FHT @ 0x50003400
1,174,463 UART: [idev] ++
1,174,631 UART: [idev] CDI.KEYID = 6
1,174,991 UART: [idev] SUBJECT.KEYID = 7
1,175,415 UART: [idev] UDS.KEYID = 0
1,175,760 ready_for_fw is high
1,175,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,437 UART: [idev] Erasing UDS.KEYID = 0
1,200,184 UART: [idev] Sha1 KeyId Algorithm
1,208,496 UART: [idev] --
1,209,416 UART: [ldev] ++
1,209,584 UART: [ldev] CDI.KEYID = 6
1,209,947 UART: [ldev] SUBJECT.KEYID = 5
1,210,373 UART: [ldev] AUTHORITY.KEYID = 7
1,210,836 UART: [ldev] FE.KEYID = 1
1,216,010 UART: [ldev] Erasing FE.KEYID = 1
1,242,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,622 UART: [ldev] --
1,281,937 UART: [fwproc] Wait for Commands...
1,282,581 UART: [fwproc] Recv command 0x46574c44
1,283,309 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,233 >>> mbox cmd response: success
2,773,233 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,774,255 UART: [afmc] ++
2,774,423 UART: [afmc] CDI.KEYID = 6
2,774,785 UART: [afmc] SUBJECT.KEYID = 7
2,775,210 UART: [afmc] AUTHORITY.KEYID = 5
2,809,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,856 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,460 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,230 UART: [afmc] --
2,853,180 UART: [cold-reset] --
2,854,150 UART: [state] Locking Datavault
2,855,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,981 UART: [state] Locking ICCM
2,856,593 UART: [exit] Launching FMC @ 0x40000130
2,861,922 UART:
2,861,938 UART: Running Caliptra FMC ...
2,862,346 UART:
2,862,489 UART: [state] CFI Enabled
2,872,872 UART: [fht] FMC Alias Private Key: 7
2,980,651 UART: [art] Extend RT PCRs Done
2,981,079 UART: [art] Lock RT PCRs Done
2,982,849 UART: [art] Populate DV Done
2,990,830 UART: [fht] FMC Alias Private Key: 7
2,991,792 UART: [art] Derive CDI
2,992,072 UART: [art] Store in in slot 0x4
3,077,897 UART: [art] Derive Key Pair
3,078,257 UART: [art] Store priv key in slot 0x5
3,091,547 UART: [art] Derive Key Pair - Done
3,106,280 UART: [art] Signing Cert with AUTHO
3,106,760 UART: RITY.KEYID = 7
3,122,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,959 UART: [art] PUB.X = 167919FBEBEC4A42D992352C86D14A57BC2083C246DF873302C82E615750DB17259C9E65B73615F81DBC481C51DC609F
3,129,726 UART: [art] PUB.Y = 8C2F8FABBD1BBA1562E67FA276A0489A3C5637F3A836FBDF2B70692263DDEDBD3EFE9BE918DBB090B4CB45093B47DD18
3,136,697 UART: [art] SIG.R = 4122B2C5D7204683D524C8EEB60CE523DACC17DE85AAF76D583C90611956050D635DDD0D724F4854356E5E2BB84B4FDC
3,143,463 UART: [art] SIG.S = 1FFDC172059C53BC0A45F4F50AA159218BE995294B7578835A9490CD4D76FAAF2CE8086835A53072EBBEB716376D9F4F
3,167,404 UART: Caliptra RT
3,167,749 UART: [state] CFI Enabled
3,275,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,384 UART: [rt]cmd =0xaabbccdd, len=4
3,307,431 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,248 ready_for_fw is high
1,060,248 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,680 >>> mbox cmd response: success
2,628,680 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,690,028 UART:
2,690,044 UART: Running Caliptra FMC ...
2,690,452 UART:
2,690,595 UART: [state] CFI Enabled
2,701,148 UART: [fht] FMC Alias Private Key: 7
2,809,019 UART: [art] Extend RT PCRs Done
2,809,447 UART: [art] Lock RT PCRs Done
2,810,779 UART: [art] Populate DV Done
2,819,210 UART: [fht] FMC Alias Private Key: 7
2,820,244 UART: [art] Derive CDI
2,820,524 UART: [art] Store in in slot 0x4
2,906,463 UART: [art] Derive Key Pair
2,906,823 UART: [art] Store priv key in slot 0x5
2,920,453 UART: [art] Derive Key Pair - Done
2,935,450 UART: [art] Signing Cert with AUTHO
2,935,930 UART: RITY.KEYID = 7
2,951,592 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,357 UART: [art] PUB.X = 82949065D36B4CB35676B8C46CC65E57AEA330D3DAD5690DF157ADDB73446BD3056335EE3C21E30CCD172BD1A6F71C47
2,959,128 UART: [art] PUB.Y = 93134BED3A92BFE701A0D36F67E95F12436DE59DE6AB9B692EB40E6B850BF49A9FFC0E2C5A7D1AA342D06F32A38721E9
2,966,082 UART: [art] SIG.R = 198481A76E2093B89444E6392DF0109C7BA8D5F1956ED33B277379BB0D3CA4B71D5059C8009CF68CD3D95D572A17A5C9
2,972,827 UART: [art] SIG.S = 55B365A1C5FCCD4DDBD7A0025EAB6343B3674304CF7EA18B6B8827ABCC0A53CFD237A5D90DF9FEFFECFBA61D5346DC91
2,996,536 UART: Caliptra RT
2,996,881 UART: [state] CFI Enabled
3,104,136 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,348 UART: [rt]cmd =0xaabbccdd, len=4
3,135,321 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,872 UART: [kat] LMS
1,169,184 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,125 UART: [idev] ++
1,173,293 UART: [idev] CDI.KEYID = 6
1,173,654 UART: [idev] SUBJECT.KEYID = 7
1,174,079 UART: [idev] UDS.KEYID = 0
1,174,425 ready_for_fw is high
1,174,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,313 UART: [idev] Erasing UDS.KEYID = 0
1,198,727 UART: [idev] Sha1 KeyId Algorithm
1,207,381 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,214,472 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,104 UART: [ldev] --
1,280,472 UART: [fwproc] Wait for Commands...
1,281,253 UART: [fwproc] Recv command 0x46574c44
1,281,986 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,278 >>> mbox cmd response: success
2,773,278 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,774,333 UART: [afmc] ++
2,774,501 UART: [afmc] CDI.KEYID = 6
2,774,864 UART: [afmc] SUBJECT.KEYID = 7
2,775,290 UART: [afmc] AUTHORITY.KEYID = 5
2,810,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,981 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,864 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,583 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,602 UART: [afmc] --
2,853,622 UART: [cold-reset] --
2,854,706 UART: [state] Locking Datavault
2,856,075 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,679 UART: [state] Locking ICCM
2,857,113 UART: [exit] Launching FMC @ 0x40000130
2,862,442 UART:
2,862,458 UART: Running Caliptra FMC ...
2,862,866 UART:
2,862,920 UART: [state] CFI Enabled
2,873,185 UART: [fht] FMC Alias Private Key: 7
2,981,202 UART: [art] Extend RT PCRs Done
2,981,630 UART: [art] Lock RT PCRs Done
2,983,182 UART: [art] Populate DV Done
2,991,389 UART: [fht] FMC Alias Private Key: 7
2,992,409 UART: [art] Derive CDI
2,992,689 UART: [art] Store in in slot 0x4
3,078,434 UART: [art] Derive Key Pair
3,078,794 UART: [art] Store priv key in slot 0x5
3,091,724 UART: [art] Derive Key Pair - Done
3,106,662 UART: [art] Signing Cert with AUTHO
3,107,142 UART: RITY.KEYID = 7
3,122,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,167 UART: [art] PUB.X = DDA4B720616D92DDCFA3A055C67C71E043EC9017CCAE7509745D1C396D97E52DF0A39993B08C30486DC85C1AE7063553
3,129,937 UART: [art] PUB.Y = E8DC25C7644A6F90B644C6C1A17CA9FE294724AC9BA72F0B8390AC4296A2A29BDF80E38B71C79E5AA3900060CC1885D5
3,136,872 UART: [art] SIG.R = 10519E6231F60A06B0641804D341373F73F724CC0D6F77E353DA26867C8E0AAC5FF783819720EB50AF9F60E8FA48994B
3,143,625 UART: [art] SIG.S = 1967B5D00F139CC05A9445CD0CC4BFCB91EDC952F32A36266908CD53D26465C3465170A44B6A60942FAC8A710BD2225D
3,166,976 UART: Caliptra RT
3,167,229 UART: [state] CFI Enabled
3,275,136 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,746 UART: [rt]cmd =0xaabbccdd, len=4
3,306,753 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,390 ready_for_fw is high
1,055,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,252 >>> mbox cmd response: success
2,622,252 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,684,470 UART:
2,684,486 UART: Running Caliptra FMC ...
2,684,894 UART:
2,684,948 UART: [state] CFI Enabled
2,695,611 UART: [fht] FMC Alias Private Key: 7
2,803,578 UART: [art] Extend RT PCRs Done
2,804,006 UART: [art] Lock RT PCRs Done
2,805,384 UART: [art] Populate DV Done
2,813,581 UART: [fht] FMC Alias Private Key: 7
2,814,645 UART: [art] Derive CDI
2,814,925 UART: [art] Store in in slot 0x4
2,900,938 UART: [art] Derive Key Pair
2,901,298 UART: [art] Store priv key in slot 0x5
2,913,900 UART: [art] Derive Key Pair - Done
2,928,795 UART: [art] Signing Cert with AUTHO
2,929,275 UART: RITY.KEYID = 7
2,944,617 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,382 UART: [art] PUB.X = 72AE8629F733E759AF7CB0C81ED30AEA948418ED477E29864CC2CFE29F68E56964C75A17625D5F11B9901EF3360748D8
2,952,148 UART: [art] PUB.Y = 5EC18AFB10BC8B6C213A3C5C9C9540EFF0C3396779721CA8AD410C15E98C53366F9085583027F2C9ACA7054F1B7F4749
2,959,096 UART: [art] SIG.R = 6F63940D130EDB85FF4D5061E0E22DF836A68725A4A1CB8154222971F6A4DE7ABA6D9A4E8F72641D471AAEBE7DA47C24
2,965,872 UART: [art] SIG.S = 03D7B1251163DB59A0CDBFF02E9F825BDBFDE6BB457E40F52104704D01BEB439318B270BAB848AE58E5226E0D8F55550
2,989,037 UART: Caliptra RT
2,989,290 UART: [state] CFI Enabled
3,096,543 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,995 UART: [rt]cmd =0xaabbccdd, len=4
3,127,994 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,750 UART: [kat] ++
895,902 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,455 UART: [kat] HMAC-384Kdf
920,953 UART: [kat] LMS
1,169,265 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,950 UART: [fht] FHT @ 0x50003400
1,173,708 UART: [idev] ++
1,173,876 UART: [idev] CDI.KEYID = 6
1,174,237 UART: [idev] SUBJECT.KEYID = 7
1,174,662 UART: [idev] UDS.KEYID = 0
1,175,008 ready_for_fw is high
1,175,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,758 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,720 UART: [idev] --
1,209,919 UART: [ldev] ++
1,210,087 UART: [ldev] CDI.KEYID = 6
1,210,451 UART: [ldev] SUBJECT.KEYID = 5
1,210,878 UART: [ldev] AUTHORITY.KEYID = 7
1,211,341 UART: [ldev] FE.KEYID = 1
1,216,439 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,531 UART: [ldev] --
1,281,813 UART: [fwproc] Wait for Commands...
1,282,476 UART: [fwproc] Recv command 0x46574c44
1,283,209 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,381 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,453 >>> mbox cmd response: success
2,775,453 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,776,578 UART: [afmc] ++
2,776,746 UART: [afmc] CDI.KEYID = 6
2,777,109 UART: [afmc] SUBJECT.KEYID = 7
2,777,535 UART: [afmc] AUTHORITY.KEYID = 5
2,812,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,761 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,373 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,092 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,941 UART: [afmc] --
2,856,055 UART: [cold-reset] --
2,856,919 UART: [state] Locking Datavault
2,857,942 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,546 UART: [state] Locking ICCM
2,859,046 UART: [exit] Launching FMC @ 0x40000130
2,864,375 UART:
2,864,391 UART: Running Caliptra FMC ...
2,864,799 UART:
2,864,942 UART: [state] CFI Enabled
2,875,943 UART: [fht] FMC Alias Private Key: 7
2,983,600 UART: [art] Extend RT PCRs Done
2,984,028 UART: [art] Lock RT PCRs Done
2,985,346 UART: [art] Populate DV Done
2,993,363 UART: [fht] FMC Alias Private Key: 7
2,994,291 UART: [art] Derive CDI
2,994,571 UART: [art] Store in in slot 0x4
3,080,072 UART: [art] Derive Key Pair
3,080,432 UART: [art] Store priv key in slot 0x5
3,093,296 UART: [art] Derive Key Pair - Done
3,108,042 UART: [art] Signing Cert with AUTHO
3,108,522 UART: RITY.KEYID = 7
3,123,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,645 UART: [art] PUB.X = FD5AC85D8F0780367EC8EB6D7423C2B3D5D957E93BB8B96CA1CF008F74CEDE43236319A4FD855529BDFE8C358EFF068C
3,131,405 UART: [art] PUB.Y = 10E7513C3095A4D71921A06E9CA965F0A9B7251E83B094A0D9605C1AC90616F2A7E5D89854C5F668D03FD6D7658F649E
3,138,350 UART: [art] SIG.R = EDDBA65062ACF36EFEE135717E4F5D43B85C94D036C11408D6F3550ED172F03A8EF400607A859B7339F94C90FB278C0D
3,145,097 UART: [art] SIG.S = F5AD635782340308641AB93340914BE3527CEDCF5CCA83E3276239DB909F0DD4C4C027D9A88653386C841D1E9B5C018F
3,168,710 UART: Caliptra RT
3,169,055 UART: [state] CFI Enabled
3,277,135 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,337 UART: [rt]cmd =0xaabbccdd, len=4
3,308,162 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,829 ready_for_fw is high
1,055,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,941 >>> mbox cmd response: success
2,623,941 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,686,021 UART:
2,686,037 UART: Running Caliptra FMC ...
2,686,445 UART:
2,686,588 UART: [state] CFI Enabled
2,697,167 UART: [fht] FMC Alias Private Key: 7
2,805,388 UART: [art] Extend RT PCRs Done
2,805,816 UART: [art] Lock RT PCRs Done
2,807,408 UART: [art] Populate DV Done
2,815,343 UART: [fht] FMC Alias Private Key: 7
2,816,295 UART: [art] Derive CDI
2,816,575 UART: [art] Store in in slot 0x4
2,901,860 UART: [art] Derive Key Pair
2,902,220 UART: [art] Store priv key in slot 0x5
2,915,400 UART: [art] Derive Key Pair - Done
2,929,970 UART: [art] Signing Cert with AUTHO
2,930,450 UART: RITY.KEYID = 7
2,945,506 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,271 UART: [art] PUB.X = 582367441BE67C2720056D41246A5447E30692179067E66277639CFFC4FE534499F6F763DF38C75F194ED7EAD5761302
2,953,018 UART: [art] PUB.Y = B98998944DDC47F9A3645BECB4B3661B3AD8CD3EEA1015D2D02A701C95B2B1EFC5335EB5ACC95BC70D19BAACF25EB733
2,959,989 UART: [art] SIG.R = 8B4DC928754186405B21C67F2C7B655D2361D91F481BD659364D6F68E48854C645FED35DFE82D304F49DD150F2BF893E
2,966,756 UART: [art] SIG.S = 696E8B02C1FEF6E894010E35292B1E5C533EC765BD7B2D221B1943A33465D1C6E79F4E8EA368300384437F8B91E531B5
2,990,471 UART: Caliptra RT
2,990,816 UART: [state] CFI Enabled
3,098,823 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,289 UART: [rt]cmd =0xaabbccdd, len=4
3,130,260 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,141 UART:
192,502 UART: Running Caliptra ROM ...
193,658 UART:
193,805 UART: [state] CFI Enabled
265,933 UART: [state] LifecycleState = Unprovisioned
267,912 UART: [state] DebugLocked = No
269,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,960 UART: [kat] SHA2-256
444,667 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,130 UART: [kat] ++
455,600 UART: [kat] sha1
465,340 UART: [kat] SHA2-256
468,072 UART: [kat] SHA2-384
473,218 UART: [kat] SHA2-512-ACC
475,585 UART: [kat] ECC-384
2,768,367 UART: [kat] HMAC-384Kdf
2,800,349 UART: [kat] LMS
3,990,594 UART: [kat] --
3,995,180 UART: [cold-reset] ++
3,997,540 UART: [fht] Storing FHT @ 0x50003400
4,009,025 UART: [idev] ++
4,009,605 UART: [idev] CDI.KEYID = 6
4,010,521 UART: [idev] SUBJECT.KEYID = 7
4,011,772 UART: [idev] UDS.KEYID = 0
4,012,822 ready_for_fw is high
4,013,041 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,611 UART: [idev] Erasing UDS.KEYID = 0
7,346,461 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,786 UART: [idev] --
7,374,578 UART: [ldev] ++
7,375,154 UART: [ldev] CDI.KEYID = 6
7,376,127 UART: [ldev] SUBJECT.KEYID = 5
7,377,230 UART: [ldev] AUTHORITY.KEYID = 7
7,378,567 UART: [ldev] FE.KEYID = 1
7,422,963 UART: [ldev] Erasing FE.KEYID = 1
10,755,461 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,068 UART: [ldev] --
13,117,447 UART: [fwproc] Waiting for Commands...
13,120,368 UART: [fwproc] Received command 0x46574c44
13,122,551 UART: [fwproc] Received Image of size 114124 bytes
17,179,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,341 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,257 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,634,733 >>> mbox cmd response: success
17,639,180 UART: [afmc] ++
17,639,843 UART: [afmc] CDI.KEYID = 6
17,640,945 UART: [afmc] SUBJECT.KEYID = 7
17,642,062 UART: [afmc] AUTHORITY.KEYID = 5
21,005,386 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,110 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,421 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,809 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,648 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,057 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,597 UART: [afmc] --
23,377,947 UART: [cold-reset] --
23,382,024 UART: [state] Locking Datavault
23,386,088 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,854 UART: [state] Locking ICCM
23,389,089 UART: [exit] Launching FMC @ 0x40000130
23,397,491 UART:
23,397,727 UART: Running Caliptra FMC ...
23,398,828 UART:
23,398,986 UART: [state] CFI Enabled
23,466,119 UART: [fht] FMC Alias Private Key: 7
25,804,891 UART: [art] Extend RT PCRs Done
25,806,111 UART: [art] Lock RT PCRs Done
25,807,662 UART: [art] Populate DV Done
25,813,176 UART: [fht] FMC Alias Private Key: 7
25,814,822 UART: [art] Derive CDI
25,815,583 UART: [art] Store in in slot 0x4
25,874,730 UART: [art] Derive Key Pair
25,875,726 UART: [art] Store priv key in slot 0x5
29,168,405 UART: [art] Derive Key Pair - Done
29,181,341 UART: [art] Signing Cert with AUTHO
29,182,645 UART: RITY.KEYID = 7
31,468,784 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,285 UART: [art] PUB.X = 75F14772A6DEE9D8949D96EEEF098A465D34B9303F88E9239A179EAEE2B017025264BCED14579F8E0FD6A9A2E89691BB
31,477,525 UART: [art] PUB.Y = 8CE98383971B88790BAB16C6BFE6DFCA59165D18945604DB2AD3DB06DE47F42B9461B4F499C4C60123F393EBA5C44ECE
31,484,789 UART: [art] SIG.R = A398338B83A367B428CB8C4640EC5FEE29A4FC9520CB6C700CA98DA62A7AB28EF1F5B5620EEDF5A8539B752AC41E3623
31,492,191 UART: [art] SIG.S = E48D0BB94FB5F36E818789B1F631A9B7E08A0D853478C3A89B9ADF7089EE1414933D4DA2AB3149C71DF99D108124F2A9
32,797,861 UART: Caliptra RT
32,798,572 UART: [state] CFI Enabled
32,979,366 UART: [rt] RT listening for mailbox commands...
32,981,252 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,011,570 UART: [rt]cmd =0x434b4558, len=80
33,013,062 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,785,834 ready_for_fw is high
3,786,234 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,869,130 >>> mbox cmd response: success
23,563,882 UART:
23,564,318 UART: Running Caliptra FMC ...
23,565,466 UART:
23,565,636 UART: [state] CFI Enabled
23,635,924 UART: [fht] FMC Alias Private Key: 7
25,973,525 UART: [art] Extend RT PCRs Done
25,974,780 UART: [art] Lock RT PCRs Done
25,976,479 UART: [art] Populate DV Done
25,982,069 UART: [fht] FMC Alias Private Key: 7
25,983,675 UART: [art] Derive CDI
25,984,494 UART: [art] Store in in slot 0x4
26,044,478 UART: [art] Derive Key Pair
26,045,522 UART: [art] Store priv key in slot 0x5
29,338,322 UART: [art] Derive Key Pair - Done
29,351,487 UART: [art] Signing Cert with AUTHO
29,352,792 UART: RITY.KEYID = 7
31,640,621 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,134 UART: [art] PUB.X = 81AD8E35BA45404FEAD0F433F155F7B3C1A3900581F2982E0B9D5D63111CE993454D0BEF75DC89E851FDE762765DC528
31,649,357 UART: [art] PUB.Y = 6A3597A7020BD50DAAA665825F98DC385B22F46EDC364D9FD6A7E3E674F179BE2A3503A883F9523FAB818536F7D7C5DF
31,656,610 UART: [art] SIG.R = 2FFD3568A14FE84C45D873C3D8D34244D1B364689CD53C8284FF96522338B69883A46A25439624A57E0E4E415A2281E7
31,663,986 UART: [art] SIG.S = B3C960816A69A4FFD12CC1E46F9411D4331ED4CD2C54AFF32D77A0704452BC628B43E5B741D7A7533E3358B6E52EE7CE
32,968,592 UART: Caliptra RT
32,969,333 UART: [state] CFI Enabled
33,132,234 UART: [rt] RT listening for mailbox commands...
33,134,121 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,164,679 UART: [rt]cmd =0x434b4558, len=80
33,166,089 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,507 writing to cptra_bootfsm_go
192,681 UART:
193,056 UART: Running Caliptra ROM ...
194,195 UART:
603,999 UART: [state] CFI Enabled
615,546 UART: [state] LifecycleState = Unprovisioned
617,490 UART: [state] DebugLocked = No
619,038 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,417 UART: [kat] SHA2-256
793,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,690 UART: [kat] ++
804,135 UART: [kat] sha1
813,928 UART: [kat] SHA2-256
816,628 UART: [kat] SHA2-384
822,268 UART: [kat] SHA2-512-ACC
824,633 UART: [kat] ECC-384
3,109,310 UART: [kat] HMAC-384Kdf
3,120,613 UART: [kat] LMS
4,310,730 UART: [kat] --
4,315,075 UART: [cold-reset] ++
4,317,150 UART: [fht] Storing FHT @ 0x50003400
4,328,266 UART: [idev] ++
4,328,825 UART: [idev] CDI.KEYID = 6
4,329,870 UART: [idev] SUBJECT.KEYID = 7
4,331,053 UART: [idev] UDS.KEYID = 0
4,332,036 ready_for_fw is high
4,332,246 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,475,624 UART: [idev] Erasing UDS.KEYID = 0
7,619,101 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,345 UART: [idev] --
7,643,604 UART: [ldev] ++
7,644,166 UART: [ldev] CDI.KEYID = 6
7,645,120 UART: [ldev] SUBJECT.KEYID = 5
7,646,378 UART: [ldev] AUTHORITY.KEYID = 7
7,647,601 UART: [ldev] FE.KEYID = 1
7,658,990 UART: [ldev] Erasing FE.KEYID = 1
10,946,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,440 UART: [ldev] --
13,307,572 UART: [fwproc] Waiting for Commands...
13,310,856 UART: [fwproc] Received command 0x46574c44
13,313,031 UART: [fwproc] Received Image of size 114124 bytes
17,364,745 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,861 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,756 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,532 >>> mbox cmd response: success
17,827,392 UART: [afmc] ++
17,828,042 UART: [afmc] CDI.KEYID = 6
17,828,954 UART: [afmc] SUBJECT.KEYID = 7
17,830,162 UART: [afmc] AUTHORITY.KEYID = 5
21,141,879 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,434,700 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,436,973 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,451,373 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,466,208 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,480,641 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,502,464 UART: [afmc] --
23,507,030 UART: [cold-reset] --
23,510,837 UART: [state] Locking Datavault
23,514,727 UART: [state] Locking PCR0, PCR1 and PCR31
23,516,476 UART: [state] Locking ICCM
23,518,294 UART: [exit] Launching FMC @ 0x40000130
23,526,693 UART:
23,526,927 UART: Running Caliptra FMC ...
23,528,021 UART:
23,528,186 UART: [state] CFI Enabled
23,536,139 UART: [fht] FMC Alias Private Key: 7
25,866,542 UART: [art] Extend RT PCRs Done
25,868,065 UART: [art] Lock RT PCRs Done
25,869,643 UART: [art] Populate DV Done
25,875,183 UART: [fht] FMC Alias Private Key: 7
25,876,822 UART: [art] Derive CDI
25,877,634 UART: [art] Store in in slot 0x4
25,919,958 UART: [art] Derive Key Pair
25,920,956 UART: [art] Store priv key in slot 0x5
29,163,441 UART: [art] Derive Key Pair - Done
29,176,332 UART: [art] Signing Cert with AUTHO
29,177,632 UART: RITY.KEYID = 7
31,457,371 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,876 UART: [art] PUB.X = 63660347573DF513A2A99083259B72671D9C45D9E675CEEE3777F35FDA48C2CF2A01600FB825E2F559B353B2A903012E
31,466,137 UART: [art] PUB.Y = 527A20B7D55946094CF87D1CE0ABA6D3732422973FB304916C8EBD1AFDA67B966C7916871B790194AFFC5398F7EE404B
31,473,394 UART: [art] SIG.R = 7CB105D17FC421EDC2CF8A5ABFDA5321B802149F5D26B852416E97FA150C110FCC44D795A6E35EEE57044D9C6F571818
31,480,760 UART: [art] SIG.S = 1263E9E7F8E20A4C177956002172843001324FE11C7E107998CCE0501AABBF67BE7C4F02B8FD9FADC94F79A771677ACC
32,786,266 UART: Caliptra RT
32,786,992 UART: [state] CFI Enabled
32,904,736 UART: [rt] RT listening for mailbox commands...
32,906,626 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,937,059 UART: [rt]cmd =0x434b4558, len=80
32,938,605 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
4,126,815 ready_for_fw is high
4,127,369 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,057,266 >>> mbox cmd response: success
23,697,160 UART:
23,697,567 UART: Running Caliptra FMC ...
23,698,721 UART:
23,698,879 UART: [state] CFI Enabled
23,707,095 UART: [fht] FMC Alias Private Key: 7
26,038,442 UART: [art] Extend RT PCRs Done
26,039,668 UART: [art] Lock RT PCRs Done
26,041,618 UART: [art] Populate DV Done
26,047,032 UART: [fht] FMC Alias Private Key: 7
26,048,682 UART: [art] Derive CDI
26,049,494 UART: [art] Store in in slot 0x4
26,092,155 UART: [art] Derive Key Pair
26,093,197 UART: [art] Store priv key in slot 0x5
29,335,668 UART: [art] Derive Key Pair - Done
29,349,062 UART: [art] Signing Cert with AUTHO
29,350,367 UART: RITY.KEYID = 7
31,629,827 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,336 UART: [art] PUB.X = 70CA01968E459F1B41D336AC00ED539A12C17880321DBA33C90A07DC646573C9F88CFDEA9DF90A1CFD167EA9EB3EB5AA
31,638,635 UART: [art] PUB.Y = 747A0B9592AEE4773B9328F652C904EF91431FC47A721E2AE3018232FC290003F0123A703BB5DCB44BFA24D35018F89B
31,645,861 UART: [art] SIG.R = 598F161AAC96E38FEEC24C8994C075BBBB0761DC9C1AF81848B6EF3BF2D5A348F7ECC5D940442E9656AB32F58F57E9BD
31,653,263 UART: [art] SIG.S = 00B8FFCB1ED745607B58C4F305FD4ED9169815B0237ABDE15F965928215D7D2A457B755845C5B5C5BA4493AAE1305D1E
32,958,421 UART: Caliptra RT
32,959,120 UART: [state] CFI Enabled
33,077,697 UART: [rt] RT listening for mailbox commands...
33,079,584 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,109,944 UART: [rt]cmd =0x434b4558, len=80
33,111,518 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,404 writing to cptra_bootfsm_go
193,616 UART:
193,945 UART: Running Caliptra ROM ...
195,117 UART:
195,272 UART: [state] CFI Enabled
264,450 UART: [state] LifecycleState = Unprovisioned
266,345 UART: [state] DebugLocked = No
267,806 UART: [state] WD Timer not started. Device not locked for debugging
270,851 UART: [kat] SHA2-256
449,957 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,535 UART: [kat] ++
462,089 UART: [kat] sha1
472,554 UART: [kat] SHA2-256
475,558 UART: [kat] SHA2-384
482,421 UART: [kat] SHA2-512-ACC
485,351 UART: [kat] ECC-384
2,950,265 UART: [kat] HMAC-384Kdf
2,970,679 UART: [kat] LMS
3,500,114 UART: [kat] --
3,505,806 UART: [cold-reset] ++
3,508,231 UART: [fht] FHT @ 0x50003400
3,518,923 UART: [idev] ++
3,519,482 UART: [idev] CDI.KEYID = 6
3,520,397 UART: [idev] SUBJECT.KEYID = 7
3,521,564 UART: [idev] UDS.KEYID = 0
3,522,657 ready_for_fw is high
3,522,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,635 UART: [idev] Erasing UDS.KEYID = 0
6,025,775 UART: [idev] Sha1 KeyId Algorithm
6,048,050 UART: [idev] --
6,050,427 UART: [ldev] ++
6,051,000 UART: [ldev] CDI.KEYID = 6
6,051,917 UART: [ldev] SUBJECT.KEYID = 5
6,053,132 UART: [ldev] AUTHORITY.KEYID = 7
6,054,361 UART: [ldev] FE.KEYID = 1
6,100,927 UART: [ldev] Erasing FE.KEYID = 1
8,605,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,590 UART: [ldev] --
10,414,378 UART: [fwproc] Wait for Commands...
10,417,410 UART: [fwproc] Recv command 0x46574c44
10,419,512 UART: [fwproc] Recv'd Img size: 114448 bytes
13,824,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,547 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,275,801 >>> mbox cmd response: success
14,280,695 UART: [afmc] ++
14,281,301 UART: [afmc] CDI.KEYID = 6
14,282,190 UART: [afmc] SUBJECT.KEYID = 7
14,283,406 UART: [afmc] AUTHORITY.KEYID = 5
16,809,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,324 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,061 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,100 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,568 UART: [afmc] --
18,609,431 UART: [cold-reset] --
18,612,479 UART: [state] Locking Datavault
18,616,911 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,558 UART: [state] Locking ICCM
18,620,278 UART: [exit] Launching FMC @ 0x40000130
18,628,672 UART:
18,628,902 UART: Running Caliptra FMC ...
18,630,003 UART:
18,630,167 UART: [state] CFI Enabled
18,689,611 UART: [fht] FMC Alias Private Key: 7
20,454,325 UART: [art] Extend RT PCRs Done
20,455,539 UART: [art] Lock RT PCRs Done
20,457,269 UART: [art] Populate DV Done
20,462,680 UART: [fht] FMC Alias Private Key: 7
20,464,431 UART: [art] Derive CDI
20,465,262 UART: [art] Store in in slot 0x4
20,513,229 UART: [art] Derive Key Pair
20,514,275 UART: [art] Store priv key in slot 0x5
22,977,337 UART: [art] Derive Key Pair - Done
22,990,101 UART: [art] Signing Cert with AUTHO
22,991,395 UART: RITY.KEYID = 7
24,703,101 UART: [art] Erasing AUTHORITY.KEYID = 7
24,704,597 UART: [art] PUB.X = 41018F0115CF6C0A5B179FA2B25F3106D124B756399E471801DC310E31EC0AF7B7C2EEED391771A2CD314EA443C57F1F
24,711,903 UART: [art] PUB.Y = 83C1FF2A0C781141CD508E0658827EBF5264EC85BBAF15ACFFAF0CBEF03FCCAF4E001551A95A976651027D65A6F71F8E
24,719,143 UART: [art] SIG.R = 311FC811EB06DFAEAE87A4627B60534F292A370BBA335A36642DFD8FECBC53B86A01F7903CA6010FC0465731A7A49B2B
24,726,590 UART: [art] SIG.S = 5107A5BC37ED3D36FCBB0FBA678CC10BFDF4AF2C07AA1E0F9D3522EA7BCD112A77A582333C481C2E9808136326AC0F2B
25,705,710 UART: Caliptra RT
25,706,400 UART: [state] CFI Enabled
25,870,599 UART: [rt] RT listening for mailbox commands...
25,872,466 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,903,414 UART: [rt]cmd =0x434b4558, len=80
25,904,941 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,360,355 ready_for_fw is high
3,360,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,067,268 >>> mbox cmd response: success
18,340,914 UART:
18,341,315 UART: Running Caliptra FMC ...
18,342,470 UART:
18,342,631 UART: [state] CFI Enabled
18,413,029 UART: [fht] FMC Alias Private Key: 7
20,177,223 UART: [art] Extend RT PCRs Done
20,178,430 UART: [art] Lock RT PCRs Done
20,180,294 UART: [art] Populate DV Done
20,185,859 UART: [fht] FMC Alias Private Key: 7
20,187,507 UART: [art] Derive CDI
20,188,266 UART: [art] Store in in slot 0x4
20,245,263 UART: [art] Derive Key Pair
20,246,303 UART: [art] Store priv key in slot 0x5
22,709,404 UART: [art] Derive Key Pair - Done
22,722,453 UART: [art] Signing Cert with AUTHO
22,723,766 UART: RITY.KEYID = 7
24,435,086 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,571 UART: [art] PUB.X = 63069FA38E88B47D02FA93C92DEE4FD699E8FE2FD91AD885A1FA389B6E56E41F9CC1BCCBC4626E4044D05B8BC61C9924
24,443,914 UART: [art] PUB.Y = C1D59C2A791DF936FE193F4B0B5F30F0AE288B38CAE9118702FE686E69C2F9526B47D500C0381068444ED6F320C2BF06
24,451,165 UART: [art] SIG.R = E9F2602C85151B9C5842D9BFDB43C07CF11A80774159DFD2B160021273D86ABEE8951475BD28B19CE9B18D8DA81198C8
24,458,569 UART: [art] SIG.S = 452204E89CC4E011DA4231675CCD67FA17878055C376E4B7FC5D400B9DFFD4C4B65FAC54946135EC4A23E392176F06DD
25,437,796 UART: Caliptra RT
25,438,512 UART: [state] CFI Enabled
25,603,314 UART: [rt] RT listening for mailbox commands...
25,605,207 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,636,341 UART: [rt]cmd =0x434b4558, len=80
25,637,951 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,454 UART:
192,822 UART: Running Caliptra ROM ...
193,917 UART:
603,450 UART: [state] CFI Enabled
617,073 UART: [state] LifecycleState = Unprovisioned
619,002 UART: [state] DebugLocked = No
620,825 UART: [state] WD Timer not started. Device not locked for debugging
625,005 UART: [kat] SHA2-256
804,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,701 UART: [kat] ++
816,231 UART: [kat] sha1
827,387 UART: [kat] SHA2-256
830,388 UART: [kat] SHA2-384
836,438 UART: [kat] SHA2-512-ACC
839,434 UART: [kat] ECC-384
3,281,695 UART: [kat] HMAC-384Kdf
3,295,557 UART: [kat] LMS
3,824,999 UART: [kat] --
3,830,058 UART: [cold-reset] ++
3,832,056 UART: [fht] FHT @ 0x50003400
3,842,742 UART: [idev] ++
3,843,298 UART: [idev] CDI.KEYID = 6
3,844,318 UART: [idev] SUBJECT.KEYID = 7
3,845,413 UART: [idev] UDS.KEYID = 0
3,846,402 ready_for_fw is high
3,846,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,376 UART: [idev] Erasing UDS.KEYID = 0
6,312,292 UART: [idev] Sha1 KeyId Algorithm
6,335,366 UART: [idev] --
6,339,953 UART: [ldev] ++
6,340,513 UART: [ldev] CDI.KEYID = 6
6,341,421 UART: [ldev] SUBJECT.KEYID = 5
6,342,621 UART: [ldev] AUTHORITY.KEYID = 7
6,343,845 UART: [ldev] FE.KEYID = 1
6,354,046 UART: [ldev] Erasing FE.KEYID = 1
8,827,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,324 UART: [ldev] --
10,616,746 UART: [fwproc] Wait for Commands...
10,619,809 UART: [fwproc] Recv command 0x46574c44
10,621,848 UART: [fwproc] Recv'd Img size: 114448 bytes
14,036,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,377 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,497,526 >>> mbox cmd response: success
14,502,653 UART: [afmc] ++
14,503,253 UART: [afmc] CDI.KEYID = 6
14,504,316 UART: [afmc] SUBJECT.KEYID = 7
14,505,417 UART: [afmc] AUTHORITY.KEYID = 5
17,006,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,369 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,109 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,180 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,061 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,687 UART: [afmc] --
18,800,812 UART: [cold-reset] --
18,805,054 UART: [state] Locking Datavault
18,810,511 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,147 UART: [state] Locking ICCM
18,813,751 UART: [exit] Launching FMC @ 0x40000130
18,822,198 UART:
18,822,439 UART: Running Caliptra FMC ...
18,823,533 UART:
18,823,701 UART: [state] CFI Enabled
18,832,282 UART: [fht] FMC Alias Private Key: 7
20,588,817 UART: [art] Extend RT PCRs Done
20,590,029 UART: [art] Lock RT PCRs Done
20,591,488 UART: [art] Populate DV Done
20,596,942 UART: [fht] FMC Alias Private Key: 7
20,598,438 UART: [art] Derive CDI
20,599,193 UART: [art] Store in in slot 0x4
20,641,836 UART: [art] Derive Key Pair
20,642,866 UART: [art] Store priv key in slot 0x5
23,069,102 UART: [art] Derive Key Pair - Done
23,082,358 UART: [art] Signing Cert with AUTHO
23,083,656 UART: RITY.KEYID = 7
24,789,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,115 UART: [art] PUB.X = 783C40781127E02381768AAAF5A9121976F688545A944DFB63F4F9CD8BA8F40FC993849B0FBFE658D7A4914527B7CE9C
24,798,350 UART: [art] PUB.Y = EDD18F1060472ED1182EEE9367A4A5B4999C51104A1B627DAB6B6654A67A16ADD2C86A0C34782B36D63A30FED695FA4F
24,805,616 UART: [art] SIG.R = CA44000B64C4A7BEBF308CB0E0F6A9412001BDF54512E329B14F1AADE6703FB53D130EB5D13EA17A32F663D841C97A79
24,813,041 UART: [art] SIG.S = 9689FBCC3985B8813F428519620F107E0E1481816A9CC29E7806EF099D48AD4462551241937756C5395DE29A33D66E40
25,791,362 UART: Caliptra RT
25,792,062 UART: [state] CFI Enabled
25,908,603 UART: [rt] RT listening for mailbox commands...
25,910,488 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,940,804 UART: [rt]cmd =0x434b4558, len=80
25,942,292 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,699,621 ready_for_fw is high
3,700,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,667 >>> mbox cmd response: success
18,528,582 UART:
18,529,037 UART: Running Caliptra FMC ...
18,530,147 UART:
18,530,306 UART: [state] CFI Enabled
18,538,252 UART: [fht] FMC Alias Private Key: 7
20,294,928 UART: [art] Extend RT PCRs Done
20,296,157 UART: [art] Lock RT PCRs Done
20,298,130 UART: [art] Populate DV Done
20,303,485 UART: [fht] FMC Alias Private Key: 7
20,305,119 UART: [art] Derive CDI
20,305,875 UART: [art] Store in in slot 0x4
20,348,091 UART: [art] Derive Key Pair
20,349,089 UART: [art] Store priv key in slot 0x5
22,775,327 UART: [art] Derive Key Pair - Done
22,788,427 UART: [art] Signing Cert with AUTHO
22,789,762 UART: RITY.KEYID = 7
24,495,167 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,669 UART: [art] PUB.X = E6C45315B805C9AF2D7C5A96FC3EB69584037B419BB890E3CD139D551D2787B34B2822195C95145C32ADABE6CAB090EC
24,503,930 UART: [art] PUB.Y = BEDFDC625BB1C6FD9282ECB9AA774D2B16213FCEF25F0D0ED42491F58BE05E12B9DBA636580C5B3324C4AB6DDD119DCB
24,511,204 UART: [art] SIG.R = 3BF97096BE9E21BCBB8663432C5DDD9911B096AE7FD6E0DC633BBCD7AEAA253E27BA89875446F36B84AFB604B658774F
24,518,639 UART: [art] SIG.S = 44F07C84AA430587A4A42BDB819587C7952CEC602DCFDC38A0F7083C4AAD4C95A3096059B7167F3A76635043D95200B2
25,497,342 UART: Caliptra RT
25,498,038 UART: [state] CFI Enabled
25,616,517 UART: [rt] RT listening for mailbox commands...
25,618,401 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,649,089 UART: [rt]cmd =0x434b4558, len=80
25,650,436 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,416,446 ready_for_fw is high
3,417,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,716,047 >>> mbox cmd response: success
19,006,790 UART:
19,007,200 UART: Running Caliptra FMC ...
19,008,346 UART:
19,008,510 UART: [state] CFI Enabled
19,076,040 UART: [fht] FMC Alias Private Key: 7
20,840,210 UART: [art] Extend RT PCRs Done
20,841,426 UART: [art] Lock RT PCRs Done
20,842,781 UART: [art] Populate DV Done
20,848,139 UART: [fht] FMC Alias Private Key: 7
20,849,689 UART: [art] Derive CDI
20,850,505 UART: [art] Store in in slot 0x4
20,909,285 UART: [art] Derive Key Pair
20,910,322 UART: [art] Store priv key in slot 0x5
23,373,840 UART: [art] Derive Key Pair - Done
23,386,676 UART: [art] Signing Cert with AUTHO
23,387,980 UART: RITY.KEYID = 7
25,099,732 UART: [art] Erasing AUTHORITY.KEYID = 7
25,101,264 UART: [art] PUB.X = C3948766A561FCAD18AC14A8D2DCFE126D77135E3B64971812757738A3200F018C45FF26A8CB46CD9297C268C7151E91
25,108,511 UART: [art] PUB.Y = 371EE00ED65131EBEEF8B0E0D19E9CA4F454E4BA9203E2604626327D0409395C0727AA731EAD323EC64A47934A27441A
25,115,758 UART: [art] SIG.R = 16A3931F414158FCB36DB4CD41FAEA69B6E776A476D7A24D990EFAE62356A3A79E01C318EBD1C9ACF4382609FBB1A852
25,123,186 UART: [art] SIG.S = 02A3DDA3A1F59A74DB00FAF48748B6EE9D3230F3D6CD13FD4292A44440590C02DD078F9C224306C8E43A3D95812A71A9
26,101,925 UART: Caliptra RT
26,102,630 UART: [state] CFI Enabled
26,268,132 UART: [rt] RT listening for mailbox commands...
26,270,016 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,301,292 UART: [rt]cmd =0x434b4558, len=80
26,302,651 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,758,143 ready_for_fw is high
3,758,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,528 >>> mbox cmd response: success
19,204,995 UART:
19,205,442 UART: Running Caliptra FMC ...
19,206,538 UART:
19,206,687 UART: [state] CFI Enabled
19,214,494 UART: [fht] FMC Alias Private Key: 7
20,971,403 UART: [art] Extend RT PCRs Done
20,972,626 UART: [art] Lock RT PCRs Done
20,974,197 UART: [art] Populate DV Done
20,979,338 UART: [fht] FMC Alias Private Key: 7
20,980,871 UART: [art] Derive CDI
20,981,632 UART: [art] Store in in slot 0x4
21,024,217 UART: [art] Derive Key Pair
21,025,218 UART: [art] Store priv key in slot 0x5
23,451,941 UART: [art] Derive Key Pair - Done
23,464,823 UART: [art] Signing Cert with AUTHO
23,466,144 UART: RITY.KEYID = 7
25,171,881 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,385 UART: [art] PUB.X = 5E5098B5203554A19ED6B0C5A76E6866A2CD0147BEF67318C2FF8878C20106C9D0F991A2ADF5ECC0249D892391AAC2EA
25,180,659 UART: [art] PUB.Y = AEB187AAE984DDE96AD64063158F7214C7F41FAF3A0A3CE2DEDD4006F91846DC59EB1F7B91DBBBC84A5A87704D65795C
25,187,937 UART: [art] SIG.R = B4B0C3EC754CFD94FA65145F3F3AEE122A43560AD481F3280F4BC3FD4B3A3E1B5838ACE9C0360C2BC0A3F397634DD539
25,195,375 UART: [art] SIG.S = BBB58C294C72289EF2352F55E9E7340ED8C2047913790459A7AD696E24E2A5B21B3D31C87F3136A45D29877B54A01E78
26,174,408 UART: Caliptra RT
26,175,095 UART: [state] CFI Enabled
26,292,045 UART: [rt] RT listening for mailbox commands...
26,293,916 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,324,274 UART: [rt]cmd =0x434b4558, len=80
26,325,814 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,657 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,371 UART: [kat] SHA2-256
882,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,417 UART: [kat] ++
886,569 UART: [kat] sha1
890,865 UART: [kat] SHA2-256
892,803 UART: [kat] SHA2-384
895,394 UART: [kat] SHA2-512-ACC
897,295 UART: [kat] ECC-384
903,118 UART: [kat] HMAC-384Kdf
907,798 UART: [kat] LMS
1,475,994 UART: [kat] --
1,476,809 UART: [cold-reset] ++
1,477,275 UART: [fht] Storing FHT @ 0x50003400
1,480,116 UART: [idev] ++
1,480,284 UART: [idev] CDI.KEYID = 6
1,480,644 UART: [idev] SUBJECT.KEYID = 7
1,481,068 UART: [idev] UDS.KEYID = 0
1,481,413 ready_for_fw is high
1,481,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,134 UART: [idev] Erasing UDS.KEYID = 0
1,505,608 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,102 UART: [idev] --
1,515,273 UART: [ldev] ++
1,515,441 UART: [ldev] CDI.KEYID = 6
1,515,804 UART: [ldev] SUBJECT.KEYID = 5
1,516,230 UART: [ldev] AUTHORITY.KEYID = 7
1,516,693 UART: [ldev] FE.KEYID = 1
1,521,945 UART: [ldev] Erasing FE.KEYID = 1
1,546,926 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,894 UART: [ldev] --
1,586,369 UART: [fwproc] Waiting for Commands...
1,586,986 UART: [fwproc] Received command 0x46574c44
1,587,777 UART: [fwproc] Received Image of size 114448 bytes
2,887,546 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,602 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,954 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,031 >>> mbox cmd response: success
3,081,045 UART: [afmc] ++
3,081,213 UART: [afmc] CDI.KEYID = 6
3,081,575 UART: [afmc] SUBJECT.KEYID = 7
3,082,000 UART: [afmc] AUTHORITY.KEYID = 5
3,116,867 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,013 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,793 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,521 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,406 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,096 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,971 UART: [afmc] --
3,159,933 UART: [cold-reset] --
3,160,865 UART: [state] Locking Datavault
3,162,020 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,624 UART: [state] Locking ICCM
3,163,168 UART: [exit] Launching FMC @ 0x40000130
3,168,497 UART:
3,168,513 UART: Running Caliptra FMC ...
3,168,921 UART:
3,168,975 UART: [state] CFI Enabled
3,179,438 UART: [fht] FMC Alias Private Key: 7
3,287,367 UART: [art] Extend RT PCRs Done
3,287,795 UART: [art] Lock RT PCRs Done
3,289,125 UART: [art] Populate DV Done
3,297,238 UART: [fht] FMC Alias Private Key: 7
3,298,262 UART: [art] Derive CDI
3,298,542 UART: [art] Store in in slot 0x4
3,384,307 UART: [art] Derive Key Pair
3,384,667 UART: [art] Store priv key in slot 0x5
3,397,751 UART: [art] Derive Key Pair - Done
3,412,083 UART: [art] Signing Cert with AUTHO
3,412,563 UART: RITY.KEYID = 7
3,427,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,538 UART: [art] PUB.X = 3C2F0148933F9A3C5768FD19EAB3B30636D68EA75C58C6CAB02A120D5862D7D37D6C25650D7B0426BA94D72943DD0CAC
3,435,298 UART: [art] PUB.Y = 3ADE49AF989C1D45347757008A2CE1AF2EF53FD6ABED77CA3B65326BD4D1EC496FA0B1B964193FE065BC4A8C8D08C777
3,442,241 UART: [art] SIG.R = 122D305EB761E1358117CCB8A182B82D961A27FA246530EFAB9A665B737590F78BD68C42A8D3C7EE06F74FD09855B54C
3,449,012 UART: [art] SIG.S = 1AC6D988AF64460E4170B99E158A3A4C0F430CF3854ADC392C6201B832229082107A137A0A1515D38E62500FF1EC64B5
3,472,683 UART: Caliptra RT
3,472,936 UART: [state] CFI Enabled
3,581,616 UART: [rt] RT listening for mailbox commands...
3,582,286 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,586 UART: [rt]cmd =0x434b4558, len=80
3,613,618 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,003 ready_for_fw is high
1,363,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,375 >>> mbox cmd response: success
2,989,279 UART:
2,989,295 UART: Running Caliptra FMC ...
2,989,703 UART:
2,989,757 UART: [state] CFI Enabled
3,000,080 UART: [fht] FMC Alias Private Key: 7
3,107,367 UART: [art] Extend RT PCRs Done
3,107,795 UART: [art] Lock RT PCRs Done
3,109,527 UART: [art] Populate DV Done
3,117,856 UART: [fht] FMC Alias Private Key: 7
3,118,952 UART: [art] Derive CDI
3,119,232 UART: [art] Store in in slot 0x4
3,205,009 UART: [art] Derive Key Pair
3,205,369 UART: [art] Store priv key in slot 0x5
3,218,993 UART: [art] Derive Key Pair - Done
3,233,881 UART: [art] Signing Cert with AUTHO
3,234,361 UART: RITY.KEYID = 7
3,249,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,964 UART: [art] PUB.X = 3E3D05226E033E6CCEAA30C39BCE81FABD447297C4B667C7557F2A216E6931098FB1262D59965983F5E460EB9AD84D48
3,256,729 UART: [art] PUB.Y = CDE9C6C98D9F049F7694DA3682B7950DACEAAE68C9352A4FA3FB0703C445ED91CD393090018C738E745963C5B84963BB
3,263,672 UART: [art] SIG.R = 132695BE8CD36B4B1307D374435FEA2DBA6D8C6A3508E13B18E820268AC47F166478A784FC61A3146DF846D1A0F8BD90
3,270,440 UART: [art] SIG.S = 1D0D1185DD738F91B5ECE9FEA9EF12B76CAE6B13C25C90D0D2E278AEDDDFEAE3E3EEDED1CA6EA8399957F03A7D29B426
3,294,504 UART: Caliptra RT
3,294,757 UART: [state] CFI Enabled
3,402,959 UART: [rt] RT listening for mailbox commands...
3,403,629 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,813 UART: [rt]cmd =0x434b4558, len=80
3,434,805 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,914 UART: [kat] SHA2-256
882,845 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,960 UART: [kat] ++
887,112 UART: [kat] sha1
891,236 UART: [kat] SHA2-256
893,174 UART: [kat] SHA2-384
895,931 UART: [kat] SHA2-512-ACC
897,832 UART: [kat] ECC-384
903,455 UART: [kat] HMAC-384Kdf
908,099 UART: [kat] LMS
1,476,295 UART: [kat] --
1,477,258 UART: [cold-reset] ++
1,477,672 UART: [fht] Storing FHT @ 0x50003400
1,480,453 UART: [idev] ++
1,480,621 UART: [idev] CDI.KEYID = 6
1,480,981 UART: [idev] SUBJECT.KEYID = 7
1,481,405 UART: [idev] UDS.KEYID = 0
1,481,750 ready_for_fw is high
1,481,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,465 UART: [idev] Erasing UDS.KEYID = 0
1,506,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,059 UART: [idev] --
1,516,134 UART: [ldev] ++
1,516,302 UART: [ldev] CDI.KEYID = 6
1,516,665 UART: [ldev] SUBJECT.KEYID = 5
1,517,091 UART: [ldev] AUTHORITY.KEYID = 7
1,517,554 UART: [ldev] FE.KEYID = 1
1,522,976 UART: [ldev] Erasing FE.KEYID = 1
1,548,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,335 UART: [ldev] --
1,587,746 UART: [fwproc] Waiting for Commands...
1,588,575 UART: [fwproc] Received command 0x46574c44
1,589,366 UART: [fwproc] Received Image of size 114448 bytes
2,889,259 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,107 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,376 >>> mbox cmd response: success
3,083,430 UART: [afmc] ++
3,083,598 UART: [afmc] CDI.KEYID = 6
3,083,960 UART: [afmc] SUBJECT.KEYID = 7
3,084,385 UART: [afmc] AUTHORITY.KEYID = 5
3,119,698 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,026 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,419 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,109 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,994 UART: [afmc] --
3,162,976 UART: [cold-reset] --
3,163,776 UART: [state] Locking Datavault
3,164,843 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,447 UART: [state] Locking ICCM
3,165,913 UART: [exit] Launching FMC @ 0x40000130
3,171,242 UART:
3,171,258 UART: Running Caliptra FMC ...
3,171,666 UART:
3,171,809 UART: [state] CFI Enabled
3,182,324 UART: [fht] FMC Alias Private Key: 7
3,289,943 UART: [art] Extend RT PCRs Done
3,290,371 UART: [art] Lock RT PCRs Done
3,291,755 UART: [art] Populate DV Done
3,300,066 UART: [fht] FMC Alias Private Key: 7
3,301,058 UART: [art] Derive CDI
3,301,338 UART: [art] Store in in slot 0x4
3,387,043 UART: [art] Derive Key Pair
3,387,403 UART: [art] Store priv key in slot 0x5
3,400,861 UART: [art] Derive Key Pair - Done
3,415,440 UART: [art] Signing Cert with AUTHO
3,415,920 UART: RITY.KEYID = 7
3,431,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,947 UART: [art] PUB.X = 14B4A6289588030B44C080093BF7BEE80F49CD28E6F9C33186155B9233EDD7EFEC41116CCD9122E2D66E62898FC55B4F
3,438,709 UART: [art] PUB.Y = 90BD29638AADDA2B758CB1BBE6B1F19A86EACFB1E92D4EDE1C0C8121642EF9B92AF6E2EE2CC48B434F9569BB07D4E5DA
3,445,683 UART: [art] SIG.R = 4248B057E8B11291748CBDF1907AE88706E2697875F2A080088CFDEE62BD9CFE949F3CE6D9A2A233206149AFF9A5038B
3,452,448 UART: [art] SIG.S = 9910214BFC90B771A24A0CB9B853213B8345405083CABC9C58543E2AFD24A8BA415F17FA95703B4A1D537C702698FFC3
3,475,850 UART: Caliptra RT
3,476,195 UART: [state] CFI Enabled
3,585,002 UART: [rt] RT listening for mailbox commands...
3,585,672 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,914 UART: [rt]cmd =0x434b4558, len=80
3,616,926 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,848 ready_for_fw is high
1,362,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,120 >>> mbox cmd response: success
2,990,202 UART:
2,990,218 UART: Running Caliptra FMC ...
2,990,626 UART:
2,990,769 UART: [state] CFI Enabled
3,001,736 UART: [fht] FMC Alias Private Key: 7
3,109,381 UART: [art] Extend RT PCRs Done
3,109,809 UART: [art] Lock RT PCRs Done
3,110,883 UART: [art] Populate DV Done
3,118,904 UART: [fht] FMC Alias Private Key: 7
3,119,920 UART: [art] Derive CDI
3,120,200 UART: [art] Store in in slot 0x4
3,206,283 UART: [art] Derive Key Pair
3,206,643 UART: [art] Store priv key in slot 0x5
3,219,885 UART: [art] Derive Key Pair - Done
3,234,640 UART: [art] Signing Cert with AUTHO
3,235,120 UART: RITY.KEYID = 7
3,250,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,843 UART: [art] PUB.X = 65C1369CA2874F46F5052D73C2D099176A91B5A0887426237762BF87E934E325178F0E3B569897BC58F1FFA6EDF75D59
3,257,601 UART: [art] PUB.Y = 98F6B42AB8F6D46BF02B9FA81C29BBEABDFBC9FA3C994619D357A2339FFABC0C6AF28B6B984312D9B2EBE82C948D91A0
3,264,574 UART: [art] SIG.R = B1A9E8660804098D260B4D7A588833E5BDE1291512C05E84C46282B288E53B79EA6663175EFF9AE50C7E2FBE73D31875
3,271,327 UART: [art] SIG.S = 3491B089783D9C2550C9E8E4C9A2212098FDB05ECA46CBBCD62F72D4BB2AF5532AA850A816EE61875A3CD2E0D61CB6A9
3,294,338 UART: Caliptra RT
3,294,683 UART: [state] CFI Enabled
3,403,124 UART: [rt] RT listening for mailbox commands...
3,403,794 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,080 UART: [rt]cmd =0x434b4558, len=80
3,435,138 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
893,160 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,285 UART: [kat] ++
897,437 UART: [kat] sha1
901,817 UART: [kat] SHA2-256
903,757 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
917,908 UART: [kat] HMAC-384Kdf
922,370 UART: [kat] LMS
1,170,698 UART: [kat] --
1,171,743 UART: [cold-reset] ++
1,172,313 UART: [fht] FHT @ 0x50003400
1,175,070 UART: [idev] ++
1,175,238 UART: [idev] CDI.KEYID = 6
1,175,598 UART: [idev] SUBJECT.KEYID = 7
1,176,022 UART: [idev] UDS.KEYID = 0
1,176,367 ready_for_fw is high
1,176,367 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,980 UART: [idev] Erasing UDS.KEYID = 0
1,200,563 UART: [idev] Sha1 KeyId Algorithm
1,208,997 UART: [idev] --
1,209,905 UART: [ldev] ++
1,210,073 UART: [ldev] CDI.KEYID = 6
1,210,436 UART: [ldev] SUBJECT.KEYID = 5
1,210,862 UART: [ldev] AUTHORITY.KEYID = 7
1,211,325 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,243,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,123 UART: [ldev] --
1,282,492 UART: [fwproc] Wait for Commands...
1,283,282 UART: [fwproc] Recv command 0x46574c44
1,284,010 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,631 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,918 >>> mbox cmd response: success
2,775,092 UART: [afmc] ++
2,775,260 UART: [afmc] CDI.KEYID = 6
2,775,622 UART: [afmc] SUBJECT.KEYID = 7
2,776,047 UART: [afmc] AUTHORITY.KEYID = 5
2,811,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,052 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,771 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,681 UART: [afmc] --
2,855,619 UART: [cold-reset] --
2,856,431 UART: [state] Locking Datavault
2,857,622 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,226 UART: [state] Locking ICCM
2,858,684 UART: [exit] Launching FMC @ 0x40000130
2,864,013 UART:
2,864,029 UART: Running Caliptra FMC ...
2,864,437 UART:
2,864,491 UART: [state] CFI Enabled
2,874,962 UART: [fht] FMC Alias Private Key: 7
2,983,105 UART: [art] Extend RT PCRs Done
2,983,533 UART: [art] Lock RT PCRs Done
2,985,051 UART: [art] Populate DV Done
2,993,266 UART: [fht] FMC Alias Private Key: 7
2,994,272 UART: [art] Derive CDI
2,994,552 UART: [art] Store in in slot 0x4
3,080,645 UART: [art] Derive Key Pair
3,081,005 UART: [art] Store priv key in slot 0x5
3,094,335 UART: [art] Derive Key Pair - Done
3,109,172 UART: [art] Signing Cert with AUTHO
3,109,652 UART: RITY.KEYID = 7
3,125,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,839 UART: [art] PUB.X = 6A1A2A94A44E70778D3A7DF5CFD3AD7AF292B1C3998C71B02E9F28A9F95DA6F961B3829B83BBB89A31F9D1055FDA666F
3,132,622 UART: [art] PUB.Y = A1E31B10CD104D87C17655564377785C1E25F3F1DC58DB4C3D2EA8AB999121B0A5FE0EBDBC23B9EADAC85883BF8A9DE7
3,139,589 UART: [art] SIG.R = 644EAA64D1D41FB9DE9873518F5FF99A95EB264AAC3C1A0B31E67C9BC51C7E679D4B4711EFB9A38D9B54A20B3C722419
3,146,367 UART: [art] SIG.S = 45491336B0C2FE8D8AF479BD4CE47F0039EB4232AD06594CFB12FB0A9C213A41515E911B3B1ED6CB54BBF49FEA152190
3,170,744 UART: Caliptra RT
3,170,997 UART: [state] CFI Enabled
3,278,308 UART: [rt] RT listening for mailbox commands...
3,278,978 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,192 UART: [rt]cmd =0x434b4558, len=80
3,310,318 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,183 ready_for_fw is high
1,060,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,747 >>> mbox cmd response: success
2,689,379 UART:
2,689,395 UART: Running Caliptra FMC ...
2,689,803 UART:
2,689,857 UART: [state] CFI Enabled
2,700,194 UART: [fht] FMC Alias Private Key: 7
2,808,511 UART: [art] Extend RT PCRs Done
2,808,939 UART: [art] Lock RT PCRs Done
2,810,381 UART: [art] Populate DV Done
2,818,590 UART: [fht] FMC Alias Private Key: 7
2,819,522 UART: [art] Derive CDI
2,819,802 UART: [art] Store in in slot 0x4
2,905,209 UART: [art] Derive Key Pair
2,905,569 UART: [art] Store priv key in slot 0x5
2,918,779 UART: [art] Derive Key Pair - Done
2,933,609 UART: [art] Signing Cert with AUTHO
2,934,089 UART: RITY.KEYID = 7
2,948,679 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,444 UART: [art] PUB.X = DD8DE1CA05359C1931C75E09BCF237BD8501BAFEA33D568A5ADA599E31714831E579907E9EB8AD9EBEC533D14776D6E8
2,956,219 UART: [art] PUB.Y = 8D5B3B500C4CF02F0E7645F5B3311D512E4A3EA0819FDF3C146B2134C851686A9D6149671A02D9045FD144FD08E2ECB4
2,963,158 UART: [art] SIG.R = 55DD10C55DCFCC2CFCD24C5C007DB7C12B63FFCD618F88AE5C9EFFFB2BBABB53BDE3E9FE0AF9D98F4C2939F2A8B789D7
2,969,943 UART: [art] SIG.S = AB7A2DE4184DACD209B313E04792CF604CF01E83064816C45C25854F1949F517C4DA2DFCE095F996BFB2BD45B6FD4BCE
2,993,420 UART: Caliptra RT
2,993,673 UART: [state] CFI Enabled
3,102,800 UART: [rt] RT listening for mailbox commands...
3,103,470 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,716 UART: [rt]cmd =0x434b4558, len=80
3,134,802 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
893,231 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,356 UART: [kat] ++
897,508 UART: [kat] sha1
901,800 UART: [kat] SHA2-256
903,740 UART: [kat] SHA2-384
906,489 UART: [kat] SHA2-512-ACC
908,390 UART: [kat] ECC-384
918,233 UART: [kat] HMAC-384Kdf
922,951 UART: [kat] LMS
1,171,279 UART: [kat] --
1,172,250 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,229 UART: [idev] ++
1,175,397 UART: [idev] CDI.KEYID = 6
1,175,757 UART: [idev] SUBJECT.KEYID = 7
1,176,181 UART: [idev] UDS.KEYID = 0
1,176,526 ready_for_fw is high
1,176,526 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,481 UART: [idev] Erasing UDS.KEYID = 0
1,202,012 UART: [idev] Sha1 KeyId Algorithm
1,210,506 UART: [idev] --
1,211,512 UART: [ldev] ++
1,211,680 UART: [ldev] CDI.KEYID = 6
1,212,043 UART: [ldev] SUBJECT.KEYID = 5
1,212,469 UART: [ldev] AUTHORITY.KEYID = 7
1,212,932 UART: [ldev] FE.KEYID = 1
1,218,200 UART: [ldev] Erasing FE.KEYID = 1
1,244,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,308 UART: [ldev] --
1,283,667 UART: [fwproc] Wait for Commands...
1,284,387 UART: [fwproc] Recv command 0x46574c44
1,285,115 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,769 >>> mbox cmd response: success
2,777,921 UART: [afmc] ++
2,778,089 UART: [afmc] CDI.KEYID = 6
2,778,451 UART: [afmc] SUBJECT.KEYID = 7
2,778,876 UART: [afmc] AUTHORITY.KEYID = 5
2,814,007 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,232 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,960 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,564 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,440 UART: [afmc] --
2,857,418 UART: [cold-reset] --
2,858,172 UART: [state] Locking Datavault
2,859,315 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,919 UART: [state] Locking ICCM
2,860,525 UART: [exit] Launching FMC @ 0x40000130
2,865,854 UART:
2,865,870 UART: Running Caliptra FMC ...
2,866,278 UART:
2,866,421 UART: [state] CFI Enabled
2,877,382 UART: [fht] FMC Alias Private Key: 7
2,985,907 UART: [art] Extend RT PCRs Done
2,986,335 UART: [art] Lock RT PCRs Done
2,988,023 UART: [art] Populate DV Done
2,996,288 UART: [fht] FMC Alias Private Key: 7
2,997,414 UART: [art] Derive CDI
2,997,694 UART: [art] Store in in slot 0x4
3,083,601 UART: [art] Derive Key Pair
3,083,961 UART: [art] Store priv key in slot 0x5
3,096,387 UART: [art] Derive Key Pair - Done
3,111,361 UART: [art] Signing Cert with AUTHO
3,111,841 UART: RITY.KEYID = 7
3,127,085 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,850 UART: [art] PUB.X = 0297AED3608CF3D0CEB1396D60AC29A65A57B7AD1153E1989966D79AB45FBE7D1E7CA228CB1BA13FD6E2AC911DB3FB3F
3,134,639 UART: [art] PUB.Y = D4205B4DD16F1381877B3A01B14F677A092D9405931447D71C8DF3283AB8F9CE8CFFD5623A268B601E370B5F1299957F
3,141,575 UART: [art] SIG.R = BE6EE32B582A544C1AB0B3210B4EAAE2D142BF5C7615642A739B36585676CA7F2C7ED7D1FB4BE4A8ED5E25C610C9083B
3,148,355 UART: [art] SIG.S = D16A84324F3D2FB0778757957868F16B5EB52F2648850BB0571558FB13275B256FE981DD48AEA7262FCF17CE6D6EE6B8
3,171,925 UART: Caliptra RT
3,172,270 UART: [state] CFI Enabled
3,279,736 UART: [rt] RT listening for mailbox commands...
3,280,406 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,390 UART: [rt]cmd =0x434b4558, len=80
3,311,350 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,808 ready_for_fw is high
1,060,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,832 >>> mbox cmd response: success
2,688,470 UART:
2,688,486 UART: Running Caliptra FMC ...
2,688,894 UART:
2,689,037 UART: [state] CFI Enabled
2,699,232 UART: [fht] FMC Alias Private Key: 7
2,807,295 UART: [art] Extend RT PCRs Done
2,807,723 UART: [art] Lock RT PCRs Done
2,809,197 UART: [art] Populate DV Done
2,817,402 UART: [fht] FMC Alias Private Key: 7
2,818,364 UART: [art] Derive CDI
2,818,644 UART: [art] Store in in slot 0x4
2,904,469 UART: [art] Derive Key Pair
2,904,829 UART: [art] Store priv key in slot 0x5
2,918,593 UART: [art] Derive Key Pair - Done
2,933,252 UART: [art] Signing Cert with AUTHO
2,933,732 UART: RITY.KEYID = 7
2,948,524 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,289 UART: [art] PUB.X = 7B71CDEE4B73F07C2F17247943999E9FBE5CDF2886C117A2DBCD3BA8832BC7C9833EA4B1AEA18EC8C3BF7245D6636C16
2,956,077 UART: [art] PUB.Y = 22934151434F908B72BCBBFDF20794B2601FAFFB6BC8BFA859AACB746431DFABF99977F9CE445785060A6DFCAA6471E5
2,963,034 UART: [art] SIG.R = A411854E1DA1D22D61F551D8A96534733A5A38E249306A3904E1DC753D5B78C20F1E16A99078F0CCB8C053389A83A79C
2,969,796 UART: [art] SIG.S = 7A66C646D91B3F7EA1BDC6162B443FB38A5AE09BF04BD15A63B670BF861DC9F448AD1989C554AEE74825E4A3FD6531BA
2,994,285 UART: Caliptra RT
2,994,630 UART: [state] CFI Enabled
3,103,395 UART: [rt] RT listening for mailbox commands...
3,104,065 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,423 UART: [rt]cmd =0x434b4558, len=80
3,135,407 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
891,398 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,837 UART: [cold-reset] ++
1,170,205 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,174,121 ready_for_fw is high
1,174,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,143 UART: [idev] Erasing UDS.KEYID = 0
1,198,973 UART: [idev] Sha1 KeyId Algorithm
1,207,753 UART: [idev] --
1,208,694 UART: [ldev] ++
1,208,862 UART: [ldev] CDI.KEYID = 6
1,209,226 UART: [ldev] SUBJECT.KEYID = 5
1,209,653 UART: [ldev] AUTHORITY.KEYID = 7
1,210,116 UART: [ldev] FE.KEYID = 1
1,215,348 UART: [ldev] Erasing FE.KEYID = 1
1,241,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,464 UART: [ldev] --
1,280,790 UART: [fwproc] Wait for Commands...
1,281,395 UART: [fwproc] Recv command 0x46574c44
1,282,128 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,178 >>> mbox cmd response: success
2,776,385 UART: [afmc] ++
2,776,553 UART: [afmc] CDI.KEYID = 6
2,776,916 UART: [afmc] SUBJECT.KEYID = 7
2,777,342 UART: [afmc] AUTHORITY.KEYID = 5
2,812,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,618 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,347 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,230 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,949 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,966 UART: [afmc] --
2,855,966 UART: [cold-reset] --
2,856,614 UART: [state] Locking Datavault
2,857,651 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,255 UART: [state] Locking ICCM
2,858,759 UART: [exit] Launching FMC @ 0x40000130
2,864,088 UART:
2,864,104 UART: Running Caliptra FMC ...
2,864,512 UART:
2,864,566 UART: [state] CFI Enabled
2,875,055 UART: [fht] FMC Alias Private Key: 7
2,983,100 UART: [art] Extend RT PCRs Done
2,983,528 UART: [art] Lock RT PCRs Done
2,985,222 UART: [art] Populate DV Done
2,993,365 UART: [fht] FMC Alias Private Key: 7
2,994,419 UART: [art] Derive CDI
2,994,699 UART: [art] Store in in slot 0x4
3,080,644 UART: [art] Derive Key Pair
3,081,004 UART: [art] Store priv key in slot 0x5
3,094,232 UART: [art] Derive Key Pair - Done
3,109,164 UART: [art] Signing Cert with AUTHO
3,109,644 UART: RITY.KEYID = 7
3,125,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,777 UART: [art] PUB.X = AC202ADC44C76315B0568703E803CEDA939A20A48BA10BA041EAC943DFD036F65DB22B5457E5E674BD751D578268FFFC
3,132,550 UART: [art] PUB.Y = 9E64BC3FC091A95520FD757A936C9B4C78DC9E3D10E3B654D96F96F1D448CFD02941A5C68ACE11687ADC4264AA011C67
3,139,507 UART: [art] SIG.R = 62AFE5922AADE77D1BC9850C7BFEC9E4B2816A44BBCAE24BAFB1E3F5E34FBC10A7DC8C3A2C310B5A7D4668DB37606F1D
3,146,301 UART: [art] SIG.S = CB5DB8D808F09C4149FBA861FE713D4664A57971DC328BC1EC9F71A60563051C911F3AD4BEAE100932C9A35B73E55D48
3,169,732 UART: Caliptra RT
3,169,985 UART: [state] CFI Enabled
3,277,976 UART: [rt] RT listening for mailbox commands...
3,278,646 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,832 UART: [rt]cmd =0x434b4558, len=80
3,309,914 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,524 ready_for_fw is high
1,055,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,542 >>> mbox cmd response: success
2,684,978 UART:
2,684,994 UART: Running Caliptra FMC ...
2,685,402 UART:
2,685,456 UART: [state] CFI Enabled
2,695,621 UART: [fht] FMC Alias Private Key: 7
2,803,584 UART: [art] Extend RT PCRs Done
2,804,012 UART: [art] Lock RT PCRs Done
2,805,518 UART: [art] Populate DV Done
2,813,927 UART: [fht] FMC Alias Private Key: 7
2,815,065 UART: [art] Derive CDI
2,815,345 UART: [art] Store in in slot 0x4
2,900,800 UART: [art] Derive Key Pair
2,901,160 UART: [art] Store priv key in slot 0x5
2,914,400 UART: [art] Derive Key Pair - Done
2,929,479 UART: [art] Signing Cert with AUTHO
2,929,959 UART: RITY.KEYID = 7
2,945,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,118 UART: [art] PUB.X = DBC75B559CED893458DED266181447FA54939B543DAAC4539F733D0522A29E1F0B9164BB5A095FADA0AA71C71A71B3A2
2,952,889 UART: [art] PUB.Y = 33761F50604BDCF4BB980248E455D791C82C430D7644160952BD3ABC6B375D58C8124FD85021470AA66FC8BDB65EC32E
2,959,829 UART: [art] SIG.R = B1F2DF75AEAA1135587A52DAEF0E00DD3A216EC233D6737FAC505B66AC822004409C7E498CDCD531973658CC81841AE5
2,966,581 UART: [art] SIG.S = 0AF6D838AB63CB2F51887BE75C20752D33DB7276834E29B498B4B38CF3504157A3B8648EC85A677936DDB0851C5336B7
2,990,345 UART: Caliptra RT
2,990,598 UART: [state] CFI Enabled
3,098,287 UART: [rt] RT listening for mailbox commands...
3,098,957 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,223 UART: [rt]cmd =0x434b4558, len=80
3,130,339 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,204 UART: [kat] SHA2-256
902,144 UART: [kat] SHA2-384
904,921 UART: [kat] SHA2-512-ACC
906,822 UART: [kat] ECC-384
916,473 UART: [kat] HMAC-384Kdf
921,039 UART: [kat] LMS
1,169,351 UART: [kat] --
1,170,526 UART: [cold-reset] ++
1,171,078 UART: [fht] FHT @ 0x50003400
1,173,836 UART: [idev] ++
1,174,004 UART: [idev] CDI.KEYID = 6
1,174,365 UART: [idev] SUBJECT.KEYID = 7
1,174,790 UART: [idev] UDS.KEYID = 0
1,175,136 ready_for_fw is high
1,175,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,708 UART: [idev] Erasing UDS.KEYID = 0
1,199,276 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,987 UART: [ldev] --
1,282,251 UART: [fwproc] Wait for Commands...
1,283,066 UART: [fwproc] Recv command 0x46574c44
1,283,799 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,579 >>> mbox cmd response: success
2,777,596 UART: [afmc] ++
2,777,764 UART: [afmc] CDI.KEYID = 6
2,778,127 UART: [afmc] SUBJECT.KEYID = 7
2,778,553 UART: [afmc] AUTHORITY.KEYID = 5
2,813,882 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,133 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,862 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,464 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,523 UART: [afmc] --
2,857,565 UART: [cold-reset] --
2,858,331 UART: [state] Locking Datavault
2,859,534 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,138 UART: [state] Locking ICCM
2,860,810 UART: [exit] Launching FMC @ 0x40000130
2,866,139 UART:
2,866,155 UART: Running Caliptra FMC ...
2,866,563 UART:
2,866,706 UART: [state] CFI Enabled
2,877,755 UART: [fht] FMC Alias Private Key: 7
2,986,038 UART: [art] Extend RT PCRs Done
2,986,466 UART: [art] Lock RT PCRs Done
2,988,058 UART: [art] Populate DV Done
2,996,079 UART: [fht] FMC Alias Private Key: 7
2,997,109 UART: [art] Derive CDI
2,997,389 UART: [art] Store in in slot 0x4
3,082,782 UART: [art] Derive Key Pair
3,083,142 UART: [art] Store priv key in slot 0x5
3,096,564 UART: [art] Derive Key Pair - Done
3,110,981 UART: [art] Signing Cert with AUTHO
3,111,461 UART: RITY.KEYID = 7
3,126,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,180 UART: [art] PUB.X = 98BAF27D65C472582ED5E1C8E6E7769B4EA07B3D412D37A49D187B6EF6D3ADCF0C2D5C335BBF453DD094107B2835C4F5
3,133,961 UART: [art] PUB.Y = 74FDC55699D397EA93743BC837FE93BE1EFABC765D29A269F3EBA69F0EC9903C3A0E741CA4618840F295ED133908CB12
3,140,912 UART: [art] SIG.R = 0F7652B20B677467D4388002992CD5AF38B6C248C8976A4BABE90CFC11D076548E767291141A7EC3DBAEC74B321588AB
3,147,672 UART: [art] SIG.S = 65C90B1FEA5639923C21160EB7820E65E13D7BD5B10CA6FC1C0D982A7B49E6B09270FFA703BF04D31EA104F04DD3BB5F
3,172,161 UART: Caliptra RT
3,172,506 UART: [state] CFI Enabled
3,280,129 UART: [rt] RT listening for mailbox commands...
3,280,799 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,081 UART: [rt]cmd =0x434b4558, len=80
3,312,161 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,423 ready_for_fw is high
1,056,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,481 >>> mbox cmd response: success
2,685,743 UART:
2,685,759 UART: Running Caliptra FMC ...
2,686,167 UART:
2,686,310 UART: [state] CFI Enabled
2,696,965 UART: [fht] FMC Alias Private Key: 7
2,805,004 UART: [art] Extend RT PCRs Done
2,805,432 UART: [art] Lock RT PCRs Done
2,806,976 UART: [art] Populate DV Done
2,815,279 UART: [fht] FMC Alias Private Key: 7
2,816,289 UART: [art] Derive CDI
2,816,569 UART: [art] Store in in slot 0x4
2,902,596 UART: [art] Derive Key Pair
2,902,956 UART: [art] Store priv key in slot 0x5
2,916,848 UART: [art] Derive Key Pair - Done
2,931,635 UART: [art] Signing Cert with AUTHO
2,932,115 UART: RITY.KEYID = 7
2,947,425 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,190 UART: [art] PUB.X = 27378247ECBDD4517C09E75DC9382261E4BEFD292DFABAF6D2463BF64FD561C7E5778D947E2578CEEA24E2C2FE4E1838
2,954,971 UART: [art] PUB.Y = C7347FB39314E7C870A7AD6A032BA5071E78AB62A46E0005ADDDBDAB2A5B629DBB2F0A82302974DD0A58F70C3928EDD1
2,961,897 UART: [art] SIG.R = D7313310255FD17694142EB621CF872E85BD3B029BAD02A04BAD1A8D316BAC906F65ACC8526A3BA7228D94D51CBCA994
2,968,671 UART: [art] SIG.S = 4F0C7500F6AF2481F56DF3AD06761D593F488C18F684453B4D3816DA861E3F017DDDDD64E3DDB985B782897E1F66D27B
2,993,129 UART: Caliptra RT
2,993,474 UART: [state] CFI Enabled
3,101,149 UART: [rt] RT listening for mailbox commands...
3,101,819 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,931 UART: [rt]cmd =0x434b4558, len=80
3,133,151 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,045 UART:
192,406 UART: Running Caliptra ROM ...
193,553 UART:
193,707 UART: [state] CFI Enabled
264,405 UART: [state] LifecycleState = Unprovisioned
266,422 UART: [state] DebugLocked = No
268,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,825 UART: [kat] SHA2-256
443,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,986 UART: [kat] ++
454,460 UART: [kat] sha1
466,046 UART: [kat] SHA2-256
468,782 UART: [kat] SHA2-384
474,774 UART: [kat] SHA2-512-ACC
477,141 UART: [kat] ECC-384
2,765,902 UART: [kat] HMAC-384Kdf
2,779,367 UART: [kat] LMS
3,969,641 UART: [kat] --
3,974,723 UART: [cold-reset] ++
3,976,087 UART: [fht] Storing FHT @ 0x50003400
3,987,216 UART: [idev] ++
3,987,799 UART: [idev] CDI.KEYID = 6
3,988,833 UART: [idev] SUBJECT.KEYID = 7
3,990,016 UART: [idev] UDS.KEYID = 0
3,991,088 ready_for_fw is high
3,991,311 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,928 UART: [idev] Erasing UDS.KEYID = 0
7,326,211 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,768 UART: [idev] --
7,350,164 UART: [ldev] ++
7,350,732 UART: [ldev] CDI.KEYID = 6
7,351,672 UART: [ldev] SUBJECT.KEYID = 5
7,352,884 UART: [ldev] AUTHORITY.KEYID = 7
7,354,166 UART: [ldev] FE.KEYID = 1
7,402,288 UART: [ldev] Erasing FE.KEYID = 1
10,731,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,905 UART: [ldev] --
13,093,368 UART: [fwproc] Waiting for Commands...
13,095,787 UART: [fwproc] Received command 0x46574c44
13,097,971 UART: [fwproc] Received Image of size 114124 bytes
17,151,334 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,837 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,695 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,611,197 >>> mbox cmd response: success
17,615,456 UART: [afmc] ++
17,616,053 UART: [afmc] CDI.KEYID = 6
17,616,943 UART: [afmc] SUBJECT.KEYID = 7
17,618,216 UART: [afmc] AUTHORITY.KEYID = 5
20,987,523 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,724 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,997 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,423 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,263 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,668 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,296 UART: [afmc] --
23,356,700 UART: [cold-reset] --
23,361,640 UART: [state] Locking Datavault
23,366,411 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,158 UART: [state] Locking ICCM
23,369,427 UART: [exit] Launching FMC @ 0x40000130
23,377,776 UART:
23,378,012 UART: Running Caliptra FMC ...
23,379,047 UART:
23,379,198 UART: [state] CFI Enabled
23,445,033 UART: [fht] FMC Alias Private Key: 7
25,783,134 UART: [art] Extend RT PCRs Done
25,784,358 UART: [art] Lock RT PCRs Done
25,786,179 UART: [art] Populate DV Done
25,791,969 UART: [fht] FMC Alias Private Key: 7
25,793,559 UART: [art] Derive CDI
25,794,302 UART: [art] Store in in slot 0x4
25,852,792 UART: [art] Derive Key Pair
25,853,830 UART: [art] Store priv key in slot 0x5
29,146,489 UART: [art] Derive Key Pair - Done
29,159,384 UART: [art] Signing Cert with AUTHO
29,160,692 UART: RITY.KEYID = 7
31,448,481 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,993 UART: [art] PUB.X = BB7698CF391675FD98EA1A84660EED557F6EFECF30CCAC45EE5E140C8349BDD3D83345D2B19C7A92BC8A7B38D682AE2B
31,457,244 UART: [art] PUB.Y = 4733B43240A95E8B5C0AF6ED85095917A3E9397EE581EEA0E293786A247D5D36DC5010AF9CE27EF629D04C8818B975D5
31,464,477 UART: [art] SIG.R = 0AC8BBDF0E2579F1AF50F7FFD1B26F2587BB339C94C067E2E47573D2900A3178408CABBB5023A439134DC37FBF930DBE
31,471,863 UART: [art] SIG.S = 529B974842B559839EDDBDD77CF5AA20232F07FAB0ED89AC63188972E71F888395ACEE88B4C8AEE4F1D751D170FE1855
32,777,202 UART: Caliptra RT
32,777,923 UART: [state] CFI Enabled
32,957,729 UART: [rt] RT listening for mailbox commands...
32,959,654 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,990,260 UART: [rt]cmd =0x44504543, len=92
32,996,701 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,805,356 ready_for_fw is high
3,805,794 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,869,430 >>> mbox cmd response: success
23,568,305 UART:
23,569,037 UART: Running Caliptra FMC ...
23,570,181 UART:
23,570,341 UART: [state] CFI Enabled
23,636,141 UART: [fht] FMC Alias Private Key: 7
25,973,749 UART: [art] Extend RT PCRs Done
25,974,985 UART: [art] Lock RT PCRs Done
25,976,946 UART: [art] Populate DV Done
25,982,372 UART: [fht] FMC Alias Private Key: 7
25,983,973 UART: [art] Derive CDI
25,984,789 UART: [art] Store in in slot 0x4
26,043,876 UART: [art] Derive Key Pair
26,044,943 UART: [art] Store priv key in slot 0x5
29,337,881 UART: [art] Derive Key Pair - Done
29,350,713 UART: [art] Signing Cert with AUTHO
29,352,030 UART: RITY.KEYID = 7
31,638,817 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,331 UART: [art] PUB.X = 73E2A2D594630B3720BBD7D4EE9BFB128E81752798829B1166B8E6ED5EEB61E1B63BBA37B87A14CA78CDD4C20C89A8CD
31,647,657 UART: [art] PUB.Y = FC5C8674F238840A815F6586E6C38328C7775651CE1329A3EBF148D102FA39DAE04674F266640C5A0618677AF40302D6
31,654,815 UART: [art] SIG.R = EC64B6EDD19F9FB99CCD9B26DC3A1BD9035B528D3B405296C4F16A84400A609D03C4C28421567338B4B5BCEF102543C7
31,662,182 UART: [art] SIG.S = D87D1DD6E0C4A02A5C7C8B913DC65A751A727107F7FF68E0FC1BB86287ACD1C135A9AC319F5BEF3186D05964183B65C0
32,967,571 UART: Caliptra RT
32,968,313 UART: [state] CFI Enabled
33,129,076 UART: [rt] RT listening for mailbox commands...
33,131,177 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,161,795 UART: [rt]cmd =0x44504543, len=92
33,168,430 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
192,342 UART:
192,702 UART: Running Caliptra ROM ...
193,876 UART:
603,733 UART: [state] CFI Enabled
615,923 UART: [state] LifecycleState = Unprovisioned
617,895 UART: [state] DebugLocked = No
619,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,772 UART: [kat] SHA2-256
794,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,065 UART: [kat] ++
805,511 UART: [kat] sha1
815,309 UART: [kat] SHA2-256
818,028 UART: [kat] SHA2-384
822,450 UART: [kat] SHA2-512-ACC
824,833 UART: [kat] ECC-384
3,108,953 UART: [kat] HMAC-384Kdf
3,120,567 UART: [kat] LMS
4,310,700 UART: [kat] --
4,316,437 UART: [cold-reset] ++
4,317,805 UART: [fht] Storing FHT @ 0x50003400
4,328,284 UART: [idev] ++
4,328,843 UART: [idev] CDI.KEYID = 6
4,331,142 UART: [idev] SUBJECT.KEYID = 7
4,332,282 UART: [idev] UDS.KEYID = 0
4,333,296 ready_for_fw is high
4,333,518 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,908 UART: [idev] Erasing UDS.KEYID = 0
7,619,015 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,291 UART: [idev] --
7,644,926 UART: [ldev] ++
7,645,507 UART: [ldev] CDI.KEYID = 6
7,646,741 UART: [ldev] SUBJECT.KEYID = 5
7,647,867 UART: [ldev] AUTHORITY.KEYID = 7
7,649,049 UART: [ldev] FE.KEYID = 1
7,659,347 UART: [ldev] Erasing FE.KEYID = 1
10,950,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,447 UART: [ldev] --
13,311,297 UART: [fwproc] Waiting for Commands...
13,313,705 UART: [fwproc] Received command 0x46574c44
13,315,880 UART: [fwproc] Received Image of size 114124 bytes
17,371,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,429 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,292 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,327 >>> mbox cmd response: success
17,834,765 UART: [afmc] ++
17,835,357 UART: [afmc] CDI.KEYID = 6
17,836,373 UART: [afmc] SUBJECT.KEYID = 7
17,837,525 UART: [afmc] AUTHORITY.KEYID = 5
21,153,214 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,210 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,520 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,869 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,732 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,172 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,905 UART: [afmc] --
23,520,415 UART: [cold-reset] --
23,523,849 UART: [state] Locking Datavault
23,531,525 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,293 UART: [state] Locking ICCM
23,535,174 UART: [exit] Launching FMC @ 0x40000130
23,543,566 UART:
23,543,804 UART: Running Caliptra FMC ...
23,544,902 UART:
23,545,056 UART: [state] CFI Enabled
23,553,181 UART: [fht] FMC Alias Private Key: 7
25,884,342 UART: [art] Extend RT PCRs Done
25,885,567 UART: [art] Lock RT PCRs Done
25,887,300 UART: [art] Populate DV Done
25,892,406 UART: [fht] FMC Alias Private Key: 7
25,893,900 UART: [art] Derive CDI
25,894,656 UART: [art] Store in in slot 0x4
25,936,648 UART: [art] Derive Key Pair
25,937,643 UART: [art] Store priv key in slot 0x5
29,179,888 UART: [art] Derive Key Pair - Done
29,192,769 UART: [art] Signing Cert with AUTHO
29,194,080 UART: RITY.KEYID = 7
31,473,876 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,378 UART: [art] PUB.X = A179435219171214DFBB7E3E3583F30A2249DD7019C477E7894B8E0D20C215B18BDAA89540E8FD220CEBC1303699CF9A
31,482,660 UART: [art] PUB.Y = 4F8566935D9A86AF63CFB8F4602B71C244B4F2BEEE49EE8FCA1E6EC6DC0EA07592660AEB193D793C3CB7CBC7CCF8B1CE
31,489,945 UART: [art] SIG.R = A72A7068E0BD109DD779012B5FCA48523E5E69A645F1994CF77448E56CABB73E4BCBA6406F2856E647A59CAB006336A0
31,497,276 UART: [art] SIG.S = 1E98CCFE22501A63EC31953DF54CA0FB4120B3ADE9D8648F8F9C1D512B8D20FCBB2CAC26A2071C04F87DAEF176184791
32,802,003 UART: Caliptra RT
32,802,704 UART: [state] CFI Enabled
32,921,869 UART: [rt] RT listening for mailbox commands...
32,923,804 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,954,420 UART: [rt]cmd =0x44504543, len=92
32,961,120 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
4,127,247 ready_for_fw is high
4,127,647 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,587 >>> mbox cmd response: success
23,722,456 UART:
23,722,846 UART: Running Caliptra FMC ...
23,723,948 UART:
23,724,097 UART: [state] CFI Enabled
23,731,885 UART: [fht] FMC Alias Private Key: 7
26,061,868 UART: [art] Extend RT PCRs Done
26,063,097 UART: [art] Lock RT PCRs Done
26,064,484 UART: [art] Populate DV Done
26,069,833 UART: [fht] FMC Alias Private Key: 7
26,071,322 UART: [art] Derive CDI
26,072,083 UART: [art] Store in in slot 0x4
26,114,855 UART: [art] Derive Key Pair
26,115,892 UART: [art] Store priv key in slot 0x5
29,357,330 UART: [art] Derive Key Pair - Done
29,370,443 UART: [art] Signing Cert with AUTHO
29,371,776 UART: RITY.KEYID = 7
31,651,043 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,546 UART: [art] PUB.X = 226BA35109E449F2A688B6211067A555DEE395920C4D1E964F57389B724A2EC53DBC136B9B530E24591084E15607018D
31,659,727 UART: [art] PUB.Y = 704C2366DE3241BDB4C36E7232BFF0E0C0780F9A197EE2FA47D43E2C8482FB0F070732BE9CDDA99D5399C57F37369D7A
31,666,990 UART: [art] SIG.R = 62827ED969BE65BBB508580701B6A86732CA9A2023CC27B94E127DFB39189439CA4355D3E4FD32F3E28E4315749159DF
31,674,344 UART: [art] SIG.S = 1DF7CF77791D860F53B65491F556ACD07DDCE4204B3FEE3989F2B5E8A688CA078269C68C7F3CEA7A18223E7CBAA8B13A
32,979,065 UART: Caliptra RT
32,979,773 UART: [state] CFI Enabled
33,097,656 UART: [rt] RT listening for mailbox commands...
33,099,617 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,130,162 UART: [rt]cmd =0x44504543, len=92
33,136,786 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,170 UART:
192,540 UART: Running Caliptra ROM ...
193,738 UART:
193,895 UART: [state] CFI Enabled
262,719 UART: [state] LifecycleState = Unprovisioned
264,630 UART: [state] DebugLocked = No
266,799 UART: [state] WD Timer not started. Device not locked for debugging
271,398 UART: [kat] SHA2-256
450,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,039 UART: [kat] ++
462,573 UART: [kat] sha1
474,080 UART: [kat] SHA2-256
477,159 UART: [kat] SHA2-384
483,867 UART: [kat] SHA2-512-ACC
486,803 UART: [kat] ECC-384
2,946,850 UART: [kat] HMAC-384Kdf
2,969,498 UART: [kat] LMS
3,498,941 UART: [kat] --
3,502,809 UART: [cold-reset] ++
3,504,092 UART: [fht] FHT @ 0x50003400
3,516,335 UART: [idev] ++
3,516,910 UART: [idev] CDI.KEYID = 6
3,517,834 UART: [idev] SUBJECT.KEYID = 7
3,519,012 UART: [idev] UDS.KEYID = 0
3,519,936 ready_for_fw is high
3,520,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,104 UART: [idev] Erasing UDS.KEYID = 0
6,023,715 UART: [idev] Sha1 KeyId Algorithm
6,046,844 UART: [idev] --
6,051,378 UART: [ldev] ++
6,051,950 UART: [ldev] CDI.KEYID = 6
6,052,863 UART: [ldev] SUBJECT.KEYID = 5
6,054,023 UART: [ldev] AUTHORITY.KEYID = 7
6,055,255 UART: [ldev] FE.KEYID = 1
6,089,186 UART: [ldev] Erasing FE.KEYID = 1
8,591,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,687 UART: [ldev] --
10,403,626 UART: [fwproc] Wait for Commands...
10,406,153 UART: [fwproc] Recv command 0x46574c44
10,408,192 UART: [fwproc] Recv'd Img size: 114448 bytes
13,814,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,196 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,987 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,271,716 >>> mbox cmd response: success
14,276,891 UART: [afmc] ++
14,277,493 UART: [afmc] CDI.KEYID = 6
14,278,405 UART: [afmc] SUBJECT.KEYID = 7
14,279,569 UART: [afmc] AUTHORITY.KEYID = 5
16,805,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,398 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,322 UART: [afmc] --
18,609,757 UART: [cold-reset] --
18,613,446 UART: [state] Locking Datavault
18,619,227 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,925 UART: [state] Locking ICCM
18,622,154 UART: [exit] Launching FMC @ 0x40000130
18,630,614 UART:
18,630,897 UART: Running Caliptra FMC ...
18,632,004 UART:
18,632,174 UART: [state] CFI Enabled
18,691,888 UART: [fht] FMC Alias Private Key: 7
20,455,414 UART: [art] Extend RT PCRs Done
20,456,619 UART: [art] Lock RT PCRs Done
20,458,295 UART: [art] Populate DV Done
20,463,918 UART: [fht] FMC Alias Private Key: 7
20,465,799 UART: [art] Derive CDI
20,466,553 UART: [art] Store in in slot 0x4
20,524,408 UART: [art] Derive Key Pair
20,525,412 UART: [art] Store priv key in slot 0x5
22,988,112 UART: [art] Derive Key Pair - Done
23,001,057 UART: [art] Signing Cert with AUTHO
23,002,367 UART: RITY.KEYID = 7
24,714,297 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,802 UART: [art] PUB.X = 8B32CEBB6010EF473EDA88388A9D59DB7D2EEC1B0AA6C00DF7652CFC47B0EFEB9A24F27A8E0DB7E1DCC744A2335CF355
24,723,113 UART: [art] PUB.Y = 51969C0483C88D524C27322CF44E949FAFA67E187E614B9FB953313D3C4EB5F5F92C27FBD1D2BE167420CD49963BA212
24,730,359 UART: [art] SIG.R = A5F24304135193B6A6CD204361468BA4DFEB1C34E236E4EBECEE1F9BCAA91BC47F3A3F224F5F2795AC8D0D9DF5224F04
24,737,758 UART: [art] SIG.S = 94832E8B8404C0CBED0B1C6EE6A6D8C75751D58A8DC483C76AF13E7EEA2659F840B21542FD90DB7364A34339DF4CB1B4
25,717,208 UART: Caliptra RT
25,717,911 UART: [state] CFI Enabled
25,882,258 UART: [rt] RT listening for mailbox commands...
25,884,183 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,915,218 UART: [rt]cmd =0x44504543, len=92
25,921,512 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,382,348 ready_for_fw is high
3,382,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,085,426 >>> mbox cmd response: success
18,366,118 UART:
18,366,489 UART: Running Caliptra FMC ...
18,367,632 UART:
18,367,793 UART: [state] CFI Enabled
18,432,648 UART: [fht] FMC Alias Private Key: 7
20,196,817 UART: [art] Extend RT PCRs Done
20,198,050 UART: [art] Lock RT PCRs Done
20,199,954 UART: [art] Populate DV Done
20,205,398 UART: [fht] FMC Alias Private Key: 7
20,206,905 UART: [art] Derive CDI
20,207,673 UART: [art] Store in in slot 0x4
20,265,203 UART: [art] Derive Key Pair
20,266,196 UART: [art] Store priv key in slot 0x5
22,729,302 UART: [art] Derive Key Pair - Done
22,742,088 UART: [art] Signing Cert with AUTHO
22,743,399 UART: RITY.KEYID = 7
24,455,274 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,774 UART: [art] PUB.X = 7A6E5C87C9964F44D809E80BFFE45AE7468351F60ECBF19B2085F7CB9BA4FBD2C24BBA6BF64AF42C2DC5C31B292DD5E0
24,464,078 UART: [art] PUB.Y = A5CECCE3988B737DC93A37745F0A61E1EDC0F2FC46DD088ED2DF5435A7698CEC136572036E73D219D511331D02A5B8E8
24,471,332 UART: [art] SIG.R = 0A7262B6B91640AEE3ABBF82063D8BE17934B3FD2A111D04BF507877EDBD420523CED386EF9478A2C53FA636C9C56095
24,478,730 UART: [art] SIG.S = 267021FC487E9696812905F293DD92B9FA5BE96E0FE916466FB66DC8EF283EB867C0E1ED45FE12368C1368A5768C8AD0
25,457,530 UART: Caliptra RT
25,458,234 UART: [state] CFI Enabled
25,623,948 UART: [rt] RT listening for mailbox commands...
25,625,873 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,656,926 UART: [rt]cmd =0x44504543, len=92
25,663,649 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,368 UART:
192,738 UART: Running Caliptra ROM ...
193,913 UART:
603,549 UART: [state] CFI Enabled
615,950 UART: [state] LifecycleState = Unprovisioned
617,870 UART: [state] DebugLocked = No
619,406 UART: [state] WD Timer not started. Device not locked for debugging
623,227 UART: [kat] SHA2-256
802,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,879 UART: [kat] ++
814,406 UART: [kat] sha1
825,565 UART: [kat] SHA2-256
828,563 UART: [kat] SHA2-384
835,323 UART: [kat] SHA2-512-ACC
838,254 UART: [kat] ECC-384
3,281,132 UART: [kat] HMAC-384Kdf
3,293,807 UART: [kat] LMS
3,823,342 UART: [kat] --
3,825,413 UART: [cold-reset] ++
3,827,975 UART: [fht] FHT @ 0x50003400
3,838,868 UART: [idev] ++
3,839,451 UART: [idev] CDI.KEYID = 6
3,840,363 UART: [idev] SUBJECT.KEYID = 7
3,841,481 UART: [idev] UDS.KEYID = 0
3,842,521 ready_for_fw is high
3,842,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,509 UART: [idev] Erasing UDS.KEYID = 0
6,318,813 UART: [idev] Sha1 KeyId Algorithm
6,342,424 UART: [idev] --
6,346,575 UART: [ldev] ++
6,347,134 UART: [ldev] CDI.KEYID = 6
6,348,036 UART: [ldev] SUBJECT.KEYID = 5
6,349,190 UART: [ldev] AUTHORITY.KEYID = 7
6,350,466 UART: [ldev] FE.KEYID = 1
6,362,076 UART: [ldev] Erasing FE.KEYID = 1
8,838,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,898 UART: [ldev] --
10,628,138 UART: [fwproc] Wait for Commands...
10,631,311 UART: [fwproc] Recv command 0x46574c44
10,633,394 UART: [fwproc] Recv'd Img size: 114448 bytes
14,046,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,117,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,186,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,505,559 >>> mbox cmd response: success
14,509,909 UART: [afmc] ++
14,510,501 UART: [afmc] CDI.KEYID = 6
14,511,377 UART: [afmc] SUBJECT.KEYID = 7
14,512,585 UART: [afmc] AUTHORITY.KEYID = 5
17,016,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,735,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,736,900 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,752,710 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,768,711 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,784,603 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,808,258 UART: [afmc] --
18,812,178 UART: [cold-reset] --
18,815,925 UART: [state] Locking Datavault
18,820,839 UART: [state] Locking PCR0, PCR1 and PCR31
18,822,474 UART: [state] Locking ICCM
18,823,537 UART: [exit] Launching FMC @ 0x40000130
18,831,925 UART:
18,832,159 UART: Running Caliptra FMC ...
18,833,254 UART:
18,833,404 UART: [state] CFI Enabled
18,841,498 UART: [fht] FMC Alias Private Key: 7
20,598,650 UART: [art] Extend RT PCRs Done
20,599,869 UART: [art] Lock RT PCRs Done
20,601,979 UART: [art] Populate DV Done
20,607,328 UART: [fht] FMC Alias Private Key: 7
20,608,845 UART: [art] Derive CDI
20,609,584 UART: [art] Store in in slot 0x4
20,652,466 UART: [art] Derive Key Pair
20,653,461 UART: [art] Store priv key in slot 0x5
23,080,174 UART: [art] Derive Key Pair - Done
23,093,164 UART: [art] Signing Cert with AUTHO
23,094,498 UART: RITY.KEYID = 7
24,799,965 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,468 UART: [art] PUB.X = A02AE2DF2963ECB8FE9C8000D317D175CE060E7DF26F9E6A75E71B599116640F2F651381A77EBDCDFFB3A98DC1C6D759
24,808,735 UART: [art] PUB.Y = A7D9A69BC69B905A5A592C40287DF4E0926B7C0884BD8A2DC4C64FCF507E4C19394843667D8A99FDEC91A7626CCE1A56
24,816,000 UART: [art] SIG.R = 7C91A33C45D2D63E913FFC3F60CC3DD4BA12D94AB7788ACDF05D0EF90490C3B2566AAC460FFD0D9446CD73816C0743A3
24,823,378 UART: [art] SIG.S = F6B4F428166EB23ED97706828456B51763079302CEA4CDD54F0CDDF9BED7DBC494575987080C1E890D0B1717ED1F06D7
25,802,499 UART: Caliptra RT
25,803,221 UART: [state] CFI Enabled
25,920,154 UART: [rt] RT listening for mailbox commands...
25,922,089 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,952,633 UART: [rt]cmd =0x44504543, len=92
25,959,029 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,693,617 ready_for_fw is high
3,694,180 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,305 >>> mbox cmd response: success
18,526,277 UART:
18,526,691 UART: Running Caliptra FMC ...
18,527,845 UART:
18,527,999 UART: [state] CFI Enabled
18,535,993 UART: [fht] FMC Alias Private Key: 7
20,293,186 UART: [art] Extend RT PCRs Done
20,294,409 UART: [art] Lock RT PCRs Done
20,296,140 UART: [art] Populate DV Done
20,301,326 UART: [fht] FMC Alias Private Key: 7
20,302,916 UART: [art] Derive CDI
20,303,726 UART: [art] Store in in slot 0x4
20,346,593 UART: [art] Derive Key Pair
20,347,633 UART: [art] Store priv key in slot 0x5
22,774,357 UART: [art] Derive Key Pair - Done
22,787,024 UART: [art] Signing Cert with AUTHO
22,788,351 UART: RITY.KEYID = 7
24,493,775 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,403 UART: [art] PUB.X = 38309956C09F8FC73BB3F14D861F28EB74A71A294A8FDA162C4C937D602731879C45425CF8F78B0161CE6A1C613BCC21
24,502,523 UART: [art] PUB.Y = 8BC219B8E6B4EE239BC49D085C8EA5D8985CE6140C73EDBE032EC2F017C91AA3D8881911BDC397681FA3BE532413F565
24,509,802 UART: [art] SIG.R = A7FF1B32832ACCAF92F9392E80DC3739549BB4E134E17E38D9DB3B551DE22A1780017EA3D4E1DA101958B30721D717BC
24,517,179 UART: [art] SIG.S = A125496D7FDD2C235A5AD510B472BAD0483984B8DAEA45F9FAEAD89E326796B7EA2C3E3E47F029430B8170039DDD0BA2
25,496,711 UART: Caliptra RT
25,497,423 UART: [state] CFI Enabled
25,614,607 UART: [rt] RT listening for mailbox commands...
25,616,536 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,646,979 UART: [rt]cmd =0x44504543, len=92
25,653,221 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,440,503 ready_for_fw is high
3,440,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,757,134 >>> mbox cmd response: success
19,043,249 UART:
19,043,649 UART: Running Caliptra FMC ...
19,044,758 UART:
19,044,914 UART: [state] CFI Enabled
19,095,078 UART: [fht] FMC Alias Private Key: 7
20,859,255 UART: [art] Extend RT PCRs Done
20,860,485 UART: [art] Lock RT PCRs Done
20,862,221 UART: [art] Populate DV Done
20,867,524 UART: [fht] FMC Alias Private Key: 7
20,869,068 UART: [art] Derive CDI
20,869,889 UART: [art] Store in in slot 0x4
20,928,878 UART: [art] Derive Key Pair
20,929,914 UART: [art] Store priv key in slot 0x5
23,392,440 UART: [art] Derive Key Pair - Done
23,405,388 UART: [art] Signing Cert with AUTHO
23,406,688 UART: RITY.KEYID = 7
25,118,891 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,394 UART: [art] PUB.X = 8BA0A58F544245E1AC7415CDFDA1A0046BC37DE67F1423CBC39E0F892A0DAA00548D909677E23822BF5F201F1BC9F2A9
25,127,643 UART: [art] PUB.Y = C49546E3FC575FC63DDFD8885DF3607B57D96D745D18807D7875540097533A342870523FFBB16BAD1F4D3581A9F8B945
25,134,897 UART: [art] SIG.R = 82535EE2DE6D0DD50C526B0A7BA8E9F973061159F17146D23ABF9427FCFAFC30A1B221F8885FEEC55660239372E0F7A2
25,142,285 UART: [art] SIG.S = E9EEF783F25A1057D485C9DDFB428B446C0FEACB4A6158AC3BC695101104D474CEF184054D0DCB3150E7511329F9EAA5
26,121,141 UART: Caliptra RT
26,121,850 UART: [state] CFI Enabled
26,286,873 UART: [rt] RT listening for mailbox commands...
26,288,810 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,320,132 UART: [rt]cmd =0x44504543, len=92
26,326,895 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,759,212 ready_for_fw is high
3,759,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,974,455 >>> mbox cmd response: success
19,223,531 UART:
19,223,916 UART: Running Caliptra FMC ...
19,225,022 UART:
19,225,169 UART: [state] CFI Enabled
19,233,277 UART: [fht] FMC Alias Private Key: 7
20,989,718 UART: [art] Extend RT PCRs Done
20,990,948 UART: [art] Lock RT PCRs Done
20,992,864 UART: [art] Populate DV Done
20,998,454 UART: [fht] FMC Alias Private Key: 7
21,000,101 UART: [art] Derive CDI
21,000,924 UART: [art] Store in in slot 0x4
21,043,900 UART: [art] Derive Key Pair
21,044,899 UART: [art] Store priv key in slot 0x5
23,471,438 UART: [art] Derive Key Pair - Done
23,484,385 UART: [art] Signing Cert with AUTHO
23,485,702 UART: RITY.KEYID = 7
25,191,113 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,621 UART: [art] PUB.X = 5267388B7C424B9B46DC3E6CF8FF00B076F048020032CD3C6460971E97BF1B391062EC0C342C62CDF6C18C8E187799ED
25,199,857 UART: [art] PUB.Y = A26CE10D2ECCD8F32126B7155CC404E22E58B8A4C08DD2BD1C463EE27F4CBEBE2A3B02712DCD0B5C1B5822C87A5BF0A7
25,207,123 UART: [art] SIG.R = 3DAFFBBFE39D923078BD5270ED17FA4BA57A48DD4D9D9E171901B4E7F4402C982F0FA3D4561B2DC84721E2D8F3DB7C1E
25,214,545 UART: [art] SIG.S = 67D49D6697094B47754191768CCB242BD84299C82AD29D26B448A7897572D37ABE837B6D2BC5C704282F0D5DD49304AF
26,192,949 UART: Caliptra RT
26,193,626 UART: [state] CFI Enabled
26,311,700 UART: [rt] RT listening for mailbox commands...
26,313,629 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,344,163 UART: [rt]cmd =0x44504543, len=92
26,350,835 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,073 UART: [kat] SHA2-256
882,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,119 UART: [kat] ++
886,271 UART: [kat] sha1
890,643 UART: [kat] SHA2-256
892,581 UART: [kat] SHA2-384
895,570 UART: [kat] SHA2-512-ACC
897,471 UART: [kat] ECC-384
903,248 UART: [kat] HMAC-384Kdf
907,742 UART: [kat] LMS
1,475,938 UART: [kat] --
1,476,857 UART: [cold-reset] ++
1,477,307 UART: [fht] Storing FHT @ 0x50003400
1,480,138 UART: [idev] ++
1,480,306 UART: [idev] CDI.KEYID = 6
1,480,666 UART: [idev] SUBJECT.KEYID = 7
1,481,090 UART: [idev] UDS.KEYID = 0
1,481,435 ready_for_fw is high
1,481,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,380 UART: [idev] Erasing UDS.KEYID = 0
1,506,304 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,934 UART: [idev] --
1,515,983 UART: [ldev] ++
1,516,151 UART: [ldev] CDI.KEYID = 6
1,516,514 UART: [ldev] SUBJECT.KEYID = 5
1,516,940 UART: [ldev] AUTHORITY.KEYID = 7
1,517,403 UART: [ldev] FE.KEYID = 1
1,522,531 UART: [ldev] Erasing FE.KEYID = 1
1,547,550 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,768 UART: [ldev] --
1,587,217 UART: [fwproc] Waiting for Commands...
1,587,874 UART: [fwproc] Received command 0x46574c44
1,588,665 UART: [fwproc] Received Image of size 114448 bytes
2,887,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,264 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,616 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,555 >>> mbox cmd response: success
3,080,637 UART: [afmc] ++
3,080,805 UART: [afmc] CDI.KEYID = 6
3,081,167 UART: [afmc] SUBJECT.KEYID = 7
3,081,592 UART: [afmc] AUTHORITY.KEYID = 5
3,116,695 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,161 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,941 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,669 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,554 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,244 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,057 UART: [afmc] --
3,160,157 UART: [cold-reset] --
3,161,139 UART: [state] Locking Datavault
3,162,222 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,826 UART: [state] Locking ICCM
3,163,412 UART: [exit] Launching FMC @ 0x40000130
3,168,741 UART:
3,168,757 UART: Running Caliptra FMC ...
3,169,165 UART:
3,169,219 UART: [state] CFI Enabled
3,179,504 UART: [fht] FMC Alias Private Key: 7
3,287,333 UART: [art] Extend RT PCRs Done
3,287,761 UART: [art] Lock RT PCRs Done
3,289,447 UART: [art] Populate DV Done
3,297,720 UART: [fht] FMC Alias Private Key: 7
3,298,712 UART: [art] Derive CDI
3,298,992 UART: [art] Store in in slot 0x4
3,383,949 UART: [art] Derive Key Pair
3,384,309 UART: [art] Store priv key in slot 0x5
3,397,757 UART: [art] Derive Key Pair - Done
3,412,866 UART: [art] Signing Cert with AUTHO
3,413,346 UART: RITY.KEYID = 7
3,428,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,325 UART: [art] PUB.X = CBD4D0125C68C62CE6FB247ACB25840F17A4FC029EDA99B2D1A632C15DA40F5CD938133C0C864F7F0F181D2EB7120A47
3,436,091 UART: [art] PUB.Y = C092B06C584B163EB9A72DCD3CB633BA29C2F44F92765447FAEE1783DE7C87DE58A9A5F61993DF5827740DCC3208F9BC
3,443,047 UART: [art] SIG.R = 62D3FEAD38266597F3AD5828879B7A3FE7E5F736600372100D482AE892D59EA10493E8CD639763C0DA4A898A63A6474F
3,449,806 UART: [art] SIG.S = 2DECC93094FB1C5365DF9C4305AD58452CC7EEC13BAF2367C65B2E44CD200530E4DD009FD500D269330DA8BDE245AECD
3,473,514 UART: Caliptra RT
3,473,767 UART: [state] CFI Enabled
3,581,667 UART: [rt] RT listening for mailbox commands...
3,582,337 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,843 UART: [rt]cmd =0x44504543, len=92
3,619,940 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,575 ready_for_fw is high
1,362,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,761 >>> mbox cmd response: success
2,990,295 UART:
2,990,311 UART: Running Caliptra FMC ...
2,990,719 UART:
2,990,773 UART: [state] CFI Enabled
3,001,320 UART: [fht] FMC Alias Private Key: 7
3,108,567 UART: [art] Extend RT PCRs Done
3,108,995 UART: [art] Lock RT PCRs Done
3,110,611 UART: [art] Populate DV Done
3,118,656 UART: [fht] FMC Alias Private Key: 7
3,119,694 UART: [art] Derive CDI
3,119,974 UART: [art] Store in in slot 0x4
3,205,613 UART: [art] Derive Key Pair
3,205,973 UART: [art] Store priv key in slot 0x5
3,219,907 UART: [art] Derive Key Pair - Done
3,235,102 UART: [art] Signing Cert with AUTHO
3,235,582 UART: RITY.KEYID = 7
3,251,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,875 UART: [art] PUB.X = 94114DC6ACA9AF636294FAE1C68512A6F98E9837AD4DF00514714FF1C63208D2F61EEF49E2AC10E45F542D315A9A802E
3,258,647 UART: [art] PUB.Y = 200F62ED5D40516F407DB60E14542CAA1DD01FC09679838FF7C9AF9D9DDBD919780AF9DEA5427835EB7F6E92FC5E535F
3,265,602 UART: [art] SIG.R = 47936DF40FC204B67A0DAE7DC0341CFD1662E33E4A3BD2379E45185FE4998C131A78ACB4C908E22546AC2BB03ED0F391
3,272,370 UART: [art] SIG.S = E3B2ECCF674310ABB216B8AF17D591AE7D0812E0C7D0CC7C66B804C336EC0142341280B75379E26D8571365180D873FE
3,295,118 UART: Caliptra RT
3,295,371 UART: [state] CFI Enabled
3,403,434 UART: [rt] RT listening for mailbox commands...
3,404,104 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,512 UART: [rt]cmd =0x44504543, len=92
3,441,939 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,486 UART: [kat] SHA2-256
882,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,532 UART: [kat] ++
886,684 UART: [kat] sha1
891,010 UART: [kat] SHA2-256
892,948 UART: [kat] SHA2-384
895,679 UART: [kat] SHA2-512-ACC
897,580 UART: [kat] ECC-384
903,151 UART: [kat] HMAC-384Kdf
907,879 UART: [kat] LMS
1,476,075 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,210 UART: [fht] Storing FHT @ 0x50003400
1,479,935 UART: [idev] ++
1,480,103 UART: [idev] CDI.KEYID = 6
1,480,463 UART: [idev] SUBJECT.KEYID = 7
1,480,887 UART: [idev] UDS.KEYID = 0
1,481,232 ready_for_fw is high
1,481,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,583 UART: [idev] Erasing UDS.KEYID = 0
1,505,487 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,167 UART: [idev] --
1,515,234 UART: [ldev] ++
1,515,402 UART: [ldev] CDI.KEYID = 6
1,515,765 UART: [ldev] SUBJECT.KEYID = 5
1,516,191 UART: [ldev] AUTHORITY.KEYID = 7
1,516,654 UART: [ldev] FE.KEYID = 1
1,522,070 UART: [ldev] Erasing FE.KEYID = 1
1,547,457 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,937 UART: [ldev] --
1,587,416 UART: [fwproc] Waiting for Commands...
1,588,231 UART: [fwproc] Received command 0x46574c44
1,589,022 UART: [fwproc] Received Image of size 114448 bytes
2,889,229 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,923 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,275 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,314 >>> mbox cmd response: success
3,083,364 UART: [afmc] ++
3,083,532 UART: [afmc] CDI.KEYID = 6
3,083,894 UART: [afmc] SUBJECT.KEYID = 7
3,084,319 UART: [afmc] AUTHORITY.KEYID = 5
3,119,106 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,566 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,346 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,074 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,959 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,649 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,392 UART: [afmc] --
3,162,386 UART: [cold-reset] --
3,162,938 UART: [state] Locking Datavault
3,164,243 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,847 UART: [state] Locking ICCM
3,165,459 UART: [exit] Launching FMC @ 0x40000130
3,170,788 UART:
3,170,804 UART: Running Caliptra FMC ...
3,171,212 UART:
3,171,355 UART: [state] CFI Enabled
3,182,146 UART: [fht] FMC Alias Private Key: 7
3,290,171 UART: [art] Extend RT PCRs Done
3,290,599 UART: [art] Lock RT PCRs Done
3,292,129 UART: [art] Populate DV Done
3,300,526 UART: [fht] FMC Alias Private Key: 7
3,301,698 UART: [art] Derive CDI
3,301,978 UART: [art] Store in in slot 0x4
3,387,867 UART: [art] Derive Key Pair
3,388,227 UART: [art] Store priv key in slot 0x5
3,401,147 UART: [art] Derive Key Pair - Done
3,415,807 UART: [art] Signing Cert with AUTHO
3,416,287 UART: RITY.KEYID = 7
3,431,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,238 UART: [art] PUB.X = AB69D7D9DC4B9C08AF0CABB9016198650CDBD7E639EA8A9B8243DD375B7AA1B1F65AA20278EBB286488F6DAF3B628D6C
3,439,015 UART: [art] PUB.Y = 0CCEF5CD57C5B548C80D1EB0C6B1D3D5A791A30B0DE7BCE6737FB0C3B7668584516D21259D059D1A5102CC3FF484437A
3,445,959 UART: [art] SIG.R = 2A3E5FD1F4A5077581AF395056615A850AFB5189B72A5256AE8ED5613056D1DE672DB7588D30AE2950915261C87E2981
3,452,717 UART: [art] SIG.S = BCE74870EC7184A231E01ADC936E26C929873226C295E483B9B7AF94140E6D26745AA7C53EA7FD8BD44DD5AF71486DED
3,476,693 UART: Caliptra RT
3,477,038 UART: [state] CFI Enabled
3,585,217 UART: [rt] RT listening for mailbox commands...
3,585,887 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,215 UART: [rt]cmd =0x44504543, len=92
3,623,446 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,168 ready_for_fw is high
1,362,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,830 >>> mbox cmd response: success
2,991,386 UART:
2,991,402 UART: Running Caliptra FMC ...
2,991,810 UART:
2,991,953 UART: [state] CFI Enabled
3,002,774 UART: [fht] FMC Alias Private Key: 7
3,110,835 UART: [art] Extend RT PCRs Done
3,111,263 UART: [art] Lock RT PCRs Done
3,113,053 UART: [art] Populate DV Done
3,121,356 UART: [fht] FMC Alias Private Key: 7
3,122,322 UART: [art] Derive CDI
3,122,602 UART: [art] Store in in slot 0x4
3,208,343 UART: [art] Derive Key Pair
3,208,703 UART: [art] Store priv key in slot 0x5
3,221,841 UART: [art] Derive Key Pair - Done
3,236,247 UART: [art] Signing Cert with AUTHO
3,236,727 UART: RITY.KEYID = 7
3,251,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,150 UART: [art] PUB.X = 83A4AA384B915843AE88B91CC0F0110319F39AF7273A62A3940EB9EECEF86DE3C850AD066DD59B36EEE4CF32B81EEA04
3,258,924 UART: [art] PUB.Y = C1298DDE486638FDC8E9C44C25412CD49D1206ED1AC7B0C07525F65DBFE50E1A3026E6851520BD960C1B22A0B7672D8C
3,265,873 UART: [art] SIG.R = 9E1D33CB05DDD1008C45AA6B3C1D8E56350CDA823CD1118945E04B8A17B7C0C6192B4D9D556DBB6D28565049F3A03C5C
3,272,625 UART: [art] SIG.S = 934E22FA538BF79C765A48493093152CF99CEE5948850B42A1E96A5996B767462CD189B5D28C02ED68F03A2B232AEDB4
3,296,320 UART: Caliptra RT
3,296,665 UART: [state] CFI Enabled
3,404,987 UART: [rt] RT listening for mailbox commands...
3,405,657 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,857 UART: [rt]cmd =0x44504543, len=92
3,443,112 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,669 UART: [kat] SHA2-256
903,609 UART: [kat] SHA2-384
906,360 UART: [kat] SHA2-512-ACC
908,261 UART: [kat] ECC-384
917,670 UART: [kat] HMAC-384Kdf
922,340 UART: [kat] LMS
1,170,668 UART: [kat] --
1,171,523 UART: [cold-reset] ++
1,171,955 UART: [fht] FHT @ 0x50003400
1,174,566 UART: [idev] ++
1,174,734 UART: [idev] CDI.KEYID = 6
1,175,094 UART: [idev] SUBJECT.KEYID = 7
1,175,518 UART: [idev] UDS.KEYID = 0
1,175,863 ready_for_fw is high
1,175,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,292 UART: [idev] Erasing UDS.KEYID = 0
1,200,195 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,258 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,216,255 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,450 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,886 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,399 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,703 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,638 >>> mbox cmd response: success
2,775,896 UART: [afmc] ++
2,776,064 UART: [afmc] CDI.KEYID = 6
2,776,426 UART: [afmc] SUBJECT.KEYID = 7
2,776,851 UART: [afmc] AUTHORITY.KEYID = 5
2,811,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,763 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,367 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,089 UART: [afmc] --
2,855,117 UART: [cold-reset] --
2,855,857 UART: [state] Locking Datavault
2,857,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,726 UART: [state] Locking ICCM
2,858,246 UART: [exit] Launching FMC @ 0x40000130
2,863,575 UART:
2,863,591 UART: Running Caliptra FMC ...
2,863,999 UART:
2,864,053 UART: [state] CFI Enabled
2,874,684 UART: [fht] FMC Alias Private Key: 7
2,982,573 UART: [art] Extend RT PCRs Done
2,983,001 UART: [art] Lock RT PCRs Done
2,984,595 UART: [art] Populate DV Done
2,992,968 UART: [fht] FMC Alias Private Key: 7
2,994,120 UART: [art] Derive CDI
2,994,400 UART: [art] Store in in slot 0x4
3,079,839 UART: [art] Derive Key Pair
3,080,199 UART: [art] Store priv key in slot 0x5
3,093,563 UART: [art] Derive Key Pair - Done
3,107,942 UART: [art] Signing Cert with AUTHO
3,108,422 UART: RITY.KEYID = 7
3,123,644 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,409 UART: [art] PUB.X = 181E401DBD6BC51191B00847AB8860BA752C9D61F27A8FB985D175D332A5841DD1D4CF26B1A9960BAACA7120F8A1B3F9
3,131,183 UART: [art] PUB.Y = 7BADE279125B741B6D82D67F80F5A8491650128A1C910F669EF8E052B09E86ADBCD0FD6772E4E14D5811D1A05DE3D1B1
3,138,138 UART: [art] SIG.R = 7C9499F928A51184CAB94942D221A05BAC99B321470DBBC4C9ACDDC6A152888607222A5D844ADEC8D2B3032BCB54F84B
3,144,909 UART: [art] SIG.S = F7A6E4AECF24171F02725C51730A358838F4F725240FA0D381171617D62E22A6F9E889945F370F038467D886769700C3
3,168,027 UART: Caliptra RT
3,168,280 UART: [state] CFI Enabled
3,275,151 UART: [rt] RT listening for mailbox commands...
3,275,821 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,451 UART: [rt]cmd =0x44504543, len=92
3,313,630 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,177 ready_for_fw is high
1,059,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,287 >>> mbox cmd response: success
2,688,499 UART:
2,688,515 UART: Running Caliptra FMC ...
2,688,923 UART:
2,688,977 UART: [state] CFI Enabled
2,699,726 UART: [fht] FMC Alias Private Key: 7
2,808,001 UART: [art] Extend RT PCRs Done
2,808,429 UART: [art] Lock RT PCRs Done
2,809,863 UART: [art] Populate DV Done
2,818,322 UART: [fht] FMC Alias Private Key: 7
2,819,348 UART: [art] Derive CDI
2,819,628 UART: [art] Store in in slot 0x4
2,905,411 UART: [art] Derive Key Pair
2,905,771 UART: [art] Store priv key in slot 0x5
2,918,395 UART: [art] Derive Key Pair - Done
2,933,521 UART: [art] Signing Cert with AUTHO
2,934,001 UART: RITY.KEYID = 7
2,948,705 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,470 UART: [art] PUB.X = F7D79959B56AA26E4478E5DB8266DD8A01B9994BA3BA2AC646DC8713A7CF21BA17943C33F5A9D336B1FD82FF398916CA
2,956,249 UART: [art] PUB.Y = 5FBCD253F9432F0A65DB597309DF9CFB40624D53226F0CD46CF663C4C24E8828DC589E5E4EAF7D89EFBDA4A5AA92C326
2,963,208 UART: [art] SIG.R = 280A2E2F99773C2F9FE803B175CF27745CC358CF88272D72010E10BE49103102A44DFDB55F43B427AAF3D3411022676A
2,969,961 UART: [art] SIG.S = 5629838215EE770EC928DD81EE9EAD96AA8BEF1A6D2E6397322FEB23E405D67DA34F06A37A77CEFE457A5A39233B17C0
2,993,683 UART: Caliptra RT
2,993,936 UART: [state] CFI Enabled
3,101,707 UART: [rt] RT listening for mailbox commands...
3,102,377 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,899 UART: [rt]cmd =0x44504543, len=92
3,140,068 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
893,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,538 UART: [kat] ++
897,690 UART: [kat] sha1
901,866 UART: [kat] SHA2-256
903,806 UART: [kat] SHA2-384
906,593 UART: [kat] SHA2-512-ACC
908,494 UART: [kat] ECC-384
918,061 UART: [kat] HMAC-384Kdf
922,753 UART: [kat] LMS
1,171,081 UART: [kat] --
1,172,362 UART: [cold-reset] ++
1,172,868 UART: [fht] FHT @ 0x50003400
1,175,441 UART: [idev] ++
1,175,609 UART: [idev] CDI.KEYID = 6
1,175,969 UART: [idev] SUBJECT.KEYID = 7
1,176,393 UART: [idev] UDS.KEYID = 0
1,176,738 ready_for_fw is high
1,176,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,581 UART: [idev] Erasing UDS.KEYID = 0
1,201,410 UART: [idev] Sha1 KeyId Algorithm
1,209,924 UART: [idev] --
1,211,034 UART: [ldev] ++
1,211,202 UART: [ldev] CDI.KEYID = 6
1,211,565 UART: [ldev] SUBJECT.KEYID = 5
1,211,991 UART: [ldev] AUTHORITY.KEYID = 7
1,212,454 UART: [ldev] FE.KEYID = 1
1,217,724 UART: [ldev] Erasing FE.KEYID = 1
1,244,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,562 UART: [ldev] --
1,284,011 UART: [fwproc] Wait for Commands...
1,284,633 UART: [fwproc] Recv command 0x46574c44
1,285,361 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,167 >>> mbox cmd response: success
2,779,397 UART: [afmc] ++
2,779,565 UART: [afmc] CDI.KEYID = 6
2,779,927 UART: [afmc] SUBJECT.KEYID = 7
2,780,352 UART: [afmc] AUTHORITY.KEYID = 5
2,816,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,492 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,220 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,105 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,824 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,580 UART: [afmc] --
2,859,552 UART: [cold-reset] --
2,860,528 UART: [state] Locking Datavault
2,861,763 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,367 UART: [state] Locking ICCM
2,862,991 UART: [exit] Launching FMC @ 0x40000130
2,868,320 UART:
2,868,336 UART: Running Caliptra FMC ...
2,868,744 UART:
2,868,887 UART: [state] CFI Enabled
2,879,346 UART: [fht] FMC Alias Private Key: 7
2,987,833 UART: [art] Extend RT PCRs Done
2,988,261 UART: [art] Lock RT PCRs Done
2,989,715 UART: [art] Populate DV Done
2,997,858 UART: [fht] FMC Alias Private Key: 7
2,998,958 UART: [art] Derive CDI
2,999,238 UART: [art] Store in in slot 0x4
3,084,719 UART: [art] Derive Key Pair
3,085,079 UART: [art] Store priv key in slot 0x5
3,097,697 UART: [art] Derive Key Pair - Done
3,112,728 UART: [art] Signing Cert with AUTHO
3,113,208 UART: RITY.KEYID = 7
3,128,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,173 UART: [art] PUB.X = 446208A4C45E1D76E245AB6300C8F324674C40BA24B62064BAD0A4255432FCBD485B23257261569891402EF04E838636
3,135,906 UART: [art] PUB.Y = C385DDB77BA6C2A8DA36E6C03E0AF0DB39EAEFA88F1F05A6588BB46C459206DD6AE25ABEBA59B965C5309051DA477ED1
3,142,871 UART: [art] SIG.R = A9FF0BE63F6906F2D2ADDB53F4A4DC325344067F3B937DFAF3636B3D976FDB6FE86363DCD73495A285101AED5DB1ADCD
3,149,654 UART: [art] SIG.S = 8461F16890B18A237ADBECC20D65FC418FBE8540C8BCC48AA0039110DEB5F42A4E8C0D0466CB55100CBA46C606B0C95B
3,173,553 UART: Caliptra RT
3,173,898 UART: [state] CFI Enabled
3,281,804 UART: [rt] RT listening for mailbox commands...
3,282,474 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,660 UART: [rt]cmd =0x44504543, len=92
3,319,873 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,342 ready_for_fw is high
1,060,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,268 >>> mbox cmd response: success
2,691,638 UART:
2,691,654 UART: Running Caliptra FMC ...
2,692,062 UART:
2,692,205 UART: [state] CFI Enabled
2,702,880 UART: [fht] FMC Alias Private Key: 7
2,811,161 UART: [art] Extend RT PCRs Done
2,811,589 UART: [art] Lock RT PCRs Done
2,813,251 UART: [art] Populate DV Done
2,821,378 UART: [fht] FMC Alias Private Key: 7
2,822,316 UART: [art] Derive CDI
2,822,596 UART: [art] Store in in slot 0x4
2,908,663 UART: [art] Derive Key Pair
2,909,023 UART: [art] Store priv key in slot 0x5
2,922,631 UART: [art] Derive Key Pair - Done
2,937,192 UART: [art] Signing Cert with AUTHO
2,937,672 UART: RITY.KEYID = 7
2,952,768 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,533 UART: [art] PUB.X = D98710DA25C2D94B75A5101691653BBD29C7C51B6AF40D2E0F9C8BDE727122DDF50186DDE91A003C94AAEE49D9371504
2,960,277 UART: [art] PUB.Y = 77AF8336522028A123657679993336D3570E489D9CE64F4A11A04F0D67A1490D0262773CE0777986E2BB250B22201B09
2,967,191 UART: [art] SIG.R = C2F70AF4BB6175EE406D46B7F3C5C09C4C14B128C4104CE51D6943E4FDA3EBE7704E02C06EA04E17AD7B87891FC0F881
2,973,969 UART: [art] SIG.S = 1E87350E95A803C81521ADB452CF8B1449BC94D646A09EDAAFF22115ECDEB795CA08071EFC1799049129B852133269D4
2,997,733 UART: Caliptra RT
2,998,078 UART: [state] CFI Enabled
3,105,139 UART: [rt] RT listening for mailbox commands...
3,105,809 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,295 UART: [rt]cmd =0x44504543, len=92
3,143,386 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,536 UART: [state] LifecycleState = Unprovisioned
86,191 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
891,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,719 UART: [kat] ++
895,871 UART: [kat] sha1
900,047 UART: [kat] SHA2-256
901,987 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,899 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,195 UART: [idev] ++
1,173,363 UART: [idev] CDI.KEYID = 6
1,173,724 UART: [idev] SUBJECT.KEYID = 7
1,174,149 UART: [idev] UDS.KEYID = 0
1,174,495 ready_for_fw is high
1,174,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,877 UART: [idev] Erasing UDS.KEYID = 0
1,198,983 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] --
1,208,938 UART: [ldev] ++
1,209,106 UART: [ldev] CDI.KEYID = 6
1,209,470 UART: [ldev] SUBJECT.KEYID = 5
1,209,897 UART: [ldev] AUTHORITY.KEYID = 7
1,210,360 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,708 UART: [ldev] --
1,280,212 UART: [fwproc] Wait for Commands...
1,280,979 UART: [fwproc] Recv command 0x46574c44
1,281,712 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,687 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,996 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,918 >>> mbox cmd response: success
2,774,961 UART: [afmc] ++
2,775,129 UART: [afmc] CDI.KEYID = 6
2,775,492 UART: [afmc] SUBJECT.KEYID = 7
2,775,918 UART: [afmc] AUTHORITY.KEYID = 5
2,811,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,466 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,078 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,626 UART: [afmc] --
2,854,616 UART: [cold-reset] --
2,855,532 UART: [state] Locking Datavault
2,856,713 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,317 UART: [state] Locking ICCM
2,857,833 UART: [exit] Launching FMC @ 0x40000130
2,863,162 UART:
2,863,178 UART: Running Caliptra FMC ...
2,863,586 UART:
2,863,640 UART: [state] CFI Enabled
2,873,705 UART: [fht] FMC Alias Private Key: 7
2,982,024 UART: [art] Extend RT PCRs Done
2,982,452 UART: [art] Lock RT PCRs Done
2,984,154 UART: [art] Populate DV Done
2,992,399 UART: [fht] FMC Alias Private Key: 7
2,993,409 UART: [art] Derive CDI
2,993,689 UART: [art] Store in in slot 0x4
3,079,292 UART: [art] Derive Key Pair
3,079,652 UART: [art] Store priv key in slot 0x5
3,092,842 UART: [art] Derive Key Pair - Done
3,107,290 UART: [art] Signing Cert with AUTHO
3,107,770 UART: RITY.KEYID = 7
3,122,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,389 UART: [art] PUB.X = 30588FA098108C5BFB5A08CA3355C5AFEA3F6D2B6C7688698D006FA3E6F7207D46D49936CB68679AF138F4DD77C90959
3,130,135 UART: [art] PUB.Y = 4892D6BBDB88BA6A3562A5D6F43CF69CB09726BF8962D139C403478A757E3E5CBC590CB67601E07D2B7ABB089426CDCA
3,137,085 UART: [art] SIG.R = 22A8F198BD7178F167CFBE6AE8571EE58193118AB9E4D6699D4C6539B9FC10FACFF845D17CA7EA6C62AA3B415E37D02C
3,143,871 UART: [art] SIG.S = 12C5A1A99DEB63BE862EAFD48F690FE8B6799ACCA1BEF676712DCBD491083B7FBDF04B2380BB3339E312248D7DC13FA2
3,167,316 UART: Caliptra RT
3,167,569 UART: [state] CFI Enabled
3,274,608 UART: [rt] RT listening for mailbox commands...
3,275,278 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,646 UART: [rt]cmd =0x44504543, len=92
3,312,925 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,016 ready_for_fw is high
1,056,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,740 >>> mbox cmd response: success
2,687,246 UART:
2,687,262 UART: Running Caliptra FMC ...
2,687,670 UART:
2,687,724 UART: [state] CFI Enabled
2,698,371 UART: [fht] FMC Alias Private Key: 7
2,806,740 UART: [art] Extend RT PCRs Done
2,807,168 UART: [art] Lock RT PCRs Done
2,808,792 UART: [art] Populate DV Done
2,816,869 UART: [fht] FMC Alias Private Key: 7
2,817,895 UART: [art] Derive CDI
2,818,175 UART: [art] Store in in slot 0x4
2,904,082 UART: [art] Derive Key Pair
2,904,442 UART: [art] Store priv key in slot 0x5
2,917,456 UART: [art] Derive Key Pair - Done
2,932,147 UART: [art] Signing Cert with AUTHO
2,932,627 UART: RITY.KEYID = 7
2,948,659 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,424 UART: [art] PUB.X = 5215FA2EA2F0436F4719434F590E599DDEE884D31DD07ED4E17A1CD3969FEBB09FA1F9A0679963CCE16A9DCD0A4BCDF0
2,956,208 UART: [art] PUB.Y = AAE9DEEE7982CBA5D3E254D21496BB757D98267BB47E42F9B94FD81DD03A9AC3CBDD6014692C835C152C841B500D48A4
2,963,169 UART: [art] SIG.R = B0B1BC30EEE054DA259A1028F1C3F63AA3CD1F8D74BE707EAD508767E8309F3DBD8F182236E8AB76B5B925474499F570
2,969,949 UART: [art] SIG.S = 8C1CB910C99156E91C90233420B71768A7F9703F45F632B4361C8BC49FB47702DA557D201492CDD9797AF75AD8CCAD22
2,993,985 UART: Caliptra RT
2,994,238 UART: [state] CFI Enabled
3,102,352 UART: [rt] RT listening for mailbox commands...
3,103,022 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,500 UART: [rt]cmd =0x44504543, len=92
3,141,005 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,228 UART: [kat] SHA2-256
902,168 UART: [kat] SHA2-384
905,061 UART: [kat] SHA2-512-ACC
906,962 UART: [kat] ECC-384
916,571 UART: [kat] HMAC-384Kdf
921,295 UART: [kat] LMS
1,169,607 UART: [kat] --
1,170,644 UART: [cold-reset] ++
1,171,162 UART: [fht] FHT @ 0x50003400
1,173,720 UART: [idev] ++
1,173,888 UART: [idev] CDI.KEYID = 6
1,174,249 UART: [idev] SUBJECT.KEYID = 7
1,174,674 UART: [idev] UDS.KEYID = 0
1,175,020 ready_for_fw is high
1,175,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,744 UART: [idev] Erasing UDS.KEYID = 0
1,200,508 UART: [idev] Sha1 KeyId Algorithm
1,209,402 UART: [idev] --
1,210,343 UART: [ldev] ++
1,210,511 UART: [ldev] CDI.KEYID = 6
1,210,875 UART: [ldev] SUBJECT.KEYID = 5
1,211,302 UART: [ldev] AUTHORITY.KEYID = 7
1,211,765 UART: [ldev] FE.KEYID = 1
1,217,181 UART: [ldev] Erasing FE.KEYID = 1
1,243,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,149 UART: [ldev] --
1,282,519 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x46574c44
1,283,987 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,289 >>> mbox cmd response: success
2,777,548 UART: [afmc] ++
2,777,716 UART: [afmc] CDI.KEYID = 6
2,778,079 UART: [afmc] SUBJECT.KEYID = 7
2,778,505 UART: [afmc] AUTHORITY.KEYID = 5
2,814,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,449 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,061 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,473 UART: [afmc] --
2,857,565 UART: [cold-reset] --
2,858,451 UART: [state] Locking Datavault
2,859,312 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,916 UART: [state] Locking ICCM
2,860,368 UART: [exit] Launching FMC @ 0x40000130
2,865,697 UART:
2,865,713 UART: Running Caliptra FMC ...
2,866,121 UART:
2,866,264 UART: [state] CFI Enabled
2,876,945 UART: [fht] FMC Alias Private Key: 7
2,984,838 UART: [art] Extend RT PCRs Done
2,985,266 UART: [art] Lock RT PCRs Done
2,986,656 UART: [art] Populate DV Done
2,994,981 UART: [fht] FMC Alias Private Key: 7
2,996,031 UART: [art] Derive CDI
2,996,311 UART: [art] Store in in slot 0x4
3,082,142 UART: [art] Derive Key Pair
3,082,502 UART: [art] Store priv key in slot 0x5
3,095,924 UART: [art] Derive Key Pair - Done
3,110,821 UART: [art] Signing Cert with AUTHO
3,111,301 UART: RITY.KEYID = 7
3,126,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,016 UART: [art] PUB.X = 6EB84991DF95E1370124A4AF7324B45FCAA96C8D1553F5215458061DB01AA7FAB55C9308395E948926D45DF0CC84CD73
3,133,779 UART: [art] PUB.Y = 4CFCEE3C0F5178B73F622A55D0CE9CD186B7FAC9A09E7DDC83A5A925CAD2976DBC7AA35742655571BBA6D0461C52A315
3,140,744 UART: [art] SIG.R = 8244E011FC7CF853ACE4D9735E7000278A9368808F9F3697DCF826F1AAE01699EFBAD65050F446FA85920460361C6AEA
3,147,491 UART: [art] SIG.S = 1E46F265327661985E7AA0DD5005D5C9095056D53005D080455068D0246E074C9F20FB8C8FA0A095EC10779458109756
3,171,636 UART: Caliptra RT
3,171,981 UART: [state] CFI Enabled
3,279,310 UART: [rt] RT listening for mailbox commands...
3,279,980 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,618 UART: [rt]cmd =0x44504543, len=92
3,317,893 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,437 ready_for_fw is high
1,056,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,691 >>> mbox cmd response: success
2,687,607 UART:
2,687,623 UART: Running Caliptra FMC ...
2,688,031 UART:
2,688,174 UART: [state] CFI Enabled
2,698,707 UART: [fht] FMC Alias Private Key: 7
2,806,336 UART: [art] Extend RT PCRs Done
2,806,764 UART: [art] Lock RT PCRs Done
2,808,320 UART: [art] Populate DV Done
2,816,313 UART: [fht] FMC Alias Private Key: 7
2,817,415 UART: [art] Derive CDI
2,817,695 UART: [art] Store in in slot 0x4
2,903,238 UART: [art] Derive Key Pair
2,903,598 UART: [art] Store priv key in slot 0x5
2,916,836 UART: [art] Derive Key Pair - Done
2,931,765 UART: [art] Signing Cert with AUTHO
2,932,245 UART: RITY.KEYID = 7
2,947,741 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,506 UART: [art] PUB.X = 7CAEF5471466C51406396E41CB7CB6B02C3537A7F74FBD26AF22F63531127DD936D125D2675505C47C255E42FDF00387
2,955,265 UART: [art] PUB.Y = 8040376A805E8369143402855F22B18D3288FE0DE0C796F3E8D901CCE4EF7D21AD3AC71ED33AC802BE35B6D9E354483A
2,962,207 UART: [art] SIG.R = 4D3BC2C13C9E2593E16E59FCB434A54EE324C553B146D8175EBDCE2D203A13985CF73AEA013B8DBBC9C1EFB16D26A251
2,968,992 UART: [art] SIG.S = DCF6317A24314D1D4F2349E0D43BEA82C77E823C0FD5C164590AA3E78F3A7982D8C838DB1A4A8D7FA4CBAF1BD58F5197
2,992,857 UART: Caliptra RT
2,993,202 UART: [state] CFI Enabled
3,101,073 UART: [rt] RT listening for mailbox commands...
3,101,743 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,411 UART: [rt]cmd =0x44504543, len=92
3,139,492 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,104 UART:
192,478 UART: Running Caliptra ROM ...
193,591 UART:
193,735 UART: [state] CFI Enabled
260,777 UART: [state] LifecycleState = Unprovisioned
262,755 UART: [state] DebugLocked = No
265,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,647 UART: [kat] SHA2-256
440,332 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,861 UART: [kat] ++
451,306 UART: [kat] sha1
462,107 UART: [kat] SHA2-256
464,765 UART: [kat] SHA2-384
470,428 UART: [kat] SHA2-512-ACC
472,834 UART: [kat] ECC-384
2,767,086 UART: [kat] HMAC-384Kdf
2,789,843 UART: [kat] LMS
3,980,204 UART: [kat] --
3,985,902 UART: [cold-reset] ++
3,988,405 UART: [fht] Storing FHT @ 0x50003400
3,998,922 UART: [idev] ++
3,999,492 UART: [idev] CDI.KEYID = 6
4,000,416 UART: [idev] SUBJECT.KEYID = 7
4,001,681 UART: [idev] UDS.KEYID = 0
4,002,731 ready_for_fw is high
4,002,938 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,146,320 UART: [idev] Erasing UDS.KEYID = 0
7,334,115 UART: [idev] Using Sha1 for KeyId Algorithm
7,355,041 UART: [idev] --
7,360,412 UART: [ldev] ++
7,361,000 UART: [ldev] CDI.KEYID = 6
7,362,022 UART: [ldev] SUBJECT.KEYID = 5
7,363,190 UART: [ldev] AUTHORITY.KEYID = 7
7,364,426 UART: [ldev] FE.KEYID = 1
7,390,632 UART: [ldev] Erasing FE.KEYID = 1
10,722,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,015,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,030,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,045,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,059,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,079,265 UART: [ldev] --
13,083,130 UART: [fwproc] Waiting for Commands...
13,086,474 UART: [fwproc] Received command 0x46574c44
13,088,655 UART: [fwproc] Received Image of size 114124 bytes
17,143,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,215,496 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,284,406 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,601,612 >>> mbox cmd response: success
17,605,939 UART: [afmc] ++
17,606,541 UART: [afmc] CDI.KEYID = 6
17,607,459 UART: [afmc] SUBJECT.KEYID = 7
17,608,678 UART: [afmc] AUTHORITY.KEYID = 5
20,971,011 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,275,871 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,278,177 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,292,555 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,307,394 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,321,846 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,343,359 UART: [afmc] --
23,346,956 UART: [cold-reset] --
23,351,742 UART: [state] Locking Datavault
23,357,788 UART: [state] Locking PCR0, PCR1 and PCR31
23,359,562 UART: [state] Locking ICCM
23,362,259 UART: [exit] Launching FMC @ 0x40000130
23,370,655 UART:
23,370,893 UART: Running Caliptra FMC ...
23,371,997 UART:
23,372,160 UART: [state] CFI Enabled
23,435,501 UART: [fht] FMC Alias Private Key: 7
25,774,366 UART: [art] Extend RT PCRs Done
25,775,585 UART: [art] Lock RT PCRs Done
25,777,363 UART: [art] Populate DV Done
25,782,883 UART: [fht] FMC Alias Private Key: 7
25,784,470 UART: [art] Derive CDI
25,785,206 UART: [art] Store in in slot 0x4
25,844,679 UART: [art] Derive Key Pair
25,845,718 UART: [art] Store priv key in slot 0x5
29,139,428 UART: [art] Derive Key Pair - Done
29,152,796 UART: [art] Signing Cert with AUTHO
29,154,102 UART: RITY.KEYID = 7
31,440,982 UART: [art] Erasing AUTHORITY.KEYID = 7
31,442,491 UART: [art] PUB.X = E607C4639257F0BADCD9D252B6D444F4516B14791C0C1164B88EC4FD57BBF2B6CD882A113A184E9A25C53087536ADF50
31,449,734 UART: [art] PUB.Y = FE2E6376D7E32F75B571248E48C7C7678DF3FFBFCEFBA4176FA2AFFAD44C7A8DCB13FF92EB0D54C185E481FEDF709ED3
31,457,024 UART: [art] SIG.R = 0A6A4567760E5B01DF8CDDEE4011DAEE931FBCEF91A44D9B7387B16E0C42C2BEF45C6012979896CA0667BA8883B1FCCE
31,464,414 UART: [art] SIG.S = F415C1293706E8B3E0F9F0B0BAA17BA75511E66EE0A7F2A0B97FAF97DF1CE1AB8E70F9F46EC70639C685A860DBD668DA
32,769,260 UART: Caliptra RT
32,769,961 UART: [state] CFI Enabled
32,930,817 UART: [rt] RT listening for mailbox commands...
32,932,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,963,238 UART: [rt]cmd =0x44504543, len=96
32,995,352 >>> mbox cmd response data (56 bytes)
32,996,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,026,738 UART: [rt]cmd =0x44504543, len=96
33,058,833 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,780,801 ready_for_fw is high
3,781,195 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,829,620 >>> mbox cmd response: success
23,515,905 UART:
23,516,289 UART: Running Caliptra FMC ...
23,517,438 UART:
23,517,603 UART: [state] CFI Enabled
23,586,005 UART: [fht] FMC Alias Private Key: 7
25,924,082 UART: [art] Extend RT PCRs Done
25,925,312 UART: [art] Lock RT PCRs Done
25,927,164 UART: [art] Populate DV Done
25,932,808 UART: [fht] FMC Alias Private Key: 7
25,934,462 UART: [art] Derive CDI
25,935,204 UART: [art] Store in in slot 0x4
25,996,042 UART: [art] Derive Key Pair
25,997,092 UART: [art] Store priv key in slot 0x5
29,289,199 UART: [art] Derive Key Pair - Done
29,302,149 UART: [art] Signing Cert with AUTHO
29,303,460 UART: RITY.KEYID = 7
31,590,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,591,663 UART: [art] PUB.X = F71A15143E38B5BC2D340C43B866DADBB67E8EB70415BEAAC58B043C17764247E6D6E9E88208731472C81435E8F2BB0B
31,598,877 UART: [art] PUB.Y = 48C70625C094F0C1FD8F6382B30A1AD648C0B2032E8F3CB61DC556EC7E56F71818EC4E72DCEC11A46D5528F36046BEAD
31,606,152 UART: [art] SIG.R = 246A12B5313AFA64B161A70A1A2E6A6C1AE4CB2B3BAE5E6F4D51DC74759686F97E43654DB9A4F5157DA2FAD0CC710770
31,613,517 UART: [art] SIG.S = 273D930BF5DC7AEF0D5DCE7A986657C6A82135A81A754CE981D6F4E22E6A308D0325C73A29FDC859E63E74479C743619
32,918,613 UART: Caliptra RT
32,919,317 UART: [state] CFI Enabled
33,100,008 UART: [rt] RT listening for mailbox commands...
33,101,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,132,651 UART: [rt]cmd =0x44504543, len=96
33,164,080 >>> mbox cmd response data (56 bytes)
33,164,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,195,676 UART: [rt]cmd =0x44504543, len=96
33,226,644 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,439 UART:
192,802 UART: Running Caliptra ROM ...
193,997 UART:
603,615 UART: [state] CFI Enabled
616,378 UART: [state] LifecycleState = Unprovisioned
618,380 UART: [state] DebugLocked = No
620,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,994 UART: [kat] SHA2-256
794,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,320 UART: [kat] ++
805,766 UART: [kat] sha1
815,942 UART: [kat] SHA2-256
818,660 UART: [kat] SHA2-384
823,864 UART: [kat] SHA2-512-ACC
826,226 UART: [kat] ECC-384
3,111,325 UART: [kat] HMAC-384Kdf
3,122,916 UART: [kat] LMS
4,312,996 UART: [kat] --
4,316,922 UART: [cold-reset] ++
4,317,924 UART: [fht] Storing FHT @ 0x50003400
4,328,572 UART: [idev] ++
4,329,127 UART: [idev] CDI.KEYID = 6
4,330,072 UART: [idev] SUBJECT.KEYID = 7
4,331,314 UART: [idev] UDS.KEYID = 0
4,332,260 ready_for_fw is high
4,332,439 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,172 UART: [idev] Erasing UDS.KEYID = 0
7,616,131 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,925 UART: [idev] --
7,642,720 UART: [ldev] ++
7,643,334 UART: [ldev] CDI.KEYID = 6
7,644,342 UART: [ldev] SUBJECT.KEYID = 5
7,645,502 UART: [ldev] AUTHORITY.KEYID = 7
7,646,727 UART: [ldev] FE.KEYID = 1
7,659,558 UART: [ldev] Erasing FE.KEYID = 1
10,954,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,953 UART: [ldev] --
13,315,567 UART: [fwproc] Waiting for Commands...
13,317,274 UART: [fwproc] Received command 0x46574c44
13,319,520 UART: [fwproc] Received Image of size 114124 bytes
17,370,885 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,135 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,021 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,036 >>> mbox cmd response: success
17,838,604 UART: [afmc] ++
17,839,205 UART: [afmc] CDI.KEYID = 6
17,840,108 UART: [afmc] SUBJECT.KEYID = 7
17,841,380 UART: [afmc] AUTHORITY.KEYID = 5
21,154,593 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,638 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,895 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,289 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,116 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,546 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,012 UART: [afmc] --
23,521,120 UART: [cold-reset] --
23,524,447 UART: [state] Locking Datavault
23,530,875 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,624 UART: [state] Locking ICCM
23,535,280 UART: [exit] Launching FMC @ 0x40000130
23,543,661 UART:
23,543,896 UART: Running Caliptra FMC ...
23,544,916 UART:
23,545,055 UART: [state] CFI Enabled
23,553,156 UART: [fht] FMC Alias Private Key: 7
25,883,914 UART: [art] Extend RT PCRs Done
25,885,135 UART: [art] Lock RT PCRs Done
25,886,736 UART: [art] Populate DV Done
25,892,248 UART: [fht] FMC Alias Private Key: 7
25,894,000 UART: [art] Derive CDI
25,894,738 UART: [art] Store in in slot 0x4
25,937,076 UART: [art] Derive Key Pair
25,938,118 UART: [art] Store priv key in slot 0x5
29,180,637 UART: [art] Derive Key Pair - Done
29,193,801 UART: [art] Signing Cert with AUTHO
29,195,100 UART: RITY.KEYID = 7
31,474,531 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,042 UART: [art] PUB.X = F21DF1171E91054526A87B681C6192050664DDAD4C8A18FA7C1A3A9F4162662A958AA61F637224F73E53F32EE37BB82C
31,483,269 UART: [art] PUB.Y = B5C8D7B05663074BF3B2C79CDD17F4DB19CE37A82001B289BDF6CA8DC347DDE091D43195B0C7A001014F3FAA83851C51
31,490,537 UART: [art] SIG.R = ED1C4E91C655486070DF4B0901CCD5F508C57EE59810C70F18A595B635868CF09051035DD2F47D4395F674DF05052AA0
31,498,115 UART: [art] SIG.S = A584D25261267E40FA7EC87A785E8AFBE93FE5B0129CF6B1A6C45A29926B117417268650F67D9FAC401937E8DBBC0F55
32,803,629 UART: Caliptra RT
32,804,321 UART: [state] CFI Enabled
32,922,105 UART: [rt] RT listening for mailbox commands...
32,924,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,954,895 UART: [rt]cmd =0x44504543, len=96
32,986,405 >>> mbox cmd response data (56 bytes)
32,987,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,017,949 UART: [rt]cmd =0x44504543, len=96
33,049,468 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
4,124,397 ready_for_fw is high
4,124,972 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,080,106 >>> mbox cmd response: success
23,722,916 UART:
23,723,341 UART: Running Caliptra FMC ...
23,724,460 UART:
23,724,619 UART: [state] CFI Enabled
23,732,531 UART: [fht] FMC Alias Private Key: 7
26,062,865 UART: [art] Extend RT PCRs Done
26,064,093 UART: [art] Lock RT PCRs Done
26,065,724 UART: [art] Populate DV Done
26,071,029 UART: [fht] FMC Alias Private Key: 7
26,072,518 UART: [art] Derive CDI
26,073,277 UART: [art] Store in in slot 0x4
26,116,137 UART: [art] Derive Key Pair
26,117,341 UART: [art] Store priv key in slot 0x5
29,360,137 UART: [art] Derive Key Pair - Done
29,373,139 UART: [art] Signing Cert with AUTHO
29,374,447 UART: RITY.KEYID = 7
31,654,449 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,956 UART: [art] PUB.X = 283EB82D6404FE4175E8FDAC17AFD84A308E6E15C2037C0EE460C29053A8B966585FA5B64F86FF2C33DB4CC9D1E6DAED
31,663,214 UART: [art] PUB.Y = 1EB60F95CF8F5E5039D466FFB952679A1BA53718978412EC367EF569800FDD6B09BB8225C26DF8BF2D49F17782409C91
31,670,453 UART: [art] SIG.R = 060798B4B0ADA790E159816A60B48B3B97E5BE7850FA20F01D86123E71353E15E1D8466D40C2EE74DCE8083CA93CD312
31,677,848 UART: [art] SIG.S = 80D10CA71E8A0044B2A3C7E1869C46387E262E3990CAC304CD425AB32D069360F8C945EC54F1F2EF76BD53500A284450
32,983,045 UART: Caliptra RT
32,983,774 UART: [state] CFI Enabled
33,101,295 UART: [rt] RT listening for mailbox commands...
33,103,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,133,845 UART: [rt]cmd =0x44504543, len=96
33,164,733 >>> mbox cmd response data (56 bytes)
33,165,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,196,061 UART: [rt]cmd =0x44504543, len=96
33,227,172 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,047 UART:
192,427 UART: Running Caliptra ROM ...
193,619 UART:
193,776 UART: [state] CFI Enabled
263,622 UART: [state] LifecycleState = Unprovisioned
265,530 UART: [state] DebugLocked = No
267,545 UART: [state] WD Timer not started. Device not locked for debugging
271,143 UART: [kat] SHA2-256
450,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,828 UART: [kat] ++
462,277 UART: [kat] sha1
473,504 UART: [kat] SHA2-256
476,577 UART: [kat] SHA2-384
482,418 UART: [kat] SHA2-512-ACC
485,357 UART: [kat] ECC-384
2,949,078 UART: [kat] HMAC-384Kdf
2,972,721 UART: [kat] LMS
3,502,141 UART: [kat] --
3,506,131 UART: [cold-reset] ++
3,508,428 UART: [fht] FHT @ 0x50003400
3,519,973 UART: [idev] ++
3,520,534 UART: [idev] CDI.KEYID = 6
3,521,421 UART: [idev] SUBJECT.KEYID = 7
3,522,662 UART: [idev] UDS.KEYID = 0
3,523,565 ready_for_fw is high
3,523,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,813 UART: [idev] Erasing UDS.KEYID = 0
6,028,659 UART: [idev] Sha1 KeyId Algorithm
6,050,380 UART: [idev] --
6,055,540 UART: [ldev] ++
6,056,125 UART: [ldev] CDI.KEYID = 6
6,057,053 UART: [ldev] SUBJECT.KEYID = 5
6,058,183 UART: [ldev] AUTHORITY.KEYID = 7
6,059,415 UART: [ldev] FE.KEYID = 1
6,100,794 UART: [ldev] Erasing FE.KEYID = 1
8,605,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,842 UART: [ldev] --
10,412,759 UART: [fwproc] Wait for Commands...
10,415,503 UART: [fwproc] Recv command 0x46574c44
10,417,593 UART: [fwproc] Recv'd Img size: 114448 bytes
13,811,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,882,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,951,657 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,269,274 >>> mbox cmd response: success
14,274,327 UART: [afmc] ++
14,274,923 UART: [afmc] CDI.KEYID = 6
14,275,835 UART: [afmc] SUBJECT.KEYID = 7
14,277,045 UART: [afmc] AUTHORITY.KEYID = 5
16,811,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,578 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,368 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,244 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,218 UART: [afmc] --
18,607,825 UART: [cold-reset] --
18,612,013 UART: [state] Locking Datavault
18,615,316 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,958 UART: [state] Locking ICCM
18,619,646 UART: [exit] Launching FMC @ 0x40000130
18,628,055 UART:
18,628,300 UART: Running Caliptra FMC ...
18,629,406 UART:
18,629,572 UART: [state] CFI Enabled
18,690,500 UART: [fht] FMC Alias Private Key: 7
20,454,601 UART: [art] Extend RT PCRs Done
20,455,819 UART: [art] Lock RT PCRs Done
20,457,684 UART: [art] Populate DV Done
20,463,042 UART: [fht] FMC Alias Private Key: 7
20,464,691 UART: [art] Derive CDI
20,465,503 UART: [art] Store in in slot 0x4
20,524,225 UART: [art] Derive Key Pair
20,525,262 UART: [art] Store priv key in slot 0x5
22,988,038 UART: [art] Derive Key Pair - Done
23,000,916 UART: [art] Signing Cert with AUTHO
23,002,251 UART: RITY.KEYID = 7
24,713,586 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,090 UART: [art] PUB.X = 0E4F02CF07EACAE7D3220D3EFA423C7A2D885AA746A363A03F329638D149CEC5F09264F1210CB437F3F99E4EAB146024
24,722,350 UART: [art] PUB.Y = C9D8A2D1F58F93E94B1BFDDBC1F821CE5B84552F4748DFA3C99EFAB7F22FF95EA186FB3F24B13B3F23D22A4EAF25DF92
24,729,703 UART: [art] SIG.R = C3DF273BA9BDFA90977B9BB4C2B85C1A0E35D5E1A2B6828E0C527160C36C3B7DAA69A0A45C577E6235E1E4F07199E5A7
24,737,099 UART: [art] SIG.S = 6D860EE9189475BF97DECA9F6D171B3ADA567A05535DEB96113AE0AB09B4980B90F6C64914710C134420CC40026CA756
25,715,920 UART: Caliptra RT
25,716,620 UART: [state] CFI Enabled
25,882,468 UART: [rt] RT listening for mailbox commands...
25,884,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,915,648 UART: [rt]cmd =0x44504543, len=96
25,946,955 >>> mbox cmd response data (56 bytes)
25,947,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,978,392 UART: [rt]cmd =0x44504543, len=96
26,008,345 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,359,151 ready_for_fw is high
3,359,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,064,061 >>> mbox cmd response: success
18,342,617 UART:
18,343,086 UART: Running Caliptra FMC ...
18,344,202 UART:
18,344,355 UART: [state] CFI Enabled
18,410,167 UART: [fht] FMC Alias Private Key: 7
20,174,514 UART: [art] Extend RT PCRs Done
20,175,759 UART: [art] Lock RT PCRs Done
20,177,503 UART: [art] Populate DV Done
20,182,703 UART: [fht] FMC Alias Private Key: 7
20,184,190 UART: [art] Derive CDI
20,184,929 UART: [art] Store in in slot 0x4
20,242,779 UART: [art] Derive Key Pair
20,243,825 UART: [art] Store priv key in slot 0x5
22,706,890 UART: [art] Derive Key Pair - Done
22,719,942 UART: [art] Signing Cert with AUTHO
22,721,246 UART: RITY.KEYID = 7
24,432,398 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,898 UART: [art] PUB.X = D1CE8CA2FA26D276CB728B5C5DB0A6298E8595DBD42AED4CFA1B1FD95AE6830181EF0AF1988A023806442C4B2CB5735A
24,441,197 UART: [art] PUB.Y = FDFB16DAF15C86E762493C4BF8C22785B3FCA77C377D6CBF903708E87657FB28231FCCDAB3507C91D0BF767C50086959
24,448,438 UART: [art] SIG.R = 8A5973CC4D9AB84DC5819461FA46BF35FE993DD509A2C28999AAF971E336A5A61204696E8E35B1515AF7F3778D6FE3B2
24,455,846 UART: [art] SIG.S = A9DECF0A0D2295EB6098582EB071AD5B3FE5A3E4DDED03C1647A555D2933A4D01221A9B9ED842158F7F779D450A5D994
25,434,693 UART: Caliptra RT
25,435,411 UART: [state] CFI Enabled
25,601,525 UART: [rt] RT listening for mailbox commands...
25,603,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,634,577 UART: [rt]cmd =0x44504543, len=96
25,665,468 >>> mbox cmd response data (56 bytes)
25,666,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,696,758 UART: [rt]cmd =0x44504543, len=96
25,728,269 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
192,343 UART:
192,704 UART: Running Caliptra ROM ...
193,803 UART:
603,610 UART: [state] CFI Enabled
614,431 UART: [state] LifecycleState = Unprovisioned
616,309 UART: [state] DebugLocked = No
619,178 UART: [state] WD Timer not started. Device not locked for debugging
623,418 UART: [kat] SHA2-256
802,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,113 UART: [kat] ++
814,663 UART: [kat] sha1
825,896 UART: [kat] SHA2-256
828,899 UART: [kat] SHA2-384
835,518 UART: [kat] SHA2-512-ACC
838,514 UART: [kat] ECC-384
3,278,317 UART: [kat] HMAC-384Kdf
3,291,547 UART: [kat] LMS
3,821,030 UART: [kat] --
3,824,175 UART: [cold-reset] ++
3,826,523 UART: [fht] FHT @ 0x50003400
3,838,438 UART: [idev] ++
3,839,034 UART: [idev] CDI.KEYID = 6
3,839,963 UART: [idev] SUBJECT.KEYID = 7
3,841,132 UART: [idev] UDS.KEYID = 0
3,842,047 ready_for_fw is high
3,842,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,840 UART: [idev] Erasing UDS.KEYID = 0
6,311,779 UART: [idev] Sha1 KeyId Algorithm
6,334,731 UART: [idev] --
6,339,522 UART: [ldev] ++
6,340,084 UART: [ldev] CDI.KEYID = 6
6,340,963 UART: [ldev] SUBJECT.KEYID = 5
6,342,163 UART: [ldev] AUTHORITY.KEYID = 7
6,343,440 UART: [ldev] FE.KEYID = 1
6,357,317 UART: [ldev] Erasing FE.KEYID = 1
8,828,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,799 UART: [ldev] --
10,619,950 UART: [fwproc] Wait for Commands...
10,621,997 UART: [fwproc] Recv command 0x46574c44
10,624,081 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,379 >>> mbox cmd response: success
14,492,950 UART: [afmc] ++
14,493,537 UART: [afmc] CDI.KEYID = 6
14,494,413 UART: [afmc] SUBJECT.KEYID = 7
14,495,621 UART: [afmc] AUTHORITY.KEYID = 5
16,994,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,357 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,155 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,041 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,263 UART: [afmc] --
18,789,803 UART: [cold-reset] --
18,793,103 UART: [state] Locking Datavault
18,798,523 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,223 UART: [state] Locking ICCM
18,802,876 UART: [exit] Launching FMC @ 0x40000130
18,811,321 UART:
18,811,546 UART: Running Caliptra FMC ...
18,812,562 UART:
18,812,701 UART: [state] CFI Enabled
18,820,628 UART: [fht] FMC Alias Private Key: 7
20,576,612 UART: [art] Extend RT PCRs Done
20,577,831 UART: [art] Lock RT PCRs Done
20,579,423 UART: [art] Populate DV Done
20,584,716 UART: [fht] FMC Alias Private Key: 7
20,586,293 UART: [art] Derive CDI
20,587,037 UART: [art] Store in in slot 0x4
20,629,571 UART: [art] Derive Key Pair
20,630,604 UART: [art] Store priv key in slot 0x5
23,057,762 UART: [art] Derive Key Pair - Done
23,070,487 UART: [art] Signing Cert with AUTHO
23,071,790 UART: RITY.KEYID = 7
24,777,703 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,200 UART: [art] PUB.X = 8A81086C1F0EA91C49511907CF97D62F98DC1C4D2CA87E868AF35CBE3719B5CC1EFEEFD876F317B672ACE78F46F2896C
24,786,475 UART: [art] PUB.Y = CF81DDA1ACAF81B69D36F0B8A588718108D9904768E3D6C25CF04A81992AF993DD5E7B901214CAE5F70C214016AC2961
24,793,716 UART: [art] SIG.R = A9F2EFEBF76A0ECE3AF67D22A307888AEB0241021C9A525AAE7E9626909D75B978D7181406EECA55780511C63A133770
24,801,101 UART: [art] SIG.S = EC29FD5F0D7F011AC3BB03BD7A824C3E9664A6D83527E92A8B29427CCDD4FFC9BA8E6C018F75A1720D67F5F916177BAA
25,780,670 UART: Caliptra RT
25,781,361 UART: [state] CFI Enabled
25,898,303 UART: [rt] RT listening for mailbox commands...
25,900,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,930,813 UART: [rt]cmd =0x44504543, len=96
25,961,260 >>> mbox cmd response data (56 bytes)
25,962,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,992,527 UART: [rt]cmd =0x44504543, len=96
26,024,378 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,698,657 ready_for_fw is high
3,699,266 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,287,649 >>> mbox cmd response: success
18,534,796 UART:
18,535,186 UART: Running Caliptra FMC ...
18,536,318 UART:
18,536,469 UART: [state] CFI Enabled
18,544,419 UART: [fht] FMC Alias Private Key: 7
20,301,773 UART: [art] Extend RT PCRs Done
20,302,997 UART: [art] Lock RT PCRs Done
20,304,623 UART: [art] Populate DV Done
20,310,032 UART: [fht] FMC Alias Private Key: 7
20,311,597 UART: [art] Derive CDI
20,312,328 UART: [art] Store in in slot 0x4
20,354,869 UART: [art] Derive Key Pair
20,355,913 UART: [art] Store priv key in slot 0x5
22,782,556 UART: [art] Derive Key Pair - Done
22,795,115 UART: [art] Signing Cert with AUTHO
22,796,416 UART: RITY.KEYID = 7
24,501,194 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,700 UART: [art] PUB.X = 4241D0929F7CEC122F9963989E55D704B9706347F994DAA81BDA3AD38CB249EABBDF1A37A9C4A97C113E7B5995C04580
24,509,966 UART: [art] PUB.Y = C3DA8A29942E1EEBBDBE494CE31EC4F6AE65CEFCD0EBEE9E28931904DCEA4430E9151ABA27AAB4CAF70949D168CE9AAF
24,517,301 UART: [art] SIG.R = F62731CFDDB01E058C9FA5594D082594E5A1D82B183535A630A6C9888D8E8FC3074E2F5C496442D33BB09A9CD8784070
24,524,714 UART: [art] SIG.S = E3762A2F2134DDA8844B8C175C976C4BCF349AEA26187D7E732D9E550A63B2DF0B588EDCBFD3301B3DBF241BA802AD12
25,503,701 UART: Caliptra RT
25,504,415 UART: [state] CFI Enabled
25,621,425 UART: [rt] RT listening for mailbox commands...
25,623,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,654,060 UART: [rt]cmd =0x44504543, len=96
25,685,633 >>> mbox cmd response data (56 bytes)
25,686,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,717,030 UART: [rt]cmd =0x44504543, len=96
25,747,902 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,417,461 ready_for_fw is high
3,417,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,713,040 >>> mbox cmd response: success
19,005,466 UART:
19,005,893 UART: Running Caliptra FMC ...
19,007,015 UART:
19,007,184 UART: [state] CFI Enabled
19,075,292 UART: [fht] FMC Alias Private Key: 7
20,839,172 UART: [art] Extend RT PCRs Done
20,840,373 UART: [art] Lock RT PCRs Done
20,842,322 UART: [art] Populate DV Done
20,847,566 UART: [fht] FMC Alias Private Key: 7
20,849,275 UART: [art] Derive CDI
20,850,092 UART: [art] Store in in slot 0x4
20,908,216 UART: [art] Derive Key Pair
20,909,205 UART: [art] Store priv key in slot 0x5
23,372,147 UART: [art] Derive Key Pair - Done
23,385,141 UART: [art] Signing Cert with AUTHO
23,386,448 UART: RITY.KEYID = 7
25,098,133 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,633 UART: [art] PUB.X = 30FFA1255807C7A8AA53343CA35035D32922F471849CCA3DC1C28457A4C6A7486628CC572C03B8155F8CBE5683689C36
25,106,887 UART: [art] PUB.Y = 412899643E7F5B3F1B21EF948D11FC4AAF6259700CFB169C7CEA7261C9CA3408425FFB35EFBFACDDCC47559C1A60BB07
25,114,188 UART: [art] SIG.R = 807E5D31365BB0A296845EED9AE1F5B131D05741965EC88792B88BB3243B884AEB095E8A9157DA44F0D4E7A67FF6A15A
25,121,573 UART: [art] SIG.S = 513DFB227BB3E49A7DC116C4E4972E11F4468711286909A1BE40F94328AC670B3976BE23DEC56B4898A2A93187CECFF5
26,100,238 UART: Caliptra RT
26,100,925 UART: [state] CFI Enabled
26,266,371 UART: [rt] RT listening for mailbox commands...
26,268,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,299,652 UART: [rt]cmd =0x44504543, len=96
26,331,609 >>> mbox cmd response data (56 bytes)
26,332,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,363,117 UART: [rt]cmd =0x44504543, len=96
26,394,360 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,753,382 ready_for_fw is high
3,753,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,158 >>> mbox cmd response: success
19,205,899 UART:
19,206,300 UART: Running Caliptra FMC ...
19,207,398 UART:
19,207,543 UART: [state] CFI Enabled
19,215,708 UART: [fht] FMC Alias Private Key: 7
20,972,254 UART: [art] Extend RT PCRs Done
20,973,461 UART: [art] Lock RT PCRs Done
20,975,392 UART: [art] Populate DV Done
20,980,851 UART: [fht] FMC Alias Private Key: 7
20,982,601 UART: [art] Derive CDI
20,983,334 UART: [art] Store in in slot 0x4
21,026,462 UART: [art] Derive Key Pair
21,027,458 UART: [art] Store priv key in slot 0x5
23,454,672 UART: [art] Derive Key Pair - Done
23,467,640 UART: [art] Signing Cert with AUTHO
23,468,946 UART: RITY.KEYID = 7
25,174,578 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,067 UART: [art] PUB.X = B2647A88F193D09B1FDEB438B37039DDDD6126864C7590435491E2693B5668B67667A4D5EF8E23AE10BBF33E0DD0F85F
25,183,353 UART: [art] PUB.Y = 8851D017AB41C5E78573262312D377399C16779137AF3122FCC3A635DB1757C26859D3921E119E61201907FD261A741F
25,190,568 UART: [art] SIG.R = 885507B2E2FC69DC4903017603F6AAD66AD4F6DFEED681B42997D98D8ACC332759DCF468AC0C43DEDCC83A539CAB6A88
25,198,042 UART: [art] SIG.S = 7BC583D2F934C5BE3899C533475D335C8EE4E2A89D1FEFE93B923252E1EB74973D60D3A5CC23F029350C92A732AE217B
26,177,031 UART: Caliptra RT
26,177,725 UART: [state] CFI Enabled
26,294,775 UART: [rt] RT listening for mailbox commands...
26,296,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,327,126 UART: [rt]cmd =0x44504543, len=96
26,358,207 >>> mbox cmd response data (56 bytes)
26,359,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,389,697 UART: [rt]cmd =0x44504543, len=96
26,421,176 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,746 UART: [state] LifecycleState = Unprovisioned
86,401 UART: [state] DebugLocked = No
86,997 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,541 UART: [kat] SHA2-256
882,472 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,587 UART: [kat] ++
886,739 UART: [kat] sha1
890,873 UART: [kat] SHA2-256
892,811 UART: [kat] SHA2-384
895,392 UART: [kat] SHA2-512-ACC
897,293 UART: [kat] ECC-384
902,912 UART: [kat] HMAC-384Kdf
907,448 UART: [kat] LMS
1,475,644 UART: [kat] --
1,476,535 UART: [cold-reset] ++
1,477,067 UART: [fht] Storing FHT @ 0x50003400
1,479,812 UART: [idev] ++
1,479,980 UART: [idev] CDI.KEYID = 6
1,480,340 UART: [idev] SUBJECT.KEYID = 7
1,480,764 UART: [idev] UDS.KEYID = 0
1,481,109 ready_for_fw is high
1,481,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,796 UART: [idev] Erasing UDS.KEYID = 0
1,505,200 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,954 UART: [idev] --
1,514,975 UART: [ldev] ++
1,515,143 UART: [ldev] CDI.KEYID = 6
1,515,506 UART: [ldev] SUBJECT.KEYID = 5
1,515,932 UART: [ldev] AUTHORITY.KEYID = 7
1,516,395 UART: [ldev] FE.KEYID = 1
1,521,341 UART: [ldev] Erasing FE.KEYID = 1
1,546,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,646 UART: [ldev] --
1,586,129 UART: [fwproc] Waiting for Commands...
1,586,788 UART: [fwproc] Received command 0x46574c44
1,587,579 UART: [fwproc] Received Image of size 114448 bytes
2,887,912 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,116 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,468 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,535 >>> mbox cmd response: success
3,081,715 UART: [afmc] ++
3,081,883 UART: [afmc] CDI.KEYID = 6
3,082,245 UART: [afmc] SUBJECT.KEYID = 7
3,082,670 UART: [afmc] AUTHORITY.KEYID = 5
3,116,955 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,227 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,007 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,735 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,620 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,310 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,195 UART: [afmc] --
3,160,301 UART: [cold-reset] --
3,161,137 UART: [state] Locking Datavault
3,162,404 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,008 UART: [state] Locking ICCM
3,163,580 UART: [exit] Launching FMC @ 0x40000130
3,168,909 UART:
3,168,925 UART: Running Caliptra FMC ...
3,169,333 UART:
3,169,387 UART: [state] CFI Enabled
3,179,830 UART: [fht] FMC Alias Private Key: 7
3,287,269 UART: [art] Extend RT PCRs Done
3,287,697 UART: [art] Lock RT PCRs Done
3,289,123 UART: [art] Populate DV Done
3,297,268 UART: [fht] FMC Alias Private Key: 7
3,298,390 UART: [art] Derive CDI
3,298,670 UART: [art] Store in in slot 0x4
3,384,357 UART: [art] Derive Key Pair
3,384,717 UART: [art] Store priv key in slot 0x5
3,398,617 UART: [art] Derive Key Pair - Done
3,413,695 UART: [art] Signing Cert with AUTHO
3,414,175 UART: RITY.KEYID = 7
3,429,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,020 UART: [art] PUB.X = 7928761D39F3DF1145615458FE3DD013A3007760D1E40388EBC1307E5C4632E96CA0B9261F4B65DB7CAC1FEA0059B115
3,436,743 UART: [art] PUB.Y = A23874973447FFE026FF43715EDF66D9D7D2F8F30550910EC3CF4DE39C64691792B6A7B8189DE5E62554518EF157641B
3,443,685 UART: [art] SIG.R = 63E6D3937E61FC7D6EE24A91921AD31CE257E9B3FB2109D117FDC59D46C4927AB19E5367D891BE92A7795F35D0477DB7
3,450,458 UART: [art] SIG.S = B988DBF047FD6AB97E4F4B1D25FE046AEBA7BAD0517E661DEF24CB4BAB94356D55C446D025053E7624D1ABB03AA2E745
3,474,541 UART: Caliptra RT
3,474,794 UART: [state] CFI Enabled
3,583,331 UART: [rt] RT listening for mailbox commands...
3,584,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,435 UART: [rt]cmd =0x44504543, len=96
3,647,071 >>> mbox cmd response data (56 bytes)
3,647,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,949 UART: [rt]cmd =0x44504543, len=96
3,709,592 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,471 ready_for_fw is high
1,362,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,113 >>> mbox cmd response: success
2,991,939 UART:
2,991,955 UART: Running Caliptra FMC ...
2,992,363 UART:
2,992,417 UART: [state] CFI Enabled
3,003,258 UART: [fht] FMC Alias Private Key: 7
3,111,421 UART: [art] Extend RT PCRs Done
3,111,849 UART: [art] Lock RT PCRs Done
3,113,379 UART: [art] Populate DV Done
3,121,842 UART: [fht] FMC Alias Private Key: 7
3,122,874 UART: [art] Derive CDI
3,123,154 UART: [art] Store in in slot 0x4
3,208,785 UART: [art] Derive Key Pair
3,209,145 UART: [art] Store priv key in slot 0x5
3,222,101 UART: [art] Derive Key Pair - Done
3,236,674 UART: [art] Signing Cert with AUTHO
3,237,154 UART: RITY.KEYID = 7
3,252,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,017 UART: [art] PUB.X = 3A9D2FCB0FC8C6CE9A553CCBC7262F86875DEB5E91EE4F040233EEFCDBB3D9A94B6FF08753709E91428B5A806B0108D2
3,259,790 UART: [art] PUB.Y = 3E7A44863CC2611A26DA0F9FCAD1F61E0FC4748B9A4F4A901391AB8CCF9752D1C194C6E1DEAC01F304969370E4076EE3
3,266,737 UART: [art] SIG.R = 3AB2A5D742F12A379F36A325F2DFDED70DFE07110990D8F67D7AD493FDDB6263911233EBD802DC2C517772B4739C1AE8
3,273,505 UART: [art] SIG.S = BB4F81160F47CCE8F9D24162F29833146F1090E1BC5F58AE66BFEBFDAB6ED0A14559DAE2461CE698C7307B702D29A78C
3,297,099 UART: Caliptra RT
3,297,352 UART: [state] CFI Enabled
3,405,635 UART: [rt] RT listening for mailbox commands...
3,406,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,787 UART: [rt]cmd =0x44504543, len=96
3,469,227 >>> mbox cmd response data (56 bytes)
3,469,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,301 UART: [rt]cmd =0x44504543, len=96
3,531,776 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,568 UART: [kat] SHA2-256
882,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,614 UART: [kat] ++
886,766 UART: [kat] sha1
891,116 UART: [kat] SHA2-256
893,054 UART: [kat] SHA2-384
895,777 UART: [kat] SHA2-512-ACC
897,678 UART: [kat] ECC-384
903,109 UART: [kat] HMAC-384Kdf
907,719 UART: [kat] LMS
1,475,915 UART: [kat] --
1,476,658 UART: [cold-reset] ++
1,477,082 UART: [fht] Storing FHT @ 0x50003400
1,479,747 UART: [idev] ++
1,479,915 UART: [idev] CDI.KEYID = 6
1,480,275 UART: [idev] SUBJECT.KEYID = 7
1,480,699 UART: [idev] UDS.KEYID = 0
1,481,044 ready_for_fw is high
1,481,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,579 UART: [idev] Erasing UDS.KEYID = 0
1,505,463 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,027 UART: [idev] --
1,515,178 UART: [ldev] ++
1,515,346 UART: [ldev] CDI.KEYID = 6
1,515,709 UART: [ldev] SUBJECT.KEYID = 5
1,516,135 UART: [ldev] AUTHORITY.KEYID = 7
1,516,598 UART: [ldev] FE.KEYID = 1
1,522,012 UART: [ldev] Erasing FE.KEYID = 1
1,546,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,027 UART: [ldev] --
1,586,412 UART: [fwproc] Waiting for Commands...
1,587,241 UART: [fwproc] Received command 0x46574c44
1,588,032 UART: [fwproc] Received Image of size 114448 bytes
2,886,743 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,435 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,698 >>> mbox cmd response: success
3,079,912 UART: [afmc] ++
3,080,080 UART: [afmc] CDI.KEYID = 6
3,080,442 UART: [afmc] SUBJECT.KEYID = 7
3,080,867 UART: [afmc] AUTHORITY.KEYID = 5
3,116,578 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,928 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,321 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,011 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,878 UART: [afmc] --
3,159,962 UART: [cold-reset] --
3,160,852 UART: [state] Locking Datavault
3,161,633 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,237 UART: [state] Locking ICCM
3,162,763 UART: [exit] Launching FMC @ 0x40000130
3,168,092 UART:
3,168,108 UART: Running Caliptra FMC ...
3,168,516 UART:
3,168,659 UART: [state] CFI Enabled
3,179,556 UART: [fht] FMC Alias Private Key: 7
3,286,993 UART: [art] Extend RT PCRs Done
3,287,421 UART: [art] Lock RT PCRs Done
3,288,887 UART: [art] Populate DV Done
3,297,140 UART: [fht] FMC Alias Private Key: 7
3,298,278 UART: [art] Derive CDI
3,298,558 UART: [art] Store in in slot 0x4
3,384,467 UART: [art] Derive Key Pair
3,384,827 UART: [art] Store priv key in slot 0x5
3,398,035 UART: [art] Derive Key Pair - Done
3,412,747 UART: [art] Signing Cert with AUTHO
3,413,227 UART: RITY.KEYID = 7
3,428,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,204 UART: [art] PUB.X = 70938EF61257C7C33877AD923775358A9F076DF8E9B751BC1A0655796D810F58376E4E33E5A12C68EA9D038EF7CB4EA9
3,435,962 UART: [art] PUB.Y = 0F0193C58AF93B33912AB4D133E1958035103DDDAD888A8AEF86CE82AB63E72E211EF08570D70A734BA796F0CD869283
3,442,907 UART: [art] SIG.R = A361FCD531A3E63874EDF3397DF75C44C077767A65C64ECA717DED65906B4245CDC0B568FEC3A9D7B2DA2DF4531581BB
3,449,691 UART: [art] SIG.S = 06635BD55D831D54235071DA5E13960C5F96EEFDDAD5C36DD0DA144B7381F636B453E5A455FA63B66D9D2DCBC0FD0AD4
3,473,441 UART: Caliptra RT
3,473,786 UART: [state] CFI Enabled
3,581,909 UART: [rt] RT listening for mailbox commands...
3,582,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,013 UART: [rt]cmd =0x44504543, len=96
3,645,323 >>> mbox cmd response data (56 bytes)
3,645,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,139 UART: [rt]cmd =0x44504543, len=96
3,707,982 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,766 ready_for_fw is high
1,362,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,036 >>> mbox cmd response: success
2,991,254 UART:
2,991,270 UART: Running Caliptra FMC ...
2,991,678 UART:
2,991,821 UART: [state] CFI Enabled
3,002,218 UART: [fht] FMC Alias Private Key: 7
3,110,501 UART: [art] Extend RT PCRs Done
3,110,929 UART: [art] Lock RT PCRs Done
3,112,689 UART: [art] Populate DV Done
3,120,706 UART: [fht] FMC Alias Private Key: 7
3,121,884 UART: [art] Derive CDI
3,122,164 UART: [art] Store in in slot 0x4
3,207,341 UART: [art] Derive Key Pair
3,207,701 UART: [art] Store priv key in slot 0x5
3,221,705 UART: [art] Derive Key Pair - Done
3,236,747 UART: [art] Signing Cert with AUTHO
3,237,227 UART: RITY.KEYID = 7
3,252,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,110 UART: [art] PUB.X = 9A4E2962D3A088046B5118F1F01B69005B99990E3A4AF7BA298BB0B0CCC7FF3A84C8C3E339AB240A5A1A38E43612A571
3,259,855 UART: [art] PUB.Y = E9A6D978FC0D0485B66377085DB3E10682ECD3947606DB4993347C620298A90F8830E20427859646EE37F3E88D7D3176
3,266,769 UART: [art] SIG.R = F6931271E388DE23DA4ED7116B44D5062BDD01F625326753B89CA1379FDF6E7330263D3B206788783321F3E0F6624961
3,273,523 UART: [art] SIG.S = C53D0E164B924766A2A7AC70AE755CA3571D986E751645F47902706ACDCC58A09815E3B2DF79205C4139DB57BC314C8F
3,297,460 UART: Caliptra RT
3,297,805 UART: [state] CFI Enabled
3,405,251 UART: [rt] RT listening for mailbox commands...
3,405,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,377 UART: [rt]cmd =0x44504543, len=96
3,468,711 >>> mbox cmd response data (56 bytes)
3,468,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,865 UART: [rt]cmd =0x44504543, len=96
3,531,282 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
893,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,493 UART: [kat] ++
897,645 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,830 UART: [kat] SHA2-512-ACC
908,731 UART: [kat] ECC-384
918,416 UART: [kat] HMAC-384Kdf
922,892 UART: [kat] LMS
1,171,220 UART: [kat] --
1,172,057 UART: [cold-reset] ++
1,172,429 UART: [fht] FHT @ 0x50003400
1,175,010 UART: [idev] ++
1,175,178 UART: [idev] CDI.KEYID = 6
1,175,538 UART: [idev] SUBJECT.KEYID = 7
1,175,962 UART: [idev] UDS.KEYID = 0
1,176,307 ready_for_fw is high
1,176,307 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,978 UART: [idev] Erasing UDS.KEYID = 0
1,201,291 UART: [idev] Sha1 KeyId Algorithm
1,209,923 UART: [idev] --
1,210,915 UART: [ldev] ++
1,211,083 UART: [ldev] CDI.KEYID = 6
1,211,446 UART: [ldev] SUBJECT.KEYID = 5
1,211,872 UART: [ldev] AUTHORITY.KEYID = 7
1,212,335 UART: [ldev] FE.KEYID = 1
1,217,309 UART: [ldev] Erasing FE.KEYID = 1
1,243,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,703 UART: [ldev] --
1,283,178 UART: [fwproc] Wait for Commands...
1,283,948 UART: [fwproc] Recv command 0x46574c44
1,284,676 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,801 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,910 >>> mbox cmd response: success
2,778,128 UART: [afmc] ++
2,778,296 UART: [afmc] CDI.KEYID = 6
2,778,658 UART: [afmc] SUBJECT.KEYID = 7
2,779,083 UART: [afmc] AUTHORITY.KEYID = 5
2,814,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,635 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,520 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,239 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,053 UART: [afmc] --
2,858,169 UART: [cold-reset] --
2,859,109 UART: [state] Locking Datavault
2,860,150 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,754 UART: [state] Locking ICCM
2,861,362 UART: [exit] Launching FMC @ 0x40000130
2,866,691 UART:
2,866,707 UART: Running Caliptra FMC ...
2,867,115 UART:
2,867,169 UART: [state] CFI Enabled
2,877,752 UART: [fht] FMC Alias Private Key: 7
2,985,845 UART: [art] Extend RT PCRs Done
2,986,273 UART: [art] Lock RT PCRs Done
2,987,637 UART: [art] Populate DV Done
2,995,810 UART: [fht] FMC Alias Private Key: 7
2,996,922 UART: [art] Derive CDI
2,997,202 UART: [art] Store in in slot 0x4
3,082,649 UART: [art] Derive Key Pair
3,083,009 UART: [art] Store priv key in slot 0x5
3,096,159 UART: [art] Derive Key Pair - Done
3,111,274 UART: [art] Signing Cert with AUTHO
3,111,754 UART: RITY.KEYID = 7
3,126,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,529 UART: [art] PUB.X = 5EABE40BFE4067C8512DF205934B4523FE83276CCB175AF12F888BBC7A79A21C1BEE9499D6D724AEC0C110E173258C6E
3,134,305 UART: [art] PUB.Y = 9901750193367CF6459506663B95E67A2B44BB35C6C240867B5397EA903A7FBD2BC09A7F0828F1307CA62E6B3DB94EE6
3,141,241 UART: [art] SIG.R = 60EAF55E4710028AF7DF85F11D566BFB9676A551BA17B380990A717BB5CF5F7F74DAF1810DB279E1E7895E4AEE32A0DE
3,148,016 UART: [art] SIG.S = DAC122D864C6C0CD6A1E14BEB5A32D17EE5FD95BC5FDA38B401BAB3DAD1664651EF8A684AEAD7230794BAAF8C5EC7B2F
3,171,573 UART: Caliptra RT
3,171,826 UART: [state] CFI Enabled
3,279,089 UART: [rt] RT listening for mailbox commands...
3,279,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,843 UART: [rt]cmd =0x44504543, len=96
3,341,919 >>> mbox cmd response data (56 bytes)
3,341,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,953 UART: [rt]cmd =0x44504543, len=96
3,404,710 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,475 ready_for_fw is high
1,059,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,677 >>> mbox cmd response: success
2,689,873 UART:
2,689,889 UART: Running Caliptra FMC ...
2,690,297 UART:
2,690,351 UART: [state] CFI Enabled
2,700,886 UART: [fht] FMC Alias Private Key: 7
2,808,893 UART: [art] Extend RT PCRs Done
2,809,321 UART: [art] Lock RT PCRs Done
2,811,021 UART: [art] Populate DV Done
2,819,238 UART: [fht] FMC Alias Private Key: 7
2,820,376 UART: [art] Derive CDI
2,820,656 UART: [art] Store in in slot 0x4
2,906,579 UART: [art] Derive Key Pair
2,906,939 UART: [art] Store priv key in slot 0x5
2,920,155 UART: [art] Derive Key Pair - Done
2,935,246 UART: [art] Signing Cert with AUTHO
2,935,726 UART: RITY.KEYID = 7
2,950,868 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,633 UART: [art] PUB.X = 0EA27FB40E973E5933854F9ACABCE405BECCD74A3AFE8A2A214B0E04941C788735CBC9268597A8A9FF6F5D98F7C29A34
2,958,404 UART: [art] PUB.Y = EF4178736A814CB81D10900A52E97789AF2F2E5433E65149E1818F450C18524342E54A1FA5E50106CD1D98DED56EB0D5
2,965,340 UART: [art] SIG.R = E160B12797AD502293C22693B227E79A543B2005CB4A0DDA275512D4E3024F15F2A9D94169B4B43FA7F3A7BC4525B733
2,972,099 UART: [art] SIG.S = DB307575A5E27A27D89D43C0F9EA36D686914058DBE49180F816C2C12DA3D8A0F27E3515D01EA45C774A0B51793D1C94
2,995,505 UART: Caliptra RT
2,995,758 UART: [state] CFI Enabled
3,102,268 UART: [rt] RT listening for mailbox commands...
3,102,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,404 UART: [rt]cmd =0x44504543, len=96
3,165,840 >>> mbox cmd response data (56 bytes)
3,165,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,842 UART: [rt]cmd =0x44504543, len=96
3,228,931 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
893,385 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,510 UART: [kat] ++
897,662 UART: [kat] sha1
901,918 UART: [kat] SHA2-256
903,858 UART: [kat] SHA2-384
906,579 UART: [kat] SHA2-512-ACC
908,480 UART: [kat] ECC-384
918,293 UART: [kat] HMAC-384Kdf
922,951 UART: [kat] LMS
1,171,279 UART: [kat] --
1,172,224 UART: [cold-reset] ++
1,172,640 UART: [fht] FHT @ 0x50003400
1,175,341 UART: [idev] ++
1,175,509 UART: [idev] CDI.KEYID = 6
1,175,869 UART: [idev] SUBJECT.KEYID = 7
1,176,293 UART: [idev] UDS.KEYID = 0
1,176,638 ready_for_fw is high
1,176,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,567 UART: [idev] Erasing UDS.KEYID = 0
1,201,430 UART: [idev] Sha1 KeyId Algorithm
1,210,002 UART: [idev] --
1,211,152 UART: [ldev] ++
1,211,320 UART: [ldev] CDI.KEYID = 6
1,211,683 UART: [ldev] SUBJECT.KEYID = 5
1,212,109 UART: [ldev] AUTHORITY.KEYID = 7
1,212,572 UART: [ldev] FE.KEYID = 1
1,218,046 UART: [ldev] Erasing FE.KEYID = 1
1,244,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,310 UART: [ldev] --
1,283,717 UART: [fwproc] Wait for Commands...
1,284,371 UART: [fwproc] Recv command 0x46574c44
1,285,099 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,503 >>> mbox cmd response: success
2,776,537 UART: [afmc] ++
2,776,705 UART: [afmc] CDI.KEYID = 6
2,777,067 UART: [afmc] SUBJECT.KEYID = 7
2,777,492 UART: [afmc] AUTHORITY.KEYID = 5
2,813,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,248 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,976 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,861 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,580 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,402 UART: [afmc] --
2,856,522 UART: [cold-reset] --
2,857,330 UART: [state] Locking Datavault
2,858,361 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,965 UART: [state] Locking ICCM
2,859,503 UART: [exit] Launching FMC @ 0x40000130
2,864,832 UART:
2,864,848 UART: Running Caliptra FMC ...
2,865,256 UART:
2,865,399 UART: [state] CFI Enabled
2,875,858 UART: [fht] FMC Alias Private Key: 7
2,984,055 UART: [art] Extend RT PCRs Done
2,984,483 UART: [art] Lock RT PCRs Done
2,985,963 UART: [art] Populate DV Done
2,994,390 UART: [fht] FMC Alias Private Key: 7
2,995,384 UART: [art] Derive CDI
2,995,664 UART: [art] Store in in slot 0x4
3,081,243 UART: [art] Derive Key Pair
3,081,603 UART: [art] Store priv key in slot 0x5
3,094,375 UART: [art] Derive Key Pair - Done
3,109,082 UART: [art] Signing Cert with AUTHO
3,109,562 UART: RITY.KEYID = 7
3,124,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,485 UART: [art] PUB.X = D7DECD87190B16B7FDD951570B9D0068E93F8C3AE2D3ACB63420B20614012204EC6EB4FE7755E45A4A640045A56ACE2F
3,132,206 UART: [art] PUB.Y = DE775DC461AAE92262A635F7902CC2A7BA5BEE749800DC213E412A96BC55B6861E59A5B77A71C2C5B520FDCAC844ADD9
3,139,150 UART: [art] SIG.R = CE1A4A7E8242DE02EBDD84442E41947649D44786DC2A45AB91BBDBF1E7A8B84EA26512181A5229DDA754E5C712F3F2DD
3,145,931 UART: [art] SIG.S = A00C490B9825884F9AEB80D176D496A140F6251E8B85BC7EB53143C8B48E58676FE4FC4CA8413C71604D0A431A6E077E
3,169,488 UART: Caliptra RT
3,169,833 UART: [state] CFI Enabled
3,278,245 UART: [rt] RT listening for mailbox commands...
3,278,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,183 UART: [rt]cmd =0x44504543, len=96
3,341,595 >>> mbox cmd response data (56 bytes)
3,341,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,653 UART: [rt]cmd =0x44504543, len=96
3,404,474 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,808 ready_for_fw is high
1,059,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,182 >>> mbox cmd response: success
2,688,674 UART:
2,688,690 UART: Running Caliptra FMC ...
2,689,098 UART:
2,689,241 UART: [state] CFI Enabled
2,699,544 UART: [fht] FMC Alias Private Key: 7
2,807,385 UART: [art] Extend RT PCRs Done
2,807,813 UART: [art] Lock RT PCRs Done
2,809,109 UART: [art] Populate DV Done
2,817,436 UART: [fht] FMC Alias Private Key: 7
2,818,396 UART: [art] Derive CDI
2,818,676 UART: [art] Store in in slot 0x4
2,904,393 UART: [art] Derive Key Pair
2,904,753 UART: [art] Store priv key in slot 0x5
2,918,289 UART: [art] Derive Key Pair - Done
2,933,337 UART: [art] Signing Cert with AUTHO
2,933,817 UART: RITY.KEYID = 7
2,948,941 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,706 UART: [art] PUB.X = 0D5314EF46FF5E3EADD5339DF1942505867F2E8ECFC3252E80E2A3F4FE735FC5F417E23AEB9F8B9E9523277966CA8132
2,956,480 UART: [art] PUB.Y = 9F28909952B47572AE6881E77987F1821EAFE7D1088FC39381A362FB45F392FFBC19632783855E48D31F1B8577A63D06
2,963,416 UART: [art] SIG.R = 37F28740D38202C64AD997D00F6971EFCD38C27AAE30B3A60B15421FED1D6E89C428CAF9F9313EE26720E9C580462112
2,970,179 UART: [art] SIG.S = 698134D179CBDF296D0148AB4984CC6DCF345F5148CA603EF2B48611D266A2838854C651601B3FAD88B1F3E3DC6483EE
2,994,227 UART: Caliptra RT
2,994,572 UART: [state] CFI Enabled
3,102,733 UART: [rt] RT listening for mailbox commands...
3,103,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,817 UART: [rt]cmd =0x44504543, len=96
3,166,317 >>> mbox cmd response data (56 bytes)
3,166,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,203 UART: [rt]cmd =0x44504543, len=96
3,229,074 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,752 UART: [state] LifecycleState = Unprovisioned
85,407 UART: [state] DebugLocked = No
85,977 UART: [state] WD Timer not started. Device not locked for debugging
87,112 UART: [kat] SHA2-256
890,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,791 UART: [kat] ++
894,943 UART: [kat] sha1
899,155 UART: [kat] SHA2-256
901,095 UART: [kat] SHA2-384
903,702 UART: [kat] SHA2-512-ACC
905,603 UART: [kat] ECC-384
915,212 UART: [kat] HMAC-384Kdf
919,640 UART: [kat] LMS
1,167,952 UART: [kat] --
1,168,767 UART: [cold-reset] ++
1,169,323 UART: [fht] FHT @ 0x50003400
1,171,971 UART: [idev] ++
1,172,139 UART: [idev] CDI.KEYID = 6
1,172,500 UART: [idev] SUBJECT.KEYID = 7
1,172,925 UART: [idev] UDS.KEYID = 0
1,173,271 ready_for_fw is high
1,173,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,755 UART: [idev] Erasing UDS.KEYID = 0
1,197,409 UART: [idev] Sha1 KeyId Algorithm
1,206,385 UART: [idev] --
1,207,450 UART: [ldev] ++
1,207,618 UART: [ldev] CDI.KEYID = 6
1,207,982 UART: [ldev] SUBJECT.KEYID = 5
1,208,409 UART: [ldev] AUTHORITY.KEYID = 7
1,208,872 UART: [ldev] FE.KEYID = 1
1,214,108 UART: [ldev] Erasing FE.KEYID = 1
1,240,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,388 UART: [ldev] --
1,279,836 UART: [fwproc] Wait for Commands...
1,280,521 UART: [fwproc] Recv command 0x46574c44
1,281,254 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,056 >>> mbox cmd response: success
2,773,193 UART: [afmc] ++
2,773,361 UART: [afmc] CDI.KEYID = 6
2,773,724 UART: [afmc] SUBJECT.KEYID = 7
2,774,150 UART: [afmc] AUTHORITY.KEYID = 5
2,809,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,580 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,309 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,192 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,911 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,794 UART: [afmc] --
2,852,918 UART: [cold-reset] --
2,853,722 UART: [state] Locking Datavault
2,854,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,593 UART: [state] Locking ICCM
2,856,119 UART: [exit] Launching FMC @ 0x40000130
2,861,448 UART:
2,861,464 UART: Running Caliptra FMC ...
2,861,872 UART:
2,861,926 UART: [state] CFI Enabled
2,872,611 UART: [fht] FMC Alias Private Key: 7
2,980,582 UART: [art] Extend RT PCRs Done
2,981,010 UART: [art] Lock RT PCRs Done
2,982,540 UART: [art] Populate DV Done
2,990,781 UART: [fht] FMC Alias Private Key: 7
2,991,877 UART: [art] Derive CDI
2,992,157 UART: [art] Store in in slot 0x4
3,077,856 UART: [art] Derive Key Pair
3,078,216 UART: [art] Store priv key in slot 0x5
3,091,346 UART: [art] Derive Key Pair - Done
3,106,031 UART: [art] Signing Cert with AUTHO
3,106,511 UART: RITY.KEYID = 7
3,121,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,536 UART: [art] PUB.X = 7ECEA585354BC365C784E5B12C35C1D36326C395B68B1AB621BE366995D9D7B90A0B61E5CECEB9FC8F4BDA85B0B76712
3,129,314 UART: [art] PUB.Y = DEF2D8C9E124AC34910D8608AAD15BEEAB750C3EAD8DCBB5DA3D3ECEF204222EEAE5F7369964F522EA44C8DC501003B9
3,136,275 UART: [art] SIG.R = 496530DD5A998ACB197A2CEE3C4B95544B341FD2006BBB0E532AF8D472BF36A52C34FA90E99870A124144A24BF79F0C8
3,143,028 UART: [art] SIG.S = E850FD4D4967C260D01D61A6C976117949125F2E876D45FC3246F0D05B4B75CDF74F8C2A6E803C259495D77965CDD40B
3,166,730 UART: Caliptra RT
3,166,983 UART: [state] CFI Enabled
3,275,496 UART: [rt] RT listening for mailbox commands...
3,276,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,522 UART: [rt]cmd =0x44504543, len=96
3,339,334 >>> mbox cmd response data (56 bytes)
3,339,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,472 UART: [rt]cmd =0x44504543, len=96
3,402,143 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,546 ready_for_fw is high
1,056,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,330 >>> mbox cmd response: success
2,687,098 UART:
2,687,114 UART: Running Caliptra FMC ...
2,687,522 UART:
2,687,576 UART: [state] CFI Enabled
2,697,781 UART: [fht] FMC Alias Private Key: 7
2,805,630 UART: [art] Extend RT PCRs Done
2,806,058 UART: [art] Lock RT PCRs Done
2,807,800 UART: [art] Populate DV Done
2,815,961 UART: [fht] FMC Alias Private Key: 7
2,817,019 UART: [art] Derive CDI
2,817,299 UART: [art] Store in in slot 0x4
2,902,944 UART: [art] Derive Key Pair
2,903,304 UART: [art] Store priv key in slot 0x5
2,916,566 UART: [art] Derive Key Pair - Done
2,931,640 UART: [art] Signing Cert with AUTHO
2,932,120 UART: RITY.KEYID = 7
2,947,082 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,847 UART: [art] PUB.X = F45018CF1A04C55876C4EE83FC8F70F4E37DD60C2B03037E785C631D51DC60249CFB14D4D03BCA28A3C1DEC46B51DF80
2,954,619 UART: [art] PUB.Y = 7659D47C2A6DF55CE6708B4216C240DBAFB76897F7420463B8FC8050C9F3AEE1A480D7B077A72283F4DDA32505476B46
2,961,565 UART: [art] SIG.R = B51D7D0C6B5391E376C3DB4BD370252388EFDE9C44C69D8240B82F4247A0BFB6777CE3C8B42BE72C8B603F976E081C21
2,968,337 UART: [art] SIG.S = 6C0CDE177190B3C5056B05217D4FD79DBE971B807BC4F5DF689F052E3D790108635CF1E731371B575E20AB122AFED84B
2,991,956 UART: Caliptra RT
2,992,209 UART: [state] CFI Enabled
3,099,186 UART: [rt] RT listening for mailbox commands...
3,099,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,550 UART: [rt]cmd =0x44504543, len=96
3,163,494 >>> mbox cmd response data (56 bytes)
3,163,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,210 UART: [rt]cmd =0x44504543, len=96
3,225,687 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,025 UART: [state] LifecycleState = Unprovisioned
86,680 UART: [state] DebugLocked = No
87,240 UART: [state] WD Timer not started. Device not locked for debugging
88,407 UART: [kat] SHA2-256
891,957 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,086 UART: [kat] ++
896,238 UART: [kat] sha1
900,496 UART: [kat] SHA2-256
902,436 UART: [kat] SHA2-384
905,309 UART: [kat] SHA2-512-ACC
907,210 UART: [kat] ECC-384
916,965 UART: [kat] HMAC-384Kdf
921,451 UART: [kat] LMS
1,169,763 UART: [kat] --
1,170,528 UART: [cold-reset] ++
1,171,088 UART: [fht] FHT @ 0x50003400
1,173,852 UART: [idev] ++
1,174,020 UART: [idev] CDI.KEYID = 6
1,174,381 UART: [idev] SUBJECT.KEYID = 7
1,174,806 UART: [idev] UDS.KEYID = 0
1,175,152 ready_for_fw is high
1,175,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,734 UART: [idev] Erasing UDS.KEYID = 0
1,200,372 UART: [idev] Sha1 KeyId Algorithm
1,209,310 UART: [idev] --
1,210,301 UART: [ldev] ++
1,210,469 UART: [ldev] CDI.KEYID = 6
1,210,833 UART: [ldev] SUBJECT.KEYID = 5
1,211,260 UART: [ldev] AUTHORITY.KEYID = 7
1,211,723 UART: [ldev] FE.KEYID = 1
1,217,277 UART: [ldev] Erasing FE.KEYID = 1
1,243,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,283 UART: [ldev] --
1,282,661 UART: [fwproc] Wait for Commands...
1,283,294 UART: [fwproc] Recv command 0x46574c44
1,284,027 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,618 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,865 >>> mbox cmd response: success
2,775,944 UART: [afmc] ++
2,776,112 UART: [afmc] CDI.KEYID = 6
2,776,475 UART: [afmc] SUBJECT.KEYID = 7
2,776,901 UART: [afmc] AUTHORITY.KEYID = 5
2,812,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,074 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,957 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,676 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,513 UART: [afmc] --
2,855,493 UART: [cold-reset] --
2,856,123 UART: [state] Locking Datavault
2,857,378 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,982 UART: [state] Locking ICCM
2,858,636 UART: [exit] Launching FMC @ 0x40000130
2,863,965 UART:
2,863,981 UART: Running Caliptra FMC ...
2,864,389 UART:
2,864,532 UART: [state] CFI Enabled
2,874,979 UART: [fht] FMC Alias Private Key: 7
2,983,060 UART: [art] Extend RT PCRs Done
2,983,488 UART: [art] Lock RT PCRs Done
2,984,996 UART: [art] Populate DV Done
2,993,175 UART: [fht] FMC Alias Private Key: 7
2,994,109 UART: [art] Derive CDI
2,994,389 UART: [art] Store in in slot 0x4
3,079,872 UART: [art] Derive Key Pair
3,080,232 UART: [art] Store priv key in slot 0x5
3,093,250 UART: [art] Derive Key Pair - Done
3,107,967 UART: [art] Signing Cert with AUTHO
3,108,447 UART: RITY.KEYID = 7
3,123,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,468 UART: [art] PUB.X = E7C8743DEA2474189D3145A48C441D5494904CC4749E21EFADB0303260EEBD35710101A0FED0A327C4E68B0286275388
3,131,225 UART: [art] PUB.Y = B0F5313B389C10427C16BCF5E6EE9581226A33A4206228B5A81743360E349E5D29990ABD2E767BA54166E0A914ABAE46
3,138,167 UART: [art] SIG.R = 0F19F3FCA298FF6FB550317EA7F5075D4BF9342123A00BDE1FD6BC45604C949F4CE98676E581298A36FCC771232A7789
3,144,932 UART: [art] SIG.S = 0AEB7236E9A30CD719DF017AB236E131326949BA8A7ABD6647ECA8FAD1F9682C90EEFA59B0F1606AC9D9A32283750E78
3,169,307 UART: Caliptra RT
3,169,652 UART: [state] CFI Enabled
3,277,353 UART: [rt] RT listening for mailbox commands...
3,278,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,565 UART: [rt]cmd =0x44504543, len=96
3,340,505 >>> mbox cmd response data (56 bytes)
3,340,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,579 UART: [rt]cmd =0x44504543, len=96
3,404,326 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,741 ready_for_fw is high
1,056,741 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,979 >>> mbox cmd response: success
2,689,335 UART:
2,689,351 UART: Running Caliptra FMC ...
2,689,759 UART:
2,689,902 UART: [state] CFI Enabled
2,700,535 UART: [fht] FMC Alias Private Key: 7
2,808,694 UART: [art] Extend RT PCRs Done
2,809,122 UART: [art] Lock RT PCRs Done
2,810,806 UART: [art] Populate DV Done
2,819,087 UART: [fht] FMC Alias Private Key: 7
2,820,201 UART: [art] Derive CDI
2,820,481 UART: [art] Store in in slot 0x4
2,906,402 UART: [art] Derive Key Pair
2,906,762 UART: [art] Store priv key in slot 0x5
2,920,506 UART: [art] Derive Key Pair - Done
2,935,290 UART: [art] Signing Cert with AUTHO
2,935,770 UART: RITY.KEYID = 7
2,951,190 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,955 UART: [art] PUB.X = 24E1C0DA192A772039E09D00503BE85BBFC5178D5DF62F5C53DBC083E84B6A6B070310FE9D135E6C9812A185A4ED6E28
2,958,705 UART: [art] PUB.Y = ABF62B1AD913465D906A3B92B5C9AC386378ADC2A0B3E1D21F61B980F098DE99FCAC8806B111B19A5BAE80508176ADA4
2,965,666 UART: [art] SIG.R = A9355D865898F3638F7DDE9F1E2D4530CD5EC1D9332A690D6D1C416CFFDAAF76AA70F375382444AE6848E9192AC4CB5C
2,972,445 UART: [art] SIG.S = 3E47FE8AB412EDB50C393C7822D9E08141E942A6320F617E64D8396F0E75C161C8D3F8BFD18CCC00832A836032569307
2,996,270 UART: Caliptra RT
2,996,615 UART: [state] CFI Enabled
3,104,254 UART: [rt] RT listening for mailbox commands...
3,104,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,646 UART: [rt]cmd =0x44504543, len=96
3,167,532 >>> mbox cmd response data (56 bytes)
3,167,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,448 UART: [rt]cmd =0x44504543, len=96
3,229,769 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,110 UART:
192,483 UART: Running Caliptra ROM ...
193,604 UART:
193,765 UART: [state] CFI Enabled
264,692 UART: [state] LifecycleState = Unprovisioned
266,606 UART: [state] DebugLocked = No
268,125 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,212 UART: [kat] SHA2-256
441,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,384 UART: [kat] ++
452,836 UART: [kat] sha1
464,426 UART: [kat] SHA2-256
467,155 UART: [kat] SHA2-384
473,118 UART: [kat] SHA2-512-ACC
475,524 UART: [kat] ECC-384
2,767,523 UART: [kat] HMAC-384Kdf
2,799,266 UART: [kat] LMS
3,989,623 UART: [kat] --
3,994,327 UART: [cold-reset] ++
3,996,847 UART: [fht] Storing FHT @ 0x50003400
4,007,905 UART: [idev] ++
4,008,473 UART: [idev] CDI.KEYID = 6
4,009,393 UART: [idev] SUBJECT.KEYID = 7
4,010,642 UART: [idev] UDS.KEYID = 0
4,011,682 ready_for_fw is high
4,011,891 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,449 UART: [idev] Erasing UDS.KEYID = 0
7,341,162 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,963 UART: [idev] --
7,367,851 UART: [ldev] ++
7,368,432 UART: [ldev] CDI.KEYID = 6
7,369,400 UART: [ldev] SUBJECT.KEYID = 5
7,370,616 UART: [ldev] AUTHORITY.KEYID = 7
7,371,848 UART: [ldev] FE.KEYID = 1
7,421,003 UART: [ldev] Erasing FE.KEYID = 1
10,753,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,253 UART: [ldev] --
13,115,798 UART: [fwproc] Waiting for Commands...
13,118,443 UART: [fwproc] Received command 0x46574c44
13,120,625 UART: [fwproc] Received Image of size 114124 bytes
17,170,290 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,809 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,633,851 >>> mbox cmd response: success
17,638,571 UART: [afmc] ++
17,639,171 UART: [afmc] CDI.KEYID = 6
17,640,085 UART: [afmc] SUBJECT.KEYID = 7
17,641,327 UART: [afmc] AUTHORITY.KEYID = 5
21,002,121 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,315 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,573 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,003 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,333,842 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,249 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,040 UART: [afmc] --
23,373,163 UART: [cold-reset] --
23,376,005 UART: [state] Locking Datavault
23,380,781 UART: [state] Locking PCR0, PCR1 and PCR31
23,382,537 UART: [state] Locking ICCM
23,384,578 UART: [exit] Launching FMC @ 0x40000130
23,392,977 UART:
23,393,212 UART: Running Caliptra FMC ...
23,394,313 UART:
23,394,493 UART: [state] CFI Enabled
23,462,607 UART: [fht] FMC Alias Private Key: 7
25,800,751 UART: [art] Extend RT PCRs Done
25,801,969 UART: [art] Lock RT PCRs Done
25,803,868 UART: [art] Populate DV Done
25,809,338 UART: [fht] FMC Alias Private Key: 7
25,810,885 UART: [art] Derive CDI
25,811,649 UART: [art] Store in in slot 0x4
25,871,884 UART: [art] Derive Key Pair
25,872,928 UART: [art] Store priv key in slot 0x5
29,165,798 UART: [art] Derive Key Pair - Done
29,178,691 UART: [art] Signing Cert with AUTHO
29,179,990 UART: RITY.KEYID = 7
31,467,707 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,213 UART: [art] PUB.X = D35399EE3ED81025F61D75DDEE45C2388A088C782EB8A12EB57112815BDB179A8D61423FFB4629D1C414A91483B1A8BD
31,476,462 UART: [art] PUB.Y = 6168A61F1FD93265ED3822A39158B7669562613272A263E5663A674F835E1F1A9609B6F108F8F726D3F3E0D1926E6531
31,483,662 UART: [art] SIG.R = 15BB4943361A186D847C03B15201EEC1AA89ACAFE28D14DF4C5B6C583039D2AABA9189D2C34BCD5F3EB6B3270382A19E
31,491,049 UART: [art] SIG.S = 59C1F2703F17C24E772F464FC6030F2D7A5D1D394B18868BA10021C3F3521BF9945CF4C9600F8F3C7851707E60EBD3FF
32,796,266 UART: Caliptra RT
32,796,979 UART: [state] CFI Enabled
32,957,155 UART: [rt] RT listening for mailbox commands...
32,959,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,989,051 UART: [rt]cmd =0x44504543, len=24
33,030,812 >>> mbox cmd response data (40 bytes)
33,032,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,062,643 UART: [rt]cmd =0x44504543, len=96
33,069,073 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,780,967 ready_for_fw is high
3,781,353 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,847,041 >>> mbox cmd response: success
23,543,257 UART:
23,543,699 UART: Running Caliptra FMC ...
23,544,809 UART:
23,544,965 UART: [state] CFI Enabled
23,613,573 UART: [fht] FMC Alias Private Key: 7
25,952,210 UART: [art] Extend RT PCRs Done
25,953,445 UART: [art] Lock RT PCRs Done
25,955,292 UART: [art] Populate DV Done
25,960,661 UART: [fht] FMC Alias Private Key: 7
25,962,385 UART: [art] Derive CDI
25,963,208 UART: [art] Store in in slot 0x4
26,022,298 UART: [art] Derive Key Pair
26,023,349 UART: [art] Store priv key in slot 0x5
29,315,872 UART: [art] Derive Key Pair - Done
29,329,145 UART: [art] Signing Cert with AUTHO
29,330,473 UART: RITY.KEYID = 7
31,617,631 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,135 UART: [art] PUB.X = 1BD5EFDBABE185D889D363882259E1E5D0C9C30C409245EAFA173829B313BE6DBB6AA5FEC694AB40C7699679714BC426
31,626,358 UART: [art] PUB.Y = E4F9B5FF461EC29D6ACF03ABC1D8B4E1F0D18B11DC685E8674EA2EAC54FB1CD53DC55AFC7980910F58E172C7EC7CF399
31,633,680 UART: [art] SIG.R = 360D4587516DA31AF36714D14E4545BCB7863BA51429E9899A7BDB054F495C1D605EE18270527664A40A3587726B8713
31,640,994 UART: [art] SIG.S = DDE5ED07DF662C7EEDFB338724CB5E94B67B8B4491060ABCEFD3642EA0A2D54E8DA999E8B89A2A5CAB431F6AE8147203
32,946,111 UART: Caliptra RT
32,946,816 UART: [state] CFI Enabled
33,107,644 UART: [rt] RT listening for mailbox commands...
33,109,562 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,139,605 UART: [rt]cmd =0x44504543, len=24
33,180,448 >>> mbox cmd response data (40 bytes)
33,181,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,212,196 UART: [rt]cmd =0x44504543, len=96
33,219,002 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,331 UART:
192,701 UART: Running Caliptra ROM ...
193,808 UART:
603,366 UART: [state] CFI Enabled
617,456 UART: [state] LifecycleState = Unprovisioned
619,403 UART: [state] DebugLocked = No
621,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,928 UART: [kat] SHA2-256
795,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,211 UART: [kat] ++
806,674 UART: [kat] sha1
817,328 UART: [kat] SHA2-256
820,041 UART: [kat] SHA2-384
825,320 UART: [kat] SHA2-512-ACC
827,688 UART: [kat] ECC-384
3,111,574 UART: [kat] HMAC-384Kdf
3,123,021 UART: [kat] LMS
4,313,160 UART: [kat] --
4,318,505 UART: [cold-reset] ++
4,321,003 UART: [fht] Storing FHT @ 0x50003400
4,331,846 UART: [idev] ++
4,332,475 UART: [idev] CDI.KEYID = 6
4,333,394 UART: [idev] SUBJECT.KEYID = 7
4,334,634 UART: [idev] UDS.KEYID = 0
4,335,730 ready_for_fw is high
4,335,961 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,405 UART: [idev] Erasing UDS.KEYID = 0
7,626,522 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,089 UART: [idev] --
7,652,384 UART: [ldev] ++
7,652,947 UART: [ldev] CDI.KEYID = 6
7,653,904 UART: [ldev] SUBJECT.KEYID = 5
7,655,204 UART: [ldev] AUTHORITY.KEYID = 7
7,656,329 UART: [ldev] FE.KEYID = 1
7,669,403 UART: [ldev] Erasing FE.KEYID = 1
10,959,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,094 UART: [ldev] --
13,318,467 UART: [fwproc] Waiting for Commands...
13,320,517 UART: [fwproc] Received command 0x46574c44
13,322,692 UART: [fwproc] Received Image of size 114124 bytes
17,372,881 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,456 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,335 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,021 >>> mbox cmd response: success
17,839,538 UART: [afmc] ++
17,840,139 UART: [afmc] CDI.KEYID = 6
17,841,047 UART: [afmc] SUBJECT.KEYID = 7
17,842,321 UART: [afmc] AUTHORITY.KEYID = 5
21,162,782 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,756 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,141 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,954 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,435 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,879 UART: [afmc] --
23,529,579 UART: [cold-reset] --
23,531,651 UART: [state] Locking Datavault
23,538,138 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,843 UART: [state] Locking ICCM
23,541,393 UART: [exit] Launching FMC @ 0x40000130
23,549,785 UART:
23,550,014 UART: Running Caliptra FMC ...
23,551,113 UART:
23,551,267 UART: [state] CFI Enabled
23,559,522 UART: [fht] FMC Alias Private Key: 7
25,889,923 UART: [art] Extend RT PCRs Done
25,891,142 UART: [art] Lock RT PCRs Done
25,893,029 UART: [art] Populate DV Done
25,898,170 UART: [fht] FMC Alias Private Key: 7
25,899,812 UART: [art] Derive CDI
25,900,647 UART: [art] Store in in slot 0x4
25,943,177 UART: [art] Derive Key Pair
25,944,193 UART: [art] Store priv key in slot 0x5
29,185,741 UART: [art] Derive Key Pair - Done
29,198,847 UART: [art] Signing Cert with AUTHO
29,200,149 UART: RITY.KEYID = 7
31,479,018 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,525 UART: [art] PUB.X = A4DF8620265A298D00013F459752F523816C6691B6E874BF746FF644C445045A96915AD25B3BE76C16FCB9252EC46ADE
31,487,757 UART: [art] PUB.Y = E0ED03E1ADB27D100AF2E6149412226A86E7CF0C2C0BFFDC3D88D52E4E5A9B9F49CD8D65AC54AAED9798069E7FD834E5
31,495,024 UART: [art] SIG.R = EE30C22D419C789A6F66ECACD1CDC235FE59F133460A46D2F645325EFF37AAC72A502E60F327840EA299D31306746A04
31,502,437 UART: [art] SIG.S = ED3E90D08BA95739198AF9AB4FC55A4063BE49C1108A5DA1926A239FC23C2A9D25FC895949F68FFBBE94B26B476D1F0B
32,807,059 UART: Caliptra RT
32,807,780 UART: [state] CFI Enabled
32,925,008 UART: [rt] RT listening for mailbox commands...
32,926,929 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,957,021 UART: [rt]cmd =0x44504543, len=24
32,983,316 >>> mbox cmd response data (40 bytes)
32,984,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,015,441 UART: [rt]cmd =0x44504543, len=96
33,021,689 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
4,134,224 ready_for_fw is high
4,134,645 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,080,554 >>> mbox cmd response: success
23,716,423 UART:
23,716,807 UART: Running Caliptra FMC ...
23,717,953 UART:
23,718,103 UART: [state] CFI Enabled
23,725,837 UART: [fht] FMC Alias Private Key: 7
26,056,461 UART: [art] Extend RT PCRs Done
26,057,694 UART: [art] Lock RT PCRs Done
26,059,167 UART: [art] Populate DV Done
26,064,595 UART: [fht] FMC Alias Private Key: 7
26,066,254 UART: [art] Derive CDI
26,067,073 UART: [art] Store in in slot 0x4
26,109,735 UART: [art] Derive Key Pair
26,110,777 UART: [art] Store priv key in slot 0x5
29,352,727 UART: [art] Derive Key Pair - Done
29,365,728 UART: [art] Signing Cert with AUTHO
29,367,035 UART: RITY.KEYID = 7
31,646,380 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,884 UART: [art] PUB.X = 305497046F5F44D48B81DEF16380D6AD8FA9BEF00B108E2899411B4F9D99C294D38E71C8B38AC949C07080D48473093A
31,655,112 UART: [art] PUB.Y = 1085CBE5757A0DF77F99B96AEF4C1F584A49C08424B2689582450D41CB74749095EA678DE18648B85A12E6029C85632B
31,662,338 UART: [art] SIG.R = 09BA5C3C901E6F51A2C2CAAA304400E288FCB28799264E712D4AF70FDD313063D8AF300795F3DD20D2605BD1E57A4E36
31,669,714 UART: [art] SIG.S = 068559C2AC2F533B5E715AB169E88286711A6C6E76ADE002E500EF9BDAE36D7EEA11424690C279A7BAAF3CD5D910C763
32,974,412 UART: Caliptra RT
32,975,130 UART: [state] CFI Enabled
33,092,918 UART: [rt] RT listening for mailbox commands...
33,094,845 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,124,713 UART: [rt]cmd =0x44504543, len=24
33,150,853 >>> mbox cmd response data (40 bytes)
33,152,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,182,864 UART: [rt]cmd =0x44504543, len=96
33,189,654 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,096 UART:
192,447 UART: Running Caliptra ROM ...
193,657 UART:
193,829 UART: [state] CFI Enabled
265,911 UART: [state] LifecycleState = Unprovisioned
267,822 UART: [state] DebugLocked = No
270,556 UART: [state] WD Timer not started. Device not locked for debugging
275,079 UART: [kat] SHA2-256
454,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,756 UART: [kat] ++
466,204 UART: [kat] sha1
476,149 UART: [kat] SHA2-256
479,177 UART: [kat] SHA2-384
485,501 UART: [kat] SHA2-512-ACC
488,441 UART: [kat] ECC-384
2,949,139 UART: [kat] HMAC-384Kdf
2,973,623 UART: [kat] LMS
3,503,069 UART: [kat] --
3,508,114 UART: [cold-reset] ++
3,509,475 UART: [fht] FHT @ 0x50003400
3,519,337 UART: [idev] ++
3,519,945 UART: [idev] CDI.KEYID = 6
3,520,842 UART: [idev] SUBJECT.KEYID = 7
3,521,980 UART: [idev] UDS.KEYID = 0
3,522,944 ready_for_fw is high
3,523,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,031 UART: [idev] Erasing UDS.KEYID = 0
6,026,579 UART: [idev] Sha1 KeyId Algorithm
6,050,788 UART: [idev] --
6,055,591 UART: [ldev] ++
6,056,158 UART: [ldev] CDI.KEYID = 6
6,057,042 UART: [ldev] SUBJECT.KEYID = 5
6,058,255 UART: [ldev] AUTHORITY.KEYID = 7
6,059,438 UART: [ldev] FE.KEYID = 1
6,101,629 UART: [ldev] Erasing FE.KEYID = 1
8,605,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,417 UART: [ldev] --
10,414,825 UART: [fwproc] Wait for Commands...
10,417,790 UART: [fwproc] Recv command 0x46574c44
10,419,883 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,132 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,278,748 >>> mbox cmd response: success
14,283,078 UART: [afmc] ++
14,283,671 UART: [afmc] CDI.KEYID = 6
14,284,604 UART: [afmc] SUBJECT.KEYID = 7
14,285,769 UART: [afmc] AUTHORITY.KEYID = 5
16,831,060 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,742 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,742 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,570 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,196 UART: [afmc] --
18,629,758 UART: [cold-reset] --
18,633,672 UART: [state] Locking Datavault
18,640,318 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,025 UART: [state] Locking ICCM
18,643,810 UART: [exit] Launching FMC @ 0x40000130
18,652,266 UART:
18,652,501 UART: Running Caliptra FMC ...
18,653,616 UART:
18,653,778 UART: [state] CFI Enabled
18,712,781 UART: [fht] FMC Alias Private Key: 7
20,476,612 UART: [art] Extend RT PCRs Done
20,477,814 UART: [art] Lock RT PCRs Done
20,479,466 UART: [art] Populate DV Done
20,484,889 UART: [fht] FMC Alias Private Key: 7
20,486,368 UART: [art] Derive CDI
20,487,128 UART: [art] Store in in slot 0x4
20,545,402 UART: [art] Derive Key Pair
20,546,399 UART: [art] Store priv key in slot 0x5
23,008,779 UART: [art] Derive Key Pair - Done
23,021,839 UART: [art] Signing Cert with AUTHO
23,023,146 UART: RITY.KEYID = 7
24,735,331 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,815 UART: [art] PUB.X = DF1B996E7D5A6406CB044DC77C75D1F9083D3D74B61D1507C63245C89062378020D7AF4D49DD107B17FA2C738162248C
24,744,086 UART: [art] PUB.Y = 05298C1F45B063D0D02F6F49BB18A6A4C4BF822EA31F9AD29CFCA125AD9C83A9691D7CF6DABAD950F940198327560942
24,751,385 UART: [art] SIG.R = 5F1A4E7911B223FF9FFC087EC8EB8EDB2169021FE3C6C11CA8CB6B3640C2B7B90CBBC2E3EE2C207139A8F424D1FA044C
24,758,781 UART: [art] SIG.S = 6273D2A134DCDA4C2DED371068D0949462B833E99351F4119CC9DAD5C1E87724941A1312B89C4295561E47A073CF47AA
25,737,959 UART: Caliptra RT
25,738,671 UART: [state] CFI Enabled
25,903,029 UART: [rt] RT listening for mailbox commands...
25,904,950 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,935,487 UART: [rt]cmd =0x44504543, len=24
25,977,002 >>> mbox cmd response data (40 bytes)
25,978,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,008,728 UART: [rt]cmd =0x44504543, len=96
26,015,339 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,381,226 ready_for_fw is high
3,381,755 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,077,113 >>> mbox cmd response: success
18,354,280 UART:
18,354,692 UART: Running Caliptra FMC ...
18,355,901 UART:
18,356,076 UART: [state] CFI Enabled
18,423,441 UART: [fht] FMC Alias Private Key: 7
20,187,251 UART: [art] Extend RT PCRs Done
20,188,479 UART: [art] Lock RT PCRs Done
20,190,332 UART: [art] Populate DV Done
20,195,720 UART: [fht] FMC Alias Private Key: 7
20,197,262 UART: [art] Derive CDI
20,198,077 UART: [art] Store in in slot 0x4
20,255,892 UART: [art] Derive Key Pair
20,256,937 UART: [art] Store priv key in slot 0x5
22,719,728 UART: [art] Derive Key Pair - Done
22,732,626 UART: [art] Signing Cert with AUTHO
22,733,925 UART: RITY.KEYID = 7
24,445,568 UART: [art] Erasing AUTHORITY.KEYID = 7
24,447,428 UART: [art] PUB.X = 04E3EDEA3AF9B332E9420372234227F75F72DB09FF2A6377D9BF8BA42F00C2442DE7C8DC6A7A9E312E27AC1D94ACE10B
24,454,344 UART: [art] PUB.Y = 15AAA08E69F7050075998FE4F294BBC04C2BC3E6682F5BA9E6838C14DC5251F18C0E6C9FB0CB07FE41D73E6B41DFC137
24,461,625 UART: [art] SIG.R = 0B9C05EA9FC17C6021686217FBDD1D90ACF0775DD7EB5DB5AD8D20672F75730D0700F87FC16C09F3E3991C0D145C37C7
24,469,022 UART: [art] SIG.S = 2A2FAC9F1CDECE6B646FA1E643DA8080783A05383AA50CF47562C2BD21B93CBE14CE32C1F9FCFAE5405F25C895DB06C8
25,447,337 UART: Caliptra RT
25,448,044 UART: [state] CFI Enabled
25,613,395 UART: [rt] RT listening for mailbox commands...
25,615,340 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,645,812 UART: [rt]cmd =0x44504543, len=24
25,687,822 >>> mbox cmd response data (40 bytes)
25,689,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,719,749 UART: [rt]cmd =0x44504543, len=96
25,726,006 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,246 UART:
192,609 UART: Running Caliptra ROM ...
193,740 UART:
603,458 UART: [state] CFI Enabled
619,053 UART: [state] LifecycleState = Unprovisioned
620,939 UART: [state] DebugLocked = No
622,249 UART: [state] WD Timer not started. Device not locked for debugging
625,994 UART: [kat] SHA2-256
805,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,686 UART: [kat] ++
817,215 UART: [kat] sha1
829,654 UART: [kat] SHA2-256
832,716 UART: [kat] SHA2-384
838,143 UART: [kat] SHA2-512-ACC
841,143 UART: [kat] ECC-384
3,281,874 UART: [kat] HMAC-384Kdf
3,295,033 UART: [kat] LMS
3,824,501 UART: [kat] --
3,828,442 UART: [cold-reset] ++
3,830,653 UART: [fht] FHT @ 0x50003400
3,841,848 UART: [idev] ++
3,842,405 UART: [idev] CDI.KEYID = 6
3,843,353 UART: [idev] SUBJECT.KEYID = 7
3,844,585 UART: [idev] UDS.KEYID = 0
3,845,505 ready_for_fw is high
3,845,696 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,451 UART: [idev] Erasing UDS.KEYID = 0
6,322,071 UART: [idev] Sha1 KeyId Algorithm
6,345,890 UART: [idev] --
6,350,358 UART: [ldev] ++
6,350,958 UART: [ldev] CDI.KEYID = 6
6,351,867 UART: [ldev] SUBJECT.KEYID = 5
6,353,019 UART: [ldev] AUTHORITY.KEYID = 7
6,354,242 UART: [ldev] FE.KEYID = 1
6,364,012 UART: [ldev] Erasing FE.KEYID = 1
8,836,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,394 UART: [ldev] --
10,630,748 UART: [fwproc] Wait for Commands...
10,632,677 UART: [fwproc] Recv command 0x46574c44
10,634,762 UART: [fwproc] Recv'd Img size: 114448 bytes
14,042,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,622 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,499,354 >>> mbox cmd response: success
14,503,181 UART: [afmc] ++
14,503,776 UART: [afmc] CDI.KEYID = 6
14,504,680 UART: [afmc] SUBJECT.KEYID = 7
14,505,833 UART: [afmc] AUTHORITY.KEYID = 5
17,006,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,307 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,342 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,215 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,991 UART: [afmc] --
18,804,575 UART: [cold-reset] --
18,809,288 UART: [state] Locking Datavault
18,813,877 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,514 UART: [state] Locking ICCM
18,816,959 UART: [exit] Launching FMC @ 0x40000130
18,825,407 UART:
18,825,647 UART: Running Caliptra FMC ...
18,826,741 UART:
18,826,893 UART: [state] CFI Enabled
18,835,010 UART: [fht] FMC Alias Private Key: 7
20,592,203 UART: [art] Extend RT PCRs Done
20,593,427 UART: [art] Lock RT PCRs Done
20,594,885 UART: [art] Populate DV Done
20,600,449 UART: [fht] FMC Alias Private Key: 7
20,601,982 UART: [art] Derive CDI
20,602,788 UART: [art] Store in in slot 0x4
20,645,156 UART: [art] Derive Key Pair
20,646,182 UART: [art] Store priv key in slot 0x5
23,072,803 UART: [art] Derive Key Pair - Done
23,085,854 UART: [art] Signing Cert with AUTHO
23,087,160 UART: RITY.KEYID = 7
24,792,446 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,976 UART: [art] PUB.X = 02F99F869AE75BBB1BDA6F101E9915AB64E012564FBEC88D922C4D3CAA1E737E1075A6D88262CBED74DC8E5373D6C77A
24,801,205 UART: [art] PUB.Y = 684B3F51558015939EBBC36724ADF1D48A32BBE544CA305802E30C8D510C368162F45085CF9225322BE2F6C6EB0F8C38
24,808,474 UART: [art] SIG.R = 298A4821BFF0E764CBB2FCE4B40DDFDF10E098D837FAAF8A5E961BA3BCA5C37C43F9359A3DAA842768586EC44875906A
24,815,920 UART: [art] SIG.S = 4D595644D894655E3134C7805EB1DD77C13307C3D6525DA74FFCB1F7BC5B1B9D45EA5384E9EEE0EB6499CDF03CB0A1B2
25,795,272 UART: Caliptra RT
25,795,965 UART: [state] CFI Enabled
25,913,128 UART: [rt] RT listening for mailbox commands...
25,915,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,944,875 UART: [rt]cmd =0x44504543, len=24
25,971,115 >>> mbox cmd response data (40 bytes)
25,972,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,003,200 UART: [rt]cmd =0x44504543, len=96
26,009,989 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,691,505 ready_for_fw is high
3,692,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,627 >>> mbox cmd response: success
18,511,530 UART:
18,511,920 UART: Running Caliptra FMC ...
18,513,104 UART:
18,513,266 UART: [state] CFI Enabled
18,520,837 UART: [fht] FMC Alias Private Key: 7
20,277,439 UART: [art] Extend RT PCRs Done
20,278,643 UART: [art] Lock RT PCRs Done
20,280,209 UART: [art] Populate DV Done
20,285,780 UART: [fht] FMC Alias Private Key: 7
20,287,260 UART: [art] Derive CDI
20,288,013 UART: [art] Store in in slot 0x4
20,330,767 UART: [art] Derive Key Pair
20,331,776 UART: [art] Store priv key in slot 0x5
22,759,151 UART: [art] Derive Key Pair - Done
22,772,047 UART: [art] Signing Cert with AUTHO
22,773,354 UART: RITY.KEYID = 7
24,478,696 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,173 UART: [art] PUB.X = D311471467F66FAFD225F306A299F50EA726CE07C094844B0FD9C93BA3F6431A7B9A00C33359904BAA4FFB7335A2F788
24,487,454 UART: [art] PUB.Y = 931039681AD0915F44D59B69EB233CF5BC034754C6121B623B00DAFA679783EF4F0FB7BE32FCF2AD3D14BA63F407747B
24,494,686 UART: [art] SIG.R = 88DC0BC139BF573997CDE39DB4FAFACE0D68CCA4579263ABA1C18839D336AD2592E82D14FA7816A537969304EEA18B2A
24,502,071 UART: [art] SIG.S = A4EBCAD955258E94415120B62677C318EA6AD837EA3D14280DB30AA5C72668A3A07F417E4B21CBD6271FC879D1FB42C5
25,480,915 UART: Caliptra RT
25,481,635 UART: [state] CFI Enabled
25,600,754 UART: [rt] RT listening for mailbox commands...
25,602,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,632,781 UART: [rt]cmd =0x44504543, len=24
25,658,753 >>> mbox cmd response data (40 bytes)
25,660,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,690,949 UART: [rt]cmd =0x44504543, len=96
25,697,413 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,439,889 ready_for_fw is high
3,440,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,743,622 >>> mbox cmd response: success
19,035,511 UART:
19,035,923 UART: Running Caliptra FMC ...
19,037,048 UART:
19,037,210 UART: [state] CFI Enabled
19,106,847 UART: [fht] FMC Alias Private Key: 7
20,870,804 UART: [art] Extend RT PCRs Done
20,872,044 UART: [art] Lock RT PCRs Done
20,873,914 UART: [art] Populate DV Done
20,879,383 UART: [fht] FMC Alias Private Key: 7
20,881,036 UART: [art] Derive CDI
20,881,778 UART: [art] Store in in slot 0x4
20,939,583 UART: [art] Derive Key Pair
20,940,629 UART: [art] Store priv key in slot 0x5
23,403,327 UART: [art] Derive Key Pair - Done
23,416,373 UART: [art] Signing Cert with AUTHO
23,417,676 UART: RITY.KEYID = 7
25,129,404 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,911 UART: [art] PUB.X = 3DFE739F8B1C2082AF5BA1BA1D81A08154B660CC10EB67B6BD2ECFEBFA5ED7152D68235F6FE45467EF724D8D78CA8CE1
25,138,226 UART: [art] PUB.Y = F4CC0E7971443E1529B34F4ECD9E3A06BB5C5906430668D17B53109DD2577ABDB0344833BD4D3953364E78C45A977398
25,145,424 UART: [art] SIG.R = 528948BF2014AA66B3A16DA1A085ED2191DC41154AF9608363A7681A32A8B625F898C669E4D0CE328BFF4415DFE73CEC
25,152,816 UART: [art] SIG.S = AA17B82A2943A0C1F1FB6E4441C5262DCDC2DE79E4DBD142BFD52157F90370AC1BFB4A388CFDBB0CF2E167A7DA33A741
26,132,175 UART: Caliptra RT
26,132,883 UART: [state] CFI Enabled
26,297,846 UART: [rt] RT listening for mailbox commands...
26,299,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,330,283 UART: [rt]cmd =0x44504543, len=24
26,371,971 >>> mbox cmd response data (40 bytes)
26,373,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,403,755 UART: [rt]cmd =0x44504543, len=96
26,410,060 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,755,028 ready_for_fw is high
3,755,414 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,487 >>> mbox cmd response: success
19,220,606 UART:
19,220,995 UART: Running Caliptra FMC ...
19,222,124 UART:
19,222,276 UART: [state] CFI Enabled
19,230,545 UART: [fht] FMC Alias Private Key: 7
20,987,750 UART: [art] Extend RT PCRs Done
20,988,968 UART: [art] Lock RT PCRs Done
20,990,863 UART: [art] Populate DV Done
20,996,051 UART: [fht] FMC Alias Private Key: 7
20,997,699 UART: [art] Derive CDI
20,998,505 UART: [art] Store in in slot 0x4
21,040,832 UART: [art] Derive Key Pair
21,041,875 UART: [art] Store priv key in slot 0x5
23,468,809 UART: [art] Derive Key Pair - Done
23,481,868 UART: [art] Signing Cert with AUTHO
23,483,196 UART: RITY.KEYID = 7
25,188,075 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,585 UART: [art] PUB.X = EA0A5731A59C615739C9F973ABA3940355C1F92864278FB909872467CC3A869C3641C20400168009C90077054752659A
25,196,794 UART: [art] PUB.Y = 1DAFC7BD04BD4D65D8F033FE9CD50B58BC614A1C81A8F78D4F6E8DFEE479228946FFC1E03E4E73DE19DE3F04EB92632C
25,204,084 UART: [art] SIG.R = D25DE04B010142D2E420601A3E37FCAD7E822B40EE12E55BF09FFB79F956880D3639538F03B809620BC1EB14E7527C19
25,211,449 UART: [art] SIG.S = 050AE8C6EF762507822EDE15022DC23F011F5174480208F5393EEEE29B6E52DFC9E424B4AB514D71936F0114A6C512E0
26,189,730 UART: Caliptra RT
26,190,424 UART: [state] CFI Enabled
26,307,857 UART: [rt] RT listening for mailbox commands...
26,309,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,339,678 UART: [rt]cmd =0x44504543, len=24
26,366,005 >>> mbox cmd response data (40 bytes)
26,367,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,805 UART: [rt]cmd =0x44504543, len=96
26,404,351 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,227 UART: [kat] SHA2-256
882,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,273 UART: [kat] ++
886,425 UART: [kat] sha1
890,721 UART: [kat] SHA2-256
892,659 UART: [kat] SHA2-384
895,362 UART: [kat] SHA2-512-ACC
897,263 UART: [kat] ECC-384
902,918 UART: [kat] HMAC-384Kdf
907,458 UART: [kat] LMS
1,475,654 UART: [kat] --
1,476,551 UART: [cold-reset] ++
1,476,981 UART: [fht] Storing FHT @ 0x50003400
1,479,586 UART: [idev] ++
1,479,754 UART: [idev] CDI.KEYID = 6
1,480,114 UART: [idev] SUBJECT.KEYID = 7
1,480,538 UART: [idev] UDS.KEYID = 0
1,480,883 ready_for_fw is high
1,480,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,784 UART: [idev] Erasing UDS.KEYID = 0
1,505,178 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,738 UART: [idev] --
1,514,607 UART: [ldev] ++
1,514,775 UART: [ldev] CDI.KEYID = 6
1,515,138 UART: [ldev] SUBJECT.KEYID = 5
1,515,564 UART: [ldev] AUTHORITY.KEYID = 7
1,516,027 UART: [ldev] FE.KEYID = 1
1,521,307 UART: [ldev] Erasing FE.KEYID = 1
1,546,622 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,660 UART: [ldev] --
1,585,969 UART: [fwproc] Waiting for Commands...
1,586,822 UART: [fwproc] Received command 0x46574c44
1,587,613 UART: [fwproc] Received Image of size 114448 bytes
2,886,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,314 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,666 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,637 >>> mbox cmd response: success
3,079,843 UART: [afmc] ++
3,080,011 UART: [afmc] CDI.KEYID = 6
3,080,373 UART: [afmc] SUBJECT.KEYID = 7
3,080,798 UART: [afmc] AUTHORITY.KEYID = 5
3,115,995 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,197 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,977 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,590 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,280 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,107 UART: [afmc] --
3,159,049 UART: [cold-reset] --
3,159,707 UART: [state] Locking Datavault
3,160,954 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,558 UART: [state] Locking ICCM
3,161,996 UART: [exit] Launching FMC @ 0x40000130
3,167,325 UART:
3,167,341 UART: Running Caliptra FMC ...
3,167,749 UART:
3,167,803 UART: [state] CFI Enabled
3,178,380 UART: [fht] FMC Alias Private Key: 7
3,285,601 UART: [art] Extend RT PCRs Done
3,286,029 UART: [art] Lock RT PCRs Done
3,287,555 UART: [art] Populate DV Done
3,296,102 UART: [fht] FMC Alias Private Key: 7
3,297,100 UART: [art] Derive CDI
3,297,380 UART: [art] Store in in slot 0x4
3,382,983 UART: [art] Derive Key Pair
3,383,343 UART: [art] Store priv key in slot 0x5
3,396,705 UART: [art] Derive Key Pair - Done
3,411,163 UART: [art] Signing Cert with AUTHO
3,411,643 UART: RITY.KEYID = 7
3,427,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,808 UART: [art] PUB.X = 163C44F76C6F2FCE3F1C75AB1AA74AB5CC7A597423DE5900EB36276736785C61E1D5D7EE35D9090889BB30D3B3D22DF1
3,434,560 UART: [art] PUB.Y = 837542B497ACE05EB0A49F71F5FAAA3993A97D09CC7AD17A6AE249D2817D3F0EE80A469B1067BCAE66BF6F29F0D77167
3,441,515 UART: [art] SIG.R = E409D2E04020DFF12453F8AB6AC25BB5E0A9A836118380BD71FBF48A4452ADFF6C32ACCA4278143E2DC60DD3B1C38F28
3,448,295 UART: [art] SIG.S = 20A0D2724624F8FAF54C4DC8F36EC3327F4B722EFAFC389FB08CCE2EC69E106337E9EDB239720F2330CEF94CD3F5493F
3,472,241 UART: Caliptra RT
3,472,494 UART: [state] CFI Enabled
3,581,059 UART: [rt] RT listening for mailbox commands...
3,581,729 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,487 UART: [rt]cmd =0x44504543, len=24
3,638,049 >>> mbox cmd response data (40 bytes)
3,638,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,215 UART: [rt]cmd =0x44504543, len=96
3,675,531 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,863 ready_for_fw is high
1,362,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,067 >>> mbox cmd response: success
2,989,399 UART:
2,989,415 UART: Running Caliptra FMC ...
2,989,823 UART:
2,989,877 UART: [state] CFI Enabled
3,000,362 UART: [fht] FMC Alias Private Key: 7
3,108,227 UART: [art] Extend RT PCRs Done
3,108,655 UART: [art] Lock RT PCRs Done
3,110,165 UART: [art] Populate DV Done
3,118,158 UART: [fht] FMC Alias Private Key: 7
3,119,264 UART: [art] Derive CDI
3,119,544 UART: [art] Store in in slot 0x4
3,205,487 UART: [art] Derive Key Pair
3,205,847 UART: [art] Store priv key in slot 0x5
3,219,075 UART: [art] Derive Key Pair - Done
3,233,947 UART: [art] Signing Cert with AUTHO
3,234,427 UART: RITY.KEYID = 7
3,249,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,094 UART: [art] PUB.X = 9334BF78B01B1619FAF9461D61FC807712F6DC7AB07F7217FB685A3668058186ED93DDEDC5FA0EFBBEB4766C3FBF5F51
3,256,874 UART: [art] PUB.Y = A26D8D92C599A0D544E4E5B21FDDDE2A60A1DB1EF4AF2201128996FF9B259B2A86E4679A04CFC9FC87B032B2AF109471
3,263,832 UART: [art] SIG.R = 93243E294C6A1E37A61BD6F500B32315B83F7BB94F356466E23F05F25E4476365A9AAF8D863FD388133F439856F7EDE2
3,270,575 UART: [art] SIG.S = A5924B2249BDB6C9A615444763FECF99F01E04C6E4939EC3EA154CEC12B475C896C7FE7160215183A2FF9844BD285DAF
3,294,515 UART: Caliptra RT
3,294,768 UART: [state] CFI Enabled
3,402,934 UART: [rt] RT listening for mailbox commands...
3,403,604 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,518 UART: [rt]cmd =0x44504543, len=24
3,459,762 >>> mbox cmd response data (40 bytes)
3,459,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,684 UART: [rt]cmd =0x44504543, len=96
3,496,614 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,482 UART: [kat] SHA2-256
882,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,528 UART: [kat] ++
886,680 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,725 UART: [kat] SHA2-512-ACC
897,626 UART: [kat] ECC-384
903,193 UART: [kat] HMAC-384Kdf
908,003 UART: [kat] LMS
1,476,199 UART: [kat] --
1,477,376 UART: [cold-reset] ++
1,477,888 UART: [fht] Storing FHT @ 0x50003400
1,480,539 UART: [idev] ++
1,480,707 UART: [idev] CDI.KEYID = 6
1,481,067 UART: [idev] SUBJECT.KEYID = 7
1,481,491 UART: [idev] UDS.KEYID = 0
1,481,836 ready_for_fw is high
1,481,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,219 UART: [idev] Erasing UDS.KEYID = 0
1,505,897 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,477 UART: [idev] --
1,515,468 UART: [ldev] ++
1,515,636 UART: [ldev] CDI.KEYID = 6
1,515,999 UART: [ldev] SUBJECT.KEYID = 5
1,516,425 UART: [ldev] AUTHORITY.KEYID = 7
1,516,888 UART: [ldev] FE.KEYID = 1
1,522,356 UART: [ldev] Erasing FE.KEYID = 1
1,547,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,967 UART: [ldev] --
1,587,294 UART: [fwproc] Waiting for Commands...
1,588,123 UART: [fwproc] Received command 0x46574c44
1,588,914 UART: [fwproc] Received Image of size 114448 bytes
2,889,887 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,099 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,440 >>> mbox cmd response: success
3,083,540 UART: [afmc] ++
3,083,708 UART: [afmc] CDI.KEYID = 6
3,084,070 UART: [afmc] SUBJECT.KEYID = 7
3,084,495 UART: [afmc] AUTHORITY.KEYID = 5
3,119,776 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,160 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,553 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,243 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,902 UART: [afmc] --
3,162,914 UART: [cold-reset] --
3,163,904 UART: [state] Locking Datavault
3,165,013 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,617 UART: [state] Locking ICCM
3,166,093 UART: [exit] Launching FMC @ 0x40000130
3,171,422 UART:
3,171,438 UART: Running Caliptra FMC ...
3,171,846 UART:
3,171,989 UART: [state] CFI Enabled
3,182,662 UART: [fht] FMC Alias Private Key: 7
3,290,341 UART: [art] Extend RT PCRs Done
3,290,769 UART: [art] Lock RT PCRs Done
3,292,021 UART: [art] Populate DV Done
3,300,028 UART: [fht] FMC Alias Private Key: 7
3,300,996 UART: [art] Derive CDI
3,301,276 UART: [art] Store in in slot 0x4
3,387,377 UART: [art] Derive Key Pair
3,387,737 UART: [art] Store priv key in slot 0x5
3,400,715 UART: [art] Derive Key Pair - Done
3,415,531 UART: [art] Signing Cert with AUTHO
3,416,011 UART: RITY.KEYID = 7
3,431,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,766 UART: [art] PUB.X = 3F2EE1A3812BCF093EAD3606D34EF01D444A3BB46A7C7AFE62D09C8496D66A582F228EC3DF485C38426B6600C2620F9B
3,438,515 UART: [art] PUB.Y = FCFDAD3229699E07AD91C6C0AD04B94ACBAA2DF8C3889881A373FABE3DC45E95C8DEE622C0DD245184918C377CF14FFD
3,445,483 UART: [art] SIG.R = 978092B21C4F752F3BD34F96CBEB720B19E56AC69E4F6DC04DCE894A91B633A0EC4BC7A17DFC287A59583BB0853B9199
3,452,262 UART: [art] SIG.S = 53491A3C5E21F91AB0E0504A263D36597E6966D787AFCA22F2844D39A8017A38A8C52F863A9C401320B61882DCA441B3
3,476,080 UART: Caliptra RT
3,476,425 UART: [state] CFI Enabled
3,583,790 UART: [rt] RT listening for mailbox commands...
3,584,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,378 UART: [rt]cmd =0x44504543, len=24
3,640,264 >>> mbox cmd response data (40 bytes)
3,640,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,670,328 UART: [rt]cmd =0x44504543, len=96
3,677,652 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,106 ready_for_fw is high
1,363,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,782 >>> mbox cmd response: success
2,991,676 UART:
2,991,692 UART: Running Caliptra FMC ...
2,992,100 UART:
2,992,243 UART: [state] CFI Enabled
3,003,080 UART: [fht] FMC Alias Private Key: 7
3,110,733 UART: [art] Extend RT PCRs Done
3,111,161 UART: [art] Lock RT PCRs Done
3,112,531 UART: [art] Populate DV Done
3,120,598 UART: [fht] FMC Alias Private Key: 7
3,121,708 UART: [art] Derive CDI
3,121,988 UART: [art] Store in in slot 0x4
3,207,835 UART: [art] Derive Key Pair
3,208,195 UART: [art] Store priv key in slot 0x5
3,221,431 UART: [art] Derive Key Pair - Done
3,236,365 UART: [art] Signing Cert with AUTHO
3,236,845 UART: RITY.KEYID = 7
3,252,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,086 UART: [art] PUB.X = AE8CED8564943422DC4258B234A00C179D97DEC5D7263C8812F5651A39BD923090A1947E4EE35861F064EFDD33D65967
3,259,851 UART: [art] PUB.Y = 2113904678352BE52E3664FD3998040C81473B116085C4CDBE9B9B3EE2620C29941ED69578619337352A80F18DDF9A8E
3,266,782 UART: [art] SIG.R = C3277952FD159A9A82340FE5962FA46643F55CD333E1AC8FA5E5B696C4DE99C9EFF050F4ABF3DCCE65896F414DE7F606
3,273,560 UART: [art] SIG.S = F41E073FC42F76264837A36A4CF3917B7D7503F3AC2A081FC0490589B6D293889E902EB9B5B2DFA08D2C84C01304A442
3,297,154 UART: Caliptra RT
3,297,499 UART: [state] CFI Enabled
3,406,241 UART: [rt] RT listening for mailbox commands...
3,406,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,773 UART: [rt]cmd =0x44504543, len=24
3,463,453 >>> mbox cmd response data (40 bytes)
3,463,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,467 UART: [rt]cmd =0x44504543, len=96
3,500,979 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,658 UART: [state] LifecycleState = Unprovisioned
85,313 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,094 UART: [kat] SHA2-256
892,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,869 UART: [kat] ++
897,021 UART: [kat] sha1
901,099 UART: [kat] SHA2-256
903,039 UART: [kat] SHA2-384
906,000 UART: [kat] SHA2-512-ACC
907,901 UART: [kat] ECC-384
917,796 UART: [kat] HMAC-384Kdf
922,242 UART: [kat] LMS
1,170,570 UART: [kat] --
1,171,567 UART: [cold-reset] ++
1,172,047 UART: [fht] FHT @ 0x50003400
1,174,526 UART: [idev] ++
1,174,694 UART: [idev] CDI.KEYID = 6
1,175,054 UART: [idev] SUBJECT.KEYID = 7
1,175,478 UART: [idev] UDS.KEYID = 0
1,175,823 ready_for_fw is high
1,175,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,371 UART: [idev] Sha1 KeyId Algorithm
1,208,961 UART: [idev] --
1,210,145 UART: [ldev] ++
1,210,313 UART: [ldev] CDI.KEYID = 6
1,210,676 UART: [ldev] SUBJECT.KEYID = 5
1,211,102 UART: [ldev] AUTHORITY.KEYID = 7
1,211,565 UART: [ldev] FE.KEYID = 1
1,216,677 UART: [ldev] Erasing FE.KEYID = 1
1,242,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,557 UART: [ldev] --
1,282,072 UART: [fwproc] Wait for Commands...
1,282,868 UART: [fwproc] Recv command 0x46574c44
1,283,596 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,866 >>> mbox cmd response: success
2,776,880 UART: [afmc] ++
2,777,048 UART: [afmc] CDI.KEYID = 6
2,777,410 UART: [afmc] SUBJECT.KEYID = 7
2,777,835 UART: [afmc] AUTHORITY.KEYID = 5
2,813,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,937 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,550 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,269 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,077 UART: [afmc] --
2,856,989 UART: [cold-reset] --
2,857,741 UART: [state] Locking Datavault
2,858,770 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,374 UART: [state] Locking ICCM
2,859,932 UART: [exit] Launching FMC @ 0x40000130
2,865,261 UART:
2,865,277 UART: Running Caliptra FMC ...
2,865,685 UART:
2,865,739 UART: [state] CFI Enabled
2,875,808 UART: [fht] FMC Alias Private Key: 7
2,984,175 UART: [art] Extend RT PCRs Done
2,984,603 UART: [art] Lock RT PCRs Done
2,986,519 UART: [art] Populate DV Done
2,994,696 UART: [fht] FMC Alias Private Key: 7
2,995,688 UART: [art] Derive CDI
2,995,968 UART: [art] Store in in slot 0x4
3,081,769 UART: [art] Derive Key Pair
3,082,129 UART: [art] Store priv key in slot 0x5
3,095,109 UART: [art] Derive Key Pair - Done
3,110,165 UART: [art] Signing Cert with AUTHO
3,110,645 UART: RITY.KEYID = 7
3,125,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,732 UART: [art] PUB.X = BB4285BD0A1BC142DD1310882308CE6EE99E93C811EF47B3AF0AA08D7DBDFC7A3ACCD4CBC9274D599E8266579CDB0319
3,133,510 UART: [art] PUB.Y = 9A8F357A567133C0308CBE9BB115528115F462E9A7A62195E9288248AD6A39B8F6626B79C46E23A4B257290D8CCE80D5
3,140,453 UART: [art] SIG.R = 2BC6A1F7912C60F351E7CD33207B56563C8F9D92F125667C3EE9F3F3247E11C0E69BA548E0BD4048198FD53CD688A285
3,147,225 UART: [art] SIG.S = 7A681290032D44EBBEC7B4AC107FD7FE4908EB66A57CDDB840A03DE0AA2DDEBD98B4E155F33632FF0D51A0323A269A87
3,171,459 UART: Caliptra RT
3,171,712 UART: [state] CFI Enabled
3,278,441 UART: [rt] RT listening for mailbox commands...
3,279,111 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,131 UART: [rt]cmd =0x44504543, len=24
3,335,249 >>> mbox cmd response data (40 bytes)
3,335,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,195 UART: [rt]cmd =0x44504543, len=96
3,372,387 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,639 ready_for_fw is high
1,060,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,399 >>> mbox cmd response: success
2,690,027 UART:
2,690,043 UART: Running Caliptra FMC ...
2,690,451 UART:
2,690,505 UART: [state] CFI Enabled
2,700,618 UART: [fht] FMC Alias Private Key: 7
2,808,401 UART: [art] Extend RT PCRs Done
2,808,829 UART: [art] Lock RT PCRs Done
2,810,235 UART: [art] Populate DV Done
2,818,222 UART: [fht] FMC Alias Private Key: 7
2,819,392 UART: [art] Derive CDI
2,819,672 UART: [art] Store in in slot 0x4
2,905,131 UART: [art] Derive Key Pair
2,905,491 UART: [art] Store priv key in slot 0x5
2,918,371 UART: [art] Derive Key Pair - Done
2,933,244 UART: [art] Signing Cert with AUTHO
2,933,724 UART: RITY.KEYID = 7
2,948,566 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,331 UART: [art] PUB.X = D0785154111B7E5E16A63B56DE90C22DCBF7C542FFBFC49FF231CCF71B46CCA25DF8EEA54F83D57C8E3A81394B70C50B
2,956,118 UART: [art] PUB.Y = F3A33E3CB1BCBDB8E3AEB1D5805DC5006789A1BEDBCE39D21FCC4BD7DF4EEF53A809AA1F2931CF942B497A478183054D
2,963,066 UART: [art] SIG.R = EDE557483AB826A0682CBFA45ADFE0AECFF9F69CB8EAB3F568E24AE0C4B6F496FF66169152C2320BDA220F0B31B445EE
2,969,851 UART: [art] SIG.S = A34F575B693502289929EB89A0050DF1F20D6BA17D95FA6EFA6C538771142AADDA81FAD745E9BA25103B65028B79F536
2,994,159 UART: Caliptra RT
2,994,412 UART: [state] CFI Enabled
3,101,668 UART: [rt] RT listening for mailbox commands...
3,102,338 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,960 UART: [rt]cmd =0x44504543, len=24
3,158,470 >>> mbox cmd response data (40 bytes)
3,158,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,274 UART: [rt]cmd =0x44504543, len=96
3,195,500 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,766 UART: [state] DebugLocked = No
86,250 UART: [state] WD Timer not started. Device not locked for debugging
87,503 UART: [kat] SHA2-256
893,153 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,278 UART: [kat] ++
897,430 UART: [kat] sha1
901,606 UART: [kat] SHA2-256
903,546 UART: [kat] SHA2-384
906,375 UART: [kat] SHA2-512-ACC
908,276 UART: [kat] ECC-384
918,091 UART: [kat] HMAC-384Kdf
922,675 UART: [kat] LMS
1,171,003 UART: [kat] --
1,171,768 UART: [cold-reset] ++
1,172,168 UART: [fht] FHT @ 0x50003400
1,174,835 UART: [idev] ++
1,175,003 UART: [idev] CDI.KEYID = 6
1,175,363 UART: [idev] SUBJECT.KEYID = 7
1,175,787 UART: [idev] UDS.KEYID = 0
1,176,132 ready_for_fw is high
1,176,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,851 UART: [idev] Erasing UDS.KEYID = 0
1,200,774 UART: [idev] Sha1 KeyId Algorithm
1,209,064 UART: [idev] --
1,210,114 UART: [ldev] ++
1,210,282 UART: [ldev] CDI.KEYID = 6
1,210,645 UART: [ldev] SUBJECT.KEYID = 5
1,211,071 UART: [ldev] AUTHORITY.KEYID = 7
1,211,534 UART: [ldev] FE.KEYID = 1
1,217,060 UART: [ldev] Erasing FE.KEYID = 1
1,243,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,378 UART: [ldev] --
1,282,837 UART: [fwproc] Wait for Commands...
1,283,525 UART: [fwproc] Recv command 0x46574c44
1,284,253 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,462 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,433 >>> mbox cmd response: success
2,778,443 UART: [afmc] ++
2,778,611 UART: [afmc] CDI.KEYID = 6
2,778,973 UART: [afmc] SUBJECT.KEYID = 7
2,779,398 UART: [afmc] AUTHORITY.KEYID = 5
2,815,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,134 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,862 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,747 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,466 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,334 UART: [afmc] --
2,858,270 UART: [cold-reset] --
2,859,240 UART: [state] Locking Datavault
2,860,375 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,979 UART: [state] Locking ICCM
2,861,529 UART: [exit] Launching FMC @ 0x40000130
2,866,858 UART:
2,866,874 UART: Running Caliptra FMC ...
2,867,282 UART:
2,867,425 UART: [state] CFI Enabled
2,878,024 UART: [fht] FMC Alias Private Key: 7
2,985,741 UART: [art] Extend RT PCRs Done
2,986,169 UART: [art] Lock RT PCRs Done
2,987,769 UART: [art] Populate DV Done
2,996,272 UART: [fht] FMC Alias Private Key: 7
2,997,392 UART: [art] Derive CDI
2,997,672 UART: [art] Store in in slot 0x4
3,083,353 UART: [art] Derive Key Pair
3,083,713 UART: [art] Store priv key in slot 0x5
3,096,981 UART: [art] Derive Key Pair - Done
3,111,522 UART: [art] Signing Cert with AUTHO
3,112,002 UART: RITY.KEYID = 7
3,127,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,125 UART: [art] PUB.X = 66E5F6F4151217901FDE1C6D9C91A7D6D8F10ADCF79946E9111E5E657FF570DC9403535ED912C0298E72B1DA298D3EF0
3,134,895 UART: [art] PUB.Y = E083707B60774D8C02D0A322E958ADE802AB9EA4CC4F637C22D810FB731BBEC2EB1B2CEE9C77A3FE35939928F5B2F57F
3,141,855 UART: [art] SIG.R = 8AD85BC231A58184C35C898D5D6DE223120CE09E6A34693D199E8EEF79CEE334E30EEAA7934BEEB3EDDE21A7DE61FA77
3,148,639 UART: [art] SIG.S = 54E1636B230EEBE7F437D60A6BAE893CFAC9AD236B8DC2B854E592F003BF3C542A61FC9B3F035989191DBBC73395F9A9
3,172,878 UART: Caliptra RT
3,173,223 UART: [state] CFI Enabled
3,279,836 UART: [rt] RT listening for mailbox commands...
3,280,506 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,404 UART: [rt]cmd =0x44504543, len=24
3,336,404 >>> mbox cmd response data (40 bytes)
3,336,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,278 UART: [rt]cmd =0x44504543, len=96
3,373,446 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,724 ready_for_fw is high
1,060,724 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,164 >>> mbox cmd response: success
2,692,160 UART:
2,692,176 UART: Running Caliptra FMC ...
2,692,584 UART:
2,692,727 UART: [state] CFI Enabled
2,703,416 UART: [fht] FMC Alias Private Key: 7
2,811,825 UART: [art] Extend RT PCRs Done
2,812,253 UART: [art] Lock RT PCRs Done
2,813,649 UART: [art] Populate DV Done
2,821,688 UART: [fht] FMC Alias Private Key: 7
2,822,718 UART: [art] Derive CDI
2,822,998 UART: [art] Store in in slot 0x4
2,908,703 UART: [art] Derive Key Pair
2,909,063 UART: [art] Store priv key in slot 0x5
2,922,445 UART: [art] Derive Key Pair - Done
2,936,943 UART: [art] Signing Cert with AUTHO
2,937,423 UART: RITY.KEYID = 7
2,952,497 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,262 UART: [art] PUB.X = C470D08D04FE572EB8B2299E94E97C57ECCA2A293B0F697F72C7246FC70C3251FD40FBD43BECF170027432CD653865EE
2,960,030 UART: [art] PUB.Y = 5B5806F00720A44B64270335005B7731BD578BCB991B3516682C152AEA9C35A32DA10D4082C020FD691C6CCBFEA30165
2,966,941 UART: [art] SIG.R = 389754B7230647A238BC8AE71D3FE658B3AE65CC55CBD48970BFC1BAC92942E47788F7B3CBF3BB6BD3DF1CEFBAD4BBED
2,973,736 UART: [art] SIG.S = 73C287EDB58B8BA0B62C13ECAA8B2346E42BEAF2D420654A64B10277DBFCE90488AF885D7BAE696A8DE9A5D808CC75A1
2,997,472 UART: Caliptra RT
2,997,817 UART: [state] CFI Enabled
3,106,996 UART: [rt] RT listening for mailbox commands...
3,107,666 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,406 UART: [rt]cmd =0x44504543, len=24
3,163,556 >>> mbox cmd response data (40 bytes)
3,163,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,496 UART: [rt]cmd =0x44504543, len=96
3,200,668 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,722 UART: [kat] SHA2-512-ACC
906,623 UART: [kat] ECC-384
916,340 UART: [kat] HMAC-384Kdf
921,016 UART: [kat] LMS
1,169,328 UART: [kat] --
1,170,321 UART: [cold-reset] ++
1,170,863 UART: [fht] FHT @ 0x50003400
1,173,611 UART: [idev] ++
1,173,779 UART: [idev] CDI.KEYID = 6
1,174,140 UART: [idev] SUBJECT.KEYID = 7
1,174,565 UART: [idev] UDS.KEYID = 0
1,174,911 ready_for_fw is high
1,174,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,129 UART: [idev] Erasing UDS.KEYID = 0
1,200,055 UART: [idev] Sha1 KeyId Algorithm
1,208,787 UART: [idev] --
1,209,720 UART: [ldev] ++
1,209,888 UART: [ldev] CDI.KEYID = 6
1,210,252 UART: [ldev] SUBJECT.KEYID = 5
1,210,679 UART: [ldev] AUTHORITY.KEYID = 7
1,211,142 UART: [ldev] FE.KEYID = 1
1,215,934 UART: [ldev] Erasing FE.KEYID = 1
1,242,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,760 UART: [ldev] --
1,282,248 UART: [fwproc] Wait for Commands...
1,282,825 UART: [fwproc] Recv command 0x46574c44
1,283,558 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,209 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,442 >>> mbox cmd response: success
2,777,461 UART: [afmc] ++
2,777,629 UART: [afmc] CDI.KEYID = 6
2,777,992 UART: [afmc] SUBJECT.KEYID = 7
2,778,418 UART: [afmc] AUTHORITY.KEYID = 5
2,813,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,612 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,002 UART: [afmc] --
2,857,052 UART: [cold-reset] --
2,857,944 UART: [state] Locking Datavault
2,859,137 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,741 UART: [state] Locking ICCM
2,860,313 UART: [exit] Launching FMC @ 0x40000130
2,865,642 UART:
2,865,658 UART: Running Caliptra FMC ...
2,866,066 UART:
2,866,120 UART: [state] CFI Enabled
2,876,849 UART: [fht] FMC Alias Private Key: 7
2,984,714 UART: [art] Extend RT PCRs Done
2,985,142 UART: [art] Lock RT PCRs Done
2,986,898 UART: [art] Populate DV Done
2,995,013 UART: [fht] FMC Alias Private Key: 7
2,995,987 UART: [art] Derive CDI
2,996,267 UART: [art] Store in in slot 0x4
3,082,270 UART: [art] Derive Key Pair
3,082,630 UART: [art] Store priv key in slot 0x5
3,095,460 UART: [art] Derive Key Pair - Done
3,110,033 UART: [art] Signing Cert with AUTHO
3,110,513 UART: RITY.KEYID = 7
3,125,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,558 UART: [art] PUB.X = 89CC01C2380B770D15E6F6DDF0D2CC3270F1F83731ADD80B649F893638A72E26613637CEA4255248F15AD6DA0494D9C7
3,133,315 UART: [art] PUB.Y = BC33AA8EE148DEF57759D8E54630726748D33C8B150BCE85BB72D891A7DEB502768DD913E69DC9A28DF2362EE8034113
3,140,262 UART: [art] SIG.R = 490BB3F350DCF0D9C7747F1322F6A2F78740DED8EBFD240CD2AFC4D76ACA9B4928C2772906FB0D7450C9BCB8241044AA
3,147,036 UART: [art] SIG.S = 275CEF437616E52C4A57860E29C41D0DC689F79CE2AAF09D6EFCE5308BA0C5D3CE08A2937760E2B677D0096F1F2C4594
3,170,891 UART: Caliptra RT
3,171,144 UART: [state] CFI Enabled
3,279,225 UART: [rt] RT listening for mailbox commands...
3,279,895 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,049 UART: [rt]cmd =0x44504543, len=24
3,336,411 >>> mbox cmd response data (40 bytes)
3,336,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,343 UART: [rt]cmd =0x44504543, len=96
3,373,593 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,108 ready_for_fw is high
1,055,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,160 >>> mbox cmd response: success
2,685,034 UART:
2,685,050 UART: Running Caliptra FMC ...
2,685,458 UART:
2,685,512 UART: [state] CFI Enabled
2,695,961 UART: [fht] FMC Alias Private Key: 7
2,804,334 UART: [art] Extend RT PCRs Done
2,804,762 UART: [art] Lock RT PCRs Done
2,806,438 UART: [art] Populate DV Done
2,814,897 UART: [fht] FMC Alias Private Key: 7
2,815,897 UART: [art] Derive CDI
2,816,177 UART: [art] Store in in slot 0x4
2,901,998 UART: [art] Derive Key Pair
2,902,358 UART: [art] Store priv key in slot 0x5
2,915,704 UART: [art] Derive Key Pair - Done
2,930,466 UART: [art] Signing Cert with AUTHO
2,930,946 UART: RITY.KEYID = 7
2,946,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,903 UART: [art] PUB.X = BA55B918CD4E7DB99F8CA6CAD0A774E57EDDBBE09E9D7E902646E3939F88096630359AF89E695CCAB5E7CFA616C0B0A5
2,953,690 UART: [art] PUB.Y = 097E89B5795A9A5ABDB8FF8D16F0393815550BF53E34539CF743ADFF4A70C31FAE566007E81EAF3FB9EC719D9DB2AC04
2,960,644 UART: [art] SIG.R = 5F42C8A65CF4E01AF1193EEC054ED2DCEFC07FA8C7DE40701B5ECA4A9B0D5C0C14D29DC3D1E023B58DE657585F0456D8
2,967,424 UART: [art] SIG.S = 13B8FA09411A6D9585E9A4690406B6F5E5989C31F99E5B5317F9A4B0435D7F6C12EABD37410E94D7F02E4A546AF3B11F
2,991,243 UART: Caliptra RT
2,991,496 UART: [state] CFI Enabled
3,099,439 UART: [rt] RT listening for mailbox commands...
3,100,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,225 UART: [rt]cmd =0x44504543, len=24
3,156,135 >>> mbox cmd response data (40 bytes)
3,156,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,953 UART: [rt]cmd =0x44504543, len=96
3,193,227 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,313 UART: [kat] SHA2-256
891,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,992 UART: [kat] ++
896,144 UART: [kat] sha1
900,264 UART: [kat] SHA2-256
902,204 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
916,353 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,480 UART: [cold-reset] ++
1,170,922 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,174,898 ready_for_fw is high
1,174,898 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,610 UART: [idev] Erasing UDS.KEYID = 0
1,198,964 UART: [idev] Sha1 KeyId Algorithm
1,207,724 UART: [idev] --
1,208,979 UART: [ldev] ++
1,209,147 UART: [ldev] CDI.KEYID = 6
1,209,511 UART: [ldev] SUBJECT.KEYID = 5
1,209,938 UART: [ldev] AUTHORITY.KEYID = 7
1,210,401 UART: [ldev] FE.KEYID = 1
1,215,607 UART: [ldev] Erasing FE.KEYID = 1
1,242,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,727 UART: [ldev] --
1,281,147 UART: [fwproc] Wait for Commands...
1,281,890 UART: [fwproc] Recv command 0x46574c44
1,282,623 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,149 >>> mbox cmd response: success
2,774,204 UART: [afmc] ++
2,774,372 UART: [afmc] CDI.KEYID = 6
2,774,735 UART: [afmc] SUBJECT.KEYID = 7
2,775,161 UART: [afmc] AUTHORITY.KEYID = 5
2,810,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,478 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,941 UART: [afmc] --
2,853,913 UART: [cold-reset] --
2,854,651 UART: [state] Locking Datavault
2,855,842 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,446 UART: [state] Locking ICCM
2,856,956 UART: [exit] Launching FMC @ 0x40000130
2,862,285 UART:
2,862,301 UART: Running Caliptra FMC ...
2,862,709 UART:
2,862,852 UART: [state] CFI Enabled
2,873,447 UART: [fht] FMC Alias Private Key: 7
2,981,574 UART: [art] Extend RT PCRs Done
2,982,002 UART: [art] Lock RT PCRs Done
2,983,714 UART: [art] Populate DV Done
2,992,153 UART: [fht] FMC Alias Private Key: 7
2,993,149 UART: [art] Derive CDI
2,993,429 UART: [art] Store in in slot 0x4
3,078,760 UART: [art] Derive Key Pair
3,079,120 UART: [art] Store priv key in slot 0x5
3,093,174 UART: [art] Derive Key Pair - Done
3,107,964 UART: [art] Signing Cert with AUTHO
3,108,444 UART: RITY.KEYID = 7
3,123,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,629 UART: [art] PUB.X = 223B96BAC5C3BC49D4571D930F3BF1718DF6DCE73D58D67DBFE7B6A25B87D0677E482AC6C925660867B633469E807F34
3,131,399 UART: [art] PUB.Y = 39B476F12A960030E55EBC109D872ECF330733D747528B1DF5D76CF40F077AECEB1E9DD06AB4E17FE7FEA65E137032B9
3,138,330 UART: [art] SIG.R = 304F5D7F050A451985EB19ACE8A1DC764D4D4E2908C0EDBA75AC9512E5C390548C87F481847073F9F496E89CCB2A986F
3,145,097 UART: [art] SIG.S = 23B873EC78D381AC9232478D09AD85B4C11B8B2B520BF9AEB336630A0E42D87949DB2996D70BC70648D7E85802DE54A0
3,168,877 UART: Caliptra RT
3,169,222 UART: [state] CFI Enabled
3,276,915 UART: [rt] RT listening for mailbox commands...
3,277,585 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,661 UART: [rt]cmd =0x44504543, len=24
3,334,533 >>> mbox cmd response data (40 bytes)
3,334,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,293 UART: [rt]cmd =0x44504543, len=96
3,371,519 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,727 ready_for_fw is high
1,056,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,441 >>> mbox cmd response: success
2,688,273 UART:
2,688,289 UART: Running Caliptra FMC ...
2,688,697 UART:
2,688,840 UART: [state] CFI Enabled
2,699,629 UART: [fht] FMC Alias Private Key: 7
2,807,354 UART: [art] Extend RT PCRs Done
2,807,782 UART: [art] Lock RT PCRs Done
2,809,422 UART: [art] Populate DV Done
2,817,659 UART: [fht] FMC Alias Private Key: 7
2,818,695 UART: [art] Derive CDI
2,818,975 UART: [art] Store in in slot 0x4
2,904,222 UART: [art] Derive Key Pair
2,904,582 UART: [art] Store priv key in slot 0x5
2,917,522 UART: [art] Derive Key Pair - Done
2,932,437 UART: [art] Signing Cert with AUTHO
2,932,917 UART: RITY.KEYID = 7
2,948,017 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,782 UART: [art] PUB.X = 8D935A533FB57442EA471A723565F77EC0FDF76C389669AAA6C634530FA9E9B5674F00A1D149DE82ED6F64A34213EEC0
2,955,533 UART: [art] PUB.Y = 29ED30D05C7AC02AB35BEC5685FB1E027AA3FF3BB7872CDB4A01EB5A49CBB57985673087CD88D86F8A1988A7512AEEE8
2,962,495 UART: [art] SIG.R = 441E9B44FAB0125F82D3D31413F45E587559E550688800ED2BFA320071E29449615151CB065A4AB03BA4A73829A3028E
2,969,207 UART: [art] SIG.S = F2CF0ED6B0D6BFE4B1E8AAC52CE18A35B8D5D130F3CCCD630AD446D6A3DE1813A0E6B6E4A1164478D6C6F06E975D484F
2,993,478 UART: Caliptra RT
2,993,823 UART: [state] CFI Enabled
3,101,774 UART: [rt] RT listening for mailbox commands...
3,102,444 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,534 UART: [rt]cmd =0x44504543, len=24
3,158,486 >>> mbox cmd response data (40 bytes)
3,158,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,730 UART: [rt]cmd =0x44504543, len=96
3,195,678 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,294 UART:
192,659 UART: Running Caliptra ROM ...
193,851 UART:
194,006 UART: [state] CFI Enabled
263,200 UART: [state] LifecycleState = Unprovisioned
265,118 UART: [state] DebugLocked = No
266,798 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,308 UART: [kat] SHA2-256
442,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,534 UART: [kat] ++
453,019 UART: [kat] sha1
463,689 UART: [kat] SHA2-256
466,411 UART: [kat] SHA2-384
471,075 UART: [kat] SHA2-512-ACC
473,415 UART: [kat] ECC-384
2,767,851 UART: [kat] HMAC-384Kdf
2,801,050 UART: [kat] LMS
3,991,304 UART: [kat] --
3,997,339 UART: [cold-reset] ++
3,998,789 UART: [fht] Storing FHT @ 0x50003400
4,010,861 UART: [idev] ++
4,011,430 UART: [idev] CDI.KEYID = 6
4,012,419 UART: [idev] SUBJECT.KEYID = 7
4,013,667 UART: [idev] UDS.KEYID = 0
4,014,756 ready_for_fw is high
4,014,973 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,581 UART: [idev] Erasing UDS.KEYID = 0
7,346,339 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,434 UART: [idev] --
7,370,770 UART: [ldev] ++
7,371,347 UART: [ldev] CDI.KEYID = 6
7,372,291 UART: [ldev] SUBJECT.KEYID = 5
7,373,502 UART: [ldev] AUTHORITY.KEYID = 7
7,374,830 UART: [ldev] FE.KEYID = 1
7,401,527 UART: [ldev] Erasing FE.KEYID = 1
10,735,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,498 UART: [ldev] --
13,116,526 UART: [fwproc] Waiting for Commands...
13,119,002 UART: [fwproc] Received command 0x46574c44
13,121,197 UART: [fwproc] Received Image of size 114124 bytes
17,179,700 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,135 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,326,978 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,644,546 >>> mbox cmd response: success
17,647,975 UART: [afmc] ++
17,648,572 UART: [afmc] CDI.KEYID = 6
17,649,596 UART: [afmc] SUBJECT.KEYID = 7
17,650,757 UART: [afmc] AUTHORITY.KEYID = 5
21,008,544 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,755 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,009 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,438 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,280 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,708 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,205 UART: [afmc] --
23,379,591 UART: [cold-reset] --
23,384,097 UART: [state] Locking Datavault
23,390,699 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,451 UART: [state] Locking ICCM
23,394,740 UART: [exit] Launching FMC @ 0x40000130
23,403,140 UART:
23,403,378 UART: Running Caliptra FMC ...
23,404,479 UART:
23,404,642 UART: [state] CFI Enabled
23,467,053 UART: [fht] FMC Alias Private Key: 7
25,805,016 UART: [art] Extend RT PCRs Done
25,806,264 UART: [art] Lock RT PCRs Done
25,807,854 UART: [art] Populate DV Done
25,813,377 UART: [fht] FMC Alias Private Key: 7
25,815,129 UART: [art] Derive CDI
25,815,865 UART: [art] Store in in slot 0x4
25,875,554 UART: [art] Derive Key Pair
25,876,590 UART: [art] Store priv key in slot 0x5
29,169,615 UART: [art] Derive Key Pair - Done
29,182,342 UART: [art] Signing Cert with AUTHO
29,183,642 UART: RITY.KEYID = 7
31,470,770 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,272 UART: [art] PUB.X = 2416B86800CBD169F0A9950E1386D896AFFE164AC4166D3CF1DF946CF6B9BEC08A40999861D011141BC8FCB028978ADB
31,479,516 UART: [art] PUB.Y = AA22BE3132A2F78D0BA1BB0DBE26F23AAED4567D8DEAA7D413C5270A63DA56A0C3669E97785AE48050B311632C2CE34A
31,486,791 UART: [art] SIG.R = BFD988FE3E8129C50FBA20917D8B003A051A3BB88E9486BEA3273EB2F4C6AE55AAF688AEC0F43FC38C48A4F2AB926013
31,494,207 UART: [art] SIG.S = F97482597E60D67A9651207F6BBB2BA8C55E5A8315AA0C915313F9F6C5DA6EB99D0CAEF654DB6716D40F437E68798BE4
32,799,178 UART: Caliptra RT
32,799,886 UART: [state] CFI Enabled
32,960,773 UART: [rt] RT listening for mailbox commands...
32,962,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,993,131 UART: [rt]cmd =0x44504543, len=96
32,999,535 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,783,827 ready_for_fw is high
3,784,413 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,872,291 >>> mbox cmd response: success
23,566,939 UART:
23,567,317 UART: Running Caliptra FMC ...
23,568,454 UART:
23,568,617 UART: [state] CFI Enabled
23,637,337 UART: [fht] FMC Alias Private Key: 7
25,975,228 UART: [art] Extend RT PCRs Done
25,976,456 UART: [art] Lock RT PCRs Done
25,978,323 UART: [art] Populate DV Done
25,983,856 UART: [fht] FMC Alias Private Key: 7
25,985,512 UART: [art] Derive CDI
25,986,334 UART: [art] Store in in slot 0x4
26,046,256 UART: [art] Derive Key Pair
26,047,275 UART: [art] Store priv key in slot 0x5
29,340,864 UART: [art] Derive Key Pair - Done
29,353,864 UART: [art] Signing Cert with AUTHO
29,355,199 UART: RITY.KEYID = 7
31,642,936 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,438 UART: [art] PUB.X = 7417F6FC7FAB712160F4233D7EAD3A5D1E2EE6DEAB4B38FB2C881BF7BA39199AE91585D8DC42774DC4B399C05281703F
31,651,713 UART: [art] PUB.Y = 9D8D79E0571AC7E9ABB82B270AF61760163013433A47577A3147D51A15309609C1FC25ABED87B330E28214C37732DF00
31,658,924 UART: [art] SIG.R = 8E2962E4D0BB2CFB40A4E83607FF7FE59A5283332E7013CE69086516CF62D4B20E8E0472AF2D6FA34848DEF2C700D4E8
31,666,300 UART: [art] SIG.S = 820C382F123CC7CEA0CB885C1CF6CA3073E8D3F8177DD0C9F03156B949962344CC1DD68D6022B9B1D737FF7DE703AFA7
32,971,249 UART: Caliptra RT
32,971,961 UART: [state] CFI Enabled
33,131,774 UART: [rt] RT listening for mailbox commands...
33,133,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,164,265 UART: [rt]cmd =0x44504543, len=96
33,171,004 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,317 UART:
192,684 UART: Running Caliptra ROM ...
193,815 UART:
603,618 UART: [state] CFI Enabled
617,357 UART: [state] LifecycleState = Unprovisioned
619,316 UART: [state] DebugLocked = No
621,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,272 UART: [kat] SHA2-256
796,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,526 UART: [kat] ++
807,000 UART: [kat] sha1
817,162 UART: [kat] SHA2-256
819,879 UART: [kat] SHA2-384
825,436 UART: [kat] SHA2-512-ACC
827,793 UART: [kat] ECC-384
3,110,410 UART: [kat] HMAC-384Kdf
3,122,072 UART: [kat] LMS
4,312,198 UART: [kat] --
4,316,224 UART: [cold-reset] ++
4,317,871 UART: [fht] Storing FHT @ 0x50003400
4,329,489 UART: [idev] ++
4,330,071 UART: [idev] CDI.KEYID = 6
4,331,106 UART: [idev] SUBJECT.KEYID = 7
4,332,277 UART: [idev] UDS.KEYID = 0
4,333,257 ready_for_fw is high
4,333,775 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,288 UART: [idev] Erasing UDS.KEYID = 0
7,621,332 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,185 UART: [idev] --
7,644,700 UART: [ldev] ++
7,645,288 UART: [ldev] CDI.KEYID = 6
7,646,254 UART: [ldev] SUBJECT.KEYID = 5
7,647,462 UART: [ldev] AUTHORITY.KEYID = 7
7,648,690 UART: [ldev] FE.KEYID = 1
7,660,519 UART: [ldev] Erasing FE.KEYID = 1
10,947,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,165 UART: [ldev] --
13,309,824 UART: [fwproc] Waiting for Commands...
13,312,122 UART: [fwproc] Received command 0x46574c44
13,314,297 UART: [fwproc] Received Image of size 114124 bytes
17,369,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,429 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,329 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,829,797 >>> mbox cmd response: success
17,833,171 UART: [afmc] ++
17,833,830 UART: [afmc] CDI.KEYID = 6
17,834,738 UART: [afmc] SUBJECT.KEYID = 7
17,835,946 UART: [afmc] AUTHORITY.KEYID = 5
21,153,219 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,455 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,708 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,080 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,934 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,360 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,118 UART: [afmc] --
23,519,569 UART: [cold-reset] --
23,524,396 UART: [state] Locking Datavault
23,531,476 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,169 UART: [state] Locking ICCM
23,535,583 UART: [exit] Launching FMC @ 0x40000130
23,543,974 UART:
23,544,214 UART: Running Caliptra FMC ...
23,545,336 UART:
23,545,491 UART: [state] CFI Enabled
23,553,499 UART: [fht] FMC Alias Private Key: 7
25,883,642 UART: [art] Extend RT PCRs Done
25,884,859 UART: [art] Lock RT PCRs Done
25,886,506 UART: [art] Populate DV Done
25,891,919 UART: [fht] FMC Alias Private Key: 7
25,893,625 UART: [art] Derive CDI
25,894,437 UART: [art] Store in in slot 0x4
25,937,349 UART: [art] Derive Key Pair
25,938,339 UART: [art] Store priv key in slot 0x5
29,180,440 UART: [art] Derive Key Pair - Done
29,193,649 UART: [art] Signing Cert with AUTHO
29,194,944 UART: RITY.KEYID = 7
31,474,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,154 UART: [art] PUB.X = 5F08923C2E08FE653699C63DDA616DC8BEB743D9B83A31F0CD034ED6596F7CFECB6AC0A11336992B6E43780A54785C29
31,483,321 UART: [art] PUB.Y = 1620BAD0DDF351839FC5CE99E3687556EE34465D5E732015E2D23E536FD72DE36B6BC540A27B860A8027C8231A78408F
31,490,590 UART: [art] SIG.R = D8F940D4E0908EE6C7955C37C566FBE3C84401DB8B8423F2D91CF0AFDCB12788475A5A9AED6CF6406596D8391AC3E7F9
31,497,956 UART: [art] SIG.S = 21770A2BA36C66D7887489A09F6AB202928BA856ED1DED77FB135E5005B0E476B807A0ECC20DA9579ECC875FB762085D
32,803,094 UART: Caliptra RT
32,803,794 UART: [state] CFI Enabled
32,921,677 UART: [rt] RT listening for mailbox commands...
32,923,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,954,245 UART: [rt]cmd =0x44504543, len=96
32,960,645 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
4,126,295 ready_for_fw is high
4,126,719 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,067,800 >>> mbox cmd response: success
23,715,095 UART:
23,715,486 UART: Running Caliptra FMC ...
23,716,576 UART:
23,716,743 UART: [state] CFI Enabled
23,724,646 UART: [fht] FMC Alias Private Key: 7
26,055,489 UART: [art] Extend RT PCRs Done
26,056,719 UART: [art] Lock RT PCRs Done
26,058,591 UART: [art] Populate DV Done
26,064,228 UART: [fht] FMC Alias Private Key: 7
26,065,824 UART: [art] Derive CDI
26,066,643 UART: [art] Store in in slot 0x4
26,108,974 UART: [art] Derive Key Pair
26,109,970 UART: [art] Store priv key in slot 0x5
29,351,849 UART: [art] Derive Key Pair - Done
29,365,125 UART: [art] Signing Cert with AUTHO
29,366,437 UART: RITY.KEYID = 7
31,645,873 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,376 UART: [art] PUB.X = 7D8C94601A0BC0535DB402A4248FE5EC8DA5AD5A452B81D168AF98909D49F2ED547A5C3A106C6A8F11CA7749BD396C46
31,654,630 UART: [art] PUB.Y = 812DE0A81AE9F845FE21059FC3009B9384D1AF6BDD28A77A0C8ADAE35F823F9F6578BEAE604E9E56B17D03B815529B7C
31,661,879 UART: [art] SIG.R = 43CBB397E8978A09540B1EFF31CE655D34F57A3916E5910D634FCDE4EF62FCDDA7F6FF1C6AE01B986ECB7321CFA5F205
31,669,326 UART: [art] SIG.S = C6C3F18B3C67FFC9E7C1642CE98083026922CB60A08A92557062FD9C6AD7E538E2745FA2229BBF0EE9A6797DF45AE9F2
32,974,911 UART: Caliptra RT
32,975,626 UART: [state] CFI Enabled
33,092,003 UART: [rt] RT listening for mailbox commands...
33,093,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,124,588 UART: [rt]cmd =0x44504543, len=96
33,131,155 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,096 UART:
192,457 UART: Running Caliptra ROM ...
193,653 UART:
193,811 UART: [state] CFI Enabled
268,378 UART: [state] LifecycleState = Unprovisioned
270,300 UART: [state] DebugLocked = No
272,899 UART: [state] WD Timer not started. Device not locked for debugging
277,425 UART: [kat] SHA2-256
456,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
468,088 UART: [kat] ++
468,641 UART: [kat] sha1
480,660 UART: [kat] SHA2-256
483,738 UART: [kat] SHA2-384
489,795 UART: [kat] SHA2-512-ACC
492,725 UART: [kat] ECC-384
2,946,691 UART: [kat] HMAC-384Kdf
2,971,352 UART: [kat] LMS
3,500,763 UART: [kat] --
3,506,817 UART: [cold-reset] ++
3,509,100 UART: [fht] FHT @ 0x50003400
3,520,287 UART: [idev] ++
3,520,849 UART: [idev] CDI.KEYID = 6
3,521,760 UART: [idev] SUBJECT.KEYID = 7
3,523,010 UART: [idev] UDS.KEYID = 0
3,523,939 ready_for_fw is high
3,524,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,459 UART: [idev] Erasing UDS.KEYID = 0
6,027,502 UART: [idev] Sha1 KeyId Algorithm
6,051,812 UART: [idev] --
6,055,112 UART: [ldev] ++
6,055,817 UART: [ldev] CDI.KEYID = 6
6,056,718 UART: [ldev] SUBJECT.KEYID = 5
6,057,833 UART: [ldev] AUTHORITY.KEYID = 7
6,059,011 UART: [ldev] FE.KEYID = 1
6,100,803 UART: [ldev] Erasing FE.KEYID = 1
8,601,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,622 UART: [ldev] --
10,394,408 UART: [fwproc] Wait for Commands...
10,396,039 UART: [fwproc] Recv command 0x46574c44
10,398,138 UART: [fwproc] Recv'd Img size: 114448 bytes
13,798,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,871,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,257,868 >>> mbox cmd response: success
14,262,566 UART: [afmc] ++
14,263,165 UART: [afmc] CDI.KEYID = 6
14,264,077 UART: [afmc] SUBJECT.KEYID = 7
14,265,241 UART: [afmc] AUTHORITY.KEYID = 5
16,808,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,597 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,638 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,473 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,387 UART: [afmc] --
18,607,581 UART: [cold-reset] --
18,610,792 UART: [state] Locking Datavault
18,615,342 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,035 UART: [state] Locking ICCM
18,619,521 UART: [exit] Launching FMC @ 0x40000130
18,627,919 UART:
18,628,157 UART: Running Caliptra FMC ...
18,629,257 UART:
18,629,436 UART: [state] CFI Enabled
18,689,576 UART: [fht] FMC Alias Private Key: 7
20,454,371 UART: [art] Extend RT PCRs Done
20,455,581 UART: [art] Lock RT PCRs Done
20,457,311 UART: [art] Populate DV Done
20,462,881 UART: [fht] FMC Alias Private Key: 7
20,464,318 UART: [art] Derive CDI
20,465,258 UART: [art] Store in in slot 0x4
20,523,000 UART: [art] Derive Key Pair
20,524,005 UART: [art] Store priv key in slot 0x5
22,987,123 UART: [art] Derive Key Pair - Done
23,000,545 UART: [art] Signing Cert with AUTHO
23,001,852 UART: RITY.KEYID = 7
24,713,103 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,600 UART: [art] PUB.X = C76C565A05BE7222D5FC9AD406C4394B60753E9846159E27C2C180E5A7C2A8B45763C19092B96B8A108BB0737CD50D20
24,721,866 UART: [art] PUB.Y = 1245B472B09B524A5CED2E67EF468DA0653066E25BA795A1907B0F9132362E91D1369747C8F22B6D40D4F4500F621CB5
24,729,107 UART: [art] SIG.R = 15294DE999D6C6D4F631C914941A4DE54BD38FB67856C5CA36B92BE66F8130AF545C165DABC68D987DC95BCEBB348065
24,736,505 UART: [art] SIG.S = 3DEC1E3D76BE4985AD8AB752D9663E29738E6295DBF582DD64B821FF728E48A1E7234610D5749408E7920DEF570D6381
25,715,402 UART: Caliptra RT
25,716,101 UART: [state] CFI Enabled
25,881,278 UART: [rt] RT listening for mailbox commands...
25,883,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,914,669 UART: [rt]cmd =0x44504543, len=96
25,921,257 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,083 writing to cptra_bootfsm_go
3,360,750 ready_for_fw is high
3,361,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,046,115 >>> mbox cmd response: success
18,323,540 UART:
18,323,940 UART: Running Caliptra FMC ...
18,325,049 UART:
18,325,204 UART: [state] CFI Enabled
18,390,654 UART: [fht] FMC Alias Private Key: 7
20,155,102 UART: [art] Extend RT PCRs Done
20,156,335 UART: [art] Lock RT PCRs Done
20,157,775 UART: [art] Populate DV Done
20,163,204 UART: [fht] FMC Alias Private Key: 7
20,164,842 UART: [art] Derive CDI
20,165,608 UART: [art] Store in in slot 0x4
20,223,254 UART: [art] Derive Key Pair
20,224,258 UART: [art] Store priv key in slot 0x5
22,686,824 UART: [art] Derive Key Pair - Done
22,700,087 UART: [art] Signing Cert with AUTHO
22,701,401 UART: RITY.KEYID = 7
24,412,635 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,135 UART: [art] PUB.X = 72707868C9BD4F4DEA6C82172BCCE0041520C1FF568D80935BE9C2224881641483A5AD3678FF40948819598B35FC2578
24,421,388 UART: [art] PUB.Y = 075B5CAC022DA8E4536E4B621C8585F73FA3BC72770BB9F7443767B4E73181010C562E522865AF2176953D2086B680F4
24,428,627 UART: [art] SIG.R = A33FC8A5B195A75A2721567C4C1BF6FCA25B18B035256D3E0FD56A508C250742C316EC55335C9879FE8CABA34BC0AE2A
24,436,037 UART: [art] SIG.S = 69ABE3B5E0CA3E00B166872E6591EC32137B304CCD420BF8AF5AE955FFDDDFB38F4F394CD1F272BF12FE27F4BC7DA9FF
25,414,703 UART: Caliptra RT
25,415,404 UART: [state] CFI Enabled
25,580,915 UART: [rt] RT listening for mailbox commands...
25,582,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,614,061 UART: [rt]cmd =0x44504543, len=96
25,620,651 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,377 UART:
192,749 UART: Running Caliptra ROM ...
193,947 UART:
603,331 UART: [state] CFI Enabled
614,451 UART: [state] LifecycleState = Unprovisioned
616,333 UART: [state] DebugLocked = No
617,716 UART: [state] WD Timer not started. Device not locked for debugging
620,751 UART: [kat] SHA2-256
799,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,423 UART: [kat] ++
812,029 UART: [kat] sha1
824,402 UART: [kat] SHA2-256
827,409 UART: [kat] SHA2-384
835,024 UART: [kat] SHA2-512-ACC
837,957 UART: [kat] ECC-384
3,278,068 UART: [kat] HMAC-384Kdf
3,290,325 UART: [kat] LMS
3,819,813 UART: [kat] --
3,823,600 UART: [cold-reset] ++
3,825,595 UART: [fht] FHT @ 0x50003400
3,836,865 UART: [idev] ++
3,837,461 UART: [idev] CDI.KEYID = 6
3,838,383 UART: [idev] SUBJECT.KEYID = 7
3,839,547 UART: [idev] UDS.KEYID = 0
3,840,462 ready_for_fw is high
3,840,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,335 UART: [idev] Erasing UDS.KEYID = 0
6,315,284 UART: [idev] Sha1 KeyId Algorithm
6,338,245 UART: [idev] --
6,341,154 UART: [ldev] ++
6,341,715 UART: [ldev] CDI.KEYID = 6
6,342,585 UART: [ldev] SUBJECT.KEYID = 5
6,343,729 UART: [ldev] AUTHORITY.KEYID = 7
6,345,064 UART: [ldev] FE.KEYID = 1
6,354,114 UART: [ldev] Erasing FE.KEYID = 1
8,834,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,989 UART: [ldev] --
10,624,478 UART: [fwproc] Wait for Commands...
10,627,591 UART: [fwproc] Recv command 0x46574c44
10,629,676 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,380 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,498,686 >>> mbox cmd response: success
14,503,579 UART: [afmc] ++
14,504,165 UART: [afmc] CDI.KEYID = 6
14,505,038 UART: [afmc] SUBJECT.KEYID = 7
14,506,191 UART: [afmc] AUTHORITY.KEYID = 5
17,008,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,332 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,073 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,138 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,038 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,255 UART: [afmc] --
18,805,311 UART: [cold-reset] --
18,808,895 UART: [state] Locking Datavault
18,814,360 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,063 UART: [state] Locking ICCM
18,818,533 UART: [exit] Launching FMC @ 0x40000130
18,826,981 UART:
18,827,207 UART: Running Caliptra FMC ...
18,828,297 UART:
18,828,447 UART: [state] CFI Enabled
18,836,753 UART: [fht] FMC Alias Private Key: 7
20,593,710 UART: [art] Extend RT PCRs Done
20,594,936 UART: [art] Lock RT PCRs Done
20,596,504 UART: [art] Populate DV Done
20,601,857 UART: [fht] FMC Alias Private Key: 7
20,603,517 UART: [art] Derive CDI
20,604,329 UART: [art] Store in in slot 0x4
20,646,903 UART: [art] Derive Key Pair
20,647,961 UART: [art] Store priv key in slot 0x5
23,075,367 UART: [art] Derive Key Pair - Done
23,088,635 UART: [art] Signing Cert with AUTHO
23,089,944 UART: RITY.KEYID = 7
24,795,163 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,670 UART: [art] PUB.X = 7AC80083DF1C3D3F0F7D554BA1E713E82EB57869AB78DE105DA2849AE3F25F2E385C3E19C27C838D87BD709768D56598
24,803,948 UART: [art] PUB.Y = 8C88A7BA9CC16A7386C6366A47F22E4181B8A3ADA387A9B99F42C03E740F5FDBDE80902C996D708BE97FD85DD132E987
24,811,221 UART: [art] SIG.R = E23013444F6F325D269823ACB389D10FCA6D9A547EFAA18EBEC8A360750C96CF48F4C0B23922C0550A26B5ACCCB7C835
24,818,589 UART: [art] SIG.S = C7ED2A9FC492F2F966E53BCAA2639805E27426CD3DEF91542FD9356F7E3095DB7F11A7467D6EB265E0B2FAE9174FEB9F
25,797,932 UART: Caliptra RT
25,798,631 UART: [state] CFI Enabled
25,916,131 UART: [rt] RT listening for mailbox commands...
25,918,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,948,771 UART: [rt]cmd =0x44504543, len=96
25,955,388 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,693,146 ready_for_fw is high
3,693,555 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,564 >>> mbox cmd response: success
18,517,808 UART:
18,518,209 UART: Running Caliptra FMC ...
18,519,403 UART:
18,519,569 UART: [state] CFI Enabled
18,527,450 UART: [fht] FMC Alias Private Key: 7
20,284,366 UART: [art] Extend RT PCRs Done
20,285,585 UART: [art] Lock RT PCRs Done
20,287,426 UART: [art] Populate DV Done
20,292,993 UART: [fht] FMC Alias Private Key: 7
20,294,686 UART: [art] Derive CDI
20,295,493 UART: [art] Store in in slot 0x4
20,338,035 UART: [art] Derive Key Pair
20,339,071 UART: [art] Store priv key in slot 0x5
22,765,542 UART: [art] Derive Key Pair - Done
22,778,151 UART: [art] Signing Cert with AUTHO
22,779,448 UART: RITY.KEYID = 7
24,485,138 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,779 UART: [art] PUB.X = EF4C4F8EC0D531DF1DB084ADFA8C88543BCDAD04E6F835F053856669CE642EF94411CAB2A46D0E7BDD7D4E33814CB89E
24,493,915 UART: [art] PUB.Y = 3A9E9638103CABAAA19F9BB901A3D3689CE44CD242F440223D2F577255D36ABF3B05747050F9DB776FA735CA75C20A61
24,501,184 UART: [art] SIG.R = A326995AAE37ED94F29535944FE7D305C5983EFF0F2B2252E0A670BDC224039DB01330D66CC7B5B99F8AB7CB1A1BBD6C
24,508,568 UART: [art] SIG.S = CB26885D8702FBD85837A2AF3915F0E5E2247EABBB02A56B5B270E2F5A27C57ECA635362670A9CF8BEEC9BAB78A4FBFA
25,487,550 UART: Caliptra RT
25,488,247 UART: [state] CFI Enabled
25,606,144 UART: [rt] RT listening for mailbox commands...
25,608,129 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,638,738 UART: [rt]cmd =0x44504543, len=96
25,645,307 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
3,437,108 ready_for_fw is high
3,437,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,752 >>> mbox cmd response: success
19,025,399 UART:
19,025,826 UART: Running Caliptra FMC ...
19,026,950 UART:
19,027,106 UART: [state] CFI Enabled
19,095,221 UART: [fht] FMC Alias Private Key: 7
20,859,045 UART: [art] Extend RT PCRs Done
20,860,260 UART: [art] Lock RT PCRs Done
20,862,076 UART: [art] Populate DV Done
20,867,437 UART: [fht] FMC Alias Private Key: 7
20,868,980 UART: [art] Derive CDI
20,869,713 UART: [art] Store in in slot 0x4
20,927,989 UART: [art] Derive Key Pair
20,928,987 UART: [art] Store priv key in slot 0x5
23,391,540 UART: [art] Derive Key Pair - Done
23,404,285 UART: [art] Signing Cert with AUTHO
23,405,589 UART: RITY.KEYID = 7
25,118,079 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,576 UART: [art] PUB.X = 9BBDC692D6600558698819DE77A209AC3C585B8267D8419B601F5161208FB79F8E25F50005587B68568EC745EE8CF248
25,126,828 UART: [art] PUB.Y = 53C713308FFEE831BC0D588C503D75E8E360D6A752F8CDF8BC85AAB4FF43F162C5FF22EFE1303E5F8ADD10B77187F1B9
25,134,083 UART: [art] SIG.R = E7B1AA691C6DFCED3C44444FBDDC7D501C40338A781D4584B8A8F986DCB8D35EA353BE5489522F3ACE0649AC19634ADE
25,141,473 UART: [art] SIG.S = CCA209D1D3721ACE8F0C2BDDCA54829C39EFB920EFE0F962E8548945D95F6C33CF5077B27D63A4E11A9C61D57E8A7C91
26,120,685 UART: Caliptra RT
26,121,394 UART: [state] CFI Enabled
26,285,915 UART: [rt] RT listening for mailbox commands...
26,287,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,318,981 UART: [rt]cmd =0x44504543, len=96
26,325,472 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,757,701 ready_for_fw is high
3,758,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,964,408 >>> mbox cmd response: success
19,223,494 UART:
19,223,896 UART: Running Caliptra FMC ...
19,224,999 UART:
19,225,142 UART: [state] CFI Enabled
19,233,095 UART: [fht] FMC Alias Private Key: 7
20,989,815 UART: [art] Extend RT PCRs Done
20,991,032 UART: [art] Lock RT PCRs Done
20,992,591 UART: [art] Populate DV Done
20,997,888 UART: [fht] FMC Alias Private Key: 7
20,999,531 UART: [art] Derive CDI
21,000,260 UART: [art] Store in in slot 0x4
21,043,288 UART: [art] Derive Key Pair
21,044,286 UART: [art] Store priv key in slot 0x5
23,471,030 UART: [art] Derive Key Pair - Done
23,484,144 UART: [art] Signing Cert with AUTHO
23,485,449 UART: RITY.KEYID = 7
25,191,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,719 UART: [art] PUB.X = 58F174869F0B4AE5846F7DA29C777EA3507EAD3B52CEEB6556BB139191F52DC0BC373D03813E6D92BE421AC65AC716E0
25,200,003 UART: [art] PUB.Y = B714AE3B6701A1E292F8BCEFFD0778C58463F465E5BFF996135E86B2AA17E7466A5F6B397AABED63B1F467855BD7321A
25,207,243 UART: [art] SIG.R = 08858C01313C300693A6668FA3862DDCA88FC35E037D1928BE5C3C05BA09F40B65689C31752CA260A9AFC8BA296D60A0
25,214,620 UART: [art] SIG.S = C7197B296B8E69D79E4CE18E736F6F369F1148A97B94FC95D48368203BC37AC4BB04B8704781EA5F3D2990F069CB02BF
26,193,351 UART: Caliptra RT
26,194,062 UART: [state] CFI Enabled
26,311,025 UART: [rt] RT listening for mailbox commands...
26,312,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,343,858 UART: [rt]cmd =0x44504543, len=96
26,350,246 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,267 UART: [kat] SHA2-256
882,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,313 UART: [kat] ++
886,465 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,284 UART: [kat] SHA2-512-ACC
897,185 UART: [kat] ECC-384
902,998 UART: [kat] HMAC-384Kdf
907,426 UART: [kat] LMS
1,475,622 UART: [kat] --
1,476,559 UART: [cold-reset] ++
1,476,961 UART: [fht] Storing FHT @ 0x50003400
1,479,802 UART: [idev] ++
1,479,970 UART: [idev] CDI.KEYID = 6
1,480,330 UART: [idev] SUBJECT.KEYID = 7
1,480,754 UART: [idev] UDS.KEYID = 0
1,481,099 ready_for_fw is high
1,481,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,574 UART: [idev] Erasing UDS.KEYID = 0
1,505,552 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,084 UART: [idev] --
1,515,049 UART: [ldev] ++
1,515,217 UART: [ldev] CDI.KEYID = 6
1,515,580 UART: [ldev] SUBJECT.KEYID = 5
1,516,006 UART: [ldev] AUTHORITY.KEYID = 7
1,516,469 UART: [ldev] FE.KEYID = 1
1,521,519 UART: [ldev] Erasing FE.KEYID = 1
1,546,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,696 UART: [ldev] --
1,586,023 UART: [fwproc] Waiting for Commands...
1,586,826 UART: [fwproc] Received command 0x46574c44
1,587,617 UART: [fwproc] Received Image of size 114448 bytes
2,887,560 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,448 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,800 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,739 >>> mbox cmd response: success
3,081,791 UART: [afmc] ++
3,081,959 UART: [afmc] CDI.KEYID = 6
3,082,321 UART: [afmc] SUBJECT.KEYID = 7
3,082,746 UART: [afmc] AUTHORITY.KEYID = 5
3,117,451 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,487 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,267 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,995 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,880 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,570 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,495 UART: [afmc] --
3,160,607 UART: [cold-reset] --
3,161,503 UART: [state] Locking Datavault
3,162,672 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,276 UART: [state] Locking ICCM
3,163,850 UART: [exit] Launching FMC @ 0x40000130
3,169,179 UART:
3,169,195 UART: Running Caliptra FMC ...
3,169,603 UART:
3,169,657 UART: [state] CFI Enabled
3,179,874 UART: [fht] FMC Alias Private Key: 7
3,288,061 UART: [art] Extend RT PCRs Done
3,288,489 UART: [art] Lock RT PCRs Done
3,290,131 UART: [art] Populate DV Done
3,298,396 UART: [fht] FMC Alias Private Key: 7
3,299,372 UART: [art] Derive CDI
3,299,652 UART: [art] Store in in slot 0x4
3,385,219 UART: [art] Derive Key Pair
3,385,579 UART: [art] Store priv key in slot 0x5
3,398,175 UART: [art] Derive Key Pair - Done
3,412,789 UART: [art] Signing Cert with AUTHO
3,413,269 UART: RITY.KEYID = 7
3,428,513 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,278 UART: [art] PUB.X = 9A858CA25144128B8B4E2BFD2920598AEF7CDEC6406522357A8F11921431E5E7EF055AE73BD5C23E375B7E5923F6D9F9
3,436,049 UART: [art] PUB.Y = 612333E076D5E0C39154A12E9960F612C866C46E8E5E1455CF88172A041DA31E9EF924EFE8E3BE3D0B24F5981B805AFB
3,442,997 UART: [art] SIG.R = DB7B3FA0F72393BB2A7624C31C6DC33DE8876E7E8D9D1B6CF3C81C16FE0EB4B463BD6600D1360B44A81BDCDF111D155B
3,449,759 UART: [art] SIG.S = C808702B81E4C42C313C5CCF49CDA63F737861AC078421123C8F22625D7E39357319B95822D9E115324D19EFF9A7E473
3,473,372 UART: Caliptra RT
3,473,625 UART: [state] CFI Enabled
3,581,317 UART: [rt] RT listening for mailbox commands...
3,581,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,485 UART: [rt]cmd =0x44504543, len=96
3,619,778 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,799 ready_for_fw is high
1,361,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,373 >>> mbox cmd response: success
2,989,711 UART:
2,989,727 UART: Running Caliptra FMC ...
2,990,135 UART:
2,990,189 UART: [state] CFI Enabled
3,000,604 UART: [fht] FMC Alias Private Key: 7
3,108,213 UART: [art] Extend RT PCRs Done
3,108,641 UART: [art] Lock RT PCRs Done
3,110,335 UART: [art] Populate DV Done
3,118,414 UART: [fht] FMC Alias Private Key: 7
3,119,530 UART: [art] Derive CDI
3,119,810 UART: [art] Store in in slot 0x4
3,205,625 UART: [art] Derive Key Pair
3,205,985 UART: [art] Store priv key in slot 0x5
3,219,585 UART: [art] Derive Key Pair - Done
3,234,476 UART: [art] Signing Cert with AUTHO
3,234,956 UART: RITY.KEYID = 7
3,250,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,357 UART: [art] PUB.X = 84827B9E02087B2DE211B5A2FEE8C4CE25A627B6801FFE1C921ACA7AE6BB5243B4301A7F7D5A8C97C84D76D14E103172
3,258,131 UART: [art] PUB.Y = ACF5B537454E466CCE269197CC91BD180E7648E8F439D3AC2449565C4B8BAF9FD0E96277F4CAAA8FD5A1A49207CF2524
3,265,087 UART: [art] SIG.R = 097037EF9625D9365B914CA72B89355D2A81A314A90BE7C80ABA8ABE41A5A17DAC23278ACD33BE03D4442DC0F3C5DDA9
3,271,859 UART: [art] SIG.S = 1E71A142016484AFE733D190BB03EB19B3E179266FE6F2957BD7F147180E6837E70620BB1220EE4364F5B7CB4B84C889
3,295,574 UART: Caliptra RT
3,295,827 UART: [state] CFI Enabled
3,402,435 UART: [rt] RT listening for mailbox commands...
3,403,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,311 UART: [rt]cmd =0x44504543, len=96
3,440,422 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,939 UART: [state] LifecycleState = Unprovisioned
86,594 UART: [state] DebugLocked = No
87,228 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,874 UART: [kat] SHA2-256
882,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,920 UART: [kat] ++
887,072 UART: [kat] sha1
891,324 UART: [kat] SHA2-256
893,262 UART: [kat] SHA2-384
896,019 UART: [kat] SHA2-512-ACC
897,920 UART: [kat] ECC-384
903,425 UART: [kat] HMAC-384Kdf
908,141 UART: [kat] LMS
1,476,337 UART: [kat] --
1,477,142 UART: [cold-reset] ++
1,477,536 UART: [fht] Storing FHT @ 0x50003400
1,480,363 UART: [idev] ++
1,480,531 UART: [idev] CDI.KEYID = 6
1,480,891 UART: [idev] SUBJECT.KEYID = 7
1,481,315 UART: [idev] UDS.KEYID = 0
1,481,660 ready_for_fw is high
1,481,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,517 UART: [idev] Erasing UDS.KEYID = 0
1,506,413 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,089 UART: [idev] --
1,516,052 UART: [ldev] ++
1,516,220 UART: [ldev] CDI.KEYID = 6
1,516,583 UART: [ldev] SUBJECT.KEYID = 5
1,517,009 UART: [ldev] AUTHORITY.KEYID = 7
1,517,472 UART: [ldev] FE.KEYID = 1
1,522,844 UART: [ldev] Erasing FE.KEYID = 1
1,548,863 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,009 UART: [ldev] --
1,588,506 UART: [fwproc] Waiting for Commands...
1,589,359 UART: [fwproc] Received command 0x46574c44
1,590,150 UART: [fwproc] Received Image of size 114448 bytes
2,889,329 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,597 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,949 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,083,068 >>> mbox cmd response: success
3,084,192 UART: [afmc] ++
3,084,360 UART: [afmc] CDI.KEYID = 6
3,084,722 UART: [afmc] SUBJECT.KEYID = 7
3,085,147 UART: [afmc] AUTHORITY.KEYID = 5
3,120,490 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,798 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,137,578 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,143,306 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,149,191 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,881 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,670 UART: [afmc] --
3,163,662 UART: [cold-reset] --
3,164,518 UART: [state] Locking Datavault
3,165,491 UART: [state] Locking PCR0, PCR1 and PCR31
3,166,095 UART: [state] Locking ICCM
3,166,671 UART: [exit] Launching FMC @ 0x40000130
3,172,000 UART:
3,172,016 UART: Running Caliptra FMC ...
3,172,424 UART:
3,172,567 UART: [state] CFI Enabled
3,183,444 UART: [fht] FMC Alias Private Key: 7
3,291,141 UART: [art] Extend RT PCRs Done
3,291,569 UART: [art] Lock RT PCRs Done
3,293,389 UART: [art] Populate DV Done
3,301,432 UART: [fht] FMC Alias Private Key: 7
3,302,610 UART: [art] Derive CDI
3,302,890 UART: [art] Store in in slot 0x4
3,388,751 UART: [art] Derive Key Pair
3,389,111 UART: [art] Store priv key in slot 0x5
3,401,979 UART: [art] Derive Key Pair - Done
3,416,902 UART: [art] Signing Cert with AUTHO
3,417,382 UART: RITY.KEYID = 7
3,432,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,115 UART: [art] PUB.X = 10F3913DF35161C2D26A1644318AC27975D2A34CBB77DAAEEAF1B3A14119528E808162CC79042C98174B5B41A93130AC
3,439,882 UART: [art] PUB.Y = 42E9D138BB2DC1ADEDDD8A6C88A92878EDE9628DE8A2440B4347E98E4BEF1010ED3FA734D619BE9063B2EB83F5427F2E
3,446,847 UART: [art] SIG.R = 31F742E19600352E364C5D1CB6E13B4DDD6CCDF05C85E1F844F5AED766CB85A916EF2DE619A7244151B2DE3444D8A19C
3,453,607 UART: [art] SIG.S = 8EA05E11AE52876471EB8E49D0AC1121D444D99BF91AA64D69C3783C0758940AC0639F9734EE2BB25EE73FC29F288033
3,477,306 UART: Caliptra RT
3,477,651 UART: [state] CFI Enabled
3,586,322 UART: [rt] RT listening for mailbox commands...
3,586,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,438 UART: [rt]cmd =0x44504543, len=96
3,624,869 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,870 ready_for_fw is high
1,362,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,254 >>> mbox cmd response: success
2,991,014 UART:
2,991,030 UART: Running Caliptra FMC ...
2,991,438 UART:
2,991,581 UART: [state] CFI Enabled
3,001,922 UART: [fht] FMC Alias Private Key: 7
3,110,097 UART: [art] Extend RT PCRs Done
3,110,525 UART: [art] Lock RT PCRs Done
3,111,601 UART: [art] Populate DV Done
3,119,666 UART: [fht] FMC Alias Private Key: 7
3,120,620 UART: [art] Derive CDI
3,120,900 UART: [art] Store in in slot 0x4
3,206,551 UART: [art] Derive Key Pair
3,206,911 UART: [art] Store priv key in slot 0x5
3,220,107 UART: [art] Derive Key Pair - Done
3,234,579 UART: [art] Signing Cert with AUTHO
3,235,059 UART: RITY.KEYID = 7
3,250,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,854 UART: [art] PUB.X = 913FBBF4806BFD07173A988623D0EC7B984BC104BB15D7A637AC75C8949AA7B417EDE22B3957FF218C020FB710F97F2A
3,257,622 UART: [art] PUB.Y = 5391D8CC881BCF65F6A5AE891E7B9DA2918854539DBD613D13DAC2ED9555B8E4B3A598ECB806EB7C38F722B0A0394DE2
3,264,583 UART: [art] SIG.R = 76B19B1054CBA2419EFDB7B171CD2B8B418C0AE05DE3539F13BB4BA0321B5F7970B2DECE21ACD2E1CBDE39B648C1CCA8
3,271,376 UART: [art] SIG.S = 8D7FF8A39855B7ECE090C7CEB2F427C9586440254C1BE2025D83EBDE6FA456A836A9E1B1891A42E2291479433AADB32A
3,295,316 UART: Caliptra RT
3,295,661 UART: [state] CFI Enabled
3,404,010 UART: [rt] RT listening for mailbox commands...
3,404,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,296 UART: [rt]cmd =0x44504543, len=96
3,442,489 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
893,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,503 UART: [kat] ++
897,655 UART: [kat] sha1
902,025 UART: [kat] SHA2-256
903,965 UART: [kat] SHA2-384
906,780 UART: [kat] SHA2-512-ACC
908,681 UART: [kat] ECC-384
918,446 UART: [kat] HMAC-384Kdf
923,104 UART: [kat] LMS
1,171,432 UART: [kat] --
1,172,429 UART: [cold-reset] ++
1,172,877 UART: [fht] FHT @ 0x50003400
1,175,476 UART: [idev] ++
1,175,644 UART: [idev] CDI.KEYID = 6
1,176,004 UART: [idev] SUBJECT.KEYID = 7
1,176,428 UART: [idev] UDS.KEYID = 0
1,176,773 ready_for_fw is high
1,176,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,496 UART: [idev] Erasing UDS.KEYID = 0
1,201,469 UART: [idev] Sha1 KeyId Algorithm
1,209,907 UART: [idev] --
1,210,859 UART: [ldev] ++
1,211,027 UART: [ldev] CDI.KEYID = 6
1,211,390 UART: [ldev] SUBJECT.KEYID = 5
1,211,816 UART: [ldev] AUTHORITY.KEYID = 7
1,212,279 UART: [ldev] FE.KEYID = 1
1,217,289 UART: [ldev] Erasing FE.KEYID = 1
1,243,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,612 UART: [fwproc] Wait for Commands...
1,283,346 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,049 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,070 >>> mbox cmd response: success
2,776,130 UART: [afmc] ++
2,776,298 UART: [afmc] CDI.KEYID = 6
2,776,660 UART: [afmc] SUBJECT.KEYID = 7
2,777,085 UART: [afmc] AUTHORITY.KEYID = 5
2,811,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,591 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,339 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,067 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,952 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,671 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,415 UART: [afmc] --
2,855,475 UART: [cold-reset] --
2,856,437 UART: [state] Locking Datavault
2,857,344 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,948 UART: [state] Locking ICCM
2,858,370 UART: [exit] Launching FMC @ 0x40000130
2,863,699 UART:
2,863,715 UART: Running Caliptra FMC ...
2,864,123 UART:
2,864,177 UART: [state] CFI Enabled
2,874,764 UART: [fht] FMC Alias Private Key: 7
2,982,411 UART: [art] Extend RT PCRs Done
2,982,839 UART: [art] Lock RT PCRs Done
2,984,059 UART: [art] Populate DV Done
2,992,328 UART: [fht] FMC Alias Private Key: 7
2,993,406 UART: [art] Derive CDI
2,993,686 UART: [art] Store in in slot 0x4
3,079,415 UART: [art] Derive Key Pair
3,079,775 UART: [art] Store priv key in slot 0x5
3,093,507 UART: [art] Derive Key Pair - Done
3,108,417 UART: [art] Signing Cert with AUTHO
3,108,897 UART: RITY.KEYID = 7
3,124,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,806 UART: [art] PUB.X = 9CA8D6D1BEF91439E02E1BB75F1DBFFA74069608972B8B05DF857D1E6D4BA582AC00136038901539C5CDCC8FFA9D0CD6
3,131,558 UART: [art] PUB.Y = BE0AF748914786860712C97DA45A43DEB4D680686ED9146870A5A433EFA172B9D8E39E258CC5C836644A6E18F00D20C2
3,138,499 UART: [art] SIG.R = A0E03BF0668137A4E1196757E3D1FBFB13971622A323828E0D57B53389D55F42E5A16AA0441A5B57202F9165EF192496
3,145,258 UART: [art] SIG.S = 809C37D04B5150DE9DDD6E3454542D8ED0D14CFCFCDE9022BAC0C880EEB40B6CB8F4E4AD56634F04F8143B652D09DAC7
3,168,756 UART: Caliptra RT
3,169,009 UART: [state] CFI Enabled
3,276,335 UART: [rt] RT listening for mailbox commands...
3,277,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,633 UART: [rt]cmd =0x44504543, len=96
3,314,996 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,597 ready_for_fw is high
1,060,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,565 >>> mbox cmd response: success
2,690,455 UART:
2,690,471 UART: Running Caliptra FMC ...
2,690,879 UART:
2,690,933 UART: [state] CFI Enabled
2,701,502 UART: [fht] FMC Alias Private Key: 7
2,808,911 UART: [art] Extend RT PCRs Done
2,809,339 UART: [art] Lock RT PCRs Done
2,810,711 UART: [art] Populate DV Done
2,818,798 UART: [fht] FMC Alias Private Key: 7
2,819,808 UART: [art] Derive CDI
2,820,088 UART: [art] Store in in slot 0x4
2,905,701 UART: [art] Derive Key Pair
2,906,061 UART: [art] Store priv key in slot 0x5
2,919,307 UART: [art] Derive Key Pair - Done
2,934,194 UART: [art] Signing Cert with AUTHO
2,934,674 UART: RITY.KEYID = 7
2,949,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,333 UART: [art] PUB.X = 59E1223E56804699138EB004767B7E5F5E57708515CA829432FB7810CC708E78716704779BAFC7A1CBABE77155D58947
2,957,087 UART: [art] PUB.Y = 24273D0B6180A717DA19A729D96B39B7FFCED5FC1CE9F6EF6F40300D9E18ED46A14B645E1FEBCBC9D233304BC1214BF6
2,964,049 UART: [art] SIG.R = 71C5BEC380A997AFCE2741D68FCDB9E386E338547BDF36E3056FF52D9BFC6EF96BBAE471736EEF282E5DC51A41293E7D
2,970,836 UART: [art] SIG.S = 759381CA2FC0E400C3DC49FCC4D96246AB291831EE8689DF1F0D3497FC0E167817C3A7D1693BF88167254334882A7544
2,994,861 UART: Caliptra RT
2,995,114 UART: [state] CFI Enabled
3,102,353 UART: [rt] RT listening for mailbox commands...
3,103,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,607 UART: [rt]cmd =0x44504543, len=96
3,140,468 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
893,407 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,532 UART: [kat] ++
897,684 UART: [kat] sha1
901,948 UART: [kat] SHA2-256
903,888 UART: [kat] SHA2-384
906,631 UART: [kat] SHA2-512-ACC
908,532 UART: [kat] ECC-384
918,283 UART: [kat] HMAC-384Kdf
922,965 UART: [kat] LMS
1,171,293 UART: [kat] --
1,172,320 UART: [cold-reset] ++
1,172,688 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,176,474 ready_for_fw is high
1,176,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,515 UART: [idev] Erasing UDS.KEYID = 0
1,201,070 UART: [idev] Sha1 KeyId Algorithm
1,209,584 UART: [idev] --
1,210,578 UART: [ldev] ++
1,210,746 UART: [ldev] CDI.KEYID = 6
1,211,109 UART: [ldev] SUBJECT.KEYID = 5
1,211,535 UART: [ldev] AUTHORITY.KEYID = 7
1,211,998 UART: [ldev] FE.KEYID = 1
1,217,178 UART: [ldev] Erasing FE.KEYID = 1
1,243,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,844 UART: [ldev] --
1,283,359 UART: [fwproc] Wait for Commands...
1,283,977 UART: [fwproc] Recv command 0x46574c44
1,284,705 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,715 >>> mbox cmd response: success
2,777,939 UART: [afmc] ++
2,778,107 UART: [afmc] CDI.KEYID = 6
2,778,469 UART: [afmc] SUBJECT.KEYID = 7
2,778,894 UART: [afmc] AUTHORITY.KEYID = 5
2,814,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,050 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,663 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,382 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,346 UART: [afmc] --
2,858,466 UART: [cold-reset] --
2,859,220 UART: [state] Locking Datavault
2,860,269 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,873 UART: [state] Locking ICCM
2,861,447 UART: [exit] Launching FMC @ 0x40000130
2,866,776 UART:
2,866,792 UART: Running Caliptra FMC ...
2,867,200 UART:
2,867,343 UART: [state] CFI Enabled
2,878,278 UART: [fht] FMC Alias Private Key: 7
2,986,233 UART: [art] Extend RT PCRs Done
2,986,661 UART: [art] Lock RT PCRs Done
2,988,395 UART: [art] Populate DV Done
2,996,624 UART: [fht] FMC Alias Private Key: 7
2,997,768 UART: [art] Derive CDI
2,998,048 UART: [art] Store in in slot 0x4
3,083,817 UART: [art] Derive Key Pair
3,084,177 UART: [art] Store priv key in slot 0x5
3,097,577 UART: [art] Derive Key Pair - Done
3,111,968 UART: [art] Signing Cert with AUTHO
3,112,448 UART: RITY.KEYID = 7
3,127,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,449 UART: [art] PUB.X = 97D9ED3B5D3FAB921FBBB3B112312F85B0DD3D0D9D7E8AECA865B5A47B9504DDEAB862B2EA614F4A98F7B3568E3178BC
3,135,237 UART: [art] PUB.Y = 442245F67BC361E98DC6DA35E7A50C3B0C0D37B2CC2B76A644C553C4C96B143A92D9EFFE517AD274D1822AED377FDD66
3,142,192 UART: [art] SIG.R = 7830358351C245F949CEBDB6ED997514BB10D68FA477C94E23F6B782DE5235E7CDC07E50E5FBDF7208FFA800BE73583D
3,148,947 UART: [art] SIG.S = 87E07E352435C47C718F49D6A9149B9BC622DFF3D5781C480587A16638F6338E960ABF3C71D25A37154F39F8B2D1D886
3,172,552 UART: Caliptra RT
3,172,897 UART: [state] CFI Enabled
3,280,914 UART: [rt] RT listening for mailbox commands...
3,281,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,924 UART: [rt]cmd =0x44504543, len=96
3,319,305 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,636 ready_for_fw is high
1,060,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,384 >>> mbox cmd response: success
2,691,274 UART:
2,691,290 UART: Running Caliptra FMC ...
2,691,698 UART:
2,691,841 UART: [state] CFI Enabled
2,702,324 UART: [fht] FMC Alias Private Key: 7
2,810,351 UART: [art] Extend RT PCRs Done
2,810,779 UART: [art] Lock RT PCRs Done
2,812,635 UART: [art] Populate DV Done
2,821,166 UART: [fht] FMC Alias Private Key: 7
2,822,168 UART: [art] Derive CDI
2,822,448 UART: [art] Store in in slot 0x4
2,908,501 UART: [art] Derive Key Pair
2,908,861 UART: [art] Store priv key in slot 0x5
2,922,131 UART: [art] Derive Key Pair - Done
2,936,648 UART: [art] Signing Cert with AUTHO
2,937,128 UART: RITY.KEYID = 7
2,951,978 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,743 UART: [art] PUB.X = 5A16003ECDAB23610848EC58A9C3F5474EF7CAFC79B8101D1035B35DE69936661B27A707680943CAE9BC1F2141E31CA7
2,959,486 UART: [art] PUB.Y = E5359A2F215BD6199C45531B382C1484E3400A49D8C620C2452E81FE6EE1649A4E4E6852BE6AA4CA6AFF25E1ECA615E8
2,966,441 UART: [art] SIG.R = AC3E3FD5C3ED24AB5BD7B3146684936D3B230BAFCD306965D23C2CC4F43CAF89DA504DAB73B1D05760D6898842B0D689
2,973,222 UART: [art] SIG.S = 6E8A9BD63B91C7457FBE8B5AF25F9E4A3B2FD0BF1F424E913BCF46DFEEBF86BBD442B5381BBC2F511054D607D4B86140
2,997,274 UART: Caliptra RT
2,997,619 UART: [state] CFI Enabled
3,105,592 UART: [rt] RT listening for mailbox commands...
3,106,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,534 UART: [rt]cmd =0x44504543, len=96
3,143,973 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,646 UART: [kat] SHA2-512-ACC
906,547 UART: [kat] ECC-384
916,568 UART: [kat] HMAC-384Kdf
921,216 UART: [kat] LMS
1,169,528 UART: [kat] --
1,170,301 UART: [cold-reset] ++
1,170,833 UART: [fht] FHT @ 0x50003400
1,173,683 UART: [idev] ++
1,173,851 UART: [idev] CDI.KEYID = 6
1,174,212 UART: [idev] SUBJECT.KEYID = 7
1,174,637 UART: [idev] UDS.KEYID = 0
1,174,983 ready_for_fw is high
1,174,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,885 UART: [idev] Erasing UDS.KEYID = 0
1,199,913 UART: [idev] Sha1 KeyId Algorithm
1,208,785 UART: [idev] --
1,209,912 UART: [ldev] ++
1,210,080 UART: [ldev] CDI.KEYID = 6
1,210,444 UART: [ldev] SUBJECT.KEYID = 5
1,210,871 UART: [ldev] AUTHORITY.KEYID = 7
1,211,334 UART: [ldev] FE.KEYID = 1
1,216,672 UART: [ldev] Erasing FE.KEYID = 1
1,242,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,606 UART: [ldev] --
1,282,006 UART: [fwproc] Wait for Commands...
1,282,799 UART: [fwproc] Recv command 0x46574c44
1,283,532 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,108 >>> mbox cmd response: success
2,776,235 UART: [afmc] ++
2,776,403 UART: [afmc] CDI.KEYID = 6
2,776,766 UART: [afmc] SUBJECT.KEYID = 7
2,777,192 UART: [afmc] AUTHORITY.KEYID = 5
2,812,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,855 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,738 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,457 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,260 UART: [afmc] --
2,856,182 UART: [cold-reset] --
2,857,240 UART: [state] Locking Datavault
2,858,235 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,839 UART: [state] Locking ICCM
2,859,495 UART: [exit] Launching FMC @ 0x40000130
2,864,824 UART:
2,864,840 UART: Running Caliptra FMC ...
2,865,248 UART:
2,865,302 UART: [state] CFI Enabled
2,875,633 UART: [fht] FMC Alias Private Key: 7
2,984,446 UART: [art] Extend RT PCRs Done
2,984,874 UART: [art] Lock RT PCRs Done
2,986,556 UART: [art] Populate DV Done
2,994,671 UART: [fht] FMC Alias Private Key: 7
2,995,763 UART: [art] Derive CDI
2,996,043 UART: [art] Store in in slot 0x4
3,081,686 UART: [art] Derive Key Pair
3,082,046 UART: [art] Store priv key in slot 0x5
3,094,742 UART: [art] Derive Key Pair - Done
3,109,527 UART: [art] Signing Cert with AUTHO
3,110,007 UART: RITY.KEYID = 7
3,125,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,154 UART: [art] PUB.X = 5A7DFE12A3ACEBC04BF7850212C2A570F6124120F159A0908C0608124A8B6955088A5BA6D8B63D7BC2F55DBC071E449D
3,132,915 UART: [art] PUB.Y = F68D149CE2F2BE1A4FF3B148C3661A42DEF550B7C6D911342D88BF0C4CF8B4E7AC2AE049F71FC1ED196106D56942FA7E
3,139,877 UART: [art] SIG.R = D818649D26C37AE00E4D5F7994BAC9457D39D9E33107BAE817686759F9C4FD96752FFA27DA45246386A31FD2CABCBC5E
3,146,651 UART: [art] SIG.S = 0C4483C1E3BCE9F292A78D4FEB6B64AD9695002CF64431FDCAC1F5ACBCEF146A6CDCF37D050F076883EFDFEBA91EF1E6
3,170,518 UART: Caliptra RT
3,170,771 UART: [state] CFI Enabled
3,278,576 UART: [rt] RT listening for mailbox commands...
3,279,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,730 UART: [rt]cmd =0x44504543, len=96
3,316,955 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,482 ready_for_fw is high
1,056,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,016 >>> mbox cmd response: success
2,685,592 UART:
2,685,608 UART: Running Caliptra FMC ...
2,686,016 UART:
2,686,070 UART: [state] CFI Enabled
2,696,161 UART: [fht] FMC Alias Private Key: 7
2,803,188 UART: [art] Extend RT PCRs Done
2,803,616 UART: [art] Lock RT PCRs Done
2,805,096 UART: [art] Populate DV Done
2,813,163 UART: [fht] FMC Alias Private Key: 7
2,814,167 UART: [art] Derive CDI
2,814,447 UART: [art] Store in in slot 0x4
2,900,140 UART: [art] Derive Key Pair
2,900,500 UART: [art] Store priv key in slot 0x5
2,913,580 UART: [art] Derive Key Pair - Done
2,928,104 UART: [art] Signing Cert with AUTHO
2,928,584 UART: RITY.KEYID = 7
2,943,416 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,181 UART: [art] PUB.X = 6A136320BBFEE00C6BE5B86A124B8CA012FB3008DA6CB9D21B4D3B036A7E19CEA741DBC527313422391FAFE933FE32F9
2,950,958 UART: [art] PUB.Y = 10D7923A84268169256F6C3882367D3704871BF31EDFDAE49BB7B17F862D4813B1B4EF0C11E00D64B92A2F2D51344E1D
2,957,899 UART: [art] SIG.R = 7B647BFAC8D54227759068B03102620D1C82B554A280870F906AA38CBD035B23AEEA0F61BF94896F984812F35FF7FF02
2,964,651 UART: [art] SIG.S = B51F2B980D73A7D478D27E32004EB7B17355C674A8B7C7E7162D6B99A5EA4B23EE95755859EFDFFB8651C8C34A8AF5B2
2,988,591 UART: Caliptra RT
2,988,844 UART: [state] CFI Enabled
3,096,309 UART: [rt] RT listening for mailbox commands...
3,096,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,555 UART: [rt]cmd =0x44504543, len=96
3,134,872 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
920,835 UART: [kat] LMS
1,169,147 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,254 UART: [fht] FHT @ 0x50003400
1,172,754 UART: [idev] ++
1,172,922 UART: [idev] CDI.KEYID = 6
1,173,283 UART: [idev] SUBJECT.KEYID = 7
1,173,708 UART: [idev] UDS.KEYID = 0
1,174,054 ready_for_fw is high
1,174,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,796 UART: [idev] Erasing UDS.KEYID = 0
1,198,526 UART: [idev] Sha1 KeyId Algorithm
1,207,402 UART: [idev] --
1,208,611 UART: [ldev] ++
1,208,779 UART: [ldev] CDI.KEYID = 6
1,209,143 UART: [ldev] SUBJECT.KEYID = 5
1,209,570 UART: [ldev] AUTHORITY.KEYID = 7
1,210,033 UART: [ldev] FE.KEYID = 1
1,215,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,171 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,208 UART: [fwproc] Recv command 0x46574c44
1,282,941 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,277 >>> mbox cmd response: success
2,777,374 UART: [afmc] ++
2,777,542 UART: [afmc] CDI.KEYID = 6
2,777,905 UART: [afmc] SUBJECT.KEYID = 7
2,778,331 UART: [afmc] AUTHORITY.KEYID = 5
2,813,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,985 UART: [afmc] --
2,856,899 UART: [cold-reset] --
2,858,047 UART: [state] Locking Datavault
2,859,144 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,748 UART: [state] Locking ICCM
2,860,320 UART: [exit] Launching FMC @ 0x40000130
2,865,649 UART:
2,865,665 UART: Running Caliptra FMC ...
2,866,073 UART:
2,866,216 UART: [state] CFI Enabled
2,876,367 UART: [fht] FMC Alias Private Key: 7
2,984,938 UART: [art] Extend RT PCRs Done
2,985,366 UART: [art] Lock RT PCRs Done
2,986,800 UART: [art] Populate DV Done
2,995,109 UART: [fht] FMC Alias Private Key: 7
2,996,051 UART: [art] Derive CDI
2,996,331 UART: [art] Store in in slot 0x4
3,082,020 UART: [art] Derive Key Pair
3,082,380 UART: [art] Store priv key in slot 0x5
3,096,000 UART: [art] Derive Key Pair - Done
3,110,983 UART: [art] Signing Cert with AUTHO
3,111,463 UART: RITY.KEYID = 7
3,126,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,588 UART: [art] PUB.X = 3E8220102E129E2C278472C99E798CC34E84AB1B4EE9E92846DCD9ADF24BF0A73182AEBA32E80956CE2A860EC5DDBB75
3,134,366 UART: [art] PUB.Y = 5B1E5BDD162385698296E2D1EB66B418136DB45BBE7AF2CC5F43295985B8DA1FB21D0DD35EBD4AB3B813D6529284FC8D
3,141,327 UART: [art] SIG.R = 346C074BBA68D099AAE74F44E1F4F07AB05283AA89204BDA3D6A275FA1EC06E76A8735DC70EC97B188F66575B54AE637
3,148,101 UART: [art] SIG.S = E2236EA207BCF2D0C859A0E44D083B74DE2F3515ED8D25D33A1219A534BB160F59368B097712882BCF99E1C40D0D1557
3,171,760 UART: Caliptra RT
3,172,105 UART: [state] CFI Enabled
3,278,896 UART: [rt] RT listening for mailbox commands...
3,279,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,066 UART: [rt]cmd =0x44504543, len=96
3,317,367 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,729 ready_for_fw is high
1,056,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,131 >>> mbox cmd response: success
2,686,577 UART:
2,686,593 UART: Running Caliptra FMC ...
2,687,001 UART:
2,687,144 UART: [state] CFI Enabled
2,697,795 UART: [fht] FMC Alias Private Key: 7
2,806,276 UART: [art] Extend RT PCRs Done
2,806,704 UART: [art] Lock RT PCRs Done
2,807,936 UART: [art] Populate DV Done
2,815,859 UART: [fht] FMC Alias Private Key: 7
2,816,819 UART: [art] Derive CDI
2,817,099 UART: [art] Store in in slot 0x4
2,903,076 UART: [art] Derive Key Pair
2,903,436 UART: [art] Store priv key in slot 0x5
2,916,302 UART: [art] Derive Key Pair - Done
2,931,080 UART: [art] Signing Cert with AUTHO
2,931,560 UART: RITY.KEYID = 7
2,946,812 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,577 UART: [art] PUB.X = DAC9A5E3FFF5D67A9D08A70744C5606CB1876D3712DF22C3E5E13F3C916D7767391F6A11798335BD9F5EF53ED34EC52E
2,954,351 UART: [art] PUB.Y = 2F7DA7EF9C27D94B30F66F94A40DCEB883C73102148DAE67698814F1FA56C3CA35820CC2D16E6DD992465D9F6A12AD8C
2,961,304 UART: [art] SIG.R = F7DA6C988E237618B2783AB19572D19E16D5A026B00A16204890268EEB0811ADFED33FFCE7F26224D56BE1BF41A183D0
2,968,074 UART: [art] SIG.S = 05020A48483CD5ACF8FF9DE5FD23523220E16BD597C802B936D181ECA2DA92B91C8D8B1AC5EDF97A98169E1710AD1D87
2,992,141 UART: Caliptra RT
2,992,486 UART: [state] CFI Enabled
3,099,963 UART: [rt] RT listening for mailbox commands...
3,100,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,053 UART: [rt]cmd =0x44504543, len=96
3,138,140 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,235 UART:
192,599 UART: Running Caliptra ROM ...
193,789 UART:
193,959 UART: [state] CFI Enabled
268,420 UART: [state] LifecycleState = Unprovisioned
270,400 UART: [state] DebugLocked = No
272,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,654 UART: [kat] SHA2-256
447,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,822 UART: [kat] ++
458,377 UART: [kat] sha1
468,547 UART: [kat] SHA2-256
471,204 UART: [kat] SHA2-384
475,778 UART: [kat] SHA2-512-ACC
478,142 UART: [kat] ECC-384
2,767,877 UART: [kat] HMAC-384Kdf
2,800,569 UART: [kat] LMS
3,990,899 UART: [kat] --
3,995,244 UART: [cold-reset] ++
3,997,387 UART: [fht] Storing FHT @ 0x50003400
4,009,664 UART: [idev] ++
4,010,247 UART: [idev] CDI.KEYID = 6
4,011,165 UART: [idev] SUBJECT.KEYID = 7
4,012,411 UART: [idev] UDS.KEYID = 0
4,013,394 ready_for_fw is high
4,013,589 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,128 UART: [idev] Erasing UDS.KEYID = 0
7,347,917 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,914 UART: [idev] --
7,372,903 UART: [ldev] ++
7,373,470 UART: [ldev] CDI.KEYID = 6
7,374,441 UART: [ldev] SUBJECT.KEYID = 5
7,375,648 UART: [ldev] AUTHORITY.KEYID = 7
7,376,942 UART: [ldev] FE.KEYID = 1
7,421,557 UART: [ldev] Erasing FE.KEYID = 1
10,756,777 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,344 UART: [ldev] --
13,138,230 UART: [fwproc] Waiting for Commands...
13,140,861 UART: [fwproc] Received command 0x46574c44
13,143,042 UART: [fwproc] Received Image of size 114124 bytes
17,199,700 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,170 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,346,078 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,663,620 >>> mbox cmd response: success
17,668,460 UART: [afmc] ++
17,669,057 UART: [afmc] CDI.KEYID = 6
17,669,977 UART: [afmc] SUBJECT.KEYID = 7
17,671,192 UART: [afmc] AUTHORITY.KEYID = 5
21,027,703 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,487 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,733 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,149 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,980 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,431 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,996 UART: [afmc] --
23,399,484 UART: [cold-reset] --
23,404,099 UART: [state] Locking Datavault
23,409,519 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,260 UART: [state] Locking ICCM
23,413,204 UART: [exit] Launching FMC @ 0x40000130
23,421,603 UART:
23,421,836 UART: Running Caliptra FMC ...
23,422,936 UART:
23,423,096 UART: [state] CFI Enabled
23,490,942 UART: [fht] FMC Alias Private Key: 7
25,829,065 UART: [art] Extend RT PCRs Done
25,830,288 UART: [art] Lock RT PCRs Done
25,831,973 UART: [art] Populate DV Done
25,837,435 UART: [fht] FMC Alias Private Key: 7
25,838,969 UART: [art] Derive CDI
25,839,791 UART: [art] Store in in slot 0x4
25,899,531 UART: [art] Derive Key Pair
25,900,564 UART: [art] Store priv key in slot 0x5
29,193,026 UART: [art] Derive Key Pair - Done
29,205,977 UART: [art] Signing Cert with AUTHO
29,207,283 UART: RITY.KEYID = 7
31,494,979 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,492 UART: [art] PUB.X = A34D53C4A20E256FA5D427A1B7E4567B89EB03877E4698629EDE1776AFAD3305CA78040C5FDCA06CAD58B6D31CFCA6BA
31,503,745 UART: [art] PUB.Y = 9A13D02B7F43F2A503659DCDCA8E0F7A227761EB931CFA9B6AAA12C83F7DA274E760BDF235DB1E41A0D956511C6E5F92
31,511,028 UART: [art] SIG.R = E415F7FC0970DE8FAAF2AACC5020B3C854BD24DFAC4551938F8B11EC07F366F925524C7D83D845E93B56234615C7AE9D
31,518,438 UART: [art] SIG.S = 86D55940FC5513637C1EC5CD756F505315D1275AECD9391E56595CAB63BAFE3BF9F5C8DFB50C85CB9ADB8B3B899849A5
32,823,883 UART: Caliptra RT
32,824,588 UART: [state] CFI Enabled
32,984,295 UART: [rt] RT listening for mailbox commands...
32,986,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,016,913 UART: [rt]cmd =0x4d454153, len=108
33,035,456 >>> mbox cmd response data (12 bytes)
33,036,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,066,631 UART: [rt]cmd =0x4d454153, len=108
33,085,302 >>> mbox cmd response data (12 bytes)
33,085,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,116,273 UART: [rt]cmd =0x4d454153, len=108
33,134,689 >>> mbox cmd response data (12 bytes)
33,135,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,165,872 UART: [rt]cmd =0x4d454153, len=108
33,184,218 >>> mbox cmd response data (12 bytes)
33,184,708 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,215,179 UART: [rt]cmd =0x4d454153, len=108
33,233,792 >>> mbox cmd response data (12 bytes)
33,234,212 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,264,994 UART: [rt]cmd =0x4d454153, len=108
33,283,581 >>> mbox cmd response data (12 bytes)
33,284,006 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,314,714 UART: [rt]cmd =0x4d454153, len=108
33,332,944 >>> mbox cmd response data (12 bytes)
33,333,405 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,364,056 UART: [rt]cmd =0x4d454153, len=108
33,383,318 >>> mbox cmd response data (12 bytes)
33,383,741 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,414,331 UART: [rt]cmd =0x4d454153, len=108
33,432,914 >>> mbox cmd response data (12 bytes)
33,433,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,463,907 UART: [rt]cmd =0x4d454153, len=108
33,481,970 >>> mbox cmd response data (12 bytes)
33,482,391 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,513,186 UART: [rt]cmd =0x4d454153, len=108
33,531,879 >>> mbox cmd response data (12 bytes)
33,532,306 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,562,903 UART: [rt]cmd =0x4d454153, len=108
33,581,860 >>> mbox cmd response data (12 bytes)
33,582,351 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,613,008 UART: [rt]cmd =0x4d454153, len=108
33,631,022 >>> mbox cmd response data (12 bytes)
33,631,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,662,227 UART: [rt]cmd =0x4d454153, len=108
33,680,436 >>> mbox cmd response data (12 bytes)
33,680,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,711,559 UART: [rt]cmd =0x4d454153, len=108
33,730,624 >>> mbox cmd response data (12 bytes)
33,731,083 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,761,680 UART: [rt]cmd =0x4d454153, len=108
33,763,910 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,784,240 ready_for_fw is high
3,784,742 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,830,467 >>> mbox cmd response: success
23,531,719 UART:
23,532,105 UART: Running Caliptra FMC ...
23,533,258 UART:
23,533,425 UART: [state] CFI Enabled
23,599,610 UART: [fht] FMC Alias Private Key: 7
25,937,544 UART: [art] Extend RT PCRs Done
25,938,767 UART: [art] Lock RT PCRs Done
25,940,719 UART: [art] Populate DV Done
25,946,141 UART: [fht] FMC Alias Private Key: 7
25,947,790 UART: [art] Derive CDI
25,948,609 UART: [art] Store in in slot 0x4
26,008,031 UART: [art] Derive Key Pair
26,009,100 UART: [art] Store priv key in slot 0x5
29,301,757 UART: [art] Derive Key Pair - Done
29,314,264 UART: [art] Signing Cert with AUTHO
29,315,562 UART: RITY.KEYID = 7
31,603,560 UART: [art] Erasing AUTHORITY.KEYID = 7
31,605,078 UART: [art] PUB.X = 22510D93C92A592097DBD6EDF5813AE0282ABE532140AC168987C071AAEDD3CC7C8D9E8173A9793B574E9C679C434951
31,612,297 UART: [art] PUB.Y = 8E9698381FED15A85E8DC4D0A44A5B7F87F11AA7BD5B5E928BD86C5FC34377AF16F191D3A7F216344194A9EC7736F61C
31,619,556 UART: [art] SIG.R = 0550EE08FB3AE3D64F001B29C5E8A1DA5B1FEFEAE3B2FFAB6693795DBBDAE897ECCABBABB18A1BC15D6C7BD39D19DA23
31,626,974 UART: [art] SIG.S = E16293F1B754D4569BEEE6B4882BEC643162E677B57F32F30182201F4B54A0C8F093601207C2E0EB6426B8DAB8581035
32,931,908 UART: Caliptra RT
32,932,634 UART: [state] CFI Enabled
33,093,805 UART: [rt] RT listening for mailbox commands...
33,095,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,126,213 UART: [rt]cmd =0x4d454153, len=108
33,145,215 >>> mbox cmd response data (12 bytes)
33,145,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,176,636 UART: [rt]cmd =0x4d454153, len=108
33,195,017 >>> mbox cmd response data (12 bytes)
33,195,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,225,905 UART: [rt]cmd =0x4d454153, len=108
33,244,795 >>> mbox cmd response data (12 bytes)
33,245,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,275,964 UART: [rt]cmd =0x4d454153, len=108
33,294,486 >>> mbox cmd response data (12 bytes)
33,294,921 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,325,616 UART: [rt]cmd =0x4d454153, len=108
33,343,660 >>> mbox cmd response data (12 bytes)
33,344,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,374,798 UART: [rt]cmd =0x4d454153, len=108
33,392,595 >>> mbox cmd response data (12 bytes)
33,393,009 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,423,478 UART: [rt]cmd =0x4d454153, len=108
33,441,150 >>> mbox cmd response data (12 bytes)
33,441,586 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,472,397 UART: [rt]cmd =0x4d454153, len=108
33,491,491 >>> mbox cmd response data (12 bytes)
33,491,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,522,649 UART: [rt]cmd =0x4d454153, len=108
33,540,829 >>> mbox cmd response data (12 bytes)
33,541,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,571,623 UART: [rt]cmd =0x4d454153, len=108
33,589,618 >>> mbox cmd response data (12 bytes)
33,590,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,620,606 UART: [rt]cmd =0x4d454153, len=108
33,639,265 >>> mbox cmd response data (12 bytes)
33,639,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,670,534 UART: [rt]cmd =0x4d454153, len=108
33,689,324 >>> mbox cmd response data (12 bytes)
33,689,747 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,720,382 UART: [rt]cmd =0x4d454153, len=108
33,739,120 >>> mbox cmd response data (12 bytes)
33,739,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,770,146 UART: [rt]cmd =0x4d454153, len=108
33,789,440 >>> mbox cmd response data (12 bytes)
33,789,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,820,462 UART: [rt]cmd =0x4d454153, len=108
33,839,529 >>> mbox cmd response data (12 bytes)
33,839,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,870,607 UART: [rt]cmd =0x4d454153, len=108
33,872,933 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,249 UART:
192,602 UART: Running Caliptra ROM ...
193,797 UART:
603,641 UART: [state] CFI Enabled
619,081 UART: [state] LifecycleState = Unprovisioned
620,961 UART: [state] DebugLocked = No
623,198 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,918 UART: [kat] SHA2-256
798,644 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,162 UART: [kat] ++
809,756 UART: [kat] sha1
821,126 UART: [kat] SHA2-256
823,838 UART: [kat] SHA2-384
830,173 UART: [kat] SHA2-512-ACC
832,560 UART: [kat] ECC-384
3,115,606 UART: [kat] HMAC-384Kdf
3,127,858 UART: [kat] LMS
4,317,959 UART: [kat] --
4,322,118 UART: [cold-reset] ++
4,324,403 UART: [fht] Storing FHT @ 0x50003400
4,335,307 UART: [idev] ++
4,335,945 UART: [idev] CDI.KEYID = 6
4,336,851 UART: [idev] SUBJECT.KEYID = 7
4,338,091 UART: [idev] UDS.KEYID = 0
4,339,074 ready_for_fw is high
4,339,292 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,677 UART: [idev] Erasing UDS.KEYID = 0
7,624,744 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,795 UART: [idev] --
7,651,886 UART: [ldev] ++
7,652,468 UART: [ldev] CDI.KEYID = 6
7,653,482 UART: [ldev] SUBJECT.KEYID = 5
7,654,633 UART: [ldev] AUTHORITY.KEYID = 7
7,655,855 UART: [ldev] FE.KEYID = 1
7,668,115 UART: [ldev] Erasing FE.KEYID = 1
10,955,764 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,299 UART: [ldev] --
13,318,819 UART: [fwproc] Waiting for Commands...
13,321,492 UART: [fwproc] Received command 0x46574c44
13,323,658 UART: [fwproc] Received Image of size 114124 bytes
17,372,942 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,880 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,747 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,310 >>> mbox cmd response: success
17,841,385 UART: [afmc] ++
17,841,978 UART: [afmc] CDI.KEYID = 6
17,842,936 UART: [afmc] SUBJECT.KEYID = 7
17,844,142 UART: [afmc] AUTHORITY.KEYID = 5
21,157,870 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,696 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,958 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,358 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,181 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,619 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,373 UART: [afmc] --
23,524,408 UART: [cold-reset] --
23,527,725 UART: [state] Locking Datavault
23,534,588 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,357 UART: [state] Locking ICCM
23,538,203 UART: [exit] Launching FMC @ 0x40000130
23,546,603 UART:
23,546,836 UART: Running Caliptra FMC ...
23,547,933 UART:
23,548,083 UART: [state] CFI Enabled
23,556,450 UART: [fht] FMC Alias Private Key: 7
25,887,531 UART: [art] Extend RT PCRs Done
25,888,754 UART: [art] Lock RT PCRs Done
25,890,448 UART: [art] Populate DV Done
25,895,527 UART: [fht] FMC Alias Private Key: 7
25,897,219 UART: [art] Derive CDI
25,897,945 UART: [art] Store in in slot 0x4
25,940,698 UART: [art] Derive Key Pair
25,941,739 UART: [art] Store priv key in slot 0x5
29,184,011 UART: [art] Derive Key Pair - Done
29,196,860 UART: [art] Signing Cert with AUTHO
29,198,187 UART: RITY.KEYID = 7
31,477,533 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,038 UART: [art] PUB.X = 7EDEFACCFD189954CAD34DC7B74667F46CE114D072C396773CD1824D8F09FEFFF86A1CB9F479EEB5DCF54DBDEDFC2C14
31,486,322 UART: [art] PUB.Y = 2BA38285F17A2747A7A6C587DCCDAB973E2DCE3A511D28CB0A3890BC020F7C2B2D10555BAB1B0A9D108BB36EF6D9A190
31,493,637 UART: [art] SIG.R = B9B57165E29F3BABA35E0329EE6CA4E1E97F230FE00DBE8A8BE0D3D3A28EC4EA1303495CC482909894DEC862CABAF912
31,501,004 UART: [art] SIG.S = 9AA44A7D6BA3E6BA780497C6EBBE7A39DE132BC47AC4EB33C0E8002364112AE9C07F9BCC9958E5768A2943533096793E
32,806,835 UART: Caliptra RT
32,807,544 UART: [state] CFI Enabled
32,925,745 UART: [rt] RT listening for mailbox commands...
32,927,623 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,958,187 UART: [rt]cmd =0x4d454153, len=108
32,976,288 >>> mbox cmd response data (12 bytes)
32,976,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,007,687 UART: [rt]cmd =0x4d454153, len=108
33,026,842 >>> mbox cmd response data (12 bytes)
33,027,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,058,162 UART: [rt]cmd =0x4d454153, len=108
33,075,956 >>> mbox cmd response data (12 bytes)
33,076,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,107,038 UART: [rt]cmd =0x4d454153, len=108
33,126,054 >>> mbox cmd response data (12 bytes)
33,126,487 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,157,017 UART: [rt]cmd =0x4d454153, len=108
33,175,937 >>> mbox cmd response data (12 bytes)
33,176,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,207,233 UART: [rt]cmd =0x4d454153, len=108
33,226,625 >>> mbox cmd response data (12 bytes)
33,227,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,257,638 UART: [rt]cmd =0x4d454153, len=108
33,276,454 >>> mbox cmd response data (12 bytes)
33,276,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,307,420 UART: [rt]cmd =0x4d454153, len=108
33,325,753 >>> mbox cmd response data (12 bytes)
33,326,178 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,356,831 UART: [rt]cmd =0x4d454153, len=108
33,375,624 >>> mbox cmd response data (12 bytes)
33,376,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,406,695 UART: [rt]cmd =0x4d454153, len=108
33,425,675 >>> mbox cmd response data (12 bytes)
33,426,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,456,738 UART: [rt]cmd =0x4d454153, len=108
33,475,501 >>> mbox cmd response data (12 bytes)
33,475,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,506,516 UART: [rt]cmd =0x4d454153, len=108
33,524,499 >>> mbox cmd response data (12 bytes)
33,524,928 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,555,889 UART: [rt]cmd =0x4d454153, len=108
33,574,668 >>> mbox cmd response data (12 bytes)
33,575,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,605,635 UART: [rt]cmd =0x4d454153, len=108
33,623,997 >>> mbox cmd response data (12 bytes)
33,624,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,655,005 UART: [rt]cmd =0x4d454153, len=108
33,673,778 >>> mbox cmd response data (12 bytes)
33,674,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,704,672 UART: [rt]cmd =0x4d454153, len=108
33,706,732 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,126,235 ready_for_fw is high
4,126,755 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,268 >>> mbox cmd response: success
23,709,335 UART:
23,709,735 UART: Running Caliptra FMC ...
23,710,829 UART:
23,710,978 UART: [state] CFI Enabled
23,719,358 UART: [fht] FMC Alias Private Key: 7
26,050,965 UART: [art] Extend RT PCRs Done
26,052,199 UART: [art] Lock RT PCRs Done
26,053,814 UART: [art] Populate DV Done
26,059,242 UART: [fht] FMC Alias Private Key: 7
26,060,835 UART: [art] Derive CDI
26,061,602 UART: [art] Store in in slot 0x4
26,104,684 UART: [art] Derive Key Pair
26,105,682 UART: [art] Store priv key in slot 0x5
29,347,716 UART: [art] Derive Key Pair - Done
29,360,661 UART: [art] Signing Cert with AUTHO
29,361,959 UART: RITY.KEYID = 7
31,641,317 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,824 UART: [art] PUB.X = D1000B2D1349C3359158EAA28993754F4BC3138AB973BF05271C551ED3E815CDBF853CEB2A0EE62E7281C36F62E1FEDA
31,650,067 UART: [art] PUB.Y = FCB4D3666B45CB0D841251276C85EF7F96972D62160F2C1238FA41D87E813B59844176AA8A69C5FE89985133CEFA4051
31,657,297 UART: [art] SIG.R = 18D9B2ED19B137027DF5D2724E2F6C163DBB9921B4A4E2713287EC09520A535000BB4140E524FB6E68F01A25780D799F
31,664,724 UART: [art] SIG.S = 191EE1918894FFF7022616620445BDE333C29D6C97F8AB8419CD754038A8318BC7B510E2A105433C332458E089D4AC81
32,969,785 UART: Caliptra RT
32,970,498 UART: [state] CFI Enabled
33,087,666 UART: [rt] RT listening for mailbox commands...
33,089,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,120,183 UART: [rt]cmd =0x4d454153, len=108
33,139,389 >>> mbox cmd response data (12 bytes)
33,139,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,170,456 UART: [rt]cmd =0x4d454153, len=108
33,189,614 >>> mbox cmd response data (12 bytes)
33,190,088 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,220,685 UART: [rt]cmd =0x4d454153, len=108
33,239,346 >>> mbox cmd response data (12 bytes)
33,239,783 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,270,547 UART: [rt]cmd =0x4d454153, len=108
33,289,475 >>> mbox cmd response data (12 bytes)
33,289,977 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,320,682 UART: [rt]cmd =0x4d454153, len=108
33,339,609 >>> mbox cmd response data (12 bytes)
33,340,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,370,802 UART: [rt]cmd =0x4d454153, len=108
33,389,902 >>> mbox cmd response data (12 bytes)
33,390,348 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,420,738 UART: [rt]cmd =0x4d454153, len=108
33,438,784 >>> mbox cmd response data (12 bytes)
33,439,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,469,699 UART: [rt]cmd =0x4d454153, len=108
33,489,162 >>> mbox cmd response data (12 bytes)
33,489,592 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,520,357 UART: [rt]cmd =0x4d454153, len=108
33,539,262 >>> mbox cmd response data (12 bytes)
33,539,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,570,492 UART: [rt]cmd =0x4d454153, len=108
33,588,400 >>> mbox cmd response data (12 bytes)
33,588,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,619,397 UART: [rt]cmd =0x4d454153, len=108
33,637,727 >>> mbox cmd response data (12 bytes)
33,638,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,668,921 UART: [rt]cmd =0x4d454153, len=108
33,687,934 >>> mbox cmd response data (12 bytes)
33,688,362 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,719,216 UART: [rt]cmd =0x4d454153, len=108
33,737,928 >>> mbox cmd response data (12 bytes)
33,738,356 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,769,009 UART: [rt]cmd =0x4d454153, len=108
33,787,383 >>> mbox cmd response data (12 bytes)
33,787,818 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,818,190 UART: [rt]cmd =0x4d454153, len=108
33,836,672 >>> mbox cmd response data (12 bytes)
33,837,130 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,867,665 UART: [rt]cmd =0x4d454153, len=108
33,870,215 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
191,988 UART:
192,353 UART: Running Caliptra ROM ...
193,506 UART:
193,654 UART: [state] CFI Enabled
266,769 UART: [state] LifecycleState = Unprovisioned
268,628 UART: [state] DebugLocked = No
270,171 UART: [state] WD Timer not started. Device not locked for debugging
274,147 UART: [kat] SHA2-256
453,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,798 UART: [kat] ++
465,328 UART: [kat] sha1
477,981 UART: [kat] SHA2-256
480,986 UART: [kat] SHA2-384
487,822 UART: [kat] SHA2-512-ACC
490,823 UART: [kat] ECC-384
2,947,885 UART: [kat] HMAC-384Kdf
2,973,198 UART: [kat] LMS
3,502,604 UART: [kat] --
3,508,247 UART: [cold-reset] ++
3,509,321 UART: [fht] FHT @ 0x50003400
3,519,657 UART: [idev] ++
3,520,225 UART: [idev] CDI.KEYID = 6
3,521,204 UART: [idev] SUBJECT.KEYID = 7
3,522,375 UART: [idev] UDS.KEYID = 0
3,523,301 ready_for_fw is high
3,523,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,425 UART: [idev] Erasing UDS.KEYID = 0
6,029,071 UART: [idev] Sha1 KeyId Algorithm
6,050,309 UART: [idev] --
6,054,362 UART: [ldev] ++
6,054,943 UART: [ldev] CDI.KEYID = 6
6,055,867 UART: [ldev] SUBJECT.KEYID = 5
6,057,030 UART: [ldev] AUTHORITY.KEYID = 7
6,058,325 UART: [ldev] FE.KEYID = 1
6,101,881 UART: [ldev] Erasing FE.KEYID = 1
8,606,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,312 UART: [ldev] --
10,417,814 UART: [fwproc] Wait for Commands...
10,420,666 UART: [fwproc] Recv command 0x46574c44
10,422,706 UART: [fwproc] Recv'd Img size: 114448 bytes
13,828,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,212 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,287,710 >>> mbox cmd response: success
14,291,153 UART: [afmc] ++
14,291,746 UART: [afmc] CDI.KEYID = 6
14,292,679 UART: [afmc] SUBJECT.KEYID = 7
14,293,842 UART: [afmc] AUTHORITY.KEYID = 5
16,828,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,780 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,827 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,701 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,029 UART: [afmc] --
18,630,730 UART: [cold-reset] --
18,633,776 UART: [state] Locking Datavault
18,638,855 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,496 UART: [state] Locking ICCM
18,643,022 UART: [exit] Launching FMC @ 0x40000130
18,651,420 UART:
18,651,654 UART: Running Caliptra FMC ...
18,652,773 UART:
18,652,940 UART: [state] CFI Enabled
18,713,636 UART: [fht] FMC Alias Private Key: 7
20,476,925 UART: [art] Extend RT PCRs Done
20,478,142 UART: [art] Lock RT PCRs Done
20,479,593 UART: [art] Populate DV Done
20,484,900 UART: [fht] FMC Alias Private Key: 7
20,486,649 UART: [art] Derive CDI
20,487,386 UART: [art] Store in in slot 0x4
20,546,105 UART: [art] Derive Key Pair
20,547,141 UART: [art] Store priv key in slot 0x5
23,009,895 UART: [art] Derive Key Pair - Done
23,022,944 UART: [art] Signing Cert with AUTHO
23,024,244 UART: RITY.KEYID = 7
24,735,744 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,257 UART: [art] PUB.X = CF6A3F4F9A72DC13AA3BD79610BC550D2B0CB588939184E51B3C1393090DDC56A70F3F0D1648FBEB2594987633C6D60C
24,744,539 UART: [art] PUB.Y = 59221A20291EF65DAFD3217B6A7A286BB9A35DBA697D304BD98C60A5E62E4851999D421223CC4EC17363C1866AB9C53F
24,751,769 UART: [art] SIG.R = 97157E97F2F394F822FDBE6B68D3A701A65E364131F0A6C04C58C4C264D50763D448D9B9E628BC3F79CC35CC0480DB66
24,759,179 UART: [art] SIG.S = 8A2854A4F8F6C82F67FA65ADE1FE9A6167E4FAD399B3001337F57D23601AE9C24E059A4230BBFCA295EFC85ADE0B26ED
25,737,811 UART: Caliptra RT
25,738,525 UART: [state] CFI Enabled
25,903,206 UART: [rt] RT listening for mailbox commands...
25,905,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,936,399 UART: [rt]cmd =0x4d454153, len=108
25,955,707 >>> mbox cmd response data (12 bytes)
25,956,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,987,037 UART: [rt]cmd =0x4d454153, len=108
26,005,274 >>> mbox cmd response data (12 bytes)
26,005,717 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,036,449 UART: [rt]cmd =0x4d454153, len=108
26,054,931 >>> mbox cmd response data (12 bytes)
26,055,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,086,090 UART: [rt]cmd =0x4d454153, len=108
26,105,238 >>> mbox cmd response data (12 bytes)
26,105,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,136,170 UART: [rt]cmd =0x4d454153, len=108
26,154,749 >>> mbox cmd response data (12 bytes)
26,155,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,185,878 UART: [rt]cmd =0x4d454153, len=108
26,204,702 >>> mbox cmd response data (12 bytes)
26,205,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,235,755 UART: [rt]cmd =0x4d454153, len=108
26,254,355 >>> mbox cmd response data (12 bytes)
26,254,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,285,392 UART: [rt]cmd =0x4d454153, len=108
26,303,539 >>> mbox cmd response data (12 bytes)
26,303,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,334,440 UART: [rt]cmd =0x4d454153, len=108
26,352,967 >>> mbox cmd response data (12 bytes)
26,353,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,384,026 UART: [rt]cmd =0x4d454153, len=108
26,402,986 >>> mbox cmd response data (12 bytes)
26,403,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,434,183 UART: [rt]cmd =0x4d454153, len=108
26,452,822 >>> mbox cmd response data (12 bytes)
26,453,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,483,853 UART: [rt]cmd =0x4d454153, len=108
26,502,400 >>> mbox cmd response data (12 bytes)
26,502,822 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,533,317 UART: [rt]cmd =0x4d454153, len=108
26,552,011 >>> mbox cmd response data (12 bytes)
26,552,441 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,582,923 UART: [rt]cmd =0x4d454153, len=108
26,601,359 >>> mbox cmd response data (12 bytes)
26,601,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,632,745 UART: [rt]cmd =0x4d454153, len=108
26,650,861 >>> mbox cmd response data (12 bytes)
26,651,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,681,885 UART: [rt]cmd =0x4d454153, len=108
26,684,193 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,361,744 ready_for_fw is high
3,362,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,047,123 >>> mbox cmd response: success
18,338,668 UART:
18,339,068 UART: Running Caliptra FMC ...
18,340,226 UART:
18,340,393 UART: [state] CFI Enabled
18,391,164 UART: [fht] FMC Alias Private Key: 7
20,154,931 UART: [art] Extend RT PCRs Done
20,156,139 UART: [art] Lock RT PCRs Done
20,157,759 UART: [art] Populate DV Done
20,163,014 UART: [fht] FMC Alias Private Key: 7
20,164,720 UART: [art] Derive CDI
20,165,541 UART: [art] Store in in slot 0x4
20,223,647 UART: [art] Derive Key Pair
20,224,691 UART: [art] Store priv key in slot 0x5
22,687,763 UART: [art] Derive Key Pair - Done
22,700,982 UART: [art] Signing Cert with AUTHO
22,702,320 UART: RITY.KEYID = 7
24,413,226 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,709 UART: [art] PUB.X = BAC6E2FFE683EC008768E9E708DAA9C016B02BCC20FD4801AE1FA8B874FD71F3883C0E55376ED9A49F8C04973E048703
24,421,951 UART: [art] PUB.Y = 031CF3473ECC6DC57DFD74E92CB2B9EB9049AD849600E0FD7D3BC5C2DF2F80B6A8A003C112C3F25C194A00F219EB541A
24,429,204 UART: [art] SIG.R = B5805C2ED949C7437B888A8A9F8B9A99AB62D85901C7C906FB279A3C0586E9DC1E845D0551866B0FF8BCA2D74859EB12
24,436,606 UART: [art] SIG.S = 09DB9E4056A3D650790483FAB36554A02C79D5C60E3358143FB17ECDAB6E6A4258A15BF5B16C16572F78238DE2555BD0
25,415,418 UART: Caliptra RT
25,416,128 UART: [state] CFI Enabled
25,580,557 UART: [rt] RT listening for mailbox commands...
25,582,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,613,548 UART: [rt]cmd =0x4d454153, len=108
25,632,039 >>> mbox cmd response data (12 bytes)
25,632,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,663,383 UART: [rt]cmd =0x4d454153, len=108
25,681,189 >>> mbox cmd response data (12 bytes)
25,681,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,712,144 UART: [rt]cmd =0x4d454153, len=108
25,729,730 >>> mbox cmd response data (12 bytes)
25,730,153 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,760,822 UART: [rt]cmd =0x4d454153, len=108
25,778,850 >>> mbox cmd response data (12 bytes)
25,779,305 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,810,175 UART: [rt]cmd =0x4d454153, len=108
25,828,884 >>> mbox cmd response data (12 bytes)
25,829,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,860,028 UART: [rt]cmd =0x4d454153, len=108
25,878,477 >>> mbox cmd response data (12 bytes)
25,878,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,909,522 UART: [rt]cmd =0x4d454153, len=108
25,928,056 >>> mbox cmd response data (12 bytes)
25,928,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,959,083 UART: [rt]cmd =0x4d454153, len=108
25,977,977 >>> mbox cmd response data (12 bytes)
25,978,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,009,040 UART: [rt]cmd =0x4d454153, len=108
26,027,974 >>> mbox cmd response data (12 bytes)
26,028,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,059,121 UART: [rt]cmd =0x4d454153, len=108
26,077,333 >>> mbox cmd response data (12 bytes)
26,077,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,108,634 UART: [rt]cmd =0x4d454153, len=108
26,126,858 >>> mbox cmd response data (12 bytes)
26,127,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,158,151 UART: [rt]cmd =0x4d454153, len=108
26,176,806 >>> mbox cmd response data (12 bytes)
26,177,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,207,890 UART: [rt]cmd =0x4d454153, len=108
26,226,618 >>> mbox cmd response data (12 bytes)
26,227,085 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,257,838 UART: [rt]cmd =0x4d454153, len=108
26,276,603 >>> mbox cmd response data (12 bytes)
26,277,027 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,307,637 UART: [rt]cmd =0x4d454153, len=108
26,327,086 >>> mbox cmd response data (12 bytes)
26,327,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,358,172 UART: [rt]cmd =0x4d454153, len=108
26,360,719 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,327 UART:
192,698 UART: Running Caliptra ROM ...
193,817 UART:
603,314 UART: [state] CFI Enabled
616,897 UART: [state] LifecycleState = Unprovisioned
618,763 UART: [state] DebugLocked = No
620,074 UART: [state] WD Timer not started. Device not locked for debugging
624,458 UART: [kat] SHA2-256
803,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,138 UART: [kat] ++
815,658 UART: [kat] sha1
826,730 UART: [kat] SHA2-256
829,746 UART: [kat] SHA2-384
837,160 UART: [kat] SHA2-512-ACC
840,160 UART: [kat] ECC-384
3,282,075 UART: [kat] HMAC-384Kdf
3,294,837 UART: [kat] LMS
3,824,299 UART: [kat] --
3,830,493 UART: [cold-reset] ++
3,832,347 UART: [fht] FHT @ 0x50003400
3,842,315 UART: [idev] ++
3,842,873 UART: [idev] CDI.KEYID = 6
3,843,894 UART: [idev] SUBJECT.KEYID = 7
3,845,058 UART: [idev] UDS.KEYID = 0
3,845,979 ready_for_fw is high
3,846,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,996 UART: [idev] Erasing UDS.KEYID = 0
6,319,319 UART: [idev] Sha1 KeyId Algorithm
6,342,529 UART: [idev] --
6,345,947 UART: [ldev] ++
6,346,528 UART: [ldev] CDI.KEYID = 6
6,347,436 UART: [ldev] SUBJECT.KEYID = 5
6,348,608 UART: [ldev] AUTHORITY.KEYID = 7
6,349,832 UART: [ldev] FE.KEYID = 1
6,361,384 UART: [ldev] Erasing FE.KEYID = 1
8,833,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,234 UART: [ldev] --
10,628,169 UART: [fwproc] Wait for Commands...
10,631,228 UART: [fwproc] Recv command 0x46574c44
10,633,314 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,181 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,182 >>> mbox cmd response: success
14,493,540 UART: [afmc] ++
14,494,128 UART: [afmc] CDI.KEYID = 6
14,495,031 UART: [afmc] SUBJECT.KEYID = 7
14,496,244 UART: [afmc] AUTHORITY.KEYID = 5
16,995,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,633 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,671 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,510 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,588 UART: [afmc] --
18,791,034 UART: [cold-reset] --
18,795,967 UART: [state] Locking Datavault
18,800,502 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,149 UART: [state] Locking ICCM
18,804,831 UART: [exit] Launching FMC @ 0x40000130
18,813,277 UART:
18,813,508 UART: Running Caliptra FMC ...
18,814,604 UART:
18,814,759 UART: [state] CFI Enabled
18,822,968 UART: [fht] FMC Alias Private Key: 7
20,579,474 UART: [art] Extend RT PCRs Done
20,580,689 UART: [art] Lock RT PCRs Done
20,582,709 UART: [art] Populate DV Done
20,588,058 UART: [fht] FMC Alias Private Key: 7
20,589,694 UART: [art] Derive CDI
20,590,422 UART: [art] Store in in slot 0x4
20,633,217 UART: [art] Derive Key Pair
20,634,206 UART: [art] Store priv key in slot 0x5
23,060,897 UART: [art] Derive Key Pair - Done
23,073,566 UART: [art] Signing Cert with AUTHO
23,074,865 UART: RITY.KEYID = 7
24,780,222 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,722 UART: [art] PUB.X = 3131F121D4889724F1B5E17981346AAC54F1556B8867B6FC197DE54F3833F44CE131DBE8EEB82AD2088A71DA6B126B47
24,788,948 UART: [art] PUB.Y = A24239FB33B51D6D6F3DE63B82F4EFB26AC21DE1BBD3F33891EDC9C9CCAF2FDA4FDC7AD448C20C8326B5C1AC1FEFB146
24,796,267 UART: [art] SIG.R = 5F6575AB3BFC7387BC32064B845BB864721986DCE2AFA6D51AD754314CDDA341E62FDE43B958C58BF496BB237AE02DAD
24,803,703 UART: [art] SIG.S = 4395B9A93673DEF994DE28901A0B29C36DED10BAFFC1F6B48BEF33624F29AC6BC219F5AF4157F8DA6785E9B6E751A806
25,782,109 UART: Caliptra RT
25,782,801 UART: [state] CFI Enabled
25,899,151 UART: [rt] RT listening for mailbox commands...
25,901,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,931,854 UART: [rt]cmd =0x4d454153, len=108
25,950,025 >>> mbox cmd response data (12 bytes)
25,950,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,981,095 UART: [rt]cmd =0x4d454153, len=108
25,998,947 >>> mbox cmd response data (12 bytes)
25,999,374 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,030,149 UART: [rt]cmd =0x4d454153, len=108
26,048,613 >>> mbox cmd response data (12 bytes)
26,049,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,079,865 UART: [rt]cmd =0x4d454153, len=108
26,097,893 >>> mbox cmd response data (12 bytes)
26,098,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,128,943 UART: [rt]cmd =0x4d454153, len=108
26,147,542 >>> mbox cmd response data (12 bytes)
26,147,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,178,448 UART: [rt]cmd =0x4d454153, len=108
26,197,137 >>> mbox cmd response data (12 bytes)
26,197,566 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,228,308 UART: [rt]cmd =0x4d454153, len=108
26,247,280 >>> mbox cmd response data (12 bytes)
26,247,705 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,278,310 UART: [rt]cmd =0x4d454153, len=108
26,296,512 >>> mbox cmd response data (12 bytes)
26,296,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,327,598 UART: [rt]cmd =0x4d454153, len=108
26,345,775 >>> mbox cmd response data (12 bytes)
26,346,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,376,928 UART: [rt]cmd =0x4d454153, len=108
26,395,741 >>> mbox cmd response data (12 bytes)
26,396,161 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,426,760 UART: [rt]cmd =0x4d454153, len=108
26,445,713 >>> mbox cmd response data (12 bytes)
26,446,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,477,002 UART: [rt]cmd =0x4d454153, len=108
26,495,601 >>> mbox cmd response data (12 bytes)
26,496,015 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,526,776 UART: [rt]cmd =0x4d454153, len=108
26,545,686 >>> mbox cmd response data (12 bytes)
26,546,111 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,576,832 UART: [rt]cmd =0x4d454153, len=108
26,595,787 >>> mbox cmd response data (12 bytes)
26,596,213 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,627,013 UART: [rt]cmd =0x4d454153, len=108
26,645,175 >>> mbox cmd response data (12 bytes)
26,645,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,676,238 UART: [rt]cmd =0x4d454153, len=108
26,678,981 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,697,299 ready_for_fw is high
3,697,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,266,707 >>> mbox cmd response: success
18,526,308 UART:
18,526,708 UART: Running Caliptra FMC ...
18,527,811 UART:
18,527,955 UART: [state] CFI Enabled
18,536,009 UART: [fht] FMC Alias Private Key: 7
20,293,563 UART: [art] Extend RT PCRs Done
20,294,787 UART: [art] Lock RT PCRs Done
20,296,237 UART: [art] Populate DV Done
20,301,534 UART: [fht] FMC Alias Private Key: 7
20,303,122 UART: [art] Derive CDI
20,303,852 UART: [art] Store in in slot 0x4
20,345,972 UART: [art] Derive Key Pair
20,346,971 UART: [art] Store priv key in slot 0x5
22,773,621 UART: [art] Derive Key Pair - Done
22,786,400 UART: [art] Signing Cert with AUTHO
22,787,698 UART: RITY.KEYID = 7
24,493,313 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,812 UART: [art] PUB.X = 7EECD0868BE236A945C2F739379BFAB35CEF703DC56143169B26F8DA6ED972E442C93B2B8A997DA51539AD546AE7D857
24,502,112 UART: [art] PUB.Y = A28677E13C308861B5C678480AC37A7F1A73C99E9BA3BD60C710BAF100AB456D860BA56071E5B80D51D4234C9C7AD7D8
24,509,374 UART: [art] SIG.R = 00BE1DC264E7E1328217FFD5079A720296A61B845D87479C007ACB03DA890D6CFD502F19C70DB880042ED6236F6B7C1A
24,516,758 UART: [art] SIG.S = 0D5E645B56777F27177B0AEEBC6F7CDBFB28BC2FA0C05ADF34C820614A616955BD89F05F0249903483555BD36F2EE057
25,495,684 UART: Caliptra RT
25,496,380 UART: [state] CFI Enabled
25,614,358 UART: [rt] RT listening for mailbox commands...
25,616,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,646,905 UART: [rt]cmd =0x4d454153, len=108
25,665,158 >>> mbox cmd response data (12 bytes)
25,665,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,696,414 UART: [rt]cmd =0x4d454153, len=108
25,714,806 >>> mbox cmd response data (12 bytes)
25,715,279 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,745,978 UART: [rt]cmd =0x4d454153, len=108
25,765,064 >>> mbox cmd response data (12 bytes)
25,765,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,796,079 UART: [rt]cmd =0x4d454153, len=108
25,814,585 >>> mbox cmd response data (12 bytes)
25,815,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,845,622 UART: [rt]cmd =0x4d454153, len=108
25,865,133 >>> mbox cmd response data (12 bytes)
25,865,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,896,265 UART: [rt]cmd =0x4d454153, len=108
25,914,519 >>> mbox cmd response data (12 bytes)
25,914,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,945,603 UART: [rt]cmd =0x4d454153, len=108
25,964,098 >>> mbox cmd response data (12 bytes)
25,964,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,995,099 UART: [rt]cmd =0x4d454153, len=108
26,014,351 >>> mbox cmd response data (12 bytes)
26,014,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,045,747 UART: [rt]cmd =0x4d454153, len=108
26,064,434 >>> mbox cmd response data (12 bytes)
26,064,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,095,612 UART: [rt]cmd =0x4d454153, len=108
26,114,700 >>> mbox cmd response data (12 bytes)
26,115,162 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,145,640 UART: [rt]cmd =0x4d454153, len=108
26,164,455 >>> mbox cmd response data (12 bytes)
26,164,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,195,504 UART: [rt]cmd =0x4d454153, len=108
26,214,591 >>> mbox cmd response data (12 bytes)
26,215,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,245,617 UART: [rt]cmd =0x4d454153, len=108
26,263,835 >>> mbox cmd response data (12 bytes)
26,264,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,294,947 UART: [rt]cmd =0x4d454153, len=108
26,313,692 >>> mbox cmd response data (12 bytes)
26,314,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,344,709 UART: [rt]cmd =0x4d454153, len=108
26,363,472 >>> mbox cmd response data (12 bytes)
26,363,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,394,622 UART: [rt]cmd =0x4d454153, len=108
26,396,942 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,417,907 ready_for_fw is high
3,418,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,704,819 >>> mbox cmd response: success
18,988,169 UART:
18,988,563 UART: Running Caliptra FMC ...
18,989,667 UART:
18,989,819 UART: [state] CFI Enabled
19,051,117 UART: [fht] FMC Alias Private Key: 7
20,815,209 UART: [art] Extend RT PCRs Done
20,816,439 UART: [art] Lock RT PCRs Done
20,817,894 UART: [art] Populate DV Done
20,823,415 UART: [fht] FMC Alias Private Key: 7
20,825,018 UART: [art] Derive CDI
20,825,836 UART: [art] Store in in slot 0x4
20,883,585 UART: [art] Derive Key Pair
20,884,624 UART: [art] Store priv key in slot 0x5
23,347,934 UART: [art] Derive Key Pair - Done
23,361,030 UART: [art] Signing Cert with AUTHO
23,362,343 UART: RITY.KEYID = 7
25,073,672 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,178 UART: [art] PUB.X = 09D2796BAF30AAE20E8FE3616CD9B826DA972C37B0BB2CC18F134885170158A817C95FC1184FADADC3582621AB3929A3
25,082,485 UART: [art] PUB.Y = 495F0CEE84F9CDB9CDF608C9DCD17CBA2689F8BB12D895042A2968771AFA06C76909174675A809CA3384DA4DBA47F43E
25,089,738 UART: [art] SIG.R = 5FC4CC59DFFE5F247F0B14D2EC697A419CA12CFA5EAF5626C1470BD441CF4BCA11B04D7D86474A9F99A1A94DA0F7A32A
25,097,184 UART: [art] SIG.S = 7AD52127F6C5674392691EC34C95A23B758F02C2BE2FC4AB5DA94FAE4F2E370AFBAB5DC1A659679593986B2E788B887D
26,076,023 UART: Caliptra RT
26,076,735 UART: [state] CFI Enabled
26,242,288 UART: [rt] RT listening for mailbox commands...
26,244,186 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,275,650 UART: [rt]cmd =0x4d454153, len=108
26,293,701 >>> mbox cmd response data (12 bytes)
26,294,212 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,324,777 UART: [rt]cmd =0x4d454153, len=108
26,343,040 >>> mbox cmd response data (12 bytes)
26,343,493 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,374,250 UART: [rt]cmd =0x4d454153, len=108
26,393,146 >>> mbox cmd response data (12 bytes)
26,393,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,424,180 UART: [rt]cmd =0x4d454153, len=108
26,442,455 >>> mbox cmd response data (12 bytes)
26,442,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,473,474 UART: [rt]cmd =0x4d454153, len=108
26,492,487 >>> mbox cmd response data (12 bytes)
26,492,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,523,354 UART: [rt]cmd =0x4d454153, len=108
26,541,198 >>> mbox cmd response data (12 bytes)
26,541,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,572,275 UART: [rt]cmd =0x4d454153, len=108
26,591,133 >>> mbox cmd response data (12 bytes)
26,591,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,622,436 UART: [rt]cmd =0x4d454153, len=108
26,641,228 >>> mbox cmd response data (12 bytes)
26,641,665 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,672,416 UART: [rt]cmd =0x4d454153, len=108
26,690,857 >>> mbox cmd response data (12 bytes)
26,691,277 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,721,830 UART: [rt]cmd =0x4d454153, len=108
26,740,052 >>> mbox cmd response data (12 bytes)
26,740,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,771,230 UART: [rt]cmd =0x4d454153, len=108
26,789,839 >>> mbox cmd response data (12 bytes)
26,790,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,821,054 UART: [rt]cmd =0x4d454153, len=108
26,839,226 >>> mbox cmd response data (12 bytes)
26,839,645 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,870,299 UART: [rt]cmd =0x4d454153, len=108
26,888,559 >>> mbox cmd response data (12 bytes)
26,888,988 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,919,524 UART: [rt]cmd =0x4d454153, len=108
26,937,260 >>> mbox cmd response data (12 bytes)
26,937,684 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,968,334 UART: [rt]cmd =0x4d454153, len=108
26,987,081 >>> mbox cmd response data (12 bytes)
26,987,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,018,123 UART: [rt]cmd =0x4d454153, len=108
27,020,454 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,013 writing to cptra_bootfsm_go
3,759,805 ready_for_fw is high
3,760,292 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,968,606 >>> mbox cmd response: success
19,222,425 UART:
19,222,811 UART: Running Caliptra FMC ...
19,223,939 UART:
19,224,094 UART: [state] CFI Enabled
19,232,471 UART: [fht] FMC Alias Private Key: 7
20,989,517 UART: [art] Extend RT PCRs Done
20,990,743 UART: [art] Lock RT PCRs Done
20,992,504 UART: [art] Populate DV Done
20,997,731 UART: [fht] FMC Alias Private Key: 7
20,999,383 UART: [art] Derive CDI
21,000,116 UART: [art] Store in in slot 0x4
21,042,436 UART: [art] Derive Key Pair
21,043,652 UART: [art] Store priv key in slot 0x5
23,470,122 UART: [art] Derive Key Pair - Done
23,483,280 UART: [art] Signing Cert with AUTHO
23,484,581 UART: RITY.KEYID = 7
25,189,900 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,410 UART: [art] PUB.X = E0BDB923CBB31F5EF4D04DC4AF991F773AEC8C17BF52FDEA2E8517EDADCAAC4097A10C2767E3DA31F9B8EE9839F2C2C6
25,198,678 UART: [art] PUB.Y = DEB6E777882529D15443288812A00DB8810A1D59EBA8B84D46752F30223C715DBCFC6B932E1238A966D06F88D85CB3AD
25,205,959 UART: [art] SIG.R = C6C91DB3CBD8D6E1ACC828C72DB64A69CAE5946BB7058E1F00470F32FBC77739A35F10352FDD0D34983AED7DC680EF62
25,213,360 UART: [art] SIG.S = 8F2D6CD15D810F68364D0842A954F8EF2BD55C8491FAD7A703A3EA0BD71EA9524D658123FC9E2A607401ECEE33F07F68
26,192,390 UART: Caliptra RT
26,193,074 UART: [state] CFI Enabled
26,310,347 UART: [rt] RT listening for mailbox commands...
26,312,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,342,965 UART: [rt]cmd =0x4d454153, len=108
26,361,388 >>> mbox cmd response data (12 bytes)
26,361,908 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,392,355 UART: [rt]cmd =0x4d454153, len=108
26,410,801 >>> mbox cmd response data (12 bytes)
26,411,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,441,811 UART: [rt]cmd =0x4d454153, len=108
26,460,581 >>> mbox cmd response data (12 bytes)
26,461,014 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,491,670 UART: [rt]cmd =0x4d454153, len=108
26,509,629 >>> mbox cmd response data (12 bytes)
26,510,067 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,540,820 UART: [rt]cmd =0x4d454153, len=108
26,559,799 >>> mbox cmd response data (12 bytes)
26,560,233 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,590,746 UART: [rt]cmd =0x4d454153, len=108
26,609,113 >>> mbox cmd response data (12 bytes)
26,609,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,640,349 UART: [rt]cmd =0x4d454153, len=108
26,659,116 >>> mbox cmd response data (12 bytes)
26,659,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,690,171 UART: [rt]cmd =0x4d454153, len=108
26,708,877 >>> mbox cmd response data (12 bytes)
26,709,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,739,693 UART: [rt]cmd =0x4d454153, len=108
26,757,733 >>> mbox cmd response data (12 bytes)
26,758,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,788,933 UART: [rt]cmd =0x4d454153, len=108
26,807,332 >>> mbox cmd response data (12 bytes)
26,807,798 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,838,442 UART: [rt]cmd =0x4d454153, len=108
26,856,635 >>> mbox cmd response data (12 bytes)
26,857,063 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,887,824 UART: [rt]cmd =0x4d454153, len=108
26,906,191 >>> mbox cmd response data (12 bytes)
26,906,612 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,937,199 UART: [rt]cmd =0x4d454153, len=108
26,955,798 >>> mbox cmd response data (12 bytes)
26,956,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,986,918 UART: [rt]cmd =0x4d454153, len=108
27,005,603 >>> mbox cmd response data (12 bytes)
27,006,037 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,036,903 UART: [rt]cmd =0x4d454153, len=108
27,055,481 >>> mbox cmd response data (12 bytes)
27,055,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,086,782 UART: [rt]cmd =0x4d454153, len=108
27,089,011 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,642 UART: [state] LifecycleState = Unprovisioned
85,297 UART: [state] DebugLocked = No
85,967 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,585 UART: [kat] SHA2-256
881,516 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,631 UART: [kat] ++
885,783 UART: [kat] sha1
890,121 UART: [kat] SHA2-256
892,059 UART: [kat] SHA2-384
894,860 UART: [kat] SHA2-512-ACC
896,761 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
907,018 UART: [kat] LMS
1,475,214 UART: [kat] --
1,476,009 UART: [cold-reset] ++
1,476,377 UART: [fht] Storing FHT @ 0x50003400
1,479,176 UART: [idev] ++
1,479,344 UART: [idev] CDI.KEYID = 6
1,479,704 UART: [idev] SUBJECT.KEYID = 7
1,480,128 UART: [idev] UDS.KEYID = 0
1,480,473 ready_for_fw is high
1,480,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,220 UART: [idev] Erasing UDS.KEYID = 0
1,504,618 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,104 UART: [idev] --
1,514,099 UART: [ldev] ++
1,514,267 UART: [ldev] CDI.KEYID = 6
1,514,630 UART: [ldev] SUBJECT.KEYID = 5
1,515,056 UART: [ldev] AUTHORITY.KEYID = 7
1,515,519 UART: [ldev] FE.KEYID = 1
1,520,495 UART: [ldev] Erasing FE.KEYID = 1
1,545,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,692 UART: [ldev] --
1,585,157 UART: [fwproc] Waiting for Commands...
1,585,946 UART: [fwproc] Received command 0x46574c44
1,586,737 UART: [fwproc] Received Image of size 114448 bytes
2,885,602 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,308 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,660 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,821 >>> mbox cmd response: success
3,078,933 UART: [afmc] ++
3,079,101 UART: [afmc] CDI.KEYID = 6
3,079,463 UART: [afmc] SUBJECT.KEYID = 7
3,079,888 UART: [afmc] AUTHORITY.KEYID = 5
3,115,229 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,197 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,925 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,810 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,500 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,221 UART: [afmc] --
3,158,119 UART: [cold-reset] --
3,158,845 UART: [state] Locking Datavault
3,160,042 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,646 UART: [state] Locking ICCM
3,161,270 UART: [exit] Launching FMC @ 0x40000130
3,166,599 UART:
3,166,615 UART: Running Caliptra FMC ...
3,167,023 UART:
3,167,077 UART: [state] CFI Enabled
3,177,514 UART: [fht] FMC Alias Private Key: 7
3,285,299 UART: [art] Extend RT PCRs Done
3,285,727 UART: [art] Lock RT PCRs Done
3,287,265 UART: [art] Populate DV Done
3,295,498 UART: [fht] FMC Alias Private Key: 7
3,296,594 UART: [art] Derive CDI
3,296,874 UART: [art] Store in in slot 0x4
3,382,417 UART: [art] Derive Key Pair
3,382,777 UART: [art] Store priv key in slot 0x5
3,395,623 UART: [art] Derive Key Pair - Done
3,410,468 UART: [art] Signing Cert with AUTHO
3,410,948 UART: RITY.KEYID = 7
3,426,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,921 UART: [art] PUB.X = 944DF6697061083AA914CC196787DAE9680A714B666589CE0C4965BEF55EFB775B075F0C2E9ABCA398577D907A6943C8
3,433,676 UART: [art] PUB.Y = 8B0007E38DD1C5C5FB8E02E1EEEF2424FC30DE23DAAFE5D6DD69B5059EE356F21CDC0DEA2CBCC018D54B88846C86BD12
3,440,620 UART: [art] SIG.R = CB276E66E56D7DD617DD232232354F3BB81D1E74A68A85F29C01DC48A629165540F5BF01A91D33E8BE9612F6787919D6
3,447,384 UART: [art] SIG.S = C14113731588BFE76BD2B53990537C53B650C01589633A03AA9C27A80114512B4BAB27A242CF150450A1ADBD3204BAEE
3,471,203 UART: Caliptra RT
3,471,456 UART: [state] CFI Enabled
3,580,104 UART: [rt] RT listening for mailbox commands...
3,580,774 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,460 UART: [rt]cmd =0x4d454153, len=108
3,631,398 >>> mbox cmd response data (12 bytes)
3,631,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,200 UART: [rt]cmd =0x4d454153, len=108
3,682,088 >>> mbox cmd response data (12 bytes)
3,682,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,098 UART: [rt]cmd =0x4d454153, len=108
3,731,880 >>> mbox cmd response data (12 bytes)
3,731,881 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,748 UART: [rt]cmd =0x4d454153, len=108
3,782,474 >>> mbox cmd response data (12 bytes)
3,782,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,524 UART: [rt]cmd =0x4d454153, len=108
3,833,196 >>> mbox cmd response data (12 bytes)
3,833,197 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,894 UART: [rt]cmd =0x4d454153, len=108
3,884,386 >>> mbox cmd response data (12 bytes)
3,884,387 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,446 UART: [rt]cmd =0x4d454153, len=108
3,934,286 >>> mbox cmd response data (12 bytes)
3,934,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,316 UART: [rt]cmd =0x4d454153, len=108
3,985,286 >>> mbox cmd response data (12 bytes)
3,985,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,044 UART: [rt]cmd =0x4d454153, len=108
4,036,164 >>> mbox cmd response data (12 bytes)
4,036,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,382 UART: [rt]cmd =0x4d454153, len=108
4,087,628 >>> mbox cmd response data (12 bytes)
4,087,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,117,578 UART: [rt]cmd =0x4d454153, len=108
4,137,750 >>> mbox cmd response data (12 bytes)
4,137,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,782 UART: [rt]cmd =0x4d454153, len=108
4,188,854 >>> mbox cmd response data (12 bytes)
4,188,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,218,984 UART: [rt]cmd =0x4d454153, len=108
4,239,484 >>> mbox cmd response data (12 bytes)
4,239,485 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,588 UART: [rt]cmd =0x4d454153, len=108
4,290,412 >>> mbox cmd response data (12 bytes)
4,290,413 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,320,420 UART: [rt]cmd =0x4d454153, len=108
4,342,234 >>> mbox cmd response data (12 bytes)
4,342,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,286 UART: [rt]cmd =0x4d454153, len=108
4,374,193 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,569 ready_for_fw is high
1,362,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,165 >>> mbox cmd response: success
2,990,463 UART:
2,990,479 UART: Running Caliptra FMC ...
2,990,887 UART:
2,990,941 UART: [state] CFI Enabled
3,001,338 UART: [fht] FMC Alias Private Key: 7
3,108,707 UART: [art] Extend RT PCRs Done
3,109,135 UART: [art] Lock RT PCRs Done
3,110,713 UART: [art] Populate DV Done
3,118,956 UART: [fht] FMC Alias Private Key: 7
3,120,088 UART: [art] Derive CDI
3,120,368 UART: [art] Store in in slot 0x4
3,205,741 UART: [art] Derive Key Pair
3,206,101 UART: [art] Store priv key in slot 0x5
3,219,461 UART: [art] Derive Key Pair - Done
3,234,366 UART: [art] Signing Cert with AUTHO
3,234,846 UART: RITY.KEYID = 7
3,250,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,805 UART: [art] PUB.X = 5571C929DA9607880196DC23D6E07B04B1E9CF73C6EFF2DAD59416619411AF55568B11733AF96BB22490E25E284EE0F3
3,257,566 UART: [art] PUB.Y = 5D01390DC5F6CE016A969F8F9735A93C2C550B04E776782A59A6EB65645C589F0715162B4A356D5D18BA3A6CA7531F69
3,264,496 UART: [art] SIG.R = D7ABFEEE418185ED431EDECA6CD3D7CEF374BEAEBABEFC6D204F8663113D5F638783992E50CF556AE3677D58392F18BF
3,271,290 UART: [art] SIG.S = F10AF7E2D005AE8C21435EA843D53E15DCA08D978D0DADB7F2FC4BFB04360BB70096E8B72A5D70A2E43D9EF3D8AB99F6
3,294,644 UART: Caliptra RT
3,294,897 UART: [state] CFI Enabled
3,403,065 UART: [rt] RT listening for mailbox commands...
3,403,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,247 UART: [rt]cmd =0x4d454153, len=108
3,455,281 >>> mbox cmd response data (12 bytes)
3,455,282 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,279 UART: [rt]cmd =0x4d454153, len=108
3,506,403 >>> mbox cmd response data (12 bytes)
3,506,404 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,449 UART: [rt]cmd =0x4d454153, len=108
3,557,829 >>> mbox cmd response data (12 bytes)
3,557,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,993 UART: [rt]cmd =0x4d454153, len=108
3,608,669 >>> mbox cmd response data (12 bytes)
3,608,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,793 UART: [rt]cmd =0x4d454153, len=108
3,659,217 >>> mbox cmd response data (12 bytes)
3,659,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,415 UART: [rt]cmd =0x4d454153, len=108
3,710,373 >>> mbox cmd response data (12 bytes)
3,710,374 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,239 UART: [rt]cmd =0x4d454153, len=108
3,760,877 >>> mbox cmd response data (12 bytes)
3,760,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,027 UART: [rt]cmd =0x4d454153, len=108
3,812,369 >>> mbox cmd response data (12 bytes)
3,812,370 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,505 UART: [rt]cmd =0x4d454153, len=108
3,863,145 >>> mbox cmd response data (12 bytes)
3,863,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,975 UART: [rt]cmd =0x4d454153, len=108
3,912,899 >>> mbox cmd response data (12 bytes)
3,912,900 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,809 UART: [rt]cmd =0x4d454153, len=108
3,963,823 >>> mbox cmd response data (12 bytes)
3,963,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,993,575 UART: [rt]cmd =0x4d454153, len=108
4,014,039 >>> mbox cmd response data (12 bytes)
4,014,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,209 UART: [rt]cmd =0x4d454153, len=108
4,065,533 >>> mbox cmd response data (12 bytes)
4,065,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,095,463 UART: [rt]cmd =0x4d454153, len=108
4,116,285 >>> mbox cmd response data (12 bytes)
4,116,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,581 UART: [rt]cmd =0x4d454153, len=108
4,167,619 >>> mbox cmd response data (12 bytes)
4,167,620 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,619 UART: [rt]cmd =0x4d454153, len=108
4,199,606 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,619 UART: [kat] SHA2-512-ACC
897,520 UART: [kat] ECC-384
903,257 UART: [kat] HMAC-384Kdf
907,909 UART: [kat] LMS
1,476,105 UART: [kat] --
1,477,254 UART: [cold-reset] ++
1,477,628 UART: [fht] Storing FHT @ 0x50003400
1,480,463 UART: [idev] ++
1,480,631 UART: [idev] CDI.KEYID = 6
1,480,991 UART: [idev] SUBJECT.KEYID = 7
1,481,415 UART: [idev] UDS.KEYID = 0
1,481,760 ready_for_fw is high
1,481,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,319 UART: [idev] Erasing UDS.KEYID = 0
1,506,183 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,679 UART: [idev] --
1,515,582 UART: [ldev] ++
1,515,750 UART: [ldev] CDI.KEYID = 6
1,516,113 UART: [ldev] SUBJECT.KEYID = 5
1,516,539 UART: [ldev] AUTHORITY.KEYID = 7
1,517,002 UART: [ldev] FE.KEYID = 1
1,522,394 UART: [ldev] Erasing FE.KEYID = 1
1,547,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,197 UART: [ldev] --
1,586,562 UART: [fwproc] Waiting for Commands...
1,587,305 UART: [fwproc] Received command 0x46574c44
1,588,096 UART: [fwproc] Received Image of size 114448 bytes
2,886,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,061 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,540 >>> mbox cmd response: success
3,080,662 UART: [afmc] ++
3,080,830 UART: [afmc] CDI.KEYID = 6
3,081,192 UART: [afmc] SUBJECT.KEYID = 7
3,081,617 UART: [afmc] AUTHORITY.KEYID = 5
3,116,686 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,734 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,347 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,037 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,904 UART: [afmc] --
3,159,968 UART: [cold-reset] --
3,160,918 UART: [state] Locking Datavault
3,161,949 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,553 UART: [state] Locking ICCM
3,163,053 UART: [exit] Launching FMC @ 0x40000130
3,168,382 UART:
3,168,398 UART: Running Caliptra FMC ...
3,168,806 UART:
3,168,949 UART: [state] CFI Enabled
3,179,558 UART: [fht] FMC Alias Private Key: 7
3,288,079 UART: [art] Extend RT PCRs Done
3,288,507 UART: [art] Lock RT PCRs Done
3,290,095 UART: [art] Populate DV Done
3,298,386 UART: [fht] FMC Alias Private Key: 7
3,299,486 UART: [art] Derive CDI
3,299,766 UART: [art] Store in in slot 0x4
3,385,529 UART: [art] Derive Key Pair
3,385,889 UART: [art] Store priv key in slot 0x5
3,399,635 UART: [art] Derive Key Pair - Done
3,414,383 UART: [art] Signing Cert with AUTHO
3,414,863 UART: RITY.KEYID = 7
3,429,851 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,616 UART: [art] PUB.X = A28E7EE2D51D87C6FD69D5F4DCEB892E4376B904A4B1ADA8AB1644F08B76CE65E5FC7065D74A5F7573348560109C6D4E
3,437,395 UART: [art] PUB.Y = ACEDFB565BDBA1046379B71943A656832254D3465953691146C88803BF15BEAB4B5FD97163987D859CD03E20B9ABE6F3
3,444,341 UART: [art] SIG.R = 8495268B365EEC39DF72229D634147E0957D525D884F7ABD4047BBFF5C4C6B0A406FB1BFAE079FB04C169C940B70B1CE
3,451,112 UART: [art] SIG.S = 5C32FA2280C89E94A5D098E06354ED6AF85BDBF79BE88105F0D08E1969D59369CE99BFF293877A02821E991E3BABA66C
3,474,899 UART: Caliptra RT
3,475,244 UART: [state] CFI Enabled
3,582,883 UART: [rt] RT listening for mailbox commands...
3,583,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,977 UART: [rt]cmd =0x4d454153, len=108
3,634,681 >>> mbox cmd response data (12 bytes)
3,634,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,735 UART: [rt]cmd =0x4d454153, len=108
3,684,921 >>> mbox cmd response data (12 bytes)
3,684,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,041 UART: [rt]cmd =0x4d454153, len=108
3,736,273 >>> mbox cmd response data (12 bytes)
3,736,274 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,303 UART: [rt]cmd =0x4d454153, len=108
3,786,305 >>> mbox cmd response data (12 bytes)
3,786,306 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,311 UART: [rt]cmd =0x4d454153, len=108
3,837,095 >>> mbox cmd response data (12 bytes)
3,837,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,329 UART: [rt]cmd =0x4d454153, len=108
3,888,279 >>> mbox cmd response data (12 bytes)
3,888,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,449 UART: [rt]cmd =0x4d454153, len=108
3,939,119 >>> mbox cmd response data (12 bytes)
3,939,120 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,983 UART: [rt]cmd =0x4d454153, len=108
3,989,439 >>> mbox cmd response data (12 bytes)
3,989,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,261 UART: [rt]cmd =0x4d454153, len=108
4,040,265 >>> mbox cmd response data (12 bytes)
4,040,266 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,225 UART: [rt]cmd =0x4d454153, len=108
4,091,483 >>> mbox cmd response data (12 bytes)
4,091,484 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,121,711 UART: [rt]cmd =0x4d454153, len=108
4,142,411 >>> mbox cmd response data (12 bytes)
4,142,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,172,349 UART: [rt]cmd =0x4d454153, len=108
4,192,405 >>> mbox cmd response data (12 bytes)
4,192,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,222,297 UART: [rt]cmd =0x4d454153, len=108
4,243,405 >>> mbox cmd response data (12 bytes)
4,243,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,273,497 UART: [rt]cmd =0x4d454153, len=108
4,294,163 >>> mbox cmd response data (12 bytes)
4,294,164 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,324,221 UART: [rt]cmd =0x4d454153, len=108
4,344,513 >>> mbox cmd response data (12 bytes)
4,344,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,467 UART: [rt]cmd =0x4d454153, len=108
4,376,462 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,036 ready_for_fw is high
1,363,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,096 >>> mbox cmd response: success
2,993,398 UART:
2,993,414 UART: Running Caliptra FMC ...
2,993,822 UART:
2,993,965 UART: [state] CFI Enabled
3,004,544 UART: [fht] FMC Alias Private Key: 7
3,112,719 UART: [art] Extend RT PCRs Done
3,113,147 UART: [art] Lock RT PCRs Done
3,114,527 UART: [art] Populate DV Done
3,122,938 UART: [fht] FMC Alias Private Key: 7
3,123,924 UART: [art] Derive CDI
3,124,204 UART: [art] Store in in slot 0x4
3,210,095 UART: [art] Derive Key Pair
3,210,455 UART: [art] Store priv key in slot 0x5
3,223,443 UART: [art] Derive Key Pair - Done
3,238,058 UART: [art] Signing Cert with AUTHO
3,238,538 UART: RITY.KEYID = 7
3,253,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,533 UART: [art] PUB.X = EC8898AD43F0B9B762C346EF08939B4B8AA64A720D895AF4C2874EB12E14FAC05E880176A073B8159A9F6EC17CB0A5D3
3,261,304 UART: [art] PUB.Y = F434669812CB69C2017908F4D8DD478A016E6724593F2728E7405BEC7D4AE98381D7FABE88F31BB50CFC6A06033A5F2E
3,268,240 UART: [art] SIG.R = 9B2D639A9CAD3CA09EE6CECF9240BBD255F3E75A9CCB3EB5756B7D0B102F2F4D99937D91D1BBBD3B10F79BF286AFA858
3,275,033 UART: [art] SIG.S = 4ADA0242661D23DE4169BE223C2FE19F34CA8795B0E36ECE0F4104014C8DF94CA7C539D1D5AF4E5F8A9679FC11CB351A
3,298,768 UART: Caliptra RT
3,299,113 UART: [state] CFI Enabled
3,407,270 UART: [rt] RT listening for mailbox commands...
3,407,940 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,680 UART: [rt]cmd =0x4d454153, len=108
3,459,270 >>> mbox cmd response data (12 bytes)
3,459,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,182 UART: [rt]cmd =0x4d454153, len=108
3,509,192 >>> mbox cmd response data (12 bytes)
3,509,193 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,196 UART: [rt]cmd =0x4d454153, len=108
3,559,754 >>> mbox cmd response data (12 bytes)
3,559,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,698 UART: [rt]cmd =0x4d454153, len=108
3,610,374 >>> mbox cmd response data (12 bytes)
3,610,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,194 UART: [rt]cmd =0x4d454153, len=108
3,660,614 >>> mbox cmd response data (12 bytes)
3,660,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,940 UART: [rt]cmd =0x4d454153, len=108
3,711,658 >>> mbox cmd response data (12 bytes)
3,711,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,854 UART: [rt]cmd =0x4d454153, len=108
3,762,132 >>> mbox cmd response data (12 bytes)
3,762,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,182 UART: [rt]cmd =0x4d454153, len=108
3,812,430 >>> mbox cmd response data (12 bytes)
3,812,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,514 UART: [rt]cmd =0x4d454153, len=108
3,863,378 >>> mbox cmd response data (12 bytes)
3,863,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,318 UART: [rt]cmd =0x4d454153, len=108
3,914,202 >>> mbox cmd response data (12 bytes)
3,914,203 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,256 UART: [rt]cmd =0x4d454153, len=108
3,965,416 >>> mbox cmd response data (12 bytes)
3,965,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,466 UART: [rt]cmd =0x4d454153, len=108
4,016,266 >>> mbox cmd response data (12 bytes)
4,016,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,370 UART: [rt]cmd =0x4d454153, len=108
4,067,304 >>> mbox cmd response data (12 bytes)
4,067,305 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,097,438 UART: [rt]cmd =0x4d454153, len=108
4,118,240 >>> mbox cmd response data (12 bytes)
4,118,241 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,296 UART: [rt]cmd =0x4d454153, len=108
4,168,822 >>> mbox cmd response data (12 bytes)
4,168,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,888 UART: [rt]cmd =0x4d454153, len=108
4,200,657 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,306 UART: [kat] SHA2-256
892,956 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,081 UART: [kat] ++
897,233 UART: [kat] sha1
901,501 UART: [kat] SHA2-256
903,441 UART: [kat] SHA2-384
906,180 UART: [kat] SHA2-512-ACC
908,081 UART: [kat] ECC-384
917,506 UART: [kat] HMAC-384Kdf
922,284 UART: [kat] LMS
1,170,612 UART: [kat] --
1,171,563 UART: [cold-reset] ++
1,172,119 UART: [fht] FHT @ 0x50003400
1,174,952 UART: [idev] ++
1,175,120 UART: [idev] CDI.KEYID = 6
1,175,480 UART: [idev] SUBJECT.KEYID = 7
1,175,904 UART: [idev] UDS.KEYID = 0
1,176,249 ready_for_fw is high
1,176,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,718 UART: [idev] Erasing UDS.KEYID = 0
1,201,055 UART: [idev] Sha1 KeyId Algorithm
1,209,567 UART: [idev] --
1,210,671 UART: [ldev] ++
1,210,839 UART: [ldev] CDI.KEYID = 6
1,211,202 UART: [ldev] SUBJECT.KEYID = 5
1,211,628 UART: [ldev] AUTHORITY.KEYID = 7
1,212,091 UART: [ldev] FE.KEYID = 1
1,216,949 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,949 UART: [ldev] --
1,282,256 UART: [fwproc] Wait for Commands...
1,282,954 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,810 >>> mbox cmd response: success
2,778,008 UART: [afmc] ++
2,778,176 UART: [afmc] CDI.KEYID = 6
2,778,538 UART: [afmc] SUBJECT.KEYID = 7
2,778,963 UART: [afmc] AUTHORITY.KEYID = 5
2,814,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,187 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,800 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,519 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,231 UART: [afmc] --
2,857,175 UART: [cold-reset] --
2,857,989 UART: [state] Locking Datavault
2,859,214 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,818 UART: [state] Locking ICCM
2,860,330 UART: [exit] Launching FMC @ 0x40000130
2,865,659 UART:
2,865,675 UART: Running Caliptra FMC ...
2,866,083 UART:
2,866,137 UART: [state] CFI Enabled
2,876,394 UART: [fht] FMC Alias Private Key: 7
2,984,305 UART: [art] Extend RT PCRs Done
2,984,733 UART: [art] Lock RT PCRs Done
2,986,237 UART: [art] Populate DV Done
2,994,772 UART: [fht] FMC Alias Private Key: 7
2,995,844 UART: [art] Derive CDI
2,996,124 UART: [art] Store in in slot 0x4
3,081,877 UART: [art] Derive Key Pair
3,082,237 UART: [art] Store priv key in slot 0x5
3,094,945 UART: [art] Derive Key Pair - Done
3,109,743 UART: [art] Signing Cert with AUTHO
3,110,223 UART: RITY.KEYID = 7
3,125,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,068 UART: [art] PUB.X = E2E54E8EF1FCE861A21F2F3EE244EBF5331A0CC769119275819B526B63D45A3DD6C7D76A8400F0AE87E2F118CD6D5AEB
3,132,829 UART: [art] PUB.Y = 51F43CF40AD9DB5A170C866F169ABB7F54DD48F0C28B67C0723778F8170E588EC3B218551344122FAA5CB0DB7560AC10
3,139,776 UART: [art] SIG.R = 40B1EAE933B9AFE761C45F23D55EAAFAC40F3DE78C596BFE7EC265EC1C2B258DE24745E895ACAC2F8C25FE523DD77B86
3,146,569 UART: [art] SIG.S = 45AA108A0FCFFC547939D112B1BBF0B32232F2D19528CEFDD0D8DB08D454391CAADCEB3BC2B637908784C333EF052E02
3,170,382 UART: Caliptra RT
3,170,635 UART: [state] CFI Enabled
3,276,964 UART: [rt] RT listening for mailbox commands...
3,277,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,938 UART: [rt]cmd =0x4d454153, len=108
3,328,106 >>> mbox cmd response data (12 bytes)
3,328,107 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,206 UART: [rt]cmd =0x4d454153, len=108
3,377,876 >>> mbox cmd response data (12 bytes)
3,377,877 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,012 UART: [rt]cmd =0x4d454153, len=108
3,428,588 >>> mbox cmd response data (12 bytes)
3,428,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,756 UART: [rt]cmd =0x4d454153, len=108
3,479,456 >>> mbox cmd response data (12 bytes)
3,479,457 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,172 UART: [rt]cmd =0x4d454153, len=108
3,529,346 >>> mbox cmd response data (12 bytes)
3,529,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,438 UART: [rt]cmd =0x4d454153, len=108
3,580,048 >>> mbox cmd response data (12 bytes)
3,580,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,090 UART: [rt]cmd =0x4d454153, len=108
3,630,936 >>> mbox cmd response data (12 bytes)
3,630,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,126 UART: [rt]cmd =0x4d454153, len=108
3,682,154 >>> mbox cmd response data (12 bytes)
3,682,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,258 UART: [rt]cmd =0x4d454153, len=108
3,732,822 >>> mbox cmd response data (12 bytes)
3,732,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,020 UART: [rt]cmd =0x4d454153, len=108
3,783,994 >>> mbox cmd response data (12 bytes)
3,783,995 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,854 UART: [rt]cmd =0x4d454153, len=108
3,835,096 >>> mbox cmd response data (12 bytes)
3,835,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,012 UART: [rt]cmd =0x4d454153, len=108
3,885,798 >>> mbox cmd response data (12 bytes)
3,885,799 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,946 UART: [rt]cmd =0x4d454153, len=108
3,936,134 >>> mbox cmd response data (12 bytes)
3,936,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,118 UART: [rt]cmd =0x4d454153, len=108
3,986,388 >>> mbox cmd response data (12 bytes)
3,986,389 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,504 UART: [rt]cmd =0x4d454153, len=108
4,038,264 >>> mbox cmd response data (12 bytes)
4,038,265 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,050 UART: [rt]cmd =0x4d454153, len=108
4,069,935 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,303 ready_for_fw is high
1,060,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,371 >>> mbox cmd response: success
2,691,763 UART:
2,691,779 UART: Running Caliptra FMC ...
2,692,187 UART:
2,692,241 UART: [state] CFI Enabled
2,703,236 UART: [fht] FMC Alias Private Key: 7
2,812,059 UART: [art] Extend RT PCRs Done
2,812,487 UART: [art] Lock RT PCRs Done
2,814,057 UART: [art] Populate DV Done
2,822,518 UART: [fht] FMC Alias Private Key: 7
2,823,614 UART: [art] Derive CDI
2,823,894 UART: [art] Store in in slot 0x4
2,909,355 UART: [art] Derive Key Pair
2,909,715 UART: [art] Store priv key in slot 0x5
2,923,075 UART: [art] Derive Key Pair - Done
2,937,976 UART: [art] Signing Cert with AUTHO
2,938,456 UART: RITY.KEYID = 7
2,953,724 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,489 UART: [art] PUB.X = 9F2EF759294691A17E6C27498534D113AB4A7E3CAFDD5693B8EFB159D0A183BAD1C8DF9BF24A384F79CC01EBBF7D2EB8
2,961,276 UART: [art] PUB.Y = 2221B0F557FC79156E8627B90B3CCFF574F163060D5FEACF879A7B7184B866859BCB72D8B8EDBCB7A7CA07C78685B6B9
2,968,226 UART: [art] SIG.R = 55D14F8834AC61E64754C6930638E63CCAD5E23166EDA60DBF9F2E8755C8A06B75A977A059BF59A9FBB6178EE4220F24
2,974,993 UART: [art] SIG.S = E1B2733A39C2C2CF0CCD0C8F8B88E6278543F95210A3F0F519BDB36E76ACF2F26104F5FFAE44011B8F1DB3529B087567
2,998,729 UART: Caliptra RT
2,998,982 UART: [state] CFI Enabled
3,106,819 UART: [rt] RT listening for mailbox commands...
3,107,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,021 UART: [rt]cmd =0x4d454153, len=108
3,158,239 >>> mbox cmd response data (12 bytes)
3,158,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,227 UART: [rt]cmd =0x4d454153, len=108
3,208,215 >>> mbox cmd response data (12 bytes)
3,208,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,238,243 UART: [rt]cmd =0x4d454153, len=108
3,258,775 >>> mbox cmd response data (12 bytes)
3,258,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,288,923 UART: [rt]cmd =0x4d454153, len=108
3,309,169 >>> mbox cmd response data (12 bytes)
3,309,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,251 UART: [rt]cmd =0x4d454153, len=108
3,359,969 >>> mbox cmd response data (12 bytes)
3,359,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,390,293 UART: [rt]cmd =0x4d454153, len=108
3,411,219 >>> mbox cmd response data (12 bytes)
3,411,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,195 UART: [rt]cmd =0x4d454153, len=108
3,462,123 >>> mbox cmd response data (12 bytes)
3,462,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,239 UART: [rt]cmd =0x4d454153, len=108
3,513,061 >>> mbox cmd response data (12 bytes)
3,513,062 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,127 UART: [rt]cmd =0x4d454153, len=108
3,563,357 >>> mbox cmd response data (12 bytes)
3,563,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,593,471 UART: [rt]cmd =0x4d454153, len=108
3,614,513 >>> mbox cmd response data (12 bytes)
3,614,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,593 UART: [rt]cmd =0x4d454153, len=108
3,665,983 >>> mbox cmd response data (12 bytes)
3,665,984 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,007 UART: [rt]cmd =0x4d454153, len=108
3,716,655 >>> mbox cmd response data (12 bytes)
3,716,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,746,699 UART: [rt]cmd =0x4d454153, len=108
3,766,673 >>> mbox cmd response data (12 bytes)
3,766,674 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,796,823 UART: [rt]cmd =0x4d454153, len=108
3,817,647 >>> mbox cmd response data (12 bytes)
3,817,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,847,769 UART: [rt]cmd =0x4d454153, len=108
3,868,745 >>> mbox cmd response data (12 bytes)
3,868,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,898,639 UART: [rt]cmd =0x4d454153, len=108
3,900,454 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
893,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,642 UART: [kat] ++
897,794 UART: [kat] sha1
901,908 UART: [kat] SHA2-256
903,848 UART: [kat] SHA2-384
906,581 UART: [kat] SHA2-512-ACC
908,482 UART: [kat] ECC-384
918,699 UART: [kat] HMAC-384Kdf
923,449 UART: [kat] LMS
1,171,777 UART: [kat] --
1,172,738 UART: [cold-reset] ++
1,173,102 UART: [fht] FHT @ 0x50003400
1,175,791 UART: [idev] ++
1,175,959 UART: [idev] CDI.KEYID = 6
1,176,319 UART: [idev] SUBJECT.KEYID = 7
1,176,743 UART: [idev] UDS.KEYID = 0
1,177,088 ready_for_fw is high
1,177,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,975 UART: [idev] Erasing UDS.KEYID = 0
1,201,890 UART: [idev] Sha1 KeyId Algorithm
1,210,312 UART: [idev] --
1,211,380 UART: [ldev] ++
1,211,548 UART: [ldev] CDI.KEYID = 6
1,211,911 UART: [ldev] SUBJECT.KEYID = 5
1,212,337 UART: [ldev] AUTHORITY.KEYID = 7
1,212,800 UART: [ldev] FE.KEYID = 1
1,218,122 UART: [ldev] Erasing FE.KEYID = 1
1,244,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,822 UART: [ldev] --
1,283,221 UART: [fwproc] Wait for Commands...
1,283,823 UART: [fwproc] Recv command 0x46574c44
1,284,551 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,955 >>> mbox cmd response: success
2,777,175 UART: [afmc] ++
2,777,343 UART: [afmc] CDI.KEYID = 6
2,777,705 UART: [afmc] SUBJECT.KEYID = 7
2,778,130 UART: [afmc] AUTHORITY.KEYID = 5
2,813,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,836 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,564 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,449 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,168 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,984 UART: [afmc] --
2,857,066 UART: [cold-reset] --
2,857,680 UART: [state] Locking Datavault
2,858,817 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,421 UART: [state] Locking ICCM
2,859,917 UART: [exit] Launching FMC @ 0x40000130
2,865,246 UART:
2,865,262 UART: Running Caliptra FMC ...
2,865,670 UART:
2,865,813 UART: [state] CFI Enabled
2,876,088 UART: [fht] FMC Alias Private Key: 7
2,983,753 UART: [art] Extend RT PCRs Done
2,984,181 UART: [art] Lock RT PCRs Done
2,985,807 UART: [art] Populate DV Done
2,994,128 UART: [fht] FMC Alias Private Key: 7
2,995,152 UART: [art] Derive CDI
2,995,432 UART: [art] Store in in slot 0x4
3,081,111 UART: [art] Derive Key Pair
3,081,471 UART: [art] Store priv key in slot 0x5
3,094,265 UART: [art] Derive Key Pair - Done
3,108,976 UART: [art] Signing Cert with AUTHO
3,109,456 UART: RITY.KEYID = 7
3,124,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,695 UART: [art] PUB.X = FC46A03EB1FD7B116FA6177CBC360CD34EB93A17B4D3486A6EABA466AF32A1115935C2D3BCCDE2EE82E00267A9659F1E
3,132,479 UART: [art] PUB.Y = 7A39FB7EF543A63BE7D8A0D5F0206C5B3A5F8533F5341BFBF4A6023F41574A3C3E736B5BEBBCC6F0F2C94B0EBB81A9BB
3,139,447 UART: [art] SIG.R = 2DE196AB7F6794AB753BF8EF749361BFFFF14FFE052DBA288D388534F4A3C4FF82FD4C753FC1E5D7A46FF376B03FB2FE
3,146,238 UART: [art] SIG.S = D6BED2CB3FBFB28D281790AE68622CD6A25BA4A7ADD550486D9C14F40F916B425F329C6BDB7C45D4E36AB21590F17126
3,170,254 UART: Caliptra RT
3,170,599 UART: [state] CFI Enabled
3,277,972 UART: [rt] RT listening for mailbox commands...
3,278,642 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,156 UART: [rt]cmd =0x4d454153, len=108
3,330,216 >>> mbox cmd response data (12 bytes)
3,330,217 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,236 UART: [rt]cmd =0x4d454153, len=108
3,381,306 >>> mbox cmd response data (12 bytes)
3,381,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,600 UART: [rt]cmd =0x4d454153, len=108
3,432,340 >>> mbox cmd response data (12 bytes)
3,432,341 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,326 UART: [rt]cmd =0x4d454153, len=108
3,482,790 >>> mbox cmd response data (12 bytes)
3,482,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,646 UART: [rt]cmd =0x4d454153, len=108
3,533,100 >>> mbox cmd response data (12 bytes)
3,533,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,146 UART: [rt]cmd =0x4d454153, len=108
3,583,552 >>> mbox cmd response data (12 bytes)
3,583,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,770 UART: [rt]cmd =0x4d454153, len=108
3,634,614 >>> mbox cmd response data (12 bytes)
3,634,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,626 UART: [rt]cmd =0x4d454153, len=108
3,685,526 >>> mbox cmd response data (12 bytes)
3,685,527 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,548 UART: [rt]cmd =0x4d454153, len=108
3,736,296 >>> mbox cmd response data (12 bytes)
3,736,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,182 UART: [rt]cmd =0x4d454153, len=108
3,787,188 >>> mbox cmd response data (12 bytes)
3,787,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,398 UART: [rt]cmd =0x4d454153, len=108
3,838,586 >>> mbox cmd response data (12 bytes)
3,838,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,722 UART: [rt]cmd =0x4d454153, len=108
3,888,856 >>> mbox cmd response data (12 bytes)
3,888,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,874 UART: [rt]cmd =0x4d454153, len=108
3,939,702 >>> mbox cmd response data (12 bytes)
3,939,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,752 UART: [rt]cmd =0x4d454153, len=108
3,990,720 >>> mbox cmd response data (12 bytes)
3,990,721 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,664 UART: [rt]cmd =0x4d454153, len=108
4,041,528 >>> mbox cmd response data (12 bytes)
4,041,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,504 UART: [rt]cmd =0x4d454153, len=108
4,073,305 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,118 ready_for_fw is high
1,060,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,534 >>> mbox cmd response: success
2,687,260 UART:
2,687,276 UART: Running Caliptra FMC ...
2,687,684 UART:
2,687,827 UART: [state] CFI Enabled
2,698,688 UART: [fht] FMC Alias Private Key: 7
2,806,813 UART: [art] Extend RT PCRs Done
2,807,241 UART: [art] Lock RT PCRs Done
2,808,825 UART: [art] Populate DV Done
2,816,916 UART: [fht] FMC Alias Private Key: 7
2,818,064 UART: [art] Derive CDI
2,818,344 UART: [art] Store in in slot 0x4
2,903,851 UART: [art] Derive Key Pair
2,904,211 UART: [art] Store priv key in slot 0x5
2,917,855 UART: [art] Derive Key Pair - Done
2,932,812 UART: [art] Signing Cert with AUTHO
2,933,292 UART: RITY.KEYID = 7
2,948,642 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,407 UART: [art] PUB.X = 862293B236429F6CE7E7DFE0FB604F8F97D162A407B380418327E688E66A639C00182E9997AE2BBD63B564665DEC7F45
2,956,150 UART: [art] PUB.Y = 6DA7563CFC9148FD475FC37A471F867A7680DE423E4430ABA667F6C1FBC9F15F4D159FE89B9D806BEBAE7A4AD1E8C475
2,963,118 UART: [art] SIG.R = A3C74A3DDD001533E9092165E563F91C255F03B4AC410AB248830DA13D770521345B8855F98A8C7477B5D3A4859FF816
2,969,845 UART: [art] SIG.S = E40C562737E90BC3638165286043E038D84D86C74BFCEDD7A45EC099D081CEEEAEB3EE90D53CDF651BAD4B3E77C4022D
2,993,771 UART: Caliptra RT
2,994,116 UART: [state] CFI Enabled
3,100,786 UART: [rt] RT listening for mailbox commands...
3,101,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,002 UART: [rt]cmd =0x4d454153, len=108
3,152,700 >>> mbox cmd response data (12 bytes)
3,152,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,772 UART: [rt]cmd =0x4d454153, len=108
3,202,708 >>> mbox cmd response data (12 bytes)
3,202,709 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,906 UART: [rt]cmd =0x4d454153, len=108
3,254,112 >>> mbox cmd response data (12 bytes)
3,254,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,876 UART: [rt]cmd =0x4d454153, len=108
3,304,352 >>> mbox cmd response data (12 bytes)
3,304,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,450 UART: [rt]cmd =0x4d454153, len=108
3,355,394 >>> mbox cmd response data (12 bytes)
3,355,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,512 UART: [rt]cmd =0x4d454153, len=108
3,405,508 >>> mbox cmd response data (12 bytes)
3,405,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,766 UART: [rt]cmd =0x4d454153, len=108
3,456,476 >>> mbox cmd response data (12 bytes)
3,456,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,526 UART: [rt]cmd =0x4d454153, len=108
3,507,598 >>> mbox cmd response data (12 bytes)
3,507,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,606 UART: [rt]cmd =0x4d454153, len=108
3,559,014 >>> mbox cmd response data (12 bytes)
3,559,015 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,072 UART: [rt]cmd =0x4d454153, len=108
3,610,018 >>> mbox cmd response data (12 bytes)
3,610,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,312 UART: [rt]cmd =0x4d454153, len=108
3,660,996 >>> mbox cmd response data (12 bytes)
3,660,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,930 UART: [rt]cmd =0x4d454153, len=108
3,712,318 >>> mbox cmd response data (12 bytes)
3,712,319 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,360 UART: [rt]cmd =0x4d454153, len=108
3,762,448 >>> mbox cmd response data (12 bytes)
3,762,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,480 UART: [rt]cmd =0x4d454153, len=108
3,812,602 >>> mbox cmd response data (12 bytes)
3,812,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,502 UART: [rt]cmd =0x4d454153, len=108
3,864,202 >>> mbox cmd response data (12 bytes)
3,864,203 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,140 UART: [rt]cmd =0x4d454153, len=108
3,896,183 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
891,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,603 UART: [kat] ++
895,755 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
915,650 UART: [kat] HMAC-384Kdf
920,210 UART: [kat] LMS
1,168,522 UART: [kat] --
1,169,537 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,777 UART: [idev] ++
1,172,945 UART: [idev] CDI.KEYID = 6
1,173,306 UART: [idev] SUBJECT.KEYID = 7
1,173,731 UART: [idev] UDS.KEYID = 0
1,174,077 ready_for_fw is high
1,174,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,773 UART: [idev] Sha1 KeyId Algorithm
1,207,743 UART: [idev] --
1,208,840 UART: [ldev] ++
1,209,008 UART: [ldev] CDI.KEYID = 6
1,209,372 UART: [ldev] SUBJECT.KEYID = 5
1,209,799 UART: [ldev] AUTHORITY.KEYID = 7
1,210,262 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,860 UART: [ldev] --
1,281,314 UART: [fwproc] Wait for Commands...
1,282,115 UART: [fwproc] Recv command 0x46574c44
1,282,848 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,651 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,840 >>> mbox cmd response: success
2,775,929 UART: [afmc] ++
2,776,097 UART: [afmc] CDI.KEYID = 6
2,776,460 UART: [afmc] SUBJECT.KEYID = 7
2,776,886 UART: [afmc] AUTHORITY.KEYID = 5
2,812,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,546 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,275 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,158 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,877 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,698 UART: [afmc] --
2,855,634 UART: [cold-reset] --
2,856,538 UART: [state] Locking Datavault
2,857,835 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,439 UART: [state] Locking ICCM
2,859,103 UART: [exit] Launching FMC @ 0x40000130
2,864,432 UART:
2,864,448 UART: Running Caliptra FMC ...
2,864,856 UART:
2,864,910 UART: [state] CFI Enabled
2,875,173 UART: [fht] FMC Alias Private Key: 7
2,983,656 UART: [art] Extend RT PCRs Done
2,984,084 UART: [art] Lock RT PCRs Done
2,985,494 UART: [art] Populate DV Done
2,993,897 UART: [fht] FMC Alias Private Key: 7
2,994,987 UART: [art] Derive CDI
2,995,267 UART: [art] Store in in slot 0x4
3,081,126 UART: [art] Derive Key Pair
3,081,486 UART: [art] Store priv key in slot 0x5
3,094,932 UART: [art] Derive Key Pair - Done
3,109,393 UART: [art] Signing Cert with AUTHO
3,109,873 UART: RITY.KEYID = 7
3,125,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,854 UART: [art] PUB.X = 65515AD07D90D0DD81BA1662AFBE4A87ECA236946A24FD002EC75761D6B5DF93A806BE333FEDFDFAC58B8A166709579A
3,132,612 UART: [art] PUB.Y = 665195077BC9EA3799FCF2240D2CF015DA36FF85740B6F06B48826884D15A235136C39D8ADA94917F00C05AD50DF8CB3
3,139,546 UART: [art] SIG.R = D0601A155E7D6383CE4563DE6839D3D849E9C6D9F7F6F88C361C1A779C93C34660B4317B4B78F2519B7D7BAB6393DCBB
3,146,322 UART: [art] SIG.S = 14676B352D570FA6BFF9200BF724B938BC0B710A340B18F1A43FA70D53C560E6FD8059F115C22FF84FB3B622DC0E38DE
3,169,922 UART: Caliptra RT
3,170,175 UART: [state] CFI Enabled
3,277,168 UART: [rt] RT listening for mailbox commands...
3,277,838 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,328 UART: [rt]cmd =0x4d454153, len=108
3,329,540 >>> mbox cmd response data (12 bytes)
3,329,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,450 UART: [rt]cmd =0x4d454153, len=108
3,380,300 >>> mbox cmd response data (12 bytes)
3,380,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,522 UART: [rt]cmd =0x4d454153, len=108
3,431,218 >>> mbox cmd response data (12 bytes)
3,431,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,232 UART: [rt]cmd =0x4d454153, len=108
3,481,378 >>> mbox cmd response data (12 bytes)
3,481,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,550 UART: [rt]cmd =0x4d454153, len=108
3,532,712 >>> mbox cmd response data (12 bytes)
3,532,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,752 UART: [rt]cmd =0x4d454153, len=108
3,583,536 >>> mbox cmd response data (12 bytes)
3,583,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,692 UART: [rt]cmd =0x4d454153, len=108
3,633,230 >>> mbox cmd response data (12 bytes)
3,633,231 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,202 UART: [rt]cmd =0x4d454153, len=108
3,683,908 >>> mbox cmd response data (12 bytes)
3,683,909 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,038 UART: [rt]cmd =0x4d454153, len=108
3,734,520 >>> mbox cmd response data (12 bytes)
3,734,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,484 UART: [rt]cmd =0x4d454153, len=108
3,784,712 >>> mbox cmd response data (12 bytes)
3,784,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,696 UART: [rt]cmd =0x4d454153, len=108
3,836,046 >>> mbox cmd response data (12 bytes)
3,836,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,332 UART: [rt]cmd =0x4d454153, len=108
3,887,396 >>> mbox cmd response data (12 bytes)
3,887,397 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,500 UART: [rt]cmd =0x4d454153, len=108
3,937,914 >>> mbox cmd response data (12 bytes)
3,937,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,940 UART: [rt]cmd =0x4d454153, len=108
3,988,184 >>> mbox cmd response data (12 bytes)
3,988,185 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,210 UART: [rt]cmd =0x4d454153, len=108
4,039,902 >>> mbox cmd response data (12 bytes)
4,039,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,844 UART: [rt]cmd =0x4d454153, len=108
4,071,881 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,376 ready_for_fw is high
1,055,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,042 >>> mbox cmd response: success
2,685,352 UART:
2,685,368 UART: Running Caliptra FMC ...
2,685,776 UART:
2,685,830 UART: [state] CFI Enabled
2,696,039 UART: [fht] FMC Alias Private Key: 7
2,803,952 UART: [art] Extend RT PCRs Done
2,804,380 UART: [art] Lock RT PCRs Done
2,806,134 UART: [art] Populate DV Done
2,814,501 UART: [fht] FMC Alias Private Key: 7
2,815,589 UART: [art] Derive CDI
2,815,869 UART: [art] Store in in slot 0x4
2,902,002 UART: [art] Derive Key Pair
2,902,362 UART: [art] Store priv key in slot 0x5
2,915,438 UART: [art] Derive Key Pair - Done
2,930,222 UART: [art] Signing Cert with AUTHO
2,930,702 UART: RITY.KEYID = 7
2,946,318 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,083 UART: [art] PUB.X = 8F50F045E144DE1C0FFD76D04B00D9898100ABE46D73A29F2D193D8E20657A3B82EC384377D4CFBDB0DE18589573AE61
2,953,814 UART: [art] PUB.Y = ABA7D185DAE0DE274F0BBBF663057CF519E3DEFF855A59F7BD8F738135E01B96305C7B691CA3AF5F9F6101FAB4B72683
2,960,773 UART: [art] SIG.R = 072B7A2F320C91ADE9B2420AB77412742AF70252211D4D3C755E3895776E9765219EDB3DE60D645A97C4085BFE4AF46D
2,967,525 UART: [art] SIG.S = B94F394951A20C9D601AA4149A1D3986B796335567B059619CAA6FFEC974880E366265027FCFE8478FAD7C682FD2EDBB
2,991,097 UART: Caliptra RT
2,991,350 UART: [state] CFI Enabled
3,098,911 UART: [rt] RT listening for mailbox commands...
3,099,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,105 UART: [rt]cmd =0x4d454153, len=108
3,150,709 >>> mbox cmd response data (12 bytes)
3,150,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,643 UART: [rt]cmd =0x4d454153, len=108
3,200,377 >>> mbox cmd response data (12 bytes)
3,200,378 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,261 UART: [rt]cmd =0x4d454153, len=108
3,251,369 >>> mbox cmd response data (12 bytes)
3,251,370 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,509 UART: [rt]cmd =0x4d454153, len=108
3,301,881 >>> mbox cmd response data (12 bytes)
3,301,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,961 UART: [rt]cmd =0x4d454153, len=108
3,352,551 >>> mbox cmd response data (12 bytes)
3,352,552 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,693 UART: [rt]cmd =0x4d454153, len=108
3,402,435 >>> mbox cmd response data (12 bytes)
3,402,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,591 UART: [rt]cmd =0x4d454153, len=108
3,452,431 >>> mbox cmd response data (12 bytes)
3,452,432 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,401 UART: [rt]cmd =0x4d454153, len=108
3,503,175 >>> mbox cmd response data (12 bytes)
3,503,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,249 UART: [rt]cmd =0x4d454153, len=108
3,553,827 >>> mbox cmd response data (12 bytes)
3,553,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,857 UART: [rt]cmd =0x4d454153, len=108
3,605,219 >>> mbox cmd response data (12 bytes)
3,605,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,247 UART: [rt]cmd =0x4d454153, len=108
3,655,797 >>> mbox cmd response data (12 bytes)
3,655,798 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,879 UART: [rt]cmd =0x4d454153, len=108
3,706,319 >>> mbox cmd response data (12 bytes)
3,706,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,419 UART: [rt]cmd =0x4d454153, len=108
3,757,407 >>> mbox cmd response data (12 bytes)
3,757,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,321 UART: [rt]cmd =0x4d454153, len=108
3,807,577 >>> mbox cmd response data (12 bytes)
3,807,578 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,827 UART: [rt]cmd =0x4d454153, len=108
3,858,903 >>> mbox cmd response data (12 bytes)
3,858,904 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,001 UART: [rt]cmd =0x4d454153, len=108
3,890,932 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,655 UART: [kat] HMAC-384Kdf
921,269 UART: [kat] LMS
1,169,581 UART: [kat] --
1,170,538 UART: [cold-reset] ++
1,171,094 UART: [fht] FHT @ 0x50003400
1,173,778 UART: [idev] ++
1,173,946 UART: [idev] CDI.KEYID = 6
1,174,307 UART: [idev] SUBJECT.KEYID = 7
1,174,732 UART: [idev] UDS.KEYID = 0
1,175,078 ready_for_fw is high
1,175,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,708 UART: [idev] Erasing UDS.KEYID = 0
1,199,854 UART: [idev] Sha1 KeyId Algorithm
1,208,712 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,216,681 UART: [ldev] Erasing FE.KEYID = 1
1,243,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,555 UART: [fwproc] Wait for Commands...
1,283,172 UART: [fwproc] Recv command 0x46574c44
1,283,905 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,739 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,635 >>> mbox cmd response: success
2,775,800 UART: [afmc] ++
2,775,968 UART: [afmc] CDI.KEYID = 6
2,776,331 UART: [afmc] SUBJECT.KEYID = 7
2,776,757 UART: [afmc] AUTHORITY.KEYID = 5
2,812,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,637 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,356 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,085 UART: [afmc] --
2,856,007 UART: [cold-reset] --
2,856,617 UART: [state] Locking Datavault
2,857,596 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,200 UART: [state] Locking ICCM
2,858,764 UART: [exit] Launching FMC @ 0x40000130
2,864,093 UART:
2,864,109 UART: Running Caliptra FMC ...
2,864,517 UART:
2,864,660 UART: [state] CFI Enabled
2,875,337 UART: [fht] FMC Alias Private Key: 7
2,983,640 UART: [art] Extend RT PCRs Done
2,984,068 UART: [art] Lock RT PCRs Done
2,985,454 UART: [art] Populate DV Done
2,993,539 UART: [fht] FMC Alias Private Key: 7
2,994,663 UART: [art] Derive CDI
2,994,943 UART: [art] Store in in slot 0x4
3,080,754 UART: [art] Derive Key Pair
3,081,114 UART: [art] Store priv key in slot 0x5
3,094,182 UART: [art] Derive Key Pair - Done
3,108,852 UART: [art] Signing Cert with AUTHO
3,109,332 UART: RITY.KEYID = 7
3,124,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,251 UART: [art] PUB.X = 8879C48BC17FC5A32D40D2C3985F9D1C5F0F58A76488293D3BF17343E0F59BAE95C0814A6794C0D353B41FC15250A1C8
3,132,020 UART: [art] PUB.Y = DEBFF47DDA689D148BDA2C8AF1D47A75B8255AE47D6C528D9D5FBBC201045184A7B77962FC60E76894C2EB63D123EE99
3,138,980 UART: [art] SIG.R = 78C5FA9C11E290AC68BBBE9F1093BCF959D1F535F8E93BDA80ACD1D63860954A4047DF7C6AAD4AB868C746C90092935C
3,145,742 UART: [art] SIG.S = 5DE8DFA3AB051C11E6B2EB8A50D8677343981F553AA90C59DBA18BBDD700A58765D52E6240008BA20AD91AB2C48893DF
3,169,114 UART: Caliptra RT
3,169,459 UART: [state] CFI Enabled
3,277,056 UART: [rt] RT listening for mailbox commands...
3,277,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,350 UART: [rt]cmd =0x4d454153, len=108
3,329,134 >>> mbox cmd response data (12 bytes)
3,329,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,196 UART: [rt]cmd =0x4d454153, len=108
3,379,548 >>> mbox cmd response data (12 bytes)
3,379,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,782 UART: [rt]cmd =0x4d454153, len=108
3,430,010 >>> mbox cmd response data (12 bytes)
3,430,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,120 UART: [rt]cmd =0x4d454153, len=108
3,481,128 >>> mbox cmd response data (12 bytes)
3,481,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,140 UART: [rt]cmd =0x4d454153, len=108
3,532,040 >>> mbox cmd response data (12 bytes)
3,532,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,152 UART: [rt]cmd =0x4d454153, len=108
3,582,508 >>> mbox cmd response data (12 bytes)
3,582,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,680 UART: [rt]cmd =0x4d454153, len=108
3,633,064 >>> mbox cmd response data (12 bytes)
3,633,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,256 UART: [rt]cmd =0x4d454153, len=108
3,683,656 >>> mbox cmd response data (12 bytes)
3,683,657 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,760 UART: [rt]cmd =0x4d454153, len=108
3,733,882 >>> mbox cmd response data (12 bytes)
3,733,883 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,944 UART: [rt]cmd =0x4d454153, len=108
3,784,758 >>> mbox cmd response data (12 bytes)
3,784,759 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,582 UART: [rt]cmd =0x4d454153, len=108
3,835,268 >>> mbox cmd response data (12 bytes)
3,835,269 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,210 UART: [rt]cmd =0x4d454153, len=108
3,886,498 >>> mbox cmd response data (12 bytes)
3,886,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,618 UART: [rt]cmd =0x4d454153, len=108
3,937,884 >>> mbox cmd response data (12 bytes)
3,937,885 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,848 UART: [rt]cmd =0x4d454153, len=108
3,988,466 >>> mbox cmd response data (12 bytes)
3,988,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,528 UART: [rt]cmd =0x4d454153, len=108
4,040,034 >>> mbox cmd response data (12 bytes)
4,040,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,900 UART: [rt]cmd =0x4d454153, len=108
4,071,889 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,941 ready_for_fw is high
1,055,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,985 >>> mbox cmd response: success
2,687,815 UART:
2,687,831 UART: Running Caliptra FMC ...
2,688,239 UART:
2,688,382 UART: [state] CFI Enabled
2,699,135 UART: [fht] FMC Alias Private Key: 7
2,806,804 UART: [art] Extend RT PCRs Done
2,807,232 UART: [art] Lock RT PCRs Done
2,808,470 UART: [art] Populate DV Done
2,816,775 UART: [fht] FMC Alias Private Key: 7
2,817,753 UART: [art] Derive CDI
2,818,033 UART: [art] Store in in slot 0x4
2,903,458 UART: [art] Derive Key Pair
2,903,818 UART: [art] Store priv key in slot 0x5
2,916,998 UART: [art] Derive Key Pair - Done
2,931,801 UART: [art] Signing Cert with AUTHO
2,932,281 UART: RITY.KEYID = 7
2,947,481 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,246 UART: [art] PUB.X = 63F353C151EAC2C7726AA66FBC76ED5CBF1339FEBAB0F4DC607220CE96436BDF5BB4E3648FC662AC35FADA277E5BBDE4
2,955,044 UART: [art] PUB.Y = 565FE800EFFC04AB58571D2CBAEA071F8D937197E493FFDAFD177D81B1DDAAB18EC731A3E2A995E188B866EAC0896111
2,961,984 UART: [art] SIG.R = BC8EC854E6D73F11456776F3B8F7A52F5E1288F4C45DC2DFD388D005B9BD584BEEFEDFD12E7E2C518734B9A668A6326E
2,968,767 UART: [art] SIG.S = C8E5B95D4E25DD6A0A79B9FEAC61E5BED5D33ED1C00481F89CE0A553D7BBBC4B16F3B7A1D93ECB889CAEDDF9125AE0A7
2,992,706 UART: Caliptra RT
2,993,051 UART: [state] CFI Enabled
3,099,553 UART: [rt] RT listening for mailbox commands...
3,100,223 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,351 UART: [rt]cmd =0x4d454153, len=108
3,150,923 >>> mbox cmd response data (12 bytes)
3,150,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,809 UART: [rt]cmd =0x4d454153, len=108
3,201,495 >>> mbox cmd response data (12 bytes)
3,201,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,423 UART: [rt]cmd =0x4d454153, len=108
3,251,975 >>> mbox cmd response data (12 bytes)
3,251,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,047 UART: [rt]cmd =0x4d454153, len=108
3,302,827 >>> mbox cmd response data (12 bytes)
3,302,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,083 UART: [rt]cmd =0x4d454153, len=108
3,353,595 >>> mbox cmd response data (12 bytes)
3,353,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,343 UART: [rt]cmd =0x4d454153, len=108
3,403,473 >>> mbox cmd response data (12 bytes)
3,403,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,629 UART: [rt]cmd =0x4d454153, len=108
3,454,533 >>> mbox cmd response data (12 bytes)
3,454,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,393 UART: [rt]cmd =0x4d454153, len=108
3,505,513 >>> mbox cmd response data (12 bytes)
3,505,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,347 UART: [rt]cmd =0x4d454153, len=108
3,556,731 >>> mbox cmd response data (12 bytes)
3,556,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,693 UART: [rt]cmd =0x4d454153, len=108
3,607,675 >>> mbox cmd response data (12 bytes)
3,607,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,779 UART: [rt]cmd =0x4d454153, len=108
3,658,577 >>> mbox cmd response data (12 bytes)
3,658,578 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,589 UART: [rt]cmd =0x4d454153, len=108
3,709,989 >>> mbox cmd response data (12 bytes)
3,709,990 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,987 UART: [rt]cmd =0x4d454153, len=108
3,759,897 >>> mbox cmd response data (12 bytes)
3,759,898 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,795 UART: [rt]cmd =0x4d454153, len=108
3,810,991 >>> mbox cmd response data (12 bytes)
3,810,992 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,033 UART: [rt]cmd =0x4d454153, len=108
3,861,745 >>> mbox cmd response data (12 bytes)
3,861,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,051 UART: [rt]cmd =0x4d454153, len=108
3,894,106 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,039 writing to cptra_bootfsm_go
193,259 UART:
193,621 UART: Running Caliptra ROM ...
194,825 UART:
194,986 UART: [state] CFI Enabled
262,189 UART: [state] LifecycleState = Unprovisioned
264,090 UART: [state] DebugLocked = No
266,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,559 UART: [kat] SHA2-256
442,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,774 UART: [kat] ++
453,256 UART: [kat] sha1
464,418 UART: [kat] SHA2-256
467,116 UART: [kat] SHA2-384
473,960 UART: [kat] SHA2-512-ACC
476,325 UART: [kat] ECC-384
2,768,238 UART: [kat] HMAC-384Kdf
2,791,107 UART: [kat] LMS
3,981,441 UART: [kat] --
3,987,419 UART: [cold-reset] ++
3,988,850 UART: [fht] Storing FHT @ 0x50003400
3,999,696 UART: [idev] ++
4,000,259 UART: [idev] CDI.KEYID = 6
4,001,501 UART: [idev] SUBJECT.KEYID = 7
4,002,572 UART: [idev] UDS.KEYID = 0
4,003,560 ready_for_fw is high
4,003,768 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,147,554 UART: [idev] Erasing UDS.KEYID = 0
7,339,200 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,374 UART: [idev] --
7,363,289 UART: [ldev] ++
7,363,895 UART: [ldev] CDI.KEYID = 6
7,364,840 UART: [ldev] SUBJECT.KEYID = 5
7,366,004 UART: [ldev] AUTHORITY.KEYID = 7
7,367,239 UART: [ldev] FE.KEYID = 1
7,416,184 UART: [ldev] Erasing FE.KEYID = 1
10,748,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,126,420 UART: [ldev] --
13,130,482 UART: [fwproc] Waiting for Commands...
13,132,416 UART: [fwproc] Received command 0x46574c44
13,134,601 UART: [fwproc] Received Image of size 114124 bytes
17,191,149 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,771 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,650,686 >>> mbox cmd response: success
17,654,060 UART: [afmc] ++
17,654,659 UART: [afmc] CDI.KEYID = 6
17,655,548 UART: [afmc] SUBJECT.KEYID = 7
17,656,818 UART: [afmc] AUTHORITY.KEYID = 5
21,019,710 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,322,206 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,324,454 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,338,868 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,353,710 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,368,208 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,389,345 UART: [afmc] --
23,393,486 UART: [cold-reset] --
23,396,502 UART: [state] Locking Datavault
23,401,490 UART: [state] Locking PCR0, PCR1 and PCR31
23,403,188 UART: [state] Locking ICCM
23,404,932 UART: [exit] Launching FMC @ 0x40000130
23,413,323 UART:
23,413,553 UART: Running Caliptra FMC ...
23,414,593 UART:
23,414,744 UART: [state] CFI Enabled
23,480,632 UART: [fht] FMC Alias Private Key: 7
25,819,057 UART: [art] Extend RT PCRs Done
25,820,272 UART: [art] Lock RT PCRs Done
25,821,712 UART: [art] Populate DV Done
25,826,851 UART: [fht] FMC Alias Private Key: 7
25,828,546 UART: [art] Derive CDI
25,829,288 UART: [art] Store in in slot 0x4
25,890,764 UART: [art] Derive Key Pair
25,891,822 UART: [art] Store priv key in slot 0x5
29,184,645 UART: [art] Derive Key Pair - Done
29,197,696 UART: [art] Signing Cert with AUTHO
29,199,004 UART: RITY.KEYID = 7
31,485,917 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,420 UART: [art] PUB.X = 691768DE043B1454EF3DF304986B145E044840D45D142F9DD8646696BA206E7D9F1F256A925489EAA85B8A00EF0F025B
31,494,614 UART: [art] PUB.Y = 94AAFBCCA45358D91EFD510920DD4BEE114DE49CC918F484B0DF5DD96FD249E2917A48FCECEE2B4D98C579A0A114F0ED
31,501,951 UART: [art] SIG.R = 078372413F000F301B376BC284AB625B27454E84015693FCF882ED64428501A59E0FCF819785C362F96805179B92815E
31,509,239 UART: [art] SIG.S = 95160D63AFBE21B59135498DCAE65C4F8CBB5F0DA4BF1213414BC02CC1B8CAE0FB2F08DFBFB1A65402EBCFECD368E978
32,814,365 UART: Caliptra RT
32,815,068 UART: [state] CFI Enabled
32,977,376 UART: [rt] RT listening for mailbox commands...
32,979,292 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,009,281 UART: [rt]cmd =0x44504543, len=40
33,051,856 >>> mbox cmd response data (40 bytes)
33,053,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,083,798 UART: [rt]cmd =0x44504543, len=96
33,143,069 >>> mbox cmd response data (56 bytes)
33,143,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,174,375 UART: [rt]cmd =0x44504543, len=96
33,250,486 >>> mbox cmd response data (56 bytes)
33,251,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,281,745 UART: [rt]cmd =0x44504543, len=96
33,357,009 >>> mbox cmd response data (56 bytes)
33,357,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,388,372 UART: [rt]cmd =0x44504543, len=96
33,463,741 >>> mbox cmd response data (56 bytes)
33,464,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,494,887 UART: [rt]cmd =0x44504543, len=96
33,570,851 >>> mbox cmd response data (56 bytes)
33,571,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,602,230 UART: [rt]cmd =0x44504543, len=96
33,677,347 >>> mbox cmd response data (56 bytes)
33,678,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,708,663 UART: [rt]cmd =0x44504543, len=96
33,784,197 >>> mbox cmd response data (56 bytes)
33,784,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,815,452 UART: [rt]cmd =0x44504543, len=96
33,891,066 >>> mbox cmd response data (56 bytes)
33,891,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,922,458 UART: [rt]cmd =0x44504543, len=96
33,997,447 >>> mbox cmd response data (56 bytes)
33,998,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,028,687 UART: [rt]cmd =0x44504543, len=96
34,104,162 >>> mbox cmd response data (56 bytes)
34,104,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,135,570 UART: [rt]cmd =0x44504543, len=96
34,210,957 >>> mbox cmd response data (56 bytes)
34,211,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,242,296 UART: [rt]cmd =0x44504543, len=96
34,318,973 >>> mbox cmd response data (56 bytes)
34,319,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,350,432 UART: [rt]cmd =0x44504543, len=96
34,425,694 >>> mbox cmd response data (56 bytes)
34,426,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,456,995 UART: [rt]cmd =0x44504543, len=96
34,533,678 >>> mbox cmd response data (56 bytes)
34,534,389 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,565,148 UART: [rt]cmd =0x44504543, len=96
34,639,541 >>> mbox cmd response data (56 bytes)
34,640,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,670,872 UART: [rt]cmd =0x44504543, len=96
34,677,518 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,809,100 ready_for_fw is high
3,809,503 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,872,134 >>> mbox cmd response: success
23,566,743 UART:
23,567,131 UART: Running Caliptra FMC ...
23,568,246 UART:
23,568,400 UART: [state] CFI Enabled
23,634,942 UART: [fht] FMC Alias Private Key: 7
25,972,790 UART: [art] Extend RT PCRs Done
25,974,524 UART: [art] Lock RT PCRs Done
25,975,593 UART: [art] Populate DV Done
25,980,947 UART: [fht] FMC Alias Private Key: 7
25,982,405 UART: [art] Derive CDI
25,983,144 UART: [art] Store in in slot 0x4
26,044,709 UART: [art] Derive Key Pair
26,045,761 UART: [art] Store priv key in slot 0x5
29,338,843 UART: [art] Derive Key Pair - Done
29,351,798 UART: [art] Signing Cert with AUTHO
29,353,119 UART: RITY.KEYID = 7
31,643,393 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,929 UART: [art] PUB.X = 7134AC2CE2F898D72F71F497389CC3E0B188E84DB4E3BE736852965F0F46EEBC7A60353A0E8C168AD279445CF45FC461
31,652,045 UART: [art] PUB.Y = 4435E5B0059825204F8B023BC8464020335A8E7711748D5D3F6FF1507135A51D22AEC733DBE986988ED3E8522774A797
31,659,229 UART: [art] SIG.R = 393D5276762E0729EB45D077E7112637F479734FA39E5241B0C4B536C077B829114708535231B5CB20E1291BF20E98D7
31,666,591 UART: [art] SIG.S = 73F78B507EFBCE50238CFA0CE71A4E6382F3E6D72646E52CA63BF6439FF634BAA15C89D6D358908CC0EBB6E9582BABAA
32,972,399 UART: Caliptra RT
32,973,100 UART: [state] CFI Enabled
33,133,536 UART: [rt] RT listening for mailbox commands...
33,135,499 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,165,811 UART: [rt]cmd =0x44504543, len=40
33,206,895 >>> mbox cmd response data (40 bytes)
33,208,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,238,767 UART: [rt]cmd =0x44504543, len=96
33,298,908 >>> mbox cmd response data (56 bytes)
33,299,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,330,130 UART: [rt]cmd =0x44504543, len=96
33,405,444 >>> mbox cmd response data (56 bytes)
33,406,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,436,662 UART: [rt]cmd =0x44504543, len=96
33,512,368 >>> mbox cmd response data (56 bytes)
33,513,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,543,753 UART: [rt]cmd =0x44504543, len=96
33,619,110 >>> mbox cmd response data (56 bytes)
33,619,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,650,453 UART: [rt]cmd =0x44504543, len=96
33,725,887 >>> mbox cmd response data (56 bytes)
33,726,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,757,204 UART: [rt]cmd =0x44504543, len=96
33,832,712 >>> mbox cmd response data (56 bytes)
33,833,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,864,028 UART: [rt]cmd =0x44504543, len=96
33,939,542 >>> mbox cmd response data (56 bytes)
33,940,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,970,817 UART: [rt]cmd =0x44504543, len=96
34,046,970 >>> mbox cmd response data (56 bytes)
34,047,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,078,171 UART: [rt]cmd =0x44504543, len=96
34,153,354 >>> mbox cmd response data (56 bytes)
34,154,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,184,772 UART: [rt]cmd =0x44504543, len=96
34,260,430 >>> mbox cmd response data (56 bytes)
34,261,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,291,975 UART: [rt]cmd =0x44504543, len=96
34,367,418 >>> mbox cmd response data (56 bytes)
34,368,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,398,656 UART: [rt]cmd =0x44504543, len=96
34,474,182 >>> mbox cmd response data (56 bytes)
34,474,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,505,499 UART: [rt]cmd =0x44504543, len=96
34,581,337 >>> mbox cmd response data (56 bytes)
34,582,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,612,655 UART: [rt]cmd =0x44504543, len=96
34,687,909 >>> mbox cmd response data (56 bytes)
34,688,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,719,205 UART: [rt]cmd =0x44504543, len=96
34,794,821 >>> mbox cmd response data (56 bytes)
34,795,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,826,043 UART: [rt]cmd =0x44504543, len=96
34,832,940 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,439 UART:
192,806 UART: Running Caliptra ROM ...
193,989 UART:
603,790 UART: [state] CFI Enabled
618,746 UART: [state] LifecycleState = Unprovisioned
620,717 UART: [state] DebugLocked = No
622,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,120 UART: [kat] SHA2-256
796,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,467 UART: [kat] ++
808,004 UART: [kat] sha1
819,192 UART: [kat] SHA2-256
821,921 UART: [kat] SHA2-384
828,046 UART: [kat] SHA2-512-ACC
830,413 UART: [kat] ECC-384
3,116,030 UART: [kat] HMAC-384Kdf
3,127,701 UART: [kat] LMS
4,317,807 UART: [kat] --
4,322,853 UART: [cold-reset] ++
4,324,074 UART: [fht] Storing FHT @ 0x50003400
4,334,339 UART: [idev] ++
4,334,896 UART: [idev] CDI.KEYID = 6
4,335,926 UART: [idev] SUBJECT.KEYID = 7
4,337,105 UART: [idev] UDS.KEYID = 0
4,338,166 ready_for_fw is high
4,338,388 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,798 UART: [idev] Erasing UDS.KEYID = 0
7,625,156 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,797 UART: [idev] --
7,653,042 UART: [ldev] ++
7,653,654 UART: [ldev] CDI.KEYID = 6
7,654,532 UART: [ldev] SUBJECT.KEYID = 5
7,655,794 UART: [ldev] AUTHORITY.KEYID = 7
7,657,020 UART: [ldev] FE.KEYID = 1
7,668,914 UART: [ldev] Erasing FE.KEYID = 1
10,960,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,763 UART: [ldev] --
13,323,181 UART: [fwproc] Waiting for Commands...
13,325,592 UART: [fwproc] Received command 0x46574c44
13,327,789 UART: [fwproc] Received Image of size 114124 bytes
17,383,498 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,458,592 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,527,480 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,844,585 >>> mbox cmd response: success
17,849,202 UART: [afmc] ++
17,849,792 UART: [afmc] CDI.KEYID = 6
17,850,726 UART: [afmc] SUBJECT.KEYID = 7
17,851,990 UART: [afmc] AUTHORITY.KEYID = 5
21,166,496 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,880 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,221 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,163 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,503,572 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,180 UART: [afmc] --
23,529,815 UART: [cold-reset] --
23,534,484 UART: [state] Locking Datavault
23,540,592 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,346 UART: [state] Locking ICCM
23,545,055 UART: [exit] Launching FMC @ 0x40000130
23,553,402 UART:
23,553,632 UART: Running Caliptra FMC ...
23,554,653 UART:
23,554,790 UART: [state] CFI Enabled
23,563,047 UART: [fht] FMC Alias Private Key: 7
25,894,306 UART: [art] Extend RT PCRs Done
25,895,537 UART: [art] Lock RT PCRs Done
25,897,242 UART: [art] Populate DV Done
25,902,923 UART: [fht] FMC Alias Private Key: 7
25,904,454 UART: [art] Derive CDI
25,905,181 UART: [art] Store in in slot 0x4
25,947,677 UART: [art] Derive Key Pair
25,948,676 UART: [art] Store priv key in slot 0x5
29,191,124 UART: [art] Derive Key Pair - Done
29,203,846 UART: [art] Signing Cert with AUTHO
29,205,143 UART: RITY.KEYID = 7
31,484,550 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,058 UART: [art] PUB.X = F7389659BFA2A0CE6D6FA5F93B6B10E8615C800A1876E908EDA3F83484D98F45EBB287D8601E7A6E23989A550113EA14
31,493,295 UART: [art] PUB.Y = F870539C1A23C12ED8DCBE5896D75F66C51DE892DED917A6AE120A0FC181DDBB6D158CEA4B90345A4D9D8C787C5454C4
31,500,579 UART: [art] SIG.R = BD04F606DBD8A5491B28D9C0EEDD1D4DA8762FD7F06B160C245BE4EC0C12F245B138AE7E59D0923A5CF84333A6E553D8
31,507,961 UART: [art] SIG.S = 3D865CE6A24507153AF3C2B25905D54CC8C95C115B246E828944DEE8321AA8F7AE1FC568DFDAE74F39FCB3078AE79408
32,812,979 UART: Caliptra RT
32,813,693 UART: [state] CFI Enabled
32,931,411 UART: [rt] RT listening for mailbox commands...
32,933,333 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,963,436 UART: [rt]cmd =0x44504543, len=40
32,989,575 >>> mbox cmd response data (40 bytes)
32,990,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,021,314 UART: [rt]cmd =0x44504543, len=96
33,061,590 >>> mbox cmd response data (56 bytes)
33,062,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,092,870 UART: [rt]cmd =0x44504543, len=96
33,133,505 >>> mbox cmd response data (56 bytes)
33,134,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,164,691 UART: [rt]cmd =0x44504543, len=96
33,205,097 >>> mbox cmd response data (56 bytes)
33,205,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,236,317 UART: [rt]cmd =0x44504543, len=96
33,277,319 >>> mbox cmd response data (56 bytes)
33,278,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,308,315 UART: [rt]cmd =0x44504543, len=96
33,349,856 >>> mbox cmd response data (56 bytes)
33,350,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,381,030 UART: [rt]cmd =0x44504543, len=96
33,423,384 >>> mbox cmd response data (56 bytes)
33,424,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,454,688 UART: [rt]cmd =0x44504543, len=96
33,495,791 >>> mbox cmd response data (56 bytes)
33,496,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,527,115 UART: [rt]cmd =0x44504543, len=96
33,569,412 >>> mbox cmd response data (56 bytes)
33,570,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,600,617 UART: [rt]cmd =0x44504543, len=96
33,643,483 >>> mbox cmd response data (56 bytes)
33,644,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,674,812 UART: [rt]cmd =0x44504543, len=96
33,717,823 >>> mbox cmd response data (56 bytes)
33,718,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,749,121 UART: [rt]cmd =0x44504543, len=96
33,792,531 >>> mbox cmd response data (56 bytes)
33,793,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,823,863 UART: [rt]cmd =0x44504543, len=96
33,866,711 >>> mbox cmd response data (56 bytes)
33,867,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,897,842 UART: [rt]cmd =0x44504543, len=96
33,941,223 >>> mbox cmd response data (56 bytes)
33,941,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,972,394 UART: [rt]cmd =0x44504543, len=96
34,016,243 >>> mbox cmd response data (56 bytes)
34,016,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,047,747 UART: [rt]cmd =0x44504543, len=96
34,092,018 >>> mbox cmd response data (56 bytes)
34,092,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,123,114 UART: [rt]cmd =0x44504543, len=96
34,129,529 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,126,186 ready_for_fw is high
4,127,123 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,063,166 >>> mbox cmd response: success
23,707,871 UART:
23,708,288 UART: Running Caliptra FMC ...
23,709,390 UART:
23,709,535 UART: [state] CFI Enabled
23,717,807 UART: [fht] FMC Alias Private Key: 7
26,048,918 UART: [art] Extend RT PCRs Done
26,050,184 UART: [art] Lock RT PCRs Done
26,051,439 UART: [art] Populate DV Done
26,056,806 UART: [fht] FMC Alias Private Key: 7
26,058,351 UART: [art] Derive CDI
26,059,324 UART: [art] Store in in slot 0x4
26,101,953 UART: [art] Derive Key Pair
26,102,958 UART: [art] Store priv key in slot 0x5
29,345,255 UART: [art] Derive Key Pair - Done
29,358,317 UART: [art] Signing Cert with AUTHO
29,359,634 UART: RITY.KEYID = 7
31,639,198 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,707 UART: [art] PUB.X = 1514B9E4706E1F222A4B06000483014414B45AC4E92E7C9E5A585157E4CB8C8E06D69933C278BF3E165FB314297F610C
31,647,935 UART: [art] PUB.Y = 01B8605817EDF73C6B31F8463CA138BCEE3D47025223E38DC5C389DF5A9A9CB455D532BB283F2165B54947B3AACF7746
31,655,150 UART: [art] SIG.R = D829B394062D65389DEFF4FC8ABBA59BFCDD1788B172BB0143A6DFB56ADF6E79B7FC1227C6FDC7153415BD0388B67E4F
31,662,634 UART: [art] SIG.S = F389D2300EF26EAEAAD0F5537FBD300AFF380731961465C22592EBDB26B355638413138EFD9A11F02E1CBCD5713CCCE5
32,967,592 UART: Caliptra RT
32,968,331 UART: [state] CFI Enabled
33,085,238 UART: [rt] RT listening for mailbox commands...
33,087,185 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,117,402 UART: [rt]cmd =0x44504543, len=40
33,143,516 >>> mbox cmd response data (40 bytes)
33,144,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,175,514 UART: [rt]cmd =0x44504543, len=96
33,216,045 >>> mbox cmd response data (56 bytes)
33,216,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,247,337 UART: [rt]cmd =0x44504543, len=96
33,288,065 >>> mbox cmd response data (56 bytes)
33,288,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,319,231 UART: [rt]cmd =0x44504543, len=96
33,360,630 >>> mbox cmd response data (56 bytes)
33,361,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,391,734 UART: [rt]cmd =0x44504543, len=96
33,432,903 >>> mbox cmd response data (56 bytes)
33,433,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,464,213 UART: [rt]cmd =0x44504543, len=96
33,505,363 >>> mbox cmd response data (56 bytes)
33,506,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,536,408 UART: [rt]cmd =0x44504543, len=96
33,577,981 >>> mbox cmd response data (56 bytes)
33,578,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,609,317 UART: [rt]cmd =0x44504543, len=96
33,651,891 >>> mbox cmd response data (56 bytes)
33,652,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,683,067 UART: [rt]cmd =0x44504543, len=96
33,725,273 >>> mbox cmd response data (56 bytes)
33,725,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,756,599 UART: [rt]cmd =0x44504543, len=96
33,798,797 >>> mbox cmd response data (56 bytes)
33,799,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,830,145 UART: [rt]cmd =0x44504543, len=96
33,873,257 >>> mbox cmd response data (56 bytes)
33,873,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,904,431 UART: [rt]cmd =0x44504543, len=96
33,947,814 >>> mbox cmd response data (56 bytes)
33,948,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,979,050 UART: [rt]cmd =0x44504543, len=96
34,022,925 >>> mbox cmd response data (56 bytes)
34,023,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,054,314 UART: [rt]cmd =0x44504543, len=96
34,097,897 >>> mbox cmd response data (56 bytes)
34,098,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,129,099 UART: [rt]cmd =0x44504543, len=96
34,173,227 >>> mbox cmd response data (56 bytes)
34,173,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,204,490 UART: [rt]cmd =0x44504543, len=96
34,248,123 >>> mbox cmd response data (56 bytes)
34,248,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,279,210 UART: [rt]cmd =0x44504543, len=96
34,285,827 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
191,999 UART:
192,445 UART: Running Caliptra ROM ...
193,575 UART:
193,720 UART: [state] CFI Enabled
252,902 UART: [state] LifecycleState = Unprovisioned
254,778 UART: [state] DebugLocked = No
257,519 UART: [state] WD Timer not started. Device not locked for debugging
262,010 UART: [kat] SHA2-256
441,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,716 UART: [kat] ++
453,253 UART: [kat] sha1
464,347 UART: [kat] SHA2-256
467,418 UART: [kat] SHA2-384
473,117 UART: [kat] SHA2-512-ACC
476,056 UART: [kat] ECC-384
2,940,035 UART: [kat] HMAC-384Kdf
2,962,579 UART: [kat] LMS
3,492,042 UART: [kat] --
3,496,461 UART: [cold-reset] ++
3,498,602 UART: [fht] FHT @ 0x50003400
3,509,290 UART: [idev] ++
3,509,848 UART: [idev] CDI.KEYID = 6
3,510,733 UART: [idev] SUBJECT.KEYID = 7
3,511,989 UART: [idev] UDS.KEYID = 0
3,512,892 ready_for_fw is high
3,513,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,657,092 UART: [idev] Erasing UDS.KEYID = 0
6,014,736 UART: [idev] Sha1 KeyId Algorithm
6,038,398 UART: [idev] --
6,043,142 UART: [ldev] ++
6,043,721 UART: [ldev] CDI.KEYID = 6
6,044,612 UART: [ldev] SUBJECT.KEYID = 5
6,045,772 UART: [ldev] AUTHORITY.KEYID = 7
6,047,009 UART: [ldev] FE.KEYID = 1
6,090,444 UART: [ldev] Erasing FE.KEYID = 1
8,598,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,937 UART: [ldev] --
10,402,386 UART: [fwproc] Wait for Commands...
10,403,992 UART: [fwproc] Recv command 0x46574c44
10,406,084 UART: [fwproc] Recv'd Img size: 114448 bytes
13,805,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,261,972 >>> mbox cmd response: success
14,266,232 UART: [afmc] ++
14,266,825 UART: [afmc] CDI.KEYID = 6
14,267,715 UART: [afmc] SUBJECT.KEYID = 7
14,268,965 UART: [afmc] AUTHORITY.KEYID = 5
16,800,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,522,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,524,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,539,889 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,555,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,571,711 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,593,677 UART: [afmc] --
18,596,765 UART: [cold-reset] --
18,600,573 UART: [state] Locking Datavault
18,605,762 UART: [state] Locking PCR0, PCR1 and PCR31
18,607,404 UART: [state] Locking ICCM
18,608,901 UART: [exit] Launching FMC @ 0x40000130
18,617,351 UART:
18,617,592 UART: Running Caliptra FMC ...
18,618,694 UART:
18,618,855 UART: [state] CFI Enabled
18,680,594 UART: [fht] FMC Alias Private Key: 7
20,445,012 UART: [art] Extend RT PCRs Done
20,446,215 UART: [art] Lock RT PCRs Done
20,447,776 UART: [art] Populate DV Done
20,453,237 UART: [fht] FMC Alias Private Key: 7
20,454,823 UART: [art] Derive CDI
20,455,561 UART: [art] Store in in slot 0x4
20,513,673 UART: [art] Derive Key Pair
20,514,701 UART: [art] Store priv key in slot 0x5
22,977,912 UART: [art] Derive Key Pair - Done
22,991,127 UART: [art] Signing Cert with AUTHO
22,992,455 UART: RITY.KEYID = 7
24,704,046 UART: [art] Erasing AUTHORITY.KEYID = 7
24,705,526 UART: [art] PUB.X = 62348E9404B86A01AEA2DDD7A8EA595451AC9BD68ADDE1709F1C520910FC642C270025C531A70D9066F7A6049B9408A8
24,712,775 UART: [art] PUB.Y = DF4F8BE94CE9885DA3E235D8DB2BF6C1C4427B579CCDDFB7D1CFDEB9EEEC1677256688735201805F58BCF104B219D061
24,720,075 UART: [art] SIG.R = 06A5FE9C8F9B63AE8B08D9BA5343A12F27F6FC97F3939A3DD2C52C8AB20F7FCD26534E17A058E39D056069EC9E05414C
24,727,474 UART: [art] SIG.S = BC6DEC57A3D8EFF92DF9C00349F91F72ECBB0220ABC7E411E8214453C08DD0C3B65E8E392564F562218C7DA114D8637A
25,706,555 UART: Caliptra RT
25,707,268 UART: [state] CFI Enabled
25,873,178 UART: [rt] RT listening for mailbox commands...
25,875,090 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,905,599 UART: [rt]cmd =0x44504543, len=40
25,946,614 >>> mbox cmd response data (40 bytes)
25,947,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,978,764 UART: [rt]cmd =0x44504543, len=96
26,039,172 >>> mbox cmd response data (56 bytes)
26,039,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,070,576 UART: [rt]cmd =0x44504543, len=96
26,145,982 >>> mbox cmd response data (56 bytes)
26,146,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,177,243 UART: [rt]cmd =0x44504543, len=96
26,252,962 >>> mbox cmd response data (56 bytes)
26,253,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,284,227 UART: [rt]cmd =0x44504543, len=96
26,359,695 >>> mbox cmd response data (56 bytes)
26,360,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,391,195 UART: [rt]cmd =0x44504543, len=96
26,466,649 >>> mbox cmd response data (56 bytes)
26,467,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,497,901 UART: [rt]cmd =0x44504543, len=96
26,573,194 >>> mbox cmd response data (56 bytes)
26,573,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,604,517 UART: [rt]cmd =0x44504543, len=96
26,681,123 >>> mbox cmd response data (56 bytes)
26,681,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,712,383 UART: [rt]cmd =0x44504543, len=96
26,788,097 >>> mbox cmd response data (56 bytes)
26,788,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,819,507 UART: [rt]cmd =0x44504543, len=96
26,895,028 >>> mbox cmd response data (56 bytes)
26,895,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,926,293 UART: [rt]cmd =0x44504543, len=96
27,002,363 >>> mbox cmd response data (56 bytes)
27,003,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,033,631 UART: [rt]cmd =0x44504543, len=96
27,108,270 >>> mbox cmd response data (56 bytes)
27,108,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,139,413 UART: [rt]cmd =0x44504543, len=96
27,215,292 >>> mbox cmd response data (56 bytes)
27,216,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,246,231 UART: [rt]cmd =0x44504543, len=96
27,322,665 >>> mbox cmd response data (56 bytes)
27,323,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,353,699 UART: [rt]cmd =0x44504543, len=96
27,429,570 >>> mbox cmd response data (56 bytes)
27,430,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,460,895 UART: [rt]cmd =0x44504543, len=96
27,535,981 >>> mbox cmd response data (56 bytes)
27,536,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,567,186 UART: [rt]cmd =0x44504543, len=96
27,573,728 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,361,552 ready_for_fw is high
3,361,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,048,182 >>> mbox cmd response: success
18,344,117 UART:
18,344,524 UART: Running Caliptra FMC ...
18,345,732 UART:
18,345,898 UART: [state] CFI Enabled
18,412,984 UART: [fht] FMC Alias Private Key: 7
20,176,781 UART: [art] Extend RT PCRs Done
20,177,993 UART: [art] Lock RT PCRs Done
20,179,406 UART: [art] Populate DV Done
20,184,603 UART: [fht] FMC Alias Private Key: 7
20,186,150 UART: [art] Derive CDI
20,186,969 UART: [art] Store in in slot 0x4
20,244,933 UART: [art] Derive Key Pair
20,245,971 UART: [art] Store priv key in slot 0x5
22,709,195 UART: [art] Derive Key Pair - Done
22,721,875 UART: [art] Signing Cert with AUTHO
22,723,230 UART: RITY.KEYID = 7
24,434,580 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,057 UART: [art] PUB.X = E8037DC135B2106BA5119B83A77B06E4662F14F73CA25C488C01F1756A772F153570993E3BDE853A295D5004E5FCE3D5
24,443,306 UART: [art] PUB.Y = AC3B28EEEFB3F16E981FE536EED4D61F1AD8F5FF5CA2474BA7353370BDD2A6038AEB0C3FB06CF804400B7F470CF03AF7
24,450,625 UART: [art] SIG.R = A34130732C2BDBCF16B2F9487E4B64F74AF9A4147122309D11CD8C47D489FA500635F20F94595C7EB118AA24FD65D689
24,458,021 UART: [art] SIG.S = 35D283392009A09853811B16773DA0D0AD73341BD80FE833C67E77FA7BE4A5823A388C6AF3CA3842F0C10802B59A1F06
25,437,077 UART: Caliptra RT
25,437,796 UART: [state] CFI Enabled
25,602,277 UART: [rt] RT listening for mailbox commands...
25,604,214 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,634,942 UART: [rt]cmd =0x44504543, len=40
25,676,726 >>> mbox cmd response data (40 bytes)
25,677,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,708,735 UART: [rt]cmd =0x44504543, len=96
25,769,558 >>> mbox cmd response data (56 bytes)
25,770,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,800,911 UART: [rt]cmd =0x44504543, len=96
25,876,103 >>> mbox cmd response data (56 bytes)
25,876,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,907,632 UART: [rt]cmd =0x44504543, len=96
25,983,067 >>> mbox cmd response data (56 bytes)
25,983,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,014,277 UART: [rt]cmd =0x44504543, len=96
26,089,808 >>> mbox cmd response data (56 bytes)
26,090,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,120,804 UART: [rt]cmd =0x44504543, len=96
26,196,582 >>> mbox cmd response data (56 bytes)
26,197,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,227,896 UART: [rt]cmd =0x44504543, len=96
26,303,675 >>> mbox cmd response data (56 bytes)
26,304,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,334,887 UART: [rt]cmd =0x44504543, len=96
26,410,163 >>> mbox cmd response data (56 bytes)
26,410,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,441,208 UART: [rt]cmd =0x44504543, len=96
26,517,034 >>> mbox cmd response data (56 bytes)
26,517,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,548,298 UART: [rt]cmd =0x44504543, len=96
26,624,017 >>> mbox cmd response data (56 bytes)
26,624,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,654,962 UART: [rt]cmd =0x44504543, len=96
26,730,506 >>> mbox cmd response data (56 bytes)
26,731,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,761,739 UART: [rt]cmd =0x44504543, len=96
26,837,853 >>> mbox cmd response data (56 bytes)
26,838,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,869,222 UART: [rt]cmd =0x44504543, len=96
26,944,579 >>> mbox cmd response data (56 bytes)
26,945,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,975,920 UART: [rt]cmd =0x44504543, len=96
27,051,015 >>> mbox cmd response data (56 bytes)
27,051,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,082,275 UART: [rt]cmd =0x44504543, len=96
27,158,259 >>> mbox cmd response data (56 bytes)
27,158,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,189,522 UART: [rt]cmd =0x44504543, len=96
27,264,761 >>> mbox cmd response data (56 bytes)
27,265,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,295,975 UART: [rt]cmd =0x44504543, len=96
27,302,733 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,358 UART:
192,743 UART: Running Caliptra ROM ...
194,058 UART:
603,504 UART: [state] CFI Enabled
614,256 UART: [state] LifecycleState = Unprovisioned
616,138 UART: [state] DebugLocked = No
618,230 UART: [state] WD Timer not started. Device not locked for debugging
621,329 UART: [kat] SHA2-256
800,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,033 UART: [kat] ++
812,566 UART: [kat] sha1
823,580 UART: [kat] SHA2-256
826,575 UART: [kat] SHA2-384
831,844 UART: [kat] SHA2-512-ACC
834,792 UART: [kat] ECC-384
3,276,015 UART: [kat] HMAC-384Kdf
3,287,899 UART: [kat] LMS
3,817,449 UART: [kat] --
3,821,588 UART: [cold-reset] ++
3,823,017 UART: [fht] FHT @ 0x50003400
3,834,071 UART: [idev] ++
3,834,632 UART: [idev] CDI.KEYID = 6
3,835,540 UART: [idev] SUBJECT.KEYID = 7
3,836,710 UART: [idev] UDS.KEYID = 0
3,837,754 ready_for_fw is high
3,837,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,981,815 UART: [idev] Erasing UDS.KEYID = 0
6,304,312 UART: [idev] Sha1 KeyId Algorithm
6,327,424 UART: [idev] --
6,330,437 UART: [ldev] ++
6,330,997 UART: [ldev] CDI.KEYID = 6
6,331,902 UART: [ldev] SUBJECT.KEYID = 5
6,333,049 UART: [ldev] AUTHORITY.KEYID = 7
6,334,329 UART: [ldev] FE.KEYID = 1
6,346,963 UART: [ldev] Erasing FE.KEYID = 1
8,821,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,584,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,605,527 UART: [ldev] --
10,610,330 UART: [fwproc] Wait for Commands...
10,612,744 UART: [fwproc] Recv command 0x46574c44
10,614,774 UART: [fwproc] Recv'd Img size: 114448 bytes
14,017,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,479,863 >>> mbox cmd response: success
14,484,370 UART: [afmc] ++
14,484,960 UART: [afmc] CDI.KEYID = 6
14,485,835 UART: [afmc] SUBJECT.KEYID = 7
14,487,042 UART: [afmc] AUTHORITY.KEYID = 5
16,987,095 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,705,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,723,094 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,739,107 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,777,818 UART: [afmc] --
18,781,950 UART: [cold-reset] --
18,785,104 UART: [state] Locking Datavault
18,790,452 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,147 UART: [state] Locking ICCM
18,793,587 UART: [exit] Launching FMC @ 0x40000130
18,801,978 UART:
18,802,218 UART: Running Caliptra FMC ...
18,803,309 UART:
18,803,460 UART: [state] CFI Enabled
18,811,713 UART: [fht] FMC Alias Private Key: 7
20,568,443 UART: [art] Extend RT PCRs Done
20,569,665 UART: [art] Lock RT PCRs Done
20,571,096 UART: [art] Populate DV Done
20,576,512 UART: [fht] FMC Alias Private Key: 7
20,578,064 UART: [art] Derive CDI
20,578,879 UART: [art] Store in in slot 0x4
20,621,202 UART: [art] Derive Key Pair
20,622,235 UART: [art] Store priv key in slot 0x5
23,048,638 UART: [art] Derive Key Pair - Done
23,061,371 UART: [art] Signing Cert with AUTHO
23,062,680 UART: RITY.KEYID = 7
24,768,102 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,596 UART: [art] PUB.X = 9B9D704573B2700B09F55D3F467F2385F27CD4C95146AACE6EBAC7D2A76768276515A4F8DD76BC13BEC8ED4455E2ED45
24,776,879 UART: [art] PUB.Y = 7E9234D2667F76A6AE5C023D2835E3AB53085A355A2FF9425486302BF24B2F62613AB5E793E4F39624C02380FA3C6878
24,784,147 UART: [art] SIG.R = E69D8D3D785546893A8548C80EC3059AD43224446D8BE76EEC8280423EE8FDCD427EB9C63B0C4707A1701CBDD0DB9220
24,791,519 UART: [art] SIG.S = 6BCD95519FDCEB293897CBD326F1382173DDF1F5A5ED5FD026BDDF80F9E222252B953583E26A8A96E7544D9CFA70541E
25,770,100 UART: Caliptra RT
25,770,805 UART: [state] CFI Enabled
25,888,152 UART: [rt] RT listening for mailbox commands...
25,890,079 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,920,131 UART: [rt]cmd =0x44504543, len=40
25,946,588 >>> mbox cmd response data (40 bytes)
25,947,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,978,331 UART: [rt]cmd =0x44504543, len=96
26,018,059 >>> mbox cmd response data (56 bytes)
26,018,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,049,616 UART: [rt]cmd =0x44504543, len=96
26,090,312 >>> mbox cmd response data (56 bytes)
26,091,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,121,608 UART: [rt]cmd =0x44504543, len=96
26,163,106 >>> mbox cmd response data (56 bytes)
26,163,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,194,547 UART: [rt]cmd =0x44504543, len=96
26,235,503 >>> mbox cmd response data (56 bytes)
26,236,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,266,935 UART: [rt]cmd =0x44504543, len=96
26,308,913 >>> mbox cmd response data (56 bytes)
26,309,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,340,230 UART: [rt]cmd =0x44504543, len=96
26,381,437 >>> mbox cmd response data (56 bytes)
26,382,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,412,638 UART: [rt]cmd =0x44504543, len=96
26,455,410 >>> mbox cmd response data (56 bytes)
26,456,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,486,895 UART: [rt]cmd =0x44504543, len=96
26,529,342 >>> mbox cmd response data (56 bytes)
26,530,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,560,586 UART: [rt]cmd =0x44504543, len=96
26,603,640 >>> mbox cmd response data (56 bytes)
26,604,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,634,942 UART: [rt]cmd =0x44504543, len=96
26,678,041 >>> mbox cmd response data (56 bytes)
26,678,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,709,360 UART: [rt]cmd =0x44504543, len=96
26,752,871 >>> mbox cmd response data (56 bytes)
26,753,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,783,978 UART: [rt]cmd =0x44504543, len=96
26,828,174 >>> mbox cmd response data (56 bytes)
26,828,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,859,148 UART: [rt]cmd =0x44504543, len=96
26,903,404 >>> mbox cmd response data (56 bytes)
26,904,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,934,430 UART: [rt]cmd =0x44504543, len=96
26,978,952 >>> mbox cmd response data (56 bytes)
26,979,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,009,970 UART: [rt]cmd =0x44504543, len=96
27,054,716 >>> mbox cmd response data (56 bytes)
27,055,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,086,094 UART: [rt]cmd =0x44504543, len=96
27,092,485 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,693,707 ready_for_fw is high
3,694,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,088 >>> mbox cmd response: success
18,529,496 UART:
18,529,887 UART: Running Caliptra FMC ...
18,530,980 UART:
18,531,124 UART: [state] CFI Enabled
18,539,001 UART: [fht] FMC Alias Private Key: 7
20,295,313 UART: [art] Extend RT PCRs Done
20,296,536 UART: [art] Lock RT PCRs Done
20,298,186 UART: [art] Populate DV Done
20,303,532 UART: [fht] FMC Alias Private Key: 7
20,305,011 UART: [art] Derive CDI
20,305,741 UART: [art] Store in in slot 0x4
20,348,698 UART: [art] Derive Key Pair
20,349,689 UART: [art] Store priv key in slot 0x5
22,776,766 UART: [art] Derive Key Pair - Done
22,789,706 UART: [art] Signing Cert with AUTHO
22,791,009 UART: RITY.KEYID = 7
24,496,062 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,567 UART: [art] PUB.X = AB2B23BD520960DD3137B456B76981E0B998824FBD56C5BEB28937B630B9D00291A78F932F2A97DE6BAEF2C808455ECE
24,504,795 UART: [art] PUB.Y = F7BB65205FBD6A34670FAB4FA66730BC367087C7DD371A9646AE853949D421FB0351D71D5991A2BC1D5D5199413270A6
24,512,083 UART: [art] SIG.R = FDFB76E5AE3A99C7149840EE80C2ADABCA1B46282722318873315A2521C2D4ADF804E164BF1BA7E62544686897257364
24,519,434 UART: [art] SIG.S = 4D4EF08505D08F39893278E222E066DA8F65FD67055B28BE5F8C3223D176C6F4973F3EBDC6CC7D5E5C4E8829597A8126
25,498,113 UART: Caliptra RT
25,498,812 UART: [state] CFI Enabled
25,616,388 UART: [rt] RT listening for mailbox commands...
25,618,291 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,648,592 UART: [rt]cmd =0x44504543, len=40
25,674,993 >>> mbox cmd response data (40 bytes)
25,676,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,706,878 UART: [rt]cmd =0x44504543, len=96
25,747,493 >>> mbox cmd response data (56 bytes)
25,748,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,779,000 UART: [rt]cmd =0x44504543, len=96
25,819,842 >>> mbox cmd response data (56 bytes)
25,820,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,851,162 UART: [rt]cmd =0x44504543, len=96
25,891,922 >>> mbox cmd response data (56 bytes)
25,892,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,923,079 UART: [rt]cmd =0x44504543, len=96
25,965,041 >>> mbox cmd response data (56 bytes)
25,965,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,996,129 UART: [rt]cmd =0x44504543, len=96
26,037,323 >>> mbox cmd response data (56 bytes)
26,038,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,068,394 UART: [rt]cmd =0x44504543, len=96
26,109,957 >>> mbox cmd response data (56 bytes)
26,110,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,141,046 UART: [rt]cmd =0x44504543, len=96
26,183,474 >>> mbox cmd response data (56 bytes)
26,184,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,214,533 UART: [rt]cmd =0x44504543, len=96
26,257,070 >>> mbox cmd response data (56 bytes)
26,257,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,288,231 UART: [rt]cmd =0x44504543, len=96
26,330,594 >>> mbox cmd response data (56 bytes)
26,331,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,361,697 UART: [rt]cmd =0x44504543, len=96
26,405,105 >>> mbox cmd response data (56 bytes)
26,405,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,436,512 UART: [rt]cmd =0x44504543, len=96
26,480,247 >>> mbox cmd response data (56 bytes)
26,480,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,511,402 UART: [rt]cmd =0x44504543, len=96
26,555,038 >>> mbox cmd response data (56 bytes)
26,555,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,586,231 UART: [rt]cmd =0x44504543, len=96
26,629,864 >>> mbox cmd response data (56 bytes)
26,630,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,661,063 UART: [rt]cmd =0x44504543, len=96
26,705,512 >>> mbox cmd response data (56 bytes)
26,706,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,736,818 UART: [rt]cmd =0x44504543, len=96
26,781,696 >>> mbox cmd response data (56 bytes)
26,782,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,812,625 UART: [rt]cmd =0x44504543, len=96
26,819,083 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,439,513 ready_for_fw is high
3,440,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,748,949 >>> mbox cmd response: success
19,061,423 UART:
19,061,813 UART: Running Caliptra FMC ...
19,063,010 UART:
19,063,183 UART: [state] CFI Enabled
19,128,059 UART: [fht] FMC Alias Private Key: 7
20,891,114 UART: [art] Extend RT PCRs Done
20,892,337 UART: [art] Lock RT PCRs Done
20,893,950 UART: [art] Populate DV Done
20,899,258 UART: [fht] FMC Alias Private Key: 7
20,900,743 UART: [art] Derive CDI
20,901,508 UART: [art] Store in in slot 0x4
20,960,428 UART: [art] Derive Key Pair
20,961,471 UART: [art] Store priv key in slot 0x5
23,424,854 UART: [art] Derive Key Pair - Done
23,438,010 UART: [art] Signing Cert with AUTHO
23,439,318 UART: RITY.KEYID = 7
25,150,664 UART: [art] Erasing AUTHORITY.KEYID = 7
25,152,168 UART: [art] PUB.X = A83E83D4F70D87B206A8555E45349356F4FE917F11A4C322E57F8B77E4590F4E3E501D1B02D102D5B33008FEEDF5C29C
25,159,495 UART: [art] PUB.Y = CD866C4C79920117D18397CEDD636F26E8E10BF1DF710FEEE35E8CA5561B64EB8300C7300D1F423FD22617D1A1DA704D
25,166,701 UART: [art] SIG.R = BD0DD59B1652BC6674C6A194BD2BA1C39D0974B39BEB7B8825CA8A761F78FDD2C97AE33678F52BE08E5E4BC15291654E
25,174,152 UART: [art] SIG.S = B7F5C5AA9A7A270158F16544DE24E5E233E499E5AC36B1B9D868A9A6E88BAD35B43F99AD7D8A27734F74EC52EEA2C481
26,152,581 UART: Caliptra RT
26,153,270 UART: [state] CFI Enabled
26,317,598 UART: [rt] RT listening for mailbox commands...
26,319,506 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,350,228 UART: [rt]cmd =0x44504543, len=40
26,392,386 >>> mbox cmd response data (40 bytes)
26,393,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,424,114 UART: [rt]cmd =0x44504543, len=96
26,483,991 >>> mbox cmd response data (56 bytes)
26,484,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,515,329 UART: [rt]cmd =0x44504543, len=96
26,590,959 >>> mbox cmd response data (56 bytes)
26,591,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,622,184 UART: [rt]cmd =0x44504543, len=96
26,697,497 >>> mbox cmd response data (56 bytes)
26,698,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,728,813 UART: [rt]cmd =0x44504543, len=96
26,804,324 >>> mbox cmd response data (56 bytes)
26,805,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,835,712 UART: [rt]cmd =0x44504543, len=96
26,911,218 >>> mbox cmd response data (56 bytes)
26,911,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,942,469 UART: [rt]cmd =0x44504543, len=96
27,018,292 >>> mbox cmd response data (56 bytes)
27,019,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,049,530 UART: [rt]cmd =0x44504543, len=96
27,125,001 >>> mbox cmd response data (56 bytes)
27,125,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,156,166 UART: [rt]cmd =0x44504543, len=96
27,231,792 >>> mbox cmd response data (56 bytes)
27,232,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,263,080 UART: [rt]cmd =0x44504543, len=96
27,338,510 >>> mbox cmd response data (56 bytes)
27,339,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,369,831 UART: [rt]cmd =0x44504543, len=96
27,444,643 >>> mbox cmd response data (56 bytes)
27,445,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,475,792 UART: [rt]cmd =0x44504543, len=96
27,552,036 >>> mbox cmd response data (56 bytes)
27,552,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,583,073 UART: [rt]cmd =0x44504543, len=96
27,658,437 >>> mbox cmd response data (56 bytes)
27,659,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,689,683 UART: [rt]cmd =0x44504543, len=96
27,765,621 >>> mbox cmd response data (56 bytes)
27,766,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,796,937 UART: [rt]cmd =0x44504543, len=96
27,871,975 >>> mbox cmd response data (56 bytes)
27,872,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,903,414 UART: [rt]cmd =0x44504543, len=96
27,978,733 >>> mbox cmd response data (56 bytes)
27,979,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,009,934 UART: [rt]cmd =0x44504543, len=96
28,016,504 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,757,835 ready_for_fw is high
3,758,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,957,159 >>> mbox cmd response: success
19,212,941 UART:
19,213,322 UART: Running Caliptra FMC ...
19,214,415 UART:
19,214,572 UART: [state] CFI Enabled
19,222,572 UART: [fht] FMC Alias Private Key: 7
20,979,183 UART: [art] Extend RT PCRs Done
20,980,406 UART: [art] Lock RT PCRs Done
20,982,268 UART: [art] Populate DV Done
20,987,789 UART: [fht] FMC Alias Private Key: 7
20,989,429 UART: [art] Derive CDI
20,990,163 UART: [art] Store in in slot 0x4
21,032,698 UART: [art] Derive Key Pair
21,033,758 UART: [art] Store priv key in slot 0x5
23,460,558 UART: [art] Derive Key Pair - Done
23,473,493 UART: [art] Signing Cert with AUTHO
23,474,793 UART: RITY.KEYID = 7
25,179,916 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,581 UART: [art] PUB.X = 7A8C93EFE9C9ED3B2E377920EAC91D5BE301FC3618AC3135DE7BFA172CFC38FFD2A44E33066464284ED6C8290731317A
25,188,743 UART: [art] PUB.Y = 63C0E00D98271587A435B0BAA48AFFD75C11F85D739E56E1F5504443D44B67DF8CE2AE59506605C266871E0CFB81A55A
25,195,975 UART: [art] SIG.R = AF386A9D9C26D3F81FDC78C7D7F3DDDFF7085A1AFC108B89250E510A68F201614AE85A184E3040488479C5ED041778BD
25,203,334 UART: [art] SIG.S = 98A64808DBDEFBAB271120416EEA5923EC54E2E36A50F94C893B0DC0CFE8BD6AFCC734F14E82B2725FC2F5EB40064675
26,182,748 UART: Caliptra RT
26,183,436 UART: [state] CFI Enabled
26,301,272 UART: [rt] RT listening for mailbox commands...
26,303,330 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,333,641 UART: [rt]cmd =0x44504543, len=40
26,359,444 >>> mbox cmd response data (40 bytes)
26,360,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,391,392 UART: [rt]cmd =0x44504543, len=96
26,431,349 >>> mbox cmd response data (56 bytes)
26,432,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,462,520 UART: [rt]cmd =0x44504543, len=96
26,503,374 >>> mbox cmd response data (56 bytes)
26,504,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,534,767 UART: [rt]cmd =0x44504543, len=96
26,575,359 >>> mbox cmd response data (56 bytes)
26,576,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,606,477 UART: [rt]cmd =0x44504543, len=96
26,647,523 >>> mbox cmd response data (56 bytes)
26,648,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,678,893 UART: [rt]cmd =0x44504543, len=96
26,720,696 >>> mbox cmd response data (56 bytes)
26,721,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,751,964 UART: [rt]cmd =0x44504543, len=96
26,793,464 >>> mbox cmd response data (56 bytes)
26,794,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,824,825 UART: [rt]cmd =0x44504543, len=96
26,866,248 >>> mbox cmd response data (56 bytes)
26,866,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,897,714 UART: [rt]cmd =0x44504543, len=96
26,939,655 >>> mbox cmd response data (56 bytes)
26,940,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,970,985 UART: [rt]cmd =0x44504543, len=96
27,013,516 >>> mbox cmd response data (56 bytes)
27,014,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,044,722 UART: [rt]cmd =0x44504543, len=96
27,087,464 >>> mbox cmd response data (56 bytes)
27,088,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,118,663 UART: [rt]cmd =0x44504543, len=96
27,161,839 >>> mbox cmd response data (56 bytes)
27,162,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,193,054 UART: [rt]cmd =0x44504543, len=96
27,237,016 >>> mbox cmd response data (56 bytes)
27,237,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,268,383 UART: [rt]cmd =0x44504543, len=96
27,312,260 >>> mbox cmd response data (56 bytes)
27,312,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,343,501 UART: [rt]cmd =0x44504543, len=96
27,386,946 >>> mbox cmd response data (56 bytes)
27,387,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,418,108 UART: [rt]cmd =0x44504543, len=96
27,463,142 >>> mbox cmd response data (56 bytes)
27,463,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,494,580 UART: [rt]cmd =0x44504543, len=96
27,501,148 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Unprovisioned
86,231 UART: [state] DebugLocked = No
86,735 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,399 UART: [kat] SHA2-256
882,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,445 UART: [kat] ++
886,597 UART: [kat] sha1
890,809 UART: [kat] SHA2-256
892,747 UART: [kat] SHA2-384
895,682 UART: [kat] SHA2-512-ACC
897,583 UART: [kat] ECC-384
903,174 UART: [kat] HMAC-384Kdf
907,836 UART: [kat] LMS
1,476,032 UART: [kat] --
1,477,023 UART: [cold-reset] ++
1,477,407 UART: [fht] Storing FHT @ 0x50003400
1,480,158 UART: [idev] ++
1,480,326 UART: [idev] CDI.KEYID = 6
1,480,686 UART: [idev] SUBJECT.KEYID = 7
1,481,110 UART: [idev] UDS.KEYID = 0
1,481,455 ready_for_fw is high
1,481,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,192 UART: [idev] Erasing UDS.KEYID = 0
1,505,898 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,380 UART: [idev] --
1,515,423 UART: [ldev] ++
1,515,591 UART: [ldev] CDI.KEYID = 6
1,515,954 UART: [ldev] SUBJECT.KEYID = 5
1,516,380 UART: [ldev] AUTHORITY.KEYID = 7
1,516,843 UART: [ldev] FE.KEYID = 1
1,522,157 UART: [ldev] Erasing FE.KEYID = 1
1,547,106 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,500 UART: [ldev] --
1,586,979 UART: [fwproc] Waiting for Commands...
1,587,826 UART: [fwproc] Received command 0x46574c44
1,588,617 UART: [fwproc] Received Image of size 114448 bytes
2,888,469 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,821 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,173 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,114 >>> mbox cmd response: success
3,082,282 UART: [afmc] ++
3,082,450 UART: [afmc] CDI.KEYID = 6
3,082,812 UART: [afmc] SUBJECT.KEYID = 7
3,083,237 UART: [afmc] AUTHORITY.KEYID = 5
3,118,680 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,030 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,538 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,423 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,113 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,076 UART: [afmc] --
3,162,178 UART: [cold-reset] --
3,163,018 UART: [state] Locking Datavault
3,164,023 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,627 UART: [state] Locking ICCM
3,165,063 UART: [exit] Launching FMC @ 0x40000130
3,170,392 UART:
3,170,408 UART: Running Caliptra FMC ...
3,170,816 UART:
3,170,870 UART: [state] CFI Enabled
3,181,299 UART: [fht] FMC Alias Private Key: 7
3,288,662 UART: [art] Extend RT PCRs Done
3,289,090 UART: [art] Lock RT PCRs Done
3,291,116 UART: [art] Populate DV Done
3,299,361 UART: [fht] FMC Alias Private Key: 7
3,300,535 UART: [art] Derive CDI
3,300,815 UART: [art] Store in in slot 0x4
3,386,684 UART: [art] Derive Key Pair
3,387,044 UART: [art] Store priv key in slot 0x5
3,400,304 UART: [art] Derive Key Pair - Done
3,415,073 UART: [art] Signing Cert with AUTHO
3,415,553 UART: RITY.KEYID = 7
3,430,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,394 UART: [art] PUB.X = F42D7E11E3D87AF6E7660FE52A5C1D1395A9FA0A9D76B90F7A831F3411A58D246748EB141D82524060418D08B6B507CD
3,438,151 UART: [art] PUB.Y = E9DD4A72AEBDAB1CC848ED7D903158C00060FC045656F1C9AA59C57F89799FA5A3F9FE21311D5605AAFC0E7258A6C290
3,445,084 UART: [art] SIG.R = 955657568F2C3C57CA610F6FC179ABE5794740F672AB9334ADBAB1716F6AED5CB7706800458DAECC35CA5B885BC30DD3
3,451,838 UART: [art] SIG.S = AF2E4195CBEE9073514997ECE792894A291536F7539B0DD25363053EE50E3DEDB84BB22896C837A8DE1D1B62BBA9A2AE
3,475,762 UART: Caliptra RT
3,476,015 UART: [state] CFI Enabled
3,583,735 UART: [rt] RT listening for mailbox commands...
3,584,405 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,459 UART: [rt]cmd =0x44504543, len=40
3,640,653 >>> mbox cmd response data (40 bytes)
3,640,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,670,311 UART: [rt]cmd =0x44504543, len=96
3,710,129 >>> mbox cmd response data (56 bytes)
3,710,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,003 UART: [rt]cmd =0x44504543, len=96
3,780,206 >>> mbox cmd response data (56 bytes)
3,780,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,896 UART: [rt]cmd =0x44504543, len=96
3,851,023 >>> mbox cmd response data (56 bytes)
3,851,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,059 UART: [rt]cmd =0x44504543, len=96
3,922,102 >>> mbox cmd response data (56 bytes)
3,922,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,012 UART: [rt]cmd =0x44504543, len=96
3,993,485 >>> mbox cmd response data (56 bytes)
3,993,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,023,477 UART: [rt]cmd =0x44504543, len=96
4,065,214 >>> mbox cmd response data (56 bytes)
4,065,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,095,070 UART: [rt]cmd =0x44504543, len=96
4,137,565 >>> mbox cmd response data (56 bytes)
4,137,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,511 UART: [rt]cmd =0x44504543, len=96
4,209,742 >>> mbox cmd response data (56 bytes)
4,209,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,239,536 UART: [rt]cmd =0x44504543, len=96
4,282,055 >>> mbox cmd response data (56 bytes)
4,282,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,312,031 UART: [rt]cmd =0x44504543, len=96
4,355,022 >>> mbox cmd response data (56 bytes)
4,355,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,384,914 UART: [rt]cmd =0x44504543, len=96
4,427,915 >>> mbox cmd response data (56 bytes)
4,427,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,457,769 UART: [rt]cmd =0x44504543, len=96
4,501,888 >>> mbox cmd response data (56 bytes)
4,501,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,531,624 UART: [rt]cmd =0x44504543, len=96
4,575,671 >>> mbox cmd response data (56 bytes)
4,575,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,605,651 UART: [rt]cmd =0x44504543, len=96
4,650,090 >>> mbox cmd response data (56 bytes)
4,650,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,680,080 UART: [rt]cmd =0x44504543, len=96
4,724,635 >>> mbox cmd response data (56 bytes)
4,724,636 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,754,753 UART: [rt]cmd =0x44504543, len=96
4,762,063 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,475 ready_for_fw is high
1,362,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,699 >>> mbox cmd response: success
2,991,945 UART:
2,991,961 UART: Running Caliptra FMC ...
2,992,369 UART:
2,992,423 UART: [state] CFI Enabled
3,003,074 UART: [fht] FMC Alias Private Key: 7
3,110,449 UART: [art] Extend RT PCRs Done
3,110,877 UART: [art] Lock RT PCRs Done
3,112,219 UART: [art] Populate DV Done
3,120,682 UART: [fht] FMC Alias Private Key: 7
3,121,616 UART: [art] Derive CDI
3,121,896 UART: [art] Store in in slot 0x4
3,207,517 UART: [art] Derive Key Pair
3,207,877 UART: [art] Store priv key in slot 0x5
3,220,657 UART: [art] Derive Key Pair - Done
3,235,564 UART: [art] Signing Cert with AUTHO
3,236,044 UART: RITY.KEYID = 7
3,251,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,165 UART: [art] PUB.X = 4861A74BDA12618E1F8C9505D2C17594944B2EA58B8E9FA4D7C05EC85E00A9B69101F0CE78CEDE63F7DFA92DACE49B6B
3,258,925 UART: [art] PUB.Y = EAF26485F5C443E59E206D68FB38618D1A35D46F9E87ABD2BE4617839B9B365894B80046047C7837DF7D261A75AB9D52
3,265,850 UART: [art] SIG.R = 1DE9A2F40357B02771510D50FA42610B9DE591E653A809F50513C19F7AF9F70D0092880AD07778B09083A9FE679E019E
3,272,568 UART: [art] SIG.S = A8F1785DCBC364578D2DF75B5445B25363D6BECC97A3D55B985F99C1AA4CBABFD084F6038056E99E2853AE128BFAB181
3,296,042 UART: Caliptra RT
3,296,295 UART: [state] CFI Enabled
3,403,944 UART: [rt] RT listening for mailbox commands...
3,404,614 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,456 UART: [rt]cmd =0x44504543, len=40
3,460,462 >>> mbox cmd response data (40 bytes)
3,460,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,430 UART: [rt]cmd =0x44504543, len=96
3,530,438 >>> mbox cmd response data (56 bytes)
3,530,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,488 UART: [rt]cmd =0x44504543, len=96
3,601,043 >>> mbox cmd response data (56 bytes)
3,601,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,863 UART: [rt]cmd =0x44504543, len=96
3,671,408 >>> mbox cmd response data (56 bytes)
3,671,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,216 UART: [rt]cmd =0x44504543, len=96
3,742,175 >>> mbox cmd response data (56 bytes)
3,742,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,005 UART: [rt]cmd =0x44504543, len=96
3,813,944 >>> mbox cmd response data (56 bytes)
3,813,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,106 UART: [rt]cmd =0x44504543, len=96
3,885,737 >>> mbox cmd response data (56 bytes)
3,885,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,993 UART: [rt]cmd =0x44504543, len=96
3,957,346 >>> mbox cmd response data (56 bytes)
3,957,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,987,240 UART: [rt]cmd =0x44504543, len=96
4,029,197 >>> mbox cmd response data (56 bytes)
4,029,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,059,163 UART: [rt]cmd =0x44504543, len=96
4,101,886 >>> mbox cmd response data (56 bytes)
4,101,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,131,680 UART: [rt]cmd =0x44504543, len=96
4,174,355 >>> mbox cmd response data (56 bytes)
4,174,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,204,297 UART: [rt]cmd =0x44504543, len=96
4,247,590 >>> mbox cmd response data (56 bytes)
4,247,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,277,512 UART: [rt]cmd =0x44504543, len=96
4,320,827 >>> mbox cmd response data (56 bytes)
4,320,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,350,803 UART: [rt]cmd =0x44504543, len=96
4,394,722 >>> mbox cmd response data (56 bytes)
4,394,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,424,620 UART: [rt]cmd =0x44504543, len=96
4,469,141 >>> mbox cmd response data (56 bytes)
4,469,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,499,077 UART: [rt]cmd =0x44504543, len=96
4,542,220 >>> mbox cmd response data (56 bytes)
4,542,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,572,152 UART: [rt]cmd =0x44504543, len=96
4,579,262 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,301 UART: [kat] SHA2-512-ACC
897,202 UART: [kat] ECC-384
902,667 UART: [kat] HMAC-384Kdf
907,315 UART: [kat] LMS
1,475,511 UART: [kat] --
1,476,540 UART: [cold-reset] ++
1,476,870 UART: [fht] Storing FHT @ 0x50003400
1,479,809 UART: [idev] ++
1,479,977 UART: [idev] CDI.KEYID = 6
1,480,337 UART: [idev] SUBJECT.KEYID = 7
1,480,761 UART: [idev] UDS.KEYID = 0
1,481,106 ready_for_fw is high
1,481,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,643 UART: [idev] Erasing UDS.KEYID = 0
1,505,595 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,255 UART: [idev] --
1,515,250 UART: [ldev] ++
1,515,418 UART: [ldev] CDI.KEYID = 6
1,515,781 UART: [ldev] SUBJECT.KEYID = 5
1,516,207 UART: [ldev] AUTHORITY.KEYID = 7
1,516,670 UART: [ldev] FE.KEYID = 1
1,521,620 UART: [ldev] Erasing FE.KEYID = 1
1,547,201 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,951 UART: [ldev] --
1,586,306 UART: [fwproc] Waiting for Commands...
1,586,971 UART: [fwproc] Received command 0x46574c44
1,587,762 UART: [fwproc] Received Image of size 114448 bytes
2,887,717 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,485 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,837 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,754 >>> mbox cmd response: success
3,081,958 UART: [afmc] ++
3,082,126 UART: [afmc] CDI.KEYID = 6
3,082,488 UART: [afmc] SUBJECT.KEYID = 7
3,082,913 UART: [afmc] AUTHORITY.KEYID = 5
3,118,334 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,122 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,735 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,425 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,368 UART: [afmc] --
3,161,252 UART: [cold-reset] --
3,162,156 UART: [state] Locking Datavault
3,163,271 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,875 UART: [state] Locking ICCM
3,164,501 UART: [exit] Launching FMC @ 0x40000130
3,169,830 UART:
3,169,846 UART: Running Caliptra FMC ...
3,170,254 UART:
3,170,397 UART: [state] CFI Enabled
3,181,108 UART: [fht] FMC Alias Private Key: 7
3,288,531 UART: [art] Extend RT PCRs Done
3,288,959 UART: [art] Lock RT PCRs Done
3,290,451 UART: [art] Populate DV Done
3,298,852 UART: [fht] FMC Alias Private Key: 7
3,300,034 UART: [art] Derive CDI
3,300,314 UART: [art] Store in in slot 0x4
3,385,891 UART: [art] Derive Key Pair
3,386,251 UART: [art] Store priv key in slot 0x5
3,399,185 UART: [art] Derive Key Pair - Done
3,413,565 UART: [art] Signing Cert with AUTHO
3,414,045 UART: RITY.KEYID = 7
3,429,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,816 UART: [art] PUB.X = CB6B02C8D3654ADFE3A47DDC0928DF2A8C52F14A19B5A5A8B0CACABFAE51F94AE63766DCA5821F4E2C0DA337F385A9AA
3,436,607 UART: [art] PUB.Y = 696F907585C67A6C593C415735C9F84E81EB0771BB48665E0F9EC29EB120C7B70969C888D6821E74766D20178A30872F
3,443,538 UART: [art] SIG.R = 759341E9CE2E502DE71E4742FBFC04A41B60CAFFC07F44BEC404D64767FDBF3F7AD142AA8F3921BA10E81F9BDE8835BA
3,450,324 UART: [art] SIG.S = 152207C153F7F1FFD7F9338ED1B985256335E8AD669425C07AA0AE1C3612C444438F4ED156AB1425FED217353774DCCD
3,474,388 UART: Caliptra RT
3,474,733 UART: [state] CFI Enabled
3,583,205 UART: [rt] RT listening for mailbox commands...
3,583,875 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,965 UART: [rt]cmd =0x44504543, len=40
3,640,297 >>> mbox cmd response data (40 bytes)
3,640,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,670,015 UART: [rt]cmd =0x44504543, len=96
3,710,189 >>> mbox cmd response data (56 bytes)
3,710,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,043 UART: [rt]cmd =0x44504543, len=96
3,780,866 >>> mbox cmd response data (56 bytes)
3,780,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,894 UART: [rt]cmd =0x44504543, len=96
3,851,875 >>> mbox cmd response data (56 bytes)
3,851,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,665 UART: [rt]cmd =0x44504543, len=96
3,922,956 >>> mbox cmd response data (56 bytes)
3,922,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,720 UART: [rt]cmd =0x44504543, len=96
3,994,281 >>> mbox cmd response data (56 bytes)
3,994,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,024,229 UART: [rt]cmd =0x44504543, len=96
4,066,038 >>> mbox cmd response data (56 bytes)
4,066,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,184 UART: [rt]cmd =0x44504543, len=96
4,138,149 >>> mbox cmd response data (56 bytes)
4,138,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,221 UART: [rt]cmd =0x44504543, len=96
4,210,364 >>> mbox cmd response data (56 bytes)
4,210,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,240,318 UART: [rt]cmd =0x44504543, len=96
4,282,851 >>> mbox cmd response data (56 bytes)
4,282,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,313,017 UART: [rt]cmd =0x44504543, len=96
4,355,994 >>> mbox cmd response data (56 bytes)
4,355,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,385,886 UART: [rt]cmd =0x44504543, len=96
4,428,935 >>> mbox cmd response data (56 bytes)
4,428,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,458,863 UART: [rt]cmd =0x44504543, len=96
4,503,590 >>> mbox cmd response data (56 bytes)
4,503,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,533,632 UART: [rt]cmd =0x44504543, len=96
4,577,555 >>> mbox cmd response data (56 bytes)
4,577,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,607,401 UART: [rt]cmd =0x44504543, len=96
4,651,890 >>> mbox cmd response data (56 bytes)
4,651,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,681,700 UART: [rt]cmd =0x44504543, len=96
4,724,941 >>> mbox cmd response data (56 bytes)
4,724,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,754,743 UART: [rt]cmd =0x44504543, len=96
4,762,311 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,692 ready_for_fw is high
1,362,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,960 >>> mbox cmd response: success
2,991,830 UART:
2,991,846 UART: Running Caliptra FMC ...
2,992,254 UART:
2,992,397 UART: [state] CFI Enabled
3,003,016 UART: [fht] FMC Alias Private Key: 7
3,110,547 UART: [art] Extend RT PCRs Done
3,110,975 UART: [art] Lock RT PCRs Done
3,112,769 UART: [art] Populate DV Done
3,121,236 UART: [fht] FMC Alias Private Key: 7
3,122,268 UART: [art] Derive CDI
3,122,548 UART: [art] Store in in slot 0x4
3,208,781 UART: [art] Derive Key Pair
3,209,141 UART: [art] Store priv key in slot 0x5
3,222,405 UART: [art] Derive Key Pair - Done
3,237,035 UART: [art] Signing Cert with AUTHO
3,237,515 UART: RITY.KEYID = 7
3,253,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,928 UART: [art] PUB.X = 16767AA9CC4E78D2039669C202E9EAB5D7BC506D1AAEF91486992FBCD940A6486AF35FCDF4A19B89E329A24FFBB37A8F
3,260,710 UART: [art] PUB.Y = 85C73A8EABFB1A00C2B352072A5E27C2DCEF624D20D7FD331FA37A97C406853A27B666A490E29F61AE9053E1DB872157
3,267,640 UART: [art] SIG.R = 7DD8EF44872D18F31A7DF5548496C8483762D8707E71F2775AFEBAFAF3F548A2FE0B8F0A27175C9A233B78B75770F101
3,274,405 UART: [art] SIG.S = B498696E13CDDD7BE7A32DC85D0509B829A883D56184BF7C8B210769981CEE6429FC2FB3A339460FF2C7CB8CD4BC4855
3,297,522 UART: Caliptra RT
3,297,867 UART: [state] CFI Enabled
3,405,582 UART: [rt] RT listening for mailbox commands...
3,406,252 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,382 UART: [rt]cmd =0x44504543, len=40
3,462,408 >>> mbox cmd response data (40 bytes)
3,462,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,412 UART: [rt]cmd =0x44504543, len=96
3,532,436 >>> mbox cmd response data (56 bytes)
3,532,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,502 UART: [rt]cmd =0x44504543, len=96
3,603,711 >>> mbox cmd response data (56 bytes)
3,603,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,603 UART: [rt]cmd =0x44504543, len=96
3,674,432 >>> mbox cmd response data (56 bytes)
3,674,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,086 UART: [rt]cmd =0x44504543, len=96
3,745,059 >>> mbox cmd response data (56 bytes)
3,745,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,101 UART: [rt]cmd =0x44504543, len=96
3,817,394 >>> mbox cmd response data (56 bytes)
3,817,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,847,252 UART: [rt]cmd =0x44504543, len=96
3,889,203 >>> mbox cmd response data (56 bytes)
3,889,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,303 UART: [rt]cmd =0x44504543, len=96
3,960,760 >>> mbox cmd response data (56 bytes)
3,960,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,600 UART: [rt]cmd =0x44504543, len=96
4,033,037 >>> mbox cmd response data (56 bytes)
4,033,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,063,003 UART: [rt]cmd =0x44504543, len=96
4,105,882 >>> mbox cmd response data (56 bytes)
4,105,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,135,896 UART: [rt]cmd =0x44504543, len=96
4,179,433 >>> mbox cmd response data (56 bytes)
4,179,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,209,497 UART: [rt]cmd =0x44504543, len=96
4,253,130 >>> mbox cmd response data (56 bytes)
4,253,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,282,788 UART: [rt]cmd =0x44504543, len=96
4,326,253 >>> mbox cmd response data (56 bytes)
4,326,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,356,433 UART: [rt]cmd =0x44504543, len=96
4,400,106 >>> mbox cmd response data (56 bytes)
4,400,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,430,190 UART: [rt]cmd =0x44504543, len=96
4,473,947 >>> mbox cmd response data (56 bytes)
4,473,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,503,911 UART: [rt]cmd =0x44504543, len=96
4,548,660 >>> mbox cmd response data (56 bytes)
4,548,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,578,672 UART: [rt]cmd =0x44504543, len=96
4,585,868 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
893,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,643 UART: [kat] ++
897,795 UART: [kat] sha1
901,915 UART: [kat] SHA2-256
903,855 UART: [kat] SHA2-384
906,626 UART: [kat] SHA2-512-ACC
908,527 UART: [kat] ECC-384
918,136 UART: [kat] HMAC-384Kdf
922,706 UART: [kat] LMS
1,171,034 UART: [kat] --
1,171,885 UART: [cold-reset] ++
1,172,397 UART: [fht] FHT @ 0x50003400
1,175,098 UART: [idev] ++
1,175,266 UART: [idev] CDI.KEYID = 6
1,175,626 UART: [idev] SUBJECT.KEYID = 7
1,176,050 UART: [idev] UDS.KEYID = 0
1,176,395 ready_for_fw is high
1,176,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,840 UART: [idev] Erasing UDS.KEYID = 0
1,200,967 UART: [idev] Sha1 KeyId Algorithm
1,209,619 UART: [idev] --
1,210,607 UART: [ldev] ++
1,210,775 UART: [ldev] CDI.KEYID = 6
1,211,138 UART: [ldev] SUBJECT.KEYID = 5
1,211,564 UART: [ldev] AUTHORITY.KEYID = 7
1,212,027 UART: [ldev] FE.KEYID = 1
1,217,173 UART: [ldev] Erasing FE.KEYID = 1
1,242,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,523 UART: [ldev] --
1,281,994 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x46574c44
1,283,344 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,798 >>> mbox cmd response: success
2,776,860 UART: [afmc] ++
2,777,028 UART: [afmc] CDI.KEYID = 6
2,777,390 UART: [afmc] SUBJECT.KEYID = 7
2,777,815 UART: [afmc] AUTHORITY.KEYID = 5
2,814,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,127 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,855 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,740 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,459 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,287 UART: [afmc] --
2,857,259 UART: [cold-reset] --
2,858,093 UART: [state] Locking Datavault
2,859,354 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,958 UART: [state] Locking ICCM
2,860,492 UART: [exit] Launching FMC @ 0x40000130
2,865,821 UART:
2,865,837 UART: Running Caliptra FMC ...
2,866,245 UART:
2,866,299 UART: [state] CFI Enabled
2,876,856 UART: [fht] FMC Alias Private Key: 7
2,984,549 UART: [art] Extend RT PCRs Done
2,984,977 UART: [art] Lock RT PCRs Done
2,986,563 UART: [art] Populate DV Done
2,994,914 UART: [fht] FMC Alias Private Key: 7
2,995,964 UART: [art] Derive CDI
2,996,244 UART: [art] Store in in slot 0x4
3,081,723 UART: [art] Derive Key Pair
3,082,083 UART: [art] Store priv key in slot 0x5
3,095,769 UART: [art] Derive Key Pair - Done
3,110,328 UART: [art] Signing Cert with AUTHO
3,110,808 UART: RITY.KEYID = 7
3,125,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,707 UART: [art] PUB.X = 5DFEB78224580C5251801D96EB5F257473F6D5B0755EDC7769B5A7FA72C285B116FEB3F9630D0C30A8752092D4C4622D
3,133,468 UART: [art] PUB.Y = AE3E2044264AB9C1477367BEB8D20B255A709532E2205BEB042D0418D45DD2418FA51C7F65D74685ADDB6FC0F85318B1
3,140,413 UART: [art] SIG.R = 7B20B457CFBAD7760F9E85A25B2A4E0AF9B83A99412BEF06C8C4E58177389EEA31A0A9C934A5993A687905095B44C975
3,147,172 UART: [art] SIG.S = A99BBFC2BF96E98FD070DA37CB1AACB564448A10EC26416F24868CF800211449178251766A3D01097B35A70F1D261464
3,170,794 UART: Caliptra RT
3,171,047 UART: [state] CFI Enabled
3,278,948 UART: [rt] RT listening for mailbox commands...
3,279,618 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,694 UART: [rt]cmd =0x44504543, len=40
3,336,242 >>> mbox cmd response data (40 bytes)
3,336,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,190 UART: [rt]cmd =0x44504543, len=96
3,405,952 >>> mbox cmd response data (56 bytes)
3,405,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,756 UART: [rt]cmd =0x44504543, len=96
3,476,445 >>> mbox cmd response data (56 bytes)
3,476,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,187 UART: [rt]cmd =0x44504543, len=96
3,547,580 >>> mbox cmd response data (56 bytes)
3,547,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,704 UART: [rt]cmd =0x44504543, len=96
3,618,845 >>> mbox cmd response data (56 bytes)
3,618,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,805 UART: [rt]cmd =0x44504543, len=96
3,690,518 >>> mbox cmd response data (56 bytes)
3,690,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,592 UART: [rt]cmd =0x44504543, len=96
3,762,241 >>> mbox cmd response data (56 bytes)
3,762,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,145 UART: [rt]cmd =0x44504543, len=96
3,833,602 >>> mbox cmd response data (56 bytes)
3,833,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,412 UART: [rt]cmd =0x44504543, len=96
3,905,941 >>> mbox cmd response data (56 bytes)
3,905,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,889 UART: [rt]cmd =0x44504543, len=96
3,978,868 >>> mbox cmd response data (56 bytes)
3,978,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,008,800 UART: [rt]cmd =0x44504543, len=96
4,052,589 >>> mbox cmd response data (56 bytes)
4,052,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,753 UART: [rt]cmd =0x44504543, len=96
4,125,472 >>> mbox cmd response data (56 bytes)
4,125,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,155,374 UART: [rt]cmd =0x44504543, len=96
4,198,951 >>> mbox cmd response data (56 bytes)
4,198,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,228,977 UART: [rt]cmd =0x44504543, len=96
4,272,624 >>> mbox cmd response data (56 bytes)
4,272,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,302,618 UART: [rt]cmd =0x44504543, len=96
4,346,537 >>> mbox cmd response data (56 bytes)
4,346,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,376,509 UART: [rt]cmd =0x44504543, len=96
4,421,134 >>> mbox cmd response data (56 bytes)
4,421,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,451,028 UART: [rt]cmd =0x44504543, len=96
4,458,414 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,365 ready_for_fw is high
1,061,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,917 >>> mbox cmd response: success
2,689,451 UART:
2,689,467 UART: Running Caliptra FMC ...
2,689,875 UART:
2,689,929 UART: [state] CFI Enabled
2,700,022 UART: [fht] FMC Alias Private Key: 7
2,807,967 UART: [art] Extend RT PCRs Done
2,808,395 UART: [art] Lock RT PCRs Done
2,810,319 UART: [art] Populate DV Done
2,818,388 UART: [fht] FMC Alias Private Key: 7
2,819,370 UART: [art] Derive CDI
2,819,650 UART: [art] Store in in slot 0x4
2,905,011 UART: [art] Derive Key Pair
2,905,371 UART: [art] Store priv key in slot 0x5
2,917,759 UART: [art] Derive Key Pair - Done
2,932,728 UART: [art] Signing Cert with AUTHO
2,933,208 UART: RITY.KEYID = 7
2,948,294 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,059 UART: [art] PUB.X = 0E2192BDCF5835E77B556F64F4B69B4F840843F76683F9E6E0950334EF41D565C5AEA6531EE31F9AA40DDA3292C147FB
2,955,823 UART: [art] PUB.Y = B794245BCE5CAC051D94A70C5C7915A400FE0BB6EE3C4AF8CE3FB1331D64D179028AA2782ABFF757EA8E966FAA4B2CA0
2,962,761 UART: [art] SIG.R = 34AD9134228A3FAE75EF090B0034B466E2AC561A0DF3FE8BC6FF9A11417EF2C0A3247B0A597711A9652EC1B49B7AAD3F
2,969,511 UART: [art] SIG.S = 8A55F51656505995A505AE9CD93C3F55E6E7731BC31623F89BCA92CE869AEC0D1BAD5BDA21A177A19E25C511E04DA525
2,993,080 UART: Caliptra RT
2,993,333 UART: [state] CFI Enabled
3,101,820 UART: [rt] RT listening for mailbox commands...
3,102,490 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,526 UART: [rt]cmd =0x44504543, len=40
3,159,022 >>> mbox cmd response data (40 bytes)
3,159,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,856 UART: [rt]cmd =0x44504543, len=96
3,228,876 >>> mbox cmd response data (56 bytes)
3,228,877 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,259,122 UART: [rt]cmd =0x44504543, len=96
3,300,245 >>> mbox cmd response data (56 bytes)
3,300,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,299 UART: [rt]cmd =0x44504543, len=96
3,371,118 >>> mbox cmd response data (56 bytes)
3,371,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,110 UART: [rt]cmd =0x44504543, len=96
3,442,179 >>> mbox cmd response data (56 bytes)
3,442,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,225 UART: [rt]cmd =0x44504543, len=96
3,513,332 >>> mbox cmd response data (56 bytes)
3,513,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,258 UART: [rt]cmd =0x44504543, len=96
3,584,863 >>> mbox cmd response data (56 bytes)
3,584,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,671 UART: [rt]cmd =0x44504543, len=96
3,656,284 >>> mbox cmd response data (56 bytes)
3,656,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,124 UART: [rt]cmd =0x44504543, len=96
3,728,253 >>> mbox cmd response data (56 bytes)
3,728,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,371 UART: [rt]cmd =0x44504543, len=96
3,800,592 >>> mbox cmd response data (56 bytes)
3,800,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,480 UART: [rt]cmd =0x44504543, len=96
3,873,227 >>> mbox cmd response data (56 bytes)
3,873,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,903,031 UART: [rt]cmd =0x44504543, len=96
3,946,142 >>> mbox cmd response data (56 bytes)
3,946,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,904 UART: [rt]cmd =0x44504543, len=96
4,019,553 >>> mbox cmd response data (56 bytes)
4,019,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,049,333 UART: [rt]cmd =0x44504543, len=96
4,092,948 >>> mbox cmd response data (56 bytes)
4,092,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,122,930 UART: [rt]cmd =0x44504543, len=96
4,167,223 >>> mbox cmd response data (56 bytes)
4,167,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,349 UART: [rt]cmd =0x44504543, len=96
4,241,690 >>> mbox cmd response data (56 bytes)
4,241,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,610 UART: [rt]cmd =0x44504543, len=96
4,278,808 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
87,028 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
894,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,158 UART: [kat] ++
898,310 UART: [kat] sha1
902,632 UART: [kat] SHA2-256
904,572 UART: [kat] SHA2-384
907,243 UART: [kat] SHA2-512-ACC
909,144 UART: [kat] ECC-384
918,519 UART: [kat] HMAC-384Kdf
923,381 UART: [kat] LMS
1,171,709 UART: [kat] --
1,172,762 UART: [cold-reset] ++
1,173,130 UART: [fht] FHT @ 0x50003400
1,175,789 UART: [idev] ++
1,175,957 UART: [idev] CDI.KEYID = 6
1,176,317 UART: [idev] SUBJECT.KEYID = 7
1,176,741 UART: [idev] UDS.KEYID = 0
1,177,086 ready_for_fw is high
1,177,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,517 UART: [idev] Erasing UDS.KEYID = 0
1,201,600 UART: [idev] Sha1 KeyId Algorithm
1,209,864 UART: [idev] --
1,210,932 UART: [ldev] ++
1,211,100 UART: [ldev] CDI.KEYID = 6
1,211,463 UART: [ldev] SUBJECT.KEYID = 5
1,211,889 UART: [ldev] AUTHORITY.KEYID = 7
1,212,352 UART: [ldev] FE.KEYID = 1
1,217,380 UART: [ldev] Erasing FE.KEYID = 1
1,243,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,282 UART: [ldev] --
1,282,791 UART: [fwproc] Wait for Commands...
1,283,587 UART: [fwproc] Recv command 0x46574c44
1,284,315 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,177 >>> mbox cmd response: success
2,776,231 UART: [afmc] ++
2,776,399 UART: [afmc] CDI.KEYID = 6
2,776,761 UART: [afmc] SUBJECT.KEYID = 7
2,777,186 UART: [afmc] AUTHORITY.KEYID = 5
2,812,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,306 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,919 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,310 UART: [afmc] --
2,856,232 UART: [cold-reset] --
2,857,246 UART: [state] Locking Datavault
2,858,529 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,133 UART: [state] Locking ICCM
2,859,713 UART: [exit] Launching FMC @ 0x40000130
2,865,042 UART:
2,865,058 UART: Running Caliptra FMC ...
2,865,466 UART:
2,865,609 UART: [state] CFI Enabled
2,876,190 UART: [fht] FMC Alias Private Key: 7
2,983,563 UART: [art] Extend RT PCRs Done
2,983,991 UART: [art] Lock RT PCRs Done
2,985,593 UART: [art] Populate DV Done
2,993,818 UART: [fht] FMC Alias Private Key: 7
2,994,764 UART: [art] Derive CDI
2,995,044 UART: [art] Store in in slot 0x4
3,080,611 UART: [art] Derive Key Pair
3,080,971 UART: [art] Store priv key in slot 0x5
3,094,821 UART: [art] Derive Key Pair - Done
3,109,818 UART: [art] Signing Cert with AUTHO
3,110,298 UART: RITY.KEYID = 7
3,125,438 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,203 UART: [art] PUB.X = 16535BBE05FAE1E65EE5F65661F5D879CFB480BD734BADEF84DE42F2BC3F61D81DC9C8016162F0DEDB9787D7843F3577
3,132,983 UART: [art] PUB.Y = 3D3E465378F161BE6D6C65B49E57BF5E36F345A56AAB064A4C7E0DD9EC3FDDFE9EAB259114F4FB805A7178BF5652D87C
3,139,945 UART: [art] SIG.R = 8525B3ED60B08699910D95FDD572DCB593C7FF32AA80C024C519E7CC425004A318F54F9936750AF00D2357A9EA58841E
3,146,703 UART: [art] SIG.S = 32BB9DEA4811CE97B13B8A268CDA7887EFA18B2DC920B9936917C2F2CD1F3559C97AEC16E46A711D0168F962AB2E5336
3,170,291 UART: Caliptra RT
3,170,636 UART: [state] CFI Enabled
3,278,617 UART: [rt] RT listening for mailbox commands...
3,279,287 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,335 UART: [rt]cmd =0x44504543, len=40
3,335,293 >>> mbox cmd response data (40 bytes)
3,335,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,291 UART: [rt]cmd =0x44504543, len=96
3,405,251 >>> mbox cmd response data (56 bytes)
3,405,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,335 UART: [rt]cmd =0x44504543, len=96
3,476,256 >>> mbox cmd response data (56 bytes)
3,476,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,190 UART: [rt]cmd =0x44504543, len=96
3,547,341 >>> mbox cmd response data (56 bytes)
3,547,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,335 UART: [rt]cmd =0x44504543, len=96
3,618,022 >>> mbox cmd response data (56 bytes)
3,618,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,952 UART: [rt]cmd =0x44504543, len=96
3,689,769 >>> mbox cmd response data (56 bytes)
3,689,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,719,601 UART: [rt]cmd =0x44504543, len=96
3,761,072 >>> mbox cmd response data (56 bytes)
3,761,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,810 UART: [rt]cmd =0x44504543, len=96
3,833,435 >>> mbox cmd response data (56 bytes)
3,833,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,437 UART: [rt]cmd =0x44504543, len=96
3,906,020 >>> mbox cmd response data (56 bytes)
3,906,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,880 UART: [rt]cmd =0x44504543, len=96
3,978,349 >>> mbox cmd response data (56 bytes)
3,978,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,008,195 UART: [rt]cmd =0x44504543, len=96
4,051,636 >>> mbox cmd response data (56 bytes)
4,051,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,081,652 UART: [rt]cmd =0x44504543, len=96
4,124,545 >>> mbox cmd response data (56 bytes)
4,124,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,154,433 UART: [rt]cmd =0x44504543, len=96
4,197,600 >>> mbox cmd response data (56 bytes)
4,197,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,227,614 UART: [rt]cmd =0x44504543, len=96
4,271,155 >>> mbox cmd response data (56 bytes)
4,271,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,300,895 UART: [rt]cmd =0x44504543, len=96
4,344,372 >>> mbox cmd response data (56 bytes)
4,344,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,308 UART: [rt]cmd =0x44504543, len=96
4,419,049 >>> mbox cmd response data (56 bytes)
4,419,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,448,805 UART: [rt]cmd =0x44504543, len=96
4,455,933 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,478 ready_for_fw is high
1,060,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,462 >>> mbox cmd response: success
2,690,910 UART:
2,690,926 UART: Running Caliptra FMC ...
2,691,334 UART:
2,691,477 UART: [state] CFI Enabled
2,702,328 UART: [fht] FMC Alias Private Key: 7
2,810,001 UART: [art] Extend RT PCRs Done
2,810,429 UART: [art] Lock RT PCRs Done
2,812,155 UART: [art] Populate DV Done
2,820,438 UART: [fht] FMC Alias Private Key: 7
2,821,520 UART: [art] Derive CDI
2,821,800 UART: [art] Store in in slot 0x4
2,907,595 UART: [art] Derive Key Pair
2,907,955 UART: [art] Store priv key in slot 0x5
2,921,431 UART: [art] Derive Key Pair - Done
2,936,607 UART: [art] Signing Cert with AUTHO
2,937,087 UART: RITY.KEYID = 7
2,951,925 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,690 UART: [art] PUB.X = E95643026360B58D85A4B3F89223F861AA7FD3640E0F9FEE7928EE721751D3E59A6CD93958A324087A807D9A4AF92FD1
2,959,448 UART: [art] PUB.Y = 5BFA4E72A141F095BE3059513FA22DFF81823D5706B5C2E946C7061B15266ACD2B38CA648401AAA4CE1D76C9F3821E43
2,966,395 UART: [art] SIG.R = 5AC5B505020B20F6E69E8FE955DC8A64367647986ADEB0E308773D26E544AF6755CAF5C38701261C449642A8C293772B
2,973,146 UART: [art] SIG.S = 1EDA84B803CD08A57A69414CC92DC0D1DA5394C516B194036E07D296D1D07F0B9167578466C13FA12C0A2E51D717C981
2,997,097 UART: Caliptra RT
2,997,442 UART: [state] CFI Enabled
3,104,423 UART: [rt] RT listening for mailbox commands...
3,105,093 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,991 UART: [rt]cmd =0x44504543, len=40
3,161,065 >>> mbox cmd response data (40 bytes)
3,161,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,865 UART: [rt]cmd =0x44504543, len=96
3,231,409 >>> mbox cmd response data (56 bytes)
3,231,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,261,267 UART: [rt]cmd =0x44504543, len=96
3,301,872 >>> mbox cmd response data (56 bytes)
3,301,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,756 UART: [rt]cmd =0x44504543, len=96
3,373,195 >>> mbox cmd response data (56 bytes)
3,373,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,981 UART: [rt]cmd =0x44504543, len=96
3,443,830 >>> mbox cmd response data (56 bytes)
3,443,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,838 UART: [rt]cmd =0x44504543, len=96
3,515,633 >>> mbox cmd response data (56 bytes)
3,515,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,801 UART: [rt]cmd =0x44504543, len=96
3,587,220 >>> mbox cmd response data (56 bytes)
3,587,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,356 UART: [rt]cmd =0x44504543, len=96
3,659,359 >>> mbox cmd response data (56 bytes)
3,659,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,409 UART: [rt]cmd =0x44504543, len=96
3,732,020 >>> mbox cmd response data (56 bytes)
3,732,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,932 UART: [rt]cmd =0x44504543, len=96
3,804,883 >>> mbox cmd response data (56 bytes)
3,804,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,751 UART: [rt]cmd =0x44504543, len=96
3,877,038 >>> mbox cmd response data (56 bytes)
3,877,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,906,786 UART: [rt]cmd =0x44504543, len=96
3,950,315 >>> mbox cmd response data (56 bytes)
3,950,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,980,355 UART: [rt]cmd =0x44504543, len=96
4,023,596 >>> mbox cmd response data (56 bytes)
4,023,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,053,688 UART: [rt]cmd =0x44504543, len=96
4,097,201 >>> mbox cmd response data (56 bytes)
4,097,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,126,869 UART: [rt]cmd =0x44504543, len=96
4,171,300 >>> mbox cmd response data (56 bytes)
4,171,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,201,040 UART: [rt]cmd =0x44504543, len=96
4,245,961 >>> mbox cmd response data (56 bytes)
4,245,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,275,879 UART: [rt]cmd =0x44504543, len=96
4,283,113 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,460 UART: [kat] HMAC-384Kdf
921,134 UART: [kat] LMS
1,169,446 UART: [kat] --
1,170,093 UART: [cold-reset] ++
1,170,643 UART: [fht] FHT @ 0x50003400
1,173,271 UART: [idev] ++
1,173,439 UART: [idev] CDI.KEYID = 6
1,173,800 UART: [idev] SUBJECT.KEYID = 7
1,174,225 UART: [idev] UDS.KEYID = 0
1,174,571 ready_for_fw is high
1,174,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,151 UART: [idev] Erasing UDS.KEYID = 0
1,199,227 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,209,172 UART: [ldev] ++
1,209,340 UART: [ldev] CDI.KEYID = 6
1,209,704 UART: [ldev] SUBJECT.KEYID = 5
1,210,131 UART: [ldev] AUTHORITY.KEYID = 7
1,210,594 UART: [ldev] FE.KEYID = 1
1,215,978 UART: [ldev] Erasing FE.KEYID = 1
1,242,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,156 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,031 UART: [fwproc] Recv command 0x46574c44
1,282,764 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,782 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,726 >>> mbox cmd response: success
2,775,951 UART: [afmc] ++
2,776,119 UART: [afmc] CDI.KEYID = 6
2,776,482 UART: [afmc] SUBJECT.KEYID = 7
2,776,908 UART: [afmc] AUTHORITY.KEYID = 5
2,812,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,522 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,134 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,853 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,834 UART: [afmc] --
2,855,848 UART: [cold-reset] --
2,856,796 UART: [state] Locking Datavault
2,858,035 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,639 UART: [state] Locking ICCM
2,859,155 UART: [exit] Launching FMC @ 0x40000130
2,864,484 UART:
2,864,500 UART: Running Caliptra FMC ...
2,864,908 UART:
2,864,962 UART: [state] CFI Enabled
2,875,289 UART: [fht] FMC Alias Private Key: 7
2,982,978 UART: [art] Extend RT PCRs Done
2,983,406 UART: [art] Lock RT PCRs Done
2,984,524 UART: [art] Populate DV Done
2,992,695 UART: [fht] FMC Alias Private Key: 7
2,993,773 UART: [art] Derive CDI
2,994,053 UART: [art] Store in in slot 0x4
3,079,692 UART: [art] Derive Key Pair
3,080,052 UART: [art] Store priv key in slot 0x5
3,093,380 UART: [art] Derive Key Pair - Done
3,108,457 UART: [art] Signing Cert with AUTHO
3,108,937 UART: RITY.KEYID = 7
3,123,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,718 UART: [art] PUB.X = 1C7F2C60CC7E80EBD8DEE8A626BEBF63CCF6D67DDA69141968AC815483DA40C3B65C30811B352039FF77308D42CC20AD
3,131,504 UART: [art] PUB.Y = B425370949B7CDDB26E6174D1F00CF94C8DF51E4E8092F4A99AD99F17D46C9E7792AD93764F459991E247CFFCD58F504
3,138,429 UART: [art] SIG.R = F9DD0D975549474A4235D9748C642180BD8C70DFBF8CBFA2830A94A2E579B88580EA97FC9690F8CD3884F9C803E64CB5
3,145,196 UART: [art] SIG.S = 83013735D20421CBED73800EB1890048D8854F9CA20509040211E5086AF13FE8945C00E9E9707A9DFA28B3D408840FCD
3,169,067 UART: Caliptra RT
3,169,320 UART: [state] CFI Enabled
3,276,042 UART: [rt] RT listening for mailbox commands...
3,276,712 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,742 UART: [rt]cmd =0x44504543, len=40
3,332,482 >>> mbox cmd response data (40 bytes)
3,332,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,632 UART: [rt]cmd =0x44504543, len=96
3,402,034 >>> mbox cmd response data (56 bytes)
3,402,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,048 UART: [rt]cmd =0x44504543, len=96
3,472,291 >>> mbox cmd response data (56 bytes)
3,472,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,169 UART: [rt]cmd =0x44504543, len=96
3,542,884 >>> mbox cmd response data (56 bytes)
3,542,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,752 UART: [rt]cmd =0x44504543, len=96
3,614,235 >>> mbox cmd response data (56 bytes)
3,614,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,135 UART: [rt]cmd =0x44504543, len=96
3,685,850 >>> mbox cmd response data (56 bytes)
3,685,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,724 UART: [rt]cmd =0x44504543, len=96
3,757,417 >>> mbox cmd response data (56 bytes)
3,757,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,493 UART: [rt]cmd =0x44504543, len=96
3,829,798 >>> mbox cmd response data (56 bytes)
3,829,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,566 UART: [rt]cmd =0x44504543, len=96
3,902,403 >>> mbox cmd response data (56 bytes)
3,902,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,297 UART: [rt]cmd =0x44504543, len=96
3,974,952 >>> mbox cmd response data (56 bytes)
3,974,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,882 UART: [rt]cmd =0x44504543, len=96
4,047,255 >>> mbox cmd response data (56 bytes)
4,047,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,985 UART: [rt]cmd =0x44504543, len=96
4,120,204 >>> mbox cmd response data (56 bytes)
4,120,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,150,060 UART: [rt]cmd =0x44504543, len=96
4,193,453 >>> mbox cmd response data (56 bytes)
4,193,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,253 UART: [rt]cmd =0x44504543, len=96
4,267,514 >>> mbox cmd response data (56 bytes)
4,267,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,297,140 UART: [rt]cmd =0x44504543, len=96
4,340,835 >>> mbox cmd response data (56 bytes)
4,340,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,370,709 UART: [rt]cmd =0x44504543, len=96
4,415,672 >>> mbox cmd response data (56 bytes)
4,415,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,445,688 UART: [rt]cmd =0x44504543, len=96
4,452,688 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,074 ready_for_fw is high
1,056,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,468 >>> mbox cmd response: success
2,685,516 UART:
2,685,532 UART: Running Caliptra FMC ...
2,685,940 UART:
2,685,994 UART: [state] CFI Enabled
2,696,341 UART: [fht] FMC Alias Private Key: 7
2,804,206 UART: [art] Extend RT PCRs Done
2,804,634 UART: [art] Lock RT PCRs Done
2,806,374 UART: [art] Populate DV Done
2,814,681 UART: [fht] FMC Alias Private Key: 7
2,815,725 UART: [art] Derive CDI
2,816,005 UART: [art] Store in in slot 0x4
2,901,762 UART: [art] Derive Key Pair
2,902,122 UART: [art] Store priv key in slot 0x5
2,915,076 UART: [art] Derive Key Pair - Done
2,929,996 UART: [art] Signing Cert with AUTHO
2,930,476 UART: RITY.KEYID = 7
2,945,278 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,043 UART: [art] PUB.X = C8E554B8F81C1F3760975B9F0FFA1F75076D9F4FA3D6B32E096711117CC0DAD3E5E7CE44EF55A7393E9CFDACC9F9753C
2,952,822 UART: [art] PUB.Y = F64B20F9DB649976C70E5827E56CAEF0F621EC109A7BBFC3CCF5F6800D7BC45AF7EA374A10E9A798BFE4DAEA6FA021D6
2,959,792 UART: [art] SIG.R = 9FA04BF8CA61683A6FFDFF2B80402C7507AF2770366C804CE15B0BB6966E54101FB6E0EF7CF55E2108C4822FC40BD4BD
2,966,564 UART: [art] SIG.S = 407A4F1026AD6B031DBA7946D36C4782DF3389F1021B5139BA34D528530C76756BA245E3026804950F66998F30B9E229
2,989,765 UART: Caliptra RT
2,990,018 UART: [state] CFI Enabled
3,097,937 UART: [rt] RT listening for mailbox commands...
3,098,607 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,619 UART: [rt]cmd =0x44504543, len=40
3,154,949 >>> mbox cmd response data (40 bytes)
3,154,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,915 UART: [rt]cmd =0x44504543, len=96
3,225,135 >>> mbox cmd response data (56 bytes)
3,225,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,254,973 UART: [rt]cmd =0x44504543, len=96
3,295,294 >>> mbox cmd response data (56 bytes)
3,295,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,198 UART: [rt]cmd =0x44504543, len=96
3,366,261 >>> mbox cmd response data (56 bytes)
3,366,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,251 UART: [rt]cmd =0x44504543, len=96
3,437,852 >>> mbox cmd response data (56 bytes)
3,437,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,840 UART: [rt]cmd =0x44504543, len=96
3,509,071 >>> mbox cmd response data (56 bytes)
3,509,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,147 UART: [rt]cmd =0x44504543, len=96
3,580,098 >>> mbox cmd response data (56 bytes)
3,580,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,972 UART: [rt]cmd =0x44504543, len=96
3,652,211 >>> mbox cmd response data (56 bytes)
3,652,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,115 UART: [rt]cmd =0x44504543, len=96
3,723,890 >>> mbox cmd response data (56 bytes)
3,723,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,854 UART: [rt]cmd =0x44504543, len=96
3,795,667 >>> mbox cmd response data (56 bytes)
3,795,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,553 UART: [rt]cmd =0x44504543, len=96
3,868,472 >>> mbox cmd response data (56 bytes)
3,868,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,898,188 UART: [rt]cmd =0x44504543, len=96
3,941,527 >>> mbox cmd response data (56 bytes)
3,941,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,563 UART: [rt]cmd =0x44504543, len=96
4,015,554 >>> mbox cmd response data (56 bytes)
4,015,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,522 UART: [rt]cmd =0x44504543, len=96
4,089,471 >>> mbox cmd response data (56 bytes)
4,089,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,119,327 UART: [rt]cmd =0x44504543, len=96
4,164,056 >>> mbox cmd response data (56 bytes)
4,164,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,930 UART: [rt]cmd =0x44504543, len=96
4,237,615 >>> mbox cmd response data (56 bytes)
4,237,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,267,611 UART: [rt]cmd =0x44504543, len=96
4,274,597 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,803 UART: [state] LifecycleState = Unprovisioned
85,458 UART: [state] DebugLocked = No
86,190 UART: [state] WD Timer not started. Device not locked for debugging
87,529 UART: [kat] SHA2-256
891,079 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,208 UART: [kat] ++
895,360 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,317 UART: [kat] SHA2-512-ACC
906,218 UART: [kat] ECC-384
915,613 UART: [kat] HMAC-384Kdf
920,319 UART: [kat] LMS
1,168,631 UART: [kat] --
1,169,590 UART: [cold-reset] ++
1,170,020 UART: [fht] FHT @ 0x50003400
1,172,662 UART: [idev] ++
1,172,830 UART: [idev] CDI.KEYID = 6
1,173,191 UART: [idev] SUBJECT.KEYID = 7
1,173,616 UART: [idev] UDS.KEYID = 0
1,173,962 ready_for_fw is high
1,173,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,570 UART: [idev] Erasing UDS.KEYID = 0
1,198,570 UART: [idev] Sha1 KeyId Algorithm
1,207,530 UART: [idev] --
1,208,461 UART: [ldev] ++
1,208,629 UART: [ldev] CDI.KEYID = 6
1,208,993 UART: [ldev] SUBJECT.KEYID = 5
1,209,420 UART: [ldev] AUTHORITY.KEYID = 7
1,209,883 UART: [ldev] FE.KEYID = 1
1,215,323 UART: [ldev] Erasing FE.KEYID = 1
1,241,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,815 UART: [ldev] --
1,280,243 UART: [fwproc] Wait for Commands...
1,280,862 UART: [fwproc] Recv command 0x46574c44
1,281,595 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,511 >>> mbox cmd response: success
2,774,574 UART: [afmc] ++
2,774,742 UART: [afmc] CDI.KEYID = 6
2,775,105 UART: [afmc] SUBJECT.KEYID = 7
2,775,531 UART: [afmc] AUTHORITY.KEYID = 5
2,811,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,008 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,610 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,399 UART: [afmc] --
2,854,311 UART: [cold-reset] --
2,855,253 UART: [state] Locking Datavault
2,856,490 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,094 UART: [state] Locking ICCM
2,857,552 UART: [exit] Launching FMC @ 0x40000130
2,862,881 UART:
2,862,897 UART: Running Caliptra FMC ...
2,863,305 UART:
2,863,448 UART: [state] CFI Enabled
2,874,233 UART: [fht] FMC Alias Private Key: 7
2,981,870 UART: [art] Extend RT PCRs Done
2,982,298 UART: [art] Lock RT PCRs Done
2,983,872 UART: [art] Populate DV Done
2,992,217 UART: [fht] FMC Alias Private Key: 7
2,993,229 UART: [art] Derive CDI
2,993,509 UART: [art] Store in in slot 0x4
3,078,982 UART: [art] Derive Key Pair
3,079,342 UART: [art] Store priv key in slot 0x5
3,092,652 UART: [art] Derive Key Pair - Done
3,107,459 UART: [art] Signing Cert with AUTHO
3,107,939 UART: RITY.KEYID = 7
3,123,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,038 UART: [art] PUB.X = 12A2E2AA59902903C629156FB2CD7633C422C2456CC0F1AD07B99D6B1B77DC415B3FF8B32C45F4F0AE12FEB51D616C71
3,130,812 UART: [art] PUB.Y = CB0E7B550D28F11F7360834F5A92C566500A493A9B0786D14205E093CEE6988C3D3D66816D6050650B19ADB0707AF350
3,137,738 UART: [art] SIG.R = FD6274EC9CEA4ABDD8F18310ACBAF0CFD5C44A102011B9A5019E3C7D87F57275C8D26DF701D585EB750CE3B7494C50BA
3,144,519 UART: [art] SIG.S = F05229F18B5A7F8BE18D09D8FE166FACAE8BF1BD359C0DDCBE49FF3FDF8A9F3840B48AD26FA675BB36335D98620F1F19
3,168,113 UART: Caliptra RT
3,168,458 UART: [state] CFI Enabled
3,276,014 UART: [rt] RT listening for mailbox commands...
3,276,684 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,568 UART: [rt]cmd =0x44504543, len=40
3,332,670 >>> mbox cmd response data (40 bytes)
3,332,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,530 UART: [rt]cmd =0x44504543, len=96
3,402,652 >>> mbox cmd response data (56 bytes)
3,402,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,678 UART: [rt]cmd =0x44504543, len=96
3,473,111 >>> mbox cmd response data (56 bytes)
3,473,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,115 UART: [rt]cmd =0x44504543, len=96
3,543,812 >>> mbox cmd response data (56 bytes)
3,543,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,538 UART: [rt]cmd =0x44504543, len=96
3,614,927 >>> mbox cmd response data (56 bytes)
3,614,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,943 UART: [rt]cmd =0x44504543, len=96
3,687,038 >>> mbox cmd response data (56 bytes)
3,687,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,946 UART: [rt]cmd =0x44504543, len=96
3,758,289 >>> mbox cmd response data (56 bytes)
3,758,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,401 UART: [rt]cmd =0x44504543, len=96
3,830,284 >>> mbox cmd response data (56 bytes)
3,830,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,216 UART: [rt]cmd =0x44504543, len=96
3,903,279 >>> mbox cmd response data (56 bytes)
3,903,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,217 UART: [rt]cmd =0x44504543, len=96
3,976,066 >>> mbox cmd response data (56 bytes)
3,976,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,006,208 UART: [rt]cmd =0x44504543, len=96
4,049,645 >>> mbox cmd response data (56 bytes)
4,049,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,079,557 UART: [rt]cmd =0x44504543, len=96
4,122,866 >>> mbox cmd response data (56 bytes)
4,122,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,152,948 UART: [rt]cmd =0x44504543, len=96
4,197,043 >>> mbox cmd response data (56 bytes)
4,197,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,227,295 UART: [rt]cmd =0x44504543, len=96
4,271,492 >>> mbox cmd response data (56 bytes)
4,271,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,301,428 UART: [rt]cmd =0x44504543, len=96
4,345,823 >>> mbox cmd response data (56 bytes)
4,345,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,375,607 UART: [rt]cmd =0x44504543, len=96
4,419,772 >>> mbox cmd response data (56 bytes)
4,419,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,449,888 UART: [rt]cmd =0x44504543, len=96
4,457,304 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,787 ready_for_fw is high
1,055,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,137 >>> mbox cmd response: success
2,686,621 UART:
2,686,637 UART: Running Caliptra FMC ...
2,687,045 UART:
2,687,188 UART: [state] CFI Enabled
2,697,531 UART: [fht] FMC Alias Private Key: 7
2,805,548 UART: [art] Extend RT PCRs Done
2,805,976 UART: [art] Lock RT PCRs Done
2,807,442 UART: [art] Populate DV Done
2,815,621 UART: [fht] FMC Alias Private Key: 7
2,816,739 UART: [art] Derive CDI
2,817,019 UART: [art] Store in in slot 0x4
2,902,792 UART: [art] Derive Key Pair
2,903,152 UART: [art] Store priv key in slot 0x5
2,916,396 UART: [art] Derive Key Pair - Done
2,931,252 UART: [art] Signing Cert with AUTHO
2,931,732 UART: RITY.KEYID = 7
2,947,356 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,121 UART: [art] PUB.X = F663343AF1B8EB3C84047D0E6CF9CC00EA0E7EAE10DE67F7AFCF35647DFF7C69D5A3CE864A7FC6140E77D30CF05BC4F5
2,954,880 UART: [art] PUB.Y = 9ACCA5175759BBDA8F49F46F7057B01D2326417E4B0B707378F025A1CE0C5D361575EE63AD6DE6E683CC47FA23B46034
2,961,830 UART: [art] SIG.R = 1AC5D88D1A786CA713EAFA2BE0E9BD5F86C0DAA1E23DB79189D36C3FD8AE98B23939AD5CD09177677324183542C259D4
2,968,612 UART: [art] SIG.S = 7394C2AF7D267FD1A4F16BBE32E742F63B49687357191020A86424FFE33C9C32D35769BCF4AC7E6996B13CD65FA92C45
2,992,453 UART: Caliptra RT
2,992,798 UART: [state] CFI Enabled
3,100,345 UART: [rt] RT listening for mailbox commands...
3,101,015 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,269 UART: [rt]cmd =0x44504543, len=40
3,157,189 >>> mbox cmd response data (40 bytes)
3,157,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,219 UART: [rt]cmd =0x44504543, len=96
3,227,217 >>> mbox cmd response data (56 bytes)
3,227,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,257,145 UART: [rt]cmd =0x44504543, len=96
3,297,854 >>> mbox cmd response data (56 bytes)
3,297,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,732 UART: [rt]cmd =0x44504543, len=96
3,368,759 >>> mbox cmd response data (56 bytes)
3,368,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,765 UART: [rt]cmd =0x44504543, len=96
3,439,920 >>> mbox cmd response data (56 bytes)
3,439,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,946 UART: [rt]cmd =0x44504543, len=96
3,511,215 >>> mbox cmd response data (56 bytes)
3,511,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,071 UART: [rt]cmd =0x44504543, len=96
3,582,238 >>> mbox cmd response data (56 bytes)
3,582,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,254 UART: [rt]cmd =0x44504543, len=96
3,654,959 >>> mbox cmd response data (56 bytes)
3,654,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,121 UART: [rt]cmd =0x44504543, len=96
3,727,110 >>> mbox cmd response data (56 bytes)
3,727,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,014 UART: [rt]cmd =0x44504543, len=96
3,799,695 >>> mbox cmd response data (56 bytes)
3,799,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,605 UART: [rt]cmd =0x44504543, len=96
3,872,286 >>> mbox cmd response data (56 bytes)
3,872,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,404 UART: [rt]cmd =0x44504543, len=96
3,946,195 >>> mbox cmd response data (56 bytes)
3,946,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,107 UART: [rt]cmd =0x44504543, len=96
4,020,302 >>> mbox cmd response data (56 bytes)
4,020,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,050,382 UART: [rt]cmd =0x44504543, len=96
4,093,551 >>> mbox cmd response data (56 bytes)
4,093,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,625 UART: [rt]cmd =0x44504543, len=96
4,167,996 >>> mbox cmd response data (56 bytes)
4,167,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,074 UART: [rt]cmd =0x44504543, len=96
4,242,437 >>> mbox cmd response data (56 bytes)
4,242,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,272,309 UART: [rt]cmd =0x44504543, len=96
4,279,501 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,357 writing to cptra_bootfsm_go
193,542 UART:
193,889 UART: Running Caliptra ROM ...
195,041 UART:
195,194 UART: [state] CFI Enabled
264,391 UART: [state] LifecycleState = Unprovisioned
266,293 UART: [state] DebugLocked = No
268,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,615 UART: [kat] SHA2-256
443,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,829 UART: [kat] ++
454,307 UART: [kat] sha1
465,047 UART: [kat] SHA2-256
467,707 UART: [kat] SHA2-384
473,061 UART: [kat] SHA2-512-ACC
475,438 UART: [kat] ECC-384
2,766,774 UART: [kat] HMAC-384Kdf
2,800,181 UART: [kat] LMS
3,990,440 UART: [kat] --
3,995,272 UART: [cold-reset] ++
3,997,350 UART: [fht] Storing FHT @ 0x50003400
4,009,417 UART: [idev] ++
4,010,027 UART: [idev] CDI.KEYID = 6
4,010,957 UART: [idev] SUBJECT.KEYID = 7
4,012,211 UART: [idev] UDS.KEYID = 0
4,013,251 ready_for_fw is high
4,013,462 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,928 UART: [idev] Erasing UDS.KEYID = 0
7,348,968 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,406 UART: [idev] --
7,375,730 UART: [ldev] ++
7,376,315 UART: [ldev] CDI.KEYID = 6
7,377,261 UART: [ldev] SUBJECT.KEYID = 5
7,378,476 UART: [ldev] AUTHORITY.KEYID = 7
7,379,710 UART: [ldev] FE.KEYID = 1
7,422,148 UART: [ldev] Erasing FE.KEYID = 1
10,753,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,227 UART: [ldev] --
13,116,494 UART: [fwproc] Waiting for Commands...
13,118,589 UART: [fwproc] Received command 0x46574c44
13,120,982 UART: [fwproc] Received Image of size 114124 bytes
17,173,058 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,907 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,637,337 >>> mbox cmd response: success
17,641,181 UART: [afmc] ++
17,641,777 UART: [afmc] CDI.KEYID = 6
17,642,807 UART: [afmc] SUBJECT.KEYID = 7
17,643,978 UART: [afmc] AUTHORITY.KEYID = 5
21,005,962 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,847 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,158 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,320,532 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,390 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,349,792 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,116 UART: [afmc] --
23,376,744 UART: [cold-reset] --
23,380,076 UART: [state] Locking Datavault
23,386,244 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,000 UART: [state] Locking ICCM
23,389,190 UART: [exit] Launching FMC @ 0x40000130
23,397,584 UART:
23,397,821 UART: Running Caliptra FMC ...
23,398,924 UART:
23,399,084 UART: [state] CFI Enabled
23,464,298 UART: [fht] FMC Alias Private Key: 7
25,802,195 UART: [art] Extend RT PCRs Done
25,803,423 UART: [art] Lock RT PCRs Done
25,805,269 UART: [art] Populate DV Done
25,810,594 UART: [fht] FMC Alias Private Key: 7
25,812,305 UART: [art] Derive CDI
25,813,128 UART: [art] Store in in slot 0x4
25,873,373 UART: [art] Derive Key Pair
25,874,405 UART: [art] Store priv key in slot 0x5
29,166,607 UART: [art] Derive Key Pair - Done
29,179,496 UART: [art] Signing Cert with AUTHO
29,180,800 UART: RITY.KEYID = 7
31,469,409 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,914 UART: [art] PUB.X = A0A563BA18581D0E41F48C7BD4733F9CAD81E69BDEB9F66B31DECB13990A2648F9ED1701F9A3A880538032DEC359806E
31,478,157 UART: [art] PUB.Y = 27490F234589C9A94F48082E6136F649DD2C19A37C53846685305B400CA4ABDD3F279BEABEB04BAA75806E0DD8D14801
31,485,384 UART: [art] SIG.R = 5A517C490F479A1F01DF1E96A32E1F39F7EF9E48AF8BC87D6DF019FB3EED5D3BC6A607DC500C691B044EBBB6BF5532C9
31,492,770 UART: [art] SIG.S = BCB9FBBE81EC2144314105B7D33D25988312489F010BBE4BE09BCA6D5F3966BC683271F3F67751CF4BBA2C9E2F011D91
32,797,857 UART: Caliptra RT
32,798,576 UART: [state] CFI Enabled
32,960,894 UART: [rt] RT listening for mailbox commands...
32,962,839 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,992,863 UART: [rt]cmd =0x44504543, len=24
33,034,082 >>> mbox cmd response data (40 bytes)
33,034,865 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,064,805 UART: [rt]cmd =0x44504543, len=24
33,097,686 >>> mbox cmd response data (40 bytes)
33,098,331 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,128,154 UART: [rt]cmd =0x44504543, len=24
33,161,725 >>> mbox cmd response data (40 bytes)
33,162,359 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,192,268 UART: [rt]cmd =0x44504543, len=24
33,225,716 >>> mbox cmd response data (40 bytes)
33,226,372 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,256,548 UART: [rt]cmd =0x44504543, len=24
33,289,881 >>> mbox cmd response data (40 bytes)
33,290,533 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,320,296 UART: [rt]cmd =0x44504543, len=24
33,354,259 >>> mbox cmd response data (40 bytes)
33,354,873 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,385,067 UART: [rt]cmd =0x44504543, len=24
33,417,990 >>> mbox cmd response data (40 bytes)
33,418,609 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,448,477 UART: [rt]cmd =0x44504543, len=24
33,481,933 >>> mbox cmd response data (40 bytes)
33,482,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,512,614 UART: [rt]cmd =0x44504543, len=24
33,546,108 >>> mbox cmd response data (40 bytes)
33,546,756 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,576,871 UART: [rt]cmd =0x44504543, len=24
33,610,302 >>> mbox cmd response data (40 bytes)
33,610,944 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,640,682 UART: [rt]cmd =0x44504543, len=24
33,674,129 >>> mbox cmd response data (40 bytes)
33,674,735 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,704,538 UART: [rt]cmd =0x44504543, len=24
33,738,111 >>> mbox cmd response data (40 bytes)
33,738,727 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,768,826 UART: [rt]cmd =0x44504543, len=24
33,802,312 >>> mbox cmd response data (40 bytes)
33,802,931 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,832,941 UART: [rt]cmd =0x44504543, len=24
33,866,187 >>> mbox cmd response data (40 bytes)
33,866,832 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,896,797 UART: [rt]cmd =0x44504543, len=24
33,930,573 >>> mbox cmd response data (40 bytes)
33,931,218 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,961,340 UART: [rt]cmd =0x44504543, len=24
33,967,856 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,806,529 ready_for_fw is high
3,807,103 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,878,221 >>> mbox cmd response: success
23,567,087 UART:
23,567,512 UART: Running Caliptra FMC ...
23,568,625 UART:
23,568,790 UART: [state] CFI Enabled
23,637,464 UART: [fht] FMC Alias Private Key: 7
25,975,914 UART: [art] Extend RT PCRs Done
25,977,131 UART: [art] Lock RT PCRs Done
25,978,643 UART: [art] Populate DV Done
25,984,123 UART: [fht] FMC Alias Private Key: 7
25,985,661 UART: [art] Derive CDI
25,986,396 UART: [art] Store in in slot 0x4
26,046,204 UART: [art] Derive Key Pair
26,047,243 UART: [art] Store priv key in slot 0x5
29,340,243 UART: [art] Derive Key Pair - Done
29,353,172 UART: [art] Signing Cert with AUTHO
29,354,476 UART: RITY.KEYID = 7
31,641,184 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,697 UART: [art] PUB.X = 43AA75AA30008CEF60F9A784E5A78AB5E8BD5FEDC336A3F08C47EB32EAB057FF7AFCE5FF98F604816EE255FF46D55828
31,649,976 UART: [art] PUB.Y = E1ACA52314BFFD84A4D2D860931CD9E0883C53532D3B6726C0961EB44D8CCB2FB7BF6909230FD4C2EC901A70008347D2
31,657,233 UART: [art] SIG.R = 3E7138084A816F08C2CFB1B186B7BBBD67C8992910CFD48BEEA10FEB40028A62DDA77FCAB7B53BD38D4844482934A516
31,664,643 UART: [art] SIG.S = 58BCA6D970D9E0281E68ECFB2CD10FEBD1E573F3442C4C44F0A8886A00E999695DAD2013F2324ABA73BD7B2EDF7BD244
32,969,787 UART: Caliptra RT
32,970,498 UART: [state] CFI Enabled
33,131,181 UART: [rt] RT listening for mailbox commands...
33,133,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,163,076 UART: [rt]cmd =0x44504543, len=24
33,205,018 >>> mbox cmd response data (40 bytes)
33,205,783 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,235,655 UART: [rt]cmd =0x44504543, len=24
33,268,846 >>> mbox cmd response data (40 bytes)
33,269,486 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,299,607 UART: [rt]cmd =0x44504543, len=24
33,332,653 >>> mbox cmd response data (40 bytes)
33,333,309 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,363,330 UART: [rt]cmd =0x44504543, len=24
33,396,968 >>> mbox cmd response data (40 bytes)
33,397,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,427,594 UART: [rt]cmd =0x44504543, len=24
33,461,112 >>> mbox cmd response data (40 bytes)
33,461,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,491,417 UART: [rt]cmd =0x44504543, len=24
33,525,265 >>> mbox cmd response data (40 bytes)
33,525,885 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,555,966 UART: [rt]cmd =0x44504543, len=24
33,589,313 >>> mbox cmd response data (40 bytes)
33,589,937 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,619,790 UART: [rt]cmd =0x44504543, len=24
33,653,062 >>> mbox cmd response data (40 bytes)
33,653,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,683,910 UART: [rt]cmd =0x44504543, len=24
33,717,345 >>> mbox cmd response data (40 bytes)
33,717,999 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,747,800 UART: [rt]cmd =0x44504543, len=24
33,781,551 >>> mbox cmd response data (40 bytes)
33,782,165 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,812,051 UART: [rt]cmd =0x44504543, len=24
33,845,735 >>> mbox cmd response data (40 bytes)
33,846,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,876,120 UART: [rt]cmd =0x44504543, len=24
33,909,639 >>> mbox cmd response data (40 bytes)
33,910,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,940,054 UART: [rt]cmd =0x44504543, len=24
33,973,691 >>> mbox cmd response data (40 bytes)
33,974,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,004,441 UART: [rt]cmd =0x44504543, len=24
34,037,958 >>> mbox cmd response data (40 bytes)
34,038,606 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,068,572 UART: [rt]cmd =0x44504543, len=24
34,101,726 >>> mbox cmd response data (40 bytes)
34,102,329 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,132,083 UART: [rt]cmd =0x44504543, len=24
34,138,817 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,380 UART:
192,751 UART: Running Caliptra ROM ...
193,845 UART:
603,610 UART: [state] CFI Enabled
618,280 UART: [state] LifecycleState = Unprovisioned
620,210 UART: [state] DebugLocked = No
621,652 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,072 UART: [kat] SHA2-256
796,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,377 UART: [kat] ++
807,814 UART: [kat] sha1
818,750 UART: [kat] SHA2-256
821,472 UART: [kat] SHA2-384
828,022 UART: [kat] SHA2-512-ACC
830,361 UART: [kat] ECC-384
3,114,940 UART: [kat] HMAC-384Kdf
3,126,391 UART: [kat] LMS
4,316,503 UART: [kat] --
4,322,578 UART: [cold-reset] ++
4,324,089 UART: [fht] Storing FHT @ 0x50003400
4,335,444 UART: [idev] ++
4,336,005 UART: [idev] CDI.KEYID = 6
4,336,886 UART: [idev] SUBJECT.KEYID = 7
4,338,197 UART: [idev] UDS.KEYID = 0
4,339,143 ready_for_fw is high
4,339,324 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,656 UART: [idev] Erasing UDS.KEYID = 0
7,620,298 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,297 UART: [idev] --
7,645,304 UART: [ldev] ++
7,645,934 UART: [ldev] CDI.KEYID = 6
7,646,815 UART: [ldev] SUBJECT.KEYID = 5
7,648,065 UART: [ldev] AUTHORITY.KEYID = 7
7,649,342 UART: [ldev] FE.KEYID = 1
7,658,582 UART: [ldev] Erasing FE.KEYID = 1
10,945,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,354 UART: [ldev] --
13,308,555 UART: [fwproc] Waiting for Commands...
13,311,232 UART: [fwproc] Received command 0x46574c44
13,313,417 UART: [fwproc] Received Image of size 114124 bytes
17,365,222 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,960 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,880 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,826,954 >>> mbox cmd response: success
17,830,594 UART: [afmc] ++
17,831,190 UART: [afmc] CDI.KEYID = 6
17,832,110 UART: [afmc] SUBJECT.KEYID = 7
17,833,380 UART: [afmc] AUTHORITY.KEYID = 5
21,143,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,388 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,652 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,057 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,858 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,337 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,348 UART: [afmc] --
23,511,428 UART: [cold-reset] --
23,514,418 UART: [state] Locking Datavault
23,518,906 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,598 UART: [state] Locking ICCM
23,521,662 UART: [exit] Launching FMC @ 0x40000130
23,530,054 UART:
23,530,296 UART: Running Caliptra FMC ...
23,531,397 UART:
23,531,552 UART: [state] CFI Enabled
23,539,774 UART: [fht] FMC Alias Private Key: 7
25,870,671 UART: [art] Extend RT PCRs Done
25,871,896 UART: [art] Lock RT PCRs Done
25,873,489 UART: [art] Populate DV Done
25,878,786 UART: [fht] FMC Alias Private Key: 7
25,880,481 UART: [art] Derive CDI
25,881,288 UART: [art] Store in in slot 0x4
25,923,550 UART: [art] Derive Key Pair
25,924,549 UART: [art] Store priv key in slot 0x5
29,166,628 UART: [art] Derive Key Pair - Done
29,179,793 UART: [art] Signing Cert with AUTHO
29,181,090 UART: RITY.KEYID = 7
31,460,474 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,984 UART: [art] PUB.X = BC2D791DBF0FB8CA7E157DB2D0B9F8273C015C2D9EC224D8A0DE230F8F0B65CADC346A7C3E060D8F536C705426607CCB
31,469,428 UART: [art] PUB.Y = 9259C68862E2D961A6CDBE3C07C940EC2BA22F9815B9D4740D0DEB9F981725E7A3E50AC2129A5FC14602CC6A077581A7
31,476,528 UART: [art] SIG.R = 3DCC82E13DE9C6E88E22F9BE4FC6897EE00AEC39B4A33C8F35ACB13A6DE8506FBE1D4D7971ABC63161CFCED2B3ABD2B1
31,483,960 UART: [art] SIG.S = 346DD95252B81999D8C827584E7E3C574E7482E9BF30C35E20E0C125E36DB763D43CA5E969B239345ACFD40B0AD3DC76
32,789,096 UART: Caliptra RT
32,789,821 UART: [state] CFI Enabled
32,907,478 UART: [rt] RT listening for mailbox commands...
32,909,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,939,539 UART: [rt]cmd =0x44504543, len=24
32,965,998 >>> mbox cmd response data (40 bytes)
32,966,805 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,996,792 UART: [rt]cmd =0x44504543, len=24
33,022,956 >>> mbox cmd response data (40 bytes)
33,023,602 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,053,669 UART: [rt]cmd =0x44504543, len=24
33,079,759 >>> mbox cmd response data (40 bytes)
33,080,427 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,110,222 UART: [rt]cmd =0x44504543, len=24
33,136,567 >>> mbox cmd response data (40 bytes)
33,137,197 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,167,065 UART: [rt]cmd =0x44504543, len=24
33,193,128 >>> mbox cmd response data (40 bytes)
33,193,750 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,223,809 UART: [rt]cmd =0x44504543, len=24
33,249,944 >>> mbox cmd response data (40 bytes)
33,250,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,280,504 UART: [rt]cmd =0x44504543, len=24
33,306,307 >>> mbox cmd response data (40 bytes)
33,306,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,336,829 UART: [rt]cmd =0x44504543, len=24
33,362,988 >>> mbox cmd response data (40 bytes)
33,363,605 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,393,437 UART: [rt]cmd =0x44504543, len=24
33,419,491 >>> mbox cmd response data (40 bytes)
33,420,104 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,450,235 UART: [rt]cmd =0x44504543, len=24
33,476,536 >>> mbox cmd response data (40 bytes)
33,477,185 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,507,138 UART: [rt]cmd =0x44504543, len=24
33,533,425 >>> mbox cmd response data (40 bytes)
33,534,036 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,563,951 UART: [rt]cmd =0x44504543, len=24
33,589,735 >>> mbox cmd response data (40 bytes)
33,590,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,620,359 UART: [rt]cmd =0x44504543, len=24
33,646,279 >>> mbox cmd response data (40 bytes)
33,646,922 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,676,656 UART: [rt]cmd =0x44504543, len=24
33,702,940 >>> mbox cmd response data (40 bytes)
33,703,542 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,733,342 UART: [rt]cmd =0x44504543, len=24
33,759,037 >>> mbox cmd response data (40 bytes)
33,759,657 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,789,568 UART: [rt]cmd =0x44504543, len=24
33,796,168 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
4,123,208 ready_for_fw is high
4,123,646 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,188 >>> mbox cmd response: success
23,714,370 UART:
23,714,761 UART: Running Caliptra FMC ...
23,715,885 UART:
23,716,037 UART: [state] CFI Enabled
23,723,613 UART: [fht] FMC Alias Private Key: 7
26,054,059 UART: [art] Extend RT PCRs Done
26,055,282 UART: [art] Lock RT PCRs Done
26,057,093 UART: [art] Populate DV Done
26,062,616 UART: [fht] FMC Alias Private Key: 7
26,064,268 UART: [art] Derive CDI
26,065,081 UART: [art] Store in in slot 0x4
26,107,619 UART: [art] Derive Key Pair
26,108,617 UART: [art] Store priv key in slot 0x5
29,351,012 UART: [art] Derive Key Pair - Done
29,364,231 UART: [art] Signing Cert with AUTHO
29,365,536 UART: RITY.KEYID = 7
31,644,970 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,485 UART: [art] PUB.X = B1B784F8D482ECC47E399F2CD1D34A69C1F4BAADBE36C3788CC664E8258F355AF04526740D906BF014C505BD07895DB6
31,653,722 UART: [art] PUB.Y = 7C1F68863E2953CF95F70B0AF1C88949D78E42402C5C0ADA6C1D5B64DAE91AE1DA0D4299FCBC859ABCB27CC9D21BA961
31,660,996 UART: [art] SIG.R = 89164ACEAC5E4A503202C793A8CA70E53D70D320A6BBD093B1F251D9E02FFF655AAE9A9F9D8D5915EDBD7AB8765709B8
31,668,380 UART: [art] SIG.S = F461DCDE6162632ABF439C99431C33B840CCBC3964485C3F49A7E46646EC01A870D00AB23BC5EB17B510B2C69FF80532
32,973,158 UART: Caliptra RT
32,973,865 UART: [state] CFI Enabled
33,091,771 UART: [rt] RT listening for mailbox commands...
33,093,690 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,123,637 UART: [rt]cmd =0x44504543, len=24
33,149,881 >>> mbox cmd response data (40 bytes)
33,150,642 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,180,464 UART: [rt]cmd =0x44504543, len=24
33,206,951 >>> mbox cmd response data (40 bytes)
33,207,581 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,237,275 UART: [rt]cmd =0x44504543, len=24
33,263,314 >>> mbox cmd response data (40 bytes)
33,263,975 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,293,770 UART: [rt]cmd =0x44504543, len=24
33,319,600 >>> mbox cmd response data (40 bytes)
33,320,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,350,211 UART: [rt]cmd =0x44504543, len=24
33,376,475 >>> mbox cmd response data (40 bytes)
33,377,124 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,407,093 UART: [rt]cmd =0x44504543, len=24
33,433,583 >>> mbox cmd response data (40 bytes)
33,434,196 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,464,261 UART: [rt]cmd =0x44504543, len=24
33,491,043 >>> mbox cmd response data (40 bytes)
33,491,693 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,521,546 UART: [rt]cmd =0x44504543, len=24
33,547,839 >>> mbox cmd response data (40 bytes)
33,548,443 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,578,323 UART: [rt]cmd =0x44504543, len=24
33,604,824 >>> mbox cmd response data (40 bytes)
33,605,456 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,635,356 UART: [rt]cmd =0x44504543, len=24
33,661,882 >>> mbox cmd response data (40 bytes)
33,662,540 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,692,512 UART: [rt]cmd =0x44504543, len=24
33,719,128 >>> mbox cmd response data (40 bytes)
33,719,730 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,749,701 UART: [rt]cmd =0x44504543, len=24
33,775,759 >>> mbox cmd response data (40 bytes)
33,776,368 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,806,279 UART: [rt]cmd =0x44504543, len=24
33,832,378 >>> mbox cmd response data (40 bytes)
33,832,991 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,862,619 UART: [rt]cmd =0x44504543, len=24
33,888,984 >>> mbox cmd response data (40 bytes)
33,889,624 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,919,419 UART: [rt]cmd =0x44504543, len=24
33,945,923 >>> mbox cmd response data (40 bytes)
33,946,525 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,976,279 UART: [rt]cmd =0x44504543, len=24
33,982,885 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,228 UART:
192,591 UART: Running Caliptra ROM ...
193,737 UART:
193,886 UART: [state] CFI Enabled
264,593 UART: [state] LifecycleState = Unprovisioned
266,457 UART: [state] DebugLocked = No
268,898 UART: [state] WD Timer not started. Device not locked for debugging
273,227 UART: [kat] SHA2-256
452,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,940 UART: [kat] ++
464,467 UART: [kat] sha1
474,924 UART: [kat] SHA2-256
477,943 UART: [kat] SHA2-384
483,791 UART: [kat] SHA2-512-ACC
486,744 UART: [kat] ECC-384
2,950,525 UART: [kat] HMAC-384Kdf
2,973,706 UART: [kat] LMS
3,503,193 UART: [kat] --
3,508,601 UART: [cold-reset] ++
3,509,815 UART: [fht] FHT @ 0x50003400
3,521,427 UART: [idev] ++
3,521,990 UART: [idev] CDI.KEYID = 6
3,522,968 UART: [idev] SUBJECT.KEYID = 7
3,524,140 UART: [idev] UDS.KEYID = 0
3,525,065 ready_for_fw is high
3,525,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,572 UART: [idev] Erasing UDS.KEYID = 0
6,030,991 UART: [idev] Sha1 KeyId Algorithm
6,053,963 UART: [idev] --
6,058,234 UART: [ldev] ++
6,058,826 UART: [ldev] CDI.KEYID = 6
6,059,741 UART: [ldev] SUBJECT.KEYID = 5
6,060,901 UART: [ldev] AUTHORITY.KEYID = 7
6,062,188 UART: [ldev] FE.KEYID = 1
6,102,706 UART: [ldev] Erasing FE.KEYID = 1
8,608,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,188 UART: [ldev] --
10,418,337 UART: [fwproc] Wait for Commands...
10,420,319 UART: [fwproc] Recv command 0x46574c44
10,422,407 UART: [fwproc] Recv'd Img size: 114448 bytes
13,822,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,281,181 >>> mbox cmd response: success
14,286,040 UART: [afmc] ++
14,286,635 UART: [afmc] CDI.KEYID = 6
14,287,522 UART: [afmc] SUBJECT.KEYID = 7
14,288,631 UART: [afmc] AUTHORITY.KEYID = 5
16,831,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,794 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,811 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,712 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,843 UART: [afmc] --
18,631,110 UART: [cold-reset] --
18,634,534 UART: [state] Locking Datavault
18,638,749 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,463 UART: [state] Locking ICCM
18,642,076 UART: [exit] Launching FMC @ 0x40000130
18,650,475 UART:
18,650,707 UART: Running Caliptra FMC ...
18,651,810 UART:
18,651,971 UART: [state] CFI Enabled
18,714,180 UART: [fht] FMC Alias Private Key: 7
20,478,439 UART: [art] Extend RT PCRs Done
20,479,666 UART: [art] Lock RT PCRs Done
20,480,887 UART: [art] Populate DV Done
20,486,353 UART: [fht] FMC Alias Private Key: 7
20,487,833 UART: [art] Derive CDI
20,488,569 UART: [art] Store in in slot 0x4
20,547,229 UART: [art] Derive Key Pair
20,548,265 UART: [art] Store priv key in slot 0x5
23,010,791 UART: [art] Derive Key Pair - Done
23,023,857 UART: [art] Signing Cert with AUTHO
23,025,159 UART: RITY.KEYID = 7
24,737,137 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,638 UART: [art] PUB.X = 5E6D52F5804F8F0AED25D560771805BD17C368580E4B1C7D9C5E05381A08849B4F6B704429FB33171708B18DC2AF625B
24,745,840 UART: [art] PUB.Y = 1A65A115D1BAEDC65593B4AE7E8CA7DB2F401AF99B86E47A9521A78835FC58EF0C4A11106EE3A0671AA0CD2A97B119F5
24,753,164 UART: [art] SIG.R = EEC663CAF0C2B15244D23A8C0909C4DE06F0AAD609B22E945E1C285EDF70AC69680BE37C1895BF59CDB847960E6CC013
24,760,574 UART: [art] SIG.S = 48C355953A4F561B6500EB9C7F52778ADFD55082C448DC7EA0EF33500A00AEF539E9E6E227FB4A6BFBF5950B45A54A10
25,739,987 UART: Caliptra RT
25,740,707 UART: [state] CFI Enabled
25,905,560 UART: [rt] RT listening for mailbox commands...
25,907,485 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,938,014 UART: [rt]cmd =0x44504543, len=24
25,979,804 >>> mbox cmd response data (40 bytes)
25,980,623 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,010,476 UART: [rt]cmd =0x44504543, len=24
26,043,977 >>> mbox cmd response data (40 bytes)
26,044,665 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,074,572 UART: [rt]cmd =0x44504543, len=24
26,107,901 >>> mbox cmd response data (40 bytes)
26,108,514 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,138,440 UART: [rt]cmd =0x44504543, len=24
26,172,276 >>> mbox cmd response data (40 bytes)
26,172,895 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,202,812 UART: [rt]cmd =0x44504543, len=24
26,236,373 >>> mbox cmd response data (40 bytes)
26,236,991 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,266,944 UART: [rt]cmd =0x44504543, len=24
26,300,165 >>> mbox cmd response data (40 bytes)
26,300,816 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,330,991 UART: [rt]cmd =0x44504543, len=24
26,364,642 >>> mbox cmd response data (40 bytes)
26,365,291 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,395,217 UART: [rt]cmd =0x44504543, len=24
26,428,188 >>> mbox cmd response data (40 bytes)
26,428,799 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,458,928 UART: [rt]cmd =0x44504543, len=24
26,492,250 >>> mbox cmd response data (40 bytes)
26,492,878 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,522,907 UART: [rt]cmd =0x44504543, len=24
26,556,148 >>> mbox cmd response data (40 bytes)
26,556,770 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,586,777 UART: [rt]cmd =0x44504543, len=24
26,620,381 >>> mbox cmd response data (40 bytes)
26,621,032 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,651,043 UART: [rt]cmd =0x44504543, len=24
26,684,428 >>> mbox cmd response data (40 bytes)
26,685,076 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,715,145 UART: [rt]cmd =0x44504543, len=24
26,748,313 >>> mbox cmd response data (40 bytes)
26,748,918 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,778,777 UART: [rt]cmd =0x44504543, len=24
26,812,179 >>> mbox cmd response data (40 bytes)
26,812,796 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,842,658 UART: [rt]cmd =0x44504543, len=24
26,876,387 >>> mbox cmd response data (40 bytes)
26,877,006 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,906,962 UART: [rt]cmd =0x44504543, len=24
26,913,595 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,385,868 ready_for_fw is high
3,386,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,109,175 >>> mbox cmd response: success
18,407,496 UART:
18,407,888 UART: Running Caliptra FMC ...
18,409,084 UART:
18,409,259 UART: [state] CFI Enabled
18,476,054 UART: [fht] FMC Alias Private Key: 7
20,240,166 UART: [art] Extend RT PCRs Done
20,241,412 UART: [art] Lock RT PCRs Done
20,242,938 UART: [art] Populate DV Done
20,248,404 UART: [fht] FMC Alias Private Key: 7
20,250,051 UART: [art] Derive CDI
20,250,870 UART: [art] Store in in slot 0x4
20,308,839 UART: [art] Derive Key Pair
20,309,885 UART: [art] Store priv key in slot 0x5
22,772,554 UART: [art] Derive Key Pair - Done
22,785,718 UART: [art] Signing Cert with AUTHO
22,787,016 UART: RITY.KEYID = 7
24,497,936 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,443 UART: [art] PUB.X = A31EDCD309B281DC8040A70AA484E88E73F9A31ABC999FB274B2F5F2EEBA32DE94626D477401C7A71C1C6631F673AF12
24,506,687 UART: [art] PUB.Y = 888175FD9A7DA2D9880B05A6A0E38AF49085B6DF31BB3F2B7B26A83FAA69EA3DBA0EFD623F3736B4DDF839209B660D6F
24,513,972 UART: [art] SIG.R = DE97A3A3052BED5B0F2E9C1821086DA725E85D345100301958D144CFE1B3D1B49343540CC317EEDCCB04635F908870D1
24,521,374 UART: [art] SIG.S = 3F8A09EBB8AC1FC4425111AF28E44FF97FA2260C8215BA833F9DE54444EFB3F438BB279BE42D8688698843D231A05A55
25,500,660 UART: Caliptra RT
25,501,395 UART: [state] CFI Enabled
25,666,416 UART: [rt] RT listening for mailbox commands...
25,668,334 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,698,850 UART: [rt]cmd =0x44504543, len=24
25,740,311 >>> mbox cmd response data (40 bytes)
25,741,110 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,771,344 UART: [rt]cmd =0x44504543, len=24
25,804,355 >>> mbox cmd response data (40 bytes)
25,805,012 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,834,761 UART: [rt]cmd =0x44504543, len=24
25,868,403 >>> mbox cmd response data (40 bytes)
25,869,021 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,898,898 UART: [rt]cmd =0x44504543, len=24
25,932,477 >>> mbox cmd response data (40 bytes)
25,933,126 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,963,138 UART: [rt]cmd =0x44504543, len=24
25,996,893 >>> mbox cmd response data (40 bytes)
25,997,531 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,027,601 UART: [rt]cmd =0x44504543, len=24
26,061,309 >>> mbox cmd response data (40 bytes)
26,061,975 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,091,666 UART: [rt]cmd =0x44504543, len=24
26,124,695 >>> mbox cmd response data (40 bytes)
26,125,342 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,155,407 UART: [rt]cmd =0x44504543, len=24
26,189,101 >>> mbox cmd response data (40 bytes)
26,189,710 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,219,700 UART: [rt]cmd =0x44504543, len=24
26,252,977 >>> mbox cmd response data (40 bytes)
26,253,598 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,283,371 UART: [rt]cmd =0x44504543, len=24
26,317,310 >>> mbox cmd response data (40 bytes)
26,317,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,347,589 UART: [rt]cmd =0x44504543, len=24
26,381,187 >>> mbox cmd response data (40 bytes)
26,381,839 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,411,741 UART: [rt]cmd =0x44504543, len=24
26,445,305 >>> mbox cmd response data (40 bytes)
26,445,965 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,475,972 UART: [rt]cmd =0x44504543, len=24
26,509,451 >>> mbox cmd response data (40 bytes)
26,510,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,540,258 UART: [rt]cmd =0x44504543, len=24
26,573,364 >>> mbox cmd response data (40 bytes)
26,573,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,603,898 UART: [rt]cmd =0x44504543, len=24
26,637,406 >>> mbox cmd response data (40 bytes)
26,638,016 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,668,042 UART: [rt]cmd =0x44504543, len=24
26,674,409 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,385 UART:
192,747 UART: Running Caliptra ROM ...
193,874 UART:
603,719 UART: [state] CFI Enabled
623,981 UART: [state] LifecycleState = Unprovisioned
625,884 UART: [state] DebugLocked = No
628,533 UART: [state] WD Timer not started. Device not locked for debugging
632,127 UART: [kat] SHA2-256
811,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
822,862 UART: [kat] ++
823,309 UART: [kat] sha1
833,678 UART: [kat] SHA2-256
836,683 UART: [kat] SHA2-384
843,821 UART: [kat] SHA2-512-ACC
846,791 UART: [kat] ECC-384
3,290,463 UART: [kat] HMAC-384Kdf
3,303,846 UART: [kat] LMS
3,833,365 UART: [kat] --
3,838,445 UART: [cold-reset] ++
3,841,012 UART: [fht] FHT @ 0x50003400
3,852,053 UART: [idev] ++
3,852,630 UART: [idev] CDI.KEYID = 6
3,853,507 UART: [idev] SUBJECT.KEYID = 7
3,854,741 UART: [idev] UDS.KEYID = 0
3,855,668 ready_for_fw is high
3,855,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,999,665 UART: [idev] Erasing UDS.KEYID = 0
6,333,339 UART: [idev] Sha1 KeyId Algorithm
6,357,532 UART: [idev] --
6,360,872 UART: [ldev] ++
6,361,433 UART: [ldev] CDI.KEYID = 6
6,362,440 UART: [ldev] SUBJECT.KEYID = 5
6,363,748 UART: [ldev] AUTHORITY.KEYID = 7
6,364,932 UART: [ldev] FE.KEYID = 1
6,375,971 UART: [ldev] Erasing FE.KEYID = 1
8,849,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,850 UART: [ldev] --
10,642,401 UART: [fwproc] Wait for Commands...
10,645,567 UART: [fwproc] Recv command 0x46574c44
10,647,657 UART: [fwproc] Recv'd Img size: 114448 bytes
14,054,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,131,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,199,924 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,517,574 >>> mbox cmd response: success
14,521,816 UART: [afmc] ++
14,522,406 UART: [afmc] CDI.KEYID = 6
14,523,607 UART: [afmc] SUBJECT.KEYID = 7
14,524,741 UART: [afmc] AUTHORITY.KEYID = 5
17,020,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,741,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,743,666 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,759,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,775,435 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,791,294 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,814,043 UART: [afmc] --
18,817,256 UART: [cold-reset] --
18,821,596 UART: [state] Locking Datavault
18,826,727 UART: [state] Locking PCR0, PCR1 and PCR31
18,828,368 UART: [state] Locking ICCM
18,831,082 UART: [exit] Launching FMC @ 0x40000130
18,839,526 UART:
18,839,747 UART: Running Caliptra FMC ...
18,840,765 UART:
18,840,907 UART: [state] CFI Enabled
18,849,600 UART: [fht] FMC Alias Private Key: 7
20,606,256 UART: [art] Extend RT PCRs Done
20,607,470 UART: [art] Lock RT PCRs Done
20,608,739 UART: [art] Populate DV Done
20,614,035 UART: [fht] FMC Alias Private Key: 7
20,615,510 UART: [art] Derive CDI
20,616,232 UART: [art] Store in in slot 0x4
20,658,701 UART: [art] Derive Key Pair
20,659,683 UART: [art] Store priv key in slot 0x5
23,086,835 UART: [art] Derive Key Pair - Done
23,099,671 UART: [art] Signing Cert with AUTHO
23,100,966 UART: RITY.KEYID = 7
24,806,817 UART: [art] Erasing AUTHORITY.KEYID = 7
24,808,322 UART: [art] PUB.X = B3FCC18819ABF79A9AE2B3F5E3E4C3196A732BF3660FAF0372D4231DB36E06DCE8AD420DC8C43A7E730992B1ACCE39C9
24,815,580 UART: [art] PUB.Y = BEF731DD5A9CBFFE3D4245D74A21C72CE4AD1E024B576C703979A3F72CE8F858420FBE866293DDE3B3F3EEB288E6675C
24,822,845 UART: [art] SIG.R = D02933CE1919CC459718E33C76DA253DED7595D9A30B88B68C9D98365CFCD427933976D0924236166885BC03EC32E64F
24,830,216 UART: [art] SIG.S = AB4CE20479A76A18350BE9BBEEC6CFC731B5B0EBA3C98ADE681ED5FA50F353F81328E3CC424ED3BD418382A6A54BE79B
25,809,281 UART: Caliptra RT
25,809,968 UART: [state] CFI Enabled
25,927,394 UART: [rt] RT listening for mailbox commands...
25,929,303 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,959,320 UART: [rt]cmd =0x44504543, len=24
25,985,998 >>> mbox cmd response data (40 bytes)
25,986,796 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,016,544 UART: [rt]cmd =0x44504543, len=24
26,042,569 >>> mbox cmd response data (40 bytes)
26,043,190 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,073,001 UART: [rt]cmd =0x44504543, len=24
26,099,500 >>> mbox cmd response data (40 bytes)
26,100,122 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,130,037 UART: [rt]cmd =0x44504543, len=24
26,156,200 >>> mbox cmd response data (40 bytes)
26,156,813 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,186,728 UART: [rt]cmd =0x44504543, len=24
26,212,723 >>> mbox cmd response data (40 bytes)
26,213,366 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,243,263 UART: [rt]cmd =0x44504543, len=24
26,269,711 >>> mbox cmd response data (40 bytes)
26,270,316 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,300,245 UART: [rt]cmd =0x44504543, len=24
26,326,297 >>> mbox cmd response data (40 bytes)
26,326,912 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,356,860 UART: [rt]cmd =0x44504543, len=24
26,382,663 >>> mbox cmd response data (40 bytes)
26,383,313 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,413,375 UART: [rt]cmd =0x44504543, len=24
26,439,721 >>> mbox cmd response data (40 bytes)
26,440,321 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,470,333 UART: [rt]cmd =0x44504543, len=24
26,496,304 >>> mbox cmd response data (40 bytes)
26,496,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,526,819 UART: [rt]cmd =0x44504543, len=24
26,553,620 >>> mbox cmd response data (40 bytes)
26,554,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,584,143 UART: [rt]cmd =0x44504543, len=24
26,610,235 >>> mbox cmd response data (40 bytes)
26,610,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,640,971 UART: [rt]cmd =0x44504543, len=24
26,667,324 >>> mbox cmd response data (40 bytes)
26,667,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,697,849 UART: [rt]cmd =0x44504543, len=24
26,725,041 >>> mbox cmd response data (40 bytes)
26,725,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,755,670 UART: [rt]cmd =0x44504543, len=24
26,782,295 >>> mbox cmd response data (40 bytes)
26,782,955 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,812,963 UART: [rt]cmd =0x44504543, len=24
26,819,577 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,691,302 ready_for_fw is high
3,691,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,428 >>> mbox cmd response: success
18,531,462 UART:
18,531,849 UART: Running Caliptra FMC ...
18,533,041 UART:
18,533,208 UART: [state] CFI Enabled
18,541,494 UART: [fht] FMC Alias Private Key: 7
20,298,110 UART: [art] Extend RT PCRs Done
20,299,336 UART: [art] Lock RT PCRs Done
20,300,826 UART: [art] Populate DV Done
20,306,188 UART: [fht] FMC Alias Private Key: 7
20,307,672 UART: [art] Derive CDI
20,308,436 UART: [art] Store in in slot 0x4
20,350,371 UART: [art] Derive Key Pair
20,351,595 UART: [art] Store priv key in slot 0x5
22,777,931 UART: [art] Derive Key Pair - Done
22,790,932 UART: [art] Signing Cert with AUTHO
22,792,228 UART: RITY.KEYID = 7
24,497,524 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,025 UART: [art] PUB.X = 7DD69348D3A68379CFFC8A80F6930155AA0D28F4703B3B5649F4AE65241F361FED063F0C144F0B2221F69CCE80FF71FE
24,506,264 UART: [art] PUB.Y = 0A8A1B2BF7E1F4C3C1403A06F61A9E02217847126320F295F4BE15CED559385550EA24FB602EB734044C988FD84BD62F
24,513,534 UART: [art] SIG.R = 76824A5E2D08BDB4C20BB4C56F6D2F51FE81D6F19F834935982D0E41DBBA83F6C9A377168EB3CDD8CA92F2FEE24C827E
24,520,960 UART: [art] SIG.S = FE7C1E222114D24CFB0C169D44F39A168EA82D598A910578D01393A0CF96DD9FFC793FEAFFDDDB2FED4D4E5D7E49621B
25,500,183 UART: Caliptra RT
25,500,883 UART: [state] CFI Enabled
25,618,695 UART: [rt] RT listening for mailbox commands...
25,620,604 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,650,680 UART: [rt]cmd =0x44504543, len=24
25,676,626 >>> mbox cmd response data (40 bytes)
25,677,403 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,707,309 UART: [rt]cmd =0x44504543, len=24
25,733,498 >>> mbox cmd response data (40 bytes)
25,734,169 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,764,067 UART: [rt]cmd =0x44504543, len=24
25,790,419 >>> mbox cmd response data (40 bytes)
25,791,210 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,821,293 UART: [rt]cmd =0x44504543, len=24
25,847,844 >>> mbox cmd response data (40 bytes)
25,848,486 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,878,404 UART: [rt]cmd =0x44504543, len=24
25,904,733 >>> mbox cmd response data (40 bytes)
25,905,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,935,408 UART: [rt]cmd =0x44504543, len=24
25,961,591 >>> mbox cmd response data (40 bytes)
25,962,236 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,992,298 UART: [rt]cmd =0x44504543, len=24
26,018,483 >>> mbox cmd response data (40 bytes)
26,019,094 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,048,909 UART: [rt]cmd =0x44504543, len=24
26,075,075 >>> mbox cmd response data (40 bytes)
26,075,701 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,105,436 UART: [rt]cmd =0x44504543, len=24
26,131,629 >>> mbox cmd response data (40 bytes)
26,132,281 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,162,250 UART: [rt]cmd =0x44504543, len=24
26,188,591 >>> mbox cmd response data (40 bytes)
26,189,197 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,218,838 UART: [rt]cmd =0x44504543, len=24
26,245,165 >>> mbox cmd response data (40 bytes)
26,245,782 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,275,668 UART: [rt]cmd =0x44504543, len=24
26,301,913 >>> mbox cmd response data (40 bytes)
26,302,539 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,332,328 UART: [rt]cmd =0x44504543, len=24
26,358,529 >>> mbox cmd response data (40 bytes)
26,359,178 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,389,027 UART: [rt]cmd =0x44504543, len=24
26,414,776 >>> mbox cmd response data (40 bytes)
26,415,373 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,445,443 UART: [rt]cmd =0x44504543, len=24
26,471,087 >>> mbox cmd response data (40 bytes)
26,471,704 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,501,762 UART: [rt]cmd =0x44504543, len=24
26,508,271 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,439,300 ready_for_fw is high
3,439,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,188 >>> mbox cmd response: success
19,023,299 UART:
19,023,695 UART: Running Caliptra FMC ...
19,024,886 UART:
19,025,062 UART: [state] CFI Enabled
19,092,047 UART: [fht] FMC Alias Private Key: 7
20,855,865 UART: [art] Extend RT PCRs Done
20,857,084 UART: [art] Lock RT PCRs Done
20,858,730 UART: [art] Populate DV Done
20,864,039 UART: [fht] FMC Alias Private Key: 7
20,865,584 UART: [art] Derive CDI
20,866,347 UART: [art] Store in in slot 0x4
20,924,477 UART: [art] Derive Key Pair
20,925,517 UART: [art] Store priv key in slot 0x5
23,388,284 UART: [art] Derive Key Pair - Done
23,400,947 UART: [art] Signing Cert with AUTHO
23,402,246 UART: RITY.KEYID = 7
25,114,474 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,009 UART: [art] PUB.X = 7F885DF538EACBBFB795A8CE56EBD3972F46927AF6D328B7BFF6F98BB368C6410A838120CC894BBA9021A50A26D19136
25,123,218 UART: [art] PUB.Y = D997370D3C0FB1FCB353F00F1A8324E0A8B6967039DCC3CA294342A5457AE129E2EA896CCFFC80BBC8B79FAE7F98433D
25,130,528 UART: [art] SIG.R = FAF63C33C9BC07D090752DA6FD813BBEF0359F964FFAD75CB9695A1BCBF331D6B85410817728989D53253E4F7A09027D
25,137,926 UART: [art] SIG.S = C69D2A289D136B601FF84313EE30BE23AF5A85F6538C0A67564FADF22320147A9D38758DC489938529853F59E70F706D
26,116,781 UART: Caliptra RT
26,117,463 UART: [state] CFI Enabled
26,281,674 UART: [rt] RT listening for mailbox commands...
26,283,725 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,314,370 UART: [rt]cmd =0x44504543, len=24
26,356,675 >>> mbox cmd response data (40 bytes)
26,357,436 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,387,418 UART: [rt]cmd =0x44504543, len=24
26,420,405 >>> mbox cmd response data (40 bytes)
26,421,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,451,063 UART: [rt]cmd =0x44504543, len=24
26,484,313 >>> mbox cmd response data (40 bytes)
26,484,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,514,705 UART: [rt]cmd =0x44504543, len=24
26,548,616 >>> mbox cmd response data (40 bytes)
26,549,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,579,096 UART: [rt]cmd =0x44504543, len=24
26,612,868 >>> mbox cmd response data (40 bytes)
26,613,527 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,643,592 UART: [rt]cmd =0x44504543, len=24
26,676,914 >>> mbox cmd response data (40 bytes)
26,677,529 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,707,452 UART: [rt]cmd =0x44504543, len=24
26,740,696 >>> mbox cmd response data (40 bytes)
26,741,319 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,771,134 UART: [rt]cmd =0x44504543, len=24
26,804,808 >>> mbox cmd response data (40 bytes)
26,805,427 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,835,398 UART: [rt]cmd =0x44504543, len=24
26,868,909 >>> mbox cmd response data (40 bytes)
26,869,589 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,899,543 UART: [rt]cmd =0x44504543, len=24
26,932,898 >>> mbox cmd response data (40 bytes)
26,933,556 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,963,674 UART: [rt]cmd =0x44504543, len=24
26,996,992 >>> mbox cmd response data (40 bytes)
26,997,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,027,465 UART: [rt]cmd =0x44504543, len=24
27,061,092 >>> mbox cmd response data (40 bytes)
27,061,716 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,091,473 UART: [rt]cmd =0x44504543, len=24
27,124,882 >>> mbox cmd response data (40 bytes)
27,125,497 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,155,288 UART: [rt]cmd =0x44504543, len=24
27,188,961 >>> mbox cmd response data (40 bytes)
27,189,607 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,219,560 UART: [rt]cmd =0x44504543, len=24
27,252,937 >>> mbox cmd response data (40 bytes)
27,253,596 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,283,172 UART: [rt]cmd =0x44504543, len=24
27,289,581 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,757,728 ready_for_fw is high
3,758,292 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,126 >>> mbox cmd response: success
19,217,438 UART:
19,217,821 UART: Running Caliptra FMC ...
19,219,018 UART:
19,219,180 UART: [state] CFI Enabled
19,227,227 UART: [fht] FMC Alias Private Key: 7
20,984,002 UART: [art] Extend RT PCRs Done
20,985,235 UART: [art] Lock RT PCRs Done
20,987,075 UART: [art] Populate DV Done
20,992,618 UART: [fht] FMC Alias Private Key: 7
20,994,133 UART: [art] Derive CDI
20,994,873 UART: [art] Store in in slot 0x4
21,037,466 UART: [art] Derive Key Pair
21,038,463 UART: [art] Store priv key in slot 0x5
23,465,270 UART: [art] Derive Key Pair - Done
23,478,519 UART: [art] Signing Cert with AUTHO
23,479,856 UART: RITY.KEYID = 7
25,185,297 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,805 UART: [art] PUB.X = 5685C2BA95CE16946C208E667FF2E5FD2CD26C568EB945B00803A78A0A95F528E7768494FBAFFBB1EC5F854345D5E4D4
25,194,103 UART: [art] PUB.Y = 8DDD1E2DC0A422CC4F61187AC0A7EA79C9D6F4C8E90CF9637E13209E9A7E41A103012E49B32D5CE28E7B008174A4CC09
25,201,329 UART: [art] SIG.R = 1249655E50977400779161AB95008113E53A5E45F054DD0DB0C9EBE38BEA90DE981EED8FEDE4AFA451651102FF97E59A
25,208,710 UART: [art] SIG.S = 6BCB66CF9EC35ED664D08370DFF6CA981C6E86FFE8D76BA4FA715EB2AB4AA99276E1865C6B7544174C6F8D7EC25E2F9D
26,187,744 UART: Caliptra RT
26,188,430 UART: [state] CFI Enabled
26,305,641 UART: [rt] RT listening for mailbox commands...
26,307,608 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,337,528 UART: [rt]cmd =0x44504543, len=24
26,363,993 >>> mbox cmd response data (40 bytes)
26,364,781 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,394,574 UART: [rt]cmd =0x44504543, len=24
26,421,307 >>> mbox cmd response data (40 bytes)
26,421,941 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,452,010 UART: [rt]cmd =0x44504543, len=24
26,477,906 >>> mbox cmd response data (40 bytes)
26,478,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,508,364 UART: [rt]cmd =0x44504543, len=24
26,534,270 >>> mbox cmd response data (40 bytes)
26,534,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,564,716 UART: [rt]cmd =0x44504543, len=24
26,590,849 >>> mbox cmd response data (40 bytes)
26,591,457 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,621,436 UART: [rt]cmd =0x44504543, len=24
26,647,876 >>> mbox cmd response data (40 bytes)
26,648,488 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,678,442 UART: [rt]cmd =0x44504543, len=24
26,704,444 >>> mbox cmd response data (40 bytes)
26,705,061 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,734,903 UART: [rt]cmd =0x44504543, len=24
26,761,139 >>> mbox cmd response data (40 bytes)
26,761,781 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,791,624 UART: [rt]cmd =0x44504543, len=24
26,818,018 >>> mbox cmd response data (40 bytes)
26,818,633 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,848,546 UART: [rt]cmd =0x44504543, len=24
26,875,139 >>> mbox cmd response data (40 bytes)
26,875,760 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,905,656 UART: [rt]cmd =0x44504543, len=24
26,931,974 >>> mbox cmd response data (40 bytes)
26,932,622 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,962,682 UART: [rt]cmd =0x44504543, len=24
26,988,920 >>> mbox cmd response data (40 bytes)
26,989,525 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,019,298 UART: [rt]cmd =0x44504543, len=24
27,045,549 >>> mbox cmd response data (40 bytes)
27,046,181 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,075,989 UART: [rt]cmd =0x44504543, len=24
27,102,160 >>> mbox cmd response data (40 bytes)
27,102,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,132,666 UART: [rt]cmd =0x44504543, len=24
27,159,237 >>> mbox cmd response data (40 bytes)
27,159,882 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,189,996 UART: [rt]cmd =0x44504543, len=24
27,196,617 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,729 UART: [kat] SHA2-256
881,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,775 UART: [kat] ++
885,927 UART: [kat] sha1
890,135 UART: [kat] SHA2-256
892,073 UART: [kat] SHA2-384
894,766 UART: [kat] SHA2-512-ACC
896,667 UART: [kat] ECC-384
902,224 UART: [kat] HMAC-384Kdf
906,886 UART: [kat] LMS
1,475,082 UART: [kat] --
1,476,045 UART: [cold-reset] ++
1,476,499 UART: [fht] Storing FHT @ 0x50003400
1,479,360 UART: [idev] ++
1,479,528 UART: [idev] CDI.KEYID = 6
1,479,888 UART: [idev] SUBJECT.KEYID = 7
1,480,312 UART: [idev] UDS.KEYID = 0
1,480,657 ready_for_fw is high
1,480,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,434 UART: [idev] Erasing UDS.KEYID = 0
1,504,860 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,338 UART: [idev] --
1,514,291 UART: [ldev] ++
1,514,459 UART: [ldev] CDI.KEYID = 6
1,514,822 UART: [ldev] SUBJECT.KEYID = 5
1,515,248 UART: [ldev] AUTHORITY.KEYID = 7
1,515,711 UART: [ldev] FE.KEYID = 1
1,520,691 UART: [ldev] Erasing FE.KEYID = 1
1,545,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,008 UART: [ldev] --
1,585,473 UART: [fwproc] Waiting for Commands...
1,586,132 UART: [fwproc] Received command 0x46574c44
1,586,923 UART: [fwproc] Received Image of size 114448 bytes
2,886,632 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,962 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,314 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,389 >>> mbox cmd response: success
3,081,479 UART: [afmc] ++
3,081,647 UART: [afmc] CDI.KEYID = 6
3,082,009 UART: [afmc] SUBJECT.KEYID = 7
3,082,434 UART: [afmc] AUTHORITY.KEYID = 5
3,118,061 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,081 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,589 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,474 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,164 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,069 UART: [afmc] --
3,161,147 UART: [cold-reset] --
3,162,229 UART: [state] Locking Datavault
3,163,414 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,018 UART: [state] Locking ICCM
3,164,462 UART: [exit] Launching FMC @ 0x40000130
3,169,791 UART:
3,169,807 UART: Running Caliptra FMC ...
3,170,215 UART:
3,170,269 UART: [state] CFI Enabled
3,180,854 UART: [fht] FMC Alias Private Key: 7
3,289,155 UART: [art] Extend RT PCRs Done
3,289,583 UART: [art] Lock RT PCRs Done
3,291,201 UART: [art] Populate DV Done
3,299,570 UART: [fht] FMC Alias Private Key: 7
3,300,708 UART: [art] Derive CDI
3,300,988 UART: [art] Store in in slot 0x4
3,386,583 UART: [art] Derive Key Pair
3,386,943 UART: [art] Store priv key in slot 0x5
3,399,989 UART: [art] Derive Key Pair - Done
3,414,556 UART: [art] Signing Cert with AUTHO
3,415,036 UART: RITY.KEYID = 7
3,430,310 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,075 UART: [art] PUB.X = 91278D5EE93159FA069B7503F2A5DB94BB5692EFCEFCB432465F6FCC340C4558D2C5892E5118A26610817218B0E292E4
3,437,836 UART: [art] PUB.Y = 01C4309A7445C424E63C22D6D5BDC00004B1C7748F60735155B30850FCD1340B99F63CF699AE15971939E4D315308248
3,444,740 UART: [art] SIG.R = DEFF36E2CF987EB4E60B1FCC90C3EABC277B0E2A01227ED7BB591EDEB82FDFA0D47971F15C56F0B34015BBA608856E5B
3,451,524 UART: [art] SIG.S = 64BC40B495A9BB9C23D1226A5949A75FB583D16EF34A402C619013B007A7AE514001934BA531E1397F4BA9F873FA4F38
3,475,049 UART: Caliptra RT
3,475,302 UART: [state] CFI Enabled
3,582,705 UART: [rt] RT listening for mailbox commands...
3,583,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,113 UART: [rt]cmd =0x44504543, len=24
3,639,054 >>> mbox cmd response data (40 bytes)
3,639,055 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,548 UART: [rt]cmd =0x44504543, len=24
3,694,661 >>> mbox cmd response data (40 bytes)
3,694,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,724,217 UART: [rt]cmd =0x44504543, len=24
3,750,326 >>> mbox cmd response data (40 bytes)
3,750,327 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,028 UART: [rt]cmd =0x44504543, len=24
3,806,269 >>> mbox cmd response data (40 bytes)
3,806,270 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,753 UART: [rt]cmd =0x44504543, len=24
3,861,974 >>> mbox cmd response data (40 bytes)
3,861,975 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,891,522 UART: [rt]cmd =0x44504543, len=24
3,918,287 >>> mbox cmd response data (40 bytes)
3,918,288 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,759 UART: [rt]cmd =0x44504543, len=24
3,974,070 >>> mbox cmd response data (40 bytes)
3,974,071 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,416 UART: [rt]cmd =0x44504543, len=24
4,029,439 >>> mbox cmd response data (40 bytes)
4,029,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,058,865 UART: [rt]cmd =0x44504543, len=24
4,084,618 >>> mbox cmd response data (40 bytes)
4,084,619 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,114,246 UART: [rt]cmd =0x44504543, len=24
4,140,893 >>> mbox cmd response data (40 bytes)
4,140,894 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,170,461 UART: [rt]cmd =0x44504543, len=24
4,196,770 >>> mbox cmd response data (40 bytes)
4,196,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,272 UART: [rt]cmd =0x44504543, len=24
4,252,365 >>> mbox cmd response data (40 bytes)
4,252,366 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,281,961 UART: [rt]cmd =0x44504543, len=24
4,308,550 >>> mbox cmd response data (40 bytes)
4,308,551 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,338,020 UART: [rt]cmd =0x44504543, len=24
4,363,961 >>> mbox cmd response data (40 bytes)
4,363,962 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,393,423 UART: [rt]cmd =0x44504543, len=24
4,419,602 >>> mbox cmd response data (40 bytes)
4,419,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,449,082 UART: [rt]cmd =0x44504543, len=24
4,456,787 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,469 ready_for_fw is high
1,362,469 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,249 >>> mbox cmd response: success
2,990,513 UART:
2,990,529 UART: Running Caliptra FMC ...
2,990,937 UART:
2,990,991 UART: [state] CFI Enabled
3,001,562 UART: [fht] FMC Alias Private Key: 7
3,109,701 UART: [art] Extend RT PCRs Done
3,110,129 UART: [art] Lock RT PCRs Done
3,111,811 UART: [art] Populate DV Done
3,120,074 UART: [fht] FMC Alias Private Key: 7
3,121,256 UART: [art] Derive CDI
3,121,536 UART: [art] Store in in slot 0x4
3,207,361 UART: [art] Derive Key Pair
3,207,721 UART: [art] Store priv key in slot 0x5
3,220,833 UART: [art] Derive Key Pair - Done
3,235,769 UART: [art] Signing Cert with AUTHO
3,236,249 UART: RITY.KEYID = 7
3,251,421 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,186 UART: [art] PUB.X = 95C2327B37D43D5C7AF9CDF303A55A8328CD19EF8DADDDFB026BB9EAD3ABC08A27A045FDD8250D24C760136829A7D83D
3,258,967 UART: [art] PUB.Y = 96C6506AD8063AEB68FE9641D79346AC212F2AF29E0D63ED7D6CB88E2A04424B07AD57935F0AF75668B37FB0C4B5F458
3,265,910 UART: [art] SIG.R = 634F972D6ACDF5296445E7415113DC6F49E0B6666D678A6D39670AA4B21C04FE65DC230A2D7A7D0878D2B002B1EB0612
3,272,664 UART: [art] SIG.S = 0631A20B67AFA87042295DE24091EF7150D406104BE526FE9ABDF4EEA8E0EA1E360D2C5BB2F57A6A287115F5E2795FC7
3,296,567 UART: Caliptra RT
3,296,820 UART: [state] CFI Enabled
3,404,328 UART: [rt] RT listening for mailbox commands...
3,404,998 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,072 UART: [rt]cmd =0x44504543, len=24
3,461,545 >>> mbox cmd response data (40 bytes)
3,461,546 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,031 UART: [rt]cmd =0x44504543, len=24
3,517,016 >>> mbox cmd response data (40 bytes)
3,517,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,546,682 UART: [rt]cmd =0x44504543, len=24
3,572,783 >>> mbox cmd response data (40 bytes)
3,572,784 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,602,305 UART: [rt]cmd =0x44504543, len=24
3,628,584 >>> mbox cmd response data (40 bytes)
3,628,585 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,658,426 UART: [rt]cmd =0x44504543, len=24
3,684,189 >>> mbox cmd response data (40 bytes)
3,684,190 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,721 UART: [rt]cmd =0x44504543, len=24
3,740,494 >>> mbox cmd response data (40 bytes)
3,740,495 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,976 UART: [rt]cmd =0x44504543, len=24
3,796,677 >>> mbox cmd response data (40 bytes)
3,796,678 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,105 UART: [rt]cmd =0x44504543, len=24
3,851,920 >>> mbox cmd response data (40 bytes)
3,851,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,320 UART: [rt]cmd =0x44504543, len=24
3,907,257 >>> mbox cmd response data (40 bytes)
3,907,258 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,743 UART: [rt]cmd =0x44504543, len=24
3,962,618 >>> mbox cmd response data (40 bytes)
3,962,619 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,992,152 UART: [rt]cmd =0x44504543, len=24
4,018,391 >>> mbox cmd response data (40 bytes)
4,018,392 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,815 UART: [rt]cmd =0x44504543, len=24
4,074,290 >>> mbox cmd response data (40 bytes)
4,074,291 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,103,896 UART: [rt]cmd =0x44504543, len=24
4,130,763 >>> mbox cmd response data (40 bytes)
4,130,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,160,299 UART: [rt]cmd =0x44504543, len=24
4,186,538 >>> mbox cmd response data (40 bytes)
4,186,539 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,215,950 UART: [rt]cmd =0x44504543, len=24
4,241,769 >>> mbox cmd response data (40 bytes)
4,241,770 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,383 UART: [rt]cmd =0x44504543, len=24
4,278,594 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,194 UART: [kat] SHA2-256
882,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,240 UART: [kat] ++
886,392 UART: [kat] sha1
890,670 UART: [kat] SHA2-256
892,608 UART: [kat] SHA2-384
895,253 UART: [kat] SHA2-512-ACC
897,154 UART: [kat] ECC-384
902,903 UART: [kat] HMAC-384Kdf
907,565 UART: [kat] LMS
1,475,761 UART: [kat] --
1,476,678 UART: [cold-reset] ++
1,477,226 UART: [fht] Storing FHT @ 0x50003400
1,479,925 UART: [idev] ++
1,480,093 UART: [idev] CDI.KEYID = 6
1,480,453 UART: [idev] SUBJECT.KEYID = 7
1,480,877 UART: [idev] UDS.KEYID = 0
1,481,222 ready_for_fw is high
1,481,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,055 UART: [idev] Erasing UDS.KEYID = 0
1,505,661 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,311 UART: [idev] --
1,515,486 UART: [ldev] ++
1,515,654 UART: [ldev] CDI.KEYID = 6
1,516,017 UART: [ldev] SUBJECT.KEYID = 5
1,516,443 UART: [ldev] AUTHORITY.KEYID = 7
1,516,906 UART: [ldev] FE.KEYID = 1
1,522,414 UART: [ldev] Erasing FE.KEYID = 1
1,548,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,471 UART: [ldev] --
1,587,900 UART: [fwproc] Waiting for Commands...
1,588,715 UART: [fwproc] Received command 0x46574c44
1,589,506 UART: [fwproc] Received Image of size 114448 bytes
2,888,591 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,285 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,637 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,574 >>> mbox cmd response: success
3,082,774 UART: [afmc] ++
3,082,942 UART: [afmc] CDI.KEYID = 6
3,083,304 UART: [afmc] SUBJECT.KEYID = 7
3,083,729 UART: [afmc] AUTHORITY.KEYID = 5
3,119,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,784 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,292 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,177 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,867 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,654 UART: [afmc] --
3,162,668 UART: [cold-reset] --
3,163,270 UART: [state] Locking Datavault
3,164,417 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,021 UART: [state] Locking ICCM
3,165,657 UART: [exit] Launching FMC @ 0x40000130
3,170,986 UART:
3,171,002 UART: Running Caliptra FMC ...
3,171,410 UART:
3,171,553 UART: [state] CFI Enabled
3,182,028 UART: [fht] FMC Alias Private Key: 7
3,291,133 UART: [art] Extend RT PCRs Done
3,291,561 UART: [art] Lock RT PCRs Done
3,293,047 UART: [art] Populate DV Done
3,301,422 UART: [fht] FMC Alias Private Key: 7
3,302,560 UART: [art] Derive CDI
3,302,840 UART: [art] Store in in slot 0x4
3,388,515 UART: [art] Derive Key Pair
3,388,875 UART: [art] Store priv key in slot 0x5
3,401,845 UART: [art] Derive Key Pair - Done
3,416,795 UART: [art] Signing Cert with AUTHO
3,417,275 UART: RITY.KEYID = 7
3,432,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,594 UART: [art] PUB.X = 46BC504F8C041E06929FE0261C4A193FD150DA456D298C068CFDCB004B45EF1BE2534B8BAF5707BD6B78D2FF0F043381
3,440,334 UART: [art] PUB.Y = EA1DEE08C58637570A792A7A505FD40AE71A738D8183B383E8000E83769EFCDDCCBBD43AB1C929AAD44D6AF60C96D947
3,447,263 UART: [art] SIG.R = 1C875BB553B1E91730B9A86F79AB6604DE3FC062F7369E2BBA7634583803CC722FEB25B22ED3E32C6271EAD6356540BF
3,454,033 UART: [art] SIG.S = 1ADD47364DA42D848D95CEE02337A855ACA46DEC0B853892C780C60E00E1E76736F8471AC46D350E43E0727CD8D585F6
3,477,563 UART: Caliptra RT
3,477,908 UART: [state] CFI Enabled
3,586,160 UART: [rt] RT listening for mailbox commands...
3,586,830 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,778 UART: [rt]cmd =0x44504543, len=24
3,643,149 >>> mbox cmd response data (40 bytes)
3,643,150 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,375 UART: [rt]cmd =0x44504543, len=24
3,699,158 >>> mbox cmd response data (40 bytes)
3,699,159 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,728,552 UART: [rt]cmd =0x44504543, len=24
3,754,853 >>> mbox cmd response data (40 bytes)
3,754,854 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,495 UART: [rt]cmd =0x44504543, len=24
3,811,360 >>> mbox cmd response data (40 bytes)
3,811,361 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,046 UART: [rt]cmd =0x44504543, len=24
3,867,335 >>> mbox cmd response data (40 bytes)
3,867,336 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,897,003 UART: [rt]cmd =0x44504543, len=24
3,923,896 >>> mbox cmd response data (40 bytes)
3,923,897 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,486 UART: [rt]cmd =0x44504543, len=24
3,979,733 >>> mbox cmd response data (40 bytes)
3,979,734 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,009,033 UART: [rt]cmd =0x44504543, len=24
4,035,750 >>> mbox cmd response data (40 bytes)
4,035,751 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,190 UART: [rt]cmd =0x44504543, len=24
4,091,663 >>> mbox cmd response data (40 bytes)
4,091,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,121,055 UART: [rt]cmd =0x44504543, len=24
4,147,218 >>> mbox cmd response data (40 bytes)
4,147,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,176,654 UART: [rt]cmd =0x44504543, len=24
4,203,289 >>> mbox cmd response data (40 bytes)
4,203,290 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,232,569 UART: [rt]cmd =0x44504543, len=24
4,258,888 >>> mbox cmd response data (40 bytes)
4,258,889 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,288,436 UART: [rt]cmd =0x44504543, len=24
4,314,345 >>> mbox cmd response data (40 bytes)
4,314,346 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,343,747 UART: [rt]cmd =0x44504543, len=24
4,370,064 >>> mbox cmd response data (40 bytes)
4,370,065 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,399,682 UART: [rt]cmd =0x44504543, len=24
4,426,353 >>> mbox cmd response data (40 bytes)
4,426,354 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,455,863 UART: [rt]cmd =0x44504543, len=24
4,463,360 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,616 ready_for_fw is high
1,362,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,736 >>> mbox cmd response: success
2,991,054 UART:
2,991,070 UART: Running Caliptra FMC ...
2,991,478 UART:
2,991,621 UART: [state] CFI Enabled
3,001,824 UART: [fht] FMC Alias Private Key: 7
3,110,155 UART: [art] Extend RT PCRs Done
3,110,583 UART: [art] Lock RT PCRs Done
3,112,225 UART: [art] Populate DV Done
3,120,260 UART: [fht] FMC Alias Private Key: 7
3,121,350 UART: [art] Derive CDI
3,121,630 UART: [art] Store in in slot 0x4
3,207,089 UART: [art] Derive Key Pair
3,207,449 UART: [art] Store priv key in slot 0x5
3,220,371 UART: [art] Derive Key Pair - Done
3,235,309 UART: [art] Signing Cert with AUTHO
3,235,789 UART: RITY.KEYID = 7
3,251,131 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,896 UART: [art] PUB.X = 4CCB2E1FD30BEB7AC2070AC0451161FBD03E864559C763B38FFF3864FDA04B42FE0B7214DFFD99F9E4F3E3833F1E93CC
3,258,674 UART: [art] PUB.Y = 52B5542BF6F1C072304AF64C9E9E225271E109491D31ABB7325D7B8751859A9E123DA45A4A818CCD51BD728E6A440954
3,265,616 UART: [art] SIG.R = D687F4CE7A7657AC12E3A99811E94DD63CFD79D5EAA5FC67DF1E8B11F511A863D1A8133C3D10B6034A89649FECDC43DB
3,272,401 UART: [art] SIG.S = 5DC92CC311100228466FEA14AB492CA0CFBECC68722A20E923D1B9FA543008F23B8DFAEAD166169A5585E3577F469362
3,296,044 UART: Caliptra RT
3,296,389 UART: [state] CFI Enabled
3,404,444 UART: [rt] RT listening for mailbox commands...
3,405,114 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,206 UART: [rt]cmd =0x44504543, len=24
3,461,513 >>> mbox cmd response data (40 bytes)
3,461,514 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,857 UART: [rt]cmd =0x44504543, len=24
3,517,382 >>> mbox cmd response data (40 bytes)
3,517,383 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,547,066 UART: [rt]cmd =0x44504543, len=24
3,573,001 >>> mbox cmd response data (40 bytes)
3,573,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,602,323 UART: [rt]cmd =0x44504543, len=24
3,628,822 >>> mbox cmd response data (40 bytes)
3,628,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,658,350 UART: [rt]cmd =0x44504543, len=24
3,684,431 >>> mbox cmd response data (40 bytes)
3,684,432 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,817 UART: [rt]cmd =0x44504543, len=24
3,740,310 >>> mbox cmd response data (40 bytes)
3,740,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,876 UART: [rt]cmd =0x44504543, len=24
3,795,995 >>> mbox cmd response data (40 bytes)
3,795,996 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,323 UART: [rt]cmd =0x44504543, len=24
3,851,294 >>> mbox cmd response data (40 bytes)
3,851,295 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,724 UART: [rt]cmd =0x44504543, len=24
3,906,753 >>> mbox cmd response data (40 bytes)
3,906,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,199 UART: [rt]cmd =0x44504543, len=24
3,962,868 >>> mbox cmd response data (40 bytes)
3,962,869 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,992,308 UART: [rt]cmd =0x44504543, len=24
4,018,853 >>> mbox cmd response data (40 bytes)
4,018,854 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,399 UART: [rt]cmd =0x44504543, len=24
4,074,780 >>> mbox cmd response data (40 bytes)
4,074,781 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,104,142 UART: [rt]cmd =0x44504543, len=24
4,130,073 >>> mbox cmd response data (40 bytes)
4,130,074 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,159,617 UART: [rt]cmd =0x44504543, len=24
4,185,802 >>> mbox cmd response data (40 bytes)
4,185,803 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,215,292 UART: [rt]cmd =0x44504543, len=24
4,241,011 >>> mbox cmd response data (40 bytes)
4,241,012 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,631 UART: [rt]cmd =0x44504543, len=24
4,277,820 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
893,168 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,293 UART: [kat] ++
897,445 UART: [kat] sha1
901,779 UART: [kat] SHA2-256
903,719 UART: [kat] SHA2-384
906,420 UART: [kat] SHA2-512-ACC
908,321 UART: [kat] ECC-384
917,746 UART: [kat] HMAC-384Kdf
922,252 UART: [kat] LMS
1,170,580 UART: [kat] --
1,171,313 UART: [cold-reset] ++
1,171,871 UART: [fht] FHT @ 0x50003400
1,174,378 UART: [idev] ++
1,174,546 UART: [idev] CDI.KEYID = 6
1,174,906 UART: [idev] SUBJECT.KEYID = 7
1,175,330 UART: [idev] UDS.KEYID = 0
1,175,675 ready_for_fw is high
1,175,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,500 UART: [idev] Erasing UDS.KEYID = 0
1,200,641 UART: [idev] Sha1 KeyId Algorithm
1,209,151 UART: [idev] --
1,210,185 UART: [ldev] ++
1,210,353 UART: [ldev] CDI.KEYID = 6
1,210,716 UART: [ldev] SUBJECT.KEYID = 5
1,211,142 UART: [ldev] AUTHORITY.KEYID = 7
1,211,605 UART: [ldev] FE.KEYID = 1
1,216,735 UART: [ldev] Erasing FE.KEYID = 1
1,242,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,509 UART: [ldev] --
1,281,830 UART: [fwproc] Wait for Commands...
1,282,622 UART: [fwproc] Recv command 0x46574c44
1,283,350 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,146 >>> mbox cmd response: success
2,775,336 UART: [afmc] ++
2,775,504 UART: [afmc] CDI.KEYID = 6
2,775,866 UART: [afmc] SUBJECT.KEYID = 7
2,776,291 UART: [afmc] AUTHORITY.KEYID = 5
2,811,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,699 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,427 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,312 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,031 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,787 UART: [afmc] --
2,854,795 UART: [cold-reset] --
2,855,455 UART: [state] Locking Datavault
2,856,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,006 UART: [state] Locking ICCM
2,857,554 UART: [exit] Launching FMC @ 0x40000130
2,862,883 UART:
2,862,899 UART: Running Caliptra FMC ...
2,863,307 UART:
2,863,361 UART: [state] CFI Enabled
2,873,904 UART: [fht] FMC Alias Private Key: 7
2,981,931 UART: [art] Extend RT PCRs Done
2,982,359 UART: [art] Lock RT PCRs Done
2,983,829 UART: [art] Populate DV Done
2,992,010 UART: [fht] FMC Alias Private Key: 7
2,993,162 UART: [art] Derive CDI
2,993,442 UART: [art] Store in in slot 0x4
3,078,819 UART: [art] Derive Key Pair
3,079,179 UART: [art] Store priv key in slot 0x5
3,092,679 UART: [art] Derive Key Pair - Done
3,107,748 UART: [art] Signing Cert with AUTHO
3,108,228 UART: RITY.KEYID = 7
3,123,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,823 UART: [art] PUB.X = CEF526BFA698733DEF05FF8D883DDF03B201F22D7EE9734B6D2C4A2C38AE67886164173037A82822C50A635DFF73BF56
3,130,589 UART: [art] PUB.Y = FEAA2E11797301BA852EA13A68657D60AEF359061EA800EDC476FDFCF1ABD4567EEE25E9E745CA50D10384F274FB8B98
3,137,524 UART: [art] SIG.R = 2C2F8F253C296A929EB1DFFD35E5879C513983A3C89B844FA603EF2CFD5175009719FD31895A4910919CFCB3C0999EEC
3,144,275 UART: [art] SIG.S = 35A39298C62B8F30AA94B73EDD04B1A8B3C4A76570FFE388B53C45B32AC8CBD69565EA5A8ADF2F0C5F1EAF34387F171E
3,167,744 UART: Caliptra RT
3,167,997 UART: [state] CFI Enabled
3,276,574 UART: [rt] RT listening for mailbox commands...
3,277,244 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,196 UART: [rt]cmd =0x44504543, len=24
3,333,827 >>> mbox cmd response data (40 bytes)
3,333,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,361 UART: [rt]cmd =0x44504543, len=24
3,389,546 >>> mbox cmd response data (40 bytes)
3,389,547 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,032 UART: [rt]cmd =0x44504543, len=24
3,445,733 >>> mbox cmd response data (40 bytes)
3,445,734 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,307 UART: [rt]cmd =0x44504543, len=24
3,501,822 >>> mbox cmd response data (40 bytes)
3,501,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,374 UART: [rt]cmd =0x44504543, len=24
3,557,327 >>> mbox cmd response data (40 bytes)
3,557,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,893 UART: [rt]cmd =0x44504543, len=24
3,613,474 >>> mbox cmd response data (40 bytes)
3,613,475 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,066 UART: [rt]cmd =0x44504543, len=24
3,669,845 >>> mbox cmd response data (40 bytes)
3,669,846 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,413 UART: [rt]cmd =0x44504543, len=24
3,725,472 >>> mbox cmd response data (40 bytes)
3,725,473 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,266 UART: [rt]cmd =0x44504543, len=24
3,781,627 >>> mbox cmd response data (40 bytes)
3,781,628 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,193 UART: [rt]cmd =0x44504543, len=24
3,837,476 >>> mbox cmd response data (40 bytes)
3,837,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,952 UART: [rt]cmd =0x44504543, len=24
3,893,079 >>> mbox cmd response data (40 bytes)
3,893,080 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,922,623 UART: [rt]cmd =0x44504543, len=24
3,948,666 >>> mbox cmd response data (40 bytes)
3,948,667 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,978,120 UART: [rt]cmd =0x44504543, len=24
4,004,741 >>> mbox cmd response data (40 bytes)
4,004,742 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,034,283 UART: [rt]cmd =0x44504543, len=24
4,060,694 >>> mbox cmd response data (40 bytes)
4,060,695 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,089,898 UART: [rt]cmd =0x44504543, len=24
4,116,065 >>> mbox cmd response data (40 bytes)
4,116,066 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,145,569 UART: [rt]cmd =0x44504543, len=24
4,152,950 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,339 ready_for_fw is high
1,060,339 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,651 >>> mbox cmd response: success
2,689,621 UART:
2,689,637 UART: Running Caliptra FMC ...
2,690,045 UART:
2,690,099 UART: [state] CFI Enabled
2,700,970 UART: [fht] FMC Alias Private Key: 7
2,808,703 UART: [art] Extend RT PCRs Done
2,809,131 UART: [art] Lock RT PCRs Done
2,810,763 UART: [art] Populate DV Done
2,819,058 UART: [fht] FMC Alias Private Key: 7
2,820,190 UART: [art] Derive CDI
2,820,470 UART: [art] Store in in slot 0x4
2,905,739 UART: [art] Derive Key Pair
2,906,099 UART: [art] Store priv key in slot 0x5
2,919,507 UART: [art] Derive Key Pair - Done
2,934,100 UART: [art] Signing Cert with AUTHO
2,934,580 UART: RITY.KEYID = 7
2,950,184 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,949 UART: [art] PUB.X = B6C35656FBE37A86AAC4DA33FB6412C92ACF69DE20D36953531AC3FD33AB58EA2399314E64A8FF2C5C3F78357B8FD6E2
2,957,735 UART: [art] PUB.Y = 550BB9E841CA0AF71DB91BE5FF0CB055C24E522017DC655A045EA82125E49CC951EC2D0621DB9A2BE4F3AC1D1A268EA0
2,964,688 UART: [art] SIG.R = 46CF9C458CF88C8A1DFE1806788FF26AE127F04F1892421A2B55988D86B42272EBD28A188AB30D23C4119975DD7857D4
2,971,452 UART: [art] SIG.S = 3FC39CA0DB0A90FC298BDF05A89AD1FD04FA8C48FA2F606A6CDF2DB076E0DB184243CC4C7A149689FB5F10A37D6DB0E2
2,995,284 UART: Caliptra RT
2,995,537 UART: [state] CFI Enabled
3,103,770 UART: [rt] RT listening for mailbox commands...
3,104,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,466 UART: [rt]cmd =0x44504543, len=24
3,160,979 >>> mbox cmd response data (40 bytes)
3,160,980 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,261 UART: [rt]cmd =0x44504543, len=24
3,217,112 >>> mbox cmd response data (40 bytes)
3,217,113 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,246,606 UART: [rt]cmd =0x44504543, len=24
3,272,673 >>> mbox cmd response data (40 bytes)
3,272,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,315 UART: [rt]cmd =0x44504543, len=24
3,329,066 >>> mbox cmd response data (40 bytes)
3,329,067 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,476 UART: [rt]cmd =0x44504543, len=24
3,384,957 >>> mbox cmd response data (40 bytes)
3,384,958 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,691 UART: [rt]cmd =0x44504543, len=24
3,441,128 >>> mbox cmd response data (40 bytes)
3,441,129 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,726 UART: [rt]cmd =0x44504543, len=24
3,496,973 >>> mbox cmd response data (40 bytes)
3,496,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,475 UART: [rt]cmd =0x44504543, len=24
3,552,866 >>> mbox cmd response data (40 bytes)
3,552,867 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,274 UART: [rt]cmd =0x44504543, len=24
3,608,561 >>> mbox cmd response data (40 bytes)
3,608,562 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,005 UART: [rt]cmd =0x44504543, len=24
3,664,364 >>> mbox cmd response data (40 bytes)
3,664,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,986 UART: [rt]cmd =0x44504543, len=24
3,720,191 >>> mbox cmd response data (40 bytes)
3,720,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,947 UART: [rt]cmd =0x44504543, len=24
3,776,754 >>> mbox cmd response data (40 bytes)
3,776,755 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,380 UART: [rt]cmd =0x44504543, len=24
3,832,451 >>> mbox cmd response data (40 bytes)
3,832,452 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,675 UART: [rt]cmd =0x44504543, len=24
3,888,204 >>> mbox cmd response data (40 bytes)
3,888,205 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,858 UART: [rt]cmd =0x44504543, len=24
3,944,071 >>> mbox cmd response data (40 bytes)
3,944,072 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,757 UART: [rt]cmd =0x44504543, len=24
3,981,142 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,912 UART: [kat] SHA2-256
903,852 UART: [kat] SHA2-384
906,765 UART: [kat] SHA2-512-ACC
908,666 UART: [kat] ECC-384
918,225 UART: [kat] HMAC-384Kdf
922,931 UART: [kat] LMS
1,171,259 UART: [kat] --
1,171,994 UART: [cold-reset] ++
1,172,434 UART: [fht] FHT @ 0x50003400
1,175,055 UART: [idev] ++
1,175,223 UART: [idev] CDI.KEYID = 6
1,175,583 UART: [idev] SUBJECT.KEYID = 7
1,176,007 UART: [idev] UDS.KEYID = 0
1,176,352 ready_for_fw is high
1,176,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,769 UART: [idev] Erasing UDS.KEYID = 0
1,200,674 UART: [idev] Sha1 KeyId Algorithm
1,208,994 UART: [idev] --
1,210,000 UART: [ldev] ++
1,210,168 UART: [ldev] CDI.KEYID = 6
1,210,531 UART: [ldev] SUBJECT.KEYID = 5
1,210,957 UART: [ldev] AUTHORITY.KEYID = 7
1,211,420 UART: [ldev] FE.KEYID = 1
1,216,954 UART: [ldev] Erasing FE.KEYID = 1
1,243,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,150 UART: [ldev] --
1,282,645 UART: [fwproc] Wait for Commands...
1,283,241 UART: [fwproc] Recv command 0x46574c44
1,283,969 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,108 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,412 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,425 >>> mbox cmd response: success
2,777,639 UART: [afmc] ++
2,777,807 UART: [afmc] CDI.KEYID = 6
2,778,169 UART: [afmc] SUBJECT.KEYID = 7
2,778,594 UART: [afmc] AUTHORITY.KEYID = 5
2,814,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,158 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,043 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,762 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,472 UART: [afmc] --
2,858,582 UART: [cold-reset] --
2,859,420 UART: [state] Locking Datavault
2,860,609 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,213 UART: [state] Locking ICCM
2,861,795 UART: [exit] Launching FMC @ 0x40000130
2,867,124 UART:
2,867,140 UART: Running Caliptra FMC ...
2,867,548 UART:
2,867,691 UART: [state] CFI Enabled
2,878,564 UART: [fht] FMC Alias Private Key: 7
2,986,573 UART: [art] Extend RT PCRs Done
2,987,001 UART: [art] Lock RT PCRs Done
2,988,457 UART: [art] Populate DV Done
2,996,446 UART: [fht] FMC Alias Private Key: 7
2,997,576 UART: [art] Derive CDI
2,997,856 UART: [art] Store in in slot 0x4
3,083,585 UART: [art] Derive Key Pair
3,083,945 UART: [art] Store priv key in slot 0x5
3,096,645 UART: [art] Derive Key Pair - Done
3,111,373 UART: [art] Signing Cert with AUTHO
3,111,853 UART: RITY.KEYID = 7
3,127,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,854 UART: [art] PUB.X = C6B7C4411430227FF82C29340901FF0C5E5C27E0E4D268A57BF62ABFD292BF5D9EFA49777E2A3E6C5DD5ABD76C66D2CB
3,134,633 UART: [art] PUB.Y = 3DB7618642A3A7D10ED24F551DC3188E81A03C7F79B25B34898FFDF3C3BE21123E7C49E9C07837D9D4DEBFE5C7E55C93
3,141,592 UART: [art] SIG.R = C668C16B2E820D6592D2A619E203902572E4C5B3E72435BEB34EBD5AA16A06B729BA759AFB14D0798A43B3E9B1BCDA5B
3,148,365 UART: [art] SIG.S = CC1AADE78DD338AC1FC8F577F681856755594DB9C0B4CA7C948AB92ACD4DF7B678F950B2E4EE589E4738D82A29797D76
3,172,222 UART: Caliptra RT
3,172,567 UART: [state] CFI Enabled
3,280,047 UART: [rt] RT listening for mailbox commands...
3,280,717 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,595 UART: [rt]cmd =0x44504543, len=24
3,337,198 >>> mbox cmd response data (40 bytes)
3,337,199 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,826 UART: [rt]cmd =0x44504543, len=24
3,393,121 >>> mbox cmd response data (40 bytes)
3,393,122 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,422,589 UART: [rt]cmd =0x44504543, len=24
3,448,910 >>> mbox cmd response data (40 bytes)
3,448,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,374 UART: [rt]cmd =0x44504543, len=24
3,504,731 >>> mbox cmd response data (40 bytes)
3,504,732 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,295 UART: [rt]cmd =0x44504543, len=24
3,560,532 >>> mbox cmd response data (40 bytes)
3,560,533 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,918 UART: [rt]cmd =0x44504543, len=24
3,615,683 >>> mbox cmd response data (40 bytes)
3,615,684 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,169 UART: [rt]cmd =0x44504543, len=24
3,672,036 >>> mbox cmd response data (40 bytes)
3,672,037 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,834 UART: [rt]cmd =0x44504543, len=24
3,728,635 >>> mbox cmd response data (40 bytes)
3,728,636 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,179 UART: [rt]cmd =0x44504543, len=24
3,784,344 >>> mbox cmd response data (40 bytes)
3,784,345 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,022 UART: [rt]cmd =0x44504543, len=24
3,840,387 >>> mbox cmd response data (40 bytes)
3,840,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,869,903 UART: [rt]cmd =0x44504543, len=24
3,896,348 >>> mbox cmd response data (40 bytes)
3,896,349 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,925,722 UART: [rt]cmd =0x44504543, len=24
3,952,449 >>> mbox cmd response data (40 bytes)
3,952,450 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,981,977 UART: [rt]cmd =0x44504543, len=24
4,008,420 >>> mbox cmd response data (40 bytes)
4,008,421 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,038,014 UART: [rt]cmd =0x44504543, len=24
4,064,651 >>> mbox cmd response data (40 bytes)
4,064,652 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,895 UART: [rt]cmd =0x44504543, len=24
4,120,602 >>> mbox cmd response data (40 bytes)
4,120,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,870 UART: [rt]cmd =0x44504543, len=24
4,156,815 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,298 ready_for_fw is high
1,060,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,188 >>> mbox cmd response: success
2,690,560 UART:
2,690,576 UART: Running Caliptra FMC ...
2,690,984 UART:
2,691,127 UART: [state] CFI Enabled
2,701,834 UART: [fht] FMC Alias Private Key: 7
2,809,607 UART: [art] Extend RT PCRs Done
2,810,035 UART: [art] Lock RT PCRs Done
2,811,581 UART: [art] Populate DV Done
2,819,706 UART: [fht] FMC Alias Private Key: 7
2,820,692 UART: [art] Derive CDI
2,820,972 UART: [art] Store in in slot 0x4
2,906,809 UART: [art] Derive Key Pair
2,907,169 UART: [art] Store priv key in slot 0x5
2,919,589 UART: [art] Derive Key Pair - Done
2,934,229 UART: [art] Signing Cert with AUTHO
2,934,709 UART: RITY.KEYID = 7
2,950,115 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,880 UART: [art] PUB.X = CDD353552965742E6E8371715EBADC7C24CFDEBA167E0A422A3297AC09D69E0D9073F84190B951A44CE75D6189C0C1DE
2,957,649 UART: [art] PUB.Y = 7A89AA3EEDE9860A11FD38783A8F81B7EE6B7E13B9DA59929505462AC95B33094E1912C15C92492006E8A9EE1348D099
2,964,587 UART: [art] SIG.R = 93B1A2534F4FA2E449DD6089A94CDB00F579680695466C426FE71FEA6A7184654EB70AE4C4C82FAFF1452ABA571159CE
2,971,337 UART: [art] SIG.S = C011B005C2A72194F662C71D7C4725B0DD853044F62E6C28C52BCEE5243E764510EEEE662B8C3B2CD93CCFF289A5E7FE
2,995,081 UART: Caliptra RT
2,995,426 UART: [state] CFI Enabled
3,102,874 UART: [rt] RT listening for mailbox commands...
3,103,544 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,460 UART: [rt]cmd =0x44504543, len=24
3,160,045 >>> mbox cmd response data (40 bytes)
3,160,046 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,441 UART: [rt]cmd =0x44504543, len=24
3,215,398 >>> mbox cmd response data (40 bytes)
3,215,399 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,244,694 UART: [rt]cmd =0x44504543, len=24
3,271,015 >>> mbox cmd response data (40 bytes)
3,271,016 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,395 UART: [rt]cmd =0x44504543, len=24
3,326,716 >>> mbox cmd response data (40 bytes)
3,326,717 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,286 UART: [rt]cmd =0x44504543, len=24
3,382,535 >>> mbox cmd response data (40 bytes)
3,382,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,412,107 UART: [rt]cmd =0x44504543, len=24
3,438,588 >>> mbox cmd response data (40 bytes)
3,438,589 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,008 UART: [rt]cmd =0x44504543, len=24
3,494,699 >>> mbox cmd response data (40 bytes)
3,494,700 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,047 UART: [rt]cmd =0x44504543, len=24
3,550,468 >>> mbox cmd response data (40 bytes)
3,550,469 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,956 UART: [rt]cmd =0x44504543, len=24
3,606,089 >>> mbox cmd response data (40 bytes)
3,606,090 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,679 UART: [rt]cmd =0x44504543, len=24
3,661,620 >>> mbox cmd response data (40 bytes)
3,661,621 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,948 UART: [rt]cmd =0x44504543, len=24
3,717,635 >>> mbox cmd response data (40 bytes)
3,717,636 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,747,153 UART: [rt]cmd =0x44504543, len=24
3,773,472 >>> mbox cmd response data (40 bytes)
3,773,473 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,803,080 UART: [rt]cmd =0x44504543, len=24
3,829,415 >>> mbox cmd response data (40 bytes)
3,829,416 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,883 UART: [rt]cmd =0x44504543, len=24
3,885,116 >>> mbox cmd response data (40 bytes)
3,885,117 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,656 UART: [rt]cmd =0x44504543, len=24
3,940,803 >>> mbox cmd response data (40 bytes)
3,940,804 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,333 UART: [rt]cmd =0x44504543, len=24
3,977,652 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,360 UART: [kat] LMS
1,168,672 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,169,873 UART: [fht] FHT @ 0x50003400
1,172,517 UART: [idev] ++
1,172,685 UART: [idev] CDI.KEYID = 6
1,173,046 UART: [idev] SUBJECT.KEYID = 7
1,173,471 UART: [idev] UDS.KEYID = 0
1,173,817 ready_for_fw is high
1,173,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,093 UART: [idev] Sha1 KeyId Algorithm
1,206,939 UART: [idev] --
1,207,830 UART: [ldev] ++
1,207,998 UART: [ldev] CDI.KEYID = 6
1,208,362 UART: [ldev] SUBJECT.KEYID = 5
1,208,789 UART: [ldev] AUTHORITY.KEYID = 7
1,209,252 UART: [ldev] FE.KEYID = 1
1,214,236 UART: [ldev] Erasing FE.KEYID = 1
1,240,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,446 UART: [ldev] --
1,279,868 UART: [fwproc] Wait for Commands...
1,280,475 UART: [fwproc] Recv command 0x46574c44
1,281,208 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,691 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,048 >>> mbox cmd response: success
2,774,193 UART: [afmc] ++
2,774,361 UART: [afmc] CDI.KEYID = 6
2,774,724 UART: [afmc] SUBJECT.KEYID = 7
2,775,150 UART: [afmc] AUTHORITY.KEYID = 5
2,810,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,538 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,257 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,996 UART: [afmc] --
2,854,014 UART: [cold-reset] --
2,854,868 UART: [state] Locking Datavault
2,856,009 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,613 UART: [state] Locking ICCM
2,857,201 UART: [exit] Launching FMC @ 0x40000130
2,862,530 UART:
2,862,546 UART: Running Caliptra FMC ...
2,862,954 UART:
2,863,008 UART: [state] CFI Enabled
2,873,657 UART: [fht] FMC Alias Private Key: 7
2,981,958 UART: [art] Extend RT PCRs Done
2,982,386 UART: [art] Lock RT PCRs Done
2,984,108 UART: [art] Populate DV Done
2,992,299 UART: [fht] FMC Alias Private Key: 7
2,993,425 UART: [art] Derive CDI
2,993,705 UART: [art] Store in in slot 0x4
3,079,558 UART: [art] Derive Key Pair
3,079,918 UART: [art] Store priv key in slot 0x5
3,092,572 UART: [art] Derive Key Pair - Done
3,107,539 UART: [art] Signing Cert with AUTHO
3,108,019 UART: RITY.KEYID = 7
3,123,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,774 UART: [art] PUB.X = F2571A0254A6D083C3D61F285B8A330521FFABE17E76E5D4F5D5CE475A787EAD8553158EC1AEED43182CC49944DD315F
3,130,548 UART: [art] PUB.Y = 3C2E205FC172C6655D15086ABFF4A2CB032A37CE9239E5FD7D83649EBC6A5A65C99C6DC01BCA05B52D64DC326D074F88
3,137,500 UART: [art] SIG.R = A747275396771FD323493BC39A9539CA4570F0EB409A07575714783849C270B36F3913912DA4B6E69959FCCAEA444BC0
3,144,259 UART: [art] SIG.S = D13D177B17AD1DAD4AC090F910CC933495B763FB8D30BE07590C8748FD501A161CEAF9CB2274A22F0FA185FBD045ED5D
3,167,967 UART: Caliptra RT
3,168,220 UART: [state] CFI Enabled
3,275,388 UART: [rt] RT listening for mailbox commands...
3,276,058 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,334 UART: [rt]cmd =0x44504543, len=24
3,332,461 >>> mbox cmd response data (40 bytes)
3,332,462 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,901 UART: [rt]cmd =0x44504543, len=24
3,387,976 >>> mbox cmd response data (40 bytes)
3,387,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,474 UART: [rt]cmd =0x44504543, len=24
3,443,861 >>> mbox cmd response data (40 bytes)
3,443,862 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,433 UART: [rt]cmd =0x44504543, len=24
3,499,362 >>> mbox cmd response data (40 bytes)
3,499,363 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,808 UART: [rt]cmd =0x44504543, len=24
3,555,253 >>> mbox cmd response data (40 bytes)
3,555,254 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,729 UART: [rt]cmd =0x44504543, len=24
3,611,034 >>> mbox cmd response data (40 bytes)
3,611,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,510 UART: [rt]cmd =0x44504543, len=24
3,666,959 >>> mbox cmd response data (40 bytes)
3,666,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,323 UART: [rt]cmd =0x44504543, len=24
3,722,608 >>> mbox cmd response data (40 bytes)
3,722,609 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,282 UART: [rt]cmd =0x44504543, len=24
3,778,665 >>> mbox cmd response data (40 bytes)
3,778,666 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,323 UART: [rt]cmd =0x44504543, len=24
3,834,742 >>> mbox cmd response data (40 bytes)
3,834,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,514 UART: [rt]cmd =0x44504543, len=24
3,890,883 >>> mbox cmd response data (40 bytes)
3,890,884 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,577 UART: [rt]cmd =0x44504543, len=24
3,946,890 >>> mbox cmd response data (40 bytes)
3,946,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,516 UART: [rt]cmd =0x44504543, len=24
4,002,575 >>> mbox cmd response data (40 bytes)
4,002,576 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,031,989 UART: [rt]cmd =0x44504543, len=24
4,058,430 >>> mbox cmd response data (40 bytes)
4,058,431 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,738 UART: [rt]cmd =0x44504543, len=24
4,113,939 >>> mbox cmd response data (40 bytes)
4,113,940 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,567 UART: [rt]cmd =0x44504543, len=24
4,150,876 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,734 ready_for_fw is high
1,055,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,914 >>> mbox cmd response: success
2,685,192 UART:
2,685,208 UART: Running Caliptra FMC ...
2,685,616 UART:
2,685,670 UART: [state] CFI Enabled
2,696,001 UART: [fht] FMC Alias Private Key: 7
2,804,412 UART: [art] Extend RT PCRs Done
2,804,840 UART: [art] Lock RT PCRs Done
2,806,274 UART: [art] Populate DV Done
2,814,587 UART: [fht] FMC Alias Private Key: 7
2,815,669 UART: [art] Derive CDI
2,815,949 UART: [art] Store in in slot 0x4
2,901,678 UART: [art] Derive Key Pair
2,902,038 UART: [art] Store priv key in slot 0x5
2,915,464 UART: [art] Derive Key Pair - Done
2,930,169 UART: [art] Signing Cert with AUTHO
2,930,649 UART: RITY.KEYID = 7
2,945,487 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,252 UART: [art] PUB.X = 91E5C7066A533007AE49EA0927CAE234A277FC09640B291E5DE46D9F4B12E0103929A59661EF8401740F481EC59BA8E6
2,952,999 UART: [art] PUB.Y = A44098575BD891F65F2198F6F98B9F854C16A2A75AE4981D7D2F110443D1A04B618DFC3756E3599AAB633EE9747B8D9E
2,959,948 UART: [art] SIG.R = 9A7F4C9FA9F897F2CE2FBD0E5199305E4A0F85C15539A2B7EE1C3AFD0A62048A9C17D2C0B2C6507092499FBC87BC3CF8
2,966,722 UART: [art] SIG.S = B8379749DC88E7DA03A94E5BBE0FFA7D3E72158E6226486A06A7796B62EDB6EA9540382A112D99E5943BAC7F94E27B1B
2,991,144 UART: Caliptra RT
2,991,397 UART: [state] CFI Enabled
3,099,601 UART: [rt] RT listening for mailbox commands...
3,100,271 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,449 UART: [rt]cmd =0x44504543, len=24
3,156,188 >>> mbox cmd response data (40 bytes)
3,156,189 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,774 UART: [rt]cmd =0x44504543, len=24
3,211,893 >>> mbox cmd response data (40 bytes)
3,211,894 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,241,445 UART: [rt]cmd =0x44504543, len=24
3,267,370 >>> mbox cmd response data (40 bytes)
3,267,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,296,726 UART: [rt]cmd =0x44504543, len=24
3,322,943 >>> mbox cmd response data (40 bytes)
3,322,944 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,117 UART: [rt]cmd =0x44504543, len=24
3,377,994 >>> mbox cmd response data (40 bytes)
3,377,995 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,374 UART: [rt]cmd =0x44504543, len=24
3,433,629 >>> mbox cmd response data (40 bytes)
3,433,630 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,165 UART: [rt]cmd =0x44504543, len=24
3,489,410 >>> mbox cmd response data (40 bytes)
3,489,411 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,098 UART: [rt]cmd =0x44504543, len=24
3,546,031 >>> mbox cmd response data (40 bytes)
3,546,032 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,383 UART: [rt]cmd =0x44504543, len=24
3,601,748 >>> mbox cmd response data (40 bytes)
3,601,749 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,124 UART: [rt]cmd =0x44504543, len=24
3,657,973 >>> mbox cmd response data (40 bytes)
3,657,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,401 UART: [rt]cmd =0x44504543, len=24
3,713,872 >>> mbox cmd response data (40 bytes)
3,713,873 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,242 UART: [rt]cmd =0x44504543, len=24
3,769,411 >>> mbox cmd response data (40 bytes)
3,769,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,798,805 UART: [rt]cmd =0x44504543, len=24
3,825,646 >>> mbox cmd response data (40 bytes)
3,825,647 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,226 UART: [rt]cmd =0x44504543, len=24
3,881,989 >>> mbox cmd response data (40 bytes)
3,881,990 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,455 UART: [rt]cmd =0x44504543, len=24
3,937,534 >>> mbox cmd response data (40 bytes)
3,937,535 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,906 UART: [rt]cmd =0x44504543, len=24
3,974,025 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,568 UART: [kat] SHA2-256
901,508 UART: [kat] SHA2-384
904,279 UART: [kat] SHA2-512-ACC
906,180 UART: [kat] ECC-384
915,835 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,634 UART: [idev] ++
1,172,802 UART: [idev] CDI.KEYID = 6
1,173,163 UART: [idev] SUBJECT.KEYID = 7
1,173,588 UART: [idev] UDS.KEYID = 0
1,173,934 ready_for_fw is high
1,173,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,248 UART: [idev] Erasing UDS.KEYID = 0
1,198,656 UART: [idev] Sha1 KeyId Algorithm
1,207,710 UART: [idev] --
1,208,635 UART: [ldev] ++
1,208,803 UART: [ldev] CDI.KEYID = 6
1,209,167 UART: [ldev] SUBJECT.KEYID = 5
1,209,594 UART: [ldev] AUTHORITY.KEYID = 7
1,210,057 UART: [ldev] FE.KEYID = 1
1,215,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,887 UART: [ldev] --
1,281,207 UART: [fwproc] Wait for Commands...
1,281,784 UART: [fwproc] Recv command 0x46574c44
1,282,517 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,522 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,831 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,745 >>> mbox cmd response: success
2,775,832 UART: [afmc] ++
2,776,000 UART: [afmc] CDI.KEYID = 6
2,776,363 UART: [afmc] SUBJECT.KEYID = 7
2,776,789 UART: [afmc] AUTHORITY.KEYID = 5
2,812,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,451 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,063 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,782 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,539 UART: [afmc] --
2,855,485 UART: [cold-reset] --
2,856,391 UART: [state] Locking Datavault
2,857,594 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,198 UART: [state] Locking ICCM
2,858,832 UART: [exit] Launching FMC @ 0x40000130
2,864,161 UART:
2,864,177 UART: Running Caliptra FMC ...
2,864,585 UART:
2,864,728 UART: [state] CFI Enabled
2,875,123 UART: [fht] FMC Alias Private Key: 7
2,982,716 UART: [art] Extend RT PCRs Done
2,983,144 UART: [art] Lock RT PCRs Done
2,984,768 UART: [art] Populate DV Done
2,993,013 UART: [fht] FMC Alias Private Key: 7
2,993,993 UART: [art] Derive CDI
2,994,273 UART: [art] Store in in slot 0x4
3,079,760 UART: [art] Derive Key Pair
3,080,120 UART: [art] Store priv key in slot 0x5
3,093,954 UART: [art] Derive Key Pair - Done
3,108,455 UART: [art] Signing Cert with AUTHO
3,108,935 UART: RITY.KEYID = 7
3,124,033 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,798 UART: [art] PUB.X = 57453F64D79B0549F63485F078253BB7C2F08E6F77EE830AA14B1534AC86D23B0F43ABCB48C51D4A22598F5F7B863C9A
3,131,563 UART: [art] PUB.Y = 9C1D34B55B083B715631352EBAABE01580A0BF7EF67D3A974331DF21D71F653B3457291022504DD1EE8B282EF045A655
3,138,510 UART: [art] SIG.R = EF15C19141CD8F5A0959E03B06F13D2C869A687F3EE3B31D1860B42C16311247D1CCC8FC5E302196B2ACD33E15C56C61
3,145,280 UART: [art] SIG.S = 7EE6559C2074D470FAE5E31197B9D42ECBB6919707DC69D3279638C8B31AA3B151D14D996F28C10D79463B7E7666DECD
3,168,711 UART: Caliptra RT
3,169,056 UART: [state] CFI Enabled
3,277,049 UART: [rt] RT listening for mailbox commands...
3,277,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,593 UART: [rt]cmd =0x44504543, len=24
3,333,964 >>> mbox cmd response data (40 bytes)
3,333,965 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,242 UART: [rt]cmd =0x44504543, len=24
3,389,851 >>> mbox cmd response data (40 bytes)
3,389,852 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,269 UART: [rt]cmd =0x44504543, len=24
3,445,134 >>> mbox cmd response data (40 bytes)
3,445,135 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,676 UART: [rt]cmd =0x44504543, len=24
3,501,051 >>> mbox cmd response data (40 bytes)
3,501,052 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,375 UART: [rt]cmd =0x44504543, len=24
3,556,948 >>> mbox cmd response data (40 bytes)
3,556,949 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,588 UART: [rt]cmd =0x44504543, len=24
3,612,749 >>> mbox cmd response data (40 bytes)
3,612,750 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,119 UART: [rt]cmd =0x44504543, len=24
3,668,154 >>> mbox cmd response data (40 bytes)
3,668,155 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,570 UART: [rt]cmd =0x44504543, len=24
3,723,799 >>> mbox cmd response data (40 bytes)
3,723,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,437 UART: [rt]cmd =0x44504543, len=24
3,779,440 >>> mbox cmd response data (40 bytes)
3,779,441 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,940 UART: [rt]cmd =0x44504543, len=24
3,834,917 >>> mbox cmd response data (40 bytes)
3,834,918 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,407 UART: [rt]cmd =0x44504543, len=24
3,890,414 >>> mbox cmd response data (40 bytes)
3,890,415 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,818 UART: [rt]cmd =0x44504543, len=24
3,946,229 >>> mbox cmd response data (40 bytes)
3,946,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,765 UART: [rt]cmd =0x44504543, len=24
4,002,762 >>> mbox cmd response data (40 bytes)
4,002,763 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,032,304 UART: [rt]cmd =0x44504543, len=24
4,059,307 >>> mbox cmd response data (40 bytes)
4,059,308 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,679 UART: [rt]cmd =0x44504543, len=24
4,115,004 >>> mbox cmd response data (40 bytes)
4,115,005 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,144,412 UART: [rt]cmd =0x44504543, len=24
4,151,725 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,055 ready_for_fw is high
1,056,055 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,472 >>> mbox cmd response: success
2,687,084 UART:
2,687,100 UART: Running Caliptra FMC ...
2,687,508 UART:
2,687,651 UART: [state] CFI Enabled
2,698,322 UART: [fht] FMC Alias Private Key: 7
2,806,383 UART: [art] Extend RT PCRs Done
2,806,811 UART: [art] Lock RT PCRs Done
2,808,537 UART: [art] Populate DV Done
2,816,496 UART: [fht] FMC Alias Private Key: 7
2,817,636 UART: [art] Derive CDI
2,817,916 UART: [art] Store in in slot 0x4
2,903,711 UART: [art] Derive Key Pair
2,904,071 UART: [art] Store priv key in slot 0x5
2,917,277 UART: [art] Derive Key Pair - Done
2,932,289 UART: [art] Signing Cert with AUTHO
2,932,769 UART: RITY.KEYID = 7
2,947,883 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,648 UART: [art] PUB.X = E1B2D4567B183D3D910C9D19D444FF4086191E8D728EDCCACF9A27B37243540752C232AC7AD3B34E0A1AAB069BF10AF6
2,955,415 UART: [art] PUB.Y = 3AD8E7C1400F1C41A3141DA39CE5F3D6234CF842EC99ACD54F2509A86A0970DF292BFEC9B78A6BDE1F28BC95C2FAF2F5
2,962,378 UART: [art] SIG.R = ED144D4551EDF5F2AE7227B9AF225F8FB8FEEE0681727C17AFD1128C3BF3EF0E176407FE2B1210E718B0CB5C16D17006
2,969,150 UART: [art] SIG.S = 827DD866E81E4E29D255368C8499C286D74626638F992D39FD728D00A9B4349803D44BC644B3520C18E762223AF17B95
2,992,619 UART: Caliptra RT
2,992,964 UART: [state] CFI Enabled
3,099,526 UART: [rt] RT listening for mailbox commands...
3,100,196 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,024 UART: [rt]cmd =0x44504543, len=24
3,156,313 >>> mbox cmd response data (40 bytes)
3,156,314 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,819 UART: [rt]cmd =0x44504543, len=24
3,212,146 >>> mbox cmd response data (40 bytes)
3,212,147 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,241,532 UART: [rt]cmd =0x44504543, len=24
3,267,465 >>> mbox cmd response data (40 bytes)
3,267,466 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,296,909 UART: [rt]cmd =0x44504543, len=24
3,323,334 >>> mbox cmd response data (40 bytes)
3,323,335 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,802 UART: [rt]cmd =0x44504543, len=24
3,379,203 >>> mbox cmd response data (40 bytes)
3,379,204 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,593 UART: [rt]cmd =0x44504543, len=24
3,434,486 >>> mbox cmd response data (40 bytes)
3,434,487 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,970 UART: [rt]cmd =0x44504543, len=24
3,489,893 >>> mbox cmd response data (40 bytes)
3,489,894 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,161 UART: [rt]cmd =0x44504543, len=24
3,545,192 >>> mbox cmd response data (40 bytes)
3,545,193 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,670 UART: [rt]cmd =0x44504543, len=24
3,600,779 >>> mbox cmd response data (40 bytes)
3,600,780 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,261 UART: [rt]cmd =0x44504543, len=24
3,656,654 >>> mbox cmd response data (40 bytes)
3,656,655 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,980 UART: [rt]cmd =0x44504543, len=24
3,712,177 >>> mbox cmd response data (40 bytes)
3,712,178 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,491 UART: [rt]cmd =0x44504543, len=24
3,767,398 >>> mbox cmd response data (40 bytes)
3,767,399 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,796,704 UART: [rt]cmd =0x44504543, len=24
3,822,777 >>> mbox cmd response data (40 bytes)
3,822,778 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,852,251 UART: [rt]cmd =0x44504543, len=24
3,878,346 >>> mbox cmd response data (40 bytes)
3,878,347 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,907,654 UART: [rt]cmd =0x44504543, len=24
3,934,011 >>> mbox cmd response data (40 bytes)
3,934,012 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,461 UART: [rt]cmd =0x44504543, len=24
3,970,458 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,077 UART:
192,457 UART: Running Caliptra ROM ...
193,648 UART:
193,810 UART: [state] CFI Enabled
265,908 UART: [state] LifecycleState = Unprovisioned
267,892 UART: [state] DebugLocked = No
270,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,535 UART: [kat] SHA2-256
445,280 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,734 UART: [kat] ++
456,336 UART: [kat] sha1
466,441 UART: [kat] SHA2-256
469,088 UART: [kat] SHA2-384
475,229 UART: [kat] SHA2-512-ACC
477,598 UART: [kat] ECC-384
2,768,083 UART: [kat] HMAC-384Kdf
2,800,071 UART: [kat] LMS
3,990,341 UART: [kat] --
3,995,597 UART: [cold-reset] ++
3,997,473 UART: [fht] Storing FHT @ 0x50003400
4,008,717 UART: [idev] ++
4,009,328 UART: [idev] CDI.KEYID = 6
4,010,261 UART: [idev] SUBJECT.KEYID = 7
4,011,447 UART: [idev] UDS.KEYID = 0
4,012,520 ready_for_fw is high
4,012,737 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,210 UART: [idev] Erasing UDS.KEYID = 0
7,345,732 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,709 UART: [idev] --
7,372,560 UART: [ldev] ++
7,373,170 UART: [ldev] CDI.KEYID = 6
7,374,086 UART: [ldev] SUBJECT.KEYID = 5
7,375,312 UART: [ldev] AUTHORITY.KEYID = 7
7,376,548 UART: [ldev] FE.KEYID = 1
7,405,181 UART: [ldev] Erasing FE.KEYID = 1
10,738,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,037 UART: [ldev] --
13,116,062 UART: [fwproc] Waiting for Commands...
13,118,923 UART: [fwproc] Received command 0x46574c44
13,121,111 UART: [fwproc] Received Image of size 114124 bytes
17,174,449 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,811 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,718 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,631,618 >>> mbox cmd response: success
17,636,286 UART: [afmc] ++
17,636,887 UART: [afmc] CDI.KEYID = 6
17,637,860 UART: [afmc] SUBJECT.KEYID = 7
17,639,086 UART: [afmc] AUTHORITY.KEYID = 5
21,009,591 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,690 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,951 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,370 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,221 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,622 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,034 UART: [afmc] --
23,380,477 UART: [cold-reset] --
23,384,881 UART: [state] Locking Datavault
23,388,137 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,892 UART: [state] Locking ICCM
23,391,179 UART: [exit] Launching FMC @ 0x40000130
23,399,527 UART:
23,399,766 UART: Running Caliptra FMC ...
23,400,870 UART:
23,401,039 UART: [state] CFI Enabled
23,469,005 UART: [fht] FMC Alias Private Key: 7
25,806,406 UART: [art] Extend RT PCRs Done
25,807,639 UART: [art] Lock RT PCRs Done
25,809,248 UART: [art] Populate DV Done
25,814,877 UART: [fht] FMC Alias Private Key: 7
25,816,413 UART: [art] Derive CDI
25,817,151 UART: [art] Store in in slot 0x4
25,877,706 UART: [art] Derive Key Pair
25,878,747 UART: [art] Store priv key in slot 0x5
29,171,862 UART: [art] Derive Key Pair - Done
29,184,856 UART: [art] Signing Cert with AUTHO
29,186,168 UART: RITY.KEYID = 7
31,472,704 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,204 UART: [art] PUB.X = 47B97606CD73B6AEDE69786A745DDD975542DD431FEA41A8012EAD1CB5384A605E3A5CB7E3EA250109F0A04624D49AF8
31,481,446 UART: [art] PUB.Y = AE7A138AAF793CF715AF34B3342D39B06D0955B64795348C761195987F102B125FCE2DE230A0CABA76809ABB93684393
31,488,688 UART: [art] SIG.R = 79CB0101CC681D90C88DE72C23BF23E89510B8E36FD03FC8DC85A5BCC396DDCA668ABCF555BFF2233CD11EFC6B5FF2E0
31,496,152 UART: [art] SIG.S = 19E808317C3BB6C375D95280807067ED265A733A5AE90FB6347C85D0DD7E55ED21C3B68C8600633188EE8FACC9B7AA0E
32,801,240 UART: Caliptra RT
32,801,950 UART: [state] CFI Enabled
32,962,384 UART: [rt] RT listening for mailbox commands...
32,964,321 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,994,260 UART: [rt]cmd =0x44504543, len=24
33,036,635 >>> mbox cmd response data (40 bytes)
33,037,904 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,068,432 UART: [rt]cmd =0x44504543, len=96
33,128,411 >>> mbox cmd response data (56 bytes)
33,129,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,159,758 UART: [rt]cmd =0x44504543, len=96
33,235,281 >>> mbox cmd response data (56 bytes)
33,236,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,266,711 UART: [rt]cmd =0x44504543, len=96
33,341,188 >>> mbox cmd response data (56 bytes)
33,341,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,372,485 UART: [rt]cmd =0x44504543, len=96
33,448,614 >>> mbox cmd response data (56 bytes)
33,449,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,480,038 UART: [rt]cmd =0x44504543, len=96
33,555,447 >>> mbox cmd response data (56 bytes)
33,556,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,586,788 UART: [rt]cmd =0x44504543, len=96
33,662,135 >>> mbox cmd response data (56 bytes)
33,662,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,693,553 UART: [rt]cmd =0x44504543, len=96
33,768,965 >>> mbox cmd response data (56 bytes)
33,769,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,800,104 UART: [rt]cmd =0x44504543, len=96
33,875,934 >>> mbox cmd response data (56 bytes)
33,876,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,907,311 UART: [rt]cmd =0x44504543, len=96
33,983,194 >>> mbox cmd response data (56 bytes)
33,983,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,014,514 UART: [rt]cmd =0x44504543, len=96
34,089,752 >>> mbox cmd response data (56 bytes)
34,090,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,121,154 UART: [rt]cmd =0x44504543, len=96
34,196,724 >>> mbox cmd response data (56 bytes)
34,197,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,227,929 UART: [rt]cmd =0x44504543, len=96
34,303,119 >>> mbox cmd response data (56 bytes)
34,303,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,334,165 UART: [rt]cmd =0x44504543, len=96
34,410,949 >>> mbox cmd response data (56 bytes)
34,411,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,442,146 UART: [rt]cmd =0x44504543, len=96
34,517,403 >>> mbox cmd response data (56 bytes)
34,518,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,548,650 UART: [rt]cmd =0x44504543, len=96
34,555,270 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,782,281 ready_for_fw is high
3,782,919 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,861,297 >>> mbox cmd response: success
23,546,537 UART:
23,546,906 UART: Running Caliptra FMC ...
23,548,103 UART:
23,548,276 UART: [state] CFI Enabled
23,612,334 UART: [fht] FMC Alias Private Key: 7
25,950,258 UART: [art] Extend RT PCRs Done
25,951,488 UART: [art] Lock RT PCRs Done
25,952,907 UART: [art] Populate DV Done
25,958,219 UART: [fht] FMC Alias Private Key: 7
25,959,813 UART: [art] Derive CDI
25,960,625 UART: [art] Store in in slot 0x4
26,020,590 UART: [art] Derive Key Pair
26,021,633 UART: [art] Store priv key in slot 0x5
29,314,027 UART: [art] Derive Key Pair - Done
29,327,092 UART: [art] Signing Cert with AUTHO
29,328,432 UART: RITY.KEYID = 7
31,615,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,617,497 UART: [art] PUB.X = B3B7BF325A6AF1E284712940BD741D59CFB9DBA2201E312A80C44CE3C54FD105BEC916BB50FF607502770DBEA835F7EA
31,624,776 UART: [art] PUB.Y = FC17174574EB661FF1380E17F355F3AFFD5E25A49A170E2CB2C02F520FCE7244ECBB5415C22BD58E3AB55EA1FD15B8E8
31,632,028 UART: [art] SIG.R = 83449E4BAC9ACD620F36C6B69900EB89A1A1B8A4029CCDF360403DF9E4A10C08D352C34539C1FA8CC2E2D1919B1F6A0E
31,639,398 UART: [art] SIG.S = B19661256D9D1E1F0D3E2CF247C291B3DD94871754820F76A45DB82828FA88010C8576B9CAE59B14CC703B5DB089BD61
32,944,697 UART: Caliptra RT
32,945,411 UART: [state] CFI Enabled
33,125,887 UART: [rt] RT listening for mailbox commands...
33,127,827 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,157,964 UART: [rt]cmd =0x44504543, len=24
33,199,937 >>> mbox cmd response data (40 bytes)
33,201,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,231,909 UART: [rt]cmd =0x44504543, len=96
33,291,401 >>> mbox cmd response data (56 bytes)
33,292,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,322,688 UART: [rt]cmd =0x44504543, len=96
33,398,539 >>> mbox cmd response data (56 bytes)
33,399,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,429,918 UART: [rt]cmd =0x44504543, len=96
33,505,206 >>> mbox cmd response data (56 bytes)
33,505,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,536,476 UART: [rt]cmd =0x44504543, len=96
33,611,829 >>> mbox cmd response data (56 bytes)
33,612,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,643,211 UART: [rt]cmd =0x44504543, len=96
33,718,457 >>> mbox cmd response data (56 bytes)
33,719,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,749,591 UART: [rt]cmd =0x44504543, len=96
33,825,660 >>> mbox cmd response data (56 bytes)
33,826,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,857,131 UART: [rt]cmd =0x44504543, len=96
33,932,211 >>> mbox cmd response data (56 bytes)
33,932,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,963,580 UART: [rt]cmd =0x44504543, len=96
34,039,245 >>> mbox cmd response data (56 bytes)
34,039,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,070,473 UART: [rt]cmd =0x44504543, len=96
34,145,894 >>> mbox cmd response data (56 bytes)
34,146,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,177,358 UART: [rt]cmd =0x44504543, len=96
34,251,941 >>> mbox cmd response data (56 bytes)
34,252,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,283,254 UART: [rt]cmd =0x44504543, len=96
34,359,583 >>> mbox cmd response data (56 bytes)
34,360,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,390,786 UART: [rt]cmd =0x44504543, len=96
34,465,612 >>> mbox cmd response data (56 bytes)
34,466,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,496,918 UART: [rt]cmd =0x44504543, len=96
34,572,694 >>> mbox cmd response data (56 bytes)
34,573,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,604,062 UART: [rt]cmd =0x44504543, len=96
34,679,470 >>> mbox cmd response data (56 bytes)
34,680,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,710,951 UART: [rt]cmd =0x44504543, len=96
34,717,284 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,410 UART:
192,821 UART: Running Caliptra ROM ...
194,019 UART:
603,633 UART: [state] CFI Enabled
617,233 UART: [state] LifecycleState = Unprovisioned
619,176 UART: [state] DebugLocked = No
621,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,184 UART: [kat] SHA2-256
796,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,498 UART: [kat] ++
807,941 UART: [kat] sha1
818,658 UART: [kat] SHA2-256
821,415 UART: [kat] SHA2-384
826,620 UART: [kat] SHA2-512-ACC
829,051 UART: [kat] ECC-384
3,112,670 UART: [kat] HMAC-384Kdf
3,124,190 UART: [kat] LMS
4,314,346 UART: [kat] --
4,317,564 UART: [cold-reset] ++
4,318,493 UART: [fht] Storing FHT @ 0x50003400
4,329,896 UART: [idev] ++
4,330,530 UART: [idev] CDI.KEYID = 6
4,331,448 UART: [idev] SUBJECT.KEYID = 7
4,332,625 UART: [idev] UDS.KEYID = 0
4,333,609 ready_for_fw is high
4,333,805 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,023 UART: [idev] Erasing UDS.KEYID = 0
7,615,065 UART: [idev] Using Sha1 for KeyId Algorithm
7,636,394 UART: [idev] --
7,639,407 UART: [ldev] ++
7,639,971 UART: [ldev] CDI.KEYID = 6
7,640,903 UART: [ldev] SUBJECT.KEYID = 5
7,642,104 UART: [ldev] AUTHORITY.KEYID = 7
7,643,406 UART: [ldev] FE.KEYID = 1
7,655,962 UART: [ldev] Erasing FE.KEYID = 1
10,945,327 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,994 UART: [ldev] --
13,304,424 UART: [fwproc] Waiting for Commands...
13,306,404 UART: [fwproc] Received command 0x46574c44
13,308,579 UART: [fwproc] Received Image of size 114124 bytes
17,359,610 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,285 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,545 >>> mbox cmd response: success
17,826,904 UART: [afmc] ++
17,827,515 UART: [afmc] CDI.KEYID = 6
17,828,424 UART: [afmc] SUBJECT.KEYID = 7
17,829,689 UART: [afmc] AUTHORITY.KEYID = 5
21,141,484 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,005 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,265 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,451,682 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,466,469 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,480,960 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,501,350 UART: [afmc] --
23,505,049 UART: [cold-reset] --
23,507,831 UART: [state] Locking Datavault
23,513,128 UART: [state] Locking PCR0, PCR1 and PCR31
23,514,881 UART: [state] Locking ICCM
23,516,373 UART: [exit] Launching FMC @ 0x40000130
23,524,768 UART:
23,525,016 UART: Running Caliptra FMC ...
23,526,050 UART:
23,526,191 UART: [state] CFI Enabled
23,534,343 UART: [fht] FMC Alias Private Key: 7
25,864,961 UART: [art] Extend RT PCRs Done
25,866,207 UART: [art] Lock RT PCRs Done
25,867,741 UART: [art] Populate DV Done
25,873,316 UART: [fht] FMC Alias Private Key: 7
25,874,961 UART: [art] Derive CDI
25,875,689 UART: [art] Store in in slot 0x4
25,918,704 UART: [art] Derive Key Pair
25,919,697 UART: [art] Store priv key in slot 0x5
29,161,637 UART: [art] Derive Key Pair - Done
29,174,743 UART: [art] Signing Cert with AUTHO
29,176,041 UART: RITY.KEYID = 7
31,455,227 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,750 UART: [art] PUB.X = 76CFA88D43C902A3F0A20036541A59F2C5873494A44B385A5CFC2B70D331D8C63BC280E3C23D3004D49BCFAD8C044893
31,463,981 UART: [art] PUB.Y = BB5DA806FAF4B8C8D18E3916710E45921650C19862ADCC0A43B0A5D2F53902E8130F91F27D9D21C7CE928B7953779595
31,471,193 UART: [art] SIG.R = A77A62089A6B9D95F595B59059CF91587BAE718B32C3806761E58E4E73DE146831A82DC78737EA69195BE1BC3650E2B2
31,478,569 UART: [art] SIG.S = 514DA3A874F2EDF79746434D1FFA800AFC723A1174C4D9A8747C93BDD7AD352815E0B66D6AF566039C31BA0BFDC57831
32,784,197 UART: Caliptra RT
32,784,891 UART: [state] CFI Enabled
32,901,955 UART: [rt] RT listening for mailbox commands...
32,903,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,933,686 UART: [rt]cmd =0x44504543, len=24
32,960,086 >>> mbox cmd response data (40 bytes)
32,961,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,992,075 UART: [rt]cmd =0x44504543, len=96
33,032,294 >>> mbox cmd response data (56 bytes)
33,033,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,063,565 UART: [rt]cmd =0x44504543, len=96
33,104,692 >>> mbox cmd response data (56 bytes)
33,105,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,135,960 UART: [rt]cmd =0x44504543, len=96
33,176,756 >>> mbox cmd response data (56 bytes)
33,177,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,208,305 UART: [rt]cmd =0x44504543, len=96
33,249,264 >>> mbox cmd response data (56 bytes)
33,249,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,280,657 UART: [rt]cmd =0x44504543, len=96
33,322,455 >>> mbox cmd response data (56 bytes)
33,323,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,353,707 UART: [rt]cmd =0x44504543, len=96
33,395,452 >>> mbox cmd response data (56 bytes)
33,396,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,426,477 UART: [rt]cmd =0x44504543, len=96
33,468,841 >>> mbox cmd response data (56 bytes)
33,469,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,500,138 UART: [rt]cmd =0x44504543, len=96
33,542,329 >>> mbox cmd response data (56 bytes)
33,543,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,573,586 UART: [rt]cmd =0x44504543, len=96
33,615,284 >>> mbox cmd response data (56 bytes)
33,616,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,646,703 UART: [rt]cmd =0x44504543, len=96
33,689,909 >>> mbox cmd response data (56 bytes)
33,690,620 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,721,093 UART: [rt]cmd =0x44504543, len=96
33,764,560 >>> mbox cmd response data (56 bytes)
33,765,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,795,776 UART: [rt]cmd =0x44504543, len=96
33,839,220 >>> mbox cmd response data (56 bytes)
33,839,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,870,391 UART: [rt]cmd =0x44504543, len=96
33,914,610 >>> mbox cmd response data (56 bytes)
33,915,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,945,671 UART: [rt]cmd =0x44504543, len=96
33,990,467 >>> mbox cmd response data (56 bytes)
33,991,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,021,689 UART: [rt]cmd =0x44504543, len=96
34,028,446 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
4,129,983 ready_for_fw is high
4,130,426 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,696 >>> mbox cmd response: success
23,709,538 UART:
23,709,945 UART: Running Caliptra FMC ...
23,711,081 UART:
23,711,235 UART: [state] CFI Enabled
23,719,256 UART: [fht] FMC Alias Private Key: 7
26,049,780 UART: [art] Extend RT PCRs Done
26,051,018 UART: [art] Lock RT PCRs Done
26,052,435 UART: [art] Populate DV Done
26,057,745 UART: [fht] FMC Alias Private Key: 7
26,059,341 UART: [art] Derive CDI
26,060,152 UART: [art] Store in in slot 0x4
26,102,652 UART: [art] Derive Key Pair
26,103,694 UART: [art] Store priv key in slot 0x5
29,345,767 UART: [art] Derive Key Pair - Done
29,358,386 UART: [art] Signing Cert with AUTHO
29,359,695 UART: RITY.KEYID = 7
31,638,887 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,384 UART: [art] PUB.X = 25F4716334B43CD5AE3E2EEFA6AB454F6AB659440C880B4921AE5ECB455FBC1A533D9C25835E788E59DA10A8FB64CC99
31,647,662 UART: [art] PUB.Y = 6E211EB0E8963F9E80809673BCD8199F41F379D536F29C87C07CBDC30C6936767F0027EB034E3885EA90F603E1C4B80B
31,654,867 UART: [art] SIG.R = FAAC75DA9973E5AB1404486579776631F36DCF47B4938DD2A6DA2EEF6E233CA23BF998CF5D071D6B9AA3D53D2A179868
31,662,321 UART: [art] SIG.S = C3BEC80DDC6009B7AC134739697C6AB862B5FA3043ED6D8E462DDCDC6FB8DE0D4859BF59A6DA03A2C4D95C0F16E0C221
32,967,777 UART: Caliptra RT
32,968,493 UART: [state] CFI Enabled
33,086,312 UART: [rt] RT listening for mailbox commands...
33,088,215 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,118,132 UART: [rt]cmd =0x44504543, len=24
33,144,678 >>> mbox cmd response data (40 bytes)
33,145,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,176,535 UART: [rt]cmd =0x44504543, len=96
33,216,466 >>> mbox cmd response data (56 bytes)
33,217,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,247,484 UART: [rt]cmd =0x44504543, len=96
33,287,569 >>> mbox cmd response data (56 bytes)
33,288,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,318,666 UART: [rt]cmd =0x44504543, len=96
33,359,424 >>> mbox cmd response data (56 bytes)
33,360,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,390,709 UART: [rt]cmd =0x44504543, len=96
33,431,814 >>> mbox cmd response data (56 bytes)
33,432,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,463,383 UART: [rt]cmd =0x44504543, len=96
33,504,595 >>> mbox cmd response data (56 bytes)
33,505,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,536,066 UART: [rt]cmd =0x44504543, len=96
33,577,856 >>> mbox cmd response data (56 bytes)
33,578,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,609,362 UART: [rt]cmd =0x44504543, len=96
33,651,777 >>> mbox cmd response data (56 bytes)
33,652,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,682,953 UART: [rt]cmd =0x44504543, len=96
33,725,583 >>> mbox cmd response data (56 bytes)
33,726,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,756,736 UART: [rt]cmd =0x44504543, len=96
33,799,805 >>> mbox cmd response data (56 bytes)
33,800,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,831,088 UART: [rt]cmd =0x44504543, len=96
33,873,666 >>> mbox cmd response data (56 bytes)
33,874,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,904,676 UART: [rt]cmd =0x44504543, len=96
33,948,006 >>> mbox cmd response data (56 bytes)
33,948,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,979,393 UART: [rt]cmd =0x44504543, len=96
34,022,816 >>> mbox cmd response data (56 bytes)
34,023,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,054,297 UART: [rt]cmd =0x44504543, len=96
34,097,941 >>> mbox cmd response data (56 bytes)
34,098,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,129,255 UART: [rt]cmd =0x44504543, len=96
34,173,364 >>> mbox cmd response data (56 bytes)
34,174,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,204,477 UART: [rt]cmd =0x44504543, len=96
34,211,043 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,238 UART:
192,585 UART: Running Caliptra ROM ...
193,914 UART:
194,074 UART: [state] CFI Enabled
261,031 UART: [state] LifecycleState = Unprovisioned
262,905 UART: [state] DebugLocked = No
265,066 UART: [state] WD Timer not started. Device not locked for debugging
269,384 UART: [kat] SHA2-256
448,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,136 UART: [kat] ++
460,590 UART: [kat] sha1
472,488 UART: [kat] SHA2-256
475,508 UART: [kat] SHA2-384
481,707 UART: [kat] SHA2-512-ACC
484,638 UART: [kat] ECC-384
2,949,060 UART: [kat] HMAC-384Kdf
2,971,514 UART: [kat] LMS
3,501,013 UART: [kat] --
3,506,364 UART: [cold-reset] ++
3,508,505 UART: [fht] FHT @ 0x50003400
3,519,409 UART: [idev] ++
3,519,978 UART: [idev] CDI.KEYID = 6
3,520,864 UART: [idev] SUBJECT.KEYID = 7
3,522,107 UART: [idev] UDS.KEYID = 0
3,523,009 ready_for_fw is high
3,523,217 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,255 UART: [idev] Erasing UDS.KEYID = 0
6,025,798 UART: [idev] Sha1 KeyId Algorithm
6,048,922 UART: [idev] --
6,052,846 UART: [ldev] ++
6,053,422 UART: [ldev] CDI.KEYID = 6
6,054,311 UART: [ldev] SUBJECT.KEYID = 5
6,055,547 UART: [ldev] AUTHORITY.KEYID = 7
6,056,783 UART: [ldev] FE.KEYID = 1
6,100,070 UART: [ldev] Erasing FE.KEYID = 1
8,605,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,650 UART: [ldev] --
10,415,701 UART: [fwproc] Wait for Commands...
10,418,987 UART: [fwproc] Recv command 0x46574c44
10,421,028 UART: [fwproc] Recv'd Img size: 114448 bytes
13,824,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,009 >>> mbox cmd response: success
14,286,592 UART: [afmc] ++
14,287,190 UART: [afmc] CDI.KEYID = 6
14,288,103 UART: [afmc] SUBJECT.KEYID = 7
14,289,259 UART: [afmc] AUTHORITY.KEYID = 5
16,830,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,059 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,103 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,970 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,971 UART: [afmc] --
18,631,022 UART: [cold-reset] --
18,634,826 UART: [state] Locking Datavault
18,640,403 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,048 UART: [state] Locking ICCM
18,644,578 UART: [exit] Launching FMC @ 0x40000130
18,652,994 UART:
18,653,230 UART: Running Caliptra FMC ...
18,654,331 UART:
18,654,495 UART: [state] CFI Enabled
18,712,589 UART: [fht] FMC Alias Private Key: 7
20,476,607 UART: [art] Extend RT PCRs Done
20,477,820 UART: [art] Lock RT PCRs Done
20,479,442 UART: [art] Populate DV Done
20,484,580 UART: [fht] FMC Alias Private Key: 7
20,486,275 UART: [art] Derive CDI
20,487,087 UART: [art] Store in in slot 0x4
20,545,324 UART: [art] Derive Key Pair
20,546,359 UART: [art] Store priv key in slot 0x5
23,009,603 UART: [art] Derive Key Pair - Done
23,022,544 UART: [art] Signing Cert with AUTHO
23,023,849 UART: RITY.KEYID = 7
24,735,639 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,141 UART: [art] PUB.X = 0D65A2ACA9FC4DF60909447DB0C65D227B9F59FDFEE4FC71EC8D761226CE81C6CA42C06F7B0BE99009454181DF2CE7E6
24,744,446 UART: [art] PUB.Y = C4856A63DB06655DF8BE5407083588B5ECE906AED4DB2DE73BCF9BAC05F9262130A78FCC23407560CDB154A41A4E2141
24,751,737 UART: [art] SIG.R = DA186A3CABB6CD1BB70B20EE3B12801FF496A04CB3C884CD3F5A405B2BE37509B6211E6D92608003B608F863925C6C04
24,759,173 UART: [art] SIG.S = CA6BFF6E2CA6CFC59EB67FCBA1520BB6700B8F9C63FD2EFBA42FAE563BD68BFDC1A86C05126DF6DBAE8140D3AC2CF001
25,737,607 UART: Caliptra RT
25,738,288 UART: [state] CFI Enabled
25,904,136 UART: [rt] RT listening for mailbox commands...
25,906,059 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,936,628 UART: [rt]cmd =0x44504543, len=24
25,978,521 >>> mbox cmd response data (40 bytes)
25,979,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,010,290 UART: [rt]cmd =0x44504543, len=96
26,070,478 >>> mbox cmd response data (56 bytes)
26,071,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,101,835 UART: [rt]cmd =0x44504543, len=96
26,177,742 >>> mbox cmd response data (56 bytes)
26,178,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,208,857 UART: [rt]cmd =0x44504543, len=96
26,284,706 >>> mbox cmd response data (56 bytes)
26,285,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,315,899 UART: [rt]cmd =0x44504543, len=96
26,391,945 >>> mbox cmd response data (56 bytes)
26,392,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,423,195 UART: [rt]cmd =0x44504543, len=96
26,498,752 >>> mbox cmd response data (56 bytes)
26,499,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,530,066 UART: [rt]cmd =0x44504543, len=96
26,605,234 >>> mbox cmd response data (56 bytes)
26,605,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,636,782 UART: [rt]cmd =0x44504543, len=96
26,712,193 >>> mbox cmd response data (56 bytes)
26,712,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,743,634 UART: [rt]cmd =0x44504543, len=96
26,818,987 >>> mbox cmd response data (56 bytes)
26,819,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,850,210 UART: [rt]cmd =0x44504543, len=96
26,925,990 >>> mbox cmd response data (56 bytes)
26,926,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,957,402 UART: [rt]cmd =0x44504543, len=96
27,033,071 >>> mbox cmd response data (56 bytes)
27,033,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,064,435 UART: [rt]cmd =0x44504543, len=96
27,139,451 >>> mbox cmd response data (56 bytes)
27,140,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,170,650 UART: [rt]cmd =0x44504543, len=96
27,246,653 >>> mbox cmd response data (56 bytes)
27,247,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,278,100 UART: [rt]cmd =0x44504543, len=96
27,353,729 >>> mbox cmd response data (56 bytes)
27,354,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,384,923 UART: [rt]cmd =0x44504543, len=96
27,460,538 >>> mbox cmd response data (56 bytes)
27,461,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,491,696 UART: [rt]cmd =0x44504543, len=96
27,498,354 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,360,646 ready_for_fw is high
3,361,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,030,825 >>> mbox cmd response: success
18,320,785 UART:
18,321,176 UART: Running Caliptra FMC ...
18,322,342 UART:
18,322,506 UART: [state] CFI Enabled
18,389,645 UART: [fht] FMC Alias Private Key: 7
20,153,506 UART: [art] Extend RT PCRs Done
20,154,725 UART: [art] Lock RT PCRs Done
20,156,381 UART: [art] Populate DV Done
20,161,741 UART: [fht] FMC Alias Private Key: 7
20,163,282 UART: [art] Derive CDI
20,164,099 UART: [art] Store in in slot 0x4
20,223,108 UART: [art] Derive Key Pair
20,224,143 UART: [art] Store priv key in slot 0x5
22,686,892 UART: [art] Derive Key Pair - Done
22,699,830 UART: [art] Signing Cert with AUTHO
22,701,136 UART: RITY.KEYID = 7
24,414,242 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,775 UART: [art] PUB.X = 7BD0A46A5B8E17AF609BA4179778F205D33A866541F77C3A6A7D30C6E1790CA2FC35BFCDC183E3CEA6B20923D17BE2ED
24,423,046 UART: [art] PUB.Y = D95FF950CCC0CA1044785135964D003C475197E40FB5C22DCE85AE68F40BDD8731498EA948EE827BFC0C3D1A9DC25876
24,430,295 UART: [art] SIG.R = 2DA96D321D0FE64809780E8B6209738E112EFBBFB03593AABAC6648F64E9815AB86F6D34157027F47BBDFCB2F26369CD
24,437,635 UART: [art] SIG.S = BEED8B80C4112A69839F753506DF70BB9CFAC05F49743EA292944A12A0989162F2CC7EF3B0CA177C4670083EB6E38BE9
25,416,659 UART: Caliptra RT
25,417,598 UART: [state] CFI Enabled
25,582,317 UART: [rt] RT listening for mailbox commands...
25,584,270 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,615,046 UART: [rt]cmd =0x44504543, len=24
25,656,724 >>> mbox cmd response data (40 bytes)
25,658,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,688,623 UART: [rt]cmd =0x44504543, len=96
25,747,971 >>> mbox cmd response data (56 bytes)
25,748,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,779,310 UART: [rt]cmd =0x44504543, len=96
25,854,722 >>> mbox cmd response data (56 bytes)
25,855,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,885,885 UART: [rt]cmd =0x44504543, len=96
25,961,709 >>> mbox cmd response data (56 bytes)
25,962,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,993,023 UART: [rt]cmd =0x44504543, len=96
26,068,289 >>> mbox cmd response data (56 bytes)
26,069,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,099,514 UART: [rt]cmd =0x44504543, len=96
26,175,783 >>> mbox cmd response data (56 bytes)
26,176,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,207,090 UART: [rt]cmd =0x44504543, len=96
26,282,065 >>> mbox cmd response data (56 bytes)
26,282,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,313,285 UART: [rt]cmd =0x44504543, len=96
26,388,543 >>> mbox cmd response data (56 bytes)
26,389,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,419,798 UART: [rt]cmd =0x44504543, len=96
26,495,321 >>> mbox cmd response data (56 bytes)
26,496,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,526,574 UART: [rt]cmd =0x44504543, len=96
26,602,733 >>> mbox cmd response data (56 bytes)
26,603,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,633,990 UART: [rt]cmd =0x44504543, len=96
26,709,086 >>> mbox cmd response data (56 bytes)
26,709,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,740,174 UART: [rt]cmd =0x44504543, len=96
26,815,957 >>> mbox cmd response data (56 bytes)
26,816,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,847,214 UART: [rt]cmd =0x44504543, len=96
26,922,893 >>> mbox cmd response data (56 bytes)
26,923,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,954,326 UART: [rt]cmd =0x44504543, len=96
27,029,588 >>> mbox cmd response data (56 bytes)
27,030,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,061,033 UART: [rt]cmd =0x44504543, len=96
27,136,651 >>> mbox cmd response data (56 bytes)
27,137,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,167,632 UART: [rt]cmd =0x44504543, len=96
27,174,036 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,336 UART:
192,699 UART: Running Caliptra ROM ...
193,828 UART:
603,669 UART: [state] CFI Enabled
617,606 UART: [state] LifecycleState = Unprovisioned
619,395 UART: [state] DebugLocked = No
620,627 UART: [state] WD Timer not started. Device not locked for debugging
624,083 UART: [kat] SHA2-256
803,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,825 UART: [kat] ++
815,267 UART: [kat] sha1
825,370 UART: [kat] SHA2-256
828,375 UART: [kat] SHA2-384
834,363 UART: [kat] SHA2-512-ACC
837,291 UART: [kat] ECC-384
3,280,652 UART: [kat] HMAC-384Kdf
3,293,591 UART: [kat] LMS
3,823,107 UART: [kat] --
3,828,796 UART: [cold-reset] ++
3,830,431 UART: [fht] FHT @ 0x50003400
3,842,030 UART: [idev] ++
3,842,597 UART: [idev] CDI.KEYID = 6
3,843,645 UART: [idev] SUBJECT.KEYID = 7
3,844,738 UART: [idev] UDS.KEYID = 0
3,845,657 ready_for_fw is high
3,845,841 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,528 UART: [idev] Erasing UDS.KEYID = 0
6,313,681 UART: [idev] Sha1 KeyId Algorithm
6,337,713 UART: [idev] --
6,341,695 UART: [ldev] ++
6,342,254 UART: [ldev] CDI.KEYID = 6
6,343,134 UART: [ldev] SUBJECT.KEYID = 5
6,344,335 UART: [ldev] AUTHORITY.KEYID = 7
6,345,610 UART: [ldev] FE.KEYID = 1
6,356,599 UART: [ldev] Erasing FE.KEYID = 1
8,829,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,883 UART: [ldev] --
10,621,773 UART: [fwproc] Wait for Commands...
10,624,620 UART: [fwproc] Recv command 0x46574c44
10,626,723 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,335 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,279 >>> mbox cmd response: success
14,495,499 UART: [afmc] ++
14,496,089 UART: [afmc] CDI.KEYID = 6
14,496,996 UART: [afmc] SUBJECT.KEYID = 7
14,498,205 UART: [afmc] AUTHORITY.KEYID = 5
17,000,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,724 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,618 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,844 UART: [afmc] --
18,797,459 UART: [cold-reset] --
18,801,426 UART: [state] Locking Datavault
18,807,203 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,898 UART: [state] Locking ICCM
18,810,665 UART: [exit] Launching FMC @ 0x40000130
18,819,109 UART:
18,819,339 UART: Running Caliptra FMC ...
18,820,431 UART:
18,820,585 UART: [state] CFI Enabled
18,828,624 UART: [fht] FMC Alias Private Key: 7
20,585,952 UART: [art] Extend RT PCRs Done
20,587,171 UART: [art] Lock RT PCRs Done
20,589,063 UART: [art] Populate DV Done
20,594,526 UART: [fht] FMC Alias Private Key: 7
20,596,005 UART: [art] Derive CDI
20,596,768 UART: [art] Store in in slot 0x4
20,639,107 UART: [art] Derive Key Pair
20,640,144 UART: [art] Store priv key in slot 0x5
23,066,330 UART: [art] Derive Key Pair - Done
23,079,380 UART: [art] Signing Cert with AUTHO
23,080,675 UART: RITY.KEYID = 7
24,786,584 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,083 UART: [art] PUB.X = AA22E126A3B699A068924D2ECFB275A6AE8F3A3C0AC9D6DA8F7A81D78461F5CC876DF47ACF68A9B25F80E4E057DFF4EA
24,795,366 UART: [art] PUB.Y = EEA13E868CCD2D402A2256BF30314BE889527E08960CB9469534F7822D9382B1FCCD57477356E3BA6B30E07BBD0212D2
24,802,628 UART: [art] SIG.R = 8515C711630C507C2CF000A3B459600334C12388223840895B66668A62E8C35127D720437350AEEAEEDCEEA5BE5A05A6
24,809,951 UART: [art] SIG.S = 7B64380B5CA44D1A5D58D316F39F26BC7DD3CB7DC715B812DB3804AA6A60486CAD7EEFC3D50CF1D902B8E3C29DA42719
25,789,058 UART: Caliptra RT
25,789,763 UART: [state] CFI Enabled
25,906,517 UART: [rt] RT listening for mailbox commands...
25,908,429 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,938,386 UART: [rt]cmd =0x44504543, len=24
25,964,840 >>> mbox cmd response data (40 bytes)
25,966,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,996,764 UART: [rt]cmd =0x44504543, len=96
26,036,842 >>> mbox cmd response data (56 bytes)
26,037,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,068,004 UART: [rt]cmd =0x44504543, len=96
26,108,164 >>> mbox cmd response data (56 bytes)
26,108,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,139,458 UART: [rt]cmd =0x44504543, len=96
26,180,203 >>> mbox cmd response data (56 bytes)
26,180,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,211,484 UART: [rt]cmd =0x44504543, len=96
26,252,872 >>> mbox cmd response data (56 bytes)
26,253,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,284,098 UART: [rt]cmd =0x44504543, len=96
26,326,077 >>> mbox cmd response data (56 bytes)
26,326,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,357,364 UART: [rt]cmd =0x44504543, len=96
26,398,948 >>> mbox cmd response data (56 bytes)
26,399,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,430,246 UART: [rt]cmd =0x44504543, len=96
26,471,555 >>> mbox cmd response data (56 bytes)
26,472,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,502,850 UART: [rt]cmd =0x44504543, len=96
26,545,618 >>> mbox cmd response data (56 bytes)
26,546,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,576,969 UART: [rt]cmd =0x44504543, len=96
26,619,797 >>> mbox cmd response data (56 bytes)
26,620,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,651,318 UART: [rt]cmd =0x44504543, len=96
26,695,005 >>> mbox cmd response data (56 bytes)
26,695,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,726,257 UART: [rt]cmd =0x44504543, len=96
26,769,920 >>> mbox cmd response data (56 bytes)
26,770,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,801,176 UART: [rt]cmd =0x44504543, len=96
26,844,681 >>> mbox cmd response data (56 bytes)
26,845,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,875,976 UART: [rt]cmd =0x44504543, len=96
26,920,032 >>> mbox cmd response data (56 bytes)
26,920,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,951,145 UART: [rt]cmd =0x44504543, len=96
26,995,291 >>> mbox cmd response data (56 bytes)
26,995,969 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,026,340 UART: [rt]cmd =0x44504543, len=96
27,032,776 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,692,472 ready_for_fw is high
3,693,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,742 >>> mbox cmd response: success
18,516,269 UART:
18,516,661 UART: Running Caliptra FMC ...
18,517,785 UART:
18,517,937 UART: [state] CFI Enabled
18,525,768 UART: [fht] FMC Alias Private Key: 7
20,282,566 UART: [art] Extend RT PCRs Done
20,283,788 UART: [art] Lock RT PCRs Done
20,284,973 UART: [art] Populate DV Done
20,290,537 UART: [fht] FMC Alias Private Key: 7
20,292,130 UART: [art] Derive CDI
20,292,939 UART: [art] Store in in slot 0x4
20,335,324 UART: [art] Derive Key Pair
20,336,361 UART: [art] Store priv key in slot 0x5
22,763,570 UART: [art] Derive Key Pair - Done
22,776,354 UART: [art] Signing Cert with AUTHO
22,777,678 UART: RITY.KEYID = 7
24,483,518 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,025 UART: [art] PUB.X = DE2F6A1AA283950B3358D7C7C269B393FEC04E0E2B0254FFAAAE5C7A82261FDEBCAEE6092F2C7B3618BF3686FF4BECC3
24,492,360 UART: [art] PUB.Y = 81798C8896FD37D8A548E841BF5DD8B80C02B3C6B351BBBDA6FD7A520EB5BE28A4F6332F234680437A4EF0F6533BA9DE
24,499,600 UART: [art] SIG.R = 363883010F23906076828599E05313790A62CA0901DEBDF210B96B9503855D36E4FAF723CEE393446817992CFE229483
24,506,970 UART: [art] SIG.S = 7CEAD9FE7E87137708E41EFCD4B588F70ACDF04F7602A8A27B2F2D300AF25A6F13B2B6DA159489E5244D61B1D8CD2C94
25,485,200 UART: Caliptra RT
25,485,899 UART: [state] CFI Enabled
25,602,198 UART: [rt] RT listening for mailbox commands...
25,604,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,633,924 UART: [rt]cmd =0x44504543, len=24
25,660,362 >>> mbox cmd response data (40 bytes)
25,661,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,692,028 UART: [rt]cmd =0x44504543, len=96
25,731,492 >>> mbox cmd response data (56 bytes)
25,732,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,762,649 UART: [rt]cmd =0x44504543, len=96
25,803,653 >>> mbox cmd response data (56 bytes)
25,804,392 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,834,923 UART: [rt]cmd =0x44504543, len=96
25,875,622 >>> mbox cmd response data (56 bytes)
25,876,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,906,761 UART: [rt]cmd =0x44504543, len=96
25,948,561 >>> mbox cmd response data (56 bytes)
25,949,286 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,979,925 UART: [rt]cmd =0x44504543, len=96
26,022,091 >>> mbox cmd response data (56 bytes)
26,022,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,053,240 UART: [rt]cmd =0x44504543, len=96
26,095,192 >>> mbox cmd response data (56 bytes)
26,095,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,126,399 UART: [rt]cmd =0x44504543, len=96
26,168,062 >>> mbox cmd response data (56 bytes)
26,168,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,199,162 UART: [rt]cmd =0x44504543, len=96
26,241,651 >>> mbox cmd response data (56 bytes)
26,242,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,272,728 UART: [rt]cmd =0x44504543, len=96
26,316,358 >>> mbox cmd response data (56 bytes)
26,317,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,347,720 UART: [rt]cmd =0x44504543, len=96
26,390,196 >>> mbox cmd response data (56 bytes)
26,390,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,421,425 UART: [rt]cmd =0x44504543, len=96
26,464,052 >>> mbox cmd response data (56 bytes)
26,464,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,495,446 UART: [rt]cmd =0x44504543, len=96
26,538,835 >>> mbox cmd response data (56 bytes)
26,539,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,569,980 UART: [rt]cmd =0x44504543, len=96
26,613,636 >>> mbox cmd response data (56 bytes)
26,614,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,644,528 UART: [rt]cmd =0x44504543, len=96
26,689,089 >>> mbox cmd response data (56 bytes)
26,689,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,720,184 UART: [rt]cmd =0x44504543, len=96
26,726,562 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,436,851 ready_for_fw is high
3,437,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,725,901 >>> mbox cmd response: success
19,009,631 UART:
19,010,033 UART: Running Caliptra FMC ...
19,011,174 UART:
19,011,337 UART: [state] CFI Enabled
19,066,414 UART: [fht] FMC Alias Private Key: 7
20,829,541 UART: [art] Extend RT PCRs Done
20,830,752 UART: [art] Lock RT PCRs Done
20,832,321 UART: [art] Populate DV Done
20,837,941 UART: [fht] FMC Alias Private Key: 7
20,839,582 UART: [art] Derive CDI
20,840,395 UART: [art] Store in in slot 0x4
20,899,066 UART: [art] Derive Key Pair
20,900,101 UART: [art] Store priv key in slot 0x5
23,363,235 UART: [art] Derive Key Pair - Done
23,376,023 UART: [art] Signing Cert with AUTHO
23,377,342 UART: RITY.KEYID = 7
25,088,668 UART: [art] Erasing AUTHORITY.KEYID = 7
25,090,184 UART: [art] PUB.X = 4AAA2762D73B8526FEFE53DF3C301E168773491764205967C5C211C3129EAE548B815743257C65A3A71FBA5156A67CAF
25,097,462 UART: [art] PUB.Y = 0A5DE87F13AAF095B3B35AD41911559B9F8A4BC18801687A79E8C41F2310E32E7415BADB9DFA7DD217C49AFBFA3A8C3C
25,104,726 UART: [art] SIG.R = CC951F8E0F9359F0904EEF1A2F595AA37AB3FE80EE6397EC884FE78F2AE02278228DE007835E9710368470F4A8A216F4
25,112,118 UART: [art] SIG.S = A485FA54BAACC0AEE2A44578D2FA86055D7AF9C90E6D00B8EF42DBCAC8A4E9C60DB9F8305201DE590080356519D464F1
26,091,251 UART: Caliptra RT
26,091,945 UART: [state] CFI Enabled
26,255,604 UART: [rt] RT listening for mailbox commands...
26,257,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,288,046 UART: [rt]cmd =0x44504543, len=24
26,331,081 >>> mbox cmd response data (40 bytes)
26,332,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,362,859 UART: [rt]cmd =0x44504543, len=96
26,422,514 >>> mbox cmd response data (56 bytes)
26,423,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,453,979 UART: [rt]cmd =0x44504543, len=96
26,529,604 >>> mbox cmd response data (56 bytes)
26,530,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,560,967 UART: [rt]cmd =0x44504543, len=96
26,635,993 >>> mbox cmd response data (56 bytes)
26,636,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,667,160 UART: [rt]cmd =0x44504543, len=96
26,742,777 >>> mbox cmd response data (56 bytes)
26,743,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,773,890 UART: [rt]cmd =0x44504543, len=96
26,849,520 >>> mbox cmd response data (56 bytes)
26,850,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,880,749 UART: [rt]cmd =0x44504543, len=96
26,956,173 >>> mbox cmd response data (56 bytes)
26,956,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,987,220 UART: [rt]cmd =0x44504543, len=96
27,063,118 >>> mbox cmd response data (56 bytes)
27,063,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,094,343 UART: [rt]cmd =0x44504543, len=96
27,169,983 >>> mbox cmd response data (56 bytes)
27,170,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,201,172 UART: [rt]cmd =0x44504543, len=96
27,276,585 >>> mbox cmd response data (56 bytes)
27,277,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,307,942 UART: [rt]cmd =0x44504543, len=96
27,383,491 >>> mbox cmd response data (56 bytes)
27,384,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,414,551 UART: [rt]cmd =0x44504543, len=96
27,489,700 >>> mbox cmd response data (56 bytes)
27,490,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,520,831 UART: [rt]cmd =0x44504543, len=96
27,596,779 >>> mbox cmd response data (56 bytes)
27,597,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,628,079 UART: [rt]cmd =0x44504543, len=96
27,703,387 >>> mbox cmd response data (56 bytes)
27,704,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,734,763 UART: [rt]cmd =0x44504543, len=96
27,810,515 >>> mbox cmd response data (56 bytes)
27,811,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,841,750 UART: [rt]cmd =0x44504543, len=96
27,848,398 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,757,278 ready_for_fw is high
3,757,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,958,678 >>> mbox cmd response: success
19,213,958 UART:
19,214,343 UART: Running Caliptra FMC ...
19,215,448 UART:
19,215,594 UART: [state] CFI Enabled
19,223,760 UART: [fht] FMC Alias Private Key: 7
20,980,771 UART: [art] Extend RT PCRs Done
20,981,994 UART: [art] Lock RT PCRs Done
20,983,693 UART: [art] Populate DV Done
20,989,213 UART: [fht] FMC Alias Private Key: 7
20,990,691 UART: [art] Derive CDI
20,991,420 UART: [art] Store in in slot 0x4
21,034,179 UART: [art] Derive Key Pair
21,035,240 UART: [art] Store priv key in slot 0x5
23,461,421 UART: [art] Derive Key Pair - Done
23,474,466 UART: [art] Signing Cert with AUTHO
23,475,762 UART: RITY.KEYID = 7
25,181,699 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,200 UART: [art] PUB.X = D3EEF481BD55471D2D41B55C1227BB284CF4316D58F177C3EB14194C9C57075DFFC3E3FB90C5A92533D2A98D656C1C7D
25,190,666 UART: [art] PUB.Y = 413ACBB2ABBDAFDB2C757BD4B79F84AA666F4C1A9F43D48B33E77E6FBD5141149600288A07FF27ACD1436C59AB49B4C6
25,197,773 UART: [art] SIG.R = 93671FEC4C0348AAB9E1121FC3B550DEEDFFFF15EBC13866E948D8734975476132A99636C16BBAA198DB730F189DC782
25,205,132 UART: [art] SIG.S = 18A0F0ED391057855C9C33FB5C7B94E9217A75859CE398BA033990A0ED017F80A0CC199253F5DD71DA8D899C0539F260
26,183,781 UART: Caliptra RT
26,184,458 UART: [state] CFI Enabled
26,301,512 UART: [rt] RT listening for mailbox commands...
26,303,439 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,333,471 UART: [rt]cmd =0x44504543, len=24
26,359,686 >>> mbox cmd response data (40 bytes)
26,360,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,391,656 UART: [rt]cmd =0x44504543, len=96
26,431,443 >>> mbox cmd response data (56 bytes)
26,432,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,462,691 UART: [rt]cmd =0x44504543, len=96
26,503,027 >>> mbox cmd response data (56 bytes)
26,503,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,534,238 UART: [rt]cmd =0x44504543, len=96
26,574,413 >>> mbox cmd response data (56 bytes)
26,575,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,605,673 UART: [rt]cmd =0x44504543, len=96
26,647,478 >>> mbox cmd response data (56 bytes)
26,648,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,678,570 UART: [rt]cmd =0x44504543, len=96
26,719,874 >>> mbox cmd response data (56 bytes)
26,720,589 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,751,062 UART: [rt]cmd =0x44504543, len=96
26,793,365 >>> mbox cmd response data (56 bytes)
26,794,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,824,723 UART: [rt]cmd =0x44504543, len=96
26,866,727 >>> mbox cmd response data (56 bytes)
26,867,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,897,938 UART: [rt]cmd =0x44504543, len=96
26,941,220 >>> mbox cmd response data (56 bytes)
26,941,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,972,219 UART: [rt]cmd =0x44504543, len=96
27,014,409 >>> mbox cmd response data (56 bytes)
27,015,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,045,584 UART: [rt]cmd =0x44504543, len=96
27,088,680 >>> mbox cmd response data (56 bytes)
27,089,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,119,981 UART: [rt]cmd =0x44504543, len=96
27,163,417 >>> mbox cmd response data (56 bytes)
27,164,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,194,506 UART: [rt]cmd =0x44504543, len=96
27,237,517 >>> mbox cmd response data (56 bytes)
27,238,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,268,737 UART: [rt]cmd =0x44504543, len=96
27,312,843 >>> mbox cmd response data (56 bytes)
27,313,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,344,217 UART: [rt]cmd =0x44504543, len=96
27,388,519 >>> mbox cmd response data (56 bytes)
27,389,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,419,550 UART: [rt]cmd =0x44504543, len=96
27,426,322 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,911 UART: [kat] SHA2-256
881,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,957 UART: [kat] ++
886,109 UART: [kat] sha1
890,415 UART: [kat] SHA2-256
892,353 UART: [kat] SHA2-384
895,148 UART: [kat] SHA2-512-ACC
897,049 UART: [kat] ECC-384
902,518 UART: [kat] HMAC-384Kdf
907,100 UART: [kat] LMS
1,475,296 UART: [kat] --
1,476,173 UART: [cold-reset] ++
1,476,669 UART: [fht] Storing FHT @ 0x50003400
1,479,626 UART: [idev] ++
1,479,794 UART: [idev] CDI.KEYID = 6
1,480,154 UART: [idev] SUBJECT.KEYID = 7
1,480,578 UART: [idev] UDS.KEYID = 0
1,480,923 ready_for_fw is high
1,480,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,726 UART: [idev] Erasing UDS.KEYID = 0
1,505,732 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,338 UART: [idev] --
1,515,447 UART: [ldev] ++
1,515,615 UART: [ldev] CDI.KEYID = 6
1,515,978 UART: [ldev] SUBJECT.KEYID = 5
1,516,404 UART: [ldev] AUTHORITY.KEYID = 7
1,516,867 UART: [ldev] FE.KEYID = 1
1,522,073 UART: [ldev] Erasing FE.KEYID = 1
1,547,432 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,148 UART: [ldev] --
1,586,481 UART: [fwproc] Waiting for Commands...
1,587,184 UART: [fwproc] Received command 0x46574c44
1,587,975 UART: [fwproc] Received Image of size 114448 bytes
2,886,752 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,202 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,554 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,701 >>> mbox cmd response: success
3,079,949 UART: [afmc] ++
3,080,117 UART: [afmc] CDI.KEYID = 6
3,080,479 UART: [afmc] SUBJECT.KEYID = 7
3,080,904 UART: [afmc] AUTHORITY.KEYID = 5
3,116,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,565 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,073 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,958 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,648 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,431 UART: [afmc] --
3,159,393 UART: [cold-reset] --
3,160,047 UART: [state] Locking Datavault
3,161,214 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,818 UART: [state] Locking ICCM
3,162,350 UART: [exit] Launching FMC @ 0x40000130
3,167,679 UART:
3,167,695 UART: Running Caliptra FMC ...
3,168,103 UART:
3,168,157 UART: [state] CFI Enabled
3,178,400 UART: [fht] FMC Alias Private Key: 7
3,286,287 UART: [art] Extend RT PCRs Done
3,286,715 UART: [art] Lock RT PCRs Done
3,288,315 UART: [art] Populate DV Done
3,296,438 UART: [fht] FMC Alias Private Key: 7
3,297,490 UART: [art] Derive CDI
3,297,770 UART: [art] Store in in slot 0x4
3,383,069 UART: [art] Derive Key Pair
3,383,429 UART: [art] Store priv key in slot 0x5
3,396,615 UART: [art] Derive Key Pair - Done
3,411,449 UART: [art] Signing Cert with AUTHO
3,411,929 UART: RITY.KEYID = 7
3,426,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,456 UART: [art] PUB.X = 87730EF568B886D22867BECD74CFB48167DCB5916F18CB59711660ADF98E4963AAF06CF3F8D15087074F8029F459DA8E
3,434,224 UART: [art] PUB.Y = 83253B9144A2B71AC014F3D1074020442CAB1806FB32FCCD7588C609915FD4E94197488F5E718A62F9D67FB1D862C949
3,441,161 UART: [art] SIG.R = DC62AE9FAE8E4B1F8BB3A5497A90E4CBF60AE21DB1C7DEB907BCB30A7B221AE7DCA571706C75D052B48BB175D83131DA
3,447,948 UART: [art] SIG.S = 8F8CF67E3D4DE48C580EE702E755F50043675F51F7FD9444AC2840398AE910A74C72FC43B7EF2DB9FC32248400920624
3,471,574 UART: Caliptra RT
3,471,827 UART: [state] CFI Enabled
3,580,543 UART: [rt] RT listening for mailbox commands...
3,581,213 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,305 UART: [rt]cmd =0x44504543, len=24
3,637,317 >>> mbox cmd response data (40 bytes)
3,637,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,361 UART: [rt]cmd =0x44504543, len=96
3,707,572 >>> mbox cmd response data (56 bytes)
3,707,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,666 UART: [rt]cmd =0x44504543, len=96
3,778,048 >>> mbox cmd response data (56 bytes)
3,778,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,856 UART: [rt]cmd =0x44504543, len=96
3,849,400 >>> mbox cmd response data (56 bytes)
3,849,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,404 UART: [rt]cmd =0x44504543, len=96
3,920,580 >>> mbox cmd response data (56 bytes)
3,920,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,642 UART: [rt]cmd =0x44504543, len=96
3,991,678 >>> mbox cmd response data (56 bytes)
3,991,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,564 UART: [rt]cmd =0x44504543, len=96
4,062,810 >>> mbox cmd response data (56 bytes)
4,062,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,092,866 UART: [rt]cmd =0x44504543, len=96
4,135,210 >>> mbox cmd response data (56 bytes)
4,135,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,164 UART: [rt]cmd =0x44504543, len=96
4,207,326 >>> mbox cmd response data (56 bytes)
4,207,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,237,394 UART: [rt]cmd =0x44504543, len=96
4,280,142 >>> mbox cmd response data (56 bytes)
4,280,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,309,924 UART: [rt]cmd =0x44504543, len=96
4,352,384 >>> mbox cmd response data (56 bytes)
4,352,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,382,288 UART: [rt]cmd =0x44504543, len=96
4,425,346 >>> mbox cmd response data (56 bytes)
4,425,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,455,282 UART: [rt]cmd =0x44504543, len=96
4,498,658 >>> mbox cmd response data (56 bytes)
4,498,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,528,518 UART: [rt]cmd =0x44504543, len=96
4,572,920 >>> mbox cmd response data (56 bytes)
4,572,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,602,914 UART: [rt]cmd =0x44504543, len=96
4,646,928 >>> mbox cmd response data (56 bytes)
4,646,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,677,146 UART: [rt]cmd =0x44504543, len=96
4,684,159 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,709 ready_for_fw is high
1,362,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,191 >>> mbox cmd response: success
2,989,367 UART:
2,989,383 UART: Running Caliptra FMC ...
2,989,791 UART:
2,989,845 UART: [state] CFI Enabled
3,000,086 UART: [fht] FMC Alias Private Key: 7
3,108,547 UART: [art] Extend RT PCRs Done
3,108,975 UART: [art] Lock RT PCRs Done
3,110,433 UART: [art] Populate DV Done
3,118,496 UART: [fht] FMC Alias Private Key: 7
3,119,576 UART: [art] Derive CDI
3,119,856 UART: [art] Store in in slot 0x4
3,205,113 UART: [art] Derive Key Pair
3,205,473 UART: [art] Store priv key in slot 0x5
3,218,989 UART: [art] Derive Key Pair - Done
3,233,813 UART: [art] Signing Cert with AUTHO
3,234,293 UART: RITY.KEYID = 7
3,249,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,360 UART: [art] PUB.X = F24B401CA5FAD7D385874163E080C112C8161042D84D836CC9E2CC24912B323F3B2FD3F6E5E30927D5D736787F951EB2
3,257,127 UART: [art] PUB.Y = F8F5BC1B49A9711E94F69569C5B565939311565813FC278838957FF4C0A480C013B66FE17B5BF0E5B5B122ED55026451
3,264,068 UART: [art] SIG.R = 360EE9466CEFDAC44B8B7A5B6C0498A442C9024707D7E4B9E69BEA29ED80277101BD53C2707DC57670E02D249404F069
3,270,822 UART: [art] SIG.S = A936AEB56647EE4CC11633040B90FE46DFEF885904748B7EDBC4459AA0B849D492DAE0D52A02C193347CA3C13CCDAC5E
3,294,531 UART: Caliptra RT
3,294,784 UART: [state] CFI Enabled
3,403,507 UART: [rt] RT listening for mailbox commands...
3,404,177 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,221 UART: [rt]cmd =0x44504543, len=24
3,460,481 >>> mbox cmd response data (40 bytes)
3,460,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,515 UART: [rt]cmd =0x44504543, len=96
3,531,002 >>> mbox cmd response data (56 bytes)
3,531,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,758 UART: [rt]cmd =0x44504543, len=96
3,601,332 >>> mbox cmd response data (56 bytes)
3,601,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,324 UART: [rt]cmd =0x44504543, len=96
3,671,564 >>> mbox cmd response data (56 bytes)
3,671,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,404 UART: [rt]cmd =0x44504543, len=96
3,742,818 >>> mbox cmd response data (56 bytes)
3,742,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,722 UART: [rt]cmd =0x44504543, len=96
3,813,834 >>> mbox cmd response data (56 bytes)
3,813,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,638 UART: [rt]cmd =0x44504543, len=96
3,885,458 >>> mbox cmd response data (56 bytes)
3,885,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,236 UART: [rt]cmd =0x44504543, len=96
3,956,756 >>> mbox cmd response data (56 bytes)
3,956,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,986,714 UART: [rt]cmd =0x44504543, len=96
4,028,828 >>> mbox cmd response data (56 bytes)
4,028,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,058,838 UART: [rt]cmd =0x44504543, len=96
4,101,754 >>> mbox cmd response data (56 bytes)
4,101,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,131,690 UART: [rt]cmd =0x44504543, len=96
4,174,618 >>> mbox cmd response data (56 bytes)
4,174,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,204,524 UART: [rt]cmd =0x44504543, len=96
4,247,108 >>> mbox cmd response data (56 bytes)
4,247,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,277,002 UART: [rt]cmd =0x44504543, len=96
4,319,636 >>> mbox cmd response data (56 bytes)
4,319,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,349,652 UART: [rt]cmd =0x44504543, len=96
4,393,328 >>> mbox cmd response data (56 bytes)
4,393,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,423,268 UART: [rt]cmd =0x44504543, len=96
4,466,852 >>> mbox cmd response data (56 bytes)
4,466,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,496,796 UART: [rt]cmd =0x44504543, len=96
4,504,041 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
891,052 UART: [kat] SHA2-256
892,990 UART: [kat] SHA2-384
895,849 UART: [kat] SHA2-512-ACC
897,750 UART: [kat] ECC-384
903,343 UART: [kat] HMAC-384Kdf
908,095 UART: [kat] LMS
1,476,291 UART: [kat] --
1,477,340 UART: [cold-reset] ++
1,477,898 UART: [fht] Storing FHT @ 0x50003400
1,480,745 UART: [idev] ++
1,480,913 UART: [idev] CDI.KEYID = 6
1,481,273 UART: [idev] SUBJECT.KEYID = 7
1,481,697 UART: [idev] UDS.KEYID = 0
1,482,042 ready_for_fw is high
1,482,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,653 UART: [idev] Erasing UDS.KEYID = 0
1,506,497 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,009 UART: [idev] --
1,516,154 UART: [ldev] ++
1,516,322 UART: [ldev] CDI.KEYID = 6
1,516,685 UART: [ldev] SUBJECT.KEYID = 5
1,517,111 UART: [ldev] AUTHORITY.KEYID = 7
1,517,574 UART: [ldev] FE.KEYID = 1
1,523,092 UART: [ldev] Erasing FE.KEYID = 1
1,547,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,295 UART: [ldev] --
1,587,596 UART: [fwproc] Waiting for Commands...
1,588,285 UART: [fwproc] Received command 0x46574c44
1,589,076 UART: [fwproc] Received Image of size 114448 bytes
2,889,277 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,757 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,109 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,164 >>> mbox cmd response: success
3,083,202 UART: [afmc] ++
3,083,370 UART: [afmc] CDI.KEYID = 6
3,083,732 UART: [afmc] SUBJECT.KEYID = 7
3,084,157 UART: [afmc] AUTHORITY.KEYID = 5
3,119,320 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,734 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,514 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,127 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,817 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,684 UART: [afmc] --
3,162,644 UART: [cold-reset] --
3,163,388 UART: [state] Locking Datavault
3,164,281 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,885 UART: [state] Locking ICCM
3,165,467 UART: [exit] Launching FMC @ 0x40000130
3,170,796 UART:
3,170,812 UART: Running Caliptra FMC ...
3,171,220 UART:
3,171,363 UART: [state] CFI Enabled
3,182,388 UART: [fht] FMC Alias Private Key: 7
3,291,009 UART: [art] Extend RT PCRs Done
3,291,437 UART: [art] Lock RT PCRs Done
3,292,791 UART: [art] Populate DV Done
3,300,982 UART: [fht] FMC Alias Private Key: 7
3,302,050 UART: [art] Derive CDI
3,302,330 UART: [art] Store in in slot 0x4
3,387,761 UART: [art] Derive Key Pair
3,388,121 UART: [art] Store priv key in slot 0x5
3,401,395 UART: [art] Derive Key Pair - Done
3,416,379 UART: [art] Signing Cert with AUTHO
3,416,859 UART: RITY.KEYID = 7
3,431,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,502 UART: [art] PUB.X = BE0019C4FCF5B5192A972812B99D606B189B1ECEF074997A072F7E9340A48F2149951FD5644AE2EC015FB7D5B9E4562A
3,439,248 UART: [art] PUB.Y = 4170C1282495B56DE339408C7D898BB46B3C28F6A19070B9DE4C72D21ECB42D816CEF7DCCB965B3D961F5FD8246C4DB8
3,446,208 UART: [art] SIG.R = D30B080EE2AF3A4EA32F09F3074069639C77186516DD2908F6E1180D73DD127A4E22C649837C91522F25CAB7BF2AE883
3,452,957 UART: [art] SIG.S = 41FD4A4409FEFAE89577904712A1725B578023B160162343097D99480720F2BDE6B618D618E6A478CB51E9539F89D45D
3,476,683 UART: Caliptra RT
3,477,028 UART: [state] CFI Enabled
3,584,999 UART: [rt] RT listening for mailbox commands...
3,585,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,645 UART: [rt]cmd =0x44504543, len=24
3,642,277 >>> mbox cmd response data (40 bytes)
3,642,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,081 UART: [rt]cmd =0x44504543, len=96
3,713,032 >>> mbox cmd response data (56 bytes)
3,713,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,686 UART: [rt]cmd =0x44504543, len=96
3,783,062 >>> mbox cmd response data (56 bytes)
3,783,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,930 UART: [rt]cmd =0x44504543, len=96
3,854,168 >>> mbox cmd response data (56 bytes)
3,854,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,884,022 UART: [rt]cmd =0x44504543, len=96
3,924,986 >>> mbox cmd response data (56 bytes)
3,924,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,064 UART: [rt]cmd =0x44504543, len=96
3,996,426 >>> mbox cmd response data (56 bytes)
3,996,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,026,116 UART: [rt]cmd =0x44504543, len=96
4,067,642 >>> mbox cmd response data (56 bytes)
4,067,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,097,732 UART: [rt]cmd =0x44504543, len=96
4,139,568 >>> mbox cmd response data (56 bytes)
4,139,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,486 UART: [rt]cmd =0x44504543, len=96
4,212,274 >>> mbox cmd response data (56 bytes)
4,212,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,242,270 UART: [rt]cmd =0x44504543, len=96
4,284,594 >>> mbox cmd response data (56 bytes)
4,284,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,314,324 UART: [rt]cmd =0x44504543, len=96
4,357,030 >>> mbox cmd response data (56 bytes)
4,357,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,387,028 UART: [rt]cmd =0x44504543, len=96
4,430,304 >>> mbox cmd response data (56 bytes)
4,430,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,460,252 UART: [rt]cmd =0x44504543, len=96
4,503,398 >>> mbox cmd response data (56 bytes)
4,503,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,533,432 UART: [rt]cmd =0x44504543, len=96
4,576,352 >>> mbox cmd response data (56 bytes)
4,576,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,606,124 UART: [rt]cmd =0x44504543, len=96
4,650,304 >>> mbox cmd response data (56 bytes)
4,650,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,680,154 UART: [rt]cmd =0x44504543, len=96
4,687,843 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,256 ready_for_fw is high
1,363,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,310 >>> mbox cmd response: success
2,992,280 UART:
2,992,296 UART: Running Caliptra FMC ...
2,992,704 UART:
2,992,847 UART: [state] CFI Enabled
3,003,430 UART: [fht] FMC Alias Private Key: 7
3,111,631 UART: [art] Extend RT PCRs Done
3,112,059 UART: [art] Lock RT PCRs Done
3,113,593 UART: [art] Populate DV Done
3,121,912 UART: [fht] FMC Alias Private Key: 7
3,122,952 UART: [art] Derive CDI
3,123,232 UART: [art] Store in in slot 0x4
3,209,473 UART: [art] Derive Key Pair
3,209,833 UART: [art] Store priv key in slot 0x5
3,223,477 UART: [art] Derive Key Pair - Done
3,237,932 UART: [art] Signing Cert with AUTHO
3,238,412 UART: RITY.KEYID = 7
3,253,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,523 UART: [art] PUB.X = 84EA95B4A46F0ACB90F0646BEF110A576B5B2EBCF9AA9FFF9E3DB1892D10EBE0026557643531ABCBD5855F9B629ADC43
3,261,304 UART: [art] PUB.Y = B67FF49D0E8A8570B5B960DCB32FA57A030DD81F49589D2AC21B0307DFF5A37587FD7DB30272A44FCCF77C2210048B09
3,268,240 UART: [art] SIG.R = 77C225685A01F469F043AD0D441BA4ACDCF1D28AA20AA944E62B21FBC915097F17AD549FDAF486238F53CDCA44A8D5CC
3,275,016 UART: [art] SIG.S = 4137D47E4A8A9B57CC02584FB37AD7BD28036EC6C8F007C348CE397BF258A92E26E6DE785C1841AC765255A6C2C100AF
3,299,160 UART: Caliptra RT
3,299,505 UART: [state] CFI Enabled
3,406,967 UART: [rt] RT listening for mailbox commands...
3,407,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,695 UART: [rt]cmd =0x44504543, len=24
3,464,541 >>> mbox cmd response data (40 bytes)
3,464,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,494,549 UART: [rt]cmd =0x44504543, len=96
3,535,314 >>> mbox cmd response data (56 bytes)
3,535,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,260 UART: [rt]cmd =0x44504543, len=96
3,606,346 >>> mbox cmd response data (56 bytes)
3,606,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,106 UART: [rt]cmd =0x44504543, len=96
3,677,778 >>> mbox cmd response data (56 bytes)
3,677,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,524 UART: [rt]cmd =0x44504543, len=96
3,749,124 >>> mbox cmd response data (56 bytes)
3,749,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,162 UART: [rt]cmd =0x44504543, len=96
3,820,774 >>> mbox cmd response data (56 bytes)
3,820,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,850,740 UART: [rt]cmd =0x44504543, len=96
3,892,744 >>> mbox cmd response data (56 bytes)
3,892,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,922,586 UART: [rt]cmd =0x44504543, len=96
3,964,222 >>> mbox cmd response data (56 bytes)
3,964,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,994,150 UART: [rt]cmd =0x44504543, len=96
4,037,000 >>> mbox cmd response data (56 bytes)
4,037,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,036 UART: [rt]cmd =0x44504543, len=96
4,110,884 >>> mbox cmd response data (56 bytes)
4,110,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,140,914 UART: [rt]cmd =0x44504543, len=96
4,184,610 >>> mbox cmd response data (56 bytes)
4,184,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,214,632 UART: [rt]cmd =0x44504543, len=96
4,257,726 >>> mbox cmd response data (56 bytes)
4,257,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,287,792 UART: [rt]cmd =0x44504543, len=96
4,331,296 >>> mbox cmd response data (56 bytes)
4,331,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,361,140 UART: [rt]cmd =0x44504543, len=96
4,404,210 >>> mbox cmd response data (56 bytes)
4,404,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,434,278 UART: [rt]cmd =0x44504543, len=96
4,478,748 >>> mbox cmd response data (56 bytes)
4,478,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,508,638 UART: [rt]cmd =0x44504543, len=96
4,515,525 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,957 UART: [kat] SHA2-256
903,897 UART: [kat] SHA2-384
906,664 UART: [kat] SHA2-512-ACC
908,565 UART: [kat] ECC-384
918,546 UART: [kat] HMAC-384Kdf
923,310 UART: [kat] LMS
1,171,638 UART: [kat] --
1,172,445 UART: [cold-reset] ++
1,172,837 UART: [fht] FHT @ 0x50003400
1,175,636 UART: [idev] ++
1,175,804 UART: [idev] CDI.KEYID = 6
1,176,164 UART: [idev] SUBJECT.KEYID = 7
1,176,588 UART: [idev] UDS.KEYID = 0
1,176,933 ready_for_fw is high
1,176,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,832 UART: [idev] Erasing UDS.KEYID = 0
1,201,261 UART: [idev] Sha1 KeyId Algorithm
1,209,791 UART: [idev] --
1,210,725 UART: [ldev] ++
1,210,893 UART: [ldev] CDI.KEYID = 6
1,211,256 UART: [ldev] SUBJECT.KEYID = 5
1,211,682 UART: [ldev] AUTHORITY.KEYID = 7
1,212,145 UART: [ldev] FE.KEYID = 1
1,217,525 UART: [ldev] Erasing FE.KEYID = 1
1,244,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,877 UART: [ldev] --
1,283,330 UART: [fwproc] Wait for Commands...
1,283,986 UART: [fwproc] Recv command 0x46574c44
1,284,714 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,484 >>> mbox cmd response: success
2,777,672 UART: [afmc] ++
2,777,840 UART: [afmc] CDI.KEYID = 6
2,778,202 UART: [afmc] SUBJECT.KEYID = 7
2,778,627 UART: [afmc] AUTHORITY.KEYID = 5
2,813,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,830 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,549 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,473 UART: [afmc] --
2,857,599 UART: [cold-reset] --
2,858,295 UART: [state] Locking Datavault
2,859,718 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,322 UART: [state] Locking ICCM
2,860,888 UART: [exit] Launching FMC @ 0x40000130
2,866,217 UART:
2,866,233 UART: Running Caliptra FMC ...
2,866,641 UART:
2,866,695 UART: [state] CFI Enabled
2,877,074 UART: [fht] FMC Alias Private Key: 7
2,985,833 UART: [art] Extend RT PCRs Done
2,986,261 UART: [art] Lock RT PCRs Done
2,987,989 UART: [art] Populate DV Done
2,996,204 UART: [fht] FMC Alias Private Key: 7
2,997,168 UART: [art] Derive CDI
2,997,448 UART: [art] Store in in slot 0x4
3,083,295 UART: [art] Derive Key Pair
3,083,655 UART: [art] Store priv key in slot 0x5
3,097,049 UART: [art] Derive Key Pair - Done
3,111,936 UART: [art] Signing Cert with AUTHO
3,112,416 UART: RITY.KEYID = 7
3,127,714 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,479 UART: [art] PUB.X = 246B38FAA9319316E03B5244E8E2DBFECD71A14381C7664EACDA66AEBECF446CB90A0328B21E717BC975790A16F0845E
3,135,252 UART: [art] PUB.Y = C22B62F804E93F402B599740FAFA943D0066D4BD7FBC94D3A272969A2FE6BA621FC956DE2BD1264ED29736EC6059DB9F
3,142,189 UART: [art] SIG.R = 233A09BBCE5CAF59D391D359DA5021FC8AA9653945DB0DB2D47712F95E447FD64EF2CB54D8D77F9E005E3277CECD017E
3,148,944 UART: [art] SIG.S = 23CF8AF1703E30ABF83C3CDD7EC353952989F8181C6089EE444996FF0D6BDFA6DB1AB4A4B5DF87AACE4ED4D18BDED7F7
3,172,896 UART: Caliptra RT
3,173,149 UART: [state] CFI Enabled
3,281,302 UART: [rt] RT listening for mailbox commands...
3,281,972 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,816 UART: [rt]cmd =0x44504543, len=24
3,338,034 >>> mbox cmd response data (40 bytes)
3,338,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,882 UART: [rt]cmd =0x44504543, len=96
3,408,013 >>> mbox cmd response data (56 bytes)
3,408,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,865 UART: [rt]cmd =0x44504543, len=96
3,478,543 >>> mbox cmd response data (56 bytes)
3,478,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,305 UART: [rt]cmd =0x44504543, len=96
3,549,027 >>> mbox cmd response data (56 bytes)
3,549,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,007 UART: [rt]cmd =0x44504543, len=96
3,619,903 >>> mbox cmd response data (56 bytes)
3,619,904 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,649 UART: [rt]cmd =0x44504543, len=96
3,690,825 >>> mbox cmd response data (56 bytes)
3,690,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,507 UART: [rt]cmd =0x44504543, len=96
3,762,895 >>> mbox cmd response data (56 bytes)
3,762,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,581 UART: [rt]cmd =0x44504543, len=96
3,835,233 >>> mbox cmd response data (56 bytes)
3,835,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,913 UART: [rt]cmd =0x44504543, len=96
3,907,447 >>> mbox cmd response data (56 bytes)
3,907,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,377 UART: [rt]cmd =0x44504543, len=96
3,979,571 >>> mbox cmd response data (56 bytes)
3,979,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,009,551 UART: [rt]cmd =0x44504543, len=96
4,052,935 >>> mbox cmd response data (56 bytes)
4,052,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,777 UART: [rt]cmd =0x44504543, len=96
4,125,899 >>> mbox cmd response data (56 bytes)
4,125,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,155,807 UART: [rt]cmd =0x44504543, len=96
4,199,109 >>> mbox cmd response data (56 bytes)
4,199,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,228,911 UART: [rt]cmd =0x44504543, len=96
4,272,715 >>> mbox cmd response data (56 bytes)
4,272,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,302,807 UART: [rt]cmd =0x44504543, len=96
4,346,807 >>> mbox cmd response data (56 bytes)
4,346,808 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,376,561 UART: [rt]cmd =0x44504543, len=96
4,383,498 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,303 ready_for_fw is high
1,060,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,689 >>> mbox cmd response: success
2,690,107 UART:
2,690,123 UART: Running Caliptra FMC ...
2,690,531 UART:
2,690,585 UART: [state] CFI Enabled
2,701,306 UART: [fht] FMC Alias Private Key: 7
2,809,145 UART: [art] Extend RT PCRs Done
2,809,573 UART: [art] Lock RT PCRs Done
2,811,247 UART: [art] Populate DV Done
2,819,710 UART: [fht] FMC Alias Private Key: 7
2,820,672 UART: [art] Derive CDI
2,820,952 UART: [art] Store in in slot 0x4
2,906,673 UART: [art] Derive Key Pair
2,907,033 UART: [art] Store priv key in slot 0x5
2,919,977 UART: [art] Derive Key Pair - Done
2,934,794 UART: [art] Signing Cert with AUTHO
2,935,274 UART: RITY.KEYID = 7
2,950,674 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,439 UART: [art] PUB.X = F2CF621DA4CEA4D3DEC8031BC9599089A6C6A615C5F9473D00D2ADD26722297D90CE3605A502A92D40D2B9E2A620D1E9
2,958,188 UART: [art] PUB.Y = B2E59D383BD8F70C3B0176C2FD866A8F2F2AE356A839F4B54AFDDA4C217523D75B5F63DC26E1D34EA0C4E98E43DE9F93
2,965,150 UART: [art] SIG.R = 56C3AB59A9FD9F67FB56DDC51F7E5A76C66EA022968521035629921919FDB55359B6DD823E8CCDF90DE25AE7CE3A74C4
2,971,926 UART: [art] SIG.S = 14B84C4BB589ACD58F14D247879F519108A345F1C687526785A61E7ED6A06333D76FA2EB0913CACAEDC07D847F2B45CD
2,996,037 UART: Caliptra RT
2,996,290 UART: [state] CFI Enabled
3,103,781 UART: [rt] RT listening for mailbox commands...
3,104,451 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,399 UART: [rt]cmd =0x44504543, len=24
3,160,641 >>> mbox cmd response data (40 bytes)
3,160,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,677 UART: [rt]cmd =0x44504543, len=96
3,229,878 >>> mbox cmd response data (56 bytes)
3,229,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,259,806 UART: [rt]cmd =0x44504543, len=96
3,300,300 >>> mbox cmd response data (56 bytes)
3,300,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,280 UART: [rt]cmd =0x44504543, len=96
3,370,938 >>> mbox cmd response data (56 bytes)
3,370,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,966 UART: [rt]cmd =0x44504543, len=96
3,442,114 >>> mbox cmd response data (56 bytes)
3,442,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,166 UART: [rt]cmd =0x44504543, len=96
3,513,960 >>> mbox cmd response data (56 bytes)
3,513,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,886 UART: [rt]cmd =0x44504543, len=96
3,585,926 >>> mbox cmd response data (56 bytes)
3,585,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,876 UART: [rt]cmd =0x44504543, len=96
3,657,866 >>> mbox cmd response data (56 bytes)
3,657,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,856 UART: [rt]cmd =0x44504543, len=96
3,730,582 >>> mbox cmd response data (56 bytes)
3,730,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,494 UART: [rt]cmd =0x44504543, len=96
3,802,402 >>> mbox cmd response data (56 bytes)
3,802,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,302 UART: [rt]cmd =0x44504543, len=96
3,875,624 >>> mbox cmd response data (56 bytes)
3,875,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,905,572 UART: [rt]cmd =0x44504543, len=96
3,948,702 >>> mbox cmd response data (56 bytes)
3,948,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,978,690 UART: [rt]cmd =0x44504543, len=96
4,022,692 >>> mbox cmd response data (56 bytes)
4,022,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,052,426 UART: [rt]cmd =0x44504543, len=96
4,095,056 >>> mbox cmd response data (56 bytes)
4,095,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,125,104 UART: [rt]cmd =0x44504543, len=96
4,168,922 >>> mbox cmd response data (56 bytes)
4,168,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,654 UART: [rt]cmd =0x44504543, len=96
4,205,649 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
893,383 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,508 UART: [kat] ++
897,660 UART: [kat] sha1
901,946 UART: [kat] SHA2-256
903,886 UART: [kat] SHA2-384
906,717 UART: [kat] SHA2-512-ACC
908,618 UART: [kat] ECC-384
918,523 UART: [kat] HMAC-384Kdf
923,057 UART: [kat] LMS
1,171,385 UART: [kat] --
1,172,108 UART: [cold-reset] ++
1,172,538 UART: [fht] FHT @ 0x50003400
1,175,103 UART: [idev] ++
1,175,271 UART: [idev] CDI.KEYID = 6
1,175,631 UART: [idev] SUBJECT.KEYID = 7
1,176,055 UART: [idev] UDS.KEYID = 0
1,176,400 ready_for_fw is high
1,176,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,695 UART: [idev] Erasing UDS.KEYID = 0
1,200,952 UART: [idev] Sha1 KeyId Algorithm
1,209,632 UART: [idev] --
1,210,500 UART: [ldev] ++
1,210,668 UART: [ldev] CDI.KEYID = 6
1,211,031 UART: [ldev] SUBJECT.KEYID = 5
1,211,457 UART: [ldev] AUTHORITY.KEYID = 7
1,211,920 UART: [ldev] FE.KEYID = 1
1,217,172 UART: [ldev] Erasing FE.KEYID = 1
1,243,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,958 UART: [ldev] --
1,283,377 UART: [fwproc] Wait for Commands...
1,284,155 UART: [fwproc] Recv command 0x46574c44
1,284,883 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,631 >>> mbox cmd response: success
2,776,657 UART: [afmc] ++
2,776,825 UART: [afmc] CDI.KEYID = 6
2,777,187 UART: [afmc] SUBJECT.KEYID = 7
2,777,612 UART: [afmc] AUTHORITY.KEYID = 5
2,813,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,236 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,849 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,568 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,488 UART: [afmc] --
2,856,428 UART: [cold-reset] --
2,857,322 UART: [state] Locking Datavault
2,858,361 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,965 UART: [state] Locking ICCM
2,859,505 UART: [exit] Launching FMC @ 0x40000130
2,864,834 UART:
2,864,850 UART: Running Caliptra FMC ...
2,865,258 UART:
2,865,401 UART: [state] CFI Enabled
2,876,060 UART: [fht] FMC Alias Private Key: 7
2,984,355 UART: [art] Extend RT PCRs Done
2,984,783 UART: [art] Lock RT PCRs Done
2,986,451 UART: [art] Populate DV Done
2,994,684 UART: [fht] FMC Alias Private Key: 7
2,995,630 UART: [art] Derive CDI
2,995,910 UART: [art] Store in in slot 0x4
3,081,533 UART: [art] Derive Key Pair
3,081,893 UART: [art] Store priv key in slot 0x5
3,094,859 UART: [art] Derive Key Pair - Done
3,109,581 UART: [art] Signing Cert with AUTHO
3,110,061 UART: RITY.KEYID = 7
3,125,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,816 UART: [art] PUB.X = AE173BD5AB92769CCA8E3ACDC758CFA55413CDDDBFC146C98BF234A3DC35E8BE993F07067EF7BE0E49B4AB7DB3C1076F
3,132,604 UART: [art] PUB.Y = BADC0EA273157E81E8A8A078838C2AC3842860D42157D404E0A6BB973FC60DF29504B00BEB28A62E2C5C24124055E718
3,139,541 UART: [art] SIG.R = C985028E2D7D3F3B73A527B6E47EBEB51F0F66A1E87152B03980CCAC4A29700C34D160BEB5A0AD163A5436DF17E52C08
3,146,309 UART: [art] SIG.S = 572884D68800426CAB42CD949B4070A9835B7F0DAC413A300E5FC221C37115633F95BB9AF4715C001BF37C3FDE50C5DB
3,170,478 UART: Caliptra RT
3,170,823 UART: [state] CFI Enabled
3,278,716 UART: [rt] RT listening for mailbox commands...
3,279,386 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,182 UART: [rt]cmd =0x44504543, len=24
3,335,720 >>> mbox cmd response data (40 bytes)
3,335,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,616 UART: [rt]cmd =0x44504543, len=96
3,406,461 >>> mbox cmd response data (56 bytes)
3,406,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,439 UART: [rt]cmd =0x44504543, len=96
3,476,385 >>> mbox cmd response data (56 bytes)
3,476,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,167 UART: [rt]cmd =0x44504543, len=96
3,546,949 >>> mbox cmd response data (56 bytes)
3,546,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,013 UART: [rt]cmd =0x44504543, len=96
3,618,279 >>> mbox cmd response data (56 bytes)
3,618,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,229 UART: [rt]cmd =0x44504543, len=96
3,690,505 >>> mbox cmd response data (56 bytes)
3,690,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,573 UART: [rt]cmd =0x44504543, len=96
3,762,459 >>> mbox cmd response data (56 bytes)
3,762,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,551 UART: [rt]cmd =0x44504543, len=96
3,835,043 >>> mbox cmd response data (56 bytes)
3,835,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,883 UART: [rt]cmd =0x44504543, len=96
3,907,203 >>> mbox cmd response data (56 bytes)
3,907,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,235 UART: [rt]cmd =0x44504543, len=96
3,979,637 >>> mbox cmd response data (56 bytes)
3,979,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,009,673 UART: [rt]cmd =0x44504543, len=96
4,052,951 >>> mbox cmd response data (56 bytes)
4,052,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,895 UART: [rt]cmd =0x44504543, len=96
4,125,773 >>> mbox cmd response data (56 bytes)
4,125,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,155,863 UART: [rt]cmd =0x44504543, len=96
4,199,481 >>> mbox cmd response data (56 bytes)
4,199,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,229,371 UART: [rt]cmd =0x44504543, len=96
4,273,591 >>> mbox cmd response data (56 bytes)
4,273,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,303,559 UART: [rt]cmd =0x44504543, len=96
4,348,165 >>> mbox cmd response data (56 bytes)
4,348,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,377,927 UART: [rt]cmd =0x44504543, len=96
4,384,828 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,734 ready_for_fw is high
1,061,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,692 >>> mbox cmd response: success
2,693,752 UART:
2,693,768 UART: Running Caliptra FMC ...
2,694,176 UART:
2,694,319 UART: [state] CFI Enabled
2,704,844 UART: [fht] FMC Alias Private Key: 7
2,812,349 UART: [art] Extend RT PCRs Done
2,812,777 UART: [art] Lock RT PCRs Done
2,814,295 UART: [art] Populate DV Done
2,822,416 UART: [fht] FMC Alias Private Key: 7
2,823,360 UART: [art] Derive CDI
2,823,640 UART: [art] Store in in slot 0x4
2,908,975 UART: [art] Derive Key Pair
2,909,335 UART: [art] Store priv key in slot 0x5
2,922,991 UART: [art] Derive Key Pair - Done
2,937,555 UART: [art] Signing Cert with AUTHO
2,938,035 UART: RITY.KEYID = 7
2,952,853 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,618 UART: [art] PUB.X = 41DD09A2EA49A250B1869BD990CF6409835AF032AD5180785BA4BDA004A6189B475F6D2731E46E22DB23D953943AAB31
2,960,381 UART: [art] PUB.Y = 6D305F4C57EDED01DFB352D6DEFB619726BD0AC4700FED82D990C60A30AFA06BEB7436FCB4B0AB200F566154286A156F
2,967,334 UART: [art] SIG.R = C32BC6159498EAF9DF7FEF96D0D28A5EA1E8131D0DC147ADDC97C334BAB2C0C7C05FFBA53A139B3F54DEF968CD96C563
2,974,127 UART: [art] SIG.S = 92AFF17308B95EF55FBEB40927B777B86F719A1F01BE58569F095A39237B32BC9EAFB9B1F498760EFE28C07DB0F4AE25
2,998,145 UART: Caliptra RT
2,998,490 UART: [state] CFI Enabled
3,106,598 UART: [rt] RT listening for mailbox commands...
3,107,268 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,344 UART: [rt]cmd =0x44504543, len=24
3,164,008 >>> mbox cmd response data (40 bytes)
3,164,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,854 UART: [rt]cmd =0x44504543, len=96
3,234,623 >>> mbox cmd response data (56 bytes)
3,234,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,264,465 UART: [rt]cmd =0x44504543, len=96
3,305,613 >>> mbox cmd response data (56 bytes)
3,305,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,647 UART: [rt]cmd =0x44504543, len=96
3,376,539 >>> mbox cmd response data (56 bytes)
3,376,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,373 UART: [rt]cmd =0x44504543, len=96
3,447,743 >>> mbox cmd response data (56 bytes)
3,447,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,585 UART: [rt]cmd =0x44504543, len=96
3,518,913 >>> mbox cmd response data (56 bytes)
3,518,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,549,119 UART: [rt]cmd =0x44504543, len=96
3,590,783 >>> mbox cmd response data (56 bytes)
3,590,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,933 UART: [rt]cmd =0x44504543, len=96
3,662,331 >>> mbox cmd response data (56 bytes)
3,662,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,319 UART: [rt]cmd =0x44504543, len=96
3,734,399 >>> mbox cmd response data (56 bytes)
3,734,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,505 UART: [rt]cmd =0x44504543, len=96
3,807,027 >>> mbox cmd response data (56 bytes)
3,807,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,089 UART: [rt]cmd =0x44504543, len=96
3,879,825 >>> mbox cmd response data (56 bytes)
3,879,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,603 UART: [rt]cmd =0x44504543, len=96
3,952,967 >>> mbox cmd response data (56 bytes)
3,952,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,983,083 UART: [rt]cmd =0x44504543, len=96
4,026,289 >>> mbox cmd response data (56 bytes)
4,026,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,056,447 UART: [rt]cmd =0x44504543, len=96
4,100,069 >>> mbox cmd response data (56 bytes)
4,100,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,130,017 UART: [rt]cmd =0x44504543, len=96
4,174,483 >>> mbox cmd response data (56 bytes)
4,174,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,204,281 UART: [rt]cmd =0x44504543, len=96
4,211,604 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
86,001 UART: [state] WD Timer not started. Device not locked for debugging
87,248 UART: [kat] SHA2-256
890,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,927 UART: [kat] ++
895,079 UART: [kat] sha1
899,349 UART: [kat] SHA2-256
901,289 UART: [kat] SHA2-384
904,074 UART: [kat] SHA2-512-ACC
905,975 UART: [kat] ECC-384
915,542 UART: [kat] HMAC-384Kdf
920,064 UART: [kat] LMS
1,168,376 UART: [kat] --
1,169,107 UART: [cold-reset] ++
1,169,537 UART: [fht] FHT @ 0x50003400
1,172,183 UART: [idev] ++
1,172,351 UART: [idev] CDI.KEYID = 6
1,172,712 UART: [idev] SUBJECT.KEYID = 7
1,173,137 UART: [idev] UDS.KEYID = 0
1,173,483 ready_for_fw is high
1,173,483 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,057 UART: [idev] Sha1 KeyId Algorithm
1,206,849 UART: [idev] --
1,207,940 UART: [ldev] ++
1,208,108 UART: [ldev] CDI.KEYID = 6
1,208,472 UART: [ldev] SUBJECT.KEYID = 5
1,208,899 UART: [ldev] AUTHORITY.KEYID = 7
1,209,362 UART: [ldev] FE.KEYID = 1
1,214,556 UART: [ldev] Erasing FE.KEYID = 1
1,241,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,552 UART: [ldev] --
1,279,996 UART: [fwproc] Wait for Commands...
1,280,661 UART: [fwproc] Recv command 0x46574c44
1,281,394 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,005 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,314 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,416 >>> mbox cmd response: success
2,775,603 UART: [afmc] ++
2,775,771 UART: [afmc] CDI.KEYID = 6
2,776,134 UART: [afmc] SUBJECT.KEYID = 7
2,776,560 UART: [afmc] AUTHORITY.KEYID = 5
2,812,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,291 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,893 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,778 UART: [afmc] --
2,855,846 UART: [cold-reset] --
2,856,640 UART: [state] Locking Datavault
2,857,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,419 UART: [state] Locking ICCM
2,859,079 UART: [exit] Launching FMC @ 0x40000130
2,864,408 UART:
2,864,424 UART: Running Caliptra FMC ...
2,864,832 UART:
2,864,886 UART: [state] CFI Enabled
2,875,563 UART: [fht] FMC Alias Private Key: 7
2,983,392 UART: [art] Extend RT PCRs Done
2,983,820 UART: [art] Lock RT PCRs Done
2,985,162 UART: [art] Populate DV Done
2,993,559 UART: [fht] FMC Alias Private Key: 7
2,994,597 UART: [art] Derive CDI
2,994,877 UART: [art] Store in in slot 0x4
3,080,086 UART: [art] Derive Key Pair
3,080,446 UART: [art] Store priv key in slot 0x5
3,093,098 UART: [art] Derive Key Pair - Done
3,107,981 UART: [art] Signing Cert with AUTHO
3,108,461 UART: RITY.KEYID = 7
3,123,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,416 UART: [art] PUB.X = 7E067532CFF8C0613DD6520C823618FE41E538C606D8B0D6A79C19157DF0CFF244D0B90FB3AB20CE8411F925207BC9CA
3,131,182 UART: [art] PUB.Y = 042F3DC8352701245F77AA67F61716AF136D413981B7CC82941760A4A5C3E10B4204EC9C61491DD124769855993FF42F
3,138,110 UART: [art] SIG.R = D042693632C0A28A2561318533DB4A12E1C1E836CB210A1B834D02410BAAA132AD2C417F82899ED5C56E93131D4DB40B
3,144,868 UART: [art] SIG.S = 28EE62467817DC1E891440ECB9891B89E097B7FE8F5A02E43630B2EBBEBF7D175334D8F99A18F3EEE45F8CA8CF44883C
3,168,218 UART: Caliptra RT
3,168,471 UART: [state] CFI Enabled
3,276,028 UART: [rt] RT listening for mailbox commands...
3,276,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,614 UART: [rt]cmd =0x44504543, len=24
3,332,424 >>> mbox cmd response data (40 bytes)
3,332,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,348 UART: [rt]cmd =0x44504543, len=96
3,403,071 >>> mbox cmd response data (56 bytes)
3,403,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,953 UART: [rt]cmd =0x44504543, len=96
3,473,527 >>> mbox cmd response data (56 bytes)
3,473,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,727 UART: [rt]cmd =0x44504543, len=96
3,544,073 >>> mbox cmd response data (56 bytes)
3,544,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,885 UART: [rt]cmd =0x44504543, len=96
3,615,653 >>> mbox cmd response data (56 bytes)
3,615,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,669 UART: [rt]cmd =0x44504543, len=96
3,686,591 >>> mbox cmd response data (56 bytes)
3,686,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,385 UART: [rt]cmd =0x44504543, len=96
3,758,427 >>> mbox cmd response data (56 bytes)
3,758,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,263 UART: [rt]cmd =0x44504543, len=96
3,830,561 >>> mbox cmd response data (56 bytes)
3,830,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,351 UART: [rt]cmd =0x44504543, len=96
3,902,417 >>> mbox cmd response data (56 bytes)
3,902,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,305 UART: [rt]cmd =0x44504543, len=96
3,975,165 >>> mbox cmd response data (56 bytes)
3,975,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,115 UART: [rt]cmd =0x44504543, len=96
4,047,035 >>> mbox cmd response data (56 bytes)
4,047,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,987 UART: [rt]cmd =0x44504543, len=96
4,120,439 >>> mbox cmd response data (56 bytes)
4,120,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,150,307 UART: [rt]cmd =0x44504543, len=96
4,194,147 >>> mbox cmd response data (56 bytes)
4,194,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,224,049 UART: [rt]cmd =0x44504543, len=96
4,268,529 >>> mbox cmd response data (56 bytes)
4,268,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,298,607 UART: [rt]cmd =0x44504543, len=96
4,342,707 >>> mbox cmd response data (56 bytes)
4,342,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,731 UART: [rt]cmd =0x44504543, len=96
4,379,644 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,410 ready_for_fw is high
1,055,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,420 >>> mbox cmd response: success
2,683,904 UART:
2,683,920 UART: Running Caliptra FMC ...
2,684,328 UART:
2,684,382 UART: [state] CFI Enabled
2,694,653 UART: [fht] FMC Alias Private Key: 7
2,802,702 UART: [art] Extend RT PCRs Done
2,803,130 UART: [art] Lock RT PCRs Done
2,804,516 UART: [art] Populate DV Done
2,812,687 UART: [fht] FMC Alias Private Key: 7
2,813,853 UART: [art] Derive CDI
2,814,133 UART: [art] Store in in slot 0x4
2,900,020 UART: [art] Derive Key Pair
2,900,380 UART: [art] Store priv key in slot 0x5
2,913,616 UART: [art] Derive Key Pair - Done
2,928,563 UART: [art] Signing Cert with AUTHO
2,929,043 UART: RITY.KEYID = 7
2,943,639 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,404 UART: [art] PUB.X = D699031C286B6116FFC36484F487910CDB96D35868C343A6EEFB84FC01C829B8FD8BA26BA5965FA7A00F7E5E0D92C456
2,951,167 UART: [art] PUB.Y = 98DA64DB7DB505B64577091758943F948655CCBB77172E27D86565E6573AF39066D96E98BC05C72C704CBADB716B58CE
2,958,108 UART: [art] SIG.R = 350F61021407359C95CBA27F24C5357E3140D7414A21E905CEE153BE550EAFA9344C8BAF71B844E4E7FB05AC3B8B56D5
2,964,866 UART: [art] SIG.S = DC6C90F7489D3D86F95E3B861293D4FBB9814328C1ECCD74B08FA28749C9400A558D8E6D1293C5E0C2C0CEB35C5EC39B
2,988,420 UART: Caliptra RT
2,988,673 UART: [state] CFI Enabled
3,096,658 UART: [rt] RT listening for mailbox commands...
3,097,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,360 UART: [rt]cmd =0x44504543, len=24
3,153,880 >>> mbox cmd response data (40 bytes)
3,153,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,594 UART: [rt]cmd =0x44504543, len=96
3,224,121 >>> mbox cmd response data (56 bytes)
3,224,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,253,953 UART: [rt]cmd =0x44504543, len=96
3,294,275 >>> mbox cmd response data (56 bytes)
3,294,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,217 UART: [rt]cmd =0x44504543, len=96
3,365,369 >>> mbox cmd response data (56 bytes)
3,365,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,329 UART: [rt]cmd =0x44504543, len=96
3,436,061 >>> mbox cmd response data (56 bytes)
3,436,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,947 UART: [rt]cmd =0x44504543, len=96
3,506,823 >>> mbox cmd response data (56 bytes)
3,506,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,925 UART: [rt]cmd =0x44504543, len=96
3,578,587 >>> mbox cmd response data (56 bytes)
3,578,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,663 UART: [rt]cmd =0x44504543, len=96
3,649,969 >>> mbox cmd response data (56 bytes)
3,649,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,077 UART: [rt]cmd =0x44504543, len=96
3,723,027 >>> mbox cmd response data (56 bytes)
3,723,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,243 UART: [rt]cmd =0x44504543, len=96
3,795,599 >>> mbox cmd response data (56 bytes)
3,795,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,477 UART: [rt]cmd =0x44504543, len=96
3,869,139 >>> mbox cmd response data (56 bytes)
3,869,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,203 UART: [rt]cmd =0x44504543, len=96
3,942,321 >>> mbox cmd response data (56 bytes)
3,942,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,017 UART: [rt]cmd =0x44504543, len=96
4,015,269 >>> mbox cmd response data (56 bytes)
4,015,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,203 UART: [rt]cmd =0x44504543, len=96
4,088,977 >>> mbox cmd response data (56 bytes)
4,088,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,118,847 UART: [rt]cmd =0x44504543, len=96
4,162,835 >>> mbox cmd response data (56 bytes)
4,162,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,192,855 UART: [rt]cmd =0x44504543, len=96
4,200,220 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,985 UART: [state] LifecycleState = Unprovisioned
85,640 UART: [state] DebugLocked = No
86,126 UART: [state] WD Timer not started. Device not locked for debugging
87,393 UART: [kat] SHA2-256
890,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,072 UART: [kat] ++
895,224 UART: [kat] sha1
899,438 UART: [kat] SHA2-256
901,378 UART: [kat] SHA2-384
904,063 UART: [kat] SHA2-512-ACC
905,964 UART: [kat] ECC-384
915,623 UART: [kat] HMAC-384Kdf
920,071 UART: [kat] LMS
1,168,383 UART: [kat] --
1,169,414 UART: [cold-reset] ++
1,169,916 UART: [fht] FHT @ 0x50003400
1,172,554 UART: [idev] ++
1,172,722 UART: [idev] CDI.KEYID = 6
1,173,083 UART: [idev] SUBJECT.KEYID = 7
1,173,508 UART: [idev] UDS.KEYID = 0
1,173,854 ready_for_fw is high
1,173,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,596 UART: [idev] Erasing UDS.KEYID = 0
1,198,780 UART: [idev] Sha1 KeyId Algorithm
1,207,664 UART: [idev] --
1,208,731 UART: [ldev] ++
1,208,899 UART: [ldev] CDI.KEYID = 6
1,209,263 UART: [ldev] SUBJECT.KEYID = 5
1,209,690 UART: [ldev] AUTHORITY.KEYID = 7
1,210,153 UART: [ldev] FE.KEYID = 1
1,215,355 UART: [ldev] Erasing FE.KEYID = 1
1,241,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,031 UART: [ldev] --
1,280,345 UART: [fwproc] Wait for Commands...
1,281,008 UART: [fwproc] Recv command 0x46574c44
1,281,741 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,979 >>> mbox cmd response: success
2,775,084 UART: [afmc] ++
2,775,252 UART: [afmc] CDI.KEYID = 6
2,775,615 UART: [afmc] SUBJECT.KEYID = 7
2,776,041 UART: [afmc] AUTHORITY.KEYID = 5
2,811,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,673 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,402 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,285 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,004 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,833 UART: [afmc] --
2,854,845 UART: [cold-reset] --
2,855,657 UART: [state] Locking Datavault
2,856,832 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,436 UART: [state] Locking ICCM
2,857,912 UART: [exit] Launching FMC @ 0x40000130
2,863,241 UART:
2,863,257 UART: Running Caliptra FMC ...
2,863,665 UART:
2,863,808 UART: [state] CFI Enabled
2,874,365 UART: [fht] FMC Alias Private Key: 7
2,982,580 UART: [art] Extend RT PCRs Done
2,983,008 UART: [art] Lock RT PCRs Done
2,984,616 UART: [art] Populate DV Done
2,992,903 UART: [fht] FMC Alias Private Key: 7
2,994,033 UART: [art] Derive CDI
2,994,313 UART: [art] Store in in slot 0x4
3,080,354 UART: [art] Derive Key Pair
3,080,714 UART: [art] Store priv key in slot 0x5
3,094,402 UART: [art] Derive Key Pair - Done
3,109,178 UART: [art] Signing Cert with AUTHO
3,109,658 UART: RITY.KEYID = 7
3,124,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,653 UART: [art] PUB.X = 71F3D16A4335FD345A9B8141AD9C480BFE424496FFA06FE008BE67BC6E4E634B2DBDF1DE59CBDEFE2E5DDC816935EFFB
3,132,445 UART: [art] PUB.Y = EA71FE1CFF56CC7829A1308C78C88D2307C5EAA7A7187FD0FCA1B972B1EC142DDF029C87FFD7D3710C3560894E002E17
3,139,378 UART: [art] SIG.R = 32B878D522AC7B8F6AF474DFD9A1DE936B2757DB8C87ED667FA23D3E4BE70754CBFA361A51007FB5FA6C37FCCBB4C603
3,146,142 UART: [art] SIG.S = 15F00E7C5D7E58402643DB7A73D43EE98D02FDF1C36D67B28BA4EB0D24DB5291E48A54975A05EE0FFCFDB8ED65864D94
3,169,720 UART: Caliptra RT
3,170,065 UART: [state] CFI Enabled
3,277,944 UART: [rt] RT listening for mailbox commands...
3,278,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,342 UART: [rt]cmd =0x44504543, len=24
3,334,772 >>> mbox cmd response data (40 bytes)
3,334,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,644 UART: [rt]cmd =0x44504543, len=96
3,404,939 >>> mbox cmd response data (56 bytes)
3,404,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,753 UART: [rt]cmd =0x44504543, len=96
3,476,047 >>> mbox cmd response data (56 bytes)
3,476,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,923 UART: [rt]cmd =0x44504543, len=96
3,546,463 >>> mbox cmd response data (56 bytes)
3,546,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,319 UART: [rt]cmd =0x44504543, len=96
3,617,511 >>> mbox cmd response data (56 bytes)
3,617,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,667 UART: [rt]cmd =0x44504543, len=96
3,689,263 >>> mbox cmd response data (56 bytes)
3,689,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,719,323 UART: [rt]cmd =0x44504543, len=96
3,761,179 >>> mbox cmd response data (56 bytes)
3,761,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,113 UART: [rt]cmd =0x44504543, len=96
3,833,223 >>> mbox cmd response data (56 bytes)
3,833,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,137 UART: [rt]cmd =0x44504543, len=96
3,905,509 >>> mbox cmd response data (56 bytes)
3,905,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,447 UART: [rt]cmd =0x44504543, len=96
3,977,015 >>> mbox cmd response data (56 bytes)
3,977,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,149 UART: [rt]cmd =0x44504543, len=96
4,050,051 >>> mbox cmd response data (56 bytes)
4,050,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,080,061 UART: [rt]cmd =0x44504543, len=96
4,123,535 >>> mbox cmd response data (56 bytes)
4,123,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,153,401 UART: [rt]cmd =0x44504543, len=96
4,196,747 >>> mbox cmd response data (56 bytes)
4,196,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,799 UART: [rt]cmd =0x44504543, len=96
4,270,997 >>> mbox cmd response data (56 bytes)
4,270,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,300,975 UART: [rt]cmd =0x44504543, len=96
4,345,139 >>> mbox cmd response data (56 bytes)
4,345,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,375,281 UART: [rt]cmd =0x44504543, len=96
4,382,586 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,441 ready_for_fw is high
1,056,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,387 >>> mbox cmd response: success
2,687,469 UART:
2,687,485 UART: Running Caliptra FMC ...
2,687,893 UART:
2,688,036 UART: [state] CFI Enabled
2,698,485 UART: [fht] FMC Alias Private Key: 7
2,805,696 UART: [art] Extend RT PCRs Done
2,806,124 UART: [art] Lock RT PCRs Done
2,807,672 UART: [art] Populate DV Done
2,816,069 UART: [fht] FMC Alias Private Key: 7
2,816,997 UART: [art] Derive CDI
2,817,277 UART: [art] Store in in slot 0x4
2,902,668 UART: [art] Derive Key Pair
2,903,028 UART: [art] Store priv key in slot 0x5
2,916,026 UART: [art] Derive Key Pair - Done
2,931,031 UART: [art] Signing Cert with AUTHO
2,931,511 UART: RITY.KEYID = 7
2,947,027 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,792 UART: [art] PUB.X = EE9D8745610C1597AD8031A57FFC5A34B45136991181B1E113E2B154E64DE79D8C2C0A6D921A01E7AC0A359EDE673EC7
2,954,556 UART: [art] PUB.Y = 8530992A8C550B2C21EB2C2038D4A97E6896D571873C76D29ACF9BF1E930BEB9A7EB9AD354F40B97564C2902D382E82F
2,961,501 UART: [art] SIG.R = 3261A9892CD1E5CF0D8B1D1C8927A203DED4A2116C7709681116911360677C4445C1B00CA47919ADF89EC915D5439173
2,968,251 UART: [art] SIG.S = C3430E1EADFD1D209182D893C3A92C330102AC16E50018B7654F2E8B619C0E6CD87D4C38AAA4C8A72FAA2111BE2D3920
2,992,288 UART: Caliptra RT
2,992,633 UART: [state] CFI Enabled
3,100,702 UART: [rt] RT listening for mailbox commands...
3,101,372 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,200 UART: [rt]cmd =0x44504543, len=24
3,157,012 >>> mbox cmd response data (40 bytes)
3,157,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,116 UART: [rt]cmd =0x44504543, len=96
3,227,935 >>> mbox cmd response data (56 bytes)
3,227,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,257,757 UART: [rt]cmd =0x44504543, len=96
3,298,971 >>> mbox cmd response data (56 bytes)
3,298,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,879 UART: [rt]cmd =0x44504543, len=96
3,369,407 >>> mbox cmd response data (56 bytes)
3,369,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,353 UART: [rt]cmd =0x44504543, len=96
3,439,555 >>> mbox cmd response data (56 bytes)
3,439,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,443 UART: [rt]cmd =0x44504543, len=96
3,511,143 >>> mbox cmd response data (56 bytes)
3,511,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,179 UART: [rt]cmd =0x44504543, len=96
3,583,187 >>> mbox cmd response data (56 bytes)
3,583,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,163 UART: [rt]cmd =0x44504543, len=96
3,655,719 >>> mbox cmd response data (56 bytes)
3,655,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,729 UART: [rt]cmd =0x44504543, len=96
3,727,543 >>> mbox cmd response data (56 bytes)
3,727,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,661 UART: [rt]cmd =0x44504543, len=96
3,800,115 >>> mbox cmd response data (56 bytes)
3,800,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,129 UART: [rt]cmd =0x44504543, len=96
3,872,325 >>> mbox cmd response data (56 bytes)
3,872,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,361 UART: [rt]cmd =0x44504543, len=96
3,945,705 >>> mbox cmd response data (56 bytes)
3,945,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,669 UART: [rt]cmd =0x44504543, len=96
4,019,741 >>> mbox cmd response data (56 bytes)
4,019,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,049,853 UART: [rt]cmd =0x44504543, len=96
4,093,829 >>> mbox cmd response data (56 bytes)
4,093,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,733 UART: [rt]cmd =0x44504543, len=96
4,167,617 >>> mbox cmd response data (56 bytes)
4,167,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,577 UART: [rt]cmd =0x44504543, len=96
4,204,996 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,157 UART:
192,521 UART: Running Caliptra ROM ...
193,703 UART:
193,862 UART: [state] CFI Enabled
264,926 UART: [state] LifecycleState = Unprovisioned
266,904 UART: [state] DebugLocked = No
268,792 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,308 UART: [kat] SHA2-256
444,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,531 UART: [kat] ++
455,031 UART: [kat] sha1
466,060 UART: [kat] SHA2-256
468,728 UART: [kat] SHA2-384
473,865 UART: [kat] SHA2-512-ACC
476,228 UART: [kat] ECC-384
2,766,767 UART: [kat] HMAC-384Kdf
2,798,393 UART: [kat] LMS
3,988,739 UART: [kat] --
3,995,461 UART: [cold-reset] ++
3,997,193 UART: [fht] Storing FHT @ 0x50003400
4,008,601 UART: [idev] ++
4,009,181 UART: [idev] CDI.KEYID = 6
4,010,070 UART: [idev] SUBJECT.KEYID = 7
4,011,323 UART: [idev] UDS.KEYID = 0
4,012,277 ready_for_fw is high
4,012,472 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,030 UART: [idev] Erasing UDS.KEYID = 0
7,347,613 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,446 UART: [idev] --
7,372,494 UART: [ldev] ++
7,373,062 UART: [ldev] CDI.KEYID = 6
7,374,082 UART: [ldev] SUBJECT.KEYID = 5
7,375,244 UART: [ldev] AUTHORITY.KEYID = 7
7,376,473 UART: [ldev] FE.KEYID = 1
7,422,069 UART: [ldev] Erasing FE.KEYID = 1
10,754,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,990 UART: [ldev] --
13,115,185 UART: [fwproc] Waiting for Commands...
13,117,953 UART: [fwproc] Received command 0x46574c44
13,120,192 UART: [fwproc] Received Image of size 114124 bytes
17,174,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,416 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,629,355 >>> mbox cmd response: success
17,632,761 UART: [afmc] ++
17,633,359 UART: [afmc] CDI.KEYID = 6
17,634,276 UART: [afmc] SUBJECT.KEYID = 7
17,635,551 UART: [afmc] AUTHORITY.KEYID = 5
21,005,414 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,773 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,025 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,459 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,304 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,740 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,955 UART: [afmc] --
23,380,684 UART: [cold-reset] --
23,384,933 UART: [state] Locking Datavault
23,390,127 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,881 UART: [state] Locking ICCM
23,394,358 UART: [exit] Launching FMC @ 0x40000130
23,402,703 UART:
23,402,944 UART: Running Caliptra FMC ...
23,404,047 UART:
23,404,215 UART: [state] CFI Enabled
23,466,478 UART: [fht] FMC Alias Private Key: 7
25,804,543 UART: [art] Extend RT PCRs Done
25,805,765 UART: [art] Lock RT PCRs Done
25,807,344 UART: [art] Populate DV Done
25,813,029 UART: [fht] FMC Alias Private Key: 7
25,814,672 UART: [art] Derive CDI
25,815,466 UART: [art] Store in in slot 0x4
25,874,619 UART: [art] Derive Key Pair
25,875,628 UART: [art] Store priv key in slot 0x5
29,168,559 UART: [art] Derive Key Pair - Done
29,181,438 UART: [art] Signing Cert with AUTHO
29,182,770 UART: RITY.KEYID = 7
31,469,476 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,978 UART: [art] PUB.X = 65731087D30BB4746826DB7E8EAA65DC8A1A86C5FEB1927C809BE8759E61C76E383608E3A6B16D00FDA76B94EDE04526
31,478,232 UART: [art] PUB.Y = 8D414D2F9B19B06CCB3360B2DB86C4471B93A46110982C1F548E07FCF3A4E032DC1102D05A4900864367E6A8F8089254
31,485,462 UART: [art] SIG.R = 335B55A742940F91CA4323CD60995BFD89C53F056B9909EB462F75A11E8532AB20948C0830E75C8A7DF2D93F90082F60
31,492,797 UART: [art] SIG.S = 6CB0B18177AA4F04C88F3E28DBCFCE2B0F431D9632FB3EEE25EFD74FC304CE94C81DE1104E104CA43040F1DD481F91FA
32,797,652 UART: Caliptra RT
32,798,369 UART: [state] CFI Enabled
32,959,965 UART: [rt] RT listening for mailbox commands...
32,961,900 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,992,050 UART: [rt]cmd =0x44504543, len=24
33,033,886 >>> mbox cmd response data (40 bytes)
33,034,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,064,802 UART: [rt]cmd =0x44504543, len=24
33,098,086 >>> mbox cmd response data (40 bytes)
33,098,761 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,128,891 UART: [rt]cmd =0x44504543, len=24
33,163,084 >>> mbox cmd response data (40 bytes)
33,163,704 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,193,574 UART: [rt]cmd =0x44504543, len=24
33,227,035 >>> mbox cmd response data (40 bytes)
33,227,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,257,790 UART: [rt]cmd =0x44504543, len=24
33,291,261 >>> mbox cmd response data (40 bytes)
33,291,885 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,321,898 UART: [rt]cmd =0x44504543, len=24
33,355,552 >>> mbox cmd response data (40 bytes)
33,356,221 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,385,803 UART: [rt]cmd =0x44504543, len=24
33,419,669 >>> mbox cmd response data (40 bytes)
33,420,321 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,450,331 UART: [rt]cmd =0x44504543, len=24
33,483,536 >>> mbox cmd response data (40 bytes)
33,484,135 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,513,993 UART: [rt]cmd =0x44504543, len=24
33,547,556 >>> mbox cmd response data (40 bytes)
33,548,170 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,577,927 UART: [rt]cmd =0x44504543, len=24
33,611,374 >>> mbox cmd response data (40 bytes)
33,611,983 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,641,830 UART: [rt]cmd =0x44504543, len=24
33,675,858 >>> mbox cmd response data (40 bytes)
33,676,502 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,706,541 UART: [rt]cmd =0x44504543, len=24
33,739,716 >>> mbox cmd response data (40 bytes)
33,740,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,770,209 UART: [rt]cmd =0x44504543, len=24
33,803,851 >>> mbox cmd response data (40 bytes)
33,804,445 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,834,246 UART: [rt]cmd =0x44504543, len=24
33,867,541 >>> mbox cmd response data (40 bytes)
33,868,158 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,898,069 UART: [rt]cmd =0x44504543, len=24
33,932,075 >>> mbox cmd response data (40 bytes)
33,932,693 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,962,703 UART: [rt]cmd =0x44504543, len=24
33,969,261 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,786,809 ready_for_fw is high
3,787,187 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,858,005 >>> mbox cmd response: success
23,546,218 UART:
23,546,615 UART: Running Caliptra FMC ...
23,547,765 UART:
23,547,928 UART: [state] CFI Enabled
23,618,534 UART: [fht] FMC Alias Private Key: 7
25,956,532 UART: [art] Extend RT PCRs Done
25,957,764 UART: [art] Lock RT PCRs Done
25,959,741 UART: [art] Populate DV Done
25,965,329 UART: [fht] FMC Alias Private Key: 7
25,966,817 UART: [art] Derive CDI
25,967,582 UART: [art] Store in in slot 0x4
26,027,881 UART: [art] Derive Key Pair
26,028,948 UART: [art] Store priv key in slot 0x5
29,321,962 UART: [art] Derive Key Pair - Done
29,334,678 UART: [art] Signing Cert with AUTHO
29,335,982 UART: RITY.KEYID = 7
31,625,174 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,694 UART: [art] PUB.X = F6359D6273AF9F15DD16E12EC635D20FA0976648F1454592C9074F3893DDB14AD0C155624CC9711C55E0894D6ABC8358
31,633,923 UART: [art] PUB.Y = 4E8E30CB5753E5AF3EA30824FFCB1729E6EABB4F220E9246703CB904068BE65928AB33D6AD3FDC0134A21D6FF7D684B7
31,641,221 UART: [art] SIG.R = 1544EAB3686DCE4874E8CE64CDCFC84653ACCD1FF1518E411753D1A0CC7B5060AA59472320A985E8ACE3B208AE0E35BA
31,648,584 UART: [art] SIG.S = CFAB6128A9D5F200CD2EB46B7682570AE87685DB581C9E6F479CD465E3A7C105FF38D02E33F834E1245F3920BE9EF928
32,953,762 UART: Caliptra RT
32,954,475 UART: [state] CFI Enabled
33,116,049 UART: [rt] RT listening for mailbox commands...
33,117,988 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,147,926 UART: [rt]cmd =0x44504543, len=24
33,189,273 >>> mbox cmd response data (40 bytes)
33,190,039 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,220,082 UART: [rt]cmd =0x44504543, len=24
33,253,820 >>> mbox cmd response data (40 bytes)
33,254,449 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,284,307 UART: [rt]cmd =0x44504543, len=24
33,317,372 >>> mbox cmd response data (40 bytes)
33,318,033 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,347,835 UART: [rt]cmd =0x44504543, len=24
33,381,577 >>> mbox cmd response data (40 bytes)
33,382,249 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,412,209 UART: [rt]cmd =0x44504543, len=24
33,445,257 >>> mbox cmd response data (40 bytes)
33,445,889 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,475,956 UART: [rt]cmd =0x44504543, len=24
33,509,683 >>> mbox cmd response data (40 bytes)
33,510,300 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,539,962 UART: [rt]cmd =0x44504543, len=24
33,573,906 >>> mbox cmd response data (40 bytes)
33,574,521 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,604,431 UART: [rt]cmd =0x44504543, len=24
33,637,976 >>> mbox cmd response data (40 bytes)
33,638,636 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,668,492 UART: [rt]cmd =0x44504543, len=24
33,701,820 >>> mbox cmd response data (40 bytes)
33,702,475 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,732,332 UART: [rt]cmd =0x44504543, len=24
33,765,929 >>> mbox cmd response data (40 bytes)
33,766,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,796,415 UART: [rt]cmd =0x44504543, len=24
33,830,039 >>> mbox cmd response data (40 bytes)
33,830,657 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,860,843 UART: [rt]cmd =0x44504543, len=24
33,894,309 >>> mbox cmd response data (40 bytes)
33,894,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,924,987 UART: [rt]cmd =0x44504543, len=24
33,958,053 >>> mbox cmd response data (40 bytes)
33,958,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,988,669 UART: [rt]cmd =0x44504543, len=24
34,021,999 >>> mbox cmd response data (40 bytes)
34,022,649 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,052,231 UART: [rt]cmd =0x44504543, len=24
34,086,306 >>> mbox cmd response data (40 bytes)
34,086,912 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,116,561 UART: [rt]cmd =0x44504543, len=24
34,123,025 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,104 writing to cptra_bootfsm_go
194,418 UART:
194,787 UART: Running Caliptra ROM ...
195,959 UART:
605,534 UART: [state] CFI Enabled
622,104 UART: [state] LifecycleState = Unprovisioned
624,064 UART: [state] DebugLocked = No
625,591 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,672 UART: [kat] SHA2-256
799,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,932 UART: [kat] ++
810,463 UART: [kat] sha1
821,970 UART: [kat] SHA2-256
824,665 UART: [kat] SHA2-384
831,157 UART: [kat] SHA2-512-ACC
833,520 UART: [kat] ECC-384
3,119,170 UART: [kat] HMAC-384Kdf
3,131,003 UART: [kat] LMS
4,321,123 UART: [kat] --
4,326,414 UART: [cold-reset] ++
4,327,991 UART: [fht] Storing FHT @ 0x50003400
4,338,112 UART: [idev] ++
4,338,760 UART: [idev] CDI.KEYID = 6
4,339,666 UART: [idev] SUBJECT.KEYID = 7
4,340,907 UART: [idev] UDS.KEYID = 0
4,341,912 ready_for_fw is high
4,342,122 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,524 UART: [idev] Erasing UDS.KEYID = 0
7,629,755 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,723 UART: [idev] --
7,656,522 UART: [ldev] ++
7,657,091 UART: [ldev] CDI.KEYID = 6
7,658,055 UART: [ldev] SUBJECT.KEYID = 5
7,659,264 UART: [ldev] AUTHORITY.KEYID = 7
7,660,487 UART: [ldev] FE.KEYID = 1
7,673,444 UART: [ldev] Erasing FE.KEYID = 1
10,962,963 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,271,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,345 UART: [ldev] --
13,324,983 UART: [fwproc] Waiting for Commands...
13,326,912 UART: [fwproc] Received command 0x46574c44
13,329,083 UART: [fwproc] Received Image of size 114124 bytes
17,383,595 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,984 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,841,636 >>> mbox cmd response: success
17,845,787 UART: [afmc] ++
17,846,385 UART: [afmc] CDI.KEYID = 6
17,847,291 UART: [afmc] SUBJECT.KEYID = 7
17,848,554 UART: [afmc] AUTHORITY.KEYID = 5
21,164,918 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,049 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,311 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,693 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,518 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,920 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,460 UART: [afmc] --
23,531,763 UART: [cold-reset] --
23,536,380 UART: [state] Locking Datavault
23,540,759 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,507 UART: [state] Locking ICCM
23,545,188 UART: [exit] Launching FMC @ 0x40000130
23,553,578 UART:
23,553,814 UART: Running Caliptra FMC ...
23,554,908 UART:
23,555,061 UART: [state] CFI Enabled
23,563,132 UART: [fht] FMC Alias Private Key: 7
25,893,758 UART: [art] Extend RT PCRs Done
25,894,982 UART: [art] Lock RT PCRs Done
25,896,603 UART: [art] Populate DV Done
25,902,168 UART: [fht] FMC Alias Private Key: 7
25,903,704 UART: [art] Derive CDI
25,904,511 UART: [art] Store in in slot 0x4
25,946,926 UART: [art] Derive Key Pair
25,947,955 UART: [art] Store priv key in slot 0x5
29,189,944 UART: [art] Derive Key Pair - Done
29,202,933 UART: [art] Signing Cert with AUTHO
29,204,261 UART: RITY.KEYID = 7
31,483,612 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,122 UART: [art] PUB.X = 9061C11744265CD6304F4926EABCBFF47576E7AB784B8BC721724A4E09B1F7A5F25A69AD8716605CFC64F3531BC8C7A0
31,492,379 UART: [art] PUB.Y = 07FB447628879B107871440423FC3082D1C6B6265A12D8AE455FF148B4280C2727B6F815296A69AC66AAEF8BF81C015D
31,499,590 UART: [art] SIG.R = A4D04D24D5821B0CF8A73DA1ACEB72832CF2E7B42C621D8D4BFA68B16F153276CE99FE8ED34D5EAA6CE940B190B08C05
31,507,018 UART: [art] SIG.S = 4A00C8F44F1D577EA1ED0B91FB887356CD0D596A70F1E856D826B4C186106BE7139399A5409CBD321B77EFD1E32A0956
32,812,430 UART: Caliptra RT
32,813,141 UART: [state] CFI Enabled
32,930,956 UART: [rt] RT listening for mailbox commands...
32,932,870 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,962,771 UART: [rt]cmd =0x44504543, len=24
32,989,425 >>> mbox cmd response data (40 bytes)
32,990,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,020,155 UART: [rt]cmd =0x44504543, len=24
33,046,120 >>> mbox cmd response data (40 bytes)
33,046,780 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,076,636 UART: [rt]cmd =0x44504543, len=24
33,102,984 >>> mbox cmd response data (40 bytes)
33,103,605 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,133,578 UART: [rt]cmd =0x44504543, len=24
33,159,584 >>> mbox cmd response data (40 bytes)
33,160,215 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,190,301 UART: [rt]cmd =0x44504543, len=24
33,216,769 >>> mbox cmd response data (40 bytes)
33,217,419 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,247,431 UART: [rt]cmd =0x44504543, len=24
33,273,721 >>> mbox cmd response data (40 bytes)
33,274,330 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,304,194 UART: [rt]cmd =0x44504543, len=24
33,330,360 >>> mbox cmd response data (40 bytes)
33,330,984 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,361,000 UART: [rt]cmd =0x44504543, len=24
33,387,161 >>> mbox cmd response data (40 bytes)
33,387,785 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,417,799 UART: [rt]cmd =0x44504543, len=24
33,444,261 >>> mbox cmd response data (40 bytes)
33,444,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,474,700 UART: [rt]cmd =0x44504543, len=24
33,501,112 >>> mbox cmd response data (40 bytes)
33,501,723 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,531,531 UART: [rt]cmd =0x44504543, len=24
33,557,742 >>> mbox cmd response data (40 bytes)
33,558,362 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,588,311 UART: [rt]cmd =0x44504543, len=24
33,614,500 >>> mbox cmd response data (40 bytes)
33,615,146 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,645,049 UART: [rt]cmd =0x44504543, len=24
33,671,235 >>> mbox cmd response data (40 bytes)
33,671,831 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,701,581 UART: [rt]cmd =0x44504543, len=24
33,727,470 >>> mbox cmd response data (40 bytes)
33,728,082 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,758,254 UART: [rt]cmd =0x44504543, len=24
33,785,034 >>> mbox cmd response data (40 bytes)
33,785,691 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,815,543 UART: [rt]cmd =0x44504543, len=24
33,822,153 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
4,133,139 ready_for_fw is high
4,133,716 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,631 >>> mbox cmd response: success
23,712,269 UART:
23,712,693 UART: Running Caliptra FMC ...
23,713,803 UART:
23,713,949 UART: [state] CFI Enabled
23,721,792 UART: [fht] FMC Alias Private Key: 7
26,052,476 UART: [art] Extend RT PCRs Done
26,053,704 UART: [art] Lock RT PCRs Done
26,055,519 UART: [art] Populate DV Done
26,060,879 UART: [fht] FMC Alias Private Key: 7
26,062,580 UART: [art] Derive CDI
26,063,316 UART: [art] Store in in slot 0x4
26,105,847 UART: [art] Derive Key Pair
26,106,842 UART: [art] Store priv key in slot 0x5
29,348,945 UART: [art] Derive Key Pair - Done
29,361,944 UART: [art] Signing Cert with AUTHO
29,363,242 UART: RITY.KEYID = 7
31,642,760 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,289 UART: [art] PUB.X = 2699D2CB8EDA60FD6A71877C4180B9ACA101E6E2932BF3E9F6FB75AB2D697EE7B225E3574F65A3E501951DB1F5FCAD9D
31,651,582 UART: [art] PUB.Y = F13976EFAD381BAD4AD79944AE0A18771BE8219DAE0AB8CDBC3DFCAD7B16E0830F23B001F9133C5BE1C2654976033D0E
31,658,804 UART: [art] SIG.R = B3FE4A8F38E504698A74BA61CB3E47A686DD1646EF8EFB11D96182A3D5C4114DD0D12B93C28F5DB9CEE38D0400620A2A
31,666,186 UART: [art] SIG.S = 50D2D488214B34042A8CEBCA051ECCC95F038553065CBDACB7462A8467E72B27423A087D13C36F71091BC266880B668B
32,971,825 UART: Caliptra RT
32,972,528 UART: [state] CFI Enabled
33,089,810 UART: [rt] RT listening for mailbox commands...
33,091,744 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,121,827 UART: [rt]cmd =0x44504543, len=24
33,147,966 >>> mbox cmd response data (40 bytes)
33,148,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,178,533 UART: [rt]cmd =0x44504543, len=24
33,204,598 >>> mbox cmd response data (40 bytes)
33,205,236 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,235,079 UART: [rt]cmd =0x44504543, len=24
33,260,958 >>> mbox cmd response data (40 bytes)
33,261,634 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,291,536 UART: [rt]cmd =0x44504543, len=24
33,317,803 >>> mbox cmd response data (40 bytes)
33,318,427 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,348,236 UART: [rt]cmd =0x44504543, len=24
33,374,130 >>> mbox cmd response data (40 bytes)
33,374,758 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,404,549 UART: [rt]cmd =0x44504543, len=24
33,430,635 >>> mbox cmd response data (40 bytes)
33,431,296 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,461,138 UART: [rt]cmd =0x44504543, len=24
33,487,486 >>> mbox cmd response data (40 bytes)
33,488,159 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,518,168 UART: [rt]cmd =0x44504543, len=24
33,544,787 >>> mbox cmd response data (40 bytes)
33,545,398 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,575,291 UART: [rt]cmd =0x44504543, len=24
33,600,975 >>> mbox cmd response data (40 bytes)
33,601,600 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,631,546 UART: [rt]cmd =0x44504543, len=24
33,657,905 >>> mbox cmd response data (40 bytes)
33,658,549 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,688,497 UART: [rt]cmd =0x44504543, len=24
33,714,878 >>> mbox cmd response data (40 bytes)
33,715,485 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,745,400 UART: [rt]cmd =0x44504543, len=24
33,771,773 >>> mbox cmd response data (40 bytes)
33,772,423 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,802,416 UART: [rt]cmd =0x44504543, len=24
33,828,666 >>> mbox cmd response data (40 bytes)
33,829,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,859,260 UART: [rt]cmd =0x44504543, len=24
33,885,785 >>> mbox cmd response data (40 bytes)
33,886,571 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,916,366 UART: [rt]cmd =0x44504543, len=24
33,942,278 >>> mbox cmd response data (40 bytes)
33,942,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,972,794 UART: [rt]cmd =0x44504543, len=24
33,979,116 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
192,034 UART:
192,401 UART: Running Caliptra ROM ...
193,703 UART:
193,856 UART: [state] CFI Enabled
263,861 UART: [state] LifecycleState = Unprovisioned
265,674 UART: [state] DebugLocked = No
267,557 UART: [state] WD Timer not started. Device not locked for debugging
271,726 UART: [kat] SHA2-256
450,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,463 UART: [kat] ++
462,915 UART: [kat] sha1
473,503 UART: [kat] SHA2-256
476,585 UART: [kat] SHA2-384
483,357 UART: [kat] SHA2-512-ACC
486,289 UART: [kat] ECC-384
2,950,844 UART: [kat] HMAC-384Kdf
2,972,328 UART: [kat] LMS
3,501,813 UART: [kat] --
3,506,461 UART: [cold-reset] ++
3,507,822 UART: [fht] FHT @ 0x50003400
3,519,098 UART: [idev] ++
3,519,668 UART: [idev] CDI.KEYID = 6
3,520,590 UART: [idev] SUBJECT.KEYID = 7
3,521,710 UART: [idev] UDS.KEYID = 0
3,522,673 ready_for_fw is high
3,522,886 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,938 UART: [idev] Erasing UDS.KEYID = 0
6,029,896 UART: [idev] Sha1 KeyId Algorithm
6,052,941 UART: [idev] --
6,058,097 UART: [ldev] ++
6,058,681 UART: [ldev] CDI.KEYID = 6
6,059,598 UART: [ldev] SUBJECT.KEYID = 5
6,060,763 UART: [ldev] AUTHORITY.KEYID = 7
6,061,993 UART: [ldev] FE.KEYID = 1
6,106,152 UART: [ldev] Erasing FE.KEYID = 1
8,608,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,034 UART: [ldev] --
10,418,541 UART: [fwproc] Wait for Commands...
10,421,711 UART: [fwproc] Recv command 0x46574c44
10,423,745 UART: [fwproc] Recv'd Img size: 114448 bytes
13,830,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,292,001 >>> mbox cmd response: success
14,296,687 UART: [afmc] ++
14,297,281 UART: [afmc] CDI.KEYID = 6
14,298,195 UART: [afmc] SUBJECT.KEYID = 7
14,299,293 UART: [afmc] AUTHORITY.KEYID = 5
16,833,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,576,671 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,592,412 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,608,450 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,624,340 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,646,905 UART: [afmc] --
18,650,279 UART: [cold-reset] --
18,654,353 UART: [state] Locking Datavault
18,657,335 UART: [state] Locking PCR0, PCR1 and PCR31
18,658,979 UART: [state] Locking ICCM
18,661,235 UART: [exit] Launching FMC @ 0x40000130
18,669,629 UART:
18,669,861 UART: Running Caliptra FMC ...
18,670,960 UART:
18,671,128 UART: [state] CFI Enabled
18,735,140 UART: [fht] FMC Alias Private Key: 7
20,498,832 UART: [art] Extend RT PCRs Done
20,500,050 UART: [art] Lock RT PCRs Done
20,501,564 UART: [art] Populate DV Done
20,506,919 UART: [fht] FMC Alias Private Key: 7
20,508,511 UART: [art] Derive CDI
20,509,324 UART: [art] Store in in slot 0x4
20,566,897 UART: [art] Derive Key Pair
20,567,926 UART: [art] Store priv key in slot 0x5
23,031,185 UART: [art] Derive Key Pair - Done
23,044,604 UART: [art] Signing Cert with AUTHO
23,045,911 UART: RITY.KEYID = 7
24,756,685 UART: [art] Erasing AUTHORITY.KEYID = 7
24,758,187 UART: [art] PUB.X = 94D8B016A6E869BB601E7AA1ED23047B60528D34382F9745F777EF892E9E89E40DC37C4F6681C4F0EDC2250CF488B942
24,765,447 UART: [art] PUB.Y = 296D644C0FE3BAEEFC24B5343DB21C784A04A4FD730F757AF389691BF6FC9D91726B1F160D204D4C36290BF36171893B
24,772,681 UART: [art] SIG.R = AF9BA0E3558BC60A12BF6133AD6204D2FAE21F02EE3977A57EA3A5D7CC79755915E0864432844D4038D8C57EB8580F20
24,780,101 UART: [art] SIG.S = 972505369AB2F3B517FE24C880422FEFD1D9F594BEF2FE0D027C233831A6A98B6DD07A34246C492292354EF47CFB3525
25,758,704 UART: Caliptra RT
25,759,401 UART: [state] CFI Enabled
25,923,032 UART: [rt] RT listening for mailbox commands...
25,924,970 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,955,574 UART: [rt]cmd =0x44504543, len=24
25,998,235 >>> mbox cmd response data (40 bytes)
25,999,013 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,029,024 UART: [rt]cmd =0x44504543, len=24
26,061,988 >>> mbox cmd response data (40 bytes)
26,062,663 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,092,731 UART: [rt]cmd =0x44504543, len=24
26,126,009 >>> mbox cmd response data (40 bytes)
26,126,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,156,507 UART: [rt]cmd =0x44504543, len=24
26,190,044 >>> mbox cmd response data (40 bytes)
26,190,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,220,689 UART: [rt]cmd =0x44504543, len=24
26,253,874 >>> mbox cmd response data (40 bytes)
26,254,490 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,284,344 UART: [rt]cmd =0x44504543, len=24
26,318,014 >>> mbox cmd response data (40 bytes)
26,318,636 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,348,485 UART: [rt]cmd =0x44504543, len=24
26,382,194 >>> mbox cmd response data (40 bytes)
26,382,843 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,412,851 UART: [rt]cmd =0x44504543, len=24
26,446,234 >>> mbox cmd response data (40 bytes)
26,446,873 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,476,667 UART: [rt]cmd =0x44504543, len=24
26,510,254 >>> mbox cmd response data (40 bytes)
26,510,860 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,540,796 UART: [rt]cmd =0x44504543, len=24
26,574,363 >>> mbox cmd response data (40 bytes)
26,574,979 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,604,785 UART: [rt]cmd =0x44504543, len=24
26,638,401 >>> mbox cmd response data (40 bytes)
26,639,008 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,668,641 UART: [rt]cmd =0x44504543, len=24
26,702,286 >>> mbox cmd response data (40 bytes)
26,702,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,732,880 UART: [rt]cmd =0x44504543, len=24
26,766,467 >>> mbox cmd response data (40 bytes)
26,767,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,797,115 UART: [rt]cmd =0x44504543, len=24
26,830,543 >>> mbox cmd response data (40 bytes)
26,831,146 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,861,002 UART: [rt]cmd =0x44504543, len=24
26,894,580 >>> mbox cmd response data (40 bytes)
26,895,193 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,925,427 UART: [rt]cmd =0x44504543, len=24
26,931,967 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,382,501 ready_for_fw is high
3,383,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,073,945 >>> mbox cmd response: success
18,385,671 UART:
18,386,086 UART: Running Caliptra FMC ...
18,387,288 UART:
18,387,465 UART: [state] CFI Enabled
18,456,227 UART: [fht] FMC Alias Private Key: 7
20,220,239 UART: [art] Extend RT PCRs Done
20,221,460 UART: [art] Lock RT PCRs Done
20,223,090 UART: [art] Populate DV Done
20,228,454 UART: [fht] FMC Alias Private Key: 7
20,230,160 UART: [art] Derive CDI
20,230,973 UART: [art] Store in in slot 0x4
20,289,278 UART: [art] Derive Key Pair
20,290,322 UART: [art] Store priv key in slot 0x5
22,753,473 UART: [art] Derive Key Pair - Done
22,766,426 UART: [art] Signing Cert with AUTHO
22,767,730 UART: RITY.KEYID = 7
24,479,998 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,522 UART: [art] PUB.X = 33673923EF8BC733BC4651AE00C7F7B4B8F006490A5C6A94A2BFC4041EAF0F4D875E020E16FEC58F95010A04E06C79D2
24,488,768 UART: [art] PUB.Y = 4D019DD4FFD8F894952252DFE57B60F9C3E638E7C8CCF43C8A935118B26259BD90E85EE06DDDF00C3DBDA514CAFBF476
24,496,068 UART: [art] SIG.R = 125C60FD8EB125B78C1D4DA0B5E21886C623677683EEF8FD70658F95F440C6FC81F3C7BB01F9F222F7B05CB655E2388A
24,503,423 UART: [art] SIG.S = 83CFC15A0DC25D5CD0116EAB1E83A2F84251A08A37F603880AFAEC56E1DD5E6AC1297C9D0D06B52CA3A3AC2EBC60D5A0
25,482,369 UART: Caliptra RT
25,483,085 UART: [state] CFI Enabled
25,647,476 UART: [rt] RT listening for mailbox commands...
25,649,398 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,679,770 UART: [rt]cmd =0x44504543, len=24
25,722,113 >>> mbox cmd response data (40 bytes)
25,722,922 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,752,834 UART: [rt]cmd =0x44504543, len=24
25,786,442 >>> mbox cmd response data (40 bytes)
25,787,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,817,015 UART: [rt]cmd =0x44504543, len=24
25,850,715 >>> mbox cmd response data (40 bytes)
25,851,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,881,363 UART: [rt]cmd =0x44504543, len=24
25,914,422 >>> mbox cmd response data (40 bytes)
25,915,050 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,945,225 UART: [rt]cmd =0x44504543, len=24
25,978,467 >>> mbox cmd response data (40 bytes)
25,979,091 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,009,050 UART: [rt]cmd =0x44504543, len=24
26,042,773 >>> mbox cmd response data (40 bytes)
26,043,429 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,073,068 UART: [rt]cmd =0x44504543, len=24
26,106,610 >>> mbox cmd response data (40 bytes)
26,107,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,137,208 UART: [rt]cmd =0x44504543, len=24
26,170,738 >>> mbox cmd response data (40 bytes)
26,171,346 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,201,063 UART: [rt]cmd =0x44504543, len=24
26,234,798 >>> mbox cmd response data (40 bytes)
26,235,423 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,265,331 UART: [rt]cmd =0x44504543, len=24
26,298,570 >>> mbox cmd response data (40 bytes)
26,299,191 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,329,312 UART: [rt]cmd =0x44504543, len=24
26,362,934 >>> mbox cmd response data (40 bytes)
26,363,586 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,393,443 UART: [rt]cmd =0x44504543, len=24
26,426,991 >>> mbox cmd response data (40 bytes)
26,427,649 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,457,602 UART: [rt]cmd =0x44504543, len=24
26,491,400 >>> mbox cmd response data (40 bytes)
26,492,207 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,522,137 UART: [rt]cmd =0x44504543, len=24
26,555,214 >>> mbox cmd response data (40 bytes)
26,555,833 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,585,638 UART: [rt]cmd =0x44504543, len=24
26,619,360 >>> mbox cmd response data (40 bytes)
26,619,973 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,649,978 UART: [rt]cmd =0x44504543, len=24
26,656,714 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,446 UART:
192,812 UART: Running Caliptra ROM ...
193,942 UART:
603,337 UART: [state] CFI Enabled
616,706 UART: [state] LifecycleState = Unprovisioned
618,572 UART: [state] DebugLocked = No
621,230 UART: [state] WD Timer not started. Device not locked for debugging
624,762 UART: [kat] SHA2-256
803,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,460 UART: [kat] ++
815,998 UART: [kat] sha1
826,585 UART: [kat] SHA2-256
829,627 UART: [kat] SHA2-384
834,903 UART: [kat] SHA2-512-ACC
837,913 UART: [kat] ECC-384
3,276,211 UART: [kat] HMAC-384Kdf
3,288,936 UART: [kat] LMS
3,818,403 UART: [kat] --
3,824,199 UART: [cold-reset] ++
3,826,484 UART: [fht] FHT @ 0x50003400
3,836,886 UART: [idev] ++
3,837,451 UART: [idev] CDI.KEYID = 6
3,838,353 UART: [idev] SUBJECT.KEYID = 7
3,839,522 UART: [idev] UDS.KEYID = 0
3,840,508 ready_for_fw is high
3,840,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,436 UART: [idev] Erasing UDS.KEYID = 0
6,306,935 UART: [idev] Sha1 KeyId Algorithm
6,330,154 UART: [idev] --
6,335,490 UART: [ldev] ++
6,336,054 UART: [ldev] CDI.KEYID = 6
6,336,961 UART: [ldev] SUBJECT.KEYID = 5
6,338,168 UART: [ldev] AUTHORITY.KEYID = 7
6,339,390 UART: [ldev] FE.KEYID = 1
6,352,014 UART: [ldev] Erasing FE.KEYID = 1
8,826,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,477 UART: [ldev] --
10,615,808 UART: [fwproc] Wait for Commands...
10,617,788 UART: [fwproc] Recv command 0x46574c44
10,619,873 UART: [fwproc] Recv'd Img size: 114448 bytes
14,014,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,085,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,154,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,472,843 >>> mbox cmd response: success
14,476,477 UART: [afmc] ++
14,477,069 UART: [afmc] CDI.KEYID = 6
14,477,979 UART: [afmc] SUBJECT.KEYID = 7
14,479,189 UART: [afmc] AUTHORITY.KEYID = 5
16,978,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,698,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,700,162 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,715,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,731,944 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,747,845 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,770,002 UART: [afmc] --
18,773,602 UART: [cold-reset] --
18,778,590 UART: [state] Locking Datavault
18,783,398 UART: [state] Locking PCR0, PCR1 and PCR31
18,785,089 UART: [state] Locking ICCM
18,787,285 UART: [exit] Launching FMC @ 0x40000130
18,795,678 UART:
18,795,908 UART: Running Caliptra FMC ...
18,796,998 UART:
18,797,147 UART: [state] CFI Enabled
18,805,132 UART: [fht] FMC Alias Private Key: 7
20,561,656 UART: [art] Extend RT PCRs Done
20,562,867 UART: [art] Lock RT PCRs Done
20,564,653 UART: [art] Populate DV Done
20,570,113 UART: [fht] FMC Alias Private Key: 7
20,571,618 UART: [art] Derive CDI
20,572,374 UART: [art] Store in in slot 0x4
20,615,082 UART: [art] Derive Key Pair
20,616,125 UART: [art] Store priv key in slot 0x5
23,042,273 UART: [art] Derive Key Pair - Done
23,055,270 UART: [art] Signing Cert with AUTHO
23,056,562 UART: RITY.KEYID = 7
24,762,133 UART: [art] Erasing AUTHORITY.KEYID = 7
24,763,636 UART: [art] PUB.X = A144C95E2BAF1DD1E62E075FBA920FCA303A77F9E1D91A947E0E7B72746010F463ED0A45A52CCCA716A267BCC3CCA1AB
24,770,918 UART: [art] PUB.Y = FDBE24FD43B72A204FBA36DD8597B2A73CF3AF91CF6FEC190909D262B610A3D3115384729510447B97C33D771DD4FF22
24,778,240 UART: [art] SIG.R = 5989648D840B25F619A3C70CB5EAA0674E3EAFA2B1D7B27D97681DB41C826D3D5C15AD5C0C057F3E901748A33710437A
24,785,624 UART: [art] SIG.S = 55B301BB5581D4A794EFD67954DCD0404B2B7A5C3875C2C742C0C01BC6C77BDCE0CF7DA53182FC1BDFDE89A6A00270E9
25,765,190 UART: Caliptra RT
25,765,896 UART: [state] CFI Enabled
25,882,614 UART: [rt] RT listening for mailbox commands...
25,884,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,914,678 UART: [rt]cmd =0x44504543, len=24
25,941,133 >>> mbox cmd response data (40 bytes)
25,941,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,971,700 UART: [rt]cmd =0x44504543, len=24
25,998,301 >>> mbox cmd response data (40 bytes)
25,998,934 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,028,741 UART: [rt]cmd =0x44504543, len=24
26,055,120 >>> mbox cmd response data (40 bytes)
26,055,731 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,085,846 UART: [rt]cmd =0x44504543, len=24
26,112,687 >>> mbox cmd response data (40 bytes)
26,113,343 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,143,027 UART: [rt]cmd =0x44504543, len=24
26,169,161 >>> mbox cmd response data (40 bytes)
26,169,760 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,199,723 UART: [rt]cmd =0x44504543, len=24
26,225,635 >>> mbox cmd response data (40 bytes)
26,226,246 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,256,031 UART: [rt]cmd =0x44504543, len=24
26,282,555 >>> mbox cmd response data (40 bytes)
26,283,234 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,313,240 UART: [rt]cmd =0x44504543, len=24
26,339,591 >>> mbox cmd response data (40 bytes)
26,340,198 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,370,168 UART: [rt]cmd =0x44504543, len=24
26,396,227 >>> mbox cmd response data (40 bytes)
26,396,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,426,904 UART: [rt]cmd =0x44504543, len=24
26,453,069 >>> mbox cmd response data (40 bytes)
26,453,685 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,483,631 UART: [rt]cmd =0x44504543, len=24
26,509,773 >>> mbox cmd response data (40 bytes)
26,510,434 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,540,280 UART: [rt]cmd =0x44504543, len=24
26,566,678 >>> mbox cmd response data (40 bytes)
26,567,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,597,294 UART: [rt]cmd =0x44504543, len=24
26,623,349 >>> mbox cmd response data (40 bytes)
26,623,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,653,958 UART: [rt]cmd =0x44504543, len=24
26,680,418 >>> mbox cmd response data (40 bytes)
26,681,065 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,710,749 UART: [rt]cmd =0x44504543, len=24
26,737,309 >>> mbox cmd response data (40 bytes)
26,737,909 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,767,978 UART: [rt]cmd =0x44504543, len=24
26,774,704 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,693,809 ready_for_fw is high
3,694,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,263,732 >>> mbox cmd response: success
18,514,617 UART:
18,515,013 UART: Running Caliptra FMC ...
18,516,157 UART:
18,516,313 UART: [state] CFI Enabled
18,524,007 UART: [fht] FMC Alias Private Key: 7
20,280,906 UART: [art] Extend RT PCRs Done
20,282,114 UART: [art] Lock RT PCRs Done
20,283,898 UART: [art] Populate DV Done
20,289,146 UART: [fht] FMC Alias Private Key: 7
20,290,800 UART: [art] Derive CDI
20,291,605 UART: [art] Store in in slot 0x4
20,334,088 UART: [art] Derive Key Pair
20,335,126 UART: [art] Store priv key in slot 0x5
22,762,131 UART: [art] Derive Key Pair - Done
22,775,071 UART: [art] Signing Cert with AUTHO
22,776,370 UART: RITY.KEYID = 7
24,481,915 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,398 UART: [art] PUB.X = AD466077B4B82901F94D60C78A13B495B0CD0F7562930DFBAA250FB00C3159FFB90903A015BE3681DCFAE63060C3D8DF
24,490,683 UART: [art] PUB.Y = 47837DE4131998CE50197D5BE131C7358DDBDF02B96B12439F7DD619D910044FD8F8BFFDCC83E1CD635FC22F50FA932A
24,497,971 UART: [art] SIG.R = F996B8C1808DC3B31F43128B4258532263A6ECC85B6E964C4DF703B70764345445173D28A37E8892A0D82ABEDBBB31CB
24,505,376 UART: [art] SIG.S = E3AB8C27B3C14CF09D48159BF301702107534A5D25CC3605EDA0C4974B551E370EBD50399BB1B1B9AD8517B1BE8B9B1E
25,484,519 UART: Caliptra RT
25,485,233 UART: [state] CFI Enabled
25,602,121 UART: [rt] RT listening for mailbox commands...
25,604,046 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,633,799 UART: [rt]cmd =0x44504543, len=24
25,659,875 >>> mbox cmd response data (40 bytes)
25,660,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,690,343 UART: [rt]cmd =0x44504543, len=24
25,716,831 >>> mbox cmd response data (40 bytes)
25,717,469 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,747,211 UART: [rt]cmd =0x44504543, len=24
25,773,729 >>> mbox cmd response data (40 bytes)
25,774,387 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,804,343 UART: [rt]cmd =0x44504543, len=24
25,830,341 >>> mbox cmd response data (40 bytes)
25,830,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,860,791 UART: [rt]cmd =0x44504543, len=24
25,886,903 >>> mbox cmd response data (40 bytes)
25,887,525 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,917,586 UART: [rt]cmd =0x44504543, len=24
25,943,674 >>> mbox cmd response data (40 bytes)
25,944,330 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,974,395 UART: [rt]cmd =0x44504543, len=24
26,000,859 >>> mbox cmd response data (40 bytes)
26,001,517 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,031,479 UART: [rt]cmd =0x44504543, len=24
26,057,936 >>> mbox cmd response data (40 bytes)
26,058,544 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,088,419 UART: [rt]cmd =0x44504543, len=24
26,114,686 >>> mbox cmd response data (40 bytes)
26,115,305 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,145,274 UART: [rt]cmd =0x44504543, len=24
26,171,262 >>> mbox cmd response data (40 bytes)
26,171,914 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,201,761 UART: [rt]cmd =0x44504543, len=24
26,228,107 >>> mbox cmd response data (40 bytes)
26,228,707 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,258,505 UART: [rt]cmd =0x44504543, len=24
26,284,667 >>> mbox cmd response data (40 bytes)
26,285,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,314,961 UART: [rt]cmd =0x44504543, len=24
26,340,769 >>> mbox cmd response data (40 bytes)
26,341,410 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,371,254 UART: [rt]cmd =0x44504543, len=24
26,397,705 >>> mbox cmd response data (40 bytes)
26,398,309 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,428,218 UART: [rt]cmd =0x44504543, len=24
26,454,451 >>> mbox cmd response data (40 bytes)
26,455,068 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,484,976 UART: [rt]cmd =0x44504543, len=24
26,491,623 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,440,838 ready_for_fw is high
3,441,469 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,548 >>> mbox cmd response: success
19,026,724 UART:
19,027,114 UART: Running Caliptra FMC ...
19,028,261 UART:
19,028,439 UART: [state] CFI Enabled
19,094,863 UART: [fht] FMC Alias Private Key: 7
20,858,571 UART: [art] Extend RT PCRs Done
20,859,782 UART: [art] Lock RT PCRs Done
20,861,565 UART: [art] Populate DV Done
20,867,029 UART: [fht] FMC Alias Private Key: 7
20,868,571 UART: [art] Derive CDI
20,869,334 UART: [art] Store in in slot 0x4
20,927,310 UART: [art] Derive Key Pair
20,928,369 UART: [art] Store priv key in slot 0x5
23,391,057 UART: [art] Derive Key Pair - Done
23,404,107 UART: [art] Signing Cert with AUTHO
23,405,406 UART: RITY.KEYID = 7
25,117,575 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,074 UART: [art] PUB.X = 6726FC2E970C4E059BF1061335D291E9BC619596A70ED939731A2742CE1234018DFE6C056B649E03087B2A08DCD34C3C
25,126,395 UART: [art] PUB.Y = 7CA30D7C6ACF4689900E0307E63E7CD78003682421ED21CACAF126ED99BA33397B184A91AAC867912F411D9E61837D0F
25,133,619 UART: [art] SIG.R = 003EB307EDB56A4CD593C7618D8D5CEB386698B2D699299DF1C1A6450A79F5062FF102D6945C0D5A3C135006B3EAEBBD
25,140,956 UART: [art] SIG.S = 79AC6452D12AA6AC816D3030B10C811862CDD9DC24ACAB6E228E2EF62E16D43C515FFD8EFA749975F33947C38EA259B2
26,120,885 UART: Caliptra RT
26,121,573 UART: [state] CFI Enabled
26,286,009 UART: [rt] RT listening for mailbox commands...
26,287,935 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,318,416 UART: [rt]cmd =0x44504543, len=24
26,360,310 >>> mbox cmd response data (40 bytes)
26,361,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,391,226 UART: [rt]cmd =0x44504543, len=24
26,424,450 >>> mbox cmd response data (40 bytes)
26,425,121 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,455,090 UART: [rt]cmd =0x44504543, len=24
26,488,322 >>> mbox cmd response data (40 bytes)
26,488,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,518,672 UART: [rt]cmd =0x44504543, len=24
26,552,367 >>> mbox cmd response data (40 bytes)
26,552,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,582,905 UART: [rt]cmd =0x44504543, len=24
26,616,522 >>> mbox cmd response data (40 bytes)
26,617,146 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,647,165 UART: [rt]cmd =0x44504543, len=24
26,680,727 >>> mbox cmd response data (40 bytes)
26,681,344 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,711,243 UART: [rt]cmd =0x44504543, len=24
26,744,515 >>> mbox cmd response data (40 bytes)
26,745,161 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,775,062 UART: [rt]cmd =0x44504543, len=24
26,808,611 >>> mbox cmd response data (40 bytes)
26,809,263 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,839,112 UART: [rt]cmd =0x44504543, len=24
26,872,427 >>> mbox cmd response data (40 bytes)
26,873,046 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,902,752 UART: [rt]cmd =0x44504543, len=24
26,936,535 >>> mbox cmd response data (40 bytes)
26,937,153 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,967,117 UART: [rt]cmd =0x44504543, len=24
27,000,631 >>> mbox cmd response data (40 bytes)
27,001,253 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,031,048 UART: [rt]cmd =0x44504543, len=24
27,064,755 >>> mbox cmd response data (40 bytes)
27,065,405 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,095,581 UART: [rt]cmd =0x44504543, len=24
27,128,871 >>> mbox cmd response data (40 bytes)
27,129,547 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,159,619 UART: [rt]cmd =0x44504543, len=24
27,193,157 >>> mbox cmd response data (40 bytes)
27,193,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,223,523 UART: [rt]cmd =0x44504543, len=24
27,256,979 >>> mbox cmd response data (40 bytes)
27,257,591 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,287,721 UART: [rt]cmd =0x44504543, len=24
27,293,890 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,760,880 ready_for_fw is high
3,761,287 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,967,429 >>> mbox cmd response: success
19,221,813 UART:
19,222,199 UART: Running Caliptra FMC ...
19,223,335 UART:
19,223,487 UART: [state] CFI Enabled
19,231,211 UART: [fht] FMC Alias Private Key: 7
20,987,679 UART: [art] Extend RT PCRs Done
20,988,901 UART: [art] Lock RT PCRs Done
20,990,581 UART: [art] Populate DV Done
20,996,053 UART: [fht] FMC Alias Private Key: 7
20,997,680 UART: [art] Derive CDI
20,998,496 UART: [art] Store in in slot 0x4
21,041,027 UART: [art] Derive Key Pair
21,042,017 UART: [art] Store priv key in slot 0x5
23,467,905 UART: [art] Derive Key Pair - Done
23,480,683 UART: [art] Signing Cert with AUTHO
23,482,020 UART: RITY.KEYID = 7
25,187,577 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,085 UART: [art] PUB.X = 508790713225574FF0EB174BFDBA6FE17E6EEE4D3AFF5D27B9C862930038ECEABD4B4E6BDEC35DFAFC3E87BB9698F089
25,196,351 UART: [art] PUB.Y = B25FD52D38D1CA53A4953F9919B2C4008F6044F00F9C7136996F01F19CD4E4A0D74256C19AC98C3E08127CDC61AB9BA4
25,203,583 UART: [art] SIG.R = 46D211537A3D9B0AF754BEFFB3AF4556A03690D0C8302604C7423A31FF493F195376DB34356954091BE162485C9109E7
25,210,945 UART: [art] SIG.S = 657AA3265FE355C9DAF7D383ABB98EBEA34C066F9C5B121B43F8FC6AD7F0D9C9AB476A4463FCB5D7E738898F28E6AB13
26,190,538 UART: Caliptra RT
26,191,252 UART: [state] CFI Enabled
26,308,020 UART: [rt] RT listening for mailbox commands...
26,309,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,339,914 UART: [rt]cmd =0x44504543, len=24
26,365,941 >>> mbox cmd response data (40 bytes)
26,366,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,396,706 UART: [rt]cmd =0x44504543, len=24
26,422,681 >>> mbox cmd response data (40 bytes)
26,423,307 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,453,219 UART: [rt]cmd =0x44504543, len=24
26,479,219 >>> mbox cmd response data (40 bytes)
26,479,833 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,509,728 UART: [rt]cmd =0x44504543, len=24
26,535,577 >>> mbox cmd response data (40 bytes)
26,536,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,566,299 UART: [rt]cmd =0x44504543, len=24
26,592,322 >>> mbox cmd response data (40 bytes)
26,592,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,622,862 UART: [rt]cmd =0x44504543, len=24
26,649,135 >>> mbox cmd response data (40 bytes)
26,649,747 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,679,657 UART: [rt]cmd =0x44504543, len=24
26,706,192 >>> mbox cmd response data (40 bytes)
26,706,813 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,736,597 UART: [rt]cmd =0x44504543, len=24
26,763,290 >>> mbox cmd response data (40 bytes)
26,763,942 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,793,837 UART: [rt]cmd =0x44504543, len=24
26,820,348 >>> mbox cmd response data (40 bytes)
26,820,951 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,850,748 UART: [rt]cmd =0x44504543, len=24
26,877,022 >>> mbox cmd response data (40 bytes)
26,877,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,907,477 UART: [rt]cmd =0x44504543, len=24
26,934,173 >>> mbox cmd response data (40 bytes)
26,934,827 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,964,728 UART: [rt]cmd =0x44504543, len=24
26,991,124 >>> mbox cmd response data (40 bytes)
26,991,724 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,021,578 UART: [rt]cmd =0x44504543, len=24
27,047,957 >>> mbox cmd response data (40 bytes)
27,048,575 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,078,537 UART: [rt]cmd =0x44504543, len=24
27,104,923 >>> mbox cmd response data (40 bytes)
27,105,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,135,540 UART: [rt]cmd =0x44504543, len=24
27,161,349 >>> mbox cmd response data (40 bytes)
27,161,987 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,191,829 UART: [rt]cmd =0x44504543, len=24
27,198,498 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,636 UART: [state] LifecycleState = Unprovisioned
86,291 UART: [state] DebugLocked = No
86,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,691 UART: [kat] SHA2-256
882,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,737 UART: [kat] ++
886,889 UART: [kat] sha1
891,115 UART: [kat] SHA2-256
893,053 UART: [kat] SHA2-384
895,712 UART: [kat] SHA2-512-ACC
897,613 UART: [kat] ECC-384
903,180 UART: [kat] HMAC-384Kdf
907,904 UART: [kat] LMS
1,476,100 UART: [kat] --
1,476,957 UART: [cold-reset] ++
1,477,409 UART: [fht] Storing FHT @ 0x50003400
1,480,104 UART: [idev] ++
1,480,272 UART: [idev] CDI.KEYID = 6
1,480,632 UART: [idev] SUBJECT.KEYID = 7
1,481,056 UART: [idev] UDS.KEYID = 0
1,481,401 ready_for_fw is high
1,481,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,404 UART: [idev] Erasing UDS.KEYID = 0
1,505,342 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,894 UART: [idev] --
1,515,045 UART: [ldev] ++
1,515,213 UART: [ldev] CDI.KEYID = 6
1,515,576 UART: [ldev] SUBJECT.KEYID = 5
1,516,002 UART: [ldev] AUTHORITY.KEYID = 7
1,516,465 UART: [ldev] FE.KEYID = 1
1,521,399 UART: [ldev] Erasing FE.KEYID = 1
1,547,066 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,232 UART: [ldev] --
1,586,651 UART: [fwproc] Waiting for Commands...
1,587,406 UART: [fwproc] Received command 0x46574c44
1,588,197 UART: [fwproc] Received Image of size 114448 bytes
2,887,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,212 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,564 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,507 >>> mbox cmd response: success
3,080,685 UART: [afmc] ++
3,080,853 UART: [afmc] CDI.KEYID = 6
3,081,215 UART: [afmc] SUBJECT.KEYID = 7
3,081,640 UART: [afmc] AUTHORITY.KEYID = 5
3,116,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,961 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,741 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,354 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,044 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,733 UART: [afmc] --
3,159,683 UART: [cold-reset] --
3,160,263 UART: [state] Locking Datavault
3,161,320 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,924 UART: [state] Locking ICCM
3,162,576 UART: [exit] Launching FMC @ 0x40000130
3,167,905 UART:
3,167,921 UART: Running Caliptra FMC ...
3,168,329 UART:
3,168,383 UART: [state] CFI Enabled
3,178,816 UART: [fht] FMC Alias Private Key: 7
3,286,449 UART: [art] Extend RT PCRs Done
3,286,877 UART: [art] Lock RT PCRs Done
3,288,537 UART: [art] Populate DV Done
3,296,672 UART: [fht] FMC Alias Private Key: 7
3,297,658 UART: [art] Derive CDI
3,297,938 UART: [art] Store in in slot 0x4
3,384,411 UART: [art] Derive Key Pair
3,384,771 UART: [art] Store priv key in slot 0x5
3,397,867 UART: [art] Derive Key Pair - Done
3,412,333 UART: [art] Signing Cert with AUTHO
3,412,813 UART: RITY.KEYID = 7
3,428,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,862 UART: [art] PUB.X = 1B8C8F05533901CA1ED6F0381083F90E5639682D0C9CEC201D8FED2BE106C829FC2C3A0E2B40447D702CCC988E2DAAE7
3,435,626 UART: [art] PUB.Y = 8CD73C3DA315009707EAE25CACB53DBA86566EE4E834B1B1C3F7203F0ABF0B121E7237B70D7BD2454E6738AFACC19DD5
3,442,560 UART: [art] SIG.R = 8CA2B129C48E0014746039C906B6CB2C3E7519580A102685DF4C11B9C84556EC477FE82B37956185ACC80B6F7D57AD9B
3,449,299 UART: [art] SIG.S = 4943A9F331D6296D316EA4A953818B05026A290AE62C6FE659C96043E56B337A0586967B6601F29053408C97BD3E4CAB
3,473,283 UART: Caliptra RT
3,473,536 UART: [state] CFI Enabled
3,581,241 UART: [rt] RT listening for mailbox commands...
3,581,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,607 UART: [rt]cmd =0x44504543, len=24
3,636,947 >>> mbox cmd response data (40 bytes)
3,636,948 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,159 UART: [rt]cmd =0x44504543, len=24
3,692,673 >>> mbox cmd response data (40 bytes)
3,692,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,721,915 UART: [rt]cmd =0x44504543, len=24
3,748,181 >>> mbox cmd response data (40 bytes)
3,748,182 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,711 UART: [rt]cmd =0x44504543, len=24
3,804,143 >>> mbox cmd response data (40 bytes)
3,804,144 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,515 UART: [rt]cmd =0x44504543, len=24
3,859,841 >>> mbox cmd response data (40 bytes)
3,859,842 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,181 UART: [rt]cmd =0x44504543, len=24
3,915,131 >>> mbox cmd response data (40 bytes)
3,915,132 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,831 UART: [rt]cmd =0x44504543, len=24
3,971,047 >>> mbox cmd response data (40 bytes)
3,971,048 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,427 UART: [rt]cmd =0x44504543, len=24
4,026,619 >>> mbox cmd response data (40 bytes)
4,026,620 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,056,095 UART: [rt]cmd =0x44504543, len=24
4,082,245 >>> mbox cmd response data (40 bytes)
4,082,246 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,111,837 UART: [rt]cmd =0x44504543, len=24
4,137,961 >>> mbox cmd response data (40 bytes)
4,137,962 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,351 UART: [rt]cmd =0x44504543, len=24
4,194,057 >>> mbox cmd response data (40 bytes)
4,194,058 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,429 UART: [rt]cmd =0x44504543, len=24
4,249,271 >>> mbox cmd response data (40 bytes)
4,249,272 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,278,569 UART: [rt]cmd =0x44504543, len=24
4,305,007 >>> mbox cmd response data (40 bytes)
4,305,008 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,334,433 UART: [rt]cmd =0x44504543, len=24
4,360,693 >>> mbox cmd response data (40 bytes)
4,360,694 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,390,393 UART: [rt]cmd =0x44504543, len=24
4,416,813 >>> mbox cmd response data (40 bytes)
4,416,814 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,446,309 UART: [rt]cmd =0x44504543, len=24
4,453,411 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,427 ready_for_fw is high
1,361,427 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,926,815 >>> mbox cmd response: success
2,987,905 UART:
2,987,921 UART: Running Caliptra FMC ...
2,988,329 UART:
2,988,383 UART: [state] CFI Enabled
2,998,478 UART: [fht] FMC Alias Private Key: 7
3,106,659 UART: [art] Extend RT PCRs Done
3,107,087 UART: [art] Lock RT PCRs Done
3,108,873 UART: [art] Populate DV Done
3,117,216 UART: [fht] FMC Alias Private Key: 7
3,118,238 UART: [art] Derive CDI
3,118,518 UART: [art] Store in in slot 0x4
3,204,075 UART: [art] Derive Key Pair
3,204,435 UART: [art] Store priv key in slot 0x5
3,217,811 UART: [art] Derive Key Pair - Done
3,232,837 UART: [art] Signing Cert with AUTHO
3,233,317 UART: RITY.KEYID = 7
3,248,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,380 UART: [art] PUB.X = E6B8045EE15B1C75275CDD68EAF6A70FE5ABC5FA54D43674C2585B85FDFDAA74C32942451FE02D450DDF33E30C5B7293
3,256,154 UART: [art] PUB.Y = 1F28168809308D99D060B0CD09F061291A94655530B4EE7F6DE85A5357790CEC438B3852AF1A2E12FBAC1BF5D8F29B94
3,263,097 UART: [art] SIG.R = 91A662F6A41B16409F2FB677A102B79CD510FF34CD22569C532AECF3B77BA2A4EE7B0D07A26B61227FAB9AD7C311987B
3,269,870 UART: [art] SIG.S = 561FA28F247880F0B225C59DEF40AABA1CFD2B56B997ED96251A1F4DF4DA1A51846F318B252010565BCCD371AC42F0D6
3,293,717 UART: Caliptra RT
3,293,970 UART: [state] CFI Enabled
3,401,975 UART: [rt] RT listening for mailbox commands...
3,402,645 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,695 UART: [rt]cmd =0x44504543, len=24
3,458,533 >>> mbox cmd response data (40 bytes)
3,458,534 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,149 UART: [rt]cmd =0x44504543, len=24
3,514,159 >>> mbox cmd response data (40 bytes)
3,514,160 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,519 UART: [rt]cmd =0x44504543, len=24
3,569,827 >>> mbox cmd response data (40 bytes)
3,569,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,599,541 UART: [rt]cmd =0x44504543, len=24
3,625,637 >>> mbox cmd response data (40 bytes)
3,625,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,655,197 UART: [rt]cmd =0x44504543, len=24
3,681,443 >>> mbox cmd response data (40 bytes)
3,681,444 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,903 UART: [rt]cmd =0x44504543, len=24
3,737,053 >>> mbox cmd response data (40 bytes)
3,737,054 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,689 UART: [rt]cmd =0x44504543, len=24
3,792,921 >>> mbox cmd response data (40 bytes)
3,792,922 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,251 UART: [rt]cmd =0x44504543, len=24
3,848,471 >>> mbox cmd response data (40 bytes)
3,848,472 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,031 UART: [rt]cmd =0x44504543, len=24
3,903,935 >>> mbox cmd response data (40 bytes)
3,903,936 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,631 UART: [rt]cmd =0x44504543, len=24
3,959,767 >>> mbox cmd response data (40 bytes)
3,959,768 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,475 UART: [rt]cmd =0x44504543, len=24
4,015,401 >>> mbox cmd response data (40 bytes)
4,015,402 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,899 UART: [rt]cmd =0x44504543, len=24
4,071,233 >>> mbox cmd response data (40 bytes)
4,071,234 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,100,763 UART: [rt]cmd =0x44504543, len=24
4,126,919 >>> mbox cmd response data (40 bytes)
4,126,920 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,156,487 UART: [rt]cmd =0x44504543, len=24
4,182,791 >>> mbox cmd response data (40 bytes)
4,182,792 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,212,265 UART: [rt]cmd =0x44504543, len=24
4,239,197 >>> mbox cmd response data (40 bytes)
4,239,198 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,268,551 UART: [rt]cmd =0x44504543, len=24
4,275,957 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,392 UART: [kat] SHA2-256
882,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,438 UART: [kat] ++
886,590 UART: [kat] sha1
890,932 UART: [kat] SHA2-256
892,870 UART: [kat] SHA2-384
895,571 UART: [kat] SHA2-512-ACC
897,472 UART: [kat] ECC-384
903,041 UART: [kat] HMAC-384Kdf
907,615 UART: [kat] LMS
1,475,811 UART: [kat] --
1,476,556 UART: [cold-reset] ++
1,477,006 UART: [fht] Storing FHT @ 0x50003400
1,479,893 UART: [idev] ++
1,480,061 UART: [idev] CDI.KEYID = 6
1,480,421 UART: [idev] SUBJECT.KEYID = 7
1,480,845 UART: [idev] UDS.KEYID = 0
1,481,190 ready_for_fw is high
1,481,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,729 UART: [idev] Erasing UDS.KEYID = 0
1,505,499 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,017 UART: [idev] --
1,515,238 UART: [ldev] ++
1,515,406 UART: [ldev] CDI.KEYID = 6
1,515,769 UART: [ldev] SUBJECT.KEYID = 5
1,516,195 UART: [ldev] AUTHORITY.KEYID = 7
1,516,658 UART: [ldev] FE.KEYID = 1
1,522,042 UART: [ldev] Erasing FE.KEYID = 1
1,547,693 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,651 UART: [ldev] --
1,587,142 UART: [fwproc] Waiting for Commands...
1,587,873 UART: [fwproc] Received command 0x46574c44
1,588,664 UART: [fwproc] Received Image of size 114448 bytes
2,887,259 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,913 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,265 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,314 >>> mbox cmd response: success
3,080,402 UART: [afmc] ++
3,080,570 UART: [afmc] CDI.KEYID = 6
3,080,932 UART: [afmc] SUBJECT.KEYID = 7
3,081,357 UART: [afmc] AUTHORITY.KEYID = 5
3,116,880 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,016 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,796 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,524 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,409 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,099 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,946 UART: [afmc] --
3,159,890 UART: [cold-reset] --
3,160,540 UART: [state] Locking Datavault
3,161,953 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,557 UART: [state] Locking ICCM
3,163,033 UART: [exit] Launching FMC @ 0x40000130
3,168,362 UART:
3,168,378 UART: Running Caliptra FMC ...
3,168,786 UART:
3,168,929 UART: [state] CFI Enabled
3,179,846 UART: [fht] FMC Alias Private Key: 7
3,288,341 UART: [art] Extend RT PCRs Done
3,288,769 UART: [art] Lock RT PCRs Done
3,290,529 UART: [art] Populate DV Done
3,298,726 UART: [fht] FMC Alias Private Key: 7
3,299,750 UART: [art] Derive CDI
3,300,030 UART: [art] Store in in slot 0x4
3,385,921 UART: [art] Derive Key Pair
3,386,281 UART: [art] Store priv key in slot 0x5
3,399,383 UART: [art] Derive Key Pair - Done
3,414,250 UART: [art] Signing Cert with AUTHO
3,414,730 UART: RITY.KEYID = 7
3,430,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,829 UART: [art] PUB.X = 93B0D35FBE20CE77BD2164C8704F892060923394D86FEB4CBBD4AE627E26B935ACA8C3D071BD2FF39AFB607D2D1E23A6
3,437,615 UART: [art] PUB.Y = E76FD37EB44B5C2BEB209303283D666ADA7CEAE3AEA19972C0E697A4C1F7AC21CA49A77C15D14F2CB3B0E753AC1D9A09
3,444,581 UART: [art] SIG.R = 5576DCBE76950F50AA9C500C87A8042558FF39237BFC8EAA710FDA56FC33B94EB8F63642555BBF3EF6C1766DFE098CB5
3,451,350 UART: [art] SIG.S = B0E601C397DBD755F024E1F1F56E7202E08B379BCD247BDAC595FCF7C33771DB40B29B00539EB5482759C04519535492
3,475,093 UART: Caliptra RT
3,475,438 UART: [state] CFI Enabled
3,584,145 UART: [rt] RT listening for mailbox commands...
3,584,815 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,935 UART: [rt]cmd =0x44504543, len=24
3,641,559 >>> mbox cmd response data (40 bytes)
3,641,560 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,671,069 UART: [rt]cmd =0x44504543, len=24
3,697,353 >>> mbox cmd response data (40 bytes)
3,697,354 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,727,095 UART: [rt]cmd =0x44504543, len=24
3,753,479 >>> mbox cmd response data (40 bytes)
3,753,480 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,782,981 UART: [rt]cmd =0x44504543, len=24
3,809,671 >>> mbox cmd response data (40 bytes)
3,809,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,241 UART: [rt]cmd =0x44504543, len=24
3,865,679 >>> mbox cmd response data (40 bytes)
3,865,680 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,895,285 UART: [rt]cmd =0x44504543, len=24
3,921,055 >>> mbox cmd response data (40 bytes)
3,921,056 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,435 UART: [rt]cmd =0x44504543, len=24
3,976,685 >>> mbox cmd response data (40 bytes)
3,976,686 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,006,025 UART: [rt]cmd =0x44504543, len=24
4,032,477 >>> mbox cmd response data (40 bytes)
4,032,478 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,061,985 UART: [rt]cmd =0x44504543, len=24
4,088,553 >>> mbox cmd response data (40 bytes)
4,088,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,118,021 UART: [rt]cmd =0x44504543, len=24
4,144,371 >>> mbox cmd response data (40 bytes)
4,144,372 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,173,709 UART: [rt]cmd =0x44504543, len=24
4,199,799 >>> mbox cmd response data (40 bytes)
4,199,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,229,155 UART: [rt]cmd =0x44504543, len=24
4,255,367 >>> mbox cmd response data (40 bytes)
4,255,368 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,284,709 UART: [rt]cmd =0x44504543, len=24
4,311,109 >>> mbox cmd response data (40 bytes)
4,311,110 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,340,417 UART: [rt]cmd =0x44504543, len=24
4,366,571 >>> mbox cmd response data (40 bytes)
4,366,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,395,959 UART: [rt]cmd =0x44504543, len=24
4,422,795 >>> mbox cmd response data (40 bytes)
4,422,796 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,452,381 UART: [rt]cmd =0x44504543, len=24
4,459,667 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,680 ready_for_fw is high
1,362,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,064 >>> mbox cmd response: success
2,990,142 UART:
2,990,158 UART: Running Caliptra FMC ...
2,990,566 UART:
2,990,709 UART: [state] CFI Enabled
3,001,242 UART: [fht] FMC Alias Private Key: 7
3,108,975 UART: [art] Extend RT PCRs Done
3,109,403 UART: [art] Lock RT PCRs Done
3,111,167 UART: [art] Populate DV Done
3,119,258 UART: [fht] FMC Alias Private Key: 7
3,120,336 UART: [art] Derive CDI
3,120,616 UART: [art] Store in in slot 0x4
3,206,257 UART: [art] Derive Key Pair
3,206,617 UART: [art] Store priv key in slot 0x5
3,219,769 UART: [art] Derive Key Pair - Done
3,234,478 UART: [art] Signing Cert with AUTHO
3,234,958 UART: RITY.KEYID = 7
3,250,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,357 UART: [art] PUB.X = 5BC1CA319C3EC7A26BD1C0D85F7DD97BB1D2054A9411A4FAB5514387C92660B88EF65384B970C992DD5F990908D921E4
3,258,124 UART: [art] PUB.Y = C4E9D7F4C15EEF03A3166C260AA1621C6012C4FC7E4F338B147964F0280AF2335E6EF02E9FAF9CC56003AE075D4315DD
3,265,069 UART: [art] SIG.R = A685BF7EBCECD8AFD0085135D5BD1662D274C8A142781769719BFD098826BB5F816FE3F90E3C487EAC156ED16C144AC5
3,271,842 UART: [art] SIG.S = 7DF67C6491D9ABEC673CFE89EAB43F43BF7DCB87BB32ECAC340C353D5F1E87C845F7DF4135A65F8E97C52470A45DBED4
3,295,370 UART: Caliptra RT
3,295,715 UART: [state] CFI Enabled
3,403,544 UART: [rt] RT listening for mailbox commands...
3,404,214 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,188 UART: [rt]cmd =0x44504543, len=24
3,460,412 >>> mbox cmd response data (40 bytes)
3,460,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,076 UART: [rt]cmd =0x44504543, len=24
3,516,096 >>> mbox cmd response data (40 bytes)
3,516,097 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,636 UART: [rt]cmd =0x44504543, len=24
3,572,068 >>> mbox cmd response data (40 bytes)
3,572,069 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,601,514 UART: [rt]cmd =0x44504543, len=24
3,627,676 >>> mbox cmd response data (40 bytes)
3,627,677 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,657,056 UART: [rt]cmd =0x44504543, len=24
3,683,654 >>> mbox cmd response data (40 bytes)
3,683,655 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,212 UART: [rt]cmd =0x44504543, len=24
3,739,236 >>> mbox cmd response data (40 bytes)
3,739,237 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,740 UART: [rt]cmd =0x44504543, len=24
3,794,962 >>> mbox cmd response data (40 bytes)
3,794,963 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,640 UART: [rt]cmd =0x44504543, len=24
3,850,788 >>> mbox cmd response data (40 bytes)
3,850,789 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,224 UART: [rt]cmd =0x44504543, len=24
3,906,490 >>> mbox cmd response data (40 bytes)
3,906,491 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,196 UART: [rt]cmd =0x44504543, len=24
3,962,354 >>> mbox cmd response data (40 bytes)
3,962,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,992,008 UART: [rt]cmd =0x44504543, len=24
4,018,522 >>> mbox cmd response data (40 bytes)
4,018,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,158 UART: [rt]cmd =0x44504543, len=24
4,074,754 >>> mbox cmd response data (40 bytes)
4,074,755 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,104,372 UART: [rt]cmd =0x44504543, len=24
4,130,602 >>> mbox cmd response data (40 bytes)
4,130,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,159,954 UART: [rt]cmd =0x44504543, len=24
4,186,284 >>> mbox cmd response data (40 bytes)
4,186,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,215,750 UART: [rt]cmd =0x44504543, len=24
4,242,096 >>> mbox cmd response data (40 bytes)
4,242,097 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,490 UART: [rt]cmd =0x44504543, len=24
4,279,020 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
893,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,753 UART: [kat] ++
897,905 UART: [kat] sha1
902,157 UART: [kat] SHA2-256
904,097 UART: [kat] SHA2-384
906,916 UART: [kat] SHA2-512-ACC
908,817 UART: [kat] ECC-384
918,800 UART: [kat] HMAC-384Kdf
923,314 UART: [kat] LMS
1,171,642 UART: [kat] --
1,172,495 UART: [cold-reset] ++
1,172,861 UART: [fht] FHT @ 0x50003400
1,175,452 UART: [idev] ++
1,175,620 UART: [idev] CDI.KEYID = 6
1,175,980 UART: [idev] SUBJECT.KEYID = 7
1,176,404 UART: [idev] UDS.KEYID = 0
1,176,749 ready_for_fw is high
1,176,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,394 UART: [idev] Erasing UDS.KEYID = 0
1,201,159 UART: [idev] Sha1 KeyId Algorithm
1,209,715 UART: [idev] --
1,210,717 UART: [ldev] ++
1,210,885 UART: [ldev] CDI.KEYID = 6
1,211,248 UART: [ldev] SUBJECT.KEYID = 5
1,211,674 UART: [ldev] AUTHORITY.KEYID = 7
1,212,137 UART: [ldev] FE.KEYID = 1
1,217,447 UART: [ldev] Erasing FE.KEYID = 1
1,243,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,139 UART: [ldev] --
1,283,418 UART: [fwproc] Wait for Commands...
1,284,004 UART: [fwproc] Recv command 0x46574c44
1,284,732 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,905 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,882 >>> mbox cmd response: success
2,778,118 UART: [afmc] ++
2,778,286 UART: [afmc] CDI.KEYID = 6
2,778,648 UART: [afmc] SUBJECT.KEYID = 7
2,779,073 UART: [afmc] AUTHORITY.KEYID = 5
2,814,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,021 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,749 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,634 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,353 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,359 UART: [afmc] --
2,858,239 UART: [cold-reset] --
2,859,191 UART: [state] Locking Datavault
2,860,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,006 UART: [state] Locking ICCM
2,861,460 UART: [exit] Launching FMC @ 0x40000130
2,866,789 UART:
2,866,805 UART: Running Caliptra FMC ...
2,867,213 UART:
2,867,267 UART: [state] CFI Enabled
2,877,854 UART: [fht] FMC Alias Private Key: 7
2,986,237 UART: [art] Extend RT PCRs Done
2,986,665 UART: [art] Lock RT PCRs Done
2,988,219 UART: [art] Populate DV Done
2,996,524 UART: [fht] FMC Alias Private Key: 7
2,997,456 UART: [art] Derive CDI
2,997,736 UART: [art] Store in in slot 0x4
3,082,839 UART: [art] Derive Key Pair
3,083,199 UART: [art] Store priv key in slot 0x5
3,096,353 UART: [art] Derive Key Pair - Done
3,111,055 UART: [art] Signing Cert with AUTHO
3,111,535 UART: RITY.KEYID = 7
3,126,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,590 UART: [art] PUB.X = 14FE0D4C48385027DFB71990D7E13C9037FBFD9356CACDF1B2C91BDE6B51E23C335457E9D6B5263A396C423C9FEA2CBD
3,134,373 UART: [art] PUB.Y = 3738780BC7C52A3DAE9D320A133E1C8D625E567B737087F93D032FDCB014F5292B19A634D4D2CBF59C6B01923A94B34D
3,141,315 UART: [art] SIG.R = 8D3667F6AB2FEC021DB03FD226F51C39CBA11EC920C5A0103F8C3EF28511EB398B055FC6E7D2E287C6D6AA11ABEFA543
3,148,099 UART: [art] SIG.S = 268C97ED83D27BEE7D971792FEDEC1D8733133194A0A359C3B353C082DCDB5DE98BC06D45FB7597E5CAD19149C04A6A5
3,171,904 UART: Caliptra RT
3,172,157 UART: [state] CFI Enabled
3,278,682 UART: [rt] RT listening for mailbox commands...
3,279,352 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,480 UART: [rt]cmd =0x44504543, len=24
3,335,782 >>> mbox cmd response data (40 bytes)
3,335,783 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,240 UART: [rt]cmd =0x44504543, len=24
3,391,532 >>> mbox cmd response data (40 bytes)
3,391,533 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,421,094 UART: [rt]cmd =0x44504543, len=24
3,447,218 >>> mbox cmd response data (40 bytes)
3,447,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,450 UART: [rt]cmd =0x44504543, len=24
3,502,762 >>> mbox cmd response data (40 bytes)
3,502,763 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,450 UART: [rt]cmd =0x44504543, len=24
3,558,974 >>> mbox cmd response data (40 bytes)
3,558,975 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,628 UART: [rt]cmd =0x44504543, len=24
3,614,440 >>> mbox cmd response data (40 bytes)
3,614,441 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,790 UART: [rt]cmd =0x44504543, len=24
3,670,364 >>> mbox cmd response data (40 bytes)
3,670,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,828 UART: [rt]cmd =0x44504543, len=24
3,726,082 >>> mbox cmd response data (40 bytes)
3,726,083 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,738 UART: [rt]cmd =0x44504543, len=24
3,782,182 >>> mbox cmd response data (40 bytes)
3,782,183 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,524 UART: [rt]cmd =0x44504543, len=24
3,837,914 >>> mbox cmd response data (40 bytes)
3,837,915 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,164 UART: [rt]cmd =0x44504543, len=24
3,894,086 >>> mbox cmd response data (40 bytes)
3,894,087 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,923,466 UART: [rt]cmd =0x44504543, len=24
3,949,960 >>> mbox cmd response data (40 bytes)
3,949,961 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,979,422 UART: [rt]cmd =0x44504543, len=24
4,006,106 >>> mbox cmd response data (40 bytes)
4,006,107 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,035,516 UART: [rt]cmd =0x44504543, len=24
4,061,280 >>> mbox cmd response data (40 bytes)
4,061,281 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,766 UART: [rt]cmd =0x44504543, len=24
4,117,336 >>> mbox cmd response data (40 bytes)
4,117,337 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,808 UART: [rt]cmd =0x44504543, len=24
4,154,200 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,691 ready_for_fw is high
1,059,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,517 >>> mbox cmd response: success
2,690,417 UART:
2,690,433 UART: Running Caliptra FMC ...
2,690,841 UART:
2,690,895 UART: [state] CFI Enabled
2,701,466 UART: [fht] FMC Alias Private Key: 7
2,809,315 UART: [art] Extend RT PCRs Done
2,809,743 UART: [art] Lock RT PCRs Done
2,811,485 UART: [art] Populate DV Done
2,819,588 UART: [fht] FMC Alias Private Key: 7
2,820,564 UART: [art] Derive CDI
2,820,844 UART: [art] Store in in slot 0x4
2,906,563 UART: [art] Derive Key Pair
2,906,923 UART: [art] Store priv key in slot 0x5
2,920,475 UART: [art] Derive Key Pair - Done
2,935,236 UART: [art] Signing Cert with AUTHO
2,935,716 UART: RITY.KEYID = 7
2,951,108 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,873 UART: [art] PUB.X = 67F34A7851B8B6DC3E6F48F327640CBBC27B391575EB461036ECD83CE5896117F60611C0D50393D01E03749D3976426E
2,958,625 UART: [art] PUB.Y = B1C7D444EE8B5F41C461C9EF1A37BD36496F41DD4AFA9A31B5E397C0E747CB8532AB8D50A90D7C9B6337B730926ABF63
2,965,586 UART: [art] SIG.R = 72A852B7C94C3EE9AF47D508D4AC5FAC121E119B68869DE293072AD7AE4B1C5B2D047287F8B78ADB16452D61B6814EC8
2,972,357 UART: [art] SIG.S = F29AD3099C79FCFF7EF1D7B2CB73858327DC9829992B90EF6FDA3B83EF44C7011A6438EA6F603AF8AA0C6ADC9878CEF2
2,995,855 UART: Caliptra RT
2,996,108 UART: [state] CFI Enabled
3,103,817 UART: [rt] RT listening for mailbox commands...
3,104,487 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,159 UART: [rt]cmd =0x44504543, len=24
3,159,799 >>> mbox cmd response data (40 bytes)
3,159,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,423 UART: [rt]cmd =0x44504543, len=24
3,215,923 >>> mbox cmd response data (40 bytes)
3,215,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,245,271 UART: [rt]cmd =0x44504543, len=24
3,272,059 >>> mbox cmd response data (40 bytes)
3,272,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,551 UART: [rt]cmd =0x44504543, len=24
3,327,463 >>> mbox cmd response data (40 bytes)
3,327,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,875 UART: [rt]cmd =0x44504543, len=24
3,383,237 >>> mbox cmd response data (40 bytes)
3,383,238 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,412,605 UART: [rt]cmd =0x44504543, len=24
3,438,415 >>> mbox cmd response data (40 bytes)
3,438,416 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,185 UART: [rt]cmd =0x44504543, len=24
3,494,749 >>> mbox cmd response data (40 bytes)
3,494,750 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,009 UART: [rt]cmd =0x44504543, len=24
3,550,697 >>> mbox cmd response data (40 bytes)
3,550,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,337 UART: [rt]cmd =0x44504543, len=24
3,606,233 >>> mbox cmd response data (40 bytes)
3,606,234 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,557 UART: [rt]cmd =0x44504543, len=24
3,662,207 >>> mbox cmd response data (40 bytes)
3,662,208 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,621 UART: [rt]cmd =0x44504543, len=24
3,718,079 >>> mbox cmd response data (40 bytes)
3,718,080 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,747,719 UART: [rt]cmd =0x44504543, len=24
3,773,497 >>> mbox cmd response data (40 bytes)
3,773,498 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,803,015 UART: [rt]cmd =0x44504543, len=24
3,829,221 >>> mbox cmd response data (40 bytes)
3,829,222 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,555 UART: [rt]cmd =0x44504543, len=24
3,884,765 >>> mbox cmd response data (40 bytes)
3,884,766 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,221 UART: [rt]cmd =0x44504543, len=24
3,940,439 >>> mbox cmd response data (40 bytes)
3,940,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,823 UART: [rt]cmd =0x44504543, len=24
3,976,761 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
893,347 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,472 UART: [kat] ++
897,624 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,585 UART: [kat] SHA2-512-ACC
908,486 UART: [kat] ECC-384
918,157 UART: [kat] HMAC-384Kdf
922,605 UART: [kat] LMS
1,170,933 UART: [kat] --
1,171,508 UART: [cold-reset] ++
1,171,936 UART: [fht] FHT @ 0x50003400
1,174,531 UART: [idev] ++
1,174,699 UART: [idev] CDI.KEYID = 6
1,175,059 UART: [idev] SUBJECT.KEYID = 7
1,175,483 UART: [idev] UDS.KEYID = 0
1,175,828 ready_for_fw is high
1,175,828 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,533 UART: [idev] Erasing UDS.KEYID = 0
1,200,518 UART: [idev] Sha1 KeyId Algorithm
1,209,198 UART: [idev] --
1,210,260 UART: [ldev] ++
1,210,428 UART: [ldev] CDI.KEYID = 6
1,210,791 UART: [ldev] SUBJECT.KEYID = 5
1,211,217 UART: [ldev] AUTHORITY.KEYID = 7
1,211,680 UART: [ldev] FE.KEYID = 1
1,216,932 UART: [ldev] Erasing FE.KEYID = 1
1,243,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,322 UART: [ldev] --
1,282,651 UART: [fwproc] Wait for Commands...
1,283,425 UART: [fwproc] Recv command 0x46574c44
1,284,153 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,856 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,079 >>> mbox cmd response: success
2,777,239 UART: [afmc] ++
2,777,407 UART: [afmc] CDI.KEYID = 6
2,777,769 UART: [afmc] SUBJECT.KEYID = 7
2,778,194 UART: [afmc] AUTHORITY.KEYID = 5
2,814,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,536 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,264 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,149 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,868 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,904 UART: [afmc] --
2,857,990 UART: [cold-reset] --
2,858,734 UART: [state] Locking Datavault
2,860,017 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,621 UART: [state] Locking ICCM
2,861,157 UART: [exit] Launching FMC @ 0x40000130
2,866,486 UART:
2,866,502 UART: Running Caliptra FMC ...
2,866,910 UART:
2,867,053 UART: [state] CFI Enabled
2,877,552 UART: [fht] FMC Alias Private Key: 7
2,984,573 UART: [art] Extend RT PCRs Done
2,985,001 UART: [art] Lock RT PCRs Done
2,986,581 UART: [art] Populate DV Done
2,994,832 UART: [fht] FMC Alias Private Key: 7
2,995,776 UART: [art] Derive CDI
2,996,056 UART: [art] Store in in slot 0x4
3,081,573 UART: [art] Derive Key Pair
3,081,933 UART: [art] Store priv key in slot 0x5
3,095,865 UART: [art] Derive Key Pair - Done
3,110,687 UART: [art] Signing Cert with AUTHO
3,111,167 UART: RITY.KEYID = 7
3,126,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,766 UART: [art] PUB.X = B144F90E174656367F8F4EC595FD9714D42EDD7AE934D85099C45F08128A8B812B0BE323615471352E2345AC0D480F44
3,133,515 UART: [art] PUB.Y = 855058B708C0002868D5D9D32B444F2F15A50FFA3546964C766A220D4F3FB704143EF5DA657B5831D7180C5814785A6B
3,140,420 UART: [art] SIG.R = 31C71C3ACACA0BC172148583D102232B99596C996B9E44C8749F0B5FB9BF8FA105BCB40A12EC44C41D008EF1CE953D3F
3,147,165 UART: [art] SIG.S = EE1E7E2FD34BB5820E59BD8EA41D362F595C821262EFE5C74B1751519EF9848EF4B1AEF5999BD28159A23BB9DDB73D69
3,171,243 UART: Caliptra RT
3,171,588 UART: [state] CFI Enabled
3,278,981 UART: [rt] RT listening for mailbox commands...
3,279,651 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,499 UART: [rt]cmd =0x44504543, len=24
3,335,655 >>> mbox cmd response data (40 bytes)
3,335,656 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,043 UART: [rt]cmd =0x44504543, len=24
3,391,101 >>> mbox cmd response data (40 bytes)
3,391,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,420,417 UART: [rt]cmd =0x44504543, len=24
3,446,477 >>> mbox cmd response data (40 bytes)
3,446,478 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,019 UART: [rt]cmd =0x44504543, len=24
3,502,113 >>> mbox cmd response data (40 bytes)
3,502,114 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,443 UART: [rt]cmd =0x44504543, len=24
3,557,687 >>> mbox cmd response data (40 bytes)
3,557,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,139 UART: [rt]cmd =0x44504543, len=24
3,613,191 >>> mbox cmd response data (40 bytes)
3,613,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,363 UART: [rt]cmd =0x44504543, len=24
3,668,955 >>> mbox cmd response data (40 bytes)
3,668,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,425 UART: [rt]cmd =0x44504543, len=24
3,725,145 >>> mbox cmd response data (40 bytes)
3,725,146 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,669 UART: [rt]cmd =0x44504543, len=24
3,781,593 >>> mbox cmd response data (40 bytes)
3,781,594 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,999 UART: [rt]cmd =0x44504543, len=24
3,837,627 >>> mbox cmd response data (40 bytes)
3,837,628 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,375 UART: [rt]cmd =0x44504543, len=24
3,893,919 >>> mbox cmd response data (40 bytes)
3,893,920 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,923,525 UART: [rt]cmd =0x44504543, len=24
3,949,889 >>> mbox cmd response data (40 bytes)
3,949,890 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,979,575 UART: [rt]cmd =0x44504543, len=24
4,005,825 >>> mbox cmd response data (40 bytes)
4,005,826 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,035,583 UART: [rt]cmd =0x44504543, len=24
4,061,975 >>> mbox cmd response data (40 bytes)
4,061,976 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,601 UART: [rt]cmd =0x44504543, len=24
4,118,097 >>> mbox cmd response data (40 bytes)
4,118,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,147,641 UART: [rt]cmd =0x44504543, len=24
4,154,735 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,776 ready_for_fw is high
1,060,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,260 >>> mbox cmd response: success
2,690,192 UART:
2,690,208 UART: Running Caliptra FMC ...
2,690,616 UART:
2,690,759 UART: [state] CFI Enabled
2,701,294 UART: [fht] FMC Alias Private Key: 7
2,809,229 UART: [art] Extend RT PCRs Done
2,809,657 UART: [art] Lock RT PCRs Done
2,811,277 UART: [art] Populate DV Done
2,819,450 UART: [fht] FMC Alias Private Key: 7
2,820,582 UART: [art] Derive CDI
2,820,862 UART: [art] Store in in slot 0x4
2,906,213 UART: [art] Derive Key Pair
2,906,573 UART: [art] Store priv key in slot 0x5
2,920,485 UART: [art] Derive Key Pair - Done
2,935,573 UART: [art] Signing Cert with AUTHO
2,936,053 UART: RITY.KEYID = 7
2,951,213 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,978 UART: [art] PUB.X = 72340B49F46931C041E4F8FEA7241F3940794AB4EDA472A549655A2DE22622F001ECE1E59474973C7C57A5377F9AF04C
2,958,740 UART: [art] PUB.Y = 25F4343A486F64D00069470A33F1D0DCE24076C77EFB506394840B7BDD244569EF83E6BDE197F31BF1C08E20F661DE1A
2,965,666 UART: [art] SIG.R = 18A24F913F7B729A4C7E96A9786D342B1511E319968063D88AC2705CBE3619E7E90875288320EDD24990D2F268BC474C
2,972,425 UART: [art] SIG.S = F6E4F02FDF0316263905397708F83F3F7703BACF21874D14334026211ABA9A8C42D82F95C80E844BE6E97BC0E19C51D6
2,996,655 UART: Caliptra RT
2,997,000 UART: [state] CFI Enabled
3,104,717 UART: [rt] RT listening for mailbox commands...
3,105,387 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,231 UART: [rt]cmd =0x44504543, len=24
3,161,167 >>> mbox cmd response data (40 bytes)
3,161,168 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,601 UART: [rt]cmd =0x44504543, len=24
3,217,407 >>> mbox cmd response data (40 bytes)
3,217,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,246,841 UART: [rt]cmd =0x44504543, len=24
3,272,743 >>> mbox cmd response data (40 bytes)
3,272,744 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,309 UART: [rt]cmd =0x44504543, len=24
3,328,829 >>> mbox cmd response data (40 bytes)
3,328,830 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,449 UART: [rt]cmd =0x44504543, len=24
3,384,585 >>> mbox cmd response data (40 bytes)
3,384,586 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,053 UART: [rt]cmd =0x44504543, len=24
3,440,669 >>> mbox cmd response data (40 bytes)
3,440,670 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,307 UART: [rt]cmd =0x44504543, len=24
3,497,161 >>> mbox cmd response data (40 bytes)
3,497,162 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,543 UART: [rt]cmd =0x44504543, len=24
3,552,829 >>> mbox cmd response data (40 bytes)
3,552,830 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,469 UART: [rt]cmd =0x44504543, len=24
3,609,243 >>> mbox cmd response data (40 bytes)
3,609,244 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,843 UART: [rt]cmd =0x44504543, len=24
3,665,203 >>> mbox cmd response data (40 bytes)
3,665,204 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,659 UART: [rt]cmd =0x44504543, len=24
3,720,421 >>> mbox cmd response data (40 bytes)
3,720,422 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,173 UART: [rt]cmd =0x44504543, len=24
3,776,591 >>> mbox cmd response data (40 bytes)
3,776,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,087 UART: [rt]cmd =0x44504543, len=24
3,833,027 >>> mbox cmd response data (40 bytes)
3,833,028 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,403 UART: [rt]cmd =0x44504543, len=24
3,889,433 >>> mbox cmd response data (40 bytes)
3,889,434 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,915 UART: [rt]cmd =0x44504543, len=24
3,945,253 >>> mbox cmd response data (40 bytes)
3,945,254 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,883 UART: [rt]cmd =0x44504543, len=24
3,982,141 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
915,676 UART: [kat] HMAC-384Kdf
920,124 UART: [kat] LMS
1,168,436 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,169,975 UART: [fht] FHT @ 0x50003400
1,172,463 UART: [idev] ++
1,172,631 UART: [idev] CDI.KEYID = 6
1,172,992 UART: [idev] SUBJECT.KEYID = 7
1,173,417 UART: [idev] UDS.KEYID = 0
1,173,763 ready_for_fw is high
1,173,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,239 UART: [idev] Sha1 KeyId Algorithm
1,207,271 UART: [idev] --
1,208,300 UART: [ldev] ++
1,208,468 UART: [ldev] CDI.KEYID = 6
1,208,832 UART: [ldev] SUBJECT.KEYID = 5
1,209,259 UART: [ldev] AUTHORITY.KEYID = 7
1,209,722 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,850 UART: [ldev] --
1,281,234 UART: [fwproc] Wait for Commands...
1,281,969 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,427 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,838 >>> mbox cmd response: success
2,776,971 UART: [afmc] ++
2,777,139 UART: [afmc] CDI.KEYID = 6
2,777,502 UART: [afmc] SUBJECT.KEYID = 7
2,777,928 UART: [afmc] AUTHORITY.KEYID = 5
2,813,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,228 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,840 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,559 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,542 UART: [afmc] --
2,856,662 UART: [cold-reset] --
2,857,558 UART: [state] Locking Datavault
2,858,553 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,157 UART: [state] Locking ICCM
2,859,587 UART: [exit] Launching FMC @ 0x40000130
2,864,916 UART:
2,864,932 UART: Running Caliptra FMC ...
2,865,340 UART:
2,865,394 UART: [state] CFI Enabled
2,875,585 UART: [fht] FMC Alias Private Key: 7
2,983,050 UART: [art] Extend RT PCRs Done
2,983,478 UART: [art] Lock RT PCRs Done
2,985,322 UART: [art] Populate DV Done
2,993,841 UART: [fht] FMC Alias Private Key: 7
2,994,927 UART: [art] Derive CDI
2,995,207 UART: [art] Store in in slot 0x4
3,080,938 UART: [art] Derive Key Pair
3,081,298 UART: [art] Store priv key in slot 0x5
3,094,792 UART: [art] Derive Key Pair - Done
3,109,615 UART: [art] Signing Cert with AUTHO
3,110,095 UART: RITY.KEYID = 7
3,125,449 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,214 UART: [art] PUB.X = 9D52D57062C5DB89D6B1F9E236B9D0528CF8857730C8B88A5844B04B29FAA02A003C23A99A2DEFF1B943754C5FC12F92
3,132,968 UART: [art] PUB.Y = 6E7297DDC43B9AD81ED74523A1F11A1C8CC0A65F5134F34960BD79B5B02499742E3BA4A3AC59C0F05BF65AB75B1A38E4
3,139,930 UART: [art] SIG.R = 7A8491ABB70D2DA9E9F9A536C274F968EC6CE7A68148C7D1F6A680C1062ECCE87CA391695C4AA7F33D303DBA107AF5F4
3,146,710 UART: [art] SIG.S = 21A0EEC309370CB95D9788B38AD9AE84AF996C304878B4C4C412BB4F4CE32D55F127419A3DA32B7EB2147029DF7977B7
3,170,413 UART: Caliptra RT
3,170,666 UART: [state] CFI Enabled
3,278,825 UART: [rt] RT listening for mailbox commands...
3,279,495 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,421 UART: [rt]cmd =0x44504543, len=24
3,335,715 >>> mbox cmd response data (40 bytes)
3,335,716 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,247 UART: [rt]cmd =0x44504543, len=24
3,391,533 >>> mbox cmd response data (40 bytes)
3,391,534 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,420,805 UART: [rt]cmd =0x44504543, len=24
3,446,825 >>> mbox cmd response data (40 bytes)
3,446,826 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,241 UART: [rt]cmd =0x44504543, len=24
3,502,403 >>> mbox cmd response data (40 bytes)
3,502,404 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,987 UART: [rt]cmd =0x44504543, len=24
3,558,583 >>> mbox cmd response data (40 bytes)
3,558,584 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,059 UART: [rt]cmd =0x44504543, len=24
3,614,529 >>> mbox cmd response data (40 bytes)
3,614,530 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,113 UART: [rt]cmd =0x44504543, len=24
3,670,469 >>> mbox cmd response data (40 bytes)
3,670,470 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,901 UART: [rt]cmd =0x44504543, len=24
3,726,127 >>> mbox cmd response data (40 bytes)
3,726,128 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,615 UART: [rt]cmd =0x44504543, len=24
3,781,977 >>> mbox cmd response data (40 bytes)
3,781,978 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,701 UART: [rt]cmd =0x44504543, len=24
3,837,753 >>> mbox cmd response data (40 bytes)
3,837,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,023 UART: [rt]cmd =0x44504543, len=24
3,893,085 >>> mbox cmd response data (40 bytes)
3,893,086 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,922,327 UART: [rt]cmd =0x44504543, len=24
3,948,331 >>> mbox cmd response data (40 bytes)
3,948,332 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,977,779 UART: [rt]cmd =0x44504543, len=24
4,004,375 >>> mbox cmd response data (40 bytes)
4,004,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,034,027 UART: [rt]cmd =0x44504543, len=24
4,060,345 >>> mbox cmd response data (40 bytes)
4,060,346 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,089,767 UART: [rt]cmd =0x44504543, len=24
4,116,145 >>> mbox cmd response data (40 bytes)
4,116,146 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,145,653 UART: [rt]cmd =0x44504543, len=24
4,153,287 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,772 ready_for_fw is high
1,055,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,230 >>> mbox cmd response: success
2,685,460 UART:
2,685,476 UART: Running Caliptra FMC ...
2,685,884 UART:
2,685,938 UART: [state] CFI Enabled
2,696,517 UART: [fht] FMC Alias Private Key: 7
2,803,984 UART: [art] Extend RT PCRs Done
2,804,412 UART: [art] Lock RT PCRs Done
2,805,834 UART: [art] Populate DV Done
2,814,131 UART: [fht] FMC Alias Private Key: 7
2,815,115 UART: [art] Derive CDI
2,815,395 UART: [art] Store in in slot 0x4
2,900,542 UART: [art] Derive Key Pair
2,900,902 UART: [art] Store priv key in slot 0x5
2,914,412 UART: [art] Derive Key Pair - Done
2,929,350 UART: [art] Signing Cert with AUTHO
2,929,830 UART: RITY.KEYID = 7
2,945,096 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,861 UART: [art] PUB.X = 8228B13BC72BCBBE8547575141076CFDDA384CE3624EB84C957DB21B0B0582333E2927AAB71C1D9A25DC48A6E61B39E7
2,952,630 UART: [art] PUB.Y = BAD074530489DC6F466DB84E2C9F992CEEB368FCAE7AE91509C324C520C4A68D15E6AA621E98262D9BC7272671442905
2,959,575 UART: [art] SIG.R = 2607E59275123D0FAD462AA1B56037C3F7BFB1EAB5CB372F1EAFA4C43F199FFD188047DF6EDF60F6106AB74E65F4664E
2,966,355 UART: [art] SIG.S = 6D5A2500FF428FF16CDA14DEFFA99CB9BA912BDC9EAC6F7AC41E7A489C34BAF70E09CFF3506AD8DB786770F1CB8A9DDE
2,989,952 UART: Caliptra RT
2,990,205 UART: [state] CFI Enabled
3,098,158 UART: [rt] RT listening for mailbox commands...
3,098,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,644 UART: [rt]cmd =0x44504543, len=24
3,155,036 >>> mbox cmd response data (40 bytes)
3,155,037 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,622 UART: [rt]cmd =0x44504543, len=24
3,210,424 >>> mbox cmd response data (40 bytes)
3,210,425 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,239,998 UART: [rt]cmd =0x44504543, len=24
3,266,502 >>> mbox cmd response data (40 bytes)
3,266,503 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,295,920 UART: [rt]cmd =0x44504543, len=24
3,322,398 >>> mbox cmd response data (40 bytes)
3,322,399 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,930 UART: [rt]cmd =0x44504543, len=24
3,378,140 >>> mbox cmd response data (40 bytes)
3,378,141 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,558 UART: [rt]cmd =0x44504543, len=24
3,434,138 >>> mbox cmd response data (40 bytes)
3,434,139 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,500 UART: [rt]cmd =0x44504543, len=24
3,489,354 >>> mbox cmd response data (40 bytes)
3,489,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,938 UART: [rt]cmd =0x44504543, len=24
3,544,956 >>> mbox cmd response data (40 bytes)
3,544,957 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,532 UART: [rt]cmd =0x44504543, len=24
3,600,836 >>> mbox cmd response data (40 bytes)
3,600,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,140 UART: [rt]cmd =0x44504543, len=24
3,656,642 >>> mbox cmd response data (40 bytes)
3,656,643 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,292 UART: [rt]cmd =0x44504543, len=24
3,712,726 >>> mbox cmd response data (40 bytes)
3,712,727 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,104 UART: [rt]cmd =0x44504543, len=24
3,768,368 >>> mbox cmd response data (40 bytes)
3,768,369 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,797,938 UART: [rt]cmd =0x44504543, len=24
3,824,300 >>> mbox cmd response data (40 bytes)
3,824,301 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,853,782 UART: [rt]cmd =0x44504543, len=24
3,880,500 >>> mbox cmd response data (40 bytes)
3,880,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,802 UART: [rt]cmd =0x44504543, len=24
3,936,730 >>> mbox cmd response data (40 bytes)
3,936,731 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,128 UART: [rt]cmd =0x44504543, len=24
3,973,124 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,765 UART: [kat] HMAC-384Kdf
921,505 UART: [kat] LMS
1,169,817 UART: [kat] --
1,170,684 UART: [cold-reset] ++
1,171,042 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,175,028 ready_for_fw is high
1,175,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,018 UART: [idev] Sha1 KeyId Algorithm
1,207,734 UART: [idev] --
1,208,555 UART: [ldev] ++
1,208,723 UART: [ldev] CDI.KEYID = 6
1,209,087 UART: [ldev] SUBJECT.KEYID = 5
1,209,514 UART: [ldev] AUTHORITY.KEYID = 7
1,209,977 UART: [ldev] FE.KEYID = 1
1,215,163 UART: [ldev] Erasing FE.KEYID = 1
1,241,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,305 UART: [ldev] --
1,280,791 UART: [fwproc] Wait for Commands...
1,281,402 UART: [fwproc] Recv command 0x46574c44
1,282,135 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,963 >>> mbox cmd response: success
2,773,048 UART: [afmc] ++
2,773,216 UART: [afmc] CDI.KEYID = 6
2,773,579 UART: [afmc] SUBJECT.KEYID = 7
2,774,005 UART: [afmc] AUTHORITY.KEYID = 5
2,809,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,367 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,096 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,979 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,698 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,719 UART: [afmc] --
2,853,723 UART: [cold-reset] --
2,854,839 UART: [state] Locking Datavault
2,855,896 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,500 UART: [state] Locking ICCM
2,857,100 UART: [exit] Launching FMC @ 0x40000130
2,862,429 UART:
2,862,445 UART: Running Caliptra FMC ...
2,862,853 UART:
2,862,996 UART: [state] CFI Enabled
2,873,643 UART: [fht] FMC Alias Private Key: 7
2,981,844 UART: [art] Extend RT PCRs Done
2,982,272 UART: [art] Lock RT PCRs Done
2,984,096 UART: [art] Populate DV Done
2,992,229 UART: [fht] FMC Alias Private Key: 7
2,993,197 UART: [art] Derive CDI
2,993,477 UART: [art] Store in in slot 0x4
3,079,048 UART: [art] Derive Key Pair
3,079,408 UART: [art] Store priv key in slot 0x5
3,092,896 UART: [art] Derive Key Pair - Done
3,107,427 UART: [art] Signing Cert with AUTHO
3,107,907 UART: RITY.KEYID = 7
3,123,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,916 UART: [art] PUB.X = 1B4BA8CD7EA12E597729D9A5CA421431487CF39180E483743DAFDC378156A5D24E84B3713BF9451C4CE83846B1F50733
3,130,683 UART: [art] PUB.Y = 87A512B467D64607193FA3110B44E692D7C329FACE54CB2618C31E86B356114E5017B1284DAA8E61AB5B8E7936D86C84
3,137,625 UART: [art] SIG.R = 178F6D4E6CD8C17291A27A06728C7C32E72D521F809341A7123ABF5EB76134FCE67D7D730D6AF4CC262494FEA68E20BE
3,144,397 UART: [art] SIG.S = 614430B8A58E7AB06540B750F17FE86E46212C3B11B9A3CFEF78663B2D2DB2FDB0B2E32BA9182733D25C3E8076FAC1FC
3,167,802 UART: Caliptra RT
3,168,147 UART: [state] CFI Enabled
3,274,856 UART: [rt] RT listening for mailbox commands...
3,275,526 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,390 UART: [rt]cmd =0x44504543, len=24
3,331,924 >>> mbox cmd response data (40 bytes)
3,331,925 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,528 UART: [rt]cmd =0x44504543, len=24
3,387,518 >>> mbox cmd response data (40 bytes)
3,387,519 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,416,942 UART: [rt]cmd =0x44504543, len=24
3,443,256 >>> mbox cmd response data (40 bytes)
3,443,257 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,818 UART: [rt]cmd =0x44504543, len=24
3,499,640 >>> mbox cmd response data (40 bytes)
3,499,641 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,172 UART: [rt]cmd =0x44504543, len=24
3,555,424 >>> mbox cmd response data (40 bytes)
3,555,425 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,114 UART: [rt]cmd =0x44504543, len=24
3,611,234 >>> mbox cmd response data (40 bytes)
3,611,235 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,694 UART: [rt]cmd =0x44504543, len=24
3,666,958 >>> mbox cmd response data (40 bytes)
3,666,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,286 UART: [rt]cmd =0x44504543, len=24
3,723,068 >>> mbox cmd response data (40 bytes)
3,723,069 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,518 UART: [rt]cmd =0x44504543, len=24
3,778,352 >>> mbox cmd response data (40 bytes)
3,778,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,002 UART: [rt]cmd =0x44504543, len=24
3,834,308 >>> mbox cmd response data (40 bytes)
3,834,309 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,732 UART: [rt]cmd =0x44504543, len=24
3,890,038 >>> mbox cmd response data (40 bytes)
3,890,039 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,282 UART: [rt]cmd =0x44504543, len=24
3,945,716 >>> mbox cmd response data (40 bytes)
3,945,717 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,002 UART: [rt]cmd =0x44504543, len=24
4,000,624 >>> mbox cmd response data (40 bytes)
4,000,625 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,030,050 UART: [rt]cmd =0x44504543, len=24
4,056,168 >>> mbox cmd response data (40 bytes)
4,056,169 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,085,550 UART: [rt]cmd =0x44504543, len=24
4,111,996 >>> mbox cmd response data (40 bytes)
4,111,997 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,141,466 UART: [rt]cmd =0x44504543, len=24
4,148,316 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,235 ready_for_fw is high
1,057,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,853 >>> mbox cmd response: success
2,688,429 UART:
2,688,445 UART: Running Caliptra FMC ...
2,688,853 UART:
2,688,996 UART: [state] CFI Enabled
2,699,511 UART: [fht] FMC Alias Private Key: 7
2,807,768 UART: [art] Extend RT PCRs Done
2,808,196 UART: [art] Lock RT PCRs Done
2,809,866 UART: [art] Populate DV Done
2,818,241 UART: [fht] FMC Alias Private Key: 7
2,819,277 UART: [art] Derive CDI
2,819,557 UART: [art] Store in in slot 0x4
2,905,428 UART: [art] Derive Key Pair
2,905,788 UART: [art] Store priv key in slot 0x5
2,919,066 UART: [art] Derive Key Pair - Done
2,933,778 UART: [art] Signing Cert with AUTHO
2,934,258 UART: RITY.KEYID = 7
2,949,880 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,645 UART: [art] PUB.X = F78DACA5D4CBCCABECDAA66520645F3DEBB8A5298FE21F4070AF8F5872738A44C07E5EE057A71B79E7D55476BFF1A848
2,957,437 UART: [art] PUB.Y = 0E4A0D5587403F7477CA5690EFEA650CB4DC98A5CAF2E10BF9433C789689578542074F902856FD16D5866EFE7C533103
2,964,367 UART: [art] SIG.R = 44B0E21DAEDA4BC3F1E37E27B8E52BCE5482A0DEBCD976908E2B51D26B9C8625F6CA13A8D8FA8ABD06A7C10AF3F48770
2,971,155 UART: [art] SIG.S = 0876A50165BE8A7B79CF91ECA99E2283490CC010D6C7A3E6DAC12C1BABF0B767E164C3FBAD7EAA60C296A68CD93694DA
2,994,821 UART: Caliptra RT
2,995,166 UART: [state] CFI Enabled
3,103,721 UART: [rt] RT listening for mailbox commands...
3,104,391 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,217 UART: [rt]cmd =0x44504543, len=24
3,160,795 >>> mbox cmd response data (40 bytes)
3,160,796 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,373 UART: [rt]cmd =0x44504543, len=24
3,216,959 >>> mbox cmd response data (40 bytes)
3,216,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,246,507 UART: [rt]cmd =0x44504543, len=24
3,273,159 >>> mbox cmd response data (40 bytes)
3,273,160 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,635 UART: [rt]cmd =0x44504543, len=24
3,329,423 >>> mbox cmd response data (40 bytes)
3,329,424 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,139 UART: [rt]cmd =0x44504543, len=24
3,385,359 >>> mbox cmd response data (40 bytes)
3,385,360 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,785 UART: [rt]cmd =0x44504543, len=24
3,440,937 >>> mbox cmd response data (40 bytes)
3,440,938 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,671 UART: [rt]cmd =0x44504543, len=24
3,497,011 >>> mbox cmd response data (40 bytes)
3,497,012 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,613 UART: [rt]cmd =0x44504543, len=24
3,552,871 >>> mbox cmd response data (40 bytes)
3,552,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,251 UART: [rt]cmd =0x44504543, len=24
3,608,473 >>> mbox cmd response data (40 bytes)
3,608,474 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,005 UART: [rt]cmd =0x44504543, len=24
3,664,633 >>> mbox cmd response data (40 bytes)
3,664,634 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,117 UART: [rt]cmd =0x44504543, len=24
3,720,517 >>> mbox cmd response data (40 bytes)
3,720,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,123 UART: [rt]cmd =0x44504543, len=24
3,776,705 >>> mbox cmd response data (40 bytes)
3,776,706 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,287 UART: [rt]cmd =0x44504543, len=24
3,832,431 >>> mbox cmd response data (40 bytes)
3,832,432 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,013 UART: [rt]cmd =0x44504543, len=24
3,888,387 >>> mbox cmd response data (40 bytes)
3,888,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,005 UART: [rt]cmd =0x44504543, len=24
3,944,555 >>> mbox cmd response data (40 bytes)
3,944,556 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,907 UART: [rt]cmd =0x44504543, len=24
3,981,109 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,142 UART:
192,506 UART: Running Caliptra ROM ...
193,699 UART:
193,862 UART: [state] CFI Enabled
263,446 UART: [state] LifecycleState = Unprovisioned
265,352 UART: [state] DebugLocked = No
266,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,111 UART: [kat] SHA2-256
441,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,283 UART: [kat] ++
452,778 UART: [kat] sha1
464,026 UART: [kat] SHA2-256
466,771 UART: [kat] SHA2-384
472,199 UART: [kat] SHA2-512-ACC
474,573 UART: [kat] ECC-384
2,770,380 UART: [kat] HMAC-384Kdf
2,801,532 UART: [kat] LMS
3,991,868 UART: [kat] --
3,996,230 UART: [cold-reset] ++
3,997,173 UART: [fht] Storing FHT @ 0x50003400
4,008,512 UART: [idev] ++
4,009,088 UART: [idev] CDI.KEYID = 6
4,010,051 UART: [idev] SUBJECT.KEYID = 7
4,011,303 UART: [idev] UDS.KEYID = 0
4,012,264 ready_for_fw is high
4,012,458 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,032 UART: [idev] Erasing UDS.KEYID = 0
7,347,056 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,710 UART: [idev] --
7,373,084 UART: [ldev] ++
7,373,656 UART: [ldev] CDI.KEYID = 6
7,374,630 UART: [ldev] SUBJECT.KEYID = 5
7,375,790 UART: [ldev] AUTHORITY.KEYID = 7
7,377,080 UART: [ldev] FE.KEYID = 1
7,422,494 UART: [ldev] Erasing FE.KEYID = 1
10,754,264 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,481 UART: [ldev] --
13,114,719 UART: [fwproc] Waiting for Commands...
13,116,438 UART: [fwproc] Received command 0x46574c44
13,118,643 UART: [fwproc] Received Image of size 114124 bytes
17,171,497 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,847 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,783 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,634,714 >>> mbox cmd response: success
17,639,354 UART: [afmc] ++
17,639,975 UART: [afmc] CDI.KEYID = 6
17,640,869 UART: [afmc] SUBJECT.KEYID = 7
17,642,090 UART: [afmc] AUTHORITY.KEYID = 5
21,006,906 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,749 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,008 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,459 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,252 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,701 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,378 UART: [afmc] --
23,381,745 UART: [cold-reset] --
23,385,295 UART: [state] Locking Datavault
23,390,975 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,730 UART: [state] Locking ICCM
23,393,830 UART: [exit] Launching FMC @ 0x40000130
23,402,239 UART:
23,402,513 UART: Running Caliptra FMC ...
23,403,546 UART:
23,403,695 UART: [state] CFI Enabled
23,466,117 UART: [fht] FMC Alias Private Key: 7
25,804,009 UART: [art] Extend RT PCRs Done
25,805,233 UART: [art] Lock RT PCRs Done
25,806,781 UART: [art] Populate DV Done
25,812,142 UART: [fht] FMC Alias Private Key: 7
25,813,846 UART: [art] Derive CDI
25,814,587 UART: [art] Store in in slot 0x4
25,873,710 UART: [art] Derive Key Pair
25,874,717 UART: [art] Store priv key in slot 0x5
29,166,462 UART: [art] Derive Key Pair - Done
29,179,404 UART: [art] Signing Cert with AUTHO
29,180,714 UART: RITY.KEYID = 7
31,467,285 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,798 UART: [art] PUB.X = 725417D1122C4E5145FB2D65D791B0FE3FA1FCA2E424856E00455D026B59C86A9F209A39A30B5190C4B4E24521D70698
31,475,989 UART: [art] PUB.Y = 473AA55B02AF778185951444F73886B73A766D758EDF1F304ACB93F99A4D8F0C449C4F1B284F09F2B64282E714BB2FCD
31,483,264 UART: [art] SIG.R = 4A9490E8B23E84DD26FCDDC0BCC05C48AA081EACB6A8389052A90CCD8F091A6ED7BED7AD7A2BA20BFB5A4AAA213F2507
31,490,666 UART: [art] SIG.S = 1879663945CC99E84E66A668222BECD9F2F60EBDB8B41A5D0986C5ECB0359337C9767D3315876D3EFB6658BD5F65C4A8
32,795,839 UART: Caliptra RT
32,796,554 UART: [state] CFI Enabled
32,955,720 UART: [rt] RT listening for mailbox commands...
32,958,063 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
32,987,922 UART: [rt]cmd =0x49444550, len=8
32,990,311 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,804,618 ready_for_fw is high
3,804,999 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,874,750 >>> mbox cmd response: success
23,565,976 UART:
23,566,343 UART: Running Caliptra FMC ...
23,567,536 UART:
23,567,702 UART: [state] CFI Enabled
23,636,575 UART: [fht] FMC Alias Private Key: 7
25,973,684 UART: [art] Extend RT PCRs Done
25,974,930 UART: [art] Lock RT PCRs Done
25,976,543 UART: [art] Populate DV Done
25,981,751 UART: [fht] FMC Alias Private Key: 7
25,983,511 UART: [art] Derive CDI
25,984,255 UART: [art] Store in in slot 0x4
26,045,469 UART: [art] Derive Key Pair
26,046,515 UART: [art] Store priv key in slot 0x5
29,338,545 UART: [art] Derive Key Pair - Done
29,351,433 UART: [art] Signing Cert with AUTHO
29,352,738 UART: RITY.KEYID = 7
31,641,305 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,814 UART: [art] PUB.X = 720C4CF3AC6E93C55B181A6FCF72C4A50CD873A4E7AFCEB40B05E23751D50471C50C744DC399E863D0C1BCC9664827AA
31,650,035 UART: [art] PUB.Y = 4FD39A5B71A4D39F273935B5589D15D51A84BAF6834067DA114F9C221176F655A19D8E57C271921A87E04348B8275B74
31,657,302 UART: [art] SIG.R = F1598C3E6F2E2847389ADD74AFED1E2417D8116EC6C0F403A2EFD63493ACF86AD6A8589C7E8E0EE8BAC62A8DF02107E8
31,664,676 UART: [art] SIG.S = 8D04F77572ECFBA0963C556E33490CC9022C4326C188AB5DC1AA11FA40EA7F7EC15E67C00A9FF14E83D642ED87E00F8D
32,969,734 UART: Caliptra RT
32,970,464 UART: [state] CFI Enabled
33,133,844 UART: [rt] RT listening for mailbox commands...
33,136,079 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,165,879 UART: [rt]cmd =0x49444550, len=8
33,168,102 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,254 UART:
192,649 UART: Running Caliptra ROM ...
193,833 UART:
603,413 UART: [state] CFI Enabled
617,802 UART: [state] LifecycleState = Unprovisioned
619,773 UART: [state] DebugLocked = No
621,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,316 UART: [kat] SHA2-256
796,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,558 UART: [kat] ++
806,998 UART: [kat] sha1
818,006 UART: [kat] SHA2-256
820,733 UART: [kat] SHA2-384
825,652 UART: [kat] SHA2-512-ACC
828,026 UART: [kat] ECC-384
3,112,428 UART: [kat] HMAC-384Kdf
3,123,878 UART: [kat] LMS
4,313,953 UART: [kat] --
4,320,394 UART: [cold-reset] ++
4,321,617 UART: [fht] Storing FHT @ 0x50003400
4,334,726 UART: [idev] ++
4,335,366 UART: [idev] CDI.KEYID = 6
4,336,241 UART: [idev] SUBJECT.KEYID = 7
4,337,545 UART: [idev] UDS.KEYID = 0
4,338,495 ready_for_fw is high
4,338,684 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,018 UART: [idev] Erasing UDS.KEYID = 0
7,625,042 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,846 UART: [idev] --
7,650,968 UART: [ldev] ++
7,651,559 UART: [ldev] CDI.KEYID = 6
7,652,450 UART: [ldev] SUBJECT.KEYID = 5
7,653,708 UART: [ldev] AUTHORITY.KEYID = 7
7,654,856 UART: [ldev] FE.KEYID = 1
7,666,730 UART: [ldev] Erasing FE.KEYID = 1
10,957,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,330 UART: [ldev] --
13,314,835 UART: [fwproc] Waiting for Commands...
13,316,654 UART: [fwproc] Received command 0x46574c44
13,318,836 UART: [fwproc] Received Image of size 114124 bytes
17,372,823 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,627 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,838,237 >>> mbox cmd response: success
17,843,049 UART: [afmc] ++
17,843,657 UART: [afmc] CDI.KEYID = 6
17,844,560 UART: [afmc] SUBJECT.KEYID = 7
17,845,776 UART: [afmc] AUTHORITY.KEYID = 5
21,159,080 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,435 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,695 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,111 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,937 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,416 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,490 UART: [afmc] --
23,524,973 UART: [cold-reset] --
23,530,286 UART: [state] Locking Datavault
23,538,280 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,053 UART: [state] Locking ICCM
23,541,118 UART: [exit] Launching FMC @ 0x40000130
23,549,460 UART:
23,549,692 UART: Running Caliptra FMC ...
23,550,791 UART:
23,550,946 UART: [state] CFI Enabled
23,558,980 UART: [fht] FMC Alias Private Key: 7
25,890,262 UART: [art] Extend RT PCRs Done
25,891,481 UART: [art] Lock RT PCRs Done
25,893,458 UART: [art] Populate DV Done
25,898,592 UART: [fht] FMC Alias Private Key: 7
25,900,236 UART: [art] Derive CDI
25,901,041 UART: [art] Store in in slot 0x4
25,943,847 UART: [art] Derive Key Pair
25,944,843 UART: [art] Store priv key in slot 0x5
29,187,406 UART: [art] Derive Key Pair - Done
29,200,419 UART: [art] Signing Cert with AUTHO
29,201,714 UART: RITY.KEYID = 7
31,480,875 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,382 UART: [art] PUB.X = 025FE4E8AC68F71A6FD1D6A692E45DBBA1525A07CF4818D080527E9C1759F8114125E0AF32F34DF31B668067132B9D95
31,489,627 UART: [art] PUB.Y = C1D81C1E47171EA37B206A99D757FB3027B75EAE73449C02658F8CA5D6DBB7FA4443B2CDFC769D2FC79B36391FBBC1AA
31,496,911 UART: [art] SIG.R = 03AEA23D4AB0E89CCA9D9E1D0266EB87E0760735DDA23EB5CA781B5C9C92BBBE623D165A5DEAA87163B2418003481ADC
31,504,286 UART: [art] SIG.S = FBC3458F99058FC549425A92FE634181FCC44C4B3580FC3EFE1884F0C627B23348AB722A647BE5C2BBAC291A5E1E198B
32,809,273 UART: Caliptra RT
32,809,967 UART: [state] CFI Enabled
32,927,415 UART: [rt] RT listening for mailbox commands...
32,929,814 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
32,959,773 UART: [rt]cmd =0x49444550, len=8
32,962,159 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,129,984 ready_for_fw is high
4,130,406 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,080,979 >>> mbox cmd response: success
23,717,572 UART:
23,717,977 UART: Running Caliptra FMC ...
23,719,084 UART:
23,719,235 UART: [state] CFI Enabled
23,727,136 UART: [fht] FMC Alias Private Key: 7
26,058,158 UART: [art] Extend RT PCRs Done
26,059,383 UART: [art] Lock RT PCRs Done
26,061,109 UART: [art] Populate DV Done
26,066,374 UART: [fht] FMC Alias Private Key: 7
26,067,973 UART: [art] Derive CDI
26,068,787 UART: [art] Store in in slot 0x4
26,111,396 UART: [art] Derive Key Pair
26,112,441 UART: [art] Store priv key in slot 0x5
29,354,530 UART: [art] Derive Key Pair - Done
29,367,589 UART: [art] Signing Cert with AUTHO
29,368,888 UART: RITY.KEYID = 7
31,648,036 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,541 UART: [art] PUB.X = CC67E96BF9C3E5AA16001CF4FDDCA48D5AC311ABBC7DEEE8A3F0A2B454D46763581D1FBFC8D847878E3D372A8080CE31
31,656,843 UART: [art] PUB.Y = 20BD561E3140F1953758EDB9C227B15AC692792450963D5465DD7F7533AEED5EC0BAABB2B3F5DF20A1162F19863B9D40
31,664,060 UART: [art] SIG.R = 838705A2C6799179AB6F51C47FCF00F5BADB91CEC52D67D56CFF1307647C6A1081B9079C9BFB4A1B4C63E9DBE21A4D0D
31,671,446 UART: [art] SIG.S = 7BED548E81608AE98BFD99050902EED68199E64060FFCB134691DEB131C13492E36D11C73FD26C99ECF1784CB8AEA3A9
32,977,052 UART: Caliptra RT
32,977,906 UART: [state] CFI Enabled
33,095,163 UART: [rt] RT listening for mailbox commands...
33,097,563 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,127,585 UART: [rt]cmd =0x49444550, len=8
33,129,702 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,128 UART:
192,500 UART: Running Caliptra ROM ...
193,688 UART:
193,840 UART: [state] CFI Enabled
264,646 UART: [state] LifecycleState = Unprovisioned
266,549 UART: [state] DebugLocked = No
268,646 UART: [state] WD Timer not started. Device not locked for debugging
272,391 UART: [kat] SHA2-256
451,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,089 UART: [kat] ++
463,624 UART: [kat] sha1
474,079 UART: [kat] SHA2-256
477,082 UART: [kat] SHA2-384
483,856 UART: [kat] SHA2-512-ACC
486,788 UART: [kat] ECC-384
2,948,777 UART: [kat] HMAC-384Kdf
2,971,743 UART: [kat] LMS
3,501,234 UART: [kat] --
3,505,802 UART: [cold-reset] ++
3,507,231 UART: [fht] FHT @ 0x50003400
3,518,918 UART: [idev] ++
3,519,487 UART: [idev] CDI.KEYID = 6
3,520,417 UART: [idev] SUBJECT.KEYID = 7
3,521,590 UART: [idev] UDS.KEYID = 0
3,522,517 ready_for_fw is high
3,522,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,164 UART: [idev] Erasing UDS.KEYID = 0
6,026,485 UART: [idev] Sha1 KeyId Algorithm
6,049,544 UART: [idev] --
6,053,377 UART: [ldev] ++
6,053,981 UART: [ldev] CDI.KEYID = 6
6,054,902 UART: [ldev] SUBJECT.KEYID = 5
6,056,089 UART: [ldev] AUTHORITY.KEYID = 7
6,057,273 UART: [ldev] FE.KEYID = 1
6,100,654 UART: [ldev] Erasing FE.KEYID = 1
8,604,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,000 UART: [ldev] --
10,412,299 UART: [fwproc] Wait for Commands...
10,414,016 UART: [fwproc] Recv command 0x46574c44
10,416,113 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,278,960 >>> mbox cmd response: success
14,283,682 UART: [afmc] ++
14,284,290 UART: [afmc] CDI.KEYID = 6
14,285,205 UART: [afmc] SUBJECT.KEYID = 7
14,286,369 UART: [afmc] AUTHORITY.KEYID = 5
16,832,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,250 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,084 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,916 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,388 UART: [afmc] --
18,627,476 UART: [cold-reset] --
18,630,745 UART: [state] Locking Datavault
18,635,070 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,768 UART: [state] Locking ICCM
18,637,782 UART: [exit] Launching FMC @ 0x40000130
18,646,197 UART:
18,646,437 UART: Running Caliptra FMC ...
18,647,535 UART:
18,647,695 UART: [state] CFI Enabled
18,709,687 UART: [fht] FMC Alias Private Key: 7
20,473,608 UART: [art] Extend RT PCRs Done
20,474,840 UART: [art] Lock RT PCRs Done
20,476,921 UART: [art] Populate DV Done
20,482,334 UART: [fht] FMC Alias Private Key: 7
20,484,039 UART: [art] Derive CDI
20,484,857 UART: [art] Store in in slot 0x4
20,545,369 UART: [art] Derive Key Pair
20,546,412 UART: [art] Store priv key in slot 0x5
23,009,571 UART: [art] Derive Key Pair - Done
23,022,904 UART: [art] Signing Cert with AUTHO
23,024,212 UART: RITY.KEYID = 7
24,735,073 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,577 UART: [art] PUB.X = B7D94F2AC965A56A8489F931F6AC884D7338D00702FE66446BDA0A25632A0FDE63B73FDD5654F39335CA234241946239
24,743,848 UART: [art] PUB.Y = 803E878E28FC942817391587443341002D1397766BA721A02B4115F9957A3AE557E17ECEA34C1677F177316C03BA2D62
24,751,089 UART: [art] SIG.R = 5035722DB10CE3CFDE75AD7E4CE2615AE0AE815ACA49CA6D9FE514CF4433F5B4CFF97E124A207E35CD502232721AFB7C
24,758,487 UART: [art] SIG.S = 121C275DCAEA422D1D93E2E328A4D89BBED86CEF0105976B825E0BDD521CEE85FC5EE09FC0FFA3C3CA2D3DCBF98ABA6A
25,736,829 UART: Caliptra RT
25,737,529 UART: [state] CFI Enabled
25,901,725 UART: [rt] RT listening for mailbox commands...
25,904,075 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,934,536 UART: [rt]cmd =0x49444550, len=8
25,936,998 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,362,540 ready_for_fw is high
3,363,070 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,065,295 >>> mbox cmd response: success
18,341,776 UART:
18,342,179 UART: Running Caliptra FMC ...
18,343,317 UART:
18,343,476 UART: [state] CFI Enabled
18,410,169 UART: [fht] FMC Alias Private Key: 7
20,174,232 UART: [art] Extend RT PCRs Done
20,175,453 UART: [art] Lock RT PCRs Done
20,177,191 UART: [art] Populate DV Done
20,182,550 UART: [fht] FMC Alias Private Key: 7
20,184,099 UART: [art] Derive CDI
20,184,917 UART: [art] Store in in slot 0x4
20,243,105 UART: [art] Derive Key Pair
20,244,150 UART: [art] Store priv key in slot 0x5
22,707,398 UART: [art] Derive Key Pair - Done
22,720,663 UART: [art] Signing Cert with AUTHO
22,722,017 UART: RITY.KEYID = 7
24,432,907 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,412 UART: [art] PUB.X = EF4DF29CE4174533411CA552A9E42FFF838C68E00B16E93646EB861AE6390F64C223F7B61B57539C5454A865F7E647D8
24,441,668 UART: [art] PUB.Y = 8EFEA7AE33E632943DD01A2FE56A602624434AF7AE7F75109EBF2FDA8A7F340E968847531640F2E178E7A681AEB0E0DB
24,448,927 UART: [art] SIG.R = 572EF3FEE1841368836976BEF35F47432ADB7E767084EFC90447AB09B9331135C310A30ABEB8B7FCD0A1323961E0770D
24,456,315 UART: [art] SIG.S = E78C6DF54B0AB762A0EEB035763216146C9838C501539DF6B40C8422D26BB9A27F7D61CCD8AEDD45D817A2F016AC6515
25,434,289 UART: Caliptra RT
25,434,991 UART: [state] CFI Enabled
25,601,470 UART: [rt] RT listening for mailbox commands...
25,603,821 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,633,838 UART: [rt]cmd =0x49444550, len=8
25,636,091 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,502 UART:
192,872 UART: Running Caliptra ROM ...
193,977 UART:
603,707 UART: [state] CFI Enabled
617,582 UART: [state] LifecycleState = Unprovisioned
619,398 UART: [state] DebugLocked = No
621,630 UART: [state] WD Timer not started. Device not locked for debugging
625,158 UART: [kat] SHA2-256
804,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,848 UART: [kat] ++
816,373 UART: [kat] sha1
827,258 UART: [kat] SHA2-256
830,319 UART: [kat] SHA2-384
837,004 UART: [kat] SHA2-512-ACC
839,967 UART: [kat] ECC-384
3,281,372 UART: [kat] HMAC-384Kdf
3,293,880 UART: [kat] LMS
3,823,409 UART: [kat] --
3,828,481 UART: [cold-reset] ++
3,830,478 UART: [fht] FHT @ 0x50003400
3,840,672 UART: [idev] ++
3,841,247 UART: [idev] CDI.KEYID = 6
3,842,124 UART: [idev] SUBJECT.KEYID = 7
3,843,356 UART: [idev] UDS.KEYID = 0
3,844,316 ready_for_fw is high
3,844,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,229 UART: [idev] Erasing UDS.KEYID = 0
6,312,187 UART: [idev] Sha1 KeyId Algorithm
6,334,654 UART: [idev] --
6,338,853 UART: [ldev] ++
6,339,408 UART: [ldev] CDI.KEYID = 6
6,340,280 UART: [ldev] SUBJECT.KEYID = 5
6,341,428 UART: [ldev] AUTHORITY.KEYID = 7
6,342,756 UART: [ldev] FE.KEYID = 1
6,353,206 UART: [ldev] Erasing FE.KEYID = 1
8,832,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,531 UART: [ldev] --
10,622,476 UART: [fwproc] Wait for Commands...
10,624,774 UART: [fwproc] Recv command 0x46574c44
10,626,855 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,109 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,498,689 >>> mbox cmd response: success
14,502,792 UART: [afmc] ++
14,503,376 UART: [afmc] CDI.KEYID = 6
14,504,250 UART: [afmc] SUBJECT.KEYID = 7
14,505,462 UART: [afmc] AUTHORITY.KEYID = 5
17,007,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,545 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,291 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,291 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,198 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,803,027 UART: [afmc] --
18,806,127 UART: [cold-reset] --
18,809,006 UART: [state] Locking Datavault
18,813,977 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,616 UART: [state] Locking ICCM
18,817,216 UART: [exit] Launching FMC @ 0x40000130
18,825,604 UART:
18,825,840 UART: Running Caliptra FMC ...
18,826,932 UART:
18,827,084 UART: [state] CFI Enabled
18,835,447 UART: [fht] FMC Alias Private Key: 7
20,591,971 UART: [art] Extend RT PCRs Done
20,593,192 UART: [art] Lock RT PCRs Done
20,594,782 UART: [art] Populate DV Done
20,600,347 UART: [fht] FMC Alias Private Key: 7
20,601,815 UART: [art] Derive CDI
20,602,549 UART: [art] Store in in slot 0x4
20,645,240 UART: [art] Derive Key Pair
20,646,230 UART: [art] Store priv key in slot 0x5
23,073,494 UART: [art] Derive Key Pair - Done
23,086,321 UART: [art] Signing Cert with AUTHO
23,087,657 UART: RITY.KEYID = 7
24,793,193 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,690 UART: [art] PUB.X = B429300A4604E721C960580B85260EA99916CFA503AA4E4C6A0218BFCFAF6C74840F029C2F06DDD4ABCB9F531FE00BD5
24,801,975 UART: [art] PUB.Y = 527659C1B6179CF38E5B79B0215783A806112038B66D2955C8CEDE119E1309A91DDF0E74489B6174919B7258729DA839
24,809,235 UART: [art] SIG.R = 15DB8AFA749AAB4F1E7A74BAF82BDDB26FF4612EB74687F9A2203C56803634E5AF9FE51A5B231AB18724D52972FDC868
24,816,607 UART: [art] SIG.S = 1209B72A58A28473AFD1CEB5F0D816730171D960BE6A08191015DEE9E4DE3BF923AD44449658CC952DC22EBB54B897FE
25,795,644 UART: Caliptra RT
25,796,346 UART: [state] CFI Enabled
25,913,036 UART: [rt] RT listening for mailbox commands...
25,915,129 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,945,029 UART: [rt]cmd =0x49444550, len=8
25,947,524 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
3,692,696 ready_for_fw is high
3,693,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,260,899 >>> mbox cmd response: success
18,513,177 UART:
18,513,569 UART: Running Caliptra FMC ...
18,514,710 UART:
18,514,864 UART: [state] CFI Enabled
18,522,786 UART: [fht] FMC Alias Private Key: 7
20,280,008 UART: [art] Extend RT PCRs Done
20,281,232 UART: [art] Lock RT PCRs Done
20,282,905 UART: [art] Populate DV Done
20,288,551 UART: [fht] FMC Alias Private Key: 7
20,290,203 UART: [art] Derive CDI
20,291,010 UART: [art] Store in in slot 0x4
20,333,503 UART: [art] Derive Key Pair
20,334,540 UART: [art] Store priv key in slot 0x5
22,761,362 UART: [art] Derive Key Pair - Done
22,774,252 UART: [art] Signing Cert with AUTHO
22,775,546 UART: RITY.KEYID = 7
24,480,948 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,441 UART: [art] PUB.X = 7158B2FC639F0FF000BB096545563B77DF7EA250DA66FB64E71B6102FDDA1D53C26C0256FE7BAC9E836EB78C4D74AA30
24,489,723 UART: [art] PUB.Y = 4F7D8690DE5188BE685CDF696B0FD2160C269B4756D7E8C3DFA0647D464872134DFCA1DEFF35C940AA21604CE5D7FA39
24,497,012 UART: [art] SIG.R = D11E40ACA8A657F6469406967D48933EE862FF1C34DEC2A8F1B7FFF47420EE332DF7C6770C61952CAFF30DDD162AD6E0
24,504,370 UART: [art] SIG.S = B27314567485E370D583D56375CCC81B18A4FAE4B821A819DEAD2F5BEB5E87CF5AA4AC20A5E3776B49CE7BC8313ABBF1
25,482,845 UART: Caliptra RT
25,483,557 UART: [state] CFI Enabled
25,601,882 UART: [rt] RT listening for mailbox commands...
25,604,235 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,633,883 UART: [rt]cmd =0x49444550, len=8
25,636,321 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,418,704 ready_for_fw is high
3,419,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,739,476 >>> mbox cmd response: success
19,027,549 UART:
19,027,940 UART: Running Caliptra FMC ...
19,029,048 UART:
19,029,207 UART: [state] CFI Enabled
19,098,570 UART: [fht] FMC Alias Private Key: 7
20,861,589 UART: [art] Extend RT PCRs Done
20,862,807 UART: [art] Lock RT PCRs Done
20,864,407 UART: [art] Populate DV Done
20,869,829 UART: [fht] FMC Alias Private Key: 7
20,871,484 UART: [art] Derive CDI
20,872,299 UART: [art] Store in in slot 0x4
20,931,437 UART: [art] Derive Key Pair
20,932,474 UART: [art] Store priv key in slot 0x5
23,396,037 UART: [art] Derive Key Pair - Done
23,408,832 UART: [art] Signing Cert with AUTHO
23,410,151 UART: RITY.KEYID = 7
25,121,597 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,106 UART: [art] PUB.X = 94D37388AA03DC1E4E2C6DA0985A7B0B71BD0223D747E9E0E1693427AF541A39A478F0982FD46CFFD07B69E18C9F7269
25,130,408 UART: [art] PUB.Y = 8C5228E416C71AF26CC7569575488736FCC6F7FA14CAA2C95F9F71CEC05578A696047CBCF2E5FD3ECE15D98DDAEB7AE4
25,137,658 UART: [art] SIG.R = 6AD0D29F4894C5645118E80ACC46B8BB2020BE7E61E135E4CB713B2C691EE57FA3B5818C97C4251986C3B33746503B21
25,145,088 UART: [art] SIG.S = D79891A4D30A63601211F415EA250F20F4D21B7F869754E4F32C115F6C17ED97F66151B34FB4F534A9C40E66ED69E4ED
26,123,367 UART: Caliptra RT
26,124,052 UART: [state] CFI Enabled
26,291,486 UART: [rt] RT listening for mailbox commands...
26,293,828 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,324,338 UART: [rt]cmd =0x49444550, len=8
26,326,685 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
3,751,321 ready_for_fw is high
3,751,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,671 >>> mbox cmd response: success
19,209,156 UART:
19,209,539 UART: Running Caliptra FMC ...
19,210,733 UART:
19,210,897 UART: [state] CFI Enabled
19,218,793 UART: [fht] FMC Alias Private Key: 7
20,975,269 UART: [art] Extend RT PCRs Done
20,976,492 UART: [art] Lock RT PCRs Done
20,977,959 UART: [art] Populate DV Done
20,983,525 UART: [fht] FMC Alias Private Key: 7
20,985,235 UART: [art] Derive CDI
20,985,967 UART: [art] Store in in slot 0x4
21,028,335 UART: [art] Derive Key Pair
21,029,332 UART: [art] Store priv key in slot 0x5
23,455,866 UART: [art] Derive Key Pair - Done
23,468,699 UART: [art] Signing Cert with AUTHO
23,470,015 UART: RITY.KEYID = 7
25,175,601 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,101 UART: [art] PUB.X = F210056163C52384CD8121109C1C7FFE1B79429E9B1B579D7C5A2FA8090CDF751943ED016BC119362D81F8CEED5555E7
25,184,310 UART: [art] PUB.Y = E6A8B843727CECFF06CF64F4B555249E127C2C9C4D004ED6B1592FA84CB6228B64E0C342B7847D9C0FDFA72E0475FE88
25,191,719 UART: [art] SIG.R = FF1B2F42E96D4B9194EC9B8CF0461CCC50E45E762DEFAC293B08DFA331A7678C1C669D5FD02EE2AD2151D706797DDC73
25,199,009 UART: [art] SIG.S = ED102C9CA8FF08DBB147C758358FBABEE95A662D0F8CDF5B1038588336FCDCA820560D7434BA32359FBD3E62218511A3
26,177,753 UART: Caliptra RT
26,178,457 UART: [state] CFI Enabled
26,294,760 UART: [rt] RT listening for mailbox commands...
26,297,151 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,327,028 UART: [rt]cmd =0x49444550, len=8
26,329,282 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,285 UART: [kat] SHA2-256
882,216 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,331 UART: [kat] ++
886,483 UART: [kat] sha1
890,723 UART: [kat] SHA2-256
892,661 UART: [kat] SHA2-384
895,388 UART: [kat] SHA2-512-ACC
897,289 UART: [kat] ECC-384
902,906 UART: [kat] HMAC-384Kdf
907,484 UART: [kat] LMS
1,475,680 UART: [kat] --
1,476,465 UART: [cold-reset] ++
1,476,973 UART: [fht] Storing FHT @ 0x50003400
1,479,602 UART: [idev] ++
1,479,770 UART: [idev] CDI.KEYID = 6
1,480,130 UART: [idev] SUBJECT.KEYID = 7
1,480,554 UART: [idev] UDS.KEYID = 0
1,480,899 ready_for_fw is high
1,480,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,252 UART: [idev] Erasing UDS.KEYID = 0
1,504,790 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,272 UART: [idev] --
1,514,527 UART: [ldev] ++
1,514,695 UART: [ldev] CDI.KEYID = 6
1,515,058 UART: [ldev] SUBJECT.KEYID = 5
1,515,484 UART: [ldev] AUTHORITY.KEYID = 7
1,515,947 UART: [ldev] FE.KEYID = 1
1,521,025 UART: [ldev] Erasing FE.KEYID = 1
1,546,418 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,724 UART: [ldev] --
1,584,995 UART: [fwproc] Waiting for Commands...
1,585,664 UART: [fwproc] Received command 0x46574c44
1,586,455 UART: [fwproc] Received Image of size 114448 bytes
2,885,782 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,482 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,834 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,859 >>> mbox cmd response: success
3,080,121 UART: [afmc] ++
3,080,289 UART: [afmc] CDI.KEYID = 6
3,080,651 UART: [afmc] SUBJECT.KEYID = 7
3,081,076 UART: [afmc] AUTHORITY.KEYID = 5
3,115,803 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,115 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,895 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,623 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,508 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,198 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,105 UART: [afmc] --
3,159,125 UART: [cold-reset] --
3,159,983 UART: [state] Locking Datavault
3,161,180 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,784 UART: [state] Locking ICCM
3,162,380 UART: [exit] Launching FMC @ 0x40000130
3,167,709 UART:
3,167,725 UART: Running Caliptra FMC ...
3,168,133 UART:
3,168,187 UART: [state] CFI Enabled
3,178,290 UART: [fht] FMC Alias Private Key: 7
3,286,295 UART: [art] Extend RT PCRs Done
3,286,723 UART: [art] Lock RT PCRs Done
3,288,045 UART: [art] Populate DV Done
3,296,074 UART: [fht] FMC Alias Private Key: 7
3,297,024 UART: [art] Derive CDI
3,297,304 UART: [art] Store in in slot 0x4
3,382,953 UART: [art] Derive Key Pair
3,383,313 UART: [art] Store priv key in slot 0x5
3,396,741 UART: [art] Derive Key Pair - Done
3,411,365 UART: [art] Signing Cert with AUTHO
3,411,845 UART: RITY.KEYID = 7
3,427,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,816 UART: [art] PUB.X = 2FCA93AB62590F4A21B65165B303B976EA09198E9C0BBB9487C9C333E5D58F3058493E16DB3121492AAF6CA5D2CCB978
3,434,580 UART: [art] PUB.Y = EAB65D8291F37AE62DDDAAD6FE2298D0B48006F24DBBC599E928DE3C01356ED5D5FF1A9858ED4617E9E2D6726460A222
3,441,538 UART: [art] SIG.R = F6A265AC3CDA40523E969D50AEFAD690E88CA8C122E7417448AA4873AE8B0A73F88AA041A60E89BEF75D25B6C43A75A6
3,448,316 UART: [art] SIG.S = B9BCCE0727BE08D3D7EA2F80CF05B02F9708150EEBD9892488A3A66DE7672F40229E97719FC68A1038A380F2EFA90842
3,471,913 UART: Caliptra RT
3,472,166 UART: [state] CFI Enabled
3,580,476 UART: [rt] RT listening for mailbox commands...
3,581,146 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,892 UART: [rt]cmd =0x49444550, len=8
3,612,784 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,685 ready_for_fw is high
1,362,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,575 >>> mbox cmd response: success
2,991,521 UART:
2,991,537 UART: Running Caliptra FMC ...
2,991,945 UART:
2,991,999 UART: [state] CFI Enabled
3,002,572 UART: [fht] FMC Alias Private Key: 7
3,110,165 UART: [art] Extend RT PCRs Done
3,110,593 UART: [art] Lock RT PCRs Done
3,111,819 UART: [art] Populate DV Done
3,119,926 UART: [fht] FMC Alias Private Key: 7
3,121,062 UART: [art] Derive CDI
3,121,342 UART: [art] Store in in slot 0x4
3,206,991 UART: [art] Derive Key Pair
3,207,351 UART: [art] Store priv key in slot 0x5
3,221,075 UART: [art] Derive Key Pair - Done
3,235,819 UART: [art] Signing Cert with AUTHO
3,236,299 UART: RITY.KEYID = 7
3,251,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,768 UART: [art] PUB.X = BC405D63F561010462501213200ACF65C49D76D7D4E02A2EDE6DAE92693936CC48AB9139BA0A12B3AF48E9B6A1077FEF
3,258,531 UART: [art] PUB.Y = 03DBA90C5DAA5635CCC1F03775F26B1D6E7A434A31E8A8D95465566031C80F9DEFD1B96ADE63C67BA34DD506059A0DCE
3,265,479 UART: [art] SIG.R = C8EDDC386F52D31A6106707FB700AE3A554598035C6DD3794B48ED5BC8FB63A3A031ED5F26E8CB5E006DDE571C0A9747
3,272,208 UART: [art] SIG.S = E6B7CCF00B3B46B8E680583213AA9902CF1EE4430DFDC92E0D01F57B3F124F9454B2E5E996BE84606D05BD470F5B1D8C
3,295,394 UART: Caliptra RT
3,295,647 UART: [state] CFI Enabled
3,404,097 UART: [rt] RT listening for mailbox commands...
3,404,767 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,463 UART: [rt]cmd =0x49444550, len=8
3,436,367 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,542 UART: [kat] SHA2-256
882,473 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,588 UART: [kat] ++
886,740 UART: [kat] sha1
890,984 UART: [kat] SHA2-256
892,922 UART: [kat] SHA2-384
895,679 UART: [kat] SHA2-512-ACC
897,580 UART: [kat] ECC-384
903,275 UART: [kat] HMAC-384Kdf
908,039 UART: [kat] LMS
1,476,235 UART: [kat] --
1,477,140 UART: [cold-reset] ++
1,477,662 UART: [fht] Storing FHT @ 0x50003400
1,480,577 UART: [idev] ++
1,480,745 UART: [idev] CDI.KEYID = 6
1,481,105 UART: [idev] SUBJECT.KEYID = 7
1,481,529 UART: [idev] UDS.KEYID = 0
1,481,874 ready_for_fw is high
1,481,874 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,371 UART: [idev] Erasing UDS.KEYID = 0
1,506,019 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,595 UART: [idev] --
1,515,570 UART: [ldev] ++
1,515,738 UART: [ldev] CDI.KEYID = 6
1,516,101 UART: [ldev] SUBJECT.KEYID = 5
1,516,527 UART: [ldev] AUTHORITY.KEYID = 7
1,516,990 UART: [ldev] FE.KEYID = 1
1,521,936 UART: [ldev] Erasing FE.KEYID = 1
1,547,045 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,361 UART: [ldev] --
1,586,640 UART: [fwproc] Waiting for Commands...
1,587,277 UART: [fwproc] Received command 0x46574c44
1,588,068 UART: [fwproc] Received Image of size 114448 bytes
2,886,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,013 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,365 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,444 >>> mbox cmd response: success
3,079,464 UART: [afmc] ++
3,079,632 UART: [afmc] CDI.KEYID = 6
3,079,994 UART: [afmc] SUBJECT.KEYID = 7
3,080,419 UART: [afmc] AUTHORITY.KEYID = 5
3,115,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,728 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,236 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,121 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,811 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,678 UART: [afmc] --
3,158,556 UART: [cold-reset] --
3,159,528 UART: [state] Locking Datavault
3,160,571 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,175 UART: [state] Locking ICCM
3,161,789 UART: [exit] Launching FMC @ 0x40000130
3,167,118 UART:
3,167,134 UART: Running Caliptra FMC ...
3,167,542 UART:
3,167,685 UART: [state] CFI Enabled
3,178,298 UART: [fht] FMC Alias Private Key: 7
3,286,775 UART: [art] Extend RT PCRs Done
3,287,203 UART: [art] Lock RT PCRs Done
3,288,799 UART: [art] Populate DV Done
3,297,148 UART: [fht] FMC Alias Private Key: 7
3,298,248 UART: [art] Derive CDI
3,298,528 UART: [art] Store in in slot 0x4
3,384,313 UART: [art] Derive Key Pair
3,384,673 UART: [art] Store priv key in slot 0x5
3,397,987 UART: [art] Derive Key Pair - Done
3,412,676 UART: [art] Signing Cert with AUTHO
3,413,156 UART: RITY.KEYID = 7
3,428,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,059 UART: [art] PUB.X = D23F2D10D511718BBCEB6F03ECB6D8302B79EDCE5B9B3EEC87A2CF74911F8F3E69C0E1D251F56DAC860721551D11D224
3,435,839 UART: [art] PUB.Y = B52BBB872E060EAECDE7225BEA0FBA2D99DD5DA6505803FB175D61A9FB47CFF361E3E4C5A7C2F933F58B6F62732CD4A0
3,442,801 UART: [art] SIG.R = CE2871D1C33B7FA1D9091E2AF559D5AEDA4AA30EA19BAF54076E66EE395454046154E64BC8ECE7EDA429307B84EE662A
3,449,575 UART: [art] SIG.S = FDC19C12DDB26409FB75B2F1C6FC6E106BA11E4B819CA2C18FF2D7DDB68858B05C6B9FEF7CD2BCA5B86C0F6D0849F697
3,473,329 UART: Caliptra RT
3,473,674 UART: [state] CFI Enabled
3,581,440 UART: [rt] RT listening for mailbox commands...
3,582,110 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,956 UART: [rt]cmd =0x49444550, len=8
3,613,782 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,436 ready_for_fw is high
1,362,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,622 >>> mbox cmd response: success
2,990,132 UART:
2,990,148 UART: Running Caliptra FMC ...
2,990,556 UART:
2,990,699 UART: [state] CFI Enabled
3,001,078 UART: [fht] FMC Alias Private Key: 7
3,108,575 UART: [art] Extend RT PCRs Done
3,109,003 UART: [art] Lock RT PCRs Done
3,110,597 UART: [art] Populate DV Done
3,119,014 UART: [fht] FMC Alias Private Key: 7
3,120,048 UART: [art] Derive CDI
3,120,328 UART: [art] Store in in slot 0x4
3,205,821 UART: [art] Derive Key Pair
3,206,181 UART: [art] Store priv key in slot 0x5
3,219,047 UART: [art] Derive Key Pair - Done
3,234,060 UART: [art] Signing Cert with AUTHO
3,234,540 UART: RITY.KEYID = 7
3,249,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,967 UART: [art] PUB.X = E1D62F1693EB2A72BD04C76F1566ED81D5D566990C2CC807B26BE687DE0C5FBFA14C6ECE553CD27302209E4E66EA041D
3,256,733 UART: [art] PUB.Y = 9489D80EE306241EA4E39D2818941841AFEA6A76400F603E5AFAE5012F9C7AC9C8BCDBF244264E49BBA3258DDFA4D32A
3,263,685 UART: [art] SIG.R = 8D5A2B64717E6547DA949F30C060942DC4EE89F8DAB045C31D3A3882E83CCFE99A177F846393941C7DF22DBF00AD7C7B
3,270,443 UART: [art] SIG.S = BFBBE88E9BC65181232359C5FCACAA0E81E399EB6A4E023C68367BB3B832E003296748608DB37227DD0BC2E465D28532
3,293,936 UART: Caliptra RT
3,294,281 UART: [state] CFI Enabled
3,402,473 UART: [rt] RT listening for mailbox commands...
3,403,143 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,981 UART: [rt]cmd =0x49444550, len=8
3,434,983 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,845 UART: [kat] SHA2-256
903,785 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
918,138 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,171,961 UART: [cold-reset] ++
1,172,305 UART: [fht] FHT @ 0x50003400
1,174,800 UART: [idev] ++
1,174,968 UART: [idev] CDI.KEYID = 6
1,175,328 UART: [idev] SUBJECT.KEYID = 7
1,175,752 UART: [idev] UDS.KEYID = 0
1,176,097 ready_for_fw is high
1,176,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,284 UART: [idev] Erasing UDS.KEYID = 0
1,201,343 UART: [idev] Sha1 KeyId Algorithm
1,209,763 UART: [idev] --
1,210,935 UART: [ldev] ++
1,211,103 UART: [ldev] CDI.KEYID = 6
1,211,466 UART: [ldev] SUBJECT.KEYID = 5
1,211,892 UART: [ldev] AUTHORITY.KEYID = 7
1,212,355 UART: [ldev] FE.KEYID = 1
1,217,387 UART: [ldev] Erasing FE.KEYID = 1
1,243,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,547 UART: [ldev] --
1,282,950 UART: [fwproc] Wait for Commands...
1,283,536 UART: [fwproc] Recv command 0x46574c44
1,284,264 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,355 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,659 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,642 >>> mbox cmd response: success
2,776,756 UART: [afmc] ++
2,776,924 UART: [afmc] CDI.KEYID = 6
2,777,286 UART: [afmc] SUBJECT.KEYID = 7
2,777,711 UART: [afmc] AUTHORITY.KEYID = 5
2,813,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,425 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,038 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,485 UART: [afmc] --
2,856,421 UART: [cold-reset] --
2,857,421 UART: [state] Locking Datavault
2,858,740 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,344 UART: [state] Locking ICCM
2,859,784 UART: [exit] Launching FMC @ 0x40000130
2,865,113 UART:
2,865,129 UART: Running Caliptra FMC ...
2,865,537 UART:
2,865,591 UART: [state] CFI Enabled
2,876,140 UART: [fht] FMC Alias Private Key: 7
2,984,543 UART: [art] Extend RT PCRs Done
2,984,971 UART: [art] Lock RT PCRs Done
2,986,341 UART: [art] Populate DV Done
2,994,552 UART: [fht] FMC Alias Private Key: 7
2,995,612 UART: [art] Derive CDI
2,995,892 UART: [art] Store in in slot 0x4
3,081,471 UART: [art] Derive Key Pair
3,081,831 UART: [art] Store priv key in slot 0x5
3,094,649 UART: [art] Derive Key Pair - Done
3,109,348 UART: [art] Signing Cert with AUTHO
3,109,828 UART: RITY.KEYID = 7
3,124,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,669 UART: [art] PUB.X = E9B0C7D5EADEDA59903EDF3AF9C6F0BE247CEDCD9C92EED39DDA79E081682B90510230B7284C6D438514C795BAD8F5E1
3,132,458 UART: [art] PUB.Y = 69EF78F8B9EA323160D900E96054566350D7311396E991D8227AFB0FD2DD734C4A7B3A4B1A21FB061576001105AF68FE
3,139,353 UART: [art] SIG.R = ACDDE6FC7BDE5C69B9BDEDB469CAA888B5EE11680CDD1364E0B6871592C3C72416F2C168AC351292587FE62D83D8B72C
3,146,138 UART: [art] SIG.S = D78CAADD10288CFBD8891D34FC1B08D7DBB1ED2B366227BEDDE710F1D59FD6B51F9636AA49C919B97CFD984B323931CB
3,169,742 UART: Caliptra RT
3,169,995 UART: [state] CFI Enabled
3,278,421 UART: [rt] RT listening for mailbox commands...
3,279,091 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,021 UART: [rt]cmd =0x49444550, len=8
3,310,807 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,359 ready_for_fw is high
1,059,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,093 >>> mbox cmd response: success
2,689,337 UART:
2,689,353 UART: Running Caliptra FMC ...
2,689,761 UART:
2,689,815 UART: [state] CFI Enabled
2,699,948 UART: [fht] FMC Alias Private Key: 7
2,807,577 UART: [art] Extend RT PCRs Done
2,808,005 UART: [art] Lock RT PCRs Done
2,809,557 UART: [art] Populate DV Done
2,817,848 UART: [fht] FMC Alias Private Key: 7
2,818,934 UART: [art] Derive CDI
2,819,214 UART: [art] Store in in slot 0x4
2,905,081 UART: [art] Derive Key Pair
2,905,441 UART: [art] Store priv key in slot 0x5
2,918,323 UART: [art] Derive Key Pair - Done
2,933,132 UART: [art] Signing Cert with AUTHO
2,933,612 UART: RITY.KEYID = 7
2,948,932 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,697 UART: [art] PUB.X = AF4F7678997CA24792CB3712EDED5670D240C174A11167793C344021E67F138838DAA8B2F3AE119654D6640D5219C96B
2,956,458 UART: [art] PUB.Y = 1B1BE0328C045F4168C95CFA9F056F56D5DBE5960E4B65169536EE8283707C973A0A53742CBFEEBBB5B1FD758C700765
2,963,399 UART: [art] SIG.R = D44E98256B7FD37CD7AD1597E071BA5AB33493A93D38D7B542EF9F958971DA5933466EC5FB69D803CCA4C6471CFB9208
2,970,171 UART: [art] SIG.S = 4AC2F408AC1A9AA0A981180AE26A316E82E0D56247DFB27689C97AC051F7D4247A341DEA66CA2E589FF4C447A51EB66C
2,993,962 UART: Caliptra RT
2,994,215 UART: [state] CFI Enabled
3,102,022 UART: [rt] RT listening for mailbox commands...
3,102,692 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,442 UART: [rt]cmd =0x49444550, len=8
3,134,448 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,110 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [kat] SHA2-256
894,013 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,138 UART: [kat] ++
898,290 UART: [kat] sha1
902,578 UART: [kat] SHA2-256
904,518 UART: [kat] SHA2-384
907,295 UART: [kat] SHA2-512-ACC
909,196 UART: [kat] ECC-384
918,947 UART: [kat] HMAC-384Kdf
923,483 UART: [kat] LMS
1,171,811 UART: [kat] --
1,172,730 UART: [cold-reset] ++
1,173,118 UART: [fht] FHT @ 0x50003400
1,175,735 UART: [idev] ++
1,175,903 UART: [idev] CDI.KEYID = 6
1,176,263 UART: [idev] SUBJECT.KEYID = 7
1,176,687 UART: [idev] UDS.KEYID = 0
1,177,032 ready_for_fw is high
1,177,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,549 UART: [idev] Erasing UDS.KEYID = 0
1,201,774 UART: [idev] Sha1 KeyId Algorithm
1,210,146 UART: [idev] --
1,211,052 UART: [ldev] ++
1,211,220 UART: [ldev] CDI.KEYID = 6
1,211,583 UART: [ldev] SUBJECT.KEYID = 5
1,212,009 UART: [ldev] AUTHORITY.KEYID = 7
1,212,472 UART: [ldev] FE.KEYID = 1
1,217,544 UART: [ldev] Erasing FE.KEYID = 1
1,244,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,216 UART: [ldev] --
1,283,491 UART: [fwproc] Wait for Commands...
1,284,103 UART: [fwproc] Recv command 0x46574c44
1,284,831 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,145 >>> mbox cmd response: success
2,777,193 UART: [afmc] ++
2,777,361 UART: [afmc] CDI.KEYID = 6
2,777,723 UART: [afmc] SUBJECT.KEYID = 7
2,778,148 UART: [afmc] AUTHORITY.KEYID = 5
2,813,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,416 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,144 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,029 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,748 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,702 UART: [afmc] --
2,856,828 UART: [cold-reset] --
2,857,740 UART: [state] Locking Datavault
2,858,869 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,473 UART: [state] Locking ICCM
2,859,969 UART: [exit] Launching FMC @ 0x40000130
2,865,298 UART:
2,865,314 UART: Running Caliptra FMC ...
2,865,722 UART:
2,865,865 UART: [state] CFI Enabled
2,876,510 UART: [fht] FMC Alias Private Key: 7
2,984,379 UART: [art] Extend RT PCRs Done
2,984,807 UART: [art] Lock RT PCRs Done
2,986,235 UART: [art] Populate DV Done
2,994,512 UART: [fht] FMC Alias Private Key: 7
2,995,602 UART: [art] Derive CDI
2,995,882 UART: [art] Store in in slot 0x4
3,081,789 UART: [art] Derive Key Pair
3,082,149 UART: [art] Store priv key in slot 0x5
3,095,453 UART: [art] Derive Key Pair - Done
3,110,412 UART: [art] Signing Cert with AUTHO
3,110,892 UART: RITY.KEYID = 7
3,125,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,509 UART: [art] PUB.X = 033155DD33478E8B19146C4D99D67BECA557C1EF53FE5473931996B1AA3DF52B824DA8F8CF6BD365D5C9F5230FC71148
3,133,279 UART: [art] PUB.Y = 1161E82259525D8BD49D18ECDE863F38C2B9A1D4B50CFEC260C84FBD0462D5B3A50CA4415DF134684AE0FA4E9D9AC414
3,140,234 UART: [art] SIG.R = E26B857BDA9F4975BDD371BF7BE490F46188BAF13C2304D0CAC9AFEDE14A15FC6E61EE600E4A9C3E11EC5B44CF83A616
3,147,022 UART: [art] SIG.S = 1C28E703910F590F4C7A5AE2203B950572D6FDC403A1F7EB114E06ECCC9FF2E66138E694C2FAECA49467F79C483A1398
3,170,751 UART: Caliptra RT
3,171,096 UART: [state] CFI Enabled
3,278,509 UART: [rt] RT listening for mailbox commands...
3,279,179 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,663 UART: [rt]cmd =0x49444550, len=8
3,310,519 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,244 ready_for_fw is high
1,060,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,000 >>> mbox cmd response: success
2,690,832 UART:
2,690,848 UART: Running Caliptra FMC ...
2,691,256 UART:
2,691,399 UART: [state] CFI Enabled
2,701,962 UART: [fht] FMC Alias Private Key: 7
2,810,235 UART: [art] Extend RT PCRs Done
2,810,663 UART: [art] Lock RT PCRs Done
2,812,403 UART: [art] Populate DV Done
2,820,502 UART: [fht] FMC Alias Private Key: 7
2,821,596 UART: [art] Derive CDI
2,821,876 UART: [art] Store in in slot 0x4
2,907,979 UART: [art] Derive Key Pair
2,908,339 UART: [art] Store priv key in slot 0x5
2,921,627 UART: [art] Derive Key Pair - Done
2,936,477 UART: [art] Signing Cert with AUTHO
2,936,957 UART: RITY.KEYID = 7
2,952,019 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,784 UART: [art] PUB.X = BDD6C3B601DE20ECFDB7AD9A4472FF05BFA2F0F118C6A22785EFE75851890BF2474215AF76A28EB374E6C5B85EC99821
2,959,561 UART: [art] PUB.Y = 778AD11F7F5C702ABCC1B8755A1608CA3E1F322D228349DE124AD85989E3A37A41E970F884A1B8FD687382117C7FA376
2,966,510 UART: [art] SIG.R = D47287CF846BD1AF6C176FB775EA0F5C7CC184DFCA05F00D4ADB69512AEC74D2AE08DA51CA1A86DB6E95A59EFC487B52
2,973,294 UART: [art] SIG.S = ED77E96E32016ECFEF319B660F82479A19BEC1FB3FAC1A9E6AE9D49A11E17425BDCAFE343777638FF7727BA71B151F0F
2,997,374 UART: Caliptra RT
2,997,719 UART: [state] CFI Enabled
3,105,105 UART: [rt] RT listening for mailbox commands...
3,105,775 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,551 UART: [rt]cmd =0x49444550, len=8
3,137,523 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
85,925 UART: [state] WD Timer not started. Device not locked for debugging
87,206 UART: [kat] SHA2-256
890,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,885 UART: [kat] ++
895,037 UART: [kat] sha1
899,085 UART: [kat] SHA2-256
901,025 UART: [kat] SHA2-384
903,722 UART: [kat] SHA2-512-ACC
905,623 UART: [kat] ECC-384
915,516 UART: [kat] HMAC-384Kdf
920,126 UART: [kat] LMS
1,168,438 UART: [kat] --
1,169,585 UART: [cold-reset] ++
1,170,123 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,174,103 ready_for_fw is high
1,174,103 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,199,049 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,208,768 UART: [ldev] ++
1,208,936 UART: [ldev] CDI.KEYID = 6
1,209,300 UART: [ldev] SUBJECT.KEYID = 5
1,209,727 UART: [ldev] AUTHORITY.KEYID = 7
1,210,190 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,840 UART: [fwproc] Wait for Commands...
1,281,521 UART: [fwproc] Recv command 0x46574c44
1,282,254 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,104 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,992 >>> mbox cmd response: success
2,775,021 UART: [afmc] ++
2,775,189 UART: [afmc] CDI.KEYID = 6
2,775,552 UART: [afmc] SUBJECT.KEYID = 7
2,775,978 UART: [afmc] AUTHORITY.KEYID = 5
2,811,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,766 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,495 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,378 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,698 UART: [afmc] --
2,854,654 UART: [cold-reset] --
2,855,374 UART: [state] Locking Datavault
2,856,575 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,179 UART: [state] Locking ICCM
2,857,653 UART: [exit] Launching FMC @ 0x40000130
2,862,982 UART:
2,862,998 UART: Running Caliptra FMC ...
2,863,406 UART:
2,863,460 UART: [state] CFI Enabled
2,874,099 UART: [fht] FMC Alias Private Key: 7
2,982,020 UART: [art] Extend RT PCRs Done
2,982,448 UART: [art] Lock RT PCRs Done
2,983,942 UART: [art] Populate DV Done
2,992,183 UART: [fht] FMC Alias Private Key: 7
2,993,247 UART: [art] Derive CDI
2,993,527 UART: [art] Store in in slot 0x4
3,079,246 UART: [art] Derive Key Pair
3,079,606 UART: [art] Store priv key in slot 0x5
3,092,918 UART: [art] Derive Key Pair - Done
3,107,607 UART: [art] Signing Cert with AUTHO
3,108,087 UART: RITY.KEYID = 7
3,123,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,960 UART: [art] PUB.X = 460B29A5169AFB93CB7035827FE8EC23D6E5F2576E4CF3609A678358173DA0B4A3443816512B2E581B14E8ABC6B91E56
3,130,727 UART: [art] PUB.Y = EF12DC47D0447EEF711C1F93F189F3BA9539C654C4F06199D494EF282D77D2029AAA01E839719454EEE50CA075192E77
3,137,670 UART: [art] SIG.R = 1265964D762A17A498B0497E73AF4139844DDE2BCE781A0C663780A9081F00875A6CBAD4AADDE680ACDE4A4CAC8A4BF1
3,144,426 UART: [art] SIG.S = 6EF547A41149D90394039F210EF647C3FEA23B4C1E22D8AFA0AA57E5A7EDE1C9821B232B40BA081B80200B2FC23EC937
3,168,712 UART: Caliptra RT
3,168,965 UART: [state] CFI Enabled
3,277,674 UART: [rt] RT listening for mailbox commands...
3,278,344 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,508 UART: [rt]cmd =0x49444550, len=8
3,310,208 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,912 ready_for_fw is high
1,055,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,894 >>> mbox cmd response: success
2,686,874 UART:
2,686,890 UART: Running Caliptra FMC ...
2,687,298 UART:
2,687,352 UART: [state] CFI Enabled
2,697,873 UART: [fht] FMC Alias Private Key: 7
2,805,612 UART: [art] Extend RT PCRs Done
2,806,040 UART: [art] Lock RT PCRs Done
2,807,474 UART: [art] Populate DV Done
2,815,827 UART: [fht] FMC Alias Private Key: 7
2,816,863 UART: [art] Derive CDI
2,817,143 UART: [art] Store in in slot 0x4
2,902,322 UART: [art] Derive Key Pair
2,902,682 UART: [art] Store priv key in slot 0x5
2,915,660 UART: [art] Derive Key Pair - Done
2,930,176 UART: [art] Signing Cert with AUTHO
2,930,656 UART: RITY.KEYID = 7
2,945,752 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,517 UART: [art] PUB.X = 81139B3FA6576FDAF992A8B48DEA6A1D8A692C52AD23650B4B9FA93D371B1A11BABE34C4259E60653EDA095C6B49FBE8
2,953,297 UART: [art] PUB.Y = 5CFCACD0F562309254645CC9DA213F8987768BED614FF020B007AB99299BAC794AD5A2F9ABC0457E0EF682FB61FF7C41
2,960,255 UART: [art] SIG.R = 28E61E1348DFA8C9136A0D12CDF4AFE91D235562E61C0FE171C2218550AC073DA8118F4BED55A2C009D9AF8E2F7A4CD6
2,967,027 UART: [art] SIG.S = 6EB6E4620581D54582E809E5549D77153CA543BAD18DA90D025FA4EDBE3DCC837DE1DEF3E562E3D4CE2E4C608608508D
2,991,057 UART: Caliptra RT
2,991,310 UART: [state] CFI Enabled
3,099,327 UART: [rt] RT listening for mailbox commands...
3,099,997 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,011 UART: [rt]cmd =0x49444550, len=8
3,131,849 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,650 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,174,726 ready_for_fw is high
1,174,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,189 UART: [ldev] ++
1,209,357 UART: [ldev] CDI.KEYID = 6
1,209,721 UART: [ldev] SUBJECT.KEYID = 5
1,210,148 UART: [ldev] AUTHORITY.KEYID = 7
1,210,611 UART: [ldev] FE.KEYID = 1
1,215,903 UART: [ldev] Erasing FE.KEYID = 1
1,242,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,269 UART: [ldev] --
1,281,777 UART: [fwproc] Wait for Commands...
1,282,384 UART: [fwproc] Recv command 0x46574c44
1,283,117 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,508 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,817 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,901 >>> mbox cmd response: success
2,774,948 UART: [afmc] ++
2,775,116 UART: [afmc] CDI.KEYID = 6
2,775,479 UART: [afmc] SUBJECT.KEYID = 7
2,775,905 UART: [afmc] AUTHORITY.KEYID = 5
2,812,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,189 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,801 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,520 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,187 UART: [afmc] --
2,855,217 UART: [cold-reset] --
2,856,029 UART: [state] Locking Datavault
2,857,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,932 UART: [state] Locking ICCM
2,858,548 UART: [exit] Launching FMC @ 0x40000130
2,863,877 UART:
2,863,893 UART: Running Caliptra FMC ...
2,864,301 UART:
2,864,444 UART: [state] CFI Enabled
2,875,077 UART: [fht] FMC Alias Private Key: 7
2,983,592 UART: [art] Extend RT PCRs Done
2,984,020 UART: [art] Lock RT PCRs Done
2,985,702 UART: [art] Populate DV Done
2,994,139 UART: [fht] FMC Alias Private Key: 7
2,995,073 UART: [art] Derive CDI
2,995,353 UART: [art] Store in in slot 0x4
3,080,876 UART: [art] Derive Key Pair
3,081,236 UART: [art] Store priv key in slot 0x5
3,094,640 UART: [art] Derive Key Pair - Done
3,109,429 UART: [art] Signing Cert with AUTHO
3,109,909 UART: RITY.KEYID = 7
3,125,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,068 UART: [art] PUB.X = CEEEF17419AFBD8FBF223979FC8774C840D9A5F35F4C63E592B757C446BEA1FB71135401F3903286E1B23476F6C1E50F
3,132,840 UART: [art] PUB.Y = 144053819D8FC558145E8AE45D69F4A8B262727B0820A4DB424C46213E937ECBABF9B87D151D2B6D4F91068E52A61EC6
3,139,786 UART: [art] SIG.R = 12BA5C40AB706B0B996376BA3E56BB922FBC33772948C7A6584CE7B802C107A2A307B342F1C1294A5BC31E432E01EBBB
3,146,549 UART: [art] SIG.S = 37C8E333079D38B159E498ECA0143FBF618C197A9A7EF579E2A0AC13FCA9F27283675670BE357D6069E08657338A9C45
3,170,079 UART: Caliptra RT
3,170,424 UART: [state] CFI Enabled
3,278,561 UART: [rt] RT listening for mailbox commands...
3,279,231 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,305 UART: [rt]cmd =0x49444550, len=8
3,311,169 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,573 ready_for_fw is high
1,055,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,303 >>> mbox cmd response: success
2,684,885 UART:
2,684,901 UART: Running Caliptra FMC ...
2,685,309 UART:
2,685,452 UART: [state] CFI Enabled
2,696,191 UART: [fht] FMC Alias Private Key: 7
2,804,412 UART: [art] Extend RT PCRs Done
2,804,840 UART: [art] Lock RT PCRs Done
2,806,482 UART: [art] Populate DV Done
2,814,785 UART: [fht] FMC Alias Private Key: 7
2,815,929 UART: [art] Derive CDI
2,816,209 UART: [art] Store in in slot 0x4
2,901,948 UART: [art] Derive Key Pair
2,902,308 UART: [art] Store priv key in slot 0x5
2,915,656 UART: [art] Derive Key Pair - Done
2,930,730 UART: [art] Signing Cert with AUTHO
2,931,210 UART: RITY.KEYID = 7
2,945,850 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,615 UART: [art] PUB.X = 58A40F5A96176FC0C04BBFFFAC4B81591EC76A43546CD1C6E6A7633642F25992E7B32662DB7434972B07C1B3B97003E6
2,953,378 UART: [art] PUB.Y = 47B48709733422E091389E19AFA57FB989CE3C07BF8F9FBAD19E9F7E0BC60A937FF2C9DEAC0D883A0A0022CF47520DB5
2,960,299 UART: [art] SIG.R = C88ABC5096D47BC5720117925AF9EA100995E1BEDDD28F942A3CBC77E1003467A58DC1D1EEA923B50F87A11180EE6DDE
2,967,052 UART: [art] SIG.S = D68AB8B98E02754AD58AE8E52BF1751543AABFB55C408A4E34E50DAE5A37BC772532CF69B88E8E4E335474CDDA058167
2,991,278 UART: Caliptra RT
2,991,623 UART: [state] CFI Enabled
3,100,103 UART: [rt] RT listening for mailbox commands...
3,100,773 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,455 UART: [rt]cmd =0x49444550, len=8
3,132,385 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,100 UART:
192,472 UART: Running Caliptra ROM ...
193,676 UART:
193,833 UART: [state] CFI Enabled
262,037 UART: [state] LifecycleState = Unprovisioned
264,003 UART: [state] DebugLocked = No
265,999 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,927 UART: [kat] SHA2-256
440,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,088 UART: [kat] ++
451,552 UART: [kat] sha1
462,711 UART: [kat] SHA2-256
465,440 UART: [kat] SHA2-384
472,424 UART: [kat] SHA2-512-ACC
474,792 UART: [kat] ECC-384
2,769,816 UART: [kat] HMAC-384Kdf
2,801,159 UART: [kat] LMS
3,991,453 UART: [kat] --
3,996,748 UART: [cold-reset] ++
3,999,034 UART: [fht] Storing FHT @ 0x50003400
4,010,735 UART: [idev] ++
4,011,310 UART: [idev] CDI.KEYID = 6
4,012,243 UART: [idev] SUBJECT.KEYID = 7
4,013,492 UART: [idev] UDS.KEYID = 0
4,014,536 ready_for_fw is high
4,014,745 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,294 UART: [idev] Erasing UDS.KEYID = 0
7,348,573 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,603 UART: [idev] --
7,374,386 UART: [ldev] ++
7,374,961 UART: [ldev] CDI.KEYID = 6
7,375,978 UART: [ldev] SUBJECT.KEYID = 5
7,377,138 UART: [ldev] AUTHORITY.KEYID = 7
7,378,371 UART: [ldev] FE.KEYID = 1
7,423,854 UART: [ldev] Erasing FE.KEYID = 1
10,757,999 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,192 UART: [ldev] --
13,135,275 UART: [fwproc] Waiting for Commands...
13,137,481 UART: [fwproc] Received command 0x46574c44
13,139,668 UART: [fwproc] Received Image of size 114124 bytes
17,190,575 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,762 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,619 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,659,881 >>> mbox cmd response: success
17,663,457 UART: [afmc] ++
17,664,053 UART: [afmc] CDI.KEYID = 6
17,664,945 UART: [afmc] SUBJECT.KEYID = 7
17,666,219 UART: [afmc] AUTHORITY.KEYID = 5
21,028,554 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,844 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,117 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,536 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,373 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,776 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,600 UART: [afmc] --
23,401,070 UART: [cold-reset] --
23,405,316 UART: [state] Locking Datavault
23,409,716 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,472 UART: [state] Locking ICCM
23,413,465 UART: [exit] Launching FMC @ 0x40000130
23,421,812 UART:
23,422,050 UART: Running Caliptra FMC ...
23,423,162 UART:
23,423,324 UART: [state] CFI Enabled
23,489,162 UART: [fht] FMC Alias Private Key: 7
25,827,424 UART: [art] Extend RT PCRs Done
25,828,662 UART: [art] Lock RT PCRs Done
25,830,246 UART: [art] Populate DV Done
25,835,774 UART: [fht] FMC Alias Private Key: 7
25,837,313 UART: [art] Derive CDI
25,838,082 UART: [art] Store in in slot 0x4
25,898,377 UART: [art] Derive Key Pair
25,899,417 UART: [art] Store priv key in slot 0x5
29,192,039 UART: [art] Derive Key Pair - Done
29,205,200 UART: [art] Signing Cert with AUTHO
29,206,506 UART: RITY.KEYID = 7
31,494,430 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,938 UART: [art] PUB.X = 2CA1BECD7F634CD20DF2EF365552265A5546FFDCB8805C7192C0A685694173146C92BD394F8F948F8D9A016117CFE63C
31,503,134 UART: [art] PUB.Y = FC592DE255F11D3B61F71AE90E6E98E01715FB58F89D45FBE10E948AFF1E77BE8E215A3649152549BD43C1B7B64F934B
31,510,422 UART: [art] SIG.R = 96894964BF9FCF007AF3C65BD5BCD4DEA8C392BF4C4D225E56B624F59B8A41F37F3616C4F45582F44E0315195E208CED
31,517,761 UART: [art] SIG.S = 594D254BAC5EF4F2A38F9573AB27C6A2C63344FB68800743CC9E8859DD69F86CFCB0650314F5A1006DFFC2AD7C9EEB08
32,822,291 UART: Caliptra RT
32,823,015 UART: [state] CFI Enabled
32,986,078 UART: [rt] RT listening for mailbox commands...
32,988,008 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,018,219 UART: [rt]cmd =0x52564348, len=36
33,019,931 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,786,331 ready_for_fw is high
3,786,952 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,845,455 >>> mbox cmd response: success
23,543,614 UART:
23,543,991 UART: Running Caliptra FMC ...
23,545,131 UART:
23,545,299 UART: [state] CFI Enabled
23,596,168 UART: [fht] FMC Alias Private Key: 7
25,934,386 UART: [art] Extend RT PCRs Done
25,935,612 UART: [art] Lock RT PCRs Done
25,937,409 UART: [art] Populate DV Done
25,942,622 UART: [fht] FMC Alias Private Key: 7
25,944,274 UART: [art] Derive CDI
25,945,094 UART: [art] Store in in slot 0x4
26,005,280 UART: [art] Derive Key Pair
26,006,370 UART: [art] Store priv key in slot 0x5
29,299,164 UART: [art] Derive Key Pair - Done
29,312,165 UART: [art] Signing Cert with AUTHO
29,313,473 UART: RITY.KEYID = 7
31,601,455 UART: [art] Erasing AUTHORITY.KEYID = 7
31,602,972 UART: [art] PUB.X = 1DCE88726CFF9E37E9E33BC66E2D9645AA32761A9A38443E439473FC0147D5D2010D02A33CC834EB01626E076F9E9526
31,610,189 UART: [art] PUB.Y = B09CFCF59BEEE4846EECB9A9FB52817FA2F84B181E394E1F937BB86CD9B638FD1BD0E254CEA3E5B9DA32887DC696980A
31,617,461 UART: [art] SIG.R = B9808AE5BA1BCFD0DD9799592322C9A2B3DD54A337B92460AAC25CD0B2154A8B0720E826D477DAC530712AD69976B856
31,624,822 UART: [art] SIG.S = F60CFCACC2C8F51F1C542D93F65A7D55DA3B808248B95CCA22283B51A9811EB6AF6EB8C70AAFDF0D8D7F6A5858FE1C8B
32,929,886 UART: Caliptra RT
32,930,597 UART: [state] CFI Enabled
33,090,475 UART: [rt] RT listening for mailbox commands...
33,092,374 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,122,151 UART: [rt]cmd =0x52564348, len=36
33,124,029 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,440 UART:
192,789 UART: Running Caliptra ROM ...
193,985 UART:
603,763 UART: [state] CFI Enabled
618,152 UART: [state] LifecycleState = Unprovisioned
620,096 UART: [state] DebugLocked = No
621,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,529 UART: [kat] SHA2-256
795,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,832 UART: [kat] ++
806,291 UART: [kat] sha1
818,155 UART: [kat] SHA2-256
820,808 UART: [kat] SHA2-384
827,075 UART: [kat] SHA2-512-ACC
829,440 UART: [kat] ECC-384
3,112,537 UART: [kat] HMAC-384Kdf
3,124,623 UART: [kat] LMS
4,314,732 UART: [kat] --
4,319,392 UART: [cold-reset] ++
4,321,467 UART: [fht] Storing FHT @ 0x50003400
4,333,013 UART: [idev] ++
4,333,572 UART: [idev] CDI.KEYID = 6
4,334,597 UART: [idev] SUBJECT.KEYID = 7
4,335,767 UART: [idev] UDS.KEYID = 0
4,336,735 ready_for_fw is high
4,336,928 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,278 UART: [idev] Erasing UDS.KEYID = 0
7,619,729 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,964 UART: [idev] --
7,646,325 UART: [ldev] ++
7,646,939 UART: [ldev] CDI.KEYID = 6
7,647,896 UART: [ldev] SUBJECT.KEYID = 5
7,649,100 UART: [ldev] AUTHORITY.KEYID = 7
7,650,334 UART: [ldev] FE.KEYID = 1
7,662,217 UART: [ldev] Erasing FE.KEYID = 1
10,948,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,879 UART: [ldev] --
13,311,163 UART: [fwproc] Waiting for Commands...
13,313,816 UART: [fwproc] Received command 0x46574c44
13,316,049 UART: [fwproc] Received Image of size 114124 bytes
17,363,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,709 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,615 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,827,845 >>> mbox cmd response: success
17,831,463 UART: [afmc] ++
17,832,105 UART: [afmc] CDI.KEYID = 6
17,832,988 UART: [afmc] SUBJECT.KEYID = 7
17,834,252 UART: [afmc] AUTHORITY.KEYID = 5
21,148,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,382 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,626 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,030 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,850 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,287 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,602 UART: [afmc] --
23,518,554 UART: [cold-reset] --
23,521,495 UART: [state] Locking Datavault
23,528,465 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,165 UART: [state] Locking ICCM
23,531,613 UART: [exit] Launching FMC @ 0x40000130
23,540,007 UART:
23,540,243 UART: Running Caliptra FMC ...
23,541,340 UART:
23,541,492 UART: [state] CFI Enabled
23,549,907 UART: [fht] FMC Alias Private Key: 7
25,880,319 UART: [art] Extend RT PCRs Done
25,881,536 UART: [art] Lock RT PCRs Done
25,883,101 UART: [art] Populate DV Done
25,888,564 UART: [fht] FMC Alias Private Key: 7
25,890,260 UART: [art] Derive CDI
25,891,088 UART: [art] Store in in slot 0x4
25,933,589 UART: [art] Derive Key Pair
25,934,631 UART: [art] Store priv key in slot 0x5
29,175,936 UART: [art] Derive Key Pair - Done
29,189,089 UART: [art] Signing Cert with AUTHO
29,190,418 UART: RITY.KEYID = 7
31,469,984 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,484 UART: [art] PUB.X = 4DD8835F2388490F141C68D79679B8F3D66AF96F4A43446015FEE054210C3BDF4C67831ABF38BC0B7E787D044360FAB5
31,478,724 UART: [art] PUB.Y = C8848484F08F5CA91F6B2867F3F21E1DB51D26BE2A2BDDCEDA0E57C6541FAE4C00075202217BD1CEE6779536E961882B
31,485,997 UART: [art] SIG.R = D73B8779FA93C4F005419EB744395E877058BECC79EB725ECB9E27483EFF60B9B8D5F2EDE533B76B86C2CADF632A9D21
31,493,371 UART: [art] SIG.S = 3AC8DDEC3C199760F6A05C98697A2EC1DD742B3E5B9832E33D512569F8D8EF2B15A9C5BACB28E449D221D1546B7498A4
32,798,419 UART: Caliptra RT
32,799,112 UART: [state] CFI Enabled
32,915,304 UART: [rt] RT listening for mailbox commands...
32,917,178 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,947,054 UART: [rt]cmd =0x52564348, len=36
32,948,915 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
4,127,213 ready_for_fw is high
4,127,829 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,080,626 >>> mbox cmd response: success
23,726,886 UART:
23,727,274 UART: Running Caliptra FMC ...
23,728,408 UART:
23,728,565 UART: [state] CFI Enabled
23,736,115 UART: [fht] FMC Alias Private Key: 7
26,066,644 UART: [art] Extend RT PCRs Done
26,067,867 UART: [art] Lock RT PCRs Done
26,069,815 UART: [art] Populate DV Done
26,075,088 UART: [fht] FMC Alias Private Key: 7
26,076,689 UART: [art] Derive CDI
26,077,505 UART: [art] Store in in slot 0x4
26,120,212 UART: [art] Derive Key Pair
26,121,252 UART: [art] Store priv key in slot 0x5
29,363,759 UART: [art] Derive Key Pair - Done
29,377,132 UART: [art] Signing Cert with AUTHO
29,378,432 UART: RITY.KEYID = 7
31,657,870 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,380 UART: [art] PUB.X = 0ECDAD047F5B576103224FB3938C3AB049E29FDFCDAE073C911C81622DEDD3F428A596B81762D3594569DAC3DBDE6749
31,666,619 UART: [art] PUB.Y = B7041072BA5B44CD85ACCEF85BB435D5C006B93A56BA98FBE14D0B0EDE05B92DDF1EECC018B874A23A8CEA7F4D9268F5
31,673,895 UART: [art] SIG.R = 0C41DA23F1E7B88D326F7E7ED983BD53BB3CFD7FF901551F8273D9DF494DC760D0C2713565D28F47160C36FF9C83ABAD
31,681,276 UART: [art] SIG.S = BC1F39899800FFC305ED95B9F8E557E7F60ABAD5F6CE23594E6C097AF1F250692C42C1789825C0C4BC9A974EA9A0604A
32,986,960 UART: Caliptra RT
32,987,671 UART: [state] CFI Enabled
33,105,353 UART: [rt] RT listening for mailbox commands...
33,107,257 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,137,070 UART: [rt]cmd =0x52564348, len=36
33,138,767 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,032 UART:
192,403 UART: Running Caliptra ROM ...
193,601 UART:
193,757 UART: [state] CFI Enabled
262,221 UART: [state] LifecycleState = Unprovisioned
264,118 UART: [state] DebugLocked = No
265,292 UART: [state] WD Timer not started. Device not locked for debugging
269,273 UART: [kat] SHA2-256
448,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,984 UART: [kat] ++
460,515 UART: [kat] sha1
472,391 UART: [kat] SHA2-256
475,391 UART: [kat] SHA2-384
480,522 UART: [kat] SHA2-512-ACC
483,536 UART: [kat] ECC-384
2,926,072 UART: [kat] HMAC-384Kdf
2,949,819 UART: [kat] LMS
3,479,289 UART: [kat] --
3,483,500 UART: [cold-reset] ++
3,485,072 UART: [fht] FHT @ 0x50003400
3,495,625 UART: [idev] ++
3,496,185 UART: [idev] CDI.KEYID = 6
3,497,224 UART: [idev] SUBJECT.KEYID = 7
3,498,348 UART: [idev] UDS.KEYID = 0
3,499,279 ready_for_fw is high
3,499,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,643,527 UART: [idev] Erasing UDS.KEYID = 0
6,006,401 UART: [idev] Sha1 KeyId Algorithm
6,030,294 UART: [idev] --
6,033,539 UART: [ldev] ++
6,034,115 UART: [ldev] CDI.KEYID = 6
6,035,030 UART: [ldev] SUBJECT.KEYID = 5
6,036,250 UART: [ldev] AUTHORITY.KEYID = 7
6,037,480 UART: [ldev] FE.KEYID = 1
6,078,105 UART: [ldev] Erasing FE.KEYID = 1
8,580,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,638 UART: [ldev] --
10,394,496 UART: [fwproc] Wait for Commands...
10,396,965 UART: [fwproc] Recv command 0x46574c44
10,399,065 UART: [fwproc] Recv'd Img size: 114448 bytes
13,797,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,863,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,932,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,250,296 >>> mbox cmd response: success
14,254,424 UART: [afmc] ++
14,255,013 UART: [afmc] CDI.KEYID = 6
14,255,926 UART: [afmc] SUBJECT.KEYID = 7
14,257,086 UART: [afmc] AUTHORITY.KEYID = 5
16,785,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,509,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,511,371 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,527,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,543,177 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,558,994 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,580,832 UART: [afmc] --
18,585,129 UART: [cold-reset] --
18,590,182 UART: [state] Locking Datavault
18,595,749 UART: [state] Locking PCR0, PCR1 and PCR31
18,597,453 UART: [state] Locking ICCM
18,598,449 UART: [exit] Launching FMC @ 0x40000130
18,606,894 UART:
18,607,128 UART: Running Caliptra FMC ...
18,608,225 UART:
18,608,402 UART: [state] CFI Enabled
18,670,476 UART: [fht] FMC Alias Private Key: 7
20,435,011 UART: [art] Extend RT PCRs Done
20,436,238 UART: [art] Lock RT PCRs Done
20,437,826 UART: [art] Populate DV Done
20,443,566 UART: [fht] FMC Alias Private Key: 7
20,445,219 UART: [art] Derive CDI
20,446,038 UART: [art] Store in in slot 0x4
20,503,358 UART: [art] Derive Key Pair
20,504,395 UART: [art] Store priv key in slot 0x5
22,967,162 UART: [art] Derive Key Pair - Done
22,980,541 UART: [art] Signing Cert with AUTHO
22,981,846 UART: RITY.KEYID = 7
24,692,631 UART: [art] Erasing AUTHORITY.KEYID = 7
24,694,133 UART: [art] PUB.X = B407ED051310BF03E1AFDC85F17B5DFFAFD797C8FFD0A7F34A3501D4D3783F96C29540E7FB244D5AE0535E99C557F0E6
24,701,391 UART: [art] PUB.Y = FBAEEF608E6673B663C80CFDFC1A08B0931A94A2577772AA00674817168E7C87F8FE8F26CF29F6D3B87C1B424B93E8DC
24,708,684 UART: [art] SIG.R = E2D550C667C74C1FC61A047EF9083FAAB6E494F00D537CF8EDE904257E00FD73A8DCE235A0FF644969E32B6E0834F43A
24,716,020 UART: [art] SIG.S = AC473D84743F6918E0E356CD8C6A9A6DECC8994E0080363DD46100F65DCF8DA027A50C6A6191C9ACDD215166FA543085
25,695,165 UART: Caliptra RT
25,695,900 UART: [state] CFI Enabled
25,860,007 UART: [rt] RT listening for mailbox commands...
25,861,903 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,892,951 UART: [rt]cmd =0x52564348, len=36
25,895,021 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,381,301 ready_for_fw is high
3,381,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,068,111 >>> mbox cmd response: success
18,345,075 UART:
18,345,480 UART: Running Caliptra FMC ...
18,346,597 UART:
18,346,774 UART: [state] CFI Enabled
18,411,115 UART: [fht] FMC Alias Private Key: 7
20,174,650 UART: [art] Extend RT PCRs Done
20,175,876 UART: [art] Lock RT PCRs Done
20,177,636 UART: [art] Populate DV Done
20,182,830 UART: [fht] FMC Alias Private Key: 7
20,184,421 UART: [art] Derive CDI
20,185,162 UART: [art] Store in in slot 0x4
20,243,388 UART: [art] Derive Key Pair
20,244,387 UART: [art] Store priv key in slot 0x5
22,707,015 UART: [art] Derive Key Pair - Done
22,719,960 UART: [art] Signing Cert with AUTHO
22,721,258 UART: RITY.KEYID = 7
24,432,526 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,036 UART: [art] PUB.X = F340EC92720CEE66E5C7C76C241688F7134AEFA60F8E6D4797B9DC6FE419C6944B39F03850E3CFDE40556BB02E296E81
24,441,291 UART: [art] PUB.Y = 10B97315C933F637855E6C41986F3D7126E6628F0EA63B5E0ADDB0F891C60441CA3E819E60F79B2C40C7C8C627F87803
24,448,563 UART: [art] SIG.R = 19C7317A9EE09C05A45B10209B63A13C895E15B2BFD6C153AC6FA6EA90A7D14D7867E9A9E8DDD3E8537747CDC5690AEC
24,455,955 UART: [art] SIG.S = 3A139563A8C2FDD86469CC718638CC72B7823812FFC41A63EF7D10F7BA8B1D94FC6A56997380D9BDAE56CC3E57ADFDD3
25,434,781 UART: Caliptra RT
25,435,495 UART: [state] CFI Enabled
25,600,520 UART: [rt] RT listening for mailbox commands...
25,602,396 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,633,298 UART: [rt]cmd =0x52564348, len=36
25,634,955 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
192,379 UART:
192,759 UART: Running Caliptra ROM ...
193,936 UART:
603,426 UART: [state] CFI Enabled
618,793 UART: [state] LifecycleState = Unprovisioned
620,675 UART: [state] DebugLocked = No
623,265 UART: [state] WD Timer not started. Device not locked for debugging
627,728 UART: [kat] SHA2-256
806,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,387 UART: [kat] ++
818,916 UART: [kat] sha1
829,932 UART: [kat] SHA2-256
833,004 UART: [kat] SHA2-384
838,999 UART: [kat] SHA2-512-ACC
841,927 UART: [kat] ECC-384
3,286,388 UART: [kat] HMAC-384Kdf
3,299,404 UART: [kat] LMS
3,828,882 UART: [kat] --
3,832,255 UART: [cold-reset] ++
3,834,820 UART: [fht] FHT @ 0x50003400
3,846,497 UART: [idev] ++
3,847,064 UART: [idev] CDI.KEYID = 6
3,848,089 UART: [idev] SUBJECT.KEYID = 7
3,849,185 UART: [idev] UDS.KEYID = 0
3,850,227 ready_for_fw is high
3,850,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,994,173 UART: [idev] Erasing UDS.KEYID = 0
6,323,176 UART: [idev] Sha1 KeyId Algorithm
6,345,861 UART: [idev] --
6,350,330 UART: [ldev] ++
6,350,889 UART: [ldev] CDI.KEYID = 6
6,351,819 UART: [ldev] SUBJECT.KEYID = 5
6,353,019 UART: [ldev] AUTHORITY.KEYID = 7
6,354,193 UART: [ldev] FE.KEYID = 1
6,364,420 UART: [ldev] Erasing FE.KEYID = 1
8,842,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,471 UART: [ldev] --
10,632,682 UART: [fwproc] Wait for Commands...
10,634,839 UART: [fwproc] Recv command 0x46574c44
10,636,931 UART: [fwproc] Recv'd Img size: 114448 bytes
14,046,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,120,937 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,189,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,507,771 >>> mbox cmd response: success
14,511,924 UART: [afmc] ++
14,512,513 UART: [afmc] CDI.KEYID = 6
14,513,417 UART: [afmc] SUBJECT.KEYID = 7
14,514,626 UART: [afmc] AUTHORITY.KEYID = 5
17,016,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,736,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,738,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,754,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,770,395 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,786,284 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,808,783 UART: [afmc] --
18,812,007 UART: [cold-reset] --
18,816,790 UART: [state] Locking Datavault
18,822,037 UART: [state] Locking PCR0, PCR1 and PCR31
18,823,678 UART: [state] Locking ICCM
18,824,741 UART: [exit] Launching FMC @ 0x40000130
18,833,134 UART:
18,833,366 UART: Running Caliptra FMC ...
18,834,462 UART:
18,834,611 UART: [state] CFI Enabled
18,842,810 UART: [fht] FMC Alias Private Key: 7
20,600,118 UART: [art] Extend RT PCRs Done
20,601,338 UART: [art] Lock RT PCRs Done
20,603,306 UART: [art] Populate DV Done
20,608,658 UART: [fht] FMC Alias Private Key: 7
20,610,371 UART: [art] Derive CDI
20,611,104 UART: [art] Store in in slot 0x4
20,653,751 UART: [art] Derive Key Pair
20,654,788 UART: [art] Store priv key in slot 0x5
23,081,630 UART: [art] Derive Key Pair - Done
23,094,566 UART: [art] Signing Cert with AUTHO
23,095,867 UART: RITY.KEYID = 7
24,800,958 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,463 UART: [art] PUB.X = 44EB2AC05696D73B0529E8F704F9E0DCBC686D37BF0F1457D29D665EF3CA163E7D21E8D61C60E9063F5065C9E99EF383
24,809,689 UART: [art] PUB.Y = 6FD0DE70C7A467178159666850C045DE0B0F2EAEACB1809E7582218B3D12D19F3E506C2AB956DC2E15996373F42D07F7
24,816,962 UART: [art] SIG.R = FD33D188E9408A0FD7FFDD60A730ECBA8E7AA324484E50A3C88C29E2DDD5B0D1DC0AA50F9F353A96FF0598424B683F9F
24,824,392 UART: [art] SIG.S = 348949D2649FBD5CB7DFAFB8718407D2A1BD2A0ED1E2F57C5464A4D04E9330B72603F2FB637DDA3F52189FE835E762D4
25,803,245 UART: Caliptra RT
25,803,931 UART: [state] CFI Enabled
25,921,731 UART: [rt] RT listening for mailbox commands...
25,923,653 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,953,702 UART: [rt]cmd =0x52564348, len=36
25,955,626 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,696,681 ready_for_fw is high
3,697,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,677 >>> mbox cmd response: success
18,516,475 UART:
18,516,872 UART: Running Caliptra FMC ...
18,517,993 UART:
18,518,151 UART: [state] CFI Enabled
18,526,307 UART: [fht] FMC Alias Private Key: 7
20,283,326 UART: [art] Extend RT PCRs Done
20,284,578 UART: [art] Lock RT PCRs Done
20,285,993 UART: [art] Populate DV Done
20,291,252 UART: [fht] FMC Alias Private Key: 7
20,292,733 UART: [art] Derive CDI
20,293,487 UART: [art] Store in in slot 0x4
20,336,182 UART: [art] Derive Key Pair
20,337,173 UART: [art] Store priv key in slot 0x5
22,763,704 UART: [art] Derive Key Pair - Done
22,776,817 UART: [art] Signing Cert with AUTHO
22,778,121 UART: RITY.KEYID = 7
24,483,430 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,933 UART: [art] PUB.X = 304775B67166F2DB908FF8E2655921897374DECB54FCE40754635BE91489F63FEEE5C1FDAFBEDAA73628506E99D885FA
24,492,235 UART: [art] PUB.Y = 0494C96F26708227C41264CC472BD7E87FC10B18B456D860C3A22F7CCF7C88F3DE824CF523DC4722774045F0574EDFB0
24,499,460 UART: [art] SIG.R = EC126A0545C8504EA3D48188C0C9F717B3FE4F298371A432E500DF5E206B878DD3FC68308E8330C87532C8B573EC9ECC
24,506,887 UART: [art] SIG.S = E46EB014DAD52B40FE89A81057ECDBCC6DDB4439FA2006F99EB2C47356B484A96EC67E505F39D39D0DB1269AF8ADDACF
25,485,465 UART: Caliptra RT
25,486,182 UART: [state] CFI Enabled
25,603,347 UART: [rt] RT listening for mailbox commands...
25,605,220 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,635,270 UART: [rt]cmd =0x52564348, len=36
25,637,189 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,432,121 ready_for_fw is high
3,432,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,724,837 >>> mbox cmd response: success
18,999,571 UART:
18,999,967 UART: Running Caliptra FMC ...
19,001,103 UART:
19,001,271 UART: [state] CFI Enabled
19,068,962 UART: [fht] FMC Alias Private Key: 7
20,833,061 UART: [art] Extend RT PCRs Done
20,834,275 UART: [art] Lock RT PCRs Done
20,835,903 UART: [art] Populate DV Done
20,841,311 UART: [fht] FMC Alias Private Key: 7
20,842,862 UART: [art] Derive CDI
20,843,681 UART: [art] Store in in slot 0x4
20,901,582 UART: [art] Derive Key Pair
20,902,576 UART: [art] Store priv key in slot 0x5
23,365,641 UART: [art] Derive Key Pair - Done
23,378,640 UART: [art] Signing Cert with AUTHO
23,379,949 UART: RITY.KEYID = 7
25,091,488 UART: [art] Erasing AUTHORITY.KEYID = 7
25,092,988 UART: [art] PUB.X = 16EFAB6562F09CEB4E4B695510E2368743985D5B9D8A5DF309875F358C18019ACFD2518EF1E48EBB1ECB10DE626FBFF6
25,100,292 UART: [art] PUB.Y = 71A4FB4F20D5390CDFA1A39DF6924793532635F886A93BEA0B15BF776D8E471AD20D05A04376AB77ACB744B3A2225DE9
25,107,541 UART: [art] SIG.R = 44FC64BD2011F07257A15C0983DE5E69AD928AB93FE245515C59FD6803F20B31A9AF3413141890F46395F5155C8A8C54
25,114,925 UART: [art] SIG.S = C724BA4FE883E44281F9E35630E5B6F18767463ABEB9B12E11A04E83D18E398A81484339745700D6E1AF70432DBA290F
26,093,646 UART: Caliptra RT
26,094,367 UART: [state] CFI Enabled
26,260,511 UART: [rt] RT listening for mailbox commands...
26,262,402 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,293,237 UART: [rt]cmd =0x52564348, len=36
26,294,783 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,752,634 ready_for_fw is high
3,753,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,221 >>> mbox cmd response: success
19,213,921 UART:
19,214,316 UART: Running Caliptra FMC ...
19,215,419 UART:
19,215,566 UART: [state] CFI Enabled
19,223,766 UART: [fht] FMC Alias Private Key: 7
20,980,956 UART: [art] Extend RT PCRs Done
20,982,191 UART: [art] Lock RT PCRs Done
20,983,415 UART: [art] Populate DV Done
20,989,092 UART: [fht] FMC Alias Private Key: 7
20,990,634 UART: [art] Derive CDI
20,991,445 UART: [art] Store in in slot 0x4
21,033,714 UART: [art] Derive Key Pair
21,034,713 UART: [art] Store priv key in slot 0x5
23,461,159 UART: [art] Derive Key Pair - Done
23,474,430 UART: [art] Signing Cert with AUTHO
23,475,735 UART: RITY.KEYID = 7
25,180,877 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,384 UART: [art] PUB.X = D84143843D4BEF880E2F9B44438CC6B9030AFFF9AFB4601D3F63B1C1F9D34737B581605CCF9EACA5185ABC1A0ACA575A
25,189,681 UART: [art] PUB.Y = 6DDFAB2CC2EB7CCCCC6FA41424CACEAE8A04B912371C86C3FB7D74C2596C5311589F3A80C94796DFE550F33DB5CE4620
25,196,917 UART: [art] SIG.R = F90486DBB0266F3F82AAB6D981D1AB5B1F6CA33D251E81C183938B068FF7A7CB95EC2A014D01A59D641760028CDC9B9E
25,204,373 UART: [art] SIG.S = 7881740E3233B58FFD6504255ABE37B40794FC655F3E36B7D5F70A875072105DEB08160C1AEF1D41D64E7D1F0ABC3697
26,182,728 UART: Caliptra RT
26,183,438 UART: [state] CFI Enabled
26,300,609 UART: [rt] RT listening for mailbox commands...
26,302,500 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,332,532 UART: [rt]cmd =0x52564348, len=36
26,334,125 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,777 UART: [kat] SHA2-256
881,708 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,823 UART: [kat] ++
885,975 UART: [kat] sha1
890,081 UART: [kat] SHA2-256
892,019 UART: [kat] SHA2-384
894,858 UART: [kat] SHA2-512-ACC
896,759 UART: [kat] ECC-384
902,260 UART: [kat] HMAC-384Kdf
906,940 UART: [kat] LMS
1,475,136 UART: [kat] --
1,476,093 UART: [cold-reset] ++
1,476,561 UART: [fht] Storing FHT @ 0x50003400
1,479,148 UART: [idev] ++
1,479,316 UART: [idev] CDI.KEYID = 6
1,479,676 UART: [idev] SUBJECT.KEYID = 7
1,480,100 UART: [idev] UDS.KEYID = 0
1,480,445 ready_for_fw is high
1,480,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,366 UART: [idev] Erasing UDS.KEYID = 0
1,505,224 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,772 UART: [idev] --
1,514,785 UART: [ldev] ++
1,514,953 UART: [ldev] CDI.KEYID = 6
1,515,316 UART: [ldev] SUBJECT.KEYID = 5
1,515,742 UART: [ldev] AUTHORITY.KEYID = 7
1,516,205 UART: [ldev] FE.KEYID = 1
1,521,491 UART: [ldev] Erasing FE.KEYID = 1
1,546,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,008 UART: [ldev] --
1,586,269 UART: [fwproc] Waiting for Commands...
1,587,028 UART: [fwproc] Received command 0x46574c44
1,587,819 UART: [fwproc] Received Image of size 114448 bytes
2,886,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,083 >>> mbox cmd response: success
3,081,289 UART: [afmc] ++
3,081,457 UART: [afmc] CDI.KEYID = 6
3,081,819 UART: [afmc] SUBJECT.KEYID = 7
3,082,244 UART: [afmc] AUTHORITY.KEYID = 5
3,117,669 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,577 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,190 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,880 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,661 UART: [afmc] --
3,160,705 UART: [cold-reset] --
3,161,421 UART: [state] Locking Datavault
3,162,510 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,114 UART: [state] Locking ICCM
3,163,648 UART: [exit] Launching FMC @ 0x40000130
3,168,977 UART:
3,168,993 UART: Running Caliptra FMC ...
3,169,401 UART:
3,169,455 UART: [state] CFI Enabled
3,179,972 UART: [fht] FMC Alias Private Key: 7
3,288,097 UART: [art] Extend RT PCRs Done
3,288,525 UART: [art] Lock RT PCRs Done
3,290,295 UART: [art] Populate DV Done
3,298,540 UART: [fht] FMC Alias Private Key: 7
3,299,696 UART: [art] Derive CDI
3,299,976 UART: [art] Store in in slot 0x4
3,385,819 UART: [art] Derive Key Pair
3,386,179 UART: [art] Store priv key in slot 0x5
3,399,393 UART: [art] Derive Key Pair - Done
3,414,321 UART: [art] Signing Cert with AUTHO
3,414,801 UART: RITY.KEYID = 7
3,429,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,520 UART: [art] PUB.X = E4BF53FB4C2E91AB04521270D634FC73CEB079676630E1D522EEFC1F1EE7AE8436C011771474BF973890EA08B03FF3F8
3,437,292 UART: [art] PUB.Y = 46E9B27D7E6D24784143C248D88A71EDF838DD5B565C6BA46C9F560DCD00A885036C21312B8BBA9F40C330A2EAD41E74
3,444,222 UART: [art] SIG.R = 02906BAF8CE050A08436B38AC7F49B62D912822F84AE30E89BB231F6B47E17BDF27F8976D3328C3E01042E2903A66E72
3,450,980 UART: [art] SIG.S = 67A42BB6E919FA917B8729A97047DB4DAE0A2681E4FDC2EC70CECA5B98E60A642D2559A8DA9CC715A0650DDD84B0F82E
3,475,278 UART: Caliptra RT
3,475,531 UART: [state] CFI Enabled
3,583,759 UART: [rt] RT listening for mailbox commands...
3,584,429 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,343 UART: [rt]cmd =0x52564348, len=36
3,615,967 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,829 ready_for_fw is high
1,361,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,919 >>> mbox cmd response: success
2,989,025 UART:
2,989,041 UART: Running Caliptra FMC ...
2,989,449 UART:
2,989,503 UART: [state] CFI Enabled
2,999,704 UART: [fht] FMC Alias Private Key: 7
3,108,409 UART: [art] Extend RT PCRs Done
3,108,837 UART: [art] Lock RT PCRs Done
3,109,801 UART: [art] Populate DV Done
3,117,624 UART: [fht] FMC Alias Private Key: 7
3,118,802 UART: [art] Derive CDI
3,119,082 UART: [art] Store in in slot 0x4
3,204,167 UART: [art] Derive Key Pair
3,204,527 UART: [art] Store priv key in slot 0x5
3,217,177 UART: [art] Derive Key Pair - Done
3,231,729 UART: [art] Signing Cert with AUTHO
3,232,209 UART: RITY.KEYID = 7
3,247,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,306 UART: [art] PUB.X = 916636D4599AD3CC0F8B2F4D949BEDD226930B8ED9DACC50201DABA2B511526D2D3A9BF9DE080027FCDC2D2D6D35DA1E
3,255,067 UART: [art] PUB.Y = 480A59237D5CACB83068FCE2DD2C3B17AA5C42D18C98BFFE11F81EE8E426CC32974707AFD40195CD20B480F9A0438AC9
3,262,022 UART: [art] SIG.R = DBB9A0FFD657A31089EBDD20F3F010713526ACAD07CEB59E6EA081796D89E58CBEB83E73312609D797F7987D5EAC4A34
3,268,800 UART: [art] SIG.S = CC5F7B444359BBB834691C5C3864DB846DFAF877FF102A35C1A4B5B8778C37E6C93762D6F770DA1A6A4DF41631CA6A89
3,292,449 UART: Caliptra RT
3,292,702 UART: [state] CFI Enabled
3,400,650 UART: [rt] RT listening for mailbox commands...
3,401,320 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,212 UART: [rt]cmd =0x52564348, len=36
3,432,620 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,418 UART: [kat] SHA2-256
882,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,464 UART: [kat] ++
886,616 UART: [kat] sha1
890,834 UART: [kat] SHA2-256
892,772 UART: [kat] SHA2-384
895,619 UART: [kat] SHA2-512-ACC
897,520 UART: [kat] ECC-384
903,233 UART: [kat] HMAC-384Kdf
907,953 UART: [kat] LMS
1,476,149 UART: [kat] --
1,477,180 UART: [cold-reset] ++
1,477,550 UART: [fht] Storing FHT @ 0x50003400
1,480,313 UART: [idev] ++
1,480,481 UART: [idev] CDI.KEYID = 6
1,480,841 UART: [idev] SUBJECT.KEYID = 7
1,481,265 UART: [idev] UDS.KEYID = 0
1,481,610 ready_for_fw is high
1,481,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,443 UART: [idev] Erasing UDS.KEYID = 0
1,505,787 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,393 UART: [idev] --
1,515,576 UART: [ldev] ++
1,515,744 UART: [ldev] CDI.KEYID = 6
1,516,107 UART: [ldev] SUBJECT.KEYID = 5
1,516,533 UART: [ldev] AUTHORITY.KEYID = 7
1,516,996 UART: [ldev] FE.KEYID = 1
1,522,272 UART: [ldev] Erasing FE.KEYID = 1
1,547,973 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,883 UART: [ldev] --
1,587,178 UART: [fwproc] Waiting for Commands...
1,588,029 UART: [fwproc] Received command 0x46574c44
1,588,820 UART: [fwproc] Received Image of size 114448 bytes
2,888,235 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,875 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,212 >>> mbox cmd response: success
3,082,318 UART: [afmc] ++
3,082,486 UART: [afmc] CDI.KEYID = 6
3,082,848 UART: [afmc] SUBJECT.KEYID = 7
3,083,273 UART: [afmc] AUTHORITY.KEYID = 5
3,119,254 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,662 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,055 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,745 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,506 UART: [afmc] --
3,162,606 UART: [cold-reset] --
3,163,370 UART: [state] Locking Datavault
3,164,641 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,245 UART: [state] Locking ICCM
3,165,737 UART: [exit] Launching FMC @ 0x40000130
3,171,066 UART:
3,171,082 UART: Running Caliptra FMC ...
3,171,490 UART:
3,171,633 UART: [state] CFI Enabled
3,182,592 UART: [fht] FMC Alias Private Key: 7
3,290,459 UART: [art] Extend RT PCRs Done
3,290,887 UART: [art] Lock RT PCRs Done
3,292,031 UART: [art] Populate DV Done
3,299,972 UART: [fht] FMC Alias Private Key: 7
3,301,150 UART: [art] Derive CDI
3,301,430 UART: [art] Store in in slot 0x4
3,386,991 UART: [art] Derive Key Pair
3,387,351 UART: [art] Store priv key in slot 0x5
3,400,809 UART: [art] Derive Key Pair - Done
3,415,572 UART: [art] Signing Cert with AUTHO
3,416,052 UART: RITY.KEYID = 7
3,431,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,215 UART: [art] PUB.X = 32CB88388EF1A74EE16419D3DA65D9C4EE550E475F3B5F94D0FA9A8E0384385A58925FD49EB96D6FD1BBA0F05C1C479A
3,438,993 UART: [art] PUB.Y = 7646693E669ACB84AA3A1C250A910CF30E01CE973DF846B24C9F3734728A0F2F79772FECE83787051CBCBE06276ECFBE
3,445,932 UART: [art] SIG.R = A057D99EA4A5EDC805FFE74078858392881B05375414384F479ADC193681656B0D538C8975067A424F8A44600F261CD2
3,452,675 UART: [art] SIG.S = C08B7B762F32B54950D579CBE33AC38AFA2A2CBB0013445CF53228841209383274134E2693659BBD7CF3FD60F79FD651
3,476,271 UART: Caliptra RT
3,476,616 UART: [state] CFI Enabled
3,585,110 UART: [rt] RT listening for mailbox commands...
3,585,780 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,420 UART: [rt]cmd =0x52564348, len=36
3,616,494 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,442 ready_for_fw is high
1,362,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,014 >>> mbox cmd response: success
2,992,188 UART:
2,992,204 UART: Running Caliptra FMC ...
2,992,612 UART:
2,992,755 UART: [state] CFI Enabled
3,003,754 UART: [fht] FMC Alias Private Key: 7
3,111,991 UART: [art] Extend RT PCRs Done
3,112,419 UART: [art] Lock RT PCRs Done
3,114,121 UART: [art] Populate DV Done
3,122,280 UART: [fht] FMC Alias Private Key: 7
3,123,266 UART: [art] Derive CDI
3,123,546 UART: [art] Store in in slot 0x4
3,209,253 UART: [art] Derive Key Pair
3,209,613 UART: [art] Store priv key in slot 0x5
3,222,943 UART: [art] Derive Key Pair - Done
3,237,560 UART: [art] Signing Cert with AUTHO
3,238,040 UART: RITY.KEYID = 7
3,253,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,163 UART: [art] PUB.X = 69FF8A01DBFFF443F618E475CF1BEF2149C49B13CA2C24E4BF6D465F1E60C5F9B118C300835FE7257420B0A4DA232A4E
3,260,922 UART: [art] PUB.Y = 14529B41B71EA47E781A4E8AA8D68ECECDD615D597CBAF1328E2982B199C2BE02A5EC1DAEB587C5B08309AA3D0A97B1E
3,267,889 UART: [art] SIG.R = 63EDC0DFE22037E57A71B822AEE9246471571EB69BB476E1C311F4520F35A67B237812D7976B6920707167C786E62DF6
3,274,650 UART: [art] SIG.S = 15A4D2B41F48329A33FC69FC001742B0C26307FB20B2C0ECCBFB90E5EB5107E9BFCBFF879B96AB5C49ED89A163C3095A
3,298,600 UART: Caliptra RT
3,298,945 UART: [state] CFI Enabled
3,407,967 UART: [rt] RT listening for mailbox commands...
3,408,637 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,755 UART: [rt]cmd =0x52564348, len=36
3,440,321 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
893,374 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,499 UART: [kat] ++
897,651 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
917,942 UART: [kat] HMAC-384Kdf
922,626 UART: [kat] LMS
1,170,954 UART: [kat] --
1,172,027 UART: [cold-reset] ++
1,172,563 UART: [fht] FHT @ 0x50003400
1,175,298 UART: [idev] ++
1,175,466 UART: [idev] CDI.KEYID = 6
1,175,826 UART: [idev] SUBJECT.KEYID = 7
1,176,250 UART: [idev] UDS.KEYID = 0
1,176,595 ready_for_fw is high
1,176,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,148 UART: [idev] Erasing UDS.KEYID = 0
1,200,955 UART: [idev] Sha1 KeyId Algorithm
1,209,395 UART: [idev] --
1,210,437 UART: [ldev] ++
1,210,605 UART: [ldev] CDI.KEYID = 6
1,210,968 UART: [ldev] SUBJECT.KEYID = 5
1,211,394 UART: [ldev] AUTHORITY.KEYID = 7
1,211,857 UART: [ldev] FE.KEYID = 1
1,217,065 UART: [ldev] Erasing FE.KEYID = 1
1,244,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,915 UART: [ldev] --
1,283,230 UART: [fwproc] Wait for Commands...
1,283,830 UART: [fwproc] Recv command 0x46574c44
1,284,558 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,376 >>> mbox cmd response: success
2,777,628 UART: [afmc] ++
2,777,796 UART: [afmc] CDI.KEYID = 6
2,778,158 UART: [afmc] SUBJECT.KEYID = 7
2,778,583 UART: [afmc] AUTHORITY.KEYID = 5
2,814,000 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,773 UART: [afmc] --
2,857,861 UART: [cold-reset] --
2,858,647 UART: [state] Locking Datavault
2,859,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,438 UART: [state] Locking ICCM
2,861,068 UART: [exit] Launching FMC @ 0x40000130
2,866,397 UART:
2,866,413 UART: Running Caliptra FMC ...
2,866,821 UART:
2,866,875 UART: [state] CFI Enabled
2,877,230 UART: [fht] FMC Alias Private Key: 7
2,985,829 UART: [art] Extend RT PCRs Done
2,986,257 UART: [art] Lock RT PCRs Done
2,987,799 UART: [art] Populate DV Done
2,996,174 UART: [fht] FMC Alias Private Key: 7
2,997,218 UART: [art] Derive CDI
2,997,498 UART: [art] Store in in slot 0x4
3,082,999 UART: [art] Derive Key Pair
3,083,359 UART: [art] Store priv key in slot 0x5
3,096,495 UART: [art] Derive Key Pair - Done
3,110,994 UART: [art] Signing Cert with AUTHO
3,111,474 UART: RITY.KEYID = 7
3,126,084 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,849 UART: [art] PUB.X = 87EAF4D0D72B7A961EE144DE9A5D9538DE009061E5F4070E541808BB63872D01439A089C54435802F4DD420F6E981949
3,133,570 UART: [art] PUB.Y = A6A90AFD7CEB44133A4EE917BCB31DE7896F1BF13A54DA02008F11C948CBFD259C842F038B8C12C6B42A25A71C6D49F7
3,140,505 UART: [art] SIG.R = 9055245ED5B0D4A435ECFFB3E5BC637C1687355225864A6C21856A1F4270C7464D954840012A8FE0F1056DEA8F99686C
3,147,265 UART: [art] SIG.S = 035505F5479B984F51046C525738671AB7E0D15EE01620A9C26B96D3F0337A38C08B86666A259AE5EB5110CB84010181
3,171,241 UART: Caliptra RT
3,171,494 UART: [state] CFI Enabled
3,279,691 UART: [rt] RT listening for mailbox commands...
3,280,361 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,471 UART: [rt]cmd =0x52564348, len=36
3,311,933 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,047 ready_for_fw is high
1,060,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,517 >>> mbox cmd response: success
2,689,305 UART:
2,689,321 UART: Running Caliptra FMC ...
2,689,729 UART:
2,689,783 UART: [state] CFI Enabled
2,699,932 UART: [fht] FMC Alias Private Key: 7
2,807,713 UART: [art] Extend RT PCRs Done
2,808,141 UART: [art] Lock RT PCRs Done
2,809,851 UART: [art] Populate DV Done
2,818,114 UART: [fht] FMC Alias Private Key: 7
2,819,060 UART: [art] Derive CDI
2,819,340 UART: [art] Store in in slot 0x4
2,905,419 UART: [art] Derive Key Pair
2,905,779 UART: [art] Store priv key in slot 0x5
2,918,929 UART: [art] Derive Key Pair - Done
2,933,549 UART: [art] Signing Cert with AUTHO
2,934,029 UART: RITY.KEYID = 7
2,948,987 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,752 UART: [art] PUB.X = D1B7E7CF7DB763C7EEB15FC3323B166D1DEED4EF92943F967C0E71621F6B5357EAD5AFA5AD4E04A840D573E02AA54FC6
2,956,538 UART: [art] PUB.Y = B9FD9368FF8671159DDA9E0FA560EB0B9D457379C452BF5F05D2F0BDAD3E4E1E44C1B6AE2ADB09AC9F45948237ECBAE0
2,963,500 UART: [art] SIG.R = 96F6A827A0F6300EF66E9FC1A46763B5059B86498062CFFB8D70FD1D7A4D6DD13D2725476FD02E016A959944BAB27730
2,970,263 UART: [art] SIG.S = D08A79AC7E558A33EE46B6DC7730AC53565A31B13B27A442101E389D76BD28913AA89175D79BBD846CF9360179E5B449
2,994,305 UART: Caliptra RT
2,994,558 UART: [state] CFI Enabled
3,101,886 UART: [rt] RT listening for mailbox commands...
3,102,556 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,930 UART: [rt]cmd =0x52564348, len=36
3,134,370 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
893,731 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,856 UART: [kat] ++
898,008 UART: [kat] sha1
902,282 UART: [kat] SHA2-256
904,222 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,487 UART: [kat] HMAC-384Kdf
923,185 UART: [kat] LMS
1,171,513 UART: [kat] --
1,172,166 UART: [cold-reset] ++
1,172,536 UART: [fht] FHT @ 0x50003400
1,175,121 UART: [idev] ++
1,175,289 UART: [idev] CDI.KEYID = 6
1,175,649 UART: [idev] SUBJECT.KEYID = 7
1,176,073 UART: [idev] UDS.KEYID = 0
1,176,418 ready_for_fw is high
1,176,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,345 UART: [idev] Erasing UDS.KEYID = 0
1,201,584 UART: [idev] Sha1 KeyId Algorithm
1,209,984 UART: [idev] --
1,211,150 UART: [ldev] ++
1,211,318 UART: [ldev] CDI.KEYID = 6
1,211,681 UART: [ldev] SUBJECT.KEYID = 5
1,212,107 UART: [ldev] AUTHORITY.KEYID = 7
1,212,570 UART: [ldev] FE.KEYID = 1
1,217,794 UART: [ldev] Erasing FE.KEYID = 1
1,244,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,194 UART: [ldev] --
1,283,629 UART: [fwproc] Wait for Commands...
1,284,403 UART: [fwproc] Recv command 0x46574c44
1,285,131 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,435 >>> mbox cmd response: success
2,777,543 UART: [afmc] ++
2,777,711 UART: [afmc] CDI.KEYID = 6
2,778,073 UART: [afmc] SUBJECT.KEYID = 7
2,778,498 UART: [afmc] AUTHORITY.KEYID = 5
2,814,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,399 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,118 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,838 UART: [afmc] --
2,857,768 UART: [cold-reset] --
2,858,474 UART: [state] Locking Datavault
2,859,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,583 UART: [state] Locking ICCM
2,861,229 UART: [exit] Launching FMC @ 0x40000130
2,866,558 UART:
2,866,574 UART: Running Caliptra FMC ...
2,866,982 UART:
2,867,125 UART: [state] CFI Enabled
2,877,670 UART: [fht] FMC Alias Private Key: 7
2,985,567 UART: [art] Extend RT PCRs Done
2,985,995 UART: [art] Lock RT PCRs Done
2,987,691 UART: [art] Populate DV Done
2,995,638 UART: [fht] FMC Alias Private Key: 7
2,996,682 UART: [art] Derive CDI
2,996,962 UART: [art] Store in in slot 0x4
3,082,363 UART: [art] Derive Key Pair
3,082,723 UART: [art] Store priv key in slot 0x5
3,096,269 UART: [art] Derive Key Pair - Done
3,111,135 UART: [art] Signing Cert with AUTHO
3,111,615 UART: RITY.KEYID = 7
3,126,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,656 UART: [art] PUB.X = BBC0B2F95F0A4EF398D8C0AE8097EF928C1583458000DC4F73E049E536B602E57C2AAC7F0F4104AFC449E90BE2092EBF
3,134,400 UART: [art] PUB.Y = 9AC6271131F38D6571F08858E2161BF5B8644150878C0120326AE29CC8CC490691EBF54167A9BC21516B105DE7E7CCE8
3,141,340 UART: [art] SIG.R = 2CE423F345C5918BAD988BEB72406B550A40B20BEDD7D8C5C8BB140A6BAEBA3CBFDD920C1B1B33CFD1ADBF59526EA137
3,148,126 UART: [art] SIG.S = B2006A78FDCAA74EC8990D7ACF6BC23C36EFFA1B5DB1846ED2DF32F446EA08F7F7B457F4313560C3C02617B907800764
3,172,355 UART: Caliptra RT
3,172,700 UART: [state] CFI Enabled
3,280,677 UART: [rt] RT listening for mailbox commands...
3,281,347 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,373 UART: [rt]cmd =0x52564348, len=36
3,312,935 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,236 ready_for_fw is high
1,060,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,680 >>> mbox cmd response: success
2,689,216 UART:
2,689,232 UART: Running Caliptra FMC ...
2,689,640 UART:
2,689,783 UART: [state] CFI Enabled
2,700,560 UART: [fht] FMC Alias Private Key: 7
2,808,695 UART: [art] Extend RT PCRs Done
2,809,123 UART: [art] Lock RT PCRs Done
2,810,661 UART: [art] Populate DV Done
2,818,816 UART: [fht] FMC Alias Private Key: 7
2,819,828 UART: [art] Derive CDI
2,820,108 UART: [art] Store in in slot 0x4
2,905,821 UART: [art] Derive Key Pair
2,906,181 UART: [art] Store priv key in slot 0x5
2,919,309 UART: [art] Derive Key Pair - Done
2,933,944 UART: [art] Signing Cert with AUTHO
2,934,424 UART: RITY.KEYID = 7
2,949,276 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,041 UART: [art] PUB.X = 0E759481DA6F10904BB7C1E1B8E5909B014EC77988620B23BB8F3473DF856E866C05698F98DA2206CC7C7F2E51D4E342
2,956,796 UART: [art] PUB.Y = 4B855013781F24C2249F4C3D42EACF227CCFA989B56C2E29D60FC9DD18F356A56EFF9E4DAD61212C105C04E04397F733
2,963,748 UART: [art] SIG.R = 7CC85B5B9192F6193C32332533B9E8930C778F2CE60941D250833A4DA40F0D09AF347E3FBE42AC3784AD04F584075E64
2,970,495 UART: [art] SIG.S = BC9B3962EAC0FC19FCB6F8C6993F5DE659AF62A5C4B037DFE1E44BAA5B97D9DCB4DF80C2B424E095A73760495F381293
2,994,420 UART: Caliptra RT
2,994,765 UART: [state] CFI Enabled
3,101,820 UART: [rt] RT listening for mailbox commands...
3,102,490 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,552 UART: [rt]cmd =0x52564348, len=36
3,134,070 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,256 UART: [kat] SHA2-512-ACC
906,157 UART: [kat] ECC-384
915,796 UART: [kat] HMAC-384Kdf
920,548 UART: [kat] LMS
1,168,860 UART: [kat] --
1,169,703 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,887 UART: [idev] ++
1,173,055 UART: [idev] CDI.KEYID = 6
1,173,416 UART: [idev] SUBJECT.KEYID = 7
1,173,841 UART: [idev] UDS.KEYID = 0
1,174,187 ready_for_fw is high
1,174,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,623 UART: [idev] Erasing UDS.KEYID = 0
1,198,713 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,516 UART: [ldev] ++
1,208,684 UART: [ldev] CDI.KEYID = 6
1,209,048 UART: [ldev] SUBJECT.KEYID = 5
1,209,475 UART: [ldev] AUTHORITY.KEYID = 7
1,209,938 UART: [ldev] FE.KEYID = 1
1,215,202 UART: [ldev] Erasing FE.KEYID = 1
1,241,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,206 UART: [ldev] --
1,280,654 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,810 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,776 >>> mbox cmd response: success
2,774,807 UART: [afmc] ++
2,774,975 UART: [afmc] CDI.KEYID = 6
2,775,338 UART: [afmc] SUBJECT.KEYID = 7
2,775,764 UART: [afmc] AUTHORITY.KEYID = 5
2,811,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,216 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,935 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,698 UART: [afmc] --
2,854,780 UART: [cold-reset] --
2,855,608 UART: [state] Locking Datavault
2,856,763 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,367 UART: [state] Locking ICCM
2,857,943 UART: [exit] Launching FMC @ 0x40000130
2,863,272 UART:
2,863,288 UART: Running Caliptra FMC ...
2,863,696 UART:
2,863,750 UART: [state] CFI Enabled
2,874,355 UART: [fht] FMC Alias Private Key: 7
2,982,122 UART: [art] Extend RT PCRs Done
2,982,550 UART: [art] Lock RT PCRs Done
2,984,310 UART: [art] Populate DV Done
2,992,505 UART: [fht] FMC Alias Private Key: 7
2,993,463 UART: [art] Derive CDI
2,993,743 UART: [art] Store in in slot 0x4
3,079,488 UART: [art] Derive Key Pair
3,079,848 UART: [art] Store priv key in slot 0x5
3,092,866 UART: [art] Derive Key Pair - Done
3,107,615 UART: [art] Signing Cert with AUTHO
3,108,095 UART: RITY.KEYID = 7
3,122,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,744 UART: [art] PUB.X = 1781FE96AE593B83C57E8DDD6B2A60B5914E881025AE022BDBE3BD7E0B69E981CE1E4E078BBDF8CF9C484C15FA8C88E4
3,130,525 UART: [art] PUB.Y = 70B14CE094A3B3F0290FDDDD7110711E11D62C66ECB941D9DAB8B015395484D2DC6FB8A7B95E6660C7AFE8E03AA44A10
3,137,486 UART: [art] SIG.R = C0F32D7C4E4DFC82F36A49E4FC17E005862673C474B617C9CE5E1975D6C77C559BEC5A14FBE0AAC945321B3742A74F05
3,144,260 UART: [art] SIG.S = D5583D2658CE597C884FB09EA8A19617A1D9DBFECE5C98BA9EF230858E0DD1EF15A6F0061B893186AE3E323FE66C3B81
3,167,873 UART: Caliptra RT
3,168,126 UART: [state] CFI Enabled
3,275,268 UART: [rt] RT listening for mailbox commands...
3,275,938 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,192 UART: [rt]cmd =0x52564348, len=36
3,307,344 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,496 ready_for_fw is high
1,055,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,946 >>> mbox cmd response: success
2,686,694 UART:
2,686,710 UART: Running Caliptra FMC ...
2,687,118 UART:
2,687,172 UART: [state] CFI Enabled
2,697,821 UART: [fht] FMC Alias Private Key: 7
2,806,242 UART: [art] Extend RT PCRs Done
2,806,670 UART: [art] Lock RT PCRs Done
2,808,182 UART: [art] Populate DV Done
2,816,443 UART: [fht] FMC Alias Private Key: 7
2,817,487 UART: [art] Derive CDI
2,817,767 UART: [art] Store in in slot 0x4
2,903,410 UART: [art] Derive Key Pair
2,903,770 UART: [art] Store priv key in slot 0x5
2,916,666 UART: [art] Derive Key Pair - Done
2,931,348 UART: [art] Signing Cert with AUTHO
2,931,828 UART: RITY.KEYID = 7
2,947,290 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,055 UART: [art] PUB.X = 8298B9305FE3A762919B80584CB739E5F970B6E5967052A33A52C7545357B7F6C14862CBCACC53347FF895EF0CB55D41
2,954,820 UART: [art] PUB.Y = DE4801C64C19BE701BF5E74AD2BE90CCDE79252C67CC302F21B039FA0B3B8A212B8A38299F439BF7ABC6D4A9A2B8069C
2,961,779 UART: [art] SIG.R = 73CCEBD2349C01211062083044F0AEB6884E55BB78D60C308E8155BE766A0A72E1EAC417872C1CA8504C0FA35763DBBB
2,968,540 UART: [art] SIG.S = D6425B98D2B636D48E584CD9169BE70A53F3A1379B5C1B479CAA1025764CD171E5AB4F48AF0802A85D3336FD25DC7688
2,992,486 UART: Caliptra RT
2,992,739 UART: [state] CFI Enabled
3,100,600 UART: [rt] RT listening for mailbox commands...
3,101,270 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,444 UART: [rt]cmd =0x52564348, len=36
3,132,772 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,515 UART: [kat] LMS
1,168,827 UART: [kat] --
1,169,642 UART: [cold-reset] ++
1,170,150 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,174,320 ready_for_fw is high
1,174,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,860 UART: [idev] Erasing UDS.KEYID = 0
1,198,846 UART: [idev] Sha1 KeyId Algorithm
1,207,842 UART: [idev] --
1,209,117 UART: [ldev] ++
1,209,285 UART: [ldev] CDI.KEYID = 6
1,209,649 UART: [ldev] SUBJECT.KEYID = 5
1,210,076 UART: [ldev] AUTHORITY.KEYID = 7
1,210,539 UART: [ldev] FE.KEYID = 1
1,215,989 UART: [ldev] Erasing FE.KEYID = 1
1,242,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,607 UART: [ldev] --
1,281,995 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,399 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,919 >>> mbox cmd response: success
2,776,060 UART: [afmc] ++
2,776,228 UART: [afmc] CDI.KEYID = 6
2,776,591 UART: [afmc] SUBJECT.KEYID = 7
2,777,017 UART: [afmc] AUTHORITY.KEYID = 5
2,812,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,057 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,786 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,669 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,388 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,309 UART: [afmc] --
2,856,349 UART: [cold-reset] --
2,857,019 UART: [state] Locking Datavault
2,858,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,898 UART: [state] Locking ICCM
2,859,506 UART: [exit] Launching FMC @ 0x40000130
2,864,835 UART:
2,864,851 UART: Running Caliptra FMC ...
2,865,259 UART:
2,865,402 UART: [state] CFI Enabled
2,876,069 UART: [fht] FMC Alias Private Key: 7
2,984,042 UART: [art] Extend RT PCRs Done
2,984,470 UART: [art] Lock RT PCRs Done
2,985,850 UART: [art] Populate DV Done
2,994,259 UART: [fht] FMC Alias Private Key: 7
2,995,341 UART: [art] Derive CDI
2,995,621 UART: [art] Store in in slot 0x4
3,081,502 UART: [art] Derive Key Pair
3,081,862 UART: [art] Store priv key in slot 0x5
3,095,038 UART: [art] Derive Key Pair - Done
3,109,737 UART: [art] Signing Cert with AUTHO
3,110,217 UART: RITY.KEYID = 7
3,125,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,284 UART: [art] PUB.X = BC48820B330AA3A8A4414EBF36B4C5A196255478B904478D5CA72812B1D2C90ADB965B05604F9E6CA10B1C502C8E30B8
3,133,040 UART: [art] PUB.Y = D9E63A2B880A28A7F4D32419D910545059976AED9C7B4B9D85289840A6D0616FF8DE4D00C03A6C2ED8ABE9ECDB772BA1
3,139,977 UART: [art] SIG.R = BA3E7793A598A3FC49557AD9AFD63928B82344DD407CB72558449F00FD8803FF035916856B27B5AE48CB6F6EB4CF7CC8
3,146,727 UART: [art] SIG.S = B8E4A9FFFB5D27D5AA0CAFB5A226AE3FCFE2DE2B11CA3F4CA79DC0A0AC939781B95CE0AE40444490ED7A0C469388E3FD
3,171,216 UART: Caliptra RT
3,171,561 UART: [state] CFI Enabled
3,279,593 UART: [rt] RT listening for mailbox commands...
3,280,263 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,461 UART: [rt]cmd =0x52564348, len=36
3,311,917 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,627 ready_for_fw is high
1,056,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,127 >>> mbox cmd response: success
2,686,241 UART:
2,686,257 UART: Running Caliptra FMC ...
2,686,665 UART:
2,686,808 UART: [state] CFI Enabled
2,697,233 UART: [fht] FMC Alias Private Key: 7
2,805,334 UART: [art] Extend RT PCRs Done
2,805,762 UART: [art] Lock RT PCRs Done
2,807,358 UART: [art] Populate DV Done
2,815,565 UART: [fht] FMC Alias Private Key: 7
2,816,697 UART: [art] Derive CDI
2,816,977 UART: [art] Store in in slot 0x4
2,902,874 UART: [art] Derive Key Pair
2,903,234 UART: [art] Store priv key in slot 0x5
2,916,292 UART: [art] Derive Key Pair - Done
2,930,843 UART: [art] Signing Cert with AUTHO
2,931,323 UART: RITY.KEYID = 7
2,946,483 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,248 UART: [art] PUB.X = F557CCB622B3C232266698B167C40B454E8A9C3630F309AB5F7D72453F38FB78223FF949FED53F74AF80CC0BEDCEF33F
2,954,021 UART: [art] PUB.Y = 4CF3E668DEDBA1AD092A269CD4EB37D1166166491064DDBC9B8CD67494AFAF454C5907218D642B4DAD311149011FB2C7
2,960,972 UART: [art] SIG.R = D3DF631D1C700985ACDEACAF5F0A4D6CDF4E2D73BFA8F26238ADE94F261E43BB14E0DC0171A81AE60F8778FFAA7F2789
2,967,756 UART: [art] SIG.S = 633524AD730E82C08D4F970E76C251E8140CD3117AF8C4BFE29F765CAB418BDDA22B5CE8DE4C250659D4F189CE08CD1F
2,991,806 UART: Caliptra RT
2,992,151 UART: [state] CFI Enabled
3,099,974 UART: [rt] RT listening for mailbox commands...
3,100,644 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,908 UART: [rt]cmd =0x52564348, len=36
3,132,354 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,183 UART:
192,556 UART: Running Caliptra ROM ...
193,681 UART:
193,829 UART: [state] CFI Enabled
264,925 UART: [state] LifecycleState = Unprovisioned
266,848 UART: [state] DebugLocked = No
268,657 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,230 UART: [kat] SHA2-256
443,995 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,453 UART: [kat] ++
454,900 UART: [kat] sha1
465,095 UART: [kat] SHA2-256
467,791 UART: [kat] SHA2-384
474,354 UART: [kat] SHA2-512-ACC
476,728 UART: [kat] ECC-384
2,767,463 UART: [kat] HMAC-384Kdf
2,799,809 UART: [kat] LMS
3,990,101 UART: [kat] --
3,994,207 UART: [cold-reset] ++
3,996,285 UART: [fht] Storing FHT @ 0x50003400
4,008,549 UART: [idev] ++
4,009,118 UART: [idev] CDI.KEYID = 6
4,010,079 UART: [idev] SUBJECT.KEYID = 7
4,011,326 UART: [idev] UDS.KEYID = 0
4,012,285 ready_for_fw is high
4,012,472 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,997 UART: [idev] Erasing UDS.KEYID = 0
7,348,774 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,874 UART: [idev] --
7,373,703 UART: [ldev] ++
7,374,278 UART: [ldev] CDI.KEYID = 6
7,375,264 UART: [ldev] SUBJECT.KEYID = 5
7,376,475 UART: [ldev] AUTHORITY.KEYID = 7
7,377,713 UART: [ldev] FE.KEYID = 1
7,423,445 UART: [ldev] Erasing FE.KEYID = 1
10,758,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,824 UART: [ldev] --
13,137,040 UART: [fwproc] Waiting for Commands...
13,140,062 UART: [fwproc] Received command 0x46574c44
13,142,255 UART: [fwproc] Received Image of size 114124 bytes
17,191,481 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,562 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,656,444 >>> mbox cmd response: success
17,660,524 UART: [afmc] ++
17,661,117 UART: [afmc] CDI.KEYID = 6
17,662,157 UART: [afmc] SUBJECT.KEYID = 7
17,663,396 UART: [afmc] AUTHORITY.KEYID = 5
21,027,040 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,895 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,157 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,599 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,444 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,839 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,937 UART: [afmc] --
23,397,643 UART: [cold-reset] --
23,401,287 UART: [state] Locking Datavault
23,405,777 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,474 UART: [state] Locking ICCM
23,409,546 UART: [exit] Launching FMC @ 0x40000130
23,417,937 UART:
23,418,179 UART: Running Caliptra FMC ...
23,419,227 UART:
23,419,381 UART: [state] CFI Enabled
23,488,295 UART: [fht] FMC Alias Private Key: 7
25,826,334 UART: [art] Extend RT PCRs Done
25,827,561 UART: [art] Lock RT PCRs Done
25,829,051 UART: [art] Populate DV Done
25,834,626 UART: [fht] FMC Alias Private Key: 7
25,836,378 UART: [art] Derive CDI
25,837,116 UART: [art] Store in in slot 0x4
25,896,806 UART: [art] Derive Key Pair
25,897,804 UART: [art] Store priv key in slot 0x5
29,190,925 UART: [art] Derive Key Pair - Done
29,203,967 UART: [art] Signing Cert with AUTHO
29,205,274 UART: RITY.KEYID = 7
31,492,196 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,702 UART: [art] PUB.X = E8182E50BAC72C42E2772F16806EE6CC7510BCC14D5DB1B2342F5777F817D98B1652EF25BCFFD3DF5A66369081B2DD84
31,500,972 UART: [art] PUB.Y = 99CF6A396B569D6B4937680013B5336875F75563A57F2219AC4453FBCB596C0DD022A654FE8E151E0D6B46D542D9887E
31,508,189 UART: [art] SIG.R = 116B13A27356A3C4E198E23736DDB828C0E368CED7A9015DD6EAE019D4E7A6C7999FCEBBB8162D8D4E76DF8278D82E97
31,515,596 UART: [art] SIG.S = A5380DE38D3D6E71994261074D7946EC75C7010EA36D4E098D364BADB2860CC6AEE584DCAF50DD182B209D88CFEC365A
32,820,932 UART: Caliptra RT
32,821,641 UART: [state] CFI Enabled
32,982,041 UART: [rt] RT listening for mailbox commands...
32,983,941 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,014,520 UART: [rt]cmd =0x53574545, len=84
33,016,444 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,806,509 ready_for_fw is high
3,806,893 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,891,345 >>> mbox cmd response: success
23,587,912 UART:
23,588,386 UART: Running Caliptra FMC ...
23,589,505 UART:
23,589,666 UART: [state] CFI Enabled
23,639,731 UART: [fht] FMC Alias Private Key: 7
25,977,449 UART: [art] Extend RT PCRs Done
25,978,813 UART: [art] Lock RT PCRs Done
25,980,718 UART: [art] Populate DV Done
25,985,887 UART: [fht] FMC Alias Private Key: 7
25,987,433 UART: [art] Derive CDI
25,988,253 UART: [art] Store in in slot 0x4
26,047,850 UART: [art] Derive Key Pair
26,048,854 UART: [art] Store priv key in slot 0x5
29,341,943 UART: [art] Derive Key Pair - Done
29,355,258 UART: [art] Signing Cert with AUTHO
29,356,559 UART: RITY.KEYID = 7
31,643,939 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,444 UART: [art] PUB.X = 0FED46EC118002500E5610973C9B752BD97DB964F7AC21DC2D415BA19DCDCC46CECFC148EC561A8E9BAE42AFCBC1DB50
31,652,717 UART: [art] PUB.Y = 2BD88133C892CDA877578441A45EFC096B5D56EDA76D639ED1AA05A3ABCEAC0C57CD9C14802772D9B3816BC63D896B61
31,659,949 UART: [art] SIG.R = 50082151622E13B86BF0E591F796E6C41905A252707DF987EF091679BBD22E9DDFDE8403E5AC4554475E5B13586C0111
31,667,334 UART: [art] SIG.S = E51B7776602C3C1AFF16DD103957F659027FD2A7EB6B493F01C338BA29F904AA7ED14455E2F004EE76E15D2B211199CA
32,972,164 UART: Caliptra RT
32,972,876 UART: [state] CFI Enabled
33,135,846 UART: [rt] RT listening for mailbox commands...
33,137,735 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,167,990 UART: [rt]cmd =0x53574545, len=84
33,169,809 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,338 UART:
192,708 UART: Running Caliptra ROM ...
193,829 UART:
603,386 UART: [state] CFI Enabled
620,097 UART: [state] LifecycleState = Unprovisioned
622,043 UART: [state] DebugLocked = No
624,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,791 UART: [kat] SHA2-256
799,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,042 UART: [kat] ++
810,557 UART: [kat] sha1
821,442 UART: [kat] SHA2-256
824,200 UART: [kat] SHA2-384
830,475 UART: [kat] SHA2-512-ACC
832,836 UART: [kat] ECC-384
3,115,758 UART: [kat] HMAC-384Kdf
3,128,212 UART: [kat] LMS
4,318,356 UART: [kat] --
4,322,808 UART: [cold-reset] ++
4,325,021 UART: [fht] Storing FHT @ 0x50003400
4,336,519 UART: [idev] ++
4,337,116 UART: [idev] CDI.KEYID = 6
4,338,035 UART: [idev] SUBJECT.KEYID = 7
4,339,287 UART: [idev] UDS.KEYID = 0
4,340,349 ready_for_fw is high
4,340,574 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,802 UART: [idev] Erasing UDS.KEYID = 0
7,624,997 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,400 UART: [idev] --
7,652,463 UART: [ldev] ++
7,653,032 UART: [ldev] CDI.KEYID = 6
7,653,988 UART: [ldev] SUBJECT.KEYID = 5
7,655,198 UART: [ldev] AUTHORITY.KEYID = 7
7,656,420 UART: [ldev] FE.KEYID = 1
7,667,412 UART: [ldev] Erasing FE.KEYID = 1
10,960,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,498 UART: [ldev] --
13,319,684 UART: [fwproc] Waiting for Commands...
13,322,041 UART: [fwproc] Received command 0x46574c44
13,324,272 UART: [fwproc] Received Image of size 114124 bytes
17,382,844 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,435 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,846,286 >>> mbox cmd response: success
17,850,137 UART: [afmc] ++
17,850,729 UART: [afmc] CDI.KEYID = 6
17,851,689 UART: [afmc] SUBJECT.KEYID = 7
17,852,896 UART: [afmc] AUTHORITY.KEYID = 5
21,164,489 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,318 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,571 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,952 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,828 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,231 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,555 UART: [afmc] --
23,531,284 UART: [cold-reset] --
23,535,144 UART: [state] Locking Datavault
23,542,265 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,965 UART: [state] Locking ICCM
23,545,239 UART: [exit] Launching FMC @ 0x40000130
23,553,629 UART:
23,553,857 UART: Running Caliptra FMC ...
23,554,949 UART:
23,555,110 UART: [state] CFI Enabled
23,563,258 UART: [fht] FMC Alias Private Key: 7
25,894,193 UART: [art] Extend RT PCRs Done
25,895,408 UART: [art] Lock RT PCRs Done
25,897,217 UART: [art] Populate DV Done
25,902,510 UART: [fht] FMC Alias Private Key: 7
25,904,044 UART: [art] Derive CDI
25,904,855 UART: [art] Store in in slot 0x4
25,947,501 UART: [art] Derive Key Pair
25,948,543 UART: [art] Store priv key in slot 0x5
29,191,045 UART: [art] Derive Key Pair - Done
29,204,201 UART: [art] Signing Cert with AUTHO
29,205,514 UART: RITY.KEYID = 7
31,485,391 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,893 UART: [art] PUB.X = CA88A4AD832D19B7758336FD7BE2A4E4400BAE3D67B023DBD71D980425F3387F705C141FC7E61C15573B6C81FFF1353F
31,494,174 UART: [art] PUB.Y = FEF76E395CFCF72EAF9F802F3DA1EAD31339525721D7FA535878D246A84ADB5FA6A46EFB3061A9141F77AFD2F8B06C7C
31,501,441 UART: [art] SIG.R = CB6450719EE27918B00AE5CCA1FE3DDEB7048993ED49985885AF2BF57705DE9B1EF58041442F76506F94BDA26D438E72
31,508,780 UART: [art] SIG.S = 9FB279B64E971B49B33B064E973BD635AC01B4EEB4353357A3CE8BE4E314DDFC80BB30E0CC468B3C6F5FA29A8FF0DCED
32,813,780 UART: Caliptra RT
32,814,501 UART: [state] CFI Enabled
32,932,244 UART: [rt] RT listening for mailbox commands...
32,934,153 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,964,839 UART: [rt]cmd =0x53574545, len=84
32,966,864 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,128,429 ready_for_fw is high
4,128,832 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,789 >>> mbox cmd response: success
23,718,315 UART:
23,718,716 UART: Running Caliptra FMC ...
23,719,832 UART:
23,719,981 UART: [state] CFI Enabled
23,727,830 UART: [fht] FMC Alias Private Key: 7
26,058,656 UART: [art] Extend RT PCRs Done
26,059,888 UART: [art] Lock RT PCRs Done
26,061,869 UART: [art] Populate DV Done
26,067,286 UART: [fht] FMC Alias Private Key: 7
26,068,932 UART: [art] Derive CDI
26,069,670 UART: [art] Store in in slot 0x4
26,112,079 UART: [art] Derive Key Pair
26,113,125 UART: [art] Store priv key in slot 0x5
29,354,997 UART: [art] Derive Key Pair - Done
29,368,076 UART: [art] Signing Cert with AUTHO
29,369,386 UART: RITY.KEYID = 7
31,648,823 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,327 UART: [art] PUB.X = F2FC2F520C6F9B2B909AEFDF5E390A9DB3C38865E811986CA86B8AD1494CE24C695457675B8F29490AA1A12FBC64FB4C
31,657,568 UART: [art] PUB.Y = 06562FAFC9B8CB05E3A41C50E6E815BD384966CCE8EF3E17B2FC47694AEFAD701C187402C41873BF2F81DBEA29F63565
31,664,812 UART: [art] SIG.R = 256BDEBDF12494DE3BDECC774B10ACCD0FE9DD0502EA1F5C74EC720D84533671BA2EBA0316DE75BF38D8960D470CF102
31,672,237 UART: [art] SIG.S = ED04B923250F7F3501D6A8C8906608E5066E2BC52F755ED2C65080F21FCB51A9FBDF6B0CB3CACED66554AB15E15ED470
32,977,074 UART: Caliptra RT
32,977,788 UART: [state] CFI Enabled
33,094,501 UART: [rt] RT listening for mailbox commands...
33,096,401 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,127,037 UART: [rt]cmd =0x53574545, len=84
33,128,905 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,324 UART:
192,677 UART: Running Caliptra ROM ...
193,874 UART:
194,047 UART: [state] CFI Enabled
264,398 UART: [state] LifecycleState = Unprovisioned
266,240 UART: [state] DebugLocked = No
267,775 UART: [state] WD Timer not started. Device not locked for debugging
271,166 UART: [kat] SHA2-256
450,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,835 UART: [kat] ++
462,375 UART: [kat] sha1
473,042 UART: [kat] SHA2-256
476,068 UART: [kat] SHA2-384
483,798 UART: [kat] SHA2-512-ACC
486,740 UART: [kat] ECC-384
2,948,987 UART: [kat] HMAC-384Kdf
2,970,748 UART: [kat] LMS
3,500,224 UART: [kat] --
3,503,873 UART: [cold-reset] ++
3,504,756 UART: [fht] FHT @ 0x50003400
3,514,598 UART: [idev] ++
3,515,171 UART: [idev] CDI.KEYID = 6
3,516,265 UART: [idev] SUBJECT.KEYID = 7
3,517,385 UART: [idev] UDS.KEYID = 0
3,518,469 ready_for_fw is high
3,518,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,473 UART: [idev] Erasing UDS.KEYID = 0
6,026,264 UART: [idev] Sha1 KeyId Algorithm
6,049,270 UART: [idev] --
6,053,155 UART: [ldev] ++
6,053,723 UART: [ldev] CDI.KEYID = 6
6,054,615 UART: [ldev] SUBJECT.KEYID = 5
6,055,830 UART: [ldev] AUTHORITY.KEYID = 7
6,057,064 UART: [ldev] FE.KEYID = 1
6,101,589 UART: [ldev] Erasing FE.KEYID = 1
8,605,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,478 UART: [ldev] --
10,414,512 UART: [fwproc] Wait for Commands...
10,417,198 UART: [fwproc] Recv command 0x46574c44
10,419,293 UART: [fwproc] Recv'd Img size: 114448 bytes
13,821,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,470 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,460 >>> mbox cmd response: success
14,286,545 UART: [afmc] ++
14,287,139 UART: [afmc] CDI.KEYID = 6
14,288,027 UART: [afmc] SUBJECT.KEYID = 7
14,289,208 UART: [afmc] AUTHORITY.KEYID = 5
16,833,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,718 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,415 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,406 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,294 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,936 UART: [afmc] --
18,633,579 UART: [cold-reset] --
18,636,848 UART: [state] Locking Datavault
18,641,487 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,141 UART: [state] Locking ICCM
18,644,373 UART: [exit] Launching FMC @ 0x40000130
18,652,766 UART:
18,653,011 UART: Running Caliptra FMC ...
18,654,117 UART:
18,654,293 UART: [state] CFI Enabled
18,714,380 UART: [fht] FMC Alias Private Key: 7
20,478,324 UART: [art] Extend RT PCRs Done
20,479,540 UART: [art] Lock RT PCRs Done
20,481,143 UART: [art] Populate DV Done
20,486,450 UART: [fht] FMC Alias Private Key: 7
20,488,144 UART: [art] Derive CDI
20,488,880 UART: [art] Store in in slot 0x4
20,546,995 UART: [art] Derive Key Pair
20,547,994 UART: [art] Store priv key in slot 0x5
23,010,644 UART: [art] Derive Key Pair - Done
23,023,534 UART: [art] Signing Cert with AUTHO
23,024,840 UART: RITY.KEYID = 7
24,736,394 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,888 UART: [art] PUB.X = 77B19A16B2DDD5E57BC06B61A08E0F33B664F2075FAE01E4057140377B7D4E0E2E58713CA37C7E85AB6E2E3F7174F52E
24,745,199 UART: [art] PUB.Y = 57540C5F011F53F0CEF55C0A23CB23F73C164A81294A4F1C10070E769B35D14CFD2EEB62BE884F59C74B8B1AA51BE54E
24,752,460 UART: [art] SIG.R = CB2AE9F6AD1B5D523C48DC32549B606BA7AADC82F4136C579A245E9AD6831C04991DCDBEE4A46393C26F4E9FD71C46FF
24,759,864 UART: [art] SIG.S = 98D991A35A8F255E9F7CC59B54804DE6F54B199739D7FDB2E4CAECB59A84AB7A25D89AAE16F2435D8907DCC95B29639F
25,738,493 UART: Caliptra RT
25,739,201 UART: [state] CFI Enabled
25,903,781 UART: [rt] RT listening for mailbox commands...
25,905,674 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,936,886 UART: [rt]cmd =0x53574545, len=84
25,938,752 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,361,849 ready_for_fw is high
3,362,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,049,401 >>> mbox cmd response: success
18,344,898 UART:
18,345,285 UART: Running Caliptra FMC ...
18,346,424 UART:
18,346,588 UART: [state] CFI Enabled
18,411,650 UART: [fht] FMC Alias Private Key: 7
20,176,282 UART: [art] Extend RT PCRs Done
20,177,488 UART: [art] Lock RT PCRs Done
20,178,787 UART: [art] Populate DV Done
20,183,884 UART: [fht] FMC Alias Private Key: 7
20,185,492 UART: [art] Derive CDI
20,186,252 UART: [art] Store in in slot 0x4
20,244,810 UART: [art] Derive Key Pair
20,245,851 UART: [art] Store priv key in slot 0x5
22,709,288 UART: [art] Derive Key Pair - Done
22,722,290 UART: [art] Signing Cert with AUTHO
22,723,599 UART: RITY.KEYID = 7
24,434,562 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,052 UART: [art] PUB.X = A52050B33C64A0195037A3C572D6909B74644BC5ED0298BCDC7B158BEC6407BADF1E427FAE8E817C643E67B441A9A85B
24,443,383 UART: [art] PUB.Y = CDF47201797D7B46850D16BB9C5E59DDA04C76B4617BA2150303E8723B87B65D2594BF70CF4063811B08801334306770
24,450,596 UART: [art] SIG.R = BC16E0E989C9CB3ACFB78BE25F91597CD1727A29F32D19571CA6C3B6756BCF39A4B69CC4AB9F672BD43784C713A612F0
24,458,011 UART: [art] SIG.S = 90B67D60E1AF8079BF2A760F14D61E98840E061EC9AE8AE327217FB07D7404D6A89472699A67EDC7846416177632A49B
25,437,183 UART: Caliptra RT
25,437,895 UART: [state] CFI Enabled
25,602,704 UART: [rt] RT listening for mailbox commands...
25,604,587 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,635,867 UART: [rt]cmd =0x53574545, len=84
25,637,880 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
192,672 UART:
193,108 UART: Running Caliptra ROM ...
194,263 UART:
603,932 UART: [state] CFI Enabled
618,796 UART: [state] LifecycleState = Unprovisioned
620,670 UART: [state] DebugLocked = No
623,184 UART: [state] WD Timer not started. Device not locked for debugging
627,418 UART: [kat] SHA2-256
806,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,102 UART: [kat] ++
818,632 UART: [kat] sha1
829,719 UART: [kat] SHA2-256
832,713 UART: [kat] SHA2-384
838,976 UART: [kat] SHA2-512-ACC
841,913 UART: [kat] ECC-384
3,284,108 UART: [kat] HMAC-384Kdf
3,296,206 UART: [kat] LMS
3,825,731 UART: [kat] --
3,829,960 UART: [cold-reset] ++
3,830,967 UART: [fht] FHT @ 0x50003400
3,842,223 UART: [idev] ++
3,842,784 UART: [idev] CDI.KEYID = 6
3,843,757 UART: [idev] SUBJECT.KEYID = 7
3,844,922 UART: [idev] UDS.KEYID = 0
3,845,841 ready_for_fw is high
3,846,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,845 UART: [idev] Erasing UDS.KEYID = 0
6,321,696 UART: [idev] Sha1 KeyId Algorithm
6,345,565 UART: [idev] --
6,349,587 UART: [ldev] ++
6,350,159 UART: [ldev] CDI.KEYID = 6
6,351,168 UART: [ldev] SUBJECT.KEYID = 5
6,352,264 UART: [ldev] AUTHORITY.KEYID = 7
6,353,566 UART: [ldev] FE.KEYID = 1
6,364,422 UART: [ldev] Erasing FE.KEYID = 1
8,838,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,151 UART: [ldev] --
10,625,952 UART: [fwproc] Wait for Commands...
10,627,816 UART: [fwproc] Recv command 0x46574c44
10,629,842 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,490,008 >>> mbox cmd response: success
14,494,578 UART: [afmc] ++
14,495,219 UART: [afmc] CDI.KEYID = 6
14,496,133 UART: [afmc] SUBJECT.KEYID = 7
14,497,232 UART: [afmc] AUTHORITY.KEYID = 5
16,995,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,945 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,756 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,550 UART: [afmc] --
18,792,438 UART: [cold-reset] --
18,796,347 UART: [state] Locking Datavault
18,800,668 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,304 UART: [state] Locking ICCM
18,804,528 UART: [exit] Launching FMC @ 0x40000130
18,812,912 UART:
18,813,167 UART: Running Caliptra FMC ...
18,814,266 UART:
18,814,418 UART: [state] CFI Enabled
18,822,453 UART: [fht] FMC Alias Private Key: 7
20,578,709 UART: [art] Extend RT PCRs Done
20,579,933 UART: [art] Lock RT PCRs Done
20,581,482 UART: [art] Populate DV Done
20,587,051 UART: [fht] FMC Alias Private Key: 7
20,588,696 UART: [art] Derive CDI
20,589,501 UART: [art] Store in in slot 0x4
20,631,813 UART: [art] Derive Key Pair
20,632,806 UART: [art] Store priv key in slot 0x5
23,058,765 UART: [art] Derive Key Pair - Done
23,071,916 UART: [art] Signing Cert with AUTHO
23,073,218 UART: RITY.KEYID = 7
24,778,589 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,106 UART: [art] PUB.X = 57C11D01C2B54677FCD07E4050F7CD5CE60473B8437C78E740F5A1DF6D32B158BDADA16C1C23C15CD0A0649C5FCDE406
24,787,396 UART: [art] PUB.Y = 72C1B3FC1205670B9BC233596CE179947DD3437B67813E14272D86F381339CE110D7EE68FE1A9A095BCEAFD61CD9CC3E
24,794,663 UART: [art] SIG.R = 26B95DC33379C8F7CEE1EA84B37ADF20F82B0802D6E0EC9C37F983450BF87AEC18E11B2E4F3212174D86CA633B2FCB9C
24,802,036 UART: [art] SIG.S = A474CDC637DA8D8D1B150C12ADA55216055A9916DC7DAF1F4848B3616098BDBBBD412BCF6EA63062AEFB364EEEB92F39
25,780,581 UART: Caliptra RT
25,781,278 UART: [state] CFI Enabled
25,897,458 UART: [rt] RT listening for mailbox commands...
25,899,349 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,929,752 UART: [rt]cmd =0x53574545, len=84
25,931,768 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,696,247 ready_for_fw is high
3,696,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,109 >>> mbox cmd response: success
18,516,945 UART:
18,517,334 UART: Running Caliptra FMC ...
18,518,463 UART:
18,518,615 UART: [state] CFI Enabled
18,526,503 UART: [fht] FMC Alias Private Key: 7
20,283,572 UART: [art] Extend RT PCRs Done
20,284,781 UART: [art] Lock RT PCRs Done
20,286,777 UART: [art] Populate DV Done
20,291,970 UART: [fht] FMC Alias Private Key: 7
20,293,510 UART: [art] Derive CDI
20,294,273 UART: [art] Store in in slot 0x4
20,336,866 UART: [art] Derive Key Pair
20,337,865 UART: [art] Store priv key in slot 0x5
22,764,425 UART: [art] Derive Key Pair - Done
22,777,689 UART: [art] Signing Cert with AUTHO
22,779,022 UART: RITY.KEYID = 7
24,484,213 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,691 UART: [art] PUB.X = A80784176249B2F1216A985D540E797A215EC4DF991EA57FE618FA0A1CFF154813472DCB4D2D95054F0E5FF2804E1DB0
24,492,969 UART: [art] PUB.Y = 4C7C9842BA93BE28DCBB5A4726F7DE5F8FE64B414C0F399E00652D9DBA74D0DA4E1799FFA96106CBAFA0F05D14B29E13
24,500,239 UART: [art] SIG.R = 29910E40101CB474E82B6267F11C9805C80404DC1E9DC6BA06F360ABD27614C814F54FF3FAEE668C2836AAAAE7E7518F
24,507,679 UART: [art] SIG.S = 4B43A2763EE292304A7779A512994E40355C9DD7C8DB5DD17330A4789296B72CCDB746DAEF31EFF83A4E95E63F8DFA45
25,486,697 UART: Caliptra RT
25,487,408 UART: [state] CFI Enabled
25,604,337 UART: [rt] RT listening for mailbox commands...
25,606,227 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,636,552 UART: [rt]cmd =0x53574545, len=84
25,638,313 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,440,138 ready_for_fw is high
3,440,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,765,591 >>> mbox cmd response: success
19,049,444 UART:
19,049,839 UART: Running Caliptra FMC ...
19,050,944 UART:
19,051,098 UART: [state] CFI Enabled
19,114,996 UART: [fht] FMC Alias Private Key: 7
20,878,485 UART: [art] Extend RT PCRs Done
20,879,699 UART: [art] Lock RT PCRs Done
20,881,456 UART: [art] Populate DV Done
20,886,795 UART: [fht] FMC Alias Private Key: 7
20,888,391 UART: [art] Derive CDI
20,889,208 UART: [art] Store in in slot 0x4
20,947,661 UART: [art] Derive Key Pair
20,948,697 UART: [art] Store priv key in slot 0x5
23,412,314 UART: [art] Derive Key Pair - Done
23,425,357 UART: [art] Signing Cert with AUTHO
23,426,653 UART: RITY.KEYID = 7
25,137,654 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,162 UART: [art] PUB.X = 1C0F3B360AAEBED0F2EFC0B22310AE00554B72F52A50F8DA170AED47E06281E563F70A05E7AA416EC1562890A55ACCBD
25,146,463 UART: [art] PUB.Y = B105E87FFC8EDAC800418F3CB4F9ECCA1C387A33DCC26926B9F2B9FA114E58BC68082826FFC9A03F5114E614FBBC541F
25,153,711 UART: [art] SIG.R = A90CBB006F8A9903ADACA1766BC8A26DBFADF1BA9C03E0C9D09FC8B560F3E65165D0E5768DF15501CC543196746A2A0D
25,161,106 UART: [art] SIG.S = 7BA9C7EFF0AE09EC1C36BFFD19037F8894049C51C2FC5CD3D5E473AEB0D4005AC25C13B2FAAC31B0C163B3FE003A1355
26,140,440 UART: Caliptra RT
26,141,156 UART: [state] CFI Enabled
26,306,494 UART: [rt] RT listening for mailbox commands...
26,308,546 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,339,634 UART: [rt]cmd =0x53574545, len=84
26,341,423 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,754,048 ready_for_fw is high
3,754,427 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,043 >>> mbox cmd response: success
19,206,796 UART:
19,207,177 UART: Running Caliptra FMC ...
19,208,320 UART:
19,208,494 UART: [state] CFI Enabled
19,216,379 UART: [fht] FMC Alias Private Key: 7
20,972,721 UART: [art] Extend RT PCRs Done
20,973,940 UART: [art] Lock RT PCRs Done
20,975,590 UART: [art] Populate DV Done
20,980,888 UART: [fht] FMC Alias Private Key: 7
20,982,422 UART: [art] Derive CDI
20,983,151 UART: [art] Store in in slot 0x4
21,025,951 UART: [art] Derive Key Pair
21,026,950 UART: [art] Store priv key in slot 0x5
23,452,972 UART: [art] Derive Key Pair - Done
23,466,444 UART: [art] Signing Cert with AUTHO
23,467,748 UART: RITY.KEYID = 7
25,173,319 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,824 UART: [art] PUB.X = 4108020A8220094DB231DA5ED25F10D01A608AF45DD446CE2F800E1737F92C0BE0A35B113689AC748792DEEB8D44CDEA
25,182,097 UART: [art] PUB.Y = 08534B4B11A0B871815396E7D99F701B81B39C3D0AE8E6051D3AE5CC0D595C4E0443B7897D71794916562FE6AC350C2B
25,189,342 UART: [art] SIG.R = 12EBC1A11C975AB5CCABF37082B17ECC6654604D0AB47325A7CFAEC5475A2664B060CD4F62C16F852C556FC6F78264D9
25,196,724 UART: [art] SIG.S = E06E8D4145F4638F42A568C079BE8F2C82259FDE799BF103FE468FD04A9FEE612E51C650953C4C0B77CB0402BE1DCDBC
26,175,687 UART: Caliptra RT
26,176,381 UART: [state] CFI Enabled
26,294,244 UART: [rt] RT listening for mailbox commands...
26,296,116 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,326,690 UART: [rt]cmd =0x53574545, len=84
26,328,600 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,643 UART: [kat] SHA2-256
892,581 UART: [kat] SHA2-384
895,222 UART: [kat] SHA2-512-ACC
897,123 UART: [kat] ECC-384
902,740 UART: [kat] HMAC-384Kdf
907,402 UART: [kat] LMS
1,475,598 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,477,043 UART: [fht] Storing FHT @ 0x50003400
1,479,634 UART: [idev] ++
1,479,802 UART: [idev] CDI.KEYID = 6
1,480,162 UART: [idev] SUBJECT.KEYID = 7
1,480,586 UART: [idev] UDS.KEYID = 0
1,480,931 ready_for_fw is high
1,480,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,490 UART: [idev] Erasing UDS.KEYID = 0
1,504,874 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,416 UART: [idev] --
1,514,493 UART: [ldev] ++
1,514,661 UART: [ldev] CDI.KEYID = 6
1,515,024 UART: [ldev] SUBJECT.KEYID = 5
1,515,450 UART: [ldev] AUTHORITY.KEYID = 7
1,515,913 UART: [ldev] FE.KEYID = 1
1,521,013 UART: [ldev] Erasing FE.KEYID = 1
1,546,134 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,102 UART: [ldev] --
1,585,509 UART: [fwproc] Waiting for Commands...
1,586,140 UART: [fwproc] Received command 0x46574c44
1,586,931 UART: [fwproc] Received Image of size 114448 bytes
2,885,406 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,898 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,303 >>> mbox cmd response: success
3,079,439 UART: [afmc] ++
3,079,607 UART: [afmc] CDI.KEYID = 6
3,079,969 UART: [afmc] SUBJECT.KEYID = 7
3,080,394 UART: [afmc] AUTHORITY.KEYID = 5
3,115,035 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,061 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,454 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,144 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,233 UART: [afmc] --
3,158,119 UART: [cold-reset] --
3,158,825 UART: [state] Locking Datavault
3,160,168 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,772 UART: [state] Locking ICCM
3,161,282 UART: [exit] Launching FMC @ 0x40000130
3,166,611 UART:
3,166,627 UART: Running Caliptra FMC ...
3,167,035 UART:
3,167,089 UART: [state] CFI Enabled
3,177,924 UART: [fht] FMC Alias Private Key: 7
3,285,845 UART: [art] Extend RT PCRs Done
3,286,273 UART: [art] Lock RT PCRs Done
3,287,573 UART: [art] Populate DV Done
3,295,770 UART: [fht] FMC Alias Private Key: 7
3,296,880 UART: [art] Derive CDI
3,297,160 UART: [art] Store in in slot 0x4
3,383,423 UART: [art] Derive Key Pair
3,383,783 UART: [art] Store priv key in slot 0x5
3,397,637 UART: [art] Derive Key Pair - Done
3,412,311 UART: [art] Signing Cert with AUTHO
3,412,791 UART: RITY.KEYID = 7
3,427,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,598 UART: [art] PUB.X = A3586B631A50A491D5B0197AC628086653E2B9BC75F4D01013F58C0418CC18ACD6252B15871BA4EED0ECBC056EA55462
3,435,363 UART: [art] PUB.Y = FBC80E1C15F0499F89898B5BD639C21EFD0CB51BCF0C9F9897C8B0DDCD03CF02C2A0743AFE235378490216CD96D6DFC3
3,442,313 UART: [art] SIG.R = AF678C6FCC765F090A1201BA05A1BF7937AFEBB481A7B6CB31C79D09FA859B7185C3AC460DB6A3CB24D2D2E8F8C09B8F
3,449,087 UART: [art] SIG.S = D88979BA80546E6D7EA8DA6E3BEA52BA10FD522B79E03DFA7DDBC015F3291441BDD224289B9695C64F690F994A574A9F
3,473,047 UART: Caliptra RT
3,473,300 UART: [state] CFI Enabled
3,581,632 UART: [rt] RT listening for mailbox commands...
3,582,302 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,698 UART: [rt]cmd =0x53574545, len=84
3,614,221 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,939 ready_for_fw is high
1,362,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,551 >>> mbox cmd response: success
2,993,111 UART:
2,993,127 UART: Running Caliptra FMC ...
2,993,535 UART:
2,993,589 UART: [state] CFI Enabled
3,004,206 UART: [fht] FMC Alias Private Key: 7
3,111,767 UART: [art] Extend RT PCRs Done
3,112,195 UART: [art] Lock RT PCRs Done
3,113,873 UART: [art] Populate DV Done
3,122,010 UART: [fht] FMC Alias Private Key: 7
3,123,176 UART: [art] Derive CDI
3,123,456 UART: [art] Store in in slot 0x4
3,209,087 UART: [art] Derive Key Pair
3,209,447 UART: [art] Store priv key in slot 0x5
3,222,717 UART: [art] Derive Key Pair - Done
3,237,482 UART: [art] Signing Cert with AUTHO
3,237,962 UART: RITY.KEYID = 7
3,253,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,213 UART: [art] PUB.X = CDBBC94D005CBF1B304B59B3206118E7263427A41A61C86AC10445D108C4CE42413AEB1AD47F470CAADE68F06957AAD4
3,260,964 UART: [art] PUB.Y = 328EFD4BAA6760D9D9B0B8FC93A28D7FCE1D8563710FB29A2D22043900471646756F0D5827CE19A50E7CE54267A5F820
3,267,882 UART: [art] SIG.R = 263293E000DADDF724CDF79FDEEEF726F966CE31BC6FB0A3DBBFCA7C302858E31B486131AA67D6B9115719AC9323CCCB
3,274,652 UART: [art] SIG.S = 4C15B819CFBACDA51931C148B0A69E3FDB575048970261286E2EAD32EFCA1EFD2B05A19E99642366500A31EECFB623F6
3,297,838 UART: Caliptra RT
3,298,091 UART: [state] CFI Enabled
3,405,089 UART: [rt] RT listening for mailbox commands...
3,405,759 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,111 UART: [rt]cmd =0x53574545, len=84
3,437,620 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,268 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,800 UART: [kat] SHA2-256
881,731 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,846 UART: [kat] ++
885,998 UART: [kat] sha1
890,030 UART: [kat] SHA2-256
891,968 UART: [kat] SHA2-384
894,627 UART: [kat] SHA2-512-ACC
896,528 UART: [kat] ECC-384
902,371 UART: [kat] HMAC-384Kdf
906,981 UART: [kat] LMS
1,475,177 UART: [kat] --
1,476,006 UART: [cold-reset] ++
1,476,508 UART: [fht] Storing FHT @ 0x50003400
1,479,355 UART: [idev] ++
1,479,523 UART: [idev] CDI.KEYID = 6
1,479,883 UART: [idev] SUBJECT.KEYID = 7
1,480,307 UART: [idev] UDS.KEYID = 0
1,480,652 ready_for_fw is high
1,480,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,733 UART: [idev] Erasing UDS.KEYID = 0
1,505,317 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,951 UART: [idev] --
1,514,906 UART: [ldev] ++
1,515,074 UART: [ldev] CDI.KEYID = 6
1,515,437 UART: [ldev] SUBJECT.KEYID = 5
1,515,863 UART: [ldev] AUTHORITY.KEYID = 7
1,516,326 UART: [ldev] FE.KEYID = 1
1,521,904 UART: [ldev] Erasing FE.KEYID = 1
1,547,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,363 UART: [ldev] --
1,586,822 UART: [fwproc] Waiting for Commands...
1,587,517 UART: [fwproc] Received command 0x46574c44
1,588,308 UART: [fwproc] Received Image of size 114448 bytes
2,887,675 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,627 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,979 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,920 >>> mbox cmd response: success
3,081,936 UART: [afmc] ++
3,082,104 UART: [afmc] CDI.KEYID = 6
3,082,466 UART: [afmc] SUBJECT.KEYID = 7
3,082,891 UART: [afmc] AUTHORITY.KEYID = 5
3,118,362 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,624 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,017 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,707 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,614 UART: [afmc] --
3,161,548 UART: [cold-reset] --
3,162,426 UART: [state] Locking Datavault
3,163,481 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,085 UART: [state] Locking ICCM
3,164,513 UART: [exit] Launching FMC @ 0x40000130
3,169,842 UART:
3,169,858 UART: Running Caliptra FMC ...
3,170,266 UART:
3,170,409 UART: [state] CFI Enabled
3,180,952 UART: [fht] FMC Alias Private Key: 7
3,288,489 UART: [art] Extend RT PCRs Done
3,288,917 UART: [art] Lock RT PCRs Done
3,290,545 UART: [art] Populate DV Done
3,298,884 UART: [fht] FMC Alias Private Key: 7
3,299,982 UART: [art] Derive CDI
3,300,262 UART: [art] Store in in slot 0x4
3,385,697 UART: [art] Derive Key Pair
3,386,057 UART: [art] Store priv key in slot 0x5
3,399,285 UART: [art] Derive Key Pair - Done
3,413,956 UART: [art] Signing Cert with AUTHO
3,414,436 UART: RITY.KEYID = 7
3,429,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,183 UART: [art] PUB.X = 9DF0F6566C9AF6DADB1B1629B744BF2F8F3A537F6D219DD4884DD3249E60A5CDE3875A121748200C3F89FC669421DC3F
3,436,960 UART: [art] PUB.Y = 9BEA7DEF8556BADA10037B0788A7B57F444DBB3CCE412713EF3F694A0EDDD47D1BA58B83B9B47D16AB6A7F1E1BA1891A
3,443,925 UART: [art] SIG.R = 9FC6E59B9B267477C69A8231296F080D4BD53B53F76E8D8C17451FA428B12B9E41551AB27D83BC47D980132B668016A8
3,450,685 UART: [art] SIG.S = 48140EAC3DB90644556FE02F6448C0237316CE7CE00516911FCF271B546829013C54BA5CCD323D2D432EA3A8C4AB59B1
3,474,364 UART: Caliptra RT
3,474,709 UART: [state] CFI Enabled
3,583,834 UART: [rt] RT listening for mailbox commands...
3,584,504 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,976 UART: [rt]cmd =0x53574545, len=84
3,616,305 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,236 ready_for_fw is high
1,363,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,840 >>> mbox cmd response: success
2,993,120 UART:
2,993,136 UART: Running Caliptra FMC ...
2,993,544 UART:
2,993,687 UART: [state] CFI Enabled
3,004,484 UART: [fht] FMC Alias Private Key: 7
3,112,337 UART: [art] Extend RT PCRs Done
3,112,765 UART: [art] Lock RT PCRs Done
3,114,421 UART: [art] Populate DV Done
3,122,542 UART: [fht] FMC Alias Private Key: 7
3,123,674 UART: [art] Derive CDI
3,123,954 UART: [art] Store in in slot 0x4
3,209,769 UART: [art] Derive Key Pair
3,210,129 UART: [art] Store priv key in slot 0x5
3,223,677 UART: [art] Derive Key Pair - Done
3,238,620 UART: [art] Signing Cert with AUTHO
3,239,100 UART: RITY.KEYID = 7
3,254,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,077 UART: [art] PUB.X = A2E524EA0A2C22EE1862C4555F29CF5B2F8665A3D7314755A5B851B7610EECCC7990EB6C098A9DA8C80FAFBB72FAF08C
3,261,853 UART: [art] PUB.Y = 8C97D981CBEB378C24296F3D32E38B637F9A9256C8EA234475C23B4F9EBC0798FBAE0D79E4D8E60C4220A6F771BB139A
3,268,804 UART: [art] SIG.R = 27872B8B1CCBABE7F94A7367BDEA23A7F700C34369D56241D53BFA0EC3AD1D47E438661207C9E3E21738D0C45CC86883
3,275,554 UART: [art] SIG.S = 2845C7792267974CAA515DE03441DBD7D35F4A5AA931F6BD0E6C510AFC476088E1401DD16CA430889A6B9AC90DD7D51D
3,299,244 UART: Caliptra RT
3,299,589 UART: [state] CFI Enabled
3,406,741 UART: [rt] RT listening for mailbox commands...
3,407,411 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,797 UART: [rt]cmd =0x53574545, len=84
3,439,102 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
893,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,505 UART: [kat] ++
897,657 UART: [kat] sha1
901,969 UART: [kat] SHA2-256
903,909 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
918,332 UART: [kat] HMAC-384Kdf
922,920 UART: [kat] LMS
1,171,248 UART: [kat] --
1,171,983 UART: [cold-reset] ++
1,172,377 UART: [fht] FHT @ 0x50003400
1,174,934 UART: [idev] ++
1,175,102 UART: [idev] CDI.KEYID = 6
1,175,462 UART: [idev] SUBJECT.KEYID = 7
1,175,886 UART: [idev] UDS.KEYID = 0
1,176,231 ready_for_fw is high
1,176,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,012 UART: [idev] Erasing UDS.KEYID = 0
1,200,883 UART: [idev] Sha1 KeyId Algorithm
1,209,531 UART: [idev] --
1,210,615 UART: [ldev] ++
1,210,783 UART: [ldev] CDI.KEYID = 6
1,211,146 UART: [ldev] SUBJECT.KEYID = 5
1,211,572 UART: [ldev] AUTHORITY.KEYID = 7
1,212,035 UART: [ldev] FE.KEYID = 1
1,217,249 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,840 UART: [fwproc] Recv command 0x46574c44
1,283,568 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,735 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,688 >>> mbox cmd response: success
2,776,946 UART: [afmc] ++
2,777,114 UART: [afmc] CDI.KEYID = 6
2,777,476 UART: [afmc] SUBJECT.KEYID = 7
2,777,901 UART: [afmc] AUTHORITY.KEYID = 5
2,812,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,151 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,764 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,167 UART: [afmc] --
2,856,111 UART: [cold-reset] --
2,856,937 UART: [state] Locking Datavault
2,858,222 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,826 UART: [state] Locking ICCM
2,859,300 UART: [exit] Launching FMC @ 0x40000130
2,864,629 UART:
2,864,645 UART: Running Caliptra FMC ...
2,865,053 UART:
2,865,107 UART: [state] CFI Enabled
2,875,600 UART: [fht] FMC Alias Private Key: 7
2,983,565 UART: [art] Extend RT PCRs Done
2,983,993 UART: [art] Lock RT PCRs Done
2,985,401 UART: [art] Populate DV Done
2,993,586 UART: [fht] FMC Alias Private Key: 7
2,994,736 UART: [art] Derive CDI
2,995,016 UART: [art] Store in in slot 0x4
3,080,515 UART: [art] Derive Key Pair
3,080,875 UART: [art] Store priv key in slot 0x5
3,094,453 UART: [art] Derive Key Pair - Done
3,109,275 UART: [art] Signing Cert with AUTHO
3,109,755 UART: RITY.KEYID = 7
3,124,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,706 UART: [art] PUB.X = 6103DB037623F7E22E5EEA1B689F43078B5035D709DB398AA59C1F11A264E6466BF86F1D071B60B657562EB41E3A5FB4
3,132,463 UART: [art] PUB.Y = 3DAEDDAF5F2F83D55B890232063F677160547CF2C3DEF6DD06E0A037C71C241B32F39D9D08F7AC2E93D8B73AF2FA801A
3,139,417 UART: [art] SIG.R = B493436280A78D1FCBA42596805671BB66C1D1597C6F369BB61C1AE65F3174C8048228ED3F8D0B7A73ED7551E65D9F8F
3,146,183 UART: [art] SIG.S = 617F0BB5843530A549810037531CDDF92915C35E86D9F35B8E58F77A9C0E1D52AFD7E0769B4BFD16440C47DF2F8F6FEE
3,170,121 UART: Caliptra RT
3,170,374 UART: [state] CFI Enabled
3,279,033 UART: [rt] RT listening for mailbox commands...
3,279,703 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,757 UART: [rt]cmd =0x53574545, len=84
3,311,078 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,937 ready_for_fw is high
1,060,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,355 >>> mbox cmd response: success
2,691,969 UART:
2,691,985 UART: Running Caliptra FMC ...
2,692,393 UART:
2,692,447 UART: [state] CFI Enabled
2,703,050 UART: [fht] FMC Alias Private Key: 7
2,810,721 UART: [art] Extend RT PCRs Done
2,811,149 UART: [art] Lock RT PCRs Done
2,812,589 UART: [art] Populate DV Done
2,821,120 UART: [fht] FMC Alias Private Key: 7
2,822,242 UART: [art] Derive CDI
2,822,522 UART: [art] Store in in slot 0x4
2,908,597 UART: [art] Derive Key Pair
2,908,957 UART: [art] Store priv key in slot 0x5
2,922,519 UART: [art] Derive Key Pair - Done
2,937,225 UART: [art] Signing Cert with AUTHO
2,937,705 UART: RITY.KEYID = 7
2,952,523 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,288 UART: [art] PUB.X = 849CBF36087892C5490259E5C956B61989C0426EDB70C40016E5FD6FF7A6272CFF9BE2CFCFD770881E0347F42DD9CC87
2,960,033 UART: [art] PUB.Y = 9914C1722A9C52551D14AE79CC923032D2E96502B8C844DA7869410FCE82F0A2F87BCDA07D9FB5BEDAB2424D7C6CD79C
2,966,989 UART: [art] SIG.R = 109EE4A26EBA7D203ED33E5B3FFF2A0631F12358B9B175E2CDEF2CAB8237DD8F208D735260378EB243037CE18DDEA6F5
2,973,769 UART: [art] SIG.S = 18FF098EF9C270D77EA48F6801220C18697A5327486FFAE6024D18222E9A1E2C0CA078486A0F5E1EE68A41F0686C9327
2,997,722 UART: Caliptra RT
2,997,975 UART: [state] CFI Enabled
3,105,388 UART: [rt] RT listening for mailbox commands...
3,106,058 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,534 UART: [rt]cmd =0x53574545, len=84
3,137,853 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
893,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,792 UART: [kat] ++
897,944 UART: [kat] sha1
902,228 UART: [kat] SHA2-256
904,168 UART: [kat] SHA2-384
906,951 UART: [kat] SHA2-512-ACC
908,852 UART: [kat] ECC-384
918,117 UART: [kat] HMAC-384Kdf
922,713 UART: [kat] LMS
1,171,041 UART: [kat] --
1,171,892 UART: [cold-reset] ++
1,172,338 UART: [fht] FHT @ 0x50003400
1,175,019 UART: [idev] ++
1,175,187 UART: [idev] CDI.KEYID = 6
1,175,547 UART: [idev] SUBJECT.KEYID = 7
1,175,971 UART: [idev] UDS.KEYID = 0
1,176,316 ready_for_fw is high
1,176,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,551 UART: [idev] Erasing UDS.KEYID = 0
1,200,694 UART: [idev] Sha1 KeyId Algorithm
1,209,218 UART: [idev] --
1,210,326 UART: [ldev] ++
1,210,494 UART: [ldev] CDI.KEYID = 6
1,210,857 UART: [ldev] SUBJECT.KEYID = 5
1,211,283 UART: [ldev] AUTHORITY.KEYID = 7
1,211,746 UART: [ldev] FE.KEYID = 1
1,217,006 UART: [ldev] Erasing FE.KEYID = 1
1,243,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,050 UART: [ldev] --
1,282,403 UART: [fwproc] Wait for Commands...
1,283,015 UART: [fwproc] Recv command 0x46574c44
1,283,743 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,896 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,241 >>> mbox cmd response: success
2,776,437 UART: [afmc] ++
2,776,605 UART: [afmc] CDI.KEYID = 6
2,776,967 UART: [afmc] SUBJECT.KEYID = 7
2,777,392 UART: [afmc] AUTHORITY.KEYID = 5
2,813,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,556 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,284 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,169 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,888 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,540 UART: [afmc] --
2,856,498 UART: [cold-reset] --
2,857,412 UART: [state] Locking Datavault
2,858,571 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,175 UART: [state] Locking ICCM
2,859,597 UART: [exit] Launching FMC @ 0x40000130
2,864,926 UART:
2,864,942 UART: Running Caliptra FMC ...
2,865,350 UART:
2,865,493 UART: [state] CFI Enabled
2,875,834 UART: [fht] FMC Alias Private Key: 7
2,983,389 UART: [art] Extend RT PCRs Done
2,983,817 UART: [art] Lock RT PCRs Done
2,985,395 UART: [art] Populate DV Done
2,993,726 UART: [fht] FMC Alias Private Key: 7
2,994,792 UART: [art] Derive CDI
2,995,072 UART: [art] Store in in slot 0x4
3,080,753 UART: [art] Derive Key Pair
3,081,113 UART: [art] Store priv key in slot 0x5
3,093,897 UART: [art] Derive Key Pair - Done
3,108,912 UART: [art] Signing Cert with AUTHO
3,109,392 UART: RITY.KEYID = 7
3,124,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,679 UART: [art] PUB.X = 1C220FA14E2FD4CA5A9C393AE771B2AC1D51872B67F8177086B350C32B0A47FD73B7160BC847ABA765A92622860A75B4
3,132,441 UART: [art] PUB.Y = BEDD9C081C0926B28E89CF0D2ED20A6031FE1B98690C16F792F6AE0D512393B6B4A6D52DE556979702171DC849849261
3,139,370 UART: [art] SIG.R = CC7EDF0FBF1E249A2F301BA198EAA538C05396CDF2001338E1C50B1AAA1BC0694BC92EA95FA2EE7CF58224D0109C5BA6
3,146,134 UART: [art] SIG.S = 1561EB12A18356625BF90A24F0B307E6D99EAF303C7A41FA8C242A66FB0D64D912FD6CC740471A4430B820A0FAFF8F39
3,169,756 UART: Caliptra RT
3,170,101 UART: [state] CFI Enabled
3,278,126 UART: [rt] RT listening for mailbox commands...
3,278,796 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,090 UART: [rt]cmd =0x53574545, len=84
3,310,567 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,982 ready_for_fw is high
1,058,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,502 >>> mbox cmd response: success
2,689,874 UART:
2,689,890 UART: Running Caliptra FMC ...
2,690,298 UART:
2,690,441 UART: [state] CFI Enabled
2,701,070 UART: [fht] FMC Alias Private Key: 7
2,808,663 UART: [art] Extend RT PCRs Done
2,809,091 UART: [art] Lock RT PCRs Done
2,810,885 UART: [art] Populate DV Done
2,819,136 UART: [fht] FMC Alias Private Key: 7
2,820,096 UART: [art] Derive CDI
2,820,376 UART: [art] Store in in slot 0x4
2,906,053 UART: [art] Derive Key Pair
2,906,413 UART: [art] Store priv key in slot 0x5
2,919,659 UART: [art] Derive Key Pair - Done
2,934,453 UART: [art] Signing Cert with AUTHO
2,934,933 UART: RITY.KEYID = 7
2,950,089 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,854 UART: [art] PUB.X = 414F1A2D1503B79AC5AE3C266943CE8BC66E62942D9C44172F5BDFD816C7CB865D983B1B012309AC6FFC21D6BFC3F782
2,957,627 UART: [art] PUB.Y = D7D5F74B0587523EFD0527A3A33227B96CAB025F74EC4561FF5E32F3C6FEAAC0A11FA55AFD36D485B17277B6B9784D5C
2,964,582 UART: [art] SIG.R = 0AB3A1269559ED2CC2B8732AE4C8A2BA2B27EB9A69C3702A18F9E506759A48E476B6595BAA7A3F2CBDEAFB214DFDA3B0
2,971,368 UART: [art] SIG.S = 52493E691D5CFE6C439223A3C4D839381C92DC19043355E520C1DBF5FE9F0E884E3AD1DB649C3100271332F9184652EC
2,994,867 UART: Caliptra RT
2,995,212 UART: [state] CFI Enabled
3,103,129 UART: [rt] RT listening for mailbox commands...
3,103,799 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,863 UART: [rt]cmd =0x53574545, len=84
3,134,998 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,394 UART: [kat] SHA2-512-ACC
906,295 UART: [kat] ECC-384
916,012 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,951 UART: [cold-reset] ++
1,170,435 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,174,301 ready_for_fw is high
1,174,301 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,593 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,620 UART: [ldev] ++
1,208,788 UART: [ldev] CDI.KEYID = 6
1,209,152 UART: [ldev] SUBJECT.KEYID = 5
1,209,579 UART: [ldev] AUTHORITY.KEYID = 7
1,210,042 UART: [ldev] FE.KEYID = 1
1,214,934 UART: [ldev] Erasing FE.KEYID = 1
1,241,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,814 UART: [ldev] --
1,280,124 UART: [fwproc] Wait for Commands...
1,280,749 UART: [fwproc] Recv command 0x46574c44
1,281,482 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,094 >>> mbox cmd response: success
2,774,197 UART: [afmc] ++
2,774,365 UART: [afmc] CDI.KEYID = 6
2,774,728 UART: [afmc] SUBJECT.KEYID = 7
2,775,154 UART: [afmc] AUTHORITY.KEYID = 5
2,810,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,872 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,601 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,484 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,203 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,050 UART: [afmc] --
2,854,156 UART: [cold-reset] --
2,854,876 UART: [state] Locking Datavault
2,855,957 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,561 UART: [state] Locking ICCM
2,857,113 UART: [exit] Launching FMC @ 0x40000130
2,862,442 UART:
2,862,458 UART: Running Caliptra FMC ...
2,862,866 UART:
2,862,920 UART: [state] CFI Enabled
2,873,405 UART: [fht] FMC Alias Private Key: 7
2,981,252 UART: [art] Extend RT PCRs Done
2,981,680 UART: [art] Lock RT PCRs Done
2,983,132 UART: [art] Populate DV Done
2,991,539 UART: [fht] FMC Alias Private Key: 7
2,992,615 UART: [art] Derive CDI
2,992,895 UART: [art] Store in in slot 0x4
3,078,756 UART: [art] Derive Key Pair
3,079,116 UART: [art] Store priv key in slot 0x5
3,092,578 UART: [art] Derive Key Pair - Done
3,107,249 UART: [art] Signing Cert with AUTHO
3,107,729 UART: RITY.KEYID = 7
3,122,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,230 UART: [art] PUB.X = F3BA1F2F62D26912E64117A6670B86E366B5AE564C2E03402DDB2637BE1439A4B9F4C803B815568A7D490513F3D81374
3,129,984 UART: [art] PUB.Y = 7DC9C45BA460D3A4B02A6FD9C4BB58F806D867E87F548678A674887391791DC918FD1E3B2682BD149FD17B11A3BB2EFB
3,136,941 UART: [art] SIG.R = 99761EBEA9ABCA3A66389DF54FB2BA1BA499151F688805069090FA9641BE0EDCD9C844285A0E64EE129D973FCA96EA61
3,143,711 UART: [art] SIG.S = A948F41CBD346149B49CDFC6629BCB8E40B83B8D750B688846D5A98ED7DAE98606FA86F50DFC5FBF72BA1F9012A62C06
3,167,442 UART: Caliptra RT
3,167,695 UART: [state] CFI Enabled
3,275,885 UART: [rt] RT listening for mailbox commands...
3,276,555 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,877 UART: [rt]cmd =0x53574545, len=84
3,308,314 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,534 ready_for_fw is high
1,055,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,972 >>> mbox cmd response: success
2,686,276 UART:
2,686,292 UART: Running Caliptra FMC ...
2,686,700 UART:
2,686,754 UART: [state] CFI Enabled
2,697,121 UART: [fht] FMC Alias Private Key: 7
2,805,454 UART: [art] Extend RT PCRs Done
2,805,882 UART: [art] Lock RT PCRs Done
2,807,282 UART: [art] Populate DV Done
2,815,357 UART: [fht] FMC Alias Private Key: 7
2,816,471 UART: [art] Derive CDI
2,816,751 UART: [art] Store in in slot 0x4
2,902,540 UART: [art] Derive Key Pair
2,902,900 UART: [art] Store priv key in slot 0x5
2,916,078 UART: [art] Derive Key Pair - Done
2,931,022 UART: [art] Signing Cert with AUTHO
2,931,502 UART: RITY.KEYID = 7
2,946,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,159 UART: [art] PUB.X = FA23EEACC25548ECD4DCA9E3673B9F92769A10AE6D1CF1D32A2F604BFDF2EAF312B3353D1C92353F665EAE7D66AC6A17
2,953,953 UART: [art] PUB.Y = 8A1F092C34F32DA50A904450B1D12215E2E84ACCFD0581B476E64E8340B279A64185EEE7A44D1BE385B0B7938643C6EB
2,960,898 UART: [art] SIG.R = 65F8F9798302D1DCFB9413C5EE6335F5E00358F9D0C4FB96DDBC014BFA5796B897D59730FCF6BB3518FBC0621E7D1BF6
2,967,673 UART: [art] SIG.S = 839D684C0495ECBC62B80EEC968E10AD7C78B45B3B059526F779790452D3BE372DCAA09CC9F3D05731D3B82B058AC1E2
2,991,775 UART: Caliptra RT
2,992,028 UART: [state] CFI Enabled
3,099,203 UART: [rt] RT listening for mailbox commands...
3,099,873 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,171 UART: [rt]cmd =0x53574545, len=84
3,131,676 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,169,704 UART: [cold-reset] ++
1,170,038 UART: [fht] FHT @ 0x50003400
1,172,558 UART: [idev] ++
1,172,726 UART: [idev] CDI.KEYID = 6
1,173,087 UART: [idev] SUBJECT.KEYID = 7
1,173,512 UART: [idev] UDS.KEYID = 0
1,173,858 ready_for_fw is high
1,173,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,306 UART: [idev] Erasing UDS.KEYID = 0
1,198,584 UART: [idev] Sha1 KeyId Algorithm
1,207,574 UART: [idev] --
1,208,591 UART: [ldev] ++
1,208,759 UART: [ldev] CDI.KEYID = 6
1,209,123 UART: [ldev] SUBJECT.KEYID = 5
1,209,550 UART: [ldev] AUTHORITY.KEYID = 7
1,210,013 UART: [ldev] FE.KEYID = 1
1,215,235 UART: [ldev] Erasing FE.KEYID = 1
1,241,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,253 UART: [ldev] --
1,280,713 UART: [fwproc] Wait for Commands...
1,281,380 UART: [fwproc] Recv command 0x46574c44
1,282,113 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,503 >>> mbox cmd response: success
2,775,680 UART: [afmc] ++
2,775,848 UART: [afmc] CDI.KEYID = 6
2,776,211 UART: [afmc] SUBJECT.KEYID = 7
2,776,637 UART: [afmc] AUTHORITY.KEYID = 5
2,812,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,518 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,401 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,120 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,155 UART: [afmc] --
2,856,143 UART: [cold-reset] --
2,856,969 UART: [state] Locking Datavault
2,857,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,532 UART: [state] Locking ICCM
2,859,050 UART: [exit] Launching FMC @ 0x40000130
2,864,379 UART:
2,864,395 UART: Running Caliptra FMC ...
2,864,803 UART:
2,864,946 UART: [state] CFI Enabled
2,875,519 UART: [fht] FMC Alias Private Key: 7
2,983,766 UART: [art] Extend RT PCRs Done
2,984,194 UART: [art] Lock RT PCRs Done
2,985,706 UART: [art] Populate DV Done
2,993,819 UART: [fht] FMC Alias Private Key: 7
2,994,761 UART: [art] Derive CDI
2,995,041 UART: [art] Store in in slot 0x4
3,080,778 UART: [art] Derive Key Pair
3,081,138 UART: [art] Store priv key in slot 0x5
3,094,388 UART: [art] Derive Key Pair - Done
3,108,869 UART: [art] Signing Cert with AUTHO
3,109,349 UART: RITY.KEYID = 7
3,124,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,482 UART: [art] PUB.X = 56748A20DBF9481518DE01349C7A74AF00D65EC2380F8B451184BD5AF45CAF09BE1C41716E6462C654837154C268F675
3,132,217 UART: [art] PUB.Y = CD47EC085CE530CA0823D729CA556D7839DF10C6EB78B51B96A438FB4D9544E8C5E8708979F8C2A031F2A2B6331EEE2C
3,139,171 UART: [art] SIG.R = 445EF7FBF22DB1FC6D31BE0137AE73B07EA37C87E3962FAE00624CEF304305AC66CA284A193489FE497289EB477E3D11
3,145,923 UART: [art] SIG.S = 83902A5616C8594F9C59DF6AE96532FF597B17E96BAED9B2793A1B6FC831BF30C5B640BBC585763521F9EF44CC3E2068
3,169,556 UART: Caliptra RT
3,169,901 UART: [state] CFI Enabled
3,277,728 UART: [rt] RT listening for mailbox commands...
3,278,398 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,814 UART: [rt]cmd =0x53574545, len=84
3,310,315 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,683 ready_for_fw is high
1,055,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,249 >>> mbox cmd response: success
2,685,505 UART:
2,685,521 UART: Running Caliptra FMC ...
2,685,929 UART:
2,686,072 UART: [state] CFI Enabled
2,696,633 UART: [fht] FMC Alias Private Key: 7
2,805,002 UART: [art] Extend RT PCRs Done
2,805,430 UART: [art] Lock RT PCRs Done
2,807,220 UART: [art] Populate DV Done
2,815,475 UART: [fht] FMC Alias Private Key: 7
2,816,473 UART: [art] Derive CDI
2,816,753 UART: [art] Store in in slot 0x4
2,902,518 UART: [art] Derive Key Pair
2,902,878 UART: [art] Store priv key in slot 0x5
2,916,276 UART: [art] Derive Key Pair - Done
2,930,820 UART: [art] Signing Cert with AUTHO
2,931,300 UART: RITY.KEYID = 7
2,946,992 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,757 UART: [art] PUB.X = A22E72157DC8CE44A1300C9B4677684AC0DCC6803F0E29A7E5189BD62F3876A7EE9216F9084C653BE9EF66D0E8EB6ECD
2,954,530 UART: [art] PUB.Y = 2CDFBF9A397868DDBC4AED7E8C82581D1B8CBE47F0BE6C30A94E625366EBE020C52F4C26E4F0421DBB7F6C4DCBDE98E5
2,961,508 UART: [art] SIG.R = E0F1FC53B5154ADE2E50AA1DF873D8048EEA234DE47E3FD80A7EB69CB1BFD7D5109549960882203F587CCB13E38E1512
2,968,281 UART: [art] SIG.S = A1834EA3A97377A3B03FDEF2C043EAC638D9D4ABE036E57F44BD655D61CB843C4F78C8397FC56025D26580932EF2A50E
2,992,231 UART: Caliptra RT
2,992,576 UART: [state] CFI Enabled
3,101,100 UART: [rt] RT listening for mailbox commands...
3,101,770 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,888 UART: [rt]cmd =0x53574545, len=84
3,133,285 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,222 UART:
192,575 UART: Running Caliptra ROM ...
193,744 UART:
193,896 UART: [state] CFI Enabled
263,615 UART: [state] LifecycleState = Unprovisioned
265,546 UART: [state] DebugLocked = No
267,591 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,711 UART: [kat] SHA2-256
441,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,938 UART: [kat] ++
452,473 UART: [kat] sha1
462,222 UART: [kat] SHA2-256
464,872 UART: [kat] SHA2-384
470,008 UART: [kat] SHA2-512-ACC
472,377 UART: [kat] ECC-384
2,766,847 UART: [kat] HMAC-384Kdf
2,779,484 UART: [kat] LMS
3,969,793 UART: [kat] --
3,973,337 UART: [cold-reset] ++
3,975,065 UART: [fht] Storing FHT @ 0x50003400
3,985,695 UART: [idev] ++
3,986,268 UART: [idev] CDI.KEYID = 6
3,987,156 UART: [idev] SUBJECT.KEYID = 7
3,988,398 UART: [idev] UDS.KEYID = 0
3,989,455 ready_for_fw is high
3,989,687 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,324 UART: [idev] Erasing UDS.KEYID = 0
7,323,355 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,890 UART: [idev] --
7,347,804 UART: [ldev] ++
7,348,379 UART: [ldev] CDI.KEYID = 6
7,349,295 UART: [ldev] SUBJECT.KEYID = 5
7,350,506 UART: [ldev] AUTHORITY.KEYID = 7
7,351,791 UART: [ldev] FE.KEYID = 1
7,383,944 UART: [ldev] Erasing FE.KEYID = 1
10,719,091 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,756 UART: [ldev] --
13,099,912 UART: [fwproc] Waiting for Commands...
13,102,939 UART: [fwproc] Received command 0x46574c44
13,105,119 UART: [fwproc] Received Image of size 114124 bytes
17,162,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,938 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,856 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,619,960 >>> mbox cmd response: success
17,624,778 UART: [afmc] ++
17,625,380 UART: [afmc] CDI.KEYID = 6
17,626,315 UART: [afmc] SUBJECT.KEYID = 7
17,628,041 UART: [afmc] AUTHORITY.KEYID = 5
20,991,188 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,292,549 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,294,861 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,309,240 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,324,076 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,338,535 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,358,914 UART: [afmc] --
23,362,507 UART: [cold-reset] --
23,367,397 UART: [state] Locking Datavault
23,370,432 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,183 UART: [state] Locking ICCM
23,373,446 UART: [exit] Launching FMC @ 0x40000130
23,381,840 UART:
23,382,076 UART: Running Caliptra FMC ...
23,383,128 UART:
23,383,277 UART: [state] CFI Enabled
23,453,767 UART: [fht] FMC Alias Private Key: 7
25,791,986 UART: [art] Extend RT PCRs Done
25,793,203 UART: [art] Lock RT PCRs Done
25,794,878 UART: [art] Populate DV Done
25,800,133 UART: [fht] FMC Alias Private Key: 7
25,801,619 UART: [art] Derive CDI
25,802,382 UART: [art] Store in in slot 0x4
25,861,959 UART: [art] Derive Key Pair
25,862,962 UART: [art] Store priv key in slot 0x5
29,155,912 UART: [art] Derive Key Pair - Done
29,169,143 UART: [art] Signing Cert with AUTHO
29,170,452 UART: RITY.KEYID = 7
31,457,863 UART: [art] Erasing AUTHORITY.KEYID = 7
31,459,368 UART: [art] PUB.X = 99C10DCAF9D95D10055111C7FF56C8000D246A7C106AC353FE0C82FA2420AD669B2A8E10C15E61C6D4BEB6A081B7780E
31,466,634 UART: [art] PUB.Y = 9EC341CEB7461FCC94269285D1F0117E3B44E563D8DD9983D4962EE2E7FBC598DBC63F8E74C49A60B8C3D3A3AAC0A501
31,473,855 UART: [art] SIG.R = AE8A97C3352503075BB46DD5062895D38EDB11FD94BF76F9353B352FF15D84AF9EA8968FC675EEA1BD3C0B320CCA2A15
31,481,253 UART: [art] SIG.S = 0559FB4C950B8CEEF55EEC85121D4B1C565892D4D87EAAA5770A491B86D6E5CCB9FDE261E5A2CCF5AA95085CC0970618
32,786,695 UART: Caliptra RT
32,787,410 UART: [state] CFI Enabled
32,948,425 UART: [rt] RT listening for mailbox commands...
32,950,319 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,980,941 UART: [rt]cmd =0x4d454153, len=108
32,982,797 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,803,761 ready_for_fw is high
3,804,352 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,863,126 >>> mbox cmd response: success
23,568,979 UART:
23,569,360 UART: Running Caliptra FMC ...
23,570,489 UART:
23,570,646 UART: [state] CFI Enabled
23,636,833 UART: [fht] FMC Alias Private Key: 7
25,974,408 UART: [art] Extend RT PCRs Done
25,975,630 UART: [art] Lock RT PCRs Done
25,977,288 UART: [art] Populate DV Done
25,982,549 UART: [fht] FMC Alias Private Key: 7
25,984,199 UART: [art] Derive CDI
25,985,018 UART: [art] Store in in slot 0x4
26,045,810 UART: [art] Derive Key Pair
26,046,856 UART: [art] Store priv key in slot 0x5
29,339,504 UART: [art] Derive Key Pair - Done
29,352,519 UART: [art] Signing Cert with AUTHO
29,353,832 UART: RITY.KEYID = 7
31,641,598 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,111 UART: [art] PUB.X = 6D228AA95B64D92232E22CCF52FA84710B23ED5BFE76DA183B774A3CD41E57E33367D1B992A2AAA39A734EAFACEFCED5
31,650,354 UART: [art] PUB.Y = 7B8078CD2F249684A0D682F3AC711A44A969F8C46C49DA7E5A3D6B00AE842B1F68BB6AEBF6C53BBBCF3CE7F551A49B37
31,657,627 UART: [art] SIG.R = 0142439322DA5BA0584A77C9F698DE77AF6C00827D5AD677BF915C9AAC7EC9171C28626DF8518DB2257419D2DD12DB19
31,664,991 UART: [art] SIG.S = 63DE45DD414BA77E9B4A54288E92DAE694BCB1D2B55B6BC0C1B9ACE299526EC91ABF1D885A8EF32663D9B2B691B29841
32,970,778 UART: Caliptra RT
32,971,480 UART: [state] CFI Enabled
33,132,205 UART: [rt] RT listening for mailbox commands...
33,134,091 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,164,759 UART: [rt]cmd =0x4d454153, len=108
33,167,025 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,444 UART:
192,809 UART: Running Caliptra ROM ...
193,987 UART:
603,629 UART: [state] CFI Enabled
615,293 UART: [state] LifecycleState = Unprovisioned
617,223 UART: [state] DebugLocked = No
620,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,876 UART: [kat] SHA2-256
794,669 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,181 UART: [kat] ++
805,623 UART: [kat] sha1
817,482 UART: [kat] SHA2-256
820,201 UART: [kat] SHA2-384
825,282 UART: [kat] SHA2-512-ACC
827,685 UART: [kat] ECC-384
3,111,289 UART: [kat] HMAC-384Kdf
3,124,236 UART: [kat] LMS
4,314,359 UART: [kat] --
4,319,016 UART: [cold-reset] ++
4,320,238 UART: [fht] Storing FHT @ 0x50003400
4,331,142 UART: [idev] ++
4,331,772 UART: [idev] CDI.KEYID = 6
4,332,687 UART: [idev] SUBJECT.KEYID = 7
4,333,927 UART: [idev] UDS.KEYID = 0
4,334,908 ready_for_fw is high
4,335,102 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,402 UART: [idev] Erasing UDS.KEYID = 0
7,621,642 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,851 UART: [idev] --
7,645,700 UART: [ldev] ++
7,646,317 UART: [ldev] CDI.KEYID = 6
7,647,299 UART: [ldev] SUBJECT.KEYID = 5
7,648,399 UART: [ldev] AUTHORITY.KEYID = 7
7,649,777 UART: [ldev] FE.KEYID = 1
7,661,450 UART: [ldev] Erasing FE.KEYID = 1
10,951,162 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,389 UART: [ldev] --
13,309,405 UART: [fwproc] Waiting for Commands...
13,311,994 UART: [fwproc] Received command 0x46574c44
13,314,174 UART: [fwproc] Received Image of size 114124 bytes
17,364,297 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,680 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,577 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,824,075 >>> mbox cmd response: success
17,827,876 UART: [afmc] ++
17,828,468 UART: [afmc] CDI.KEYID = 6
17,829,534 UART: [afmc] SUBJECT.KEYID = 7
17,830,633 UART: [afmc] AUTHORITY.KEYID = 5
21,143,429 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,696 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,955 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,302 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,175 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,604 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,203 UART: [afmc] --
23,510,608 UART: [cold-reset] --
23,514,580 UART: [state] Locking Datavault
23,519,716 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,465 UART: [state] Locking ICCM
23,523,032 UART: [exit] Launching FMC @ 0x40000130
23,531,430 UART:
23,531,657 UART: Running Caliptra FMC ...
23,532,750 UART:
23,532,900 UART: [state] CFI Enabled
23,541,383 UART: [fht] FMC Alias Private Key: 7
25,872,056 UART: [art] Extend RT PCRs Done
25,873,278 UART: [art] Lock RT PCRs Done
25,875,121 UART: [art] Populate DV Done
25,880,524 UART: [fht] FMC Alias Private Key: 7
25,882,109 UART: [art] Derive CDI
25,882,919 UART: [art] Store in in slot 0x4
25,925,345 UART: [art] Derive Key Pair
25,926,336 UART: [art] Store priv key in slot 0x5
29,168,796 UART: [art] Derive Key Pair - Done
29,181,941 UART: [art] Signing Cert with AUTHO
29,183,256 UART: RITY.KEYID = 7
31,461,962 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,457 UART: [art] PUB.X = 80B56134009777BB081350DC88C2657E5A846671BF30BCE181DD605006F83A489A2A9D181DE472548B4F935D9305912E
31,470,722 UART: [art] PUB.Y = 94A7F900D14D1A94686E522A96B9346F3961C93788D81FA6F3C5BF016FE6CB7A9126982A65D43B638CE310205900D5BA
31,477,878 UART: [art] SIG.R = 1D9FBAA25D160489FC2D958A4D789A8E4890F613797868E7B796CFC7EACEA32E046BC6F19B71B989B68ED66168161440
31,485,250 UART: [art] SIG.S = 79ED03CB24FF7622F3CAEE07B07A2D8E5240F8A567C4F0D2D20ADD8CB7D096AA56FD6BAA3467A4242DAA71CCFFCFD55C
32,790,640 UART: Caliptra RT
32,791,347 UART: [state] CFI Enabled
32,908,887 UART: [rt] RT listening for mailbox commands...
32,910,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,941,645 UART: [rt]cmd =0x4d454153, len=108
32,943,756 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
4,129,074 ready_for_fw is high
4,129,476 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,601 >>> mbox cmd response: success
23,711,510 UART:
23,711,890 UART: Running Caliptra FMC ...
23,713,004 UART:
23,713,160 UART: [state] CFI Enabled
23,721,057 UART: [fht] FMC Alias Private Key: 7
26,052,036 UART: [art] Extend RT PCRs Done
26,053,276 UART: [art] Lock RT PCRs Done
26,054,805 UART: [art] Populate DV Done
26,059,942 UART: [fht] FMC Alias Private Key: 7
26,061,591 UART: [art] Derive CDI
26,062,404 UART: [art] Store in in slot 0x4
26,105,010 UART: [art] Derive Key Pair
26,106,048 UART: [art] Store priv key in slot 0x5
29,347,994 UART: [art] Derive Key Pair - Done
29,361,049 UART: [art] Signing Cert with AUTHO
29,362,355 UART: RITY.KEYID = 7
31,641,637 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,139 UART: [art] PUB.X = ECB53230850301475772457F88C17679B9DFA6AB3BABDB33AFB86DD7CB1724F71BAB7F354DEF9A58C676ED23987988CE
31,650,432 UART: [art] PUB.Y = C077A9969D7E85A2A50D30BEF12EBEA120ED576FA9986472F150794C71B3C89E44EA6052912E591639D9C67FE1B2EC87
31,657,642 UART: [art] SIG.R = 23AF13A462DDF5BFB29B7131C8944B5C14090B66EF00FA6D93B40A030CFE90E04CA26CB9FFFF0C812EB478B2BC79CE41
31,665,086 UART: [art] SIG.S = D5943DC178AFC30ED1026E04FB52604BB073F1F698A9F1F6368360963ED231C9C66B359D958C44CC3D2F9C8F4A494130
32,969,878 UART: Caliptra RT
32,970,611 UART: [state] CFI Enabled
33,088,446 UART: [rt] RT listening for mailbox commands...
33,090,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,121,171 UART: [rt]cmd =0x4d454153, len=108
33,122,964 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,031 UART:
192,403 UART: Running Caliptra ROM ...
193,564 UART:
193,712 UART: [state] CFI Enabled
262,257 UART: [state] LifecycleState = Unprovisioned
264,091 UART: [state] DebugLocked = No
266,625 UART: [state] WD Timer not started. Device not locked for debugging
269,945 UART: [kat] SHA2-256
449,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,662 UART: [kat] ++
461,192 UART: [kat] sha1
471,931 UART: [kat] SHA2-256
474,937 UART: [kat] SHA2-384
481,063 UART: [kat] SHA2-512-ACC
484,000 UART: [kat] ECC-384
2,948,915 UART: [kat] HMAC-384Kdf
2,971,680 UART: [kat] LMS
3,501,191 UART: [kat] --
3,505,921 UART: [cold-reset] ++
3,507,784 UART: [fht] FHT @ 0x50003400
3,519,113 UART: [idev] ++
3,519,669 UART: [idev] CDI.KEYID = 6
3,520,553 UART: [idev] SUBJECT.KEYID = 7
3,521,788 UART: [idev] UDS.KEYID = 0
3,522,710 ready_for_fw is high
3,522,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,838 UART: [idev] Erasing UDS.KEYID = 0
6,027,373 UART: [idev] Sha1 KeyId Algorithm
6,050,541 UART: [idev] --
6,053,836 UART: [ldev] ++
6,054,410 UART: [ldev] CDI.KEYID = 6
6,055,352 UART: [ldev] SUBJECT.KEYID = 5
6,056,518 UART: [ldev] AUTHORITY.KEYID = 7
6,057,754 UART: [ldev] FE.KEYID = 1
6,100,701 UART: [ldev] Erasing FE.KEYID = 1
8,603,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,576 UART: [ldev] --
10,413,063 UART: [fwproc] Wait for Commands...
10,415,757 UART: [fwproc] Recv command 0x46574c44
10,417,793 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,275,163 >>> mbox cmd response: success
14,279,907 UART: [afmc] ++
14,280,504 UART: [afmc] CDI.KEYID = 6
14,281,419 UART: [afmc] SUBJECT.KEYID = 7
14,282,578 UART: [afmc] AUTHORITY.KEYID = 5
16,808,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,046 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,835 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,738 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,007 UART: [afmc] --
18,609,530 UART: [cold-reset] --
18,613,127 UART: [state] Locking Datavault
18,619,450 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,093 UART: [state] Locking ICCM
18,622,127 UART: [exit] Launching FMC @ 0x40000130
18,630,531 UART:
18,630,771 UART: Running Caliptra FMC ...
18,631,873 UART:
18,632,038 UART: [state] CFI Enabled
18,690,021 UART: [fht] FMC Alias Private Key: 7
20,453,362 UART: [art] Extend RT PCRs Done
20,454,570 UART: [art] Lock RT PCRs Done
20,456,406 UART: [art] Populate DV Done
20,461,549 UART: [fht] FMC Alias Private Key: 7
20,463,301 UART: [art] Derive CDI
20,464,117 UART: [art] Store in in slot 0x4
20,522,745 UART: [art] Derive Key Pair
20,523,783 UART: [art] Store priv key in slot 0x5
22,986,246 UART: [art] Derive Key Pair - Done
22,999,570 UART: [art] Signing Cert with AUTHO
23,000,900 UART: RITY.KEYID = 7
24,711,925 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,402 UART: [art] PUB.X = 0E1654D4E3547543CB03C751C04A2C4B351D8528BC1EF0BE240B2E1E9B40C81E5136D0F30B11C644A1CC7C1D2B38A96F
24,720,706 UART: [art] PUB.Y = BC226316F10A9A271C50F4B716AFF3C909C81F1E68DB756FBCFB3C9BA6433CE3C6D9B4CBE94F13BE7429EE883E38DB39
24,727,969 UART: [art] SIG.R = 8BD95021459A2446243BAE638DC1A68E61B5CBCCFDEC5876200DFA2696B99205BC67006DC984896EF4CA14A8438F417D
24,735,390 UART: [art] SIG.S = 091FE1F582ED22E1C76B36183A3AD2737C265510AF0D388A0A345782FBE618517084D95E2F350A0B88A077AD016416FC
25,714,421 UART: Caliptra RT
25,715,126 UART: [state] CFI Enabled
25,879,974 UART: [rt] RT listening for mailbox commands...
25,881,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,912,880 UART: [rt]cmd =0x4d454153, len=108
25,914,706 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,362,000 ready_for_fw is high
3,362,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,030,495 >>> mbox cmd response: success
18,322,273 UART:
18,322,672 UART: Running Caliptra FMC ...
18,323,772 UART:
18,323,924 UART: [state] CFI Enabled
18,389,379 UART: [fht] FMC Alias Private Key: 7
20,152,823 UART: [art] Extend RT PCRs Done
20,154,051 UART: [art] Lock RT PCRs Done
20,155,461 UART: [art] Populate DV Done
20,161,267 UART: [fht] FMC Alias Private Key: 7
20,162,862 UART: [art] Derive CDI
20,163,678 UART: [art] Store in in slot 0x4
20,221,216 UART: [art] Derive Key Pair
20,222,261 UART: [art] Store priv key in slot 0x5
22,685,618 UART: [art] Derive Key Pair - Done
22,698,135 UART: [art] Signing Cert with AUTHO
22,699,442 UART: RITY.KEYID = 7
24,410,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,411,969 UART: [art] PUB.X = 87D47939D9AAEE7BB767CF4577B19E960B6A39AEE66029485A246BF5592072595B4F8E92FF9B1D1044116C91FF80DB94
24,419,222 UART: [art] PUB.Y = 360868BF064F1BB1D6E5F3365825196744F6790D3BF2AC92D2E20EBDFFC3CF338662F61AC4611644C8C6B01BB8D72682
24,426,477 UART: [art] SIG.R = 1406F5B7B259DA40481AE0683DABB93DD2549DE7BBFA66F55F084A11F623DA0881DFD369112E37934186296DCDA517E4
24,433,878 UART: [art] SIG.S = CE43CDB7EA86A38F6BEF30BEC58D2581968140E68EC715ED8104B37260F1493FDDDD232264B7940901296F7BE36C466C
25,412,588 UART: Caliptra RT
25,413,303 UART: [state] CFI Enabled
25,577,119 UART: [rt] RT listening for mailbox commands...
25,579,009 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,610,250 UART: [rt]cmd =0x4d454153, len=108
25,612,077 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
192,302 UART:
192,661 UART: Running Caliptra ROM ...
193,783 UART:
603,618 UART: [state] CFI Enabled
614,770 UART: [state] LifecycleState = Unprovisioned
616,615 UART: [state] DebugLocked = No
619,429 UART: [state] WD Timer not started. Device not locked for debugging
623,311 UART: [kat] SHA2-256
802,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,005 UART: [kat] ++
814,547 UART: [kat] sha1
825,867 UART: [kat] SHA2-256
828,872 UART: [kat] SHA2-384
834,924 UART: [kat] SHA2-512-ACC
837,852 UART: [kat] ECC-384
3,279,339 UART: [kat] HMAC-384Kdf
3,292,144 UART: [kat] LMS
3,821,611 UART: [kat] --
3,825,677 UART: [cold-reset] ++
3,828,311 UART: [fht] FHT @ 0x50003400
3,837,860 UART: [idev] ++
3,838,413 UART: [idev] CDI.KEYID = 6
3,839,320 UART: [idev] SUBJECT.KEYID = 7
3,840,558 UART: [idev] UDS.KEYID = 0
3,841,451 ready_for_fw is high
3,841,651 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,473 UART: [idev] Erasing UDS.KEYID = 0
6,314,103 UART: [idev] Sha1 KeyId Algorithm
6,337,917 UART: [idev] --
6,341,585 UART: [ldev] ++
6,342,146 UART: [ldev] CDI.KEYID = 6
6,343,103 UART: [ldev] SUBJECT.KEYID = 5
6,344,254 UART: [ldev] AUTHORITY.KEYID = 7
6,345,530 UART: [ldev] FE.KEYID = 1
6,356,279 UART: [ldev] Erasing FE.KEYID = 1
8,829,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,520 UART: [ldev] --
10,618,418 UART: [fwproc] Wait for Commands...
10,620,406 UART: [fwproc] Recv command 0x46574c44
10,622,512 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,238 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,030 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,266 >>> mbox cmd response: success
14,495,277 UART: [afmc] ++
14,495,866 UART: [afmc] CDI.KEYID = 6
14,496,745 UART: [afmc] SUBJECT.KEYID = 7
14,497,948 UART: [afmc] AUTHORITY.KEYID = 5
16,999,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,318 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,118 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,134 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,014 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,545 UART: [afmc] --
18,797,498 UART: [cold-reset] --
18,802,278 UART: [state] Locking Datavault
18,806,218 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,856 UART: [state] Locking ICCM
18,809,566 UART: [exit] Launching FMC @ 0x40000130
18,817,961 UART:
18,818,197 UART: Running Caliptra FMC ...
18,819,292 UART:
18,819,446 UART: [state] CFI Enabled
18,827,598 UART: [fht] FMC Alias Private Key: 7
20,584,242 UART: [art] Extend RT PCRs Done
20,585,457 UART: [art] Lock RT PCRs Done
20,587,189 UART: [art] Populate DV Done
20,592,865 UART: [fht] FMC Alias Private Key: 7
20,594,611 UART: [art] Derive CDI
20,595,432 UART: [art] Store in in slot 0x4
20,637,969 UART: [art] Derive Key Pair
20,639,014 UART: [art] Store priv key in slot 0x5
23,065,123 UART: [art] Derive Key Pair - Done
23,078,227 UART: [art] Signing Cert with AUTHO
23,079,532 UART: RITY.KEYID = 7
24,784,368 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,874 UART: [art] PUB.X = 7A7F8E215EA9185ACE169F56C63BD33756547879F3F02BF7F1AF79BBD030D18E9E5B15896170EC134B3DE8582B5A2A19
24,793,138 UART: [art] PUB.Y = 257E2703F70E43C6266DA3E072BE5FF95BC583D06BBCB97A8DB9294D9F21ACDDC6F6083EA0198F4CD4FA2C9B0E132CD3
24,800,400 UART: [art] SIG.R = 773D8CE262A74106F9FCF20A89D6441004B430C674E14BF06AAA68486EAB87B95C4D877A7516D6F460632B5649F8278B
24,807,756 UART: [art] SIG.S = 6A386C94C7FD8245F3DC0C855537A3FD93DEFA138507A16EB525CEF620DD58A3A603DE3219151A15F1AC779DBFDAFE65
25,787,423 UART: Caliptra RT
25,788,129 UART: [state] CFI Enabled
25,906,014 UART: [rt] RT listening for mailbox commands...
25,907,901 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,938,670 UART: [rt]cmd =0x4d454153, len=108
25,940,412 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,690,283 ready_for_fw is high
3,690,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,256,942 >>> mbox cmd response: success
18,512,536 UART:
18,512,921 UART: Running Caliptra FMC ...
18,514,013 UART:
18,514,160 UART: [state] CFI Enabled
18,522,216 UART: [fht] FMC Alias Private Key: 7
20,278,948 UART: [art] Extend RT PCRs Done
20,280,174 UART: [art] Lock RT PCRs Done
20,281,862 UART: [art] Populate DV Done
20,287,215 UART: [fht] FMC Alias Private Key: 7
20,288,747 UART: [art] Derive CDI
20,289,505 UART: [art] Store in in slot 0x4
20,332,176 UART: [art] Derive Key Pair
20,333,216 UART: [art] Store priv key in slot 0x5
22,760,203 UART: [art] Derive Key Pair - Done
22,773,265 UART: [art] Signing Cert with AUTHO
22,774,567 UART: RITY.KEYID = 7
24,480,244 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,758 UART: [art] PUB.X = 45B63440A3E96032322934FA208DAD9F8CF25E2975137CB7CDBEFB9C10784E4EE808DC000305E8D3B4D589AA54CD62AF
24,489,057 UART: [art] PUB.Y = 105ADE8E67B938AFCC2235642DA643B1752133D094EC4290410F0CE42A186B7D57EC1C4314E5A2B058A57C2F7484C5C7
24,496,302 UART: [art] SIG.R = 3CBCDAD1B271056DA6CBFA5117E08124AF855F7A697E4D31ED3DE9B4B2E1F4704873173D977681EC9C8067582C9FCEC4
24,503,680 UART: [art] SIG.S = D9C783AB632006CD7A2ED2E936A67CFC05D276E9FB4255DC8A322BF8EC04DEC9E3004DFDAB591447A9C8893FEB36AD9C
25,482,668 UART: Caliptra RT
25,483,385 UART: [state] CFI Enabled
25,601,653 UART: [rt] RT listening for mailbox commands...
25,603,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,633,985 UART: [rt]cmd =0x4d454153, len=108
25,635,778 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,438,980 ready_for_fw is high
3,439,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,754,824 >>> mbox cmd response: success
19,069,565 UART:
19,069,995 UART: Running Caliptra FMC ...
19,071,108 UART:
19,071,265 UART: [state] CFI Enabled
19,138,796 UART: [fht] FMC Alias Private Key: 7
20,901,902 UART: [art] Extend RT PCRs Done
20,903,124 UART: [art] Lock RT PCRs Done
20,904,941 UART: [art] Populate DV Done
20,910,145 UART: [fht] FMC Alias Private Key: 7
20,911,849 UART: [art] Derive CDI
20,912,668 UART: [art] Store in in slot 0x4
20,971,280 UART: [art] Derive Key Pair
20,972,321 UART: [art] Store priv key in slot 0x5
23,435,562 UART: [art] Derive Key Pair - Done
23,448,661 UART: [art] Signing Cert with AUTHO
23,449,962 UART: RITY.KEYID = 7
25,160,580 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,238 UART: [art] PUB.X = 8800E1249F1AC5DB7034838213FAAA49C635FB1545E172262691A9BD2D41D1FC2CFE4B2763AAE25A5C23F7025F07F826
25,169,331 UART: [art] PUB.Y = 65897024C6668B5A960CD01A6AA98C0439FC5223A7366B4D0F0E62170C78620A8185524BEBCA7D486BB1A5273027F5DC
25,176,588 UART: [art] SIG.R = 7BCCE42364340800EB08B9B8000E679FE625D57F98FC4268CC4250272DACB4A7B8291877D9AE340849377B296B6BC3DF
25,183,921 UART: [art] SIG.S = E6F6A3DFE2D6B893A27C86449BBC5D2EBB310C943BCD61FF42337D315C8B1AE72530448EEB589178B1220BD5B21798A0
26,162,918 UART: Caliptra RT
26,163,626 UART: [state] CFI Enabled
26,329,180 UART: [rt] RT listening for mailbox commands...
26,331,071 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,362,217 UART: [rt]cmd =0x4d454153, len=108
26,364,271 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,761,322 ready_for_fw is high
3,761,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,968,293 >>> mbox cmd response: success
19,217,302 UART:
19,217,694 UART: Running Caliptra FMC ...
19,218,804 UART:
19,218,970 UART: [state] CFI Enabled
19,226,983 UART: [fht] FMC Alias Private Key: 7
20,983,846 UART: [art] Extend RT PCRs Done
20,985,082 UART: [art] Lock RT PCRs Done
20,987,062 UART: [art] Populate DV Done
20,992,370 UART: [fht] FMC Alias Private Key: 7
20,994,066 UART: [art] Derive CDI
20,994,802 UART: [art] Store in in slot 0x4
21,037,785 UART: [art] Derive Key Pair
21,038,800 UART: [art] Store priv key in slot 0x5
23,465,591 UART: [art] Derive Key Pair - Done
23,478,468 UART: [art] Signing Cert with AUTHO
23,479,791 UART: RITY.KEYID = 7
25,184,946 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,448 UART: [art] PUB.X = D1C1F8F0128ADBC191766BDBCB96F85273A46B8767DF37BFCC291AF03E69EBC0100183B81469BFFDAAF0B9FC92CC96B1
25,193,781 UART: [art] PUB.Y = C9F34FD63052284405734F25849C0B73D322457894DAAA0DD6785E221ECBFFFB11D004A0F85DA0957C5850AFAC0DD175
25,201,037 UART: [art] SIG.R = 518130D41A4F5182685A4CAD7232CDA54036FDFEEF6AF9FA46795FE4C4642569C2F0871A33985D8A478727CE407C6DBF
25,208,432 UART: [art] SIG.S = 8DD6CA3B125F4F2255280C834F5AECBE58330CBF1F24D21B3A46BAA54BBEF2686EC7EF145BFB9095810B740CC2978112
26,187,002 UART: Caliptra RT
26,187,715 UART: [state] CFI Enabled
26,304,796 UART: [rt] RT listening for mailbox commands...
26,306,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,337,565 UART: [rt]cmd =0x4d454153, len=108
26,339,465 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,399 UART: [kat] SHA2-256
882,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,445 UART: [kat] ++
886,597 UART: [kat] sha1
890,803 UART: [kat] SHA2-256
892,741 UART: [kat] SHA2-384
895,554 UART: [kat] SHA2-512-ACC
897,455 UART: [kat] ECC-384
903,140 UART: [kat] HMAC-384Kdf
907,932 UART: [kat] LMS
1,476,128 UART: [kat] --
1,477,133 UART: [cold-reset] ++
1,477,661 UART: [fht] Storing FHT @ 0x50003400
1,480,594 UART: [idev] ++
1,480,762 UART: [idev] CDI.KEYID = 6
1,481,122 UART: [idev] SUBJECT.KEYID = 7
1,481,546 UART: [idev] UDS.KEYID = 0
1,481,891 ready_for_fw is high
1,481,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,294 UART: [idev] Erasing UDS.KEYID = 0
1,506,250 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,874 UART: [idev] --
1,516,035 UART: [ldev] ++
1,516,203 UART: [ldev] CDI.KEYID = 6
1,516,566 UART: [ldev] SUBJECT.KEYID = 5
1,516,992 UART: [ldev] AUTHORITY.KEYID = 7
1,517,455 UART: [ldev] FE.KEYID = 1
1,522,537 UART: [ldev] Erasing FE.KEYID = 1
1,547,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,424 UART: [ldev] --
1,586,755 UART: [fwproc] Waiting for Commands...
1,587,388 UART: [fwproc] Received command 0x46574c44
1,588,179 UART: [fwproc] Received Image of size 114448 bytes
2,887,589 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,547 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,838 >>> mbox cmd response: success
3,080,982 UART: [afmc] ++
3,081,150 UART: [afmc] CDI.KEYID = 6
3,081,512 UART: [afmc] SUBJECT.KEYID = 7
3,081,937 UART: [afmc] AUTHORITY.KEYID = 5
3,117,430 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,984 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,764 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,492 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,377 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,067 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,868 UART: [afmc] --
3,160,794 UART: [cold-reset] --
3,161,834 UART: [state] Locking Datavault
3,163,001 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,605 UART: [state] Locking ICCM
3,164,215 UART: [exit] Launching FMC @ 0x40000130
3,169,544 UART:
3,169,560 UART: Running Caliptra FMC ...
3,169,968 UART:
3,170,022 UART: [state] CFI Enabled
3,180,435 UART: [fht] FMC Alias Private Key: 7
3,288,040 UART: [art] Extend RT PCRs Done
3,288,468 UART: [art] Lock RT PCRs Done
3,290,220 UART: [art] Populate DV Done
3,298,335 UART: [fht] FMC Alias Private Key: 7
3,299,417 UART: [art] Derive CDI
3,299,697 UART: [art] Store in in slot 0x4
3,385,492 UART: [art] Derive Key Pair
3,385,852 UART: [art] Store priv key in slot 0x5
3,398,692 UART: [art] Derive Key Pair - Done
3,413,706 UART: [art] Signing Cert with AUTHO
3,414,186 UART: RITY.KEYID = 7
3,429,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,057 UART: [art] PUB.X = 722361BA83FF5B7D21270F4FBE380D1D192CD368C6291512B4DAB5FE9D738428B26DA0BCDFCBC48787826082186D686E
3,436,827 UART: [art] PUB.Y = E7AB40C2B32AB56EDFDC47BE8AA4AA59F66C3E824D85966190DC58E0A44497E33E1E4D585DECFA9CF666A38593ED3B11
3,443,797 UART: [art] SIG.R = 78673698972CD69C8D6CE5D58FA9026F7468A7487625AAD65D4955B287A2DBA5A8AC082F3B4FEC3F5FC9B415FFE735D2
3,450,571 UART: [art] SIG.S = FE007FF1F7190955090970CF38F3F3609CD604A5523C8ED76997CE4A545C7D79868CE209CFC189A25DB06B21E1D6DF3F
3,473,795 UART: Caliptra RT
3,474,048 UART: [state] CFI Enabled
3,582,129 UART: [rt] RT listening for mailbox commands...
3,582,799 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,295 UART: [rt]cmd =0x4d454153, len=108
3,614,885 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,345 ready_for_fw is high
1,362,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,171 >>> mbox cmd response: success
2,990,299 UART:
2,990,315 UART: Running Caliptra FMC ...
2,990,723 UART:
2,990,777 UART: [state] CFI Enabled
3,000,974 UART: [fht] FMC Alias Private Key: 7
3,109,127 UART: [art] Extend RT PCRs Done
3,109,555 UART: [art] Lock RT PCRs Done
3,111,189 UART: [art] Populate DV Done
3,119,518 UART: [fht] FMC Alias Private Key: 7
3,120,600 UART: [art] Derive CDI
3,120,880 UART: [art] Store in in slot 0x4
3,206,543 UART: [art] Derive Key Pair
3,206,903 UART: [art] Store priv key in slot 0x5
3,220,459 UART: [art] Derive Key Pair - Done
3,235,204 UART: [art] Signing Cert with AUTHO
3,235,684 UART: RITY.KEYID = 7
3,250,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,313 UART: [art] PUB.X = 93A7E13C4FDDA4F579C780EB6D3F65C482E1B2929D2885A8B32662FC38D794D0CD5418733F17438C73A31D01BF20E048
3,258,082 UART: [art] PUB.Y = C20DF6660577F3575BFD59F437DE984784B4963E6B9C3C5AAFA3ED24103FFD7564C739555349511C7AE4D8980A72626A
3,265,023 UART: [art] SIG.R = 1BEA637E2961257E5795A4D150214E518F6B4A369FC2E0F4643EBE39CBA79FECA3EA8E4B97A98E060F8F538428A77CE3
3,271,797 UART: [art] SIG.S = E99F3C2993D418F2835F48761E8233E4388DB547D2287BFD92F4277B102D8BF7FC848DFE423D9B8BACDD0A7AA7CC0C45
3,295,666 UART: Caliptra RT
3,295,919 UART: [state] CFI Enabled
3,404,260 UART: [rt] RT listening for mailbox commands...
3,404,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,526 UART: [rt]cmd =0x4d454153, len=108
3,436,942 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,874 UART: [kat] SHA2-256
892,812 UART: [kat] SHA2-384
895,783 UART: [kat] SHA2-512-ACC
897,684 UART: [kat] ECC-384
903,259 UART: [kat] HMAC-384Kdf
907,929 UART: [kat] LMS
1,476,125 UART: [kat] --
1,477,032 UART: [cold-reset] ++
1,477,566 UART: [fht] Storing FHT @ 0x50003400
1,480,507 UART: [idev] ++
1,480,675 UART: [idev] CDI.KEYID = 6
1,481,035 UART: [idev] SUBJECT.KEYID = 7
1,481,459 UART: [idev] UDS.KEYID = 0
1,481,804 ready_for_fw is high
1,481,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,467 UART: [idev] Erasing UDS.KEYID = 0
1,505,917 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,347 UART: [idev] --
1,515,410 UART: [ldev] ++
1,515,578 UART: [ldev] CDI.KEYID = 6
1,515,941 UART: [ldev] SUBJECT.KEYID = 5
1,516,367 UART: [ldev] AUTHORITY.KEYID = 7
1,516,830 UART: [ldev] FE.KEYID = 1
1,522,144 UART: [ldev] Erasing FE.KEYID = 1
1,547,961 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,057 UART: [ldev] --
1,587,390 UART: [fwproc] Waiting for Commands...
1,588,005 UART: [fwproc] Received command 0x46574c44
1,588,796 UART: [fwproc] Received Image of size 114448 bytes
2,887,400 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,778 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,137 >>> mbox cmd response: success
3,081,297 UART: [afmc] ++
3,081,465 UART: [afmc] CDI.KEYID = 6
3,081,827 UART: [afmc] SUBJECT.KEYID = 7
3,082,252 UART: [afmc] AUTHORITY.KEYID = 5
3,117,221 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,641 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,421 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,149 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,034 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,724 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,623 UART: [afmc] --
3,160,537 UART: [cold-reset] --
3,161,521 UART: [state] Locking Datavault
3,162,754 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,358 UART: [state] Locking ICCM
3,163,898 UART: [exit] Launching FMC @ 0x40000130
3,169,227 UART:
3,169,243 UART: Running Caliptra FMC ...
3,169,651 UART:
3,169,794 UART: [state] CFI Enabled
3,180,427 UART: [fht] FMC Alias Private Key: 7
3,288,484 UART: [art] Extend RT PCRs Done
3,288,912 UART: [art] Lock RT PCRs Done
3,290,416 UART: [art] Populate DV Done
3,298,837 UART: [fht] FMC Alias Private Key: 7
3,299,965 UART: [art] Derive CDI
3,300,245 UART: [art] Store in in slot 0x4
3,385,716 UART: [art] Derive Key Pair
3,386,076 UART: [art] Store priv key in slot 0x5
3,399,648 UART: [art] Derive Key Pair - Done
3,414,034 UART: [art] Signing Cert with AUTHO
3,414,514 UART: RITY.KEYID = 7
3,430,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,781 UART: [art] PUB.X = 7704661D2EAD388186DCF99367B34B4207607A556993B3A182099FCD0DB20885153753317A3F51A8A877C35A53F71A48
3,437,524 UART: [art] PUB.Y = 5F04C49631C4363D1C7831DE690E77BC02ACDB08811F4DB7E71AA32900ABA7FF677D73ACAFA6DDF8A00F810233624947
3,444,444 UART: [art] SIG.R = 15A7F4D280CCF95BE305F25BCD2431E7D2064F18C1E62EEDB17AE1CDA408BD71C76EF23534FFD7A4AEF268BDC708BBB0
3,451,228 UART: [art] SIG.S = A6D217540F7FABDAAD20F9B8F032D0E7FDB627FA8D454CA73C351FD0DFF23223AA3A2BC318E4301B6016A2619DC124EC
3,474,498 UART: Caliptra RT
3,474,843 UART: [state] CFI Enabled
3,582,784 UART: [rt] RT listening for mailbox commands...
3,583,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,108 UART: [rt]cmd =0x4d454153, len=108
3,615,410 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,880 ready_for_fw is high
1,361,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,924 >>> mbox cmd response: success
2,989,554 UART:
2,989,570 UART: Running Caliptra FMC ...
2,989,978 UART:
2,990,121 UART: [state] CFI Enabled
3,000,676 UART: [fht] FMC Alias Private Key: 7
3,108,145 UART: [art] Extend RT PCRs Done
3,108,573 UART: [art] Lock RT PCRs Done
3,110,157 UART: [art] Populate DV Done
3,118,554 UART: [fht] FMC Alias Private Key: 7
3,119,498 UART: [art] Derive CDI
3,119,778 UART: [art] Store in in slot 0x4
3,205,629 UART: [art] Derive Key Pair
3,205,989 UART: [art] Store priv key in slot 0x5
3,219,531 UART: [art] Derive Key Pair - Done
3,234,342 UART: [art] Signing Cert with AUTHO
3,234,822 UART: RITY.KEYID = 7
3,250,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,967 UART: [art] PUB.X = 7C65422EC8CDE266C964DF61432FEF5B313005F7926F883F9EC6DA9BB9F6AAB9D1E46ACB5183FE236F8D43631B492EE2
3,257,748 UART: [art] PUB.Y = B3D5BAE9022B0DFF7C1C301B92950004802D9BA6187DBB5280D6088EE23DAFADF6596DDC38A9CE9EF02CD70A2B6262D3
3,264,679 UART: [art] SIG.R = 6DA322436A8D3088BDAAB4425B9D248E1180D64338F9E088EE60AC9D0885918753F4DCBB949C8B7195C91B62B569898A
3,271,446 UART: [art] SIG.S = 6196F4311E1AF677AECB387A268369639A61E60140AC19FD9D6CCEC3CDB45364162ACD9DFE4AC74ADD1FC92B34B187F5
3,295,214 UART: Caliptra RT
3,295,559 UART: [state] CFI Enabled
3,404,363 UART: [rt] RT listening for mailbox commands...
3,405,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,789 UART: [rt]cmd =0x4d454153, len=108
3,437,031 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,676 UART: [state] LifecycleState = Unprovisioned
86,331 UART: [state] DebugLocked = No
87,035 UART: [state] WD Timer not started. Device not locked for debugging
88,396 UART: [kat] SHA2-256
894,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,171 UART: [kat] ++
898,323 UART: [kat] sha1
902,485 UART: [kat] SHA2-256
904,425 UART: [kat] SHA2-384
907,216 UART: [kat] SHA2-512-ACC
909,117 UART: [kat] ECC-384
918,904 UART: [kat] HMAC-384Kdf
923,462 UART: [kat] LMS
1,171,790 UART: [kat] --
1,172,727 UART: [cold-reset] ++
1,173,233 UART: [fht] FHT @ 0x50003400
1,176,034 UART: [idev] ++
1,176,202 UART: [idev] CDI.KEYID = 6
1,176,562 UART: [idev] SUBJECT.KEYID = 7
1,176,986 UART: [idev] UDS.KEYID = 0
1,177,331 ready_for_fw is high
1,177,331 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,772 UART: [idev] Erasing UDS.KEYID = 0
1,202,317 UART: [idev] Sha1 KeyId Algorithm
1,210,697 UART: [idev] --
1,211,811 UART: [ldev] ++
1,211,979 UART: [ldev] CDI.KEYID = 6
1,212,342 UART: [ldev] SUBJECT.KEYID = 5
1,212,768 UART: [ldev] AUTHORITY.KEYID = 7
1,213,231 UART: [ldev] FE.KEYID = 1
1,218,497 UART: [ldev] Erasing FE.KEYID = 1
1,244,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,293 UART: [ldev] --
1,283,788 UART: [fwproc] Wait for Commands...
1,284,482 UART: [fwproc] Recv command 0x46574c44
1,285,210 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,599 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,872 >>> mbox cmd response: success
2,778,036 UART: [afmc] ++
2,778,204 UART: [afmc] CDI.KEYID = 6
2,778,566 UART: [afmc] SUBJECT.KEYID = 7
2,778,991 UART: [afmc] AUTHORITY.KEYID = 5
2,813,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,617 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,019 UART: [afmc] --
2,856,993 UART: [cold-reset] --
2,857,629 UART: [state] Locking Datavault
2,858,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,336 UART: [state] Locking ICCM
2,859,800 UART: [exit] Launching FMC @ 0x40000130
2,865,129 UART:
2,865,145 UART: Running Caliptra FMC ...
2,865,553 UART:
2,865,607 UART: [state] CFI Enabled
2,875,852 UART: [fht] FMC Alias Private Key: 7
2,984,169 UART: [art] Extend RT PCRs Done
2,984,597 UART: [art] Lock RT PCRs Done
2,986,261 UART: [art] Populate DV Done
2,994,492 UART: [fht] FMC Alias Private Key: 7
2,995,608 UART: [art] Derive CDI
2,995,888 UART: [art] Store in in slot 0x4
3,081,449 UART: [art] Derive Key Pair
3,081,809 UART: [art] Store priv key in slot 0x5
3,095,147 UART: [art] Derive Key Pair - Done
3,109,889 UART: [art] Signing Cert with AUTHO
3,110,369 UART: RITY.KEYID = 7
3,125,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,142 UART: [art] PUB.X = A417BD6DB84B1124D92BAA1F0AB63E5D024D549637CCAC64900B8A9A45AC3572AAC8841327D881B056AD4A2DD23643B8
3,132,913 UART: [art] PUB.Y = DC0938E85CD72669BCE004A55F72A615C731FE43BAE9D10169EC2B487AF9CD0422CCC2034EC62209EEEFE0C15E584DE6
3,139,861 UART: [art] SIG.R = 4EE7F5DD464AE69E4FCCC676BEB6CA088EF12FCE5CEE5717F5454DD601E301E007C8E05BCC70D3488D4CF928F843A700
3,146,617 UART: [art] SIG.S = 55957382196306BB0A5B175F65F0096D79231332366E0B4684944AE3B7F306452C60A212B998E5C25DCD1F2D150617A3
3,170,292 UART: Caliptra RT
3,170,545 UART: [state] CFI Enabled
3,277,602 UART: [rt] RT listening for mailbox commands...
3,278,272 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,980 UART: [rt]cmd =0x4d454153, len=108
3,310,542 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,137 ready_for_fw is high
1,059,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,559 >>> mbox cmd response: success
2,689,961 UART:
2,689,977 UART: Running Caliptra FMC ...
2,690,385 UART:
2,690,439 UART: [state] CFI Enabled
2,700,996 UART: [fht] FMC Alias Private Key: 7
2,809,625 UART: [art] Extend RT PCRs Done
2,810,053 UART: [art] Lock RT PCRs Done
2,811,365 UART: [art] Populate DV Done
2,819,664 UART: [fht] FMC Alias Private Key: 7
2,820,708 UART: [art] Derive CDI
2,820,988 UART: [art] Store in in slot 0x4
2,906,771 UART: [art] Derive Key Pair
2,907,131 UART: [art] Store priv key in slot 0x5
2,920,033 UART: [art] Derive Key Pair - Done
2,934,734 UART: [art] Signing Cert with AUTHO
2,935,214 UART: RITY.KEYID = 7
2,950,024 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,789 UART: [art] PUB.X = 47CB8D155BA37943E52136ECD979E0060D06531C68F99729E1102C28578C72C2F2564FC6D7A28378D30DC4A3AB0211AD
2,957,542 UART: [art] PUB.Y = 9BC087875FEDB26A8A47D56EAFE08B72A68A96839F94DF2F1281E6ECCB041ECCA41EDFC3D552C78093639A60E5C208B7
2,964,502 UART: [art] SIG.R = A9CA0D9B41041EC2068F4B298B4683BBED68E7F9FB50032DE3AEFB4BE03A40FEC4234B0F9DB2738C292A725A8AE428E8
2,971,275 UART: [art] SIG.S = 00B4F818270245AC78CBFF5ECD9FF7CE6ABC4E101987DC99C34F84DCC4B405D0A4FD8682C4A495D6F5E20E49576FB97E
2,994,845 UART: Caliptra RT
2,995,098 UART: [state] CFI Enabled
3,102,390 UART: [rt] RT listening for mailbox commands...
3,103,060 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,672 UART: [rt]cmd =0x4d454153, len=108
3,135,090 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
893,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,004 UART: [kat] ++
898,156 UART: [kat] sha1
902,462 UART: [kat] SHA2-256
904,402 UART: [kat] SHA2-384
907,049 UART: [kat] SHA2-512-ACC
908,950 UART: [kat] ECC-384
918,473 UART: [kat] HMAC-384Kdf
923,025 UART: [kat] LMS
1,171,353 UART: [kat] --
1,172,236 UART: [cold-reset] ++
1,172,562 UART: [fht] FHT @ 0x50003400
1,175,121 UART: [idev] ++
1,175,289 UART: [idev] CDI.KEYID = 6
1,175,649 UART: [idev] SUBJECT.KEYID = 7
1,176,073 UART: [idev] UDS.KEYID = 0
1,176,418 ready_for_fw is high
1,176,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,991 UART: [idev] Erasing UDS.KEYID = 0
1,201,478 UART: [idev] Sha1 KeyId Algorithm
1,209,774 UART: [idev] --
1,210,864 UART: [ldev] ++
1,211,032 UART: [ldev] CDI.KEYID = 6
1,211,395 UART: [ldev] SUBJECT.KEYID = 5
1,211,821 UART: [ldev] AUTHORITY.KEYID = 7
1,212,284 UART: [ldev] FE.KEYID = 1
1,217,430 UART: [ldev] Erasing FE.KEYID = 1
1,243,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,694 UART: [ldev] --
1,283,051 UART: [fwproc] Wait for Commands...
1,283,863 UART: [fwproc] Recv command 0x46574c44
1,284,591 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,355 >>> mbox cmd response: success
2,777,529 UART: [afmc] ++
2,777,697 UART: [afmc] CDI.KEYID = 6
2,778,059 UART: [afmc] SUBJECT.KEYID = 7
2,778,484 UART: [afmc] AUTHORITY.KEYID = 5
2,814,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,446 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,331 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,050 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,926 UART: [afmc] --
2,857,816 UART: [cold-reset] --
2,858,936 UART: [state] Locking Datavault
2,859,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,513 UART: [state] Locking ICCM
2,861,093 UART: [exit] Launching FMC @ 0x40000130
2,866,422 UART:
2,866,438 UART: Running Caliptra FMC ...
2,866,846 UART:
2,866,989 UART: [state] CFI Enabled
2,877,536 UART: [fht] FMC Alias Private Key: 7
2,985,399 UART: [art] Extend RT PCRs Done
2,985,827 UART: [art] Lock RT PCRs Done
2,987,619 UART: [art] Populate DV Done
2,995,946 UART: [fht] FMC Alias Private Key: 7
2,997,006 UART: [art] Derive CDI
2,997,286 UART: [art] Store in in slot 0x4
3,082,717 UART: [art] Derive Key Pair
3,083,077 UART: [art] Store priv key in slot 0x5
3,095,883 UART: [art] Derive Key Pair - Done
3,110,496 UART: [art] Signing Cert with AUTHO
3,110,976 UART: RITY.KEYID = 7
3,126,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,117 UART: [art] PUB.X = B84D317EA4F96EFDA57B1F99C800BC03CFE6931B651A8039EC211D12BAADD7E7AFCD7D1252BAA000A07A6A4AEA8BC46A
3,133,868 UART: [art] PUB.Y = CE9776A122097DB2FB56D32717AF89FFA8254D998C5380F0D8D6DD4A41F351318BB264BC1DD16DD2E9F113F586293F3E
3,140,823 UART: [art] SIG.R = A3452D2CE43A0D36AE3C22F9D9FF6B42E0D0C127EEC8C4DD330677C0FA9A9B4033E0FF53AD7BB2E0FBB7BB98089A67C7
3,147,608 UART: [art] SIG.S = B7CF47871B3F39B7433730C04BDDA79779F66EB7ECF7880B23556EFDA5529B37AE84CAC87BDD6EFB596474A8C0E4DFBD
3,171,616 UART: Caliptra RT
3,171,961 UART: [state] CFI Enabled
3,279,591 UART: [rt] RT listening for mailbox commands...
3,280,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,141 UART: [rt]cmd =0x4d454153, len=108
3,312,603 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,226 ready_for_fw is high
1,061,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,970 >>> mbox cmd response: success
2,692,992 UART:
2,693,008 UART: Running Caliptra FMC ...
2,693,416 UART:
2,693,559 UART: [state] CFI Enabled
2,704,164 UART: [fht] FMC Alias Private Key: 7
2,811,673 UART: [art] Extend RT PCRs Done
2,812,101 UART: [art] Lock RT PCRs Done
2,813,859 UART: [art] Populate DV Done
2,822,120 UART: [fht] FMC Alias Private Key: 7
2,823,198 UART: [art] Derive CDI
2,823,478 UART: [art] Store in in slot 0x4
2,909,491 UART: [art] Derive Key Pair
2,909,851 UART: [art] Store priv key in slot 0x5
2,923,653 UART: [art] Derive Key Pair - Done
2,938,437 UART: [art] Signing Cert with AUTHO
2,938,917 UART: RITY.KEYID = 7
2,954,223 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,988 UART: [art] PUB.X = 3CA82F00F2B5B5C820E5821958BE747F196A925ECED12F6532DBA8DC112088CFA283763839271B074932B0E45765DFDD
2,961,735 UART: [art] PUB.Y = 2C772C92B4E77F3E617080231BDD6B739353B4C8BD37CEB1EDEC7B999FAEC584689511AD1DD4D5ED4B0BD5C0D60BC9B7
2,968,699 UART: [art] SIG.R = 641C96D5136C796D61B4FE2A6A9813A0706DB75C911A2960701573C4E782A76E2D77C5365BC6BCCAF4E89B4BBC199C2B
2,975,475 UART: [art] SIG.S = 25D6BB011D79475E4FB8DD26B952B3B2CE861509D258220A4B33DC79457C7E6AFF6EB0158A11239C788BD1FBD7216ED4
2,999,329 UART: Caliptra RT
2,999,674 UART: [state] CFI Enabled
3,107,617 UART: [rt] RT listening for mailbox commands...
3,108,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,865 UART: [rt]cmd =0x4d454153, len=108
3,140,177 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
905,054 UART: [kat] SHA2-512-ACC
906,955 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
920,890 UART: [kat] LMS
1,169,202 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,603 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,174,487 ready_for_fw is high
1,174,487 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,425 UART: [idev] Erasing UDS.KEYID = 0
1,199,071 UART: [idev] Sha1 KeyId Algorithm
1,208,025 UART: [idev] --
1,208,990 UART: [ldev] ++
1,209,158 UART: [ldev] CDI.KEYID = 6
1,209,522 UART: [ldev] SUBJECT.KEYID = 5
1,209,949 UART: [ldev] AUTHORITY.KEYID = 7
1,210,412 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,718 UART: [ldev] --
1,281,034 UART: [fwproc] Wait for Commands...
1,281,823 UART: [fwproc] Recv command 0x46574c44
1,282,556 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,427 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,834 >>> mbox cmd response: success
2,776,035 UART: [afmc] ++
2,776,203 UART: [afmc] CDI.KEYID = 6
2,776,566 UART: [afmc] SUBJECT.KEYID = 7
2,776,992 UART: [afmc] AUTHORITY.KEYID = 5
2,811,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,210 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,939 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,822 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,541 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,452 UART: [afmc] --
2,855,460 UART: [cold-reset] --
2,856,078 UART: [state] Locking Datavault
2,857,271 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,875 UART: [state] Locking ICCM
2,858,519 UART: [exit] Launching FMC @ 0x40000130
2,863,848 UART:
2,863,864 UART: Running Caliptra FMC ...
2,864,272 UART:
2,864,326 UART: [state] CFI Enabled
2,874,545 UART: [fht] FMC Alias Private Key: 7
2,982,192 UART: [art] Extend RT PCRs Done
2,982,620 UART: [art] Lock RT PCRs Done
2,984,260 UART: [art] Populate DV Done
2,992,311 UART: [fht] FMC Alias Private Key: 7
2,993,385 UART: [art] Derive CDI
2,993,665 UART: [art] Store in in slot 0x4
3,079,152 UART: [art] Derive Key Pair
3,079,512 UART: [art] Store priv key in slot 0x5
3,092,858 UART: [art] Derive Key Pair - Done
3,107,813 UART: [art] Signing Cert with AUTHO
3,108,293 UART: RITY.KEYID = 7
3,123,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,954 UART: [art] PUB.X = 901BC3F312E79875E88E166D6B5F46281F8929AA7C767E130C7E8857563D220F8F955A102B487450F0BBD2FA8D31395C
3,130,714 UART: [art] PUB.Y = 8E511EC6E66CDE5F9F1A9FDA1E75DB250296373C97198F5BF0586E3B57C161E059CD812E0438334DCDBAC826CC9D49F9
3,137,670 UART: [art] SIG.R = 380ED323B7D81FAAC85D26F05385015D43A68BDB07687E0FE2059CE081B08CC6F39D5D6E25B9F8743DB1E52FDC038411
3,144,430 UART: [art] SIG.S = 810F0D4045B1208DB7D953B4378A5B809483D7FD04A80F326E88BA841F617F224DE93B913CB2AA4AD36737998FC7BB8B
3,167,741 UART: Caliptra RT
3,167,994 UART: [state] CFI Enabled
3,276,957 UART: [rt] RT listening for mailbox commands...
3,277,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,903 UART: [rt]cmd =0x4d454153, len=108
3,309,625 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,482 ready_for_fw is high
1,056,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,878 >>> mbox cmd response: success
2,686,876 UART:
2,686,892 UART: Running Caliptra FMC ...
2,687,300 UART:
2,687,354 UART: [state] CFI Enabled
2,697,873 UART: [fht] FMC Alias Private Key: 7
2,805,678 UART: [art] Extend RT PCRs Done
2,806,106 UART: [art] Lock RT PCRs Done
2,807,594 UART: [art] Populate DV Done
2,815,757 UART: [fht] FMC Alias Private Key: 7
2,816,749 UART: [art] Derive CDI
2,817,029 UART: [art] Store in in slot 0x4
2,902,600 UART: [art] Derive Key Pair
2,902,960 UART: [art] Store priv key in slot 0x5
2,916,218 UART: [art] Derive Key Pair - Done
2,930,819 UART: [art] Signing Cert with AUTHO
2,931,299 UART: RITY.KEYID = 7
2,946,139 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,904 UART: [art] PUB.X = 2078F19B5433984E5128B71C8726B4556EC1A55B4C3BE2504AFE05F6F27D9A86D832BA66C05B8F1B796D1060888F6437
2,953,667 UART: [art] PUB.Y = 949F4020548638D366DE77F94EED05DA5A0AD0903E8B3DAA6FE30E9FE71B4B8ED0A099E6AA8871526BC2FABE813125DB
2,960,624 UART: [art] SIG.R = 9C17B05C19BF5511334CC2C512EAF4F149FF187726882DE7588943A3C3ACEC85B7391D7D41A8DFDC5B0F2478EA70707F
2,967,399 UART: [art] SIG.S = 64036BBE35A58AFFB1E0859866988593D27B0F39A30826ACD4FB22D6FDD0B81BB322A7651D1DEBCD9EBCE53CF1810B35
2,991,422 UART: Caliptra RT
2,991,675 UART: [state] CFI Enabled
3,099,080 UART: [rt] RT listening for mailbox commands...
3,099,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,378 UART: [rt]cmd =0x4d454153, len=108
3,131,654 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
916,193 UART: [kat] HMAC-384Kdf
920,843 UART: [kat] LMS
1,169,155 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,812 UART: [fht] FHT @ 0x50003400
1,173,594 UART: [idev] ++
1,173,762 UART: [idev] CDI.KEYID = 6
1,174,123 UART: [idev] SUBJECT.KEYID = 7
1,174,548 UART: [idev] UDS.KEYID = 0
1,174,894 ready_for_fw is high
1,174,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,846 UART: [idev] Erasing UDS.KEYID = 0
1,199,958 UART: [idev] Sha1 KeyId Algorithm
1,208,864 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,361 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,451 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,671 UART: [ldev] --
1,282,025 UART: [fwproc] Wait for Commands...
1,282,770 UART: [fwproc] Recv command 0x46574c44
1,283,503 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,719 >>> mbox cmd response: success
2,776,850 UART: [afmc] ++
2,777,018 UART: [afmc] CDI.KEYID = 6
2,777,381 UART: [afmc] SUBJECT.KEYID = 7
2,777,807 UART: [afmc] AUTHORITY.KEYID = 5
2,813,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,425 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,154 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,037 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,756 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,643 UART: [afmc] --
2,856,701 UART: [cold-reset] --
2,857,613 UART: [state] Locking Datavault
2,858,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,362 UART: [state] Locking ICCM
2,859,942 UART: [exit] Launching FMC @ 0x40000130
2,865,271 UART:
2,865,287 UART: Running Caliptra FMC ...
2,865,695 UART:
2,865,838 UART: [state] CFI Enabled
2,877,027 UART: [fht] FMC Alias Private Key: 7
2,984,812 UART: [art] Extend RT PCRs Done
2,985,240 UART: [art] Lock RT PCRs Done
2,986,638 UART: [art] Populate DV Done
2,994,873 UART: [fht] FMC Alias Private Key: 7
2,995,811 UART: [art] Derive CDI
2,996,091 UART: [art] Store in in slot 0x4
3,081,120 UART: [art] Derive Key Pair
3,081,480 UART: [art] Store priv key in slot 0x5
3,094,394 UART: [art] Derive Key Pair - Done
3,109,321 UART: [art] Signing Cert with AUTHO
3,109,801 UART: RITY.KEYID = 7
3,124,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,660 UART: [art] PUB.X = 77235EA3F784C601CF824011FF752926A7EBC1B0C39393D424774913E893F6EF0001DFADE50699CE75C40FFBD4A915C8
3,132,400 UART: [art] PUB.Y = F6B76723AAE6147E660A3D4935422F63B0EA188D05A4603EBC58E24B25EECD28CF3FA22E4A62F318A780A4B943566E24
3,139,350 UART: [art] SIG.R = AD9D11BC660B35EE4C657527CC22D16CF8FA85D0338182CD9ECBE1B80D03D206AFDD9A8E729038555A77614ECAFB013D
3,146,121 UART: [art] SIG.S = F9FA54D18E81CD21796BC8F3C6DAEFAADB72981672EB0F0F34AC7E7C9ED8B74F714621000A8E7C926557671B76DD5CBD
3,169,529 UART: Caliptra RT
3,169,874 UART: [state] CFI Enabled
3,277,730 UART: [rt] RT listening for mailbox commands...
3,278,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,706 UART: [rt]cmd =0x4d454153, len=108
3,310,070 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,061 ready_for_fw is high
1,056,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,165 >>> mbox cmd response: success
2,686,061 UART:
2,686,077 UART: Running Caliptra FMC ...
2,686,485 UART:
2,686,628 UART: [state] CFI Enabled
2,697,101 UART: [fht] FMC Alias Private Key: 7
2,805,320 UART: [art] Extend RT PCRs Done
2,805,748 UART: [art] Lock RT PCRs Done
2,807,462 UART: [art] Populate DV Done
2,815,771 UART: [fht] FMC Alias Private Key: 7
2,816,939 UART: [art] Derive CDI
2,817,219 UART: [art] Store in in slot 0x4
2,903,090 UART: [art] Derive Key Pair
2,903,450 UART: [art] Store priv key in slot 0x5
2,916,858 UART: [art] Derive Key Pair - Done
2,931,671 UART: [art] Signing Cert with AUTHO
2,932,151 UART: RITY.KEYID = 7
2,946,949 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,714 UART: [art] PUB.X = B059644C15294CC5128701B0518D314E5E6C2489FD7279C288AD061458564587A144BBD6189C1FB430785A7D4C37008B
2,954,444 UART: [art] PUB.Y = B61BF96D2B77A10E1BFDFC993C9B21551C298D35EDE3F2E825238027E91A48F45BCCB44491307569F74B97A2CEA9CE54
2,961,401 UART: [art] SIG.R = E86984FF77D13E18882EFB46FE0BC0AFFC8B81D5B88EF789E887685A9B9E0396371209043E1D09EB3A0C9DF49EE74E18
2,968,163 UART: [art] SIG.S = 92989B1FD4DF6023DE829B77C11090E031EC9C1DFE4BD4CD742E8B187F749557CE85DCA722E73E1F7BACFB2086658BCB
2,992,200 UART: Caliptra RT
2,992,545 UART: [state] CFI Enabled
3,100,539 UART: [rt] RT listening for mailbox commands...
3,101,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,587 UART: [rt]cmd =0x4d454153, len=108
3,133,051 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,024 UART:
192,408 UART: Running Caliptra ROM ...
193,566 UART:
193,718 UART: [state] CFI Enabled
264,344 UART: [state] LifecycleState = Unprovisioned
266,331 UART: [state] DebugLocked = No
268,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,736 UART: [kat] SHA2-256
442,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,914 UART: [kat] ++
453,391 UART: [kat] sha1
463,341 UART: [kat] SHA2-256
465,999 UART: [kat] SHA2-384
471,216 UART: [kat] SHA2-512-ACC
473,582 UART: [kat] ECC-384
2,767,627 UART: [kat] HMAC-384Kdf
2,778,966 UART: [kat] LMS
3,969,238 UART: [kat] --
3,974,106 UART: [cold-reset] ++
3,976,181 UART: [fht] Storing FHT @ 0x50003400
3,989,148 UART: [idev] ++
3,989,712 UART: [idev] CDI.KEYID = 6
3,990,746 UART: [idev] SUBJECT.KEYID = 7
3,991,917 UART: [idev] UDS.KEYID = 0
3,992,962 ready_for_fw is high
3,993,183 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,749 UART: [idev] Erasing UDS.KEYID = 0
7,323,553 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,749 UART: [idev] --
7,349,794 UART: [ldev] ++
7,350,365 UART: [ldev] CDI.KEYID = 6
7,351,377 UART: [ldev] SUBJECT.KEYID = 5
7,352,558 UART: [ldev] AUTHORITY.KEYID = 7
7,353,792 UART: [ldev] FE.KEYID = 1
7,402,588 UART: [ldev] Erasing FE.KEYID = 1
10,734,464 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,127 UART: [ldev] --
13,094,366 UART: [fwproc] Waiting for Commands...
13,096,411 UART: [fwproc] Received command 0x46574c44
13,098,600 UART: [fwproc] Received Image of size 114124 bytes
17,149,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,334 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,244 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,617,262 >>> mbox cmd response: success
17,622,129 UART: [afmc] ++
17,622,731 UART: [afmc] CDI.KEYID = 6
17,623,617 UART: [afmc] SUBJECT.KEYID = 7
17,624,883 UART: [afmc] AUTHORITY.KEYID = 5
20,990,815 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,803 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,049 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,495 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,291 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,736 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,583 UART: [afmc] --
23,360,238 UART: [cold-reset] --
23,364,528 UART: [state] Locking Datavault
23,370,363 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,117 UART: [state] Locking ICCM
23,374,164 UART: [exit] Launching FMC @ 0x40000130
23,382,528 UART:
23,382,807 UART: Running Caliptra FMC ...
23,383,918 UART:
23,384,077 UART: [state] CFI Enabled
23,449,094 UART: [fht] FMC Alias Private Key: 7
25,786,262 UART: [art] Extend RT PCRs Done
25,787,478 UART: [art] Lock RT PCRs Done
25,789,185 UART: [art] Populate DV Done
25,794,758 UART: [fht] FMC Alias Private Key: 7
25,796,455 UART: [art] Derive CDI
25,797,197 UART: [art] Store in in slot 0x4
25,857,864 UART: [art] Derive Key Pair
25,858,898 UART: [art] Store priv key in slot 0x5
29,151,706 UART: [art] Derive Key Pair - Done
29,164,827 UART: [art] Signing Cert with AUTHO
29,166,135 UART: RITY.KEYID = 7
31,454,081 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,588 UART: [art] PUB.X = FA43A406E4B6CE93183436C87F655B077257133E8660CF79A9263D956B569ECFF62E40D91A05EFFBCFF89FB460B93A0E
31,462,861 UART: [art] PUB.Y = 2B330C136CEBDB2DB65DB84411150DF09029137BA5C2234997DCDFBE12204B2C02856871621043046957C2A55CED029E
31,470,046 UART: [art] SIG.R = 29BA54C8C338378A6DC56B52D64387412D5BC3C4FDE2D6D7D21B80E2E4FCD59D75308CBD3EA12455FBBC3CEC3E332880
31,477,449 UART: [art] SIG.S = 428BA55D5CA6445B88DC7BC914149222504A637142A330187E6B927415D682F053F0D798A0C3D9D7F8132F510892172E
32,782,773 UART: Caliptra RT
32,783,473 UART: [state] CFI Enabled
32,943,747 UART: [rt] RT listening for mailbox commands...
32,945,623 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,976,504 UART: [rt]cmd =0x4d454153, len=108
32,994,928 >>> mbox cmd response data (12 bytes)
32,995,463 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,026,332 UART: [rt]cmd =0x4d454153, len=108
33,044,134 >>> mbox cmd response data (12 bytes)
33,044,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,075,079 UART: [rt]cmd =0x4d454153, len=108
33,094,576 >>> mbox cmd response data (12 bytes)
33,095,075 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,125,846 UART: [rt]cmd =0x4d454153, len=108
33,144,490 >>> mbox cmd response data (12 bytes)
33,144,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,175,550 UART: [rt]cmd =0x4d454153, len=108
33,194,101 >>> mbox cmd response data (12 bytes)
33,194,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,225,177 UART: [rt]cmd =0x4d454153, len=108
33,243,974 >>> mbox cmd response data (12 bytes)
33,244,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,274,997 UART: [rt]cmd =0x4d454153, len=108
33,294,244 >>> mbox cmd response data (12 bytes)
33,294,661 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,325,149 UART: [rt]cmd =0x4d454153, len=108
33,343,941 >>> mbox cmd response data (12 bytes)
33,344,393 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,375,093 UART: [rt]cmd =0x4d454153, len=108
33,393,647 >>> mbox cmd response data (12 bytes)
33,394,100 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,424,586 UART: [rt]cmd =0x4d454153, len=108
33,443,084 >>> mbox cmd response data (12 bytes)
33,443,512 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,474,101 UART: [rt]cmd =0x4d454153, len=108
33,492,582 >>> mbox cmd response data (12 bytes)
33,493,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,523,611 UART: [rt]cmd =0x4d454153, len=108
33,543,409 >>> mbox cmd response data (12 bytes)
33,543,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,574,619 UART: [rt]cmd =0x4d454153, len=108
33,593,165 >>> mbox cmd response data (12 bytes)
33,593,582 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,624,258 UART: [rt]cmd =0x4d454153, len=108
33,642,461 >>> mbox cmd response data (12 bytes)
33,642,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,673,536 UART: [rt]cmd =0x4d454153, len=108
33,692,620 >>> mbox cmd response data (12 bytes)
33,693,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,723,632 UART: [rt]cmd =0x4d454153, len=108
33,725,891 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,804,447 ready_for_fw is high
3,804,809 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,853,905 >>> mbox cmd response: success
23,548,111 UART:
23,548,495 UART: Running Caliptra FMC ...
23,549,632 UART:
23,549,795 UART: [state] CFI Enabled
23,615,103 UART: [fht] FMC Alias Private Key: 7
25,952,458 UART: [art] Extend RT PCRs Done
25,953,682 UART: [art] Lock RT PCRs Done
25,955,681 UART: [art] Populate DV Done
25,961,103 UART: [fht] FMC Alias Private Key: 7
25,962,753 UART: [art] Derive CDI
25,963,496 UART: [art] Store in in slot 0x4
26,024,008 UART: [art] Derive Key Pair
26,025,057 UART: [art] Store priv key in slot 0x5
29,318,210 UART: [art] Derive Key Pair - Done
29,331,417 UART: [art] Signing Cert with AUTHO
29,332,718 UART: RITY.KEYID = 7
31,620,260 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,773 UART: [art] PUB.X = 2C05FB1ECBC6DC48E7F757A13F6D9316E25BA10717241F8928C9E517D2448493B38CC305C601E36B050F04FAD5C0AE99
31,628,988 UART: [art] PUB.Y = B25D18EBFABCABB569A33B1173B8434B8FA87DA4CA875EB7E633F95E2100DA423107A3AEF34C6775C64C6FBC2733D3FE
31,636,302 UART: [art] SIG.R = C3974871C2E9F1E2D8B70D00FEDCF50667ABAD94FB0A8E4BA0895EA3834E466E34E2D50F0DD0B4BE4A366E7CD1170AF9
31,643,668 UART: [art] SIG.S = BB8F90FE22E932A9CE882A8E5A17F058D18A9B4137D93E5FEB8D1D809ED30C2AB95B8B1C4B45F8A25F8FE427AD757919
32,949,060 UART: Caliptra RT
32,949,775 UART: [state] CFI Enabled
33,111,572 UART: [rt] RT listening for mailbox commands...
33,113,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,144,387 UART: [rt]cmd =0x4d454153, len=108
33,164,026 >>> mbox cmd response data (12 bytes)
33,164,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,195,020 UART: [rt]cmd =0x4d454153, len=108
33,213,127 >>> mbox cmd response data (12 bytes)
33,213,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,244,495 UART: [rt]cmd =0x4d454153, len=108
33,262,886 >>> mbox cmd response data (12 bytes)
33,263,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,293,812 UART: [rt]cmd =0x4d454153, len=108
33,312,677 >>> mbox cmd response data (12 bytes)
33,313,108 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,343,647 UART: [rt]cmd =0x4d454153, len=108
33,362,210 >>> mbox cmd response data (12 bytes)
33,362,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,393,353 UART: [rt]cmd =0x4d454153, len=108
33,412,125 >>> mbox cmd response data (12 bytes)
33,412,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,443,042 UART: [rt]cmd =0x4d454153, len=108
33,461,742 >>> mbox cmd response data (12 bytes)
33,462,173 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,492,771 UART: [rt]cmd =0x4d454153, len=108
33,511,377 >>> mbox cmd response data (12 bytes)
33,511,803 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,542,711 UART: [rt]cmd =0x4d454153, len=108
33,562,198 >>> mbox cmd response data (12 bytes)
33,562,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,593,420 UART: [rt]cmd =0x4d454153, len=108
33,611,943 >>> mbox cmd response data (12 bytes)
33,612,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,643,270 UART: [rt]cmd =0x4d454153, len=108
33,661,830 >>> mbox cmd response data (12 bytes)
33,662,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,692,720 UART: [rt]cmd =0x4d454153, len=108
33,711,578 >>> mbox cmd response data (12 bytes)
33,712,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,742,870 UART: [rt]cmd =0x4d454153, len=108
33,761,538 >>> mbox cmd response data (12 bytes)
33,761,999 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,792,754 UART: [rt]cmd =0x4d454153, len=108
33,811,845 >>> mbox cmd response data (12 bytes)
33,812,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,842,872 UART: [rt]cmd =0x4d454153, len=108
33,861,778 >>> mbox cmd response data (12 bytes)
33,862,203 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,892,844 UART: [rt]cmd =0x4d454153, len=108
33,894,976 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,322 UART:
192,693 UART: Running Caliptra ROM ...
193,823 UART:
603,693 UART: [state] CFI Enabled
616,293 UART: [state] LifecycleState = Unprovisioned
618,274 UART: [state] DebugLocked = No
620,234 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,906 UART: [kat] SHA2-256
795,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,176 UART: [kat] ++
806,704 UART: [kat] sha1
817,933 UART: [kat] SHA2-256
820,639 UART: [kat] SHA2-384
825,270 UART: [kat] SHA2-512-ACC
827,642 UART: [kat] ECC-384
3,111,880 UART: [kat] HMAC-384Kdf
3,123,274 UART: [kat] LMS
4,313,390 UART: [kat] --
4,318,062 UART: [cold-reset] ++
4,319,722 UART: [fht] Storing FHT @ 0x50003400
4,331,054 UART: [idev] ++
4,331,625 UART: [idev] CDI.KEYID = 6
4,332,501 UART: [idev] SUBJECT.KEYID = 7
4,333,832 UART: [idev] UDS.KEYID = 0
4,335,005 ready_for_fw is high
4,335,239 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,691 UART: [idev] Erasing UDS.KEYID = 0
7,621,386 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,253 UART: [idev] --
7,646,592 UART: [ldev] ++
7,647,154 UART: [ldev] CDI.KEYID = 6
7,648,084 UART: [ldev] SUBJECT.KEYID = 5
7,649,398 UART: [ldev] AUTHORITY.KEYID = 7
7,650,592 UART: [ldev] FE.KEYID = 1
7,660,291 UART: [ldev] Erasing FE.KEYID = 1
10,946,277 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,703 UART: [ldev] --
13,305,039 UART: [fwproc] Waiting for Commands...
13,307,349 UART: [fwproc] Received command 0x46574c44
13,309,576 UART: [fwproc] Received Image of size 114124 bytes
17,357,003 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,765 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,821,896 >>> mbox cmd response: success
17,826,058 UART: [afmc] ++
17,826,660 UART: [afmc] CDI.KEYID = 6
17,827,541 UART: [afmc] SUBJECT.KEYID = 7
17,828,808 UART: [afmc] AUTHORITY.KEYID = 5
21,139,640 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,434,246 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,436,494 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,450,900 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,465,726 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,480,168 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,501,941 UART: [afmc] --
23,506,027 UART: [cold-reset] --
23,509,234 UART: [state] Locking Datavault
23,514,370 UART: [state] Locking PCR0, PCR1 and PCR31
23,516,116 UART: [state] Locking ICCM
23,517,428 UART: [exit] Launching FMC @ 0x40000130
23,525,828 UART:
23,526,056 UART: Running Caliptra FMC ...
23,527,077 UART:
23,527,223 UART: [state] CFI Enabled
23,535,236 UART: [fht] FMC Alias Private Key: 7
25,866,725 UART: [art] Extend RT PCRs Done
25,867,943 UART: [art] Lock RT PCRs Done
25,869,605 UART: [art] Populate DV Done
25,874,794 UART: [fht] FMC Alias Private Key: 7
25,876,432 UART: [art] Derive CDI
25,877,162 UART: [art] Store in in slot 0x4
25,919,860 UART: [art] Derive Key Pair
25,920,899 UART: [art] Store priv key in slot 0x5
29,163,203 UART: [art] Derive Key Pair - Done
29,176,723 UART: [art] Signing Cert with AUTHO
29,178,050 UART: RITY.KEYID = 7
31,457,229 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,725 UART: [art] PUB.X = FEA8C15B3FFF65265E5D070CA3B55D59A5C7A506B0D55025E277020CC9F3616420E955AAC84A54724E833A2D196595FC
31,465,953 UART: [art] PUB.Y = 70B1C013D77C594FC64FF1CDDF0CFAD9D7FBEC366171759E79C67E4578D4D680045162AB139FB38553D830A68A988D0E
31,473,218 UART: [art] SIG.R = F204DFEAD85C1397AC34E86210B262CFA0DED30AA407773C3DA9639B7A712E8ABF536AB11D8A38A812DFD2540BF21531
31,480,589 UART: [art] SIG.S = 523915CDA2E31C77195D40ABDEDFFC8501E8C35C43D56A95F75A92900A34C5BFB8542B612C756424C4C387EBB49B478D
32,785,980 UART: Caliptra RT
32,786,691 UART: [state] CFI Enabled
32,903,558 UART: [rt] RT listening for mailbox commands...
32,905,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,936,023 UART: [rt]cmd =0x4d454153, len=108
32,955,153 >>> mbox cmd response data (12 bytes)
32,955,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,986,347 UART: [rt]cmd =0x4d454153, len=108
33,004,897 >>> mbox cmd response data (12 bytes)
33,005,331 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,035,828 UART: [rt]cmd =0x4d454153, len=108
33,053,980 >>> mbox cmd response data (12 bytes)
33,054,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,085,266 UART: [rt]cmd =0x4d454153, len=108
33,104,034 >>> mbox cmd response data (12 bytes)
33,104,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,135,092 UART: [rt]cmd =0x4d454153, len=108
33,153,745 >>> mbox cmd response data (12 bytes)
33,154,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,184,676 UART: [rt]cmd =0x4d454153, len=108
33,202,883 >>> mbox cmd response data (12 bytes)
33,203,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,234,108 UART: [rt]cmd =0x4d454153, len=108
33,253,250 >>> mbox cmd response data (12 bytes)
33,253,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,284,244 UART: [rt]cmd =0x4d454153, len=108
33,302,354 >>> mbox cmd response data (12 bytes)
33,302,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,333,429 UART: [rt]cmd =0x4d454153, len=108
33,351,627 >>> mbox cmd response data (12 bytes)
33,352,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,382,807 UART: [rt]cmd =0x4d454153, len=108
33,401,453 >>> mbox cmd response data (12 bytes)
33,401,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,432,599 UART: [rt]cmd =0x4d454153, len=108
33,451,125 >>> mbox cmd response data (12 bytes)
33,451,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,482,189 UART: [rt]cmd =0x4d454153, len=108
33,500,465 >>> mbox cmd response data (12 bytes)
33,500,926 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,531,404 UART: [rt]cmd =0x4d454153, len=108
33,550,161 >>> mbox cmd response data (12 bytes)
33,550,583 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,581,229 UART: [rt]cmd =0x4d454153, len=108
33,600,069 >>> mbox cmd response data (12 bytes)
33,600,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,631,300 UART: [rt]cmd =0x4d454153, len=108
33,649,901 >>> mbox cmd response data (12 bytes)
33,650,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,681,157 UART: [rt]cmd =0x4d454153, len=108
33,683,393 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
4,134,131 ready_for_fw is high
4,134,741 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,875 >>> mbox cmd response: success
23,709,739 UART:
23,710,125 UART: Running Caliptra FMC ...
23,711,221 UART:
23,711,364 UART: [state] CFI Enabled
23,718,886 UART: [fht] FMC Alias Private Key: 7
26,050,200 UART: [art] Extend RT PCRs Done
26,051,440 UART: [art] Lock RT PCRs Done
26,053,207 UART: [art] Populate DV Done
26,058,304 UART: [fht] FMC Alias Private Key: 7
26,059,847 UART: [art] Derive CDI
26,060,578 UART: [art] Store in in slot 0x4
26,103,438 UART: [art] Derive Key Pair
26,104,453 UART: [art] Store priv key in slot 0x5
29,346,027 UART: [art] Derive Key Pair - Done
29,359,247 UART: [art] Signing Cert with AUTHO
29,360,557 UART: RITY.KEYID = 7
31,640,033 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,661 UART: [art] PUB.X = 67B43B515A76AD5DAE442D9719D04C500B8A791D7CB4821A632FA9725397B46777E366AC5BA0E9DEA82B1F11DFF47389
31,648,789 UART: [art] PUB.Y = 84B25C2AC33EDE7DE081179CAEFF6589C3A4D62161310EAC7D9448E39D8CEBC60ADF8A4FF6D5BA2D05EEEC9102C76424
31,656,065 UART: [art] SIG.R = D41250F172C9A6650E0BC697081966FCE63D7F17F3C494738B6C5FD77F8766F6342696DFA3ABD5D7FB615C53C63E6BCC
31,663,448 UART: [art] SIG.S = FA9E61A7439F18AF2ADB81E7605FA353F9FDA9FC42E400B0CA24225C1A54F87CA3164BEDE17F8741DA983FEFA4A8F47B
32,968,959 UART: Caliptra RT
32,969,675 UART: [state] CFI Enabled
33,087,189 UART: [rt] RT listening for mailbox commands...
33,089,077 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,119,530 UART: [rt]cmd =0x4d454153, len=108
33,138,196 >>> mbox cmd response data (12 bytes)
33,138,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,169,328 UART: [rt]cmd =0x4d454153, len=108
33,187,696 >>> mbox cmd response data (12 bytes)
33,188,141 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,218,953 UART: [rt]cmd =0x4d454153, len=108
33,238,472 >>> mbox cmd response data (12 bytes)
33,238,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,269,565 UART: [rt]cmd =0x4d454153, len=108
33,287,846 >>> mbox cmd response data (12 bytes)
33,288,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,318,925 UART: [rt]cmd =0x4d454153, len=108
33,338,191 >>> mbox cmd response data (12 bytes)
33,338,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,369,371 UART: [rt]cmd =0x4d454153, len=108
33,387,320 >>> mbox cmd response data (12 bytes)
33,387,749 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,418,354 UART: [rt]cmd =0x4d454153, len=108
33,437,331 >>> mbox cmd response data (12 bytes)
33,437,767 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,468,731 UART: [rt]cmd =0x4d454153, len=108
33,486,809 >>> mbox cmd response data (12 bytes)
33,487,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,518,026 UART: [rt]cmd =0x4d454153, len=108
33,537,334 >>> mbox cmd response data (12 bytes)
33,537,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,568,195 UART: [rt]cmd =0x4d454153, len=108
33,585,807 >>> mbox cmd response data (12 bytes)
33,586,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,616,880 UART: [rt]cmd =0x4d454153, len=108
33,635,584 >>> mbox cmd response data (12 bytes)
33,636,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,666,637 UART: [rt]cmd =0x4d454153, len=108
33,685,329 >>> mbox cmd response data (12 bytes)
33,685,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,716,498 UART: [rt]cmd =0x4d454153, len=108
33,734,928 >>> mbox cmd response data (12 bytes)
33,735,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,766,195 UART: [rt]cmd =0x4d454153, len=108
33,785,766 >>> mbox cmd response data (12 bytes)
33,786,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,816,945 UART: [rt]cmd =0x4d454153, len=108
33,835,902 >>> mbox cmd response data (12 bytes)
33,836,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,866,928 UART: [rt]cmd =0x4d454153, len=108
33,869,088 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,172 UART:
192,538 UART: Running Caliptra ROM ...
193,632 UART:
193,773 UART: [state] CFI Enabled
262,091 UART: [state] LifecycleState = Unprovisioned
264,000 UART: [state] DebugLocked = No
266,248 UART: [state] WD Timer not started. Device not locked for debugging
270,699 UART: [kat] SHA2-256
449,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,394 UART: [kat] ++
461,921 UART: [kat] sha1
474,164 UART: [kat] SHA2-256
477,163 UART: [kat] SHA2-384
483,305 UART: [kat] SHA2-512-ACC
486,257 UART: [kat] ECC-384
2,948,097 UART: [kat] HMAC-384Kdf
2,970,005 UART: [kat] LMS
3,499,421 UART: [kat] --
3,503,525 UART: [cold-reset] ++
3,505,558 UART: [fht] FHT @ 0x50003400
3,517,525 UART: [idev] ++
3,518,087 UART: [idev] CDI.KEYID = 6
3,518,971 UART: [idev] SUBJECT.KEYID = 7
3,520,212 UART: [idev] UDS.KEYID = 0
3,521,107 ready_for_fw is high
3,521,290 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,220 UART: [idev] Erasing UDS.KEYID = 0
6,025,832 UART: [idev] Sha1 KeyId Algorithm
6,050,351 UART: [idev] --
6,052,724 UART: [ldev] ++
6,053,325 UART: [ldev] CDI.KEYID = 6
6,054,213 UART: [ldev] SUBJECT.KEYID = 5
6,055,347 UART: [ldev] AUTHORITY.KEYID = 7
6,056,627 UART: [ldev] FE.KEYID = 1
6,098,048 UART: [ldev] Erasing FE.KEYID = 1
8,601,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,914 UART: [ldev] --
10,409,827 UART: [fwproc] Wait for Commands...
10,411,979 UART: [fwproc] Recv command 0x46574c44
10,414,073 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,273,358 >>> mbox cmd response: success
14,277,015 UART: [afmc] ++
14,277,616 UART: [afmc] CDI.KEYID = 6
14,278,507 UART: [afmc] SUBJECT.KEYID = 7
14,279,615 UART: [afmc] AUTHORITY.KEYID = 5
16,807,902 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,569 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,388 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,397 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,234 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,886 UART: [afmc] --
18,606,533 UART: [cold-reset] --
18,611,144 UART: [state] Locking Datavault
18,616,984 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,699 UART: [state] Locking ICCM
18,620,468 UART: [exit] Launching FMC @ 0x40000130
18,628,876 UART:
18,629,157 UART: Running Caliptra FMC ...
18,630,269 UART:
18,630,441 UART: [state] CFI Enabled
18,689,399 UART: [fht] FMC Alias Private Key: 7
20,453,301 UART: [art] Extend RT PCRs Done
20,454,518 UART: [art] Lock RT PCRs Done
20,456,306 UART: [art] Populate DV Done
20,461,824 UART: [fht] FMC Alias Private Key: 7
20,463,447 UART: [art] Derive CDI
20,464,371 UART: [art] Store in in slot 0x4
20,522,008 UART: [art] Derive Key Pair
20,523,017 UART: [art] Store priv key in slot 0x5
22,986,174 UART: [art] Derive Key Pair - Done
22,999,290 UART: [art] Signing Cert with AUTHO
23,000,590 UART: RITY.KEYID = 7
24,713,773 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,271 UART: [art] PUB.X = 6163C0AC05AC3C8A4BC2E90E51FEADBFFA918913C4B14E8A70A669F104B87A3207EA03885503519C0FE791DB32E3CEAD
24,722,581 UART: [art] PUB.Y = DD0FCAFF81A2DC82CC558FAB499DA21E26F05DBC0858663615C0C98DD58F422E7930F9BCFAF1EF720BFAC65AC1C35B1C
24,729,873 UART: [art] SIG.R = 2CDC60E9B2D8B11EF8E9BC477D6A63EA3F7E70BE196BB12FAA3C437B7D4F191E134A6D072E68D4ABAD73ECA8BA888A65
24,737,281 UART: [art] SIG.S = 2DB7E96EAE48C6C49A631C05E76E99C6CB6D4188EE572292B90C79B39EB63C6A94412903A6CE07E02DE52F7DB2A5D882
25,716,551 UART: Caliptra RT
25,717,248 UART: [state] CFI Enabled
25,881,435 UART: [rt] RT listening for mailbox commands...
25,883,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,914,668 UART: [rt]cmd =0x4d454153, len=108
25,933,215 >>> mbox cmd response data (12 bytes)
25,933,774 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,964,321 UART: [rt]cmd =0x4d454153, len=108
25,982,975 >>> mbox cmd response data (12 bytes)
25,983,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,014,295 UART: [rt]cmd =0x4d454153, len=108
26,033,445 >>> mbox cmd response data (12 bytes)
26,033,871 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,064,318 UART: [rt]cmd =0x4d454153, len=108
26,082,418 >>> mbox cmd response data (12 bytes)
26,082,851 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,113,444 UART: [rt]cmd =0x4d454153, len=108
26,131,720 >>> mbox cmd response data (12 bytes)
26,132,140 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,162,845 UART: [rt]cmd =0x4d454153, len=108
26,181,533 >>> mbox cmd response data (12 bytes)
26,181,965 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,212,662 UART: [rt]cmd =0x4d454153, len=108
26,230,786 >>> mbox cmd response data (12 bytes)
26,231,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,261,646 UART: [rt]cmd =0x4d454153, len=108
26,280,146 >>> mbox cmd response data (12 bytes)
26,280,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,311,142 UART: [rt]cmd =0x4d454153, len=108
26,330,123 >>> mbox cmd response data (12 bytes)
26,330,601 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,361,357 UART: [rt]cmd =0x4d454153, len=108
26,379,642 >>> mbox cmd response data (12 bytes)
26,380,071 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,410,853 UART: [rt]cmd =0x4d454153, len=108
26,429,867 >>> mbox cmd response data (12 bytes)
26,430,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,460,889 UART: [rt]cmd =0x4d454153, len=108
26,480,099 >>> mbox cmd response data (12 bytes)
26,480,567 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,511,219 UART: [rt]cmd =0x4d454153, len=108
26,529,140 >>> mbox cmd response data (12 bytes)
26,529,566 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,559,998 UART: [rt]cmd =0x4d454153, len=108
26,578,685 >>> mbox cmd response data (12 bytes)
26,579,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,609,671 UART: [rt]cmd =0x4d454153, len=108
26,628,664 >>> mbox cmd response data (12 bytes)
26,629,121 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,659,658 UART: [rt]cmd =0x4d454153, len=108
26,661,937 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,363,180 ready_for_fw is high
3,363,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,073,992 >>> mbox cmd response: success
18,365,873 UART:
18,366,268 UART: Running Caliptra FMC ...
18,367,369 UART:
18,367,521 UART: [state] CFI Enabled
18,433,845 UART: [fht] FMC Alias Private Key: 7
20,198,174 UART: [art] Extend RT PCRs Done
20,199,405 UART: [art] Lock RT PCRs Done
20,201,009 UART: [art] Populate DV Done
20,206,805 UART: [fht] FMC Alias Private Key: 7
20,208,510 UART: [art] Derive CDI
20,209,252 UART: [art] Store in in slot 0x4
20,266,886 UART: [art] Derive Key Pair
20,267,952 UART: [art] Store priv key in slot 0x5
22,730,746 UART: [art] Derive Key Pair - Done
22,743,366 UART: [art] Signing Cert with AUTHO
22,744,667 UART: RITY.KEYID = 7
24,457,150 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,654 UART: [art] PUB.X = 41CB1B1E2548FF908F8D788C741CE9FE33151035B3D5B09BEE82FE3A00BC2649814CBDCA4AEB67509A45357C8BF96F8C
24,465,904 UART: [art] PUB.Y = D5BBBA632B3D622AFF7A8029AA5FA93D558C161088643CA779FABCF9B8E6D234B62F19F5E25F5ADB48AEA4487BB325B5
24,473,168 UART: [art] SIG.R = 9EFDB9BF49FE1183DB22E4F00963E1DF32F3092CBA6454B97AC968884AB19AC6B78E9093BB93BCE81B9A902A08F31A13
24,480,615 UART: [art] SIG.S = 27A0327FB77EF994232CBAAED793F3DAD689EB0556AAC325ACCC285FD384E32E39CFFF95F55D967D3A61C0BFB898E62D
25,459,518 UART: Caliptra RT
25,460,231 UART: [state] CFI Enabled
25,625,332 UART: [rt] RT listening for mailbox commands...
25,627,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,658,701 UART: [rt]cmd =0x4d454153, len=108
25,677,131 >>> mbox cmd response data (12 bytes)
25,677,632 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,708,280 UART: [rt]cmd =0x4d454153, len=108
25,727,204 >>> mbox cmd response data (12 bytes)
25,727,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,758,403 UART: [rt]cmd =0x4d454153, len=108
25,777,022 >>> mbox cmd response data (12 bytes)
25,777,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,808,406 UART: [rt]cmd =0x4d454153, len=108
25,827,095 >>> mbox cmd response data (12 bytes)
25,827,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,858,153 UART: [rt]cmd =0x4d454153, len=108
25,876,414 >>> mbox cmd response data (12 bytes)
25,876,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,907,437 UART: [rt]cmd =0x4d454153, len=108
25,925,984 >>> mbox cmd response data (12 bytes)
25,926,410 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,956,960 UART: [rt]cmd =0x4d454153, len=108
25,975,295 >>> mbox cmd response data (12 bytes)
25,975,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,006,430 UART: [rt]cmd =0x4d454153, len=108
26,024,672 >>> mbox cmd response data (12 bytes)
26,025,142 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,055,736 UART: [rt]cmd =0x4d454153, len=108
26,074,936 >>> mbox cmd response data (12 bytes)
26,075,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,105,746 UART: [rt]cmd =0x4d454153, len=108
26,123,733 >>> mbox cmd response data (12 bytes)
26,124,166 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,154,800 UART: [rt]cmd =0x4d454153, len=108
26,173,526 >>> mbox cmd response data (12 bytes)
26,173,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,204,747 UART: [rt]cmd =0x4d454153, len=108
26,223,456 >>> mbox cmd response data (12 bytes)
26,223,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,254,665 UART: [rt]cmd =0x4d454153, len=108
26,273,624 >>> mbox cmd response data (12 bytes)
26,274,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,304,753 UART: [rt]cmd =0x4d454153, len=108
26,323,407 >>> mbox cmd response data (12 bytes)
26,323,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,354,315 UART: [rt]cmd =0x4d454153, len=108
26,373,125 >>> mbox cmd response data (12 bytes)
26,373,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,404,152 UART: [rt]cmd =0x4d454153, len=108
26,406,268 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,432 UART:
192,809 UART: Running Caliptra ROM ...
193,917 UART:
603,428 UART: [state] CFI Enabled
616,094 UART: [state] LifecycleState = Unprovisioned
617,934 UART: [state] DebugLocked = No
619,562 UART: [state] WD Timer not started. Device not locked for debugging
623,384 UART: [kat] SHA2-256
802,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,101 UART: [kat] ++
814,635 UART: [kat] sha1
824,828 UART: [kat] SHA2-256
827,873 UART: [kat] SHA2-384
834,714 UART: [kat] SHA2-512-ACC
837,652 UART: [kat] ECC-384
3,275,967 UART: [kat] HMAC-384Kdf
3,288,774 UART: [kat] LMS
3,818,247 UART: [kat] --
3,821,545 UART: [cold-reset] ++
3,822,543 UART: [fht] FHT @ 0x50003400
3,834,083 UART: [idev] ++
3,834,647 UART: [idev] CDI.KEYID = 6
3,835,548 UART: [idev] SUBJECT.KEYID = 7
3,836,713 UART: [idev] UDS.KEYID = 0
3,837,771 ready_for_fw is high
3,837,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,981,819 UART: [idev] Erasing UDS.KEYID = 0
6,311,600 UART: [idev] Sha1 KeyId Algorithm
6,336,294 UART: [idev] --
6,339,963 UART: [ldev] ++
6,340,571 UART: [ldev] CDI.KEYID = 6
6,341,456 UART: [ldev] SUBJECT.KEYID = 5
6,342,555 UART: [ldev] AUTHORITY.KEYID = 7
6,343,892 UART: [ldev] FE.KEYID = 1
6,352,939 UART: [ldev] Erasing FE.KEYID = 1
8,830,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,568 UART: [ldev] --
10,620,129 UART: [fwproc] Wait for Commands...
10,622,490 UART: [fwproc] Recv command 0x46574c44
10,624,528 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,495,346 >>> mbox cmd response: success
14,500,480 UART: [afmc] ++
14,501,099 UART: [afmc] CDI.KEYID = 6
14,501,989 UART: [afmc] SUBJECT.KEYID = 7
14,503,084 UART: [afmc] AUTHORITY.KEYID = 5
17,005,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,020 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,684 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,580 UART: [afmc] --
18,804,655 UART: [cold-reset] --
18,808,189 UART: [state] Locking Datavault
18,813,267 UART: [state] Locking PCR0, PCR1 and PCR31
18,814,906 UART: [state] Locking ICCM
18,816,777 UART: [exit] Launching FMC @ 0x40000130
18,825,156 UART:
18,825,409 UART: Running Caliptra FMC ...
18,826,506 UART:
18,826,658 UART: [state] CFI Enabled
18,834,590 UART: [fht] FMC Alias Private Key: 7
20,590,740 UART: [art] Extend RT PCRs Done
20,591,942 UART: [art] Lock RT PCRs Done
20,593,970 UART: [art] Populate DV Done
20,599,393 UART: [fht] FMC Alias Private Key: 7
20,601,084 UART: [art] Derive CDI
20,601,815 UART: [art] Store in in slot 0x4
20,643,810 UART: [art] Derive Key Pair
20,644,800 UART: [art] Store priv key in slot 0x5
23,072,095 UART: [art] Derive Key Pair - Done
23,085,208 UART: [art] Signing Cert with AUTHO
23,086,520 UART: RITY.KEYID = 7
24,792,331 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,806 UART: [art] PUB.X = 1E313B9E7D0E4A24A2E2FDB040635C738BE8872CE8093CE6F36E5E28339BE2744F2371154BAEACFB65EE1DBDC435D062
24,801,093 UART: [art] PUB.Y = B314DE1A12B64D2324EC43E0BFD5CF77DBD3A77104CE1256C86E60B8CA93BEF683D2554841779C6671474B3F332AE7D6
24,808,356 UART: [art] SIG.R = 0CD4AD7A3689172522CF557D9993E6BC93C0A60F6742F05E73312754160695AFCED8836E2F002FCB643318EA54842F86
24,815,670 UART: [art] SIG.S = 00ED77A0BF29BB8BE4AAE9AD8F4140328CE3476F54D8F5494152A646515C031B5689080403F62BD3BB202576398C5D32
25,793,891 UART: Caliptra RT
25,794,594 UART: [state] CFI Enabled
25,912,301 UART: [rt] RT listening for mailbox commands...
25,914,204 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,945,029 UART: [rt]cmd =0x4d454153, len=108
25,963,458 >>> mbox cmd response data (12 bytes)
25,964,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,994,710 UART: [rt]cmd =0x4d454153, len=108
26,013,095 >>> mbox cmd response data (12 bytes)
26,013,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,044,245 UART: [rt]cmd =0x4d454153, len=108
26,062,508 >>> mbox cmd response data (12 bytes)
26,062,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,093,751 UART: [rt]cmd =0x4d454153, len=108
26,112,576 >>> mbox cmd response data (12 bytes)
26,113,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,143,738 UART: [rt]cmd =0x4d454153, len=108
26,162,394 >>> mbox cmd response data (12 bytes)
26,162,813 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,193,578 UART: [rt]cmd =0x4d454153, len=108
26,211,591 >>> mbox cmd response data (12 bytes)
26,212,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,242,515 UART: [rt]cmd =0x4d454153, len=108
26,260,934 >>> mbox cmd response data (12 bytes)
26,261,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,291,992 UART: [rt]cmd =0x4d454153, len=108
26,310,266 >>> mbox cmd response data (12 bytes)
26,310,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,341,390 UART: [rt]cmd =0x4d454153, len=108
26,360,666 >>> mbox cmd response data (12 bytes)
26,361,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,391,739 UART: [rt]cmd =0x4d454153, len=108
26,410,340 >>> mbox cmd response data (12 bytes)
26,410,756 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,441,352 UART: [rt]cmd =0x4d454153, len=108
26,459,192 >>> mbox cmd response data (12 bytes)
26,459,625 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,490,211 UART: [rt]cmd =0x4d454153, len=108
26,508,812 >>> mbox cmd response data (12 bytes)
26,509,270 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,539,969 UART: [rt]cmd =0x4d454153, len=108
26,558,192 >>> mbox cmd response data (12 bytes)
26,558,609 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,589,255 UART: [rt]cmd =0x4d454153, len=108
26,607,510 >>> mbox cmd response data (12 bytes)
26,607,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,638,526 UART: [rt]cmd =0x4d454153, len=108
26,657,604 >>> mbox cmd response data (12 bytes)
26,658,022 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,688,839 UART: [rt]cmd =0x4d454153, len=108
26,691,093 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,701,122 ready_for_fw is high
3,701,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,922 >>> mbox cmd response: success
18,520,775 UART:
18,521,196 UART: Running Caliptra FMC ...
18,522,319 UART:
18,522,474 UART: [state] CFI Enabled
18,530,530 UART: [fht] FMC Alias Private Key: 7
20,287,497 UART: [art] Extend RT PCRs Done
20,288,710 UART: [art] Lock RT PCRs Done
20,290,113 UART: [art] Populate DV Done
20,295,408 UART: [fht] FMC Alias Private Key: 7
20,296,941 UART: [art] Derive CDI
20,297,750 UART: [art] Store in in slot 0x4
20,340,449 UART: [art] Derive Key Pair
20,341,436 UART: [art] Store priv key in slot 0x5
22,767,674 UART: [art] Derive Key Pair - Done
22,780,680 UART: [art] Signing Cert with AUTHO
22,781,987 UART: RITY.KEYID = 7
24,487,074 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,579 UART: [art] PUB.X = 0E651F04D336AC375B0C19A53E9426B0311FCDD6CCDF2D432F35CCBD49E921BF767135F973CC2A62E73F8F93E06D342B
24,495,840 UART: [art] PUB.Y = 1FFA907C15590CD88A4E40BD93906A3B320F93C78B4F9C69E060BA68DA4DC7F7A026072C58EAD91C781438EA77732D67
24,503,111 UART: [art] SIG.R = FCA6EEB94002FAFBC66E134E4C2ADE36B58926BB7D9E4F9FBF61B44E23F785ADC4C9C2944870E25D0BDE128B011341D2
24,510,544 UART: [art] SIG.S = 0C9350A14D31E812CB331647D5B230FBF85B4E8AA2167016576A48C118BC84CD20B81057AA985F817DB4A9C5DBA3EB24
25,489,148 UART: Caliptra RT
25,489,849 UART: [state] CFI Enabled
25,607,235 UART: [rt] RT listening for mailbox commands...
25,609,117 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,639,771 UART: [rt]cmd =0x4d454153, len=108
25,658,141 >>> mbox cmd response data (12 bytes)
25,658,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,689,510 UART: [rt]cmd =0x4d454153, len=108
25,707,963 >>> mbox cmd response data (12 bytes)
25,708,435 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,739,140 UART: [rt]cmd =0x4d454153, len=108
25,757,641 >>> mbox cmd response data (12 bytes)
25,758,057 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,788,516 UART: [rt]cmd =0x4d454153, len=108
25,807,348 >>> mbox cmd response data (12 bytes)
25,807,801 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,838,337 UART: [rt]cmd =0x4d454153, len=108
25,856,831 >>> mbox cmd response data (12 bytes)
25,857,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,887,901 UART: [rt]cmd =0x4d454153, len=108
25,905,886 >>> mbox cmd response data (12 bytes)
25,906,321 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,937,015 UART: [rt]cmd =0x4d454153, len=108
25,955,131 >>> mbox cmd response data (12 bytes)
25,955,597 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,986,131 UART: [rt]cmd =0x4d454153, len=108
26,004,302 >>> mbox cmd response data (12 bytes)
26,004,721 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,035,294 UART: [rt]cmd =0x4d454153, len=108
26,053,681 >>> mbox cmd response data (12 bytes)
26,054,121 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,084,714 UART: [rt]cmd =0x4d454153, len=108
26,103,637 >>> mbox cmd response data (12 bytes)
26,104,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,134,539 UART: [rt]cmd =0x4d454153, len=108
26,152,797 >>> mbox cmd response data (12 bytes)
26,153,214 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,183,959 UART: [rt]cmd =0x4d454153, len=108
26,202,236 >>> mbox cmd response data (12 bytes)
26,202,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,233,456 UART: [rt]cmd =0x4d454153, len=108
26,252,704 >>> mbox cmd response data (12 bytes)
26,253,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,283,498 UART: [rt]cmd =0x4d454153, len=108
26,302,080 >>> mbox cmd response data (12 bytes)
26,302,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,332,903 UART: [rt]cmd =0x4d454153, len=108
26,351,217 >>> mbox cmd response data (12 bytes)
26,351,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,382,396 UART: [rt]cmd =0x4d454153, len=108
26,384,675 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,439,114 ready_for_fw is high
3,439,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,745,444 >>> mbox cmd response: success
19,024,873 UART:
19,025,287 UART: Running Caliptra FMC ...
19,026,431 UART:
19,026,594 UART: [state] CFI Enabled
19,094,695 UART: [fht] FMC Alias Private Key: 7
20,858,698 UART: [art] Extend RT PCRs Done
20,859,907 UART: [art] Lock RT PCRs Done
20,861,475 UART: [art] Populate DV Done
20,866,876 UART: [fht] FMC Alias Private Key: 7
20,868,482 UART: [art] Derive CDI
20,869,315 UART: [art] Store in in slot 0x4
20,926,567 UART: [art] Derive Key Pair
20,927,631 UART: [art] Store priv key in slot 0x5
23,390,479 UART: [art] Derive Key Pair - Done
23,403,528 UART: [art] Signing Cert with AUTHO
23,404,834 UART: RITY.KEYID = 7
25,115,974 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,475 UART: [art] PUB.X = 2AEAA16269E8CDF9230046AE1AE630920E3D39D3FC6ECA6D8A245396BE1593718088FBA11BCAE3740E0F887C4B24846C
25,124,724 UART: [art] PUB.Y = 3052B7B99A90EB90C5BDC38565BA6345E1980B4A0CF187DCEE2573AF0946E3639C7F98F82BF07E73230D446E3320B6EC
25,132,106 UART: [art] SIG.R = B737C695AE8E75F88B905C719AEF75EF2B48995F4A8E320A4C51971860CE542ED33F359F66B7D6A8E77BD87EFB74C355
25,139,343 UART: [art] SIG.S = D67FD159D8B084BA90394380C11F2388A9B05DC9D21642763FCDE3AC12AE0685478C024F9C47B24D14B6C5DCAF0FB4F7
26,118,020 UART: Caliptra RT
26,118,720 UART: [state] CFI Enabled
26,283,408 UART: [rt] RT listening for mailbox commands...
26,285,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,316,742 UART: [rt]cmd =0x4d454153, len=108
26,335,369 >>> mbox cmd response data (12 bytes)
26,335,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,366,511 UART: [rt]cmd =0x4d454153, len=108
26,384,962 >>> mbox cmd response data (12 bytes)
26,385,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,416,066 UART: [rt]cmd =0x4d454153, len=108
26,434,060 >>> mbox cmd response data (12 bytes)
26,434,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,465,145 UART: [rt]cmd =0x4d454153, len=108
26,483,666 >>> mbox cmd response data (12 bytes)
26,484,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,514,749 UART: [rt]cmd =0x4d454153, len=108
26,533,012 >>> mbox cmd response data (12 bytes)
26,533,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,564,069 UART: [rt]cmd =0x4d454153, len=108
26,582,414 >>> mbox cmd response data (12 bytes)
26,582,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,613,488 UART: [rt]cmd =0x4d454153, len=108
26,632,363 >>> mbox cmd response data (12 bytes)
26,632,783 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,663,543 UART: [rt]cmd =0x4d454153, len=108
26,682,673 >>> mbox cmd response data (12 bytes)
26,683,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,713,647 UART: [rt]cmd =0x4d454153, len=108
26,732,360 >>> mbox cmd response data (12 bytes)
26,732,826 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,763,637 UART: [rt]cmd =0x4d454153, len=108
26,781,641 >>> mbox cmd response data (12 bytes)
26,782,072 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,812,675 UART: [rt]cmd =0x4d454153, len=108
26,830,602 >>> mbox cmd response data (12 bytes)
26,831,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,861,809 UART: [rt]cmd =0x4d454153, len=108
26,881,008 >>> mbox cmd response data (12 bytes)
26,881,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,912,196 UART: [rt]cmd =0x4d454153, len=108
26,931,154 >>> mbox cmd response data (12 bytes)
26,931,584 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,962,117 UART: [rt]cmd =0x4d454153, len=108
26,980,565 >>> mbox cmd response data (12 bytes)
26,981,027 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,011,673 UART: [rt]cmd =0x4d454153, len=108
27,030,059 >>> mbox cmd response data (12 bytes)
27,030,482 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,061,292 UART: [rt]cmd =0x4d454153, len=108
27,063,632 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
3,755,236 ready_for_fw is high
3,755,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,960,105 >>> mbox cmd response: success
19,215,813 UART:
19,216,191 UART: Running Caliptra FMC ...
19,217,285 UART:
19,217,431 UART: [state] CFI Enabled
19,225,265 UART: [fht] FMC Alias Private Key: 7
20,981,914 UART: [art] Extend RT PCRs Done
20,983,132 UART: [art] Lock RT PCRs Done
20,985,000 UART: [art] Populate DV Done
20,990,364 UART: [fht] FMC Alias Private Key: 7
20,991,904 UART: [art] Derive CDI
20,992,646 UART: [art] Store in in slot 0x4
21,035,507 UART: [art] Derive Key Pair
21,036,512 UART: [art] Store priv key in slot 0x5
23,463,595 UART: [art] Derive Key Pair - Done
23,476,639 UART: [art] Signing Cert with AUTHO
23,477,966 UART: RITY.KEYID = 7
25,183,390 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,896 UART: [art] PUB.X = 726F4CB09ED88A64798EAF6859B42C85A9DC6F659196F77E74B8DEC8C3F5178C2869D80100840F8C53D4740D7BE300CF
25,192,130 UART: [art] PUB.Y = 26B23E0F24E9B60E87C8CA1184DD5419250C4A176908313D94E8AD4E4B17ADEAE78080526185BA093357A0FB3C63A2BD
25,199,367 UART: [art] SIG.R = 8FC6651FE11AC267CE8B27C24112F720488A97434CCD5CEE8049C5420C25E3253AADFC34BA2A3BDC9BC1F4C79C2D04FE
25,206,809 UART: [art] SIG.S = C14304E272A4DDA58A3F5A76176539B083FA498A81AF059FE069D105E6211B353B08240D0FBB0B6591CBC2CC0A883D2F
26,186,146 UART: Caliptra RT
26,186,827 UART: [state] CFI Enabled
26,303,298 UART: [rt] RT listening for mailbox commands...
26,305,178 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,335,859 UART: [rt]cmd =0x4d454153, len=108
26,354,415 >>> mbox cmd response data (12 bytes)
26,354,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,385,474 UART: [rt]cmd =0x4d454153, len=108
26,404,292 >>> mbox cmd response data (12 bytes)
26,404,721 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,435,423 UART: [rt]cmd =0x4d454153, len=108
26,454,335 >>> mbox cmd response data (12 bytes)
26,454,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,485,524 UART: [rt]cmd =0x4d454153, len=108
26,504,256 >>> mbox cmd response data (12 bytes)
26,504,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,535,332 UART: [rt]cmd =0x4d454153, len=108
26,554,136 >>> mbox cmd response data (12 bytes)
26,554,572 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,585,267 UART: [rt]cmd =0x4d454153, len=108
26,604,376 >>> mbox cmd response data (12 bytes)
26,604,836 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,635,475 UART: [rt]cmd =0x4d454153, len=108
26,654,072 >>> mbox cmd response data (12 bytes)
26,654,494 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,685,304 UART: [rt]cmd =0x4d454153, len=108
26,703,884 >>> mbox cmd response data (12 bytes)
26,704,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,734,891 UART: [rt]cmd =0x4d454153, len=108
26,753,551 >>> mbox cmd response data (12 bytes)
26,754,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,784,653 UART: [rt]cmd =0x4d454153, len=108
26,803,632 >>> mbox cmd response data (12 bytes)
26,804,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,834,535 UART: [rt]cmd =0x4d454153, len=108
26,852,789 >>> mbox cmd response data (12 bytes)
26,853,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,883,922 UART: [rt]cmd =0x4d454153, len=108
26,903,328 >>> mbox cmd response data (12 bytes)
26,903,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,934,605 UART: [rt]cmd =0x4d454153, len=108
26,952,967 >>> mbox cmd response data (12 bytes)
26,953,393 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,983,920 UART: [rt]cmd =0x4d454153, len=108
27,003,007 >>> mbox cmd response data (12 bytes)
27,003,466 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,034,325 UART: [rt]cmd =0x4d454153, len=108
27,052,605 >>> mbox cmd response data (12 bytes)
27,053,030 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,083,653 UART: [rt]cmd =0x4d454153, len=108
27,086,141 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,165 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,689 UART: [kat] SHA2-256
881,620 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,735 UART: [kat] ++
885,887 UART: [kat] sha1
890,125 UART: [kat] SHA2-256
892,063 UART: [kat] SHA2-384
894,570 UART: [kat] SHA2-512-ACC
896,471 UART: [kat] ECC-384
902,154 UART: [kat] HMAC-384Kdf
906,858 UART: [kat] LMS
1,475,054 UART: [kat] --
1,475,959 UART: [cold-reset] ++
1,476,447 UART: [fht] Storing FHT @ 0x50003400
1,479,208 UART: [idev] ++
1,479,376 UART: [idev] CDI.KEYID = 6
1,479,736 UART: [idev] SUBJECT.KEYID = 7
1,480,160 UART: [idev] UDS.KEYID = 0
1,480,505 ready_for_fw is high
1,480,505 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,308 UART: [idev] Erasing UDS.KEYID = 0
1,504,590 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,146 UART: [idev] --
1,514,111 UART: [ldev] ++
1,514,279 UART: [ldev] CDI.KEYID = 6
1,514,642 UART: [ldev] SUBJECT.KEYID = 5
1,515,068 UART: [ldev] AUTHORITY.KEYID = 7
1,515,531 UART: [ldev] FE.KEYID = 1
1,520,839 UART: [ldev] Erasing FE.KEYID = 1
1,545,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,660 UART: [ldev] --
1,584,991 UART: [fwproc] Waiting for Commands...
1,585,806 UART: [fwproc] Received command 0x46574c44
1,586,597 UART: [fwproc] Received Image of size 114448 bytes
2,887,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,352 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,704 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,681 >>> mbox cmd response: success
3,081,693 UART: [afmc] ++
3,081,861 UART: [afmc] CDI.KEYID = 6
3,082,223 UART: [afmc] SUBJECT.KEYID = 7
3,082,648 UART: [afmc] AUTHORITY.KEYID = 5
3,117,175 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,547 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,055 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,940 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,630 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,467 UART: [afmc] --
3,160,511 UART: [cold-reset] --
3,161,379 UART: [state] Locking Datavault
3,162,526 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,130 UART: [state] Locking ICCM
3,163,668 UART: [exit] Launching FMC @ 0x40000130
3,168,997 UART:
3,169,013 UART: Running Caliptra FMC ...
3,169,421 UART:
3,169,475 UART: [state] CFI Enabled
3,179,574 UART: [fht] FMC Alias Private Key: 7
3,287,627 UART: [art] Extend RT PCRs Done
3,288,055 UART: [art] Lock RT PCRs Done
3,289,447 UART: [art] Populate DV Done
3,297,492 UART: [fht] FMC Alias Private Key: 7
3,298,452 UART: [art] Derive CDI
3,298,732 UART: [art] Store in in slot 0x4
3,384,357 UART: [art] Derive Key Pair
3,384,717 UART: [art] Store priv key in slot 0x5
3,397,465 UART: [art] Derive Key Pair - Done
3,412,373 UART: [art] Signing Cert with AUTHO
3,412,853 UART: RITY.KEYID = 7
3,427,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,670 UART: [art] PUB.X = 8FE4C2E8AAF2CC51B4EFEF7A61033E59191ED9989CF1C95E586FB28256BEC124932381E40013D26807BD8D074D6495B3
3,435,415 UART: [art] PUB.Y = F500A560827DD412EE7609B7C135DF26016DAB6D9D18CDDB9D96726B059C7E3747B2E811360ECC140C2743C956F84249
3,442,328 UART: [art] SIG.R = DBAC71BF5522A35E8DF52D8694150ED703C4B8936F90ABC77DDB5C4C2B1CD3F54BF7AC23E6BA189BD06B905A6756A496
3,449,110 UART: [art] SIG.S = 0C13AC1DBA50421F84116A1F44659969C1406A00775CC6758521405F3ED46E2CFF8E8ED5F8689348BE0DE47AD31FABE1
3,473,355 UART: Caliptra RT
3,473,608 UART: [state] CFI Enabled
3,582,435 UART: [rt] RT listening for mailbox commands...
3,583,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,487 UART: [rt]cmd =0x4d454153, len=108
3,633,603 >>> mbox cmd response data (12 bytes)
3,633,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,611 UART: [rt]cmd =0x4d454153, len=108
3,685,069 >>> mbox cmd response data (12 bytes)
3,685,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,175 UART: [rt]cmd =0x4d454153, len=108
3,734,651 >>> mbox cmd response data (12 bytes)
3,734,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,525 UART: [rt]cmd =0x4d454153, len=108
3,785,709 >>> mbox cmd response data (12 bytes)
3,785,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,815,819 UART: [rt]cmd =0x4d454153, len=108
3,836,661 >>> mbox cmd response data (12 bytes)
3,836,662 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,985 UART: [rt]cmd =0x4d454153, len=108
3,887,375 >>> mbox cmd response data (12 bytes)
3,887,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,399 UART: [rt]cmd =0x4d454153, len=108
3,937,651 >>> mbox cmd response data (12 bytes)
3,937,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,621 UART: [rt]cmd =0x4d454153, len=108
3,987,793 >>> mbox cmd response data (12 bytes)
3,987,794 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,017,537 UART: [rt]cmd =0x4d454153, len=108
4,038,167 >>> mbox cmd response data (12 bytes)
4,038,168 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,395 UART: [rt]cmd =0x4d454153, len=108
4,089,109 >>> mbox cmd response data (12 bytes)
4,089,110 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,119,121 UART: [rt]cmd =0x4d454153, len=108
4,139,965 >>> mbox cmd response data (12 bytes)
4,139,966 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,971 UART: [rt]cmd =0x4d454153, len=108
4,190,957 >>> mbox cmd response data (12 bytes)
4,190,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,220,835 UART: [rt]cmd =0x4d454153, len=108
4,240,675 >>> mbox cmd response data (12 bytes)
4,240,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,705 UART: [rt]cmd =0x4d454153, len=108
4,292,315 >>> mbox cmd response data (12 bytes)
4,292,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,322,265 UART: [rt]cmd =0x4d454153, len=108
4,343,601 >>> mbox cmd response data (12 bytes)
4,343,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,373,703 UART: [rt]cmd =0x4d454153, len=108
4,375,216 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,905 ready_for_fw is high
1,361,905 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,353 >>> mbox cmd response: success
2,988,421 UART:
2,988,437 UART: Running Caliptra FMC ...
2,988,845 UART:
2,988,899 UART: [state] CFI Enabled
2,999,632 UART: [fht] FMC Alias Private Key: 7
3,107,401 UART: [art] Extend RT PCRs Done
3,107,829 UART: [art] Lock RT PCRs Done
3,109,437 UART: [art] Populate DV Done
3,117,680 UART: [fht] FMC Alias Private Key: 7
3,118,672 UART: [art] Derive CDI
3,118,952 UART: [art] Store in in slot 0x4
3,204,233 UART: [art] Derive Key Pair
3,204,593 UART: [art] Store priv key in slot 0x5
3,217,433 UART: [art] Derive Key Pair - Done
3,232,370 UART: [art] Signing Cert with AUTHO
3,232,850 UART: RITY.KEYID = 7
3,247,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,735 UART: [art] PUB.X = E199FFC1DF9785BD29AC76F54741659DA38C31F8E61E90AA3F60243DB6714FDDA959499C1670F34C95A1A0EE42E0694A
3,255,513 UART: [art] PUB.Y = 8C934E6A0785FE4786E99195C426368F54C807C251F1196D59EAE8BD52B571CAA2BCDC364BD29C8E32C1DAE1037BEF9C
3,262,466 UART: [art] SIG.R = AFED49C7D56EA37B6002FC0539B58218AEF89D9A1F9A7CD64B50411D63C32B795661E6FC42AE73245A922768005F6BE7
3,269,214 UART: [art] SIG.S = 87A7C195F93AC239E4F677C38B333C8564BE732050D58C9D57F2D5AB3026E83EB1F0B9B51019CD6DB4C9161C18028B23
3,292,702 UART: Caliptra RT
3,292,955 UART: [state] CFI Enabled
3,401,185 UART: [rt] RT listening for mailbox commands...
3,401,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,689 UART: [rt]cmd =0x4d454153, len=108
3,453,285 >>> mbox cmd response data (12 bytes)
3,453,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,219 UART: [rt]cmd =0x4d454153, len=108
3,503,317 >>> mbox cmd response data (12 bytes)
3,503,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,209 UART: [rt]cmd =0x4d454153, len=108
3,554,367 >>> mbox cmd response data (12 bytes)
3,554,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,261 UART: [rt]cmd =0x4d454153, len=108
3,604,283 >>> mbox cmd response data (12 bytes)
3,604,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,397 UART: [rt]cmd =0x4d454153, len=108
3,655,131 >>> mbox cmd response data (12 bytes)
3,655,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,125 UART: [rt]cmd =0x4d454153, len=108
3,705,117 >>> mbox cmd response data (12 bytes)
3,705,118 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,407 UART: [rt]cmd =0x4d454153, len=108
3,756,421 >>> mbox cmd response data (12 bytes)
3,756,422 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,217 UART: [rt]cmd =0x4d454153, len=108
3,806,945 >>> mbox cmd response data (12 bytes)
3,806,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,041 UART: [rt]cmd =0x4d454153, len=108
3,857,611 >>> mbox cmd response data (12 bytes)
3,857,612 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,451 UART: [rt]cmd =0x4d454153, len=108
3,908,519 >>> mbox cmd response data (12 bytes)
3,908,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,425 UART: [rt]cmd =0x4d454153, len=108
3,959,631 >>> mbox cmd response data (12 bytes)
3,959,632 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,573 UART: [rt]cmd =0x4d454153, len=108
4,009,949 >>> mbox cmd response data (12 bytes)
4,009,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,959 UART: [rt]cmd =0x4d454153, len=108
4,060,603 >>> mbox cmd response data (12 bytes)
4,060,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,837 UART: [rt]cmd =0x4d454153, len=108
4,111,679 >>> mbox cmd response data (12 bytes)
4,111,680 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,141,797 UART: [rt]cmd =0x4d454153, len=108
4,163,035 >>> mbox cmd response data (12 bytes)
4,163,036 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,079 UART: [rt]cmd =0x4d454153, len=108
4,194,836 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,716 UART: [state] DebugLocked = No
86,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,034 UART: [kat] SHA2-256
881,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,080 UART: [kat] ++
886,232 UART: [kat] sha1
890,520 UART: [kat] SHA2-256
892,458 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,701 UART: [kat] LMS
1,475,897 UART: [kat] --
1,476,742 UART: [cold-reset] ++
1,477,240 UART: [fht] Storing FHT @ 0x50003400
1,480,123 UART: [idev] ++
1,480,291 UART: [idev] CDI.KEYID = 6
1,480,651 UART: [idev] SUBJECT.KEYID = 7
1,481,075 UART: [idev] UDS.KEYID = 0
1,481,420 ready_for_fw is high
1,481,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,143 UART: [idev] Erasing UDS.KEYID = 0
1,506,343 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,075 UART: [idev] --
1,516,170 UART: [ldev] ++
1,516,338 UART: [ldev] CDI.KEYID = 6
1,516,701 UART: [ldev] SUBJECT.KEYID = 5
1,517,127 UART: [ldev] AUTHORITY.KEYID = 7
1,517,590 UART: [ldev] FE.KEYID = 1
1,522,742 UART: [ldev] Erasing FE.KEYID = 1
1,548,791 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,681 UART: [ldev] --
1,588,152 UART: [fwproc] Waiting for Commands...
1,588,863 UART: [fwproc] Received command 0x46574c44
1,589,654 UART: [fwproc] Received Image of size 114448 bytes
2,888,995 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,255 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,608 >>> mbox cmd response: success
3,082,680 UART: [afmc] ++
3,082,848 UART: [afmc] CDI.KEYID = 6
3,083,210 UART: [afmc] SUBJECT.KEYID = 7
3,083,635 UART: [afmc] AUTHORITY.KEYID = 5
3,119,106 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,282 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,062 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,675 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,365 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,250 UART: [afmc] --
3,162,206 UART: [cold-reset] --
3,163,094 UART: [state] Locking Datavault
3,164,165 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,769 UART: [state] Locking ICCM
3,165,217 UART: [exit] Launching FMC @ 0x40000130
3,170,546 UART:
3,170,562 UART: Running Caliptra FMC ...
3,170,970 UART:
3,171,113 UART: [state] CFI Enabled
3,181,754 UART: [fht] FMC Alias Private Key: 7
3,289,649 UART: [art] Extend RT PCRs Done
3,290,077 UART: [art] Lock RT PCRs Done
3,291,799 UART: [art] Populate DV Done
3,299,930 UART: [fht] FMC Alias Private Key: 7
3,301,102 UART: [art] Derive CDI
3,301,382 UART: [art] Store in in slot 0x4
3,387,307 UART: [art] Derive Key Pair
3,387,667 UART: [art] Store priv key in slot 0x5
3,400,903 UART: [art] Derive Key Pair - Done
3,415,770 UART: [art] Signing Cert with AUTHO
3,416,250 UART: RITY.KEYID = 7
3,431,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,061 UART: [art] PUB.X = F80A54B634876FDC003A4C794B221EC405B2F5F947820744BCD61BC011AEEE5771C3F92E3EA471CF8A54418ABA2EE1FA
3,438,814 UART: [art] PUB.Y = 55A91BCF283E68D09F10E5AC1E890DAEAA61FBF5C9815807030538F67B2871AE5673C62C5CF47EB3768E11758D7E14ED
3,445,760 UART: [art] SIG.R = 3DBA42F8C9C46C62F7A08DAFCAEB1ED8EC0BDE3203A19E29FD58A2522C1F87D1A55AC749E28C7B7D78527EBC315B0D50
3,452,545 UART: [art] SIG.S = 99E01F6496815F35BDFBA6A716B3D028A5B89553441508D34BFE4838FB92C3175427C7DA75E130C6718E528441A827BA
3,476,479 UART: Caliptra RT
3,476,824 UART: [state] CFI Enabled
3,584,635 UART: [rt] RT listening for mailbox commands...
3,585,305 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,949 UART: [rt]cmd =0x4d454153, len=108
3,637,037 >>> mbox cmd response data (12 bytes)
3,637,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,099 UART: [rt]cmd =0x4d454153, len=108
3,687,969 >>> mbox cmd response data (12 bytes)
3,687,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,237 UART: [rt]cmd =0x4d454153, len=108
3,739,607 >>> mbox cmd response data (12 bytes)
3,739,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,423 UART: [rt]cmd =0x4d454153, len=108
3,789,805 >>> mbox cmd response data (12 bytes)
3,789,806 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,803 UART: [rt]cmd =0x4d454153, len=108
3,840,471 >>> mbox cmd response data (12 bytes)
3,840,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,870,743 UART: [rt]cmd =0x4d454153, len=108
3,890,463 >>> mbox cmd response data (12 bytes)
3,890,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,285 UART: [rt]cmd =0x4d454153, len=108
3,941,677 >>> mbox cmd response data (12 bytes)
3,941,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,811 UART: [rt]cmd =0x4d454153, len=108
3,992,621 >>> mbox cmd response data (12 bytes)
3,992,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,022,803 UART: [rt]cmd =0x4d454153, len=108
4,043,917 >>> mbox cmd response data (12 bytes)
4,043,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,074,051 UART: [rt]cmd =0x4d454153, len=108
4,094,537 >>> mbox cmd response data (12 bytes)
4,094,538 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,124,639 UART: [rt]cmd =0x4d454153, len=108
4,145,751 >>> mbox cmd response data (12 bytes)
4,145,752 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,175,853 UART: [rt]cmd =0x4d454153, len=108
4,197,177 >>> mbox cmd response data (12 bytes)
4,197,178 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,227,443 UART: [rt]cmd =0x4d454153, len=108
4,248,535 >>> mbox cmd response data (12 bytes)
4,248,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,278,535 UART: [rt]cmd =0x4d454153, len=108
4,299,359 >>> mbox cmd response data (12 bytes)
4,299,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,329,343 UART: [rt]cmd =0x4d454153, len=108
4,350,447 >>> mbox cmd response data (12 bytes)
4,350,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,380,591 UART: [rt]cmd =0x4d454153, len=108
4,382,620 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,130 ready_for_fw is high
1,363,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,582 >>> mbox cmd response: success
2,992,918 UART:
2,992,934 UART: Running Caliptra FMC ...
2,993,342 UART:
2,993,485 UART: [state] CFI Enabled
3,004,172 UART: [fht] FMC Alias Private Key: 7
3,112,757 UART: [art] Extend RT PCRs Done
3,113,185 UART: [art] Lock RT PCRs Done
3,114,921 UART: [art] Populate DV Done
3,123,032 UART: [fht] FMC Alias Private Key: 7
3,124,060 UART: [art] Derive CDI
3,124,340 UART: [art] Store in in slot 0x4
3,209,789 UART: [art] Derive Key Pair
3,210,149 UART: [art] Store priv key in slot 0x5
3,224,343 UART: [art] Derive Key Pair - Done
3,238,851 UART: [art] Signing Cert with AUTHO
3,239,331 UART: RITY.KEYID = 7
3,254,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,600 UART: [art] PUB.X = A34737FF11FDF454DE2CCDE93FF07ACF8CB431979ECE5875C4B02EDF7C795815BD7B9B9E58B3C2A7A30D869FEFE8260C
3,262,388 UART: [art] PUB.Y = 36D4299026B3A335DAD586FDAEA6465133A330DE28F4DA2D9831A0B659038FEAB06CD024F5EB459CBECB2B2CB7EB0AC5
3,269,352 UART: [art] SIG.R = AAE8B37B0F1C685784C76B2899C9103321C6B5C470B6FA5CCEA028E3B9640A0E93C564F37DC09C9350A6988968A87BBC
3,276,119 UART: [art] SIG.S = 55166EEAD9D8F4502D7BE705B65D8C2E179A3D3111F5F61B2987E1F3731923C388BB77FE5E5C4B888D0DB038D560E891
3,299,636 UART: Caliptra RT
3,299,981 UART: [state] CFI Enabled
3,408,146 UART: [rt] RT listening for mailbox commands...
3,408,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,372 UART: [rt]cmd =0x4d454153, len=108
3,460,352 >>> mbox cmd response data (12 bytes)
3,460,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,306 UART: [rt]cmd =0x4d454153, len=108
3,511,400 >>> mbox cmd response data (12 bytes)
3,511,401 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,541,250 UART: [rt]cmd =0x4d454153, len=108
3,562,240 >>> mbox cmd response data (12 bytes)
3,562,241 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,592,398 UART: [rt]cmd =0x4d454153, len=108
3,613,484 >>> mbox cmd response data (12 bytes)
3,613,485 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,536 UART: [rt]cmd =0x4d454153, len=108
3,663,880 >>> mbox cmd response data (12 bytes)
3,663,881 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,824 UART: [rt]cmd =0x4d454153, len=108
3,714,672 >>> mbox cmd response data (12 bytes)
3,714,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,756 UART: [rt]cmd =0x4d454153, len=108
3,765,088 >>> mbox cmd response data (12 bytes)
3,765,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,795,156 UART: [rt]cmd =0x4d454153, len=108
3,816,148 >>> mbox cmd response data (12 bytes)
3,816,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,846,066 UART: [rt]cmd =0x4d454153, len=108
3,866,674 >>> mbox cmd response data (12 bytes)
3,866,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,808 UART: [rt]cmd =0x4d454153, len=108
3,917,338 >>> mbox cmd response data (12 bytes)
3,917,339 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,450 UART: [rt]cmd =0x4d454153, len=108
3,968,048 >>> mbox cmd response data (12 bytes)
3,968,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,998,074 UART: [rt]cmd =0x4d454153, len=108
4,018,972 >>> mbox cmd response data (12 bytes)
4,018,973 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,049,114 UART: [rt]cmd =0x4d454153, len=108
4,070,418 >>> mbox cmd response data (12 bytes)
4,070,419 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,100,398 UART: [rt]cmd =0x4d454153, len=108
4,121,156 >>> mbox cmd response data (12 bytes)
4,121,157 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,151,038 UART: [rt]cmd =0x4d454153, len=108
4,171,390 >>> mbox cmd response data (12 bytes)
4,171,391 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,201,464 UART: [rt]cmd =0x4d454153, len=108
4,203,355 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
902,055 UART: [kat] SHA2-256
903,995 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
917,986 UART: [kat] HMAC-384Kdf
922,362 UART: [kat] LMS
1,170,690 UART: [kat] --
1,171,447 UART: [cold-reset] ++
1,171,833 UART: [fht] FHT @ 0x50003400
1,174,598 UART: [idev] ++
1,174,766 UART: [idev] CDI.KEYID = 6
1,175,126 UART: [idev] SUBJECT.KEYID = 7
1,175,550 UART: [idev] UDS.KEYID = 0
1,175,895 ready_for_fw is high
1,175,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,526 UART: [idev] Erasing UDS.KEYID = 0
1,200,605 UART: [idev] Sha1 KeyId Algorithm
1,209,065 UART: [idev] --
1,210,147 UART: [ldev] ++
1,210,315 UART: [ldev] CDI.KEYID = 6
1,210,678 UART: [ldev] SUBJECT.KEYID = 5
1,211,104 UART: [ldev] AUTHORITY.KEYID = 7
1,211,567 UART: [ldev] FE.KEYID = 1
1,216,757 UART: [ldev] Erasing FE.KEYID = 1
1,243,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,748 UART: [fwproc] Wait for Commands...
1,283,318 UART: [fwproc] Recv command 0x46574c44
1,284,046 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,139 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,194 >>> mbox cmd response: success
2,777,300 UART: [afmc] ++
2,777,468 UART: [afmc] CDI.KEYID = 6
2,777,830 UART: [afmc] SUBJECT.KEYID = 7
2,778,255 UART: [afmc] AUTHORITY.KEYID = 5
2,813,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,799 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,527 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,412 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,131 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,077 UART: [afmc] --
2,857,031 UART: [cold-reset] --
2,857,627 UART: [state] Locking Datavault
2,858,840 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,444 UART: [state] Locking ICCM
2,860,038 UART: [exit] Launching FMC @ 0x40000130
2,865,367 UART:
2,865,383 UART: Running Caliptra FMC ...
2,865,791 UART:
2,865,845 UART: [state] CFI Enabled
2,876,594 UART: [fht] FMC Alias Private Key: 7
2,984,751 UART: [art] Extend RT PCRs Done
2,985,179 UART: [art] Lock RT PCRs Done
2,986,607 UART: [art] Populate DV Done
2,994,546 UART: [fht] FMC Alias Private Key: 7
2,995,726 UART: [art] Derive CDI
2,996,006 UART: [art] Store in in slot 0x4
3,081,745 UART: [art] Derive Key Pair
3,082,105 UART: [art] Store priv key in slot 0x5
3,095,229 UART: [art] Derive Key Pair - Done
3,110,061 UART: [art] Signing Cert with AUTHO
3,110,541 UART: RITY.KEYID = 7
3,125,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,666 UART: [art] PUB.X = CDCA88DCDE5AF146CC435C2ABAD9C04F72FA4FFA14F62A38E58CC29573FD4B37765F4A20C8F17573566B7269AACB5FD9
3,133,460 UART: [art] PUB.Y = FF7677B5F3FFCFF53DFA564E694B66EB988A98A231DCF5001F63CC94A3CDB5064C40EEC5020D64A6AAE405A7AB19D18C
3,140,398 UART: [art] SIG.R = F2FC1448194836F7EEA7026C325460B916847FE92B6E4C304270A719E03931C84FD4B75281DCBE90709DED6F2861B8B1
3,147,163 UART: [art] SIG.S = 1A0B1182388F46950A6D3F181A280951B59352EDD7EB1B1BDF7F707106D86D9BFD8775C26B755109C628A319730D3E42
3,171,140 UART: Caliptra RT
3,171,393 UART: [state] CFI Enabled
3,278,318 UART: [rt] RT listening for mailbox commands...
3,278,988 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,732 UART: [rt]cmd =0x4d454153, len=108
3,330,428 >>> mbox cmd response data (12 bytes)
3,330,429 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,396 UART: [rt]cmd =0x4d454153, len=108
3,381,080 >>> mbox cmd response data (12 bytes)
3,381,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,234 UART: [rt]cmd =0x4d454153, len=108
3,431,242 >>> mbox cmd response data (12 bytes)
3,431,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,308 UART: [rt]cmd =0x4d454153, len=108
3,481,980 >>> mbox cmd response data (12 bytes)
3,481,981 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,984 UART: [rt]cmd =0x4d454153, len=108
3,532,640 >>> mbox cmd response data (12 bytes)
3,532,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,438 UART: [rt]cmd =0x4d454153, len=108
3,583,298 >>> mbox cmd response data (12 bytes)
3,583,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,180 UART: [rt]cmd =0x4d454153, len=108
3,633,816 >>> mbox cmd response data (12 bytes)
3,633,817 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,780 UART: [rt]cmd =0x4d454153, len=108
3,685,270 >>> mbox cmd response data (12 bytes)
3,685,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,354 UART: [rt]cmd =0x4d454153, len=108
3,735,500 >>> mbox cmd response data (12 bytes)
3,735,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,462 UART: [rt]cmd =0x4d454153, len=108
3,786,230 >>> mbox cmd response data (12 bytes)
3,786,231 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,268 UART: [rt]cmd =0x4d454153, len=108
3,836,918 >>> mbox cmd response data (12 bytes)
3,836,919 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,186 UART: [rt]cmd =0x4d454153, len=108
3,887,380 >>> mbox cmd response data (12 bytes)
3,887,381 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,582 UART: [rt]cmd =0x4d454153, len=108
3,938,836 >>> mbox cmd response data (12 bytes)
3,938,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,746 UART: [rt]cmd =0x4d454153, len=108
3,989,806 >>> mbox cmd response data (12 bytes)
3,989,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,818 UART: [rt]cmd =0x4d454153, len=108
4,041,012 >>> mbox cmd response data (12 bytes)
4,041,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,282 UART: [rt]cmd =0x4d454153, len=108
4,073,363 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,655 ready_for_fw is high
1,060,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,593 >>> mbox cmd response: success
2,688,339 UART:
2,688,355 UART: Running Caliptra FMC ...
2,688,763 UART:
2,688,817 UART: [state] CFI Enabled
2,699,480 UART: [fht] FMC Alias Private Key: 7
2,807,473 UART: [art] Extend RT PCRs Done
2,807,901 UART: [art] Lock RT PCRs Done
2,809,309 UART: [art] Populate DV Done
2,817,564 UART: [fht] FMC Alias Private Key: 7
2,818,568 UART: [art] Derive CDI
2,818,848 UART: [art] Store in in slot 0x4
2,904,181 UART: [art] Derive Key Pair
2,904,541 UART: [art] Store priv key in slot 0x5
2,917,447 UART: [art] Derive Key Pair - Done
2,932,004 UART: [art] Signing Cert with AUTHO
2,932,484 UART: RITY.KEYID = 7
2,947,654 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,419 UART: [art] PUB.X = 2143FAC49955F97EBD2FD067E77C6BD0B39B3941500C42EFF294BE475B8C11C29DC4C6BA9E0C4CA4A3C6CC179AFF523B
2,955,203 UART: [art] PUB.Y = 0CF93891C47509A9833D3E177597F91E5B9CB95531206E9BA6CBFDE6F68B232AD191A7612084F984E6024E3B3CDE12E7
2,962,146 UART: [art] SIG.R = 47C55D013EC55B85482E2B310912C6D98589DD0A602320B19CB1EFD2B42B207732FBB3F81FAD4A1FEBB1E1C257194C7E
2,968,917 UART: [art] SIG.S = EFFFBC19E49C40EEA15617ADE935D76FFBAEE34E54B04FA1913AB67FBE54F2EAB204F52BCE909F3FA60C702C37CC0A3A
2,992,873 UART: Caliptra RT
2,993,126 UART: [state] CFI Enabled
3,101,037 UART: [rt] RT listening for mailbox commands...
3,101,707 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,945 UART: [rt]cmd =0x4d454153, len=108
3,152,015 >>> mbox cmd response data (12 bytes)
3,152,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,877 UART: [rt]cmd =0x4d454153, len=108
3,202,311 >>> mbox cmd response data (12 bytes)
3,202,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,351 UART: [rt]cmd =0x4d454153, len=108
3,252,473 >>> mbox cmd response data (12 bytes)
3,252,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,583 UART: [rt]cmd =0x4d454153, len=108
3,304,177 >>> mbox cmd response data (12 bytes)
3,304,178 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,191 UART: [rt]cmd =0x4d454153, len=108
3,355,415 >>> mbox cmd response data (12 bytes)
3,355,416 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,223 UART: [rt]cmd =0x4d454153, len=108
3,406,267 >>> mbox cmd response data (12 bytes)
3,406,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,361 UART: [rt]cmd =0x4d454153, len=108
3,456,979 >>> mbox cmd response data (12 bytes)
3,456,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,217 UART: [rt]cmd =0x4d454153, len=108
3,508,407 >>> mbox cmd response data (12 bytes)
3,508,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,571 UART: [rt]cmd =0x4d454153, len=108
3,559,371 >>> mbox cmd response data (12 bytes)
3,559,372 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,411 UART: [rt]cmd =0x4d454153, len=108
3,610,443 >>> mbox cmd response data (12 bytes)
3,610,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,537 UART: [rt]cmd =0x4d454153, len=108
3,661,687 >>> mbox cmd response data (12 bytes)
3,661,688 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,671 UART: [rt]cmd =0x4d454153, len=108
3,712,563 >>> mbox cmd response data (12 bytes)
3,712,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,427 UART: [rt]cmd =0x4d454153, len=108
3,763,723 >>> mbox cmd response data (12 bytes)
3,763,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,725 UART: [rt]cmd =0x4d454153, len=108
3,814,297 >>> mbox cmd response data (12 bytes)
3,814,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,057 UART: [rt]cmd =0x4d454153, len=108
3,865,825 >>> mbox cmd response data (12 bytes)
3,865,826 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,153 UART: [rt]cmd =0x4d454153, len=108
3,898,002 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
893,883 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,008 UART: [kat] ++
898,160 UART: [kat] sha1
902,402 UART: [kat] SHA2-256
904,342 UART: [kat] SHA2-384
906,971 UART: [kat] SHA2-512-ACC
908,872 UART: [kat] ECC-384
918,707 UART: [kat] HMAC-384Kdf
923,361 UART: [kat] LMS
1,171,689 UART: [kat] --
1,172,350 UART: [cold-reset] ++
1,172,878 UART: [fht] FHT @ 0x50003400
1,175,717 UART: [idev] ++
1,175,885 UART: [idev] CDI.KEYID = 6
1,176,245 UART: [idev] SUBJECT.KEYID = 7
1,176,669 UART: [idev] UDS.KEYID = 0
1,177,014 ready_for_fw is high
1,177,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,805 UART: [idev] Erasing UDS.KEYID = 0
1,201,454 UART: [idev] Sha1 KeyId Algorithm
1,209,924 UART: [idev] --
1,210,758 UART: [ldev] ++
1,210,926 UART: [ldev] CDI.KEYID = 6
1,211,289 UART: [ldev] SUBJECT.KEYID = 5
1,211,715 UART: [ldev] AUTHORITY.KEYID = 7
1,212,178 UART: [ldev] FE.KEYID = 1
1,217,516 UART: [ldev] Erasing FE.KEYID = 1
1,243,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,812 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,283,943 UART: [fwproc] Recv command 0x46574c44
1,284,671 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,399 >>> mbox cmd response: success
2,777,425 UART: [afmc] ++
2,777,593 UART: [afmc] CDI.KEYID = 6
2,777,955 UART: [afmc] SUBJECT.KEYID = 7
2,778,380 UART: [afmc] AUTHORITY.KEYID = 5
2,813,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,838 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,723 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,442 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,344 UART: [afmc] --
2,857,370 UART: [cold-reset] --
2,858,220 UART: [state] Locking Datavault
2,859,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,981 UART: [state] Locking ICCM
2,860,517 UART: [exit] Launching FMC @ 0x40000130
2,865,846 UART:
2,865,862 UART: Running Caliptra FMC ...
2,866,270 UART:
2,866,413 UART: [state] CFI Enabled
2,877,004 UART: [fht] FMC Alias Private Key: 7
2,984,293 UART: [art] Extend RT PCRs Done
2,984,721 UART: [art] Lock RT PCRs Done
2,986,197 UART: [art] Populate DV Done
2,994,598 UART: [fht] FMC Alias Private Key: 7
2,995,752 UART: [art] Derive CDI
2,996,032 UART: [art] Store in in slot 0x4
3,081,635 UART: [art] Derive Key Pair
3,081,995 UART: [art] Store priv key in slot 0x5
3,095,335 UART: [art] Derive Key Pair - Done
3,110,433 UART: [art] Signing Cert with AUTHO
3,110,913 UART: RITY.KEYID = 7
3,125,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,710 UART: [art] PUB.X = 995575C64CDA7FB52D9618A1B5B082A5F43369BD0F493476B4EF6433444514B4837F7E387CC2EFDAC238B281A7AC3A77
3,133,481 UART: [art] PUB.Y = 70A8CB2467E8EEDB48DE3951608BDDB9D7AFF84FA5243D5044FFDCB8D00E028AD89D1989E5180A912F79A7CB89EAE62B
3,140,442 UART: [art] SIG.R = 7E64F7A32D7896B450B2DF1F767829CBD65721243E7330C47A5624435E6806B6510D2F279695C457FE21A71FA066A1C1
3,147,198 UART: [art] SIG.S = 16D4718E119ACC22EBF17566E46459200A948E3BA7610D076FCE1429E401BDE779F6EA62AA58FC75C11E506E620C7802
3,171,211 UART: Caliptra RT
3,171,556 UART: [state] CFI Enabled
3,280,427 UART: [rt] RT listening for mailbox commands...
3,281,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,619 UART: [rt]cmd =0x4d454153, len=108
3,332,351 >>> mbox cmd response data (12 bytes)
3,332,352 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,529 UART: [rt]cmd =0x4d454153, len=108
3,384,127 >>> mbox cmd response data (12 bytes)
3,384,128 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,407 UART: [rt]cmd =0x4d454153, len=108
3,434,851 >>> mbox cmd response data (12 bytes)
3,434,852 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,699 UART: [rt]cmd =0x4d454153, len=108
3,485,063 >>> mbox cmd response data (12 bytes)
3,485,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,147 UART: [rt]cmd =0x4d454153, len=108
3,535,411 >>> mbox cmd response data (12 bytes)
3,535,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,391 UART: [rt]cmd =0x4d454153, len=108
3,586,039 >>> mbox cmd response data (12 bytes)
3,586,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,213 UART: [rt]cmd =0x4d454153, len=108
3,637,465 >>> mbox cmd response data (12 bytes)
3,637,466 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,805 UART: [rt]cmd =0x4d454153, len=108
3,688,599 >>> mbox cmd response data (12 bytes)
3,688,600 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,477 UART: [rt]cmd =0x4d454153, len=108
3,738,781 >>> mbox cmd response data (12 bytes)
3,738,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,715 UART: [rt]cmd =0x4d454153, len=108
3,789,589 >>> mbox cmd response data (12 bytes)
3,789,590 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,679 UART: [rt]cmd =0x4d454153, len=108
3,840,939 >>> mbox cmd response data (12 bytes)
3,840,940 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,870,971 UART: [rt]cmd =0x4d454153, len=108
3,891,899 >>> mbox cmd response data (12 bytes)
3,891,900 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,917 UART: [rt]cmd =0x4d454153, len=108
3,942,769 >>> mbox cmd response data (12 bytes)
3,942,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,805 UART: [rt]cmd =0x4d454153, len=108
3,993,353 >>> mbox cmd response data (12 bytes)
3,993,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,023,319 UART: [rt]cmd =0x4d454153, len=108
4,043,415 >>> mbox cmd response data (12 bytes)
4,043,416 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,073,489 UART: [rt]cmd =0x4d454153, len=108
4,075,412 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,712 ready_for_fw is high
1,060,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,545 >>> mbox cmd response: success
2,690,327 UART:
2,690,343 UART: Running Caliptra FMC ...
2,690,751 UART:
2,690,894 UART: [state] CFI Enabled
2,701,463 UART: [fht] FMC Alias Private Key: 7
2,809,554 UART: [art] Extend RT PCRs Done
2,809,982 UART: [art] Lock RT PCRs Done
2,811,546 UART: [art] Populate DV Done
2,819,993 UART: [fht] FMC Alias Private Key: 7
2,821,171 UART: [art] Derive CDI
2,821,451 UART: [art] Store in in slot 0x4
2,907,350 UART: [art] Derive Key Pair
2,907,710 UART: [art] Store priv key in slot 0x5
2,920,800 UART: [art] Derive Key Pair - Done
2,935,549 UART: [art] Signing Cert with AUTHO
2,936,029 UART: RITY.KEYID = 7
2,951,515 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,280 UART: [art] PUB.X = 43B4C97B446CCF757503E903FEBF2D04BD163C9AB90031DD4FF649BAB6BE5E009053397776E8AB053D615A8457891773
2,958,996 UART: [art] PUB.Y = D92051AD29C3B08AAFDFFA86A4BC76244A1131FB17206AEECADC4ECD4905894F7307695AAF86F1901EFEE7A84F3075AE
2,965,960 UART: [art] SIG.R = CB81F9FED4BE68D677F2051C9B91237E22ACABF9F0FC9B35F5F7C03CC3DF08B32DD4940E8563ABC42AC67A3156219A5B
2,972,741 UART: [art] SIG.S = C4D7200B2E53D68FEB526092E54A40F66B842CD64A3AE9E12AA090E66342865904A6A05932B6932179E7923F1FEA0C14
2,996,553 UART: Caliptra RT
2,996,898 UART: [state] CFI Enabled
3,104,758 UART: [rt] RT listening for mailbox commands...
3,105,428 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,720 UART: [rt]cmd =0x4d454153, len=108
3,156,268 >>> mbox cmd response data (12 bytes)
3,156,269 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,294 UART: [rt]cmd =0x4d454153, len=108
3,206,540 >>> mbox cmd response data (12 bytes)
3,206,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,236,728 UART: [rt]cmd =0x4d454153, len=108
3,256,702 >>> mbox cmd response data (12 bytes)
3,256,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,286,662 UART: [rt]cmd =0x4d454153, len=108
3,308,008 >>> mbox cmd response data (12 bytes)
3,308,009 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,826 UART: [rt]cmd =0x4d454153, len=108
3,358,642 >>> mbox cmd response data (12 bytes)
3,358,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,388,910 UART: [rt]cmd =0x4d454153, len=108
3,408,452 >>> mbox cmd response data (12 bytes)
3,408,453 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,526 UART: [rt]cmd =0x4d454153, len=108
3,459,102 >>> mbox cmd response data (12 bytes)
3,459,103 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,256 UART: [rt]cmd =0x4d454153, len=108
3,509,736 >>> mbox cmd response data (12 bytes)
3,509,737 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,622 UART: [rt]cmd =0x4d454153, len=108
3,560,354 >>> mbox cmd response data (12 bytes)
3,560,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,590,468 UART: [rt]cmd =0x4d454153, len=108
3,610,320 >>> mbox cmd response data (12 bytes)
3,610,321 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,340 UART: [rt]cmd =0x4d454153, len=108
3,661,580 >>> mbox cmd response data (12 bytes)
3,661,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,548 UART: [rt]cmd =0x4d454153, len=108
3,712,598 >>> mbox cmd response data (12 bytes)
3,712,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,454 UART: [rt]cmd =0x4d454153, len=108
3,763,138 >>> mbox cmd response data (12 bytes)
3,763,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,120 UART: [rt]cmd =0x4d454153, len=108
3,813,860 >>> mbox cmd response data (12 bytes)
3,813,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,072 UART: [rt]cmd =0x4d454153, len=108
3,864,698 >>> mbox cmd response data (12 bytes)
3,864,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,926 UART: [rt]cmd =0x4d454153, len=108
3,896,537 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,492 UART: [state] LifecycleState = Unprovisioned
85,147 UART: [state] DebugLocked = No
85,711 UART: [state] WD Timer not started. Device not locked for debugging
86,872 UART: [kat] SHA2-256
890,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,551 UART: [kat] ++
894,703 UART: [kat] sha1
898,915 UART: [kat] SHA2-256
900,855 UART: [kat] SHA2-384
903,566 UART: [kat] SHA2-512-ACC
905,467 UART: [kat] ECC-384
914,994 UART: [kat] HMAC-384Kdf
919,404 UART: [kat] LMS
1,167,716 UART: [kat] --
1,168,627 UART: [cold-reset] ++
1,169,021 UART: [fht] FHT @ 0x50003400
1,171,647 UART: [idev] ++
1,171,815 UART: [idev] CDI.KEYID = 6
1,172,176 UART: [idev] SUBJECT.KEYID = 7
1,172,601 UART: [idev] UDS.KEYID = 0
1,172,947 ready_for_fw is high
1,172,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,273 UART: [idev] Erasing UDS.KEYID = 0
1,197,201 UART: [idev] Sha1 KeyId Algorithm
1,206,011 UART: [idev] --
1,206,860 UART: [ldev] ++
1,207,028 UART: [ldev] CDI.KEYID = 6
1,207,392 UART: [ldev] SUBJECT.KEYID = 5
1,207,819 UART: [ldev] AUTHORITY.KEYID = 7
1,208,282 UART: [ldev] FE.KEYID = 1
1,213,434 UART: [ldev] Erasing FE.KEYID = 1
1,239,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,322 UART: [ldev] --
1,278,708 UART: [fwproc] Wait for Commands...
1,279,395 UART: [fwproc] Recv command 0x46574c44
1,280,128 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,861 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,170 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,202 >>> mbox cmd response: success
2,773,457 UART: [afmc] ++
2,773,625 UART: [afmc] CDI.KEYID = 6
2,773,988 UART: [afmc] SUBJECT.KEYID = 7
2,774,414 UART: [afmc] AUTHORITY.KEYID = 5
2,809,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,077 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,960 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,679 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,606 UART: [afmc] --
2,852,628 UART: [cold-reset] --
2,853,474 UART: [state] Locking Datavault
2,854,573 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,177 UART: [state] Locking ICCM
2,855,731 UART: [exit] Launching FMC @ 0x40000130
2,861,060 UART:
2,861,076 UART: Running Caliptra FMC ...
2,861,484 UART:
2,861,538 UART: [state] CFI Enabled
2,872,097 UART: [fht] FMC Alias Private Key: 7
2,979,916 UART: [art] Extend RT PCRs Done
2,980,344 UART: [art] Lock RT PCRs Done
2,982,168 UART: [art] Populate DV Done
2,990,529 UART: [fht] FMC Alias Private Key: 7
2,991,543 UART: [art] Derive CDI
2,991,823 UART: [art] Store in in slot 0x4
3,077,332 UART: [art] Derive Key Pair
3,077,692 UART: [art] Store priv key in slot 0x5
3,090,906 UART: [art] Derive Key Pair - Done
3,105,608 UART: [art] Signing Cert with AUTHO
3,106,088 UART: RITY.KEYID = 7
3,121,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,989 UART: [art] PUB.X = 541128979005C6278E8FD17D6150083BE25E7D60EFAD566DEBBF81EFB5BC0817384B609F4D07E2E9632B06B11710EEC4
3,128,748 UART: [art] PUB.Y = B4D6B3D3EA0AFA0149054DC35F9F189E47916488213068ECC6A3BE66755DAA3652409560581DFF1981142A0F70717CD3
3,135,684 UART: [art] SIG.R = 542D6CED0EC5798986C00642F3454BF0051F65D90FFFA0A8C5750B69E37BE0F184C5A9708376B4CA6D424F55C5CF878B
3,142,445 UART: [art] SIG.S = 8C39AA6C5EF5669A7153B045EB8F671FF098228787043C70D7A734658EF82A3547469B93C095B5362940256A63E4A034
3,166,305 UART: Caliptra RT
3,166,558 UART: [state] CFI Enabled
3,274,345 UART: [rt] RT listening for mailbox commands...
3,275,015 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,299 UART: [rt]cmd =0x4d454153, len=108
3,326,531 >>> mbox cmd response data (12 bytes)
3,326,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,557 UART: [rt]cmd =0x4d454153, len=108
3,377,483 >>> mbox cmd response data (12 bytes)
3,377,484 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,405 UART: [rt]cmd =0x4d454153, len=108
3,428,243 >>> mbox cmd response data (12 bytes)
3,428,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,471 UART: [rt]cmd =0x4d454153, len=108
3,478,767 >>> mbox cmd response data (12 bytes)
3,478,768 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,965 UART: [rt]cmd =0x4d454153, len=108
3,529,511 >>> mbox cmd response data (12 bytes)
3,529,512 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,611 UART: [rt]cmd =0x4d454153, len=108
3,580,419 >>> mbox cmd response data (12 bytes)
3,580,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,429 UART: [rt]cmd =0x4d454153, len=108
3,631,747 >>> mbox cmd response data (12 bytes)
3,631,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,733 UART: [rt]cmd =0x4d454153, len=108
3,682,433 >>> mbox cmd response data (12 bytes)
3,682,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,455 UART: [rt]cmd =0x4d454153, len=108
3,732,583 >>> mbox cmd response data (12 bytes)
3,732,584 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,413 UART: [rt]cmd =0x4d454153, len=108
3,783,187 >>> mbox cmd response data (12 bytes)
3,783,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,327 UART: [rt]cmd =0x4d454153, len=108
3,833,807 >>> mbox cmd response data (12 bytes)
3,833,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,673 UART: [rt]cmd =0x4d454153, len=108
3,884,149 >>> mbox cmd response data (12 bytes)
3,884,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,135 UART: [rt]cmd =0x4d454153, len=108
3,934,587 >>> mbox cmd response data (12 bytes)
3,934,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,489 UART: [rt]cmd =0x4d454153, len=108
3,984,843 >>> mbox cmd response data (12 bytes)
3,984,844 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,815 UART: [rt]cmd =0x4d454153, len=108
4,035,137 >>> mbox cmd response data (12 bytes)
4,035,138 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,147 UART: [rt]cmd =0x4d454153, len=108
4,066,946 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,706 ready_for_fw is high
1,055,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,348 >>> mbox cmd response: success
2,686,080 UART:
2,686,096 UART: Running Caliptra FMC ...
2,686,504 UART:
2,686,558 UART: [state] CFI Enabled
2,697,385 UART: [fht] FMC Alias Private Key: 7
2,805,244 UART: [art] Extend RT PCRs Done
2,805,672 UART: [art] Lock RT PCRs Done
2,807,030 UART: [art] Populate DV Done
2,815,171 UART: [fht] FMC Alias Private Key: 7
2,816,125 UART: [art] Derive CDI
2,816,405 UART: [art] Store in in slot 0x4
2,902,168 UART: [art] Derive Key Pair
2,902,528 UART: [art] Store priv key in slot 0x5
2,915,956 UART: [art] Derive Key Pair - Done
2,930,772 UART: [art] Signing Cert with AUTHO
2,931,252 UART: RITY.KEYID = 7
2,946,184 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,949 UART: [art] PUB.X = 2453AFCFC8DC0B6F3D51CE920083C5438E33C27DC65D2995FC4FCA4C6A2810D13100AF68CB890ECA7636BE570F233E54
2,953,678 UART: [art] PUB.Y = 5CBA2A6FE24BA96DB395FB6A946A2A83B550D72FC4E3BC04E5F5E76EF742FE24BB97732F6A51939FF6E86ED99F2CF795
2,960,645 UART: [art] SIG.R = C1398D3B76F10DFD6E795861E518468DCF9C9C23841946CADA9F115B34BED65561A6D57E78C31A4ADF7ADB3384701230
2,967,418 UART: [art] SIG.S = 940687EF25DD4FBB69028BD3306A314EF4A7EA66B5DF28F097A353333F9F3642A9FA78B75006A1337D5FB06FA51F6135
2,991,328 UART: Caliptra RT
2,991,581 UART: [state] CFI Enabled
3,098,585 UART: [rt] RT listening for mailbox commands...
3,099,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,925 UART: [rt]cmd =0x4d454153, len=108
3,149,933 >>> mbox cmd response data (12 bytes)
3,149,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,303 UART: [rt]cmd =0x4d454153, len=108
3,200,797 >>> mbox cmd response data (12 bytes)
3,200,798 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,949 UART: [rt]cmd =0x4d454153, len=108
3,251,555 >>> mbox cmd response data (12 bytes)
3,251,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,507 UART: [rt]cmd =0x4d454153, len=108
3,302,143 >>> mbox cmd response data (12 bytes)
3,302,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,895 UART: [rt]cmd =0x4d454153, len=108
3,352,333 >>> mbox cmd response data (12 bytes)
3,352,334 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,263 UART: [rt]cmd =0x4d454153, len=108
3,403,517 >>> mbox cmd response data (12 bytes)
3,403,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,499 UART: [rt]cmd =0x4d454153, len=108
3,453,863 >>> mbox cmd response data (12 bytes)
3,453,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,943 UART: [rt]cmd =0x4d454153, len=108
3,504,335 >>> mbox cmd response data (12 bytes)
3,504,336 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,347 UART: [rt]cmd =0x4d454153, len=108
3,554,901 >>> mbox cmd response data (12 bytes)
3,554,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,015 UART: [rt]cmd =0x4d454153, len=108
3,605,885 >>> mbox cmd response data (12 bytes)
3,605,886 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,801 UART: [rt]cmd =0x4d454153, len=108
3,656,639 >>> mbox cmd response data (12 bytes)
3,656,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,649 UART: [rt]cmd =0x4d454153, len=108
3,707,483 >>> mbox cmd response data (12 bytes)
3,707,484 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,625 UART: [rt]cmd =0x4d454153, len=108
3,758,501 >>> mbox cmd response data (12 bytes)
3,758,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,361 UART: [rt]cmd =0x4d454153, len=108
3,808,923 >>> mbox cmd response data (12 bytes)
3,808,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,995 UART: [rt]cmd =0x4d454153, len=108
3,859,933 >>> mbox cmd response data (12 bytes)
3,859,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,169 UART: [rt]cmd =0x4d454153, len=108
3,892,000 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
904,965 UART: [kat] SHA2-512-ACC
906,866 UART: [kat] ECC-384
916,865 UART: [kat] HMAC-384Kdf
921,349 UART: [kat] LMS
1,169,661 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,171,052 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,175,028 ready_for_fw is high
1,175,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,726 UART: [idev] Erasing UDS.KEYID = 0
1,199,906 UART: [idev] Sha1 KeyId Algorithm
1,208,764 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,285 UART: [ldev] SUBJECT.KEYID = 5
1,210,712 UART: [ldev] AUTHORITY.KEYID = 7
1,211,175 UART: [ldev] FE.KEYID = 1
1,216,287 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,975 UART: [fwproc] Wait for Commands...
1,282,572 UART: [fwproc] Recv command 0x46574c44
1,283,305 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,522 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,831 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,843 >>> mbox cmd response: success
2,776,074 UART: [afmc] ++
2,776,242 UART: [afmc] CDI.KEYID = 6
2,776,605 UART: [afmc] SUBJECT.KEYID = 7
2,777,031 UART: [afmc] AUTHORITY.KEYID = 5
2,813,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,869 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,598 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,481 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,200 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,863 UART: [afmc] --
2,855,897 UART: [cold-reset] --
2,856,551 UART: [state] Locking Datavault
2,857,598 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,202 UART: [state] Locking ICCM
2,858,872 UART: [exit] Launching FMC @ 0x40000130
2,864,201 UART:
2,864,217 UART: Running Caliptra FMC ...
2,864,625 UART:
2,864,768 UART: [state] CFI Enabled
2,875,215 UART: [fht] FMC Alias Private Key: 7
2,983,310 UART: [art] Extend RT PCRs Done
2,983,738 UART: [art] Lock RT PCRs Done
2,985,588 UART: [art] Populate DV Done
2,993,937 UART: [fht] FMC Alias Private Key: 7
2,995,107 UART: [art] Derive CDI
2,995,387 UART: [art] Store in in slot 0x4
3,081,180 UART: [art] Derive Key Pair
3,081,540 UART: [art] Store priv key in slot 0x5
3,095,412 UART: [art] Derive Key Pair - Done
3,110,258 UART: [art] Signing Cert with AUTHO
3,110,738 UART: RITY.KEYID = 7
3,125,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,583 UART: [art] PUB.X = 424422B9C5980A0DA78B1C86442F5661A7B363A3D690AFEC63EFF9D2576DB8F39034CBE033362BE36CEB1579D9A8E769
3,133,353 UART: [art] PUB.Y = 8933A4608747A6175B228054C77DF0AA7891EE386A79C951E44685D45C783E082C47C2DBCEC88597742EAF7C38EC35C0
3,140,298 UART: [art] SIG.R = 3BCD28CA6A36310D1092C4C78A4576CF123CBA07B87CCE610142257A19C1A61949874683982E573A5E61B74E457B218F
3,147,055 UART: [art] SIG.S = 0172A2590C5B9E13C998F2D19A5C3A562153E2C568525A0F04AC43EAECAE781AB3A106E46A6653D956AA74794B182F0A
3,170,822 UART: Caliptra RT
3,171,167 UART: [state] CFI Enabled
3,279,020 UART: [rt] RT listening for mailbox commands...
3,279,690 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,324 UART: [rt]cmd =0x4d454153, len=108
3,330,940 >>> mbox cmd response data (12 bytes)
3,330,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,202 UART: [rt]cmd =0x4d454153, len=108
3,381,584 >>> mbox cmd response data (12 bytes)
3,381,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,676 UART: [rt]cmd =0x4d454153, len=108
3,432,312 >>> mbox cmd response data (12 bytes)
3,432,313 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,494 UART: [rt]cmd =0x4d454153, len=108
3,483,114 >>> mbox cmd response data (12 bytes)
3,483,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,296 UART: [rt]cmd =0x4d454153, len=108
3,533,190 >>> mbox cmd response data (12 bytes)
3,533,191 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,232 UART: [rt]cmd =0x4d454153, len=108
3,584,080 >>> mbox cmd response data (12 bytes)
3,584,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,232 UART: [rt]cmd =0x4d454153, len=108
3,635,048 >>> mbox cmd response data (12 bytes)
3,635,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,000 UART: [rt]cmd =0x4d454153, len=108
3,686,044 >>> mbox cmd response data (12 bytes)
3,686,045 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,240 UART: [rt]cmd =0x4d454153, len=108
3,736,532 >>> mbox cmd response data (12 bytes)
3,736,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,234 UART: [rt]cmd =0x4d454153, len=108
3,787,552 >>> mbox cmd response data (12 bytes)
3,787,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,510 UART: [rt]cmd =0x4d454153, len=108
3,838,004 >>> mbox cmd response data (12 bytes)
3,838,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,772 UART: [rt]cmd =0x4d454153, len=108
3,889,792 >>> mbox cmd response data (12 bytes)
3,889,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,628 UART: [rt]cmd =0x4d454153, len=108
3,940,450 >>> mbox cmd response data (12 bytes)
3,940,451 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,542 UART: [rt]cmd =0x4d454153, len=108
3,991,648 >>> mbox cmd response data (12 bytes)
3,991,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,696 UART: [rt]cmd =0x4d454153, len=108
4,042,674 >>> mbox cmd response data (12 bytes)
4,042,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,882 UART: [rt]cmd =0x4d454153, len=108
4,074,795 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,011 ready_for_fw is high
1,056,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,367 >>> mbox cmd response: success
2,687,013 UART:
2,687,029 UART: Running Caliptra FMC ...
2,687,437 UART:
2,687,580 UART: [state] CFI Enabled
2,698,361 UART: [fht] FMC Alias Private Key: 7
2,806,730 UART: [art] Extend RT PCRs Done
2,807,158 UART: [art] Lock RT PCRs Done
2,808,736 UART: [art] Populate DV Done
2,816,875 UART: [fht] FMC Alias Private Key: 7
2,817,933 UART: [art] Derive CDI
2,818,213 UART: [art] Store in in slot 0x4
2,904,064 UART: [art] Derive Key Pair
2,904,424 UART: [art] Store priv key in slot 0x5
2,917,314 UART: [art] Derive Key Pair - Done
2,931,893 UART: [art] Signing Cert with AUTHO
2,932,373 UART: RITY.KEYID = 7
2,947,923 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,688 UART: [art] PUB.X = D533CB7665D7E28302B6AF4391C9F138AE4C4C01F490BC2772CCFA92BC4D69A755F9FDF60C4EAE5872B44F9DBF422DF3
2,955,467 UART: [art] PUB.Y = D054AB7D96CEB8DAF1FBE25A8173B68F8FBBD0F7534DB2D4D2592C3DE0EC8BDD94C7D18E65237EA1FF43C53FFA0D33D5
2,962,444 UART: [art] SIG.R = F6DC8D91D3B1AB05994382814E71A2D88AE4E70C978968DEA060EB4CCD2A7907509902E0A168B7D04D0D19F827782787
2,969,199 UART: [art] SIG.S = D2865E17C75E216166FA79889BFBB84E4DE4F93063448C38047037350ABE4C7B6815E4788B18067ACC93B82E94DE347A
2,993,315 UART: Caliptra RT
2,993,660 UART: [state] CFI Enabled
3,101,046 UART: [rt] RT listening for mailbox commands...
3,101,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,402 UART: [rt]cmd =0x4d454153, len=108
3,153,168 >>> mbox cmd response data (12 bytes)
3,153,169 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,222 UART: [rt]cmd =0x4d454153, len=108
3,203,826 >>> mbox cmd response data (12 bytes)
3,203,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,956 UART: [rt]cmd =0x4d454153, len=108
3,253,858 >>> mbox cmd response data (12 bytes)
3,253,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,940 UART: [rt]cmd =0x4d454153, len=108
3,304,288 >>> mbox cmd response data (12 bytes)
3,304,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,378 UART: [rt]cmd =0x4d454153, len=108
3,354,904 >>> mbox cmd response data (12 bytes)
3,354,905 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,018 UART: [rt]cmd =0x4d454153, len=108
3,406,136 >>> mbox cmd response data (12 bytes)
3,406,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,308 UART: [rt]cmd =0x4d454153, len=108
3,456,474 >>> mbox cmd response data (12 bytes)
3,456,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,400 UART: [rt]cmd =0x4d454153, len=108
3,507,666 >>> mbox cmd response data (12 bytes)
3,507,667 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,836 UART: [rt]cmd =0x4d454153, len=108
3,558,964 >>> mbox cmd response data (12 bytes)
3,558,965 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,974 UART: [rt]cmd =0x4d454153, len=108
3,609,670 >>> mbox cmd response data (12 bytes)
3,609,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,798 UART: [rt]cmd =0x4d454153, len=108
3,661,316 >>> mbox cmd response data (12 bytes)
3,661,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,422 UART: [rt]cmd =0x4d454153, len=108
3,711,692 >>> mbox cmd response data (12 bytes)
3,711,693 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,974 UART: [rt]cmd =0x4d454153, len=108
3,763,056 >>> mbox cmd response data (12 bytes)
3,763,057 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,018 UART: [rt]cmd =0x4d454153, len=108
3,813,866 >>> mbox cmd response data (12 bytes)
3,813,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,108 UART: [rt]cmd =0x4d454153, len=108
3,864,382 >>> mbox cmd response data (12 bytes)
3,864,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,310 UART: [rt]cmd =0x4d454153, len=108
3,896,219 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,839 writing to cptra_bootfsm_go
2,291,054 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,435,312 UART:
2,435,710 UART: Running Caliptra ROM ...
2,436,791 UART:
2,436,944 UART: [state] CFI Enabled
2,437,905 UART: [state] LifecycleState = Unprovisioned
2,439,563 UART: [state] DebugLocked = No
2,440,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,444,136 UART: [kat] SHA2-256
2,444,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,447,831 UART: [kat] ++
2,448,292 UART: [kat] sha1
2,448,809 UART: [kat] SHA2-256
2,449,576 UART: [kat] SHA2-384
2,450,249 UART: [kat] SHA2-512-ACC
2,451,054 UART: [kat] ECC-384
2,766,742 UART: [kat] HMAC-384Kdf
2,798,130 UART: [kat] LMS
3,988,414 UART: [kat] --
3,993,064 UART: [cold-reset] ++
3,995,116 UART: [fht] Storing FHT @ 0x50003400
4,007,360 UART: [idev] ++
4,007,939 UART: [idev] CDI.KEYID = 6
4,008,870 UART: [idev] SUBJECT.KEYID = 7
4,010,093 UART: [idev] UDS.KEYID = 0
4,031,641 UART: [idev] Erasing UDS.KEYID = 0
7,347,490 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,935 UART: [idev] --
7,374,857 UART: [ldev] ++
7,375,448 UART: [ldev] CDI.KEYID = 6
7,376,336 UART: [ldev] SUBJECT.KEYID = 5
7,377,552 UART: [ldev] AUTHORITY.KEYID = 7
7,378,837 UART: [ldev] FE.KEYID = 1
7,419,422 UART: [ldev] Erasing FE.KEYID = 1
10,750,953 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,144 UART: [ldev] --
13,115,532 UART: [fwproc] Waiting for Commands...
13,117,798 UART: [fwproc] Received command 0x46574c44
13,119,990 UART: [fwproc] Received Image of size 114124 bytes
17,171,244 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,506 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,634,469 >>> mbox cmd response: success
17,638,520 UART: [afmc] ++
17,639,168 UART: [afmc] CDI.KEYID = 6
17,640,087 UART: [afmc] SUBJECT.KEYID = 7
17,641,313 UART: [afmc] AUTHORITY.KEYID = 5
21,001,651 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,192 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,305,446 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,859 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,334,691 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,349,119 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,354 UART: [afmc] --
23,373,411 UART: [cold-reset] --
23,377,651 UART: [state] Locking Datavault
23,382,520 UART: [state] Locking PCR0, PCR1 and PCR31
23,384,302 UART: [state] Locking ICCM
23,386,345 UART: [exit] Launching FMC @ 0x40000130
23,394,743 UART:
23,394,979 UART: Running Caliptra FMC ...
23,396,079 UART:
23,396,246 UART: [state] CFI Enabled
23,463,642 UART: [fht] FMC Alias Private Key: 7
25,802,236 UART: [art] Extend RT PCRs Done
25,803,585 UART: [art] Lock RT PCRs Done
25,804,860 UART: [art] Populate DV Done
25,810,166 UART: [fht] FMC Alias Private Key: 7
25,811,869 UART: [art] Derive CDI
25,812,687 UART: [art] Store in in slot 0x4
25,872,053 UART: [art] Derive Key Pair
25,873,057 UART: [art] Store priv key in slot 0x5
29,166,433 UART: [art] Derive Key Pair - Done
29,179,505 UART: [art] Signing Cert with AUTHO
29,180,816 UART: RITY.KEYID = 7
31,466,733 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,244 UART: [art] PUB.X = 662B2234044D97C5691E03F76940A400827F90BB8ED2FEB8DC3B17D32B6230D9AFB1B7CEADBA85D84E2200155B63BB79
31,475,496 UART: [art] PUB.Y = C2C1E2A1E70F1A3EE581BDC25D0DF26BA5A177C89F0C5730F89E1FA297E688C23F53482270A34D11D5E57C37153F7666
31,482,877 UART: [art] SIG.R = 9A181A7DA91E622D2B339F090E66542E3B3DB39D1BFE84B37CF04F6CB7226740C3E158151927426712629216C581AD0A
31,490,110 UART: [art] SIG.S = 3CDE1F5FA8E59DC1AA643D9DCF50761836E682DBDD507ED7F598ED376FE60F59EDE94F9DC3D1F5F5BD7C352DD0A8F8EC
32,794,865 UART: Caliptra RT
32,795,582 UART: [state] CFI Enabled
32,955,027 UART: [rt] RT listening for mailbox commands...
32,956,976 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,987,646 UART: [rt]cmd =0x44504543, len=92
32,993,943 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,292,259 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,873,774 >>> mbox cmd response: success
23,574,862 UART:
23,575,273 UART: Running Caliptra FMC ...
23,576,373 UART:
23,576,536 UART: [state] CFI Enabled
23,641,797 UART: [fht] FMC Alias Private Key: 7
25,979,747 UART: [art] Extend RT PCRs Done
25,981,021 UART: [art] Lock RT PCRs Done
25,982,799 UART: [art] Populate DV Done
25,988,449 UART: [fht] FMC Alias Private Key: 7
25,989,948 UART: [art] Derive CDI
25,990,688 UART: [art] Store in in slot 0x4
26,050,333 UART: [art] Derive Key Pair
26,051,382 UART: [art] Store priv key in slot 0x5
29,344,091 UART: [art] Derive Key Pair - Done
29,356,923 UART: [art] Signing Cert with AUTHO
29,358,241 UART: RITY.KEYID = 7
31,645,209 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,714 UART: [art] PUB.X = AD439FAE034B577BF8E44A9C76FC36B0F38A108DAAB8F9146733EE25D208EAEFC9EE0BFAC9A9F58B0CC9C62AD5585988
31,653,989 UART: [art] PUB.Y = C3653F428CE52A7E6E56BF175FAB7F00BD100DF9E4FE02C7D140854623D8A299A298ABA817AAF6AA948D8BF2B8A11220
31,661,268 UART: [art] SIG.R = 04BA2E9AB79E49117E74EF4C1998D4B214A1D106B0BE9D27BE0892308368B075A05B94A7D8BB122296AD7151A828548B
31,668,627 UART: [art] SIG.S = DA4344469891B5588398B7B59659B9D9297AF0268EC30A04D10F224C496B3266621087DB501C757B45CFBFDBE731307F
32,974,333 UART: Caliptra RT
32,975,044 UART: [state] CFI Enabled
33,136,260 UART: [rt] RT listening for mailbox commands...
33,138,192 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,168,642 UART: [rt]cmd =0x44504543, len=92
33,175,056 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,222,158 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,366,461 UART:
2,366,855 UART: Running Caliptra ROM ...
2,367,937 UART:
2,368,091 UART: [state] CFI Enabled
2,369,056 UART: [state] LifecycleState = Unprovisioned
2,371,056 UART: [state] DebugLocked = No
2,372,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,375,476 UART: [kat] SHA2-256
2,376,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,379,144 UART: [kat] ++
2,379,639 UART: [kat] sha1
2,380,146 UART: [kat] SHA2-256
2,380,902 UART: [kat] SHA2-384
2,381,565 UART: [kat] SHA2-512-ACC
2,382,439 UART: [kat] ECC-384
3,114,051 UART: [kat] HMAC-384Kdf
3,127,165 UART: [kat] LMS
4,317,239 UART: [kat] --
4,323,335 UART: [cold-reset] ++
4,325,480 UART: [fht] Storing FHT @ 0x50003400
4,336,253 UART: [idev] ++
4,336,814 UART: [idev] CDI.KEYID = 6
4,337,776 UART: [idev] SUBJECT.KEYID = 7
4,339,041 UART: [idev] UDS.KEYID = 0
4,356,664 UART: [idev] Erasing UDS.KEYID = 0
7,628,276 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,458 UART: [idev] --
7,655,885 UART: [ldev] ++
7,656,478 UART: [ldev] CDI.KEYID = 6
7,657,361 UART: [ldev] SUBJECT.KEYID = 5
7,658,629 UART: [ldev] AUTHORITY.KEYID = 7
7,659,857 UART: [ldev] FE.KEYID = 1
7,670,911 UART: [ldev] Erasing FE.KEYID = 1
10,958,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,977 UART: [ldev] --
13,317,534 UART: [fwproc] Waiting for Commands...
13,319,900 UART: [fwproc] Received command 0x46574c44
13,322,134 UART: [fwproc] Received Image of size 114124 bytes
17,372,190 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,378 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,268 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,843,182 >>> mbox cmd response: success
17,847,190 UART: [afmc] ++
17,847,777 UART: [afmc] CDI.KEYID = 6
17,848,793 UART: [afmc] SUBJECT.KEYID = 7
17,849,951 UART: [afmc] AUTHORITY.KEYID = 5
21,165,034 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,545 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,810 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,171 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,031 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,492 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,926 UART: [afmc] --
23,530,272 UART: [cold-reset] --
23,532,562 UART: [state] Locking Datavault
23,537,428 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,151 UART: [state] Locking ICCM
23,540,436 UART: [exit] Launching FMC @ 0x40000130
23,548,834 UART:
23,549,067 UART: Running Caliptra FMC ...
23,550,166 UART:
23,550,325 UART: [state] CFI Enabled
23,558,472 UART: [fht] FMC Alias Private Key: 7
25,889,568 UART: [art] Extend RT PCRs Done
25,890,912 UART: [art] Lock RT PCRs Done
25,892,371 UART: [art] Populate DV Done
25,897,784 UART: [fht] FMC Alias Private Key: 7
25,899,268 UART: [art] Derive CDI
25,900,024 UART: [art] Store in in slot 0x4
25,942,399 UART: [art] Derive Key Pair
25,943,397 UART: [art] Store priv key in slot 0x5
29,185,576 UART: [art] Derive Key Pair - Done
29,198,385 UART: [art] Signing Cert with AUTHO
29,199,701 UART: RITY.KEYID = 7
31,479,380 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,888 UART: [art] PUB.X = 1699AFC8ED06517ED69B1B9204B2B12643EB6549A86850188DF93BA35BD05AB8FD86E8BD4841D48C5C45A83370DFFC92
31,488,106 UART: [art] PUB.Y = 6D33F9B87CECF41104BE74F3A63DDE709CDD01E29164480484FB6A032662A4F7B6E3CDF70294C8F6898AC7AFBB8D0234
31,495,352 UART: [art] SIG.R = 52C5536F28E48C3502B71372E49B632F48D277C1D78A006ECEE156F1303F0655D8B344FEAF4924D1EC00FA8E20DD19CF
31,502,740 UART: [art] SIG.S = 7AC4A063983DD9FA22909283FDCBB8E1086E6B19477EDF2068CE250A6E49A58EA7EEE69BB46098D56EC3044EF6884BEE
32,807,447 UART: Caliptra RT
32,808,167 UART: [state] CFI Enabled
32,925,934 UART: [rt] RT listening for mailbox commands...
32,927,862 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,958,550 UART: [rt]cmd =0x44504543, len=92
32,965,092 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
2,223,568 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,040 >>> mbox cmd response: success
23,712,663 UART:
23,713,064 UART: Running Caliptra FMC ...
23,714,381 UART:
23,714,551 UART: [state] CFI Enabled
23,721,718 UART: [fht] FMC Alias Private Key: 7
26,052,695 UART: [art] Extend RT PCRs Done
26,053,927 UART: [art] Lock RT PCRs Done
26,055,691 UART: [art] Populate DV Done
26,061,105 UART: [fht] FMC Alias Private Key: 7
26,062,703 UART: [art] Derive CDI
26,063,435 UART: [art] Store in in slot 0x4
26,106,088 UART: [art] Derive Key Pair
26,107,131 UART: [art] Store priv key in slot 0x5
29,348,605 UART: [art] Derive Key Pair - Done
29,361,667 UART: [art] Signing Cert with AUTHO
29,362,977 UART: RITY.KEYID = 7
31,642,297 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,813 UART: [art] PUB.X = 00B8BF0AD992FF2D079AC630579B0D156D06B0C289FFAC86B799EA410ED55B90CEC274070A5EB30FFFF172B8A4BE0678
31,651,073 UART: [art] PUB.Y = D8E73FE4548B3EA3CFD4404646ECE708B80CB5BACBC1ED4562E86EE7FD3A3C2B24C6F148F97B8AFF430FBC75A7FE45CB
31,658,371 UART: [art] SIG.R = D792526A8BF6E3AF820797281B758F88C10533659AC53EB3E9F8FF67FDB74720254E479AAFC4667F7B76391580201EE9
31,665,770 UART: [art] SIG.S = ED0CAC29ECD7F732C1F164073B7AE795DEDDE24A2F80572D73FFC3A8A3A637EFA09D0E449B5E1B4E3E53589A0A0D5850
32,971,338 UART: Caliptra RT
32,972,041 UART: [state] CFI Enabled
33,090,368 UART: [rt] RT listening for mailbox commands...
33,092,308 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,123,028 UART: [rt]cmd =0x44504543, len=92
33,129,597 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,214,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,359,469 UART:
2,359,872 UART: Running Caliptra ROM ...
2,360,949 UART:
2,361,102 UART: [state] CFI Enabled
2,362,068 UART: [state] LifecycleState = Unprovisioned
2,363,729 UART: [state] DebugLocked = No
2,364,759 UART: [state] WD Timer not started. Device not locked for debugging
2,367,221 UART: [kat] SHA2-256
2,367,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,370,885 UART: [kat] ++
2,371,357 UART: [kat] sha1
2,371,874 UART: [kat] SHA2-256
2,372,532 UART: [kat] SHA2-384
2,373,189 UART: [kat] SHA2-512-ACC
2,373,992 UART: [kat] ECC-384
2,949,156 UART: [kat] HMAC-384Kdf
2,972,220 UART: [kat] LMS
3,501,636 UART: [kat] --
3,505,888 UART: [cold-reset] ++
3,507,384 UART: [fht] FHT @ 0x50003400
3,518,472 UART: [idev] ++
3,519,081 UART: [idev] CDI.KEYID = 6
3,519,970 UART: [idev] SUBJECT.KEYID = 7
3,521,184 UART: [idev] UDS.KEYID = 0
3,544,479 UART: [idev] Erasing UDS.KEYID = 0
6,026,735 UART: [idev] Sha1 KeyId Algorithm
6,050,374 UART: [idev] --
6,054,209 UART: [ldev] ++
6,054,777 UART: [ldev] CDI.KEYID = 6
6,055,662 UART: [ldev] SUBJECT.KEYID = 5
6,056,881 UART: [ldev] AUTHORITY.KEYID = 7
6,058,123 UART: [ldev] FE.KEYID = 1
6,100,454 UART: [ldev] Erasing FE.KEYID = 1
8,602,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,521 UART: [ldev] --
10,413,686 UART: [fwproc] Wait for Commands...
10,416,655 UART: [fwproc] Recv command 0x46574c44
10,418,747 UART: [fwproc] Recv'd Img size: 114448 bytes
13,828,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,287,015 >>> mbox cmd response: success
14,291,297 UART: [afmc] ++
14,291,912 UART: [afmc] CDI.KEYID = 6
14,292,804 UART: [afmc] SUBJECT.KEYID = 7
14,293,920 UART: [afmc] AUTHORITY.KEYID = 5
16,827,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,401 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,275 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,928 UART: [afmc] --
18,631,184 UART: [cold-reset] --
18,635,436 UART: [state] Locking Datavault
18,642,258 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,900 UART: [state] Locking ICCM
18,644,893 UART: [exit] Launching FMC @ 0x40000130
18,653,287 UART:
18,653,527 UART: Running Caliptra FMC ...
18,654,628 UART:
18,654,784 UART: [state] CFI Enabled
18,712,654 UART: [fht] FMC Alias Private Key: 7
20,476,764 UART: [art] Extend RT PCRs Done
20,477,983 UART: [art] Lock RT PCRs Done
20,479,795 UART: [art] Populate DV Done
20,485,095 UART: [fht] FMC Alias Private Key: 7
20,486,685 UART: [art] Derive CDI
20,487,434 UART: [art] Store in in slot 0x4
20,545,229 UART: [art] Derive Key Pair
20,546,248 UART: [art] Store priv key in slot 0x5
23,009,360 UART: [art] Derive Key Pair - Done
23,022,137 UART: [art] Signing Cert with AUTHO
23,023,445 UART: RITY.KEYID = 7
24,735,244 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,751 UART: [art] PUB.X = 4B826388CFB9D5BF8C9F213F26D7313A2F3EAD6C8D0E9489B989E738886356378C6E5089FD963E3124E877E9F17E7355
24,743,955 UART: [art] PUB.Y = B9252237E06AC8A89F50AE190046EDA54555DB04328BCC7A8EACF9D1DBD4B9906434D96EF1E37A1CE7C6114B56CCF826
24,751,250 UART: [art] SIG.R = 7E1F33E6EA5038103B80FBE9D8CED02653790F510F194837439E226192F6734F629B8D9C864D4E94EDB78267EEE801EA
24,758,601 UART: [art] SIG.S = 57ACFE684871960ED9D2E2EB2787CC75E7A818733C60F31AA2628A6CEDE313349AD2D7444DD32AAF3114726708F7A675
25,736,895 UART: Caliptra RT
25,737,585 UART: [state] CFI Enabled
25,903,331 UART: [rt] RT listening for mailbox commands...
25,905,261 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,935,649 UART: [rt]cmd =0x44504543, len=92
25,942,029 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
2,213,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,091,597 >>> mbox cmd response: success
18,388,571 UART:
18,389,088 UART: Running Caliptra FMC ...
18,390,199 UART:
18,390,358 UART: [state] CFI Enabled
18,455,999 UART: [fht] FMC Alias Private Key: 7
20,219,625 UART: [art] Extend RT PCRs Done
20,220,848 UART: [art] Lock RT PCRs Done
20,222,423 UART: [art] Populate DV Done
20,227,943 UART: [fht] FMC Alias Private Key: 7
20,229,485 UART: [art] Derive CDI
20,230,301 UART: [art] Store in in slot 0x4
20,288,765 UART: [art] Derive Key Pair
20,289,800 UART: [art] Store priv key in slot 0x5
22,752,945 UART: [art] Derive Key Pair - Done
22,765,723 UART: [art] Signing Cert with AUTHO
22,767,053 UART: RITY.KEYID = 7
24,479,182 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,684 UART: [art] PUB.X = 78EBF4F9856572333E00CDE5135D08273C71E57F9700B43AFF6F76F207986F71517626CD03787823B7A258C658A99E5B
24,487,879 UART: [art] PUB.Y = B411C416E59C152B1E5817E3AA397EDC78FF0D71CE74477F0ED5FD170E4F484F961B612A5EE1B78C0CE5124D137BD222
24,495,161 UART: [art] SIG.R = 543E2387482B84038AD6F2AD2FB1ECF91EBF0802EA58AAE1FD4C6A38F7F636A97958198C02A2FE3DE2058A84B70432FB
24,502,578 UART: [art] SIG.S = ADA2B65FB0BA77716DF267FBDDC753DF0B12348DFF885EB5AFA780E5EFA85FF8F9E64014D297A922854058AD473BC86D
25,481,426 UART: Caliptra RT
25,482,135 UART: [state] CFI Enabled
25,648,547 UART: [rt] RT listening for mailbox commands...
25,650,492 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,681,248 UART: [rt]cmd =0x44504543, len=92
25,687,929 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,538 writing to cptra_bootfsm_go
2,219,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,364,728 UART:
2,365,166 UART: Running Caliptra ROM ...
2,366,243 UART:
2,366,390 UART: [state] CFI Enabled
2,367,354 UART: [state] LifecycleState = Unprovisioned
2,369,004 UART: [state] DebugLocked = No
2,370,028 UART: [state] WD Timer not started. Device not locked for debugging
2,372,499 UART: [kat] SHA2-256
2,373,159 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,376,163 UART: [kat] ++
2,376,606 UART: [kat] sha1
2,377,110 UART: [kat] SHA2-256
2,377,757 UART: [kat] SHA2-384
2,378,406 UART: [kat] SHA2-512-ACC
2,379,195 UART: [kat] ECC-384
3,280,471 UART: [kat] HMAC-384Kdf
3,292,599 UART: [kat] LMS
3,822,068 UART: [kat] --
3,826,931 UART: [cold-reset] ++
3,828,746 UART: [fht] FHT @ 0x50003400
3,838,586 UART: [idev] ++
3,839,141 UART: [idev] CDI.KEYID = 6
3,840,104 UART: [idev] SUBJECT.KEYID = 7
3,841,251 UART: [idev] UDS.KEYID = 0
3,858,624 UART: [idev] Erasing UDS.KEYID = 0
6,314,489 UART: [idev] Sha1 KeyId Algorithm
6,337,285 UART: [idev] --
6,341,149 UART: [ldev] ++
6,341,719 UART: [ldev] CDI.KEYID = 6
6,342,623 UART: [ldev] SUBJECT.KEYID = 5
6,343,773 UART: [ldev] AUTHORITY.KEYID = 7
6,345,054 UART: [ldev] FE.KEYID = 1
6,354,450 UART: [ldev] Erasing FE.KEYID = 1
8,826,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,931 UART: [ldev] --
10,615,459 UART: [fwproc] Wait for Commands...
10,618,313 UART: [fwproc] Recv command 0x46574c44
10,620,400 UART: [fwproc] Recv'd Img size: 114448 bytes
14,020,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,387 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,479,393 >>> mbox cmd response: success
14,483,322 UART: [afmc] ++
14,483,899 UART: [afmc] CDI.KEYID = 6
14,484,809 UART: [afmc] SUBJECT.KEYID = 7
14,486,038 UART: [afmc] AUTHORITY.KEYID = 5
16,985,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,123 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,723,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,739,952 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,785 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,665 UART: [afmc] --
18,783,569 UART: [cold-reset] --
18,786,612 UART: [state] Locking Datavault
18,789,742 UART: [state] Locking PCR0, PCR1 and PCR31
18,791,384 UART: [state] Locking ICCM
18,792,803 UART: [exit] Launching FMC @ 0x40000130
18,801,248 UART:
18,801,472 UART: Running Caliptra FMC ...
18,802,486 UART:
18,802,647 UART: [state] CFI Enabled
18,810,853 UART: [fht] FMC Alias Private Key: 7
20,567,807 UART: [art] Extend RT PCRs Done
20,569,247 UART: [art] Lock RT PCRs Done
20,570,696 UART: [art] Populate DV Done
20,576,220 UART: [fht] FMC Alias Private Key: 7
20,577,920 UART: [art] Derive CDI
20,578,740 UART: [art] Store in in slot 0x4
20,621,113 UART: [art] Derive Key Pair
20,622,102 UART: [art] Store priv key in slot 0x5
23,049,205 UART: [art] Derive Key Pair - Done
23,062,144 UART: [art] Signing Cert with AUTHO
23,063,475 UART: RITY.KEYID = 7
24,768,892 UART: [art] Erasing AUTHORITY.KEYID = 7
24,770,402 UART: [art] PUB.X = 2386F8C25E69A7EE514801A87A3970B187049B5B06CD8DC5413B059516675E827E746AE31FB9C13197061C92E17CB528
24,777,695 UART: [art] PUB.Y = B050AFDE53DE3AAA369274A3C4BED73D8F133202BA37DD22B61A25D09685082ECE075029D4243D32D13870A99456E297
24,784,923 UART: [art] SIG.R = A32723F173D9424E07C1BC05565576065B429028302ABF7D9E1FC62A15ACD2CDB00E0EC23CFB3334326983AADC3634BF
24,792,307 UART: [art] SIG.S = 975AD626F7F47B13103A21EB3C0032F624D7E25E3EEFB6985E8D6A12D62877542D4DBD87E074A560B17152CBDA9F115C
25,771,295 UART: Caliptra RT
25,771,979 UART: [state] CFI Enabled
25,889,908 UART: [rt] RT listening for mailbox commands...
25,891,857 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,922,190 UART: [rt]cmd =0x44504543, len=92
25,928,650 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,217,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,653 >>> mbox cmd response: success
18,518,392 UART:
18,518,790 UART: Running Caliptra FMC ...
18,519,915 UART:
18,520,071 UART: [state] CFI Enabled
18,528,353 UART: [fht] FMC Alias Private Key: 7
20,284,968 UART: [art] Extend RT PCRs Done
20,286,194 UART: [art] Lock RT PCRs Done
20,287,708 UART: [art] Populate DV Done
20,293,340 UART: [fht] FMC Alias Private Key: 7
20,294,932 UART: [art] Derive CDI
20,295,745 UART: [art] Store in in slot 0x4
20,338,160 UART: [art] Derive Key Pair
20,339,192 UART: [art] Store priv key in slot 0x5
22,766,106 UART: [art] Derive Key Pair - Done
22,779,154 UART: [art] Signing Cert with AUTHO
22,780,471 UART: RITY.KEYID = 7
24,485,677 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,176 UART: [art] PUB.X = B88C1535B52B417B08884E0FE61E3A79975A047599B05AE46C5DAFDFD8252AEA1DEB189C9A50BF83334A062D062EB843
24,494,462 UART: [art] PUB.Y = E9C8DEB63FC6862DDDBA0895CDF28E3CE2585DDA83917AE891CA7B4D25C4BDEBCF9EDC95C3A3B823C896B8B2A5C5663B
24,501,773 UART: [art] SIG.R = EB95558807BC0843B97DA0354C71E042585B6D0BC9D708C3C37FAE31EDFA4EE77B75840A1652CC8F01E9789E33F1D721
24,509,131 UART: [art] SIG.S = A153EF0977E6E9874409791098AEF73FE00FA9442DA63031FDE818A90FF173CFD485D0F7CCAFAC1C63C246F38E301AF1
25,487,903 UART: Caliptra RT
25,488,602 UART: [state] CFI Enabled
25,605,877 UART: [rt] RT listening for mailbox commands...
25,607,793 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,638,445 UART: [rt]cmd =0x44504543, len=92
25,644,961 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
2,239,311 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,729,285 >>> mbox cmd response: success
19,006,847 UART:
19,007,252 UART: Running Caliptra FMC ...
19,008,359 UART:
19,008,538 UART: [state] CFI Enabled
19,076,933 UART: [fht] FMC Alias Private Key: 7
20,840,586 UART: [art] Extend RT PCRs Done
20,841,811 UART: [art] Lock RT PCRs Done
20,843,627 UART: [art] Populate DV Done
20,849,421 UART: [fht] FMC Alias Private Key: 7
20,851,022 UART: [art] Derive CDI
20,851,765 UART: [art] Store in in slot 0x4
20,909,419 UART: [art] Derive Key Pair
20,910,463 UART: [art] Store priv key in slot 0x5
23,373,618 UART: [art] Derive Key Pair - Done
23,386,668 UART: [art] Signing Cert with AUTHO
23,387,972 UART: RITY.KEYID = 7
25,099,280 UART: [art] Erasing AUTHORITY.KEYID = 7
25,100,780 UART: [art] PUB.X = A01F549EE8655A1A80E6BA980BBF0DDF0E4803F290972A670DCC7EAFCAEB0002E63384302CC445EF4EBE5EB138BC2FB7
25,108,027 UART: [art] PUB.Y = 55AF4BB2652443C45788F59C3AEEF19A3B22978C96E87FE2E1AD876D18AF8999C2BA9C93EADF01980020E655BB0D4EBC
25,115,295 UART: [art] SIG.R = 6DBEC371E1EEDE9ACCF5AE6B1AB0555D9087799C7A09675D2E24895743086A0A2B9BF7F8451C3BBE1CA2BD50500BE322
25,122,687 UART: [art] SIG.S = 3A6075E5AE56CB1736E99EA43C02AD8B7F866222295CC2A3F0EB7378353797227D9AA9828BAD32BF6B6EBC27F59EFE2F
26,101,546 UART: Caliptra RT
26,102,255 UART: [state] CFI Enabled
26,268,134 UART: [rt] RT listening for mailbox commands...
26,270,072 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,300,746 UART: [rt]cmd =0x44504543, len=92
26,307,048 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,225,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,970,651 >>> mbox cmd response: success
19,223,769 UART:
19,224,160 UART: Running Caliptra FMC ...
19,225,364 UART:
19,225,530 UART: [state] CFI Enabled
19,233,145 UART: [fht] FMC Alias Private Key: 7
20,989,791 UART: [art] Extend RT PCRs Done
20,991,019 UART: [art] Lock RT PCRs Done
20,992,592 UART: [art] Populate DV Done
20,998,099 UART: [fht] FMC Alias Private Key: 7
20,999,582 UART: [art] Derive CDI
21,000,339 UART: [art] Store in in slot 0x4
21,042,881 UART: [art] Derive Key Pair
21,043,924 UART: [art] Store priv key in slot 0x5
23,470,510 UART: [art] Derive Key Pair - Done
23,483,285 UART: [art] Signing Cert with AUTHO
23,484,583 UART: RITY.KEYID = 7
25,190,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,887 UART: [art] PUB.X = 3D7D2561A1226D3CE4430BC5186538E0F467F6411B97BACC22B586A2C443BCC1CBB16DABE16DECA8FBE584A4BAF301F9
25,199,021 UART: [art] PUB.Y = 279F64BA03349B54E00A651FF68D46C2AB505FB999E8E3CE1F901E5973E4AD48BB0D11F9FEBF0723D5C4370A33154FD0
25,206,269 UART: [art] SIG.R = 1EFA80BF23C59A1574CB44DFDBF5F52DEE7889C8026F1C5B06C10CE99006AC7C3041BDAF66104D1A736337B17521021A
25,213,650 UART: [art] SIG.S = 3122DCF02574F8B781A54807473FCF11B9C162684241B2FCA72C9B65170C8BFAADA22607EF45E0E3A292583943CB43D9
26,193,124 UART: Caliptra RT
26,193,836 UART: [state] CFI Enabled
26,310,444 UART: [rt] RT listening for mailbox commands...
26,312,503 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,343,110 UART: [rt]cmd =0x44504543, len=92
26,349,299 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,721 UART: [kat] SHA2-256
881,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,767 UART: [kat] ++
885,919 UART: [kat] sha1
890,085 UART: [kat] SHA2-256
892,023 UART: [kat] SHA2-384
894,752 UART: [kat] SHA2-512-ACC
896,653 UART: [kat] ECC-384
902,040 UART: [kat] HMAC-384Kdf
906,532 UART: [kat] LMS
1,474,728 UART: [kat] --
1,475,755 UART: [cold-reset] ++
1,476,159 UART: [fht] Storing FHT @ 0x50003400
1,478,848 UART: [idev] ++
1,479,016 UART: [idev] CDI.KEYID = 6
1,479,376 UART: [idev] SUBJECT.KEYID = 7
1,479,800 UART: [idev] UDS.KEYID = 0
1,487,982 UART: [idev] Erasing UDS.KEYID = 0
1,504,932 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,700 UART: [idev] --
1,514,933 UART: [ldev] ++
1,515,101 UART: [ldev] CDI.KEYID = 6
1,515,464 UART: [ldev] SUBJECT.KEYID = 5
1,515,890 UART: [ldev] AUTHORITY.KEYID = 7
1,516,353 UART: [ldev] FE.KEYID = 1
1,521,541 UART: [ldev] Erasing FE.KEYID = 1
1,546,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,836 UART: [ldev] --
1,586,325 UART: [fwproc] Waiting for Commands...
1,586,980 UART: [fwproc] Received command 0x46574c44
1,587,771 UART: [fwproc] Received Image of size 114448 bytes
2,886,894 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,966 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,318 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,249 >>> mbox cmd response: success
3,080,405 UART: [afmc] ++
3,080,573 UART: [afmc] CDI.KEYID = 6
3,080,935 UART: [afmc] SUBJECT.KEYID = 7
3,081,360 UART: [afmc] AUTHORITY.KEYID = 5
3,115,965 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,235 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,015 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,743 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,628 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,318 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,275 UART: [afmc] --
3,159,363 UART: [cold-reset] --
3,160,023 UART: [state] Locking Datavault
3,161,272 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,876 UART: [state] Locking ICCM
3,162,382 UART: [exit] Launching FMC @ 0x40000130
3,167,711 UART:
3,167,727 UART: Running Caliptra FMC ...
3,168,135 UART:
3,168,189 UART: [state] CFI Enabled
3,178,448 UART: [fht] FMC Alias Private Key: 7
3,286,619 UART: [art] Extend RT PCRs Done
3,287,047 UART: [art] Lock RT PCRs Done
3,288,413 UART: [art] Populate DV Done
3,296,676 UART: [fht] FMC Alias Private Key: 7
3,297,634 UART: [art] Derive CDI
3,297,914 UART: [art] Store in in slot 0x4
3,383,531 UART: [art] Derive Key Pair
3,383,891 UART: [art] Store priv key in slot 0x5
3,397,251 UART: [art] Derive Key Pair - Done
3,412,322 UART: [art] Signing Cert with AUTHO
3,412,802 UART: RITY.KEYID = 7
3,427,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,311 UART: [art] PUB.X = CE7B431BCCC153476AB0AD33CD1A1EEDE781610D3E9A5DDF58EA43A049CCF787A0B527908AF866F3B9042B835BBD8D3C
3,435,097 UART: [art] PUB.Y = C0A65B0E60D0D58A63396A776F9767D0C358AD3263670D4B13CA8424380A9A402DA57B1F5E67508B36A65B7F3F969AF8
3,442,038 UART: [art] SIG.R = AA8F5ECDB35D3186DC504AF52DEADFDF8FDCB084F65A979B369F1A91AA30DF0888CFDAD767A0222B1CBA4E063301DB96
3,448,827 UART: [art] SIG.S = 31553C848D81F286E72FD8EC80AEFA3C7C5138BFA9D903A2097121C177E44BD98027D864A5F7B5A280FEE721E1BE3B23
3,472,578 UART: Caliptra RT
3,472,831 UART: [state] CFI Enabled
3,579,662 UART: [rt] RT listening for mailbox commands...
3,580,332 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,834 UART: [rt]cmd =0x44504543, len=92
3,618,223 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,053 >>> mbox cmd response: success
2,989,539 UART:
2,989,555 UART: Running Caliptra FMC ...
2,989,963 UART:
2,990,017 UART: [state] CFI Enabled
3,000,606 UART: [fht] FMC Alias Private Key: 7
3,109,097 UART: [art] Extend RT PCRs Done
3,109,525 UART: [art] Lock RT PCRs Done
3,111,215 UART: [art] Populate DV Done
3,119,388 UART: [fht] FMC Alias Private Key: 7
3,120,524 UART: [art] Derive CDI
3,120,804 UART: [art] Store in in slot 0x4
3,206,635 UART: [art] Derive Key Pair
3,206,995 UART: [art] Store priv key in slot 0x5
3,220,213 UART: [art] Derive Key Pair - Done
3,235,234 UART: [art] Signing Cert with AUTHO
3,235,714 UART: RITY.KEYID = 7
3,250,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,499 UART: [art] PUB.X = AE232E84A57A86C43C1F2C3967108A9A90AC9B895CE3C415B93B90D034CA935F14A2758E501AA1288D6DE90EAD9E8CBB
3,258,278 UART: [art] PUB.Y = F39C7E6051A1A7639BAFDB32DE5D5624E94B078460DAA90CA9BB2B504E0750EB7D37FC50E517DFD24FB0448D14655DE4
3,265,233 UART: [art] SIG.R = A70EE0601AF6F97C524E02EBA30AF0C16DDF64F3D013FF72E85AD5738904CF674E48968CC7736D49992972F254AE85F4
3,271,997 UART: [art] SIG.S = 839E49CD49EEC5B18AFB918FDA8E187D370B69D0C970CB3C637B903FC614FFF4E7FBEBFD024FA59227C49B4D5B4518CD
3,295,768 UART: Caliptra RT
3,296,021 UART: [state] CFI Enabled
3,404,007 UART: [rt] RT listening for mailbox commands...
3,404,677 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,083 UART: [rt]cmd =0x44504543, len=92
3,442,222 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,100 UART: [kat] SHA2-256
882,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,146 UART: [kat] ++
886,298 UART: [kat] sha1
890,494 UART: [kat] SHA2-256
892,432 UART: [kat] SHA2-384
895,099 UART: [kat] SHA2-512-ACC
897,000 UART: [kat] ECC-384
902,243 UART: [kat] HMAC-384Kdf
906,785 UART: [kat] LMS
1,474,981 UART: [kat] --
1,476,192 UART: [cold-reset] ++
1,476,606 UART: [fht] Storing FHT @ 0x50003400
1,479,277 UART: [idev] ++
1,479,445 UART: [idev] CDI.KEYID = 6
1,479,805 UART: [idev] SUBJECT.KEYID = 7
1,480,229 UART: [idev] UDS.KEYID = 0
1,488,163 UART: [idev] Erasing UDS.KEYID = 0
1,504,173 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,963 UART: [idev] --
1,514,190 UART: [ldev] ++
1,514,358 UART: [ldev] CDI.KEYID = 6
1,514,721 UART: [ldev] SUBJECT.KEYID = 5
1,515,147 UART: [ldev] AUTHORITY.KEYID = 7
1,515,610 UART: [ldev] FE.KEYID = 1
1,521,202 UART: [ldev] Erasing FE.KEYID = 1
1,547,127 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,797 UART: [ldev] --
1,587,158 UART: [fwproc] Waiting for Commands...
1,587,883 UART: [fwproc] Received command 0x46574c44
1,588,674 UART: [fwproc] Received Image of size 114448 bytes
2,889,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,587 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,939 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,902 >>> mbox cmd response: success
3,083,936 UART: [afmc] ++
3,084,104 UART: [afmc] CDI.KEYID = 6
3,084,466 UART: [afmc] SUBJECT.KEYID = 7
3,084,891 UART: [afmc] AUTHORITY.KEYID = 5
3,120,412 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,137,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,143,064 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,949 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,639 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,550 UART: [afmc] --
3,163,510 UART: [cold-reset] --
3,164,438 UART: [state] Locking Datavault
3,165,539 UART: [state] Locking PCR0, PCR1 and PCR31
3,166,143 UART: [state] Locking ICCM
3,166,569 UART: [exit] Launching FMC @ 0x40000130
3,171,898 UART:
3,171,914 UART: Running Caliptra FMC ...
3,172,322 UART:
3,172,465 UART: [state] CFI Enabled
3,183,376 UART: [fht] FMC Alias Private Key: 7
3,291,369 UART: [art] Extend RT PCRs Done
3,291,797 UART: [art] Lock RT PCRs Done
3,293,139 UART: [art] Populate DV Done
3,301,300 UART: [fht] FMC Alias Private Key: 7
3,302,410 UART: [art] Derive CDI
3,302,690 UART: [art] Store in in slot 0x4
3,388,487 UART: [art] Derive Key Pair
3,388,847 UART: [art] Store priv key in slot 0x5
3,402,365 UART: [art] Derive Key Pair - Done
3,416,821 UART: [art] Signing Cert with AUTHO
3,417,301 UART: RITY.KEYID = 7
3,432,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,294 UART: [art] PUB.X = DC4381016A90296F4890A2ACC13B1FA6AD99ED618EBD745FD4F0677A0556EE10AE8B340A77639B34D90152C66AEDA36A
3,440,062 UART: [art] PUB.Y = 8C94D833882C2887A32C42AB26765085F8697DB8FE737A0106A17B12769D8BEFC93BC02FA0FA913176A44121D12C16F1
3,447,004 UART: [art] SIG.R = 95CA6BD9B23F116C7AEAE3BF06CDBE2BFEC499649174C937CB55F35A0AD3FF144CF15BA14AC5AB5A41C764B281A23B7C
3,453,794 UART: [art] SIG.S = 9023E668DD54840392353BEE5381D3ED7765E2C49081FA44CA48FE3015C45F75FE71CE24EE70BA2DA611F5CFAD8A649E
3,477,278 UART: Caliptra RT
3,477,623 UART: [state] CFI Enabled
3,585,749 UART: [rt] RT listening for mailbox commands...
3,586,419 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,923 UART: [rt]cmd =0x44504543, len=92
3,624,206 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,192 >>> mbox cmd response: success
2,991,134 UART:
2,991,150 UART: Running Caliptra FMC ...
2,991,558 UART:
2,991,701 UART: [state] CFI Enabled
3,002,080 UART: [fht] FMC Alias Private Key: 7
3,109,793 UART: [art] Extend RT PCRs Done
3,110,221 UART: [art] Lock RT PCRs Done
3,111,639 UART: [art] Populate DV Done
3,119,706 UART: [fht] FMC Alias Private Key: 7
3,120,846 UART: [art] Derive CDI
3,121,126 UART: [art] Store in in slot 0x4
3,206,891 UART: [art] Derive Key Pair
3,207,251 UART: [art] Store priv key in slot 0x5
3,221,029 UART: [art] Derive Key Pair - Done
3,235,650 UART: [art] Signing Cert with AUTHO
3,236,130 UART: RITY.KEYID = 7
3,251,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,033 UART: [art] PUB.X = 290B3F1094C1F14744E93C4C063F42627EE51140E30BC5FBD8B27CF74B0362C66B09A817C7DA16D7B6CCE27F81C8C000
3,258,772 UART: [art] PUB.Y = A822142FE6EC5D43F6080BEA5ACC259B87FE75C97AF56546F5757B8B314569EC3703B340171E2FF3F730DD6768CA4191
3,265,717 UART: [art] SIG.R = EC6630C786097DA09BCEEC5F5AC486AD09C525004CD1ABC5D476F1E83ED657784F6322DE3AB0C3286016EC28957FF376
3,272,469 UART: [art] SIG.S = 93459F8C5A9B55A74276343732596BF9D08E694A7791EA73D6AA46EC12720C665D66B5941AB5BBD4C14965FDE1AF2522
3,296,531 UART: Caliptra RT
3,296,876 UART: [state] CFI Enabled
3,405,246 UART: [rt] RT listening for mailbox commands...
3,405,916 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,426 UART: [rt]cmd =0x44504543, len=92
3,444,189 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
893,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,559 UART: [kat] ++
897,711 UART: [kat] sha1
901,829 UART: [kat] SHA2-256
903,769 UART: [kat] SHA2-384
906,754 UART: [kat] SHA2-512-ACC
908,655 UART: [kat] ECC-384
918,534 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,172,293 UART: [cold-reset] ++
1,172,669 UART: [fht] FHT @ 0x50003400
1,175,432 UART: [idev] ++
1,175,600 UART: [idev] CDI.KEYID = 6
1,175,960 UART: [idev] SUBJECT.KEYID = 7
1,176,384 UART: [idev] UDS.KEYID = 0
1,184,270 UART: [idev] Erasing UDS.KEYID = 0
1,201,187 UART: [idev] Sha1 KeyId Algorithm
1,209,699 UART: [idev] --
1,210,795 UART: [ldev] ++
1,210,963 UART: [ldev] CDI.KEYID = 6
1,211,326 UART: [ldev] SUBJECT.KEYID = 5
1,211,752 UART: [ldev] AUTHORITY.KEYID = 7
1,212,215 UART: [ldev] FE.KEYID = 1
1,217,369 UART: [ldev] Erasing FE.KEYID = 1
1,243,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,901 UART: [ldev] --
1,283,216 UART: [fwproc] Wait for Commands...
1,283,984 UART: [fwproc] Recv command 0x46574c44
1,284,712 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,116 >>> mbox cmd response: success
2,776,362 UART: [afmc] ++
2,776,530 UART: [afmc] CDI.KEYID = 6
2,776,892 UART: [afmc] SUBJECT.KEYID = 7
2,777,317 UART: [afmc] AUTHORITY.KEYID = 5
2,812,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,209 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,937 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,822 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,541 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,307 UART: [afmc] --
2,856,359 UART: [cold-reset] --
2,857,049 UART: [state] Locking Datavault
2,858,432 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,036 UART: [state] Locking ICCM
2,859,550 UART: [exit] Launching FMC @ 0x40000130
2,864,879 UART:
2,864,895 UART: Running Caliptra FMC ...
2,865,303 UART:
2,865,357 UART: [state] CFI Enabled
2,875,578 UART: [fht] FMC Alias Private Key: 7
2,983,035 UART: [art] Extend RT PCRs Done
2,983,463 UART: [art] Lock RT PCRs Done
2,985,209 UART: [art] Populate DV Done
2,993,620 UART: [fht] FMC Alias Private Key: 7
2,994,648 UART: [art] Derive CDI
2,994,928 UART: [art] Store in in slot 0x4
3,080,377 UART: [art] Derive Key Pair
3,080,737 UART: [art] Store priv key in slot 0x5
3,094,033 UART: [art] Derive Key Pair - Done
3,108,351 UART: [art] Signing Cert with AUTHO
3,108,831 UART: RITY.KEYID = 7
3,124,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,862 UART: [art] PUB.X = C170807E9B1840A479E4647154E12211E47E3562A46D8F291B12C4F3BD420DBD2D8D3BAC84563CE5B07AE90252473563
3,131,622 UART: [art] PUB.Y = 51E7E1523029E5FE3DD7834A6441E75B56A4C2506982E1E571273D852F4AC6BD61B085728CA4EA095D90E34F90F33997
3,138,565 UART: [art] SIG.R = A31077C3C6773FF6BC56ABAD5F7EC7F54E879616A18241D5BAC3A412157B8F3424AA60FDFB1F3E26A831160FF31C0879
3,145,339 UART: [art] SIG.S = DAFBCB5518C1A6F86A5EA30B5DB96D7B4A3AFA213257B025D46AC3B0C27A0F62C3E9C452C2B493CD2D432A49CDCA004C
3,169,318 UART: Caliptra RT
3,169,571 UART: [state] CFI Enabled
3,277,589 UART: [rt] RT listening for mailbox commands...
3,278,259 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,497 UART: [rt]cmd =0x44504543, len=92
3,315,586 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,927 >>> mbox cmd response: success
2,693,159 UART:
2,693,175 UART: Running Caliptra FMC ...
2,693,583 UART:
2,693,637 UART: [state] CFI Enabled
2,703,942 UART: [fht] FMC Alias Private Key: 7
2,811,885 UART: [art] Extend RT PCRs Done
2,812,313 UART: [art] Lock RT PCRs Done
2,814,149 UART: [art] Populate DV Done
2,822,414 UART: [fht] FMC Alias Private Key: 7
2,823,596 UART: [art] Derive CDI
2,823,876 UART: [art] Store in in slot 0x4
2,909,525 UART: [art] Derive Key Pair
2,909,885 UART: [art] Store priv key in slot 0x5
2,922,693 UART: [art] Derive Key Pair - Done
2,936,915 UART: [art] Signing Cert with AUTHO
2,937,395 UART: RITY.KEYID = 7
2,952,355 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,120 UART: [art] PUB.X = F4BFD848BC214D8455659CA1F20987A7128EC9ADAD3FD416CC6093D018B289B88D95F2C4EC11A196B26F451E5A313145
2,959,893 UART: [art] PUB.Y = 9F5543D1E20A828747307250A3C1B053CC00855041192B1C1357A04EC6DC09324DEFD544583F1E31F414298E94B19A5B
2,966,807 UART: [art] SIG.R = 8BEA40A5BB68F5D19CD0874C301971CF6D4D27B3FDFB594F7E1DE975ACF71B6117AD7FFA483FDF55F467339E23052F5E
2,973,592 UART: [art] SIG.S = FEA83854F26648F511B028ACC87359BC2A09FB3B149B9588C56BCD3049D66D1B60EF841D5AB8338EB5616029D862446C
2,997,584 UART: Caliptra RT
2,997,837 UART: [state] CFI Enabled
3,105,859 UART: [rt] RT listening for mailbox commands...
3,106,529 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,913 UART: [rt]cmd =0x44504543, len=92
3,144,316 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
893,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,688 UART: [kat] ++
897,840 UART: [kat] sha1
902,236 UART: [kat] SHA2-256
904,176 UART: [kat] SHA2-384
906,953 UART: [kat] SHA2-512-ACC
908,854 UART: [kat] ECC-384
918,733 UART: [kat] HMAC-384Kdf
923,411 UART: [kat] LMS
1,171,739 UART: [kat] --
1,172,842 UART: [cold-reset] ++
1,173,402 UART: [fht] FHT @ 0x50003400
1,176,215 UART: [idev] ++
1,176,383 UART: [idev] CDI.KEYID = 6
1,176,743 UART: [idev] SUBJECT.KEYID = 7
1,177,167 UART: [idev] UDS.KEYID = 0
1,185,235 UART: [idev] Erasing UDS.KEYID = 0
1,202,658 UART: [idev] Sha1 KeyId Algorithm
1,211,260 UART: [idev] --
1,212,270 UART: [ldev] ++
1,212,438 UART: [ldev] CDI.KEYID = 6
1,212,801 UART: [ldev] SUBJECT.KEYID = 5
1,213,227 UART: [ldev] AUTHORITY.KEYID = 7
1,213,690 UART: [ldev] FE.KEYID = 1
1,218,788 UART: [ldev] Erasing FE.KEYID = 1
1,245,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,248 UART: [ldev] --
1,284,755 UART: [fwproc] Wait for Commands...
1,285,425 UART: [fwproc] Recv command 0x46574c44
1,286,153 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,492 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,513 >>> mbox cmd response: success
2,778,687 UART: [afmc] ++
2,778,855 UART: [afmc] CDI.KEYID = 6
2,779,217 UART: [afmc] SUBJECT.KEYID = 7
2,779,642 UART: [afmc] AUTHORITY.KEYID = 5
2,814,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,548 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,296 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,024 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,909 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,628 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,606 UART: [afmc] --
2,858,560 UART: [cold-reset] --
2,859,464 UART: [state] Locking Datavault
2,860,841 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,445 UART: [state] Locking ICCM
2,861,887 UART: [exit] Launching FMC @ 0x40000130
2,867,216 UART:
2,867,232 UART: Running Caliptra FMC ...
2,867,640 UART:
2,867,783 UART: [state] CFI Enabled
2,878,566 UART: [fht] FMC Alias Private Key: 7
2,986,479 UART: [art] Extend RT PCRs Done
2,986,907 UART: [art] Lock RT PCRs Done
2,988,609 UART: [art] Populate DV Done
2,996,728 UART: [fht] FMC Alias Private Key: 7
2,997,796 UART: [art] Derive CDI
2,998,076 UART: [art] Store in in slot 0x4
3,084,091 UART: [art] Derive Key Pair
3,084,451 UART: [art] Store priv key in slot 0x5
3,098,237 UART: [art] Derive Key Pair - Done
3,112,736 UART: [art] Signing Cert with AUTHO
3,113,216 UART: RITY.KEYID = 7
3,128,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,215 UART: [art] PUB.X = 9ED8A318625C318D6FA3CEB53BDC464E42FCA17B68D47503739E86B000E9D84812A639872DA1BC78E3176246983C7CCA
3,135,964 UART: [art] PUB.Y = 9487E16B974CC99064ECC478308B69CF667D0732004D9DD2E1AAF515EC8F1B33FCFFCE80E64FD30AAC978CA139B5E419
3,142,900 UART: [art] SIG.R = 80ACEF8C9481635BB129F4BA67D12AB7315EBAC90ACD5479B384DD38A9DA9108540D2AF48F3FBCAE012FA283E0DFFBF9
3,149,682 UART: [art] SIG.S = 1308A2C9E699CEAE7599DD02797FD527270DA79173EEBC40A56E493184336698B1792D4AB84F0951A39E674115460352
3,173,490 UART: Caliptra RT
3,173,835 UART: [state] CFI Enabled
3,280,920 UART: [rt] RT listening for mailbox commands...
3,281,590 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,912 UART: [rt]cmd =0x44504543, len=92
3,319,189 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,010 >>> mbox cmd response: success
2,690,714 UART:
2,690,730 UART: Running Caliptra FMC ...
2,691,138 UART:
2,691,281 UART: [state] CFI Enabled
2,701,764 UART: [fht] FMC Alias Private Key: 7
2,809,465 UART: [art] Extend RT PCRs Done
2,809,893 UART: [art] Lock RT PCRs Done
2,811,143 UART: [art] Populate DV Done
2,819,504 UART: [fht] FMC Alias Private Key: 7
2,820,474 UART: [art] Derive CDI
2,820,754 UART: [art] Store in in slot 0x4
2,906,465 UART: [art] Derive Key Pair
2,906,825 UART: [art] Store priv key in slot 0x5
2,920,353 UART: [art] Derive Key Pair - Done
2,935,186 UART: [art] Signing Cert with AUTHO
2,935,666 UART: RITY.KEYID = 7
2,950,886 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,651 UART: [art] PUB.X = 4004965C05428F8D00396C5021B29DA68D015D087C6CACB8333694539C90AF83CC0931C8937ACB042D5B135F257E6E6B
2,958,377 UART: [art] PUB.Y = 7265D3E120C279FDB487A2A266060E57EB0997B1B12B8BAB97925706A2CAE19E598A12D1ECD7029870F8C887112C2D7B
2,965,314 UART: [art] SIG.R = 84C768D4B087170F2889903CB850D9BC2AA559A2EB1285A092B504560A9C1E23636E3220621260EF31201002D665B099
2,972,058 UART: [art] SIG.S = F71F896CE3ACF416365B940DC055EF6ADA43884F939ECFD28AD7A9652E2FE8AC6C4FB891E7BC826C5103EA3F4FE2F1D7
2,995,763 UART: Caliptra RT
2,996,108 UART: [state] CFI Enabled
3,103,322 UART: [rt] RT listening for mailbox commands...
3,103,992 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,626 UART: [rt]cmd =0x44504543, len=92
3,141,765 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,320 UART: [kat] SHA2-512-ACC
906,221 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,099 UART: [fht] FHT @ 0x50003400
1,172,835 UART: [idev] ++
1,173,003 UART: [idev] CDI.KEYID = 6
1,173,364 UART: [idev] SUBJECT.KEYID = 7
1,173,789 UART: [idev] UDS.KEYID = 0
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,395 UART: [idev] Sha1 KeyId Algorithm
1,207,257 UART: [idev] --
1,208,356 UART: [ldev] ++
1,208,524 UART: [ldev] CDI.KEYID = 6
1,208,888 UART: [ldev] SUBJECT.KEYID = 5
1,209,315 UART: [ldev] AUTHORITY.KEYID = 7
1,209,778 UART: [ldev] FE.KEYID = 1
1,215,086 UART: [ldev] Erasing FE.KEYID = 1
1,241,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,238 UART: [ldev] --
1,280,652 UART: [fwproc] Wait for Commands...
1,281,287 UART: [fwproc] Recv command 0x46574c44
1,282,020 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,308 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,300 >>> mbox cmd response: success
2,774,473 UART: [afmc] ++
2,774,641 UART: [afmc] CDI.KEYID = 6
2,775,004 UART: [afmc] SUBJECT.KEYID = 7
2,775,430 UART: [afmc] AUTHORITY.KEYID = 5
2,811,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,134 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,863 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,746 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,465 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,134 UART: [afmc] --
2,854,078 UART: [cold-reset] --
2,854,726 UART: [state] Locking Datavault
2,855,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,583 UART: [state] Locking ICCM
2,857,145 UART: [exit] Launching FMC @ 0x40000130
2,862,474 UART:
2,862,490 UART: Running Caliptra FMC ...
2,862,898 UART:
2,862,952 UART: [state] CFI Enabled
2,873,437 UART: [fht] FMC Alias Private Key: 7
2,980,804 UART: [art] Extend RT PCRs Done
2,981,232 UART: [art] Lock RT PCRs Done
2,982,400 UART: [art] Populate DV Done
2,990,501 UART: [fht] FMC Alias Private Key: 7
2,991,597 UART: [art] Derive CDI
2,991,877 UART: [art] Store in in slot 0x4
3,077,670 UART: [art] Derive Key Pair
3,078,030 UART: [art] Store priv key in slot 0x5
3,091,004 UART: [art] Derive Key Pair - Done
3,105,564 UART: [art] Signing Cert with AUTHO
3,106,044 UART: RITY.KEYID = 7
3,121,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,861 UART: [art] PUB.X = 3DCA8F021BCFBE443C2039A1B2B4F431AA46F143B1BAB1BE94F42438DC1370BA97F156C1DFDAC79ACD9A7B57EAFD7554
3,128,654 UART: [art] PUB.Y = CC4631483A2D9EFBD6E45B40CD6ADBB895F955769AF879E1222028A1B30C08932BBA4FD8ADA533C6230984BD77595A7F
3,135,605 UART: [art] SIG.R = A6F22CB4832F9B9E6816C29D65E98395C8AA246C9DF88C40442F948945CBFE539C0567F32741AC2756A4614CDD1C2DF1
3,142,376 UART: [art] SIG.S = F4B7EA6230666444A837A4A2DFA1CF14F582CE0DA55CA22B38F15C8C30D00976D7EDAFF13395F625B8753EC7BD71330D
3,166,410 UART: Caliptra RT
3,166,663 UART: [state] CFI Enabled
3,274,317 UART: [rt] RT listening for mailbox commands...
3,274,987 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,399 UART: [rt]cmd =0x44504543, len=92
3,312,562 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,140 >>> mbox cmd response: success
2,687,162 UART:
2,687,178 UART: Running Caliptra FMC ...
2,687,586 UART:
2,687,640 UART: [state] CFI Enabled
2,698,085 UART: [fht] FMC Alias Private Key: 7
2,805,778 UART: [art] Extend RT PCRs Done
2,806,206 UART: [art] Lock RT PCRs Done
2,807,654 UART: [art] Populate DV Done
2,815,823 UART: [fht] FMC Alias Private Key: 7
2,816,915 UART: [art] Derive CDI
2,817,195 UART: [art] Store in in slot 0x4
2,902,742 UART: [art] Derive Key Pair
2,903,102 UART: [art] Store priv key in slot 0x5
2,916,086 UART: [art] Derive Key Pair - Done
2,931,315 UART: [art] Signing Cert with AUTHO
2,931,795 UART: RITY.KEYID = 7
2,946,743 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,508 UART: [art] PUB.X = 515C1AEB27C2E2FB62854E4A7A4CB18355B9E3DE4EFA0ABC9F0971A26AD32D59E96E75952AF66AF14910D41D20139555
2,954,282 UART: [art] PUB.Y = 1A6DD6F77846EA17E2D2C35C577F7DC3A768735FBE1AB6A99AA225AA2B5104FCAC6154DCF484944C3D5ADD8A7F7A90D9
2,961,249 UART: [art] SIG.R = C50584FEA1D4303C753FB5A5C5AF3456732D5FB8D9DCE6FE618F644C3F5A3E6D57C8CE32D145E64928ED37909DA647ED
2,968,030 UART: [art] SIG.S = 3D69BB37CC20C7D1F32054B0E85F7DA9C8F54E3CB1F747D790DEACCA70C42D43B8BEC024E78F38646290BB3DD7B848E8
2,992,769 UART: Caliptra RT
2,993,022 UART: [state] CFI Enabled
3,099,957 UART: [rt] RT listening for mailbox commands...
3,100,627 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,123 UART: [rt]cmd =0x44504543, len=92
3,138,206 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
920,917 UART: [kat] LMS
1,169,229 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,722 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,182,436 UART: [idev] Erasing UDS.KEYID = 0
1,199,172 UART: [idev] Sha1 KeyId Algorithm
1,208,028 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,685 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,339 UART: [ldev] --
1,281,681 UART: [fwproc] Wait for Commands...
1,282,432 UART: [fwproc] Recv command 0x46574c44
1,283,165 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,724 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,959 >>> mbox cmd response: success
2,776,994 UART: [afmc] ++
2,777,162 UART: [afmc] CDI.KEYID = 6
2,777,525 UART: [afmc] SUBJECT.KEYID = 7
2,777,951 UART: [afmc] AUTHORITY.KEYID = 5
2,813,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,156 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,039 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,758 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,515 UART: [afmc] --
2,856,595 UART: [cold-reset] --
2,857,579 UART: [state] Locking Datavault
2,858,622 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,226 UART: [state] Locking ICCM
2,859,882 UART: [exit] Launching FMC @ 0x40000130
2,865,211 UART:
2,865,227 UART: Running Caliptra FMC ...
2,865,635 UART:
2,865,778 UART: [state] CFI Enabled
2,876,657 UART: [fht] FMC Alias Private Key: 7
2,984,256 UART: [art] Extend RT PCRs Done
2,984,684 UART: [art] Lock RT PCRs Done
2,986,608 UART: [art] Populate DV Done
2,994,919 UART: [fht] FMC Alias Private Key: 7
2,995,895 UART: [art] Derive CDI
2,996,175 UART: [art] Store in in slot 0x4
3,081,754 UART: [art] Derive Key Pair
3,082,114 UART: [art] Store priv key in slot 0x5
3,095,064 UART: [art] Derive Key Pair - Done
3,109,848 UART: [art] Signing Cert with AUTHO
3,110,328 UART: RITY.KEYID = 7
3,125,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,217 UART: [art] PUB.X = 28DFD64BF04E2BC03010C0D9ACCBCD059D7227AA8C9ACB80F7A091BE80C7869AFCED41E0CC99F6AA4DE4E4E33456677E
3,133,010 UART: [art] PUB.Y = BB56441F6CD2700335F24BFB001287A1006038A85B589198AD0DC70017AACFA4C7F5BF2AF65E7E42AB445408E575C9C4
3,139,891 UART: [art] SIG.R = D788192625A8AEB7FA17E46F2095C661A7C896EE6AB6429DB368B9D589162D5D75350EE1AB2058F6C5C3FCE769F1FE2A
3,146,668 UART: [art] SIG.S = 8B9F0A7D8AF684AD3B06B3DCF1EA45759FB75109238CB2A67192E3DDC7F9CA4AB7DBFD14EA42F62E211FE09874AE69DC
3,171,130 UART: Caliptra RT
3,171,475 UART: [state] CFI Enabled
3,279,057 UART: [rt] RT listening for mailbox commands...
3,279,727 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,245 UART: [rt]cmd =0x44504543, len=92
3,317,412 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,793 >>> mbox cmd response: success
2,686,493 UART:
2,686,509 UART: Running Caliptra FMC ...
2,686,917 UART:
2,687,060 UART: [state] CFI Enabled
2,697,547 UART: [fht] FMC Alias Private Key: 7
2,805,872 UART: [art] Extend RT PCRs Done
2,806,300 UART: [art] Lock RT PCRs Done
2,807,542 UART: [art] Populate DV Done
2,815,895 UART: [fht] FMC Alias Private Key: 7
2,816,947 UART: [art] Derive CDI
2,817,227 UART: [art] Store in in slot 0x4
2,903,074 UART: [art] Derive Key Pair
2,903,434 UART: [art] Store priv key in slot 0x5
2,916,730 UART: [art] Derive Key Pair - Done
2,931,450 UART: [art] Signing Cert with AUTHO
2,931,930 UART: RITY.KEYID = 7
2,946,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,387 UART: [art] PUB.X = A5874474CC3DD8D81A32499CDFBBA608FAD8BFB963CBC193262FD439AE9380E92433E6B5165268C3DD838FC88320BE09
2,954,161 UART: [art] PUB.Y = F2EBA8184EE5A036D3C77E91E1FB150C3B9C91D2CDD6908C1C9081F10FCE98FF2BB50F1F48387E9AC4E0F556ED11B186
2,961,120 UART: [art] SIG.R = CC36410ACE9AC80F1696283F3882B86961FF644B76B77C504F9999E7E499E698C684D52D353ADA5A85043607A30B8515
2,967,869 UART: [art] SIG.S = 9599A561D9EA44C12A6509FB1D7E5FF3348DE1DB39303FD3C431B93E083AC8314BD752C6FDB98B5B0DB5EF3ACEED47E5
2,991,755 UART: Caliptra RT
2,992,100 UART: [state] CFI Enabled
3,100,492 UART: [rt] RT listening for mailbox commands...
3,101,162 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,530 UART: [rt]cmd =0x44504543, len=92
3,138,849 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,095 UART:
192,454 UART: Running Caliptra ROM ...
193,588 UART:
193,740 UART: [state] CFI Enabled
266,305 UART: [state] LifecycleState = Unprovisioned
268,246 UART: [state] DebugLocked = No
270,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,215 UART: [kat] SHA2-256
444,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,436 UART: [kat] ++
455,965 UART: [kat] sha1
467,575 UART: [kat] SHA2-256
470,229 UART: [kat] SHA2-384
476,217 UART: [kat] SHA2-512-ACC
478,583 UART: [kat] ECC-384
2,768,094 UART: [kat] HMAC-384Kdf
2,801,215 UART: [kat] LMS
3,991,539 UART: [kat] --
3,996,833 UART: [cold-reset] ++
3,998,552 UART: [fht] Storing FHT @ 0x50003400
4,011,096 UART: [idev] ++
4,011,673 UART: [idev] CDI.KEYID = 6
4,012,564 UART: [idev] SUBJECT.KEYID = 7
4,013,811 UART: [idev] UDS.KEYID = 0
4,014,769 ready_for_fw is high
4,014,967 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,536 UART: [idev] Erasing UDS.KEYID = 0
7,346,350 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,653 UART: [idev] --
7,370,777 UART: [ldev] ++
7,371,343 UART: [ldev] CDI.KEYID = 6
7,372,286 UART: [ldev] SUBJECT.KEYID = 5
7,373,551 UART: [ldev] AUTHORITY.KEYID = 7
7,374,704 UART: [ldev] FE.KEYID = 1
7,424,647 UART: [ldev] Erasing FE.KEYID = 1
10,755,499 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,179 UART: [ldev] --
13,115,097 UART: [fwproc] Waiting for Commands...
13,117,626 UART: [fwproc] Received command 0x46574c44
13,119,828 UART: [fwproc] Received Image of size 114124 bytes
17,172,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,410 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,636,314 >>> mbox cmd response: success
17,636,875 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,640,933 UART: [afmc] ++
17,641,528 UART: [afmc] CDI.KEYID = 6
17,642,412 UART: [afmc] SUBJECT.KEYID = 7
17,643,682 UART: [afmc] AUTHORITY.KEYID = 5
21,009,703 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,686 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,998 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,394 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,240 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,641 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,228 UART: [afmc] --
23,379,641 UART: [cold-reset] --
23,383,019 UART: [state] Locking Datavault
23,389,832 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,783 UART: [state] Locking ICCM
23,392,933 UART: [exit] Launching FMC @ 0x40000130
23,401,331 UART:
23,401,568 UART: Running Caliptra FMC ...
23,402,667 UART:
23,402,825 UART: [state] CFI Enabled
23,468,654 UART: [fht] FMC Alias Private Key: 7
25,806,721 UART: [art] Extend RT PCRs Done
25,807,941 UART: [art] Lock RT PCRs Done
25,809,616 UART: [art] Populate DV Done
25,815,186 UART: [fht] FMC Alias Private Key: 7
25,816,777 UART: [art] Derive CDI
25,817,533 UART: [art] Store in in slot 0x4
25,877,194 UART: [art] Derive Key Pair
25,878,229 UART: [art] Store priv key in slot 0x5
29,170,747 UART: [art] Derive Key Pair - Done
29,184,114 UART: [art] Signing Cert with AUTHO
29,185,411 UART: RITY.KEYID = 7
31,473,409 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,915 UART: [art] PUB.X = F9A3D50603634BF7CB8EE116E0131A95AA3AF41F7234BB237F0C6EE1C954A57B81EF0EDE0FB184DF0F07295BCEA6A09F
31,482,168 UART: [art] PUB.Y = C231E93A5E4DF279F9CA1D96D3102A4B351352D58A997D2799C12E9B1EFA96956D8157989321E0F94789355B2C89CB42
31,489,397 UART: [art] SIG.R = 066FE8BF31F2639D4D8D978802255A0F735AE19BCF09D9BA20B78ABC08962D5E490AC7BB5CC58EAD80F887CD5609B747
31,496,782 UART: [art] SIG.S = 4E2B76D12DE8D0AF0AF112E362CE2C6C26FE1C16CCFCDA8CABEC9275556924A13734B517081A56CE4A2ECDE4183162E9
32,802,469 UART: Caliptra RT
32,803,166 UART: [state] CFI Enabled
32,983,806 UART: [rt] RT listening for mailbox commands...
33,015,546 UART: [rt]cmd =0x50435245, len=56
33,017,357 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,785,515 ready_for_fw is high
3,785,885 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,859,155 >>> mbox cmd response: success
17,859,929 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,538,681 UART:
23,539,060 UART: Running Caliptra FMC ...
23,540,208 UART:
23,540,365 UART: [state] CFI Enabled
23,590,343 UART: [fht] FMC Alias Private Key: 7
25,928,770 UART: [art] Extend RT PCRs Done
25,930,019 UART: [art] Lock RT PCRs Done
25,931,433 UART: [art] Populate DV Done
25,936,648 UART: [fht] FMC Alias Private Key: 7
25,938,085 UART: [art] Derive CDI
25,939,011 UART: [art] Store in in slot 0x4
25,998,965 UART: [art] Derive Key Pair
26,000,006 UART: [art] Store priv key in slot 0x5
29,292,541 UART: [art] Derive Key Pair - Done
29,305,822 UART: [art] Signing Cert with AUTHO
29,307,126 UART: RITY.KEYID = 7
31,595,237 UART: [art] Erasing AUTHORITY.KEYID = 7
31,596,748 UART: [art] PUB.X = 6B51E678FA529CF1974E1C71655C34D0C935E0E17824978D9353BA1E7483961FE49CD3672059326986CCA57BB313C3FB
31,603,962 UART: [art] PUB.Y = 87AF98D84D856F73AEE09E3E6FD1843E14F7830F0DA819F2CF3C3488208149293728DA6EE0A5C102E4FC5F285DB4B912
31,611,208 UART: [art] SIG.R = 348F27D09942C87D2084840FB8E425976C93D6874BFDE848E577450DDC1F79521CC93C823BFE64AFA95797A4731ADF88
31,618,578 UART: [art] SIG.S = 868188251E2C7F413F01DE84C9F234618530EBC789F06760C59820DD078B848547443BB7DC824BBB487B971B6F2E249E
32,923,671 UART: Caliptra RT
32,924,402 UART: [state] CFI Enabled
33,086,039 UART: [rt] RT listening for mailbox commands...
33,117,729 UART: [rt]cmd =0x50435245, len=56
33,119,463 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,415 UART:
192,779 UART: Running Caliptra ROM ...
193,970 UART:
603,682 UART: [state] CFI Enabled
616,378 UART: [state] LifecycleState = Unprovisioned
618,317 UART: [state] DebugLocked = No
620,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,648 UART: [kat] SHA2-256
794,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,981 UART: [kat] ++
805,509 UART: [kat] sha1
817,094 UART: [kat] SHA2-256
819,824 UART: [kat] SHA2-384
824,552 UART: [kat] SHA2-512-ACC
826,918 UART: [kat] ECC-384
3,112,560 UART: [kat] HMAC-384Kdf
3,125,000 UART: [kat] LMS
4,315,110 UART: [kat] --
4,320,490 UART: [cold-reset] ++
4,322,425 UART: [fht] Storing FHT @ 0x50003400
4,333,471 UART: [idev] ++
4,334,043 UART: [idev] CDI.KEYID = 6
4,334,958 UART: [idev] SUBJECT.KEYID = 7
4,336,190 UART: [idev] UDS.KEYID = 0
4,337,249 ready_for_fw is high
4,337,482 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,263 UART: [idev] Erasing UDS.KEYID = 0
7,625,690 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,630 UART: [idev] --
7,653,395 UART: [ldev] ++
7,653,971 UART: [ldev] CDI.KEYID = 6
7,654,930 UART: [ldev] SUBJECT.KEYID = 5
7,656,136 UART: [ldev] AUTHORITY.KEYID = 7
7,657,359 UART: [ldev] FE.KEYID = 1
7,666,167 UART: [ldev] Erasing FE.KEYID = 1
10,955,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,422 UART: [ldev] --
13,317,516 UART: [fwproc] Waiting for Commands...
13,320,842 UART: [fwproc] Received command 0x46574c44
13,323,016 UART: [fwproc] Received Image of size 114124 bytes
17,367,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,268 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,155 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,833,793 >>> mbox cmd response: success
17,834,335 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,837,830 UART: [afmc] ++
17,838,415 UART: [afmc] CDI.KEYID = 6
17,839,291 UART: [afmc] SUBJECT.KEYID = 7
17,840,559 UART: [afmc] AUTHORITY.KEYID = 5
21,158,079 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,335 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,642 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,999 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,829 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,267 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,977 UART: [afmc] --
23,524,233 UART: [cold-reset] --
23,527,086 UART: [state] Locking Datavault
23,532,331 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,081 UART: [state] Locking ICCM
23,536,309 UART: [exit] Launching FMC @ 0x40000130
23,544,696 UART:
23,544,933 UART: Running Caliptra FMC ...
23,546,031 UART:
23,546,188 UART: [state] CFI Enabled
23,553,961 UART: [fht] FMC Alias Private Key: 7
25,884,747 UART: [art] Extend RT PCRs Done
25,885,962 UART: [art] Lock RT PCRs Done
25,887,631 UART: [art] Populate DV Done
25,892,872 UART: [fht] FMC Alias Private Key: 7
25,894,573 UART: [art] Derive CDI
25,895,384 UART: [art] Store in in slot 0x4
25,937,822 UART: [art] Derive Key Pair
25,938,874 UART: [art] Store priv key in slot 0x5
29,180,857 UART: [art] Derive Key Pair - Done
29,193,681 UART: [art] Signing Cert with AUTHO
29,195,008 UART: RITY.KEYID = 7
31,474,413 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,918 UART: [art] PUB.X = B5F88DFC76FC934B79D4ED53248C8F56FD4462FFCFAACDEA8B0D5D2BEF8E31B9A37741120B5C49EEAA1C9338A6B63E1D
31,483,163 UART: [art] PUB.Y = E8AEC5DCEF96A90E0E9A8BBFFF37AB141799EFC54397130D95E392147E1487D0009D0958715EFEB9D591A2027B46C374
31,490,401 UART: [art] SIG.R = D5055B6CD22A482A9CD71C12F1E7DA8B0C67D926DA82A6B72B452797D3ACF188EA56B5E1F6F1F1522C70B403D51DAE1C
31,497,842 UART: [art] SIG.S = CDAFA45EABBEAB0189BC9189137AA2A2DEB59635A2AAAFD820F90CA369B79EC2E691A917B3FB8FD3B2CFEA117CCB8732
32,802,383 UART: Caliptra RT
32,803,090 UART: [state] CFI Enabled
32,921,097 UART: [rt] RT listening for mailbox commands...
32,952,592 UART: [rt]cmd =0x50435245, len=56
32,954,477 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
4,128,726 ready_for_fw is high
4,129,538 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,924 >>> mbox cmd response: success
18,075,717 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,717,827 UART:
23,718,211 UART: Running Caliptra FMC ...
23,719,319 UART:
23,719,469 UART: [state] CFI Enabled
23,727,901 UART: [fht] FMC Alias Private Key: 7
26,058,735 UART: [art] Extend RT PCRs Done
26,059,954 UART: [art] Lock RT PCRs Done
26,061,601 UART: [art] Populate DV Done
26,067,032 UART: [fht] FMC Alias Private Key: 7
26,068,530 UART: [art] Derive CDI
26,069,292 UART: [art] Store in in slot 0x4
26,112,163 UART: [art] Derive Key Pair
26,113,202 UART: [art] Store priv key in slot 0x5
29,354,679 UART: [art] Derive Key Pair - Done
29,367,727 UART: [art] Signing Cert with AUTHO
29,369,034 UART: RITY.KEYID = 7
31,648,068 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,575 UART: [art] PUB.X = 1D2B96E4EEEC41BDE2487469D8AD9C505257CCFFA1F3F074D7CDCB438826238F3EBBF19C0C25801A77C5F65741FE07CA
31,656,879 UART: [art] PUB.Y = 90FDFD1BB7D49BF16B022F04F618931C6433E73B45AB91C0A397F27BE64DC05630A1C6C15F0272A341F1EBD2FFB81EB3
31,664,108 UART: [art] SIG.R = CF97006C24B0AFFAB48F5DDF2F2E5FA3988B09FD07C6143A9DD8B1017B58A4C410B27B0DBD30E33646B6159E03B12ECE
31,671,500 UART: [art] SIG.S = 19E33AFB3C155D12B6CAA448ECB1D51AB784B57E335C6B9946C782C98B031596047097D604C45B4B14296B7700404C58
32,976,874 UART: Caliptra RT
32,977,587 UART: [state] CFI Enabled
33,095,237 UART: [rt] RT listening for mailbox commands...
33,126,873 UART: [rt]cmd =0x50435245, len=56
33,128,844 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
191,967 UART:
192,341 UART: Running Caliptra ROM ...
193,436 UART:
193,579 UART: [state] CFI Enabled
267,686 UART: [state] LifecycleState = Unprovisioned
269,605 UART: [state] DebugLocked = No
272,408 UART: [state] WD Timer not started. Device not locked for debugging
275,300 UART: [kat] SHA2-256
454,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,983 UART: [kat] ++
466,433 UART: [kat] sha1
477,160 UART: [kat] SHA2-256
480,237 UART: [kat] SHA2-384
486,154 UART: [kat] SHA2-512-ACC
489,090 UART: [kat] ECC-384
2,947,538 UART: [kat] HMAC-384Kdf
2,970,641 UART: [kat] LMS
3,500,030 UART: [kat] --
3,504,692 UART: [cold-reset] ++
3,506,483 UART: [fht] FHT @ 0x50003400
3,517,832 UART: [idev] ++
3,518,405 UART: [idev] CDI.KEYID = 6
3,519,335 UART: [idev] SUBJECT.KEYID = 7
3,520,507 UART: [idev] UDS.KEYID = 0
3,521,438 ready_for_fw is high
3,521,653 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,693 UART: [idev] Erasing UDS.KEYID = 0
6,027,704 UART: [idev] Sha1 KeyId Algorithm
6,051,361 UART: [idev] --
6,055,195 UART: [ldev] ++
6,055,763 UART: [ldev] CDI.KEYID = 6
6,056,675 UART: [ldev] SUBJECT.KEYID = 5
6,057,886 UART: [ldev] AUTHORITY.KEYID = 7
6,059,115 UART: [ldev] FE.KEYID = 1
6,100,389 UART: [ldev] Erasing FE.KEYID = 1
8,605,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,981 UART: [ldev] --
10,413,704 UART: [fwproc] Wait for Commands...
10,415,210 UART: [fwproc] Recv command 0x46574c44
10,417,300 UART: [fwproc] Recv'd Img size: 114448 bytes
13,818,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,459 >>> mbox cmd response: success
14,279,985 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,283,466 UART: [afmc] ++
14,284,083 UART: [afmc] CDI.KEYID = 6
14,285,000 UART: [afmc] SUBJECT.KEYID = 7
14,286,188 UART: [afmc] AUTHORITY.KEYID = 5
16,828,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,390 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,012 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,331 UART: [afmc] --
18,629,653 UART: [cold-reset] --
18,634,046 UART: [state] Locking Datavault
18,639,297 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,990 UART: [state] Locking ICCM
18,643,576 UART: [exit] Launching FMC @ 0x40000130
18,651,967 UART:
18,652,194 UART: Running Caliptra FMC ...
18,653,240 UART:
18,653,411 UART: [state] CFI Enabled
18,711,301 UART: [fht] FMC Alias Private Key: 7
20,475,333 UART: [art] Extend RT PCRs Done
20,476,568 UART: [art] Lock RT PCRs Done
20,478,450 UART: [art] Populate DV Done
20,484,187 UART: [fht] FMC Alias Private Key: 7
20,485,829 UART: [art] Derive CDI
20,486,636 UART: [art] Store in in slot 0x4
20,543,761 UART: [art] Derive Key Pair
20,544,800 UART: [art] Store priv key in slot 0x5
23,007,801 UART: [art] Derive Key Pair - Done
23,020,744 UART: [art] Signing Cert with AUTHO
23,022,053 UART: RITY.KEYID = 7
24,733,843 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,339 UART: [art] PUB.X = 815C7657564C3636E85475CAD69595B01D37ABB65C1AEDCAE55D53916409BEB8C286AF43B74A7F4BDCBB91AC29150148
24,742,652 UART: [art] PUB.Y = 011FD93695970E61F33639DA2E6557443850056ADFD62487F6E00F5C288B822B583294476E82EBD248510629B496E5F8
24,749,898 UART: [art] SIG.R = A3F9580375182C10AADA78A8168E3D869C2C5EE3076ACD1C84B3B0D1C66A5A923D5DDEE1DA3ADCC75F2A98F13730F80A
24,757,260 UART: [art] SIG.S = 0D012D5EC58CA866F6DD5C9FD74A43795CD62FB711362E899B4312F3E051C4173470CFA3980432396DB1A7ED05DAA754
25,735,976 UART: Caliptra RT
25,736,670 UART: [state] CFI Enabled
25,901,757 UART: [rt] RT listening for mailbox commands...
25,933,671 UART: [rt]cmd =0x50435245, len=56
25,935,479 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,363,362 ready_for_fw is high
3,363,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,073,615 >>> mbox cmd response: success
14,074,442 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,377,104 UART:
18,377,510 UART: Running Caliptra FMC ...
18,378,651 UART:
18,378,808 UART: [state] CFI Enabled
18,446,128 UART: [fht] FMC Alias Private Key: 7
20,209,767 UART: [art] Extend RT PCRs Done
20,210,992 UART: [art] Lock RT PCRs Done
20,212,782 UART: [art] Populate DV Done
20,218,245 UART: [fht] FMC Alias Private Key: 7
20,219,750 UART: [art] Derive CDI
20,220,570 UART: [art] Store in in slot 0x4
20,278,352 UART: [art] Derive Key Pair
20,279,392 UART: [art] Store priv key in slot 0x5
22,742,500 UART: [art] Derive Key Pair - Done
22,754,993 UART: [art] Signing Cert with AUTHO
22,756,329 UART: RITY.KEYID = 7
24,468,642 UART: [art] Erasing AUTHORITY.KEYID = 7
24,470,159 UART: [art] PUB.X = 82E32DF929CF4EED100500B27395F8FEF1F2F327AC341712DBC7A2849852093EB48666486CEB791F7BBC12800BA2FD00
24,477,356 UART: [art] PUB.Y = B8DA56C84BC7F338FDD26AF0883F35CF1D0B1B218DB3A377F4DF50EC4AD17E75C3778CBF88ABBC043349C314A0295C74
24,484,662 UART: [art] SIG.R = 243E5F87FAC68E57DA27ADB08B526157E2B7F901A656CCE4F80ADA7166F2BD721B6176CCA10CE609B7F25C70AC7B4013
24,492,059 UART: [art] SIG.S = 1A471157DB1D4E926AC1D7006EF9CD4D97725C371858ACF48EACF31B8A44684DDF8C5CCCE802D2530BE6905359C5E955
25,471,412 UART: Caliptra RT
25,472,128 UART: [state] CFI Enabled
25,636,644 UART: [rt] RT listening for mailbox commands...
25,668,392 UART: [rt]cmd =0x50435245, len=56
25,670,112 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,403 UART:
192,769 UART: Running Caliptra ROM ...
193,950 UART:
603,690 UART: [state] CFI Enabled
613,798 UART: [state] LifecycleState = Unprovisioned
615,711 UART: [state] DebugLocked = No
618,092 UART: [state] WD Timer not started. Device not locked for debugging
621,340 UART: [kat] SHA2-256
800,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,008 UART: [kat] ++
812,538 UART: [kat] sha1
822,983 UART: [kat] SHA2-256
825,978 UART: [kat] SHA2-384
831,822 UART: [kat] SHA2-512-ACC
834,751 UART: [kat] ECC-384
3,276,486 UART: [kat] HMAC-384Kdf
3,288,996 UART: [kat] LMS
3,818,502 UART: [kat] --
3,822,509 UART: [cold-reset] ++
3,824,364 UART: [fht] FHT @ 0x50003400
3,835,129 UART: [idev] ++
3,835,688 UART: [idev] CDI.KEYID = 6
3,836,664 UART: [idev] SUBJECT.KEYID = 7
3,837,829 UART: [idev] UDS.KEYID = 0
3,838,868 ready_for_fw is high
3,839,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,982,774 UART: [idev] Erasing UDS.KEYID = 0
6,309,020 UART: [idev] Sha1 KeyId Algorithm
6,333,333 UART: [idev] --
6,336,618 UART: [ldev] ++
6,337,179 UART: [ldev] CDI.KEYID = 6
6,338,098 UART: [ldev] SUBJECT.KEYID = 5
6,339,255 UART: [ldev] AUTHORITY.KEYID = 7
6,340,487 UART: [ldev] FE.KEYID = 1
6,348,910 UART: [ldev] Erasing FE.KEYID = 1
8,823,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,492 UART: [ldev] --
10,616,378 UART: [fwproc] Wait for Commands...
10,619,099 UART: [fwproc] Recv command 0x46574c44
10,621,205 UART: [fwproc] Recv'd Img size: 114448 bytes
14,021,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,481,880 >>> mbox cmd response: success
14,482,399 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,485,408 UART: [afmc] ++
14,485,983 UART: [afmc] CDI.KEYID = 6
14,486,888 UART: [afmc] SUBJECT.KEYID = 7
14,488,091 UART: [afmc] AUTHORITY.KEYID = 5
16,992,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,539 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,565 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,414 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,301 UART: [afmc] --
18,791,358 UART: [cold-reset] --
18,795,648 UART: [state] Locking Datavault
18,801,858 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,525 UART: [state] Locking ICCM
18,805,239 UART: [exit] Launching FMC @ 0x40000130
18,813,635 UART:
18,813,864 UART: Running Caliptra FMC ...
18,814,959 UART:
18,815,109 UART: [state] CFI Enabled
18,823,256 UART: [fht] FMC Alias Private Key: 7
20,580,404 UART: [art] Extend RT PCRs Done
20,581,620 UART: [art] Lock RT PCRs Done
20,583,021 UART: [art] Populate DV Done
20,588,596 UART: [fht] FMC Alias Private Key: 7
20,590,127 UART: [art] Derive CDI
20,590,880 UART: [art] Store in in slot 0x4
20,633,418 UART: [art] Derive Key Pair
20,634,453 UART: [art] Store priv key in slot 0x5
23,061,332 UART: [art] Derive Key Pair - Done
23,074,291 UART: [art] Signing Cert with AUTHO
23,075,591 UART: RITY.KEYID = 7
24,781,107 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,615 UART: [art] PUB.X = B21918650AA8D44CDE2DE13A78B3CA79DBE23D9514546EA8946E4577FEC9E02FC891DBDFC5AE8970886EDA4FA102C42C
24,789,909 UART: [art] PUB.Y = 1DA0C212DAC090533460DB94E4350802890E206603AB35F56F857C7A199F0314CB38FE91A3C228C17E02096A91291FD8
24,797,141 UART: [art] SIG.R = C3D99A5F1C44DBD2ABE43D14409FBB8FE041D25C3B8915B426DE2BE221486C80336C78EF432E2D707E3F681A6A20C9FB
24,804,524 UART: [art] SIG.S = 5A1B49EAFA2CB8C17ACE1D7427C0F7C18183949464B858AE97001C9947C8D06BF980CFA9438A7778019E4D61A35F48DE
25,783,982 UART: Caliptra RT
25,784,673 UART: [state] CFI Enabled
25,901,693 UART: [rt] RT listening for mailbox commands...
25,933,531 UART: [rt]cmd =0x50435245, len=56
25,935,440 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,695,991 ready_for_fw is high
3,696,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,524 >>> mbox cmd response: success
14,270,275 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,513,269 UART:
18,513,660 UART: Running Caliptra FMC ...
18,514,797 UART:
18,514,971 UART: [state] CFI Enabled
18,522,689 UART: [fht] FMC Alias Private Key: 7
20,279,920 UART: [art] Extend RT PCRs Done
20,281,143 UART: [art] Lock RT PCRs Done
20,283,033 UART: [art] Populate DV Done
20,288,399 UART: [fht] FMC Alias Private Key: 7
20,290,142 UART: [art] Derive CDI
20,290,877 UART: [art] Store in in slot 0x4
20,333,414 UART: [art] Derive Key Pair
20,334,411 UART: [art] Store priv key in slot 0x5
22,761,548 UART: [art] Derive Key Pair - Done
22,774,496 UART: [art] Signing Cert with AUTHO
22,775,832 UART: RITY.KEYID = 7
24,481,181 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,678 UART: [art] PUB.X = 2FF996C182A80530CE85D510806E64B4ABA3E755DF8FE32EE1799579D01C367FE173FF9B522906655FB47D8986C4C689
24,489,925 UART: [art] PUB.Y = 3276551CDFB49F5E8B28A55703294F240676D92FA0D7D8DD75BB325AFF6648B9045E6083A42D9E78E1D923D0E653A1C0
24,497,197 UART: [art] SIG.R = F64A606D1E4FEDD0BB47F24E677A77C0AF01A9B57B809929F9088483281AE6252637448F2930E0F0B54140FADA967FB2
24,504,595 UART: [art] SIG.S = 7964D9649E4EC36854FEE133BAFED8D3F961C98222A28FA8616A9380B4C469C3ED2EBDB8BCB03367C6801947C1EC1F66
25,483,708 UART: Caliptra RT
25,484,415 UART: [state] CFI Enabled
25,601,896 UART: [rt] RT listening for mailbox commands...
25,633,472 UART: [rt]cmd =0x50435245, len=56
25,635,277 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,436,154 ready_for_fw is high
3,436,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,736,792 >>> mbox cmd response: success
14,737,470 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,021,216 UART:
19,021,605 UART: Running Caliptra FMC ...
19,022,711 UART:
19,022,866 UART: [state] CFI Enabled
19,092,412 UART: [fht] FMC Alias Private Key: 7
20,855,902 UART: [art] Extend RT PCRs Done
20,857,126 UART: [art] Lock RT PCRs Done
20,858,887 UART: [art] Populate DV Done
20,864,245 UART: [fht] FMC Alias Private Key: 7
20,866,003 UART: [art] Derive CDI
20,866,746 UART: [art] Store in in slot 0x4
20,924,901 UART: [art] Derive Key Pair
20,925,937 UART: [art] Store priv key in slot 0x5
23,388,756 UART: [art] Derive Key Pair - Done
23,401,899 UART: [art] Signing Cert with AUTHO
23,403,238 UART: RITY.KEYID = 7
25,114,862 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,364 UART: [art] PUB.X = 3B175348BE703CDBE83D701948B02F803ACAD0935C3061F2CC8E90FBEA9657AA7AC2833CDCA9DDDCDA443879B17124C8
25,123,616 UART: [art] PUB.Y = 3A2D3648EC757E826411A86FF11425D0A712E62F50432F826FD96F38E7129F698700F7A0E9AE1602970A451370125F12
25,130,807 UART: [art] SIG.R = 5B1AE84C3A0B7CC14B3F48A6A0A9C684DA34AA4BDE852923FAB676606057534AB1F0D6424F02E0593EA11F86A6C0A378
25,138,213 UART: [art] SIG.S = E18B082471D9DB755C068C4A375C130FD6DF07EABB4D3DED96F4D5A104B9D269353CF89849547D66A7E2B50CE73F0338
26,117,302 UART: Caliptra RT
26,118,011 UART: [state] CFI Enabled
26,283,592 UART: [rt] RT listening for mailbox commands...
26,315,663 UART: [rt]cmd =0x50435245, len=56
26,317,261 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,753,171 ready_for_fw is high
3,753,733 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,960,649 >>> mbox cmd response: success
14,961,293 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,214,079 UART:
19,214,463 UART: Running Caliptra FMC ...
19,215,562 UART:
19,215,706 UART: [state] CFI Enabled
19,223,820 UART: [fht] FMC Alias Private Key: 7
20,981,010 UART: [art] Extend RT PCRs Done
20,982,231 UART: [art] Lock RT PCRs Done
20,983,872 UART: [art] Populate DV Done
20,989,275 UART: [fht] FMC Alias Private Key: 7
20,990,858 UART: [art] Derive CDI
20,991,581 UART: [art] Store in in slot 0x4
21,034,064 UART: [art] Derive Key Pair
21,035,104 UART: [art] Store priv key in slot 0x5
23,461,971 UART: [art] Derive Key Pair - Done
23,474,960 UART: [art] Signing Cert with AUTHO
23,476,273 UART: RITY.KEYID = 7
25,181,623 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,123 UART: [art] PUB.X = 7604A44DA2CAAC9AEB9CECB74789DE065D8E1947D96723B9B0B0703139FA4C8A981828CF5E23A9E4C47311FCFCED1B3A
25,190,420 UART: [art] PUB.Y = 6D2401BACCB4C846E9EBF5CC67883AE9ABB32E75F5F85E6995C04DAFECD2AFFCA9967FF2D848B9512771141739C5FF79
25,197,665 UART: [art] SIG.R = 56845B812BB1579B85FFDA26F9475B2202D8E1F1FD0B186A3EDD7CF7E67327E6E96689CC3FAACC385328543BBBFF7B36
25,205,117 UART: [art] SIG.S = C8A36ED82FC0E0107EDED49F5B6BE526E50641369B5F1F3680991D98485F74C3B08732929EAF3AFB20DE6E00B16ABEDA
26,184,173 UART: Caliptra RT
26,184,890 UART: [state] CFI Enabled
26,302,058 UART: [rt] RT listening for mailbox commands...
26,333,895 UART: [rt]cmd =0x50435245, len=56
26,335,681 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,741 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,335 UART: [kat] SHA2-256
882,266 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,381 UART: [kat] ++
886,533 UART: [kat] sha1
890,839 UART: [kat] SHA2-256
892,777 UART: [kat] SHA2-384
895,576 UART: [kat] SHA2-512-ACC
897,477 UART: [kat] ECC-384
903,090 UART: [kat] HMAC-384Kdf
907,492 UART: [kat] LMS
1,475,688 UART: [kat] --
1,476,653 UART: [cold-reset] ++
1,477,107 UART: [fht] Storing FHT @ 0x50003400
1,479,890 UART: [idev] ++
1,480,058 UART: [idev] CDI.KEYID = 6
1,480,418 UART: [idev] SUBJECT.KEYID = 7
1,480,842 UART: [idev] UDS.KEYID = 0
1,481,187 ready_for_fw is high
1,481,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,708 UART: [idev] Erasing UDS.KEYID = 0
1,505,390 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,854 UART: [idev] --
1,515,039 UART: [ldev] ++
1,515,207 UART: [ldev] CDI.KEYID = 6
1,515,570 UART: [ldev] SUBJECT.KEYID = 5
1,515,996 UART: [ldev] AUTHORITY.KEYID = 7
1,516,459 UART: [ldev] FE.KEYID = 1
1,521,609 UART: [ldev] Erasing FE.KEYID = 1
1,547,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,244 UART: [ldev] --
1,586,579 UART: [fwproc] Waiting for Commands...
1,587,366 UART: [fwproc] Received command 0x46574c44
1,588,157 UART: [fwproc] Received Image of size 114448 bytes
2,886,722 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,756 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,251 >>> mbox cmd response: success
3,080,251 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,081,323 UART: [afmc] ++
3,081,491 UART: [afmc] CDI.KEYID = 6
3,081,853 UART: [afmc] SUBJECT.KEYID = 7
3,082,278 UART: [afmc] AUTHORITY.KEYID = 5
3,117,523 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,825 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,218 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,908 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,735 UART: [afmc] --
3,160,851 UART: [cold-reset] --
3,161,641 UART: [state] Locking Datavault
3,162,880 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,484 UART: [state] Locking ICCM
3,164,018 UART: [exit] Launching FMC @ 0x40000130
3,169,347 UART:
3,169,363 UART: Running Caliptra FMC ...
3,169,771 UART:
3,169,825 UART: [state] CFI Enabled
3,180,296 UART: [fht] FMC Alias Private Key: 7
3,288,265 UART: [art] Extend RT PCRs Done
3,288,693 UART: [art] Lock RT PCRs Done
3,290,063 UART: [art] Populate DV Done
3,298,256 UART: [fht] FMC Alias Private Key: 7
3,299,378 UART: [art] Derive CDI
3,299,658 UART: [art] Store in in slot 0x4
3,385,401 UART: [art] Derive Key Pair
3,385,761 UART: [art] Store priv key in slot 0x5
3,398,667 UART: [art] Derive Key Pair - Done
3,413,734 UART: [art] Signing Cert with AUTHO
3,414,214 UART: RITY.KEYID = 7
3,429,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,613 UART: [art] PUB.X = CCBC8FA6A17A156694A1FF699FA2B8223A19FAFB2591A000E82D602DBE3A28C6DA5D9E0117501D0523983BAC40DFD5F3
3,437,371 UART: [art] PUB.Y = 0D7DE1096200B720C8003F04B6F360E6AC0A862D8FFF04184BD5D7431F18CC1CCEFE5FE7DDD59A063B12F4E60FD2DF2E
3,444,276 UART: [art] SIG.R = B8760D7B3168120D0F12CDEB66314AB9CD47136AEB0361C041AC73365D8C9EF3CFFD3E2975EDD97F5D519BAFA84062E8
3,451,048 UART: [art] SIG.S = 260F53912622B207D21EE6074C2503960BD1112005EB3DAEDE7887DBD5737F6196B981DAC6F06795061D4DCF6368BFA2
3,474,914 UART: Caliptra RT
3,475,167 UART: [state] CFI Enabled
3,582,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,092 UART: [rt]cmd =0x50435245, len=56
3,614,704 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,557 ready_for_fw is high
1,362,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,323 >>> mbox cmd response: success
2,928,323 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,990,219 UART:
2,990,235 UART: Running Caliptra FMC ...
2,990,643 UART:
2,990,697 UART: [state] CFI Enabled
3,001,236 UART: [fht] FMC Alias Private Key: 7
3,108,939 UART: [art] Extend RT PCRs Done
3,109,367 UART: [art] Lock RT PCRs Done
3,110,665 UART: [art] Populate DV Done
3,118,758 UART: [fht] FMC Alias Private Key: 7
3,119,718 UART: [art] Derive CDI
3,119,998 UART: [art] Store in in slot 0x4
3,205,887 UART: [art] Derive Key Pair
3,206,247 UART: [art] Store priv key in slot 0x5
3,219,521 UART: [art] Derive Key Pair - Done
3,234,219 UART: [art] Signing Cert with AUTHO
3,234,699 UART: RITY.KEYID = 7
3,250,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,766 UART: [art] PUB.X = EC25C99858BCF2DA40E700EEE81D4D8B906FCC8A29453E77BF0DBDB326B647B47D09FC64BB8C5A5230AB04954B8BB232
3,257,523 UART: [art] PUB.Y = 0B8A2B58FD0237F3D79188662DABAA87DDC4034E3C393A9F2D5894E529A139A479B26B35E31405969B16C52569CF65A0
3,264,461 UART: [art] SIG.R = E416F4F458D354F1D399328F8374BF9C8706306744406E84845242C0910060D9F361184B56FB4B5E87B93DEB9837EE7D
3,271,196 UART: [art] SIG.S = CB0AFB7F1455FA43EA0875FA72438656AC17606EC669B2B12474CA605C8E55C5CD7B0CAE9E7D50862CD6C3F0B87FAAD5
3,295,234 UART: Caliptra RT
3,295,487 UART: [state] CFI Enabled
3,403,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,495 UART: [rt]cmd =0x50435245, len=56
3,435,959 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,434 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,968 UART: [kat] SHA2-256
881,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,014 UART: [kat] ++
886,166 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,239 UART: [kat] SHA2-512-ACC
897,140 UART: [kat] ECC-384
902,833 UART: [kat] HMAC-384Kdf
907,475 UART: [kat] LMS
1,475,671 UART: [kat] --
1,476,364 UART: [cold-reset] ++
1,476,820 UART: [fht] Storing FHT @ 0x50003400
1,479,613 UART: [idev] ++
1,479,781 UART: [idev] CDI.KEYID = 6
1,480,141 UART: [idev] SUBJECT.KEYID = 7
1,480,565 UART: [idev] UDS.KEYID = 0
1,480,910 ready_for_fw is high
1,480,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,611 UART: [idev] Erasing UDS.KEYID = 0
1,505,283 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,019 UART: [idev] --
1,514,968 UART: [ldev] ++
1,515,136 UART: [ldev] CDI.KEYID = 6
1,515,499 UART: [ldev] SUBJECT.KEYID = 5
1,515,925 UART: [ldev] AUTHORITY.KEYID = 7
1,516,388 UART: [ldev] FE.KEYID = 1
1,521,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,323 UART: [ldev] --
1,586,808 UART: [fwproc] Waiting for Commands...
1,587,439 UART: [fwproc] Received command 0x46574c44
1,588,230 UART: [fwproc] Received Image of size 114448 bytes
2,887,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,211 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,522 >>> mbox cmd response: success
3,079,522 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,080,586 UART: [afmc] ++
3,080,754 UART: [afmc] CDI.KEYID = 6
3,081,116 UART: [afmc] SUBJECT.KEYID = 7
3,081,541 UART: [afmc] AUTHORITY.KEYID = 5
3,116,732 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,292 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,800 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,685 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,375 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,264 UART: [afmc] --
3,160,262 UART: [cold-reset] --
3,160,918 UART: [state] Locking Datavault
3,162,285 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,889 UART: [state] Locking ICCM
3,163,475 UART: [exit] Launching FMC @ 0x40000130
3,168,804 UART:
3,168,820 UART: Running Caliptra FMC ...
3,169,228 UART:
3,169,371 UART: [state] CFI Enabled
3,179,856 UART: [fht] FMC Alias Private Key: 7
3,287,305 UART: [art] Extend RT PCRs Done
3,287,733 UART: [art] Lock RT PCRs Done
3,289,339 UART: [art] Populate DV Done
3,297,804 UART: [fht] FMC Alias Private Key: 7
3,298,962 UART: [art] Derive CDI
3,299,242 UART: [art] Store in in slot 0x4
3,385,191 UART: [art] Derive Key Pair
3,385,551 UART: [art] Store priv key in slot 0x5
3,398,715 UART: [art] Derive Key Pair - Done
3,413,634 UART: [art] Signing Cert with AUTHO
3,414,114 UART: RITY.KEYID = 7
3,429,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,799 UART: [art] PUB.X = 4ADA2122C964EA8021ED41F657C87F3C2D2DE2F77B185B8141DC70031B09F9615B83529F2E67626B1CB12CAC867C156F
3,436,567 UART: [art] PUB.Y = DCB9AE63B2699F7C547DFE461C625318B5274D3A6E884421174E4710827D0C97EC9A80FC51361BB1973DD785DBF7F124
3,443,516 UART: [art] SIG.R = AC5A17CCFF652F062930DDA2391EBB1CEFB573583C002DE396F75C5654B28F41190F961CCBF327010DCA6BA646492158
3,450,260 UART: [art] SIG.S = 8F88343BD55056F72F4E4C5110470F5C2BDB9B314404A5CF51472608B06F236D55486DAC52DCCCDCA2E889CFF0A247AF
3,474,110 UART: Caliptra RT
3,474,455 UART: [state] CFI Enabled
3,582,973 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,785 UART: [rt]cmd =0x50435245, len=56
3,615,319 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,028 ready_for_fw is high
1,363,028 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,198 >>> mbox cmd response: success
2,929,198 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,990,902 UART:
2,990,918 UART: Running Caliptra FMC ...
2,991,326 UART:
2,991,469 UART: [state] CFI Enabled
3,001,910 UART: [fht] FMC Alias Private Key: 7
3,109,983 UART: [art] Extend RT PCRs Done
3,110,411 UART: [art] Lock RT PCRs Done
3,112,351 UART: [art] Populate DV Done
3,120,678 UART: [fht] FMC Alias Private Key: 7
3,121,810 UART: [art] Derive CDI
3,122,090 UART: [art] Store in in slot 0x4
3,208,039 UART: [art] Derive Key Pair
3,208,399 UART: [art] Store priv key in slot 0x5
3,222,037 UART: [art] Derive Key Pair - Done
3,236,837 UART: [art] Signing Cert with AUTHO
3,237,317 UART: RITY.KEYID = 7
3,252,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,108 UART: [art] PUB.X = C403AFBCB1A559C5580C629016C2AD4CF9F0A27ADFFDC3ADB6603AAC23E3EF83057336C2B6B09378495F35121420254F
3,259,879 UART: [art] PUB.Y = 056B604246315BD705C23265DF4B1CD2E346F54CC4800B6EE974FA637D18F8924133D752F810C03B45274DB58A0D0168
3,266,808 UART: [art] SIG.R = 3C101C514375D12F89D8F782FCC972D5A65E3DC0E8336E7E9AA9E44DD6DB6EEBCFBCFE1E81EB3C69F13A203417089924
3,273,591 UART: [art] SIG.S = 735A6F3B02301128DB88BEE4C02307205922330AA6DA9FB423ECDD25641B7C798A8A9FC647CCB7FDACBF7B6FC92DD538
3,296,917 UART: Caliptra RT
3,297,262 UART: [state] CFI Enabled
3,405,734 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,770 UART: [rt]cmd =0x50435245, len=56
3,438,142 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
893,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,657 UART: [kat] ++
897,809 UART: [kat] sha1
901,849 UART: [kat] SHA2-256
903,789 UART: [kat] SHA2-384
906,596 UART: [kat] SHA2-512-ACC
908,497 UART: [kat] ECC-384
918,092 UART: [kat] HMAC-384Kdf
922,794 UART: [kat] LMS
1,171,122 UART: [kat] --
1,172,109 UART: [cold-reset] ++
1,172,475 UART: [fht] FHT @ 0x50003400
1,174,950 UART: [idev] ++
1,175,118 UART: [idev] CDI.KEYID = 6
1,175,478 UART: [idev] SUBJECT.KEYID = 7
1,175,902 UART: [idev] UDS.KEYID = 0
1,176,247 ready_for_fw is high
1,176,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,142 UART: [idev] Erasing UDS.KEYID = 0
1,201,533 UART: [idev] Sha1 KeyId Algorithm
1,209,953 UART: [idev] --
1,211,011 UART: [ldev] ++
1,211,179 UART: [ldev] CDI.KEYID = 6
1,211,542 UART: [ldev] SUBJECT.KEYID = 5
1,211,968 UART: [ldev] AUTHORITY.KEYID = 7
1,212,431 UART: [ldev] FE.KEYID = 1
1,217,199 UART: [ldev] Erasing FE.KEYID = 1
1,243,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,281 UART: [ldev] --
1,282,570 UART: [fwproc] Wait for Commands...
1,283,228 UART: [fwproc] Recv command 0x46574c44
1,283,956 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,218 >>> mbox cmd response: success
2,776,218 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,777,276 UART: [afmc] ++
2,777,444 UART: [afmc] CDI.KEYID = 6
2,777,806 UART: [afmc] SUBJECT.KEYID = 7
2,778,231 UART: [afmc] AUTHORITY.KEYID = 5
2,813,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,674 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,393 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,079 UART: [afmc] --
2,857,175 UART: [cold-reset] --
2,858,029 UART: [state] Locking Datavault
2,859,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,734 UART: [state] Locking ICCM
2,860,184 UART: [exit] Launching FMC @ 0x40000130
2,865,513 UART:
2,865,529 UART: Running Caliptra FMC ...
2,865,937 UART:
2,865,991 UART: [state] CFI Enabled
2,876,214 UART: [fht] FMC Alias Private Key: 7
2,984,043 UART: [art] Extend RT PCRs Done
2,984,471 UART: [art] Lock RT PCRs Done
2,986,055 UART: [art] Populate DV Done
2,994,388 UART: [fht] FMC Alias Private Key: 7
2,995,378 UART: [art] Derive CDI
2,995,658 UART: [art] Store in in slot 0x4
3,081,051 UART: [art] Derive Key Pair
3,081,411 UART: [art] Store priv key in slot 0x5
3,095,043 UART: [art] Derive Key Pair - Done
3,109,659 UART: [art] Signing Cert with AUTHO
3,110,139 UART: RITY.KEYID = 7
3,125,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,992 UART: [art] PUB.X = B0028C1013869F136B59670697EEC40E2906471D466E9B230F12909A99058F8A8F04D169901B165528A3DF7FBB75925A
3,132,729 UART: [art] PUB.Y = D31E981748EAA7F0B69EB4E78421A81058B5330811CD7743488879FB2E1A94C0FD566F5E3DCFB42BBAA8A35AB4FCD3D6
3,139,690 UART: [art] SIG.R = 86ECC1DC14B7A4D765562C884977EC74B1EA7307388B49BFC12697C91A1118BDF935EBAD0605638D02769F94C0BAD0FD
3,146,456 UART: [art] SIG.S = 554DD678F0776E7D6AC890FFAC7CB1B8C7973480AAD50B094669FC6503A30484FAB285433ED27601A4BBC3A4B973346A
3,170,058 UART: Caliptra RT
3,170,311 UART: [state] CFI Enabled
3,278,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,406 UART: [rt]cmd =0x50435245, len=56
3,310,528 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,477 ready_for_fw is high
1,060,477 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,747 >>> mbox cmd response: success
2,626,747 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,689,025 UART:
2,689,041 UART: Running Caliptra FMC ...
2,689,449 UART:
2,689,503 UART: [state] CFI Enabled
2,700,020 UART: [fht] FMC Alias Private Key: 7
2,808,445 UART: [art] Extend RT PCRs Done
2,808,873 UART: [art] Lock RT PCRs Done
2,810,523 UART: [art] Populate DV Done
2,818,814 UART: [fht] FMC Alias Private Key: 7
2,819,826 UART: [art] Derive CDI
2,820,106 UART: [art] Store in in slot 0x4
2,905,269 UART: [art] Derive Key Pair
2,905,629 UART: [art] Store priv key in slot 0x5
2,917,769 UART: [art] Derive Key Pair - Done
2,932,764 UART: [art] Signing Cert with AUTHO
2,933,244 UART: RITY.KEYID = 7
2,948,310 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,075 UART: [art] PUB.X = 66BE4461527FF53213D82A4E2129776CE4592685A78C2A551D202469FF5E1919E60DCC54F5B60E8194816C601C53C212
2,955,829 UART: [art] PUB.Y = 1F3944E1939FFD909384360A68F65FB5B5E320E5001C000C487835F9629351B8659F87A85FDB3FBC78163049C4B870AC
2,962,723 UART: [art] SIG.R = E68CC5735A34FDC1ECA80AEE318A02876ABA39018242D53D5A8337308FFED387436E88D56F8578DF3BCEEF56BB7C8235
2,969,496 UART: [art] SIG.S = B3831FCD969DBA2DC4622FF49339B2980D2F5A103C626AF1FFBEA23F02F355D971F0725266C9F232E7E8CDAAC8897434
2,993,529 UART: Caliptra RT
2,993,782 UART: [state] CFI Enabled
3,101,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,562 UART: [rt]cmd =0x50435245, len=56
3,133,688 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
893,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,506 UART: [kat] ++
897,658 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,791 UART: [kat] SHA2-512-ACC
908,692 UART: [kat] ECC-384
918,195 UART: [kat] HMAC-384Kdf
922,853 UART: [kat] LMS
1,171,181 UART: [kat] --
1,171,868 UART: [cold-reset] ++
1,172,210 UART: [fht] FHT @ 0x50003400
1,174,867 UART: [idev] ++
1,175,035 UART: [idev] CDI.KEYID = 6
1,175,395 UART: [idev] SUBJECT.KEYID = 7
1,175,819 UART: [idev] UDS.KEYID = 0
1,176,164 ready_for_fw is high
1,176,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,165 UART: [idev] Erasing UDS.KEYID = 0
1,200,910 UART: [idev] Sha1 KeyId Algorithm
1,209,286 UART: [idev] --
1,210,248 UART: [ldev] ++
1,210,416 UART: [ldev] CDI.KEYID = 6
1,210,779 UART: [ldev] SUBJECT.KEYID = 5
1,211,205 UART: [ldev] AUTHORITY.KEYID = 7
1,211,668 UART: [ldev] FE.KEYID = 1
1,217,134 UART: [ldev] Erasing FE.KEYID = 1
1,243,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,880 UART: [ldev] --
1,283,213 UART: [fwproc] Wait for Commands...
1,283,889 UART: [fwproc] Recv command 0x46574c44
1,284,617 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,157 >>> mbox cmd response: success
2,778,157 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,779,353 UART: [afmc] ++
2,779,521 UART: [afmc] CDI.KEYID = 6
2,779,883 UART: [afmc] SUBJECT.KEYID = 7
2,780,308 UART: [afmc] AUTHORITY.KEYID = 5
2,815,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,438 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,051 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,770 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,622 UART: [afmc] --
2,858,602 UART: [cold-reset] --
2,859,260 UART: [state] Locking Datavault
2,860,375 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,979 UART: [state] Locking ICCM
2,861,607 UART: [exit] Launching FMC @ 0x40000130
2,866,936 UART:
2,866,952 UART: Running Caliptra FMC ...
2,867,360 UART:
2,867,503 UART: [state] CFI Enabled
2,878,022 UART: [fht] FMC Alias Private Key: 7
2,985,673 UART: [art] Extend RT PCRs Done
2,986,101 UART: [art] Lock RT PCRs Done
2,987,663 UART: [art] Populate DV Done
2,996,204 UART: [fht] FMC Alias Private Key: 7
2,997,132 UART: [art] Derive CDI
2,997,412 UART: [art] Store in in slot 0x4
3,082,941 UART: [art] Derive Key Pair
3,083,301 UART: [art] Store priv key in slot 0x5
3,096,491 UART: [art] Derive Key Pair - Done
3,111,298 UART: [art] Signing Cert with AUTHO
3,111,778 UART: RITY.KEYID = 7
3,126,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,455 UART: [art] PUB.X = EB1FC0DF4F080DD4AA462610577164CC6BCB86E03491F626B05703C015A6570C7AAC64CF7BC36F5ED96A3FBBFDABB324
3,134,233 UART: [art] PUB.Y = F45F0A1A04E96CB3EE946A7672793F615748F718C7921B5F5CC110BFEC9EC7AA56D614ABF99496ECF848D144FA166D39
3,141,187 UART: [art] SIG.R = E9ABDA38211DA4954B35C91191887F2CBC40DDB438AB31AD087582DB59B94EFC56BB8B73F3DE3C8021094A754E1643CA
3,147,963 UART: [art] SIG.S = A6051CC18DC63CCC04596E2EEC26FFA76B159586B6F4980FB302BA153A3DC7D3DC32A12194F6A6DCF0C90C6CF997EA45
3,171,715 UART: Caliptra RT
3,172,060 UART: [state] CFI Enabled
3,280,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,696 UART: [rt]cmd =0x50435245, len=56
3,312,086 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,148 ready_for_fw is high
1,061,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,406 >>> mbox cmd response: success
2,630,406 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,693,098 UART:
2,693,114 UART: Running Caliptra FMC ...
2,693,522 UART:
2,693,665 UART: [state] CFI Enabled
2,704,470 UART: [fht] FMC Alias Private Key: 7
2,812,867 UART: [art] Extend RT PCRs Done
2,813,295 UART: [art] Lock RT PCRs Done
2,814,767 UART: [art] Populate DV Done
2,823,140 UART: [fht] FMC Alias Private Key: 7
2,824,174 UART: [art] Derive CDI
2,824,454 UART: [art] Store in in slot 0x4
2,910,075 UART: [art] Derive Key Pair
2,910,435 UART: [art] Store priv key in slot 0x5
2,923,859 UART: [art] Derive Key Pair - Done
2,938,582 UART: [art] Signing Cert with AUTHO
2,939,062 UART: RITY.KEYID = 7
2,953,958 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,723 UART: [art] PUB.X = 516407C4C786BE6013EC2BC2F1719E55AEA277FB7818C3B5060A15DBFA41EE07C299823AF431B41B8BE7D0B241D7DA98
2,961,491 UART: [art] PUB.Y = 9470EE85741CE8027DAD7F6C1D39CB3FAA25379555B7CC25A2A617A4E59CF75EB81AA0097104AAF3A9578F8D7B8C1001
2,968,439 UART: [art] SIG.R = 1FCF0D7FE81AF06B37DF3A2E2FB90DADE798609756CF8D089CA32A8A3EC0B344A3A0019FE7597FB7703224562101E9B7
2,975,206 UART: [art] SIG.S = 0C106D28DF48F244881681AF01AEB045A59FA64520253347024B1B9A4DE69613AD45B340763BA2CA773C8F3D5B218828
2,999,002 UART: Caliptra RT
2,999,347 UART: [state] CFI Enabled
3,107,904 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,710 UART: [rt]cmd =0x50435245, len=56
3,139,996 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,377 UART: [kat] SHA2-256
901,317 UART: [kat] SHA2-384
903,900 UART: [kat] SHA2-512-ACC
905,801 UART: [kat] ECC-384
915,420 UART: [kat] HMAC-384Kdf
920,058 UART: [kat] LMS
1,168,370 UART: [kat] --
1,169,389 UART: [cold-reset] ++
1,169,955 UART: [fht] FHT @ 0x50003400
1,172,601 UART: [idev] ++
1,172,769 UART: [idev] CDI.KEYID = 6
1,173,130 UART: [idev] SUBJECT.KEYID = 7
1,173,555 UART: [idev] UDS.KEYID = 0
1,173,901 ready_for_fw is high
1,173,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,909 UART: [idev] Erasing UDS.KEYID = 0
1,199,123 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,762 UART: [ldev] Erasing FE.KEYID = 1
1,242,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,364 UART: [ldev] --
1,281,722 UART: [fwproc] Wait for Commands...
1,282,469 UART: [fwproc] Recv command 0x46574c44
1,283,202 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,453 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,762 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,850 >>> mbox cmd response: success
2,774,850 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,775,893 UART: [afmc] ++
2,776,061 UART: [afmc] CDI.KEYID = 6
2,776,424 UART: [afmc] SUBJECT.KEYID = 7
2,776,850 UART: [afmc] AUTHORITY.KEYID = 5
2,811,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,256 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,975 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,742 UART: [afmc] --
2,854,824 UART: [cold-reset] --
2,855,664 UART: [state] Locking Datavault
2,856,983 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,587 UART: [state] Locking ICCM
2,858,233 UART: [exit] Launching FMC @ 0x40000130
2,863,562 UART:
2,863,578 UART: Running Caliptra FMC ...
2,863,986 UART:
2,864,040 UART: [state] CFI Enabled
2,874,603 UART: [fht] FMC Alias Private Key: 7
2,983,420 UART: [art] Extend RT PCRs Done
2,983,848 UART: [art] Lock RT PCRs Done
2,985,262 UART: [art] Populate DV Done
2,993,223 UART: [fht] FMC Alias Private Key: 7
2,994,315 UART: [art] Derive CDI
2,994,595 UART: [art] Store in in slot 0x4
3,080,328 UART: [art] Derive Key Pair
3,080,688 UART: [art] Store priv key in slot 0x5
3,093,986 UART: [art] Derive Key Pair - Done
3,108,915 UART: [art] Signing Cert with AUTHO
3,109,395 UART: RITY.KEYID = 7
3,124,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,224 UART: [art] PUB.X = 24396A28DBC4F023917360D20A6105A9639F80D3EB094A84B432F1CD2A2D9F46D41207F8790C92A3D13F26158D992799
3,131,971 UART: [art] PUB.Y = E9C703D3B972005ADF2573DF76235C949066A4B37379FAF26DE205651653D34FC7E037E64E34D043E9CC01289BBA0D10
3,138,887 UART: [art] SIG.R = 5D5E74415811EDD1021B4B33560692D5FD07C73C9A68F74ED216EB631C1E5CCDB58F24720114099369E0BB1C97E41D68
3,145,642 UART: [art] SIG.S = 9BB72D11CA624569F690E486EB55465DC2B11CA27E7B55F2909BC156FB7D1858F6B1FD4D9D2FCD926415E5D17D7584D5
3,170,313 UART: Caliptra RT
3,170,566 UART: [state] CFI Enabled
3,277,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,587 UART: [rt]cmd =0x50435245, len=56
3,310,257 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,546 ready_for_fw is high
1,055,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,528 >>> mbox cmd response: success
2,624,528 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,920 UART:
2,686,936 UART: Running Caliptra FMC ...
2,687,344 UART:
2,687,398 UART: [state] CFI Enabled
2,697,943 UART: [fht] FMC Alias Private Key: 7
2,806,272 UART: [art] Extend RT PCRs Done
2,806,700 UART: [art] Lock RT PCRs Done
2,808,478 UART: [art] Populate DV Done
2,816,787 UART: [fht] FMC Alias Private Key: 7
2,817,715 UART: [art] Derive CDI
2,817,995 UART: [art] Store in in slot 0x4
2,903,866 UART: [art] Derive Key Pair
2,904,226 UART: [art] Store priv key in slot 0x5
2,917,234 UART: [art] Derive Key Pair - Done
2,932,276 UART: [art] Signing Cert with AUTHO
2,932,756 UART: RITY.KEYID = 7
2,947,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,749 UART: [art] PUB.X = 9BCCD07991B01490F99C83AAFD8B9324759389CDB47CDFAC92AB3D32DF67D945F842C88232C25FEF8DA2A0E0A706593C
2,955,530 UART: [art] PUB.Y = 01F1868BC73C5DDF0B933C244F8D94FDB8611471FFF34D422CE4546984D982F417CDEE199EF4F83285AA839CC96ECD38
2,962,484 UART: [art] SIG.R = 266669F15ECE5C4F58F402EE4D8D5FB2A8159F29B95BB5EB92741EAB97ACA3EEC5DCA37DF899FF4CF7ECBEC85303A318
2,969,274 UART: [art] SIG.S = D6E1C0111B1D6B68CF25191F56A9942499EDFB2AABB917F9207EE8256D15D459D92CCC46013DB74BAE15A18DD95FB841
2,993,250 UART: Caliptra RT
2,993,503 UART: [state] CFI Enabled
3,102,086 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,928 UART: [rt]cmd =0x50435245, len=56
3,134,430 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,828 UART: [kat] SHA2-256
901,768 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,553 UART: [kat] HMAC-384Kdf
921,379 UART: [kat] LMS
1,169,691 UART: [kat] --
1,170,716 UART: [cold-reset] ++
1,171,194 UART: [fht] FHT @ 0x50003400
1,173,782 UART: [idev] ++
1,173,950 UART: [idev] CDI.KEYID = 6
1,174,311 UART: [idev] SUBJECT.KEYID = 7
1,174,736 UART: [idev] UDS.KEYID = 0
1,175,082 ready_for_fw is high
1,175,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,860 UART: [idev] Erasing UDS.KEYID = 0
1,200,410 UART: [idev] Sha1 KeyId Algorithm
1,209,232 UART: [idev] --
1,210,217 UART: [ldev] ++
1,210,385 UART: [ldev] CDI.KEYID = 6
1,210,749 UART: [ldev] SUBJECT.KEYID = 5
1,211,176 UART: [ldev] AUTHORITY.KEYID = 7
1,211,639 UART: [ldev] FE.KEYID = 1
1,216,949 UART: [ldev] Erasing FE.KEYID = 1
1,243,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,177 UART: [ldev] --
1,282,567 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,037 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,805 >>> mbox cmd response: success
2,775,805 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,777,022 UART: [afmc] ++
2,777,190 UART: [afmc] CDI.KEYID = 6
2,777,553 UART: [afmc] SUBJECT.KEYID = 7
2,777,979 UART: [afmc] AUTHORITY.KEYID = 5
2,813,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,375 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,104 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,987 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,706 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,391 UART: [afmc] --
2,856,391 UART: [cold-reset] --
2,856,983 UART: [state] Locking Datavault
2,858,252 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,856 UART: [state] Locking ICCM
2,859,356 UART: [exit] Launching FMC @ 0x40000130
2,864,685 UART:
2,864,701 UART: Running Caliptra FMC ...
2,865,109 UART:
2,865,252 UART: [state] CFI Enabled
2,875,969 UART: [fht] FMC Alias Private Key: 7
2,984,188 UART: [art] Extend RT PCRs Done
2,984,616 UART: [art] Lock RT PCRs Done
2,986,462 UART: [art] Populate DV Done
2,994,713 UART: [fht] FMC Alias Private Key: 7
2,995,715 UART: [art] Derive CDI
2,995,995 UART: [art] Store in in slot 0x4
3,081,670 UART: [art] Derive Key Pair
3,082,030 UART: [art] Store priv key in slot 0x5
3,095,164 UART: [art] Derive Key Pair - Done
3,109,907 UART: [art] Signing Cert with AUTHO
3,110,387 UART: RITY.KEYID = 7
3,125,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,254 UART: [art] PUB.X = 8E1D487D85291E8B98C9339826FAAA9E2415A58287D901E897EEC21F46E792198EF420B3CFA57E938AAFFBD2CEB1F447
3,133,031 UART: [art] PUB.Y = ACA8648394DA444FA9E38B0BFC709D783FA8E81D1B19A434A43C5A00419F64F1B8011B0B3B2FE8DAAFECC90657D1A64F
3,139,965 UART: [art] SIG.R = E62F92336A80C1553DE5DCC7589615E003866FC5D264E3EB45448485539417B2595FAFAE7536E9B174856DC9C4DAF5C4
3,146,732 UART: [art] SIG.S = DE71D76C540327FF01C02B67A2C093E30F5D8488DD5E37BCA6F9A422F28D766F81F98F0E163E4C860617264CB0AF0266
3,171,401 UART: Caliptra RT
3,171,746 UART: [state] CFI Enabled
3,279,262 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,092 UART: [rt]cmd =0x50435245, len=56
3,311,466 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,413 ready_for_fw is high
1,056,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,529 >>> mbox cmd response: success
2,626,529 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,688,515 UART:
2,688,531 UART: Running Caliptra FMC ...
2,688,939 UART:
2,689,082 UART: [state] CFI Enabled
2,699,623 UART: [fht] FMC Alias Private Key: 7
2,808,000 UART: [art] Extend RT PCRs Done
2,808,428 UART: [art] Lock RT PCRs Done
2,809,854 UART: [art] Populate DV Done
2,818,035 UART: [fht] FMC Alias Private Key: 7
2,819,131 UART: [art] Derive CDI
2,819,411 UART: [art] Store in in slot 0x4
2,904,938 UART: [art] Derive Key Pair
2,905,298 UART: [art] Store priv key in slot 0x5
2,918,572 UART: [art] Derive Key Pair - Done
2,933,229 UART: [art] Signing Cert with AUTHO
2,933,709 UART: RITY.KEYID = 7
2,948,849 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,614 UART: [art] PUB.X = 361326D94F264D3D80AEBEC9D6D5C4EFCF497C2E2AB497518BA811A502E239E86D5EAC005F161EB32EF18932F8B392E3
2,956,371 UART: [art] PUB.Y = C799FD76F776DCE5B80A7458ED6A93003DF1E944B2801DB873769708B4D41821D52B44BCAF0DAA2A7725DB1D07C00DC4
2,963,294 UART: [art] SIG.R = 45A259A643EF851ED33EEF4FF4DCA199AA2B310377CAAF10D40DBFF14DDC9B63C5DDD4E175A85EBD246D562199835235
2,970,076 UART: [art] SIG.S = 4FD0156E9E342D525BFC7107755C36784123DEAB1A67DEA17859AA274C3637EAF7A75AE63D4A3987C0BAC244B79206C3
2,993,377 UART: Caliptra RT
2,993,722 UART: [state] CFI Enabled
3,102,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,015 UART: [rt]cmd =0x50435245, len=56
3,134,373 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,174 UART:
192,538 UART: Running Caliptra ROM ...
193,715 UART:
193,869 UART: [state] CFI Enabled
267,789 UART: [state] LifecycleState = Unprovisioned
269,707 UART: [state] DebugLocked = No
271,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,816 UART: [kat] SHA2-256
446,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,043 UART: [kat] ++
457,502 UART: [kat] sha1
467,810 UART: [kat] SHA2-256
470,456 UART: [kat] SHA2-384
477,543 UART: [kat] SHA2-512-ACC
479,875 UART: [kat] ECC-384
2,767,350 UART: [kat] HMAC-384Kdf
2,801,004 UART: [kat] LMS
3,991,289 UART: [kat] --
3,994,891 UART: [cold-reset] ++
3,996,354 UART: [fht] Storing FHT @ 0x50003400
4,007,424 UART: [idev] ++
4,008,007 UART: [idev] CDI.KEYID = 6
4,008,943 UART: [idev] SUBJECT.KEYID = 7
4,010,197 UART: [idev] UDS.KEYID = 0
4,011,262 ready_for_fw is high
4,011,482 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,098 UART: [idev] Erasing UDS.KEYID = 0
7,344,207 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,796 UART: [idev] --
7,369,677 UART: [ldev] ++
7,370,259 UART: [ldev] CDI.KEYID = 6
7,371,249 UART: [ldev] SUBJECT.KEYID = 5
7,372,465 UART: [ldev] AUTHORITY.KEYID = 7
7,373,697 UART: [ldev] FE.KEYID = 1
7,422,423 UART: [ldev] Erasing FE.KEYID = 1
10,756,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,507 UART: [ldev] --
13,134,074 UART: [fwproc] Waiting for Commands...
13,136,119 UART: [fwproc] Received command 0x46574c44
13,138,301 UART: [fwproc] Received Image of size 114124 bytes
17,196,181 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,276,594 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,345,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,661,957 >>> mbox cmd response: success
17,662,505 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,666,424 UART: [afmc] ++
17,667,016 UART: [afmc] CDI.KEYID = 6
17,667,905 UART: [afmc] SUBJECT.KEYID = 7
17,669,175 UART: [afmc] AUTHORITY.KEYID = 5
21,026,706 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,789 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,060 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,489 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,314 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,773 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,353 UART: [afmc] --
23,398,924 UART: [cold-reset] --
23,404,622 UART: [state] Locking Datavault
23,407,821 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,593 UART: [state] Locking ICCM
23,411,995 UART: [exit] Launching FMC @ 0x40000130
23,420,391 UART:
23,420,626 UART: Running Caliptra FMC ...
23,421,652 UART:
23,421,798 UART: [state] CFI Enabled
23,485,323 UART: [fht] FMC Alias Private Key: 7
25,823,032 UART: [art] Extend RT PCRs Done
25,824,256 UART: [art] Lock RT PCRs Done
25,826,128 UART: [art] Populate DV Done
25,831,485 UART: [fht] FMC Alias Private Key: 7
25,833,114 UART: [art] Derive CDI
25,833,860 UART: [art] Store in in slot 0x4
25,892,819 UART: [art] Derive Key Pair
25,893,817 UART: [art] Store priv key in slot 0x5
29,186,861 UART: [art] Derive Key Pair - Done
29,199,882 UART: [art] Signing Cert with AUTHO
29,201,220 UART: RITY.KEYID = 7
31,487,750 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,256 UART: [art] PUB.X = F30B6870B929C835618906E3DC27FF70CA0F5CE5C01EE0CE3B447C2BBE4F25C523C054FC71F9DD26F62493165CFBC1F1
31,496,516 UART: [art] PUB.Y = AB78A566B4C581DB4AF09FFA00188283640AD8BD9B2ABF69736E58E29BC0BA131265690BC4C226D2A4B1435545F13724
31,503,745 UART: [art] SIG.R = 36A95B3532006ABB87883873D1ACA258FF1C4AB1ADB0164E484C0463508B29C15365B51FCDF39FB8A69171CE3C5D82B0
31,511,133 UART: [art] SIG.S = 67F78CB7C181F4CD96623CE01BF06D48B487E9A179087E177B86A932E0F13753ECF0C7A0687052F8688073EAEB47C42E
32,816,655 UART: Caliptra RT
32,817,369 UART: [state] CFI Enabled
32,979,057 UART: [rt] RT listening for mailbox commands...
33,010,419 UART: [rt]cmd =0x50435251, len=36
34,184,956 >>> mbox cmd response data (1848 bytes)
34,193,840 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,224,339 UART: [rt]cmd =0x50435245, len=56
34,227,585 >>> mbox cmd response data (8 bytes)
34,228,453 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,258,643 UART: [rt]cmd =0x50435251, len=36
35,421,926 >>> mbox cmd response data (1848 bytes)
35,431,887 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,462,517 UART: [rt]cmd =0x50435245, len=56
35,465,366 >>> mbox cmd response data (8 bytes)
35,466,095 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,496,095 UART: [rt]cmd =0x50435251, len=36
36,659,127 >>> mbox cmd response data (1848 bytes)
36,668,057 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,698,235 UART: [rt]cmd =0x50435245, len=56
36,701,311 >>> mbox cmd response data (8 bytes)
36,701,819 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,731,606 UART: [rt]cmd =0x50435251, len=36
37,896,659 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,781,964 ready_for_fw is high
3,782,359 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,848,941 >>> mbox cmd response: success
17,849,641 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,542,702 UART:
23,543,092 UART: Running Caliptra FMC ...
23,544,403 UART:
23,544,583 UART: [state] CFI Enabled
23,595,428 UART: [fht] FMC Alias Private Key: 7
25,933,369 UART: [art] Extend RT PCRs Done
25,934,595 UART: [art] Lock RT PCRs Done
25,936,132 UART: [art] Populate DV Done
25,941,294 UART: [fht] FMC Alias Private Key: 7
25,942,840 UART: [art] Derive CDI
25,943,660 UART: [art] Store in in slot 0x4
26,004,718 UART: [art] Derive Key Pair
26,005,760 UART: [art] Store priv key in slot 0x5
29,298,415 UART: [art] Derive Key Pair - Done
29,311,285 UART: [art] Signing Cert with AUTHO
29,312,602 UART: RITY.KEYID = 7
31,599,536 UART: [art] Erasing AUTHORITY.KEYID = 7
31,601,042 UART: [art] PUB.X = 39826B5C9EC671B1DAB42649CCDFCBDE4695AB87C9BE4762BEF587020072508E8CD1FEE0172F0717E3EC4724C922626C
31,608,316 UART: [art] PUB.Y = 18B4E868CC91861700EE808239FCB199743DDBBADF1DA77E69F773D34B4471B34A6B8DF1EAB50ADC850AD8D9FEB1F2B9
31,615,581 UART: [art] SIG.R = FE843A9B8E6591999C3CC47698C383CC0204D432C0775FF9C54B1B2E04E58090DA6206F7DD5217EAA3EF28506B26D5E8
31,622,940 UART: [art] SIG.S = 02C743FCCB03648037F2BAEF229D63C36FB8D218DB399042B3C7A87C440A6F23418B989FF287FFC76C5F5DDAEB5A5280
32,927,822 UART: Caliptra RT
32,928,529 UART: [state] CFI Enabled
33,089,309 UART: [rt] RT listening for mailbox commands...
33,121,044 UART: [rt]cmd =0x50435251, len=36
34,296,207 >>> mbox cmd response data (1848 bytes)
34,305,119 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,335,611 UART: [rt]cmd =0x50435245, len=56
34,338,673 >>> mbox cmd response data (8 bytes)
34,339,455 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,369,510 UART: [rt]cmd =0x50435251, len=36
35,532,815 >>> mbox cmd response data (1848 bytes)
35,542,799 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,573,160 UART: [rt]cmd =0x50435245, len=56
35,576,096 >>> mbox cmd response data (8 bytes)
35,576,826 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,607,021 UART: [rt]cmd =0x50435251, len=36
36,769,634 >>> mbox cmd response data (1848 bytes)
36,778,534 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,808,934 UART: [rt]cmd =0x50435245, len=56
36,811,828 >>> mbox cmd response data (8 bytes)
36,812,390 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,842,209 UART: [rt]cmd =0x50435251, len=36
38,006,769 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,396 UART:
192,778 UART: Running Caliptra ROM ...
193,873 UART:
603,371 UART: [state] CFI Enabled
620,796 UART: [state] LifecycleState = Unprovisioned
622,743 UART: [state] DebugLocked = No
624,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,613 UART: [kat] SHA2-256
799,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,961 UART: [kat] ++
810,406 UART: [kat] sha1
821,890 UART: [kat] SHA2-256
824,576 UART: [kat] SHA2-384
829,931 UART: [kat] SHA2-512-ACC
832,247 UART: [kat] ECC-384
3,115,861 UART: [kat] HMAC-384Kdf
3,126,605 UART: [kat] LMS
4,316,744 UART: [kat] --
4,323,152 UART: [cold-reset] ++
4,324,303 UART: [fht] Storing FHT @ 0x50003400
4,335,136 UART: [idev] ++
4,335,705 UART: [idev] CDI.KEYID = 6
4,336,678 UART: [idev] SUBJECT.KEYID = 7
4,337,919 UART: [idev] UDS.KEYID = 0
4,338,902 ready_for_fw is high
4,339,097 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,783 UART: [idev] Erasing UDS.KEYID = 0
7,629,723 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,660 UART: [idev] --
7,653,412 UART: [ldev] ++
7,653,998 UART: [ldev] CDI.KEYID = 6
7,654,957 UART: [ldev] SUBJECT.KEYID = 5
7,656,160 UART: [ldev] AUTHORITY.KEYID = 7
7,657,440 UART: [ldev] FE.KEYID = 1
7,669,811 UART: [ldev] Erasing FE.KEYID = 1
10,955,803 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,170 UART: [ldev] --
13,314,635 UART: [fwproc] Waiting for Commands...
13,316,673 UART: [fwproc] Received command 0x46574c44
13,318,845 UART: [fwproc] Received Image of size 114124 bytes
17,367,730 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,418 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,344 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,830,565 >>> mbox cmd response: success
17,831,115 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,835,515 UART: [afmc] ++
17,836,088 UART: [afmc] CDI.KEYID = 6
17,836,964 UART: [afmc] SUBJECT.KEYID = 7
17,838,281 UART: [afmc] AUTHORITY.KEYID = 5
21,152,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,642 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,917 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,322 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,118 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,578 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,460 UART: [afmc] --
23,514,452 UART: [cold-reset] --
23,520,305 UART: [state] Locking Datavault
23,526,482 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,239 UART: [state] Locking ICCM
23,530,602 UART: [exit] Launching FMC @ 0x40000130
23,538,987 UART:
23,539,218 UART: Running Caliptra FMC ...
23,540,495 UART:
23,540,682 UART: [state] CFI Enabled
23,548,146 UART: [fht] FMC Alias Private Key: 7
25,879,642 UART: [art] Extend RT PCRs Done
25,880,860 UART: [art] Lock RT PCRs Done
25,882,433 UART: [art] Populate DV Done
25,887,625 UART: [fht] FMC Alias Private Key: 7
25,889,264 UART: [art] Derive CDI
25,890,070 UART: [art] Store in in slot 0x4
25,932,713 UART: [art] Derive Key Pair
25,933,708 UART: [art] Store priv key in slot 0x5
29,175,826 UART: [art] Derive Key Pair - Done
29,188,762 UART: [art] Signing Cert with AUTHO
29,190,062 UART: RITY.KEYID = 7
31,469,350 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,856 UART: [art] PUB.X = CBFC5C041D2622F4CCF0E69C67BD764764649CF135A9F941963A8DCAEBF60DB768AACDE7FEEAF662BAE5E6784F9BD604
31,478,143 UART: [art] PUB.Y = 7EAEEA233F60A18859C549BC7D7C7CCEB4FA547B22AABA3EBAD051DA732C35575BC5D7E081C4BA5341C51DE5781D5FDC
31,485,420 UART: [art] SIG.R = 02465D3088D170838AA1B341DB14B388DE4E132F450CCE470CB1A5C5F20082DB94AAC7B0ECA88B8D955B53E42F6FD99A
31,492,812 UART: [art] SIG.S = 345E6C7726122C7E3462E34E8D942A475F7DEAF38EA14DC8DAA1732D60D0F16ADA5A665DDD43DC23787A22084AE9139C
32,797,283 UART: Caliptra RT
32,797,980 UART: [state] CFI Enabled
32,915,052 UART: [rt] RT listening for mailbox commands...
32,946,513 UART: [rt]cmd =0x50435251, len=36
34,101,984 >>> mbox cmd response data (1848 bytes)
34,111,009 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,141,409 UART: [rt]cmd =0x50435245, len=56
34,144,583 >>> mbox cmd response data (8 bytes)
34,145,583 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,175,555 UART: [rt]cmd =0x50435251, len=36
35,331,149 >>> mbox cmd response data (1848 bytes)
35,341,154 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,371,783 UART: [rt]cmd =0x50435245, len=56
35,374,976 >>> mbox cmd response data (8 bytes)
35,375,681 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,405,707 UART: [rt]cmd =0x50435251, len=36
36,561,125 >>> mbox cmd response data (1848 bytes)
36,570,047 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,600,394 UART: [rt]cmd =0x50435245, len=56
36,603,449 >>> mbox cmd response data (8 bytes)
36,603,952 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,634,001 UART: [rt]cmd =0x50435251, len=36
37,789,192 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
4,131,930 ready_for_fw is high
4,132,347 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,076,262 >>> mbox cmd response: success
18,076,863 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,725,205 UART:
23,725,625 UART: Running Caliptra FMC ...
23,726,808 UART:
23,726,972 UART: [state] CFI Enabled
23,734,653 UART: [fht] FMC Alias Private Key: 7
26,065,455 UART: [art] Extend RT PCRs Done
26,066,682 UART: [art] Lock RT PCRs Done
26,068,283 UART: [art] Populate DV Done
26,073,644 UART: [fht] FMC Alias Private Key: 7
26,075,348 UART: [art] Derive CDI
26,076,082 UART: [art] Store in in slot 0x4
26,118,291 UART: [art] Derive Key Pair
26,119,285 UART: [art] Store priv key in slot 0x5
29,361,223 UART: [art] Derive Key Pair - Done
29,374,333 UART: [art] Signing Cert with AUTHO
29,375,634 UART: RITY.KEYID = 7
31,655,285 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,814 UART: [art] PUB.X = 2EFE74E70E26F472622B8E3A808F43BB9F2AF5A6E13AE7C42F60EB030C050C32D4C749074967EF83F8EAD74B176FB931
31,664,009 UART: [art] PUB.Y = 00F0E2BB56E0CCA2ECAC43554AE1C59214A4AD50B2952BF6C33A08A9FFF298DCA2B119550CAEC00619D114737D21F4D7
31,671,301 UART: [art] SIG.R = 8E8DFFFE649746940528F06401E202980C4A38DC5EB49EE70B96DECDDBDA426281BE861BE209FEE3C10FB720682E73B7
31,678,686 UART: [art] SIG.S = 4336EACB1251702F9DE679A2C0E0BD591D8FB6DBAB93AA44ED9E84DF25927B7929170549BC5B9E9B9EE5F3FEBDAAA2C6
32,984,230 UART: Caliptra RT
32,984,937 UART: [state] CFI Enabled
33,102,674 UART: [rt] RT listening for mailbox commands...
33,134,471 UART: [rt]cmd =0x50435251, len=36
34,290,275 >>> mbox cmd response data (1848 bytes)
34,299,141 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,329,448 UART: [rt]cmd =0x50435245, len=56
34,332,629 >>> mbox cmd response data (8 bytes)
34,333,361 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,363,250 UART: [rt]cmd =0x50435251, len=36
35,518,530 >>> mbox cmd response data (1848 bytes)
35,528,521 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,558,910 UART: [rt]cmd =0x50435245, len=56
35,561,951 >>> mbox cmd response data (8 bytes)
35,562,826 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,592,672 UART: [rt]cmd =0x50435251, len=36
36,748,297 >>> mbox cmd response data (1848 bytes)
36,757,213 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,787,491 UART: [rt]cmd =0x50435245, len=56
36,790,384 >>> mbox cmd response data (8 bytes)
36,790,941 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,820,757 UART: [rt]cmd =0x50435251, len=36
37,976,092 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,269 UART:
192,660 UART: Running Caliptra ROM ...
193,849 UART:
194,001 UART: [state] CFI Enabled
264,748 UART: [state] LifecycleState = Unprovisioned
266,611 UART: [state] DebugLocked = No
268,858 UART: [state] WD Timer not started. Device not locked for debugging
272,968 UART: [kat] SHA2-256
452,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,699 UART: [kat] ++
464,229 UART: [kat] sha1
475,395 UART: [kat] SHA2-256
478,397 UART: [kat] SHA2-384
484,450 UART: [kat] SHA2-512-ACC
487,383 UART: [kat] ECC-384
2,950,069 UART: [kat] HMAC-384Kdf
2,972,307 UART: [kat] LMS
3,501,810 UART: [kat] --
3,506,943 UART: [cold-reset] ++
3,508,091 UART: [fht] FHT @ 0x50003400
3,520,775 UART: [idev] ++
3,521,344 UART: [idev] CDI.KEYID = 6
3,522,252 UART: [idev] SUBJECT.KEYID = 7
3,523,425 UART: [idev] UDS.KEYID = 0
3,524,420 ready_for_fw is high
3,524,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,659 UART: [idev] Erasing UDS.KEYID = 0
6,027,891 UART: [idev] Sha1 KeyId Algorithm
6,051,400 UART: [idev] --
6,055,803 UART: [ldev] ++
6,056,383 UART: [ldev] CDI.KEYID = 6
6,057,293 UART: [ldev] SUBJECT.KEYID = 5
6,058,461 UART: [ldev] AUTHORITY.KEYID = 7
6,059,712 UART: [ldev] FE.KEYID = 1
6,100,762 UART: [ldev] Erasing FE.KEYID = 1
8,607,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,632 UART: [ldev] --
10,414,459 UART: [fwproc] Wait for Commands...
10,416,494 UART: [fwproc] Recv command 0x46574c44
10,418,581 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,771 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,574 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,333 >>> mbox cmd response: success
14,277,914 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,282,319 UART: [afmc] ++
14,282,940 UART: [afmc] CDI.KEYID = 6
14,283,855 UART: [afmc] SUBJECT.KEYID = 7
14,285,018 UART: [afmc] AUTHORITY.KEYID = 5
16,807,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,391 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,176 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,061 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,284 UART: [afmc] --
18,610,802 UART: [cold-reset] --
18,614,160 UART: [state] Locking Datavault
18,620,706 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,357 UART: [state] Locking ICCM
18,623,858 UART: [exit] Launching FMC @ 0x40000130
18,632,273 UART:
18,632,511 UART: Running Caliptra FMC ...
18,633,610 UART:
18,633,778 UART: [state] CFI Enabled
18,691,465 UART: [fht] FMC Alias Private Key: 7
20,455,443 UART: [art] Extend RT PCRs Done
20,456,657 UART: [art] Lock RT PCRs Done
20,458,307 UART: [art] Populate DV Done
20,463,826 UART: [fht] FMC Alias Private Key: 7
20,465,466 UART: [art] Derive CDI
20,466,202 UART: [art] Store in in slot 0x4
20,523,808 UART: [art] Derive Key Pair
20,524,802 UART: [art] Store priv key in slot 0x5
22,987,465 UART: [art] Derive Key Pair - Done
23,000,564 UART: [art] Signing Cert with AUTHO
23,001,868 UART: RITY.KEYID = 7
24,714,335 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,832 UART: [art] PUB.X = 1A205443E120E313B4E5B57710CF6E90B6705A7906A667B51FE32EC96393F5B4F2F1CD532F6055C70AA44540EA2AF589
24,723,092 UART: [art] PUB.Y = BE00A5F023C6EC742FCA8A7BEDE9BA63D9C8A2287B56DA6F9B949B7D924E07A795D1066036F098322EA9F18A630F717C
24,730,341 UART: [art] SIG.R = 72D6884E97F92B62D2893852C2C544D450DEFA148E395254FE23D1BA73EDB8989BBA7F8B6D0F363E5250E63817E4758A
24,737,682 UART: [art] SIG.S = 41CFC26EAE57D4E1D40A71F88B52C3CC2C6CD5898A2F799DD61081A564E8FCB443430616823223A3E597BA713B776204
25,716,439 UART: Caliptra RT
25,717,145 UART: [state] CFI Enabled
25,882,673 UART: [rt] RT listening for mailbox commands...
25,913,971 UART: [rt]cmd =0x50435251, len=36
26,842,085 >>> mbox cmd response data (1848 bytes)
26,851,165 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,881,614 UART: [rt]cmd =0x50435245, len=56
26,884,583 >>> mbox cmd response data (8 bytes)
26,885,302 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,915,198 UART: [rt]cmd =0x50435251, len=36
27,823,058 >>> mbox cmd response data (1848 bytes)
27,833,032 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,863,186 UART: [rt]cmd =0x50435245, len=56
27,866,269 >>> mbox cmd response data (8 bytes)
27,866,969 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,896,946 UART: [rt]cmd =0x50435251, len=36
28,825,500 >>> mbox cmd response data (1848 bytes)
28,834,397 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,864,799 UART: [rt]cmd =0x50435245, len=56
28,867,855 >>> mbox cmd response data (8 bytes)
28,868,434 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,898,636 UART: [rt]cmd =0x50435251, len=36
29,807,057 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,359,875 ready_for_fw is high
3,360,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,051,711 >>> mbox cmd response: success
14,052,522 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,348,943 UART:
18,349,347 UART: Running Caliptra FMC ...
18,350,486 UART:
18,350,649 UART: [state] CFI Enabled
18,414,326 UART: [fht] FMC Alias Private Key: 7
20,178,415 UART: [art] Extend RT PCRs Done
20,179,660 UART: [art] Lock RT PCRs Done
20,181,208 UART: [art] Populate DV Done
20,186,586 UART: [fht] FMC Alias Private Key: 7
20,188,222 UART: [art] Derive CDI
20,188,965 UART: [art] Store in in slot 0x4
20,247,168 UART: [art] Derive Key Pair
20,248,170 UART: [art] Store priv key in slot 0x5
22,711,363 UART: [art] Derive Key Pair - Done
22,724,361 UART: [art] Signing Cert with AUTHO
22,725,663 UART: RITY.KEYID = 7
24,436,873 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,353 UART: [art] PUB.X = 91F8368B086F79DB3863446B6437847B69386DE7EFE1A54D32A0C65CE1BC85092A3F1CAE4A8295D7B8B3FF0A9C3C6CD5
24,445,595 UART: [art] PUB.Y = C81F3E5D3F888850D7584DA742040787F74C0E81ED0A68E5C93A3CEFDCB179881E4073326A48AAB4E2879645EBC6D7C0
24,452,903 UART: [art] SIG.R = E11C8B555D0F0821FE7CBC850FCE183ADCA58B10850FB4409C3B53F45F41C8B078E3F0D7948BC612AAB1BC55E9B7C652
24,460,297 UART: [art] SIG.S = B51DCEF3F9D965EE2399E9FC2A9662C985A6F63B0864CFC1BFEA80FE6F776F089A240A037F0139E2B5D222D998EC9EFA
25,440,060 UART: Caliptra RT
25,440,797 UART: [state] CFI Enabled
25,602,884 UART: [rt] RT listening for mailbox commands...
25,634,662 UART: [rt]cmd =0x50435251, len=36
26,563,315 >>> mbox cmd response data (1848 bytes)
26,572,189 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,602,462 UART: [rt]cmd =0x50435245, len=56
26,605,679 >>> mbox cmd response data (8 bytes)
26,606,476 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,636,400 UART: [rt]cmd =0x50435251, len=36
27,544,686 >>> mbox cmd response data (1848 bytes)
27,554,876 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,585,178 UART: [rt]cmd =0x50435245, len=56
27,588,027 >>> mbox cmd response data (8 bytes)
27,588,735 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,618,729 UART: [rt]cmd =0x50435251, len=36
28,547,252 >>> mbox cmd response data (1848 bytes)
28,556,170 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,586,476 UART: [rt]cmd =0x50435245, len=56
28,589,536 >>> mbox cmd response data (8 bytes)
28,590,093 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,619,969 UART: [rt]cmd =0x50435251, len=36
29,528,290 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,451 UART:
192,811 UART: Running Caliptra ROM ...
193,996 UART:
603,499 UART: [state] CFI Enabled
616,580 UART: [state] LifecycleState = Unprovisioned
618,448 UART: [state] DebugLocked = No
620,311 UART: [state] WD Timer not started. Device not locked for debugging
623,275 UART: [kat] SHA2-256
802,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,015 UART: [kat] ++
814,462 UART: [kat] sha1
826,630 UART: [kat] SHA2-256
829,677 UART: [kat] SHA2-384
837,299 UART: [kat] SHA2-512-ACC
840,224 UART: [kat] ECC-384
3,280,481 UART: [kat] HMAC-384Kdf
3,292,672 UART: [kat] LMS
3,822,130 UART: [kat] --
3,826,330 UART: [cold-reset] ++
3,828,249 UART: [fht] FHT @ 0x50003400
3,838,077 UART: [idev] ++
3,838,647 UART: [idev] CDI.KEYID = 6
3,839,627 UART: [idev] SUBJECT.KEYID = 7
3,840,733 UART: [idev] UDS.KEYID = 0
3,841,687 ready_for_fw is high
3,841,874 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,612 UART: [idev] Erasing UDS.KEYID = 0
6,310,560 UART: [idev] Sha1 KeyId Algorithm
6,333,942 UART: [idev] --
6,337,114 UART: [ldev] ++
6,337,716 UART: [ldev] CDI.KEYID = 6
6,338,628 UART: [ldev] SUBJECT.KEYID = 5
6,339,798 UART: [ldev] AUTHORITY.KEYID = 7
6,341,022 UART: [ldev] FE.KEYID = 1
6,350,850 UART: [ldev] Erasing FE.KEYID = 1
8,821,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,382 UART: [ldev] --
10,614,851 UART: [fwproc] Wait for Commands...
10,616,445 UART: [fwproc] Recv command 0x46574c44
10,618,530 UART: [fwproc] Recv'd Img size: 114448 bytes
14,025,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,485,035 >>> mbox cmd response: success
14,485,601 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,489,668 UART: [afmc] ++
14,490,248 UART: [afmc] CDI.KEYID = 6
14,491,121 UART: [afmc] SUBJECT.KEYID = 7
14,492,329 UART: [afmc] AUTHORITY.KEYID = 5
16,990,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,501 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,277 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,131 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,961 UART: [afmc] --
18,783,113 UART: [cold-reset] --
18,785,676 UART: [state] Locking Datavault
18,791,237 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,877 UART: [state] Locking ICCM
18,795,147 UART: [exit] Launching FMC @ 0x40000130
18,803,534 UART:
18,803,762 UART: Running Caliptra FMC ...
18,804,853 UART:
18,805,001 UART: [state] CFI Enabled
18,813,096 UART: [fht] FMC Alias Private Key: 7
20,569,726 UART: [art] Extend RT PCRs Done
20,570,946 UART: [art] Lock RT PCRs Done
20,572,778 UART: [art] Populate DV Done
20,578,236 UART: [fht] FMC Alias Private Key: 7
20,579,808 UART: [art] Derive CDI
20,580,625 UART: [art] Store in in slot 0x4
20,623,263 UART: [art] Derive Key Pair
20,624,258 UART: [art] Store priv key in slot 0x5
23,051,166 UART: [art] Derive Key Pair - Done
23,064,009 UART: [art] Signing Cert with AUTHO
23,065,379 UART: RITY.KEYID = 7
24,771,107 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,610 UART: [art] PUB.X = 86215FA11E019449B4FC25E5BCE506AB76401221BA2C4AC990248F9E0CB66627007122FA7F93CEE6AE7B1501169BD4FB
24,779,846 UART: [art] PUB.Y = E73BAC046E44BEDD03AC4D7EDCA357A21920E896AE24234255E516C33528D69D9BCAC479268755BD41740B25BE4DAD3E
24,787,127 UART: [art] SIG.R = C4AEA77FF943C9C7CEEA80DD9D45E3C4F5FFB31CAD45D2B6EA2AFBA4C2BBD6D6FFE1AF67A2AFCCA12C0057097F009475
24,794,505 UART: [art] SIG.S = 91E62353FFC2CEAEF5E9F99B8FCBEC25B99464C66EFBD5B1A4594343B9CE67AD4304CEB4730C686248FB009DD66D0CE2
25,773,073 UART: Caliptra RT
25,773,761 UART: [state] CFI Enabled
25,891,449 UART: [rt] RT listening for mailbox commands...
25,923,346 UART: [rt]cmd =0x50435251, len=36
26,831,072 >>> mbox cmd response data (1848 bytes)
26,839,992 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,870,431 UART: [rt]cmd =0x50435245, len=56
26,873,447 >>> mbox cmd response data (8 bytes)
26,874,198 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,904,249 UART: [rt]cmd =0x50435251, len=36
27,811,665 >>> mbox cmd response data (1848 bytes)
27,821,608 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,851,963 UART: [rt]cmd =0x50435245, len=56
27,854,986 >>> mbox cmd response data (8 bytes)
27,855,629 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,885,582 UART: [rt]cmd =0x50435251, len=36
28,793,204 >>> mbox cmd response data (1848 bytes)
28,802,113 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,832,611 UART: [rt]cmd =0x50435245, len=56
28,835,782 >>> mbox cmd response data (8 bytes)
28,836,356 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,866,229 UART: [rt]cmd =0x50435251, len=36
29,773,781 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
3,696,311 ready_for_fw is high
3,696,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,268,247 >>> mbox cmd response: success
14,269,055 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,518,306 UART:
18,518,705 UART: Running Caliptra FMC ...
18,519,804 UART:
18,519,949 UART: [state] CFI Enabled
18,527,949 UART: [fht] FMC Alias Private Key: 7
20,284,554 UART: [art] Extend RT PCRs Done
20,285,773 UART: [art] Lock RT PCRs Done
20,287,267 UART: [art] Populate DV Done
20,292,623 UART: [fht] FMC Alias Private Key: 7
20,294,264 UART: [art] Derive CDI
20,294,994 UART: [art] Store in in slot 0x4
20,337,713 UART: [art] Derive Key Pair
20,338,748 UART: [art] Store priv key in slot 0x5
22,765,870 UART: [art] Derive Key Pair - Done
22,778,918 UART: [art] Signing Cert with AUTHO
22,780,213 UART: RITY.KEYID = 7
24,485,803 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,301 UART: [art] PUB.X = 8D86DA16F96461744615A6D31B17FB48E273E19A6366696532D064734BA9A20EFD05A93C63D9B5FE12F978EFBC879EB1
24,494,600 UART: [art] PUB.Y = 225EB9614E16305E768945F5462D89479082D648EAF4BF72A2F4E061DFE06B7239F348C399EE752F61EEB48B8001689C
24,501,799 UART: [art] SIG.R = BF35F6E46B75CAC6F23FF2072375EE4690DC03DA6C2CA253DF60D9CBC481B27E4B78E926161B10810D491E258DBA81CE
24,509,241 UART: [art] SIG.S = 1AEEA36F8C020972D142E02217249165995AB38B8FE30FEB034CF7AEE2A8A56259D09D63A260EBABD6EA3D2DB19B1D64
25,488,321 UART: Caliptra RT
25,489,021 UART: [state] CFI Enabled
25,607,076 UART: [rt] RT listening for mailbox commands...
25,638,924 UART: [rt]cmd =0x50435251, len=36
26,546,785 >>> mbox cmd response data (1848 bytes)
26,555,829 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,586,409 UART: [rt]cmd =0x50435245, len=56
26,589,486 >>> mbox cmd response data (8 bytes)
26,590,327 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,620,406 UART: [rt]cmd =0x50435251, len=36
27,527,772 >>> mbox cmd response data (1848 bytes)
27,537,913 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,568,377 UART: [rt]cmd =0x50435245, len=56
27,571,223 >>> mbox cmd response data (8 bytes)
27,571,914 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,602,059 UART: [rt]cmd =0x50435251, len=36
28,509,470 >>> mbox cmd response data (1848 bytes)
28,518,389 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,548,549 UART: [rt]cmd =0x50435245, len=56
28,551,727 >>> mbox cmd response data (8 bytes)
28,552,243 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,582,225 UART: [rt]cmd =0x50435251, len=36
29,489,608 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,433,590 ready_for_fw is high
3,433,993 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,000 >>> mbox cmd response: success
14,740,614 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,026,886 UART:
19,027,283 UART: Running Caliptra FMC ...
19,028,486 UART:
19,028,656 UART: [state] CFI Enabled
19,096,122 UART: [fht] FMC Alias Private Key: 7
20,860,298 UART: [art] Extend RT PCRs Done
20,861,521 UART: [art] Lock RT PCRs Done
20,863,153 UART: [art] Populate DV Done
20,868,458 UART: [fht] FMC Alias Private Key: 7
20,870,106 UART: [art] Derive CDI
20,870,939 UART: [art] Store in in slot 0x4
20,928,604 UART: [art] Derive Key Pair
20,929,603 UART: [art] Store priv key in slot 0x5
23,393,085 UART: [art] Derive Key Pair - Done
23,406,039 UART: [art] Signing Cert with AUTHO
23,407,349 UART: RITY.KEYID = 7
25,118,272 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,779 UART: [art] PUB.X = 63050C2C251497E69721C6F3EB255BA8511D26605B7A412C196FA74317008E31C5CC0BB2E7A55838D3488A2564B7232D
25,127,025 UART: [art] PUB.Y = 14D2F8795E035D36D2E5633E9DFCF692DD4016952897A7D1EE1C034D7B7DF24FB961E112673181FFA79651DCE7991CF8
25,134,277 UART: [art] SIG.R = EB6B307C657267C6DE3A4CD75C7A5C07C150A4C6E0C945E324939A4E8923899C07E561904DD05733CCB1FE02C38B9935
25,141,615 UART: [art] SIG.S = 8ECFB9DEB30BA7581EC0AE54E012E0E16B27B2A02B96C3B69B94D6F12B7FF7AAC508A89B147AC8FAAFEEE9A34751F34D
26,120,914 UART: Caliptra RT
26,121,600 UART: [state] CFI Enabled
26,286,287 UART: [rt] RT listening for mailbox commands...
26,317,837 UART: [rt]cmd =0x50435251, len=36
27,245,329 >>> mbox cmd response data (1848 bytes)
27,254,219 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,284,622 UART: [rt]cmd =0x50435245, len=56
27,287,565 >>> mbox cmd response data (8 bytes)
27,288,325 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,318,416 UART: [rt]cmd =0x50435251, len=36
28,226,372 >>> mbox cmd response data (1848 bytes)
28,236,386 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,266,957 UART: [rt]cmd =0x50435245, len=56
28,269,888 >>> mbox cmd response data (8 bytes)
28,270,609 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,300,670 UART: [rt]cmd =0x50435251, len=36
29,229,082 >>> mbox cmd response data (1848 bytes)
29,237,985 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,268,488 UART: [rt]cmd =0x50435245, len=56
29,271,537 >>> mbox cmd response data (8 bytes)
29,272,109 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,301,955 UART: [rt]cmd =0x50435251, len=36
30,210,730 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,758,313 ready_for_fw is high
3,758,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,974,504 >>> mbox cmd response: success
14,975,193 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,225,059 UART:
19,225,443 UART: Running Caliptra FMC ...
19,226,595 UART:
19,226,745 UART: [state] CFI Enabled
19,234,654 UART: [fht] FMC Alias Private Key: 7
20,992,404 UART: [art] Extend RT PCRs Done
20,993,622 UART: [art] Lock RT PCRs Done
20,995,325 UART: [art] Populate DV Done
21,000,791 UART: [fht] FMC Alias Private Key: 7
21,002,340 UART: [art] Derive CDI
21,003,157 UART: [art] Store in in slot 0x4
21,045,791 UART: [art] Derive Key Pair
21,046,844 UART: [art] Store priv key in slot 0x5
23,473,886 UART: [art] Derive Key Pair - Done
23,487,099 UART: [art] Signing Cert with AUTHO
23,488,397 UART: RITY.KEYID = 7
25,193,894 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,395 UART: [art] PUB.X = D77FFEE76497161E47FCCCBE3411CA05C849E6BE1F317B79C17053AA50453A7780A66009E38E4FFBA905DE7120258805
25,202,644 UART: [art] PUB.Y = D2711EA51E05CA8DF30F0BDD114603F2128445FE6267854302B6B19D05FC34A002B703D310E201D923DBEB6069CC3B7B
25,209,891 UART: [art] SIG.R = 00E052CD0442B0BB29F16F937D9F2BF9E826598D2C9BDF9878AE3929C79530C05010709B6504B55884084E1D063B2F53
25,217,230 UART: [art] SIG.S = 253D6D4067740D76EB88A6CB326458AE27F8DDCC28FEE28A5AD43B32ADA8E0FE4D70935F1F76D49C1FF9D866A3917C91
26,195,899 UART: Caliptra RT
26,196,601 UART: [state] CFI Enabled
26,314,099 UART: [rt] RT listening for mailbox commands...
26,346,058 UART: [rt]cmd =0x50435251, len=36
27,253,799 >>> mbox cmd response data (1848 bytes)
27,262,689 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,292,855 UART: [rt]cmd =0x50435245, len=56
27,295,771 >>> mbox cmd response data (8 bytes)
27,296,579 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,326,585 UART: [rt]cmd =0x50435251, len=36
28,234,267 >>> mbox cmd response data (1848 bytes)
28,244,225 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,274,584 UART: [rt]cmd =0x50435245, len=56
28,277,677 >>> mbox cmd response data (8 bytes)
28,278,385 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,308,318 UART: [rt]cmd =0x50435251, len=36
29,215,641 >>> mbox cmd response data (1848 bytes)
29,224,537 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,254,700 UART: [rt]cmd =0x50435245, len=56
29,257,822 >>> mbox cmd response data (8 bytes)
29,258,385 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,288,337 UART: [rt]cmd =0x50435251, len=36
30,196,347 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,015 UART: [kat] SHA2-256
881,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,061 UART: [kat] ++
886,213 UART: [kat] sha1
890,541 UART: [kat] SHA2-256
892,479 UART: [kat] SHA2-384
895,282 UART: [kat] SHA2-512-ACC
897,183 UART: [kat] ECC-384
902,748 UART: [kat] HMAC-384Kdf
907,542 UART: [kat] LMS
1,475,738 UART: [kat] --
1,476,365 UART: [cold-reset] ++
1,476,787 UART: [fht] Storing FHT @ 0x50003400
1,479,542 UART: [idev] ++
1,479,710 UART: [idev] CDI.KEYID = 6
1,480,070 UART: [idev] SUBJECT.KEYID = 7
1,480,494 UART: [idev] UDS.KEYID = 0
1,480,839 ready_for_fw is high
1,480,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,764 UART: [idev] Erasing UDS.KEYID = 0
1,505,106 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,878 UART: [idev] --
1,515,011 UART: [ldev] ++
1,515,179 UART: [ldev] CDI.KEYID = 6
1,515,542 UART: [ldev] SUBJECT.KEYID = 5
1,515,968 UART: [ldev] AUTHORITY.KEYID = 7
1,516,431 UART: [ldev] FE.KEYID = 1
1,521,379 UART: [ldev] Erasing FE.KEYID = 1
1,547,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,834 UART: [ldev] --
1,586,335 UART: [fwproc] Waiting for Commands...
1,587,100 UART: [fwproc] Received command 0x46574c44
1,587,891 UART: [fwproc] Received Image of size 114448 bytes
2,887,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,674 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,026 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,033 >>> mbox cmd response: success
3,079,033 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,080,205 UART: [afmc] ++
3,080,373 UART: [afmc] CDI.KEYID = 6
3,080,735 UART: [afmc] SUBJECT.KEYID = 7
3,081,160 UART: [afmc] AUTHORITY.KEYID = 5
3,116,487 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,493 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,273 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,001 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,886 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,576 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,319 UART: [afmc] --
3,159,199 UART: [cold-reset] --
3,159,863 UART: [state] Locking Datavault
3,160,772 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,376 UART: [state] Locking ICCM
3,161,896 UART: [exit] Launching FMC @ 0x40000130
3,167,225 UART:
3,167,241 UART: Running Caliptra FMC ...
3,167,649 UART:
3,167,703 UART: [state] CFI Enabled
3,178,220 UART: [fht] FMC Alias Private Key: 7
3,285,981 UART: [art] Extend RT PCRs Done
3,286,409 UART: [art] Lock RT PCRs Done
3,287,919 UART: [art] Populate DV Done
3,296,234 UART: [fht] FMC Alias Private Key: 7
3,297,286 UART: [art] Derive CDI
3,297,566 UART: [art] Store in in slot 0x4
3,383,047 UART: [art] Derive Key Pair
3,383,407 UART: [art] Store priv key in slot 0x5
3,396,635 UART: [art] Derive Key Pair - Done
3,411,691 UART: [art] Signing Cert with AUTHO
3,412,171 UART: RITY.KEYID = 7
3,427,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,156 UART: [art] PUB.X = 228B9A832DABE0D7FF0B0A5F5AD32D803E247A8CF6EBC358A418CC869CA15C8D3F2015EA89C47DF55B5957608FA32A87
3,434,936 UART: [art] PUB.Y = ACD9A8150F51885CEDAE0D1E175F9D23D6F0F599041B773E73FD1E36165D017D7723EE7EA4F46F960F3E43C21C4578B8
3,441,879 UART: [art] SIG.R = 5111B1F9235D0B0646102F26B761B6D009AA9CBA781D7FD4A79CC7FE517DAC3C9142212EED2781B1A1FA2FDF9BF0FCA9
3,448,658 UART: [art] SIG.S = 4632E95BED141EBB9D94731CE78B8DBBF4A6E87594604A51D4C33F320CC3D61BC34605D572079BCDDC4F05B1ADFD55DA
3,472,735 UART: Caliptra RT
3,472,988 UART: [state] CFI Enabled
3,582,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,434 UART: [rt]cmd =0x50435251, len=36
3,780,820 >>> mbox cmd response data (1848 bytes)
3,780,821 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,670 UART: [rt]cmd =0x50435245, len=56
3,814,095 >>> mbox cmd response data (8 bytes)
3,814,096 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,551 UART: [rt]cmd =0x50435251, len=36
4,011,003 >>> mbox cmd response data (1848 bytes)
4,011,004 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,040,575 UART: [rt]cmd =0x50435245, len=56
4,044,232 >>> mbox cmd response data (8 bytes)
4,044,233 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,073,638 UART: [rt]cmd =0x50435251, len=36
4,241,124 >>> mbox cmd response data (1848 bytes)
4,241,125 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,652 UART: [rt]cmd =0x50435245, len=56
4,274,191 >>> mbox cmd response data (8 bytes)
4,274,192 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,303,829 UART: [rt]cmd =0x50435251, len=36
4,471,637 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,777 ready_for_fw is high
1,362,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,869 >>> mbox cmd response: success
2,928,869 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,991,079 UART:
2,991,095 UART: Running Caliptra FMC ...
2,991,503 UART:
2,991,557 UART: [state] CFI Enabled
3,002,292 UART: [fht] FMC Alias Private Key: 7
3,110,677 UART: [art] Extend RT PCRs Done
3,111,105 UART: [art] Lock RT PCRs Done
3,112,651 UART: [art] Populate DV Done
3,121,224 UART: [fht] FMC Alias Private Key: 7
3,122,186 UART: [art] Derive CDI
3,122,466 UART: [art] Store in in slot 0x4
3,208,461 UART: [art] Derive Key Pair
3,208,821 UART: [art] Store priv key in slot 0x5
3,222,317 UART: [art] Derive Key Pair - Done
3,237,480 UART: [art] Signing Cert with AUTHO
3,237,960 UART: RITY.KEYID = 7
3,253,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,281 UART: [art] PUB.X = 403F32FD307D8687AA4659C9CD44CB800C322320A6F09392894FE5B287280B9707CB363B1CB1491EF6E2F2E0E844471E
3,261,040 UART: [art] PUB.Y = 009304F2B8174CCA21AF39CEA3A2BD92D72A7AAE41EF53BC8B2C947984E7CC776258157ABBBD3589496F6957547389E3
3,267,971 UART: [art] SIG.R = 37D2BC9922E94F01E09C32712B73312E535797CE9D02BBAADE03F304C6D70FF21086B898BA8C240FE4EE6568D7100C48
3,274,724 UART: [art] SIG.S = E36A480B9F83E24CDC739252C42488CCC6DC426081852711B6C2BB40ADB8DE7166BDFCC97E8165F65DE3E8284DBB5CD5
3,298,218 UART: Caliptra RT
3,298,471 UART: [state] CFI Enabled
3,405,852 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,872 UART: [rt]cmd =0x50435251, len=36
3,604,356 >>> mbox cmd response data (1848 bytes)
3,604,357 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,086 UART: [rt]cmd =0x50435245, len=56
3,637,425 >>> mbox cmd response data (8 bytes)
3,637,426 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,045 UART: [rt]cmd =0x50435251, len=36
3,834,687 >>> mbox cmd response data (1848 bytes)
3,834,688 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,505 UART: [rt]cmd =0x50435245, len=56
3,867,866 >>> mbox cmd response data (8 bytes)
3,867,867 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,897,584 UART: [rt]cmd =0x50435251, len=36
4,064,896 >>> mbox cmd response data (1848 bytes)
4,064,897 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,504 UART: [rt]cmd =0x50435245, len=56
4,098,393 >>> mbox cmd response data (8 bytes)
4,098,394 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,128,035 UART: [rt]cmd =0x50435251, len=36
4,295,103 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,392 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,898 UART: [kat] SHA2-256
881,829 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,944 UART: [kat] ++
886,096 UART: [kat] sha1
890,224 UART: [kat] SHA2-256
892,162 UART: [kat] SHA2-384
894,969 UART: [kat] SHA2-512-ACC
896,870 UART: [kat] ECC-384
902,469 UART: [kat] HMAC-384Kdf
907,141 UART: [kat] LMS
1,475,337 UART: [kat] --
1,476,500 UART: [cold-reset] ++
1,476,942 UART: [fht] Storing FHT @ 0x50003400
1,479,761 UART: [idev] ++
1,479,929 UART: [idev] CDI.KEYID = 6
1,480,289 UART: [idev] SUBJECT.KEYID = 7
1,480,713 UART: [idev] UDS.KEYID = 0
1,481,058 ready_for_fw is high
1,481,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,739 UART: [idev] Erasing UDS.KEYID = 0
1,505,707 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,341 UART: [idev] --
1,515,536 UART: [ldev] ++
1,515,704 UART: [ldev] CDI.KEYID = 6
1,516,067 UART: [ldev] SUBJECT.KEYID = 5
1,516,493 UART: [ldev] AUTHORITY.KEYID = 7
1,516,956 UART: [ldev] FE.KEYID = 1
1,522,292 UART: [ldev] Erasing FE.KEYID = 1
1,547,609 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,265 UART: [ldev] --
1,586,714 UART: [fwproc] Waiting for Commands...
1,587,471 UART: [fwproc] Received command 0x46574c44
1,588,262 UART: [fwproc] Received Image of size 114448 bytes
2,887,521 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,903 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,255 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,198 >>> mbox cmd response: success
3,080,198 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,081,442 UART: [afmc] ++
3,081,610 UART: [afmc] CDI.KEYID = 6
3,081,972 UART: [afmc] SUBJECT.KEYID = 7
3,082,397 UART: [afmc] AUTHORITY.KEYID = 5
3,117,522 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,508 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,288 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,901 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,591 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,324 UART: [afmc] --
3,160,390 UART: [cold-reset] --
3,161,320 UART: [state] Locking Datavault
3,162,675 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,279 UART: [state] Locking ICCM
3,163,817 UART: [exit] Launching FMC @ 0x40000130
3,169,146 UART:
3,169,162 UART: Running Caliptra FMC ...
3,169,570 UART:
3,169,713 UART: [state] CFI Enabled
3,180,166 UART: [fht] FMC Alias Private Key: 7
3,288,343 UART: [art] Extend RT PCRs Done
3,288,771 UART: [art] Lock RT PCRs Done
3,290,333 UART: [art] Populate DV Done
3,298,602 UART: [fht] FMC Alias Private Key: 7
3,299,712 UART: [art] Derive CDI
3,299,992 UART: [art] Store in in slot 0x4
3,385,949 UART: [art] Derive Key Pair
3,386,309 UART: [art] Store priv key in slot 0x5
3,399,535 UART: [art] Derive Key Pair - Done
3,414,701 UART: [art] Signing Cert with AUTHO
3,415,181 UART: RITY.KEYID = 7
3,430,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,302 UART: [art] PUB.X = 49A85EC5F24C915576C23064E4F6AB0E744ABA652CE8A01FBED7B26F07AFB4B8079BC1817173636DA8FF1FD2E518D3B7
3,438,077 UART: [art] PUB.Y = 9D8BFC9B393885110041C519F76ACD0824667AE29F195ED00E77958058CC1B2556AD6F2EB6DD7322C5D00A08815B0F5B
3,444,992 UART: [art] SIG.R = 913660EA7ED44AB746DFA305419EA169AD548D9D94B58C03F7D68E7851A5C94EA47E1CBDFEA96F6F98311FC8289EBF5A
3,451,772 UART: [art] SIG.S = 3C7AE6EE565D99FB97DBB5896336C7BD38346923E0D7EFFFC329C7106195BD2BF5125351A6C0175F5973AD667EEB12FB
3,475,955 UART: Caliptra RT
3,476,300 UART: [state] CFI Enabled
3,584,397 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,099 UART: [rt]cmd =0x50435251, len=36
3,782,417 >>> mbox cmd response data (1848 bytes)
3,782,418 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,213 UART: [rt]cmd =0x50435245, len=56
3,815,604 >>> mbox cmd response data (8 bytes)
3,815,605 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,234 UART: [rt]cmd =0x50435251, len=36
4,012,632 >>> mbox cmd response data (1848 bytes)
4,012,633 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,480 UART: [rt]cmd =0x50435245, len=56
4,045,927 >>> mbox cmd response data (8 bytes)
4,045,928 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,075,473 UART: [rt]cmd =0x50435251, len=36
4,242,847 >>> mbox cmd response data (1848 bytes)
4,242,848 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,272,369 UART: [rt]cmd =0x50435245, len=56
4,275,864 >>> mbox cmd response data (8 bytes)
4,275,865 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,305,456 UART: [rt]cmd =0x50435251, len=36
4,472,814 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,372 ready_for_fw is high
1,362,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,474 >>> mbox cmd response: success
2,930,474 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,992,366 UART:
2,992,382 UART: Running Caliptra FMC ...
2,992,790 UART:
2,992,933 UART: [state] CFI Enabled
3,003,272 UART: [fht] FMC Alias Private Key: 7
3,111,151 UART: [art] Extend RT PCRs Done
3,111,579 UART: [art] Lock RT PCRs Done
3,113,151 UART: [art] Populate DV Done
3,121,372 UART: [fht] FMC Alias Private Key: 7
3,122,494 UART: [art] Derive CDI
3,122,774 UART: [art] Store in in slot 0x4
3,208,547 UART: [art] Derive Key Pair
3,208,907 UART: [art] Store priv key in slot 0x5
3,222,207 UART: [art] Derive Key Pair - Done
3,236,976 UART: [art] Signing Cert with AUTHO
3,237,456 UART: RITY.KEYID = 7
3,252,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,303 UART: [art] PUB.X = A763AD67C4C1EF52DB328BD3D8E3FBB714B0549E7293C8D3C302D07B253B9FBF562F302E95C72BEFF631F35C3AE1BEB9
3,260,090 UART: [art] PUB.Y = 38BF9C93B6F6986DC41B0149F7101B070C4E111E7804716EA2D21FB7E38756288EEF41916C5A10373FBC99DAE8A7F273
3,267,030 UART: [art] SIG.R = 47921196538D91A30F4CA9B2C38AD6A3E7AB16DDD16B42CBB50DBBAC23C6B0CEA62176F3FF7EB8F5C0C5E624EB3F3689
3,273,816 UART: [art] SIG.S = 7D6352E39022A46BD1405AE0871C2EF5A2B84311BD9B596880DF82D7B31ED0814A08A4C6C666A41E7FCA3750628CBEEE
3,297,646 UART: Caliptra RT
3,297,991 UART: [state] CFI Enabled
3,406,759 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,521 UART: [rt]cmd =0x50435251, len=36
3,604,933 >>> mbox cmd response data (1848 bytes)
3,604,934 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,625 UART: [rt]cmd =0x50435245, len=56
3,638,134 >>> mbox cmd response data (8 bytes)
3,638,135 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,762 UART: [rt]cmd =0x50435251, len=36
3,835,292 >>> mbox cmd response data (1848 bytes)
3,835,293 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,972 UART: [rt]cmd =0x50435245, len=56
3,868,809 >>> mbox cmd response data (8 bytes)
3,868,810 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,898,257 UART: [rt]cmd =0x50435251, len=36
4,065,723 >>> mbox cmd response data (1848 bytes)
4,065,724 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,095,433 UART: [rt]cmd =0x50435245, len=56
4,098,996 >>> mbox cmd response data (8 bytes)
4,098,997 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,128,652 UART: [rt]cmd =0x50435251, len=36
4,296,314 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
893,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,147 UART: [kat] ++
897,299 UART: [kat] sha1
901,661 UART: [kat] SHA2-256
903,601 UART: [kat] SHA2-384
906,572 UART: [kat] SHA2-512-ACC
908,473 UART: [kat] ECC-384
918,434 UART: [kat] HMAC-384Kdf
922,968 UART: [kat] LMS
1,171,296 UART: [kat] --
1,171,983 UART: [cold-reset] ++
1,172,527 UART: [fht] FHT @ 0x50003400
1,175,132 UART: [idev] ++
1,175,300 UART: [idev] CDI.KEYID = 6
1,175,660 UART: [idev] SUBJECT.KEYID = 7
1,176,084 UART: [idev] UDS.KEYID = 0
1,176,429 ready_for_fw is high
1,176,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,350 UART: [idev] Erasing UDS.KEYID = 0
1,200,997 UART: [idev] Sha1 KeyId Algorithm
1,209,375 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,808 UART: [ldev] SUBJECT.KEYID = 5
1,211,234 UART: [ldev] AUTHORITY.KEYID = 7
1,211,697 UART: [ldev] FE.KEYID = 1
1,216,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,403 UART: [ldev] --
1,281,908 UART: [fwproc] Wait for Commands...
1,282,698 UART: [fwproc] Recv command 0x46574c44
1,283,426 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,477 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,520 >>> mbox cmd response: success
2,775,520 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,776,650 UART: [afmc] ++
2,776,818 UART: [afmc] CDI.KEYID = 6
2,777,180 UART: [afmc] SUBJECT.KEYID = 7
2,777,605 UART: [afmc] AUTHORITY.KEYID = 5
2,812,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,540 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,259 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,961 UART: [afmc] --
2,855,869 UART: [cold-reset] --
2,856,699 UART: [state] Locking Datavault
2,857,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,280 UART: [state] Locking ICCM
2,858,848 UART: [exit] Launching FMC @ 0x40000130
2,864,177 UART:
2,864,193 UART: Running Caliptra FMC ...
2,864,601 UART:
2,864,655 UART: [state] CFI Enabled
2,874,842 UART: [fht] FMC Alias Private Key: 7
2,982,335 UART: [art] Extend RT PCRs Done
2,982,763 UART: [art] Lock RT PCRs Done
2,984,147 UART: [art] Populate DV Done
2,992,116 UART: [fht] FMC Alias Private Key: 7
2,993,144 UART: [art] Derive CDI
2,993,424 UART: [art] Store in in slot 0x4
3,079,091 UART: [art] Derive Key Pair
3,079,451 UART: [art] Store priv key in slot 0x5
3,092,847 UART: [art] Derive Key Pair - Done
3,107,483 UART: [art] Signing Cert with AUTHO
3,107,963 UART: RITY.KEYID = 7
3,122,795 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,560 UART: [art] PUB.X = 0A71E20113C37727865501E41E4199FC5B692BCEC170010FD404D2F2D3057226A19F2411771D1337707971D54A20AD8D
3,130,297 UART: [art] PUB.Y = 5B1AB18B2BC19623B5F2F2D1430266E109BCE0C6D532BCCEA36B97770ABEFA011FBBAAC5C74E6154A34AEEEE7D2F3FE9
3,137,263 UART: [art] SIG.R = 9A66CD2E2BD7481ABB1051DD539E7FA6E15A40C7F5150C9BFDABD857AD556FAF44692DF4FA39CA42B8DF6F449E7099C8
3,144,052 UART: [art] SIG.S = FD42C0D4BEE41E6BB849FDBB77C86C0F0B2FE44EA76D7EE62BF4B39DA6B305B11987CD629A1B36C72429BF64BED51410
3,167,928 UART: Caliptra RT
3,168,181 UART: [state] CFI Enabled
3,275,371 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,695 UART: [rt]cmd =0x50435251, len=36
3,473,191 >>> mbox cmd response data (1848 bytes)
3,473,192 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,857 UART: [rt]cmd =0x50435245, len=56
3,506,594 >>> mbox cmd response data (8 bytes)
3,506,595 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,198 UART: [rt]cmd =0x50435251, len=36
3,703,340 >>> mbox cmd response data (1848 bytes)
3,703,341 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,028 UART: [rt]cmd =0x50435245, len=56
3,736,587 >>> mbox cmd response data (8 bytes)
3,736,588 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,897 UART: [rt]cmd =0x50435251, len=36
3,933,349 >>> mbox cmd response data (1848 bytes)
3,933,350 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,245 UART: [rt]cmd =0x50435245, len=56
3,967,190 >>> mbox cmd response data (8 bytes)
3,967,191 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,996,594 UART: [rt]cmd =0x50435251, len=36
4,164,064 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,387 ready_for_fw is high
1,060,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,463 >>> mbox cmd response: success
2,629,463 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,691,937 UART:
2,691,953 UART: Running Caliptra FMC ...
2,692,361 UART:
2,692,415 UART: [state] CFI Enabled
2,703,018 UART: [fht] FMC Alias Private Key: 7
2,811,317 UART: [art] Extend RT PCRs Done
2,811,745 UART: [art] Lock RT PCRs Done
2,813,371 UART: [art] Populate DV Done
2,821,302 UART: [fht] FMC Alias Private Key: 7
2,822,262 UART: [art] Derive CDI
2,822,542 UART: [art] Store in in slot 0x4
2,908,281 UART: [art] Derive Key Pair
2,908,641 UART: [art] Store priv key in slot 0x5
2,921,877 UART: [art] Derive Key Pair - Done
2,936,896 UART: [art] Signing Cert with AUTHO
2,937,376 UART: RITY.KEYID = 7
2,952,790 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,555 UART: [art] PUB.X = 30E9070C12B190A64B381A4F3FF51D8B0A33429A2BDE6201BD631CD94409862A1791E8A320708A847D16B4DCB0E99731
2,960,308 UART: [art] PUB.Y = C380F6D6615A259B92E380DDB3A2C9096A32019D5C18A97DBC1975CD047D96D7C6CDA040E113BDC94989ABF34A92D3D9
2,967,259 UART: [art] SIG.R = 22B0EA877AC5D72B7806ABB74EF6B0A29169AF88E60C7ACE01C70D68CFDD14C09CA69775C076A78DC4C17E50D97472BE
2,974,033 UART: [art] SIG.S = BC3EAF4C0B6A04209F8964E7FECA3DFFA6FDD8C4E7FAD4BA5697BA665D9114DF52C9354BC7A802B8CE435F38044BA7BA
2,998,170 UART: Caliptra RT
2,998,423 UART: [state] CFI Enabled
3,106,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,966 UART: [rt]cmd =0x50435251, len=36
3,304,300 >>> mbox cmd response data (1848 bytes)
3,304,301 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,196 UART: [rt]cmd =0x50435245, len=56
3,337,909 >>> mbox cmd response data (8 bytes)
3,337,910 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,421 UART: [rt]cmd =0x50435251, len=36
3,534,991 >>> mbox cmd response data (1848 bytes)
3,534,992 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,741 UART: [rt]cmd =0x50435245, len=56
3,568,198 >>> mbox cmd response data (8 bytes)
3,568,199 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,610 UART: [rt]cmd =0x50435251, len=36
3,764,892 >>> mbox cmd response data (1848 bytes)
3,764,893 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,452 UART: [rt]cmd =0x50435245, len=56
3,797,979 >>> mbox cmd response data (8 bytes)
3,797,980 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,653 UART: [rt]cmd =0x50435251, len=36
3,995,055 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
893,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,702 UART: [kat] ++
897,854 UART: [kat] sha1
902,216 UART: [kat] SHA2-256
904,156 UART: [kat] SHA2-384
906,923 UART: [kat] SHA2-512-ACC
908,824 UART: [kat] ECC-384
918,329 UART: [kat] HMAC-384Kdf
923,021 UART: [kat] LMS
1,171,349 UART: [kat] --
1,172,374 UART: [cold-reset] ++
1,172,926 UART: [fht] FHT @ 0x50003400
1,175,549 UART: [idev] ++
1,175,717 UART: [idev] CDI.KEYID = 6
1,176,077 UART: [idev] SUBJECT.KEYID = 7
1,176,501 UART: [idev] UDS.KEYID = 0
1,176,846 ready_for_fw is high
1,176,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,933 UART: [idev] Erasing UDS.KEYID = 0
1,202,080 UART: [idev] Sha1 KeyId Algorithm
1,210,424 UART: [idev] --
1,211,252 UART: [ldev] ++
1,211,420 UART: [ldev] CDI.KEYID = 6
1,211,783 UART: [ldev] SUBJECT.KEYID = 5
1,212,209 UART: [ldev] AUTHORITY.KEYID = 7
1,212,672 UART: [ldev] FE.KEYID = 1
1,217,894 UART: [ldev] Erasing FE.KEYID = 1
1,243,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,160 UART: [ldev] --
1,283,543 UART: [fwproc] Wait for Commands...
1,284,131 UART: [fwproc] Recv command 0x46574c44
1,284,859 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,903 >>> mbox cmd response: success
2,776,903 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,778,157 UART: [afmc] ++
2,778,325 UART: [afmc] CDI.KEYID = 6
2,778,687 UART: [afmc] SUBJECT.KEYID = 7
2,779,112 UART: [afmc] AUTHORITY.KEYID = 5
2,814,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,814 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,542 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,427 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,146 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,994 UART: [afmc] --
2,857,874 UART: [cold-reset] --
2,858,816 UART: [state] Locking Datavault
2,859,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,471 UART: [state] Locking ICCM
2,861,009 UART: [exit] Launching FMC @ 0x40000130
2,866,338 UART:
2,866,354 UART: Running Caliptra FMC ...
2,866,762 UART:
2,866,905 UART: [state] CFI Enabled
2,877,956 UART: [fht] FMC Alias Private Key: 7
2,986,239 UART: [art] Extend RT PCRs Done
2,986,667 UART: [art] Lock RT PCRs Done
2,988,065 UART: [art] Populate DV Done
2,996,016 UART: [fht] FMC Alias Private Key: 7
2,996,984 UART: [art] Derive CDI
2,997,264 UART: [art] Store in in slot 0x4
3,082,997 UART: [art] Derive Key Pair
3,083,357 UART: [art] Store priv key in slot 0x5
3,096,797 UART: [art] Derive Key Pair - Done
3,111,850 UART: [art] Signing Cert with AUTHO
3,112,330 UART: RITY.KEYID = 7
3,127,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,401 UART: [art] PUB.X = D65B929AA28E847151F2FDE78D57E16B4CEAC7FE714B96552893290791858CE08A8DA3CD173B246D0F3544263340ECDB
3,135,169 UART: [art] PUB.Y = E5163FF167DA3AB8093B601E354D3AD49FB4DE2B29A96207878A3057FB219B269B911917977D7173AE419DEBD289C914
3,142,113 UART: [art] SIG.R = B958AC52BC566ED9BD5FD7D4A4628B3E1DAF3C0A57C842D8C346FC526E81CE5653F64A8C8F6F6F212E8C2BC1D41150A5
3,148,898 UART: [art] SIG.S = B8BC5437BA4F938DDB6EC8F671B5143481F294082EB98221832FA022CB0CE3F5294F95F85491B11D7FEFF0A074303D50
3,173,079 UART: Caliptra RT
3,173,424 UART: [state] CFI Enabled
3,280,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,418 UART: [rt]cmd =0x50435251, len=36
3,478,616 >>> mbox cmd response data (1848 bytes)
3,478,617 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,098 UART: [rt]cmd =0x50435245, len=56
3,511,363 >>> mbox cmd response data (8 bytes)
3,511,364 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,793 UART: [rt]cmd =0x50435251, len=36
3,707,919 >>> mbox cmd response data (1848 bytes)
3,707,920 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,793 UART: [rt]cmd =0x50435245, len=56
3,741,624 >>> mbox cmd response data (8 bytes)
3,741,625 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,338 UART: [rt]cmd =0x50435251, len=36
3,938,748 >>> mbox cmd response data (1848 bytes)
3,938,749 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,368 UART: [rt]cmd =0x50435245, len=56
3,971,959 >>> mbox cmd response data (8 bytes)
3,971,960 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,001,583 UART: [rt]cmd =0x50435251, len=36
4,168,753 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,094 ready_for_fw is high
1,060,094 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,100 >>> mbox cmd response: success
2,629,100 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,691,664 UART:
2,691,680 UART: Running Caliptra FMC ...
2,692,088 UART:
2,692,231 UART: [state] CFI Enabled
2,702,528 UART: [fht] FMC Alias Private Key: 7
2,809,987 UART: [art] Extend RT PCRs Done
2,810,415 UART: [art] Lock RT PCRs Done
2,811,759 UART: [art] Populate DV Done
2,820,062 UART: [fht] FMC Alias Private Key: 7
2,821,068 UART: [art] Derive CDI
2,821,348 UART: [art] Store in in slot 0x4
2,906,749 UART: [art] Derive Key Pair
2,907,109 UART: [art] Store priv key in slot 0x5
2,920,413 UART: [art] Derive Key Pair - Done
2,935,520 UART: [art] Signing Cert with AUTHO
2,936,000 UART: RITY.KEYID = 7
2,951,404 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,169 UART: [art] PUB.X = 11BFCC0178808BE6D34F952EA99217824E2F6A57B1935B49BE98A51444676869094FEA727F04BA6DAC777537A2AF804F
2,958,930 UART: [art] PUB.Y = 1DB8478AFD33AED15847A62D4FD0F5857E932EE08FA201D41B6A17F5A8630FBCD4C0329EE9CB5E2240C3FDB762781ED5
2,965,890 UART: [art] SIG.R = 4D5295E0B2AA87CB8F1506C16B1CE85F4F1E948EF590739FA9B4DB985EE132E10D043D1B26213A6A6044EBD20887EA66
2,972,656 UART: [art] SIG.S = EC17C25800397BA4B7E1DB776D152A8400F1825A186D219CF117D750002D0CA38F30986D668F4FACDE77E21D0F644E97
2,995,943 UART: Caliptra RT
2,996,288 UART: [state] CFI Enabled
3,103,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,715 UART: [rt]cmd =0x50435251, len=36
3,301,931 >>> mbox cmd response data (1848 bytes)
3,301,932 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,581 UART: [rt]cmd =0x50435245, len=56
3,334,992 >>> mbox cmd response data (8 bytes)
3,334,993 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,564 UART: [rt]cmd =0x50435251, len=36
3,532,202 >>> mbox cmd response data (1848 bytes)
3,532,203 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,960 UART: [rt]cmd =0x50435245, len=56
3,565,483 >>> mbox cmd response data (8 bytes)
3,565,484 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,041 UART: [rt]cmd =0x50435251, len=36
3,762,581 >>> mbox cmd response data (1848 bytes)
3,762,582 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,179 UART: [rt]cmd =0x50435245, len=56
3,795,976 >>> mbox cmd response data (8 bytes)
3,795,977 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,566 UART: [rt]cmd =0x50435251, len=36
3,993,152 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
87,994 UART: [kat] SHA2-256
891,544 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,673 UART: [kat] ++
895,825 UART: [kat] sha1
900,143 UART: [kat] SHA2-256
902,083 UART: [kat] SHA2-384
904,986 UART: [kat] SHA2-512-ACC
906,887 UART: [kat] ECC-384
916,456 UART: [kat] HMAC-384Kdf
921,098 UART: [kat] LMS
1,169,410 UART: [kat] --
1,170,167 UART: [cold-reset] ++
1,170,527 UART: [fht] FHT @ 0x50003400
1,173,307 UART: [idev] ++
1,173,475 UART: [idev] CDI.KEYID = 6
1,173,836 UART: [idev] SUBJECT.KEYID = 7
1,174,261 UART: [idev] UDS.KEYID = 0
1,174,607 ready_for_fw is high
1,174,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,365 UART: [idev] Erasing UDS.KEYID = 0
1,199,817 UART: [idev] Sha1 KeyId Algorithm
1,208,639 UART: [idev] --
1,209,522 UART: [ldev] ++
1,209,690 UART: [ldev] CDI.KEYID = 6
1,210,054 UART: [ldev] SUBJECT.KEYID = 5
1,210,481 UART: [ldev] AUTHORITY.KEYID = 7
1,210,944 UART: [ldev] FE.KEYID = 1
1,216,072 UART: [ldev] Erasing FE.KEYID = 1
1,242,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,776 UART: [ldev] --
1,282,044 UART: [fwproc] Wait for Commands...
1,282,867 UART: [fwproc] Recv command 0x46574c44
1,283,600 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,888 >>> mbox cmd response: success
2,773,888 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,774,977 UART: [afmc] ++
2,775,145 UART: [afmc] CDI.KEYID = 6
2,775,508 UART: [afmc] SUBJECT.KEYID = 7
2,775,934 UART: [afmc] AUTHORITY.KEYID = 5
2,811,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,329 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,212 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,931 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,798 UART: [afmc] --
2,854,874 UART: [cold-reset] --
2,855,752 UART: [state] Locking Datavault
2,857,079 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,683 UART: [state] Locking ICCM
2,858,287 UART: [exit] Launching FMC @ 0x40000130
2,863,616 UART:
2,863,632 UART: Running Caliptra FMC ...
2,864,040 UART:
2,864,094 UART: [state] CFI Enabled
2,874,351 UART: [fht] FMC Alias Private Key: 7
2,982,304 UART: [art] Extend RT PCRs Done
2,982,732 UART: [art] Lock RT PCRs Done
2,984,192 UART: [art] Populate DV Done
2,992,619 UART: [fht] FMC Alias Private Key: 7
2,993,591 UART: [art] Derive CDI
2,993,871 UART: [art] Store in in slot 0x4
3,079,368 UART: [art] Derive Key Pair
3,079,728 UART: [art] Store priv key in slot 0x5
3,092,314 UART: [art] Derive Key Pair - Done
3,107,068 UART: [art] Signing Cert with AUTHO
3,107,548 UART: RITY.KEYID = 7
3,122,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,561 UART: [art] PUB.X = 853188883E6C0FDA7252E000B7ED553FCC7D1B577A607045128E8D387E66497E44AB42536DA3AD6548D5C750CD26ADF3
3,130,308 UART: [art] PUB.Y = 64F37691D29191E6C902017AF8042C11478BA1429B84D84E892AB9F415C63C95BF74B2D665E99FC9D426FFFACA0CF720
3,137,250 UART: [art] SIG.R = EF3B0F91B5CF46EB6C19E9C558F085DE8ACD748539D74525E1C3AEFA7A66463395D1739D09D8C90C268C5459ADA201D6
3,144,018 UART: [art] SIG.S = 9E1786CCEBB7C6085C4626B4A503A119B04BA7D5E2CD4491C7B6C977BFFC311BE0E23E96E2D27DC3D918D8E327069AE2
3,167,986 UART: Caliptra RT
3,168,239 UART: [state] CFI Enabled
3,276,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,815 UART: [rt]cmd =0x50435251, len=36
3,474,011 >>> mbox cmd response data (1848 bytes)
3,474,012 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,829 UART: [rt]cmd =0x50435245, len=56
3,507,194 >>> mbox cmd response data (8 bytes)
3,507,195 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,756 UART: [rt]cmd =0x50435251, len=36
3,703,996 >>> mbox cmd response data (1848 bytes)
3,703,997 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,518 UART: [rt]cmd =0x50435245, len=56
3,737,121 >>> mbox cmd response data (8 bytes)
3,737,122 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,873 UART: [rt]cmd =0x50435251, len=36
3,934,337 >>> mbox cmd response data (1848 bytes)
3,934,338 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,199 UART: [rt]cmd =0x50435245, len=56
3,967,858 >>> mbox cmd response data (8 bytes)
3,967,859 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,997,596 UART: [rt]cmd =0x50435251, len=36
4,164,606 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,710 ready_for_fw is high
1,056,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,600 >>> mbox cmd response: success
2,625,600 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,687,528 UART:
2,687,544 UART: Running Caliptra FMC ...
2,687,952 UART:
2,688,006 UART: [state] CFI Enabled
2,698,763 UART: [fht] FMC Alias Private Key: 7
2,806,732 UART: [art] Extend RT PCRs Done
2,807,160 UART: [art] Lock RT PCRs Done
2,808,680 UART: [art] Populate DV Done
2,816,941 UART: [fht] FMC Alias Private Key: 7
2,818,015 UART: [art] Derive CDI
2,818,295 UART: [art] Store in in slot 0x4
2,904,156 UART: [art] Derive Key Pair
2,904,516 UART: [art] Store priv key in slot 0x5
2,917,992 UART: [art] Derive Key Pair - Done
2,932,720 UART: [art] Signing Cert with AUTHO
2,933,200 UART: RITY.KEYID = 7
2,948,304 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,069 UART: [art] PUB.X = 4CE48D97E76A28B7ABD24E61C6363DD233271AE914DDC1611CA05923A518FDBA13B8F4E83A608965600FAA22ED04D49F
2,955,843 UART: [art] PUB.Y = BF1010E1769FA4BCB2A45E3A9C0463401FC7B6E9F98CD5B57566324B7CE534F5E504996BE4C757C4EC4A72B1730F0953
2,962,787 UART: [art] SIG.R = C807997E3F36FB0398B3F0DC7D594C36C30091324D405B1CFEEABE43839381845719C92918B1DF6AD73487C054B9F013
2,969,527 UART: [art] SIG.S = 01446591D0D74882B285F09A4733948F85CE74D120D939DD01BAD1A96F3C2DE900FB38F1FA577109F6DADB72D40C0F14
2,993,135 UART: Caliptra RT
2,993,388 UART: [state] CFI Enabled
3,101,649 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,165 UART: [rt]cmd =0x50435251, len=36
3,299,269 >>> mbox cmd response data (1848 bytes)
3,299,270 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,043 UART: [rt]cmd =0x50435245, len=56
3,332,388 >>> mbox cmd response data (8 bytes)
3,332,389 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,938 UART: [rt]cmd =0x50435251, len=36
3,529,212 >>> mbox cmd response data (1848 bytes)
3,529,213 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,706 UART: [rt]cmd =0x50435245, len=56
3,562,143 >>> mbox cmd response data (8 bytes)
3,562,144 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,549 UART: [rt]cmd =0x50435251, len=36
3,758,899 >>> mbox cmd response data (1848 bytes)
3,758,900 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,715 UART: [rt]cmd =0x50435245, len=56
3,792,180 >>> mbox cmd response data (8 bytes)
3,792,181 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,474 UART: [rt]cmd =0x50435251, len=36
3,989,070 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,671 UART: [kat] LMS
1,168,983 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,018 UART: [fht] FHT @ 0x50003400
1,172,590 UART: [idev] ++
1,172,758 UART: [idev] CDI.KEYID = 6
1,173,119 UART: [idev] SUBJECT.KEYID = 7
1,173,544 UART: [idev] UDS.KEYID = 0
1,173,890 ready_for_fw is high
1,173,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,482 UART: [idev] Erasing UDS.KEYID = 0
1,198,494 UART: [idev] Sha1 KeyId Algorithm
1,207,336 UART: [idev] --
1,208,275 UART: [ldev] ++
1,208,443 UART: [ldev] CDI.KEYID = 6
1,208,807 UART: [ldev] SUBJECT.KEYID = 5
1,209,234 UART: [ldev] AUTHORITY.KEYID = 7
1,209,697 UART: [ldev] FE.KEYID = 1
1,215,001 UART: [ldev] Erasing FE.KEYID = 1
1,241,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,527 UART: [ldev] --
1,280,909 UART: [fwproc] Wait for Commands...
1,281,556 UART: [fwproc] Recv command 0x46574c44
1,282,289 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,527 >>> mbox cmd response: success
2,773,527 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,774,604 UART: [afmc] ++
2,774,772 UART: [afmc] CDI.KEYID = 6
2,775,135 UART: [afmc] SUBJECT.KEYID = 7
2,775,561 UART: [afmc] AUTHORITY.KEYID = 5
2,811,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,502 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,104 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,131 UART: [afmc] --
2,855,113 UART: [cold-reset] --
2,855,843 UART: [state] Locking Datavault
2,857,024 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,628 UART: [state] Locking ICCM
2,858,146 UART: [exit] Launching FMC @ 0x40000130
2,863,475 UART:
2,863,491 UART: Running Caliptra FMC ...
2,863,899 UART:
2,864,042 UART: [state] CFI Enabled
2,874,805 UART: [fht] FMC Alias Private Key: 7
2,983,068 UART: [art] Extend RT PCRs Done
2,983,496 UART: [art] Lock RT PCRs Done
2,984,986 UART: [art] Populate DV Done
2,993,207 UART: [fht] FMC Alias Private Key: 7
2,994,293 UART: [art] Derive CDI
2,994,573 UART: [art] Store in in slot 0x4
3,080,162 UART: [art] Derive Key Pair
3,080,522 UART: [art] Store priv key in slot 0x5
3,093,468 UART: [art] Derive Key Pair - Done
3,108,342 UART: [art] Signing Cert with AUTHO
3,108,822 UART: RITY.KEYID = 7
3,124,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,003 UART: [art] PUB.X = 565E5B4801F86C42B582D41768D6F3A1F079E09EA2E9D697F7BDCF88748BDB38BA24901DC572C2D01066ED0330CA9F70
3,131,773 UART: [art] PUB.Y = ECDE8C127D612529341C2B6969A10F4B28B512979C0A1543AF7DCE70885A674F71F3453BCA6D6118C4284E2876A138B3
3,138,715 UART: [art] SIG.R = 6DAAA303F1D0D1A438818ABC214A8115C409175C9F03B6F944F70ED7C1D3211A5C8862B5E091A39425B9D77E1C8D79AD
3,145,479 UART: [art] SIG.S = 1D90980F7967FF840011A8BF530316F874A669A3EC4C41EC8CAA8F0FCA46265B2B0D73D3A8FA5D85E1D3A5A0F2E9FE30
3,169,528 UART: Caliptra RT
3,169,873 UART: [state] CFI Enabled
3,278,332 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,828 UART: [rt]cmd =0x50435251, len=36
3,476,042 >>> mbox cmd response data (1848 bytes)
3,476,043 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,618 UART: [rt]cmd =0x50435245, len=56
3,509,167 >>> mbox cmd response data (8 bytes)
3,509,168 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,681 UART: [rt]cmd =0x50435251, len=36
3,706,171 >>> mbox cmd response data (1848 bytes)
3,706,172 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,817 UART: [rt]cmd =0x50435245, len=56
3,739,374 >>> mbox cmd response data (8 bytes)
3,739,375 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,984 UART: [rt]cmd =0x50435251, len=36
3,936,476 >>> mbox cmd response data (1848 bytes)
3,936,477 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,448 UART: [rt]cmd =0x50435245, len=56
3,970,291 >>> mbox cmd response data (8 bytes)
3,970,292 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,999,869 UART: [rt]cmd =0x50435251, len=36
4,167,439 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,689 ready_for_fw is high
1,056,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,513 >>> mbox cmd response: success
2,624,513 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,686,497 UART:
2,686,513 UART: Running Caliptra FMC ...
2,686,921 UART:
2,687,064 UART: [state] CFI Enabled
2,697,307 UART: [fht] FMC Alias Private Key: 7
2,805,610 UART: [art] Extend RT PCRs Done
2,806,038 UART: [art] Lock RT PCRs Done
2,807,670 UART: [art] Populate DV Done
2,815,679 UART: [fht] FMC Alias Private Key: 7
2,816,843 UART: [art] Derive CDI
2,817,123 UART: [art] Store in in slot 0x4
2,902,886 UART: [art] Derive Key Pair
2,903,246 UART: [art] Store priv key in slot 0x5
2,916,490 UART: [art] Derive Key Pair - Done
2,930,918 UART: [art] Signing Cert with AUTHO
2,931,398 UART: RITY.KEYID = 7
2,946,392 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,157 UART: [art] PUB.X = 39E08A98D2B13E5453532F4B76FAF3B83E33E4A5F21307F81D7CFD0596515D7D93B9676EC2397B80573894EE86D88948
2,953,917 UART: [art] PUB.Y = 0E10A0763E0C733F0D85F8025F2970CA75ADEA5F04B30742619E6D78AE053A9825B64DF973BF241DC814D42F3B3FC631
2,960,850 UART: [art] SIG.R = 226F96F90AE85044197801F55AAAB7C9700AA535F128453C940A18FAFA8EB9ED1B308AA7B8EA7EC9A754BBC590A9348E
2,967,620 UART: [art] SIG.S = 1BC0CC99F1F17F58258F307CF05FB4EE94E187C467183ACFCC1FCA0A9B747607A375E2BC5670DD50684048DDC8A5FF73
2,991,559 UART: Caliptra RT
2,991,904 UART: [state] CFI Enabled
3,099,847 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,391 UART: [rt]cmd =0x50435251, len=36
3,297,897 >>> mbox cmd response data (1848 bytes)
3,297,898 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,459 UART: [rt]cmd =0x50435245, len=56
3,331,036 >>> mbox cmd response data (8 bytes)
3,331,037 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,618 UART: [rt]cmd =0x50435251, len=36
3,527,908 >>> mbox cmd response data (1848 bytes)
3,527,909 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,900 UART: [rt]cmd =0x50435245, len=56
3,561,653 >>> mbox cmd response data (8 bytes)
3,561,654 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,189 UART: [rt]cmd =0x50435251, len=36
3,758,503 >>> mbox cmd response data (1848 bytes)
3,758,504 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,111 UART: [rt]cmd =0x50435245, len=56
3,791,718 >>> mbox cmd response data (8 bytes)
3,791,719 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,232 UART: [rt]cmd =0x50435251, len=36
3,988,736 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,032 UART:
192,418 UART: Running Caliptra ROM ...
193,515 UART:
193,661 UART: [state] CFI Enabled
268,507 UART: [state] LifecycleState = Unprovisioned
270,386 UART: [state] DebugLocked = No
272,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,058 UART: [kat] SHA2-256
447,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,271 UART: [kat] ++
458,754 UART: [kat] sha1
469,702 UART: [kat] SHA2-256
472,361 UART: [kat] SHA2-384
478,300 UART: [kat] SHA2-512-ACC
480,669 UART: [kat] ECC-384
2,766,846 UART: [kat] HMAC-384Kdf
2,790,959 UART: [kat] LMS
3,981,264 UART: [kat] --
3,986,049 UART: [cold-reset] ++
3,986,996 UART: [fht] Storing FHT @ 0x50003400
3,997,976 UART: [idev] ++
3,998,576 UART: [idev] CDI.KEYID = 6
3,999,470 UART: [idev] SUBJECT.KEYID = 7
4,000,716 UART: [idev] UDS.KEYID = 0
4,001,748 ready_for_fw is high
4,001,972 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,145,650 UART: [idev] Erasing UDS.KEYID = 0
7,339,585 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,991 UART: [idev] --
7,364,056 UART: [ldev] ++
7,364,685 UART: [ldev] CDI.KEYID = 6
7,365,598 UART: [ldev] SUBJECT.KEYID = 5
7,366,814 UART: [ldev] AUTHORITY.KEYID = 7
7,368,143 UART: [ldev] FE.KEYID = 1
7,412,754 UART: [ldev] Erasing FE.KEYID = 1
10,749,001 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,074,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,121,753 UART: [ldev] --
13,126,907 UART: [fwproc] Waiting for Commands...
13,128,903 UART: [fwproc] Received command 0x46574c44
13,131,086 UART: [fwproc] Received Image of size 114124 bytes
17,189,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,035 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,944 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,648,676 >>> mbox cmd response: success
17,649,227 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,652,837 UART: [afmc] ++
17,653,426 UART: [afmc] CDI.KEYID = 6
17,654,339 UART: [afmc] SUBJECT.KEYID = 7
17,655,611 UART: [afmc] AUTHORITY.KEYID = 5
21,019,184 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,317,498 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,319,759 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,334,169 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,349,003 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,363,408 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,385,410 UART: [afmc] --
23,388,423 UART: [cold-reset] --
23,393,226 UART: [state] Locking Datavault
23,399,351 UART: [state] Locking PCR0, PCR1 and PCR31
23,401,152 UART: [state] Locking ICCM
23,403,450 UART: [exit] Launching FMC @ 0x40000130
23,411,856 UART:
23,412,093 UART: Running Caliptra FMC ...
23,413,199 UART:
23,413,362 UART: [state] CFI Enabled
23,478,504 UART: [fht] FMC Alias Private Key: 7
25,815,870 UART: [art] Extend RT PCRs Done
25,817,093 UART: [art] Lock RT PCRs Done
25,819,043 UART: [art] Populate DV Done
25,824,456 UART: [fht] FMC Alias Private Key: 7
25,826,102 UART: [art] Derive CDI
25,826,915 UART: [art] Store in in slot 0x4
25,886,257 UART: [art] Derive Key Pair
25,887,313 UART: [art] Store priv key in slot 0x5
29,179,625 UART: [art] Derive Key Pair - Done
29,192,513 UART: [art] Signing Cert with AUTHO
29,193,819 UART: RITY.KEYID = 7
31,482,314 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,823 UART: [art] PUB.X = 46A8A3FF7A1F8A02690186800B342FED88162BF19363473D8519E40CB02DF40951300283551A5A1F970A1613D52BC746
31,491,023 UART: [art] PUB.Y = 70956C58DD9D3382B89BED9FEF1D9DBA2B2ABD5E63F242298F3E4DB98B7C18A44FAA0F585BF89B400337040151F3896A
31,498,306 UART: [art] SIG.R = 614B69A34264977F7870C0A7E07761383FD496483B85E8A0DFD7B3C01BB9FC6A92C2546D8881040D9E27F2217785121C
31,505,644 UART: [art] SIG.S = 8F83BB0506BE7EED2419AC69E1C4AECDE9DA420682092DA212AD3A31FCAB8510D6EAA90D420B858E2CD580F5038EDB2A
32,810,798 UART: Caliptra RT
32,811,502 UART: [state] CFI Enabled
32,972,814 UART: [rt] RT listening for mailbox commands...
33,004,488 UART: [rt]cmd =0x50435245, len=56
33,006,335 >>> mbox cmd response: failed
33,006,666 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,036,869 UART: [rt]cmd =0x50435245, len=56
33,038,486 >>> mbox cmd response: failed
33,038,756 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,068,680 UART: [rt]cmd =0x50435245, len=56
33,070,541 >>> mbox cmd response: failed
33,070,798 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,101,104 UART: [rt]cmd =0x50435245, len=56
33,102,835 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,796,866 ready_for_fw is high
3,797,311 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,863,043 >>> mbox cmd response: success
17,863,647 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,579,663 UART:
23,580,039 UART: Running Caliptra FMC ...
23,581,150 UART:
23,581,299 UART: [state] CFI Enabled
23,649,608 UART: [fht] FMC Alias Private Key: 7
25,987,628 UART: [art] Extend RT PCRs Done
25,988,852 UART: [art] Lock RT PCRs Done
25,990,573 UART: [art] Populate DV Done
25,995,883 UART: [fht] FMC Alias Private Key: 7
25,997,424 UART: [art] Derive CDI
25,998,160 UART: [art] Store in in slot 0x4
26,058,481 UART: [art] Derive Key Pair
26,059,546 UART: [art] Store priv key in slot 0x5
29,352,171 UART: [art] Derive Key Pair - Done
29,365,129 UART: [art] Signing Cert with AUTHO
29,366,487 UART: RITY.KEYID = 7
31,653,692 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,198 UART: [art] PUB.X = 086F5E2FDE383897735D380FF51D2748A281CE6A6A53BBD36CA3DBF28063B9FE5AF6F60DD7B0D4966B6CA723DC4376CE
31,662,472 UART: [art] PUB.Y = 1DE52A85417E9393C0A2FA089C236C5FA8B3EEEC79EFBC28E32DBDC31EFAEE770B44A3AB3D05D8585BF3A4E76E376609
31,669,713 UART: [art] SIG.R = 30B67EB41EE1530B335D2D84C9FFB8BEA7F859EFB99A06DF6B0B350F57C14C522E8729B7E04271983C525A652F00BAB5
31,677,072 UART: [art] SIG.S = 922E9EA24E347DE92845BC5263C68D091A7B822D3027331838B814D2A8577A9D7306DC7CD44A62593E50A88FFC5C6A19
32,981,275 UART: Caliptra RT
32,981,991 UART: [state] CFI Enabled
33,142,511 UART: [rt] RT listening for mailbox commands...
33,174,201 UART: [rt]cmd =0x50435245, len=56
33,176,173 >>> mbox cmd response: failed
33,176,525 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,206,581 UART: [rt]cmd =0x50435245, len=56
33,208,394 >>> mbox cmd response: failed
33,208,665 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,238,642 UART: [rt]cmd =0x50435245, len=56
33,240,347 >>> mbox cmd response: failed
33,240,613 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,270,749 UART: [rt]cmd =0x50435245, len=56
33,272,678 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,489 UART:
192,860 UART: Running Caliptra ROM ...
193,949 UART:
603,510 UART: [state] CFI Enabled
617,597 UART: [state] LifecycleState = Unprovisioned
619,540 UART: [state] DebugLocked = No
622,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,582 UART: [kat] SHA2-256
796,320 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,864 UART: [kat] ++
807,398 UART: [kat] sha1
819,080 UART: [kat] SHA2-256
821,782 UART: [kat] SHA2-384
828,418 UART: [kat] SHA2-512-ACC
830,782 UART: [kat] ECC-384
3,116,953 UART: [kat] HMAC-384Kdf
3,128,547 UART: [kat] LMS
4,318,643 UART: [kat] --
4,323,935 UART: [cold-reset] ++
4,326,435 UART: [fht] Storing FHT @ 0x50003400
4,339,207 UART: [idev] ++
4,339,815 UART: [idev] CDI.KEYID = 6
4,340,727 UART: [idev] SUBJECT.KEYID = 7
4,341,971 UART: [idev] UDS.KEYID = 0
4,343,012 ready_for_fw is high
4,343,243 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,448 UART: [idev] Erasing UDS.KEYID = 0
7,628,780 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,867 UART: [idev] --
7,655,616 UART: [ldev] ++
7,656,184 UART: [ldev] CDI.KEYID = 6
7,657,142 UART: [ldev] SUBJECT.KEYID = 5
7,658,288 UART: [ldev] AUTHORITY.KEYID = 7
7,659,616 UART: [ldev] FE.KEYID = 1
7,671,332 UART: [ldev] Erasing FE.KEYID = 1
10,955,162 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,272 UART: [ldev] --
13,317,261 UART: [fwproc] Waiting for Commands...
13,320,433 UART: [fwproc] Received command 0x46574c44
13,322,614 UART: [fwproc] Received Image of size 114124 bytes
17,374,334 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,016 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,063 >>> mbox cmd response: success
17,831,652 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,834,474 UART: [afmc] ++
17,835,055 UART: [afmc] CDI.KEYID = 6
17,835,964 UART: [afmc] SUBJECT.KEYID = 7
17,837,231 UART: [afmc] AUTHORITY.KEYID = 5
21,151,458 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,014 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,277 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,664 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,470 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,920 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,131 UART: [afmc] --
23,516,334 UART: [cold-reset] --
23,520,035 UART: [state] Locking Datavault
23,524,685 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,440 UART: [state] Locking ICCM
23,528,365 UART: [exit] Launching FMC @ 0x40000130
23,536,745 UART:
23,536,992 UART: Running Caliptra FMC ...
23,538,098 UART:
23,538,258 UART: [state] CFI Enabled
23,546,574 UART: [fht] FMC Alias Private Key: 7
25,878,422 UART: [art] Extend RT PCRs Done
25,879,644 UART: [art] Lock RT PCRs Done
25,881,509 UART: [art] Populate DV Done
25,887,048 UART: [fht] FMC Alias Private Key: 7
25,888,532 UART: [art] Derive CDI
25,889,290 UART: [art] Store in in slot 0x4
25,932,149 UART: [art] Derive Key Pair
25,933,183 UART: [art] Store priv key in slot 0x5
29,175,549 UART: [art] Derive Key Pair - Done
29,188,542 UART: [art] Signing Cert with AUTHO
29,189,852 UART: RITY.KEYID = 7
31,469,643 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,156 UART: [art] PUB.X = 0AD3B8E6B512C023DF3EC2E097CE5E0390FFC6BCF1CD27C4BAF0C1C775702CFEDE8DBE2181881746586A955B716DE3F5
31,478,411 UART: [art] PUB.Y = A4B5B2EAB5A6093403753975FDC1723E8DB50E9E4D84A935EDD6EE6181EB4560453594D4A2FCAD742A78959BC39C9DF1
31,485,688 UART: [art] SIG.R = 0D79ACBB87370E2631F9F47C32E3FA71683C09EBCF81FC1FFD779E9B8EE23FBE716EEE84D77ED12F90D965B1107E136A
31,493,069 UART: [art] SIG.S = 1FD281EDDB1917CF944E23EE10EBE28F8E94C2A62C9597B1E79DE660249B72C123FC7E9428BF80F0542E406F8C8F8B36
32,798,376 UART: Caliptra RT
32,799,088 UART: [state] CFI Enabled
32,916,552 UART: [rt] RT listening for mailbox commands...
32,948,306 UART: [rt]cmd =0x50435245, len=56
32,950,064 >>> mbox cmd response: failed
32,950,444 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
32,980,712 UART: [rt]cmd =0x50435245, len=56
32,982,442 >>> mbox cmd response: failed
32,982,712 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,012,792 UART: [rt]cmd =0x50435245, len=56
33,014,812 >>> mbox cmd response: failed
33,015,120 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,044,989 UART: [rt]cmd =0x50435245, len=56
33,047,062 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,133,686 ready_for_fw is high
4,134,093 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,369 >>> mbox cmd response: success
18,076,339 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,717,385 UART:
23,717,777 UART: Running Caliptra FMC ...
23,718,903 UART:
23,719,055 UART: [state] CFI Enabled
23,727,220 UART: [fht] FMC Alias Private Key: 7
26,058,252 UART: [art] Extend RT PCRs Done
26,059,495 UART: [art] Lock RT PCRs Done
26,061,028 UART: [art] Populate DV Done
26,066,231 UART: [fht] FMC Alias Private Key: 7
26,067,763 UART: [art] Derive CDI
26,068,577 UART: [art] Store in in slot 0x4
26,111,282 UART: [art] Derive Key Pair
26,112,318 UART: [art] Store priv key in slot 0x5
29,354,615 UART: [art] Derive Key Pair - Done
29,367,670 UART: [art] Signing Cert with AUTHO
29,368,974 UART: RITY.KEYID = 7
31,648,719 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,225 UART: [art] PUB.X = 6EA5CDA70DAF4337555C68E24BCAD4AAFB67B43C5C4AD62BA061669ED4E5751B343E6EAD08C8B89D161C601D41DDC595
31,657,471 UART: [art] PUB.Y = 7C4AD334D49725F70D9EAD58CA07F040399F9C0193AEBC25FDBD85A259FD344954C9659F34857BDBE9D8740CFA76DBCB
31,664,708 UART: [art] SIG.R = 81916AC9066EAC5C7505784A1C79BD328C72B556BCD78E8FF74BBA5D2F275EC7F3C1B42EADF5A3EF5FC3854F5962B314
31,672,144 UART: [art] SIG.S = 1B2B2F5C60DA992F708D318F588FBD1B4E4B3615D264167B12EA6AB6C4D941758A7AB95D43F96EF2B37A05B094E1C6CF
32,977,420 UART: Caliptra RT
32,978,150 UART: [state] CFI Enabled
33,096,046 UART: [rt] RT listening for mailbox commands...
33,127,941 UART: [rt]cmd =0x50435245, len=56
33,129,802 >>> mbox cmd response: failed
33,130,096 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,160,337 UART: [rt]cmd =0x50435245, len=56
33,161,805 >>> mbox cmd response: failed
33,162,068 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,192,205 UART: [rt]cmd =0x50435245, len=56
33,194,059 >>> mbox cmd response: failed
33,194,323 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,224,461 UART: [rt]cmd =0x50435245, len=56
33,226,245 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,137 UART:
192,503 UART: Running Caliptra ROM ...
193,628 UART:
193,773 UART: [state] CFI Enabled
265,166 UART: [state] LifecycleState = Unprovisioned
267,013 UART: [state] DebugLocked = No
269,618 UART: [state] WD Timer not started. Device not locked for debugging
273,507 UART: [kat] SHA2-256
452,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,219 UART: [kat] ++
464,756 UART: [kat] sha1
475,920 UART: [kat] SHA2-256
478,998 UART: [kat] SHA2-384
485,476 UART: [kat] SHA2-512-ACC
488,427 UART: [kat] ECC-384
2,949,287 UART: [kat] HMAC-384Kdf
2,972,885 UART: [kat] LMS
3,502,342 UART: [kat] --
3,507,543 UART: [cold-reset] ++
3,509,326 UART: [fht] FHT @ 0x50003400
3,519,809 UART: [idev] ++
3,520,368 UART: [idev] CDI.KEYID = 6
3,521,273 UART: [idev] SUBJECT.KEYID = 7
3,522,514 UART: [idev] UDS.KEYID = 0
3,523,439 ready_for_fw is high
3,523,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,561 UART: [idev] Erasing UDS.KEYID = 0
6,028,649 UART: [idev] Sha1 KeyId Algorithm
6,052,160 UART: [idev] --
6,057,621 UART: [ldev] ++
6,058,253 UART: [ldev] CDI.KEYID = 6
6,059,148 UART: [ldev] SUBJECT.KEYID = 5
6,060,308 UART: [ldev] AUTHORITY.KEYID = 7
6,061,543 UART: [ldev] FE.KEYID = 1
6,101,597 UART: [ldev] Erasing FE.KEYID = 1
8,602,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,120 UART: [ldev] --
10,413,895 UART: [fwproc] Wait for Commands...
10,416,905 UART: [fwproc] Recv command 0x46574c44
10,418,995 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,280,158 >>> mbox cmd response: success
14,280,679 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,283,993 UART: [afmc] ++
14,284,610 UART: [afmc] CDI.KEYID = 6
14,285,531 UART: [afmc] SUBJECT.KEYID = 7
14,286,691 UART: [afmc] AUTHORITY.KEYID = 5
16,809,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,992 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,033 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,912 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,073 UART: [afmc] --
18,607,665 UART: [cold-reset] --
18,611,578 UART: [state] Locking Datavault
18,616,803 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,488 UART: [state] Locking ICCM
18,620,158 UART: [exit] Launching FMC @ 0x40000130
18,628,555 UART:
18,628,790 UART: Running Caliptra FMC ...
18,629,887 UART:
18,630,043 UART: [state] CFI Enabled
18,692,554 UART: [fht] FMC Alias Private Key: 7
20,455,838 UART: [art] Extend RT PCRs Done
20,457,051 UART: [art] Lock RT PCRs Done
20,458,864 UART: [art] Populate DV Done
20,464,432 UART: [fht] FMC Alias Private Key: 7
20,466,129 UART: [art] Derive CDI
20,466,867 UART: [art] Store in in slot 0x4
20,524,733 UART: [art] Derive Key Pair
20,525,730 UART: [art] Store priv key in slot 0x5
22,989,148 UART: [art] Derive Key Pair - Done
23,002,335 UART: [art] Signing Cert with AUTHO
23,003,653 UART: RITY.KEYID = 7
24,715,004 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,522 UART: [art] PUB.X = 7C26FCF4DDE6E4E1CF10788A1DA32E611532889784F09DE2BFF52B4607CE906D061D7CADF8D76D75A753B49B038A04DD
24,723,784 UART: [art] PUB.Y = 98339608D7F4F4F53039B457B1B04A06EEAE66C0FED931D25A9E8DBECC1DD3622FF1021330DA68F356A57821F46CC0DF
24,731,020 UART: [art] SIG.R = C23FE5E3A6E576FD40ECB1CBD88FBD625B9CBA2B11B818EAC85140B3C30740F4BF1961692A9819401694137CE5A86D40
24,738,419 UART: [art] SIG.S = A386A5DB30BE09249DF31E71F2949B7F10D7D87C702A430F7F0FDF4D817D7BD01E448D9683E2074877563BA84B6A2362
25,716,851 UART: Caliptra RT
25,717,569 UART: [state] CFI Enabled
25,883,962 UART: [rt] RT listening for mailbox commands...
25,915,754 UART: [rt]cmd =0x50435245, len=56
25,917,488 >>> mbox cmd response: failed
25,917,824 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,947,823 UART: [rt]cmd =0x50435245, len=56
25,949,471 >>> mbox cmd response: failed
25,949,755 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,980,015 UART: [rt]cmd =0x50435245, len=56
25,981,478 >>> mbox cmd response: failed
25,981,784 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,011,919 UART: [rt]cmd =0x50435245, len=56
26,013,945 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,371,630 ready_for_fw is high
3,372,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,082,465 >>> mbox cmd response: success
14,083,378 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,371,719 UART:
18,372,117 UART: Running Caliptra FMC ...
18,373,322 UART:
18,373,498 UART: [state] CFI Enabled
18,436,878 UART: [fht] FMC Alias Private Key: 7
20,200,948 UART: [art] Extend RT PCRs Done
20,202,170 UART: [art] Lock RT PCRs Done
20,203,871 UART: [art] Populate DV Done
20,209,115 UART: [fht] FMC Alias Private Key: 7
20,210,710 UART: [art] Derive CDI
20,211,458 UART: [art] Store in in slot 0x4
20,269,347 UART: [art] Derive Key Pair
20,270,390 UART: [art] Store priv key in slot 0x5
22,733,349 UART: [art] Derive Key Pair - Done
22,745,965 UART: [art] Signing Cert with AUTHO
22,747,261 UART: RITY.KEYID = 7
24,459,767 UART: [art] Erasing AUTHORITY.KEYID = 7
24,461,308 UART: [art] PUB.X = F6CA8DCB240EB803E22A6E2A4162B884421BE8652313C58D509C1987887733845AC27CAB285DE8EE90508097974E9C5B
24,468,572 UART: [art] PUB.Y = 2C70CA5B6C597645B936B32BEFA59F612F4D3E1E3016B575F3BFB5051FBBB1B796D7129750D67132DA24AEA96D3520FB
24,475,786 UART: [art] SIG.R = 164CAD22ED5FB687CB0D4F77530882391F3572270059F12E908B43B7358C6FF725669E8927F56C326B7CCE549E5CFE5E
24,483,176 UART: [art] SIG.S = EA8DB6B74A88FE5EC4142F3704F616225AF19FA9ECC1734F89A523E877E3D64B837CCE63CD6E199307B5BF4E76BC68EF
25,462,670 UART: Caliptra RT
25,463,380 UART: [state] CFI Enabled
25,628,813 UART: [rt] RT listening for mailbox commands...
25,660,498 UART: [rt]cmd =0x50435245, len=56
25,662,408 >>> mbox cmd response: failed
25,662,769 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,693,030 UART: [rt]cmd =0x50435245, len=56
25,694,889 >>> mbox cmd response: failed
25,695,160 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,725,247 UART: [rt]cmd =0x50435245, len=56
25,727,327 >>> mbox cmd response: failed
25,727,614 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,758,077 UART: [rt]cmd =0x50435245, len=56
25,759,710 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,458 UART:
192,824 UART: Running Caliptra ROM ...
194,010 UART:
603,598 UART: [state] CFI Enabled
617,045 UART: [state] LifecycleState = Unprovisioned
618,864 UART: [state] DebugLocked = No
621,598 UART: [state] WD Timer not started. Device not locked for debugging
625,379 UART: [kat] SHA2-256
804,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,080 UART: [kat] ++
816,612 UART: [kat] sha1
827,702 UART: [kat] SHA2-256
830,697 UART: [kat] SHA2-384
836,890 UART: [kat] SHA2-512-ACC
839,815 UART: [kat] ECC-384
3,282,650 UART: [kat] HMAC-384Kdf
3,294,099 UART: [kat] LMS
3,823,616 UART: [kat] --
3,829,734 UART: [cold-reset] ++
3,832,222 UART: [fht] FHT @ 0x50003400
3,843,189 UART: [idev] ++
3,843,752 UART: [idev] CDI.KEYID = 6
3,844,653 UART: [idev] SUBJECT.KEYID = 7
3,845,813 UART: [idev] UDS.KEYID = 0
3,846,851 ready_for_fw is high
3,847,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,154 UART: [idev] Erasing UDS.KEYID = 0
6,315,618 UART: [idev] Sha1 KeyId Algorithm
6,339,556 UART: [idev] --
6,343,435 UART: [ldev] ++
6,343,995 UART: [ldev] CDI.KEYID = 6
6,344,895 UART: [ldev] SUBJECT.KEYID = 5
6,346,099 UART: [ldev] AUTHORITY.KEYID = 7
6,347,324 UART: [ldev] FE.KEYID = 1
6,358,502 UART: [ldev] Erasing FE.KEYID = 1
8,832,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,901 UART: [ldev] --
10,623,211 UART: [fwproc] Wait for Commands...
10,626,213 UART: [fwproc] Recv command 0x46574c44
10,628,302 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,479 >>> mbox cmd response: success
14,490,054 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,493,021 UART: [afmc] ++
14,493,604 UART: [afmc] CDI.KEYID = 6
14,494,508 UART: [afmc] SUBJECT.KEYID = 7
14,495,718 UART: [afmc] AUTHORITY.KEYID = 5
16,999,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,748 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,781 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,689 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,292 UART: [afmc] --
18,797,167 UART: [cold-reset] --
18,800,861 UART: [state] Locking Datavault
18,806,750 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,438 UART: [state] Locking ICCM
18,810,794 UART: [exit] Launching FMC @ 0x40000130
18,819,239 UART:
18,819,469 UART: Running Caliptra FMC ...
18,820,558 UART:
18,820,712 UART: [state] CFI Enabled
18,829,099 UART: [fht] FMC Alias Private Key: 7
20,586,297 UART: [art] Extend RT PCRs Done
20,587,513 UART: [art] Lock RT PCRs Done
20,589,077 UART: [art] Populate DV Done
20,594,717 UART: [fht] FMC Alias Private Key: 7
20,596,425 UART: [art] Derive CDI
20,597,238 UART: [art] Store in in slot 0x4
20,639,780 UART: [art] Derive Key Pair
20,640,817 UART: [art] Store priv key in slot 0x5
23,067,490 UART: [art] Derive Key Pair - Done
23,080,483 UART: [art] Signing Cert with AUTHO
23,081,782 UART: RITY.KEYID = 7
24,786,901 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,398 UART: [art] PUB.X = A65C30D360DDF2F22DEF64AB98098BEBED1E0530B0F6C348BFC29EB1ED2C61C97919C36CDB3B8F92F21F57D148C2885E
24,795,684 UART: [art] PUB.Y = 136F61D5343194E8E6F6B59A80A877ED4F62F94231D8CF404A2F9AC4C0CCF81C5F804D86BB5CDD625B3734E43DEA37D4
24,802,956 UART: [art] SIG.R = CD06336CC1C62E5E28B6A0D524B11B724F5846E676D569B8F9A0FE64AA0278A437247B08DBA96A488CBE6C9853D11F84
24,810,401 UART: [art] SIG.S = 084F12DD0B757277364781FA1F9D8FA65D94633ADEF9CC13A36B6FCCA3C14F0E954047E65FFBA543198C170154C44ECD
25,789,014 UART: Caliptra RT
25,789,730 UART: [state] CFI Enabled
25,906,505 UART: [rt] RT listening for mailbox commands...
25,938,309 UART: [rt]cmd =0x50435245, len=56
25,940,217 >>> mbox cmd response: failed
25,940,530 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,970,776 UART: [rt]cmd =0x50435245, len=56
25,972,677 >>> mbox cmd response: failed
25,972,934 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,003,237 UART: [rt]cmd =0x50435245, len=56
26,005,189 >>> mbox cmd response: failed
26,005,456 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,035,647 UART: [rt]cmd =0x50435245, len=56
26,037,610 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,700,594 ready_for_fw is high
3,700,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,285,631 >>> mbox cmd response: success
14,286,459 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,533,484 UART:
18,533,886 UART: Running Caliptra FMC ...
18,535,019 UART:
18,535,172 UART: [state] CFI Enabled
18,542,906 UART: [fht] FMC Alias Private Key: 7
20,299,979 UART: [art] Extend RT PCRs Done
20,301,202 UART: [art] Lock RT PCRs Done
20,302,881 UART: [art] Populate DV Done
20,308,355 UART: [fht] FMC Alias Private Key: 7
20,309,970 UART: [art] Derive CDI
20,310,783 UART: [art] Store in in slot 0x4
20,353,163 UART: [art] Derive Key Pair
20,354,203 UART: [art] Store priv key in slot 0x5
22,780,188 UART: [art] Derive Key Pair - Done
22,792,967 UART: [art] Signing Cert with AUTHO
22,794,270 UART: RITY.KEYID = 7
24,499,884 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,385 UART: [art] PUB.X = 6A0A71976E031ADDEF947B939BC0776A76654AB3A59BD4386AC619F4A9CDFBE4D5FB3A0E17531E825FB7E932B72A4CE3
24,508,686 UART: [art] PUB.Y = B16A4308BEC9C9D645F1416A0C43958EB60F6C95322D8822184C2957D0EF00C47C40E716BF30FD8781AE435C0B9C175C
24,515,929 UART: [art] SIG.R = 8A9E02830B9ACA807357A20F097A8A5772C6DAAA8484E54D7615FAB6E6E305BBB71ECB2D1BCB3C2C266E3EB83747EC8D
24,523,327 UART: [art] SIG.S = 1657CE920E1BFA5C2AF54F3CB611E3016D6827402C029F5690DD22B2C188BDE6A96A8D5BCEE6C00875D26A0BE34F241F
25,502,556 UART: Caliptra RT
25,503,263 UART: [state] CFI Enabled
25,620,556 UART: [rt] RT listening for mailbox commands...
25,652,361 UART: [rt]cmd =0x50435245, len=56
25,654,084 >>> mbox cmd response: failed
25,654,401 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,684,555 UART: [rt]cmd =0x50435245, len=56
25,686,348 >>> mbox cmd response: failed
25,686,622 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,716,921 UART: [rt]cmd =0x50435245, len=56
25,718,614 >>> mbox cmd response: failed
25,718,872 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,748,896 UART: [rt]cmd =0x50435245, len=56
25,750,674 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
3,441,136 ready_for_fw is high
3,441,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,712,484 >>> mbox cmd response: success
14,713,383 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,006,176 UART:
19,006,570 UART: Running Caliptra FMC ...
19,007,687 UART:
19,007,847 UART: [state] CFI Enabled
19,073,281 UART: [fht] FMC Alias Private Key: 7
20,837,279 UART: [art] Extend RT PCRs Done
20,838,524 UART: [art] Lock RT PCRs Done
20,840,242 UART: [art] Populate DV Done
20,845,726 UART: [fht] FMC Alias Private Key: 7
20,847,236 UART: [art] Derive CDI
20,847,972 UART: [art] Store in in slot 0x4
20,906,021 UART: [art] Derive Key Pair
20,907,064 UART: [art] Store priv key in slot 0x5
23,370,243 UART: [art] Derive Key Pair - Done
23,382,862 UART: [art] Signing Cert with AUTHO
23,384,195 UART: RITY.KEYID = 7
25,096,305 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,815 UART: [art] PUB.X = E0B07132FE31D792C73902221BF546D04D14061BBD7D395A9517C3058C75DE13C5C999991F63237FD4586EBD995AC98D
25,105,059 UART: [art] PUB.Y = 938382BDF84802572199E98663B0AE7CF63AA0935BB3D50B82F362FE7F2644FED7A44DB3C8262F2D021C7539402C0858
25,112,311 UART: [art] SIG.R = 7160B95F866D0D4B02F4C8E38FFB6B28290B59FA709EA605D259FDC2194E0E345DD77554F589AF62A466939DB30A23D6
25,119,707 UART: [art] SIG.S = 859667586A2665A0924B27505132F585B8E288B690E05342680D3F5F7E41254F477D1F09876A4C8B58CE3B0D61D9AED5
26,098,432 UART: Caliptra RT
26,099,143 UART: [state] CFI Enabled
26,264,521 UART: [rt] RT listening for mailbox commands...
26,296,314 UART: [rt]cmd =0x50435245, len=56
26,298,260 >>> mbox cmd response: failed
26,298,581 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,328,841 UART: [rt]cmd =0x50435245, len=56
26,330,329 >>> mbox cmd response: failed
26,330,637 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,360,844 UART: [rt]cmd =0x50435245, len=56
26,362,363 >>> mbox cmd response: failed
26,362,632 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,392,877 UART: [rt]cmd =0x50435245, len=56
26,394,589 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,747,531 ready_for_fw is high
3,747,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,987 >>> mbox cmd response: success
14,954,641 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,202,068 UART:
19,202,459 UART: Running Caliptra FMC ...
19,203,597 UART:
19,203,767 UART: [state] CFI Enabled
19,211,602 UART: [fht] FMC Alias Private Key: 7
20,968,316 UART: [art] Extend RT PCRs Done
20,969,543 UART: [art] Lock RT PCRs Done
20,971,170 UART: [art] Populate DV Done
20,976,636 UART: [fht] FMC Alias Private Key: 7
20,978,173 UART: [art] Derive CDI
20,978,981 UART: [art] Store in in slot 0x4
21,021,636 UART: [art] Derive Key Pair
21,022,671 UART: [art] Store priv key in slot 0x5
23,449,384 UART: [art] Derive Key Pair - Done
23,462,441 UART: [art] Signing Cert with AUTHO
23,463,746 UART: RITY.KEYID = 7
25,169,386 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,889 UART: [art] PUB.X = 9B4BD01870EF9B2A81531F1567D8BA410F52BB4E919AD3EE25B7210A4C173C608B8AD10B6E19B7459B3FBA221A35C00B
25,178,216 UART: [art] PUB.Y = 8A524E8CC7DD5E394A7800B602FCB4AD6E741A61EFEEE3EACF98DB3A56688B5190167B27EC2D26DF8ADA153D33446A10
25,185,449 UART: [art] SIG.R = ECA5C1A2111EF17070151C87D218F6E4B40BD4C1A810647DA82591AAF3F51AAA0A5D50D9D30CCFC24D411189CADF47BF
25,192,839 UART: [art] SIG.S = 4C53D426D565C2B10B6FED348F459BB55177FEC9F78BFFCFFAB1A9352A6F9556401B9042C42315D4283D8129EC0C9F73
26,172,776 UART: Caliptra RT
26,173,485 UART: [state] CFI Enabled
26,291,628 UART: [rt] RT listening for mailbox commands...
26,323,187 UART: [rt]cmd =0x50435245, len=56
26,324,703 >>> mbox cmd response: failed
26,325,005 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,355,266 UART: [rt]cmd =0x50435245, len=56
26,356,914 >>> mbox cmd response: failed
26,357,174 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,387,034 UART: [rt]cmd =0x50435245, len=56
26,389,038 >>> mbox cmd response: failed
26,389,337 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,419,258 UART: [rt]cmd =0x50435245, len=56
26,421,170 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,285 UART: [kat] SHA2-256
892,223 UART: [kat] SHA2-384
894,804 UART: [kat] SHA2-512-ACC
896,705 UART: [kat] ECC-384
902,180 UART: [kat] HMAC-384Kdf
906,782 UART: [kat] LMS
1,474,978 UART: [kat] --
1,475,881 UART: [cold-reset] ++
1,476,219 UART: [fht] Storing FHT @ 0x50003400
1,478,992 UART: [idev] ++
1,479,160 UART: [idev] CDI.KEYID = 6
1,479,520 UART: [idev] SUBJECT.KEYID = 7
1,479,944 UART: [idev] UDS.KEYID = 0
1,480,289 ready_for_fw is high
1,480,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,666 UART: [idev] Erasing UDS.KEYID = 0
1,503,528 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,054 UART: [idev] --
1,513,181 UART: [ldev] ++
1,513,349 UART: [ldev] CDI.KEYID = 6
1,513,712 UART: [ldev] SUBJECT.KEYID = 5
1,514,138 UART: [ldev] AUTHORITY.KEYID = 7
1,514,601 UART: [ldev] FE.KEYID = 1
1,519,985 UART: [ldev] Erasing FE.KEYID = 1
1,546,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,058 UART: [ldev] --
1,585,479 UART: [fwproc] Waiting for Commands...
1,586,224 UART: [fwproc] Received command 0x46574c44
1,587,015 UART: [fwproc] Received Image of size 114448 bytes
2,886,056 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,614 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,966 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,061 >>> mbox cmd response: success
3,078,061 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,079,307 UART: [afmc] ++
3,079,475 UART: [afmc] CDI.KEYID = 6
3,079,837 UART: [afmc] SUBJECT.KEYID = 7
3,080,262 UART: [afmc] AUTHORITY.KEYID = 5
3,115,489 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,669 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,449 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,062 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,752 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,631 UART: [afmc] --
3,158,715 UART: [cold-reset] --
3,159,373 UART: [state] Locking Datavault
3,160,404 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,008 UART: [state] Locking ICCM
3,161,600 UART: [exit] Launching FMC @ 0x40000130
3,166,929 UART:
3,166,945 UART: Running Caliptra FMC ...
3,167,353 UART:
3,167,407 UART: [state] CFI Enabled
3,177,418 UART: [fht] FMC Alias Private Key: 7
3,285,453 UART: [art] Extend RT PCRs Done
3,285,881 UART: [art] Lock RT PCRs Done
3,287,529 UART: [art] Populate DV Done
3,296,058 UART: [fht] FMC Alias Private Key: 7
3,297,058 UART: [art] Derive CDI
3,297,338 UART: [art] Store in in slot 0x4
3,382,629 UART: [art] Derive Key Pair
3,382,989 UART: [art] Store priv key in slot 0x5
3,396,149 UART: [art] Derive Key Pair - Done
3,410,773 UART: [art] Signing Cert with AUTHO
3,411,253 UART: RITY.KEYID = 7
3,426,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,032 UART: [art] PUB.X = 49B8A52C1B71E98EF9068868315905727C19708C7009F78E8242D439E44E442EB42F26A345B0DF555CF65A7E589C92D2
3,433,785 UART: [art] PUB.Y = 5296456538EF72B81BA26877BFE1CE65DA1143B13D8A0059E74898BD95F06AA173465E2F4A666314C0925D94F854C854
3,440,707 UART: [art] SIG.R = AD13D8963CBC41AE64341CD1C01053A5A60AA7E29CC1F9F26E15A3C51B8D424DC4CD0E427EB9E1F8B1C918EE13E7470F
3,447,486 UART: [art] SIG.S = 726DEA4ABD5278063AB126539490B8BE9DC45AEE0D2760FA6EE74D43A07633B494163430BAFC5D5C33940E4AEB9AA7C5
3,471,738 UART: Caliptra RT
3,471,991 UART: [state] CFI Enabled
3,580,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,182 UART: [rt]cmd =0x50435245, len=56
3,612,734 >>> mbox cmd response: failed
3,612,734 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,314 UART: [rt]cmd =0x50435245, len=56
3,643,810 >>> mbox cmd response: failed
3,643,810 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,670 UART: [rt]cmd =0x50435245, len=56
3,674,928 >>> mbox cmd response: failed
3,674,928 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,462 UART: [rt]cmd =0x50435245, len=56
3,705,750 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,335 ready_for_fw is high
1,362,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,753 >>> mbox cmd response: success
2,928,753 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,989,643 UART:
2,989,659 UART: Running Caliptra FMC ...
2,990,067 UART:
2,990,121 UART: [state] CFI Enabled
3,000,626 UART: [fht] FMC Alias Private Key: 7
3,108,271 UART: [art] Extend RT PCRs Done
3,108,699 UART: [art] Lock RT PCRs Done
3,110,191 UART: [art] Populate DV Done
3,118,536 UART: [fht] FMC Alias Private Key: 7
3,119,602 UART: [art] Derive CDI
3,119,882 UART: [art] Store in in slot 0x4
3,205,245 UART: [art] Derive Key Pair
3,205,605 UART: [art] Store priv key in slot 0x5
3,218,713 UART: [art] Derive Key Pair - Done
3,233,642 UART: [art] Signing Cert with AUTHO
3,234,122 UART: RITY.KEYID = 7
3,249,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,143 UART: [art] PUB.X = 33AF22790D67BBB93ABA274F4A48CC6A7440FBBE119463694E3348EC13A093166ED6C1C40230D36DAE7CFC7484CF83F1
3,256,917 UART: [art] PUB.Y = B814679C5D52438681E1A7BDBED688A2497C0F8F62DE4110D72EC4BB774A5B1BE86D0D660C5B7B707F806794B1BAC4CA
3,263,870 UART: [art] SIG.R = 9B44828C2896720F420BF7F93EB1B4971E2000E45348AC4EFC87BE2BFD0CDCB8B34697910A83D82CCB0576E2CCD2701F
3,270,613 UART: [art] SIG.S = 9CC0796610DDCED4F08F594B02A1BA1CD9193ED939B2C6D033792249BD47CA076A7996ED49123CCB7400A081251C3648
3,294,266 UART: Caliptra RT
3,294,519 UART: [state] CFI Enabled
3,402,677 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,407 UART: [rt]cmd =0x50435245, len=56
3,435,055 >>> mbox cmd response: failed
3,435,055 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,739 UART: [rt]cmd =0x50435245, len=56
3,466,463 >>> mbox cmd response: failed
3,466,463 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,249 UART: [rt]cmd =0x50435245, len=56
3,497,753 >>> mbox cmd response: failed
3,497,753 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,307 UART: [rt]cmd =0x50435245, len=56
3,528,523 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,356 UART: [kat] SHA2-256
882,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,402 UART: [kat] ++
886,554 UART: [kat] sha1
890,926 UART: [kat] SHA2-256
892,864 UART: [kat] SHA2-384
895,589 UART: [kat] SHA2-512-ACC
897,490 UART: [kat] ECC-384
903,165 UART: [kat] HMAC-384Kdf
907,845 UART: [kat] LMS
1,476,041 UART: [kat] --
1,477,054 UART: [cold-reset] ++
1,477,574 UART: [fht] Storing FHT @ 0x50003400
1,480,325 UART: [idev] ++
1,480,493 UART: [idev] CDI.KEYID = 6
1,480,853 UART: [idev] SUBJECT.KEYID = 7
1,481,277 UART: [idev] UDS.KEYID = 0
1,481,622 ready_for_fw is high
1,481,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,263 UART: [idev] Erasing UDS.KEYID = 0
1,506,129 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,693 UART: [idev] --
1,515,514 UART: [ldev] ++
1,515,682 UART: [ldev] CDI.KEYID = 6
1,516,045 UART: [ldev] SUBJECT.KEYID = 5
1,516,471 UART: [ldev] AUTHORITY.KEYID = 7
1,516,934 UART: [ldev] FE.KEYID = 1
1,522,364 UART: [ldev] Erasing FE.KEYID = 1
1,547,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,759 UART: [ldev] --
1,587,156 UART: [fwproc] Waiting for Commands...
1,587,841 UART: [fwproc] Received command 0x46574c44
1,588,632 UART: [fwproc] Received Image of size 114448 bytes
2,887,795 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,571 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,923 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,834 >>> mbox cmd response: success
3,080,834 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,081,994 UART: [afmc] ++
3,082,162 UART: [afmc] CDI.KEYID = 6
3,082,524 UART: [afmc] SUBJECT.KEYID = 7
3,082,949 UART: [afmc] AUTHORITY.KEYID = 5
3,117,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,554 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,947 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,637 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,438 UART: [afmc] --
3,161,550 UART: [cold-reset] --
3,162,618 UART: [state] Locking Datavault
3,163,891 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,495 UART: [state] Locking ICCM
3,164,977 UART: [exit] Launching FMC @ 0x40000130
3,170,306 UART:
3,170,322 UART: Running Caliptra FMC ...
3,170,730 UART:
3,170,873 UART: [state] CFI Enabled
3,181,634 UART: [fht] FMC Alias Private Key: 7
3,290,285 UART: [art] Extend RT PCRs Done
3,290,713 UART: [art] Lock RT PCRs Done
3,292,313 UART: [art] Populate DV Done
3,300,650 UART: [fht] FMC Alias Private Key: 7
3,301,816 UART: [art] Derive CDI
3,302,096 UART: [art] Store in in slot 0x4
3,387,851 UART: [art] Derive Key Pair
3,388,211 UART: [art] Store priv key in slot 0x5
3,401,375 UART: [art] Derive Key Pair - Done
3,416,264 UART: [art] Signing Cert with AUTHO
3,416,744 UART: RITY.KEYID = 7
3,432,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,053 UART: [art] PUB.X = 4902C15A296D728A1F99EE9C81E5374268E2F0A4723E495F341C9ADBE6BABF3F81523967F8C141921F23F359A7766BFA
3,439,822 UART: [art] PUB.Y = 0BAE852B3AB48015905754F50970884258FC9B3C084AEF3B794572A7BA0C749CDDABC2391A0767929AA646EDE8A24591
3,446,759 UART: [art] SIG.R = A31BFF9787412E714368F5F2081D53D0D493656035288E42CCB00D832D1B547F1F0AD6B6F889A5D30B1B8F95D5264636
3,453,513 UART: [art] SIG.S = AA1A538D7C712B3EA9771331155151CCB63D2B296E99E68BC501C984DB6E8C673C855C9BDBEBB4C75298599F66E6D3C5
3,477,051 UART: Caliptra RT
3,477,396 UART: [state] CFI Enabled
3,585,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,520 UART: [rt]cmd =0x50435245, len=56
3,618,198 >>> mbox cmd response: failed
3,618,198 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,080 UART: [rt]cmd =0x50435245, len=56
3,649,474 >>> mbox cmd response: failed
3,649,474 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,679,036 UART: [rt]cmd =0x50435245, len=56
3,680,742 >>> mbox cmd response: failed
3,680,742 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,524 UART: [rt]cmd =0x50435245, len=56
3,711,986 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,776 ready_for_fw is high
1,362,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,930 >>> mbox cmd response: success
2,930,930 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,992,778 UART:
2,992,794 UART: Running Caliptra FMC ...
2,993,202 UART:
2,993,345 UART: [state] CFI Enabled
3,003,660 UART: [fht] FMC Alias Private Key: 7
3,111,585 UART: [art] Extend RT PCRs Done
3,112,013 UART: [art] Lock RT PCRs Done
3,113,657 UART: [art] Populate DV Done
3,121,638 UART: [fht] FMC Alias Private Key: 7
3,122,654 UART: [art] Derive CDI
3,122,934 UART: [art] Store in in slot 0x4
3,208,473 UART: [art] Derive Key Pair
3,208,833 UART: [art] Store priv key in slot 0x5
3,221,973 UART: [art] Derive Key Pair - Done
3,236,705 UART: [art] Signing Cert with AUTHO
3,237,185 UART: RITY.KEYID = 7
3,252,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,346 UART: [art] PUB.X = 1268EAA4775A1511E7674798BFF37BFF700F4C26FF7CEDC62CB447A1B0A8B009DC34D907EB08FA443EAE613AB874FFF5
3,260,122 UART: [art] PUB.Y = 3B22AF1B4760EE1F40AE0E527D24E52CB9DA95FCBF5D093913324C9FE31AF5D449269D667D6394E22E500078BFCBF255
3,267,054 UART: [art] SIG.R = C5E602FF6E709A98C71554464BAD126C6796874D3CCA2F407405BE010A4842CFF6C6161B0F5B86405FB5E48E084EB1DD
3,273,812 UART: [art] SIG.S = 5D536E8D440CD100713ABC32A446E830A2B690E9F177D658A2B2BF2936AA57F4ECB419E3230D82C523F6E20C0FB71D61
3,298,097 UART: Caliptra RT
3,298,442 UART: [state] CFI Enabled
3,405,583 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,361 UART: [rt]cmd =0x50435245, len=56
3,438,071 >>> mbox cmd response: failed
3,438,071 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,543 UART: [rt]cmd =0x50435245, len=56
3,469,309 >>> mbox cmd response: failed
3,469,309 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,021 UART: [rt]cmd =0x50435245, len=56
3,500,567 >>> mbox cmd response: failed
3,500,567 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,067 UART: [rt]cmd =0x50435245, len=56
3,531,625 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
902,037 UART: [kat] SHA2-256
903,977 UART: [kat] SHA2-384
906,554 UART: [kat] SHA2-512-ACC
908,455 UART: [kat] ECC-384
917,854 UART: [kat] HMAC-384Kdf
922,498 UART: [kat] LMS
1,170,826 UART: [kat] --
1,172,017 UART: [cold-reset] ++
1,172,507 UART: [fht] FHT @ 0x50003400
1,175,116 UART: [idev] ++
1,175,284 UART: [idev] CDI.KEYID = 6
1,175,644 UART: [idev] SUBJECT.KEYID = 7
1,176,068 UART: [idev] UDS.KEYID = 0
1,176,413 ready_for_fw is high
1,176,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,824 UART: [idev] Erasing UDS.KEYID = 0
1,200,943 UART: [idev] Sha1 KeyId Algorithm
1,209,595 UART: [idev] --
1,210,551 UART: [ldev] ++
1,210,719 UART: [ldev] CDI.KEYID = 6
1,211,082 UART: [ldev] SUBJECT.KEYID = 5
1,211,508 UART: [ldev] AUTHORITY.KEYID = 7
1,211,971 UART: [ldev] FE.KEYID = 1
1,217,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,495 UART: [ldev] --
1,281,988 UART: [fwproc] Wait for Commands...
1,282,652 UART: [fwproc] Recv command 0x46574c44
1,283,380 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,844 >>> mbox cmd response: success
2,773,844 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,775,040 UART: [afmc] ++
2,775,208 UART: [afmc] CDI.KEYID = 6
2,775,570 UART: [afmc] SUBJECT.KEYID = 7
2,775,995 UART: [afmc] AUTHORITY.KEYID = 5
2,810,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,559 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,444 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,163 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,001 UART: [afmc] --
2,853,973 UART: [cold-reset] --
2,855,041 UART: [state] Locking Datavault
2,856,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,834 UART: [state] Locking ICCM
2,857,508 UART: [exit] Launching FMC @ 0x40000130
2,862,837 UART:
2,862,853 UART: Running Caliptra FMC ...
2,863,261 UART:
2,863,315 UART: [state] CFI Enabled
2,873,776 UART: [fht] FMC Alias Private Key: 7
2,982,305 UART: [art] Extend RT PCRs Done
2,982,733 UART: [art] Lock RT PCRs Done
2,984,283 UART: [art] Populate DV Done
2,992,338 UART: [fht] FMC Alias Private Key: 7
2,993,274 UART: [art] Derive CDI
2,993,554 UART: [art] Store in in slot 0x4
3,079,121 UART: [art] Derive Key Pair
3,079,481 UART: [art] Store priv key in slot 0x5
3,091,635 UART: [art] Derive Key Pair - Done
3,106,632 UART: [art] Signing Cert with AUTHO
3,107,112 UART: RITY.KEYID = 7
3,122,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,949 UART: [art] PUB.X = 1E74948E5A3FD83005FCC0CFE9C82BFE5EC3070C207D21F3D68EE637DDE3737A6054E314E7B2B4AB1AF244A01C469B96
3,129,724 UART: [art] PUB.Y = 329B55708DB07F846C2C61B0D0BADDB3F19AA02172E31F7054C75B52569A069928E3A9346D8B10DA5A7A95311F3E97D7
3,136,673 UART: [art] SIG.R = A30A0384B27052FA2781643CB2F768E49760A65C7B3EB5C703FCFE1A684573E6DC7175E5DAA0B229DB290DD3E4AFFC89
3,143,443 UART: [art] SIG.S = 08269EED8E04DE1B35336758EF12D64ADC95F8096DC38C28516AC96403038A2B87870662156B39276729BB0B801762C5
3,166,971 UART: Caliptra RT
3,167,224 UART: [state] CFI Enabled
3,275,193 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,281 UART: [rt]cmd =0x50435245, len=56
3,307,663 >>> mbox cmd response: failed
3,307,663 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,235 UART: [rt]cmd =0x50435245, len=56
3,338,523 >>> mbox cmd response: failed
3,338,523 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,109 UART: [rt]cmd =0x50435245, len=56
3,369,619 >>> mbox cmd response: failed
3,369,619 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,291 UART: [rt]cmd =0x50435245, len=56
3,400,727 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,181 ready_for_fw is high
1,060,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,481 >>> mbox cmd response: success
2,627,481 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,690,493 UART:
2,690,509 UART: Running Caliptra FMC ...
2,690,917 UART:
2,690,971 UART: [state] CFI Enabled
2,701,688 UART: [fht] FMC Alias Private Key: 7
2,809,975 UART: [art] Extend RT PCRs Done
2,810,403 UART: [art] Lock RT PCRs Done
2,811,637 UART: [art] Populate DV Done
2,819,800 UART: [fht] FMC Alias Private Key: 7
2,820,960 UART: [art] Derive CDI
2,821,240 UART: [art] Store in in slot 0x4
2,906,877 UART: [art] Derive Key Pair
2,907,237 UART: [art] Store priv key in slot 0x5
2,919,881 UART: [art] Derive Key Pair - Done
2,934,790 UART: [art] Signing Cert with AUTHO
2,935,270 UART: RITY.KEYID = 7
2,950,648 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,413 UART: [art] PUB.X = 41E573A7C0BE6BAA4F1E7DB603430BCC773060BB2496C129065E0DC87E84E04C4580836563B8814E20EE884F414AB04D
2,958,173 UART: [art] PUB.Y = BF9BF9E4A92DA9EC6FE0D7B46D9E50768D27D5254CF0AE38C1973ECE63B98C2853C5D84FD0479C4789D715E19C299250
2,965,133 UART: [art] SIG.R = B9E19754854A1503D49C5126F5D4F82F7499EF3B444DB74DA03BED2F93201BB26C9C7A31E62FFCD392D9D66513B4B9AF
2,971,910 UART: [art] SIG.S = 3D3305EA055D0604AE9E9A76A1C9E7ECD908FB67CA4F5D80CA7FB6002E34EA7D30A3055BFE15FFFDC7E13DA16247979D
2,995,969 UART: Caliptra RT
2,996,222 UART: [state] CFI Enabled
3,103,709 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,227 UART: [rt]cmd =0x50435245, len=56
3,135,875 >>> mbox cmd response: failed
3,135,875 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,351 UART: [rt]cmd =0x50435245, len=56
3,166,443 >>> mbox cmd response: failed
3,166,443 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,057 UART: [rt]cmd =0x50435245, len=56
3,197,501 >>> mbox cmd response: failed
3,197,501 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,411 UART: [rt]cmd =0x50435245, len=56
3,228,689 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
893,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,460 UART: [kat] ++
897,612 UART: [kat] sha1
901,852 UART: [kat] SHA2-256
903,792 UART: [kat] SHA2-384
906,497 UART: [kat] SHA2-512-ACC
908,398 UART: [kat] ECC-384
918,093 UART: [kat] HMAC-384Kdf
922,939 UART: [kat] LMS
1,171,267 UART: [kat] --
1,172,086 UART: [cold-reset] ++
1,172,596 UART: [fht] FHT @ 0x50003400
1,175,143 UART: [idev] ++
1,175,311 UART: [idev] CDI.KEYID = 6
1,175,671 UART: [idev] SUBJECT.KEYID = 7
1,176,095 UART: [idev] UDS.KEYID = 0
1,176,440 ready_for_fw is high
1,176,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,191 UART: [idev] Erasing UDS.KEYID = 0
1,201,452 UART: [idev] Sha1 KeyId Algorithm
1,210,036 UART: [idev] --
1,211,102 UART: [ldev] ++
1,211,270 UART: [ldev] CDI.KEYID = 6
1,211,633 UART: [ldev] SUBJECT.KEYID = 5
1,212,059 UART: [ldev] AUTHORITY.KEYID = 7
1,212,522 UART: [ldev] FE.KEYID = 1
1,217,940 UART: [ldev] Erasing FE.KEYID = 1
1,244,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,438 UART: [ldev] --
1,283,731 UART: [fwproc] Wait for Commands...
1,284,371 UART: [fwproc] Recv command 0x46574c44
1,285,099 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,289 >>> mbox cmd response: success
2,777,289 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,778,541 UART: [afmc] ++
2,778,709 UART: [afmc] CDI.KEYID = 6
2,779,071 UART: [afmc] SUBJECT.KEYID = 7
2,779,496 UART: [afmc] AUTHORITY.KEYID = 5
2,814,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,008 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,736 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,621 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,340 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,254 UART: [afmc] --
2,858,316 UART: [cold-reset] --
2,859,082 UART: [state] Locking Datavault
2,860,119 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,723 UART: [state] Locking ICCM
2,861,233 UART: [exit] Launching FMC @ 0x40000130
2,866,562 UART:
2,866,578 UART: Running Caliptra FMC ...
2,866,986 UART:
2,867,129 UART: [state] CFI Enabled
2,878,056 UART: [fht] FMC Alias Private Key: 7
2,986,449 UART: [art] Extend RT PCRs Done
2,986,877 UART: [art] Lock RT PCRs Done
2,988,553 UART: [art] Populate DV Done
2,996,888 UART: [fht] FMC Alias Private Key: 7
2,998,030 UART: [art] Derive CDI
2,998,310 UART: [art] Store in in slot 0x4
3,084,277 UART: [art] Derive Key Pair
3,084,637 UART: [art] Store priv key in slot 0x5
3,097,975 UART: [art] Derive Key Pair - Done
3,112,815 UART: [art] Signing Cert with AUTHO
3,113,295 UART: RITY.KEYID = 7
3,128,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,120 UART: [art] PUB.X = 70553043410A87C4D071F9A9EA723ACBDC14249B23EC406DDC7EA03DDD603EDD397B8E69A64FD29E968FF64F4F3EA783
3,135,901 UART: [art] PUB.Y = 2AB3A3EFAFCE89441BA1E1B8F2C68B34DC31EC84F8E134BBACF704FE450557069DE7B8AE1FEA689AFC74AA6D48394451
3,142,866 UART: [art] SIG.R = B9B2B056D1CA36FD84A754B8B2FF4A81489940A3F3ADD903E1C09312F87853AFC74A660AFEFC3A014C02302702505F64
3,149,627 UART: [art] SIG.S = 9910BF302082F4BEE517B802D41F8549A880AA22576F18750E7CC398C6FF10AAFE61849BAFC08D44E8AF512A89989C79
3,173,238 UART: Caliptra RT
3,173,583 UART: [state] CFI Enabled
3,282,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,693 UART: [rt]cmd =0x50435245, len=56
3,314,117 >>> mbox cmd response: failed
3,314,117 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,831 UART: [rt]cmd =0x50435245, len=56
3,345,483 >>> mbox cmd response: failed
3,345,483 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,161 UART: [rt]cmd =0x50435245, len=56
3,376,341 >>> mbox cmd response: failed
3,376,341 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,021 UART: [rt]cmd =0x50435245, len=56
3,407,407 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,838 ready_for_fw is high
1,060,838 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,936 >>> mbox cmd response: success
2,627,936 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,690,646 UART:
2,690,662 UART: Running Caliptra FMC ...
2,691,070 UART:
2,691,213 UART: [state] CFI Enabled
2,701,626 UART: [fht] FMC Alias Private Key: 7
2,810,009 UART: [art] Extend RT PCRs Done
2,810,437 UART: [art] Lock RT PCRs Done
2,812,253 UART: [art] Populate DV Done
2,820,522 UART: [fht] FMC Alias Private Key: 7
2,821,700 UART: [art] Derive CDI
2,821,980 UART: [art] Store in in slot 0x4
2,907,495 UART: [art] Derive Key Pair
2,907,855 UART: [art] Store priv key in slot 0x5
2,921,125 UART: [art] Derive Key Pair - Done
2,936,108 UART: [art] Signing Cert with AUTHO
2,936,588 UART: RITY.KEYID = 7
2,951,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,875 UART: [art] PUB.X = 370C1A9872F0FF293BB030C2205E6FB58496B8AAF892F636FB823DE4BD1B9E7FBB32B214D297AB20697A95318DE11D44
2,958,650 UART: [art] PUB.Y = 8E13DF0D682007FBCA6115E4B9797E894B9AB46415D7DF8E2749A07F98421B7DD74B5CC2527C882BF70DAE599028316D
2,965,595 UART: [art] SIG.R = F67F3F04053A91DC60CA28932979C73B2B84B6C5A0BC016E3501D295CA68A05E029AA1C25C522D6B38BD2286BE51510E
2,972,351 UART: [art] SIG.S = 30FF26B79EC30EC07DCE906073F6FC7EF614F414EFACBF9924F9547DF969275E31AAD69CE06E285ADAB34A20AF262165
2,995,601 UART: Caliptra RT
2,995,946 UART: [state] CFI Enabled
3,103,887 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,817 UART: [rt]cmd =0x50435245, len=56
3,136,285 >>> mbox cmd response: failed
3,136,285 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,857 UART: [rt]cmd =0x50435245, len=56
3,167,363 >>> mbox cmd response: failed
3,167,363 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,973 UART: [rt]cmd =0x50435245, len=56
3,198,421 >>> mbox cmd response: failed
3,198,421 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,193 UART: [rt]cmd =0x50435245, len=56
3,229,583 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
915,820 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,743 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,173,005 UART: [idev] ++
1,173,173 UART: [idev] CDI.KEYID = 6
1,173,534 UART: [idev] SUBJECT.KEYID = 7
1,173,959 UART: [idev] UDS.KEYID = 0
1,174,305 ready_for_fw is high
1,174,305 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,287 UART: [idev] --
1,208,464 UART: [ldev] ++
1,208,632 UART: [ldev] CDI.KEYID = 6
1,208,996 UART: [ldev] SUBJECT.KEYID = 5
1,209,423 UART: [ldev] AUTHORITY.KEYID = 7
1,209,886 UART: [ldev] FE.KEYID = 1
1,215,314 UART: [ldev] Erasing FE.KEYID = 1
1,241,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,984 UART: [ldev] --
1,280,476 UART: [fwproc] Wait for Commands...
1,281,181 UART: [fwproc] Recv command 0x46574c44
1,281,914 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,244 >>> mbox cmd response: success
2,772,244 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,773,285 UART: [afmc] ++
2,773,453 UART: [afmc] CDI.KEYID = 6
2,773,816 UART: [afmc] SUBJECT.KEYID = 7
2,774,242 UART: [afmc] AUTHORITY.KEYID = 5
2,809,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,259 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,142 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,861 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,620 UART: [afmc] --
2,852,664 UART: [cold-reset] --
2,853,434 UART: [state] Locking Datavault
2,854,559 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,163 UART: [state] Locking ICCM
2,855,809 UART: [exit] Launching FMC @ 0x40000130
2,861,138 UART:
2,861,154 UART: Running Caliptra FMC ...
2,861,562 UART:
2,861,616 UART: [state] CFI Enabled
2,871,821 UART: [fht] FMC Alias Private Key: 7
2,979,952 UART: [art] Extend RT PCRs Done
2,980,380 UART: [art] Lock RT PCRs Done
2,982,214 UART: [art] Populate DV Done
2,990,629 UART: [fht] FMC Alias Private Key: 7
2,991,777 UART: [art] Derive CDI
2,992,057 UART: [art] Store in in slot 0x4
3,077,744 UART: [art] Derive Key Pair
3,078,104 UART: [art] Store priv key in slot 0x5
3,091,158 UART: [art] Derive Key Pair - Done
3,105,967 UART: [art] Signing Cert with AUTHO
3,106,447 UART: RITY.KEYID = 7
3,121,213 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,978 UART: [art] PUB.X = 59C03AE3A74AE70B081F5D3D657522E556AF51F7EF01F7AFDA938C5432E6685AEA158A182A95B1C34399A01018453934
3,128,739 UART: [art] PUB.Y = 0F0628D18521A27E6E98ED6678297F3C9733BE9288670045F7A9CF8D5C7A5C9E4511612B5332921F31F049E88BF4797A
3,135,653 UART: [art] SIG.R = 6C87D6F61E758FF56D6AB85B7F5C616CE9AEA633F6B53353FDD7B5C7BDF4AB5036B1DAFF197AC7546F11BD810BF2817C
3,142,442 UART: [art] SIG.S = F7B64140C2EFA9127A47BB80AFDCC6C5C147E2C3A9E777790868F36F5B33B7C3B54CC13669C0C2CB630613C734BDBA76
3,166,265 UART: Caliptra RT
3,166,518 UART: [state] CFI Enabled
3,274,655 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,389 UART: [rt]cmd =0x50435245, len=56
3,306,887 >>> mbox cmd response: failed
3,306,887 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,731 UART: [rt]cmd =0x50435245, len=56
3,338,089 >>> mbox cmd response: failed
3,338,089 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,895 UART: [rt]cmd =0x50435245, len=56
3,368,933 >>> mbox cmd response: failed
3,368,933 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,755 UART: [rt]cmd =0x50435245, len=56
3,400,297 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,182 ready_for_fw is high
1,056,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,986 >>> mbox cmd response: success
2,624,986 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,830 UART:
2,686,846 UART: Running Caliptra FMC ...
2,687,254 UART:
2,687,308 UART: [state] CFI Enabled
2,697,677 UART: [fht] FMC Alias Private Key: 7
2,806,114 UART: [art] Extend RT PCRs Done
2,806,542 UART: [art] Lock RT PCRs Done
2,807,826 UART: [art] Populate DV Done
2,815,891 UART: [fht] FMC Alias Private Key: 7
2,816,907 UART: [art] Derive CDI
2,817,187 UART: [art] Store in in slot 0x4
2,902,522 UART: [art] Derive Key Pair
2,902,882 UART: [art] Store priv key in slot 0x5
2,915,970 UART: [art] Derive Key Pair - Done
2,930,414 UART: [art] Signing Cert with AUTHO
2,930,894 UART: RITY.KEYID = 7
2,946,304 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,069 UART: [art] PUB.X = 31046E06F944FA5FF5695064E686F94320CA132DE68054BA80D8C669DBD107DA95CAEFCEA53D28FE389A35C36750D81E
2,953,838 UART: [art] PUB.Y = A1E7AC8289A5D0F8EBDA305D631E9F480BAC4AE599FD677471ED7079D3B6F355D987CE35BB28F07F440B8A2310244F66
2,960,792 UART: [art] SIG.R = 9BD591EAEFCD2A852CFF2B722F0CC9A435C0BEB958AF06A702BC6D0899E17F0C16547D5DF137D6F7B371913CC32BC496
2,967,565 UART: [art] SIG.S = DD138C16E100FD209CAC099DC0FB7F77F85D223818D117B87F63C79A4BD23332AA7EF89DF05DA73B72A06AA0810A1460
2,991,254 UART: Caliptra RT
2,991,507 UART: [state] CFI Enabled
3,098,977 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,685 UART: [rt]cmd =0x50435245, len=56
3,131,101 >>> mbox cmd response: failed
3,131,101 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,891 UART: [rt]cmd =0x50435245, len=56
3,162,311 >>> mbox cmd response: failed
3,162,311 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,075 UART: [rt]cmd =0x50435245, len=56
3,193,573 >>> mbox cmd response: failed
3,193,573 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,995 UART: [rt]cmd =0x50435245, len=56
3,224,395 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,188 UART: [kat] SHA2-256
902,128 UART: [kat] SHA2-384
905,035 UART: [kat] SHA2-512-ACC
906,936 UART: [kat] ECC-384
916,445 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,388 UART: [idev] ++
1,173,556 UART: [idev] CDI.KEYID = 6
1,173,917 UART: [idev] SUBJECT.KEYID = 7
1,174,342 UART: [idev] UDS.KEYID = 0
1,174,688 ready_for_fw is high
1,174,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,588 UART: [idev] Erasing UDS.KEYID = 0
1,199,594 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,215,947 UART: [ldev] Erasing FE.KEYID = 1
1,242,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,561 UART: [ldev] --
1,281,889 UART: [fwproc] Wait for Commands...
1,282,548 UART: [fwproc] Recv command 0x46574c44
1,283,281 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,023 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,929 >>> mbox cmd response: success
2,773,929 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,775,012 UART: [afmc] ++
2,775,180 UART: [afmc] CDI.KEYID = 6
2,775,543 UART: [afmc] SUBJECT.KEYID = 7
2,775,969 UART: [afmc] AUTHORITY.KEYID = 5
2,812,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,265 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,994 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,877 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,596 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,323 UART: [afmc] --
2,855,213 UART: [cold-reset] --
2,856,025 UART: [state] Locking Datavault
2,857,324 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,928 UART: [state] Locking ICCM
2,858,488 UART: [exit] Launching FMC @ 0x40000130
2,863,817 UART:
2,863,833 UART: Running Caliptra FMC ...
2,864,241 UART:
2,864,384 UART: [state] CFI Enabled
2,875,111 UART: [fht] FMC Alias Private Key: 7
2,982,502 UART: [art] Extend RT PCRs Done
2,982,930 UART: [art] Lock RT PCRs Done
2,984,560 UART: [art] Populate DV Done
2,992,675 UART: [fht] FMC Alias Private Key: 7
2,993,763 UART: [art] Derive CDI
2,994,043 UART: [art] Store in in slot 0x4
3,079,570 UART: [art] Derive Key Pair
3,079,930 UART: [art] Store priv key in slot 0x5
3,093,024 UART: [art] Derive Key Pair - Done
3,107,525 UART: [art] Signing Cert with AUTHO
3,108,005 UART: RITY.KEYID = 7
3,123,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,088 UART: [art] PUB.X = E029C07566398EBF4FA91AA481ED15A738D5AB68CC7F793BDA9EB57513B047FADCCBEE8786FBC87FED62811A4B5BBB1D
3,130,884 UART: [art] PUB.Y = 4BD2CA7C2A2ABAD79E4BE3E464B1A6F7DD88AFFCFD0FD018518F2F297523ECB0F72F90116313B9D5EBCBA0910D2EF9F2
3,137,856 UART: [art] SIG.R = 72303961FE30503EBA9525A770DA01309AD02B7093158D70F0EC6BAC32838555D8C9B1D276BCEFA6DC7D103573C0C119
3,144,625 UART: [art] SIG.S = 7FD6730674F73CC17D08A14155B83DA6F4A788B4E043E66E42DCA4A9F9125287D73F71A3C40B4925718B443956A21575
3,168,495 UART: Caliptra RT
3,168,840 UART: [state] CFI Enabled
3,275,309 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,159 UART: [rt]cmd =0x50435245, len=56
3,307,413 >>> mbox cmd response: failed
3,307,413 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,083 UART: [rt]cmd =0x50435245, len=56
3,338,429 >>> mbox cmd response: failed
3,338,429 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,321 UART: [rt]cmd =0x50435245, len=56
3,369,521 >>> mbox cmd response: failed
3,369,521 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,313 UART: [rt]cmd =0x50435245, len=56
3,400,713 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,733 ready_for_fw is high
1,056,733 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,379 >>> mbox cmd response: success
2,624,379 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,685,841 UART:
2,685,857 UART: Running Caliptra FMC ...
2,686,265 UART:
2,686,408 UART: [state] CFI Enabled
2,697,175 UART: [fht] FMC Alias Private Key: 7
2,805,622 UART: [art] Extend RT PCRs Done
2,806,050 UART: [art] Lock RT PCRs Done
2,807,422 UART: [art] Populate DV Done
2,815,373 UART: [fht] FMC Alias Private Key: 7
2,816,531 UART: [art] Derive CDI
2,816,811 UART: [art] Store in in slot 0x4
2,902,194 UART: [art] Derive Key Pair
2,902,554 UART: [art] Store priv key in slot 0x5
2,915,828 UART: [art] Derive Key Pair - Done
2,930,550 UART: [art] Signing Cert with AUTHO
2,931,030 UART: RITY.KEYID = 7
2,946,114 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,879 UART: [art] PUB.X = B36536A73443472F42BC303945A33F9A4D0F3B385B6B5A894411EADD49EEB2FC3B26D04137B54927D4A32064F00FF19A
2,953,645 UART: [art] PUB.Y = BD8841CB56B5BC9CA40562E1F893321668FC040FCE20DF4233D1B81117140EE85B4ABCF45DC3F31EDD303BC2A50F34D3
2,960,594 UART: [art] SIG.R = E5179D93DAA73D492AACCA9435FC230D9301D3EC2E4FC0F15C57CA715CAB6FEAD0ADD276625760B630EF20E1D3C49A4C
2,967,380 UART: [art] SIG.S = 23B55CE6A17ECD1B17A518B22957D43FAFBF574F2394381916B4066480FD8FC5C1B9732291425AE16D655D505492F7AE
2,991,268 UART: Caliptra RT
2,991,613 UART: [state] CFI Enabled
3,099,260 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,120 UART: [rt]cmd =0x50435245, len=56
3,131,400 >>> mbox cmd response: failed
3,131,400 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,012 UART: [rt]cmd =0x50435245, len=56
3,162,376 >>> mbox cmd response: failed
3,162,376 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,224 UART: [rt]cmd =0x50435245, len=56
3,193,318 >>> mbox cmd response: failed
3,193,318 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,948 UART: [rt]cmd =0x50435245, len=56
3,224,218 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,527 writing to cptra_bootfsm_go
193,633 UART:
193,992 UART: Running Caliptra ROM ...
195,097 UART:
195,247 UART: [state] CFI Enabled
266,165 UART: [state] LifecycleState = Unprovisioned
268,152 UART: [state] DebugLocked = No
270,107 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,606 UART: [kat] SHA2-256
445,280 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,796 UART: [kat] ++
456,245 UART: [kat] sha1
466,985 UART: [kat] SHA2-256
469,660 UART: [kat] SHA2-384
476,363 UART: [kat] SHA2-512-ACC
478,734 UART: [kat] ECC-384
2,768,123 UART: [kat] HMAC-384Kdf
2,800,253 UART: [kat] LMS
3,990,565 UART: [kat] --
3,994,709 UART: [cold-reset] ++
3,996,925 UART: [fht] Storing FHT @ 0x50003400
4,008,138 UART: [idev] ++
4,008,744 UART: [idev] CDI.KEYID = 6
4,009,665 UART: [idev] SUBJECT.KEYID = 7
4,010,848 UART: [idev] UDS.KEYID = 0
4,011,840 ready_for_fw is high
4,012,040 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,426 UART: [idev] Erasing UDS.KEYID = 0
7,348,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,220 UART: [idev] --
7,372,831 UART: [ldev] ++
7,373,415 UART: [ldev] CDI.KEYID = 6
7,374,438 UART: [ldev] SUBJECT.KEYID = 5
7,375,597 UART: [ldev] AUTHORITY.KEYID = 7
7,376,882 UART: [ldev] FE.KEYID = 1
7,425,281 UART: [ldev] Erasing FE.KEYID = 1
10,757,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,677 UART: [ldev] --
13,118,511 UART: [fwproc] Waiting for Commands...
13,121,680 UART: [fwproc] Received command 0x46574c44
13,123,904 UART: [fwproc] Received Image of size 114124 bytes
17,175,626 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,014 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,913 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,640,267 >>> mbox cmd response: success
17,640,828 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,644,761 UART: [afmc] ++
17,645,358 UART: [afmc] CDI.KEYID = 6
17,646,272 UART: [afmc] SUBJECT.KEYID = 7
17,647,540 UART: [afmc] AUTHORITY.KEYID = 5
21,012,190 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,069 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,332 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,716 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,558 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,983 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,341 UART: [afmc] --
23,381,777 UART: [cold-reset] --
23,384,995 UART: [state] Locking Datavault
23,389,434 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,139 UART: [state] Locking ICCM
23,393,565 UART: [exit] Launching FMC @ 0x40000130
23,401,964 UART:
23,402,201 UART: Running Caliptra FMC ...
23,403,300 UART:
23,403,459 UART: [state] CFI Enabled
23,471,300 UART: [fht] FMC Alias Private Key: 7
25,809,422 UART: [art] Extend RT PCRs Done
25,810,645 UART: [art] Lock RT PCRs Done
25,812,242 UART: [art] Populate DV Done
25,817,767 UART: [fht] FMC Alias Private Key: 7
25,819,303 UART: [art] Derive CDI
25,820,116 UART: [art] Store in in slot 0x4
25,879,851 UART: [art] Derive Key Pair
25,880,898 UART: [art] Store priv key in slot 0x5
29,174,311 UART: [art] Derive Key Pair - Done
29,187,308 UART: [art] Signing Cert with AUTHO
29,188,605 UART: RITY.KEYID = 7
31,476,069 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,569 UART: [art] PUB.X = 8E38EC4D91F7DA48B31F08096CB38A4CEE75364C076CFDDB79F61C31C5300587DC8FA6F9AC117C7A362EC082D3127317
31,484,823 UART: [art] PUB.Y = 3C91FA574B50F0605C5ACD4C32616BEF8FC7CAD2D5A909A9F70A66FA81736CCB4EB84417BBE477550AFDCD115EE6909C
31,492,099 UART: [art] SIG.R = 9DC4EB3F31C38887D0AE2BFD9C32C827580FE03ACA3FA950781ED12AC56D0D73569767221790698140B00BC2B73A4FA5
31,499,436 UART: [art] SIG.S = DA259DCADCC09CF514094CCDF5141EEB6F428E877B9C70FE44E7C09287247D488D6128D558C72D10C32384E42C56C842
32,805,031 UART: Caliptra RT
32,805,734 UART: [state] CFI Enabled
32,966,998 UART: [rt] RT listening for mailbox commands...
32,998,404 UART: [rt]cmd =0x50435252, len=8
33,000,361 >>> mbox cmd response data (8 bytes)
33,001,304 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,031,381 UART: [rt]cmd =0x50435251, len=36
34,194,640 >>> mbox cmd response data (1848 bytes)
34,204,915 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,234,830 UART: [rt]cmd =0x43455246, len=4
34,247,748 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,806,507 ready_for_fw is high
3,807,116 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,871,098 >>> mbox cmd response: success
17,871,846 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,566,646 UART:
23,567,040 UART: Running Caliptra FMC ...
23,568,150 UART:
23,568,323 UART: [state] CFI Enabled
23,635,102 UART: [fht] FMC Alias Private Key: 7
25,973,011 UART: [art] Extend RT PCRs Done
25,974,245 UART: [art] Lock RT PCRs Done
25,976,059 UART: [art] Populate DV Done
25,981,694 UART: [fht] FMC Alias Private Key: 7
25,983,231 UART: [art] Derive CDI
25,983,966 UART: [art] Store in in slot 0x4
26,043,527 UART: [art] Derive Key Pair
26,044,573 UART: [art] Store priv key in slot 0x5
29,337,012 UART: [art] Derive Key Pair - Done
29,350,114 UART: [art] Signing Cert with AUTHO
29,351,416 UART: RITY.KEYID = 7
31,638,053 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,704 UART: [art] PUB.X = D0D62B041C3AC07102220C6C17CC9F57DFC3CB078124B19C897812582EF4E5160C2DD713AA06E31D9132F94E5029D157
31,646,769 UART: [art] PUB.Y = 56EB92B36A02FA2318D19CB2FA7533DE3FD283764A136EE9C0E8EF2CB80879E4E6AFB14C2C223E84019DB00F215F5C12
31,654,001 UART: [art] SIG.R = 08801AA780FE906538B48565C9F0AD8210F5310B9141939F52B21DBAA4C987941D96F4AA5066A93CF33AD960A35455EA
31,661,371 UART: [art] SIG.S = D3BF6FFAAB9F31B44BD01F2D69BAF61E4005969D514A3531B415CCE09B144699E804131EBA7A3E38C96864A536549458
32,966,572 UART: Caliptra RT
32,967,274 UART: [state] CFI Enabled
33,148,567 UART: [rt] RT listening for mailbox commands...
33,180,019 UART: [rt]cmd =0x50435252, len=8
33,182,112 >>> mbox cmd response data (8 bytes)
33,183,122 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,213,267 UART: [rt]cmd =0x50435251, len=36
34,376,010 >>> mbox cmd response data (1848 bytes)
34,386,241 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,416,050 UART: [rt]cmd =0x43455246, len=4
34,428,940 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,353 UART:
192,721 UART: Running Caliptra ROM ...
193,809 UART:
603,407 UART: [state] CFI Enabled
618,006 UART: [state] LifecycleState = Unprovisioned
619,961 UART: [state] DebugLocked = No
621,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,135 UART: [kat] SHA2-256
795,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,395 UART: [kat] ++
807,003 UART: [kat] sha1
817,887 UART: [kat] SHA2-256
820,565 UART: [kat] SHA2-384
826,684 UART: [kat] SHA2-512-ACC
829,058 UART: [kat] ECC-384
3,112,162 UART: [kat] HMAC-384Kdf
3,125,499 UART: [kat] LMS
4,315,597 UART: [kat] --
4,319,404 UART: [cold-reset] ++
4,321,910 UART: [fht] Storing FHT @ 0x50003400
4,332,177 UART: [idev] ++
4,332,738 UART: [idev] CDI.KEYID = 6
4,333,761 UART: [idev] SUBJECT.KEYID = 7
4,334,936 UART: [idev] UDS.KEYID = 0
4,336,023 ready_for_fw is high
4,336,268 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,708 UART: [idev] Erasing UDS.KEYID = 0
7,623,486 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,501 UART: [idev] --
7,650,783 UART: [ldev] ++
7,651,356 UART: [ldev] CDI.KEYID = 6
7,652,323 UART: [ldev] SUBJECT.KEYID = 5
7,653,529 UART: [ldev] AUTHORITY.KEYID = 7
7,654,814 UART: [ldev] FE.KEYID = 1
7,665,942 UART: [ldev] Erasing FE.KEYID = 1
10,952,299 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,116 UART: [ldev] --
13,311,085 UART: [fwproc] Waiting for Commands...
13,312,802 UART: [fwproc] Received command 0x46574c44
13,314,976 UART: [fwproc] Received Image of size 114124 bytes
17,368,731 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,154 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,833,993 >>> mbox cmd response: success
17,834,561 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,837,524 UART: [afmc] ++
17,838,109 UART: [afmc] CDI.KEYID = 6
17,839,041 UART: [afmc] SUBJECT.KEYID = 7
17,840,305 UART: [afmc] AUTHORITY.KEYID = 5
21,160,494 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,606 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,866 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,255 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,095 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,487 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,349 UART: [afmc] --
23,526,076 UART: [cold-reset] --
23,530,124 UART: [state] Locking Datavault
23,534,833 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,582 UART: [state] Locking ICCM
23,538,238 UART: [exit] Launching FMC @ 0x40000130
23,546,626 UART:
23,546,871 UART: Running Caliptra FMC ...
23,547,968 UART:
23,548,124 UART: [state] CFI Enabled
23,556,165 UART: [fht] FMC Alias Private Key: 7
25,886,603 UART: [art] Extend RT PCRs Done
25,887,842 UART: [art] Lock RT PCRs Done
25,889,620 UART: [art] Populate DV Done
25,894,916 UART: [fht] FMC Alias Private Key: 7
25,896,559 UART: [art] Derive CDI
25,897,366 UART: [art] Store in in slot 0x4
25,940,286 UART: [art] Derive Key Pair
25,941,334 UART: [art] Store priv key in slot 0x5
29,183,589 UART: [art] Derive Key Pair - Done
29,196,558 UART: [art] Signing Cert with AUTHO
29,197,863 UART: RITY.KEYID = 7
31,477,032 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,550 UART: [art] PUB.X = 1607990C4A52B137DD742B95D93030AD237BBD9872C4861E38A9ECBFE2B986330074BAB02AB2A6BA3EC7B7DE2E8583CF
31,485,785 UART: [art] PUB.Y = A59521275B6C2852D6372CAA788A74208404F320F34032662F2B928D7FEC32887F4EEDE55F29627E0ACD03CF815DFCC4
31,493,006 UART: [art] SIG.R = E704A5A2D5940382BF2F48B706C09BFCF110F62313AF00B84BC4E8A87EF702D0699878B89B73187453FF261241611E76
31,500,403 UART: [art] SIG.S = 5E7CBD43072E18AE6556063B30EB1F5A0A2903423CE1BC02003D0205B691E45D691FDAA0E51370316868530BB357C143
32,805,475 UART: Caliptra RT
32,806,197 UART: [state] CFI Enabled
32,924,449 UART: [rt] RT listening for mailbox commands...
32,955,715 UART: [rt]cmd =0x50435252, len=8
32,957,994 >>> mbox cmd response data (8 bytes)
32,959,005 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
32,989,196 UART: [rt]cmd =0x50435251, len=36
34,144,942 >>> mbox cmd response data (1848 bytes)
34,155,233 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,184,969 UART: [rt]cmd =0x43455246, len=4
34,198,049 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
4,122,780 ready_for_fw is high
4,123,393 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,079 >>> mbox cmd response: success
18,070,758 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,712,484 UART:
23,712,886 UART: Running Caliptra FMC ...
23,714,020 UART:
23,714,174 UART: [state] CFI Enabled
23,722,402 UART: [fht] FMC Alias Private Key: 7
26,053,005 UART: [art] Extend RT PCRs Done
26,054,240 UART: [art] Lock RT PCRs Done
26,055,716 UART: [art] Populate DV Done
26,060,974 UART: [fht] FMC Alias Private Key: 7
26,062,619 UART: [art] Derive CDI
26,063,435 UART: [art] Store in in slot 0x4
26,106,088 UART: [art] Derive Key Pair
26,107,133 UART: [art] Store priv key in slot 0x5
29,349,283 UART: [art] Derive Key Pair - Done
29,362,231 UART: [art] Signing Cert with AUTHO
29,363,539 UART: RITY.KEYID = 7
31,642,759 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,268 UART: [art] PUB.X = 20D8B65C5EF5324AC20299147A19856114A78131048CFDDE7B58B49FE51AB2A92C3A011E33B9FDC025A7D0FCD10CF4FB
31,651,519 UART: [art] PUB.Y = 165C76308B3CFF74607FD26497BB14A224D5F06743A5BC02FC2FAB71AC27123E2CB72B9C20A9F07AA72A207BBFB06AC8
31,658,759 UART: [art] SIG.R = 86B7A6D476E8DBA02445385DEFE5F6D5E5DDCC9E2C3B1043CC6A60682E6138FAF4F505C1250733234201EE0B9A128719
31,666,145 UART: [art] SIG.S = 12164D26D64ADC62A291A8D5BF3D28676C11FBABFF7D9D4FBB74D7D833A2B1A9513B90A5F2EB1A03A7C6A7E2A22AB299
32,971,334 UART: Caliptra RT
32,972,044 UART: [state] CFI Enabled
33,089,767 UART: [rt] RT listening for mailbox commands...
33,121,016 UART: [rt]cmd =0x50435252, len=8
33,122,760 >>> mbox cmd response data (8 bytes)
33,123,641 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,153,577 UART: [rt]cmd =0x50435251, len=36
34,308,880 >>> mbox cmd response data (1848 bytes)
34,319,085 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,348,982 UART: [rt]cmd =0x43455246, len=4
34,361,896 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,075 UART:
192,461 UART: Running Caliptra ROM ...
193,568 UART:
193,711 UART: [state] CFI Enabled
262,218 UART: [state] LifecycleState = Unprovisioned
264,080 UART: [state] DebugLocked = No
266,387 UART: [state] WD Timer not started. Device not locked for debugging
270,409 UART: [kat] SHA2-256
449,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,122 UART: [kat] ++
461,663 UART: [kat] sha1
472,900 UART: [kat] SHA2-256
475,909 UART: [kat] SHA2-384
483,455 UART: [kat] SHA2-512-ACC
486,407 UART: [kat] ECC-384
2,945,674 UART: [kat] HMAC-384Kdf
2,970,916 UART: [kat] LMS
3,500,348 UART: [kat] --
3,505,408 UART: [cold-reset] ++
3,506,990 UART: [fht] FHT @ 0x50003400
3,518,617 UART: [idev] ++
3,519,183 UART: [idev] CDI.KEYID = 6
3,520,104 UART: [idev] SUBJECT.KEYID = 7
3,521,275 UART: [idev] UDS.KEYID = 0
3,522,319 ready_for_fw is high
3,522,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,562 UART: [idev] Erasing UDS.KEYID = 0
6,022,487 UART: [idev] Sha1 KeyId Algorithm
6,046,162 UART: [idev] --
6,050,515 UART: [ldev] ++
6,051,112 UART: [ldev] CDI.KEYID = 6
6,052,080 UART: [ldev] SUBJECT.KEYID = 5
6,053,192 UART: [ldev] AUTHORITY.KEYID = 7
6,054,481 UART: [ldev] FE.KEYID = 1
6,098,132 UART: [ldev] Erasing FE.KEYID = 1
8,598,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,635 UART: [ldev] --
10,388,604 UART: [fwproc] Wait for Commands...
10,390,371 UART: [fwproc] Recv command 0x46574c44
10,392,409 UART: [fwproc] Recv'd Img size: 114448 bytes
13,795,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,938,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,257,318 >>> mbox cmd response: success
14,257,875 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,261,725 UART: [afmc] ++
14,262,345 UART: [afmc] CDI.KEYID = 6
14,263,446 UART: [afmc] SUBJECT.KEYID = 7
14,264,573 UART: [afmc] AUTHORITY.KEYID = 5
16,803,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,290 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,033 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,575,919 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,598,563 UART: [afmc] --
18,602,000 UART: [cold-reset] --
18,604,997 UART: [state] Locking Datavault
18,611,243 UART: [state] Locking PCR0, PCR1 and PCR31
18,612,893 UART: [state] Locking ICCM
18,614,501 UART: [exit] Launching FMC @ 0x40000130
18,622,953 UART:
18,623,185 UART: Running Caliptra FMC ...
18,624,282 UART:
18,624,442 UART: [state] CFI Enabled
18,682,885 UART: [fht] FMC Alias Private Key: 7
20,447,212 UART: [art] Extend RT PCRs Done
20,448,434 UART: [art] Lock RT PCRs Done
20,449,812 UART: [art] Populate DV Done
20,455,330 UART: [fht] FMC Alias Private Key: 7
20,457,026 UART: [art] Derive CDI
20,457,839 UART: [art] Store in in slot 0x4
20,515,183 UART: [art] Derive Key Pair
20,516,220 UART: [art] Store priv key in slot 0x5
22,978,734 UART: [art] Derive Key Pair - Done
22,991,881 UART: [art] Signing Cert with AUTHO
22,993,212 UART: RITY.KEYID = 7
24,704,038 UART: [art] Erasing AUTHORITY.KEYID = 7
24,705,543 UART: [art] PUB.X = 11013B7998A72ECC184515B97763056DF79C635BDC5E79B5F5C9AD95F865DC904EE34FB3015CEEC309E96EB22E9E067D
24,712,804 UART: [art] PUB.Y = 10A88F6E2E20C3495EA183435AB467F26C9324565083BA383DBBB8AC6C9470512D74F9E5A53CA627E9DACD7F76BD1C92
24,720,093 UART: [art] SIG.R = D7CF4DDDFFF241A325E5D83B9CBBD9CB9E8196394039D7164A22DBBE352F2E5618A70BE1329A1922BECCA0BF2603D02A
24,727,485 UART: [art] SIG.S = BFEEB46573917D9E4613C467CFFB0DB184B0D12FA5DE069F0E3A5D1D06815D4C491859A9CF8FA8E8A8A22744BB01CFD0
25,706,334 UART: Caliptra RT
25,707,043 UART: [state] CFI Enabled
25,871,911 UART: [rt] RT listening for mailbox commands...
25,903,105 UART: [rt]cmd =0x50435252, len=8
25,905,165 >>> mbox cmd response data (8 bytes)
25,905,990 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,936,131 UART: [rt]cmd =0x50435251, len=36
26,852,260 >>> mbox cmd response data (1848 bytes)
26,862,521 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,892,432 UART: [rt]cmd =0x43455246, len=4
26,905,165 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,358,302 ready_for_fw is high
3,358,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,022,487 >>> mbox cmd response: success
14,023,296 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,321,465 UART:
18,321,870 UART: Running Caliptra FMC ...
18,322,980 UART:
18,323,141 UART: [state] CFI Enabled
18,388,447 UART: [fht] FMC Alias Private Key: 7
20,152,063 UART: [art] Extend RT PCRs Done
20,153,297 UART: [art] Lock RT PCRs Done
20,154,871 UART: [art] Populate DV Done
20,160,124 UART: [fht] FMC Alias Private Key: 7
20,161,597 UART: [art] Derive CDI
20,162,337 UART: [art] Store in in slot 0x4
20,221,104 UART: [art] Derive Key Pair
20,222,111 UART: [art] Store priv key in slot 0x5
22,684,651 UART: [art] Derive Key Pair - Done
22,697,917 UART: [art] Signing Cert with AUTHO
22,699,218 UART: RITY.KEYID = 7
24,410,431 UART: [art] Erasing AUTHORITY.KEYID = 7
24,411,932 UART: [art] PUB.X = CB5D763681AE8CF2F123B6F30A541B01266766D47B1D757351E73ADA8B1C91A521713C355A7AB018ACFAC23392FC12B6
24,419,175 UART: [art] PUB.Y = 2472EAAE860A6FF3DB2C4DDC5DB3E300F18B475149BEF9033CF0600581E071FFB5752CAC26C0F7B92C728CFEF742EC38
24,426,482 UART: [art] SIG.R = 96CEC918B6FF19BA57CE2E6CC0E3CC18FD98CAB9497FD492D47C19EC8F73527BBAECE4F952CBD7D36BCC4F8EA1C87F11
24,433,934 UART: [art] SIG.S = 9B8D30FADEB5A3090743B2A443E258D25A5FAE88CB1AB364AD8CCBC965050A24296A115F36608F09EAC07A037DF8D401
25,412,965 UART: Caliptra RT
25,413,663 UART: [state] CFI Enabled
25,576,718 UART: [rt] RT listening for mailbox commands...
25,608,266 UART: [rt]cmd =0x50435252, len=8
25,610,536 >>> mbox cmd response data (8 bytes)
25,611,278 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,641,391 UART: [rt]cmd =0x50435251, len=36
26,558,596 >>> mbox cmd response data (1848 bytes)
26,568,769 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,598,576 UART: [rt]cmd =0x43455246, len=4
26,611,352 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
192,345 UART:
192,712 UART: Running Caliptra ROM ...
193,897 UART:
603,593 UART: [state] CFI Enabled
615,765 UART: [state] LifecycleState = Unprovisioned
617,644 UART: [state] DebugLocked = No
619,096 UART: [state] WD Timer not started. Device not locked for debugging
623,483 UART: [kat] SHA2-256
802,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,211 UART: [kat] ++
814,744 UART: [kat] sha1
826,259 UART: [kat] SHA2-256
829,333 UART: [kat] SHA2-384
836,166 UART: [kat] SHA2-512-ACC
839,091 UART: [kat] ECC-384
3,278,610 UART: [kat] HMAC-384Kdf
3,290,777 UART: [kat] LMS
3,820,275 UART: [kat] --
3,824,351 UART: [cold-reset] ++
3,825,653 UART: [fht] FHT @ 0x50003400
3,836,837 UART: [idev] ++
3,837,391 UART: [idev] CDI.KEYID = 6
3,838,465 UART: [idev] SUBJECT.KEYID = 7
3,839,578 UART: [idev] UDS.KEYID = 0
3,840,475 ready_for_fw is high
3,840,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,218 UART: [idev] Erasing UDS.KEYID = 0
6,314,352 UART: [idev] Sha1 KeyId Algorithm
6,336,866 UART: [idev] --
6,341,320 UART: [ldev] ++
6,341,897 UART: [ldev] CDI.KEYID = 6
6,342,792 UART: [ldev] SUBJECT.KEYID = 5
6,343,995 UART: [ldev] AUTHORITY.KEYID = 7
6,345,217 UART: [ldev] FE.KEYID = 1
6,357,800 UART: [ldev] Erasing FE.KEYID = 1
8,833,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,878 UART: [ldev] --
10,625,326 UART: [fwproc] Wait for Commands...
10,627,461 UART: [fwproc] Recv command 0x46574c44
10,629,545 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,118,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,187,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,506,083 >>> mbox cmd response: success
14,506,624 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,510,709 UART: [afmc] ++
14,511,284 UART: [afmc] CDI.KEYID = 6
14,512,188 UART: [afmc] SUBJECT.KEYID = 7
14,513,281 UART: [afmc] AUTHORITY.KEYID = 5
17,012,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,732,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,734,324 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,750,080 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,766,157 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,782,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,805,736 UART: [afmc] --
18,809,957 UART: [cold-reset] --
18,814,468 UART: [state] Locking Datavault
18,821,108 UART: [state] Locking PCR0, PCR1 and PCR31
18,822,772 UART: [state] Locking ICCM
18,823,892 UART: [exit] Launching FMC @ 0x40000130
18,832,340 UART:
18,832,568 UART: Running Caliptra FMC ...
18,833,664 UART:
18,833,814 UART: [state] CFI Enabled
18,842,147 UART: [fht] FMC Alias Private Key: 7
20,599,341 UART: [art] Extend RT PCRs Done
20,600,562 UART: [art] Lock RT PCRs Done
20,602,180 UART: [art] Populate DV Done
20,607,419 UART: [fht] FMC Alias Private Key: 7
20,608,898 UART: [art] Derive CDI
20,609,649 UART: [art] Store in in slot 0x4
20,652,454 UART: [art] Derive Key Pair
20,653,490 UART: [art] Store priv key in slot 0x5
23,080,121 UART: [art] Derive Key Pair - Done
23,092,868 UART: [art] Signing Cert with AUTHO
23,094,169 UART: RITY.KEYID = 7
24,799,765 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,263 UART: [art] PUB.X = 12AB5816C5BBCA26D1B1ACBD37EF5CE3AAD55B4C1022D5D93651C8B6395C85E5EEC89EBC32B81D89C09EF7BED4AC6FAD
24,808,548 UART: [art] PUB.Y = 99DA72EA110E1A1EEEAD001E1CE1C18F2CEA92370C73926F80E5D23E06588CFD4B23ADFB7F3D6653473017AC70FA8DF9
24,815,883 UART: [art] SIG.R = D25396CB09164E7A84E4BD3EFE0F73BCDED951A6B9438791B8DA6546576D82CB27708B0AAD9513210CD017C52A8A7256
24,823,259 UART: [art] SIG.S = 433BEFF88A2BCC20CC808963F85868CCEBCB6F8AB6B75E19240EFC642D5BFBB0E10DC6BE2928FD10057189B824A1787D
25,802,074 UART: Caliptra RT
25,802,774 UART: [state] CFI Enabled
25,920,005 UART: [rt] RT listening for mailbox commands...
25,951,586 UART: [rt]cmd =0x50435252, len=8
25,953,647 >>> mbox cmd response data (8 bytes)
25,954,551 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,984,616 UART: [rt]cmd =0x50435251, len=36
26,892,281 >>> mbox cmd response data (1848 bytes)
26,902,554 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,932,440 UART: [rt]cmd =0x43455246, len=4
26,945,107 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,697,953 ready_for_fw is high
3,698,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,283,095 >>> mbox cmd response: success
14,283,925 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,532,771 UART:
18,533,163 UART: Running Caliptra FMC ...
18,534,316 UART:
18,534,467 UART: [state] CFI Enabled
18,542,461 UART: [fht] FMC Alias Private Key: 7
20,299,367 UART: [art] Extend RT PCRs Done
20,300,582 UART: [art] Lock RT PCRs Done
20,302,525 UART: [art] Populate DV Done
20,307,815 UART: [fht] FMC Alias Private Key: 7
20,309,510 UART: [art] Derive CDI
20,310,319 UART: [art] Store in in slot 0x4
20,352,912 UART: [art] Derive Key Pair
20,353,940 UART: [art] Store priv key in slot 0x5
22,780,540 UART: [art] Derive Key Pair - Done
22,793,523 UART: [art] Signing Cert with AUTHO
22,794,992 UART: RITY.KEYID = 7
24,500,200 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,692 UART: [art] PUB.X = DD336A263D7A3457F3DD21AC56F2D552BAC1D498FB8520A2CD0EC73A1B677032DF27921FA5F4455241C822DF6AA1C3B8
24,509,007 UART: [art] PUB.Y = F5480B791E27293BBBDEC199239384F6D7FEE9A575A9EF0A3BA2E7392ACD3ED7A318EED6729EA83CF9E6B3FC0944F1C5
24,516,267 UART: [art] SIG.R = E4DB3AD29DB2122FAEB1A59AF0E6074622107AC11F00701CC7F603E4806EC9F0CADFB4CFFC1D51CC239FBABF2A5341AA
24,523,654 UART: [art] SIG.S = F4A07D3FC2395B4F1E859D1D30408A5F23F6546AFC1E3AAF5A83BE2CB7E97FD859508896045325603B59115763C4D246
25,502,194 UART: Caliptra RT
25,502,888 UART: [state] CFI Enabled
25,619,647 UART: [rt] RT listening for mailbox commands...
25,651,067 UART: [rt]cmd =0x50435252, len=8
25,653,243 >>> mbox cmd response data (8 bytes)
25,654,230 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,684,267 UART: [rt]cmd =0x50435251, len=36
26,591,719 >>> mbox cmd response data (1848 bytes)
26,601,936 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,631,896 UART: [rt]cmd =0x43455246, len=4
26,644,570 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,439,035 ready_for_fw is high
3,439,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,732,919 >>> mbox cmd response: success
14,733,531 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,046,047 UART:
19,046,432 UART: Running Caliptra FMC ...
19,047,583 UART:
19,047,744 UART: [state] CFI Enabled
19,114,077 UART: [fht] FMC Alias Private Key: 7
20,877,947 UART: [art] Extend RT PCRs Done
20,879,175 UART: [art] Lock RT PCRs Done
20,880,717 UART: [art] Populate DV Done
20,886,127 UART: [fht] FMC Alias Private Key: 7
20,887,723 UART: [art] Derive CDI
20,888,465 UART: [art] Store in in slot 0x4
20,946,619 UART: [art] Derive Key Pair
20,947,660 UART: [art] Store priv key in slot 0x5
23,410,823 UART: [art] Derive Key Pair - Done
23,423,710 UART: [art] Signing Cert with AUTHO
23,425,013 UART: RITY.KEYID = 7
25,136,395 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,908 UART: [art] PUB.X = 48AE08603826FDAD2C7BCD384298517A09DCACFEC85E1205733FA578B3146C5239CF8840B6D70D16A2938CF7EB5B7929
25,145,155 UART: [art] PUB.Y = 4FD064FB6ACBCFB348CDA3A72F9D3B592B115FDE68D978DA1A5093F0FCEEA10EE8A43CED7CB16BC8B8384F45BC4FA022
25,152,489 UART: [art] SIG.R = 4EE7C1254337EBF8D99A4FC89D7D07AAEC71C64648B08B7174596D0CB0027478841AA89918536C0B23A796527F9929DD
25,159,903 UART: [art] SIG.S = 4A35DC7DDFEFFAD65B38EE5C937E1199619A2CDAAE937FB471FB0C2CE448EEF6A9437397F90DFD91B0AC5193212B5D75
26,139,150 UART: Caliptra RT
26,139,843 UART: [state] CFI Enabled
26,305,257 UART: [rt] RT listening for mailbox commands...
26,336,630 UART: [rt]cmd =0x50435252, len=8
26,338,967 >>> mbox cmd response data (8 bytes)
26,339,773 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,369,899 UART: [rt]cmd =0x50435251, len=36
27,285,759 >>> mbox cmd response data (1848 bytes)
27,295,949 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,325,719 UART: [rt]cmd =0x43455246, len=4
27,338,415 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,754,951 ready_for_fw is high
3,755,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,773 >>> mbox cmd response: success
14,963,472 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,212,353 UART:
19,212,727 UART: Running Caliptra FMC ...
19,213,848 UART:
19,213,998 UART: [state] CFI Enabled
19,222,056 UART: [fht] FMC Alias Private Key: 7
20,978,572 UART: [art] Extend RT PCRs Done
20,979,795 UART: [art] Lock RT PCRs Done
20,981,578 UART: [art] Populate DV Done
20,986,982 UART: [fht] FMC Alias Private Key: 7
20,988,483 UART: [art] Derive CDI
20,989,215 UART: [art] Store in in slot 0x4
21,032,128 UART: [art] Derive Key Pair
21,033,161 UART: [art] Store priv key in slot 0x5
23,459,684 UART: [art] Derive Key Pair - Done
23,472,730 UART: [art] Signing Cert with AUTHO
23,474,036 UART: RITY.KEYID = 7
25,179,318 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,819 UART: [art] PUB.X = 89E61ACFBD8BB2B002907F3F85239A5B26DE4E1A8BEA04EF50D51561E2482D4ED14F63BD48DBC2BC78D703425D6D9410
25,188,123 UART: [art] PUB.Y = FEDF492097FB6B336DC1A4D9719193531F564D8C0BA99C8F6CB0DB0F4D1E50435C4F86FE995BCCA12E655708B348F3F6
25,195,369 UART: [art] SIG.R = 8F0A6259BE7CCA36B4D171B03BF4D7776BB3FAD4B3BCE4DAC1815956C487F8CAF65A33CBD2EFE231A926FC45DF382E5B
25,202,810 UART: [art] SIG.S = 8EC1E15655971DDB31202EBDB1D921DA56E3B0241DEE20609952EE756FAC5324DB40C4BDF147DCBEDF75ECEAC0732D05
26,182,137 UART: Caliptra RT
26,182,851 UART: [state] CFI Enabled
26,300,658 UART: [rt] RT listening for mailbox commands...
26,332,176 UART: [rt]cmd =0x50435252, len=8
26,334,363 >>> mbox cmd response data (8 bytes)
26,335,323 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,365,611 UART: [rt]cmd =0x50435251, len=36
27,273,192 >>> mbox cmd response data (1848 bytes)
27,283,384 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,313,139 UART: [rt]cmd =0x43455246, len=4
27,325,689 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,299 UART: [kat] SHA2-256
882,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,345 UART: [kat] ++
886,497 UART: [kat] sha1
890,719 UART: [kat] SHA2-256
892,657 UART: [kat] SHA2-384
895,402 UART: [kat] SHA2-512-ACC
897,303 UART: [kat] ECC-384
902,662 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,207 UART: [cold-reset] ++
1,476,625 UART: [fht] Storing FHT @ 0x50003400
1,479,446 UART: [idev] ++
1,479,614 UART: [idev] CDI.KEYID = 6
1,479,974 UART: [idev] SUBJECT.KEYID = 7
1,480,398 UART: [idev] UDS.KEYID = 0
1,480,743 ready_for_fw is high
1,480,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,610 UART: [idev] Erasing UDS.KEYID = 0
1,504,766 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,362 UART: [idev] --
1,514,461 UART: [ldev] ++
1,514,629 UART: [ldev] CDI.KEYID = 6
1,514,992 UART: [ldev] SUBJECT.KEYID = 5
1,515,418 UART: [ldev] AUTHORITY.KEYID = 7
1,515,881 UART: [ldev] FE.KEYID = 1
1,521,089 UART: [ldev] Erasing FE.KEYID = 1
1,546,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,380 UART: [ldev] --
1,585,667 UART: [fwproc] Waiting for Commands...
1,586,286 UART: [fwproc] Received command 0x46574c44
1,587,077 UART: [fwproc] Received Image of size 114448 bytes
2,887,084 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,848 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,200 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,349 >>> mbox cmd response: success
3,080,349 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,081,597 UART: [afmc] ++
3,081,765 UART: [afmc] CDI.KEYID = 6
3,082,127 UART: [afmc] SUBJECT.KEYID = 7
3,082,552 UART: [afmc] AUTHORITY.KEYID = 5
3,117,601 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,657 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,270 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,960 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,809 UART: [afmc] --
3,160,913 UART: [cold-reset] --
3,161,551 UART: [state] Locking Datavault
3,162,752 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,356 UART: [state] Locking ICCM
3,163,932 UART: [exit] Launching FMC @ 0x40000130
3,169,261 UART:
3,169,277 UART: Running Caliptra FMC ...
3,169,685 UART:
3,169,739 UART: [state] CFI Enabled
3,180,268 UART: [fht] FMC Alias Private Key: 7
3,287,669 UART: [art] Extend RT PCRs Done
3,288,097 UART: [art] Lock RT PCRs Done
3,289,497 UART: [art] Populate DV Done
3,297,890 UART: [fht] FMC Alias Private Key: 7
3,298,936 UART: [art] Derive CDI
3,299,216 UART: [art] Store in in slot 0x4
3,384,795 UART: [art] Derive Key Pair
3,385,155 UART: [art] Store priv key in slot 0x5
3,398,135 UART: [art] Derive Key Pair - Done
3,413,366 UART: [art] Signing Cert with AUTHO
3,413,846 UART: RITY.KEYID = 7
3,429,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,137 UART: [art] PUB.X = B29DD7F5CD1870FDEE6680CC713700789CF4A57FDC57C5C9BFC9E32A298B7DD47812A6A03249834C52D5176DDBC2617A
3,436,897 UART: [art] PUB.Y = 3E34EEB49DD912A5912F3F441B1C8437DD1A94325A35974F524C8D2740C27B2984731D954E7D9B22808086289FCA8F96
3,443,841 UART: [art] SIG.R = A4F67BB0A2D244AF46AD07E428DA93E55675D9627BAA425B1194443C7F31C6EB606988B6B513B5E87057EE22EFEB6CAF
3,450,620 UART: [art] SIG.S = DBBF223F06AD8758120A076157D425B7B5B2E733B8DECD0A5DC603C2F03C30447D1497E818F69EED5DBF89DA620259A4
3,475,273 UART: Caliptra RT
3,475,526 UART: [state] CFI Enabled
3,583,980 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,482 UART: [rt]cmd =0x50435252, len=8
3,616,215 >>> mbox cmd response data (8 bytes)
3,616,216 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,881 UART: [rt]cmd =0x50435251, len=36
3,812,929 >>> mbox cmd response data (1848 bytes)
3,812,930 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,239 UART: [rt]cmd =0x43455246, len=4
3,854,483 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,137 ready_for_fw is high
1,362,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,033 >>> mbox cmd response: success
2,929,033 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,990,813 UART:
2,990,829 UART: Running Caliptra FMC ...
2,991,237 UART:
2,991,291 UART: [state] CFI Enabled
3,001,800 UART: [fht] FMC Alias Private Key: 7
3,109,593 UART: [art] Extend RT PCRs Done
3,110,021 UART: [art] Lock RT PCRs Done
3,111,599 UART: [art] Populate DV Done
3,119,982 UART: [fht] FMC Alias Private Key: 7
3,120,924 UART: [art] Derive CDI
3,121,204 UART: [art] Store in in slot 0x4
3,207,065 UART: [art] Derive Key Pair
3,207,425 UART: [art] Store priv key in slot 0x5
3,220,651 UART: [art] Derive Key Pair - Done
3,235,454 UART: [art] Signing Cert with AUTHO
3,235,934 UART: RITY.KEYID = 7
3,251,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,841 UART: [art] PUB.X = A195969DFB196C66827B33E502D033AC0C805E5DE6B591EBE370F29F74431AD3C3776FDA7C7FFC603FFDDA160875D8EC
3,258,616 UART: [art] PUB.Y = B30205D6A90AC24C87A2F29086484B5B308F3071281AD1D130961A72F7745AE6A7AB3376A7A435ACB75C7290C43C7292
3,265,553 UART: [art] SIG.R = A558D7CF131206201A7F27E9A67C1F63609EE01A5FF756D71463E084AB0391009E19C58CFC38858C204347143AD27B45
3,272,289 UART: [art] SIG.S = EDB447EB560E5993AC855EB27D4887D31572F11055879B0D837DBE8C9DE270A2610BFD60136F7976F47730559EAEA1D1
3,296,219 UART: Caliptra RT
3,296,472 UART: [state] CFI Enabled
3,404,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,832 UART: [rt]cmd =0x50435252, len=8
3,436,389 >>> mbox cmd response data (8 bytes)
3,436,390 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,799 UART: [rt]cmd =0x50435251, len=36
3,632,909 >>> mbox cmd response data (1848 bytes)
3,632,910 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,941 UART: [rt]cmd =0x43455246, len=4
3,674,383 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,666 UART: [kat] SHA2-256
882,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,712 UART: [kat] ++
886,864 UART: [kat] sha1
891,208 UART: [kat] SHA2-256
893,146 UART: [kat] SHA2-384
895,959 UART: [kat] SHA2-512-ACC
897,860 UART: [kat] ECC-384
903,491 UART: [kat] HMAC-384Kdf
908,243 UART: [kat] LMS
1,476,439 UART: [kat] --
1,477,220 UART: [cold-reset] ++
1,477,752 UART: [fht] Storing FHT @ 0x50003400
1,480,473 UART: [idev] ++
1,480,641 UART: [idev] CDI.KEYID = 6
1,481,001 UART: [idev] SUBJECT.KEYID = 7
1,481,425 UART: [idev] UDS.KEYID = 0
1,481,770 ready_for_fw is high
1,481,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,403 UART: [idev] Erasing UDS.KEYID = 0
1,505,997 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,809 UART: [idev] --
1,515,876 UART: [ldev] ++
1,516,044 UART: [ldev] CDI.KEYID = 6
1,516,407 UART: [ldev] SUBJECT.KEYID = 5
1,516,833 UART: [ldev] AUTHORITY.KEYID = 7
1,517,296 UART: [ldev] FE.KEYID = 1
1,522,672 UART: [ldev] Erasing FE.KEYID = 1
1,548,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,191 UART: [ldev] --
1,587,530 UART: [fwproc] Waiting for Commands...
1,588,205 UART: [fwproc] Received command 0x46574c44
1,588,996 UART: [fwproc] Received Image of size 114448 bytes
2,888,705 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,775 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,127 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,266 >>> mbox cmd response: success
3,082,266 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,083,422 UART: [afmc] ++
3,083,590 UART: [afmc] CDI.KEYID = 6
3,083,952 UART: [afmc] SUBJECT.KEYID = 7
3,084,377 UART: [afmc] AUTHORITY.KEYID = 5
3,119,506 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,136,128 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,908 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,521 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,154,211 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,162,198 UART: [afmc] --
3,163,200 UART: [cold-reset] --
3,163,904 UART: [state] Locking Datavault
3,165,203 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,807 UART: [state] Locking ICCM
3,166,337 UART: [exit] Launching FMC @ 0x40000130
3,171,666 UART:
3,171,682 UART: Running Caliptra FMC ...
3,172,090 UART:
3,172,233 UART: [state] CFI Enabled
3,182,708 UART: [fht] FMC Alias Private Key: 7
3,291,057 UART: [art] Extend RT PCRs Done
3,291,485 UART: [art] Lock RT PCRs Done
3,293,179 UART: [art] Populate DV Done
3,301,352 UART: [fht] FMC Alias Private Key: 7
3,302,504 UART: [art] Derive CDI
3,302,784 UART: [art] Store in in slot 0x4
3,388,759 UART: [art] Derive Key Pair
3,389,119 UART: [art] Store priv key in slot 0x5
3,402,369 UART: [art] Derive Key Pair - Done
3,417,211 UART: [art] Signing Cert with AUTHO
3,417,691 UART: RITY.KEYID = 7
3,433,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,832 UART: [art] PUB.X = B326706C7513872ACB76A29B0395CDC71DC00793899394D9E661899A8A8D73B6BE9A0BD7C95945AC95BB8BD9C90D138A
3,440,594 UART: [art] PUB.Y = DEFDB4A5E6F594D5AB145B24BDADAF37E7BC59EB1672251D6EA0C24B1E4F1FA3A3CC10113262E9815A4F09E9C93A8B07
3,447,560 UART: [art] SIG.R = 72FFF8B4A4628E38649B9BDA413C0CD1128567127197EB511E29EC0D28BAE8D74177DB7F89F516A2C0543B2D1AACFE37
3,454,334 UART: [art] SIG.S = AA9B2AEDB52BD74E9854E15080762E98AD703E455A72F753A83463C4888E364D319E4078BC0153F65137E7A535E69E97
3,478,398 UART: Caliptra RT
3,478,743 UART: [state] CFI Enabled
3,586,952 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,534 UART: [rt]cmd =0x50435252, len=8
3,619,297 >>> mbox cmd response data (8 bytes)
3,619,298 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,917 UART: [rt]cmd =0x50435251, len=36
3,816,105 >>> mbox cmd response data (1848 bytes)
3,816,106 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,477 UART: [rt]cmd =0x43455246, len=4
3,857,715 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,376 ready_for_fw is high
1,363,376 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,344 >>> mbox cmd response: success
2,930,344 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,991,502 UART:
2,991,518 UART: Running Caliptra FMC ...
2,991,926 UART:
2,992,069 UART: [state] CFI Enabled
3,002,878 UART: [fht] FMC Alias Private Key: 7
3,111,119 UART: [art] Extend RT PCRs Done
3,111,547 UART: [art] Lock RT PCRs Done
3,112,717 UART: [art] Populate DV Done
3,120,816 UART: [fht] FMC Alias Private Key: 7
3,121,998 UART: [art] Derive CDI
3,122,278 UART: [art] Store in in slot 0x4
3,207,977 UART: [art] Derive Key Pair
3,208,337 UART: [art] Store priv key in slot 0x5
3,221,401 UART: [art] Derive Key Pair - Done
3,236,422 UART: [art] Signing Cert with AUTHO
3,236,902 UART: RITY.KEYID = 7
3,252,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,807 UART: [art] PUB.X = BFCA19B9AB30B56CB69036FAEAC44F3FE287C650F11A5A6904F97BD62D90C3D93157B1B8FCA4E1B4D197CE5A94C44025
3,259,592 UART: [art] PUB.Y = B190D96EEEE64D43325CCA2FEA1A5607332EF63626F14273951A15FF946B739BE8374D5F1BB6A8DCE81BF764C8DE912A
3,266,551 UART: [art] SIG.R = F52C68FB3EFE33736B67CA66E0C37D2BC7122918E255891389EAF92E06096EBB6208B43B2CB021D19724BC584B4D8520
3,273,314 UART: [art] SIG.S = E1C137D10F65FB6A1BA7E3828850A01BF0CEF1397CCD6A64A2B44E6BDEAE8BE653DC839A4DD3F6496713ADFC17AC0DAA
3,297,075 UART: Caliptra RT
3,297,420 UART: [state] CFI Enabled
3,405,930 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,200 UART: [rt]cmd =0x50435252, len=8
3,437,725 >>> mbox cmd response data (8 bytes)
3,437,726 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,305 UART: [rt]cmd =0x50435251, len=36
3,634,705 >>> mbox cmd response data (1848 bytes)
3,634,706 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,267 UART: [rt]cmd =0x43455246, len=4
3,676,459 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
893,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,471 UART: [kat] ++
897,623 UART: [kat] sha1
901,823 UART: [kat] SHA2-256
903,763 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
917,978 UART: [kat] HMAC-384Kdf
922,566 UART: [kat] LMS
1,170,894 UART: [kat] --
1,171,659 UART: [cold-reset] ++
1,172,141 UART: [fht] FHT @ 0x50003400
1,174,792 UART: [idev] ++
1,174,960 UART: [idev] CDI.KEYID = 6
1,175,320 UART: [idev] SUBJECT.KEYID = 7
1,175,744 UART: [idev] UDS.KEYID = 0
1,176,089 ready_for_fw is high
1,176,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,456 UART: [idev] Erasing UDS.KEYID = 0
1,200,139 UART: [idev] Sha1 KeyId Algorithm
1,208,527 UART: [idev] --
1,209,671 UART: [ldev] ++
1,209,839 UART: [ldev] CDI.KEYID = 6
1,210,202 UART: [ldev] SUBJECT.KEYID = 5
1,210,628 UART: [ldev] AUTHORITY.KEYID = 7
1,211,091 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,242,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,935 UART: [ldev] --
1,282,330 UART: [fwproc] Wait for Commands...
1,283,114 UART: [fwproc] Recv command 0x46574c44
1,283,842 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,743 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,047 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,932 >>> mbox cmd response: success
2,775,932 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,777,120 UART: [afmc] ++
2,777,288 UART: [afmc] CDI.KEYID = 6
2,777,650 UART: [afmc] SUBJECT.KEYID = 7
2,778,075 UART: [afmc] AUTHORITY.KEYID = 5
2,813,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,593 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,206 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,925 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,685 UART: [afmc] --
2,856,611 UART: [cold-reset] --
2,857,521 UART: [state] Locking Datavault
2,858,628 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,232 UART: [state] Locking ICCM
2,859,904 UART: [exit] Launching FMC @ 0x40000130
2,865,233 UART:
2,865,249 UART: Running Caliptra FMC ...
2,865,657 UART:
2,865,711 UART: [state] CFI Enabled
2,875,944 UART: [fht] FMC Alias Private Key: 7
2,983,375 UART: [art] Extend RT PCRs Done
2,983,803 UART: [art] Lock RT PCRs Done
2,985,319 UART: [art] Populate DV Done
2,993,424 UART: [fht] FMC Alias Private Key: 7
2,994,564 UART: [art] Derive CDI
2,994,844 UART: [art] Store in in slot 0x4
3,080,405 UART: [art] Derive Key Pair
3,080,765 UART: [art] Store priv key in slot 0x5
3,094,605 UART: [art] Derive Key Pair - Done
3,109,304 UART: [art] Signing Cert with AUTHO
3,109,784 UART: RITY.KEYID = 7
3,124,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,279 UART: [art] PUB.X = 684D555BD060124D67BE59AA76E3437BF79C0DE778D5362A19BB020753D0A5C4858EE932D62B7F6ECA0BD41779FBB215
3,132,043 UART: [art] PUB.Y = 168653BF6B694F29B2CD1C8B8C72CC04E520BAEC7FC811B1A5E0A04470C4D2860B09FD67FBD3F17869A5DE91E838464A
3,138,996 UART: [art] SIG.R = DAC2338F031754BD2D1FA77C9984BF19EC5049CFDCD5901C42F7E964A14D8742F2F55FAE4B7E5F39ADF5AAC75DBC0AD2
3,145,784 UART: [art] SIG.S = FB57E1351B786CDFD86674D54248E62E3F48ADCD96910EC9D6960BBFED15C5846D7BDFF997B9E68108E4FC95F0BE916A
3,169,536 UART: Caliptra RT
3,169,789 UART: [state] CFI Enabled
3,278,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,533 UART: [rt]cmd =0x50435252, len=8
3,310,310 >>> mbox cmd response data (8 bytes)
3,310,311 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,726 UART: [rt]cmd =0x50435251, len=36
3,506,990 >>> mbox cmd response data (1848 bytes)
3,506,991 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,214 UART: [rt]cmd =0x43455246, len=4
3,548,298 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,773 ready_for_fw is high
1,060,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,455 >>> mbox cmd response: success
2,628,455 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,690,129 UART:
2,690,145 UART: Running Caliptra FMC ...
2,690,553 UART:
2,690,607 UART: [state] CFI Enabled
2,701,270 UART: [fht] FMC Alias Private Key: 7
2,809,559 UART: [art] Extend RT PCRs Done
2,809,987 UART: [art] Lock RT PCRs Done
2,811,827 UART: [art] Populate DV Done
2,820,090 UART: [fht] FMC Alias Private Key: 7
2,821,026 UART: [art] Derive CDI
2,821,306 UART: [art] Store in in slot 0x4
2,906,949 UART: [art] Derive Key Pair
2,907,309 UART: [art] Store priv key in slot 0x5
2,920,513 UART: [art] Derive Key Pair - Done
2,935,271 UART: [art] Signing Cert with AUTHO
2,935,751 UART: RITY.KEYID = 7
2,951,049 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,814 UART: [art] PUB.X = DC988D2E61B2AC3E52A33AECA6069213454FCFEFC46E9462800A419F590B16C60C9E0F0B22E9AB51DD66BE73C19BBB90
2,958,582 UART: [art] PUB.Y = 086CCAD938A5AEEC5F0C81C484E2B9FEB005FE404EE0AFABBC58E557782780F981D7A4158E1C9F9699369B1D5AE5278A
2,965,539 UART: [art] SIG.R = 98856B0F7835B741E1685A100F954713D6A2E187817CBFB500189CD968BD321233F5A0E0B8ACBECF2A7A136ECF92DB39
2,972,287 UART: [art] SIG.S = DA842CD9D79B8E3B07AB0AEFEEC763790B83A9BB3C3FF440B9FFFE3A8A3AA77D8BE472BD8ABBEC3D137A5D56DC0F26EA
2,995,782 UART: Caliptra RT
2,996,035 UART: [state] CFI Enabled
3,104,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,657 UART: [rt]cmd =0x50435252, len=8
3,136,390 >>> mbox cmd response data (8 bytes)
3,136,391 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,944 UART: [rt]cmd =0x50435251, len=36
3,333,206 >>> mbox cmd response data (1848 bytes)
3,333,207 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,586 UART: [rt]cmd =0x43455246, len=4
3,374,686 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
893,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,926 UART: [kat] ++
898,078 UART: [kat] sha1
902,390 UART: [kat] SHA2-256
904,330 UART: [kat] SHA2-384
906,993 UART: [kat] SHA2-512-ACC
908,894 UART: [kat] ECC-384
918,923 UART: [kat] HMAC-384Kdf
923,553 UART: [kat] LMS
1,171,881 UART: [kat] --
1,172,746 UART: [cold-reset] ++
1,173,074 UART: [fht] FHT @ 0x50003400
1,175,849 UART: [idev] ++
1,176,017 UART: [idev] CDI.KEYID = 6
1,176,377 UART: [idev] SUBJECT.KEYID = 7
1,176,801 UART: [idev] UDS.KEYID = 0
1,177,146 ready_for_fw is high
1,177,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,845 UART: [idev] Erasing UDS.KEYID = 0
1,201,702 UART: [idev] Sha1 KeyId Algorithm
1,210,258 UART: [idev] --
1,211,132 UART: [ldev] ++
1,211,300 UART: [ldev] CDI.KEYID = 6
1,211,663 UART: [ldev] SUBJECT.KEYID = 5
1,212,089 UART: [ldev] AUTHORITY.KEYID = 7
1,212,552 UART: [ldev] FE.KEYID = 1
1,218,088 UART: [ldev] Erasing FE.KEYID = 1
1,244,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,368 UART: [ldev] --
1,283,803 UART: [fwproc] Wait for Commands...
1,284,439 UART: [fwproc] Recv command 0x46574c44
1,285,167 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,018 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,085 >>> mbox cmd response: success
2,777,085 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,778,331 UART: [afmc] ++
2,778,499 UART: [afmc] CDI.KEYID = 6
2,778,861 UART: [afmc] SUBJECT.KEYID = 7
2,779,286 UART: [afmc] AUTHORITY.KEYID = 5
2,814,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,280 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,008 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,893 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,612 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,426 UART: [afmc] --
2,857,452 UART: [cold-reset] --
2,858,344 UART: [state] Locking Datavault
2,859,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,937 UART: [state] Locking ICCM
2,860,605 UART: [exit] Launching FMC @ 0x40000130
2,865,934 UART:
2,865,950 UART: Running Caliptra FMC ...
2,866,358 UART:
2,866,501 UART: [state] CFI Enabled
2,877,034 UART: [fht] FMC Alias Private Key: 7
2,986,105 UART: [art] Extend RT PCRs Done
2,986,533 UART: [art] Lock RT PCRs Done
2,987,993 UART: [art] Populate DV Done
2,996,338 UART: [fht] FMC Alias Private Key: 7
2,997,456 UART: [art] Derive CDI
2,997,736 UART: [art] Store in in slot 0x4
3,083,843 UART: [art] Derive Key Pair
3,084,203 UART: [art] Store priv key in slot 0x5
3,097,709 UART: [art] Derive Key Pair - Done
3,112,551 UART: [art] Signing Cert with AUTHO
3,113,031 UART: RITY.KEYID = 7
3,128,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,942 UART: [art] PUB.X = 4E297236BBCAC6CAE3CCE06EE97DF1E132B1AF6D685285E7085A3C95A7F1C1FF6495D7A8AD5E422132C3194E5A75E1EE
3,135,727 UART: [art] PUB.Y = 2B617C54CF36D8444C59F996FE1BDF773768E1A7D2FBE7C0160841FB3C96A055FA4881FC7475139E51D371260788094B
3,142,666 UART: [art] SIG.R = 727F3E143B408A17C4BF4FABE7BE77564D89F25705CF44EEB58ACF849EB51D29FB693AF124B1E8E7EDC7B931A9750AD8
3,149,448 UART: [art] SIG.S = 34B6B1446F63720F45E23AD0AB20FAE83E1B92B54DB65F9BB080384686FAA9500A5D7A23B494A071A4F7C7489DD5BCBB
3,172,945 UART: Caliptra RT
3,173,290 UART: [state] CFI Enabled
3,280,297 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,635 UART: [rt]cmd =0x50435252, len=8
3,312,094 >>> mbox cmd response data (8 bytes)
3,312,095 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,706 UART: [rt]cmd =0x50435251, len=36
3,509,030 >>> mbox cmd response data (1848 bytes)
3,509,031 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,452 UART: [rt]cmd =0x43455246, len=4
3,550,612 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,264 ready_for_fw is high
1,061,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,908 >>> mbox cmd response: success
2,630,908 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,692,958 UART:
2,692,974 UART: Running Caliptra FMC ...
2,693,382 UART:
2,693,525 UART: [state] CFI Enabled
2,703,934 UART: [fht] FMC Alias Private Key: 7
2,811,979 UART: [art] Extend RT PCRs Done
2,812,407 UART: [art] Lock RT PCRs Done
2,814,031 UART: [art] Populate DV Done
2,822,526 UART: [fht] FMC Alias Private Key: 7
2,823,516 UART: [art] Derive CDI
2,823,796 UART: [art] Store in in slot 0x4
2,909,199 UART: [art] Derive Key Pair
2,909,559 UART: [art] Store priv key in slot 0x5
2,923,225 UART: [art] Derive Key Pair - Done
2,937,790 UART: [art] Signing Cert with AUTHO
2,938,270 UART: RITY.KEYID = 7
2,953,630 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,395 UART: [art] PUB.X = 46C6B201939DC02D7DC0A8B99F6DA7E7149338A5B03DE4A4A1E5A78323BC7AC222301EFE3C7FF4EFE063E0688B43006B
2,961,152 UART: [art] PUB.Y = CDA9A90809E03EAD8ECAA1E8454188EB46377C9821E6866955D0BED4C477624394D8D7056918D138483BA8C8D802664C
2,968,088 UART: [art] SIG.R = 6CDE17513989BF34C6103419E57D860DA5A7B0456DD59C281203869282E7890E6752515E716CDE671E80E1143DDA7323
2,974,839 UART: [art] SIG.S = C47F5EFCBA4B2911E0E24C6C28EB30AD7170269C3B74DB5ED0593B198987AF94A3E45C60C46D5E25DB0207E71604E276
2,998,309 UART: Caliptra RT
2,998,654 UART: [state] CFI Enabled
3,106,705 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,947 UART: [rt]cmd =0x50435252, len=8
3,138,702 >>> mbox cmd response data (8 bytes)
3,138,703 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,268 UART: [rt]cmd =0x50435251, len=36
3,335,808 >>> mbox cmd response data (1848 bytes)
3,335,809 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,138 UART: [rt]cmd =0x43455246, len=4
3,377,092 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,449 UART: [kat] SHA2-256
901,389 UART: [kat] SHA2-384
904,032 UART: [kat] SHA2-512-ACC
905,933 UART: [kat] ECC-384
915,510 UART: [kat] HMAC-384Kdf
920,002 UART: [kat] LMS
1,168,314 UART: [kat] --
1,169,435 UART: [cold-reset] ++
1,169,797 UART: [fht] FHT @ 0x50003400
1,172,365 UART: [idev] ++
1,172,533 UART: [idev] CDI.KEYID = 6
1,172,894 UART: [idev] SUBJECT.KEYID = 7
1,173,319 UART: [idev] UDS.KEYID = 0
1,173,665 ready_for_fw is high
1,173,665 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,121 UART: [idev] Erasing UDS.KEYID = 0
1,197,827 UART: [idev] Sha1 KeyId Algorithm
1,206,859 UART: [idev] --
1,207,970 UART: [ldev] ++
1,208,138 UART: [ldev] CDI.KEYID = 6
1,208,502 UART: [ldev] SUBJECT.KEYID = 5
1,208,929 UART: [ldev] AUTHORITY.KEYID = 7
1,209,392 UART: [ldev] FE.KEYID = 1
1,214,658 UART: [ldev] Erasing FE.KEYID = 1
1,241,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,450 UART: [ldev] --
1,280,872 UART: [fwproc] Wait for Commands...
1,281,673 UART: [fwproc] Recv command 0x46574c44
1,282,406 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,742 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,720 >>> mbox cmd response: success
2,773,720 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,774,853 UART: [afmc] ++
2,775,021 UART: [afmc] CDI.KEYID = 6
2,775,384 UART: [afmc] SUBJECT.KEYID = 7
2,775,810 UART: [afmc] AUTHORITY.KEYID = 5
2,811,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,350 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,069 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,064 UART: [afmc] --
2,854,978 UART: [cold-reset] --
2,855,932 UART: [state] Locking Datavault
2,856,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,557 UART: [state] Locking ICCM
2,858,219 UART: [exit] Launching FMC @ 0x40000130
2,863,548 UART:
2,863,564 UART: Running Caliptra FMC ...
2,863,972 UART:
2,864,026 UART: [state] CFI Enabled
2,874,391 UART: [fht] FMC Alias Private Key: 7
2,981,882 UART: [art] Extend RT PCRs Done
2,982,310 UART: [art] Lock RT PCRs Done
2,983,680 UART: [art] Populate DV Done
2,992,133 UART: [fht] FMC Alias Private Key: 7
2,993,155 UART: [art] Derive CDI
2,993,435 UART: [art] Store in in slot 0x4
3,078,916 UART: [art] Derive Key Pair
3,079,276 UART: [art] Store priv key in slot 0x5
3,092,644 UART: [art] Derive Key Pair - Done
3,107,550 UART: [art] Signing Cert with AUTHO
3,108,030 UART: RITY.KEYID = 7
3,123,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,767 UART: [art] PUB.X = 7624BF595EB2AF5E9C234C2AEC29E772408FAC4353D8316705A9ED9AEDCC5B5298BE7CD401EDE6911990052814A2D727
3,130,536 UART: [art] PUB.Y = 9FE0F400EEB87503EFEB2A8C7DE26702B2469B6394F95BB401A7DBC351BB89F81D58462CDF1BE38E7D3BB145035391C4
3,137,464 UART: [art] SIG.R = E0FD7E98AA9D1AC2F874737B26AA7712B5A71AE2AECC25E4B1349FA9B07BF02407DBDF16CC88A96D07B9084401206AFD
3,144,240 UART: [art] SIG.S = 9888E918229840E47699198559E101D9743C4715FBE4E411EB8089768DC87DBC953A645975DDAFA96C3AA8A0504C2617
3,167,882 UART: Caliptra RT
3,168,135 UART: [state] CFI Enabled
3,276,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,773 UART: [rt]cmd =0x50435252, len=8
3,308,304 >>> mbox cmd response data (8 bytes)
3,308,305 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,656 UART: [rt]cmd =0x50435251, len=36
3,504,966 >>> mbox cmd response data (1848 bytes)
3,504,967 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,360 UART: [rt]cmd =0x43455246, len=4
3,546,350 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,490 ready_for_fw is high
1,055,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,706 >>> mbox cmd response: success
2,622,706 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,684,728 UART:
2,684,744 UART: Running Caliptra FMC ...
2,685,152 UART:
2,685,206 UART: [state] CFI Enabled
2,695,493 UART: [fht] FMC Alias Private Key: 7
2,803,562 UART: [art] Extend RT PCRs Done
2,803,990 UART: [art] Lock RT PCRs Done
2,805,406 UART: [art] Populate DV Done
2,813,717 UART: [fht] FMC Alias Private Key: 7
2,814,867 UART: [art] Derive CDI
2,815,147 UART: [art] Store in in slot 0x4
2,900,686 UART: [art] Derive Key Pair
2,901,046 UART: [art] Store priv key in slot 0x5
2,914,538 UART: [art] Derive Key Pair - Done
2,929,455 UART: [art] Signing Cert with AUTHO
2,929,935 UART: RITY.KEYID = 7
2,945,381 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,146 UART: [art] PUB.X = 2EC91F51F8609479D8827539E4A3A4C8D60B897C7C2D92F7BC2709100DC9331872C3D89047C673CBEACF99D3B6760890
2,952,902 UART: [art] PUB.Y = BB9A22788A0BFE704DE58DE83F06245DCC80C7FCA2DDC155F2BC1EF00A22C4DEFA3E9D646EA6BFAFD57C2D2399B4B9C1
2,959,875 UART: [art] SIG.R = 0D123C678BB34C81F1847FEFC85C3F044C745EC5A6BD8F380FEA6824844B012B30E4A77B675D742B95CC1D4769A343A7
2,966,639 UART: [art] SIG.S = C8F13DB5CB941E81DA2B1D36A9D256407FF13F9E8ED45353BD2EA47082E281BB045745B64B3F2001C04D06D4AEC08BFA
2,990,441 UART: Caliptra RT
2,990,694 UART: [state] CFI Enabled
3,098,231 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,835 UART: [rt]cmd =0x50435252, len=8
3,130,530 >>> mbox cmd response data (8 bytes)
3,130,531 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,106 UART: [rt]cmd =0x50435251, len=36
3,327,308 >>> mbox cmd response data (1848 bytes)
3,327,309 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,572 UART: [rt]cmd =0x43455246, len=4
3,368,774 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,630 UART: [kat] SHA2-256
901,570 UART: [kat] SHA2-384
904,301 UART: [kat] SHA2-512-ACC
906,202 UART: [kat] ECC-384
915,861 UART: [kat] HMAC-384Kdf
920,515 UART: [kat] LMS
1,168,827 UART: [kat] --
1,169,638 UART: [cold-reset] ++
1,170,192 UART: [fht] FHT @ 0x50003400
1,172,868 UART: [idev] ++
1,173,036 UART: [idev] CDI.KEYID = 6
1,173,397 UART: [idev] SUBJECT.KEYID = 7
1,173,822 UART: [idev] UDS.KEYID = 0
1,174,168 ready_for_fw is high
1,174,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,082 UART: [idev] Sha1 KeyId Algorithm
1,207,960 UART: [idev] --
1,208,989 UART: [ldev] ++
1,209,157 UART: [ldev] CDI.KEYID = 6
1,209,521 UART: [ldev] SUBJECT.KEYID = 5
1,209,948 UART: [ldev] AUTHORITY.KEYID = 7
1,210,411 UART: [ldev] FE.KEYID = 1
1,215,291 UART: [ldev] Erasing FE.KEYID = 1
1,242,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,291 UART: [ldev] --
1,281,715 UART: [fwproc] Wait for Commands...
1,282,402 UART: [fwproc] Recv command 0x46574c44
1,283,135 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,181 >>> mbox cmd response: success
2,775,181 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,776,258 UART: [afmc] ++
2,776,426 UART: [afmc] CDI.KEYID = 6
2,776,789 UART: [afmc] SUBJECT.KEYID = 7
2,777,215 UART: [afmc] AUTHORITY.KEYID = 5
2,813,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,257 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,869 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,588 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,545 UART: [afmc] --
2,856,615 UART: [cold-reset] --
2,857,459 UART: [state] Locking Datavault
2,858,562 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,166 UART: [state] Locking ICCM
2,859,746 UART: [exit] Launching FMC @ 0x40000130
2,865,075 UART:
2,865,091 UART: Running Caliptra FMC ...
2,865,499 UART:
2,865,642 UART: [state] CFI Enabled
2,876,279 UART: [fht] FMC Alias Private Key: 7
2,984,294 UART: [art] Extend RT PCRs Done
2,984,722 UART: [art] Lock RT PCRs Done
2,986,390 UART: [art] Populate DV Done
2,994,479 UART: [fht] FMC Alias Private Key: 7
2,995,509 UART: [art] Derive CDI
2,995,789 UART: [art] Store in in slot 0x4
3,081,438 UART: [art] Derive Key Pair
3,081,798 UART: [art] Store priv key in slot 0x5
3,094,772 UART: [art] Derive Key Pair - Done
3,109,342 UART: [art] Signing Cert with AUTHO
3,109,822 UART: RITY.KEYID = 7
3,125,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,951 UART: [art] PUB.X = 9E52B7A42ED06258C5F7033615EB9C103DFDED39E8695FA79D487DFB8B0F2BF211EC4CAAD0FBAE5E7A0B54FC4A88A6AC
3,132,740 UART: [art] PUB.Y = 6243D0F4BF806EE8744088CCCA9594F4188786E4C2314273A8A5FFCF26248744F0A56522A4BC24FBFF7C938268347090
3,139,686 UART: [art] SIG.R = 1D63BEFB6F0E8F09757E5CCB45360E303F111EE10EA7B57096A7B6FF346DFC2155F091107C67C02C1D2925F32CF2FB77
3,146,454 UART: [art] SIG.S = F78BCF236A596100C76A0DE9D290F4D68BFDC96062212AF51FF5B990481393ECE1150EDD0BBDA822A0344D579C20A3E6
3,169,986 UART: Caliptra RT
3,170,331 UART: [state] CFI Enabled
3,278,082 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,646 UART: [rt]cmd =0x50435252, len=8
3,310,081 >>> mbox cmd response data (8 bytes)
3,310,082 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,675 UART: [rt]cmd =0x50435251, len=36
3,507,391 >>> mbox cmd response data (1848 bytes)
3,507,392 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,841 UART: [rt]cmd =0x43455246, len=4
3,548,779 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,253 ready_for_fw is high
1,056,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,641 >>> mbox cmd response: success
2,621,641 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,684,829 UART:
2,684,845 UART: Running Caliptra FMC ...
2,685,253 UART:
2,685,396 UART: [state] CFI Enabled
2,696,127 UART: [fht] FMC Alias Private Key: 7
2,803,986 UART: [art] Extend RT PCRs Done
2,804,414 UART: [art] Lock RT PCRs Done
2,806,002 UART: [art] Populate DV Done
2,814,299 UART: [fht] FMC Alias Private Key: 7
2,815,429 UART: [art] Derive CDI
2,815,709 UART: [art] Store in in slot 0x4
2,901,120 UART: [art] Derive Key Pair
2,901,480 UART: [art] Store priv key in slot 0x5
2,914,538 UART: [art] Derive Key Pair - Done
2,929,446 UART: [art] Signing Cert with AUTHO
2,929,926 UART: RITY.KEYID = 7
2,944,916 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,681 UART: [art] PUB.X = BEDFDE8318D42D9DEF1B6871AFDA661F7B9320C4B6253B3F5E8E8A6511526DF3087B273806B489CA7A4493067C55522F
2,952,448 UART: [art] PUB.Y = C5C3C70630C727265B00A6931A82D1870A6B86956214C8012E8CB3F2A9971131B27B270A755DB4E62CB19ABF5C8B4CCF
2,959,366 UART: [art] SIG.R = 76BB03402F6F862580C2C66DFD54609FA27764E53EBB9BC0B844706B05FD43E2CEC3FB4DBD6E6820B9873D9179CE31E3
2,966,140 UART: [art] SIG.S = 3153CFA2CA3FBBFD6B455CCEC0A566C98322D4C678AD77781ADCA0C1916834FD82CC7951F396C392E49E936A5B502387
2,989,863 UART: Caliptra RT
2,990,208 UART: [state] CFI Enabled
3,097,373 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,917 UART: [rt]cmd =0x50435252, len=8
3,129,530 >>> mbox cmd response data (8 bytes)
3,129,531 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,076 UART: [rt]cmd =0x50435251, len=36
3,326,550 >>> mbox cmd response data (1848 bytes)
3,326,551 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,832 UART: [rt]cmd =0x43455246, len=4
3,367,774 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,019 UART:
192,407 UART: Running Caliptra ROM ...
193,603 UART:
193,760 UART: [state] CFI Enabled
263,016 UART: [state] LifecycleState = Unprovisioned
264,984 UART: [state] DebugLocked = No
267,363 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,304 UART: [kat] SHA2-256
441,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,454 UART: [kat] ++
452,980 UART: [kat] sha1
463,856 UART: [kat] SHA2-256
466,581 UART: [kat] SHA2-384
472,997 UART: [kat] SHA2-512-ACC
475,362 UART: [kat] ECC-384
2,768,876 UART: [kat] HMAC-384Kdf
2,800,222 UART: [kat] LMS
3,990,481 UART: [kat] --
3,996,889 UART: [cold-reset] ++
3,998,113 UART: [fht] Storing FHT @ 0x50003400
4,009,527 UART: [idev] ++
4,010,099 UART: [idev] CDI.KEYID = 6
4,011,136 UART: [idev] SUBJECT.KEYID = 7
4,012,504 UART: [idev] UDS.KEYID = 0
4,013,514 ready_for_fw is high
4,013,725 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,129 UART: [idev] Erasing UDS.KEYID = 0
7,343,989 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,465 UART: [idev] --
7,368,722 UART: [ldev] ++
7,369,303 UART: [ldev] CDI.KEYID = 6
7,370,234 UART: [ldev] SUBJECT.KEYID = 5
7,371,453 UART: [ldev] AUTHORITY.KEYID = 7
7,373,036 UART: [ldev] FE.KEYID = 1
7,402,367 UART: [ldev] Erasing FE.KEYID = 1
10,733,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,709 UART: [ldev] --
13,095,818 UART: [fwproc] Waiting for Commands...
13,097,966 UART: [fwproc] Received command 0x46574c44
13,100,149 UART: [fwproc] Received Image of size 114124 bytes
17,156,228 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,863 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,763 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,617,969 >>> mbox cmd response: success
17,622,942 UART: [afmc] ++
17,623,546 UART: [afmc] CDI.KEYID = 6
17,624,488 UART: [afmc] SUBJECT.KEYID = 7
17,625,710 UART: [afmc] AUTHORITY.KEYID = 5
20,990,804 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,762 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,074 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,530 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,342 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,743 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,958 UART: [afmc] --
23,360,180 UART: [cold-reset] --
23,365,288 UART: [state] Locking Datavault
23,370,595 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,534 UART: [state] Locking ICCM
23,374,553 UART: [exit] Launching FMC @ 0x40000130
23,382,967 UART:
23,383,206 UART: Running Caliptra FMC ...
23,384,309 UART:
23,384,473 UART: [state] CFI Enabled
23,449,494 UART: [fht] FMC Alias Private Key: 7
25,786,654 UART: [art] Extend RT PCRs Done
25,787,868 UART: [art] Lock RT PCRs Done
25,789,304 UART: [art] Populate DV Done
25,794,789 UART: [fht] FMC Alias Private Key: 7
25,796,383 UART: [art] Derive CDI
25,797,197 UART: [art] Store in in slot 0x4
25,858,213 UART: [art] Derive Key Pair
25,859,238 UART: [art] Store priv key in slot 0x5
29,151,684 UART: [art] Derive Key Pair - Done
29,164,578 UART: [art] Signing Cert with AUTHO
29,165,888 UART: RITY.KEYID = 7
31,453,941 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,446 UART: [art] PUB.X = 08A9BF3895852DB82F83330C61E80813D7CFACFFB74E9C35788E0C4E5C81D7E85E353A1849FC69C6643D6181D57A8C20
31,462,695 UART: [art] PUB.Y = 59B8BADF4915E9898A416D5DF6150A6380BE6C9EC1C26466C11C92F7850CAD27CDD02B0EE75E51B6DC50AE89A3470915
31,469,923 UART: [art] SIG.R = AED64AC0B9DC1F0661027F33F1852B278001F07C15F7753078593E288A1E853F199350F5DEC9E418FBA8C07223E7B54D
31,477,325 UART: [art] SIG.S = 90F3687A02B736EDAE42AEA67B79662830A4DDF08864461966DF17427339BD3A36CFAC3FF65E8188C1BB1F3FF1480B36
32,782,558 UART: Caliptra RT
32,783,268 UART: [state] CFI Enabled
32,944,262 UART: [rt] RT listening for mailbox commands...
32,946,245 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,976,311 UART: [rt]cmd =0x44504543, len=28
33,019,344 >>> mbox cmd response data (2076 bytes)
33,029,393 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,059,288 UART: [rt]cmd =0x44504543, len=28
33,099,829 >>> mbox cmd response data (2076 bytes)
33,443,668 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,476,735 UART: [rt]cmd =0x49444550, len=353
33,490,448 >>> mbox cmd response data (8 bytes)
33,490,946 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,520,811 UART: [rt]cmd =0x44504543, len=28
33,563,468 >>> mbox cmd response data (2076 bytes)
33,573,515 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,603,754 UART: [rt]cmd =0x44504543, len=28
33,644,788 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,808,040 ready_for_fw is high
3,808,439 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,867,969 >>> mbox cmd response: success
23,566,614 UART:
23,567,002 UART: Running Caliptra FMC ...
23,568,125 UART:
23,568,283 UART: [state] CFI Enabled
23,632,294 UART: [fht] FMC Alias Private Key: 7
25,970,927 UART: [art] Extend RT PCRs Done
25,972,155 UART: [art] Lock RT PCRs Done
25,973,865 UART: [art] Populate DV Done
25,979,236 UART: [fht] FMC Alias Private Key: 7
25,980,828 UART: [art] Derive CDI
25,981,588 UART: [art] Store in in slot 0x4
26,040,749 UART: [art] Derive Key Pair
26,041,800 UART: [art] Store priv key in slot 0x5
29,334,807 UART: [art] Derive Key Pair - Done
29,347,859 UART: [art] Signing Cert with AUTHO
29,349,174 UART: RITY.KEYID = 7
31,636,193 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,708 UART: [art] PUB.X = FF7F9514DE8FA482B0E5660E967F6D27C5A0E9617B089DA012A17AFDA4EF6B697B5A71D5D01B15EE69CFA55BE7DCB205
31,644,932 UART: [art] PUB.Y = 85272E18784CA4E28FB12A8346652EF715A0381F2139DA71CD3366647C00CAE5236BBD943C8E58729EAF9E041246479D
31,652,186 UART: [art] SIG.R = 75FDC5915B5F86BBDD735F8E233BBFE6B1FBF34E6721812461C28F9A60975FF6B81AB06B91F721B2DD326DF629798526
31,659,547 UART: [art] SIG.S = C39228A5210A7DF49C8D1B0C457BD8C912CB9F0CAD23B8302751CE1944703FDDEBA2A0BAE8637999D6FDE80605EA68C4
32,965,125 UART: Caliptra RT
32,965,841 UART: [state] CFI Enabled
33,146,589 UART: [rt] RT listening for mailbox commands...
33,148,527 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,178,625 UART: [rt]cmd =0x44504543, len=28
33,221,514 >>> mbox cmd response data (2076 bytes)
33,231,689 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,261,622 UART: [rt]cmd =0x44504543, len=28
33,302,199 >>> mbox cmd response data (2076 bytes)
33,645,642 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,678,729 UART: [rt]cmd =0x49444550, len=353
33,692,568 >>> mbox cmd response data (8 bytes)
33,693,029 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,723,084 UART: [rt]cmd =0x44504543, len=28
33,765,761 >>> mbox cmd response data (2076 bytes)
33,775,649 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,805,723 UART: [rt]cmd =0x44504543, len=28
33,846,616 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,386 UART:
192,741 UART: Running Caliptra ROM ...
193,918 UART:
603,786 UART: [state] CFI Enabled
622,415 UART: [state] LifecycleState = Unprovisioned
624,307 UART: [state] DebugLocked = No
625,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,339 UART: [kat] SHA2-256
801,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,660 UART: [kat] ++
812,132 UART: [kat] sha1
822,644 UART: [kat] SHA2-256
825,294 UART: [kat] SHA2-384
830,991 UART: [kat] SHA2-512-ACC
833,354 UART: [kat] ECC-384
3,117,389 UART: [kat] HMAC-384Kdf
3,128,626 UART: [kat] LMS
4,318,705 UART: [kat] --
4,323,191 UART: [cold-reset] ++
4,325,844 UART: [fht] Storing FHT @ 0x50003400
4,337,104 UART: [idev] ++
4,337,685 UART: [idev] CDI.KEYID = 6
4,338,589 UART: [idev] SUBJECT.KEYID = 7
4,339,829 UART: [idev] UDS.KEYID = 0
4,340,882 ready_for_fw is high
4,341,104 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,473 UART: [idev] Erasing UDS.KEYID = 0
7,629,770 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,481 UART: [idev] --
7,656,555 UART: [ldev] ++
7,657,120 UART: [ldev] CDI.KEYID = 6
7,658,081 UART: [ldev] SUBJECT.KEYID = 5
7,659,288 UART: [ldev] AUTHORITY.KEYID = 7
7,660,566 UART: [ldev] FE.KEYID = 1
7,670,337 UART: [ldev] Erasing FE.KEYID = 1
10,956,966 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,969 UART: [ldev] --
13,317,796 UART: [fwproc] Waiting for Commands...
13,319,990 UART: [fwproc] Received command 0x46574c44
13,322,159 UART: [fwproc] Received Image of size 114124 bytes
17,372,277 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,572 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,027 >>> mbox cmd response: success
17,839,801 UART: [afmc] ++
17,840,446 UART: [afmc] CDI.KEYID = 6
17,841,351 UART: [afmc] SUBJECT.KEYID = 7
17,842,615 UART: [afmc] AUTHORITY.KEYID = 5
21,156,430 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,535 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,934 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,746 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,180 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,994 UART: [afmc] --
23,524,293 UART: [cold-reset] --
23,529,067 UART: [state] Locking Datavault
23,535,878 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,637 UART: [state] Locking ICCM
23,539,112 UART: [exit] Launching FMC @ 0x40000130
23,547,493 UART:
23,547,722 UART: Running Caliptra FMC ...
23,548,814 UART:
23,548,965 UART: [state] CFI Enabled
23,557,248 UART: [fht] FMC Alias Private Key: 7
25,887,555 UART: [art] Extend RT PCRs Done
25,888,781 UART: [art] Lock RT PCRs Done
25,890,327 UART: [art] Populate DV Done
25,895,626 UART: [fht] FMC Alias Private Key: 7
25,897,210 UART: [art] Derive CDI
25,897,937 UART: [art] Store in in slot 0x4
25,940,421 UART: [art] Derive Key Pair
25,941,464 UART: [art] Store priv key in slot 0x5
29,183,786 UART: [art] Derive Key Pair - Done
29,196,611 UART: [art] Signing Cert with AUTHO
29,197,948 UART: RITY.KEYID = 7
31,477,477 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,980 UART: [art] PUB.X = 710235F66C6A61BAFAE698CC7D6B4EF02BD4E63603B969AA46929D40CA04836FDC4D37D44140B29E8CAF382AA90A215B
31,486,209 UART: [art] PUB.Y = 35FCC914A3766120AD17A18303C23202DA16F8764698C86975DEA293181B6F399FAD0EEFEC00DCC58523253E38754C33
31,493,469 UART: [art] SIG.R = 0776C491A8BE68C8568547363919421DD943E581A8E678F06269FF4ED849C0C540F054373F8DC7361BBA6A4B780BAEEA
31,500,836 UART: [art] SIG.S = DE7982EAB59BBDCBADCD79E31DB7B250B1C7204446F22B437DF32FF8E5A60E9088B150C5D569AB73EDF97E4236F06909
32,806,120 UART: Caliptra RT
32,806,829 UART: [state] CFI Enabled
32,924,547 UART: [rt] RT listening for mailbox commands...
32,926,479 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,956,520 UART: [rt]cmd =0x44504543, len=28
32,999,320 >>> mbox cmd response data (2076 bytes)
33,009,337 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,039,208 UART: [rt]cmd =0x44504543, len=28
33,080,073 >>> mbox cmd response data (2076 bytes)
33,423,484 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
33,456,721 UART: [rt]cmd =0x49444550, len=354
33,470,378 >>> mbox cmd response data (8 bytes)
33,470,858 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,500,775 UART: [rt]cmd =0x44504543, len=28
33,543,257 >>> mbox cmd response data (2076 bytes)
33,553,295 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,583,575 UART: [rt]cmd =0x44504543, len=28
33,624,219 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
4,124,286 ready_for_fw is high
4,124,834 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,271 >>> mbox cmd response: success
23,709,772 UART:
23,710,213 UART: Running Caliptra FMC ...
23,711,329 UART:
23,711,475 UART: [state] CFI Enabled
23,719,473 UART: [fht] FMC Alias Private Key: 7
26,050,864 UART: [art] Extend RT PCRs Done
26,052,114 UART: [art] Lock RT PCRs Done
26,053,823 UART: [art] Populate DV Done
26,059,511 UART: [fht] FMC Alias Private Key: 7
26,061,215 UART: [art] Derive CDI
26,061,948 UART: [art] Store in in slot 0x4
26,104,488 UART: [art] Derive Key Pair
26,105,482 UART: [art] Store priv key in slot 0x5
29,347,795 UART: [art] Derive Key Pair - Done
29,360,480 UART: [art] Signing Cert with AUTHO
29,361,783 UART: RITY.KEYID = 7
31,640,992 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,519 UART: [art] PUB.X = 06E9318DDE5F758FD18E72655D143D3D01F521E1A6144891915BA5E68F2BAE19D4C6756344E8342F597E607177E1FC6C
31,649,699 UART: [art] PUB.Y = 62266462320C583D3AB273377359C2058A5704B16A61E3071F4365803BB5A35FD62298B52BB3889D3C10EC5B8D54878F
31,656,907 UART: [art] SIG.R = BCAF4EDCAD669390CB273E381419D17A582B450F9C19D2F2F1C997053C3D53351429E156C026DDE43DDC7600203B8C0B
31,664,284 UART: [art] SIG.S = CC967BE85A8F439B72BE4F6C43F921B392C00C5F8F44148D524F76DAAD8957B7AA43F59553CC72197D0E1098D89D5CAB
32,970,143 UART: Caliptra RT
32,970,859 UART: [state] CFI Enabled
33,088,568 UART: [rt] RT listening for mailbox commands...
33,090,691 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,120,681 UART: [rt]cmd =0x44504543, len=28
33,163,352 >>> mbox cmd response data (2076 bytes)
33,173,511 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,203,428 UART: [rt]cmd =0x44504543, len=28
33,244,042 >>> mbox cmd response data (2076 bytes)
33,588,231 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
33,621,400 UART: [rt]cmd =0x49444550, len=354
33,635,349 >>> mbox cmd response data (8 bytes)
33,635,805 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,665,734 UART: [rt]cmd =0x44504543, len=28
33,708,084 >>> mbox cmd response data (2076 bytes)
33,717,994 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,747,927 UART: [rt]cmd =0x44504543, len=28
33,788,801 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,116 UART:
192,503 UART: Running Caliptra ROM ...
193,670 UART:
193,822 UART: [state] CFI Enabled
265,920 UART: [state] LifecycleState = Unprovisioned
267,835 UART: [state] DebugLocked = No
269,367 UART: [state] WD Timer not started. Device not locked for debugging
272,552 UART: [kat] SHA2-256
451,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,264 UART: [kat] ++
463,806 UART: [kat] sha1
474,336 UART: [kat] SHA2-256
477,413 UART: [kat] SHA2-384
483,115 UART: [kat] SHA2-512-ACC
486,071 UART: [kat] ECC-384
2,948,631 UART: [kat] HMAC-384Kdf
2,971,161 UART: [kat] LMS
3,500,677 UART: [kat] --
3,504,377 UART: [cold-reset] ++
3,505,259 UART: [fht] FHT @ 0x50003400
3,516,450 UART: [idev] ++
3,517,009 UART: [idev] CDI.KEYID = 6
3,517,903 UART: [idev] SUBJECT.KEYID = 7
3,519,144 UART: [idev] UDS.KEYID = 0
3,520,045 ready_for_fw is high
3,520,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,279 UART: [idev] Erasing UDS.KEYID = 0
6,029,273 UART: [idev] Sha1 KeyId Algorithm
6,052,179 UART: [idev] --
6,055,312 UART: [ldev] ++
6,055,900 UART: [ldev] CDI.KEYID = 6
6,056,819 UART: [ldev] SUBJECT.KEYID = 5
6,057,981 UART: [ldev] AUTHORITY.KEYID = 7
6,059,216 UART: [ldev] FE.KEYID = 1
6,099,779 UART: [ldev] Erasing FE.KEYID = 1
8,607,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,642 UART: [ldev] --
10,413,719 UART: [fwproc] Wait for Commands...
10,416,568 UART: [fwproc] Recv command 0x46574c44
10,418,655 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,273,112 >>> mbox cmd response: success
14,277,844 UART: [afmc] ++
14,278,436 UART: [afmc] CDI.KEYID = 6
14,279,347 UART: [afmc] SUBJECT.KEYID = 7
14,280,570 UART: [afmc] AUTHORITY.KEYID = 5
16,809,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,007 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,773 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,821 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,646 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,239 UART: [afmc] --
18,606,264 UART: [cold-reset] --
18,609,806 UART: [state] Locking Datavault
18,614,458 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,178 UART: [state] Locking ICCM
18,618,871 UART: [exit] Launching FMC @ 0x40000130
18,627,298 UART:
18,627,579 UART: Running Caliptra FMC ...
18,628,691 UART:
18,628,853 UART: [state] CFI Enabled
18,688,837 UART: [fht] FMC Alias Private Key: 7
20,452,894 UART: [art] Extend RT PCRs Done
20,454,125 UART: [art] Lock RT PCRs Done
20,456,153 UART: [art] Populate DV Done
20,461,562 UART: [fht] FMC Alias Private Key: 7
20,463,136 UART: [art] Derive CDI
20,463,876 UART: [art] Store in in slot 0x4
20,521,411 UART: [art] Derive Key Pair
20,522,407 UART: [art] Store priv key in slot 0x5
22,983,831 UART: [art] Derive Key Pair - Done
22,996,683 UART: [art] Signing Cert with AUTHO
22,997,988 UART: RITY.KEYID = 7
24,709,569 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,070 UART: [art] PUB.X = B7C8E29787058A3D162132052E6A72966BF5EA737C373D71C724243240F9AA1320648C1D5DAACD1B9434D6A436391100
24,718,274 UART: [art] PUB.Y = EFDBE0C23760EEF201916E9DF87FC5A5A1F283FA790D98E812A973F5077A0FD73A360DF25FBB7E16B91D81C42B171C4F
24,725,569 UART: [art] SIG.R = 6F4356E77F31C735B7D3B2220AE93809538B903720A250661E2C71E3F702B938CF8E66B1EFEB36324779D0B3FB26FDE9
24,732,962 UART: [art] SIG.S = 640814095F64CF86637B133B33A0D69F7B49959A06D8B0C298799B5E4404BD454C9F9CF5F52CAA3BCD943E37C7D1EE29
25,712,103 UART: Caliptra RT
25,712,809 UART: [state] CFI Enabled
25,875,873 UART: [rt] RT listening for mailbox commands...
25,877,806 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,908,351 UART: [rt]cmd =0x44504543, len=28
25,951,171 >>> mbox cmd response data (2076 bytes)
25,961,198 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,991,280 UART: [rt]cmd =0x44504543, len=28
26,031,653 >>> mbox cmd response data (2076 bytes)
26,375,671 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,408,901 UART: [rt]cmd =0x49444550, len=353
26,422,613 >>> mbox cmd response data (8 bytes)
26,423,126 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,452,971 UART: [rt]cmd =0x44504543, len=28
26,495,728 >>> mbox cmd response data (2076 bytes)
26,505,775 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,535,896 UART: [rt]cmd =0x44504543, len=28
26,576,606 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,383,046 ready_for_fw is high
3,383,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,084,441 >>> mbox cmd response: success
18,365,178 UART:
18,365,562 UART: Running Caliptra FMC ...
18,366,673 UART:
18,366,827 UART: [state] CFI Enabled
18,433,857 UART: [fht] FMC Alias Private Key: 7
20,197,504 UART: [art] Extend RT PCRs Done
20,198,731 UART: [art] Lock RT PCRs Done
20,200,549 UART: [art] Populate DV Done
20,205,820 UART: [fht] FMC Alias Private Key: 7
20,207,582 UART: [art] Derive CDI
20,208,399 UART: [art] Store in in slot 0x4
20,266,358 UART: [art] Derive Key Pair
20,267,401 UART: [art] Store priv key in slot 0x5
22,730,495 UART: [art] Derive Key Pair - Done
22,743,161 UART: [art] Signing Cert with AUTHO
22,744,461 UART: RITY.KEYID = 7
24,456,601 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,105 UART: [art] PUB.X = D33C524DCD32D93057D60E9EEE59AB25E1608A71F85132EAD960322356A861324B182FC8E4D4BF6DEC4971D8329A8392
24,465,348 UART: [art] PUB.Y = F5B59CB12C4102981573CE09AF65BB9894B2957CFF16F89EAC51F6C84F06F6F87BEE789BA9DF459FFD52DE405949F1BD
24,472,661 UART: [art] SIG.R = 4F2E8AB3CA82CA6EEFD1F0F13096141DAA8BDB8E7AFD287A175B3F664B35D5A68927804B41A965B18DFF4B9D5D37FD5B
24,480,054 UART: [art] SIG.S = 5A2751B958DE9EB4A9D4C0D06D7E3449066E950B6ECB4A0372FC2BD8E92916A8314567CB1DD29A6A95070FD44D56CC3E
25,458,702 UART: Caliptra RT
25,459,421 UART: [state] CFI Enabled
25,624,416 UART: [rt] RT listening for mailbox commands...
25,626,404 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,656,942 UART: [rt]cmd =0x44504543, len=28
25,700,000 >>> mbox cmd response data (2076 bytes)
25,710,064 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,740,196 UART: [rt]cmd =0x44504543, len=28
25,780,402 >>> mbox cmd response data (2076 bytes)
26,124,591 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,157,715 UART: [rt]cmd =0x49444550, len=354
26,171,364 >>> mbox cmd response data (8 bytes)
26,171,898 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,201,762 UART: [rt]cmd =0x44504543, len=28
26,244,340 >>> mbox cmd response data (2076 bytes)
26,254,623 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,284,841 UART: [rt]cmd =0x44504543, len=28
26,326,106 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,321 UART:
192,695 UART: Running Caliptra ROM ...
193,889 UART:
603,629 UART: [state] CFI Enabled
616,443 UART: [state] LifecycleState = Unprovisioned
618,325 UART: [state] DebugLocked = No
620,060 UART: [state] WD Timer not started. Device not locked for debugging
624,238 UART: [kat] SHA2-256
803,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,951 UART: [kat] ++
815,488 UART: [kat] sha1
827,662 UART: [kat] SHA2-256
830,739 UART: [kat] SHA2-384
836,512 UART: [kat] SHA2-512-ACC
839,523 UART: [kat] ECC-384
3,278,959 UART: [kat] HMAC-384Kdf
3,290,546 UART: [kat] LMS
3,820,097 UART: [kat] --
3,824,735 UART: [cold-reset] ++
3,826,090 UART: [fht] FHT @ 0x50003400
3,837,346 UART: [idev] ++
3,837,982 UART: [idev] CDI.KEYID = 6
3,838,897 UART: [idev] SUBJECT.KEYID = 7
3,840,000 UART: [idev] UDS.KEYID = 0
3,840,921 ready_for_fw is high
3,841,104 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,677 UART: [idev] Erasing UDS.KEYID = 0
6,310,135 UART: [idev] Sha1 KeyId Algorithm
6,332,520 UART: [idev] --
6,334,892 UART: [ldev] ++
6,335,458 UART: [ldev] CDI.KEYID = 6
6,336,332 UART: [ldev] SUBJECT.KEYID = 5
6,337,451 UART: [ldev] AUTHORITY.KEYID = 7
6,338,775 UART: [ldev] FE.KEYID = 1
6,350,084 UART: [ldev] Erasing FE.KEYID = 1
8,822,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,609 UART: [ldev] --
10,611,783 UART: [fwproc] Wait for Commands...
10,613,335 UART: [fwproc] Recv command 0x46574c44
10,615,436 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,480,752 >>> mbox cmd response: success
14,485,369 UART: [afmc] ++
14,485,966 UART: [afmc] CDI.KEYID = 6
14,486,844 UART: [afmc] SUBJECT.KEYID = 7
14,487,995 UART: [afmc] AUTHORITY.KEYID = 5
16,991,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,888 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,754 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,959 UART: [afmc] --
18,791,193 UART: [cold-reset] --
18,794,445 UART: [state] Locking Datavault
18,801,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,388 UART: [state] Locking ICCM
18,806,019 UART: [exit] Launching FMC @ 0x40000130
18,814,412 UART:
18,814,637 UART: Running Caliptra FMC ...
18,815,729 UART:
18,815,877 UART: [state] CFI Enabled
18,823,863 UART: [fht] FMC Alias Private Key: 7
20,580,797 UART: [art] Extend RT PCRs Done
20,582,020 UART: [art] Lock RT PCRs Done
20,583,828 UART: [art] Populate DV Done
20,589,287 UART: [fht] FMC Alias Private Key: 7
20,590,869 UART: [art] Derive CDI
20,591,599 UART: [art] Store in in slot 0x4
20,634,315 UART: [art] Derive Key Pair
20,635,350 UART: [art] Store priv key in slot 0x5
23,062,083 UART: [art] Derive Key Pair - Done
23,074,968 UART: [art] Signing Cert with AUTHO
23,076,265 UART: RITY.KEYID = 7
24,781,989 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,502 UART: [art] PUB.X = DEC4EE4EA53670399AEC9E8A127B9462191F1E6D8F1D3F673B69FB1DD525016B8973BA4F78C7EB5E1D4FF03353EC7FF0
24,790,787 UART: [art] PUB.Y = 745141D9336562BD590CD169135776853C7A5EB2C473BD5D9056BFF985A26BF6167071040B4667DA581C790ED212ABEC
24,798,041 UART: [art] SIG.R = 373F4C26D41A696B6E14ED697D66D72B074270CE5A1F77D7F0650FB384EAB3B8D1F2E06D8D7A5C7452592D18B873D57B
24,805,423 UART: [art] SIG.S = C1F08F9DECEB9454A05773774CEF6889B98246D229DB39BBCD574A5F29D34C623E0D1D47D95FC93731809F86339F4F8B
25,784,543 UART: Caliptra RT
25,785,237 UART: [state] CFI Enabled
25,902,836 UART: [rt] RT listening for mailbox commands...
25,904,772 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,934,851 UART: [rt]cmd =0x44504543, len=28
25,977,386 >>> mbox cmd response data (2076 bytes)
25,987,457 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,017,494 UART: [rt]cmd =0x44504543, len=28
26,058,087 >>> mbox cmd response data (2076 bytes)
26,402,821 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,435,731 UART: [rt]cmd =0x49444550, len=353
26,449,350 >>> mbox cmd response data (8 bytes)
26,449,818 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,479,712 UART: [rt]cmd =0x44504543, len=28
26,522,642 >>> mbox cmd response data (2076 bytes)
26,532,637 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,562,707 UART: [rt]cmd =0x44504543, len=28
26,603,559 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,695,718 ready_for_fw is high
3,696,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,264,103 >>> mbox cmd response: success
18,516,103 UART:
18,516,524 UART: Running Caliptra FMC ...
18,517,636 UART:
18,517,806 UART: [state] CFI Enabled
18,525,711 UART: [fht] FMC Alias Private Key: 7
20,282,885 UART: [art] Extend RT PCRs Done
20,284,119 UART: [art] Lock RT PCRs Done
20,285,446 UART: [art] Populate DV Done
20,291,031 UART: [fht] FMC Alias Private Key: 7
20,292,575 UART: [art] Derive CDI
20,293,335 UART: [art] Store in in slot 0x4
20,335,932 UART: [art] Derive Key Pair
20,336,965 UART: [art] Store priv key in slot 0x5
22,763,213 UART: [art] Derive Key Pair - Done
22,776,385 UART: [art] Signing Cert with AUTHO
22,777,685 UART: RITY.KEYID = 7
24,482,411 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,898 UART: [art] PUB.X = 2F422CC3FBBE2A02EA7F130F028403AFCCBD511D22C32E666626F1BEA24E8E5A8D1CC9C619986F44CBCE13F7C402B3B8
24,491,155 UART: [art] PUB.Y = CF42F94278B3633A5FBEF97F0EDFAA6DE37BC50061507EBC98C87B17A3EFF8246E2876FD5320C4136B7FB2B64DCBFA20
24,498,436 UART: [art] SIG.R = 6567B188530827452A320B60974EB769566F4710C9EC803CF7DEB8B248EE8561F03085088A5EEB076A6492580D92884E
24,505,820 UART: [art] SIG.S = 57EBF36D6FE96D9C65D718AA5CA45C90B8D31F45D92254D0B672844A22060F3DE1E40187B04594D4B61EA0AB323B2703
25,484,495 UART: Caliptra RT
25,485,215 UART: [state] CFI Enabled
25,601,548 UART: [rt] RT listening for mailbox commands...
25,603,491 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,633,639 UART: [rt]cmd =0x44504543, len=28
25,676,695 >>> mbox cmd response data (2076 bytes)
25,686,737 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,716,531 UART: [rt]cmd =0x44504543, len=28
25,756,889 >>> mbox cmd response data (2076 bytes)
26,101,056 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,134,103 UART: [rt]cmd =0x49444550, len=354
26,147,522 >>> mbox cmd response data (8 bytes)
26,148,049 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,177,695 UART: [rt]cmd =0x44504543, len=28
26,220,451 >>> mbox cmd response data (2076 bytes)
26,230,376 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,260,603 UART: [rt]cmd =0x44504543, len=28
26,301,495 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,434,481 ready_for_fw is high
3,434,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,729,515 >>> mbox cmd response: success
19,022,585 UART:
19,023,346 UART: Running Caliptra FMC ...
19,024,485 UART:
19,024,646 UART: [state] CFI Enabled
19,092,138 UART: [fht] FMC Alias Private Key: 7
20,856,052 UART: [art] Extend RT PCRs Done
20,857,281 UART: [art] Lock RT PCRs Done
20,858,760 UART: [art] Populate DV Done
20,864,085 UART: [fht] FMC Alias Private Key: 7
20,865,614 UART: [art] Derive CDI
20,866,382 UART: [art] Store in in slot 0x4
20,924,940 UART: [art] Derive Key Pair
20,925,942 UART: [art] Store priv key in slot 0x5
23,389,482 UART: [art] Derive Key Pair - Done
23,402,624 UART: [art] Signing Cert with AUTHO
23,403,930 UART: RITY.KEYID = 7
25,115,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,849 UART: [art] PUB.X = 8DF663EE282120BA4DB6D33FBA7AEF85060DAC1C5B6F68690895E94630F174D795C98B6DC089E4C4994E5E0C56ECA7E3
25,124,150 UART: [art] PUB.Y = 2BF7F9EEB96FA9CA5D90D2CB0369586FD7D9F6BCF4F2CFF434CCD133A325A68DD5D12057455576B0B36830BF377AC13D
25,131,380 UART: [art] SIG.R = 13586F5CD58BB1CDF556EB9B381AC64ACBC3EAA33F0DF652628105B7BCCB6D5DC40ECF8B3B886BF3726FDFCDFB7E2629
25,138,842 UART: [art] SIG.S = 6C8DB7A8F9E38EA7A48D712EFD9E2BDEC80F1E0F5B692CF14D80546F74E1743A2A0716008BFE7D9EF492C26DAB3E75B1
26,117,599 UART: Caliptra RT
26,118,297 UART: [state] CFI Enabled
26,282,067 UART: [rt] RT listening for mailbox commands...
26,284,011 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,314,972 UART: [rt]cmd =0x44504543, len=28
26,357,696 >>> mbox cmd response data (2076 bytes)
26,367,790 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,397,719 UART: [rt]cmd =0x44504543, len=28
26,438,316 >>> mbox cmd response data (2076 bytes)
26,782,676 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,815,827 UART: [rt]cmd =0x49444550, len=353
26,829,596 >>> mbox cmd response data (8 bytes)
26,830,156 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,860,233 UART: [rt]cmd =0x44504543, len=28
26,902,932 >>> mbox cmd response data (2076 bytes)
26,912,861 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,942,804 UART: [rt]cmd =0x44504543, len=28
26,983,776 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,747,963 ready_for_fw is high
3,748,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,954,221 >>> mbox cmd response: success
19,207,925 UART:
19,208,324 UART: Running Caliptra FMC ...
19,209,421 UART:
19,209,577 UART: [state] CFI Enabled
19,217,695 UART: [fht] FMC Alias Private Key: 7
20,974,359 UART: [art] Extend RT PCRs Done
20,975,587 UART: [art] Lock RT PCRs Done
20,977,181 UART: [art] Populate DV Done
20,982,551 UART: [fht] FMC Alias Private Key: 7
20,984,234 UART: [art] Derive CDI
20,984,975 UART: [art] Store in in slot 0x4
21,027,512 UART: [art] Derive Key Pair
21,028,504 UART: [art] Store priv key in slot 0x5
23,455,443 UART: [art] Derive Key Pair - Done
23,468,511 UART: [art] Signing Cert with AUTHO
23,469,847 UART: RITY.KEYID = 7
25,174,975 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,483 UART: [art] PUB.X = 623DBFE808577F7D09D4DC5F70903386C8EDD2941F52816151AFAF5615ACE6EC92A42BC98FD90ACA480660D191241C5C
25,183,774 UART: [art] PUB.Y = 800FDC88507CD87646881835307087949A5385B65098069ED6C38B77D2FD3F5CAC0B4FDB6E50009EB57FA7293E9874B4
25,191,014 UART: [art] SIG.R = 81DBA1632B644A99E6FA1AF98DB37720227F41CC7C7DE3E8C6C4DC3D86AABB9043E71669088A284869ECD96F87B03A11
25,198,401 UART: [art] SIG.S = 3F524C34A21804155F4143D23AFEAFBEE1D9E7C7A9E03A5728B0EF9E4296A83B75E5EDC9886A4CEFDA039D68B5F3B991
26,177,511 UART: Caliptra RT
26,178,226 UART: [state] CFI Enabled
26,295,766 UART: [rt] RT listening for mailbox commands...
26,297,710 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,327,787 UART: [rt]cmd =0x44504543, len=28
26,370,510 >>> mbox cmd response data (2076 bytes)
26,380,547 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,410,560 UART: [rt]cmd =0x44504543, len=28
26,450,968 >>> mbox cmd response data (2076 bytes)
26,795,280 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,828,289 UART: [rt]cmd =0x49444550, len=354
26,841,949 >>> mbox cmd response data (8 bytes)
26,842,454 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,872,505 UART: [rt]cmd =0x44504543, len=28
26,915,320 >>> mbox cmd response data (2076 bytes)
26,925,237 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,955,301 UART: [rt]cmd =0x44504543, len=28
26,996,380 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,351 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,879 UART: [kat] SHA2-256
881,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,925 UART: [kat] ++
886,077 UART: [kat] sha1
890,237 UART: [kat] SHA2-256
892,175 UART: [kat] SHA2-384
894,950 UART: [kat] SHA2-512-ACC
896,851 UART: [kat] ECC-384
902,224 UART: [kat] HMAC-384Kdf
906,898 UART: [kat] LMS
1,475,094 UART: [kat] --
1,476,075 UART: [cold-reset] ++
1,476,441 UART: [fht] Storing FHT @ 0x50003400
1,479,370 UART: [idev] ++
1,479,538 UART: [idev] CDI.KEYID = 6
1,479,898 UART: [idev] SUBJECT.KEYID = 7
1,480,322 UART: [idev] UDS.KEYID = 0
1,480,667 ready_for_fw is high
1,480,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,012 UART: [idev] Erasing UDS.KEYID = 0
1,504,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,088 UART: [idev] --
1,514,105 UART: [ldev] ++
1,514,273 UART: [ldev] CDI.KEYID = 6
1,514,636 UART: [ldev] SUBJECT.KEYID = 5
1,515,062 UART: [ldev] AUTHORITY.KEYID = 7
1,515,525 UART: [ldev] FE.KEYID = 1
1,520,717 UART: [ldev] Erasing FE.KEYID = 1
1,546,320 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,894 UART: [ldev] --
1,585,257 UART: [fwproc] Waiting for Commands...
1,586,078 UART: [fwproc] Received command 0x46574c44
1,586,869 UART: [fwproc] Received Image of size 114448 bytes
2,886,144 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,092 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,444 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,545 >>> mbox cmd response: success
3,080,737 UART: [afmc] ++
3,080,905 UART: [afmc] CDI.KEYID = 6
3,081,267 UART: [afmc] SUBJECT.KEYID = 7
3,081,692 UART: [afmc] AUTHORITY.KEYID = 5
3,116,677 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,258 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,948 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,949 UART: [afmc] --
3,159,861 UART: [cold-reset] --
3,160,485 UART: [state] Locking Datavault
3,161,584 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,188 UART: [state] Locking ICCM
3,162,850 UART: [exit] Launching FMC @ 0x40000130
3,168,179 UART:
3,168,195 UART: Running Caliptra FMC ...
3,168,603 UART:
3,168,657 UART: [state] CFI Enabled
3,179,052 UART: [fht] FMC Alias Private Key: 7
3,287,123 UART: [art] Extend RT PCRs Done
3,287,551 UART: [art] Lock RT PCRs Done
3,288,867 UART: [art] Populate DV Done
3,296,832 UART: [fht] FMC Alias Private Key: 7
3,297,984 UART: [art] Derive CDI
3,298,264 UART: [art] Store in in slot 0x4
3,384,207 UART: [art] Derive Key Pair
3,384,567 UART: [art] Store priv key in slot 0x5
3,397,589 UART: [art] Derive Key Pair - Done
3,412,653 UART: [art] Signing Cert with AUTHO
3,413,133 UART: RITY.KEYID = 7
3,428,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,486 UART: [art] PUB.X = 3B1912547CB4C57BC5A0ABBE6CA40BD447A94623D31701ACE89DA31A6CA41055EB8022A9C90C707582B8C4CB6C438C5D
3,436,259 UART: [art] PUB.Y = 30C11EC1423FC17BD0CD8DA973B585A4F241DD3CB790B61BF35B53DEE8E1FF5235CF06EFD2A02DFFECDF47284A633778
3,443,228 UART: [art] SIG.R = 271971F3EBB8900B0E76B89C30712CD4E3489F6D3CB36753C5EE4654C82D699B2BEF42A2DF789C68C14181BFD2214DA6
3,449,998 UART: [art] SIG.S = 1AD2C87B34F13F3E6C2381C57DE692C05350AF43E5965343B4A7A10B267E92E6A1C18C14FD4176B758EB7F04CAB5FDDB
3,474,387 UART: Caliptra RT
3,474,640 UART: [state] CFI Enabled
3,582,880 UART: [rt] RT listening for mailbox commands...
3,583,550 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,154 UART: [rt]cmd =0x44504543, len=28
3,656,427 >>> mbox cmd response data (2076 bytes)
3,656,428 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,147 UART: [rt]cmd =0x44504543, len=28
3,727,032 >>> mbox cmd response data (2076 bytes)
3,727,033 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,572 UART: [rt]cmd =0x49444550, len=354
3,771,813 >>> mbox cmd response data (8 bytes)
3,771,814 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,801,275 UART: [rt]cmd =0x44504543, len=28
3,844,692 >>> mbox cmd response data (2076 bytes)
3,844,693 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,874,198 UART: [rt]cmd =0x44504543, len=28
3,915,599 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,019 ready_for_fw is high
1,362,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,589 >>> mbox cmd response: success
2,990,821 UART:
2,990,837 UART: Running Caliptra FMC ...
2,991,245 UART:
2,991,299 UART: [state] CFI Enabled
3,002,150 UART: [fht] FMC Alias Private Key: 7
3,111,179 UART: [art] Extend RT PCRs Done
3,111,607 UART: [art] Lock RT PCRs Done
3,113,435 UART: [art] Populate DV Done
3,121,720 UART: [fht] FMC Alias Private Key: 7
3,122,656 UART: [art] Derive CDI
3,122,936 UART: [art] Store in in slot 0x4
3,208,437 UART: [art] Derive Key Pair
3,208,797 UART: [art] Store priv key in slot 0x5
3,221,547 UART: [art] Derive Key Pair - Done
3,236,215 UART: [art] Signing Cert with AUTHO
3,236,695 UART: RITY.KEYID = 7
3,251,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,220 UART: [art] PUB.X = C5897C923B183E6B5B61075B82EECD115034210897CCDD47A2453F0B4C472BB8A4B0A1EB8F366EF37015F2686E52BE1A
3,258,987 UART: [art] PUB.Y = 84417266B498B80473DB3A3ED5B8ED1FBA6E0A5784C471B371FFF3A999A609FAC297856AD792800BA7F4E090BAA6BF37
3,265,935 UART: [art] SIG.R = 870254B9405A166D9C9D1523D3E54965DA15833EC6E216F45B9A0414EE4CD9276D16CDFD08334D0218A39E2666B5B3F4
3,272,691 UART: [art] SIG.S = 07FFB527DF76F97C5342C60C7A760326F273ABCEEF10F7FD28E3FB652258A20C693A6845ADDDFAA6D9673D7EE7983663
3,296,426 UART: Caliptra RT
3,296,679 UART: [state] CFI Enabled
3,404,958 UART: [rt] RT listening for mailbox commands...
3,405,628 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,646 UART: [rt]cmd =0x44504543, len=28
3,478,817 >>> mbox cmd response data (2076 bytes)
3,478,818 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,477 UART: [rt]cmd =0x44504543, len=28
3,549,329 >>> mbox cmd response data (2076 bytes)
3,549,330 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,872 UART: [rt]cmd =0x49444550, len=353
3,594,141 >>> mbox cmd response data (8 bytes)
3,594,142 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,859 UART: [rt]cmd =0x44504543, len=28
3,667,188 >>> mbox cmd response data (2076 bytes)
3,667,189 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,760 UART: [rt]cmd =0x44504543, len=28
3,738,225 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,540 UART: [kat] SHA2-256
882,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,586 UART: [kat] ++
886,738 UART: [kat] sha1
890,936 UART: [kat] SHA2-256
892,874 UART: [kat] SHA2-384
895,411 UART: [kat] SHA2-512-ACC
897,312 UART: [kat] ECC-384
902,857 UART: [kat] HMAC-384Kdf
907,331 UART: [kat] LMS
1,475,527 UART: [kat] --
1,476,338 UART: [cold-reset] ++
1,476,670 UART: [fht] Storing FHT @ 0x50003400
1,479,421 UART: [idev] ++
1,479,589 UART: [idev] CDI.KEYID = 6
1,479,949 UART: [idev] SUBJECT.KEYID = 7
1,480,373 UART: [idev] UDS.KEYID = 0
1,480,718 ready_for_fw is high
1,480,718 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,407 UART: [idev] Erasing UDS.KEYID = 0
1,504,763 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,465 UART: [idev] --
1,514,682 UART: [ldev] ++
1,514,850 UART: [ldev] CDI.KEYID = 6
1,515,213 UART: [ldev] SUBJECT.KEYID = 5
1,515,639 UART: [ldev] AUTHORITY.KEYID = 7
1,516,102 UART: [ldev] FE.KEYID = 1
1,521,660 UART: [ldev] Erasing FE.KEYID = 1
1,547,473 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,767 UART: [ldev] --
1,587,092 UART: [fwproc] Waiting for Commands...
1,587,823 UART: [fwproc] Received command 0x46574c44
1,588,614 UART: [fwproc] Received Image of size 114448 bytes
2,887,473 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,869 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,221 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,198 >>> mbox cmd response: success
3,081,262 UART: [afmc] ++
3,081,430 UART: [afmc] CDI.KEYID = 6
3,081,792 UART: [afmc] SUBJECT.KEYID = 7
3,082,217 UART: [afmc] AUTHORITY.KEYID = 5
3,117,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,946 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,726 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,454 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,339 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,029 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,828 UART: [afmc] --
3,160,716 UART: [cold-reset] --
3,161,744 UART: [state] Locking Datavault
3,162,969 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,573 UART: [state] Locking ICCM
3,164,097 UART: [exit] Launching FMC @ 0x40000130
3,169,426 UART:
3,169,442 UART: Running Caliptra FMC ...
3,169,850 UART:
3,169,993 UART: [state] CFI Enabled
3,180,570 UART: [fht] FMC Alias Private Key: 7
3,288,725 UART: [art] Extend RT PCRs Done
3,289,153 UART: [art] Lock RT PCRs Done
3,291,029 UART: [art] Populate DV Done
3,299,052 UART: [fht] FMC Alias Private Key: 7
3,300,142 UART: [art] Derive CDI
3,300,422 UART: [art] Store in in slot 0x4
3,386,317 UART: [art] Derive Key Pair
3,386,677 UART: [art] Store priv key in slot 0x5
3,399,983 UART: [art] Derive Key Pair - Done
3,414,883 UART: [art] Signing Cert with AUTHO
3,415,363 UART: RITY.KEYID = 7
3,430,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,204 UART: [art] PUB.X = B9F4FF6C4DFBECC11A79E8735DB8EB50C9EF57C1EE406A4BF82575BC6F5DB4911CB037DB43631B3E55510B0E82268BAB
3,437,990 UART: [art] PUB.Y = 9BF75FA91E50B6D7BEF100E9173EC78DE3F7699D0CCBA8BF66B2E6671E812E6F45C520ECA6745156A3531DC8DA588FF8
3,444,931 UART: [art] SIG.R = 8D8EBA61545E8458D1AFAAE274D60D7C83A23AB2EB2F70E1F6EA71009CF4F1E9D64BA86E454E172D53FC828208ACA5D7
3,451,691 UART: [art] SIG.S = 071D6D93DBD28E92F8CD3A28B4187F087EE811D51AA737E6B47DBFC70A94E7CA2E4EB2479C4F125F48BFBE8EB376732F
3,475,551 UART: Caliptra RT
3,475,896 UART: [state] CFI Enabled
3,584,949 UART: [rt] RT listening for mailbox commands...
3,585,619 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,761 UART: [rt]cmd =0x44504543, len=28
3,659,132 >>> mbox cmd response data (2076 bytes)
3,659,133 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,532 UART: [rt]cmd =0x44504543, len=28
3,729,408 >>> mbox cmd response data (2076 bytes)
3,729,409 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,754 UART: [rt]cmd =0x49444550, len=354
3,774,094 >>> mbox cmd response data (8 bytes)
3,774,095 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,803,762 UART: [rt]cmd =0x44504543, len=28
3,846,749 >>> mbox cmd response data (2076 bytes)
3,846,750 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,389 UART: [rt]cmd =0x44504543, len=28
3,918,111 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,460 ready_for_fw is high
1,362,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,124 >>> mbox cmd response: success
2,994,486 UART:
2,994,502 UART: Running Caliptra FMC ...
2,994,910 UART:
2,995,053 UART: [state] CFI Enabled
3,005,552 UART: [fht] FMC Alias Private Key: 7
3,113,437 UART: [art] Extend RT PCRs Done
3,113,865 UART: [art] Lock RT PCRs Done
3,115,489 UART: [art] Populate DV Done
3,123,688 UART: [fht] FMC Alias Private Key: 7
3,124,670 UART: [art] Derive CDI
3,124,950 UART: [art] Store in in slot 0x4
3,211,035 UART: [art] Derive Key Pair
3,211,395 UART: [art] Store priv key in slot 0x5
3,225,077 UART: [art] Derive Key Pair - Done
3,239,999 UART: [art] Signing Cert with AUTHO
3,240,479 UART: RITY.KEYID = 7
3,255,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,256,400 UART: [art] PUB.X = AFCFC0241957A4861A7F6496532EE7F2D7F408879335067FA7B4D7D081ABF6BEBFF64C7265C92082DF06483BB3040C96
3,263,159 UART: [art] PUB.Y = FD903C2006D6A90CFE7D8F7B085DDA35691A7660A454DF3B3E1C1D7F1A259E7111AF85C4FBF053238472B6EC0E93887F
3,270,107 UART: [art] SIG.R = F8FEBE8567598AC5C1520EF8F03D473C006AA74D9E64617FF6D5F77DEB9071EA08197BEC21ECEAE2A4C5FDA6236980BB
3,276,869 UART: [art] SIG.S = 601B28B5E78C27B848B48EFB7CE868A9B410B67497EB592632DA6AF4F6FFC9780552A3189C2D5C461827E4104507BABB
3,301,066 UART: Caliptra RT
3,301,411 UART: [state] CFI Enabled
3,409,110 UART: [rt] RT listening for mailbox commands...
3,409,780 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,842 UART: [rt]cmd =0x44504543, len=28
3,482,957 >>> mbox cmd response data (2076 bytes)
3,482,958 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,445 UART: [rt]cmd =0x44504543, len=28
3,553,937 >>> mbox cmd response data (2076 bytes)
3,553,938 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,579 UART: [rt]cmd =0x49444550, len=352
3,596,378 >>> mbox cmd response data (8 bytes)
3,596,379 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,118 UART: [rt]cmd =0x44504543, len=28
3,669,497 >>> mbox cmd response data (2076 bytes)
3,669,498 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,031 UART: [rt]cmd =0x44504543, len=28
3,740,739 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
893,506 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,631 UART: [kat] ++
897,783 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
917,986 UART: [kat] HMAC-384Kdf
922,546 UART: [kat] LMS
1,170,874 UART: [kat] --
1,171,945 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,174,872 UART: [idev] ++
1,175,040 UART: [idev] CDI.KEYID = 6
1,175,400 UART: [idev] SUBJECT.KEYID = 7
1,175,824 UART: [idev] UDS.KEYID = 0
1,176,169 ready_for_fw is high
1,176,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,450 UART: [idev] Erasing UDS.KEYID = 0
1,200,329 UART: [idev] Sha1 KeyId Algorithm
1,208,835 UART: [idev] --
1,209,921 UART: [ldev] ++
1,210,089 UART: [ldev] CDI.KEYID = 6
1,210,452 UART: [ldev] SUBJECT.KEYID = 5
1,210,878 UART: [ldev] AUTHORITY.KEYID = 7
1,211,341 UART: [ldev] FE.KEYID = 1
1,216,465 UART: [ldev] Erasing FE.KEYID = 1
1,242,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,397 UART: [ldev] --
1,281,868 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x46574c44
1,283,410 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,242 >>> mbox cmd response: success
2,776,330 UART: [afmc] ++
2,776,498 UART: [afmc] CDI.KEYID = 6
2,776,860 UART: [afmc] SUBJECT.KEYID = 7
2,777,285 UART: [afmc] AUTHORITY.KEYID = 5
2,812,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,247 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,132 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,851 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,625 UART: [afmc] --
2,855,629 UART: [cold-reset] --
2,856,443 UART: [state] Locking Datavault
2,857,722 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,326 UART: [state] Locking ICCM
2,858,926 UART: [exit] Launching FMC @ 0x40000130
2,864,255 UART:
2,864,271 UART: Running Caliptra FMC ...
2,864,679 UART:
2,864,733 UART: [state] CFI Enabled
2,875,178 UART: [fht] FMC Alias Private Key: 7
2,983,167 UART: [art] Extend RT PCRs Done
2,983,595 UART: [art] Lock RT PCRs Done
2,985,057 UART: [art] Populate DV Done
2,993,264 UART: [fht] FMC Alias Private Key: 7
2,994,232 UART: [art] Derive CDI
2,994,512 UART: [art] Store in in slot 0x4
3,080,307 UART: [art] Derive Key Pair
3,080,667 UART: [art] Store priv key in slot 0x5
3,093,509 UART: [art] Derive Key Pair - Done
3,108,279 UART: [art] Signing Cert with AUTHO
3,108,759 UART: RITY.KEYID = 7
3,123,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,514 UART: [art] PUB.X = B85CF67ABFCD2927819AB41B470F828D8D24DC008880010BD3158006AE4D6284F37B86EC2EA307EC715453BF902EDD69
3,131,253 UART: [art] PUB.Y = FC1141DC3B3DAEA72A00E303DE224575D0A3B851ADE59AB7E24A12866EDF71ADA03160C7255F6D4EF6BA59657F8F05E9
3,138,191 UART: [art] SIG.R = 4B84629E83B49679856FE14C0B12B21D6E466EB00971CF5C00E20526C525529FA5157578B367257241A3505F086B253F
3,144,913 UART: [art] SIG.S = D70FF7B0B7BE792B15DC7320081979430CFC9B32AB49F259967B72FB9857EA1748BE409AADA83FA179A790017F17FC03
3,169,011 UART: Caliptra RT
3,169,264 UART: [state] CFI Enabled
3,276,689 UART: [rt] RT listening for mailbox commands...
3,277,359 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,277 UART: [rt]cmd =0x44504543, len=28
3,350,652 >>> mbox cmd response data (2076 bytes)
3,350,653 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,116 UART: [rt]cmd =0x44504543, len=28
3,421,145 >>> mbox cmd response data (2076 bytes)
3,421,146 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,814 UART: [rt]cmd =0x49444550, len=353
3,465,830 >>> mbox cmd response data (8 bytes)
3,465,831 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,336 UART: [rt]cmd =0x44504543, len=28
3,538,739 >>> mbox cmd response data (2076 bytes)
3,538,740 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,107 UART: [rt]cmd =0x44504543, len=28
3,609,597 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,265 ready_for_fw is high
1,060,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,345 >>> mbox cmd response: success
2,689,787 UART:
2,689,803 UART: Running Caliptra FMC ...
2,690,211 UART:
2,690,265 UART: [state] CFI Enabled
2,700,532 UART: [fht] FMC Alias Private Key: 7
2,808,133 UART: [art] Extend RT PCRs Done
2,808,561 UART: [art] Lock RT PCRs Done
2,809,843 UART: [art] Populate DV Done
2,817,998 UART: [fht] FMC Alias Private Key: 7
2,819,028 UART: [art] Derive CDI
2,819,308 UART: [art] Store in in slot 0x4
2,905,081 UART: [art] Derive Key Pair
2,905,441 UART: [art] Store priv key in slot 0x5
2,918,603 UART: [art] Derive Key Pair - Done
2,933,379 UART: [art] Signing Cert with AUTHO
2,933,859 UART: RITY.KEYID = 7
2,948,733 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,498 UART: [art] PUB.X = 24E8E14A44A9F33FBE4416C3FEED7A7563A4F43460CD4315275653A548E5069936F1B2796825F0C65A9471A495907A12
2,956,257 UART: [art] PUB.Y = C44DF5B8D14D2ABE2D9A0858343BB9BF5609655DD638D37B4228664B2D55C03990203BB37802044FB15899C48405A3D3
2,963,188 UART: [art] SIG.R = 9F4F92CA8A4355379E134AA48BA61545327D4B4C20F94FD9F51599EBD8A952E1F3755076A14A548E35CC7378FB63FF7B
2,969,962 UART: [art] SIG.S = F475C7314EB48E1F709075EA7D7CE0112704E8BAD4B68E2A1141C183FE0CC2E0EF5520329AD7F79176BCBC82651B879B
2,994,131 UART: Caliptra RT
2,994,384 UART: [state] CFI Enabled
3,102,342 UART: [rt] RT listening for mailbox commands...
3,103,012 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,020 UART: [rt]cmd =0x44504543, len=28
3,176,373 >>> mbox cmd response data (2076 bytes)
3,176,374 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,205,711 UART: [rt]cmd =0x44504543, len=28
3,246,851 >>> mbox cmd response data (2076 bytes)
3,246,852 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,542 UART: [rt]cmd =0x49444550, len=353
3,291,941 >>> mbox cmd response data (8 bytes)
3,291,942 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,425 UART: [rt]cmd =0x44504543, len=28
3,364,928 >>> mbox cmd response data (2076 bytes)
3,364,929 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,222 UART: [rt]cmd =0x44504543, len=28
3,435,697 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
893,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,792 UART: [kat] ++
897,944 UART: [kat] sha1
901,966 UART: [kat] SHA2-256
903,906 UART: [kat] SHA2-384
906,705 UART: [kat] SHA2-512-ACC
908,606 UART: [kat] ECC-384
918,449 UART: [kat] HMAC-384Kdf
923,225 UART: [kat] LMS
1,171,553 UART: [kat] --
1,172,484 UART: [cold-reset] ++
1,172,972 UART: [fht] FHT @ 0x50003400
1,175,607 UART: [idev] ++
1,175,775 UART: [idev] CDI.KEYID = 6
1,176,135 UART: [idev] SUBJECT.KEYID = 7
1,176,559 UART: [idev] UDS.KEYID = 0
1,176,904 ready_for_fw is high
1,176,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,365 UART: [idev] Erasing UDS.KEYID = 0
1,202,030 UART: [idev] Sha1 KeyId Algorithm
1,210,504 UART: [idev] --
1,211,524 UART: [ldev] ++
1,211,692 UART: [ldev] CDI.KEYID = 6
1,212,055 UART: [ldev] SUBJECT.KEYID = 5
1,212,481 UART: [ldev] AUTHORITY.KEYID = 7
1,212,944 UART: [ldev] FE.KEYID = 1
1,218,080 UART: [ldev] Erasing FE.KEYID = 1
1,244,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,280 UART: [ldev] --
1,283,593 UART: [fwproc] Wait for Commands...
1,284,387 UART: [fwproc] Recv command 0x46574c44
1,285,115 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,204 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,407 >>> mbox cmd response: success
2,778,441 UART: [afmc] ++
2,778,609 UART: [afmc] CDI.KEYID = 6
2,778,971 UART: [afmc] SUBJECT.KEYID = 7
2,779,396 UART: [afmc] AUTHORITY.KEYID = 5
2,815,713 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,254 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,982 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,867 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,586 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,444 UART: [afmc] --
2,859,338 UART: [cold-reset] --
2,860,536 UART: [state] Locking Datavault
2,861,651 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,255 UART: [state] Locking ICCM
2,862,923 UART: [exit] Launching FMC @ 0x40000130
2,868,252 UART:
2,868,268 UART: Running Caliptra FMC ...
2,868,676 UART:
2,868,819 UART: [state] CFI Enabled
2,879,418 UART: [fht] FMC Alias Private Key: 7
2,986,835 UART: [art] Extend RT PCRs Done
2,987,263 UART: [art] Lock RT PCRs Done
2,988,707 UART: [art] Populate DV Done
2,996,862 UART: [fht] FMC Alias Private Key: 7
2,997,918 UART: [art] Derive CDI
2,998,198 UART: [art] Store in in slot 0x4
3,084,427 UART: [art] Derive Key Pair
3,084,787 UART: [art] Store priv key in slot 0x5
3,097,963 UART: [art] Derive Key Pair - Done
3,112,886 UART: [art] Signing Cert with AUTHO
3,113,366 UART: RITY.KEYID = 7
3,128,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,359 UART: [art] PUB.X = 8A5DE683AB1DB818EF5BD7B7158BC9E0691392CB7CA3428AD05361B85982F1B1D83D97FEB8C0A95EAF72E4E13AFD5E2D
3,136,149 UART: [art] PUB.Y = C4E14EC6FB1A9AFD80CC3FB790C4D3E50443E17459E7E75C865F670EBCC3CFF8B70EBE19B7D4DA8698BE9876727964B6
3,143,108 UART: [art] SIG.R = E2EA7DCA6C32F5B6B17300271CE174C3B75DFBB88FB2505E40ED98C72C9A1BACF9251F498873ABD52AD704BC634ABE4E
3,149,875 UART: [art] SIG.S = DC8BA921396FCEAB7E3948CF0A8417FD0C4BFD3A0205902536B13839A3DB02D5BAF4E4ABDB4C9F03330992DD727504A3
3,173,876 UART: Caliptra RT
3,174,221 UART: [state] CFI Enabled
3,280,797 UART: [rt] RT listening for mailbox commands...
3,281,467 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,121 UART: [rt]cmd =0x44504543, len=28
3,353,944 >>> mbox cmd response data (2076 bytes)
3,353,945 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,530 UART: [rt]cmd =0x44504543, len=28
3,424,580 >>> mbox cmd response data (2076 bytes)
3,424,581 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,455,900 UART: [rt]cmd =0x49444550, len=352
3,466,723 >>> mbox cmd response data (8 bytes)
3,466,724 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,337 UART: [rt]cmd =0x44504543, len=28
3,539,748 >>> mbox cmd response data (2076 bytes)
3,539,749 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,388 UART: [rt]cmd =0x44504543, len=28
3,610,948 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,374 ready_for_fw is high
1,061,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,706 >>> mbox cmd response: success
2,692,906 UART:
2,692,922 UART: Running Caliptra FMC ...
2,693,330 UART:
2,693,473 UART: [state] CFI Enabled
2,704,156 UART: [fht] FMC Alias Private Key: 7
2,812,387 UART: [art] Extend RT PCRs Done
2,812,815 UART: [art] Lock RT PCRs Done
2,814,313 UART: [art] Populate DV Done
2,822,728 UART: [fht] FMC Alias Private Key: 7
2,823,810 UART: [art] Derive CDI
2,824,090 UART: [art] Store in in slot 0x4
2,909,421 UART: [art] Derive Key Pair
2,909,781 UART: [art] Store priv key in slot 0x5
2,923,453 UART: [art] Derive Key Pair - Done
2,938,280 UART: [art] Signing Cert with AUTHO
2,938,760 UART: RITY.KEYID = 7
2,954,258 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,023 UART: [art] PUB.X = 5686D0E26E51BEDBC56707CD9F4876681778F093DEE8674187F4F1EF459DAFF59EE7AFBD311770B29CD82302DBD89179
2,961,795 UART: [art] PUB.Y = 0141A9B13A9C4B1501153331C0817F5AD007115E372E6FB848EA6B3FB45BEA25AC404F48DE40CE4ECB6A99B4BCC22D4B
2,968,750 UART: [art] SIG.R = A5672C618940E353CE9291D526FAADD1DEFE64AB32B836A0D80C0D275EF58E37D691050AF503F1A9B91BED71476FDAEA
2,975,521 UART: [art] SIG.S = 3D6AEDE103E545D50A030A5455D620E4D748F215DBCFFB85A3A45F3C5CB58634AD34738826C1244ED1C6389C7D965A7D
2,999,334 UART: Caliptra RT
2,999,679 UART: [state] CFI Enabled
3,108,190 UART: [rt] RT listening for mailbox commands...
3,108,860 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,766 UART: [rt]cmd =0x44504543, len=28
3,181,625 >>> mbox cmd response data (2076 bytes)
3,181,626 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,211,259 UART: [rt]cmd =0x44504543, len=28
3,251,840 >>> mbox cmd response data (2076 bytes)
3,251,841 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,565 UART: [rt]cmd =0x49444550, len=353
3,296,753 >>> mbox cmd response data (8 bytes)
3,296,754 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,209 UART: [rt]cmd =0x44504543, len=28
3,369,450 >>> mbox cmd response data (2076 bytes)
3,369,451 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,110 UART: [rt]cmd =0x44504543, len=28
3,440,436 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,334 UART: [kat] SHA2-512-ACC
906,235 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,492 UART: [kat] LMS
1,168,804 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,319 UART: [fht] FHT @ 0x50003400
1,172,877 UART: [idev] ++
1,173,045 UART: [idev] CDI.KEYID = 6
1,173,406 UART: [idev] SUBJECT.KEYID = 7
1,173,831 UART: [idev] UDS.KEYID = 0
1,174,177 ready_for_fw is high
1,174,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,559 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,433 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,048 UART: [ldev] Erasing FE.KEYID = 1
1,241,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,978 UART: [ldev] --
1,280,482 UART: [fwproc] Wait for Commands...
1,281,197 UART: [fwproc] Recv command 0x46574c44
1,281,930 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,803 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,156 >>> mbox cmd response: success
2,774,269 UART: [afmc] ++
2,774,437 UART: [afmc] CDI.KEYID = 6
2,774,800 UART: [afmc] SUBJECT.KEYID = 7
2,775,226 UART: [afmc] AUTHORITY.KEYID = 5
2,810,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,551 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,434 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,153 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,816 UART: [afmc] --
2,853,712 UART: [cold-reset] --
2,854,472 UART: [state] Locking Datavault
2,855,385 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,989 UART: [state] Locking ICCM
2,856,483 UART: [exit] Launching FMC @ 0x40000130
2,861,812 UART:
2,861,828 UART: Running Caliptra FMC ...
2,862,236 UART:
2,862,290 UART: [state] CFI Enabled
2,872,519 UART: [fht] FMC Alias Private Key: 7
2,980,242 UART: [art] Extend RT PCRs Done
2,980,670 UART: [art] Lock RT PCRs Done
2,982,362 UART: [art] Populate DV Done
2,990,829 UART: [fht] FMC Alias Private Key: 7
2,992,003 UART: [art] Derive CDI
2,992,283 UART: [art] Store in in slot 0x4
3,077,714 UART: [art] Derive Key Pair
3,078,074 UART: [art] Store priv key in slot 0x5
3,090,794 UART: [art] Derive Key Pair - Done
3,105,571 UART: [art] Signing Cert with AUTHO
3,106,051 UART: RITY.KEYID = 7
3,121,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,936 UART: [art] PUB.X = 795A13AA7BAC4F767AADEAC7FF98C7498A04B2FC07B79C463574978F8E9C54544FDB942E710CE1F0D0F705684D5693FD
3,128,706 UART: [art] PUB.Y = B79F5E9368FC0485283DF51291A428AC15863CF270EFE20016CF87D692D7BD8908F922BBA0614FF97E940BEA6E79128D
3,135,629 UART: [art] SIG.R = 28818B9AF41BE8B5F2759F01EF5CF30F5588D6138DB3E2A2A9D64740E25C14A846ACA76711D86E1FE15A3266B17D4668
3,142,397 UART: [art] SIG.S = DAA21D88B4555C551A1B943E046C2BC760E757EBB75859A5EB0D6F3BADC33A3FF9F1CB65DB1A3D1DDCD225C74851B4F1
3,166,450 UART: Caliptra RT
3,166,703 UART: [state] CFI Enabled
3,274,056 UART: [rt] RT listening for mailbox commands...
3,274,726 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,792 UART: [rt]cmd =0x44504543, len=28
3,347,687 >>> mbox cmd response data (2076 bytes)
3,347,688 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,083 UART: [rt]cmd =0x44504543, len=28
3,418,062 >>> mbox cmd response data (2076 bytes)
3,418,063 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,827 UART: [rt]cmd =0x49444550, len=353
3,462,863 >>> mbox cmd response data (8 bytes)
3,462,864 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,293 UART: [rt]cmd =0x44504543, len=28
3,535,546 >>> mbox cmd response data (2076 bytes)
3,535,547 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,014 UART: [rt]cmd =0x44504543, len=28
3,606,730 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,162 ready_for_fw is high
1,055,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,944 >>> mbox cmd response: success
2,685,676 UART:
2,685,692 UART: Running Caliptra FMC ...
2,686,100 UART:
2,686,154 UART: [state] CFI Enabled
2,696,657 UART: [fht] FMC Alias Private Key: 7
2,804,278 UART: [art] Extend RT PCRs Done
2,804,706 UART: [art] Lock RT PCRs Done
2,806,242 UART: [art] Populate DV Done
2,814,447 UART: [fht] FMC Alias Private Key: 7
2,815,557 UART: [art] Derive CDI
2,815,837 UART: [art] Store in in slot 0x4
2,901,484 UART: [art] Derive Key Pair
2,901,844 UART: [art] Store priv key in slot 0x5
2,915,350 UART: [art] Derive Key Pair - Done
2,930,096 UART: [art] Signing Cert with AUTHO
2,930,576 UART: RITY.KEYID = 7
2,945,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,567 UART: [art] PUB.X = CE3D73197E24687FF7EC13B69F90BFA70341C9AEA499C00FE7282826152F58317D2E2ADF49EA2257AA2F983541B59A43
2,953,335 UART: [art] PUB.Y = D5582BA0CD83BF696C0DEC8F8DD6DD3AD9C2040A5EE9157BCF707E48DF83ACE8F6E0CE86EAF381CDF5112ED87CE2A04E
2,960,308 UART: [art] SIG.R = 8D8E9CF598B0AF716697ED3BDADF492CC1A160B6FBE2366CFF2B72B06BFA0591874AB6B68CA2086410338D7D9E02785F
2,967,083 UART: [art] SIG.S = D4666099B18157E4AF61CF90CEAFE0393B2916A8E436ED4629B2B3BE28C04C25E605E6E2ACF31A09D716D6F8EF8313DF
2,990,596 UART: Caliptra RT
2,990,849 UART: [state] CFI Enabled
3,098,305 UART: [rt] RT listening for mailbox commands...
3,098,975 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,959 UART: [rt]cmd =0x44504543, len=28
3,172,400 >>> mbox cmd response data (2076 bytes)
3,172,401 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,201,824 UART: [rt]cmd =0x44504543, len=28
3,242,896 >>> mbox cmd response data (2076 bytes)
3,242,897 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,530 UART: [rt]cmd =0x49444550, len=354
3,287,832 >>> mbox cmd response data (8 bytes)
3,287,833 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,500 UART: [rt]cmd =0x44504543, len=28
3,360,551 >>> mbox cmd response data (2076 bytes)
3,360,552 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,390,043 UART: [rt]cmd =0x44504543, len=28
3,431,307 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
921,063 UART: [kat] LMS
1,169,375 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,174,594 ready_for_fw is high
1,174,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,070 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,673 UART: [ldev] Erasing FE.KEYID = 1
1,242,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,899 UART: [ldev] --
1,281,167 UART: [fwproc] Wait for Commands...
1,281,768 UART: [fwproc] Recv command 0x46574c44
1,282,501 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,764 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,151 >>> mbox cmd response: success
2,776,240 UART: [afmc] ++
2,776,408 UART: [afmc] CDI.KEYID = 6
2,776,771 UART: [afmc] SUBJECT.KEYID = 7
2,777,197 UART: [afmc] AUTHORITY.KEYID = 5
2,812,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,077 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,689 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,408 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,117 UART: [afmc] --
2,856,025 UART: [cold-reset] --
2,856,749 UART: [state] Locking Datavault
2,857,816 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,420 UART: [state] Locking ICCM
2,858,938 UART: [exit] Launching FMC @ 0x40000130
2,864,267 UART:
2,864,283 UART: Running Caliptra FMC ...
2,864,691 UART:
2,864,834 UART: [state] CFI Enabled
2,875,299 UART: [fht] FMC Alias Private Key: 7
2,983,560 UART: [art] Extend RT PCRs Done
2,983,988 UART: [art] Lock RT PCRs Done
2,985,322 UART: [art] Populate DV Done
2,993,761 UART: [fht] FMC Alias Private Key: 7
2,994,787 UART: [art] Derive CDI
2,995,067 UART: [art] Store in in slot 0x4
3,080,800 UART: [art] Derive Key Pair
3,081,160 UART: [art] Store priv key in slot 0x5
3,094,260 UART: [art] Derive Key Pair - Done
3,108,742 UART: [art] Signing Cert with AUTHO
3,109,222 UART: RITY.KEYID = 7
3,124,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,311 UART: [art] PUB.X = CCE02929B30AC0C1E41D16A9E78101B54AF0DDB4FD402972ED60F7F1BCD57F1CD4D4C9BEF46903411D002FBB01B32773
3,132,063 UART: [art] PUB.Y = 8FE54CA7EB0574B3F49C2733D3B3B23A42A3E98532319EB30182E39C7E595736C03707C45258628DB387BC425CEEC1BB
3,139,006 UART: [art] SIG.R = 3FFCC06D0B3581B022276AC3E10C885277FA2AC1716F8C3382012926D51FE82D48503B6B435C38F0097C56ADF1E95BDC
3,145,768 UART: [art] SIG.S = DEDF2D594E2B132C04C451169AF26A922CD8C6C6B808ADDBE5EDE13190834618ADDBFDC28A9640D5783948D47F04456C
3,169,330 UART: Caliptra RT
3,169,675 UART: [state] CFI Enabled
3,277,620 UART: [rt] RT listening for mailbox commands...
3,278,290 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,292 UART: [rt]cmd =0x44504543, len=28
3,351,445 >>> mbox cmd response data (2076 bytes)
3,351,446 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,381,143 UART: [rt]cmd =0x44504543, len=28
3,422,368 >>> mbox cmd response data (2076 bytes)
3,422,369 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,454,023 UART: [rt]cmd =0x49444550, len=353
3,467,187 >>> mbox cmd response data (8 bytes)
3,467,188 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,717 UART: [rt]cmd =0x44504543, len=28
3,539,972 >>> mbox cmd response data (2076 bytes)
3,539,973 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,718 UART: [rt]cmd =0x44504543, len=28
3,611,236 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,967 ready_for_fw is high
1,055,967 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,253 >>> mbox cmd response: success
2,687,359 UART:
2,687,375 UART: Running Caliptra FMC ...
2,687,783 UART:
2,687,926 UART: [state] CFI Enabled
2,698,513 UART: [fht] FMC Alias Private Key: 7
2,806,482 UART: [art] Extend RT PCRs Done
2,806,910 UART: [art] Lock RT PCRs Done
2,808,484 UART: [art] Populate DV Done
2,816,869 UART: [fht] FMC Alias Private Key: 7
2,817,843 UART: [art] Derive CDI
2,818,123 UART: [art] Store in in slot 0x4
2,903,732 UART: [art] Derive Key Pair
2,904,092 UART: [art] Store priv key in slot 0x5
2,916,688 UART: [art] Derive Key Pair - Done
2,931,360 UART: [art] Signing Cert with AUTHO
2,931,840 UART: RITY.KEYID = 7
2,946,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,541 UART: [art] PUB.X = 4387D21A0E0248C0FE8EAC39FB966853C8CEF0343F9956BCA0A97DE1004B07D2CEC26ADC00CE13063395FD4CD7E1A4B7
2,954,271 UART: [art] PUB.Y = 7E947E00ED4FB4E594A06548E074FC063D61BEE33396A44C624458D1AF07173BF3239B8C967168DBFD3B32686662970F
2,961,188 UART: [art] SIG.R = 73D948E8D1685EB05F1C6305AB36CCA90919873BC6D5C05855F89445CF7CC423279FD5AD1A4D1EABC147AE090FD543E7
2,967,956 UART: [art] SIG.S = D45D828224BA6928A715B3E7E38494F9972DA2310D02EF8559713FC09B9779B4113B1BCE8C3A933B89B8832780F43252
2,992,105 UART: Caliptra RT
2,992,450 UART: [state] CFI Enabled
3,101,269 UART: [rt] RT listening for mailbox commands...
3,101,939 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,951 UART: [rt]cmd =0x44504543, len=28
3,175,116 >>> mbox cmd response data (2076 bytes)
3,175,117 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,204,556 UART: [rt]cmd =0x44504543, len=28
3,245,809 >>> mbox cmd response data (2076 bytes)
3,245,810 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,315 UART: [rt]cmd =0x49444550, len=354
3,290,406 >>> mbox cmd response data (8 bytes)
3,290,407 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,928 UART: [rt]cmd =0x44504543, len=28
3,363,139 >>> mbox cmd response data (2076 bytes)
3,363,140 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,611 UART: [rt]cmd =0x44504543, len=28
3,434,348 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,071 UART:
192,454 UART: Running Caliptra ROM ...
193,552 UART:
193,695 UART: [state] CFI Enabled
264,595 UART: [state] LifecycleState = Unprovisioned
266,568 UART: [state] DebugLocked = No
268,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,379 UART: [kat] SHA2-256
442,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,555 UART: [kat] ++
453,038 UART: [kat] sha1
464,411 UART: [kat] SHA2-256
467,139 UART: [kat] SHA2-384
472,416 UART: [kat] SHA2-512-ACC
474,812 UART: [kat] ECC-384
2,768,585 UART: [kat] HMAC-384Kdf
2,780,322 UART: [kat] LMS
3,970,638 UART: [kat] --
3,975,859 UART: [cold-reset] ++
3,978,229 UART: [fht] Storing FHT @ 0x50003400
3,989,141 UART: [idev] ++
3,989,702 UART: [idev] CDI.KEYID = 6
3,990,590 UART: [idev] SUBJECT.KEYID = 7
3,991,831 UART: [idev] UDS.KEYID = 0
3,992,857 ready_for_fw is high
3,993,071 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,685 UART: [idev] Erasing UDS.KEYID = 0
7,324,894 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,389 UART: [idev] --
7,348,869 UART: [ldev] ++
7,349,457 UART: [ldev] CDI.KEYID = 6
7,350,370 UART: [ldev] SUBJECT.KEYID = 5
7,351,583 UART: [ldev] AUTHORITY.KEYID = 7
7,352,866 UART: [ldev] FE.KEYID = 1
7,381,604 UART: [ldev] Erasing FE.KEYID = 1
10,711,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,023,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,038,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,052,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,071,269 UART: [ldev] --
13,076,314 UART: [fwproc] Waiting for Commands...
13,079,494 UART: [fwproc] Received command 0x46574c44
13,081,677 UART: [fwproc] Received Image of size 114124 bytes
17,137,971 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,212,296 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,281,164 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,597,696 >>> mbox cmd response: success
17,601,526 UART: [afmc] ++
17,602,121 UART: [afmc] CDI.KEYID = 6
17,603,009 UART: [afmc] SUBJECT.KEYID = 7
17,604,281 UART: [afmc] AUTHORITY.KEYID = 5
20,967,013 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,265,721 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,267,975 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,282,392 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,297,228 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,311,677 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,333,680 UART: [afmc] --
23,338,340 UART: [cold-reset] --
23,342,262 UART: [state] Locking Datavault
23,348,756 UART: [state] Locking PCR0, PCR1 and PCR31
23,350,527 UART: [state] Locking ICCM
23,352,653 UART: [exit] Launching FMC @ 0x40000130
23,361,054 UART:
23,361,291 UART: Running Caliptra FMC ...
23,362,390 UART:
23,362,548 UART: [state] CFI Enabled
23,424,481 UART: [fht] FMC Alias Private Key: 7
25,762,180 UART: [art] Extend RT PCRs Done
25,763,405 UART: [art] Lock RT PCRs Done
25,765,063 UART: [art] Populate DV Done
25,770,363 UART: [fht] FMC Alias Private Key: 7
25,771,844 UART: [art] Derive CDI
25,772,578 UART: [art] Store in in slot 0x4
25,833,020 UART: [art] Derive Key Pair
25,834,057 UART: [art] Store priv key in slot 0x5
29,127,206 UART: [art] Derive Key Pair - Done
29,140,235 UART: [art] Signing Cert with AUTHO
29,141,537 UART: RITY.KEYID = 7
31,429,336 UART: [art] Erasing AUTHORITY.KEYID = 7
31,430,847 UART: [art] PUB.X = E3ADC2BE7005A1BF5F22164625B80C8828CFC4B6049C251B83240B9FADD2CC2AED4301BD0AF6C41C0D5BCBAB115148F6
31,438,094 UART: [art] PUB.Y = EE2E1BF44B81F949958F34EA840E1DD65343316DC76564D8689B7682F930A581A13E57A0399F6F4C3C4D000A5DEFD07B
31,445,329 UART: [art] SIG.R = 36649EC9D3E1F6C549FF007C75C0F370D9B9F4744D3334EAEA5B0DB6CFA0EF0045A0A09F923D24C8DC45D90852051EBA
31,452,724 UART: [art] SIG.S = A4690ACD1B7F38235DA3EEF3736C7A4777EFF5DC9BB90B22467322658CD4EC6A3637640FF4D3A98989BC487606327763
32,757,912 UART: Caliptra RT
32,758,620 UART: [state] CFI Enabled
32,919,722 UART: [rt] RT listening for mailbox commands...
32,922,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,952,927 UART: [rt]cmd =0x44504543, len=96
38,736,413 >>> mbox cmd response data (6236 bytes)
38,765,537 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,795,726 UART: [rt]cmd =0x52564348, len=36
38,798,253 >>> mbox cmd response data (8 bytes)
38,798,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,829,153 UART: [rt]cmd =0x44504543, len=96
44,600,785 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,805,484 ready_for_fw is high
3,805,910 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,854,354 >>> mbox cmd response: success
23,544,499 UART:
23,544,884 UART: Running Caliptra FMC ...
23,545,994 UART:
23,546,149 UART: [state] CFI Enabled
23,612,438 UART: [fht] FMC Alias Private Key: 7
25,950,314 UART: [art] Extend RT PCRs Done
25,951,529 UART: [art] Lock RT PCRs Done
25,953,351 UART: [art] Populate DV Done
25,958,657 UART: [fht] FMC Alias Private Key: 7
25,960,251 UART: [art] Derive CDI
25,960,991 UART: [art] Store in in slot 0x4
26,020,740 UART: [art] Derive Key Pair
26,021,785 UART: [art] Store priv key in slot 0x5
29,314,742 UART: [art] Derive Key Pair - Done
29,327,632 UART: [art] Signing Cert with AUTHO
29,328,929 UART: RITY.KEYID = 7
31,615,558 UART: [art] Erasing AUTHORITY.KEYID = 7
31,617,056 UART: [art] PUB.X = 9748728DF92146396D385B52B407C7B7BE1B2854681AE2B6A224A66C2215C968B7C7FBE81B88FFA54BFF6C7CA63060F6
31,624,279 UART: [art] PUB.Y = 44C38F851D6E64FD388B5B2DE3DB301D50ED182C06B77A3F80F292A1756DE29877E5718CC3279CB50F503AE1A0A87EBF
31,631,535 UART: [art] SIG.R = DB2D93A79AB12B22300B1C745EAEAF4347A02072D44B14C413E001D27636E03D303500C09E25C09DDB19E372D6BDE14E
31,638,899 UART: [art] SIG.S = F4DCA507D6C1599847161586F3E8DC32E30A26B283786697C332CA2E0EAD1CA5A9FC479107C54AE7E3FFFECBB3FE7134
32,944,262 UART: Caliptra RT
32,944,982 UART: [state] CFI Enabled
33,105,827 UART: [rt] RT listening for mailbox commands...
33,108,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,139,125 UART: [rt]cmd =0x44504543, len=96
38,924,797 >>> mbox cmd response data (6236 bytes)
38,953,870 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,984,066 UART: [rt]cmd =0x52564348, len=36
38,986,605 >>> mbox cmd response data (8 bytes)
38,986,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,017,533 UART: [rt]cmd =0x44504543, len=96
44,770,036 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,407 UART:
192,768 UART: Running Caliptra ROM ...
193,899 UART:
603,800 UART: [state] CFI Enabled
617,982 UART: [state] LifecycleState = Unprovisioned
619,861 UART: [state] DebugLocked = No
622,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,530 UART: [kat] SHA2-256
797,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,836 UART: [kat] ++
808,277 UART: [kat] sha1
818,927 UART: [kat] SHA2-256
821,644 UART: [kat] SHA2-384
826,777 UART: [kat] SHA2-512-ACC
829,145 UART: [kat] ECC-384
3,113,316 UART: [kat] HMAC-384Kdf
3,124,344 UART: [kat] LMS
4,314,480 UART: [kat] --
4,320,112 UART: [cold-reset] ++
4,321,753 UART: [fht] Storing FHT @ 0x50003400
4,332,797 UART: [idev] ++
4,333,439 UART: [idev] CDI.KEYID = 6
4,334,344 UART: [idev] SUBJECT.KEYID = 7
4,335,582 UART: [idev] UDS.KEYID = 0
4,336,614 ready_for_fw is high
4,336,812 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,105 UART: [idev] Erasing UDS.KEYID = 0
7,627,039 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,439 UART: [idev] --
7,650,869 UART: [ldev] ++
7,651,496 UART: [ldev] CDI.KEYID = 6
7,652,396 UART: [ldev] SUBJECT.KEYID = 5
7,653,655 UART: [ldev] AUTHORITY.KEYID = 7
7,654,879 UART: [ldev] FE.KEYID = 1
7,665,980 UART: [ldev] Erasing FE.KEYID = 1
10,955,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,222 UART: [ldev] --
13,315,638 UART: [fwproc] Waiting for Commands...
13,318,746 UART: [fwproc] Received command 0x46574c44
13,320,970 UART: [fwproc] Received Image of size 114124 bytes
17,376,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,753 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,844,804 >>> mbox cmd response: success
17,848,310 UART: [afmc] ++
17,848,895 UART: [afmc] CDI.KEYID = 6
17,849,828 UART: [afmc] SUBJECT.KEYID = 7
17,851,089 UART: [afmc] AUTHORITY.KEYID = 5
21,165,429 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,431 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,838 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,692 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,115 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,510 UART: [afmc] --
23,530,940 UART: [cold-reset] --
23,534,308 UART: [state] Locking Datavault
23,539,062 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,820 UART: [state] Locking ICCM
23,542,635 UART: [exit] Launching FMC @ 0x40000130
23,551,026 UART:
23,551,257 UART: Running Caliptra FMC ...
23,552,279 UART:
23,552,419 UART: [state] CFI Enabled
23,560,655 UART: [fht] FMC Alias Private Key: 7
25,892,018 UART: [art] Extend RT PCRs Done
25,893,239 UART: [art] Lock RT PCRs Done
25,895,023 UART: [art] Populate DV Done
25,900,485 UART: [fht] FMC Alias Private Key: 7
25,902,232 UART: [art] Derive CDI
25,903,043 UART: [art] Store in in slot 0x4
25,945,715 UART: [art] Derive Key Pair
25,946,705 UART: [art] Store priv key in slot 0x5
29,188,823 UART: [art] Derive Key Pair - Done
29,202,039 UART: [art] Signing Cert with AUTHO
29,203,368 UART: RITY.KEYID = 7
31,482,377 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,880 UART: [art] PUB.X = 69026942CB0BBF342D39DB101D3D742D7AB5D3AAB4DDAE0E9466045D2729B70268916CB3AE169D852D54C438CEEA62B2
31,491,112 UART: [art] PUB.Y = 72107D0E52469080DD46580173CDD89E796C90D077A2E0CABE3769A61C29835CF801CBC2277C31B13B470F1317ADBF1A
31,498,376 UART: [art] SIG.R = 78A442B5142F4C1B7BCB92CB4788B712B97C0FABE69BF02F37BEDE42C0C9A66FF0EE08B9B7407951E6A84E578095149A
31,505,748 UART: [art] SIG.S = 5D686E61BD3B952CECCE2988A4D978387EB9E27C1CB21E1F8F43534890F6C4760E2230F4ADE42F4816501617EDCECEF6
32,811,080 UART: Caliptra RT
32,811,795 UART: [state] CFI Enabled
32,929,844 UART: [rt] RT listening for mailbox commands...
32,932,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,962,668 UART: [rt]cmd =0x44504543, len=96
38,636,398 >>> mbox cmd response data (6236 bytes)
38,665,489 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,695,731 UART: [rt]cmd =0x52564348, len=36
38,698,581 >>> mbox cmd response data (8 bytes)
38,698,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,729,731 UART: [rt]cmd =0x44504543, len=96
44,403,585 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
4,127,149 ready_for_fw is high
4,127,609 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,935 >>> mbox cmd response: success
23,716,971 UART:
23,717,351 UART: Running Caliptra FMC ...
23,718,447 UART:
23,718,590 UART: [state] CFI Enabled
23,726,544 UART: [fht] FMC Alias Private Key: 7
26,057,974 UART: [art] Extend RT PCRs Done
26,059,204 UART: [art] Lock RT PCRs Done
26,061,018 UART: [art] Populate DV Done
26,066,720 UART: [fht] FMC Alias Private Key: 7
26,068,232 UART: [art] Derive CDI
26,068,968 UART: [art] Store in in slot 0x4
26,111,466 UART: [art] Derive Key Pair
26,112,509 UART: [art] Store priv key in slot 0x5
29,354,678 UART: [art] Derive Key Pair - Done
29,367,259 UART: [art] Signing Cert with AUTHO
29,368,556 UART: RITY.KEYID = 7
31,647,685 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,198 UART: [art] PUB.X = B1BDCD82F09CC4CAE6A476B8C9147832A58F5146951A931BD14CECFEFB3F231AEDE941B273117B177B9CAA048F5DB816
31,656,488 UART: [art] PUB.Y = A824B6842EB127C280FE4DC0928F6DCD61F86D24F4335D6D332DF8E74C8CE1143EEBB81F6D11310481044412887793FF
31,663,717 UART: [art] SIG.R = 7D7D5B30FB1CD9F23A101025CF29E7665068179E23D7DC72B6F00A37F41F5A54E7D97D122A993553F5B1F10314E54511
31,671,043 UART: [art] SIG.S = 93B13B0FFFC3EB8746530319C93A547A90A00ED6E1E068F982CFBA5ABC3DB79764009D8AE65D3D826E432E26755622A1
32,976,250 UART: Caliptra RT
32,976,962 UART: [state] CFI Enabled
33,095,109 UART: [rt] RT listening for mailbox commands...
33,097,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,128,169 UART: [rt]cmd =0x44504543, len=96
38,801,521 >>> mbox cmd response data (6236 bytes)
38,830,730 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,860,684 UART: [rt]cmd =0x52564348, len=36
38,863,336 >>> mbox cmd response data (8 bytes)
38,863,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,894,222 UART: [rt]cmd =0x44504543, len=96
44,568,118 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,220 UART:
192,575 UART: Running Caliptra ROM ...
193,766 UART:
193,921 UART: [state] CFI Enabled
266,429 UART: [state] LifecycleState = Unprovisioned
268,347 UART: [state] DebugLocked = No
270,803 UART: [state] WD Timer not started. Device not locked for debugging
273,700 UART: [kat] SHA2-256
452,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,386 UART: [kat] ++
464,838 UART: [kat] sha1
475,780 UART: [kat] SHA2-256
478,813 UART: [kat] SHA2-384
484,522 UART: [kat] SHA2-512-ACC
487,459 UART: [kat] ECC-384
2,949,152 UART: [kat] HMAC-384Kdf
2,971,044 UART: [kat] LMS
3,500,498 UART: [kat] --
3,505,191 UART: [cold-reset] ++
3,506,834 UART: [fht] FHT @ 0x50003400
3,518,309 UART: [idev] ++
3,518,880 UART: [idev] CDI.KEYID = 6
3,519,809 UART: [idev] SUBJECT.KEYID = 7
3,520,982 UART: [idev] UDS.KEYID = 0
3,521,909 ready_for_fw is high
3,522,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,135 UART: [idev] Erasing UDS.KEYID = 0
6,028,742 UART: [idev] Sha1 KeyId Algorithm
6,051,235 UART: [idev] --
6,055,344 UART: [ldev] ++
6,055,920 UART: [ldev] CDI.KEYID = 6
6,056,838 UART: [ldev] SUBJECT.KEYID = 5
6,058,002 UART: [ldev] AUTHORITY.KEYID = 7
6,059,242 UART: [ldev] FE.KEYID = 1
6,099,234 UART: [ldev] Erasing FE.KEYID = 1
8,603,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,871 UART: [ldev] --
10,415,485 UART: [fwproc] Wait for Commands...
10,418,070 UART: [fwproc] Recv command 0x46574c44
10,420,162 UART: [fwproc] Recv'd Img size: 114448 bytes
13,824,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,370 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,941 >>> mbox cmd response: success
14,288,821 UART: [afmc] ++
14,289,415 UART: [afmc] CDI.KEYID = 6
14,290,308 UART: [afmc] SUBJECT.KEYID = 7
14,291,408 UART: [afmc] AUTHORITY.KEYID = 5
16,827,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,535 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,266 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,310 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,189 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,995 UART: [afmc] --
18,626,109 UART: [cold-reset] --
18,628,587 UART: [state] Locking Datavault
18,633,409 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,050 UART: [state] Locking ICCM
18,637,499 UART: [exit] Launching FMC @ 0x40000130
18,645,943 UART:
18,646,174 UART: Running Caliptra FMC ...
18,647,200 UART:
18,647,346 UART: [state] CFI Enabled
18,709,710 UART: [fht] FMC Alias Private Key: 7
20,473,842 UART: [art] Extend RT PCRs Done
20,475,061 UART: [art] Lock RT PCRs Done
20,476,927 UART: [art] Populate DV Done
20,482,331 UART: [fht] FMC Alias Private Key: 7
20,483,876 UART: [art] Derive CDI
20,484,643 UART: [art] Store in in slot 0x4
20,542,206 UART: [art] Derive Key Pair
20,543,262 UART: [art] Store priv key in slot 0x5
23,006,154 UART: [art] Derive Key Pair - Done
23,019,155 UART: [art] Signing Cert with AUTHO
23,020,461 UART: RITY.KEYID = 7
24,731,486 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,991 UART: [art] PUB.X = DD6EA4DC16F5C82D7B591B084F14F6451896A60BDF6F3EB95449FA12CE4B277BCBFEFDB002B2ADB6ACB1CF3DF024F282
24,740,253 UART: [art] PUB.Y = F0A62772E9E9F68969C94760C4CE4DD2F939FBFD3563EAA52CB584FD827612BDDDEC88D0CAF4423A8466A156352A4BB7
24,747,543 UART: [art] SIG.R = 18A60DB05C5898F2E7D11450161096D3880A5A9410430F5340515C3F7EDCCCFDBD5234E4CC58D4CEE491F38C398BED04
24,754,938 UART: [art] SIG.S = ACE7793F0FFA3603DAC09DD56D466A3471DE7D3726E48BDC8614D79B9FEE08C52F7F907F5020EAE2189D2EE2FFCDBC27
25,734,224 UART: Caliptra RT
25,734,920 UART: [state] CFI Enabled
25,900,373 UART: [rt] RT listening for mailbox commands...
25,902,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,933,964 UART: [rt]cmd =0x44504543, len=96
30,312,979 >>> mbox cmd response data (6236 bytes)
30,342,077 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,372,069 UART: [rt]cmd =0x52564348, len=36
30,374,613 >>> mbox cmd response data (8 bytes)
30,375,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,405,589 UART: [rt]cmd =0x44504543, len=96
34,770,006 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,361,905 ready_for_fw is high
3,362,281 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,056,323 >>> mbox cmd response: success
18,346,102 UART:
18,346,512 UART: Running Caliptra FMC ...
18,347,622 UART:
18,347,782 UART: [state] CFI Enabled
18,414,268 UART: [fht] FMC Alias Private Key: 7
20,178,380 UART: [art] Extend RT PCRs Done
20,179,621 UART: [art] Lock RT PCRs Done
20,180,981 UART: [art] Populate DV Done
20,186,504 UART: [fht] FMC Alias Private Key: 7
20,188,049 UART: [art] Derive CDI
20,188,822 UART: [art] Store in in slot 0x4
20,246,971 UART: [art] Derive Key Pair
20,248,036 UART: [art] Store priv key in slot 0x5
22,711,346 UART: [art] Derive Key Pair - Done
22,724,072 UART: [art] Signing Cert with AUTHO
22,725,383 UART: RITY.KEYID = 7
24,436,938 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,445 UART: [art] PUB.X = 28C9D8265A7A0BDA77B07EC4CECD73A4F6DC92EBFD934603B34B6173DCBCCA52FA2A0A3FEEEB9C2CE539C46B2F611C52
24,445,778 UART: [art] PUB.Y = 372165C91086FB741036340853E937F049916A9D083E616BA976CE3DB181A05A55C85CA58FE0A46C1C9EA64D6AEE0994
24,452,988 UART: [art] SIG.R = C1BB24CEDDD8E2A8C08EF7B09B4E432B358DE6A756F019E38448C3574AA3203491179F382D7290FE22DE9D854148BC87
24,460,380 UART: [art] SIG.S = 8A8D2369006BBAAA4DF36AEB4EF147BC19F5AEF26E81307F713BC6B527277D7CD4A3DC783D7942EC4F9EC0DD004E1A23
25,439,567 UART: Caliptra RT
25,440,299 UART: [state] CFI Enabled
25,606,831 UART: [rt] RT listening for mailbox commands...
25,609,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,640,512 UART: [rt]cmd =0x44504543, len=96
30,017,940 >>> mbox cmd response data (6236 bytes)
30,047,426 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,077,562 UART: [rt]cmd =0x52564348, len=36
30,080,435 >>> mbox cmd response data (8 bytes)
30,080,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,111,242 UART: [rt]cmd =0x44504543, len=96
34,476,717 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,329 UART:
192,707 UART: Running Caliptra ROM ...
193,870 UART:
603,589 UART: [state] CFI Enabled
617,432 UART: [state] LifecycleState = Unprovisioned
619,337 UART: [state] DebugLocked = No
620,571 UART: [state] WD Timer not started. Device not locked for debugging
623,830 UART: [kat] SHA2-256
802,936 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,517 UART: [kat] ++
814,958 UART: [kat] sha1
825,680 UART: [kat] SHA2-256
828,746 UART: [kat] SHA2-384
836,003 UART: [kat] SHA2-512-ACC
838,961 UART: [kat] ECC-384
3,281,067 UART: [kat] HMAC-384Kdf
3,293,588 UART: [kat] LMS
3,823,105 UART: [kat] --
3,827,596 UART: [cold-reset] ++
3,828,526 UART: [fht] FHT @ 0x50003400
3,838,709 UART: [idev] ++
3,839,265 UART: [idev] CDI.KEYID = 6
3,840,207 UART: [idev] SUBJECT.KEYID = 7
3,841,366 UART: [idev] UDS.KEYID = 0
3,842,356 ready_for_fw is high
3,842,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,273 UART: [idev] Erasing UDS.KEYID = 0
6,317,013 UART: [idev] Sha1 KeyId Algorithm
6,339,475 UART: [idev] --
6,342,917 UART: [ldev] ++
6,343,499 UART: [ldev] CDI.KEYID = 6
6,344,376 UART: [ldev] SUBJECT.KEYID = 5
6,345,523 UART: [ldev] AUTHORITY.KEYID = 7
6,346,855 UART: [ldev] FE.KEYID = 1
6,357,736 UART: [ldev] Erasing FE.KEYID = 1
8,830,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,751 UART: [ldev] --
10,623,263 UART: [fwproc] Wait for Commands...
10,625,893 UART: [fwproc] Recv command 0x46574c44
10,627,972 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,496,015 >>> mbox cmd response: success
14,499,486 UART: [afmc] ++
14,500,072 UART: [afmc] CDI.KEYID = 6
14,500,953 UART: [afmc] SUBJECT.KEYID = 7
14,502,052 UART: [afmc] AUTHORITY.KEYID = 5
17,001,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,088 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,845 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,867 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,711 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,355 UART: [afmc] --
18,796,115 UART: [cold-reset] --
18,799,269 UART: [state] Locking Datavault
18,804,993 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,716 UART: [state] Locking ICCM
18,808,539 UART: [exit] Launching FMC @ 0x40000130
18,816,932 UART:
18,817,164 UART: Running Caliptra FMC ...
18,818,255 UART:
18,818,406 UART: [state] CFI Enabled
18,826,659 UART: [fht] FMC Alias Private Key: 7
20,583,888 UART: [art] Extend RT PCRs Done
20,585,106 UART: [art] Lock RT PCRs Done
20,586,755 UART: [art] Populate DV Done
20,592,326 UART: [fht] FMC Alias Private Key: 7
20,594,018 UART: [art] Derive CDI
20,594,748 UART: [art] Store in in slot 0x4
20,637,604 UART: [art] Derive Key Pair
20,638,637 UART: [art] Store priv key in slot 0x5
23,065,588 UART: [art] Derive Key Pair - Done
23,078,763 UART: [art] Signing Cert with AUTHO
23,080,055 UART: RITY.KEYID = 7
24,785,534 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,030 UART: [art] PUB.X = 2ED2CD2241B021BA4A0AEB0F08D5EC637238EBFBD11C2C67E660E0A11F19CBFCBDD922CEAD4A82756F284DF43C6FF068
24,794,361 UART: [art] PUB.Y = 7BF7C0CDE91770A83179A49F67B634AF48DE84BDA3C83FDC0A395A1FF991E4C1C63522E3A4E0657DEA64461D44D289A0
24,801,622 UART: [art] SIG.R = 729903744487DCE741B81D6D0CAB4657F1A9383789ECEEA022D6BAA2775E3ED3E12F7A14D0FF7848CB9911A3E502B9EE
24,809,043 UART: [art] SIG.S = DA7CA003DC9A8E754E4D23A9DB6FEE22771842D4244EE71ACF55D4CBBF722319182EE1AA2CA7EB22E9736F9C07A4ED8B
25,788,325 UART: Caliptra RT
25,789,021 UART: [state] CFI Enabled
25,905,718 UART: [rt] RT listening for mailbox commands...
25,908,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,938,639 UART: [rt]cmd =0x44504543, len=96
30,222,520 >>> mbox cmd response data (6236 bytes)
30,251,572 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,281,575 UART: [rt]cmd =0x52564348, len=36
30,284,390 >>> mbox cmd response data (8 bytes)
30,284,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,315,454 UART: [rt]cmd =0x44504543, len=96
34,598,568 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,695,530 ready_for_fw is high
3,695,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,429 >>> mbox cmd response: success
18,509,784 UART:
18,510,185 UART: Running Caliptra FMC ...
18,511,282 UART:
18,511,427 UART: [state] CFI Enabled
18,519,024 UART: [fht] FMC Alias Private Key: 7
20,275,984 UART: [art] Extend RT PCRs Done
20,277,368 UART: [art] Lock RT PCRs Done
20,278,754 UART: [art] Populate DV Done
20,284,010 UART: [fht] FMC Alias Private Key: 7
20,285,547 UART: [art] Derive CDI
20,286,274 UART: [art] Store in in slot 0x4
20,329,233 UART: [art] Derive Key Pair
20,330,222 UART: [art] Store priv key in slot 0x5
22,757,020 UART: [art] Derive Key Pair - Done
22,770,125 UART: [art] Signing Cert with AUTHO
22,771,418 UART: RITY.KEYID = 7
24,477,373 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,873 UART: [art] PUB.X = F59E9F8B3C465E85873B53EF34887CD99259165FF93F8D9C97DCE0EC57D1788E8B9BD7CDE7ABF3823A002144E2F1B5C2
24,486,156 UART: [art] PUB.Y = 074CCD0800C4D7165F84FFE7A3A6E448389C8CD92FD21CD2C4FB7724543327E47EFD503E881CAA53CD226F7EB8ACDFAB
24,493,406 UART: [art] SIG.R = 7912EBEAD082DC21232809D0F2596F21FDFB15472A32BF1CA9A9BA781B98C6D7758F321EABCE98E9C9D245BBA0753DE8
24,500,865 UART: [art] SIG.S = 48F6BDAA891B767D86D941B8FA9EAAF1DEE7444A89D9EB90C60D549956E5CB2125E65AB5769AF29CE5735412892DA413
25,479,927 UART: Caliptra RT
25,480,634 UART: [state] CFI Enabled
25,597,372 UART: [rt] RT listening for mailbox commands...
25,599,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,630,206 UART: [rt]cmd =0x44504543, len=96
29,914,281 >>> mbox cmd response data (6236 bytes)
29,943,605 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,973,791 UART: [rt]cmd =0x52564348, len=36
29,976,689 >>> mbox cmd response data (8 bytes)
29,977,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,007,619 UART: [rt]cmd =0x44504543, len=96
34,291,589 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,440,536 ready_for_fw is high
3,440,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,730,369 >>> mbox cmd response: success
19,026,835 UART:
19,027,238 UART: Running Caliptra FMC ...
19,028,387 UART:
19,028,549 UART: [state] CFI Enabled
19,093,259 UART: [fht] FMC Alias Private Key: 7
20,857,336 UART: [art] Extend RT PCRs Done
20,858,567 UART: [art] Lock RT PCRs Done
20,860,302 UART: [art] Populate DV Done
20,865,556 UART: [fht] FMC Alias Private Key: 7
20,867,257 UART: [art] Derive CDI
20,867,991 UART: [art] Store in in slot 0x4
20,925,903 UART: [art] Derive Key Pair
20,926,966 UART: [art] Store priv key in slot 0x5
23,390,369 UART: [art] Derive Key Pair - Done
23,403,641 UART: [art] Signing Cert with AUTHO
23,404,948 UART: RITY.KEYID = 7
25,116,576 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,086 UART: [art] PUB.X = 37345DBE0A25073167D166DA3730821CBC3E361FAD5B2A899B2470F6E0A06567837FD152A44E0BC870D75491BDF70F2F
25,125,341 UART: [art] PUB.Y = 46050D8B12ABB39EC2A22AAFEF0E15CAEEA01ACB87C71A04C57E745FA0FCFD701931CD7E75D796E305051905CCC6875F
25,132,642 UART: [art] SIG.R = 77F513899D08940B5FAB953482813367049E6A74CD58B61D1664857585226A7138744EB11B3A159560245EED41AF59B4
25,139,982 UART: [art] SIG.S = CFF954E16AF3B395DA750E102DA8E56A051FABF4E8E42A2E411A9A0EDC91F642F9324A30571F8AC145C23215D62ACFD9
26,118,503 UART: Caliptra RT
26,119,223 UART: [state] CFI Enabled
26,285,361 UART: [rt] RT listening for mailbox commands...
26,287,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,318,821 UART: [rt]cmd =0x44504543, len=96
30,697,719 >>> mbox cmd response data (6236 bytes)
30,726,765 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,757,077 UART: [rt]cmd =0x52564348, len=36
30,759,714 >>> mbox cmd response data (8 bytes)
30,760,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,790,770 UART: [rt]cmd =0x44504543, len=96
35,156,338 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,755,693 ready_for_fw is high
3,756,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,811 >>> mbox cmd response: success
19,215,408 UART:
19,215,775 UART: Running Caliptra FMC ...
19,217,060 UART:
19,217,230 UART: [state] CFI Enabled
19,225,223 UART: [fht] FMC Alias Private Key: 7
20,982,003 UART: [art] Extend RT PCRs Done
20,983,228 UART: [art] Lock RT PCRs Done
20,984,682 UART: [art] Populate DV Done
20,990,144 UART: [fht] FMC Alias Private Key: 7
20,991,628 UART: [art] Derive CDI
20,992,401 UART: [art] Store in in slot 0x4
21,035,108 UART: [art] Derive Key Pair
21,036,147 UART: [art] Store priv key in slot 0x5
23,462,380 UART: [art] Derive Key Pair - Done
23,475,317 UART: [art] Signing Cert with AUTHO
23,476,610 UART: RITY.KEYID = 7
25,181,942 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,457 UART: [art] PUB.X = B43DA314E02121640072FC867C5DE8E219584F2C7D8070A309126F3640A0F356968E8BE78C54F7A1E76E316F3197C075
25,190,467 UART: [art] PUB.Y = 3BEF077D916B06EF72063F5ED8F2A87B434B9699CEBF097E480268E9B327CC03D8E527CF5A88B90F0120B4AE987D88D7
25,197,730 UART: [art] SIG.R = E49E6536295990E334F6499BA96EE5FC5393DCD7393F2FCEE205764E370381CDAADFEA2449B4F4D6DE060E4B9E6C64C1
25,205,089 UART: [art] SIG.S = DD3727D4257CC6D6531CDD81FE75BC189AD97F097181C9A721D0A2DCB1EC8CB49A8C76A4A357DE4F84088BC8B5E67CCA
26,184,109 UART: Caliptra RT
26,184,821 UART: [state] CFI Enabled
26,301,902 UART: [rt] RT listening for mailbox commands...
26,304,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,335,089 UART: [rt]cmd =0x44504543, len=96
30,618,263 >>> mbox cmd response data (6236 bytes)
30,647,480 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,677,711 UART: [rt]cmd =0x52564348, len=36
30,680,314 >>> mbox cmd response data (8 bytes)
30,680,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,711,176 UART: [rt]cmd =0x44504543, len=96
34,993,373 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,623 UART: [kat] SHA2-256
881,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,669 UART: [kat] ++
885,821 UART: [kat] sha1
889,999 UART: [kat] SHA2-256
891,937 UART: [kat] SHA2-384
894,590 UART: [kat] SHA2-512-ACC
896,491 UART: [kat] ECC-384
902,300 UART: [kat] HMAC-384Kdf
907,040 UART: [kat] LMS
1,475,236 UART: [kat] --
1,475,997 UART: [cold-reset] ++
1,476,347 UART: [fht] Storing FHT @ 0x50003400
1,479,150 UART: [idev] ++
1,479,318 UART: [idev] CDI.KEYID = 6
1,479,678 UART: [idev] SUBJECT.KEYID = 7
1,480,102 UART: [idev] UDS.KEYID = 0
1,480,447 ready_for_fw is high
1,480,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,128 UART: [idev] Erasing UDS.KEYID = 0
1,504,414 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,044 UART: [idev] --
1,514,039 UART: [ldev] ++
1,514,207 UART: [ldev] CDI.KEYID = 6
1,514,570 UART: [ldev] SUBJECT.KEYID = 5
1,514,996 UART: [ldev] AUTHORITY.KEYID = 7
1,515,459 UART: [ldev] FE.KEYID = 1
1,520,473 UART: [ldev] Erasing FE.KEYID = 1
1,545,940 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,116 UART: [ldev] --
1,585,439 UART: [fwproc] Waiting for Commands...
1,586,134 UART: [fwproc] Received command 0x46574c44
1,586,925 UART: [fwproc] Received Image of size 114448 bytes
2,885,313 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,455 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,807 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,734 >>> mbox cmd response: success
3,078,840 UART: [afmc] ++
3,079,008 UART: [afmc] CDI.KEYID = 6
3,079,370 UART: [afmc] SUBJECT.KEYID = 7
3,079,795 UART: [afmc] AUTHORITY.KEYID = 5
3,115,274 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,456 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,236 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,849 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,539 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,434 UART: [afmc] --
3,158,498 UART: [cold-reset] --
3,159,198 UART: [state] Locking Datavault
3,160,355 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,959 UART: [state] Locking ICCM
3,161,613 UART: [exit] Launching FMC @ 0x40000130
3,166,942 UART:
3,166,958 UART: Running Caliptra FMC ...
3,167,366 UART:
3,167,420 UART: [state] CFI Enabled
3,177,981 UART: [fht] FMC Alias Private Key: 7
3,286,290 UART: [art] Extend RT PCRs Done
3,286,718 UART: [art] Lock RT PCRs Done
3,288,096 UART: [art] Populate DV Done
3,296,125 UART: [fht] FMC Alias Private Key: 7
3,297,185 UART: [art] Derive CDI
3,297,465 UART: [art] Store in in slot 0x4
3,383,406 UART: [art] Derive Key Pair
3,383,766 UART: [art] Store priv key in slot 0x5
3,396,536 UART: [art] Derive Key Pair - Done
3,411,563 UART: [art] Signing Cert with AUTHO
3,412,043 UART: RITY.KEYID = 7
3,427,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,824 UART: [art] PUB.X = DA5BABEE459C87C397C015ABC497180595C48D77542F9250E5D640F3006F8BD3533557E7951910168085DC9C85807DBE
3,434,565 UART: [art] PUB.Y = 10A2CAE109B3EC3B09926240A1651418D09C9756EE9842262BDC8ACE4C53F37D2600545B0038DCECB6FE50A381F8A299
3,441,469 UART: [art] SIG.R = 180728296B711E7A05F246681043946D72822007021FA495710D9F15279110E1014BC39B70188576A5605E203CF1AE5B
3,448,199 UART: [art] SIG.S = 9994AB05B125DB60B7036CADC2376CD0DF99CAA513A63C065AD2E7DC117895240500F4C7B6D9E195BFC4EE987C000797
3,472,621 UART: Caliptra RT
3,472,874 UART: [state] CFI Enabled
3,580,263 UART: [rt] RT listening for mailbox commands...
3,580,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,533 UART: [rt]cmd =0x44504543, len=96
3,792,167 >>> mbox cmd response data (6236 bytes)
3,792,168 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,789 UART: [rt]cmd =0x52564348, len=36
3,823,939 >>> mbox cmd response data (8 bytes)
3,823,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,853,861 UART: [rt]cmd =0x44504543, len=96
4,034,575 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,511 ready_for_fw is high
1,361,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,021 >>> mbox cmd response: success
2,990,513 UART:
2,990,529 UART: Running Caliptra FMC ...
2,990,937 UART:
2,990,991 UART: [state] CFI Enabled
3,001,054 UART: [fht] FMC Alias Private Key: 7
3,108,923 UART: [art] Extend RT PCRs Done
3,109,351 UART: [art] Lock RT PCRs Done
3,110,631 UART: [art] Populate DV Done
3,118,730 UART: [fht] FMC Alias Private Key: 7
3,119,774 UART: [art] Derive CDI
3,120,054 UART: [art] Store in in slot 0x4
3,205,659 UART: [art] Derive Key Pair
3,206,019 UART: [art] Store priv key in slot 0x5
3,218,967 UART: [art] Derive Key Pair - Done
3,233,678 UART: [art] Signing Cert with AUTHO
3,234,158 UART: RITY.KEYID = 7
3,249,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,951 UART: [art] PUB.X = 8127E45F9CDC38B8FE9D61DDF7F1D9334FEF617DDB57B23EDCE3E88878731DA5108BD1A3EFC6DC0F0720CDCC953A0546
3,256,734 UART: [art] PUB.Y = 952CA781750601C05FCBB71308073442EB72BD9B956AE3D3297A80CF19B97D632D1EC1F6AF71D8FBE36D2E0875F2B37E
3,263,677 UART: [art] SIG.R = 12FAD939591771E418FB3DFAAF902D51B4C7195FEBA5EB94AA1257C8BE143F5858358DE51DFEB915DABD3C58BD4B54B5
3,270,467 UART: [art] SIG.S = C629392622FC566DB57F097DA39A2A5719B5C49D429FC6631E550592C594DD72B1CCD3AFB356DD196C35FCB548703077
3,294,800 UART: Caliptra RT
3,295,053 UART: [state] CFI Enabled
3,402,356 UART: [rt] RT listening for mailbox commands...
3,403,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,364 UART: [rt]cmd =0x44504543, len=96
3,614,295 >>> mbox cmd response data (6236 bytes)
3,614,296 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,615 UART: [rt]cmd =0x52564348, len=36
3,645,707 >>> mbox cmd response data (8 bytes)
3,645,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,633 UART: [rt]cmd =0x44504543, len=96
3,856,620 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,756 UART: [kat] SHA2-256
892,694 UART: [kat] SHA2-384
895,451 UART: [kat] SHA2-512-ACC
897,352 UART: [kat] ECC-384
902,931 UART: [kat] HMAC-384Kdf
907,593 UART: [kat] LMS
1,475,789 UART: [kat] --
1,476,868 UART: [cold-reset] ++
1,477,444 UART: [fht] Storing FHT @ 0x50003400
1,480,123 UART: [idev] ++
1,480,291 UART: [idev] CDI.KEYID = 6
1,480,651 UART: [idev] SUBJECT.KEYID = 7
1,481,075 UART: [idev] UDS.KEYID = 0
1,481,420 ready_for_fw is high
1,481,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,169 UART: [idev] Erasing UDS.KEYID = 0
1,505,725 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,407 UART: [idev] --
1,515,646 UART: [ldev] ++
1,515,814 UART: [ldev] CDI.KEYID = 6
1,516,177 UART: [ldev] SUBJECT.KEYID = 5
1,516,603 UART: [ldev] AUTHORITY.KEYID = 7
1,517,066 UART: [ldev] FE.KEYID = 1
1,522,342 UART: [ldev] Erasing FE.KEYID = 1
1,548,207 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,949 UART: [ldev] --
1,587,340 UART: [fwproc] Waiting for Commands...
1,588,119 UART: [fwproc] Received command 0x46574c44
1,588,910 UART: [fwproc] Received Image of size 114448 bytes
2,888,229 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,979 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,331 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,244 >>> mbox cmd response: success
3,081,446 UART: [afmc] ++
3,081,614 UART: [afmc] CDI.KEYID = 6
3,081,976 UART: [afmc] SUBJECT.KEYID = 7
3,082,401 UART: [afmc] AUTHORITY.KEYID = 5
3,117,504 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,672 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,452 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,065 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,755 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,642 UART: [afmc] --
3,160,772 UART: [cold-reset] --
3,161,642 UART: [state] Locking Datavault
3,162,765 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,369 UART: [state] Locking ICCM
3,163,963 UART: [exit] Launching FMC @ 0x40000130
3,169,292 UART:
3,169,308 UART: Running Caliptra FMC ...
3,169,716 UART:
3,169,859 UART: [state] CFI Enabled
3,180,604 UART: [fht] FMC Alias Private Key: 7
3,288,601 UART: [art] Extend RT PCRs Done
3,289,029 UART: [art] Lock RT PCRs Done
3,290,479 UART: [art] Populate DV Done
3,298,828 UART: [fht] FMC Alias Private Key: 7
3,299,782 UART: [art] Derive CDI
3,300,062 UART: [art] Store in in slot 0x4
3,385,719 UART: [art] Derive Key Pair
3,386,079 UART: [art] Store priv key in slot 0x5
3,399,171 UART: [art] Derive Key Pair - Done
3,413,758 UART: [art] Signing Cert with AUTHO
3,414,238 UART: RITY.KEYID = 7
3,429,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,415 UART: [art] PUB.X = F2A391CD439BE7E0388C38D57E58F9BB7D8EFD305E3E45A832B53163538D3DF4477E641C645D6E0276DEFD2313349453
3,437,184 UART: [art] PUB.Y = A566F21D191A0995445D8AA8A73ED6DF3F93EEF2EBACC558F08B2F9D2E961C328A98F6832EEE37242F8C9D2E7E747A70
3,444,145 UART: [art] SIG.R = DDA04E5E59C6C50417416B6D1FD61E02CCC76D0728A7158EC69423E0F2E667D25F6F81EF07277FFD3532C2D218D841BE
3,450,911 UART: [art] SIG.S = BC4A0069BD2575AE3A29C56252F82FBAF355491737E176CCC07DAA0E57EA1E0B3FAAD741A912043633203FB970E16084
3,474,823 UART: Caliptra RT
3,475,168 UART: [state] CFI Enabled
3,583,406 UART: [rt] RT listening for mailbox commands...
3,584,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,612 UART: [rt]cmd =0x44504543, len=96
3,796,082 >>> mbox cmd response data (6236 bytes)
3,796,083 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,568 UART: [rt]cmd =0x52564348, len=36
3,827,902 >>> mbox cmd response data (8 bytes)
3,827,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,857,712 UART: [rt]cmd =0x44504543, len=96
4,038,076 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,742 ready_for_fw is high
1,362,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,552 >>> mbox cmd response: success
2,991,950 UART:
2,991,966 UART: Running Caliptra FMC ...
2,992,374 UART:
2,992,517 UART: [state] CFI Enabled
3,002,850 UART: [fht] FMC Alias Private Key: 7
3,110,775 UART: [art] Extend RT PCRs Done
3,111,203 UART: [art] Lock RT PCRs Done
3,112,905 UART: [art] Populate DV Done
3,121,312 UART: [fht] FMC Alias Private Key: 7
3,122,256 UART: [art] Derive CDI
3,122,536 UART: [art] Store in in slot 0x4
3,208,163 UART: [art] Derive Key Pair
3,208,523 UART: [art] Store priv key in slot 0x5
3,221,715 UART: [art] Derive Key Pair - Done
3,236,415 UART: [art] Signing Cert with AUTHO
3,236,895 UART: RITY.KEYID = 7
3,252,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,974 UART: [art] PUB.X = C24526CF4931F07014336C8A446BC37B47779865C544C5046606713D9689255E63137E9A2CD028AEF69B205CA8BE4338
3,259,726 UART: [art] PUB.Y = FC53BCB56F4AD1D7739F99E15F16BDB860F973CFFF39D00DD46F2F9D4D4D85D7321FF52D3ADA14FDA5E37D1E1243CC8B
3,266,699 UART: [art] SIG.R = D6F8A4B36547BF176B989BC45ED4EBCD46B18B3B22879B70E81439072068D8A70DA5CB6456376A9CE0BBFA4F3F5E3E98
3,273,475 UART: [art] SIG.S = FA511D80E28749DB64B93321928A503320AF03B32B6DD776BF50B50EB8F05E391242B4C344620D7A2240AF4A663A4B14
3,296,507 UART: Caliptra RT
3,296,852 UART: [state] CFI Enabled
3,405,578 UART: [rt] RT listening for mailbox commands...
3,406,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,596 UART: [rt]cmd =0x44504543, len=96
3,616,884 >>> mbox cmd response data (6236 bytes)
3,616,885 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,576 UART: [rt]cmd =0x52564348, len=36
3,648,506 >>> mbox cmd response data (8 bytes)
3,648,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,678,398 UART: [rt]cmd =0x44504543, len=96
3,859,764 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,797 UART: [kat] SHA2-256
903,737 UART: [kat] SHA2-384
906,314 UART: [kat] SHA2-512-ACC
908,215 UART: [kat] ECC-384
918,216 UART: [kat] HMAC-384Kdf
922,788 UART: [kat] LMS
1,171,116 UART: [kat] --
1,171,899 UART: [cold-reset] ++
1,172,413 UART: [fht] FHT @ 0x50003400
1,175,076 UART: [idev] ++
1,175,244 UART: [idev] CDI.KEYID = 6
1,175,604 UART: [idev] SUBJECT.KEYID = 7
1,176,028 UART: [idev] UDS.KEYID = 0
1,176,373 ready_for_fw is high
1,176,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,174 UART: [idev] Erasing UDS.KEYID = 0
1,201,035 UART: [idev] Sha1 KeyId Algorithm
1,209,649 UART: [idev] --
1,210,923 UART: [ldev] ++
1,211,091 UART: [ldev] CDI.KEYID = 6
1,211,454 UART: [ldev] SUBJECT.KEYID = 5
1,211,880 UART: [ldev] AUTHORITY.KEYID = 7
1,212,343 UART: [ldev] FE.KEYID = 1
1,217,217 UART: [ldev] Erasing FE.KEYID = 1
1,243,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,681 UART: [ldev] --
1,283,074 UART: [fwproc] Wait for Commands...
1,283,698 UART: [fwproc] Recv command 0x46574c44
1,284,426 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,001 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,400 >>> mbox cmd response: success
2,778,570 UART: [afmc] ++
2,778,738 UART: [afmc] CDI.KEYID = 6
2,779,100 UART: [afmc] SUBJECT.KEYID = 7
2,779,525 UART: [afmc] AUTHORITY.KEYID = 5
2,814,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,953 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,681 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,149 UART: [afmc] --
2,858,073 UART: [cold-reset] --
2,858,927 UART: [state] Locking Datavault
2,859,690 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,294 UART: [state] Locking ICCM
2,860,750 UART: [exit] Launching FMC @ 0x40000130
2,866,079 UART:
2,866,095 UART: Running Caliptra FMC ...
2,866,503 UART:
2,866,557 UART: [state] CFI Enabled
2,876,862 UART: [fht] FMC Alias Private Key: 7
2,984,659 UART: [art] Extend RT PCRs Done
2,985,087 UART: [art] Lock RT PCRs Done
2,986,845 UART: [art] Populate DV Done
2,995,238 UART: [fht] FMC Alias Private Key: 7
2,996,304 UART: [art] Derive CDI
2,996,584 UART: [art] Store in in slot 0x4
3,082,129 UART: [art] Derive Key Pair
3,082,489 UART: [art] Store priv key in slot 0x5
3,095,517 UART: [art] Derive Key Pair - Done
3,110,311 UART: [art] Signing Cert with AUTHO
3,110,791 UART: RITY.KEYID = 7
3,126,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,870 UART: [art] PUB.X = 50C8738CF4247243D2761CEC290B3E27E0122997585042113D6EC0AC514C82C221210012208DE6E80D6EC3B1608F6532
3,133,600 UART: [art] PUB.Y = 6C28AE48A9BF8B7712268684F7519005C95DA5DE568031D656CFB9461EEB2E933BFC6227324C4FA31A2A29063232CE47
3,140,544 UART: [art] SIG.R = 9B36DCA374D670D4F5F5D0111E0700CACD7A7915FFA24A5447495CEA221290B926DA84571DC5E1DE51E8D2E4D3E7EE27
3,147,301 UART: [art] SIG.S = F312966CD3EF0D534B5F05A11DC332AB4E5577FAA879847D8125EF2EB5532C1829CC9D302821E1CBBF4C9EBC748E29B5
3,170,814 UART: Caliptra RT
3,171,067 UART: [state] CFI Enabled
3,278,263 UART: [rt] RT listening for mailbox commands...
3,278,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,573 UART: [rt]cmd =0x44504543, len=96
3,490,024 >>> mbox cmd response data (6236 bytes)
3,490,025 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,630 UART: [rt]cmd =0x52564348, len=36
3,521,738 >>> mbox cmd response data (8 bytes)
3,521,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,551,750 UART: [rt]cmd =0x44504543, len=96
3,732,649 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,883 ready_for_fw is high
1,059,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,957 >>> mbox cmd response: success
2,688,875 UART:
2,688,891 UART: Running Caliptra FMC ...
2,689,299 UART:
2,689,353 UART: [state] CFI Enabled
2,699,542 UART: [fht] FMC Alias Private Key: 7
2,807,297 UART: [art] Extend RT PCRs Done
2,807,725 UART: [art] Lock RT PCRs Done
2,809,021 UART: [art] Populate DV Done
2,817,042 UART: [fht] FMC Alias Private Key: 7
2,818,044 UART: [art] Derive CDI
2,818,324 UART: [art] Store in in slot 0x4
2,904,261 UART: [art] Derive Key Pair
2,904,621 UART: [art] Store priv key in slot 0x5
2,917,871 UART: [art] Derive Key Pair - Done
2,932,684 UART: [art] Signing Cert with AUTHO
2,933,164 UART: RITY.KEYID = 7
2,948,650 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,415 UART: [art] PUB.X = 0A8535AEFC509E1C49E01A3570A4B47B39D6F93E885D233A224A77A8FFBB273B4776C005FCA087E03C8E0B38CA928B27
2,956,184 UART: [art] PUB.Y = 1200357D7C7FF704CBC29EC8EA46405876CD749E514C177160D29F6607EAF7E5BC17CB4742D8F288E2895EADF9B7F470
2,963,112 UART: [art] SIG.R = 0CA991FFE8488301CF7C4E4C10E368AA0B24307994CDF221A443CB19345C6E6AED851FBBBA1E47B2E670849602B66283
2,969,876 UART: [art] SIG.S = C9825B8DDB12BA3168071610562439E1AB33DEC1B343B7D0FDF8294F796FD3AF0807666687372C4477B145959C613202
2,993,941 UART: Caliptra RT
2,994,194 UART: [state] CFI Enabled
3,102,153 UART: [rt] RT listening for mailbox commands...
3,102,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,295 UART: [rt]cmd =0x44504543, len=96
3,313,158 >>> mbox cmd response data (6236 bytes)
3,313,159 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,866 UART: [rt]cmd =0x52564348, len=36
3,344,690 >>> mbox cmd response data (8 bytes)
3,344,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,856 UART: [rt]cmd =0x44504543, len=96
3,554,895 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,416 UART: [kat] SHA2-256
904,356 UART: [kat] SHA2-384
907,343 UART: [kat] SHA2-512-ACC
909,244 UART: [kat] ECC-384
918,903 UART: [kat] HMAC-384Kdf
923,317 UART: [kat] LMS
1,171,645 UART: [kat] --
1,172,680 UART: [cold-reset] ++
1,173,212 UART: [fht] FHT @ 0x50003400
1,175,791 UART: [idev] ++
1,175,959 UART: [idev] CDI.KEYID = 6
1,176,319 UART: [idev] SUBJECT.KEYID = 7
1,176,743 UART: [idev] UDS.KEYID = 0
1,177,088 ready_for_fw is high
1,177,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,123 UART: [idev] Erasing UDS.KEYID = 0
1,202,226 UART: [idev] Sha1 KeyId Algorithm
1,210,606 UART: [idev] --
1,211,652 UART: [ldev] ++
1,211,820 UART: [ldev] CDI.KEYID = 6
1,212,183 UART: [ldev] SUBJECT.KEYID = 5
1,212,609 UART: [ldev] AUTHORITY.KEYID = 7
1,213,072 UART: [ldev] FE.KEYID = 1
1,218,286 UART: [ldev] Erasing FE.KEYID = 1
1,245,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,152 UART: [ldev] --
1,284,551 UART: [fwproc] Wait for Commands...
1,285,219 UART: [fwproc] Recv command 0x46574c44
1,285,947 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,453 >>> mbox cmd response: success
2,779,613 UART: [afmc] ++
2,779,781 UART: [afmc] CDI.KEYID = 6
2,780,143 UART: [afmc] SUBJECT.KEYID = 7
2,780,568 UART: [afmc] AUTHORITY.KEYID = 5
2,815,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,692 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,577 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,296 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,200 UART: [afmc] --
2,859,300 UART: [cold-reset] --
2,860,004 UART: [state] Locking Datavault
2,861,097 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,701 UART: [state] Locking ICCM
2,862,215 UART: [exit] Launching FMC @ 0x40000130
2,867,544 UART:
2,867,560 UART: Running Caliptra FMC ...
2,867,968 UART:
2,868,111 UART: [state] CFI Enabled
2,878,530 UART: [fht] FMC Alias Private Key: 7
2,986,301 UART: [art] Extend RT PCRs Done
2,986,729 UART: [art] Lock RT PCRs Done
2,988,227 UART: [art] Populate DV Done
2,996,678 UART: [fht] FMC Alias Private Key: 7
2,997,620 UART: [art] Derive CDI
2,997,900 UART: [art] Store in in slot 0x4
3,083,997 UART: [art] Derive Key Pair
3,084,357 UART: [art] Store priv key in slot 0x5
3,097,579 UART: [art] Derive Key Pair - Done
3,112,485 UART: [art] Signing Cert with AUTHO
3,112,965 UART: RITY.KEYID = 7
3,128,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,058 UART: [art] PUB.X = 01A0C772316DFAE7B16E8C92A6942401B15B102F5A066B6FFE7762947E4CA6076A10ED390D88B551CBF22686B0EF7A64
3,135,817 UART: [art] PUB.Y = E46E8B4575024CCC6874D207AF1BE149ACCB722075B585FCF0E50528DCFB769CE4FB5F53FC6B7FAF0EEDE8062BC8F0C3
3,142,776 UART: [art] SIG.R = 4307498EDD5225DBAA2340868E616A775075AB4652D72912C1E49AC2D5245561BC6A0EAC5A059CD877ABB146ACB13373
3,149,539 UART: [art] SIG.S = E9F1EDD17A3D07688A2820F73E8117ABCE029F648F56333F0FC74BD3FC052B351DAEC55728BC1655938EF06241779B5E
3,173,280 UART: Caliptra RT
3,173,625 UART: [state] CFI Enabled
3,281,604 UART: [rt] RT listening for mailbox commands...
3,282,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,570 UART: [rt]cmd =0x44504543, len=96
3,493,865 >>> mbox cmd response data (6236 bytes)
3,493,866 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,349 UART: [rt]cmd =0x52564348, len=36
3,525,649 >>> mbox cmd response data (8 bytes)
3,525,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,819 UART: [rt]cmd =0x44504543, len=96
3,737,232 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,352 ready_for_fw is high
1,061,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,118 >>> mbox cmd response: success
2,691,310 UART:
2,691,326 UART: Running Caliptra FMC ...
2,691,734 UART:
2,691,877 UART: [state] CFI Enabled
2,702,096 UART: [fht] FMC Alias Private Key: 7
2,810,003 UART: [art] Extend RT PCRs Done
2,810,431 UART: [art] Lock RT PCRs Done
2,811,787 UART: [art] Populate DV Done
2,819,992 UART: [fht] FMC Alias Private Key: 7
2,821,016 UART: [art] Derive CDI
2,821,296 UART: [art] Store in in slot 0x4
2,906,599 UART: [art] Derive Key Pair
2,906,959 UART: [art] Store priv key in slot 0x5
2,920,739 UART: [art] Derive Key Pair - Done
2,936,196 UART: [art] Signing Cert with AUTHO
2,936,676 UART: RITY.KEYID = 7
2,951,528 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,293 UART: [art] PUB.X = E7EB17A52DDBF4ECEC9C45AC82F198176C2B2E1BDA2FF147944BAA511B7DF50822B64935455B0BA0FFA8DB14F9294D57
2,959,077 UART: [art] PUB.Y = C8288CFCBF2F588CFE3C0AF9D3FB559D11E3FA22BB221D3DFF8F8F7D246C524BE2D6BA4B6D9879DC13BFE79FBE0CF8EB
2,966,057 UART: [art] SIG.R = 6546F62C3248BBCD635EEEE69997600399EA3780036461054D92DC0BE8D8E5147527E395395F021712506DB7B7B06ED5
2,972,804 UART: [art] SIG.S = B2EE6E528D4A58C0DFC4A7000926A4E7BE37F541F7E1F78D2B024D25B8BCEA38F62FAE2E928595E3FF1A7A5720E23089
2,996,009 UART: Caliptra RT
2,996,354 UART: [state] CFI Enabled
3,103,215 UART: [rt] RT listening for mailbox commands...
3,103,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,193 UART: [rt]cmd =0x44504543, len=96
3,315,227 >>> mbox cmd response data (6236 bytes)
3,315,228 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,811 UART: [rt]cmd =0x52564348, len=36
3,347,025 >>> mbox cmd response data (8 bytes)
3,347,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,133 UART: [rt]cmd =0x44504543, len=96
3,558,147 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,505 UART: [kat] SHA2-256
901,445 UART: [kat] SHA2-384
904,078 UART: [kat] SHA2-512-ACC
905,979 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,370 UART: [kat] LMS
1,168,682 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,170,053 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,173,969 ready_for_fw is high
1,173,969 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,423 UART: [idev] Sha1 KeyId Algorithm
1,207,219 UART: [idev] --
1,208,358 UART: [ldev] ++
1,208,526 UART: [ldev] CDI.KEYID = 6
1,208,890 UART: [ldev] SUBJECT.KEYID = 5
1,209,317 UART: [ldev] AUTHORITY.KEYID = 7
1,209,780 UART: [ldev] FE.KEYID = 1
1,214,900 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,176 UART: [ldev] --
1,280,570 UART: [fwproc] Wait for Commands...
1,281,361 UART: [fwproc] Recv command 0x46574c44
1,282,094 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,885 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,188 >>> mbox cmd response: success
2,774,255 UART: [afmc] ++
2,774,423 UART: [afmc] CDI.KEYID = 6
2,774,786 UART: [afmc] SUBJECT.KEYID = 7
2,775,212 UART: [afmc] AUTHORITY.KEYID = 5
2,811,007 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,270 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,882 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,601 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,480 UART: [afmc] --
2,854,366 UART: [cold-reset] --
2,855,128 UART: [state] Locking Datavault
2,856,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,781 UART: [state] Locking ICCM
2,857,399 UART: [exit] Launching FMC @ 0x40000130
2,862,728 UART:
2,862,744 UART: Running Caliptra FMC ...
2,863,152 UART:
2,863,206 UART: [state] CFI Enabled
2,873,899 UART: [fht] FMC Alias Private Key: 7
2,981,930 UART: [art] Extend RT PCRs Done
2,982,358 UART: [art] Lock RT PCRs Done
2,983,694 UART: [art] Populate DV Done
2,992,135 UART: [fht] FMC Alias Private Key: 7
2,993,101 UART: [art] Derive CDI
2,993,381 UART: [art] Store in in slot 0x4
3,078,758 UART: [art] Derive Key Pair
3,079,118 UART: [art] Store priv key in slot 0x5
3,092,214 UART: [art] Derive Key Pair - Done
3,106,824 UART: [art] Signing Cert with AUTHO
3,107,304 UART: RITY.KEYID = 7
3,123,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,011 UART: [art] PUB.X = 43D6CE56D3D4B7FC234DD0808699BC4A5B6B8D32EF603FA8BB51857F4F2E483B157A4356E9DEFDA3E1ABAAE9EC93C459
3,130,803 UART: [art] PUB.Y = E6F113BF966191798994BFFCAC11898EAF054AE056840EEA6F780FB6AE2D0DC4EBAA68AE32B0433D55026EEFF64F6E12
3,137,756 UART: [art] SIG.R = 96853303D080E942B39B0F22739EF1148306D6AC36EB25A9EE4C81339CC1F82F10A0B1B5FD89F864750A2D17BA07DC05
3,144,510 UART: [art] SIG.S = 31DC1AEFE8A402C4A74F6F134500BA5F7B6A861149A6EA1F3C0C3CDF7542F0A20342BD40F065B933C43DC4070F38B24A
3,168,348 UART: Caliptra RT
3,168,601 UART: [state] CFI Enabled
3,277,078 UART: [rt] RT listening for mailbox commands...
3,277,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,122 UART: [rt]cmd =0x44504543, len=96
3,488,820 >>> mbox cmd response data (6236 bytes)
3,488,821 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,502 UART: [rt]cmd =0x52564348, len=36
3,520,732 >>> mbox cmd response data (8 bytes)
3,520,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,550,898 UART: [rt]cmd =0x44504543, len=96
3,731,982 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,986 ready_for_fw is high
1,055,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,698 >>> mbox cmd response: success
2,685,052 UART:
2,685,068 UART: Running Caliptra FMC ...
2,685,476 UART:
2,685,530 UART: [state] CFI Enabled
2,696,187 UART: [fht] FMC Alias Private Key: 7
2,804,082 UART: [art] Extend RT PCRs Done
2,804,510 UART: [art] Lock RT PCRs Done
2,805,798 UART: [art] Populate DV Done
2,814,239 UART: [fht] FMC Alias Private Key: 7
2,815,299 UART: [art] Derive CDI
2,815,579 UART: [art] Store in in slot 0x4
2,901,406 UART: [art] Derive Key Pair
2,901,766 UART: [art] Store priv key in slot 0x5
2,914,722 UART: [art] Derive Key Pair - Done
2,929,424 UART: [art] Signing Cert with AUTHO
2,929,904 UART: RITY.KEYID = 7
2,945,160 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,925 UART: [art] PUB.X = C90DDAB05E1F5BC71D0D84594D6E41579674505A138FB174BA14609C955F4BBA6B45C38131900888E74707142C24B99C
2,952,679 UART: [art] PUB.Y = CF5519A71A52D50906F588F614E50FE5E188CE3F15591F9BF66C9DD846D188341D8618F896CE8F2168C3EAAEB597E6E7
2,959,626 UART: [art] SIG.R = B7F594667A563D33765CCEF9D86AF18F84FD81565D711BA9F3A92CA076C59E52B6203A6BFE46E3CD4D3E6097546DD009
2,966,401 UART: [art] SIG.S = 8C665F6A476BB3BC68601DFFBCA00C687A4951DF05BA59ABB57AD8AE45774456605F4DD98B83076D665B35902F79D043
2,990,503 UART: Caliptra RT
2,990,756 UART: [state] CFI Enabled
3,098,778 UART: [rt] RT listening for mailbox commands...
3,099,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,654 UART: [rt]cmd =0x44504543, len=96
3,310,222 >>> mbox cmd response data (6236 bytes)
3,310,223 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,832 UART: [rt]cmd =0x52564348, len=36
3,342,028 >>> mbox cmd response data (8 bytes)
3,342,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,824 UART: [rt]cmd =0x44504543, len=96
3,552,742 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
891,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,856 UART: [kat] ++
896,008 UART: [kat] sha1
900,328 UART: [kat] SHA2-256
902,268 UART: [kat] SHA2-384
905,065 UART: [kat] SHA2-512-ACC
906,966 UART: [kat] ECC-384
916,325 UART: [kat] HMAC-384Kdf
920,781 UART: [kat] LMS
1,169,093 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,172,778 UART: [idev] ++
1,172,946 UART: [idev] CDI.KEYID = 6
1,173,307 UART: [idev] SUBJECT.KEYID = 7
1,173,732 UART: [idev] UDS.KEYID = 0
1,174,078 ready_for_fw is high
1,174,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,794 UART: [idev] Erasing UDS.KEYID = 0
1,198,522 UART: [idev] Sha1 KeyId Algorithm
1,207,368 UART: [idev] --
1,208,437 UART: [ldev] ++
1,208,605 UART: [ldev] CDI.KEYID = 6
1,208,969 UART: [ldev] SUBJECT.KEYID = 5
1,209,396 UART: [ldev] AUTHORITY.KEYID = 7
1,209,859 UART: [ldev] FE.KEYID = 1
1,215,205 UART: [ldev] Erasing FE.KEYID = 1
1,241,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,633 UART: [ldev] --
1,281,045 UART: [fwproc] Wait for Commands...
1,281,666 UART: [fwproc] Recv command 0x46574c44
1,282,399 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,408 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,717 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,611 >>> mbox cmd response: success
2,775,880 UART: [afmc] ++
2,776,048 UART: [afmc] CDI.KEYID = 6
2,776,411 UART: [afmc] SUBJECT.KEYID = 7
2,776,837 UART: [afmc] AUTHORITY.KEYID = 5
2,813,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,461 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,190 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,073 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,792 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,421 UART: [afmc] --
2,856,375 UART: [cold-reset] --
2,857,095 UART: [state] Locking Datavault
2,858,584 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,188 UART: [state] Locking ICCM
2,859,734 UART: [exit] Launching FMC @ 0x40000130
2,865,063 UART:
2,865,079 UART: Running Caliptra FMC ...
2,865,487 UART:
2,865,630 UART: [state] CFI Enabled
2,876,005 UART: [fht] FMC Alias Private Key: 7
2,984,568 UART: [art] Extend RT PCRs Done
2,984,996 UART: [art] Lock RT PCRs Done
2,986,620 UART: [art] Populate DV Done
2,994,689 UART: [fht] FMC Alias Private Key: 7
2,995,791 UART: [art] Derive CDI
2,996,071 UART: [art] Store in in slot 0x4
3,082,078 UART: [art] Derive Key Pair
3,082,438 UART: [art] Store priv key in slot 0x5
3,095,670 UART: [art] Derive Key Pair - Done
3,110,308 UART: [art] Signing Cert with AUTHO
3,110,788 UART: RITY.KEYID = 7
3,126,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,291 UART: [art] PUB.X = 6347C3EC76DC3B7CFD498F85A808D6BCE1AEF83C808B03FB6949EC64FAFE0E3A89CB564258226AC7BC6FB04FB0FCEE73
3,134,078 UART: [art] PUB.Y = 411780DC904E048E968A74BC72D230321942CFAA909238485D605AA633A98CE42BCF732B762B307E25E66C0A6E26A074
3,141,018 UART: [art] SIG.R = 88F32FEAB8401A2612EBEDB802238FF878F6DDCCC1728B2B939CD76B5F02F5AF9A5A2E28020706CCDC65AD8E041EAEC0
3,147,792 UART: [art] SIG.S = 188C26360049B537598C1EA6971218C25CD7DA9BC8CEAE60CC7B6B27A2A36B735DAC7D3DE530D6458B17787618B387E0
3,171,523 UART: Caliptra RT
3,171,868 UART: [state] CFI Enabled
3,279,871 UART: [rt] RT listening for mailbox commands...
3,280,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,251 UART: [rt]cmd =0x44504543, len=96
3,491,632 >>> mbox cmd response data (6236 bytes)
3,491,633 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,304 UART: [rt]cmd =0x52564348, len=36
3,523,496 >>> mbox cmd response data (8 bytes)
3,523,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,553,698 UART: [rt]cmd =0x44504543, len=96
3,733,657 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,911 ready_for_fw is high
1,055,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,203 >>> mbox cmd response: success
2,687,387 UART:
2,687,403 UART: Running Caliptra FMC ...
2,687,811 UART:
2,687,954 UART: [state] CFI Enabled
2,698,639 UART: [fht] FMC Alias Private Key: 7
2,806,994 UART: [art] Extend RT PCRs Done
2,807,422 UART: [art] Lock RT PCRs Done
2,809,022 UART: [art] Populate DV Done
2,817,247 UART: [fht] FMC Alias Private Key: 7
2,818,203 UART: [art] Derive CDI
2,818,483 UART: [art] Store in in slot 0x4
2,904,276 UART: [art] Derive Key Pair
2,904,636 UART: [art] Store priv key in slot 0x5
2,917,330 UART: [art] Derive Key Pair - Done
2,932,157 UART: [art] Signing Cert with AUTHO
2,932,637 UART: RITY.KEYID = 7
2,947,561 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,326 UART: [art] PUB.X = 65D585FB3E5DE0E1EE1F5DE643D66FD4605FDBD54A1C99640B02DD0DC3B2F147314A71DC81D5709252B138A0050A12FA
2,955,093 UART: [art] PUB.Y = EE15751112C7385A43863A6D707FBA64F876E074FB81062DF8C9A81ACD5C1483D5CE97FD9C3515A870A114BB4A6D7A46
2,962,046 UART: [art] SIG.R = 68631C12911059C07CCB7A0AE73196E8B2034F0C05CA80AC5767AFA5A98135F8204004E223D9EB2AA552738F4E2ABD94
2,968,803 UART: [art] SIG.S = BFDA8FE0CC86A3190F5249C44DDD6A40CDB439DC81184A516652BAD028881DE5E7D061D65D7CB3BD1B9622EC8C1985B2
2,992,773 UART: Caliptra RT
2,993,118 UART: [state] CFI Enabled
3,100,807 UART: [rt] RT listening for mailbox commands...
3,101,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,879 UART: [rt]cmd =0x44504543, len=96
3,313,031 >>> mbox cmd response data (6236 bytes)
3,313,032 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,641 UART: [rt]cmd =0x52564348, len=36
3,344,553 >>> mbox cmd response data (8 bytes)
3,344,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,495 UART: [rt]cmd =0x44504543, len=96
3,555,549 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,021 UART:
192,378 UART: Running Caliptra ROM ...
193,572 UART:
193,731 UART: [state] CFI Enabled
265,231 UART: [state] LifecycleState = Unprovisioned
267,228 UART: [state] DebugLocked = No
268,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,920 UART: [kat] SHA2-256
443,601 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,121 UART: [kat] ++
454,577 UART: [kat] sha1
465,187 UART: [kat] SHA2-256
467,848 UART: [kat] SHA2-384
473,623 UART: [kat] SHA2-512-ACC
475,989 UART: [kat] ECC-384
2,768,304 UART: [kat] HMAC-384Kdf
2,801,999 UART: [kat] LMS
3,992,315 UART: [kat] --
3,998,768 UART: [cold-reset] ++
3,999,924 UART: [fht] Storing FHT @ 0x50003400
4,011,735 UART: [idev] ++
4,012,390 UART: [idev] CDI.KEYID = 6
4,013,329 UART: [idev] SUBJECT.KEYID = 7
4,014,445 UART: [idev] UDS.KEYID = 0
4,015,532 ready_for_fw is high
4,015,754 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,241 UART: [idev] Erasing UDS.KEYID = 0
7,347,679 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,068 UART: [idev] --
7,373,219 UART: [ldev] ++
7,373,805 UART: [ldev] CDI.KEYID = 6
7,374,730 UART: [ldev] SUBJECT.KEYID = 5
7,375,945 UART: [ldev] AUTHORITY.KEYID = 7
7,377,234 UART: [ldev] FE.KEYID = 1
7,423,855 UART: [ldev] Erasing FE.KEYID = 1
10,757,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,073,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,102,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,117,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,137,578 UART: [ldev] --
13,142,857 UART: [fwproc] Waiting for Commands...
13,146,038 UART: [fwproc] Received command 0x46574c44
13,148,274 UART: [fwproc] Received Image of size 114124 bytes
17,202,914 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,279,897 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,348,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,666,287 >>> mbox cmd response: success
17,670,407 UART: [afmc] ++
17,671,021 UART: [afmc] CDI.KEYID = 6
17,671,942 UART: [afmc] SUBJECT.KEYID = 7
17,673,157 UART: [afmc] AUTHORITY.KEYID = 5
21,028,468 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,094 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,524 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,362 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,802 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,399,151 UART: [afmc] --
23,402,915 UART: [cold-reset] --
23,406,185 UART: [state] Locking Datavault
23,410,956 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,709 UART: [state] Locking ICCM
23,414,432 UART: [exit] Launching FMC @ 0x40000130
23,422,830 UART:
23,423,065 UART: Running Caliptra FMC ...
23,424,174 UART:
23,424,357 UART: [state] CFI Enabled
23,489,008 UART: [fht] FMC Alias Private Key: 7
25,826,940 UART: [art] Extend RT PCRs Done
25,828,178 UART: [art] Lock RT PCRs Done
25,830,165 UART: [art] Populate DV Done
25,835,524 UART: [fht] FMC Alias Private Key: 7
25,837,060 UART: [art] Derive CDI
25,837,800 UART: [art] Store in in slot 0x4
25,897,440 UART: [art] Derive Key Pair
25,898,485 UART: [art] Store priv key in slot 0x5
29,191,224 UART: [art] Derive Key Pair - Done
29,204,383 UART: [art] Signing Cert with AUTHO
29,205,697 UART: RITY.KEYID = 7
31,492,516 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,018 UART: [art] PUB.X = 01E7C056B077E772CCD571D088F85D5AF71657088F0C4062A4553C5F3ADBEDE139A469BA053AEF00D05652EE74709D09
31,501,216 UART: [art] PUB.Y = CDC91A6158AF33499D742A9FEBEBE979D3F6AAD0978B944E6E9C039B44FA46536F98A112F43571B8FF10CD74ED7AB899
31,508,461 UART: [art] SIG.R = 17F128205B61ABD67C69A20F1DAA23A90207499CE92233C3520771CC69916E7C0AD2AAA658479D6B0C2CFB93C7C37925
31,515,848 UART: [art] SIG.S = 1C03F27B3B01E0C3F45BA004FC31AB82289F4F28C73A094792EE216F659F468099EA91AC408A03BDE9DF7F227DD10A25
32,820,888 UART: Caliptra RT
32,821,599 UART: [state] CFI Enabled
32,982,328 UART: [rt] RT listening for mailbox commands...
32,984,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,014,811 UART: [rt]cmd =0x44504543, len=96
38,799,715 >>> mbox cmd response data (6236 bytes)
38,829,127 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,859,092 UART: [rt]cmd =0x52564348, len=36
38,861,425 >>> mbox cmd response data (8 bytes)
38,861,785 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,891,871 UART: [rt]cmd =0x52564348, len=36
38,893,773 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,803,974 ready_for_fw is high
3,804,412 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,846,850 >>> mbox cmd response: success
23,539,278 UART:
23,539,723 UART: Running Caliptra FMC ...
23,540,835 UART:
23,540,995 UART: [state] CFI Enabled
23,607,958 UART: [fht] FMC Alias Private Key: 7
25,945,829 UART: [art] Extend RT PCRs Done
25,947,058 UART: [art] Lock RT PCRs Done
25,948,701 UART: [art] Populate DV Done
25,954,286 UART: [fht] FMC Alias Private Key: 7
25,955,881 UART: [art] Derive CDI
25,956,630 UART: [art] Store in in slot 0x4
26,016,919 UART: [art] Derive Key Pair
26,017,944 UART: [art] Store priv key in slot 0x5
29,310,796 UART: [art] Derive Key Pair - Done
29,323,848 UART: [art] Signing Cert with AUTHO
29,325,188 UART: RITY.KEYID = 7
31,612,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,614,034 UART: [art] PUB.X = B8369E85417D50B56ACFB0CF669913FDF9F2C7934D43E8628669D498BE8BB93B9D436017C91ED684863434CB16DEBFBA
31,621,262 UART: [art] PUB.Y = 12C29A02447C468149905AE7E26299CCEBD1CA52BE5B3A6F288887EFBC37012AAFD41319642D8D293389D5C3B27FCC20
31,628,524 UART: [art] SIG.R = 7116B0E22DAA7D2373D2F6B2B028BDF331854D95A05967435D3929C8D83CEA6D1C09243BB081F29A791344F8CFCAE792
31,635,907 UART: [art] SIG.S = 3DA45E7C35B4315D5B1BEE118411CC61304311367BE133EDD70F8FACDFFD3B68B96187247D5B47DA0ED6B8EACEC2DBA7
32,941,529 UART: Caliptra RT
32,942,237 UART: [state] CFI Enabled
33,121,742 UART: [rt] RT listening for mailbox commands...
33,123,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,154,541 UART: [rt]cmd =0x44504543, len=96
38,918,240 >>> mbox cmd response data (6236 bytes)
38,947,409 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,977,795 UART: [rt]cmd =0x52564348, len=36
38,980,508 >>> mbox cmd response data (8 bytes)
38,980,927 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,011,045 UART: [rt]cmd =0x52564348, len=36
39,012,800 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,367 UART:
192,898 UART: Running Caliptra ROM ...
194,028 UART:
603,432 UART: [state] CFI Enabled
617,030 UART: [state] LifecycleState = Unprovisioned
618,987 UART: [state] DebugLocked = No
620,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,684 UART: [kat] SHA2-256
794,418 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,009 UART: [kat] ++
805,542 UART: [kat] sha1
816,131 UART: [kat] SHA2-256
818,850 UART: [kat] SHA2-384
824,863 UART: [kat] SHA2-512-ACC
827,269 UART: [kat] ECC-384
3,111,135 UART: [kat] HMAC-384Kdf
3,123,807 UART: [kat] LMS
4,313,882 UART: [kat] --
4,317,615 UART: [cold-reset] ++
4,319,193 UART: [fht] Storing FHT @ 0x50003400
4,330,878 UART: [idev] ++
4,331,445 UART: [idev] CDI.KEYID = 6
4,332,491 UART: [idev] SUBJECT.KEYID = 7
4,333,589 UART: [idev] UDS.KEYID = 0
4,334,617 ready_for_fw is high
4,334,839 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,242 UART: [idev] Erasing UDS.KEYID = 0
7,621,102 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,358 UART: [idev] --
7,647,456 UART: [ldev] ++
7,648,023 UART: [ldev] CDI.KEYID = 6
7,648,988 UART: [ldev] SUBJECT.KEYID = 5
7,650,193 UART: [ldev] AUTHORITY.KEYID = 7
7,651,475 UART: [ldev] FE.KEYID = 1
7,662,390 UART: [ldev] Erasing FE.KEYID = 1
10,949,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,842 UART: [ldev] --
13,310,818 UART: [fwproc] Waiting for Commands...
13,313,725 UART: [fwproc] Received command 0x46574c44
13,315,963 UART: [fwproc] Received Image of size 114124 bytes
17,370,728 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,267 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,830,734 >>> mbox cmd response: success
17,835,325 UART: [afmc] ++
17,835,940 UART: [afmc] CDI.KEYID = 6
17,836,851 UART: [afmc] SUBJECT.KEYID = 7
17,838,061 UART: [afmc] AUTHORITY.KEYID = 5
21,152,233 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,598 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,826 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,251 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,067 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,491 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,739 UART: [afmc] --
23,517,196 UART: [cold-reset] --
23,521,269 UART: [state] Locking Datavault
23,527,015 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,770 UART: [state] Locking ICCM
23,530,375 UART: [exit] Launching FMC @ 0x40000130
23,538,774 UART:
23,539,008 UART: Running Caliptra FMC ...
23,540,112 UART:
23,540,267 UART: [state] CFI Enabled
23,548,385 UART: [fht] FMC Alias Private Key: 7
25,879,049 UART: [art] Extend RT PCRs Done
25,880,294 UART: [art] Lock RT PCRs Done
25,881,939 UART: [art] Populate DV Done
25,887,399 UART: [fht] FMC Alias Private Key: 7
25,888,878 UART: [art] Derive CDI
25,889,631 UART: [art] Store in in slot 0x4
25,932,162 UART: [art] Derive Key Pair
25,933,157 UART: [art] Store priv key in slot 0x5
29,175,916 UART: [art] Derive Key Pair - Done
29,188,805 UART: [art] Signing Cert with AUTHO
29,190,107 UART: RITY.KEYID = 7
31,469,457 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,957 UART: [art] PUB.X = 642BD8713546E3C90A2ABF664613474566113016FC3DB1453D21982E854B0FB4A2EB78D578AAFE48638EE83B34959A0B
31,478,177 UART: [art] PUB.Y = 57833717F704D667195F131CD2BAE0D3DBE31659958498857555635272576C452820A68F236647A1DAE08DBBEE6D5091
31,485,439 UART: [art] SIG.R = 95F027F9031E1859CE4E67653CCB9DC0B1158BBC4437991456519758E744E173B36D448EC613B381C6E0EE1DF561DD20
31,492,812 UART: [art] SIG.S = A84EC3B163CF250ABB91FBDD613F7C446E8462BE0E88121B3EB25F921F356727CDB8FC7F0F4F7486F1F6DBA100A7D802
32,798,013 UART: Caliptra RT
32,798,731 UART: [state] CFI Enabled
32,916,028 UART: [rt] RT listening for mailbox commands...
32,917,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,948,717 UART: [rt]cmd =0x44504543, len=96
38,621,490 >>> mbox cmd response data (6236 bytes)
38,650,713 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,681,010 UART: [rt]cmd =0x52564348, len=36
38,683,645 >>> mbox cmd response data (8 bytes)
38,684,085 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,714,215 UART: [rt]cmd =0x52564348, len=36
38,715,861 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
4,126,536 ready_for_fw is high
4,127,098 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,831 >>> mbox cmd response: success
23,717,226 UART:
23,717,629 UART: Running Caliptra FMC ...
23,718,736 UART:
23,718,890 UART: [state] CFI Enabled
23,726,946 UART: [fht] FMC Alias Private Key: 7
26,057,306 UART: [art] Extend RT PCRs Done
26,058,551 UART: [art] Lock RT PCRs Done
26,060,398 UART: [art] Populate DV Done
26,065,879 UART: [fht] FMC Alias Private Key: 7
26,067,529 UART: [art] Derive CDI
26,068,343 UART: [art] Store in in slot 0x4
26,110,948 UART: [art] Derive Key Pair
26,111,984 UART: [art] Store priv key in slot 0x5
29,353,702 UART: [art] Derive Key Pair - Done
29,366,682 UART: [art] Signing Cert with AUTHO
29,368,029 UART: RITY.KEYID = 7
31,647,504 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,014 UART: [art] PUB.X = 028FCCF67EEC4BB9DD63E2F3E0F8EBBE234B74AB1C449B02D15B0DECE28B26803E9FB31E345C39933249B5E6CB9B2C04
31,656,313 UART: [art] PUB.Y = C7402CAF411326B86452177FDEE2EA9E48AC421830372A54085AA66D11756941659A02E27B7727968A5F8DCC32923261
31,663,491 UART: [art] SIG.R = DB8DDCA0D23A9E089032B6CF23C854D96FF16E3CDE7F48F647AFAE55A7085E07AEF171170EF98004FD3E85257BCC16E0
31,670,933 UART: [art] SIG.S = 0477340F47350E02BDBC03C77E88059358C4EE6F91F6D21B6F38E73D1EF750A9148EDA78E7D52A0901C7ACC7377CF81F
32,976,548 UART: Caliptra RT
32,977,265 UART: [state] CFI Enabled
33,094,917 UART: [rt] RT listening for mailbox commands...
33,096,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,127,397 UART: [rt]cmd =0x44504543, len=96
38,799,735 >>> mbox cmd response data (6236 bytes)
38,829,009 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,859,247 UART: [rt]cmd =0x52564348, len=36
38,861,413 >>> mbox cmd response data (8 bytes)
38,861,834 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,891,766 UART: [rt]cmd =0x52564348, len=36
38,893,506 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
191,948 UART:
192,309 UART: Running Caliptra ROM ...
193,483 UART:
193,633 UART: [state] CFI Enabled
268,104 UART: [state] LifecycleState = Unprovisioned
270,009 UART: [state] DebugLocked = No
271,550 UART: [state] WD Timer not started. Device not locked for debugging
275,086 UART: [kat] SHA2-256
454,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,790 UART: [kat] ++
466,240 UART: [kat] sha1
476,255 UART: [kat] SHA2-256
479,260 UART: [kat] SHA2-384
485,464 UART: [kat] SHA2-512-ACC
488,396 UART: [kat] ECC-384
2,951,332 UART: [kat] HMAC-384Kdf
2,975,079 UART: [kat] LMS
3,504,486 UART: [kat] --
3,508,078 UART: [cold-reset] ++
3,508,941 UART: [fht] FHT @ 0x50003400
3,520,697 UART: [idev] ++
3,521,266 UART: [idev] CDI.KEYID = 6
3,522,177 UART: [idev] SUBJECT.KEYID = 7
3,523,352 UART: [idev] UDS.KEYID = 0
3,524,397 ready_for_fw is high
3,524,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,704 UART: [idev] Erasing UDS.KEYID = 0
6,026,093 UART: [idev] Sha1 KeyId Algorithm
6,048,656 UART: [idev] --
6,051,278 UART: [ldev] ++
6,051,857 UART: [ldev] CDI.KEYID = 6
6,052,748 UART: [ldev] SUBJECT.KEYID = 5
6,053,913 UART: [ldev] AUTHORITY.KEYID = 7
6,055,151 UART: [ldev] FE.KEYID = 1
6,082,544 UART: [ldev] Erasing FE.KEYID = 1
8,585,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,289 UART: [ldev] --
10,375,640 UART: [fwproc] Wait for Commands...
10,378,712 UART: [fwproc] Recv command 0x46574c44
10,380,804 UART: [fwproc] Recv'd Img size: 114448 bytes
13,781,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,858,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,927,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,244,660 >>> mbox cmd response: success
14,249,338 UART: [afmc] ++
14,249,960 UART: [afmc] CDI.KEYID = 6
14,250,873 UART: [afmc] SUBJECT.KEYID = 7
14,251,895 UART: [afmc] AUTHORITY.KEYID = 5
16,791,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,512,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,514,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,529,842 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,545,841 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,561,705 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,584,970 UART: [afmc] --
18,588,233 UART: [cold-reset] --
18,591,547 UART: [state] Locking Datavault
18,596,953 UART: [state] Locking PCR0, PCR1 and PCR31
18,598,602 UART: [state] Locking ICCM
18,600,160 UART: [exit] Launching FMC @ 0x40000130
18,608,621 UART:
18,608,893 UART: Running Caliptra FMC ...
18,609,946 UART:
18,610,096 UART: [state] CFI Enabled
18,672,082 UART: [fht] FMC Alias Private Key: 7
20,435,893 UART: [art] Extend RT PCRs Done
20,437,105 UART: [art] Lock RT PCRs Done
20,438,729 UART: [art] Populate DV Done
20,443,932 UART: [fht] FMC Alias Private Key: 7
20,445,505 UART: [art] Derive CDI
20,446,251 UART: [art] Store in in slot 0x4
20,504,857 UART: [art] Derive Key Pair
20,505,853 UART: [art] Store priv key in slot 0x5
22,969,214 UART: [art] Derive Key Pair - Done
22,982,315 UART: [art] Signing Cert with AUTHO
22,983,617 UART: RITY.KEYID = 7
24,694,206 UART: [art] Erasing AUTHORITY.KEYID = 7
24,695,702 UART: [art] PUB.X = 2229C880E5073ACEC0DD9C779E20232B52006DD1FCC8582BEA459027F6E20BBA81FF02CE9DAF51B370B89F43C3E431C3
24,703,026 UART: [art] PUB.Y = 86CA6B21058DD7D3A2196C20B97780BFAEE36133809DB1089270154B7615A272AE56773C15DE1870A5B221CA38627359
24,710,219 UART: [art] SIG.R = 9D8CD9542FD4C1F10BB10ACE8169E3C16F3E971F140735A2D4ECD1D25D9F5038A8C6A5C8CB3F54EDFEEB40C51EF7A4F5
24,717,680 UART: [art] SIG.S = D0F2FF1AB9271D91AE38A5D110D51A61334340870AF8D207C79C666FC363AAAFCE0F680A1623151FA1EF71F5F3982591
25,697,072 UART: Caliptra RT
25,697,778 UART: [state] CFI Enabled
25,862,635 UART: [rt] RT listening for mailbox commands...
25,864,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,895,682 UART: [rt]cmd =0x44504543, len=96
30,255,535 >>> mbox cmd response data (6236 bytes)
30,284,717 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,314,959 UART: [rt]cmd =0x52564348, len=36
30,317,325 >>> mbox cmd response data (8 bytes)
30,317,784 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,347,590 UART: [rt]cmd =0x52564348, len=36
30,349,137 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,362,018 ready_for_fw is high
3,362,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,722 >>> mbox cmd response: success
18,361,144 UART:
18,361,530 UART: Running Caliptra FMC ...
18,362,726 UART:
18,362,893 UART: [state] CFI Enabled
18,426,954 UART: [fht] FMC Alias Private Key: 7
20,191,308 UART: [art] Extend RT PCRs Done
20,192,535 UART: [art] Lock RT PCRs Done
20,194,105 UART: [art] Populate DV Done
20,199,355 UART: [fht] FMC Alias Private Key: 7
20,201,061 UART: [art] Derive CDI
20,201,886 UART: [art] Store in in slot 0x4
20,259,980 UART: [art] Derive Key Pair
20,261,021 UART: [art] Store priv key in slot 0x5
22,724,347 UART: [art] Derive Key Pair - Done
22,737,559 UART: [art] Signing Cert with AUTHO
22,738,859 UART: RITY.KEYID = 7
24,449,968 UART: [art] Erasing AUTHORITY.KEYID = 7
24,451,475 UART: [art] PUB.X = C3E074ECFCAB582047D64E422BDA35324F6524FD5FD48C6C385ED7B0882C669E735DD049634E7E3D464F34C1462F99E0
24,458,723 UART: [art] PUB.Y = A96DABC92369C5F1915CADD184FDB33AE0FB1D7151AAFADE01316E94CC92A68F724766D5616A41CF21D8392C84C33288
24,466,041 UART: [art] SIG.R = AA194CAE1E1146F036C7A4860FB3994A4BCB877E62D9F29639CC54D25992F3BD31098B487B2528E67DE7F1259568A1E0
24,473,433 UART: [art] SIG.S = 2207BBA233AC555AF100E3F9881627E3266DF49AF879F752B7B90D8BB99EACEDB14E1A7A69BC51DE80B8AC4EC0396098
25,451,907 UART: Caliptra RT
25,452,618 UART: [state] CFI Enabled
25,619,074 UART: [rt] RT listening for mailbox commands...
25,620,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,651,963 UART: [rt]cmd =0x44504543, len=96
30,030,982 >>> mbox cmd response data (6236 bytes)
30,060,266 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,090,403 UART: [rt]cmd =0x52564348, len=36
30,093,083 >>> mbox cmd response data (8 bytes)
30,093,504 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,123,422 UART: [rt]cmd =0x52564348, len=36
30,124,926 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,312 UART:
192,694 UART: Running Caliptra ROM ...
193,788 UART:
603,569 UART: [state] CFI Enabled
615,871 UART: [state] LifecycleState = Unprovisioned
617,730 UART: [state] DebugLocked = No
619,663 UART: [state] WD Timer not started. Device not locked for debugging
622,625 UART: [kat] SHA2-256
801,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,317 UART: [kat] ++
813,765 UART: [kat] sha1
824,509 UART: [kat] SHA2-256
827,533 UART: [kat] SHA2-384
835,292 UART: [kat] SHA2-512-ACC
838,233 UART: [kat] ECC-384
3,276,899 UART: [kat] HMAC-384Kdf
3,288,932 UART: [kat] LMS
3,818,420 UART: [kat] --
3,822,865 UART: [cold-reset] ++
3,824,155 UART: [fht] FHT @ 0x50003400
3,835,354 UART: [idev] ++
3,835,914 UART: [idev] CDI.KEYID = 6
3,836,792 UART: [idev] SUBJECT.KEYID = 7
3,838,028 UART: [idev] UDS.KEYID = 0
3,838,924 ready_for_fw is high
3,839,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,982,943 UART: [idev] Erasing UDS.KEYID = 0
6,314,358 UART: [idev] Sha1 KeyId Algorithm
6,336,653 UART: [idev] --
6,339,938 UART: [ldev] ++
6,340,502 UART: [ldev] CDI.KEYID = 6
6,341,406 UART: [ldev] SUBJECT.KEYID = 5
6,342,555 UART: [ldev] AUTHORITY.KEYID = 7
6,343,852 UART: [ldev] FE.KEYID = 1
6,351,307 UART: [ldev] Erasing FE.KEYID = 1
8,825,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,435 UART: [ldev] --
10,613,190 UART: [fwproc] Wait for Commands...
10,615,763 UART: [fwproc] Recv command 0x46574c44
10,617,847 UART: [fwproc] Recv'd Img size: 114448 bytes
14,020,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,376 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,481,275 >>> mbox cmd response: success
14,484,718 UART: [afmc] ++
14,485,357 UART: [afmc] CDI.KEYID = 6
14,486,265 UART: [afmc] SUBJECT.KEYID = 7
14,487,418 UART: [afmc] AUTHORITY.KEYID = 5
16,989,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,949 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,700 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,759 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,675 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,741 UART: [afmc] --
18,788,941 UART: [cold-reset] --
18,793,611 UART: [state] Locking Datavault
18,799,284 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,976 UART: [state] Locking ICCM
18,802,900 UART: [exit] Launching FMC @ 0x40000130
18,811,348 UART:
18,811,599 UART: Running Caliptra FMC ...
18,812,699 UART:
18,812,847 UART: [state] CFI Enabled
18,820,567 UART: [fht] FMC Alias Private Key: 7
20,577,083 UART: [art] Extend RT PCRs Done
20,578,313 UART: [art] Lock RT PCRs Done
20,580,043 UART: [art] Populate DV Done
20,585,614 UART: [fht] FMC Alias Private Key: 7
20,587,318 UART: [art] Derive CDI
20,588,130 UART: [art] Store in in slot 0x4
20,630,785 UART: [art] Derive Key Pair
20,631,824 UART: [art] Store priv key in slot 0x5
23,058,034 UART: [art] Derive Key Pair - Done
23,070,764 UART: [art] Signing Cert with AUTHO
23,072,063 UART: RITY.KEYID = 7
24,777,388 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,918 UART: [art] PUB.X = 3AB30AE4B1B51BE5820DC399025EEEE57F539EBD6DF09665B0C646BF2CC4AA56F8D1231B89CDFEE65CF57E5A1F627146
24,786,206 UART: [art] PUB.Y = 5870C54BEF48AA5813497F62FE711A8521C3F7E9A3A028259555F0AB4ED19236B820FBBFD061E1F67A4D23CC9ADCFD9A
24,793,470 UART: [art] SIG.R = AEA840C74DE0A9C9B4EC915082106FF4550EE41A9804702494369DD32EA227D2D43F22904E0868FE2E2AE1E80FAD0A22
24,800,904 UART: [art] SIG.S = 17450827A9877C186010E1B6AFEA58D6E711DF341D637E9B5A1FEDD2A89757B174C6AAD55B9BDBF50A2D0C4DB39E3905
25,779,543 UART: Caliptra RT
25,780,241 UART: [state] CFI Enabled
25,896,773 UART: [rt] RT listening for mailbox commands...
25,898,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,929,121 UART: [rt]cmd =0x44504543, len=96
30,211,400 >>> mbox cmd response data (6236 bytes)
30,240,522 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,270,516 UART: [rt]cmd =0x52564348, len=36
30,273,218 >>> mbox cmd response data (8 bytes)
30,273,650 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,303,631 UART: [rt]cmd =0x52564348, len=36
30,305,262 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,694,122 ready_for_fw is high
3,694,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,141 >>> mbox cmd response: success
18,522,097 UART:
18,522,504 UART: Running Caliptra FMC ...
18,523,627 UART:
18,523,777 UART: [state] CFI Enabled
18,531,537 UART: [fht] FMC Alias Private Key: 7
20,288,157 UART: [art] Extend RT PCRs Done
20,289,379 UART: [art] Lock RT PCRs Done
20,290,996 UART: [art] Populate DV Done
20,296,244 UART: [fht] FMC Alias Private Key: 7
20,297,726 UART: [art] Derive CDI
20,298,478 UART: [art] Store in in slot 0x4
20,340,796 UART: [art] Derive Key Pair
20,341,792 UART: [art] Store priv key in slot 0x5
22,768,632 UART: [art] Derive Key Pair - Done
22,781,525 UART: [art] Signing Cert with AUTHO
22,782,824 UART: RITY.KEYID = 7
24,488,240 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,721 UART: [art] PUB.X = 12F428A884A7EDE46BC3ECC935594A61868ECC94E49562D6DAA47CCD30B39477C2386916B0698823F554951F78219064
24,496,947 UART: [art] PUB.Y = 60134BE85FC94399A742CBD27E0ECF90936FDCEEE036C7AE45BC2B78D868C86B937FD7ED91D9C85C482D6DE56D909731
24,504,240 UART: [art] SIG.R = 165235BA87B8099876C215C79B1EFD406AE7D4C20E175DDC8E432BEAE5D176B145AD68B8CAC71BD14F329BBBEBC0788D
24,511,666 UART: [art] SIG.S = 1F6DE790394459AE3AB4AFC969EC38CD5F411945B363126AC41F839876773E2457534223C2965B31BE49E2F34E5D0969
25,490,519 UART: Caliptra RT
25,491,235 UART: [state] CFI Enabled
25,608,034 UART: [rt] RT listening for mailbox commands...
25,609,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,640,497 UART: [rt]cmd =0x44504543, len=96
29,922,713 >>> mbox cmd response data (6236 bytes)
29,952,049 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,982,028 UART: [rt]cmd =0x52564348, len=36
29,984,616 >>> mbox cmd response data (8 bytes)
29,985,029 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,015,206 UART: [rt]cmd =0x52564348, len=36
30,016,926 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,434,906 ready_for_fw is high
3,435,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,709,475 >>> mbox cmd response: success
19,002,865 UART:
19,003,282 UART: Running Caliptra FMC ...
19,004,437 UART:
19,004,605 UART: [state] CFI Enabled
19,073,408 UART: [fht] FMC Alias Private Key: 7
20,837,002 UART: [art] Extend RT PCRs Done
20,838,231 UART: [art] Lock RT PCRs Done
20,839,616 UART: [art] Populate DV Done
20,844,871 UART: [fht] FMC Alias Private Key: 7
20,846,572 UART: [art] Derive CDI
20,847,388 UART: [art] Store in in slot 0x4
20,906,458 UART: [art] Derive Key Pair
20,907,503 UART: [art] Store priv key in slot 0x5
23,370,638 UART: [art] Derive Key Pair - Done
23,383,532 UART: [art] Signing Cert with AUTHO
23,384,837 UART: RITY.KEYID = 7
25,096,122 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,632 UART: [art] PUB.X = 369D4E4EFE299446E6B611185EACCB9944289A6BF8738AAA1749BA8F0FBD6D161DC97DF034059BE4A8352E7747C84726
25,104,930 UART: [art] PUB.Y = 37504D8C75276AE421FF9DDA80AB9F5D88C96B3B3EF4D93E2635A11E489B2954DC768022DDD7109EC3966C3B481A6D9D
25,112,153 UART: [art] SIG.R = B4681098DE2B4A9D6675D736EA3364FF183B38DAC0A979D762E5688FD23E0ACF73F7281953FD88D758A5717E5BBD627E
25,119,561 UART: [art] SIG.S = 3DBA9BA4BDCD0E70C2D08A2CAE048968ACCA50608B14477B46032FC35B2EA51A9209F62B277AFDF217FC030443BD1B29
26,098,669 UART: Caliptra RT
26,099,369 UART: [state] CFI Enabled
26,264,749 UART: [rt] RT listening for mailbox commands...
26,266,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,297,814 UART: [rt]cmd =0x44504543, len=96
30,655,449 >>> mbox cmd response data (6236 bytes)
30,684,611 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,714,900 UART: [rt]cmd =0x52564348, len=36
30,717,420 >>> mbox cmd response data (8 bytes)
30,717,847 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,747,980 UART: [rt]cmd =0x52564348, len=36
30,749,852 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,748,784 ready_for_fw is high
3,749,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,410 >>> mbox cmd response: success
19,216,376 UART:
19,216,783 UART: Running Caliptra FMC ...
19,217,969 UART:
19,218,134 UART: [state] CFI Enabled
19,226,036 UART: [fht] FMC Alias Private Key: 7
20,982,639 UART: [art] Extend RT PCRs Done
20,983,862 UART: [art] Lock RT PCRs Done
20,985,562 UART: [art] Populate DV Done
20,991,352 UART: [fht] FMC Alias Private Key: 7
20,992,996 UART: [art] Derive CDI
20,993,725 UART: [art] Store in in slot 0x4
21,036,278 UART: [art] Derive Key Pair
21,037,275 UART: [art] Store priv key in slot 0x5
23,464,174 UART: [art] Derive Key Pair - Done
23,476,949 UART: [art] Signing Cert with AUTHO
23,478,245 UART: RITY.KEYID = 7
25,183,881 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,388 UART: [art] PUB.X = 2E23370DC6A0504DC845D1F9AFE07AAA4AB8A092690E227B8949F18C25D1D3A1BD7ACF023BF3CDE2F55AE53A300C3E8D
25,192,667 UART: [art] PUB.Y = 63317C2FBBB4F8F2C82DDE9714982DBA487B9C8859AA57BA811BEC6347B6F95322B228D4C75E1842DA6CF493FB8545E9
25,199,937 UART: [art] SIG.R = F8D3FFDE6835AE2B4AB4EB8DAC5E2E7D4B3433AE1EE5F50E26938B6F4F80AE1B93A90B6E63A9783E79DE28E2D6A1041A
25,207,355 UART: [art] SIG.S = 853A2C453DAAF2F2DADE1919FEFF705729AC8912AAAF04E56C8DAC1286F78AE042B4B4E111C9880773E4C553CDAFE5B1
26,185,806 UART: Caliptra RT
26,186,493 UART: [state] CFI Enabled
26,303,603 UART: [rt] RT listening for mailbox commands...
26,305,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,336,178 UART: [rt]cmd =0x44504543, len=96
30,620,546 >>> mbox cmd response data (6236 bytes)
30,649,696 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,679,888 UART: [rt]cmd =0x52564348, len=36
30,682,850 >>> mbox cmd response data (8 bytes)
30,683,179 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,713,397 UART: [rt]cmd =0x52564348, len=36
30,715,156 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,312 UART: [state] LifecycleState = Unprovisioned
84,967 UART: [state] DebugLocked = No
85,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,255 UART: [kat] SHA2-256
881,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,301 UART: [kat] ++
885,453 UART: [kat] sha1
889,647 UART: [kat] SHA2-256
891,585 UART: [kat] SHA2-384
894,214 UART: [kat] SHA2-512-ACC
896,115 UART: [kat] ECC-384
901,884 UART: [kat] HMAC-384Kdf
906,284 UART: [kat] LMS
1,474,480 UART: [kat] --
1,475,411 UART: [cold-reset] ++
1,475,877 UART: [fht] Storing FHT @ 0x50003400
1,478,660 UART: [idev] ++
1,478,828 UART: [idev] CDI.KEYID = 6
1,479,188 UART: [idev] SUBJECT.KEYID = 7
1,479,612 UART: [idev] UDS.KEYID = 0
1,479,957 ready_for_fw is high
1,479,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,620 UART: [idev] Erasing UDS.KEYID = 0
1,504,276 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,742 UART: [idev] --
1,513,783 UART: [ldev] ++
1,513,951 UART: [ldev] CDI.KEYID = 6
1,514,314 UART: [ldev] SUBJECT.KEYID = 5
1,514,740 UART: [ldev] AUTHORITY.KEYID = 7
1,515,203 UART: [ldev] FE.KEYID = 1
1,520,161 UART: [ldev] Erasing FE.KEYID = 1
1,546,326 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,468 UART: [ldev] --
1,585,811 UART: [fwproc] Waiting for Commands...
1,586,556 UART: [fwproc] Received command 0x46574c44
1,587,347 UART: [fwproc] Received Image of size 114448 bytes
2,886,576 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,820 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,172 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,199 >>> mbox cmd response: success
3,079,421 UART: [afmc] ++
3,079,589 UART: [afmc] CDI.KEYID = 6
3,079,951 UART: [afmc] SUBJECT.KEYID = 7
3,080,376 UART: [afmc] AUTHORITY.KEYID = 5
3,115,433 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,657 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,270 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,960 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,693 UART: [afmc] --
3,158,581 UART: [cold-reset] --
3,159,397 UART: [state] Locking Datavault
3,160,594 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,198 UART: [state] Locking ICCM
3,161,644 UART: [exit] Launching FMC @ 0x40000130
3,166,973 UART:
3,166,989 UART: Running Caliptra FMC ...
3,167,397 UART:
3,167,451 UART: [state] CFI Enabled
3,177,690 UART: [fht] FMC Alias Private Key: 7
3,286,457 UART: [art] Extend RT PCRs Done
3,286,885 UART: [art] Lock RT PCRs Done
3,288,809 UART: [art] Populate DV Done
3,297,364 UART: [fht] FMC Alias Private Key: 7
3,298,366 UART: [art] Derive CDI
3,298,646 UART: [art] Store in in slot 0x4
3,384,015 UART: [art] Derive Key Pair
3,384,375 UART: [art] Store priv key in slot 0x5
3,397,851 UART: [art] Derive Key Pair - Done
3,412,512 UART: [art] Signing Cert with AUTHO
3,412,992 UART: RITY.KEYID = 7
3,428,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,407 UART: [art] PUB.X = E16137F1ACDF5C4A6566D3A5361EBF005FD51EA25212B8A6655EFE6AC848F9FC70A4C95AC8020DBF442FDE756068DDCB
3,436,169 UART: [art] PUB.Y = 82363DFA86C555E97659E72DE0764530A12B574F2A3FE2FB0B693114FFC5C4CF780390ACE216A454E71B098488986EB0
3,443,110 UART: [art] SIG.R = 43A949A2BBB055006DFCB99079A27F7058D1A56ECF76DDF401D6A8BA53D3C64194176896DBC73A059AC01BAEB49C7714
3,449,862 UART: [art] SIG.S = 8DC668CE204979284CBBD8DBC033610C4455AFBBAEB9F3F7349A4652A5FEA209CF5D0778B1474FCE857BFD3D59C440B7
3,473,926 UART: Caliptra RT
3,474,179 UART: [state] CFI Enabled
3,582,086 UART: [rt] RT listening for mailbox commands...
3,582,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,426 UART: [rt]cmd =0x44504543, len=96
3,794,061 >>> mbox cmd response data (6236 bytes)
3,794,062 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,553 UART: [rt]cmd =0x52564348, len=36
3,825,925 >>> mbox cmd response data (8 bytes)
3,825,926 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,223 UART: [rt]cmd =0x52564348, len=36
3,856,838 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,827 ready_for_fw is high
1,362,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,247 >>> mbox cmd response: success
2,989,517 UART:
2,989,533 UART: Running Caliptra FMC ...
2,989,941 UART:
2,989,995 UART: [state] CFI Enabled
3,000,180 UART: [fht] FMC Alias Private Key: 7
3,108,083 UART: [art] Extend RT PCRs Done
3,108,511 UART: [art] Lock RT PCRs Done
3,109,863 UART: [art] Populate DV Done
3,118,148 UART: [fht] FMC Alias Private Key: 7
3,119,304 UART: [art] Derive CDI
3,119,584 UART: [art] Store in in slot 0x4
3,205,311 UART: [art] Derive Key Pair
3,205,671 UART: [art] Store priv key in slot 0x5
3,218,573 UART: [art] Derive Key Pair - Done
3,233,377 UART: [art] Signing Cert with AUTHO
3,233,857 UART: RITY.KEYID = 7
3,248,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,628 UART: [art] PUB.X = ABB6927FCB983A8F6BFC22406F02871822559C2E59D78734B17A8D73DDFCC19C8CC6FABF737243C7FA031ECAC732A862
3,256,406 UART: [art] PUB.Y = E29E6D729B117303DB577DC029775E1B0A118337F06FA09AC0C866A3E40F20975294CDA29759155556809991A5EBC753
3,263,339 UART: [art] SIG.R = 9AF1D01E3D636BD6B3AF597012D5717CCAC69A70DF9775017F63F3BB9245CF13F9980B25DD96CA49D2F003E459D23382
3,270,106 UART: [art] SIG.S = E0D1CDE0552177EBBFC1EC4F746C2F29BCB232A8FDBDB0E2ABB016B78BB166DECF64CB0AA5542C9D06B621205FDD6796
3,294,159 UART: Caliptra RT
3,294,412 UART: [state] CFI Enabled
3,402,018 UART: [rt] RT listening for mailbox commands...
3,402,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,940 UART: [rt]cmd =0x44504543, len=96
3,613,363 >>> mbox cmd response data (6236 bytes)
3,613,364 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,963 UART: [rt]cmd =0x52564348, len=36
3,644,995 >>> mbox cmd response data (8 bytes)
3,644,996 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,674,485 UART: [rt]cmd =0x52564348, len=36
3,675,928 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,348 UART: [kat] SHA2-256
882,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,394 UART: [kat] ++
886,546 UART: [kat] sha1
890,760 UART: [kat] SHA2-256
892,698 UART: [kat] SHA2-384
895,349 UART: [kat] SHA2-512-ACC
897,250 UART: [kat] ECC-384
902,911 UART: [kat] HMAC-384Kdf
907,419 UART: [kat] LMS
1,475,615 UART: [kat] --
1,476,396 UART: [cold-reset] ++
1,476,748 UART: [fht] Storing FHT @ 0x50003400
1,479,515 UART: [idev] ++
1,479,683 UART: [idev] CDI.KEYID = 6
1,480,043 UART: [idev] SUBJECT.KEYID = 7
1,480,467 UART: [idev] UDS.KEYID = 0
1,480,812 ready_for_fw is high
1,480,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,909 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,559 UART: [idev] --
1,515,570 UART: [ldev] ++
1,515,738 UART: [ldev] CDI.KEYID = 6
1,516,101 UART: [ldev] SUBJECT.KEYID = 5
1,516,527 UART: [ldev] AUTHORITY.KEYID = 7
1,516,990 UART: [ldev] FE.KEYID = 1
1,522,014 UART: [ldev] Erasing FE.KEYID = 1
1,548,065 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,409 UART: [ldev] --
1,587,714 UART: [fwproc] Waiting for Commands...
1,588,501 UART: [fwproc] Received command 0x46574c44
1,589,292 UART: [fwproc] Received Image of size 114448 bytes
2,888,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,707 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,059 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,160 >>> mbox cmd response: success
3,082,298 UART: [afmc] ++
3,082,466 UART: [afmc] CDI.KEYID = 6
3,082,828 UART: [afmc] SUBJECT.KEYID = 7
3,083,253 UART: [afmc] AUTHORITY.KEYID = 5
3,118,394 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,814 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,594 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,322 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,207 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,897 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,546 UART: [afmc] --
3,161,500 UART: [cold-reset] --
3,162,496 UART: [state] Locking Datavault
3,163,533 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,137 UART: [state] Locking ICCM
3,164,809 UART: [exit] Launching FMC @ 0x40000130
3,170,138 UART:
3,170,154 UART: Running Caliptra FMC ...
3,170,562 UART:
3,170,705 UART: [state] CFI Enabled
3,180,984 UART: [fht] FMC Alias Private Key: 7
3,289,469 UART: [art] Extend RT PCRs Done
3,289,897 UART: [art] Lock RT PCRs Done
3,291,481 UART: [art] Populate DV Done
3,299,866 UART: [fht] FMC Alias Private Key: 7
3,300,936 UART: [art] Derive CDI
3,301,216 UART: [art] Store in in slot 0x4
3,386,783 UART: [art] Derive Key Pair
3,387,143 UART: [art] Store priv key in slot 0x5
3,400,315 UART: [art] Derive Key Pair - Done
3,415,344 UART: [art] Signing Cert with AUTHO
3,415,824 UART: RITY.KEYID = 7
3,430,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,589 UART: [art] PUB.X = 9D745283E52A9BAFA74ACB6707E42FA7E470B0A0CD55DA43D2BC873DF3D99607C591BF6F3B3EE604C8410A04DC4462DA
3,438,360 UART: [art] PUB.Y = 2A418463FEF274432F0EFC74E2F7346FE1A95E7FDBC5F778A19312200CBB11D0E15EC1E179A7D5B28A32E2661E7C9D3B
3,445,316 UART: [art] SIG.R = BBCC874CBFCEF9192E0B1C713E18C4E967245E874AE7D50299BDEC1E2A13CC94A2B0076C8BE5618E19A5B0240982A15B
3,452,088 UART: [art] SIG.S = BF190D69C04D5E6F85541FD3DC73341619D3A5D83FC8FD2023A510631656BAE6950E1B314D253DA69261721D270A88B1
3,476,092 UART: Caliptra RT
3,476,437 UART: [state] CFI Enabled
3,584,467 UART: [rt] RT listening for mailbox commands...
3,585,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,625 UART: [rt]cmd =0x44504543, len=96
3,795,528 >>> mbox cmd response data (6236 bytes)
3,795,529 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,334 UART: [rt]cmd =0x52564348, len=36
3,827,502 >>> mbox cmd response data (8 bytes)
3,827,503 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,857,218 UART: [rt]cmd =0x52564348, len=36
3,858,829 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,244 ready_for_fw is high
1,363,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,624 >>> mbox cmd response: success
2,991,062 UART:
2,991,078 UART: Running Caliptra FMC ...
2,991,486 UART:
2,991,629 UART: [state] CFI Enabled
3,002,496 UART: [fht] FMC Alias Private Key: 7
3,110,351 UART: [art] Extend RT PCRs Done
3,110,779 UART: [art] Lock RT PCRs Done
3,112,497 UART: [art] Populate DV Done
3,120,796 UART: [fht] FMC Alias Private Key: 7
3,121,956 UART: [art] Derive CDI
3,122,236 UART: [art] Store in in slot 0x4
3,207,881 UART: [art] Derive Key Pair
3,208,241 UART: [art] Store priv key in slot 0x5
3,221,175 UART: [art] Derive Key Pair - Done
3,235,735 UART: [art] Signing Cert with AUTHO
3,236,215 UART: RITY.KEYID = 7
3,251,671 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,436 UART: [art] PUB.X = 5863E2CF92BC04AC029B49E9B67829892ADB6E40B614F2B684132A7C1B189D725BE1404DDE1EFE6B328EC17F19AAC852
3,259,210 UART: [art] PUB.Y = 867D89319B7036C1E86E9BBE0284F5B60477F2188EF6F27B27C5C5D6A76C64EF724AA71E817504CF42BE8FEDC458B730
3,266,157 UART: [art] SIG.R = 3F81A2F3BCB7C635DCF220512B38CA9298B27C8D681DEC70205D5251524118C00C531BC15BBEC6F53DD60B13A3101B9A
3,272,929 UART: [art] SIG.S = 4653E855B73D107DA6A7E0CFE5808D6E126A329CFED39AAD2C92DC2A4FA6289E13AA3EEEEB406D19EE4119C39582E707
3,296,661 UART: Caliptra RT
3,297,006 UART: [state] CFI Enabled
3,405,394 UART: [rt] RT listening for mailbox commands...
3,406,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,762 UART: [rt]cmd =0x44504543, len=96
3,617,536 >>> mbox cmd response data (6236 bytes)
3,617,537 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,978 UART: [rt]cmd =0x52564348, len=36
3,649,552 >>> mbox cmd response data (8 bytes)
3,649,553 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,678,936 UART: [rt]cmd =0x52564348, len=36
3,680,495 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
892,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,097 UART: [kat] ++
897,249 UART: [kat] sha1
901,461 UART: [kat] SHA2-256
903,401 UART: [kat] SHA2-384
905,944 UART: [kat] SHA2-512-ACC
907,845 UART: [kat] ECC-384
917,392 UART: [kat] HMAC-384Kdf
922,068 UART: [kat] LMS
1,170,396 UART: [kat] --
1,171,323 UART: [cold-reset] ++
1,171,845 UART: [fht] FHT @ 0x50003400
1,174,492 UART: [idev] ++
1,174,660 UART: [idev] CDI.KEYID = 6
1,175,020 UART: [idev] SUBJECT.KEYID = 7
1,175,444 UART: [idev] UDS.KEYID = 0
1,175,789 ready_for_fw is high
1,175,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,616 UART: [idev] Erasing UDS.KEYID = 0
1,200,415 UART: [idev] Sha1 KeyId Algorithm
1,208,977 UART: [idev] --
1,210,083 UART: [ldev] ++
1,210,251 UART: [ldev] CDI.KEYID = 6
1,210,614 UART: [ldev] SUBJECT.KEYID = 5
1,211,040 UART: [ldev] AUTHORITY.KEYID = 7
1,211,503 UART: [ldev] FE.KEYID = 1
1,216,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,816 UART: [fwproc] Wait for Commands...
1,282,492 UART: [fwproc] Recv command 0x46574c44
1,283,220 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,539 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,640 >>> mbox cmd response: success
2,774,784 UART: [afmc] ++
2,774,952 UART: [afmc] CDI.KEYID = 6
2,775,314 UART: [afmc] SUBJECT.KEYID = 7
2,775,739 UART: [afmc] AUTHORITY.KEYID = 5
2,811,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,191 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,076 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,795 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,661 UART: [afmc] --
2,854,709 UART: [cold-reset] --
2,855,667 UART: [state] Locking Datavault
2,856,992 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,596 UART: [state] Locking ICCM
2,858,242 UART: [exit] Launching FMC @ 0x40000130
2,863,571 UART:
2,863,587 UART: Running Caliptra FMC ...
2,863,995 UART:
2,864,049 UART: [state] CFI Enabled
2,874,844 UART: [fht] FMC Alias Private Key: 7
2,983,305 UART: [art] Extend RT PCRs Done
2,983,733 UART: [art] Lock RT PCRs Done
2,985,041 UART: [art] Populate DV Done
2,993,166 UART: [fht] FMC Alias Private Key: 7
2,994,312 UART: [art] Derive CDI
2,994,592 UART: [art] Store in in slot 0x4
3,079,927 UART: [art] Derive Key Pair
3,080,287 UART: [art] Store priv key in slot 0x5
3,093,223 UART: [art] Derive Key Pair - Done
3,107,715 UART: [art] Signing Cert with AUTHO
3,108,195 UART: RITY.KEYID = 7
3,123,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,086 UART: [art] PUB.X = D9D003E627818ACD675C01EA5B9E9ED5602104910F3304243EEFD5C25D3DF40C446A0F6BCC077B20976C932CD3A31CEB
3,130,842 UART: [art] PUB.Y = C0167589CB8BD85EACCE1323ABB55F12C95DF1600D6A0280EA7B614C9478A33C767A982FF59B4ACC65EA835B85C1F309
3,137,795 UART: [art] SIG.R = 8E50AC31BEE000F615584919FB45159FF9799E864BB9F304CE64E40A9D60CB5C84896DFF6F45D385474D05FAF64E6C64
3,144,540 UART: [art] SIG.S = 1925D18F0A577E7050A63ACBE4CFE8D81537D551F8FDD3762735FA5AAA88FE058157409035566CD831E27499BCA93FAB
3,168,489 UART: Caliptra RT
3,168,742 UART: [state] CFI Enabled
3,276,155 UART: [rt] RT listening for mailbox commands...
3,276,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,577 UART: [rt]cmd =0x44504543, len=96
3,487,336 >>> mbox cmd response data (6236 bytes)
3,487,337 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,962 UART: [rt]cmd =0x52564348, len=36
3,519,196 >>> mbox cmd response data (8 bytes)
3,519,197 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,548,442 UART: [rt]cmd =0x52564348, len=36
3,550,069 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,601 ready_for_fw is high
1,059,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,121 >>> mbox cmd response: success
2,690,373 UART:
2,690,389 UART: Running Caliptra FMC ...
2,690,797 UART:
2,690,851 UART: [state] CFI Enabled
2,701,626 UART: [fht] FMC Alias Private Key: 7
2,809,009 UART: [art] Extend RT PCRs Done
2,809,437 UART: [art] Lock RT PCRs Done
2,811,223 UART: [art] Populate DV Done
2,819,764 UART: [fht] FMC Alias Private Key: 7
2,820,730 UART: [art] Derive CDI
2,821,010 UART: [art] Store in in slot 0x4
2,906,581 UART: [art] Derive Key Pair
2,906,941 UART: [art] Store priv key in slot 0x5
2,920,337 UART: [art] Derive Key Pair - Done
2,934,948 UART: [art] Signing Cert with AUTHO
2,935,428 UART: RITY.KEYID = 7
2,950,462 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,227 UART: [art] PUB.X = 64A5F0040C154FD0CF912F846B9714003AABADF647E47C4AA78BD302B690CDAAEE6FCB4C8495127912F58D40F360BE5C
2,957,980 UART: [art] PUB.Y = 953D86E4258C5141407E7B95EEB1D7DAA64EAF6FE0E302A345F2463E33D020C3D1EEDAAE2ACE58B64FADE9E49D9F15A6
2,964,949 UART: [art] SIG.R = 00C87A05A51195D91F57596A6E866A43E94D1EFA253106E20D0D838D98458800F5C5D4B5293BDBAA8BD1B09D709A3807
2,971,660 UART: [art] SIG.S = 5F4A7C105797F2FFE7AA22592CD7618BBE8418D1FEABCA386302BEDBF6C4F8F42DE2C9427DC2C8A203F39D6EBDE4AAD5
2,995,491 UART: Caliptra RT
2,995,744 UART: [state] CFI Enabled
3,105,280 UART: [rt] RT listening for mailbox commands...
3,105,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,124 UART: [rt]cmd =0x44504543, len=96
3,316,184 >>> mbox cmd response data (6236 bytes)
3,316,185 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,618 UART: [rt]cmd =0x52564348, len=36
3,347,786 >>> mbox cmd response data (8 bytes)
3,347,787 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,312 UART: [rt]cmd =0x52564348, len=36
3,378,907 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
893,759 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,884 UART: [kat] ++
898,036 UART: [kat] sha1
902,290 UART: [kat] SHA2-256
904,230 UART: [kat] SHA2-384
906,955 UART: [kat] SHA2-512-ACC
908,856 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
922,841 UART: [kat] LMS
1,171,169 UART: [kat] --
1,172,174 UART: [cold-reset] ++
1,172,552 UART: [fht] FHT @ 0x50003400
1,175,355 UART: [idev] ++
1,175,523 UART: [idev] CDI.KEYID = 6
1,175,883 UART: [idev] SUBJECT.KEYID = 7
1,176,307 UART: [idev] UDS.KEYID = 0
1,176,652 ready_for_fw is high
1,176,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,285 UART: [idev] Erasing UDS.KEYID = 0
1,201,436 UART: [idev] Sha1 KeyId Algorithm
1,209,724 UART: [idev] --
1,210,898 UART: [ldev] ++
1,211,066 UART: [ldev] CDI.KEYID = 6
1,211,429 UART: [ldev] SUBJECT.KEYID = 5
1,211,855 UART: [ldev] AUTHORITY.KEYID = 7
1,212,318 UART: [ldev] FE.KEYID = 1
1,217,356 UART: [ldev] Erasing FE.KEYID = 1
1,243,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,630 UART: [ldev] --
1,282,959 UART: [fwproc] Wait for Commands...
1,283,779 UART: [fwproc] Recv command 0x46574c44
1,284,507 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,939 >>> mbox cmd response: success
2,777,173 UART: [afmc] ++
2,777,341 UART: [afmc] CDI.KEYID = 6
2,777,703 UART: [afmc] SUBJECT.KEYID = 7
2,778,128 UART: [afmc] AUTHORITY.KEYID = 5
2,813,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,132 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,860 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,464 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,160 UART: [afmc] --
2,857,190 UART: [cold-reset] --
2,858,188 UART: [state] Locking Datavault
2,859,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,159 UART: [state] Locking ICCM
2,860,631 UART: [exit] Launching FMC @ 0x40000130
2,865,960 UART:
2,865,976 UART: Running Caliptra FMC ...
2,866,384 UART:
2,866,527 UART: [state] CFI Enabled
2,877,320 UART: [fht] FMC Alias Private Key: 7
2,985,701 UART: [art] Extend RT PCRs Done
2,986,129 UART: [art] Lock RT PCRs Done
2,987,531 UART: [art] Populate DV Done
2,995,790 UART: [fht] FMC Alias Private Key: 7
2,996,826 UART: [art] Derive CDI
2,997,106 UART: [art] Store in in slot 0x4
3,082,563 UART: [art] Derive Key Pair
3,082,923 UART: [art] Store priv key in slot 0x5
3,096,255 UART: [art] Derive Key Pair - Done
3,110,948 UART: [art] Signing Cert with AUTHO
3,111,428 UART: RITY.KEYID = 7
3,126,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,707 UART: [art] PUB.X = 690338588EE20E5692F8821203D4BE2219ED0FBC940226951A6FE3AE2FA97B44916D1EB00385B434E3FE45EAF82D0A4A
3,134,460 UART: [art] PUB.Y = 4625516D001CE944A8224346792CBAAB4A0187FA7778FBD2F18FA0A052D5F18ABB89EB414008D49743DA807304F61893
3,141,377 UART: [art] SIG.R = 13C9CAAE7C72573BCEBC43CDD2D437D780D1A8066B43685136310CFA90CCBFBD98A7252C81A86285194C0A92CB055B1B
3,148,147 UART: [art] SIG.S = A40D5DD91BB46A068DDA2BC6EAE970C615E2F3150E5D8C23B6D6092E9DED28ECA50E3BB9BC77E8B53E3CEF21B85B6027
3,171,365 UART: Caliptra RT
3,171,710 UART: [state] CFI Enabled
3,280,077 UART: [rt] RT listening for mailbox commands...
3,280,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,987 UART: [rt]cmd =0x44504543, len=96
3,491,087 >>> mbox cmd response data (6236 bytes)
3,491,088 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,613 UART: [rt]cmd =0x52564348, len=36
3,522,585 >>> mbox cmd response data (8 bytes)
3,522,586 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,127 UART: [rt]cmd =0x52564348, len=36
3,553,734 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,634 ready_for_fw is high
1,060,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,374 >>> mbox cmd response: success
2,691,308 UART:
2,691,324 UART: Running Caliptra FMC ...
2,691,732 UART:
2,691,875 UART: [state] CFI Enabled
2,702,442 UART: [fht] FMC Alias Private Key: 7
2,810,425 UART: [art] Extend RT PCRs Done
2,810,853 UART: [art] Lock RT PCRs Done
2,812,361 UART: [art] Populate DV Done
2,820,360 UART: [fht] FMC Alias Private Key: 7
2,821,358 UART: [art] Derive CDI
2,821,638 UART: [art] Store in in slot 0x4
2,907,715 UART: [art] Derive Key Pair
2,908,075 UART: [art] Store priv key in slot 0x5
2,921,663 UART: [art] Derive Key Pair - Done
2,936,237 UART: [art] Signing Cert with AUTHO
2,936,717 UART: RITY.KEYID = 7
2,952,501 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,266 UART: [art] PUB.X = F05C41B7E8485D11448D3FF97C9D139791279F2C48D444332127C513738A943325F2E379A2847C91BA0DF6619C0B0BD3
2,960,019 UART: [art] PUB.Y = 308727FC953F985EDF31810B4BE592FCC5EAE6E92FFB468DF311284B4A8B8623B6704E1A57B48B0BA8CCC257451CD547
2,966,973 UART: [art] SIG.R = A751E8878805ECB0B802769E3F3FE53121760EEE7DB5090FF6E8B57C005FE6C216F217828C012EAD52D2AB9BE8F4C8D5
2,973,713 UART: [art] SIG.S = 4A66858A75A07D5C01C033F4268C8BD0323AE4B2687CF1A4882B5C5865FD26B3C617C6DA83FDBF537D6EE06B9E358315
2,997,225 UART: Caliptra RT
2,997,570 UART: [state] CFI Enabled
3,104,963 UART: [rt] RT listening for mailbox commands...
3,105,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,093 UART: [rt]cmd =0x44504543, len=96
3,317,019 >>> mbox cmd response data (6236 bytes)
3,317,020 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,731 UART: [rt]cmd =0x52564348, len=36
3,348,845 >>> mbox cmd response data (8 bytes)
3,348,846 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,387 UART: [rt]cmd =0x52564348, len=36
3,379,794 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,842 UART: [kat] SHA2-512-ACC
906,743 UART: [kat] ECC-384
916,064 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,423 UART: [fht] FHT @ 0x50003400
1,173,109 UART: [idev] ++
1,173,277 UART: [idev] CDI.KEYID = 6
1,173,638 UART: [idev] SUBJECT.KEYID = 7
1,174,063 UART: [idev] UDS.KEYID = 0
1,174,409 ready_for_fw is high
1,174,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,777 UART: [idev] Erasing UDS.KEYID = 0
1,198,825 UART: [idev] Sha1 KeyId Algorithm
1,207,865 UART: [idev] --
1,208,736 UART: [ldev] ++
1,208,904 UART: [ldev] CDI.KEYID = 6
1,209,268 UART: [ldev] SUBJECT.KEYID = 5
1,209,695 UART: [ldev] AUTHORITY.KEYID = 7
1,210,158 UART: [ldev] FE.KEYID = 1
1,215,060 UART: [ldev] Erasing FE.KEYID = 1
1,241,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,418 UART: [ldev] --
1,280,782 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x46574c44
1,282,340 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,743 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,980 >>> mbox cmd response: success
2,775,201 UART: [afmc] ++
2,775,369 UART: [afmc] CDI.KEYID = 6
2,775,732 UART: [afmc] SUBJECT.KEYID = 7
2,776,158 UART: [afmc] AUTHORITY.KEYID = 5
2,811,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,554 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,166 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,885 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,814 UART: [afmc] --
2,854,856 UART: [cold-reset] --
2,855,716 UART: [state] Locking Datavault
2,856,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,451 UART: [state] Locking ICCM
2,858,115 UART: [exit] Launching FMC @ 0x40000130
2,863,444 UART:
2,863,460 UART: Running Caliptra FMC ...
2,863,868 UART:
2,863,922 UART: [state] CFI Enabled
2,874,111 UART: [fht] FMC Alias Private Key: 7
2,981,658 UART: [art] Extend RT PCRs Done
2,982,086 UART: [art] Lock RT PCRs Done
2,983,498 UART: [art] Populate DV Done
2,991,827 UART: [fht] FMC Alias Private Key: 7
2,992,869 UART: [art] Derive CDI
2,993,149 UART: [art] Store in in slot 0x4
3,079,018 UART: [art] Derive Key Pair
3,079,378 UART: [art] Store priv key in slot 0x5
3,092,902 UART: [art] Derive Key Pair - Done
3,107,693 UART: [art] Signing Cert with AUTHO
3,108,173 UART: RITY.KEYID = 7
3,123,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,976 UART: [art] PUB.X = 70B90B6EC4809BD252DC1CF10E256A65C80AF577D6B4871FEB0EF24C91E5C0A1932AF35384907E49EF745D383C07256F
3,130,737 UART: [art] PUB.Y = 4C6CF36AE2E3987F374365FF9009F93D0FBF1304A6E087884019A3425BE6ADF6DE28E778B173F47386825CF93D873775
3,137,676 UART: [art] SIG.R = 22DEC7B6EA30B6875BC0BB80417C0EE83D04439ABB09969A034C08F90771187F812F567AEA06CDBAA8455CF3046DFE92
3,144,432 UART: [art] SIG.S = 3321DC1E3D801ED21C312933C1920EBF1E9A52144DF62DDA868308424A838B1A77138CC6872E0C68AA9EC554A8E1A235
3,168,532 UART: Caliptra RT
3,168,785 UART: [state] CFI Enabled
3,276,892 UART: [rt] RT listening for mailbox commands...
3,277,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,798 UART: [rt]cmd =0x44504543, len=96
3,488,367 >>> mbox cmd response data (6236 bytes)
3,488,368 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,113 UART: [rt]cmd =0x52564348, len=36
3,520,399 >>> mbox cmd response data (8 bytes)
3,520,400 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,549,833 UART: [rt]cmd =0x52564348, len=36
3,551,198 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,536 ready_for_fw is high
1,055,536 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,904 >>> mbox cmd response: success
2,685,804 UART:
2,685,820 UART: Running Caliptra FMC ...
2,686,228 UART:
2,686,282 UART: [state] CFI Enabled
2,696,667 UART: [fht] FMC Alias Private Key: 7
2,804,264 UART: [art] Extend RT PCRs Done
2,804,692 UART: [art] Lock RT PCRs Done
2,806,170 UART: [art] Populate DV Done
2,814,265 UART: [fht] FMC Alias Private Key: 7
2,815,397 UART: [art] Derive CDI
2,815,677 UART: [art] Store in in slot 0x4
2,901,236 UART: [art] Derive Key Pair
2,901,596 UART: [art] Store priv key in slot 0x5
2,914,588 UART: [art] Derive Key Pair - Done
2,929,284 UART: [art] Signing Cert with AUTHO
2,929,764 UART: RITY.KEYID = 7
2,945,530 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,295 UART: [art] PUB.X = 1FC405E9DDF37195E9647D770570F0AFB1808C84AA9D915C1487B144CB261DBB9C6BF11BC3A977C072220C73EBECED23
2,953,068 UART: [art] PUB.Y = BC1E2E18CB823FCE5086F944CDDD91EB7518D0590AB54907B728D85C9E20B6639799BB5E33082A1CF59B1611D80144AA
2,960,012 UART: [art] SIG.R = DF995660AF7F1320D9C598037A89690DA4F5A7DD4C0158DFCA228FAA9EC12E8C9B36EA1B8F8DFD88DC5FC12691D74D8D
2,966,793 UART: [art] SIG.S = 5E4C5405C84ED0A2DFAC7583CF7F354973F6CA288AA070D721B482487E812E6C03C4212BFE5E4FFF1F408F8055DF098E
2,990,789 UART: Caliptra RT
2,991,042 UART: [state] CFI Enabled
3,098,735 UART: [rt] RT listening for mailbox commands...
3,099,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,915 UART: [rt]cmd =0x44504543, len=96
3,310,165 >>> mbox cmd response data (6236 bytes)
3,310,166 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,793 UART: [rt]cmd =0x52564348, len=36
3,342,217 >>> mbox cmd response data (8 bytes)
3,342,218 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,873 UART: [rt]cmd =0x52564348, len=36
3,373,296 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
915,983 UART: [kat] HMAC-384Kdf
920,505 UART: [kat] LMS
1,168,817 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,170,148 UART: [fht] FHT @ 0x50003400
1,172,962 UART: [idev] ++
1,173,130 UART: [idev] CDI.KEYID = 6
1,173,491 UART: [idev] SUBJECT.KEYID = 7
1,173,916 UART: [idev] UDS.KEYID = 0
1,174,262 ready_for_fw is high
1,174,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,246 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,428 UART: [idev] --
1,209,457 UART: [ldev] ++
1,209,625 UART: [ldev] CDI.KEYID = 6
1,209,989 UART: [ldev] SUBJECT.KEYID = 5
1,210,416 UART: [ldev] AUTHORITY.KEYID = 7
1,210,879 UART: [ldev] FE.KEYID = 1
1,216,139 UART: [ldev] Erasing FE.KEYID = 1
1,242,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,455 UART: [ldev] --
1,281,947 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,393 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,223 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,095 >>> mbox cmd response: success
2,776,318 UART: [afmc] ++
2,776,486 UART: [afmc] CDI.KEYID = 6
2,776,849 UART: [afmc] SUBJECT.KEYID = 7
2,777,275 UART: [afmc] AUTHORITY.KEYID = 5
2,812,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,577 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,306 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,189 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,908 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,587 UART: [afmc] --
2,856,613 UART: [cold-reset] --
2,857,655 UART: [state] Locking Datavault
2,859,254 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,858 UART: [state] Locking ICCM
2,860,478 UART: [exit] Launching FMC @ 0x40000130
2,865,807 UART:
2,865,823 UART: Running Caliptra FMC ...
2,866,231 UART:
2,866,374 UART: [state] CFI Enabled
2,876,977 UART: [fht] FMC Alias Private Key: 7
2,984,420 UART: [art] Extend RT PCRs Done
2,984,848 UART: [art] Lock RT PCRs Done
2,986,490 UART: [art] Populate DV Done
2,994,821 UART: [fht] FMC Alias Private Key: 7
2,995,873 UART: [art] Derive CDI
2,996,153 UART: [art] Store in in slot 0x4
3,081,560 UART: [art] Derive Key Pair
3,081,920 UART: [art] Store priv key in slot 0x5
3,095,284 UART: [art] Derive Key Pair - Done
3,110,335 UART: [art] Signing Cert with AUTHO
3,110,815 UART: RITY.KEYID = 7
3,126,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,886 UART: [art] PUB.X = A9C68CE02E1DF9409679E2AFE9BDA835185AEAA33060DD8EB65DBE39B253E384719FF4A1C64A0C15089A8BA6CF6A325C
3,133,668 UART: [art] PUB.Y = EDBC1760D0242F6D33D80AB22E4C03FC0AFA97D5EB2460B1EE8712C0E934495E9BEED34607EEBE2A053FD7734EE2393A
3,140,621 UART: [art] SIG.R = 27EC909E5EE21CBA6A5706A27C188EC7B7D37E58EBF43A09166863D181D22869C4EE2960C163EDDCF7A9D51D5033BFAC
3,147,399 UART: [art] SIG.S = 6B8A6DD580A20FDF29B1CAD4122627A9F868BF87AAE470E152790079FE1F27F859824B7E00AB6A6EC1001C656CE45090
3,171,485 UART: Caliptra RT
3,171,830 UART: [state] CFI Enabled
3,279,493 UART: [rt] RT listening for mailbox commands...
3,280,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,425 UART: [rt]cmd =0x44504543, len=96
3,491,099 >>> mbox cmd response data (6236 bytes)
3,491,100 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,631 UART: [rt]cmd =0x52564348, len=36
3,522,823 >>> mbox cmd response data (8 bytes)
3,522,824 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,495 UART: [rt]cmd =0x52564348, len=36
3,553,842 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,211 ready_for_fw is high
1,056,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,951 >>> mbox cmd response: success
2,687,681 UART:
2,687,697 UART: Running Caliptra FMC ...
2,688,105 UART:
2,688,248 UART: [state] CFI Enabled
2,698,899 UART: [fht] FMC Alias Private Key: 7
2,807,142 UART: [art] Extend RT PCRs Done
2,807,570 UART: [art] Lock RT PCRs Done
2,808,870 UART: [art] Populate DV Done
2,817,029 UART: [fht] FMC Alias Private Key: 7
2,818,009 UART: [art] Derive CDI
2,818,289 UART: [art] Store in in slot 0x4
2,904,074 UART: [art] Derive Key Pair
2,904,434 UART: [art] Store priv key in slot 0x5
2,917,682 UART: [art] Derive Key Pair - Done
2,932,339 UART: [art] Signing Cert with AUTHO
2,932,819 UART: RITY.KEYID = 7
2,947,859 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,624 UART: [art] PUB.X = A0B1877DF725EBF70DA079EB546FA7A9FD39BB9C2220019225053B1788F00DEF3A45914F33B8EA306A265E67C15B334E
2,955,388 UART: [art] PUB.Y = C9ADF45F1B144487930E2EAA3B709FF09B6E332D46CD484210B249CFDDFD905FA145770ED85C4F1414415238084E2C49
2,962,333 UART: [art] SIG.R = 01C4B26D16323E753432134E53BEE2995596739154204A4103B182AAC42EB62681E91048BBD9DF46D4E994D31F99F2A7
2,969,089 UART: [art] SIG.S = 1FA3686FADB808C853DA7FE74EDEFA6E0DF49E8774950B32E53C49A7023A290B210B92D02902AA413ED43F342B9B2178
2,992,731 UART: Caliptra RT
2,993,076 UART: [state] CFI Enabled
3,100,119 UART: [rt] RT listening for mailbox commands...
3,100,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,407 UART: [rt]cmd =0x44504543, len=96
3,311,528 >>> mbox cmd response data (6236 bytes)
3,311,529 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,804 UART: [rt]cmd =0x52564348, len=36
3,342,908 >>> mbox cmd response data (8 bytes)
3,342,909 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,430 UART: [rt]cmd =0x52564348, len=36
3,373,885 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,015 UART:
192,369 UART: Running Caliptra ROM ...
193,560 UART:
193,716 UART: [state] CFI Enabled
263,150 UART: [state] LifecycleState = Unprovisioned
265,069 UART: [state] DebugLocked = No
267,182 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,265 UART: [kat] SHA2-256
441,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,492 UART: [kat] ++
451,985 UART: [kat] sha1
464,564 UART: [kat] SHA2-256
467,289 UART: [kat] SHA2-384
471,928 UART: [kat] SHA2-512-ACC
474,295 UART: [kat] ECC-384
2,766,351 UART: [kat] HMAC-384Kdf
2,778,800 UART: [kat] LMS
3,969,133 UART: [kat] --
3,976,561 UART: [cold-reset] ++
3,977,786 UART: [fht] Storing FHT @ 0x50003400
3,990,121 UART: [idev] ++
3,990,762 UART: [idev] CDI.KEYID = 6
3,991,654 UART: [idev] SUBJECT.KEYID = 7
3,992,892 UART: [idev] UDS.KEYID = 0
3,993,907 ready_for_fw is high
3,994,124 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,742 UART: [idev] Erasing UDS.KEYID = 0
7,325,954 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,839 UART: [idev] --
7,350,395 UART: [ldev] ++
7,350,959 UART: [ldev] CDI.KEYID = 6
7,351,896 UART: [ldev] SUBJECT.KEYID = 5
7,353,159 UART: [ldev] AUTHORITY.KEYID = 7
7,354,312 UART: [ldev] FE.KEYID = 1
7,400,505 UART: [ldev] Erasing FE.KEYID = 1
10,737,758 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,552 UART: [ldev] --
13,114,518 UART: [fwproc] Waiting for Commands...
13,117,525 UART: [fwproc] Received command 0x46574c44
13,119,703 UART: [fwproc] Received Image of size 114124 bytes
17,167,197 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,091 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,632,732 >>> mbox cmd response: success
17,637,555 UART: [afmc] ++
17,638,177 UART: [afmc] CDI.KEYID = 6
17,639,062 UART: [afmc] SUBJECT.KEYID = 7
17,640,340 UART: [afmc] AUTHORITY.KEYID = 5
21,002,221 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,286 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,550 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,318,965 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,333,773 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,229 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,369,034 UART: [afmc] --
23,372,475 UART: [cold-reset] --
23,376,929 UART: [state] Locking Datavault
23,384,724 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,526 UART: [state] Locking ICCM
23,388,118 UART: [exit] Launching FMC @ 0x40000130
23,396,521 UART:
23,396,757 UART: Running Caliptra FMC ...
23,397,863 UART:
23,398,022 UART: [state] CFI Enabled
23,463,990 UART: [fht] FMC Alias Private Key: 7
25,801,801 UART: [art] Extend RT PCRs Done
25,803,022 UART: [art] Lock RT PCRs Done
25,804,738 UART: [art] Populate DV Done
25,810,283 UART: [fht] FMC Alias Private Key: 7
25,811,878 UART: [art] Derive CDI
25,812,618 UART: [art] Store in in slot 0x4
25,872,088 UART: [art] Derive Key Pair
25,873,132 UART: [art] Store priv key in slot 0x5
29,165,724 UART: [art] Derive Key Pair - Done
29,178,728 UART: [art] Signing Cert with AUTHO
29,180,040 UART: RITY.KEYID = 7
31,468,325 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,830 UART: [art] PUB.X = 4E1AF6EEF800464F0CAB9ADF4243D7C638DCB8EBEE218E347AEC58EC8B6DA285EC836F79C1552F978F466A1D9EDEEB1E
31,477,129 UART: [art] PUB.Y = 59F41EDEE5FBA6188C64AE509859DE200E17FF8768CA2A1A110817200008AE082DC9669C5D2365C35D50BB6308018B2C
31,484,364 UART: [art] SIG.R = 2A765C075234A0D724155844C74F9C39B34FE33FE66D83EA3D147F644556BD931C4838AF0F5991A4D8F83EF2A7FA3C66
31,491,757 UART: [art] SIG.S = AA1B4EF4451B6F8BFF395DEEDD49A8CFEBD2EF40D93F07C05191ADEA1909E483A2E53FC89278AB2DAAA09F65FE2C40BE
32,796,582 UART: Caliptra RT
32,797,293 UART: [state] CFI Enabled
32,959,388 UART: [rt] RT listening for mailbox commands...
32,961,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,992,009 UART: [rt]cmd =0x44504543, len=96
38,755,827 >>> mbox cmd response data (6236 bytes)
38,784,938 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,815,050 UART: [rt]cmd =0x52564348, len=36
38,817,708 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,785,664 ready_for_fw is high
3,786,139 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,872,226 >>> mbox cmd response: success
23,570,465 UART:
23,570,838 UART: Running Caliptra FMC ...
23,572,051 UART:
23,572,228 UART: [state] CFI Enabled
23,639,250 UART: [fht] FMC Alias Private Key: 7
25,977,241 UART: [art] Extend RT PCRs Done
25,978,466 UART: [art] Lock RT PCRs Done
25,980,316 UART: [art] Populate DV Done
25,985,683 UART: [fht] FMC Alias Private Key: 7
25,987,389 UART: [art] Derive CDI
25,988,203 UART: [art] Store in in slot 0x4
26,047,586 UART: [art] Derive Key Pair
26,048,624 UART: [art] Store priv key in slot 0x5
29,341,340 UART: [art] Derive Key Pair - Done
29,354,297 UART: [art] Signing Cert with AUTHO
29,355,612 UART: RITY.KEYID = 7
31,643,535 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,043 UART: [art] PUB.X = 4F8DF8D8EF2DCB5091022803AB3591EABCE94AD475B735D67A2DC5E1EC4ED4D92BEEE02C50521D5E9D710F606F4846A2
31,652,295 UART: [art] PUB.Y = 0572934EFCC591737D07CA49A9E5A58669C2C64209767A354A0A4B4F524C64ECA6BA4E9ABBB45B3323B705B9C808CBA0
31,659,519 UART: [art] SIG.R = 6782F23774E1AFC94308BB251F9870CD56F68F2B0CFBE03F4D08A54AC7201AB4EA20906673AD27E9B11BAAB9FDF55E25
31,666,946 UART: [art] SIG.S = 151E1F2B7E14487B514066ABB89FDBF9384717A1C512723ECD7B9B238A0B95B2A40B23D019996CB03E0A78541DD59D84
32,971,844 UART: Caliptra RT
32,972,559 UART: [state] CFI Enabled
33,135,893 UART: [rt] RT listening for mailbox commands...
33,137,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,168,384 UART: [rt]cmd =0x44504543, len=96
38,931,668 >>> mbox cmd response data (6236 bytes)
38,960,770 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,990,859 UART: [rt]cmd =0x52564348, len=36
38,993,704 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,378 UART:
192,759 UART: Running Caliptra ROM ...
193,904 UART:
603,582 UART: [state] CFI Enabled
616,765 UART: [state] LifecycleState = Unprovisioned
618,671 UART: [state] DebugLocked = No
620,136 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,304 UART: [kat] SHA2-256
795,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,556 UART: [kat] ++
806,070 UART: [kat] sha1
816,229 UART: [kat] SHA2-256
818,952 UART: [kat] SHA2-384
824,301 UART: [kat] SHA2-512-ACC
826,659 UART: [kat] ECC-384
3,112,203 UART: [kat] HMAC-384Kdf
3,124,719 UART: [kat] LMS
4,314,804 UART: [kat] --
4,320,044 UART: [cold-reset] ++
4,322,124 UART: [fht] Storing FHT @ 0x50003400
4,333,810 UART: [idev] ++
4,334,375 UART: [idev] CDI.KEYID = 6
4,335,350 UART: [idev] SUBJECT.KEYID = 7
4,336,588 UART: [idev] UDS.KEYID = 0
4,337,618 ready_for_fw is high
4,337,821 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,140 UART: [idev] Erasing UDS.KEYID = 0
7,621,603 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,729 UART: [idev] --
7,647,704 UART: [ldev] ++
7,648,270 UART: [ldev] CDI.KEYID = 6
7,649,734 UART: [ldev] SUBJECT.KEYID = 5
7,650,799 UART: [ldev] AUTHORITY.KEYID = 7
7,651,992 UART: [ldev] FE.KEYID = 1
7,664,894 UART: [ldev] Erasing FE.KEYID = 1
10,954,286 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,701 UART: [ldev] --
13,311,197 UART: [fwproc] Waiting for Commands...
13,313,771 UART: [fwproc] Received command 0x46574c44
13,315,997 UART: [fwproc] Received Image of size 114124 bytes
17,365,981 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,276 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,157 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,833,130 >>> mbox cmd response: success
17,837,107 UART: [afmc] ++
17,837,718 UART: [afmc] CDI.KEYID = 6
17,838,621 UART: [afmc] SUBJECT.KEYID = 7
17,839,885 UART: [afmc] AUTHORITY.KEYID = 5
21,153,233 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,303 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,566 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,959 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,778 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,247 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,510 UART: [afmc] --
23,521,160 UART: [cold-reset] --
23,526,534 UART: [state] Locking Datavault
23,530,808 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,561 UART: [state] Locking ICCM
23,534,387 UART: [exit] Launching FMC @ 0x40000130
23,542,775 UART:
23,543,014 UART: Running Caliptra FMC ...
23,544,134 UART:
23,544,295 UART: [state] CFI Enabled
23,552,442 UART: [fht] FMC Alias Private Key: 7
25,883,312 UART: [art] Extend RT PCRs Done
25,884,905 UART: [art] Lock RT PCRs Done
25,886,447 UART: [art] Populate DV Done
25,891,944 UART: [fht] FMC Alias Private Key: 7
25,893,483 UART: [art] Derive CDI
25,894,219 UART: [art] Store in in slot 0x4
25,936,435 UART: [art] Derive Key Pair
25,937,430 UART: [art] Store priv key in slot 0x5
29,179,600 UART: [art] Derive Key Pair - Done
29,192,475 UART: [art] Signing Cert with AUTHO
29,193,944 UART: RITY.KEYID = 7
31,473,283 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,243 UART: [art] PUB.X = 3339BA35ECD9273052A28EA7D49B8C1E4A297E58A1058A1B2791508A6CBAD3F3E32466D997103924F4E12F97128AB1BE
31,482,059 UART: [art] PUB.Y = 064334CF346204DB2EC4D0B041380CD331DE8F2CA552A9EF663651C3C85ABEDC174FEE05B1C887187B09C3B1097A5859
31,489,396 UART: [art] SIG.R = ECE6F82781BE51616D2BBA53828CAC293C2964DD030E1AD4163EA6E7B193DDD98F7EE5AA49256A9D73AE5B27BEDDA62F
31,496,648 UART: [art] SIG.S = EAD709C03AF24E6849803C1649D1573003D3D70AAEC3FCAF2B2D7E4F27D138D61661BB3842E1220707C0E6B00D339DAD
32,801,446 UART: Caliptra RT
32,802,557 UART: [state] CFI Enabled
32,919,647 UART: [rt] RT listening for mailbox commands...
32,921,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,952,401 UART: [rt]cmd =0x44504543, len=96
38,624,937 >>> mbox cmd response data (6236 bytes)
38,654,973 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,685,211 UART: [rt]cmd =0x52564348, len=36
38,687,643 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,127,913 ready_for_fw is high
4,128,354 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,080,075 >>> mbox cmd response: success
23,723,124 UART:
23,723,535 UART: Running Caliptra FMC ...
23,724,636 UART:
23,724,781 UART: [state] CFI Enabled
23,732,622 UART: [fht] FMC Alias Private Key: 7
26,063,738 UART: [art] Extend RT PCRs Done
26,064,963 UART: [art] Lock RT PCRs Done
26,066,832 UART: [art] Populate DV Done
26,072,378 UART: [fht] FMC Alias Private Key: 7
26,073,866 UART: [art] Derive CDI
26,074,596 UART: [art] Store in in slot 0x4
26,117,191 UART: [art] Derive Key Pair
26,118,224 UART: [art] Store priv key in slot 0x5
29,359,983 UART: [art] Derive Key Pair - Done
29,372,862 UART: [art] Signing Cert with AUTHO
29,374,192 UART: RITY.KEYID = 7
31,653,569 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,071 UART: [art] PUB.X = C7B44F093F02325A0DA58EEEEB41B396CBE556FCF190D335515BA1ADA6858913A285EBF3DB9392689B1FEDB9E5523CC2
31,662,359 UART: [art] PUB.Y = EE94279EC39653CDCBA9B26308426FC8D88AB0961AEC68EC62140F55620CF545F6400F844A38D72C7AB2C244D1F93AEE
31,669,621 UART: [art] SIG.R = 53FFB124E1911BB60C48C2C3400C38854FE71CA546924B54BEFADF065AAD2D4D38C68B665FF1EDE5356C4D0B610A7D3A
31,676,995 UART: [art] SIG.S = B9CE52A448092DF66E2058510DDD904A903B6B81E2E7D8AE48B53D6FD056A177496ECD7A84F03BC71E3FE49822AA70D0
32,982,164 UART: Caliptra RT
32,982,879 UART: [state] CFI Enabled
33,099,769 UART: [rt] RT listening for mailbox commands...
33,101,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,132,440 UART: [rt]cmd =0x44504543, len=96
38,804,509 >>> mbox cmd response data (6236 bytes)
38,833,873 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,864,010 UART: [rt]cmd =0x52564348, len=36
38,866,665 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,365 UART:
192,722 UART: Running Caliptra ROM ...
193,912 UART:
194,088 UART: [state] CFI Enabled
263,223 UART: [state] LifecycleState = Unprovisioned
265,147 UART: [state] DebugLocked = No
267,676 UART: [state] WD Timer not started. Device not locked for debugging
270,636 UART: [kat] SHA2-256
449,794 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,391 UART: [kat] ++
461,923 UART: [kat] sha1
473,254 UART: [kat] SHA2-256
476,244 UART: [kat] SHA2-384
482,167 UART: [kat] SHA2-512-ACC
485,105 UART: [kat] ECC-384
2,950,226 UART: [kat] HMAC-384Kdf
2,972,276 UART: [kat] LMS
3,501,714 UART: [kat] --
3,505,562 UART: [cold-reset] ++
3,507,865 UART: [fht] FHT @ 0x50003400
3,519,827 UART: [idev] ++
3,520,403 UART: [idev] CDI.KEYID = 6
3,521,332 UART: [idev] SUBJECT.KEYID = 7
3,522,505 UART: [idev] UDS.KEYID = 0
3,523,429 ready_for_fw is high
3,523,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,504 UART: [idev] Erasing UDS.KEYID = 0
6,028,109 UART: [idev] Sha1 KeyId Algorithm
6,051,014 UART: [idev] --
6,056,527 UART: [ldev] ++
6,057,096 UART: [ldev] CDI.KEYID = 6
6,058,013 UART: [ldev] SUBJECT.KEYID = 5
6,059,116 UART: [ldev] AUTHORITY.KEYID = 7
6,060,463 UART: [ldev] FE.KEYID = 1
6,100,973 UART: [ldev] Erasing FE.KEYID = 1
8,605,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,076 UART: [ldev] --
10,413,984 UART: [fwproc] Wait for Commands...
10,416,609 UART: [fwproc] Recv command 0x46574c44
10,418,696 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,415 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,289,417 >>> mbox cmd response: success
14,294,290 UART: [afmc] ++
14,294,905 UART: [afmc] CDI.KEYID = 6
14,295,821 UART: [afmc] SUBJECT.KEYID = 7
14,297,007 UART: [afmc] AUTHORITY.KEYID = 5
16,830,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,888 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,683 UART: [afmc] --
18,631,622 UART: [cold-reset] --
18,633,704 UART: [state] Locking Datavault
18,639,492 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,140 UART: [state] Locking ICCM
18,643,776 UART: [exit] Launching FMC @ 0x40000130
18,652,223 UART:
18,652,470 UART: Running Caliptra FMC ...
18,653,573 UART:
18,653,755 UART: [state] CFI Enabled
18,711,542 UART: [fht] FMC Alias Private Key: 7
20,475,942 UART: [art] Extend RT PCRs Done
20,477,169 UART: [art] Lock RT PCRs Done
20,478,955 UART: [art] Populate DV Done
20,484,093 UART: [fht] FMC Alias Private Key: 7
20,485,795 UART: [art] Derive CDI
20,486,606 UART: [art] Store in in slot 0x4
20,544,078 UART: [art] Derive Key Pair
20,545,081 UART: [art] Store priv key in slot 0x5
23,008,753 UART: [art] Derive Key Pair - Done
23,021,541 UART: [art] Signing Cert with AUTHO
23,022,841 UART: RITY.KEYID = 7
24,733,924 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,401 UART: [art] PUB.X = 03570AE665DBABB7DF7A0B46EFC45D8DFDD7766D06BB995B20DE01781327ADA4DF9070CBC3A005BBA0CB79CE45E4D163
24,742,702 UART: [art] PUB.Y = B7CCC0AAF8D19FE0795C18AABF82BA61BF3785E86F0132E14E77A725ECCC426CB3896728AAA4EF4C3BF9C224AEF66FCB
24,750,006 UART: [art] SIG.R = 6CF28E31D6E8558DDF82FF47EFB145DA147BB3AF10D32086E13532E34F3DAC2B728DA176061B143BFD9EA55D2C33A301
24,757,413 UART: [art] SIG.S = 1398AFD2DA7144999CD3147FBB093F4860FE98610DAFEC04BAB2022F622FF3FFC225E5118930EF3BD5365DD855EB3BD3
25,735,383 UART: Caliptra RT
25,736,093 UART: [state] CFI Enabled
25,902,110 UART: [rt] RT listening for mailbox commands...
25,904,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,935,172 UART: [rt]cmd =0x44504543, len=96
30,293,880 >>> mbox cmd response data (6236 bytes)
30,323,153 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,353,119 UART: [rt]cmd =0x52564348, len=36
30,355,828 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,384,193 ready_for_fw is high
3,384,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,051,090 >>> mbox cmd response: success
18,342,655 UART:
18,343,048 UART: Running Caliptra FMC ...
18,344,162 UART:
18,344,324 UART: [state] CFI Enabled
18,412,919 UART: [fht] FMC Alias Private Key: 7
20,177,515 UART: [art] Extend RT PCRs Done
20,178,738 UART: [art] Lock RT PCRs Done
20,180,582 UART: [art] Populate DV Done
20,185,882 UART: [fht] FMC Alias Private Key: 7
20,187,638 UART: [art] Derive CDI
20,188,457 UART: [art] Store in in slot 0x4
20,245,866 UART: [art] Derive Key Pair
20,246,914 UART: [art] Store priv key in slot 0x5
22,709,436 UART: [art] Derive Key Pair - Done
22,722,597 UART: [art] Signing Cert with AUTHO
22,723,898 UART: RITY.KEYID = 7
24,436,000 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,490 UART: [art] PUB.X = FDFA59219F67173E98692D220123815656950CB24D8E241AD40E4C72531C1B9E98A1F5FD5269D7CD59399A0DAB49F784
24,444,730 UART: [art] PUB.Y = ADF4794CE9260DFA9D79E0BF2B75065C0C2AAB0952F94A5478BB225028FD9F56AF5E8F4E06A4CC9915DC07C6E1AAA0F9
24,452,044 UART: [art] SIG.R = 7B3103434B1C46A105C109FA114F97EDBE95178CCE7E679BE3CF4C4F6CB3CF3FA1DD6CE693BECDFFC21D9E54C111E256
24,459,435 UART: [art] SIG.S = 2D8CBC03DB478A0597409BB6869394AADE388F51C53A540B96D70308E3C861182F8754454AB2E4CEDAC6FFBF3603243C
25,438,722 UART: Caliptra RT
25,439,437 UART: [state] CFI Enabled
25,603,265 UART: [rt] RT listening for mailbox commands...
25,605,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,636,543 UART: [rt]cmd =0x44504543, len=96
29,994,512 >>> mbox cmd response data (6236 bytes)
30,023,821 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,054,004 UART: [rt]cmd =0x52564348, len=36
30,056,269 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,527 UART:
192,897 UART: Running Caliptra ROM ...
194,001 UART:
603,607 UART: [state] CFI Enabled
615,910 UART: [state] LifecycleState = Unprovisioned
617,710 UART: [state] DebugLocked = No
620,436 UART: [state] WD Timer not started. Device not locked for debugging
623,330 UART: [kat] SHA2-256
802,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,007 UART: [kat] ++
814,483 UART: [kat] sha1
824,994 UART: [kat] SHA2-256
827,996 UART: [kat] SHA2-384
833,622 UART: [kat] SHA2-512-ACC
836,629 UART: [kat] ECC-384
3,276,034 UART: [kat] HMAC-384Kdf
3,287,839 UART: [kat] LMS
3,817,352 UART: [kat] --
3,820,698 UART: [cold-reset] ++
3,821,629 UART: [fht] FHT @ 0x50003400
3,833,380 UART: [idev] ++
3,833,943 UART: [idev] CDI.KEYID = 6
3,834,915 UART: [idev] SUBJECT.KEYID = 7
3,836,077 UART: [idev] UDS.KEYID = 0
3,836,992 ready_for_fw is high
3,837,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,980,925 UART: [idev] Erasing UDS.KEYID = 0
6,312,419 UART: [idev] Sha1 KeyId Algorithm
6,335,269 UART: [idev] --
6,339,527 UART: [ldev] ++
6,340,089 UART: [ldev] CDI.KEYID = 6
6,341,046 UART: [ldev] SUBJECT.KEYID = 5
6,342,197 UART: [ldev] AUTHORITY.KEYID = 7
6,343,476 UART: [ldev] FE.KEYID = 1
6,356,378 UART: [ldev] Erasing FE.KEYID = 1
8,828,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,194 UART: [ldev] --
10,618,242 UART: [fwproc] Wait for Commands...
10,620,186 UART: [fwproc] Recv command 0x46574c44
10,622,274 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,028 >>> mbox cmd response: success
14,492,783 UART: [afmc] ++
14,493,396 UART: [afmc] CDI.KEYID = 6
14,494,276 UART: [afmc] SUBJECT.KEYID = 7
14,495,481 UART: [afmc] AUTHORITY.KEYID = 5
16,994,927 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,733 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,491 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,505 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,397 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,675 UART: [afmc] --
18,793,028 UART: [cold-reset] --
18,796,297 UART: [state] Locking Datavault
18,802,557 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,245 UART: [state] Locking ICCM
18,805,950 UART: [exit] Launching FMC @ 0x40000130
18,814,334 UART:
18,814,560 UART: Running Caliptra FMC ...
18,815,652 UART:
18,815,801 UART: [state] CFI Enabled
18,823,999 UART: [fht] FMC Alias Private Key: 7
20,579,937 UART: [art] Extend RT PCRs Done
20,581,157 UART: [art] Lock RT PCRs Done
20,582,912 UART: [art] Populate DV Done
20,588,204 UART: [fht] FMC Alias Private Key: 7
20,589,853 UART: [art] Derive CDI
20,590,680 UART: [art] Store in in slot 0x4
20,633,442 UART: [art] Derive Key Pair
20,634,474 UART: [art] Store priv key in slot 0x5
23,060,766 UART: [art] Derive Key Pair - Done
23,073,548 UART: [art] Signing Cert with AUTHO
23,074,844 UART: RITY.KEYID = 7
24,779,713 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,211 UART: [art] PUB.X = DD5C7BBEAB5AA02705AAC917175E5B055BDCCD9109F784E0A98C2E9F9DCA70A170D51C086E12D9F1F3F106FB9825561F
24,788,490 UART: [art] PUB.Y = BCA00AE2C420DC4BF9459438D2F3666CA2305BBDD91E96A96680AD30DDE3E557F82F6202547C6DCBA17D0A80A92B7A28
24,795,809 UART: [art] SIG.R = 6FF5C8716DC008A7FAE63CBB185CC592535314BAA460C205AC9AEC6B908C290632E32370912CE6E3CB61181FE267319A
24,803,187 UART: [art] SIG.S = 039F7414EEE59C4AA223D21D5F67CCA1532053EBE3F7F4F9018818641AF2937550EB970595CB372154283BD6D7BCE7D4
25,782,564 UART: Caliptra RT
25,783,282 UART: [state] CFI Enabled
25,900,667 UART: [rt] RT listening for mailbox commands...
25,902,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,932,968 UART: [rt]cmd =0x44504543, len=96
30,215,473 >>> mbox cmd response data (6236 bytes)
30,244,575 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,275,068 UART: [rt]cmd =0x52564348, len=36
30,277,718 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,697,276 ready_for_fw is high
3,697,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,196 >>> mbox cmd response: success
18,527,366 UART:
18,527,754 UART: Running Caliptra FMC ...
18,528,843 UART:
18,528,988 UART: [state] CFI Enabled
18,536,891 UART: [fht] FMC Alias Private Key: 7
20,293,563 UART: [art] Extend RT PCRs Done
20,294,800 UART: [art] Lock RT PCRs Done
20,296,450 UART: [art] Populate DV Done
20,301,966 UART: [fht] FMC Alias Private Key: 7
20,303,451 UART: [art] Derive CDI
20,304,209 UART: [art] Store in in slot 0x4
20,346,648 UART: [art] Derive Key Pair
20,347,689 UART: [art] Store priv key in slot 0x5
22,774,642 UART: [art] Derive Key Pair - Done
22,787,476 UART: [art] Signing Cert with AUTHO
22,788,781 UART: RITY.KEYID = 7
24,494,158 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,670 UART: [art] PUB.X = BDBCE2F9A2A7E8A75A6D638EC4AFA55163918C3A42FEC2589F57F6665456DF0453698660E24ACF6FDDD97EC803374830
24,502,914 UART: [art] PUB.Y = ACF0D1A2C93AA698268BCEA8604852FF4013B1A1C5D665F1965E651D519ACB0A216D3B7A4FD714CBEB37C48E25DD6917
24,510,212 UART: [art] SIG.R = 1A748F98FE21E362BA16ADF6104A733DF91F8C9E1E0BB750C5F6DA21549F6D4C7E75F3B38244D1CE6EA7D1E613860DC7
24,517,614 UART: [art] SIG.S = 55F37B817F0332A1EBBB9127E085985DAFD00F3389650B2133843393B8BA3D8BD6E5F106DCF98FDAB9644110E1B94FAB
25,497,002 UART: Caliptra RT
25,497,713 UART: [state] CFI Enabled
25,615,110 UART: [rt] RT listening for mailbox commands...
25,617,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,647,393 UART: [rt]cmd =0x44504543, len=96
29,930,436 >>> mbox cmd response data (6236 bytes)
29,959,746 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,990,129 UART: [rt]cmd =0x52564348, len=36
29,993,161 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,438,499 ready_for_fw is high
3,438,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,747 >>> mbox cmd response: success
19,027,199 UART:
19,027,609 UART: Running Caliptra FMC ...
19,028,750 UART:
19,028,912 UART: [state] CFI Enabled
19,094,523 UART: [fht] FMC Alias Private Key: 7
20,858,509 UART: [art] Extend RT PCRs Done
20,859,734 UART: [art] Lock RT PCRs Done
20,861,112 UART: [art] Populate DV Done
20,866,598 UART: [fht] FMC Alias Private Key: 7
20,868,128 UART: [art] Derive CDI
20,868,868 UART: [art] Store in in slot 0x4
20,926,823 UART: [art] Derive Key Pair
20,927,826 UART: [art] Store priv key in slot 0x5
23,391,476 UART: [art] Derive Key Pair - Done
23,404,579 UART: [art] Signing Cert with AUTHO
23,405,884 UART: RITY.KEYID = 7
25,116,740 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,243 UART: [art] PUB.X = D5B02E9D13805AD0CFD156DD777201C9C7FA2CEDBD556288C4EC4E0A776B855AAFDEBDDDC05E822D93D94C4457650762
25,125,540 UART: [art] PUB.Y = 9165EC1986293074D3A87964EA3C390EE0C0E4EF4A92B0ADE89354EE3EA8DC064D41BE0D6A0CB38A484B0D957773CC13
25,132,843 UART: [art] SIG.R = 829418A00276DC8DE45000255C04D5AB6D5E8436FC416447B03EC739FB5B789502C10BC301264CE4E26F4EA2F45CBE51
25,140,189 UART: [art] SIG.S = 66F6F4335988726CC2443C16DC9A3E1524FC6480AB35AE4C9329B3F130E328321D61C4E22CC15AC59907BD2E70A20D5E
26,118,843 UART: Caliptra RT
26,119,550 UART: [state] CFI Enabled
26,284,901 UART: [rt] RT listening for mailbox commands...
26,286,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,317,898 UART: [rt]cmd =0x44504543, len=96
30,697,205 >>> mbox cmd response data (6236 bytes)
30,726,467 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,756,488 UART: [rt]cmd =0x52564348, len=36
30,759,002 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,760,374 ready_for_fw is high
3,760,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,966,491 >>> mbox cmd response: success
19,216,105 UART:
19,216,517 UART: Running Caliptra FMC ...
19,217,615 UART:
19,217,759 UART: [state] CFI Enabled
19,225,602 UART: [fht] FMC Alias Private Key: 7
20,982,512 UART: [art] Extend RT PCRs Done
20,983,735 UART: [art] Lock RT PCRs Done
20,985,343 UART: [art] Populate DV Done
20,990,594 UART: [fht] FMC Alias Private Key: 7
20,992,128 UART: [art] Derive CDI
20,992,857 UART: [art] Store in in slot 0x4
21,035,449 UART: [art] Derive Key Pair
21,036,492 UART: [art] Store priv key in slot 0x5
23,463,491 UART: [art] Derive Key Pair - Done
23,476,377 UART: [art] Signing Cert with AUTHO
23,477,671 UART: RITY.KEYID = 7
25,183,051 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,578 UART: [art] PUB.X = C24D63DBB648A2C4F3EBC57F369101AC16FD1F314098C7635C4190E6AE62F06C44FD78D42B9A15B6E214B5E77ED2ADF1
25,191,856 UART: [art] PUB.Y = 160D0EF16A59D2165C90BEB965508694F465C2AEA0E979753B50861935129CEF45A95D480ACA8C136A8CE35CBCD23C25
25,199,082 UART: [art] SIG.R = D58EA7C6F694C88B5FDBFF4B2CA9D36E6716C8406CD914E4DDF3B36B16C79E198AF3FA4196E791C70006875FFEAD4135
25,206,526 UART: [art] SIG.S = 512701CC0EAA1C0119BA844F41F996C1D87D5230C580B545B42176B9A0D5B355CEF62FFBE759FE54FAD662EE7C6DC8E4
26,185,449 UART: Caliptra RT
26,186,135 UART: [state] CFI Enabled
26,303,584 UART: [rt] RT listening for mailbox commands...
26,305,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,335,830 UART: [rt]cmd =0x44504543, len=96
30,618,881 >>> mbox cmd response data (6236 bytes)
30,647,964 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,678,152 UART: [rt]cmd =0x52564348, len=36
30,680,349 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,873 UART: [kat] SHA2-256
881,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,919 UART: [kat] ++
886,071 UART: [kat] sha1
890,449 UART: [kat] SHA2-256
892,387 UART: [kat] SHA2-384
895,038 UART: [kat] SHA2-512-ACC
896,939 UART: [kat] ECC-384
902,152 UART: [kat] HMAC-384Kdf
906,732 UART: [kat] LMS
1,474,928 UART: [kat] --
1,475,921 UART: [cold-reset] ++
1,476,311 UART: [fht] Storing FHT @ 0x50003400
1,479,212 UART: [idev] ++
1,479,380 UART: [idev] CDI.KEYID = 6
1,479,740 UART: [idev] SUBJECT.KEYID = 7
1,480,164 UART: [idev] UDS.KEYID = 0
1,480,509 ready_for_fw is high
1,480,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,848 UART: [idev] Erasing UDS.KEYID = 0
1,504,396 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,988 UART: [idev] --
1,514,179 UART: [ldev] ++
1,514,347 UART: [ldev] CDI.KEYID = 6
1,514,710 UART: [ldev] SUBJECT.KEYID = 5
1,515,136 UART: [ldev] AUTHORITY.KEYID = 7
1,515,599 UART: [ldev] FE.KEYID = 1
1,520,733 UART: [ldev] Erasing FE.KEYID = 1
1,545,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,222 UART: [ldev] --
1,584,531 UART: [fwproc] Waiting for Commands...
1,585,330 UART: [fwproc] Received command 0x46574c44
1,586,121 UART: [fwproc] Received Image of size 114448 bytes
2,886,196 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,420 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,725 >>> mbox cmd response: success
3,079,801 UART: [afmc] ++
3,079,969 UART: [afmc] CDI.KEYID = 6
3,080,331 UART: [afmc] SUBJECT.KEYID = 7
3,080,756 UART: [afmc] AUTHORITY.KEYID = 5
3,115,427 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,641 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,421 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,149 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,034 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,724 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,603 UART: [afmc] --
3,158,729 UART: [cold-reset] --
3,159,569 UART: [state] Locking Datavault
3,160,866 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,470 UART: [state] Locking ICCM
3,162,006 UART: [exit] Launching FMC @ 0x40000130
3,167,335 UART:
3,167,351 UART: Running Caliptra FMC ...
3,167,759 UART:
3,167,813 UART: [state] CFI Enabled
3,178,262 UART: [fht] FMC Alias Private Key: 7
3,286,167 UART: [art] Extend RT PCRs Done
3,286,595 UART: [art] Lock RT PCRs Done
3,288,261 UART: [art] Populate DV Done
3,296,166 UART: [fht] FMC Alias Private Key: 7
3,297,128 UART: [art] Derive CDI
3,297,408 UART: [art] Store in in slot 0x4
3,383,021 UART: [art] Derive Key Pair
3,383,381 UART: [art] Store priv key in slot 0x5
3,396,805 UART: [art] Derive Key Pair - Done
3,411,316 UART: [art] Signing Cert with AUTHO
3,411,796 UART: RITY.KEYID = 7
3,426,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,561 UART: [art] PUB.X = 6F1FC0B54AEC3F760E87800740DDAB0A59676056B0AF1F22AA99F395612C86E6BA61DC8395B8935A73F1A960BC2EF3C8
3,434,332 UART: [art] PUB.Y = 379BE0534E2A21C04CA506179522B336F0F8B74A702BF1BB1470B2A6DEA390A7FDC020482D81E5124B4BC6A2816530CE
3,441,283 UART: [art] SIG.R = D4CD39A6B79DFEBE5690CC1DB6225C5EE0CB18973EB1A32078BC66B90F9FAA0ECE343A145A7A9CAD3BA115FE315FE02A
3,448,075 UART: [art] SIG.S = BE98A33725080826F9107EF7F09ED4FE32E34EDD719F5D59928DE1CAFC752A39DCE78D422600F919AB60FD6B81C7D96F
3,472,180 UART: Caliptra RT
3,472,433 UART: [state] CFI Enabled
3,581,019 UART: [rt] RT listening for mailbox commands...
3,581,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,181 UART: [rt]cmd =0x44504543, len=96
3,793,509 >>> mbox cmd response data (6236 bytes)
3,793,510 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,273 UART: [rt]cmd =0x52564348, len=36
3,825,479 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,327 ready_for_fw is high
1,362,327 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,943 >>> mbox cmd response: success
2,991,785 UART:
2,991,801 UART: Running Caliptra FMC ...
2,992,209 UART:
2,992,263 UART: [state] CFI Enabled
3,002,920 UART: [fht] FMC Alias Private Key: 7
3,110,109 UART: [art] Extend RT PCRs Done
3,110,537 UART: [art] Lock RT PCRs Done
3,112,181 UART: [art] Populate DV Done
3,120,446 UART: [fht] FMC Alias Private Key: 7
3,121,390 UART: [art] Derive CDI
3,121,670 UART: [art] Store in in slot 0x4
3,207,625 UART: [art] Derive Key Pair
3,207,985 UART: [art] Store priv key in slot 0x5
3,221,173 UART: [art] Derive Key Pair - Done
3,236,034 UART: [art] Signing Cert with AUTHO
3,236,514 UART: RITY.KEYID = 7
3,252,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,785 UART: [art] PUB.X = 12B20C88954E87FE86A7857C204BF6F5669AD80FD99EC1ECE9B7C3BED22E467FB38127ED0F24D3E085E907FF45C3FD2D
3,259,559 UART: [art] PUB.Y = F38567E5ED6F7311678094249147A10682E3C732A56D6D610F761CD2A3F6CAD2B2FF49DD3F62F61F923EE9A09DFB7C38
3,266,509 UART: [art] SIG.R = A301F45403F8AB05AF1BDEA723E50174C58DBAC9A56443A81D54CAD4D3B245020F51604555409231D285648E67FB33BE
3,273,263 UART: [art] SIG.S = 9B4D826BBD40102EE5102D27E3F574201AD673B565F25A0E9DF2FAE4DA1819118817049F70694480209AEB978A273181
3,296,834 UART: Caliptra RT
3,297,087 UART: [state] CFI Enabled
3,404,591 UART: [rt] RT listening for mailbox commands...
3,405,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,593 UART: [rt]cmd =0x44504543, len=96
3,615,893 >>> mbox cmd response data (6236 bytes)
3,615,894 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,391 UART: [rt]cmd =0x52564348, len=36
3,647,515 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,792 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,442 UART: [kat] SHA2-256
882,373 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,488 UART: [kat] ++
886,640 UART: [kat] sha1
891,050 UART: [kat] SHA2-256
892,988 UART: [kat] SHA2-384
895,525 UART: [kat] SHA2-512-ACC
897,426 UART: [kat] ECC-384
903,161 UART: [kat] HMAC-384Kdf
907,691 UART: [kat] LMS
1,475,887 UART: [kat] --
1,476,958 UART: [cold-reset] ++
1,477,448 UART: [fht] Storing FHT @ 0x50003400
1,480,211 UART: [idev] ++
1,480,379 UART: [idev] CDI.KEYID = 6
1,480,739 UART: [idev] SUBJECT.KEYID = 7
1,481,163 UART: [idev] UDS.KEYID = 0
1,481,508 ready_for_fw is high
1,481,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,107 UART: [idev] Erasing UDS.KEYID = 0
1,505,663 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,163 UART: [idev] --
1,515,222 UART: [ldev] ++
1,515,390 UART: [ldev] CDI.KEYID = 6
1,515,753 UART: [ldev] SUBJECT.KEYID = 5
1,516,179 UART: [ldev] AUTHORITY.KEYID = 7
1,516,642 UART: [ldev] FE.KEYID = 1
1,522,202 UART: [ldev] Erasing FE.KEYID = 1
1,548,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,595 UART: [ldev] --
1,588,080 UART: [fwproc] Waiting for Commands...
1,588,839 UART: [fwproc] Received command 0x46574c44
1,589,630 UART: [fwproc] Received Image of size 114448 bytes
2,889,687 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,165 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,654 >>> mbox cmd response: success
3,083,668 UART: [afmc] ++
3,083,836 UART: [afmc] CDI.KEYID = 6
3,084,198 UART: [afmc] SUBJECT.KEYID = 7
3,084,623 UART: [afmc] AUTHORITY.KEYID = 5
3,119,500 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,638 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,146 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,031 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,721 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,658 UART: [afmc] --
3,162,690 UART: [cold-reset] --
3,163,566 UART: [state] Locking Datavault
3,164,699 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,303 UART: [state] Locking ICCM
3,165,789 UART: [exit] Launching FMC @ 0x40000130
3,171,118 UART:
3,171,134 UART: Running Caliptra FMC ...
3,171,542 UART:
3,171,685 UART: [state] CFI Enabled
3,182,312 UART: [fht] FMC Alias Private Key: 7
3,289,947 UART: [art] Extend RT PCRs Done
3,290,375 UART: [art] Lock RT PCRs Done
3,292,277 UART: [art] Populate DV Done
3,300,586 UART: [fht] FMC Alias Private Key: 7
3,301,550 UART: [art] Derive CDI
3,301,830 UART: [art] Store in in slot 0x4
3,387,139 UART: [art] Derive Key Pair
3,387,499 UART: [art] Store priv key in slot 0x5
3,400,799 UART: [art] Derive Key Pair - Done
3,415,713 UART: [art] Signing Cert with AUTHO
3,416,193 UART: RITY.KEYID = 7
3,431,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,032 UART: [art] PUB.X = 920146CD27A6D66486DE219893451C2A4884EE9F498DC8027482D2A1D9DC54F8B1D4C1D6B39A8C88CA76BA334D6E5E76
3,438,800 UART: [art] PUB.Y = E8D30E21AC0E06042FA20FD0F9F91B0BEB48C4ED9109A789B41A80911F8729D9FFB902556E658B173F1CB7A7FCEB92ED
3,445,742 UART: [art] SIG.R = 96D7FA77C6A58394B35715A75DF06A590CC137E3722453D672213323E1F09E0A2F87EFC5AC71D8D20CDCC2BC91C97848
3,452,507 UART: [art] SIG.S = 31D30A027BCB5A932F581F93596878BBD8115F129D2526E935F7FCDF10705EC26D7D11AF524A7D20B1B04A4A055AEB22
3,476,583 UART: Caliptra RT
3,476,928 UART: [state] CFI Enabled
3,584,275 UART: [rt] RT listening for mailbox commands...
3,584,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,337 UART: [rt]cmd =0x44504543, len=96
3,795,798 >>> mbox cmd response data (6236 bytes)
3,795,799 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,422 UART: [rt]cmd =0x52564348, len=36
3,827,486 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,960 ready_for_fw is high
1,362,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,854 >>> mbox cmd response: success
2,993,998 UART:
2,994,014 UART: Running Caliptra FMC ...
2,994,422 UART:
2,994,565 UART: [state] CFI Enabled
3,005,084 UART: [fht] FMC Alias Private Key: 7
3,112,603 UART: [art] Extend RT PCRs Done
3,113,031 UART: [art] Lock RT PCRs Done
3,114,461 UART: [art] Populate DV Done
3,122,380 UART: [fht] FMC Alias Private Key: 7
3,123,342 UART: [art] Derive CDI
3,123,622 UART: [art] Store in in slot 0x4
3,209,559 UART: [art] Derive Key Pair
3,209,919 UART: [art] Store priv key in slot 0x5
3,223,173 UART: [art] Derive Key Pair - Done
3,237,740 UART: [art] Signing Cert with AUTHO
3,238,220 UART: RITY.KEYID = 7
3,253,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,671 UART: [art] PUB.X = 7401C7515BC3440D761F3E512309C225A1CFD42DD10285DF68E21B7181B0BD5A07E75278F1AE5919CB305A451066239E
3,261,422 UART: [art] PUB.Y = FDEDFA6F4108DA2825A06CE8EC85382BC9509B9335E5D3869B1FFC251934AD104FA198300F4497D41543B3CA5E4440D6
3,268,372 UART: [art] SIG.R = 342CF44D2ABCD704AE54E15D69FE8F91154306B6173660E9D31D396933C74EFAC682F10E0748DD7F534F0545B84971D2
3,275,127 UART: [art] SIG.S = 3E36E04C9136B5BA81E6790A3528E2BF8E4CA6BEB5C622AE564F99FFB93BBDCD17B393974A02E0A9B41E2B8A908C2F92
3,298,532 UART: Caliptra RT
3,298,877 UART: [state] CFI Enabled
3,406,495 UART: [rt] RT listening for mailbox commands...
3,407,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,461 UART: [rt]cmd =0x44504543, len=96
3,617,962 >>> mbox cmd response data (6236 bytes)
3,617,963 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,494 UART: [rt]cmd =0x52564348, len=36
3,649,854 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
893,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,201 UART: [kat] ++
897,353 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,320 UART: [kat] SHA2-512-ACC
908,221 UART: [kat] ECC-384
917,812 UART: [kat] HMAC-384Kdf
922,490 UART: [kat] LMS
1,170,818 UART: [kat] --
1,171,845 UART: [cold-reset] ++
1,172,259 UART: [fht] FHT @ 0x50003400
1,174,822 UART: [idev] ++
1,174,990 UART: [idev] CDI.KEYID = 6
1,175,350 UART: [idev] SUBJECT.KEYID = 7
1,175,774 UART: [idev] UDS.KEYID = 0
1,176,119 ready_for_fw is high
1,176,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,726 UART: [idev] Erasing UDS.KEYID = 0
1,200,917 UART: [idev] Sha1 KeyId Algorithm
1,209,275 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,732 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,957 UART: [ldev] Erasing FE.KEYID = 1
1,243,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,093 UART: [ldev] --
1,282,418 UART: [fwproc] Wait for Commands...
1,283,100 UART: [fwproc] Recv command 0x46574c44
1,283,828 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,208 >>> mbox cmd response: success
2,777,380 UART: [afmc] ++
2,777,548 UART: [afmc] CDI.KEYID = 6
2,777,910 UART: [afmc] SUBJECT.KEYID = 7
2,778,335 UART: [afmc] AUTHORITY.KEYID = 5
2,813,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,123 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,851 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,736 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,455 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,375 UART: [afmc] --
2,857,465 UART: [cold-reset] --
2,858,469 UART: [state] Locking Datavault
2,859,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,256 UART: [state] Locking ICCM
2,860,834 UART: [exit] Launching FMC @ 0x40000130
2,866,163 UART:
2,866,179 UART: Running Caliptra FMC ...
2,866,587 UART:
2,866,641 UART: [state] CFI Enabled
2,877,004 UART: [fht] FMC Alias Private Key: 7
2,984,947 UART: [art] Extend RT PCRs Done
2,985,375 UART: [art] Lock RT PCRs Done
2,986,913 UART: [art] Populate DV Done
2,994,994 UART: [fht] FMC Alias Private Key: 7
2,995,956 UART: [art] Derive CDI
2,996,236 UART: [art] Store in in slot 0x4
3,081,491 UART: [art] Derive Key Pair
3,081,851 UART: [art] Store priv key in slot 0x5
3,094,979 UART: [art] Derive Key Pair - Done
3,109,431 UART: [art] Signing Cert with AUTHO
3,109,911 UART: RITY.KEYID = 7
3,125,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,900 UART: [art] PUB.X = 155CC058DCD7121B50E1F8E994CAA8364B07C059907BFC401BC221FF980E63F00C35640130949652CBACAE482EF21247
3,132,660 UART: [art] PUB.Y = 3EE67CC1BBA0E6630A077A51C7C02B63E1930CBA54501C91193330620F679EF60F855D5AF09239770111D8DA35847C72
3,139,588 UART: [art] SIG.R = 3474843D1DDDF77D30C154712C7D5DB60B3D50F004084DFB21D00D25E43C550F6F375A3C8F5A66815823B39B3358E6E2
3,146,343 UART: [art] SIG.S = 538E8153C781AFAAC8C40436D3B921F70A9B770742FAB53E4B6C8C4D5D2CAD9BDDE906BA2571EE79B717CB1DAAB92D01
3,170,243 UART: Caliptra RT
3,170,496 UART: [state] CFI Enabled
3,278,169 UART: [rt] RT listening for mailbox commands...
3,278,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,235 UART: [rt]cmd =0x44504543, len=96
3,489,566 >>> mbox cmd response data (6236 bytes)
3,489,567 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,064 UART: [rt]cmd =0x52564348, len=36
3,521,230 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,187 ready_for_fw is high
1,060,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,323 >>> mbox cmd response: success
2,687,379 UART:
2,687,395 UART: Running Caliptra FMC ...
2,687,803 UART:
2,687,857 UART: [state] CFI Enabled
2,698,268 UART: [fht] FMC Alias Private Key: 7
2,806,553 UART: [art] Extend RT PCRs Done
2,806,981 UART: [art] Lock RT PCRs Done
2,808,341 UART: [art] Populate DV Done
2,816,420 UART: [fht] FMC Alias Private Key: 7
2,817,576 UART: [art] Derive CDI
2,817,856 UART: [art] Store in in slot 0x4
2,903,451 UART: [art] Derive Key Pair
2,903,811 UART: [art] Store priv key in slot 0x5
2,917,343 UART: [art] Derive Key Pair - Done
2,932,104 UART: [art] Signing Cert with AUTHO
2,932,584 UART: RITY.KEYID = 7
2,947,830 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,595 UART: [art] PUB.X = 6A01B523047BE74D3C37B6313C3AB540E171E2D0B02189D1B5BBE732729248E8E0EBE5D3B6876F0BA35FC7FCC54643C7
2,955,364 UART: [art] PUB.Y = B24D30318C05FA3C20ADD0E2827295556BC57CCE41FBC57DBF0B27C1287D19DF0D507B177E24921378466E9180B21755
2,962,305 UART: [art] SIG.R = 7FC5E6D71F48291366AB3F7EEBF72CA4BD6EA535BA007835C9B7B08723FFD2CBA557F9E1D4E8EEA73E1880D6EBD8E0D6
2,969,077 UART: [art] SIG.S = 3568979924658057592FA6518972D20074FE08692810E5E31B3AB851B8787C4D9C40B94248E9D0D5D671D631FBF8F652
2,992,831 UART: Caliptra RT
2,993,084 UART: [state] CFI Enabled
3,101,311 UART: [rt] RT listening for mailbox commands...
3,101,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,029 UART: [rt]cmd =0x44504543, len=96
3,311,875 >>> mbox cmd response data (6236 bytes)
3,311,876 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,345 UART: [rt]cmd =0x52564348, len=36
3,343,727 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,362 UART: [kat] SHA2-256
904,302 UART: [kat] SHA2-384
907,003 UART: [kat] SHA2-512-ACC
908,904 UART: [kat] ECC-384
918,693 UART: [kat] HMAC-384Kdf
923,449 UART: [kat] LMS
1,171,777 UART: [kat] --
1,172,886 UART: [cold-reset] ++
1,173,400 UART: [fht] FHT @ 0x50003400
1,176,191 UART: [idev] ++
1,176,359 UART: [idev] CDI.KEYID = 6
1,176,719 UART: [idev] SUBJECT.KEYID = 7
1,177,143 UART: [idev] UDS.KEYID = 0
1,177,488 ready_for_fw is high
1,177,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,123 UART: [idev] Erasing UDS.KEYID = 0
1,202,196 UART: [idev] Sha1 KeyId Algorithm
1,210,652 UART: [idev] --
1,211,778 UART: [ldev] ++
1,211,946 UART: [ldev] CDI.KEYID = 6
1,212,309 UART: [ldev] SUBJECT.KEYID = 5
1,212,735 UART: [ldev] AUTHORITY.KEYID = 7
1,213,198 UART: [ldev] FE.KEYID = 1
1,218,600 UART: [ldev] Erasing FE.KEYID = 1
1,245,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,240 UART: [ldev] --
1,284,577 UART: [fwproc] Wait for Commands...
1,285,277 UART: [fwproc] Recv command 0x46574c44
1,286,005 UART: [fwproc] Recv'd Img size: 114448 bytes
2,586,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,302 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,779,353 >>> mbox cmd response: success
2,780,489 UART: [afmc] ++
2,780,657 UART: [afmc] CDI.KEYID = 6
2,781,019 UART: [afmc] SUBJECT.KEYID = 7
2,781,444 UART: [afmc] AUTHORITY.KEYID = 5
2,816,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,340 UART: [afmc] --
2,860,330 UART: [cold-reset] --
2,861,106 UART: [state] Locking Datavault
2,862,143 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,747 UART: [state] Locking ICCM
2,863,327 UART: [exit] Launching FMC @ 0x40000130
2,868,656 UART:
2,868,672 UART: Running Caliptra FMC ...
2,869,080 UART:
2,869,223 UART: [state] CFI Enabled
2,879,660 UART: [fht] FMC Alias Private Key: 7
2,987,547 UART: [art] Extend RT PCRs Done
2,987,975 UART: [art] Lock RT PCRs Done
2,989,699 UART: [art] Populate DV Done
2,998,016 UART: [fht] FMC Alias Private Key: 7
2,998,944 UART: [art] Derive CDI
2,999,224 UART: [art] Store in in slot 0x4
3,085,333 UART: [art] Derive Key Pair
3,085,693 UART: [art] Store priv key in slot 0x5
3,099,471 UART: [art] Derive Key Pair - Done
3,114,367 UART: [art] Signing Cert with AUTHO
3,114,847 UART: RITY.KEYID = 7
3,130,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,390 UART: [art] PUB.X = C5B641C6B4D29E09937846E30503C20F56A27E8B054A846933B17AAEB0FF088A365F2DC98F1CC497230AB2F467AB7B09
3,138,140 UART: [art] PUB.Y = E41C83DDB2965F01DC2CE1024BA16CBA6A357B9EE36C66649A5EEAC0C25DB9DCF7C8DC3BE83B73302F2B24025FEF5EE6
3,145,107 UART: [art] SIG.R = 64411FBF66D0871EB0A1B419DAB5B78D8FE074D71BEDA7682A98C8B55EA63D01BAFB363F12EFA6947931DA8401DC675D
3,151,887 UART: [art] SIG.S = 422B3B600DA5989AB5BCBA2586DA85AEB20E934F357528CEB4F3B66B2C56B4141099E56E1615F9F1E02C7910BAD95A3B
3,175,780 UART: Caliptra RT
3,176,125 UART: [state] CFI Enabled
3,283,404 UART: [rt] RT listening for mailbox commands...
3,284,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,590 UART: [rt]cmd =0x44504543, len=96
3,494,622 >>> mbox cmd response data (6236 bytes)
3,494,623 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,114 UART: [rt]cmd =0x52564348, len=36
3,525,982 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,442 ready_for_fw is high
1,060,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,660 >>> mbox cmd response: success
2,692,256 UART:
2,692,272 UART: Running Caliptra FMC ...
2,692,680 UART:
2,692,823 UART: [state] CFI Enabled
2,703,446 UART: [fht] FMC Alias Private Key: 7
2,811,475 UART: [art] Extend RT PCRs Done
2,811,903 UART: [art] Lock RT PCRs Done
2,813,375 UART: [art] Populate DV Done
2,821,744 UART: [fht] FMC Alias Private Key: 7
2,822,770 UART: [art] Derive CDI
2,823,050 UART: [art] Store in in slot 0x4
2,908,455 UART: [art] Derive Key Pair
2,908,815 UART: [art] Store priv key in slot 0x5
2,922,597 UART: [art] Derive Key Pair - Done
2,936,944 UART: [art] Signing Cert with AUTHO
2,937,424 UART: RITY.KEYID = 7
2,952,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,241 UART: [art] PUB.X = F156F908F5FBF97A3C74650A5731097ECCB4AFFFA5D30976D3128F40F058866C61C98EBD94F21BF8E480F5D6738BE213
2,960,007 UART: [art] PUB.Y = EF003B0A0E61ACE758A330B4D0943436BD84A507885138B87BC66569EA79524325454F8F20B651B0DB6CDC29B925FAAD
2,966,930 UART: [art] SIG.R = B6153D279C262B0A47933A51B878EE638D84662792108570EB68D2B67F7D5C1C26C6B7953835B721B35B08931BDFC5B0
2,973,688 UART: [art] SIG.S = A7638A3DFB3244A3D83B6957C36B5C686C52D1C33E84395FDB9DF6E3841EB3401B52DDB60B7049868747AE32809CC8FA
2,997,672 UART: Caliptra RT
2,998,017 UART: [state] CFI Enabled
3,106,125 UART: [rt] RT listening for mailbox commands...
3,106,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,165 UART: [rt]cmd =0x44504543, len=96
3,318,294 >>> mbox cmd response data (6236 bytes)
3,318,295 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,812 UART: [rt]cmd =0x52564348, len=36
3,350,268 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,883 UART: [kat] SHA2-256
901,823 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,423 UART: [fht] FHT @ 0x50003400
1,173,009 UART: [idev] ++
1,173,177 UART: [idev] CDI.KEYID = 6
1,173,538 UART: [idev] SUBJECT.KEYID = 7
1,173,963 UART: [idev] UDS.KEYID = 0
1,174,309 ready_for_fw is high
1,174,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,095 UART: [idev] Erasing UDS.KEYID = 0
1,199,403 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,254 UART: [ldev] ++
1,209,422 UART: [ldev] CDI.KEYID = 6
1,209,786 UART: [ldev] SUBJECT.KEYID = 5
1,210,213 UART: [ldev] AUTHORITY.KEYID = 7
1,210,676 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,241,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,594 UART: [ldev] --
1,280,922 UART: [fwproc] Wait for Commands...
1,281,639 UART: [fwproc] Recv command 0x46574c44
1,282,372 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,400 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,404 >>> mbox cmd response: success
2,775,659 UART: [afmc] ++
2,775,827 UART: [afmc] CDI.KEYID = 6
2,776,190 UART: [afmc] SUBJECT.KEYID = 7
2,776,616 UART: [afmc] AUTHORITY.KEYID = 5
2,811,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,677 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,560 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,279 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,234 UART: [afmc] --
2,855,268 UART: [cold-reset] --
2,856,214 UART: [state] Locking Datavault
2,857,097 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,701 UART: [state] Locking ICCM
2,858,181 UART: [exit] Launching FMC @ 0x40000130
2,863,510 UART:
2,863,526 UART: Running Caliptra FMC ...
2,863,934 UART:
2,863,988 UART: [state] CFI Enabled
2,874,203 UART: [fht] FMC Alias Private Key: 7
2,981,850 UART: [art] Extend RT PCRs Done
2,982,278 UART: [art] Lock RT PCRs Done
2,983,620 UART: [art] Populate DV Done
2,992,073 UART: [fht] FMC Alias Private Key: 7
2,993,223 UART: [art] Derive CDI
2,993,503 UART: [art] Store in in slot 0x4
3,079,256 UART: [art] Derive Key Pair
3,079,616 UART: [art] Store priv key in slot 0x5
3,092,880 UART: [art] Derive Key Pair - Done
3,107,662 UART: [art] Signing Cert with AUTHO
3,108,142 UART: RITY.KEYID = 7
3,123,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,093 UART: [art] PUB.X = C98063968E9B8161F3692137EF7EA889386A153FFE24D6B2B4542B74C26068FB09C3197FE457F25DCAF18BB1EB2B159C
3,130,864 UART: [art] PUB.Y = CBCCB0BFECE06DE5E23D0FF36761F59709F18F80E2C26851990070BCFC7C54B184A578A406E9475B66537CE9811E196A
3,137,791 UART: [art] SIG.R = 8D39FF6878925EB23BA1B169BA42D421FA1FCFC939FEEFCC450AE910F443F4610ECBD656A28326D3975A1F2F81EC7389
3,144,569 UART: [art] SIG.S = 4E5A29BF9FC9A181EA3D80561B8FFC0300944598E0702A20431687CC99546B297ED770A233F468AC06A6C3D94EA4F6C9
3,167,980 UART: Caliptra RT
3,168,233 UART: [state] CFI Enabled
3,275,958 UART: [rt] RT listening for mailbox commands...
3,276,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,986 UART: [rt]cmd =0x44504543, len=96
3,487,568 >>> mbox cmd response data (6236 bytes)
3,487,569 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,182 UART: [rt]cmd =0x52564348, len=36
3,519,010 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,014 ready_for_fw is high
1,056,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,072 >>> mbox cmd response: success
2,687,416 UART:
2,687,432 UART: Running Caliptra FMC ...
2,687,840 UART:
2,687,894 UART: [state] CFI Enabled
2,698,261 UART: [fht] FMC Alias Private Key: 7
2,805,420 UART: [art] Extend RT PCRs Done
2,805,848 UART: [art] Lock RT PCRs Done
2,807,762 UART: [art] Populate DV Done
2,816,189 UART: [fht] FMC Alias Private Key: 7
2,817,273 UART: [art] Derive CDI
2,817,553 UART: [art] Store in in slot 0x4
2,903,194 UART: [art] Derive Key Pair
2,903,554 UART: [art] Store priv key in slot 0x5
2,916,760 UART: [art] Derive Key Pair - Done
2,931,412 UART: [art] Signing Cert with AUTHO
2,931,892 UART: RITY.KEYID = 7
2,947,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,159 UART: [art] PUB.X = 067FD7D50154C999C91303163B617593472795741E769E706E1E51864905EC6A84572EDF97AB339DE6F5A5426598474F
2,954,901 UART: [art] PUB.Y = 2B291DF93EAFD4315797BA74C819954CB1A47566C0E94E034FFEA4146433A5FEDA3BC81E334A741DA1C94E1489AF9588
2,961,856 UART: [art] SIG.R = 8A97F9A3857DB9D2FD27ADE3357A265F0C900488F804658F4379DE0AF66CA2535D8A9DFEA07872772AE724AD92E96076
2,968,618 UART: [art] SIG.S = 64A91BF298769B70F610A65741CFCB29642F1AEA67EE27155D8CE943A97E4509F31BC16D2BCE2F95726A9DAE6937E851
2,992,210 UART: Caliptra RT
2,992,463 UART: [state] CFI Enabled
3,100,484 UART: [rt] RT listening for mailbox commands...
3,101,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,498 UART: [rt]cmd =0x44504543, len=96
3,311,392 >>> mbox cmd response data (6236 bytes)
3,311,393 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,182 UART: [rt]cmd =0x52564348, len=36
3,343,316 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,117 UART: [kat] LMS
1,169,429 UART: [kat] --
1,170,264 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,442 UART: [idev] ++
1,173,610 UART: [idev] CDI.KEYID = 6
1,173,971 UART: [idev] SUBJECT.KEYID = 7
1,174,396 UART: [idev] UDS.KEYID = 0
1,174,742 ready_for_fw is high
1,174,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,430 UART: [idev] Erasing UDS.KEYID = 0
1,199,296 UART: [idev] Sha1 KeyId Algorithm
1,208,296 UART: [idev] --
1,209,527 UART: [ldev] ++
1,209,695 UART: [ldev] CDI.KEYID = 6
1,210,059 UART: [ldev] SUBJECT.KEYID = 5
1,210,486 UART: [ldev] AUTHORITY.KEYID = 7
1,210,949 UART: [ldev] FE.KEYID = 1
1,215,773 UART: [ldev] Erasing FE.KEYID = 1
1,241,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,571 UART: [ldev] --
1,280,955 UART: [fwproc] Wait for Commands...
1,281,546 UART: [fwproc] Recv command 0x46574c44
1,282,279 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,732 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,003 >>> mbox cmd response: success
2,775,036 UART: [afmc] ++
2,775,204 UART: [afmc] CDI.KEYID = 6
2,775,567 UART: [afmc] SUBJECT.KEYID = 7
2,775,993 UART: [afmc] AUTHORITY.KEYID = 5
2,811,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,251 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,970 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,861 UART: [afmc] --
2,854,889 UART: [cold-reset] --
2,855,727 UART: [state] Locking Datavault
2,856,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,362 UART: [state] Locking ICCM
2,858,034 UART: [exit] Launching FMC @ 0x40000130
2,863,363 UART:
2,863,379 UART: Running Caliptra FMC ...
2,863,787 UART:
2,863,930 UART: [state] CFI Enabled
2,874,389 UART: [fht] FMC Alias Private Key: 7
2,982,382 UART: [art] Extend RT PCRs Done
2,982,810 UART: [art] Lock RT PCRs Done
2,984,340 UART: [art] Populate DV Done
2,992,483 UART: [fht] FMC Alias Private Key: 7
2,993,665 UART: [art] Derive CDI
2,993,945 UART: [art] Store in in slot 0x4
3,079,870 UART: [art] Derive Key Pair
3,080,230 UART: [art] Store priv key in slot 0x5
3,093,458 UART: [art] Derive Key Pair - Done
3,108,337 UART: [art] Signing Cert with AUTHO
3,108,817 UART: RITY.KEYID = 7
3,124,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,028 UART: [art] PUB.X = 5D4858E3B25E92F6E4E94C7607CF33F000A8A828B6571DA1A12E8D06FC79AA5FD29F2B5C69A3C224D01A753043ECDC43
3,131,780 UART: [art] PUB.Y = 8E7FB4C63F050EEA98106EF3362662926946A95CEB76C5187CF90C5492BBC14E44B4BE7C9165036EBED1CBD4E65DAA2F
3,138,732 UART: [art] SIG.R = 89E069728DA1A6FA26910FF421BB44A6BC652C02D72D90353F92A575244D3DB55B97A5E4E2460916CB85B4507E22351A
3,145,491 UART: [art] SIG.S = 6B17BBF3ED00E2095DC5E1EA887FAE268DD8A0A83F409B168C7AE3C7921F55C3DDD06B6C2A97EED0B38761012F8AF48A
3,168,658 UART: Caliptra RT
3,169,003 UART: [state] CFI Enabled
3,276,244 UART: [rt] RT listening for mailbox commands...
3,276,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,282 UART: [rt]cmd =0x44504543, len=96
3,488,221 >>> mbox cmd response data (6236 bytes)
3,488,222 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,799 UART: [rt]cmd =0x52564348, len=36
3,520,001 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,475 ready_for_fw is high
1,056,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,489 >>> mbox cmd response: success
2,688,061 UART:
2,688,077 UART: Running Caliptra FMC ...
2,688,485 UART:
2,688,628 UART: [state] CFI Enabled
2,699,127 UART: [fht] FMC Alias Private Key: 7
2,806,952 UART: [art] Extend RT PCRs Done
2,807,380 UART: [art] Lock RT PCRs Done
2,808,870 UART: [art] Populate DV Done
2,816,901 UART: [fht] FMC Alias Private Key: 7
2,818,025 UART: [art] Derive CDI
2,818,305 UART: [art] Store in in slot 0x4
2,903,838 UART: [art] Derive Key Pair
2,904,198 UART: [art] Store priv key in slot 0x5
2,917,654 UART: [art] Derive Key Pair - Done
2,932,396 UART: [art] Signing Cert with AUTHO
2,932,876 UART: RITY.KEYID = 7
2,947,516 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,281 UART: [art] PUB.X = E2C29BEE97255C3FC18D9E52C5B4DC4FD0FE40D135502673BB31673BB8BE946C3FAB4A8272C5D71F47C8FAF4FF84D310
2,955,069 UART: [art] PUB.Y = 866AD2E5A9480AB15B702C65B005D01BE6ED19F930CB2C53C3AE5EB57AC1B3C5BF5946965EA42B0728EFE9F6FD3D3ACE
2,962,032 UART: [art] SIG.R = 36998369B53DCCBBD72AB4AE179D7DFFC265F141C4EFD5B1E4C8A0D60AA1BF3377D3B34FD0D51A8E38507D1808339F2C
2,968,814 UART: [art] SIG.S = 176F64FFE4E90E168D6EBF926807AB45283EB36244C868E6AD8A1DC458E46ABFE1814518EDDF435579C7D2448CA6023B
2,992,948 UART: Caliptra RT
2,993,293 UART: [state] CFI Enabled
3,100,990 UART: [rt] RT listening for mailbox commands...
3,101,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,934 UART: [rt]cmd =0x44504543, len=96
3,312,560 >>> mbox cmd response data (6236 bytes)
3,312,561 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,118 UART: [rt]cmd =0x52564348, len=36
3,344,192 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,033 UART:
192,403 UART: Running Caliptra ROM ...
193,536 UART:
193,686 UART: [state] CFI Enabled
264,306 UART: [state] LifecycleState = Unprovisioned
266,292 UART: [state] DebugLocked = No
269,105 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,403 UART: [kat] SHA2-256
444,081 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,608 UART: [kat] ++
455,079 UART: [kat] sha1
466,455 UART: [kat] SHA2-256
469,180 UART: [kat] SHA2-384
475,320 UART: [kat] SHA2-512-ACC
477,689 UART: [kat] ECC-384
2,768,441 UART: [kat] HMAC-384Kdf
2,801,202 UART: [kat] LMS
3,991,482 UART: [kat] --
3,994,639 UART: [cold-reset] ++
3,996,359 UART: [fht] Storing FHT @ 0x50003400
4,007,411 UART: [idev] ++
4,008,038 UART: [idev] CDI.KEYID = 6
4,008,942 UART: [idev] SUBJECT.KEYID = 7
4,010,123 UART: [idev] UDS.KEYID = 0
4,011,198 ready_for_fw is high
4,011,427 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,061 UART: [idev] Erasing UDS.KEYID = 0
7,348,755 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,812 UART: [idev] --
7,373,858 UART: [ldev] ++
7,374,423 UART: [ldev] CDI.KEYID = 6
7,375,380 UART: [ldev] SUBJECT.KEYID = 5
7,376,595 UART: [ldev] AUTHORITY.KEYID = 7
7,377,877 UART: [ldev] FE.KEYID = 1
7,424,315 UART: [ldev] Erasing FE.KEYID = 1
10,757,218 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,466 UART: [ldev] --
13,120,354 UART: [fwproc] Waiting for Commands...
13,123,741 UART: [fwproc] Received command 0x46574c44
13,125,924 UART: [fwproc] Received Image of size 114124 bytes
17,189,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,700 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,553 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,650,101 >>> mbox cmd response: success
17,654,339 UART: [afmc] ++
17,654,937 UART: [afmc] CDI.KEYID = 6
17,655,860 UART: [afmc] SUBJECT.KEYID = 7
17,657,077 UART: [afmc] AUTHORITY.KEYID = 5
21,026,644 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,492 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,748 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,162 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,001 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,459 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,254 UART: [afmc] --
23,401,431 UART: [cold-reset] --
23,405,182 UART: [state] Locking Datavault
23,410,697 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,407 UART: [state] Locking ICCM
23,413,881 UART: [exit] Launching FMC @ 0x40000130
23,422,227 UART:
23,422,466 UART: Running Caliptra FMC ...
23,423,567 UART:
23,423,726 UART: [state] CFI Enabled
23,490,209 UART: [fht] FMC Alias Private Key: 7
25,828,046 UART: [art] Extend RT PCRs Done
25,829,268 UART: [art] Lock RT PCRs Done
25,830,731 UART: [art] Populate DV Done
25,836,313 UART: [fht] FMC Alias Private Key: 7
25,837,906 UART: [art] Derive CDI
25,838,719 UART: [art] Store in in slot 0x4
25,898,954 UART: [art] Derive Key Pair
25,899,995 UART: [art] Store priv key in slot 0x5
29,193,093 UART: [art] Derive Key Pair - Done
29,205,928 UART: [art] Signing Cert with AUTHO
29,207,252 UART: RITY.KEYID = 7
31,495,414 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,920 UART: [art] PUB.X = 074EB61C986F45B8A6FFDFB10AF9A4B2A72F8BE23DC71249DFA0319269AA45466874380D2D36626B512BFDDE898C4998
31,504,163 UART: [art] PUB.Y = 4A54C40DBFEFEF1AD1989143AF07FC8446F30F9FEF90ABF8AFB1FF53A6EBDF0A14B2872BA80BE772BB90D06C717DAB71
31,511,454 UART: [art] SIG.R = F24AE0221F0A631620F57972873DD16060003CCE8ABE859B453A6E33FACC745D9AB98F00661DDEE5799ED803E0EA1718
31,518,788 UART: [art] SIG.S = D63E62034A0D7AB81D28E542BC49546376801CC0EDF8A5E8D30491D3D68068E24C267E3F23FAA10746975284B5E4F0DA
32,823,921 UART: Caliptra RT
32,824,632 UART: [state] CFI Enabled
32,986,982 UART: [rt] RT listening for mailbox commands...
32,988,878 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,018,918 UART: [rt]cmd =0x52564348, len=36
33,020,632 >>> mbox cmd response: failed
33,020,933 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,050,994 UART: [rt]cmd =0x52564348, len=36
33,052,482 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,785,977 ready_for_fw is high
3,786,373 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,853,191 >>> mbox cmd response: success
23,543,511 UART:
23,543,900 UART: Running Caliptra FMC ...
23,545,045 UART:
23,545,213 UART: [state] CFI Enabled
23,614,362 UART: [fht] FMC Alias Private Key: 7
25,952,439 UART: [art] Extend RT PCRs Done
25,953,684 UART: [art] Lock RT PCRs Done
25,955,373 UART: [art] Populate DV Done
25,960,907 UART: [fht] FMC Alias Private Key: 7
25,962,501 UART: [art] Derive CDI
25,963,313 UART: [art] Store in in slot 0x4
26,023,610 UART: [art] Derive Key Pair
26,024,676 UART: [art] Store priv key in slot 0x5
29,317,391 UART: [art] Derive Key Pair - Done
29,330,271 UART: [art] Signing Cert with AUTHO
29,331,577 UART: RITY.KEYID = 7
31,619,453 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,976 UART: [art] PUB.X = 29722CEC0E8E7AB4AADC039CC5C1953779303C5A5D7A80C9BC3C67FB6C317778C1058EFDFDA7DD63E5EE2DC7F36F265B
31,628,245 UART: [art] PUB.Y = F4D92E427B271CC55AF2022DBB997299FC23F5E90B1A42A7BB508FDAC39AB5D210D5FB58A16A70B3A5F81535D1795447
31,635,506 UART: [art] SIG.R = C2B86A0D14E19D4361BF94B28870B4DED30EF0AA21EA4994F1C45F9FECB26614538591DA7B3E38704B7BC29CEA2E8957
31,642,865 UART: [art] SIG.S = DD21CEA3F5950EB41355BF31953FAE81C464D45A8BC4A37684CAC840AE113768BC2199229F9E4A413D709182065FCB08
32,947,520 UART: Caliptra RT
32,948,257 UART: [state] CFI Enabled
33,108,229 UART: [rt] RT listening for mailbox commands...
33,110,122 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,140,440 UART: [rt]cmd =0x52564348, len=36
33,142,506 >>> mbox cmd response: failed
33,142,999 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,173,017 UART: [rt]cmd =0x52564348, len=36
33,174,777 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,507 UART:
193,158 UART: Running Caliptra ROM ...
194,293 UART:
603,908 UART: [state] CFI Enabled
615,064 UART: [state] LifecycleState = Unprovisioned
617,000 UART: [state] DebugLocked = No
618,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,017 UART: [kat] SHA2-256
793,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,323 UART: [kat] ++
804,790 UART: [kat] sha1
815,518 UART: [kat] SHA2-256
818,238 UART: [kat] SHA2-384
825,072 UART: [kat] SHA2-512-ACC
827,448 UART: [kat] ECC-384
3,112,547 UART: [kat] HMAC-384Kdf
3,123,807 UART: [kat] LMS
4,313,910 UART: [kat] --
4,318,946 UART: [cold-reset] ++
4,321,535 UART: [fht] Storing FHT @ 0x50003400
4,333,234 UART: [idev] ++
4,333,808 UART: [idev] CDI.KEYID = 6
4,334,763 UART: [idev] SUBJECT.KEYID = 7
4,336,037 UART: [idev] UDS.KEYID = 0
4,337,068 ready_for_fw is high
4,337,299 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,889 UART: [idev] Erasing UDS.KEYID = 0
7,625,038 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,985 UART: [idev] --
7,651,788 UART: [ldev] ++
7,652,361 UART: [ldev] CDI.KEYID = 6
7,653,330 UART: [ldev] SUBJECT.KEYID = 5
7,654,496 UART: [ldev] AUTHORITY.KEYID = 7
7,655,774 UART: [ldev] FE.KEYID = 1
7,667,221 UART: [ldev] Erasing FE.KEYID = 1
10,952,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,492 UART: [ldev] --
13,312,940 UART: [fwproc] Waiting for Commands...
13,315,301 UART: [fwproc] Received command 0x46574c44
13,317,531 UART: [fwproc] Received Image of size 114124 bytes
17,372,177 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,833,500 >>> mbox cmd response: success
17,836,986 UART: [afmc] ++
17,837,582 UART: [afmc] CDI.KEYID = 6
17,838,694 UART: [afmc] SUBJECT.KEYID = 7
17,839,813 UART: [afmc] AUTHORITY.KEYID = 5
21,156,395 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,384 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,691 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,033 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,862 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,295 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,914 UART: [afmc] --
23,519,398 UART: [cold-reset] --
23,522,647 UART: [state] Locking Datavault
23,526,274 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,979 UART: [state] Locking ICCM
23,530,802 UART: [exit] Launching FMC @ 0x40000130
23,539,191 UART:
23,539,418 UART: Running Caliptra FMC ...
23,540,437 UART:
23,540,577 UART: [state] CFI Enabled
23,548,723 UART: [fht] FMC Alias Private Key: 7
25,879,181 UART: [art] Extend RT PCRs Done
25,880,421 UART: [art] Lock RT PCRs Done
25,882,297 UART: [art] Populate DV Done
25,887,590 UART: [fht] FMC Alias Private Key: 7
25,889,176 UART: [art] Derive CDI
25,889,903 UART: [art] Store in in slot 0x4
25,933,078 UART: [art] Derive Key Pair
25,934,116 UART: [art] Store priv key in slot 0x5
29,176,112 UART: [art] Derive Key Pair - Done
29,189,162 UART: [art] Signing Cert with AUTHO
29,190,466 UART: RITY.KEYID = 7
31,469,799 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,300 UART: [art] PUB.X = 441BEF2E00C2B8B6171E75E3DCDF5711A925C75927243C1CC334308FF3E73E601A5F81F872A1E5F5D16FFD606A51F5FB
31,478,588 UART: [art] PUB.Y = C55923AAF91299FE80258A4EB77E33407F546BD32D18EE094AC6A2D5E8AF9816ACEEB70179C32293F75FC4983DE30B21
31,485,847 UART: [art] SIG.R = 25171F8B90309F1B9E0D4BFE078EDD8331686C78C71018349C25F4D7A337C2B6A73C56B9DAD4062C5EBC1B4AE873D4DE
31,493,218 UART: [art] SIG.S = 7E2E224D0F4F16F99DD8C0290D63361ED534A36E82D9016E8C2CD43BE80DE5B3BA35B27C655286A3639AF1556879E1D7
32,798,519 UART: Caliptra RT
32,799,215 UART: [state] CFI Enabled
32,916,997 UART: [rt] RT listening for mailbox commands...
32,918,875 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,948,924 UART: [rt]cmd =0x52564348, len=36
32,950,571 >>> mbox cmd response: failed
32,950,868 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,980,692 UART: [rt]cmd =0x52564348, len=36
32,982,312 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
4,130,433 ready_for_fw is high
4,130,838 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,070,908 >>> mbox cmd response: success
23,716,848 UART:
23,717,241 UART: Running Caliptra FMC ...
23,718,374 UART:
23,718,521 UART: [state] CFI Enabled
23,726,366 UART: [fht] FMC Alias Private Key: 7
26,056,824 UART: [art] Extend RT PCRs Done
26,058,049 UART: [art] Lock RT PCRs Done
26,059,834 UART: [art] Populate DV Done
26,065,027 UART: [fht] FMC Alias Private Key: 7
26,066,580 UART: [art] Derive CDI
26,067,417 UART: [art] Store in in slot 0x4
26,110,234 UART: [art] Derive Key Pair
26,111,275 UART: [art] Store priv key in slot 0x5
29,352,744 UART: [art] Derive Key Pair - Done
29,365,849 UART: [art] Signing Cert with AUTHO
29,367,154 UART: RITY.KEYID = 7
31,646,467 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,973 UART: [art] PUB.X = F86F678FFB83B3575EC867AAFE62C14625F52E7DD06F52FD6BF793556B1FB67679193C7DA2E645614117030C8ABE5D1A
31,655,207 UART: [art] PUB.Y = C293E13A221FE1308B8C46BA416C0D9633BE04B60F9861C5C834EED18630F47D41B20E71214E75794D88E3B096C645D4
31,662,432 UART: [art] SIG.R = 3C88A54470F278C617BFA8686C594747EEDEEF9EB63F38CAB8B14B51104BD9FDDC6EBBF27AD85E85238A60ABE45F0694
31,669,819 UART: [art] SIG.S = C0FAFC25482510AAD71A37771F734118D5CEF120032BC31BAFA256831C27E57791804AABCD5E524DB0113612637F5B22
32,974,422 UART: Caliptra RT
32,975,134 UART: [state] CFI Enabled
33,092,476 UART: [rt] RT listening for mailbox commands...
33,094,370 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,124,672 UART: [rt]cmd =0x52564348, len=36
33,126,288 >>> mbox cmd response: failed
33,126,586 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,156,487 UART: [rt]cmd =0x52564348, len=36
33,158,277 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
191,990 UART:
192,360 UART: Running Caliptra ROM ...
193,466 UART:
193,608 UART: [state] CFI Enabled
262,786 UART: [state] LifecycleState = Unprovisioned
264,618 UART: [state] DebugLocked = No
267,351 UART: [state] WD Timer not started. Device not locked for debugging
270,381 UART: [kat] SHA2-256
449,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,080 UART: [kat] ++
461,531 UART: [kat] sha1
473,746 UART: [kat] SHA2-256
476,751 UART: [kat] SHA2-384
482,312 UART: [kat] SHA2-512-ACC
485,500 UART: [kat] ECC-384
2,949,054 UART: [kat] HMAC-384Kdf
2,971,753 UART: [kat] LMS
3,501,188 UART: [kat] --
3,506,823 UART: [cold-reset] ++
3,509,321 UART: [fht] FHT @ 0x50003400
3,519,518 UART: [idev] ++
3,520,086 UART: [idev] CDI.KEYID = 6
3,520,999 UART: [idev] SUBJECT.KEYID = 7
3,522,242 UART: [idev] UDS.KEYID = 0
3,523,168 ready_for_fw is high
3,523,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,334 UART: [idev] Erasing UDS.KEYID = 0
6,027,254 UART: [idev] Sha1 KeyId Algorithm
6,050,319 UART: [idev] --
6,053,768 UART: [ldev] ++
6,054,339 UART: [ldev] CDI.KEYID = 6
6,055,223 UART: [ldev] SUBJECT.KEYID = 5
6,056,437 UART: [ldev] AUTHORITY.KEYID = 7
6,057,673 UART: [ldev] FE.KEYID = 1
6,098,250 UART: [ldev] Erasing FE.KEYID = 1
8,603,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,981 UART: [ldev] --
10,415,279 UART: [fwproc] Wait for Commands...
10,417,764 UART: [fwproc] Recv command 0x46574c44
10,419,859 UART: [fwproc] Recv'd Img size: 114448 bytes
13,827,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,286,326 >>> mbox cmd response: success
14,290,916 UART: [afmc] ++
14,291,509 UART: [afmc] CDI.KEYID = 6
14,292,418 UART: [afmc] SUBJECT.KEYID = 7
14,293,642 UART: [afmc] AUTHORITY.KEYID = 5
16,824,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,129 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,891 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,950 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,191 UART: [afmc] --
18,624,891 UART: [cold-reset] --
18,628,222 UART: [state] Locking Datavault
18,631,309 UART: [state] Locking PCR0, PCR1 and PCR31
18,633,005 UART: [state] Locking ICCM
18,635,648 UART: [exit] Launching FMC @ 0x40000130
18,644,095 UART:
18,644,331 UART: Running Caliptra FMC ...
18,645,646 UART:
18,645,824 UART: [state] CFI Enabled
18,707,399 UART: [fht] FMC Alias Private Key: 7
20,471,157 UART: [art] Extend RT PCRs Done
20,472,373 UART: [art] Lock RT PCRs Done
20,474,100 UART: [art] Populate DV Done
20,479,616 UART: [fht] FMC Alias Private Key: 7
20,481,125 UART: [art] Derive CDI
20,481,891 UART: [art] Store in in slot 0x4
20,540,132 UART: [art] Derive Key Pair
20,541,172 UART: [art] Store priv key in slot 0x5
23,004,406 UART: [art] Derive Key Pair - Done
23,017,620 UART: [art] Signing Cert with AUTHO
23,018,928 UART: RITY.KEYID = 7
24,730,154 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,656 UART: [art] PUB.X = AF9839EA53EFE79F37143D8F9A8095DC1D07D6EC30E3C2ED2A55F431280D823999B3EDB59D97778EABDEE5F99646D3BB
24,738,914 UART: [art] PUB.Y = 45ED30F2B221B259D8088D7AB735B2D84A78FF1CAC7EFBA52D34F0E1F5B051EE92D200FE6BB3A81FE91252FCD2777A84
24,746,206 UART: [art] SIG.R = 8223C9E231580BA4561F2DC7D02C3C105F77C79BA9A4CAE94ACABA41C64039CB65B74DBE9F55E10FAC2AA29272692A72
24,753,602 UART: [art] SIG.S = C9D19C52282207979150CC49B7116EDD200872FDE1FD39B65A871A3922325E9881E2D9E583F6E51CB88FB3AAFB7B51AF
25,732,677 UART: Caliptra RT
25,733,389 UART: [state] CFI Enabled
25,897,770 UART: [rt] RT listening for mailbox commands...
25,899,662 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,930,342 UART: [rt]cmd =0x52564348, len=36
25,931,885 >>> mbox cmd response: failed
25,932,193 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,962,196 UART: [rt]cmd =0x52564348, len=36
25,964,330 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
3,381,329 ready_for_fw is high
3,381,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,085,725 >>> mbox cmd response: success
18,365,087 UART:
18,365,468 UART: Running Caliptra FMC ...
18,366,577 UART:
18,366,730 UART: [state] CFI Enabled
18,433,750 UART: [fht] FMC Alias Private Key: 7
20,197,544 UART: [art] Extend RT PCRs Done
20,198,764 UART: [art] Lock RT PCRs Done
20,200,472 UART: [art] Populate DV Done
20,205,830 UART: [fht] FMC Alias Private Key: 7
20,207,322 UART: [art] Derive CDI
20,208,074 UART: [art] Store in in slot 0x4
20,266,470 UART: [art] Derive Key Pair
20,267,473 UART: [art] Store priv key in slot 0x5
22,730,485 UART: [art] Derive Key Pair - Done
22,743,427 UART: [art] Signing Cert with AUTHO
22,744,725 UART: RITY.KEYID = 7
24,456,876 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,377 UART: [art] PUB.X = 5626D094030FD89CD8A7072E33F3114FE12B26DF161738A0720EBCF6ED06F9C80C2100F2534D330D05D3D10BE30C1393
24,465,616 UART: [art] PUB.Y = 48516864F8CAC9C963B364F5DAF56AA3EFA35B41C2C079741C6B0F457E9A8543788C3ADC0E79791794CB616D3F14ADAE
24,472,877 UART: [art] SIG.R = BA3ECB648FD3C8525EAC5EE41DCA527E790B748A14B8CC32F2D754542A1CE5FA9848AA7A4DD395D6B33DA66430B98AD7
24,480,326 UART: [art] SIG.S = 9FE2CB1B4E0AD6FFC91A2672225C6A25023056160A3140620F0E1D3B019A4BA52574A9276CE30B4B70CCFBAF16CF84D8
25,459,172 UART: Caliptra RT
25,459,879 UART: [state] CFI Enabled
25,626,190 UART: [rt] RT listening for mailbox commands...
25,628,074 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,658,867 UART: [rt]cmd =0x52564348, len=36
25,660,756 >>> mbox cmd response: failed
25,661,074 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,690,818 UART: [rt]cmd =0x52564348, len=36
25,692,530 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,394 UART:
192,767 UART: Running Caliptra ROM ...
193,865 UART:
603,432 UART: [state] CFI Enabled
617,590 UART: [state] LifecycleState = Unprovisioned
619,460 UART: [state] DebugLocked = No
621,538 UART: [state] WD Timer not started. Device not locked for debugging
625,128 UART: [kat] SHA2-256
804,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,770 UART: [kat] ++
816,215 UART: [kat] sha1
827,292 UART: [kat] SHA2-256
830,293 UART: [kat] SHA2-384
837,908 UART: [kat] SHA2-512-ACC
840,907 UART: [kat] ECC-384
3,282,013 UART: [kat] HMAC-384Kdf
3,294,391 UART: [kat] LMS
3,823,879 UART: [kat] --
3,826,168 UART: [cold-reset] ++
3,827,815 UART: [fht] FHT @ 0x50003400
3,839,547 UART: [idev] ++
3,840,117 UART: [idev] CDI.KEYID = 6
3,841,020 UART: [idev] SUBJECT.KEYID = 7
3,842,187 UART: [idev] UDS.KEYID = 0
3,843,227 ready_for_fw is high
3,843,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,974 UART: [idev] Erasing UDS.KEYID = 0
6,314,577 UART: [idev] Sha1 KeyId Algorithm
6,336,909 UART: [idev] --
6,340,241 UART: [ldev] ++
6,340,804 UART: [ldev] CDI.KEYID = 6
6,341,787 UART: [ldev] SUBJECT.KEYID = 5
6,342,892 UART: [ldev] AUTHORITY.KEYID = 7
6,344,164 UART: [ldev] FE.KEYID = 1
6,353,922 UART: [ldev] Erasing FE.KEYID = 1
8,824,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,382 UART: [ldev] --
10,616,369 UART: [fwproc] Wait for Commands...
10,618,128 UART: [fwproc] Recv command 0x46574c44
10,620,211 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,726 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,512 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,484,518 >>> mbox cmd response: success
14,488,505 UART: [afmc] ++
14,489,096 UART: [afmc] CDI.KEYID = 6
14,490,000 UART: [afmc] SUBJECT.KEYID = 7
14,491,212 UART: [afmc] AUTHORITY.KEYID = 5
16,993,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,976 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,042 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,886 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,803 UART: [afmc] --
18,792,922 UART: [cold-reset] --
18,795,551 UART: [state] Locking Datavault
18,799,012 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,722 UART: [state] Locking ICCM
18,801,965 UART: [exit] Launching FMC @ 0x40000130
18,810,417 UART:
18,810,647 UART: Running Caliptra FMC ...
18,811,740 UART:
18,811,894 UART: [state] CFI Enabled
18,819,986 UART: [fht] FMC Alias Private Key: 7
20,576,935 UART: [art] Extend RT PCRs Done
20,578,147 UART: [art] Lock RT PCRs Done
20,579,851 UART: [art] Populate DV Done
20,585,256 UART: [fht] FMC Alias Private Key: 7
20,586,691 UART: [art] Derive CDI
20,587,448 UART: [art] Store in in slot 0x4
20,629,443 UART: [art] Derive Key Pair
20,630,474 UART: [art] Store priv key in slot 0x5
23,057,487 UART: [art] Derive Key Pair - Done
23,070,642 UART: [art] Signing Cert with AUTHO
23,071,958 UART: RITY.KEYID = 7
24,777,702 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,202 UART: [art] PUB.X = 38AF8ADD3422806014823D0F02C32D6C6AD373A320AA6502D3EB52A1A45F1085E14827972EFDCF04E747A34F42AC82AE
24,786,426 UART: [art] PUB.Y = 251AB9D859348CA0A79D59DECF5BF1D1BDFBB464A3DB9264FB2D0621E5E7E943D8CE239CB3EA2F24F52440599C21275F
24,793,720 UART: [art] SIG.R = 2EB78DE22CB46C79B0FE0EDC9F4BFF6926DB00037C29A678944D15DEEDDC9E876814B8AC0539045A379146EAA7D85EF6
24,801,114 UART: [art] SIG.S = FAD5FDB2B4E41116D67801144141228E09246EC6CC29AE2E04A1AA1ECFAD18F863D9072121D93A8CA331469704C48A7F
25,780,245 UART: Caliptra RT
25,780,944 UART: [state] CFI Enabled
25,897,622 UART: [rt] RT listening for mailbox commands...
25,899,494 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,929,689 UART: [rt]cmd =0x52564348, len=36
25,931,583 >>> mbox cmd response: failed
25,931,875 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,961,983 UART: [rt]cmd =0x52564348, len=36
25,963,781 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
3,693,797 ready_for_fw is high
3,694,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,260,483 >>> mbox cmd response: success
18,505,436 UART:
18,505,839 UART: Running Caliptra FMC ...
18,506,977 UART:
18,507,136 UART: [state] CFI Enabled
18,514,861 UART: [fht] FMC Alias Private Key: 7
20,270,756 UART: [art] Extend RT PCRs Done
20,271,983 UART: [art] Lock RT PCRs Done
20,273,660 UART: [art] Populate DV Done
20,279,279 UART: [fht] FMC Alias Private Key: 7
20,280,918 UART: [art] Derive CDI
20,281,728 UART: [art] Store in in slot 0x4
20,324,161 UART: [art] Derive Key Pair
20,325,200 UART: [art] Store priv key in slot 0x5
22,752,000 UART: [art] Derive Key Pair - Done
22,765,002 UART: [art] Signing Cert with AUTHO
22,766,308 UART: RITY.KEYID = 7
24,472,250 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,922 UART: [art] PUB.X = FE90B51F3FB99DCEE06B41EF1A1F969C2AE6A360DC0F36C5ED26CC2CF2E168A7334826C3FA262E3AAC8BC41A40B20F0A
24,481,050 UART: [art] PUB.Y = C327AFCB4F320AA42AC3C2B7D55DD2D2F236CDC9EFC9A00447E2969943277D9E764BFF6D15FD751423BF507D7874E3F6
24,488,299 UART: [art] SIG.R = 162EA82B47B77E4385BA65D35BD63FC3A7EF9C2F0DAF3414E2178F1A31DA1CA5CA82ADDC19A9DD7B10D587B64AC553B8
24,495,758 UART: [art] SIG.S = 2DC7FDCBBF65E82BFEECEA55C1EFA46493D239C9941EC28178B8D2E7862FDCE3C4C30F5DF63CFD7697EFB99932768816
25,474,792 UART: Caliptra RT
25,475,493 UART: [state] CFI Enabled
25,593,157 UART: [rt] RT listening for mailbox commands...
25,595,040 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,625,069 UART: [rt]cmd =0x52564348, len=36
25,627,096 >>> mbox cmd response: failed
25,627,390 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,657,228 UART: [rt]cmd =0x52564348, len=36
25,659,078 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,439,596 ready_for_fw is high
3,440,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,723,951 >>> mbox cmd response: success
19,008,254 UART:
19,008,656 UART: Running Caliptra FMC ...
19,009,801 UART:
19,009,964 UART: [state] CFI Enabled
19,077,110 UART: [fht] FMC Alias Private Key: 7
20,841,361 UART: [art] Extend RT PCRs Done
20,842,587 UART: [art] Lock RT PCRs Done
20,844,112 UART: [art] Populate DV Done
20,849,637 UART: [fht] FMC Alias Private Key: 7
20,851,283 UART: [art] Derive CDI
20,852,099 UART: [art] Store in in slot 0x4
20,910,163 UART: [art] Derive Key Pair
20,911,176 UART: [art] Store priv key in slot 0x5
23,373,596 UART: [art] Derive Key Pair - Done
23,386,209 UART: [art] Signing Cert with AUTHO
23,387,507 UART: RITY.KEYID = 7
25,100,186 UART: [art] Erasing AUTHORITY.KEYID = 7
25,101,695 UART: [art] PUB.X = 25017BE6ACFE74E029ED9EA773CD192A494ABF8F092C2686C6B3DC62298CBA8BAD9647918D839356BD4FF75D0652592E
25,109,001 UART: [art] PUB.Y = D4CC72AA5A0FFEBAA96B096F628501BFF06B098DB37F961508415F06D4360AD115E098AD88D74BB04597E9B954E1595F
25,116,218 UART: [art] SIG.R = AC75847798996F19422B48FA4F1500842168F216B22DA2B2CA0E43D182A9A9118846B29EB394BF6E0C37692332858B45
25,123,607 UART: [art] SIG.S = B8E7943CD2D80FE1E624CF8F7E93E22DD02BBE5EC22784EDA90488CEF4CE04F41DA90FC8A34DCB4D5B06F4B03C141B53
26,102,537 UART: Caliptra RT
26,103,247 UART: [state] CFI Enabled
26,268,032 UART: [rt] RT listening for mailbox commands...
26,269,915 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,300,571 UART: [rt]cmd =0x52564348, len=36
26,302,492 >>> mbox cmd response: failed
26,302,804 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,332,701 UART: [rt]cmd =0x52564348, len=36
26,334,414 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
3,759,657 ready_for_fw is high
3,760,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,439 >>> mbox cmd response: success
19,211,383 UART:
19,211,777 UART: Running Caliptra FMC ...
19,212,901 UART:
19,213,058 UART: [state] CFI Enabled
19,221,216 UART: [fht] FMC Alias Private Key: 7
20,978,359 UART: [art] Extend RT PCRs Done
20,979,594 UART: [art] Lock RT PCRs Done
20,981,248 UART: [art] Populate DV Done
20,986,336 UART: [fht] FMC Alias Private Key: 7
20,987,878 UART: [art] Derive CDI
20,988,689 UART: [art] Store in in slot 0x4
21,030,847 UART: [art] Derive Key Pair
21,031,847 UART: [art] Store priv key in slot 0x5
23,458,658 UART: [art] Derive Key Pair - Done
23,471,927 UART: [art] Signing Cert with AUTHO
23,473,257 UART: RITY.KEYID = 7
25,178,782 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,292 UART: [art] PUB.X = C8A507B1A47AA69DF068E586561B17BBA86FD3046E2B2C52691A9510783B1078EEF0D1D0C7D9CCC2AC3E08805636F8A0
25,187,529 UART: [art] PUB.Y = 35EEBE5BB28C10246B399323BF33A417A25F93E7B72FF7DB0B54F59DCC2BEC41F5AE17D07F56D2EBDDDFD531B8CF6671
25,194,826 UART: [art] SIG.R = 5EF0DB405ED94C2B64FE8EF6925BD9B676B6C736801B785299664189E9558D5F20D918E4E0F71479B0BC3464D84D34DA
25,202,185 UART: [art] SIG.S = 423C721E130B26746BBB0F7DFEBE3349D455E93F19A4AB0D95BB8EBA23BB9A876A120C022AA8CF84A7BDF8DFDB71896B
26,180,992 UART: Caliptra RT
26,181,679 UART: [state] CFI Enabled
26,298,197 UART: [rt] RT listening for mailbox commands...
26,300,075 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,330,163 UART: [rt]cmd =0x52564348, len=36
26,332,189 >>> mbox cmd response: failed
26,332,476 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,362,590 UART: [rt]cmd =0x52564348, len=36
26,364,424 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,589 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,257 UART: [kat] SHA2-256
882,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,303 UART: [kat] ++
886,455 UART: [kat] sha1
890,701 UART: [kat] SHA2-256
892,639 UART: [kat] SHA2-384
895,456 UART: [kat] SHA2-512-ACC
897,357 UART: [kat] ECC-384
902,782 UART: [kat] HMAC-384Kdf
907,378 UART: [kat] LMS
1,475,574 UART: [kat] --
1,476,539 UART: [cold-reset] ++
1,476,981 UART: [fht] Storing FHT @ 0x50003400
1,479,926 UART: [idev] ++
1,480,094 UART: [idev] CDI.KEYID = 6
1,480,454 UART: [idev] SUBJECT.KEYID = 7
1,480,878 UART: [idev] UDS.KEYID = 0
1,481,223 ready_for_fw is high
1,481,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,884 UART: [idev] Erasing UDS.KEYID = 0
1,504,886 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,536 UART: [idev] --
1,514,471 UART: [ldev] ++
1,514,639 UART: [ldev] CDI.KEYID = 6
1,515,002 UART: [ldev] SUBJECT.KEYID = 5
1,515,428 UART: [ldev] AUTHORITY.KEYID = 7
1,515,891 UART: [ldev] FE.KEYID = 1
1,520,931 UART: [ldev] Erasing FE.KEYID = 1
1,546,164 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,748 UART: [ldev] --
1,585,083 UART: [fwproc] Waiting for Commands...
1,585,756 UART: [fwproc] Received command 0x46574c44
1,586,547 UART: [fwproc] Received Image of size 114448 bytes
2,886,100 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,738 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,090 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,031 >>> mbox cmd response: success
3,080,189 UART: [afmc] ++
3,080,357 UART: [afmc] CDI.KEYID = 6
3,080,719 UART: [afmc] SUBJECT.KEYID = 7
3,081,144 UART: [afmc] AUTHORITY.KEYID = 5
3,116,373 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,833 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,613 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,226 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,916 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,715 UART: [afmc] --
3,159,691 UART: [cold-reset] --
3,160,545 UART: [state] Locking Datavault
3,161,596 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,200 UART: [state] Locking ICCM
3,162,760 UART: [exit] Launching FMC @ 0x40000130
3,168,089 UART:
3,168,105 UART: Running Caliptra FMC ...
3,168,513 UART:
3,168,567 UART: [state] CFI Enabled
3,178,798 UART: [fht] FMC Alias Private Key: 7
3,286,157 UART: [art] Extend RT PCRs Done
3,286,585 UART: [art] Lock RT PCRs Done
3,288,317 UART: [art] Populate DV Done
3,296,646 UART: [fht] FMC Alias Private Key: 7
3,297,602 UART: [art] Derive CDI
3,297,882 UART: [art] Store in in slot 0x4
3,383,701 UART: [art] Derive Key Pair
3,384,061 UART: [art] Store priv key in slot 0x5
3,397,037 UART: [art] Derive Key Pair - Done
3,412,046 UART: [art] Signing Cert with AUTHO
3,412,526 UART: RITY.KEYID = 7
3,427,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,649 UART: [art] PUB.X = 73F0541AD0E085CC3196424E6EB7D855A49E352C3CB06B45B7537259ED06246C3327C8387B33CCF0FF39D56843AD472D
3,435,416 UART: [art] PUB.Y = 93F55F0E30B498E72D6EA487950B549A4585E8C4BD0CD02136E81BD1C8F578BEB41004BEAE6C6E3FF4C26F6079A191B2
3,442,364 UART: [art] SIG.R = 2D867CF917ECEFBC05A09EC95E0683812E179EAE213D2A6CB684EE32332E1147C906EF1D62744F38255ABFCB8ECF7EF9
3,449,141 UART: [art] SIG.S = BD9A535D25F30B6476A457EEE7B580249AA5BD30A4C6CA6FB68066FA612AA187083EE414E09C6F5624DB5BC4059FEA8C
3,473,151 UART: Caliptra RT
3,473,404 UART: [state] CFI Enabled
3,580,975 UART: [rt] RT listening for mailbox commands...
3,581,645 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,863 UART: [rt]cmd =0x52564348, len=36
3,613,446 >>> mbox cmd response: failed
3,613,446 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,918 UART: [rt]cmd =0x52564348, len=36
3,644,587 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,225 ready_for_fw is high
1,362,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,289 >>> mbox cmd response: success
2,988,495 UART:
2,988,511 UART: Running Caliptra FMC ...
2,988,919 UART:
2,988,973 UART: [state] CFI Enabled
2,999,426 UART: [fht] FMC Alias Private Key: 7
3,107,721 UART: [art] Extend RT PCRs Done
3,108,149 UART: [art] Lock RT PCRs Done
3,109,255 UART: [art] Populate DV Done
3,117,604 UART: [fht] FMC Alias Private Key: 7
3,118,626 UART: [art] Derive CDI
3,118,906 UART: [art] Store in in slot 0x4
3,204,839 UART: [art] Derive Key Pair
3,205,199 UART: [art] Store priv key in slot 0x5
3,218,371 UART: [art] Derive Key Pair - Done
3,232,957 UART: [art] Signing Cert with AUTHO
3,233,437 UART: RITY.KEYID = 7
3,248,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,386 UART: [art] PUB.X = 4C1F4CB1FB1F3C840B99B27E5C5AE0AA947EAE5B2EC076414DC9493657796B1A7F29F775D55ABF23454E842DEDCD0729
3,256,164 UART: [art] PUB.Y = 5F034C9A625E381C56ADC3A607CD066544DE5A449089C986EACCA5EC04380663F9488A2FB608678F028745F06A2FFC7D
3,263,097 UART: [art] SIG.R = 492BF7D513E2ADE00AF1CAA44027E6D18E0523844FCF4556F49D53D9B5366A548B553791BD1BFB6B982EB8719FD64FC1
3,269,871 UART: [art] SIG.S = 5C346D47F12037A045DCB8AE52F384E5CBAEA37676F2FD64239B4E402DBCA4A9B6DC983C93EC0CB1CA8668115E283B7B
3,293,401 UART: Caliptra RT
3,293,654 UART: [state] CFI Enabled
3,401,474 UART: [rt] RT listening for mailbox commands...
3,402,144 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,412 UART: [rt]cmd =0x52564348, len=36
3,434,029 >>> mbox cmd response: failed
3,434,029 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,675 UART: [rt]cmd =0x52564348, len=36
3,464,976 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,038 UART: [kat] SHA2-256
881,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,084 UART: [kat] ++
886,236 UART: [kat] sha1
890,370 UART: [kat] SHA2-256
892,308 UART: [kat] SHA2-384
895,103 UART: [kat] SHA2-512-ACC
897,004 UART: [kat] ECC-384
902,651 UART: [kat] HMAC-384Kdf
907,291 UART: [kat] LMS
1,475,487 UART: [kat] --
1,476,496 UART: [cold-reset] ++
1,476,830 UART: [fht] Storing FHT @ 0x50003400
1,479,805 UART: [idev] ++
1,479,973 UART: [idev] CDI.KEYID = 6
1,480,333 UART: [idev] SUBJECT.KEYID = 7
1,480,757 UART: [idev] UDS.KEYID = 0
1,481,102 ready_for_fw is high
1,481,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,603 UART: [idev] Erasing UDS.KEYID = 0
1,505,141 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,847 UART: [idev] --
1,515,062 UART: [ldev] ++
1,515,230 UART: [ldev] CDI.KEYID = 6
1,515,593 UART: [ldev] SUBJECT.KEYID = 5
1,516,019 UART: [ldev] AUTHORITY.KEYID = 7
1,516,482 UART: [ldev] FE.KEYID = 1
1,521,654 UART: [ldev] Erasing FE.KEYID = 1
1,547,389 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,495 UART: [ldev] --
1,586,814 UART: [fwproc] Waiting for Commands...
1,587,511 UART: [fwproc] Received command 0x46574c44
1,588,302 UART: [fwproc] Received Image of size 114448 bytes
2,887,829 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,389 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,741 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,846 >>> mbox cmd response: success
3,081,854 UART: [afmc] ++
3,082,022 UART: [afmc] CDI.KEYID = 6
3,082,384 UART: [afmc] SUBJECT.KEYID = 7
3,082,809 UART: [afmc] AUTHORITY.KEYID = 5
3,117,458 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,738 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,518 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,246 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,131 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,821 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,544 UART: [afmc] --
3,160,460 UART: [cold-reset] --
3,161,270 UART: [state] Locking Datavault
3,162,571 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,175 UART: [state] Locking ICCM
3,163,787 UART: [exit] Launching FMC @ 0x40000130
3,169,116 UART:
3,169,132 UART: Running Caliptra FMC ...
3,169,540 UART:
3,169,683 UART: [state] CFI Enabled
3,180,226 UART: [fht] FMC Alias Private Key: 7
3,288,243 UART: [art] Extend RT PCRs Done
3,288,671 UART: [art] Lock RT PCRs Done
3,290,499 UART: [art] Populate DV Done
3,298,692 UART: [fht] FMC Alias Private Key: 7
3,299,724 UART: [art] Derive CDI
3,300,004 UART: [art] Store in in slot 0x4
3,385,579 UART: [art] Derive Key Pair
3,385,939 UART: [art] Store priv key in slot 0x5
3,398,819 UART: [art] Derive Key Pair - Done
3,413,505 UART: [art] Signing Cert with AUTHO
3,413,985 UART: RITY.KEYID = 7
3,429,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,266 UART: [art] PUB.X = C378F1C1E659DCF178BA3FE18C7211A0F49925871E048AF9FD0F1FC1C95A83D2C4C35DF701D11955FCB8830B156C5A47
3,437,034 UART: [art] PUB.Y = C426DD381201E8D50EDD29D4D86987216D855A4786B804E9AD123F4E712E23F3D72654C0B4CF3FE706E7E2A8B8A5AB35
3,443,978 UART: [art] SIG.R = 4D0445D6C37A99ED26D1BF257B0AC174E743C0C98B58BCB565AD0542A296602AEDC61748EE75F6F885B6DF755A0AE6DC
3,450,750 UART: [art] SIG.S = 9BF18C4F72DA54D0DDE68926C74638A5857C088D20F8266B1E6DEBA31AD8D66443F037C912EA510E0DA304B1D9DDE5C0
3,474,681 UART: Caliptra RT
3,475,026 UART: [state] CFI Enabled
3,584,131 UART: [rt] RT listening for mailbox commands...
3,584,801 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,671 UART: [rt]cmd =0x52564348, len=36
3,616,356 >>> mbox cmd response: failed
3,616,356 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,026 UART: [rt]cmd =0x52564348, len=36
3,647,467 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,954 ready_for_fw is high
1,362,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,896 >>> mbox cmd response: success
2,992,202 UART:
2,992,218 UART: Running Caliptra FMC ...
2,992,626 UART:
2,992,769 UART: [state] CFI Enabled
3,003,356 UART: [fht] FMC Alias Private Key: 7
3,112,233 UART: [art] Extend RT PCRs Done
3,112,661 UART: [art] Lock RT PCRs Done
3,114,335 UART: [art] Populate DV Done
3,122,662 UART: [fht] FMC Alias Private Key: 7
3,123,798 UART: [art] Derive CDI
3,124,078 UART: [art] Store in in slot 0x4
3,209,721 UART: [art] Derive Key Pair
3,210,081 UART: [art] Store priv key in slot 0x5
3,223,297 UART: [art] Derive Key Pair - Done
3,238,232 UART: [art] Signing Cert with AUTHO
3,238,712 UART: RITY.KEYID = 7
3,254,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,907 UART: [art] PUB.X = A0E1B48A954DDEFA8FF0A11B3AA950B5223E49928571F02B175ACA425DC89CE513C8C7E4A3E615429782EDA3D4B4B436
3,261,689 UART: [art] PUB.Y = 4BA43B8EAAFFCD4821FC23C9CF61ECDC630771AA9B0F157A96DFA1FEB3F786FDE939170EEF05BBBED70FEF2840BEF1AC
3,268,662 UART: [art] SIG.R = 87EF1C5F96734888E8E8C08FB769CE6615E4C9BF6D1862E5BBE927CAD587F5B011C8861EA9773FDC91C0844D4D5A76A9
3,275,442 UART: [art] SIG.S = A54CE5F8B366B43D52999244F355AF559F140B047AC2BE71482DB4531F59F24E9F953470FADD4C6047618AD77E3EBB4D
3,298,603 UART: Caliptra RT
3,298,948 UART: [state] CFI Enabled
3,407,064 UART: [rt] RT listening for mailbox commands...
3,407,734 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,566 UART: [rt]cmd =0x52564348, len=36
3,439,241 >>> mbox cmd response: failed
3,439,241 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,949 UART: [rt]cmd =0x52564348, len=36
3,470,438 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
893,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,313 UART: [kat] ++
897,465 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,616 UART: [kat] LMS
1,170,944 UART: [kat] --
1,171,897 UART: [cold-reset] ++
1,172,353 UART: [fht] FHT @ 0x50003400
1,174,856 UART: [idev] ++
1,175,024 UART: [idev] CDI.KEYID = 6
1,175,384 UART: [idev] SUBJECT.KEYID = 7
1,175,808 UART: [idev] UDS.KEYID = 0
1,176,153 ready_for_fw is high
1,176,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,544 UART: [idev] Erasing UDS.KEYID = 0
1,200,617 UART: [idev] Sha1 KeyId Algorithm
1,209,069 UART: [idev] --
1,210,321 UART: [ldev] ++
1,210,489 UART: [ldev] CDI.KEYID = 6
1,210,852 UART: [ldev] SUBJECT.KEYID = 5
1,211,278 UART: [ldev] AUTHORITY.KEYID = 7
1,211,741 UART: [ldev] FE.KEYID = 1
1,216,671 UART: [ldev] Erasing FE.KEYID = 1
1,243,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,659 UART: [ldev] --
1,282,980 UART: [fwproc] Wait for Commands...
1,283,606 UART: [fwproc] Recv command 0x46574c44
1,284,334 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,900 >>> mbox cmd response: success
2,777,950 UART: [afmc] ++
2,778,118 UART: [afmc] CDI.KEYID = 6
2,778,480 UART: [afmc] SUBJECT.KEYID = 7
2,778,905 UART: [afmc] AUTHORITY.KEYID = 5
2,814,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,109 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,722 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,441 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,383 UART: [afmc] --
2,858,471 UART: [cold-reset] --
2,859,143 UART: [state] Locking Datavault
2,860,318 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,922 UART: [state] Locking ICCM
2,861,534 UART: [exit] Launching FMC @ 0x40000130
2,866,863 UART:
2,866,879 UART: Running Caliptra FMC ...
2,867,287 UART:
2,867,341 UART: [state] CFI Enabled
2,877,770 UART: [fht] FMC Alias Private Key: 7
2,985,527 UART: [art] Extend RT PCRs Done
2,985,955 UART: [art] Lock RT PCRs Done
2,987,559 UART: [art] Populate DV Done
2,995,440 UART: [fht] FMC Alias Private Key: 7
2,996,536 UART: [art] Derive CDI
2,996,816 UART: [art] Store in in slot 0x4
3,082,335 UART: [art] Derive Key Pair
3,082,695 UART: [art] Store priv key in slot 0x5
3,095,727 UART: [art] Derive Key Pair - Done
3,110,649 UART: [art] Signing Cert with AUTHO
3,111,129 UART: RITY.KEYID = 7
3,126,073 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,838 UART: [art] PUB.X = CE1B2B1D9FCA8424C67AFC030BADEA87C9C3AEDA4B1BDF543382DB9FF7117F7DAA27B42433AA16F7AD9442EFE3E125F5
3,133,632 UART: [art] PUB.Y = B1E4A32E83402E785D9E177297985F6E3738863DAAF8DB81E041C53547F1EB15077B52A017ACB8D290BBFB07C29AB797
3,140,580 UART: [art] SIG.R = 4064B6CC2592338C6EECE0383869DFFB412EEB30B57171E4101375A5CB384B48C514603685F24620E0ABDEDFBAEAE771
3,147,358 UART: [art] SIG.S = 74DC7AD1CFC98856B2190784A57A7793A0ED0A3568BBB41FA3007C7CC648E05A609F402C8A51B76B8E34DF0A5E7305E3
3,171,199 UART: Caliptra RT
3,171,452 UART: [state] CFI Enabled
3,279,719 UART: [rt] RT listening for mailbox commands...
3,280,389 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,095 UART: [rt]cmd =0x52564348, len=36
3,311,554 >>> mbox cmd response: failed
3,311,554 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,324 UART: [rt]cmd =0x52564348, len=36
3,342,637 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,617 ready_for_fw is high
1,060,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,991 >>> mbox cmd response: success
2,691,501 UART:
2,691,517 UART: Running Caliptra FMC ...
2,691,925 UART:
2,691,979 UART: [state] CFI Enabled
2,702,414 UART: [fht] FMC Alias Private Key: 7
2,810,493 UART: [art] Extend RT PCRs Done
2,810,921 UART: [art] Lock RT PCRs Done
2,812,529 UART: [art] Populate DV Done
2,820,674 UART: [fht] FMC Alias Private Key: 7
2,821,742 UART: [art] Derive CDI
2,822,022 UART: [art] Store in in slot 0x4
2,907,483 UART: [art] Derive Key Pair
2,907,843 UART: [art] Store priv key in slot 0x5
2,920,933 UART: [art] Derive Key Pair - Done
2,935,806 UART: [art] Signing Cert with AUTHO
2,936,286 UART: RITY.KEYID = 7
2,951,118 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,883 UART: [art] PUB.X = 2B69E8DC796726CBA3687C9AD4C1FA4E94B4860E67D820C505CE4560D2BBED7D2C76E90E2FD0D7DE2D1F9285D6997B41
2,958,658 UART: [art] PUB.Y = C2D1480F53A2A0483E621CFF82CAA5983B150A5B21C13896AC634CF890345E3AF3196AC184BD0A8A7F4DBD31786DED4E
2,965,611 UART: [art] SIG.R = 81A584867337D255069E8DCB1B5F2311F8F965010783EEB1BA7795C93C9A67006A4BC577631839698CECBB679C615F24
2,972,344 UART: [art] SIG.S = 57A7171997613E42FD7F3C315C43B34A0BDCE320D2ED344545C84A3806B44C28063F017A4A286A7501E9C6EEF7194C6E
2,996,096 UART: Caliptra RT
2,996,349 UART: [state] CFI Enabled
3,104,846 UART: [rt] RT listening for mailbox commands...
3,105,516 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,256 UART: [rt]cmd =0x52564348, len=36
3,136,655 >>> mbox cmd response: failed
3,136,655 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,403 UART: [rt]cmd =0x52564348, len=36
3,167,698 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
893,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,480 UART: [kat] ++
897,632 UART: [kat] sha1
902,080 UART: [kat] SHA2-256
904,020 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
918,289 UART: [kat] HMAC-384Kdf
922,895 UART: [kat] LMS
1,171,223 UART: [kat] --
1,172,144 UART: [cold-reset] ++
1,172,470 UART: [fht] FHT @ 0x50003400
1,174,973 UART: [idev] ++
1,175,141 UART: [idev] CDI.KEYID = 6
1,175,501 UART: [idev] SUBJECT.KEYID = 7
1,175,925 UART: [idev] UDS.KEYID = 0
1,176,270 ready_for_fw is high
1,176,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,163 UART: [idev] Erasing UDS.KEYID = 0
1,201,538 UART: [idev] Sha1 KeyId Algorithm
1,210,014 UART: [idev] --
1,211,204 UART: [ldev] ++
1,211,372 UART: [ldev] CDI.KEYID = 6
1,211,735 UART: [ldev] SUBJECT.KEYID = 5
1,212,161 UART: [ldev] AUTHORITY.KEYID = 7
1,212,624 UART: [ldev] FE.KEYID = 1
1,217,634 UART: [ldev] Erasing FE.KEYID = 1
1,244,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,200 UART: [ldev] --
1,283,509 UART: [fwproc] Wait for Commands...
1,284,225 UART: [fwproc] Recv command 0x46574c44
1,284,953 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,262 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,125 >>> mbox cmd response: success
2,778,383 UART: [afmc] ++
2,778,551 UART: [afmc] CDI.KEYID = 6
2,778,913 UART: [afmc] SUBJECT.KEYID = 7
2,779,338 UART: [afmc] AUTHORITY.KEYID = 5
2,814,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,936 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,821 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,380 UART: [afmc] --
2,858,296 UART: [cold-reset] --
2,859,368 UART: [state] Locking Datavault
2,860,557 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,161 UART: [state] Locking ICCM
2,861,637 UART: [exit] Launching FMC @ 0x40000130
2,866,966 UART:
2,866,982 UART: Running Caliptra FMC ...
2,867,390 UART:
2,867,533 UART: [state] CFI Enabled
2,877,940 UART: [fht] FMC Alias Private Key: 7
2,986,193 UART: [art] Extend RT PCRs Done
2,986,621 UART: [art] Lock RT PCRs Done
2,988,055 UART: [art] Populate DV Done
2,996,384 UART: [fht] FMC Alias Private Key: 7
2,997,460 UART: [art] Derive CDI
2,997,740 UART: [art] Store in in slot 0x4
3,083,361 UART: [art] Derive Key Pair
3,083,721 UART: [art] Store priv key in slot 0x5
3,096,965 UART: [art] Derive Key Pair - Done
3,112,015 UART: [art] Signing Cert with AUTHO
3,112,495 UART: RITY.KEYID = 7
3,127,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,082 UART: [art] PUB.X = 6C0D3EC87A0D705FC1A83E466CD5202C91E83053BEBA970EE2BF38DE1CA7DFD9C6FFF6144227CC6FE53E53B67B383733
3,134,861 UART: [art] PUB.Y = D68DA3423C1C24FD0B75186380C1EE91E59B867EC9637E9CE5ECB1C7DA0ADD8C45BB1256ED916D2845C5E0244455A41E
3,141,817 UART: [art] SIG.R = 53F45479E383056458EDCA2634DBCBFA903DFB91A6B5028AF1A37BEBD824339D9E5B7AE456CC0D9C90F62FFCE83B4CFB
3,148,600 UART: [art] SIG.S = DE0C0900BD42AD52D729DFC9109E5A5AF91A81F3FDEF91D7C0EBF224D1C215E892655B8B7E1F5113AD1491BE13D0920C
3,171,846 UART: Caliptra RT
3,172,191 UART: [state] CFI Enabled
3,279,072 UART: [rt] RT listening for mailbox commands...
3,279,742 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,732 UART: [rt]cmd =0x52564348, len=36
3,311,373 >>> mbox cmd response: failed
3,311,373 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,973 UART: [rt]cmd =0x52564348, len=36
3,342,404 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,880 ready_for_fw is high
1,060,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,206 >>> mbox cmd response: success
2,689,958 UART:
2,689,974 UART: Running Caliptra FMC ...
2,690,382 UART:
2,690,525 UART: [state] CFI Enabled
2,701,136 UART: [fht] FMC Alias Private Key: 7
2,809,251 UART: [art] Extend RT PCRs Done
2,809,679 UART: [art] Lock RT PCRs Done
2,811,151 UART: [art] Populate DV Done
2,819,526 UART: [fht] FMC Alias Private Key: 7
2,820,624 UART: [art] Derive CDI
2,820,904 UART: [art] Store in in slot 0x4
2,906,861 UART: [art] Derive Key Pair
2,907,221 UART: [art] Store priv key in slot 0x5
2,920,569 UART: [art] Derive Key Pair - Done
2,935,757 UART: [art] Signing Cert with AUTHO
2,936,237 UART: RITY.KEYID = 7
2,951,657 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,422 UART: [art] PUB.X = 9B9C163D88C809AB73785B631A587D5494BA46EFFEF35A8FC754B5263C34E0B39E14C28867739A007B62227F7D2C09A0
2,959,164 UART: [art] PUB.Y = 24499875C43A0245AD9B6D61369B025FDFADE433F89AA882C46E7DA4F7927BB85ADA9BB37A0AAAA702438AF44D955484
2,966,112 UART: [art] SIG.R = 5B2181DBDD81D919A9B5E61F8A0F96807E8EC7F53BD7ECA261B5C548988AF950E8E17B1BB2E1E67657824B0A9799FDB5
2,972,888 UART: [art] SIG.S = D08D0D61050B35FBFB499B410264DB1C3085895D345414524827877F330515F55A5E34C5956EAFE2B2C64A75E83286F8
2,996,276 UART: Caliptra RT
2,996,621 UART: [state] CFI Enabled
3,104,410 UART: [rt] RT listening for mailbox commands...
3,105,080 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,272 UART: [rt]cmd =0x52564348, len=36
3,136,781 >>> mbox cmd response: failed
3,136,781 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,623 UART: [rt]cmd =0x52564348, len=36
3,168,160 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,173,269 UART: [idev] ++
1,173,437 UART: [idev] CDI.KEYID = 6
1,173,798 UART: [idev] SUBJECT.KEYID = 7
1,174,223 UART: [idev] UDS.KEYID = 0
1,174,569 ready_for_fw is high
1,174,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,207,625 UART: [idev] --
1,208,734 UART: [ldev] ++
1,208,902 UART: [ldev] CDI.KEYID = 6
1,209,266 UART: [ldev] SUBJECT.KEYID = 5
1,209,693 UART: [ldev] AUTHORITY.KEYID = 7
1,210,156 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,241,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,252 UART: [ldev] --
1,280,586 UART: [fwproc] Wait for Commands...
1,281,165 UART: [fwproc] Recv command 0x46574c44
1,281,898 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,993 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,302 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,210 >>> mbox cmd response: success
2,775,445 UART: [afmc] ++
2,775,613 UART: [afmc] CDI.KEYID = 6
2,775,976 UART: [afmc] SUBJECT.KEYID = 7
2,776,402 UART: [afmc] AUTHORITY.KEYID = 5
2,811,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,792 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,521 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,404 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,123 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,002 UART: [afmc] --
2,854,902 UART: [cold-reset] --
2,855,810 UART: [state] Locking Datavault
2,856,913 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,517 UART: [state] Locking ICCM
2,858,105 UART: [exit] Launching FMC @ 0x40000130
2,863,434 UART:
2,863,450 UART: Running Caliptra FMC ...
2,863,858 UART:
2,863,912 UART: [state] CFI Enabled
2,874,145 UART: [fht] FMC Alias Private Key: 7
2,982,354 UART: [art] Extend RT PCRs Done
2,982,782 UART: [art] Lock RT PCRs Done
2,984,198 UART: [art] Populate DV Done
2,992,439 UART: [fht] FMC Alias Private Key: 7
2,993,581 UART: [art] Derive CDI
2,993,861 UART: [art] Store in in slot 0x4
3,079,660 UART: [art] Derive Key Pair
3,080,020 UART: [art] Store priv key in slot 0x5
3,093,022 UART: [art] Derive Key Pair - Done
3,107,462 UART: [art] Signing Cert with AUTHO
3,107,942 UART: RITY.KEYID = 7
3,123,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,313 UART: [art] PUB.X = 9F6E08B9D8C48F3A25FCAD5145F5F4CA55399AE4F1A934B0DF0FA699628EBDF57AA6140C7CABEC3375817D8755652575
3,131,086 UART: [art] PUB.Y = B1AB4B4B9062D27CD7CA6802EA7D126324DC0965E8C6178908924BACE6FB8E5B4D83C91F8C580EB2CBBCD5D325027164
3,138,033 UART: [art] SIG.R = 02D03A996728DF7086E08D33EB10D0C13157F86ED54FE5B80886E84B72B993E6C51EB5CDB8C6CFF1034315C0E7153193
3,144,796 UART: [art] SIG.S = 2D86D0D9A21F883FB8B822DBEE92A9095B9AD25E8397EE991D30C2A1C1347179F398C6D18E81F4F8985BDE53D204F89A
3,168,061 UART: Caliptra RT
3,168,314 UART: [state] CFI Enabled
3,275,423 UART: [rt] RT listening for mailbox commands...
3,276,093 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,201 UART: [rt]cmd =0x52564348, len=36
3,307,604 >>> mbox cmd response: failed
3,307,604 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,944 UART: [rt]cmd =0x52564348, len=36
3,338,371 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,178 ready_for_fw is high
1,056,178 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,342 >>> mbox cmd response: success
2,683,862 UART:
2,683,878 UART: Running Caliptra FMC ...
2,684,286 UART:
2,684,340 UART: [state] CFI Enabled
2,694,997 UART: [fht] FMC Alias Private Key: 7
2,803,430 UART: [art] Extend RT PCRs Done
2,803,858 UART: [art] Lock RT PCRs Done
2,805,288 UART: [art] Populate DV Done
2,813,479 UART: [fht] FMC Alias Private Key: 7
2,814,657 UART: [art] Derive CDI
2,814,937 UART: [art] Store in in slot 0x4
2,900,564 UART: [art] Derive Key Pair
2,900,924 UART: [art] Store priv key in slot 0x5
2,914,210 UART: [art] Derive Key Pair - Done
2,928,957 UART: [art] Signing Cert with AUTHO
2,929,437 UART: RITY.KEYID = 7
2,944,839 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,604 UART: [art] PUB.X = 6854B566CA2440B5100B25FF7D3FB3F96A5702D84370878C2155C58918113A3CE2B7AF6B57BA8EB330ECB7176807FFAD
2,952,369 UART: [art] PUB.Y = E15A69B0C3527AB88649FE2D761118FDC9B62884150420C28104C98B0BF6EE61AB193C5CF1EBE3E26C23244D510F0C0A
2,959,307 UART: [art] SIG.R = 7B3329157D494A2261622AFB151217F06DB9C258EFE3389DE98679ED281605827CE60E764EDE5E5A92D4594BEA48725D
2,966,069 UART: [art] SIG.S = DEAA21B53965A0856359B2B9390E06007978CB9B3E862D0E6B75E7ACA799146712E0E8EBA06E8DFD3C0852E6D1B6A9D6
2,989,692 UART: Caliptra RT
2,989,945 UART: [state] CFI Enabled
3,097,854 UART: [rt] RT listening for mailbox commands...
3,098,524 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,614 UART: [rt]cmd =0x52564348, len=36
3,129,931 >>> mbox cmd response: failed
3,129,931 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,485 UART: [rt]cmd =0x52564348, len=36
3,160,976 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
921,035 UART: [kat] LMS
1,169,347 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,171,068 UART: [fht] FHT @ 0x50003400
1,173,824 UART: [idev] ++
1,173,992 UART: [idev] CDI.KEYID = 6
1,174,353 UART: [idev] SUBJECT.KEYID = 7
1,174,778 UART: [idev] UDS.KEYID = 0
1,175,124 ready_for_fw is high
1,175,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,199,624 UART: [idev] Sha1 KeyId Algorithm
1,208,494 UART: [idev] --
1,209,671 UART: [ldev] ++
1,209,839 UART: [ldev] CDI.KEYID = 6
1,210,203 UART: [ldev] SUBJECT.KEYID = 5
1,210,630 UART: [ldev] AUTHORITY.KEYID = 7
1,211,093 UART: [ldev] FE.KEYID = 1
1,216,575 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,953 UART: [fwproc] Wait for Commands...
1,282,566 UART: [fwproc] Recv command 0x46574c44
1,283,299 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,075 >>> mbox cmd response: success
2,776,344 UART: [afmc] ++
2,776,512 UART: [afmc] CDI.KEYID = 6
2,776,875 UART: [afmc] SUBJECT.KEYID = 7
2,777,301 UART: [afmc] AUTHORITY.KEYID = 5
2,812,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,637 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,366 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,968 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,859 UART: [afmc] --
2,855,839 UART: [cold-reset] --
2,856,655 UART: [state] Locking Datavault
2,857,530 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,134 UART: [state] Locking ICCM
2,858,802 UART: [exit] Launching FMC @ 0x40000130
2,864,131 UART:
2,864,147 UART: Running Caliptra FMC ...
2,864,555 UART:
2,864,698 UART: [state] CFI Enabled
2,875,077 UART: [fht] FMC Alias Private Key: 7
2,983,386 UART: [art] Extend RT PCRs Done
2,983,814 UART: [art] Lock RT PCRs Done
2,985,394 UART: [art] Populate DV Done
2,993,597 UART: [fht] FMC Alias Private Key: 7
2,994,727 UART: [art] Derive CDI
2,995,007 UART: [art] Store in in slot 0x4
3,080,258 UART: [art] Derive Key Pair
3,080,618 UART: [art] Store priv key in slot 0x5
3,094,142 UART: [art] Derive Key Pair - Done
3,109,113 UART: [art] Signing Cert with AUTHO
3,109,593 UART: RITY.KEYID = 7
3,124,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,462 UART: [art] PUB.X = 1F8AE97734DDA66D1492869DAA09C74B290057F5CBA73FCA8318024841D0A4581D4B1D3B807161F73C6DA57599090B24
3,132,196 UART: [art] PUB.Y = A17B83CDE5B52F19B0C02519703AA39B3B77083835DB6F79051A58D60B593769083FA78D8362622A52D23CE40B6A97AA
3,139,129 UART: [art] SIG.R = 8525EB85AC1CB703E64B8DEBA46E993197C2E2ABE1DD18B162DCAF813E99762B342882B385C2DFA1D854410BF6CC08ED
3,145,906 UART: [art] SIG.S = 50352C6E47005F27F4320F41999C26D911A5D51B8901B611EF4300152A9FFC2C61D64AC0621734170A6E411AF803EEAD
3,169,461 UART: Caliptra RT
3,169,806 UART: [state] CFI Enabled
3,277,307 UART: [rt] RT listening for mailbox commands...
3,277,977 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,787 UART: [rt]cmd =0x52564348, len=36
3,309,168 >>> mbox cmd response: failed
3,309,168 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,610 UART: [rt]cmd =0x52564348, len=36
3,340,223 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,057 ready_for_fw is high
1,057,057 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,995 >>> mbox cmd response: success
2,686,249 UART:
2,686,265 UART: Running Caliptra FMC ...
2,686,673 UART:
2,686,816 UART: [state] CFI Enabled
2,697,453 UART: [fht] FMC Alias Private Key: 7
2,805,670 UART: [art] Extend RT PCRs Done
2,806,098 UART: [art] Lock RT PCRs Done
2,807,678 UART: [art] Populate DV Done
2,815,787 UART: [fht] FMC Alias Private Key: 7
2,816,775 UART: [art] Derive CDI
2,817,055 UART: [art] Store in in slot 0x4
2,902,578 UART: [art] Derive Key Pair
2,902,938 UART: [art] Store priv key in slot 0x5
2,916,130 UART: [art] Derive Key Pair - Done
2,930,813 UART: [art] Signing Cert with AUTHO
2,931,293 UART: RITY.KEYID = 7
2,946,939 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,704 UART: [art] PUB.X = 66D2E19B5F91196EEDD9955F90829FD074861B90286F502FC88181581BA24C1930A19F8059E9A57970184CB9FF777386
2,954,464 UART: [art] PUB.Y = 611649BACB0556A004AE741CA14BA894A27107664B23A3118F2FE8CAE1BF9CBD8ED54532E5FD56D59D2A09367B8271C2
2,961,410 UART: [art] SIG.R = D7C2EE8DEE48234DD94453F045A409386B6B38CCAAF8A41DB08414E66616372F9DECD041ED4188F6F83FD82CE0BD6F09
2,968,188 UART: [art] SIG.S = F975423996BBCFB4036885DB82206A1976A6C0268C603A8AE7E586236694B795B1F8B72722FFF899B83BCBA4A12440EC
2,991,790 UART: Caliptra RT
2,992,135 UART: [state] CFI Enabled
3,100,571 UART: [rt] RT listening for mailbox commands...
3,101,241 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,087 UART: [rt]cmd =0x52564348, len=36
3,132,690 >>> mbox cmd response: failed
3,132,690 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,174 UART: [rt]cmd =0x52564348, len=36
3,163,767 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
192,229 UART:
192,581 UART: Running Caliptra ROM ...
193,774 UART:
193,935 UART: [state] CFI Enabled
267,978 UART: [state] LifecycleState = Unprovisioned
269,958 UART: [state] DebugLocked = No
272,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,003 UART: [kat] SHA2-256
447,726 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,255 UART: [kat] ++
458,735 UART: [kat] sha1
469,898 UART: [kat] SHA2-256
472,627 UART: [kat] SHA2-384
478,260 UART: [kat] SHA2-512-ACC
480,626 UART: [kat] ECC-384
2,767,647 UART: [kat] HMAC-384Kdf
2,778,540 UART: [kat] LMS
3,968,823 UART: [kat] --
3,974,043 UART: [cold-reset] ++
3,976,189 UART: [fht] Storing FHT @ 0x50003400
3,988,238 UART: [idev] ++
3,988,816 UART: [idev] CDI.KEYID = 6
3,989,846 UART: [idev] SUBJECT.KEYID = 7
3,991,020 UART: [idev] UDS.KEYID = 0
3,992,066 ready_for_fw is high
3,992,269 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,816 UART: [idev] Erasing UDS.KEYID = 0
7,325,784 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,603 UART: [idev] --
7,351,760 UART: [ldev] ++
7,352,328 UART: [ldev] CDI.KEYID = 6
7,353,324 UART: [ldev] SUBJECT.KEYID = 5
7,354,488 UART: [ldev] AUTHORITY.KEYID = 7
7,355,844 UART: [ldev] FE.KEYID = 1
7,401,734 UART: [ldev] Erasing FE.KEYID = 1
10,733,033 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,997 UART: [ldev] --
13,094,792 UART: [fwproc] Waiting for Commands...
13,097,969 UART: [fwproc] Received command 0x46574c44
13,100,153 UART: [fwproc] Received Image of size 114124 bytes
21,818,502 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,897,996 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,966,889 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,283,419 >>> mbox cmd response: success
22,288,293 UART: [afmc] ++
22,288,897 UART: [afmc] CDI.KEYID = 6
22,289,811 UART: [afmc] SUBJECT.KEYID = 7
22,291,082 UART: [afmc] AUTHORITY.KEYID = 5
25,659,209 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,957,858 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,960,113 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,974,658 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,989,426 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,003,635 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,024,157 UART: [afmc] --
28,027,923 UART: [cold-reset] --
28,031,464 UART: [state] Locking Datavault
28,036,664 UART: [state] Locking PCR0, PCR1 and PCR31
28,038,420 UART: [state] Locking ICCM
28,040,428 UART: [exit] Launching FMC @ 0x40000130
28,048,823 UART:
28,049,071 UART: Running Caliptra FMC ...
28,050,179 UART:
28,050,349 UART: [state] CFI Enabled
28,117,130 UART: [fht] FMC Alias Private Key: 7
30,455,932 UART: [art] Extend RT PCRs Done
30,457,165 UART: [art] Lock RT PCRs Done
30,458,821 UART: [art] Populate DV Done
30,464,126 UART: [fht] FMC Alias Private Key: 7
30,465,664 UART: [art] Derive CDI
30,466,476 UART: [art] Store in in slot 0x4
30,526,822 UART: [art] Derive Key Pair
30,527,848 UART: [art] Store priv key in slot 0x5
33,820,687 UART: [art] Derive Key Pair - Done
33,833,469 UART: [art] Signing Cert with AUTHO
33,834,796 UART: RITY.KEYID = 7
36,122,459 UART: [art] Erasing AUTHORITY.KEYID = 7
36,123,966 UART: [art] PUB.X = CE4F30A9CF8D99742EE5F2224C0C5FF8B0C0CB8AB48BD0E1B7806F6EE26F9174BAA038916F40BBAB0AAECACEF426A9F7
36,131,265 UART: [art] PUB.Y = 2C960A3BD633747F2F5031B7BC65B4BF3A1C826FACD20C97FD13FF0DAA40C3065B861612665B7E9D8D09DD4536B4A60E
36,138,520 UART: [art] SIG.R = 9878AF7E3CD6935338C2E3A6280BB8F75AFC2F5089F449153EBFFF77831F6FBE24EFB59BF3C3B7BD3C175BDC01881CE8
36,145,905 UART: [art] SIG.S = 5CD77063C0473690629D7DEDF25782D8C7BBFEE83CC5DAAE918991CF073B5FC985CE32CC093F0B078856ABAC8CD51BBC
37,450,900 UART: Caliptra RT
37,451,615 UART: [state] CFI Enabled
37,614,003 UART: [rt] RT listening for mailbox commands...
41,788,442 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,944,223 UART: [rt]cmd =0x41544d4e, len=14344
50,204,320 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,802,903 ready_for_fw is high
3,803,389 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,301,085 >>> mbox cmd response: success
27,998,270 UART:
27,998,847 UART: Running Caliptra FMC ...
27,999,973 UART:
28,000,129 UART: [state] CFI Enabled
28,067,507 UART: [fht] FMC Alias Private Key: 7
30,404,907 UART: [art] Extend RT PCRs Done
30,406,193 UART: [art] Lock RT PCRs Done
30,407,745 UART: [art] Populate DV Done
30,413,117 UART: [fht] FMC Alias Private Key: 7
30,414,668 UART: [art] Derive CDI
30,415,439 UART: [art] Store in in slot 0x4
30,475,470 UART: [art] Derive Key Pair
30,476,526 UART: [art] Store priv key in slot 0x5
33,769,755 UART: [art] Derive Key Pair - Done
33,783,081 UART: [art] Signing Cert with AUTHO
33,784,392 UART: RITY.KEYID = 7
36,071,973 UART: [art] Erasing AUTHORITY.KEYID = 7
36,073,482 UART: [art] PUB.X = 4306FE10B216F5200A4937C2B8EF8083A36E26C0D6FF51CE9770268602A9A2FA62F41DCB47F915826F3ED526C61D4A66
36,080,730 UART: [art] PUB.Y = 704C7AA43C91C74C8CA68A235D63313F1FA4FE2BACDE3DE77B443337E441E2AE53EAFD53AF62BC8DA0FF9AE62D19F3EA
36,087,990 UART: [art] SIG.R = 973343907BE386ABC0AA913B1D9DBE8A2554862D380FBE2AE34F7F1C9D53AE7EB4B2F29D05B1BC265E63638DABD22134
36,095,363 UART: [art] SIG.S = 9AFCA49BF81093D0D334B758DD2F53AA872CFD31D285877A5D48F798F0101C50037BADBA406B5BC80A4DA1BB4D3988CA
37,400,347 UART: Caliptra RT
37,401,083 UART: [state] CFI Enabled
37,563,159 UART: [rt] RT listening for mailbox commands...
41,739,548 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,894,935 UART: [rt]cmd =0x41544d4e, len=14344
50,337,403 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,370 UART:
192,738 UART: Running Caliptra ROM ...
193,840 UART:
603,515 UART: [state] CFI Enabled
616,560 UART: [state] LifecycleState = Unprovisioned
618,430 UART: [state] DebugLocked = No
620,654 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,224 UART: [kat] SHA2-256
796,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,543 UART: [kat] ++
806,984 UART: [kat] sha1
819,217 UART: [kat] SHA2-256
821,940 UART: [kat] SHA2-384
827,144 UART: [kat] SHA2-512-ACC
829,507 UART: [kat] ECC-384
3,111,549 UART: [kat] HMAC-384Kdf
3,122,696 UART: [kat] LMS
4,312,806 UART: [kat] --
4,315,972 UART: [cold-reset] ++
4,317,048 UART: [fht] Storing FHT @ 0x50003400
4,328,764 UART: [idev] ++
4,329,322 UART: [idev] CDI.KEYID = 6
4,330,270 UART: [idev] SUBJECT.KEYID = 7
4,331,505 UART: [idev] UDS.KEYID = 0
4,332,480 ready_for_fw is high
4,332,690 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,445 UART: [idev] Erasing UDS.KEYID = 0
7,617,896 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,563 UART: [idev] --
7,644,555 UART: [ldev] ++
7,645,127 UART: [ldev] CDI.KEYID = 6
7,646,087 UART: [ldev] SUBJECT.KEYID = 5
7,647,314 UART: [ldev] AUTHORITY.KEYID = 7
7,648,543 UART: [ldev] FE.KEYID = 1
7,659,453 UART: [ldev] Erasing FE.KEYID = 1
10,948,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,656 UART: [ldev] --
13,309,694 UART: [fwproc] Waiting for Commands...
13,312,643 UART: [fwproc] Received command 0x46574c44
13,314,820 UART: [fwproc] Received Image of size 114124 bytes
21,953,522 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,039,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,108,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,426,189 >>> mbox cmd response: success
22,430,859 UART: [afmc] ++
22,431,457 UART: [afmc] CDI.KEYID = 6
22,432,336 UART: [afmc] SUBJECT.KEYID = 7
22,433,598 UART: [afmc] AUTHORITY.KEYID = 5
25,750,267 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,042,523 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,044,786 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,059,356 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,074,086 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,088,328 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,109,300 UART: [afmc] --
28,113,750 UART: [cold-reset] --
28,117,817 UART: [state] Locking Datavault
28,123,757 UART: [state] Locking PCR0, PCR1 and PCR31
28,125,459 UART: [state] Locking ICCM
28,128,030 UART: [exit] Launching FMC @ 0x40000130
28,136,444 UART:
28,136,679 UART: Running Caliptra FMC ...
28,137,774 UART:
28,137,926 UART: [state] CFI Enabled
28,145,942 UART: [fht] FMC Alias Private Key: 7
30,476,711 UART: [art] Extend RT PCRs Done
30,477,928 UART: [art] Lock RT PCRs Done
30,479,600 UART: [art] Populate DV Done
30,484,957 UART: [fht] FMC Alias Private Key: 7
30,486,470 UART: [art] Derive CDI
30,487,206 UART: [art] Store in in slot 0x4
30,530,324 UART: [art] Derive Key Pair
30,531,307 UART: [art] Store priv key in slot 0x5
33,773,361 UART: [art] Derive Key Pair - Done
33,786,082 UART: [art] Signing Cert with AUTHO
33,787,392 UART: RITY.KEYID = 7
36,067,228 UART: [art] Erasing AUTHORITY.KEYID = 7
36,068,737 UART: [art] PUB.X = 4B230855493D391A9FAF386542C1DFEFFF18BE0419A44CC7E9221CCD951CF804049AEC7CBEDD3809CBF8607B79190393
36,076,022 UART: [art] PUB.Y = 66B9EFB6A9E4DC98A1354DD259D74C2108BEEF3ADC7BFCA616A15C782B303C4DA18930FA397BCC9752A13ABDAEACBF9E
36,083,296 UART: [art] SIG.R = 1C0A8C435BAE35814E1725C6D853BAF7C6A2281D2688896B85568B1B40780080BAE953D79D1ECD15F4D06166C2465531
36,090,619 UART: [art] SIG.S = B8D7134E3B8F082CD243F2C293BF8A7957120660C9EF31D7CEE692CD856233133E9044B82C5DCF3D3AA2A7B6E09BA665
37,395,627 UART: Caliptra RT
37,396,317 UART: [state] CFI Enabled
37,513,977 UART: [rt] RT listening for mailbox commands...
41,533,309 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,688,915 UART: [rt]cmd =0x41544d4e, len=14344
50,105,158 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
4,128,697 ready_for_fw is high
4,129,338 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,107,437 >>> mbox cmd response: success
27,749,584 UART:
27,749,980 UART: Running Caliptra FMC ...
27,751,200 UART:
27,751,365 UART: [state] CFI Enabled
27,759,154 UART: [fht] FMC Alias Private Key: 7
30,090,066 UART: [art] Extend RT PCRs Done
30,091,303 UART: [art] Lock RT PCRs Done
30,092,937 UART: [art] Populate DV Done
30,098,042 UART: [fht] FMC Alias Private Key: 7
30,099,755 UART: [art] Derive CDI
30,100,615 UART: [art] Store in in slot 0x4
30,143,219 UART: [art] Derive Key Pair
30,144,252 UART: [art] Store priv key in slot 0x5
33,386,377 UART: [art] Derive Key Pair - Done
33,399,379 UART: [art] Signing Cert with AUTHO
33,400,684 UART: RITY.KEYID = 7
35,679,996 UART: [art] Erasing AUTHORITY.KEYID = 7
35,681,506 UART: [art] PUB.X = C56E6FE3F461A2F6966A34854C2912D24B0B70DCF439C99C3F2275B01B1726C6BDB1F593FDFEC67FDC7620C9CA61729E
35,688,760 UART: [art] PUB.Y = 4B3B80E8F0528456566E7AB77A60FB9B59169BD24CD163401970C537C4A67CCB5022A47ED359C4204FC110A7CADAFC00
35,695,977 UART: [art] SIG.R = 002A9BD885BB98E058539A279443C2910B8E57FDAF9D8F4BC24E68CB0D738214CB290E8225ADF93B2EBB8B303A34B8B5
35,703,370 UART: [art] SIG.S = 82476ED7E29C688554153A2A43480D00847368EFB83350677DEBD74F293FB45D707D301F35699FDFDBE18B5702B82F36
37,008,705 UART: Caliptra RT
37,009,426 UART: [state] CFI Enabled
37,126,165 UART: [rt] RT listening for mailbox commands...
41,146,358 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,302,054 UART: [rt]cmd =0x41544d4e, len=14344
49,743,763 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
192,045 UART:
192,407 UART: Running Caliptra ROM ...
193,606 UART:
193,765 UART: [state] CFI Enabled
266,643 UART: [state] LifecycleState = Unprovisioned
268,557 UART: [state] DebugLocked = No
271,156 UART: [state] WD Timer not started. Device not locked for debugging
274,254 UART: [kat] SHA2-256
453,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,929 UART: [kat] ++
465,461 UART: [kat] sha1
477,839 UART: [kat] SHA2-256
480,848 UART: [kat] SHA2-384
487,614 UART: [kat] SHA2-512-ACC
490,547 UART: [kat] ECC-384
2,951,624 UART: [kat] HMAC-384Kdf
2,973,521 UART: [kat] LMS
3,503,014 UART: [kat] --
3,505,659 UART: [cold-reset] ++
3,508,224 UART: [fht] FHT @ 0x50003400
3,519,983 UART: [idev] ++
3,520,546 UART: [idev] CDI.KEYID = 6
3,521,502 UART: [idev] SUBJECT.KEYID = 7
3,522,672 UART: [idev] UDS.KEYID = 0
3,523,667 ready_for_fw is high
3,523,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,902 UART: [idev] Erasing UDS.KEYID = 0
6,031,132 UART: [idev] Sha1 KeyId Algorithm
6,054,693 UART: [idev] --
6,058,201 UART: [ldev] ++
6,058,774 UART: [ldev] CDI.KEYID = 6
6,059,663 UART: [ldev] SUBJECT.KEYID = 5
6,060,843 UART: [ldev] AUTHORITY.KEYID = 7
6,062,136 UART: [ldev] FE.KEYID = 1
6,101,876 UART: [ldev] Erasing FE.KEYID = 1
8,603,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,339 UART: [ldev] --
10,416,332 UART: [fwproc] Wait for Commands...
10,419,169 UART: [fwproc] Recv command 0x46574c44
10,421,265 UART: [fwproc] Recv'd Img size: 114448 bytes
15,001,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,083,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,151,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,469,582 >>> mbox cmd response: success
15,474,391 UART: [afmc] ++
15,474,993 UART: [afmc] CDI.KEYID = 6
15,475,908 UART: [afmc] SUBJECT.KEYID = 7
15,477,072 UART: [afmc] AUTHORITY.KEYID = 5
18,023,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,744,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,746,057 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,762,011 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,777,998 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,793,779 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,816,463 UART: [afmc] --
19,820,593 UART: [cold-reset] --
19,824,824 UART: [state] Locking Datavault
19,831,205 UART: [state] Locking PCR0, PCR1 and PCR31
19,832,900 UART: [state] Locking ICCM
19,834,777 UART: [exit] Launching FMC @ 0x40000130
19,843,241 UART:
19,843,475 UART: Running Caliptra FMC ...
19,844,575 UART:
19,844,736 UART: [state] CFI Enabled
19,903,640 UART: [fht] FMC Alias Private Key: 7
21,667,266 UART: [art] Extend RT PCRs Done
21,668,482 UART: [art] Lock RT PCRs Done
21,670,105 UART: [art] Populate DV Done
21,675,511 UART: [fht] FMC Alias Private Key: 7
21,677,095 UART: [art] Derive CDI
21,677,910 UART: [art] Store in in slot 0x4
21,735,650 UART: [art] Derive Key Pair
21,736,688 UART: [art] Store priv key in slot 0x5
24,200,242 UART: [art] Derive Key Pair - Done
24,213,068 UART: [art] Signing Cert with AUTHO
24,214,372 UART: RITY.KEYID = 7
25,924,779 UART: [art] Erasing AUTHORITY.KEYID = 7
25,926,279 UART: [art] PUB.X = 18A09E7DF17E4F6FDD197CAC45CA8F01D64D46FA65D08A76D3A2B077B4A9DF1C0C490338F386B3861D1D8C27C2ADFA6D
25,933,540 UART: [art] PUB.Y = 897C8137E3E52816C76DA28910DA1829E56D59A96C514D712879D779D9FBD335753B7A854F3A72AAFC728CBD83E6CE63
25,940,813 UART: [art] SIG.R = 09D201DAA2A6273A0C9E52F91F48AEAB08B182BBBE9469C0DD996844BBC9E989E5F8FC708FEDBA75719CC78DE658D2A1
25,948,218 UART: [art] SIG.S = D9FD0D6C2133CE7F4C92B6928E89E3CCDDA82C2CFE3344378EDF25F65ED69350C11B9D7FE435F152756BAEB2F1D45B6E
26,927,103 UART: Caliptra RT
26,927,802 UART: [state] CFI Enabled
27,092,442 UART: [rt] RT listening for mailbox commands...
31,133,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,289,974 UART: [rt]cmd =0x41544d4e, len=14344
36,069,498 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,379,371 ready_for_fw is high
3,379,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,071,543 >>> mbox cmd response: success
19,368,793 UART:
19,369,209 UART: Running Caliptra FMC ...
19,370,712 UART:
19,370,893 UART: [state] CFI Enabled
19,435,318 UART: [fht] FMC Alias Private Key: 7
21,200,216 UART: [art] Extend RT PCRs Done
21,201,443 UART: [art] Lock RT PCRs Done
21,203,179 UART: [art] Populate DV Done
21,208,592 UART: [fht] FMC Alias Private Key: 7
21,210,186 UART: [art] Derive CDI
21,210,940 UART: [art] Store in in slot 0x4
21,269,116 UART: [art] Derive Key Pair
21,270,122 UART: [art] Store priv key in slot 0x5
23,732,721 UART: [art] Derive Key Pair - Done
23,746,038 UART: [art] Signing Cert with AUTHO
23,747,350 UART: RITY.KEYID = 7
25,459,038 UART: [art] Erasing AUTHORITY.KEYID = 7
25,460,573 UART: [art] PUB.X = 97D4D8A371A1DCBD8689D296B4921AF8E082EB5098CBF75265DBF05D77D0EBB1E9B7CDDF78819DE4613FBF5972699174
25,467,833 UART: [art] PUB.Y = D6D6D2ADE593612F2BC5BEADAE54ADA99F3B287F2233CCD629978DCDD50DF890F8E1E2F6EFD9076999CC4B078FFB5945
25,475,133 UART: [art] SIG.R = A4C611DBD264C42827D49299DA04FEA4E373B4B4B326644F2E8ADDEA8A2107A26BFC5BCC97D574EFD58A27B96FDEF9C9
25,482,527 UART: [art] SIG.S = 6E09DE8A6DCB62D6B7BB795B491AC660D0AFBC7810EF0F66FAEC7F6ED1A58799E4CC51D475F216843A3AC2ABB0D6ED65
26,461,204 UART: Caliptra RT
26,461,913 UART: [state] CFI Enabled
26,627,852 UART: [rt] RT listening for mailbox commands...
30,667,477 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,823,538 UART: [rt]cmd =0x41544d4e, len=14344
35,607,652 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
192,246 UART:
192,626 UART: Running Caliptra ROM ...
193,818 UART:
603,588 UART: [state] CFI Enabled
619,316 UART: [state] LifecycleState = Unprovisioned
621,191 UART: [state] DebugLocked = No
622,879 UART: [state] WD Timer not started. Device not locked for debugging
625,773 UART: [kat] SHA2-256
804,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,503 UART: [kat] ++
817,035 UART: [kat] sha1
828,325 UART: [kat] SHA2-256
831,354 UART: [kat] SHA2-384
837,130 UART: [kat] SHA2-512-ACC
840,057 UART: [kat] ECC-384
3,278,836 UART: [kat] HMAC-384Kdf
3,291,354 UART: [kat] LMS
3,820,802 UART: [kat] --
3,822,948 UART: [cold-reset] ++
3,824,300 UART: [fht] FHT @ 0x50003400
3,834,409 UART: [idev] ++
3,834,958 UART: [idev] CDI.KEYID = 6
3,835,918 UART: [idev] SUBJECT.KEYID = 7
3,837,151 UART: [idev] UDS.KEYID = 0
3,838,066 ready_for_fw is high
3,838,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,981,956 UART: [idev] Erasing UDS.KEYID = 0
6,312,869 UART: [idev] Sha1 KeyId Algorithm
6,334,959 UART: [idev] --
6,338,081 UART: [ldev] ++
6,338,694 UART: [ldev] CDI.KEYID = 6
6,339,769 UART: [ldev] SUBJECT.KEYID = 5
6,340,870 UART: [ldev] AUTHORITY.KEYID = 7
6,342,037 UART: [ldev] FE.KEYID = 1
6,354,888 UART: [ldev] Erasing FE.KEYID = 1
8,830,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,980 UART: [ldev] --
10,621,376 UART: [fwproc] Wait for Commands...
10,624,434 UART: [fwproc] Recv command 0x46574c44
10,626,512 UART: [fwproc] Recv'd Img size: 114448 bytes
15,188,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,266,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,335,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,654,226 >>> mbox cmd response: success
15,658,379 UART: [afmc] ++
15,658,971 UART: [afmc] CDI.KEYID = 6
15,659,846 UART: [afmc] SUBJECT.KEYID = 7
15,661,056 UART: [afmc] AUTHORITY.KEYID = 5
18,166,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,886,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,888,137 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,904,097 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,920,057 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,935,825 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,959,053 UART: [afmc] --
19,962,707 UART: [cold-reset] --
19,967,258 UART: [state] Locking Datavault
19,971,804 UART: [state] Locking PCR0, PCR1 and PCR31
19,973,442 UART: [state] Locking ICCM
19,975,476 UART: [exit] Launching FMC @ 0x40000130
19,983,921 UART:
19,984,149 UART: Running Caliptra FMC ...
19,985,244 UART:
19,985,392 UART: [state] CFI Enabled
19,993,702 UART: [fht] FMC Alias Private Key: 7
21,750,274 UART: [art] Extend RT PCRs Done
21,751,504 UART: [art] Lock RT PCRs Done
21,753,263 UART: [art] Populate DV Done
21,758,509 UART: [fht] FMC Alias Private Key: 7
21,760,148 UART: [art] Derive CDI
21,760,951 UART: [art] Store in in slot 0x4
21,803,320 UART: [art] Derive Key Pair
21,804,356 UART: [art] Store priv key in slot 0x5
24,231,482 UART: [art] Derive Key Pair - Done
24,244,471 UART: [art] Signing Cert with AUTHO
24,245,758 UART: RITY.KEYID = 7
25,951,422 UART: [art] Erasing AUTHORITY.KEYID = 7
25,952,927 UART: [art] PUB.X = B772A688EB6EC12987865ED50AA68086427CC96B93A6EA1CFAED2AFA7D54649EC8442658EDA43ED192ADA3F3DB0061F6
25,960,203 UART: [art] PUB.Y = 46E77726AC64D72922A02511B567D6C01D5EB86F00E7CEC9A97BA0664E6AD0F82A5A0F096380EF7F936159E69F761236
25,967,406 UART: [art] SIG.R = 167CFE5691CB1DB44C3B4F6F6FE5D156D2B43267F4633B8F3D549474B0C9320C3C94BF6B8C6728F71E48E35C12245769
25,974,810 UART: [art] SIG.S = FCF6D340401710536182E8123DCEF34105CB43C35BE097405D741B40F6DCE0E9988EAE6CCEC9CEC6E3945395726DCA4F
26,953,609 UART: Caliptra RT
26,954,315 UART: [state] CFI Enabled
27,071,004 UART: [rt] RT listening for mailbox commands...
31,092,062 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,247,528 UART: [rt]cmd =0x41544d4e, len=14344
36,050,481 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,425 writing to cptra_bootfsm_go
3,694,460 ready_for_fw is high
3,695,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,244,935 >>> mbox cmd response: success
19,493,291 UART:
19,493,687 UART: Running Caliptra FMC ...
19,494,786 UART:
19,494,936 UART: [state] CFI Enabled
19,502,769 UART: [fht] FMC Alias Private Key: 7
21,259,508 UART: [art] Extend RT PCRs Done
21,260,743 UART: [art] Lock RT PCRs Done
21,262,395 UART: [art] Populate DV Done
21,267,647 UART: [fht] FMC Alias Private Key: 7
21,269,345 UART: [art] Derive CDI
21,270,076 UART: [art] Store in in slot 0x4
21,312,676 UART: [art] Derive Key Pair
21,313,736 UART: [art] Store priv key in slot 0x5
23,740,374 UART: [art] Derive Key Pair - Done
23,753,640 UART: [art] Signing Cert with AUTHO
23,754,938 UART: RITY.KEYID = 7
25,460,412 UART: [art] Erasing AUTHORITY.KEYID = 7
25,461,915 UART: [art] PUB.X = B11CF3A195AE77179E3A04BFBDEBACDF5C7230BBEDF255BDB488503B45F6E68A7C7B8402E8FA03493F1C7A9E423FF8E4
25,469,246 UART: [art] PUB.Y = E0F1AEA246E40D3D64E08C96D12183FFBBC06C0318AA7414D6632D0BCE27FB3C617126F2ACEB8E0695705559C7172698
25,476,480 UART: [art] SIG.R = 0188027D77F7A33B06A997EEBFCB61DCA912D7B9744B627410E4D046B5A1F936AE8C45B38631A2AFE4751C307EA546CA
25,483,862 UART: [art] SIG.S = 065B1B5C5E2FB124D225242055BA30939DF0B91A3DE4F6BD90BFCD3CC6CBF0B7E5FAF6BF0A344B1D42103F8C3D2EFD2D
26,462,887 UART: Caliptra RT
26,463,572 UART: [state] CFI Enabled
26,580,697 UART: [rt] RT listening for mailbox commands...
30,602,655 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,758,113 UART: [rt]cmd =0x41544d4e, len=14344
35,555,217 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,440,688 ready_for_fw is high
3,441,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,862,020 >>> mbox cmd response: success
20,157,051 UART:
20,157,451 UART: Running Caliptra FMC ...
20,158,642 UART:
20,158,817 UART: [state] CFI Enabled
20,224,676 UART: [fht] FMC Alias Private Key: 7
21,988,668 UART: [art] Extend RT PCRs Done
21,989,876 UART: [art] Lock RT PCRs Done
21,991,665 UART: [art] Populate DV Done
21,997,070 UART: [fht] FMC Alias Private Key: 7
21,998,664 UART: [art] Derive CDI
21,999,488 UART: [art] Store in in slot 0x4
22,057,785 UART: [art] Derive Key Pair
22,058,822 UART: [art] Store priv key in slot 0x5
24,521,479 UART: [art] Derive Key Pair - Done
24,534,287 UART: [art] Signing Cert with AUTHO
24,535,610 UART: RITY.KEYID = 7
26,247,980 UART: [art] Erasing AUTHORITY.KEYID = 7
26,249,486 UART: [art] PUB.X = EB73FB33FA643943045DCF2E03AA89F57CC31425733D4DCEAD5A00C0022CF274A5DCCFADF2A1CD7AFACDD82E696DC822
26,256,790 UART: [art] PUB.Y = 5AC06ACF97C3B3A6E538055352E5E50ECB0770E3A7B50B2F97A05833F3D352D3FAF6EACE64C345B1C3EFC94E2856428A
26,264,037 UART: [art] SIG.R = 7FC3BC2A6B0EEC9809BD6A1EEB69F1303E52A9C4DA58B6EE5F9516D40299137C47CB1057BFEB62F7186F6EAC28B99462
26,271,446 UART: [art] SIG.S = E62B1BE4A138AF5078E4E93529F16ED8094F289EC39FCF9C1D8D59EE96501F0551E39BB090F7700AE8E5350F4D105D67
27,250,492 UART: Caliptra RT
27,251,199 UART: [state] CFI Enabled
27,415,163 UART: [rt] RT listening for mailbox commands...
31,462,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,618,673 UART: [rt]cmd =0x41544d4e, len=14344
36,421,529 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,749,707 ready_for_fw is high
3,750,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,059,025 >>> mbox cmd response: success
20,318,412 UART:
20,318,795 UART: Running Caliptra FMC ...
20,319,925 UART:
20,320,076 UART: [state] CFI Enabled
20,328,126 UART: [fht] FMC Alias Private Key: 7
22,085,163 UART: [art] Extend RT PCRs Done
22,086,395 UART: [art] Lock RT PCRs Done
22,088,026 UART: [art] Populate DV Done
22,093,440 UART: [fht] FMC Alias Private Key: 7
22,095,084 UART: [art] Derive CDI
22,095,823 UART: [art] Store in in slot 0x4
22,138,201 UART: [art] Derive Key Pair
22,139,196 UART: [art] Store priv key in slot 0x5
24,566,334 UART: [art] Derive Key Pair - Done
24,579,292 UART: [art] Signing Cert with AUTHO
24,580,591 UART: RITY.KEYID = 7
26,286,507 UART: [art] Erasing AUTHORITY.KEYID = 7
26,288,009 UART: [art] PUB.X = C11D5B22D9ABF714E17ABB3624F8297E4816D05976B08C1A95CB4A312A6010B60F75EE76DECDF6B152631CD0239C6EDC
26,295,243 UART: [art] PUB.Y = 119609C735F2CB79D71C784668266ECF65192EF766F4AA6B02313B9620C44BF3DBD9CB4A2E0C582CAAF3C2E9FFD3F158
26,302,508 UART: [art] SIG.R = 0C610299A0AE7AF52A996875C26AED30CA09E5DF8C151BF378D226FC41B723DC998AF932A94D381B01AC76F474FD5372
26,309,902 UART: [art] SIG.S = 613AFEB1CE5100502A8AB655C243E058DFDDC2EFACB010C15D31A30F50679644F7BECD8F3D0BB64551B5E3C12E5247D7
27,289,088 UART: Caliptra RT
27,289,771 UART: [state] CFI Enabled
27,407,367 UART: [rt] RT listening for mailbox commands...
31,427,951 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,583,751 UART: [rt]cmd =0x41544d4e, len=14344
36,387,149 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,801 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,301 UART: [kat] SHA2-256
882,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,347 UART: [kat] ++
886,499 UART: [kat] sha1
890,617 UART: [kat] SHA2-256
892,555 UART: [kat] SHA2-384
895,346 UART: [kat] SHA2-512-ACC
897,247 UART: [kat] ECC-384
902,704 UART: [kat] HMAC-384Kdf
907,346 UART: [kat] LMS
1,475,542 UART: [kat] --
1,476,257 UART: [cold-reset] ++
1,476,825 UART: [fht] Storing FHT @ 0x50003400
1,479,608 UART: [idev] ++
1,479,776 UART: [idev] CDI.KEYID = 6
1,480,136 UART: [idev] SUBJECT.KEYID = 7
1,480,560 UART: [idev] UDS.KEYID = 0
1,480,905 ready_for_fw is high
1,480,905 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,370 UART: [idev] Erasing UDS.KEYID = 0
1,505,418 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,984 UART: [idev] --
1,515,125 UART: [ldev] ++
1,515,293 UART: [ldev] CDI.KEYID = 6
1,515,656 UART: [ldev] SUBJECT.KEYID = 5
1,516,082 UART: [ldev] AUTHORITY.KEYID = 7
1,516,545 UART: [ldev] FE.KEYID = 1
1,521,867 UART: [ldev] Erasing FE.KEYID = 1
1,547,580 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,594 UART: [ldev] --
1,587,045 UART: [fwproc] Waiting for Commands...
1,587,760 UART: [fwproc] Received command 0x46574c44
1,588,551 UART: [fwproc] Received Image of size 114448 bytes
5,084,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,111,512 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,140,864 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,276,957 >>> mbox cmd response: success
5,278,029 UART: [afmc] ++
5,278,197 UART: [afmc] CDI.KEYID = 6
5,278,559 UART: [afmc] SUBJECT.KEYID = 7
5,278,984 UART: [afmc] AUTHORITY.KEYID = 5
5,313,290 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,329,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,330,336 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,336,045 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,341,937 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,347,638 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,355,544 UART: [afmc] --
5,356,614 UART: [cold-reset] --
5,357,512 UART: [state] Locking Datavault
5,358,861 UART: [state] Locking PCR0, PCR1 and PCR31
5,359,465 UART: [state] Locking ICCM
5,359,913 UART: [exit] Launching FMC @ 0x40000130
5,365,242 UART:
5,365,258 UART: Running Caliptra FMC ...
5,365,666 UART:
5,365,720 UART: [state] CFI Enabled
5,376,322 UART: [fht] FMC Alias Private Key: 7
5,483,466 UART: [art] Extend RT PCRs Done
5,483,894 UART: [art] Lock RT PCRs Done
5,485,644 UART: [art] Populate DV Done
5,493,846 UART: [fht] FMC Alias Private Key: 7
5,494,996 UART: [art] Derive CDI
5,495,276 UART: [art] Store in in slot 0x4
5,581,067 UART: [art] Derive Key Pair
5,581,427 UART: [art] Store priv key in slot 0x5
5,594,973 UART: [art] Derive Key Pair - Done
5,609,771 UART: [art] Signing Cert with AUTHO
5,610,251 UART: RITY.KEYID = 7
5,625,301 UART: [art] Erasing AUTHORITY.KEYID = 7
5,626,066 UART: [art] PUB.X = E3FD6773C76220A5C0BAF854FBDAC8C13EF10C7143A768EC5D0A7B6CC11136D2021A5E6513CD5C4321F62F83A4F302ED
5,632,838 UART: [art] PUB.Y = A8810C55CCEDBAE033D5A7260863142346B421405BD2921BE63FCFF116F665648A786D02F1536DD763FF477E584D1DC1
5,639,781 UART: [art] SIG.R = 2A9532B21F779191D1A3A27979CC53DA588DF97D12ED5A8FD35B85BCE65CE72376FAB68585ACC65395D6554CD2DA6F4B
5,646,563 UART: [art] SIG.S = 9BF9A5EDE107D7A1B3DF9DB52CEBA18D928D5FB90D756E1CBD9E8AAEF009F5A131E29BC72CE86DA9C946286262A11009
5,670,800 UART: Caliptra RT
5,671,053 UART: [state] CFI Enabled
5,778,846 UART: [rt] RT listening for mailbox commands...
5,779,516 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,902,458 UART: [rt]cmd =0x41544d4e, len=14344
7,123,593 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,855 ready_for_fw is high
1,363,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,356,311 >>> mbox cmd response: success
5,417,916 UART:
5,417,932 UART: Running Caliptra FMC ...
5,418,340 UART:
5,418,394 UART: [state] CFI Enabled
5,428,582 UART: [fht] FMC Alias Private Key: 7
5,536,392 UART: [art] Extend RT PCRs Done
5,536,820 UART: [art] Lock RT PCRs Done
5,538,638 UART: [art] Populate DV Done
5,546,892 UART: [fht] FMC Alias Private Key: 7
5,547,854 UART: [art] Derive CDI
5,548,134 UART: [art] Store in in slot 0x4
5,633,829 UART: [art] Derive Key Pair
5,634,189 UART: [art] Store priv key in slot 0x5
5,648,007 UART: [art] Derive Key Pair - Done
5,662,723 UART: [art] Signing Cert with AUTHO
5,663,203 UART: RITY.KEYID = 7
5,678,411 UART: [art] Erasing AUTHORITY.KEYID = 7
5,679,176 UART: [art] PUB.X = 1DC90DA298CE45A1C98BECFB895E3B8EB0AA4A314DF827B36C1F1F249E275F97FDD25D415FE4CD957D69124FFB0C7502
5,685,957 UART: [art] PUB.Y = B114407C6EB9E978AEB9366973869A5AF7B3347C640E353D997CD01D5D7753AC5EF33B8613FF63B5E5310548C8AE3B7A
5,692,905 UART: [art] SIG.R = 45D2A64367819D9CF8937D20CAA9529954DE7D42DB5BC90EC372BDBD9632B3AB7918BE206AB501AE989E1F5FB66CC841
5,699,681 UART: [art] SIG.S = 9E78553C573CE3FC6E29E922B6D7D75A5C8E1378823D67349EDE6B195C9D5288FFAF4501D787A9A7FC95FB0DE69749A2
5,723,350 UART: Caliptra RT
5,723,603 UART: [state] CFI Enabled
5,832,344 UART: [rt] RT listening for mailbox commands...
5,833,014 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,956,268 UART: [rt]cmd =0x41544d4e, len=14344
7,182,255 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,358 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,940 UART: [kat] SHA2-256
881,871 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,986 UART: [kat] ++
886,138 UART: [kat] sha1
890,382 UART: [kat] SHA2-256
892,320 UART: [kat] SHA2-384
895,157 UART: [kat] SHA2-512-ACC
897,058 UART: [kat] ECC-384
902,857 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,488 UART: [cold-reset] ++
1,476,872 UART: [fht] Storing FHT @ 0x50003400
1,479,781 UART: [idev] ++
1,479,949 UART: [idev] CDI.KEYID = 6
1,480,309 UART: [idev] SUBJECT.KEYID = 7
1,480,733 UART: [idev] UDS.KEYID = 0
1,481,078 ready_for_fw is high
1,481,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,981 UART: [idev] Erasing UDS.KEYID = 0
1,505,433 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,129 UART: [idev] --
1,515,342 UART: [ldev] ++
1,515,510 UART: [ldev] CDI.KEYID = 6
1,515,873 UART: [ldev] SUBJECT.KEYID = 5
1,516,299 UART: [ldev] AUTHORITY.KEYID = 7
1,516,762 UART: [ldev] FE.KEYID = 1
1,521,966 UART: [ldev] Erasing FE.KEYID = 1
1,547,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,925 UART: [ldev] --
1,587,286 UART: [fwproc] Waiting for Commands...
1,588,093 UART: [fwproc] Received command 0x46574c44
1,588,884 UART: [fwproc] Received Image of size 114448 bytes
4,935,931 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,965,075 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
4,994,427 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,130,592 >>> mbox cmd response: success
5,131,698 UART: [afmc] ++
5,131,866 UART: [afmc] CDI.KEYID = 6
5,132,228 UART: [afmc] SUBJECT.KEYID = 7
5,132,653 UART: [afmc] AUTHORITY.KEYID = 5
5,167,187 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,183,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,184,419 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,190,128 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,196,020 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,201,721 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,209,611 UART: [afmc] --
5,210,513 UART: [cold-reset] --
5,211,215 UART: [state] Locking Datavault
5,212,450 UART: [state] Locking PCR0, PCR1 and PCR31
5,213,054 UART: [state] Locking ICCM
5,213,694 UART: [exit] Launching FMC @ 0x40000130
5,219,023 UART:
5,219,039 UART: Running Caliptra FMC ...
5,219,447 UART:
5,219,590 UART: [state] CFI Enabled
5,230,178 UART: [fht] FMC Alias Private Key: 7
5,337,860 UART: [art] Extend RT PCRs Done
5,338,288 UART: [art] Lock RT PCRs Done
5,340,022 UART: [art] Populate DV Done
5,348,370 UART: [fht] FMC Alias Private Key: 7
5,349,328 UART: [art] Derive CDI
5,349,608 UART: [art] Store in in slot 0x4
5,435,499 UART: [art] Derive Key Pair
5,435,859 UART: [art] Store priv key in slot 0x5
5,449,341 UART: [art] Derive Key Pair - Done
5,464,012 UART: [art] Signing Cert with AUTHO
5,464,492 UART: RITY.KEYID = 7
5,479,894 UART: [art] Erasing AUTHORITY.KEYID = 7
5,480,659 UART: [art] PUB.X = 90647E33EE37677C562136A397385D7C81D683A6A4D44A58FBD4FC543ABFCF88FCB2769A040B1B6EA06C93578B1C4A89
5,487,429 UART: [art] PUB.Y = 0A5823EBB61297900490DE2BE52513508E1928BC04BF0A6028FBCF856922F6E8925859E3FDC1A84A7AA1EAD13143512C
5,494,369 UART: [art] SIG.R = 2DDF4B5B0DAFF543D9395770F519C32069C624FB3E6A156997422EF69DD7887F5F227C66AB5BA06F1754F2A3226778D7
5,501,138 UART: [art] SIG.S = C4D0FAF9B9D21D635BF6596751FC8586E7C53C717871A018A9B792FD4F7201475B303D9B14E3F07C8680BE445A28B569
5,524,638 UART: Caliptra RT
5,524,983 UART: [state] CFI Enabled
5,632,214 UART: [rt] RT listening for mailbox commands...
5,632,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,755,938 UART: [rt]cmd =0x41544d4e, len=14344
6,986,835 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,966 ready_for_fw is high
1,361,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,052,194 >>> mbox cmd response: success
5,113,423 UART:
5,113,439 UART: Running Caliptra FMC ...
5,113,847 UART:
5,113,990 UART: [state] CFI Enabled
5,124,656 UART: [fht] FMC Alias Private Key: 7
5,233,110 UART: [art] Extend RT PCRs Done
5,233,538 UART: [art] Lock RT PCRs Done
5,234,874 UART: [art] Populate DV Done
5,243,028 UART: [fht] FMC Alias Private Key: 7
5,244,114 UART: [art] Derive CDI
5,244,394 UART: [art] Store in in slot 0x4
5,330,255 UART: [art] Derive Key Pair
5,330,615 UART: [art] Store priv key in slot 0x5
5,343,855 UART: [art] Derive Key Pair - Done
5,358,703 UART: [art] Signing Cert with AUTHO
5,359,183 UART: RITY.KEYID = 7
5,374,153 UART: [art] Erasing AUTHORITY.KEYID = 7
5,374,918 UART: [art] PUB.X = 346C0DD82B7EFA3209C74F2C4815AFAF219539E4E523F5259F7F7F42755E0C350F698FC03FCFE9CEAB8E20273A350F1C
5,381,685 UART: [art] PUB.Y = FC911C6CF0A7835B0848FACE802CB75E68A99C9DCD843F9EFA49C416F06B47F6D3F7118035789CC17C1990F6941A6AEA
5,388,644 UART: [art] SIG.R = 5A11994E913B5264ACECA071CAADC3B71B85C40E6E583A5377294870ED3A0DBF8FC798EC012A043E79F8181FC0AF2F0E
5,395,413 UART: [art] SIG.S = 006CB13428FE731E24CF484CBB100FBA32518DEF6FC680818010E2D03B58848D849339522B5EF69E4B632C32B50453F0
5,418,786 UART: Caliptra RT
5,419,131 UART: [state] CFI Enabled
5,526,239 UART: [rt] RT listening for mailbox commands...
5,526,909 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,649,895 UART: [rt]cmd =0x41544d4e, len=14344
6,888,129 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,534 UART: [kat] SHA2-512-ACC
908,435 UART: [kat] ECC-384
918,028 UART: [kat] HMAC-384Kdf
922,514 UART: [kat] LMS
1,170,842 UART: [kat] --
1,171,473 UART: [cold-reset] ++
1,171,995 UART: [fht] FHT @ 0x50003400
1,174,436 UART: [idev] ++
1,174,604 UART: [idev] CDI.KEYID = 6
1,174,964 UART: [idev] SUBJECT.KEYID = 7
1,175,388 UART: [idev] UDS.KEYID = 0
1,175,733 ready_for_fw is high
1,175,733 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,480 UART: [idev] Erasing UDS.KEYID = 0
1,200,671 UART: [idev] Sha1 KeyId Algorithm
1,209,331 UART: [idev] --
1,210,441 UART: [ldev] ++
1,210,609 UART: [ldev] CDI.KEYID = 6
1,210,972 UART: [ldev] SUBJECT.KEYID = 5
1,211,398 UART: [ldev] AUTHORITY.KEYID = 7
1,211,861 UART: [ldev] FE.KEYID = 1
1,217,313 UART: [ldev] Erasing FE.KEYID = 1
1,243,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,383 UART: [ldev] --
1,282,700 UART: [fwproc] Wait for Commands...
1,283,278 UART: [fwproc] Recv command 0x46574c44
1,284,006 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,713 >>> mbox cmd response: success
3,319,893 UART: [afmc] ++
3,320,061 UART: [afmc] CDI.KEYID = 6
3,320,423 UART: [afmc] SUBJECT.KEYID = 7
3,320,848 UART: [afmc] AUTHORITY.KEYID = 5
3,356,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,167 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,876 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,768 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,479 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,530 UART: [afmc] --
3,400,582 UART: [cold-reset] --
3,401,434 UART: [state] Locking Datavault
3,402,511 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,115 UART: [state] Locking ICCM
3,403,545 UART: [exit] Launching FMC @ 0x40000130
3,408,874 UART:
3,408,890 UART: Running Caliptra FMC ...
3,409,298 UART:
3,409,352 UART: [state] CFI Enabled
3,419,938 UART: [fht] FMC Alias Private Key: 7
3,528,362 UART: [art] Extend RT PCRs Done
3,528,790 UART: [art] Lock RT PCRs Done
3,530,502 UART: [art] Populate DV Done
3,538,738 UART: [fht] FMC Alias Private Key: 7
3,539,686 UART: [art] Derive CDI
3,539,966 UART: [art] Store in in slot 0x4
3,625,617 UART: [art] Derive Key Pair
3,625,977 UART: [art] Store priv key in slot 0x5
3,638,733 UART: [art] Derive Key Pair - Done
3,653,362 UART: [art] Signing Cert with AUTHO
3,653,842 UART: RITY.KEYID = 7
3,668,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,755 UART: [art] PUB.X = 2E61CDD38EC313CD4AB47BC9C1D3DE9DF69A20753A55D1667707D5F7AF278BE6C55638015A1695980DC7105EF826FD8C
3,676,526 UART: [art] PUB.Y = FB58A8D1130FDF98F9B7A7D1C77BEE71B2B22677E73081725DF8B020AAFC1EAA568D5BE9139DE24A1508ED813DC7FD42
3,683,488 UART: [art] SIG.R = 43554A47F68C8079BDA008E853A8BDE079623B69A6C89B95D00AD83CD8B5DF55737B5DAF95BB50FF4050F43EBDCD640B
3,690,263 UART: [art] SIG.S = 97ACDD5F29026A1407CF0DAD8C29F64BF79BDB05C3082958D8144325676162F00306B1FBA74833FECE6BE50FB9539968
3,714,186 UART: Caliptra RT
3,714,439 UART: [state] CFI Enabled
3,820,881 UART: [rt] RT listening for mailbox commands...
3,821,551 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,359 UART: [rt]cmd =0x41544d4e, len=14344
5,193,005 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,325 ready_for_fw is high
1,060,325 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,847 >>> mbox cmd response: success
3,228,660 UART:
3,228,676 UART: Running Caliptra FMC ...
3,229,084 UART:
3,229,138 UART: [state] CFI Enabled
3,239,336 UART: [fht] FMC Alias Private Key: 7
3,347,170 UART: [art] Extend RT PCRs Done
3,347,598 UART: [art] Lock RT PCRs Done
3,349,184 UART: [art] Populate DV Done
3,357,650 UART: [fht] FMC Alias Private Key: 7
3,358,776 UART: [art] Derive CDI
3,359,056 UART: [art] Store in in slot 0x4
3,444,469 UART: [art] Derive Key Pair
3,444,829 UART: [art] Store priv key in slot 0x5
3,457,503 UART: [art] Derive Key Pair - Done
3,472,061 UART: [art] Signing Cert with AUTHO
3,472,541 UART: RITY.KEYID = 7
3,487,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,646 UART: [art] PUB.X = 9FEDD60E3A7589295F220A9EF050E65093D31F0EFCB2A6D4DEFCD3A4BEF56CCBB50A78F5AD51C477A14161E872C33019
3,495,422 UART: [art] PUB.Y = 0E5F2AA0AB192958D3BA889C487C035B75CF18B3EBD6D4D5BF92A7FB9FE6DAEF17E5D7BBC5FD03545A22D5884B755499
3,502,383 UART: [art] SIG.R = 785637531439C61CB6EB44F8629373373D55C0F130C801C1BBA786649FADA5BB12DB29A98BD7D51996FD15D49E376E96
3,509,150 UART: [art] SIG.S = C1DB8CD1E76ECE3C39250D80615C907430D671BD231471636188101025DFF1AE6A533C976F4CE62AB8B29A3E34DEA969
3,533,026 UART: Caliptra RT
3,533,279 UART: [state] CFI Enabled
3,640,955 UART: [rt] RT listening for mailbox commands...
3,641,625 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,531 UART: [rt]cmd =0x41544d4e, len=14344
5,012,915 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,308 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
893,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,394 UART: [kat] ++
897,546 UART: [kat] sha1
901,626 UART: [kat] SHA2-256
903,566 UART: [kat] SHA2-384
906,155 UART: [kat] SHA2-512-ACC
908,056 UART: [kat] ECC-384
917,587 UART: [kat] HMAC-384Kdf
922,369 UART: [kat] LMS
1,170,697 UART: [kat] --
1,171,748 UART: [cold-reset] ++
1,172,216 UART: [fht] FHT @ 0x50003400
1,174,967 UART: [idev] ++
1,175,135 UART: [idev] CDI.KEYID = 6
1,175,495 UART: [idev] SUBJECT.KEYID = 7
1,175,919 UART: [idev] UDS.KEYID = 0
1,176,264 ready_for_fw is high
1,176,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,043 UART: [idev] Erasing UDS.KEYID = 0
1,200,954 UART: [idev] Sha1 KeyId Algorithm
1,209,308 UART: [idev] --
1,210,432 UART: [ldev] ++
1,210,600 UART: [ldev] CDI.KEYID = 6
1,210,963 UART: [ldev] SUBJECT.KEYID = 5
1,211,389 UART: [ldev] AUTHORITY.KEYID = 7
1,211,852 UART: [ldev] FE.KEYID = 1
1,217,068 UART: [ldev] Erasing FE.KEYID = 1
1,243,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,372 UART: [ldev] --
1,282,877 UART: [fwproc] Wait for Commands...
1,283,553 UART: [fwproc] Recv command 0x46574c44
1,284,281 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,438 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,326,499 >>> mbox cmd response: success
3,327,673 UART: [afmc] ++
3,327,841 UART: [afmc] CDI.KEYID = 6
3,328,203 UART: [afmc] SUBJECT.KEYID = 7
3,328,628 UART: [afmc] AUTHORITY.KEYID = 5
3,364,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,205 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,387,914 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,393,806 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,517 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,368 UART: [afmc] --
3,408,466 UART: [cold-reset] --
3,409,170 UART: [state] Locking Datavault
3,410,451 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,055 UART: [state] Locking ICCM
3,411,541 UART: [exit] Launching FMC @ 0x40000130
3,416,870 UART:
3,416,886 UART: Running Caliptra FMC ...
3,417,294 UART:
3,417,437 UART: [state] CFI Enabled
3,428,289 UART: [fht] FMC Alias Private Key: 7
3,536,339 UART: [art] Extend RT PCRs Done
3,536,767 UART: [art] Lock RT PCRs Done
3,538,237 UART: [art] Populate DV Done
3,546,539 UART: [fht] FMC Alias Private Key: 7
3,547,573 UART: [art] Derive CDI
3,547,853 UART: [art] Store in in slot 0x4
3,633,746 UART: [art] Derive Key Pair
3,634,106 UART: [art] Store priv key in slot 0x5
3,647,344 UART: [art] Derive Key Pair - Done
3,662,201 UART: [art] Signing Cert with AUTHO
3,662,681 UART: RITY.KEYID = 7
3,677,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,678,654 UART: [art] PUB.X = 7F517DCE252F35114A364FD4270009C042EC9933BC6F8591C70B417AB557F0E79E6886558CBA9E7A19C0047915D917FC
3,685,391 UART: [art] PUB.Y = 8EA7370E1F81E30FEBA38534AC74478BCC689BBDF7C248DF2F22AF1D76D61C0298DA466BBE62263875D53EAEE5C5E615
3,692,348 UART: [art] SIG.R = 781493DB4940C369B6519631386BD509D26EC49C486102AD93C9206515195195300CAC10FB12FABE2C01FBABE2C07248
3,699,102 UART: [art] SIG.S = B9041C2428E84D9D9EE9E9586E39F578337BEBC608B6245BF18844B68188520B11C22156B6C78DE0408FF5E6D025EF02
3,722,447 UART: Caliptra RT
3,722,792 UART: [state] CFI Enabled
3,830,272 UART: [rt] RT listening for mailbox commands...
3,830,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,620 UART: [rt]cmd =0x41544d4e, len=14344
5,187,146 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,040 ready_for_fw is high
1,061,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,182,159 >>> mbox cmd response: success
3,244,730 UART:
3,244,746 UART: Running Caliptra FMC ...
3,245,154 UART:
3,245,297 UART: [state] CFI Enabled
3,255,991 UART: [fht] FMC Alias Private Key: 7
3,363,413 UART: [art] Extend RT PCRs Done
3,363,841 UART: [art] Lock RT PCRs Done
3,365,523 UART: [art] Populate DV Done
3,373,541 UART: [fht] FMC Alias Private Key: 7
3,374,561 UART: [art] Derive CDI
3,374,841 UART: [art] Store in in slot 0x4
3,460,170 UART: [art] Derive Key Pair
3,460,530 UART: [art] Store priv key in slot 0x5
3,473,926 UART: [art] Derive Key Pair - Done
3,489,088 UART: [art] Signing Cert with AUTHO
3,489,568 UART: RITY.KEYID = 7
3,504,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,313 UART: [art] PUB.X = 1C368D6C32CE2070590AA301802111D9C755D31E1E9602C958E54BD33019E7E4C6295F4D74E1D86B2523CF387F91DC3C
3,512,072 UART: [art] PUB.Y = 1710CAB00F8B62F56B6E565E6527796539A70EA7B0702FBFB462C2F6C07109553083F84EE928B5C73F21A3EC72B4513A
3,519,013 UART: [art] SIG.R = AEF51ED4AAAA5C362BBF970D807CE63CD21D2D7312FF5C34116A2CB74FE8FC0869A862CD83526E2292BF6C739D32C1BC
3,525,797 UART: [art] SIG.S = 25100C5468FD59EB1CACF6820F8A1DD3B8CFA0E4E024C6A840BE383901F790E663367030F417894369FA69DAD229D2D3
3,550,029 UART: Caliptra RT
3,550,374 UART: [state] CFI Enabled
3,657,948 UART: [rt] RT listening for mailbox commands...
3,658,618 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,781,600 UART: [rt]cmd =0x41544d4e, len=14344
5,034,608 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,557 UART: [kat] SHA2-256
901,497 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
915,694 UART: [kat] HMAC-384Kdf
920,354 UART: [kat] LMS
1,168,666 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,957 UART: [fht] FHT @ 0x50003400
1,172,633 UART: [idev] ++
1,172,801 UART: [idev] CDI.KEYID = 6
1,173,162 UART: [idev] SUBJECT.KEYID = 7
1,173,587 UART: [idev] UDS.KEYID = 0
1,173,933 ready_for_fw is high
1,173,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,467 UART: [idev] Erasing UDS.KEYID = 0
1,198,391 UART: [idev] Sha1 KeyId Algorithm
1,207,147 UART: [idev] --
1,208,254 UART: [ldev] ++
1,208,422 UART: [ldev] CDI.KEYID = 6
1,208,786 UART: [ldev] SUBJECT.KEYID = 5
1,209,213 UART: [ldev] AUTHORITY.KEYID = 7
1,209,676 UART: [ldev] FE.KEYID = 1
1,214,858 UART: [ldev] Erasing FE.KEYID = 1
1,241,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,538 UART: [ldev] --
1,280,912 UART: [fwproc] Wait for Commands...
1,281,489 UART: [fwproc] Recv command 0x46574c44
1,282,222 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,521 >>> mbox cmd response: success
3,324,700 UART: [afmc] ++
3,324,868 UART: [afmc] CDI.KEYID = 6
3,325,231 UART: [afmc] SUBJECT.KEYID = 7
3,325,657 UART: [afmc] AUTHORITY.KEYID = 5
3,361,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,118 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,828 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,718 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,429 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,119 UART: [afmc] --
3,405,161 UART: [cold-reset] --
3,406,029 UART: [state] Locking Datavault
3,407,008 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,612 UART: [state] Locking ICCM
3,408,070 UART: [exit] Launching FMC @ 0x40000130
3,413,399 UART:
3,413,415 UART: Running Caliptra FMC ...
3,413,823 UART:
3,413,877 UART: [state] CFI Enabled
3,424,183 UART: [fht] FMC Alias Private Key: 7
3,531,797 UART: [art] Extend RT PCRs Done
3,532,225 UART: [art] Lock RT PCRs Done
3,533,829 UART: [art] Populate DV Done
3,542,273 UART: [fht] FMC Alias Private Key: 7
3,543,213 UART: [art] Derive CDI
3,543,493 UART: [art] Store in in slot 0x4
3,628,772 UART: [art] Derive Key Pair
3,629,132 UART: [art] Store priv key in slot 0x5
3,642,042 UART: [art] Derive Key Pair - Done
3,656,670 UART: [art] Signing Cert with AUTHO
3,657,150 UART: RITY.KEYID = 7
3,672,812 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,577 UART: [art] PUB.X = 0610B0D15D9E6EC8954FCCB2321ABD54B8D4D5091811B30755C580BCCDEDFF42B60659E18CDF1C20C7309F743C66E5D9
3,680,347 UART: [art] PUB.Y = F4BFA6D8B3D57F2B8C064397563079F318A097850EE04F21EF4C49DE33ED5CC86E4E03F8814F08C8118EA0827AA8FE7C
3,687,295 UART: [art] SIG.R = BFC7D950FEEDCB34E7684FEC5E677377816907A9C8435085349111C87E5052E73A08A3EB6AA3F7D865D0404CB04CC461
3,694,063 UART: [art] SIG.S = 7ED685F030CD58F5ABC2D2DA050540BC455DC3633C966C1547E6076126C19DEB206789F670BD1FBA97839D05089D471B
3,717,915 UART: Caliptra RT
3,718,168 UART: [state] CFI Enabled
3,825,120 UART: [rt] RT listening for mailbox commands...
3,825,790 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,892 UART: [rt]cmd =0x41544d4e, len=14344
5,182,562 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,582 ready_for_fw is high
1,055,582 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,157,541 >>> mbox cmd response: success
3,219,824 UART:
3,219,840 UART: Running Caliptra FMC ...
3,220,248 UART:
3,220,302 UART: [state] CFI Enabled
3,230,858 UART: [fht] FMC Alias Private Key: 7
3,338,802 UART: [art] Extend RT PCRs Done
3,339,230 UART: [art] Lock RT PCRs Done
3,340,740 UART: [art] Populate DV Done
3,348,998 UART: [fht] FMC Alias Private Key: 7
3,349,988 UART: [art] Derive CDI
3,350,268 UART: [art] Store in in slot 0x4
3,435,679 UART: [art] Derive Key Pair
3,436,039 UART: [art] Store priv key in slot 0x5
3,449,791 UART: [art] Derive Key Pair - Done
3,464,625 UART: [art] Signing Cert with AUTHO
3,465,105 UART: RITY.KEYID = 7
3,480,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,481,284 UART: [art] PUB.X = 620E3F91E25DDEDC259F6BD5706FDE479656C9C0D24196C2D70B0A765A64C7A9447F36C04C5AF5262DDA16EECE8C97A7
3,488,059 UART: [art] PUB.Y = 4F636EDFBDCCC4D5D9AC6CE92A1CA46C3423A1D3F68F115DFCB6B1A6407D295379BA42561CF9293076108B656BB996E0
3,495,023 UART: [art] SIG.R = 4E0369ED9E143A68783D947C6F8CF103587AE95BDC0545C88083CD277A3DC2FBE23518023EA48C4A92F80813561CD2AA
3,501,782 UART: [art] SIG.S = B6A85848FB6FF8732D3D489C5527C1A5B40F206DCBC3D9917C440B2AE6E212D55CF163F35D06AE40160C70390766B1E0
3,525,914 UART: Caliptra RT
3,526,167 UART: [state] CFI Enabled
3,632,755 UART: [rt] RT listening for mailbox commands...
3,633,425 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,381 UART: [rt]cmd =0x41544d4e, len=14344
4,994,203 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,109 UART: [kat] HMAC-384Kdf
920,769 UART: [kat] LMS
1,169,081 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,174,522 ready_for_fw is high
1,174,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,628 UART: [idev] Sha1 KeyId Algorithm
1,208,320 UART: [idev] --
1,209,415 UART: [ldev] ++
1,209,583 UART: [ldev] CDI.KEYID = 6
1,209,947 UART: [ldev] SUBJECT.KEYID = 5
1,210,374 UART: [ldev] AUTHORITY.KEYID = 7
1,210,837 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,445 UART: [fwproc] Wait for Commands...
1,282,178 UART: [fwproc] Recv command 0x46574c44
1,282,911 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,522 >>> mbox cmd response: success
3,324,651 UART: [afmc] ++
3,324,819 UART: [afmc] CDI.KEYID = 6
3,325,182 UART: [afmc] SUBJECT.KEYID = 7
3,325,608 UART: [afmc] AUTHORITY.KEYID = 5
3,361,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,189 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,899 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,789 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,500 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,348 UART: [afmc] --
3,404,472 UART: [cold-reset] --
3,405,558 UART: [state] Locking Datavault
3,406,729 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,333 UART: [state] Locking ICCM
3,407,859 UART: [exit] Launching FMC @ 0x40000130
3,413,188 UART:
3,413,204 UART: Running Caliptra FMC ...
3,413,612 UART:
3,413,755 UART: [state] CFI Enabled
3,424,221 UART: [fht] FMC Alias Private Key: 7
3,532,561 UART: [art] Extend RT PCRs Done
3,532,989 UART: [art] Lock RT PCRs Done
3,534,409 UART: [art] Populate DV Done
3,542,403 UART: [fht] FMC Alias Private Key: 7
3,543,441 UART: [art] Derive CDI
3,543,721 UART: [art] Store in in slot 0x4
3,629,086 UART: [art] Derive Key Pair
3,629,446 UART: [art] Store priv key in slot 0x5
3,642,646 UART: [art] Derive Key Pair - Done
3,657,714 UART: [art] Signing Cert with AUTHO
3,658,194 UART: RITY.KEYID = 7
3,673,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,385 UART: [art] PUB.X = E276851B3399D9187E62C50936526B5542AB10039EFEAECE6F34D7DFC91BA9726854890B1D9977F405EFAD74C279E70F
3,681,142 UART: [art] PUB.Y = 5311A8D4B704B71E271E0585EC85CF625B954E548A9467A910EB7226C643238A33BE3D69C40ABF9AA31D07078FE01AB3
3,688,079 UART: [art] SIG.R = BB6C2DF790653E869B0FB6CA8F0BBD81B1CEA3B767D2245F75807A6B6D608E68B8550BF0B689648AA8F19DF2BCCE07B6
3,694,855 UART: [art] SIG.S = 1C2A1CFA9D273DB8380173AAF19D0F7F7FF88639D3737396236AC9B4FF704AFB728B9BB1FA79A214CCEFB38E7EA83100
3,719,010 UART: Caliptra RT
3,719,355 UART: [state] CFI Enabled
3,827,497 UART: [rt] RT listening for mailbox commands...
3,828,167 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,329 UART: [rt]cmd =0x41544d4e, len=14344
5,184,953 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,975 ready_for_fw is high
1,056,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,265 >>> mbox cmd response: success
3,233,050 UART:
3,233,066 UART: Running Caliptra FMC ...
3,233,474 UART:
3,233,617 UART: [state] CFI Enabled
3,244,469 UART: [fht] FMC Alias Private Key: 7
3,353,003 UART: [art] Extend RT PCRs Done
3,353,431 UART: [art] Lock RT PCRs Done
3,355,011 UART: [art] Populate DV Done
3,363,393 UART: [fht] FMC Alias Private Key: 7
3,364,373 UART: [art] Derive CDI
3,364,653 UART: [art] Store in in slot 0x4
3,450,902 UART: [art] Derive Key Pair
3,451,262 UART: [art] Store priv key in slot 0x5
3,464,120 UART: [art] Derive Key Pair - Done
3,478,573 UART: [art] Signing Cert with AUTHO
3,479,053 UART: RITY.KEYID = 7
3,494,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,110 UART: [art] PUB.X = 21A0140656A2FC9522BBB1D88906B4E58BB26189D7344CDC2F42C925235A90EB1582F52F94CC3D562C228FCFC3896ECF
3,501,880 UART: [art] PUB.Y = 0A4D097721DC8D41F06A8098F91B9ABDF55355507D7709499AD7121A45ABBEDBA48D8A05E57A1B30546C08752CC31C34
3,508,819 UART: [art] SIG.R = 3F4B5D6B8859E2FB2BE705AE4EEDB85A6DDF52233114FFF8B3409CCC301BBF38F5508239BF70A65AD22CB7568CA1029D
3,515,601 UART: [art] SIG.S = 95463C42D555CA58E6E299C1707B8DF57F44CC4441CFB4ABDE013B35720866FCE56998EA77F4694F338A9604FD04622F
3,539,330 UART: Caliptra RT
3,539,675 UART: [state] CFI Enabled
3,648,449 UART: [rt] RT listening for mailbox commands...
3,649,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,273 UART: [rt]cmd =0x41544d4e, len=14344
5,010,669 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,120 UART:
192,480 UART: Running Caliptra ROM ...
193,593 UART:
193,740 UART: [state] CFI Enabled
265,121 UART: [state] LifecycleState = Unprovisioned
267,116 UART: [state] DebugLocked = No
269,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,224 UART: [kat] SHA2-256
443,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,442 UART: [kat] ++
454,889 UART: [kat] sha1
464,627 UART: [kat] SHA2-256
467,349 UART: [kat] SHA2-384
472,841 UART: [kat] SHA2-512-ACC
475,142 UART: [kat] ECC-384
2,767,926 UART: [kat] HMAC-384Kdf
2,779,252 UART: [kat] LMS
3,969,551 UART: [kat] --
3,972,712 UART: [cold-reset] ++
3,975,072 UART: [fht] Storing FHT @ 0x50003400
3,987,188 UART: [idev] ++
3,987,753 UART: [idev] CDI.KEYID = 6
3,988,741 UART: [idev] SUBJECT.KEYID = 7
3,989,984 UART: [idev] UDS.KEYID = 0
3,991,035 ready_for_fw is high
3,991,243 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,791 UART: [idev] Erasing UDS.KEYID = 0
7,330,067 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,716 UART: [idev] --
7,356,086 UART: [ldev] ++
7,356,659 UART: [ldev] CDI.KEYID = 6
7,357,600 UART: [ldev] SUBJECT.KEYID = 5
7,358,828 UART: [ldev] AUTHORITY.KEYID = 7
7,360,066 UART: [ldev] FE.KEYID = 1
7,402,753 UART: [ldev] Erasing FE.KEYID = 1
10,737,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,155 UART: [ldev] --
13,119,153 UART: [fwproc] Waiting for Commands...
13,122,109 UART: [fwproc] Received command 0x46574c44
13,124,290 UART: [fwproc] Received Image of size 114124 bytes
21,839,897 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,919,269 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,988,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,306,155 >>> mbox cmd response: success
22,310,597 UART: [afmc] ++
22,311,202 UART: [afmc] CDI.KEYID = 6
22,312,118 UART: [afmc] SUBJECT.KEYID = 7
22,313,376 UART: [afmc] AUTHORITY.KEYID = 5
25,684,325 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,982,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,984,874 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,999,403 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,014,197 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,028,419 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,050,213 UART: [afmc] --
28,054,685 UART: [cold-reset] --
28,059,362 UART: [state] Locking Datavault
28,066,015 UART: [state] Locking PCR0, PCR1 and PCR31
28,067,772 UART: [state] Locking ICCM
28,068,792 UART: [exit] Launching FMC @ 0x40000130
28,077,168 UART:
28,077,411 UART: Running Caliptra FMC ...
28,078,521 UART:
28,078,680 UART: [state] CFI Enabled
28,143,794 UART: [fht] FMC Alias Private Key: 7
30,482,025 UART: [art] Extend RT PCRs Done
30,483,256 UART: [art] Lock RT PCRs Done
30,484,973 UART: [art] Populate DV Done
30,490,119 UART: [fht] FMC Alias Private Key: 7
30,491,660 UART: [art] Derive CDI
30,492,394 UART: [art] Store in in slot 0x4
30,552,682 UART: [art] Derive Key Pair
30,553,727 UART: [art] Store priv key in slot 0x5
33,847,128 UART: [art] Derive Key Pair - Done
33,860,074 UART: [art] Signing Cert with AUTHO
33,861,416 UART: RITY.KEYID = 7
36,148,209 UART: [art] Erasing AUTHORITY.KEYID = 7
36,149,715 UART: [art] PUB.X = 95A11D56835FCA9B5B4D60861527E95D51032513F6AB026B4C377602D10A151C1C7CED21C66C0CF3A86B6E5AC2479A74
36,156,964 UART: [art] PUB.Y = AA3E2196209637CBE6BCB6BEB88F2C97D018926E5136EC5FE5BC2F2DF1985A8CA78B5DA805A4B472D787109357F94388
36,164,190 UART: [art] SIG.R = 53794144E33A9C948AF6463E892B8A1A6241C2CF64075B08AA2F0677F7512881227C6BB2B517B1E509C4989C6953B944
36,171,581 UART: [art] SIG.S = CD92264949992DCED4F34B9327662391CF40F7F95917E71518A55045998400CB2CDBAC199F8C91A6E246447C25CBAFE0
37,476,432 UART: Caliptra RT
37,477,146 UART: [state] CFI Enabled
37,638,584 UART: [rt] RT listening for mailbox commands...
37,640,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,796,328 UART: [rt]cmd =0x41544d4e, len=14344
44,005,506 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
3,782,527 ready_for_fw is high
3,782,913 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,441,650 >>> mbox cmd response: success
28,130,725 UART:
28,131,103 UART: Running Caliptra FMC ...
28,132,236 UART:
28,132,401 UART: [state] CFI Enabled
28,200,031 UART: [fht] FMC Alias Private Key: 7
30,538,084 UART: [art] Extend RT PCRs Done
30,539,313 UART: [art] Lock RT PCRs Done
30,541,163 UART: [art] Populate DV Done
30,546,489 UART: [fht] FMC Alias Private Key: 7
30,548,058 UART: [art] Derive CDI
30,548,882 UART: [art] Store in in slot 0x4
30,608,362 UART: [art] Derive Key Pair
30,609,357 UART: [art] Store priv key in slot 0x5
33,902,617 UART: [art] Derive Key Pair - Done
33,915,788 UART: [art] Signing Cert with AUTHO
33,917,097 UART: RITY.KEYID = 7
36,204,520 UART: [art] Erasing AUTHORITY.KEYID = 7
36,206,051 UART: [art] PUB.X = 3B66CF1881F1CCA2776B0B9CEEC6D66F82AF62D2786E7755D9EA76E1ABA59BEAE32ADF061FE77D9E9D5384ABE532F5F2
36,213,325 UART: [art] PUB.Y = 2867EAAAEF633ED8602097562870BBD77D790DD3640A288C817F0BDDACE0BB03ED1F0A686708EAC85C1F54958708E1DE
36,220,577 UART: [art] SIG.R = 6E0A7E274352B08BC5FCDDCE09D0613A84C3C8B437E226F5E7E054CEB46ECB24860CCBEE666591F6A48A5E7F2C6E449E
36,227,953 UART: [art] SIG.S = F02E88922E5D9ACCCB15A19290F380E1CC8188EA317C6FD9CB181B9E44CB86F3B33940753A02BE458E0E692BB4F4A87C
37,532,769 UART: Caliptra RT
37,533,466 UART: [state] CFI Enabled
37,695,866 UART: [rt] RT listening for mailbox commands...
37,698,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,853,710 UART: [rt]cmd =0x41544d4e, len=14344
44,088,625 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,300 UART:
192,684 UART: Running Caliptra ROM ...
193,768 UART:
603,685 UART: [state] CFI Enabled
616,354 UART: [state] LifecycleState = Unprovisioned
618,308 UART: [state] DebugLocked = No
619,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,599 UART: [kat] SHA2-256
793,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,840 UART: [kat] ++
804,352 UART: [kat] sha1
815,376 UART: [kat] SHA2-256
818,072 UART: [kat] SHA2-384
824,084 UART: [kat] SHA2-512-ACC
826,454 UART: [kat] ECC-384
3,109,485 UART: [kat] HMAC-384Kdf
3,120,718 UART: [kat] LMS
4,310,837 UART: [kat] --
4,314,283 UART: [cold-reset] ++
4,315,718 UART: [fht] Storing FHT @ 0x50003400
4,327,478 UART: [idev] ++
4,328,036 UART: [idev] CDI.KEYID = 6
4,329,113 UART: [idev] SUBJECT.KEYID = 7
4,330,313 UART: [idev] UDS.KEYID = 0
4,331,295 ready_for_fw is high
4,331,482 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,474,658 UART: [idev] Erasing UDS.KEYID = 0
7,614,578 UART: [idev] Using Sha1 for KeyId Algorithm
7,636,831 UART: [idev] --
7,641,651 UART: [ldev] ++
7,642,213 UART: [ldev] CDI.KEYID = 6
7,643,168 UART: [ldev] SUBJECT.KEYID = 5
7,644,372 UART: [ldev] AUTHORITY.KEYID = 7
7,645,652 UART: [ldev] FE.KEYID = 1
7,656,969 UART: [ldev] Erasing FE.KEYID = 1
10,942,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,234,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,248,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,263,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,278,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,296,515 UART: [ldev] --
13,301,890 UART: [fwproc] Waiting for Commands...
13,303,655 UART: [fwproc] Received command 0x46574c44
13,305,834 UART: [fwproc] Received Image of size 114124 bytes
22,178,371 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,260,070 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,328,919 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,645,393 >>> mbox cmd response: success
22,650,322 UART: [afmc] ++
22,650,954 UART: [afmc] CDI.KEYID = 6
22,651,871 UART: [afmc] SUBJECT.KEYID = 7
22,653,090 UART: [afmc] AUTHORITY.KEYID = 5
25,968,270 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,261,714 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,263,975 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,278,490 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,293,257 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,307,504 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,328,689 UART: [afmc] --
28,333,075 UART: [cold-reset] --
28,337,374 UART: [state] Locking Datavault
28,344,421 UART: [state] Locking PCR0, PCR1 and PCR31
28,346,174 UART: [state] Locking ICCM
28,347,750 UART: [exit] Launching FMC @ 0x40000130
28,356,140 UART:
28,356,379 UART: Running Caliptra FMC ...
28,357,476 UART:
28,357,628 UART: [state] CFI Enabled
28,365,881 UART: [fht] FMC Alias Private Key: 7
30,697,237 UART: [art] Extend RT PCRs Done
30,698,458 UART: [art] Lock RT PCRs Done
30,700,151 UART: [art] Populate DV Done
30,705,671 UART: [fht] FMC Alias Private Key: 7
30,707,363 UART: [art] Derive CDI
30,708,172 UART: [art] Store in in slot 0x4
30,750,398 UART: [art] Derive Key Pair
30,751,440 UART: [art] Store priv key in slot 0x5
33,992,994 UART: [art] Derive Key Pair - Done
34,005,669 UART: [art] Signing Cert with AUTHO
34,006,972 UART: RITY.KEYID = 7
36,286,536 UART: [art] Erasing AUTHORITY.KEYID = 7
36,288,041 UART: [art] PUB.X = BBBAA4B0F64EEC3CAA518DD131B9F3C93D58A2F390D52CC3001026E334415CD9C08362B2DF3A00874867F895FF797887
36,295,270 UART: [art] PUB.Y = D5481203085B9879A4175B859FE0D2EA0D8619F5A2A623483BEAF6AABB5FDA29F11BA74F6EC884EAF7F0DBC925A89EC9
36,302,541 UART: [art] SIG.R = F9C350863A502BF117F0686F7428E2858D814F6F8AD6D22C82F9A76D9A6D8B0860FC2C537101ED15832ABF9A7DB57495
36,309,910 UART: [art] SIG.S = 4D8F5468008BF742596EF41B68B6AB3540A7CB62D7E3305B4367E88BB342FD3537213A9CE844A09DE929D70563573B6E
37,614,370 UART: Caliptra RT
37,615,081 UART: [state] CFI Enabled
37,732,197 UART: [rt] RT listening for mailbox commands...
37,734,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,889,907 UART: [rt]cmd =0x41544d4e, len=14344
44,202,367 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
4,130,126 ready_for_fw is high
4,130,499 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,115,975 >>> mbox cmd response: success
27,754,280 UART:
27,754,672 UART: Running Caliptra FMC ...
27,755,803 UART:
27,755,957 UART: [state] CFI Enabled
27,763,952 UART: [fht] FMC Alias Private Key: 7
30,094,580 UART: [art] Extend RT PCRs Done
30,095,806 UART: [art] Lock RT PCRs Done
30,097,301 UART: [art] Populate DV Done
30,102,548 UART: [fht] FMC Alias Private Key: 7
30,104,163 UART: [art] Derive CDI
30,104,982 UART: [art] Store in in slot 0x4
30,147,912 UART: [art] Derive Key Pair
30,148,949 UART: [art] Store priv key in slot 0x5
33,391,123 UART: [art] Derive Key Pair - Done
33,403,956 UART: [art] Signing Cert with AUTHO
33,405,256 UART: RITY.KEYID = 7
35,684,352 UART: [art] Erasing AUTHORITY.KEYID = 7
35,685,859 UART: [art] PUB.X = 0E9710EFEC4445E59EC5923CCAB2B0079AF56924ADB7C9CAB544E33B6EA47428EF8E7E1D08D5E0A3F725D7C82167EB0F
35,693,138 UART: [art] PUB.Y = EFD2DDBA9CDE21844527E498782D6AD910822037D7C86B0879F5133F11D0844AC701BE2101095C82BA9A13FD98AC085A
35,700,329 UART: [art] SIG.R = AC26804B81F94FF729F94EFB0342B30B16AF5786C5D5317DB6ACAA4BC5D8696F9375D1459CBF4836BF918033DCA69D8A
35,707,766 UART: [art] SIG.S = 37DF6344B3ACC71DF91E70AC291E838EC2C9F08268677E24DC3F1389E17CD09DCE62C0BFA1EF16F5282E703FA246FC4F
37,013,559 UART: Caliptra RT
37,014,270 UART: [state] CFI Enabled
37,132,439 UART: [rt] RT listening for mailbox commands...
37,134,762 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,289,948 UART: [rt]cmd =0x41544d4e, len=14344
43,576,377 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,089 UART:
192,468 UART: Running Caliptra ROM ...
193,649 UART:
193,815 UART: [state] CFI Enabled
266,527 UART: [state] LifecycleState = Unprovisioned
268,358 UART: [state] DebugLocked = No
270,034 UART: [state] WD Timer not started. Device not locked for debugging
273,863 UART: [kat] SHA2-256
452,979 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,560 UART: [kat] ++
465,086 UART: [kat] sha1
475,545 UART: [kat] SHA2-256
478,614 UART: [kat] SHA2-384
484,386 UART: [kat] SHA2-512-ACC
487,347 UART: [kat] ECC-384
2,950,145 UART: [kat] HMAC-384Kdf
2,973,343 UART: [kat] LMS
3,502,742 UART: [kat] --
3,507,798 UART: [cold-reset] ++
3,509,158 UART: [fht] FHT @ 0x50003400
3,520,345 UART: [idev] ++
3,520,903 UART: [idev] CDI.KEYID = 6
3,521,932 UART: [idev] SUBJECT.KEYID = 7
3,523,035 UART: [idev] UDS.KEYID = 0
3,523,984 ready_for_fw is high
3,524,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,135 UART: [idev] Erasing UDS.KEYID = 0
6,028,017 UART: [idev] Sha1 KeyId Algorithm
6,049,950 UART: [idev] --
6,053,995 UART: [ldev] ++
6,054,588 UART: [ldev] CDI.KEYID = 6
6,055,556 UART: [ldev] SUBJECT.KEYID = 5
6,056,662 UART: [ldev] AUTHORITY.KEYID = 7
6,057,899 UART: [ldev] FE.KEYID = 1
6,102,526 UART: [ldev] Erasing FE.KEYID = 1
8,607,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,765 UART: [ldev] --
10,417,112 UART: [fwproc] Wait for Commands...
10,418,833 UART: [fwproc] Recv command 0x46574c44
10,420,925 UART: [fwproc] Recv'd Img size: 114448 bytes
14,993,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,071,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,140,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,458,945 >>> mbox cmd response: success
15,462,823 UART: [afmc] ++
15,463,419 UART: [afmc] CDI.KEYID = 6
15,464,308 UART: [afmc] SUBJECT.KEYID = 7
15,465,481 UART: [afmc] AUTHORITY.KEYID = 5
18,011,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,750,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,752,130 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,768,084 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,784,009 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,799,805 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,823,497 UART: [afmc] --
19,827,955 UART: [cold-reset] --
19,830,624 UART: [state] Locking Datavault
19,835,002 UART: [state] Locking PCR0, PCR1 and PCR31
19,836,667 UART: [state] Locking ICCM
19,838,766 UART: [exit] Launching FMC @ 0x40000130
19,847,214 UART:
19,847,447 UART: Running Caliptra FMC ...
19,848,549 UART:
19,848,726 UART: [state] CFI Enabled
19,909,251 UART: [fht] FMC Alias Private Key: 7
21,672,440 UART: [art] Extend RT PCRs Done
21,673,647 UART: [art] Lock RT PCRs Done
21,674,996 UART: [art] Populate DV Done
21,680,457 UART: [fht] FMC Alias Private Key: 7
21,682,153 UART: [art] Derive CDI
21,682,965 UART: [art] Store in in slot 0x4
21,740,847 UART: [art] Derive Key Pair
21,741,869 UART: [art] Store priv key in slot 0x5
24,205,087 UART: [art] Derive Key Pair - Done
24,218,102 UART: [art] Signing Cert with AUTHO
24,219,403 UART: RITY.KEYID = 7
25,931,065 UART: [art] Erasing AUTHORITY.KEYID = 7
25,932,712 UART: [art] PUB.X = DA40FD235BC43F556EFB0B3E6A8EAE2C1251A2F230D64EF0B2A8BA30303B85015F55DD049FF967E1FACD24E73DC97CA7
25,939,864 UART: [art] PUB.Y = 9CF00D43A4C540672C68A873A4D44E3466BA3A808841976932E11ACC5303B5EBCC8649A6473902A794A428C3363E29AF
25,947,100 UART: [art] SIG.R = 983037EF0D5012C1E5142B9BFB833A9574100AD364DFF0442C3FE8C15C94C91FA357E64E6DBCB30E37FF3642CB21D132
25,954,492 UART: [art] SIG.S = 757A7BAE2745187BAA6FA35A86F2AE7CCC7B4D544C786A1965B33B0615F0AB172BB0340E9D18EFBFADC3E9F0DC9D022B
26,934,194 UART: Caliptra RT
26,934,890 UART: [state] CFI Enabled
27,099,552 UART: [rt] RT listening for mailbox commands...
27,101,868 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,257,886 UART: [rt]cmd =0x41544d4e, len=14344
30,859,825 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,383,030 ready_for_fw is high
3,383,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,066,319 >>> mbox cmd response: success
19,344,658 UART:
19,345,031 UART: Running Caliptra FMC ...
19,346,147 UART:
19,346,300 UART: [state] CFI Enabled
19,414,423 UART: [fht] FMC Alias Private Key: 7
21,178,398 UART: [art] Extend RT PCRs Done
21,179,610 UART: [art] Lock RT PCRs Done
21,180,960 UART: [art] Populate DV Done
21,186,332 UART: [fht] FMC Alias Private Key: 7
21,187,925 UART: [art] Derive CDI
21,188,665 UART: [art] Store in in slot 0x4
21,247,003 UART: [art] Derive Key Pair
21,248,047 UART: [art] Store priv key in slot 0x5
23,711,104 UART: [art] Derive Key Pair - Done
23,723,696 UART: [art] Signing Cert with AUTHO
23,725,003 UART: RITY.KEYID = 7
25,437,374 UART: [art] Erasing AUTHORITY.KEYID = 7
25,438,892 UART: [art] PUB.X = A95942CD290369A85335A7E0255795598515AFFE9B4DDC4329D9FA2D5487C922955C888F36EB18CFA115B9A42113290D
25,446,146 UART: [art] PUB.Y = F59E09F8CA76D87A616C3A2DE44818F5E7DE84CAB7A99C3BA7455F6AFFEA214CC76634C6417A77C1861C4CE1926DEE53
25,453,408 UART: [art] SIG.R = C79AFFAB5FB5AEFFA534C4B92301E1280B358BC392862BAD14CDE288534D49D769BEBDF53C83343C25E8C42B4A01ABB3
25,460,800 UART: [art] SIG.S = E1C358738A62388DABBCEFE027A3DF6E5A0F24080B2C547EE13C39F6DED8A0DD6F218B7B73CC285D349D06ECDA8612F7
26,439,318 UART: Caliptra RT
26,440,023 UART: [state] CFI Enabled
26,605,398 UART: [rt] RT listening for mailbox commands...
26,607,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,763,421 UART: [rt]cmd =0x41544d4e, len=14344
30,368,159 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,480 UART:
192,849 UART: Running Caliptra ROM ...
194,186 UART:
603,468 UART: [state] CFI Enabled
616,517 UART: [state] LifecycleState = Unprovisioned
618,406 UART: [state] DebugLocked = No
620,925 UART: [state] WD Timer not started. Device not locked for debugging
623,760 UART: [kat] SHA2-256
802,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,461 UART: [kat] ++
814,996 UART: [kat] sha1
826,298 UART: [kat] SHA2-256
829,359 UART: [kat] SHA2-384
834,936 UART: [kat] SHA2-512-ACC
837,906 UART: [kat] ECC-384
3,279,306 UART: [kat] HMAC-384Kdf
3,291,977 UART: [kat] LMS
3,821,459 UART: [kat] --
3,827,179 UART: [cold-reset] ++
3,829,246 UART: [fht] FHT @ 0x50003400
3,840,212 UART: [idev] ++
3,840,784 UART: [idev] CDI.KEYID = 6
3,841,662 UART: [idev] SUBJECT.KEYID = 7
3,842,897 UART: [idev] UDS.KEYID = 0
3,843,792 ready_for_fw is high
3,843,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,700 UART: [idev] Erasing UDS.KEYID = 0
6,312,016 UART: [idev] Sha1 KeyId Algorithm
6,336,164 UART: [idev] --
6,340,101 UART: [ldev] ++
6,340,665 UART: [ldev] CDI.KEYID = 6
6,341,566 UART: [ldev] SUBJECT.KEYID = 5
6,342,714 UART: [ldev] AUTHORITY.KEYID = 7
6,343,991 UART: [ldev] FE.KEYID = 1
6,352,793 UART: [ldev] Erasing FE.KEYID = 1
8,825,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,020 UART: [ldev] --
10,617,322 UART: [fwproc] Wait for Commands...
10,620,219 UART: [fwproc] Recv command 0x46574c44
10,622,304 UART: [fwproc] Recv'd Img size: 114448 bytes
15,215,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,295,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,363,752 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,681,577 >>> mbox cmd response: success
15,685,625 UART: [afmc] ++
15,686,217 UART: [afmc] CDI.KEYID = 6
15,687,121 UART: [afmc] SUBJECT.KEYID = 7
15,688,331 UART: [afmc] AUTHORITY.KEYID = 5
18,186,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,906,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,908,698 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,924,614 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,940,621 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,956,425 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,979,532 UART: [afmc] --
19,982,635 UART: [cold-reset] --
19,988,000 UART: [state] Locking Datavault
19,992,325 UART: [state] Locking PCR0, PCR1 and PCR31
19,993,959 UART: [state] Locking ICCM
19,995,992 UART: [exit] Launching FMC @ 0x40000130
20,004,436 UART:
20,004,671 UART: Running Caliptra FMC ...
20,005,771 UART:
20,005,927 UART: [state] CFI Enabled
20,014,243 UART: [fht] FMC Alias Private Key: 7
21,771,045 UART: [art] Extend RT PCRs Done
21,772,282 UART: [art] Lock RT PCRs Done
21,774,043 UART: [art] Populate DV Done
21,779,240 UART: [fht] FMC Alias Private Key: 7
21,780,827 UART: [art] Derive CDI
21,781,634 UART: [art] Store in in slot 0x4
21,824,172 UART: [art] Derive Key Pair
21,825,210 UART: [art] Store priv key in slot 0x5
24,251,777 UART: [art] Derive Key Pair - Done
24,265,103 UART: [art] Signing Cert with AUTHO
24,266,409 UART: RITY.KEYID = 7
25,971,766 UART: [art] Erasing AUTHORITY.KEYID = 7
25,973,282 UART: [art] PUB.X = A8A077891EF5BD63183802C11455B17EFFF84887A0A3E0F2E1A9E6B4718D946C89E974ED76D5408FA73836374BE1E5DC
25,980,519 UART: [art] PUB.Y = 34279DE5CA80064416EC32793C104164F0C394B2A0F98359C62D45A7AEC11CF62FA375925E0D880E851DD39B3437C9C0
25,987,788 UART: [art] SIG.R = 99F179FAE879DC6BB139764344E21A661B5C71A97CE8E8E545168EBBD1A34A56978B898A59CCFCBD72C70B0423592D1F
25,995,162 UART: [art] SIG.S = 8C42C8CE30414DD55DE217E5E58373ACCF1C6BE4471249FA53B2CEB3E301F529D2155382C445511B0C3CA046D73189DC
26,974,145 UART: Caliptra RT
26,974,858 UART: [state] CFI Enabled
27,090,374 UART: [rt] RT listening for mailbox commands...
27,092,684 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,248,116 UART: [rt]cmd =0x41544d4e, len=14344
30,853,388 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
3,697,127 ready_for_fw is high
3,697,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,254,488 >>> mbox cmd response: success
19,503,573 UART:
19,503,966 UART: Running Caliptra FMC ...
19,505,058 UART:
19,505,207 UART: [state] CFI Enabled
19,513,195 UART: [fht] FMC Alias Private Key: 7
21,270,159 UART: [art] Extend RT PCRs Done
21,271,374 UART: [art] Lock RT PCRs Done
21,273,293 UART: [art] Populate DV Done
21,278,693 UART: [fht] FMC Alias Private Key: 7
21,280,174 UART: [art] Derive CDI
21,280,925 UART: [art] Store in in slot 0x4
21,323,297 UART: [art] Derive Key Pair
21,324,289 UART: [art] Store priv key in slot 0x5
23,751,044 UART: [art] Derive Key Pair - Done
23,763,663 UART: [art] Signing Cert with AUTHO
23,764,966 UART: RITY.KEYID = 7
25,470,788 UART: [art] Erasing AUTHORITY.KEYID = 7
25,472,289 UART: [art] PUB.X = 93CEF23963D5EB146A20011AB47D516CB99721BF887411ED1BA220723D8025EDB33374498C4F4F6A41FB6ED26F11E644
25,479,519 UART: [art] PUB.Y = 26D4A425A96AF780BE4F285BB20DC4B044BADB17BE5D9F78A3FCFF8778EEB8B2BE46E244A94D3B105640211EC2D00690
25,486,791 UART: [art] SIG.R = 477D7ED53AE7215C2FAAAD06F752D04F0FCC815984F6B62FB149EE0D92418CE7A118F4D4C27AD7EA18B651B0A644A4E2
25,494,222 UART: [art] SIG.S = 94BD2345303415C21144B8D9FB8498BA512223941CE22997BB4789542D7FD1CA65FD4105CA4DE7868339E5B3B0E70BA8
26,473,035 UART: Caliptra RT
26,473,722 UART: [state] CFI Enabled
26,590,242 UART: [rt] RT listening for mailbox commands...
26,592,549 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,747,801 UART: [rt]cmd =0x41544d4e, len=14344
30,358,308 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,438,021 ready_for_fw is high
3,438,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,835,927 >>> mbox cmd response: success
20,136,378 UART:
20,136,753 UART: Running Caliptra FMC ...
20,137,956 UART:
20,138,125 UART: [state] CFI Enabled
20,206,843 UART: [fht] FMC Alias Private Key: 7
21,970,968 UART: [art] Extend RT PCRs Done
21,972,183 UART: [art] Lock RT PCRs Done
21,973,539 UART: [art] Populate DV Done
21,978,946 UART: [fht] FMC Alias Private Key: 7
21,980,536 UART: [art] Derive CDI
21,981,351 UART: [art] Store in in slot 0x4
22,039,898 UART: [art] Derive Key Pair
22,040,935 UART: [art] Store priv key in slot 0x5
24,504,054 UART: [art] Derive Key Pair - Done
24,517,047 UART: [art] Signing Cert with AUTHO
24,518,351 UART: RITY.KEYID = 7
26,230,331 UART: [art] Erasing AUTHORITY.KEYID = 7
26,231,972 UART: [art] PUB.X = 19FFBD14A3C7E0A69B13F12593D8F72F160E329E1C0F082BD6CC5D09109594C94A7C014523B75DEFEE2D25E26BA5D040
26,239,113 UART: [art] PUB.Y = 24A6CA6CE7A8D9D3BAAC413741C54F4F17416EAFB4D52AAD24FD39232DE75A9C6847411629B55B05C48F431783FDD59C
26,246,372 UART: [art] SIG.R = 942D817B112EBFEFC1C00D30489871C3EF9715C7E800E61E09BD8EB8BAEA855611018BF97859356FE11B4C91DF4AA28C
26,253,789 UART: [art] SIG.S = 8BF95CCEF3AFFB1D4C08E1B72DE3C3BD9A44A46059B6738BD7F11B74EC10A690DD9EA203F3A3059A70CBF14DD32AB002
27,232,018 UART: Caliptra RT
27,232,716 UART: [state] CFI Enabled
27,399,114 UART: [rt] RT listening for mailbox commands...
27,401,413 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,557,400 UART: [rt]cmd =0x41544d4e, len=14344
31,168,549 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,753,118 ready_for_fw is high
3,753,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,079,246 >>> mbox cmd response: success
20,330,345 UART:
20,330,728 UART: Running Caliptra FMC ...
20,331,917 UART:
20,332,079 UART: [state] CFI Enabled
20,340,189 UART: [fht] FMC Alias Private Key: 7
22,097,176 UART: [art] Extend RT PCRs Done
22,098,391 UART: [art] Lock RT PCRs Done
22,100,156 UART: [art] Populate DV Done
22,105,730 UART: [fht] FMC Alias Private Key: 7
22,107,376 UART: [art] Derive CDI
22,108,106 UART: [art] Store in in slot 0x4
22,151,020 UART: [art] Derive Key Pair
22,152,058 UART: [art] Store priv key in slot 0x5
24,578,670 UART: [art] Derive Key Pair - Done
24,591,633 UART: [art] Signing Cert with AUTHO
24,592,939 UART: RITY.KEYID = 7
26,298,047 UART: [art] Erasing AUTHORITY.KEYID = 7
26,299,533 UART: [art] PUB.X = B74B9B213984C93A2D78E053FB0D85178FAC19030E20198DB25237AFD9E3FE7AA2D5403A8CCC36B2469659A57465855A
26,306,819 UART: [art] PUB.Y = A303C4473911CFEFD3CFCF2CE275EE8647A9D6281D61796DF43ECAB6789672AD26F2517C08A652A0BDC99C06BAB341D8
26,314,058 UART: [art] SIG.R = C487F77E2EDCD7C5E6E52986F9B01B79E4A64D0F7204F4A23CC37E147A99FBC0985BCECDA631E6CA6536198E327BA788
26,321,496 UART: [art] SIG.S = 4EA9B5A29C618C9D1D3D29B81BDE3300E5206EAFE355672ECF17DFC214BE146657B98183DF74F9E90AF933326B7F46F3
27,300,351 UART: Caliptra RT
27,301,071 UART: [state] CFI Enabled
27,418,809 UART: [rt] RT listening for mailbox commands...
27,421,113 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,576,433 UART: [rt]cmd =0x41544d4e, len=14344
31,194,279 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,674 UART: [state] LifecycleState = Unprovisioned
85,329 UART: [state] DebugLocked = No
85,995 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,497 UART: [kat] SHA2-256
881,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,543 UART: [kat] ++
885,695 UART: [kat] sha1
889,941 UART: [kat] SHA2-256
891,879 UART: [kat] SHA2-384
894,508 UART: [kat] SHA2-512-ACC
896,409 UART: [kat] ECC-384
902,136 UART: [kat] HMAC-384Kdf
906,702 UART: [kat] LMS
1,474,898 UART: [kat] --
1,475,913 UART: [cold-reset] ++
1,476,377 UART: [fht] Storing FHT @ 0x50003400
1,479,130 UART: [idev] ++
1,479,298 UART: [idev] CDI.KEYID = 6
1,479,658 UART: [idev] SUBJECT.KEYID = 7
1,480,082 UART: [idev] UDS.KEYID = 0
1,480,427 ready_for_fw is high
1,480,427 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,610 UART: [idev] Erasing UDS.KEYID = 0
1,505,310 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,052 UART: [idev] --
1,515,047 UART: [ldev] ++
1,515,215 UART: [ldev] CDI.KEYID = 6
1,515,578 UART: [ldev] SUBJECT.KEYID = 5
1,516,004 UART: [ldev] AUTHORITY.KEYID = 7
1,516,467 UART: [ldev] FE.KEYID = 1
1,521,557 UART: [ldev] Erasing FE.KEYID = 1
1,547,068 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,220 UART: [ldev] --
1,586,491 UART: [fwproc] Waiting for Commands...
1,587,184 UART: [fwproc] Received command 0x46574c44
1,587,975 UART: [fwproc] Received Image of size 114448 bytes
5,235,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,264,202 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,293,554 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,429,601 >>> mbox cmd response: success
5,430,659 UART: [afmc] ++
5,430,827 UART: [afmc] CDI.KEYID = 6
5,431,189 UART: [afmc] SUBJECT.KEYID = 7
5,431,614 UART: [afmc] AUTHORITY.KEYID = 5
5,466,850 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,482,976 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,483,756 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,489,465 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,495,357 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,501,058 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,509,040 UART: [afmc] --
5,509,974 UART: [cold-reset] --
5,511,006 UART: [state] Locking Datavault
5,512,003 UART: [state] Locking PCR0, PCR1 and PCR31
5,512,607 UART: [state] Locking ICCM
5,513,091 UART: [exit] Launching FMC @ 0x40000130
5,518,420 UART:
5,518,436 UART: Running Caliptra FMC ...
5,518,844 UART:
5,518,898 UART: [state] CFI Enabled
5,529,618 UART: [fht] FMC Alias Private Key: 7
5,637,352 UART: [art] Extend RT PCRs Done
5,637,780 UART: [art] Lock RT PCRs Done
5,639,434 UART: [art] Populate DV Done
5,647,686 UART: [fht] FMC Alias Private Key: 7
5,648,658 UART: [art] Derive CDI
5,648,938 UART: [art] Store in in slot 0x4
5,734,589 UART: [art] Derive Key Pair
5,734,949 UART: [art] Store priv key in slot 0x5
5,747,943 UART: [art] Derive Key Pair - Done
5,762,958 UART: [art] Signing Cert with AUTHO
5,763,438 UART: RITY.KEYID = 7
5,778,432 UART: [art] Erasing AUTHORITY.KEYID = 7
5,779,197 UART: [art] PUB.X = 0592617901DF3E685ADFC47068BDF115A95167AD3648FED9004147F45AACE95BEBC4BBE7B26A617A9D6C3FED3F25C550
5,785,953 UART: [art] PUB.Y = 401E8EB2E74CDE92BEA65BD60999451D1CE0C2DEC941E352174A9BE5E7EDF38C041BE36DFA624D8A9F6383FDCE4219D1
5,792,917 UART: [art] SIG.R = 42510B4926F0039CBFC940832FBB8A0B76F8C47767022D03A69097C0F7D4F7B3D36D7E337DBC144116CD737A3202CD47
5,799,669 UART: [art] SIG.S = 59440A8E9050C6AC498F13D81CC4BB81C962F6D54F620B0E9F89FBA0624DA379C43CB9E34C0B57019AB24470410B7D1E
5,822,980 UART: Caliptra RT
5,823,233 UART: [state] CFI Enabled
5,930,985 UART: [rt] RT listening for mailbox commands...
5,931,655 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,054,287 UART: [rt]cmd =0x41544d4e, len=14344
7,024,210 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,165 ready_for_fw is high
1,362,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,353,145 >>> mbox cmd response: success
5,415,206 UART:
5,415,222 UART: Running Caliptra FMC ...
5,415,630 UART:
5,415,684 UART: [state] CFI Enabled
5,426,434 UART: [fht] FMC Alias Private Key: 7
5,534,704 UART: [art] Extend RT PCRs Done
5,535,132 UART: [art] Lock RT PCRs Done
5,536,456 UART: [art] Populate DV Done
5,544,342 UART: [fht] FMC Alias Private Key: 7
5,545,468 UART: [art] Derive CDI
5,545,748 UART: [art] Store in in slot 0x4
5,631,215 UART: [art] Derive Key Pair
5,631,575 UART: [art] Store priv key in slot 0x5
5,644,785 UART: [art] Derive Key Pair - Done
5,659,481 UART: [art] Signing Cert with AUTHO
5,659,961 UART: RITY.KEYID = 7
5,675,039 UART: [art] Erasing AUTHORITY.KEYID = 7
5,675,804 UART: [art] PUB.X = 2862C6E7B50BC5C2FD185A0012D96835613AA305DB024674E84FEB6DFB2C630A74D3CAFDCC4684C04B8EF4941B0E473F
5,682,549 UART: [art] PUB.Y = 5DDEB7B2E8C79EE8815DDDB0E330BEA17FB43C846195F6656DDDBF467784D0D022AC91B3C7D2A6D353BA33D810E63330
5,689,515 UART: [art] SIG.R = 1ACFA01A4AFD2E5C4F44339408CE94E6672C96FEACEF1F6F11E4EC9A428EA818228AAB4EDBF1AA4796BE965244AF9A2C
5,696,308 UART: [art] SIG.S = 7516935E91FA6F93BCA4E4E4E53B8AC15E61B426F313E18841BC7BC8CF182764D2EA9B612381BFA967730D4C0076B6F8
5,720,320 UART: Caliptra RT
5,720,573 UART: [state] CFI Enabled
5,829,619 UART: [rt] RT listening for mailbox commands...
5,830,289 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,953,097 UART: [rt]cmd =0x41544d4e, len=14344
6,913,090 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,444 UART: [kat] SHA2-256
882,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,490 UART: [kat] ++
886,642 UART: [kat] sha1
890,942 UART: [kat] SHA2-256
892,880 UART: [kat] SHA2-384
895,633 UART: [kat] SHA2-512-ACC
897,534 UART: [kat] ECC-384
903,291 UART: [kat] HMAC-384Kdf
907,775 UART: [kat] LMS
1,475,971 UART: [kat] --
1,476,976 UART: [cold-reset] ++
1,477,508 UART: [fht] Storing FHT @ 0x50003400
1,480,115 UART: [idev] ++
1,480,283 UART: [idev] CDI.KEYID = 6
1,480,643 UART: [idev] SUBJECT.KEYID = 7
1,481,067 UART: [idev] UDS.KEYID = 0
1,481,412 ready_for_fw is high
1,481,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,053 UART: [idev] Erasing UDS.KEYID = 0
1,506,455 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,913 UART: [idev] --
1,516,166 UART: [ldev] ++
1,516,334 UART: [ldev] CDI.KEYID = 6
1,516,697 UART: [ldev] SUBJECT.KEYID = 5
1,517,123 UART: [ldev] AUTHORITY.KEYID = 7
1,517,586 UART: [ldev] FE.KEYID = 1
1,523,058 UART: [ldev] Erasing FE.KEYID = 1
1,549,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,179 UART: [ldev] --
1,588,594 UART: [fwproc] Waiting for Commands...
1,589,351 UART: [fwproc] Received command 0x46574c44
1,590,142 UART: [fwproc] Received Image of size 114448 bytes
5,276,362 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,304,926 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,334,278 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,470,369 >>> mbox cmd response: success
5,471,573 UART: [afmc] ++
5,471,741 UART: [afmc] CDI.KEYID = 6
5,472,103 UART: [afmc] SUBJECT.KEYID = 7
5,472,528 UART: [afmc] AUTHORITY.KEYID = 5
5,507,832 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,523,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,524,640 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,530,349 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,536,241 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,541,942 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,549,852 UART: [afmc] --
5,550,932 UART: [cold-reset] --
5,551,832 UART: [state] Locking Datavault
5,553,071 UART: [state] Locking PCR0, PCR1 and PCR31
5,553,675 UART: [state] Locking ICCM
5,554,163 UART: [exit] Launching FMC @ 0x40000130
5,559,492 UART:
5,559,508 UART: Running Caliptra FMC ...
5,559,916 UART:
5,560,059 UART: [state] CFI Enabled
5,570,517 UART: [fht] FMC Alias Private Key: 7
5,678,871 UART: [art] Extend RT PCRs Done
5,679,299 UART: [art] Lock RT PCRs Done
5,680,779 UART: [art] Populate DV Done
5,688,819 UART: [fht] FMC Alias Private Key: 7
5,689,943 UART: [art] Derive CDI
5,690,223 UART: [art] Store in in slot 0x4
5,775,550 UART: [art] Derive Key Pair
5,775,910 UART: [art] Store priv key in slot 0x5
5,789,534 UART: [art] Derive Key Pair - Done
5,804,825 UART: [art] Signing Cert with AUTHO
5,805,305 UART: RITY.KEYID = 7
5,820,515 UART: [art] Erasing AUTHORITY.KEYID = 7
5,821,280 UART: [art] PUB.X = C0B04CB03751275F7733BB0141C23772E3683CD8EDEA085F0169F864B9140E5A8F235E6A693071D26EC5943680A1F34B
5,828,034 UART: [art] PUB.Y = 88316593749FDA10444308D11AC015465A1A297D17F38DC75F3DD5493619E48D3A2C7CFA34CB4E3273633392E58856CB
5,834,975 UART: [art] SIG.R = 9E023D038F9F8BBA9D92D2957E89AAAB94AFDA8591CFC55C9C6E0B6C280D7309417D3624A9ADB9AB70267E80ACB09CE0
5,841,748 UART: [art] SIG.S = B5FFFCF31BFE8AE0E05CCE6210A60A7EF96B7168A71147C3C0EE248B3789878F95DC668C99FFDBF67507FFFA8BEB00E2
5,864,931 UART: Caliptra RT
5,865,276 UART: [state] CFI Enabled
5,973,814 UART: [rt] RT listening for mailbox commands...
5,974,484 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,097,242 UART: [rt]cmd =0x41544d4e, len=14344
7,067,757 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,388 ready_for_fw is high
1,362,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,317,287 >>> mbox cmd response: success
5,378,186 UART:
5,378,202 UART: Running Caliptra FMC ...
5,378,610 UART:
5,378,753 UART: [state] CFI Enabled
5,389,315 UART: [fht] FMC Alias Private Key: 7
5,497,505 UART: [art] Extend RT PCRs Done
5,497,933 UART: [art] Lock RT PCRs Done
5,499,395 UART: [art] Populate DV Done
5,507,485 UART: [fht] FMC Alias Private Key: 7
5,508,637 UART: [art] Derive CDI
5,508,917 UART: [art] Store in in slot 0x4
5,594,688 UART: [art] Derive Key Pair
5,595,048 UART: [art] Store priv key in slot 0x5
5,607,920 UART: [art] Derive Key Pair - Done
5,623,174 UART: [art] Signing Cert with AUTHO
5,623,654 UART: RITY.KEYID = 7
5,638,950 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,715 UART: [art] PUB.X = 643E81D6248779B02EC4C6AA6BBE1632D75D8E4FF08C089E9DEE22AC7A2758048FA76ACFFA5923BFF41D595DFA5B1615
5,646,495 UART: [art] PUB.Y = 3932926935033398A2820D44459318B4E5EFF42AC1080DEB2E2EE8F4DB181738ECB78190F799B179E3A215A75811775A
5,653,425 UART: [art] SIG.R = 1AD21E4F2A3C3B422211A176D581AFF14B12898B22057EE7A1442ECF43434565518261E401B17C04929EABD27CA2ED02
5,660,183 UART: [art] SIG.S = 9ABF2C233309B353ABD3693BD9D54B657681C1110B64722A9C82FFAE28BF9EA440A83AA92972B36779A12E4C8B035C9C
5,684,199 UART: Caliptra RT
5,684,544 UART: [state] CFI Enabled
5,793,011 UART: [rt] RT listening for mailbox commands...
5,793,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,916,503 UART: [rt]cmd =0x41544d4e, len=14344
6,880,964 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,691 UART: [kat] SHA2-256
903,631 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
918,244 UART: [kat] HMAC-384Kdf
922,920 UART: [kat] LMS
1,171,248 UART: [kat] --
1,172,233 UART: [cold-reset] ++
1,172,793 UART: [fht] FHT @ 0x50003400
1,175,456 UART: [idev] ++
1,175,624 UART: [idev] CDI.KEYID = 6
1,175,984 UART: [idev] SUBJECT.KEYID = 7
1,176,408 UART: [idev] UDS.KEYID = 0
1,176,753 ready_for_fw is high
1,176,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,534 UART: [idev] Erasing UDS.KEYID = 0
1,201,973 UART: [idev] Sha1 KeyId Algorithm
1,210,487 UART: [idev] --
1,211,681 UART: [ldev] ++
1,211,849 UART: [ldev] CDI.KEYID = 6
1,212,212 UART: [ldev] SUBJECT.KEYID = 5
1,212,638 UART: [ldev] AUTHORITY.KEYID = 7
1,213,101 UART: [ldev] FE.KEYID = 1
1,218,157 UART: [ldev] Erasing FE.KEYID = 1
1,244,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,351 UART: [ldev] --
1,283,762 UART: [fwproc] Wait for Commands...
1,284,538 UART: [fwproc] Recv command 0x46574c44
1,285,266 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,418 >>> mbox cmd response: success
3,322,614 UART: [afmc] ++
3,322,782 UART: [afmc] CDI.KEYID = 6
3,323,144 UART: [afmc] SUBJECT.KEYID = 7
3,323,569 UART: [afmc] AUTHORITY.KEYID = 5
3,358,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,370 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,079 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,971 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,682 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,511 UART: [afmc] --
3,401,633 UART: [cold-reset] --
3,402,465 UART: [state] Locking Datavault
3,403,734 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,338 UART: [state] Locking ICCM
3,404,780 UART: [exit] Launching FMC @ 0x40000130
3,410,109 UART:
3,410,125 UART: Running Caliptra FMC ...
3,410,533 UART:
3,410,587 UART: [state] CFI Enabled
3,420,909 UART: [fht] FMC Alias Private Key: 7
3,529,235 UART: [art] Extend RT PCRs Done
3,529,663 UART: [art] Lock RT PCRs Done
3,531,271 UART: [art] Populate DV Done
3,539,487 UART: [fht] FMC Alias Private Key: 7
3,540,655 UART: [art] Derive CDI
3,540,935 UART: [art] Store in in slot 0x4
3,626,578 UART: [art] Derive Key Pair
3,626,938 UART: [art] Store priv key in slot 0x5
3,640,422 UART: [art] Derive Key Pair - Done
3,655,470 UART: [art] Signing Cert with AUTHO
3,655,950 UART: RITY.KEYID = 7
3,671,260 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,025 UART: [art] PUB.X = 4D0E027DBD2D63B12E35021E76E4F9BC36F8F05F4552EB66E9A79C3E4933BAE2A07971A351891EDF581862804723AA8E
3,678,790 UART: [art] PUB.Y = D91F0C93F96ACCDA55E47F46EB0246CE44C6FD8FCF78483A9ECD01C52349C352D89A9D3648ACC9D46FF76043326C983B
3,685,745 UART: [art] SIG.R = 3316F476273223EF4CF47441141F52537417ECF872D209907DE968056BC1A1C5C7D1819F3B6C07DB69E8223265E946AE
3,692,498 UART: [art] SIG.S = FD409868C2E5A5EB275A0B99CE08C0A18DE807EC6A02457995342A19C9D49836F1466FE0302FA79F86D430561705171A
3,716,508 UART: Caliptra RT
3,716,761 UART: [state] CFI Enabled
3,824,757 UART: [rt] RT listening for mailbox commands...
3,825,427 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,419 UART: [rt]cmd =0x41544d4e, len=14344
4,905,653 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,009 ready_for_fw is high
1,060,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,476 >>> mbox cmd response: success
3,236,215 UART:
3,236,231 UART: Running Caliptra FMC ...
3,236,639 UART:
3,236,693 UART: [state] CFI Enabled
3,247,447 UART: [fht] FMC Alias Private Key: 7
3,355,303 UART: [art] Extend RT PCRs Done
3,355,731 UART: [art] Lock RT PCRs Done
3,357,721 UART: [art] Populate DV Done
3,366,067 UART: [fht] FMC Alias Private Key: 7
3,367,191 UART: [art] Derive CDI
3,367,471 UART: [art] Store in in slot 0x4
3,452,878 UART: [art] Derive Key Pair
3,453,238 UART: [art] Store priv key in slot 0x5
3,466,404 UART: [art] Derive Key Pair - Done
3,480,777 UART: [art] Signing Cert with AUTHO
3,481,257 UART: RITY.KEYID = 7
3,496,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,364 UART: [art] PUB.X = AACA58647AE5177888CD117418CA100A717A24D80CDAB0D5AE35C865715BACA30424B1734076849B6DD382F78FBEE5FC
3,504,135 UART: [art] PUB.Y = 91FF23B0BF8C2EBB2820E3FF1C1767E2AD33E18782BD63466C8DE867421F1FD0A7F218206510BF9B351AACADE82D840D
3,511,096 UART: [art] SIG.R = 11436666694F8E13BB66E4B4BAA3A9016A84CC2408C9E8BF5EFA3A8E4D97D3F1B07E5E8171BEE1D06BE200189FCB37DE
3,517,854 UART: [art] SIG.S = EDC2849D0544ADE3CFEF16B6585AE37C269A09303F0C19E9443E973B00885EB1F870F094016DF4C2DD6603AFF9CB11FB
3,541,768 UART: Caliptra RT
3,542,021 UART: [state] CFI Enabled
3,649,583 UART: [rt] RT listening for mailbox commands...
3,650,253 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,243 UART: [rt]cmd =0x41544d4e, len=14344
4,731,257 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,334 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
893,317 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,442 UART: [kat] ++
897,594 UART: [kat] sha1
901,910 UART: [kat] SHA2-256
903,850 UART: [kat] SHA2-384
906,739 UART: [kat] SHA2-512-ACC
908,640 UART: [kat] ECC-384
918,361 UART: [kat] HMAC-384Kdf
922,885 UART: [kat] LMS
1,171,213 UART: [kat] --
1,172,210 UART: [cold-reset] ++
1,172,710 UART: [fht] FHT @ 0x50003400
1,175,387 UART: [idev] ++
1,175,555 UART: [idev] CDI.KEYID = 6
1,175,915 UART: [idev] SUBJECT.KEYID = 7
1,176,339 UART: [idev] UDS.KEYID = 0
1,176,684 ready_for_fw is high
1,176,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,401 UART: [idev] Erasing UDS.KEYID = 0
1,201,788 UART: [idev] Sha1 KeyId Algorithm
1,210,318 UART: [idev] --
1,211,394 UART: [ldev] ++
1,211,562 UART: [ldev] CDI.KEYID = 6
1,211,925 UART: [ldev] SUBJECT.KEYID = 5
1,212,351 UART: [ldev] AUTHORITY.KEYID = 7
1,212,814 UART: [ldev] FE.KEYID = 1
1,217,740 UART: [ldev] Erasing FE.KEYID = 1
1,244,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,998 UART: [ldev] --
1,283,361 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,861 UART: [fwproc] Recv'd Img size: 114448 bytes
3,123,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,154 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,458 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,316,515 >>> mbox cmd response: success
3,317,739 UART: [afmc] ++
3,317,907 UART: [afmc] CDI.KEYID = 6
3,318,269 UART: [afmc] SUBJECT.KEYID = 7
3,318,694 UART: [afmc] AUTHORITY.KEYID = 5
3,355,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,581 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,290 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,182 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,893 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,886 UART: [afmc] --
3,398,806 UART: [cold-reset] --
3,399,752 UART: [state] Locking Datavault
3,400,759 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,363 UART: [state] Locking ICCM
3,401,913 UART: [exit] Launching FMC @ 0x40000130
3,407,242 UART:
3,407,258 UART: Running Caliptra FMC ...
3,407,666 UART:
3,407,809 UART: [state] CFI Enabled
3,418,481 UART: [fht] FMC Alias Private Key: 7
3,526,853 UART: [art] Extend RT PCRs Done
3,527,281 UART: [art] Lock RT PCRs Done
3,528,981 UART: [art] Populate DV Done
3,537,025 UART: [fht] FMC Alias Private Key: 7
3,538,083 UART: [art] Derive CDI
3,538,363 UART: [art] Store in in slot 0x4
3,624,238 UART: [art] Derive Key Pair
3,624,598 UART: [art] Store priv key in slot 0x5
3,637,734 UART: [art] Derive Key Pair - Done
3,652,797 UART: [art] Signing Cert with AUTHO
3,653,277 UART: RITY.KEYID = 7
3,668,975 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,740 UART: [art] PUB.X = 376265289575A84BA46FD64C71F36E8E11D603C6D09C50C8222755017E5C3495A2B2DB23D5EE51263858FB63AFB9A3EC
3,676,504 UART: [art] PUB.Y = 8D08C76FB734499D89B191BE6167B6BB370E33D95D94D6FCFB14538BDE2B245D2381B97D0F7C2E69FC74049220015D32
3,683,441 UART: [art] SIG.R = 8B4264D726C016512C18ABEDE5EC4276129B53A8E885F3AAB719663042A088A4F95496C4A60AEBDE9F7EBC02A15AF57F
3,690,215 UART: [art] SIG.S = 907B2BCCE6EBC37A29B4DBB8050E4BBFEF5C0BCB22386A5222E889CA440C3D1BE30E5EB75C7D078CD4E8BF59E29293C5
3,713,816 UART: Caliptra RT
3,714,161 UART: [state] CFI Enabled
3,822,386 UART: [rt] RT listening for mailbox commands...
3,823,056 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,072 UART: [rt]cmd =0x41544d4e, len=14344
4,905,971 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,672 ready_for_fw is high
1,060,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,179,168 >>> mbox cmd response: success
3,240,615 UART:
3,240,631 UART: Running Caliptra FMC ...
3,241,039 UART:
3,241,182 UART: [state] CFI Enabled
3,251,302 UART: [fht] FMC Alias Private Key: 7
3,359,484 UART: [art] Extend RT PCRs Done
3,359,912 UART: [art] Lock RT PCRs Done
3,361,494 UART: [art] Populate DV Done
3,369,604 UART: [fht] FMC Alias Private Key: 7
3,370,622 UART: [art] Derive CDI
3,370,902 UART: [art] Store in in slot 0x4
3,456,573 UART: [art] Derive Key Pair
3,456,933 UART: [art] Store priv key in slot 0x5
3,470,451 UART: [art] Derive Key Pair - Done
3,485,591 UART: [art] Signing Cert with AUTHO
3,486,071 UART: RITY.KEYID = 7
3,501,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,998 UART: [art] PUB.X = 21B8BE14E4FEFCAC3EC332733B93F80B467E63922F0C3B10113E3F1C5904DC296AA5E5FA13D166A30E08A4777AC8EE21
3,508,765 UART: [art] PUB.Y = E59D0D7FF2127498FD9DB205EC9986C390217D06F2C2508AA076C3B0A13DABD97E64ACDB49234B0FACECB5CE99EF5680
3,515,721 UART: [art] SIG.R = BAC371217FECAC5717BA8D62B72FEA2FAA309495F42755B4082EB9AD3E443E3D54F416F4AACA5C6D34AE26613E1AAB8F
3,522,510 UART: [art] SIG.S = FD577E7A11B59694C6B333E1CB4B4B81185A14F578AED936DBCE03FEF530838990A6E3297BC1447717C2DA48EBA5C00B
3,545,983 UART: Caliptra RT
3,546,328 UART: [state] CFI Enabled
3,653,543 UART: [rt] RT listening for mailbox commands...
3,654,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,067 UART: [rt]cmd =0x41544d4e, len=14344
4,744,575 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,524 UART: [kat] LMS
1,168,836 UART: [kat] --
1,169,617 UART: [cold-reset] ++
1,170,135 UART: [fht] FHT @ 0x50003400
1,172,929 UART: [idev] ++
1,173,097 UART: [idev] CDI.KEYID = 6
1,173,458 UART: [idev] SUBJECT.KEYID = 7
1,173,883 UART: [idev] UDS.KEYID = 0
1,174,229 ready_for_fw is high
1,174,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,153 UART: [idev] Erasing UDS.KEYID = 0
1,198,667 UART: [idev] Sha1 KeyId Algorithm
1,207,571 UART: [idev] --
1,208,428 UART: [ldev] ++
1,208,596 UART: [ldev] CDI.KEYID = 6
1,208,960 UART: [ldev] SUBJECT.KEYID = 5
1,209,387 UART: [ldev] AUTHORITY.KEYID = 7
1,209,850 UART: [ldev] FE.KEYID = 1
1,215,182 UART: [ldev] Erasing FE.KEYID = 1
1,241,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,480 UART: [ldev] --
1,280,942 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,212 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,324,557 >>> mbox cmd response: success
3,325,730 UART: [afmc] ++
3,325,898 UART: [afmc] CDI.KEYID = 6
3,326,261 UART: [afmc] SUBJECT.KEYID = 7
3,326,687 UART: [afmc] AUTHORITY.KEYID = 5
3,362,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,656 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,366 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,256 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,967 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,779 UART: [afmc] --
3,405,765 UART: [cold-reset] --
3,406,579 UART: [state] Locking Datavault
3,407,760 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,364 UART: [state] Locking ICCM
3,408,920 UART: [exit] Launching FMC @ 0x40000130
3,414,249 UART:
3,414,265 UART: Running Caliptra FMC ...
3,414,673 UART:
3,414,727 UART: [state] CFI Enabled
3,424,817 UART: [fht] FMC Alias Private Key: 7
3,532,797 UART: [art] Extend RT PCRs Done
3,533,225 UART: [art] Lock RT PCRs Done
3,534,549 UART: [art] Populate DV Done
3,542,793 UART: [fht] FMC Alias Private Key: 7
3,543,965 UART: [art] Derive CDI
3,544,245 UART: [art] Store in in slot 0x4
3,629,810 UART: [art] Derive Key Pair
3,630,170 UART: [art] Store priv key in slot 0x5
3,643,448 UART: [art] Derive Key Pair - Done
3,658,413 UART: [art] Signing Cert with AUTHO
3,658,893 UART: RITY.KEYID = 7
3,674,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,808 UART: [art] PUB.X = FB80D2B822FD48E753AA5C5D5B4A5FC06889EDA947DD14A9BCE9D3D20ED8B03C0140DA52F53F3A42C2B4E3A0F10E7BE2
3,681,593 UART: [art] PUB.Y = 68E8DC7162E79C91B190DFA4CD12F3DD5516F073E998B519D37C5EF668D23B38F130EF3CCE659FE7EC37F1AE6784E60B
3,688,554 UART: [art] SIG.R = 1BCB54C6888AC467B2E76CD4A244D3B93B4D807637AD1AB1E74DC069EF395014DEF687D34571754FD1CE4877D6876C9C
3,695,332 UART: [art] SIG.S = F699FBE7FB9BE9AB6C87EA918F3D152745FD9B4315C2C2D5638065F49305A086464CE4D185AE0D7B0B007CA7D04678FA
3,718,898 UART: Caliptra RT
3,719,151 UART: [state] CFI Enabled
3,826,883 UART: [rt] RT listening for mailbox commands...
3,827,553 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,503 UART: [rt]cmd =0x41544d4e, len=14344
4,905,666 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,212 ready_for_fw is high
1,056,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,164,726 >>> mbox cmd response: success
3,226,805 UART:
3,226,821 UART: Running Caliptra FMC ...
3,227,229 UART:
3,227,283 UART: [state] CFI Enabled
3,237,651 UART: [fht] FMC Alias Private Key: 7
3,345,971 UART: [art] Extend RT PCRs Done
3,346,399 UART: [art] Lock RT PCRs Done
3,348,107 UART: [art] Populate DV Done
3,356,535 UART: [fht] FMC Alias Private Key: 7
3,357,489 UART: [art] Derive CDI
3,357,769 UART: [art] Store in in slot 0x4
3,443,338 UART: [art] Derive Key Pair
3,443,698 UART: [art] Store priv key in slot 0x5
3,457,120 UART: [art] Derive Key Pair - Done
3,471,624 UART: [art] Signing Cert with AUTHO
3,472,104 UART: RITY.KEYID = 7
3,487,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,959 UART: [art] PUB.X = 4585CD2C337DE6E54C0A98936C74C6C791D6E9FD58F59A4186700901ABBF344F04628184554BFF1B2AD636B817411C11
3,494,715 UART: [art] PUB.Y = 300E1BF0161CD335698710ED4A55B6CC8610F6C0AF4745AD38874D25F0DCAD8E840B4CE1FDDD8B3DD713334DA7672F83
3,501,671 UART: [art] SIG.R = B647A74FB34BC43F5173CA618E271DE7643552BF7A733D4A28B17006ECAAC63AB472522778CEFA80447B0FCF70E2F9E8
3,508,445 UART: [art] SIG.S = B904D6B6F8A34DCEC9BB3C72EC8C1AE1F7E88CC78F3BE3C5079B5A25D2E83C8B2321A3E06DD90ED233E0B2F9ABDF22B7
3,532,047 UART: Caliptra RT
3,532,300 UART: [state] CFI Enabled
3,638,733 UART: [rt] RT listening for mailbox commands...
3,639,403 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,529 UART: [rt]cmd =0x41544d4e, len=14344
4,727,534 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,292 UART: [kat] SHA2-256
902,232 UART: [kat] SHA2-384
904,991 UART: [kat] SHA2-512-ACC
906,892 UART: [kat] ECC-384
916,583 UART: [kat] HMAC-384Kdf
921,241 UART: [kat] LMS
1,169,553 UART: [kat] --
1,170,622 UART: [cold-reset] ++
1,171,078 UART: [fht] FHT @ 0x50003400
1,173,706 UART: [idev] ++
1,173,874 UART: [idev] CDI.KEYID = 6
1,174,235 UART: [idev] SUBJECT.KEYID = 7
1,174,660 UART: [idev] UDS.KEYID = 0
1,175,006 ready_for_fw is high
1,175,006 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,104 UART: [idev] Erasing UDS.KEYID = 0
1,200,760 UART: [idev] Sha1 KeyId Algorithm
1,209,606 UART: [idev] --
1,210,637 UART: [ldev] ++
1,210,805 UART: [ldev] CDI.KEYID = 6
1,211,169 UART: [ldev] SUBJECT.KEYID = 5
1,211,596 UART: [ldev] AUTHORITY.KEYID = 7
1,212,059 UART: [ldev] FE.KEYID = 1
1,217,419 UART: [ldev] Erasing FE.KEYID = 1
1,243,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,287 UART: [ldev] --
1,282,579 UART: [fwproc] Wait for Commands...
1,283,398 UART: [fwproc] Recv command 0x46574c44
1,284,131 UART: [fwproc] Recv'd Img size: 114448 bytes
3,131,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,326,058 >>> mbox cmd response: success
3,327,211 UART: [afmc] ++
3,327,379 UART: [afmc] CDI.KEYID = 6
3,327,742 UART: [afmc] SUBJECT.KEYID = 7
3,328,168 UART: [afmc] AUTHORITY.KEYID = 5
3,364,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,631 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,387,341 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,393,231 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,942 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,642 UART: [afmc] --
3,407,596 UART: [cold-reset] --
3,408,392 UART: [state] Locking Datavault
3,409,893 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,497 UART: [state] Locking ICCM
3,411,027 UART: [exit] Launching FMC @ 0x40000130
3,416,356 UART:
3,416,372 UART: Running Caliptra FMC ...
3,416,780 UART:
3,416,923 UART: [state] CFI Enabled
3,427,525 UART: [fht] FMC Alias Private Key: 7
3,535,013 UART: [art] Extend RT PCRs Done
3,535,441 UART: [art] Lock RT PCRs Done
3,536,801 UART: [art] Populate DV Done
3,545,013 UART: [fht] FMC Alias Private Key: 7
3,546,189 UART: [art] Derive CDI
3,546,469 UART: [art] Store in in slot 0x4
3,631,824 UART: [art] Derive Key Pair
3,632,184 UART: [art] Store priv key in slot 0x5
3,645,586 UART: [art] Derive Key Pair - Done
3,660,240 UART: [art] Signing Cert with AUTHO
3,660,720 UART: RITY.KEYID = 7
3,675,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,501 UART: [art] PUB.X = C9577FAF60806BC8907421B2C03A781F0D7EF0AC5EDB7D42BAE2C7C3AE5C32E4109976087345C1AAC0AF2C7290B9DC53
3,683,279 UART: [art] PUB.Y = 0D57AFCF8A7A6C402A892CEA1D4EE59FA38093735D88D200CAB0572FDE52EA4A8D1063F5408B25E57A3A140FA249AE3E
3,690,217 UART: [art] SIG.R = 6353E8967FD29F10CD89054BCD2E1933A84F4EE0A1699912FD8738BD59F15AC283FA10E7D1BF82D8D441325F443761A8
3,696,986 UART: [art] SIG.S = 06D313BA278636520D7E3EB80D804E0756BAA169D3A3B897E743E25D1018B1B1AF6848E0C4AFDC0D7AAF9CD1C91C80CB
3,720,472 UART: Caliptra RT
3,720,817 UART: [state] CFI Enabled
3,828,286 UART: [rt] RT listening for mailbox commands...
3,828,956 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,148 UART: [rt]cmd =0x41544d4e, len=14344
4,912,027 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,517 ready_for_fw is high
1,056,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,158,910 >>> mbox cmd response: success
3,221,257 UART:
3,221,273 UART: Running Caliptra FMC ...
3,221,681 UART:
3,221,824 UART: [state] CFI Enabled
3,232,342 UART: [fht] FMC Alias Private Key: 7
3,339,964 UART: [art] Extend RT PCRs Done
3,340,392 UART: [art] Lock RT PCRs Done
3,341,950 UART: [art] Populate DV Done
3,350,136 UART: [fht] FMC Alias Private Key: 7
3,351,082 UART: [art] Derive CDI
3,351,362 UART: [art] Store in in slot 0x4
3,437,091 UART: [art] Derive Key Pair
3,437,451 UART: [art] Store priv key in slot 0x5
3,450,981 UART: [art] Derive Key Pair - Done
3,465,877 UART: [art] Signing Cert with AUTHO
3,466,357 UART: RITY.KEYID = 7
3,481,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,482,056 UART: [art] PUB.X = 93BE6ACBCF3A9592B48E23218826E6CDDF273848084BCA77298F5FFBB3A64A9B6BB77C70F9756815C1621607B592FDAE
3,488,830 UART: [art] PUB.Y = 90D411C1EB12E333C56DBD9BA44B4046D9849A78557AD8982BA2CA8EFEBD27125D4A98958FEA6A697254FDCDA61F978A
3,495,794 UART: [art] SIG.R = 7701B755DA25A780C79145ECB91C588617F4485C4939735DA0D4897C8F44DBE0AA98B07C1A5DDD867DB8FAA6F0A8901F
3,502,569 UART: [art] SIG.S = 22D5501AF2B09009DEBBE4FE2C05A603CFE9EFDCDA2F4A1DD2EB42EC8850AF33EA547EC503B8D24819EC5FF519546B28
3,526,382 UART: Caliptra RT
3,526,727 UART: [state] CFI Enabled
3,634,250 UART: [rt] RT listening for mailbox commands...
3,634,920 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,866 UART: [rt]cmd =0x41544d4e, len=14344
4,717,991 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,066 UART:
192,463 UART: Running Caliptra ROM ...
193,552 UART:
193,696 UART: [state] CFI Enabled
264,464 UART: [state] LifecycleState = Unprovisioned
266,389 UART: [state] DebugLocked = No
267,723 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,228 UART: [kat] SHA2-256
442,911 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,448 UART: [kat] ++
453,896 UART: [kat] sha1
466,048 UART: [kat] SHA2-256
468,777 UART: [kat] SHA2-384
473,992 UART: [kat] SHA2-512-ACC
476,359 UART: [kat] ECC-384
2,765,493 UART: [kat] HMAC-384Kdf
2,778,649 UART: [kat] LMS
3,968,954 UART: [kat] --
3,973,468 UART: [cold-reset] ++
3,975,473 UART: [fht] Storing FHT @ 0x50003400
3,985,885 UART: [idev] ++
3,986,520 UART: [idev] CDI.KEYID = 6
3,987,425 UART: [idev] SUBJECT.KEYID = 7
3,988,666 UART: [idev] UDS.KEYID = 0
3,989,728 ready_for_fw is high
3,989,934 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,505 UART: [idev] Erasing UDS.KEYID = 0
7,328,524 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,248 UART: [idev] --
7,352,211 UART: [ldev] ++
7,352,780 UART: [ldev] CDI.KEYID = 6
7,353,762 UART: [ldev] SUBJECT.KEYID = 5
7,354,979 UART: [ldev] AUTHORITY.KEYID = 7
7,356,216 UART: [ldev] FE.KEYID = 1
7,400,615 UART: [ldev] Erasing FE.KEYID = 1
10,733,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,738 UART: [ldev] --
13,113,459 UART: [fwproc] Waiting for Commands...
13,115,931 UART: [fwproc] Received command 0x46574c44
13,118,115 UART: [fwproc] Received Image of size 114124 bytes
22,151,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,227,029 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,295,888 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,612,701 >>> mbox cmd response: success
22,616,558 UART: [afmc] ++
22,617,158 UART: [afmc] CDI.KEYID = 6
22,618,077 UART: [afmc] SUBJECT.KEYID = 7
22,619,296 UART: [afmc] AUTHORITY.KEYID = 5
25,975,008 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,271,385 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,273,657 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,288,179 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,302,916 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,317,157 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,339,950 UART: [afmc] --
28,343,045 UART: [cold-reset] --
28,348,487 UART: [state] Locking Datavault
28,352,656 UART: [state] Locking PCR0, PCR1 and PCR31
28,354,407 UART: [state] Locking ICCM
28,356,504 UART: [exit] Launching FMC @ 0x40000130
28,364,910 UART:
28,365,148 UART: Running Caliptra FMC ...
28,366,253 UART:
28,366,420 UART: [state] CFI Enabled
28,431,548 UART: [fht] FMC Alias Private Key: 7
30,769,257 UART: [art] Extend RT PCRs Done
30,770,525 UART: [art] Lock RT PCRs Done
30,772,182 UART: [art] Populate DV Done
30,777,598 UART: [fht] FMC Alias Private Key: 7
30,779,137 UART: [art] Derive CDI
30,779,952 UART: [art] Store in in slot 0x4
30,839,817 UART: [art] Derive Key Pair
30,840,854 UART: [art] Store priv key in slot 0x5
34,133,225 UART: [art] Derive Key Pair - Done
34,146,012 UART: [art] Signing Cert with AUTHO
34,147,321 UART: RITY.KEYID = 7
36,434,662 UART: [art] Erasing AUTHORITY.KEYID = 7
36,436,160 UART: [art] PUB.X = 9BE420B27807ABE99F2BADA8C4E02A4B15FE94E2EE68A8860B412711361D3D2FC4F7330766E388FA3A56B62C0D170407
36,443,404 UART: [art] PUB.Y = 46A68D4724DE33AAD5F159FE9E98348C1F7EE3E4B7ECDF9B7FBEA05FC385453A6C9EEF4568E7A4D24540DBB0511BBBD8
36,450,689 UART: [art] SIG.R = 466FC6D38B43E359EF544E15EA5E660C59B93491C28923472B6C6506C751FFB37A3A9C2CC5653B1E2D781A0473CB3F47
36,458,073 UART: [art] SIG.S = B296D61C18B1BEA06E993E75DDFAF7E1CBFD56671C8ADCCDBB093A01A625FAECA1F98F4C25DA9C802517EB8A180A2C17
37,763,518 UART: Caliptra RT
37,764,248 UART: [state] CFI Enabled
37,944,015 UART: [rt] RT listening for mailbox commands...
37,946,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,101,428 UART: [rt]cmd =0x41544d4e, len=14344
44,517,695 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,803,688 ready_for_fw is high
3,804,075 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,145,642 >>> mbox cmd response: success
27,833,067 UART:
27,833,468 UART: Running Caliptra FMC ...
27,834,606 UART:
27,834,776 UART: [state] CFI Enabled
27,884,392 UART: [fht] FMC Alias Private Key: 7
30,222,983 UART: [art] Extend RT PCRs Done
30,224,216 UART: [art] Lock RT PCRs Done
30,225,843 UART: [art] Populate DV Done
30,231,267 UART: [fht] FMC Alias Private Key: 7
30,232,917 UART: [art] Derive CDI
30,233,658 UART: [art] Store in in slot 0x4
30,293,149 UART: [art] Derive Key Pair
30,294,191 UART: [art] Store priv key in slot 0x5
33,586,726 UART: [art] Derive Key Pair - Done
33,599,990 UART: [art] Signing Cert with AUTHO
33,601,305 UART: RITY.KEYID = 7
35,889,077 UART: [art] Erasing AUTHORITY.KEYID = 7
35,890,587 UART: [art] PUB.X = 60D5E9FCE416EC0E4B7BAD0368BE63C5BC4DAC732163B31378C40932BDC488166FEA6E4171B4D835DD8A1469F44CA6C9
35,897,892 UART: [art] PUB.Y = AEFDBCFBF1A0F1D3B1CD20D997B29B3B89A0F3A0F12CA0DDFEB8F7EC5F937F2C4256905042E3849016EF57752C43DD39
35,905,139 UART: [art] SIG.R = 2969B26A74C2B0A5394F999023F5064D4BE66EFDC032EDC08B310A943007EC0AC8808442A7F0A07E44B452696E3C7715
35,912,505 UART: [art] SIG.S = 23C2523A03252BBB0910953632FB0C3AB8CE1BB4767FDC47D3F613025473C6FF4925FE790C3CCA6CCF93BA605357A7E3
37,217,571 UART: Caliptra RT
37,218,274 UART: [state] CFI Enabled
37,379,743 UART: [rt] RT listening for mailbox commands...
37,382,070 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,537,251 UART: [rt]cmd =0x41544d4e, len=14344
43,694,646 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,436 UART:
192,807 UART: Running Caliptra ROM ...
193,894 UART:
603,466 UART: [state] CFI Enabled
619,208 UART: [state] LifecycleState = Unprovisioned
621,098 UART: [state] DebugLocked = No
623,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,562 UART: [kat] SHA2-256
797,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,804 UART: [kat] ++
808,279 UART: [kat] sha1
819,013 UART: [kat] SHA2-256
821,666 UART: [kat] SHA2-384
826,028 UART: [kat] SHA2-512-ACC
828,396 UART: [kat] ECC-384
3,110,889 UART: [kat] HMAC-384Kdf
3,122,551 UART: [kat] LMS
4,312,708 UART: [kat] --
4,315,424 UART: [cold-reset] ++
4,317,703 UART: [fht] Storing FHT @ 0x50003400
4,329,682 UART: [idev] ++
4,330,362 UART: [idev] CDI.KEYID = 6
4,331,241 UART: [idev] SUBJECT.KEYID = 7
4,332,504 UART: [idev] UDS.KEYID = 0
4,333,565 ready_for_fw is high
4,333,759 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,281 UART: [idev] Erasing UDS.KEYID = 0
7,618,395 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,801 UART: [idev] --
7,644,199 UART: [ldev] ++
7,644,818 UART: [ldev] CDI.KEYID = 6
7,645,779 UART: [ldev] SUBJECT.KEYID = 5
7,646,981 UART: [ldev] AUTHORITY.KEYID = 7
7,648,202 UART: [ldev] FE.KEYID = 1
7,658,838 UART: [ldev] Erasing FE.KEYID = 1
10,948,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,079 UART: [ldev] --
13,310,564 UART: [fwproc] Waiting for Commands...
13,312,975 UART: [fwproc] Received command 0x46574c44
13,315,148 UART: [fwproc] Received Image of size 114124 bytes
22,033,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,110,766 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,179,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,496,859 >>> mbox cmd response: success
22,501,032 UART: [afmc] ++
22,501,626 UART: [afmc] CDI.KEYID = 6
22,502,506 UART: [afmc] SUBJECT.KEYID = 7
22,503,770 UART: [afmc] AUTHORITY.KEYID = 5
25,815,187 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,107,893 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,110,153 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,124,763 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,139,480 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,153,680 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,175,772 UART: [afmc] --
28,179,478 UART: [cold-reset] --
28,183,873 UART: [state] Locking Datavault
28,187,983 UART: [state] Locking PCR0, PCR1 and PCR31
28,189,734 UART: [state] Locking ICCM
28,191,126 UART: [exit] Launching FMC @ 0x40000130
28,199,522 UART:
28,199,752 UART: Running Caliptra FMC ...
28,200,845 UART:
28,201,001 UART: [state] CFI Enabled
28,208,833 UART: [fht] FMC Alias Private Key: 7
30,539,124 UART: [art] Extend RT PCRs Done
30,540,342 UART: [art] Lock RT PCRs Done
30,541,896 UART: [art] Populate DV Done
30,547,417 UART: [fht] FMC Alias Private Key: 7
30,549,057 UART: [art] Derive CDI
30,549,790 UART: [art] Store in in slot 0x4
30,592,273 UART: [art] Derive Key Pair
30,593,315 UART: [art] Store priv key in slot 0x5
33,835,271 UART: [art] Derive Key Pair - Done
33,848,589 UART: [art] Signing Cert with AUTHO
33,849,918 UART: RITY.KEYID = 7
36,129,347 UART: [art] Erasing AUTHORITY.KEYID = 7
36,130,851 UART: [art] PUB.X = B8B3426FD14089323B0C62D29D798FB46BF8F182F4272986065F358050DC213DFC6627346D4F07B06E0A686F12454783
36,138,064 UART: [art] PUB.Y = 8C5807B471751F474611B5BCC2DEECFEEACA380182EF4C28E927E6B0CB080AF6C1A252524ADB7EB50FAF2492B04E2DDF
36,145,332 UART: [art] SIG.R = 00960CD7F9D649359496B169F8FA618734D7227B64F97E8F73BEFB4D5144B44DFB3AB83F59AC3BE05E3E9586E725BE26
36,152,699 UART: [art] SIG.S = 6740429E8EECD2FAEFEB8BF28A10B6AFE042F0116B4890B658B2A38F36AE945E1CB4213B1D60002BCBEE96A1C5123A45
37,458,085 UART: Caliptra RT
37,458,806 UART: [state] CFI Enabled
37,577,509 UART: [rt] RT listening for mailbox commands...
37,579,831 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,734,994 UART: [rt]cmd =0x41544d4e, len=14344
44,125,833 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
5,209,667 ready_for_fw is high
5,210,048 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,403,201 >>> mbox cmd response: success
29,045,344 UART:
29,046,225 UART: Running Caliptra FMC ...
29,047,341 UART:
29,047,493 UART: [state] CFI Enabled
29,054,966 UART: [fht] FMC Alias Private Key: 7
31,386,188 UART: [art] Extend RT PCRs Done
31,387,435 UART: [art] Lock RT PCRs Done
31,389,055 UART: [art] Populate DV Done
31,394,278 UART: [fht] FMC Alias Private Key: 7
31,395,931 UART: [art] Derive CDI
31,396,664 UART: [art] Store in in slot 0x4
31,439,372 UART: [art] Derive Key Pair
31,440,413 UART: [art] Store priv key in slot 0x5
34,683,270 UART: [art] Derive Key Pair - Done
34,696,209 UART: [art] Signing Cert with AUTHO
34,697,508 UART: RITY.KEYID = 7
36,976,637 UART: [art] Erasing AUTHORITY.KEYID = 7
36,978,143 UART: [art] PUB.X = 7A66DC95B3720A78E07FBD0307DA805AD5283026175C02DBF22EF8FD85F03D1E07BD939381C63C17F5CBC86E9AC3514E
36,985,378 UART: [art] PUB.Y = 2751A3B876E1A52938B85A9F53107EFF08E83FEFC0E9EFE238C14A060CE35FAD0C743A21114EC5F5654E0CAC9DC1EC98
36,992,677 UART: [art] SIG.R = ACE2EC84AE4075B80105AFE0FC4311C77F8032B360589CE650033C05CA757B1F2812CCFE7ABA787B12210F93B1202F88
37,000,050 UART: [art] SIG.S = D516B6B3DAFD1FE3C7D0F92806805EBE206C35A74CC5BEAE3D1BF8E45A4740A2B8262F5294EC4D4025066FED240E08C4
38,304,860 UART: Caliptra RT
38,305,721 UART: [state] CFI Enabled
38,423,460 UART: [rt] RT listening for mailbox commands...
38,425,772 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,581,220 UART: [rt]cmd =0x41544d4e, len=14344
44,867,649 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
191,978 UART:
192,366 UART: Running Caliptra ROM ...
193,456 UART:
193,600 UART: [state] CFI Enabled
265,252 UART: [state] LifecycleState = Unprovisioned
267,166 UART: [state] DebugLocked = No
269,184 UART: [state] WD Timer not started. Device not locked for debugging
272,210 UART: [kat] SHA2-256
451,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,892 UART: [kat] ++
463,338 UART: [kat] sha1
475,273 UART: [kat] SHA2-256
478,359 UART: [kat] SHA2-384
484,419 UART: [kat] SHA2-512-ACC
487,425 UART: [kat] ECC-384
2,949,300 UART: [kat] HMAC-384Kdf
2,973,367 UART: [kat] LMS
3,502,860 UART: [kat] --
3,506,585 UART: [cold-reset] ++
3,508,807 UART: [fht] FHT @ 0x50003400
3,519,804 UART: [idev] ++
3,520,368 UART: [idev] CDI.KEYID = 6
3,521,301 UART: [idev] SUBJECT.KEYID = 7
3,522,420 UART: [idev] UDS.KEYID = 0
3,523,381 ready_for_fw is high
3,523,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,624 UART: [idev] Erasing UDS.KEYID = 0
6,028,927 UART: [idev] Sha1 KeyId Algorithm
6,050,918 UART: [idev] --
6,054,962 UART: [ldev] ++
6,055,537 UART: [ldev] CDI.KEYID = 6
6,056,454 UART: [ldev] SUBJECT.KEYID = 5
6,057,619 UART: [ldev] AUTHORITY.KEYID = 7
6,058,853 UART: [ldev] FE.KEYID = 1
6,103,235 UART: [ldev] Erasing FE.KEYID = 1
8,608,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,416,369 UART: [ldev] --
10,420,173 UART: [fwproc] Wait for Commands...
10,423,126 UART: [fwproc] Recv command 0x46574c44
10,425,206 UART: [fwproc] Recv'd Img size: 114448 bytes
14,987,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,062,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,131,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,448,720 >>> mbox cmd response: success
15,453,278 UART: [afmc] ++
15,453,877 UART: [afmc] CDI.KEYID = 6
15,454,791 UART: [afmc] SUBJECT.KEYID = 7
15,455,954 UART: [afmc] AUTHORITY.KEYID = 5
17,981,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,706,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,708,309 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,724,264 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,740,251 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,756,010 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,779,817 UART: [afmc] --
19,783,198 UART: [cold-reset] --
19,787,493 UART: [state] Locking Datavault
19,794,232 UART: [state] Locking PCR0, PCR1 and PCR31
19,795,879 UART: [state] Locking ICCM
19,797,277 UART: [exit] Launching FMC @ 0x40000130
19,805,726 UART:
19,805,967 UART: Running Caliptra FMC ...
19,807,066 UART:
19,807,238 UART: [state] CFI Enabled
19,866,315 UART: [fht] FMC Alias Private Key: 7
21,629,636 UART: [art] Extend RT PCRs Done
21,630,848 UART: [art] Lock RT PCRs Done
21,632,693 UART: [art] Populate DV Done
21,638,212 UART: [fht] FMC Alias Private Key: 7
21,639,910 UART: [art] Derive CDI
21,640,725 UART: [art] Store in in slot 0x4
21,698,792 UART: [art] Derive Key Pair
21,699,784 UART: [art] Store priv key in slot 0x5
24,162,776 UART: [art] Derive Key Pair - Done
24,176,085 UART: [art] Signing Cert with AUTHO
24,177,383 UART: RITY.KEYID = 7
25,889,488 UART: [art] Erasing AUTHORITY.KEYID = 7
25,890,994 UART: [art] PUB.X = C3D031D98EF916A203B1228E17A0814A371E9D4D023367E2B2A6AACF4E355F79AC22EFDE3644978681153E8E5447C031
25,898,257 UART: [art] PUB.Y = 5F5540F677343A0635A4E2F4A5A30414E72172EA2DBC96A98240CD15453623EB556EC6931D40AE1803DDAD13137A1121
25,905,450 UART: [art] SIG.R = E6DD70309A9892363A85A6D9426A77ADE9D6B4AA484ADAA586F92379C1E4D875014CF444C52921C0358343B31B35BF12
25,912,866 UART: [art] SIG.S = D505BA629D4CC49DF842ADD96A3861F67785E47E35130095E2CDC8E0411BA27EFB99D1200BC5050C287EB691CABDCC1E
26,891,619 UART: Caliptra RT
26,892,312 UART: [state] CFI Enabled
27,057,800 UART: [rt] RT listening for mailbox commands...
27,060,114 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,216,206 UART: [rt]cmd =0x41544d4e, len=14344
30,832,405 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,381,177 ready_for_fw is high
3,381,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,063,045 >>> mbox cmd response: success
19,355,724 UART:
19,356,126 UART: Running Caliptra FMC ...
19,357,328 UART:
19,357,500 UART: [state] CFI Enabled
19,418,943 UART: [fht] FMC Alias Private Key: 7
21,183,272 UART: [art] Extend RT PCRs Done
21,184,483 UART: [art] Lock RT PCRs Done
21,186,169 UART: [art] Populate DV Done
21,191,581 UART: [fht] FMC Alias Private Key: 7
21,193,141 UART: [art] Derive CDI
21,193,959 UART: [art] Store in in slot 0x4
21,251,988 UART: [art] Derive Key Pair
21,253,022 UART: [art] Store priv key in slot 0x5
23,717,068 UART: [art] Derive Key Pair - Done
23,730,284 UART: [art] Signing Cert with AUTHO
23,731,582 UART: RITY.KEYID = 7
25,442,746 UART: [art] Erasing AUTHORITY.KEYID = 7
25,444,249 UART: [art] PUB.X = 41248F61B559FEDCF51BB727616E71AD109275D81DF19C56AF60C7CAA4C30A8C767E96F179A6CE0DB70E7787BA1E4C78
25,451,551 UART: [art] PUB.Y = E69A0EF65E763062527E125F54875372F2429BFBF9C67F38E31439ABF267E9EC5D17B924FB205A978DFFD4ADD3205A0D
25,458,816 UART: [art] SIG.R = 2B7B4C8600DC514AB4299D23C72183BBE335ED0FAB73205DA67BBCAFDBA8F2B287DBCAB815A2B020765C439655F19C99
25,466,206 UART: [art] SIG.S = BDF09D2DCFC66CCE180EE192500BDD4B02692AE8C802187899A6F33B5E0365D2EFB60C0D65F9D3799A1FF8C9A06501E4
26,445,838 UART: Caliptra RT
26,446,547 UART: [state] CFI Enabled
26,610,481 UART: [rt] RT listening for mailbox commands...
26,612,794 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,768,506 UART: [rt]cmd =0x41544d4e, len=14344
30,374,702 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,559 UART:
192,940 UART: Running Caliptra ROM ...
194,120 UART:
603,836 UART: [state] CFI Enabled
618,133 UART: [state] LifecycleState = Unprovisioned
620,038 UART: [state] DebugLocked = No
622,055 UART: [state] WD Timer not started. Device not locked for debugging
625,585 UART: [kat] SHA2-256
804,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,310 UART: [kat] ++
816,750 UART: [kat] sha1
829,315 UART: [kat] SHA2-256
832,315 UART: [kat] SHA2-384
839,148 UART: [kat] SHA2-512-ACC
842,074 UART: [kat] ECC-384
3,282,723 UART: [kat] HMAC-384Kdf
3,295,732 UART: [kat] LMS
3,825,224 UART: [kat] --
3,828,099 UART: [cold-reset] ++
3,829,890 UART: [fht] FHT @ 0x50003400
3,841,362 UART: [idev] ++
3,841,926 UART: [idev] CDI.KEYID = 6
3,842,948 UART: [idev] SUBJECT.KEYID = 7
3,844,048 UART: [idev] UDS.KEYID = 0
3,845,090 ready_for_fw is high
3,845,281 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,033 UART: [idev] Erasing UDS.KEYID = 0
6,317,149 UART: [idev] Sha1 KeyId Algorithm
6,340,488 UART: [idev] --
6,343,340 UART: [ldev] ++
6,343,902 UART: [ldev] CDI.KEYID = 6
6,344,830 UART: [ldev] SUBJECT.KEYID = 5
6,345,975 UART: [ldev] AUTHORITY.KEYID = 7
6,347,319 UART: [ldev] FE.KEYID = 1
6,358,205 UART: [ldev] Erasing FE.KEYID = 1
8,834,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,434 UART: [ldev] --
10,622,376 UART: [fwproc] Wait for Commands...
10,624,191 UART: [fwproc] Recv command 0x46574c44
10,626,273 UART: [fwproc] Recv'd Img size: 114448 bytes
15,182,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,253,890 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,322,635 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,641,528 >>> mbox cmd response: success
15,646,555 UART: [afmc] ++
15,647,181 UART: [afmc] CDI.KEYID = 6
15,648,088 UART: [afmc] SUBJECT.KEYID = 7
15,649,244 UART: [afmc] AUTHORITY.KEYID = 5
18,151,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,872,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,874,837 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,890,794 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,906,759 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,922,532 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,944,414 UART: [afmc] --
19,948,433 UART: [cold-reset] --
19,952,399 UART: [state] Locking Datavault
19,957,043 UART: [state] Locking PCR0, PCR1 and PCR31
19,958,683 UART: [state] Locking ICCM
19,960,445 UART: [exit] Launching FMC @ 0x40000130
19,968,889 UART:
19,969,141 UART: Running Caliptra FMC ...
19,970,239 UART:
19,970,391 UART: [state] CFI Enabled
19,978,489 UART: [fht] FMC Alias Private Key: 7
21,735,132 UART: [art] Extend RT PCRs Done
21,736,343 UART: [art] Lock RT PCRs Done
21,737,984 UART: [art] Populate DV Done
21,743,708 UART: [fht] FMC Alias Private Key: 7
21,745,448 UART: [art] Derive CDI
21,746,177 UART: [art] Store in in slot 0x4
21,788,601 UART: [art] Derive Key Pair
21,789,601 UART: [art] Store priv key in slot 0x5
24,216,253 UART: [art] Derive Key Pair - Done
24,229,187 UART: [art] Signing Cert with AUTHO
24,230,489 UART: RITY.KEYID = 7
25,935,704 UART: [art] Erasing AUTHORITY.KEYID = 7
25,937,211 UART: [art] PUB.X = ABD374E245B8FB1A3B35FC44AAAF76DBEFF68E5356EB3B8BDE801C1CCBE1B9FB9F30B5F4F2EF3BDDCD35529910A346DA
25,944,549 UART: [art] PUB.Y = 5AAD6F80878EA21C36AB7541AC81AAA34357C2C09F93D555B6016BE00691BB809C0F983ABEBDD292A30E3A5DA32FB3CA
25,951,809 UART: [art] SIG.R = 6839603004A2598993946451D1783A484C9E784F93927D7E8DE68C8281C4A3427D371ACF5F0591ED1AAA140564A3AF48
25,959,175 UART: [art] SIG.S = 2B71614598607EA420A12D17A81DED2E5D01FF06DA24D5F24279909F4E120502473691212D09CBFEBE17E7DEC9340BC8
26,938,554 UART: Caliptra RT
26,939,265 UART: [state] CFI Enabled
27,056,056 UART: [rt] RT listening for mailbox commands...
27,058,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,213,625 UART: [rt]cmd =0x41544d4e, len=14344
30,821,729 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,698,636 ready_for_fw is high
3,699,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,258,471 >>> mbox cmd response: success
19,505,912 UART:
19,506,300 UART: Running Caliptra FMC ...
19,507,502 UART:
19,507,655 UART: [state] CFI Enabled
19,515,746 UART: [fht] FMC Alias Private Key: 7
21,272,206 UART: [art] Extend RT PCRs Done
21,273,425 UART: [art] Lock RT PCRs Done
21,275,292 UART: [art] Populate DV Done
21,280,641 UART: [fht] FMC Alias Private Key: 7
21,282,348 UART: [art] Derive CDI
21,283,178 UART: [art] Store in in slot 0x4
21,326,143 UART: [art] Derive Key Pair
21,327,340 UART: [art] Store priv key in slot 0x5
23,753,922 UART: [art] Derive Key Pair - Done
23,766,867 UART: [art] Signing Cert with AUTHO
23,768,164 UART: RITY.KEYID = 7
25,473,436 UART: [art] Erasing AUTHORITY.KEYID = 7
25,474,942 UART: [art] PUB.X = C1DB4573998103F409FF838BD9D65A4A6E248CC03CA728FC58C2294E2DAC634F2596E7E707F3C85DCCD250FC979C43C0
25,482,233 UART: [art] PUB.Y = F2BBA4631939BE2DA3A16672FEDB97FFD342456BEBC90A67653BB947DF535299278859BBF1FC9F7DBC038B2E52C4E533
25,489,511 UART: [art] SIG.R = F4757C0F5CFB87DC05F9EAA2A99F19F7909A4C85E8E08E03B81A432EEC2CC49D15F0F248CE9BC7ECBC0ED478BF3A50D2
25,496,908 UART: [art] SIG.S = 50940F8E77C6A0DD5211B939B8FEE5A775E5BD6E454B7F9D51A767B5203001629B2566528B7B2B20E5D929F7E446A9CC
26,475,726 UART: Caliptra RT
26,476,410 UART: [state] CFI Enabled
26,593,679 UART: [rt] RT listening for mailbox commands...
26,595,996 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,751,259 UART: [rt]cmd =0x41544d4e, len=14344
30,369,062 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,418,227 ready_for_fw is high
3,418,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,822,434 >>> mbox cmd response: success
20,114,066 UART:
20,114,471 UART: Running Caliptra FMC ...
20,115,661 UART:
20,115,824 UART: [state] CFI Enabled
20,181,759 UART: [fht] FMC Alias Private Key: 7
21,945,461 UART: [art] Extend RT PCRs Done
21,946,681 UART: [art] Lock RT PCRs Done
21,948,225 UART: [art] Populate DV Done
21,953,601 UART: [fht] FMC Alias Private Key: 7
21,955,314 UART: [art] Derive CDI
21,956,051 UART: [art] Store in in slot 0x4
22,014,510 UART: [art] Derive Key Pair
22,015,557 UART: [art] Store priv key in slot 0x5
24,479,043 UART: [art] Derive Key Pair - Done
24,492,096 UART: [art] Signing Cert with AUTHO
24,493,406 UART: RITY.KEYID = 7
26,204,622 UART: [art] Erasing AUTHORITY.KEYID = 7
26,206,124 UART: [art] PUB.X = 09B2BDEA89EF2B92C024BD277F56A6B117A5EC3DD2DB5B469E9EC8E2452AC6A904176081608A522DBDCA5A5611510F24
26,213,399 UART: [art] PUB.Y = F553A213452236378C2D359B90A7D75CF53F57DB239B887268A09A35FA92718842062D8A3DD6D5D2086E4615A3C655A5
26,220,600 UART: [art] SIG.R = A42D79A66E4F559A2F0119837DD75B5D13C37CE29114B59153D37F94BE777620EFEE948050D1CEC39BA8BCD53B41D557
26,227,992 UART: [art] SIG.S = B768EC6E2603ED845555443E21C06E19683A5B112ED383FF02327314CEA69DEC50AEB41B7D3E3D7F54D4B63317BC7E7E
27,206,976 UART: Caliptra RT
27,207,689 UART: [state] CFI Enabled
27,372,880 UART: [rt] RT listening for mailbox commands...
27,375,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,531,134 UART: [rt]cmd =0x41544d4e, len=14344
31,152,715 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,756,817 ready_for_fw is high
3,757,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,067,689 >>> mbox cmd response: success
20,319,872 UART:
20,320,249 UART: Running Caliptra FMC ...
20,321,381 UART:
20,321,534 UART: [state] CFI Enabled
20,329,482 UART: [fht] FMC Alias Private Key: 7
22,086,055 UART: [art] Extend RT PCRs Done
22,087,278 UART: [art] Lock RT PCRs Done
22,088,899 UART: [art] Populate DV Done
22,094,093 UART: [fht] FMC Alias Private Key: 7
22,095,798 UART: [art] Derive CDI
22,096,608 UART: [art] Store in in slot 0x4
22,139,218 UART: [art] Derive Key Pair
22,140,216 UART: [art] Store priv key in slot 0x5
24,567,221 UART: [art] Derive Key Pair - Done
24,580,270 UART: [art] Signing Cert with AUTHO
24,581,574 UART: RITY.KEYID = 7
26,286,652 UART: [art] Erasing AUTHORITY.KEYID = 7
26,288,156 UART: [art] PUB.X = 747805FD0EA36196094145380B469F21F7DA66360A0B4BCD21C273BCCA75F2192524CCDB5B4AF504E9565ECB902E2913
26,295,390 UART: [art] PUB.Y = 4433E4880C42E66590EE685B9C89311066363A80F23B327066AA7C39E2851BC7EC3FDD7ED7E8B07A60EC2CB394C76195
26,302,662 UART: [art] SIG.R = 4A496EF72CAD83C7C8BBE9022838760F4EC5CC9E1D323B23496F271F812E36E645304E5AB74CDE3BB78BD42D5F25E06D
26,310,080 UART: [art] SIG.S = E99DF5ACE164739BD597F6E52FFF22830090F97296049B09D9C7638E4616CC173F0DE3236D299FC96458170EC4B8BB3C
27,288,775 UART: Caliptra RT
27,289,472 UART: [state] CFI Enabled
27,407,334 UART: [rt] RT listening for mailbox commands...
27,409,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,564,921 UART: [rt]cmd =0x41544d4e, len=14344
31,186,082 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,921 UART: [kat] SHA2-256
881,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,967 UART: [kat] ++
886,119 UART: [kat] sha1
890,259 UART: [kat] SHA2-256
892,197 UART: [kat] SHA2-384
895,052 UART: [kat] SHA2-512-ACC
896,953 UART: [kat] ECC-384
902,610 UART: [kat] HMAC-384Kdf
907,078 UART: [kat] LMS
1,475,274 UART: [kat] --
1,475,929 UART: [cold-reset] ++
1,476,265 UART: [fht] Storing FHT @ 0x50003400
1,479,120 UART: [idev] ++
1,479,288 UART: [idev] CDI.KEYID = 6
1,479,648 UART: [idev] SUBJECT.KEYID = 7
1,480,072 UART: [idev] UDS.KEYID = 0
1,480,417 ready_for_fw is high
1,480,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,048 UART: [idev] Erasing UDS.KEYID = 0
1,505,164 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,764 UART: [idev] --
1,514,801 UART: [ldev] ++
1,514,969 UART: [ldev] CDI.KEYID = 6
1,515,332 UART: [ldev] SUBJECT.KEYID = 5
1,515,758 UART: [ldev] AUTHORITY.KEYID = 7
1,516,221 UART: [ldev] FE.KEYID = 1
1,521,559 UART: [ldev] Erasing FE.KEYID = 1
1,547,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,946 UART: [ldev] --
1,586,305 UART: [fwproc] Waiting for Commands...
1,587,144 UART: [fwproc] Received command 0x46574c44
1,587,935 UART: [fwproc] Received Image of size 114448 bytes
5,047,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,076,301 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,105,653 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,241,570 >>> mbox cmd response: success
5,242,678 UART: [afmc] ++
5,242,846 UART: [afmc] CDI.KEYID = 6
5,243,208 UART: [afmc] SUBJECT.KEYID = 7
5,243,633 UART: [afmc] AUTHORITY.KEYID = 5
5,278,721 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,294,903 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,295,683 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,301,392 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,307,284 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,312,985 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,321,041 UART: [afmc] --
5,321,919 UART: [cold-reset] --
5,322,859 UART: [state] Locking Datavault
5,324,226 UART: [state] Locking PCR0, PCR1 and PCR31
5,324,830 UART: [state] Locking ICCM
5,325,466 UART: [exit] Launching FMC @ 0x40000130
5,330,795 UART:
5,330,811 UART: Running Caliptra FMC ...
5,331,219 UART:
5,331,273 UART: [state] CFI Enabled
5,342,061 UART: [fht] FMC Alias Private Key: 7
5,449,585 UART: [art] Extend RT PCRs Done
5,450,013 UART: [art] Lock RT PCRs Done
5,451,573 UART: [art] Populate DV Done
5,459,857 UART: [fht] FMC Alias Private Key: 7
5,460,919 UART: [art] Derive CDI
5,461,199 UART: [art] Store in in slot 0x4
5,546,660 UART: [art] Derive Key Pair
5,547,020 UART: [art] Store priv key in slot 0x5
5,560,068 UART: [art] Derive Key Pair - Done
5,575,139 UART: [art] Signing Cert with AUTHO
5,575,619 UART: RITY.KEYID = 7
5,590,919 UART: [art] Erasing AUTHORITY.KEYID = 7
5,591,684 UART: [art] PUB.X = F21AC5FFCAA3F07C20F1C535CCEB878FE678BBF59180EE8118459C55218C8FA18E88A89F311018F87185ED6816D2982D
5,598,462 UART: [art] PUB.Y = B926C098A61067C03B6EE2191C1773D3308B2AC090782431B856F81AC6531723A7C297EF04593A554B23158ECBD5EE02
5,605,400 UART: [art] SIG.R = AFB2FA4FA86E0C5019A4B94A33C021ED71075A091918258B89488131E32AB2CBB7AE76F12AAC35C1BA5C6FFC4908EED6
5,612,174 UART: [art] SIG.S = 754D4945E5117BCD6A85848CDC4EF65FBB2EBFDBD7E391A01B4A67345DC04471B750984703107207E1A873FF0AE8865C
5,636,114 UART: Caliptra RT
5,636,367 UART: [state] CFI Enabled
5,744,664 UART: [rt] RT listening for mailbox commands...
5,745,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,868,148 UART: [rt]cmd =0x41544d4e, len=14344
6,829,065 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,227 ready_for_fw is high
1,362,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,165,384 >>> mbox cmd response: success
5,227,361 UART:
5,227,377 UART: Running Caliptra FMC ...
5,227,785 UART:
5,227,839 UART: [state] CFI Enabled
5,238,113 UART: [fht] FMC Alias Private Key: 7
5,345,827 UART: [art] Extend RT PCRs Done
5,346,255 UART: [art] Lock RT PCRs Done
5,347,823 UART: [art] Populate DV Done
5,355,909 UART: [fht] FMC Alias Private Key: 7
5,356,877 UART: [art] Derive CDI
5,357,157 UART: [art] Store in in slot 0x4
5,443,208 UART: [art] Derive Key Pair
5,443,568 UART: [art] Store priv key in slot 0x5
5,456,900 UART: [art] Derive Key Pair - Done
5,471,612 UART: [art] Signing Cert with AUTHO
5,472,092 UART: RITY.KEYID = 7
5,487,294 UART: [art] Erasing AUTHORITY.KEYID = 7
5,488,059 UART: [art] PUB.X = FEB60F147AED792D3D97CBC867EEAAD68A78E557FA6AA9161979ED94864772032325ADD220E884B3DC8DA6D609DC734B
5,494,834 UART: [art] PUB.Y = 604E019F7258C969F33D8E88DDEF7ABF6595C5F9B36102F12BC65D3F46AC9EB66DB2A41B1E59E1486D1C1BD36450F77E
5,501,790 UART: [art] SIG.R = 61CDFE63CD2215A2DDF5171BD4210F71D781CDE4AF5DD99232D5DF95CF2F6EFC5A4ABE898574E6B773D67C2749D01494
5,508,573 UART: [art] SIG.S = 46C51DA69AD6CBDA68EAE8B1C95B8E9D2048EB6E26E40C9A577909550BB9F5058F0710D63B9CF8218EB4845553757BBA
5,532,227 UART: Caliptra RT
5,532,480 UART: [state] CFI Enabled
5,640,496 UART: [rt] RT listening for mailbox commands...
5,641,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,614 UART: [rt]cmd =0x41544d4e, len=14344
6,729,251 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,811 UART: [state] LifecycleState = Unprovisioned
86,466 UART: [state] DebugLocked = No
87,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,708 UART: [kat] SHA2-256
882,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,754 UART: [kat] ++
886,906 UART: [kat] sha1
891,078 UART: [kat] SHA2-256
893,016 UART: [kat] SHA2-384
895,733 UART: [kat] SHA2-512-ACC
897,634 UART: [kat] ECC-384
903,151 UART: [kat] HMAC-384Kdf
907,859 UART: [kat] LMS
1,476,055 UART: [kat] --
1,476,918 UART: [cold-reset] ++
1,477,484 UART: [fht] Storing FHT @ 0x50003400
1,480,333 UART: [idev] ++
1,480,501 UART: [idev] CDI.KEYID = 6
1,480,861 UART: [idev] SUBJECT.KEYID = 7
1,481,285 UART: [idev] UDS.KEYID = 0
1,481,630 ready_for_fw is high
1,481,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,875 UART: [idev] Erasing UDS.KEYID = 0
1,505,509 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,311 UART: [idev] --
1,515,472 UART: [ldev] ++
1,515,640 UART: [ldev] CDI.KEYID = 6
1,516,003 UART: [ldev] SUBJECT.KEYID = 5
1,516,429 UART: [ldev] AUTHORITY.KEYID = 7
1,516,892 UART: [ldev] FE.KEYID = 1
1,522,366 UART: [ldev] Erasing FE.KEYID = 1
1,548,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,961 UART: [ldev] --
1,587,298 UART: [fwproc] Waiting for Commands...
1,588,001 UART: [fwproc] Received command 0x46574c44
1,588,792 UART: [fwproc] Received Image of size 114448 bytes
5,123,252 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,151,380 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,180,732 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,316,805 >>> mbox cmd response: success
5,317,909 UART: [afmc] ++
5,318,077 UART: [afmc] CDI.KEYID = 6
5,318,439 UART: [afmc] SUBJECT.KEYID = 7
5,318,864 UART: [afmc] AUTHORITY.KEYID = 5
5,354,578 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,370,968 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,371,748 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,377,457 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,383,349 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,389,050 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,396,866 UART: [afmc] --
5,397,852 UART: [cold-reset] --
5,398,474 UART: [state] Locking Datavault
5,399,659 UART: [state] Locking PCR0, PCR1 and PCR31
5,400,263 UART: [state] Locking ICCM
5,400,853 UART: [exit] Launching FMC @ 0x40000130
5,406,182 UART:
5,406,198 UART: Running Caliptra FMC ...
5,406,606 UART:
5,406,749 UART: [state] CFI Enabled
5,417,249 UART: [fht] FMC Alias Private Key: 7
5,524,963 UART: [art] Extend RT PCRs Done
5,525,391 UART: [art] Lock RT PCRs Done
5,526,881 UART: [art] Populate DV Done
5,535,259 UART: [fht] FMC Alias Private Key: 7
5,536,387 UART: [art] Derive CDI
5,536,667 UART: [art] Store in in slot 0x4
5,622,446 UART: [art] Derive Key Pair
5,622,806 UART: [art] Store priv key in slot 0x5
5,635,356 UART: [art] Derive Key Pair - Done
5,649,924 UART: [art] Signing Cert with AUTHO
5,650,404 UART: RITY.KEYID = 7
5,665,622 UART: [art] Erasing AUTHORITY.KEYID = 7
5,666,387 UART: [art] PUB.X = E5DFE7723F62F95F7B333A77E846B6100496582500EEC0F5EF1C1BFADFC7F6D7D76F00E74D37F2B1CF293CF14CF1F62E
5,673,128 UART: [art] PUB.Y = 98B0C06027A2115826E4E5DED60AAC6BA782FE278A867EFBCD987D4953B7FC115716ECD61C82642E432FDC2B7CF819CB
5,680,089 UART: [art] SIG.R = ACC37A740A456902EEBB62349A7F72516AFEDBE8CF74495B27C98AA18DACF18DD97905DB209766991E7C3C0DC0590BB6
5,686,858 UART: [art] SIG.S = A39FB00B1C465EC40F21AABE6CFF06A966AEB4D14EE3FF49F53906340C168FAAEB826B9CF56E45A0D82C57FD7BDB0610
5,710,217 UART: Caliptra RT
5,710,562 UART: [state] CFI Enabled
5,817,974 UART: [rt] RT listening for mailbox commands...
5,818,644 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,941,722 UART: [rt]cmd =0x41544d4e, len=14344
6,899,084 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,648 ready_for_fw is high
1,362,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,014,789 >>> mbox cmd response: success
5,077,114 UART:
5,077,130 UART: Running Caliptra FMC ...
5,077,538 UART:
5,077,681 UART: [state] CFI Enabled
5,088,535 UART: [fht] FMC Alias Private Key: 7
5,197,293 UART: [art] Extend RT PCRs Done
5,197,721 UART: [art] Lock RT PCRs Done
5,199,371 UART: [art] Populate DV Done
5,207,585 UART: [fht] FMC Alias Private Key: 7
5,208,723 UART: [art] Derive CDI
5,209,003 UART: [art] Store in in slot 0x4
5,294,840 UART: [art] Derive Key Pair
5,295,200 UART: [art] Store priv key in slot 0x5
5,308,752 UART: [art] Derive Key Pair - Done
5,323,719 UART: [art] Signing Cert with AUTHO
5,324,199 UART: RITY.KEYID = 7
5,339,799 UART: [art] Erasing AUTHORITY.KEYID = 7
5,340,564 UART: [art] PUB.X = B9C2A3551CFBAA059A0A9956A7373143C35E31B774944E78C7877D303AA6DA77C48AA22E07C6DF3FC6A13ACB3CE0340B
5,347,334 UART: [art] PUB.Y = A21829F0220B64EEE166FF9595F0D4DEC1989A9CAFC864AF8DC28418E53C6D358A0C6839BDF61239D59E8618AE3BA4F5
5,354,290 UART: [art] SIG.R = F893193C80A5D1A90475CB2745A3F5ECDDBB64F75E2C6A9DBEC87497A72BA1B7B16F6693717E4BE8296327738C674855
5,361,061 UART: [art] SIG.S = 9B31DBA29AA6960774CFB11F09CC85FC26A9F26E521404470CBC682AB438E7D2535FB3F455B560055F75A33BB145A47C
5,384,645 UART: Caliptra RT
5,384,990 UART: [state] CFI Enabled
5,493,402 UART: [rt] RT listening for mailbox commands...
5,494,072 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,617,124 UART: [rt]cmd =0x41544d4e, len=14344
6,574,384 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
893,210 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,335 UART: [kat] ++
897,487 UART: [kat] sha1
901,785 UART: [kat] SHA2-256
903,725 UART: [kat] SHA2-384
906,440 UART: [kat] SHA2-512-ACC
908,341 UART: [kat] ECC-384
917,586 UART: [kat] HMAC-384Kdf
922,192 UART: [kat] LMS
1,170,520 UART: [kat] --
1,171,237 UART: [cold-reset] ++
1,171,751 UART: [fht] FHT @ 0x50003400
1,174,372 UART: [idev] ++
1,174,540 UART: [idev] CDI.KEYID = 6
1,174,900 UART: [idev] SUBJECT.KEYID = 7
1,175,324 UART: [idev] UDS.KEYID = 0
1,175,669 ready_for_fw is high
1,175,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,360 UART: [idev] Erasing UDS.KEYID = 0
1,200,475 UART: [idev] Sha1 KeyId Algorithm
1,208,913 UART: [idev] --
1,209,983 UART: [ldev] ++
1,210,151 UART: [ldev] CDI.KEYID = 6
1,210,514 UART: [ldev] SUBJECT.KEYID = 5
1,210,940 UART: [ldev] AUTHORITY.KEYID = 7
1,211,403 UART: [ldev] FE.KEYID = 1
1,216,527 UART: [ldev] Erasing FE.KEYID = 1
1,242,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,601 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,578 UART: [fwproc] Recv command 0x46574c44
1,283,306 UART: [fwproc] Recv'd Img size: 114448 bytes
3,131,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,324,656 >>> mbox cmd response: success
3,325,684 UART: [afmc] ++
3,325,852 UART: [afmc] CDI.KEYID = 6
3,326,214 UART: [afmc] SUBJECT.KEYID = 7
3,326,639 UART: [afmc] AUTHORITY.KEYID = 5
3,362,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,554 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,263 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,155 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,866 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,507 UART: [afmc] --
3,405,573 UART: [cold-reset] --
3,406,633 UART: [state] Locking Datavault
3,407,776 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,380 UART: [state] Locking ICCM
3,408,946 UART: [exit] Launching FMC @ 0x40000130
3,414,275 UART:
3,414,291 UART: Running Caliptra FMC ...
3,414,699 UART:
3,414,753 UART: [state] CFI Enabled
3,425,555 UART: [fht] FMC Alias Private Key: 7
3,533,117 UART: [art] Extend RT PCRs Done
3,533,545 UART: [art] Lock RT PCRs Done
3,535,223 UART: [art] Populate DV Done
3,543,247 UART: [fht] FMC Alias Private Key: 7
3,544,235 UART: [art] Derive CDI
3,544,515 UART: [art] Store in in slot 0x4
3,630,252 UART: [art] Derive Key Pair
3,630,612 UART: [art] Store priv key in slot 0x5
3,643,836 UART: [art] Derive Key Pair - Done
3,658,521 UART: [art] Signing Cert with AUTHO
3,659,001 UART: RITY.KEYID = 7
3,674,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,424 UART: [art] PUB.X = 1DFFD843EFEF679936BBF86561F1E4C2228EB3D568C80C19A5E5D3DAD5072A2B5C6D9EDCC5D39069E5E83494FAC88C19
3,682,206 UART: [art] PUB.Y = 696F174A4D5548C119A5D091D7B8F29CA3BDC0CF7AF024BE81F24DAB2C84A2326B6D8696C7C1A5587D61013BA523CDA9
3,689,165 UART: [art] SIG.R = CB7C1A759B4F06869B5F5005B75124C016E00116D767FC2EF5B97F67F2EB511ADF826461D5C2E390C8ADCBF50DA7EB83
3,695,935 UART: [art] SIG.S = 0175770C5ADAF4C7D3613CB4FED744D13258DD84926977467F0B0E66F71623BE64D9A8A22FEC79273E7E628460A04408
3,719,865 UART: Caliptra RT
3,720,118 UART: [state] CFI Enabled
3,826,252 UART: [rt] RT listening for mailbox commands...
3,826,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,756 UART: [rt]cmd =0x41544d4e, len=14344
4,905,189 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,359 ready_for_fw is high
1,059,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,157 >>> mbox cmd response: success
3,229,182 UART:
3,229,198 UART: Running Caliptra FMC ...
3,229,606 UART:
3,229,660 UART: [state] CFI Enabled
3,240,272 UART: [fht] FMC Alias Private Key: 7
3,347,676 UART: [art] Extend RT PCRs Done
3,348,104 UART: [art] Lock RT PCRs Done
3,349,736 UART: [art] Populate DV Done
3,357,958 UART: [fht] FMC Alias Private Key: 7
3,359,022 UART: [art] Derive CDI
3,359,302 UART: [art] Store in in slot 0x4
3,445,083 UART: [art] Derive Key Pair
3,445,443 UART: [art] Store priv key in slot 0x5
3,458,253 UART: [art] Derive Key Pair - Done
3,473,012 UART: [art] Signing Cert with AUTHO
3,473,492 UART: RITY.KEYID = 7
3,488,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,535 UART: [art] PUB.X = EBDEC152C8DCC2CA38740CBF3069F2AA14CDE9405C063E538623F211873FFD62B6E526488A52E4CD21134AD2C87BBEF8
3,496,315 UART: [art] PUB.Y = 6F441F398D45FD01FACBAF22C2F98B81271049480C3B6D142FB52979B90D824FDF2624FF958A2ADF543090B8A150A5F7
3,503,262 UART: [art] SIG.R = 75CE6AE1DE343DFD9EF18305532D215B5847D68ED35FA1D93D4082FCD195A3A5909B3E9351A4318A7E1D95AD19147A69
3,510,035 UART: [art] SIG.S = C217959ED820B8D1CAE3B4D6B12CB68D7CF2A3B6E7DC12677EB387CEA395D1B763A9FC2D70DB00B63BBBED4AD42D7D2C
3,534,134 UART: Caliptra RT
3,534,387 UART: [state] CFI Enabled
3,642,509 UART: [rt] RT listening for mailbox commands...
3,643,179 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,143 UART: [rt]cmd =0x41544d4e, len=14344
4,741,286 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,707 UART: [state] LifecycleState = Unprovisioned
85,362 UART: [state] DebugLocked = No
85,884 UART: [state] WD Timer not started. Device not locked for debugging
87,117 UART: [kat] SHA2-256
892,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,892 UART: [kat] ++
897,044 UART: [kat] sha1
901,476 UART: [kat] SHA2-256
903,416 UART: [kat] SHA2-384
906,321 UART: [kat] SHA2-512-ACC
908,222 UART: [kat] ECC-384
917,745 UART: [kat] HMAC-384Kdf
922,277 UART: [kat] LMS
1,170,605 UART: [kat] --
1,171,774 UART: [cold-reset] ++
1,172,272 UART: [fht] FHT @ 0x50003400
1,174,903 UART: [idev] ++
1,175,071 UART: [idev] CDI.KEYID = 6
1,175,431 UART: [idev] SUBJECT.KEYID = 7
1,175,855 UART: [idev] UDS.KEYID = 0
1,176,200 ready_for_fw is high
1,176,200 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,193 UART: [idev] Erasing UDS.KEYID = 0
1,201,670 UART: [idev] Sha1 KeyId Algorithm
1,210,024 UART: [idev] --
1,211,002 UART: [ldev] ++
1,211,170 UART: [ldev] CDI.KEYID = 6
1,211,533 UART: [ldev] SUBJECT.KEYID = 5
1,211,959 UART: [ldev] AUTHORITY.KEYID = 7
1,212,422 UART: [ldev] FE.KEYID = 1
1,217,914 UART: [ldev] Erasing FE.KEYID = 1
1,244,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,464 UART: [ldev] --
1,283,813 UART: [fwproc] Wait for Commands...
1,284,557 UART: [fwproc] Recv command 0x46574c44
1,285,285 UART: [fwproc] Recv'd Img size: 114448 bytes
3,125,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,330 >>> mbox cmd response: success
3,319,352 UART: [afmc] ++
3,319,520 UART: [afmc] CDI.KEYID = 6
3,319,882 UART: [afmc] SUBJECT.KEYID = 7
3,320,307 UART: [afmc] AUTHORITY.KEYID = 5
3,356,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,920 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,668 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,377 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,269 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,980 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,801 UART: [afmc] --
3,399,899 UART: [cold-reset] --
3,400,667 UART: [state] Locking Datavault
3,401,780 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,384 UART: [state] Locking ICCM
3,403,046 UART: [exit] Launching FMC @ 0x40000130
3,408,375 UART:
3,408,391 UART: Running Caliptra FMC ...
3,408,799 UART:
3,408,942 UART: [state] CFI Enabled
3,419,828 UART: [fht] FMC Alias Private Key: 7
3,527,568 UART: [art] Extend RT PCRs Done
3,527,996 UART: [art] Lock RT PCRs Done
3,529,462 UART: [art] Populate DV Done
3,537,412 UART: [fht] FMC Alias Private Key: 7
3,538,454 UART: [art] Derive CDI
3,538,734 UART: [art] Store in in slot 0x4
3,624,317 UART: [art] Derive Key Pair
3,624,677 UART: [art] Store priv key in slot 0x5
3,638,813 UART: [art] Derive Key Pair - Done
3,653,901 UART: [art] Signing Cert with AUTHO
3,654,381 UART: RITY.KEYID = 7
3,669,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,324 UART: [art] PUB.X = 2BB298BBE96865853542688068B64B9E6674198E836F95FB7CB8CEF42DFB6A2E9DF103995EC00E1628A285D04C9332A6
3,677,088 UART: [art] PUB.Y = 97163EEA5036E7483935B26A18CBB627101137E262A1A06AE0AB51A78E5706DAD94041CA98A7A6E5AA76DF18689B42DA
3,684,039 UART: [art] SIG.R = DB42C35A914FF9CEC09D98177BA19C69BE184B23B4E4F4D237C48210D1E320936F7DD467479CC98D1AFED36F01467047
3,690,812 UART: [art] SIG.S = 29FBF33D0EA625B621223E50FA8B2ADF8D1A97697456092B9272A8EB02ACC36F18E50ED4A631E3E7EB393AC2B5EDBF17
3,714,515 UART: Caliptra RT
3,714,860 UART: [state] CFI Enabled
3,823,130 UART: [rt] RT listening for mailbox commands...
3,823,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,798 UART: [rt]cmd =0x41544d4e, len=14344
4,914,268 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,392 ready_for_fw is high
1,060,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,661 >>> mbox cmd response: success
3,236,898 UART:
3,236,914 UART: Running Caliptra FMC ...
3,237,322 UART:
3,237,465 UART: [state] CFI Enabled
3,248,217 UART: [fht] FMC Alias Private Key: 7
3,355,967 UART: [art] Extend RT PCRs Done
3,356,395 UART: [art] Lock RT PCRs Done
3,357,703 UART: [art] Populate DV Done
3,365,971 UART: [fht] FMC Alias Private Key: 7
3,367,145 UART: [art] Derive CDI
3,367,425 UART: [art] Store in in slot 0x4
3,452,654 UART: [art] Derive Key Pair
3,453,014 UART: [art] Store priv key in slot 0x5
3,466,400 UART: [art] Derive Key Pair - Done
3,481,215 UART: [art] Signing Cert with AUTHO
3,481,695 UART: RITY.KEYID = 7
3,497,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,802 UART: [art] PUB.X = 39EA46C5D4BE5C4FCCA4997177F5AF1EF111007FCA6C95F870B76B0F5E748C6F89BAD42882B538C8576D5CD8A425B6BF
3,504,563 UART: [art] PUB.Y = 8C743D1B6A4D93055577FFF64819EC7CE7E18F8620763549A64B9A62812FEE166E1E2307A3BB4739B6F9117BBD775E89
3,511,507 UART: [art] SIG.R = 7B756C95CF128D80FBE0863771049717A1C5D24F313E4B5B6536D4BB80546EB5080D7C08E78DAD0430137EF6398DCEA0
3,518,264 UART: [art] SIG.S = 33D760260441E08FC5C409C61A4CB970AAF59A4A27BE33BB022F773DC29A9FDCBB5E2470C271843A2351E0B6AD3E1CED
3,542,032 UART: Caliptra RT
3,542,377 UART: [state] CFI Enabled
3,650,308 UART: [rt] RT listening for mailbox commands...
3,650,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,152 UART: [rt]cmd =0x41544d4e, len=14344
4,726,936 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,111 UART: [kat] ++
895,263 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,768 UART: [kat] HMAC-384Kdf
920,246 UART: [kat] LMS
1,168,558 UART: [kat] --
1,169,219 UART: [cold-reset] ++
1,169,647 UART: [fht] FHT @ 0x50003400
1,172,193 UART: [idev] ++
1,172,361 UART: [idev] CDI.KEYID = 6
1,172,722 UART: [idev] SUBJECT.KEYID = 7
1,173,147 UART: [idev] UDS.KEYID = 0
1,173,493 ready_for_fw is high
1,173,493 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,921 UART: [idev] Erasing UDS.KEYID = 0
1,197,241 UART: [idev] Sha1 KeyId Algorithm
1,206,303 UART: [idev] --
1,207,324 UART: [ldev] ++
1,207,492 UART: [ldev] CDI.KEYID = 6
1,207,856 UART: [ldev] SUBJECT.KEYID = 5
1,208,283 UART: [ldev] AUTHORITY.KEYID = 7
1,208,746 UART: [ldev] FE.KEYID = 1
1,214,046 UART: [ldev] Erasing FE.KEYID = 1
1,240,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,136 UART: [ldev] --
1,279,418 UART: [fwproc] Wait for Commands...
1,280,179 UART: [fwproc] Recv command 0x46574c44
1,280,912 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,317,239 >>> mbox cmd response: success
3,318,458 UART: [afmc] ++
3,318,626 UART: [afmc] CDI.KEYID = 6
3,318,989 UART: [afmc] SUBJECT.KEYID = 7
3,319,415 UART: [afmc] AUTHORITY.KEYID = 5
3,354,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,724 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,434 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,324 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,035 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,937 UART: [afmc] --
3,397,979 UART: [cold-reset] --
3,398,803 UART: [state] Locking Datavault
3,399,936 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,540 UART: [state] Locking ICCM
3,401,126 UART: [exit] Launching FMC @ 0x40000130
3,406,455 UART:
3,406,471 UART: Running Caliptra FMC ...
3,406,879 UART:
3,406,933 UART: [state] CFI Enabled
3,417,561 UART: [fht] FMC Alias Private Key: 7
3,525,035 UART: [art] Extend RT PCRs Done
3,525,463 UART: [art] Lock RT PCRs Done
3,527,043 UART: [art] Populate DV Done
3,535,045 UART: [fht] FMC Alias Private Key: 7
3,536,103 UART: [art] Derive CDI
3,536,383 UART: [art] Store in in slot 0x4
3,621,932 UART: [art] Derive Key Pair
3,622,292 UART: [art] Store priv key in slot 0x5
3,635,464 UART: [art] Derive Key Pair - Done
3,649,988 UART: [art] Signing Cert with AUTHO
3,650,468 UART: RITY.KEYID = 7
3,665,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,615 UART: [art] PUB.X = 30FBEE080698A6AC7F29BEE85FDCBA4B1DD1F218047F33E9A018A1CEC927FB22F473F73E73CD9545EF78795DD1DC5E56
3,673,396 UART: [art] PUB.Y = 26F0984B83D916FCB9831449E7FDB796D370536511BF267A8467BF5B91B71679D11928AF48B9D209941B3A00A024251E
3,680,313 UART: [art] SIG.R = CAF18671D1C2EDA40448B56706AC87CC3A5742F90ECDD56FE6C55D5F997E67C25E6DF9A0A5BA9CD66E22E69B79AAA140
3,687,094 UART: [art] SIG.S = 0AE806D6FD18357960EB3412CE07926CA21C35AA9A5F9735A9B4C77E18C373516C77A509B4058E46D7A15C8B6BBBFD7E
3,710,894 UART: Caliptra RT
3,711,147 UART: [state] CFI Enabled
3,818,201 UART: [rt] RT listening for mailbox commands...
3,818,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,755 UART: [rt]cmd =0x41544d4e, len=14344
4,901,634 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,800 ready_for_fw is high
1,056,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,278 >>> mbox cmd response: success
3,228,755 UART:
3,228,771 UART: Running Caliptra FMC ...
3,229,179 UART:
3,229,233 UART: [state] CFI Enabled
3,239,625 UART: [fht] FMC Alias Private Key: 7
3,347,069 UART: [art] Extend RT PCRs Done
3,347,497 UART: [art] Lock RT PCRs Done
3,348,991 UART: [art] Populate DV Done
3,357,349 UART: [fht] FMC Alias Private Key: 7
3,358,525 UART: [art] Derive CDI
3,358,805 UART: [art] Store in in slot 0x4
3,444,484 UART: [art] Derive Key Pair
3,444,844 UART: [art] Store priv key in slot 0x5
3,457,764 UART: [art] Derive Key Pair - Done
3,472,610 UART: [art] Signing Cert with AUTHO
3,473,090 UART: RITY.KEYID = 7
3,488,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,945 UART: [art] PUB.X = D1094A150EC24442C9AB6DDBEC9447C6FF8386A0B837385A2927F4B4E293B0347C7BB17AEC67791204DF684BFCFD3DC6
3,495,718 UART: [art] PUB.Y = 995B510FD6CB680508FCA8D287BC5EDC5A0729B7DD38A574910D35D13CD360E76AC4EC891B67A82CE35380B9299FE7EC
3,502,665 UART: [art] SIG.R = 360A1D6722F062D1872850B093901ED3427A5E1070C243065319AD1BDCA93C872167FE6CF7DA73E05142C9CAACE2B017
3,509,429 UART: [art] SIG.S = 6B9CBB040C5943C9C2A6B845E534B06C932E685202B526E8CFE2656731B2E1768FFDF3CE6150696FFFA75A23E0D0AD2C
3,533,999 UART: Caliptra RT
3,534,252 UART: [state] CFI Enabled
3,641,889 UART: [rt] RT listening for mailbox commands...
3,642,559 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,907 UART: [rt]cmd =0x41544d4e, len=14344
4,716,228 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,706 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
920,921 UART: [kat] LMS
1,169,233 UART: [kat] --
1,170,336 UART: [cold-reset] ++
1,170,878 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,174,782 ready_for_fw is high
1,174,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,600 UART: [idev] Erasing UDS.KEYID = 0
1,199,970 UART: [idev] Sha1 KeyId Algorithm
1,208,972 UART: [idev] --
1,209,973 UART: [ldev] ++
1,210,141 UART: [ldev] CDI.KEYID = 6
1,210,505 UART: [ldev] SUBJECT.KEYID = 5
1,210,932 UART: [ldev] AUTHORITY.KEYID = 7
1,211,395 UART: [ldev] FE.KEYID = 1
1,216,599 UART: [ldev] Erasing FE.KEYID = 1
1,242,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,751 UART: [fwproc] Wait for Commands...
1,282,352 UART: [fwproc] Recv command 0x46574c44
1,283,085 UART: [fwproc] Recv'd Img size: 114448 bytes
3,106,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,135,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,164,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,300,954 >>> mbox cmd response: success
3,302,217 UART: [afmc] ++
3,302,385 UART: [afmc] CDI.KEYID = 6
3,302,748 UART: [afmc] SUBJECT.KEYID = 7
3,303,174 UART: [afmc] AUTHORITY.KEYID = 5
3,338,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,355,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,355,977 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,361,687 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,367,577 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,373,288 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,381,100 UART: [afmc] --
3,382,192 UART: [cold-reset] --
3,383,140 UART: [state] Locking Datavault
3,384,203 UART: [state] Locking PCR0, PCR1 and PCR31
3,384,807 UART: [state] Locking ICCM
3,385,313 UART: [exit] Launching FMC @ 0x40000130
3,390,642 UART:
3,390,658 UART: Running Caliptra FMC ...
3,391,066 UART:
3,391,209 UART: [state] CFI Enabled
3,401,657 UART: [fht] FMC Alias Private Key: 7
3,509,147 UART: [art] Extend RT PCRs Done
3,509,575 UART: [art] Lock RT PCRs Done
3,511,337 UART: [art] Populate DV Done
3,519,681 UART: [fht] FMC Alias Private Key: 7
3,520,845 UART: [art] Derive CDI
3,521,125 UART: [art] Store in in slot 0x4
3,606,870 UART: [art] Derive Key Pair
3,607,230 UART: [art] Store priv key in slot 0x5
3,620,494 UART: [art] Derive Key Pair - Done
3,635,205 UART: [art] Signing Cert with AUTHO
3,635,685 UART: RITY.KEYID = 7
3,651,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,651,864 UART: [art] PUB.X = 1362A8F34F04616493114AE6BDA06F0A8C1E0016BA48F9A460A13A708B3B758101021D03474B32FE475285EDF5E9C1B5
3,658,595 UART: [art] PUB.Y = C1C173E913CE324BD6E91291598AF6F1666FE9FB369E01AC304D8E398E74DC6D547E776C16C0EBEA51346ED1E673A3C4
3,665,552 UART: [art] SIG.R = 2D6AD1B004D30A29B1C59E00F8519A9A88EBF88A9F915CD00CC7F425CED481233BCE0B7F82E27133368223BC8CE508B8
3,672,295 UART: [art] SIG.S = 231A42798B2F58ED9DA7EA0337CEDC54969B38C99CE70A2583AF4426EA8240FFECCD4D58B4904E4C688E497737A73EE9
3,696,296 UART: Caliptra RT
3,696,641 UART: [state] CFI Enabled
3,804,204 UART: [rt] RT listening for mailbox commands...
3,804,874 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,928,002 UART: [rt]cmd =0x41544d4e, len=14344
4,884,796 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,051 ready_for_fw is high
1,056,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,185,536 >>> mbox cmd response: success
3,247,299 UART:
3,247,315 UART: Running Caliptra FMC ...
3,247,723 UART:
3,247,866 UART: [state] CFI Enabled
3,258,362 UART: [fht] FMC Alias Private Key: 7
3,366,564 UART: [art] Extend RT PCRs Done
3,366,992 UART: [art] Lock RT PCRs Done
3,368,450 UART: [art] Populate DV Done
3,376,774 UART: [fht] FMC Alias Private Key: 7
3,377,768 UART: [art] Derive CDI
3,378,048 UART: [art] Store in in slot 0x4
3,463,553 UART: [art] Derive Key Pair
3,463,913 UART: [art] Store priv key in slot 0x5
3,477,105 UART: [art] Derive Key Pair - Done
3,492,098 UART: [art] Signing Cert with AUTHO
3,492,578 UART: RITY.KEYID = 7
3,508,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,508,797 UART: [art] PUB.X = CF6B2D29A50C535D7C2D23B4B18F09EE9BD56AA0CF31D1DA94D77A77A02396F02384097D9BC772230CFDB790B42E4745
3,515,565 UART: [art] PUB.Y = 75521F373DA69D652EB2EF4092A90596E135F09EF1C1F351A8173A1C6247DFE058ECBCDCD211EAEFB86688610DE766E0
3,522,519 UART: [art] SIG.R = EA963A7DB3E50D3CB16E84D66CEE51CC60592BE65774909E06168CD8F60D2261FBDB4A59A83D58149595BF50A9434BC5
3,529,288 UART: [art] SIG.S = 4934BBDD0DA5A9F3C395B2CEFC9C3CEAA051EE2BC13D507B8566615CD502BB7B055F756C410F1F61A0936A3A4036B884
3,553,207 UART: Caliptra RT
3,553,552 UART: [state] CFI Enabled
3,661,602 UART: [rt] RT listening for mailbox commands...
3,662,272 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,438 UART: [rt]cmd =0x41544d4e, len=14344
4,735,647 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
191,922 UART:
192,298 UART: Running Caliptra ROM ...
193,455 UART:
193,605 UART: [state] CFI Enabled
263,744 UART: [state] LifecycleState = Unprovisioned
265,672 UART: [state] DebugLocked = No
268,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,148 UART: [kat] SHA2-256
442,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,381 UART: [kat] ++
453,909 UART: [kat] sha1
465,078 UART: [kat] SHA2-256
467,812 UART: [kat] SHA2-384
473,302 UART: [kat] SHA2-512-ACC
475,669 UART: [kat] ECC-384
2,769,198 UART: [kat] HMAC-384Kdf
2,799,541 UART: [kat] LMS
3,989,907 UART: [kat] --
3,994,778 UART: [cold-reset] ++
3,995,927 UART: [fht] Storing FHT @ 0x50003400
4,008,563 UART: [idev] ++
4,009,142 UART: [idev] CDI.KEYID = 6
4,010,028 UART: [idev] SUBJECT.KEYID = 7
4,011,258 UART: [idev] UDS.KEYID = 0
4,012,337 ready_for_fw is high
4,012,572 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,025 UART: [idev] Erasing UDS.KEYID = 0
7,345,253 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,238 UART: [idev] --
7,369,306 UART: [ldev] ++
7,369,927 UART: [ldev] CDI.KEYID = 6
7,371,015 UART: [ldev] SUBJECT.KEYID = 5
7,372,144 UART: [ldev] AUTHORITY.KEYID = 7
7,373,277 UART: [ldev] FE.KEYID = 1
7,399,593 UART: [ldev] Erasing FE.KEYID = 1
10,733,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,903 UART: [ldev] --
13,092,525 UART: [fwproc] Waiting for Commands...
13,095,750 UART: [fwproc] Received command 0x46574c44
13,097,933 UART: [fwproc] Received Image of size 114124 bytes
22,056,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,143,083 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,211,939 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,528,929 >>> mbox cmd response: success
22,532,641 UART: [afmc] ++
22,533,239 UART: [afmc] CDI.KEYID = 6
22,534,154 UART: [afmc] SUBJECT.KEYID = 7
22,535,374 UART: [afmc] AUTHORITY.KEYID = 5
25,911,787 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,209,092 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,211,399 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,225,922 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,240,666 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,254,943 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,275,161 UART: [afmc] --
28,278,711 UART: [cold-reset] --
28,281,601 UART: [state] Locking Datavault
28,287,826 UART: [state] Locking PCR0, PCR1 and PCR31
28,289,577 UART: [state] Locking ICCM
28,291,136 UART: [exit] Launching FMC @ 0x40000130
28,299,542 UART:
28,299,783 UART: Running Caliptra FMC ...
28,300,888 UART:
28,301,053 UART: [state] CFI Enabled
28,370,324 UART: [fht] FMC Alias Private Key: 7
30,709,164 UART: [art] Extend RT PCRs Done
30,710,381 UART: [art] Lock RT PCRs Done
30,712,056 UART: [art] Populate DV Done
30,717,738 UART: [fht] FMC Alias Private Key: 7
30,719,442 UART: [art] Derive CDI
30,720,253 UART: [art] Store in in slot 0x4
30,779,019 UART: [art] Derive Key Pair
30,780,056 UART: [art] Store priv key in slot 0x5
34,073,615 UART: [art] Derive Key Pair - Done
34,086,787 UART: [art] Signing Cert with AUTHO
34,088,103 UART: RITY.KEYID = 7
36,375,136 UART: [art] Erasing AUTHORITY.KEYID = 7
36,376,644 UART: [art] PUB.X = AFE8DB6E3952558DEBAC3DD1E690BC74A7AA086C6957D2FC55CE14A7CDF9691AD94A0190612208D25069E6DB91921C7A
36,383,895 UART: [art] PUB.Y = 55EAFBA055691FBC976B308EFB519BC43B17F008E307AD7BCC44B15C4DA99969EE589C19451FABDD55665635901B4D44
36,391,130 UART: [art] SIG.R = EE44F1BFEB1E0F9BD0A555E21BD55050BA347A4A85AF1BCC0128F73E5842BD8AE1C9908EEEBE86FE4E9ADE9CC0387516
36,398,541 UART: [art] SIG.S = 53FFD768B73A838A3B5F74D89EF3885673702CC6FA34A7A957F86364A87CFC7FB14F0816B695342EB6552266A415C070
37,703,643 UART: Caliptra RT
37,704,348 UART: [state] CFI Enabled
37,864,374 UART: [rt] RT listening for mailbox commands...
37,867,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,022,592 UART: [rt]cmd =0x41544d4e, len=14344
38,024,297 >>> mbox cmd response: failed
38,025,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,180,245 UART: [rt]cmd =0x41544d4e, len=14344
38,182,170 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,804,002 ready_for_fw is high
3,804,386 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,282,013 >>> mbox cmd response: success
27,960,570 UART:
27,960,950 UART: Running Caliptra FMC ...
27,962,093 UART:
27,962,257 UART: [state] CFI Enabled
28,033,331 UART: [fht] FMC Alias Private Key: 7
30,371,481 UART: [art] Extend RT PCRs Done
30,372,708 UART: [art] Lock RT PCRs Done
30,374,636 UART: [art] Populate DV Done
30,380,161 UART: [fht] FMC Alias Private Key: 7
30,381,869 UART: [art] Derive CDI
30,382,610 UART: [art] Store in in slot 0x4
30,441,711 UART: [art] Derive Key Pair
30,442,743 UART: [art] Store priv key in slot 0x5
33,736,622 UART: [art] Derive Key Pair - Done
33,749,479 UART: [art] Signing Cert with AUTHO
33,750,834 UART: RITY.KEYID = 7
36,038,805 UART: [art] Erasing AUTHORITY.KEYID = 7
36,040,319 UART: [art] PUB.X = 07ED6D2CD7D26B842E92331451A3F814A162EE6C2035304E2EC3378D6BB2D12EDF847706D99D25BC93F2CF1D70EF8A3D
36,047,556 UART: [art] PUB.Y = C9F885C6F578FEE9EB02C1CEAF5AD948AE72E817CE8157B85B9E9B02D89B8F6F1E8E64EC23665A6559C3D3F97FD161F7
36,054,822 UART: [art] SIG.R = D242D826CFF9280F040CB140075F640B701DA07430E882FEEAD9FF02D83F45FC9ACBA31C950AB82B75550AD570AD705F
36,062,194 UART: [art] SIG.S = 9B5C94FF2F39B762055D1FA86E7EBE416F88FBC7AD7163D44BA5CC856748738F9F8D6E060F4207438D69C72254934934
37,367,017 UART: Caliptra RT
37,367,730 UART: [state] CFI Enabled
37,528,684 UART: [rt] RT listening for mailbox commands...
37,531,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,686,479 UART: [rt]cmd =0x41544d4e, len=14344
37,688,187 >>> mbox cmd response: failed
37,688,934 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,844,327 UART: [rt]cmd =0x41544d4e, len=14344
37,846,300 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,524 UART:
192,882 UART: Running Caliptra ROM ...
194,079 UART:
603,907 UART: [state] CFI Enabled
616,574 UART: [state] LifecycleState = Unprovisioned
618,444 UART: [state] DebugLocked = No
620,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,318 UART: [kat] SHA2-256
795,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,596 UART: [kat] ++
806,194 UART: [kat] sha1
817,066 UART: [kat] SHA2-256
819,781 UART: [kat] SHA2-384
825,617 UART: [kat] SHA2-512-ACC
828,009 UART: [kat] ECC-384
3,112,724 UART: [kat] HMAC-384Kdf
3,124,752 UART: [kat] LMS
4,314,857 UART: [kat] --
4,317,507 UART: [cold-reset] ++
4,320,000 UART: [fht] Storing FHT @ 0x50003400
4,331,572 UART: [idev] ++
4,332,146 UART: [idev] CDI.KEYID = 6
4,333,093 UART: [idev] SUBJECT.KEYID = 7
4,334,338 UART: [idev] UDS.KEYID = 0
4,335,321 ready_for_fw is high
4,335,503 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,860 UART: [idev] Erasing UDS.KEYID = 0
7,622,403 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,588 UART: [idev] --
7,648,310 UART: [ldev] ++
7,648,947 UART: [ldev] CDI.KEYID = 6
7,649,852 UART: [ldev] SUBJECT.KEYID = 5
7,651,060 UART: [ldev] AUTHORITY.KEYID = 7
7,652,339 UART: [ldev] FE.KEYID = 1
7,664,816 UART: [ldev] Erasing FE.KEYID = 1
10,950,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,819 UART: [ldev] --
13,311,695 UART: [fwproc] Waiting for Commands...
13,314,049 UART: [fwproc] Received command 0x46574c44
13,316,279 UART: [fwproc] Received Image of size 114124 bytes
22,191,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,269,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,338,025 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,654,898 >>> mbox cmd response: success
22,658,375 UART: [afmc] ++
22,658,976 UART: [afmc] CDI.KEYID = 6
22,659,944 UART: [afmc] SUBJECT.KEYID = 7
22,661,152 UART: [afmc] AUTHORITY.KEYID = 5
25,972,638 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,264,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,266,723 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,281,240 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,296,002 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,310,276 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,331,805 UART: [afmc] --
28,335,122 UART: [cold-reset] --
28,338,872 UART: [state] Locking Datavault
28,344,278 UART: [state] Locking PCR0, PCR1 and PCR31
28,346,050 UART: [state] Locking ICCM
28,347,120 UART: [exit] Launching FMC @ 0x40000130
28,355,518 UART:
28,355,749 UART: Running Caliptra FMC ...
28,356,846 UART:
28,357,001 UART: [state] CFI Enabled
28,365,263 UART: [fht] FMC Alias Private Key: 7
30,695,508 UART: [art] Extend RT PCRs Done
30,696,717 UART: [art] Lock RT PCRs Done
30,698,252 UART: [art] Populate DV Done
30,703,817 UART: [fht] FMC Alias Private Key: 7
30,705,838 UART: [art] Derive CDI
30,706,580 UART: [art] Store in in slot 0x4
30,748,820 UART: [art] Derive Key Pair
30,749,817 UART: [art] Store priv key in slot 0x5
33,991,180 UART: [art] Derive Key Pair - Done
34,004,031 UART: [art] Signing Cert with AUTHO
34,005,345 UART: RITY.KEYID = 7
36,284,800 UART: [art] Erasing AUTHORITY.KEYID = 7
36,286,302 UART: [art] PUB.X = 20A719FAE945CAB4B313834AD8CB9F7AB7D8BF3F05AAED6AFC0305D5D52EF89941551F72E581CE625CC7A27A4F6B9A4A
36,293,591 UART: [art] PUB.Y = E445B13FC695AB6D810F7411CA94A4B5D6AA015E118956F8D52B7AF411CA095FA5454BD07BE98ED3CB550BED526DEBBF
36,300,862 UART: [art] SIG.R = B6BE10D36502C9955F8BF0772E6D1314BD6C1B0D59215CE6E8BBAA6255D8FDE2C9BF134170ED88D58161B6122A619B84
36,308,270 UART: [art] SIG.S = C07E92C4D25D7096FBE73BA50AAEC8138A95CB4526ABEF108D3B0CFFDBFEC3EFC558E78969360F757C5F878D873B42E2
37,613,558 UART: Caliptra RT
37,614,277 UART: [state] CFI Enabled
37,732,414 UART: [rt] RT listening for mailbox commands...
37,735,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,890,816 UART: [rt]cmd =0x41544d4e, len=14344
37,892,786 >>> mbox cmd response: failed
37,893,512 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,048,943 UART: [rt]cmd =0x41544d4e, len=14344
38,050,754 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
4,133,743 ready_for_fw is high
4,134,193 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,399,692 >>> mbox cmd response: success
28,044,650 UART:
28,045,062 UART: Running Caliptra FMC ...
28,046,155 UART:
28,046,310 UART: [state] CFI Enabled
28,054,313 UART: [fht] FMC Alias Private Key: 7
30,385,107 UART: [art] Extend RT PCRs Done
30,386,347 UART: [art] Lock RT PCRs Done
30,387,920 UART: [art] Populate DV Done
30,393,197 UART: [fht] FMC Alias Private Key: 7
30,394,689 UART: [art] Derive CDI
30,395,445 UART: [art] Store in in slot 0x4
30,437,606 UART: [art] Derive Key Pair
30,438,651 UART: [art] Store priv key in slot 0x5
33,680,569 UART: [art] Derive Key Pair - Done
33,693,941 UART: [art] Signing Cert with AUTHO
33,695,248 UART: RITY.KEYID = 7
35,974,803 UART: [art] Erasing AUTHORITY.KEYID = 7
35,976,312 UART: [art] PUB.X = 2E78B46DD9DF8D84FAA9FBBB8A61F4935D1A6CCCDCB7CA36554AAFCBD523148CF3F79E60E2BA1C864FA8E449936BEDFD
35,983,585 UART: [art] PUB.Y = 523EF28EF50147B4059E02080160B406FAED45C7610427996F4856CA59CAF9CA050771A970B97C4F5B9779330B45CDF1
35,990,849 UART: [art] SIG.R = F0843923E245EC6C17C72492191A70B904000280803A5080E0076FF8E4639B6AB5B9590B97EE64A3ED41FB904DAC871B
35,998,170 UART: [art] SIG.S = 3984DD582D975E1AC5090F525C88C5C143EDB8CFA37DBEA83FEEF8CF5EC4E5C79A952C448D500DB8FE71558D73E1E806
37,303,120 UART: Caliptra RT
37,303,832 UART: [state] CFI Enabled
37,421,750 UART: [rt] RT listening for mailbox commands...
37,424,344 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,579,744 UART: [rt]cmd =0x41544d4e, len=14344
37,581,553 >>> mbox cmd response: failed
37,582,271 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,737,468 UART: [rt]cmd =0x41544d4e, len=14344
37,739,155 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,056 UART:
192,437 UART: Running Caliptra ROM ...
193,631 UART:
193,790 UART: [state] CFI Enabled
264,000 UART: [state] LifecycleState = Unprovisioned
265,848 UART: [state] DebugLocked = No
267,946 UART: [state] WD Timer not started. Device not locked for debugging
271,124 UART: [kat] SHA2-256
450,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,841 UART: [kat] ++
462,382 UART: [kat] sha1
473,836 UART: [kat] SHA2-256
476,908 UART: [kat] SHA2-384
482,398 UART: [kat] SHA2-512-ACC
485,330 UART: [kat] ECC-384
2,949,023 UART: [kat] HMAC-384Kdf
2,972,275 UART: [kat] LMS
3,501,723 UART: [kat] --
3,507,732 UART: [cold-reset] ++
3,510,016 UART: [fht] FHT @ 0x50003400
3,520,427 UART: [idev] ++
3,521,000 UART: [idev] CDI.KEYID = 6
3,521,914 UART: [idev] SUBJECT.KEYID = 7
3,523,159 UART: [idev] UDS.KEYID = 0
3,524,086 ready_for_fw is high
3,524,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,213 UART: [idev] Erasing UDS.KEYID = 0
6,028,907 UART: [idev] Sha1 KeyId Algorithm
6,051,068 UART: [idev] --
6,053,533 UART: [ldev] ++
6,054,115 UART: [ldev] CDI.KEYID = 6
6,055,054 UART: [ldev] SUBJECT.KEYID = 5
6,056,224 UART: [ldev] AUTHORITY.KEYID = 7
6,057,455 UART: [ldev] FE.KEYID = 1
6,098,777 UART: [ldev] Erasing FE.KEYID = 1
8,602,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,787 UART: [ldev] --
10,411,590 UART: [fwproc] Wait for Commands...
10,414,440 UART: [fwproc] Recv command 0x46574c44
10,416,530 UART: [fwproc] Recv'd Img size: 114448 bytes
15,010,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,090,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,158,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,476,437 >>> mbox cmd response: success
15,481,224 UART: [afmc] ++
15,481,823 UART: [afmc] CDI.KEYID = 6
15,482,711 UART: [afmc] SUBJECT.KEYID = 7
15,484,141 UART: [afmc] AUTHORITY.KEYID = 5
18,025,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,748,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,749,931 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,765,932 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,781,875 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,797,647 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,820,568 UART: [afmc] --
19,823,849 UART: [cold-reset] --
19,828,252 UART: [state] Locking Datavault
19,832,956 UART: [state] Locking PCR0, PCR1 and PCR31
19,834,656 UART: [state] Locking ICCM
19,836,554 UART: [exit] Launching FMC @ 0x40000130
19,845,006 UART:
19,845,246 UART: Running Caliptra FMC ...
19,846,345 UART:
19,846,509 UART: [state] CFI Enabled
19,907,528 UART: [fht] FMC Alias Private Key: 7
21,671,227 UART: [art] Extend RT PCRs Done
21,672,448 UART: [art] Lock RT PCRs Done
21,673,640 UART: [art] Populate DV Done
21,679,156 UART: [fht] FMC Alias Private Key: 7
21,680,752 UART: [art] Derive CDI
21,681,568 UART: [art] Store in in slot 0x4
21,739,470 UART: [art] Derive Key Pair
21,740,511 UART: [art] Store priv key in slot 0x5
24,203,276 UART: [art] Derive Key Pair - Done
24,216,277 UART: [art] Signing Cert with AUTHO
24,217,606 UART: RITY.KEYID = 7
25,929,705 UART: [art] Erasing AUTHORITY.KEYID = 7
25,931,196 UART: [art] PUB.X = A70063602F1B7B7118743D91052177D7163A8EB4E6637A0F75E96A3FD080EC3D25630106BACCA8BC4AD7C2311099055F
25,938,448 UART: [art] PUB.Y = B0BABC4F0752BA768D12EAC8C82CCFC00F666F1CC2E3E6832EC97829784F67FC7E2D9951FAD68739B76ADE8F1268EEB3
25,945,737 UART: [art] SIG.R = 046F786F5BE35B90C15C496C61B3DBF6A69AD9981C215CBFC3187F96AD7A5DDC96503103FD55DB3648DA68F98091E451
25,953,134 UART: [art] SIG.S = 1AF62CE628752A430B12FCC34165DAD14B55AF1C0FB0DBEC5F7D57047DB3154A1C0C714BF98B26F6C29BDA2B29AD8236
26,932,277 UART: Caliptra RT
26,933,000 UART: [state] CFI Enabled
27,096,135 UART: [rt] RT listening for mailbox commands...
27,098,880 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,254,759 UART: [rt]cmd =0x41544d4e, len=14344
27,256,303 >>> mbox cmd response: failed
27,257,141 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,412,464 UART: [rt]cmd =0x41544d4e, len=14344
27,414,119 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,383,542 ready_for_fw is high
3,383,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,055,060 >>> mbox cmd response: success
19,348,330 UART:
19,348,729 UART: Running Caliptra FMC ...
19,349,870 UART:
19,350,032 UART: [state] CFI Enabled
19,415,491 UART: [fht] FMC Alias Private Key: 7
21,179,850 UART: [art] Extend RT PCRs Done
21,181,064 UART: [art] Lock RT PCRs Done
21,182,752 UART: [art] Populate DV Done
21,188,214 UART: [fht] FMC Alias Private Key: 7
21,189,780 UART: [art] Derive CDI
21,190,603 UART: [art] Store in in slot 0x4
21,248,730 UART: [art] Derive Key Pair
21,249,766 UART: [art] Store priv key in slot 0x5
23,712,614 UART: [art] Derive Key Pair - Done
23,725,500 UART: [art] Signing Cert with AUTHO
23,726,832 UART: RITY.KEYID = 7
25,438,544 UART: [art] Erasing AUTHORITY.KEYID = 7
25,440,041 UART: [art] PUB.X = B0191E5AC7F7F3047F1846F994E8908454FB7002CC9DFAE17B8CCFC2D0EB46AAFEA976674280CB40A36C9F1CBDA01678
25,447,345 UART: [art] PUB.Y = 52C9EB846BCDE4B898093B4852F4BBB2FC200DE8DCE95D7EF91E2500C133DCBBD8A17B9F6841FCA5374585C784AD333B
25,454,590 UART: [art] SIG.R = 55CA271AE8B452335188BB1386AE8AE2D404F691E5F295773E92FA67A40783B1495771D10B1417D6724A536AF53C22C8
25,461,981 UART: [art] SIG.S = 32BCC69BBDC0F0F966D43ACF3128F30D2D7C4D9B31BD5E7EDE63861DAE2192A5CB746455BEA967FC1E6AF78706AF0341
26,440,753 UART: Caliptra RT
26,441,440 UART: [state] CFI Enabled
26,606,015 UART: [rt] RT listening for mailbox commands...
26,608,933 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,764,894 UART: [rt]cmd =0x41544d4e, len=14344
26,766,880 >>> mbox cmd response: failed
26,767,901 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,922,955 UART: [rt]cmd =0x41544d4e, len=14344
26,924,768 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,205 UART:
192,589 UART: Running Caliptra ROM ...
193,701 UART:
603,403 UART: [state] CFI Enabled
617,201 UART: [state] LifecycleState = Unprovisioned
619,081 UART: [state] DebugLocked = No
621,094 UART: [state] WD Timer not started. Device not locked for debugging
624,904 UART: [kat] SHA2-256
804,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,655 UART: [kat] ++
816,180 UART: [kat] sha1
828,613 UART: [kat] SHA2-256
831,616 UART: [kat] SHA2-384
837,810 UART: [kat] SHA2-512-ACC
840,805 UART: [kat] ECC-384
3,280,376 UART: [kat] HMAC-384Kdf
3,292,695 UART: [kat] LMS
3,822,200 UART: [kat] --
3,827,556 UART: [cold-reset] ++
3,828,558 UART: [fht] FHT @ 0x50003400
3,838,604 UART: [idev] ++
3,839,157 UART: [idev] CDI.KEYID = 6
3,840,175 UART: [idev] SUBJECT.KEYID = 7
3,841,302 UART: [idev] UDS.KEYID = 0
3,842,257 ready_for_fw is high
3,842,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,168 UART: [idev] Erasing UDS.KEYID = 0
6,311,315 UART: [idev] Sha1 KeyId Algorithm
6,334,266 UART: [idev] --
6,338,185 UART: [ldev] ++
6,338,753 UART: [ldev] CDI.KEYID = 6
6,339,659 UART: [ldev] SUBJECT.KEYID = 5
6,340,859 UART: [ldev] AUTHORITY.KEYID = 7
6,342,082 UART: [ldev] FE.KEYID = 1
6,353,205 UART: [ldev] Erasing FE.KEYID = 1
8,828,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,339 UART: [ldev] --
10,618,756 UART: [fwproc] Wait for Commands...
10,621,332 UART: [fwproc] Recv command 0x46574c44
10,623,359 UART: [fwproc] Recv'd Img size: 114448 bytes
15,191,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,263,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,332,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,650,667 >>> mbox cmd response: success
15,655,586 UART: [afmc] ++
15,656,187 UART: [afmc] CDI.KEYID = 6
15,657,114 UART: [afmc] SUBJECT.KEYID = 7
15,658,274 UART: [afmc] AUTHORITY.KEYID = 5
18,157,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,879,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,881,440 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,897,359 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,913,373 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,929,173 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,952,472 UART: [afmc] --
19,955,800 UART: [cold-reset] --
19,959,333 UART: [state] Locking Datavault
19,964,192 UART: [state] Locking PCR0, PCR1 and PCR31
19,965,826 UART: [state] Locking ICCM
19,966,971 UART: [exit] Launching FMC @ 0x40000130
19,975,413 UART:
19,975,642 UART: Running Caliptra FMC ...
19,976,680 UART:
19,976,821 UART: [state] CFI Enabled
19,985,023 UART: [fht] FMC Alias Private Key: 7
21,741,685 UART: [art] Extend RT PCRs Done
21,742,904 UART: [art] Lock RT PCRs Done
21,744,801 UART: [art] Populate DV Done
21,750,309 UART: [fht] FMC Alias Private Key: 7
21,751,836 UART: [art] Derive CDI
21,752,640 UART: [art] Store in in slot 0x4
21,795,391 UART: [art] Derive Key Pair
21,796,427 UART: [art] Store priv key in slot 0x5
24,222,746 UART: [art] Derive Key Pair - Done
24,235,895 UART: [art] Signing Cert with AUTHO
24,237,236 UART: RITY.KEYID = 7
25,942,920 UART: [art] Erasing AUTHORITY.KEYID = 7
25,944,432 UART: [art] PUB.X = 0F631B3BB3C36D76D770DF22CD8794C6DC2F0EB86F85F995A622B4698E08FF91C02FA738CEC5E0B06659E232FC045A04
25,951,722 UART: [art] PUB.Y = 8CB1D01F5012EAC0B0F2F3EBE73FEC0C0DA88B9453B7B37CEC66F2F01C5BCD2FEDA0FB521CC3BB1CB7C295A088D31991
25,958,996 UART: [art] SIG.R = 1540B083D7B28D845A468647068408D4F7E967CF1F80F44D6F3A7E3CC2DBC4FC2749CD960301468D4A475CD271F4EBF8
25,966,375 UART: [art] SIG.S = 376EE490B23A074ECDB8AC2AE26AB5E12D701D3396804AF9ED38B21FDBD19479C1A580AC7C3EA1023CC0268DDE58D344
26,944,741 UART: Caliptra RT
26,945,427 UART: [state] CFI Enabled
27,062,954 UART: [rt] RT listening for mailbox commands...
27,065,672 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,221,018 UART: [rt]cmd =0x41544d4e, len=14344
27,223,106 >>> mbox cmd response: failed
27,224,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,379,322 UART: [rt]cmd =0x41544d4e, len=14344
27,381,351 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,698,692 ready_for_fw is high
3,699,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,232,478 >>> mbox cmd response: success
19,477,268 UART:
19,477,674 UART: Running Caliptra FMC ...
19,478,813 UART:
19,478,972 UART: [state] CFI Enabled
19,486,856 UART: [fht] FMC Alias Private Key: 7
21,243,234 UART: [art] Extend RT PCRs Done
21,244,459 UART: [art] Lock RT PCRs Done
21,245,940 UART: [art] Populate DV Done
21,251,457 UART: [fht] FMC Alias Private Key: 7
21,253,154 UART: [art] Derive CDI
21,253,964 UART: [art] Store in in slot 0x4
21,296,498 UART: [art] Derive Key Pair
21,297,514 UART: [art] Store priv key in slot 0x5
23,724,441 UART: [art] Derive Key Pair - Done
23,737,322 UART: [art] Signing Cert with AUTHO
23,738,659 UART: RITY.KEYID = 7
25,444,192 UART: [art] Erasing AUTHORITY.KEYID = 7
25,445,705 UART: [art] PUB.X = 29311FA49FD01D46B2E0313B6726C6A5ACF4CEDF18A5D9077698CE2FE69359A63C7454A91F79D06CFC86FBDBD13AB599
25,453,030 UART: [art] PUB.Y = 5EFBB489A07A69C529B63A2819E3A72ECBC3AC960A6F2A168B56D64880B48E18C1385F3D2FF7E67752DCF03EE54034B1
25,460,279 UART: [art] SIG.R = D51413860BD501093E0D6DD21A4795FFCC7A52074743FEF0E0997A1B2DEC7C67C7C6C98E6261427DD54B4DE1F7B54A4F
25,467,662 UART: [art] SIG.S = 504892F846E9CE54EA27E63197D2CDC996AD20FC4B516B34C97FEAF4FB9FF76D8E767F6F98B15506C309A723D8B0330F
26,446,716 UART: Caliptra RT
26,447,407 UART: [state] CFI Enabled
26,566,177 UART: [rt] RT listening for mailbox commands...
26,569,168 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,724,445 UART: [rt]cmd =0x41544d4e, len=14344
26,726,249 >>> mbox cmd response: failed
26,726,987 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,882,243 UART: [rt]cmd =0x41544d4e, len=14344
26,883,948 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,436,501 ready_for_fw is high
3,437,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,819,338 >>> mbox cmd response: success
20,113,071 UART:
20,113,474 UART: Running Caliptra FMC ...
20,114,584 UART:
20,114,736 UART: [state] CFI Enabled
20,180,583 UART: [fht] FMC Alias Private Key: 7
21,944,404 UART: [art] Extend RT PCRs Done
21,945,633 UART: [art] Lock RT PCRs Done
21,947,287 UART: [art] Populate DV Done
21,952,753 UART: [fht] FMC Alias Private Key: 7
21,954,346 UART: [art] Derive CDI
21,955,162 UART: [art] Store in in slot 0x4
22,014,632 UART: [art] Derive Key Pair
22,015,632 UART: [art] Store priv key in slot 0x5
24,478,564 UART: [art] Derive Key Pair - Done
24,491,449 UART: [art] Signing Cert with AUTHO
24,492,756 UART: RITY.KEYID = 7
26,203,878 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,378 UART: [art] PUB.X = 7098762939020060C3BC50A0DBB4853552116D2C97D947763DEA433B0B71AFDA8520B3EB2AA843C410A3373787033676
26,212,619 UART: [art] PUB.Y = 63F48D909367A26AD6FF191A622F7F65E363C1AFAD0969210DF4A0802628BEC3E59AE7BCE608CC5445B0D905955A6165
26,219,865 UART: [art] SIG.R = DCE03A0DBBE89286AC0DFB3475B5DB4F26CE12830E8A3AB71F764A671F588C993EF683EBD228682F1BE96E30AC21F33D
26,227,317 UART: [art] SIG.S = 1FF527CC2A2BD1889C11FC64C982DDB72A669F9005DD82489F73DD5B578A915520CCC17FED3CEB02112ABF300C97DC9A
27,206,418 UART: Caliptra RT
27,207,128 UART: [state] CFI Enabled
27,370,819 UART: [rt] RT listening for mailbox commands...
27,373,669 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,529,615 UART: [rt]cmd =0x41544d4e, len=14344
27,531,650 >>> mbox cmd response: failed
27,532,380 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,687,746 UART: [rt]cmd =0x41544d4e, len=14344
27,689,665 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,749,094 ready_for_fw is high
3,749,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,059,037 >>> mbox cmd response: success
20,317,579 UART:
20,317,975 UART: Running Caliptra FMC ...
20,319,297 UART:
20,319,468 UART: [state] CFI Enabled
20,327,257 UART: [fht] FMC Alias Private Key: 7
22,083,753 UART: [art] Extend RT PCRs Done
22,084,984 UART: [art] Lock RT PCRs Done
22,086,528 UART: [art] Populate DV Done
22,092,002 UART: [fht] FMC Alias Private Key: 7
22,093,603 UART: [art] Derive CDI
22,094,417 UART: [art] Store in in slot 0x4
22,136,858 UART: [art] Derive Key Pair
22,137,897 UART: [art] Store priv key in slot 0x5
24,564,234 UART: [art] Derive Key Pair - Done
24,577,073 UART: [art] Signing Cert with AUTHO
24,578,370 UART: RITY.KEYID = 7
26,283,727 UART: [art] Erasing AUTHORITY.KEYID = 7
26,285,219 UART: [art] PUB.X = ADA09AE1CD66D417832A7B60671C1C5EAADBBE92D63850930694ABD6B91DEAA456FAA0A7F9AA18241D26594D86DDACB0
26,292,499 UART: [art] PUB.Y = 078ED5491713047462EC0A5B5A3DC8935EBE7F4845B7B70FB384E334328054E033E4940CD95BD05659BDDB1144707255
26,299,721 UART: [art] SIG.R = 5442A79A4A36A05752F8E2B31F9EF35C8753CD249AC75D88A7FD5E0AB3E259D94644E755A67148B4D120740E9F6E5D09
26,307,111 UART: [art] SIG.S = 67FAEEB6EF6E71780CEEBC926BFCDE09701F30B3972814F13B54F900AC80CD8F0A68E2AF4F9FEC417736F1E8A75C1DFF
27,286,456 UART: Caliptra RT
27,287,166 UART: [state] CFI Enabled
27,404,400 UART: [rt] RT listening for mailbox commands...
27,407,069 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,562,358 UART: [rt]cmd =0x41544d4e, len=14344
27,564,122 >>> mbox cmd response: failed
27,564,906 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,720,452 UART: [rt]cmd =0x41544d4e, len=14344
27,722,319 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
85,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,611 UART: [kat] SHA2-256
881,542 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,657 UART: [kat] ++
885,809 UART: [kat] sha1
890,077 UART: [kat] SHA2-256
892,015 UART: [kat] SHA2-384
894,794 UART: [kat] SHA2-512-ACC
896,695 UART: [kat] ECC-384
902,100 UART: [kat] HMAC-384Kdf
906,744 UART: [kat] LMS
1,474,940 UART: [kat] --
1,475,469 UART: [cold-reset] ++
1,475,931 UART: [fht] Storing FHT @ 0x50003400
1,478,628 UART: [idev] ++
1,478,796 UART: [idev] CDI.KEYID = 6
1,479,156 UART: [idev] SUBJECT.KEYID = 7
1,479,580 UART: [idev] UDS.KEYID = 0
1,479,925 ready_for_fw is high
1,479,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,436 UART: [idev] Erasing UDS.KEYID = 0
1,503,696 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,264 UART: [idev] --
1,513,379 UART: [ldev] ++
1,513,547 UART: [ldev] CDI.KEYID = 6
1,513,910 UART: [ldev] SUBJECT.KEYID = 5
1,514,336 UART: [ldev] AUTHORITY.KEYID = 7
1,514,799 UART: [ldev] FE.KEYID = 1
1,520,033 UART: [ldev] Erasing FE.KEYID = 1
1,545,512 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,426 UART: [ldev] --
1,584,745 UART: [fwproc] Waiting for Commands...
1,585,548 UART: [fwproc] Received command 0x46574c44
1,586,339 UART: [fwproc] Received Image of size 114448 bytes
5,045,651 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,074,357 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,103,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,239,652 >>> mbox cmd response: success
5,240,892 UART: [afmc] ++
5,241,060 UART: [afmc] CDI.KEYID = 6
5,241,422 UART: [afmc] SUBJECT.KEYID = 7
5,241,847 UART: [afmc] AUTHORITY.KEYID = 5
5,277,131 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,293,483 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,294,263 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,299,972 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,305,864 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,311,565 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,319,455 UART: [afmc] --
5,320,543 UART: [cold-reset] --
5,321,349 UART: [state] Locking Datavault
5,322,426 UART: [state] Locking PCR0, PCR1 and PCR31
5,323,030 UART: [state] Locking ICCM
5,323,678 UART: [exit] Launching FMC @ 0x40000130
5,329,007 UART:
5,329,023 UART: Running Caliptra FMC ...
5,329,431 UART:
5,329,485 UART: [state] CFI Enabled
5,339,963 UART: [fht] FMC Alias Private Key: 7
5,447,661 UART: [art] Extend RT PCRs Done
5,448,089 UART: [art] Lock RT PCRs Done
5,449,539 UART: [art] Populate DV Done
5,458,059 UART: [fht] FMC Alias Private Key: 7
5,459,061 UART: [art] Derive CDI
5,459,341 UART: [art] Store in in slot 0x4
5,544,882 UART: [art] Derive Key Pair
5,545,242 UART: [art] Store priv key in slot 0x5
5,558,434 UART: [art] Derive Key Pair - Done
5,573,126 UART: [art] Signing Cert with AUTHO
5,573,606 UART: RITY.KEYID = 7
5,588,818 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,583 UART: [art] PUB.X = DC522AB373034C2F09362F6E8AC7AC027089FB59D3176CA09D5DB37CF6DB210CDD5270CAF6538FE2DF33E94EA137CDBD
5,596,361 UART: [art] PUB.Y = 3B31460A96ED3BCBB11E3CACED3804F089F3480BF387A141EF9D6E06474B364048AE8C20CF2198B6A63C76595C02862D
5,603,302 UART: [art] SIG.R = F54A4C400E75B6AFA520B0149DCA742562ADA59194C5F04CF0744C200D736F848CB444E9A453DA78010D384D587AB793
5,610,062 UART: [art] SIG.S = 40C66BEF80FE338110DF1ADF4B91D2B98FC5987407D5C3066390A2EF01AB9789D1933261EF46B270A4BB9480F1B9A605
5,633,709 UART: Caliptra RT
5,633,962 UART: [state] CFI Enabled
5,742,103 UART: [rt] RT listening for mailbox commands...
5,742,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,865,839 UART: [rt]cmd =0x41544d4e, len=14344
5,867,393 >>> mbox cmd response: failed
5,867,393 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,990,079 UART: [rt]cmd =0x41544d4e, len=14344
5,991,431 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,809 ready_for_fw is high
1,362,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,203,593 >>> mbox cmd response: success
5,265,364 UART:
5,265,380 UART: Running Caliptra FMC ...
5,265,788 UART:
5,265,842 UART: [state] CFI Enabled
5,276,080 UART: [fht] FMC Alias Private Key: 7
5,383,154 UART: [art] Extend RT PCRs Done
5,383,582 UART: [art] Lock RT PCRs Done
5,385,360 UART: [art] Populate DV Done
5,393,248 UART: [fht] FMC Alias Private Key: 7
5,394,376 UART: [art] Derive CDI
5,394,656 UART: [art] Store in in slot 0x4
5,480,391 UART: [art] Derive Key Pair
5,480,751 UART: [art] Store priv key in slot 0x5
5,494,115 UART: [art] Derive Key Pair - Done
5,509,226 UART: [art] Signing Cert with AUTHO
5,509,706 UART: RITY.KEYID = 7
5,524,750 UART: [art] Erasing AUTHORITY.KEYID = 7
5,525,515 UART: [art] PUB.X = 1A179A274C70B4511C84CA4FEE1DB4A52C6BD4425D55348838399856A2C4F60D26CCB5703F3CD053E24706CD964F867B
5,532,281 UART: [art] PUB.Y = 18404406901B618F58725DBC28DCBF6E5CFB50C270E881E52D12BA595E0B89AD88CB4722B5D1FEB14EE07BCF1CDCE423
5,539,241 UART: [art] SIG.R = 78BCBCA943012148601A83EF60F99CA62E759746F19FD39AAB9B70776A3D3DE1898C10101FD0747F139302B898FBDE7A
5,546,009 UART: [art] SIG.S = EE2BDA8A36803B3298A163410C71F9A9C2AA5143C1EC6D0D7558B10A79AAFAF28C3A66DB3C436613A4D67592A0C1FB26
5,569,637 UART: Caliptra RT
5,569,890 UART: [state] CFI Enabled
5,678,057 UART: [rt] RT listening for mailbox commands...
5,678,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,801,775 UART: [rt]cmd =0x41544d4e, len=14344
5,803,435 >>> mbox cmd response: failed
5,803,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,926,231 UART: [rt]cmd =0x41544d4e, len=14344
5,927,569 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
87,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,612 UART: [kat] SHA2-256
882,543 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,658 UART: [kat] ++
886,810 UART: [kat] sha1
891,110 UART: [kat] SHA2-256
893,048 UART: [kat] SHA2-384
895,729 UART: [kat] SHA2-512-ACC
897,630 UART: [kat] ECC-384
903,555 UART: [kat] HMAC-384Kdf
908,181 UART: [kat] LMS
1,476,377 UART: [kat] --
1,477,286 UART: [cold-reset] ++
1,477,830 UART: [fht] Storing FHT @ 0x50003400
1,480,681 UART: [idev] ++
1,480,849 UART: [idev] CDI.KEYID = 6
1,481,209 UART: [idev] SUBJECT.KEYID = 7
1,481,633 UART: [idev] UDS.KEYID = 0
1,481,978 ready_for_fw is high
1,481,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,179 UART: [idev] Erasing UDS.KEYID = 0
1,506,083 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,639 UART: [idev] --
1,515,872 UART: [ldev] ++
1,516,040 UART: [ldev] CDI.KEYID = 6
1,516,403 UART: [ldev] SUBJECT.KEYID = 5
1,516,829 UART: [ldev] AUTHORITY.KEYID = 7
1,517,292 UART: [ldev] FE.KEYID = 1
1,522,744 UART: [ldev] Erasing FE.KEYID = 1
1,548,265 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,505 UART: [ldev] --
1,588,014 UART: [fwproc] Waiting for Commands...
1,588,871 UART: [fwproc] Received command 0x46574c44
1,589,662 UART: [fwproc] Received Image of size 114448 bytes
5,010,983 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,038,469 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,067,821 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,203,850 >>> mbox cmd response: success
5,205,082 UART: [afmc] ++
5,205,250 UART: [afmc] CDI.KEYID = 6
5,205,612 UART: [afmc] SUBJECT.KEYID = 7
5,206,037 UART: [afmc] AUTHORITY.KEYID = 5
5,241,237 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,257,689 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,258,469 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,264,178 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,270,070 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,275,771 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,283,655 UART: [afmc] --
5,284,759 UART: [cold-reset] --
5,285,571 UART: [state] Locking Datavault
5,286,684 UART: [state] Locking PCR0, PCR1 and PCR31
5,287,288 UART: [state] Locking ICCM
5,287,926 UART: [exit] Launching FMC @ 0x40000130
5,293,255 UART:
5,293,271 UART: Running Caliptra FMC ...
5,293,679 UART:
5,293,822 UART: [state] CFI Enabled
5,304,634 UART: [fht] FMC Alias Private Key: 7
5,412,282 UART: [art] Extend RT PCRs Done
5,412,710 UART: [art] Lock RT PCRs Done
5,414,196 UART: [art] Populate DV Done
5,422,616 UART: [fht] FMC Alias Private Key: 7
5,423,620 UART: [art] Derive CDI
5,423,900 UART: [art] Store in in slot 0x4
5,509,503 UART: [art] Derive Key Pair
5,509,863 UART: [art] Store priv key in slot 0x5
5,523,643 UART: [art] Derive Key Pair - Done
5,538,366 UART: [art] Signing Cert with AUTHO
5,538,846 UART: RITY.KEYID = 7
5,553,636 UART: [art] Erasing AUTHORITY.KEYID = 7
5,554,401 UART: [art] PUB.X = BEBFCCDA27C10C2112894FCC4E84DA3557983AD4748F1955799DE25D5ED8051DF928AAD37F599887120DA35DA6D3AAB6
5,561,176 UART: [art] PUB.Y = 60E529D305B97175354C789D905AD19A94006BE9E4499256D7518CF8D983265A7E1F3B840F0B689B3D2EB6F68FA4C122
5,568,091 UART: [art] SIG.R = 9F6A2D6AE2B7CBC804B067DBDE79A175DDA2AE27DCF91B3EF6126E9A2AE0378989135C5B677BB4017F0DB58568CF836F
5,574,870 UART: [art] SIG.S = 7FC2A0C82BD913C59E8EE97B263D11287946ED6285D7F9F0806D83551A22F570343BD3AE82B710A02472454ACCFA15CF
5,599,027 UART: Caliptra RT
5,599,372 UART: [state] CFI Enabled
5,707,871 UART: [rt] RT listening for mailbox commands...
5,708,541 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,831,451 UART: [rt]cmd =0x41544d4e, len=14344
5,833,079 >>> mbox cmd response: failed
5,833,079 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,955,521 UART: [rt]cmd =0x41544d4e, len=14344
5,957,077 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 ready_for_fw is high
1,362,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,054,068 >>> mbox cmd response: success
5,115,345 UART:
5,115,361 UART: Running Caliptra FMC ...
5,115,769 UART:
5,115,912 UART: [state] CFI Enabled
5,126,514 UART: [fht] FMC Alias Private Key: 7
5,234,534 UART: [art] Extend RT PCRs Done
5,234,962 UART: [art] Lock RT PCRs Done
5,236,340 UART: [art] Populate DV Done
5,244,686 UART: [fht] FMC Alias Private Key: 7
5,245,804 UART: [art] Derive CDI
5,246,084 UART: [art] Store in in slot 0x4
5,331,935 UART: [art] Derive Key Pair
5,332,295 UART: [art] Store priv key in slot 0x5
5,344,827 UART: [art] Derive Key Pair - Done
5,359,502 UART: [art] Signing Cert with AUTHO
5,359,982 UART: RITY.KEYID = 7
5,374,936 UART: [art] Erasing AUTHORITY.KEYID = 7
5,375,701 UART: [art] PUB.X = E9CE87721BB2B9E367CD76EAB91A4C1939A2FAE64B181D8A8CD663EDB3158B1EDB492FA0D88FAD0D0EEE2DB466A4BC9C
5,382,495 UART: [art] PUB.Y = A47092C872B3D720DC06985A897577216C2528BDB835CCF4B687F5914EDCFD875E1CBB2BB5A0E88CE152BEBA201E2585
5,389,452 UART: [art] SIG.R = DD1268000CF203C6B6C5D33150A208391221E209BB88D052B89EF19CA886187BFDEE859AA625ABB73BD15DCCC8B1BEAC
5,396,204 UART: [art] SIG.S = BFDD5C62BE4093DF22684ABA08761CA2D4037F439712AC530ADED86F117E5011934E0C65286498D65B1E659BB0EBF2D9
5,419,631 UART: Caliptra RT
5,419,976 UART: [state] CFI Enabled
5,528,738 UART: [rt] RT listening for mailbox commands...
5,529,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,652,368 UART: [rt]cmd =0x41544d4e, len=14344
5,653,840 >>> mbox cmd response: failed
5,653,840 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,776,524 UART: [rt]cmd =0x41544d4e, len=14344
5,777,868 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,996 UART: [state] LifecycleState = Unprovisioned
86,651 UART: [state] DebugLocked = No
87,269 UART: [state] WD Timer not started. Device not locked for debugging
88,396 UART: [kat] SHA2-256
894,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,171 UART: [kat] ++
898,323 UART: [kat] sha1
902,539 UART: [kat] SHA2-256
904,479 UART: [kat] SHA2-384
907,110 UART: [kat] SHA2-512-ACC
909,011 UART: [kat] ECC-384
918,784 UART: [kat] HMAC-384Kdf
923,492 UART: [kat] LMS
1,171,820 UART: [kat] --
1,172,655 UART: [cold-reset] ++
1,173,137 UART: [fht] FHT @ 0x50003400
1,175,788 UART: [idev] ++
1,175,956 UART: [idev] CDI.KEYID = 6
1,176,316 UART: [idev] SUBJECT.KEYID = 7
1,176,740 UART: [idev] UDS.KEYID = 0
1,177,085 ready_for_fw is high
1,177,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,778 UART: [idev] Erasing UDS.KEYID = 0
1,201,799 UART: [idev] Sha1 KeyId Algorithm
1,210,399 UART: [idev] --
1,211,675 UART: [ldev] ++
1,211,843 UART: [ldev] CDI.KEYID = 6
1,212,206 UART: [ldev] SUBJECT.KEYID = 5
1,212,632 UART: [ldev] AUTHORITY.KEYID = 7
1,213,095 UART: [ldev] FE.KEYID = 1
1,218,421 UART: [ldev] Erasing FE.KEYID = 1
1,244,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,089 UART: [ldev] --
1,283,586 UART: [fwproc] Wait for Commands...
1,284,202 UART: [fwproc] Recv command 0x46574c44
1,284,930 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,319,699 >>> mbox cmd response: success
3,320,823 UART: [afmc] ++
3,320,991 UART: [afmc] CDI.KEYID = 6
3,321,353 UART: [afmc] SUBJECT.KEYID = 7
3,321,778 UART: [afmc] AUTHORITY.KEYID = 5
3,357,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,301 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,010 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,902 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,613 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,414 UART: [afmc] --
3,400,294 UART: [cold-reset] --
3,401,100 UART: [state] Locking Datavault
3,402,231 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,835 UART: [state] Locking ICCM
3,403,509 UART: [exit] Launching FMC @ 0x40000130
3,408,838 UART:
3,408,854 UART: Running Caliptra FMC ...
3,409,262 UART:
3,409,316 UART: [state] CFI Enabled
3,419,584 UART: [fht] FMC Alias Private Key: 7
3,527,310 UART: [art] Extend RT PCRs Done
3,527,738 UART: [art] Lock RT PCRs Done
3,529,186 UART: [art] Populate DV Done
3,537,606 UART: [fht] FMC Alias Private Key: 7
3,538,536 UART: [art] Derive CDI
3,538,816 UART: [art] Store in in slot 0x4
3,624,383 UART: [art] Derive Key Pair
3,624,743 UART: [art] Store priv key in slot 0x5
3,637,291 UART: [art] Derive Key Pair - Done
3,652,058 UART: [art] Signing Cert with AUTHO
3,652,538 UART: RITY.KEYID = 7
3,667,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,933 UART: [art] PUB.X = 6344CF5286257C3936BB8D5C9AAA4FDC12742C365EF3A9CDB573981C535B06D53D202FD11672030827A71B7785F83732
3,674,690 UART: [art] PUB.Y = 46D9BAD36194B0F39C532BDA7E8BE7A88AF3A3020EF77AF1CA0EB8244EB3550DEBB8F9A9FAEAD5096B362AF2396BD679
3,681,649 UART: [art] SIG.R = 303EA31C6D4BEADCD57A8016BAF275F22378D09C6EA7BBBBEC6679A8539A4915DC62185BD8F558ECB8B6128FA51F1D4B
3,688,439 UART: [art] SIG.S = FDCC54C1171432D59F25CC2CC0C843C4602D64D09CABEF64708771FB0E27B38ADA0E2E5BA1D88A7B9EA3F5222BE08678
3,712,376 UART: Caliptra RT
3,712,629 UART: [state] CFI Enabled
3,819,527 UART: [rt] RT listening for mailbox commands...
3,820,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,385 UART: [rt]cmd =0x41544d4e, len=14344
3,944,821 >>> mbox cmd response: failed
3,944,821 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,455 UART: [rt]cmd =0x41544d4e, len=14344
4,069,049 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,621 ready_for_fw is high
1,060,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,160,582 >>> mbox cmd response: success
3,222,801 UART:
3,222,817 UART: Running Caliptra FMC ...
3,223,225 UART:
3,223,279 UART: [state] CFI Enabled
3,233,583 UART: [fht] FMC Alias Private Key: 7
3,341,419 UART: [art] Extend RT PCRs Done
3,341,847 UART: [art] Lock RT PCRs Done
3,343,717 UART: [art] Populate DV Done
3,351,971 UART: [fht] FMC Alias Private Key: 7
3,352,937 UART: [art] Derive CDI
3,353,217 UART: [art] Store in in slot 0x4
3,438,798 UART: [art] Derive Key Pair
3,439,158 UART: [art] Store priv key in slot 0x5
3,453,216 UART: [art] Derive Key Pair - Done
3,467,974 UART: [art] Signing Cert with AUTHO
3,468,454 UART: RITY.KEYID = 7
3,483,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,001 UART: [art] PUB.X = F74FB38E2E24B87B84A40DE21A97C047772448E84B239CB25C2C368848987453339176912756D304C6D4B03C8DB481B8
3,490,755 UART: [art] PUB.Y = 462382273943909A605CF3297506F9931AF8F1B7004A60042923AD3CCFE84A90921557711C389D091A2C5C8FE3A81905
3,497,657 UART: [art] SIG.R = B1C5E45E3D470B29310D63EF07BD712216C83F6BC1AE79645D11332E2EAAF701F929AD58669DE646171EBB959CE2C6B0
3,504,423 UART: [art] SIG.S = FF9088DA5FBCAF3A3E5185EC139666E53F1BEDCD34C482D8ADF20473CF656891F83ACC3791CA3BE634746842D62B79EC
3,528,867 UART: Caliptra RT
3,529,120 UART: [state] CFI Enabled
3,635,835 UART: [rt] RT listening for mailbox commands...
3,636,505 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,257 UART: [rt]cmd =0x41544d4e, len=14344
3,760,739 >>> mbox cmd response: failed
3,760,739 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,201 UART: [rt]cmd =0x41544d4e, len=14344
3,884,751 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
893,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,858 UART: [kat] ++
898,010 UART: [kat] sha1
902,300 UART: [kat] SHA2-256
904,240 UART: [kat] SHA2-384
907,063 UART: [kat] SHA2-512-ACC
908,964 UART: [kat] ECC-384
918,677 UART: [kat] HMAC-384Kdf
923,251 UART: [kat] LMS
1,171,579 UART: [kat] --
1,172,406 UART: [cold-reset] ++
1,172,838 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 ready_for_fw is high
1,176,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,655 UART: [idev] Erasing UDS.KEYID = 0
1,201,446 UART: [idev] Sha1 KeyId Algorithm
1,209,974 UART: [idev] --
1,210,936 UART: [ldev] ++
1,211,104 UART: [ldev] CDI.KEYID = 6
1,211,467 UART: [ldev] SUBJECT.KEYID = 5
1,211,893 UART: [ldev] AUTHORITY.KEYID = 7
1,212,356 UART: [ldev] FE.KEYID = 1
1,217,670 UART: [ldev] Erasing FE.KEYID = 1
1,244,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,402 UART: [ldev] --
1,283,723 UART: [fwproc] Wait for Commands...
1,284,433 UART: [fwproc] Recv command 0x46574c44
1,285,161 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,324,812 >>> mbox cmd response: success
3,325,916 UART: [afmc] ++
3,326,084 UART: [afmc] CDI.KEYID = 6
3,326,446 UART: [afmc] SUBJECT.KEYID = 7
3,326,871 UART: [afmc] AUTHORITY.KEYID = 5
3,362,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,614 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,323 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,215 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,926 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,675 UART: [afmc] --
3,405,687 UART: [cold-reset] --
3,406,673 UART: [state] Locking Datavault
3,407,862 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,466 UART: [state] Locking ICCM
3,408,946 UART: [exit] Launching FMC @ 0x40000130
3,414,275 UART:
3,414,291 UART: Running Caliptra FMC ...
3,414,699 UART:
3,414,842 UART: [state] CFI Enabled
3,425,710 UART: [fht] FMC Alias Private Key: 7
3,533,834 UART: [art] Extend RT PCRs Done
3,534,262 UART: [art] Lock RT PCRs Done
3,535,898 UART: [art] Populate DV Done
3,543,932 UART: [fht] FMC Alias Private Key: 7
3,545,016 UART: [art] Derive CDI
3,545,296 UART: [art] Store in in slot 0x4
3,630,919 UART: [art] Derive Key Pair
3,631,279 UART: [art] Store priv key in slot 0x5
3,644,551 UART: [art] Derive Key Pair - Done
3,659,434 UART: [art] Signing Cert with AUTHO
3,659,914 UART: RITY.KEYID = 7
3,675,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,827 UART: [art] PUB.X = DF461BD325705D89EFC0343042B6E78E85C85F8AC85187F2FF372653D21F37C28938E26689F99991D76D86BA54C198E5
3,682,593 UART: [art] PUB.Y = 181A6AD8F64C30A328F0A3F0D3B829BE05CC538A28DFE449D1D50D1AEA815A1717872F7C9DBC6568A979F9369E1CADFA
3,689,553 UART: [art] SIG.R = FE2F47314127B0579C41076B6735A918F314056E45ADFFF69E89C55BF49F3C3F0C81F7586F038ACA7D2B1A1C21E53228
3,696,313 UART: [art] SIG.S = A56E189C6513F62110D52C27EF430E99B6315C5A5D1C366AF26819BCDE38CD5513016BD2AAEBF0208C5D8326D5E54E0D
3,720,059 UART: Caliptra RT
3,720,404 UART: [state] CFI Enabled
3,828,941 UART: [rt] RT listening for mailbox commands...
3,829,611 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,459 UART: [rt]cmd =0x41544d4e, len=14344
3,954,013 >>> mbox cmd response: failed
3,954,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,617 UART: [rt]cmd =0x41544d4e, len=14344
4,078,163 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,132 ready_for_fw is high
1,061,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,168,268 >>> mbox cmd response: success
3,230,647 UART:
3,230,663 UART: Running Caliptra FMC ...
3,231,071 UART:
3,231,214 UART: [state] CFI Enabled
3,241,842 UART: [fht] FMC Alias Private Key: 7
3,349,546 UART: [art] Extend RT PCRs Done
3,349,974 UART: [art] Lock RT PCRs Done
3,351,752 UART: [art] Populate DV Done
3,359,898 UART: [fht] FMC Alias Private Key: 7
3,360,926 UART: [art] Derive CDI
3,361,206 UART: [art] Store in in slot 0x4
3,446,615 UART: [art] Derive Key Pair
3,446,975 UART: [art] Store priv key in slot 0x5
3,460,259 UART: [art] Derive Key Pair - Done
3,475,238 UART: [art] Signing Cert with AUTHO
3,475,718 UART: RITY.KEYID = 7
3,490,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,513 UART: [art] PUB.X = 2476B60C99A45FB97702BC8E70890037FCAD493F368091E07BCB0E0F60930A24A4254BCD54ED11DBDDEDB317147454AF
3,498,254 UART: [art] PUB.Y = 6FCD3FEE1976F46ECC7548FCD86563C81518973C9F9336DC4E7C2430984002498571A04252EE4AA26A98236146858782
3,505,191 UART: [art] SIG.R = B86D97708063AE626DFF549FD0002DE950B98B71AD34EE61F2350B2AC8E4F5F11214E1D425376932CE26E24532710C80
3,511,931 UART: [art] SIG.S = AC0A1DB159A9C07B0A496C1EBC7D5EAD38F3015BA65CDD807099591AB8D267FBDB136FEE02B0D6E85A2D44F5E04AD003
3,536,193 UART: Caliptra RT
3,536,538 UART: [state] CFI Enabled
3,643,421 UART: [rt] RT listening for mailbox commands...
3,644,091 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,971 UART: [rt]cmd =0x41544d4e, len=14344
3,768,401 >>> mbox cmd response: failed
3,768,401 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,977 UART: [rt]cmd =0x41544d4e, len=14344
3,892,375 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Unprovisioned
86,293 UART: [state] DebugLocked = No
86,913 UART: [state] WD Timer not started. Device not locked for debugging
88,074 UART: [kat] SHA2-256
891,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
900,169 UART: [kat] SHA2-256
902,109 UART: [kat] SHA2-384
904,974 UART: [kat] SHA2-512-ACC
906,875 UART: [kat] ECC-384
916,876 UART: [kat] HMAC-384Kdf
921,288 UART: [kat] LMS
1,169,600 UART: [kat] --
1,170,641 UART: [cold-reset] ++
1,171,027 UART: [fht] FHT @ 0x50003400
1,173,699 UART: [idev] ++
1,173,867 UART: [idev] CDI.KEYID = 6
1,174,228 UART: [idev] SUBJECT.KEYID = 7
1,174,653 UART: [idev] UDS.KEYID = 0
1,174,999 ready_for_fw is high
1,174,999 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,471 UART: [idev] Erasing UDS.KEYID = 0
1,200,031 UART: [idev] Sha1 KeyId Algorithm
1,209,079 UART: [idev] --
1,210,236 UART: [ldev] ++
1,210,404 UART: [ldev] CDI.KEYID = 6
1,210,768 UART: [ldev] SUBJECT.KEYID = 5
1,211,195 UART: [ldev] AUTHORITY.KEYID = 7
1,211,658 UART: [ldev] FE.KEYID = 1
1,216,812 UART: [ldev] Erasing FE.KEYID = 1
1,243,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,510 UART: [ldev] --
1,282,960 UART: [fwproc] Wait for Commands...
1,283,549 UART: [fwproc] Recv command 0x46574c44
1,284,282 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,326,681 >>> mbox cmd response: success
3,327,696 UART: [afmc] ++
3,327,864 UART: [afmc] CDI.KEYID = 6
3,328,227 UART: [afmc] SUBJECT.KEYID = 7
3,328,653 UART: [afmc] AUTHORITY.KEYID = 5
3,364,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,304 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,387,014 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,904 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,615 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,593 UART: [afmc] --
3,407,603 UART: [cold-reset] --
3,408,375 UART: [state] Locking Datavault
3,409,350 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,954 UART: [state] Locking ICCM
3,410,622 UART: [exit] Launching FMC @ 0x40000130
3,415,951 UART:
3,415,967 UART: Running Caliptra FMC ...
3,416,375 UART:
3,416,429 UART: [state] CFI Enabled
3,426,725 UART: [fht] FMC Alias Private Key: 7
3,534,919 UART: [art] Extend RT PCRs Done
3,535,347 UART: [art] Lock RT PCRs Done
3,537,161 UART: [art] Populate DV Done
3,545,659 UART: [fht] FMC Alias Private Key: 7
3,546,615 UART: [art] Derive CDI
3,546,895 UART: [art] Store in in slot 0x4
3,632,812 UART: [art] Derive Key Pair
3,633,172 UART: [art] Store priv key in slot 0x5
3,646,624 UART: [art] Derive Key Pair - Done
3,661,142 UART: [art] Signing Cert with AUTHO
3,661,622 UART: RITY.KEYID = 7
3,676,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,677,605 UART: [art] PUB.X = C6EFAAD7362EB4F24C90264DBB91E137A4F486EB2DD20C4C024D64D383609C93CD4F43BD69DF6B572E1486423B098E5A
3,684,378 UART: [art] PUB.Y = 2CD57E23D8D1097CD0A93633DCD38B1D1CFCB60CC3078111B204889062A3BA3D4052C4BB18982EF6FA69DD025486E294
3,691,319 UART: [art] SIG.R = DA7F9954408896D4492E72E8BDEFC781DF740CF531D6F8991482FB821102750BAA271743D710C400284C927EFC839240
3,698,052 UART: [art] SIG.S = 92948DE9A83A041DB8F78FA96B906CD7815880FE9C8BB17C8A49B4FD6E9B29C4FDFB4641D9568966DB804430C765BA3C
3,721,324 UART: Caliptra RT
3,721,577 UART: [state] CFI Enabled
3,828,848 UART: [rt] RT listening for mailbox commands...
3,829,518 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,704 UART: [rt]cmd =0x41544d4e, len=14344
3,954,490 >>> mbox cmd response: failed
3,954,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,077,064 UART: [rt]cmd =0x41544d4e, len=14344
4,078,528 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,830 ready_for_fw is high
1,056,830 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,160,801 >>> mbox cmd response: success
3,222,878 UART:
3,222,894 UART: Running Caliptra FMC ...
3,223,302 UART:
3,223,356 UART: [state] CFI Enabled
3,233,572 UART: [fht] FMC Alias Private Key: 7
3,341,782 UART: [art] Extend RT PCRs Done
3,342,210 UART: [art] Lock RT PCRs Done
3,343,760 UART: [art] Populate DV Done
3,352,086 UART: [fht] FMC Alias Private Key: 7
3,353,162 UART: [art] Derive CDI
3,353,442 UART: [art] Store in in slot 0x4
3,439,087 UART: [art] Derive Key Pair
3,439,447 UART: [art] Store priv key in slot 0x5
3,452,623 UART: [art] Derive Key Pair - Done
3,467,864 UART: [art] Signing Cert with AUTHO
3,468,344 UART: RITY.KEYID = 7
3,483,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,375 UART: [art] PUB.X = 5202390758EF71FB99E0A82F83403380D36C72E9A2827C5E196FA1D685E3E8946AC3324B361766BA0BE0443B67AA54E0
3,491,132 UART: [art] PUB.Y = B5BC441091A104ADC1886E9BCF5BFA586C3F32F645B448F64916ABA1A8459DDB1FF304E7967058B38F28A5A9B39903B4
3,498,081 UART: [art] SIG.R = 3C319E3AB8CD7012A6FBD7DB543247885ECF3CDA4E0F15DD266DF808C134D742C720E1E180A9EBE0C0F15DA8D46027EB
3,504,863 UART: [art] SIG.S = 95BEA86EF7132442A576A015BAD4D2D65F104BA865E63D1B8FABB6D5BBE9B3912EA0261FF9E01A507DA5CDA448CB4C71
3,528,688 UART: Caliptra RT
3,528,941 UART: [state] CFI Enabled
3,637,251 UART: [rt] RT listening for mailbox commands...
3,637,921 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,845 UART: [rt]cmd =0x41544d4e, len=14344
3,762,337 >>> mbox cmd response: failed
3,762,337 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,884,631 UART: [rt]cmd =0x41544d4e, len=14344
3,885,857 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [kat] SHA2-256
891,881 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,010 UART: [kat] ++
896,162 UART: [kat] sha1
900,602 UART: [kat] SHA2-256
902,542 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,125 UART: [kat] HMAC-384Kdf
921,783 UART: [kat] LMS
1,170,095 UART: [kat] --
1,171,178 UART: [cold-reset] ++
1,171,648 UART: [fht] FHT @ 0x50003400
1,174,288 UART: [idev] ++
1,174,456 UART: [idev] CDI.KEYID = 6
1,174,817 UART: [idev] SUBJECT.KEYID = 7
1,175,242 UART: [idev] UDS.KEYID = 0
1,175,588 ready_for_fw is high
1,175,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,590 UART: [idev] Erasing UDS.KEYID = 0
1,200,454 UART: [idev] Sha1 KeyId Algorithm
1,209,352 UART: [idev] --
1,210,263 UART: [ldev] ++
1,210,431 UART: [ldev] CDI.KEYID = 6
1,210,795 UART: [ldev] SUBJECT.KEYID = 5
1,211,222 UART: [ldev] AUTHORITY.KEYID = 7
1,211,685 UART: [ldev] FE.KEYID = 1
1,216,991 UART: [ldev] Erasing FE.KEYID = 1
1,243,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,117 UART: [ldev] --
1,282,605 UART: [fwproc] Wait for Commands...
1,283,330 UART: [fwproc] Recv command 0x46574c44
1,284,063 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,322,969 >>> mbox cmd response: success
3,324,068 UART: [afmc] ++
3,324,236 UART: [afmc] CDI.KEYID = 6
3,324,599 UART: [afmc] SUBJECT.KEYID = 7
3,325,025 UART: [afmc] AUTHORITY.KEYID = 5
3,360,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,614 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,324 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,214 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,925 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,693 UART: [afmc] --
3,403,697 UART: [cold-reset] --
3,404,763 UART: [state] Locking Datavault
3,405,886 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,490 UART: [state] Locking ICCM
3,406,998 UART: [exit] Launching FMC @ 0x40000130
3,412,327 UART:
3,412,343 UART: Running Caliptra FMC ...
3,412,751 UART:
3,412,894 UART: [state] CFI Enabled
3,423,688 UART: [fht] FMC Alias Private Key: 7
3,531,898 UART: [art] Extend RT PCRs Done
3,532,326 UART: [art] Lock RT PCRs Done
3,534,168 UART: [art] Populate DV Done
3,542,422 UART: [fht] FMC Alias Private Key: 7
3,543,576 UART: [art] Derive CDI
3,543,856 UART: [art] Store in in slot 0x4
3,629,381 UART: [art] Derive Key Pair
3,629,741 UART: [art] Store priv key in slot 0x5
3,643,185 UART: [art] Derive Key Pair - Done
3,658,044 UART: [art] Signing Cert with AUTHO
3,658,524 UART: RITY.KEYID = 7
3,674,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,071 UART: [art] PUB.X = 936075E54019E0B4BF23700E305056F15F10085A7634659C4A90DEB84BD95366D2B356DDDF9CD0DFEDB35ECDD5FEE410
3,681,845 UART: [art] PUB.Y = 11DDA91989C87FC79C044DD4AEB3434A609FA95AD3582E1C97C067A8D2272B115C621AAD02F3F256A11136381C4E2182
3,688,791 UART: [art] SIG.R = A2DCBDC63E608FBA05B96265954DDFC603A6717F641C1257DB4160BFD851B15E2BAE4EA2495F57FA0FD8C81D93E29917
3,695,566 UART: [art] SIG.S = F44F867109DFBEC96DA0E184AC3508ED908E564E928618BC4D060F15094E91FEB311AECEA09E94532B348279F16FCBE2
3,719,354 UART: Caliptra RT
3,719,699 UART: [state] CFI Enabled
3,828,650 UART: [rt] RT listening for mailbox commands...
3,829,320 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,282 UART: [rt]cmd =0x41544d4e, len=14344
3,953,616 >>> mbox cmd response: failed
3,953,616 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,036 UART: [rt]cmd =0x41544d4e, len=14344
4,077,214 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,553 ready_for_fw is high
1,057,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,050 >>> mbox cmd response: success
3,229,449 UART:
3,229,465 UART: Running Caliptra FMC ...
3,229,873 UART:
3,230,016 UART: [state] CFI Enabled
3,240,636 UART: [fht] FMC Alias Private Key: 7
3,348,792 UART: [art] Extend RT PCRs Done
3,349,220 UART: [art] Lock RT PCRs Done
3,350,736 UART: [art] Populate DV Done
3,358,906 UART: [fht] FMC Alias Private Key: 7
3,359,962 UART: [art] Derive CDI
3,360,242 UART: [art] Store in in slot 0x4
3,445,439 UART: [art] Derive Key Pair
3,445,799 UART: [art] Store priv key in slot 0x5
3,459,747 UART: [art] Derive Key Pair - Done
3,474,418 UART: [art] Signing Cert with AUTHO
3,474,898 UART: RITY.KEYID = 7
3,490,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,793 UART: [art] PUB.X = A024708825C8DAE1B1EA2419A4F5EE7B1BD901258CC9B8C566B2375FFDF244333DA12D636454EB975179DD5A41AA1F06
3,497,565 UART: [art] PUB.Y = 5B385E7D2CA04FCAB19077994AF8D7C66DF4EF94F11D5FA5EA7BE9C2FF6ADB443711222D0788B9DC97C2687BB827AE47
3,504,530 UART: [art] SIG.R = 9B5B66625C832B5A5D02958A4205B2ACBD14AC26841AE58820CCB9FCEC4C16DD7E1901BD7DA606DC8620EB1C52BC8B0C
3,511,303 UART: [art] SIG.S = 663797E943C6758BC613A01144EA657CB3DB181FA7DDA35345DE441EFA871BB3E12CB74790AF95E431C5374445DFC59E
3,534,768 UART: Caliptra RT
3,535,113 UART: [state] CFI Enabled
3,642,535 UART: [rt] RT listening for mailbox commands...
3,643,205 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,191 UART: [rt]cmd =0x41544d4e, len=14344
3,767,875 >>> mbox cmd response: failed
3,767,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,615 UART: [rt]cmd =0x41544d4e, len=14344
3,892,133 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,131 UART:
192,484 UART: Running Caliptra ROM ...
193,666 UART:
193,830 UART: [state] CFI Enabled
262,286 UART: [state] LifecycleState = Unprovisioned
264,254 UART: [state] DebugLocked = No
266,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,128 UART: [kat] SHA2-256
440,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,338 UART: [kat] ++
451,947 UART: [kat] sha1
462,899 UART: [kat] SHA2-256
465,555 UART: [kat] SHA2-384
470,176 UART: [kat] SHA2-512-ACC
472,511 UART: [kat] ECC-384
2,767,366 UART: [kat] HMAC-384Kdf
2,781,604 UART: [kat] LMS
3,971,922 UART: [kat] --
3,976,020 UART: [cold-reset] ++
3,978,387 UART: [fht] Storing FHT @ 0x50003400
3,989,887 UART: [idev] ++
3,990,492 UART: [idev] CDI.KEYID = 6
3,991,411 UART: [idev] SUBJECT.KEYID = 7
3,992,660 UART: [idev] UDS.KEYID = 0
3,993,618 ready_for_fw is high
3,993,819 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,203 UART: [idev] Erasing UDS.KEYID = 0
7,327,277 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,823 UART: [idev] --
7,351,054 UART: [ldev] ++
7,351,644 UART: [ldev] CDI.KEYID = 6
7,352,669 UART: [ldev] SUBJECT.KEYID = 5
7,353,832 UART: [ldev] AUTHORITY.KEYID = 7
7,355,063 UART: [ldev] FE.KEYID = 1
7,381,703 UART: [ldev] Erasing FE.KEYID = 1
10,713,724 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,023,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,052,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,070,782 UART: [ldev] --
13,074,867 UART: [fwproc] Waiting for Commands...
13,076,750 UART: [fwproc] Received command 0x46574c44
13,078,940 UART: [fwproc] Received Image of size 114124 bytes
22,115,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,193,234 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,262,144 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,578,902 >>> mbox cmd response: success
22,583,880 UART: [afmc] ++
22,584,472 UART: [afmc] CDI.KEYID = 6
22,585,389 UART: [afmc] SUBJECT.KEYID = 7
22,586,663 UART: [afmc] AUTHORITY.KEYID = 5
25,957,605 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,256,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,258,517 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,273,096 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,287,829 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,302,071 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,324,715 UART: [afmc] --
28,328,164 UART: [cold-reset] --
28,332,413 UART: [state] Locking Datavault
28,335,683 UART: [state] Locking PCR0, PCR1 and PCR31
28,337,396 UART: [state] Locking ICCM
28,339,552 UART: [exit] Launching FMC @ 0x40000130
28,347,951 UART:
28,348,189 UART: Running Caliptra FMC ...
28,349,287 UART:
28,349,444 UART: [state] CFI Enabled
28,419,184 UART: [fht] FMC Alias Private Key: 7
30,756,914 UART: [art] Extend RT PCRs Done
30,758,134 UART: [art] Lock RT PCRs Done
30,759,572 UART: [art] Populate DV Done
30,765,195 UART: [fht] FMC Alias Private Key: 7
30,766,950 UART: [art] Derive CDI
30,767,766 UART: [art] Store in in slot 0x4
30,826,807 UART: [art] Derive Key Pair
30,827,852 UART: [art] Store priv key in slot 0x5
34,120,959 UART: [art] Derive Key Pair - Done
34,134,260 UART: [art] Signing Cert with AUTHO
34,135,564 UART: RITY.KEYID = 7
36,423,449 UART: [art] Erasing AUTHORITY.KEYID = 7
36,424,964 UART: [art] PUB.X = 5312142A75E28281708D366F2120E4E0447FE15FB4411C10BB7E9578F0E261E778D106FBF530A9D3CA9C03C0D88DB5B3
36,432,265 UART: [art] PUB.Y = 79D3A9379D23EC15127324C8FB4AEE4F1F783863BC528DEBFF381155BDC1D2FF1157241C72486220B86226156F2566AA
36,439,451 UART: [art] SIG.R = 9CC5E83F95B07DD42674EA2A6AB0752097067355B8382309CBD896BD857A7B1018C0C46B792D95692DA75ED5603D22C1
36,446,793 UART: [art] SIG.S = AB329AB234B380DC04C16B49C6005E47DDE2C0A56167AAA07BF541CF0E922D66D4BD1A492C656CCFE1EF6F35027CFAAF
37,751,916 UART: Caliptra RT
37,752,633 UART: [state] CFI Enabled
37,915,407 UART: [rt] RT listening for mailbox commands...
37,917,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,073,036 UART: [rt]cmd =0x41544d4e, len=14344
46,517,273 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
3,785,060 ready_for_fw is high
3,785,455 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,846,990 >>> mbox cmd response: success
27,530,314 UART:
27,530,711 UART: Running Caliptra FMC ...
27,531,854 UART:
27,532,023 UART: [state] CFI Enabled
27,602,002 UART: [fht] FMC Alias Private Key: 7
29,939,910 UART: [art] Extend RT PCRs Done
29,941,176 UART: [art] Lock RT PCRs Done
29,942,866 UART: [art] Populate DV Done
29,948,163 UART: [fht] FMC Alias Private Key: 7
29,949,719 UART: [art] Derive CDI
29,950,494 UART: [art] Store in in slot 0x4
30,010,592 UART: [art] Derive Key Pair
30,011,638 UART: [art] Store priv key in slot 0x5
33,304,846 UART: [art] Derive Key Pair - Done
33,317,629 UART: [art] Signing Cert with AUTHO
33,318,930 UART: RITY.KEYID = 7
35,605,865 UART: [art] Erasing AUTHORITY.KEYID = 7
35,607,372 UART: [art] PUB.X = DCF5192CC374201AAFCEC90A05F967304DD85DB54318EFFD0782B7DFE12EE46E4041BF7497F65B9B449FD81C120484F6
35,614,652 UART: [art] PUB.Y = 1D2B9D5B68BDF415378E23998840DD09F03F1EF62D4C9AF1CC51913687CD299DB27A596B2944F9D31E14D8FDC2707B13
35,621,886 UART: [art] SIG.R = 5840C696CF0D23B3FC8A8EABB9610C325AF85494A097D9FEC6169E98FACF77ED5E16CD805BA1A6F46FEA849F2279417E
35,629,250 UART: [art] SIG.S = 52893CF936659B86DFD511617912859DD0FC8D2615FDD10E76E352D076FB095A08AA8D3B6D0354680DBD80C8BE49BC6E
36,934,442 UART: Caliptra RT
36,935,157 UART: [state] CFI Enabled
37,096,050 UART: [rt] RT listening for mailbox commands...
37,098,353 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,253,924 UART: [rt]cmd =0x41544d4e, len=14344
45,827,922 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,237 UART:
192,610 UART: Running Caliptra ROM ...
193,798 UART:
603,445 UART: [state] CFI Enabled
620,083 UART: [state] LifecycleState = Unprovisioned
621,942 UART: [state] DebugLocked = No
623,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,956 UART: [kat] SHA2-256
798,729 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,229 UART: [kat] ++
809,673 UART: [kat] sha1
821,342 UART: [kat] SHA2-256
824,069 UART: [kat] SHA2-384
828,641 UART: [kat] SHA2-512-ACC
831,008 UART: [kat] ECC-384
3,115,246 UART: [kat] HMAC-384Kdf
3,126,145 UART: [kat] LMS
4,316,247 UART: [kat] --
4,321,111 UART: [cold-reset] ++
4,322,339 UART: [fht] Storing FHT @ 0x50003400
4,333,902 UART: [idev] ++
4,334,503 UART: [idev] CDI.KEYID = 6
4,335,415 UART: [idev] SUBJECT.KEYID = 7
4,336,658 UART: [idev] UDS.KEYID = 0
4,337,610 ready_for_fw is high
4,337,798 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,956 UART: [idev] Erasing UDS.KEYID = 0
7,619,724 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,370 UART: [idev] --
7,645,273 UART: [ldev] ++
7,645,833 UART: [ldev] CDI.KEYID = 6
7,646,789 UART: [ldev] SUBJECT.KEYID = 5
7,647,993 UART: [ldev] AUTHORITY.KEYID = 7
7,649,269 UART: [ldev] FE.KEYID = 1
7,660,664 UART: [ldev] Erasing FE.KEYID = 1
10,947,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,114 UART: [ldev] --
13,309,759 UART: [fwproc] Waiting for Commands...
13,311,959 UART: [fwproc] Received command 0x46574c44
13,314,157 UART: [fwproc] Received Image of size 114124 bytes
22,185,404 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,266,179 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,335,086 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,651,995 >>> mbox cmd response: success
22,656,984 UART: [afmc] ++
22,657,574 UART: [afmc] CDI.KEYID = 6
22,658,459 UART: [afmc] SUBJECT.KEYID = 7
22,659,726 UART: [afmc] AUTHORITY.KEYID = 5
25,973,038 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,267,557 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,269,812 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,284,402 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,299,127 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,313,387 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,333,745 UART: [afmc] --
28,337,914 UART: [cold-reset] --
28,341,882 UART: [state] Locking Datavault
28,346,640 UART: [state] Locking PCR0, PCR1 and PCR31
28,348,336 UART: [state] Locking ICCM
28,349,484 UART: [exit] Launching FMC @ 0x40000130
28,357,875 UART:
28,358,103 UART: Running Caliptra FMC ...
28,359,122 UART:
28,359,263 UART: [state] CFI Enabled
28,367,360 UART: [fht] FMC Alias Private Key: 7
30,698,309 UART: [art] Extend RT PCRs Done
30,699,526 UART: [art] Lock RT PCRs Done
30,701,172 UART: [art] Populate DV Done
30,706,583 UART: [fht] FMC Alias Private Key: 7
30,708,332 UART: [art] Derive CDI
30,709,062 UART: [art] Store in in slot 0x4
30,751,407 UART: [art] Derive Key Pair
30,752,451 UART: [art] Store priv key in slot 0x5
33,994,377 UART: [art] Derive Key Pair - Done
34,007,749 UART: [art] Signing Cert with AUTHO
34,009,089 UART: RITY.KEYID = 7
36,288,442 UART: [art] Erasing AUTHORITY.KEYID = 7
36,289,969 UART: [art] PUB.X = BCB997A8EEB003E25FFDC9BF3460D1B3F6F0AF8AEB06B8D6AA4BD2E0DA77BBB3E9B9A3AA17998F60D62DC5831BC1D473
36,297,205 UART: [art] PUB.Y = 7277B7D672B7F00A0E08C5BDB094FE29EF6B818E60FE45CCA0FFDB645D3826A1305E0FEA4B7AF8059067FC11AEFC720C
36,304,474 UART: [art] SIG.R = 9497356461DD476888B1A1A41F1E6723233762B7EF75D3D0D687C19CEB2A26DCAAD47B9E18CD008E51FF9C667E4F5BF0
36,311,855 UART: [art] SIG.S = 098B169B5D31A7CD2F72786E19F47568BBD7A34B1EE0A1A6100268A3139EB14EAAFB32FB049BD8A1B4AA8A1A8A92A4B7
37,617,236 UART: Caliptra RT
37,617,948 UART: [state] CFI Enabled
37,735,978 UART: [rt] RT listening for mailbox commands...
37,738,364 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,893,782 UART: [rt]cmd =0x41544d4e, len=14344
46,129,758 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
4,127,543 ready_for_fw is high
4,127,956 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,192,360 >>> mbox cmd response: success
27,829,631 UART:
27,830,010 UART: Running Caliptra FMC ...
27,831,204 UART:
27,831,365 UART: [state] CFI Enabled
27,839,103 UART: [fht] FMC Alias Private Key: 7
30,170,333 UART: [art] Extend RT PCRs Done
30,171,553 UART: [art] Lock RT PCRs Done
30,173,047 UART: [art] Populate DV Done
30,178,327 UART: [fht] FMC Alias Private Key: 7
30,179,884 UART: [art] Derive CDI
30,180,698 UART: [art] Store in in slot 0x4
30,223,307 UART: [art] Derive Key Pair
30,224,351 UART: [art] Store priv key in slot 0x5
33,467,015 UART: [art] Derive Key Pair - Done
33,479,971 UART: [art] Signing Cert with AUTHO
33,481,305 UART: RITY.KEYID = 7
35,760,586 UART: [art] Erasing AUTHORITY.KEYID = 7
35,762,089 UART: [art] PUB.X = 1694AC334CEF03AE6632169B2484EF0528A874716F5E870931CC4635C981036E1D6D89EE1C62397C41C493D70DDE3E68
35,769,320 UART: [art] PUB.Y = A20FC1E0815B0C5AAAC9CACAE010FB3D9BC8F79FFCCB723A4E8B2DEC23CE32D3A1C3883C6402FD3EA77059672941F4A3
35,776,616 UART: [art] SIG.R = 207B55C01BFD9633F1456163D2F2ACCC2CF5756737A59088707136FD5334740D72F1149B7FD2044AFF4DE0841D513273
35,783,998 UART: [art] SIG.S = A361A146F573922D67497A75174087705CA1971A93AE645396977EE4CE926ECC014EE31DEAAA43728ED3A40F19576F4F
37,088,436 UART: Caliptra RT
37,089,139 UART: [state] CFI Enabled
37,206,744 UART: [rt] RT listening for mailbox commands...
37,209,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,364,144 UART: [rt]cmd =0x41544d4e, len=14344
45,964,083 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
192,168 UART:
192,522 UART: Running Caliptra ROM ...
193,704 UART:
193,854 UART: [state] CFI Enabled
260,679 UART: [state] LifecycleState = Unprovisioned
262,585 UART: [state] DebugLocked = No
264,829 UART: [state] WD Timer not started. Device not locked for debugging
267,726 UART: [kat] SHA2-256
446,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,477 UART: [kat] ++
459,008 UART: [kat] sha1
469,252 UART: [kat] SHA2-256
472,267 UART: [kat] SHA2-384
478,894 UART: [kat] SHA2-512-ACC
481,824 UART: [kat] ECC-384
2,927,119 UART: [kat] HMAC-384Kdf
2,949,678 UART: [kat] LMS
3,479,142 UART: [kat] --
3,484,431 UART: [cold-reset] ++
3,485,577 UART: [fht] FHT @ 0x50003400
3,496,696 UART: [idev] ++
3,497,265 UART: [idev] CDI.KEYID = 6
3,498,174 UART: [idev] SUBJECT.KEYID = 7
3,499,663 UART: [idev] UDS.KEYID = 0
3,500,605 ready_for_fw is high
3,500,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,645,316 UART: [idev] Erasing UDS.KEYID = 0
6,003,174 UART: [idev] Sha1 KeyId Algorithm
6,026,087 UART: [idev] --
6,030,951 UART: [ldev] ++
6,031,530 UART: [ldev] CDI.KEYID = 6
6,032,463 UART: [ldev] SUBJECT.KEYID = 5
6,033,627 UART: [ldev] AUTHORITY.KEYID = 7
6,034,860 UART: [ldev] FE.KEYID = 1
6,077,809 UART: [ldev] Erasing FE.KEYID = 1
8,580,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,538 UART: [ldev] --
10,370,878 UART: [fwproc] Wait for Commands...
10,373,885 UART: [fwproc] Recv command 0x46574c44
10,375,975 UART: [fwproc] Recv'd Img size: 114448 bytes
14,948,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,025,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,094,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,412,686 >>> mbox cmd response: success
15,416,633 UART: [afmc] ++
15,417,234 UART: [afmc] CDI.KEYID = 6
15,418,149 UART: [afmc] SUBJECT.KEYID = 7
15,420,025 UART: [afmc] AUTHORITY.KEYID = 5
17,964,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,685,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,687,466 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,703,406 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,719,381 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,735,158 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,757,890 UART: [afmc] --
19,761,008 UART: [cold-reset] --
19,765,517 UART: [state] Locking Datavault
19,770,219 UART: [state] Locking PCR0, PCR1 and PCR31
19,771,859 UART: [state] Locking ICCM
19,774,547 UART: [exit] Launching FMC @ 0x40000130
19,782,937 UART:
19,783,171 UART: Running Caliptra FMC ...
19,784,268 UART:
19,784,425 UART: [state] CFI Enabled
19,843,709 UART: [fht] FMC Alias Private Key: 7
21,606,765 UART: [art] Extend RT PCRs Done
21,607,981 UART: [art] Lock RT PCRs Done
21,609,580 UART: [art] Populate DV Done
21,615,042 UART: [fht] FMC Alias Private Key: 7
21,616,587 UART: [art] Derive CDI
21,617,325 UART: [art] Store in in slot 0x4
21,675,721 UART: [art] Derive Key Pair
21,676,753 UART: [art] Store priv key in slot 0x5
24,139,574 UART: [art] Derive Key Pair - Done
24,152,193 UART: [art] Signing Cert with AUTHO
24,153,516 UART: RITY.KEYID = 7
25,866,952 UART: [art] Erasing AUTHORITY.KEYID = 7
25,868,462 UART: [art] PUB.X = 8B74245B55FB3AA0FCD84865D32528F2E8D8C08C4493C9445DB96AD3D2F9C6EB711D689579D1BCC5DC3463344570638D
25,875,662 UART: [art] PUB.Y = DE5BF443DCE4FB7CE0C13343C817C9BEED49446CCD443AD57EE8AA6A6D33289F1C97207C32C9A54889194B51F4264E25
25,882,955 UART: [art] SIG.R = 4AE0DE2D45E7F45C4BBD8C5A3E3679B3F21DBFF3A6E4AC25C206BD2A401CF1154334E0B76ADF589425121DAB534B29BE
25,890,396 UART: [art] SIG.S = 47CAEA2D843435740E7371A53EE1BAAA77D51338224565113E6089327C63C288B7CF56487702EC55E06FB6AEFDFEE51A
26,869,785 UART: Caliptra RT
26,870,474 UART: [state] CFI Enabled
27,034,342 UART: [rt] RT listening for mailbox commands...
27,036,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,192,350 UART: [rt]cmd =0x41544d4e, len=14344
31,993,897 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,382,754 ready_for_fw is high
3,383,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,068,901 >>> mbox cmd response: success
19,386,538 UART:
19,386,932 UART: Running Caliptra FMC ...
19,388,088 UART:
19,388,255 UART: [state] CFI Enabled
19,455,659 UART: [fht] FMC Alias Private Key: 7
21,219,094 UART: [art] Extend RT PCRs Done
21,220,315 UART: [art] Lock RT PCRs Done
21,221,935 UART: [art] Populate DV Done
21,227,237 UART: [fht] FMC Alias Private Key: 7
21,228,843 UART: [art] Derive CDI
21,229,659 UART: [art] Store in in slot 0x4
21,287,843 UART: [art] Derive Key Pair
21,288,840 UART: [art] Store priv key in slot 0x5
23,751,815 UART: [art] Derive Key Pair - Done
23,764,664 UART: [art] Signing Cert with AUTHO
23,765,975 UART: RITY.KEYID = 7
25,477,511 UART: [art] Erasing AUTHORITY.KEYID = 7
25,479,011 UART: [art] PUB.X = DF139EEA4E22613656B0654531356F324006BE6EFD3CF3218C23A6245D3984E1D867EC79A876BB4ED43C1D314348A9C5
25,486,269 UART: [art] PUB.Y = AA4B0236EB7D478CA26EB7A92ED2039B98427614FD88986692145EEEF74A43BDB38F0E6339B5C430FAAC70E735FE6D99
25,493,528 UART: [art] SIG.R = B002D13F2E736EDDCD79B0F21A0A5911A731CB30A07E9F2833894866E2C1327D5C30013A850CF64B15FF1D6C6F65E1FC
25,500,918 UART: [art] SIG.S = 31FD4585502FB90FBC650F6286A1D6C4109065D7A8C1A108C8B95EFC45C6D1BD5B2316ED3EA58D3540BF6FB78736E66A
26,479,470 UART: Caliptra RT
26,480,173 UART: [state] CFI Enabled
26,645,870 UART: [rt] RT listening for mailbox commands...
26,648,173 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,804,571 UART: [rt]cmd =0x41544d4e, len=14344
31,597,646 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,443 UART:
192,820 UART: Running Caliptra ROM ...
193,939 UART:
603,630 UART: [state] CFI Enabled
616,988 UART: [state] LifecycleState = Unprovisioned
618,792 UART: [state] DebugLocked = No
621,371 UART: [state] WD Timer not started. Device not locked for debugging
625,405 UART: [kat] SHA2-256
804,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,080 UART: [kat] ++
816,711 UART: [kat] sha1
826,164 UART: [kat] SHA2-256
829,241 UART: [kat] SHA2-384
834,723 UART: [kat] SHA2-512-ACC
837,655 UART: [kat] ECC-384
3,277,891 UART: [kat] HMAC-384Kdf
3,290,337 UART: [kat] LMS
3,819,801 UART: [kat] --
3,825,226 UART: [cold-reset] ++
3,827,150 UART: [fht] FHT @ 0x50003400
3,838,632 UART: [idev] ++
3,839,197 UART: [idev] CDI.KEYID = 6
3,840,222 UART: [idev] SUBJECT.KEYID = 7
3,841,314 UART: [idev] UDS.KEYID = 0
3,842,352 ready_for_fw is high
3,842,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,390 UART: [idev] Erasing UDS.KEYID = 0
6,319,030 UART: [idev] Sha1 KeyId Algorithm
6,342,247 UART: [idev] --
6,347,296 UART: [ldev] ++
6,347,863 UART: [ldev] CDI.KEYID = 6
6,348,738 UART: [ldev] SUBJECT.KEYID = 5
6,349,939 UART: [ldev] AUTHORITY.KEYID = 7
6,351,216 UART: [ldev] FE.KEYID = 1
6,362,906 UART: [ldev] Erasing FE.KEYID = 1
8,834,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,560 UART: [ldev] --
10,625,839 UART: [fwproc] Wait for Commands...
10,628,248 UART: [fwproc] Recv command 0x46574c44
10,630,328 UART: [fwproc] Recv'd Img size: 114448 bytes
15,165,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,244,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,313,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,631,277 >>> mbox cmd response: success
15,635,657 UART: [afmc] ++
15,636,247 UART: [afmc] CDI.KEYID = 6
15,637,123 UART: [afmc] SUBJECT.KEYID = 7
15,638,328 UART: [afmc] AUTHORITY.KEYID = 5
18,137,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,857,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,859,237 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,875,209 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,891,165 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,906,933 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,930,211 UART: [afmc] --
19,933,201 UART: [cold-reset] --
19,936,950 UART: [state] Locking Datavault
19,942,825 UART: [state] Locking PCR0, PCR1 and PCR31
19,944,527 UART: [state] Locking ICCM
19,946,296 UART: [exit] Launching FMC @ 0x40000130
19,954,739 UART:
19,954,964 UART: Running Caliptra FMC ...
19,956,055 UART:
19,956,212 UART: [state] CFI Enabled
19,964,377 UART: [fht] FMC Alias Private Key: 7
21,721,901 UART: [art] Extend RT PCRs Done
21,723,123 UART: [art] Lock RT PCRs Done
21,724,721 UART: [art] Populate DV Done
21,730,175 UART: [fht] FMC Alias Private Key: 7
21,731,702 UART: [art] Derive CDI
21,732,438 UART: [art] Store in in slot 0x4
21,775,073 UART: [art] Derive Key Pair
21,776,072 UART: [art] Store priv key in slot 0x5
24,202,578 UART: [art] Derive Key Pair - Done
24,215,681 UART: [art] Signing Cert with AUTHO
24,216,975 UART: RITY.KEYID = 7
25,922,740 UART: [art] Erasing AUTHORITY.KEYID = 7
25,924,246 UART: [art] PUB.X = 8CBEE5A2B7BAF52DAD034CF51549B5575520B358C2BECC57F99C0A60CE59D1BCBD495135F49716A36842B5194E515C53
25,931,528 UART: [art] PUB.Y = 29BB52BCEB9AE5A805A3A56DC85BC3D5412CD12CEB2F42FAB5BE48D8500B1501CFBD36F3E06A01C5E0683CACB9432776
25,938,828 UART: [art] SIG.R = 0410A7FD912CF0E171A6E34F0A56926692678F73D5A95DFCAB2529BF2AB85E7784BCE6D810E39855CFCB52C17282454E
25,946,237 UART: [art] SIG.S = 7667AC6F0BD66FAA19E1554B7B34B88D424218907326F7E28CE6EBDD687F2EEFE22BEFB64BDF9CE7E1EFAD8FD46AE559
26,924,858 UART: Caliptra RT
26,925,539 UART: [state] CFI Enabled
27,042,533 UART: [rt] RT listening for mailbox commands...
27,044,820 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,200,450 UART: [rt]cmd =0x41544d4e, len=14344
32,001,066 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,694,442 ready_for_fw is high
3,695,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,248,758 >>> mbox cmd response: success
19,497,113 UART:
19,497,547 UART: Running Caliptra FMC ...
19,498,644 UART:
19,498,795 UART: [state] CFI Enabled
19,506,750 UART: [fht] FMC Alias Private Key: 7
21,263,533 UART: [art] Extend RT PCRs Done
21,264,759 UART: [art] Lock RT PCRs Done
21,266,462 UART: [art] Populate DV Done
21,272,044 UART: [fht] FMC Alias Private Key: 7
21,273,799 UART: [art] Derive CDI
21,274,609 UART: [art] Store in in slot 0x4
21,317,155 UART: [art] Derive Key Pair
21,318,200 UART: [art] Store priv key in slot 0x5
23,745,191 UART: [art] Derive Key Pair - Done
23,758,210 UART: [art] Signing Cert with AUTHO
23,759,513 UART: RITY.KEYID = 7
25,464,674 UART: [art] Erasing AUTHORITY.KEYID = 7
25,466,153 UART: [art] PUB.X = F4D397EF9CCE7A41B56FC5AC93EF91B6FB2EA54735A00447D6A8B4F91587418FCAB751218A400E079BC2B656C9784739
25,473,478 UART: [art] PUB.Y = E076A83234E099E0E39FA77E8D52D5934392F924E40D7F3CB05AB34BDF9E5451EBA0FFAC86247446421EA3EE43D50CB1
25,480,752 UART: [art] SIG.R = C43ED3BE8C67BAC9B32526717B739FD281BE6A90AE5B92C6D8EA3DB66B44C5A9C91A2B890D7FD938F73ACC2CDFD9FDC1
25,488,167 UART: [art] SIG.S = D735822EF3FA43C7979192489FC55A3056C33A0FF137EFDF49F7911ED852B9A3A018A39571DB1FC35FF8A5D7C417D8E7
26,467,535 UART: Caliptra RT
26,468,251 UART: [state] CFI Enabled
26,585,339 UART: [rt] RT listening for mailbox commands...
26,587,815 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,742,958 UART: [rt]cmd =0x41544d4e, len=14344
31,525,835 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,439,021 ready_for_fw is high
3,439,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,830,725 >>> mbox cmd response: success
20,116,626 UART:
20,117,014 UART: Running Caliptra FMC ...
20,118,153 UART:
20,118,312 UART: [state] CFI Enabled
20,181,568 UART: [fht] FMC Alias Private Key: 7
21,945,235 UART: [art] Extend RT PCRs Done
21,946,457 UART: [art] Lock RT PCRs Done
21,948,216 UART: [art] Populate DV Done
21,953,874 UART: [fht] FMC Alias Private Key: 7
21,955,415 UART: [art] Derive CDI
21,956,231 UART: [art] Store in in slot 0x4
22,014,902 UART: [art] Derive Key Pair
22,015,968 UART: [art] Store priv key in slot 0x5
24,478,421 UART: [art] Derive Key Pair - Done
24,491,676 UART: [art] Signing Cert with AUTHO
24,492,985 UART: RITY.KEYID = 7
26,204,607 UART: [art] Erasing AUTHORITY.KEYID = 7
26,206,114 UART: [art] PUB.X = D234021CB03ACA1606628B936801A309518BA02405FF852C0BCA0D0C6C7C2DFF1949EB77802A5394478D68A2021A07E3
26,213,357 UART: [art] PUB.Y = 89F9A43B6687EA6104FBD83D9F2FD0A0A999B1E72053184563A27DECB076F4751307F67CAC13A72C538F68E896C345D1
26,220,612 UART: [art] SIG.R = 7C059DAA54DD102D183B5B30CAB93698D40954A60A065E5A835EB9D7960005C2BF9965EFB29EDCC30FC791E33FF888CA
26,228,155 UART: [art] SIG.S = 621562F99CA84B6771E3E87D8B2352F1BDCF7157507B99EBF10EA4E1862FCB4254BFBA9D7E9B04FFF43B915F5A7F6F1C
27,206,767 UART: Caliptra RT
27,207,460 UART: [state] CFI Enabled
27,371,549 UART: [rt] RT listening for mailbox commands...
27,373,897 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,529,784 UART: [rt]cmd =0x41544d4e, len=14344
32,321,240 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,755,874 ready_for_fw is high
3,756,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,087,827 >>> mbox cmd response: success
20,340,868 UART:
20,341,257 UART: Running Caliptra FMC ...
20,342,370 UART:
20,342,519 UART: [state] CFI Enabled
20,350,485 UART: [fht] FMC Alias Private Key: 7
22,107,179 UART: [art] Extend RT PCRs Done
22,108,402 UART: [art] Lock RT PCRs Done
22,109,942 UART: [art] Populate DV Done
22,115,323 UART: [fht] FMC Alias Private Key: 7
22,116,909 UART: [art] Derive CDI
22,117,637 UART: [art] Store in in slot 0x4
22,159,899 UART: [art] Derive Key Pair
22,160,957 UART: [art] Store priv key in slot 0x5
24,587,687 UART: [art] Derive Key Pair - Done
24,600,409 UART: [art] Signing Cert with AUTHO
24,602,230 UART: RITY.KEYID = 7
26,307,499 UART: [art] Erasing AUTHORITY.KEYID = 7
26,309,010 UART: [art] PUB.X = F9532ABA2A01A73C2F31B88D9D2460443BBF694E5E01E3AF7614A5756A823909BEEECD9E57E9F18155B6C0ED428361A8
26,316,283 UART: [art] PUB.Y = 4B06410A7DD009CCA75E547AB60E9F932D16D22AFF6610D8BE0261A70936F638883C0DD01BB7186FC31FFA8D1CCEEEDE
26,323,514 UART: [art] SIG.R = 96631E099027DE07C551E9BD1B2B50C4637103B4F06862B5714907581230C2CE88A12A8856DF692A0A16A18C880500C5
26,330,895 UART: [art] SIG.S = 026780CED6227F64E57DC4DF6B2951C20CF6E9F0C3E16A53430C834146A05D69FED7620E4C6A4BDC16F6413FD3F79DC5
27,310,036 UART: Caliptra RT
27,310,755 UART: [state] CFI Enabled
27,427,087 UART: [rt] RT listening for mailbox commands...
27,429,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,584,945 UART: [rt]cmd =0x41544d4e, len=14344
32,375,194 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,177 UART: [kat] SHA2-256
882,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,223 UART: [kat] ++
886,375 UART: [kat] sha1
890,663 UART: [kat] SHA2-256
892,601 UART: [kat] SHA2-384
895,362 UART: [kat] SHA2-512-ACC
897,263 UART: [kat] ECC-384
902,974 UART: [kat] HMAC-384Kdf
907,596 UART: [kat] LMS
1,475,792 UART: [kat] --
1,476,539 UART: [cold-reset] ++
1,476,963 UART: [fht] Storing FHT @ 0x50003400
1,479,780 UART: [idev] ++
1,479,948 UART: [idev] CDI.KEYID = 6
1,480,308 UART: [idev] SUBJECT.KEYID = 7
1,480,732 UART: [idev] UDS.KEYID = 0
1,481,077 ready_for_fw is high
1,481,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,460 UART: [idev] Erasing UDS.KEYID = 0
1,505,328 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,110 UART: [idev] --
1,515,089 UART: [ldev] ++
1,515,257 UART: [ldev] CDI.KEYID = 6
1,515,620 UART: [ldev] SUBJECT.KEYID = 5
1,516,046 UART: [ldev] AUTHORITY.KEYID = 7
1,516,509 UART: [ldev] FE.KEYID = 1
1,521,737 UART: [ldev] Erasing FE.KEYID = 1
1,546,720 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,714 UART: [ldev] --
1,586,101 UART: [fwproc] Waiting for Commands...
1,586,940 UART: [fwproc] Received command 0x46574c44
1,587,731 UART: [fwproc] Received Image of size 114448 bytes
5,272,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,300,605 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,329,957 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,466,022 >>> mbox cmd response: success
5,467,194 UART: [afmc] ++
5,467,362 UART: [afmc] CDI.KEYID = 6
5,467,724 UART: [afmc] SUBJECT.KEYID = 7
5,468,149 UART: [afmc] AUTHORITY.KEYID = 5
5,503,603 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,519,867 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,520,647 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,526,356 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,532,248 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,537,949 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,545,979 UART: [afmc] --
5,546,977 UART: [cold-reset] --
5,547,815 UART: [state] Locking Datavault
5,548,854 UART: [state] Locking PCR0, PCR1 and PCR31
5,549,458 UART: [state] Locking ICCM
5,550,090 UART: [exit] Launching FMC @ 0x40000130
5,555,419 UART:
5,555,435 UART: Running Caliptra FMC ...
5,555,843 UART:
5,555,897 UART: [state] CFI Enabled
5,566,443 UART: [fht] FMC Alias Private Key: 7
5,674,011 UART: [art] Extend RT PCRs Done
5,674,439 UART: [art] Lock RT PCRs Done
5,676,027 UART: [art] Populate DV Done
5,683,939 UART: [fht] FMC Alias Private Key: 7
5,684,997 UART: [art] Derive CDI
5,685,277 UART: [art] Store in in slot 0x4
5,770,624 UART: [art] Derive Key Pair
5,770,984 UART: [art] Store priv key in slot 0x5
5,783,972 UART: [art] Derive Key Pair - Done
5,798,383 UART: [art] Signing Cert with AUTHO
5,798,863 UART: RITY.KEYID = 7
5,813,709 UART: [art] Erasing AUTHORITY.KEYID = 7
5,814,474 UART: [art] PUB.X = 01307524251E48C2F7D32AE8A9FE0EB7AF4622AD6DC6B9CA0CCCAAFA7D30AB708C4D70B31DE094820867AB77C3548A65
5,821,248 UART: [art] PUB.Y = DDA644CED50065C556168F69BF706AACF084D28F7CB22D5E3BCBDB85589B77CE6576B1430EEEB169110A0A6F87FDF8F7
5,828,185 UART: [art] SIG.R = 68378E339C7A4258C4E8B357798F76838D37A76BF177FDE664A79CA169F9B2B60CE4D2EBB743EE5A493E981935F99A1A
5,834,956 UART: [art] SIG.S = FCBAD1523A688C8D809B43EDBB4839399D2792471405F79F346A67977E5598B65086D5E1102ED5559B802A32262285BF
5,858,814 UART: Caliptra RT
5,859,067 UART: [state] CFI Enabled
5,967,134 UART: [rt] RT listening for mailbox commands...
5,967,804 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,090,914 UART: [rt]cmd =0x41544d4e, len=14344
7,331,710 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,519 ready_for_fw is high
1,362,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,164,766 >>> mbox cmd response: success
5,226,203 UART:
5,226,219 UART: Running Caliptra FMC ...
5,226,627 UART:
5,226,681 UART: [state] CFI Enabled
5,237,433 UART: [fht] FMC Alias Private Key: 7
5,345,471 UART: [art] Extend RT PCRs Done
5,345,899 UART: [art] Lock RT PCRs Done
5,347,277 UART: [art] Populate DV Done
5,355,377 UART: [fht] FMC Alias Private Key: 7
5,356,519 UART: [art] Derive CDI
5,356,799 UART: [art] Store in in slot 0x4
5,442,220 UART: [art] Derive Key Pair
5,442,580 UART: [art] Store priv key in slot 0x5
5,456,112 UART: [art] Derive Key Pair - Done
5,471,030 UART: [art] Signing Cert with AUTHO
5,471,510 UART: RITY.KEYID = 7
5,487,210 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,975 UART: [art] PUB.X = 808884D2DD887834A2F7A7FF8D9F73AE56C2D719655D260F30F67346DFCB3BC7A8978FB92263D754CAA6258E39E69EDB
5,494,750 UART: [art] PUB.Y = F9B7876D9DBE0A179E9AAF8B1FE2BA13F78CA21214DC477B4CB9F79F1C896A01370ED808CEFE525BFA67578452EFE2E3
5,501,708 UART: [art] SIG.R = D4C7E797D5DF19763051F3889D18B4C720323FA0B85865D1394104AF8F649C4FBCA3F273FF401AD329CDB7B6F5BF5C34
5,508,483 UART: [art] SIG.S = 23B94BEC90F84634BD4A09C5E21407248516B7504020D8C8568457582E083F86193EFE1F377A05A56C7A1205FFCB0BA3
5,532,472 UART: Caliptra RT
5,532,725 UART: [state] CFI Enabled
5,640,340 UART: [rt] RT listening for mailbox commands...
5,641,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,038 UART: [rt]cmd =0x41544d4e, len=14344
6,997,217 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,678 UART: [kat] SHA2-256
892,616 UART: [kat] SHA2-384
895,409 UART: [kat] SHA2-512-ACC
897,310 UART: [kat] ECC-384
903,179 UART: [kat] HMAC-384Kdf
907,837 UART: [kat] LMS
1,476,033 UART: [kat] --
1,476,686 UART: [cold-reset] ++
1,477,212 UART: [fht] Storing FHT @ 0x50003400
1,479,969 UART: [idev] ++
1,480,137 UART: [idev] CDI.KEYID = 6
1,480,497 UART: [idev] SUBJECT.KEYID = 7
1,480,921 UART: [idev] UDS.KEYID = 0
1,481,266 ready_for_fw is high
1,481,266 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,943 UART: [idev] Erasing UDS.KEYID = 0
1,506,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,917 UART: [idev] --
1,515,766 UART: [ldev] ++
1,515,934 UART: [ldev] CDI.KEYID = 6
1,516,297 UART: [ldev] SUBJECT.KEYID = 5
1,516,723 UART: [ldev] AUTHORITY.KEYID = 7
1,517,186 UART: [ldev] FE.KEYID = 1
1,522,318 UART: [ldev] Erasing FE.KEYID = 1
1,547,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,589 UART: [ldev] --
1,586,936 UART: [fwproc] Waiting for Commands...
1,587,583 UART: [fwproc] Received command 0x46574c44
1,588,374 UART: [fwproc] Received Image of size 114448 bytes
5,274,942 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,304,116 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,333,468 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,469,485 >>> mbox cmd response: success
5,470,559 UART: [afmc] ++
5,470,727 UART: [afmc] CDI.KEYID = 6
5,471,089 UART: [afmc] SUBJECT.KEYID = 7
5,471,514 UART: [afmc] AUTHORITY.KEYID = 5
5,507,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,523,448 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,524,228 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,529,937 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,535,829 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,541,530 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,549,316 UART: [afmc] --
5,550,346 UART: [cold-reset] --
5,551,138 UART: [state] Locking Datavault
5,552,417 UART: [state] Locking PCR0, PCR1 and PCR31
5,553,021 UART: [state] Locking ICCM
5,553,529 UART: [exit] Launching FMC @ 0x40000130
5,558,858 UART:
5,558,874 UART: Running Caliptra FMC ...
5,559,282 UART:
5,559,425 UART: [state] CFI Enabled
5,569,993 UART: [fht] FMC Alias Private Key: 7
5,677,507 UART: [art] Extend RT PCRs Done
5,677,935 UART: [art] Lock RT PCRs Done
5,679,363 UART: [art] Populate DV Done
5,687,733 UART: [fht] FMC Alias Private Key: 7
5,688,785 UART: [art] Derive CDI
5,689,065 UART: [art] Store in in slot 0x4
5,774,862 UART: [art] Derive Key Pair
5,775,222 UART: [art] Store priv key in slot 0x5
5,788,076 UART: [art] Derive Key Pair - Done
5,802,755 UART: [art] Signing Cert with AUTHO
5,803,235 UART: RITY.KEYID = 7
5,818,005 UART: [art] Erasing AUTHORITY.KEYID = 7
5,818,770 UART: [art] PUB.X = 668230B5DFEFB52647E64114EBD2E18901875DCC94355A3A7CC9211076571869E901441F45737FA8F98390E7F232B8E0
5,825,526 UART: [art] PUB.Y = 84A1D8DFA49463DF6E0C8398B0F7D081C31088403BDED6C9D444FA0E65E2C5100B2047B893EF38E871C124634A90846B
5,832,469 UART: [art] SIG.R = CC7C39807DB15DC7171EBC8974880553A291A0D78957A5B682C785AA9BDD853774816D39D8E59B75360D6CBD474613C1
5,839,231 UART: [art] SIG.S = 6AC43769239C0EECD9F70E4C0FFEEECB8B512E75FE44AFF732058E0A4FF76ECF492C33BD522C59386FA5022502CA8239
5,863,101 UART: Caliptra RT
5,863,446 UART: [state] CFI Enabled
5,971,715 UART: [rt] RT listening for mailbox commands...
5,972,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,095,389 UART: [rt]cmd =0x41544d4e, len=14344
7,332,914 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,842 ready_for_fw is high
1,362,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,089,735 >>> mbox cmd response: success
5,151,250 UART:
5,151,266 UART: Running Caliptra FMC ...
5,151,674 UART:
5,151,817 UART: [state] CFI Enabled
5,162,289 UART: [fht] FMC Alias Private Key: 7
5,269,713 UART: [art] Extend RT PCRs Done
5,270,141 UART: [art] Lock RT PCRs Done
5,271,719 UART: [art] Populate DV Done
5,280,171 UART: [fht] FMC Alias Private Key: 7
5,281,107 UART: [art] Derive CDI
5,281,387 UART: [art] Store in in slot 0x4
5,367,042 UART: [art] Derive Key Pair
5,367,402 UART: [art] Store priv key in slot 0x5
5,380,624 UART: [art] Derive Key Pair - Done
5,395,139 UART: [art] Signing Cert with AUTHO
5,395,619 UART: RITY.KEYID = 7
5,410,907 UART: [art] Erasing AUTHORITY.KEYID = 7
5,411,672 UART: [art] PUB.X = 232B3429BA8F2203768B4BEA05386C76E21B016971297E93D23D7CB876B856A33E4D8CE69A522EAD97939D3B6560C62F
5,418,431 UART: [art] PUB.Y = 45A0E18AADE2AAF46EB9ACB7E35755EDA025D64C5DEC2174295958233AB3D42417B14BB2112707FA6E64CF53DF46EF88
5,425,392 UART: [art] SIG.R = 3C0ABAC1687FE31539E406C8504F67F6B5F229ECFCC4052B2A3DC899E5830DE8226FCEB3D38917C74F58273624F141DB
5,432,158 UART: [art] SIG.S = 56A6CFB0A036A0B3B798B989FBAC5342A0D487A945029368C041A972FA3D6302C6B18486C1DADC1CE19602CF689BAD7D
5,456,078 UART: Caliptra RT
5,456,423 UART: [state] CFI Enabled
5,565,655 UART: [rt] RT listening for mailbox commands...
5,566,325 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,689,239 UART: [rt]cmd =0x41544d4e, len=14344
6,922,390 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,758 UART: [state] LifecycleState = Unprovisioned
85,413 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,276 UART: [kat] SHA2-256
892,926 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,051 UART: [kat] ++
897,203 UART: [kat] sha1
901,597 UART: [kat] SHA2-256
903,537 UART: [kat] SHA2-384
906,080 UART: [kat] SHA2-512-ACC
907,981 UART: [kat] ECC-384
918,062 UART: [kat] HMAC-384Kdf
922,564 UART: [kat] LMS
1,170,892 UART: [kat] --
1,171,591 UART: [cold-reset] ++
1,172,031 UART: [fht] FHT @ 0x50003400
1,174,914 UART: [idev] ++
1,175,082 UART: [idev] CDI.KEYID = 6
1,175,442 UART: [idev] SUBJECT.KEYID = 7
1,175,866 UART: [idev] UDS.KEYID = 0
1,176,211 ready_for_fw is high
1,176,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,266 UART: [idev] Erasing UDS.KEYID = 0
1,200,263 UART: [idev] Sha1 KeyId Algorithm
1,208,563 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,246 UART: [ldev] SUBJECT.KEYID = 5
1,210,672 UART: [ldev] AUTHORITY.KEYID = 7
1,211,135 UART: [ldev] FE.KEYID = 1
1,216,163 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,021 UART: [ldev] --
1,282,532 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 114448 bytes
3,122,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,422 >>> mbox cmd response: success
3,316,576 UART: [afmc] ++
3,316,744 UART: [afmc] CDI.KEYID = 6
3,317,106 UART: [afmc] SUBJECT.KEYID = 7
3,317,531 UART: [afmc] AUTHORITY.KEYID = 5
3,352,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,010 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,719 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,611 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,322 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,277 UART: [afmc] --
3,396,337 UART: [cold-reset] --
3,397,189 UART: [state] Locking Datavault
3,398,162 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,766 UART: [state] Locking ICCM
3,399,234 UART: [exit] Launching FMC @ 0x40000130
3,404,563 UART:
3,404,579 UART: Running Caliptra FMC ...
3,404,987 UART:
3,405,041 UART: [state] CFI Enabled
3,415,505 UART: [fht] FMC Alias Private Key: 7
3,523,399 UART: [art] Extend RT PCRs Done
3,523,827 UART: [art] Lock RT PCRs Done
3,525,335 UART: [art] Populate DV Done
3,533,641 UART: [fht] FMC Alias Private Key: 7
3,534,607 UART: [art] Derive CDI
3,534,887 UART: [art] Store in in slot 0x4
3,620,634 UART: [art] Derive Key Pair
3,620,994 UART: [art] Store priv key in slot 0x5
3,633,924 UART: [art] Derive Key Pair - Done
3,648,729 UART: [art] Signing Cert with AUTHO
3,649,209 UART: RITY.KEYID = 7
3,664,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,082 UART: [art] PUB.X = 61911CBFE7AA4687B5BCA69F0B94CF973FB3E1449892CF68167404B3A6626D552DC27336E8F30327E5BE578A1466A35A
3,671,845 UART: [art] PUB.Y = 93D41917E83FA1824DABC74D89CD4DE088BAF1CE16831C4E2CA9CE371ED73B9323431911EC43C310F2706B47BF34D7EA
3,678,807 UART: [art] SIG.R = 0CD205E809F094E50A3504CDB23CA16E133C069C363B3183068EC902D0DA105EDBC3668B1737D3DA8A491B2B5312FEC0
3,685,559 UART: [art] SIG.S = C0C1433F9FC2C2ED189EA58191BE164C981B09FD56761782857309715743AD792455A7C1A28A68908749631C1FC32735
3,709,300 UART: Caliptra RT
3,709,553 UART: [state] CFI Enabled
3,817,103 UART: [rt] RT listening for mailbox commands...
3,817,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,653 UART: [rt]cmd =0x41544d4e, len=14344
5,193,418 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,763 ready_for_fw is high
1,060,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,176,062 >>> mbox cmd response: success
3,237,447 UART:
3,237,463 UART: Running Caliptra FMC ...
3,237,871 UART:
3,237,925 UART: [state] CFI Enabled
3,248,515 UART: [fht] FMC Alias Private Key: 7
3,356,535 UART: [art] Extend RT PCRs Done
3,356,963 UART: [art] Lock RT PCRs Done
3,358,307 UART: [art] Populate DV Done
3,366,375 UART: [fht] FMC Alias Private Key: 7
3,367,373 UART: [art] Derive CDI
3,367,653 UART: [art] Store in in slot 0x4
3,453,954 UART: [art] Derive Key Pair
3,454,314 UART: [art] Store priv key in slot 0x5
3,467,868 UART: [art] Derive Key Pair - Done
3,482,484 UART: [art] Signing Cert with AUTHO
3,482,964 UART: RITY.KEYID = 7
3,498,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,183 UART: [art] PUB.X = A94EE546674B8CCBC7BDA5BBC7EAB7E91C7C3DF3374E1E50D79CD996B9451FEF4E842C4F568C3C482ACD5DAACFCE77A3
3,505,985 UART: [art] PUB.Y = A693E992E9493A95907DA8C15A25EFFB12FD218E66F1B91A3D199F80C7E2E5BC900DDE5A615EC7F7E1D17F149DA86447
3,512,944 UART: [art] SIG.R = B41904151D1E39B1DEC3E151C248E54B1F6C6908EFFCB4EA90EAD393545858A004D44EB492EB2130B6D6A7B99D5ADAFA
3,519,721 UART: [art] SIG.S = 4B6BE7D3DE52EFEA84089ABDFA884B80C2EC43D16C6960B8AAA83F10FE911B39407FADC00DDBE63853FD815BD1CCE02F
3,543,600 UART: Caliptra RT
3,543,853 UART: [state] CFI Enabled
3,651,339 UART: [rt] RT listening for mailbox commands...
3,652,009 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,109 UART: [rt]cmd =0x41544d4e, len=14344
5,013,666 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,306 UART: [kat] SHA2-256
904,246 UART: [kat] SHA2-384
907,169 UART: [kat] SHA2-512-ACC
909,070 UART: [kat] ECC-384
918,565 UART: [kat] HMAC-384Kdf
923,329 UART: [kat] LMS
1,171,657 UART: [kat] --
1,172,824 UART: [cold-reset] ++
1,173,272 UART: [fht] FHT @ 0x50003400
1,176,105 UART: [idev] ++
1,176,273 UART: [idev] CDI.KEYID = 6
1,176,633 UART: [idev] SUBJECT.KEYID = 7
1,177,057 UART: [idev] UDS.KEYID = 0
1,177,402 ready_for_fw is high
1,177,402 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,163 UART: [idev] Erasing UDS.KEYID = 0
1,202,436 UART: [idev] Sha1 KeyId Algorithm
1,210,976 UART: [idev] --
1,211,892 UART: [ldev] ++
1,212,060 UART: [ldev] CDI.KEYID = 6
1,212,423 UART: [ldev] SUBJECT.KEYID = 5
1,212,849 UART: [ldev] AUTHORITY.KEYID = 7
1,213,312 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,168 UART: [ldev] --
1,284,587 UART: [fwproc] Wait for Commands...
1,285,289 UART: [fwproc] Recv command 0x46574c44
1,286,017 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,367 >>> mbox cmd response: success
3,324,407 UART: [afmc] ++
3,324,575 UART: [afmc] CDI.KEYID = 6
3,324,937 UART: [afmc] SUBJECT.KEYID = 7
3,325,362 UART: [afmc] AUTHORITY.KEYID = 5
3,360,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,627 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,336 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,228 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,939 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,672 UART: [afmc] --
3,403,748 UART: [cold-reset] --
3,404,482 UART: [state] Locking Datavault
3,405,703 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,307 UART: [state] Locking ICCM
3,406,793 UART: [exit] Launching FMC @ 0x40000130
3,412,122 UART:
3,412,138 UART: Running Caliptra FMC ...
3,412,546 UART:
3,412,689 UART: [state] CFI Enabled
3,423,409 UART: [fht] FMC Alias Private Key: 7
3,531,575 UART: [art] Extend RT PCRs Done
3,532,003 UART: [art] Lock RT PCRs Done
3,533,379 UART: [art] Populate DV Done
3,541,611 UART: [fht] FMC Alias Private Key: 7
3,542,787 UART: [art] Derive CDI
3,543,067 UART: [art] Store in in slot 0x4
3,628,666 UART: [art] Derive Key Pair
3,629,026 UART: [art] Store priv key in slot 0x5
3,641,778 UART: [art] Derive Key Pair - Done
3,656,920 UART: [art] Signing Cert with AUTHO
3,657,400 UART: RITY.KEYID = 7
3,672,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,329 UART: [art] PUB.X = FF135398781122307BA6A5CB249D31D76B1F3317FB225D4F2565E964715895DC9E78A64A9371F5778B7AACADA80C43B5
3,680,096 UART: [art] PUB.Y = 790D372770BAFB1D6F2523F29164B426A127D0B006BC1941C9F9CAAC4A578260DFECEBAAC7764DA29AFC6DEE94E2FDC5
3,687,062 UART: [art] SIG.R = E28A02F3BF5C90680224951A461258C69C0C8C9D7CFC96C5BF77E603CCF1ABA5C6B0EA2DFB2AE5D6EBDC636A7F06E0E2
3,693,841 UART: [art] SIG.S = C2EC76BD956C55A19137C710D89F056630CF3444759F51A7254A3253B094C0CDC3FC92329DFBDADFBC309492E4AA76BD
3,717,607 UART: Caliptra RT
3,717,952 UART: [state] CFI Enabled
3,825,607 UART: [rt] RT listening for mailbox commands...
3,826,277 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,341 UART: [rt]cmd =0x41544d4e, len=14344
5,179,901 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,062,096 ready_for_fw is high
1,062,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,182,909 >>> mbox cmd response: success
3,245,702 UART:
3,245,718 UART: Running Caliptra FMC ...
3,246,126 UART:
3,246,269 UART: [state] CFI Enabled
3,257,085 UART: [fht] FMC Alias Private Key: 7
3,364,969 UART: [art] Extend RT PCRs Done
3,365,397 UART: [art] Lock RT PCRs Done
3,367,285 UART: [art] Populate DV Done
3,375,531 UART: [fht] FMC Alias Private Key: 7
3,376,663 UART: [art] Derive CDI
3,376,943 UART: [art] Store in in slot 0x4
3,462,204 UART: [art] Derive Key Pair
3,462,564 UART: [art] Store priv key in slot 0x5
3,475,644 UART: [art] Derive Key Pair - Done
3,490,455 UART: [art] Signing Cert with AUTHO
3,490,935 UART: RITY.KEYID = 7
3,506,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,507,100 UART: [art] PUB.X = 8554EEC581E7300A0023FB3DBCDEDEEF9EE66DB62216971BF546D90642C4E654A6CE54AAC8D068A30AB7ECDDFE124832
3,513,859 UART: [art] PUB.Y = EF09F5F3C8CA991D5F0A43809A1C114D4D7E05E782245CD7A994C62BC0BFFDC4A71765E0B283257C6CE90D2720E10492
3,520,802 UART: [art] SIG.R = C11FFBF36DFAC52DFE0C3DC9055FD18BEBFF47452EAE2C666091A11B7177196BF0A886B28E317FD7E6F291237D19E365
3,527,582 UART: [art] SIG.S = 23348ADB4C6B0B693F462210D3802A9185E9934C1D4C9B3EAABF32FDB1819E6A11C71F41D32704A2FDFA6E3EF2913E53
3,551,245 UART: Caliptra RT
3,551,590 UART: [state] CFI Enabled
3,659,308 UART: [rt] RT listening for mailbox commands...
3,659,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,783,332 UART: [rt]cmd =0x41544d4e, len=14344
5,018,680 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,802 UART: [kat] LMS
1,169,114 UART: [kat] --
1,169,821 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,919 UART: [idev] ++
1,173,087 UART: [idev] CDI.KEYID = 6
1,173,448 UART: [idev] SUBJECT.KEYID = 7
1,173,873 UART: [idev] UDS.KEYID = 0
1,174,219 ready_for_fw is high
1,174,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,587 UART: [idev] Sha1 KeyId Algorithm
1,207,421 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,215,142 UART: [ldev] Erasing FE.KEYID = 1
1,241,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,406 UART: [ldev] --
1,280,712 UART: [fwproc] Wait for Commands...
1,281,301 UART: [fwproc] Recv command 0x46574c44
1,282,034 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,218 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,322,110 >>> mbox cmd response: success
3,323,263 UART: [afmc] ++
3,323,431 UART: [afmc] CDI.KEYID = 6
3,323,794 UART: [afmc] SUBJECT.KEYID = 7
3,324,220 UART: [afmc] AUTHORITY.KEYID = 5
3,359,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,869 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,579 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,469 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,180 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,086 UART: [afmc] --
3,403,116 UART: [cold-reset] --
3,403,746 UART: [state] Locking Datavault
3,404,721 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,325 UART: [state] Locking ICCM
3,405,763 UART: [exit] Launching FMC @ 0x40000130
3,411,092 UART:
3,411,108 UART: Running Caliptra FMC ...
3,411,516 UART:
3,411,570 UART: [state] CFI Enabled
3,422,380 UART: [fht] FMC Alias Private Key: 7
3,529,950 UART: [art] Extend RT PCRs Done
3,530,378 UART: [art] Lock RT PCRs Done
3,531,738 UART: [art] Populate DV Done
3,539,920 UART: [fht] FMC Alias Private Key: 7
3,540,954 UART: [art] Derive CDI
3,541,234 UART: [art] Store in in slot 0x4
3,627,107 UART: [art] Derive Key Pair
3,627,467 UART: [art] Store priv key in slot 0x5
3,640,725 UART: [art] Derive Key Pair - Done
3,655,649 UART: [art] Signing Cert with AUTHO
3,656,129 UART: RITY.KEYID = 7
3,671,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,156 UART: [art] PUB.X = 6E5B9376119370C5CE1E0B72BE44AD95685E5232095AA12F83CEA48C09EAAE9FA1AF86A1890FE33FC7408BEB2CDBF426
3,678,930 UART: [art] PUB.Y = 254E436058D47EB8032CE9EDB041B4EEEBDD10F5A7B6BC26A90B142ADFCA166F5872549217DD753B5F5BA6FF444E816A
3,685,890 UART: [art] SIG.R = F64F2DA00FEEAE367DD39B107037715F7427B0772B70A568B915D3027A0F1B9209478CD4B7407D0566A2F9216B9A9D4A
3,692,645 UART: [art] SIG.S = 84E9211B0F61904A2FD9BA892735802CC758B38A0A0572BEECA6F1DFF9EB43029BDF99228DC3E13DC834F0D4121484F8
3,716,672 UART: Caliptra RT
3,716,925 UART: [state] CFI Enabled
3,824,972 UART: [rt] RT listening for mailbox commands...
3,825,642 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,802 UART: [rt]cmd =0x41544d4e, len=14344
5,179,232 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,514 ready_for_fw is high
1,056,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,905 >>> mbox cmd response: success
3,233,060 UART:
3,233,076 UART: Running Caliptra FMC ...
3,233,484 UART:
3,233,538 UART: [state] CFI Enabled
3,243,730 UART: [fht] FMC Alias Private Key: 7
3,351,146 UART: [art] Extend RT PCRs Done
3,351,574 UART: [art] Lock RT PCRs Done
3,352,828 UART: [art] Populate DV Done
3,361,104 UART: [fht] FMC Alias Private Key: 7
3,362,098 UART: [art] Derive CDI
3,362,378 UART: [art] Store in in slot 0x4
3,448,143 UART: [art] Derive Key Pair
3,448,503 UART: [art] Store priv key in slot 0x5
3,461,811 UART: [art] Derive Key Pair - Done
3,476,921 UART: [art] Signing Cert with AUTHO
3,477,401 UART: RITY.KEYID = 7
3,492,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,238 UART: [art] PUB.X = 596D19C307A7AC593581386B4783CB0C88653FBFF228E1BF00B26E442AD75689DF688754CF12D01ACCB6BF04B16540A6
3,499,981 UART: [art] PUB.Y = 56BF9B4416A2F10C8A8B452A2E1F1AA20BB08B59B70FBBEB053077733D5275041594559991E1CFB8D99ECEDC9A7BFEE5
3,506,930 UART: [art] SIG.R = 04024B127858CAE8199ED824B1DD8CC84F82DDB7F4B3468421382F0216E6EED334D29C80833806299D42C8EF0EB449A4
3,513,685 UART: [art] SIG.S = E66080739A4DE2821F8FBD9BCCF0A4DCEB653A5F3BD571BF9A4970B661EF8A8BF3319F298FA4257167CC39104B1F8273
3,537,724 UART: Caliptra RT
3,537,977 UART: [state] CFI Enabled
3,645,615 UART: [rt] RT listening for mailbox commands...
3,646,285 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,205 UART: [rt]cmd =0x41544d4e, len=14344
5,001,948 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,170,102 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,220 UART: [idev] ++
1,173,388 UART: [idev] CDI.KEYID = 6
1,173,749 UART: [idev] SUBJECT.KEYID = 7
1,174,174 UART: [idev] UDS.KEYID = 0
1,174,520 ready_for_fw is high
1,174,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,970 UART: [idev] Erasing UDS.KEYID = 0
1,199,094 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,241,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,967 UART: [ldev] --
1,281,333 UART: [fwproc] Wait for Commands...
1,282,078 UART: [fwproc] Recv command 0x46574c44
1,282,811 UART: [fwproc] Recv'd Img size: 114448 bytes
3,118,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,311,231 >>> mbox cmd response: success
3,312,260 UART: [afmc] ++
3,312,428 UART: [afmc] CDI.KEYID = 6
3,312,791 UART: [afmc] SUBJECT.KEYID = 7
3,313,217 UART: [afmc] AUTHORITY.KEYID = 5
3,349,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,146 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,856 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,746 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,457 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,259 UART: [afmc] --
3,392,307 UART: [cold-reset] --
3,393,131 UART: [state] Locking Datavault
3,394,338 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,942 UART: [state] Locking ICCM
3,395,566 UART: [exit] Launching FMC @ 0x40000130
3,400,895 UART:
3,400,911 UART: Running Caliptra FMC ...
3,401,319 UART:
3,401,462 UART: [state] CFI Enabled
3,412,372 UART: [fht] FMC Alias Private Key: 7
3,519,998 UART: [art] Extend RT PCRs Done
3,520,426 UART: [art] Lock RT PCRs Done
3,522,122 UART: [art] Populate DV Done
3,530,456 UART: [fht] FMC Alias Private Key: 7
3,531,556 UART: [art] Derive CDI
3,531,836 UART: [art] Store in in slot 0x4
3,617,603 UART: [art] Derive Key Pair
3,617,963 UART: [art] Store priv key in slot 0x5
3,631,011 UART: [art] Derive Key Pair - Done
3,645,751 UART: [art] Signing Cert with AUTHO
3,646,231 UART: RITY.KEYID = 7
3,661,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,472 UART: [art] PUB.X = 3D4FFF35FA1B6508EBF4F113E9B6248E04F442C0BAEEDAD2F49201F7974062B23D3641D776F4845ADBEB591B1B47A04F
3,669,247 UART: [art] PUB.Y = 84B88E2F8AC527C779C87D6E40988389DC86DA88C9254E941343105DEFED951B0CD572E493BAE5B2F81D4FB3004D7990
3,676,176 UART: [art] SIG.R = 73C8C8CF79EC6CBDC9597ECCC139E32879C1913600757202A23DCF7FBBDE60AE453E9587FCD2A69E8EFDCCC8FB8AF6D7
3,682,947 UART: [art] SIG.S = 9A13BB1FB02FB71B996908E767A43316A0DE9865B11C90782EBE8F86F345A2CB546BA79564DE272E58BA7DF6DCAAE0B1
3,706,463 UART: Caliptra RT
3,706,808 UART: [state] CFI Enabled
3,815,894 UART: [rt] RT listening for mailbox commands...
3,816,564 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,458 UART: [rt]cmd =0x41544d4e, len=14344
5,170,090 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,991 ready_for_fw is high
1,056,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,160,869 >>> mbox cmd response: success
3,223,684 UART:
3,223,700 UART: Running Caliptra FMC ...
3,224,108 UART:
3,224,251 UART: [state] CFI Enabled
3,234,713 UART: [fht] FMC Alias Private Key: 7
3,342,401 UART: [art] Extend RT PCRs Done
3,342,829 UART: [art] Lock RT PCRs Done
3,344,565 UART: [art] Populate DV Done
3,352,829 UART: [fht] FMC Alias Private Key: 7
3,353,787 UART: [art] Derive CDI
3,354,067 UART: [art] Store in in slot 0x4
3,439,750 UART: [art] Derive Key Pair
3,440,110 UART: [art] Store priv key in slot 0x5
3,453,650 UART: [art] Derive Key Pair - Done
3,468,314 UART: [art] Signing Cert with AUTHO
3,468,794 UART: RITY.KEYID = 7
3,483,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,655 UART: [art] PUB.X = C494EA5A7742A780B21C93FD81CBF81475E7BE5369490305209D02903F2FB66BFD3CFF3588A021327C75D1B84D31A6DD
3,491,420 UART: [art] PUB.Y = 68BEE92620A454029488027B634FB952029A18269B68A9ED0874351DC08F5E743C6A94D54F1E55BE35E5FEC632701122
3,498,350 UART: [art] SIG.R = A017F218B7AADB7952B23A2BFD63F0101118086424B19D481ACFA6EB7EAC9CFCF5F91ED10B8A87E1244369A5C832F9C7
3,505,128 UART: [art] SIG.S = 361F40E04C480B23FEEFB670C6DC25A15636EA546E0794B852829FE03511D36AB10CCCECADE5C5B6C0039F0751DF18DB
3,528,706 UART: Caliptra RT
3,529,051 UART: [state] CFI Enabled
3,636,965 UART: [rt] RT listening for mailbox commands...
3,637,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,859 UART: [rt]cmd =0x41544d4e, len=14344
5,006,185 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,146 UART:
192,497 UART: Running Caliptra ROM ...
193,679 UART:
193,833 UART: [state] CFI Enabled
267,133 UART: [state] LifecycleState = Unprovisioned
269,103 UART: [state] DebugLocked = No
271,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,457 UART: [kat] SHA2-256
446,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,651 UART: [kat] ++
457,131 UART: [kat] sha1
468,792 UART: [kat] SHA2-256
471,506 UART: [kat] SHA2-384
477,568 UART: [kat] SHA2-512-ACC
479,933 UART: [kat] ECC-384
2,765,707 UART: [kat] HMAC-384Kdf
2,778,497 UART: [kat] LMS
3,968,804 UART: [kat] --
3,974,600 UART: [cold-reset] ++
3,976,322 UART: [fht] Storing FHT @ 0x50003400
3,988,154 UART: [idev] ++
3,988,726 UART: [idev] CDI.KEYID = 6
3,989,765 UART: [idev] SUBJECT.KEYID = 7
3,990,955 UART: [idev] UDS.KEYID = 0
3,991,969 ready_for_fw is high
3,992,173 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,715 UART: [idev] Erasing UDS.KEYID = 0
7,325,593 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,900 UART: [idev] --
7,352,215 UART: [ldev] ++
7,352,780 UART: [ldev] CDI.KEYID = 6
7,353,717 UART: [ldev] SUBJECT.KEYID = 5
7,354,984 UART: [ldev] AUTHORITY.KEYID = 7
7,356,134 UART: [ldev] FE.KEYID = 1
7,398,618 UART: [ldev] Erasing FE.KEYID = 1
10,731,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,106 UART: [ldev] --
13,093,381 UART: [fwproc] Waiting for Commands...
13,096,672 UART: [fwproc] Received command 0x46574c44
13,098,857 UART: [fwproc] Received Image of size 114124 bytes
21,659,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,738,836 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,807,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,125,602 >>> mbox cmd response: success
22,130,603 UART: [afmc] ++
22,131,226 UART: [afmc] CDI.KEYID = 6
22,132,115 UART: [afmc] SUBJECT.KEYID = 7
22,133,392 UART: [afmc] AUTHORITY.KEYID = 5
25,498,925 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,802,988 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,805,293 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,819,807 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,834,549 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,848,734 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,870,680 UART: [afmc] --
27,874,660 UART: [cold-reset] --
27,879,331 UART: [state] Locking Datavault
27,883,012 UART: [state] Locking PCR0, PCR1 and PCR31
27,884,766 UART: [state] Locking ICCM
27,887,441 UART: [exit] Launching FMC @ 0x40000130
27,895,832 UART:
27,896,074 UART: Running Caliptra FMC ...
27,897,105 UART:
27,897,254 UART: [state] CFI Enabled
27,961,016 UART: [fht] FMC Alias Private Key: 7
30,298,547 UART: [art] Extend RT PCRs Done
30,299,767 UART: [art] Lock RT PCRs Done
30,301,602 UART: [art] Populate DV Done
30,307,230 UART: [fht] FMC Alias Private Key: 7
30,308,820 UART: [art] Derive CDI
30,309,638 UART: [art] Store in in slot 0x4
30,371,501 UART: [art] Derive Key Pair
30,372,554 UART: [art] Store priv key in slot 0x5
33,665,224 UART: [art] Derive Key Pair - Done
33,678,606 UART: [art] Signing Cert with AUTHO
33,679,916 UART: RITY.KEYID = 7
35,966,116 UART: [art] Erasing AUTHORITY.KEYID = 7
35,967,763 UART: [art] PUB.X = 8A5570E99A59CBA4123B24E569F1EA3DA10C89CEA3A8C72E98A016AECCDD0745637FE7A555117A7E86679A4C383F2083
35,974,896 UART: [art] PUB.Y = 03691BE6062E61AAE7EFC8B5AAAFACB0E805F5453E1D31C93FBD45AC3EEFEB5511F10F38902DDF89DBA6CE6476E63415
35,982,134 UART: [art] SIG.R = B885D318BF82733D5E6855549AE765659F4DB29ECDA959F91C49B9FFFA8841B3BDE0AF7962D8CF85E234A68138FE0DF6
35,989,532 UART: [art] SIG.S = EBF84B28DC3420CB0256352AF1B90723542DEA0D4DD60322B1A2D86D22ADD5EF805AD0BD854BDA3D048BAE201EEA1D8C
37,294,864 UART: Caliptra RT
37,295,585 UART: [state] CFI Enabled
37,456,450 UART: [rt] RT listening for mailbox commands...
37,458,755 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,613,968 UART: [rt]cmd =0x41544d4e, len=14344
41,723,220 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,807,086 ready_for_fw is high
3,807,687 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,156,856 >>> mbox cmd response: success
27,850,807 UART:
27,851,181 UART: Running Caliptra FMC ...
27,852,294 UART:
27,852,449 UART: [state] CFI Enabled
27,921,190 UART: [fht] FMC Alias Private Key: 7
30,259,192 UART: [art] Extend RT PCRs Done
30,260,418 UART: [art] Lock RT PCRs Done
30,262,183 UART: [art] Populate DV Done
30,267,744 UART: [fht] FMC Alias Private Key: 7
30,269,392 UART: [art] Derive CDI
30,270,136 UART: [art] Store in in slot 0x4
30,329,934 UART: [art] Derive Key Pair
30,330,939 UART: [art] Store priv key in slot 0x5
33,623,461 UART: [art] Derive Key Pair - Done
33,636,557 UART: [art] Signing Cert with AUTHO
33,637,873 UART: RITY.KEYID = 7
35,926,267 UART: [art] Erasing AUTHORITY.KEYID = 7
35,928,269 UART: [art] PUB.X = 90FFAB90C099F34B0C9C359460FFD041184BED8439A2AB836F1AB87E74BA0D4B330D25D8D0D3F97AC71247456CD25924
35,935,242 UART: [art] PUB.Y = 1B2CFA7D73619F54E37CA07433B456FDC897FE8D3980BF51C0F37EE725B09D6FD3CF7AED58CEDA4B491BC309D4C81A27
35,942,257 UART: [art] SIG.R = 13C8CD81D08425EAB9E6A37D894455EBF1C76A45E9D0A023437540AB97806DDD5DC8E9B8C82602DBFFF671F8A6BB695E
35,949,683 UART: [art] SIG.S = 830B1EC15030732AD19E266B1DC824A95E8DC3CF1948CA5F335988C0DCB1FCD44CD226B83600365FF23D54D6FD60DE45
37,254,416 UART: Caliptra RT
37,255,133 UART: [state] CFI Enabled
37,418,310 UART: [rt] RT listening for mailbox commands...
37,420,633 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,575,887 UART: [rt]cmd =0x41544d4e, len=14344
41,711,145 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,441 UART:
192,807 UART: Running Caliptra ROM ...
193,996 UART:
603,865 UART: [state] CFI Enabled
617,457 UART: [state] LifecycleState = Unprovisioned
619,387 UART: [state] DebugLocked = No
622,107 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,513 UART: [kat] SHA2-256
796,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,797 UART: [kat] ++
807,324 UART: [kat] sha1
819,200 UART: [kat] SHA2-256
821,925 UART: [kat] SHA2-384
828,481 UART: [kat] SHA2-512-ACC
830,839 UART: [kat] ECC-384
3,113,701 UART: [kat] HMAC-384Kdf
3,124,943 UART: [kat] LMS
4,315,011 UART: [kat] --
4,320,389 UART: [cold-reset] ++
4,321,970 UART: [fht] Storing FHT @ 0x50003400
4,333,590 UART: [idev] ++
4,334,148 UART: [idev] CDI.KEYID = 6
4,335,095 UART: [idev] SUBJECT.KEYID = 7
4,336,332 UART: [idev] UDS.KEYID = 0
4,337,275 ready_for_fw is high
4,337,480 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,853 UART: [idev] Erasing UDS.KEYID = 0
7,622,921 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,095 UART: [idev] --
7,649,115 UART: [ldev] ++
7,649,690 UART: [ldev] CDI.KEYID = 6
7,650,622 UART: [ldev] SUBJECT.KEYID = 5
7,651,824 UART: [ldev] AUTHORITY.KEYID = 7
7,653,099 UART: [ldev] FE.KEYID = 1
7,665,861 UART: [ldev] Erasing FE.KEYID = 1
10,951,294 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,057 UART: [ldev] --
13,311,557 UART: [fwproc] Waiting for Commands...
13,314,129 UART: [fwproc] Received command 0x46574c44
13,316,324 UART: [fwproc] Received Image of size 114124 bytes
22,189,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,268,450 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,337,381 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,654,732 >>> mbox cmd response: success
22,658,496 UART: [afmc] ++
22,659,100 UART: [afmc] CDI.KEYID = 6
22,660,012 UART: [afmc] SUBJECT.KEYID = 7
22,661,279 UART: [afmc] AUTHORITY.KEYID = 5
25,974,083 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,268,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,270,449 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,285,021 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,299,750 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,313,953 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,336,669 UART: [afmc] --
28,340,014 UART: [cold-reset] --
28,342,741 UART: [state] Locking Datavault
28,348,412 UART: [state] Locking PCR0, PCR1 and PCR31
28,350,103 UART: [state] Locking ICCM
28,351,740 UART: [exit] Launching FMC @ 0x40000130
28,360,128 UART:
28,360,355 UART: Running Caliptra FMC ...
28,361,451 UART:
28,361,603 UART: [state] CFI Enabled
28,369,972 UART: [fht] FMC Alias Private Key: 7
30,700,371 UART: [art] Extend RT PCRs Done
30,701,590 UART: [art] Lock RT PCRs Done
30,703,293 UART: [art] Populate DV Done
30,708,699 UART: [fht] FMC Alias Private Key: 7
30,710,393 UART: [art] Derive CDI
30,711,196 UART: [art] Store in in slot 0x4
30,753,748 UART: [art] Derive Key Pair
30,754,746 UART: [art] Store priv key in slot 0x5
33,997,120 UART: [art] Derive Key Pair - Done
34,009,962 UART: [art] Signing Cert with AUTHO
34,011,268 UART: RITY.KEYID = 7
36,291,044 UART: [art] Erasing AUTHORITY.KEYID = 7
36,292,543 UART: [art] PUB.X = BFC3603526AB383D2A50A9790B08746A52E9E408F0519ECEFFC911FA59B50DDE9FDB85EC8B9D489CF0F27751AB9411CF
36,299,821 UART: [art] PUB.Y = 177442025C44AF69B2B4841C7BDE73B0A8331416DF8DBBF2CDB8FFFC750957EFAC5D9F7CF9833D75BA675B3386466221
36,307,094 UART: [art] SIG.R = 322CA0D818D9D8B8462EC2C6C6E3D6268E488F4B8035A693BA6B237B15D9863365BC13CDF2245FC6E609D755D8BA999D
36,314,423 UART: [art] SIG.S = 4B26D89EB2AFC942ADF9A403BA07F98D1EEBB94A6DCF47F83870F6C68810631E713EEC3885C86C4F8C2FB41568FB6374
37,619,868 UART: Caliptra RT
37,620,587 UART: [state] CFI Enabled
37,738,565 UART: [rt] RT listening for mailbox commands...
37,740,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,896,101 UART: [rt]cmd =0x41544d4e, len=14344
41,953,476 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,130,459 ready_for_fw is high
4,131,074 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,315,655 >>> mbox cmd response: success
27,954,987 UART:
27,955,417 UART: Running Caliptra FMC ...
27,956,517 UART:
27,956,671 UART: [state] CFI Enabled
27,964,918 UART: [fht] FMC Alias Private Key: 7
30,294,968 UART: [art] Extend RT PCRs Done
30,296,198 UART: [art] Lock RT PCRs Done
30,297,568 UART: [art] Populate DV Done
30,302,905 UART: [fht] FMC Alias Private Key: 7
30,304,549 UART: [art] Derive CDI
30,305,360 UART: [art] Store in in slot 0x4
30,347,918 UART: [art] Derive Key Pair
30,348,958 UART: [art] Store priv key in slot 0x5
33,590,868 UART: [art] Derive Key Pair - Done
33,603,545 UART: [art] Signing Cert with AUTHO
33,604,883 UART: RITY.KEYID = 7
35,883,928 UART: [art] Erasing AUTHORITY.KEYID = 7
35,885,436 UART: [art] PUB.X = 12308F057B685E0DE11A11677F27B3DFD666F5A427F085AA4E1BAE402F9FC12A9DDC3C44AFFE47638591767665B7CD1E
35,892,728 UART: [art] PUB.Y = F45DCBEF85354B990A1EC8D24AD69B6F3ED816A05A786F3F4120186197D7B0CAF63FA90FAE0C189DB0F7AD1CEB20A5AD
35,899,974 UART: [art] SIG.R = 672D176F350F94E69CA6BC9EC276F06C98D5DF62F914030673783DCA7F8F5A1383DA80EC7735107716EDFD4F286AC012
35,907,364 UART: [art] SIG.S = AF54BAFBD46F28863E8FCC54E9E1B15F8EDCFD69D9C3EC058AFAB2008BBE1E9BE1B3850E8E01570B40A0B2E8F6CB0979
37,212,397 UART: Caliptra RT
37,213,111 UART: [state] CFI Enabled
37,332,288 UART: [rt] RT listening for mailbox commands...
37,334,625 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,489,994 UART: [rt]cmd =0x41544d4e, len=14344
41,625,385 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,851 writing to cptra_bootfsm_go
193,148 UART:
193,491 UART: Running Caliptra ROM ...
194,678 UART:
194,839 UART: [state] CFI Enabled
268,309 UART: [state] LifecycleState = Unprovisioned
270,182 UART: [state] DebugLocked = No
272,010 UART: [state] WD Timer not started. Device not locked for debugging
275,708 UART: [kat] SHA2-256
454,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,393 UART: [kat] ++
466,925 UART: [kat] sha1
477,521 UART: [kat] SHA2-256
480,596 UART: [kat] SHA2-384
486,832 UART: [kat] SHA2-512-ACC
489,743 UART: [kat] ECC-384
2,948,328 UART: [kat] HMAC-384Kdf
2,973,463 UART: [kat] LMS
3,502,959 UART: [kat] --
3,506,479 UART: [cold-reset] ++
3,508,410 UART: [fht] FHT @ 0x50003400
3,520,239 UART: [idev] ++
3,520,821 UART: [idev] CDI.KEYID = 6
3,521,705 UART: [idev] SUBJECT.KEYID = 7
3,523,267 UART: [idev] UDS.KEYID = 0
3,524,177 ready_for_fw is high
3,524,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,163 UART: [idev] Erasing UDS.KEYID = 0
6,027,051 UART: [idev] Sha1 KeyId Algorithm
6,050,350 UART: [idev] --
6,054,834 UART: [ldev] ++
6,055,407 UART: [ldev] CDI.KEYID = 6
6,056,295 UART: [ldev] SUBJECT.KEYID = 5
6,057,513 UART: [ldev] AUTHORITY.KEYID = 7
6,058,673 UART: [ldev] FE.KEYID = 1
6,102,336 UART: [ldev] Erasing FE.KEYID = 1
8,603,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,880 UART: [ldev] --
10,395,009 UART: [fwproc] Wait for Commands...
10,396,562 UART: [fwproc] Recv command 0x46574c44
10,398,656 UART: [fwproc] Recv'd Img size: 114448 bytes
14,979,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,050,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,119,056 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,437,777 >>> mbox cmd response: success
15,442,340 UART: [afmc] ++
15,443,135 UART: [afmc] CDI.KEYID = 6
15,444,035 UART: [afmc] SUBJECT.KEYID = 7
15,445,143 UART: [afmc] AUTHORITY.KEYID = 5
17,985,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,706,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,708,610 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,724,569 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,740,554 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,756,325 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,780,144 UART: [afmc] --
19,784,015 UART: [cold-reset] --
19,787,290 UART: [state] Locking Datavault
19,792,159 UART: [state] Locking PCR0, PCR1 and PCR31
19,793,856 UART: [state] Locking ICCM
19,796,495 UART: [exit] Launching FMC @ 0x40000130
19,804,939 UART:
19,805,168 UART: Running Caliptra FMC ...
19,806,266 UART:
19,806,431 UART: [state] CFI Enabled
19,866,905 UART: [fht] FMC Alias Private Key: 7
21,631,087 UART: [art] Extend RT PCRs Done
21,632,305 UART: [art] Lock RT PCRs Done
21,633,787 UART: [art] Populate DV Done
21,639,091 UART: [fht] FMC Alias Private Key: 7
21,640,734 UART: [art] Derive CDI
21,641,470 UART: [art] Store in in slot 0x4
21,699,384 UART: [art] Derive Key Pair
21,700,421 UART: [art] Store priv key in slot 0x5
24,163,241 UART: [art] Derive Key Pair - Done
24,176,177 UART: [art] Signing Cert with AUTHO
24,177,484 UART: RITY.KEYID = 7
25,889,508 UART: [art] Erasing AUTHORITY.KEYID = 7
25,891,007 UART: [art] PUB.X = B6A805B47BFA6B56B341C415EE185F83DAC34D279BDD647D3F77DCECF4E8E5541999341015BEDBAAADC0E51C853ED721
25,898,331 UART: [art] PUB.Y = 2E7E6484DF6272EFDEEA0F3A03CE01798441B92C6D410389BC9C6BBD00449F96818BEE6A1430F0D6FF8DBC464F4D9C82
25,905,572 UART: [art] SIG.R = 150940F782171C4EBF657CD32ED8A83BBC0ED74E70DABF1F1A04EC8140DE5044BF4E14E14B56EB5FDB84FB53F4B931D7
25,912,974 UART: [art] SIG.S = 8D8BECC8D2E5CF6B81A73D84720D35C71539677B106B8DA185B26AD99032CD867A4BF0F2396FB975048D04B4DA31877A
26,891,666 UART: Caliptra RT
26,892,393 UART: [state] CFI Enabled
27,058,922 UART: [rt] RT listening for mailbox commands...
27,061,258 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,217,333 UART: [rt]cmd =0x41544d4e, len=14344
29,573,960 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,379,034 ready_for_fw is high
3,379,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,056,565 >>> mbox cmd response: success
19,339,479 UART:
19,339,870 UART: Running Caliptra FMC ...
19,341,069 UART:
19,341,244 UART: [state] CFI Enabled
19,405,183 UART: [fht] FMC Alias Private Key: 7
21,169,308 UART: [art] Extend RT PCRs Done
21,170,534 UART: [art] Lock RT PCRs Done
21,172,371 UART: [art] Populate DV Done
21,177,795 UART: [fht] FMC Alias Private Key: 7
21,179,381 UART: [art] Derive CDI
21,180,204 UART: [art] Store in in slot 0x4
21,238,761 UART: [art] Derive Key Pair
21,239,763 UART: [art] Store priv key in slot 0x5
23,702,939 UART: [art] Derive Key Pair - Done
23,715,950 UART: [art] Signing Cert with AUTHO
23,717,264 UART: RITY.KEYID = 7
25,428,826 UART: [art] Erasing AUTHORITY.KEYID = 7
25,430,324 UART: [art] PUB.X = 7C30450EAA2832A8A335DAD16ABCDDAA23F6241C991E79DB061F8A735BDFA2AE48206428F30404191EED7B64C4014696
25,437,626 UART: [art] PUB.Y = 082C9F5850A064BEDB59FA3DDC9F230150DB6F8AF6A4E29372F7E2E62F6555C353229D595226B39AEEB951C7CBA8910F
25,444,885 UART: [art] SIG.R = FE4B4376502511CD417348FCE9279D9CEA02706C436246DCD3059B0A19268D702ADF5F4B05C3126BF67A3A2D80FE9C12
25,452,283 UART: [art] SIG.S = F9301D2C70246092D552C5238E35232F087EBC783B1C19FE1179A94550E3DE0278F86C769DDE63FA739766423E90FA44
26,431,019 UART: Caliptra RT
26,431,739 UART: [state] CFI Enabled
26,596,384 UART: [rt] RT listening for mailbox commands...
26,598,660 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,754,704 UART: [rt]cmd =0x41544d4e, len=14344
29,106,566 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
192,309 UART:
192,697 UART: Running Caliptra ROM ...
193,816 UART:
603,320 UART: [state] CFI Enabled
616,880 UART: [state] LifecycleState = Unprovisioned
618,783 UART: [state] DebugLocked = No
621,379 UART: [state] WD Timer not started. Device not locked for debugging
625,412 UART: [kat] SHA2-256
804,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,101 UART: [kat] ++
816,633 UART: [kat] sha1
828,714 UART: [kat] SHA2-256
831,721 UART: [kat] SHA2-384
837,634 UART: [kat] SHA2-512-ACC
840,638 UART: [kat] ECC-384
3,283,007 UART: [kat] HMAC-384Kdf
3,297,045 UART: [kat] LMS
3,826,541 UART: [kat] --
3,831,117 UART: [cold-reset] ++
3,833,400 UART: [fht] FHT @ 0x50003400
3,844,293 UART: [idev] ++
3,844,854 UART: [idev] CDI.KEYID = 6
3,845,804 UART: [idev] SUBJECT.KEYID = 7
3,847,039 UART: [idev] UDS.KEYID = 0
3,847,959 ready_for_fw is high
3,848,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,981 UART: [idev] Erasing UDS.KEYID = 0
6,324,333 UART: [idev] Sha1 KeyId Algorithm
6,346,754 UART: [idev] --
6,349,392 UART: [ldev] ++
6,349,956 UART: [ldev] CDI.KEYID = 6
6,350,833 UART: [ldev] SUBJECT.KEYID = 5
6,351,954 UART: [ldev] AUTHORITY.KEYID = 7
6,353,283 UART: [ldev] FE.KEYID = 1
6,363,190 UART: [ldev] Erasing FE.KEYID = 1
8,832,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,333 UART: [ldev] --
10,620,888 UART: [fwproc] Wait for Commands...
10,623,580 UART: [fwproc] Recv command 0x46574c44
10,625,669 UART: [fwproc] Recv'd Img size: 114448 bytes
15,180,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,259,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,328,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,646,368 >>> mbox cmd response: success
15,651,140 UART: [afmc] ++
15,651,725 UART: [afmc] CDI.KEYID = 6
15,652,806 UART: [afmc] SUBJECT.KEYID = 7
15,653,921 UART: [afmc] AUTHORITY.KEYID = 5
18,153,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,875,792 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,877,709 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,893,648 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,909,603 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,925,397 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,947,850 UART: [afmc] --
19,951,282 UART: [cold-reset] --
19,955,515 UART: [state] Locking Datavault
19,961,948 UART: [state] Locking PCR0, PCR1 and PCR31
19,963,643 UART: [state] Locking ICCM
19,965,789 UART: [exit] Launching FMC @ 0x40000130
19,974,257 UART:
19,974,537 UART: Running Caliptra FMC ...
19,975,644 UART:
19,975,798 UART: [state] CFI Enabled
19,983,997 UART: [fht] FMC Alias Private Key: 7
21,740,375 UART: [art] Extend RT PCRs Done
21,741,667 UART: [art] Lock RT PCRs Done
21,743,497 UART: [art] Populate DV Done
21,749,085 UART: [fht] FMC Alias Private Key: 7
21,750,748 UART: [art] Derive CDI
21,751,600 UART: [art] Store in in slot 0x4
21,794,046 UART: [art] Derive Key Pair
21,795,044 UART: [art] Store priv key in slot 0x5
24,221,913 UART: [art] Derive Key Pair - Done
24,234,580 UART: [art] Signing Cert with AUTHO
24,235,887 UART: RITY.KEYID = 7
25,941,052 UART: [art] Erasing AUTHORITY.KEYID = 7
25,942,552 UART: [art] PUB.X = 7AC933FD73F3EEA140E3D975EB344F4280DD0211AA2776BDC624E1B74EE99FAE2EDDF686E67777B54A8F157DCC229C07
25,949,837 UART: [art] PUB.Y = 9871B9EBDCA66BCF84E236F6414A60D13037F6515B915458195420B96FF3714AC870DE9A97F5D5BA71386822ABC12287
25,957,084 UART: [art] SIG.R = DD9CA2CEF95D23ECD407D7DBE5F08ACBC7B0FE8F65091D29EE6ECFFE4A25538273775C1627877650F67258BC8B579D51
25,964,502 UART: [art] SIG.S = 99725AF5A5F3D61FC52B241A8EC8B8A64480FD5C2615FBB8256DFD0AB5235CD82572083526F4159F22EDFD90E463BF78
26,942,550 UART: Caliptra RT
26,943,240 UART: [state] CFI Enabled
27,060,190 UART: [rt] RT listening for mailbox commands...
27,062,501 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,217,617 UART: [rt]cmd =0x41544d4e, len=14344
29,578,729 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,695,571 ready_for_fw is high
3,695,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,260,325 >>> mbox cmd response: success
19,512,358 UART:
19,512,761 UART: Running Caliptra FMC ...
19,513,904 UART:
19,514,056 UART: [state] CFI Enabled
19,521,555 UART: [fht] FMC Alias Private Key: 7
21,278,749 UART: [art] Extend RT PCRs Done
21,279,970 UART: [art] Lock RT PCRs Done
21,281,830 UART: [art] Populate DV Done
21,287,206 UART: [fht] FMC Alias Private Key: 7
21,288,909 UART: [art] Derive CDI
21,289,638 UART: [art] Store in in slot 0x4
21,332,285 UART: [art] Derive Key Pair
21,333,319 UART: [art] Store priv key in slot 0x5
23,760,250 UART: [art] Derive Key Pair - Done
23,773,302 UART: [art] Signing Cert with AUTHO
23,774,604 UART: RITY.KEYID = 7
25,480,156 UART: [art] Erasing AUTHORITY.KEYID = 7
25,481,649 UART: [art] PUB.X = 8D973BED6B835A20D03948E1DC0670E8E1F4E4215B6AD5E3D8494C561E3E8B64376B36FE2E998536FF28C7C0C298EFF3
25,488,956 UART: [art] PUB.Y = A889CBA7DD75552EB8A799D79DCCB2651414CD7595034822B74D8F8FD3E78390B759B31D059B37725B01F1988F424BFC
25,496,159 UART: [art] SIG.R = 1D5BA3A96ED606CF5365F55E0B0100018A6A27F0291E9B76B76D162952E286392890B7BD1623C0CF497422560E300F98
25,503,524 UART: [art] SIG.S = 23A9E0E930366098A70A920F446ABFDADB33D74A3BA91484594E7CB979B259AE979C6A19C19D9781831F209DA2738659
26,482,593 UART: Caliptra RT
26,483,295 UART: [state] CFI Enabled
26,601,061 UART: [rt] RT listening for mailbox commands...
26,603,382 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,758,935 UART: [rt]cmd =0x41544d4e, len=14344
29,126,493 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,438,222 ready_for_fw is high
3,438,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,840,346 >>> mbox cmd response: success
20,134,681 UART:
20,135,067 UART: Running Caliptra FMC ...
20,136,208 UART:
20,136,369 UART: [state] CFI Enabled
20,205,458 UART: [fht] FMC Alias Private Key: 7
21,969,081 UART: [art] Extend RT PCRs Done
21,970,310 UART: [art] Lock RT PCRs Done
21,972,101 UART: [art] Populate DV Done
21,977,490 UART: [fht] FMC Alias Private Key: 7
21,979,149 UART: [art] Derive CDI
21,979,951 UART: [art] Store in in slot 0x4
22,038,191 UART: [art] Derive Key Pair
22,039,194 UART: [art] Store priv key in slot 0x5
24,502,111 UART: [art] Derive Key Pair - Done
24,514,994 UART: [art] Signing Cert with AUTHO
24,516,311 UART: RITY.KEYID = 7
26,228,523 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,029 UART: [art] PUB.X = A1B5B5F45E6F10F5B4F268049E2F3E6320FA03D0BE6FB3D41D30FF5E60DD444739A3E534026844E1CDF97F6B2569DEBF
26,237,275 UART: [art] PUB.Y = 111DD0E9D61596E13DD590DC625DD4E310F7B76D8BB9E2F12221FDFA7706E1A0047148127F545E0913616C4E8E9DBAD7
26,244,541 UART: [art] SIG.R = 0E88649264868C9063EF25CF0EEE78EFEDE83C037762C4BBB6D2919227B7E4D6699F9C8C65E87BBF7FAAE55AFA34A473
26,251,925 UART: [art] SIG.S = AD8C8BE05A93736903CF811CFCAD80D8E4EAB6ACE1A1B3AA6B6BC9CCC50F319D1E35026A3BF2B8264EDB62D032F34F57
27,230,761 UART: Caliptra RT
27,231,476 UART: [state] CFI Enabled
27,395,692 UART: [rt] RT listening for mailbox commands...
27,397,988 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,553,809 UART: [rt]cmd =0x41544d4e, len=14344
29,914,899 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
3,753,224 ready_for_fw is high
3,753,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,050,353 >>> mbox cmd response: success
20,302,155 UART:
20,302,538 UART: Running Caliptra FMC ...
20,303,636 UART:
20,303,781 UART: [state] CFI Enabled
20,311,640 UART: [fht] FMC Alias Private Key: 7
22,068,389 UART: [art] Extend RT PCRs Done
22,069,615 UART: [art] Lock RT PCRs Done
22,071,209 UART: [art] Populate DV Done
22,076,593 UART: [fht] FMC Alias Private Key: 7
22,078,127 UART: [art] Derive CDI
22,078,857 UART: [art] Store in in slot 0x4
22,121,498 UART: [art] Derive Key Pair
22,122,494 UART: [art] Store priv key in slot 0x5
24,549,822 UART: [art] Derive Key Pair - Done
24,562,937 UART: [art] Signing Cert with AUTHO
24,564,237 UART: RITY.KEYID = 7
26,269,487 UART: [art] Erasing AUTHORITY.KEYID = 7
26,270,995 UART: [art] PUB.X = 3442A4E2F33DD9D7DC3B5B02D1E839B67F686718F195EEC452DAF0ED9BCBE91FEAD2C0C1EA96B4E0139494492DB3D538
26,278,236 UART: [art] PUB.Y = DF3C48090EC3928B8FEFE851632FBCA38007A9BD1624E5C31CB7FA86583B4CD45E5FAB3C707D64AABEE0A184E3A0A7C1
26,285,537 UART: [art] SIG.R = BDBA370A0EA4AF6E16B4664F43C575B00974CBCE02F996C6A152552D27E1A0A3CF6F7ACB1B28C90F9761DB9AC3A2A8D7
26,292,953 UART: [art] SIG.S = 3EBA9AE70F40554E645F97FD84E5E48E79B72509FAC1D933D540C2C2B7E244E6E5A25C2ED5C03EB441A68D062AC85E8A
27,271,863 UART: Caliptra RT
27,272,552 UART: [state] CFI Enabled
27,389,536 UART: [rt] RT listening for mailbox commands...
27,391,831 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,546,870 UART: [rt]cmd =0x41544d4e, len=14344
29,909,133 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,955 UART: [kat] SHA2-256
881,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,001 UART: [kat] ++
886,153 UART: [kat] sha1
890,533 UART: [kat] SHA2-256
892,471 UART: [kat] SHA2-384
895,190 UART: [kat] SHA2-512-ACC
897,091 UART: [kat] ECC-384
902,536 UART: [kat] HMAC-384Kdf
907,026 UART: [kat] LMS
1,475,222 UART: [kat] --
1,476,227 UART: [cold-reset] ++
1,476,557 UART: [fht] Storing FHT @ 0x50003400
1,479,412 UART: [idev] ++
1,479,580 UART: [idev] CDI.KEYID = 6
1,479,940 UART: [idev] SUBJECT.KEYID = 7
1,480,364 UART: [idev] UDS.KEYID = 0
1,480,709 ready_for_fw is high
1,480,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,358 UART: [idev] Erasing UDS.KEYID = 0
1,505,092 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,682 UART: [idev] --
1,514,683 UART: [ldev] ++
1,514,851 UART: [ldev] CDI.KEYID = 6
1,515,214 UART: [ldev] SUBJECT.KEYID = 5
1,515,640 UART: [ldev] AUTHORITY.KEYID = 7
1,516,103 UART: [ldev] FE.KEYID = 1
1,521,483 UART: [ldev] Erasing FE.KEYID = 1
1,546,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,452 UART: [ldev] --
1,585,921 UART: [fwproc] Waiting for Commands...
1,586,700 UART: [fwproc] Received command 0x46574c44
1,587,491 UART: [fwproc] Received Image of size 114448 bytes
5,198,325 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,226,585 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,255,937 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,392,006 >>> mbox cmd response: success
5,393,252 UART: [afmc] ++
5,393,420 UART: [afmc] CDI.KEYID = 6
5,393,782 UART: [afmc] SUBJECT.KEYID = 7
5,394,207 UART: [afmc] AUTHORITY.KEYID = 5
5,429,297 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,445,359 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,446,139 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,451,848 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,457,740 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,463,441 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,471,141 UART: [afmc] --
5,472,059 UART: [cold-reset] --
5,472,877 UART: [state] Locking Datavault
5,473,940 UART: [state] Locking PCR0, PCR1 and PCR31
5,474,544 UART: [state] Locking ICCM
5,475,076 UART: [exit] Launching FMC @ 0x40000130
5,480,405 UART:
5,480,421 UART: Running Caliptra FMC ...
5,480,829 UART:
5,480,883 UART: [state] CFI Enabled
5,491,057 UART: [fht] FMC Alias Private Key: 7
5,598,281 UART: [art] Extend RT PCRs Done
5,598,709 UART: [art] Lock RT PCRs Done
5,600,305 UART: [art] Populate DV Done
5,608,425 UART: [fht] FMC Alias Private Key: 7
5,609,473 UART: [art] Derive CDI
5,609,753 UART: [art] Store in in slot 0x4
5,695,064 UART: [art] Derive Key Pair
5,695,424 UART: [art] Store priv key in slot 0x5
5,708,600 UART: [art] Derive Key Pair - Done
5,723,109 UART: [art] Signing Cert with AUTHO
5,723,589 UART: RITY.KEYID = 7
5,739,083 UART: [art] Erasing AUTHORITY.KEYID = 7
5,739,848 UART: [art] PUB.X = 5FFCBFFDDA7912ADA780D3FA0E17AADCD8F70941E74C80E17FFC39E713CD25BD38260A6F771F198BC8BC59CC74390CF5
5,746,632 UART: [art] PUB.Y = E0796A0779D0B24FED9C829E06663DF79D0B80BAED6DC1E46D187FBF938367B11317253B73FB6030D94A4973BD119019
5,753,575 UART: [art] SIG.R = 63F16D449A57DDF5BB8D6EA1CAC9E45BE9039C345835A559711755CE5A9378BF3C3B552FC460E5BFD33CC20C02A9F8B9
5,760,350 UART: [art] SIG.S = 6F1A4314B05A82D4FB2254E1918E04809F0E70750B3C9DA60FA58A52C71DD4AC7072419629D4AA04A1F16F3F18A89909
5,784,113 UART: Caliptra RT
5,784,366 UART: [state] CFI Enabled
5,892,932 UART: [rt] RT listening for mailbox commands...
5,893,602 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,754 UART: [rt]cmd =0x41544d4e, len=14344
6,577,912 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,639 ready_for_fw is high
1,362,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,165,222 >>> mbox cmd response: success
5,226,891 UART:
5,226,907 UART: Running Caliptra FMC ...
5,227,315 UART:
5,227,369 UART: [state] CFI Enabled
5,237,863 UART: [fht] FMC Alias Private Key: 7
5,345,327 UART: [art] Extend RT PCRs Done
5,345,755 UART: [art] Lock RT PCRs Done
5,347,137 UART: [art] Populate DV Done
5,355,343 UART: [fht] FMC Alias Private Key: 7
5,356,441 UART: [art] Derive CDI
5,356,721 UART: [art] Store in in slot 0x4
5,442,464 UART: [art] Derive Key Pair
5,442,824 UART: [art] Store priv key in slot 0x5
5,456,056 UART: [art] Derive Key Pair - Done
5,470,757 UART: [art] Signing Cert with AUTHO
5,471,237 UART: RITY.KEYID = 7
5,485,999 UART: [art] Erasing AUTHORITY.KEYID = 7
5,486,764 UART: [art] PUB.X = DE1544491506A568082031756ABEE03012D00C94DD85B8317E14C0A83B68B3DE49C3998E52FC90C52B6CA3052FAACFD0
5,493,526 UART: [art] PUB.Y = D9090AD74C4CB6460044C3BFFDA26E77911F774542C7A66944D5087DDE27F863172C99B7F93022D4DB6B7DC2FDBE7AF0
5,500,455 UART: [art] SIG.R = 17EF34305B15CB0ACD41ADDD46E4ED7B8D7053EAD25CA261CA71A077851D9CE8161D4C62C3D45E22832C85FB77862ED5
5,507,236 UART: [art] SIG.S = 906E80E9044E3FC35E8828AA91C9ABF64626341A3C8FF1852FAF7610617135411E8A0252D0A7343E4488817D61D53C9D
5,530,997 UART: Caliptra RT
5,531,250 UART: [state] CFI Enabled
5,639,221 UART: [rt] RT listening for mailbox commands...
5,639,891 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,763,079 UART: [rt]cmd =0x41544d4e, len=14344
6,323,807 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
86,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,476 UART: [kat] SHA2-256
882,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,522 UART: [kat] ++
886,674 UART: [kat] sha1
890,748 UART: [kat] SHA2-256
892,686 UART: [kat] SHA2-384
895,321 UART: [kat] SHA2-512-ACC
897,222 UART: [kat] ECC-384
902,579 UART: [kat] HMAC-384Kdf
907,327 UART: [kat] LMS
1,475,523 UART: [kat] --
1,476,498 UART: [cold-reset] ++
1,476,950 UART: [fht] Storing FHT @ 0x50003400
1,479,829 UART: [idev] ++
1,479,997 UART: [idev] CDI.KEYID = 6
1,480,357 UART: [idev] SUBJECT.KEYID = 7
1,480,781 UART: [idev] UDS.KEYID = 0
1,481,126 ready_for_fw is high
1,481,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,595 UART: [idev] Erasing UDS.KEYID = 0
1,505,505 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,287 UART: [idev] --
1,515,260 UART: [ldev] ++
1,515,428 UART: [ldev] CDI.KEYID = 6
1,515,791 UART: [ldev] SUBJECT.KEYID = 5
1,516,217 UART: [ldev] AUTHORITY.KEYID = 7
1,516,680 UART: [ldev] FE.KEYID = 1
1,521,992 UART: [ldev] Erasing FE.KEYID = 1
1,547,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,787 UART: [ldev] --
1,587,170 UART: [fwproc] Waiting for Commands...
1,587,941 UART: [fwproc] Received command 0x46574c44
1,588,732 UART: [fwproc] Received Image of size 114448 bytes
5,161,343 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,190,085 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,219,437 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,355,448 >>> mbox cmd response: success
5,356,526 UART: [afmc] ++
5,356,694 UART: [afmc] CDI.KEYID = 6
5,357,056 UART: [afmc] SUBJECT.KEYID = 7
5,357,481 UART: [afmc] AUTHORITY.KEYID = 5
5,393,273 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,409,557 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,410,337 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,416,046 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,421,938 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,427,639 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,435,305 UART: [afmc] --
5,436,299 UART: [cold-reset] --
5,437,321 UART: [state] Locking Datavault
5,438,240 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,844 UART: [state] Locking ICCM
5,439,326 UART: [exit] Launching FMC @ 0x40000130
5,444,655 UART:
5,444,671 UART: Running Caliptra FMC ...
5,445,079 UART:
5,445,222 UART: [state] CFI Enabled
5,455,594 UART: [fht] FMC Alias Private Key: 7
5,563,092 UART: [art] Extend RT PCRs Done
5,563,520 UART: [art] Lock RT PCRs Done
5,565,514 UART: [art] Populate DV Done
5,573,592 UART: [fht] FMC Alias Private Key: 7
5,574,610 UART: [art] Derive CDI
5,574,890 UART: [art] Store in in slot 0x4
5,660,813 UART: [art] Derive Key Pair
5,661,173 UART: [art] Store priv key in slot 0x5
5,674,371 UART: [art] Derive Key Pair - Done
5,689,157 UART: [art] Signing Cert with AUTHO
5,689,637 UART: RITY.KEYID = 7
5,704,469 UART: [art] Erasing AUTHORITY.KEYID = 7
5,705,234 UART: [art] PUB.X = E96056697A607372A7D9BAFA7F1350FBEE5349275D4A4F46E51E1CC29FB87BA898EFCFEE54B5DA98B7C06EB61A37F4C6
5,712,022 UART: [art] PUB.Y = CA7E0A618C7D2E69EA15E82D4A92E96DBD52131346244DA61406695820957FC2BAF4A282570778400AB8B896268828B7
5,718,954 UART: [art] SIG.R = B56BBD92E3DE92B7EC2650D45E1B352FA1AF1FE2D32D26E032757D0EC7BF3445DFA081976892AE30E016C50C994341F5
5,725,728 UART: [art] SIG.S = 453EE39E5E4CA70DBAA78A955F545FA0B2BA840368EFECCB0E695FF36F53E7E2FE0106A114D1ED4AE67DED7D8F2E484F
5,749,174 UART: Caliptra RT
5,749,519 UART: [state] CFI Enabled
5,858,214 UART: [rt] RT listening for mailbox commands...
5,858,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,981,812 UART: [rt]cmd =0x41544d4e, len=14344
6,552,508 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,018 ready_for_fw is high
1,362,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,316,627 >>> mbox cmd response: success
5,378,062 UART:
5,378,078 UART: Running Caliptra FMC ...
5,378,486 UART:
5,378,629 UART: [state] CFI Enabled
5,389,301 UART: [fht] FMC Alias Private Key: 7
5,497,117 UART: [art] Extend RT PCRs Done
5,497,545 UART: [art] Lock RT PCRs Done
5,499,051 UART: [art] Populate DV Done
5,507,145 UART: [fht] FMC Alias Private Key: 7
5,508,115 UART: [art] Derive CDI
5,508,395 UART: [art] Store in in slot 0x4
5,594,130 UART: [art] Derive Key Pair
5,594,490 UART: [art] Store priv key in slot 0x5
5,608,268 UART: [art] Derive Key Pair - Done
5,623,040 UART: [art] Signing Cert with AUTHO
5,623,520 UART: RITY.KEYID = 7
5,638,816 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,581 UART: [art] PUB.X = 9B2D493837BA40DAEA3EEB3E3A7E0221C4644B4AA8AC9DA43E2301A7BB68F75E3F481CC8F0E3F67EA9D417E23CD51EFD
5,646,369 UART: [art] PUB.Y = 7267C295311C965964D9563A332CEB16EB4DB30FC418183E635568B6044E828194DA1E4C514E8C987F64945700C06F50
5,653,279 UART: [art] SIG.R = ACC31D672EADCD4608A20EDCBE4F55CE8430F94BA214B2B41610F65FAF3F34BD7A555E1E8675019656EBC3DF5371815C
5,660,056 UART: [art] SIG.S = 5AFD7DCED0D89B479D12CF57DAD8513FB52A98784094AF1E107539233A24623857A809B7FE904E68F502AE80A8E3E7F7
5,683,881 UART: Caliptra RT
5,684,226 UART: [state] CFI Enabled
5,792,845 UART: [rt] RT listening for mailbox commands...
5,793,515 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,916,439 UART: [rt]cmd =0x41544d4e, len=14344
6,474,674 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
893,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,145 UART: [kat] ++
897,297 UART: [kat] sha1
901,627 UART: [kat] SHA2-256
903,567 UART: [kat] SHA2-384
906,346 UART: [kat] SHA2-512-ACC
908,247 UART: [kat] ECC-384
918,132 UART: [kat] HMAC-384Kdf
922,806 UART: [kat] LMS
1,171,134 UART: [kat] --
1,171,893 UART: [cold-reset] ++
1,172,405 UART: [fht] FHT @ 0x50003400
1,174,934 UART: [idev] ++
1,175,102 UART: [idev] CDI.KEYID = 6
1,175,462 UART: [idev] SUBJECT.KEYID = 7
1,175,886 UART: [idev] UDS.KEYID = 0
1,176,231 ready_for_fw is high
1,176,231 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,050 UART: [idev] Erasing UDS.KEYID = 0
1,201,049 UART: [idev] Sha1 KeyId Algorithm
1,209,377 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,016 UART: [ldev] SUBJECT.KEYID = 5
1,211,442 UART: [ldev] AUTHORITY.KEYID = 7
1,211,905 UART: [ldev] FE.KEYID = 1
1,217,231 UART: [ldev] Erasing FE.KEYID = 1
1,243,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,545 UART: [ldev] --
1,283,016 UART: [fwproc] Wait for Commands...
1,283,678 UART: [fwproc] Recv command 0x46574c44
1,284,406 UART: [fwproc] Recv'd Img size: 114448 bytes
3,123,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,611 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,316,818 >>> mbox cmd response: success
3,317,952 UART: [afmc] ++
3,318,120 UART: [afmc] CDI.KEYID = 6
3,318,482 UART: [afmc] SUBJECT.KEYID = 7
3,318,907 UART: [afmc] AUTHORITY.KEYID = 5
3,353,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,908 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,617 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,509 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,220 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,937 UART: [afmc] --
3,397,003 UART: [cold-reset] --
3,397,867 UART: [state] Locking Datavault
3,399,232 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,836 UART: [state] Locking ICCM
3,400,374 UART: [exit] Launching FMC @ 0x40000130
3,405,703 UART:
3,405,719 UART: Running Caliptra FMC ...
3,406,127 UART:
3,406,181 UART: [state] CFI Enabled
3,416,545 UART: [fht] FMC Alias Private Key: 7
3,524,143 UART: [art] Extend RT PCRs Done
3,524,571 UART: [art] Lock RT PCRs Done
3,525,783 UART: [art] Populate DV Done
3,534,085 UART: [fht] FMC Alias Private Key: 7
3,535,197 UART: [art] Derive CDI
3,535,477 UART: [art] Store in in slot 0x4
3,621,262 UART: [art] Derive Key Pair
3,621,622 UART: [art] Store priv key in slot 0x5
3,634,996 UART: [art] Derive Key Pair - Done
3,649,595 UART: [art] Signing Cert with AUTHO
3,650,075 UART: RITY.KEYID = 7
3,665,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,870 UART: [art] PUB.X = 2D227484DB55D3144D483F4255BC2969A94C0DBB27364066DC21AE4A6B0E59E6C9181F97FDC7B730FA6692E6C5A68600
3,672,614 UART: [art] PUB.Y = D8585F8E56253AFC18465C4FD8DE5B52A706306620CFB303262BA2316F22DAAA2CE0232492965AA9ACA5446A5C39B2A8
3,679,564 UART: [art] SIG.R = BC2187F6D11FB9013C3EC8B64E31956AF855CB257E32C2033777813029D389514A052EDEC9A568FFD6AFFE614D8759BB
3,686,331 UART: [art] SIG.S = 42A977E6A4F980921C45FCADB36278F53A43E23CACC1F6F72CC4C2E7D87640804603A77245CA790C21DBD59486C1B3BD
3,710,056 UART: Caliptra RT
3,710,309 UART: [state] CFI Enabled
3,818,403 UART: [rt] RT listening for mailbox commands...
3,819,073 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,361 UART: [rt]cmd =0x41544d4e, len=14344
4,498,395 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,619 ready_for_fw is high
1,059,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,174,156 >>> mbox cmd response: success
3,235,253 UART:
3,235,269 UART: Running Caliptra FMC ...
3,235,677 UART:
3,235,731 UART: [state] CFI Enabled
3,246,497 UART: [fht] FMC Alias Private Key: 7
3,354,603 UART: [art] Extend RT PCRs Done
3,355,031 UART: [art] Lock RT PCRs Done
3,356,455 UART: [art] Populate DV Done
3,364,939 UART: [fht] FMC Alias Private Key: 7
3,366,089 UART: [art] Derive CDI
3,366,369 UART: [art] Store in in slot 0x4
3,452,050 UART: [art] Derive Key Pair
3,452,410 UART: [art] Store priv key in slot 0x5
3,465,288 UART: [art] Derive Key Pair - Done
3,479,719 UART: [art] Signing Cert with AUTHO
3,480,199 UART: RITY.KEYID = 7
3,495,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,830 UART: [art] PUB.X = 2DC892632D754317A4692DD60F306F454CCF5826BD12613FBDCC999D35C659154BCB041D7BC47E0E2165DF72D1B6808C
3,502,595 UART: [art] PUB.Y = 0BEF5BD6A8D3FE5E84C825477E8DB0DEC9947C9D9B875FCD6174565900A64FC596B1945089A7D484DE5DB287F478DB73
3,509,530 UART: [art] SIG.R = 308F88AEDC9121C79BC3D3B6C21EB0F7DA94187C3129D56F4FFED24C5A14D54B436C164A52576AE6C6A3F62CF242257E
3,516,312 UART: [art] SIG.S = F7BDDC035467359596AE8333B049E523A487AA85F538A76D7AB1726F1D5460CFC65F8F8279C7C6A48B9BC23CE4DD9A9F
3,540,156 UART: Caliptra RT
3,540,409 UART: [state] CFI Enabled
3,647,385 UART: [rt] RT listening for mailbox commands...
3,648,055 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,097 UART: [rt]cmd =0x41544d4e, len=14344
4,344,214 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
893,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,082 UART: [kat] ++
898,234 UART: [kat] sha1
902,358 UART: [kat] SHA2-256
904,298 UART: [kat] SHA2-384
907,193 UART: [kat] SHA2-512-ACC
909,094 UART: [kat] ECC-384
919,113 UART: [kat] HMAC-384Kdf
923,795 UART: [kat] LMS
1,172,123 UART: [kat] --
1,173,100 UART: [cold-reset] ++
1,173,510 UART: [fht] FHT @ 0x50003400
1,176,293 UART: [idev] ++
1,176,461 UART: [idev] CDI.KEYID = 6
1,176,821 UART: [idev] SUBJECT.KEYID = 7
1,177,245 UART: [idev] UDS.KEYID = 0
1,177,590 ready_for_fw is high
1,177,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,087 UART: [idev] Erasing UDS.KEYID = 0
1,202,258 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,962 UART: [ldev] ++
1,212,130 UART: [ldev] CDI.KEYID = 6
1,212,493 UART: [ldev] SUBJECT.KEYID = 5
1,212,919 UART: [ldev] AUTHORITY.KEYID = 7
1,213,382 UART: [ldev] FE.KEYID = 1
1,218,834 UART: [ldev] Erasing FE.KEYID = 1
1,244,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,802 UART: [ldev] --
1,284,083 UART: [fwproc] Wait for Commands...
1,284,707 UART: [fwproc] Recv command 0x46574c44
1,285,435 UART: [fwproc] Recv'd Img size: 114448 bytes
3,134,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,144 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,327,325 >>> mbox cmd response: success
3,328,561 UART: [afmc] ++
3,328,729 UART: [afmc] CDI.KEYID = 6
3,329,091 UART: [afmc] SUBJECT.KEYID = 7
3,329,516 UART: [afmc] AUTHORITY.KEYID = 5
3,365,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,595 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,304 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,394,196 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,907 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,768 UART: [afmc] --
3,408,854 UART: [cold-reset] --
3,409,702 UART: [state] Locking Datavault
3,410,961 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,565 UART: [state] Locking ICCM
3,412,169 UART: [exit] Launching FMC @ 0x40000130
3,417,498 UART:
3,417,514 UART: Running Caliptra FMC ...
3,417,922 UART:
3,418,065 UART: [state] CFI Enabled
3,428,921 UART: [fht] FMC Alias Private Key: 7
3,537,357 UART: [art] Extend RT PCRs Done
3,537,785 UART: [art] Lock RT PCRs Done
3,539,545 UART: [art] Populate DV Done
3,547,829 UART: [fht] FMC Alias Private Key: 7
3,548,865 UART: [art] Derive CDI
3,549,145 UART: [art] Store in in slot 0x4
3,635,072 UART: [art] Derive Key Pair
3,635,432 UART: [art] Store priv key in slot 0x5
3,648,376 UART: [art] Derive Key Pair - Done
3,663,126 UART: [art] Signing Cert with AUTHO
3,663,606 UART: RITY.KEYID = 7
3,679,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,843 UART: [art] PUB.X = 034EBC0A025F8BFA13FD7A234175575BFE5282638D894360E2AFC6F2D27AFFCCF2DF92748AA7FE2B455A8E2D567680DE
3,686,620 UART: [art] PUB.Y = AB0CEEEC0AD14D6E0A058AFFEDB959788079F60BA422FE6DCB12DE83274F08E48EF8297AFDAFDF695FFCF8735AA16268
3,693,580 UART: [art] SIG.R = 02889945C67A72C0207E0AA30B267E4B98D6273B68A38EBFFA6C6B23A7F8A4BDA0F9DB4DD4C4F2C4897452582B8E2460
3,700,349 UART: [art] SIG.S = F5B10DED944AC898E44DF1F6405EA51A633181EB87734B0BB8D5EC7D954CE33F1CD301A76772671BD977A095CCF0D2E8
3,723,965 UART: Caliptra RT
3,724,310 UART: [state] CFI Enabled
3,832,346 UART: [rt] RT listening for mailbox commands...
3,833,016 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,834 UART: [rt]cmd =0x41544d4e, len=14344
4,518,983 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,446 ready_for_fw is high
1,061,446 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,172,223 >>> mbox cmd response: success
3,235,084 UART:
3,235,100 UART: Running Caliptra FMC ...
3,235,508 UART:
3,235,651 UART: [state] CFI Enabled
3,246,559 UART: [fht] FMC Alias Private Key: 7
3,354,649 UART: [art] Extend RT PCRs Done
3,355,077 UART: [art] Lock RT PCRs Done
3,356,477 UART: [art] Populate DV Done
3,364,245 UART: [fht] FMC Alias Private Key: 7
3,365,173 UART: [art] Derive CDI
3,365,453 UART: [art] Store in in slot 0x4
3,451,430 UART: [art] Derive Key Pair
3,451,790 UART: [art] Store priv key in slot 0x5
3,464,740 UART: [art] Derive Key Pair - Done
3,479,769 UART: [art] Signing Cert with AUTHO
3,480,249 UART: RITY.KEYID = 7
3,494,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,698 UART: [art] PUB.X = A62CE6D87A6F0FB4720D1D7F79CC0239F6F45FFD2ECE44F4F02F1D9129CE85AD11CDB338A6FC1AAB48DB5A66FE92260D
3,502,482 UART: [art] PUB.Y = 0D7C3FE1C678B9149988916AEF6B206D992DCF1654CB9CBD2F27C4A7A65C9461751777AC643969AE2B79C538C4059ED0
3,509,430 UART: [art] SIG.R = 9D83CB0CB73BDBE0AF885664286CB42D95C4D4AC0654D15347422BFDCC50616B9DA2F04A10BA094D112C6732E599A3F7
3,516,201 UART: [art] SIG.S = E60C59A65354C7C7F682AA044F1D357BCD3BCCFB14ED25AE72472709F6A60F32E94563D41EDA0CBCA13FBD7C5696A718
3,540,069 UART: Caliptra RT
3,540,414 UART: [state] CFI Enabled
3,648,283 UART: [rt] RT listening for mailbox commands...
3,648,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,795 UART: [rt]cmd =0x41544d4e, len=14344
4,332,487 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,624 UART: [state] LifecycleState = Unprovisioned
86,279 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
900,125 UART: [kat] SHA2-256
902,065 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,759 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,649 UART: [idev] ++
1,172,817 UART: [idev] CDI.KEYID = 6
1,173,178 UART: [idev] SUBJECT.KEYID = 7
1,173,603 UART: [idev] UDS.KEYID = 0
1,173,949 ready_for_fw is high
1,173,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,607 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,869 UART: [idev] --
1,208,936 UART: [ldev] ++
1,209,104 UART: [ldev] CDI.KEYID = 6
1,209,468 UART: [ldev] SUBJECT.KEYID = 5
1,209,895 UART: [ldev] AUTHORITY.KEYID = 7
1,210,358 UART: [ldev] FE.KEYID = 1
1,215,468 UART: [ldev] Erasing FE.KEYID = 1
1,241,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,664 UART: [ldev] --
1,281,068 UART: [fwproc] Wait for Commands...
1,281,841 UART: [fwproc] Recv command 0x46574c44
1,282,574 UART: [fwproc] Recv'd Img size: 114448 bytes
3,122,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,639 >>> mbox cmd response: success
3,316,894 UART: [afmc] ++
3,317,062 UART: [afmc] CDI.KEYID = 6
3,317,425 UART: [afmc] SUBJECT.KEYID = 7
3,317,851 UART: [afmc] AUTHORITY.KEYID = 5
3,353,595 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,688 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,398 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,288 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,999 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,901 UART: [afmc] --
3,396,859 UART: [cold-reset] --
3,397,689 UART: [state] Locking Datavault
3,398,644 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,248 UART: [state] Locking ICCM
3,399,862 UART: [exit] Launching FMC @ 0x40000130
3,405,191 UART:
3,405,207 UART: Running Caliptra FMC ...
3,405,615 UART:
3,405,669 UART: [state] CFI Enabled
3,416,341 UART: [fht] FMC Alias Private Key: 7
3,524,055 UART: [art] Extend RT PCRs Done
3,524,483 UART: [art] Lock RT PCRs Done
3,525,565 UART: [art] Populate DV Done
3,533,809 UART: [fht] FMC Alias Private Key: 7
3,534,847 UART: [art] Derive CDI
3,535,127 UART: [art] Store in in slot 0x4
3,621,146 UART: [art] Derive Key Pair
3,621,506 UART: [art] Store priv key in slot 0x5
3,635,068 UART: [art] Derive Key Pair - Done
3,649,726 UART: [art] Signing Cert with AUTHO
3,650,206 UART: RITY.KEYID = 7
3,665,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,353 UART: [art] PUB.X = CB56B176993A4BCC25C04A9255DD8DC71179E22B2DD16E6C7B11261E8D83FA359654BFEAF91350857BF050FB0C2A97F9
3,673,130 UART: [art] PUB.Y = 6C8BFD3AC3C83FDC68077222A84085C1BDF5091729918F0CDCC1FF3EB3E9DB56178AFDC9B1B1A6800961E9135AFAB4DD
3,680,088 UART: [art] SIG.R = F703DE2809B96077B76D579F9F177571119AA5CEAF191BD79F7D311730D5E4040FD9CE40FEB1E4815C16EEBC8587D6E8
3,686,854 UART: [art] SIG.S = 40F4B685627688B407E3FBA3D7F295A6DEB1D1EB89F3B0AB607F715ACF11BF1FF0CC518A0F67C0918C6ED20C6E783E30
3,710,634 UART: Caliptra RT
3,710,887 UART: [state] CFI Enabled
3,818,605 UART: [rt] RT listening for mailbox commands...
3,819,275 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,557 UART: [rt]cmd =0x41544d4e, len=14344
4,488,545 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,274 ready_for_fw is high
1,055,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,165,378 >>> mbox cmd response: success
3,227,539 UART:
3,227,555 UART: Running Caliptra FMC ...
3,227,963 UART:
3,228,017 UART: [state] CFI Enabled
3,238,693 UART: [fht] FMC Alias Private Key: 7
3,347,141 UART: [art] Extend RT PCRs Done
3,347,569 UART: [art] Lock RT PCRs Done
3,349,073 UART: [art] Populate DV Done
3,357,357 UART: [fht] FMC Alias Private Key: 7
3,358,453 UART: [art] Derive CDI
3,358,733 UART: [art] Store in in slot 0x4
3,444,820 UART: [art] Derive Key Pair
3,445,180 UART: [art] Store priv key in slot 0x5
3,457,736 UART: [art] Derive Key Pair - Done
3,472,232 UART: [art] Signing Cert with AUTHO
3,472,712 UART: RITY.KEYID = 7
3,487,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,571 UART: [art] PUB.X = E6005BBD1A2F51A324D8E332F47E9B06134C4F02B061E36FD3AFD0567BF483DB7905EE9899D22CF8039B6F8C9864C020
3,495,313 UART: [art] PUB.Y = C0C20D48590D5B16860738F6ADEB94BC2FB1D52720F587D2A81E17910EF15903EC169F645F73FEA0C2FB82CAE2A7B067
3,502,258 UART: [art] SIG.R = A4752B4DE03045ED3F666085F72B2C0A0C325D919836FFFF48EDE25B9C66D666B073C99BC4D4DFA6911EA315B1E61961
3,509,030 UART: [art] SIG.S = C2F4929175F413A87660B044DE6F8AAA27F1B668CE5BC62692FCA26754C20D958F48E25D7ADD7CD850461009766FE087
3,532,831 UART: Caliptra RT
3,533,084 UART: [state] CFI Enabled
3,640,715 UART: [rt] RT listening for mailbox commands...
3,641,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,399 UART: [rt]cmd =0x41544d4e, len=14344
4,330,591 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,083 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,169,666 UART: [cold-reset] ++
1,170,110 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,174,138 ready_for_fw is high
1,174,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,520 UART: [idev] Erasing UDS.KEYID = 0
1,198,482 UART: [idev] Sha1 KeyId Algorithm
1,207,528 UART: [idev] --
1,208,625 UART: [ldev] ++
1,208,793 UART: [ldev] CDI.KEYID = 6
1,209,157 UART: [ldev] SUBJECT.KEYID = 5
1,209,584 UART: [ldev] AUTHORITY.KEYID = 7
1,210,047 UART: [ldev] FE.KEYID = 1
1,215,585 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,101 UART: [ldev] --
1,281,431 UART: [fwproc] Wait for Commands...
1,282,188 UART: [fwproc] Recv command 0x46574c44
1,282,921 UART: [fwproc] Recv'd Img size: 114448 bytes
3,116,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,498 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,310,594 >>> mbox cmd response: success
3,311,749 UART: [afmc] ++
3,311,917 UART: [afmc] CDI.KEYID = 6
3,312,280 UART: [afmc] SUBJECT.KEYID = 7
3,312,706 UART: [afmc] AUTHORITY.KEYID = 5
3,349,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,313 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,023 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,913 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,624 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,464 UART: [afmc] --
3,392,570 UART: [cold-reset] --
3,393,338 UART: [state] Locking Datavault
3,394,565 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,169 UART: [state] Locking ICCM
3,395,733 UART: [exit] Launching FMC @ 0x40000130
3,401,062 UART:
3,401,078 UART: Running Caliptra FMC ...
3,401,486 UART:
3,401,629 UART: [state] CFI Enabled
3,412,501 UART: [fht] FMC Alias Private Key: 7
3,521,055 UART: [art] Extend RT PCRs Done
3,521,483 UART: [art] Lock RT PCRs Done
3,522,859 UART: [art] Populate DV Done
3,531,029 UART: [fht] FMC Alias Private Key: 7
3,532,105 UART: [art] Derive CDI
3,532,385 UART: [art] Store in in slot 0x4
3,617,726 UART: [art] Derive Key Pair
3,618,086 UART: [art] Store priv key in slot 0x5
3,632,066 UART: [art] Derive Key Pair - Done
3,646,960 UART: [art] Signing Cert with AUTHO
3,647,440 UART: RITY.KEYID = 7
3,662,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,499 UART: [art] PUB.X = A24E88392B7F12CCD7B152BD3A83E65CDFD079A530682DFFEC38067330F1E42099F77B2BF71085BBA019A500BC1B4AC5
3,670,256 UART: [art] PUB.Y = 0C7A0769F5D65DB7BD8819F09B5B87D4CAAEE08138A5BE034C4980FA56A15991BBD197478B0B9D2B448042F34CB8CFCD
3,677,208 UART: [art] SIG.R = 0F18F9767B7CDF3CB21DA207E119A4B4BF3BCD563C05DBD5D4AFD91E6B1E3A0C66B7C98B808EF57946F0BDDBAB5AA712
3,683,994 UART: [art] SIG.S = FFDB8ACAFBF6B932126769AE441F9AE9BBEBAA17BB78DDBD913744436B269255C497F687F2E5279C1CC1B6E159627075
3,708,207 UART: Caliptra RT
3,708,552 UART: [state] CFI Enabled
3,816,036 UART: [rt] RT listening for mailbox commands...
3,816,706 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,796 UART: [rt]cmd =0x41544d4e, len=14344
4,502,597 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,635 ready_for_fw is high
1,056,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,173,778 >>> mbox cmd response: success
3,235,801 UART:
3,235,817 UART: Running Caliptra FMC ...
3,236,225 UART:
3,236,368 UART: [state] CFI Enabled
3,246,804 UART: [fht] FMC Alias Private Key: 7
3,355,254 UART: [art] Extend RT PCRs Done
3,355,682 UART: [art] Lock RT PCRs Done
3,357,392 UART: [art] Populate DV Done
3,365,688 UART: [fht] FMC Alias Private Key: 7
3,366,738 UART: [art] Derive CDI
3,367,018 UART: [art] Store in in slot 0x4
3,452,577 UART: [art] Derive Key Pair
3,452,937 UART: [art] Store priv key in slot 0x5
3,465,911 UART: [art] Derive Key Pair - Done
3,481,120 UART: [art] Signing Cert with AUTHO
3,481,600 UART: RITY.KEYID = 7
3,496,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,519 UART: [art] PUB.X = B80B8EA4CDB2FBCAADB70CBA930B03377A0F80DFD849AF49EA91DDF50AAB6AACD2B4ED9B0FDCF3FC6B90D27E0436957B
3,504,305 UART: [art] PUB.Y = 25A955EBED9C4C1C23D87EDEE103F678801A44D269FF2302226FFF7F626B4683C7C954B6B3A501F2A5331EEEDFC08B09
3,511,255 UART: [art] SIG.R = 6AD0544128888A6E0435604A9B09D8C2A4C5301B381488470EAC9F77AB67010EDDB6A2E8307A4F1828832BD86CF9F7D3
3,518,010 UART: [art] SIG.S = E71191C3BA05E9C7B0F579B663E8D477958F14D6FB8739C82033C8E4C1DC361F4072BA7A698AAFDA6C60CE69BC4A5857
3,541,720 UART: Caliptra RT
3,542,065 UART: [state] CFI Enabled
3,649,205 UART: [rt] RT listening for mailbox commands...
3,649,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,901 UART: [rt]cmd =0x41544d4e, len=14344
4,335,754 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,470 UART:
193,418 UART: Running Caliptra ROM ...
194,621 UART:
194,773 UART: [state] CFI Enabled
270,662 UART: [state] LifecycleState = Unprovisioned
272,792 UART: [state] DebugLocked = No
274,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,893 UART: [kat] SHA2-256
448,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
459,115 UART: [kat] ++
459,602 UART: [kat] sha1
470,545 UART: [kat] SHA2-256
473,278 UART: [kat] SHA2-384
479,428 UART: [kat] SHA2-512-ACC
481,729 UART: [kat] ECC-384
2,769,169 UART: [kat] HMAC-384Kdf
2,784,419 UART: [kat] LMS
3,974,689 UART: [kat] --
3,979,599 UART: [cold-reset] ++
3,981,756 UART: [fht] Storing FHT @ 0x50003400
3,993,303 UART: [idev] ++
3,993,880 UART: [idev] CDI.KEYID = 6
3,994,802 UART: [idev] SUBJECT.KEYID = 7
3,996,069 UART: [idev] UDS.KEYID = 0
3,997,191 ready_for_fw is high
3,997,428 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,141,398 UART: [idev] Erasing UDS.KEYID = 0
7,341,286 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,085 UART: [idev] --
7,366,902 UART: [ldev] ++
7,367,542 UART: [ldev] CDI.KEYID = 6
7,368,466 UART: [ldev] SUBJECT.KEYID = 5
7,369,628 UART: [ldev] AUTHORITY.KEYID = 7
7,370,861 UART: [ldev] FE.KEYID = 1
7,410,667 UART: [ldev] Erasing FE.KEYID = 1
10,745,334 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,058,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,073,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,088,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,102,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,120,470 UART: [ldev] --
13,125,125 UART: [fwproc] Waiting for Commands...
13,127,064 UART: [fwproc] Received command 0x46574c44
13,129,263 UART: [fwproc] Received Image of size 114124 bytes
22,476,824 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,557,124 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,626,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,943,659 >>> mbox cmd response: success
22,947,906 UART: [afmc] ++
22,948,548 UART: [afmc] CDI.KEYID = 6
22,949,475 UART: [afmc] SUBJECT.KEYID = 7
22,950,698 UART: [afmc] AUTHORITY.KEYID = 5
26,299,759 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,601,630 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,603,875 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,618,487 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,633,184 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,647,472 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,668,329 UART: [afmc] --
28,671,657 UART: [cold-reset] --
28,674,987 UART: [state] Locking Datavault
28,682,244 UART: [state] Locking PCR0, PCR1 and PCR31
28,684,002 UART: [state] Locking ICCM
28,685,430 UART: [exit] Launching FMC @ 0x40000130
28,693,835 UART:
28,694,074 UART: Running Caliptra FMC ...
28,695,182 UART:
28,695,346 UART: [state] CFI Enabled
28,762,754 UART: [fht] FMC Alias Private Key: 7
31,100,867 UART: [art] Extend RT PCRs Done
31,102,513 UART: [art] Lock RT PCRs Done
31,103,735 UART: [art] Populate DV Done
31,108,955 UART: [fht] FMC Alias Private Key: 7
31,110,509 UART: [art] Derive CDI
31,111,337 UART: [art] Store in in slot 0x4
31,170,954 UART: [art] Derive Key Pair
31,172,131 UART: [art] Store priv key in slot 0x5
34,465,048 UART: [art] Derive Key Pair - Done
34,477,781 UART: [art] Signing Cert with AUTHO
34,479,144 UART: RITY.KEYID = 7
36,766,345 UART: [art] Erasing AUTHORITY.KEYID = 7
36,768,298 UART: [art] PUB.X = BD08E1CC58BBA1E185E0B32CD23AD2E3DA5EB514451D5867EECF35A50973237AF6E2B52018C42C89ADEA9D30DBC89F5D
36,775,142 UART: [art] PUB.Y = 00E684A382DCC754AD0650FC8776292691EDCC9B55799DF7C3E26DDE545AA101440DDD283AF478DD54A09A4AFF759007
36,782,383 UART: [art] SIG.R = A91656AF82A191310BD8F69F62D8E9F57C860DF2ABFA7761B87C323AC8543CF2289D17DFE6A7C6733D413B423A30970F
36,789,784 UART: [art] SIG.S = 851A36D2994EE7F96015ED1BAC8F23467219E07411D60ADA2ABFCE39FD7808EB8C90252595ED694C3F533E13E8AA2F1E
38,094,824 UART: Caliptra RT
38,095,946 UART: [state] CFI Enabled
38,275,751 UART: [rt] RT listening for mailbox commands...
38,278,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,433,518 UART: [rt]cmd =0x41544d4e, len=14344
42,542,658 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,023 writing to cptra_bootfsm_go
3,786,200 ready_for_fw is high
3,786,850 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,986,514 >>> mbox cmd response: success
27,687,937 UART:
27,688,307 UART: Running Caliptra FMC ...
27,689,444 UART:
27,689,612 UART: [state] CFI Enabled
27,757,073 UART: [fht] FMC Alias Private Key: 7
30,094,703 UART: [art] Extend RT PCRs Done
30,095,997 UART: [art] Lock RT PCRs Done
30,098,019 UART: [art] Populate DV Done
30,103,401 UART: [fht] FMC Alias Private Key: 7
30,105,001 UART: [art] Derive CDI
30,105,831 UART: [art] Store in in slot 0x4
30,165,477 UART: [art] Derive Key Pair
30,166,523 UART: [art] Store priv key in slot 0x5
33,459,371 UART: [art] Derive Key Pair - Done
33,472,381 UART: [art] Signing Cert with AUTHO
33,473,694 UART: RITY.KEYID = 7
35,760,086 UART: [art] Erasing AUTHORITY.KEYID = 7
35,761,728 UART: [art] PUB.X = C5FC933BB2A2DA0D2186DC6A12EE0CB06D482A40C3FD5F2B0323A35CD49D106815C090957E15058516A1F5487DB3E2D7
35,768,837 UART: [art] PUB.Y = B8490A149A8937131EB4D8350A30D9D4B5754349759F57B11230DDF383A9861FAD8C651466ABAF6B03799F0140B55CCF
35,776,061 UART: [art] SIG.R = 59C31B4F04D6393E31DE8304105E148B2FFE7779133D3C0DDC82B1660A8686ACDA4C6415823726CACE46C9644675787B
35,783,428 UART: [art] SIG.S = 7CE1C5335FE2BCC6BC66BFE04255DC9B78009E2EED988E94B4A4854365330E447DF5CE63DB4328B8352EF47B1B43897A
37,088,502 UART: Caliptra RT
37,089,234 UART: [state] CFI Enabled
37,270,418 UART: [rt] RT listening for mailbox commands...
37,272,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,427,968 UART: [rt]cmd =0x41544d4e, len=14344
41,615,101 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,359 UART:
192,723 UART: Running Caliptra ROM ...
193,819 UART:
603,465 UART: [state] CFI Enabled
617,878 UART: [state] LifecycleState = Unprovisioned
619,848 UART: [state] DebugLocked = No
621,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,455 UART: [kat] SHA2-256
796,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,781 UART: [kat] ++
807,257 UART: [kat] sha1
818,151 UART: [kat] SHA2-256
820,910 UART: [kat] SHA2-384
827,541 UART: [kat] SHA2-512-ACC
829,912 UART: [kat] ECC-384
3,114,428 UART: [kat] HMAC-384Kdf
3,124,736 UART: [kat] LMS
4,314,853 UART: [kat] --
4,320,485 UART: [cold-reset] ++
4,321,488 UART: [fht] Storing FHT @ 0x50003400
4,332,996 UART: [idev] ++
4,333,638 UART: [idev] CDI.KEYID = 6
4,334,543 UART: [idev] SUBJECT.KEYID = 7
4,335,781 UART: [idev] UDS.KEYID = 0
4,336,863 ready_for_fw is high
4,337,078 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,753 UART: [idev] Erasing UDS.KEYID = 0
7,624,989 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,181 UART: [idev] --
7,651,070 UART: [ldev] ++
7,651,639 UART: [ldev] CDI.KEYID = 6
7,652,599 UART: [ldev] SUBJECT.KEYID = 5
7,653,805 UART: [ldev] AUTHORITY.KEYID = 7
7,655,087 UART: [ldev] FE.KEYID = 1
7,668,105 UART: [ldev] Erasing FE.KEYID = 1
10,961,817 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,605 UART: [ldev] --
13,323,375 UART: [fwproc] Waiting for Commands...
13,326,656 UART: [fwproc] Received command 0x46574c44
13,328,833 UART: [fwproc] Received Image of size 114124 bytes
22,277,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,361,508 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,430,441 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,746,916 >>> mbox cmd response: success
22,750,197 UART: [afmc] ++
22,750,783 UART: [afmc] CDI.KEYID = 6
22,751,748 UART: [afmc] SUBJECT.KEYID = 7
22,752,961 UART: [afmc] AUTHORITY.KEYID = 5
26,063,134 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,355,987 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,358,252 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,372,823 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,387,592 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,401,811 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,423,538 UART: [afmc] --
28,427,773 UART: [cold-reset] --
28,431,752 UART: [state] Locking Datavault
28,436,784 UART: [state] Locking PCR0, PCR1 and PCR31
28,438,536 UART: [state] Locking ICCM
28,441,056 UART: [exit] Launching FMC @ 0x40000130
28,449,455 UART:
28,449,682 UART: Running Caliptra FMC ...
28,450,779 UART:
28,450,935 UART: [state] CFI Enabled
28,458,838 UART: [fht] FMC Alias Private Key: 7
30,789,285 UART: [art] Extend RT PCRs Done
30,790,497 UART: [art] Lock RT PCRs Done
30,791,844 UART: [art] Populate DV Done
30,797,253 UART: [fht] FMC Alias Private Key: 7
30,798,950 UART: [art] Derive CDI
30,799,757 UART: [art] Store in in slot 0x4
30,841,701 UART: [art] Derive Key Pair
30,842,752 UART: [art] Store priv key in slot 0x5
34,084,391 UART: [art] Derive Key Pair - Done
34,097,660 UART: [art] Signing Cert with AUTHO
34,098,998 UART: RITY.KEYID = 7
36,378,161 UART: [art] Erasing AUTHORITY.KEYID = 7
36,379,661 UART: [art] PUB.X = 0DDB7CC6B7795B395AD613FBB51B7F31AA77D9A51B3D8942C70C61E57339543576CC6E337AE8F58647E7609925CF9E24
36,386,882 UART: [art] PUB.Y = EC5492396C4B1D1E57E156384F3AD12433B6FB065333267668F264035BA5613BD22462938B10962FCCC58A2FD65FE1EE
36,394,096 UART: [art] SIG.R = 338660117D3119C9590648C96621632F4A18CC30BCE8753865CB55BF373ECBBF67890E8181AECD6000C77F119586031D
36,401,491 UART: [art] SIG.S = A321E922CFDC7A4ACA564E382AA14FEB96A2D9CEB403340A7DAA7373AE7AB1051592DE6C31EC0503FB04E94A129D6C0C
37,706,777 UART: Caliptra RT
37,707,462 UART: [state] CFI Enabled
37,825,215 UART: [rt] RT listening for mailbox commands...
37,827,487 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,982,651 UART: [rt]cmd =0x41544d4e, len=14344
42,247,520 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
4,124,800 ready_for_fw is high
4,125,222 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,597,988 >>> mbox cmd response: success
28,238,449 UART:
28,238,831 UART: Running Caliptra FMC ...
28,240,011 UART:
28,240,181 UART: [state] CFI Enabled
28,248,286 UART: [fht] FMC Alias Private Key: 7
30,579,471 UART: [art] Extend RT PCRs Done
30,580,709 UART: [art] Lock RT PCRs Done
30,582,075 UART: [art] Populate DV Done
30,587,567 UART: [fht] FMC Alias Private Key: 7
30,589,211 UART: [art] Derive CDI
30,589,943 UART: [art] Store in in slot 0x4
30,632,330 UART: [art] Derive Key Pair
30,633,370 UART: [art] Store priv key in slot 0x5
33,875,772 UART: [art] Derive Key Pair - Done
33,888,719 UART: [art] Signing Cert with AUTHO
33,890,053 UART: RITY.KEYID = 7
36,169,924 UART: [art] Erasing AUTHORITY.KEYID = 7
36,171,426 UART: [art] PUB.X = 9C428A7619C42F6BFDDADB3471F50BF63258041A6A4A16051652F25046D283C095DDD423AC4A94B6569566BD5C198206
36,178,660 UART: [art] PUB.Y = 1C4E0D152BF13B4E0F046EFEDDE4ED57B741C0C0502285D4F62ACABA9A5D9F490945A464F069187B899F83F41FBB5FE3
36,185,929 UART: [art] SIG.R = 2B77998E6997960B29DA088D84816982E29919E9B4ADE806B06A5C40933EE3E048898C70B246057EEE655C36577244EA
36,193,254 UART: [art] SIG.S = AD1543CC77EFB9BC0E0AEABB22DAFDD4923F524EA104D863173534D55E1D7F09F4AD2520F38E1860A3672296980CD564
37,498,351 UART: Caliptra RT
37,499,146 UART: [state] CFI Enabled
37,617,947 UART: [rt] RT listening for mailbox commands...
37,620,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,775,846 UART: [rt]cmd =0x41544d4e, len=14344
41,911,222 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,034 UART:
192,408 UART: Running Caliptra ROM ...
193,563 UART:
193,713 UART: [state] CFI Enabled
262,498 UART: [state] LifecycleState = Unprovisioned
264,408 UART: [state] DebugLocked = No
267,222 UART: [state] WD Timer not started. Device not locked for debugging
271,757 UART: [kat] SHA2-256
450,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,496 UART: [kat] ++
462,944 UART: [kat] sha1
473,458 UART: [kat] SHA2-256
476,467 UART: [kat] SHA2-384
482,103 UART: [kat] SHA2-512-ACC
485,051 UART: [kat] ECC-384
2,948,367 UART: [kat] HMAC-384Kdf
2,971,889 UART: [kat] LMS
3,501,325 UART: [kat] --
3,505,761 UART: [cold-reset] ++
3,507,200 UART: [fht] FHT @ 0x50003400
3,518,033 UART: [idev] ++
3,518,598 UART: [idev] CDI.KEYID = 6
3,519,508 UART: [idev] SUBJECT.KEYID = 7
3,520,683 UART: [idev] UDS.KEYID = 0
3,521,733 ready_for_fw is high
3,521,927 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,239 UART: [idev] Erasing UDS.KEYID = 0
6,029,354 UART: [idev] Sha1 KeyId Algorithm
6,051,558 UART: [idev] --
6,054,452 UART: [ldev] ++
6,055,051 UART: [ldev] CDI.KEYID = 6
6,055,970 UART: [ldev] SUBJECT.KEYID = 5
6,057,131 UART: [ldev] AUTHORITY.KEYID = 7
6,058,419 UART: [ldev] FE.KEYID = 1
6,100,945 UART: [ldev] Erasing FE.KEYID = 1
8,605,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,155 UART: [ldev] --
10,414,586 UART: [fwproc] Wait for Commands...
10,416,299 UART: [fwproc] Recv command 0x46574c44
10,418,333 UART: [fwproc] Recv'd Img size: 114448 bytes
15,010,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,086,704 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,155,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,474,552 >>> mbox cmd response: success
15,479,218 UART: [afmc] ++
15,479,837 UART: [afmc] CDI.KEYID = 6
15,480,726 UART: [afmc] SUBJECT.KEYID = 7
15,481,942 UART: [afmc] AUTHORITY.KEYID = 5
18,022,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,743,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,745,507 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,761,454 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,777,436 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,793,217 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,815,033 UART: [afmc] --
19,818,419 UART: [cold-reset] --
19,821,523 UART: [state] Locking Datavault
19,828,290 UART: [state] Locking PCR0, PCR1 and PCR31
19,829,954 UART: [state] Locking ICCM
19,832,052 UART: [exit] Launching FMC @ 0x40000130
19,840,452 UART:
19,840,687 UART: Running Caliptra FMC ...
19,841,788 UART:
19,841,950 UART: [state] CFI Enabled
19,902,475 UART: [fht] FMC Alias Private Key: 7
21,666,585 UART: [art] Extend RT PCRs Done
21,667,809 UART: [art] Lock RT PCRs Done
21,669,358 UART: [art] Populate DV Done
21,674,607 UART: [fht] FMC Alias Private Key: 7
21,676,141 UART: [art] Derive CDI
21,676,878 UART: [art] Store in in slot 0x4
21,735,269 UART: [art] Derive Key Pair
21,736,312 UART: [art] Store priv key in slot 0x5
24,199,117 UART: [art] Derive Key Pair - Done
24,212,563 UART: [art] Signing Cert with AUTHO
24,213,864 UART: RITY.KEYID = 7
25,924,162 UART: [art] Erasing AUTHORITY.KEYID = 7
25,925,665 UART: [art] PUB.X = E4D63FB4105125071101A9610D3006749C98E71EBB8B95BA452D1E33A5C0BB6E8B61F78AF4731496079B71321CA5CD15
25,932,922 UART: [art] PUB.Y = 3204C2A5A6DA6ADECD0A4BDBFC86952C46DDFCE347B219B0A5FCA3B9672B514FD7B8868F02FA24E6980595E4013A614F
25,940,212 UART: [art] SIG.R = 20E1A29E411F797304685FB8186D4CE2BDA0D41A79AFB6E95FCE43D99E213659E9C0952F3FE448DD1EE98E448BABB4D2
25,947,617 UART: [art] SIG.S = 098D5FD9B9F1CB8ECA0CD7BEE21B117D1D1ABE459E880E74638B86BC321B9D599D2C3FD88987192144AB3A78F13F6D66
26,926,693 UART: Caliptra RT
26,927,394 UART: [state] CFI Enabled
27,091,601 UART: [rt] RT listening for mailbox commands...
27,093,889 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,250,089 UART: [rt]cmd =0x41544d4e, len=14344
29,609,174 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,154 writing to cptra_bootfsm_go
3,361,497 ready_for_fw is high
3,361,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,030,117 >>> mbox cmd response: success
19,325,598 UART:
19,326,001 UART: Running Caliptra FMC ...
19,327,146 UART:
19,327,309 UART: [state] CFI Enabled
19,394,583 UART: [fht] FMC Alias Private Key: 7
21,158,827 UART: [art] Extend RT PCRs Done
21,160,047 UART: [art] Lock RT PCRs Done
21,161,647 UART: [art] Populate DV Done
21,167,097 UART: [fht] FMC Alias Private Key: 7
21,168,696 UART: [art] Derive CDI
21,169,508 UART: [art] Store in in slot 0x4
21,227,588 UART: [art] Derive Key Pair
21,228,628 UART: [art] Store priv key in slot 0x5
23,691,749 UART: [art] Derive Key Pair - Done
23,704,366 UART: [art] Signing Cert with AUTHO
23,705,672 UART: RITY.KEYID = 7
25,417,778 UART: [art] Erasing AUTHORITY.KEYID = 7
25,419,279 UART: [art] PUB.X = 561C462E79C2C27520447184B4E67E078B7F012E2027DE855E51DCED44D0273A4ECDC8B72012E6EDEB7A4B6DDF79C002
25,426,581 UART: [art] PUB.Y = 5A8493288877D2CA3B98A492DE8230437CD89EFAB85C4D0BC8898137B57B526C11F1351AB8CB9FB10A1F48959D4DD041
25,433,838 UART: [art] SIG.R = 65EC16D1ED8315352084BBB26D47B873FA7D9A0E66A745BEA4E8F6FA739D8D1A182D753BEA63879C2774849D07ECC779
25,441,268 UART: [art] SIG.S = F05C195F9C4DA23817E790BE2E49FBEAF2AAFE6327E28B959926E6B5406281FB86586F1B76F47AD52DCAADF1677660C7
26,420,661 UART: Caliptra RT
26,421,357 UART: [state] CFI Enabled
26,586,156 UART: [rt] RT listening for mailbox commands...
26,588,448 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,744,160 UART: [rt]cmd =0x41544d4e, len=14344
29,098,856 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,522 UART:
192,900 UART: Running Caliptra ROM ...
194,025 UART:
603,525 UART: [state] CFI Enabled
613,730 UART: [state] LifecycleState = Unprovisioned
615,608 UART: [state] DebugLocked = No
618,406 UART: [state] WD Timer not started. Device not locked for debugging
622,227 UART: [kat] SHA2-256
801,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,956 UART: [kat] ++
813,489 UART: [kat] sha1
824,503 UART: [kat] SHA2-256
827,495 UART: [kat] SHA2-384
833,825 UART: [kat] SHA2-512-ACC
836,818 UART: [kat] ECC-384
3,276,887 UART: [kat] HMAC-384Kdf
3,289,618 UART: [kat] LMS
3,819,105 UART: [kat] --
3,823,039 UART: [cold-reset] ++
3,824,757 UART: [fht] FHT @ 0x50003400
3,836,154 UART: [idev] ++
3,836,714 UART: [idev] CDI.KEYID = 6
3,837,765 UART: [idev] SUBJECT.KEYID = 7
3,838,862 UART: [idev] UDS.KEYID = 0
3,839,779 ready_for_fw is high
3,839,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,983,676 UART: [idev] Erasing UDS.KEYID = 0
6,312,453 UART: [idev] Sha1 KeyId Algorithm
6,335,999 UART: [idev] --
6,338,769 UART: [ldev] ++
6,339,339 UART: [ldev] CDI.KEYID = 6
6,340,241 UART: [ldev] SUBJECT.KEYID = 5
6,341,461 UART: [ldev] AUTHORITY.KEYID = 7
6,342,688 UART: [ldev] FE.KEYID = 1
6,355,214 UART: [ldev] Erasing FE.KEYID = 1
8,827,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,421 UART: [ldev] --
10,620,431 UART: [fwproc] Wait for Commands...
10,621,917 UART: [fwproc] Recv command 0x46574c44
10,624,002 UART: [fwproc] Recv'd Img size: 114448 bytes
15,205,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,279,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,348,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,666,398 >>> mbox cmd response: success
15,669,856 UART: [afmc] ++
15,670,445 UART: [afmc] CDI.KEYID = 6
15,671,343 UART: [afmc] SUBJECT.KEYID = 7
15,672,546 UART: [afmc] AUTHORITY.KEYID = 5
18,171,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,893,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,895,704 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,911,654 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,927,660 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,943,436 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,966,882 UART: [afmc] --
19,970,094 UART: [cold-reset] --
19,975,626 UART: [state] Locking Datavault
19,980,865 UART: [state] Locking PCR0, PCR1 and PCR31
19,982,499 UART: [state] Locking ICCM
19,983,883 UART: [exit] Launching FMC @ 0x40000130
19,992,348 UART:
19,992,580 UART: Running Caliptra FMC ...
19,993,674 UART:
19,993,828 UART: [state] CFI Enabled
20,002,032 UART: [fht] FMC Alias Private Key: 7
21,758,841 UART: [art] Extend RT PCRs Done
21,760,057 UART: [art] Lock RT PCRs Done
21,761,839 UART: [art] Populate DV Done
21,767,292 UART: [fht] FMC Alias Private Key: 7
21,768,981 UART: [art] Derive CDI
21,769,798 UART: [art] Store in in slot 0x4
21,812,273 UART: [art] Derive Key Pair
21,813,265 UART: [art] Store priv key in slot 0x5
24,240,352 UART: [art] Derive Key Pair - Done
24,253,340 UART: [art] Signing Cert with AUTHO
24,254,662 UART: RITY.KEYID = 7
25,960,594 UART: [art] Erasing AUTHORITY.KEYID = 7
25,962,111 UART: [art] PUB.X = D1931B74F9142FC587F2DD849EBAEE50938A1D5433CA91F7E46F6F5103A1570D136E0F3BDC3291BB7F3085984512968A
25,969,343 UART: [art] PUB.Y = 634446DBA44613B7B4A2FAABF008F7F8B1FDC6D4CDBA12E6322C35F24D469A909673E8B496D3FA5588B943FA239540DF
25,976,604 UART: [art] SIG.R = 92E8B8EC2715FEBDF0519D20BF308531624F5064920377918CC8A43F6DCE1F88EDFB876C095D86ED2EDB0CE3428B99B4
25,983,986 UART: [art] SIG.S = 82AE3C5449D87AEC7B2D0991F4EE83CD7586A2EEA16781AF0CB47254F0F6FC438247ED54884D5E341290251E9C818272
26,963,150 UART: Caliptra RT
26,963,835 UART: [state] CFI Enabled
27,080,465 UART: [rt] RT listening for mailbox commands...
27,082,729 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,237,933 UART: [rt]cmd =0x41544d4e, len=14344
29,602,402 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,696,700 ready_for_fw is high
3,697,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,265,906 >>> mbox cmd response: success
19,524,191 UART:
19,524,577 UART: Running Caliptra FMC ...
19,525,665 UART:
19,525,809 UART: [state] CFI Enabled
19,533,902 UART: [fht] FMC Alias Private Key: 7
21,290,914 UART: [art] Extend RT PCRs Done
21,292,119 UART: [art] Lock RT PCRs Done
21,293,353 UART: [art] Populate DV Done
21,298,644 UART: [fht] FMC Alias Private Key: 7
21,300,336 UART: [art] Derive CDI
21,301,085 UART: [art] Store in in slot 0x4
21,344,004 UART: [art] Derive Key Pair
21,345,003 UART: [art] Store priv key in slot 0x5
23,771,484 UART: [art] Derive Key Pair - Done
23,784,864 UART: [art] Signing Cert with AUTHO
23,786,164 UART: RITY.KEYID = 7
25,491,700 UART: [art] Erasing AUTHORITY.KEYID = 7
25,493,180 UART: [art] PUB.X = E76B435446582E94F33CB123E7581DA24CBC051DB314A855BB3CF964D4BDB7DD6BF5DAF7E1E6A92CA57B462F613E2B76
25,500,498 UART: [art] PUB.Y = B91DC0F32EC5223329FD3D07407B6B71150C6E08302DADD1442B5FF95C4ADA1B60AA242C082DC9D664ACA6ADB0145092
25,507,771 UART: [art] SIG.R = 8DDEE47DC6FF261E13B25D44EFDF5ECF75B8C71A0C94740E8FA31D3F876EF15CDB5A95F6389EDA5ED38B82448C6888B6
25,515,173 UART: [art] SIG.S = 9A6E95ADB82A4144467D5809805675C4153CE38B7586385A143F465D77FCAD25F2D0BF1A659AA903DCEE18161DC4A7AA
26,493,900 UART: Caliptra RT
26,494,615 UART: [state] CFI Enabled
26,612,450 UART: [rt] RT listening for mailbox commands...
26,614,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,770,153 UART: [rt]cmd =0x41544d4e, len=14344
29,135,461 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,437,651 ready_for_fw is high
3,438,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,810,523 >>> mbox cmd response: success
20,096,561 UART:
20,096,984 UART: Running Caliptra FMC ...
20,098,100 UART:
20,098,258 UART: [state] CFI Enabled
20,162,411 UART: [fht] FMC Alias Private Key: 7
21,926,485 UART: [art] Extend RT PCRs Done
21,927,706 UART: [art] Lock RT PCRs Done
21,929,299 UART: [art] Populate DV Done
21,934,935 UART: [fht] FMC Alias Private Key: 7
21,936,585 UART: [art] Derive CDI
21,937,327 UART: [art] Store in in slot 0x4
21,995,344 UART: [art] Derive Key Pair
21,996,379 UART: [art] Store priv key in slot 0x5
24,459,536 UART: [art] Derive Key Pair - Done
24,472,374 UART: [art] Signing Cert with AUTHO
24,473,683 UART: RITY.KEYID = 7
26,185,707 UART: [art] Erasing AUTHORITY.KEYID = 7
26,187,522 UART: [art] PUB.X = 714281630011C12F39B46CAB0C4370C07D8D26756C648CE417F4DD8F0C302A27F2A95929E9DAEB370D5A00627D6FCAD1
26,194,441 UART: [art] PUB.Y = D2CF4FEB308F6E08D748E7E1AEC18E0BF81913076E5DD99640EE9E2D12802A841F38AEA24BF44B227B91EECD9D21BBB3
26,201,700 UART: [art] SIG.R = A770367087D1756EFCA0DA4FC4655697C4A86789BAF323652CF50BC7E9B6E524DF59BCBBB07BE08BBDD5A07DBA6ED6CE
26,209,146 UART: [art] SIG.S = B707C25B6B3CD23B174013E22853EC270AB43C15D3E5C349EB4F2DE4AAC7C004713B1E59578F9E3C4A51B38F3BAF11C2
27,187,951 UART: Caliptra RT
27,188,969 UART: [state] CFI Enabled
27,355,240 UART: [rt] RT listening for mailbox commands...
27,357,569 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,513,750 UART: [rt]cmd =0x41544d4e, len=14344
29,883,913 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,757,283 ready_for_fw is high
3,757,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,065,178 >>> mbox cmd response: success
20,318,573 UART:
20,318,978 UART: Running Caliptra FMC ...
20,320,079 UART:
20,320,225 UART: [state] CFI Enabled
20,327,616 UART: [fht] FMC Alias Private Key: 7
22,084,264 UART: [art] Extend RT PCRs Done
22,085,485 UART: [art] Lock RT PCRs Done
22,086,974 UART: [art] Populate DV Done
22,092,228 UART: [fht] FMC Alias Private Key: 7
22,093,767 UART: [art] Derive CDI
22,094,502 UART: [art] Store in in slot 0x4
22,137,413 UART: [art] Derive Key Pair
22,138,405 UART: [art] Store priv key in slot 0x5
24,565,591 UART: [art] Derive Key Pair - Done
24,578,586 UART: [art] Signing Cert with AUTHO
24,579,889 UART: RITY.KEYID = 7
26,285,203 UART: [art] Erasing AUTHORITY.KEYID = 7
26,286,708 UART: [art] PUB.X = D0D4AA78966398AA743A864F4F053FEF2F277DFF3EC7815EB9EC1FE1136E61CF089E1E0E83003ED35D047277C1BDF63D
26,293,973 UART: [art] PUB.Y = 83919296A0694DAB47BB8B957544F3C5B7B2351F527B7B00687BC1DDB9D928EC27BDBAF2F821C4DB0BC6ED1619AE74EC
26,301,223 UART: [art] SIG.R = F27039957F0B12478FB0F215625B21B259B1E2782DA41054FE53B71ED2ED23C34B7887AD26AE74F867A01521AD0081D4
26,308,614 UART: [art] SIG.S = D380B70A00CBD7E0FBC7B49653E18A3C529F593FB2C9EBB6BE55FAB29E1D0BA75E4822DF20BEE4233675455FB7B389C1
27,287,676 UART: Caliptra RT
27,288,359 UART: [state] CFI Enabled
27,405,085 UART: [rt] RT listening for mailbox commands...
27,407,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,562,588 UART: [rt]cmd =0x41544d4e, len=14344
29,930,103 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,951 UART: [kat] SHA2-256
881,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,997 UART: [kat] ++
886,149 UART: [kat] sha1
890,339 UART: [kat] SHA2-256
892,277 UART: [kat] SHA2-384
894,912 UART: [kat] SHA2-512-ACC
896,813 UART: [kat] ECC-384
902,486 UART: [kat] HMAC-384Kdf
906,988 UART: [kat] LMS
1,475,184 UART: [kat] --
1,476,051 UART: [cold-reset] ++
1,476,407 UART: [fht] Storing FHT @ 0x50003400
1,479,202 UART: [idev] ++
1,479,370 UART: [idev] CDI.KEYID = 6
1,479,730 UART: [idev] SUBJECT.KEYID = 7
1,480,154 UART: [idev] UDS.KEYID = 0
1,480,499 ready_for_fw is high
1,480,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,076 UART: [idev] Erasing UDS.KEYID = 0
1,505,000 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,664 UART: [idev] --
1,514,667 UART: [ldev] ++
1,514,835 UART: [ldev] CDI.KEYID = 6
1,515,198 UART: [ldev] SUBJECT.KEYID = 5
1,515,624 UART: [ldev] AUTHORITY.KEYID = 7
1,516,087 UART: [ldev] FE.KEYID = 1
1,520,957 UART: [ldev] Erasing FE.KEYID = 1
1,546,136 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,634 UART: [ldev] --
1,585,107 UART: [fwproc] Waiting for Commands...
1,585,744 UART: [fwproc] Received command 0x46574c44
1,586,535 UART: [fwproc] Received Image of size 114448 bytes
5,310,576 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,338,554 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,367,906 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,504,031 >>> mbox cmd response: success
5,505,199 UART: [afmc] ++
5,505,367 UART: [afmc] CDI.KEYID = 6
5,505,729 UART: [afmc] SUBJECT.KEYID = 7
5,506,154 UART: [afmc] AUTHORITY.KEYID = 5
5,540,868 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,557,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,558,032 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,563,741 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,569,633 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,575,334 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,583,010 UART: [afmc] --
5,584,028 UART: [cold-reset] --
5,584,688 UART: [state] Locking Datavault
5,585,949 UART: [state] Locking PCR0, PCR1 and PCR31
5,586,553 UART: [state] Locking ICCM
5,587,187 UART: [exit] Launching FMC @ 0x40000130
5,592,516 UART:
5,592,532 UART: Running Caliptra FMC ...
5,592,940 UART:
5,592,994 UART: [state] CFI Enabled
5,603,454 UART: [fht] FMC Alias Private Key: 7
5,711,156 UART: [art] Extend RT PCRs Done
5,711,584 UART: [art] Lock RT PCRs Done
5,713,176 UART: [art] Populate DV Done
5,721,528 UART: [fht] FMC Alias Private Key: 7
5,722,478 UART: [art] Derive CDI
5,722,758 UART: [art] Store in in slot 0x4
5,808,725 UART: [art] Derive Key Pair
5,809,085 UART: [art] Store priv key in slot 0x5
5,822,197 UART: [art] Derive Key Pair - Done
5,837,178 UART: [art] Signing Cert with AUTHO
5,837,658 UART: RITY.KEYID = 7
5,852,784 UART: [art] Erasing AUTHORITY.KEYID = 7
5,853,549 UART: [art] PUB.X = E44F96387DA05A7D5845C86E85D54125A9CBB26FC6736B9E62A2137D34B2C140FD561BF8340E8EB3552C9D0F29FFB601
5,860,316 UART: [art] PUB.Y = 668F9413E9D604BD1594AEB50340441751CDC2972B1476CF834727EE5E266E2E052F01B4AB5A1D9131100C4504E16472
5,867,240 UART: [art] SIG.R = D6FB49B47F0158EAEF5B87F281E6081CA3ABD9F4CDBC18034A28D2F58DFD4C59B8F89301B7B32D19C86B2897BCB6C054
5,874,016 UART: [art] SIG.S = 715D12FEE46ED85843EBA57A2502EEAD23C872A9233BF63E6330EDFF0AB4AC04CE056968FE5C583D773B1C9E0DA486C1
5,897,910 UART: Caliptra RT
5,898,163 UART: [state] CFI Enabled
6,005,666 UART: [rt] RT listening for mailbox commands...
6,006,336 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,129,440 UART: [rt]cmd =0x41544d4e, len=14344
6,692,257 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,543 ready_for_fw is high
1,362,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,202,571 >>> mbox cmd response: success
5,263,170 UART:
5,263,186 UART: Running Caliptra FMC ...
5,263,594 UART:
5,263,648 UART: [state] CFI Enabled
5,274,386 UART: [fht] FMC Alias Private Key: 7
5,382,622 UART: [art] Extend RT PCRs Done
5,383,050 UART: [art] Lock RT PCRs Done
5,384,962 UART: [art] Populate DV Done
5,393,036 UART: [fht] FMC Alias Private Key: 7
5,394,084 UART: [art] Derive CDI
5,394,364 UART: [art] Store in in slot 0x4
5,479,981 UART: [art] Derive Key Pair
5,480,341 UART: [art] Store priv key in slot 0x5
5,493,437 UART: [art] Derive Key Pair - Done
5,508,176 UART: [art] Signing Cert with AUTHO
5,508,656 UART: RITY.KEYID = 7
5,523,854 UART: [art] Erasing AUTHORITY.KEYID = 7
5,524,619 UART: [art] PUB.X = 53148E735445E102C3C48C8EE1613E5008DF8259FC31EDDCCCC522E454691A0E6840C34D50B9DE7641A87442D38FE20E
5,531,379 UART: [art] PUB.Y = D70EEBAEB2A0352869B9DCA035A4FAEF5DAC05A38B8D0EDB746DBB9507043DAD9630C9E24888A104CD6F830FF1CCC0BC
5,538,336 UART: [art] SIG.R = 238BEA568D1C25EE009CA93DFD569CC1227972212E6AAAC53AA459B7FF2CCCB656CEC7448C593AF95E7986CBFA83FA33
5,545,104 UART: [art] SIG.S = 6359EB0420AD9458C97397E8253454EB44F65ACD8CD39D69757397ED488F3973EB3C65821A5A2B912F11ED67909C9C09
5,568,383 UART: Caliptra RT
5,568,636 UART: [state] CFI Enabled
5,677,010 UART: [rt] RT listening for mailbox commands...
5,677,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,800,640 UART: [rt]cmd =0x41544d4e, len=14344
6,351,366 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,404 UART: [kat] SHA2-256
882,335 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,450 UART: [kat] ++
886,602 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,539 UART: [kat] SHA2-512-ACC
897,440 UART: [kat] ECC-384
903,099 UART: [kat] HMAC-384Kdf
907,617 UART: [kat] LMS
1,475,813 UART: [kat] --
1,476,588 UART: [cold-reset] ++
1,477,018 UART: [fht] Storing FHT @ 0x50003400
1,479,735 UART: [idev] ++
1,479,903 UART: [idev] CDI.KEYID = 6
1,480,263 UART: [idev] SUBJECT.KEYID = 7
1,480,687 UART: [idev] UDS.KEYID = 0
1,481,032 ready_for_fw is high
1,481,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,487 UART: [idev] Erasing UDS.KEYID = 0
1,505,569 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,153 UART: [idev] --
1,515,118 UART: [ldev] ++
1,515,286 UART: [ldev] CDI.KEYID = 6
1,515,649 UART: [ldev] SUBJECT.KEYID = 5
1,516,075 UART: [ldev] AUTHORITY.KEYID = 7
1,516,538 UART: [ldev] FE.KEYID = 1
1,521,508 UART: [ldev] Erasing FE.KEYID = 1
1,546,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,653 UART: [ldev] --
1,586,124 UART: [fwproc] Waiting for Commands...
1,586,989 UART: [fwproc] Received command 0x46574c44
1,587,780 UART: [fwproc] Received Image of size 114448 bytes
5,159,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,188,007 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,217,359 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,353,496 >>> mbox cmd response: success
5,354,648 UART: [afmc] ++
5,354,816 UART: [afmc] CDI.KEYID = 6
5,355,178 UART: [afmc] SUBJECT.KEYID = 7
5,355,603 UART: [afmc] AUTHORITY.KEYID = 5
5,390,565 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,406,981 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,407,761 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,413,470 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,419,362 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,425,063 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,432,901 UART: [afmc] --
5,433,865 UART: [cold-reset] --
5,434,605 UART: [state] Locking Datavault
5,435,696 UART: [state] Locking PCR0, PCR1 and PCR31
5,436,300 UART: [state] Locking ICCM
5,436,826 UART: [exit] Launching FMC @ 0x40000130
5,442,155 UART:
5,442,171 UART: Running Caliptra FMC ...
5,442,579 UART:
5,442,722 UART: [state] CFI Enabled
5,453,422 UART: [fht] FMC Alias Private Key: 7
5,561,204 UART: [art] Extend RT PCRs Done
5,561,632 UART: [art] Lock RT PCRs Done
5,563,212 UART: [art] Populate DV Done
5,571,660 UART: [fht] FMC Alias Private Key: 7
5,572,818 UART: [art] Derive CDI
5,573,098 UART: [art] Store in in slot 0x4
5,658,251 UART: [art] Derive Key Pair
5,658,611 UART: [art] Store priv key in slot 0x5
5,672,293 UART: [art] Derive Key Pair - Done
5,687,046 UART: [art] Signing Cert with AUTHO
5,687,526 UART: RITY.KEYID = 7
5,702,898 UART: [art] Erasing AUTHORITY.KEYID = 7
5,703,663 UART: [art] PUB.X = DA52EDB9EC3EB41BF3D1D36DF14B08C07880DDF5F7B8AFBAE517CFF854AC7376C6AC1C7ABBD55097DA2680132A54E863
5,710,456 UART: [art] PUB.Y = 3A4E7F0EA5C1CCE4A37A863EB1F7068E31A85F3BBE1750F9AE3EDE8ADA24A3F562DCC65EE228E8E0377AE4BE219B1BD3
5,717,428 UART: [art] SIG.R = 272BD53F10FB86BA0BC83E3211BE5B5E06F3005057E8FCCB163AD52AA9E305EC2377532839B6097AC873F1487130D68A
5,724,168 UART: [art] SIG.S = 41F5B73FCCB7A4F9BCE9BB030D3543BBD147DF451FE9482DB67B95738FF758DFD8185CA04737FDD4A4EC369679DB82CA
5,748,189 UART: Caliptra RT
5,748,534 UART: [state] CFI Enabled
5,857,296 UART: [rt] RT listening for mailbox commands...
5,857,966 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,980,862 UART: [rt]cmd =0x41544d4e, len=14344
6,544,155 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,964 ready_for_fw is high
1,362,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,977,272 >>> mbox cmd response: success
5,039,443 UART:
5,039,459 UART: Running Caliptra FMC ...
5,039,867 UART:
5,040,010 UART: [state] CFI Enabled
5,050,802 UART: [fht] FMC Alias Private Key: 7
5,158,212 UART: [art] Extend RT PCRs Done
5,158,640 UART: [art] Lock RT PCRs Done
5,160,418 UART: [art] Populate DV Done
5,168,688 UART: [fht] FMC Alias Private Key: 7
5,169,846 UART: [art] Derive CDI
5,170,126 UART: [art] Store in in slot 0x4
5,256,095 UART: [art] Derive Key Pair
5,256,455 UART: [art] Store priv key in slot 0x5
5,269,555 UART: [art] Derive Key Pair - Done
5,284,459 UART: [art] Signing Cert with AUTHO
5,284,939 UART: RITY.KEYID = 7
5,300,435 UART: [art] Erasing AUTHORITY.KEYID = 7
5,301,200 UART: [art] PUB.X = 64DA0E9B03F62AD115679BA57FCF77E130F50C1E43A38A22C5C489B197ACEE68B5737D11B627C68AAAA6404DD6878900
5,307,947 UART: [art] PUB.Y = C8495770DDF1DE012E17D6636CC333636C8FCA0E3DB00C4F744857C3E3FC77E96D5D889596290BCF5A6C96F11AF61FFD
5,314,897 UART: [art] SIG.R = 2444B6B39CFBBB0A79A33E578AF13A694E6609F050763237CEDEB572B1B75ECE97E6D4C71CA0B23F2BB9EFB20F3309B5
5,321,671 UART: [art] SIG.S = 1F9CBFE2624D5C415AB94432DF84C57010FBE7913C301806748B7F8256449F3F837EDDCA1BFAD85CF17B13ECB0465EA1
5,345,875 UART: Caliptra RT
5,346,220 UART: [state] CFI Enabled
5,454,232 UART: [rt] RT listening for mailbox commands...
5,454,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,577,796 UART: [rt]cmd =0x41544d4e, len=14344
6,143,072 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
917,898 UART: [kat] HMAC-384Kdf
922,424 UART: [kat] LMS
1,170,752 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,172,079 UART: [fht] FHT @ 0x50003400
1,174,792 UART: [idev] ++
1,174,960 UART: [idev] CDI.KEYID = 6
1,175,320 UART: [idev] SUBJECT.KEYID = 7
1,175,744 UART: [idev] UDS.KEYID = 0
1,176,089 ready_for_fw is high
1,176,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,724 UART: [idev] Erasing UDS.KEYID = 0
1,201,011 UART: [idev] Sha1 KeyId Algorithm
1,209,423 UART: [idev] --
1,210,579 UART: [ldev] ++
1,210,747 UART: [ldev] CDI.KEYID = 6
1,211,110 UART: [ldev] SUBJECT.KEYID = 5
1,211,536 UART: [ldev] AUTHORITY.KEYID = 7
1,211,999 UART: [ldev] FE.KEYID = 1
1,217,359 UART: [ldev] Erasing FE.KEYID = 1
1,243,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,519 UART: [ldev] --
1,282,786 UART: [fwproc] Wait for Commands...
1,283,442 UART: [fwproc] Recv command 0x46574c44
1,284,170 UART: [fwproc] Recv'd Img size: 114448 bytes
3,122,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,568 >>> mbox cmd response: success
3,316,714 UART: [afmc] ++
3,316,882 UART: [afmc] CDI.KEYID = 6
3,317,244 UART: [afmc] SUBJECT.KEYID = 7
3,317,669 UART: [afmc] AUTHORITY.KEYID = 5
3,352,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,262 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,971 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,863 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,574 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,471 UART: [afmc] --
3,396,435 UART: [cold-reset] --
3,397,397 UART: [state] Locking Datavault
3,398,520 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,124 UART: [state] Locking ICCM
3,399,566 UART: [exit] Launching FMC @ 0x40000130
3,404,895 UART:
3,404,911 UART: Running Caliptra FMC ...
3,405,319 UART:
3,405,373 UART: [state] CFI Enabled
3,415,611 UART: [fht] FMC Alias Private Key: 7
3,524,151 UART: [art] Extend RT PCRs Done
3,524,579 UART: [art] Lock RT PCRs Done
3,526,285 UART: [art] Populate DV Done
3,534,585 UART: [fht] FMC Alias Private Key: 7
3,535,677 UART: [art] Derive CDI
3,535,957 UART: [art] Store in in slot 0x4
3,622,024 UART: [art] Derive Key Pair
3,622,384 UART: [art] Store priv key in slot 0x5
3,635,972 UART: [art] Derive Key Pair - Done
3,650,750 UART: [art] Signing Cert with AUTHO
3,651,230 UART: RITY.KEYID = 7
3,666,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,619 UART: [art] PUB.X = 2C444E3BDA7F9A0A74CE49EFF3B4D5ABCD625D994181F0B92CAAD1F725FB17FF6C51457AE0A7BBE5264785CD8CC82E72
3,674,410 UART: [art] PUB.Y = 2E9A0C6D8458E2670A8ECF8708AF13FFD3BDCF693FBFDB39913AFD2B19A4F7F28564C5B871FA4FE42DA0488A18F19756
3,681,369 UART: [art] SIG.R = 34517F071F878ED5CE6BFB970914C66E6F1001326B16F5C3291A31DCCFF5AD380DF65EDD7E9DEAE86F903205DC10A3BC
3,688,140 UART: [art] SIG.S = F0742C53872960BBE202A1E678B3B743F0D19E60A6E9DACC6A8E5A88A41740E32731146618B056B32A12F7F321939D2F
3,712,192 UART: Caliptra RT
3,712,445 UART: [state] CFI Enabled
3,820,741 UART: [rt] RT listening for mailbox commands...
3,821,411 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,559 UART: [rt]cmd =0x41544d4e, len=14344
4,507,718 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,311 ready_for_fw is high
1,060,311 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,163,847 >>> mbox cmd response: success
3,226,010 UART:
3,226,026 UART: Running Caliptra FMC ...
3,226,434 UART:
3,226,488 UART: [state] CFI Enabled
3,236,818 UART: [fht] FMC Alias Private Key: 7
3,344,316 UART: [art] Extend RT PCRs Done
3,344,744 UART: [art] Lock RT PCRs Done
3,346,600 UART: [art] Populate DV Done
3,354,976 UART: [fht] FMC Alias Private Key: 7
3,356,098 UART: [art] Derive CDI
3,356,378 UART: [art] Store in in slot 0x4
3,441,373 UART: [art] Derive Key Pair
3,441,733 UART: [art] Store priv key in slot 0x5
3,454,089 UART: [art] Derive Key Pair - Done
3,468,738 UART: [art] Signing Cert with AUTHO
3,469,218 UART: RITY.KEYID = 7
3,484,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,525 UART: [art] PUB.X = 3B39042B6F1882AE9A639F310C4DA8040A23ABB18F5B609548D78B62B8F654BA84E3C97C9E0A25CD1C1E5954FFF26559
3,492,286 UART: [art] PUB.Y = 0440E5943E6571F576B98FA4F5B37B836E0585E0F32C1CCC3C273435A9E0DBD0C1C51E92DCE7688C5683A25A5099AB53
3,499,234 UART: [art] SIG.R = 53BCF1D861EF2CCFFC73F104F913B30A5FD9B077E73FC5C2DC333358285147A35CE2249E221D7F6950B6420447FCDB76
3,506,003 UART: [art] SIG.S = B73B9DB4407A6FD9D137311942D2290F7FCBAA604276AB73EA082A1C88F49EC148D8EE833D771908E940FBACCE3862D9
3,530,101 UART: Caliptra RT
3,530,354 UART: [state] CFI Enabled
3,637,454 UART: [rt] RT listening for mailbox commands...
3,638,124 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,450 UART: [rt]cmd =0x41544d4e, len=14344
4,321,850 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
87,010 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
893,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,006 UART: [kat] ++
898,158 UART: [kat] sha1
902,330 UART: [kat] SHA2-256
904,270 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,907 UART: [kat] HMAC-384Kdf
923,655 UART: [kat] LMS
1,171,983 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,398 UART: [fht] FHT @ 0x50003400
1,176,063 UART: [idev] ++
1,176,231 UART: [idev] CDI.KEYID = 6
1,176,591 UART: [idev] SUBJECT.KEYID = 7
1,177,015 UART: [idev] UDS.KEYID = 0
1,177,360 ready_for_fw is high
1,177,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,099 UART: [idev] Erasing UDS.KEYID = 0
1,203,194 UART: [idev] Sha1 KeyId Algorithm
1,211,672 UART: [idev] --
1,212,684 UART: [ldev] ++
1,212,852 UART: [ldev] CDI.KEYID = 6
1,213,215 UART: [ldev] SUBJECT.KEYID = 5
1,213,641 UART: [ldev] AUTHORITY.KEYID = 7
1,214,104 UART: [ldev] FE.KEYID = 1
1,219,366 UART: [ldev] Erasing FE.KEYID = 1
1,245,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,024 UART: [ldev] --
1,284,369 UART: [fwproc] Wait for Commands...
1,285,147 UART: [fwproc] Recv command 0x46574c44
1,285,875 UART: [fwproc] Recv'd Img size: 114448 bytes
3,135,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,163,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,193,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,329,046 >>> mbox cmd response: success
3,330,180 UART: [afmc] ++
3,330,348 UART: [afmc] CDI.KEYID = 6
3,330,710 UART: [afmc] SUBJECT.KEYID = 7
3,331,135 UART: [afmc] AUTHORITY.KEYID = 5
3,366,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,414 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,390,123 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,396,015 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,401,726 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,409,517 UART: [afmc] --
3,410,501 UART: [cold-reset] --
3,411,259 UART: [state] Locking Datavault
3,412,626 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,230 UART: [state] Locking ICCM
3,413,742 UART: [exit] Launching FMC @ 0x40000130
3,419,071 UART:
3,419,087 UART: Running Caliptra FMC ...
3,419,495 UART:
3,419,638 UART: [state] CFI Enabled
3,430,190 UART: [fht] FMC Alias Private Key: 7
3,538,742 UART: [art] Extend RT PCRs Done
3,539,170 UART: [art] Lock RT PCRs Done
3,540,682 UART: [art] Populate DV Done
3,548,782 UART: [fht] FMC Alias Private Key: 7
3,549,714 UART: [art] Derive CDI
3,549,994 UART: [art] Store in in slot 0x4
3,635,429 UART: [art] Derive Key Pair
3,635,789 UART: [art] Store priv key in slot 0x5
3,648,693 UART: [art] Derive Key Pair - Done
3,663,234 UART: [art] Signing Cert with AUTHO
3,663,714 UART: RITY.KEYID = 7
3,678,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,569 UART: [art] PUB.X = 6C9DD4A0198CEB6F91CC7034064C0C5D95C99B4F810F27E72CC59395A7BB46322CA79EE330073E16F9E9738147D8734A
3,686,329 UART: [art] PUB.Y = 6B34EA51F810EA4039406956C0828DCAF316B4A3B17E86896D78DA3960F42CF8DAD6E24B27F2C7460E39C5D3842FEA91
3,693,282 UART: [art] SIG.R = ADE2AFB25FD612B74BED0751F820DE47D6D44BDF7747DB8D664EFA1F8BE59528F5E94EBCBD56A2C5138AD9E5A26C2BAA
3,700,079 UART: [art] SIG.S = 231E8F92BF97DAA5CDE7844F3EE532AC103B9DDC2EE7B71172D667E0F0514BABC81B24175C65D9ABE80BE2BF2B4CF150
3,723,871 UART: Caliptra RT
3,724,216 UART: [state] CFI Enabled
3,831,176 UART: [rt] RT listening for mailbox commands...
3,831,846 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,820 UART: [rt]cmd =0x41544d4e, len=14344
4,508,067 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,606 ready_for_fw is high
1,060,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,879 >>> mbox cmd response: success
3,233,728 UART:
3,233,744 UART: Running Caliptra FMC ...
3,234,152 UART:
3,234,295 UART: [state] CFI Enabled
3,244,771 UART: [fht] FMC Alias Private Key: 7
3,352,513 UART: [art] Extend RT PCRs Done
3,352,941 UART: [art] Lock RT PCRs Done
3,354,533 UART: [art] Populate DV Done
3,362,499 UART: [fht] FMC Alias Private Key: 7
3,363,491 UART: [art] Derive CDI
3,363,771 UART: [art] Store in in slot 0x4
3,449,696 UART: [art] Derive Key Pair
3,450,056 UART: [art] Store priv key in slot 0x5
3,463,322 UART: [art] Derive Key Pair - Done
3,478,003 UART: [art] Signing Cert with AUTHO
3,478,483 UART: RITY.KEYID = 7
3,493,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,212 UART: [art] PUB.X = C10D6DD67BDA14E2CA41EA9E54A80C7F60A3C2E69976D2534C6D8F8841BBB1B54182EC89B0DAA98234E2C71476991F96
3,500,986 UART: [art] PUB.Y = 7EA34B5CF03467B7DA53F3AA95DCC20CCD73AD79BC9721AC5160DD65CC58586B0D28B7C2E31ED03C9EFF5317A2D1AD53
3,507,952 UART: [art] SIG.R = 171764A84B35206933682E18D4C773327726CE97E290F685A794B657A765EA8913DCA2FDC9E797C9BD511E32B458320D
3,514,711 UART: [art] SIG.S = 578FC2A0F87F8738C2192AFC56C271FA6022398D0988D7B16E59340E1151CE7649D0BD91608AAD11834F346D289EF6F8
3,538,722 UART: Caliptra RT
3,539,067 UART: [state] CFI Enabled
3,647,228 UART: [rt] RT listening for mailbox commands...
3,647,898 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,910 UART: [rt]cmd =0x41544d4e, len=14344
4,326,568 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,730 UART: [state] LifecycleState = Unprovisioned
85,385 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,154 UART: [kat] SHA2-256
890,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,833 UART: [kat] ++
894,985 UART: [kat] sha1
899,149 UART: [kat] SHA2-256
901,089 UART: [kat] SHA2-384
903,812 UART: [kat] SHA2-512-ACC
905,713 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,067 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,173,983 ready_for_fw is high
1,173,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,693 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,093 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,214,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,180 UART: [ldev] --
1,280,636 UART: [fwproc] Wait for Commands...
1,281,395 UART: [fwproc] Recv command 0x46574c44
1,282,128 UART: [fwproc] Recv'd Img size: 114448 bytes
3,122,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,603 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,912 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,924 >>> mbox cmd response: success
3,316,981 UART: [afmc] ++
3,317,149 UART: [afmc] CDI.KEYID = 6
3,317,512 UART: [afmc] SUBJECT.KEYID = 7
3,317,938 UART: [afmc] AUTHORITY.KEYID = 5
3,353,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,919 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,629 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,519 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,230 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,096 UART: [afmc] --
3,397,042 UART: [cold-reset] --
3,398,006 UART: [state] Locking Datavault
3,399,019 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,623 UART: [state] Locking ICCM
3,400,175 UART: [exit] Launching FMC @ 0x40000130
3,405,504 UART:
3,405,520 UART: Running Caliptra FMC ...
3,405,928 UART:
3,405,982 UART: [state] CFI Enabled
3,416,522 UART: [fht] FMC Alias Private Key: 7
3,523,852 UART: [art] Extend RT PCRs Done
3,524,280 UART: [art] Lock RT PCRs Done
3,525,914 UART: [art] Populate DV Done
3,534,400 UART: [fht] FMC Alias Private Key: 7
3,535,520 UART: [art] Derive CDI
3,535,800 UART: [art] Store in in slot 0x4
3,621,227 UART: [art] Derive Key Pair
3,621,587 UART: [art] Store priv key in slot 0x5
3,635,315 UART: [art] Derive Key Pair - Done
3,649,970 UART: [art] Signing Cert with AUTHO
3,650,450 UART: RITY.KEYID = 7
3,665,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,599 UART: [art] PUB.X = 5230E0D98FAD2A3C125260860B281189C41C0D4EFEEFE219692E18019F3871D9BAB7B3D8C657F926676E9FE5D443B008
3,673,359 UART: [art] PUB.Y = 746D5BDDC56539741CD988354DDFE3FD5FD6D60D1C8FD59D76149616BAD38CBB6D902522F490AD8B283D01DFCF6D139F
3,680,319 UART: [art] SIG.R = 9D21E9FBBC9656A91CB10ABD7E5B9D0C08BEE927788145769A7211F783BD66A611688965F0A12587587D461279D6F7EE
3,687,080 UART: [art] SIG.S = 4856DCE692D7AEFC4362766C818039E316132DDD6211A1FA9D26BA97A1C96ACF8D4E4CB56D75880AF5D52AAC16170479
3,711,017 UART: Caliptra RT
3,711,270 UART: [state] CFI Enabled
3,819,570 UART: [rt] RT listening for mailbox commands...
3,820,240 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,392 UART: [rt]cmd =0x41544d4e, len=14344
4,501,965 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,204 ready_for_fw is high
1,056,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,158,725 >>> mbox cmd response: success
3,221,320 UART:
3,221,336 UART: Running Caliptra FMC ...
3,221,744 UART:
3,221,798 UART: [state] CFI Enabled
3,232,212 UART: [fht] FMC Alias Private Key: 7
3,340,504 UART: [art] Extend RT PCRs Done
3,340,932 UART: [art] Lock RT PCRs Done
3,342,532 UART: [art] Populate DV Done
3,350,568 UART: [fht] FMC Alias Private Key: 7
3,351,584 UART: [art] Derive CDI
3,351,864 UART: [art] Store in in slot 0x4
3,437,657 UART: [art] Derive Key Pair
3,438,017 UART: [art] Store priv key in slot 0x5
3,451,155 UART: [art] Derive Key Pair - Done
3,466,292 UART: [art] Signing Cert with AUTHO
3,466,772 UART: RITY.KEYID = 7
3,481,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,482,273 UART: [art] PUB.X = 10FABEFCD16035BB1A67013D78B514B6CDC95982F5385746F5D95FE204B0C9277B51BFD58855D7556FC7D3119C1CF331
3,489,043 UART: [art] PUB.Y = DB6B6671C77A41B0804F61A6858ADD89C730C502B509BE44264A964561B9CAEE2914080B99334E11FC043AF6ADA46AA5
3,495,982 UART: [art] SIG.R = BC4BF61C8377FC766225C6DF3A48BDE9E83B33B34BDB7033D989CA78C75EFA8D3DD229681BA7E455A4DAE13391CDEEC2
3,502,774 UART: [art] SIG.S = 54E34B44EBB9E8A1CFBC6E8BDF50F503B8D9BA6BF21B3B38B2A28593FF0ED3FBA7832A84A077E9773A109017A7A92C42
3,526,397 UART: Caliptra RT
3,526,650 UART: [state] CFI Enabled
3,634,340 UART: [rt] RT listening for mailbox commands...
3,635,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,718 UART: [rt]cmd =0x41544d4e, len=14344
4,318,630 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,789 UART: [kat] SHA2-512-ACC
906,690 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,170,034 UART: [cold-reset] ++
1,170,372 UART: [fht] FHT @ 0x50003400
1,173,156 UART: [idev] ++
1,173,324 UART: [idev] CDI.KEYID = 6
1,173,685 UART: [idev] SUBJECT.KEYID = 7
1,174,110 UART: [idev] UDS.KEYID = 0
1,174,456 ready_for_fw is high
1,174,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,110 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,295 UART: [ldev] ++
1,209,463 UART: [ldev] CDI.KEYID = 6
1,209,827 UART: [ldev] SUBJECT.KEYID = 5
1,210,254 UART: [ldev] AUTHORITY.KEYID = 7
1,210,717 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,242,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,417 UART: [ldev] --
1,281,697 UART: [fwproc] Wait for Commands...
1,282,408 UART: [fwproc] Recv command 0x46574c44
1,283,141 UART: [fwproc] Recv'd Img size: 114448 bytes
3,127,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,559 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,320,571 >>> mbox cmd response: success
3,321,628 UART: [afmc] ++
3,321,796 UART: [afmc] CDI.KEYID = 6
3,322,159 UART: [afmc] SUBJECT.KEYID = 7
3,322,585 UART: [afmc] AUTHORITY.KEYID = 5
3,357,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,258 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,968 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,858 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,569 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,311 UART: [afmc] --
3,401,199 UART: [cold-reset] --
3,402,283 UART: [state] Locking Datavault
3,403,474 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,078 UART: [state] Locking ICCM
3,404,514 UART: [exit] Launching FMC @ 0x40000130
3,409,843 UART:
3,409,859 UART: Running Caliptra FMC ...
3,410,267 UART:
3,410,410 UART: [state] CFI Enabled
3,420,874 UART: [fht] FMC Alias Private Key: 7
3,528,186 UART: [art] Extend RT PCRs Done
3,528,614 UART: [art] Lock RT PCRs Done
3,530,224 UART: [art] Populate DV Done
3,538,560 UART: [fht] FMC Alias Private Key: 7
3,539,552 UART: [art] Derive CDI
3,539,832 UART: [art] Store in in slot 0x4
3,625,661 UART: [art] Derive Key Pair
3,626,021 UART: [art] Store priv key in slot 0x5
3,639,137 UART: [art] Derive Key Pair - Done
3,653,512 UART: [art] Signing Cert with AUTHO
3,653,992 UART: RITY.KEYID = 7
3,669,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,127 UART: [art] PUB.X = 867BA87162AC60B22FDF94D5068FCE9907687D3242B266C51630AD95201C323A4606E89769E2562563EB8F79B5C7644D
3,676,880 UART: [art] PUB.Y = 0B578BB8656CF952EDA0B60D881FE2589E271A4BA1172CBFAFF3AF9E20ABD47B645478F256621AE9C2E2DF0CFBE88A96
3,683,841 UART: [art] SIG.R = B106C76EA53E386D8E13408FAA37337926F031ACC305D29C4C0603CA2AB39F16F84E17BF00F11577495AFCDBDE0C1E03
3,690,581 UART: [art] SIG.S = C3F47724518E38214CD98550E649A349DFBE3A9FA86EF37FAF486CBAD399C1C09B9C0ED63A27D56FF45941A18B4DA6B6
3,714,661 UART: Caliptra RT
3,715,006 UART: [state] CFI Enabled
3,822,435 UART: [rt] RT listening for mailbox commands...
3,823,105 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,935 UART: [rt]cmd =0x41544d4e, len=14344
4,506,301 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,713 ready_for_fw is high
1,056,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,172,257 >>> mbox cmd response: success
3,234,144 UART:
3,234,160 UART: Running Caliptra FMC ...
3,234,568 UART:
3,234,711 UART: [state] CFI Enabled
3,245,229 UART: [fht] FMC Alias Private Key: 7
3,354,095 UART: [art] Extend RT PCRs Done
3,354,523 UART: [art] Lock RT PCRs Done
3,355,909 UART: [art] Populate DV Done
3,364,015 UART: [fht] FMC Alias Private Key: 7
3,365,133 UART: [art] Derive CDI
3,365,413 UART: [art] Store in in slot 0x4
3,450,580 UART: [art] Derive Key Pair
3,450,940 UART: [art] Store priv key in slot 0x5
3,464,116 UART: [art] Derive Key Pair - Done
3,478,764 UART: [art] Signing Cert with AUTHO
3,479,244 UART: RITY.KEYID = 7
3,494,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,183 UART: [art] PUB.X = D222DF6E86B0CD055B1E9B7A92D3D5949F670C1A508B6170EE00EE51577231E3DA7BE13ED702D024DE6AEADFCE200315
3,501,933 UART: [art] PUB.Y = 8F9C53B862FCC6F3DA5537E14B2638E8030BBCC2146AF2EB8236F7209BB94913CF0351CD37CA5FEC8A11FA9744B3491F
3,508,886 UART: [art] SIG.R = 57D8BDA42949F2D35C3DD27D8E06716CA0877C87FC43187F8D97F45D314030E85BE63F0B281E9EE9D24385ABAABDD482
3,515,660 UART: [art] SIG.S = 09EE433CEB9C4706C683F94075AFD31B4FDCDA4CE1C84925E7FA19C037131AAF0CC4D1C86495C76FEB099BA2ABFDB10E
3,539,342 UART: Caliptra RT
3,539,687 UART: [state] CFI Enabled
3,647,054 UART: [rt] RT listening for mailbox commands...
3,647,724 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,876 UART: [rt]cmd =0x41544d4e, len=14344
4,326,326 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,131 writing to cptra_bootfsm_go
193,314 UART:
193,665 UART: Running Caliptra ROM ...
194,863 UART:
195,015 UART: [state] CFI Enabled
266,709 UART: [state] LifecycleState = Unprovisioned
268,690 UART: [state] DebugLocked = No
270,027 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,044 UART: [kat] SHA2-256
443,765 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,285 UART: [kat] ++
454,769 UART: [kat] sha1
466,923 UART: [kat] SHA2-256
469,642 UART: [kat] SHA2-384
475,701 UART: [kat] SHA2-512-ACC
478,077 UART: [kat] ECC-384
2,769,662 UART: [kat] HMAC-384Kdf
2,800,477 UART: [kat] LMS
3,990,804 UART: [kat] --
3,994,885 UART: [cold-reset] ++
3,996,741 UART: [fht] Storing FHT @ 0x50003400
4,008,480 UART: [idev] ++
4,009,114 UART: [idev] CDI.KEYID = 6
4,010,030 UART: [idev] SUBJECT.KEYID = 7
4,011,290 UART: [idev] UDS.KEYID = 0
4,012,277 ready_for_fw is high
4,012,479 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,882 UART: [idev] Erasing UDS.KEYID = 0
7,347,408 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,946 UART: [idev] --
7,373,454 UART: [ldev] ++
7,374,029 UART: [ldev] CDI.KEYID = 6
7,375,007 UART: [ldev] SUBJECT.KEYID = 5
7,376,181 UART: [ldev] AUTHORITY.KEYID = 7
7,377,470 UART: [ldev] FE.KEYID = 1
7,423,811 UART: [ldev] Erasing FE.KEYID = 1
10,753,482 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,468 UART: [ldev] --
13,116,030 UART: [fwproc] Waiting for Commands...
13,118,017 UART: [fwproc] Received command 0x46574c44
13,120,202 UART: [fwproc] Received Image of size 114124 bytes
21,842,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,925,832 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,994,756 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,311,863 >>> mbox cmd response: success
22,315,175 UART: [afmc] ++
22,315,817 UART: [afmc] CDI.KEYID = 6
22,316,729 UART: [afmc] SUBJECT.KEYID = 7
22,317,944 UART: [afmc] AUTHORITY.KEYID = 5
25,683,233 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,978,952 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,981,226 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,995,759 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,010,521 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,024,770 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,046,672 UART: [afmc] --
28,051,404 UART: [cold-reset] --
28,054,517 UART: [state] Locking Datavault
28,061,170 UART: [state] Locking PCR0, PCR1 and PCR31
28,062,930 UART: [state] Locking ICCM
28,065,680 UART: [exit] Launching FMC @ 0x40000130
28,074,079 UART:
28,074,324 UART: Running Caliptra FMC ...
28,075,431 UART:
28,075,603 UART: [state] CFI Enabled
28,138,689 UART: [fht] FMC Alias Private Key: 7
30,476,038 UART: [art] Extend RT PCRs Done
30,477,279 UART: [art] Lock RT PCRs Done
30,478,934 UART: [art] Populate DV Done
30,484,543 UART: [fht] FMC Alias Private Key: 7
30,486,090 UART: [art] Derive CDI
30,486,833 UART: [art] Store in in slot 0x4
30,547,279 UART: [art] Derive Key Pair
30,548,278 UART: [art] Store priv key in slot 0x5
33,840,608 UART: [art] Derive Key Pair - Done
33,853,952 UART: [art] Signing Cert with AUTHO
33,855,253 UART: RITY.KEYID = 7
36,141,667 UART: [art] Erasing AUTHORITY.KEYID = 7
36,143,182 UART: [art] PUB.X = 75765BC131B2DB5CEA66A701B8BCD3D8A6D90D0024F5A95ED60793A4B42BEEEC14AA11552BDD35788C923BD868666361
36,150,431 UART: [art] PUB.Y = F3E63276EF9107D89AEDF6580CAAECE2B67B827BAE682A82BD3A7413A19220EB4CE58B7B8CF88F35EC48AED7A89C65C2
36,157,773 UART: [art] SIG.R = 7C9080092589096F63CC37ED07E03A19600A534DD930EA1B577F7E729700BFB7BE4EF9CB92A350BE2EC80C487474BEB1
36,165,146 UART: [art] SIG.S = 89C5807E851E56BABB8247B7FA7B30D2CA0FEE5775790F340661FC6FBD341A2F0B0FCFE834B8EF7353219DDDFFA3956D
37,470,196 UART: Caliptra RT
37,470,923 UART: [state] CFI Enabled
37,632,507 UART: [rt] RT listening for mailbox commands...
37,634,841 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,790,165 UART: [rt]cmd =0x41544d4e, len=14344
42,055,321 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
3,785,858 ready_for_fw is high
3,786,761 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,126,242 >>> mbox cmd response: success
27,809,213 UART:
27,809,601 UART: Running Caliptra FMC ...
27,810,756 UART:
27,810,923 UART: [state] CFI Enabled
27,878,665 UART: [fht] FMC Alias Private Key: 7
30,216,757 UART: [art] Extend RT PCRs Done
30,217,986 UART: [art] Lock RT PCRs Done
30,219,728 UART: [art] Populate DV Done
30,225,145 UART: [fht] FMC Alias Private Key: 7
30,226,853 UART: [art] Derive CDI
30,227,672 UART: [art] Store in in slot 0x4
30,286,664 UART: [art] Derive Key Pair
30,287,726 UART: [art] Store priv key in slot 0x5
33,580,476 UART: [art] Derive Key Pair - Done
33,593,471 UART: [art] Signing Cert with AUTHO
33,594,799 UART: RITY.KEYID = 7
35,882,167 UART: [art] Erasing AUTHORITY.KEYID = 7
35,883,676 UART: [art] PUB.X = EB0E45AFF46EC6DC167CD81E3A3EB7C066962E0E9D773BF044A7577B06BB9B4F3462BCB9167D7A95DBB78F30FE280DBF
35,890,954 UART: [art] PUB.Y = BD9D1052B155B0854A78B599755C4849D6D0DA24A48E4EE3DE717FA7C0949A5976027C9849E8925BD3A9D1C90B2A3D6F
35,898,178 UART: [art] SIG.R = 02AE7DA19BB091750F8CEC6408FC909B692B83B6DECA5AB77FAF5E8C52A767B9FB22654BC8448EA4B82EC811DACC30A7
35,905,593 UART: [art] SIG.S = C25F2C878AD4D71CD73151ED1085F3B8BC95155B047616AC9E65661D4B0730DC232D8C603E71F89711952AFB2550ACE7
37,210,600 UART: Caliptra RT
37,211,315 UART: [state] CFI Enabled
37,372,418 UART: [rt] RT listening for mailbox commands...
37,374,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,530,047 UART: [rt]cmd =0x41544d4e, len=14344
41,664,842 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,529 UART:
192,884 UART: Running Caliptra ROM ...
194,017 UART:
603,691 UART: [state] CFI Enabled
620,126 UART: [state] LifecycleState = Unprovisioned
622,010 UART: [state] DebugLocked = No
624,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,524 UART: [kat] SHA2-256
800,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,820 UART: [kat] ++
811,422 UART: [kat] sha1
820,735 UART: [kat] SHA2-256
823,446 UART: [kat] SHA2-384
829,712 UART: [kat] SHA2-512-ACC
832,080 UART: [kat] ECC-384
3,118,000 UART: [kat] HMAC-384Kdf
3,129,400 UART: [kat] LMS
4,319,512 UART: [kat] --
4,324,595 UART: [cold-reset] ++
4,326,670 UART: [fht] Storing FHT @ 0x50003400
4,338,355 UART: [idev] ++
4,338,919 UART: [idev] CDI.KEYID = 6
4,339,890 UART: [idev] SUBJECT.KEYID = 7
4,341,129 UART: [idev] UDS.KEYID = 0
4,342,196 ready_for_fw is high
4,342,389 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,711 UART: [idev] Erasing UDS.KEYID = 0
7,629,918 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,516 UART: [idev] --
7,655,130 UART: [ldev] ++
7,655,693 UART: [ldev] CDI.KEYID = 6
7,656,667 UART: [ldev] SUBJECT.KEYID = 5
7,657,891 UART: [ldev] AUTHORITY.KEYID = 7
7,659,117 UART: [ldev] FE.KEYID = 1
7,670,347 UART: [ldev] Erasing FE.KEYID = 1
10,957,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,523 UART: [ldev] --
13,316,757 UART: [fwproc] Waiting for Commands...
13,318,569 UART: [fwproc] Received command 0x46574c44
13,320,746 UART: [fwproc] Received Image of size 114124 bytes
21,636,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,715,654 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,784,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,101,313 >>> mbox cmd response: success
22,104,889 UART: [afmc] ++
22,105,484 UART: [afmc] CDI.KEYID = 6
22,106,394 UART: [afmc] SUBJECT.KEYID = 7
22,107,660 UART: [afmc] AUTHORITY.KEYID = 5
25,426,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,721,459 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,723,714 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,738,257 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,753,023 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,767,293 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,787,432 UART: [afmc] --
27,790,646 UART: [cold-reset] --
27,793,424 UART: [state] Locking Datavault
27,799,751 UART: [state] Locking PCR0, PCR1 and PCR31
27,801,460 UART: [state] Locking ICCM
27,803,552 UART: [exit] Launching FMC @ 0x40000130
27,811,911 UART:
27,812,146 UART: Running Caliptra FMC ...
27,813,190 UART:
27,813,339 UART: [state] CFI Enabled
27,821,699 UART: [fht] FMC Alias Private Key: 7
30,153,072 UART: [art] Extend RT PCRs Done
30,154,301 UART: [art] Lock RT PCRs Done
30,156,003 UART: [art] Populate DV Done
30,161,461 UART: [fht] FMC Alias Private Key: 7
30,163,118 UART: [art] Derive CDI
30,163,928 UART: [art] Store in in slot 0x4
30,206,189 UART: [art] Derive Key Pair
30,207,186 UART: [art] Store priv key in slot 0x5
33,449,485 UART: [art] Derive Key Pair - Done
33,462,428 UART: [art] Signing Cert with AUTHO
33,463,732 UART: RITY.KEYID = 7
35,743,527 UART: [art] Erasing AUTHORITY.KEYID = 7
35,745,051 UART: [art] PUB.X = 972BB182533330B56F98B6F416E0E592D8D51B36C453E6E267116DA12FBD2B06103C4D157DF14C369744C96015A890CC
35,752,233 UART: [art] PUB.Y = E953013967567F97A3518E5A4500545C477081FD4D1C0A8D1C3A376F216431AE2581B5A866B476B00CCABCFC2FD08DB0
35,759,477 UART: [art] SIG.R = 18AC376610B35DDEDED12F80DF1B47BB5AF1781FD205FAC15D49F4A92EB482EEFFCF57EBA183BA337A6BC57FBAE02BEB
35,766,921 UART: [art] SIG.S = CEFC6F94E0D8AFC1811670501665B57344D110DFCBD42BDA4DA742C96B6701C2617E0CBAF5F859744CA0EA8267677797
37,072,216 UART: Caliptra RT
37,072,927 UART: [state] CFI Enabled
37,191,773 UART: [rt] RT listening for mailbox commands...
37,194,157 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,349,453 UART: [rt]cmd =0x41544d4e, len=14344
41,381,031 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
4,128,539 ready_for_fw is high
4,128,923 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,041,323 >>> mbox cmd response: success
27,683,608 UART:
27,684,003 UART: Running Caliptra FMC ...
27,685,198 UART:
27,685,369 UART: [state] CFI Enabled
27,693,092 UART: [fht] FMC Alias Private Key: 7
30,023,913 UART: [art] Extend RT PCRs Done
30,025,150 UART: [art] Lock RT PCRs Done
30,026,678 UART: [art] Populate DV Done
30,031,922 UART: [fht] FMC Alias Private Key: 7
30,033,461 UART: [art] Derive CDI
30,034,281 UART: [art] Store in in slot 0x4
30,076,883 UART: [art] Derive Key Pair
30,077,921 UART: [art] Store priv key in slot 0x5
33,320,454 UART: [art] Derive Key Pair - Done
33,333,940 UART: [art] Signing Cert with AUTHO
33,335,245 UART: RITY.KEYID = 7
35,614,786 UART: [art] Erasing AUTHORITY.KEYID = 7
35,616,290 UART: [art] PUB.X = A8961BEF01B719966DABB3D821BCFC4C887E9F3820110200CBE93CCD2EE47EA03089D76E2E0B654499768A58D6645198
35,623,553 UART: [art] PUB.Y = F28EBF9D9D0DE6985ECC057375EA6D067EDAA523F356C436BD1D573385F0F8BE488D569B5DCF1D0EABA14DEB9EB21369
35,630,846 UART: [art] SIG.R = 6FFA5C0BF16106768A01F4F62B3EEDA160B475470A08907F1B0F1DAB5DED99157E545DA1E3E81D3A082DC414978C4EAF
35,638,232 UART: [art] SIG.S = A84E0E599D35449AECCCCAEAD7E336AECDEB99B06A37231BD75441FC68DF8663C9B64C4D0CA5B251E320EC357156AFB8
36,943,754 UART: Caliptra RT
36,944,490 UART: [state] CFI Enabled
37,062,218 UART: [rt] RT listening for mailbox commands...
37,064,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,219,997 UART: [rt]cmd =0x41544d4e, len=14344
41,355,009 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,259 UART:
192,603 UART: Running Caliptra ROM ...
193,810 UART:
193,963 UART: [state] CFI Enabled
263,190 UART: [state] LifecycleState = Unprovisioned
265,111 UART: [state] DebugLocked = No
267,140 UART: [state] WD Timer not started. Device not locked for debugging
271,378 UART: [kat] SHA2-256
450,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,092 UART: [kat] ++
462,586 UART: [kat] sha1
473,888 UART: [kat] SHA2-256
476,919 UART: [kat] SHA2-384
483,267 UART: [kat] SHA2-512-ACC
486,275 UART: [kat] ECC-384
2,947,028 UART: [kat] HMAC-384Kdf
2,971,724 UART: [kat] LMS
3,501,142 UART: [kat] --
3,507,481 UART: [cold-reset] ++
3,509,831 UART: [fht] FHT @ 0x50003400
3,520,813 UART: [idev] ++
3,521,377 UART: [idev] CDI.KEYID = 6
3,522,300 UART: [idev] SUBJECT.KEYID = 7
3,523,543 UART: [idev] UDS.KEYID = 0
3,524,464 ready_for_fw is high
3,524,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,145 UART: [idev] Erasing UDS.KEYID = 0
6,027,186 UART: [idev] Sha1 KeyId Algorithm
6,050,168 UART: [idev] --
6,053,621 UART: [ldev] ++
6,054,193 UART: [ldev] CDI.KEYID = 6
6,055,115 UART: [ldev] SUBJECT.KEYID = 5
6,056,275 UART: [ldev] AUTHORITY.KEYID = 7
6,057,505 UART: [ldev] FE.KEYID = 1
6,102,073 UART: [ldev] Erasing FE.KEYID = 1
8,607,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,706 UART: [ldev] --
10,414,539 UART: [fwproc] Wait for Commands...
10,416,683 UART: [fwproc] Recv command 0x46574c44
10,418,770 UART: [fwproc] Recv'd Img size: 114448 bytes
14,972,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,050,027 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,118,782 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,437,855 >>> mbox cmd response: success
15,441,491 UART: [afmc] ++
15,442,083 UART: [afmc] CDI.KEYID = 6
15,442,991 UART: [afmc] SUBJECT.KEYID = 7
15,444,204 UART: [afmc] AUTHORITY.KEYID = 5
17,980,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,705,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,707,473 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,723,434 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,739,372 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,755,199 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,776,311 UART: [afmc] --
19,779,308 UART: [cold-reset] --
19,783,940 UART: [state] Locking Datavault
19,789,085 UART: [state] Locking PCR0, PCR1 and PCR31
19,790,784 UART: [state] Locking ICCM
19,793,255 UART: [exit] Launching FMC @ 0x40000130
19,801,698 UART:
19,801,929 UART: Running Caliptra FMC ...
19,803,030 UART:
19,803,193 UART: [state] CFI Enabled
19,865,341 UART: [fht] FMC Alias Private Key: 7
21,629,673 UART: [art] Extend RT PCRs Done
21,630,909 UART: [art] Lock RT PCRs Done
21,632,163 UART: [art] Populate DV Done
21,637,631 UART: [fht] FMC Alias Private Key: 7
21,639,115 UART: [art] Derive CDI
21,639,880 UART: [art] Store in in slot 0x4
21,699,299 UART: [art] Derive Key Pair
21,700,359 UART: [art] Store priv key in slot 0x5
24,162,948 UART: [art] Derive Key Pair - Done
24,175,509 UART: [art] Signing Cert with AUTHO
24,176,812 UART: RITY.KEYID = 7
25,888,681 UART: [art] Erasing AUTHORITY.KEYID = 7
25,890,186 UART: [art] PUB.X = 89F79DE0F16D8D582B2CD6053BCF5143FB864457793D0F91D899A184650A673A4F173F809520716523C27FCD57AFB9E5
25,897,439 UART: [art] PUB.Y = 14125333F02A105B569365A1668860CE18ADBAB83ABD03C9561B52C40708AF76751DF6AB709AFD4C06475942E71190E9
25,904,709 UART: [art] SIG.R = 60DEB63CCECBDD34DCD68365D0AF61D582426EAB3020F2CF13356035429AB0893657B7B5FFF63CEC3241C8F462F67A54
25,912,133 UART: [art] SIG.S = 9A3D45D1BB87319EA55C9D9FB057119B8F94D9F274B3270BFF03EDD654D343C697915E5FB8438E09C1AE4F00F1F016E8
26,890,477 UART: Caliptra RT
26,891,178 UART: [state] CFI Enabled
27,056,032 UART: [rt] RT listening for mailbox commands...
27,058,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,213,913 UART: [rt]cmd =0x41544d4e, len=14344
29,573,969 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,383,146 ready_for_fw is high
3,383,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,061,139 >>> mbox cmd response: success
19,343,473 UART:
19,343,871 UART: Running Caliptra FMC ...
19,344,982 UART:
19,345,134 UART: [state] CFI Enabled
19,411,297 UART: [fht] FMC Alias Private Key: 7
21,175,454 UART: [art] Extend RT PCRs Done
21,176,676 UART: [art] Lock RT PCRs Done
21,178,236 UART: [art] Populate DV Done
21,183,790 UART: [fht] FMC Alias Private Key: 7
21,185,285 UART: [art] Derive CDI
21,186,021 UART: [art] Store in in slot 0x4
21,243,836 UART: [art] Derive Key Pair
21,244,875 UART: [art] Store priv key in slot 0x5
23,707,944 UART: [art] Derive Key Pair - Done
23,720,956 UART: [art] Signing Cert with AUTHO
23,722,267 UART: RITY.KEYID = 7
25,433,153 UART: [art] Erasing AUTHORITY.KEYID = 7
25,434,654 UART: [art] PUB.X = 8AB813D4133FAC7A41F7351706DC813E9DBD3BD8A5877A5EA6AC5E26F6F54BFD050B0F354A709C52B5D59A90DAF71112
25,441,962 UART: [art] PUB.Y = 68E61BF1935A136D0A0323537FF335E705A64D79B8872DFECCE92367DFBDB96579F3D1FC45C507EB4850AAA1023F4146
25,449,216 UART: [art] SIG.R = BA9EB9302033B8E19326AFBBFFCB1AAA673208F8E05F74037A3A5122F230107CBEACDA2880F5DECAB81E30209195C367
25,456,606 UART: [art] SIG.S = 656207B98723E7C1F867DAB3DF074B7CAEEC0AECF49912B9466416E9AA008CA4CB845CCB022FBD5A3EA17A6C76A72C30
26,435,555 UART: Caliptra RT
26,436,270 UART: [state] CFI Enabled
26,601,989 UART: [rt] RT listening for mailbox commands...
26,604,284 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,760,023 UART: [rt]cmd =0x41544d4e, len=14344
29,124,746 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
192,757 UART:
193,131 UART: Running Caliptra ROM ...
194,370 UART:
603,857 UART: [state] CFI Enabled
618,575 UART: [state] LifecycleState = Unprovisioned
620,444 UART: [state] DebugLocked = No
623,403 UART: [state] WD Timer not started. Device not locked for debugging
626,369 UART: [kat] SHA2-256
805,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,114 UART: [kat] ++
817,682 UART: [kat] sha1
827,642 UART: [kat] SHA2-256
830,648 UART: [kat] SHA2-384
836,153 UART: [kat] SHA2-512-ACC
839,125 UART: [kat] ECC-384
3,279,212 UART: [kat] HMAC-384Kdf
3,291,182 UART: [kat] LMS
3,820,658 UART: [kat] --
3,824,683 UART: [cold-reset] ++
3,825,479 UART: [fht] FHT @ 0x50003400
3,837,514 UART: [idev] ++
3,838,071 UART: [idev] CDI.KEYID = 6
3,839,120 UART: [idev] SUBJECT.KEYID = 7
3,840,220 UART: [idev] UDS.KEYID = 0
3,841,148 ready_for_fw is high
3,841,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,110 UART: [idev] Erasing UDS.KEYID = 0
6,313,892 UART: [idev] Sha1 KeyId Algorithm
6,336,907 UART: [idev] --
6,339,490 UART: [ldev] ++
6,340,050 UART: [ldev] CDI.KEYID = 6
6,340,953 UART: [ldev] SUBJECT.KEYID = 5
6,342,157 UART: [ldev] AUTHORITY.KEYID = 7
6,343,381 UART: [ldev] FE.KEYID = 1
6,355,752 UART: [ldev] Erasing FE.KEYID = 1
8,832,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,439 UART: [ldev] --
10,622,465 UART: [fwproc] Wait for Commands...
10,624,714 UART: [fwproc] Recv command 0x46574c44
10,626,800 UART: [fwproc] Recv'd Img size: 114448 bytes
15,209,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,289,707 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,358,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,676,100 >>> mbox cmd response: success
15,681,250 UART: [afmc] ++
15,681,841 UART: [afmc] CDI.KEYID = 6
15,682,720 UART: [afmc] SUBJECT.KEYID = 7
15,683,931 UART: [afmc] AUTHORITY.KEYID = 5
18,190,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,913,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,915,023 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,930,985 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,946,945 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,962,769 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,985,151 UART: [afmc] --
19,989,603 UART: [cold-reset] --
19,992,840 UART: [state] Locking Datavault
19,998,632 UART: [state] Locking PCR0, PCR1 and PCR31
20,000,340 UART: [state] Locking ICCM
20,001,656 UART: [exit] Launching FMC @ 0x40000130
20,010,108 UART:
20,010,339 UART: Running Caliptra FMC ...
20,011,433 UART:
20,011,586 UART: [state] CFI Enabled
20,019,684 UART: [fht] FMC Alias Private Key: 7
21,776,838 UART: [art] Extend RT PCRs Done
21,778,073 UART: [art] Lock RT PCRs Done
21,779,752 UART: [art] Populate DV Done
21,785,212 UART: [fht] FMC Alias Private Key: 7
21,786,741 UART: [art] Derive CDI
21,787,548 UART: [art] Store in in slot 0x4
21,829,706 UART: [art] Derive Key Pair
21,830,734 UART: [art] Store priv key in slot 0x5
24,257,118 UART: [art] Derive Key Pair - Done
24,270,339 UART: [art] Signing Cert with AUTHO
24,271,641 UART: RITY.KEYID = 7
25,977,216 UART: [art] Erasing AUTHORITY.KEYID = 7
25,978,723 UART: [art] PUB.X = 0E1F4D3FB8E9D32A1C510F489989CC06D21CADF096A0D9F1797877885784896E86A3B421F237DF1F18A8CAD04B026731
25,986,004 UART: [art] PUB.Y = 897465C9D619049A942F71DD1DF2045536AC351DA2AF9286EAAE312A0A915042908EDF4C9BE3BD601C3E72BDB78772A8
25,993,234 UART: [art] SIG.R = DE245781275B386B2AEE5F1F96CF5F1B7A1FF1E03605DBFC02E58827BAF5319788BD88C10089749A0EA11E9B8952C81A
26,000,617 UART: [art] SIG.S = CBE48AD6FE6BB7F4D99C26EDE416C8ECB1A850B52F130E063D379AA6FB8B576C167E99D9A1DB993248B68E07CB08D3A5
26,979,092 UART: Caliptra RT
26,979,822 UART: [state] CFI Enabled
27,096,462 UART: [rt] RT listening for mailbox commands...
27,098,777 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,254,088 UART: [rt]cmd =0x41544d4e, len=14344
29,621,692 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,693,192 ready_for_fw is high
3,693,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,252,843 >>> mbox cmd response: success
19,508,558 UART:
19,508,953 UART: Running Caliptra FMC ...
19,510,136 UART:
19,510,296 UART: [state] CFI Enabled
19,518,082 UART: [fht] FMC Alias Private Key: 7
21,274,793 UART: [art] Extend RT PCRs Done
21,276,018 UART: [art] Lock RT PCRs Done
21,277,807 UART: [art] Populate DV Done
21,283,360 UART: [fht] FMC Alias Private Key: 7
21,285,063 UART: [art] Derive CDI
21,285,797 UART: [art] Store in in slot 0x4
21,328,443 UART: [art] Derive Key Pair
21,329,480 UART: [art] Store priv key in slot 0x5
23,756,184 UART: [art] Derive Key Pair - Done
23,768,535 UART: [art] Signing Cert with AUTHO
23,769,829 UART: RITY.KEYID = 7
25,475,191 UART: [art] Erasing AUTHORITY.KEYID = 7
25,476,700 UART: [art] PUB.X = 8319174E06095D72EE63D83247560D739FFB06DE23EE6F9DE30823A55894370B1B65E9AA4AAAFF78E2910963518C14AF
25,483,989 UART: [art] PUB.Y = D4A23F2AC62FB69E9383D821D920DE30CAD95B006C65949427C35C25FEF827E68504F0A4DA22103CC79269EA068F562B
25,491,199 UART: [art] SIG.R = 73AE52B13D6684623E8623B9E6EB0F8F865751904BAE2E4865E5BDA4518B29FBE61304E0868F22C704A29340C6682F5F
25,498,576 UART: [art] SIG.S = 43CF79F3020E991C1369E691728CCCF52BB1A2C68F12918B6ED2923C4ACF997BB9FCDA6A427343C5D2361190A5B202C3
26,477,309 UART: Caliptra RT
26,478,049 UART: [state] CFI Enabled
26,595,135 UART: [rt] RT listening for mailbox commands...
26,597,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,752,902 UART: [rt]cmd =0x41544d4e, len=14344
29,114,655 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
3,439,493 ready_for_fw is high
3,439,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,838,300 >>> mbox cmd response: success
20,152,536 UART:
20,152,920 UART: Running Caliptra FMC ...
20,154,026 UART:
20,154,185 UART: [state] CFI Enabled
20,222,423 UART: [fht] FMC Alias Private Key: 7
21,985,829 UART: [art] Extend RT PCRs Done
21,987,047 UART: [art] Lock RT PCRs Done
21,988,996 UART: [art] Populate DV Done
21,994,512 UART: [fht] FMC Alias Private Key: 7
21,996,055 UART: [art] Derive CDI
21,996,806 UART: [art] Store in in slot 0x4
22,054,980 UART: [art] Derive Key Pair
22,055,990 UART: [art] Store priv key in slot 0x5
24,519,641 UART: [art] Derive Key Pair - Done
24,532,638 UART: [art] Signing Cert with AUTHO
24,533,943 UART: RITY.KEYID = 7
26,245,176 UART: [art] Erasing AUTHORITY.KEYID = 7
26,246,690 UART: [art] PUB.X = F5B478469172FC3470E3814CDF2DD11E75D8B0841B66B371ABA0AD4B34EFEDF01CF2A2D164EAABB6B3CDFF67346E92BE
26,253,935 UART: [art] PUB.Y = F71E025297FB5B5253264992A97E9D282DF142CD69B27B10806A77CF7A2300F8165E7712F24DB8AE716EBDD3B2B2C674
26,261,187 UART: [art] SIG.R = AA1DA2C94FC0E78A00E43C2A18E4B788548EF6055EB45675D1D571630BE8E35E262B083F1CCAC0747A4F7B573FA3E6A2
26,268,581 UART: [art] SIG.S = 43330FA1348C17342427564F2ABB07E68BD3C5D03274FFD20DBF23D7C333231E74F87BA383231AB43D5A8FEF21B08214
27,247,311 UART: Caliptra RT
27,247,998 UART: [state] CFI Enabled
27,413,386 UART: [rt] RT listening for mailbox commands...
27,415,693 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,571,641 UART: [rt]cmd =0x41544d4e, len=14344
29,933,263 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,752,333 ready_for_fw is high
3,752,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,055,002 >>> mbox cmd response: success
20,306,049 UART:
20,306,444 UART: Running Caliptra FMC ...
20,307,565 UART:
20,307,720 UART: [state] CFI Enabled
20,315,532 UART: [fht] FMC Alias Private Key: 7
22,072,170 UART: [art] Extend RT PCRs Done
22,073,394 UART: [art] Lock RT PCRs Done
22,075,075 UART: [art] Populate DV Done
22,080,485 UART: [fht] FMC Alias Private Key: 7
22,082,136 UART: [art] Derive CDI
22,082,953 UART: [art] Store in in slot 0x4
22,125,393 UART: [art] Derive Key Pair
22,126,414 UART: [art] Store priv key in slot 0x5
24,553,039 UART: [art] Derive Key Pair - Done
24,566,316 UART: [art] Signing Cert with AUTHO
24,567,628 UART: RITY.KEYID = 7
26,273,304 UART: [art] Erasing AUTHORITY.KEYID = 7
26,274,812 UART: [art] PUB.X = 621CF4B9CB2690F6722FB6DE550FDAA2B3A0F50CA1D55D165A63256323004FF7F8F6A854E0781B9A0E10B379F790CD99
26,282,059 UART: [art] PUB.Y = B49C31D4ADB2C66C847C924DF785432F320D2F98A6A15D15E63E56D2D03061223619BA51F7C18CFFF6AA282BD4ECBFF6
26,289,361 UART: [art] SIG.R = 39BA441810A16005B6360F7B88A074E6138D2E46AF70E88272102A28044EB41501228FF207184DAA7D17E9A0677C821A
26,296,730 UART: [art] SIG.S = 936393B9CD974C69B3C0ED140B7D581FAAD719C0C39D14D2518719B7C1A7D5AE87C093F261748B609083A1B2E1CF3263
27,275,397 UART: Caliptra RT
27,276,085 UART: [state] CFI Enabled
27,392,848 UART: [rt] RT listening for mailbox commands...
27,395,153 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,550,576 UART: [rt]cmd =0x41544d4e, len=14344
29,910,296 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,065 UART: [kat] SHA2-256
881,996 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,111 UART: [kat] ++
886,263 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
903,046 UART: [kat] HMAC-384Kdf
907,614 UART: [kat] LMS
1,475,810 UART: [kat] --
1,476,425 UART: [cold-reset] ++
1,476,825 UART: [fht] Storing FHT @ 0x50003400
1,479,424 UART: [idev] ++
1,479,592 UART: [idev] CDI.KEYID = 6
1,479,952 UART: [idev] SUBJECT.KEYID = 7
1,480,376 UART: [idev] UDS.KEYID = 0
1,480,721 ready_for_fw is high
1,480,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,096 UART: [idev] Erasing UDS.KEYID = 0
1,505,150 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,882 UART: [idev] --
1,514,751 UART: [ldev] ++
1,514,919 UART: [ldev] CDI.KEYID = 6
1,515,282 UART: [ldev] SUBJECT.KEYID = 5
1,515,708 UART: [ldev] AUTHORITY.KEYID = 7
1,516,171 UART: [ldev] FE.KEYID = 1
1,521,261 UART: [ldev] Erasing FE.KEYID = 1
1,546,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,520 UART: [ldev] --
1,585,817 UART: [fwproc] Waiting for Commands...
1,586,440 UART: [fwproc] Received command 0x46574c44
1,587,231 UART: [fwproc] Received Image of size 114448 bytes
5,348,101 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,375,045 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,404,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,540,486 >>> mbox cmd response: success
5,541,612 UART: [afmc] ++
5,541,780 UART: [afmc] CDI.KEYID = 6
5,542,142 UART: [afmc] SUBJECT.KEYID = 7
5,542,567 UART: [afmc] AUTHORITY.KEYID = 5
5,577,777 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,594,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,595,035 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,600,744 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,606,636 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,612,337 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,620,361 UART: [afmc] --
5,621,301 UART: [cold-reset] --
5,622,303 UART: [state] Locking Datavault
5,623,410 UART: [state] Locking PCR0, PCR1 and PCR31
5,624,014 UART: [state] Locking ICCM
5,624,462 UART: [exit] Launching FMC @ 0x40000130
5,629,791 UART:
5,629,807 UART: Running Caliptra FMC ...
5,630,215 UART:
5,630,269 UART: [state] CFI Enabled
5,640,843 UART: [fht] FMC Alias Private Key: 7
5,748,979 UART: [art] Extend RT PCRs Done
5,749,407 UART: [art] Lock RT PCRs Done
5,751,069 UART: [art] Populate DV Done
5,759,375 UART: [fht] FMC Alias Private Key: 7
5,760,435 UART: [art] Derive CDI
5,760,715 UART: [art] Store in in slot 0x4
5,846,054 UART: [art] Derive Key Pair
5,846,414 UART: [art] Store priv key in slot 0x5
5,859,742 UART: [art] Derive Key Pair - Done
5,874,525 UART: [art] Signing Cert with AUTHO
5,875,005 UART: RITY.KEYID = 7
5,890,329 UART: [art] Erasing AUTHORITY.KEYID = 7
5,891,094 UART: [art] PUB.X = BD6F51A3BC738CF098011304BC801F20D6D7D7371F41906C76CEFBCC87AD6E41EFAA730EE8939EA9F5A7E3D69A96C53C
5,897,873 UART: [art] PUB.Y = 198F3CE3433A28B746B495BE0F3B6117FD1C49B7ABFF886BA26578EE4592A6ADDE74F8741EF2F6F22D41469D87A6FF81
5,904,832 UART: [art] SIG.R = EFB060D4E4906BA721C762FD73760B3C3443FBC2B4CF01091A29BE315F5CC07089F00B21BD7D389112E37FCAC4AEADBB
5,911,608 UART: [art] SIG.S = 847635D42E4E29412221B10778BB738C1D259AD840681376865EAFCDF5E696E0EE1293866422198DADB9502F1036B443
5,934,794 UART: Caliptra RT
5,935,047 UART: [state] CFI Enabled
6,043,339 UART: [rt] RT listening for mailbox commands...
6,044,009 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,073 UART: [rt]cmd =0x41544d4e, len=14344
6,720,202 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,551 ready_for_fw is high
1,362,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,166,634 >>> mbox cmd response: success
5,228,045 UART:
5,228,061 UART: Running Caliptra FMC ...
5,228,469 UART:
5,228,523 UART: [state] CFI Enabled
5,238,945 UART: [fht] FMC Alias Private Key: 7
5,347,145 UART: [art] Extend RT PCRs Done
5,347,573 UART: [art] Lock RT PCRs Done
5,349,211 UART: [art] Populate DV Done
5,357,345 UART: [fht] FMC Alias Private Key: 7
5,358,467 UART: [art] Derive CDI
5,358,747 UART: [art] Store in in slot 0x4
5,444,158 UART: [art] Derive Key Pair
5,444,518 UART: [art] Store priv key in slot 0x5
5,457,088 UART: [art] Derive Key Pair - Done
5,471,889 UART: [art] Signing Cert with AUTHO
5,472,369 UART: RITY.KEYID = 7
5,487,697 UART: [art] Erasing AUTHORITY.KEYID = 7
5,488,462 UART: [art] PUB.X = 3A290EF301321DB862ABB304D361759BBE69EAAD757EB10960D643322E68F02E1EA5389470A1687FB35076CC6AF1B2C8
5,495,224 UART: [art] PUB.Y = 772763483DFAD83E175EC8AA5AA726F94BF2627829E4BD604E64D81198A6F806A98E24A931321DD7583F2E60D1850869
5,502,164 UART: [art] SIG.R = 0278D605BDB29B7085D69D68C324EC2628F982408A5FBF3A50EB3194C442E4F3C8259640E45C1CCB54032D1EF458CEDB
5,508,931 UART: [art] SIG.S = 2A136A698CCB01E0236AFB3EB4A1F12BDB147B6D87B4DFBAC4FB86FF23E4586CC44F566BB32FF2DC9B8CB01283B3E861
5,532,199 UART: Caliptra RT
5,532,452 UART: [state] CFI Enabled
5,640,442 UART: [rt] RT listening for mailbox commands...
5,641,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,146 UART: [rt]cmd =0x41544d4e, len=14344
6,329,930 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
902,745 UART: [kat] HMAC-384Kdf
907,237 UART: [kat] LMS
1,475,433 UART: [kat] --
1,476,318 UART: [cold-reset] ++
1,476,672 UART: [fht] Storing FHT @ 0x50003400
1,479,367 UART: [idev] ++
1,479,535 UART: [idev] CDI.KEYID = 6
1,479,895 UART: [idev] SUBJECT.KEYID = 7
1,480,319 UART: [idev] UDS.KEYID = 0
1,480,664 ready_for_fw is high
1,480,664 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,389 UART: [idev] Erasing UDS.KEYID = 0
1,505,715 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,375 UART: [idev] --
1,515,204 UART: [ldev] ++
1,515,372 UART: [ldev] CDI.KEYID = 6
1,515,735 UART: [ldev] SUBJECT.KEYID = 5
1,516,161 UART: [ldev] AUTHORITY.KEYID = 7
1,516,624 UART: [ldev] FE.KEYID = 1
1,522,008 UART: [ldev] Erasing FE.KEYID = 1
1,547,661 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,731 UART: [ldev] --
1,587,160 UART: [fwproc] Waiting for Commands...
1,587,775 UART: [fwproc] Received command 0x46574c44
1,588,566 UART: [fwproc] Received Image of size 114448 bytes
5,312,663 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,340,681 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,370,033 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,505,994 >>> mbox cmd response: success
5,507,028 UART: [afmc] ++
5,507,196 UART: [afmc] CDI.KEYID = 6
5,507,558 UART: [afmc] SUBJECT.KEYID = 7
5,507,983 UART: [afmc] AUTHORITY.KEYID = 5
5,543,419 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,559,527 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,560,307 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,566,016 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,571,908 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,577,609 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,585,403 UART: [afmc] --
5,586,443 UART: [cold-reset] --
5,587,297 UART: [state] Locking Datavault
5,588,576 UART: [state] Locking PCR0, PCR1 and PCR31
5,589,180 UART: [state] Locking ICCM
5,589,698 UART: [exit] Launching FMC @ 0x40000130
5,595,027 UART:
5,595,043 UART: Running Caliptra FMC ...
5,595,451 UART:
5,595,594 UART: [state] CFI Enabled
5,606,290 UART: [fht] FMC Alias Private Key: 7
5,714,516 UART: [art] Extend RT PCRs Done
5,714,944 UART: [art] Lock RT PCRs Done
5,716,342 UART: [art] Populate DV Done
5,724,748 UART: [fht] FMC Alias Private Key: 7
5,725,906 UART: [art] Derive CDI
5,726,186 UART: [art] Store in in slot 0x4
5,812,353 UART: [art] Derive Key Pair
5,812,713 UART: [art] Store priv key in slot 0x5
5,826,175 UART: [art] Derive Key Pair - Done
5,840,641 UART: [art] Signing Cert with AUTHO
5,841,121 UART: RITY.KEYID = 7
5,856,379 UART: [art] Erasing AUTHORITY.KEYID = 7
5,857,144 UART: [art] PUB.X = 1CFABD33DCF6783AF4C9C0528D43F0C47A652336F341F1133E7713661B9FC4DB2B226841280724FA34519A063DD2A445
5,863,908 UART: [art] PUB.Y = A272C73E67F4E9D75CDD66546DC1BF94117BE23B5D566C92FCFED4225C30E02E482123EB3C0848B5EF1739CC855591EF
5,870,865 UART: [art] SIG.R = B6FA05B9C1D9DA232565BC9E25316AF3B7E810E6D3D899338BD14D880760A04A7EE1438362F938045D07597F99CA12C1
5,877,623 UART: [art] SIG.S = 2586B53FA16102380A8490A473DCEC4A1191ED5B79FCC7F46D1914951A8154AA6D9EA1B5B82C6705455296863C90E728
5,901,703 UART: Caliptra RT
5,902,048 UART: [state] CFI Enabled
6,010,377 UART: [rt] RT listening for mailbox commands...
6,011,047 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,134,247 UART: [rt]cmd =0x41544d4e, len=14344
6,699,819 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,928 ready_for_fw is high
1,362,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,128,472 >>> mbox cmd response: success
5,190,143 UART:
5,190,159 UART: Running Caliptra FMC ...
5,190,567 UART:
5,190,710 UART: [state] CFI Enabled
5,201,178 UART: [fht] FMC Alias Private Key: 7
5,309,330 UART: [art] Extend RT PCRs Done
5,309,758 UART: [art] Lock RT PCRs Done
5,311,320 UART: [art] Populate DV Done
5,319,638 UART: [fht] FMC Alias Private Key: 7
5,320,784 UART: [art] Derive CDI
5,321,064 UART: [art] Store in in slot 0x4
5,406,989 UART: [art] Derive Key Pair
5,407,349 UART: [art] Store priv key in slot 0x5
5,420,871 UART: [art] Derive Key Pair - Done
5,435,464 UART: [art] Signing Cert with AUTHO
5,435,944 UART: RITY.KEYID = 7
5,451,220 UART: [art] Erasing AUTHORITY.KEYID = 7
5,451,985 UART: [art] PUB.X = 3D07BBDC54124953C2535713E090F773804E7015109936B8A3FF02DDC4BB94D67A98FF4A7ECA088E2C6D50AE83E6A888
5,458,750 UART: [art] PUB.Y = 56164D1DCACF7B5B525ABB96A7F0170E8B2DFBBDA967EB1A2954896B17027EFDFF0BF2D82CF2043DF01F92F3CFB8929B
5,465,712 UART: [art] SIG.R = 510AE6DC95C20AB33B499843350823B9AFD4EF091D9D12DDC91664F6509EFC57306A65CB544A3B56EB8C94072C5AC995
5,472,473 UART: [art] SIG.S = FA5A3E50601AF176B68438B244E4B16ABE68E380480BC4B6456933BA769DB17CD7DA981348ED6AA2E693F8F7C2ABF809
5,496,398 UART: Caliptra RT
5,496,743 UART: [state] CFI Enabled
5,605,398 UART: [rt] RT listening for mailbox commands...
5,606,068 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,729,130 UART: [rt]cmd =0x41544d4e, len=14344
6,294,588 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,785 UART: [kat] SHA2-256
903,725 UART: [kat] SHA2-384
906,522 UART: [kat] SHA2-512-ACC
908,423 UART: [kat] ECC-384
918,024 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,171,923 UART: [cold-reset] ++
1,172,433 UART: [fht] FHT @ 0x50003400
1,175,038 UART: [idev] ++
1,175,206 UART: [idev] CDI.KEYID = 6
1,175,566 UART: [idev] SUBJECT.KEYID = 7
1,175,990 UART: [idev] UDS.KEYID = 0
1,176,335 ready_for_fw is high
1,176,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,118 UART: [idev] Erasing UDS.KEYID = 0
1,201,359 UART: [idev] Sha1 KeyId Algorithm
1,209,717 UART: [idev] --
1,210,791 UART: [ldev] ++
1,210,959 UART: [ldev] CDI.KEYID = 6
1,211,322 UART: [ldev] SUBJECT.KEYID = 5
1,211,748 UART: [ldev] AUTHORITY.KEYID = 7
1,212,211 UART: [ldev] FE.KEYID = 1
1,217,327 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,097 UART: [ldev] --
1,282,408 UART: [fwproc] Wait for Commands...
1,282,992 UART: [fwproc] Recv command 0x46574c44
1,283,720 UART: [fwproc] Recv'd Img size: 114448 bytes
3,137,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,165,209 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,194,513 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,330,560 >>> mbox cmd response: success
3,331,764 UART: [afmc] ++
3,331,932 UART: [afmc] CDI.KEYID = 6
3,332,294 UART: [afmc] SUBJECT.KEYID = 7
3,332,719 UART: [afmc] AUTHORITY.KEYID = 5
3,368,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,384,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,385,744 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,391,453 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,397,345 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,403,056 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,410,895 UART: [afmc] --
3,411,787 UART: [cold-reset] --
3,412,701 UART: [state] Locking Datavault
3,413,774 UART: [state] Locking PCR0, PCR1 and PCR31
3,414,378 UART: [state] Locking ICCM
3,414,986 UART: [exit] Launching FMC @ 0x40000130
3,420,315 UART:
3,420,331 UART: Running Caliptra FMC ...
3,420,739 UART:
3,420,793 UART: [state] CFI Enabled
3,431,631 UART: [fht] FMC Alias Private Key: 7
3,539,431 UART: [art] Extend RT PCRs Done
3,539,859 UART: [art] Lock RT PCRs Done
3,541,565 UART: [art] Populate DV Done
3,549,785 UART: [fht] FMC Alias Private Key: 7
3,550,865 UART: [art] Derive CDI
3,551,145 UART: [art] Store in in slot 0x4
3,636,524 UART: [art] Derive Key Pair
3,636,884 UART: [art] Store priv key in slot 0x5
3,650,076 UART: [art] Derive Key Pair - Done
3,664,958 UART: [art] Signing Cert with AUTHO
3,665,438 UART: RITY.KEYID = 7
3,680,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,681,195 UART: [art] PUB.X = 6386AD7C7236921B194B92202D3843C1246A2FA529FAA540E254EAB739DBBC0FCD6AFCA8BC5EE113FBA510CFCE402F5A
3,687,982 UART: [art] PUB.Y = 20D267D1EB2FCAA84994E96174B42FBD165B613A29C03AFECACD573833965D679541200AA7C19D414647284E4433D0F1
3,694,929 UART: [art] SIG.R = DBA2EFBBD6E40CD8842A7DF830B9A1F052B8AA7E76B91899B134BCCEFF264ECB16F5845E4E1B845EFB542A5F380DBF1B
3,701,721 UART: [art] SIG.S = 283B220B7B9D4B643B3FA900D6C41E95730504CB6CDF9D5B508EADA13C3F358B11B502EEA48C854D1B48EE6C3EA14F48
3,725,920 UART: Caliptra RT
3,726,173 UART: [state] CFI Enabled
3,833,461 UART: [rt] RT listening for mailbox commands...
3,834,131 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,957,221 UART: [rt]cmd =0x41544d4e, len=14344
4,522,735 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,545 ready_for_fw is high
1,060,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,586 >>> mbox cmd response: success
3,231,867 UART:
3,231,883 UART: Running Caliptra FMC ...
3,232,291 UART:
3,232,345 UART: [state] CFI Enabled
3,242,971 UART: [fht] FMC Alias Private Key: 7
3,350,209 UART: [art] Extend RT PCRs Done
3,350,637 UART: [art] Lock RT PCRs Done
3,352,253 UART: [art] Populate DV Done
3,360,387 UART: [fht] FMC Alias Private Key: 7
3,361,535 UART: [art] Derive CDI
3,361,815 UART: [art] Store in in slot 0x4
3,447,264 UART: [art] Derive Key Pair
3,447,624 UART: [art] Store priv key in slot 0x5
3,460,850 UART: [art] Derive Key Pair - Done
3,475,353 UART: [art] Signing Cert with AUTHO
3,475,833 UART: RITY.KEYID = 7
3,491,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,768 UART: [art] PUB.X = 90300915A8EAE233F830010F682625328F67A9728EACD900AB332C6E7BE531CF3ECB73F874A557196BA51BC6CFED2F08
3,498,510 UART: [art] PUB.Y = 822A264251B969B2B6D97AC28ECF61A908CBF27B6A4F40F5CB92A077ECBAF7DF76BBB7197F73A5FB8D17E63A20D96948
3,505,473 UART: [art] SIG.R = C3A829AD8815AD1EC95A9FCF41A9E1B7BA7DE29BAB053849A95DA96379BE6DB6400A29B407CE720F4DA6528D4B01071E
3,512,241 UART: [art] SIG.S = 320E144C0A173AE1C2235DC2E8D0D38FA9D2ABCACE9142D9D80988DDC26546B43C7320FF71F115E3B804502292C4E056
3,536,146 UART: Caliptra RT
3,536,399 UART: [state] CFI Enabled
3,644,049 UART: [rt] RT listening for mailbox commands...
3,644,719 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,807 UART: [rt]cmd =0x41544d4e, len=14344
4,328,139 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
893,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,706 UART: [kat] ++
897,858 UART: [kat] sha1
901,974 UART: [kat] SHA2-256
903,914 UART: [kat] SHA2-384
906,709 UART: [kat] SHA2-512-ACC
908,610 UART: [kat] ECC-384
918,525 UART: [kat] HMAC-384Kdf
923,231 UART: [kat] LMS
1,171,559 UART: [kat] --
1,172,858 UART: [cold-reset] ++
1,173,190 UART: [fht] FHT @ 0x50003400
1,175,787 UART: [idev] ++
1,175,955 UART: [idev] CDI.KEYID = 6
1,176,315 UART: [idev] SUBJECT.KEYID = 7
1,176,739 UART: [idev] UDS.KEYID = 0
1,177,084 ready_for_fw is high
1,177,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,497 UART: [idev] Erasing UDS.KEYID = 0
1,201,332 UART: [idev] Sha1 KeyId Algorithm
1,209,730 UART: [idev] --
1,210,614 UART: [ldev] ++
1,210,782 UART: [ldev] CDI.KEYID = 6
1,211,145 UART: [ldev] SUBJECT.KEYID = 5
1,211,571 UART: [ldev] AUTHORITY.KEYID = 7
1,212,034 UART: [ldev] FE.KEYID = 1
1,217,430 UART: [ldev] Erasing FE.KEYID = 1
1,244,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,148 UART: [ldev] --
1,283,487 UART: [fwproc] Wait for Commands...
1,284,163 UART: [fwproc] Recv command 0x46574c44
1,284,891 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,319,662 >>> mbox cmd response: success
3,320,702 UART: [afmc] ++
3,320,870 UART: [afmc] CDI.KEYID = 6
3,321,232 UART: [afmc] SUBJECT.KEYID = 7
3,321,657 UART: [afmc] AUTHORITY.KEYID = 5
3,357,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,452 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,200 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,909 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,801 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,512 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,231 UART: [afmc] --
3,400,123 UART: [cold-reset] --
3,401,049 UART: [state] Locking Datavault
3,402,248 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,852 UART: [state] Locking ICCM
3,403,508 UART: [exit] Launching FMC @ 0x40000130
3,408,837 UART:
3,408,853 UART: Running Caliptra FMC ...
3,409,261 UART:
3,409,404 UART: [state] CFI Enabled
3,420,282 UART: [fht] FMC Alias Private Key: 7
3,528,530 UART: [art] Extend RT PCRs Done
3,528,958 UART: [art] Lock RT PCRs Done
3,530,310 UART: [art] Populate DV Done
3,538,654 UART: [fht] FMC Alias Private Key: 7
3,539,740 UART: [art] Derive CDI
3,540,020 UART: [art] Store in in slot 0x4
3,625,289 UART: [art] Derive Key Pair
3,625,649 UART: [art] Store priv key in slot 0x5
3,638,789 UART: [art] Derive Key Pair - Done
3,653,574 UART: [art] Signing Cert with AUTHO
3,654,054 UART: RITY.KEYID = 7
3,669,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,375 UART: [art] PUB.X = 992830D2A09A2BFB693F19BFB437D85DCB7B38F20DE4C4D327E0657FA7540CDB1AFAB65A42AC9DC11E6CDC9547C7DBBF
3,677,165 UART: [art] PUB.Y = 55B3FB3C2ED129EFE180AD8DEDCEC1DA3F10B504BCCBE98CE4BBA680D45FFFE8B7432AC59AC19C1ED50645CD006A6EDD
3,684,125 UART: [art] SIG.R = 3E20B95502BDD29F822FB8AEAB7A59E84D10C4645222D1E6E93E42979F4B47BDD3F3682ECCB47AA6848130A2857405EB
3,690,897 UART: [art] SIG.S = CF25D2B3C66BC272FD6380DFEC92E26CF28CC2280A15F99D6D14ABF39548838FD739F5E43965B76731288EACF2110462
3,714,416 UART: Caliptra RT
3,714,761 UART: [state] CFI Enabled
3,821,969 UART: [rt] RT listening for mailbox commands...
3,822,639 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,743 UART: [rt]cmd =0x41544d4e, len=14344
4,498,582 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,854 ready_for_fw is high
1,060,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,163,332 >>> mbox cmd response: success
3,225,669 UART:
3,225,685 UART: Running Caliptra FMC ...
3,226,093 UART:
3,226,236 UART: [state] CFI Enabled
3,237,120 UART: [fht] FMC Alias Private Key: 7
3,345,040 UART: [art] Extend RT PCRs Done
3,345,468 UART: [art] Lock RT PCRs Done
3,347,004 UART: [art] Populate DV Done
3,355,190 UART: [fht] FMC Alias Private Key: 7
3,356,368 UART: [art] Derive CDI
3,356,648 UART: [art] Store in in slot 0x4
3,442,391 UART: [art] Derive Key Pair
3,442,751 UART: [art] Store priv key in slot 0x5
3,457,015 UART: [art] Derive Key Pair - Done
3,471,907 UART: [art] Signing Cert with AUTHO
3,472,387 UART: RITY.KEYID = 7
3,487,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,448 UART: [art] PUB.X = 873C3EA3633D95078B390B92DB45A8E7D5871C8FC2E4B97504CE59C83298389335E26CBC9D088E48F34CAB118D1B97D4
3,495,208 UART: [art] PUB.Y = E035F92D0550006FF00C58DCF83A4985C29D0B49E681B88AC9FA90EF4641BFB26C04B50239C547887949424F70EA29E5
3,502,121 UART: [art] SIG.R = 13218235B319082E5F5D93809FA741A3BE7ADEBDE8443FE958B50CD18D483BF12FFA6E86E16C79A2F0CA23865926728F
3,508,891 UART: [art] SIG.S = 9FA13971EEC26E735554C29D3C020EFFE42516E0A68C022FB86F221B7A1ADC71DE4BE6BE39B96ACF6BA27C78FE361B3C
3,532,693 UART: Caliptra RT
3,533,038 UART: [state] CFI Enabled
3,640,468 UART: [rt] RT listening for mailbox commands...
3,641,138 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,900 UART: [rt]cmd =0x41544d4e, len=14344
4,329,298 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,170,083 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,133 UART: [idev] ++
1,173,301 UART: [idev] CDI.KEYID = 6
1,173,662 UART: [idev] SUBJECT.KEYID = 7
1,174,087 UART: [idev] UDS.KEYID = 0
1,174,433 ready_for_fw is high
1,174,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,501 UART: [idev] Sha1 KeyId Algorithm
1,207,539 UART: [idev] --
1,208,660 UART: [ldev] ++
1,208,828 UART: [ldev] CDI.KEYID = 6
1,209,192 UART: [ldev] SUBJECT.KEYID = 5
1,209,619 UART: [ldev] AUTHORITY.KEYID = 7
1,210,082 UART: [ldev] FE.KEYID = 1
1,215,224 UART: [ldev] Erasing FE.KEYID = 1
1,241,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,252 UART: [fwproc] Wait for Commands...
1,280,979 UART: [fwproc] Recv command 0x46574c44
1,281,712 UART: [fwproc] Recv'd Img size: 114448 bytes
3,136,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,165,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,194,704 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,330,654 >>> mbox cmd response: success
3,331,851 UART: [afmc] ++
3,332,019 UART: [afmc] CDI.KEYID = 6
3,332,382 UART: [afmc] SUBJECT.KEYID = 7
3,332,808 UART: [afmc] AUTHORITY.KEYID = 5
3,368,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,384,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,385,441 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,391,151 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,397,041 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,402,752 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,410,656 UART: [afmc] --
3,411,668 UART: [cold-reset] --
3,412,416 UART: [state] Locking Datavault
3,413,793 UART: [state] Locking PCR0, PCR1 and PCR31
3,414,397 UART: [state] Locking ICCM
3,414,835 UART: [exit] Launching FMC @ 0x40000130
3,420,164 UART:
3,420,180 UART: Running Caliptra FMC ...
3,420,588 UART:
3,420,642 UART: [state] CFI Enabled
3,430,942 UART: [fht] FMC Alias Private Key: 7
3,538,444 UART: [art] Extend RT PCRs Done
3,538,872 UART: [art] Lock RT PCRs Done
3,540,272 UART: [art] Populate DV Done
3,548,596 UART: [fht] FMC Alias Private Key: 7
3,549,624 UART: [art] Derive CDI
3,549,904 UART: [art] Store in in slot 0x4
3,635,527 UART: [art] Derive Key Pair
3,635,887 UART: [art] Store priv key in slot 0x5
3,649,867 UART: [art] Derive Key Pair - Done
3,664,632 UART: [art] Signing Cert with AUTHO
3,665,112 UART: RITY.KEYID = 7
3,680,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,681,069 UART: [art] PUB.X = 003CE5AA57BA72FC1306329E576319BF8D7620C0CCE00F95D2AACE6F07C90CF1830B68AEAB19BF8C398953D4F54FD889
3,687,816 UART: [art] PUB.Y = 8761105ADC88EB20364264F6EC2F52BA03F373F798994279538169D1A344CBA9C712CAFFE5E1BEA5B0EEE2E527D7A738
3,694,771 UART: [art] SIG.R = 987141AD12FBFB5D147B81698B3033D6AD915B25BE8521D0D14C9F0BF953BBBD77DECAE4E0383B27945D1284301B5B73
3,701,546 UART: [art] SIG.S = 9985E59A00B0091D75B370CF5827D02280610AB8250E9AD7A3C09247114716F918FA368113ED26F853694D56944E9FB1
3,725,604 UART: Caliptra RT
3,725,857 UART: [state] CFI Enabled
3,833,230 UART: [rt] RT listening for mailbox commands...
3,833,900 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,956,982 UART: [rt]cmd =0x41544d4e, len=14344
4,515,359 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,754 ready_for_fw is high
1,056,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,165,900 >>> mbox cmd response: success
3,228,755 UART:
3,228,771 UART: Running Caliptra FMC ...
3,229,179 UART:
3,229,233 UART: [state] CFI Enabled
3,239,707 UART: [fht] FMC Alias Private Key: 7
3,347,347 UART: [art] Extend RT PCRs Done
3,347,775 UART: [art] Lock RT PCRs Done
3,349,113 UART: [art] Populate DV Done
3,357,493 UART: [fht] FMC Alias Private Key: 7
3,358,469 UART: [art] Derive CDI
3,358,749 UART: [art] Store in in slot 0x4
3,444,218 UART: [art] Derive Key Pair
3,444,578 UART: [art] Store priv key in slot 0x5
3,457,878 UART: [art] Derive Key Pair - Done
3,472,817 UART: [art] Signing Cert with AUTHO
3,473,297 UART: RITY.KEYID = 7
3,488,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,490 UART: [art] PUB.X = 12F6DC9EC2DDF1D6C60CDB8ABD9D5B83F9950DD37BDD7BB6C269A7E7716B116C7D3A7C92249DE047F211747C762BBF77
3,496,274 UART: [art] PUB.Y = 68E5F74DDDD8D26ED2B62EB673C8765DCCD316CAD5014017F08B947C6D0B619A990E5B9BCD3E83B25AB6E0EE68B671BC
3,503,235 UART: [art] SIG.R = A3BFA68CF15DD751D45CFC67CF4886D8CE0276CC66A9EDB9B6DEE7F865CBE2AC423B29292647B17981FAC8AEB29C5ECB
3,510,030 UART: [art] SIG.S = 64C32B7024C0051A991E8DEF6DFA336612334604541874101C433EBA15FEEF68A23C507359FCD769229B1706E5AFB2AD
3,533,986 UART: Caliptra RT
3,534,239 UART: [state] CFI Enabled
3,642,071 UART: [rt] RT listening for mailbox commands...
3,642,741 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,553 UART: [rt]cmd =0x41544d4e, len=14344
4,321,043 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
899,928 UART: [kat] SHA2-256
901,868 UART: [kat] SHA2-384
904,681 UART: [kat] SHA2-512-ACC
906,582 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,174,146 ready_for_fw is high
1,174,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,570 UART: [idev] Erasing UDS.KEYID = 0
1,199,076 UART: [idev] Sha1 KeyId Algorithm
1,207,872 UART: [idev] --
1,208,885 UART: [ldev] ++
1,209,053 UART: [ldev] CDI.KEYID = 6
1,209,417 UART: [ldev] SUBJECT.KEYID = 5
1,209,844 UART: [ldev] AUTHORITY.KEYID = 7
1,210,307 UART: [ldev] FE.KEYID = 1
1,215,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,493 UART: [ldev] --
1,281,777 UART: [fwproc] Wait for Commands...
1,282,408 UART: [fwproc] Recv command 0x46574c44
1,283,141 UART: [fwproc] Recv'd Img size: 114448 bytes
3,133,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,869 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,326,763 >>> mbox cmd response: success
3,328,028 UART: [afmc] ++
3,328,196 UART: [afmc] CDI.KEYID = 6
3,328,559 UART: [afmc] SUBJECT.KEYID = 7
3,328,985 UART: [afmc] AUTHORITY.KEYID = 5
3,364,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,307 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,058 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,768 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,658 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,369 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,235 UART: [afmc] --
3,407,235 UART: [cold-reset] --
3,408,093 UART: [state] Locking Datavault
3,409,500 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,104 UART: [state] Locking ICCM
3,410,552 UART: [exit] Launching FMC @ 0x40000130
3,415,881 UART:
3,415,897 UART: Running Caliptra FMC ...
3,416,305 UART:
3,416,448 UART: [state] CFI Enabled
3,426,742 UART: [fht] FMC Alias Private Key: 7
3,534,546 UART: [art] Extend RT PCRs Done
3,534,974 UART: [art] Lock RT PCRs Done
3,536,712 UART: [art] Populate DV Done
3,544,794 UART: [fht] FMC Alias Private Key: 7
3,545,962 UART: [art] Derive CDI
3,546,242 UART: [art] Store in in slot 0x4
3,632,047 UART: [art] Derive Key Pair
3,632,407 UART: [art] Store priv key in slot 0x5
3,644,987 UART: [art] Derive Key Pair - Done
3,659,947 UART: [art] Signing Cert with AUTHO
3,660,427 UART: RITY.KEYID = 7
3,675,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,226 UART: [art] PUB.X = F7AB11F642A3CF95661DFBACCA3FFC6233DAFC3665D19323130B04F8253E998CB31A009F21102C4EE400941813150C9F
3,682,949 UART: [art] PUB.Y = E16D0DF52422405F041CF79DFE4E3C4CE4B0FE380EC5761012D00E86A98C4F3A47CC3F139BCC887E80B4D098D355CAB8
3,689,901 UART: [art] SIG.R = 61750D5F4A361D1B7A1826A968036F4F71C237D7D2A1B352A1A30889DA1D6C8A5B6C6BA9944661FD958F5C842EDE6DBF
3,696,670 UART: [art] SIG.S = B4BF112C2E762A199F781FB627A72047A9C31361C94C34B416065EB6B30C62F5A598FD994F8760D6F752A509556A5251
3,720,394 UART: Caliptra RT
3,720,739 UART: [state] CFI Enabled
3,828,729 UART: [rt] RT listening for mailbox commands...
3,829,399 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,299 UART: [rt]cmd =0x41544d4e, len=14344
4,520,356 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,411 ready_for_fw is high
1,056,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,168,527 >>> mbox cmd response: success
3,230,358 UART:
3,230,374 UART: Running Caliptra FMC ...
3,230,782 UART:
3,230,925 UART: [state] CFI Enabled
3,241,465 UART: [fht] FMC Alias Private Key: 7
3,349,731 UART: [art] Extend RT PCRs Done
3,350,159 UART: [art] Lock RT PCRs Done
3,351,767 UART: [art] Populate DV Done
3,360,079 UART: [fht] FMC Alias Private Key: 7
3,361,035 UART: [art] Derive CDI
3,361,315 UART: [art] Store in in slot 0x4
3,447,092 UART: [art] Derive Key Pair
3,447,452 UART: [art] Store priv key in slot 0x5
3,460,828 UART: [art] Derive Key Pair - Done
3,475,845 UART: [art] Signing Cert with AUTHO
3,476,325 UART: RITY.KEYID = 7
3,491,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,442 UART: [art] PUB.X = FAC5A1D825C56980871851C8CC0D392A60C767D504F3E0B898D597F96B4D5A3C89BE71696BF384983DDE80A7ADC33726
3,499,210 UART: [art] PUB.Y = 0BF82D1AB5D28159657ED4D9EE01011C88FEE385CB41BED6CADCF577268A3BB967A818F5BB6441A2865924DFFC04EE10
3,506,164 UART: [art] SIG.R = 7791A82DEB0C3DC1672F353E703D4B7306E9FA3D943ADCCD9DF6F17D457D412A77E15598BBF64E65501C101545D6CAD5
3,512,938 UART: [art] SIG.S = 0B0A02BAB4F6E0D6D659A2C94EA1696A7D2C6DD881C64BDA8BC4588A034557528A09F20AF2A5001CFCE1021D41DC9ADF
3,536,898 UART: Caliptra RT
3,537,243 UART: [state] CFI Enabled
3,644,798 UART: [rt] RT listening for mailbox commands...
3,645,468 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,570 UART: [rt]cmd =0x41544d4e, len=14344
4,329,814 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,102 UART:
192,458 UART: Running Caliptra ROM ...
193,669 UART:
193,830 UART: [state] CFI Enabled
262,396 UART: [state] LifecycleState = Unprovisioned
264,296 UART: [state] DebugLocked = No
267,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,404 UART: [kat] SHA2-256
442,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,633 UART: [kat] ++
453,084 UART: [kat] sha1
464,315 UART: [kat] SHA2-256
466,976 UART: [kat] SHA2-384
472,404 UART: [kat] SHA2-512-ACC
474,773 UART: [kat] ECC-384
2,766,870 UART: [kat] HMAC-384Kdf
2,798,862 UART: [kat] LMS
3,989,173 UART: [kat] --
3,993,554 UART: [cold-reset] ++
3,995,278 UART: [fht] Storing FHT @ 0x50003400
4,006,618 UART: [idev] ++
4,007,190 UART: [idev] CDI.KEYID = 6
4,008,116 UART: [idev] SUBJECT.KEYID = 7
4,009,366 UART: [idev] UDS.KEYID = 0
4,010,439 ready_for_fw is high
4,010,639 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,602 UART: [idev] Erasing UDS.KEYID = 0
7,345,220 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,444 UART: [idev] --
7,370,609 UART: [ldev] ++
7,371,181 UART: [ldev] CDI.KEYID = 6
7,372,201 UART: [ldev] SUBJECT.KEYID = 5
7,373,362 UART: [ldev] AUTHORITY.KEYID = 7
7,374,590 UART: [ldev] FE.KEYID = 1
7,421,403 UART: [ldev] Erasing FE.KEYID = 1
10,752,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,651 UART: [ldev] --
13,114,544 UART: [fwproc] Waiting for Commands...
13,116,424 UART: [fwproc] Received command 0x46574c44
13,118,609 UART: [fwproc] Received Image of size 114124 bytes
21,989,218 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,068,848 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,137,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,455,108 >>> mbox cmd response: success
22,459,325 UART: [afmc] ++
22,459,917 UART: [afmc] CDI.KEYID = 6
22,460,908 UART: [afmc] SUBJECT.KEYID = 7
22,462,129 UART: [afmc] AUTHORITY.KEYID = 5
25,829,594 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,130,015 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,132,249 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,146,830 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,161,569 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,175,748 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,197,511 UART: [afmc] --
28,201,790 UART: [cold-reset] --
28,207,505 UART: [state] Locking Datavault
28,213,567 UART: [state] Locking PCR0, PCR1 and PCR31
28,215,322 UART: [state] Locking ICCM
28,217,366 UART: [exit] Launching FMC @ 0x40000130
28,225,765 UART:
28,226,011 UART: Running Caliptra FMC ...
28,227,135 UART:
28,227,304 UART: [state] CFI Enabled
28,289,180 UART: [fht] FMC Alias Private Key: 7
30,627,828 UART: [art] Extend RT PCRs Done
30,629,055 UART: [art] Lock RT PCRs Done
30,631,114 UART: [art] Populate DV Done
30,636,419 UART: [fht] FMC Alias Private Key: 7
30,638,073 UART: [art] Derive CDI
30,638,893 UART: [art] Store in in slot 0x4
30,698,263 UART: [art] Derive Key Pair
30,699,313 UART: [art] Store priv key in slot 0x5
33,992,037 UART: [art] Derive Key Pair - Done
34,004,915 UART: [art] Signing Cert with AUTHO
34,006,221 UART: RITY.KEYID = 7
36,292,556 UART: [art] Erasing AUTHORITY.KEYID = 7
36,294,067 UART: [art] PUB.X = 07FBBA5396DCC11E2C3A9E584905FBB351A053EE6466585D77ED258DB9A7F0DA28D15B5F85BAEB8851D97B9F123659B4
36,301,352 UART: [art] PUB.Y = 40C1DA4C6022AB8581230058FAC8F9F0AEA9B4F61FA37F43B4DA4D8CB91F2936F5EA9586EAA2737ED12F32B6FF615D32
36,308,581 UART: [art] SIG.R = B9A8615D4418E30E6FF926327E3A12394462772A7E527A33E088D5946A481937B7846D563B52AE18437CEADAF8907E67
36,315,927 UART: [art] SIG.S = ECC1BCD4B175B0E9445B08D0006EA65C6016CBCCD72E22608B984C9D2A87BE46F6325666B2749C6B7327DE48D5C32FFC
37,621,130 UART: Caliptra RT
37,621,841 UART: [state] CFI Enabled
37,782,350 UART: [rt] RT listening for mailbox commands...
37,784,692 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,940,097 UART: [rt]cmd =0x41544d4e, len=14344
40,024,527 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,805,227 ready_for_fw is high
3,805,627 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,010,289 >>> mbox cmd response: success
27,706,012 UART:
27,706,389 UART: Running Caliptra FMC ...
27,707,496 UART:
27,707,652 UART: [state] CFI Enabled
27,774,356 UART: [fht] FMC Alias Private Key: 7
30,112,039 UART: [art] Extend RT PCRs Done
30,113,294 UART: [art] Lock RT PCRs Done
30,115,065 UART: [art] Populate DV Done
30,120,427 UART: [fht] FMC Alias Private Key: 7
30,122,088 UART: [art] Derive CDI
30,122,834 UART: [art] Store in in slot 0x4
30,183,672 UART: [art] Derive Key Pair
30,184,715 UART: [art] Store priv key in slot 0x5
33,477,574 UART: [art] Derive Key Pair - Done
33,490,526 UART: [art] Signing Cert with AUTHO
33,491,836 UART: RITY.KEYID = 7
35,779,780 UART: [art] Erasing AUTHORITY.KEYID = 7
35,781,301 UART: [art] PUB.X = 4DC4E6B2653F5F59843AF7BF97C03971872082ADC3AAEF093FF1CCE5001020A6CCFFF7A252CD9453DBB51477E8AA1038
35,788,535 UART: [art] PUB.Y = 6A86A44E61C1C2DCE58F25682C64466217526E2A5AD6ADAB8594BE34793135BE622308D61546CFE5E56E10AAC45A0204
35,795,780 UART: [art] SIG.R = 185BA81B90B7E694B3DACDF07D87898F9D19313A6344AFC1C12AE485B52C73077C01F80228C271F97512D3BE969D4F1A
35,803,205 UART: [art] SIG.S = A1A3B51B950BE4F4EE7C5AEF7011B5C4A541273117DE158CF97426F2BA463759B3201DC079500C3C17A338D0210A281F
37,108,177 UART: Caliptra RT
37,108,894 UART: [state] CFI Enabled
37,270,750 UART: [rt] RT listening for mailbox commands...
37,273,071 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,428,211 UART: [rt]cmd =0x41544d4e, len=14344
39,513,132 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,396 UART:
192,748 UART: Running Caliptra ROM ...
193,934 UART:
603,729 UART: [state] CFI Enabled
618,469 UART: [state] LifecycleState = Unprovisioned
620,417 UART: [state] DebugLocked = No
622,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,576 UART: [kat] SHA2-256
797,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,849 UART: [kat] ++
808,334 UART: [kat] sha1
820,198 UART: [kat] SHA2-256
822,916 UART: [kat] SHA2-384
828,402 UART: [kat] SHA2-512-ACC
830,762 UART: [kat] ECC-384
3,115,120 UART: [kat] HMAC-384Kdf
3,127,767 UART: [kat] LMS
4,317,878 UART: [kat] --
4,323,294 UART: [cold-reset] ++
4,325,155 UART: [fht] Storing FHT @ 0x50003400
4,337,340 UART: [idev] ++
4,337,897 UART: [idev] CDI.KEYID = 6
4,338,925 UART: [idev] SUBJECT.KEYID = 7
4,340,097 UART: [idev] UDS.KEYID = 0
4,341,168 ready_for_fw is high
4,341,386 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,702 UART: [idev] Erasing UDS.KEYID = 0
7,632,115 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,570 UART: [idev] --
7,656,885 UART: [ldev] ++
7,657,451 UART: [ldev] CDI.KEYID = 6
7,658,460 UART: [ldev] SUBJECT.KEYID = 5
7,659,611 UART: [ldev] AUTHORITY.KEYID = 7
7,660,889 UART: [ldev] FE.KEYID = 1
7,671,326 UART: [ldev] Erasing FE.KEYID = 1
10,957,272 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,359 UART: [ldev] --
13,316,235 UART: [fwproc] Waiting for Commands...
13,318,919 UART: [fwproc] Received command 0x46574c44
13,321,161 UART: [fwproc] Received Image of size 114124 bytes
21,799,151 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,878,236 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,947,082 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,264,078 >>> mbox cmd response: success
22,267,818 UART: [afmc] ++
22,268,464 UART: [afmc] CDI.KEYID = 6
22,269,371 UART: [afmc] SUBJECT.KEYID = 7
22,270,582 UART: [afmc] AUTHORITY.KEYID = 5
25,588,221 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,882,836 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,885,135 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,899,700 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,914,451 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,928,712 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,949,916 UART: [afmc] --
27,954,483 UART: [cold-reset] --
27,959,368 UART: [state] Locking Datavault
27,965,433 UART: [state] Locking PCR0, PCR1 and PCR31
27,967,135 UART: [state] Locking ICCM
27,969,334 UART: [exit] Launching FMC @ 0x40000130
27,977,729 UART:
27,977,959 UART: Running Caliptra FMC ...
27,979,054 UART:
27,979,208 UART: [state] CFI Enabled
27,987,260 UART: [fht] FMC Alias Private Key: 7
30,317,927 UART: [art] Extend RT PCRs Done
30,319,141 UART: [art] Lock RT PCRs Done
30,321,085 UART: [art] Populate DV Done
30,326,335 UART: [fht] FMC Alias Private Key: 7
30,327,886 UART: [art] Derive CDI
30,328,616 UART: [art] Store in in slot 0x4
30,371,091 UART: [art] Derive Key Pair
30,372,088 UART: [art] Store priv key in slot 0x5
33,614,913 UART: [art] Derive Key Pair - Done
33,627,794 UART: [art] Signing Cert with AUTHO
33,629,095 UART: RITY.KEYID = 7
35,908,310 UART: [art] Erasing AUTHORITY.KEYID = 7
35,909,814 UART: [art] PUB.X = 29242F3DBF206CFA0884897E9296419898078434EF0AE94289BAF07267312DC9A496C211F21329287BFBF5E8096296E1
35,917,041 UART: [art] PUB.Y = 383B32357742FE28C0F0308D6120FDE4370C2FD58AFDB16B36A916BB57020A179F4AAF590F51ECBA85C75E311E8450C7
35,924,307 UART: [art] SIG.R = D4C84C96153A2A8C47905D75266B491E028A3E182839DD7B7C80B386254F1EB4A52592EE11281188A78A0661D8EFDB50
35,931,635 UART: [art] SIG.S = 9A2C13A6353FCBC02A29120FA418F3F823BF1534E65FA80B843AB0F991994EB4EDA059BE98118618391A9C3D2AC73FF4
37,236,725 UART: Caliptra RT
37,237,415 UART: [state] CFI Enabled
37,355,243 UART: [rt] RT listening for mailbox commands...
37,357,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,512,886 UART: [rt]cmd =0x41544d4e, len=14344
39,545,864 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,130,967 ready_for_fw is high
4,131,370 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,056,769 >>> mbox cmd response: success
27,696,454 UART:
27,696,853 UART: Running Caliptra FMC ...
27,697,957 UART:
27,698,104 UART: [state] CFI Enabled
27,706,106 UART: [fht] FMC Alias Private Key: 7
30,036,169 UART: [art] Extend RT PCRs Done
30,037,407 UART: [art] Lock RT PCRs Done
30,038,787 UART: [art] Populate DV Done
30,044,249 UART: [fht] FMC Alias Private Key: 7
30,045,792 UART: [art] Derive CDI
30,046,528 UART: [art] Store in in slot 0x4
30,088,804 UART: [art] Derive Key Pair
30,089,843 UART: [art] Store priv key in slot 0x5
33,331,865 UART: [art] Derive Key Pair - Done
33,344,590 UART: [art] Signing Cert with AUTHO
33,345,933 UART: RITY.KEYID = 7
35,625,050 UART: [art] Erasing AUTHORITY.KEYID = 7
35,626,555 UART: [art] PUB.X = 97C282AD99C66257B93590394CDD6E62608834500073947DE3949EFA8ABF6ADC2E4EDF61D5E5B0EF1D0C2E794B4FE409
35,633,795 UART: [art] PUB.Y = 48A06D6705D05E96E2614306180DD8D2C6B41FC160A940F3AEE0705713B8FF6C6030ABEA54459D1C0753B8AEDC1B8E56
35,641,039 UART: [art] SIG.R = 25D6D72D2FA6452FFF30A70A1D29402CD23948D75F84986CCB6E7438DEBDA32EF6EDA81995609F0AA60A8AEFAD4C8C31
35,648,485 UART: [art] SIG.S = AA7F5B36D29658CE6FB967337BE389D1E0277B97B57D545A2AF5425FBDDA4832E0512A37607021FE733F8DB530D4803C
36,954,039 UART: Caliptra RT
36,954,761 UART: [state] CFI Enabled
37,072,254 UART: [rt] RT listening for mailbox commands...
37,074,556 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,229,933 UART: [rt]cmd =0x41544d4e, len=14344
39,314,683 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,272 UART:
192,641 UART: Running Caliptra ROM ...
193,782 UART:
193,933 UART: [state] CFI Enabled
261,873 UART: [state] LifecycleState = Unprovisioned
263,661 UART: [state] DebugLocked = No
265,684 UART: [state] WD Timer not started. Device not locked for debugging
269,087 UART: [kat] SHA2-256
448,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,847 UART: [kat] ++
460,394 UART: [kat] sha1
470,710 UART: [kat] SHA2-256
473,710 UART: [kat] SHA2-384
480,616 UART: [kat] SHA2-512-ACC
483,629 UART: [kat] ECC-384
2,948,792 UART: [kat] HMAC-384Kdf
2,970,613 UART: [kat] LMS
3,500,055 UART: [kat] --
3,503,013 UART: [cold-reset] ++
3,503,955 UART: [fht] FHT @ 0x50003400
3,515,144 UART: [idev] ++
3,515,771 UART: [idev] CDI.KEYID = 6
3,516,661 UART: [idev] SUBJECT.KEYID = 7
3,517,765 UART: [idev] UDS.KEYID = 0
3,518,761 ready_for_fw is high
3,518,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,928 UART: [idev] Erasing UDS.KEYID = 0
6,028,615 UART: [idev] Sha1 KeyId Algorithm
6,052,492 UART: [idev] --
6,057,999 UART: [ldev] ++
6,058,578 UART: [ldev] CDI.KEYID = 6
6,059,493 UART: [ldev] SUBJECT.KEYID = 5
6,060,657 UART: [ldev] AUTHORITY.KEYID = 7
6,061,889 UART: [ldev] FE.KEYID = 1
6,100,076 UART: [ldev] Erasing FE.KEYID = 1
8,605,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,011 UART: [ldev] --
10,415,274 UART: [fwproc] Wait for Commands...
10,418,198 UART: [fwproc] Recv command 0x46574c44
10,420,246 UART: [fwproc] Recv'd Img size: 114448 bytes
14,993,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,074,355 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,143,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,461,570 >>> mbox cmd response: success
15,465,734 UART: [afmc] ++
15,466,324 UART: [afmc] CDI.KEYID = 6
15,467,235 UART: [afmc] SUBJECT.KEYID = 7
15,468,448 UART: [afmc] AUTHORITY.KEYID = 5
18,005,399 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,729,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,731,199 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,747,140 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,763,138 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,778,895 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,801,750 UART: [afmc] --
19,805,417 UART: [cold-reset] --
19,808,950 UART: [state] Locking Datavault
19,813,549 UART: [state] Locking PCR0, PCR1 and PCR31
19,815,260 UART: [state] Locking ICCM
19,816,309 UART: [exit] Launching FMC @ 0x40000130
19,824,755 UART:
19,824,992 UART: Running Caliptra FMC ...
19,826,093 UART:
19,826,259 UART: [state] CFI Enabled
19,887,278 UART: [fht] FMC Alias Private Key: 7
21,651,247 UART: [art] Extend RT PCRs Done
21,652,450 UART: [art] Lock RT PCRs Done
21,654,287 UART: [art] Populate DV Done
21,659,695 UART: [fht] FMC Alias Private Key: 7
21,661,290 UART: [art] Derive CDI
21,662,125 UART: [art] Store in in slot 0x4
21,719,762 UART: [art] Derive Key Pair
21,720,800 UART: [art] Store priv key in slot 0x5
24,184,074 UART: [art] Derive Key Pair - Done
24,197,341 UART: [art] Signing Cert with AUTHO
24,198,678 UART: RITY.KEYID = 7
25,909,962 UART: [art] Erasing AUTHORITY.KEYID = 7
25,911,452 UART: [art] PUB.X = BBA1015C34780E4F6DE4541588E94A8F40AB05013D0171583603C8DED47F0896D4F42953FFB65A9E000768971AD19803
25,918,654 UART: [art] PUB.Y = 138A0BC3302E8CCE87B96BB9CB82E700993A43A0A2D0B066F5FD0329A62B328EED6058C12CEDBDC727A6DA3A203C6CDF
25,925,946 UART: [art] SIG.R = C5C924A8634E2068C1876971208105235F090C95DBD960BEF59B9F143B5DE6E96E9897FE7FD9FB8129C03B14FE2CD378
25,933,348 UART: [art] SIG.S = CBD08E989ED9A309439A99CE5DA9C2DA7EE2242C6520D6D7BBEFAA439F4C13C814CC4C2C7C40CF75860D96C79ED2873A
26,912,282 UART: Caliptra RT
26,912,989 UART: [state] CFI Enabled
27,079,352 UART: [rt] RT listening for mailbox commands...
27,081,642 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,237,615 UART: [rt]cmd =0x41544d4e, len=14344
28,421,842 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,360,096 ready_for_fw is high
3,360,502 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,030,313 >>> mbox cmd response: success
19,325,798 UART:
19,326,197 UART: Running Caliptra FMC ...
19,327,332 UART:
19,327,489 UART: [state] CFI Enabled
19,394,473 UART: [fht] FMC Alias Private Key: 7
21,159,509 UART: [art] Extend RT PCRs Done
21,160,725 UART: [art] Lock RT PCRs Done
21,162,183 UART: [art] Populate DV Done
21,167,298 UART: [fht] FMC Alias Private Key: 7
21,168,785 UART: [art] Derive CDI
21,169,755 UART: [art] Store in in slot 0x4
21,228,225 UART: [art] Derive Key Pair
21,229,250 UART: [art] Store priv key in slot 0x5
23,691,991 UART: [art] Derive Key Pair - Done
23,704,495 UART: [art] Signing Cert with AUTHO
23,705,795 UART: RITY.KEYID = 7
25,417,796 UART: [art] Erasing AUTHORITY.KEYID = 7
25,419,299 UART: [art] PUB.X = 9A3C63FF39A159395DE2087DCBF0CBCA101A1921385E438BC6A57E9D4AB53441FD7F3B51240FA146E0D64EA511E4632C
25,426,544 UART: [art] PUB.Y = F9DB6A1AF24D4BE8C3BA9DEF882755F26203B0F389409647DEC09D795B461EBE5348587357F7905C0D4A22951B88F98C
25,433,794 UART: [art] SIG.R = 51B19FF22515C2C9AA3C21E13B9458FE30ED29760650117D0DBC204BECD81ED89694D7190100CBCDB7E900ADD17AFD46
25,441,182 UART: [art] SIG.S = F5641072A20784764998CA3B9B1EE54B586362DACA995C1D35F9BA6CDA509B96EAE065E0B8BAF5A9C2A6DCFE223127C7
26,420,081 UART: Caliptra RT
26,420,794 UART: [state] CFI Enabled
26,586,622 UART: [rt] RT listening for mailbox commands...
26,588,943 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,744,737 UART: [rt]cmd =0x41544d4e, len=14344
27,928,486 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,477 UART:
192,848 UART: Running Caliptra ROM ...
194,041 UART:
603,709 UART: [state] CFI Enabled
614,395 UART: [state] LifecycleState = Unprovisioned
616,188 UART: [state] DebugLocked = No
617,567 UART: [state] WD Timer not started. Device not locked for debugging
621,310 UART: [kat] SHA2-256
800,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,976 UART: [kat] ++
812,493 UART: [kat] sha1
824,801 UART: [kat] SHA2-256
827,846 UART: [kat] SHA2-384
833,055 UART: [kat] SHA2-512-ACC
836,008 UART: [kat] ECC-384
3,278,597 UART: [kat] HMAC-384Kdf
3,290,478 UART: [kat] LMS
3,819,959 UART: [kat] --
3,825,319 UART: [cold-reset] ++
3,826,392 UART: [fht] FHT @ 0x50003400
3,837,000 UART: [idev] ++
3,837,564 UART: [idev] CDI.KEYID = 6
3,838,436 UART: [idev] SUBJECT.KEYID = 7
3,839,668 UART: [idev] UDS.KEYID = 0
3,840,558 ready_for_fw is high
3,840,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,458 UART: [idev] Erasing UDS.KEYID = 0
6,316,375 UART: [idev] Sha1 KeyId Algorithm
6,339,829 UART: [idev] --
6,342,948 UART: [ldev] ++
6,343,534 UART: [ldev] CDI.KEYID = 6
6,344,608 UART: [ldev] SUBJECT.KEYID = 5
6,345,725 UART: [ldev] AUTHORITY.KEYID = 7
6,346,896 UART: [ldev] FE.KEYID = 1
6,358,883 UART: [ldev] Erasing FE.KEYID = 1
8,833,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,654 UART: [ldev] --
10,623,585 UART: [fwproc] Wait for Commands...
10,625,778 UART: [fwproc] Recv command 0x46574c44
10,627,859 UART: [fwproc] Recv'd Img size: 114448 bytes
15,205,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,289,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,357,867 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,676,634 >>> mbox cmd response: success
15,681,678 UART: [afmc] ++
15,682,269 UART: [afmc] CDI.KEYID = 6
15,683,148 UART: [afmc] SUBJECT.KEYID = 7
15,684,357 UART: [afmc] AUTHORITY.KEYID = 5
18,184,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,901,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,903,519 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,919,468 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,935,421 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,951,236 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,973,612 UART: [afmc] --
19,976,716 UART: [cold-reset] --
19,979,813 UART: [state] Locking Datavault
19,984,186 UART: [state] Locking PCR0, PCR1 and PCR31
19,985,854 UART: [state] Locking ICCM
19,988,161 UART: [exit] Launching FMC @ 0x40000130
19,996,610 UART:
19,996,839 UART: Running Caliptra FMC ...
19,997,930 UART:
19,998,079 UART: [state] CFI Enabled
20,006,174 UART: [fht] FMC Alias Private Key: 7
21,762,928 UART: [art] Extend RT PCRs Done
21,764,146 UART: [art] Lock RT PCRs Done
21,765,769 UART: [art] Populate DV Done
21,771,170 UART: [fht] FMC Alias Private Key: 7
21,772,862 UART: [art] Derive CDI
21,773,662 UART: [art] Store in in slot 0x4
21,816,842 UART: [art] Derive Key Pair
21,817,876 UART: [art] Store priv key in slot 0x5
24,244,780 UART: [art] Derive Key Pair - Done
24,257,360 UART: [art] Signing Cert with AUTHO
24,258,655 UART: RITY.KEYID = 7
25,963,934 UART: [art] Erasing AUTHORITY.KEYID = 7
25,965,437 UART: [art] PUB.X = 37404D49D8A8DCE901F2DA403791EC305FB8C718D343C8476C3A5E67D89FA41BDAE09A5FE9A8F09E6EFBA502E8F57AED
25,972,700 UART: [art] PUB.Y = E3AA25C64FC6EEF4E29EADA2D40D9A170AEF5790A41A0870BF88A896205A3FD0D955AAEB55E7B7DB751DF7634C9E2A1C
25,980,020 UART: [art] SIG.R = D1A41812BCF828DDDE0329898C7181A3C5FC7A91382CA9B1E96A9D2D2B38B820C80BF839A8F01A0CFD2734D681A87D4C
25,987,407 UART: [art] SIG.S = 1A9DD4E0D6C29064540C542D4CF79C41F3A12BC5660C622A3CC1DD184695BEAB8A485F40062A7160A30AC10DC83B3619
26,966,381 UART: Caliptra RT
26,967,088 UART: [state] CFI Enabled
27,084,491 UART: [rt] RT listening for mailbox commands...
27,086,786 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,242,219 UART: [rt]cmd =0x41544d4e, len=14344
28,429,619 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
3,693,196 ready_for_fw is high
3,693,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,254,296 >>> mbox cmd response: success
19,504,463 UART:
19,504,852 UART: Running Caliptra FMC ...
19,505,944 UART:
19,506,088 UART: [state] CFI Enabled
19,514,062 UART: [fht] FMC Alias Private Key: 7
21,271,047 UART: [art] Extend RT PCRs Done
21,272,269 UART: [art] Lock RT PCRs Done
21,273,973 UART: [art] Populate DV Done
21,279,354 UART: [fht] FMC Alias Private Key: 7
21,281,049 UART: [art] Derive CDI
21,281,860 UART: [art] Store in in slot 0x4
21,324,455 UART: [art] Derive Key Pair
21,325,468 UART: [art] Store priv key in slot 0x5
23,752,408 UART: [art] Derive Key Pair - Done
23,765,400 UART: [art] Signing Cert with AUTHO
23,766,703 UART: RITY.KEYID = 7
25,471,895 UART: [art] Erasing AUTHORITY.KEYID = 7
25,473,396 UART: [art] PUB.X = 79FC442083D640AA8C911946CFFD1C9A32931E501A51546D05AEA8A91AAA3593BC6AB5EC8CDD26BADC494623B99A136D
25,480,682 UART: [art] PUB.Y = 93A071726052439EBF680D313E753B38418A3AD778374ADAB6AEE16E332A833DA246AB1EB71CE337B45219A688185EC3
25,487,958 UART: [art] SIG.R = 2E72F2198A3BA643CA752200769ADDA0599C317B8A3067FD4D995C33D9F4237E08B89B92A536BF372CA229B325350B3A
25,495,301 UART: [art] SIG.S = 5AC58FF76B74B99230AB869ED94E723982C3726635211BDFEFA05BA97AE33866A7232110D6D666BD2E2415CD9A2CD855
26,474,465 UART: Caliptra RT
26,475,177 UART: [state] CFI Enabled
26,592,781 UART: [rt] RT listening for mailbox commands...
26,595,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,750,559 UART: [rt]cmd =0x41544d4e, len=14344
27,940,057 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,442,446 ready_for_fw is high
3,442,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,860,631 >>> mbox cmd response: success
20,174,508 UART:
20,174,932 UART: Running Caliptra FMC ...
20,176,054 UART:
20,176,231 UART: [state] CFI Enabled
20,245,271 UART: [fht] FMC Alias Private Key: 7
22,008,292 UART: [art] Extend RT PCRs Done
22,009,547 UART: [art] Lock RT PCRs Done
22,011,185 UART: [art] Populate DV Done
22,016,978 UART: [fht] FMC Alias Private Key: 7
22,018,520 UART: [art] Derive CDI
22,019,262 UART: [art] Store in in slot 0x4
22,077,746 UART: [art] Derive Key Pair
22,078,784 UART: [art] Store priv key in slot 0x5
24,541,789 UART: [art] Derive Key Pair - Done
24,554,675 UART: [art] Signing Cert with AUTHO
24,555,982 UART: RITY.KEYID = 7
26,268,141 UART: [art] Erasing AUTHORITY.KEYID = 7
26,269,633 UART: [art] PUB.X = 7EAB06FD630366709F977FE97D327EAC9A7E672AB2ACB72C24DA4B3E97AB541271B93E3510F6FA7D933D9A5A97B4D97E
26,276,882 UART: [art] PUB.Y = 8CB1BAA9E3545683E38605514D9F0BEAD818A3BCEEBFEBF8B9F4A7580E188A161887B4682D7B0C6DAC2ADF8D0A8726CC
26,284,162 UART: [art] SIG.R = 43A242DC5A5E7E925323DA6F48064A6093B6D38833900ABDEFC3B810DCF02C9BD1D4A10A9361830FACF76112DA59F9B2
26,291,624 UART: [art] SIG.S = 2E6F01B21DE4A93CC61E70D4DBC6F80532ACAFF21CFA2649DFF9DEF203F623E2A7807F63333921F345330FE17506135F
27,270,160 UART: Caliptra RT
27,270,871 UART: [state] CFI Enabled
27,435,563 UART: [rt] RT listening for mailbox commands...
27,437,851 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,593,710 UART: [rt]cmd =0x41544d4e, len=14344
28,779,143 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,748,944 ready_for_fw is high
3,749,526 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,033,258 >>> mbox cmd response: success
20,283,405 UART:
20,283,791 UART: Running Caliptra FMC ...
20,284,892 UART:
20,285,034 UART: [state] CFI Enabled
20,292,890 UART: [fht] FMC Alias Private Key: 7
22,048,692 UART: [art] Extend RT PCRs Done
22,049,915 UART: [art] Lock RT PCRs Done
22,051,687 UART: [art] Populate DV Done
22,057,150 UART: [fht] FMC Alias Private Key: 7
22,058,742 UART: [art] Derive CDI
22,059,473 UART: [art] Store in in slot 0x4
22,102,406 UART: [art] Derive Key Pair
22,103,403 UART: [art] Store priv key in slot 0x5
24,530,085 UART: [art] Derive Key Pair - Done
24,543,080 UART: [art] Signing Cert with AUTHO
24,544,382 UART: RITY.KEYID = 7
26,250,355 UART: [art] Erasing AUTHORITY.KEYID = 7
26,251,860 UART: [art] PUB.X = BA85134442E494E0951DE004F73ED0D8560BE1A2034C7C2801F2618739CEA32C9E7F0AB309FB0E651B070D9D01F28D7C
26,259,137 UART: [art] PUB.Y = 14DB1AF6E24465E64363F6B6737FDA74E21E65011C54D6CF532BEE7E366CDBE6DE938BD85E73C305B74DD18029ECEC2B
26,266,425 UART: [art] SIG.R = EAEA8DE594B89BF62317B337A41E77D091E39BBAC3F8F1FFF1F31C17065E30A34F5818546271F0D4C56D98A04DC55180
26,273,787 UART: [art] SIG.S = BBA3910E1669D82EBC9BD019C9E4C18B46EF2C06AC8F7C9C2B2C53A265325826DEC47DD9FAA260A4222BB1F23A6FC017
27,252,852 UART: Caliptra RT
27,253,538 UART: [state] CFI Enabled
27,369,890 UART: [rt] RT listening for mailbox commands...
27,372,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,527,480 UART: [rt]cmd =0x41544d4e, len=14344
28,714,537 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,333 UART: [kat] SHA2-256
882,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,379 UART: [kat] ++
886,531 UART: [kat] sha1
890,675 UART: [kat] SHA2-256
892,613 UART: [kat] SHA2-384
895,368 UART: [kat] SHA2-512-ACC
897,269 UART: [kat] ECC-384
902,862 UART: [kat] HMAC-384Kdf
907,574 UART: [kat] LMS
1,475,770 UART: [kat] --
1,476,539 UART: [cold-reset] ++
1,477,071 UART: [fht] Storing FHT @ 0x50003400
1,480,026 UART: [idev] ++
1,480,194 UART: [idev] CDI.KEYID = 6
1,480,554 UART: [idev] SUBJECT.KEYID = 7
1,480,978 UART: [idev] UDS.KEYID = 0
1,481,323 ready_for_fw is high
1,481,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,860 UART: [idev] Erasing UDS.KEYID = 0
1,505,572 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,180 UART: [idev] --
1,515,161 UART: [ldev] ++
1,515,329 UART: [ldev] CDI.KEYID = 6
1,515,692 UART: [ldev] SUBJECT.KEYID = 5
1,516,118 UART: [ldev] AUTHORITY.KEYID = 7
1,516,581 UART: [ldev] FE.KEYID = 1
1,521,569 UART: [ldev] Erasing FE.KEYID = 1
1,546,666 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,680 UART: [ldev] --
1,586,109 UART: [fwproc] Waiting for Commands...
1,586,860 UART: [fwproc] Received command 0x46574c44
1,587,651 UART: [fwproc] Received Image of size 114448 bytes
5,348,877 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,376,641 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,405,993 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,542,064 >>> mbox cmd response: success
5,543,100 UART: [afmc] ++
5,543,268 UART: [afmc] CDI.KEYID = 6
5,543,630 UART: [afmc] SUBJECT.KEYID = 7
5,544,055 UART: [afmc] AUTHORITY.KEYID = 5
5,578,631 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,594,921 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,595,701 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,601,410 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,607,302 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,613,003 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,620,895 UART: [afmc] --
5,621,853 UART: [cold-reset] --
5,622,563 UART: [state] Locking Datavault
5,624,146 UART: [state] Locking PCR0, PCR1 and PCR31
5,624,750 UART: [state] Locking ICCM
5,625,362 UART: [exit] Launching FMC @ 0x40000130
5,630,691 UART:
5,630,707 UART: Running Caliptra FMC ...
5,631,115 UART:
5,631,169 UART: [state] CFI Enabled
5,641,715 UART: [fht] FMC Alias Private Key: 7
5,750,307 UART: [art] Extend RT PCRs Done
5,750,735 UART: [art] Lock RT PCRs Done
5,752,355 UART: [art] Populate DV Done
5,760,415 UART: [fht] FMC Alias Private Key: 7
5,761,573 UART: [art] Derive CDI
5,761,853 UART: [art] Store in in slot 0x4
5,847,538 UART: [art] Derive Key Pair
5,847,898 UART: [art] Store priv key in slot 0x5
5,861,016 UART: [art] Derive Key Pair - Done
5,875,833 UART: [art] Signing Cert with AUTHO
5,876,313 UART: RITY.KEYID = 7
5,891,309 UART: [art] Erasing AUTHORITY.KEYID = 7
5,892,074 UART: [art] PUB.X = DB963E998FCF29E9A14AC41EAC44ADF66176955FB258467BB6BD431081EEC8241990F3877E7B0CD68996B924FDD69AF0
5,898,851 UART: [art] PUB.Y = 8221E17C93501371570417FA9ADCF21A45861F8F5B5D4075D70195D51F04A65E580434D74A11C155DA3F8FC8E1700889
5,905,778 UART: [art] SIG.R = 46F46651829F61B25F401A3BDC57A4A5B4BF5994D231F472C1BD3CCE2BA0415E49C055DA206A9633E04941BF36B08FBA
5,912,556 UART: [art] SIG.S = 8A2D2D044C9243EDD293BB11381E83770A52AB6CC682BC47D8D2DB964F7B4CFADD769C941FA1E61914711A62948F2EAE
5,936,041 UART: Caliptra RT
5,936,294 UART: [state] CFI Enabled
6,044,609 UART: [rt] RT listening for mailbox commands...
6,045,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,168,187 UART: [rt]cmd =0x41544d4e, len=14344
6,456,619 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,705 ready_for_fw is high
1,362,705 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,128,083 >>> mbox cmd response: success
5,190,606 UART:
5,190,622 UART: Running Caliptra FMC ...
5,191,030 UART:
5,191,084 UART: [state] CFI Enabled
5,201,334 UART: [fht] FMC Alias Private Key: 7
5,309,708 UART: [art] Extend RT PCRs Done
5,310,136 UART: [art] Lock RT PCRs Done
5,311,680 UART: [art] Populate DV Done
5,319,966 UART: [fht] FMC Alias Private Key: 7
5,320,954 UART: [art] Derive CDI
5,321,234 UART: [art] Store in in slot 0x4
5,407,159 UART: [art] Derive Key Pair
5,407,519 UART: [art] Store priv key in slot 0x5
5,421,137 UART: [art] Derive Key Pair - Done
5,435,830 UART: [art] Signing Cert with AUTHO
5,436,310 UART: RITY.KEYID = 7
5,451,540 UART: [art] Erasing AUTHORITY.KEYID = 7
5,452,305 UART: [art] PUB.X = E2576872B3ED6415CF64766CE24C3B9F68967AAC12EDB65E2C9F30C20933A38D74C78716A9EBEDB728B6E422FB61BCC0
5,459,084 UART: [art] PUB.Y = F73306D67C338CAE7931B9370EFD5E0895EB1EB5167C99F3B86DEE9E4B4473478063AE3F7EF46C59B4354F91078AEF3D
5,466,030 UART: [art] SIG.R = 5D5D5E21EE9F23987939A4184D33184AB4FE209FA973EFB422B066522A2545A29C0BF18681823E72A969594B527107A8
5,472,786 UART: [art] SIG.S = 25AC7CF16AD2EB8C3E5D7EB4A26ACC99D76E16FB535C4890FC3712A3B204B503781EF7E871A72A320EA84CF66375447F
5,496,702 UART: Caliptra RT
5,496,955 UART: [state] CFI Enabled
5,605,261 UART: [rt] RT listening for mailbox commands...
5,605,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,729,153 UART: [rt]cmd =0x41544d4e, len=14344
6,012,969 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,988 UART: [kat] SHA2-256
881,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,034 UART: [kat] ++
886,186 UART: [kat] sha1
890,248 UART: [kat] SHA2-256
892,186 UART: [kat] SHA2-384
895,075 UART: [kat] SHA2-512-ACC
896,976 UART: [kat] ECC-384
902,121 UART: [kat] HMAC-384Kdf
906,791 UART: [kat] LMS
1,474,987 UART: [kat] --
1,475,846 UART: [cold-reset] ++
1,476,282 UART: [fht] Storing FHT @ 0x50003400
1,478,837 UART: [idev] ++
1,479,005 UART: [idev] CDI.KEYID = 6
1,479,365 UART: [idev] SUBJECT.KEYID = 7
1,479,789 UART: [idev] UDS.KEYID = 0
1,480,134 ready_for_fw is high
1,480,134 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,021 UART: [idev] Erasing UDS.KEYID = 0
1,504,559 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,227 UART: [idev] --
1,514,366 UART: [ldev] ++
1,514,534 UART: [ldev] CDI.KEYID = 6
1,514,897 UART: [ldev] SUBJECT.KEYID = 5
1,515,323 UART: [ldev] AUTHORITY.KEYID = 7
1,515,786 UART: [ldev] FE.KEYID = 1
1,520,786 UART: [ldev] Erasing FE.KEYID = 1
1,546,401 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,347 UART: [ldev] --
1,585,752 UART: [fwproc] Waiting for Commands...
1,586,563 UART: [fwproc] Received command 0x46574c44
1,587,354 UART: [fwproc] Received Image of size 114448 bytes
5,274,400 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,302,548 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,331,900 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,467,855 >>> mbox cmd response: success
5,469,109 UART: [afmc] ++
5,469,277 UART: [afmc] CDI.KEYID = 6
5,469,639 UART: [afmc] SUBJECT.KEYID = 7
5,470,064 UART: [afmc] AUTHORITY.KEYID = 5
5,504,996 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,521,402 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,522,182 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,527,891 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,533,783 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,539,484 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,547,326 UART: [afmc] --
5,548,268 UART: [cold-reset] --
5,549,160 UART: [state] Locking Datavault
5,550,115 UART: [state] Locking PCR0, PCR1 and PCR31
5,550,719 UART: [state] Locking ICCM
5,551,367 UART: [exit] Launching FMC @ 0x40000130
5,556,696 UART:
5,556,712 UART: Running Caliptra FMC ...
5,557,120 UART:
5,557,263 UART: [state] CFI Enabled
5,568,067 UART: [fht] FMC Alias Private Key: 7
5,676,175 UART: [art] Extend RT PCRs Done
5,676,603 UART: [art] Lock RT PCRs Done
5,677,955 UART: [art] Populate DV Done
5,686,067 UART: [fht] FMC Alias Private Key: 7
5,687,099 UART: [art] Derive CDI
5,687,379 UART: [art] Store in in slot 0x4
5,773,362 UART: [art] Derive Key Pair
5,773,722 UART: [art] Store priv key in slot 0x5
5,787,256 UART: [art] Derive Key Pair - Done
5,802,203 UART: [art] Signing Cert with AUTHO
5,802,683 UART: RITY.KEYID = 7
5,817,735 UART: [art] Erasing AUTHORITY.KEYID = 7
5,818,500 UART: [art] PUB.X = 6E1F932453E16D8134275C7BDC545D8B690C88AC9979A8CBB07BF825C182DC6A5CC07FDDE4C6E147246A5A6455E636CC
5,825,277 UART: [art] PUB.Y = 7B3370EA13F5081E74374A80C3C366B90E4E4C6F8CCBCD23A3744D1C950C255BA87232ECC5490E0357E6ABB1DCC7D055
5,832,222 UART: [art] SIG.R = B59560BA9AACFB2A15988FBC82EBDA24ECE08E9C427260B6EFDD7A6FE6EA5B815A841A485A41F3076286E179BD41E35C
5,839,009 UART: [art] SIG.S = C3455D4311F0AF6D5B5030BB4F4AB7E0A910D7D9819141DA8FEC61CDD09331B2292D34FFAE0109D99CE73D86EFA285FC
5,862,716 UART: Caliptra RT
5,863,061 UART: [state] CFI Enabled
5,971,365 UART: [rt] RT listening for mailbox commands...
5,972,035 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,095,269 UART: [rt]cmd =0x41544d4e, len=14344
6,381,514 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,038 ready_for_fw is high
1,363,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,240,771 >>> mbox cmd response: success
5,302,280 UART:
5,302,296 UART: Running Caliptra FMC ...
5,302,704 UART:
5,302,847 UART: [state] CFI Enabled
5,313,257 UART: [fht] FMC Alias Private Key: 7
5,421,373 UART: [art] Extend RT PCRs Done
5,421,801 UART: [art] Lock RT PCRs Done
5,423,173 UART: [art] Populate DV Done
5,431,267 UART: [fht] FMC Alias Private Key: 7
5,432,219 UART: [art] Derive CDI
5,432,499 UART: [art] Store in in slot 0x4
5,517,876 UART: [art] Derive Key Pair
5,518,236 UART: [art] Store priv key in slot 0x5
5,531,140 UART: [art] Derive Key Pair - Done
5,545,937 UART: [art] Signing Cert with AUTHO
5,546,417 UART: RITY.KEYID = 7
5,561,135 UART: [art] Erasing AUTHORITY.KEYID = 7
5,561,900 UART: [art] PUB.X = 49D0F588F5AA17F88CECAD19FAFE9946DC178707CD1DC0CEF9E7C5ABE34FF293CD636191FB07A82DFCD205060329C75A
5,568,677 UART: [art] PUB.Y = FF34AB4EF7577BCB6323F8DACB20D760F8CE11167929F7F4374BBB5CECD70D7F79577BECC270C166A51B19E2A7BE4F55
5,575,644 UART: [art] SIG.R = 54C8FD2B25E11A954FBACF12EFD50C732C8F6AA3C2838EB21A7130C4047949D431FE0639907E17225D09168D720140DA
5,582,401 UART: [art] SIG.S = A58A02A98FFC112793C75F70F954C1B1B53F685B6E2265B05C7944D861DB3F838C598EEA75AF41E0226A5CCA8DDCD37D
5,606,107 UART: Caliptra RT
5,606,452 UART: [state] CFI Enabled
5,714,813 UART: [rt] RT listening for mailbox commands...
5,715,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,838,613 UART: [rt]cmd =0x41544d4e, len=14344
6,127,043 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,584 UART: [state] LifecycleState = Unprovisioned
86,239 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
88,104 UART: [kat] SHA2-256
893,754 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,879 UART: [kat] ++
898,031 UART: [kat] sha1
902,265 UART: [kat] SHA2-256
904,205 UART: [kat] SHA2-384
906,832 UART: [kat] SHA2-512-ACC
908,733 UART: [kat] ECC-384
918,240 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,172,055 UART: [cold-reset] ++
1,172,607 UART: [fht] FHT @ 0x50003400
1,175,320 UART: [idev] ++
1,175,488 UART: [idev] CDI.KEYID = 6
1,175,848 UART: [idev] SUBJECT.KEYID = 7
1,176,272 UART: [idev] UDS.KEYID = 0
1,176,617 ready_for_fw is high
1,176,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,192 UART: [idev] Erasing UDS.KEYID = 0
1,200,863 UART: [idev] Sha1 KeyId Algorithm
1,209,427 UART: [idev] --
1,210,509 UART: [ldev] ++
1,210,677 UART: [ldev] CDI.KEYID = 6
1,211,040 UART: [ldev] SUBJECT.KEYID = 5
1,211,466 UART: [ldev] AUTHORITY.KEYID = 7
1,211,929 UART: [ldev] FE.KEYID = 1
1,217,145 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,691 UART: [ldev] --
1,283,058 UART: [fwproc] Wait for Commands...
1,283,654 UART: [fwproc] Recv command 0x46574c44
1,284,382 UART: [fwproc] Recv'd Img size: 114448 bytes
3,125,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,544 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,317,791 >>> mbox cmd response: success
3,318,959 UART: [afmc] ++
3,319,127 UART: [afmc] CDI.KEYID = 6
3,319,489 UART: [afmc] SUBJECT.KEYID = 7
3,319,914 UART: [afmc] AUTHORITY.KEYID = 5
3,355,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,561 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,270 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,162 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,873 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,658 UART: [afmc] --
3,398,652 UART: [cold-reset] --
3,399,828 UART: [state] Locking Datavault
3,400,939 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,543 UART: [state] Locking ICCM
3,402,093 UART: [exit] Launching FMC @ 0x40000130
3,407,422 UART:
3,407,438 UART: Running Caliptra FMC ...
3,407,846 UART:
3,407,900 UART: [state] CFI Enabled
3,418,234 UART: [fht] FMC Alias Private Key: 7
3,526,346 UART: [art] Extend RT PCRs Done
3,526,774 UART: [art] Lock RT PCRs Done
3,528,234 UART: [art] Populate DV Done
3,536,318 UART: [fht] FMC Alias Private Key: 7
3,537,498 UART: [art] Derive CDI
3,537,778 UART: [art] Store in in slot 0x4
3,623,225 UART: [art] Derive Key Pair
3,623,585 UART: [art] Store priv key in slot 0x5
3,636,639 UART: [art] Derive Key Pair - Done
3,651,681 UART: [art] Signing Cert with AUTHO
3,652,161 UART: RITY.KEYID = 7
3,667,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,994 UART: [art] PUB.X = EC2F1C626FF7ACBF418E34114C1B8FCE012AC8B7F227A88D63813FA240AFB27E0CDB50580E0E7FCF697DAB6BC3172137
3,674,772 UART: [art] PUB.Y = 2DDD4887FC9D40E3E54C80D0F6F8D384DD15108D55AC2767A9D6BE4FE3C2098544B6AC285F141D28C864F7CAD90AD563
3,681,728 UART: [art] SIG.R = EFDFD241E64AE0BA162A9311CF5EEB96D0E36C7E43F3D8994E7647D32779344178B7BEEBFD100B28A989D19C0CA3BECD
3,688,512 UART: [art] SIG.S = 3AFB93B2F3C1DA67ADA28B2E863CC71C99F221565C1DBCD43FD23FE2D880E4C98375C05555B3C1B4DC96228B623FC9B2
3,712,345 UART: Caliptra RT
3,712,598 UART: [state] CFI Enabled
3,820,792 UART: [rt] RT listening for mailbox commands...
3,821,462 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,886 UART: [rt]cmd =0x41544d4e, len=14344
4,230,691 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,171 ready_for_fw is high
1,060,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,181,567 >>> mbox cmd response: success
3,243,940 UART:
3,243,956 UART: Running Caliptra FMC ...
3,244,364 UART:
3,244,418 UART: [state] CFI Enabled
3,255,320 UART: [fht] FMC Alias Private Key: 7
3,363,296 UART: [art] Extend RT PCRs Done
3,363,724 UART: [art] Lock RT PCRs Done
3,365,212 UART: [art] Populate DV Done
3,373,556 UART: [fht] FMC Alias Private Key: 7
3,374,488 UART: [art] Derive CDI
3,374,768 UART: [art] Store in in slot 0x4
3,460,517 UART: [art] Derive Key Pair
3,460,877 UART: [art] Store priv key in slot 0x5
3,473,995 UART: [art] Derive Key Pair - Done
3,488,930 UART: [art] Signing Cert with AUTHO
3,489,410 UART: RITY.KEYID = 7
3,504,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,427 UART: [art] PUB.X = BED28301EE895CCC7CFC70D9A39429E616747AD9A0B7B6C6D4B4AC5823E775FBFDE727098F3FCC86FF10A66BBB4694A2
3,512,211 UART: [art] PUB.Y = 82BED4EF70BB05312F25FF3990254459BE553002C3CA5F40136AC91EA2DA12F5D41E7C8B311BA58C92CC0B2D9F5F7524
3,519,162 UART: [art] SIG.R = C04AEB36EF1D418815D566779F6661A5AE3BF6C713C187F2C7D0945BF2F7BA0046715B4AEB2CB18AF8AED50E4777C7D1
3,525,921 UART: [art] SIG.S = A31FDD65E6805F9BCEFAEDEF0B88F4AA477C7007FE1202F605877B566B614A7BA9ACCBCE70CEF031E0299AD451768A86
3,550,016 UART: Caliptra RT
3,550,269 UART: [state] CFI Enabled
3,657,560 UART: [rt] RT listening for mailbox commands...
3,658,230 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,964 UART: [rt]cmd =0x41544d4e, len=14344
4,066,951 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,921 UART: [state] LifecycleState = Unprovisioned
85,576 UART: [state] DebugLocked = No
86,094 UART: [state] WD Timer not started. Device not locked for debugging
87,335 UART: [kat] SHA2-256
892,985 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,110 UART: [kat] ++
897,262 UART: [kat] sha1
901,436 UART: [kat] SHA2-256
903,376 UART: [kat] SHA2-384
906,185 UART: [kat] SHA2-512-ACC
908,086 UART: [kat] ECC-384
917,501 UART: [kat] HMAC-384Kdf
922,047 UART: [kat] LMS
1,170,375 UART: [kat] --
1,171,118 UART: [cold-reset] ++
1,171,564 UART: [fht] FHT @ 0x50003400
1,174,063 UART: [idev] ++
1,174,231 UART: [idev] CDI.KEYID = 6
1,174,591 UART: [idev] SUBJECT.KEYID = 7
1,175,015 UART: [idev] UDS.KEYID = 0
1,175,360 ready_for_fw is high
1,175,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,935 UART: [idev] Erasing UDS.KEYID = 0
1,200,662 UART: [idev] Sha1 KeyId Algorithm
1,209,090 UART: [idev] --
1,209,916 UART: [ldev] ++
1,210,084 UART: [ldev] CDI.KEYID = 6
1,210,447 UART: [ldev] SUBJECT.KEYID = 5
1,210,873 UART: [ldev] AUTHORITY.KEYID = 7
1,211,336 UART: [ldev] FE.KEYID = 1
1,216,572 UART: [ldev] Erasing FE.KEYID = 1
1,242,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,082 UART: [ldev] --
1,282,539 UART: [fwproc] Wait for Commands...
1,283,239 UART: [fwproc] Recv command 0x46574c44
1,283,967 UART: [fwproc] Recv'd Img size: 114448 bytes
3,134,814 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,192,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,328,106 >>> mbox cmd response: success
3,329,354 UART: [afmc] ++
3,329,522 UART: [afmc] CDI.KEYID = 6
3,329,884 UART: [afmc] SUBJECT.KEYID = 7
3,330,309 UART: [afmc] AUTHORITY.KEYID = 5
3,365,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,954 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,702 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,411 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,394,303 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,400,014 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,815 UART: [afmc] --
3,408,753 UART: [cold-reset] --
3,409,607 UART: [state] Locking Datavault
3,410,708 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,312 UART: [state] Locking ICCM
3,411,886 UART: [exit] Launching FMC @ 0x40000130
3,417,215 UART:
3,417,231 UART: Running Caliptra FMC ...
3,417,639 UART:
3,417,782 UART: [state] CFI Enabled
3,428,452 UART: [fht] FMC Alias Private Key: 7
3,536,528 UART: [art] Extend RT PCRs Done
3,536,956 UART: [art] Lock RT PCRs Done
3,538,336 UART: [art] Populate DV Done
3,546,538 UART: [fht] FMC Alias Private Key: 7
3,547,528 UART: [art] Derive CDI
3,547,808 UART: [art] Store in in slot 0x4
3,633,303 UART: [art] Derive Key Pair
3,633,663 UART: [art] Store priv key in slot 0x5
3,647,439 UART: [art] Derive Key Pair - Done
3,662,040 UART: [art] Signing Cert with AUTHO
3,662,520 UART: RITY.KEYID = 7
3,677,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,678,453 UART: [art] PUB.X = F0DE09B4D6793909EDD9F0A54CA1AC672C8065AE82EE400842664AB54B8EFE96019A29187EA8CD390197EB4B21D34B9E
3,685,218 UART: [art] PUB.Y = BEE6787FEACD390FD96FD206D7E99A87520E95E44291A4C39840132373C87797E84772840AAF6D88DECDF8144E47DCFD
3,692,164 UART: [art] SIG.R = 6B79FB8F7C48AE1C29E0991368C20AC6FC3D1AE72884C4C4923EAD943750428630D01226D00292904B724FBD149614D1
3,698,924 UART: [art] SIG.S = E16BE1648B5E2F7CF979BA3A176D6B7520DF532F954C1A87529BB9CF684C1C80B48FD9FD7BF36D1295A62C2C4391E92D
3,722,813 UART: Caliptra RT
3,723,158 UART: [state] CFI Enabled
3,830,896 UART: [rt] RT listening for mailbox commands...
3,831,566 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,522 UART: [rt]cmd =0x41544d4e, len=14344
4,245,287 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,946 ready_for_fw is high
1,060,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,523 >>> mbox cmd response: success
3,232,464 UART:
3,232,480 UART: Running Caliptra FMC ...
3,232,888 UART:
3,233,031 UART: [state] CFI Enabled
3,243,567 UART: [fht] FMC Alias Private Key: 7
3,351,409 UART: [art] Extend RT PCRs Done
3,351,837 UART: [art] Lock RT PCRs Done
3,353,355 UART: [art] Populate DV Done
3,361,407 UART: [fht] FMC Alias Private Key: 7
3,362,503 UART: [art] Derive CDI
3,362,783 UART: [art] Store in in slot 0x4
3,448,570 UART: [art] Derive Key Pair
3,448,930 UART: [art] Store priv key in slot 0x5
3,462,324 UART: [art] Derive Key Pair - Done
3,477,070 UART: [art] Signing Cert with AUTHO
3,477,550 UART: RITY.KEYID = 7
3,492,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,475 UART: [art] PUB.X = 6F701356EB359A76276BBECCB37CDCE772E1D7CA5C22689CC62D60ABAA5B9C351551817ABBC7FAAB2A8C48B178D33C30
3,500,265 UART: [art] PUB.Y = 71FDCA58D5103C38FC17CA316AEF81D9D3F815C914A1D8F836C1A8FA952A18DE0B7CEB38A25AA6F346E83A343DCECA9D
3,507,236 UART: [art] SIG.R = DBD189425E6E11BCC0E223117B3D01E9953F53966D1011F6D218BC50BFEA5E65F11F85D8660439D53A997325212077C9
3,513,996 UART: [art] SIG.S = 8A7781639202EE7AB0DBF5ADA2BA9F20E3E017FACF8EA6B73D33912808A50E97BC561B478E79B85E668EDC25DCE1E2DE
3,537,264 UART: Caliptra RT
3,537,609 UART: [state] CFI Enabled
3,645,036 UART: [rt] RT listening for mailbox commands...
3,645,706 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,710 UART: [rt]cmd =0x41544d4e, len=14344
4,051,978 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,427 UART: [kat] SHA2-256
901,367 UART: [kat] SHA2-384
904,130 UART: [kat] SHA2-512-ACC
906,031 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,458 UART: [kat] LMS
1,168,770 UART: [kat] --
1,169,531 UART: [cold-reset] ++
1,170,107 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,174,213 ready_for_fw is high
1,174,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,985 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,207,531 UART: [idev] --
1,208,710 UART: [ldev] ++
1,208,878 UART: [ldev] CDI.KEYID = 6
1,209,242 UART: [ldev] SUBJECT.KEYID = 5
1,209,669 UART: [ldev] AUTHORITY.KEYID = 7
1,210,132 UART: [ldev] FE.KEYID = 1
1,215,296 UART: [ldev] Erasing FE.KEYID = 1
1,241,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,408 UART: [ldev] --
1,280,704 UART: [fwproc] Wait for Commands...
1,281,507 UART: [fwproc] Recv command 0x46574c44
1,282,240 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,952 >>> mbox cmd response: success
3,323,179 UART: [afmc] ++
3,323,347 UART: [afmc] CDI.KEYID = 6
3,323,710 UART: [afmc] SUBJECT.KEYID = 7
3,324,136 UART: [afmc] AUTHORITY.KEYID = 5
3,359,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,221 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,931 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,821 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,532 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,348 UART: [afmc] --
3,402,352 UART: [cold-reset] --
3,403,294 UART: [state] Locking Datavault
3,404,303 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,907 UART: [state] Locking ICCM
3,405,463 UART: [exit] Launching FMC @ 0x40000130
3,410,792 UART:
3,410,808 UART: Running Caliptra FMC ...
3,411,216 UART:
3,411,270 UART: [state] CFI Enabled
3,422,060 UART: [fht] FMC Alias Private Key: 7
3,529,860 UART: [art] Extend RT PCRs Done
3,530,288 UART: [art] Lock RT PCRs Done
3,531,734 UART: [art] Populate DV Done
3,539,838 UART: [fht] FMC Alias Private Key: 7
3,540,976 UART: [art] Derive CDI
3,541,256 UART: [art] Store in in slot 0x4
3,626,845 UART: [art] Derive Key Pair
3,627,205 UART: [art] Store priv key in slot 0x5
3,640,371 UART: [art] Derive Key Pair - Done
3,655,288 UART: [art] Signing Cert with AUTHO
3,655,768 UART: RITY.KEYID = 7
3,670,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,463 UART: [art] PUB.X = 68FF904EFECB6FA2E524BBD956C885918A9CBB6FE4D55481C7FC63B87DE25212C3CE828066E39046EAECB2B35955D30B
3,678,246 UART: [art] PUB.Y = 7BBE748D740D6AD512931BB9AE3336671FC7F04790AE10C5907BA80261802A1F1F49CA991B320C86EF7EBFB60F14928C
3,685,190 UART: [art] SIG.R = FE941F3517456737B2E784846DFBC42B4E654DA757FDAE29DF4E0CA6FCAF4EC76603DFC559175866EC8E018E4916D701
3,691,958 UART: [art] SIG.S = AB4358131CA17B637312AB5B0F74CC22A4DCDA265CC937CDF5C30D58CEF20D7A4FFF658595189975AEEC7DCBDE6E816A
3,716,430 UART: Caliptra RT
3,716,683 UART: [state] CFI Enabled
3,824,386 UART: [rt] RT listening for mailbox commands...
3,825,056 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,202 UART: [rt]cmd =0x41544d4e, len=14344
4,239,309 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,672 ready_for_fw is high
1,055,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,171,950 >>> mbox cmd response: success
3,234,973 UART:
3,234,989 UART: Running Caliptra FMC ...
3,235,397 UART:
3,235,451 UART: [state] CFI Enabled
3,245,747 UART: [fht] FMC Alias Private Key: 7
3,354,047 UART: [art] Extend RT PCRs Done
3,354,475 UART: [art] Lock RT PCRs Done
3,356,345 UART: [art] Populate DV Done
3,364,403 UART: [fht] FMC Alias Private Key: 7
3,365,471 UART: [art] Derive CDI
3,365,751 UART: [art] Store in in slot 0x4
3,451,452 UART: [art] Derive Key Pair
3,451,812 UART: [art] Store priv key in slot 0x5
3,464,984 UART: [art] Derive Key Pair - Done
3,479,516 UART: [art] Signing Cert with AUTHO
3,479,996 UART: RITY.KEYID = 7
3,495,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,153 UART: [art] PUB.X = 48D70B918AFB85A2AFBD886832B554982DBA567A098B2180967935FE1B001A558C5A424F5446123D2AD2B3295AC4B3C7
3,502,895 UART: [art] PUB.Y = 6B59437E69F1F17018F65B205E38260EC46174C8D1996FAE8A0208C93F4850CAD6CA98B90D26F0AA38C4595F542C98DF
3,509,835 UART: [art] SIG.R = 104CEFB335E70AFD43784F27B0CC8D3B313AD4833002ADEA01F9D8E710552FA41141505D91DCF0B0C5D5CDC0C6901ADE
3,516,612 UART: [art] SIG.S = 25972FAE8C5827CBDA0BA722551460CA4A5CF9BEDC6C526CC753E532A1A91CA22F80F14FAB30F79F08FC9C259B9F6B33
3,540,413 UART: Caliptra RT
3,540,666 UART: [state] CFI Enabled
3,648,541 UART: [rt] RT listening for mailbox commands...
3,649,211 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,939 UART: [rt]cmd =0x41544d4e, len=14344
4,062,706 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,491 UART: [kat] SHA2-256
891,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,483 UART: [kat] LMS
1,168,795 UART: [kat] --
1,169,652 UART: [cold-reset] ++
1,170,166 UART: [fht] FHT @ 0x50003400
1,172,646 UART: [idev] ++
1,172,814 UART: [idev] CDI.KEYID = 6
1,173,175 UART: [idev] SUBJECT.KEYID = 7
1,173,600 UART: [idev] UDS.KEYID = 0
1,173,946 ready_for_fw is high
1,173,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,776 UART: [idev] Erasing UDS.KEYID = 0
1,199,116 UART: [idev] Sha1 KeyId Algorithm
1,207,956 UART: [idev] --
1,208,883 UART: [ldev] ++
1,209,051 UART: [ldev] CDI.KEYID = 6
1,209,415 UART: [ldev] SUBJECT.KEYID = 5
1,209,842 UART: [ldev] AUTHORITY.KEYID = 7
1,210,305 UART: [ldev] FE.KEYID = 1
1,215,451 UART: [ldev] Erasing FE.KEYID = 1
1,241,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,937 UART: [ldev] --
1,280,289 UART: [fwproc] Wait for Commands...
1,281,046 UART: [fwproc] Recv command 0x46574c44
1,281,779 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,664 >>> mbox cmd response: success
3,322,761 UART: [afmc] ++
3,322,929 UART: [afmc] CDI.KEYID = 6
3,323,292 UART: [afmc] SUBJECT.KEYID = 7
3,323,718 UART: [afmc] AUTHORITY.KEYID = 5
3,359,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,841 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,551 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,441 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,152 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,846 UART: [afmc] --
3,402,976 UART: [cold-reset] --
3,403,780 UART: [state] Locking Datavault
3,405,043 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,647 UART: [state] Locking ICCM
3,406,203 UART: [exit] Launching FMC @ 0x40000130
3,411,532 UART:
3,411,548 UART: Running Caliptra FMC ...
3,411,956 UART:
3,412,099 UART: [state] CFI Enabled
3,422,677 UART: [fht] FMC Alias Private Key: 7
3,530,431 UART: [art] Extend RT PCRs Done
3,530,859 UART: [art] Lock RT PCRs Done
3,532,395 UART: [art] Populate DV Done
3,540,571 UART: [fht] FMC Alias Private Key: 7
3,541,661 UART: [art] Derive CDI
3,541,941 UART: [art] Store in in slot 0x4
3,627,400 UART: [art] Derive Key Pair
3,627,760 UART: [art] Store priv key in slot 0x5
3,641,220 UART: [art] Derive Key Pair - Done
3,656,020 UART: [art] Signing Cert with AUTHO
3,656,500 UART: RITY.KEYID = 7
3,672,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,771 UART: [art] PUB.X = 799BE455F82DC055487D639B4C42B5974AB4D8210B1C441CC7EE117A376BC5B4838C3A74DA6E4AF154396AC2FED0F737
3,679,546 UART: [art] PUB.Y = 8893A9F24E0A01D2DF6051AD968F8DB68F00A12D854C42AECEC30899249D879D85E3980D6538D27BAD9B4EBC5E904DEB
3,686,474 UART: [art] SIG.R = 2998C30153DBDFAE7886BFC6D72ECA84E1916FA31C6F6948A275F34067F8886C533564CFA6046B4EB529971EF8C64258
3,693,240 UART: [art] SIG.S = C806DB5A18F0B2F19D780B9A54E57BCFB21803B316D21362FDE5C7F3B72DAD77D3478BF4FFDD8FFCC1E43459464EEC43
3,716,824 UART: Caliptra RT
3,717,169 UART: [state] CFI Enabled
3,824,861 UART: [rt] RT listening for mailbox commands...
3,825,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,303 UART: [rt]cmd =0x41544d4e, len=14344
4,241,357 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,631 ready_for_fw is high
1,055,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,163,916 >>> mbox cmd response: success
3,227,009 UART:
3,227,025 UART: Running Caliptra FMC ...
3,227,433 UART:
3,227,576 UART: [state] CFI Enabled
3,237,732 UART: [fht] FMC Alias Private Key: 7
3,345,730 UART: [art] Extend RT PCRs Done
3,346,158 UART: [art] Lock RT PCRs Done
3,347,818 UART: [art] Populate DV Done
3,355,902 UART: [fht] FMC Alias Private Key: 7
3,356,842 UART: [art] Derive CDI
3,357,122 UART: [art] Store in in slot 0x4
3,442,955 UART: [art] Derive Key Pair
3,443,315 UART: [art] Store priv key in slot 0x5
3,457,001 UART: [art] Derive Key Pair - Done
3,471,860 UART: [art] Signing Cert with AUTHO
3,472,340 UART: RITY.KEYID = 7
3,487,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,319 UART: [art] PUB.X = 443C2441E5292960942DB814E0FD0B38A573CFC6AE06E32562CAF3CB8BAB1D84F51D80AF5BBD5270BC3E96A8896F80D3
3,495,095 UART: [art] PUB.Y = BF767E0942009CBDDD2974DA792DC8D7E46B35A8ADA7EA70C5B929037203B374D590AE84A3E8C160A38A44303A13A7EB
3,502,024 UART: [art] SIG.R = FFD92853147138DE952BEE089EDD8B7B26B2CB3544C38A4CB1388E02C012D5B295CF2F5A849485266E622FFD63465FC7
3,508,794 UART: [art] SIG.S = 5E0FA79CB2A9E0A2FDC0B7C66AAC622A8FDF1DC0F800D50EF4CAC5F5D77F1BC128C0A0D63EFA17794E301763F9BB3444
3,532,691 UART: Caliptra RT
3,533,036 UART: [state] CFI Enabled
3,640,152 UART: [rt] RT listening for mailbox commands...
3,640,822 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,118 UART: [rt]cmd =0x41544d4e, len=14344
4,050,299 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,138 UART:
192,534 UART: Running Caliptra ROM ...
193,857 UART:
194,015 UART: [state] CFI Enabled
266,973 UART: [state] LifecycleState = Unprovisioned
268,894 UART: [state] DebugLocked = No
271,919 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,411 UART: [kat] SHA2-256
447,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,621 UART: [kat] ++
458,101 UART: [kat] sha1
468,123 UART: [kat] SHA2-256
470,841 UART: [kat] SHA2-384
475,409 UART: [kat] SHA2-512-ACC
477,778 UART: [kat] ECC-384
2,767,814 UART: [kat] HMAC-384Kdf
2,780,254 UART: [kat] LMS
3,970,578 UART: [kat] --
3,974,892 UART: [cold-reset] ++
3,975,911 UART: [fht] Storing FHT @ 0x50003400
3,988,452 UART: [idev] ++
3,989,019 UART: [idev] CDI.KEYID = 6
3,989,943 UART: [idev] SUBJECT.KEYID = 7
3,991,195 UART: [idev] UDS.KEYID = 0
3,992,313 ready_for_fw is high
3,992,561 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,184 UART: [idev] Erasing UDS.KEYID = 0
7,327,176 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,684 UART: [idev] --
7,350,810 UART: [ldev] ++
7,351,381 UART: [ldev] CDI.KEYID = 6
7,352,345 UART: [ldev] SUBJECT.KEYID = 5
7,353,559 UART: [ldev] AUTHORITY.KEYID = 7
7,354,793 UART: [ldev] FE.KEYID = 1
7,401,484 UART: [ldev] Erasing FE.KEYID = 1
10,734,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,502 UART: [ldev] --
13,096,110 UART: [fwproc] Waiting for Commands...
13,098,967 UART: [fwproc] Received command 0x46574c44
13,101,158 UART: [fwproc] Received Image of size 114124 bytes
22,525,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,605,343 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,674,233 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,991,719 >>> mbox cmd response: success
22,995,429 UART: [afmc] ++
22,996,029 UART: [afmc] CDI.KEYID = 6
22,996,924 UART: [afmc] SUBJECT.KEYID = 7
22,998,201 UART: [afmc] AUTHORITY.KEYID = 5
26,361,771 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,659,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,661,803 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,676,414 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,691,100 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,705,366 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,725,966 UART: [afmc] --
28,730,536 UART: [cold-reset] --
28,733,911 UART: [state] Locking Datavault
28,740,025 UART: [state] Locking PCR0, PCR1 and PCR31
28,741,780 UART: [state] Locking ICCM
28,744,426 UART: [exit] Launching FMC @ 0x40000130
28,752,821 UART:
28,753,063 UART: Running Caliptra FMC ...
28,754,169 UART:
28,754,342 UART: [state] CFI Enabled
28,820,061 UART: [fht] FMC Alias Private Key: 7
31,158,367 UART: [art] Extend RT PCRs Done
31,159,591 UART: [art] Lock RT PCRs Done
31,161,490 UART: [art] Populate DV Done
31,166,740 UART: [fht] FMC Alias Private Key: 7
31,168,293 UART: [art] Derive CDI
31,169,106 UART: [art] Store in in slot 0x4
31,228,968 UART: [art] Derive Key Pair
31,229,995 UART: [art] Store priv key in slot 0x5
34,523,332 UART: [art] Derive Key Pair - Done
34,536,224 UART: [art] Signing Cert with AUTHO
34,537,531 UART: RITY.KEYID = 7
36,825,071 UART: [art] Erasing AUTHORITY.KEYID = 7
36,826,578 UART: [art] PUB.X = 7A72B6A142C972D9572B815CC1894E706CFF81F12D451560991BF12474B8AC3E451786319545889A30125CCBBFD5D1A7
36,833,823 UART: [art] PUB.Y = A903D3B3D815643D7C7E2872A9276DEC48D00A3F5B351F46A95C67682FEBDEF842F1D11369BA0A2C48B4969B251E8D1E
36,841,057 UART: [art] SIG.R = 359358A67EE6E94155B325D72A7B45E79484099F5F2202CC824F8EF6CC7E35330BE1ED224BB6BA037D3D545E0AF01028
36,848,388 UART: [art] SIG.S = FF5DE29613591FDB932166433A61DF0EC9BDD5A219B92A951CC93295973CD89338F082F027737BEB3197BED99860A430
38,153,304 UART: Caliptra RT
38,154,008 UART: [state] CFI Enabled
38,315,874 UART: [rt] RT listening for mailbox commands...
38,318,193 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,473,714 UART: [rt]cmd =0x41544d4e, len=14344
41,872,098 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,805,205 ready_for_fw is high
3,805,611 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,053,681 >>> mbox cmd response: success
27,747,859 UART:
27,748,245 UART: Running Caliptra FMC ...
27,749,379 UART:
27,749,563 UART: [state] CFI Enabled
27,817,785 UART: [fht] FMC Alias Private Key: 7
30,155,820 UART: [art] Extend RT PCRs Done
30,157,042 UART: [art] Lock RT PCRs Done
30,158,566 UART: [art] Populate DV Done
30,164,364 UART: [fht] FMC Alias Private Key: 7
30,166,015 UART: [art] Derive CDI
30,166,837 UART: [art] Store in in slot 0x4
30,226,268 UART: [art] Derive Key Pair
30,227,319 UART: [art] Store priv key in slot 0x5
33,520,332 UART: [art] Derive Key Pair - Done
33,533,190 UART: [art] Signing Cert with AUTHO
33,534,505 UART: RITY.KEYID = 7
35,822,471 UART: [art] Erasing AUTHORITY.KEYID = 7
35,823,980 UART: [art] PUB.X = 4D80076458F65B122092D9DF3342D913319BED1BCC27F0A07C0C054E0B60B635F797C23512C9CFBEC6F09B649822A18D
35,831,198 UART: [art] PUB.Y = CA6638F4DE6703426DADE1DDF148D00CF443EF0FD166F8C3470F884353BA8EFEF79B2624FE837A8AFE1C64DE9E65264D
35,838,458 UART: [art] SIG.R = 77C56D4166DDAC0DDA9F9230293ECCA3FCD8462C4775F6EC356EB378EFFE4A6F6FFB4A5A86785FB18800663B13251AB7
35,845,827 UART: [art] SIG.S = 40F7B3FC212F516BFA9371CBE4BBBEF35439DDAE9A1C875725E73A127F642BA35E0015818CEC7883DECFF5719C0E921A
37,151,000 UART: Caliptra RT
37,151,695 UART: [state] CFI Enabled
37,313,725 UART: [rt] RT listening for mailbox commands...
37,316,062 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,471,513 UART: [rt]cmd =0x41544d4e, len=14344
40,740,480 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,518 UART:
192,880 UART: Running Caliptra ROM ...
194,018 UART:
603,823 UART: [state] CFI Enabled
615,430 UART: [state] LifecycleState = Unprovisioned
617,348 UART: [state] DebugLocked = No
620,075 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,006 UART: [kat] SHA2-256
794,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,242 UART: [kat] ++
805,681 UART: [kat] sha1
816,760 UART: [kat] SHA2-256
819,480 UART: [kat] SHA2-384
823,973 UART: [kat] SHA2-512-ACC
826,335 UART: [kat] ECC-384
3,113,443 UART: [kat] HMAC-384Kdf
3,124,632 UART: [kat] LMS
4,314,755 UART: [kat] --
4,319,559 UART: [cold-reset] ++
4,321,206 UART: [fht] Storing FHT @ 0x50003400
4,333,414 UART: [idev] ++
4,333,981 UART: [idev] CDI.KEYID = 6
4,334,859 UART: [idev] SUBJECT.KEYID = 7
4,336,166 UART: [idev] UDS.KEYID = 0
4,337,245 ready_for_fw is high
4,337,466 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,854 UART: [idev] Erasing UDS.KEYID = 0
7,628,588 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,610 UART: [idev] --
7,654,399 UART: [ldev] ++
7,655,062 UART: [ldev] CDI.KEYID = 6
7,655,945 UART: [ldev] SUBJECT.KEYID = 5
7,657,151 UART: [ldev] AUTHORITY.KEYID = 7
7,658,432 UART: [ldev] FE.KEYID = 1
7,670,074 UART: [ldev] Erasing FE.KEYID = 1
10,958,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,777 UART: [ldev] --
13,315,819 UART: [fwproc] Waiting for Commands...
13,317,745 UART: [fwproc] Received command 0x46574c44
13,319,920 UART: [fwproc] Received Image of size 114124 bytes
22,117,128 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,201,644 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,270,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,587,761 >>> mbox cmd response: success
22,592,471 UART: [afmc] ++
22,593,067 UART: [afmc] CDI.KEYID = 6
22,593,978 UART: [afmc] SUBJECT.KEYID = 7
22,595,189 UART: [afmc] AUTHORITY.KEYID = 5
25,907,270 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,199,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,202,113 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,216,711 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,231,430 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,245,657 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,268,408 UART: [afmc] --
28,271,401 UART: [cold-reset] --
28,274,120 UART: [state] Locking Datavault
28,280,007 UART: [state] Locking PCR0, PCR1 and PCR31
28,281,770 UART: [state] Locking ICCM
28,283,293 UART: [exit] Launching FMC @ 0x40000130
28,291,679 UART:
28,291,908 UART: Running Caliptra FMC ...
28,292,927 UART:
28,293,065 UART: [state] CFI Enabled
28,300,918 UART: [fht] FMC Alias Private Key: 7
30,631,324 UART: [art] Extend RT PCRs Done
30,632,550 UART: [art] Lock RT PCRs Done
30,634,330 UART: [art] Populate DV Done
30,640,009 UART: [fht] FMC Alias Private Key: 7
30,641,710 UART: [art] Derive CDI
30,642,525 UART: [art] Store in in slot 0x4
30,685,173 UART: [art] Derive Key Pair
30,686,172 UART: [art] Store priv key in slot 0x5
33,928,446 UART: [art] Derive Key Pair - Done
33,941,344 UART: [art] Signing Cert with AUTHO
33,942,651 UART: RITY.KEYID = 7
36,222,017 UART: [art] Erasing AUTHORITY.KEYID = 7
36,223,525 UART: [art] PUB.X = C3366C836DBC05DD91004AF77A36C25C253A7C2A9F22866F69C7F8EAA7669D1D2B481F99015B4A09A95B2BB233ACED35
36,230,794 UART: [art] PUB.Y = 36DAA62458DBC97B3AAAB541BA016C234FE4255FAE08FF529CED1D01ABAD301E6931162F274BC620CCC877BAB77074AF
36,238,065 UART: [art] SIG.R = D9622F32F98EC7FCFCE4DED73179EEF6E31E227611FC70D394F7ECB900DA0DBF32DB497C865E6837DF30F3015CC46362
36,245,461 UART: [art] SIG.S = DF388F692D735DB734BC3929B5446D451ED254979838B8E0412C4AC2101A330B69723BAC43BBEDA4B28D3D86F2FADF8C
37,550,199 UART: Caliptra RT
37,550,910 UART: [state] CFI Enabled
37,669,222 UART: [rt] RT listening for mailbox commands...
37,671,530 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,826,575 UART: [rt]cmd =0x41544d4e, len=14344
41,251,075 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
4,127,604 ready_for_fw is high
4,128,221 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,328,183 >>> mbox cmd response: success
27,967,097 UART:
27,967,491 UART: Running Caliptra FMC ...
27,968,587 UART:
27,968,733 UART: [state] CFI Enabled
27,976,679 UART: [fht] FMC Alias Private Key: 7
30,307,098 UART: [art] Extend RT PCRs Done
30,308,326 UART: [art] Lock RT PCRs Done
30,310,222 UART: [art] Populate DV Done
30,316,008 UART: [fht] FMC Alias Private Key: 7
30,317,505 UART: [art] Derive CDI
30,318,268 UART: [art] Store in in slot 0x4
30,360,762 UART: [art] Derive Key Pair
30,361,802 UART: [art] Store priv key in slot 0x5
33,603,819 UART: [art] Derive Key Pair - Done
33,616,933 UART: [art] Signing Cert with AUTHO
33,618,239 UART: RITY.KEYID = 7
35,897,366 UART: [art] Erasing AUTHORITY.KEYID = 7
35,898,870 UART: [art] PUB.X = 948AC16164FEACDD26EBCDDDC89CB2BD50C5C603028D6360526F6B3AC3B2C5AE21B44FA36E0995B8878A1A41357EE59A
35,906,134 UART: [art] PUB.Y = 468F3E883696CE8F187F8C32EA18272A4D8140549E00C3373764547FED339798E33DD1B35DE38F026478FE31C5EB5A0F
35,913,383 UART: [art] SIG.R = D285BEE703DE17629E4BEC7B63978F9E0F5AC0E98FC0C6EA7D9FB2DF9E317575102B23377DC40F1AAC3BFD8FEA395EB4
35,920,811 UART: [art] SIG.S = B2297C72B0E619E26546C1C28442A57394FD001B0109DF44F3ED48F99DC3B1ACF25FD0666E6836216EBEB919C3F31CD3
37,225,423 UART: Caliptra RT
37,226,137 UART: [state] CFI Enabled
37,342,564 UART: [rt] RT listening for mailbox commands...
37,344,887 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,500,310 UART: [rt]cmd =0x41544d4e, len=14344
40,899,029 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,166 UART:
192,537 UART: Running Caliptra ROM ...
193,654 UART:
193,799 UART: [state] CFI Enabled
260,843 UART: [state] LifecycleState = Unprovisioned
262,698 UART: [state] DebugLocked = No
265,440 UART: [state] WD Timer not started. Device not locked for debugging
269,187 UART: [kat] SHA2-256
448,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,844 UART: [kat] ++
460,294 UART: [kat] sha1
471,025 UART: [kat] SHA2-256
474,049 UART: [kat] SHA2-384
480,399 UART: [kat] SHA2-512-ACC
483,332 UART: [kat] ECC-384
2,946,550 UART: [kat] HMAC-384Kdf
2,969,751 UART: [kat] LMS
3,499,190 UART: [kat] --
3,503,760 UART: [cold-reset] ++
3,505,550 UART: [fht] FHT @ 0x50003400
3,516,811 UART: [idev] ++
3,517,372 UART: [idev] CDI.KEYID = 6
3,518,311 UART: [idev] SUBJECT.KEYID = 7
3,519,489 UART: [idev] UDS.KEYID = 0
3,520,413 ready_for_fw is high
3,520,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,641 UART: [idev] Erasing UDS.KEYID = 0
6,025,772 UART: [idev] Sha1 KeyId Algorithm
6,047,604 UART: [idev] --
6,050,768 UART: [ldev] ++
6,051,343 UART: [ldev] CDI.KEYID = 6
6,052,258 UART: [ldev] SUBJECT.KEYID = 5
6,053,421 UART: [ldev] AUTHORITY.KEYID = 7
6,054,710 UART: [ldev] FE.KEYID = 1
6,098,898 UART: [ldev] Erasing FE.KEYID = 1
8,600,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,730 UART: [ldev] --
10,411,704 UART: [fwproc] Wait for Commands...
10,414,013 UART: [fwproc] Recv command 0x46574c44
10,416,055 UART: [fwproc] Recv'd Img size: 114448 bytes
14,950,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,024,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,093,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,411,227 >>> mbox cmd response: success
15,415,513 UART: [afmc] ++
15,416,104 UART: [afmc] CDI.KEYID = 6
15,417,016 UART: [afmc] SUBJECT.KEYID = 7
15,418,179 UART: [afmc] AUTHORITY.KEYID = 5
17,957,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,685,652 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,701,652 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,717,631 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,733,351 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,756,730 UART: [afmc] --
19,760,590 UART: [cold-reset] --
19,764,404 UART: [state] Locking Datavault
19,768,296 UART: [state] Locking PCR0, PCR1 and PCR31
19,769,935 UART: [state] Locking ICCM
19,771,653 UART: [exit] Launching FMC @ 0x40000130
19,780,050 UART:
19,780,291 UART: Running Caliptra FMC ...
19,781,390 UART:
19,781,551 UART: [state] CFI Enabled
19,841,026 UART: [fht] FMC Alias Private Key: 7
21,605,467 UART: [art] Extend RT PCRs Done
21,606,705 UART: [art] Lock RT PCRs Done
21,608,585 UART: [art] Populate DV Done
21,614,271 UART: [fht] FMC Alias Private Key: 7
21,615,863 UART: [art] Derive CDI
21,616,602 UART: [art] Store in in slot 0x4
21,674,074 UART: [art] Derive Key Pair
21,675,115 UART: [art] Store priv key in slot 0x5
24,137,815 UART: [art] Derive Key Pair - Done
24,150,917 UART: [art] Signing Cert with AUTHO
24,152,219 UART: RITY.KEYID = 7
25,864,047 UART: [art] Erasing AUTHORITY.KEYID = 7
25,865,550 UART: [art] PUB.X = 474829182D4B6823A74F6AC5792A10F1F265354B94915EAB4C1D30E2EB1225DA2C12104D726242DC60C044CA41CDDE18
25,872,876 UART: [art] PUB.Y = 0E91AB50467E01CFCB514037DAA91A496AFD4AC2D254C3A2EC0EF846CAACB53B237ABBBA9A3343429EB3A25FDED4E395
25,880,124 UART: [art] SIG.R = 36002874ED6F386D7E24753AEF7E93C469D86C187A9B917812AADC0FFB0634306CA5DFB57ADD2548FF0D8624BD69DD4D
25,887,529 UART: [art] SIG.S = ADD336B6022CE4BFC8EFC98FCF3C85DC18FCE7A562858DFFC56B72CB24BED09FE16C0B3410946F76B226965963C1B643
26,866,797 UART: Caliptra RT
26,867,502 UART: [state] CFI Enabled
27,033,313 UART: [rt] RT listening for mailbox commands...
27,035,595 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,191,455 UART: [rt]cmd =0x41544d4e, len=14344
29,333,748 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,382,895 ready_for_fw is high
3,383,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,020,992 >>> mbox cmd response: success
19,314,074 UART:
19,314,475 UART: Running Caliptra FMC ...
19,315,590 UART:
19,315,745 UART: [state] CFI Enabled
19,382,401 UART: [fht] FMC Alias Private Key: 7
21,146,467 UART: [art] Extend RT PCRs Done
21,147,691 UART: [art] Lock RT PCRs Done
21,149,449 UART: [art] Populate DV Done
21,154,999 UART: [fht] FMC Alias Private Key: 7
21,156,601 UART: [art] Derive CDI
21,157,416 UART: [art] Store in in slot 0x4
21,215,330 UART: [art] Derive Key Pair
21,216,369 UART: [art] Store priv key in slot 0x5
23,679,428 UART: [art] Derive Key Pair - Done
23,692,099 UART: [art] Signing Cert with AUTHO
23,693,425 UART: RITY.KEYID = 7
25,404,920 UART: [art] Erasing AUTHORITY.KEYID = 7
25,406,421 UART: [art] PUB.X = F5E8D9DD726C04AC57024A3E366D210505C127A3A7A074370D0FE42A6A26233FA5721372F5DFEC9D9429EE1527C37B52
25,413,676 UART: [art] PUB.Y = 66C009D04971C68FC7AB1747B075FA6FEEF9A470A9DFCC9BF4078104468F9873607D10FCF17742D3976874DF1F53FD83
25,420,929 UART: [art] SIG.R = 6EABE20A15FAE9D5E436548185606F3190365C60E2982E62057CDC401C240803EA04BA4D219A9E21F094F32D4957C471
25,428,318 UART: [art] SIG.S = 65D1154E6E2D4AD7DC237746C51F41340589E88E3F36E644345A98AE54BAC058B192816585C6100937CD9DAAA754CB28
26,406,537 UART: Caliptra RT
26,407,234 UART: [state] CFI Enabled
26,571,542 UART: [rt] RT listening for mailbox commands...
26,573,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,729,681 UART: [rt]cmd =0x41544d4e, len=14344
28,878,039 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,388 UART:
192,763 UART: Running Caliptra ROM ...
193,881 UART:
603,675 UART: [state] CFI Enabled
621,663 UART: [state] LifecycleState = Unprovisioned
623,532 UART: [state] DebugLocked = No
625,550 UART: [state] WD Timer not started. Device not locked for debugging
628,940 UART: [kat] SHA2-256
808,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,667 UART: [kat] ++
820,195 UART: [kat] sha1
831,140 UART: [kat] SHA2-256
834,210 UART: [kat] SHA2-384
841,324 UART: [kat] SHA2-512-ACC
844,259 UART: [kat] ECC-384
3,285,598 UART: [kat] HMAC-384Kdf
3,297,919 UART: [kat] LMS
3,827,423 UART: [kat] --
3,831,426 UART: [cold-reset] ++
3,833,067 UART: [fht] FHT @ 0x50003400
3,844,611 UART: [idev] ++
3,845,166 UART: [idev] CDI.KEYID = 6
3,846,143 UART: [idev] SUBJECT.KEYID = 7
3,847,306 UART: [idev] UDS.KEYID = 0
3,848,365 ready_for_fw is high
3,848,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,746 UART: [idev] Erasing UDS.KEYID = 0
6,320,868 UART: [idev] Sha1 KeyId Algorithm
6,344,510 UART: [idev] --
6,348,960 UART: [ldev] ++
6,349,534 UART: [ldev] CDI.KEYID = 6
6,350,411 UART: [ldev] SUBJECT.KEYID = 5
6,351,618 UART: [ldev] AUTHORITY.KEYID = 7
6,352,846 UART: [ldev] FE.KEYID = 1
6,362,968 UART: [ldev] Erasing FE.KEYID = 1
8,837,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,216 UART: [ldev] --
10,624,610 UART: [fwproc] Wait for Commands...
10,627,502 UART: [fwproc] Recv command 0x46574c44
10,629,585 UART: [fwproc] Recv'd Img size: 114448 bytes
15,213,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,292,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,360,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,680,013 >>> mbox cmd response: success
15,684,291 UART: [afmc] ++
15,684,883 UART: [afmc] CDI.KEYID = 6
15,685,796 UART: [afmc] SUBJECT.KEYID = 7
15,686,951 UART: [afmc] AUTHORITY.KEYID = 5
18,186,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,905,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,907,389 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,923,368 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,939,345 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,955,140 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,976,625 UART: [afmc] --
19,979,668 UART: [cold-reset] --
19,983,033 UART: [state] Locking Datavault
19,989,895 UART: [state] Locking PCR0, PCR1 and PCR31
19,991,532 UART: [state] Locking ICCM
19,993,627 UART: [exit] Launching FMC @ 0x40000130
20,002,068 UART:
20,002,304 UART: Running Caliptra FMC ...
20,003,400 UART:
20,003,558 UART: [state] CFI Enabled
20,011,492 UART: [fht] FMC Alias Private Key: 7
21,768,875 UART: [art] Extend RT PCRs Done
21,770,106 UART: [art] Lock RT PCRs Done
21,771,883 UART: [art] Populate DV Done
21,777,095 UART: [fht] FMC Alias Private Key: 7
21,778,849 UART: [art] Derive CDI
21,779,775 UART: [art] Store in in slot 0x4
21,822,328 UART: [art] Derive Key Pair
21,823,321 UART: [art] Store priv key in slot 0x5
24,250,081 UART: [art] Derive Key Pair - Done
24,262,962 UART: [art] Signing Cert with AUTHO
24,264,297 UART: RITY.KEYID = 7
25,969,606 UART: [art] Erasing AUTHORITY.KEYID = 7
25,971,109 UART: [art] PUB.X = 870428EAE655D68DAE4BDD65CA6343C73379234D64D7A3E2F56578DCD13CEA8A3D63A84395CB11201BDE65AE0039E7EA
25,978,394 UART: [art] PUB.Y = 8E3EF6FB8583C75ACC30C34B7184336C5012582053ED69A727E75CB7A568489FC4EAB4BA5C1191ADBEE1FD6E27B6E3E5
25,985,671 UART: [art] SIG.R = 00AC75AB34BC432CEA3D60CEF36D0D8F6ECFACE0DF0184990C1168EF9E55069A1FBAD59AF9A2D415543BB46824177D2E
25,993,045 UART: [art] SIG.S = B93CC0A1EE01B82D672F880ED6B4994F09D1C4BBC2DE77900D71D8024702E49BF8D9CAC799284FFE4497374A53D16CB1
26,971,944 UART: Caliptra RT
26,972,654 UART: [state] CFI Enabled
27,088,978 UART: [rt] RT listening for mailbox commands...
27,091,312 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,246,421 UART: [rt]cmd =0x41544d4e, len=14344
29,396,491 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,693,115 ready_for_fw is high
3,693,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,235,920 >>> mbox cmd response: success
19,487,231 UART:
19,487,650 UART: Running Caliptra FMC ...
19,488,763 UART:
19,488,927 UART: [state] CFI Enabled
19,496,863 UART: [fht] FMC Alias Private Key: 7
21,253,646 UART: [art] Extend RT PCRs Done
21,254,870 UART: [art] Lock RT PCRs Done
21,256,321 UART: [art] Populate DV Done
21,261,755 UART: [fht] FMC Alias Private Key: 7
21,263,289 UART: [art] Derive CDI
21,264,098 UART: [art] Store in in slot 0x4
21,306,912 UART: [art] Derive Key Pair
21,307,950 UART: [art] Store priv key in slot 0x5
23,734,536 UART: [art] Derive Key Pair - Done
23,747,691 UART: [art] Signing Cert with AUTHO
23,748,998 UART: RITY.KEYID = 7
25,454,564 UART: [art] Erasing AUTHORITY.KEYID = 7
25,456,041 UART: [art] PUB.X = E768ACB23752E01B4B3C3DFF73721E30BC62B56D7E3587B0FF6C175B571AF69BA5E6E68295D45609AEA4C8AFA7C1CFCE
25,463,357 UART: [art] PUB.Y = 26EC57570AE508F1B2B0E1F9F6E985D815FCD0091A3E149347D1FFE7E2CCFA21B8306A5821990B2946A84C296AAF9F3A
25,470,629 UART: [art] SIG.R = 8364BFA61D8ABF850E7FD962031D93B1B20FE56C41259085AC0B617E7738DB887D8E2697D4C37F99E6271146545B386D
25,477,964 UART: [art] SIG.S = 420BEBF79D91C0B9D2656FFF04B67111CEC812776EC8B537B08335F0F276F0E4F5258D294D5BE88FC04DAF97A7B0D787
26,456,761 UART: Caliptra RT
26,457,479 UART: [state] CFI Enabled
26,574,439 UART: [rt] RT listening for mailbox commands...
26,576,725 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,732,089 UART: [rt]cmd =0x41544d4e, len=14344
28,873,086 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,438,455 ready_for_fw is high
3,439,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,837,343 >>> mbox cmd response: success
20,113,118 UART:
20,113,514 UART: Running Caliptra FMC ...
20,114,647 UART:
20,114,810 UART: [state] CFI Enabled
20,181,293 UART: [fht] FMC Alias Private Key: 7
21,945,741 UART: [art] Extend RT PCRs Done
21,946,961 UART: [art] Lock RT PCRs Done
21,948,699 UART: [art] Populate DV Done
21,953,896 UART: [fht] FMC Alias Private Key: 7
21,955,494 UART: [art] Derive CDI
21,956,310 UART: [art] Store in in slot 0x4
22,014,102 UART: [art] Derive Key Pair
22,015,140 UART: [art] Store priv key in slot 0x5
24,477,503 UART: [art] Derive Key Pair - Done
24,490,719 UART: [art] Signing Cert with AUTHO
24,492,026 UART: RITY.KEYID = 7
26,203,531 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,034 UART: [art] PUB.X = 6D3AF80DA296343514C4194CAF77064994FBC09C43205200E7CA741256FA4C975A221DF6E12C11307E674F3BD38F113B
26,212,289 UART: [art] PUB.Y = FB0C0A44CF8EDF5D2BB0CDCE78EA7C9E17D5986A93A361588C576D2AEF5716153E03F0EEC953498C4950D12EA71374B5
26,219,503 UART: [art] SIG.R = 8B0B7BC8E04A87BDE892D631B471C5FC5B982903AC648445E412D69632CA4497ED3BBBABE78F696DB4697D4DD9EF3F11
26,226,895 UART: [art] SIG.S = 1E32733C08C07AE09A2ADEC9731380EA3289EE8AE17D08F3FE436AC02A96A7F669D6F0B82529D2284286B860EAA38446
27,206,037 UART: Caliptra RT
27,206,733 UART: [state] CFI Enabled
27,369,730 UART: [rt] RT listening for mailbox commands...
27,372,004 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,527,817 UART: [rt]cmd =0x41544d4e, len=14344
29,672,964 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,758,819 ready_for_fw is high
3,759,214 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,065,395 >>> mbox cmd response: success
20,313,581 UART:
20,313,965 UART: Running Caliptra FMC ...
20,315,091 UART:
20,315,250 UART: [state] CFI Enabled
20,323,230 UART: [fht] FMC Alias Private Key: 7
22,080,346 UART: [art] Extend RT PCRs Done
22,081,574 UART: [art] Lock RT PCRs Done
22,083,091 UART: [art] Populate DV Done
22,088,682 UART: [fht] FMC Alias Private Key: 7
22,090,384 UART: [art] Derive CDI
22,091,202 UART: [art] Store in in slot 0x4
22,133,384 UART: [art] Derive Key Pair
22,134,420 UART: [art] Store priv key in slot 0x5
24,560,355 UART: [art] Derive Key Pair - Done
24,573,460 UART: [art] Signing Cert with AUTHO
24,574,767 UART: RITY.KEYID = 7
26,280,087 UART: [art] Erasing AUTHORITY.KEYID = 7
26,281,598 UART: [art] PUB.X = 843C8D3EAC2172C98DC7F3240A6162B2B842407B56ACC2AF3F3268093C066D54DB70ED2EDB7FEADA44C1E6980EEAF186
26,288,889 UART: [art] PUB.Y = DE76227EDFE30BC949BC9D6221B825DE348BD1C9CCDCDF12A9E98705594AEAC00F0E02A1ED1CEE2C38BDE5BFC5FBB0C5
26,296,225 UART: [art] SIG.R = BEC26536BE4F3DF2FE38F8E91EF8A9D08DE756D6AE633C07963518A4446BE57C6F9A568986DBB3679683AC966787D9CA
26,303,605 UART: [art] SIG.S = 81A18C63CF2AE1E67647FE633E231E57EE302D99161E02BC6C396A11EA19B3037E6250D263023A612103F636B296475C
27,282,753 UART: Caliptra RT
27,283,462 UART: [state] CFI Enabled
27,400,648 UART: [rt] RT listening for mailbox commands...
27,402,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,558,130 UART: [rt]cmd =0x41544d4e, len=14344
29,712,836 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,191 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,849 UART: [kat] SHA2-256
881,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,895 UART: [kat] ++
886,047 UART: [kat] sha1
890,389 UART: [kat] SHA2-256
892,327 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,694 UART: [kat] HMAC-384Kdf
907,306 UART: [kat] LMS
1,475,502 UART: [kat] --
1,476,263 UART: [cold-reset] ++
1,476,693 UART: [fht] Storing FHT @ 0x50003400
1,479,594 UART: [idev] ++
1,479,762 UART: [idev] CDI.KEYID = 6
1,480,122 UART: [idev] SUBJECT.KEYID = 7
1,480,546 UART: [idev] UDS.KEYID = 0
1,480,891 ready_for_fw is high
1,480,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,668 UART: [idev] Erasing UDS.KEYID = 0
1,505,240 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,722 UART: [idev] --
1,514,719 UART: [ldev] ++
1,514,887 UART: [ldev] CDI.KEYID = 6
1,515,250 UART: [ldev] SUBJECT.KEYID = 5
1,515,676 UART: [ldev] AUTHORITY.KEYID = 7
1,516,139 UART: [ldev] FE.KEYID = 1
1,521,193 UART: [ldev] Erasing FE.KEYID = 1
1,545,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,834 UART: [ldev] --
1,585,179 UART: [fwproc] Waiting for Commands...
1,585,898 UART: [fwproc] Received command 0x46574c44
1,586,689 UART: [fwproc] Received Image of size 114448 bytes
5,234,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,263,420 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,292,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,428,685 >>> mbox cmd response: success
5,429,819 UART: [afmc] ++
5,429,987 UART: [afmc] CDI.KEYID = 6
5,430,349 UART: [afmc] SUBJECT.KEYID = 7
5,430,774 UART: [afmc] AUTHORITY.KEYID = 5
5,465,852 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,482,006 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,482,786 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,488,495 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,494,387 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,500,088 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,508,064 UART: [afmc] --
5,509,122 UART: [cold-reset] --
5,510,218 UART: [state] Locking Datavault
5,511,431 UART: [state] Locking PCR0, PCR1 and PCR31
5,512,035 UART: [state] Locking ICCM
5,512,497 UART: [exit] Launching FMC @ 0x40000130
5,517,826 UART:
5,517,842 UART: Running Caliptra FMC ...
5,518,250 UART:
5,518,304 UART: [state] CFI Enabled
5,528,800 UART: [fht] FMC Alias Private Key: 7
5,636,476 UART: [art] Extend RT PCRs Done
5,636,904 UART: [art] Lock RT PCRs Done
5,638,468 UART: [art] Populate DV Done
5,646,764 UART: [fht] FMC Alias Private Key: 7
5,647,712 UART: [art] Derive CDI
5,647,992 UART: [art] Store in in slot 0x4
5,733,701 UART: [art] Derive Key Pair
5,734,061 UART: [art] Store priv key in slot 0x5
5,747,467 UART: [art] Derive Key Pair - Done
5,762,571 UART: [art] Signing Cert with AUTHO
5,763,051 UART: RITY.KEYID = 7
5,778,135 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,900 UART: [art] PUB.X = A6383D1CD416B9B99C4F34620B5BF220D8ED0F9E8A2B95976347B4DC6E6AB4BCFD299DDD1EC1B00E1465CDBD9C2B7801
5,785,678 UART: [art] PUB.Y = 1A5148838969E2B80017AB8DA2CA513B47A1B1B368C89AF416398F0D5A37669F9045ACFB9B956BE76A72CD8B0DCE7E35
5,792,608 UART: [art] SIG.R = 193F0E07E1D84674895CF1E5C2B7A566C7BA8FC47D4B4FEE1B8861C21479AD58319832C56A5594E4041D5C8B299FDECB
5,799,377 UART: [art] SIG.S = 698E096C5FFA66F977F84CEFAFFFD134708C1DCB6DB310DC2464FB601BF88FCDFC60F806145A1D6D83B5F0A5144525C6
5,823,398 UART: Caliptra RT
5,823,651 UART: [state] CFI Enabled
5,931,077 UART: [rt] RT listening for mailbox commands...
5,931,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,054,833 UART: [rt]cmd =0x41544d4e, len=14344
6,332,997 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,913 ready_for_fw is high
1,363,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,126,393 >>> mbox cmd response: success
5,187,812 UART:
5,187,828 UART: Running Caliptra FMC ...
5,188,236 UART:
5,188,290 UART: [state] CFI Enabled
5,198,994 UART: [fht] FMC Alias Private Key: 7
5,306,664 UART: [art] Extend RT PCRs Done
5,307,092 UART: [art] Lock RT PCRs Done
5,308,638 UART: [art] Populate DV Done
5,317,062 UART: [fht] FMC Alias Private Key: 7
5,317,994 UART: [art] Derive CDI
5,318,274 UART: [art] Store in in slot 0x4
5,403,921 UART: [art] Derive Key Pair
5,404,281 UART: [art] Store priv key in slot 0x5
5,417,553 UART: [art] Derive Key Pair - Done
5,432,342 UART: [art] Signing Cert with AUTHO
5,432,822 UART: RITY.KEYID = 7
5,447,926 UART: [art] Erasing AUTHORITY.KEYID = 7
5,448,691 UART: [art] PUB.X = 89DEEFA6018AF7452423FEE08EED6E3710248FD06CB9F5EE0D2B9C5B3A1713D553A719DBB14CE04C30188CC05E35C585
5,455,469 UART: [art] PUB.Y = FB994D217AE430264A0293782AB39B9F0160908FF423BE55628DD5E849DC5E69E59C73D27525D6BDFD23995C1C6A4DD9
5,462,417 UART: [art] SIG.R = 2374D326B70EA57F5F3C394D49C730E3FD4A1CF508F345BCD46165922BBB60A7AEF23ECB2A0AD455908ACD1E800F9AEA
5,469,193 UART: [art] SIG.S = BEEC2465414D67E4584C78F3D35DA3C1062960B81BB5C849A5B3C882BA766AC9F1BA30447D5BA914D3971804D43777A1
5,492,926 UART: Caliptra RT
5,493,179 UART: [state] CFI Enabled
5,600,518 UART: [rt] RT listening for mailbox commands...
5,601,188 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,724,370 UART: [rt]cmd =0x41544d4e, len=14344
6,015,335 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,326 UART: [kat] SHA2-256
882,257 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,372 UART: [kat] ++
886,524 UART: [kat] sha1
890,894 UART: [kat] SHA2-256
892,832 UART: [kat] SHA2-384
895,603 UART: [kat] SHA2-512-ACC
897,504 UART: [kat] ECC-384
902,749 UART: [kat] HMAC-384Kdf
907,425 UART: [kat] LMS
1,475,621 UART: [kat] --
1,476,434 UART: [cold-reset] ++
1,476,868 UART: [fht] Storing FHT @ 0x50003400
1,479,527 UART: [idev] ++
1,479,695 UART: [idev] CDI.KEYID = 6
1,480,055 UART: [idev] SUBJECT.KEYID = 7
1,480,479 UART: [idev] UDS.KEYID = 0
1,480,824 ready_for_fw is high
1,480,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,473 UART: [idev] Erasing UDS.KEYID = 0
1,504,895 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,381 UART: [idev] --
1,514,442 UART: [ldev] ++
1,514,610 UART: [ldev] CDI.KEYID = 6
1,514,973 UART: [ldev] SUBJECT.KEYID = 5
1,515,399 UART: [ldev] AUTHORITY.KEYID = 7
1,515,862 UART: [ldev] FE.KEYID = 1
1,521,330 UART: [ldev] Erasing FE.KEYID = 1
1,546,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,019 UART: [ldev] --
1,586,316 UART: [fwproc] Waiting for Commands...
1,587,041 UART: [fwproc] Received command 0x46574c44
1,587,832 UART: [fwproc] Received Image of size 114448 bytes
5,236,061 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,264,007 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,293,359 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,429,440 >>> mbox cmd response: success
5,430,528 UART: [afmc] ++
5,430,696 UART: [afmc] CDI.KEYID = 6
5,431,058 UART: [afmc] SUBJECT.KEYID = 7
5,431,483 UART: [afmc] AUTHORITY.KEYID = 5
5,466,639 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,483,007 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,483,787 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,489,496 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,495,388 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,501,089 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,508,983 UART: [afmc] --
5,510,037 UART: [cold-reset] --
5,510,989 UART: [state] Locking Datavault
5,511,966 UART: [state] Locking PCR0, PCR1 and PCR31
5,512,570 UART: [state] Locking ICCM
5,513,140 UART: [exit] Launching FMC @ 0x40000130
5,518,469 UART:
5,518,485 UART: Running Caliptra FMC ...
5,518,893 UART:
5,519,036 UART: [state] CFI Enabled
5,529,776 UART: [fht] FMC Alias Private Key: 7
5,637,268 UART: [art] Extend RT PCRs Done
5,637,696 UART: [art] Lock RT PCRs Done
5,639,248 UART: [art] Populate DV Done
5,647,606 UART: [fht] FMC Alias Private Key: 7
5,648,540 UART: [art] Derive CDI
5,648,820 UART: [art] Store in in slot 0x4
5,734,705 UART: [art] Derive Key Pair
5,735,065 UART: [art] Store priv key in slot 0x5
5,748,907 UART: [art] Derive Key Pair - Done
5,763,933 UART: [art] Signing Cert with AUTHO
5,764,413 UART: RITY.KEYID = 7
5,779,301 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,066 UART: [art] PUB.X = 746FB59464355ACE08CB5A918AB5D5D1D33EF53E0B91380F2C1414E2546DE9775FBC896FF286C637C4530DD122788977
5,786,824 UART: [art] PUB.Y = 5C5C69B8214326D328513216481FCD1BC4572D7C3A2688A43DE971D990EF9E597555D406147BDA5EA7C5D673C905413A
5,793,764 UART: [art] SIG.R = 79C3EB262BFF067F2A5E9AF8D5EDAD1B5F25DFB98A6A47B0DF827A07882C07448238CB636BF17492BF0EC90CC33DE9C7
5,800,539 UART: [art] SIG.S = 2148E67EFB8BBBB6F52DEA69E8C426E2E0F019FD4AA7D1B441B4FEBB9C08BF3EB6699F75BE8E6334E25AF0B6F0434CDE
5,824,187 UART: Caliptra RT
5,824,532 UART: [state] CFI Enabled
5,932,896 UART: [rt] RT listening for mailbox commands...
5,933,566 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,056,750 UART: [rt]cmd =0x41544d4e, len=14344
6,344,558 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,510 ready_for_fw is high
1,363,510 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,280,172 >>> mbox cmd response: success
5,341,871 UART:
5,341,887 UART: Running Caliptra FMC ...
5,342,295 UART:
5,342,438 UART: [state] CFI Enabled
5,352,836 UART: [fht] FMC Alias Private Key: 7
5,460,576 UART: [art] Extend RT PCRs Done
5,461,004 UART: [art] Lock RT PCRs Done
5,462,424 UART: [art] Populate DV Done
5,470,598 UART: [fht] FMC Alias Private Key: 7
5,471,558 UART: [art] Derive CDI
5,471,838 UART: [art] Store in in slot 0x4
5,557,477 UART: [art] Derive Key Pair
5,557,837 UART: [art] Store priv key in slot 0x5
5,571,531 UART: [art] Derive Key Pair - Done
5,586,481 UART: [art] Signing Cert with AUTHO
5,586,961 UART: RITY.KEYID = 7
5,602,029 UART: [art] Erasing AUTHORITY.KEYID = 7
5,602,794 UART: [art] PUB.X = 2BE969F7AA36314F5C94B5404702598E70013BBCA9BE8A40330671295D68F192E0B436E27543AE3C3600E196DD163355
5,609,525 UART: [art] PUB.Y = 958606E5A2F240E352300EBA94ADD80206E9110B49B23A4A08D9F986DF0CBD9BFADE5B1191FABA9A4F1B174FE7038EC4
5,616,467 UART: [art] SIG.R = 89300150220DE0361D53CEC352541637182BD0EF7F2A3C19AF9C4BB3D1B305BFCA482049C46DCEC32D6E3792A3F4EB97
5,623,236 UART: [art] SIG.S = C6D8B57C249C2CE735AB603774372167A78E15BBAE47A0DD4BA6C96B6B0C61FAB837A60EB7F59E77A0BF2E341465F5DC
5,646,883 UART: Caliptra RT
5,647,228 UART: [state] CFI Enabled
5,756,092 UART: [rt] RT listening for mailbox commands...
5,756,762 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,876 UART: [rt]cmd =0x41544d4e, len=14344
6,165,531 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,835 UART: [state] WD Timer not started. Device not locked for debugging
87,994 UART: [kat] SHA2-256
893,644 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,769 UART: [kat] ++
897,921 UART: [kat] sha1
902,133 UART: [kat] SHA2-256
904,073 UART: [kat] SHA2-384
906,654 UART: [kat] SHA2-512-ACC
908,555 UART: [kat] ECC-384
918,062 UART: [kat] HMAC-384Kdf
922,692 UART: [kat] LMS
1,171,020 UART: [kat] --
1,172,011 UART: [cold-reset] ++
1,172,561 UART: [fht] FHT @ 0x50003400
1,175,336 UART: [idev] ++
1,175,504 UART: [idev] CDI.KEYID = 6
1,175,864 UART: [idev] SUBJECT.KEYID = 7
1,176,288 UART: [idev] UDS.KEYID = 0
1,176,633 ready_for_fw is high
1,176,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,748 UART: [idev] Erasing UDS.KEYID = 0
1,201,357 UART: [idev] Sha1 KeyId Algorithm
1,210,041 UART: [idev] --
1,211,009 UART: [ldev] ++
1,211,177 UART: [ldev] CDI.KEYID = 6
1,211,540 UART: [ldev] SUBJECT.KEYID = 5
1,211,966 UART: [ldev] AUTHORITY.KEYID = 7
1,212,429 UART: [ldev] FE.KEYID = 1
1,217,435 UART: [ldev] Erasing FE.KEYID = 1
1,244,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,349 UART: [ldev] --
1,283,688 UART: [fwproc] Wait for Commands...
1,284,390 UART: [fwproc] Recv command 0x46574c44
1,285,118 UART: [fwproc] Recv'd Img size: 114448 bytes
3,133,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,015 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,327,326 >>> mbox cmd response: success
3,328,544 UART: [afmc] ++
3,328,712 UART: [afmc] CDI.KEYID = 6
3,329,074 UART: [afmc] SUBJECT.KEYID = 7
3,329,499 UART: [afmc] AUTHORITY.KEYID = 5
3,365,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,426 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,135 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,394,027 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,738 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,437 UART: [afmc] --
3,408,543 UART: [cold-reset] --
3,409,417 UART: [state] Locking Datavault
3,410,734 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,338 UART: [state] Locking ICCM
3,411,826 UART: [exit] Launching FMC @ 0x40000130
3,417,155 UART:
3,417,171 UART: Running Caliptra FMC ...
3,417,579 UART:
3,417,633 UART: [state] CFI Enabled
3,428,173 UART: [fht] FMC Alias Private Key: 7
3,536,257 UART: [art] Extend RT PCRs Done
3,536,685 UART: [art] Lock RT PCRs Done
3,538,077 UART: [art] Populate DV Done
3,546,499 UART: [fht] FMC Alias Private Key: 7
3,547,481 UART: [art] Derive CDI
3,547,761 UART: [art] Store in in slot 0x4
3,633,794 UART: [art] Derive Key Pair
3,634,154 UART: [art] Store priv key in slot 0x5
3,647,394 UART: [art] Derive Key Pair - Done
3,661,994 UART: [art] Signing Cert with AUTHO
3,662,474 UART: RITY.KEYID = 7
3,677,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,678,485 UART: [art] PUB.X = D7FAB691BE5AC327D13E096D8474CCCB76C1D94F672C8E5EB0165BA9355DD175BF1DC40229337507055DDB23DB81EABB
3,685,259 UART: [art] PUB.Y = 62A87D4E6D0A84AD2F88E65A83F0607FA51BDD985AC3882E0388EF4E7CDA46359DFECEBCEE28B4535BACB1DFC8281DDF
3,692,231 UART: [art] SIG.R = 538C751F813D086AC6DF300EE89F1A03CE46039A0B956837607F279280EF5B77F80474A3FF3D0D83C27A41C42F8E5C51
3,698,980 UART: [art] SIG.S = AA2919199C5EBED7C83AF890BEA4B4552268B0B9B89207910CAE44586AAC7A2ED6F99EE481882320E094D1635D21040B
3,722,613 UART: Caliptra RT
3,722,866 UART: [state] CFI Enabled
3,830,416 UART: [rt] RT listening for mailbox commands...
3,831,086 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,032 UART: [rt]cmd =0x41544d4e, len=14344
4,246,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,101 ready_for_fw is high
1,060,101 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,241 >>> mbox cmd response: success
3,231,330 UART:
3,231,346 UART: Running Caliptra FMC ...
3,231,754 UART:
3,231,808 UART: [state] CFI Enabled
3,242,492 UART: [fht] FMC Alias Private Key: 7
3,350,330 UART: [art] Extend RT PCRs Done
3,350,758 UART: [art] Lock RT PCRs Done
3,352,034 UART: [art] Populate DV Done
3,360,526 UART: [fht] FMC Alias Private Key: 7
3,361,670 UART: [art] Derive CDI
3,361,950 UART: [art] Store in in slot 0x4
3,447,143 UART: [art] Derive Key Pair
3,447,503 UART: [art] Store priv key in slot 0x5
3,460,191 UART: [art] Derive Key Pair - Done
3,474,821 UART: [art] Signing Cert with AUTHO
3,475,301 UART: RITY.KEYID = 7
3,490,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,050 UART: [art] PUB.X = DAA1A13F0C3A619F2070EB2570586CE3FE6E856D1F2B129A1A24EC03CB8365E44C1EAE9C0EA65183A1B8069F5D8694E8
3,497,820 UART: [art] PUB.Y = 9A3DDAC6EBBB3E04B91F35128C1BB3B04A5C273C8C2523D6C148502E7259DC48B0D3457564226CA69E33A631920BEA82
3,504,770 UART: [art] SIG.R = A6B5ADA251B41545F8A4136303E27C34A0AA231AAE7946C14D16A12E72EF249DFEFAC76D5D830ED3813EABEDF118F930
3,511,550 UART: [art] SIG.S = 60E08BE220141F46A20DDCFE3FAD69B0FC5B15BAD3535EB3994907422EAC9718006461406236C4ED38A4C06DE7CE3660
3,534,837 UART: Caliptra RT
3,535,090 UART: [state] CFI Enabled
3,643,052 UART: [rt] RT listening for mailbox commands...
3,643,722 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,760 UART: [rt]cmd =0x41544d4e, len=14344
4,052,777 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
893,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,488 UART: [kat] ++
897,640 UART: [kat] sha1
901,722 UART: [kat] SHA2-256
903,662 UART: [kat] SHA2-384
906,301 UART: [kat] SHA2-512-ACC
908,202 UART: [kat] ECC-384
918,171 UART: [kat] HMAC-384Kdf
922,803 UART: [kat] LMS
1,171,131 UART: [kat] --
1,171,890 UART: [cold-reset] ++
1,172,254 UART: [fht] FHT @ 0x50003400
1,174,905 UART: [idev] ++
1,175,073 UART: [idev] CDI.KEYID = 6
1,175,433 UART: [idev] SUBJECT.KEYID = 7
1,175,857 UART: [idev] UDS.KEYID = 0
1,176,202 ready_for_fw is high
1,176,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,811 UART: [idev] Erasing UDS.KEYID = 0
1,200,972 UART: [idev] Sha1 KeyId Algorithm
1,209,662 UART: [idev] --
1,210,724 UART: [ldev] ++
1,210,892 UART: [ldev] CDI.KEYID = 6
1,211,255 UART: [ldev] SUBJECT.KEYID = 5
1,211,681 UART: [ldev] AUTHORITY.KEYID = 7
1,212,144 UART: [ldev] FE.KEYID = 1
1,217,224 UART: [ldev] Erasing FE.KEYID = 1
1,243,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,364 UART: [ldev] --
1,282,731 UART: [fwproc] Wait for Commands...
1,283,553 UART: [fwproc] Recv command 0x46574c44
1,284,281 UART: [fwproc] Recv'd Img size: 114448 bytes
3,119,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,312,264 >>> mbox cmd response: success
3,313,420 UART: [afmc] ++
3,313,588 UART: [afmc] CDI.KEYID = 6
3,313,950 UART: [afmc] SUBJECT.KEYID = 7
3,314,375 UART: [afmc] AUTHORITY.KEYID = 5
3,350,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,596 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,305 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,197 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,908 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,949 UART: [afmc] --
3,393,999 UART: [cold-reset] --
3,394,821 UART: [state] Locking Datavault
3,396,028 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,632 UART: [state] Locking ICCM
3,397,106 UART: [exit] Launching FMC @ 0x40000130
3,402,435 UART:
3,402,451 UART: Running Caliptra FMC ...
3,402,859 UART:
3,403,002 UART: [state] CFI Enabled
3,413,366 UART: [fht] FMC Alias Private Key: 7
3,521,600 UART: [art] Extend RT PCRs Done
3,522,028 UART: [art] Lock RT PCRs Done
3,523,666 UART: [art] Populate DV Done
3,531,806 UART: [fht] FMC Alias Private Key: 7
3,532,944 UART: [art] Derive CDI
3,533,224 UART: [art] Store in in slot 0x4
3,619,071 UART: [art] Derive Key Pair
3,619,431 UART: [art] Store priv key in slot 0x5
3,632,829 UART: [art] Derive Key Pair - Done
3,647,851 UART: [art] Signing Cert with AUTHO
3,648,331 UART: RITY.KEYID = 7
3,663,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,502 UART: [art] PUB.X = EC7A8791D29998BF72EAE63F4F193F82B4D33831C09EF2150093C2646B08C0AC7F92519C83B03594D0D6412102E17E51
3,671,240 UART: [art] PUB.Y = D30A2B2E908B261315F6C7C70D080A6E6428B64C56AADCDC02389F7EBCBC1105B1FA9ABD0F01DA7FA2F2663437E76CEF
3,678,186 UART: [art] SIG.R = BE6B46D742617F81147D6DD6DDCAF4F2343F70749E79FD53D8963A6EF464C1BAADF899FB4D0190C210AFFBCF2470B817
3,684,969 UART: [art] SIG.S = C1757625FF3D120DC6282B0FFFDC695E54B7BD6B401208B0A2766AAAE0B9C31F3FE4FA7DA301CF1A279F9F689A77325A
3,708,824 UART: Caliptra RT
3,709,169 UART: [state] CFI Enabled
3,816,788 UART: [rt] RT listening for mailbox commands...
3,817,458 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,494 UART: [rt]cmd =0x41544d4e, len=14344
4,231,131 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,016 ready_for_fw is high
1,061,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,168,278 >>> mbox cmd response: success
3,231,157 UART:
3,231,173 UART: Running Caliptra FMC ...
3,231,581 UART:
3,231,724 UART: [state] CFI Enabled
3,242,162 UART: [fht] FMC Alias Private Key: 7
3,350,134 UART: [art] Extend RT PCRs Done
3,350,562 UART: [art] Lock RT PCRs Done
3,352,228 UART: [art] Populate DV Done
3,360,542 UART: [fht] FMC Alias Private Key: 7
3,361,634 UART: [art] Derive CDI
3,361,914 UART: [art] Store in in slot 0x4
3,447,589 UART: [art] Derive Key Pair
3,447,949 UART: [art] Store priv key in slot 0x5
3,460,817 UART: [art] Derive Key Pair - Done
3,475,897 UART: [art] Signing Cert with AUTHO
3,476,377 UART: RITY.KEYID = 7
3,491,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,596 UART: [art] PUB.X = 2F76EDD3963C6C3ED63FF79B5B911579279468070D8F9F3EF0448D4DF5DE2D7E1A1E89750983E50DE30794AFA46C3B41
3,499,357 UART: [art] PUB.Y = E3CD7289F901AD657A51C7555B0DE743A9DC8C274F04A322145DD54B9579846E9F38A3C43AB05DF0D449FE7296D25F1E
3,506,304 UART: [art] SIG.R = AEFF9B2DC7B1AA3C25C6FA5172EEA81154623AA0EBB351311596102B80BB538A555FEE8AA0731CCE1181C1ABA4A2F831
3,513,092 UART: [art] SIG.S = EA57C67D083AA072AC09A619FF773579FEB4E3295C59AE76C8BB0445245A07AF5A75234C8B599C8B168E2F121D44D8F6
3,537,129 UART: Caliptra RT
3,537,474 UART: [state] CFI Enabled
3,644,637 UART: [rt] RT listening for mailbox commands...
3,645,307 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,591 UART: [rt]cmd =0x41544d4e, len=14344
4,056,563 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,401 UART: [kat] SHA2-256
901,341 UART: [kat] SHA2-384
903,882 UART: [kat] SHA2-512-ACC
905,783 UART: [kat] ECC-384
915,516 UART: [kat] HMAC-384Kdf
920,022 UART: [kat] LMS
1,168,334 UART: [kat] --
1,169,179 UART: [cold-reset] ++
1,169,515 UART: [fht] FHT @ 0x50003400
1,172,397 UART: [idev] ++
1,172,565 UART: [idev] CDI.KEYID = 6
1,172,926 UART: [idev] SUBJECT.KEYID = 7
1,173,351 UART: [idev] UDS.KEYID = 0
1,173,697 ready_for_fw is high
1,173,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,513 UART: [idev] Erasing UDS.KEYID = 0
1,198,617 UART: [idev] Sha1 KeyId Algorithm
1,207,527 UART: [idev] --
1,208,646 UART: [ldev] ++
1,208,814 UART: [ldev] CDI.KEYID = 6
1,209,178 UART: [ldev] SUBJECT.KEYID = 5
1,209,605 UART: [ldev] AUTHORITY.KEYID = 7
1,210,068 UART: [ldev] FE.KEYID = 1
1,215,024 UART: [ldev] Erasing FE.KEYID = 1
1,240,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,014 UART: [ldev] --
1,279,494 UART: [fwproc] Wait for Commands...
1,280,273 UART: [fwproc] Recv command 0x46574c44
1,281,006 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,454 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,801 >>> mbox cmd response: success
3,322,994 UART: [afmc] ++
3,323,162 UART: [afmc] CDI.KEYID = 6
3,323,525 UART: [afmc] SUBJECT.KEYID = 7
3,323,951 UART: [afmc] AUTHORITY.KEYID = 5
3,358,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,688 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,398 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,288 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,999 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,757 UART: [afmc] --
3,401,833 UART: [cold-reset] --
3,402,615 UART: [state] Locking Datavault
3,403,782 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,386 UART: [state] Locking ICCM
3,404,986 UART: [exit] Launching FMC @ 0x40000130
3,410,315 UART:
3,410,331 UART: Running Caliptra FMC ...
3,410,739 UART:
3,410,793 UART: [state] CFI Enabled
3,421,191 UART: [fht] FMC Alias Private Key: 7
3,529,479 UART: [art] Extend RT PCRs Done
3,529,907 UART: [art] Lock RT PCRs Done
3,531,417 UART: [art] Populate DV Done
3,539,787 UART: [fht] FMC Alias Private Key: 7
3,540,845 UART: [art] Derive CDI
3,541,125 UART: [art] Store in in slot 0x4
3,626,666 UART: [art] Derive Key Pair
3,627,026 UART: [art] Store priv key in slot 0x5
3,640,330 UART: [art] Derive Key Pair - Done
3,654,942 UART: [art] Signing Cert with AUTHO
3,655,422 UART: RITY.KEYID = 7
3,670,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,727 UART: [art] PUB.X = 04CC01AAB784CF74094DA0A7C952B2423C4D159F7831676703281882C02C796C46815689A6284038D7A3294C7263757A
3,678,469 UART: [art] PUB.Y = C7E495BA8E73E0B704DFE1B56AE4FB8B805AFC67DDB0F500AAB3EBEA09EC01183F709205E8AB7A548FFD7FAAB8963702
3,685,408 UART: [art] SIG.R = 4197C881FE3A691398632644EA3115314538FA41FE65AF7EC46A9AF29D80BFA1639CE9B844A2F6F7B4ABCC357E16A47C
3,692,186 UART: [art] SIG.S = C70F9BB031D6BE127719BC34561BBD21A3B627F9B9DAF4776DFBDFAF909F7499468AE4118244982F172EEC309D250090
3,716,052 UART: Caliptra RT
3,716,305 UART: [state] CFI Enabled
3,824,389 UART: [rt] RT listening for mailbox commands...
3,825,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,009 UART: [rt]cmd =0x41544d4e, len=14344
4,233,668 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,942 ready_for_fw is high
1,055,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,172,174 >>> mbox cmd response: success
3,233,619 UART:
3,233,635 UART: Running Caliptra FMC ...
3,234,043 UART:
3,234,097 UART: [state] CFI Enabled
3,244,535 UART: [fht] FMC Alias Private Key: 7
3,352,605 UART: [art] Extend RT PCRs Done
3,353,033 UART: [art] Lock RT PCRs Done
3,354,683 UART: [art] Populate DV Done
3,362,769 UART: [fht] FMC Alias Private Key: 7
3,363,793 UART: [art] Derive CDI
3,364,073 UART: [art] Store in in slot 0x4
3,449,800 UART: [art] Derive Key Pair
3,450,160 UART: [art] Store priv key in slot 0x5
3,463,128 UART: [art] Derive Key Pair - Done
3,478,127 UART: [art] Signing Cert with AUTHO
3,478,607 UART: RITY.KEYID = 7
3,493,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,060 UART: [art] PUB.X = 39471F2D5030B0EBD46B208207FDFB8B79E1827ECAC601FAF988A423E9080DACB241817DCC56AF3C0F80D4015F96252F
3,500,822 UART: [art] PUB.Y = 32AF30E64AF270CE6D15D428E09FAC94C563FC18BA33262E76786EA5860979C5F2CF295F3462CB4879FD6DDA64085E91
3,507,772 UART: [art] SIG.R = F1A9985A5117B9C8E582964F2BA096EBE3087A01CD5AD93BA4329C3EE23B801B887DE1F0CEB2508766B5A76DBAA46C9F
3,514,550 UART: [art] SIG.S = CD5FC625F7BB0B532649003F71C38C3FDE7C81D3A7A65FF1B77A7471D1D4A2C35849A4D9F3EF69B9CF8551333C0CF037
3,538,255 UART: Caliptra RT
3,538,508 UART: [state] CFI Enabled
3,644,887 UART: [rt] RT listening for mailbox commands...
3,645,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,683 UART: [rt]cmd =0x41544d4e, len=14344
4,056,643 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
899,920 UART: [kat] SHA2-256
901,860 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,775 UART: [kat] LMS
1,169,087 UART: [kat] --
1,170,092 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 ready_for_fw is high
1,174,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,198,962 UART: [idev] Sha1 KeyId Algorithm
1,207,952 UART: [idev] --
1,208,979 UART: [ldev] ++
1,209,147 UART: [ldev] CDI.KEYID = 6
1,209,511 UART: [ldev] SUBJECT.KEYID = 5
1,209,938 UART: [ldev] AUTHORITY.KEYID = 7
1,210,401 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,959 UART: [ldev] --
1,281,423 UART: [fwproc] Wait for Commands...
1,282,060 UART: [fwproc] Recv command 0x46574c44
1,282,793 UART: [fwproc] Recv'd Img size: 114448 bytes
3,119,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,312,177 >>> mbox cmd response: success
3,313,424 UART: [afmc] ++
3,313,592 UART: [afmc] CDI.KEYID = 6
3,313,955 UART: [afmc] SUBJECT.KEYID = 7
3,314,381 UART: [afmc] AUTHORITY.KEYID = 5
3,349,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,216 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,926 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,816 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,527 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,291 UART: [afmc] --
3,392,281 UART: [cold-reset] --
3,393,003 UART: [state] Locking Datavault
3,394,040 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,644 UART: [state] Locking ICCM
3,395,204 UART: [exit] Launching FMC @ 0x40000130
3,400,533 UART:
3,400,549 UART: Running Caliptra FMC ...
3,400,957 UART:
3,401,100 UART: [state] CFI Enabled
3,411,824 UART: [fht] FMC Alias Private Key: 7
3,519,724 UART: [art] Extend RT PCRs Done
3,520,152 UART: [art] Lock RT PCRs Done
3,521,608 UART: [art] Populate DV Done
3,529,414 UART: [fht] FMC Alias Private Key: 7
3,530,438 UART: [art] Derive CDI
3,530,718 UART: [art] Store in in slot 0x4
3,616,111 UART: [art] Derive Key Pair
3,616,471 UART: [art] Store priv key in slot 0x5
3,629,665 UART: [art] Derive Key Pair - Done
3,644,749 UART: [art] Signing Cert with AUTHO
3,645,229 UART: RITY.KEYID = 7
3,660,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,462 UART: [art] PUB.X = 06D05B97F830E6229CC6A2DF10CD189B7BF81341ADD4FCCB18C403CD3182C762D51C3D976B28D39127B4C15A191FFB83
3,668,236 UART: [art] PUB.Y = 94FC5664664BA58C2B8D3B9FBD7C4F482E10031408621E924FB22D4681618788B8965306DAFC56D09165F3B7337116D7
3,675,169 UART: [art] SIG.R = 25140F4C69F04BC6641B18D33B7944495A6062DF96D22BF200F57E68593F3C6895DB92B62BE2278BADE950D384D860FB
3,681,914 UART: [art] SIG.S = 458D19CF2F0BEF463FBDC11C977789135D7B1CEB741F602B277B4677B9397E47DF03B50CF5038240C3CF690C132A0F39
3,705,533 UART: Caliptra RT
3,705,878 UART: [state] CFI Enabled
3,813,517 UART: [rt] RT listening for mailbox commands...
3,814,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,193 UART: [rt]cmd =0x41544d4e, len=14344
4,222,678 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,825 ready_for_fw is high
1,055,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,162,321 >>> mbox cmd response: success
3,224,412 UART:
3,224,428 UART: Running Caliptra FMC ...
3,224,836 UART:
3,224,979 UART: [state] CFI Enabled
3,235,567 UART: [fht] FMC Alias Private Key: 7
3,343,595 UART: [art] Extend RT PCRs Done
3,344,023 UART: [art] Lock RT PCRs Done
3,345,585 UART: [art] Populate DV Done
3,353,893 UART: [fht] FMC Alias Private Key: 7
3,355,003 UART: [art] Derive CDI
3,355,283 UART: [art] Store in in slot 0x4
3,440,896 UART: [art] Derive Key Pair
3,441,256 UART: [art] Store priv key in slot 0x5
3,454,666 UART: [art] Derive Key Pair - Done
3,469,512 UART: [art] Signing Cert with AUTHO
3,469,992 UART: RITY.KEYID = 7
3,485,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,143 UART: [art] PUB.X = DD138C2F6798320D76F34306EC1664F5E3180AEA785CF1972D1898FFEA00DCCC57FF6997D94ED1D27C33FC856ABF9582
3,492,892 UART: [art] PUB.Y = 02A7F4F677D5C9CC664946D28AF62AF375A36C740C2383B3B97E59000DDEDFC6FB61029AB451891C38E1B34AC3635DA0
3,499,816 UART: [art] SIG.R = 8576C8A2B0FB2D283A9FE7D1E33A2DE8FCECDBA0C0B7203704FCFA3A968EF450A9A65AA15016D12F4905EC96065EEDCF
3,506,601 UART: [art] SIG.S = B5EEAD30A2ABC38A64E6074B748AABF82551D164163820D6E11E743BF51F4A11ECD38607E49034988CAEDD04ACFFB5C7
3,530,257 UART: Caliptra RT
3,530,602 UART: [state] CFI Enabled
3,638,621 UART: [rt] RT listening for mailbox commands...
3,639,291 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,285 UART: [rt]cmd =0x41544d4e, len=14344
4,042,844 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,262 UART:
192,616 UART: Running Caliptra ROM ...
193,821 UART:
193,977 UART: [state] CFI Enabled
264,075 UART: [state] LifecycleState = Unprovisioned
265,999 UART: [state] DebugLocked = No
267,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,679 UART: [kat] SHA2-256
441,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,852 UART: [kat] ++
452,329 UART: [kat] sha1
463,133 UART: [kat] SHA2-256
465,785 UART: [kat] SHA2-384
472,341 UART: [kat] SHA2-512-ACC
474,705 UART: [kat] ECC-384
2,768,470 UART: [kat] HMAC-384Kdf
2,801,531 UART: [kat] LMS
3,991,860 UART: [kat] --
3,993,989 UART: [cold-reset] ++
3,995,295 UART: [fht] Storing FHT @ 0x50003400
4,007,811 UART: [idev] ++
4,008,409 UART: [idev] CDI.KEYID = 6
4,009,337 UART: [idev] SUBJECT.KEYID = 7
4,010,591 UART: [idev] UDS.KEYID = 0
4,011,701 ready_for_fw is high
4,011,933 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,383 UART: [idev] Erasing UDS.KEYID = 0
7,346,045 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,554 UART: [idev] --
7,371,526 UART: [ldev] ++
7,372,157 UART: [ldev] CDI.KEYID = 6
7,373,044 UART: [ldev] SUBJECT.KEYID = 5
7,374,315 UART: [ldev] AUTHORITY.KEYID = 7
7,375,495 UART: [ldev] FE.KEYID = 1
7,401,990 UART: [ldev] Erasing FE.KEYID = 1
10,735,000 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,880 UART: [ldev] --
13,097,258 UART: [fwproc] Waiting for Commands...
13,098,923 UART: [fwproc] Received command 0x46574c44
13,101,111 UART: [fwproc] Received Image of size 114124 bytes
17,149,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,223,647 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,292,553 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,610,497 >>> mbox cmd response: success
17,615,144 UART: [afmc] ++
17,615,732 UART: [afmc] CDI.KEYID = 6
17,616,645 UART: [afmc] SUBJECT.KEYID = 7
17,617,923 UART: [afmc] AUTHORITY.KEYID = 5
20,989,188 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,423 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,681 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,102 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,946 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,356 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,686 UART: [afmc] --
23,357,966 UART: [cold-reset] --
23,362,189 UART: [state] Locking Datavault
23,367,016 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,725 UART: [state] Locking ICCM
23,370,935 UART: [exit] Launching FMC @ 0x40000130
23,379,284 UART:
23,379,523 UART: Running Caliptra FMC ...
23,380,644 UART:
23,380,803 UART: [state] CFI Enabled
23,447,685 UART: [fht] FMC Alias Private Key: 7
25,785,196 UART: [art] Extend RT PCRs Done
25,786,415 UART: [art] Lock RT PCRs Done
25,788,011 UART: [art] Populate DV Done
25,793,263 UART: [fht] FMC Alias Private Key: 7
25,794,798 UART: [art] Derive CDI
25,795,564 UART: [art] Store in in slot 0x4
25,855,417 UART: [art] Derive Key Pair
25,856,449 UART: [art] Store priv key in slot 0x5
29,149,248 UART: [art] Derive Key Pair - Done
29,162,186 UART: [art] Signing Cert with AUTHO
29,163,489 UART: RITY.KEYID = 7
31,450,112 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,624 UART: [art] PUB.X = B3024D78B831A7C3CFD582D5DBF49D47FC2B48A98F88219939DF3CB75DE3EF7152ABBC669C427DDB0153FA4A983EF680
31,458,895 UART: [art] PUB.Y = 603D5041CF73F582DD42D4FD3AFBD4B68F666FA57FBBD1A364D0F1A75334FC13757ECECA666181FDE7D84A4E7DECD911
31,466,188 UART: [art] SIG.R = AAB7BE54F33A55189441DEDD207CC7767A534D2A8FBA350E812E58305F1C8E0DFE846D3D7D46688B9D37466B4DCDC103
31,473,576 UART: [art] SIG.S = 4F070EEB0C990F385CC59D1EEE31E2F9697E53B1CE7E9BDA42B363DD3F26090CB62B6F31981833C0CED7E6982EF62B12
32,778,868 UART: Caliptra RT
32,779,576 UART: [state] CFI Enabled
32,961,119 UART: [rt] RT listening for mailbox commands...
32,963,499 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,118,712 UART: [rt]cmd =0x41544d4e, len=14344
38,354,306 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,786,792 ready_for_fw is high
3,787,406 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,856,076 >>> mbox cmd response: success
23,551,005 UART:
23,551,419 UART: Running Caliptra FMC ...
23,552,564 UART:
23,552,726 UART: [state] CFI Enabled
23,617,643 UART: [fht] FMC Alias Private Key: 7
25,955,292 UART: [art] Extend RT PCRs Done
25,956,515 UART: [art] Lock RT PCRs Done
25,958,379 UART: [art] Populate DV Done
25,963,807 UART: [fht] FMC Alias Private Key: 7
25,965,514 UART: [art] Derive CDI
25,966,335 UART: [art] Store in in slot 0x4
26,024,792 UART: [art] Derive Key Pair
26,025,842 UART: [art] Store priv key in slot 0x5
29,318,686 UART: [art] Derive Key Pair - Done
29,331,905 UART: [art] Signing Cert with AUTHO
29,333,203 UART: RITY.KEYID = 7
31,619,527 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,036 UART: [art] PUB.X = 6F203C571D27345A0C30E097C8B41B2658D6B3B6C2529E9B7A7B0CC1DDDD8F92402618345D14BF830844FCF200DCAAE9
31,628,260 UART: [art] PUB.Y = 791E684A3156D274FDCF7630EE8A294E91FB8BE0BE8EC598985675798291982E51AE90A85A6F17CB3893A7906B3A1C6B
31,635,539 UART: [art] SIG.R = 4419442061187FCEBFE1DED9F10598EF97346064A67ABC423EC8F05F183E8231340C3F2E5A9F41B7B1C8D0AE1B22C298
31,642,955 UART: [art] SIG.S = 8C44761A7712D1741A5A8D79B727BB5D125F903506B6A03EF02AF69DC0575B1F6E0AF97B49628DAC0A6A5ACF08400D36
32,948,478 UART: Caliptra RT
32,949,191 UART: [state] CFI Enabled
33,109,946 UART: [rt] RT listening for mailbox commands...
33,112,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,267,495 UART: [rt]cmd =0x41544d4e, len=14344
38,502,758 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,180 UART:
192,568 UART: Running Caliptra ROM ...
193,709 UART:
603,355 UART: [state] CFI Enabled
612,411 UART: [state] LifecycleState = Unprovisioned
614,348 UART: [state] DebugLocked = No
617,070 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,779 UART: [kat] SHA2-256
792,577 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,099 UART: [kat] ++
803,543 UART: [kat] sha1
814,994 UART: [kat] SHA2-256
817,679 UART: [kat] SHA2-384
823,455 UART: [kat] SHA2-512-ACC
825,818 UART: [kat] ECC-384
3,109,836 UART: [kat] HMAC-384Kdf
3,120,107 UART: [kat] LMS
4,310,261 UART: [kat] --
4,315,137 UART: [cold-reset] ++
4,317,643 UART: [fht] Storing FHT @ 0x50003400
4,328,973 UART: [idev] ++
4,329,541 UART: [idev] CDI.KEYID = 6
4,330,527 UART: [idev] SUBJECT.KEYID = 7
4,331,765 UART: [idev] UDS.KEYID = 0
4,332,865 ready_for_fw is high
4,333,083 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,453 UART: [idev] Erasing UDS.KEYID = 0
7,622,882 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,338 UART: [idev] --
7,648,893 UART: [ldev] ++
7,649,456 UART: [ldev] CDI.KEYID = 6
7,650,466 UART: [ldev] SUBJECT.KEYID = 5
7,651,622 UART: [ldev] AUTHORITY.KEYID = 7
7,652,925 UART: [ldev] FE.KEYID = 1
7,665,300 UART: [ldev] Erasing FE.KEYID = 1
10,948,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,759 UART: [ldev] --
13,310,119 UART: [fwproc] Waiting for Commands...
13,313,236 UART: [fwproc] Received command 0x46574c44
13,315,414 UART: [fwproc] Received Image of size 114124 bytes
17,370,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,878 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,832,242 >>> mbox cmd response: success
17,836,520 UART: [afmc] ++
17,837,194 UART: [afmc] CDI.KEYID = 6
17,838,108 UART: [afmc] SUBJECT.KEYID = 7
17,839,318 UART: [afmc] AUTHORITY.KEYID = 5
21,152,825 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,410 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,778 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,615 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,026 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,869 UART: [afmc] --
23,517,591 UART: [cold-reset] --
23,522,374 UART: [state] Locking Datavault
23,528,212 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,965 UART: [state] Locking ICCM
23,531,887 UART: [exit] Launching FMC @ 0x40000130
23,540,288 UART:
23,540,588 UART: Running Caliptra FMC ...
23,541,702 UART:
23,541,861 UART: [state] CFI Enabled
23,549,969 UART: [fht] FMC Alias Private Key: 7
25,881,549 UART: [art] Extend RT PCRs Done
25,882,778 UART: [art] Lock RT PCRs Done
25,884,402 UART: [art] Populate DV Done
25,889,650 UART: [fht] FMC Alias Private Key: 7
25,891,142 UART: [art] Derive CDI
25,891,896 UART: [art] Store in in slot 0x4
25,934,930 UART: [art] Derive Key Pair
25,935,969 UART: [art] Store priv key in slot 0x5
29,178,146 UART: [art] Derive Key Pair - Done
29,190,979 UART: [art] Signing Cert with AUTHO
29,192,274 UART: RITY.KEYID = 7
31,471,545 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,059 UART: [art] PUB.X = 77810DAF8191104144D44EAC2B36144729CCE5CEBD08937378FCF81CE02C7EE37845589895AD086200A48EE78E52A35B
31,480,229 UART: [art] PUB.Y = 9709A5159F71267EE0DD8B904045A3A85D9B498117548DE5DB62FC772983910941314C754C518CE10E32B6BD063F3542
31,487,502 UART: [art] SIG.R = 92764DEA772D3E17C7E43E34807D65BDE32179F7773CFDC943C2594C2D26DCDFFC00575C1F061151871AE4FBA37AE21C
31,494,873 UART: [art] SIG.S = 8F24A976B7AA420156FCD46889DA5FACD9F042001806EAD9AFE4C8B0DF4931CD93CA8938A65731EF251262437D37B556
32,799,792 UART: Caliptra RT
32,800,495 UART: [state] CFI Enabled
32,918,027 UART: [rt] RT listening for mailbox commands...
32,920,354 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,075,687 UART: [rt]cmd =0x41544d4e, len=14344
38,310,999 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
4,128,787 ready_for_fw is high
4,129,210 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,066,775 >>> mbox cmd response: success
23,714,076 UART:
23,714,463 UART: Running Caliptra FMC ...
23,715,588 UART:
23,715,738 UART: [state] CFI Enabled
23,723,573 UART: [fht] FMC Alias Private Key: 7
26,054,741 UART: [art] Extend RT PCRs Done
26,055,971 UART: [art] Lock RT PCRs Done
26,057,441 UART: [art] Populate DV Done
26,062,739 UART: [fht] FMC Alias Private Key: 7
26,064,443 UART: [art] Derive CDI
26,065,252 UART: [art] Store in in slot 0x4
26,108,339 UART: [art] Derive Key Pair
26,109,399 UART: [art] Store priv key in slot 0x5
29,352,113 UART: [art] Derive Key Pair - Done
29,365,111 UART: [art] Signing Cert with AUTHO
29,366,603 UART: RITY.KEYID = 7
31,645,385 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,889 UART: [art] PUB.X = EC9E9947A897540B190702D91AC26B2BD92354F9B0949682454B9E7C55D80C6E0E226E0925274E6F91510A65C6DDEC00
31,654,072 UART: [art] PUB.Y = D0E2DF137B6418B5CE65CE5553B07AD0DB30C3FDCB1CA47C4066F885FA4372EEDFB1F18B2157DCDC6E446B92365434E1
31,661,375 UART: [art] SIG.R = 9290C356BDC4F53AB7B24068811ED55C602987D5E92E1E84A812C6B29EC96746F988B9014AE545A4E252F0FB234633CD
31,668,758 UART: [art] SIG.S = 3BDD0F7E33C388769F2A0A14EC111C1E6CBE8392C0CB0E700E7A8DEB62DE35FE7455300793991A8AFCC526CD5890FC47
32,974,211 UART: Caliptra RT
32,974,919 UART: [state] CFI Enabled
33,091,821 UART: [rt] RT listening for mailbox commands...
33,094,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,249,387 UART: [rt]cmd =0x41544d4e, len=14344
38,484,249 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,114 UART:
192,476 UART: Running Caliptra ROM ...
193,680 UART:
193,832 UART: [state] CFI Enabled
267,034 UART: [state] LifecycleState = Unprovisioned
268,936 UART: [state] DebugLocked = No
270,341 UART: [state] WD Timer not started. Device not locked for debugging
274,588 UART: [kat] SHA2-256
453,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,249 UART: [kat] ++
465,780 UART: [kat] sha1
475,950 UART: [kat] SHA2-256
478,961 UART: [kat] SHA2-384
485,872 UART: [kat] SHA2-512-ACC
488,828 UART: [kat] ECC-384
2,951,004 UART: [kat] HMAC-384Kdf
2,971,931 UART: [kat] LMS
3,501,386 UART: [kat] --
3,508,007 UART: [cold-reset] ++
3,509,230 UART: [fht] FHT @ 0x50003400
3,520,988 UART: [idev] ++
3,521,548 UART: [idev] CDI.KEYID = 6
3,522,578 UART: [idev] SUBJECT.KEYID = 7
3,523,676 UART: [idev] UDS.KEYID = 0
3,524,721 ready_for_fw is high
3,524,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,998 UART: [idev] Erasing UDS.KEYID = 0
6,025,628 UART: [idev] Sha1 KeyId Algorithm
6,049,879 UART: [idev] --
6,054,684 UART: [ldev] ++
6,055,272 UART: [ldev] CDI.KEYID = 6
6,056,196 UART: [ldev] SUBJECT.KEYID = 5
6,057,361 UART: [ldev] AUTHORITY.KEYID = 7
6,058,596 UART: [ldev] FE.KEYID = 1
6,100,635 UART: [ldev] Erasing FE.KEYID = 1
8,603,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,261 UART: [ldev] --
10,392,441 UART: [fwproc] Wait for Commands...
10,394,971 UART: [fwproc] Recv command 0x46574c44
10,397,062 UART: [fwproc] Recv'd Img size: 114448 bytes
13,798,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,871,025 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,258,715 >>> mbox cmd response: success
14,263,407 UART: [afmc] ++
14,264,001 UART: [afmc] CDI.KEYID = 6
14,264,919 UART: [afmc] SUBJECT.KEYID = 7
14,266,080 UART: [afmc] AUTHORITY.KEYID = 5
16,808,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,891 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,680 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,661 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,552 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,880 UART: [afmc] --
18,609,794 UART: [cold-reset] --
18,613,864 UART: [state] Locking Datavault
18,617,649 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,363 UART: [state] Locking ICCM
18,620,951 UART: [exit] Launching FMC @ 0x40000130
18,629,398 UART:
18,629,632 UART: Running Caliptra FMC ...
18,630,732 UART:
18,630,894 UART: [state] CFI Enabled
18,692,611 UART: [fht] FMC Alias Private Key: 7
20,456,160 UART: [art] Extend RT PCRs Done
20,457,370 UART: [art] Lock RT PCRs Done
20,459,045 UART: [art] Populate DV Done
20,464,088 UART: [fht] FMC Alias Private Key: 7
20,465,570 UART: [art] Derive CDI
20,466,330 UART: [art] Store in in slot 0x4
20,525,207 UART: [art] Derive Key Pair
20,526,243 UART: [art] Store priv key in slot 0x5
22,989,310 UART: [art] Derive Key Pair - Done
23,002,533 UART: [art] Signing Cert with AUTHO
23,003,845 UART: RITY.KEYID = 7
24,714,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,687 UART: [art] PUB.X = FC09D96E884CC3B7F25114A2E9D44D81DA5B32EE093C2A65073304DFE6810651B0E6A8C29650D1DC9C4AFE19EACA99DF
24,723,004 UART: [art] PUB.Y = C538A7E3AD19948F59C060C924C95CF1BA1466062AADDFFE9935DA0FED3FF966137261EAF7BF234F005F45B4BD67705D
24,730,227 UART: [art] SIG.R = 97B5B08F48C80E0E471CAAFB6B43684E71CB5118710EF71DF94854C00A8EAF68E34851710EE4A120CBE446F6ED9B9948
24,737,649 UART: [art] SIG.S = 5C93FE6CAF52A174C2ABA49CA0D855424462B5E030C70D3BD56D1344CC5E0AFE440A3C2D5108F189B9C6460EA1478FA7
25,716,710 UART: Caliptra RT
25,717,410 UART: [state] CFI Enabled
25,881,071 UART: [rt] RT listening for mailbox commands...
25,883,383 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,039,314 UART: [rt]cmd =0x41544d4e, len=14344
29,969,152 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,380,994 ready_for_fw is high
3,381,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,077,784 >>> mbox cmd response: success
18,382,287 UART:
18,382,674 UART: Running Caliptra FMC ...
18,383,815 UART:
18,383,976 UART: [state] CFI Enabled
18,448,174 UART: [fht] FMC Alias Private Key: 7
20,212,153 UART: [art] Extend RT PCRs Done
20,213,374 UART: [art] Lock RT PCRs Done
20,215,300 UART: [art] Populate DV Done
20,220,689 UART: [fht] FMC Alias Private Key: 7
20,222,279 UART: [art] Derive CDI
20,223,040 UART: [art] Store in in slot 0x4
20,281,118 UART: [art] Derive Key Pair
20,282,159 UART: [art] Store priv key in slot 0x5
22,745,101 UART: [art] Derive Key Pair - Done
22,758,188 UART: [art] Signing Cert with AUTHO
22,759,519 UART: RITY.KEYID = 7
24,471,307 UART: [art] Erasing AUTHORITY.KEYID = 7
24,472,810 UART: [art] PUB.X = 641ADC150F564644FE8F6A669825B1CA1F742DEB779A1899C7540221AF39246091C6564FF751686686C49BC336162B78
24,480,058 UART: [art] PUB.Y = 9D25FB3893B4D708FEE2F5CDE4490B64007EFB9A52B64EC5351235CEB23D0220DB959A06375DEAFEB4B67C59FE6DCCF1
24,487,318 UART: [art] SIG.R = 2227E1BEB46F59A1228D2695A0320FA8E4AE0EB827AF59C07C490EA46309DB3A68267F54DAA1B07AA21D723B6760DCC2
24,494,716 UART: [art] SIG.S = D98EAEFF468EF6E592702A6BDE14FD20D1DEE2EAB8EE69A7DA3439104B0E7A820E763991E91B8214517E67CDD2149C4E
25,473,598 UART: Caliptra RT
25,474,288 UART: [state] CFI Enabled
25,640,435 UART: [rt] RT listening for mailbox commands...
25,642,795 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,798,672 UART: [rt]cmd =0x41544d4e, len=14344
29,728,823 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,500 UART:
192,874 UART: Running Caliptra ROM ...
193,976 UART:
603,786 UART: [state] CFI Enabled
622,369 UART: [state] LifecycleState = Unprovisioned
624,270 UART: [state] DebugLocked = No
626,708 UART: [state] WD Timer not started. Device not locked for debugging
630,016 UART: [kat] SHA2-256
809,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,692 UART: [kat] ++
821,139 UART: [kat] sha1
833,350 UART: [kat] SHA2-256
836,353 UART: [kat] SHA2-384
844,037 UART: [kat] SHA2-512-ACC
847,038 UART: [kat] ECC-384
3,290,130 UART: [kat] HMAC-384Kdf
3,304,189 UART: [kat] LMS
3,833,652 UART: [kat] --
3,837,797 UART: [cold-reset] ++
3,839,016 UART: [fht] FHT @ 0x50003400
3,849,628 UART: [idev] ++
3,850,213 UART: [idev] CDI.KEYID = 6
3,851,133 UART: [idev] SUBJECT.KEYID = 7
3,852,295 UART: [idev] UDS.KEYID = 0
3,853,210 ready_for_fw is high
3,853,416 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,997,268 UART: [idev] Erasing UDS.KEYID = 0
6,327,043 UART: [idev] Sha1 KeyId Algorithm
6,349,135 UART: [idev] --
6,351,802 UART: [ldev] ++
6,352,370 UART: [ldev] CDI.KEYID = 6
6,353,249 UART: [ldev] SUBJECT.KEYID = 5
6,354,371 UART: [ldev] AUTHORITY.KEYID = 7
6,355,703 UART: [ldev] FE.KEYID = 1
6,364,477 UART: [ldev] Erasing FE.KEYID = 1
8,840,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,191 UART: [ldev] --
10,628,311 UART: [fwproc] Wait for Commands...
10,630,396 UART: [fwproc] Recv command 0x46574c44
10,632,478 UART: [fwproc] Recv'd Img size: 114448 bytes
14,038,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,496,290 >>> mbox cmd response: success
14,500,319 UART: [afmc] ++
14,500,944 UART: [afmc] CDI.KEYID = 6
14,501,828 UART: [afmc] SUBJECT.KEYID = 7
14,502,980 UART: [afmc] AUTHORITY.KEYID = 5
17,007,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,399 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,745,154 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,761,160 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,777,032 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,056 UART: [afmc] --
18,804,567 UART: [cold-reset] --
18,809,125 UART: [state] Locking Datavault
18,815,283 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,922 UART: [state] Locking ICCM
18,819,016 UART: [exit] Launching FMC @ 0x40000130
18,827,440 UART:
18,827,673 UART: Running Caliptra FMC ...
18,828,692 UART:
18,828,832 UART: [state] CFI Enabled
18,837,464 UART: [fht] FMC Alias Private Key: 7
20,594,170 UART: [art] Extend RT PCRs Done
20,595,389 UART: [art] Lock RT PCRs Done
20,596,872 UART: [art] Populate DV Done
20,602,222 UART: [fht] FMC Alias Private Key: 7
20,603,763 UART: [art] Derive CDI
20,604,520 UART: [art] Store in in slot 0x4
20,647,641 UART: [art] Derive Key Pair
20,648,637 UART: [art] Store priv key in slot 0x5
23,075,519 UART: [art] Derive Key Pair - Done
23,088,351 UART: [art] Signing Cert with AUTHO
23,089,650 UART: RITY.KEYID = 7
24,795,283 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,788 UART: [art] PUB.X = ECF33B48590E222F8C5E7550DC2240EFB17A5F3E1696FEAFEEC462783DC1D78D575D5E3B94768AA2F45BFC4C21A5998A
24,804,075 UART: [art] PUB.Y = C745D0E229A34196D788EA350EAFF23946D8E5BC5E5FE0629D622E826676475BFDE5061E9668CA25B2018EC16042920C
24,811,348 UART: [art] SIG.R = 70640C00D2B665878199D39E9500E564055C51A23FDF9D9362EA8AB4B9947A00798F91694C608FD889EB67F32DF51839
24,818,711 UART: [art] SIG.S = 7D0FDB0ABD415DB3CAD8C1A59CEB1AD62F42C4FA05D0AAD24402D6A3B24BF9CBB57E7FC84ED0C11D7B67854608260591
25,797,813 UART: Caliptra RT
25,798,492 UART: [state] CFI Enabled
25,915,991 UART: [rt] RT listening for mailbox commands...
25,918,333 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,073,580 UART: [rt]cmd =0x41544d4e, len=14344
30,004,389 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,697,131 ready_for_fw is high
3,697,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,678 >>> mbox cmd response: success
18,536,608 UART:
18,536,985 UART: Running Caliptra FMC ...
18,538,297 UART:
18,538,462 UART: [state] CFI Enabled
18,546,140 UART: [fht] FMC Alias Private Key: 7
20,302,554 UART: [art] Extend RT PCRs Done
20,303,776 UART: [art] Lock RT PCRs Done
20,305,294 UART: [art] Populate DV Done
20,310,999 UART: [fht] FMC Alias Private Key: 7
20,312,593 UART: [art] Derive CDI
20,313,406 UART: [art] Store in in slot 0x4
20,355,832 UART: [art] Derive Key Pair
20,356,829 UART: [art] Store priv key in slot 0x5
22,783,071 UART: [art] Derive Key Pair - Done
22,795,958 UART: [art] Signing Cert with AUTHO
22,797,259 UART: RITY.KEYID = 7
24,502,607 UART: [art] Erasing AUTHORITY.KEYID = 7
24,504,115 UART: [art] PUB.X = EB4CF8CC91B612A0D37E0A202AC35D729962973B4276FE0134BFF0A537FB3238A06564E3DED1034055E7517F04B309BF
24,511,392 UART: [art] PUB.Y = 6EBE1701EE66BDA0019CEBCD8FB2E692B4931966B2C9406F2553B1917CF3CBD4CE5F3F2072E6C3307E9A95ECB69B4C54
24,518,695 UART: [art] SIG.R = 037692D1B1929840A86472B82263F33373D81305CA4458444EA6645961D0396D066F76BE9693958F4A1D1D079A9B4FCD
24,525,995 UART: [art] SIG.S = 56FBF9A33B8A45BB72F9DB6389024C022398C6AD084AE17533F75F29DDC5A88335524E2A4EFF3A5505AFC34520CA6B97
25,505,697 UART: Caliptra RT
25,506,388 UART: [state] CFI Enabled
25,623,606 UART: [rt] RT listening for mailbox commands...
25,625,909 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,781,124 UART: [rt]cmd =0x41544d4e, len=14344
29,711,701 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,438,637 ready_for_fw is high
3,439,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,715,128 >>> mbox cmd response: success
19,005,070 UART:
19,005,468 UART: Running Caliptra FMC ...
19,006,579 UART:
19,006,748 UART: [state] CFI Enabled
19,075,022 UART: [fht] FMC Alias Private Key: 7
20,838,935 UART: [art] Extend RT PCRs Done
20,840,144 UART: [art] Lock RT PCRs Done
20,842,149 UART: [art] Populate DV Done
20,847,660 UART: [fht] FMC Alias Private Key: 7
20,849,196 UART: [art] Derive CDI
20,849,945 UART: [art] Store in in slot 0x4
20,907,825 UART: [art] Derive Key Pair
20,908,833 UART: [art] Store priv key in slot 0x5
23,371,622 UART: [art] Derive Key Pair - Done
23,384,407 UART: [art] Signing Cert with AUTHO
23,385,715 UART: RITY.KEYID = 7
25,097,810 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,325 UART: [art] PUB.X = D18D24A6072CE61DA9275C89CED09F57E02FA53CE3E52905094CC393ED71EEB5331A155DA1369F2E0A9F6C7FD4DDD05F
25,106,583 UART: [art] PUB.Y = 0D6986CEB2FC9E3B6EB4DC9BE7C783350E8045AFD0EAE265130175164C866AF7611A3E2CCA047DB3CDB770014E10FBE0
25,113,847 UART: [art] SIG.R = 6E2EF95A4978B49BFA65CB09B15B4515C3841B0C12A34E3AC97595806311AC1EE1B3E2CB541FAE90D276423313158930
25,121,187 UART: [art] SIG.S = 80C225271327779B1441F030322CC2643F61F48FEC28E8C866BDA15B9BCED94ED78DAD386E9956CFBFDB6AF2FC231080
26,100,168 UART: Caliptra RT
26,100,870 UART: [state] CFI Enabled
26,265,389 UART: [rt] RT listening for mailbox commands...
26,267,686 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,423,452 UART: [rt]cmd =0x41544d4e, len=14344
30,353,602 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,755,211 ready_for_fw is high
3,755,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,989 >>> mbox cmd response: success
19,198,756 UART:
19,199,147 UART: Running Caliptra FMC ...
19,200,331 UART:
19,200,495 UART: [state] CFI Enabled
19,208,474 UART: [fht] FMC Alias Private Key: 7
20,965,210 UART: [art] Extend RT PCRs Done
20,966,436 UART: [art] Lock RT PCRs Done
20,968,057 UART: [art] Populate DV Done
20,973,675 UART: [fht] FMC Alias Private Key: 7
20,975,371 UART: [art] Derive CDI
20,976,181 UART: [art] Store in in slot 0x4
21,018,939 UART: [art] Derive Key Pair
21,019,938 UART: [art] Store priv key in slot 0x5
23,446,656 UART: [art] Derive Key Pair - Done
23,459,875 UART: [art] Signing Cert with AUTHO
23,461,174 UART: RITY.KEYID = 7
25,166,691 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,204 UART: [art] PUB.X = 73DD27F4153B869BCDE26D1CB1340EC28481C331ED76C49EC0996F3FAC779380EAD1D8580518C76B61AD75D4A5E57611
25,175,486 UART: [art] PUB.Y = 24CFE5C2E7EAB918E1C05EB0E395E96D980F8C501DD307A19292D6A1A63CECE2815798FA3CAE88FB91B1569F6D08C28F
25,182,737 UART: [art] SIG.R = 5AAF8996CC62E223258915C9A849BE8D5AD3531EC112796428050C8E902E414F72BA4AFBCBD6D1DCF101A560EB7E80A8
25,190,148 UART: [art] SIG.S = 44FE78128E7A193836EF534A7F52E4664F708A3A6FC6C109DCEC4D620A95F9EF42BACE67513D64D028C2C6F564A64B4E
26,169,355 UART: Caliptra RT
26,170,072 UART: [state] CFI Enabled
26,286,223 UART: [rt] RT listening for mailbox commands...
26,288,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,443,765 UART: [rt]cmd =0x41544d4e, len=14344
30,374,436 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,051 UART: [kat] SHA2-256
881,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,097 UART: [kat] ++
886,249 UART: [kat] sha1
890,353 UART: [kat] SHA2-256
892,291 UART: [kat] SHA2-384
894,934 UART: [kat] SHA2-512-ACC
896,835 UART: [kat] ECC-384
902,724 UART: [kat] HMAC-384Kdf
907,380 UART: [kat] LMS
1,475,576 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,763 UART: [fht] Storing FHT @ 0x50003400
1,479,564 UART: [idev] ++
1,479,732 UART: [idev] CDI.KEYID = 6
1,480,092 UART: [idev] SUBJECT.KEYID = 7
1,480,516 UART: [idev] UDS.KEYID = 0
1,480,861 ready_for_fw is high
1,480,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,752 UART: [idev] Erasing UDS.KEYID = 0
1,505,382 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,070 UART: [idev] --
1,515,027 UART: [ldev] ++
1,515,195 UART: [ldev] CDI.KEYID = 6
1,515,558 UART: [ldev] SUBJECT.KEYID = 5
1,515,984 UART: [ldev] AUTHORITY.KEYID = 7
1,516,447 UART: [ldev] FE.KEYID = 1
1,521,481 UART: [ldev] Erasing FE.KEYID = 1
1,547,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,028 UART: [ldev] --
1,586,387 UART: [fwproc] Waiting for Commands...
1,587,116 UART: [fwproc] Received command 0x46574c44
1,587,907 UART: [fwproc] Received Image of size 114448 bytes
2,887,942 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,380 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,732 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,677 >>> mbox cmd response: success
3,081,743 UART: [afmc] ++
3,081,911 UART: [afmc] CDI.KEYID = 6
3,082,273 UART: [afmc] SUBJECT.KEYID = 7
3,082,698 UART: [afmc] AUTHORITY.KEYID = 5
3,118,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,497 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,005 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,890 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,580 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,527 UART: [afmc] --
3,161,609 UART: [cold-reset] --
3,162,361 UART: [state] Locking Datavault
3,163,584 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,188 UART: [state] Locking ICCM
3,164,860 UART: [exit] Launching FMC @ 0x40000130
3,170,189 UART:
3,170,205 UART: Running Caliptra FMC ...
3,170,613 UART:
3,170,667 UART: [state] CFI Enabled
3,181,294 UART: [fht] FMC Alias Private Key: 7
3,289,851 UART: [art] Extend RT PCRs Done
3,290,279 UART: [art] Lock RT PCRs Done
3,291,923 UART: [art] Populate DV Done
3,300,188 UART: [fht] FMC Alias Private Key: 7
3,301,178 UART: [art] Derive CDI
3,301,458 UART: [art] Store in in slot 0x4
3,386,907 UART: [art] Derive Key Pair
3,387,267 UART: [art] Store priv key in slot 0x5
3,400,379 UART: [art] Derive Key Pair - Done
3,415,376 UART: [art] Signing Cert with AUTHO
3,415,856 UART: RITY.KEYID = 7
3,431,052 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,817 UART: [art] PUB.X = 80D67912547A4D0E50AEF1DBEB644A8E26EBEDE316B51F422DF182B5E3E5B3A516BA6EBF068ACF31855B1FC780C12CBA
3,438,603 UART: [art] PUB.Y = A7A035F079EA96AF841510E207678DD4F8AE9A0C2756605A47ECC7D22AD62A9F2A995F69CBCE05988223FB5D6F349B10
3,445,552 UART: [art] SIG.R = 20F98E885D88FF92F44B3C2B67676C817EECD2FD855561B37BAA6399B326BB944BB5203DE4ECCDB144907EFE8D475749
3,452,332 UART: [art] SIG.S = 5BF3629D30B093E690F06F04DFC6C66EF784B5C645D156EF125F709AF5D800EA8C8D86F77C1404E036EA200286CE7D8E
3,476,128 UART: Caliptra RT
3,476,381 UART: [state] CFI Enabled
3,583,871 UART: [rt] RT listening for mailbox commands...
3,584,541 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,695 UART: [rt]cmd =0x41544d4e, len=14344
3,852,274 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,253 ready_for_fw is high
1,362,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,503 >>> mbox cmd response: success
2,991,795 UART:
2,991,811 UART: Running Caliptra FMC ...
2,992,219 UART:
2,992,273 UART: [state] CFI Enabled
3,003,172 UART: [fht] FMC Alias Private Key: 7
3,111,125 UART: [art] Extend RT PCRs Done
3,111,553 UART: [art] Lock RT PCRs Done
3,112,957 UART: [art] Populate DV Done
3,121,042 UART: [fht] FMC Alias Private Key: 7
3,122,206 UART: [art] Derive CDI
3,122,486 UART: [art] Store in in slot 0x4
3,208,401 UART: [art] Derive Key Pair
3,208,761 UART: [art] Store priv key in slot 0x5
3,221,513 UART: [art] Derive Key Pair - Done
3,236,465 UART: [art] Signing Cert with AUTHO
3,236,945 UART: RITY.KEYID = 7
3,252,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,124 UART: [art] PUB.X = ED4F5AA84B9F28A1F581E64ADD128F5E697101F5E4D899D7381AE554C9A107B65EA8A76191D7B96D197CF7E01503E38A
3,259,893 UART: [art] PUB.Y = 75DD77D155FAA018D01290CB9B2DF04A76594CF11A187088CB82CC654BCDDFB01043B97CC7763C7DD72AE7BD854BB551
3,266,857 UART: [art] SIG.R = B5BF7019BFB13CB2CD1E745DB4B7C8BDEDEAC5DDFA2237974A3A169893FB6B144BF2398F4C8AE571D2D31DC207B8A543
3,273,648 UART: [art] SIG.S = 81C9CE5359DA77CD4217EFF4D49BF7D70CA519A05892219C8FA23C8598241193F9064595D203E61C2B9C571C4B213C6D
3,297,952 UART: Caliptra RT
3,298,205 UART: [state] CFI Enabled
3,405,305 UART: [rt] RT listening for mailbox commands...
3,405,975 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,725 UART: [rt]cmd =0x41544d4e, len=14344
3,673,596 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,236 UART: [kat] SHA2-256
882,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,282 UART: [kat] ++
886,434 UART: [kat] sha1
890,438 UART: [kat] SHA2-256
892,376 UART: [kat] SHA2-384
895,145 UART: [kat] SHA2-512-ACC
897,046 UART: [kat] ECC-384
902,591 UART: [kat] HMAC-384Kdf
907,199 UART: [kat] LMS
1,475,395 UART: [kat] --
1,476,204 UART: [cold-reset] ++
1,476,736 UART: [fht] Storing FHT @ 0x50003400
1,479,455 UART: [idev] ++
1,479,623 UART: [idev] CDI.KEYID = 6
1,479,983 UART: [idev] SUBJECT.KEYID = 7
1,480,407 UART: [idev] UDS.KEYID = 0
1,480,752 ready_for_fw is high
1,480,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,743 UART: [idev] Erasing UDS.KEYID = 0
1,505,653 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,259 UART: [idev] --
1,515,214 UART: [ldev] ++
1,515,382 UART: [ldev] CDI.KEYID = 6
1,515,745 UART: [ldev] SUBJECT.KEYID = 5
1,516,171 UART: [ldev] AUTHORITY.KEYID = 7
1,516,634 UART: [ldev] FE.KEYID = 1
1,521,584 UART: [ldev] Erasing FE.KEYID = 1
1,546,729 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,679 UART: [ldev] --
1,586,184 UART: [fwproc] Waiting for Commands...
1,586,971 UART: [fwproc] Received command 0x46574c44
1,587,762 UART: [fwproc] Received Image of size 114448 bytes
2,886,605 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,055 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,407 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,516 >>> mbox cmd response: success
3,080,772 UART: [afmc] ++
3,080,940 UART: [afmc] CDI.KEYID = 6
3,081,302 UART: [afmc] SUBJECT.KEYID = 7
3,081,727 UART: [afmc] AUTHORITY.KEYID = 5
3,117,042 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,246 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,026 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,639 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,329 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,028 UART: [afmc] --
3,160,034 UART: [cold-reset] --
3,160,860 UART: [state] Locking Datavault
3,162,031 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,635 UART: [state] Locking ICCM
3,163,241 UART: [exit] Launching FMC @ 0x40000130
3,168,570 UART:
3,168,586 UART: Running Caliptra FMC ...
3,168,994 UART:
3,169,137 UART: [state] CFI Enabled
3,179,766 UART: [fht] FMC Alias Private Key: 7
3,287,665 UART: [art] Extend RT PCRs Done
3,288,093 UART: [art] Lock RT PCRs Done
3,289,723 UART: [art] Populate DV Done
3,298,136 UART: [fht] FMC Alias Private Key: 7
3,299,174 UART: [art] Derive CDI
3,299,454 UART: [art] Store in in slot 0x4
3,385,333 UART: [art] Derive Key Pair
3,385,693 UART: [art] Store priv key in slot 0x5
3,398,929 UART: [art] Derive Key Pair - Done
3,413,444 UART: [art] Signing Cert with AUTHO
3,413,924 UART: RITY.KEYID = 7
3,429,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,153 UART: [art] PUB.X = 98D1AE28E0BB90857DDF820950E6DB45B04B6EE749AC3F45BC63CB1AFAE573695F6C6383B556DD7AE5A03FBF88BA5347
3,436,938 UART: [art] PUB.Y = A43A07AE730A8973BEBE2BD9EBF687B327721D74CC786356A9C11D9352FC20B37F34FA97D95CEE4E6B1E9CCFFEF3C86C
3,443,904 UART: [art] SIG.R = DEE9A9E3C91D84403C77E3D1FE81E1FE62AC6FCA20EB0819CC8CEF4ADB0BC9B009F194AE5B783B83684A2AF2A480CFDB
3,450,695 UART: [art] SIG.S = 65CF3CC660CB7E61BAE0A8331AC60F9E675935C9950944C189BD9E3C80EA05CA0BC9FEA5B1E35EF19C223EEA63E4FA51
3,474,756 UART: Caliptra RT
3,475,101 UART: [state] CFI Enabled
3,584,128 UART: [rt] RT listening for mailbox commands...
3,584,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,892 UART: [rt]cmd =0x41544d4e, len=14344
3,852,539 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,716 ready_for_fw is high
1,362,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,188 >>> mbox cmd response: success
2,991,190 UART:
2,991,206 UART: Running Caliptra FMC ...
2,991,614 UART:
2,991,757 UART: [state] CFI Enabled
3,002,484 UART: [fht] FMC Alias Private Key: 7
3,110,257 UART: [art] Extend RT PCRs Done
3,110,685 UART: [art] Lock RT PCRs Done
3,112,437 UART: [art] Populate DV Done
3,120,862 UART: [fht] FMC Alias Private Key: 7
3,121,804 UART: [art] Derive CDI
3,122,084 UART: [art] Store in in slot 0x4
3,207,203 UART: [art] Derive Key Pair
3,207,563 UART: [art] Store priv key in slot 0x5
3,220,215 UART: [art] Derive Key Pair - Done
3,234,879 UART: [art] Signing Cert with AUTHO
3,235,359 UART: RITY.KEYID = 7
3,250,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,500 UART: [art] PUB.X = C6EA6732642B6D6D3E21ED59A6A63DBFDD15B1999210AC5750AC223571200D93B689835FB13A550A74CC2EE0A8BAF0FA
3,258,276 UART: [art] PUB.Y = 8F0FE244FD20493BF5CE6694BACB94338187896C17D81DA110B6CE0B3A5A8E61D7FA73F01D36A7F61EDEC209B45F0EEE
3,265,232 UART: [art] SIG.R = 5E8B6238E125DEF749A39D930EC6EB8417952DF96DCFDAE780D1DA0FC3B168E12990B941F7F2043E59A5E0013120D0FC
3,272,000 UART: [art] SIG.S = 49E78851F3780879B06D47C65CCFD3B913905ED2CA413F19D7B1F139DD4B1E8523E677CDED31273CC0727BA5A4BA3EBA
3,296,214 UART: Caliptra RT
3,296,559 UART: [state] CFI Enabled
3,404,905 UART: [rt] RT listening for mailbox commands...
3,405,575 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,625 UART: [rt]cmd =0x41544d4e, len=14344
3,672,704 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
893,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,363 UART: [kat] ++
897,515 UART: [kat] sha1
901,777 UART: [kat] SHA2-256
903,717 UART: [kat] SHA2-384
906,434 UART: [kat] SHA2-512-ACC
908,335 UART: [kat] ECC-384
918,174 UART: [kat] HMAC-384Kdf
922,850 UART: [kat] LMS
1,171,178 UART: [kat] --
1,171,971 UART: [cold-reset] ++
1,172,507 UART: [fht] FHT @ 0x50003400
1,174,980 UART: [idev] ++
1,175,148 UART: [idev] CDI.KEYID = 6
1,175,508 UART: [idev] SUBJECT.KEYID = 7
1,175,932 UART: [idev] UDS.KEYID = 0
1,176,277 ready_for_fw is high
1,176,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,830 UART: [idev] Erasing UDS.KEYID = 0
1,201,265 UART: [idev] Sha1 KeyId Algorithm
1,209,779 UART: [idev] --
1,211,051 UART: [ldev] ++
1,211,219 UART: [ldev] CDI.KEYID = 6
1,211,582 UART: [ldev] SUBJECT.KEYID = 5
1,212,008 UART: [ldev] AUTHORITY.KEYID = 7
1,212,471 UART: [ldev] FE.KEYID = 1
1,217,599 UART: [ldev] Erasing FE.KEYID = 1
1,243,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,397 UART: [ldev] --
1,282,742 UART: [fwproc] Wait for Commands...
1,283,444 UART: [fwproc] Recv command 0x46574c44
1,284,172 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,015 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,222 >>> mbox cmd response: success
2,777,306 UART: [afmc] ++
2,777,474 UART: [afmc] CDI.KEYID = 6
2,777,836 UART: [afmc] SUBJECT.KEYID = 7
2,778,261 UART: [afmc] AUTHORITY.KEYID = 5
2,813,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,125 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,853 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,738 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,457 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,463 UART: [afmc] --
2,856,523 UART: [cold-reset] --
2,857,381 UART: [state] Locking Datavault
2,858,616 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,220 UART: [state] Locking ICCM
2,859,786 UART: [exit] Launching FMC @ 0x40000130
2,865,115 UART:
2,865,131 UART: Running Caliptra FMC ...
2,865,539 UART:
2,865,593 UART: [state] CFI Enabled
2,875,878 UART: [fht] FMC Alias Private Key: 7
2,984,161 UART: [art] Extend RT PCRs Done
2,984,589 UART: [art] Lock RT PCRs Done
2,986,489 UART: [art] Populate DV Done
2,994,902 UART: [fht] FMC Alias Private Key: 7
2,995,880 UART: [art] Derive CDI
2,996,160 UART: [art] Store in in slot 0x4
3,081,649 UART: [art] Derive Key Pair
3,082,009 UART: [art] Store priv key in slot 0x5
3,095,025 UART: [art] Derive Key Pair - Done
3,109,844 UART: [art] Signing Cert with AUTHO
3,110,324 UART: RITY.KEYID = 7
3,125,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,201 UART: [art] PUB.X = 5B5CEC485AC250A770BA10067BB0D180994572E1739C05CD44824D9EAEF682F08D8E7D3A502C336DC014EFD314FF4778
3,132,971 UART: [art] PUB.Y = 1D44359C8A003D5EA9CA7F78C886F3CD1860152E24A9A7FCC4863190A7DB793CBC3063E957F2FD37A4003A3FCB336493
3,139,883 UART: [art] SIG.R = F5B339B1171C60CD7826AF12356F3721B7C5A6AEDEB24ACA0A0B7CDFFBBDD2C3AE200D84753CCD50C729AC0C938F7214
3,146,663 UART: [art] SIG.S = 1EF60562D0467F231549A5FCC20E383DD6F8C4ECCDE0742856E3A14F911B85C258FE4A736DC030C8BED1DC1362C17D03
3,170,769 UART: Caliptra RT
3,171,022 UART: [state] CFI Enabled
3,278,735 UART: [rt] RT listening for mailbox commands...
3,279,405 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,211 UART: [rt]cmd =0x41544d4e, len=14344
3,546,554 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,137 ready_for_fw is high
1,060,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,889 >>> mbox cmd response: success
2,689,931 UART:
2,689,947 UART: Running Caliptra FMC ...
2,690,355 UART:
2,690,409 UART: [state] CFI Enabled
2,700,874 UART: [fht] FMC Alias Private Key: 7
2,808,675 UART: [art] Extend RT PCRs Done
2,809,103 UART: [art] Lock RT PCRs Done
2,810,789 UART: [art] Populate DV Done
2,819,238 UART: [fht] FMC Alias Private Key: 7
2,820,264 UART: [art] Derive CDI
2,820,544 UART: [art] Store in in slot 0x4
2,905,897 UART: [art] Derive Key Pair
2,906,257 UART: [art] Store priv key in slot 0x5
2,919,697 UART: [art] Derive Key Pair - Done
2,934,273 UART: [art] Signing Cert with AUTHO
2,934,753 UART: RITY.KEYID = 7
2,950,011 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,776 UART: [art] PUB.X = 27383914E7155AD7946C727599DAF35049B2B049F55BE8280FE6CA5EDAE937BD25C1EFF822EE3FFA662663BD8EBA824D
2,957,555 UART: [art] PUB.Y = A1479899686E65FE483CD19D24F8547C91E86D6336E5CC6701251E82C1882E5449766915E724E476078757DE899EBF3D
2,964,487 UART: [art] SIG.R = ABD5F636A0CFBBA4C9C76520786D273B83C6DE3EFB0B15A2392ADDCFB57E58F33F957BB8C4CE7006CC80E479089C06D9
2,971,265 UART: [art] SIG.S = 6EC48C0FFCE29F6CBD7A9B66AF5B3874A55DCF4F3FB8F02380F0126413ECA8E6D710148DF00530A64336A9E88144DBC1
2,995,092 UART: Caliptra RT
2,995,345 UART: [state] CFI Enabled
3,103,962 UART: [rt] RT listening for mailbox commands...
3,104,632 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,310 UART: [rt]cmd =0x41544d4e, len=14344
3,371,799 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
893,781 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,906 UART: [kat] ++
898,058 UART: [kat] sha1
902,448 UART: [kat] SHA2-256
904,388 UART: [kat] SHA2-384
907,117 UART: [kat] SHA2-512-ACC
909,018 UART: [kat] ECC-384
918,661 UART: [kat] HMAC-384Kdf
923,479 UART: [kat] LMS
1,171,807 UART: [kat] --
1,172,700 UART: [cold-reset] ++
1,173,044 UART: [fht] FHT @ 0x50003400
1,175,737 UART: [idev] ++
1,175,905 UART: [idev] CDI.KEYID = 6
1,176,265 UART: [idev] SUBJECT.KEYID = 7
1,176,689 UART: [idev] UDS.KEYID = 0
1,177,034 ready_for_fw is high
1,177,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,019 UART: [idev] Erasing UDS.KEYID = 0
1,202,316 UART: [idev] Sha1 KeyId Algorithm
1,210,860 UART: [idev] --
1,211,880 UART: [ldev] ++
1,212,048 UART: [ldev] CDI.KEYID = 6
1,212,411 UART: [ldev] SUBJECT.KEYID = 5
1,212,837 UART: [ldev] AUTHORITY.KEYID = 7
1,213,300 UART: [ldev] FE.KEYID = 1
1,218,284 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,738 UART: [ldev] --
1,284,189 UART: [fwproc] Wait for Commands...
1,284,865 UART: [fwproc] Recv command 0x46574c44
1,285,593 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,185 >>> mbox cmd response: success
2,778,193 UART: [afmc] ++
2,778,361 UART: [afmc] CDI.KEYID = 6
2,778,723 UART: [afmc] SUBJECT.KEYID = 7
2,779,148 UART: [afmc] AUTHORITY.KEYID = 5
2,815,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,700 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,585 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,304 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,056 UART: [afmc] --
2,858,054 UART: [cold-reset] --
2,858,830 UART: [state] Locking Datavault
2,859,941 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,545 UART: [state] Locking ICCM
2,861,023 UART: [exit] Launching FMC @ 0x40000130
2,866,352 UART:
2,866,368 UART: Running Caliptra FMC ...
2,866,776 UART:
2,866,919 UART: [state] CFI Enabled
2,877,550 UART: [fht] FMC Alias Private Key: 7
2,984,959 UART: [art] Extend RT PCRs Done
2,985,387 UART: [art] Lock RT PCRs Done
2,986,761 UART: [art] Populate DV Done
2,995,258 UART: [fht] FMC Alias Private Key: 7
2,996,412 UART: [art] Derive CDI
2,996,692 UART: [art] Store in in slot 0x4
3,082,027 UART: [art] Derive Key Pair
3,082,387 UART: [art] Store priv key in slot 0x5
3,095,547 UART: [art] Derive Key Pair - Done
3,110,213 UART: [art] Signing Cert with AUTHO
3,110,693 UART: RITY.KEYID = 7
3,125,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,612 UART: [art] PUB.X = 59156F9BAECF24D93DA32E509772D521D320BCD2513F697CCFF284F53D19918122B760A9DE3230F7C6D04A36D3F77A8F
3,133,388 UART: [art] PUB.Y = F587347C63BA84D02978F5D9FD3C8DE95B846EA92E39D4245FBCD57FA4F04B76118BE475B57DDE85FCCEEB84CAC528C2
3,140,358 UART: [art] SIG.R = 0C2096837E5F972EC01714F62538AE5C429C2611FAB6311247B6AEC82C5D619AA9579C57B1A3E395B888088CB0FFA625
3,147,122 UART: [art] SIG.S = 43BC825F3CC0B41F48723C1B1B4BAD6AA0E2D574B3DA0186ADCCE9E8FFD7AC48158EAB8C4DDDF0A58394169A5F098321
3,171,197 UART: Caliptra RT
3,171,542 UART: [state] CFI Enabled
3,278,443 UART: [rt] RT listening for mailbox commands...
3,279,113 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,227 UART: [rt]cmd =0x41544d4e, len=14344
3,547,256 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,612 ready_for_fw is high
1,060,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,616 >>> mbox cmd response: success
2,691,802 UART:
2,691,818 UART: Running Caliptra FMC ...
2,692,226 UART:
2,692,369 UART: [state] CFI Enabled
2,703,162 UART: [fht] FMC Alias Private Key: 7
2,811,089 UART: [art] Extend RT PCRs Done
2,811,517 UART: [art] Lock RT PCRs Done
2,813,111 UART: [art] Populate DV Done
2,821,002 UART: [fht] FMC Alias Private Key: 7
2,822,094 UART: [art] Derive CDI
2,822,374 UART: [art] Store in in slot 0x4
2,908,059 UART: [art] Derive Key Pair
2,908,419 UART: [art] Store priv key in slot 0x5
2,921,553 UART: [art] Derive Key Pair - Done
2,936,653 UART: [art] Signing Cert with AUTHO
2,937,133 UART: RITY.KEYID = 7
2,952,375 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,140 UART: [art] PUB.X = BD2132105FBE9818941547585759E78FF04149AB6D3441E9DFED8974597FDBC4ADCE0EF4FA2821B30BD3A333E14F3D98
2,959,912 UART: [art] PUB.Y = 761C38D2704BBF247ED0E84B3065FB1D82A323E902350C6CE54022EFD4F66DE539D9179E597075204A134B56E0795B52
2,966,852 UART: [art] SIG.R = 0DFD928AF9DB080DDDBEBF667B304F6F94B73E31664AEECCF5F41258E0ACB20121587B7B663D72D7BB14A2E1204CE815
2,973,628 UART: [art] SIG.S = 921B4583CEA484C5A4A243C1EAA2E2F6E3FCF46CA8D27E0552C08FD551BB99DA035F9C0F11E842D19E2A97490651A6A3
2,997,373 UART: Caliptra RT
2,997,718 UART: [state] CFI Enabled
3,105,285 UART: [rt] RT listening for mailbox commands...
3,105,955 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,791 UART: [rt]cmd =0x41544d4e, len=14344
3,373,290 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
88,048 UART: [kat] SHA2-256
891,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,784 UART: [kat] SHA2-512-ACC
906,685 UART: [kat] ECC-384
916,628 UART: [kat] HMAC-384Kdf
921,318 UART: [kat] LMS
1,169,630 UART: [kat] --
1,170,475 UART: [cold-reset] ++
1,170,893 UART: [fht] FHT @ 0x50003400
1,173,741 UART: [idev] ++
1,173,909 UART: [idev] CDI.KEYID = 6
1,174,270 UART: [idev] SUBJECT.KEYID = 7
1,174,695 UART: [idev] UDS.KEYID = 0
1,175,041 ready_for_fw is high
1,175,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,489 UART: [idev] Erasing UDS.KEYID = 0
1,199,995 UART: [idev] Sha1 KeyId Algorithm
1,208,853 UART: [idev] --
1,210,006 UART: [ldev] ++
1,210,174 UART: [ldev] CDI.KEYID = 6
1,210,538 UART: [ldev] SUBJECT.KEYID = 5
1,210,965 UART: [ldev] AUTHORITY.KEYID = 7
1,211,428 UART: [ldev] FE.KEYID = 1
1,216,716 UART: [ldev] Erasing FE.KEYID = 1
1,242,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,480 UART: [ldev] --
1,281,854 UART: [fwproc] Wait for Commands...
1,282,497 UART: [fwproc] Recv command 0x46574c44
1,283,230 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,387 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,628 >>> mbox cmd response: success
2,775,679 UART: [afmc] ++
2,775,847 UART: [afmc] CDI.KEYID = 6
2,776,210 UART: [afmc] SUBJECT.KEYID = 7
2,776,636 UART: [afmc] AUTHORITY.KEYID = 5
2,812,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,516 UART: [afmc] --
2,855,438 UART: [cold-reset] --
2,856,242 UART: [state] Locking Datavault
2,857,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,991 UART: [state] Locking ICCM
2,858,597 UART: [exit] Launching FMC @ 0x40000130
2,863,926 UART:
2,863,942 UART: Running Caliptra FMC ...
2,864,350 UART:
2,864,404 UART: [state] CFI Enabled
2,874,793 UART: [fht] FMC Alias Private Key: 7
2,982,584 UART: [art] Extend RT PCRs Done
2,983,012 UART: [art] Lock RT PCRs Done
2,984,154 UART: [art] Populate DV Done
2,992,313 UART: [fht] FMC Alias Private Key: 7
2,993,325 UART: [art] Derive CDI
2,993,605 UART: [art] Store in in slot 0x4
3,078,796 UART: [art] Derive Key Pair
3,079,156 UART: [art] Store priv key in slot 0x5
3,092,144 UART: [art] Derive Key Pair - Done
3,106,823 UART: [art] Signing Cert with AUTHO
3,107,303 UART: RITY.KEYID = 7
3,122,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,326 UART: [art] PUB.X = 4438E149E764D0CC2EB316C4EDC8C663A182E763C1AE134CCA34BF388D5AC67BE10C7CD279CB17E0F7FCB2C4F1CE0D51
3,130,112 UART: [art] PUB.Y = 05B1D274C3FB9B985E37F891F8A84ED4B921B3C250C5FCDC31DC939149045A0E6CD1BF182EB674281754795FD4040CE3
3,137,053 UART: [art] SIG.R = 0593BE3EB8C74E055B9CE146F7CA99E5F5CE0B76D4D9474D1D42DD8340482EE7016497E2865E355D7148F8505115EAD0
3,143,813 UART: [art] SIG.S = 9748747C7FA72E87BE8D7D3F6EBFB900342E0F079643BDF98A27018F6E69B98AF1C20EB1306D674279CE22C70A0D6CA4
3,167,878 UART: Caliptra RT
3,168,131 UART: [state] CFI Enabled
3,275,092 UART: [rt] RT listening for mailbox commands...
3,275,762 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,640 UART: [rt]cmd =0x41544d4e, len=14344
3,542,591 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,662 ready_for_fw is high
1,055,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,208 >>> mbox cmd response: success
2,683,682 UART:
2,683,698 UART: Running Caliptra FMC ...
2,684,106 UART:
2,684,160 UART: [state] CFI Enabled
2,694,533 UART: [fht] FMC Alias Private Key: 7
2,803,202 UART: [art] Extend RT PCRs Done
2,803,630 UART: [art] Lock RT PCRs Done
2,805,260 UART: [art] Populate DV Done
2,813,767 UART: [fht] FMC Alias Private Key: 7
2,814,915 UART: [art] Derive CDI
2,815,195 UART: [art] Store in in slot 0x4
2,901,154 UART: [art] Derive Key Pair
2,901,514 UART: [art] Store priv key in slot 0x5
2,914,644 UART: [art] Derive Key Pair - Done
2,929,516 UART: [art] Signing Cert with AUTHO
2,929,996 UART: RITY.KEYID = 7
2,945,062 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,827 UART: [art] PUB.X = 4A9F11DA3A17C3BFA9B8D79534F1037E890439C95A3BDE9E55C83A0FFEF6D3E16CCFE7DF609DC5238A20D78E4F76D750
2,952,606 UART: [art] PUB.Y = FEFBF11496838E66DB2088178702105B4CB8E9CF924970034C5C2B08A19507D73EE4B1D004C8CD9B4286A396CA25D142
2,959,541 UART: [art] SIG.R = 05D1D9FB1B9ED0E03FA11D154464734C04A79FBC70B21075359FF956344C1F66E9FB16F4D541946C8C1612B9AD355498
2,966,305 UART: [art] SIG.S = 08794593636453220C97AAF475CC5B8AC8BD21C8682914C216A0299052C5004F7C08244488F443F2AE07DFD0DB462D43
2,990,028 UART: Caliptra RT
2,990,281 UART: [state] CFI Enabled
3,096,926 UART: [rt] RT listening for mailbox commands...
3,097,596 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,636 UART: [rt]cmd =0x41544d4e, len=14344
3,365,615 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
891,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,343 UART: [kat] SHA2-512-ACC
906,244 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,649 UART: [kat] LMS
1,168,961 UART: [kat] --
1,169,872 UART: [cold-reset] ++
1,170,316 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,174,496 ready_for_fw is high
1,174,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,664 UART: [idev] Erasing UDS.KEYID = 0
1,199,806 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,729 UART: [ldev] ++
1,209,897 UART: [ldev] CDI.KEYID = 6
1,210,261 UART: [ldev] SUBJECT.KEYID = 5
1,210,688 UART: [ldev] AUTHORITY.KEYID = 7
1,211,151 UART: [ldev] FE.KEYID = 1
1,216,405 UART: [ldev] Erasing FE.KEYID = 1
1,242,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,883 UART: [ldev] --
1,282,313 UART: [fwproc] Wait for Commands...
1,282,898 UART: [fwproc] Recv command 0x46574c44
1,283,631 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,421 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,369 >>> mbox cmd response: success
2,776,542 UART: [afmc] ++
2,776,710 UART: [afmc] CDI.KEYID = 6
2,777,073 UART: [afmc] SUBJECT.KEYID = 7
2,777,499 UART: [afmc] AUTHORITY.KEYID = 5
2,813,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,081 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,810 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,279 UART: [afmc] --
2,856,353 UART: [cold-reset] --
2,857,315 UART: [state] Locking Datavault
2,858,464 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,068 UART: [state] Locking ICCM
2,859,622 UART: [exit] Launching FMC @ 0x40000130
2,864,951 UART:
2,864,967 UART: Running Caliptra FMC ...
2,865,375 UART:
2,865,518 UART: [state] CFI Enabled
2,876,141 UART: [fht] FMC Alias Private Key: 7
2,984,480 UART: [art] Extend RT PCRs Done
2,984,908 UART: [art] Lock RT PCRs Done
2,986,226 UART: [art] Populate DV Done
2,994,277 UART: [fht] FMC Alias Private Key: 7
2,995,301 UART: [art] Derive CDI
2,995,581 UART: [art] Store in in slot 0x4
3,081,244 UART: [art] Derive Key Pair
3,081,604 UART: [art] Store priv key in slot 0x5
3,094,870 UART: [art] Derive Key Pair - Done
3,109,521 UART: [art] Signing Cert with AUTHO
3,110,001 UART: RITY.KEYID = 7
3,125,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,794 UART: [art] PUB.X = F83542D3CF92AE7F58C46A122F0A1A3F626CEE65BA3D8D4932FA92D298B3C827C9E36DE38247B49E3DDBCB46A01941F6
3,132,575 UART: [art] PUB.Y = 5A4930AA981C148E53D09CDBB439167EEE08EB0111EDFE733AC834F2AB0C5D890C7238CAAD702F1B035F9F1F4F530E53
3,139,521 UART: [art] SIG.R = E1EB2672C7892D5E46368F3AABF44269C1F31428F98FB9A440786DD994C9B1FE82AB1BBF3D40C7990AEDC7672D9845FA
3,146,300 UART: [art] SIG.S = C933F2DBD7CFD063A3F313F00FAC159E771D715249BCFE02D79FD5609AED207BC7A05342ADB86D7E39BDE34944D04D8D
3,170,261 UART: Caliptra RT
3,170,606 UART: [state] CFI Enabled
3,278,762 UART: [rt] RT listening for mailbox commands...
3,279,432 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,650 UART: [rt]cmd =0x41544d4e, len=14344
3,547,279 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,353 ready_for_fw is high
1,055,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,591 >>> mbox cmd response: success
2,687,391 UART:
2,687,407 UART: Running Caliptra FMC ...
2,687,815 UART:
2,687,958 UART: [state] CFI Enabled
2,698,551 UART: [fht] FMC Alias Private Key: 7
2,806,482 UART: [art] Extend RT PCRs Done
2,806,910 UART: [art] Lock RT PCRs Done
2,808,332 UART: [art] Populate DV Done
2,816,697 UART: [fht] FMC Alias Private Key: 7
2,817,767 UART: [art] Derive CDI
2,818,047 UART: [art] Store in in slot 0x4
2,903,474 UART: [art] Derive Key Pair
2,903,834 UART: [art] Store priv key in slot 0x5
2,917,266 UART: [art] Derive Key Pair - Done
2,932,233 UART: [art] Signing Cert with AUTHO
2,932,713 UART: RITY.KEYID = 7
2,948,077 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,842 UART: [art] PUB.X = 8480F205EA15F64C3A6DCEF4552B558A6A29D1D5858B1A80D2CA4ED5E9ADFA6DA11B55E1F8A373D99CBE3684F3981A19
2,955,625 UART: [art] PUB.Y = 1C6456BD3C67177A6571FBA2353496ED234062EDA22A3A4349C8CE46B3C8435A5ACBA6630CB62ACF935C009718F4A015
2,962,554 UART: [art] SIG.R = 2D9CE5C3A2FDDC52CFA298E81EBEA667811DA6D94E316F415772EF5628529B6F9926D3E868755D66761259AD1A25696F
2,969,328 UART: [art] SIG.S = 671F6F9648B4C94CFA0BF98A1C7CEECB9CB6E20D8B89731BA2CD60D83DD4966B5A305330CAEDA167BCC35CEE5122A5F6
2,993,267 UART: Caliptra RT
2,993,612 UART: [state] CFI Enabled
3,101,461 UART: [rt] RT listening for mailbox commands...
3,102,131 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,119 UART: [rt]cmd =0x41544d4e, len=14344
3,369,970 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,079 UART:
192,427 UART: Running Caliptra ROM ...
193,626 UART:
193,801 UART: [state] CFI Enabled
263,278 UART: [state] LifecycleState = Unprovisioned
265,207 UART: [state] DebugLocked = No
267,165 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,091 UART: [kat] SHA2-256
441,803 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,352 UART: [kat] ++
452,803 UART: [kat] sha1
464,029 UART: [kat] SHA2-256
466,686 UART: [kat] SHA2-384
473,740 UART: [kat] SHA2-512-ACC
476,122 UART: [kat] ECC-384
2,766,509 UART: [kat] HMAC-384Kdf
2,780,190 UART: [kat] LMS
3,970,451 UART: [kat] --
3,975,739 UART: [cold-reset] ++
3,976,849 UART: [fht] Storing FHT @ 0x50003400
3,988,254 UART: [idev] ++
3,988,822 UART: [idev] CDI.KEYID = 6
3,989,781 UART: [idev] SUBJECT.KEYID = 7
3,991,025 UART: [idev] UDS.KEYID = 0
3,992,003 ready_for_fw is high
3,992,204 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,744 UART: [idev] Erasing UDS.KEYID = 0
7,325,869 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,237 UART: [idev] --
7,350,457 UART: [ldev] ++
7,351,038 UART: [ldev] CDI.KEYID = 6
7,352,065 UART: [ldev] SUBJECT.KEYID = 5
7,353,225 UART: [ldev] AUTHORITY.KEYID = 7
7,354,454 UART: [ldev] FE.KEYID = 1
7,401,612 UART: [ldev] Erasing FE.KEYID = 1
10,737,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,848 UART: [ldev] --
13,115,138 UART: [fwproc] Waiting for Commands...
13,118,476 UART: [fwproc] Received command 0x46574c44
13,120,662 UART: [fwproc] Received Image of size 114124 bytes
22,228,109 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,309,470 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,378,328 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,696,421 >>> mbox cmd response: success
22,701,337 UART: [afmc] ++
22,701,936 UART: [afmc] CDI.KEYID = 6
22,702,825 UART: [afmc] SUBJECT.KEYID = 7
22,704,123 UART: [afmc] AUTHORITY.KEYID = 5
26,062,089 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,365,803 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,368,063 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,382,615 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,397,364 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,411,555 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,432,639 UART: [afmc] --
28,435,867 UART: [cold-reset] --
28,440,489 UART: [state] Locking Datavault
28,444,665 UART: [state] Locking PCR0, PCR1 and PCR31
28,446,423 UART: [state] Locking ICCM
28,449,222 UART: [exit] Launching FMC @ 0x40000130
28,457,614 UART:
28,457,859 UART: Running Caliptra FMC ...
28,458,964 UART:
28,459,144 UART: [state] CFI Enabled
28,526,331 UART: [fht] FMC Alias Private Key: 7
30,864,023 UART: [art] Extend RT PCRs Done
30,865,249 UART: [art] Lock RT PCRs Done
30,867,072 UART: [art] Populate DV Done
30,872,433 UART: [fht] FMC Alias Private Key: 7
30,874,138 UART: [art] Derive CDI
30,874,875 UART: [art] Store in in slot 0x4
30,935,110 UART: [art] Derive Key Pair
30,936,149 UART: [art] Store priv key in slot 0x5
34,229,108 UART: [art] Derive Key Pair - Done
34,242,221 UART: [art] Signing Cert with AUTHO
34,243,533 UART: RITY.KEYID = 7
36,530,070 UART: [art] Erasing AUTHORITY.KEYID = 7
36,531,578 UART: [art] PUB.X = C84D1DEEF580F435474F44B6BE9A2959B9D3B747BEE26C421996F6CA1EDC602BC7D7ED38D95398BE6BC551EF81851EA5
36,538,863 UART: [art] PUB.Y = 855D6734E297291EA60E719C9AB1D7CFE53B9233A06FF3FCAB2CE83EE8186D4F902F20AE97CA93EC21266BADDAD571CA
36,546,125 UART: [art] SIG.R = 52178F5FA370BA575479E97A211FA1E7EEC5FAA8503BCB28B2040B5699210F8C4920AD5DE8AB40AB364B7C800731FB70
36,553,469 UART: [art] SIG.S = 55637C6ECAFFB1519F037608369971BFA66B9178F99382AD2AD4BAD6ADF6060166CFF32A7D6C42079C5A9B0E3C9B1412
37,858,453 UART: Caliptra RT
37,859,146 UART: [state] CFI Enabled
38,021,069 UART: [rt] RT listening for mailbox commands...
38,023,410 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,178,648 UART: [rt]cmd =0x41544d4e, len=14344
44,425,560 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
3,806,890 ready_for_fw is high
3,807,287 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,871,620 >>> mbox cmd response: success
27,575,462 UART:
27,575,841 UART: Running Caliptra FMC ...
27,577,033 UART:
27,577,220 UART: [state] CFI Enabled
27,646,039 UART: [fht] FMC Alias Private Key: 7
29,983,773 UART: [art] Extend RT PCRs Done
29,984,998 UART: [art] Lock RT PCRs Done
29,986,554 UART: [art] Populate DV Done
29,992,255 UART: [fht] FMC Alias Private Key: 7
29,993,746 UART: [art] Derive CDI
29,994,568 UART: [art] Store in in slot 0x4
30,055,152 UART: [art] Derive Key Pair
30,056,189 UART: [art] Store priv key in slot 0x5
33,349,330 UART: [art] Derive Key Pair - Done
33,362,405 UART: [art] Signing Cert with AUTHO
33,363,748 UART: RITY.KEYID = 7
35,650,963 UART: [art] Erasing AUTHORITY.KEYID = 7
35,652,476 UART: [art] PUB.X = ACB9AB3947126248C43F398DEFF099C7D6F18B29C73721F0409F73B176F5ACF4CF3C4209BBA8846259DE603C5935F108
35,659,690 UART: [art] PUB.Y = 7D634A214B2B4DDD1B6631928B586E6C34924BF58A7BC01D49133E14AF4E9C2CF76D5EC865C981489B70A9A7388A8BB1
35,666,928 UART: [art] SIG.R = 613AC95904F919692E6E3DA32F334E12079F638DCB20763896578F6D9B2D02FB8D2FA3693DA243C505A8154D6C1DA95F
35,674,299 UART: [art] SIG.S = 4CE79523FAEB909FFAFCF72169DE38BBE57E6B0565096852E7E9E94282DF70294F69BD62CFBA94158DCBC98BBF4004B0
36,980,026 UART: Caliptra RT
36,980,724 UART: [state] CFI Enabled
37,141,666 UART: [rt] RT listening for mailbox commands...
37,143,991 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,299,193 UART: [rt]cmd =0x41544d4e, len=14344
43,598,025 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,482 UART:
192,860 UART: Running Caliptra ROM ...
193,994 UART:
603,863 UART: [state] CFI Enabled
619,241 UART: [state] LifecycleState = Unprovisioned
621,118 UART: [state] DebugLocked = No
623,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,147 UART: [kat] SHA2-256
797,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,409 UART: [kat] ++
809,029 UART: [kat] sha1
820,004 UART: [kat] SHA2-256
822,767 UART: [kat] SHA2-384
827,198 UART: [kat] SHA2-512-ACC
829,559 UART: [kat] ECC-384
3,112,583 UART: [kat] HMAC-384Kdf
3,124,110 UART: [kat] LMS
4,314,222 UART: [kat] --
4,318,302 UART: [cold-reset] ++
4,319,236 UART: [fht] Storing FHT @ 0x50003400
4,329,855 UART: [idev] ++
4,330,485 UART: [idev] CDI.KEYID = 6
4,331,390 UART: [idev] SUBJECT.KEYID = 7
4,332,629 UART: [idev] UDS.KEYID = 0
4,333,701 ready_for_fw is high
4,333,899 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,245 UART: [idev] Erasing UDS.KEYID = 0
7,622,226 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,761 UART: [idev] --
7,647,643 UART: [ldev] ++
7,648,211 UART: [ldev] CDI.KEYID = 6
7,649,144 UART: [ldev] SUBJECT.KEYID = 5
7,650,403 UART: [ldev] AUTHORITY.KEYID = 7
7,651,671 UART: [ldev] FE.KEYID = 1
7,662,049 UART: [ldev] Erasing FE.KEYID = 1
10,951,160 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,186 UART: [ldev] --
13,311,295 UART: [fwproc] Waiting for Commands...
13,313,682 UART: [fwproc] Received command 0x46574c44
13,315,859 UART: [fwproc] Received Image of size 114124 bytes
21,953,998 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,035,580 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,104,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,420,989 >>> mbox cmd response: success
22,425,758 UART: [afmc] ++
22,426,348 UART: [afmc] CDI.KEYID = 6
22,427,248 UART: [afmc] SUBJECT.KEYID = 7
22,428,512 UART: [afmc] AUTHORITY.KEYID = 5
25,748,091 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,039,547 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,041,812 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,056,389 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,071,102 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,085,329 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,106,310 UART: [afmc] --
28,109,476 UART: [cold-reset] --
28,113,057 UART: [state] Locking Datavault
28,118,789 UART: [state] Locking PCR0, PCR1 and PCR31
28,120,538 UART: [state] Locking ICCM
28,122,762 UART: [exit] Launching FMC @ 0x40000130
28,131,200 UART:
28,131,429 UART: Running Caliptra FMC ...
28,132,523 UART:
28,132,684 UART: [state] CFI Enabled
28,141,047 UART: [fht] FMC Alias Private Key: 7
30,472,079 UART: [art] Extend RT PCRs Done
30,473,302 UART: [art] Lock RT PCRs Done
30,474,843 UART: [art] Populate DV Done
30,480,412 UART: [fht] FMC Alias Private Key: 7
30,481,942 UART: [art] Derive CDI
30,482,689 UART: [art] Store in in slot 0x4
30,525,603 UART: [art] Derive Key Pair
30,526,640 UART: [art] Store priv key in slot 0x5
33,768,182 UART: [art] Derive Key Pair - Done
33,781,448 UART: [art] Signing Cert with AUTHO
33,782,779 UART: RITY.KEYID = 7
36,062,688 UART: [art] Erasing AUTHORITY.KEYID = 7
36,064,193 UART: [art] PUB.X = A6A55C36655E91587E2CE8E3462F29548E2EE7AE1FE3E20E61112C1FBEA8083F5F2BB9EAC1DCA6EBB2F5BDD47E689CA1
36,071,469 UART: [art] PUB.Y = 936714B1756AF63B8F0016E68C80EE36D5AF8E0DDD5A7490EBA98DD36FB93E472AFC7410135685F03FF47A377716EA87
36,078,732 UART: [art] SIG.R = 8C2067A0869CD4A57FC3CFED6EDC35738E6A777535E2E0470B5274C0C303FD846A6FDAA67EBA00E0637CBCE6B0BD6AC9
36,086,121 UART: [art] SIG.S = EB3FCFAA2B52450901DCDB460E4F591F2C60D1DB66F53603B1B9444255998CA9A249459AD87F0647AD5E3AB62A05F212
37,391,104 UART: Caliptra RT
37,391,793 UART: [state] CFI Enabled
37,509,588 UART: [rt] RT listening for mailbox commands...
37,511,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,667,214 UART: [rt]cmd =0x41544d4e, len=14344
43,862,512 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,125,906 ready_for_fw is high
4,126,389 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,388,660 >>> mbox cmd response: success
28,027,297 UART:
28,027,683 UART: Running Caliptra FMC ...
28,028,777 UART:
28,028,927 UART: [state] CFI Enabled
28,036,810 UART: [fht] FMC Alias Private Key: 7
30,367,719 UART: [art] Extend RT PCRs Done
30,368,970 UART: [art] Lock RT PCRs Done
30,370,570 UART: [art] Populate DV Done
30,375,618 UART: [fht] FMC Alias Private Key: 7
30,377,181 UART: [art] Derive CDI
30,377,911 UART: [art] Store in in slot 0x4
30,420,619 UART: [art] Derive Key Pair
30,421,658 UART: [art] Store priv key in slot 0x5
33,663,695 UART: [art] Derive Key Pair - Done
33,676,759 UART: [art] Signing Cert with AUTHO
33,678,097 UART: RITY.KEYID = 7
35,957,720 UART: [art] Erasing AUTHORITY.KEYID = 7
35,959,227 UART: [art] PUB.X = 15935DF3658886E276BB2FB0ED9131A9F8B315B1289513ECA6CE2D136FCE289EB119765B7BCD2548D9A6955D0D12F8EC
35,966,460 UART: [art] PUB.Y = 1464011624964F07110F21377EAAA6FA9398ECCECD5DD82CA892740992CE1FE136437D420CB323311904EF49675703DA
35,973,716 UART: [art] SIG.R = D509E786A988724E44E7AB848CE6E00E68165F867B4E88180B5CF21EA1C24ABDE44AAC4C952B0FB84014567BD0A7B645
35,981,098 UART: [art] SIG.S = 6B2ECFA4DBB91F1DFFCFAA23750F1F6D8E069BB9E391BBD1C654A3544D665420EAA0FAE55E7E7633AB554027AEE39851
37,285,941 UART: Caliptra RT
37,286,649 UART: [state] CFI Enabled
37,403,772 UART: [rt] RT listening for mailbox commands...
37,406,065 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,561,447 UART: [rt]cmd =0x41544d4e, len=14344
43,781,622 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,016 UART:
192,385 UART: Running Caliptra ROM ...
193,588 UART:
193,742 UART: [state] CFI Enabled
264,691 UART: [state] LifecycleState = Unprovisioned
266,595 UART: [state] DebugLocked = No
268,485 UART: [state] WD Timer not started. Device not locked for debugging
272,442 UART: [kat] SHA2-256
451,586 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,179 UART: [kat] ++
463,628 UART: [kat] sha1
475,722 UART: [kat] SHA2-256
478,788 UART: [kat] SHA2-384
483,794 UART: [kat] SHA2-512-ACC
486,752 UART: [kat] ECC-384
2,951,573 UART: [kat] HMAC-384Kdf
2,972,515 UART: [kat] LMS
3,502,001 UART: [kat] --
3,505,792 UART: [cold-reset] ++
3,507,006 UART: [fht] FHT @ 0x50003400
3,517,933 UART: [idev] ++
3,518,514 UART: [idev] CDI.KEYID = 6
3,519,428 UART: [idev] SUBJECT.KEYID = 7
3,520,603 UART: [idev] UDS.KEYID = 0
3,521,648 ready_for_fw is high
3,521,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,919 UART: [idev] Erasing UDS.KEYID = 0
6,025,920 UART: [idev] Sha1 KeyId Algorithm
6,048,338 UART: [idev] --
6,052,171 UART: [ldev] ++
6,052,759 UART: [ldev] CDI.KEYID = 6
6,053,676 UART: [ldev] SUBJECT.KEYID = 5
6,054,838 UART: [ldev] AUTHORITY.KEYID = 7
6,056,070 UART: [ldev] FE.KEYID = 1
6,101,996 UART: [ldev] Erasing FE.KEYID = 1
8,608,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,213 UART: [ldev] --
10,416,427 UART: [fwproc] Wait for Commands...
10,419,004 UART: [fwproc] Recv command 0x46574c44
10,421,045 UART: [fwproc] Recv'd Img size: 114448 bytes
14,989,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,066,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,135,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,454,364 >>> mbox cmd response: success
15,458,065 UART: [afmc] ++
15,458,670 UART: [afmc] CDI.KEYID = 6
15,459,558 UART: [afmc] SUBJECT.KEYID = 7
15,460,715 UART: [afmc] AUTHORITY.KEYID = 5
18,006,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,727,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,729,321 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,745,267 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,761,234 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,777,024 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,799,553 UART: [afmc] --
19,804,059 UART: [cold-reset] --
19,807,916 UART: [state] Locking Datavault
19,813,369 UART: [state] Locking PCR0, PCR1 and PCR31
19,815,029 UART: [state] Locking ICCM
19,817,272 UART: [exit] Launching FMC @ 0x40000130
19,825,719 UART:
19,825,957 UART: Running Caliptra FMC ...
19,826,981 UART:
19,827,128 UART: [state] CFI Enabled
19,885,896 UART: [fht] FMC Alias Private Key: 7
21,649,286 UART: [art] Extend RT PCRs Done
21,650,505 UART: [art] Lock RT PCRs Done
21,652,098 UART: [art] Populate DV Done
21,657,458 UART: [fht] FMC Alias Private Key: 7
21,659,049 UART: [art] Derive CDI
21,659,816 UART: [art] Store in in slot 0x4
21,717,566 UART: [art] Derive Key Pair
21,718,607 UART: [art] Store priv key in slot 0x5
24,181,881 UART: [art] Derive Key Pair - Done
24,194,732 UART: [art] Signing Cert with AUTHO
24,196,031 UART: RITY.KEYID = 7
25,907,534 UART: [art] Erasing AUTHORITY.KEYID = 7
25,909,038 UART: [art] PUB.X = 645E453C29F312F51336EFF862C9477108919564E074DFF204372A94002C685287EEBB744900ABD735480B724FF26DAF
25,916,239 UART: [art] PUB.Y = 196D691CA814B50E2DB78950FFBDBCAE085C90703170CB216A3C4C0BDC042B62C834609B28043F5A30D512351AEA46E0
25,923,485 UART: [art] SIG.R = E0E23BB60B7B3C98320D7CB7B12985AA63F785166E0AD555F52B67D911786416C5AB45ADDAA23A823A49EA34977F6F2F
25,930,887 UART: [art] SIG.S = F8AE552E925C3F3183F77502FF453C6BFE3E619D858671127039AAE2A61A5EF42E31DD62CADABCCDE4210998D43F8ABD
26,909,419 UART: Caliptra RT
26,910,103 UART: [state] CFI Enabled
27,074,776 UART: [rt] RT listening for mailbox commands...
27,077,051 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,232,962 UART: [rt]cmd =0x41544d4e, len=14344
30,810,803 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,381,967 ready_for_fw is high
3,382,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,063,682 >>> mbox cmd response: success
19,349,398 UART:
19,349,805 UART: Running Caliptra FMC ...
19,350,996 UART:
19,351,164 UART: [state] CFI Enabled
19,414,187 UART: [fht] FMC Alias Private Key: 7
21,178,413 UART: [art] Extend RT PCRs Done
21,179,627 UART: [art] Lock RT PCRs Done
21,181,471 UART: [art] Populate DV Done
21,187,081 UART: [fht] FMC Alias Private Key: 7
21,188,685 UART: [art] Derive CDI
21,189,505 UART: [art] Store in in slot 0x4
21,247,754 UART: [art] Derive Key Pair
21,248,791 UART: [art] Store priv key in slot 0x5
23,711,782 UART: [art] Derive Key Pair - Done
23,724,835 UART: [art] Signing Cert with AUTHO
23,726,140 UART: RITY.KEYID = 7
25,437,582 UART: [art] Erasing AUTHORITY.KEYID = 7
25,439,104 UART: [art] PUB.X = 11A05DD1027689753DCC4B5341DB3CC88476ECE3504E4C75CECDA5BDA6BD725C296C2790877D7B86C7B88DAF723B0699
25,446,354 UART: [art] PUB.Y = 4AD1AC91EFE31C7EA4D766417ED4FA8023DB94BFDB49EDECAD93413AC3AB25251C45CD6B910678387C1DA331174032C0
25,453,660 UART: [art] SIG.R = 5B4BD03FD4158C4571B08D85F737033E60730F39D59D1FF2165E3F16F8A154000E9F53894DBA31005264FFE86E6F164F
25,461,028 UART: [art] SIG.S = 28AF990272450E422FC64EB1DC45ED787ED2F2BB366D811A8742A40C1E99E1A404AE1DF92E291CDB57BDCCFDB7C7C7ED
26,439,509 UART: Caliptra RT
26,440,217 UART: [state] CFI Enabled
26,606,211 UART: [rt] RT listening for mailbox commands...
26,608,507 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,764,235 UART: [rt]cmd =0x41544d4e, len=14344
30,343,486 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,388 UART:
192,756 UART: Running Caliptra ROM ...
193,965 UART:
603,532 UART: [state] CFI Enabled
616,782 UART: [state] LifecycleState = Unprovisioned
618,638 UART: [state] DebugLocked = No
620,864 UART: [state] WD Timer not started. Device not locked for debugging
624,398 UART: [kat] SHA2-256
803,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,077 UART: [kat] ++
815,609 UART: [kat] sha1
826,129 UART: [kat] SHA2-256
829,198 UART: [kat] SHA2-384
834,965 UART: [kat] SHA2-512-ACC
837,891 UART: [kat] ECC-384
3,278,878 UART: [kat] HMAC-384Kdf
3,291,043 UART: [kat] LMS
3,820,550 UART: [kat] --
3,825,570 UART: [cold-reset] ++
3,826,863 UART: [fht] FHT @ 0x50003400
3,838,325 UART: [idev] ++
3,838,910 UART: [idev] CDI.KEYID = 6
3,839,812 UART: [idev] SUBJECT.KEYID = 7
3,840,981 UART: [idev] UDS.KEYID = 0
3,841,967 ready_for_fw is high
3,842,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,282 UART: [idev] Erasing UDS.KEYID = 0
6,318,578 UART: [idev] Sha1 KeyId Algorithm
6,340,827 UART: [idev] --
6,345,196 UART: [ldev] ++
6,345,759 UART: [ldev] CDI.KEYID = 6
6,346,719 UART: [ldev] SUBJECT.KEYID = 5
6,347,866 UART: [ldev] AUTHORITY.KEYID = 7
6,349,144 UART: [ldev] FE.KEYID = 1
6,360,218 UART: [ldev] Erasing FE.KEYID = 1
8,835,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,927 UART: [ldev] --
10,625,118 UART: [fwproc] Wait for Commands...
10,628,013 UART: [fwproc] Recv command 0x46574c44
10,630,103 UART: [fwproc] Recv'd Img size: 114448 bytes
15,210,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,287,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,356,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,674,142 >>> mbox cmd response: success
15,677,833 UART: [afmc] ++
15,678,424 UART: [afmc] CDI.KEYID = 6
15,679,328 UART: [afmc] SUBJECT.KEYID = 7
15,680,538 UART: [afmc] AUTHORITY.KEYID = 5
18,184,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,906,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,908,655 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,924,603 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,940,570 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,956,298 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,978,661 UART: [afmc] --
19,982,207 UART: [cold-reset] --
19,986,545 UART: [state] Locking Datavault
19,992,923 UART: [state] Locking PCR0, PCR1 and PCR31
19,994,616 UART: [state] Locking ICCM
19,996,325 UART: [exit] Launching FMC @ 0x40000130
20,004,769 UART:
20,004,999 UART: Running Caliptra FMC ...
20,006,035 UART:
20,006,180 UART: [state] CFI Enabled
20,014,552 UART: [fht] FMC Alias Private Key: 7
21,771,437 UART: [art] Extend RT PCRs Done
21,772,660 UART: [art] Lock RT PCRs Done
21,774,449 UART: [art] Populate DV Done
21,780,175 UART: [fht] FMC Alias Private Key: 7
21,781,650 UART: [art] Derive CDI
21,782,404 UART: [art] Store in in slot 0x4
21,825,098 UART: [art] Derive Key Pair
21,826,140 UART: [art] Store priv key in slot 0x5
24,252,361 UART: [art] Derive Key Pair - Done
24,265,789 UART: [art] Signing Cert with AUTHO
24,267,099 UART: RITY.KEYID = 7
25,972,175 UART: [art] Erasing AUTHORITY.KEYID = 7
25,973,682 UART: [art] PUB.X = 0425E6B4ED870626C3AE6A448AA0AFCCC51310AE883014962DF9B76EF6086EA5F6C83E92D8B08798D4CAE51A0044AA34
25,980,905 UART: [art] PUB.Y = 40194D6A9FC3A0D081AAFD37DEC1372EBFC404A1921299BB14C2737C7EBB44296C03DC9791C57213640B7AD84419A8F3
25,988,175 UART: [art] SIG.R = 55882BA01821399724DF8B09D1195EE7A4B5E94AC5C6E9AC1B528B3DEF03DF8AA57C2646B2EF79B3E700F2F96F9EF7D5
25,995,554 UART: [art] SIG.S = 70D2233A55EABCCE998D7D97D4877718F6E831460FCFE18A3AEC4FEADA01AF0D551F247F5923F7F0FCC418FDF395C433
26,975,110 UART: Caliptra RT
26,975,818 UART: [state] CFI Enabled
27,092,402 UART: [rt] RT listening for mailbox commands...
27,094,758 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,250,115 UART: [rt]cmd =0x41544d4e, len=14344
30,824,530 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,700,128 ready_for_fw is high
3,700,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,272,417 >>> mbox cmd response: success
19,531,915 UART:
19,532,295 UART: Running Caliptra FMC ...
19,533,507 UART:
19,533,668 UART: [state] CFI Enabled
19,541,449 UART: [fht] FMC Alias Private Key: 7
21,298,712 UART: [art] Extend RT PCRs Done
21,299,943 UART: [art] Lock RT PCRs Done
21,301,408 UART: [art] Populate DV Done
21,306,906 UART: [fht] FMC Alias Private Key: 7
21,308,548 UART: [art] Derive CDI
21,309,354 UART: [art] Store in in slot 0x4
21,351,883 UART: [art] Derive Key Pair
21,352,878 UART: [art] Store priv key in slot 0x5
23,779,492 UART: [art] Derive Key Pair - Done
23,791,894 UART: [art] Signing Cert with AUTHO
23,793,194 UART: RITY.KEYID = 7
25,498,650 UART: [art] Erasing AUTHORITY.KEYID = 7
25,500,157 UART: [art] PUB.X = 21F911092C38E356CE2B15A225CB61817251ED032C75C7968B447CE12A61BDC2FDB3F1F2D37420651D49B46C057BB120
25,507,472 UART: [art] PUB.Y = 6EEDD387D6427F914E64C4E17DA2918D515D67E37E4C0DB90B29689A5F6FBE3471A9D93855207002684CC3117C723E1D
25,514,658 UART: [art] SIG.R = 17CBBA0D92A254FF4DAD305C8EF163657F665473FF113FC437074979DC19C1231A103F00733FF4C55FDC9754D59AE21C
25,522,037 UART: [art] SIG.S = D34837B50C69CA0141DD387A89644DCE0EC43A5866CA3CB2B33A294AA895A0E86E437D2391E1D8FB441B3DE516902A85
26,500,667 UART: Caliptra RT
26,501,375 UART: [state] CFI Enabled
26,618,230 UART: [rt] RT listening for mailbox commands...
26,620,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,775,795 UART: [rt]cmd =0x41544d4e, len=14344
30,350,321 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,417,971 ready_for_fw is high
3,418,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,821,424 >>> mbox cmd response: success
20,117,992 UART:
20,118,389 UART: Running Caliptra FMC ...
20,119,583 UART:
20,119,771 UART: [state] CFI Enabled
20,183,719 UART: [fht] FMC Alias Private Key: 7
21,948,679 UART: [art] Extend RT PCRs Done
21,949,902 UART: [art] Lock RT PCRs Done
21,951,368 UART: [art] Populate DV Done
21,956,943 UART: [fht] FMC Alias Private Key: 7
21,958,591 UART: [art] Derive CDI
21,959,408 UART: [art] Store in in slot 0x4
22,017,911 UART: [art] Derive Key Pair
22,018,953 UART: [art] Store priv key in slot 0x5
24,482,058 UART: [art] Derive Key Pair - Done
24,494,890 UART: [art] Signing Cert with AUTHO
24,496,230 UART: RITY.KEYID = 7
26,207,837 UART: [art] Erasing AUTHORITY.KEYID = 7
26,209,344 UART: [art] PUB.X = A6C3CC64851AF7BDA6614A67981D93834CB6762032C39645D9DDCC380E5C2324B8FFC8A5FE0B2DE193AC596CFCA938E1
26,216,644 UART: [art] PUB.Y = 7A98EC1FDDC7877551A0E61C928547409E7B13F83A9E9F356ACD3CEF53E6E8F2378B30D61F7FFBD7C406A89995DA983B
26,223,916 UART: [art] SIG.R = F39189A56B067A1A8454F7D32E0C6766C7D2F1D2A66DFBEC4F7F7F92A97E9D6BF3123C8549CDC3DE64311CE23C7006E9
26,231,312 UART: [art] SIG.S = C4EADBDD72B520439296E16BD92986A27927D239F99B218F23A302796257EB23AD6CBCCA04AD9CD0C96E89540C0B5045
27,210,340 UART: Caliptra RT
27,211,163 UART: [state] CFI Enabled
27,375,777 UART: [rt] RT listening for mailbox commands...
27,378,097 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,533,898 UART: [rt]cmd =0x41544d4e, len=14344
31,109,248 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,761,364 ready_for_fw is high
3,761,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,065,656 >>> mbox cmd response: success
20,316,099 UART:
20,316,491 UART: Running Caliptra FMC ...
20,317,780 UART:
20,317,963 UART: [state] CFI Enabled
20,325,898 UART: [fht] FMC Alias Private Key: 7
22,082,897 UART: [art] Extend RT PCRs Done
22,084,125 UART: [art] Lock RT PCRs Done
22,085,970 UART: [art] Populate DV Done
22,091,531 UART: [fht] FMC Alias Private Key: 7
22,093,243 UART: [art] Derive CDI
22,094,065 UART: [art] Store in in slot 0x4
22,136,451 UART: [art] Derive Key Pair
22,137,493 UART: [art] Store priv key in slot 0x5
24,564,361 UART: [art] Derive Key Pair - Done
24,576,993 UART: [art] Signing Cert with AUTHO
24,578,295 UART: RITY.KEYID = 7
26,284,060 UART: [art] Erasing AUTHORITY.KEYID = 7
26,285,559 UART: [art] PUB.X = CBC28F2D382563A8555B46FDAA8D003787A761AAFCDD8226375820D05C26AE7FEF07B70E8A453178AD8324021A0118E2
26,292,830 UART: [art] PUB.Y = 5AD84B4D195E0659BED8014903411A37B340EF1C26BCC1EED8A8C39A3CB4653FC4084AD0B65B896BD8B7C4F3D85DAA30
26,300,089 UART: [art] SIG.R = 23ECAF6B3A30C09B19C287DAA39CF4050F3D36D8E2235DB8A1CC2EEBFA1742CAF64111D136067C9B75AABB8B5A1614B9
26,307,485 UART: [art] SIG.S = 97DDD08058A543F6E6AE11ABB696F1AFDBBA79FD3946A4FF12634ED41470674D0BFF267F349F37140AF2C30E52E06051
27,286,833 UART: Caliptra RT
27,287,546 UART: [state] CFI Enabled
27,405,083 UART: [rt] RT listening for mailbox commands...
27,407,415 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,562,618 UART: [rt]cmd =0x41544d4e, len=14344
31,133,556 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,653 UART: [kat] SHA2-256
881,584 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,699 UART: [kat] ++
885,851 UART: [kat] sha1
890,015 UART: [kat] SHA2-256
891,953 UART: [kat] SHA2-384
894,734 UART: [kat] SHA2-512-ACC
896,635 UART: [kat] ECC-384
902,434 UART: [kat] HMAC-384Kdf
907,044 UART: [kat] LMS
1,475,240 UART: [kat] --
1,475,691 UART: [cold-reset] ++
1,476,151 UART: [fht] Storing FHT @ 0x50003400
1,478,908 UART: [idev] ++
1,479,076 UART: [idev] CDI.KEYID = 6
1,479,436 UART: [idev] SUBJECT.KEYID = 7
1,479,860 UART: [idev] UDS.KEYID = 0
1,480,205 ready_for_fw is high
1,480,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,940 UART: [idev] Erasing UDS.KEYID = 0
1,504,658 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,336 UART: [idev] --
1,514,345 UART: [ldev] ++
1,514,513 UART: [ldev] CDI.KEYID = 6
1,514,876 UART: [ldev] SUBJECT.KEYID = 5
1,515,302 UART: [ldev] AUTHORITY.KEYID = 7
1,515,765 UART: [ldev] FE.KEYID = 1
1,520,747 UART: [ldev] Erasing FE.KEYID = 1
1,545,962 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,738 UART: [ldev] --
1,585,011 UART: [fwproc] Waiting for Commands...
1,585,850 UART: [fwproc] Received command 0x46574c44
1,586,641 UART: [fwproc] Received Image of size 114448 bytes
5,423,997 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,451,503 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,480,855 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,616,934 >>> mbox cmd response: success
5,618,006 UART: [afmc] ++
5,618,174 UART: [afmc] CDI.KEYID = 6
5,618,536 UART: [afmc] SUBJECT.KEYID = 7
5,618,961 UART: [afmc] AUTHORITY.KEYID = 5
5,653,973 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,670,037 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,670,817 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,676,526 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,682,418 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,688,119 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,695,967 UART: [afmc] --
5,697,079 UART: [cold-reset] --
5,698,245 UART: [state] Locking Datavault
5,699,298 UART: [state] Locking PCR0, PCR1 and PCR31
5,699,902 UART: [state] Locking ICCM
5,700,340 UART: [exit] Launching FMC @ 0x40000130
5,705,669 UART:
5,705,685 UART: Running Caliptra FMC ...
5,706,093 UART:
5,706,147 UART: [state] CFI Enabled
5,716,609 UART: [fht] FMC Alias Private Key: 7
5,824,763 UART: [art] Extend RT PCRs Done
5,825,191 UART: [art] Lock RT PCRs Done
5,826,757 UART: [art] Populate DV Done
5,835,101 UART: [fht] FMC Alias Private Key: 7
5,836,035 UART: [art] Derive CDI
5,836,315 UART: [art] Store in in slot 0x4
5,922,042 UART: [art] Derive Key Pair
5,922,402 UART: [art] Store priv key in slot 0x5
5,935,558 UART: [art] Derive Key Pair - Done
5,950,387 UART: [art] Signing Cert with AUTHO
5,950,867 UART: RITY.KEYID = 7
5,966,629 UART: [art] Erasing AUTHORITY.KEYID = 7
5,967,394 UART: [art] PUB.X = 8C13C3090CB8428BB9211E7845FD781A6BFF878FC3CEA0655EC1BE0701D888EEEFFAE68E523785AB2BD70B4D544B0AD0
5,974,164 UART: [art] PUB.Y = 69E798807FBFB357E0154CC49FF5ABA2F226B405A8A4693FF4EB1B7E5E9D00A916504295EB67D0F12DBCAC4F237D8CA6
5,981,105 UART: [art] SIG.R = BB13441CF7279F6F912F87B32DE4A43912DFDD7E061E292E37BD6E4B89661B01E7D9A30161D2D37BF267BA0B338A175B
5,987,871 UART: [art] SIG.S = E2CF9B990C7E836F091FF482EFB791B15C5ADDFF36A6A8E9214023B49CCCF354AB5887334217EF2D4C544CFD1A47DC52
6,011,166 UART: Caliptra RT
6,011,419 UART: [state] CFI Enabled
6,118,673 UART: [rt] RT listening for mailbox commands...
6,119,343 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,242,439 UART: [rt]cmd =0x41544d4e, len=14344
7,162,810 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,123 ready_for_fw is high
1,362,123 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,164,248 >>> mbox cmd response: success
5,225,477 UART:
5,225,493 UART: Running Caliptra FMC ...
5,225,901 UART:
5,225,955 UART: [state] CFI Enabled
5,236,787 UART: [fht] FMC Alias Private Key: 7
5,345,287 UART: [art] Extend RT PCRs Done
5,345,715 UART: [art] Lock RT PCRs Done
5,347,245 UART: [art] Populate DV Done
5,355,239 UART: [fht] FMC Alias Private Key: 7
5,356,281 UART: [art] Derive CDI
5,356,561 UART: [art] Store in in slot 0x4
5,442,212 UART: [art] Derive Key Pair
5,442,572 UART: [art] Store priv key in slot 0x5
5,455,722 UART: [art] Derive Key Pair - Done
5,470,343 UART: [art] Signing Cert with AUTHO
5,470,823 UART: RITY.KEYID = 7
5,485,901 UART: [art] Erasing AUTHORITY.KEYID = 7
5,486,666 UART: [art] PUB.X = BF40BF9F3B97784338E66119D9557E160CA00B1942B2218014BA40542C90D25616A8E1A64F5808C6D5421473C2799E31
5,493,415 UART: [art] PUB.Y = 9E31858828E786D97755C94CBA03C1A31643A4D0D04D0FC7560EE86B3BAC5091EAF49C93699D6CC158F80F9C0537CDEE
5,500,358 UART: [art] SIG.R = C1446443C535C8FCD3831EFE98DFDECB8B0A50F80648F410297D35AE031ADD9FE466DE6416E0CBF36CE8FC7FADC63E49
5,507,141 UART: [art] SIG.S = 9BC182593623798BA10256567CB752767674BB1C2FB9286106498F3F4A8CC1B3EBA63368CAC06ECE7EE4C2372C41BE4C
5,531,620 UART: Caliptra RT
5,531,873 UART: [state] CFI Enabled
5,640,551 UART: [rt] RT listening for mailbox commands...
5,641,221 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,365 UART: [rt]cmd =0x41544d4e, len=14344
6,680,040 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,418 UART: [kat] SHA2-256
882,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,464 UART: [kat] ++
886,616 UART: [kat] sha1
890,754 UART: [kat] SHA2-256
892,692 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
902,623 UART: [kat] HMAC-384Kdf
907,265 UART: [kat] LMS
1,475,461 UART: [kat] --
1,476,408 UART: [cold-reset] ++
1,476,842 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 ready_for_fw is high
1,480,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,295 UART: [idev] Erasing UDS.KEYID = 0
1,505,181 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,869 UART: [idev] --
1,515,034 UART: [ldev] ++
1,515,202 UART: [ldev] CDI.KEYID = 6
1,515,565 UART: [ldev] SUBJECT.KEYID = 5
1,515,991 UART: [ldev] AUTHORITY.KEYID = 7
1,516,454 UART: [ldev] FE.KEYID = 1
1,521,988 UART: [ldev] Erasing FE.KEYID = 1
1,547,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,145 UART: [ldev] --
1,586,458 UART: [fwproc] Waiting for Commands...
1,587,131 UART: [fwproc] Received command 0x46574c44
1,587,922 UART: [fwproc] Received Image of size 114448 bytes
5,085,551 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,113,301 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,142,653 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,278,746 >>> mbox cmd response: success
5,279,804 UART: [afmc] ++
5,279,972 UART: [afmc] CDI.KEYID = 6
5,280,334 UART: [afmc] SUBJECT.KEYID = 7
5,280,759 UART: [afmc] AUTHORITY.KEYID = 5
5,316,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,332,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,333,265 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,338,974 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,344,866 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,350,567 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,358,421 UART: [afmc] --
5,359,529 UART: [cold-reset] --
5,360,275 UART: [state] Locking Datavault
5,361,494 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,098 UART: [state] Locking ICCM
5,362,756 UART: [exit] Launching FMC @ 0x40000130
5,368,085 UART:
5,368,101 UART: Running Caliptra FMC ...
5,368,509 UART:
5,368,652 UART: [state] CFI Enabled
5,379,280 UART: [fht] FMC Alias Private Key: 7
5,487,594 UART: [art] Extend RT PCRs Done
5,488,022 UART: [art] Lock RT PCRs Done
5,489,750 UART: [art] Populate DV Done
5,498,012 UART: [fht] FMC Alias Private Key: 7
5,499,090 UART: [art] Derive CDI
5,499,370 UART: [art] Store in in slot 0x4
5,585,143 UART: [art] Derive Key Pair
5,585,503 UART: [art] Store priv key in slot 0x5
5,599,035 UART: [art] Derive Key Pair - Done
5,613,706 UART: [art] Signing Cert with AUTHO
5,614,186 UART: RITY.KEYID = 7
5,629,268 UART: [art] Erasing AUTHORITY.KEYID = 7
5,630,033 UART: [art] PUB.X = 8F8F3D59F0E57A128A63093DD990A913CDF8CEA794CDED20FEC441D8E9802A86A35CE7BCB41B9E3AA0E1DDD9C7A5F36B
5,636,826 UART: [art] PUB.Y = 98F0AB730CD4AD9C38C1CDEAB1AD9DCA6849EDE818A7928339BED48BD300C457ABC9FF7C2C9BF0A18C4472C4E870CE70
5,643,777 UART: [art] SIG.R = 33936D677CF0BCA7B2BBA69E136E0A0318FD4E8C985E90CC8E64FB61DC60D84F54415866F1B19AC0B4B87F2A7596A55B
5,650,553 UART: [art] SIG.S = C53AF837AC7DD86B86038F113CD0DB2119EFEF479940605C14E7060D165CA063AA8AC678F9BF2E4D9A138F7FD7113AEF
5,674,107 UART: Caliptra RT
5,674,452 UART: [state] CFI Enabled
5,781,471 UART: [rt] RT listening for mailbox commands...
5,782,141 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,905,253 UART: [rt]cmd =0x41544d4e, len=14344
6,820,602 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,930 ready_for_fw is high
1,362,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,279,512 >>> mbox cmd response: success
5,341,907 UART:
5,341,923 UART: Running Caliptra FMC ...
5,342,331 UART:
5,342,474 UART: [state] CFI Enabled
5,353,204 UART: [fht] FMC Alias Private Key: 7
5,460,732 UART: [art] Extend RT PCRs Done
5,461,160 UART: [art] Lock RT PCRs Done
5,462,674 UART: [art] Populate DV Done
5,470,752 UART: [fht] FMC Alias Private Key: 7
5,471,766 UART: [art] Derive CDI
5,472,046 UART: [art] Store in in slot 0x4
5,557,853 UART: [art] Derive Key Pair
5,558,213 UART: [art] Store priv key in slot 0x5
5,571,465 UART: [art] Derive Key Pair - Done
5,586,148 UART: [art] Signing Cert with AUTHO
5,586,628 UART: RITY.KEYID = 7
5,601,736 UART: [art] Erasing AUTHORITY.KEYID = 7
5,602,501 UART: [art] PUB.X = E0EECF0B02715922C44B3109981188BDA2F2F3BC0182DA78ED112961B332BD679E4420A0C08BBC8AC7ADF21F6F59559B
5,609,269 UART: [art] PUB.Y = 9EBB6E23E182845DE944D7E152DB0C80175E36660A384D33F5A6A44A45BF072DA9A9B139282E6A233D9B603E5A9D358A
5,616,214 UART: [art] SIG.R = 1AF82DD0A43ACA9B6A62B6DAEBA7CAD0087BE07D836A477C412FDF9A48FCEFF70730B7730439852B1F363CB837DCC413
5,622,995 UART: [art] SIG.S = 3481F2C84056A09A489DA1D789461B2A6566E6510FF7CE4A0885B053AE15B153C0BCE0DAA3AABD13B303014F25336753
5,646,472 UART: Caliptra RT
5,646,817 UART: [state] CFI Enabled
5,755,157 UART: [rt] RT listening for mailbox commands...
5,755,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,971 UART: [rt]cmd =0x41544d4e, len=14344
6,799,810 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
893,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,253 UART: [kat] ++
897,405 UART: [kat] sha1
901,729 UART: [kat] SHA2-256
903,669 UART: [kat] SHA2-384
906,400 UART: [kat] SHA2-512-ACC
908,301 UART: [kat] ECC-384
918,276 UART: [kat] HMAC-384Kdf
922,862 UART: [kat] LMS
1,171,190 UART: [kat] --
1,172,191 UART: [cold-reset] ++
1,172,543 UART: [fht] FHT @ 0x50003400
1,175,092 UART: [idev] ++
1,175,260 UART: [idev] CDI.KEYID = 6
1,175,620 UART: [idev] SUBJECT.KEYID = 7
1,176,044 UART: [idev] UDS.KEYID = 0
1,176,389 ready_for_fw is high
1,176,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,802 UART: [idev] Erasing UDS.KEYID = 0
1,200,991 UART: [idev] Sha1 KeyId Algorithm
1,209,411 UART: [idev] --
1,210,545 UART: [ldev] ++
1,210,713 UART: [ldev] CDI.KEYID = 6
1,211,076 UART: [ldev] SUBJECT.KEYID = 5
1,211,502 UART: [ldev] AUTHORITY.KEYID = 7
1,211,965 UART: [ldev] FE.KEYID = 1
1,217,053 UART: [ldev] Erasing FE.KEYID = 1
1,243,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,189 UART: [ldev] --
1,282,482 UART: [fwproc] Wait for Commands...
1,283,266 UART: [fwproc] Recv command 0x46574c44
1,283,994 UART: [fwproc] Recv'd Img size: 114448 bytes
3,129,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,322,917 >>> mbox cmd response: success
3,323,927 UART: [afmc] ++
3,324,095 UART: [afmc] CDI.KEYID = 6
3,324,457 UART: [afmc] SUBJECT.KEYID = 7
3,324,882 UART: [afmc] AUTHORITY.KEYID = 5
3,360,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,445 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,154 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,046 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,757 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,676 UART: [afmc] --
3,403,642 UART: [cold-reset] --
3,404,572 UART: [state] Locking Datavault
3,405,819 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,423 UART: [state] Locking ICCM
3,406,935 UART: [exit] Launching FMC @ 0x40000130
3,412,264 UART:
3,412,280 UART: Running Caliptra FMC ...
3,412,688 UART:
3,412,742 UART: [state] CFI Enabled
3,423,292 UART: [fht] FMC Alias Private Key: 7
3,531,178 UART: [art] Extend RT PCRs Done
3,531,606 UART: [art] Lock RT PCRs Done
3,533,206 UART: [art] Populate DV Done
3,541,378 UART: [fht] FMC Alias Private Key: 7
3,542,500 UART: [art] Derive CDI
3,542,780 UART: [art] Store in in slot 0x4
3,628,611 UART: [art] Derive Key Pair
3,628,971 UART: [art] Store priv key in slot 0x5
3,641,931 UART: [art] Derive Key Pair - Done
3,656,745 UART: [art] Signing Cert with AUTHO
3,657,225 UART: RITY.KEYID = 7
3,672,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,832 UART: [art] PUB.X = 4ACEA6353706F492BFA0EE2826EF023B52E98CC7FE1AF365C80E24BCC0EBC5882C487B22645D6081D2D49B3DE860123C
3,679,605 UART: [art] PUB.Y = 1F9DCF2F319119F4C234218C50D3148090D273968536B8C2AD36296FF22A6B2850F014EB44C26A5A57AC46ECEAC35352
3,686,555 UART: [art] SIG.R = E9C04E8911B4956A9074274ECB8000EC8022E6ACA413B39EB051F3DF89FDA61B04E8E813EE14E17A09187DB1E9B36858
3,693,303 UART: [art] SIG.S = B25DB60A6E1C06E95DB67BC2BC50A4AAF31424AF921639DBFC13E56A9F542DD807322766690ABBFD391D73D402656B6F
3,717,193 UART: Caliptra RT
3,717,446 UART: [state] CFI Enabled
3,825,113 UART: [rt] RT listening for mailbox commands...
3,825,783 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,027 UART: [rt]cmd =0x41544d4e, len=14344
4,872,085 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,501 ready_for_fw is high
1,060,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,398 >>> mbox cmd response: success
3,232,639 UART:
3,232,655 UART: Running Caliptra FMC ...
3,233,063 UART:
3,233,117 UART: [state] CFI Enabled
3,243,549 UART: [fht] FMC Alias Private Key: 7
3,351,561 UART: [art] Extend RT PCRs Done
3,351,989 UART: [art] Lock RT PCRs Done
3,353,281 UART: [art] Populate DV Done
3,361,547 UART: [fht] FMC Alias Private Key: 7
3,362,547 UART: [art] Derive CDI
3,362,827 UART: [art] Store in in slot 0x4
3,448,288 UART: [art] Derive Key Pair
3,448,648 UART: [art] Store priv key in slot 0x5
3,462,246 UART: [art] Derive Key Pair - Done
3,476,983 UART: [art] Signing Cert with AUTHO
3,477,463 UART: RITY.KEYID = 7
3,492,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,476 UART: [art] PUB.X = 62A10197BA0BD791DF3AA1D3EB62C79AFFFA2D52C8DFC47E747663122BE72181591962D127E101BB3923E63A3B3770DD
3,500,245 UART: [art] PUB.Y = DAD636F6257043D7740C4FC4A66AFCFAB31C1578BF394C5FEF3D24D4F497D78F8764BA9834A2F8AAA0F67E5155858B11
3,507,204 UART: [art] SIG.R = BB4ECE5ABCE7DA4BC2D7E59EA35CD2C54BEDDBDA984E1A47AFF3C984A99DECD59AA88DE7E1CF344C2AC673E6B1FA0912
3,514,013 UART: [art] SIG.S = 0648658B6393E87D5A4A84448A7D0675EA86B5E083A05E90DAEDBBCEDB4A7DB7C0A03111684B25FA73F5A4622731A6F4
3,537,794 UART: Caliptra RT
3,538,047 UART: [state] CFI Enabled
3,644,855 UART: [rt] RT listening for mailbox commands...
3,645,525 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,769 UART: [rt]cmd =0x41544d4e, len=14344
4,681,725 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
893,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,614 UART: [kat] ++
897,766 UART: [kat] sha1
902,190 UART: [kat] SHA2-256
904,130 UART: [kat] SHA2-384
906,711 UART: [kat] SHA2-512-ACC
908,612 UART: [kat] ECC-384
918,577 UART: [kat] HMAC-384Kdf
923,323 UART: [kat] LMS
1,171,651 UART: [kat] --
1,172,568 UART: [cold-reset] ++
1,172,906 UART: [fht] FHT @ 0x50003400
1,175,613 UART: [idev] ++
1,175,781 UART: [idev] CDI.KEYID = 6
1,176,141 UART: [idev] SUBJECT.KEYID = 7
1,176,565 UART: [idev] UDS.KEYID = 0
1,176,910 ready_for_fw is high
1,176,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,525 UART: [idev] Erasing UDS.KEYID = 0
1,201,486 UART: [idev] Sha1 KeyId Algorithm
1,209,966 UART: [idev] --
1,211,174 UART: [ldev] ++
1,211,342 UART: [ldev] CDI.KEYID = 6
1,211,705 UART: [ldev] SUBJECT.KEYID = 5
1,212,131 UART: [ldev] AUTHORITY.KEYID = 7
1,212,594 UART: [ldev] FE.KEYID = 1
1,217,756 UART: [ldev] Erasing FE.KEYID = 1
1,243,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,750 UART: [ldev] --
1,283,071 UART: [fwproc] Wait for Commands...
1,283,653 UART: [fwproc] Recv command 0x46574c44
1,284,381 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,317,238 >>> mbox cmd response: success
3,318,362 UART: [afmc] ++
3,318,530 UART: [afmc] CDI.KEYID = 6
3,318,892 UART: [afmc] SUBJECT.KEYID = 7
3,319,317 UART: [afmc] AUTHORITY.KEYID = 5
3,355,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,336 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,045 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,937 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,648 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,449 UART: [afmc] --
3,398,525 UART: [cold-reset] --
3,399,393 UART: [state] Locking Datavault
3,400,560 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,164 UART: [state] Locking ICCM
3,401,644 UART: [exit] Launching FMC @ 0x40000130
3,406,973 UART:
3,406,989 UART: Running Caliptra FMC ...
3,407,397 UART:
3,407,540 UART: [state] CFI Enabled
3,418,110 UART: [fht] FMC Alias Private Key: 7
3,525,610 UART: [art] Extend RT PCRs Done
3,526,038 UART: [art] Lock RT PCRs Done
3,527,754 UART: [art] Populate DV Done
3,535,818 UART: [fht] FMC Alias Private Key: 7
3,536,844 UART: [art] Derive CDI
3,537,124 UART: [art] Store in in slot 0x4
3,622,599 UART: [art] Derive Key Pair
3,622,959 UART: [art] Store priv key in slot 0x5
3,636,091 UART: [art] Derive Key Pair - Done
3,650,600 UART: [art] Signing Cert with AUTHO
3,651,080 UART: RITY.KEYID = 7
3,666,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,111 UART: [art] PUB.X = 4B43BBAD4369CFDFB076BD859C2169450E016F73F47C48C53A5E9A7B82425A629F1F9B827DD44296147A92D6207E7DD9
3,673,879 UART: [art] PUB.Y = 68EE604BA202826B95AACE508C460A114D0B7D6B1C7377632BF22DE2B0E42F758AD75E5DA4DB5C632B1D72E0E696A1CC
3,680,834 UART: [art] SIG.R = A9B9485475193152FE74E5965B16D97137D0B990748C5023BB5B0C5252327FB8A90D2126E8E4A597503218125F97D695
3,687,582 UART: [art] SIG.S = 5BC6FB6B20940DE96CC82C3C409EC4702D21DB7CE6706930C89E82A5EF30768B8F18B01E011D017BB0653AC0C63281CD
3,711,418 UART: Caliptra RT
3,711,763 UART: [state] CFI Enabled
3,819,547 UART: [rt] RT listening for mailbox commands...
3,820,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,117 UART: [rt]cmd =0x41544d4e, len=14344
4,861,341 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,278 ready_for_fw is high
1,060,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,396 >>> mbox cmd response: success
3,232,215 UART:
3,232,231 UART: Running Caliptra FMC ...
3,232,639 UART:
3,232,782 UART: [state] CFI Enabled
3,243,462 UART: [fht] FMC Alias Private Key: 7
3,351,528 UART: [art] Extend RT PCRs Done
3,351,956 UART: [art] Lock RT PCRs Done
3,353,518 UART: [art] Populate DV Done
3,361,704 UART: [fht] FMC Alias Private Key: 7
3,362,804 UART: [art] Derive CDI
3,363,084 UART: [art] Store in in slot 0x4
3,448,931 UART: [art] Derive Key Pair
3,449,291 UART: [art] Store priv key in slot 0x5
3,462,617 UART: [art] Derive Key Pair - Done
3,476,878 UART: [art] Signing Cert with AUTHO
3,477,358 UART: RITY.KEYID = 7
3,492,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,085 UART: [art] PUB.X = 9430048F7B2C5B03DF02DB907EEBCA315E1DF8FA7054C0E6A2FD1E7535487C6411E5A870E2F9E62139FC0CFD15C87038
3,499,853 UART: [art] PUB.Y = 62D3658D8D4142C22AC074A720C5998C2E5CC095F2A208819B2F1B9CDF1DC024E9D23BA9BE6FEE54EBB0E545543C9911
3,506,810 UART: [art] SIG.R = C2089F5C412E13A4B7F0603A07F472B416B4D27D6C50AF1135983876B70C8EB1F5078284F4537E5F0079ED107334DED6
3,513,542 UART: [art] SIG.S = C5BD1A7A72B3A985F78A3EC258AD2F9EC88C664AB2F7403D08CBC8588F0A05DAD2B2886884E890E8B26A583C804E3BC4
3,537,028 UART: Caliptra RT
3,537,373 UART: [state] CFI Enabled
3,644,762 UART: [rt] RT listening for mailbox commands...
3,645,432 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,488 UART: [rt]cmd =0x41544d4e, len=14344
4,691,480 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,603 UART: [kat] SHA2-256
901,543 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,886 UART: [kat] LMS
1,169,198 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,679 UART: [fht] FHT @ 0x50003400
1,173,547 UART: [idev] ++
1,173,715 UART: [idev] CDI.KEYID = 6
1,174,076 UART: [idev] SUBJECT.KEYID = 7
1,174,501 UART: [idev] UDS.KEYID = 0
1,174,847 ready_for_fw is high
1,174,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,453 UART: [idev] Erasing UDS.KEYID = 0
1,199,325 UART: [idev] Sha1 KeyId Algorithm
1,208,093 UART: [idev] --
1,209,274 UART: [ldev] ++
1,209,442 UART: [ldev] CDI.KEYID = 6
1,209,806 UART: [ldev] SUBJECT.KEYID = 5
1,210,233 UART: [ldev] AUTHORITY.KEYID = 7
1,210,696 UART: [ldev] FE.KEYID = 1
1,216,064 UART: [ldev] Erasing FE.KEYID = 1
1,243,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,140 UART: [ldev] --
1,282,642 UART: [fwproc] Wait for Commands...
1,283,299 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 114448 bytes
3,129,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,413 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,722 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,322,794 >>> mbox cmd response: success
3,323,911 UART: [afmc] ++
3,324,079 UART: [afmc] CDI.KEYID = 6
3,324,442 UART: [afmc] SUBJECT.KEYID = 7
3,324,868 UART: [afmc] AUTHORITY.KEYID = 5
3,360,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,897 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,607 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,497 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,208 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,052 UART: [afmc] --
3,404,102 UART: [cold-reset] --
3,404,912 UART: [state] Locking Datavault
3,406,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,829 UART: [state] Locking ICCM
3,407,325 UART: [exit] Launching FMC @ 0x40000130
3,412,654 UART:
3,412,670 UART: Running Caliptra FMC ...
3,413,078 UART:
3,413,132 UART: [state] CFI Enabled
3,423,672 UART: [fht] FMC Alias Private Key: 7
3,532,056 UART: [art] Extend RT PCRs Done
3,532,484 UART: [art] Lock RT PCRs Done
3,533,816 UART: [art] Populate DV Done
3,542,186 UART: [fht] FMC Alias Private Key: 7
3,543,316 UART: [art] Derive CDI
3,543,596 UART: [art] Store in in slot 0x4
3,629,021 UART: [art] Derive Key Pair
3,629,381 UART: [art] Store priv key in slot 0x5
3,643,107 UART: [art] Derive Key Pair - Done
3,658,214 UART: [art] Signing Cert with AUTHO
3,658,694 UART: RITY.KEYID = 7
3,673,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,623 UART: [art] PUB.X = 9F048038E263A42FB1964866CF28DED560BDA812026A94090144E529FBAC40921A7758EACA154AA747C49F28FEB1A722
3,681,383 UART: [art] PUB.Y = 78F8B571C6D64C217A53997A33F95BBBC75B84B0E86556DE67112A487CAF7A810DFDAC9929E3A977EECDC72B8A77E9CE
3,688,346 UART: [art] SIG.R = 9B82874C31D151BDFAEE4FB0AFE1AB6ACE43D923F0DB4F1E3623C1CBF3EB4AB81184E107EB41C7ED7BC7927138C704BB
3,695,136 UART: [art] SIG.S = DDD46CC42ACE8D02A6BA8EAC556DCDBCEB025E6F88700E71156CF07D24628A2FCA2E206C46BB4C6D8DCE8464829ACE68
3,718,302 UART: Caliptra RT
3,718,555 UART: [state] CFI Enabled
3,825,470 UART: [rt] RT listening for mailbox commands...
3,826,140 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,004 UART: [rt]cmd =0x41544d4e, len=14344
4,879,385 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,550 ready_for_fw is high
1,055,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,582 >>> mbox cmd response: success
3,227,963 UART:
3,227,979 UART: Running Caliptra FMC ...
3,228,387 UART:
3,228,441 UART: [state] CFI Enabled
3,238,919 UART: [fht] FMC Alias Private Key: 7
3,346,351 UART: [art] Extend RT PCRs Done
3,346,779 UART: [art] Lock RT PCRs Done
3,348,313 UART: [art] Populate DV Done
3,356,817 UART: [fht] FMC Alias Private Key: 7
3,357,779 UART: [art] Derive CDI
3,358,059 UART: [art] Store in in slot 0x4
3,443,876 UART: [art] Derive Key Pair
3,444,236 UART: [art] Store priv key in slot 0x5
3,457,552 UART: [art] Derive Key Pair - Done
3,472,557 UART: [art] Signing Cert with AUTHO
3,473,037 UART: RITY.KEYID = 7
3,488,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,882 UART: [art] PUB.X = B86B37331F3E81B70090378FEE80C4A6B7F1EC935615C4E71AB5482580B6CBE81360D0B4EB1D09A2041B038CEF35EF0E
3,495,626 UART: [art] PUB.Y = 3CEF81C677BF1BDA255669FF11EA30938B2D900BB6CA636E9BD6A2653C026590542822F04E18E9E49C10C11EBECF44B0
3,502,580 UART: [art] SIG.R = B3887440790D4480FCD9385A610DFBA68416979AA53D21D0D2382D703C972AC736D85D995E1557C3F044B74EFF5B1118
3,509,340 UART: [art] SIG.S = 4483B975973951B7E2875C190C4BFAFA1ED22BD0F50FE90F2E26440D407A8E9FA21B37101DC368D9C7100BD15060B960
3,532,962 UART: Caliptra RT
3,533,215 UART: [state] CFI Enabled
3,641,593 UART: [rt] RT listening for mailbox commands...
3,642,263 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,325 UART: [rt]cmd =0x41544d4e, len=14344
4,690,224 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,303 UART: [kat] SHA2-512-ACC
906,204 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,659 UART: [kat] LMS
1,168,971 UART: [kat] --
1,169,964 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,174,252 ready_for_fw is high
1,174,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,192 UART: [idev] Erasing UDS.KEYID = 0
1,199,572 UART: [idev] Sha1 KeyId Algorithm
1,208,448 UART: [idev] --
1,209,503 UART: [ldev] ++
1,209,671 UART: [ldev] CDI.KEYID = 6
1,210,035 UART: [ldev] SUBJECT.KEYID = 5
1,210,462 UART: [ldev] AUTHORITY.KEYID = 7
1,210,925 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,243,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,011 UART: [ldev] --
1,282,345 UART: [fwproc] Wait for Commands...
1,283,144 UART: [fwproc] Recv command 0x46574c44
1,283,877 UART: [fwproc] Recv'd Img size: 114448 bytes
3,127,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,600 >>> mbox cmd response: success
3,322,859 UART: [afmc] ++
3,323,027 UART: [afmc] CDI.KEYID = 6
3,323,390 UART: [afmc] SUBJECT.KEYID = 7
3,323,816 UART: [afmc] AUTHORITY.KEYID = 5
3,359,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,555 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,265 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,155 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,866 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,674 UART: [afmc] --
3,402,724 UART: [cold-reset] --
3,403,798 UART: [state] Locking Datavault
3,405,157 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,761 UART: [state] Locking ICCM
3,406,419 UART: [exit] Launching FMC @ 0x40000130
3,411,748 UART:
3,411,764 UART: Running Caliptra FMC ...
3,412,172 UART:
3,412,315 UART: [state] CFI Enabled
3,422,721 UART: [fht] FMC Alias Private Key: 7
3,530,297 UART: [art] Extend RT PCRs Done
3,530,725 UART: [art] Lock RT PCRs Done
3,532,291 UART: [art] Populate DV Done
3,540,577 UART: [fht] FMC Alias Private Key: 7
3,541,759 UART: [art] Derive CDI
3,542,039 UART: [art] Store in in slot 0x4
3,627,984 UART: [art] Derive Key Pair
3,628,344 UART: [art] Store priv key in slot 0x5
3,642,052 UART: [art] Derive Key Pair - Done
3,656,695 UART: [art] Signing Cert with AUTHO
3,657,175 UART: RITY.KEYID = 7
3,672,085 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,850 UART: [art] PUB.X = F28E67AF3C60E3637255FF568EE44E8E598C7EE0E6833111474531C2C3A36FFB2A3D99E674FE37294563760E7C03029B
3,679,609 UART: [art] PUB.Y = 118F59D8DAE2FB04E77EB94A362106041810EC0F4FF8E52DA09DEED9AD4EDD40608A87FD4540931192A0695522AF92DA
3,686,557 UART: [art] SIG.R = 75649A02B12F7278D9740EA046E7EB2A2ED9E8C0CA1869E39FBDEBA3144F8C84E6537352816CDA153221A368ACB51EBB
3,693,331 UART: [art] SIG.S = 743E8FBBD1445BD6E066597029FFDB40721F99858CC9C16DBD017684138659CABE69FCAF06C855ED10989616D8C470DF
3,717,316 UART: Caliptra RT
3,717,661 UART: [state] CFI Enabled
3,825,622 UART: [rt] RT listening for mailbox commands...
3,826,292 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,298 UART: [rt]cmd =0x41544d4e, len=14344
4,865,105 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,209 ready_for_fw is high
1,056,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,164,766 >>> mbox cmd response: success
3,227,253 UART:
3,227,269 UART: Running Caliptra FMC ...
3,227,677 UART:
3,227,820 UART: [state] CFI Enabled
3,238,114 UART: [fht] FMC Alias Private Key: 7
3,346,796 UART: [art] Extend RT PCRs Done
3,347,224 UART: [art] Lock RT PCRs Done
3,348,866 UART: [art] Populate DV Done
3,357,216 UART: [fht] FMC Alias Private Key: 7
3,358,144 UART: [art] Derive CDI
3,358,424 UART: [art] Store in in slot 0x4
3,443,949 UART: [art] Derive Key Pair
3,444,309 UART: [art] Store priv key in slot 0x5
3,457,453 UART: [art] Derive Key Pair - Done
3,472,078 UART: [art] Signing Cert with AUTHO
3,472,558 UART: RITY.KEYID = 7
3,487,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,523 UART: [art] PUB.X = B67BE0D456D152BBBCCFD9CC6C9441B491183C3FE33682361873F0BA1FBBEF9BF8E8436DD154BA4817F81B4A157361D7
3,495,307 UART: [art] PUB.Y = 941E0EE24095E6EAE8D882A0EE62EC3ECD82175126A3706796F86A77A9528A2431D425E7D17B05F08D3704D36693E415
3,502,244 UART: [art] SIG.R = 86FF0BA0B0A48A88E6AEEBE00F1A9A5FA2CF0C028283D3E82189CA6CE2CB1A7C0D8FAFA89113C060D0E13324B998DFAC
3,509,025 UART: [art] SIG.S = BD661B40840406D69920E467F3CAF794ED0C4ACD7CD6D1776A2DA062A963F04D5B77B2469230F8EFBF6DDE6CB3FCCABE
3,532,595 UART: Caliptra RT
3,532,940 UART: [state] CFI Enabled
3,640,217 UART: [rt] RT listening for mailbox commands...
3,640,887 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,201 UART: [rt]cmd =0x41544d4e, len=14344
4,679,414 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
191,964 UART:
192,321 UART: Running Caliptra ROM ...
193,430 UART:
193,576 UART: [state] CFI Enabled
266,691 UART: [state] LifecycleState = Unprovisioned
268,606 UART: [state] DebugLocked = No
270,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,579 UART: [kat] SHA2-256
445,246 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,779 UART: [kat] ++
456,232 UART: [kat] sha1
468,739 UART: [kat] SHA2-256
471,467 UART: [kat] SHA2-384
477,669 UART: [kat] SHA2-512-ACC
480,032 UART: [kat] ECC-384
2,767,349 UART: [kat] HMAC-384Kdf
2,779,365 UART: [kat] LMS
3,969,666 UART: [kat] --
3,973,971 UART: [cold-reset] ++
3,975,478 UART: [fht] Storing FHT @ 0x50003400
3,986,037 UART: [idev] ++
3,986,610 UART: [idev] CDI.KEYID = 6
3,987,514 UART: [idev] SUBJECT.KEYID = 7
3,988,760 UART: [idev] UDS.KEYID = 0
3,989,742 ready_for_fw is high
3,989,938 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,480 UART: [idev] Erasing UDS.KEYID = 0
7,326,743 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,331 UART: [idev] --
7,351,459 UART: [ldev] ++
7,352,026 UART: [ldev] CDI.KEYID = 6
7,353,003 UART: [ldev] SUBJECT.KEYID = 5
7,354,169 UART: [ldev] AUTHORITY.KEYID = 7
7,355,455 UART: [ldev] FE.KEYID = 1
7,400,066 UART: [ldev] Erasing FE.KEYID = 1
10,733,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,116 UART: [ldev] --
13,095,017 UART: [fwproc] Waiting for Commands...
13,097,550 UART: [fwproc] Received command 0x46574c44
13,099,734 UART: [fwproc] Received Image of size 114124 bytes
22,047,050 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,125,825 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,194,694 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,512,353 >>> mbox cmd response: success
22,515,870 UART: [afmc] ++
22,516,462 UART: [afmc] CDI.KEYID = 6
22,517,350 UART: [afmc] SUBJECT.KEYID = 7
22,518,621 UART: [afmc] AUTHORITY.KEYID = 5
25,892,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,190,577 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,192,849 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,207,404 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,222,150 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,236,346 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,257,865 UART: [afmc] --
28,261,624 UART: [cold-reset] --
28,265,860 UART: [state] Locking Datavault
28,270,675 UART: [state] Locking PCR0, PCR1 and PCR31
28,272,435 UART: [state] Locking ICCM
28,274,752 UART: [exit] Launching FMC @ 0x40000130
28,283,135 UART:
28,283,412 UART: Running Caliptra FMC ...
28,284,444 UART:
28,284,594 UART: [state] CFI Enabled
28,350,605 UART: [fht] FMC Alias Private Key: 7
30,688,921 UART: [art] Extend RT PCRs Done
30,690,157 UART: [art] Lock RT PCRs Done
30,691,704 UART: [art] Populate DV Done
30,697,273 UART: [fht] FMC Alias Private Key: 7
30,698,973 UART: [art] Derive CDI
30,699,709 UART: [art] Store in in slot 0x4
30,758,373 UART: [art] Derive Key Pair
30,759,372 UART: [art] Store priv key in slot 0x5
34,052,043 UART: [art] Derive Key Pair - Done
34,064,944 UART: [art] Signing Cert with AUTHO
34,066,253 UART: RITY.KEYID = 7
36,353,397 UART: [art] Erasing AUTHORITY.KEYID = 7
36,354,902 UART: [art] PUB.X = E6530DEE7BF7386894D9603731D5EB1837E300A3284252742AA924E69157ED18DE5F124339D84A7846FC5948902181DD
36,362,098 UART: [art] PUB.Y = 0FA9E8D3B8DE4F0BD1FA1B3BDD366EA4BEE4461B9E0856B957C2D273A4C6552A8E276C87B9AB0B2035A0E280F4504EB7
36,369,377 UART: [art] SIG.R = 75857225598582D071690A640D0F5E7E52D1BB9ED1D0C32E43BCF6C4AA267145BD8AB76F46A6C21A043B9D2A1BD9DD2B
36,376,782 UART: [art] SIG.S = 47206575496223124BECFE21C47FA89EBB784C46CFBB461C0AB5DF90D4B40011BCC4502764FC0BD181090060449D8D88
37,681,997 UART: Caliptra RT
37,682,699 UART: [state] CFI Enabled
37,842,616 UART: [rt] RT listening for mailbox commands...
37,844,919 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,000,075 UART: [rt]cmd =0x41544d4e, len=14344
45,509,201 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,159 writing to cptra_bootfsm_go
3,804,268 ready_for_fw is high
3,804,666 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,119,229 >>> mbox cmd response: success
27,813,194 UART:
27,813,633 UART: Running Caliptra FMC ...
27,814,747 UART:
27,814,903 UART: [state] CFI Enabled
27,881,583 UART: [fht] FMC Alias Private Key: 7
30,219,049 UART: [art] Extend RT PCRs Done
30,220,311 UART: [art] Lock RT PCRs Done
30,221,808 UART: [art] Populate DV Done
30,227,184 UART: [fht] FMC Alias Private Key: 7
30,228,738 UART: [art] Derive CDI
30,229,580 UART: [art] Store in in slot 0x4
30,289,938 UART: [art] Derive Key Pair
30,290,978 UART: [art] Store priv key in slot 0x5
33,583,436 UART: [art] Derive Key Pair - Done
33,596,388 UART: [art] Signing Cert with AUTHO
33,597,693 UART: RITY.KEYID = 7
35,885,116 UART: [art] Erasing AUTHORITY.KEYID = 7
35,886,615 UART: [art] PUB.X = 3C794742E64E920DD4A30160ED08AF532B5545D3F5558F4D5457D7A47FD3FDDADD856D424BDA32FBBE0037DD3112DABD
35,893,828 UART: [art] PUB.Y = E22DF8643DFD538E8BD64708666FB649223F8CD8EDE88764B2C3BD65D627CF8074FDE30896552BE22CD9B9BA36C8E83E
35,901,112 UART: [art] SIG.R = CB673D43A68AE9098EBF46AF2952892F23F4AA36F5ABDC1CE0FE90B504B5E85267EAAA6EA9D8A706B9E780B9574046E2
35,908,532 UART: [art] SIG.S = 2F2D11FDB5CB95DE4F382D2E8DC014EE03A1459809CBD749E3294349D5D555800A09F5A868186D8B6053782B5D53E744
37,213,395 UART: Caliptra RT
37,214,104 UART: [state] CFI Enabled
37,375,171 UART: [rt] RT listening for mailbox commands...
37,377,521 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,533,019 UART: [rt]cmd =0x41544d4e, len=14344
45,146,609 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,473 UART:
192,823 UART: Running Caliptra ROM ...
194,008 UART:
603,674 UART: [state] CFI Enabled
616,484 UART: [state] LifecycleState = Unprovisioned
618,344 UART: [state] DebugLocked = No
619,809 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,321 UART: [kat] SHA2-256
794,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,620 UART: [kat] ++
805,062 UART: [kat] sha1
815,548 UART: [kat] SHA2-256
818,270 UART: [kat] SHA2-384
824,470 UART: [kat] SHA2-512-ACC
826,832 UART: [kat] ECC-384
3,109,902 UART: [kat] HMAC-384Kdf
3,121,703 UART: [kat] LMS
4,311,801 UART: [kat] --
4,316,958 UART: [cold-reset] ++
4,318,831 UART: [fht] Storing FHT @ 0x50003400
4,330,661 UART: [idev] ++
4,331,224 UART: [idev] CDI.KEYID = 6
4,332,234 UART: [idev] SUBJECT.KEYID = 7
4,333,321 UART: [idev] UDS.KEYID = 0
4,334,497 ready_for_fw is high
4,334,702 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,051 UART: [idev] Erasing UDS.KEYID = 0
7,619,626 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,113 UART: [idev] --
7,645,044 UART: [ldev] ++
7,645,612 UART: [ldev] CDI.KEYID = 6
7,646,569 UART: [ldev] SUBJECT.KEYID = 5
7,647,771 UART: [ldev] AUTHORITY.KEYID = 7
7,649,055 UART: [ldev] FE.KEYID = 1
7,657,918 UART: [ldev] Erasing FE.KEYID = 1
10,945,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,310 UART: [ldev] --
13,309,353 UART: [fwproc] Waiting for Commands...
13,312,627 UART: [fwproc] Received command 0x46574c44
13,314,809 UART: [fwproc] Received Image of size 114124 bytes
22,037,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,116,455 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,185,306 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,502,921 >>> mbox cmd response: success
22,506,362 UART: [afmc] ++
22,506,957 UART: [afmc] CDI.KEYID = 6
22,507,863 UART: [afmc] SUBJECT.KEYID = 7
22,509,128 UART: [afmc] AUTHORITY.KEYID = 5
25,824,290 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,119,055 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,121,328 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,135,889 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,150,647 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,164,890 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,185,750 UART: [afmc] --
28,189,718 UART: [cold-reset] --
28,192,065 UART: [state] Locking Datavault
28,197,901 UART: [state] Locking PCR0, PCR1 and PCR31
28,199,652 UART: [state] Locking ICCM
28,201,633 UART: [exit] Launching FMC @ 0x40000130
28,210,033 UART:
28,210,267 UART: Running Caliptra FMC ...
28,211,365 UART:
28,211,518 UART: [state] CFI Enabled
28,220,000 UART: [fht] FMC Alias Private Key: 7
30,550,752 UART: [art] Extend RT PCRs Done
30,552,018 UART: [art] Lock RT PCRs Done
30,553,587 UART: [art] Populate DV Done
30,559,147 UART: [fht] FMC Alias Private Key: 7
30,560,638 UART: [art] Derive CDI
30,561,394 UART: [art] Store in in slot 0x4
30,603,789 UART: [art] Derive Key Pair
30,604,774 UART: [art] Store priv key in slot 0x5
33,846,471 UART: [art] Derive Key Pair - Done
33,859,571 UART: [art] Signing Cert with AUTHO
33,860,867 UART: RITY.KEYID = 7
36,140,176 UART: [art] Erasing AUTHORITY.KEYID = 7
36,141,674 UART: [art] PUB.X = ABC9425AD28C634A716E92802AE20D3C21579611646412707B948EE103509B7CCBFB415DF829CA5D5334FFEAFB2E7F90
36,148,902 UART: [art] PUB.Y = BB8220B4ECEC145E7E29CEF2317B44AEC8A73EAEFA6251DBA8C8F1A4205191BD1F0CF15C69B069DDC784CD4C44CD6507
36,156,206 UART: [art] SIG.R = 5F6FA626789E2ECFDB39DF97D4644F44550FDAEA0D1A215F34B9990AB437FB17276F6A40F0733159EDDC21721B2EBA05
36,163,584 UART: [art] SIG.S = 3EA6E39D29F0ADA7EC018DBFDD7D40A8DEB90EAB2D40F0F38D4B845744D105D8DA1A02F9D5C4ABED0C0BC149B3627FB0
37,468,739 UART: Caliptra RT
37,469,457 UART: [state] CFI Enabled
37,587,022 UART: [rt] RT listening for mailbox commands...
37,589,328 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,744,753 UART: [rt]cmd =0x41544d4e, len=14344
45,279,001 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
4,128,728 ready_for_fw is high
4,129,109 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,120,261 >>> mbox cmd response: success
27,762,129 UART:
27,762,867 UART: Running Caliptra FMC ...
27,763,995 UART:
27,764,161 UART: [state] CFI Enabled
27,771,753 UART: [fht] FMC Alias Private Key: 7
30,102,272 UART: [art] Extend RT PCRs Done
30,103,513 UART: [art] Lock RT PCRs Done
30,105,419 UART: [art] Populate DV Done
30,110,884 UART: [fht] FMC Alias Private Key: 7
30,112,476 UART: [art] Derive CDI
30,113,289 UART: [art] Store in in slot 0x4
30,155,942 UART: [art] Derive Key Pair
30,156,984 UART: [art] Store priv key in slot 0x5
33,399,023 UART: [art] Derive Key Pair - Done
33,411,817 UART: [art] Signing Cert with AUTHO
33,413,143 UART: RITY.KEYID = 7
35,692,451 UART: [art] Erasing AUTHORITY.KEYID = 7
35,693,948 UART: [art] PUB.X = 83A88A3DE73E71D902F60ECDF3FF12AA9F848C6046D169C1F0EE7821B78CB49CB45055CC3CFAE72FC78699DBC10D1125
35,701,188 UART: [art] PUB.Y = 4AC99A24420754301BD30F07F11A44F8EE0DD325D72D8935C66B72098E5A581B96D2327E27D9894905E8D14ECCB1D89D
35,708,450 UART: [art] SIG.R = 2E7BE32B73848C80C28B62246EAC29439595C31CAAD612B8B125B04C4D9E6BF2464E8C68C99D1668DB95BF22744EC133
35,715,813 UART: [art] SIG.S = 8CCB202440C3E1ADC81F2A522CB76AA7D709C6D9E9B1CF081E397A6C5BBEB7483AA04ED2F5477E24A7F0B28F575940F6
37,021,579 UART: Caliptra RT
37,022,294 UART: [state] CFI Enabled
37,140,714 UART: [rt] RT listening for mailbox commands...
37,143,038 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,298,238 UART: [rt]cmd =0x41544d4e, len=14344
44,754,986 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,279 UART:
192,633 UART: Running Caliptra ROM ...
193,826 UART:
193,974 UART: [state] CFI Enabled
263,585 UART: [state] LifecycleState = Unprovisioned
265,519 UART: [state] DebugLocked = No
266,630 UART: [state] WD Timer not started. Device not locked for debugging
269,815 UART: [kat] SHA2-256
448,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,496 UART: [kat] ++
461,045 UART: [kat] sha1
471,365 UART: [kat] SHA2-256
474,370 UART: [kat] SHA2-384
480,255 UART: [kat] SHA2-512-ACC
483,240 UART: [kat] ECC-384
2,926,772 UART: [kat] HMAC-384Kdf
2,950,813 UART: [kat] LMS
3,480,227 UART: [kat] --
3,484,214 UART: [cold-reset] ++
3,486,424 UART: [fht] FHT @ 0x50003400
3,498,463 UART: [idev] ++
3,499,035 UART: [idev] CDI.KEYID = 6
3,499,952 UART: [idev] SUBJECT.KEYID = 7
3,501,197 UART: [idev] UDS.KEYID = 0
3,502,119 ready_for_fw is high
3,502,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,646,472 UART: [idev] Erasing UDS.KEYID = 0
6,007,080 UART: [idev] Sha1 KeyId Algorithm
6,029,119 UART: [idev] --
6,033,483 UART: [ldev] ++
6,034,059 UART: [ldev] CDI.KEYID = 6
6,034,976 UART: [ldev] SUBJECT.KEYID = 5
6,036,061 UART: [ldev] AUTHORITY.KEYID = 7
6,037,401 UART: [ldev] FE.KEYID = 1
6,081,030 UART: [ldev] Erasing FE.KEYID = 1
8,590,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,694 UART: [ldev] --
10,395,362 UART: [fwproc] Wait for Commands...
10,397,512 UART: [fwproc] Recv command 0x46574c44
10,399,618 UART: [fwproc] Recv'd Img size: 114448 bytes
14,983,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,062,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,131,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,450,003 >>> mbox cmd response: success
15,453,416 UART: [afmc] ++
15,454,018 UART: [afmc] CDI.KEYID = 6
15,455,092 UART: [afmc] SUBJECT.KEYID = 7
15,456,204 UART: [afmc] AUTHORITY.KEYID = 5
17,984,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,708,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,710,252 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,726,200 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,742,148 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,757,956 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,780,830 UART: [afmc] --
19,784,859 UART: [cold-reset] --
19,787,368 UART: [state] Locking Datavault
19,794,069 UART: [state] Locking PCR0, PCR1 and PCR31
19,795,770 UART: [state] Locking ICCM
19,797,268 UART: [exit] Launching FMC @ 0x40000130
19,805,720 UART:
19,805,952 UART: Running Caliptra FMC ...
19,807,055 UART:
19,807,236 UART: [state] CFI Enabled
19,865,659 UART: [fht] FMC Alias Private Key: 7
21,629,900 UART: [art] Extend RT PCRs Done
21,631,107 UART: [art] Lock RT PCRs Done
21,632,512 UART: [art] Populate DV Done
21,637,601 UART: [fht] FMC Alias Private Key: 7
21,639,306 UART: [art] Derive CDI
21,640,146 UART: [art] Store in in slot 0x4
21,698,826 UART: [art] Derive Key Pair
21,699,866 UART: [art] Store priv key in slot 0x5
24,162,234 UART: [art] Derive Key Pair - Done
24,175,062 UART: [art] Signing Cert with AUTHO
24,176,368 UART: RITY.KEYID = 7
25,888,542 UART: [art] Erasing AUTHORITY.KEYID = 7
25,890,046 UART: [art] PUB.X = 451BC4E6A47FE07DCB80EAC741098C86AE195EAADB7E1F76F0629297E27E5B917DA88490C8929D04769C433AD831189D
25,897,311 UART: [art] PUB.Y = 3822B83D1B87837DBE38E91E26A1D839B7F3C9A309F51512F69F34BD869B81C76F287AE67600910C7F4A9F69F233F2BE
25,904,552 UART: [art] SIG.R = 38E182149141B56AC7D1E52CA0BA05693BD50DA380EC787E93F5AB22167C37724BDB1C00C96A630E7751FD496B9F975E
25,911,902 UART: [art] SIG.S = 5FC369DB66190F0DDD8C2A66E87C46764D8774E39B77460E6F1FD8D1CCA7B8933A21AD0B233F5E920EE35D287AB2B5A6
26,890,017 UART: Caliptra RT
26,890,707 UART: [state] CFI Enabled
27,057,123 UART: [rt] RT listening for mailbox commands...
27,059,421 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,215,055 UART: [rt]cmd =0x41544d4e, len=14344
31,765,368 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,362,721 ready_for_fw is high
3,363,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,042,707 >>> mbox cmd response: success
19,327,133 UART:
19,327,531 UART: Running Caliptra FMC ...
19,328,674 UART:
19,328,856 UART: [state] CFI Enabled
19,393,932 UART: [fht] FMC Alias Private Key: 7
21,157,777 UART: [art] Extend RT PCRs Done
21,159,000 UART: [art] Lock RT PCRs Done
21,160,796 UART: [art] Populate DV Done
21,166,255 UART: [fht] FMC Alias Private Key: 7
21,167,885 UART: [art] Derive CDI
21,168,705 UART: [art] Store in in slot 0x4
21,225,801 UART: [art] Derive Key Pair
21,226,799 UART: [art] Store priv key in slot 0x5
23,690,057 UART: [art] Derive Key Pair - Done
23,703,284 UART: [art] Signing Cert with AUTHO
23,704,585 UART: RITY.KEYID = 7
25,415,019 UART: [art] Erasing AUTHORITY.KEYID = 7
25,416,507 UART: [art] PUB.X = 03826662D3DD23C8D462C104C08681F7FFB213D5AB8BFCA72D6697466835DCB7BCECA59761AE05C51C41C2E56B709B9E
25,423,806 UART: [art] PUB.Y = A7BBCCA1E937369AB37583B7467BE33D1B1A0E27BC164C1BB3AFB52A72CF03311EF8B467D5A54DA7CBE7AC7F8B945348
25,431,085 UART: [art] SIG.R = 3DD7F045B1AC5BAF8E25F0A222DA7D4B380FC8520F61479FA0806E3812EC442E905B464C0F1783E113D112E1FF90A7D9
25,438,477 UART: [art] SIG.S = C1C20BB8B3A6D0E61881774154E24BBEC5FDBD5192A096AAB2260B9C8D3C1A59383C8462B8E1C0ABAA077CC05D724D81
26,417,684 UART: Caliptra RT
26,418,398 UART: [state] CFI Enabled
26,584,827 UART: [rt] RT listening for mailbox commands...
26,587,104 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,743,154 UART: [rt]cmd =0x41544d4e, len=14344
31,285,628 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,445 UART:
192,788 UART: Running Caliptra ROM ...
193,984 UART:
603,490 UART: [state] CFI Enabled
617,849 UART: [state] LifecycleState = Unprovisioned
619,641 UART: [state] DebugLocked = No
621,880 UART: [state] WD Timer not started. Device not locked for debugging
625,602 UART: [kat] SHA2-256
804,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,250 UART: [kat] ++
816,777 UART: [kat] sha1
827,578 UART: [kat] SHA2-256
830,578 UART: [kat] SHA2-384
836,563 UART: [kat] SHA2-512-ACC
839,490 UART: [kat] ECC-384
3,281,855 UART: [kat] HMAC-384Kdf
3,294,160 UART: [kat] LMS
3,823,595 UART: [kat] --
3,827,387 UART: [cold-reset] ++
3,828,820 UART: [fht] FHT @ 0x50003400
3,840,074 UART: [idev] ++
3,840,630 UART: [idev] CDI.KEYID = 6
3,841,666 UART: [idev] SUBJECT.KEYID = 7
3,842,763 UART: [idev] UDS.KEYID = 0
3,843,804 ready_for_fw is high
3,843,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,704 UART: [idev] Erasing UDS.KEYID = 0
6,309,006 UART: [idev] Sha1 KeyId Algorithm
6,330,993 UART: [idev] --
6,335,254 UART: [ldev] ++
6,335,816 UART: [ldev] CDI.KEYID = 6
6,336,730 UART: [ldev] SUBJECT.KEYID = 5
6,337,933 UART: [ldev] AUTHORITY.KEYID = 7
6,339,160 UART: [ldev] FE.KEYID = 1
6,349,960 UART: [ldev] Erasing FE.KEYID = 1
8,825,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,526 UART: [ldev] --
10,613,593 UART: [fwproc] Wait for Commands...
10,616,701 UART: [fwproc] Recv command 0x46574c44
10,618,785 UART: [fwproc] Recv'd Img size: 114448 bytes
15,194,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,273,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,342,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,661,546 >>> mbox cmd response: success
15,666,490 UART: [afmc] ++
15,667,117 UART: [afmc] CDI.KEYID = 6
15,668,002 UART: [afmc] SUBJECT.KEYID = 7
15,669,166 UART: [afmc] AUTHORITY.KEYID = 5
18,171,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,894,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,896,085 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,912,030 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,928,004 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,943,743 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,966,701 UART: [afmc] --
19,970,721 UART: [cold-reset] --
19,974,301 UART: [state] Locking Datavault
19,979,651 UART: [state] Locking PCR0, PCR1 and PCR31
19,981,291 UART: [state] Locking ICCM
19,983,303 UART: [exit] Launching FMC @ 0x40000130
19,991,795 UART:
19,992,032 UART: Running Caliptra FMC ...
19,993,133 UART:
19,993,285 UART: [state] CFI Enabled
20,001,648 UART: [fht] FMC Alias Private Key: 7
21,758,042 UART: [art] Extend RT PCRs Done
21,759,268 UART: [art] Lock RT PCRs Done
21,760,482 UART: [art] Populate DV Done
21,765,892 UART: [fht] FMC Alias Private Key: 7
21,767,529 UART: [art] Derive CDI
21,768,253 UART: [art] Store in in slot 0x4
21,810,992 UART: [art] Derive Key Pair
21,811,977 UART: [art] Store priv key in slot 0x5
24,238,824 UART: [art] Derive Key Pair - Done
24,252,032 UART: [art] Signing Cert with AUTHO
24,253,332 UART: RITY.KEYID = 7
25,959,099 UART: [art] Erasing AUTHORITY.KEYID = 7
25,960,594 UART: [art] PUB.X = 49375DC1AD2199ECB28CC0850FBF3CE265AD2D91BE9061CB76E3BD04B50DDF6063B201125FB4E3231CC6058F9494CA2D
25,967,864 UART: [art] PUB.Y = 4A98C59DC73AE7F54D0795E56F56887DE997FB5E6D3EA0392CF53DBE4DE6BC0A4592272E73C2C2479F8F22735C133233
25,975,132 UART: [art] SIG.R = 64AF22A11B517C8C075F3B60B12073510E16C078140804A3BF81C73A7DB3CC8F3881FACFEC8CBB541684205511DDB503
25,982,503 UART: [art] SIG.S = C7CAAA67DA64D7DB1330B0901532D4C2436170CD2A6D8B644809D7CFB653C11BA4A21087CC88D8ED4E52248F7BE839DA
26,961,459 UART: Caliptra RT
26,962,173 UART: [state] CFI Enabled
27,079,020 UART: [rt] RT listening for mailbox commands...
27,081,351 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,236,700 UART: [rt]cmd =0x41544d4e, len=14344
31,764,759 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,698,754 ready_for_fw is high
3,699,158 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,241,919 >>> mbox cmd response: success
19,493,118 UART:
19,493,536 UART: Running Caliptra FMC ...
19,494,632 UART:
19,494,776 UART: [state] CFI Enabled
19,502,992 UART: [fht] FMC Alias Private Key: 7
21,259,958 UART: [art] Extend RT PCRs Done
21,261,180 UART: [art] Lock RT PCRs Done
21,262,667 UART: [art] Populate DV Done
21,268,208 UART: [fht] FMC Alias Private Key: 7
21,269,695 UART: [art] Derive CDI
21,270,425 UART: [art] Store in in slot 0x4
21,313,125 UART: [art] Derive Key Pair
21,314,164 UART: [art] Store priv key in slot 0x5
23,740,708 UART: [art] Derive Key Pair - Done
23,753,270 UART: [art] Signing Cert with AUTHO
23,754,564 UART: RITY.KEYID = 7
25,460,150 UART: [art] Erasing AUTHORITY.KEYID = 7
25,461,672 UART: [art] PUB.X = 95ADC0ECE6E09232886DD310FA36050143C6C1B2F239204C0A69E7B888D94F455E344D7EE12ACD26D474311CCC613B73
25,468,952 UART: [art] PUB.Y = 3CA52B974C4F0F5F37EF2F6F512988D5CC496F3F4B9D4AAC081E98E79BB3B6F80A92EC198610ED482C3BF1BCCABA6434
25,476,202 UART: [art] SIG.R = 1B6BF4A9B84554470CF592FCC2E91CF2FE5F7471A8B81A53BA36ED78DC6C86C67AFDB6D9EC75B26289EB2AD6A9ACFC00
25,483,618 UART: [art] SIG.S = 447615C45063D7028D72287DCD5A88E65601C329D165C606B452C00603CEFB6CE6FA1452B43F5E4D470043C7516B9977
26,462,482 UART: Caliptra RT
26,463,194 UART: [state] CFI Enabled
26,580,291 UART: [rt] RT listening for mailbox commands...
26,582,782 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,737,928 UART: [rt]cmd =0x41544d4e, len=14344
31,279,264 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,441,211 ready_for_fw is high
3,441,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,842,912 >>> mbox cmd response: success
20,135,347 UART:
20,135,749 UART: Running Caliptra FMC ...
20,136,856 UART:
20,137,012 UART: [state] CFI Enabled
20,203,068 UART: [fht] FMC Alias Private Key: 7
21,966,781 UART: [art] Extend RT PCRs Done
21,968,003 UART: [art] Lock RT PCRs Done
21,969,655 UART: [art] Populate DV Done
21,975,056 UART: [fht] FMC Alias Private Key: 7
21,976,708 UART: [art] Derive CDI
21,977,473 UART: [art] Store in in slot 0x4
22,035,603 UART: [art] Derive Key Pair
22,036,644 UART: [art] Store priv key in slot 0x5
24,499,688 UART: [art] Derive Key Pair - Done
24,512,695 UART: [art] Signing Cert with AUTHO
24,513,998 UART: RITY.KEYID = 7
26,225,199 UART: [art] Erasing AUTHORITY.KEYID = 7
26,226,701 UART: [art] PUB.X = 0E3AB1F955FE2AE8CB57A1A2DE5C32FF269D5D4F85A00DF2BECF7D5377B24E98C9B3668232671B0282661AB1C2726144
26,233,997 UART: [art] PUB.Y = 46CE2C989B1537D3F412CCDD317BE33D3A8071C7D1C2FED4E1EB960962B7F8D6152C08BB3157E93A05DAEC2208FA13D3
26,241,254 UART: [art] SIG.R = 6AACA5889F2CF8CD516F229CF13F87D7C9A6C422764A85BFEF1772D8E62A85936A54410AC00E4DA23D51316FB56E5336
26,248,657 UART: [art] SIG.S = 60DC47384AF31171B8EC6069D1A1C8658B624C5C79D9925588D040BAA1A6F2A0E46D727914D930B021364925B27D57A4
27,228,481 UART: Caliptra RT
27,229,189 UART: [state] CFI Enabled
27,393,021 UART: [rt] RT listening for mailbox commands...
27,395,361 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,551,240 UART: [rt]cmd =0x41544d4e, len=14344
32,092,010 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,756,409 ready_for_fw is high
3,756,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,046,603 >>> mbox cmd response: success
20,302,034 UART:
20,302,451 UART: Running Caliptra FMC ...
20,303,560 UART:
20,303,707 UART: [state] CFI Enabled
20,311,544 UART: [fht] FMC Alias Private Key: 7
22,068,137 UART: [art] Extend RT PCRs Done
22,069,360 UART: [art] Lock RT PCRs Done
22,071,062 UART: [art] Populate DV Done
22,076,746 UART: [fht] FMC Alias Private Key: 7
22,078,287 UART: [art] Derive CDI
22,079,055 UART: [art] Store in in slot 0x4
22,121,646 UART: [art] Derive Key Pair
22,122,642 UART: [art] Store priv key in slot 0x5
24,549,293 UART: [art] Derive Key Pair - Done
24,562,451 UART: [art] Signing Cert with AUTHO
24,563,744 UART: RITY.KEYID = 7
26,269,130 UART: [art] Erasing AUTHORITY.KEYID = 7
26,270,648 UART: [art] PUB.X = E7E49D380ED17D7D1925751134D60A6812342731270238EDC13AA3BF9543FB4B3066929D38544D8FE4A0F41CEBA16A07
26,277,895 UART: [art] PUB.Y = E205222368A06D6C249A24C13CC4A36BFFEABD3378CFA6DE3099BDB172325EDBE3A24D9CE7ACBC71AC2F9711A32B5E81
26,285,185 UART: [art] SIG.R = BDDBC39228B3CA1906E8573D4A3E1CD6DA071513722599750D232DD1686187590AFB5DD4BD3585B00CE0C1F672D7C10C
26,292,563 UART: [art] SIG.S = AD21B30403FDF69187EE94D5D58F12828E2F88444B2501E1537C8F6F5D0AF1E255F65FB141EB909DA845D710B707BC2B
27,271,153 UART: Caliptra RT
27,271,834 UART: [state] CFI Enabled
27,388,992 UART: [rt] RT listening for mailbox commands...
27,391,284 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,546,712 UART: [rt]cmd =0x41544d4e, len=14344
32,088,959 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,536 UART: [state] LifecycleState = Unprovisioned
86,191 UART: [state] DebugLocked = No
86,743 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,385 UART: [kat] SHA2-256
882,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,431 UART: [kat] ++
886,583 UART: [kat] sha1
890,923 UART: [kat] SHA2-256
892,861 UART: [kat] SHA2-384
895,514 UART: [kat] SHA2-512-ACC
897,415 UART: [kat] ECC-384
903,090 UART: [kat] HMAC-384Kdf
907,844 UART: [kat] LMS
1,476,040 UART: [kat] --
1,476,965 UART: [cold-reset] ++
1,477,455 UART: [fht] Storing FHT @ 0x50003400
1,480,236 UART: [idev] ++
1,480,404 UART: [idev] CDI.KEYID = 6
1,480,764 UART: [idev] SUBJECT.KEYID = 7
1,481,188 UART: [idev] UDS.KEYID = 0
1,481,533 ready_for_fw is high
1,481,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,132 UART: [idev] Erasing UDS.KEYID = 0
1,506,066 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,770 UART: [idev] --
1,515,873 UART: [ldev] ++
1,516,041 UART: [ldev] CDI.KEYID = 6
1,516,404 UART: [ldev] SUBJECT.KEYID = 5
1,516,830 UART: [ldev] AUTHORITY.KEYID = 7
1,517,293 UART: [ldev] FE.KEYID = 1
1,522,527 UART: [ldev] Erasing FE.KEYID = 1
1,547,956 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,274 UART: [ldev] --
1,587,741 UART: [fwproc] Waiting for Commands...
1,588,592 UART: [fwproc] Received command 0x46574c44
1,589,383 UART: [fwproc] Received Image of size 114448 bytes
5,236,774 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,264,722 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,294,074 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,430,193 >>> mbox cmd response: success
5,431,415 UART: [afmc] ++
5,431,583 UART: [afmc] CDI.KEYID = 6
5,431,945 UART: [afmc] SUBJECT.KEYID = 7
5,432,370 UART: [afmc] AUTHORITY.KEYID = 5
5,467,558 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,483,494 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,484,274 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,489,983 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,495,875 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,501,576 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,509,404 UART: [afmc] --
5,510,318 UART: [cold-reset] --
5,511,296 UART: [state] Locking Datavault
5,512,265 UART: [state] Locking PCR0, PCR1 and PCR31
5,512,869 UART: [state] Locking ICCM
5,513,363 UART: [exit] Launching FMC @ 0x40000130
5,518,692 UART:
5,518,708 UART: Running Caliptra FMC ...
5,519,116 UART:
5,519,170 UART: [state] CFI Enabled
5,529,644 UART: [fht] FMC Alias Private Key: 7
5,637,496 UART: [art] Extend RT PCRs Done
5,637,924 UART: [art] Lock RT PCRs Done
5,639,716 UART: [art] Populate DV Done
5,648,068 UART: [fht] FMC Alias Private Key: 7
5,649,142 UART: [art] Derive CDI
5,649,422 UART: [art] Store in in slot 0x4
5,734,983 UART: [art] Derive Key Pair
5,735,343 UART: [art] Store priv key in slot 0x5
5,748,301 UART: [art] Derive Key Pair - Done
5,763,326 UART: [art] Signing Cert with AUTHO
5,763,806 UART: RITY.KEYID = 7
5,778,968 UART: [art] Erasing AUTHORITY.KEYID = 7
5,779,733 UART: [art] PUB.X = E7B0917CEC54F72DDC9B939294D834A01FFE8FEEFD5ED63F6F26ED184B62E19B45CA42CA1E7E1B614467C708F6562A56
5,786,516 UART: [art] PUB.Y = 3010C89F5A411CA13414F2088C04FDB6BD6F51801DDB21CA5D791E5C90137C7470202186324B79C739F6AB59B98670DD
5,793,458 UART: [art] SIG.R = D9952969C2951199985E8F8F0369F88895F526865BD2EED2502F001BF83BED5390B21593B9A2C5744E23BE9A59D24B33
5,800,197 UART: [art] SIG.S = 0D686EDA940E21BBDE24BC9DE540CC4AB769CE613BC354F4F79D669A812685FE4879605981C3F302233FD6D73A4B9950
5,824,143 UART: Caliptra RT
5,824,396 UART: [state] CFI Enabled
5,933,097 UART: [rt] RT listening for mailbox commands...
5,933,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,056,815 UART: [rt]cmd =0x41544d4e, len=14344
6,981,995 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,259 ready_for_fw is high
1,362,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,052,317 >>> mbox cmd response: success
5,113,936 UART:
5,113,952 UART: Running Caliptra FMC ...
5,114,360 UART:
5,114,414 UART: [state] CFI Enabled
5,124,936 UART: [fht] FMC Alias Private Key: 7
5,232,614 UART: [art] Extend RT PCRs Done
5,233,042 UART: [art] Lock RT PCRs Done
5,234,714 UART: [art] Populate DV Done
5,242,920 UART: [fht] FMC Alias Private Key: 7
5,244,100 UART: [art] Derive CDI
5,244,380 UART: [art] Store in in slot 0x4
5,330,263 UART: [art] Derive Key Pair
5,330,623 UART: [art] Store priv key in slot 0x5
5,343,627 UART: [art] Derive Key Pair - Done
5,358,368 UART: [art] Signing Cert with AUTHO
5,358,848 UART: RITY.KEYID = 7
5,373,916 UART: [art] Erasing AUTHORITY.KEYID = 7
5,374,681 UART: [art] PUB.X = B4C2C8DE49E3EE5605FFBC2024F7F8CF9EEF3FA1ECF9D8A6A7C2BFF4F215811A5A3B9A8548056E985386B83010B5587E
5,381,463 UART: [art] PUB.Y = D1E98657E73631B762E1B0B34C03A5037B4B01F0184CD470A4DE9933796CE8E00A2ED499360A7930661E015B17E0809E
5,388,389 UART: [art] SIG.R = C65655B1789D3827ABAB2DD8F513616A4078820E97E6269A7DD71879D9391E03714399EEC678C9A03F9C19E75D08CBFD
5,395,150 UART: [art] SIG.S = 18AAFA928E29785FA53B4C57DE9DE142466D65176C65603725B7881E3BA0F35B8DE9BA441F91FEA191D1821C6ACA938A
5,419,109 UART: Caliptra RT
5,419,362 UART: [state] CFI Enabled
5,526,987 UART: [rt] RT listening for mailbox commands...
5,527,657 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,650,609 UART: [rt]cmd =0x41544d4e, len=14344
6,578,236 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,894 UART: [kat] SHA2-256
892,832 UART: [kat] SHA2-384
895,647 UART: [kat] SHA2-512-ACC
897,548 UART: [kat] ECC-384
902,967 UART: [kat] HMAC-384Kdf
907,535 UART: [kat] LMS
1,475,731 UART: [kat] --
1,476,924 UART: [cold-reset] ++
1,477,496 UART: [fht] Storing FHT @ 0x50003400
1,480,303 UART: [idev] ++
1,480,471 UART: [idev] CDI.KEYID = 6
1,480,831 UART: [idev] SUBJECT.KEYID = 7
1,481,255 UART: [idev] UDS.KEYID = 0
1,481,600 ready_for_fw is high
1,481,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,129 UART: [idev] Erasing UDS.KEYID = 0
1,506,097 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,891 UART: [idev] --
1,515,748 UART: [ldev] ++
1,515,916 UART: [ldev] CDI.KEYID = 6
1,516,279 UART: [ldev] SUBJECT.KEYID = 5
1,516,705 UART: [ldev] AUTHORITY.KEYID = 7
1,517,168 UART: [ldev] FE.KEYID = 1
1,522,292 UART: [ldev] Erasing FE.KEYID = 1
1,547,925 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,969 UART: [ldev] --
1,587,410 UART: [fwproc] Waiting for Commands...
1,588,095 UART: [fwproc] Received command 0x46574c44
1,588,886 UART: [fwproc] Received Image of size 114448 bytes
5,124,512 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,153,200 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,182,552 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,318,505 >>> mbox cmd response: success
5,319,763 UART: [afmc] ++
5,319,931 UART: [afmc] CDI.KEYID = 6
5,320,293 UART: [afmc] SUBJECT.KEYID = 7
5,320,718 UART: [afmc] AUTHORITY.KEYID = 5
5,356,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,373,162 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,373,942 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,379,651 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,385,543 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,391,244 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,398,944 UART: [afmc] --
5,399,912 UART: [cold-reset] --
5,400,668 UART: [state] Locking Datavault
5,401,977 UART: [state] Locking PCR0, PCR1 and PCR31
5,402,581 UART: [state] Locking ICCM
5,403,059 UART: [exit] Launching FMC @ 0x40000130
5,408,388 UART:
5,408,404 UART: Running Caliptra FMC ...
5,408,812 UART:
5,408,955 UART: [state] CFI Enabled
5,419,649 UART: [fht] FMC Alias Private Key: 7
5,527,143 UART: [art] Extend RT PCRs Done
5,527,571 UART: [art] Lock RT PCRs Done
5,529,253 UART: [art] Populate DV Done
5,537,681 UART: [fht] FMC Alias Private Key: 7
5,538,745 UART: [art] Derive CDI
5,539,025 UART: [art] Store in in slot 0x4
5,625,206 UART: [art] Derive Key Pair
5,625,566 UART: [art] Store priv key in slot 0x5
5,639,874 UART: [art] Derive Key Pair - Done
5,654,666 UART: [art] Signing Cert with AUTHO
5,655,146 UART: RITY.KEYID = 7
5,670,592 UART: [art] Erasing AUTHORITY.KEYID = 7
5,671,357 UART: [art] PUB.X = 28E5306B2468DE71A391BB4E1F11635C18D10D24DF4BB751BFACABCC2BA45B9718582C646FE3361128E54F7CE0A1E27E
5,678,136 UART: [art] PUB.Y = FB18A439ECBAF433E9B033500A9A07DF21F718C1EB9C3061994896A4D42FD1555400A4FD288E15B63F9D320A458A10A3
5,685,059 UART: [art] SIG.R = 61B1562BC921B4EBAA04E5DE2AD7EA31B96DC7DA8E562D28E07E6A5D2D6AB005DB1542203AD04A04B10E853B699A0C66
5,691,830 UART: [art] SIG.S = 8045FF056F1FBC7BF4F590C78AE39EFF5119F3A92A059B767730B89100F2A2425C638AEAB581720EF4B745425697FCC4
5,715,634 UART: Caliptra RT
5,715,979 UART: [state] CFI Enabled
5,825,204 UART: [rt] RT listening for mailbox commands...
5,825,874 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,948,694 UART: [rt]cmd =0x41544d4e, len=14344
6,869,210 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,492 ready_for_fw is high
1,361,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,317,923 >>> mbox cmd response: success
5,379,012 UART:
5,379,028 UART: Running Caliptra FMC ...
5,379,436 UART:
5,379,579 UART: [state] CFI Enabled
5,390,361 UART: [fht] FMC Alias Private Key: 7
5,498,325 UART: [art] Extend RT PCRs Done
5,498,753 UART: [art] Lock RT PCRs Done
5,500,229 UART: [art] Populate DV Done
5,508,459 UART: [fht] FMC Alias Private Key: 7
5,509,471 UART: [art] Derive CDI
5,509,751 UART: [art] Store in in slot 0x4
5,595,850 UART: [art] Derive Key Pair
5,596,210 UART: [art] Store priv key in slot 0x5
5,608,848 UART: [art] Derive Key Pair - Done
5,623,775 UART: [art] Signing Cert with AUTHO
5,624,255 UART: RITY.KEYID = 7
5,639,791 UART: [art] Erasing AUTHORITY.KEYID = 7
5,640,556 UART: [art] PUB.X = AA88D7E3C05C5E8B9E9782108A4F464F2A967A7C8C760BECC347222556C5B8054CAFE0B160F33583A37A906C82B7B57E
5,647,326 UART: [art] PUB.Y = 65363D85CB4A306B08CEC494203AB17FC1996A5E8809F36302A42920C4DAFFD13847F219896ADE3B8DCCCDDC91C3ECD1
5,654,281 UART: [art] SIG.R = 161B64B6EF8140E45F3180BB2BA037E9B7B00F4EDAD8791EFA1A28B53662036281FB70164BB204DFC948D9EC000AAAFF
5,661,031 UART: [art] SIG.S = C48D35CB80CF195B43303F3AA91B251056A8B7153A1EB9CCB2E3541667BDDCD34CB4A276B007C8720959A67AAEC69828
5,684,568 UART: Caliptra RT
5,684,913 UART: [state] CFI Enabled
5,793,098 UART: [rt] RT listening for mailbox commands...
5,793,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,916,656 UART: [rt]cmd =0x41544d4e, len=14344
6,844,195 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
893,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,379 UART: [kat] ++
897,531 UART: [kat] sha1
901,841 UART: [kat] SHA2-256
903,781 UART: [kat] SHA2-384
906,632 UART: [kat] SHA2-512-ACC
908,533 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,328 UART: [kat] LMS
1,170,656 UART: [kat] --
1,171,557 UART: [cold-reset] ++
1,172,085 UART: [fht] FHT @ 0x50003400
1,174,678 UART: [idev] ++
1,174,846 UART: [idev] CDI.KEYID = 6
1,175,206 UART: [idev] SUBJECT.KEYID = 7
1,175,630 UART: [idev] UDS.KEYID = 0
1,175,975 ready_for_fw is high
1,175,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,430 UART: [idev] Erasing UDS.KEYID = 0
1,200,337 UART: [idev] Sha1 KeyId Algorithm
1,208,623 UART: [idev] --
1,209,625 UART: [ldev] ++
1,209,793 UART: [ldev] CDI.KEYID = 6
1,210,156 UART: [ldev] SUBJECT.KEYID = 5
1,210,582 UART: [ldev] AUTHORITY.KEYID = 7
1,211,045 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,242,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,836 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,248 UART: [fwproc] Recv'd Img size: 114448 bytes
3,121,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,314,282 >>> mbox cmd response: success
3,315,312 UART: [afmc] ++
3,315,480 UART: [afmc] CDI.KEYID = 6
3,315,842 UART: [afmc] SUBJECT.KEYID = 7
3,316,267 UART: [afmc] AUTHORITY.KEYID = 5
3,352,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,412 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,121 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,013 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,724 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,547 UART: [afmc] --
3,395,655 UART: [cold-reset] --
3,396,637 UART: [state] Locking Datavault
3,397,704 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,308 UART: [state] Locking ICCM
3,398,904 UART: [exit] Launching FMC @ 0x40000130
3,404,233 UART:
3,404,249 UART: Running Caliptra FMC ...
3,404,657 UART:
3,404,711 UART: [state] CFI Enabled
3,415,111 UART: [fht] FMC Alias Private Key: 7
3,522,949 UART: [art] Extend RT PCRs Done
3,523,377 UART: [art] Lock RT PCRs Done
3,525,031 UART: [art] Populate DV Done
3,533,529 UART: [fht] FMC Alias Private Key: 7
3,534,687 UART: [art] Derive CDI
3,534,967 UART: [art] Store in in slot 0x4
3,620,318 UART: [art] Derive Key Pair
3,620,678 UART: [art] Store priv key in slot 0x5
3,633,854 UART: [art] Derive Key Pair - Done
3,648,735 UART: [art] Signing Cert with AUTHO
3,649,215 UART: RITY.KEYID = 7
3,664,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,084 UART: [art] PUB.X = AE5B45B6B50ED3C5F5BD26C8A82B60E8D91699A446A14DA2EE67342972376478E2E54190CB9643803DA703463441A973
3,671,844 UART: [art] PUB.Y = D9C06E1C9EECD5F755CF35D2FAB8DC250C925A33D54E84139B725753FA116DE41B15ABA1ACA30D7D3DA5A6407195E8CC
3,678,808 UART: [art] SIG.R = 3CCB792EB320FE6C18ABA5D2F0C07BEBECF7A3715974155501AA56702AEC067816F48A8A585F45037554A4901B35EAC5
3,685,577 UART: [art] SIG.S = 4828FDC606563D76B23E0E21B3DAE29441DF9E5B8AB158CBE13AC8A60BBF49B21C38643023C6B287D617975C5306A936
3,709,892 UART: Caliptra RT
3,710,145 UART: [state] CFI Enabled
3,817,888 UART: [rt] RT listening for mailbox commands...
3,818,558 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,694 UART: [rt]cmd =0x41544d4e, len=14344
4,861,638 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,563 ready_for_fw is high
1,059,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,173,153 >>> mbox cmd response: success
3,235,440 UART:
3,235,456 UART: Running Caliptra FMC ...
3,235,864 UART:
3,235,918 UART: [state] CFI Enabled
3,246,078 UART: [fht] FMC Alias Private Key: 7
3,353,728 UART: [art] Extend RT PCRs Done
3,354,156 UART: [art] Lock RT PCRs Done
3,355,678 UART: [art] Populate DV Done
3,363,690 UART: [fht] FMC Alias Private Key: 7
3,364,828 UART: [art] Derive CDI
3,365,108 UART: [art] Store in in slot 0x4
3,450,945 UART: [art] Derive Key Pair
3,451,305 UART: [art] Store priv key in slot 0x5
3,464,443 UART: [art] Derive Key Pair - Done
3,479,167 UART: [art] Signing Cert with AUTHO
3,479,647 UART: RITY.KEYID = 7
3,495,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,784 UART: [art] PUB.X = 640F21E559ABBCF953424552DEFC0689C213AB46A15CEA159ADEA244050DE08BD6B6BBC6CFC8A51B73B0A5AE6844C381
3,502,560 UART: [art] PUB.Y = 207EE9104993E6C1AF2726D4F180D435868CB6CB3660D9D1CDA30910342CB6A9D7DEAA6DB96F9B4A9E4AB69CF44B7E02
3,509,518 UART: [art] SIG.R = 08B05DBB93A909D3B2EDFF4367BCD90E259C515FEC923CC2782D982142C81C8B59D497382EBCA3B0C540EF2BEF58E6A6
3,516,295 UART: [art] SIG.S = 09EEB276E57ED54FA888E7DC14262004C9F31917C85AC71A0629F7E82E3FC1A4E40E581CEAA97781213C077BF9AFCF27
3,540,121 UART: Caliptra RT
3,540,374 UART: [state] CFI Enabled
3,649,075 UART: [rt] RT listening for mailbox commands...
3,649,745 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,485 UART: [rt]cmd =0x41544d4e, len=14344
4,690,260 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
893,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,468 UART: [kat] ++
897,620 UART: [kat] sha1
901,878 UART: [kat] SHA2-256
903,818 UART: [kat] SHA2-384
906,613 UART: [kat] SHA2-512-ACC
908,514 UART: [kat] ECC-384
918,103 UART: [kat] HMAC-384Kdf
922,623 UART: [kat] LMS
1,170,951 UART: [kat] --
1,171,838 UART: [cold-reset] ++
1,172,176 UART: [fht] FHT @ 0x50003400
1,174,955 UART: [idev] ++
1,175,123 UART: [idev] CDI.KEYID = 6
1,175,483 UART: [idev] SUBJECT.KEYID = 7
1,175,907 UART: [idev] UDS.KEYID = 0
1,176,252 ready_for_fw is high
1,176,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,003 UART: [idev] Erasing UDS.KEYID = 0
1,200,944 UART: [idev] Sha1 KeyId Algorithm
1,209,572 UART: [idev] --
1,210,742 UART: [ldev] ++
1,210,910 UART: [ldev] CDI.KEYID = 6
1,211,273 UART: [ldev] SUBJECT.KEYID = 5
1,211,699 UART: [ldev] AUTHORITY.KEYID = 7
1,212,162 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,243,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,746 UART: [ldev] --
1,283,047 UART: [fwproc] Wait for Commands...
1,283,679 UART: [fwproc] Recv command 0x46574c44
1,284,407 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,748 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,319,963 >>> mbox cmd response: success
3,321,147 UART: [afmc] ++
3,321,315 UART: [afmc] CDI.KEYID = 6
3,321,677 UART: [afmc] SUBJECT.KEYID = 7
3,322,102 UART: [afmc] AUTHORITY.KEYID = 5
3,357,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,923 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,632 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,524 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,235 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,206 UART: [afmc] --
3,401,226 UART: [cold-reset] --
3,402,134 UART: [state] Locking Datavault
3,403,315 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,919 UART: [state] Locking ICCM
3,404,407 UART: [exit] Launching FMC @ 0x40000130
3,409,736 UART:
3,409,752 UART: Running Caliptra FMC ...
3,410,160 UART:
3,410,303 UART: [state] CFI Enabled
3,420,583 UART: [fht] FMC Alias Private Key: 7
3,528,415 UART: [art] Extend RT PCRs Done
3,528,843 UART: [art] Lock RT PCRs Done
3,530,547 UART: [art] Populate DV Done
3,538,855 UART: [fht] FMC Alias Private Key: 7
3,539,819 UART: [art] Derive CDI
3,540,099 UART: [art] Store in in slot 0x4
3,625,904 UART: [art] Derive Key Pair
3,626,264 UART: [art] Store priv key in slot 0x5
3,639,564 UART: [art] Derive Key Pair - Done
3,654,712 UART: [art] Signing Cert with AUTHO
3,655,192 UART: RITY.KEYID = 7
3,670,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,369 UART: [art] PUB.X = B1B42A73530EE8A24B0000C7AD23E7558DEC29D84D86E8942ABBD385C182A4834636122C9156C0D3798481ED3DC9D590
3,678,092 UART: [art] PUB.Y = 4AC6772A912DDA4FB9279B8C80F30107F6ABDC2FCC173DC2799259B64EC532790A5A382EA30B118FBFBBF9C10A879FAC
3,685,045 UART: [art] SIG.R = 21F330544788ABF1106CA9243E37C92F7DDE665A0C5BFA41F8BEF3B14B59483B088710CAE453B8A1422B9D9D476175B1
3,691,813 UART: [art] SIG.S = 03AAABF96FC477E2ED9DDEF3443F424A11CF6AC56A4CBE1BF0C29944553490B93EEC07DCB383375C355F59108D6F1573
3,715,122 UART: Caliptra RT
3,715,467 UART: [state] CFI Enabled
3,823,492 UART: [rt] RT listening for mailbox commands...
3,824,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,416 UART: [rt]cmd =0x41544d4e, len=14344
4,860,323 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,608 ready_for_fw is high
1,060,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,189 >>> mbox cmd response: success
3,232,180 UART:
3,232,196 UART: Running Caliptra FMC ...
3,232,604 UART:
3,232,747 UART: [state] CFI Enabled
3,243,251 UART: [fht] FMC Alias Private Key: 7
3,351,963 UART: [art] Extend RT PCRs Done
3,352,391 UART: [art] Lock RT PCRs Done
3,353,935 UART: [art] Populate DV Done
3,362,161 UART: [fht] FMC Alias Private Key: 7
3,363,227 UART: [art] Derive CDI
3,363,507 UART: [art] Store in in slot 0x4
3,449,682 UART: [art] Derive Key Pair
3,450,042 UART: [art] Store priv key in slot 0x5
3,462,934 UART: [art] Derive Key Pair - Done
3,477,778 UART: [art] Signing Cert with AUTHO
3,478,258 UART: RITY.KEYID = 7
3,493,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,259 UART: [art] PUB.X = 2FF4DA62D9E198C7140381CD53CDA8A0DB96CA03EFA7409A7A8EA6ADA11BB8B6C99D48FD977B9773E3B3752BA4B6C1F5
3,501,045 UART: [art] PUB.Y = EE83D66B37B02AE792E12D03ECF77A710AD6349E48BED86FEF67B188ED0D6A3CFBDFAC1C708DC1EE8059E4F1019C3E9F
3,508,009 UART: [art] SIG.R = 5F13BDBB22ED9C581B383A7B944AB1BCBEC98A0196D7807D3856205F01D8A927EA0116BF6DC02E779FA0116B62B3E102
3,514,777 UART: [art] SIG.S = 2001BE3EC3D397A271B0607C99E3C4D34C26E7F3998AC1C6840D30D6E3F1737DFA2C2EC82822FFB794888DF8AA9AFAE2
3,539,338 UART: Caliptra RT
3,539,683 UART: [state] CFI Enabled
3,647,088 UART: [rt] RT listening for mailbox commands...
3,647,758 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,480 UART: [rt]cmd =0x41544d4e, len=14344
4,690,890 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,019 UART: [kat] ++
895,171 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,166 UART: [kat] SHA2-512-ACC
906,067 UART: [kat] ECC-384
915,744 UART: [kat] HMAC-384Kdf
920,214 UART: [kat] LMS
1,168,526 UART: [kat] --
1,169,467 UART: [cold-reset] ++
1,169,897 UART: [fht] FHT @ 0x50003400
1,172,641 UART: [idev] ++
1,172,809 UART: [idev] CDI.KEYID = 6
1,173,170 UART: [idev] SUBJECT.KEYID = 7
1,173,595 UART: [idev] UDS.KEYID = 0
1,173,941 ready_for_fw is high
1,173,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,637 UART: [idev] Erasing UDS.KEYID = 0
1,198,179 UART: [idev] Sha1 KeyId Algorithm
1,207,167 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,214,850 UART: [ldev] Erasing FE.KEYID = 1
1,241,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,396 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,495 UART: [fwproc] Recv command 0x46574c44
1,282,228 UART: [fwproc] Recv'd Img size: 114448 bytes
3,133,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,327,032 >>> mbox cmd response: success
3,328,095 UART: [afmc] ++
3,328,263 UART: [afmc] CDI.KEYID = 6
3,328,626 UART: [afmc] SUBJECT.KEYID = 7
3,329,052 UART: [afmc] AUTHORITY.KEYID = 5
3,364,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,891 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,387,601 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,393,491 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,202 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,916 UART: [afmc] --
3,407,830 UART: [cold-reset] --
3,408,664 UART: [state] Locking Datavault
3,409,745 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,349 UART: [state] Locking ICCM
3,411,005 UART: [exit] Launching FMC @ 0x40000130
3,416,334 UART:
3,416,350 UART: Running Caliptra FMC ...
3,416,758 UART:
3,416,812 UART: [state] CFI Enabled
3,427,098 UART: [fht] FMC Alias Private Key: 7
3,534,260 UART: [art] Extend RT PCRs Done
3,534,688 UART: [art] Lock RT PCRs Done
3,536,354 UART: [art] Populate DV Done
3,544,610 UART: [fht] FMC Alias Private Key: 7
3,545,592 UART: [art] Derive CDI
3,545,872 UART: [art] Store in in slot 0x4
3,631,659 UART: [art] Derive Key Pair
3,632,019 UART: [art] Store priv key in slot 0x5
3,645,491 UART: [art] Derive Key Pair - Done
3,660,322 UART: [art] Signing Cert with AUTHO
3,660,802 UART: RITY.KEYID = 7
3,675,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,481 UART: [art] PUB.X = 9444A4DF39922B200CD5DD6F6F6CA74C5D36259CBE0AD0D47E1CABDD3352E510E7153BFD78A0719BF56B4C12F9BF0BBE
3,683,264 UART: [art] PUB.Y = 12DB9E2E2A329AEA97869CD7477A074D374A7BC07E4562E5AB0548951EADFE20215850347F97826627A8AB332DD4F09D
3,690,210 UART: [art] SIG.R = 65A2A8E1AB04C188588D3B23FC2AC2775EA69A8B56F0D039E166B0D0398FA9FE77D7FB35911FF55FA038349E7CDB56E6
3,696,989 UART: [art] SIG.S = 0E746CE0FB1E595E8348FDDC4E18D6ED951CDDBF31BBE9350171E27DABD7F2C56EF7A6B1F919D451628031DE04B6D0CB
3,720,857 UART: Caliptra RT
3,721,110 UART: [state] CFI Enabled
3,829,541 UART: [rt] RT listening for mailbox commands...
3,830,211 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,269 UART: [rt]cmd =0x41544d4e, len=14344
4,873,611 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,482 ready_for_fw is high
1,056,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,178,633 >>> mbox cmd response: success
3,240,774 UART:
3,240,790 UART: Running Caliptra FMC ...
3,241,198 UART:
3,241,252 UART: [state] CFI Enabled
3,251,620 UART: [fht] FMC Alias Private Key: 7
3,359,182 UART: [art] Extend RT PCRs Done
3,359,610 UART: [art] Lock RT PCRs Done
3,361,192 UART: [art] Populate DV Done
3,369,408 UART: [fht] FMC Alias Private Key: 7
3,370,404 UART: [art] Derive CDI
3,370,684 UART: [art] Store in in slot 0x4
3,456,125 UART: [art] Derive Key Pair
3,456,485 UART: [art] Store priv key in slot 0x5
3,469,327 UART: [art] Derive Key Pair - Done
3,484,385 UART: [art] Signing Cert with AUTHO
3,484,865 UART: RITY.KEYID = 7
3,500,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,500,890 UART: [art] PUB.X = 0E96302995600731F98C85FCB42623267B080C1AAC93E42B7F18045FCCFC0B70B1CE556E1E9C61759D34BFD4F2ABDF2F
3,507,652 UART: [art] PUB.Y = BC60B41671F4CF3A23F806F20DBDFB4028BC257C1FECA2E242B59A649E927E0BC8AB802407DA4438982D524709EC1A34
3,514,597 UART: [art] SIG.R = 3CB407A6ACD34ECA4087BA28CD5F1F93D33D50CED4CCFDAAA2A4C47898B6BFFF390EA3AD91DB2DD390A84F18BCA645C2
3,521,395 UART: [art] SIG.S = F63501C944FCD07AD396270CDCCBD37238F444934938C01BE1A6C9213F288FE52E8E48A1663A7DA1023B7690D88E12E1
3,544,947 UART: Caliptra RT
3,545,200 UART: [state] CFI Enabled
3,652,520 UART: [rt] RT listening for mailbox commands...
3,653,190 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,150 UART: [rt]cmd =0x41544d4e, len=14344
4,686,640 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,853 UART: [state] LifecycleState = Unprovisioned
86,508 UART: [state] DebugLocked = No
87,242 UART: [state] WD Timer not started. Device not locked for debugging
88,381 UART: [kat] SHA2-256
891,931 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,060 UART: [kat] ++
896,212 UART: [kat] sha1
900,392 UART: [kat] SHA2-256
902,332 UART: [kat] SHA2-384
905,215 UART: [kat] SHA2-512-ACC
907,116 UART: [kat] ECC-384
916,761 UART: [kat] HMAC-384Kdf
921,457 UART: [kat] LMS
1,169,769 UART: [kat] --
1,170,516 UART: [cold-reset] ++
1,170,990 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,174,916 ready_for_fw is high
1,174,916 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,404 UART: [idev] Erasing UDS.KEYID = 0
1,199,732 UART: [idev] Sha1 KeyId Algorithm
1,208,562 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,699 UART: [ldev] Erasing FE.KEYID = 1
1,242,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,007 UART: [ldev] --
1,282,511 UART: [fwproc] Wait for Commands...
1,283,140 UART: [fwproc] Recv command 0x46574c44
1,283,873 UART: [fwproc] Recv'd Img size: 114448 bytes
3,137,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,165,603 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,194,912 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,330,892 >>> mbox cmd response: success
3,331,999 UART: [afmc] ++
3,332,167 UART: [afmc] CDI.KEYID = 6
3,332,530 UART: [afmc] SUBJECT.KEYID = 7
3,332,956 UART: [afmc] AUTHORITY.KEYID = 5
3,368,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,384,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,385,719 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,391,429 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,397,319 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,403,030 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,410,912 UART: [afmc] --
3,411,958 UART: [cold-reset] --
3,412,594 UART: [state] Locking Datavault
3,413,583 UART: [state] Locking PCR0, PCR1 and PCR31
3,414,187 UART: [state] Locking ICCM
3,414,691 UART: [exit] Launching FMC @ 0x40000130
3,420,020 UART:
3,420,036 UART: Running Caliptra FMC ...
3,420,444 UART:
3,420,587 UART: [state] CFI Enabled
3,431,327 UART: [fht] FMC Alias Private Key: 7
3,539,653 UART: [art] Extend RT PCRs Done
3,540,081 UART: [art] Lock RT PCRs Done
3,541,639 UART: [art] Populate DV Done
3,550,063 UART: [fht] FMC Alias Private Key: 7
3,551,233 UART: [art] Derive CDI
3,551,513 UART: [art] Store in in slot 0x4
3,637,032 UART: [art] Derive Key Pair
3,637,392 UART: [art] Store priv key in slot 0x5
3,650,560 UART: [art] Derive Key Pair - Done
3,665,261 UART: [art] Signing Cert with AUTHO
3,665,741 UART: RITY.KEYID = 7
3,680,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,681,546 UART: [art] PUB.X = 4DFE25AC61BC352F04A9B32FE7FED7FAAB796713275CBCD95ED32A11A8046AD1056917A407D8DF73BF7B3D35FCE7228F
3,688,324 UART: [art] PUB.Y = 3ED8346FDA1E88DF738269FCEB1F250C15084EF6B7E6E92D335C1EA35441B5E9760AB80E78C60ADBD556272D4D4A9D6A
3,695,273 UART: [art] SIG.R = 3100FE79767CAEBCC5A18F60111D2C81CDCD2B262ABD3910D80ECBA18C621E433F0CDED616F1BDD278BB22C31CC2517B
3,702,037 UART: [art] SIG.S = 089D34A7D7ABF8957308C4C4579180A1128266CDEEE1E1B10FE56C3399A7081F77AA47139FCB3591C6A72C8F00C30EBD
3,726,305 UART: Caliptra RT
3,726,650 UART: [state] CFI Enabled
3,834,499 UART: [rt] RT listening for mailbox commands...
3,835,169 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,958,071 UART: [rt]cmd =0x41544d4e, len=14344
4,875,888 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,177 ready_for_fw is high
1,056,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,205 >>> mbox cmd response: success
3,228,276 UART:
3,228,292 UART: Running Caliptra FMC ...
3,228,700 UART:
3,228,843 UART: [state] CFI Enabled
3,239,603 UART: [fht] FMC Alias Private Key: 7
3,346,857 UART: [art] Extend RT PCRs Done
3,347,285 UART: [art] Lock RT PCRs Done
3,348,811 UART: [art] Populate DV Done
3,356,871 UART: [fht] FMC Alias Private Key: 7
3,357,807 UART: [art] Derive CDI
3,358,087 UART: [art] Store in in slot 0x4
3,443,792 UART: [art] Derive Key Pair
3,444,152 UART: [art] Store priv key in slot 0x5
3,457,064 UART: [art] Derive Key Pair - Done
3,471,977 UART: [art] Signing Cert with AUTHO
3,472,457 UART: RITY.KEYID = 7
3,487,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,852 UART: [art] PUB.X = 17E68E718BA8DA74319D93B0306A8530937E1C64F71698E950554972E0090CE1EBC2B86E37AB97C1D1F966E5D3F6DA68
3,494,616 UART: [art] PUB.Y = 1C839BE24CC22FCC50830481F3BD47334188B6335E4185D493A77F2059D46FBB5A247E58ABD1338F9FA33CD7677B2BEA
3,501,569 UART: [art] SIG.R = B0533A5E7B27D60052E6BE12DF99F1AB91A89FC82EC5881E0594669AFCEDD0E97BA783CF082B5F9E90D454B8337B4F4A
3,508,325 UART: [art] SIG.S = C6599B733795D0AD23BB249E9A58CBE7BB73FE06A4DC7C3D63568694B196B8E312FA2DDDF34B4B9D364CD45AC9C1922A
3,532,385 UART: Caliptra RT
3,532,730 UART: [state] CFI Enabled
3,640,369 UART: [rt] RT listening for mailbox commands...
3,641,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,157 UART: [rt]cmd =0x41544d4e, len=14344
4,689,371 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,348 UART:
192,695 UART: Running Caliptra ROM ...
193,881 UART:
194,040 UART: [state] CFI Enabled
265,292 UART: [state] LifecycleState = Unprovisioned
267,274 UART: [state] DebugLocked = No
268,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,734 UART: [kat] SHA2-256
442,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,885 UART: [kat] ++
453,433 UART: [kat] sha1
464,371 UART: [kat] SHA2-256
467,074 UART: [kat] SHA2-384
473,357 UART: [kat] SHA2-512-ACC
475,723 UART: [kat] ECC-384
2,768,833 UART: [kat] HMAC-384Kdf
2,800,377 UART: [kat] LMS
3,990,666 UART: [kat] --
3,995,894 UART: [cold-reset] ++
3,997,897 UART: [fht] Storing FHT @ 0x50003400
4,008,675 UART: [idev] ++
4,009,248 UART: [idev] CDI.KEYID = 6
4,010,288 UART: [idev] SUBJECT.KEYID = 7
4,011,467 UART: [idev] UDS.KEYID = 0
4,012,532 ready_for_fw is high
4,012,744 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,300 UART: [idev] Erasing UDS.KEYID = 0
7,347,648 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,945 UART: [idev] --
7,374,693 UART: [ldev] ++
7,375,261 UART: [ldev] CDI.KEYID = 6
7,376,198 UART: [ldev] SUBJECT.KEYID = 5
7,377,476 UART: [ldev] AUTHORITY.KEYID = 7
7,378,631 UART: [ldev] FE.KEYID = 1
7,424,955 UART: [ldev] Erasing FE.KEYID = 1
10,760,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,966 UART: [ldev] --
13,138,216 UART: [fwproc] Waiting for Commands...
13,140,417 UART: [fwproc] Received command 0x46574c44
13,142,596 UART: [fwproc] Received Image of size 114124 bytes
17,189,695 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,711 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,572 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,651,345 >>> mbox cmd response: success
17,655,346 UART: [afmc] ++
17,655,945 UART: [afmc] CDI.KEYID = 6
17,656,882 UART: [afmc] SUBJECT.KEYID = 7
17,658,154 UART: [afmc] AUTHORITY.KEYID = 5
21,027,856 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,089 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,352 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,762 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,554 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,012 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,396 UART: [afmc] --
23,402,209 UART: [cold-reset] --
23,404,394 UART: [state] Locking Datavault
23,408,993 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,696 UART: [state] Locking ICCM
23,412,496 UART: [exit] Launching FMC @ 0x40000130
23,420,872 UART:
23,421,153 UART: Running Caliptra FMC ...
23,422,184 UART:
23,422,336 UART: [state] CFI Enabled
23,490,569 UART: [fht] FMC Alias Private Key: 7
25,829,069 UART: [art] Extend RT PCRs Done
25,830,296 UART: [art] Lock RT PCRs Done
25,832,009 UART: [art] Populate DV Done
25,837,533 UART: [fht] FMC Alias Private Key: 7
25,839,233 UART: [art] Derive CDI
25,839,972 UART: [art] Store in in slot 0x4
25,899,453 UART: [art] Derive Key Pair
25,900,491 UART: [art] Store priv key in slot 0x5
29,193,212 UART: [art] Derive Key Pair - Done
29,206,370 UART: [art] Signing Cert with AUTHO
29,207,667 UART: RITY.KEYID = 7
31,494,507 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,011 UART: [art] PUB.X = D0F5577019B4BC64D0AD4AE62E48CD74A5966879F13CB65DD510AAAB8FFB1A98BD3F0353AEC688B0D4BC74CC805BBC60
31,503,285 UART: [art] PUB.Y = 3878853F20058CAF256E797E7060C076EC9D7BA7A81C4F4D6991A6040F54D12B2F74A3215F2755CAD7C8AFC5124CEEA6
31,510,522 UART: [art] SIG.R = 1DA5C9FF597FEFE41D3AAE50A86FA3646721C65138BA1E6151ECCE0634F2B16174FC2FF0A12DC6D42B404645E344FCE0
31,517,917 UART: [art] SIG.S = AF1A220989873965ACFDF7443513B2A2D429D9D1B49280CFBF04F425509E097B40ADC43E17D8E01499209D2A65C60E70
32,822,617 UART: Caliptra RT
32,823,326 UART: [state] CFI Enabled
32,983,945 UART: [rt] RT listening for mailbox commands...
32,986,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,141,378 UART: [rt]cmd =0x41544d4e, len=14344
38,377,207 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,806,146 ready_for_fw is high
3,806,681 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,860,752 >>> mbox cmd response: success
23,544,446 UART:
23,544,814 UART: Running Caliptra FMC ...
23,545,966 UART:
23,546,128 UART: [state] CFI Enabled
23,613,533 UART: [fht] FMC Alias Private Key: 7
25,951,564 UART: [art] Extend RT PCRs Done
25,952,789 UART: [art] Lock RT PCRs Done
25,954,475 UART: [art] Populate DV Done
25,959,778 UART: [fht] FMC Alias Private Key: 7
25,961,377 UART: [art] Derive CDI
25,962,193 UART: [art] Store in in slot 0x4
26,021,803 UART: [art] Derive Key Pair
26,022,852 UART: [art] Store priv key in slot 0x5
29,315,065 UART: [art] Derive Key Pair - Done
29,328,027 UART: [art] Signing Cert with AUTHO
29,329,339 UART: RITY.KEYID = 7
31,616,750 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,257 UART: [art] PUB.X = 761ACD8EF93F68AC0AA1962FC6102DEEEA7B1BDCD51C26864499D8DF2E904F3B8E6D6C7EFAB2EAD745B63D9D02F6AF60
31,625,548 UART: [art] PUB.Y = CC9041151E7467378FF4BE921BAF9141B7ADD7751B115B0773B461F727FE2595BD4212BF5AA71AC21E630750472F0CE0
31,632,790 UART: [art] SIG.R = 7ACF775081DD2458B231214F401674EE0DA10E03E82EB620A939CEDDBA3467651C31FF87C6FF3283F0A4CFE8C0E5AB18
31,640,156 UART: [art] SIG.S = E0764ED824C1D0B3D3A6B27974F0E157979BD6CA954352E9EFBFD640E4923ED8CFF05B51382EB24317B7B557B026D4C3
32,945,450 UART: Caliptra RT
32,946,144 UART: [state] CFI Enabled
33,105,984 UART: [rt] RT listening for mailbox commands...
33,108,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,263,860 UART: [rt]cmd =0x41544d4e, len=14344
38,499,778 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,360 UART:
192,746 UART: Running Caliptra ROM ...
193,944 UART:
603,489 UART: [state] CFI Enabled
618,582 UART: [state] LifecycleState = Unprovisioned
620,541 UART: [state] DebugLocked = No
623,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,907 UART: [kat] SHA2-256
797,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,209 UART: [kat] ++
808,682 UART: [kat] sha1
819,481 UART: [kat] SHA2-256
822,195 UART: [kat] SHA2-384
826,486 UART: [kat] SHA2-512-ACC
828,851 UART: [kat] ECC-384
3,113,616 UART: [kat] HMAC-384Kdf
3,126,057 UART: [kat] LMS
4,316,113 UART: [kat] --
4,322,196 UART: [cold-reset] ++
4,324,488 UART: [fht] Storing FHT @ 0x50003400
4,335,903 UART: [idev] ++
4,336,463 UART: [idev] CDI.KEYID = 6
4,337,492 UART: [idev] SUBJECT.KEYID = 7
4,338,660 UART: [idev] UDS.KEYID = 0
4,339,720 ready_for_fw is high
4,339,914 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,232 UART: [idev] Erasing UDS.KEYID = 0
7,624,976 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,414 UART: [idev] --
7,650,355 UART: [ldev] ++
7,650,921 UART: [ldev] CDI.KEYID = 6
7,651,881 UART: [ldev] SUBJECT.KEYID = 5
7,653,087 UART: [ldev] AUTHORITY.KEYID = 7
7,654,393 UART: [ldev] FE.KEYID = 1
7,664,455 UART: [ldev] Erasing FE.KEYID = 1
10,952,269 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,084 UART: [ldev] --
13,313,047 UART: [fwproc] Waiting for Commands...
13,315,564 UART: [fwproc] Received command 0x46574c44
13,317,793 UART: [fwproc] Received Image of size 114124 bytes
17,376,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,943 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,838 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,023 >>> mbox cmd response: success
17,837,958 UART: [afmc] ++
17,838,569 UART: [afmc] CDI.KEYID = 6
17,839,447 UART: [afmc] SUBJECT.KEYID = 7
17,840,706 UART: [afmc] AUTHORITY.KEYID = 5
21,158,151 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,030 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,287 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,686 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,505 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,943 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,216 UART: [afmc] --
23,521,771 UART: [cold-reset] --
23,526,553 UART: [state] Locking Datavault
23,531,479 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,177 UART: [state] Locking ICCM
23,534,674 UART: [exit] Launching FMC @ 0x40000130
23,543,069 UART:
23,543,316 UART: Running Caliptra FMC ...
23,544,414 UART:
23,544,574 UART: [state] CFI Enabled
23,552,533 UART: [fht] FMC Alias Private Key: 7
25,883,780 UART: [art] Extend RT PCRs Done
25,885,015 UART: [art] Lock RT PCRs Done
25,886,839 UART: [art] Populate DV Done
25,892,301 UART: [fht] FMC Alias Private Key: 7
25,893,838 UART: [art] Derive CDI
25,894,647 UART: [art] Store in in slot 0x4
25,936,916 UART: [art] Derive Key Pair
25,937,956 UART: [art] Store priv key in slot 0x5
29,179,528 UART: [art] Derive Key Pair - Done
29,192,414 UART: [art] Signing Cert with AUTHO
29,193,742 UART: RITY.KEYID = 7
31,473,511 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,035 UART: [art] PUB.X = 21D8AD925858ACD78DAC6BA52F51436848B1E84B8C52DDE893AD6757180A2EE7FBABDFAED6B671932760C33DB42F0C53
31,482,269 UART: [art] PUB.Y = 5E7674207026134CCB6AED1B41BF4C949929ABC6D7E009C40D170CE86E473FE414A8BD505BD84DA1C69BA77EA0ADCF6F
31,489,537 UART: [art] SIG.R = 8B97F352F111DCF1DD3F09F8411FA47B8E2982E372F15F2F349E3F3F258E114A9C457CA5BEF41CC91467AF2D0C9BB9E4
31,496,910 UART: [art] SIG.S = CAC1DB8EE57C7EF0B3D045A50C5E6070CA36CA6ACB827ED37D5AF73804AE8A671BD451F2C45DADFA09079A5C86296072
32,801,762 UART: Caliptra RT
32,802,445 UART: [state] CFI Enabled
32,920,769 UART: [rt] RT listening for mailbox commands...
32,923,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,078,368 UART: [rt]cmd =0x41544d4e, len=14344
38,314,061 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
4,131,974 ready_for_fw is high
4,132,383 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,064,385 >>> mbox cmd response: success
23,699,414 UART:
23,699,810 UART: Running Caliptra FMC ...
23,701,111 UART:
23,701,276 UART: [state] CFI Enabled
23,708,666 UART: [fht] FMC Alias Private Key: 7
26,039,368 UART: [art] Extend RT PCRs Done
26,040,596 UART: [art] Lock RT PCRs Done
26,042,518 UART: [art] Populate DV Done
26,047,879 UART: [fht] FMC Alias Private Key: 7
26,049,473 UART: [art] Derive CDI
26,050,288 UART: [art] Store in in slot 0x4
26,092,769 UART: [art] Derive Key Pair
26,093,769 UART: [art] Store priv key in slot 0x5
29,335,439 UART: [art] Derive Key Pair - Done
29,348,239 UART: [art] Signing Cert with AUTHO
29,349,542 UART: RITY.KEYID = 7
31,629,003 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,521 UART: [art] PUB.X = EB7EA10B58ADE3D444556F0E9CF6F8AD93CCB2F7AA5CC2125100BBC49918550729C471198E972B4B51BD9741C2B71A67
31,637,806 UART: [art] PUB.Y = 31291B61C4515B14A172E346C1E8C6A62108A37F9FDBBD822B65CEC66DC463006B46D6649FDAB8E0FC588F7D6F4BD5D6
31,645,009 UART: [art] SIG.R = AF26FB58573689EDDB139C2C81E1E00E458D0A0BECD8F4493F0406A5F3D211EC55B5B939C3BF7162B9A7A9EA775A96EB
31,652,405 UART: [art] SIG.S = EEF9D33A8425A42F2739D6DC9D3E83B187A65128EABF1A609A99E309F2C2ACB2412BCF9FAB3E04019CBBC2CC33E08392
32,957,273 UART: Caliptra RT
32,957,966 UART: [state] CFI Enabled
33,075,314 UART: [rt] RT listening for mailbox commands...
33,077,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,233,085 UART: [rt]cmd =0x41544d4e, len=14344
38,468,259 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,088 UART:
192,445 UART: Running Caliptra ROM ...
193,636 UART:
193,803 UART: [state] CFI Enabled
262,913 UART: [state] LifecycleState = Unprovisioned
264,825 UART: [state] DebugLocked = No
267,499 UART: [state] WD Timer not started. Device not locked for debugging
270,749 UART: [kat] SHA2-256
449,885 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,417 UART: [kat] ++
461,867 UART: [kat] sha1
474,179 UART: [kat] SHA2-256
477,187 UART: [kat] SHA2-384
482,630 UART: [kat] SHA2-512-ACC
485,617 UART: [kat] ECC-384
2,948,035 UART: [kat] HMAC-384Kdf
2,972,197 UART: [kat] LMS
3,501,665 UART: [kat] --
3,504,614 UART: [cold-reset] ++
3,506,120 UART: [fht] FHT @ 0x50003400
3,517,376 UART: [idev] ++
3,517,942 UART: [idev] CDI.KEYID = 6
3,519,035 UART: [idev] SUBJECT.KEYID = 7
3,520,069 UART: [idev] UDS.KEYID = 0
3,521,063 ready_for_fw is high
3,521,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,146 UART: [idev] Erasing UDS.KEYID = 0
6,028,213 UART: [idev] Sha1 KeyId Algorithm
6,052,758 UART: [idev] --
6,056,381 UART: [ldev] ++
6,056,957 UART: [ldev] CDI.KEYID = 6
6,057,871 UART: [ldev] SUBJECT.KEYID = 5
6,059,089 UART: [ldev] AUTHORITY.KEYID = 7
6,060,330 UART: [ldev] FE.KEYID = 1
6,099,289 UART: [ldev] Erasing FE.KEYID = 1
8,602,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,545 UART: [ldev] --
10,415,814 UART: [fwproc] Wait for Commands...
10,417,314 UART: [fwproc] Recv command 0x46574c44
10,419,422 UART: [fwproc] Recv'd Img size: 114448 bytes
13,822,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,591 >>> mbox cmd response: success
14,287,381 UART: [afmc] ++
14,287,980 UART: [afmc] CDI.KEYID = 6
14,288,895 UART: [afmc] SUBJECT.KEYID = 7
14,290,054 UART: [afmc] AUTHORITY.KEYID = 5
16,828,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,245 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,128 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,089 UART: [afmc] --
18,626,681 UART: [cold-reset] --
18,630,539 UART: [state] Locking Datavault
18,636,055 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,701 UART: [state] Locking ICCM
18,640,267 UART: [exit] Launching FMC @ 0x40000130
18,648,684 UART:
18,648,926 UART: Running Caliptra FMC ...
18,650,031 UART:
18,650,199 UART: [state] CFI Enabled
18,710,776 UART: [fht] FMC Alias Private Key: 7
20,474,898 UART: [art] Extend RT PCRs Done
20,476,117 UART: [art] Lock RT PCRs Done
20,477,792 UART: [art] Populate DV Done
20,483,153 UART: [fht] FMC Alias Private Key: 7
20,484,869 UART: [art] Derive CDI
20,485,691 UART: [art] Store in in slot 0x4
20,543,082 UART: [art] Derive Key Pair
20,544,088 UART: [art] Store priv key in slot 0x5
23,006,919 UART: [art] Derive Key Pair - Done
23,019,595 UART: [art] Signing Cert with AUTHO
23,020,891 UART: RITY.KEYID = 7
24,732,974 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,477 UART: [art] PUB.X = F0BA1E68DE2394CF444928C6299989247360277920CBE49949ED2A773EE1729BD09A1736A2EBB120ACC926EC473FBEAA
24,741,729 UART: [art] PUB.Y = 25E7B31808286D48FC6AB6A37F2152B8A8BC3711D6CE44458894ECE83CA4B17A07E598F2481AE84FE12BECD0873D96DE
24,749,031 UART: [art] SIG.R = 0BBB3AAAD4591777A913736BCB9DC46530E08D88CD6D9A32AF9764B48C0B2A882318F7A11E1CCE5A569A05B6762B3B4F
24,756,431 UART: [art] SIG.S = C587D12663D6E962CFB39DE8E987C7DBF66FC58023A3BB4A289E91684B18E33F54BE6A231499828EFDD1655A6FB9EA12
25,735,265 UART: Caliptra RT
25,735,956 UART: [state] CFI Enabled
25,901,762 UART: [rt] RT listening for mailbox commands...
25,904,084 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,060,012 UART: [rt]cmd =0x41544d4e, len=14344
29,991,067 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,358,999 ready_for_fw is high
3,359,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,043,964 >>> mbox cmd response: success
18,323,671 UART:
18,324,063 UART: Running Caliptra FMC ...
18,325,168 UART:
18,325,322 UART: [state] CFI Enabled
18,390,619 UART: [fht] FMC Alias Private Key: 7
20,154,508 UART: [art] Extend RT PCRs Done
20,155,719 UART: [art] Lock RT PCRs Done
20,157,423 UART: [art] Populate DV Done
20,162,861 UART: [fht] FMC Alias Private Key: 7
20,164,451 UART: [art] Derive CDI
20,165,190 UART: [art] Store in in slot 0x4
20,223,095 UART: [art] Derive Key Pair
20,224,112 UART: [art] Store priv key in slot 0x5
22,687,935 UART: [art] Derive Key Pair - Done
22,700,448 UART: [art] Signing Cert with AUTHO
22,701,752 UART: RITY.KEYID = 7
24,413,218 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,718 UART: [art] PUB.X = 63A355576013390A556FDB6733814EFD4F27BC84D58106B16A841F2D1F1B02443F91380D0C838933A187D864C8FC0D61
24,421,957 UART: [art] PUB.Y = B16CCB58C08A974E64AC989DCCEBD3C853AAAC686D5F1E4AE39ACD70C652FFE89C985EBC631030FBEFC380DBAB55C036
24,429,275 UART: [art] SIG.R = AEC28C4EE6DC444C31C1E9C826CEFDB8494067E65FE8E5227F30DEA969E63C31CFDB19D032EF4E69501BFE12DF90430D
24,436,667 UART: [art] SIG.S = 5B9F87B49296DAC2256AC815E9BABF9A2EA2C67D3FB783500D153F470FCA9B196777545909501EB0575E1D1F74147569
25,416,048 UART: Caliptra RT
25,416,741 UART: [state] CFI Enabled
25,580,393 UART: [rt] RT listening for mailbox commands...
25,582,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,738,728 UART: [rt]cmd =0x41544d4e, len=14344
29,669,178 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,542 writing to cptra_bootfsm_go
192,792 UART:
193,149 UART: Running Caliptra ROM ...
194,336 UART:
604,063 UART: [state] CFI Enabled
616,741 UART: [state] LifecycleState = Unprovisioned
618,603 UART: [state] DebugLocked = No
620,474 UART: [state] WD Timer not started. Device not locked for debugging
624,443 UART: [kat] SHA2-256
803,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,090 UART: [kat] ++
815,538 UART: [kat] sha1
826,541 UART: [kat] SHA2-256
829,605 UART: [kat] SHA2-384
834,870 UART: [kat] SHA2-512-ACC
837,863 UART: [kat] ECC-384
3,276,820 UART: [kat] HMAC-384Kdf
3,289,341 UART: [kat] LMS
3,818,874 UART: [kat] --
3,822,949 UART: [cold-reset] ++
3,825,302 UART: [fht] FHT @ 0x50003400
3,835,654 UART: [idev] ++
3,836,261 UART: [idev] CDI.KEYID = 6
3,837,167 UART: [idev] SUBJECT.KEYID = 7
3,838,356 UART: [idev] UDS.KEYID = 0
3,839,280 ready_for_fw is high
3,839,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,983,037 UART: [idev] Erasing UDS.KEYID = 0
6,313,893 UART: [idev] Sha1 KeyId Algorithm
6,338,312 UART: [idev] --
6,341,655 UART: [ldev] ++
6,342,208 UART: [ldev] CDI.KEYID = 6
6,343,084 UART: [ldev] SUBJECT.KEYID = 5
6,344,287 UART: [ldev] AUTHORITY.KEYID = 7
6,345,565 UART: [ldev] FE.KEYID = 1
6,358,120 UART: [ldev] Erasing FE.KEYID = 1
8,833,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,815 UART: [ldev] --
10,626,850 UART: [fwproc] Wait for Commands...
10,628,448 UART: [fwproc] Recv command 0x46574c44
10,630,585 UART: [fwproc] Recv'd Img size: 114448 bytes
14,037,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,824 >>> mbox cmd response: success
14,497,801 UART: [afmc] ++
14,498,398 UART: [afmc] CDI.KEYID = 6
14,499,302 UART: [afmc] SUBJECT.KEYID = 7
14,500,507 UART: [afmc] AUTHORITY.KEYID = 5
16,997,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,673 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,497 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,337 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,201 UART: [afmc] --
18,795,938 UART: [cold-reset] --
18,799,910 UART: [state] Locking Datavault
18,804,182 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,878 UART: [state] Locking ICCM
18,808,181 UART: [exit] Launching FMC @ 0x40000130
18,816,578 UART:
18,816,808 UART: Running Caliptra FMC ...
18,817,905 UART:
18,818,060 UART: [state] CFI Enabled
18,826,372 UART: [fht] FMC Alias Private Key: 7
20,582,873 UART: [art] Extend RT PCRs Done
20,584,095 UART: [art] Lock RT PCRs Done
20,585,906 UART: [art] Populate DV Done
20,591,099 UART: [fht] FMC Alias Private Key: 7
20,592,748 UART: [art] Derive CDI
20,593,554 UART: [art] Store in in slot 0x4
20,636,522 UART: [art] Derive Key Pair
20,637,558 UART: [art] Store priv key in slot 0x5
23,064,442 UART: [art] Derive Key Pair - Done
23,077,493 UART: [art] Signing Cert with AUTHO
23,078,789 UART: RITY.KEYID = 7
24,784,548 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,049 UART: [art] PUB.X = 3768652E0BEE4D2A82CAEB52D5E9927DA4C39C8062BC8DCFAD585AA39413473E77E9A883D4ADBC3DC3B7456C3A22CFA0
24,793,408 UART: [art] PUB.Y = 959F7FCCCF6FDFD3601612D7620749D3680F3E8E3A6584FC0AA01BE0D5C68F012611565DB9200BE067722647055B8D65
24,800,631 UART: [art] SIG.R = 4E6CEC84E1BC5C1DEA22A87505689362EB934A91D68E48024A4DEBD85ED60C9CC727E8984B01643360A3F2920BF3A555
24,808,013 UART: [art] SIG.S = 1D5F54950E2C79ADEDBFC9D8802D6D178208ADB52F05EFA51986EFFB7F18DC262A93DBBFDA0EB67B109631E207253DD6
25,787,411 UART: Caliptra RT
25,788,097 UART: [state] CFI Enabled
25,904,558 UART: [rt] RT listening for mailbox commands...
25,906,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,062,921 UART: [rt]cmd =0x41544d4e, len=14344
29,993,572 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,694,452 ready_for_fw is high
3,694,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,263,121 >>> mbox cmd response: success
18,509,133 UART:
18,509,534 UART: Running Caliptra FMC ...
18,510,835 UART:
18,510,995 UART: [state] CFI Enabled
18,518,832 UART: [fht] FMC Alias Private Key: 7
20,275,587 UART: [art] Extend RT PCRs Done
20,276,773 UART: [art] Lock RT PCRs Done
20,278,172 UART: [art] Populate DV Done
20,283,657 UART: [fht] FMC Alias Private Key: 7
20,285,244 UART: [art] Derive CDI
20,286,051 UART: [art] Store in in slot 0x4
20,328,377 UART: [art] Derive Key Pair
20,329,412 UART: [art] Store priv key in slot 0x5
22,756,459 UART: [art] Derive Key Pair - Done
22,769,507 UART: [art] Signing Cert with AUTHO
22,770,819 UART: RITY.KEYID = 7
24,475,865 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,352 UART: [art] PUB.X = 95122323840D591FC714F7156ABB4F2EC61C260C54402BB67DACF3265A2A709F7C93AB5E10445D48BBF0C4FC8AE672EE
24,484,634 UART: [art] PUB.Y = 8BD5099B54D260ACD7C19C897338043D3CBCFF27F2F154A4ACBED1DA791B6689BDE1E41B62C0DD42A51C5D27CC489A54
24,491,955 UART: [art] SIG.R = 49E4B1878E5E0CBAC20C0BA86C8F514FD2491DC52F4F09D262714D858C1008F69F709981A30E44B3C7A38BA93AC92B8C
24,499,324 UART: [art] SIG.S = 3B9D1022D7DFFBFC709BB64A2573AD3A4479AD340FA4CA53D451B21C5A080FAA4C911B71215092C3B17343FD70DE3B6D
25,478,238 UART: Caliptra RT
25,478,944 UART: [state] CFI Enabled
25,597,157 UART: [rt] RT listening for mailbox commands...
25,599,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,754,678 UART: [rt]cmd =0x41544d4e, len=14344
29,685,293 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,439,976 ready_for_fw is high
3,440,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,741,439 >>> mbox cmd response: success
19,029,364 UART:
19,029,784 UART: Running Caliptra FMC ...
19,030,919 UART:
19,031,079 UART: [state] CFI Enabled
19,097,306 UART: [fht] FMC Alias Private Key: 7
20,861,674 UART: [art] Extend RT PCRs Done
20,862,901 UART: [art] Lock RT PCRs Done
20,864,607 UART: [art] Populate DV Done
20,870,067 UART: [fht] FMC Alias Private Key: 7
20,871,607 UART: [art] Derive CDI
20,872,340 UART: [art] Store in in slot 0x4
20,930,194 UART: [art] Derive Key Pair
20,931,240 UART: [art] Store priv key in slot 0x5
23,394,270 UART: [art] Derive Key Pair - Done
23,407,210 UART: [art] Signing Cert with AUTHO
23,408,509 UART: RITY.KEYID = 7
25,119,884 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,392 UART: [art] PUB.X = E29F8547B293A36E3202C89529D1A7DD1D41CC3087D2D9845D07A13EB489E34B58D17EE7FAB87596C358B41CB9065163
25,128,675 UART: [art] PUB.Y = 9BDB1AB7C9D500BDCB500065930D5B8E44EDF1934E51C2A4C3D4A3F8782117ACE84A3496D4D46C1F50052256AC04E65B
25,135,843 UART: [art] SIG.R = 2149BFEE8D7C578101B16ADA4BC425B793BE40930C3A1064B2368996E0292F3E59E8FCE0689956D56ED20B026C7C4DBE
25,143,232 UART: [art] SIG.S = BFC30EF1B852F714D94008A329C9E97BF00C16D08C2C013EE31AB8CC060A70D6CBDD20666C5DA59643BAFAD53DDE63D7
26,122,038 UART: Caliptra RT
26,122,765 UART: [state] CFI Enabled
26,288,548 UART: [rt] RT listening for mailbox commands...
26,290,848 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,446,617 UART: [rt]cmd =0x41544d4e, len=14344
30,376,866 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
3,751,635 ready_for_fw is high
3,752,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,969,401 >>> mbox cmd response: success
19,222,570 UART:
19,222,960 UART: Running Caliptra FMC ...
19,224,145 UART:
19,224,316 UART: [state] CFI Enabled
19,232,190 UART: [fht] FMC Alias Private Key: 7
20,989,272 UART: [art] Extend RT PCRs Done
20,990,495 UART: [art] Lock RT PCRs Done
20,992,065 UART: [art] Populate DV Done
20,997,424 UART: [fht] FMC Alias Private Key: 7
20,999,023 UART: [art] Derive CDI
20,999,845 UART: [art] Store in in slot 0x4
21,042,498 UART: [art] Derive Key Pair
21,043,500 UART: [art] Store priv key in slot 0x5
23,470,747 UART: [art] Derive Key Pair - Done
23,483,481 UART: [art] Signing Cert with AUTHO
23,484,810 UART: RITY.KEYID = 7
25,190,461 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,963 UART: [art] PUB.X = 641E80A00E5D4D85C4B1B03683F94C17307429D749DCDA7653A0AC336BDAB9E3EF75328E514537DADE0DB3D9FBDB3862
25,199,250 UART: [art] PUB.Y = A389FDE70570375FC7A313BC76A5FB99E98321B0FB122CB8A364D7581BCFF6433648E9001E5C0090BD640E6E582EC027
25,206,435 UART: [art] SIG.R = AAE7F02D40AFBACF54275894C9F373653A9A301E1207E92F688FB1AFBC51A72F91316C38E9873C5347B923B13CEAA45D
25,213,881 UART: [art] SIG.S = 4C9468044D82F9A19F274235D7DCC85530F3612234FB12B44C07CAAFF735499E397BF52080E99BBFDF33887DE2A1BE87
26,192,602 UART: Caliptra RT
26,193,316 UART: [state] CFI Enabled
26,310,890 UART: [rt] RT listening for mailbox commands...
26,313,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,468,410 UART: [rt]cmd =0x41544d4e, len=14344
30,398,421 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,943 UART: [kat] SHA2-256
881,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,989 UART: [kat] ++
886,141 UART: [kat] sha1
890,317 UART: [kat] SHA2-256
892,255 UART: [kat] SHA2-384
895,146 UART: [kat] SHA2-512-ACC
897,047 UART: [kat] ECC-384
902,856 UART: [kat] HMAC-384Kdf
907,570 UART: [kat] LMS
1,475,766 UART: [kat] --
1,476,871 UART: [cold-reset] ++
1,477,417 UART: [fht] Storing FHT @ 0x50003400
1,480,138 UART: [idev] ++
1,480,306 UART: [idev] CDI.KEYID = 6
1,480,666 UART: [idev] SUBJECT.KEYID = 7
1,481,090 UART: [idev] UDS.KEYID = 0
1,481,435 ready_for_fw is high
1,481,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,026 UART: [idev] Erasing UDS.KEYID = 0
1,505,802 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,428 UART: [idev] --
1,515,485 UART: [ldev] ++
1,515,653 UART: [ldev] CDI.KEYID = 6
1,516,016 UART: [ldev] SUBJECT.KEYID = 5
1,516,442 UART: [ldev] AUTHORITY.KEYID = 7
1,516,905 UART: [ldev] FE.KEYID = 1
1,521,901 UART: [ldev] Erasing FE.KEYID = 1
1,547,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,636 UART: [ldev] --
1,587,087 UART: [fwproc] Waiting for Commands...
1,587,740 UART: [fwproc] Received command 0x46574c44
1,588,531 UART: [fwproc] Received Image of size 114448 bytes
2,889,212 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,276 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,628 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,663 >>> mbox cmd response: success
3,082,895 UART: [afmc] ++
3,083,063 UART: [afmc] CDI.KEYID = 6
3,083,425 UART: [afmc] SUBJECT.KEYID = 7
3,083,850 UART: [afmc] AUTHORITY.KEYID = 5
3,119,335 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,441 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,949 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,834 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,524 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,453 UART: [afmc] --
3,162,561 UART: [cold-reset] --
3,163,407 UART: [state] Locking Datavault
3,164,470 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,074 UART: [state] Locking ICCM
3,165,572 UART: [exit] Launching FMC @ 0x40000130
3,170,901 UART:
3,170,917 UART: Running Caliptra FMC ...
3,171,325 UART:
3,171,379 UART: [state] CFI Enabled
3,181,724 UART: [fht] FMC Alias Private Key: 7
3,289,441 UART: [art] Extend RT PCRs Done
3,289,869 UART: [art] Lock RT PCRs Done
3,291,387 UART: [art] Populate DV Done
3,299,600 UART: [fht] FMC Alias Private Key: 7
3,300,578 UART: [art] Derive CDI
3,300,858 UART: [art] Store in in slot 0x4
3,386,415 UART: [art] Derive Key Pair
3,386,775 UART: [art] Store priv key in slot 0x5
3,400,055 UART: [art] Derive Key Pair - Done
3,415,060 UART: [art] Signing Cert with AUTHO
3,415,540 UART: RITY.KEYID = 7
3,431,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,897 UART: [art] PUB.X = 0689AEFC0CA33342156FBE945FBC2E58CB1B65C6F682104BF2DF535EBA1E200E300F6573A0AB0DC16874D01E8713D357
3,438,662 UART: [art] PUB.Y = BEBC52BACBEBCDB60ECCFF8EF663642BD1D93328B71DF52366CD740956319B83FD1DF749A9FDD23C5F2F02A38ADB02B2
3,445,628 UART: [art] SIG.R = FB2D72D6BE6C01CFFCBF01B398D918DAC45337AA5F07A8178487F4FF8625FD1FAF23BB86E90335D7439A57C9BF173332
3,452,400 UART: [art] SIG.S = 2C007E428E28B6931EC6CE7D4CDDBBE02A2CAF5C5B965312EA4229C95422EDDE1DB90F976B594A9FA8FB36F9F08D8479
3,476,590 UART: Caliptra RT
3,476,843 UART: [state] CFI Enabled
3,584,682 UART: [rt] RT listening for mailbox commands...
3,585,352 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,414 UART: [rt]cmd =0x41544d4e, len=14344
3,852,799 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,939 ready_for_fw is high
1,361,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,926,715 >>> mbox cmd response: success
2,988,875 UART:
2,988,891 UART: Running Caliptra FMC ...
2,989,299 UART:
2,989,353 UART: [state] CFI Enabled
2,999,762 UART: [fht] FMC Alias Private Key: 7
3,107,791 UART: [art] Extend RT PCRs Done
3,108,219 UART: [art] Lock RT PCRs Done
3,109,805 UART: [art] Populate DV Done
3,118,108 UART: [fht] FMC Alias Private Key: 7
3,119,162 UART: [art] Derive CDI
3,119,442 UART: [art] Store in in slot 0x4
3,204,943 UART: [art] Derive Key Pair
3,205,303 UART: [art] Store priv key in slot 0x5
3,218,559 UART: [art] Derive Key Pair - Done
3,233,395 UART: [art] Signing Cert with AUTHO
3,233,875 UART: RITY.KEYID = 7
3,248,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,594 UART: [art] PUB.X = 7394D9D01C5522EDF7F4C89FC33A5FF81E9468D6E55D782AD1BC2BCA9122529398DE559D086EDD3E8A00D512686C7B18
3,256,347 UART: [art] PUB.Y = F0BB2FACC243C34BB9EBDA56B7090BB58270BCDC96F1E824917A97B210E7B77160213E77EBF5ECD1E33B16B5F496B265
3,263,307 UART: [art] SIG.R = 8F07B9E47D5762A46B780459BD01C7770E117D58C1411860780EFC14E5BC715FF299E77FC96947D39E45E827C6CDEED6
3,270,064 UART: [art] SIG.S = 120618887173B7EB15FDB31C4373BC7F872917B640FF2E5B378082FF5281254591A3A371FE0A4FE3A202D163B8622F29
3,294,132 UART: Caliptra RT
3,294,385 UART: [state] CFI Enabled
3,402,606 UART: [rt] RT listening for mailbox commands...
3,403,276 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,672 UART: [rt]cmd =0x41544d4e, len=14344
3,671,941 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,020 UART: [kat] SHA2-256
881,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,066 UART: [kat] ++
886,218 UART: [kat] sha1
890,608 UART: [kat] SHA2-256
892,546 UART: [kat] SHA2-384
895,199 UART: [kat] SHA2-512-ACC
897,100 UART: [kat] ECC-384
902,655 UART: [kat] HMAC-384Kdf
907,445 UART: [kat] LMS
1,475,641 UART: [kat] --
1,476,622 UART: [cold-reset] ++
1,477,052 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 ready_for_fw is high
1,480,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,705 UART: [idev] Erasing UDS.KEYID = 0
1,505,829 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,411 UART: [idev] --
1,515,442 UART: [ldev] ++
1,515,610 UART: [ldev] CDI.KEYID = 6
1,515,973 UART: [ldev] SUBJECT.KEYID = 5
1,516,399 UART: [ldev] AUTHORITY.KEYID = 7
1,516,862 UART: [ldev] FE.KEYID = 1
1,521,946 UART: [ldev] Erasing FE.KEYID = 1
1,546,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,991 UART: [ldev] --
1,586,390 UART: [fwproc] Waiting for Commands...
1,587,215 UART: [fwproc] Received command 0x46574c44
1,588,006 UART: [fwproc] Received Image of size 114448 bytes
2,888,381 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,499 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,851 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,908 >>> mbox cmd response: success
3,081,952 UART: [afmc] ++
3,082,120 UART: [afmc] CDI.KEYID = 6
3,082,482 UART: [afmc] SUBJECT.KEYID = 7
3,082,907 UART: [afmc] AUTHORITY.KEYID = 5
3,118,684 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,978 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,371 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,061 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,810 UART: [afmc] --
3,161,754 UART: [cold-reset] --
3,162,604 UART: [state] Locking Datavault
3,163,705 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,309 UART: [state] Locking ICCM
3,164,825 UART: [exit] Launching FMC @ 0x40000130
3,170,154 UART:
3,170,170 UART: Running Caliptra FMC ...
3,170,578 UART:
3,170,721 UART: [state] CFI Enabled
3,181,354 UART: [fht] FMC Alias Private Key: 7
3,289,205 UART: [art] Extend RT PCRs Done
3,289,633 UART: [art] Lock RT PCRs Done
3,290,941 UART: [art] Populate DV Done
3,299,282 UART: [fht] FMC Alias Private Key: 7
3,300,248 UART: [art] Derive CDI
3,300,528 UART: [art] Store in in slot 0x4
3,385,973 UART: [art] Derive Key Pair
3,386,333 UART: [art] Store priv key in slot 0x5
3,399,749 UART: [art] Derive Key Pair - Done
3,414,710 UART: [art] Signing Cert with AUTHO
3,415,190 UART: RITY.KEYID = 7
3,430,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,979 UART: [art] PUB.X = 8A11FC1926A2BD45A1040CD165D34EE7FBE77B9C965CB76AD38D9455168B0FFCD3C9AC274DE6BDCFD61A7EBE4A51AA2C
3,437,768 UART: [art] PUB.Y = E8B53A58FDD918EF2DEC1DA3B123788D0026DBC84387E747B21DC7B42E00918A25EB1D859AA3BA45DC8F5B96AA092148
3,444,685 UART: [art] SIG.R = 3E9225286E40226ADF954ACB0061B65C35D6791479C8C986CEC31251F720018778697FBC08F6C2B6B4F718FCE1A96617
3,451,423 UART: [art] SIG.S = C44EE4E86A62532CAAD9B322A84C54BD89ED176341B9AADC4B6F7A66F11AF9C212B2F6A104D8DA732B140F8E7253225F
3,475,208 UART: Caliptra RT
3,475,553 UART: [state] CFI Enabled
3,583,450 UART: [rt] RT listening for mailbox commands...
3,584,120 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,414 UART: [rt]cmd =0x41544d4e, len=14344
3,851,575 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,342 ready_for_fw is high
1,363,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,248 >>> mbox cmd response: success
2,992,386 UART:
2,992,402 UART: Running Caliptra FMC ...
2,992,810 UART:
2,992,953 UART: [state] CFI Enabled
3,003,756 UART: [fht] FMC Alias Private Key: 7
3,112,285 UART: [art] Extend RT PCRs Done
3,112,713 UART: [art] Lock RT PCRs Done
3,114,441 UART: [art] Populate DV Done
3,122,776 UART: [fht] FMC Alias Private Key: 7
3,123,928 UART: [art] Derive CDI
3,124,208 UART: [art] Store in in slot 0x4
3,209,791 UART: [art] Derive Key Pair
3,210,151 UART: [art] Store priv key in slot 0x5
3,223,431 UART: [art] Derive Key Pair - Done
3,238,375 UART: [art] Signing Cert with AUTHO
3,238,855 UART: RITY.KEYID = 7
3,253,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,586 UART: [art] PUB.X = B0D7BEE00DAE053376DF15F1B3FA3B8D634D7D1215B9E99F08E53E51BCE0232A272AA89DBF240005209AC95A53385F8A
3,261,334 UART: [art] PUB.Y = 39890C30A4B26054C8E6B3491657DD2B9C36A3255351F6FA590E29F7690FA9D174A4EB484CF6528F2AF956466528FDD0
3,268,273 UART: [art] SIG.R = EC24E6F7889E58A0083C4F740305318BBD4E2381BDE625842344A8F84054EE5B21657424F959BFAC7AA47118732DB414
3,275,030 UART: [art] SIG.S = 9EB00E75AF7532F3DF98E6A916F65743D0D5D0B1DD0F09958A588A4CF3792732794244322487B94F77C9E03E368C1D66
3,298,652 UART: Caliptra RT
3,298,997 UART: [state] CFI Enabled
3,407,225 UART: [rt] RT listening for mailbox commands...
3,407,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,913 UART: [rt]cmd =0x41544d4e, len=14344
3,676,150 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
893,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,419 UART: [kat] ++
897,571 UART: [kat] sha1
901,755 UART: [kat] SHA2-256
903,695 UART: [kat] SHA2-384
906,456 UART: [kat] SHA2-512-ACC
908,357 UART: [kat] ECC-384
917,786 UART: [kat] HMAC-384Kdf
922,254 UART: [kat] LMS
1,170,582 UART: [kat] --
1,171,699 UART: [cold-reset] ++
1,172,147 UART: [fht] FHT @ 0x50003400
1,174,980 UART: [idev] ++
1,175,148 UART: [idev] CDI.KEYID = 6
1,175,508 UART: [idev] SUBJECT.KEYID = 7
1,175,932 UART: [idev] UDS.KEYID = 0
1,176,277 ready_for_fw is high
1,176,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,680 UART: [idev] Erasing UDS.KEYID = 0
1,200,585 UART: [idev] Sha1 KeyId Algorithm
1,209,167 UART: [idev] --
1,210,189 UART: [ldev] ++
1,210,357 UART: [ldev] CDI.KEYID = 6
1,210,720 UART: [ldev] SUBJECT.KEYID = 5
1,211,146 UART: [ldev] AUTHORITY.KEYID = 7
1,211,609 UART: [ldev] FE.KEYID = 1
1,216,619 UART: [ldev] Erasing FE.KEYID = 1
1,243,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,839 UART: [ldev] --
1,282,120 UART: [fwproc] Wait for Commands...
1,282,790 UART: [fwproc] Recv command 0x46574c44
1,283,518 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,966 >>> mbox cmd response: success
2,776,026 UART: [afmc] ++
2,776,194 UART: [afmc] CDI.KEYID = 6
2,776,556 UART: [afmc] SUBJECT.KEYID = 7
2,776,981 UART: [afmc] AUTHORITY.KEYID = 5
2,812,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,139 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,415 UART: [afmc] --
2,855,405 UART: [cold-reset] --
2,856,387 UART: [state] Locking Datavault
2,857,392 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,996 UART: [state] Locking ICCM
2,858,562 UART: [exit] Launching FMC @ 0x40000130
2,863,891 UART:
2,863,907 UART: Running Caliptra FMC ...
2,864,315 UART:
2,864,369 UART: [state] CFI Enabled
2,874,578 UART: [fht] FMC Alias Private Key: 7
2,982,499 UART: [art] Extend RT PCRs Done
2,982,927 UART: [art] Lock RT PCRs Done
2,984,477 UART: [art] Populate DV Done
2,992,822 UART: [fht] FMC Alias Private Key: 7
2,993,828 UART: [art] Derive CDI
2,994,108 UART: [art] Store in in slot 0x4
3,079,955 UART: [art] Derive Key Pair
3,080,315 UART: [art] Store priv key in slot 0x5
3,093,157 UART: [art] Derive Key Pair - Done
3,107,747 UART: [art] Signing Cert with AUTHO
3,108,227 UART: RITY.KEYID = 7
3,123,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,854 UART: [art] PUB.X = 705F6F18F7370FAB9C1734188A879074E6A1867BCBB7D6D11D5F4451772D0F0C099B9A38228AF91A6C7FDA9016FDAA00
3,130,596 UART: [art] PUB.Y = 0FF1F2AC7269F49BD48A89A37EBC18A2EA1940B4FFECB83D82F19F3DEED90507107869367B907E63C0F2B24684D56BA1
3,137,549 UART: [art] SIG.R = 24F2A44665783417C544F6A34551F1018EB4FBA768643617346DE2D37EB6A8D823E65508984D2E8D138B459E452F6697
3,144,301 UART: [art] SIG.S = 8B84FC092569DB6BD81408B8343554AF5A656CCFAE365242A083C28455C665C9526F08DA9D3827C5B85E46DA74261707
3,168,380 UART: Caliptra RT
3,168,633 UART: [state] CFI Enabled
3,276,920 UART: [rt] RT listening for mailbox commands...
3,277,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,450 UART: [rt]cmd =0x41544d4e, len=14344
3,545,261 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,855 ready_for_fw is high
1,059,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,197 >>> mbox cmd response: success
2,689,589 UART:
2,689,605 UART: Running Caliptra FMC ...
2,690,013 UART:
2,690,067 UART: [state] CFI Enabled
2,700,404 UART: [fht] FMC Alias Private Key: 7
2,808,709 UART: [art] Extend RT PCRs Done
2,809,137 UART: [art] Lock RT PCRs Done
2,810,857 UART: [art] Populate DV Done
2,818,948 UART: [fht] FMC Alias Private Key: 7
2,820,098 UART: [art] Derive CDI
2,820,378 UART: [art] Store in in slot 0x4
2,905,999 UART: [art] Derive Key Pair
2,906,359 UART: [art] Store priv key in slot 0x5
2,920,143 UART: [art] Derive Key Pair - Done
2,934,710 UART: [art] Signing Cert with AUTHO
2,935,190 UART: RITY.KEYID = 7
2,950,396 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,161 UART: [art] PUB.X = BE5F0FEED770D95BA4E8146FA36D86CED22ADC38073D9AD163F017D4EB7846540275F3F168C95799CFDC2D886B3B7D5A
2,957,938 UART: [art] PUB.Y = BD9B230FC7C5CB189D8270CB942146115A6766E54AB22E12EF2BA42C655802FF3DE4BF3C2AEE7D0A17B32FF512D5AC9E
2,964,897 UART: [art] SIG.R = BB723396DAB21A2089A811305CC8837DDCA9602EA4468EFA6D76A74D40F6EED8A345FEE6B32ACD8135681CB8AACBC298
2,971,685 UART: [art] SIG.S = 7A189EF976ABA1EDA49CA0B655C107521A7E71573D74D241937B9C71CA27EFD72DF4116C56B29F2728B7DD1837CC55AB
2,995,483 UART: Caliptra RT
2,995,736 UART: [state] CFI Enabled
3,104,033 UART: [rt] RT listening for mailbox commands...
3,104,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,815 UART: [rt]cmd =0x41544d4e, len=14344
3,372,702 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
893,443 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,568 UART: [kat] ++
897,720 UART: [kat] sha1
901,946 UART: [kat] SHA2-256
903,886 UART: [kat] SHA2-384
906,773 UART: [kat] SHA2-512-ACC
908,674 UART: [kat] ECC-384
917,885 UART: [kat] HMAC-384Kdf
922,367 UART: [kat] LMS
1,170,695 UART: [kat] --
1,171,758 UART: [cold-reset] ++
1,172,146 UART: [fht] FHT @ 0x50003400
1,174,593 UART: [idev] ++
1,174,761 UART: [idev] CDI.KEYID = 6
1,175,121 UART: [idev] SUBJECT.KEYID = 7
1,175,545 UART: [idev] UDS.KEYID = 0
1,175,890 ready_for_fw is high
1,175,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,429 UART: [idev] Erasing UDS.KEYID = 0
1,200,706 UART: [idev] Sha1 KeyId Algorithm
1,209,140 UART: [idev] --
1,210,206 UART: [ldev] ++
1,210,374 UART: [ldev] CDI.KEYID = 6
1,210,737 UART: [ldev] SUBJECT.KEYID = 5
1,211,163 UART: [ldev] AUTHORITY.KEYID = 7
1,211,626 UART: [ldev] FE.KEYID = 1
1,216,864 UART: [ldev] Erasing FE.KEYID = 1
1,243,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,934 UART: [ldev] --
1,282,327 UART: [fwproc] Wait for Commands...
1,282,941 UART: [fwproc] Recv command 0x46574c44
1,283,669 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,856 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,841 >>> mbox cmd response: success
2,777,943 UART: [afmc] ++
2,778,111 UART: [afmc] CDI.KEYID = 6
2,778,473 UART: [afmc] SUBJECT.KEYID = 7
2,778,898 UART: [afmc] AUTHORITY.KEYID = 5
2,814,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,011 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,730 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,776 UART: [afmc] --
2,857,856 UART: [cold-reset] --
2,858,580 UART: [state] Locking Datavault
2,859,691 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,295 UART: [state] Locking ICCM
2,860,915 UART: [exit] Launching FMC @ 0x40000130
2,866,244 UART:
2,866,260 UART: Running Caliptra FMC ...
2,866,668 UART:
2,866,811 UART: [state] CFI Enabled
2,877,550 UART: [fht] FMC Alias Private Key: 7
2,985,589 UART: [art] Extend RT PCRs Done
2,986,017 UART: [art] Lock RT PCRs Done
2,987,561 UART: [art] Populate DV Done
2,995,602 UART: [fht] FMC Alias Private Key: 7
2,996,644 UART: [art] Derive CDI
2,996,924 UART: [art] Store in in slot 0x4
3,082,713 UART: [art] Derive Key Pair
3,083,073 UART: [art] Store priv key in slot 0x5
3,096,591 UART: [art] Derive Key Pair - Done
3,111,480 UART: [art] Signing Cert with AUTHO
3,111,960 UART: RITY.KEYID = 7
3,127,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,851 UART: [art] PUB.X = D4C9A5B6EF90AF56A42DBC490C266A5A1880FD24AC531B905A1585409E2A6AD254EBCF2496BDCECD1F01CFCC57837FDD
3,134,639 UART: [art] PUB.Y = B55B73A0064B52169A194DBFD1ADD24ADA028D344B261882DCAC70E3FD02FEAFA80FC544D882EDAA152B455E2BE57325
3,141,595 UART: [art] SIG.R = 2F488547F6C7A285D109A91BAFDE481B2A7DA6FFCD88B7F8CAB839BC17BE1B129B66B4343E403A574E28D41AB5AB936C
3,148,380 UART: [art] SIG.S = E60F2F2256D387D600980978EB53287018C92BCDD0D0EEA8C646D97EE0C2DA052D997A1A5716560ED98DF3B4FE317FAF
3,172,043 UART: Caliptra RT
3,172,388 UART: [state] CFI Enabled
3,278,951 UART: [rt] RT listening for mailbox commands...
3,279,621 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,381 UART: [rt]cmd =0x41544d4e, len=14344
3,547,340 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,774 ready_for_fw is high
1,060,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,028 >>> mbox cmd response: success
2,692,104 UART:
2,692,120 UART: Running Caliptra FMC ...
2,692,528 UART:
2,692,671 UART: [state] CFI Enabled
2,703,700 UART: [fht] FMC Alias Private Key: 7
2,811,665 UART: [art] Extend RT PCRs Done
2,812,093 UART: [art] Lock RT PCRs Done
2,813,335 UART: [art] Populate DV Done
2,821,866 UART: [fht] FMC Alias Private Key: 7
2,822,940 UART: [art] Derive CDI
2,823,220 UART: [art] Store in in slot 0x4
2,909,187 UART: [art] Derive Key Pair
2,909,547 UART: [art] Store priv key in slot 0x5
2,922,895 UART: [art] Derive Key Pair - Done
2,937,804 UART: [art] Signing Cert with AUTHO
2,938,284 UART: RITY.KEYID = 7
2,953,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,541 UART: [art] PUB.X = 1A28E87349D063ED7DF2B3CF7A07E8AB4B99DC5E2ACA171B23E95005F868351576B24246790728FC6A474B4BBCE2398C
2,961,308 UART: [art] PUB.Y = 17E7BDBF4A9C0AB969C54C4F93E957DA830A35A027DAE9A2E2AF6D56B36525DC291251F9B8104C76B93E5008488F2F26
2,968,257 UART: [art] SIG.R = 33A7F7DEC17869A372151F3737BB46808AF96116D740FEE31A637216ED73617A28ED409034E130F7FD1C4A768D4BD648
2,975,025 UART: [art] SIG.S = 0E33546CE1464A0B55315F69860BBE588A621080A8F61C4EAF8DEE394190DC8EFEB49426BC40A4A882FEDD62A691DA18
2,999,229 UART: Caliptra RT
2,999,574 UART: [state] CFI Enabled
3,106,857 UART: [rt] RT listening for mailbox commands...
3,107,527 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,659 UART: [rt]cmd =0x41544d4e, len=14344
3,375,640 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
915,734 UART: [kat] HMAC-384Kdf
920,306 UART: [kat] LMS
1,168,618 UART: [kat] --
1,169,375 UART: [cold-reset] ++
1,169,947 UART: [fht] FHT @ 0x50003400
1,172,361 UART: [idev] ++
1,172,529 UART: [idev] CDI.KEYID = 6
1,172,890 UART: [idev] SUBJECT.KEYID = 7
1,173,315 UART: [idev] UDS.KEYID = 0
1,173,661 ready_for_fw is high
1,173,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,171 UART: [idev] Erasing UDS.KEYID = 0
1,198,193 UART: [idev] Sha1 KeyId Algorithm
1,206,907 UART: [idev] --
1,207,890 UART: [ldev] ++
1,208,058 UART: [ldev] CDI.KEYID = 6
1,208,422 UART: [ldev] SUBJECT.KEYID = 5
1,208,849 UART: [ldev] AUTHORITY.KEYID = 7
1,209,312 UART: [ldev] FE.KEYID = 1
1,214,528 UART: [ldev] Erasing FE.KEYID = 1
1,240,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,618 UART: [ldev] --
1,279,934 UART: [fwproc] Wait for Commands...
1,280,533 UART: [fwproc] Recv command 0x46574c44
1,281,266 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,182 >>> mbox cmd response: success
2,773,409 UART: [afmc] ++
2,773,577 UART: [afmc] CDI.KEYID = 6
2,773,940 UART: [afmc] SUBJECT.KEYID = 7
2,774,366 UART: [afmc] AUTHORITY.KEYID = 5
2,809,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,466 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,078 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,664 UART: [afmc] --
2,852,720 UART: [cold-reset] --
2,853,484 UART: [state] Locking Datavault
2,854,541 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,145 UART: [state] Locking ICCM
2,855,641 UART: [exit] Launching FMC @ 0x40000130
2,860,970 UART:
2,860,986 UART: Running Caliptra FMC ...
2,861,394 UART:
2,861,448 UART: [state] CFI Enabled
2,872,019 UART: [fht] FMC Alias Private Key: 7
2,980,226 UART: [art] Extend RT PCRs Done
2,980,654 UART: [art] Lock RT PCRs Done
2,982,200 UART: [art] Populate DV Done
2,990,299 UART: [fht] FMC Alias Private Key: 7
2,991,427 UART: [art] Derive CDI
2,991,707 UART: [art] Store in in slot 0x4
3,077,836 UART: [art] Derive Key Pair
3,078,196 UART: [art] Store priv key in slot 0x5
3,091,662 UART: [art] Derive Key Pair - Done
3,106,354 UART: [art] Signing Cert with AUTHO
3,106,834 UART: RITY.KEYID = 7
3,121,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,461 UART: [art] PUB.X = 4002FED53A1339909EE042728575C0804FB8B0D625E97B8F9F17F8F1ADCB17D4419A8AC412A378890DC0798E558BDEC6
3,129,229 UART: [art] PUB.Y = D839D5E11618A14D5DB8A77BDF4A6F38B5926572ED6E58F0F4B0703A8A9489EDD7CE29EE7E8AC37623E093CDDA5B146F
3,136,195 UART: [art] SIG.R = 7078D17DFDF3A2261806654AC86446563EF36B5C96D94E32671A92BEEC52BE937D1C3647D744A53FA4CBB77AECFFAAE3
3,142,976 UART: [art] SIG.S = 831610885D2D9ACB0CBBF45CACF039F4A854D9450038F9B2C1B3B5324A3D483D2FB16986733517783E44EFF37D270801
3,167,002 UART: Caliptra RT
3,167,255 UART: [state] CFI Enabled
3,275,056 UART: [rt] RT listening for mailbox commands...
3,275,726 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,930 UART: [rt]cmd =0x41544d4e, len=14344
3,543,801 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,220 ready_for_fw is high
1,056,220 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,034 >>> mbox cmd response: success
2,686,452 UART:
2,686,468 UART: Running Caliptra FMC ...
2,686,876 UART:
2,686,930 UART: [state] CFI Enabled
2,697,445 UART: [fht] FMC Alias Private Key: 7
2,805,058 UART: [art] Extend RT PCRs Done
2,805,486 UART: [art] Lock RT PCRs Done
2,806,956 UART: [art] Populate DV Done
2,815,379 UART: [fht] FMC Alias Private Key: 7
2,816,529 UART: [art] Derive CDI
2,816,809 UART: [art] Store in in slot 0x4
2,902,644 UART: [art] Derive Key Pair
2,903,004 UART: [art] Store priv key in slot 0x5
2,915,596 UART: [art] Derive Key Pair - Done
2,930,473 UART: [art] Signing Cert with AUTHO
2,930,953 UART: RITY.KEYID = 7
2,946,257 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,022 UART: [art] PUB.X = 20E0CFD5817ADC593790897423AAE483CD89BC18F663F7A4ECCE022404DECDBC2809174BEC5B06ECEAB45B2546CBF969
2,953,798 UART: [art] PUB.Y = 59987254ACDAF42C1B7B0AE91A11B5DCA24246B4603FB7A1713AB3B9A4DC6FE86ADDA159CB0D014409B22BABB47CB45F
2,960,758 UART: [art] SIG.R = 1499271837D9AA0BA61FDC79CC25E1A63561B8AF24A13F961C997F116036C5895368C217FC7F310038D50BE4FE80FE77
2,967,500 UART: [art] SIG.S = 5646249C599DBB9C1A37F78D035D84F1A2832BD67AF05C60F5335335B54116D71779E66CE06D96BCBAB6F67DAFB4C68F
2,991,046 UART: Caliptra RT
2,991,299 UART: [state] CFI Enabled
3,098,876 UART: [rt] RT listening for mailbox commands...
3,099,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,342 UART: [rt]cmd =0x41544d4e, len=14344
3,366,499 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,375 UART: [kat] LMS
1,169,687 UART: [kat] --
1,170,290 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,174,782 ready_for_fw is high
1,174,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,544 UART: [idev] Erasing UDS.KEYID = 0
1,199,810 UART: [idev] Sha1 KeyId Algorithm
1,208,558 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,265 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,243,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,843 UART: [ldev] --
1,282,167 UART: [fwproc] Wait for Commands...
1,282,776 UART: [fwproc] Recv command 0x46574c44
1,283,509 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,970 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,279 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,155 >>> mbox cmd response: success
2,775,276 UART: [afmc] ++
2,775,444 UART: [afmc] CDI.KEYID = 6
2,775,807 UART: [afmc] SUBJECT.KEYID = 7
2,776,233 UART: [afmc] AUTHORITY.KEYID = 5
2,811,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,246 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,129 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,848 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,485 UART: [afmc] --
2,854,557 UART: [cold-reset] --
2,855,599 UART: [state] Locking Datavault
2,856,754 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,358 UART: [state] Locking ICCM
2,857,916 UART: [exit] Launching FMC @ 0x40000130
2,863,245 UART:
2,863,261 UART: Running Caliptra FMC ...
2,863,669 UART:
2,863,812 UART: [state] CFI Enabled
2,874,285 UART: [fht] FMC Alias Private Key: 7
2,982,282 UART: [art] Extend RT PCRs Done
2,982,710 UART: [art] Lock RT PCRs Done
2,984,446 UART: [art] Populate DV Done
2,992,617 UART: [fht] FMC Alias Private Key: 7
2,993,615 UART: [art] Derive CDI
2,993,895 UART: [art] Store in in slot 0x4
3,079,256 UART: [art] Derive Key Pair
3,079,616 UART: [art] Store priv key in slot 0x5
3,093,226 UART: [art] Derive Key Pair - Done
3,108,345 UART: [art] Signing Cert with AUTHO
3,108,825 UART: RITY.KEYID = 7
3,124,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,980 UART: [art] PUB.X = F10D7E78F28E33260A731F8F2591C4C539C0931D4381C662FF75F34299F0FE02411CCC05718A206724933B96BE326A8B
3,131,732 UART: [art] PUB.Y = A0D1A1FEF0227418B8C87585146C0768DAEBC242CD0B5A1A7CBF689EA81A6077E5E59A68B6633970521EEE5A01D55B8F
3,138,683 UART: [art] SIG.R = E61319CA782481CC4AD36A64170D015691F61EF303E5E271FC19B5360417C1C8D7000611D50DE11F83716BA565E3CEA7
3,145,411 UART: [art] SIG.S = CF3D03E18E7B634BB490F02E580A46B365B49D7E6AA4EF22887CBE8299AA47BD8A56EA379EEE97BB72C999D35F724A63
3,169,242 UART: Caliptra RT
3,169,587 UART: [state] CFI Enabled
3,277,149 UART: [rt] RT listening for mailbox commands...
3,277,819 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,021 UART: [rt]cmd =0x41544d4e, len=14344
3,546,306 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,449 ready_for_fw is high
1,056,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,487 >>> mbox cmd response: success
2,684,859 UART:
2,684,875 UART: Running Caliptra FMC ...
2,685,283 UART:
2,685,426 UART: [state] CFI Enabled
2,695,647 UART: [fht] FMC Alias Private Key: 7
2,803,474 UART: [art] Extend RT PCRs Done
2,803,902 UART: [art] Lock RT PCRs Done
2,805,174 UART: [art] Populate DV Done
2,813,375 UART: [fht] FMC Alias Private Key: 7
2,814,399 UART: [art] Derive CDI
2,814,679 UART: [art] Store in in slot 0x4
2,900,570 UART: [art] Derive Key Pair
2,900,930 UART: [art] Store priv key in slot 0x5
2,914,498 UART: [art] Derive Key Pair - Done
2,929,328 UART: [art] Signing Cert with AUTHO
2,929,808 UART: RITY.KEYID = 7
2,945,298 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,063 UART: [art] PUB.X = E1FC81C11D780FA564D83E85B292780352C68D87ACF1B20B8B7B58BDFB4281B7F3364329AF9AB1782273429C6AE6E63D
2,952,830 UART: [art] PUB.Y = 53FFD28BB3028516D0883501EB27FE7881639175EBD2EFFB76D4D8750246F420D90D13D77DCDD7BE1FAB982ABD96A367
2,959,778 UART: [art] SIG.R = 4A5A3597C932A0ABE14A763EB932FBEC059092164B75F397C5C6F52BF7E133AED44DBADF24D7EE01B72AD44B86904AB9
2,966,558 UART: [art] SIG.S = AE87132C0A200045D1BA8949EFC425FD76F761D708DC3C25CF4D1EDEFE7F16A22118F5DCECF5A29813CA4BE9F19961C2
2,990,421 UART: Caliptra RT
2,990,766 UART: [state] CFI Enabled
3,098,389 UART: [rt] RT listening for mailbox commands...
3,099,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,017 UART: [rt]cmd =0x41544d4e, len=14344
3,366,062 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,114 UART:
192,530 UART: Running Caliptra ROM ...
193,688 UART:
193,840 UART: [state] CFI Enabled
265,884 UART: [state] LifecycleState = Unprovisioned
267,915 UART: [state] DebugLocked = No
269,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,825 UART: [kat] SHA2-256
444,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,033 UART: [kat] ++
455,484 UART: [kat] sha1
465,080 UART: [kat] SHA2-256
467,805 UART: [kat] SHA2-384
473,298 UART: [kat] SHA2-512-ACC
475,662 UART: [kat] ECC-384
2,769,334 UART: [kat] HMAC-384Kdf
2,799,045 UART: [kat] LMS
3,989,388 UART: [kat] --
3,996,241 UART: [cold-reset] ++
3,997,464 UART: [fht] Storing FHT @ 0x50003400
4,010,456 UART: [idev] ++
4,011,091 UART: [idev] CDI.KEYID = 6
4,012,017 UART: [idev] SUBJECT.KEYID = 7
4,013,198 UART: [idev] UDS.KEYID = 0
4,014,267 ready_for_fw is high
4,014,478 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,920 UART: [idev] Erasing UDS.KEYID = 0
7,347,080 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,643 UART: [idev] --
7,373,884 UART: [ldev] ++
7,374,462 UART: [ldev] CDI.KEYID = 6
7,375,430 UART: [ldev] SUBJECT.KEYID = 5
7,376,642 UART: [ldev] AUTHORITY.KEYID = 7
7,377,873 UART: [ldev] FE.KEYID = 1
7,422,273 UART: [ldev] Erasing FE.KEYID = 1
10,753,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,911 UART: [ldev] --
13,113,496 UART: [fwproc] Waiting for Commands...
13,116,138 UART: [fwproc] Received command 0x46574c44
13,118,320 UART: [fwproc] Received Image of size 114124 bytes
21,836,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,922,301 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,991,186 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,309,241 >>> mbox cmd response: success
22,312,875 UART: [afmc] ++
22,313,474 UART: [afmc] CDI.KEYID = 6
22,314,358 UART: [afmc] SUBJECT.KEYID = 7
22,315,626 UART: [afmc] AUTHORITY.KEYID = 5
25,678,439 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,977,000 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,979,265 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,993,796 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,008,572 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,022,776 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,044,669 UART: [afmc] --
28,048,815 UART: [cold-reset] --
28,054,355 UART: [state] Locking Datavault
28,059,235 UART: [state] Locking PCR0, PCR1 and PCR31
28,060,992 UART: [state] Locking ICCM
28,062,178 UART: [exit] Launching FMC @ 0x40000130
28,070,574 UART:
28,070,813 UART: Running Caliptra FMC ...
28,071,915 UART:
28,072,077 UART: [state] CFI Enabled
28,135,738 UART: [fht] FMC Alias Private Key: 7
30,473,985 UART: [art] Extend RT PCRs Done
30,475,207 UART: [art] Lock RT PCRs Done
30,476,915 UART: [art] Populate DV Done
30,482,222 UART: [fht] FMC Alias Private Key: 7
30,483,707 UART: [art] Derive CDI
30,484,635 UART: [art] Store in in slot 0x4
30,543,315 UART: [art] Derive Key Pair
30,544,319 UART: [art] Store priv key in slot 0x5
33,837,181 UART: [art] Derive Key Pair - Done
33,850,438 UART: [art] Signing Cert with AUTHO
33,851,767 UART: RITY.KEYID = 7
36,139,670 UART: [art] Erasing AUTHORITY.KEYID = 7
36,141,183 UART: [art] PUB.X = 0F46F57D353F96C5DE86196DFA5E37F223E1B282E60C0E6493E30507EB6AF784CB41EB0694DAA189B59563E32B3571CC
36,148,377 UART: [art] PUB.Y = 3A0C6DAA67C4022881E846061C038934DE49AA288ADDD7F0323522DC1D809BF9B73347FCCBED309AEA870DC295BFFC46
36,155,664 UART: [art] SIG.R = F86D20AB30E5BDD246025C7C13634D7F0DB4B1F4FA280A0399C0436FF21EE3EDBE553F5DCFF5E54323C5791A0E1808A9
36,163,063 UART: [art] SIG.S = 98DD86034EB44F1A622E73340D21579A3388DDDBBB1D8693B2812E21534BA4CA4EC0B336265D26ACE2AC9D27AB5CCBAE
37,467,958 UART: Caliptra RT
37,468,872 UART: [state] CFI Enabled
37,629,705 UART: [rt] RT listening for mailbox commands...
37,632,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,787,738 UART: [rt]cmd =0x41544d4e, len=14344
37,789,553 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,803,062 ready_for_fw is high
3,803,446 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,943,455 >>> mbox cmd response: success
27,641,391 UART:
27,641,789 UART: Running Caliptra FMC ...
27,642,932 UART:
27,643,096 UART: [state] CFI Enabled
27,713,329 UART: [fht] FMC Alias Private Key: 7
30,051,445 UART: [art] Extend RT PCRs Done
30,052,673 UART: [art] Lock RT PCRs Done
30,054,580 UART: [art] Populate DV Done
30,060,003 UART: [fht] FMC Alias Private Key: 7
30,061,574 UART: [art] Derive CDI
30,062,321 UART: [art] Store in in slot 0x4
30,121,633 UART: [art] Derive Key Pair
30,122,646 UART: [art] Store priv key in slot 0x5
33,415,234 UART: [art] Derive Key Pair - Done
33,428,465 UART: [art] Signing Cert with AUTHO
33,429,801 UART: RITY.KEYID = 7
35,716,812 UART: [art] Erasing AUTHORITY.KEYID = 7
35,718,320 UART: [art] PUB.X = 78FE14B155589ADD25C2294D7BDBBB8D7681D1463CE9B5138CE870535CCD815AA2E82AA8EC72BA6DBA74B349F6CE4B66
35,725,547 UART: [art] PUB.Y = 2D7B541F0AAABCB7AE6E67C136ACC15BEFBFB9ED7EE7285C256831DD3EAF6771FA8FBB7950173B8022E250B199F81253
35,732,842 UART: [art] SIG.R = 6E5F11E7433F613EF8353346D5AC2E833757C38B82CFC8022FCBBAAE135A67DD1F9120773311AA22FE512B26A0F2A2FF
35,740,198 UART: [art] SIG.S = 705123D717C9F919F5EF40E8B8E698995199E042E2E0C27ECEAD58913590BAAB65F1F040C46AF7053065DCF3D8DE57EA
37,045,398 UART: Caliptra RT
37,046,091 UART: [state] CFI Enabled
37,205,908 UART: [rt] RT listening for mailbox commands...
37,208,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,363,583 UART: [rt]cmd =0x41544d4e, len=14344
37,365,555 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,569 UART:
192,934 UART: Running Caliptra ROM ...
194,116 UART:
603,705 UART: [state] CFI Enabled
617,036 UART: [state] LifecycleState = Unprovisioned
618,985 UART: [state] DebugLocked = No
621,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,206 UART: [kat] SHA2-256
795,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,504 UART: [kat] ++
806,946 UART: [kat] sha1
818,094 UART: [kat] SHA2-256
820,767 UART: [kat] SHA2-384
826,259 UART: [kat] SHA2-512-ACC
828,626 UART: [kat] ECC-384
3,111,744 UART: [kat] HMAC-384Kdf
3,123,389 UART: [kat] LMS
4,313,519 UART: [kat] --
4,319,049 UART: [cold-reset] ++
4,320,070 UART: [fht] Storing FHT @ 0x50003400
4,330,845 UART: [idev] ++
4,331,410 UART: [idev] CDI.KEYID = 6
4,332,318 UART: [idev] SUBJECT.KEYID = 7
4,333,553 UART: [idev] UDS.KEYID = 0
4,334,622 ready_for_fw is high
4,334,837 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,364 UART: [idev] Erasing UDS.KEYID = 0
7,618,940 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,737 UART: [idev] --
7,645,460 UART: [ldev] ++
7,646,077 UART: [ldev] CDI.KEYID = 6
7,646,959 UART: [ldev] SUBJECT.KEYID = 5
7,648,218 UART: [ldev] AUTHORITY.KEYID = 7
7,649,498 UART: [ldev] FE.KEYID = 1
7,660,006 UART: [ldev] Erasing FE.KEYID = 1
10,945,840 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,231 UART: [ldev] --
13,309,359 UART: [fwproc] Waiting for Commands...
13,311,878 UART: [fwproc] Received command 0x46574c44
13,314,111 UART: [fwproc] Received Image of size 114124 bytes
21,795,317 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,874,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,943,201 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,260,444 >>> mbox cmd response: success
22,265,320 UART: [afmc] ++
22,265,910 UART: [afmc] CDI.KEYID = 6
22,266,819 UART: [afmc] SUBJECT.KEYID = 7
22,268,084 UART: [afmc] AUTHORITY.KEYID = 5
25,585,520 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,880,401 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,882,656 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,897,227 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,911,947 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,926,208 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,948,093 UART: [afmc] --
27,951,202 UART: [cold-reset] --
27,954,865 UART: [state] Locking Datavault
27,961,031 UART: [state] Locking PCR0, PCR1 and PCR31
27,962,788 UART: [state] Locking ICCM
27,964,603 UART: [exit] Launching FMC @ 0x40000130
27,972,993 UART:
27,973,226 UART: Running Caliptra FMC ...
27,974,323 UART:
27,974,475 UART: [state] CFI Enabled
27,982,438 UART: [fht] FMC Alias Private Key: 7
30,313,166 UART: [art] Extend RT PCRs Done
30,314,514 UART: [art] Lock RT PCRs Done
30,315,821 UART: [art] Populate DV Done
30,321,338 UART: [fht] FMC Alias Private Key: 7
30,322,990 UART: [art] Derive CDI
30,323,798 UART: [art] Store in in slot 0x4
30,366,548 UART: [art] Derive Key Pair
30,367,563 UART: [art] Store priv key in slot 0x5
33,610,183 UART: [art] Derive Key Pair - Done
33,623,285 UART: [art] Signing Cert with AUTHO
33,624,583 UART: RITY.KEYID = 7
35,903,758 UART: [art] Erasing AUTHORITY.KEYID = 7
35,905,269 UART: [art] PUB.X = B9BF0C3308A9CA9C8B9C4E9817ECA98DD3B052025B921CC957D64B6CD2F0DDD7952F7447164DB4AB53A76CC02FB401E3
35,912,495 UART: [art] PUB.Y = 8C3ABE6AD28373888BAEA32960C180C78164234FE3A48B2603AFF7CBA07CC57122BF2F4C0662E9C68DA76F558B50DC4B
35,919,743 UART: [art] SIG.R = FB7DF53E774683B9CDF468B60C3BDAC17F12F7A168A1F498A20DF3D34C03371C03E69834A772C3746C03201107EAD339
35,927,136 UART: [art] SIG.S = A21A07A45CC1243F50E8BA5D54D4410A4A1BDD173EDF9694AD00F18F632FB7738236E0A1F7C44F3EF6316EE8444E5F00
37,232,314 UART: Caliptra RT
37,233,003 UART: [state] CFI Enabled
37,350,656 UART: [rt] RT listening for mailbox commands...
37,353,090 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,508,731 UART: [rt]cmd =0x41544d4e, len=14344
37,510,806 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
4,125,962 ready_for_fw is high
4,126,562 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,113,265 >>> mbox cmd response: success
27,752,266 UART:
27,752,654 UART: Running Caliptra FMC ...
27,753,750 UART:
27,753,898 UART: [state] CFI Enabled
27,762,068 UART: [fht] FMC Alias Private Key: 7
30,092,321 UART: [art] Extend RT PCRs Done
30,093,550 UART: [art] Lock RT PCRs Done
30,095,287 UART: [art] Populate DV Done
30,100,586 UART: [fht] FMC Alias Private Key: 7
30,102,233 UART: [art] Derive CDI
30,102,965 UART: [art] Store in in slot 0x4
30,145,562 UART: [art] Derive Key Pair
30,146,598 UART: [art] Store priv key in slot 0x5
33,388,925 UART: [art] Derive Key Pair - Done
33,401,601 UART: [art] Signing Cert with AUTHO
33,402,932 UART: RITY.KEYID = 7
35,682,130 UART: [art] Erasing AUTHORITY.KEYID = 7
35,683,633 UART: [art] PUB.X = AF38024BE14062C7FE9CD66FC1B414D3396D396E12588CE6A0DAA12C1C6E31836EAFC2D69C733D94DEF3ABA38C543F6C
35,690,872 UART: [art] PUB.Y = 36F28BB90B167495DDC1F6581C041DEF8E8F2B8388A4BD74935CD9C7D6DAEFF4DC40A5413CD6E71B10275D854EB209E3
35,698,152 UART: [art] SIG.R = 5AE731CDB2416948943F71850F4373D807BFFE5C07B4501BA6616A2433B7B31351F5E744A0B77905DC97A04401B0D550
35,705,489 UART: [art] SIG.S = 67504E53B15AC3A1F1D528B1C0AF92C5B40172BFFC0F65794A64B27423827E45647A549C2363C9E41BDC4564AE472E75
37,010,727 UART: Caliptra RT
37,011,427 UART: [state] CFI Enabled
37,129,415 UART: [rt] RT listening for mailbox commands...
37,131,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,287,090 UART: [rt]cmd =0x41544d4e, len=14344
37,289,107 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,973 UART:
192,346 UART: Running Caliptra ROM ...
193,543 UART:
193,697 UART: [state] CFI Enabled
263,691 UART: [state] LifecycleState = Unprovisioned
265,590 UART: [state] DebugLocked = No
268,399 UART: [state] WD Timer not started. Device not locked for debugging
271,782 UART: [kat] SHA2-256
450,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,465 UART: [kat] ++
462,994 UART: [kat] sha1
474,372 UART: [kat] SHA2-256
477,369 UART: [kat] SHA2-384
484,207 UART: [kat] SHA2-512-ACC
487,151 UART: [kat] ECC-384
2,948,986 UART: [kat] HMAC-384Kdf
2,970,247 UART: [kat] LMS
3,499,741 UART: [kat] --
3,503,665 UART: [cold-reset] ++
3,505,957 UART: [fht] FHT @ 0x50003400
3,516,528 UART: [idev] ++
3,517,095 UART: [idev] CDI.KEYID = 6
3,518,024 UART: [idev] SUBJECT.KEYID = 7
3,519,201 UART: [idev] UDS.KEYID = 0
3,520,124 ready_for_fw is high
3,520,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,241 UART: [idev] Erasing UDS.KEYID = 0
6,025,591 UART: [idev] Sha1 KeyId Algorithm
6,049,320 UART: [idev] --
6,053,945 UART: [ldev] ++
6,054,526 UART: [ldev] CDI.KEYID = 6
6,055,438 UART: [ldev] SUBJECT.KEYID = 5
6,056,602 UART: [ldev] AUTHORITY.KEYID = 7
6,057,836 UART: [ldev] FE.KEYID = 1
6,098,997 UART: [ldev] Erasing FE.KEYID = 1
8,605,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,105 UART: [ldev] --
10,412,770 UART: [fwproc] Wait for Commands...
10,414,593 UART: [fwproc] Recv command 0x46574c44
10,416,628 UART: [fwproc] Recv'd Img size: 114448 bytes
14,984,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,060,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,128,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,447,064 >>> mbox cmd response: success
15,451,773 UART: [afmc] ++
15,452,360 UART: [afmc] CDI.KEYID = 6
15,453,242 UART: [afmc] SUBJECT.KEYID = 7
15,454,455 UART: [afmc] AUTHORITY.KEYID = 5
17,974,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,700,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,702,179 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,718,136 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,734,108 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,749,887 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,773,438 UART: [afmc] --
19,777,410 UART: [cold-reset] --
19,782,408 UART: [state] Locking Datavault
19,787,222 UART: [state] Locking PCR0, PCR1 and PCR31
19,788,918 UART: [state] Locking ICCM
19,790,528 UART: [exit] Launching FMC @ 0x40000130
19,798,975 UART:
19,799,216 UART: Running Caliptra FMC ...
19,800,314 UART:
19,800,479 UART: [state] CFI Enabled
19,859,504 UART: [fht] FMC Alias Private Key: 7
21,623,456 UART: [art] Extend RT PCRs Done
21,624,673 UART: [art] Lock RT PCRs Done
21,626,377 UART: [art] Populate DV Done
21,631,891 UART: [fht] FMC Alias Private Key: 7
21,633,479 UART: [art] Derive CDI
21,634,222 UART: [art] Store in in slot 0x4
21,691,212 UART: [art] Derive Key Pair
21,692,248 UART: [art] Store priv key in slot 0x5
24,155,155 UART: [art] Derive Key Pair - Done
24,168,370 UART: [art] Signing Cert with AUTHO
24,169,676 UART: RITY.KEYID = 7
25,880,412 UART: [art] Erasing AUTHORITY.KEYID = 7
25,882,070 UART: [art] PUB.X = 3371D86AF44DB9C866255FC450DAFCDFCD73DE52E93C2179FD79FDEDBA6F8A5D043A041A9E558FDE518F3773ECED4C25
25,889,225 UART: [art] PUB.Y = 84B5CF2CEE26662EFFEBCD259116DAA46C456746E9A3FF6D7DA2B3C68A199E3DDD0116CA4963CBCAB572C92F86D05834
25,896,467 UART: [art] SIG.R = 2264CA42B1DD2822E417FC8FD26CE4685F41CED2989C5A20A7AB6FC865E150E0A6F1E71692692AB958B940216887A526
25,903,884 UART: [art] SIG.S = 48DDB1EB7CF0C8524EF650C2F38DD08F74B3C2447AEA2843AE36CBD519999E579B4710BBB9DB15AB0F8EF2A76BF47E3E
26,883,248 UART: Caliptra RT
26,883,936 UART: [state] CFI Enabled
27,046,786 UART: [rt] RT listening for mailbox commands...
27,049,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,204,908 UART: [rt]cmd =0x41544d4e, len=14344
27,206,562 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,381,480 ready_for_fw is high
3,381,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,058,685 >>> mbox cmd response: success
19,351,856 UART:
19,352,249 UART: Running Caliptra FMC ...
19,353,380 UART:
19,353,540 UART: [state] CFI Enabled
19,417,600 UART: [fht] FMC Alias Private Key: 7
21,181,851 UART: [art] Extend RT PCRs Done
21,183,078 UART: [art] Lock RT PCRs Done
21,184,492 UART: [art] Populate DV Done
21,189,723 UART: [fht] FMC Alias Private Key: 7
21,191,375 UART: [art] Derive CDI
21,192,190 UART: [art] Store in in slot 0x4
21,250,325 UART: [art] Derive Key Pair
21,251,363 UART: [art] Store priv key in slot 0x5
23,714,524 UART: [art] Derive Key Pair - Done
23,727,577 UART: [art] Signing Cert with AUTHO
23,728,879 UART: RITY.KEYID = 7
25,440,727 UART: [art] Erasing AUTHORITY.KEYID = 7
25,442,232 UART: [art] PUB.X = 7CF14267CDE8094BDE265173CC26578CA7A2866A86767690AC8F021B7ADC706605DB0EE5AF327EF42BBDFE83A5C7CC44
25,449,471 UART: [art] PUB.Y = 734414715ECCF6AC9519627FFCF0C1C3A469842C18337E53BD6FFF41A6C5819724174465A2D7CD11BBA9E0ED4438D9BA
25,456,782 UART: [art] SIG.R = ACB7994C3FF8914E79D1D30A1D8C7328BCFBAC000FD6A8E8F3432D278E078537D58F01C5100785416E77E13B83570387
25,464,114 UART: [art] SIG.S = 0B94E5572853A96E12091A52122F946A17FBD7EEADA9FFEC7F82E205731BA896317B3151A912477EA8AE0CB045B0EDF8
26,442,765 UART: Caliptra RT
26,443,475 UART: [state] CFI Enabled
26,607,562 UART: [rt] RT listening for mailbox commands...
26,609,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,765,612 UART: [rt]cmd =0x41544d4e, len=14344
26,767,484 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,476 UART:
192,851 UART: Running Caliptra ROM ...
194,009 UART:
603,595 UART: [state] CFI Enabled
618,457 UART: [state] LifecycleState = Unprovisioned
620,331 UART: [state] DebugLocked = No
621,566 UART: [state] WD Timer not started. Device not locked for debugging
624,596 UART: [kat] SHA2-256
803,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,312 UART: [kat] ++
815,755 UART: [kat] sha1
827,185 UART: [kat] SHA2-256
830,177 UART: [kat] SHA2-384
836,012 UART: [kat] SHA2-512-ACC
839,012 UART: [kat] ECC-384
3,283,025 UART: [kat] HMAC-384Kdf
3,295,465 UART: [kat] LMS
3,825,010 UART: [kat] --
3,828,984 UART: [cold-reset] ++
3,830,349 UART: [fht] FHT @ 0x50003400
3,840,821 UART: [idev] ++
3,841,374 UART: [idev] CDI.KEYID = 6
3,842,324 UART: [idev] SUBJECT.KEYID = 7
3,843,553 UART: [idev] UDS.KEYID = 0
3,844,442 ready_for_fw is high
3,844,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,394 UART: [idev] Erasing UDS.KEYID = 0
6,314,664 UART: [idev] Sha1 KeyId Algorithm
6,338,807 UART: [idev] --
6,342,572 UART: [ldev] ++
6,343,134 UART: [ldev] CDI.KEYID = 6
6,344,097 UART: [ldev] SUBJECT.KEYID = 5
6,345,249 UART: [ldev] AUTHORITY.KEYID = 7
6,346,525 UART: [ldev] FE.KEYID = 1
6,357,341 UART: [ldev] Erasing FE.KEYID = 1
8,831,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,771 UART: [ldev] --
10,621,063 UART: [fwproc] Wait for Commands...
10,623,916 UART: [fwproc] Recv command 0x46574c44
10,626,004 UART: [fwproc] Recv'd Img size: 114448 bytes
15,197,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,273,973 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,342,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,660,260 >>> mbox cmd response: success
15,665,082 UART: [afmc] ++
15,665,673 UART: [afmc] CDI.KEYID = 6
15,666,576 UART: [afmc] SUBJECT.KEYID = 7
15,667,730 UART: [afmc] AUTHORITY.KEYID = 5
18,171,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,895,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,896,875 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,912,834 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,928,844 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,944,588 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,967,533 UART: [afmc] --
19,971,873 UART: [cold-reset] --
19,975,680 UART: [state] Locking Datavault
19,980,877 UART: [state] Locking PCR0, PCR1 and PCR31
19,982,569 UART: [state] Locking ICCM
19,984,525 UART: [exit] Launching FMC @ 0x40000130
19,992,968 UART:
19,993,192 UART: Running Caliptra FMC ...
19,994,230 UART:
19,994,374 UART: [state] CFI Enabled
20,002,795 UART: [fht] FMC Alias Private Key: 7
21,759,478 UART: [art] Extend RT PCRs Done
21,760,692 UART: [art] Lock RT PCRs Done
21,762,176 UART: [art] Populate DV Done
21,767,631 UART: [fht] FMC Alias Private Key: 7
21,769,106 UART: [art] Derive CDI
21,769,836 UART: [art] Store in in slot 0x4
21,812,362 UART: [art] Derive Key Pair
21,813,397 UART: [art] Store priv key in slot 0x5
24,241,176 UART: [art] Derive Key Pair - Done
24,254,015 UART: [art] Signing Cert with AUTHO
24,255,369 UART: RITY.KEYID = 7
25,960,955 UART: [art] Erasing AUTHORITY.KEYID = 7
25,962,464 UART: [art] PUB.X = 18E681FF1F2957BAF863140355139CB27C1EF3689D00284F634275C12AA4BA8700BEEB12C4319EABC6CEC7B94A19BBB2
25,969,738 UART: [art] PUB.Y = 6CA6E37B7DC29BDA510CD4F71B7F065A96189828C3435BD5132A6EE2297C96981DB0F491C346E59DAE8997ADAE87F95F
25,976,954 UART: [art] SIG.R = E28F0C193210D94D295B797B4D08AC3F82D66FA6A9BAFD56AB4282CF2D61D97CE36B87A83B764B31EB1D57CCE90BFE50
25,984,391 UART: [art] SIG.S = 19EB5A89A3423067B0AD69B3CB6A1C73E53630CF5722C5DE28B84D1DB0D0D01D3287ECADE3072B3C83B4D32E2F68651C
26,963,144 UART: Caliptra RT
26,963,853 UART: [state] CFI Enabled
27,081,237 UART: [rt] RT listening for mailbox commands...
27,083,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,238,920 UART: [rt]cmd =0x41544d4e, len=14344
27,240,725 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,696,679 ready_for_fw is high
3,697,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,250,379 >>> mbox cmd response: success
19,500,086 UART:
19,500,473 UART: Running Caliptra FMC ...
19,501,560 UART:
19,501,706 UART: [state] CFI Enabled
19,509,979 UART: [fht] FMC Alias Private Key: 7
21,266,806 UART: [art] Extend RT PCRs Done
21,268,037 UART: [art] Lock RT PCRs Done
21,269,582 UART: [art] Populate DV Done
21,274,698 UART: [fht] FMC Alias Private Key: 7
21,276,394 UART: [art] Derive CDI
21,277,122 UART: [art] Store in in slot 0x4
21,319,878 UART: [art] Derive Key Pair
21,320,915 UART: [art] Store priv key in slot 0x5
23,747,424 UART: [art] Derive Key Pair - Done
23,760,260 UART: [art] Signing Cert with AUTHO
23,761,553 UART: RITY.KEYID = 7
25,466,919 UART: [art] Erasing AUTHORITY.KEYID = 7
25,468,394 UART: [art] PUB.X = 105684F6CD8DC3522F46974DCB1444E9A5D09FB55C3FD5574307F374D2B8282CE3140D0E3935DBF81FB2D79CB7632017
25,475,672 UART: [art] PUB.Y = BC68829788942AA6FF872283646215EA594A997D11E385D7804F7AFFCA4A4D0BDAD8CEC9BEEA510A6AC559DF3E5FA14C
25,482,946 UART: [art] SIG.R = DCFA5B79A153877F28E4B630620837535C9024639AD8492A71789541F68DAD549E68AD9A9C66B149F3A999CE10E7E2FA
25,490,308 UART: [art] SIG.S = 1F62B0A925A047E8E72AE00B7FD3ADE7D28342FD95CC39916A015600B56BC56C2521F1B4FFB41A30B6FB4DF1C8F247AE
26,469,202 UART: Caliptra RT
26,469,935 UART: [state] CFI Enabled
26,587,107 UART: [rt] RT listening for mailbox commands...
26,589,432 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,744,698 UART: [rt]cmd =0x41544d4e, len=14344
26,746,445 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,437,740 ready_for_fw is high
3,438,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,832,200 >>> mbox cmd response: success
20,111,930 UART:
20,112,314 UART: Running Caliptra FMC ...
20,113,416 UART:
20,113,568 UART: [state] CFI Enabled
20,178,576 UART: [fht] FMC Alias Private Key: 7
21,942,488 UART: [art] Extend RT PCRs Done
21,943,714 UART: [art] Lock RT PCRs Done
21,945,007 UART: [art] Populate DV Done
21,950,664 UART: [fht] FMC Alias Private Key: 7
21,952,335 UART: [art] Derive CDI
21,953,154 UART: [art] Store in in slot 0x4
22,010,728 UART: [art] Derive Key Pair
22,011,731 UART: [art] Store priv key in slot 0x5
24,474,972 UART: [art] Derive Key Pair - Done
24,487,962 UART: [art] Signing Cert with AUTHO
24,489,269 UART: RITY.KEYID = 7
26,200,521 UART: [art] Erasing AUTHORITY.KEYID = 7
26,202,031 UART: [art] PUB.X = 88F99326E62F877F4358DBBC1E8DD15B2E7B4C90AC2C4EE5A6215D09C678AC3A9CAA70C12A4413529181E3EED68D1FB6
26,209,283 UART: [art] PUB.Y = B2CB20FBBB7BBA0448959BD1C485B65474AEED1FC2B9643E5881CBE04FBD37EB11D324C4E68ED8A2770408D124FA045C
26,216,595 UART: [art] SIG.R = 737CE863449B955396FE450E8E6AEB3F3DB21CAE636B4F407C4C082AE6FC1020B2A87572CEEAA60235FC6508B5D48CC1
26,223,997 UART: [art] SIG.S = 260C3DBE3469D0FB404FF4584686D710F18B418A2CB9242B18637768ED319B27E2FA88484505ABDF32F5DE2B0994E5C5
27,202,984 UART: Caliptra RT
27,203,681 UART: [state] CFI Enabled
27,369,580 UART: [rt] RT listening for mailbox commands...
27,371,867 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,527,928 UART: [rt]cmd =0x41544d4e, len=14344
27,529,969 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,754,089 ready_for_fw is high
3,754,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,070,209 >>> mbox cmd response: success
20,322,627 UART:
20,323,011 UART: Running Caliptra FMC ...
20,324,111 UART:
20,324,259 UART: [state] CFI Enabled
20,332,023 UART: [fht] FMC Alias Private Key: 7
22,089,072 UART: [art] Extend RT PCRs Done
22,090,296 UART: [art] Lock RT PCRs Done
22,091,729 UART: [art] Populate DV Done
22,097,192 UART: [fht] FMC Alias Private Key: 7
22,098,917 UART: [art] Derive CDI
22,099,689 UART: [art] Store in in slot 0x4
22,141,758 UART: [art] Derive Key Pair
22,142,760 UART: [art] Store priv key in slot 0x5
24,569,500 UART: [art] Derive Key Pair - Done
24,582,601 UART: [art] Signing Cert with AUTHO
24,583,932 UART: RITY.KEYID = 7
26,289,409 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,917 UART: [art] PUB.X = 162B26E583DC9A3F4B33BAF9BDAC2654F971F04CBA54C5EB0AC68546CF46145A9EDE71CD960833AF3CF29AEE500FAA08
26,298,206 UART: [art] PUB.Y = CE51F0658965F431224F5954DF326F76769C8EA3A0F714D828CBF719FAF5B2D7584F52BE5DDFEA4F38F689F63214D507
26,305,437 UART: [art] SIG.R = 1F5959E0149D234F8041464030788218401796F8416919EB0F0F897CEA4085EE0CB9D9C80E59AE3D7BD1EC7F95866D89
26,312,819 UART: [art] SIG.S = 41EE7D03D1A3495C44AD663EB3BE97D36E5EFE247C4F3730FD797F73FDD26A0BB7460DCD1A8C31450361902E2D3270DB
27,292,245 UART: Caliptra RT
27,292,954 UART: [state] CFI Enabled
27,410,195 UART: [rt] RT listening for mailbox commands...
27,412,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,567,579 UART: [rt]cmd =0x41544d4e, len=14344
27,569,493 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,642 UART: [state] LifecycleState = Unprovisioned
86,297 UART: [state] DebugLocked = No
86,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,327 UART: [kat] SHA2-256
882,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,373 UART: [kat] ++
886,525 UART: [kat] sha1
890,687 UART: [kat] SHA2-256
892,625 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
903,014 UART: [kat] HMAC-384Kdf
907,528 UART: [kat] LMS
1,475,724 UART: [kat] --
1,476,745 UART: [cold-reset] ++
1,477,207 UART: [fht] Storing FHT @ 0x50003400
1,480,094 UART: [idev] ++
1,480,262 UART: [idev] CDI.KEYID = 6
1,480,622 UART: [idev] SUBJECT.KEYID = 7
1,481,046 UART: [idev] UDS.KEYID = 0
1,481,391 ready_for_fw is high
1,481,391 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,018 UART: [idev] Erasing UDS.KEYID = 0
1,506,062 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,828 UART: [idev] --
1,515,775 UART: [ldev] ++
1,515,943 UART: [ldev] CDI.KEYID = 6
1,516,306 UART: [ldev] SUBJECT.KEYID = 5
1,516,732 UART: [ldev] AUTHORITY.KEYID = 7
1,517,195 UART: [ldev] FE.KEYID = 1
1,522,375 UART: [ldev] Erasing FE.KEYID = 1
1,547,526 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,622 UART: [ldev] --
1,587,011 UART: [fwproc] Waiting for Commands...
1,587,756 UART: [fwproc] Received command 0x46574c44
1,588,547 UART: [fwproc] Received Image of size 114448 bytes
5,047,287 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,075,391 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,104,743 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,240,834 >>> mbox cmd response: success
5,242,066 UART: [afmc] ++
5,242,234 UART: [afmc] CDI.KEYID = 6
5,242,596 UART: [afmc] SUBJECT.KEYID = 7
5,243,021 UART: [afmc] AUTHORITY.KEYID = 5
5,277,683 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,294,273 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,295,053 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,300,762 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,306,654 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,312,355 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,320,179 UART: [afmc] --
5,321,135 UART: [cold-reset] --
5,321,953 UART: [state] Locking Datavault
5,322,874 UART: [state] Locking PCR0, PCR1 and PCR31
5,323,478 UART: [state] Locking ICCM
5,324,062 UART: [exit] Launching FMC @ 0x40000130
5,329,391 UART:
5,329,407 UART: Running Caliptra FMC ...
5,329,815 UART:
5,329,869 UART: [state] CFI Enabled
5,340,405 UART: [fht] FMC Alias Private Key: 7
5,448,277 UART: [art] Extend RT PCRs Done
5,448,705 UART: [art] Lock RT PCRs Done
5,450,063 UART: [art] Populate DV Done
5,458,203 UART: [fht] FMC Alias Private Key: 7
5,459,161 UART: [art] Derive CDI
5,459,441 UART: [art] Store in in slot 0x4
5,545,014 UART: [art] Derive Key Pair
5,545,374 UART: [art] Store priv key in slot 0x5
5,558,626 UART: [art] Derive Key Pair - Done
5,573,329 UART: [art] Signing Cert with AUTHO
5,573,809 UART: RITY.KEYID = 7
5,588,869 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,634 UART: [art] PUB.X = A64111E954DA78194D7CAB1A83C3320554A3A2FA0DFA3B80888084EF55B8C338E09EC94297480BC6C490B39C5A4B1644
5,596,397 UART: [art] PUB.Y = 0FF9346627A979E2DE007AA9E258EAD8CC36DC0F539940A822703FE10FA63F44F48709075137C5180BB708AAECF62055
5,603,306 UART: [art] SIG.R = F1B2CED2AF8778F9FECC20335419CECEF5A28D05FC5169FC1D15FEBB97250AE82A695B46247FEBD57DF5F33A3593EE00
5,610,070 UART: [art] SIG.S = 74DFF3F3284F0224C5D5998F27BE3DAA746C913143C946488774045E42B3F957A8FA8F89B591E07AA0C559008F89ED93
5,634,065 UART: Caliptra RT
5,634,318 UART: [state] CFI Enabled
5,742,977 UART: [rt] RT listening for mailbox commands...
5,743,647 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,866,761 UART: [rt]cmd =0x41544d4e, len=14344
5,868,159 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,721 ready_for_fw is high
1,362,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,166,304 >>> mbox cmd response: success
5,227,705 UART:
5,227,721 UART: Running Caliptra FMC ...
5,228,129 UART:
5,228,183 UART: [state] CFI Enabled
5,238,479 UART: [fht] FMC Alias Private Key: 7
5,346,691 UART: [art] Extend RT PCRs Done
5,347,119 UART: [art] Lock RT PCRs Done
5,348,717 UART: [art] Populate DV Done
5,356,955 UART: [fht] FMC Alias Private Key: 7
5,358,071 UART: [art] Derive CDI
5,358,351 UART: [art] Store in in slot 0x4
5,443,556 UART: [art] Derive Key Pair
5,443,916 UART: [art] Store priv key in slot 0x5
5,456,970 UART: [art] Derive Key Pair - Done
5,471,716 UART: [art] Signing Cert with AUTHO
5,472,196 UART: RITY.KEYID = 7
5,486,758 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,523 UART: [art] PUB.X = 30858C5038A0454AD7624393A6920F0A7BFC2E2B94D127A7B5DBDDA0EBED68D7905A48D2789CFA5F3A25ACCE1E7897AC
5,494,303 UART: [art] PUB.Y = E8466ED6EDB86928EAF83AC38E90A1AACF6CB2B3217FBC1BAEC930D910D0C76D00D7E40DCF18C0C772100EAE049D1BB2
5,501,248 UART: [art] SIG.R = 85326263ABC3895DF4E009C46EB001F7CE5BA1B7F3C25135596E65E14C618B2EB86580BDB801AFDD235273E1C5E80F0B
5,508,011 UART: [art] SIG.S = 6DD34E976356C65EF46271D29C4F5C0B83EB5625A820CBAF556973EC6A45757652497FD28271FBE38D545B0496F98820
5,531,824 UART: Caliptra RT
5,532,077 UART: [state] CFI Enabled
5,640,258 UART: [rt] RT listening for mailbox commands...
5,640,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,264 UART: [rt]cmd =0x41544d4e, len=14344
5,766,192 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,925 UART: [state] LifecycleState = Unprovisioned
85,580 UART: [state] DebugLocked = No
86,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,618 UART: [kat] SHA2-256
881,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,664 UART: [kat] ++
885,816 UART: [kat] sha1
890,072 UART: [kat] SHA2-256
892,010 UART: [kat] SHA2-384
894,633 UART: [kat] SHA2-512-ACC
896,534 UART: [kat] ECC-384
902,021 UART: [kat] HMAC-384Kdf
906,535 UART: [kat] LMS
1,474,731 UART: [kat] --
1,475,792 UART: [cold-reset] ++
1,476,306 UART: [fht] Storing FHT @ 0x50003400
1,479,165 UART: [idev] ++
1,479,333 UART: [idev] CDI.KEYID = 6
1,479,693 UART: [idev] SUBJECT.KEYID = 7
1,480,117 UART: [idev] UDS.KEYID = 0
1,480,462 ready_for_fw is high
1,480,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,375 UART: [idev] Erasing UDS.KEYID = 0
1,504,941 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,539 UART: [idev] --
1,514,718 UART: [ldev] ++
1,514,886 UART: [ldev] CDI.KEYID = 6
1,515,249 UART: [ldev] SUBJECT.KEYID = 5
1,515,675 UART: [ldev] AUTHORITY.KEYID = 7
1,516,138 UART: [ldev] FE.KEYID = 1
1,521,572 UART: [ldev] Erasing FE.KEYID = 1
1,547,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,321 UART: [ldev] --
1,586,664 UART: [fwproc] Waiting for Commands...
1,587,505 UART: [fwproc] Received command 0x46574c44
1,588,296 UART: [fwproc] Received Image of size 114448 bytes
5,274,298 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,301,828 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,331,180 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,467,343 >>> mbox cmd response: success
5,468,449 UART: [afmc] ++
5,468,617 UART: [afmc] CDI.KEYID = 6
5,468,979 UART: [afmc] SUBJECT.KEYID = 7
5,469,404 UART: [afmc] AUTHORITY.KEYID = 5
5,504,508 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,520,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,521,636 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,527,345 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,533,237 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,538,938 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,546,878 UART: [afmc] --
5,547,886 UART: [cold-reset] --
5,548,570 UART: [state] Locking Datavault
5,549,927 UART: [state] Locking PCR0, PCR1 and PCR31
5,550,531 UART: [state] Locking ICCM
5,551,135 UART: [exit] Launching FMC @ 0x40000130
5,556,464 UART:
5,556,480 UART: Running Caliptra FMC ...
5,556,888 UART:
5,557,031 UART: [state] CFI Enabled
5,567,555 UART: [fht] FMC Alias Private Key: 7
5,675,755 UART: [art] Extend RT PCRs Done
5,676,183 UART: [art] Lock RT PCRs Done
5,677,813 UART: [art] Populate DV Done
5,686,215 UART: [fht] FMC Alias Private Key: 7
5,687,243 UART: [art] Derive CDI
5,687,523 UART: [art] Store in in slot 0x4
5,773,106 UART: [art] Derive Key Pair
5,773,466 UART: [art] Store priv key in slot 0x5
5,787,114 UART: [art] Derive Key Pair - Done
5,801,664 UART: [art] Signing Cert with AUTHO
5,802,144 UART: RITY.KEYID = 7
5,817,136 UART: [art] Erasing AUTHORITY.KEYID = 7
5,817,901 UART: [art] PUB.X = 937924F576DF54879AB0A144A016D369659DE97B53CC026CC55A6A39F452990B1FAE9BC437E4AA1588A3B9AE0BCA7F16
5,824,670 UART: [art] PUB.Y = DDE98B378E6E06654BFFE32E44FE7754CBA92CD21D378CDF08918446F3FB55E6EA97FD922880CF3889979B6632D57C6D
5,831,624 UART: [art] SIG.R = 15DE164DA1658ECA540CEC8109C72EBF9C50DF7FB8A4FC29F55AF688A7DDFEE87DC1CA2E021CBF136B0C133BFB863A01
5,838,407 UART: [art] SIG.S = 17F70EDDAF35339D0B72C1109A0E0A726D3103FAEA58D443D450047A01ACE61603CFA98A2ABCADE6A85B591356D08D3E
5,862,354 UART: Caliptra RT
5,862,699 UART: [state] CFI Enabled
5,970,663 UART: [rt] RT listening for mailbox commands...
5,971,333 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,094,167 UART: [rt]cmd =0x41544d4e, len=14344
6,095,791 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,364,024 ready_for_fw is high
1,364,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,243,247 >>> mbox cmd response: success
5,304,956 UART:
5,304,972 UART: Running Caliptra FMC ...
5,305,380 UART:
5,305,523 UART: [state] CFI Enabled
5,315,987 UART: [fht] FMC Alias Private Key: 7
5,423,979 UART: [art] Extend RT PCRs Done
5,424,407 UART: [art] Lock RT PCRs Done
5,425,715 UART: [art] Populate DV Done
5,434,143 UART: [fht] FMC Alias Private Key: 7
5,435,199 UART: [art] Derive CDI
5,435,479 UART: [art] Store in in slot 0x4
5,521,226 UART: [art] Derive Key Pair
5,521,586 UART: [art] Store priv key in slot 0x5
5,535,070 UART: [art] Derive Key Pair - Done
5,549,605 UART: [art] Signing Cert with AUTHO
5,550,085 UART: RITY.KEYID = 7
5,565,017 UART: [art] Erasing AUTHORITY.KEYID = 7
5,565,782 UART: [art] PUB.X = 1057F0A64E47BADA6491640ED3D1E5976D9E1B4AEC6002B391C88BBD1105673E95B247DDECD6AE2BD525387C94236930
5,572,549 UART: [art] PUB.Y = 31ABC8804950E17E5EDE4DDE031E6F56A24AF83A1446A4F8AA10CC229995A568BFA3E721505E391B299E84ED6D61BC0F
5,579,505 UART: [art] SIG.R = 3D1702CE59214340E116C83AE3DBC8A71B3D7A39C071B43DFFD5ACFD6A04F5E209BFAEBD6031F244FE3D0637BA539F20
5,586,281 UART: [art] SIG.S = E1F1A3AEB446E66E92A19DE19B367EDE35C3CB56638FF7B1EC7113E8C330DA3DD8899D9F9FCA4E591DB7130349FBF024
5,610,085 UART: Caliptra RT
5,610,430 UART: [state] CFI Enabled
5,718,869 UART: [rt] RT listening for mailbox commands...
5,719,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,842,595 UART: [rt]cmd =0x41544d4e, len=14344
5,843,997 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
893,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,495 UART: [kat] ++
897,647 UART: [kat] sha1
901,915 UART: [kat] SHA2-256
903,855 UART: [kat] SHA2-384
906,770 UART: [kat] SHA2-512-ACC
908,671 UART: [kat] ECC-384
918,658 UART: [kat] HMAC-384Kdf
923,274 UART: [kat] LMS
1,171,602 UART: [kat] --
1,172,521 UART: [cold-reset] ++
1,172,931 UART: [fht] FHT @ 0x50003400
1,175,524 UART: [idev] ++
1,175,692 UART: [idev] CDI.KEYID = 6
1,176,052 UART: [idev] SUBJECT.KEYID = 7
1,176,476 UART: [idev] UDS.KEYID = 0
1,176,821 ready_for_fw is high
1,176,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,750 UART: [idev] Erasing UDS.KEYID = 0
1,201,515 UART: [idev] Sha1 KeyId Algorithm
1,210,069 UART: [idev] --
1,210,887 UART: [ldev] ++
1,211,055 UART: [ldev] CDI.KEYID = 6
1,211,418 UART: [ldev] SUBJECT.KEYID = 5
1,211,844 UART: [ldev] AUTHORITY.KEYID = 7
1,212,307 UART: [ldev] FE.KEYID = 1
1,217,381 UART: [ldev] Erasing FE.KEYID = 1
1,243,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,745 UART: [ldev] --
1,283,070 UART: [fwproc] Wait for Commands...
1,283,852 UART: [fwproc] Recv command 0x46574c44
1,284,580 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,320,374 >>> mbox cmd response: success
3,321,408 UART: [afmc] ++
3,321,576 UART: [afmc] CDI.KEYID = 6
3,321,938 UART: [afmc] SUBJECT.KEYID = 7
3,322,363 UART: [afmc] AUTHORITY.KEYID = 5
3,358,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,590 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,299 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,191 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,902 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,843 UART: [afmc] --
3,401,769 UART: [cold-reset] --
3,402,409 UART: [state] Locking Datavault
3,403,654 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,258 UART: [state] Locking ICCM
3,404,864 UART: [exit] Launching FMC @ 0x40000130
3,410,193 UART:
3,410,209 UART: Running Caliptra FMC ...
3,410,617 UART:
3,410,671 UART: [state] CFI Enabled
3,421,299 UART: [fht] FMC Alias Private Key: 7
3,528,923 UART: [art] Extend RT PCRs Done
3,529,351 UART: [art] Lock RT PCRs Done
3,530,953 UART: [art] Populate DV Done
3,539,113 UART: [fht] FMC Alias Private Key: 7
3,540,089 UART: [art] Derive CDI
3,540,369 UART: [art] Store in in slot 0x4
3,626,124 UART: [art] Derive Key Pair
3,626,484 UART: [art] Store priv key in slot 0x5
3,639,504 UART: [art] Derive Key Pair - Done
3,654,223 UART: [art] Signing Cert with AUTHO
3,654,703 UART: RITY.KEYID = 7
3,669,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,754 UART: [art] PUB.X = 5CC2DD2AB1399ABAFB95309C633BE2108F2DDAE90C6A48417E2878BECB2B9EA409813B249234735CEB948638B9D18C0A
3,677,527 UART: [art] PUB.Y = 1253D47DB79C56E30D44AE624FC731EC8A507055421E9A3CF0E98D6B5EADAFEDF41C3C97FDC480F739DCA0E5389441C6
3,684,490 UART: [art] SIG.R = 65E83EE423480B22C639D69E3CFCB59A8583BB9164B6D2496DF3C83BC361331AD751071590E149A6990362A74F9EF81D
3,691,249 UART: [art] SIG.S = AD7119E57506CFDF405007045914A8553A82A518A063550FB7678C10708295B88B60FFFA60BF010CE0510C5AB93E687C
3,715,773 UART: Caliptra RT
3,716,026 UART: [state] CFI Enabled
3,823,454 UART: [rt] RT listening for mailbox commands...
3,824,124 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,212 UART: [rt]cmd =0x41544d4e, len=14344
3,948,662 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,965 ready_for_fw is high
1,059,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,173,393 >>> mbox cmd response: success
3,235,704 UART:
3,235,720 UART: Running Caliptra FMC ...
3,236,128 UART:
3,236,182 UART: [state] CFI Enabled
3,246,864 UART: [fht] FMC Alias Private Key: 7
3,354,350 UART: [art] Extend RT PCRs Done
3,354,778 UART: [art] Lock RT PCRs Done
3,356,180 UART: [art] Populate DV Done
3,364,330 UART: [fht] FMC Alias Private Key: 7
3,365,278 UART: [art] Derive CDI
3,365,558 UART: [art] Store in in slot 0x4
3,451,155 UART: [art] Derive Key Pair
3,451,515 UART: [art] Store priv key in slot 0x5
3,464,561 UART: [art] Derive Key Pair - Done
3,479,338 UART: [art] Signing Cert with AUTHO
3,479,818 UART: RITY.KEYID = 7
3,494,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,625 UART: [art] PUB.X = CFE005D879F2782B4AEF8F3F21ACDB36358BD246F5709C9A79E95C721FF5F6D89D010EDE672F9D78F8A838EFECEF6F2C
3,502,408 UART: [art] PUB.Y = 5C4EB12A7FC8D32962EB54D397BDDB42E261B3901CF5EE56B4BB0634BDB87993CC4B4252F76F5D91C88367A2C4B3FDC2
3,509,371 UART: [art] SIG.R = F90A3B9A3F4FA7F9F58B293FB782575F8FCE02A61C6D4298C31DAC0BF941C757537AAB6DEEEF19D15A402A12D3BE16E6
3,516,152 UART: [art] SIG.S = E2067750BDC7492A51D5E5BF3BB65F048E63AACD3FF0D400B3F5B2D45B3D920301B477C1CC2ABEFEE554089154707CF5
3,540,244 UART: Caliptra RT
3,540,497 UART: [state] CFI Enabled
3,648,346 UART: [rt] RT listening for mailbox commands...
3,649,016 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,894 UART: [rt]cmd =0x41544d4e, len=14344
3,773,256 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
893,827 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,952 UART: [kat] ++
898,104 UART: [kat] sha1
902,408 UART: [kat] SHA2-256
904,348 UART: [kat] SHA2-384
907,225 UART: [kat] SHA2-512-ACC
909,126 UART: [kat] ECC-384
918,863 UART: [kat] HMAC-384Kdf
923,447 UART: [kat] LMS
1,171,775 UART: [kat] --
1,172,658 UART: [cold-reset] ++
1,173,078 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 ready_for_fw is high
1,176,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,421 UART: [idev] Erasing UDS.KEYID = 0
1,201,504 UART: [idev] Sha1 KeyId Algorithm
1,210,110 UART: [idev] --
1,211,154 UART: [ldev] ++
1,211,322 UART: [ldev] CDI.KEYID = 6
1,211,685 UART: [ldev] SUBJECT.KEYID = 5
1,212,111 UART: [ldev] AUTHORITY.KEYID = 7
1,212,574 UART: [ldev] FE.KEYID = 1
1,217,918 UART: [ldev] Erasing FE.KEYID = 1
1,245,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,138 UART: [ldev] --
1,284,487 UART: [fwproc] Wait for Commands...
1,285,067 UART: [fwproc] Recv command 0x46574c44
1,285,795 UART: [fwproc] Recv'd Img size: 114448 bytes
3,124,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,317,199 >>> mbox cmd response: success
3,318,453 UART: [afmc] ++
3,318,621 UART: [afmc] CDI.KEYID = 6
3,318,983 UART: [afmc] SUBJECT.KEYID = 7
3,319,408 UART: [afmc] AUTHORITY.KEYID = 5
3,355,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,767 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,476 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,368 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,079 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,002 UART: [afmc] --
3,399,076 UART: [cold-reset] --
3,399,960 UART: [state] Locking Datavault
3,401,233 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,837 UART: [state] Locking ICCM
3,402,261 UART: [exit] Launching FMC @ 0x40000130
3,407,590 UART:
3,407,606 UART: Running Caliptra FMC ...
3,408,014 UART:
3,408,157 UART: [state] CFI Enabled
3,419,187 UART: [fht] FMC Alias Private Key: 7
3,527,239 UART: [art] Extend RT PCRs Done
3,527,667 UART: [art] Lock RT PCRs Done
3,529,275 UART: [art] Populate DV Done
3,537,683 UART: [fht] FMC Alias Private Key: 7
3,538,827 UART: [art] Derive CDI
3,539,107 UART: [art] Store in in slot 0x4
3,624,292 UART: [art] Derive Key Pair
3,624,652 UART: [art] Store priv key in slot 0x5
3,637,552 UART: [art] Derive Key Pair - Done
3,652,367 UART: [art] Signing Cert with AUTHO
3,652,847 UART: RITY.KEYID = 7
3,668,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,262 UART: [art] PUB.X = B7D5A25396CD288C2A56028C53795B5A62373897066D332B3BDA79FE8CB9CCAC87FA00825724AFB42115879D74625541
3,676,000 UART: [art] PUB.Y = 4417F211164D1EE1DDE0065AECB10FBE619CE7378485A4F6CCD482629E145172ADE308FE338926AD9EFFA99E6F5049C7
3,682,951 UART: [art] SIG.R = D093A1B7BC53BEDCBD8A757E4EA8A22ABE996BCCD4492B511CC5092A1DE5B20979BC334BD391BB8B5889E21189F9439D
3,689,733 UART: [art] SIG.S = 1D4CE3FB509747B88943B26C97B691AF1A3426062B5DD5DD654446A15B3BBAD0F6407EB9A8EBEA69EEEAAE43A1A0C1FA
3,713,583 UART: Caliptra RT
3,713,928 UART: [state] CFI Enabled
3,821,630 UART: [rt] RT listening for mailbox commands...
3,822,300 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,198 UART: [rt]cmd =0x41544d4e, len=14344
3,946,750 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,532 ready_for_fw is high
1,060,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,178,402 >>> mbox cmd response: success
3,241,057 UART:
3,241,073 UART: Running Caliptra FMC ...
3,241,481 UART:
3,241,624 UART: [state] CFI Enabled
3,252,016 UART: [fht] FMC Alias Private Key: 7
3,360,520 UART: [art] Extend RT PCRs Done
3,360,948 UART: [art] Lock RT PCRs Done
3,362,686 UART: [art] Populate DV Done
3,370,778 UART: [fht] FMC Alias Private Key: 7
3,371,884 UART: [art] Derive CDI
3,372,164 UART: [art] Store in in slot 0x4
3,457,729 UART: [art] Derive Key Pair
3,458,089 UART: [art] Store priv key in slot 0x5
3,471,201 UART: [art] Derive Key Pair - Done
3,486,115 UART: [art] Signing Cert with AUTHO
3,486,595 UART: RITY.KEYID = 7
3,501,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,674 UART: [art] PUB.X = C796B5152459072519356500FB4F60E028F6A6C141285A481A078FA195392B9809779D6D876727984C01EBAF70288AF5
3,509,394 UART: [art] PUB.Y = 431B403B955745920F17056845C332BFDE5200427B901E9391FDE595C0D90C481AB556565BE0836328AC646923CCE3CA
3,516,305 UART: [art] SIG.R = 89FC76D210C9A5ECD4A4F23C6518B3A84D697C8EB013BCD7839E06AB2A646E8EC51B91B72F7140A20CA765E3FD1F56E0
3,523,083 UART: [art] SIG.S = 232E42CA2FE6F9E8209AD9679B8D07C3E299C3643ADE603CB727E5D6E60ED664BFE357FF7049C716428E15E7BE2FE160
3,546,894 UART: Caliptra RT
3,547,239 UART: [state] CFI Enabled
3,654,493 UART: [rt] RT listening for mailbox commands...
3,655,163 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,133 UART: [rt]cmd =0x41544d4e, len=14344
3,779,671 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,816 UART: [kat] LMS
1,169,128 UART: [kat] --
1,170,147 UART: [cold-reset] ++
1,170,689 UART: [fht] FHT @ 0x50003400
1,173,543 UART: [idev] ++
1,173,711 UART: [idev] CDI.KEYID = 6
1,174,072 UART: [idev] SUBJECT.KEYID = 7
1,174,497 UART: [idev] UDS.KEYID = 0
1,174,843 ready_for_fw is high
1,174,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,699 UART: [idev] Erasing UDS.KEYID = 0
1,199,735 UART: [idev] Sha1 KeyId Algorithm
1,208,653 UART: [idev] --
1,209,856 UART: [ldev] ++
1,210,024 UART: [ldev] CDI.KEYID = 6
1,210,388 UART: [ldev] SUBJECT.KEYID = 5
1,210,815 UART: [ldev] AUTHORITY.KEYID = 7
1,211,278 UART: [ldev] FE.KEYID = 1
1,216,420 UART: [ldev] Erasing FE.KEYID = 1
1,242,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,572 UART: [ldev] --
1,280,996 UART: [fwproc] Wait for Commands...
1,281,611 UART: [fwproc] Recv command 0x46574c44
1,282,344 UART: [fwproc] Recv'd Img size: 114448 bytes
3,121,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,597 >>> mbox cmd response: success
3,316,632 UART: [afmc] ++
3,316,800 UART: [afmc] CDI.KEYID = 6
3,317,163 UART: [afmc] SUBJECT.KEYID = 7
3,317,589 UART: [afmc] AUTHORITY.KEYID = 5
3,352,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,800 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,510 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,400 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,111 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,927 UART: [afmc] --
3,396,005 UART: [cold-reset] --
3,396,851 UART: [state] Locking Datavault
3,398,110 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,714 UART: [state] Locking ICCM
3,399,144 UART: [exit] Launching FMC @ 0x40000130
3,404,473 UART:
3,404,489 UART: Running Caliptra FMC ...
3,404,897 UART:
3,404,951 UART: [state] CFI Enabled
3,415,523 UART: [fht] FMC Alias Private Key: 7
3,522,843 UART: [art] Extend RT PCRs Done
3,523,271 UART: [art] Lock RT PCRs Done
3,524,663 UART: [art] Populate DV Done
3,532,921 UART: [fht] FMC Alias Private Key: 7
3,533,887 UART: [art] Derive CDI
3,534,167 UART: [art] Store in in slot 0x4
3,619,760 UART: [art] Derive Key Pair
3,620,120 UART: [art] Store priv key in slot 0x5
3,633,448 UART: [art] Derive Key Pair - Done
3,648,072 UART: [art] Signing Cert with AUTHO
3,648,552 UART: RITY.KEYID = 7
3,663,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,325 UART: [art] PUB.X = 8250A7CCD666CC3D9A73590A9E91A994CB59EA2DE273F098C89A49D3BCAF6A0CD383D40DA22FF52DD791D9477EA432DD
3,671,104 UART: [art] PUB.Y = E5C67B2980C83403E6E30A61356DE05AE7BC29A4D69FA492BB6830E5960F2B2A6F77091BF8509760B3E8AC63E2A7F7E8
3,678,048 UART: [art] SIG.R = BDA549AB61A8E0368FA844FF4D02B04A17B9818F8A13AFB023F5F671C2A8A3B681E878685BBC5CF9755044C0B9EB56C7
3,684,827 UART: [art] SIG.S = B822DF639FDA9BC83E28DCCA46C7195AA7061349EA4D47B2BCC8EAC4149D5A578702AEC21B5BF79CC220A50E7D815F0E
3,708,436 UART: Caliptra RT
3,708,689 UART: [state] CFI Enabled
3,815,244 UART: [rt] RT listening for mailbox commands...
3,815,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,678 UART: [rt]cmd =0x41544d4e, len=14344
3,940,406 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,862 ready_for_fw is high
1,055,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,158,449 >>> mbox cmd response: success
3,220,558 UART:
3,220,574 UART: Running Caliptra FMC ...
3,220,982 UART:
3,221,036 UART: [state] CFI Enabled
3,231,230 UART: [fht] FMC Alias Private Key: 7
3,339,426 UART: [art] Extend RT PCRs Done
3,339,854 UART: [art] Lock RT PCRs Done
3,341,320 UART: [art] Populate DV Done
3,349,556 UART: [fht] FMC Alias Private Key: 7
3,350,572 UART: [art] Derive CDI
3,350,852 UART: [art] Store in in slot 0x4
3,436,181 UART: [art] Derive Key Pair
3,436,541 UART: [art] Store priv key in slot 0x5
3,450,117 UART: [art] Derive Key Pair - Done
3,464,954 UART: [art] Signing Cert with AUTHO
3,465,434 UART: RITY.KEYID = 7
3,480,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,481,311 UART: [art] PUB.X = 6E2C2FCF677C73AF9D746E27F6DD1CFD906123B23C0BB50BA496027DCBD0A40D61894287822C8204429F98B332C661EB
3,488,072 UART: [art] PUB.Y = F9A5A41C4752B3AD99AE86301CFC94B89028875708454D45896DAE2D8D69AD732A3F3E4771C82E1E6EA0E332690759AA
3,495,018 UART: [art] SIG.R = 413BFCD6CC1B1F0DF34EC0BC0F6375904FBEF8F4ABB07AC30B80B08EB2A56130D1524A13451D6DFE197FACD85F63ADAA
3,501,807 UART: [art] SIG.S = D350D5CE3FFA7942D4E255987982E23134FD9F783EA7685834AAB798F17430F327FC9E0A8F154DAF48BE508DAB7AE016
3,525,925 UART: Caliptra RT
3,526,178 UART: [state] CFI Enabled
3,633,322 UART: [rt] RT listening for mailbox commands...
3,633,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,850 UART: [rt]cmd =0x41544d4e, len=14344
3,758,456 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,725 UART: [kat] SHA2-512-ACC
906,626 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
921,105 UART: [kat] LMS
1,169,417 UART: [kat] --
1,170,414 UART: [cold-reset] ++
1,170,958 UART: [fht] FHT @ 0x50003400
1,173,532 UART: [idev] ++
1,173,700 UART: [idev] CDI.KEYID = 6
1,174,061 UART: [idev] SUBJECT.KEYID = 7
1,174,486 UART: [idev] UDS.KEYID = 0
1,174,832 ready_for_fw is high
1,174,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,558 UART: [idev] Erasing UDS.KEYID = 0
1,200,316 UART: [idev] Sha1 KeyId Algorithm
1,209,206 UART: [idev] --
1,210,479 UART: [ldev] ++
1,210,647 UART: [ldev] CDI.KEYID = 6
1,211,011 UART: [ldev] SUBJECT.KEYID = 5
1,211,438 UART: [ldev] AUTHORITY.KEYID = 7
1,211,901 UART: [ldev] FE.KEYID = 1
1,217,353 UART: [ldev] Erasing FE.KEYID = 1
1,243,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,687 UART: [ldev] --
1,282,961 UART: [fwproc] Wait for Commands...
1,283,752 UART: [fwproc] Recv command 0x46574c44
1,284,485 UART: [fwproc] Recv'd Img size: 114448 bytes
3,127,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,099 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,408 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,319,392 >>> mbox cmd response: success
3,320,445 UART: [afmc] ++
3,320,613 UART: [afmc] CDI.KEYID = 6
3,320,976 UART: [afmc] SUBJECT.KEYID = 7
3,321,402 UART: [afmc] AUTHORITY.KEYID = 5
3,356,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,413 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,123 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,013 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,724 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,646 UART: [afmc] --
3,399,672 UART: [cold-reset] --
3,400,642 UART: [state] Locking Datavault
3,401,793 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,397 UART: [state] Locking ICCM
3,402,817 UART: [exit] Launching FMC @ 0x40000130
3,408,146 UART:
3,408,162 UART: Running Caliptra FMC ...
3,408,570 UART:
3,408,713 UART: [state] CFI Enabled
3,419,679 UART: [fht] FMC Alias Private Key: 7
3,527,239 UART: [art] Extend RT PCRs Done
3,527,667 UART: [art] Lock RT PCRs Done
3,529,049 UART: [art] Populate DV Done
3,537,297 UART: [fht] FMC Alias Private Key: 7
3,538,309 UART: [art] Derive CDI
3,538,589 UART: [art] Store in in slot 0x4
3,624,338 UART: [art] Derive Key Pair
3,624,698 UART: [art] Store priv key in slot 0x5
3,638,524 UART: [art] Derive Key Pair - Done
3,653,395 UART: [art] Signing Cert with AUTHO
3,653,875 UART: RITY.KEYID = 7
3,669,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,824 UART: [art] PUB.X = 745579056D0D56A8AE56121FD56B9EEEBFC7120D134691CD092E0B02B55A05B7FC9ADF528920FBB709910E9D71A153EE
3,676,575 UART: [art] PUB.Y = 943F814FCE34FCA4F93B365A07D8578E592DACDFEA9962EA55C60613C5C1F1C149AF125DEF011CF3A39DBD30AE682513
3,683,532 UART: [art] SIG.R = DE132AB1AC7F89E5B57F29BDBBF36436C15A62CFA68BE2969AC44036C20CDFEF158F60E69D92B06ABCFEFB228C3F824B
3,690,325 UART: [art] SIG.S = D18137BFC85BD918FA488791A51AB5B3062B9A1A478ADE24261BBA037FC9D25D1A0502BFF928EE8A86D75446781B8664
3,713,696 UART: Caliptra RT
3,714,041 UART: [state] CFI Enabled
3,822,350 UART: [rt] RT listening for mailbox commands...
3,823,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,028 UART: [rt]cmd =0x41544d4e, len=14344
3,947,584 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,807 ready_for_fw is high
1,055,807 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,045 >>> mbox cmd response: success
3,229,808 UART:
3,229,824 UART: Running Caliptra FMC ...
3,230,232 UART:
3,230,375 UART: [state] CFI Enabled
3,240,815 UART: [fht] FMC Alias Private Key: 7
3,348,907 UART: [art] Extend RT PCRs Done
3,349,335 UART: [art] Lock RT PCRs Done
3,350,765 UART: [art] Populate DV Done
3,358,883 UART: [fht] FMC Alias Private Key: 7
3,360,027 UART: [art] Derive CDI
3,360,307 UART: [art] Store in in slot 0x4
3,445,876 UART: [art] Derive Key Pair
3,446,236 UART: [art] Store priv key in slot 0x5
3,459,878 UART: [art] Derive Key Pair - Done
3,474,535 UART: [art] Signing Cert with AUTHO
3,475,015 UART: RITY.KEYID = 7
3,489,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,598 UART: [art] PUB.X = D24D075F8D01ED8F05ECED08CFE5EF889E433B21D3A148F92DC90A90F72D74360FB337B04E54FAF9C67D853EBE06C113
3,497,363 UART: [art] PUB.Y = 6B60CF7EE0A3C937E1FDF5F50CB75997AF64D1C9F74443F7BFFED8850188663996E8081420BBCDEDFA41A081A852F5D7
3,504,318 UART: [art] SIG.R = DE52480D1A0770618E342EB9DDB4B2013159F36340127BEEF37D5FC558A863D347693A67982500C6BBB802C4F72CFCA1
3,511,056 UART: [art] SIG.S = EAE178DED65D8B24C82CAD63C6228CB056A52D42CF81DC9135DB248F71BFB0A787EDDF96295EA585FF4B30AE3CE3A6E3
3,534,831 UART: Caliptra RT
3,535,176 UART: [state] CFI Enabled
3,643,369 UART: [rt] RT listening for mailbox commands...
3,644,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,091 UART: [rt]cmd =0x41544d4e, len=14344
3,768,387 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,137 UART:
192,509 UART: Running Caliptra ROM ...
193,691 UART:
193,848 UART: [state] CFI Enabled
265,170 UART: [state] LifecycleState = Unprovisioned
267,136 UART: [state] DebugLocked = No
269,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,447 UART: [kat] SHA2-256
443,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,668 UART: [kat] ++
454,195 UART: [kat] sha1
465,292 UART: [kat] SHA2-256
468,008 UART: [kat] SHA2-384
474,436 UART: [kat] SHA2-512-ACC
476,799 UART: [kat] ECC-384
2,766,588 UART: [kat] HMAC-384Kdf
2,798,152 UART: [kat] LMS
3,988,502 UART: [kat] --
3,995,150 UART: [cold-reset] ++
3,997,015 UART: [fht] Storing FHT @ 0x50003400
4,009,264 UART: [idev] ++
4,009,844 UART: [idev] CDI.KEYID = 6
4,010,779 UART: [idev] SUBJECT.KEYID = 7
4,011,968 UART: [idev] UDS.KEYID = 0
4,013,039 ready_for_fw is high
4,013,247 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,638 UART: [idev] Erasing UDS.KEYID = 0
7,345,350 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,531 UART: [idev] --
7,372,368 UART: [ldev] ++
7,372,945 UART: [ldev] CDI.KEYID = 6
7,373,911 UART: [ldev] SUBJECT.KEYID = 5
7,375,126 UART: [ldev] AUTHORITY.KEYID = 7
7,376,378 UART: [ldev] FE.KEYID = 1
7,419,647 UART: [ldev] Erasing FE.KEYID = 1
10,750,052 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,337 UART: [ldev] --
13,133,725 UART: [fwproc] Waiting for Commands...
13,136,854 UART: [fwproc] Received command 0x46574c44
13,139,038 UART: [fwproc] Received Image of size 114124 bytes
22,090,440 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,163,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,232,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,549,748 >>> mbox cmd response: success
22,553,144 UART: [afmc] ++
22,553,765 UART: [afmc] CDI.KEYID = 6
22,554,692 UART: [afmc] SUBJECT.KEYID = 7
22,555,913 UART: [afmc] AUTHORITY.KEYID = 5
25,931,922 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,231,018 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,233,288 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,247,859 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,262,577 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,276,789 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,298,962 UART: [afmc] --
28,301,970 UART: [cold-reset] --
28,306,050 UART: [state] Locking Datavault
28,310,058 UART: [state] Locking PCR0, PCR1 and PCR31
28,311,758 UART: [state] Locking ICCM
28,313,429 UART: [exit] Launching FMC @ 0x40000130
28,321,833 UART:
28,322,132 UART: Running Caliptra FMC ...
28,323,248 UART:
28,323,414 UART: [state] CFI Enabled
28,389,944 UART: [fht] FMC Alias Private Key: 7
30,727,448 UART: [art] Extend RT PCRs Done
30,728,675 UART: [art] Lock RT PCRs Done
30,730,298 UART: [art] Populate DV Done
30,735,827 UART: [fht] FMC Alias Private Key: 7
30,737,318 UART: [art] Derive CDI
30,738,083 UART: [art] Store in in slot 0x4
30,797,626 UART: [art] Derive Key Pair
30,798,667 UART: [art] Store priv key in slot 0x5
34,091,694 UART: [art] Derive Key Pair - Done
34,104,648 UART: [art] Signing Cert with AUTHO
34,105,955 UART: RITY.KEYID = 7
36,394,125 UART: [art] Erasing AUTHORITY.KEYID = 7
36,395,662 UART: [art] PUB.X = 26F937D4479040E94D9AE19ABF084EE570D2680AA9458B9C8545713AB553C96F3C8EF557D17C1285CA6FC8CAADAA6378
36,402,935 UART: [art] PUB.Y = BAFBF33DC8069D3D0853F02C7AD24E0A96C95E0673C0D352A186AFE9EDC073A32B96D32268047CA996451A725A7DBB90
36,410,119 UART: [art] SIG.R = F5D58F941EC69502B9E0E28E4A3E5B43A78039C9CF976269A1BFB12FD78624098B5EDF4AA64C6BD14E0A022883BA252F
36,417,518 UART: [art] SIG.S = B42C0A517633B543F5BB654933F366DB61FC93632E6114A4143A2F84289C4DAE8D246C27DECBAC21732B3CE2AE721F0B
37,723,253 UART: Caliptra RT
37,723,967 UART: [state] CFI Enabled
37,885,445 UART: [rt] RT listening for mailbox commands...
37,887,779 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,042,977 UART: [rt]cmd =0x41544d4e, len=14344
38,044,899 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,782,025 ready_for_fw is high
3,782,495 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,619,368 >>> mbox cmd response: success
27,334,164 UART:
27,334,550 UART: Running Caliptra FMC ...
27,335,681 UART:
27,335,839 UART: [state] CFI Enabled
27,386,887 UART: [fht] FMC Alias Private Key: 7
29,724,381 UART: [art] Extend RT PCRs Done
29,725,617 UART: [art] Lock RT PCRs Done
29,727,306 UART: [art] Populate DV Done
29,732,782 UART: [fht] FMC Alias Private Key: 7
29,734,429 UART: [art] Derive CDI
29,735,243 UART: [art] Store in in slot 0x4
29,796,086 UART: [art] Derive Key Pair
29,797,131 UART: [art] Store priv key in slot 0x5
33,089,718 UART: [art] Derive Key Pair - Done
33,102,609 UART: [art] Signing Cert with AUTHO
33,103,907 UART: RITY.KEYID = 7
35,391,961 UART: [art] Erasing AUTHORITY.KEYID = 7
35,393,462 UART: [art] PUB.X = 499F88FEE533951729D927EAB6BE0B3BC976CAAE088A95E82883641DA0EBEBE74B58AF5464C372869C20749FC0D398EA
35,400,725 UART: [art] PUB.Y = D4438200BA74AE574BDCF0D58D1DE3FE68EF5CBBDCB7097468EEE644A515DA44ED1E9745C55514CA84FF594B7AF2F9EB
35,408,016 UART: [art] SIG.R = 66335BD4D8922E1E686A6FB100E46DC72F5D3BCF4F79A7849E376E40D17C14D038E21B7F3021C6CAD286F3198562C2FA
35,415,389 UART: [art] SIG.S = 7031565A2846D4FBEE3F9C741126962D31187BA6FF0C7EAEFBB5E3FE10A481E473DC555E4D8906A0BC8FC627B4733851
36,720,747 UART: Caliptra RT
36,721,470 UART: [state] CFI Enabled
36,883,012 UART: [rt] RT listening for mailbox commands...
36,885,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,040,668 UART: [rt]cmd =0x41544d4e, len=14344
37,042,696 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,313 UART:
192,675 UART: Running Caliptra ROM ...
193,880 UART:
603,379 UART: [state] CFI Enabled
615,980 UART: [state] LifecycleState = Unprovisioned
617,935 UART: [state] DebugLocked = No
620,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,740 UART: [kat] SHA2-256
794,522 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,067 UART: [kat] ++
805,519 UART: [kat] sha1
816,597 UART: [kat] SHA2-256
819,316 UART: [kat] SHA2-384
825,800 UART: [kat] SHA2-512-ACC
828,164 UART: [kat] ECC-384
3,110,790 UART: [kat] HMAC-384Kdf
3,122,531 UART: [kat] LMS
4,312,650 UART: [kat] --
4,318,232 UART: [cold-reset] ++
4,319,955 UART: [fht] Storing FHT @ 0x50003400
4,331,926 UART: [idev] ++
4,332,484 UART: [idev] CDI.KEYID = 6
4,333,430 UART: [idev] SUBJECT.KEYID = 7
4,334,666 UART: [idev] UDS.KEYID = 0
4,335,658 ready_for_fw is high
4,335,863 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,176 UART: [idev] Erasing UDS.KEYID = 0
7,621,661 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,590 UART: [idev] --
7,649,009 UART: [ldev] ++
7,649,577 UART: [ldev] CDI.KEYID = 6
7,650,540 UART: [ldev] SUBJECT.KEYID = 5
7,651,748 UART: [ldev] AUTHORITY.KEYID = 7
7,653,035 UART: [ldev] FE.KEYID = 1
7,664,491 UART: [ldev] Erasing FE.KEYID = 1
10,950,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,419 UART: [ldev] --
13,308,463 UART: [fwproc] Waiting for Commands...
13,310,338 UART: [fwproc] Received command 0x46574c44
13,312,515 UART: [fwproc] Received Image of size 114124 bytes
21,947,887 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,028,962 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,097,815 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,415,318 >>> mbox cmd response: success
22,418,841 UART: [afmc] ++
22,419,439 UART: [afmc] CDI.KEYID = 6
22,420,376 UART: [afmc] SUBJECT.KEYID = 7
22,421,638 UART: [afmc] AUTHORITY.KEYID = 5
25,737,728 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,033,805 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,036,076 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,050,649 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,065,367 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,079,647 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,100,152 UART: [afmc] --
28,103,964 UART: [cold-reset] --
28,109,615 UART: [state] Locking Datavault
28,115,779 UART: [state] Locking PCR0, PCR1 and PCR31
28,117,532 UART: [state] Locking ICCM
28,118,977 UART: [exit] Launching FMC @ 0x40000130
28,127,373 UART:
28,127,611 UART: Running Caliptra FMC ...
28,128,709 UART:
28,128,863 UART: [state] CFI Enabled
28,137,259 UART: [fht] FMC Alias Private Key: 7
30,467,869 UART: [art] Extend RT PCRs Done
30,469,080 UART: [art] Lock RT PCRs Done
30,470,764 UART: [art] Populate DV Done
30,476,114 UART: [fht] FMC Alias Private Key: 7
30,477,619 UART: [art] Derive CDI
30,478,382 UART: [art] Store in in slot 0x4
30,520,915 UART: [art] Derive Key Pair
30,521,910 UART: [art] Store priv key in slot 0x5
33,764,128 UART: [art] Derive Key Pair - Done
33,777,336 UART: [art] Signing Cert with AUTHO
33,778,630 UART: RITY.KEYID = 7
36,058,229 UART: [art] Erasing AUTHORITY.KEYID = 7
36,059,735 UART: [art] PUB.X = EFD53A4FBE013E931870FFE189F522A8A34BAE896C60CF7CC05D6D11EE822DD5273A92640DCF83072937B004B6917F78
36,066,994 UART: [art] PUB.Y = 8E263EF1DF424D25B7293B9CB79068ADC8120F09E479AFF878C263BC929D3E97F102A95997C5776D4F37C3A2D736B62A
36,074,240 UART: [art] SIG.R = 5F801A77312E0A023B0FA443DE1AF50F4EF0D2F5E2D850B92987E31068FF843F12BCE147A4C72974BBF80AA316286E28
36,081,630 UART: [art] SIG.S = 01DEB4332119D8DC91C5CE2BFE4569862853A325A0FB733E4CE3C29402482ADA20E243E6332683145BA04AA739E64916
37,386,387 UART: Caliptra RT
37,387,100 UART: [state] CFI Enabled
37,504,537 UART: [rt] RT listening for mailbox commands...
37,506,828 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,662,193 UART: [rt]cmd =0x41544d4e, len=14344
37,663,940 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
4,129,711 ready_for_fw is high
4,130,113 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,253,207 >>> mbox cmd response: success
27,895,813 UART:
27,896,200 UART: Running Caliptra FMC ...
27,897,300 UART:
27,897,447 UART: [state] CFI Enabled
27,905,558 UART: [fht] FMC Alias Private Key: 7
30,236,029 UART: [art] Extend RT PCRs Done
30,237,251 UART: [art] Lock RT PCRs Done
30,238,894 UART: [art] Populate DV Done
30,244,163 UART: [fht] FMC Alias Private Key: 7
30,245,651 UART: [art] Derive CDI
30,246,377 UART: [art] Store in in slot 0x4
30,289,301 UART: [art] Derive Key Pair
30,290,342 UART: [art] Store priv key in slot 0x5
33,532,487 UART: [art] Derive Key Pair - Done
33,545,488 UART: [art] Signing Cert with AUTHO
33,546,793 UART: RITY.KEYID = 7
35,826,361 UART: [art] Erasing AUTHORITY.KEYID = 7
35,827,868 UART: [art] PUB.X = B93476534C35D943CEC5846EC43B2639B4179BDAFDD9C818EE4443249A958930E72256E1633522CDC602A5CDB9300647
35,835,106 UART: [art] PUB.Y = E9A53C80E1B2C7D4479644DA4DAF2ABBA876F13481F6D31DBB2F636C66DD935AE5F7FB366E65374F79561C998D8A9330
35,842,355 UART: [art] SIG.R = 422350BF845E9A9DEA9EC372D941B5A5D1585E73D39B8623F836F72D6F7C77CEC603985E85F0DACECCD0AB2D6567A8BC
35,849,735 UART: [art] SIG.S = 499458B432B383C7D89EC3C2838BFF5A1CD01577052EF81AC39DA3B93757F4FE7CCCB4FE6BB72481C13EA4ABFCA179A8
37,155,447 UART: Caliptra RT
37,156,155 UART: [state] CFI Enabled
37,273,831 UART: [rt] RT listening for mailbox commands...
37,276,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,431,553 UART: [rt]cmd =0x41544d4e, len=14344
37,433,356 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,217 UART:
192,595 UART: Running Caliptra ROM ...
193,796 UART:
193,946 UART: [state] CFI Enabled
264,303 UART: [state] LifecycleState = Unprovisioned
266,145 UART: [state] DebugLocked = No
268,890 UART: [state] WD Timer not started. Device not locked for debugging
272,496 UART: [kat] SHA2-256
451,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,172 UART: [kat] ++
463,699 UART: [kat] sha1
473,758 UART: [kat] SHA2-256
476,817 UART: [kat] SHA2-384
482,244 UART: [kat] SHA2-512-ACC
485,185 UART: [kat] ECC-384
2,950,639 UART: [kat] HMAC-384Kdf
2,972,399 UART: [kat] LMS
3,501,844 UART: [kat] --
3,508,258 UART: [cold-reset] ++
3,509,618 UART: [fht] FHT @ 0x50003400
3,520,128 UART: [idev] ++
3,520,703 UART: [idev] CDI.KEYID = 6
3,521,594 UART: [idev] SUBJECT.KEYID = 7
3,522,835 UART: [idev] UDS.KEYID = 0
3,523,734 ready_for_fw is high
3,523,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,815 UART: [idev] Erasing UDS.KEYID = 0
6,025,483 UART: [idev] Sha1 KeyId Algorithm
6,049,964 UART: [idev] --
6,052,550 UART: [ldev] ++
6,053,119 UART: [ldev] CDI.KEYID = 6
6,054,036 UART: [ldev] SUBJECT.KEYID = 5
6,055,202 UART: [ldev] AUTHORITY.KEYID = 7
6,056,458 UART: [ldev] FE.KEYID = 1
6,100,710 UART: [ldev] Erasing FE.KEYID = 1
8,606,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,872 UART: [ldev] --
10,412,751 UART: [fwproc] Wait for Commands...
10,415,007 UART: [fwproc] Recv command 0x46574c44
10,417,103 UART: [fwproc] Recv'd Img size: 114448 bytes
15,002,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,080,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,148,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,466,515 >>> mbox cmd response: success
15,471,452 UART: [afmc] ++
15,472,062 UART: [afmc] CDI.KEYID = 6
15,472,978 UART: [afmc] SUBJECT.KEYID = 7
15,474,140 UART: [afmc] AUTHORITY.KEYID = 5
18,004,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,726,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,728,554 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,744,471 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,760,444 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,776,233 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,799,391 UART: [afmc] --
19,802,662 UART: [cold-reset] --
19,806,519 UART: [state] Locking Datavault
19,811,978 UART: [state] Locking PCR0, PCR1 and PCR31
19,813,672 UART: [state] Locking ICCM
19,815,013 UART: [exit] Launching FMC @ 0x40000130
19,823,417 UART:
19,823,671 UART: Running Caliptra FMC ...
19,824,773 UART:
19,824,936 UART: [state] CFI Enabled
19,886,161 UART: [fht] FMC Alias Private Key: 7
21,650,652 UART: [art] Extend RT PCRs Done
21,651,864 UART: [art] Lock RT PCRs Done
21,653,624 UART: [art] Populate DV Done
21,659,040 UART: [fht] FMC Alias Private Key: 7
21,660,524 UART: [art] Derive CDI
21,661,287 UART: [art] Store in in slot 0x4
21,720,322 UART: [art] Derive Key Pair
21,721,363 UART: [art] Store priv key in slot 0x5
24,184,547 UART: [art] Derive Key Pair - Done
24,197,594 UART: [art] Signing Cert with AUTHO
24,198,886 UART: RITY.KEYID = 7
25,910,109 UART: [art] Erasing AUTHORITY.KEYID = 7
25,911,631 UART: [art] PUB.X = F5A4DAA4799BA6B37FF798C68DBA7A441A25B02B57CB78591C492B4467124A5D7230214572E0756052F3F6F72920F29A
25,918,728 UART: [art] PUB.Y = 3594A6F83A247D0FE6C3D608DD5C4711ED0A106C6A00B8650CAAEE092F173FC75221190A8445AFF53BBF166F71E11860
25,925,964 UART: [art] SIG.R = C0CC05BA2A85C333E8166FEB78703CCA37741C8E3683B99C796F18F17D5045E624C818EAAC55CE86C4E54F364DF6EADA
25,933,367 UART: [art] SIG.S = 75DA5D9503A8A632F654AA0D5E73899E030C3AA031F12DFFAA304B9415215CEBBC6E76AD9C72F7CC171435CA234CFE79
26,912,387 UART: Caliptra RT
26,913,073 UART: [state] CFI Enabled
27,077,459 UART: [rt] RT listening for mailbox commands...
27,079,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,235,539 UART: [rt]cmd =0x41544d4e, len=14344
27,237,364 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,360,231 ready_for_fw is high
3,360,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,036,764 >>> mbox cmd response: success
19,321,148 UART:
19,321,537 UART: Running Caliptra FMC ...
19,322,641 UART:
19,322,795 UART: [state] CFI Enabled
19,373,176 UART: [fht] FMC Alias Private Key: 7
21,136,741 UART: [art] Extend RT PCRs Done
21,137,957 UART: [art] Lock RT PCRs Done
21,139,608 UART: [art] Populate DV Done
21,144,828 UART: [fht] FMC Alias Private Key: 7
21,146,477 UART: [art] Derive CDI
21,147,292 UART: [art] Store in in slot 0x4
21,205,323 UART: [art] Derive Key Pair
21,206,385 UART: [art] Store priv key in slot 0x5
23,669,529 UART: [art] Derive Key Pair - Done
23,682,200 UART: [art] Signing Cert with AUTHO
23,683,538 UART: RITY.KEYID = 7
25,394,582 UART: [art] Erasing AUTHORITY.KEYID = 7
25,396,091 UART: [art] PUB.X = 9480DCA8833338A6E2D0A4EEC64E2E2EF1A0A681274EE4A20CF6053B5344A9D55F116168168F97E3BC652AC97634763A
25,403,343 UART: [art] PUB.Y = 4F79273CD9F979076B0DB36CC7B9B8EB23CBBCCED68C3B779783E405A19D31AEEB691EF7BD44DBFB0E5B091553C3032F
25,410,654 UART: [art] SIG.R = DAA5E30AD9C72B11AC214AC3C5FE62FD4FB33BD11CF1509256ECBE88A9FE1036381E3C18BF1E0AFBC6F115A8E49F475A
25,418,054 UART: [art] SIG.S = BDC72578D20D189025311CE5917D61C6F7C9A227185BBCFFF5DC4127125E07DA0595CA2E0113A1F1FB6006AC44BF76FD
26,397,274 UART: Caliptra RT
26,397,988 UART: [state] CFI Enabled
26,562,413 UART: [rt] RT listening for mailbox commands...
26,564,705 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,720,606 UART: [rt]cmd =0x41544d4e, len=14344
26,722,532 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,350 UART:
192,735 UART: Running Caliptra ROM ...
193,882 UART:
603,434 UART: [state] CFI Enabled
614,402 UART: [state] LifecycleState = Unprovisioned
616,268 UART: [state] DebugLocked = No
618,074 UART: [state] WD Timer not started. Device not locked for debugging
621,600 UART: [kat] SHA2-256
800,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,296 UART: [kat] ++
812,826 UART: [kat] sha1
825,260 UART: [kat] SHA2-256
828,250 UART: [kat] SHA2-384
834,622 UART: [kat] SHA2-512-ACC
837,388 UART: [kat] ECC-384
3,278,449 UART: [kat] HMAC-384Kdf
3,290,178 UART: [kat] LMS
3,819,734 UART: [kat] --
3,826,854 UART: [cold-reset] ++
3,829,061 UART: [fht] FHT @ 0x50003400
3,839,175 UART: [idev] ++
3,839,726 UART: [idev] CDI.KEYID = 6
3,840,671 UART: [idev] SUBJECT.KEYID = 7
3,841,898 UART: [idev] UDS.KEYID = 0
3,842,787 ready_for_fw is high
3,842,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,719 UART: [idev] Erasing UDS.KEYID = 0
6,315,069 UART: [idev] Sha1 KeyId Algorithm
6,336,461 UART: [idev] --
6,340,287 UART: [ldev] ++
6,340,847 UART: [ldev] CDI.KEYID = 6
6,341,719 UART: [ldev] SUBJECT.KEYID = 5
6,342,920 UART: [ldev] AUTHORITY.KEYID = 7
6,344,202 UART: [ldev] FE.KEYID = 1
6,354,057 UART: [ldev] Erasing FE.KEYID = 1
8,825,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,267 UART: [ldev] --
10,614,123 UART: [fwproc] Wait for Commands...
10,616,483 UART: [fwproc] Recv command 0x46574c44
10,618,567 UART: [fwproc] Recv'd Img size: 114448 bytes
15,198,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,279,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,348,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,666,448 >>> mbox cmd response: success
15,670,441 UART: [afmc] ++
15,671,030 UART: [afmc] CDI.KEYID = 6
15,671,946 UART: [afmc] SUBJECT.KEYID = 7
15,673,159 UART: [afmc] AUTHORITY.KEYID = 5
18,172,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,894,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,895,914 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,911,859 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,927,878 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,943,665 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,966,782 UART: [afmc] --
19,970,651 UART: [cold-reset] --
19,972,993 UART: [state] Locking Datavault
19,977,750 UART: [state] Locking PCR0, PCR1 and PCR31
19,979,400 UART: [state] Locking ICCM
19,982,083 UART: [exit] Launching FMC @ 0x40000130
19,990,481 UART:
19,990,709 UART: Running Caliptra FMC ...
19,991,802 UART:
19,991,958 UART: [state] CFI Enabled
20,000,000 UART: [fht] FMC Alias Private Key: 7
21,756,964 UART: [art] Extend RT PCRs Done
21,758,193 UART: [art] Lock RT PCRs Done
21,759,600 UART: [art] Populate DV Done
21,764,915 UART: [fht] FMC Alias Private Key: 7
21,766,468 UART: [art] Derive CDI
21,767,279 UART: [art] Store in in slot 0x4
21,809,988 UART: [art] Derive Key Pair
21,811,030 UART: [art] Store priv key in slot 0x5
24,237,765 UART: [art] Derive Key Pair - Done
24,250,332 UART: [art] Signing Cert with AUTHO
24,251,629 UART: RITY.KEYID = 7
25,957,295 UART: [art] Erasing AUTHORITY.KEYID = 7
25,958,803 UART: [art] PUB.X = 0AE0080C1B9C36285D53EB5B07F1CA518E054F9744F9E91C4EC89944B0E137C593FBDE7DE3E2906B7DC81EBEB8ADB8C5
25,966,086 UART: [art] PUB.Y = 37E6F81E184679F2EBD5F054A57E783B64727054CAB1B2A2EB7F27B3CE5D64C4198CA2004E7EDDF4DE0D853827498E9A
25,973,351 UART: [art] SIG.R = 60ED3488197A7608331F86CDF1F1523A99C50BE6828C89BDBF87697700FC4FEC7BE1A8BED63B80C9A4AC321C5FB7A2A6
25,980,732 UART: [art] SIG.S = B24227A9BD36349F99531C4011E00D9332D784961B87434344673C67366B011F7117032749459E98C1E5223E50834EC2
26,958,886 UART: Caliptra RT
26,959,572 UART: [state] CFI Enabled
27,077,884 UART: [rt] RT listening for mailbox commands...
27,080,208 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,235,148 UART: [rt]cmd =0x41544d4e, len=14344
27,237,072 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,689,503 ready_for_fw is high
3,689,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,261,280 >>> mbox cmd response: success
19,517,604 UART:
19,517,991 UART: Running Caliptra FMC ...
19,519,081 UART:
19,519,253 UART: [state] CFI Enabled
19,527,100 UART: [fht] FMC Alias Private Key: 7
21,283,925 UART: [art] Extend RT PCRs Done
21,285,159 UART: [art] Lock RT PCRs Done
21,286,918 UART: [art] Populate DV Done
21,292,310 UART: [fht] FMC Alias Private Key: 7
21,293,805 UART: [art] Derive CDI
21,294,564 UART: [art] Store in in slot 0x4
21,337,682 UART: [art] Derive Key Pair
21,338,749 UART: [art] Store priv key in slot 0x5
23,765,103 UART: [art] Derive Key Pair - Done
23,778,054 UART: [art] Signing Cert with AUTHO
23,779,357 UART: RITY.KEYID = 7
25,484,950 UART: [art] Erasing AUTHORITY.KEYID = 7
25,486,448 UART: [art] PUB.X = 18CF3170B07D6F33E27E59687B4BA0151DE596E360F21321919139B830CBC45064A12B041A415039BA3F5555F9ABCF9D
25,493,675 UART: [art] PUB.Y = F9DB5E26113AE3A036EF06D8F6AAA70AF2E96011F52461045AF714B10C5A9C75346D33634483D36EB8BB694E2C651CA5
25,500,923 UART: [art] SIG.R = 6F71273BD914FD2AE02DCF4A3D5709E6BFA8EA598E19E69E3790EA5CA35835D1BDB67C505736BB7F3600AEEB4F4E6792
25,508,320 UART: [art] SIG.S = 99F5FDF9B496E366C65E523FA8F7C10D63E8F3D66BF0D0E32B48019246AFB1BB4EA27B30BCEFD50B7B8BCFDA8AB26B26
26,487,349 UART: Caliptra RT
26,488,050 UART: [state] CFI Enabled
26,605,662 UART: [rt] RT listening for mailbox commands...
26,607,954 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,763,038 UART: [rt]cmd =0x41544d4e, len=14344
26,764,848 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,442,340 ready_for_fw is high
3,442,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,874,818 >>> mbox cmd response: success
20,161,607 UART:
20,161,982 UART: Running Caliptra FMC ...
20,163,109 UART:
20,163,269 UART: [state] CFI Enabled
20,227,419 UART: [fht] FMC Alias Private Key: 7
21,991,292 UART: [art] Extend RT PCRs Done
21,992,528 UART: [art] Lock RT PCRs Done
21,994,373 UART: [art] Populate DV Done
21,999,615 UART: [fht] FMC Alias Private Key: 7
22,001,261 UART: [art] Derive CDI
22,002,083 UART: [art] Store in in slot 0x4
22,060,280 UART: [art] Derive Key Pair
22,061,329 UART: [art] Store priv key in slot 0x5
24,524,128 UART: [art] Derive Key Pair - Done
24,537,017 UART: [art] Signing Cert with AUTHO
24,538,327 UART: RITY.KEYID = 7
26,250,127 UART: [art] Erasing AUTHORITY.KEYID = 7
26,251,633 UART: [art] PUB.X = A93E2F040462EAADAD28CD44275A95FD1ED5AF27BAE3244B89C34DF9F99A876C00C7AF791CD904FD49A55C22879F904F
26,258,956 UART: [art] PUB.Y = 0F903A8C97A8747A672A168ED89B5D6283F8D80052DE8DF0F090B9BAF11130EA8E40F7C71788320F93D6D118FA01750C
26,266,127 UART: [art] SIG.R = 19802FF85376A4552CA55A11BF51F2FC40DED3B40AF0951DB36153AF0E308A390D296C2E4EECCAA972B9628BB15482C5
26,273,529 UART: [art] SIG.S = F4168C97BA48A61D5AEA82C87EB21C4FFEEDC35F2C34F3F5B5AAB4F870D23E1A5CA338B22F7F918F788B2530E50890A7
27,252,747 UART: Caliptra RT
27,253,453 UART: [state] CFI Enabled
27,417,313 UART: [rt] RT listening for mailbox commands...
27,419,615 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,575,413 UART: [rt]cmd =0x41544d4e, len=14344
27,577,289 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,756,014 ready_for_fw is high
3,756,414 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,069,365 >>> mbox cmd response: success
20,321,656 UART:
20,322,043 UART: Running Caliptra FMC ...
20,323,145 UART:
20,323,290 UART: [state] CFI Enabled
20,331,732 UART: [fht] FMC Alias Private Key: 7
22,088,699 UART: [art] Extend RT PCRs Done
22,089,916 UART: [art] Lock RT PCRs Done
22,091,454 UART: [art] Populate DV Done
22,096,859 UART: [fht] FMC Alias Private Key: 7
22,098,397 UART: [art] Derive CDI
22,099,125 UART: [art] Store in in slot 0x4
22,142,049 UART: [art] Derive Key Pair
22,143,118 UART: [art] Store priv key in slot 0x5
24,570,064 UART: [art] Derive Key Pair - Done
24,583,014 UART: [art] Signing Cert with AUTHO
24,584,320 UART: RITY.KEYID = 7
26,289,500 UART: [art] Erasing AUTHORITY.KEYID = 7
26,291,006 UART: [art] PUB.X = F163D992643C37E6A55DC6B5B8F8019F28574BCE060D6E48F451C810F6EE59CA207E713AAE6A5322C4D9F2F5551D4560
26,298,224 UART: [art] PUB.Y = 55E4970F686DF20E9D74FBAED89FB8ABD51DDC0978CE728DF966ACBA6D56BA3953B826AFA066A6DDC54F654A4EE5A1D2
26,305,575 UART: [art] SIG.R = C10F799B8AEE4B48D8017B50FD209C80AC0C84FB782CA832139E5A5C9AC52AD8E913F3E8C2A98928748B6B3BAA4680A2
26,312,963 UART: [art] SIG.S = D9C78B4BEA1DD02E03394565C04865186C2FED718FE6ABBFC8D0D5C3E99374AA9387F97CB3F45C310D383A26DDF84EB2
27,291,864 UART: Caliptra RT
27,292,556 UART: [state] CFI Enabled
27,409,573 UART: [rt] RT listening for mailbox commands...
27,411,857 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,567,272 UART: [rt]cmd =0x41544d4e, len=14344
27,569,289 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,347 UART: [kat] SHA2-256
892,285 UART: [kat] SHA2-384
894,878 UART: [kat] SHA2-512-ACC
896,779 UART: [kat] ECC-384
902,148 UART: [kat] HMAC-384Kdf
906,764 UART: [kat] LMS
1,474,960 UART: [kat] --
1,475,817 UART: [cold-reset] ++
1,476,185 UART: [fht] Storing FHT @ 0x50003400
1,478,944 UART: [idev] ++
1,479,112 UART: [idev] CDI.KEYID = 6
1,479,472 UART: [idev] SUBJECT.KEYID = 7
1,479,896 UART: [idev] UDS.KEYID = 0
1,480,241 ready_for_fw is high
1,480,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,048 UART: [idev] Erasing UDS.KEYID = 0
1,504,470 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,002 UART: [idev] --
1,514,149 UART: [ldev] ++
1,514,317 UART: [ldev] CDI.KEYID = 6
1,514,680 UART: [ldev] SUBJECT.KEYID = 5
1,515,106 UART: [ldev] AUTHORITY.KEYID = 7
1,515,569 UART: [ldev] FE.KEYID = 1
1,520,655 UART: [ldev] Erasing FE.KEYID = 1
1,545,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,878 UART: [ldev] --
1,585,299 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114448 bytes
5,272,033 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,300,643 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,329,995 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,466,074 >>> mbox cmd response: success
5,467,236 UART: [afmc] ++
5,467,404 UART: [afmc] CDI.KEYID = 6
5,467,766 UART: [afmc] SUBJECT.KEYID = 7
5,468,191 UART: [afmc] AUTHORITY.KEYID = 5
5,503,269 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,519,789 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,520,569 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,526,278 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,532,170 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,537,871 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,545,793 UART: [afmc] --
5,546,845 UART: [cold-reset] --
5,547,801 UART: [state] Locking Datavault
5,549,072 UART: [state] Locking PCR0, PCR1 and PCR31
5,549,676 UART: [state] Locking ICCM
5,550,256 UART: [exit] Launching FMC @ 0x40000130
5,555,585 UART:
5,555,601 UART: Running Caliptra FMC ...
5,556,009 UART:
5,556,063 UART: [state] CFI Enabled
5,566,693 UART: [fht] FMC Alias Private Key: 7
5,673,999 UART: [art] Extend RT PCRs Done
5,674,427 UART: [art] Lock RT PCRs Done
5,675,853 UART: [art] Populate DV Done
5,684,149 UART: [fht] FMC Alias Private Key: 7
5,685,259 UART: [art] Derive CDI
5,685,539 UART: [art] Store in in slot 0x4
5,771,532 UART: [art] Derive Key Pair
5,771,892 UART: [art] Store priv key in slot 0x5
5,785,254 UART: [art] Derive Key Pair - Done
5,799,927 UART: [art] Signing Cert with AUTHO
5,800,407 UART: RITY.KEYID = 7
5,815,339 UART: [art] Erasing AUTHORITY.KEYID = 7
5,816,104 UART: [art] PUB.X = 97712BEE32A33722C0148AC2B8BBA6EF198FDE328FDEC430315D3FC6B282B030116E9FE0CD53A1994DC4B393ACF2ADC5
5,822,892 UART: [art] PUB.Y = 041D80DB1C45A4C74EF24D40D0B624BBFE39BA25F24237258C2DF562B2C96E7833C4963CD88F10EB0200745FCD9E58E9
5,829,822 UART: [art] SIG.R = 9D3F8424AE40196D11F72010AEEBD50451272A759769450DEAA19FAC780AE8EABF4CB15C7EE56B13C8EBA365A1A89ECF
5,836,601 UART: [art] SIG.S = BB2730BE8040997DECE9B42DC51ABF7FE9F184F4DE75F3779C02374ACD36B853597BC27950CF080423E5DBA724EB63F5
5,860,007 UART: Caliptra RT
5,860,260 UART: [state] CFI Enabled
5,967,908 UART: [rt] RT listening for mailbox commands...
5,968,578 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,091,944 UART: [rt]cmd =0x41544d4e, len=14344
6,093,270 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,977 ready_for_fw is high
1,361,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,316,414 >>> mbox cmd response: success
5,376,717 UART:
5,376,733 UART: Running Caliptra FMC ...
5,377,141 UART:
5,377,195 UART: [state] CFI Enabled
5,387,751 UART: [fht] FMC Alias Private Key: 7
5,495,221 UART: [art] Extend RT PCRs Done
5,495,649 UART: [art] Lock RT PCRs Done
5,497,359 UART: [art] Populate DV Done
5,505,583 UART: [fht] FMC Alias Private Key: 7
5,506,549 UART: [art] Derive CDI
5,506,829 UART: [art] Store in in slot 0x4
5,592,356 UART: [art] Derive Key Pair
5,592,716 UART: [art] Store priv key in slot 0x5
5,605,230 UART: [art] Derive Key Pair - Done
5,620,165 UART: [art] Signing Cert with AUTHO
5,620,645 UART: RITY.KEYID = 7
5,635,875 UART: [art] Erasing AUTHORITY.KEYID = 7
5,636,640 UART: [art] PUB.X = 1224FBDEC042D5E43FA7B8594C270E77FC9A1D356AFF8DC9A8B6CE368D805DE415A62263EDC2D43732DF577F0A5465EE
5,643,420 UART: [art] PUB.Y = 04E0A2938637F688E15E42BCA57E42DF9426F28801F73BA50364CC4EF44ADB3D743B206E480BF741399DCB4B140909E4
5,650,354 UART: [art] SIG.R = A1484CAD9D69B34C30634E81C10098292ADFD0B67E74A72F10218C0D393EC88240C90BB6298182251E439E910B13F2AC
5,657,091 UART: [art] SIG.S = 3C8E451251D03ADE21A1862E16E592BD57C044D4C96BE5D15E339F8E33D67CF1C44D195E593B80CD9D32E1FBDA6D89D7
5,680,470 UART: Caliptra RT
5,680,723 UART: [state] CFI Enabled
5,789,336 UART: [rt] RT listening for mailbox commands...
5,790,006 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,913,048 UART: [rt]cmd =0x41544d4e, len=14344
5,914,378 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,967 UART: [state] LifecycleState = Unprovisioned
86,622 UART: [state] DebugLocked = No
87,216 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,818 UART: [kat] SHA2-256
882,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,864 UART: [kat] ++
887,016 UART: [kat] sha1
891,402 UART: [kat] SHA2-256
893,340 UART: [kat] SHA2-384
896,083 UART: [kat] SHA2-512-ACC
897,984 UART: [kat] ECC-384
903,309 UART: [kat] HMAC-384Kdf
908,013 UART: [kat] LMS
1,476,209 UART: [kat] --
1,477,240 UART: [cold-reset] ++
1,477,568 UART: [fht] Storing FHT @ 0x50003400
1,480,525 UART: [idev] ++
1,480,693 UART: [idev] CDI.KEYID = 6
1,481,053 UART: [idev] SUBJECT.KEYID = 7
1,481,477 UART: [idev] UDS.KEYID = 0
1,481,822 ready_for_fw is high
1,481,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,741 UART: [idev] Erasing UDS.KEYID = 0
1,506,111 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,697 UART: [idev] --
1,515,918 UART: [ldev] ++
1,516,086 UART: [ldev] CDI.KEYID = 6
1,516,449 UART: [ldev] SUBJECT.KEYID = 5
1,516,875 UART: [ldev] AUTHORITY.KEYID = 7
1,517,338 UART: [ldev] FE.KEYID = 1
1,522,536 UART: [ldev] Erasing FE.KEYID = 1
1,548,655 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,775 UART: [ldev] --
1,588,194 UART: [fwproc] Waiting for Commands...
1,588,987 UART: [fwproc] Received command 0x46574c44
1,589,778 UART: [fwproc] Received Image of size 114448 bytes
5,313,499 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,341,699 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,371,051 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,507,214 >>> mbox cmd response: success
5,508,234 UART: [afmc] ++
5,508,402 UART: [afmc] CDI.KEYID = 6
5,508,764 UART: [afmc] SUBJECT.KEYID = 7
5,509,189 UART: [afmc] AUTHORITY.KEYID = 5
5,544,115 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,560,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,561,411 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,567,120 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,573,012 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,578,713 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,586,589 UART: [afmc] --
5,587,491 UART: [cold-reset] --
5,588,125 UART: [state] Locking Datavault
5,589,340 UART: [state] Locking PCR0, PCR1 and PCR31
5,589,944 UART: [state] Locking ICCM
5,590,532 UART: [exit] Launching FMC @ 0x40000130
5,595,861 UART:
5,595,877 UART: Running Caliptra FMC ...
5,596,285 UART:
5,596,428 UART: [state] CFI Enabled
5,606,970 UART: [fht] FMC Alias Private Key: 7
5,715,182 UART: [art] Extend RT PCRs Done
5,715,610 UART: [art] Lock RT PCRs Done
5,717,304 UART: [art] Populate DV Done
5,725,680 UART: [fht] FMC Alias Private Key: 7
5,726,630 UART: [art] Derive CDI
5,726,910 UART: [art] Store in in slot 0x4
5,812,753 UART: [art] Derive Key Pair
5,813,113 UART: [art] Store priv key in slot 0x5
5,827,043 UART: [art] Derive Key Pair - Done
5,841,846 UART: [art] Signing Cert with AUTHO
5,842,326 UART: RITY.KEYID = 7
5,857,518 UART: [art] Erasing AUTHORITY.KEYID = 7
5,858,283 UART: [art] PUB.X = 13615AE6F42824B2976AE15D6D77FE9D11485D3CE2D0C0FAF277894AC5122A0BC82606FB22EC2F618795F59420DED693
5,865,051 UART: [art] PUB.Y = 9E4E86EB482B7FE1ACE2F1216BDEFA95E05144601E4A7FC1DFDF2E4DA85FABDC9615042660DAAEB85B41CEBB59E3C2BC
5,872,030 UART: [art] SIG.R = 7C77282E40D6AEF9A72FEA75F1523689365983A7E4E8E4AC540BB69D63AF46A0B24D41C7963DEE19A51961A6001E70BE
5,878,781 UART: [art] SIG.S = DF38B49C50E980C041E4E973E67D9E6372767F58AA82F64E9CE0961C220BBFE5EDF08738349D18CA7DF1B176C5FD6EAA
5,902,609 UART: Caliptra RT
5,902,954 UART: [state] CFI Enabled
6,011,379 UART: [rt] RT listening for mailbox commands...
6,012,049 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,135,393 UART: [rt]cmd =0x41544d4e, len=14344
6,136,665 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,842 ready_for_fw is high
1,362,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,090,355 >>> mbox cmd response: success
5,152,772 UART:
5,152,788 UART: Running Caliptra FMC ...
5,153,196 UART:
5,153,339 UART: [state] CFI Enabled
5,163,673 UART: [fht] FMC Alias Private Key: 7
5,271,087 UART: [art] Extend RT PCRs Done
5,271,515 UART: [art] Lock RT PCRs Done
5,273,065 UART: [art] Populate DV Done
5,281,251 UART: [fht] FMC Alias Private Key: 7
5,282,425 UART: [art] Derive CDI
5,282,705 UART: [art] Store in in slot 0x4
5,368,542 UART: [art] Derive Key Pair
5,368,902 UART: [art] Store priv key in slot 0x5
5,381,626 UART: [art] Derive Key Pair - Done
5,396,465 UART: [art] Signing Cert with AUTHO
5,396,945 UART: RITY.KEYID = 7
5,412,155 UART: [art] Erasing AUTHORITY.KEYID = 7
5,412,920 UART: [art] PUB.X = DA716CD075BAFBE08470A06FEA1401894C9A8A95E55CF3BAAC716CE5D55D319051741AEEC657E5E97BBD66D2FAB1A4E0
5,419,709 UART: [art] PUB.Y = 6EA5D4ED04C83D6C70EF391D1E1261BE8BF236BBF961FEF3674ECDB0F9E8A7FF6D634527B7258672456FD0BC479534D7
5,426,670 UART: [art] SIG.R = E7C54AB9DACD9BF3AB10A859944E04103CB2EB0D787DD34CB4393D1F69E7C4E36BE97895FD54362FC2156633B012D2C1
5,433,446 UART: [art] SIG.S = B39CFA2133F8963738F56E2304F3D40101602D61C1B5DAD351788B339EA5C90635507C53AB9C70D2EB57CC9503DE08E8
5,457,017 UART: Caliptra RT
5,457,362 UART: [state] CFI Enabled
5,565,960 UART: [rt] RT listening for mailbox commands...
5,566,630 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,689,564 UART: [rt]cmd =0x41544d4e, len=14344
5,691,078 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,851 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
893,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,753 UART: [kat] ++
897,905 UART: [kat] sha1
902,165 UART: [kat] SHA2-256
904,105 UART: [kat] SHA2-384
906,886 UART: [kat] SHA2-512-ACC
908,787 UART: [kat] ECC-384
918,588 UART: [kat] HMAC-384Kdf
923,280 UART: [kat] LMS
1,171,608 UART: [kat] --
1,172,437 UART: [cold-reset] ++
1,172,927 UART: [fht] FHT @ 0x50003400
1,175,574 UART: [idev] ++
1,175,742 UART: [idev] CDI.KEYID = 6
1,176,102 UART: [idev] SUBJECT.KEYID = 7
1,176,526 UART: [idev] UDS.KEYID = 0
1,176,871 ready_for_fw is high
1,176,871 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,792 UART: [idev] Erasing UDS.KEYID = 0
1,201,675 UART: [idev] Sha1 KeyId Algorithm
1,210,119 UART: [idev] --
1,211,063 UART: [ldev] ++
1,211,231 UART: [ldev] CDI.KEYID = 6
1,211,594 UART: [ldev] SUBJECT.KEYID = 5
1,212,020 UART: [ldev] AUTHORITY.KEYID = 7
1,212,483 UART: [ldev] FE.KEYID = 1
1,217,737 UART: [ldev] Erasing FE.KEYID = 1
1,244,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,571 UART: [ldev] --
1,283,988 UART: [fwproc] Wait for Commands...
1,284,600 UART: [fwproc] Recv command 0x46574c44
1,285,328 UART: [fwproc] Recv'd Img size: 114448 bytes
3,133,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,326,002 >>> mbox cmd response: success
3,327,182 UART: [afmc] ++
3,327,350 UART: [afmc] CDI.KEYID = 6
3,327,712 UART: [afmc] SUBJECT.KEYID = 7
3,328,137 UART: [afmc] AUTHORITY.KEYID = 5
3,363,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,790 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,499 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,391 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,102 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,091 UART: [afmc] --
3,407,171 UART: [cold-reset] --
3,408,109 UART: [state] Locking Datavault
3,409,238 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,842 UART: [state] Locking ICCM
3,410,388 UART: [exit] Launching FMC @ 0x40000130
3,415,717 UART:
3,415,733 UART: Running Caliptra FMC ...
3,416,141 UART:
3,416,195 UART: [state] CFI Enabled
3,426,697 UART: [fht] FMC Alias Private Key: 7
3,534,991 UART: [art] Extend RT PCRs Done
3,535,419 UART: [art] Lock RT PCRs Done
3,536,957 UART: [art] Populate DV Done
3,545,143 UART: [fht] FMC Alias Private Key: 7
3,546,191 UART: [art] Derive CDI
3,546,471 UART: [art] Store in in slot 0x4
3,632,176 UART: [art] Derive Key Pair
3,632,536 UART: [art] Store priv key in slot 0x5
3,645,804 UART: [art] Derive Key Pair - Done
3,660,215 UART: [art] Signing Cert with AUTHO
3,660,695 UART: RITY.KEYID = 7
3,675,927 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,692 UART: [art] PUB.X = 5B0B41DF00186944AEFBC5E1F7E4EAFA1497277AA2CFF1B995C40C688C686BF97886B5C87C13F0510D1AA2B972928C42
3,683,441 UART: [art] PUB.Y = 5DDA2EB5327442B3ED58C9954F240BD1B4D1E050F9446130F548A7C4456F50D28ACCF3A11C1432FD9BDD3AC29EBCF2E6
3,690,404 UART: [art] SIG.R = E2CEBDB6803CC2E2686BA53DE3FED0B3000CE2302D91F92833C25F9DE042EE889678C6B9A6BC87A04B19CB4BD15ADFFD
3,697,173 UART: [art] SIG.S = 5A6325A8F6601BC2E729C3080C832B39C928095D79D3E45C40043BBDA7BA44051CD37CEC46460C05F9449AC45E924DFD
3,720,711 UART: Caliptra RT
3,720,964 UART: [state] CFI Enabled
3,827,914 UART: [rt] RT listening for mailbox commands...
3,828,584 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,104 UART: [rt]cmd =0x41544d4e, len=14344
3,953,508 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,897 ready_for_fw is high
1,059,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,173,712 >>> mbox cmd response: success
3,236,341 UART:
3,236,357 UART: Running Caliptra FMC ...
3,236,765 UART:
3,236,819 UART: [state] CFI Enabled
3,247,069 UART: [fht] FMC Alias Private Key: 7
3,354,705 UART: [art] Extend RT PCRs Done
3,355,133 UART: [art] Lock RT PCRs Done
3,356,979 UART: [art] Populate DV Done
3,365,439 UART: [fht] FMC Alias Private Key: 7
3,366,513 UART: [art] Derive CDI
3,366,793 UART: [art] Store in in slot 0x4
3,452,282 UART: [art] Derive Key Pair
3,452,642 UART: [art] Store priv key in slot 0x5
3,465,944 UART: [art] Derive Key Pair - Done
3,480,629 UART: [art] Signing Cert with AUTHO
3,481,109 UART: RITY.KEYID = 7
3,496,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,070 UART: [art] PUB.X = 06EEB9917C3AED7E0EAE8C5EC27EA80C0C1330D355503DEF7759E3C0CABED33176E399A3FBFA8BA42CBA6D8577365545
3,503,848 UART: [art] PUB.Y = 5357D0D8A907A0BDEF93FCD41182FBF896560F59C9BE3A5E950FE4F078894CE0986D16F924E6BFA8E3E2680DF1F540EE
3,510,800 UART: [art] SIG.R = 8EAD9079ABE32BF9BABA710B57DE2C6B09EB8135CF71EEC435A1FF1EE0C0E8A28F3C57E8D7EDF0BB527C51A609BBC442
3,517,591 UART: [art] SIG.S = 124DFD79222D0045CF79AAFE745DBDADF76FF4EF35F2A09BC44BB65855F32E21F3549EFB9847AB13E2AE2E8E1BD62DAA
3,540,872 UART: Caliptra RT
3,541,125 UART: [state] CFI Enabled
3,648,733 UART: [rt] RT listening for mailbox commands...
3,649,403 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,461 UART: [rt]cmd =0x41544d4e, len=14344
3,773,963 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
893,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,742 UART: [kat] ++
897,894 UART: [kat] sha1
902,166 UART: [kat] SHA2-256
904,106 UART: [kat] SHA2-384
906,889 UART: [kat] SHA2-512-ACC
908,790 UART: [kat] ECC-384
918,535 UART: [kat] HMAC-384Kdf
923,111 UART: [kat] LMS
1,171,439 UART: [kat] --
1,172,254 UART: [cold-reset] ++
1,172,800 UART: [fht] FHT @ 0x50003400
1,175,467 UART: [idev] ++
1,175,635 UART: [idev] CDI.KEYID = 6
1,175,995 UART: [idev] SUBJECT.KEYID = 7
1,176,419 UART: [idev] UDS.KEYID = 0
1,176,764 ready_for_fw is high
1,176,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,357 UART: [idev] Erasing UDS.KEYID = 0
1,202,110 UART: [idev] Sha1 KeyId Algorithm
1,210,484 UART: [idev] --
1,211,488 UART: [ldev] ++
1,211,656 UART: [ldev] CDI.KEYID = 6
1,212,019 UART: [ldev] SUBJECT.KEYID = 5
1,212,445 UART: [ldev] AUTHORITY.KEYID = 7
1,212,908 UART: [ldev] FE.KEYID = 1
1,218,138 UART: [ldev] Erasing FE.KEYID = 1
1,245,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,914 UART: [ldev] --
1,284,389 UART: [fwproc] Wait for Commands...
1,285,031 UART: [fwproc] Recv command 0x46574c44
1,285,759 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,320,128 >>> mbox cmd response: success
3,321,174 UART: [afmc] ++
3,321,342 UART: [afmc] CDI.KEYID = 6
3,321,704 UART: [afmc] SUBJECT.KEYID = 7
3,322,129 UART: [afmc] AUTHORITY.KEYID = 5
3,357,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,750 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,459 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,351 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,062 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,947 UART: [afmc] --
3,400,929 UART: [cold-reset] --
3,401,559 UART: [state] Locking Datavault
3,402,814 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,418 UART: [state] Locking ICCM
3,403,912 UART: [exit] Launching FMC @ 0x40000130
3,409,241 UART:
3,409,257 UART: Running Caliptra FMC ...
3,409,665 UART:
3,409,808 UART: [state] CFI Enabled
3,420,808 UART: [fht] FMC Alias Private Key: 7
3,528,952 UART: [art] Extend RT PCRs Done
3,529,380 UART: [art] Lock RT PCRs Done
3,531,122 UART: [art] Populate DV Done
3,539,218 UART: [fht] FMC Alias Private Key: 7
3,540,192 UART: [art] Derive CDI
3,540,472 UART: [art] Store in in slot 0x4
3,626,119 UART: [art] Derive Key Pair
3,626,479 UART: [art] Store priv key in slot 0x5
3,639,253 UART: [art] Derive Key Pair - Done
3,653,951 UART: [art] Signing Cert with AUTHO
3,654,431 UART: RITY.KEYID = 7
3,669,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,068 UART: [art] PUB.X = D6E75C22189AE9A5D401D91872D004FB1A479683B6C926216A8B20EAF2B16757F3C7A3CE3B5FF8A923F83DF806751101
3,676,828 UART: [art] PUB.Y = 7AF793A470121822C970956E986976687E9FBF76FA5E106C3E3B761752A9237AE8DB8B37ABDB3FBF7DF29AB837618624
3,683,780 UART: [art] SIG.R = D1F9F2A9C7EF91352EC9D855720A1AB710216DF4FF143260484D13495B0A1B303CA8946D772D127B9C06D02F8E45F04A
3,690,543 UART: [art] SIG.S = 41FBDA75319722C3343D562A56AE3A33C7A5D1F43D7BC95276357449270EE9BCE4D6E366087C2764C3A209F8BB966098
3,714,115 UART: Caliptra RT
3,714,460 UART: [state] CFI Enabled
3,821,554 UART: [rt] RT listening for mailbox commands...
3,822,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,318 UART: [rt]cmd =0x41544d4e, len=14344
3,946,820 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,306 ready_for_fw is high
1,060,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,197 >>> mbox cmd response: success
3,232,378 UART:
3,232,394 UART: Running Caliptra FMC ...
3,232,802 UART:
3,232,945 UART: [state] CFI Enabled
3,243,613 UART: [fht] FMC Alias Private Key: 7
3,351,785 UART: [art] Extend RT PCRs Done
3,352,213 UART: [art] Lock RT PCRs Done
3,353,645 UART: [art] Populate DV Done
3,361,709 UART: [fht] FMC Alias Private Key: 7
3,362,871 UART: [art] Derive CDI
3,363,151 UART: [art] Store in in slot 0x4
3,449,018 UART: [art] Derive Key Pair
3,449,378 UART: [art] Store priv key in slot 0x5
3,462,782 UART: [art] Derive Key Pair - Done
3,477,949 UART: [art] Signing Cert with AUTHO
3,478,429 UART: RITY.KEYID = 7
3,493,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,532 UART: [art] PUB.X = 8F7068246BDFC13257AA1C1F2B95A9327A442FDF3B5CB7737110B2F17457F914A333DC852DCA62755C4535521B0C2F4D
3,501,301 UART: [art] PUB.Y = 2E1400B27823033D1360E1EA4615ECB29BB640DE421B309AB1C1146914FB260F09EEC199C1C74590C0480A36155E1616
3,508,211 UART: [art] SIG.R = 2E2F3FFD220B516003059389925BE6EADC49B042631DD2FB1CCF676DCB5622A0E567AE2870D0759BA17E99FFB11665AE
3,514,982 UART: [art] SIG.S = 7E6AB9D89BD3DCAE540504B1DB27B34A33F510F547F0971564072A7E5B6891D7D6383BC6326B0F108F71CEB3F4A04AA1
3,539,283 UART: Caliptra RT
3,539,628 UART: [state] CFI Enabled
3,647,067 UART: [rt] RT listening for mailbox commands...
3,647,737 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,705 UART: [rt]cmd =0x41544d4e, len=14344
3,772,027 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,774 UART: [kat] LMS
1,169,086 UART: [kat] --
1,170,341 UART: [cold-reset] ++
1,170,767 UART: [fht] FHT @ 0x50003400
1,173,427 UART: [idev] ++
1,173,595 UART: [idev] CDI.KEYID = 6
1,173,956 UART: [idev] SUBJECT.KEYID = 7
1,174,381 UART: [idev] UDS.KEYID = 0
1,174,727 ready_for_fw is high
1,174,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,199,259 UART: [idev] Sha1 KeyId Algorithm
1,208,169 UART: [idev] --
1,209,382 UART: [ldev] ++
1,209,550 UART: [ldev] CDI.KEYID = 6
1,209,914 UART: [ldev] SUBJECT.KEYID = 5
1,210,341 UART: [ldev] AUTHORITY.KEYID = 7
1,210,804 UART: [ldev] FE.KEYID = 1
1,216,180 UART: [ldev] Erasing FE.KEYID = 1
1,242,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,982 UART: [ldev] --
1,281,322 UART: [fwproc] Wait for Commands...
1,282,135 UART: [fwproc] Recv command 0x46574c44
1,282,868 UART: [fwproc] Recv'd Img size: 114448 bytes
3,131,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,891 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,324,889 >>> mbox cmd response: success
3,326,096 UART: [afmc] ++
3,326,264 UART: [afmc] CDI.KEYID = 6
3,326,627 UART: [afmc] SUBJECT.KEYID = 7
3,327,053 UART: [afmc] AUTHORITY.KEYID = 5
3,362,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,598 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,308 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,198 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,909 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,713 UART: [afmc] --
3,405,669 UART: [cold-reset] --
3,406,685 UART: [state] Locking Datavault
3,407,812 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,416 UART: [state] Locking ICCM
3,409,010 UART: [exit] Launching FMC @ 0x40000130
3,414,339 UART:
3,414,355 UART: Running Caliptra FMC ...
3,414,763 UART:
3,414,817 UART: [state] CFI Enabled
3,425,383 UART: [fht] FMC Alias Private Key: 7
3,533,597 UART: [art] Extend RT PCRs Done
3,534,025 UART: [art] Lock RT PCRs Done
3,535,699 UART: [art] Populate DV Done
3,543,929 UART: [fht] FMC Alias Private Key: 7
3,545,093 UART: [art] Derive CDI
3,545,373 UART: [art] Store in in slot 0x4
3,631,050 UART: [art] Derive Key Pair
3,631,410 UART: [art] Store priv key in slot 0x5
3,644,920 UART: [art] Derive Key Pair - Done
3,659,634 UART: [art] Signing Cert with AUTHO
3,660,114 UART: RITY.KEYID = 7
3,675,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,169 UART: [art] PUB.X = A281A0D73DE109A6D9011B473246D4D6172CF3D65639D9EADCC01281F91B6006429E4BD79B8B25E262A0497479F33037
3,682,926 UART: [art] PUB.Y = 6372AE7BEBBC7DF8F8BA3531EAB87A2DD8BF8A3FBFB26F5CC6708ECE41F748879CD28D6063EDAEE0F166A7C7E79A9B3A
3,689,908 UART: [art] SIG.R = D1152C878A0C9C8CFB2FDFFC4DEAC3A0458E6116CC3B78A7AA4B9F72631A8B8CD9ED39EAD3E193888A81918EF5A47210
3,696,695 UART: [art] SIG.S = 571CC8EFC110D65D5AD4F3B5E57F65F07E5F8809D2B61C8E5789525B411F23C7C58B1B1A726AA8FA632F9B8C3071F210
3,720,703 UART: Caliptra RT
3,720,956 UART: [state] CFI Enabled
3,828,146 UART: [rt] RT listening for mailbox commands...
3,828,816 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,548 UART: [rt]cmd =0x41544d4e, len=14344
3,953,096 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,090 ready_for_fw is high
1,056,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,173,343 >>> mbox cmd response: success
3,235,012 UART:
3,235,028 UART: Running Caliptra FMC ...
3,235,436 UART:
3,235,490 UART: [state] CFI Enabled
3,246,270 UART: [fht] FMC Alias Private Key: 7
3,353,968 UART: [art] Extend RT PCRs Done
3,354,396 UART: [art] Lock RT PCRs Done
3,355,796 UART: [art] Populate DV Done
3,363,944 UART: [fht] FMC Alias Private Key: 7
3,364,964 UART: [art] Derive CDI
3,365,244 UART: [art] Store in in slot 0x4
3,450,801 UART: [art] Derive Key Pair
3,451,161 UART: [art] Store priv key in slot 0x5
3,464,201 UART: [art] Derive Key Pair - Done
3,478,934 UART: [art] Signing Cert with AUTHO
3,479,414 UART: RITY.KEYID = 7
3,494,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,231 UART: [art] PUB.X = C2DA0EE08E39D81152B46A4A85EF3642D3AC842951582616977B75EC70B5A7C8282795B6ED6CD8DC5AFDEBCBCF7175D7
3,502,012 UART: [art] PUB.Y = 3B1EB47D001C31A090F3A52F539CCF27FCC18118A5D73180CB567C19B329201D835BE130694C5A76A05359D0DE056131
3,508,935 UART: [art] SIG.R = 68C32DB7052620EA4C85A562508C999FAE71B2D2CBB799B471B7760872B03B06CAC1B38D533D7957AE11CA0E51F2979B
3,515,697 UART: [art] SIG.S = 39ECD3010876E68EA3F78FFB8F8E4F1FBC664372DD1A0A10C6D1C93FFB011FBCBF66DAFB5A55B2B68987E19ADF878513
3,539,280 UART: Caliptra RT
3,539,533 UART: [state] CFI Enabled
3,647,430 UART: [rt] RT listening for mailbox commands...
3,648,100 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,046 UART: [rt]cmd =0x41544d4e, len=14344
3,772,694 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,563 UART: [kat] HMAC-384Kdf
921,231 UART: [kat] LMS
1,169,543 UART: [kat] --
1,170,504 UART: [cold-reset] ++
1,171,000 UART: [fht] FHT @ 0x50003400
1,173,762 UART: [idev] ++
1,173,930 UART: [idev] CDI.KEYID = 6
1,174,291 UART: [idev] SUBJECT.KEYID = 7
1,174,716 UART: [idev] UDS.KEYID = 0
1,175,062 ready_for_fw is high
1,175,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,928 UART: [idev] Erasing UDS.KEYID = 0
1,199,906 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,210,047 UART: [ldev] ++
1,210,215 UART: [ldev] CDI.KEYID = 6
1,210,579 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,216,777 UART: [ldev] Erasing FE.KEYID = 1
1,243,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,189 UART: [ldev] --
1,282,581 UART: [fwproc] Wait for Commands...
1,283,378 UART: [fwproc] Recv command 0x46574c44
1,284,111 UART: [fwproc] Recv'd Img size: 114448 bytes
3,122,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,301 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,610 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,315,628 >>> mbox cmd response: success
3,316,849 UART: [afmc] ++
3,317,017 UART: [afmc] CDI.KEYID = 6
3,317,380 UART: [afmc] SUBJECT.KEYID = 7
3,317,806 UART: [afmc] AUTHORITY.KEYID = 5
3,353,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,695 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,405 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,295 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,006 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,986 UART: [afmc] --
3,396,966 UART: [cold-reset] --
3,397,702 UART: [state] Locking Datavault
3,398,859 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,463 UART: [state] Locking ICCM
3,400,029 UART: [exit] Launching FMC @ 0x40000130
3,405,358 UART:
3,405,374 UART: Running Caliptra FMC ...
3,405,782 UART:
3,405,925 UART: [state] CFI Enabled
3,416,773 UART: [fht] FMC Alias Private Key: 7
3,524,317 UART: [art] Extend RT PCRs Done
3,524,745 UART: [art] Lock RT PCRs Done
3,526,187 UART: [art] Populate DV Done
3,534,305 UART: [fht] FMC Alias Private Key: 7
3,535,369 UART: [art] Derive CDI
3,535,649 UART: [art] Store in in slot 0x4
3,621,234 UART: [art] Derive Key Pair
3,621,594 UART: [art] Store priv key in slot 0x5
3,634,814 UART: [art] Derive Key Pair - Done
3,649,259 UART: [art] Signing Cert with AUTHO
3,649,739 UART: RITY.KEYID = 7
3,665,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,920 UART: [art] PUB.X = 60F2747AB473071C6F9D1D754B6605CA61AFD490D7DD2B9B1F157634CEC11B0B26E3D1A62F24BDAD99E11A7EC1DA8E8B
3,672,699 UART: [art] PUB.Y = 03892334EF92BC7746A64EBA891BFEF5F6949EA14B5CDB488C2243154C17C7CB90E1D98801798520A48C69E620F387E4
3,679,643 UART: [art] SIG.R = C5C0F7C195FB7D36842659C5C05E2C7FA66E815CEAB59CF104BCB47CB3B2DBBBDE376F9348BCD7BB0C6CB2170D17C163
3,686,428 UART: [art] SIG.S = C3B5432386C24CCC4FD79869BD8BF0807F207B3C6319F24951542AED3D9EBC51515B9EF7BD7E37E4A93A8FEF9006C154
3,710,508 UART: Caliptra RT
3,710,853 UART: [state] CFI Enabled
3,818,666 UART: [rt] RT listening for mailbox commands...
3,819,336 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,294 UART: [rt]cmd =0x41544d4e, len=14344
3,943,822 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,105 ready_for_fw is high
1,056,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,173,049 >>> mbox cmd response: success
3,235,478 UART:
3,235,494 UART: Running Caliptra FMC ...
3,235,902 UART:
3,236,045 UART: [state] CFI Enabled
3,246,713 UART: [fht] FMC Alias Private Key: 7
3,354,249 UART: [art] Extend RT PCRs Done
3,354,677 UART: [art] Lock RT PCRs Done
3,355,877 UART: [art] Populate DV Done
3,364,049 UART: [fht] FMC Alias Private Key: 7
3,365,085 UART: [art] Derive CDI
3,365,365 UART: [art] Store in in slot 0x4
3,451,078 UART: [art] Derive Key Pair
3,451,438 UART: [art] Store priv key in slot 0x5
3,464,588 UART: [art] Derive Key Pair - Done
3,479,156 UART: [art] Signing Cert with AUTHO
3,479,636 UART: RITY.KEYID = 7
3,495,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,847 UART: [art] PUB.X = E1E29EDFC3187B7235F6C3B6BEEA32E8D74BD9395B2904E11958E060364BBD326F5C9EB616E628CD24778056152A4BD6
3,502,620 UART: [art] PUB.Y = 72B280D9F392B20F9D629C5CFF4983AA034A6F1F9563DF58AA8C1DE6E49C4D36B5543F3D449111BDBD2DA9DF7E8E2B93
3,509,580 UART: [art] SIG.R = DC9CACF3BD34F011A7F1C8D0BCF2311E6D97750A612A2CF064FA075D211AEA5EBFDA34CE978D60148028B921833017BC
3,516,360 UART: [art] SIG.S = BDB1064B31430E8B4C9DED3FFD84C35E25B1580331D2CC10D28F85145C5E76FB79118FBEB279828165222FC84BD79F3B
3,539,922 UART: Caliptra RT
3,540,267 UART: [state] CFI Enabled
3,647,446 UART: [rt] RT listening for mailbox commands...
3,648,116 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,204 UART: [rt]cmd =0x41544d4e, len=14344
3,772,700 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,070 UART:
192,430 UART: Running Caliptra ROM ...
193,645 UART:
193,798 UART: [state] CFI Enabled
263,542 UART: [state] LifecycleState = Unprovisioned
265,465 UART: [state] DebugLocked = No
267,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,870 UART: [kat] SHA2-256
441,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,044 UART: [kat] ++
452,532 UART: [kat] sha1
464,145 UART: [kat] SHA2-256
466,837 UART: [kat] SHA2-384
473,413 UART: [kat] SHA2-512-ACC
475,786 UART: [kat] ECC-384
2,765,897 UART: [kat] HMAC-384Kdf
2,797,825 UART: [kat] LMS
3,988,133 UART: [kat] --
3,992,174 UART: [cold-reset] ++
3,993,258 UART: [fht] Storing FHT @ 0x50003400
4,003,550 UART: [idev] ++
4,004,118 UART: [idev] CDI.KEYID = 6
4,005,008 UART: [idev] SUBJECT.KEYID = 7
4,006,262 UART: [idev] UDS.KEYID = 0
4,007,265 ready_for_fw is high
4,007,473 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,151,014 UART: [idev] Erasing UDS.KEYID = 0
7,342,566 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,270 UART: [idev] --
7,368,522 UART: [ldev] ++
7,369,100 UART: [ldev] CDI.KEYID = 6
7,370,121 UART: [ldev] SUBJECT.KEYID = 5
7,371,283 UART: [ldev] AUTHORITY.KEYID = 7
7,372,518 UART: [ldev] FE.KEYID = 1
7,421,047 UART: [ldev] Erasing FE.KEYID = 1
10,754,989 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,600 UART: [ldev] --
13,134,058 UART: [fwproc] Waiting for Commands...
13,136,916 UART: [fwproc] Received command 0x46574c44
13,139,096 UART: [fwproc] Received Image of size 114124 bytes
21,776,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,856,866 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,925,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,242,530 >>> mbox cmd response: success
22,246,387 UART: [afmc] ++
22,246,989 UART: [afmc] CDI.KEYID = 6
22,248,033 UART: [afmc] SUBJECT.KEYID = 7
22,249,141 UART: [afmc] AUTHORITY.KEYID = 5
25,607,912 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,908,955 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,911,254 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,925,789 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,940,525 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,954,812 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,976,066 UART: [afmc] --
27,979,800 UART: [cold-reset] --
27,984,879 UART: [state] Locking Datavault
27,991,375 UART: [state] Locking PCR0, PCR1 and PCR31
27,993,129 UART: [state] Locking ICCM
27,994,369 UART: [exit] Launching FMC @ 0x40000130
28,002,766 UART:
28,003,016 UART: Running Caliptra FMC ...
28,004,150 UART:
28,004,317 UART: [state] CFI Enabled
28,068,897 UART: [fht] FMC Alias Private Key: 7
30,406,155 UART: [art] Extend RT PCRs Done
30,407,383 UART: [art] Lock RT PCRs Done
30,408,826 UART: [art] Populate DV Done
30,414,622 UART: [fht] FMC Alias Private Key: 7
30,416,115 UART: [art] Derive CDI
30,417,033 UART: [art] Store in in slot 0x4
30,477,076 UART: [art] Derive Key Pair
30,478,123 UART: [art] Store priv key in slot 0x5
33,770,308 UART: [art] Derive Key Pair - Done
33,783,292 UART: [art] Signing Cert with AUTHO
33,784,599 UART: RITY.KEYID = 7
36,073,396 UART: [art] Erasing AUTHORITY.KEYID = 7
36,075,461 UART: [art] PUB.X = 6F236ECEB0FFC3CB5DC9974D9FB4C6BBC6BA9574FCE573C75BBCD4BAB4779530761D96BF44F76F38E998B41FFFB927E2
36,082,260 UART: [art] PUB.Y = C2E4048FE1C7AC89A76031F7E3CCF6E1669AECA8C3CF61BCC58AD93197D4C927D44C50085890179219924D004B0AC3F5
36,089,459 UART: [art] SIG.R = 640BCC0391BCC57DF5EA2EA5B56961C732E511B8A4A72D72841C13D2D5C6E26B457B5D6C899A48495BB2A13BF71281F5
36,096,867 UART: [art] SIG.S = 3870264A762EBC40EB156DCFF4F0BED47F031E6E161D70A6AEF3EA802AD4D2FDEE56BFE8430380814BB164C9DA4F740A
37,401,834 UART: Caliptra RT
37,403,022 UART: [state] CFI Enabled
37,567,717 UART: [rt] RT listening for mailbox commands...
37,570,040 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,725,718 UART: [rt]cmd =0x41544d4e, len=14344
37,731,148 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,808,526 ready_for_fw is high
3,808,958 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,189,363 >>> mbox cmd response: success
27,873,832 UART:
27,874,217 UART: Running Caliptra FMC ...
27,875,359 UART:
27,875,522 UART: [state] CFI Enabled
27,925,557 UART: [fht] FMC Alias Private Key: 7
30,263,159 UART: [art] Extend RT PCRs Done
30,264,381 UART: [art] Lock RT PCRs Done
30,265,795 UART: [art] Populate DV Done
30,271,263 UART: [fht] FMC Alias Private Key: 7
30,272,969 UART: [art] Derive CDI
30,273,808 UART: [art] Store in in slot 0x4
30,334,767 UART: [art] Derive Key Pair
30,335,804 UART: [art] Store priv key in slot 0x5
33,628,510 UART: [art] Derive Key Pair - Done
33,641,464 UART: [art] Signing Cert with AUTHO
33,642,771 UART: RITY.KEYID = 7
35,929,881 UART: [art] Erasing AUTHORITY.KEYID = 7
35,931,386 UART: [art] PUB.X = 97CFC11A55757AD66B20880F6A4D96FE4F661471139A17AB3BDB5F11EF001823AEA27A9872415483DECDF0E80E833857
35,938,603 UART: [art] PUB.Y = 1BF8064897AB551365FC74F695D8B98CEFB4BAAFBED1A270DCD623D56B20F34FD458570F2D878A824141155077E74136
35,945,879 UART: [art] SIG.R = 1AF48A7F394FFD471E607217DF6D2CC023D4054F4DD5E77CD6DCDC9F17A5A4D4505A73DDCC2002538FB801ED948FF1F4
35,953,245 UART: [art] SIG.S = 67E5541FDC4885EFC6FB80C1DF35C02CFF4CCA57ED7C29512BABA005F845AE5C48EF6B8C264DD2120EC81D5965E74B44
37,258,756 UART: Caliptra RT
37,259,474 UART: [state] CFI Enabled
37,420,362 UART: [rt] RT listening for mailbox commands...
37,422,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,577,838 UART: [rt]cmd =0x41544d4e, len=14344
37,583,020 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,471 UART:
192,850 UART: Running Caliptra ROM ...
193,938 UART:
603,783 UART: [state] CFI Enabled
611,141 UART: [state] LifecycleState = Unprovisioned
613,007 UART: [state] DebugLocked = No
615,396 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
620,388 UART: [kat] SHA2-256
790,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
800,681 UART: [kat] ++
801,198 UART: [kat] sha1
813,272 UART: [kat] SHA2-256
815,946 UART: [kat] SHA2-384
822,536 UART: [kat] SHA2-512-ACC
824,906 UART: [kat] ECC-384
3,111,090 UART: [kat] HMAC-384Kdf
3,122,029 UART: [kat] LMS
4,312,124 UART: [kat] --
4,316,979 UART: [cold-reset] ++
4,318,986 UART: [fht] Storing FHT @ 0x50003400
4,329,037 UART: [idev] ++
4,329,601 UART: [idev] CDI.KEYID = 6
4,330,540 UART: [idev] SUBJECT.KEYID = 7
4,331,784 UART: [idev] UDS.KEYID = 0
4,333,016 ready_for_fw is high
4,333,245 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,476,697 UART: [idev] Erasing UDS.KEYID = 0
7,619,733 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,316 UART: [idev] --
7,646,003 UART: [ldev] ++
7,646,628 UART: [ldev] CDI.KEYID = 6
7,647,585 UART: [ldev] SUBJECT.KEYID = 5
7,648,790 UART: [ldev] AUTHORITY.KEYID = 7
7,650,011 UART: [ldev] FE.KEYID = 1
7,662,068 UART: [ldev] Erasing FE.KEYID = 1
10,947,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,386 UART: [ldev] --
13,306,860 UART: [fwproc] Waiting for Commands...
13,309,608 UART: [fwproc] Received command 0x46574c44
13,311,786 UART: [fwproc] Received Image of size 114124 bytes
22,177,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,257,355 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,326,219 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,642,995 >>> mbox cmd response: success
22,646,870 UART: [afmc] ++
22,647,470 UART: [afmc] CDI.KEYID = 6
22,648,351 UART: [afmc] SUBJECT.KEYID = 7
22,649,619 UART: [afmc] AUTHORITY.KEYID = 5
25,964,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,261,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,263,585 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,278,150 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,292,868 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,307,113 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,329,810 UART: [afmc] --
28,333,190 UART: [cold-reset] --
28,337,764 UART: [state] Locking Datavault
28,344,239 UART: [state] Locking PCR0, PCR1 and PCR31
28,345,948 UART: [state] Locking ICCM
28,348,474 UART: [exit] Launching FMC @ 0x40000130
28,356,822 UART:
28,357,053 UART: Running Caliptra FMC ...
28,358,154 UART:
28,358,308 UART: [state] CFI Enabled
28,366,460 UART: [fht] FMC Alias Private Key: 7
30,697,309 UART: [art] Extend RT PCRs Done
30,698,541 UART: [art] Lock RT PCRs Done
30,700,158 UART: [art] Populate DV Done
30,705,938 UART: [fht] FMC Alias Private Key: 7
30,707,525 UART: [art] Derive CDI
30,708,330 UART: [art] Store in in slot 0x4
30,750,768 UART: [art] Derive Key Pair
30,751,809 UART: [art] Store priv key in slot 0x5
33,994,337 UART: [art] Derive Key Pair - Done
34,007,399 UART: [art] Signing Cert with AUTHO
34,008,713 UART: RITY.KEYID = 7
36,288,124 UART: [art] Erasing AUTHORITY.KEYID = 7
36,289,633 UART: [art] PUB.X = 302971BCC3CFC231C24B40ED91F102DE7D57A6B59C1D4C26297E1915A759125989E32EB822713622E5AD18698DF431AC
36,296,838 UART: [art] PUB.Y = FABCA31F317C20BDFB821D42D9D81D24B0F2FCAE44AAFA86B4487C82C97A41794BF0702C6C9F5003E63E60F47A84128F
36,304,102 UART: [art] SIG.R = 615934A76BB70CE0613CF538C36222986029BA076B02520B9FA565070289638DCA29C1BBD024F6CD7AE8996C888043E6
36,311,473 UART: [art] SIG.S = 6DF91F39407A584144D5FD8D94844F2AE578A0CB8B6EB6BBDA6E4AC7C7935B96E360053AE8C5ABDCFC4E4A84AD44C08A
37,615,970 UART: Caliptra RT
37,616,675 UART: [state] CFI Enabled
37,735,357 UART: [rt] RT listening for mailbox commands...
37,737,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,893,036 UART: [rt]cmd =0x41544d4e, len=14344
37,898,403 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,130,292 ready_for_fw is high
4,130,746 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,182,479 >>> mbox cmd response: success
27,829,054 UART:
27,829,449 UART: Running Caliptra FMC ...
27,830,547 UART:
27,830,693 UART: [state] CFI Enabled
27,838,632 UART: [fht] FMC Alias Private Key: 7
30,169,589 UART: [art] Extend RT PCRs Done
30,170,816 UART: [art] Lock RT PCRs Done
30,172,791 UART: [art] Populate DV Done
30,178,249 UART: [fht] FMC Alias Private Key: 7
30,179,754 UART: [art] Derive CDI
30,180,513 UART: [art] Store in in slot 0x4
30,222,789 UART: [art] Derive Key Pair
30,223,829 UART: [art] Store priv key in slot 0x5
33,465,566 UART: [art] Derive Key Pair - Done
33,478,456 UART: [art] Signing Cert with AUTHO
33,479,766 UART: RITY.KEYID = 7
35,759,335 UART: [art] Erasing AUTHORITY.KEYID = 7
35,760,852 UART: [art] PUB.X = 3D031D23809F29476062FB82ADE43626CE624F29EA2E0F2F15E1348B7C42FA9157DE294E86644396E8A8921E7832FE4E
35,768,071 UART: [art] PUB.Y = BE4E6CC3FD158A6B50838BC74B9ABF8E6C6FD4ED339F641F96FBF2A960CD5A8383199AE4D675D567B007B10620C24529
35,775,318 UART: [art] SIG.R = CB49BF2F116C12F9888866BC20DD2380D1E17768110BB52C21BB63EB96C890BA3B7ABCDF8DFA743BC1461B6FA433295F
35,782,704 UART: [art] SIG.S = D9AAE0E95DD86CDF79C5727A4BD7F3BE1C3608714D47FCDF1618A352D2D1F6C4AF6E69A6BC59BD71C8FB895FE44E5039
37,087,672 UART: Caliptra RT
37,088,391 UART: [state] CFI Enabled
37,206,105 UART: [rt] RT listening for mailbox commands...
37,208,406 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,363,754 UART: [rt]cmd =0x41544d4e, len=14344
37,368,906 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
192,110 UART:
192,467 UART: Running Caliptra ROM ...
193,670 UART:
193,825 UART: [state] CFI Enabled
266,114 UART: [state] LifecycleState = Unprovisioned
268,023 UART: [state] DebugLocked = No
269,304 UART: [state] WD Timer not started. Device not locked for debugging
272,481 UART: [kat] SHA2-256
451,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,168 UART: [kat] ++
463,618 UART: [kat] sha1
474,701 UART: [kat] SHA2-256
477,701 UART: [kat] SHA2-384
484,253 UART: [kat] SHA2-512-ACC
487,188 UART: [kat] ECC-384
2,948,454 UART: [kat] HMAC-384Kdf
2,972,191 UART: [kat] LMS
3,501,623 UART: [kat] --
3,505,478 UART: [cold-reset] ++
3,507,052 UART: [fht] FHT @ 0x50003400
3,517,392 UART: [idev] ++
3,517,954 UART: [idev] CDI.KEYID = 6
3,518,985 UART: [idev] SUBJECT.KEYID = 7
3,520,089 UART: [idev] UDS.KEYID = 0
3,521,162 ready_for_fw is high
3,521,359 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,295 UART: [idev] Erasing UDS.KEYID = 0
6,029,782 UART: [idev] Sha1 KeyId Algorithm
6,053,497 UART: [idev] --
6,058,681 UART: [ldev] ++
6,059,248 UART: [ldev] CDI.KEYID = 6
6,060,364 UART: [ldev] SUBJECT.KEYID = 5
6,061,503 UART: [ldev] AUTHORITY.KEYID = 7
6,062,607 UART: [ldev] FE.KEYID = 1
6,100,017 UART: [ldev] Erasing FE.KEYID = 1
8,608,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,892 UART: [ldev] --
10,416,453 UART: [fwproc] Wait for Commands...
10,418,386 UART: [fwproc] Recv command 0x46574c44
10,420,479 UART: [fwproc] Recv'd Img size: 114448 bytes
14,988,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,070,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,139,683 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,458,852 >>> mbox cmd response: success
15,463,992 UART: [afmc] ++
15,464,589 UART: [afmc] CDI.KEYID = 6
15,465,502 UART: [afmc] SUBJECT.KEYID = 7
15,466,724 UART: [afmc] AUTHORITY.KEYID = 5
17,997,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,726,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,728,770 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,744,764 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,760,733 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,776,517 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,799,470 UART: [afmc] --
19,804,041 UART: [cold-reset] --
19,808,932 UART: [state] Locking Datavault
19,813,580 UART: [state] Locking PCR0, PCR1 and PCR31
19,815,226 UART: [state] Locking ICCM
19,817,650 UART: [exit] Launching FMC @ 0x40000130
19,826,113 UART:
19,826,392 UART: Running Caliptra FMC ...
19,827,498 UART:
19,827,661 UART: [state] CFI Enabled
19,887,103 UART: [fht] FMC Alias Private Key: 7
21,651,256 UART: [art] Extend RT PCRs Done
21,652,504 UART: [art] Lock RT PCRs Done
21,653,941 UART: [art] Populate DV Done
21,659,373 UART: [fht] FMC Alias Private Key: 7
21,660,970 UART: [art] Derive CDI
21,661,720 UART: [art] Store in in slot 0x4
21,721,084 UART: [art] Derive Key Pair
21,722,078 UART: [art] Store priv key in slot 0x5
24,185,660 UART: [art] Derive Key Pair - Done
24,198,220 UART: [art] Signing Cert with AUTHO
24,199,515 UART: RITY.KEYID = 7
25,911,191 UART: [art] Erasing AUTHORITY.KEYID = 7
25,912,691 UART: [art] PUB.X = DB7A7BB03FAC059F2B79F35FBFB063395A10D95402C5F2257577AE13C8BCAC762F698BF18CCCD246ACE302DE5318C94E
25,919,998 UART: [art] PUB.Y = E4893A5FBE495DF782D5549C26CA3ED1FBCF5826F36080271CD91C98CC5B2CFC22DC4FED5E1AF55C221A37A74DAEC082
25,927,294 UART: [art] SIG.R = FBDB06053EC3E23F3659E2896D9E9A5417B4A02EE14C77022B180927F3D7B5129E1FBDFA59668D85D6A36A64F6900B46
25,934,683 UART: [art] SIG.S = B5CB59EAB371E49A7F17B6D2CC58950BDE4DC29494996DB0D4D1EB9D84E58201F5B4CFEA5D92E405EFE6C021670EA9E2
26,913,994 UART: Caliptra RT
26,914,685 UART: [state] CFI Enabled
27,078,450 UART: [rt] RT listening for mailbox commands...
27,080,772 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,236,407 UART: [rt]cmd =0x41544d4e, len=14344
27,241,520 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,385,936 ready_for_fw is high
3,386,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,042,833 >>> mbox cmd response: success
19,325,250 UART:
19,325,635 UART: Running Caliptra FMC ...
19,326,832 UART:
19,326,995 UART: [state] CFI Enabled
19,393,474 UART: [fht] FMC Alias Private Key: 7
21,157,368 UART: [art] Extend RT PCRs Done
21,158,588 UART: [art] Lock RT PCRs Done
21,160,256 UART: [art] Populate DV Done
21,165,810 UART: [fht] FMC Alias Private Key: 7
21,167,403 UART: [art] Derive CDI
21,168,432 UART: [art] Store in in slot 0x4
21,226,610 UART: [art] Derive Key Pair
21,227,613 UART: [art] Store priv key in slot 0x5
23,690,646 UART: [art] Derive Key Pair - Done
23,703,586 UART: [art] Signing Cert with AUTHO
23,704,882 UART: RITY.KEYID = 7
25,416,592 UART: [art] Erasing AUTHORITY.KEYID = 7
25,418,093 UART: [art] PUB.X = 338B8D06A5745A18A04A5691139A2381E96402249B75C27CF40E62826415F809DFC99AFFDA9E9953BE6FD3038145872F
25,425,338 UART: [art] PUB.Y = 90DE085FD2026A7C8094492C6F2D3B625C6B86390B9B690EDADD293D1832D0F82833E7BAEFD55B836DDC094958196544
25,432,598 UART: [art] SIG.R = 9B9D098093A6B25F43104404FA718C56BBA503618038C623597D87B44B93C65076BC572AFF91A7A93A40E0F625FA49A6
25,439,988 UART: [art] SIG.S = 0C72BCEEDFC9EC4AC0A2173A505E3D8B5F3B3B9EF12B36A90C025C0B3781944E29DB5003F7C2E172FDF95A398DB5E5B1
26,418,600 UART: Caliptra RT
26,419,297 UART: [state] CFI Enabled
26,585,600 UART: [rt] RT listening for mailbox commands...
26,587,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,743,811 UART: [rt]cmd =0x41544d4e, len=14344
26,748,813 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,327 UART:
192,705 UART: Running Caliptra ROM ...
193,811 UART:
603,575 UART: [state] CFI Enabled
617,376 UART: [state] LifecycleState = Unprovisioned
619,243 UART: [state] DebugLocked = No
622,029 UART: [state] WD Timer not started. Device not locked for debugging
625,484 UART: [kat] SHA2-256
804,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,146 UART: [kat] ++
816,585 UART: [kat] sha1
828,158 UART: [kat] SHA2-256
831,141 UART: [kat] SHA2-384
836,993 UART: [kat] SHA2-512-ACC
839,935 UART: [kat] ECC-384
3,283,120 UART: [kat] HMAC-384Kdf
3,296,840 UART: [kat] LMS
3,826,303 UART: [kat] --
3,829,612 UART: [cold-reset] ++
3,831,538 UART: [fht] FHT @ 0x50003400
3,842,292 UART: [idev] ++
3,842,852 UART: [idev] CDI.KEYID = 6
3,843,796 UART: [idev] SUBJECT.KEYID = 7
3,845,026 UART: [idev] UDS.KEYID = 0
3,846,106 ready_for_fw is high
3,846,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,020 UART: [idev] Erasing UDS.KEYID = 0
6,317,655 UART: [idev] Sha1 KeyId Algorithm
6,341,650 UART: [idev] --
6,345,530 UART: [ldev] ++
6,346,093 UART: [ldev] CDI.KEYID = 6
6,347,168 UART: [ldev] SUBJECT.KEYID = 5
6,348,269 UART: [ldev] AUTHORITY.KEYID = 7
6,349,663 UART: [ldev] FE.KEYID = 1
6,358,429 UART: [ldev] Erasing FE.KEYID = 1
8,836,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,290 UART: [ldev] --
10,628,761 UART: [fwproc] Wait for Commands...
10,630,694 UART: [fwproc] Recv command 0x46574c44
10,632,781 UART: [fwproc] Recv'd Img size: 114448 bytes
15,191,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,271,350 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,340,067 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,657,866 >>> mbox cmd response: success
15,662,011 UART: [afmc] ++
15,662,606 UART: [afmc] CDI.KEYID = 6
15,663,510 UART: [afmc] SUBJECT.KEYID = 7
15,664,717 UART: [afmc] AUTHORITY.KEYID = 5
18,171,936 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,888,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,890,402 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,906,370 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,922,333 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,938,093 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,961,523 UART: [afmc] --
19,965,771 UART: [cold-reset] --
19,968,708 UART: [state] Locking Datavault
19,974,596 UART: [state] Locking PCR0, PCR1 and PCR31
19,976,234 UART: [state] Locking ICCM
19,978,590 UART: [exit] Launching FMC @ 0x40000130
19,987,038 UART:
19,987,277 UART: Running Caliptra FMC ...
19,988,374 UART:
19,988,528 UART: [state] CFI Enabled
19,996,728 UART: [fht] FMC Alias Private Key: 7
21,753,825 UART: [art] Extend RT PCRs Done
21,755,036 UART: [art] Lock RT PCRs Done
21,756,606 UART: [art] Populate DV Done
21,761,694 UART: [fht] FMC Alias Private Key: 7
21,763,334 UART: [art] Derive CDI
21,764,142 UART: [art] Store in in slot 0x4
21,806,742 UART: [art] Derive Key Pair
21,807,780 UART: [art] Store priv key in slot 0x5
24,234,828 UART: [art] Derive Key Pair - Done
24,247,885 UART: [art] Signing Cert with AUTHO
24,249,203 UART: RITY.KEYID = 7
25,955,314 UART: [art] Erasing AUTHORITY.KEYID = 7
25,956,820 UART: [art] PUB.X = FFCD4FC2A91351FD8AC74A286B58E97753F399973F56A5D05BAEB6DDB484C0C9E28E5A5E0D29008EFB0642EEAEEAA9F1
25,964,110 UART: [art] PUB.Y = C00302D0AE3B1A2BE2BB4188682336E4EC4B52303BD1C91408BE494F09BBD352919609FD856764D116D727DF4FE5ADB8
25,971,375 UART: [art] SIG.R = DE4D4E62398323248B8178DB5FBF35BD28FD596366B31383258735ECF3D5180B99ABA06ED874D47DE7C9F1C930F4AD83
25,978,746 UART: [art] SIG.S = 2173B3938DAE9A426373A786CB189278CAD9E1ABA161CEAF6D6D47291D22F525401750FD46284D1AB8583B257491FAED
26,957,565 UART: Caliptra RT
26,958,275 UART: [state] CFI Enabled
27,075,627 UART: [rt] RT listening for mailbox commands...
27,077,957 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,233,169 UART: [rt]cmd =0x41544d4e, len=14344
27,238,533 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
3,697,388 ready_for_fw is high
3,697,951 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,249,488 >>> mbox cmd response: success
19,499,648 UART:
19,500,051 UART: Running Caliptra FMC ...
19,501,242 UART:
19,501,403 UART: [state] CFI Enabled
19,509,446 UART: [fht] FMC Alias Private Key: 7
21,266,081 UART: [art] Extend RT PCRs Done
21,267,302 UART: [art] Lock RT PCRs Done
21,269,462 UART: [art] Populate DV Done
21,274,638 UART: [fht] FMC Alias Private Key: 7
21,276,286 UART: [art] Derive CDI
21,277,098 UART: [art] Store in in slot 0x4
21,319,779 UART: [art] Derive Key Pair
21,320,823 UART: [art] Store priv key in slot 0x5
23,746,748 UART: [art] Derive Key Pair - Done
23,759,744 UART: [art] Signing Cert with AUTHO
23,761,039 UART: RITY.KEYID = 7
25,466,917 UART: [art] Erasing AUTHORITY.KEYID = 7
25,468,425 UART: [art] PUB.X = 926BD68724F0E88244FBBBC326BA49B12121439CD6E59C7951D146FD41F75FDC8D14A5FDB2D089A0CAF8F295A4231761
25,475,704 UART: [art] PUB.Y = CDDC13C2FD44B5506EC2C3B614139A7AD2C40A601F04EDAEED146D3A7723F0ABBE3060043186FB7D6E3F9E325F03DAB6
25,482,973 UART: [art] SIG.R = 6FFC7E65C85ECB7FC761F50F616FD2362C30FDA850D1AE83CA65C3FF6BD1CADBBA42E63218B7A12DDE870CD8ACF6BD81
25,490,419 UART: [art] SIG.S = A35090CD260FC66ADC9ED7777E1D79BBE1E52601AA8A7781F883C9058F11E448642B08B28156B72651F8E75159382D81
26,468,830 UART: Caliptra RT
26,469,525 UART: [state] CFI Enabled
26,587,571 UART: [rt] RT listening for mailbox commands...
26,589,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,745,144 UART: [rt]cmd =0x41544d4e, len=14344
26,750,781 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,435,830 ready_for_fw is high
3,436,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,835,609 >>> mbox cmd response: success
20,116,843 UART:
20,117,248 UART: Running Caliptra FMC ...
20,118,445 UART:
20,118,629 UART: [state] CFI Enabled
20,184,571 UART: [fht] FMC Alias Private Key: 7
21,948,192 UART: [art] Extend RT PCRs Done
21,949,417 UART: [art] Lock RT PCRs Done
21,950,800 UART: [art] Populate DV Done
21,956,154 UART: [fht] FMC Alias Private Key: 7
21,957,802 UART: [art] Derive CDI
21,958,537 UART: [art] Store in in slot 0x4
22,016,926 UART: [art] Derive Key Pair
22,017,926 UART: [art] Store priv key in slot 0x5
24,480,936 UART: [art] Derive Key Pair - Done
24,493,877 UART: [art] Signing Cert with AUTHO
24,495,184 UART: RITY.KEYID = 7
26,205,522 UART: [art] Erasing AUTHORITY.KEYID = 7
26,207,021 UART: [art] PUB.X = 31B4CD82B950F47AC85C9FC273845C97BCA3C145F2CB36A23E6188FCBE13DB6C5842D7FFD1839BDBCCD1800F8924AE44
26,214,325 UART: [art] PUB.Y = 16A38103A025A96EB01C9A1664598F7EA713E5FA2722A7CF85C95D191BFF3163CBC7BAA9D15FD3A57CE087D31E890B7D
26,221,599 UART: [art] SIG.R = B5CD6F114A3726E5CD593BE1F2900981FD209AF57A85432AA636869CAC29046B518951D9F4A610EE178DD85014E45DA1
26,228,946 UART: [art] SIG.S = 15F8E4FE12B37A332C21D9C55B2CD5F48EE56EBB142E81233BCF922E2A0117E1176C38BD83221826B841D66C1163AC88
27,208,033 UART: Caliptra RT
27,208,721 UART: [state] CFI Enabled
27,373,281 UART: [rt] RT listening for mailbox commands...
27,375,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,531,937 UART: [rt]cmd =0x41544d4e, len=14344
27,537,161 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,757,433 ready_for_fw is high
3,757,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,077,956 >>> mbox cmd response: success
20,335,412 UART:
20,335,802 UART: Running Caliptra FMC ...
20,336,928 UART:
20,337,080 UART: [state] CFI Enabled
20,345,176 UART: [fht] FMC Alias Private Key: 7
22,101,631 UART: [art] Extend RT PCRs Done
22,102,856 UART: [art] Lock RT PCRs Done
22,104,572 UART: [art] Populate DV Done
22,109,881 UART: [fht] FMC Alias Private Key: 7
22,111,497 UART: [art] Derive CDI
22,112,233 UART: [art] Store in in slot 0x4
22,154,454 UART: [art] Derive Key Pair
22,155,495 UART: [art] Store priv key in slot 0x5
24,581,881 UART: [art] Derive Key Pair - Done
24,594,711 UART: [art] Signing Cert with AUTHO
24,596,005 UART: RITY.KEYID = 7
26,301,628 UART: [art] Erasing AUTHORITY.KEYID = 7
26,303,138 UART: [art] PUB.X = C003D9D6B4BCDBF0854B7A3BDFA717825C8130FFBF97604F5D983DC1CE8468BC668E858EAE8EE6565E82B7C6F9966AC7
26,310,603 UART: [art] PUB.Y = 57CD02604050B4732C9C6DF1F5EF0E093C4F2C2A2EFC95AF25ECA37BA327939D89AF82259F14F7B8D020ECD8BC32EBA8
26,317,738 UART: [art] SIG.R = F7133C35326127939DEBAB01E996B0CDBABBF191C21E20BB485987FBE04E4CBBABA3589B47F7EDCBF49F03B4ECA0C407
26,325,163 UART: [art] SIG.S = 0B723FCA6576221A8194CC596E8B7A81CF00BC54522867A8CCC06BFC8A1C1212FEBC6088516293DF9E81DFD2A4174C4C
27,303,818 UART: Caliptra RT
27,304,501 UART: [state] CFI Enabled
27,421,281 UART: [rt] RT listening for mailbox commands...
27,423,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,579,002 UART: [rt]cmd =0x41544d4e, len=14344
27,584,115 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,265 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,819 UART: [kat] SHA2-256
881,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,865 UART: [kat] ++
886,017 UART: [kat] sha1
890,311 UART: [kat] SHA2-256
892,249 UART: [kat] SHA2-384
894,958 UART: [kat] SHA2-512-ACC
896,859 UART: [kat] ECC-384
902,258 UART: [kat] HMAC-384Kdf
906,788 UART: [kat] LMS
1,474,984 UART: [kat] --
1,475,965 UART: [cold-reset] ++
1,476,381 UART: [fht] Storing FHT @ 0x50003400
1,479,056 UART: [idev] ++
1,479,224 UART: [idev] CDI.KEYID = 6
1,479,584 UART: [idev] SUBJECT.KEYID = 7
1,480,008 UART: [idev] UDS.KEYID = 0
1,480,353 ready_for_fw is high
1,480,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,078 UART: [idev] Erasing UDS.KEYID = 0
1,504,200 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,738 UART: [idev] --
1,513,669 UART: [ldev] ++
1,513,837 UART: [ldev] CDI.KEYID = 6
1,514,200 UART: [ldev] SUBJECT.KEYID = 5
1,514,626 UART: [ldev] AUTHORITY.KEYID = 7
1,515,089 UART: [ldev] FE.KEYID = 1
1,520,149 UART: [ldev] Erasing FE.KEYID = 1
1,544,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,756 UART: [ldev] --
1,584,243 UART: [fwproc] Waiting for Commands...
1,584,904 UART: [fwproc] Received command 0x46574c44
1,585,695 UART: [fwproc] Received Image of size 114448 bytes
5,121,453 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,149,687 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,179,039 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,315,030 >>> mbox cmd response: success
5,316,146 UART: [afmc] ++
5,316,314 UART: [afmc] CDI.KEYID = 6
5,316,676 UART: [afmc] SUBJECT.KEYID = 7
5,317,101 UART: [afmc] AUTHORITY.KEYID = 5
5,352,199 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,368,613 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,369,393 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,375,102 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,380,994 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,386,695 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,394,519 UART: [afmc] --
5,395,603 UART: [cold-reset] --
5,396,477 UART: [state] Locking Datavault
5,397,516 UART: [state] Locking PCR0, PCR1 and PCR31
5,398,120 UART: [state] Locking ICCM
5,398,726 UART: [exit] Launching FMC @ 0x40000130
5,404,055 UART:
5,404,071 UART: Running Caliptra FMC ...
5,404,479 UART:
5,404,533 UART: [state] CFI Enabled
5,415,219 UART: [fht] FMC Alias Private Key: 7
5,523,213 UART: [art] Extend RT PCRs Done
5,523,641 UART: [art] Lock RT PCRs Done
5,524,995 UART: [art] Populate DV Done
5,533,085 UART: [fht] FMC Alias Private Key: 7
5,534,073 UART: [art] Derive CDI
5,534,353 UART: [art] Store in in slot 0x4
5,619,860 UART: [art] Derive Key Pair
5,620,220 UART: [art] Store priv key in slot 0x5
5,633,750 UART: [art] Derive Key Pair - Done
5,648,620 UART: [art] Signing Cert with AUTHO
5,649,100 UART: RITY.KEYID = 7
5,664,332 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,097 UART: [art] PUB.X = ED1184D8B4215FFC3BB379FE79C3C5607F57360B0D77D1BDDF24BBC34969D4208FDE4F15581C84B83EDC35C1C21B5027
5,671,873 UART: [art] PUB.Y = 8B562D901B3CA5708BBED38187E359E1E3850EDE08879264E09FD33A488CD09B243FC06DC734F3C77DA2949014E3F95B
5,678,821 UART: [art] SIG.R = 6117ED9EDDEE6F64BA37CF57171BBF47811445CB03E1693241F927AB72FC9A196412345AC286AD2D8B0256D473C9FC66
5,685,591 UART: [art] SIG.S = C22C19435509322479D4206A048B788FBC72280AC09C083D937FEE65F941074B236A437F7CC79151796243A182519B1B
5,709,415 UART: Caliptra RT
5,709,668 UART: [state] CFI Enabled
5,818,139 UART: [rt] RT listening for mailbox commands...
5,818,809 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,941,703 UART: [rt]cmd =0x41544d4e, len=14344
5,948,349 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,237 ready_for_fw is high
1,362,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,240,592 >>> mbox cmd response: success
5,302,081 UART:
5,302,097 UART: Running Caliptra FMC ...
5,302,505 UART:
5,302,559 UART: [state] CFI Enabled
5,312,883 UART: [fht] FMC Alias Private Key: 7
5,420,959 UART: [art] Extend RT PCRs Done
5,421,387 UART: [art] Lock RT PCRs Done
5,422,927 UART: [art] Populate DV Done
5,431,197 UART: [fht] FMC Alias Private Key: 7
5,432,373 UART: [art] Derive CDI
5,432,653 UART: [art] Store in in slot 0x4
5,517,916 UART: [art] Derive Key Pair
5,518,276 UART: [art] Store priv key in slot 0x5
5,531,444 UART: [art] Derive Key Pair - Done
5,545,986 UART: [art] Signing Cert with AUTHO
5,546,466 UART: RITY.KEYID = 7
5,561,936 UART: [art] Erasing AUTHORITY.KEYID = 7
5,562,701 UART: [art] PUB.X = 0275F1B740D3AFDEE239FD0D2B84FE653871D0F14ABDE94C098B0DA0D75F908E2DA4FA2D6CFF375F185841593CB86318
5,569,473 UART: [art] PUB.Y = 594523D1238549A265C094D9587B81AC51C5E7D860092F8A1ABA80B23BA726F6485D2E7D2FC969DA1B3CBC2ECAB1F987
5,576,428 UART: [art] SIG.R = 0D870C2FB19322B50387694EE5EDEBBCF01143489836766449CEB59742AD46A847C4C43AC3001D3C5205BE895679CD54
5,583,162 UART: [art] SIG.S = A169D871941FC6FF9BC594DA37CE66CC260519D654C51918725249955D27DA456763F6DEC3E7C532429594C66FD3B9AF
5,606,752 UART: Caliptra RT
5,607,005 UART: [state] CFI Enabled
5,715,526 UART: [rt] RT listening for mailbox commands...
5,716,196 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,839,228 UART: [rt]cmd =0x41544d4e, len=14344
5,845,568 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,358 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,928 UART: [kat] SHA2-256
881,859 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,974 UART: [kat] ++
886,126 UART: [kat] sha1
890,312 UART: [kat] SHA2-256
892,250 UART: [kat] SHA2-384
895,119 UART: [kat] SHA2-512-ACC
897,020 UART: [kat] ECC-384
902,543 UART: [kat] HMAC-384Kdf
907,299 UART: [kat] LMS
1,475,495 UART: [kat] --
1,476,470 UART: [cold-reset] ++
1,477,030 UART: [fht] Storing FHT @ 0x50003400
1,479,773 UART: [idev] ++
1,479,941 UART: [idev] CDI.KEYID = 6
1,480,301 UART: [idev] SUBJECT.KEYID = 7
1,480,725 UART: [idev] UDS.KEYID = 0
1,481,070 ready_for_fw is high
1,481,070 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,595 UART: [idev] Erasing UDS.KEYID = 0
1,504,917 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,601 UART: [idev] --
1,514,748 UART: [ldev] ++
1,514,916 UART: [ldev] CDI.KEYID = 6
1,515,279 UART: [ldev] SUBJECT.KEYID = 5
1,515,705 UART: [ldev] AUTHORITY.KEYID = 7
1,516,168 UART: [ldev] FE.KEYID = 1
1,521,614 UART: [ldev] Erasing FE.KEYID = 1
1,547,407 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,291 UART: [ldev] --
1,586,562 UART: [fwproc] Waiting for Commands...
1,587,229 UART: [fwproc] Received command 0x46574c44
1,588,020 UART: [fwproc] Received Image of size 114448 bytes
5,084,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,112,885 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,142,237 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,278,234 >>> mbox cmd response: success
5,279,244 UART: [afmc] ++
5,279,412 UART: [afmc] CDI.KEYID = 6
5,279,774 UART: [afmc] SUBJECT.KEYID = 7
5,280,199 UART: [afmc] AUTHORITY.KEYID = 5
5,315,507 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,331,767 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,332,547 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,338,256 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,344,148 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,349,849 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,357,767 UART: [afmc] --
5,358,679 UART: [cold-reset] --
5,359,501 UART: [state] Locking Datavault
5,360,632 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,236 UART: [state] Locking ICCM
5,361,856 UART: [exit] Launching FMC @ 0x40000130
5,367,185 UART:
5,367,201 UART: Running Caliptra FMC ...
5,367,609 UART:
5,367,752 UART: [state] CFI Enabled
5,378,500 UART: [fht] FMC Alias Private Key: 7
5,486,588 UART: [art] Extend RT PCRs Done
5,487,016 UART: [art] Lock RT PCRs Done
5,488,700 UART: [art] Populate DV Done
5,496,844 UART: [fht] FMC Alias Private Key: 7
5,497,864 UART: [art] Derive CDI
5,498,144 UART: [art] Store in in slot 0x4
5,583,981 UART: [art] Derive Key Pair
5,584,341 UART: [art] Store priv key in slot 0x5
5,597,591 UART: [art] Derive Key Pair - Done
5,612,163 UART: [art] Signing Cert with AUTHO
5,612,643 UART: RITY.KEYID = 7
5,628,035 UART: [art] Erasing AUTHORITY.KEYID = 7
5,628,800 UART: [art] PUB.X = 4D3D9C458F222B5A6327CB947356A4C7F263859154C337669D25280BFB8E25807AD33BC17C9934D21AF8F034BB73432A
5,635,563 UART: [art] PUB.Y = 92E0085F7D15D17550329FFA88820FD11A39D61C86FC580A235C0D6FDFE5093BDFD6987D96FEE05009324B7D4CA1B89C
5,642,503 UART: [art] SIG.R = 6922551868D35B0DA5ECBC81AB1E5D03B11812ACDBD2A0C031DD1CF26BB1062464F4959FB6580C8A0D90698FEC25CD27
5,649,270 UART: [art] SIG.S = 85D28074CD21BF1870F0DF0A37EED68D81364C6EFCB080557AEBBB6ABF7BB0A66CE77A166AFF9BD2AEABB3F276C34DA2
5,673,222 UART: Caliptra RT
5,673,567 UART: [state] CFI Enabled
5,782,898 UART: [rt] RT listening for mailbox commands...
5,783,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,906,870 UART: [rt]cmd =0x41544d4e, len=14344
5,913,524 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,412 ready_for_fw is high
1,362,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,280,532 >>> mbox cmd response: success
5,341,661 UART:
5,341,677 UART: Running Caliptra FMC ...
5,342,085 UART:
5,342,228 UART: [state] CFI Enabled
5,352,966 UART: [fht] FMC Alias Private Key: 7
5,461,594 UART: [art] Extend RT PCRs Done
5,462,022 UART: [art] Lock RT PCRs Done
5,463,484 UART: [art] Populate DV Done
5,471,956 UART: [fht] FMC Alias Private Key: 7
5,472,944 UART: [art] Derive CDI
5,473,224 UART: [art] Store in in slot 0x4
5,559,253 UART: [art] Derive Key Pair
5,559,613 UART: [art] Store priv key in slot 0x5
5,573,137 UART: [art] Derive Key Pair - Done
5,588,290 UART: [art] Signing Cert with AUTHO
5,588,770 UART: RITY.KEYID = 7
5,603,834 UART: [art] Erasing AUTHORITY.KEYID = 7
5,604,599 UART: [art] PUB.X = 1F1FCA3326033DE2B14B9616B2D4C1A76B1D98E6D27B688E6C9C935767315BC165ADDDFFFD9DC83C5FCB365D095F8EE7
5,611,381 UART: [art] PUB.Y = 97239978C12BD58422DF58196185829B5D3B951B70D92BA21333CF6687CD2EEE46C26E29DF7F9802218DE232E054614C
5,618,322 UART: [art] SIG.R = 5DE72868FAD0273429605E040DA5A270F0F7E633E1BBDA8D65CF74165D16432C12C3B18BD641B35F61C8CBF0CA95855D
5,625,094 UART: [art] SIG.S = 6DA20DEAC6EB1447F41780F93DCA691AFD4A2AF8D2130F7DFBED0646350A979D6E725C884E67EF31CA666FE7CCED8BB7
5,648,437 UART: Caliptra RT
5,648,782 UART: [state] CFI Enabled
5,757,866 UART: [rt] RT listening for mailbox commands...
5,758,536 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,881,780 UART: [rt]cmd =0x41544d4e, len=14344
5,888,192 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
893,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,791 UART: [kat] ++
897,943 UART: [kat] sha1
902,155 UART: [kat] SHA2-256
904,095 UART: [kat] SHA2-384
906,758 UART: [kat] SHA2-512-ACC
908,659 UART: [kat] ECC-384
918,100 UART: [kat] HMAC-384Kdf
922,828 UART: [kat] LMS
1,171,156 UART: [kat] --
1,171,971 UART: [cold-reset] ++
1,172,539 UART: [fht] FHT @ 0x50003400
1,175,098 UART: [idev] ++
1,175,266 UART: [idev] CDI.KEYID = 6
1,175,626 UART: [idev] SUBJECT.KEYID = 7
1,176,050 UART: [idev] UDS.KEYID = 0
1,176,395 ready_for_fw is high
1,176,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,168 UART: [idev] Erasing UDS.KEYID = 0
1,201,205 UART: [idev] Sha1 KeyId Algorithm
1,209,711 UART: [idev] --
1,210,787 UART: [ldev] ++
1,210,955 UART: [ldev] CDI.KEYID = 6
1,211,318 UART: [ldev] SUBJECT.KEYID = 5
1,211,744 UART: [ldev] AUTHORITY.KEYID = 7
1,212,207 UART: [ldev] FE.KEYID = 1
1,217,325 UART: [ldev] Erasing FE.KEYID = 1
1,243,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,869 UART: [ldev] --
1,283,350 UART: [fwproc] Wait for Commands...
1,284,074 UART: [fwproc] Recv command 0x46574c44
1,284,802 UART: [fwproc] Recv'd Img size: 114448 bytes
3,127,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,471 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,320,370 >>> mbox cmd response: success
3,321,630 UART: [afmc] ++
3,321,798 UART: [afmc] CDI.KEYID = 6
3,322,160 UART: [afmc] SUBJECT.KEYID = 7
3,322,585 UART: [afmc] AUTHORITY.KEYID = 5
3,358,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,530 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,239 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,131 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,842 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,681 UART: [afmc] --
3,401,779 UART: [cold-reset] --
3,402,753 UART: [state] Locking Datavault
3,403,810 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,414 UART: [state] Locking ICCM
3,405,072 UART: [exit] Launching FMC @ 0x40000130
3,410,401 UART:
3,410,417 UART: Running Caliptra FMC ...
3,410,825 UART:
3,410,879 UART: [state] CFI Enabled
3,421,241 UART: [fht] FMC Alias Private Key: 7
3,529,723 UART: [art] Extend RT PCRs Done
3,530,151 UART: [art] Lock RT PCRs Done
3,531,891 UART: [art] Populate DV Done
3,540,081 UART: [fht] FMC Alias Private Key: 7
3,541,189 UART: [art] Derive CDI
3,541,469 UART: [art] Store in in slot 0x4
3,627,322 UART: [art] Derive Key Pair
3,627,682 UART: [art] Store priv key in slot 0x5
3,640,120 UART: [art] Derive Key Pair - Done
3,654,925 UART: [art] Signing Cert with AUTHO
3,655,405 UART: RITY.KEYID = 7
3,670,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,672 UART: [art] PUB.X = E6CDBADD07FA5EE30DACB357A5C36DCBB6EED67FEF6EF4BF9A1A8A365CD525D6255BE546054DB190EF73E62992D0E0E8
3,678,465 UART: [art] PUB.Y = 291F263BE9D46B073A9A942B776EA8A141D851C348DCB8BB38BE1C495760568C3AB4D7C58C70E6A5FC0F6FE738E3933E
3,685,419 UART: [art] SIG.R = BB332B0DFB3D99C5D369B50524268EB6A368CC190290F239B84EDBD8457EE16B478346F446328BACE7EAFEA3B3800119
3,692,185 UART: [art] SIG.S = AEE5CCEAE7229651115B96E03D4B3B57B1FD7CB912053F296C45563E1242039A879A18909164320163E796026EC0126C
3,716,034 UART: Caliptra RT
3,716,287 UART: [state] CFI Enabled
3,822,904 UART: [rt] RT listening for mailbox commands...
3,823,574 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,698 UART: [rt]cmd =0x41544d4e, len=14344
3,953,386 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,427 ready_for_fw is high
1,060,427 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,176,130 >>> mbox cmd response: success
3,238,377 UART:
3,238,393 UART: Running Caliptra FMC ...
3,238,801 UART:
3,238,855 UART: [state] CFI Enabled
3,249,039 UART: [fht] FMC Alias Private Key: 7
3,356,969 UART: [art] Extend RT PCRs Done
3,357,397 UART: [art] Lock RT PCRs Done
3,359,073 UART: [art] Populate DV Done
3,367,493 UART: [fht] FMC Alias Private Key: 7
3,368,651 UART: [art] Derive CDI
3,368,931 UART: [art] Store in in slot 0x4
3,454,630 UART: [art] Derive Key Pair
3,454,990 UART: [art] Store priv key in slot 0x5
3,468,522 UART: [art] Derive Key Pair - Done
3,483,196 UART: [art] Signing Cert with AUTHO
3,483,676 UART: RITY.KEYID = 7
3,498,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,571 UART: [art] PUB.X = AD596091A5E1BA451A1D597673A66AA28F213060B9BCE10A6BC9CF06D4672F2AD1EEA00EC951DDFD6C4CCF3887FA4D88
3,506,352 UART: [art] PUB.Y = 82E9086237528DA134BF88594171F1AFA54E6382910F2DE03901DAC4ABF61DDDD6F0200F856D445AFF047D5046FE9C5B
3,513,293 UART: [art] SIG.R = F5253532F3D440EE12169FC4D46626E84D677177A13A454CE4B6B36CF0D9260B7D4711053210317BDF21FA3763B91CD9
3,520,053 UART: [art] SIG.S = 617B204C8F849FC7F6502CE0DD104C3D853E7102B44E782021CC0EACEC69FC87F868760DAE1B1F8A66010095D9DF3B4D
3,543,550 UART: Caliptra RT
3,543,803 UART: [state] CFI Enabled
3,651,279 UART: [rt] RT listening for mailbox commands...
3,651,949 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,003 UART: [rt]cmd =0x41544d4e, len=14344
3,781,721 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
894,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,162 UART: [kat] ++
898,314 UART: [kat] sha1
902,630 UART: [kat] SHA2-256
904,570 UART: [kat] SHA2-384
907,275 UART: [kat] SHA2-512-ACC
909,176 UART: [kat] ECC-384
919,289 UART: [kat] HMAC-384Kdf
923,941 UART: [kat] LMS
1,172,269 UART: [kat] --
1,173,134 UART: [cold-reset] ++
1,173,666 UART: [fht] FHT @ 0x50003400
1,176,173 UART: [idev] ++
1,176,341 UART: [idev] CDI.KEYID = 6
1,176,701 UART: [idev] SUBJECT.KEYID = 7
1,177,125 UART: [idev] UDS.KEYID = 0
1,177,470 ready_for_fw is high
1,177,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,195 UART: [idev] Erasing UDS.KEYID = 0
1,202,624 UART: [idev] Sha1 KeyId Algorithm
1,210,954 UART: [idev] --
1,212,020 UART: [ldev] ++
1,212,188 UART: [ldev] CDI.KEYID = 6
1,212,551 UART: [ldev] SUBJECT.KEYID = 5
1,212,977 UART: [ldev] AUTHORITY.KEYID = 7
1,213,440 UART: [ldev] FE.KEYID = 1
1,218,726 UART: [ldev] Erasing FE.KEYID = 1
1,245,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,900 UART: [ldev] --
1,284,219 UART: [fwproc] Wait for Commands...
1,285,033 UART: [fwproc] Recv command 0x46574c44
1,285,761 UART: [fwproc] Recv'd Img size: 114448 bytes
3,115,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,715 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,308,688 >>> mbox cmd response: success
3,309,744 UART: [afmc] ++
3,309,912 UART: [afmc] CDI.KEYID = 6
3,310,274 UART: [afmc] SUBJECT.KEYID = 7
3,310,699 UART: [afmc] AUTHORITY.KEYID = 5
3,346,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,272 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,981 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,873 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,584 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,449 UART: [afmc] --
3,389,437 UART: [cold-reset] --
3,390,045 UART: [state] Locking Datavault
3,391,198 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,802 UART: [state] Locking ICCM
3,392,310 UART: [exit] Launching FMC @ 0x40000130
3,397,639 UART:
3,397,655 UART: Running Caliptra FMC ...
3,398,063 UART:
3,398,206 UART: [state] CFI Enabled
3,409,092 UART: [fht] FMC Alias Private Key: 7
3,517,254 UART: [art] Extend RT PCRs Done
3,517,682 UART: [art] Lock RT PCRs Done
3,519,632 UART: [art] Populate DV Done
3,527,864 UART: [fht] FMC Alias Private Key: 7
3,528,810 UART: [art] Derive CDI
3,529,090 UART: [art] Store in in slot 0x4
3,615,155 UART: [art] Derive Key Pair
3,615,515 UART: [art] Store priv key in slot 0x5
3,628,307 UART: [art] Derive Key Pair - Done
3,643,494 UART: [art] Signing Cert with AUTHO
3,643,974 UART: RITY.KEYID = 7
3,658,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,755 UART: [art] PUB.X = 05E421D71DA556A44FB40AF7785DA316F34660E2E0C39B52F607F9695D5D67CE0582007F2035CAC948D965A74E050ED3
3,666,485 UART: [art] PUB.Y = 13BC9903DC422C2739E35C203D25281928133A7D6515C583C78976C9D1D2DE839C31A98EF7D4CD78407E65D54723AF4F
3,673,428 UART: [art] SIG.R = D7846DCAA433EF8AD581CBE422EBE1604783B81436481DA36C7D7CEA2EB529F67D2EA660AAED254A9362FDF14A00CA36
3,680,194 UART: [art] SIG.S = 8E157291F5BFDBA89A534C22B15BBCC8CC0677F440A0F84402E96093E743ECEC9E36F6E44120047073DFAF30644061CA
3,704,448 UART: Caliptra RT
3,704,793 UART: [state] CFI Enabled
3,813,110 UART: [rt] RT listening for mailbox commands...
3,813,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,996 UART: [rt]cmd =0x41544d4e, len=14344
3,943,376 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,390 ready_for_fw is high
1,060,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,170,651 >>> mbox cmd response: success
3,231,980 UART:
3,231,996 UART: Running Caliptra FMC ...
3,232,404 UART:
3,232,547 UART: [state] CFI Enabled
3,243,395 UART: [fht] FMC Alias Private Key: 7
3,351,373 UART: [art] Extend RT PCRs Done
3,351,801 UART: [art] Lock RT PCRs Done
3,353,331 UART: [art] Populate DV Done
3,361,689 UART: [fht] FMC Alias Private Key: 7
3,362,777 UART: [art] Derive CDI
3,363,057 UART: [art] Store in in slot 0x4
3,448,884 UART: [art] Derive Key Pair
3,449,244 UART: [art] Store priv key in slot 0x5
3,462,056 UART: [art] Derive Key Pair - Done
3,476,944 UART: [art] Signing Cert with AUTHO
3,477,424 UART: RITY.KEYID = 7
3,492,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,189 UART: [art] PUB.X = 285D8047B4F3853D6EA7D16E6648731B7BE5B8EDC0AF7C6E5D4FF07D23770EC2FB6F63BD3AE7563EB9F5BE8213919B51
3,499,970 UART: [art] PUB.Y = 189A17DC244D1E3D0028C1089EC5124BAD1530FD0A8D3E86523FA6DB4990F83BCA7806F762538F7DB0A7BB548EE673F4
3,506,897 UART: [art] SIG.R = DB6C1C2C31CA4F2456991FDFD7DE1CD4B8A55B690F4FED08BCD730F000CFFAB72EEE1D294C6AC395528BED048154E6E7
3,513,662 UART: [art] SIG.S = 3E83066A4CE782D08170E1A7EACB3C3C19FDEC50C673E6C12A882E2374EC7FA33B38DD6337DEF898D4DB96A4EE7B9B4A
3,537,616 UART: Caliptra RT
3,537,961 UART: [state] CFI Enabled
3,645,999 UART: [rt] RT listening for mailbox commands...
3,646,669 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,841 UART: [rt]cmd =0x41544d4e, len=14344
3,776,269 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,149 UART: [kat] ++
895,301 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
916,088 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,431 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,174,487 ready_for_fw is high
1,174,487 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,697 UART: [idev] Erasing UDS.KEYID = 0
1,198,043 UART: [idev] Sha1 KeyId Algorithm
1,206,829 UART: [idev] --
1,208,000 UART: [ldev] ++
1,208,168 UART: [ldev] CDI.KEYID = 6
1,208,532 UART: [ldev] SUBJECT.KEYID = 5
1,208,959 UART: [ldev] AUTHORITY.KEYID = 7
1,209,422 UART: [ldev] FE.KEYID = 1
1,214,606 UART: [ldev] Erasing FE.KEYID = 1
1,240,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,778 UART: [ldev] --
1,280,280 UART: [fwproc] Wait for Commands...
1,281,091 UART: [fwproc] Recv command 0x46574c44
1,281,824 UART: [fwproc] Recv'd Img size: 114448 bytes
3,118,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,817 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,312,198 >>> mbox cmd response: success
3,313,269 UART: [afmc] ++
3,313,437 UART: [afmc] CDI.KEYID = 6
3,313,800 UART: [afmc] SUBJECT.KEYID = 7
3,314,226 UART: [afmc] AUTHORITY.KEYID = 5
3,349,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,837 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,547 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,437 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,148 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,788 UART: [afmc] --
3,392,860 UART: [cold-reset] --
3,393,628 UART: [state] Locking Datavault
3,394,899 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,503 UART: [state] Locking ICCM
3,396,017 UART: [exit] Launching FMC @ 0x40000130
3,401,346 UART:
3,401,362 UART: Running Caliptra FMC ...
3,401,770 UART:
3,401,824 UART: [state] CFI Enabled
3,412,242 UART: [fht] FMC Alias Private Key: 7
3,519,952 UART: [art] Extend RT PCRs Done
3,520,380 UART: [art] Lock RT PCRs Done
3,521,784 UART: [art] Populate DV Done
3,529,988 UART: [fht] FMC Alias Private Key: 7
3,531,070 UART: [art] Derive CDI
3,531,350 UART: [art] Store in in slot 0x4
3,616,657 UART: [art] Derive Key Pair
3,617,017 UART: [art] Store priv key in slot 0x5
3,630,411 UART: [art] Derive Key Pair - Done
3,645,332 UART: [art] Signing Cert with AUTHO
3,645,812 UART: RITY.KEYID = 7
3,660,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,617 UART: [art] PUB.X = E3C530B9B921E4245C682B564C2DE999131FAF8A86F74F774F80969C2C8B0A5D4C4EC286D41C1817B3472F80D3A38409
3,668,381 UART: [art] PUB.Y = 151CF8DB52E346E51EA4149914E4CA34598687A029924A687D6315E15C8EDA33960DD94C33B6945AE12BFF840AFBA445
3,675,327 UART: [art] SIG.R = 5780CF1179860134A46B6C0285F6F5809122CFA0D4FDBCD51E2A687B06BA162FE5996BEA2ED87BD8D3F2A4F2013FEBA9
3,682,099 UART: [art] SIG.S = 05685D90DF042410D915F0C68055EF6A6A2DE9EF1A5DD145DC7160E9BF809006C120B579BD6069DE0BA9638CFC500F61
3,706,017 UART: Caliptra RT
3,706,270 UART: [state] CFI Enabled
3,814,293 UART: [rt] RT listening for mailbox commands...
3,814,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,973 UART: [rt]cmd =0x41544d4e, len=14344
3,944,413 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,130 ready_for_fw is high
1,056,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,168,099 >>> mbox cmd response: success
3,230,366 UART:
3,230,382 UART: Running Caliptra FMC ...
3,230,790 UART:
3,230,844 UART: [state] CFI Enabled
3,241,416 UART: [fht] FMC Alias Private Key: 7
3,349,050 UART: [art] Extend RT PCRs Done
3,349,478 UART: [art] Lock RT PCRs Done
3,351,164 UART: [art] Populate DV Done
3,359,354 UART: [fht] FMC Alias Private Key: 7
3,360,290 UART: [art] Derive CDI
3,360,570 UART: [art] Store in in slot 0x4
3,445,911 UART: [art] Derive Key Pair
3,446,271 UART: [art] Store priv key in slot 0x5
3,459,269 UART: [art] Derive Key Pair - Done
3,474,082 UART: [art] Signing Cert with AUTHO
3,474,562 UART: RITY.KEYID = 7
3,489,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,553 UART: [art] PUB.X = 37EB727AF1809E8947180E244DA89F0569CB95A0667AF28A4D48AA1E19828028BA9DD0922A17838E90CF2EBAF06293A7
3,497,319 UART: [art] PUB.Y = D3E84BC43E040B793880F3B39BE353382886E0EA35E3174C65108E6FCCEC214D1F9C9E0BEF9B35627EF7A6B6291ECCC4
3,504,272 UART: [art] SIG.R = 80F6655B4A5440679A31A3450C2C44767F1B55821BC1873EF115C39252AC0046C14A05B178DFC340A1162E836F4FA17F
3,511,008 UART: [art] SIG.S = B30BEC3D923409B28EB8F54293AD382DCE6B4B82136092ABAF946CA1DDFCDFE247345E8343B2E05A4A1EA959921D7F1E
3,535,391 UART: Caliptra RT
3,535,644 UART: [state] CFI Enabled
3,643,071 UART: [rt] RT listening for mailbox commands...
3,643,741 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,461 UART: [rt]cmd =0x41544d4e, len=14344
3,772,573 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,533 UART: [kat] HMAC-384Kdf
921,385 UART: [kat] LMS
1,169,697 UART: [kat] --
1,170,578 UART: [cold-reset] ++
1,171,136 UART: [fht] FHT @ 0x50003400
1,173,786 UART: [idev] ++
1,173,954 UART: [idev] CDI.KEYID = 6
1,174,315 UART: [idev] SUBJECT.KEYID = 7
1,174,740 UART: [idev] UDS.KEYID = 0
1,175,086 ready_for_fw is high
1,175,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,658 UART: [idev] Erasing UDS.KEYID = 0
1,199,890 UART: [idev] Sha1 KeyId Algorithm
1,208,686 UART: [idev] --
1,209,629 UART: [ldev] ++
1,209,797 UART: [ldev] CDI.KEYID = 6
1,210,161 UART: [ldev] SUBJECT.KEYID = 5
1,210,588 UART: [ldev] AUTHORITY.KEYID = 7
1,211,051 UART: [ldev] FE.KEYID = 1
1,216,019 UART: [ldev] Erasing FE.KEYID = 1
1,242,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,721 UART: [ldev] --
1,282,019 UART: [fwproc] Wait for Commands...
1,282,606 UART: [fwproc] Recv command 0x46574c44
1,283,339 UART: [fwproc] Recv'd Img size: 114448 bytes
3,138,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,167,178 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,196,487 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,332,469 >>> mbox cmd response: success
3,333,732 UART: [afmc] ++
3,333,900 UART: [afmc] CDI.KEYID = 6
3,334,263 UART: [afmc] SUBJECT.KEYID = 7
3,334,689 UART: [afmc] AUTHORITY.KEYID = 5
3,370,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,387,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,388,356 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,394,066 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,399,956 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,405,667 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,413,341 UART: [afmc] --
3,414,263 UART: [cold-reset] --
3,414,883 UART: [state] Locking Datavault
3,415,912 UART: [state] Locking PCR0, PCR1 and PCR31
3,416,516 UART: [state] Locking ICCM
3,417,186 UART: [exit] Launching FMC @ 0x40000130
3,422,515 UART:
3,422,531 UART: Running Caliptra FMC ...
3,422,939 UART:
3,423,082 UART: [state] CFI Enabled
3,433,814 UART: [fht] FMC Alias Private Key: 7
3,541,496 UART: [art] Extend RT PCRs Done
3,541,924 UART: [art] Lock RT PCRs Done
3,543,328 UART: [art] Populate DV Done
3,551,560 UART: [fht] FMC Alias Private Key: 7
3,552,640 UART: [art] Derive CDI
3,552,920 UART: [art] Store in in slot 0x4
3,638,183 UART: [art] Derive Key Pair
3,638,543 UART: [art] Store priv key in slot 0x5
3,651,357 UART: [art] Derive Key Pair - Done
3,666,243 UART: [art] Signing Cert with AUTHO
3,666,723 UART: RITY.KEYID = 7
3,682,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,682,858 UART: [art] PUB.X = 57D3850DA02DB33FCDA2C466D74E7C348FD8402B938DB9D0FF829D22C5C980EAE79EBA5F5476B217B57645D4285E265B
3,689,635 UART: [art] PUB.Y = 80FEC02C9CE44E0442F8F32CF785A0BC7547E46F8AC27ECFB112CAB32FD3732453EE950FF769E83C2BE656161D49B689
3,696,591 UART: [art] SIG.R = 9B336353A2CF8AAE6DEC82AB18EDF5ABDBB21F8FA04BB81BD9A40FB5DF9A2C8B38C42621EE91B4EE1DDD7A1CE7682642
3,703,390 UART: [art] SIG.S = A1113A426D379A41467E52B596F4980DC4B785B1DC96E20180E54937E9D2D0633A863A00515CBB7F83EC528E451A75E6
3,726,695 UART: Caliptra RT
3,727,040 UART: [state] CFI Enabled
3,834,629 UART: [rt] RT listening for mailbox commands...
3,835,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,958,415 UART: [rt]cmd =0x41544d4e, len=14344
3,964,695 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,515 ready_for_fw is high
1,055,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,432 >>> mbox cmd response: success
3,231,983 UART:
3,231,999 UART: Running Caliptra FMC ...
3,232,407 UART:
3,232,550 UART: [state] CFI Enabled
3,243,282 UART: [fht] FMC Alias Private Key: 7
3,350,978 UART: [art] Extend RT PCRs Done
3,351,406 UART: [art] Lock RT PCRs Done
3,352,916 UART: [art] Populate DV Done
3,361,316 UART: [fht] FMC Alias Private Key: 7
3,362,358 UART: [art] Derive CDI
3,362,638 UART: [art] Store in in slot 0x4
3,447,817 UART: [art] Derive Key Pair
3,448,177 UART: [art] Store priv key in slot 0x5
3,462,041 UART: [art] Derive Key Pair - Done
3,477,010 UART: [art] Signing Cert with AUTHO
3,477,490 UART: RITY.KEYID = 7
3,492,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,209 UART: [art] PUB.X = A6527B0C761C61988D1CE722C0CFB1CDBE80E8FA1D1B9E47791F7E535B2E68338AA29CF9E1B78B121A3B501D1028B23D
3,499,988 UART: [art] PUB.Y = BC8CAE1C72B4DA8C4DD23158A43C2C5BE94EB39B8D6F56E35690867D87D09CB82A081FF14FEDDFCE3BE6EF9ECA154190
3,506,961 UART: [art] SIG.R = 833BC98DC208A81DA65F67F1CF14FB2A9570322BC8C52556B950DD214EF14910EE5ABB001B4B1B6176A9AAB49B2D8EC6
3,513,720 UART: [art] SIG.S = 41B3C03D2A7CA8388E16F27768F06CC76A1C19AF5E2AA5095A39AEC25C5640EE4A9588939B3CA4C49FF45263EE167485
3,537,252 UART: Caliptra RT
3,537,597 UART: [state] CFI Enabled
3,645,175 UART: [rt] RT listening for mailbox commands...
3,645,845 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,873 UART: [rt]cmd =0x41544d4e, len=14344
3,775,297 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,154 UART:
192,512 UART: Running Caliptra ROM ...
193,631 UART:
193,775 UART: [state] CFI Enabled
266,156 UART: [state] LifecycleState = Unprovisioned
268,155 UART: [state] DebugLocked = No
270,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,971 UART: [kat] SHA2-256
444,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,168 UART: [kat] ++
455,693 UART: [kat] sha1
467,638 UART: [kat] SHA2-256
470,292 UART: [kat] SHA2-384
475,286 UART: [kat] SHA2-512-ACC
477,650 UART: [kat] ECC-384
2,767,750 UART: [kat] HMAC-384Kdf
2,798,538 UART: [kat] LMS
3,988,823 UART: [kat] --
3,993,621 UART: [cold-reset] ++
3,995,484 UART: [fht] Storing FHT @ 0x50003400
4,007,387 UART: [idev] ++
4,007,952 UART: [idev] CDI.KEYID = 6
4,009,083 UART: [idev] SUBJECT.KEYID = 7
4,010,213 UART: [idev] UDS.KEYID = 0
4,011,239 ready_for_fw is high
4,011,444 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,843 UART: [idev] Erasing UDS.KEYID = 0
7,347,482 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,179 UART: [idev] --
7,373,310 UART: [ldev] ++
7,373,890 UART: [ldev] CDI.KEYID = 6
7,374,909 UART: [ldev] SUBJECT.KEYID = 5
7,376,090 UART: [ldev] AUTHORITY.KEYID = 7
7,377,326 UART: [ldev] FE.KEYID = 1
7,422,050 UART: [ldev] Erasing FE.KEYID = 1
10,752,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,096 UART: [ldev] --
13,117,255 UART: [fwproc] Waiting for Commands...
13,119,132 UART: [fwproc] Received command 0x46574c44
13,121,317 UART: [fwproc] Received Image of size 114124 bytes
21,846,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,927,373 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,996,268 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,312,720 >>> mbox cmd response: success
22,316,704 UART: [afmc] ++
22,317,313 UART: [afmc] CDI.KEYID = 6
22,318,231 UART: [afmc] SUBJECT.KEYID = 7
22,319,506 UART: [afmc] AUTHORITY.KEYID = 5
25,676,142 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,972,738 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,975,051 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,989,572 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,004,358 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,018,577 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,040,607 UART: [afmc] --
28,044,966 UART: [cold-reset] --
28,049,044 UART: [state] Locking Datavault
28,055,808 UART: [state] Locking PCR0, PCR1 and PCR31
28,057,510 UART: [state] Locking ICCM
28,059,447 UART: [exit] Launching FMC @ 0x40000130
28,067,867 UART:
28,068,115 UART: Running Caliptra FMC ...
28,069,221 UART:
28,069,388 UART: [state] CFI Enabled
28,134,116 UART: [fht] FMC Alias Private Key: 7
30,471,517 UART: [art] Extend RT PCRs Done
30,472,737 UART: [art] Lock RT PCRs Done
30,474,233 UART: [art] Populate DV Done
30,479,871 UART: [fht] FMC Alias Private Key: 7
30,481,465 UART: [art] Derive CDI
30,482,286 UART: [art] Store in in slot 0x4
30,542,737 UART: [art] Derive Key Pair
30,543,777 UART: [art] Store priv key in slot 0x5
33,836,294 UART: [art] Derive Key Pair - Done
33,849,183 UART: [art] Signing Cert with AUTHO
33,850,517 UART: RITY.KEYID = 7
36,137,153 UART: [art] Erasing AUTHORITY.KEYID = 7
36,138,657 UART: [art] PUB.X = B8EC528A464EBF4074DCDB9507B7E36D0187A4C56A5ABF4C63E6EC27E01F39EDBA9B63493619533614F61AE0B61F94D3
36,145,902 UART: [art] PUB.Y = 56B8B5288AECBF913EC499C6A23BDC6283224807D625421E657D7A5B5EEAD56B5C7F984E17D445DCF04371E20C26CAB5
36,153,128 UART: [art] SIG.R = FACC38AAE2A03AC574BCC428C744D409B40C2FA9E30E8C5B0ED623364634E5250FFD798BCE1E143134B5FAFF8E87FCF9
36,160,576 UART: [art] SIG.S = 3ACDB9DF161A4EE4DFAAD5C78974536B3CC796F12EEDF25EF219C019377F2B3CA7BCA486765258F87F358960E6A4D854
37,465,503 UART: Caliptra RT
37,466,194 UART: [state] CFI Enabled
37,627,222 UART: [rt] RT listening for mailbox commands...
37,629,534 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,785,024 UART: [rt]cmd =0x41544d4e, len=14344
39,078,116 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,785,478 ready_for_fw is high
3,785,884 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,652,759 >>> mbox cmd response: success
27,366,470 UART:
27,366,864 UART: Running Caliptra FMC ...
27,368,066 UART:
27,368,239 UART: [state] CFI Enabled
27,437,188 UART: [fht] FMC Alias Private Key: 7
29,775,109 UART: [art] Extend RT PCRs Done
29,776,327 UART: [art] Lock RT PCRs Done
29,778,176 UART: [art] Populate DV Done
29,783,596 UART: [fht] FMC Alias Private Key: 7
29,785,177 UART: [art] Derive CDI
29,785,947 UART: [art] Store in in slot 0x4
29,846,559 UART: [art] Derive Key Pair
29,847,575 UART: [art] Store priv key in slot 0x5
33,140,594 UART: [art] Derive Key Pair - Done
33,153,653 UART: [art] Signing Cert with AUTHO
33,155,002 UART: RITY.KEYID = 7
35,442,926 UART: [art] Erasing AUTHORITY.KEYID = 7
35,444,435 UART: [art] PUB.X = 3FBFA2DF840DDABBF13628CA9EA69812B85315818A0CFE1B974C9C550D15776ACD6AEABA81212F09D7130C68B0917DBB
35,451,710 UART: [art] PUB.Y = 7E96AF95C9CA45FB8D7336FB0BB690005852864B0683600D62744E7A6ED1D327A1812C50620F6D2475057DD484048472
35,458,898 UART: [art] SIG.R = A2BA93FBBC3A980E92D264B828A1E50D116F617BB73F0E4EC2AFF73864A9EED02060B9C8B5BF18A1222B05DFD56817F1
35,466,354 UART: [art] SIG.S = 667DE17A5D4AD8CF464EFBC74F07AFCF85FF8C46B825F4E41DA72778B5B6923D948DE89B18E9EA7C61A5CE34BC7512C3
36,771,382 UART: Caliptra RT
36,772,097 UART: [state] CFI Enabled
36,933,858 UART: [rt] RT listening for mailbox commands...
36,936,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,091,478 UART: [rt]cmd =0x41544d4e, len=14344
38,385,021 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
192,674 UART:
193,042 UART: Running Caliptra ROM ...
194,235 UART:
603,708 UART: [state] CFI Enabled
615,398 UART: [state] LifecycleState = Unprovisioned
617,356 UART: [state] DebugLocked = No
620,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,723 UART: [kat] SHA2-256
795,498 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,045 UART: [kat] ++
806,524 UART: [kat] sha1
817,816 UART: [kat] SHA2-256
820,533 UART: [kat] SHA2-384
826,799 UART: [kat] SHA2-512-ACC
829,174 UART: [kat] ECC-384
3,114,869 UART: [kat] HMAC-384Kdf
3,126,604 UART: [kat] LMS
4,316,699 UART: [kat] --
4,319,719 UART: [cold-reset] ++
4,320,651 UART: [fht] Storing FHT @ 0x50003400
4,332,787 UART: [idev] ++
4,333,358 UART: [idev] CDI.KEYID = 6
4,334,385 UART: [idev] SUBJECT.KEYID = 7
4,335,561 UART: [idev] UDS.KEYID = 0
4,336,632 ready_for_fw is high
4,336,832 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,167 UART: [idev] Erasing UDS.KEYID = 0
7,626,761 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,477 UART: [idev] --
7,654,097 UART: [ldev] ++
7,654,681 UART: [ldev] CDI.KEYID = 6
7,655,588 UART: [ldev] SUBJECT.KEYID = 5
7,656,846 UART: [ldev] AUTHORITY.KEYID = 7
7,658,070 UART: [ldev] FE.KEYID = 1
7,670,874 UART: [ldev] Erasing FE.KEYID = 1
10,959,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,612 UART: [ldev] --
13,319,332 UART: [fwproc] Waiting for Commands...
13,321,972 UART: [fwproc] Received command 0x46574c44
13,324,203 UART: [fwproc] Received Image of size 114124 bytes
22,432,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,521,032 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,589,914 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,908,076 >>> mbox cmd response: success
22,912,351 UART: [afmc] ++
22,912,940 UART: [afmc] CDI.KEYID = 6
22,913,846 UART: [afmc] SUBJECT.KEYID = 7
22,915,112 UART: [afmc] AUTHORITY.KEYID = 5
26,230,648 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,524,304 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,526,580 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,541,127 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,555,852 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,570,105 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,592,896 UART: [afmc] --
28,596,648 UART: [cold-reset] --
28,600,449 UART: [state] Locking Datavault
28,606,291 UART: [state] Locking PCR0, PCR1 and PCR31
28,608,064 UART: [state] Locking ICCM
28,609,615 UART: [exit] Launching FMC @ 0x40000130
28,618,024 UART:
28,618,262 UART: Running Caliptra FMC ...
28,619,361 UART:
28,619,520 UART: [state] CFI Enabled
28,627,470 UART: [fht] FMC Alias Private Key: 7
30,957,462 UART: [art] Extend RT PCRs Done
30,958,687 UART: [art] Lock RT PCRs Done
30,960,655 UART: [art] Populate DV Done
30,966,169 UART: [fht] FMC Alias Private Key: 7
30,967,866 UART: [art] Derive CDI
30,968,673 UART: [art] Store in in slot 0x4
31,011,055 UART: [art] Derive Key Pair
31,012,096 UART: [art] Store priv key in slot 0x5
34,254,540 UART: [art] Derive Key Pair - Done
34,267,871 UART: [art] Signing Cert with AUTHO
34,269,166 UART: RITY.KEYID = 7
36,548,541 UART: [art] Erasing AUTHORITY.KEYID = 7
36,550,047 UART: [art] PUB.X = E7E2F5AC89E38E12D6B8BE9FE4F312D8C3C3DB7FFBA6DE936CF243C095E73AF861BF72AAC0B96EBB9FD2F553B5758170
36,557,333 UART: [art] PUB.Y = 6F659F5A31E64E8A43F9A37437B19206A2058A02FBED67D924674AB5D3BADB400F4DA627BC8844EA8F6E5F73CD937D2D
36,564,629 UART: [art] SIG.R = 0A6073BC0E90074A774A0FC951B36D021FDE5ACAF2D02D36AAFF803A86B8C0BA534B1BBA10FA86C94E75F786992E364C
36,572,007 UART: [art] SIG.S = 7E685C44C057384D029F117A5A81C4B0CCA88A5AC2B8F212621E6D0D1BA45784882AF58B9121D78CB52EFB249E9E46BD
37,877,849 UART: Caliptra RT
37,878,542 UART: [state] CFI Enabled
37,995,771 UART: [rt] RT listening for mailbox commands...
37,998,085 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,153,511 UART: [rt]cmd =0x41544d4e, len=14344
39,446,567 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
4,128,793 ready_for_fw is high
4,129,445 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,252,938 >>> mbox cmd response: success
27,888,092 UART:
27,888,464 UART: Running Caliptra FMC ...
27,889,795 UART:
27,889,960 UART: [state] CFI Enabled
27,897,751 UART: [fht] FMC Alias Private Key: 7
30,229,049 UART: [art] Extend RT PCRs Done
30,230,268 UART: [art] Lock RT PCRs Done
30,231,973 UART: [art] Populate DV Done
30,237,493 UART: [fht] FMC Alias Private Key: 7
30,238,982 UART: [art] Derive CDI
30,239,738 UART: [art] Store in in slot 0x4
30,282,112 UART: [art] Derive Key Pair
30,283,114 UART: [art] Store priv key in slot 0x5
33,524,939 UART: [art] Derive Key Pair - Done
33,537,993 UART: [art] Signing Cert with AUTHO
33,539,316 UART: RITY.KEYID = 7
35,818,398 UART: [art] Erasing AUTHORITY.KEYID = 7
35,819,905 UART: [art] PUB.X = FD4EB9342F8BEE9B6BCBE8FEF928EF33B9AA933FA8FA174B14EDB8BDE9743CECBB5DDAC8CBC2E6AFB43BDC81BD4B593C
35,827,192 UART: [art] PUB.Y = D030E5F75243C6B5ECE781F22BCC0ACF4AB62F6998349939E04AD157E6FA6E8D42D63E0CBC4EB35BA5047579EBBB74F5
35,834,472 UART: [art] SIG.R = F543AE8DF5E3C166F28BA0EB6881AED688CB30960848EB4D5513FF5AAEE9375F4EAAB167D9D2F2F24C0D68C12E5E7E38
35,841,912 UART: [art] SIG.S = A2851F7117EC3EFD9C7C5D50C1078CB4E7AE6C974703AB15BDBEB19E6B74AB0EF5F6C7CECA2E703F493699A5EDF65D9A
37,146,939 UART: Caliptra RT
37,147,628 UART: [state] CFI Enabled
37,265,290 UART: [rt] RT listening for mailbox commands...
37,267,610 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,422,801 UART: [rt]cmd =0x41544d4e, len=14344
38,716,026 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,170 UART:
192,533 UART: Running Caliptra ROM ...
193,738 UART:
193,896 UART: [state] CFI Enabled
264,371 UART: [state] LifecycleState = Unprovisioned
266,280 UART: [state] DebugLocked = No
267,743 UART: [state] WD Timer not started. Device not locked for debugging
270,992 UART: [kat] SHA2-256
450,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,715 UART: [kat] ++
462,246 UART: [kat] sha1
473,765 UART: [kat] SHA2-256
476,837 UART: [kat] SHA2-384
483,247 UART: [kat] SHA2-512-ACC
486,250 UART: [kat] ECC-384
2,945,571 UART: [kat] HMAC-384Kdf
2,970,686 UART: [kat] LMS
3,500,200 UART: [kat] --
3,503,773 UART: [cold-reset] ++
3,505,777 UART: [fht] FHT @ 0x50003400
3,517,816 UART: [idev] ++
3,518,378 UART: [idev] CDI.KEYID = 6
3,519,292 UART: [idev] SUBJECT.KEYID = 7
3,520,465 UART: [idev] UDS.KEYID = 0
3,521,534 ready_for_fw is high
3,521,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,774 UART: [idev] Erasing UDS.KEYID = 0
6,030,221 UART: [idev] Sha1 KeyId Algorithm
6,053,511 UART: [idev] --
6,056,850 UART: [ldev] ++
6,057,420 UART: [ldev] CDI.KEYID = 6
6,058,333 UART: [ldev] SUBJECT.KEYID = 5
6,059,492 UART: [ldev] AUTHORITY.KEYID = 7
6,060,725 UART: [ldev] FE.KEYID = 1
6,102,052 UART: [ldev] Erasing FE.KEYID = 1
8,606,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,902 UART: [ldev] --
10,418,031 UART: [fwproc] Wait for Commands...
10,420,510 UART: [fwproc] Recv command 0x46574c44
10,422,756 UART: [fwproc] Recv'd Img size: 114448 bytes
15,002,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,076,684 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,145,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,464,424 >>> mbox cmd response: success
15,467,935 UART: [afmc] ++
15,468,528 UART: [afmc] CDI.KEYID = 6
15,469,439 UART: [afmc] SUBJECT.KEYID = 7
15,470,656 UART: [afmc] AUTHORITY.KEYID = 5
18,004,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,728,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,730,803 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,746,747 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,762,756 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,778,471 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,800,322 UART: [afmc] --
19,804,356 UART: [cold-reset] --
19,809,670 UART: [state] Locking Datavault
19,814,962 UART: [state] Locking PCR0, PCR1 and PCR31
19,816,608 UART: [state] Locking ICCM
19,818,920 UART: [exit] Launching FMC @ 0x40000130
19,827,368 UART:
19,827,601 UART: Running Caliptra FMC ...
19,828,701 UART:
19,828,879 UART: [state] CFI Enabled
19,886,168 UART: [fht] FMC Alias Private Key: 7
21,650,222 UART: [art] Extend RT PCRs Done
21,651,441 UART: [art] Lock RT PCRs Done
21,653,123 UART: [art] Populate DV Done
21,658,601 UART: [fht] FMC Alias Private Key: 7
21,660,310 UART: [art] Derive CDI
21,661,126 UART: [art] Store in in slot 0x4
21,719,139 UART: [art] Derive Key Pair
21,720,173 UART: [art] Store priv key in slot 0x5
24,183,170 UART: [art] Derive Key Pair - Done
24,196,322 UART: [art] Signing Cert with AUTHO
24,197,628 UART: RITY.KEYID = 7
25,909,573 UART: [art] Erasing AUTHORITY.KEYID = 7
25,911,088 UART: [art] PUB.X = 5CCF25996EFD97A82B45762C21959139245135662D9A1E10565A2DB502DBE564CE0AE856FC92D69897271096DCEAABA4
25,918,357 UART: [art] PUB.Y = 1EC616E601031277098597C640B707BCA5D15C5B7D75DE31076C1CD524463C9AB7768949F9F1F4213D9F70B902F5F2A6
25,925,598 UART: [art] SIG.R = 48CBF75D5B6322F581024593AFCF91A3BD3B30EEC1451ECE42EF90217684A569282356AAAC63DEC5190667A803827765
25,932,990 UART: [art] SIG.S = 1E3A946B1A53BFE3409619D3FC8E0136B2056554A03004CBC5A3A5E83C328739F7CDA04F65622EF11E38F977C22D2920
26,911,880 UART: Caliptra RT
26,912,565 UART: [state] CFI Enabled
27,078,647 UART: [rt] RT listening for mailbox commands...
27,080,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,236,897 UART: [rt]cmd =0x41544d4e, len=14344
28,203,906 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,377,561 ready_for_fw is high
3,377,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,079,131 >>> mbox cmd response: success
19,365,582 UART:
19,365,976 UART: Running Caliptra FMC ...
19,367,110 UART:
19,367,270 UART: [state] CFI Enabled
19,434,521 UART: [fht] FMC Alias Private Key: 7
21,198,633 UART: [art] Extend RT PCRs Done
21,199,876 UART: [art] Lock RT PCRs Done
21,201,449 UART: [art] Populate DV Done
21,207,169 UART: [fht] FMC Alias Private Key: 7
21,208,725 UART: [art] Derive CDI
21,209,546 UART: [art] Store in in slot 0x4
21,267,342 UART: [art] Derive Key Pair
21,268,372 UART: [art] Store priv key in slot 0x5
23,731,419 UART: [art] Derive Key Pair - Done
23,744,470 UART: [art] Signing Cert with AUTHO
23,745,780 UART: RITY.KEYID = 7
25,457,197 UART: [art] Erasing AUTHORITY.KEYID = 7
25,458,695 UART: [art] PUB.X = 72F1E249AC4B38915E2A90029136B578027D284AFA4E0EA1306E2D047158172C2DF6FB0F40CE3F17638596524E9D14E3
25,465,948 UART: [art] PUB.Y = 8D59320677238BB1FADACBA15BB1CC12C082EAC2A4BDC0C78766EA73F4DC8983ACD5CF0283D2A9C46299E815EE3E96C5
25,473,200 UART: [art] SIG.R = 23130F3085524241ADC9124F6442337E4BC4206214C26C9B0371420D871382B3D28E3566FAA516DAEAF5C1A8F17E7B27
25,480,595 UART: [art] SIG.S = 8A9A628AEAD05548A0D0BC076A7B0B26E717594E3647CF58C127F5741F4E4AB47DAF287DF28BBCC6FF7C037F8813931B
26,459,300 UART: Caliptra RT
26,460,021 UART: [state] CFI Enabled
26,626,154 UART: [rt] RT listening for mailbox commands...
26,628,474 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,784,302 UART: [rt]cmd =0x41544d4e, len=14344
27,751,205 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,400 UART:
192,774 UART: Running Caliptra ROM ...
193,896 UART:
603,618 UART: [state] CFI Enabled
616,068 UART: [state] LifecycleState = Unprovisioned
617,874 UART: [state] DebugLocked = No
620,532 UART: [state] WD Timer not started. Device not locked for debugging
624,765 UART: [kat] SHA2-256
803,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,447 UART: [kat] ++
815,968 UART: [kat] sha1
827,284 UART: [kat] SHA2-256
830,335 UART: [kat] SHA2-384
835,898 UART: [kat] SHA2-512-ACC
838,827 UART: [kat] ECC-384
3,284,211 UART: [kat] HMAC-384Kdf
3,296,631 UART: [kat] LMS
3,826,058 UART: [kat] --
3,829,067 UART: [cold-reset] ++
3,831,515 UART: [fht] FHT @ 0x50003400
3,842,489 UART: [idev] ++
3,843,043 UART: [idev] CDI.KEYID = 6
3,844,075 UART: [idev] SUBJECT.KEYID = 7
3,845,171 UART: [idev] UDS.KEYID = 0
3,846,206 ready_for_fw is high
3,846,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,675 UART: [idev] Erasing UDS.KEYID = 0
6,316,730 UART: [idev] Sha1 KeyId Algorithm
6,340,174 UART: [idev] --
6,345,075 UART: [ldev] ++
6,345,640 UART: [ldev] CDI.KEYID = 6
6,346,713 UART: [ldev] SUBJECT.KEYID = 5
6,347,827 UART: [ldev] AUTHORITY.KEYID = 7
6,349,002 UART: [ldev] FE.KEYID = 1
6,359,942 UART: [ldev] Erasing FE.KEYID = 1
8,830,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,792 UART: [ldev] --
10,619,503 UART: [fwproc] Wait for Commands...
10,621,163 UART: [fwproc] Recv command 0x46574c44
10,623,252 UART: [fwproc] Recv'd Img size: 114448 bytes
15,210,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,286,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,355,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,673,774 >>> mbox cmd response: success
15,678,173 UART: [afmc] ++
15,678,772 UART: [afmc] CDI.KEYID = 6
15,679,679 UART: [afmc] SUBJECT.KEYID = 7
15,680,854 UART: [afmc] AUTHORITY.KEYID = 5
18,181,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,900,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,902,719 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,918,677 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,934,684 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,950,498 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,972,876 UART: [afmc] --
19,976,471 UART: [cold-reset] --
19,982,486 UART: [state] Locking Datavault
19,988,373 UART: [state] Locking PCR0, PCR1 and PCR31
19,990,011 UART: [state] Locking ICCM
19,992,215 UART: [exit] Launching FMC @ 0x40000130
20,000,666 UART:
20,000,904 UART: Running Caliptra FMC ...
20,002,005 UART:
20,002,188 UART: [state] CFI Enabled
20,010,130 UART: [fht] FMC Alias Private Key: 7
21,766,389 UART: [art] Extend RT PCRs Done
21,767,609 UART: [art] Lock RT PCRs Done
21,769,285 UART: [art] Populate DV Done
21,774,692 UART: [fht] FMC Alias Private Key: 7
21,776,398 UART: [art] Derive CDI
21,777,214 UART: [art] Store in in slot 0x4
21,819,969 UART: [art] Derive Key Pair
21,821,004 UART: [art] Store priv key in slot 0x5
24,247,633 UART: [art] Derive Key Pair - Done
24,260,624 UART: [art] Signing Cert with AUTHO
24,261,916 UART: RITY.KEYID = 7
25,966,823 UART: [art] Erasing AUTHORITY.KEYID = 7
25,968,319 UART: [art] PUB.X = AE208FA5D85830A191969A2AC1F0E9DC53DE11407F56D5EDB4F82C2CB3A33750A0DBC2BFDF117C72E1B62BB9597F8C39
25,975,603 UART: [art] PUB.Y = DD5F7D448FA75A334C5EFC123C9AA78B12721E5AD9AC839D9326140911E01707644D199426757D8A38A4077865B9E00A
25,982,830 UART: [art] SIG.R = F30C8EC8DBA4E51E581FDF613E4639AE56D157F97BB86A8F723C8246EC554043102AAD911B224FBF9F4EECCBF1F3D02F
25,990,271 UART: [art] SIG.S = CB6827FC5C0CC48BC4C63B93311D5026E2FE137762CC406A140A2BDFE098F851234766F99EA0900BAE608AAD4C8F4825
26,969,549 UART: Caliptra RT
26,970,253 UART: [state] CFI Enabled
27,086,407 UART: [rt] RT listening for mailbox commands...
27,088,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,244,130 UART: [rt]cmd =0x41544d4e, len=14344
28,211,009 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
3,698,421 ready_for_fw is high
3,698,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,256,108 >>> mbox cmd response: success
19,505,956 UART:
19,506,353 UART: Running Caliptra FMC ...
19,507,539 UART:
19,507,702 UART: [state] CFI Enabled
19,515,541 UART: [fht] FMC Alias Private Key: 7
21,272,428 UART: [art] Extend RT PCRs Done
21,273,649 UART: [art] Lock RT PCRs Done
21,275,298 UART: [art] Populate DV Done
21,280,790 UART: [fht] FMC Alias Private Key: 7
21,282,438 UART: [art] Derive CDI
21,283,171 UART: [art] Store in in slot 0x4
21,325,970 UART: [art] Derive Key Pair
21,326,967 UART: [art] Store priv key in slot 0x5
23,753,788 UART: [art] Derive Key Pair - Done
23,766,404 UART: [art] Signing Cert with AUTHO
23,767,702 UART: RITY.KEYID = 7
25,473,174 UART: [art] Erasing AUTHORITY.KEYID = 7
25,474,698 UART: [art] PUB.X = 8222BBF6E1F5AB06C1E1B56AFB74D818A212463E786F383B17E9F876A96B659D1FDEEED0E670818671E68237328F394F
25,481,943 UART: [art] PUB.Y = 186C846B07B2C1AFBF9F17802C2281FB047E9CDB8599CA09242E11245018594E868AB2D0AC705F6D8C81C4BA99650EB6
25,489,209 UART: [art] SIG.R = 0E87E069FBBFA8240F0C4D8CC0A81270A6B7DA795C4EAB1EB43705AE09331094EF6B21C5B18FC5BA1E49A8528E88E14F
25,496,641 UART: [art] SIG.S = F9D373577D923BFD0FA18B351F2C59119039EDF804A9E9A7261BB553B4528BCC0BD1AAEFAA35229C792309E84D1F2684
26,475,525 UART: Caliptra RT
26,476,221 UART: [state] CFI Enabled
26,593,599 UART: [rt] RT listening for mailbox commands...
26,596,061 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,751,608 UART: [rt]cmd =0x41544d4e, len=14344
27,718,835 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
3,437,113 ready_for_fw is high
3,437,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,835,305 >>> mbox cmd response: success
20,111,079 UART:
20,111,470 UART: Running Caliptra FMC ...
20,112,574 UART:
20,112,728 UART: [state] CFI Enabled
20,181,121 UART: [fht] FMC Alias Private Key: 7
21,944,613 UART: [art] Extend RT PCRs Done
21,945,819 UART: [art] Lock RT PCRs Done
21,947,364 UART: [art] Populate DV Done
21,952,503 UART: [fht] FMC Alias Private Key: 7
21,954,097 UART: [art] Derive CDI
21,954,841 UART: [art] Store in in slot 0x4
22,013,911 UART: [art] Derive Key Pair
22,014,958 UART: [art] Store priv key in slot 0x5
24,478,086 UART: [art] Derive Key Pair - Done
24,491,089 UART: [art] Signing Cert with AUTHO
24,492,397 UART: RITY.KEYID = 7
26,203,638 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,128 UART: [art] PUB.X = DAE9E226FF47E166C2D27531D8124365F4E98A3169DDE90FA0E471306DFC6391301F2A32B9471DD1C5B5577D048F11C2
26,212,424 UART: [art] PUB.Y = 3427DB4B50187BB8578AF545A7F7E1762ADB363E1E32882298AB2ADDEDC997389B7D8319C1887F91D2C14A84D789F22B
26,219,679 UART: [art] SIG.R = 6895B008B7777FE92A185C16949824B7C8FACC83371D17B967F8106C65EB1DFC6FFC8BA475FC9AF91247A6D7E44AE4EA
26,227,509 UART: [art] SIG.S = C1A885A70E3CBFFDC60281416C81B0C652DE014871B1A56FD445A002A9BB2526A2A5AF82C227891BB15323C15DE0232A
27,206,291 UART: Caliptra RT
27,207,009 UART: [state] CFI Enabled
27,371,979 UART: [rt] RT listening for mailbox commands...
27,374,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,530,197 UART: [rt]cmd =0x41544d4e, len=14344
28,497,335 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,755,604 ready_for_fw is high
3,755,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,058,372 >>> mbox cmd response: success
20,313,266 UART:
20,313,678 UART: Running Caliptra FMC ...
20,314,792 UART:
20,314,937 UART: [state] CFI Enabled
20,322,934 UART: [fht] FMC Alias Private Key: 7
22,080,319 UART: [art] Extend RT PCRs Done
22,081,536 UART: [art] Lock RT PCRs Done
22,083,438 UART: [art] Populate DV Done
22,088,683 UART: [fht] FMC Alias Private Key: 7
22,090,275 UART: [art] Derive CDI
22,091,089 UART: [art] Store in in slot 0x4
22,133,745 UART: [art] Derive Key Pair
22,134,800 UART: [art] Store priv key in slot 0x5
24,561,428 UART: [art] Derive Key Pair - Done
24,574,579 UART: [art] Signing Cert with AUTHO
24,575,911 UART: RITY.KEYID = 7
26,281,316 UART: [art] Erasing AUTHORITY.KEYID = 7
26,282,812 UART: [art] PUB.X = 7ECD6AAC7FCAE13251F601F2A564837FFEBC3A888CDE9C0C60BCAA3AC57412A878E3B034C74CAEC0A7B29EE684553354
26,290,095 UART: [art] PUB.Y = 64A25677FEC995C04B8FC2B30A9546C59EE536C07DEFCE06B5F7EEF7387F6B5259C12E7819F6AD3339E320E05DB6B0C7
26,297,398 UART: [art] SIG.R = 6BF252FD7162C4DFD593B5C7B12FDB3685163CC000FFB4AD0B44B4EC585083026449FFDD92049C31BBA6066ABDE63AEB
26,304,779 UART: [art] SIG.S = 90EDE238AD15C32A6E36DFB6B1C9D8E1E1F1F83C04913C33FCE77693B432F8CB5DF57A11024CFC9E0A23B508A3D9291E
27,283,371 UART: Caliptra RT
27,284,057 UART: [state] CFI Enabled
27,401,560 UART: [rt] RT listening for mailbox commands...
27,403,873 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,559,019 UART: [rt]cmd =0x41544d4e, len=14344
28,526,368 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,573 UART: [kat] SHA2-256
892,511 UART: [kat] SHA2-384
895,390 UART: [kat] SHA2-512-ACC
897,291 UART: [kat] ECC-384
902,988 UART: [kat] HMAC-384Kdf
907,564 UART: [kat] LMS
1,475,760 UART: [kat] --
1,476,705 UART: [cold-reset] ++
1,477,063 UART: [fht] Storing FHT @ 0x50003400
1,479,848 UART: [idev] ++
1,480,016 UART: [idev] CDI.KEYID = 6
1,480,376 UART: [idev] SUBJECT.KEYID = 7
1,480,800 UART: [idev] UDS.KEYID = 0
1,481,145 ready_for_fw is high
1,481,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,578 UART: [idev] Erasing UDS.KEYID = 0
1,504,954 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,554 UART: [idev] --
1,514,517 UART: [ldev] ++
1,514,685 UART: [ldev] CDI.KEYID = 6
1,515,048 UART: [ldev] SUBJECT.KEYID = 5
1,515,474 UART: [ldev] AUTHORITY.KEYID = 7
1,515,937 UART: [ldev] FE.KEYID = 1
1,521,017 UART: [ldev] Erasing FE.KEYID = 1
1,546,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,754 UART: [ldev] --
1,585,167 UART: [fwproc] Waiting for Commands...
1,585,984 UART: [fwproc] Received command 0x46574c44
1,586,775 UART: [fwproc] Received Image of size 114448 bytes
5,234,748 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,262,718 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,292,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,428,171 >>> mbox cmd response: success
5,429,429 UART: [afmc] ++
5,429,597 UART: [afmc] CDI.KEYID = 6
5,429,959 UART: [afmc] SUBJECT.KEYID = 7
5,430,384 UART: [afmc] AUTHORITY.KEYID = 5
5,465,270 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,481,312 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,482,092 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,487,801 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,493,693 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,499,394 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,507,208 UART: [afmc] --
5,508,330 UART: [cold-reset] --
5,508,968 UART: [state] Locking Datavault
5,510,415 UART: [state] Locking PCR0, PCR1 and PCR31
5,511,019 UART: [state] Locking ICCM
5,511,441 UART: [exit] Launching FMC @ 0x40000130
5,516,770 UART:
5,516,786 UART: Running Caliptra FMC ...
5,517,194 UART:
5,517,248 UART: [state] CFI Enabled
5,528,208 UART: [fht] FMC Alias Private Key: 7
5,635,996 UART: [art] Extend RT PCRs Done
5,636,424 UART: [art] Lock RT PCRs Done
5,637,854 UART: [art] Populate DV Done
5,646,086 UART: [fht] FMC Alias Private Key: 7
5,647,120 UART: [art] Derive CDI
5,647,400 UART: [art] Store in in slot 0x4
5,733,189 UART: [art] Derive Key Pair
5,733,549 UART: [art] Store priv key in slot 0x5
5,746,987 UART: [art] Derive Key Pair - Done
5,761,752 UART: [art] Signing Cert with AUTHO
5,762,232 UART: RITY.KEYID = 7
5,777,594 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,359 UART: [art] PUB.X = 6D717D6DACD7FE4F8E57AACB06C7BFC90EF683A9090A0B4E8770265276F51EAE2795224CD9810EA6EBF93D2604299E66
5,785,120 UART: [art] PUB.Y = F3E4D5D9CB01D766D82B4FC5583C55E259179C7461C73262E8624845F23566C7BAB1D1E0C0033CDFBC6B1EAC97D8CD32
5,792,074 UART: [art] SIG.R = 877663CD0FEBDC0C42E70F199B9F59F2934B130F602AE10F2DA7C3CD3766C5F0ECE5228DF1A3342804D012A7A6970185
5,798,829 UART: [art] SIG.S = 6832281F14693563E62BF7CB87263783BC3A2956E8AA5E6791DBD2B7EF000780BF4F1D07052FBE8D19AD23316F6FFD51
5,822,301 UART: Caliptra RT
5,822,554 UART: [state] CFI Enabled
5,930,551 UART: [rt] RT listening for mailbox commands...
5,931,221 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,054,607 UART: [rt]cmd =0x41544d4e, len=14344
6,063,168 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,401 ready_for_fw is high
1,362,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,203,419 >>> mbox cmd response: success
5,265,184 UART:
5,265,200 UART: Running Caliptra FMC ...
5,265,608 UART:
5,265,662 UART: [state] CFI Enabled
5,275,878 UART: [fht] FMC Alias Private Key: 7
5,383,792 UART: [art] Extend RT PCRs Done
5,384,220 UART: [art] Lock RT PCRs Done
5,385,614 UART: [art] Populate DV Done
5,393,876 UART: [fht] FMC Alias Private Key: 7
5,395,000 UART: [art] Derive CDI
5,395,280 UART: [art] Store in in slot 0x4
5,481,193 UART: [art] Derive Key Pair
5,481,553 UART: [art] Store priv key in slot 0x5
5,494,883 UART: [art] Derive Key Pair - Done
5,509,650 UART: [art] Signing Cert with AUTHO
5,510,130 UART: RITY.KEYID = 7
5,525,298 UART: [art] Erasing AUTHORITY.KEYID = 7
5,526,063 UART: [art] PUB.X = FDAF004AF12398FC81810872C8751BF1220529668F10DD91571AF471FC15541F339AAF89C81C0D3C1281E6243C8300B4
5,532,776 UART: [art] PUB.Y = EE21467783A800DFD22DB033F39CD974D831985482DEA301F759262E6E261F57C64832F8163B75E26F45C1CA2F160A88
5,539,694 UART: [art] SIG.R = E8850103E1FE4A4927F8F69A8F619ABA47DE64CE77C3F3F99CD217A65F9D20BF0924BB0A9EBA8167CA3B61C54ED532B2
5,546,468 UART: [art] SIG.S = 4AB76089681BC648CE76B84057537877A86C36D3894AE92136B8EE23F33B07C2C9A62EC6768EA863438FED155BA74B6F
5,570,374 UART: Caliptra RT
5,570,627 UART: [state] CFI Enabled
5,678,738 UART: [rt] RT listening for mailbox commands...
5,679,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,802,206 UART: [rt]cmd =0x41544d4e, len=14344
5,810,521 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,954 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,470 UART: [kat] SHA2-256
882,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,516 UART: [kat] ++
886,668 UART: [kat] sha1
890,870 UART: [kat] SHA2-256
892,808 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
903,269 UART: [kat] HMAC-384Kdf
907,919 UART: [kat] LMS
1,476,115 UART: [kat] --
1,476,850 UART: [cold-reset] ++
1,477,372 UART: [fht] Storing FHT @ 0x50003400
1,480,065 UART: [idev] ++
1,480,233 UART: [idev] CDI.KEYID = 6
1,480,593 UART: [idev] SUBJECT.KEYID = 7
1,481,017 UART: [idev] UDS.KEYID = 0
1,481,362 ready_for_fw is high
1,481,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,795 UART: [idev] Erasing UDS.KEYID = 0
1,505,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,323 UART: [idev] --
1,515,262 UART: [ldev] ++
1,515,430 UART: [ldev] CDI.KEYID = 6
1,515,793 UART: [ldev] SUBJECT.KEYID = 5
1,516,219 UART: [ldev] AUTHORITY.KEYID = 7
1,516,682 UART: [ldev] FE.KEYID = 1
1,521,710 UART: [ldev] Erasing FE.KEYID = 1
1,547,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,299 UART: [ldev] --
1,586,714 UART: [fwproc] Waiting for Commands...
1,587,457 UART: [fwproc] Received command 0x46574c44
1,588,248 UART: [fwproc] Received Image of size 114448 bytes
5,122,528 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,150,494 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,179,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,315,933 >>> mbox cmd response: success
5,317,035 UART: [afmc] ++
5,317,203 UART: [afmc] CDI.KEYID = 6
5,317,565 UART: [afmc] SUBJECT.KEYID = 7
5,317,990 UART: [afmc] AUTHORITY.KEYID = 5
5,353,462 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,370,098 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,370,878 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,376,587 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,382,479 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,388,180 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,395,994 UART: [afmc] --
5,397,086 UART: [cold-reset] --
5,398,058 UART: [state] Locking Datavault
5,399,097 UART: [state] Locking PCR0, PCR1 and PCR31
5,399,701 UART: [state] Locking ICCM
5,400,263 UART: [exit] Launching FMC @ 0x40000130
5,405,592 UART:
5,405,608 UART: Running Caliptra FMC ...
5,406,016 UART:
5,406,159 UART: [state] CFI Enabled
5,416,573 UART: [fht] FMC Alias Private Key: 7
5,524,765 UART: [art] Extend RT PCRs Done
5,525,193 UART: [art] Lock RT PCRs Done
5,526,635 UART: [art] Populate DV Done
5,534,637 UART: [fht] FMC Alias Private Key: 7
5,535,569 UART: [art] Derive CDI
5,535,849 UART: [art] Store in in slot 0x4
5,621,392 UART: [art] Derive Key Pair
5,621,752 UART: [art] Store priv key in slot 0x5
5,635,540 UART: [art] Derive Key Pair - Done
5,650,245 UART: [art] Signing Cert with AUTHO
5,650,725 UART: RITY.KEYID = 7
5,665,591 UART: [art] Erasing AUTHORITY.KEYID = 7
5,666,356 UART: [art] PUB.X = 9CE46AA9C68407E2AF50DCF5F0535DF061ACF3E3BBB1E225011E50633729717F5AEBF6C05753555E0C3137DCB3F7F6BB
5,673,131 UART: [art] PUB.Y = CCCF9C19FE03C0BED7732971958D8A913EC7523033A8F2E38734339E3EB60FC81CEC51516F1D0F3DE2870A552DB0F587
5,680,077 UART: [art] SIG.R = CB7AA78F80CA31826A828B22F7B817B72A2F5375E6D11CD75F61988272940B6F17BC45E16648824C4F8F8087A9E22424
5,686,840 UART: [art] SIG.S = D15F86C46A756349CE6D10381743DBD2D74C71CBC27414E8AE51A3BB4CFA141FA618EB73647AAE25C3E685ABC30E16D8
5,710,628 UART: Caliptra RT
5,710,973 UART: [state] CFI Enabled
5,819,577 UART: [rt] RT listening for mailbox commands...
5,820,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,943,075 UART: [rt]cmd =0x41544d4e, len=14344
5,951,582 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,130 ready_for_fw is high
1,363,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,318,345 >>> mbox cmd response: success
5,380,490 UART:
5,380,506 UART: Running Caliptra FMC ...
5,380,914 UART:
5,381,057 UART: [state] CFI Enabled
5,391,651 UART: [fht] FMC Alias Private Key: 7
5,499,507 UART: [art] Extend RT PCRs Done
5,499,935 UART: [art] Lock RT PCRs Done
5,501,227 UART: [art] Populate DV Done
5,509,461 UART: [fht] FMC Alias Private Key: 7
5,510,617 UART: [art] Derive CDI
5,510,897 UART: [art] Store in in slot 0x4
5,596,240 UART: [art] Derive Key Pair
5,596,600 UART: [art] Store priv key in slot 0x5
5,610,116 UART: [art] Derive Key Pair - Done
5,624,980 UART: [art] Signing Cert with AUTHO
5,625,460 UART: RITY.KEYID = 7
5,640,242 UART: [art] Erasing AUTHORITY.KEYID = 7
5,641,007 UART: [art] PUB.X = 018767A46385450EC8EC6A87ABE8AB9F6D437970954FA54823BECEEBF1D3D109C00FB1654012AD83F5C0A9E167F67CE6
5,647,775 UART: [art] PUB.Y = 16A9835CE7539E873F00EA62C5E411B3248A98F6464A587C7C4EB8351B265A8447D7AD27A2990682BD9D3303DE21B904
5,654,690 UART: [art] SIG.R = 801A694AFFCFCD3F4DFCEB13BC3AB82AE7ED69634FEEA29DF20E3C56CA07C132222E55D0AF50BE845AE7F40BB1977BE2
5,661,481 UART: [art] SIG.S = 05114FB4F297A7666365B89A4A5323391C7F6C62974F3A10A9B1DBD12E7826A2EE707BD777A1696F9DE9759E1004BE1F
5,685,818 UART: Caliptra RT
5,686,163 UART: [state] CFI Enabled
5,794,962 UART: [rt] RT listening for mailbox commands...
5,795,632 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,918,772 UART: [rt]cmd =0x41544d4e, len=14344
5,927,511 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
88,050 UART: [kat] SHA2-256
893,700 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,825 UART: [kat] ++
897,977 UART: [kat] sha1
902,195 UART: [kat] SHA2-256
904,135 UART: [kat] SHA2-384
906,872 UART: [kat] SHA2-512-ACC
908,773 UART: [kat] ECC-384
918,602 UART: [kat] HMAC-384Kdf
923,428 UART: [kat] LMS
1,171,756 UART: [kat] --
1,172,769 UART: [cold-reset] ++
1,173,289 UART: [fht] FHT @ 0x50003400
1,175,780 UART: [idev] ++
1,175,948 UART: [idev] CDI.KEYID = 6
1,176,308 UART: [idev] SUBJECT.KEYID = 7
1,176,732 UART: [idev] UDS.KEYID = 0
1,177,077 ready_for_fw is high
1,177,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,646 UART: [idev] Erasing UDS.KEYID = 0
1,201,761 UART: [idev] Sha1 KeyId Algorithm
1,210,091 UART: [idev] --
1,211,273 UART: [ldev] ++
1,211,441 UART: [ldev] CDI.KEYID = 6
1,211,804 UART: [ldev] SUBJECT.KEYID = 5
1,212,230 UART: [ldev] AUTHORITY.KEYID = 7
1,212,693 UART: [ldev] FE.KEYID = 1
1,218,013 UART: [ldev] Erasing FE.KEYID = 1
1,244,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,947 UART: [ldev] --
1,283,448 UART: [fwproc] Wait for Commands...
1,284,224 UART: [fwproc] Recv command 0x46574c44
1,284,952 UART: [fwproc] Recv'd Img size: 114448 bytes
3,123,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,635 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,316,676 >>> mbox cmd response: success
3,317,740 UART: [afmc] ++
3,317,908 UART: [afmc] CDI.KEYID = 6
3,318,270 UART: [afmc] SUBJECT.KEYID = 7
3,318,695 UART: [afmc] AUTHORITY.KEYID = 5
3,354,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,836 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,545 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,437 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,148 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,061 UART: [afmc] --
3,398,151 UART: [cold-reset] --
3,399,003 UART: [state] Locking Datavault
3,400,120 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,724 UART: [state] Locking ICCM
3,401,186 UART: [exit] Launching FMC @ 0x40000130
3,406,515 UART:
3,406,531 UART: Running Caliptra FMC ...
3,406,939 UART:
3,406,993 UART: [state] CFI Enabled
3,417,377 UART: [fht] FMC Alias Private Key: 7
3,525,195 UART: [art] Extend RT PCRs Done
3,525,623 UART: [art] Lock RT PCRs Done
3,527,059 UART: [art] Populate DV Done
3,535,479 UART: [fht] FMC Alias Private Key: 7
3,536,445 UART: [art] Derive CDI
3,536,725 UART: [art] Store in in slot 0x4
3,622,396 UART: [art] Derive Key Pair
3,622,756 UART: [art] Store priv key in slot 0x5
3,635,446 UART: [art] Derive Key Pair - Done
3,649,925 UART: [art] Signing Cert with AUTHO
3,650,405 UART: RITY.KEYID = 7
3,665,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,420 UART: [art] PUB.X = ED54EE5E7D3487BBAFFA4D64B956964EBB1931099314B4F166E3ADB72BA640E2FBC0E4C04A712098BA0E2E1538CC80D9
3,673,200 UART: [art] PUB.Y = C11BB07AB0EB767D33E1677DBE4C76B70849B1078B8BE52F4DA24E7147F15095974A0B0A35433FD808204C371B45CFF5
3,680,139 UART: [art] SIG.R = 877A44217E96E8DB82EFD6D744C3E9C4D95D88B5118480475F05B8801A4167C0ADFEC2E6795C7C0CA1A21A21519EDAB8
3,686,911 UART: [art] SIG.S = A5CBD2CD52651B5BE23A82CDFC2ABF0917B805E23429C975C9C9C44CE08C346807E651FF340261C8EE34FC0F78B220B2
3,710,699 UART: Caliptra RT
3,710,952 UART: [state] CFI Enabled
3,818,375 UART: [rt] RT listening for mailbox commands...
3,819,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,897 UART: [rt]cmd =0x41544d4e, len=14344
3,950,116 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,863 ready_for_fw is high
1,060,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,172,747 >>> mbox cmd response: success
3,235,172 UART:
3,235,188 UART: Running Caliptra FMC ...
3,235,596 UART:
3,235,650 UART: [state] CFI Enabled
3,246,388 UART: [fht] FMC Alias Private Key: 7
3,353,988 UART: [art] Extend RT PCRs Done
3,354,416 UART: [art] Lock RT PCRs Done
3,356,022 UART: [art] Populate DV Done
3,364,256 UART: [fht] FMC Alias Private Key: 7
3,365,298 UART: [art] Derive CDI
3,365,578 UART: [art] Store in in slot 0x4
3,450,877 UART: [art] Derive Key Pair
3,451,237 UART: [art] Store priv key in slot 0x5
3,464,631 UART: [art] Derive Key Pair - Done
3,479,346 UART: [art] Signing Cert with AUTHO
3,479,826 UART: RITY.KEYID = 7
3,494,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,637 UART: [art] PUB.X = A5363D8C06CD0C727476203592ED083CACE96CE95161BE7ADFDA8386F9403D9EDC74E036AB6993C91D3F9C29EAB3146F
3,502,410 UART: [art] PUB.Y = 0EC64D25D253E197233E35AE484EB5918759EF413146F199346230B1C06CC32734F3144DBB5DE4AD2F4DE247970F1AB4
3,509,354 UART: [art] SIG.R = 34FA8D6DBA1965BF061646CDEFCC6B2A0D995C1903EC9FB41D443678D5B7C821963DF711DD231E9D15791FF215D19F0C
3,516,124 UART: [art] SIG.S = 4F07AE32B9EB40315F1EC6DAFE7CF981E337F21B34F119D61B909ABE393FA033926C96417BA5D20F3A10E6CBC18F926C
3,540,025 UART: Caliptra RT
3,540,278 UART: [state] CFI Enabled
3,647,961 UART: [rt] RT listening for mailbox commands...
3,648,631 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,749 UART: [rt]cmd =0x41544d4e, len=14344
3,780,666 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,160 UART: [kat] SHA2-256
904,100 UART: [kat] SHA2-384
906,893 UART: [kat] SHA2-512-ACC
908,794 UART: [kat] ECC-384
918,579 UART: [kat] HMAC-384Kdf
923,157 UART: [kat] LMS
1,171,485 UART: [kat] --
1,172,298 UART: [cold-reset] ++
1,172,860 UART: [fht] FHT @ 0x50003400
1,175,369 UART: [idev] ++
1,175,537 UART: [idev] CDI.KEYID = 6
1,175,897 UART: [idev] SUBJECT.KEYID = 7
1,176,321 UART: [idev] UDS.KEYID = 0
1,176,666 ready_for_fw is high
1,176,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,079 UART: [idev] Erasing UDS.KEYID = 0
1,201,518 UART: [idev] Sha1 KeyId Algorithm
1,210,036 UART: [idev] --
1,210,998 UART: [ldev] ++
1,211,166 UART: [ldev] CDI.KEYID = 6
1,211,529 UART: [ldev] SUBJECT.KEYID = 5
1,211,955 UART: [ldev] AUTHORITY.KEYID = 7
1,212,418 UART: [ldev] FE.KEYID = 1
1,218,024 UART: [ldev] Erasing FE.KEYID = 1
1,244,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,996 UART: [ldev] --
1,284,449 UART: [fwproc] Wait for Commands...
1,285,261 UART: [fwproc] Recv command 0x46574c44
1,285,989 UART: [fwproc] Recv'd Img size: 114448 bytes
3,129,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,323,153 >>> mbox cmd response: success
3,324,315 UART: [afmc] ++
3,324,483 UART: [afmc] CDI.KEYID = 6
3,324,845 UART: [afmc] SUBJECT.KEYID = 7
3,325,270 UART: [afmc] AUTHORITY.KEYID = 5
3,360,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,655 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,364 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,256 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,967 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,828 UART: [afmc] --
3,403,938 UART: [cold-reset] --
3,404,846 UART: [state] Locking Datavault
3,406,223 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,827 UART: [state] Locking ICCM
3,407,405 UART: [exit] Launching FMC @ 0x40000130
3,412,734 UART:
3,412,750 UART: Running Caliptra FMC ...
3,413,158 UART:
3,413,301 UART: [state] CFI Enabled
3,424,269 UART: [fht] FMC Alias Private Key: 7
3,532,275 UART: [art] Extend RT PCRs Done
3,532,703 UART: [art] Lock RT PCRs Done
3,534,321 UART: [art] Populate DV Done
3,542,751 UART: [fht] FMC Alias Private Key: 7
3,543,787 UART: [art] Derive CDI
3,544,067 UART: [art] Store in in slot 0x4
3,629,660 UART: [art] Derive Key Pair
3,630,020 UART: [art] Store priv key in slot 0x5
3,643,282 UART: [art] Derive Key Pair - Done
3,658,141 UART: [art] Signing Cert with AUTHO
3,658,621 UART: RITY.KEYID = 7
3,673,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,058 UART: [art] PUB.X = 00C060CCE7C1D2B01082A535C602C9B053D63216D03486C891D65310DA1135A472CB95529D715D5BB91466FC71383460
3,680,793 UART: [art] PUB.Y = 509891D37E7E28008E24C1424DF38C7385DE5670DB8E68EB59DC3EC138862B1BAABBF8378045A2EB4DF436172B98C9B9
3,687,727 UART: [art] SIG.R = 40ECB3ADF3029E5EAD2A041683DBE48DAFC524D0D1EAB5EA1277EB7D45BE1C0452650D9F85951E65F8309C81449B621F
3,694,499 UART: [art] SIG.S = 7A61FE3648AE4ADA463A013D1BDA202DB7C94080D439EE43782E6B5783C1826867EC11673C838C2060D8A7BD1A16AB9A
3,718,859 UART: Caliptra RT
3,719,204 UART: [state] CFI Enabled
3,826,755 UART: [rt] RT listening for mailbox commands...
3,827,425 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,399 UART: [rt]cmd =0x41544d4e, len=14344
3,958,950 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,392 ready_for_fw is high
1,060,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,168,219 >>> mbox cmd response: success
3,230,736 UART:
3,230,752 UART: Running Caliptra FMC ...
3,231,160 UART:
3,231,303 UART: [state] CFI Enabled
3,241,771 UART: [fht] FMC Alias Private Key: 7
3,349,261 UART: [art] Extend RT PCRs Done
3,349,689 UART: [art] Lock RT PCRs Done
3,351,421 UART: [art] Populate DV Done
3,359,673 UART: [fht] FMC Alias Private Key: 7
3,360,687 UART: [art] Derive CDI
3,360,967 UART: [art] Store in in slot 0x4
3,446,506 UART: [art] Derive Key Pair
3,446,866 UART: [art] Store priv key in slot 0x5
3,459,798 UART: [art] Derive Key Pair - Done
3,474,734 UART: [art] Signing Cert with AUTHO
3,475,214 UART: RITY.KEYID = 7
3,490,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,873 UART: [art] PUB.X = CD117C430C8163D0E602E0216903EE0D3A28E2526A1D05181F30797838275B8E7C0D815CFBB68DF3D3CD3AA132648480
3,497,623 UART: [art] PUB.Y = 90721C02B3B7977D180DF6EAE8F2B314E4750A2E11D69A0F98B6FAEC1BAE9A78564A18CAC5AA16E62EFA10F2156C3488
3,504,575 UART: [art] SIG.R = C5D29415D2945D790D53B6EA8A3F0DD4381BBD0EB5ECE3E68881F2822B32EF31874ACB3EB1120AF5CFA5CE209EFAD182
3,511,353 UART: [art] SIG.S = F5C26755EED8ADCD7BFEFE45558D0DDD247260641CEF2FEEB127A8D764454D0E0F3DE3AB5B03102D470508A50813502D
3,535,109 UART: Caliptra RT
3,535,454 UART: [state] CFI Enabled
3,643,033 UART: [rt] RT listening for mailbox commands...
3,643,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,997 UART: [rt]cmd =0x41544d4e, len=14344
3,775,592 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,296 UART: [kat] SHA2-512-ACC
906,197 UART: [kat] ECC-384
915,826 UART: [kat] HMAC-384Kdf
920,254 UART: [kat] LMS
1,168,566 UART: [kat] --
1,169,487 UART: [cold-reset] ++
1,170,007 UART: [fht] FHT @ 0x50003400
1,172,565 UART: [idev] ++
1,172,733 UART: [idev] CDI.KEYID = 6
1,173,094 UART: [idev] SUBJECT.KEYID = 7
1,173,519 UART: [idev] UDS.KEYID = 0
1,173,865 ready_for_fw is high
1,173,865 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,251 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,207,085 UART: [idev] --
1,208,306 UART: [ldev] ++
1,208,474 UART: [ldev] CDI.KEYID = 6
1,208,838 UART: [ldev] SUBJECT.KEYID = 5
1,209,265 UART: [ldev] AUTHORITY.KEYID = 7
1,209,728 UART: [ldev] FE.KEYID = 1
1,214,818 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,252 UART: [ldev] --
1,280,516 UART: [fwproc] Wait for Commands...
1,281,285 UART: [fwproc] Recv command 0x46574c44
1,282,018 UART: [fwproc] Recv'd Img size: 114448 bytes
3,127,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,237 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,321,454 >>> mbox cmd response: success
3,322,715 UART: [afmc] ++
3,322,883 UART: [afmc] CDI.KEYID = 6
3,323,246 UART: [afmc] SUBJECT.KEYID = 7
3,323,672 UART: [afmc] AUTHORITY.KEYID = 5
3,358,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,683 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,393 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,283 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,994 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,814 UART: [afmc] --
3,401,702 UART: [cold-reset] --
3,402,444 UART: [state] Locking Datavault
3,403,569 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,173 UART: [state] Locking ICCM
3,404,675 UART: [exit] Launching FMC @ 0x40000130
3,410,004 UART:
3,410,020 UART: Running Caliptra FMC ...
3,410,428 UART:
3,410,482 UART: [state] CFI Enabled
3,420,830 UART: [fht] FMC Alias Private Key: 7
3,529,020 UART: [art] Extend RT PCRs Done
3,529,448 UART: [art] Lock RT PCRs Done
3,530,834 UART: [art] Populate DV Done
3,539,080 UART: [fht] FMC Alias Private Key: 7
3,540,030 UART: [art] Derive CDI
3,540,310 UART: [art] Store in in slot 0x4
3,626,021 UART: [art] Derive Key Pair
3,626,381 UART: [art] Store priv key in slot 0x5
3,639,725 UART: [art] Derive Key Pair - Done
3,654,567 UART: [art] Signing Cert with AUTHO
3,655,047 UART: RITY.KEYID = 7
3,670,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,942 UART: [art] PUB.X = F6AB0CBDD5A426337B79BDD49CBB502D367CB2624B17F447454DF8A2F443CDE850BE53DD12413D42E767CAD728BF785E
3,677,725 UART: [art] PUB.Y = 8301249464C07ED99D4EB6A3CADF94F81ACF961CC30E891BCF45540C5AA12FEB3D20D6079595C5B3D30A440CA15836FC
3,684,669 UART: [art] SIG.R = 36CC2F2ED3902B3E4FC1E739657F204C74C570BBAA2C3D8723C42EA291AEB4E3A3C0F96669389F23519FD04EC53A9F0A
3,691,448 UART: [art] SIG.S = 6649540CFB6774435388E477218B7968A42982467678CD16CB7DDCC180E5D5C10565852796478740A3BCF349530E7FBD
3,715,588 UART: Caliptra RT
3,715,841 UART: [state] CFI Enabled
3,824,494 UART: [rt] RT listening for mailbox commands...
3,825,164 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,230 UART: [rt]cmd =0x41544d4e, len=14344
3,956,755 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,598 ready_for_fw is high
1,055,598 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,167,653 >>> mbox cmd response: success
3,229,622 UART:
3,229,638 UART: Running Caliptra FMC ...
3,230,046 UART:
3,230,100 UART: [state] CFI Enabled
3,240,708 UART: [fht] FMC Alias Private Key: 7
3,348,506 UART: [art] Extend RT PCRs Done
3,348,934 UART: [art] Lock RT PCRs Done
3,350,758 UART: [art] Populate DV Done
3,359,196 UART: [fht] FMC Alias Private Key: 7
3,360,350 UART: [art] Derive CDI
3,360,630 UART: [art] Store in in slot 0x4
3,446,421 UART: [art] Derive Key Pair
3,446,781 UART: [art] Store priv key in slot 0x5
3,460,207 UART: [art] Derive Key Pair - Done
3,474,904 UART: [art] Signing Cert with AUTHO
3,475,384 UART: RITY.KEYID = 7
3,490,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,325 UART: [art] PUB.X = ED43EC9C9A07E8C6A30F5BDB716BE5DBDAB5093740F1BD8A22370D31ECAB1391B0CB6B339BC11DC565E6CFAC5218A848
3,498,107 UART: [art] PUB.Y = 5880E1DFA9C02FCA4F5485E602919EA8393F328626D6E98CED06CCADB8FD3A01931107B023775AF125C34B5083690D8C
3,505,046 UART: [art] SIG.R = 0B0C3B775CBBBEE13E9CACD9F7405375715452BD8E1C5D07679BCA4002CB70D86E558D6084FEDD7084FB8BB4D5259DB7
3,511,820 UART: [art] SIG.S = 319B0A4270A046144783973AA36207D768C1D98D473229CA05DF3E9D87EB472F0C127F404784B99CD8E19014B7F46BF8
3,535,307 UART: Caliptra RT
3,535,560 UART: [state] CFI Enabled
3,642,569 UART: [rt] RT listening for mailbox commands...
3,643,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,499 UART: [rt]cmd =0x41544d4e, len=14344
3,774,674 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,949 UART: [state] LifecycleState = Unprovisioned
85,604 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,561 UART: [kat] SHA2-256
891,111 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,240 UART: [kat] ++
895,392 UART: [kat] sha1
899,536 UART: [kat] SHA2-256
901,476 UART: [kat] SHA2-384
904,199 UART: [kat] SHA2-512-ACC
906,100 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,169,914 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,173,044 UART: [idev] ++
1,173,212 UART: [idev] CDI.KEYID = 6
1,173,573 UART: [idev] SUBJECT.KEYID = 7
1,173,998 UART: [idev] UDS.KEYID = 0
1,174,344 ready_for_fw is high
1,174,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,078 UART: [idev] Sha1 KeyId Algorithm
1,208,034 UART: [idev] --
1,209,251 UART: [ldev] ++
1,209,419 UART: [ldev] CDI.KEYID = 6
1,209,783 UART: [ldev] SUBJECT.KEYID = 5
1,210,210 UART: [ldev] AUTHORITY.KEYID = 7
1,210,673 UART: [ldev] FE.KEYID = 1
1,215,763 UART: [ldev] Erasing FE.KEYID = 1
1,242,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,283 UART: [ldev] --
1,281,549 UART: [fwproc] Wait for Commands...
1,282,192 UART: [fwproc] Recv command 0x46574c44
1,282,925 UART: [fwproc] Recv'd Img size: 114448 bytes
3,125,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,318,276 >>> mbox cmd response: success
3,319,343 UART: [afmc] ++
3,319,511 UART: [afmc] CDI.KEYID = 6
3,319,874 UART: [afmc] SUBJECT.KEYID = 7
3,320,300 UART: [afmc] AUTHORITY.KEYID = 5
3,355,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,681 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,391 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,281 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,992 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,890 UART: [afmc] --
3,398,984 UART: [cold-reset] --
3,399,750 UART: [state] Locking Datavault
3,400,687 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,291 UART: [state] Locking ICCM
3,401,881 UART: [exit] Launching FMC @ 0x40000130
3,407,210 UART:
3,407,226 UART: Running Caliptra FMC ...
3,407,634 UART:
3,407,777 UART: [state] CFI Enabled
3,418,643 UART: [fht] FMC Alias Private Key: 7
3,526,913 UART: [art] Extend RT PCRs Done
3,527,341 UART: [art] Lock RT PCRs Done
3,528,839 UART: [art] Populate DV Done
3,536,983 UART: [fht] FMC Alias Private Key: 7
3,537,937 UART: [art] Derive CDI
3,538,217 UART: [art] Store in in slot 0x4
3,623,972 UART: [art] Derive Key Pair
3,624,332 UART: [art] Store priv key in slot 0x5
3,637,446 UART: [art] Derive Key Pair - Done
3,652,517 UART: [art] Signing Cert with AUTHO
3,652,997 UART: RITY.KEYID = 7
3,668,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,068 UART: [art] PUB.X = D51288ACFFFA0580065B4F267B0DEA1A701C0257AD6B8565F41E42706E0B9ADD7F5C2834566087E6A693AD7BF224ECDB
3,675,835 UART: [art] PUB.Y = FC2387F793D207F298B160880A85BFC16FE65BF57E9E9AC2D5AA5720DAE85D0B2A61A21EE82A1BF1F12C5C9299672968
3,682,786 UART: [art] SIG.R = 975BF1B4CD49C7ABC6025D6F6B0BFE2BE2BF59BB4DCEBCECADC1DEFFDDB8FCBE25425D1B2A4B2D8417ED4F2F38B523DD
3,689,596 UART: [art] SIG.S = 3F1CFE163D85712AECD3C5EFBE1EC5EE16814515006453CF34598E9610C00C0F4740C8D6AA570E50BC5F349ECA76579E
3,713,250 UART: Caliptra RT
3,713,595 UART: [state] CFI Enabled
3,822,051 UART: [rt] RT listening for mailbox commands...
3,822,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,539 UART: [rt]cmd =0x41544d4e, len=14344
3,954,068 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,225 ready_for_fw is high
1,055,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,168,228 >>> mbox cmd response: success
3,230,769 UART:
3,230,785 UART: Running Caliptra FMC ...
3,231,193 UART:
3,231,336 UART: [state] CFI Enabled
3,242,166 UART: [fht] FMC Alias Private Key: 7
3,349,952 UART: [art] Extend RT PCRs Done
3,350,380 UART: [art] Lock RT PCRs Done
3,352,002 UART: [art] Populate DV Done
3,360,240 UART: [fht] FMC Alias Private Key: 7
3,361,310 UART: [art] Derive CDI
3,361,590 UART: [art] Store in in slot 0x4
3,447,415 UART: [art] Derive Key Pair
3,447,775 UART: [art] Store priv key in slot 0x5
3,460,959 UART: [art] Derive Key Pair - Done
3,475,879 UART: [art] Signing Cert with AUTHO
3,476,359 UART: RITY.KEYID = 7
3,492,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,862 UART: [art] PUB.X = 58795DE81CE06B784F8124518E4F6FB1B798D4DB4F127A82ABEAC97F2F05B94F3029064E3A53F24FA32CB33965FBC559
3,499,634 UART: [art] PUB.Y = 0648A93A1028B654CD902CB9DAEEBBD648058E99E7AE245379EC5322E58AEE5FE3991F428FB904D3F926CE8CB0E34111
3,506,585 UART: [art] SIG.R = CF42A55B7D096ACC07B12F1350CE78F17656AB80E948F9CD9D93D3178DA3CFC80E64FC4500DCA76A257DA72DC2B93AED
3,513,344 UART: [art] SIG.S = A69D0F9CD72E0DD4F1C4528D35D8D8EFC1FC6CEEE2EDF58F9CE3B8693B007066CE89A747FDDB2599211A10D0AB09B3E5
3,536,980 UART: Caliptra RT
3,537,325 UART: [state] CFI Enabled
3,644,010 UART: [rt] RT listening for mailbox commands...
3,644,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,648 UART: [rt]cmd =0x41544d4e, len=14344
3,776,265 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,074 UART:
192,432 UART: Running Caliptra ROM ...
193,612 UART:
193,759 UART: [state] CFI Enabled
263,790 UART: [state] LifecycleState = Unprovisioned
265,717 UART: [state] DebugLocked = No
267,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,322 UART: [kat] SHA2-256
443,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,576 UART: [kat] ++
454,109 UART: [kat] sha1
465,237 UART: [kat] SHA2-256
467,935 UART: [kat] SHA2-384
473,215 UART: [kat] SHA2-512-ACC
475,582 UART: [kat] ECC-384
2,767,907 UART: [kat] HMAC-384Kdf
2,800,321 UART: [kat] LMS
3,990,605 UART: [kat] --
3,995,557 UART: [cold-reset] ++
3,997,354 UART: [fht] Storing FHT @ 0x50003400
4,008,268 UART: [idev] ++
4,008,916 UART: [idev] CDI.KEYID = 6
4,009,832 UART: [idev] SUBJECT.KEYID = 7
4,011,082 UART: [idev] UDS.KEYID = 0
4,012,156 ready_for_fw is high
4,012,357 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,860 UART: [idev] Erasing UDS.KEYID = 0
7,345,562 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,394 UART: [idev] --
7,370,984 UART: [ldev] ++
7,371,552 UART: [ldev] CDI.KEYID = 6
7,372,487 UART: [ldev] SUBJECT.KEYID = 5
7,373,748 UART: [ldev] AUTHORITY.KEYID = 7
7,375,032 UART: [ldev] FE.KEYID = 1
7,420,736 UART: [ldev] Erasing FE.KEYID = 1
10,754,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,933 UART: [ldev] --
13,135,365 UART: [fwproc] Waiting for Commands...
13,138,159 UART: [fwproc] Received command 0x46574c44
13,140,396 UART: [fwproc] Received Image of size 114124 bytes
17,193,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,276,951 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,345,803 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,662,558 >>> mbox cmd response: success
17,666,424 UART: [afmc] ++
17,667,011 UART: [afmc] CDI.KEYID = 6
17,667,948 UART: [afmc] SUBJECT.KEYID = 7
17,669,174 UART: [afmc] AUTHORITY.KEYID = 5
21,026,026 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,735 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,179 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,962 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,418 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,765 UART: [afmc] --
23,396,867 UART: [cold-reset] --
23,401,645 UART: [state] Locking Datavault
23,405,920 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,674 UART: [state] Locking ICCM
23,408,800 UART: [exit] Launching FMC @ 0x40000130
23,417,195 UART:
23,417,615 UART: Running Caliptra FMC ...
23,418,761 UART:
23,418,925 UART: [state] CFI Enabled
23,484,541 UART: [fht] FMC Alias Private Key: 7
25,822,242 UART: [art] Extend RT PCRs Done
25,823,460 UART: [art] Lock RT PCRs Done
25,825,084 UART: [art] Populate DV Done
25,830,496 UART: [fht] FMC Alias Private Key: 7
25,832,085 UART: [art] Derive CDI
25,832,907 UART: [art] Store in in slot 0x4
25,892,268 UART: [art] Derive Key Pair
25,893,272 UART: [art] Store priv key in slot 0x5
29,186,184 UART: [art] Derive Key Pair - Done
29,199,059 UART: [art] Signing Cert with AUTHO
29,200,376 UART: RITY.KEYID = 7
31,489,675 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,181 UART: [art] PUB.X = 7759B9E5A6EFC68B0819BD51AD9710E939F4FD754E76A903FF0D0B05A977ED6EFFF9999B660D01BB2F8548F74EA60ECE
31,498,468 UART: [art] PUB.Y = F42DBAB6BCBE936B9F30F657E5BCE8D9069EE2BABFAE9A6C90AAEDB175C5185A768EC9E15F88C8E5CB3251924E2BB12A
31,505,708 UART: [art] SIG.R = A177151E50870275DCAD28621A6CE5F5E26E14DEC60FA02766D70E1FC9A9923ED10EDC358373E266D0B65DC46E907D20
31,513,099 UART: [art] SIG.S = C4EB26CFEB5477DA0EA74E63ABD1B05BA29694A3D018DCC6B0C8A52153B8BA5B33D262021D97FA1CC659A250235DF3AC
32,817,845 UART: Caliptra RT
32,818,553 UART: [state] CFI Enabled
32,981,136 UART: [rt] RT listening for mailbox commands...
32,983,479 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,138,601 UART: [rt]cmd =0x41544d4e, len=14344
38,374,100 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,784,862 ready_for_fw is high
3,785,285 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,849,519 >>> mbox cmd response: success
23,551,084 UART:
23,551,464 UART: Running Caliptra FMC ...
23,552,669 UART:
23,552,838 UART: [state] CFI Enabled
23,617,042 UART: [fht] FMC Alias Private Key: 7
25,954,815 UART: [art] Extend RT PCRs Done
25,956,067 UART: [art] Lock RT PCRs Done
25,957,546 UART: [art] Populate DV Done
25,962,966 UART: [fht] FMC Alias Private Key: 7
25,964,510 UART: [art] Derive CDI
25,965,336 UART: [art] Store in in slot 0x4
26,024,994 UART: [art] Derive Key Pair
26,026,041 UART: [art] Store priv key in slot 0x5
29,319,150 UART: [art] Derive Key Pair - Done
29,332,417 UART: [art] Signing Cert with AUTHO
29,333,755 UART: RITY.KEYID = 7
31,620,103 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,602 UART: [art] PUB.X = 13B1335EC21A074B47C3B8571C35CADBEF73C8A3CC8173BCA8793DF170ABD5395F81652C20CC4FC3E88646BE5976043B
31,628,868 UART: [art] PUB.Y = 8A2BF582903FC48293297E2D04A510C246CD94831D9BFB6074A05CD8FC51D81AD8757A98273BEBB296BCD5CF7848D91F
31,636,098 UART: [art] SIG.R = CE35E08032BC5CB24D89D96833979F6460D781AF53765DA86EF8217A87B52692EE14CA29E6E97986C887FBCBEF6DA5ED
31,643,474 UART: [art] SIG.S = 0F3E17490460E6BC91504DA5BEF4C6530440B136F587EFDCEE5C136E4388E1370236BB83010691AE379D16BFC21BA84E
32,948,908 UART: Caliptra RT
32,949,635 UART: [state] CFI Enabled
33,109,850 UART: [rt] RT listening for mailbox commands...
33,112,153 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,267,432 UART: [rt]cmd =0x41544d4e, len=14344
38,503,406 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,337 UART:
192,700 UART: Running Caliptra ROM ...
194,015 UART:
603,515 UART: [state] CFI Enabled
619,875 UART: [state] LifecycleState = Unprovisioned
621,823 UART: [state] DebugLocked = No
624,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,046 UART: [kat] SHA2-256
799,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,310 UART: [kat] ++
810,790 UART: [kat] sha1
821,729 UART: [kat] SHA2-256
824,452 UART: [kat] SHA2-384
830,581 UART: [kat] SHA2-512-ACC
832,993 UART: [kat] ECC-384
3,116,315 UART: [kat] HMAC-384Kdf
3,127,947 UART: [kat] LMS
4,318,065 UART: [kat] --
4,322,658 UART: [cold-reset] ++
4,324,090 UART: [fht] Storing FHT @ 0x50003400
4,335,282 UART: [idev] ++
4,335,852 UART: [idev] CDI.KEYID = 6
4,336,879 UART: [idev] SUBJECT.KEYID = 7
4,338,050 UART: [idev] UDS.KEYID = 0
4,339,152 ready_for_fw is high
4,339,385 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,768 UART: [idev] Erasing UDS.KEYID = 0
7,622,738 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,288 UART: [idev] --
7,648,279 UART: [ldev] ++
7,648,850 UART: [ldev] CDI.KEYID = 6
7,649,812 UART: [ldev] SUBJECT.KEYID = 5
7,651,014 UART: [ldev] AUTHORITY.KEYID = 7
7,652,241 UART: [ldev] FE.KEYID = 1
7,663,118 UART: [ldev] Erasing FE.KEYID = 1
10,953,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,138 UART: [ldev] --
13,315,351 UART: [fwproc] Waiting for Commands...
13,317,801 UART: [fwproc] Received command 0x46574c44
13,319,987 UART: [fwproc] Received Image of size 114124 bytes
17,370,277 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,657 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,525 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,184 >>> mbox cmd response: success
17,834,527 UART: [afmc] ++
17,835,171 UART: [afmc] CDI.KEYID = 6
17,836,092 UART: [afmc] SUBJECT.KEYID = 7
17,837,306 UART: [afmc] AUTHORITY.KEYID = 5
21,154,521 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,451 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,708 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,093 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,949 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,364 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,845 UART: [afmc] --
23,520,923 UART: [cold-reset] --
23,524,462 UART: [state] Locking Datavault
23,530,408 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,159 UART: [state] Locking ICCM
23,533,547 UART: [exit] Launching FMC @ 0x40000130
23,541,942 UART:
23,542,172 UART: Running Caliptra FMC ...
23,543,288 UART:
23,543,444 UART: [state] CFI Enabled
23,551,438 UART: [fht] FMC Alias Private Key: 7
25,882,353 UART: [art] Extend RT PCRs Done
25,883,576 UART: [art] Lock RT PCRs Done
25,885,247 UART: [art] Populate DV Done
25,890,654 UART: [fht] FMC Alias Private Key: 7
25,892,197 UART: [art] Derive CDI
25,893,007 UART: [art] Store in in slot 0x4
25,935,386 UART: [art] Derive Key Pair
25,936,381 UART: [art] Store priv key in slot 0x5
29,178,572 UART: [art] Derive Key Pair - Done
29,191,669 UART: [art] Signing Cert with AUTHO
29,192,968 UART: RITY.KEYID = 7
31,472,340 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,975 UART: [art] PUB.X = C3434319AEBD406BFA095463221791F4D9FB867337DF2FCD63894D1C6BAE6AF21D0237304964B41147271DAFC3325C59
31,481,053 UART: [art] PUB.Y = D822AB5D6E29C7024CF17F8831AD6DCAA1A9CB8ED76803A53AD3FCB0FE0D4D6D371A53D3FB70AAE1D28BCC8CE4C899DF
31,488,383 UART: [art] SIG.R = 81019998CABD1C673A5E5C6AAECA75E45F027559EFE785B548CAE6A85C64A6C16EDFD4BBE7051980BBEF813B98D0C80A
31,495,764 UART: [art] SIG.S = 7A8486955DF221F60AFF784F06F9212FEBDF7503F23F2034E8298010134CD1B8508CD0673EF1AA61E2AA05ADC161020A
32,801,635 UART: Caliptra RT
32,802,337 UART: [state] CFI Enabled
32,920,650 UART: [rt] RT listening for mailbox commands...
32,922,961 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,077,951 UART: [rt]cmd =0x41544d4e, len=14344
38,313,606 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,127,269 ready_for_fw is high
4,127,660 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,065,682 >>> mbox cmd response: success
23,709,391 UART:
23,709,788 UART: Running Caliptra FMC ...
23,710,902 UART:
23,711,057 UART: [state] CFI Enabled
23,718,942 UART: [fht] FMC Alias Private Key: 7
26,049,733 UART: [art] Extend RT PCRs Done
26,050,977 UART: [art] Lock RT PCRs Done
26,052,554 UART: [art] Populate DV Done
26,057,797 UART: [fht] FMC Alias Private Key: 7
26,059,340 UART: [art] Derive CDI
26,060,100 UART: [art] Store in in slot 0x4
26,102,636 UART: [art] Derive Key Pair
26,103,632 UART: [art] Store priv key in slot 0x5
29,345,563 UART: [art] Derive Key Pair - Done
29,358,522 UART: [art] Signing Cert with AUTHO
29,359,830 UART: RITY.KEYID = 7
31,639,033 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,543 UART: [art] PUB.X = 23216D346BFC99CE3816A403C099535299ABADEB19EFA20A21A57BFBC27D7C4F5981EB2097485336C027E6F4867722F8
31,647,807 UART: [art] PUB.Y = 4E9AC094AE0336DBC0EF7465529C4E8F000551C25D62D476A93FE920183A7BB209568931B1D0CFADE1E8D6E0861ADCD9
31,655,011 UART: [art] SIG.R = 0EC0401AC96B3FAFA7ED88D0F6E98339BF35BBEA0BE7D35EF208AD8827687668F3CBF8B5ECE2D6E40312E0DC82924BB8
31,662,453 UART: [art] SIG.S = CF5F9EFE50832D08D770A6840C5DFD1A8AA4EA8305C101C545B2980B419B83254E6225909F9E68BCA36D93E004A8577E
32,967,275 UART: Caliptra RT
32,967,988 UART: [state] CFI Enabled
33,086,156 UART: [rt] RT listening for mailbox commands...
33,088,479 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,243,665 UART: [rt]cmd =0x41544d4e, len=14344
38,479,139 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,028 UART:
192,427 UART: Running Caliptra ROM ...
193,602 UART:
193,748 UART: [state] CFI Enabled
267,562 UART: [state] LifecycleState = Unprovisioned
269,462 UART: [state] DebugLocked = No
270,852 UART: [state] WD Timer not started. Device not locked for debugging
274,817 UART: [kat] SHA2-256
453,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,490 UART: [kat] ++
466,029 UART: [kat] sha1
475,774 UART: [kat] SHA2-256
478,776 UART: [kat] SHA2-384
483,927 UART: [kat] SHA2-512-ACC
486,943 UART: [kat] ECC-384
2,948,395 UART: [kat] HMAC-384Kdf
2,972,370 UART: [kat] LMS
3,501,847 UART: [kat] --
3,507,981 UART: [cold-reset] ++
3,508,778 UART: [fht] FHT @ 0x50003400
3,518,546 UART: [idev] ++
3,519,110 UART: [idev] CDI.KEYID = 6
3,520,014 UART: [idev] SUBJECT.KEYID = 7
3,521,189 UART: [idev] UDS.KEYID = 0
3,522,238 ready_for_fw is high
3,522,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,503 UART: [idev] Erasing UDS.KEYID = 0
6,025,445 UART: [idev] Sha1 KeyId Algorithm
6,049,715 UART: [idev] --
6,053,076 UART: [ldev] ++
6,053,650 UART: [ldev] CDI.KEYID = 6
6,054,533 UART: [ldev] SUBJECT.KEYID = 5
6,055,746 UART: [ldev] AUTHORITY.KEYID = 7
6,056,980 UART: [ldev] FE.KEYID = 1
6,100,818 UART: [ldev] Erasing FE.KEYID = 1
8,601,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,055 UART: [ldev] --
10,417,085 UART: [fwproc] Wait for Commands...
10,419,615 UART: [fwproc] Recv command 0x46574c44
10,421,704 UART: [fwproc] Recv'd Img size: 114448 bytes
13,833,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,513 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,292,126 >>> mbox cmd response: success
14,296,184 UART: [afmc] ++
14,296,779 UART: [afmc] CDI.KEYID = 6
14,297,665 UART: [afmc] SUBJECT.KEYID = 7
14,298,878 UART: [afmc] AUTHORITY.KEYID = 5
16,829,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,474 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,118 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,123 UART: [afmc] --
18,630,290 UART: [cold-reset] --
18,633,664 UART: [state] Locking Datavault
18,638,229 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,870 UART: [state] Locking ICCM
18,642,505 UART: [exit] Launching FMC @ 0x40000130
18,650,904 UART:
18,651,136 UART: Running Caliptra FMC ...
18,652,444 UART:
18,652,614 UART: [state] CFI Enabled
18,712,921 UART: [fht] FMC Alias Private Key: 7
20,477,394 UART: [art] Extend RT PCRs Done
20,478,609 UART: [art] Lock RT PCRs Done
20,480,312 UART: [art] Populate DV Done
20,485,828 UART: [fht] FMC Alias Private Key: 7
20,487,412 UART: [art] Derive CDI
20,488,222 UART: [art] Store in in slot 0x4
20,545,577 UART: [art] Derive Key Pair
20,546,650 UART: [art] Store priv key in slot 0x5
23,009,656 UART: [art] Derive Key Pair - Done
23,022,275 UART: [art] Signing Cert with AUTHO
23,023,578 UART: RITY.KEYID = 7
24,735,707 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,208 UART: [art] PUB.X = 8EB9C36345652205CA524592801ACF999AD227FCE294028280EA1502FA9E2A54CD34DF3C0F9A2CC2D2BED5FD0A160776
24,744,516 UART: [art] PUB.Y = F7F79264F62367470E70EFB46C5140435595D646F00E53D56FD7F5FC355E7B5A7AA4955E1221C6E5E3F964134432258D
24,751,763 UART: [art] SIG.R = 5484179B6797035A93B31A52CE4D24CC3C3A22A4959C2750DD6D9A6B038E85BC9FBFA02AECF564453BF45E5295AAC6F6
24,759,103 UART: [art] SIG.S = 9CB82ED5AA4DA26AC54392C1EE0BE3EE27253D1A4777984F053CB44CE30142AEFD22C2F66C5B741E10D6F6C685591771
25,738,397 UART: Caliptra RT
25,739,078 UART: [state] CFI Enabled
25,903,578 UART: [rt] RT listening for mailbox commands...
25,905,858 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,061,643 UART: [rt]cmd =0x41544d4e, len=14344
29,992,272 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,358,926 ready_for_fw is high
3,359,348 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,053,635 >>> mbox cmd response: success
18,350,474 UART:
18,350,855 UART: Running Caliptra FMC ...
18,351,987 UART:
18,352,165 UART: [state] CFI Enabled
18,414,105 UART: [fht] FMC Alias Private Key: 7
20,177,480 UART: [art] Extend RT PCRs Done
20,178,697 UART: [art] Lock RT PCRs Done
20,180,486 UART: [art] Populate DV Done
20,185,829 UART: [fht] FMC Alias Private Key: 7
20,187,418 UART: [art] Derive CDI
20,188,232 UART: [art] Store in in slot 0x4
20,247,169 UART: [art] Derive Key Pair
20,248,210 UART: [art] Store priv key in slot 0x5
22,711,221 UART: [art] Derive Key Pair - Done
22,724,021 UART: [art] Signing Cert with AUTHO
22,725,324 UART: RITY.KEYID = 7
24,437,458 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,971 UART: [art] PUB.X = 8155FBAD345BAC7E5D725A69F6856F79449E6BB23ADB38FA1317D50BA04F56DEA96A5675E9ED51AE09D4C7FF7EFAC721
24,446,216 UART: [art] PUB.Y = B4CA3538982900E25C9849B097D0E3BC44C44D7BEBDA8B3101814D24FD747E76E3A384D3A755CB93EB8761C030EA9CE9
24,453,509 UART: [art] SIG.R = EAF250141EAAC183FE53088DD1A0FA61C435DD54762BE43241A0FE47AAF66100C455849CECB3153F0268978C19AF4EB6
24,460,847 UART: [art] SIG.S = CD63FDCB9F2646535B6F5EDD31776FD34F7315232A716A3DD3B0D100AF8C15990CE0C75E06CF62E57C9275C68113CE37
25,439,978 UART: Caliptra RT
25,440,689 UART: [state] CFI Enabled
25,605,504 UART: [rt] RT listening for mailbox commands...
25,608,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,763,882 UART: [rt]cmd =0x41544d4e, len=14344
29,694,549 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,490 UART:
192,871 UART: Running Caliptra ROM ...
193,975 UART:
603,718 UART: [state] CFI Enabled
617,522 UART: [state] LifecycleState = Unprovisioned
619,390 UART: [state] DebugLocked = No
622,106 UART: [state] WD Timer not started. Device not locked for debugging
624,992 UART: [kat] SHA2-256
804,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,733 UART: [kat] ++
816,182 UART: [kat] sha1
826,830 UART: [kat] SHA2-256
829,829 UART: [kat] SHA2-384
836,381 UART: [kat] SHA2-512-ACC
839,379 UART: [kat] ECC-384
3,282,440 UART: [kat] HMAC-384Kdf
3,294,865 UART: [kat] LMS
3,824,399 UART: [kat] --
3,829,539 UART: [cold-reset] ++
3,832,102 UART: [fht] FHT @ 0x50003400
3,844,351 UART: [idev] ++
3,844,906 UART: [idev] CDI.KEYID = 6
3,846,006 UART: [idev] SUBJECT.KEYID = 7
3,847,126 UART: [idev] UDS.KEYID = 0
3,848,049 ready_for_fw is high
3,848,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,819 UART: [idev] Erasing UDS.KEYID = 0
6,323,842 UART: [idev] Sha1 KeyId Algorithm
6,346,987 UART: [idev] --
6,351,348 UART: [ldev] ++
6,351,910 UART: [ldev] CDI.KEYID = 6
6,352,810 UART: [ldev] SUBJECT.KEYID = 5
6,354,009 UART: [ldev] AUTHORITY.KEYID = 7
6,355,234 UART: [ldev] FE.KEYID = 1
6,368,167 UART: [ldev] Erasing FE.KEYID = 1
8,838,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,102 UART: [ldev] --
10,630,186 UART: [fwproc] Wait for Commands...
10,632,326 UART: [fwproc] Recv command 0x46574c44
10,634,421 UART: [fwproc] Recv'd Img size: 114448 bytes
14,040,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,526 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,500,010 >>> mbox cmd response: success
14,504,192 UART: [afmc] ++
14,504,779 UART: [afmc] CDI.KEYID = 6
14,505,690 UART: [afmc] SUBJECT.KEYID = 7
14,506,841 UART: [afmc] AUTHORITY.KEYID = 5
17,007,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,218 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,958 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,761,031 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,458 UART: [afmc] --
18,802,397 UART: [cold-reset] --
18,805,710 UART: [state] Locking Datavault
18,811,965 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,678 UART: [state] Locking ICCM
18,816,252 UART: [exit] Launching FMC @ 0x40000130
18,824,697 UART:
18,824,928 UART: Running Caliptra FMC ...
18,826,019 UART:
18,826,170 UART: [state] CFI Enabled
18,833,781 UART: [fht] FMC Alias Private Key: 7
20,590,598 UART: [art] Extend RT PCRs Done
20,591,809 UART: [art] Lock RT PCRs Done
20,593,511 UART: [art] Populate DV Done
20,598,912 UART: [fht] FMC Alias Private Key: 7
20,600,463 UART: [art] Derive CDI
20,601,275 UART: [art] Store in in slot 0x4
20,643,479 UART: [art] Derive Key Pair
20,644,473 UART: [art] Store priv key in slot 0x5
23,071,195 UART: [art] Derive Key Pair - Done
23,084,184 UART: [art] Signing Cert with AUTHO
23,085,485 UART: RITY.KEYID = 7
24,791,328 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,831 UART: [art] PUB.X = D66F8C5BF4C540EBF08B0231835E3828C7AF045C8D210B92F2DF832C2B083221B26D0D4FDA4EB10AEC535EF975287B32
24,800,059 UART: [art] PUB.Y = 17F593DAE6BA613B2D2DEA3CA12B0E5803C390A961E23E5E450550B8B8DEDE577FE29F94A672447C95F80761F1E61A0F
24,807,351 UART: [art] SIG.R = BCC9E959216D6D1E9C1051EE05D70C1BB208F85049D20A054DFD45E57EC5C62B8D220E32F13E2084D36703494DD2B234
24,814,741 UART: [art] SIG.S = FD3F39E795D2193E9F5B5758FDFA462F729205C09046B7FCD821847019B7AC43BE880059D9F09E75815732A659531E36
25,793,031 UART: Caliptra RT
25,793,734 UART: [state] CFI Enabled
25,910,949 UART: [rt] RT listening for mailbox commands...
25,913,272 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,068,845 UART: [rt]cmd =0x41544d4e, len=14344
30,000,137 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,696,317 ready_for_fw is high
3,696,695 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,258,650 >>> mbox cmd response: success
18,507,349 UART:
18,507,787 UART: Running Caliptra FMC ...
18,508,922 UART:
18,509,074 UART: [state] CFI Enabled
18,516,897 UART: [fht] FMC Alias Private Key: 7
20,273,637 UART: [art] Extend RT PCRs Done
20,274,858 UART: [art] Lock RT PCRs Done
20,276,373 UART: [art] Populate DV Done
20,281,928 UART: [fht] FMC Alias Private Key: 7
20,283,517 UART: [art] Derive CDI
20,284,325 UART: [art] Store in in slot 0x4
20,326,712 UART: [art] Derive Key Pair
20,327,752 UART: [art] Store priv key in slot 0x5
22,754,258 UART: [art] Derive Key Pair - Done
22,767,210 UART: [art] Signing Cert with AUTHO
22,768,525 UART: RITY.KEYID = 7
24,474,328 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,834 UART: [art] PUB.X = F7B61CAF6D876CD2C67FA0575D0140E94CD6536EADFCE6DC578EE5A412BF485543EA4E10BE859C237EEFB522FE579D8E
24,483,095 UART: [art] PUB.Y = DE9959115EB68E15E0AB5D6BEC9E997237A4D643CC7D88B44B952B0A69B8B400E4DF85DF1D3FDFDC0283657361F35564
24,490,341 UART: [art] SIG.R = 88BF57D20D6382AA6B026428F62273A839B1E1BAD19DBDC2E61FA05A67F6B7D111150C0F25A9DD9D9B5E96A2BCB05E34
24,497,784 UART: [art] SIG.S = 46E052606268C13DC804FE97FC9F340C34755710E2DC1F60A8B285939D75C071FBF1555070035693662C7E1305030645
25,476,860 UART: Caliptra RT
25,477,567 UART: [state] CFI Enabled
25,595,288 UART: [rt] RT listening for mailbox commands...
25,597,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,752,721 UART: [rt]cmd =0x41544d4e, len=14344
29,683,352 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,436,669 ready_for_fw is high
3,437,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,133 >>> mbox cmd response: success
19,021,368 UART:
19,021,791 UART: Running Caliptra FMC ...
19,022,898 UART:
19,023,055 UART: [state] CFI Enabled
19,090,189 UART: [fht] FMC Alias Private Key: 7
20,853,816 UART: [art] Extend RT PCRs Done
20,855,055 UART: [art] Lock RT PCRs Done
20,856,714 UART: [art] Populate DV Done
20,862,333 UART: [fht] FMC Alias Private Key: 7
20,863,929 UART: [art] Derive CDI
20,864,662 UART: [art] Store in in slot 0x4
20,922,722 UART: [art] Derive Key Pair
20,923,778 UART: [art] Store priv key in slot 0x5
23,386,254 UART: [art] Derive Key Pair - Done
23,399,036 UART: [art] Signing Cert with AUTHO
23,400,338 UART: RITY.KEYID = 7
25,112,327 UART: [art] Erasing AUTHORITY.KEYID = 7
25,113,828 UART: [art] PUB.X = A5895F4B92680B8513F0FD90AF8AD2C2BC7D2AA608F0772C6805E21F81D87FE078A17AF03E519B58C144072EA8383B19
25,121,074 UART: [art] PUB.Y = F8462B201FC6D3E204E2C3FA5E32666CB9A2463F346025D73BA253566513ED79D95CE5D74FEA9B097DA88B8F91FB053B
25,128,329 UART: [art] SIG.R = 8EBFAC3ED5700A7509896FB6656F8DAE004D241AD844A4BC4E58C6507A67049062D08C4CBD4985F055FA5EB57A513691
25,135,763 UART: [art] SIG.S = 6350292085B3484B286EA2D5A923CEFE92C4FA64FA5C010B8FEFCC8AB5458C31996057C4FE0BDFCDB66E11F60F69A5F8
26,114,452 UART: Caliptra RT
26,115,174 UART: [state] CFI Enabled
26,280,846 UART: [rt] RT listening for mailbox commands...
26,283,180 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,439,051 UART: [rt]cmd =0x41544d4e, len=14344
30,370,058 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,758,537 ready_for_fw is high
3,759,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,952,731 >>> mbox cmd response: success
19,204,509 UART:
19,204,876 UART: Running Caliptra FMC ...
19,206,063 UART:
19,206,228 UART: [state] CFI Enabled
19,214,269 UART: [fht] FMC Alias Private Key: 7
20,971,497 UART: [art] Extend RT PCRs Done
20,972,726 UART: [art] Lock RT PCRs Done
20,974,627 UART: [art] Populate DV Done
20,979,928 UART: [fht] FMC Alias Private Key: 7
20,981,430 UART: [art] Derive CDI
20,982,192 UART: [art] Store in in slot 0x4
21,024,469 UART: [art] Derive Key Pair
21,025,504 UART: [art] Store priv key in slot 0x5
23,452,278 UART: [art] Derive Key Pair - Done
23,465,105 UART: [art] Signing Cert with AUTHO
23,466,396 UART: RITY.KEYID = 7
25,171,695 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,194 UART: [art] PUB.X = 306B99217841C8B77A8382222C2DA10F5E767F78CFF7BDD4CE89D07B0F6E5C211CC04DFAA3BE6A3FB0A10A8B8585793E
25,180,498 UART: [art] PUB.Y = 570D8621FD69B65C18C1F8BEF1B0FAC0A52B66357CDBF708804772F6A621B805D8EB2734BD943E9A76C203704CC412A0
25,187,695 UART: [art] SIG.R = 6090154C62452FDE200CAC8B60CFF017423CEEBDFAAD197701CD520AD8B13C9554A758F40B635579B41FDF1DCE2863EA
25,195,140 UART: [art] SIG.S = B0ED621AF408B898677598BEE9D03C329F5957160797764BCB76B64E15841A282D980E0FDB99405377A5D10075D16F77
26,173,185 UART: Caliptra RT
26,173,881 UART: [state] CFI Enabled
26,291,532 UART: [rt] RT listening for mailbox commands...
26,293,847 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,449,247 UART: [rt]cmd =0x41544d4e, len=14344
30,379,948 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,359 UART: [kat] SHA2-256
882,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,405 UART: [kat] ++
886,557 UART: [kat] sha1
890,787 UART: [kat] SHA2-256
892,725 UART: [kat] SHA2-384
895,382 UART: [kat] SHA2-512-ACC
897,283 UART: [kat] ECC-384
902,752 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,261 UART: [cold-reset] ++
1,476,669 UART: [fht] Storing FHT @ 0x50003400
1,479,508 UART: [idev] ++
1,479,676 UART: [idev] CDI.KEYID = 6
1,480,036 UART: [idev] SUBJECT.KEYID = 7
1,480,460 UART: [idev] UDS.KEYID = 0
1,480,805 ready_for_fw is high
1,480,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,328 UART: [idev] Erasing UDS.KEYID = 0
1,504,490 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,270 UART: [idev] --
1,514,489 UART: [ldev] ++
1,514,657 UART: [ldev] CDI.KEYID = 6
1,515,020 UART: [ldev] SUBJECT.KEYID = 5
1,515,446 UART: [ldev] AUTHORITY.KEYID = 7
1,515,909 UART: [ldev] FE.KEYID = 1
1,520,891 UART: [ldev] Erasing FE.KEYID = 1
1,546,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,326 UART: [ldev] --
1,585,755 UART: [fwproc] Waiting for Commands...
1,586,386 UART: [fwproc] Received command 0x46574c44
1,587,177 UART: [fwproc] Received Image of size 114448 bytes
2,887,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,326 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,678 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,703 >>> mbox cmd response: success
3,080,865 UART: [afmc] ++
3,081,033 UART: [afmc] CDI.KEYID = 6
3,081,395 UART: [afmc] SUBJECT.KEYID = 7
3,081,820 UART: [afmc] AUTHORITY.KEYID = 5
3,116,697 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,291 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,071 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,799 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,684 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,374 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,365 UART: [afmc] --
3,160,323 UART: [cold-reset] --
3,161,277 UART: [state] Locking Datavault
3,162,646 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,250 UART: [state] Locking ICCM
3,163,790 UART: [exit] Launching FMC @ 0x40000130
3,169,119 UART:
3,169,135 UART: Running Caliptra FMC ...
3,169,543 UART:
3,169,597 UART: [state] CFI Enabled
3,180,132 UART: [fht] FMC Alias Private Key: 7
3,288,087 UART: [art] Extend RT PCRs Done
3,288,515 UART: [art] Lock RT PCRs Done
3,290,017 UART: [art] Populate DV Done
3,298,354 UART: [fht] FMC Alias Private Key: 7
3,299,494 UART: [art] Derive CDI
3,299,774 UART: [art] Store in in slot 0x4
3,385,589 UART: [art] Derive Key Pair
3,385,949 UART: [art] Store priv key in slot 0x5
3,399,327 UART: [art] Derive Key Pair - Done
3,413,925 UART: [art] Signing Cert with AUTHO
3,414,405 UART: RITY.KEYID = 7
3,429,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,388 UART: [art] PUB.X = DE8845CFD92E6199BE9336DD3CDB0FF3D0A40740AD560F12CF4522E56C6EAA5BAF7F03EF10E4359E6AC359A9B0572D38
3,437,164 UART: [art] PUB.Y = 48BA58C0800E181672D6B4A73F67BFCF29D8D943228EA88E9288AB73A65736D25A2EEBC5411EEE36347B8BBCCB41C998
3,444,121 UART: [art] SIG.R = F0BC497442F9973303464FBD2120215121110A7644D79D4A6BD7F21729C3EC3E93AE5A05FC852F75B03DC4F2BD6A68CC
3,450,886 UART: [art] SIG.S = C68F024F15780F4BCAA3DDFB3F46F90294E6ACAA5B72CF87CE099A7D6458FCAFF3E7032B844159304E47D18E4F8EC67D
3,475,148 UART: Caliptra RT
3,475,401 UART: [state] CFI Enabled
3,583,057 UART: [rt] RT listening for mailbox commands...
3,583,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,799 UART: [rt]cmd =0x41544d4e, len=14344
3,851,544 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,571 ready_for_fw is high
1,362,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,579 >>> mbox cmd response: success
2,991,251 UART:
2,991,267 UART: Running Caliptra FMC ...
2,991,675 UART:
2,991,729 UART: [state] CFI Enabled
3,002,212 UART: [fht] FMC Alias Private Key: 7
3,109,209 UART: [art] Extend RT PCRs Done
3,109,637 UART: [art] Lock RT PCRs Done
3,111,221 UART: [art] Populate DV Done
3,119,412 UART: [fht] FMC Alias Private Key: 7
3,120,366 UART: [art] Derive CDI
3,120,646 UART: [art] Store in in slot 0x4
3,206,575 UART: [art] Derive Key Pair
3,206,935 UART: [art] Store priv key in slot 0x5
3,220,063 UART: [art] Derive Key Pair - Done
3,234,686 UART: [art] Signing Cert with AUTHO
3,235,166 UART: RITY.KEYID = 7
3,250,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,389 UART: [art] PUB.X = 0F9608E579BBC644914CEC31BBA1489A0CFD8D6D7B618C5D06922C7B3A9C27793E5F29D2836AF1C9480D1C39079B96D8
3,258,147 UART: [art] PUB.Y = 3E5D559D054645A2AF3602DAC692F32089A749A311CF2E9CA5244A3DB72796A037813C0FAB1107F7FB41A7E08DED03C8
3,265,088 UART: [art] SIG.R = 7C8F38AA9603201DB00831C377165FB60DC4605F756E890FC016609FBA7AC864B3BC471A61681F2BFE2114FA040756E9
3,271,840 UART: [art] SIG.S = AEDFE115AF803B3069871E6D21A7B34130090139C864C75376B7948986BB83CA42AA429E2A36541CA87CCE4BD676E8C6
3,295,851 UART: Caliptra RT
3,296,104 UART: [state] CFI Enabled
3,404,351 UART: [rt] RT listening for mailbox commands...
3,405,021 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,153 UART: [rt]cmd =0x41544d4e, len=14344
3,672,840 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,742 UART: [kat] SHA2-256
882,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,788 UART: [kat] ++
886,940 UART: [kat] sha1
891,294 UART: [kat] SHA2-256
893,232 UART: [kat] SHA2-384
895,847 UART: [kat] SHA2-512-ACC
897,748 UART: [kat] ECC-384
903,325 UART: [kat] HMAC-384Kdf
908,083 UART: [kat] LMS
1,476,279 UART: [kat] --
1,477,222 UART: [cold-reset] ++
1,477,682 UART: [fht] Storing FHT @ 0x50003400
1,480,705 UART: [idev] ++
1,480,873 UART: [idev] CDI.KEYID = 6
1,481,233 UART: [idev] SUBJECT.KEYID = 7
1,481,657 UART: [idev] UDS.KEYID = 0
1,482,002 ready_for_fw is high
1,482,002 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,689 UART: [idev] Erasing UDS.KEYID = 0
1,506,231 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,831 UART: [idev] --
1,515,820 UART: [ldev] ++
1,515,988 UART: [ldev] CDI.KEYID = 6
1,516,351 UART: [ldev] SUBJECT.KEYID = 5
1,516,777 UART: [ldev] AUTHORITY.KEYID = 7
1,517,240 UART: [ldev] FE.KEYID = 1
1,522,474 UART: [ldev] Erasing FE.KEYID = 1
1,547,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,975 UART: [ldev] --
1,587,430 UART: [fwproc] Waiting for Commands...
1,588,093 UART: [fwproc] Received command 0x46574c44
1,588,884 UART: [fwproc] Received Image of size 114448 bytes
2,889,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,767 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,119 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,222 >>> mbox cmd response: success
3,083,308 UART: [afmc] ++
3,083,476 UART: [afmc] CDI.KEYID = 6
3,083,838 UART: [afmc] SUBJECT.KEYID = 7
3,084,263 UART: [afmc] AUTHORITY.KEYID = 5
3,119,274 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,582 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,975 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,665 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,676 UART: [afmc] --
3,162,806 UART: [cold-reset] --
3,163,668 UART: [state] Locking Datavault
3,164,947 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,551 UART: [state] Locking ICCM
3,166,181 UART: [exit] Launching FMC @ 0x40000130
3,171,510 UART:
3,171,526 UART: Running Caliptra FMC ...
3,171,934 UART:
3,172,077 UART: [state] CFI Enabled
3,182,932 UART: [fht] FMC Alias Private Key: 7
3,290,945 UART: [art] Extend RT PCRs Done
3,291,373 UART: [art] Lock RT PCRs Done
3,292,975 UART: [art] Populate DV Done
3,301,308 UART: [fht] FMC Alias Private Key: 7
3,302,360 UART: [art] Derive CDI
3,302,640 UART: [art] Store in in slot 0x4
3,388,303 UART: [art] Derive Key Pair
3,388,663 UART: [art] Store priv key in slot 0x5
3,402,123 UART: [art] Derive Key Pair - Done
3,417,091 UART: [art] Signing Cert with AUTHO
3,417,571 UART: RITY.KEYID = 7
3,432,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,748 UART: [art] PUB.X = 021B1833A83BFA60915EA38B752364E34D312F76EF14F8E751E88A6A86B06A84081C98C49DDAD0AA7AF8B2D4ADA8F03C
3,440,524 UART: [art] PUB.Y = 34B615934BBA780C3F0B50C96EF0FCCF5B9A545000E9951A0E2EBB1FD3CAF3386D099EFD72EFF0F8E20300056E52CF2A
3,447,430 UART: [art] SIG.R = 1E7896A1038148D3DFFF6A51FEBAD5AA1AB65C2E9E7B1ADDB1E1A7B5C9960F92CAFF44C8287EA5875ADE3EEA37873236
3,454,218 UART: [art] SIG.S = 8BDA61174DFA13774CB07289A711A4BB37E057C421A7EF5A99D83EF977A96D8842F7AF749085803CFC4439B220E24EF2
3,478,241 UART: Caliptra RT
3,478,586 UART: [state] CFI Enabled
3,586,597 UART: [rt] RT listening for mailbox commands...
3,587,267 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,285 UART: [rt]cmd =0x41544d4e, len=14344
3,854,948 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,322 ready_for_fw is high
1,362,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,934 >>> mbox cmd response: success
2,990,988 UART:
2,991,004 UART: Running Caliptra FMC ...
2,991,412 UART:
2,991,555 UART: [state] CFI Enabled
3,002,110 UART: [fht] FMC Alias Private Key: 7
3,110,637 UART: [art] Extend RT PCRs Done
3,111,065 UART: [art] Lock RT PCRs Done
3,112,551 UART: [art] Populate DV Done
3,120,700 UART: [fht] FMC Alias Private Key: 7
3,121,772 UART: [art] Derive CDI
3,122,052 UART: [art] Store in in slot 0x4
3,207,807 UART: [art] Derive Key Pair
3,208,167 UART: [art] Store priv key in slot 0x5
3,221,617 UART: [art] Derive Key Pair - Done
3,236,236 UART: [art] Signing Cert with AUTHO
3,236,716 UART: RITY.KEYID = 7
3,251,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,595 UART: [art] PUB.X = CA224A53ABB24677D80D0FC54A03974F66279FE70C54B1237869550E364D4996A46FC8D8FC7E6D6772421D5FEC589DC0
3,259,352 UART: [art] PUB.Y = 18C12C7A166BF47A45AC4E73B3D5A6FFA85E0D012ACB20D9FAA0928D26675E56B89E1197B9314ECCE8C740136AAE2EED
3,266,314 UART: [art] SIG.R = 179EDBC8CBC223AF1FE18FD0130BE3F4565C25AB9607BDA12F05A1DA674292C0D47E2D91B84BE4B40B48CB2D32D6BA52
3,273,092 UART: [art] SIG.S = 857AA47B1E50ACDCA4B5C98AE1C46FEC3100D63B540536D746B31D6D357A64D6798A31969D0748E38E82C4236B9BA4C0
3,296,935 UART: Caliptra RT
3,297,280 UART: [state] CFI Enabled
3,406,813 UART: [rt] RT listening for mailbox commands...
3,407,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,365 UART: [rt]cmd =0x41544d4e, len=14344
3,675,148 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
902,031 UART: [kat] SHA2-256
903,971 UART: [kat] SHA2-384
906,554 UART: [kat] SHA2-512-ACC
908,455 UART: [kat] ECC-384
918,032 UART: [kat] HMAC-384Kdf
922,406 UART: [kat] LMS
1,170,734 UART: [kat] --
1,171,625 UART: [cold-reset] ++
1,171,993 UART: [fht] FHT @ 0x50003400
1,174,716 UART: [idev] ++
1,174,884 UART: [idev] CDI.KEYID = 6
1,175,244 UART: [idev] SUBJECT.KEYID = 7
1,175,668 UART: [idev] UDS.KEYID = 0
1,176,013 ready_for_fw is high
1,176,013 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,589 UART: [idev] Sha1 KeyId Algorithm
1,209,181 UART: [idev] --
1,210,449 UART: [ldev] ++
1,210,617 UART: [ldev] CDI.KEYID = 6
1,210,980 UART: [ldev] SUBJECT.KEYID = 5
1,211,406 UART: [ldev] AUTHORITY.KEYID = 7
1,211,869 UART: [ldev] FE.KEYID = 1
1,217,337 UART: [ldev] Erasing FE.KEYID = 1
1,244,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,605 UART: [ldev] --
1,283,064 UART: [fwproc] Wait for Commands...
1,283,796 UART: [fwproc] Recv command 0x46574c44
1,284,524 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,428 >>> mbox cmd response: success
2,777,640 UART: [afmc] ++
2,777,808 UART: [afmc] CDI.KEYID = 6
2,778,170 UART: [afmc] SUBJECT.KEYID = 7
2,778,595 UART: [afmc] AUTHORITY.KEYID = 5
2,814,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,729 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,457 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,342 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,061 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,843 UART: [afmc] --
2,857,825 UART: [cold-reset] --
2,858,713 UART: [state] Locking Datavault
2,859,760 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,364 UART: [state] Locking ICCM
2,860,862 UART: [exit] Launching FMC @ 0x40000130
2,866,191 UART:
2,866,207 UART: Running Caliptra FMC ...
2,866,615 UART:
2,866,669 UART: [state] CFI Enabled
2,877,116 UART: [fht] FMC Alias Private Key: 7
2,985,061 UART: [art] Extend RT PCRs Done
2,985,489 UART: [art] Lock RT PCRs Done
2,986,999 UART: [art] Populate DV Done
2,995,366 UART: [fht] FMC Alias Private Key: 7
2,996,520 UART: [art] Derive CDI
2,996,800 UART: [art] Store in in slot 0x4
3,082,917 UART: [art] Derive Key Pair
3,083,277 UART: [art] Store priv key in slot 0x5
3,096,375 UART: [art] Derive Key Pair - Done
3,111,400 UART: [art] Signing Cert with AUTHO
3,111,880 UART: RITY.KEYID = 7
3,127,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,975 UART: [art] PUB.X = 3B12246CB4DFE900ADF23DD661A21206E9E2FAD1D2F9F37B97B04C2DDF91547625E9E5CA95B9C27580B6BD5B05B866CF
3,134,733 UART: [art] PUB.Y = 726A3890AE008A2822DBC3CA29367AAD8CF1BF59A14AD22A483D0C47A34164E7A9BE6053BF5C0D358E4255EDE014A520
3,141,665 UART: [art] SIG.R = AF0389D7543EF47DF471C7BBEA02BDF236EFB9F3EA60010ADBAE253613025AEF03AD4460C0E3C856130AD93A4A3036A7
3,148,430 UART: [art] SIG.S = F543146804B5F535E28B6501C4673F0FE442795615FC34B8514D1CEFB1F915B8EA522A937D499217F11B44D5F20C81D4
3,171,373 UART: Caliptra RT
3,171,626 UART: [state] CFI Enabled
3,279,726 UART: [rt] RT listening for mailbox commands...
3,280,396 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,478 UART: [rt]cmd =0x41544d4e, len=14344
3,548,257 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,995 ready_for_fw is high
1,059,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,801 >>> mbox cmd response: success
2,689,199 UART:
2,689,215 UART: Running Caliptra FMC ...
2,689,623 UART:
2,689,677 UART: [state] CFI Enabled
2,700,376 UART: [fht] FMC Alias Private Key: 7
2,808,173 UART: [art] Extend RT PCRs Done
2,808,601 UART: [art] Lock RT PCRs Done
2,810,255 UART: [art] Populate DV Done
2,818,400 UART: [fht] FMC Alias Private Key: 7
2,819,422 UART: [art] Derive CDI
2,819,702 UART: [art] Store in in slot 0x4
2,905,341 UART: [art] Derive Key Pair
2,905,701 UART: [art] Store priv key in slot 0x5
2,918,579 UART: [art] Derive Key Pair - Done
2,933,385 UART: [art] Signing Cert with AUTHO
2,933,865 UART: RITY.KEYID = 7
2,948,919 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,684 UART: [art] PUB.X = CADD10718549338F8998F0ED57537C39E6D4669C3F0DB5E3A4DDCC2B4CF6768F29566AC2236C17E12875A28A3D131748
2,956,453 UART: [art] PUB.Y = F2F01BF17DFDB19BDB5E1511ED779630D4A47B40CC772861AB2346120D3A7B1B02E37EE24AF917B0CA3E6C56AE335B6A
2,963,413 UART: [art] SIG.R = 65813199DB0431B40F2F3F10D9D4DBB136666EBEE536BAD314E65D6EB928E1A6BE68378F947810C7192F7BFACBCE0FA4
2,970,188 UART: [art] SIG.S = 72E510E6F69C64E0923E4A0E5AB2706CB44F66F34B208007D65A468EE619BE38FE5484D4DC39143C37DC327A79D2194C
2,993,337 UART: Caliptra RT
2,993,590 UART: [state] CFI Enabled
3,101,813 UART: [rt] RT listening for mailbox commands...
3,102,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,555 UART: [rt]cmd =0x41544d4e, len=14344
3,370,058 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
907,009 UART: [kat] SHA2-512-ACC
908,910 UART: [kat] ECC-384
918,733 UART: [kat] HMAC-384Kdf
923,309 UART: [kat] LMS
1,171,637 UART: [kat] --
1,172,712 UART: [cold-reset] ++
1,173,148 UART: [fht] FHT @ 0x50003400
1,175,787 UART: [idev] ++
1,175,955 UART: [idev] CDI.KEYID = 6
1,176,315 UART: [idev] SUBJECT.KEYID = 7
1,176,739 UART: [idev] UDS.KEYID = 0
1,177,084 ready_for_fw is high
1,177,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,845 UART: [idev] Erasing UDS.KEYID = 0
1,201,864 UART: [idev] Sha1 KeyId Algorithm
1,210,472 UART: [idev] --
1,211,386 UART: [ldev] ++
1,211,554 UART: [ldev] CDI.KEYID = 6
1,211,917 UART: [ldev] SUBJECT.KEYID = 5
1,212,343 UART: [ldev] AUTHORITY.KEYID = 7
1,212,806 UART: [ldev] FE.KEYID = 1
1,218,314 UART: [ldev] Erasing FE.KEYID = 1
1,244,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,562 UART: [ldev] --
1,283,995 UART: [fwproc] Wait for Commands...
1,284,711 UART: [fwproc] Recv command 0x46574c44
1,285,439 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,351 >>> mbox cmd response: success
2,779,405 UART: [afmc] ++
2,779,573 UART: [afmc] CDI.KEYID = 6
2,779,935 UART: [afmc] SUBJECT.KEYID = 7
2,780,360 UART: [afmc] AUTHORITY.KEYID = 5
2,816,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,330 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,943 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,662 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,432 UART: [afmc] --
2,859,450 UART: [cold-reset] --
2,860,308 UART: [state] Locking Datavault
2,861,483 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,087 UART: [state] Locking ICCM
2,862,673 UART: [exit] Launching FMC @ 0x40000130
2,868,002 UART:
2,868,018 UART: Running Caliptra FMC ...
2,868,426 UART:
2,868,569 UART: [state] CFI Enabled
2,879,666 UART: [fht] FMC Alias Private Key: 7
2,987,899 UART: [art] Extend RT PCRs Done
2,988,327 UART: [art] Lock RT PCRs Done
2,990,157 UART: [art] Populate DV Done
2,998,510 UART: [fht] FMC Alias Private Key: 7
2,999,602 UART: [art] Derive CDI
2,999,882 UART: [art] Store in in slot 0x4
3,085,825 UART: [art] Derive Key Pair
3,086,185 UART: [art] Store priv key in slot 0x5
3,099,325 UART: [art] Derive Key Pair - Done
3,113,870 UART: [art] Signing Cert with AUTHO
3,114,350 UART: RITY.KEYID = 7
3,129,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,329 UART: [art] PUB.X = A5D254FF0E2543855F58A1F6ECABCBCBB004A1FB46B073BD5342E080069AD35070B7F68735E12E7A59709563910DFA75
3,137,093 UART: [art] PUB.Y = 377B277F9F0B1A488F121FEA2BF1E43DB30A30953AF66BE9FCCFFD3102041D972281A85FBD7F40993A0B93A11031CB7B
3,144,040 UART: [art] SIG.R = B92FB7C671C216CE6ED32153225D366BDACB2106F00EA073B41B262A5587BB94FA33F11153FCEE845F6417B878D00E81
3,150,807 UART: [art] SIG.S = 68747192C1A34C44331513DE8FB34BDF6B2DB4DCD56D009878DFBFA4549EA6CDC101BF534856B4A910A228CCAC4979B4
3,174,137 UART: Caliptra RT
3,174,482 UART: [state] CFI Enabled
3,281,883 UART: [rt] RT listening for mailbox commands...
3,282,553 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,605 UART: [rt]cmd =0x41544d4e, len=14344
3,550,280 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,822 ready_for_fw is high
1,060,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,092 >>> mbox cmd response: success
2,690,696 UART:
2,690,712 UART: Running Caliptra FMC ...
2,691,120 UART:
2,691,263 UART: [state] CFI Enabled
2,702,116 UART: [fht] FMC Alias Private Key: 7
2,809,743 UART: [art] Extend RT PCRs Done
2,810,171 UART: [art] Lock RT PCRs Done
2,811,707 UART: [art] Populate DV Done
2,820,246 UART: [fht] FMC Alias Private Key: 7
2,821,244 UART: [art] Derive CDI
2,821,524 UART: [art] Store in in slot 0x4
2,907,303 UART: [art] Derive Key Pair
2,907,663 UART: [art] Store priv key in slot 0x5
2,921,169 UART: [art] Derive Key Pair - Done
2,935,558 UART: [art] Signing Cert with AUTHO
2,936,038 UART: RITY.KEYID = 7
2,951,428 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,193 UART: [art] PUB.X = B9CD331148895D527ACC93BC5C31B5E3EC22E3926A5941F37ECF00AFA1B43D9970C3FBC854036954DC468F5263A4E83D
2,958,946 UART: [art] PUB.Y = A956BC37B1D3318D436E1A6FF7A5194DEED09C3CF5D0FFBA31C304AF2DE80255C2F318AFDB49E3A039C12630D2AADAB8
2,965,914 UART: [art] SIG.R = 0F26EC6756B6DD96AFB2B3AEF8DC390E1B5CD5AF961C26BFB822ABFF9594C80E3CE7F2791D204D12334823E77C7015B5
2,972,691 UART: [art] SIG.S = 498F6DB8E0FDA6A60599FB50E55A72796D6ECBB6016A528C048CF6F9BF6DE60E55722714B6A0ECA4736B80A1A1CC51BE
2,996,376 UART: Caliptra RT
2,996,721 UART: [state] CFI Enabled
3,105,320 UART: [rt] RT listening for mailbox commands...
3,105,990 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,244 UART: [rt]cmd =0x41544d4e, len=14344
3,374,731 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,061 UART: [kat] ++
895,213 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
915,862 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,443 UART: [cold-reset] ++
1,169,887 UART: [fht] FHT @ 0x50003400
1,172,653 UART: [idev] ++
1,172,821 UART: [idev] CDI.KEYID = 6
1,173,182 UART: [idev] SUBJECT.KEYID = 7
1,173,607 UART: [idev] UDS.KEYID = 0
1,173,953 ready_for_fw is high
1,173,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,198,441 UART: [idev] Sha1 KeyId Algorithm
1,207,231 UART: [idev] --
1,208,262 UART: [ldev] ++
1,208,430 UART: [ldev] CDI.KEYID = 6
1,208,794 UART: [ldev] SUBJECT.KEYID = 5
1,209,221 UART: [ldev] AUTHORITY.KEYID = 7
1,209,684 UART: [ldev] FE.KEYID = 1
1,214,806 UART: [ldev] Erasing FE.KEYID = 1
1,241,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,536 UART: [ldev] --
1,280,832 UART: [fwproc] Wait for Commands...
1,281,623 UART: [fwproc] Recv command 0x46574c44
1,282,356 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,973 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,238 >>> mbox cmd response: success
2,775,419 UART: [afmc] ++
2,775,587 UART: [afmc] CDI.KEYID = 6
2,775,950 UART: [afmc] SUBJECT.KEYID = 7
2,776,376 UART: [afmc] AUTHORITY.KEYID = 5
2,811,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,920 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,532 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,251 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,066 UART: [afmc] --
2,855,132 UART: [cold-reset] --
2,856,108 UART: [state] Locking Datavault
2,857,221 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,825 UART: [state] Locking ICCM
2,858,489 UART: [exit] Launching FMC @ 0x40000130
2,863,818 UART:
2,863,834 UART: Running Caliptra FMC ...
2,864,242 UART:
2,864,296 UART: [state] CFI Enabled
2,874,347 UART: [fht] FMC Alias Private Key: 7
2,982,960 UART: [art] Extend RT PCRs Done
2,983,388 UART: [art] Lock RT PCRs Done
2,984,798 UART: [art] Populate DV Done
2,992,955 UART: [fht] FMC Alias Private Key: 7
2,994,023 UART: [art] Derive CDI
2,994,303 UART: [art] Store in in slot 0x4
3,080,190 UART: [art] Derive Key Pair
3,080,550 UART: [art] Store priv key in slot 0x5
3,094,034 UART: [art] Derive Key Pair - Done
3,108,682 UART: [art] Signing Cert with AUTHO
3,109,162 UART: RITY.KEYID = 7
3,123,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,653 UART: [art] PUB.X = 36B199DE2D7F3C9DDB0B7F1E619D43DE6B547BF073EEE016F29DA23284D93A528CDF08717F6F97542C40982337FDAD4B
3,131,429 UART: [art] PUB.Y = E82A943FC82E7C4F9399EA3575EDFC44A18902582176EF15820F25CD024C227F9DE440CDBE64B6771DFC151A25B2CD84
3,138,378 UART: [art] SIG.R = 960FB5150C288FC0008550DA695E1F7A70BCC41104B56254A7ABA6B755578CE1B758E2F029DFF5D67BF4CD3CCA071AFC
3,145,128 UART: [art] SIG.S = 8DD4092FA6ACD7C0FED217F3D47E08736B6E0739A33675359FDA524910AE7938670B366F8CA4011BE098523EF0C0B10A
3,169,037 UART: Caliptra RT
3,169,290 UART: [state] CFI Enabled
3,276,736 UART: [rt] RT listening for mailbox commands...
3,277,406 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,578 UART: [rt]cmd =0x41544d4e, len=14344
3,545,225 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,704 ready_for_fw is high
1,055,704 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,472 >>> mbox cmd response: success
2,685,418 UART:
2,685,434 UART: Running Caliptra FMC ...
2,685,842 UART:
2,685,896 UART: [state] CFI Enabled
2,696,187 UART: [fht] FMC Alias Private Key: 7
2,804,312 UART: [art] Extend RT PCRs Done
2,804,740 UART: [art] Lock RT PCRs Done
2,806,038 UART: [art] Populate DV Done
2,814,299 UART: [fht] FMC Alias Private Key: 7
2,815,405 UART: [art] Derive CDI
2,815,685 UART: [art] Store in in slot 0x4
2,901,332 UART: [art] Derive Key Pair
2,901,692 UART: [art] Store priv key in slot 0x5
2,915,342 UART: [art] Derive Key Pair - Done
2,930,121 UART: [art] Signing Cert with AUTHO
2,930,601 UART: RITY.KEYID = 7
2,945,735 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,500 UART: [art] PUB.X = FA34F133624FBF824A08A1D1446651E55F11E16156F85201F86006D25344192DBADD76FBBE17D879E2344A8F66A21240
2,953,257 UART: [art] PUB.Y = B808C45347D97B5286D461D46ABFBF7353A45C6EAC99074AF08AF1B60C4888D0ABAACD5EC41A6D961794F9AA20D5404C
2,960,212 UART: [art] SIG.R = 264C0E1DFB1F29B84967063659DFA723BB476EA15AA5AC9FFFA0051E58A948CEEE8134063D8D5F59412A2E50ACE85181
2,966,980 UART: [art] SIG.S = 2C37C517EA79FA3E6AD49BA60FD312DD2F621538694017967BBDCC30DC72C4C8F0E7E7ACD8E1F6E13268A6EB890FF4DD
2,990,167 UART: Caliptra RT
2,990,420 UART: [state] CFI Enabled
3,098,079 UART: [rt] RT listening for mailbox commands...
3,098,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,833 UART: [rt]cmd =0x41544d4e, len=14344
3,366,716 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
891,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,848 UART: [kat] ++
896,000 UART: [kat] sha1
900,308 UART: [kat] SHA2-256
902,248 UART: [kat] SHA2-384
904,991 UART: [kat] SHA2-512-ACC
906,892 UART: [kat] ECC-384
916,689 UART: [kat] HMAC-384Kdf
921,235 UART: [kat] LMS
1,169,547 UART: [kat] --
1,170,084 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,204 UART: [idev] ++
1,173,372 UART: [idev] CDI.KEYID = 6
1,173,733 UART: [idev] SUBJECT.KEYID = 7
1,174,158 UART: [idev] UDS.KEYID = 0
1,174,504 ready_for_fw is high
1,174,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,184 UART: [idev] Sha1 KeyId Algorithm
1,208,166 UART: [idev] --
1,209,299 UART: [ldev] ++
1,209,467 UART: [ldev] CDI.KEYID = 6
1,209,831 UART: [ldev] SUBJECT.KEYID = 5
1,210,258 UART: [ldev] AUTHORITY.KEYID = 7
1,210,721 UART: [ldev] FE.KEYID = 1
1,216,033 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,827 UART: [fwproc] Wait for Commands...
1,282,624 UART: [fwproc] Recv command 0x46574c44
1,283,357 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,725 >>> mbox cmd response: success
2,776,890 UART: [afmc] ++
2,777,058 UART: [afmc] CDI.KEYID = 6
2,777,421 UART: [afmc] SUBJECT.KEYID = 7
2,777,847 UART: [afmc] AUTHORITY.KEYID = 5
2,814,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,829 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,558 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,441 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,160 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,927 UART: [afmc] --
2,857,897 UART: [cold-reset] --
2,858,905 UART: [state] Locking Datavault
2,860,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,848 UART: [state] Locking ICCM
2,861,464 UART: [exit] Launching FMC @ 0x40000130
2,866,793 UART:
2,866,809 UART: Running Caliptra FMC ...
2,867,217 UART:
2,867,360 UART: [state] CFI Enabled
2,878,015 UART: [fht] FMC Alias Private Key: 7
2,986,298 UART: [art] Extend RT PCRs Done
2,986,726 UART: [art] Lock RT PCRs Done
2,987,940 UART: [art] Populate DV Done
2,996,053 UART: [fht] FMC Alias Private Key: 7
2,997,007 UART: [art] Derive CDI
2,997,287 UART: [art] Store in in slot 0x4
3,083,332 UART: [art] Derive Key Pair
3,083,692 UART: [art] Store priv key in slot 0x5
3,097,252 UART: [art] Derive Key Pair - Done
3,111,946 UART: [art] Signing Cert with AUTHO
3,112,426 UART: RITY.KEYID = 7
3,127,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,705 UART: [art] PUB.X = 3DFC80D6AB3A3658D96AC410E22F7C004014AC66C645E764FA11CBEF83758FDC5F1EFF96DE4626CDF2E5412FDF9ED9F8
3,135,475 UART: [art] PUB.Y = 38D4446351B2112B2D0B8CBD7452E0FEC0A05C2610DF47BA356EC045FB225AC89BA5072E98E0EEBB7D6D8E539959BF13
3,142,431 UART: [art] SIG.R = 37D648215FB67AF94C3F40CA98EB356DF4737FA63C7317CAFDE809E4074C9404D92C3121F00AC1B14BBC53FD8BC51009
3,149,196 UART: [art] SIG.S = 583C788A26C9B8FECE9BA973E65E2E170222CACBCB3C7A1DA6E6BAB650DC4F2145AEC5FFF2B7598A1B9A3466B695E217
3,172,758 UART: Caliptra RT
3,173,103 UART: [state] CFI Enabled
3,281,768 UART: [rt] RT listening for mailbox commands...
3,282,438 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,724 UART: [rt]cmd =0x41544d4e, len=14344
3,551,125 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,045 ready_for_fw is high
1,056,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,615 >>> mbox cmd response: success
2,687,403 UART:
2,687,419 UART: Running Caliptra FMC ...
2,687,827 UART:
2,687,970 UART: [state] CFI Enabled
2,698,773 UART: [fht] FMC Alias Private Key: 7
2,806,904 UART: [art] Extend RT PCRs Done
2,807,332 UART: [art] Lock RT PCRs Done
2,808,850 UART: [art] Populate DV Done
2,817,281 UART: [fht] FMC Alias Private Key: 7
2,818,453 UART: [art] Derive CDI
2,818,733 UART: [art] Store in in slot 0x4
2,904,374 UART: [art] Derive Key Pair
2,904,734 UART: [art] Store priv key in slot 0x5
2,917,536 UART: [art] Derive Key Pair - Done
2,932,294 UART: [art] Signing Cert with AUTHO
2,932,774 UART: RITY.KEYID = 7
2,948,104 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,869 UART: [art] PUB.X = CCC10C40B399DD86EA73D3EEDA07822038BCA1F7498997B850F56F2DFE64178DF1248FF40EFD7ED1BB7A61D02642BB1C
2,955,648 UART: [art] PUB.Y = 7481DB7E389599C8AE2B1F8AF25D9B2377F74F08F26D75489F5815621E9A20B7E50174EBF35AEB422CA7128B9D805B5D
2,962,596 UART: [art] SIG.R = 8359175E2B57A8DB634DBECDA5A9154C6FD92A7DCF62BA45653088DB439715EF2894A0C2A311B670BF55CA5A90E1024D
2,969,373 UART: [art] SIG.S = 30A9134CB6D2B15B0C5765C0B17BC7114805C76A9B00FBE25A98802C2697E8B9BA8C85D3CB50193E19DCA0A32655B116
2,993,886 UART: Caliptra RT
2,994,231 UART: [state] CFI Enabled
3,101,826 UART: [rt] RT listening for mailbox commands...
3,102,496 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,704 UART: [rt]cmd =0x41544d4e, len=14344
3,370,621 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
192,272 UART:
192,623 UART: Running Caliptra ROM ...
193,817 UART:
193,973 UART: [state] CFI Enabled
260,846 UART: [state] LifecycleState = Unprovisioned
262,823 UART: [state] DebugLocked = No
265,348 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,491 UART: [kat] SHA2-256
440,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,707 UART: [kat] ++
451,240 UART: [kat] sha1
462,333 UART: [kat] SHA2-256
464,988 UART: [kat] SHA2-384
470,993 UART: [kat] SHA2-512-ACC
473,362 UART: [kat] ECC-384
2,766,707 UART: [kat] HMAC-384Kdf
2,797,412 UART: [kat] LMS
3,987,676 UART: [kat] --
3,993,789 UART: [cold-reset] ++
3,996,105 UART: [fht] Storing FHT @ 0x50003400
4,007,620 UART: [idev] ++
4,008,203 UART: [idev] CDI.KEYID = 6
4,009,124 UART: [idev] SUBJECT.KEYID = 7
4,010,376 UART: [idev] UDS.KEYID = 0
4,011,487 ready_for_fw is high
4,011,719 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,162 UART: [idev] Erasing UDS.KEYID = 0
7,342,786 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,584 UART: [idev] --
7,366,906 UART: [ldev] ++
7,367,487 UART: [ldev] CDI.KEYID = 6
7,368,428 UART: [ldev] SUBJECT.KEYID = 5
7,369,560 UART: [ldev] AUTHORITY.KEYID = 7
7,370,890 UART: [ldev] FE.KEYID = 1
7,418,945 UART: [ldev] Erasing FE.KEYID = 1
10,750,192 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,180 UART: [ldev] --
13,111,603 UART: [fwproc] Waiting for Commands...
13,113,265 UART: [fwproc] Received command 0x46574c44
13,115,445 UART: [fwproc] Received Image of size 114124 bytes
21,755,199 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,840,385 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,909,259 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,226,715 >>> mbox cmd response: success
22,231,071 UART: [afmc] ++
22,231,669 UART: [afmc] CDI.KEYID = 6
22,232,584 UART: [afmc] SUBJECT.KEYID = 7
22,233,854 UART: [afmc] AUTHORITY.KEYID = 5
25,608,915 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,907,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,910,118 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,924,724 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,939,411 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,953,657 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,974,791 UART: [afmc] --
27,978,663 UART: [cold-reset] --
27,980,527 UART: [state] Locking Datavault
27,983,753 UART: [state] Locking PCR0, PCR1 and PCR31
27,985,505 UART: [state] Locking ICCM
27,988,011 UART: [exit] Launching FMC @ 0x40000130
27,996,361 UART:
27,996,657 UART: Running Caliptra FMC ...
27,997,695 UART:
27,997,850 UART: [state] CFI Enabled
28,069,498 UART: [fht] FMC Alias Private Key: 7
30,407,112 UART: [art] Extend RT PCRs Done
30,408,329 UART: [art] Lock RT PCRs Done
30,410,063 UART: [art] Populate DV Done
30,415,591 UART: [fht] FMC Alias Private Key: 7
30,417,128 UART: [art] Derive CDI
30,417,943 UART: [art] Store in in slot 0x4
30,477,479 UART: [art] Derive Key Pair
30,478,512 UART: [art] Store priv key in slot 0x5
33,771,178 UART: [art] Derive Key Pair - Done
33,784,204 UART: [art] Signing Cert with AUTHO
33,785,522 UART: RITY.KEYID = 7
36,072,652 UART: [art] Erasing AUTHORITY.KEYID = 7
36,074,170 UART: [art] PUB.X = 3B51C853219EC5C8D9CAB31182D900CAB0AE3A08C3B42E39985DCC23280E7D2CFA92D0ABD9FF68BAF792333D6A7EDE70
36,081,479 UART: [art] PUB.Y = FEA42C919BD7C795B63A2B80F3B65CE5F3A28843DB4761DB1659288282888970FBED67B922ECFBFE7722131805C0724E
36,088,676 UART: [art] SIG.R = 4F4100AA3FCF030A61E295D22E36BDFD9036D319896078C0A3A1E3AD7B880E71313B6C77E936C3FC8D75894B81CFFB8F
36,096,016 UART: [art] SIG.S = E222206E2CDC2415C14F25CC97B2E66CA27404482DF65B1BB43D0509C413E9E638F4290CBB5FF3308F64B7FE4BA10D99
37,401,463 UART: Caliptra RT
37,402,172 UART: [state] CFI Enabled
37,563,782 UART: [rt] RT listening for mailbox commands...
37,566,172 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,721,466 UART: [rt]cmd =0x41544d4e, len=14344
41,916,940 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,781,148 ready_for_fw is high
3,781,549 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,943,679 >>> mbox cmd response: success
27,642,347 UART:
27,642,727 UART: Running Caliptra FMC ...
27,643,864 UART:
27,644,025 UART: [state] CFI Enabled
27,712,892 UART: [fht] FMC Alias Private Key: 7
30,050,030 UART: [art] Extend RT PCRs Done
30,051,266 UART: [art] Lock RT PCRs Done
30,053,281 UART: [art] Populate DV Done
30,058,859 UART: [fht] FMC Alias Private Key: 7
30,060,359 UART: [art] Derive CDI
30,061,133 UART: [art] Store in in slot 0x4
30,122,680 UART: [art] Derive Key Pair
30,123,723 UART: [art] Store priv key in slot 0x5
33,416,578 UART: [art] Derive Key Pair - Done
33,429,363 UART: [art] Signing Cert with AUTHO
33,430,670 UART: RITY.KEYID = 7
35,717,687 UART: [art] Erasing AUTHORITY.KEYID = 7
35,719,193 UART: [art] PUB.X = BF60212732893F66AC85A1B3DD820CA8059D5390DD0D450893B885E229C6A6FE45AC318B874FBE5E5877DD8104B8F0AF
35,726,405 UART: [art] PUB.Y = E521B9F4F35393F7CBF50F4F387D4A3FFD1EED711B05C1A184A05AD0F44210A7B774B461811928C117EA4D87BAC15AE1
35,733,692 UART: [art] SIG.R = BD70E89DAF7FFA4925D1127B10CACA0677350CB1CEDAEA7AFB08EA4D2174955E0B9B7888D06AA7E3D0A8D7BEC9653C68
35,741,132 UART: [art] SIG.S = 789D39209D722417A4ED475917F95E1F6A988CCA2B8F5CC9F0764E3ADD796028C12AD6D0D1379350BB2A10C4EEF7B573
37,046,448 UART: Caliptra RT
37,047,161 UART: [state] CFI Enabled
37,207,356 UART: [rt] RT listening for mailbox commands...
37,209,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,365,139 UART: [rt]cmd =0x41544d4e, len=14344
41,586,540 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
192,445 UART:
192,815 UART: Running Caliptra ROM ...
194,494 UART:
603,550 UART: [state] CFI Enabled
617,934 UART: [state] LifecycleState = Unprovisioned
619,887 UART: [state] DebugLocked = No
622,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,909 UART: [kat] SHA2-256
796,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,201 UART: [kat] ++
807,641 UART: [kat] sha1
818,593 UART: [kat] SHA2-256
821,314 UART: [kat] SHA2-384
827,510 UART: [kat] SHA2-512-ACC
829,870 UART: [kat] ECC-384
3,113,985 UART: [kat] HMAC-384Kdf
3,126,790 UART: [kat] LMS
4,316,867 UART: [kat] --
4,321,193 UART: [cold-reset] ++
4,323,341 UART: [fht] Storing FHT @ 0x50003400
4,335,021 UART: [idev] ++
4,335,583 UART: [idev] CDI.KEYID = 6
4,336,459 UART: [idev] SUBJECT.KEYID = 7
4,337,764 UART: [idev] UDS.KEYID = 0
4,338,745 ready_for_fw is high
4,338,935 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,243 UART: [idev] Erasing UDS.KEYID = 0
7,627,653 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,695 UART: [idev] --
7,652,657 UART: [ldev] ++
7,653,279 UART: [ldev] CDI.KEYID = 6
7,654,158 UART: [ldev] SUBJECT.KEYID = 5
7,655,412 UART: [ldev] AUTHORITY.KEYID = 7
7,656,696 UART: [ldev] FE.KEYID = 1
7,668,220 UART: [ldev] Erasing FE.KEYID = 1
10,956,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,929 UART: [ldev] --
13,317,281 UART: [fwproc] Waiting for Commands...
13,319,469 UART: [fwproc] Received command 0x46574c44
13,321,704 UART: [fwproc] Received Image of size 114124 bytes
22,428,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,510,863 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,579,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,897,105 >>> mbox cmd response: success
22,902,139 UART: [afmc] ++
22,902,725 UART: [afmc] CDI.KEYID = 6
22,903,628 UART: [afmc] SUBJECT.KEYID = 7
22,904,901 UART: [afmc] AUTHORITY.KEYID = 5
26,220,049 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,514,914 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,517,225 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,531,741 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,546,514 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,560,742 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,581,277 UART: [afmc] --
28,585,841 UART: [cold-reset] --
28,591,163 UART: [state] Locking Datavault
28,596,201 UART: [state] Locking PCR0, PCR1 and PCR31
28,597,996 UART: [state] Locking ICCM
28,600,421 UART: [exit] Launching FMC @ 0x40000130
28,608,826 UART:
28,609,058 UART: Running Caliptra FMC ...
28,610,178 UART:
28,610,332 UART: [state] CFI Enabled
28,618,586 UART: [fht] FMC Alias Private Key: 7
30,949,830 UART: [art] Extend RT PCRs Done
30,951,052 UART: [art] Lock RT PCRs Done
30,952,488 UART: [art] Populate DV Done
30,957,848 UART: [fht] FMC Alias Private Key: 7
30,959,488 UART: [art] Derive CDI
30,960,217 UART: [art] Store in in slot 0x4
31,003,518 UART: [art] Derive Key Pair
31,004,561 UART: [art] Store priv key in slot 0x5
34,246,264 UART: [art] Derive Key Pair - Done
34,259,261 UART: [art] Signing Cert with AUTHO
34,260,564 UART: RITY.KEYID = 7
36,539,562 UART: [art] Erasing AUTHORITY.KEYID = 7
36,541,074 UART: [art] PUB.X = 03D953ACDCD382EF488F300B16476B2359730F6880CC8EC23D35AA16A80842696C37F8F0A679C5ACA91DB56A7C8CB9E5
36,548,329 UART: [art] PUB.Y = 0E45CD566E1EE205F3170256FF7382EDBFF4F4CA7FE481F51A6195D217C11A9C4D5D351024C6C914C4F71E2093DA1BF7
36,555,598 UART: [art] SIG.R = 64F029E2FF2D23B9668A436D56FA84341F2A019E6B223C488505EEABB8275F1D20CB50C12C380D1EE53428A8407CEA16
36,562,917 UART: [art] SIG.S = B2851D17F3B107718F162B23D15E8F0F5E4E0990C304DB729864E4C1FB6307AD37573B20E8B2B4D4E6A06CA3EC4E41C3
37,868,399 UART: Caliptra RT
37,869,125 UART: [state] CFI Enabled
37,986,639 UART: [rt] RT listening for mailbox commands...
37,988,974 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,144,351 UART: [rt]cmd =0x41544d4e, len=14344
42,417,279 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,130,212 ready_for_fw is high
4,130,602 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,063,789 >>> mbox cmd response: success
27,697,591 UART:
27,697,977 UART: Running Caliptra FMC ...
27,699,064 UART:
27,699,216 UART: [state] CFI Enabled
27,707,415 UART: [fht] FMC Alias Private Key: 7
30,037,863 UART: [art] Extend RT PCRs Done
30,039,092 UART: [art] Lock RT PCRs Done
30,040,799 UART: [art] Populate DV Done
30,046,276 UART: [fht] FMC Alias Private Key: 7
30,047,927 UART: [art] Derive CDI
30,048,660 UART: [art] Store in in slot 0x4
30,091,422 UART: [art] Derive Key Pair
30,092,460 UART: [art] Store priv key in slot 0x5
33,334,944 UART: [art] Derive Key Pair - Done
33,348,055 UART: [art] Signing Cert with AUTHO
33,349,407 UART: RITY.KEYID = 7
35,628,780 UART: [art] Erasing AUTHORITY.KEYID = 7
35,630,284 UART: [art] PUB.X = B3124AD9DFCAFE34CCF0CBEA0A734D2D30A4217DCB717C130DECB8245FA6F5E10F0F94480BF066B3D52D689EED365A9A
35,637,576 UART: [art] PUB.Y = 58B24E24E45965ABF600CEC4B79E6C26E5C213A9B216EBDFD8C2377A6B2D0D6E927F50117ACD4A3AA20915A6A070BAC2
35,644,796 UART: [art] SIG.R = 6663F611423F035B735102464E96E3EB12DB708CFBEC9296402E8152E7D36A9F8D03E43970677C2D5E4D623A123D8C76
35,652,181 UART: [art] SIG.S = 7153D3E30E14A4F645F7D2CDCE5CEB14110D573D1BB6579451F32105D5EB28474F2A44E8CE0A98EF013BF3B2AAA5E8C8
36,957,679 UART: Caliptra RT
36,958,388 UART: [state] CFI Enabled
37,075,996 UART: [rt] RT listening for mailbox commands...
37,078,320 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,233,584 UART: [rt]cmd =0x41544d4e, len=14344
41,324,511 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
192,234 UART:
192,594 UART: Running Caliptra ROM ...
193,793 UART:
193,945 UART: [state] CFI Enabled
264,113 UART: [state] LifecycleState = Unprovisioned
266,028 UART: [state] DebugLocked = No
268,630 UART: [state] WD Timer not started. Device not locked for debugging
271,811 UART: [kat] SHA2-256
450,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,504 UART: [kat] ++
462,955 UART: [kat] sha1
475,336 UART: [kat] SHA2-256
478,342 UART: [kat] SHA2-384
485,250 UART: [kat] SHA2-512-ACC
488,262 UART: [kat] ECC-384
2,949,500 UART: [kat] HMAC-384Kdf
2,972,418 UART: [kat] LMS
3,501,881 UART: [kat] --
3,505,089 UART: [cold-reset] ++
3,507,022 UART: [fht] FHT @ 0x50003400
3,518,924 UART: [idev] ++
3,519,486 UART: [idev] CDI.KEYID = 6
3,520,517 UART: [idev] SUBJECT.KEYID = 7
3,521,620 UART: [idev] UDS.KEYID = 0
3,522,561 ready_for_fw is high
3,522,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,881 UART: [idev] Erasing UDS.KEYID = 0
6,030,412 UART: [idev] Sha1 KeyId Algorithm
6,053,400 UART: [idev] --
6,057,180 UART: [ldev] ++
6,057,763 UART: [ldev] CDI.KEYID = 6
6,058,819 UART: [ldev] SUBJECT.KEYID = 5
6,059,923 UART: [ldev] AUTHORITY.KEYID = 7
6,061,098 UART: [ldev] FE.KEYID = 1
6,101,261 UART: [ldev] Erasing FE.KEYID = 1
8,603,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,495 UART: [ldev] --
10,414,594 UART: [fwproc] Wait for Commands...
10,417,065 UART: [fwproc] Recv command 0x46574c44
10,419,177 UART: [fwproc] Recv'd Img size: 114448 bytes
14,994,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,073,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,142,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,461,095 >>> mbox cmd response: success
15,465,697 UART: [afmc] ++
15,466,305 UART: [afmc] CDI.KEYID = 6
15,467,189 UART: [afmc] SUBJECT.KEYID = 7
15,468,402 UART: [afmc] AUTHORITY.KEYID = 5
18,005,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,728,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,730,470 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,746,450 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,762,410 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,778,189 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,800,645 UART: [afmc] --
19,805,068 UART: [cold-reset] --
19,809,798 UART: [state] Locking Datavault
19,814,612 UART: [state] Locking PCR0, PCR1 and PCR31
19,816,343 UART: [state] Locking ICCM
19,818,178 UART: [exit] Launching FMC @ 0x40000130
19,826,634 UART:
19,826,869 UART: Running Caliptra FMC ...
19,827,969 UART:
19,828,133 UART: [state] CFI Enabled
19,886,821 UART: [fht] FMC Alias Private Key: 7
21,650,246 UART: [art] Extend RT PCRs Done
21,651,463 UART: [art] Lock RT PCRs Done
21,653,043 UART: [art] Populate DV Done
21,658,444 UART: [fht] FMC Alias Private Key: 7
21,660,149 UART: [art] Derive CDI
21,660,962 UART: [art] Store in in slot 0x4
21,719,156 UART: [art] Derive Key Pair
21,720,159 UART: [art] Store priv key in slot 0x5
24,183,342 UART: [art] Derive Key Pair - Done
24,196,352 UART: [art] Signing Cert with AUTHO
24,197,655 UART: RITY.KEYID = 7
25,909,752 UART: [art] Erasing AUTHORITY.KEYID = 7
25,911,265 UART: [art] PUB.X = 589C8CBAB29192D19EDA1A210CB73A0AD48B18EF876593BBE3F87CB28C343DD0AA8D76D0F389709551E31340B88CAAEA
25,918,521 UART: [art] PUB.Y = 436D947922BCE8216DE1FD4C9172056A5F6522870B39F02DC9DD09DF8384D60F4CE6CDB7569A955547A4A8BACE79FCC7
25,925,814 UART: [art] SIG.R = A7A92E78C195CFEF4F6566F8F5B6ED886AA9EF390E14E2B7A1D5F6CE2545C8FBA48641B1F85E9CFD70B0BE64D2DEA60B
25,933,214 UART: [art] SIG.S = DFF7795F9D850261C56419442BFEF04DA7CB37DE9E3B135E17D368DD45A8F8D0D2E61EBFFF3E055E9C9858D40C09E39E
26,911,980 UART: Caliptra RT
26,912,974 UART: [state] CFI Enabled
27,078,920 UART: [rt] RT listening for mailbox commands...
27,081,264 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,237,379 UART: [rt]cmd =0x41544d4e, len=14344
29,636,141 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,359,277 ready_for_fw is high
3,359,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,066,687 >>> mbox cmd response: success
19,349,851 UART:
19,350,248 UART: Running Caliptra FMC ...
19,351,360 UART:
19,351,535 UART: [state] CFI Enabled
19,417,190 UART: [fht] FMC Alias Private Key: 7
21,180,663 UART: [art] Extend RT PCRs Done
21,181,889 UART: [art] Lock RT PCRs Done
21,183,650 UART: [art] Populate DV Done
21,189,050 UART: [fht] FMC Alias Private Key: 7
21,190,648 UART: [art] Derive CDI
21,191,390 UART: [art] Store in in slot 0x4
21,249,794 UART: [art] Derive Key Pair
21,250,835 UART: [art] Store priv key in slot 0x5
23,714,028 UART: [art] Derive Key Pair - Done
23,727,190 UART: [art] Signing Cert with AUTHO
23,728,500 UART: RITY.KEYID = 7
25,439,827 UART: [art] Erasing AUTHORITY.KEYID = 7
25,441,328 UART: [art] PUB.X = DE5A5F3D85219FAF2660EF25C03A46DB1E9CFD2B2D2BC4D94E6FE96B9F473EE0A960E24EE10CFDB0A3D4A3A1474D34EB
25,448,632 UART: [art] PUB.Y = 886D56ECE3CFC1B85B2506926174C79054A907C714072CE863EF138814C47BF01847EF34FF66AEE3E981B9EF8A52B40A
25,455,905 UART: [art] SIG.R = 72A337F342662EE77176AB858597519A855A10C58E7D081358B97872F15A49E4925E40F7313564F4D4B28AA811785554
25,463,402 UART: [art] SIG.S = AF38BD1BAD9FA24F5102B50AC31524E7C1BA20927D8608E2C6DB8A9197DBFB487949578836E85B0D7ADD614CDBE1B434
26,442,251 UART: Caliptra RT
26,442,966 UART: [state] CFI Enabled
26,608,936 UART: [rt] RT listening for mailbox commands...
26,611,248 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,767,382 UART: [rt]cmd =0x41544d4e, len=14344
29,155,023 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,339 UART:
192,694 UART: Running Caliptra ROM ...
193,851 UART:
603,581 UART: [state] CFI Enabled
617,315 UART: [state] LifecycleState = Unprovisioned
619,179 UART: [state] DebugLocked = No
620,854 UART: [state] WD Timer not started. Device not locked for debugging
624,880 UART: [kat] SHA2-256
803,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,583 UART: [kat] ++
816,025 UART: [kat] sha1
827,887 UART: [kat] SHA2-256
830,949 UART: [kat] SHA2-384
836,362 UART: [kat] SHA2-512-ACC
839,314 UART: [kat] ECC-384
3,277,117 UART: [kat] HMAC-384Kdf
3,289,136 UART: [kat] LMS
3,818,571 UART: [kat] --
3,823,078 UART: [cold-reset] ++
3,824,224 UART: [fht] FHT @ 0x50003400
3,835,266 UART: [idev] ++
3,835,828 UART: [idev] CDI.KEYID = 6
3,836,873 UART: [idev] SUBJECT.KEYID = 7
3,837,965 UART: [idev] UDS.KEYID = 0
3,838,880 ready_for_fw is high
3,839,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,982,791 UART: [idev] Erasing UDS.KEYID = 0
6,309,503 UART: [idev] Sha1 KeyId Algorithm
6,333,426 UART: [idev] --
6,336,173 UART: [ldev] ++
6,336,737 UART: [ldev] CDI.KEYID = 6
6,337,638 UART: [ldev] SUBJECT.KEYID = 5
6,338,843 UART: [ldev] AUTHORITY.KEYID = 7
6,340,065 UART: [ldev] FE.KEYID = 1
6,351,192 UART: [ldev] Erasing FE.KEYID = 1
8,825,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,348 UART: [ldev] --
10,618,451 UART: [fwproc] Wait for Commands...
10,620,537 UART: [fwproc] Recv command 0x46574c44
10,622,618 UART: [fwproc] Recv'd Img size: 114448 bytes
15,193,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,277,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,346,498 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,664,070 >>> mbox cmd response: success
15,669,168 UART: [afmc] ++
15,669,760 UART: [afmc] CDI.KEYID = 6
15,670,639 UART: [afmc] SUBJECT.KEYID = 7
15,671,848 UART: [afmc] AUTHORITY.KEYID = 5
18,173,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,893,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,895,503 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,911,458 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,927,422 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,943,187 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,967,291 UART: [afmc] --
19,971,454 UART: [cold-reset] --
19,973,532 UART: [state] Locking Datavault
19,977,312 UART: [state] Locking PCR0, PCR1 and PCR31
19,979,019 UART: [state] Locking ICCM
19,981,003 UART: [exit] Launching FMC @ 0x40000130
19,989,457 UART:
19,989,687 UART: Running Caliptra FMC ...
19,990,781 UART:
19,990,932 UART: [state] CFI Enabled
19,999,030 UART: [fht] FMC Alias Private Key: 7
21,755,262 UART: [art] Extend RT PCRs Done
21,756,491 UART: [art] Lock RT PCRs Done
21,758,191 UART: [art] Populate DV Done
21,763,541 UART: [fht] FMC Alias Private Key: 7
21,765,136 UART: [art] Derive CDI
21,765,868 UART: [art] Store in in slot 0x4
21,808,653 UART: [art] Derive Key Pair
21,809,715 UART: [art] Store priv key in slot 0x5
24,236,206 UART: [art] Derive Key Pair - Done
24,249,039 UART: [art] Signing Cert with AUTHO
24,250,337 UART: RITY.KEYID = 7
25,955,772 UART: [art] Erasing AUTHORITY.KEYID = 7
25,957,264 UART: [art] PUB.X = 61F8CE06A61388474E3C9EAB8D13D1A0D5C5400C7A7AECBBBA468CE676CE03F293C68632FD2C605C0CC1A1C1954C4252
25,964,598 UART: [art] PUB.Y = C0E64E29BE5060DB597D99532EE2AE78DAFD4897B253C4AFD3E8525CE4A109273608B58437825C85AA3E09419ED1E9D0
25,971,821 UART: [art] SIG.R = A61A9C21AEEFC74878A9694555A527E18B9D860958BA9A9F1EDD4A8CF32A548DC3E12EAA0F47C49B9E9AF5D07280D441
25,979,205 UART: [art] SIG.S = 629593150441B13DD22EF208179927E93B6EAA539D25BD85113E66AA80FEE767E02F8345610DCC3210B1D4F368580152
26,957,512 UART: Caliptra RT
26,958,222 UART: [state] CFI Enabled
27,075,332 UART: [rt] RT listening for mailbox commands...
27,077,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,232,988 UART: [rt]cmd =0x41544d4e, len=14344
29,624,074 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
3,695,143 ready_for_fw is high
3,695,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,220,474 >>> mbox cmd response: success
19,473,040 UART:
19,473,441 UART: Running Caliptra FMC ...
19,474,567 UART:
19,474,717 UART: [state] CFI Enabled
19,482,534 UART: [fht] FMC Alias Private Key: 7
21,239,654 UART: [art] Extend RT PCRs Done
21,240,875 UART: [art] Lock RT PCRs Done
21,242,387 UART: [art] Populate DV Done
21,247,556 UART: [fht] FMC Alias Private Key: 7
21,249,037 UART: [art] Derive CDI
21,249,794 UART: [art] Store in in slot 0x4
21,292,275 UART: [art] Derive Key Pair
21,293,270 UART: [art] Store priv key in slot 0x5
23,720,299 UART: [art] Derive Key Pair - Done
23,733,091 UART: [art] Signing Cert with AUTHO
23,734,406 UART: RITY.KEYID = 7
25,439,885 UART: [art] Erasing AUTHORITY.KEYID = 7
25,441,398 UART: [art] PUB.X = FBB2D173E557EC9EDDAD05DF24DB91FA66BDF4447D02D832D17724C898D382FDA4A9F72B064116EC087CE3F07C6FC064
25,448,663 UART: [art] PUB.Y = BCADE21CEFC5090E9C2B840E495365999CE5D19D022A5DD5C18B6F741731FA40AE5DB415734621E6175784AE8A519F80
25,455,964 UART: [art] SIG.R = 3C92BC635E373AF542CE91EF10FC6FAC7052FF98E1379AAA8D91938146CFB9280A2BE3D49B0D3CF26B4C5A3C30BD56B9
25,463,365 UART: [art] SIG.S = EB40F9D4DD811008230B40F2107773F667B7307B7F1740F1741D33707C7A088034DD13A7EAA56C2F60A211D129017686
26,442,293 UART: Caliptra RT
26,442,989 UART: [state] CFI Enabled
26,559,022 UART: [rt] RT listening for mailbox commands...
26,561,540 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,717,090 UART: [rt]cmd =0x41544d4e, len=14344
29,121,449 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,420,091 ready_for_fw is high
3,420,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,842,040 >>> mbox cmd response: success
20,153,949 UART:
20,154,352 UART: Running Caliptra FMC ...
20,155,627 UART:
20,155,832 UART: [state] CFI Enabled
20,226,917 UART: [fht] FMC Alias Private Key: 7
21,990,528 UART: [art] Extend RT PCRs Done
21,991,754 UART: [art] Lock RT PCRs Done
21,993,380 UART: [art] Populate DV Done
21,998,685 UART: [fht] FMC Alias Private Key: 7
22,000,225 UART: [art] Derive CDI
22,001,049 UART: [art] Store in in slot 0x4
22,059,188 UART: [art] Derive Key Pair
22,060,234 UART: [art] Store priv key in slot 0x5
24,523,078 UART: [art] Derive Key Pair - Done
24,536,139 UART: [art] Signing Cert with AUTHO
24,537,451 UART: RITY.KEYID = 7
26,248,748 UART: [art] Erasing AUTHORITY.KEYID = 7
26,250,264 UART: [art] PUB.X = 70D7BB389891455C9DF22477E34A0CF0504E2BB90139DAF449B216CB2B359B2B998FECA3BF05A503021AF978708BF57F
26,257,516 UART: [art] PUB.Y = 29D876EB5A1C740D5102844906E96C900931155DF82FC2CF189EB11C5751A06665E35FE083463BDBA56BF37C7F97FBEC
26,264,794 UART: [art] SIG.R = 63A53B370D820E7B37B9A4286FF6828DB60D926AFA5936701F830B79A73E43950A36992D64DC31E63F32C824BB8FB25B
26,272,195 UART: [art] SIG.S = 37542210848F0F7DB403EF6C908BBCA5DA3590B5D3C4A8BBD9E4C48ABFBE09F77E94656D32A63C2BEE10B87F13FB1D37
27,250,817 UART: Caliptra RT
27,251,524 UART: [state] CFI Enabled
27,416,752 UART: [rt] RT listening for mailbox commands...
27,419,028 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,574,954 UART: [rt]cmd =0x41544d4e, len=14344
29,966,801 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,761,103 ready_for_fw is high
3,761,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,066,581 >>> mbox cmd response: success
20,321,584 UART:
20,321,972 UART: Running Caliptra FMC ...
20,323,157 UART:
20,323,318 UART: [state] CFI Enabled
20,330,962 UART: [fht] FMC Alias Private Key: 7
22,088,437 UART: [art] Extend RT PCRs Done
22,089,649 UART: [art] Lock RT PCRs Done
22,091,330 UART: [art] Populate DV Done
22,096,731 UART: [fht] FMC Alias Private Key: 7
22,098,431 UART: [art] Derive CDI
22,099,242 UART: [art] Store in in slot 0x4
22,141,947 UART: [art] Derive Key Pair
22,142,940 UART: [art] Store priv key in slot 0x5
24,569,700 UART: [art] Derive Key Pair - Done
24,582,940 UART: [art] Signing Cert with AUTHO
24,584,255 UART: RITY.KEYID = 7
26,289,480 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,971 UART: [art] PUB.X = A792376140FE061C3FC7AE72C000979F90EEEBDCD51AC89D9C3033779532D717F3FDA5F258DF6C18AE1C685B42634E4A
26,298,254 UART: [art] PUB.Y = D869C8E7739618FDB6A1F2CF66856F8B82FDF3931F77A838BEFEBA37FE747689A40B4650E79262C441932F56203F63B0
26,306,041 UART: [art] SIG.R = 4A3166CB91447C6CB8857B6F6E59D99B23C8F912F91F51085348B4AE7C59B6F5DC245CD94FFD426E48B0FC15B668DCA5
26,312,944 UART: [art] SIG.S = 8EFA89EE721EF6E418F8BA2BB31D1C98E4C77A2A90E7329BE2F5F30BFD53B7DFEBC1A507CB1BC2B970DFC7C2C5CE5ECA
27,291,709 UART: Caliptra RT
27,292,398 UART: [state] CFI Enabled
27,410,044 UART: [rt] RT listening for mailbox commands...
27,412,343 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,568,011 UART: [rt]cmd =0x41544d4e, len=14344
29,967,498 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,119 UART: [kat] SHA2-256
882,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,165 UART: [kat] ++
886,317 UART: [kat] sha1
890,565 UART: [kat] SHA2-256
892,503 UART: [kat] SHA2-384
895,350 UART: [kat] SHA2-512-ACC
897,251 UART: [kat] ECC-384
902,700 UART: [kat] HMAC-384Kdf
907,324 UART: [kat] LMS
1,475,520 UART: [kat] --
1,476,329 UART: [cold-reset] ++
1,476,807 UART: [fht] Storing FHT @ 0x50003400
1,479,688 UART: [idev] ++
1,479,856 UART: [idev] CDI.KEYID = 6
1,480,216 UART: [idev] SUBJECT.KEYID = 7
1,480,640 UART: [idev] UDS.KEYID = 0
1,480,985 ready_for_fw is high
1,480,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,698 UART: [idev] Erasing UDS.KEYID = 0
1,505,422 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,054 UART: [idev] --
1,515,227 UART: [ldev] ++
1,515,395 UART: [ldev] CDI.KEYID = 6
1,515,758 UART: [ldev] SUBJECT.KEYID = 5
1,516,184 UART: [ldev] AUTHORITY.KEYID = 7
1,516,647 UART: [ldev] FE.KEYID = 1
1,521,751 UART: [ldev] Erasing FE.KEYID = 1
1,546,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,060 UART: [ldev] --
1,585,373 UART: [fwproc] Waiting for Commands...
1,586,212 UART: [fwproc] Received command 0x46574c44
1,587,003 UART: [fwproc] Received Image of size 114448 bytes
5,083,796 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,111,716 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,141,068 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,277,099 >>> mbox cmd response: success
5,278,277 UART: [afmc] ++
5,278,445 UART: [afmc] CDI.KEYID = 6
5,278,807 UART: [afmc] SUBJECT.KEYID = 7
5,279,232 UART: [afmc] AUTHORITY.KEYID = 5
5,315,026 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,331,280 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,332,060 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,337,769 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,343,661 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,349,362 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,357,428 UART: [afmc] --
5,358,484 UART: [cold-reset] --
5,359,358 UART: [state] Locking Datavault
5,360,581 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,185 UART: [state] Locking ICCM
5,361,727 UART: [exit] Launching FMC @ 0x40000130
5,367,056 UART:
5,367,072 UART: Running Caliptra FMC ...
5,367,480 UART:
5,367,534 UART: [state] CFI Enabled
5,377,596 UART: [fht] FMC Alias Private Key: 7
5,485,748 UART: [art] Extend RT PCRs Done
5,486,176 UART: [art] Lock RT PCRs Done
5,487,596 UART: [art] Populate DV Done
5,495,700 UART: [fht] FMC Alias Private Key: 7
5,496,656 UART: [art] Derive CDI
5,496,936 UART: [art] Store in in slot 0x4
5,582,531 UART: [art] Derive Key Pair
5,582,891 UART: [art] Store priv key in slot 0x5
5,595,847 UART: [art] Derive Key Pair - Done
5,610,817 UART: [art] Signing Cert with AUTHO
5,611,297 UART: RITY.KEYID = 7
5,626,307 UART: [art] Erasing AUTHORITY.KEYID = 7
5,627,072 UART: [art] PUB.X = A2132DE15FCEC7A0397FC67AA4DEB97E390C0BA9B607588DB5A2D511316445A77FE1944E6A5C7314C0D0DE938FAB19AF
5,633,849 UART: [art] PUB.Y = 462597F05445E7C14D19840AE3B0F4C775D63DE2AEF7B1CAC896DA85EA20E14CB0089E01709B7F813045DF416CFD813B
5,640,798 UART: [art] SIG.R = 6E8B2375D6E001600724829B353243B13D50B968420401F80FC1AAFBD2587DC6467530B7557139CDA1188C0C0CE6DF41
5,647,541 UART: [art] SIG.S = 8287E76D48E382B62094CDEC6B4C2EA0F0253AD8D07F2A75D6C1F2D392C39F6DB519705AB19FE1DDD2E12AB14975BA29
5,670,776 UART: Caliptra RT
5,671,029 UART: [state] CFI Enabled
5,778,636 UART: [rt] RT listening for mailbox commands...
5,779,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,902,188 UART: [rt]cmd =0x41544d4e, len=14344
6,541,760 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,961 ready_for_fw is high
1,362,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,203,977 >>> mbox cmd response: success
5,266,396 UART:
5,266,412 UART: Running Caliptra FMC ...
5,266,820 UART:
5,266,874 UART: [state] CFI Enabled
5,277,194 UART: [fht] FMC Alias Private Key: 7
5,384,860 UART: [art] Extend RT PCRs Done
5,385,288 UART: [art] Lock RT PCRs Done
5,386,440 UART: [art] Populate DV Done
5,394,828 UART: [fht] FMC Alias Private Key: 7
5,395,766 UART: [art] Derive CDI
5,396,046 UART: [art] Store in in slot 0x4
5,481,275 UART: [art] Derive Key Pair
5,481,635 UART: [art] Store priv key in slot 0x5
5,494,583 UART: [art] Derive Key Pair - Done
5,509,196 UART: [art] Signing Cert with AUTHO
5,509,676 UART: RITY.KEYID = 7
5,524,966 UART: [art] Erasing AUTHORITY.KEYID = 7
5,525,731 UART: [art] PUB.X = B093DD042F646635BEC6A935DF2F86E6D611D79D91ACB8CB8C5E1BEBAB692760EC1CCB35D5F91102054D8D47BEE46B9E
5,532,512 UART: [art] PUB.Y = 7D3BD9B210918C9FFB87CEA58531AD72259CC66E5DE6C6D3DEBAA4497C11102579D8507ACDC2D41159A5D6462E22F3ED
5,539,476 UART: [art] SIG.R = 78C80D58EB1FFF7816EB0008BD7EBB8818F6099E0E4933334BC9CA38C7671F4815DCE17C8CE1EB8C8927BA153F75C650
5,546,222 UART: [art] SIG.S = B2ECDE521AB1D13FFAE921757D3177E90959D0FC1F89F5AF6721358D48178EA9D5F2A6D3E94F2D955EEDD385FE66A3AA
5,569,418 UART: Caliptra RT
5,569,671 UART: [state] CFI Enabled
5,678,288 UART: [rt] RT listening for mailbox commands...
5,678,958 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,801,840 UART: [rt]cmd =0x41544d4e, len=14344
6,448,369 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,716 UART: [kat] SHA2-256
892,654 UART: [kat] SHA2-384
895,405 UART: [kat] SHA2-512-ACC
897,306 UART: [kat] ECC-384
903,251 UART: [kat] HMAC-384Kdf
907,813 UART: [kat] LMS
1,476,009 UART: [kat] --
1,477,030 UART: [cold-reset] ++
1,477,484 UART: [fht] Storing FHT @ 0x50003400
1,480,345 UART: [idev] ++
1,480,513 UART: [idev] CDI.KEYID = 6
1,480,873 UART: [idev] SUBJECT.KEYID = 7
1,481,297 UART: [idev] UDS.KEYID = 0
1,481,642 ready_for_fw is high
1,481,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,283 UART: [idev] Erasing UDS.KEYID = 0
1,505,927 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,551 UART: [idev] --
1,515,540 UART: [ldev] ++
1,515,708 UART: [ldev] CDI.KEYID = 6
1,516,071 UART: [ldev] SUBJECT.KEYID = 5
1,516,497 UART: [ldev] AUTHORITY.KEYID = 7
1,516,960 UART: [ldev] FE.KEYID = 1
1,521,964 UART: [ldev] Erasing FE.KEYID = 1
1,547,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,185 UART: [ldev] --
1,586,506 UART: [fwproc] Waiting for Commands...
1,587,363 UART: [fwproc] Received command 0x46574c44
1,588,154 UART: [fwproc] Received Image of size 114448 bytes
4,970,936 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,999,468 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,028,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,164,737 >>> mbox cmd response: success
5,165,927 UART: [afmc] ++
5,166,095 UART: [afmc] CDI.KEYID = 6
5,166,457 UART: [afmc] SUBJECT.KEYID = 7
5,166,882 UART: [afmc] AUTHORITY.KEYID = 5
5,201,982 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,218,226 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,219,006 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,224,715 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,230,607 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,236,308 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,244,130 UART: [afmc] --
5,245,186 UART: [cold-reset] --
5,246,030 UART: [state] Locking Datavault
5,247,315 UART: [state] Locking PCR0, PCR1 and PCR31
5,247,919 UART: [state] Locking ICCM
5,248,395 UART: [exit] Launching FMC @ 0x40000130
5,253,724 UART:
5,253,740 UART: Running Caliptra FMC ...
5,254,148 UART:
5,254,291 UART: [state] CFI Enabled
5,265,059 UART: [fht] FMC Alias Private Key: 7
5,373,233 UART: [art] Extend RT PCRs Done
5,373,661 UART: [art] Lock RT PCRs Done
5,375,283 UART: [art] Populate DV Done
5,383,497 UART: [fht] FMC Alias Private Key: 7
5,384,457 UART: [art] Derive CDI
5,384,737 UART: [art] Store in in slot 0x4
5,470,634 UART: [art] Derive Key Pair
5,470,994 UART: [art] Store priv key in slot 0x5
5,484,358 UART: [art] Derive Key Pair - Done
5,499,559 UART: [art] Signing Cert with AUTHO
5,500,039 UART: RITY.KEYID = 7
5,515,069 UART: [art] Erasing AUTHORITY.KEYID = 7
5,515,834 UART: [art] PUB.X = 4B006DB9744694EA2635E94FAD68AA14F140750A63DE31991BE0D86E0A24F636B6ACFF2B5AFF9AC4D81DA46F7A7CB143
5,522,592 UART: [art] PUB.Y = 0FF76EAC89703667789C2337311D263EF3FEE5F2088A1EB45458E45DEF44A27DA9702CFBE4379D117124A9C526E3F945
5,529,538 UART: [art] SIG.R = 181870E53CD35156DB999119C3C0FD1A3C1E891D908F3485F87A14330AF573568F4D5CBD0CD0DD39B313CAC2B3EA2F9D
5,536,312 UART: [art] SIG.S = DB0B40BD1F30C67E96BA4D74945CAA892AD08E6BD8C509B0A24CE07F28DE2FEC0C96955F41E2655490F29C2632AE6A54
5,559,552 UART: Caliptra RT
5,559,897 UART: [state] CFI Enabled
5,667,426 UART: [rt] RT listening for mailbox commands...
5,668,096 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,791,170 UART: [rt]cmd =0x41544d4e, len=14344
6,428,539 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,900 ready_for_fw is high
1,362,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,315,479 >>> mbox cmd response: success
5,377,784 UART:
5,377,800 UART: Running Caliptra FMC ...
5,378,208 UART:
5,378,351 UART: [state] CFI Enabled
5,389,047 UART: [fht] FMC Alias Private Key: 7
5,496,693 UART: [art] Extend RT PCRs Done
5,497,121 UART: [art] Lock RT PCRs Done
5,498,515 UART: [art] Populate DV Done
5,506,795 UART: [fht] FMC Alias Private Key: 7
5,507,939 UART: [art] Derive CDI
5,508,219 UART: [art] Store in in slot 0x4
5,593,708 UART: [art] Derive Key Pair
5,594,068 UART: [art] Store priv key in slot 0x5
5,607,734 UART: [art] Derive Key Pair - Done
5,622,403 UART: [art] Signing Cert with AUTHO
5,622,883 UART: RITY.KEYID = 7
5,637,859 UART: [art] Erasing AUTHORITY.KEYID = 7
5,638,624 UART: [art] PUB.X = E07995C9EBFCFBF62B6985098578816E0653E6C47CBD7DD30A97AF916FBC706841576BEEB9565F3EE711B0E77FC1EDDB
5,645,401 UART: [art] PUB.Y = F0E1F1D893CD94BC20D903D5E183033906896A1118A779F477298713E30F9950417286EB5430C6BC5A84C05560A35F66
5,652,327 UART: [art] SIG.R = B9BDFB57C80C246E2205E1837052531B7AA7C0FF1CAE80D3EC49940BD14C492F727C2AF16406DC2736FB18AFD8DE4CE7
5,659,101 UART: [art] SIG.S = B7766427406ACCB2FAB0A65EFE7727EA14B71C061B7648E06B605903DED2447D70FB07BBD2F04810260552D5791F2159
5,683,304 UART: Caliptra RT
5,683,649 UART: [state] CFI Enabled
5,791,717 UART: [rt] RT listening for mailbox commands...
5,792,387 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,915,315 UART: [rt]cmd =0x41544d4e, len=14344
6,554,629 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
893,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,171 UART: [kat] ++
897,323 UART: [kat] sha1
901,489 UART: [kat] SHA2-256
903,429 UART: [kat] SHA2-384
906,274 UART: [kat] SHA2-512-ACC
908,175 UART: [kat] ECC-384
918,080 UART: [kat] HMAC-384Kdf
922,732 UART: [kat] LMS
1,171,060 UART: [kat] --
1,172,135 UART: [cold-reset] ++
1,172,505 UART: [fht] FHT @ 0x50003400
1,175,290 UART: [idev] ++
1,175,458 UART: [idev] CDI.KEYID = 6
1,175,818 UART: [idev] SUBJECT.KEYID = 7
1,176,242 UART: [idev] UDS.KEYID = 0
1,176,587 ready_for_fw is high
1,176,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,550 UART: [idev] Erasing UDS.KEYID = 0
1,201,323 UART: [idev] Sha1 KeyId Algorithm
1,209,967 UART: [idev] --
1,211,087 UART: [ldev] ++
1,211,255 UART: [ldev] CDI.KEYID = 6
1,211,618 UART: [ldev] SUBJECT.KEYID = 5
1,212,044 UART: [ldev] AUTHORITY.KEYID = 7
1,212,507 UART: [ldev] FE.KEYID = 1
1,217,823 UART: [ldev] Erasing FE.KEYID = 1
1,243,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,935 UART: [ldev] --
1,283,306 UART: [fwproc] Wait for Commands...
1,284,046 UART: [fwproc] Recv command 0x46574c44
1,284,774 UART: [fwproc] Recv'd Img size: 114448 bytes
3,120,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,230 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,534 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,313,623 >>> mbox cmd response: success
3,314,645 UART: [afmc] ++
3,314,813 UART: [afmc] CDI.KEYID = 6
3,315,175 UART: [afmc] SUBJECT.KEYID = 7
3,315,600 UART: [afmc] AUTHORITY.KEYID = 5
3,350,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,387 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,096 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,988 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,699 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,510 UART: [afmc] --
3,394,480 UART: [cold-reset] --
3,395,306 UART: [state] Locking Datavault
3,396,503 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,107 UART: [state] Locking ICCM
3,397,663 UART: [exit] Launching FMC @ 0x40000130
3,402,992 UART:
3,403,008 UART: Running Caliptra FMC ...
3,403,416 UART:
3,403,470 UART: [state] CFI Enabled
3,414,014 UART: [fht] FMC Alias Private Key: 7
3,521,826 UART: [art] Extend RT PCRs Done
3,522,254 UART: [art] Lock RT PCRs Done
3,523,632 UART: [art] Populate DV Done
3,532,072 UART: [fht] FMC Alias Private Key: 7
3,533,012 UART: [art] Derive CDI
3,533,292 UART: [art] Store in in slot 0x4
3,618,727 UART: [art] Derive Key Pair
3,619,087 UART: [art] Store priv key in slot 0x5
3,632,151 UART: [art] Derive Key Pair - Done
3,646,684 UART: [art] Signing Cert with AUTHO
3,647,164 UART: RITY.KEYID = 7
3,662,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,207 UART: [art] PUB.X = E555E88CEC64AA0AC210D5ECE24C6F0164110392F48AA782882ECAFFD6F8756F57E662CC31BC790D6AE92ADCA3300B6B
3,669,980 UART: [art] PUB.Y = 0F03442BD32A560C94EB1FB5FFB35B942AD351FCB7DC2433EFC01CCE22A09EBFC325FCD6C2E504A107EB8B02F9F233D6
3,676,936 UART: [art] SIG.R = 9BFFC6D90B030E65ECCDEA28DD7E453C245CA28FC7A71CA9283A78ED3D80251FA99862A737C5D358D78AF4548967A227
3,683,709 UART: [art] SIG.S = F68ADE12B0EE5BC0971BCD898366E7F5534A9C00043EBD2B5B04C352A631BFDF28F0FCB53549875DCFAFAD1C93897E28
3,707,726 UART: Caliptra RT
3,707,979 UART: [state] CFI Enabled
3,815,204 UART: [rt] RT listening for mailbox commands...
3,815,874 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,974 UART: [rt]cmd =0x41544d4e, len=14344
4,586,215 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,497 ready_for_fw is high
1,060,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,168,916 >>> mbox cmd response: success
3,231,457 UART:
3,231,473 UART: Running Caliptra FMC ...
3,231,881 UART:
3,231,935 UART: [state] CFI Enabled
3,242,037 UART: [fht] FMC Alias Private Key: 7
3,349,825 UART: [art] Extend RT PCRs Done
3,350,253 UART: [art] Lock RT PCRs Done
3,351,739 UART: [art] Populate DV Done
3,359,895 UART: [fht] FMC Alias Private Key: 7
3,361,071 UART: [art] Derive CDI
3,361,351 UART: [art] Store in in slot 0x4
3,447,122 UART: [art] Derive Key Pair
3,447,482 UART: [art] Store priv key in slot 0x5
3,460,906 UART: [art] Derive Key Pair - Done
3,475,745 UART: [art] Signing Cert with AUTHO
3,476,225 UART: RITY.KEYID = 7
3,491,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,122 UART: [art] PUB.X = 54253F0E3E1BA5ACFE7A0C1421EDA2502C54524E7A36E15755BEAC033DBFFA03130D89ED72A117DBA68503525DFA5FED
3,498,892 UART: [art] PUB.Y = A8331543081C06068D215B7A7C3E03668EFAF5C4BDC4330CA8CAC4E873FDAD3D68A4F6070090A706D0747E01DDA9C062
3,505,804 UART: [art] SIG.R = 95825BDB709E6E97138C8D5ED56D29C47223534F76B89D1E222C932EBDCFFB4B260969610F8929AFC2FFA78B9B4AE9B2
3,512,578 UART: [art] SIG.S = 09ACF8CBA16124219A9BCC5D8950E23753553676FC82394AB525A4A81A5DC02FCBD70B57974462DA2A45868A21CCE9A9
3,536,487 UART: Caliptra RT
3,536,740 UART: [state] CFI Enabled
3,643,500 UART: [rt] RT listening for mailbox commands...
3,644,170 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,322 UART: [rt]cmd =0x41544d4e, len=14344
4,401,940 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
893,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,490 UART: [kat] ++
897,642 UART: [kat] sha1
901,912 UART: [kat] SHA2-256
903,852 UART: [kat] SHA2-384
906,511 UART: [kat] SHA2-512-ACC
908,412 UART: [kat] ECC-384
918,357 UART: [kat] HMAC-384Kdf
923,127 UART: [kat] LMS
1,171,455 UART: [kat] --
1,172,594 UART: [cold-reset] ++
1,173,174 UART: [fht] FHT @ 0x50003400
1,175,733 UART: [idev] ++
1,175,901 UART: [idev] CDI.KEYID = 6
1,176,261 UART: [idev] SUBJECT.KEYID = 7
1,176,685 UART: [idev] UDS.KEYID = 0
1,177,030 ready_for_fw is high
1,177,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,405 UART: [idev] Erasing UDS.KEYID = 0
1,201,340 UART: [idev] Sha1 KeyId Algorithm
1,209,918 UART: [idev] --
1,211,030 UART: [ldev] ++
1,211,198 UART: [ldev] CDI.KEYID = 6
1,211,561 UART: [ldev] SUBJECT.KEYID = 5
1,211,987 UART: [ldev] AUTHORITY.KEYID = 7
1,212,450 UART: [ldev] FE.KEYID = 1
1,218,006 UART: [ldev] Erasing FE.KEYID = 1
1,245,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,930 UART: [ldev] --
1,284,233 UART: [fwproc] Wait for Commands...
1,284,963 UART: [fwproc] Recv command 0x46574c44
1,285,691 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,317 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,325,270 >>> mbox cmd response: success
3,326,498 UART: [afmc] ++
3,326,666 UART: [afmc] CDI.KEYID = 6
3,327,028 UART: [afmc] SUBJECT.KEYID = 7
3,327,453 UART: [afmc] AUTHORITY.KEYID = 5
3,362,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,454 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,163 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,055 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,766 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,517 UART: [afmc] --
3,406,575 UART: [cold-reset] --
3,407,423 UART: [state] Locking Datavault
3,408,736 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,340 UART: [state] Locking ICCM
3,410,004 UART: [exit] Launching FMC @ 0x40000130
3,415,333 UART:
3,415,349 UART: Running Caliptra FMC ...
3,415,757 UART:
3,415,900 UART: [state] CFI Enabled
3,426,342 UART: [fht] FMC Alias Private Key: 7
3,534,748 UART: [art] Extend RT PCRs Done
3,535,176 UART: [art] Lock RT PCRs Done
3,537,098 UART: [art] Populate DV Done
3,545,080 UART: [fht] FMC Alias Private Key: 7
3,546,062 UART: [art] Derive CDI
3,546,342 UART: [art] Store in in slot 0x4
3,632,389 UART: [art] Derive Key Pair
3,632,749 UART: [art] Store priv key in slot 0x5
3,646,351 UART: [art] Derive Key Pair - Done
3,661,061 UART: [art] Signing Cert with AUTHO
3,661,541 UART: RITY.KEYID = 7
3,676,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,677,658 UART: [art] PUB.X = 0CE04139D76375616EAFCEF725F78ECC39696E5B630C9A265D8E756DCE2DC867DBD0779FBD6402B67CDE668A4D22960F
3,684,428 UART: [art] PUB.Y = 39C31980371D5A46769026D4FA309B2447E3095BFD6937AAA6F2196E03E77247A378221A966853CE5BD1DBD464FBF25E
3,691,370 UART: [art] SIG.R = 5D8A09BD051DAE960846CF03EE9827989482F48466B135C34BBB0881D59BB97C30B2D68D11585426E2320E8A097C96F0
3,698,115 UART: [art] SIG.S = 589BE266AD8EF902047167D26A162C0520F9CDED04BB5CEFB67FC93BF37800B310F1796C4E80DB3B41C57B0E3BE4039D
3,721,492 UART: Caliptra RT
3,721,837 UART: [state] CFI Enabled
3,829,644 UART: [rt] RT listening for mailbox commands...
3,830,314 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,650 UART: [rt]cmd =0x41544d4e, len=14344
4,583,776 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,900 ready_for_fw is high
1,060,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,165,505 >>> mbox cmd response: success
3,227,626 UART:
3,227,642 UART: Running Caliptra FMC ...
3,228,050 UART:
3,228,193 UART: [state] CFI Enabled
3,238,709 UART: [fht] FMC Alias Private Key: 7
3,347,033 UART: [art] Extend RT PCRs Done
3,347,461 UART: [art] Lock RT PCRs Done
3,348,987 UART: [art] Populate DV Done
3,357,403 UART: [fht] FMC Alias Private Key: 7
3,358,339 UART: [art] Derive CDI
3,358,619 UART: [art] Store in in slot 0x4
3,444,210 UART: [art] Derive Key Pair
3,444,570 UART: [art] Store priv key in slot 0x5
3,457,952 UART: [art] Derive Key Pair - Done
3,472,994 UART: [art] Signing Cert with AUTHO
3,473,474 UART: RITY.KEYID = 7
3,488,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,369 UART: [art] PUB.X = D7F66EDDA2FC6E315A0F407A472C14F0FCE083FE4B40A50B5814F4B36F817977A69307E5E0171E439E6AC6E1D41FB0CC
3,496,144 UART: [art] PUB.Y = D4A4F6BA24007B9914FE550C9223741C33EA5BC6A5E6EE3C215733210853B12E1B0828E84745CB03BC0B8DB690D25502
3,503,054 UART: [art] SIG.R = CAB76CE93635AD5E7F69A38CDA0C80C2CFC04857DB8A91B37412F23D3EE65EAEC0475A2817FE6A134AD6F802604FEC1E
3,509,838 UART: [art] SIG.S = 48703B3D9A1AA44D1F196AD2FC9128C00793B2E1BCA6FEFD7436AB0919884ABC798718FB10116D10E148C2C5AA85B3D1
3,532,757 UART: Caliptra RT
3,533,102 UART: [state] CFI Enabled
3,640,544 UART: [rt] RT listening for mailbox commands...
3,641,214 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,198 UART: [rt]cmd =0x41544d4e, len=14344
4,409,072 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,290 UART: [kat] SHA2-512-ACC
906,191 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,468 UART: [kat] LMS
1,168,780 UART: [kat] --
1,169,697 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,174,189 ready_for_fw is high
1,174,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,199,203 UART: [idev] Sha1 KeyId Algorithm
1,208,077 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,626 UART: [ldev] Erasing FE.KEYID = 1
1,241,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,570 UART: [ldev] --
1,280,948 UART: [fwproc] Wait for Commands...
1,281,531 UART: [fwproc] Recv command 0x46574c44
1,282,264 UART: [fwproc] Recv'd Img size: 114448 bytes
3,121,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,638 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,947 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,313,999 >>> mbox cmd response: success
3,315,126 UART: [afmc] ++
3,315,294 UART: [afmc] CDI.KEYID = 6
3,315,657 UART: [afmc] SUBJECT.KEYID = 7
3,316,083 UART: [afmc] AUTHORITY.KEYID = 5
3,351,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,598 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,308 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,198 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,909 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,561 UART: [afmc] --
3,394,685 UART: [cold-reset] --
3,395,721 UART: [state] Locking Datavault
3,397,110 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,714 UART: [state] Locking ICCM
3,398,274 UART: [exit] Launching FMC @ 0x40000130
3,403,603 UART:
3,403,619 UART: Running Caliptra FMC ...
3,404,027 UART:
3,404,081 UART: [state] CFI Enabled
3,414,401 UART: [fht] FMC Alias Private Key: 7
3,522,453 UART: [art] Extend RT PCRs Done
3,522,881 UART: [art] Lock RT PCRs Done
3,524,115 UART: [art] Populate DV Done
3,532,281 UART: [fht] FMC Alias Private Key: 7
3,533,323 UART: [art] Derive CDI
3,533,603 UART: [art] Store in in slot 0x4
3,619,346 UART: [art] Derive Key Pair
3,619,706 UART: [art] Store priv key in slot 0x5
3,632,920 UART: [art] Derive Key Pair - Done
3,648,021 UART: [art] Signing Cert with AUTHO
3,648,501 UART: RITY.KEYID = 7
3,664,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,792 UART: [art] PUB.X = 6D983BFF4356DB60702EC639C40E30091409FCCFB089DF6DE1649948FEC90AD5BCF73637CF7DA7C7BA0EF27942F0797C
3,671,561 UART: [art] PUB.Y = B51C3CC3DF97FF08BF2936EC64461C10447E504DCA8FE90461622748BFF59A32EA89AD38AFECD4B695DD84F8DE04C144
3,678,518 UART: [art] SIG.R = B4D0D621522680AFD091B676C5BD90E147F704582E328CC2682F8861CE4B08009DC137FA3785C74B5D3CCA7DCE9B37C1
3,685,266 UART: [art] SIG.S = 52B176341177D2092BE09BEAF5FE33B7E812FFDE20A1317F9EBFFD8CDA32886C1F19A87ACDE0CD2B391BA644E7EC497E
3,708,918 UART: Caliptra RT
3,709,171 UART: [state] CFI Enabled
3,816,709 UART: [rt] RT listening for mailbox commands...
3,817,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,309 UART: [rt]cmd =0x41544d4e, len=14344
4,585,495 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,894 ready_for_fw is high
1,055,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,160,994 >>> mbox cmd response: success
3,223,687 UART:
3,223,703 UART: Running Caliptra FMC ...
3,224,111 UART:
3,224,165 UART: [state] CFI Enabled
3,234,273 UART: [fht] FMC Alias Private Key: 7
3,342,773 UART: [art] Extend RT PCRs Done
3,343,201 UART: [art] Lock RT PCRs Done
3,344,799 UART: [art] Populate DV Done
3,352,997 UART: [fht] FMC Alias Private Key: 7
3,354,153 UART: [art] Derive CDI
3,354,433 UART: [art] Store in in slot 0x4
3,439,960 UART: [art] Derive Key Pair
3,440,320 UART: [art] Store priv key in slot 0x5
3,453,690 UART: [art] Derive Key Pair - Done
3,468,535 UART: [art] Signing Cert with AUTHO
3,469,015 UART: RITY.KEYID = 7
3,483,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,614 UART: [art] PUB.X = B88ABCC1EA8325251E697131765AB26D711E142363BF0B59A23DEF241E96C5363E89CA9B7713EE703B9862AA4E888D94
3,491,383 UART: [art] PUB.Y = 9B602C5EE19D2033F6B73F7E39094A0E13E8995844607B5FA74A645DF4AE238B2CAF8F036B956C7FC4925225DF9D28E4
3,498,328 UART: [art] SIG.R = B0A25BE806D39E79DB7A42148F82CCE1D519C5C4FB63E846B49A28DCBE4C69B93B39E10EF47EEEAA4F4F6D326DBE555A
3,505,116 UART: [art] SIG.S = 84E87B30C91481FCD2FC99A3EE0A451B9F027425E308727D020E555D2867639DCB76E85B8E8877A4B8D36B3A6CF60AE2
3,528,587 UART: Caliptra RT
3,528,840 UART: [state] CFI Enabled
3,636,011 UART: [rt] RT listening for mailbox commands...
3,636,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,079 UART: [rt]cmd =0x41544d4e, len=14344
4,397,572 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,545 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,174,454 ready_for_fw is high
1,174,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,160 UART: [idev] Erasing UDS.KEYID = 0
1,199,624 UART: [idev] Sha1 KeyId Algorithm
1,208,548 UART: [idev] --
1,209,595 UART: [ldev] ++
1,209,763 UART: [ldev] CDI.KEYID = 6
1,210,127 UART: [ldev] SUBJECT.KEYID = 5
1,210,554 UART: [ldev] AUTHORITY.KEYID = 7
1,211,017 UART: [ldev] FE.KEYID = 1
1,216,221 UART: [ldev] Erasing FE.KEYID = 1
1,242,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,719 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,712 UART: [fwproc] Recv command 0x46574c44
1,283,445 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,320,993 >>> mbox cmd response: success
3,322,062 UART: [afmc] ++
3,322,230 UART: [afmc] CDI.KEYID = 6
3,322,593 UART: [afmc] SUBJECT.KEYID = 7
3,323,019 UART: [afmc] AUTHORITY.KEYID = 5
3,357,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,364 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,074 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,964 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,675 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,517 UART: [afmc] --
3,401,423 UART: [cold-reset] --
3,402,259 UART: [state] Locking Datavault
3,403,202 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,806 UART: [state] Locking ICCM
3,404,370 UART: [exit] Launching FMC @ 0x40000130
3,409,699 UART:
3,409,715 UART: Running Caliptra FMC ...
3,410,123 UART:
3,410,266 UART: [state] CFI Enabled
3,420,782 UART: [fht] FMC Alias Private Key: 7
3,529,058 UART: [art] Extend RT PCRs Done
3,529,486 UART: [art] Lock RT PCRs Done
3,531,032 UART: [art] Populate DV Done
3,539,354 UART: [fht] FMC Alias Private Key: 7
3,540,412 UART: [art] Derive CDI
3,540,692 UART: [art] Store in in slot 0x4
3,626,227 UART: [art] Derive Key Pair
3,626,587 UART: [art] Store priv key in slot 0x5
3,639,915 UART: [art] Derive Key Pair - Done
3,654,361 UART: [art] Signing Cert with AUTHO
3,654,841 UART: RITY.KEYID = 7
3,669,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,654 UART: [art] PUB.X = 9B1FD0421C9EFF4AB3F15191DDA9FDE58F9D26CF303EFF9205D95FB37BE847B89CC8AB35CA6AAFCB77765B098478BAF1
3,677,444 UART: [art] PUB.Y = 47EE30A46C62DC55911185452FBECD7FF3D5B46F06ABE1983364210D3009E13A19EACFF105E5D713B90827A82727EBF9
3,684,385 UART: [art] SIG.R = 4A10EE767BA3286A2EE6735A985816BA45C3DD904DA87274185C9839B21A5298803CCA54BCAD43B7B6F394A519924B35
3,691,155 UART: [art] SIG.S = 87F0AA17F3E6E069B0F427C61CC1C63B83FE0D676F041EDC376E95BEEE1E365EC59479FDF6D6551DFC55972F5E900F19
3,714,483 UART: Caliptra RT
3,714,828 UART: [state] CFI Enabled
3,822,128 UART: [rt] RT listening for mailbox commands...
3,822,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,176 UART: [rt]cmd =0x41544d4e, len=14344
4,593,927 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,527 ready_for_fw is high
1,056,527 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,162,057 >>> mbox cmd response: success
3,223,118 UART:
3,223,134 UART: Running Caliptra FMC ...
3,223,542 UART:
3,223,685 UART: [state] CFI Enabled
3,234,143 UART: [fht] FMC Alias Private Key: 7
3,342,055 UART: [art] Extend RT PCRs Done
3,342,483 UART: [art] Lock RT PCRs Done
3,344,457 UART: [art] Populate DV Done
3,352,839 UART: [fht] FMC Alias Private Key: 7
3,353,977 UART: [art] Derive CDI
3,354,257 UART: [art] Store in in slot 0x4
3,440,032 UART: [art] Derive Key Pair
3,440,392 UART: [art] Store priv key in slot 0x5
3,453,872 UART: [art] Derive Key Pair - Done
3,468,766 UART: [art] Signing Cert with AUTHO
3,469,246 UART: RITY.KEYID = 7
3,484,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,311 UART: [art] PUB.X = F68677C59931BBDDF082D87FD660350DA0F16AB198E4CA62E876C0B25A641ACCF9154014EC65EC757783C674BD78DC75
3,492,086 UART: [art] PUB.Y = 28237AA837C4720C5B1D8B80A6EABD4E52F4ADE65DC1F1489691886412D114C1706FB63CA8484F739AB71FA6A49E6F56
3,499,039 UART: [art] SIG.R = 4983ACF798F6EA171ACCF2EF913AE17A61B6D6A62EBC137C5B9AB70F22218C2F79C04549D6B68EA8846102CA64F24E33
3,505,815 UART: [art] SIG.S = 513C8447B7B684FE665E64D48CC23F87EFAE712F35282F1235DB430B29944D2EF92F9593758E304C525B862696BF3323
3,529,457 UART: Caliptra RT
3,529,802 UART: [state] CFI Enabled
3,637,881 UART: [rt] RT listening for mailbox commands...
3,638,551 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,519 UART: [rt]cmd =0x41544d4e, len=14344
4,401,665 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,097 UART:
192,472 UART: Running Caliptra ROM ...
193,622 UART:
193,775 UART: [state] CFI Enabled
264,909 UART: [state] LifecycleState = Unprovisioned
266,900 UART: [state] DebugLocked = No
268,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,942 UART: [kat] SHA2-256
442,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,114 UART: [kat] ++
453,635 UART: [kat] sha1
464,646 UART: [kat] SHA2-256
467,365 UART: [kat] SHA2-384
473,276 UART: [kat] SHA2-512-ACC
475,648 UART: [kat] ECC-384
2,767,847 UART: [kat] HMAC-384Kdf
2,800,888 UART: [kat] LMS
3,991,209 UART: [kat] --
3,996,656 UART: [cold-reset] ++
3,999,094 UART: [fht] Storing FHT @ 0x50003400
4,011,073 UART: [idev] ++
4,011,648 UART: [idev] CDI.KEYID = 6
4,012,737 UART: [idev] SUBJECT.KEYID = 7
4,013,773 UART: [idev] UDS.KEYID = 0
4,014,915 ready_for_fw is high
4,015,121 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,517 UART: [idev] Erasing UDS.KEYID = 0
7,347,923 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,859 UART: [idev] --
7,375,278 UART: [ldev] ++
7,375,888 UART: [ldev] CDI.KEYID = 6
7,376,824 UART: [ldev] SUBJECT.KEYID = 5
7,378,100 UART: [ldev] AUTHORITY.KEYID = 7
7,379,281 UART: [ldev] FE.KEYID = 1
7,423,521 UART: [ldev] Erasing FE.KEYID = 1
10,759,089 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,993 UART: [ldev] --
13,140,242 UART: [fwproc] Waiting for Commands...
13,142,190 UART: [fwproc] Received command 0x46574c44
13,144,374 UART: [fwproc] Received Image of size 114124 bytes
22,016,260 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,094,636 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,163,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,480,727 >>> mbox cmd response: success
22,484,516 UART: [afmc] ++
22,485,114 UART: [afmc] CDI.KEYID = 6
22,486,028 UART: [afmc] SUBJECT.KEYID = 7
22,487,314 UART: [afmc] AUTHORITY.KEYID = 5
25,851,311 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,151,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,153,391 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,167,967 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,182,687 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,196,941 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,218,616 UART: [afmc] --
28,222,979 UART: [cold-reset] --
28,228,030 UART: [state] Locking Datavault
28,234,095 UART: [state] Locking PCR0, PCR1 and PCR31
28,235,856 UART: [state] Locking ICCM
28,238,244 UART: [exit] Launching FMC @ 0x40000130
28,246,649 UART:
28,246,882 UART: Running Caliptra FMC ...
28,247,987 UART:
28,248,152 UART: [state] CFI Enabled
28,312,817 UART: [fht] FMC Alias Private Key: 7
30,650,964 UART: [art] Extend RT PCRs Done
30,652,432 UART: [art] Lock RT PCRs Done
30,653,989 UART: [art] Populate DV Done
30,659,630 UART: [fht] FMC Alias Private Key: 7
30,661,172 UART: [art] Derive CDI
30,661,908 UART: [art] Store in in slot 0x4
30,720,843 UART: [art] Derive Key Pair
30,721,841 UART: [art] Store priv key in slot 0x5
34,014,391 UART: [art] Derive Key Pair - Done
34,027,226 UART: [art] Signing Cert with AUTHO
34,028,558 UART: RITY.KEYID = 7
36,315,333 UART: [art] Erasing AUTHORITY.KEYID = 7
36,316,842 UART: [art] PUB.X = E00F7C5A50F1ED383EF8AA16288946199FDBED889ABA91283EFCE8A84434C16BDF1A2195EE27E3B748CDC1CAAB4BF79E
36,324,086 UART: [art] PUB.Y = 15CD38BE1AD9898126427AD8F77BBFF99FB0D6141D97A862D3FF25442D12D77CB7F259B7AF1AD922520D57B3C03ECD50
36,331,372 UART: [art] SIG.R = 09F31CDB17EACD87401246A6AC5A0FF0184154D978768E09D6C1CD6CBFBC8E341458ACE4652337DF90458165F70F81A9
36,338,755 UART: [art] SIG.S = 3D78B9C45CD1A21226B23B3E21BF0B13B72D5BFE27231E234CA548D5AC6AE85AB0C3F5D9F1E01C19B3E84C7ABF9D0974
37,643,845 UART: Caliptra RT
37,644,555 UART: [state] CFI Enabled
37,805,945 UART: [rt] RT listening for mailbox commands...
37,808,280 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,963,611 UART: [rt]cmd =0x41544d4e, len=14344
43,524,334 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,806,600 ready_for_fw is high
3,807,003 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,916,489 >>> mbox cmd response: success
27,617,873 UART:
27,618,286 UART: Running Caliptra FMC ...
27,619,393 UART:
27,619,547 UART: [state] CFI Enabled
27,688,315 UART: [fht] FMC Alias Private Key: 7
30,026,036 UART: [art] Extend RT PCRs Done
30,027,269 UART: [art] Lock RT PCRs Done
30,029,143 UART: [art] Populate DV Done
30,034,571 UART: [fht] FMC Alias Private Key: 7
30,036,228 UART: [art] Derive CDI
30,037,049 UART: [art] Store in in slot 0x4
30,097,021 UART: [art] Derive Key Pair
30,098,064 UART: [art] Store priv key in slot 0x5
33,391,186 UART: [art] Derive Key Pair - Done
33,404,417 UART: [art] Signing Cert with AUTHO
33,405,729 UART: RITY.KEYID = 7
35,691,822 UART: [art] Erasing AUTHORITY.KEYID = 7
35,693,349 UART: [art] PUB.X = F57159F9ECBD974A93C0FECF37472B5C171DB63A13CF1107B7E289BF8ED99D03A7B6C1B2FCDE7BEE384B538F4BD2C17E
35,700,574 UART: [art] PUB.Y = 81AD13D03C54C8D93B2A2399740AD7F520BD5791ED56867778DF07A33CB53FA3CA741AB87575F449188FDF624B825101
35,707,821 UART: [art] SIG.R = EE604F255CAFDF2CBA1535E09EF700C6AE0BE6EB34FDF8F164E9904C42598111EDF018D5D8AC5AEFF90EE7849E625F1C
35,715,234 UART: [art] SIG.S = CFD378C7D241537F9A8B5A39FF9596072C77A1D5968C86EA912D9072CBA4CD06485D22CA1769EE1B2A72022BD3F8E47C
37,020,830 UART: Caliptra RT
37,021,558 UART: [state] CFI Enabled
37,182,145 UART: [rt] RT listening for mailbox commands...
37,184,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,339,881 UART: [rt]cmd =0x41544d4e, len=14344
42,745,088 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,400 UART:
192,765 UART: Running Caliptra ROM ...
193,898 UART:
603,682 UART: [state] CFI Enabled
615,927 UART: [state] LifecycleState = Unprovisioned
617,873 UART: [state] DebugLocked = No
619,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,653 UART: [kat] SHA2-256
794,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,908 UART: [kat] ++
805,354 UART: [kat] sha1
815,366 UART: [kat] SHA2-256
818,076 UART: [kat] SHA2-384
823,715 UART: [kat] SHA2-512-ACC
826,078 UART: [kat] ECC-384
3,110,184 UART: [kat] HMAC-384Kdf
3,121,202 UART: [kat] LMS
4,311,269 UART: [kat] --
4,316,140 UART: [cold-reset] ++
4,318,710 UART: [fht] Storing FHT @ 0x50003400
4,330,121 UART: [idev] ++
4,330,680 UART: [idev] CDI.KEYID = 6
4,331,704 UART: [idev] SUBJECT.KEYID = 7
4,332,879 UART: [idev] UDS.KEYID = 0
4,333,935 ready_for_fw is high
4,334,142 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,487 UART: [idev] Erasing UDS.KEYID = 0
7,620,427 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,442 UART: [idev] --
7,646,407 UART: [ldev] ++
7,646,979 UART: [ldev] CDI.KEYID = 6
7,647,958 UART: [ldev] SUBJECT.KEYID = 5
7,649,166 UART: [ldev] AUTHORITY.KEYID = 7
7,650,392 UART: [ldev] FE.KEYID = 1
7,662,379 UART: [ldev] Erasing FE.KEYID = 1
10,947,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,722 UART: [ldev] --
13,309,717 UART: [fwproc] Waiting for Commands...
13,311,362 UART: [fwproc] Received command 0x46574c44
13,313,606 UART: [fwproc] Received Image of size 114124 bytes
21,949,071 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,031,817 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,100,717 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,418,195 >>> mbox cmd response: success
22,422,514 UART: [afmc] ++
22,423,108 UART: [afmc] CDI.KEYID = 6
22,424,078 UART: [afmc] SUBJECT.KEYID = 7
22,425,286 UART: [afmc] AUTHORITY.KEYID = 5
25,743,108 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,039,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,042,096 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,056,625 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,071,380 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,085,643 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,106,843 UART: [afmc] --
28,109,838 UART: [cold-reset] --
28,113,652 UART: [state] Locking Datavault
28,118,683 UART: [state] Locking PCR0, PCR1 and PCR31
28,120,434 UART: [state] Locking ICCM
28,122,882 UART: [exit] Launching FMC @ 0x40000130
28,131,286 UART:
28,131,518 UART: Running Caliptra FMC ...
28,132,615 UART:
28,132,771 UART: [state] CFI Enabled
28,140,811 UART: [fht] FMC Alias Private Key: 7
30,471,864 UART: [art] Extend RT PCRs Done
30,473,090 UART: [art] Lock RT PCRs Done
30,474,631 UART: [art] Populate DV Done
30,479,936 UART: [fht] FMC Alias Private Key: 7
30,481,577 UART: [art] Derive CDI
30,482,382 UART: [art] Store in in slot 0x4
30,525,349 UART: [art] Derive Key Pair
30,526,388 UART: [art] Store priv key in slot 0x5
33,768,329 UART: [art] Derive Key Pair - Done
33,781,381 UART: [art] Signing Cert with AUTHO
33,782,700 UART: RITY.KEYID = 7
36,062,154 UART: [art] Erasing AUTHORITY.KEYID = 7
36,063,679 UART: [art] PUB.X = 018D90B68074E619278EBA99E1A4B2D15AA3942CE514F7519A86E6402BB79D24F466496B05E9C3869DCDC945CE6163FB
36,070,897 UART: [art] PUB.Y = 5AB6CBE5BCBF534B0D80AB0B34193DDF2872F5A8B5BB36CC9DABE286CF3137E1319E11BB360A9E2B70569B5957FB6D4C
36,078,143 UART: [art] SIG.R = BE2E03DF1DB6C2EC1F7D72FDD6E65477374CEB211A6A31278B0C1283CE7A8B2A2EFDD26D4F3A0B7704444924F04A2620
36,085,547 UART: [art] SIG.S = 466A0A5704046C69F11B46C10269508B9D5AE40D501002D6A11D6F7200486088A583E524D06DB257AD1CDE945AAC51E2
37,390,720 UART: Caliptra RT
37,391,432 UART: [state] CFI Enabled
37,508,719 UART: [rt] RT listening for mailbox commands...
37,511,053 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,666,621 UART: [rt]cmd =0x41544d4e, len=14344
43,253,590 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
4,134,844 ready_for_fw is high
4,135,437 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,395,721 >>> mbox cmd response: success
28,037,847 UART:
28,038,238 UART: Running Caliptra FMC ...
28,039,438 UART:
28,039,611 UART: [state] CFI Enabled
28,047,398 UART: [fht] FMC Alias Private Key: 7
30,377,583 UART: [art] Extend RT PCRs Done
30,378,812 UART: [art] Lock RT PCRs Done
30,380,485 UART: [art] Populate DV Done
30,385,733 UART: [fht] FMC Alias Private Key: 7
30,387,393 UART: [art] Derive CDI
30,388,205 UART: [art] Store in in slot 0x4
30,430,927 UART: [art] Derive Key Pair
30,431,967 UART: [art] Store priv key in slot 0x5
33,674,117 UART: [art] Derive Key Pair - Done
33,686,913 UART: [art] Signing Cert with AUTHO
33,688,225 UART: RITY.KEYID = 7
35,968,005 UART: [art] Erasing AUTHORITY.KEYID = 7
35,969,518 UART: [art] PUB.X = A760DD25A627668F5F3AE9FEF467D8DB1092BCFA598C59492137130954DE001EA06CFCB558EEA40D4AD4CAF17E1ECD8B
35,976,758 UART: [art] PUB.Y = B64B2C1C6947AAFE95A424AC093E9FB5BA2305B816BF855F6AA75223B54105DACDC4821B134B91D11AAB40D55827E42B
35,984,055 UART: [art] SIG.R = 9E5228778F96A9BCA0190BDF137680C1BF8C98A7939AD81C8440454BE76D670FF1F2C4681C411C17EAC38D02832DCCA8
35,991,448 UART: [art] SIG.S = BBC1A025CF9EE6E4F55A8DAC4BDD843C5DC3F35A9D49F933282FB7F70FF7F1099DB010589F50172C1576E408776703AC
37,297,429 UART: Caliptra RT
37,298,140 UART: [state] CFI Enabled
37,415,539 UART: [rt] RT listening for mailbox commands...
37,417,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,573,233 UART: [rt]cmd =0x41544d4e, len=14344
43,212,427 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,104 UART:
192,463 UART: Running Caliptra ROM ...
193,591 UART:
193,732 UART: [state] CFI Enabled
264,518 UART: [state] LifecycleState = Unprovisioned
266,348 UART: [state] DebugLocked = No
268,576 UART: [state] WD Timer not started. Device not locked for debugging
271,612 UART: [kat] SHA2-256
450,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,350 UART: [kat] ++
462,797 UART: [kat] sha1
475,230 UART: [kat] SHA2-256
478,265 UART: [kat] SHA2-384
484,396 UART: [kat] SHA2-512-ACC
487,402 UART: [kat] ECC-384
2,948,765 UART: [kat] HMAC-384Kdf
2,972,158 UART: [kat] LMS
3,501,635 UART: [kat] --
3,507,831 UART: [cold-reset] ++
3,509,541 UART: [fht] FHT @ 0x50003400
3,521,729 UART: [idev] ++
3,522,292 UART: [idev] CDI.KEYID = 6
3,523,173 UART: [idev] SUBJECT.KEYID = 7
3,524,414 UART: [idev] UDS.KEYID = 0
3,525,316 ready_for_fw is high
3,525,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,546 UART: [idev] Erasing UDS.KEYID = 0
6,030,195 UART: [idev] Sha1 KeyId Algorithm
6,054,123 UART: [idev] --
6,057,565 UART: [ldev] ++
6,058,144 UART: [ldev] CDI.KEYID = 6
6,059,033 UART: [ldev] SUBJECT.KEYID = 5
6,060,248 UART: [ldev] AUTHORITY.KEYID = 7
6,061,485 UART: [ldev] FE.KEYID = 1
6,101,812 UART: [ldev] Erasing FE.KEYID = 1
8,603,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,196 UART: [ldev] --
10,414,923 UART: [fwproc] Wait for Commands...
10,417,770 UART: [fwproc] Recv command 0x46574c44
10,419,805 UART: [fwproc] Recv'd Img size: 114448 bytes
14,993,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,067,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,136,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,454,314 >>> mbox cmd response: success
15,458,515 UART: [afmc] ++
15,459,115 UART: [afmc] CDI.KEYID = 6
15,460,027 UART: [afmc] SUBJECT.KEYID = 7
15,461,194 UART: [afmc] AUTHORITY.KEYID = 5
18,001,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,725,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,727,558 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,743,509 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,759,496 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,775,266 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,798,700 UART: [afmc] --
19,802,004 UART: [cold-reset] --
19,806,323 UART: [state] Locking Datavault
19,811,305 UART: [state] Locking PCR0, PCR1 and PCR31
19,812,942 UART: [state] Locking ICCM
19,814,369 UART: [exit] Launching FMC @ 0x40000130
19,822,815 UART:
19,823,046 UART: Running Caliptra FMC ...
19,824,073 UART:
19,824,222 UART: [state] CFI Enabled
19,884,314 UART: [fht] FMC Alias Private Key: 7
21,648,044 UART: [art] Extend RT PCRs Done
21,649,270 UART: [art] Lock RT PCRs Done
21,650,815 UART: [art] Populate DV Done
21,656,342 UART: [fht] FMC Alias Private Key: 7
21,657,938 UART: [art] Derive CDI
21,658,753 UART: [art] Store in in slot 0x4
21,717,182 UART: [art] Derive Key Pair
21,718,237 UART: [art] Store priv key in slot 0x5
24,181,768 UART: [art] Derive Key Pair - Done
24,194,916 UART: [art] Signing Cert with AUTHO
24,196,221 UART: RITY.KEYID = 7
25,907,255 UART: [art] Erasing AUTHORITY.KEYID = 7
25,908,756 UART: [art] PUB.X = 7F9DEC71BD5C8C5FED0A20E556E1F675CAFF4A78C88820D10A44C49669AA5CECB2FF57F01CAA14459806CC042DE9A21A
25,916,064 UART: [art] PUB.Y = 8A3A427C1C4C892D87F98A6EEF653A3C95D086BFD8ED11F0BF8769FDA24F45CC1CA903BB4363609A015E25130B013B35
25,923,303 UART: [art] SIG.R = DEC19D4472453DE2813EC5D05E545F02E48C63A40D1EF15E81D486E6F2550D70C7A035EA53566B99FB2B825D6DE0BEF4
25,930,706 UART: [art] SIG.S = DC5FFA1F3DF8283DAC9F14038509C4C6D90922221FD1F72DC60EC68753E3241872B7FA4E9DA198925082A06BD2666119
26,909,443 UART: Caliptra RT
26,910,129 UART: [state] CFI Enabled
27,074,202 UART: [rt] RT listening for mailbox commands...
27,076,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,232,502 UART: [rt]cmd =0x41544d4e, len=14344
30,597,617 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,385,019 ready_for_fw is high
3,385,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,040,757 >>> mbox cmd response: success
19,326,392 UART:
19,326,810 UART: Running Caliptra FMC ...
19,327,918 UART:
19,328,077 UART: [state] CFI Enabled
19,394,793 UART: [fht] FMC Alias Private Key: 7
21,158,457 UART: [art] Extend RT PCRs Done
21,159,685 UART: [art] Lock RT PCRs Done
21,161,232 UART: [art] Populate DV Done
21,166,424 UART: [fht] FMC Alias Private Key: 7
21,168,130 UART: [art] Derive CDI
21,168,958 UART: [art] Store in in slot 0x4
21,227,730 UART: [art] Derive Key Pair
21,228,734 UART: [art] Store priv key in slot 0x5
23,692,758 UART: [art] Derive Key Pair - Done
23,705,698 UART: [art] Signing Cert with AUTHO
23,706,996 UART: RITY.KEYID = 7
25,418,342 UART: [art] Erasing AUTHORITY.KEYID = 7
25,419,854 UART: [art] PUB.X = 56B6A08BDE230ABAB6CA9EA9C2F0D8EE75A413B55E2C6878E6B290340F8C0365AD4585090FA69C584F0518AD8FBC239A
25,427,158 UART: [art] PUB.Y = DD856957CD9169E1E4D32578A2D733A34BE260022C76EC1A9C1E25B59CE66430EDF8A296BE86FC763FAEC9A550E74150
25,434,409 UART: [art] SIG.R = 6A21C3CA7815854A53EB11322E346EFC39623DE5D03F6CE524507DD5B9B64AA5FF1F91C58E32385938AD7FAF3D7EDF16
25,441,796 UART: [art] SIG.S = 516A66BE62EE1F6405D2BAF25CDA5ABC98786031FB2F21FE15651D76CB9B112B8943EEE9FFFC27048A6B7B68C45DDECE
26,420,633 UART: Caliptra RT
26,421,332 UART: [state] CFI Enabled
26,587,714 UART: [rt] RT listening for mailbox commands...
26,590,025 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,746,216 UART: [rt]cmd =0x41544d4e, len=14344
30,106,647 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,496 UART:
192,859 UART: Running Caliptra ROM ...
194,065 UART:
603,767 UART: [state] CFI Enabled
618,368 UART: [state] LifecycleState = Unprovisioned
620,262 UART: [state] DebugLocked = No
622,571 UART: [state] WD Timer not started. Device not locked for debugging
625,816 UART: [kat] SHA2-256
804,907 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,488 UART: [kat] ++
816,927 UART: [kat] sha1
828,641 UART: [kat] SHA2-256
831,637 UART: [kat] SHA2-384
838,067 UART: [kat] SHA2-512-ACC
841,003 UART: [kat] ECC-384
3,283,506 UART: [kat] HMAC-384Kdf
3,296,887 UART: [kat] LMS
3,826,328 UART: [kat] --
3,830,341 UART: [cold-reset] ++
3,832,705 UART: [fht] FHT @ 0x50003400
3,844,740 UART: [idev] ++
3,845,298 UART: [idev] CDI.KEYID = 6
3,846,211 UART: [idev] SUBJECT.KEYID = 7
3,847,376 UART: [idev] UDS.KEYID = 0
3,848,418 ready_for_fw is high
3,848,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,316 UART: [idev] Erasing UDS.KEYID = 0
6,325,098 UART: [idev] Sha1 KeyId Algorithm
6,348,440 UART: [idev] --
6,352,232 UART: [ldev] ++
6,352,800 UART: [ldev] CDI.KEYID = 6
6,353,706 UART: [ldev] SUBJECT.KEYID = 5
6,354,858 UART: [ldev] AUTHORITY.KEYID = 7
6,356,139 UART: [ldev] FE.KEYID = 1
6,368,073 UART: [ldev] Erasing FE.KEYID = 1
8,842,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,897 UART: [ldev] --
10,631,040 UART: [fwproc] Wait for Commands...
10,634,162 UART: [fwproc] Recv command 0x46574c44
10,636,248 UART: [fwproc] Recv'd Img size: 114448 bytes
15,188,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,267,819 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,336,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,654,526 >>> mbox cmd response: success
15,659,514 UART: [afmc] ++
15,660,131 UART: [afmc] CDI.KEYID = 6
15,661,040 UART: [afmc] SUBJECT.KEYID = 7
15,662,197 UART: [afmc] AUTHORITY.KEYID = 5
18,159,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,880,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,882,203 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,898,174 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,914,091 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,929,889 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,953,232 UART: [afmc] --
19,957,087 UART: [cold-reset] --
19,961,326 UART: [state] Locking Datavault
19,968,367 UART: [state] Locking PCR0, PCR1 and PCR31
19,970,066 UART: [state] Locking ICCM
19,971,457 UART: [exit] Launching FMC @ 0x40000130
19,979,907 UART:
19,980,185 UART: Running Caliptra FMC ...
19,981,287 UART:
19,981,437 UART: [state] CFI Enabled
19,989,259 UART: [fht] FMC Alias Private Key: 7
21,745,630 UART: [art] Extend RT PCRs Done
21,746,853 UART: [art] Lock RT PCRs Done
21,748,416 UART: [art] Populate DV Done
21,753,984 UART: [fht] FMC Alias Private Key: 7
21,755,510 UART: [art] Derive CDI
21,756,317 UART: [art] Store in in slot 0x4
21,798,733 UART: [art] Derive Key Pair
21,799,724 UART: [art] Store priv key in slot 0x5
24,226,585 UART: [art] Derive Key Pair - Done
24,239,586 UART: [art] Signing Cert with AUTHO
24,240,890 UART: RITY.KEYID = 7
25,946,415 UART: [art] Erasing AUTHORITY.KEYID = 7
25,947,923 UART: [art] PUB.X = 10DA84BC85644F6152E63C835936CDC346AD59EDE953C48557B2ECFF6C49208CE89A26A092DC4C645828E54324AD9AAD
25,955,158 UART: [art] PUB.Y = BBCA28F51AA62253FA8AD40EAB4B6CDB2623091E7F06FA932DCD613791E78B77EB43C8947D9E95D07FDD8983AA1BDF2B
25,962,476 UART: [art] SIG.R = BCFB5B65813B4EA0653874B51FB69A7537D87DC0156B6AB6ACCAE1DDCD2BA1B14E49769E4F564F6050B7F9D71FC89CD8
25,969,847 UART: [art] SIG.S = 4531004AE19F1A77318B7FF0CF87347B669E8A9F375D942B6BD767E0D9940A8E14533457557DFE1FC6DA47C03E7B7CAC
26,949,301 UART: Caliptra RT
26,950,013 UART: [state] CFI Enabled
27,067,401 UART: [rt] RT listening for mailbox commands...
27,069,723 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,225,138 UART: [rt]cmd =0x41544d4e, len=14344
30,578,998 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,694,934 ready_for_fw is high
3,695,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,271,277 >>> mbox cmd response: success
19,523,946 UART:
19,524,383 UART: Running Caliptra FMC ...
19,525,508 UART:
19,525,658 UART: [state] CFI Enabled
19,533,603 UART: [fht] FMC Alias Private Key: 7
21,289,994 UART: [art] Extend RT PCRs Done
21,291,227 UART: [art] Lock RT PCRs Done
21,292,794 UART: [art] Populate DV Done
21,298,398 UART: [fht] FMC Alias Private Key: 7
21,299,826 UART: [art] Derive CDI
21,300,558 UART: [art] Store in in slot 0x4
21,343,045 UART: [art] Derive Key Pair
21,344,083 UART: [art] Store priv key in slot 0x5
23,770,814 UART: [art] Derive Key Pair - Done
23,783,873 UART: [art] Signing Cert with AUTHO
23,785,194 UART: RITY.KEYID = 7
25,490,883 UART: [art] Erasing AUTHORITY.KEYID = 7
25,492,396 UART: [art] PUB.X = CAA613586E3BDBA69C769C45C5C9940FFC27AE58F479D28A5AEA53F36910156363A6A44C059A86D56352D17580617384
25,499,637 UART: [art] PUB.Y = EDB3109E85919B3984D969587C02FFA9F9360C1666CA3F12FE35237B57D51D652FA85241ACE5253EAC273E7695DE515F
25,506,904 UART: [art] SIG.R = E8645A6892041B518C0A2DD2293918C63E54258BBCA5FE0EA8B89CDC8C23AA89D37660B4636EB2A8BC919D81EC33C87D
25,514,296 UART: [art] SIG.S = 159D54C1A74C1F7AD08BB99AFDD3533D63076E52A44F736EF71A4FD37896A3BD602B35DBC6473B17DB03B39451EDB3CB
26,492,984 UART: Caliptra RT
26,493,683 UART: [state] CFI Enabled
26,611,017 UART: [rt] RT listening for mailbox commands...
26,613,326 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,768,979 UART: [rt]cmd =0x41544d4e, len=14344
30,131,698 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,438,054 ready_for_fw is high
3,438,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,849,616 >>> mbox cmd response: success
20,151,714 UART:
20,152,116 UART: Running Caliptra FMC ...
20,153,216 UART:
20,153,368 UART: [state] CFI Enabled
20,220,737 UART: [fht] FMC Alias Private Key: 7
21,984,932 UART: [art] Extend RT PCRs Done
21,986,152 UART: [art] Lock RT PCRs Done
21,988,025 UART: [art] Populate DV Done
21,993,310 UART: [fht] FMC Alias Private Key: 7
21,994,770 UART: [art] Derive CDI
21,995,512 UART: [art] Store in in slot 0x4
22,053,210 UART: [art] Derive Key Pair
22,054,214 UART: [art] Store priv key in slot 0x5
24,517,335 UART: [art] Derive Key Pair - Done
24,530,381 UART: [art] Signing Cert with AUTHO
24,531,684 UART: RITY.KEYID = 7
26,243,715 UART: [art] Erasing AUTHORITY.KEYID = 7
26,245,223 UART: [art] PUB.X = 0D1786DD9C42A156C8125D865711866C52E35A302F85AF729B2A1B317C567079721AFD16EA91C844841AB37806B8EE4D
26,252,474 UART: [art] PUB.Y = 9C5251AFD1DB33C0D53445AFB2C4880D95B1D4C189C2C74B934BFD0C12A160EA56FE57B7E826BD5BC42C220F531B755B
26,259,732 UART: [art] SIG.R = 48CC63901252D3F7CFCE827EB09319B54AF7E0B281FE565EB9F02EE2DDA668C8C857B8F584E87BAD8A58C30942BD248C
26,267,129 UART: [art] SIG.S = A4B7B8D8F412509C7CAA3C6F0EF78DDE2B47F891957D3ABDD7E9033CF9FEBE5F213627378218E6DC6D30AA54BCF774B9
27,246,364 UART: Caliptra RT
27,247,055 UART: [state] CFI Enabled
27,410,939 UART: [rt] RT listening for mailbox commands...
27,413,273 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,569,395 UART: [rt]cmd =0x41544d4e, len=14344
30,921,637 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,758,101 ready_for_fw is high
3,758,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,060,369 >>> mbox cmd response: success
20,318,009 UART:
20,318,389 UART: Running Caliptra FMC ...
20,319,538 UART:
20,319,693 UART: [state] CFI Enabled
20,327,344 UART: [fht] FMC Alias Private Key: 7
22,084,183 UART: [art] Extend RT PCRs Done
22,085,411 UART: [art] Lock RT PCRs Done
22,087,224 UART: [art] Populate DV Done
22,092,633 UART: [fht] FMC Alias Private Key: 7
22,094,334 UART: [art] Derive CDI
22,095,066 UART: [art] Store in in slot 0x4
22,137,670 UART: [art] Derive Key Pair
22,138,711 UART: [art] Store priv key in slot 0x5
24,565,765 UART: [art] Derive Key Pair - Done
24,578,655 UART: [art] Signing Cert with AUTHO
24,579,958 UART: RITY.KEYID = 7
26,285,518 UART: [art] Erasing AUTHORITY.KEYID = 7
26,287,024 UART: [art] PUB.X = C2463FE01C7EBF840FCB7206C2163A094AF6349B8DEB84FE8A6CB9023F5186E8DFC5F9D6F98337B7E6BD88343AFBFB23
26,294,339 UART: [art] PUB.Y = B3ED18EC9C4AE31D22B4FB9C7A8B6114FA6E07DCB6ED66157BBD6B93AC986EED90E1C3C090B5E9242F2F34C36DFB6EC2
26,301,574 UART: [art] SIG.R = E0DE33976E0859A5EC8FE624D07481B13BEF6F0DB92D51BCB7405546744C348185340D16188A3C4EBFDFA29EE27D2553
26,308,960 UART: [art] SIG.S = 564450AD3C645EA81DD00DDC2B1316B21C428EC1DD8C8B66B04CCC3C1F162D77816AB34FFEB4C8A3BFE733D749BAA1A4
27,288,100 UART: Caliptra RT
27,288,793 UART: [state] CFI Enabled
27,405,758 UART: [rt] RT listening for mailbox commands...
27,408,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,563,444 UART: [rt]cmd =0x41544d4e, len=14344
30,918,403 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,815 UART: [kat] SHA2-256
881,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,861 UART: [kat] ++
886,013 UART: [kat] sha1
890,481 UART: [kat] SHA2-256
892,419 UART: [kat] SHA2-384
895,012 UART: [kat] SHA2-512-ACC
896,913 UART: [kat] ECC-384
902,542 UART: [kat] HMAC-384Kdf
907,214 UART: [kat] LMS
1,475,410 UART: [kat] --
1,476,139 UART: [cold-reset] ++
1,476,695 UART: [fht] Storing FHT @ 0x50003400
1,479,364 UART: [idev] ++
1,479,532 UART: [idev] CDI.KEYID = 6
1,479,892 UART: [idev] SUBJECT.KEYID = 7
1,480,316 UART: [idev] UDS.KEYID = 0
1,480,661 ready_for_fw is high
1,480,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,364 UART: [idev] Erasing UDS.KEYID = 0
1,505,184 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,838 UART: [idev] --
1,514,975 UART: [ldev] ++
1,515,143 UART: [ldev] CDI.KEYID = 6
1,515,506 UART: [ldev] SUBJECT.KEYID = 5
1,515,932 UART: [ldev] AUTHORITY.KEYID = 7
1,516,395 UART: [ldev] FE.KEYID = 1
1,521,411 UART: [ldev] Erasing FE.KEYID = 1
1,546,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,720 UART: [ldev] --
1,586,181 UART: [fwproc] Waiting for Commands...
1,587,044 UART: [fwproc] Received command 0x46574c44
1,587,835 UART: [fwproc] Received Image of size 114448 bytes
5,085,738 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,114,344 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,143,696 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,279,647 >>> mbox cmd response: success
5,280,893 UART: [afmc] ++
5,281,061 UART: [afmc] CDI.KEYID = 6
5,281,423 UART: [afmc] SUBJECT.KEYID = 7
5,281,848 UART: [afmc] AUTHORITY.KEYID = 5
5,317,400 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,333,440 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,334,220 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,339,929 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,345,821 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,351,522 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,359,548 UART: [afmc] --
5,360,444 UART: [cold-reset] --
5,361,206 UART: [state] Locking Datavault
5,362,291 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,895 UART: [state] Locking ICCM
5,363,323 UART: [exit] Launching FMC @ 0x40000130
5,368,652 UART:
5,368,668 UART: Running Caliptra FMC ...
5,369,076 UART:
5,369,130 UART: [state] CFI Enabled
5,379,086 UART: [fht] FMC Alias Private Key: 7
5,486,516 UART: [art] Extend RT PCRs Done
5,486,944 UART: [art] Lock RT PCRs Done
5,488,512 UART: [art] Populate DV Done
5,496,812 UART: [fht] FMC Alias Private Key: 7
5,497,928 UART: [art] Derive CDI
5,498,208 UART: [art] Store in in slot 0x4
5,584,197 UART: [art] Derive Key Pair
5,584,557 UART: [art] Store priv key in slot 0x5
5,597,661 UART: [art] Derive Key Pair - Done
5,612,313 UART: [art] Signing Cert with AUTHO
5,612,793 UART: RITY.KEYID = 7
5,628,157 UART: [art] Erasing AUTHORITY.KEYID = 7
5,628,922 UART: [art] PUB.X = 8B2238D22FC8CDB0615088DDEA1F52A4B10665530BD013CA241948588FE2B8F206C87FDB03B38B0E48122D9F168CBC06
5,635,680 UART: [art] PUB.Y = 959537D1EEC612FF113F7B03D786649CDD236B0DCF9C69372665DB0850E91989D005EABA976B916F8E9C374368586192
5,642,614 UART: [art] SIG.R = 6F47C60D38985E8A632CEA25F0DF32BACB4DF22F55FCB1AD3B835EB598C64F1D840881DC69D3EA6E9DF00C1945C34D39
5,649,393 UART: [art] SIG.S = B41194C49227F98AB539918E7ABA0316A09E5497316B24F0712FBCA6C8A02D28BD4A6BB823D9EA241DA4FB999D17E551
5,673,171 UART: Caliptra RT
5,673,424 UART: [state] CFI Enabled
5,780,843 UART: [rt] RT listening for mailbox commands...
5,781,513 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,904,273 UART: [rt]cmd =0x41544d4e, len=14344
6,548,472 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,001 ready_for_fw is high
1,362,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,389,650 >>> mbox cmd response: success
5,451,491 UART:
5,451,507 UART: Running Caliptra FMC ...
5,451,915 UART:
5,451,969 UART: [state] CFI Enabled
5,462,655 UART: [fht] FMC Alias Private Key: 7
5,570,547 UART: [art] Extend RT PCRs Done
5,570,975 UART: [art] Lock RT PCRs Done
5,572,355 UART: [art] Populate DV Done
5,580,527 UART: [fht] FMC Alias Private Key: 7
5,581,607 UART: [art] Derive CDI
5,581,887 UART: [art] Store in in slot 0x4
5,667,818 UART: [art] Derive Key Pair
5,668,178 UART: [art] Store priv key in slot 0x5
5,681,500 UART: [art] Derive Key Pair - Done
5,696,159 UART: [art] Signing Cert with AUTHO
5,696,639 UART: RITY.KEYID = 7
5,711,981 UART: [art] Erasing AUTHORITY.KEYID = 7
5,712,746 UART: [art] PUB.X = 6578B3C7EBDB5FBBC217206E7F1976B09B486DA2B31DE1F8919E12708E44D3B0FB2F85D76FC24F3B6D78495D9C3DAD35
5,719,530 UART: [art] PUB.Y = 2D5070EE69F68D8EC5197F11A317C0B324D3160D9162FC65FF57CADA83006A63AACB3B61461051B077FAC166A677E791
5,726,459 UART: [art] SIG.R = 8F896D98BD75D77CF5F295D666100A60CAFA615FB8CB4F1C84352F8E8C81F0DB5D63BA268EBE7C8C3F0A854AA3FB44FC
5,733,245 UART: [art] SIG.S = 41DA86171F9A41A681E1C622400D96973DD939B46626305B5C909C2C9607D14D1B6A0DADADAFD00492F9E5C583BBE666
5,756,744 UART: Caliptra RT
5,756,997 UART: [state] CFI Enabled
5,864,902 UART: [rt] RT listening for mailbox commands...
5,865,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,988,876 UART: [rt]cmd =0x41544d4e, len=14344
6,641,042 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,819 UART: [state] LifecycleState = Unprovisioned
85,474 UART: [state] DebugLocked = No
86,042 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,640 UART: [kat] SHA2-256
881,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,686 UART: [kat] ++
885,838 UART: [kat] sha1
890,052 UART: [kat] SHA2-256
891,990 UART: [kat] SHA2-384
894,847 UART: [kat] SHA2-512-ACC
896,748 UART: [kat] ECC-384
902,155 UART: [kat] HMAC-384Kdf
906,729 UART: [kat] LMS
1,474,925 UART: [kat] --
1,475,648 UART: [cold-reset] ++
1,476,202 UART: [fht] Storing FHT @ 0x50003400
1,479,139 UART: [idev] ++
1,479,307 UART: [idev] CDI.KEYID = 6
1,479,667 UART: [idev] SUBJECT.KEYID = 7
1,480,091 UART: [idev] UDS.KEYID = 0
1,480,436 ready_for_fw is high
1,480,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,977 UART: [idev] Erasing UDS.KEYID = 0
1,504,431 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,007 UART: [idev] --
1,514,190 UART: [ldev] ++
1,514,358 UART: [ldev] CDI.KEYID = 6
1,514,721 UART: [ldev] SUBJECT.KEYID = 5
1,515,147 UART: [ldev] AUTHORITY.KEYID = 7
1,515,610 UART: [ldev] FE.KEYID = 1
1,520,708 UART: [ldev] Erasing FE.KEYID = 1
1,546,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,269 UART: [ldev] --
1,585,578 UART: [fwproc] Waiting for Commands...
1,586,365 UART: [fwproc] Received command 0x46574c44
1,587,156 UART: [fwproc] Received Image of size 114448 bytes
5,158,541 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,186,223 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,215,575 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,351,668 >>> mbox cmd response: success
5,352,830 UART: [afmc] ++
5,352,998 UART: [afmc] CDI.KEYID = 6
5,353,360 UART: [afmc] SUBJECT.KEYID = 7
5,353,785 UART: [afmc] AUTHORITY.KEYID = 5
5,389,433 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,405,811 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,406,591 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,300 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,418,192 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,423,893 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,431,877 UART: [afmc] --
5,432,877 UART: [cold-reset] --
5,433,441 UART: [state] Locking Datavault
5,434,764 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,368 UART: [state] Locking ICCM
5,436,032 UART: [exit] Launching FMC @ 0x40000130
5,441,361 UART:
5,441,377 UART: Running Caliptra FMC ...
5,441,785 UART:
5,441,928 UART: [state] CFI Enabled
5,452,598 UART: [fht] FMC Alias Private Key: 7
5,560,534 UART: [art] Extend RT PCRs Done
5,560,962 UART: [art] Lock RT PCRs Done
5,562,754 UART: [art] Populate DV Done
5,570,922 UART: [fht] FMC Alias Private Key: 7
5,571,958 UART: [art] Derive CDI
5,572,238 UART: [art] Store in in slot 0x4
5,657,883 UART: [art] Derive Key Pair
5,658,243 UART: [art] Store priv key in slot 0x5
5,671,561 UART: [art] Derive Key Pair - Done
5,685,906 UART: [art] Signing Cert with AUTHO
5,686,386 UART: RITY.KEYID = 7
5,701,780 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,545 UART: [art] PUB.X = 0A0C27BF03A8C73B5041F8A3487355ABA340117E0CEA7B92A831DAF3D94CEA40FD8F8E447D3424F6E9E8B74C3BCAE4DE
5,709,323 UART: [art] PUB.Y = 4862E4A2116A5D09E787DCFBAF14A01645FB94E38DE3DA8498F91A57363BB2A79F9101B5645D1062A7F7CC840C09BAD5
5,716,269 UART: [art] SIG.R = CC08E77F2A517083CD76A33D3D0EBE973300B489E8E0B010F0DBC638EF6321378296A817EF2CEF62808590BC55317F40
5,723,013 UART: [art] SIG.S = 2CEEFDE070A2B502B4D99DDA041BBD5A202A437417994FDDA3C5FEF8392542CCA9E8460B75CBC7C584FBD0A653E6558E
5,746,501 UART: Caliptra RT
5,746,846 UART: [state] CFI Enabled
5,855,591 UART: [rt] RT listening for mailbox commands...
5,856,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,345 UART: [rt]cmd =0x41544d4e, len=14344
6,623,442 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,684 ready_for_fw is high
1,362,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,127,664 >>> mbox cmd response: success
5,189,485 UART:
5,189,501 UART: Running Caliptra FMC ...
5,189,909 UART:
5,190,052 UART: [state] CFI Enabled
5,200,626 UART: [fht] FMC Alias Private Key: 7
5,308,628 UART: [art] Extend RT PCRs Done
5,309,056 UART: [art] Lock RT PCRs Done
5,310,866 UART: [art] Populate DV Done
5,319,038 UART: [fht] FMC Alias Private Key: 7
5,320,042 UART: [art] Derive CDI
5,320,322 UART: [art] Store in in slot 0x4
5,406,029 UART: [art] Derive Key Pair
5,406,389 UART: [art] Store priv key in slot 0x5
5,419,921 UART: [art] Derive Key Pair - Done
5,434,581 UART: [art] Signing Cert with AUTHO
5,435,061 UART: RITY.KEYID = 7
5,450,169 UART: [art] Erasing AUTHORITY.KEYID = 7
5,450,934 UART: [art] PUB.X = DB2B559B48E8E9A76DC0DAA04CA2C899A9A2B51032521BF4383C72E140F4FC86A74EEDE2EF8638A04BB64EC0E1369B61
5,457,720 UART: [art] PUB.Y = 426290910168C7F6217A0CE34B737CABED005FD9055BDFF7F34BE97F43A86FC737553DBACB9CA601B4303C289D014987
5,464,639 UART: [art] SIG.R = 356343D88BA7CDC7E34296CB7BE9B73DCAF76C1D16D62A586504B5B5DBE21C96AEC125EB3AD3370E755B336B48AC4EA7
5,471,421 UART: [art] SIG.S = 8CB8DABDB31E31E38120E2211535CE82759B9CA70C5ACD79E861AC67F43FFFA3C8B7832116ECC47AF2C57AADED91404C
5,495,395 UART: Caliptra RT
5,495,740 UART: [state] CFI Enabled
5,603,187 UART: [rt] RT listening for mailbox commands...
5,603,857 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,726,765 UART: [rt]cmd =0x41544d4e, len=14344
6,371,392 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
893,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,663 UART: [kat] ++
897,815 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,652 UART: [kat] SHA2-512-ACC
908,553 UART: [kat] ECC-384
918,598 UART: [kat] HMAC-384Kdf
923,174 UART: [kat] LMS
1,171,502 UART: [kat] --
1,172,379 UART: [cold-reset] ++
1,172,755 UART: [fht] FHT @ 0x50003400
1,175,300 UART: [idev] ++
1,175,468 UART: [idev] CDI.KEYID = 6
1,175,828 UART: [idev] SUBJECT.KEYID = 7
1,176,252 UART: [idev] UDS.KEYID = 0
1,176,597 ready_for_fw is high
1,176,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,468 UART: [idev] Erasing UDS.KEYID = 0
1,201,707 UART: [idev] Sha1 KeyId Algorithm
1,210,335 UART: [idev] --
1,211,439 UART: [ldev] ++
1,211,607 UART: [ldev] CDI.KEYID = 6
1,211,970 UART: [ldev] SUBJECT.KEYID = 5
1,212,396 UART: [ldev] AUTHORITY.KEYID = 7
1,212,859 UART: [ldev] FE.KEYID = 1
1,217,971 UART: [ldev] Erasing FE.KEYID = 1
1,244,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,191 UART: [ldev] --
1,283,522 UART: [fwproc] Wait for Commands...
1,284,282 UART: [fwproc] Recv command 0x46574c44
1,285,010 UART: [fwproc] Recv'd Img size: 114448 bytes
3,128,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,322,902 >>> mbox cmd response: success
3,324,160 UART: [afmc] ++
3,324,328 UART: [afmc] CDI.KEYID = 6
3,324,690 UART: [afmc] SUBJECT.KEYID = 7
3,325,115 UART: [afmc] AUTHORITY.KEYID = 5
3,360,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,706 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,415 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,307 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,018 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,851 UART: [afmc] --
3,403,929 UART: [cold-reset] --
3,404,781 UART: [state] Locking Datavault
3,405,702 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,306 UART: [state] Locking ICCM
3,406,740 UART: [exit] Launching FMC @ 0x40000130
3,412,069 UART:
3,412,085 UART: Running Caliptra FMC ...
3,412,493 UART:
3,412,547 UART: [state] CFI Enabled
3,423,077 UART: [fht] FMC Alias Private Key: 7
3,530,891 UART: [art] Extend RT PCRs Done
3,531,319 UART: [art] Lock RT PCRs Done
3,533,025 UART: [art] Populate DV Done
3,541,193 UART: [fht] FMC Alias Private Key: 7
3,542,285 UART: [art] Derive CDI
3,542,565 UART: [art] Store in in slot 0x4
3,628,422 UART: [art] Derive Key Pair
3,628,782 UART: [art] Store priv key in slot 0x5
3,642,000 UART: [art] Derive Key Pair - Done
3,656,968 UART: [art] Signing Cert with AUTHO
3,657,448 UART: RITY.KEYID = 7
3,672,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,747 UART: [art] PUB.X = 004957C69F8F1DED5F32C5990BC068A525F23DF80B731D319A5D555BDB3CDDC67A0F32C83B4D1C2EEEDB80A28973D0AA
3,680,504 UART: [art] PUB.Y = 582B301321E11C4BD2AE15A89944B9F83134FFE14BBEEA762AC1A9A7313BD6BBE46DBFD967512F3CAA3774F373C33D25
3,687,468 UART: [art] SIG.R = 8C2EDB8FE26F7EBD4F3311218367B614E53EEE3471D29CDE6D122E8B63EA7703C2FA774EB2C833AA496859674A9FF657
3,694,245 UART: [art] SIG.S = 3D4E627426AB71B2022B5D580185D0BE7292CA7C7E4C27CADFC387D5FBCA932A15DDF237B9ACF474627A56638D126864
3,718,578 UART: Caliptra RT
3,718,831 UART: [state] CFI Enabled
3,825,907 UART: [rt] RT listening for mailbox commands...
3,826,577 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,683 UART: [rt]cmd =0x41544d4e, len=14344
4,598,908 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,465 ready_for_fw is high
1,059,465 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,177,812 >>> mbox cmd response: success
3,239,727 UART:
3,239,743 UART: Running Caliptra FMC ...
3,240,151 UART:
3,240,205 UART: [state] CFI Enabled
3,250,187 UART: [fht] FMC Alias Private Key: 7
3,358,423 UART: [art] Extend RT PCRs Done
3,358,851 UART: [art] Lock RT PCRs Done
3,360,493 UART: [art] Populate DV Done
3,368,833 UART: [fht] FMC Alias Private Key: 7
3,369,991 UART: [art] Derive CDI
3,370,271 UART: [art] Store in in slot 0x4
3,455,968 UART: [art] Derive Key Pair
3,456,328 UART: [art] Store priv key in slot 0x5
3,469,428 UART: [art] Derive Key Pair - Done
3,483,880 UART: [art] Signing Cert with AUTHO
3,484,360 UART: RITY.KEYID = 7
3,499,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,899 UART: [art] PUB.X = 8BF97EA50A67346B73780F53F723AC0523E9BD78DA6CA39D2729FCAD4CE64CA6C0E9D86F094DA360C8D0CC490278FADE
3,506,672 UART: [art] PUB.Y = D0E3482DB7A9A485C4D4B3B82B77201975E56FA8E4A158E2F8C1778EB0DED75A4E5D64538F5F1D4CA1D167571F8A96B0
3,513,632 UART: [art] SIG.R = DAC9DCD9B8A5777E49642669A58B0CE84862A136221359F007E640F0185ACE69E8AA2E4633F991A7939F7379A25FAA24
3,520,396 UART: [art] SIG.S = 961C299499237D3AE08D8B6C345B90703E3E84E120F84ED3B86E7958D032CA2609FCE1476F774B0F3176604B9E4919FE
3,543,565 UART: Caliptra RT
3,543,818 UART: [state] CFI Enabled
3,652,427 UART: [rt] RT listening for mailbox commands...
3,653,097 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,939 UART: [rt]cmd =0x41544d4e, len=14344
4,417,951 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,933 UART: [state] LifecycleState = Unprovisioned
86,588 UART: [state] DebugLocked = No
87,222 UART: [state] WD Timer not started. Device not locked for debugging
88,395 UART: [kat] SHA2-256
894,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,170 UART: [kat] ++
898,322 UART: [kat] sha1
902,402 UART: [kat] SHA2-256
904,342 UART: [kat] SHA2-384
907,077 UART: [kat] SHA2-512-ACC
908,978 UART: [kat] ECC-384
918,691 UART: [kat] HMAC-384Kdf
923,249 UART: [kat] LMS
1,171,577 UART: [kat] --
1,172,334 UART: [cold-reset] ++
1,172,726 UART: [fht] FHT @ 0x50003400
1,175,333 UART: [idev] ++
1,175,501 UART: [idev] CDI.KEYID = 6
1,175,861 UART: [idev] SUBJECT.KEYID = 7
1,176,285 UART: [idev] UDS.KEYID = 0
1,176,630 ready_for_fw is high
1,176,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,311 UART: [idev] Erasing UDS.KEYID = 0
1,202,128 UART: [idev] Sha1 KeyId Algorithm
1,210,572 UART: [idev] --
1,211,570 UART: [ldev] ++
1,211,738 UART: [ldev] CDI.KEYID = 6
1,212,101 UART: [ldev] SUBJECT.KEYID = 5
1,212,527 UART: [ldev] AUTHORITY.KEYID = 7
1,212,990 UART: [ldev] FE.KEYID = 1
1,218,294 UART: [ldev] Erasing FE.KEYID = 1
1,244,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,994 UART: [ldev] --
1,284,317 UART: [fwproc] Wait for Commands...
1,285,019 UART: [fwproc] Recv command 0x46574c44
1,285,747 UART: [fwproc] Recv'd Img size: 114448 bytes
3,132,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,005 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,309 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,325,184 >>> mbox cmd response: success
3,326,336 UART: [afmc] ++
3,326,504 UART: [afmc] CDI.KEYID = 6
3,326,866 UART: [afmc] SUBJECT.KEYID = 7
3,327,291 UART: [afmc] AUTHORITY.KEYID = 5
3,363,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,228 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,937 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,829 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,540 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,237 UART: [afmc] --
3,406,315 UART: [cold-reset] --
3,407,141 UART: [state] Locking Datavault
3,408,504 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,108 UART: [state] Locking ICCM
3,409,656 UART: [exit] Launching FMC @ 0x40000130
3,414,985 UART:
3,415,001 UART: Running Caliptra FMC ...
3,415,409 UART:
3,415,552 UART: [state] CFI Enabled
3,426,174 UART: [fht] FMC Alias Private Key: 7
3,533,858 UART: [art] Extend RT PCRs Done
3,534,286 UART: [art] Lock RT PCRs Done
3,535,962 UART: [art] Populate DV Done
3,544,322 UART: [fht] FMC Alias Private Key: 7
3,545,474 UART: [art] Derive CDI
3,545,754 UART: [art] Store in in slot 0x4
3,631,501 UART: [art] Derive Key Pair
3,631,861 UART: [art] Store priv key in slot 0x5
3,646,003 UART: [art] Derive Key Pair - Done
3,660,875 UART: [art] Signing Cert with AUTHO
3,661,355 UART: RITY.KEYID = 7
3,676,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,830 UART: [art] PUB.X = A6B9A6FEBDE3C3B9285C24CA381A250C8B703F37D28DA42453DDEDB901E9F8A2BE1A5B89DC1CB7DDE5BBC78BF6029FB0
3,683,621 UART: [art] PUB.Y = 009798F7409694F232ED317BE58C978DDD508709CDAE3AB4357CB59F502EDA320758026133292C79DA458FF1518F9346
3,690,534 UART: [art] SIG.R = 8248B511DA76692BB002456CD33C3B52B152A5EA6DDD98F0A03798D9837B81AC27EB94D3E44E8AF41EB2309C0A5BC803
3,697,303 UART: [art] SIG.S = 7CBB35082C3F23C3F8A5E198F756A8D02A6B84FCA2634FC2C108EB4E870A837B87FDA6DC4ADC0BDBCECC38CD32F0264B
3,721,228 UART: Caliptra RT
3,721,573 UART: [state] CFI Enabled
3,829,421 UART: [rt] RT listening for mailbox commands...
3,830,091 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,133 UART: [rt]cmd =0x41544d4e, len=14344
4,607,154 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,336 ready_for_fw is high
1,060,336 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,164,664 >>> mbox cmd response: success
3,227,079 UART:
3,227,095 UART: Running Caliptra FMC ...
3,227,503 UART:
3,227,646 UART: [state] CFI Enabled
3,238,266 UART: [fht] FMC Alias Private Key: 7
3,345,816 UART: [art] Extend RT PCRs Done
3,346,244 UART: [art] Lock RT PCRs Done
3,347,988 UART: [art] Populate DV Done
3,356,330 UART: [fht] FMC Alias Private Key: 7
3,357,350 UART: [art] Derive CDI
3,357,630 UART: [art] Store in in slot 0x4
3,443,059 UART: [art] Derive Key Pair
3,443,419 UART: [art] Store priv key in slot 0x5
3,456,499 UART: [art] Derive Key Pair - Done
3,470,916 UART: [art] Signing Cert with AUTHO
3,471,396 UART: RITY.KEYID = 7
3,486,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,529 UART: [art] PUB.X = E11F1ADDDE85AD161E19D0C12C347D852EB01F18B9CA020880406A94D3C0BDDAE7FD098B70134AF4B22F25B2A7A62F26
3,494,306 UART: [art] PUB.Y = 07DACB98C6BF1215F974F4E30FF4A3E8AF9AB3C678E5E4D403F3786434AA8FB2C46C98538D587CA8EB2E651D42D632DC
3,501,263 UART: [art] SIG.R = F30BA0D27E5D5C0FDBCC33F9C04E3EF7FF5CA6BA1DB70AD56F99694D3100520BA50950271BA0B4D35E90F437FC4A1EE4
3,508,018 UART: [art] SIG.S = A1630FF3958795814DA0D0CAAFA91A6648BB8E13ACC8B1355BCB4CFD589AE935BBD98CBD97C91F2029C9EA4D88A9DD0E
3,531,329 UART: Caliptra RT
3,531,674 UART: [state] CFI Enabled
3,639,801 UART: [rt] RT listening for mailbox commands...
3,640,471 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,779 UART: [rt]cmd =0x41544d4e, len=14344
4,411,161 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
890,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,037 UART: [kat] ++
895,189 UART: [kat] sha1
899,577 UART: [kat] SHA2-256
901,517 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,474 UART: [kat] LMS
1,168,786 UART: [kat] --
1,169,867 UART: [cold-reset] ++
1,170,205 UART: [fht] FHT @ 0x50003400
1,172,743 UART: [idev] ++
1,172,911 UART: [idev] CDI.KEYID = 6
1,173,272 UART: [idev] SUBJECT.KEYID = 7
1,173,697 UART: [idev] UDS.KEYID = 0
1,174,043 ready_for_fw is high
1,174,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,555 UART: [idev] Erasing UDS.KEYID = 0
1,198,355 UART: [idev] Sha1 KeyId Algorithm
1,207,213 UART: [idev] --
1,208,142 UART: [ldev] ++
1,208,310 UART: [ldev] CDI.KEYID = 6
1,208,674 UART: [ldev] SUBJECT.KEYID = 5
1,209,101 UART: [ldev] AUTHORITY.KEYID = 7
1,209,564 UART: [ldev] FE.KEYID = 1
1,214,602 UART: [ldev] Erasing FE.KEYID = 1
1,240,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,768 UART: [ldev] --
1,279,248 UART: [fwproc] Wait for Commands...
1,279,945 UART: [fwproc] Recv command 0x46574c44
1,280,678 UART: [fwproc] Recv'd Img size: 114448 bytes
3,129,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,322,677 >>> mbox cmd response: success
3,323,854 UART: [afmc] ++
3,324,022 UART: [afmc] CDI.KEYID = 6
3,324,385 UART: [afmc] SUBJECT.KEYID = 7
3,324,811 UART: [afmc] AUTHORITY.KEYID = 5
3,360,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,464 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,174 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,064 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,775 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,627 UART: [afmc] --
3,403,697 UART: [cold-reset] --
3,404,399 UART: [state] Locking Datavault
3,405,582 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,186 UART: [state] Locking ICCM
3,406,738 UART: [exit] Launching FMC @ 0x40000130
3,412,067 UART:
3,412,083 UART: Running Caliptra FMC ...
3,412,491 UART:
3,412,545 UART: [state] CFI Enabled
3,422,883 UART: [fht] FMC Alias Private Key: 7
3,531,003 UART: [art] Extend RT PCRs Done
3,531,431 UART: [art] Lock RT PCRs Done
3,532,835 UART: [art] Populate DV Done
3,540,949 UART: [fht] FMC Alias Private Key: 7
3,542,117 UART: [art] Derive CDI
3,542,397 UART: [art] Store in in slot 0x4
3,628,242 UART: [art] Derive Key Pair
3,628,602 UART: [art] Store priv key in slot 0x5
3,641,748 UART: [art] Derive Key Pair - Done
3,656,204 UART: [art] Signing Cert with AUTHO
3,656,684 UART: RITY.KEYID = 7
3,671,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,253 UART: [art] PUB.X = 0657D25899E3CC53AA72DC862774FF02AC029465000C22E05CE6E69B70E892A18C3570283B5353CC7312C203F7DBF025
3,678,982 UART: [art] PUB.Y = 5F935FE33CB177E2E30ED7E2A7482427938E24B75A5FE3523AB011AC113E009860104C6CB65AAFC20F1C5F93F8BA47CC
3,685,914 UART: [art] SIG.R = CC60AC5B3E58B149644E8CEE4DA8EB2AF847B02D7DAB6086EDA6FC6EE1E21660C0868D688753627BFA188F279498458C
3,692,696 UART: [art] SIG.S = C36314C23C5280B2502723FDD84D4FD8FA336270AF70C5DC3FA426B44E0F3466C4984220D5AC0C86A038B1D71183761C
3,716,163 UART: Caliptra RT
3,716,416 UART: [state] CFI Enabled
3,824,141 UART: [rt] RT listening for mailbox commands...
3,824,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,721 UART: [rt]cmd =0x41544d4e, len=14344
4,597,292 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,498 ready_for_fw is high
1,056,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,172,999 >>> mbox cmd response: success
3,235,616 UART:
3,235,632 UART: Running Caliptra FMC ...
3,236,040 UART:
3,236,094 UART: [state] CFI Enabled
3,246,750 UART: [fht] FMC Alias Private Key: 7
3,354,746 UART: [art] Extend RT PCRs Done
3,355,174 UART: [art] Lock RT PCRs Done
3,356,752 UART: [art] Populate DV Done
3,364,902 UART: [fht] FMC Alias Private Key: 7
3,365,954 UART: [art] Derive CDI
3,366,234 UART: [art] Store in in slot 0x4
3,452,177 UART: [art] Derive Key Pair
3,452,537 UART: [art] Store priv key in slot 0x5
3,466,105 UART: [art] Derive Key Pair - Done
3,480,645 UART: [art] Signing Cert with AUTHO
3,481,125 UART: RITY.KEYID = 7
3,496,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,240 UART: [art] PUB.X = 8F9DA072CD67BD96415DC4552BC8C4D0D41405FB01849BF99C547E96ADD4FCA8DFE4311908545C92F64291A615079046
3,504,000 UART: [art] PUB.Y = 6966F4429A931DD1D502C54B91BB3580BA8EDEE701C34414DB3F32DEC7BD5FEE2975ACD5ED2608DB91EFBFDB972313C3
3,510,961 UART: [art] SIG.R = BFACD263A53471D23B8213C64E99EF3A532E5E08819D878AC99306D62F9600C12C1A6DE7A7F61F766F87B9A0443C9079
3,517,705 UART: [art] SIG.S = 7E486A15E6D79055B912F91664FA966388B296FF405B91CF4A5147DC9319A24535ABAB1503E77B9E82ECC2B749B98E09
3,541,434 UART: Caliptra RT
3,541,687 UART: [state] CFI Enabled
3,648,931 UART: [rt] RT listening for mailbox commands...
3,649,601 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,691 UART: [rt]cmd =0x41544d4e, len=14344
4,412,640 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,857 UART: [state] LifecycleState = Unprovisioned
85,512 UART: [state] DebugLocked = No
86,008 UART: [state] WD Timer not started. Device not locked for debugging
87,197 UART: [kat] SHA2-256
890,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,876 UART: [kat] ++
895,028 UART: [kat] sha1
899,250 UART: [kat] SHA2-256
901,190 UART: [kat] SHA2-384
903,805 UART: [kat] SHA2-512-ACC
905,706 UART: [kat] ECC-384
915,563 UART: [kat] HMAC-384Kdf
920,189 UART: [kat] LMS
1,168,501 UART: [kat] --
1,169,346 UART: [cold-reset] ++
1,169,706 UART: [fht] FHT @ 0x50003400
1,172,482 UART: [idev] ++
1,172,650 UART: [idev] CDI.KEYID = 6
1,173,011 UART: [idev] SUBJECT.KEYID = 7
1,173,436 UART: [idev] UDS.KEYID = 0
1,173,782 ready_for_fw is high
1,173,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,658 UART: [idev] Erasing UDS.KEYID = 0
1,198,988 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,209,003 UART: [ldev] ++
1,209,171 UART: [ldev] CDI.KEYID = 6
1,209,535 UART: [ldev] SUBJECT.KEYID = 5
1,209,962 UART: [ldev] AUTHORITY.KEYID = 7
1,210,425 UART: [ldev] FE.KEYID = 1
1,215,781 UART: [ldev] Erasing FE.KEYID = 1
1,242,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,389 UART: [ldev] --
1,281,843 UART: [fwproc] Wait for Commands...
1,282,562 UART: [fwproc] Recv command 0x46574c44
1,283,295 UART: [fwproc] Recv'd Img size: 114448 bytes
3,130,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,324,198 >>> mbox cmd response: success
3,325,397 UART: [afmc] ++
3,325,565 UART: [afmc] CDI.KEYID = 6
3,325,928 UART: [afmc] SUBJECT.KEYID = 7
3,326,354 UART: [afmc] AUTHORITY.KEYID = 5
3,362,278 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,533 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,243 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,133 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,844 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,606 UART: [afmc] --
3,405,706 UART: [cold-reset] --
3,406,574 UART: [state] Locking Datavault
3,407,463 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,067 UART: [state] Locking ICCM
3,408,709 UART: [exit] Launching FMC @ 0x40000130
3,414,038 UART:
3,414,054 UART: Running Caliptra FMC ...
3,414,462 UART:
3,414,605 UART: [state] CFI Enabled
3,425,257 UART: [fht] FMC Alias Private Key: 7
3,533,311 UART: [art] Extend RT PCRs Done
3,533,739 UART: [art] Lock RT PCRs Done
3,535,287 UART: [art] Populate DV Done
3,543,185 UART: [fht] FMC Alias Private Key: 7
3,544,361 UART: [art] Derive CDI
3,544,641 UART: [art] Store in in slot 0x4
3,630,314 UART: [art] Derive Key Pair
3,630,674 UART: [art] Store priv key in slot 0x5
3,643,862 UART: [art] Derive Key Pair - Done
3,659,025 UART: [art] Signing Cert with AUTHO
3,659,505 UART: RITY.KEYID = 7
3,674,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,638 UART: [art] PUB.X = BDCE9E7121984ACE9BAF48315CBFB171548A36CE1D5724D065E8732083E6BEAE8B2A804E0BABB98B215A91463FB869F6
3,682,419 UART: [art] PUB.Y = F19AFA8BDE2FA9FF5A323F9A50E3A1786AD6898A5D7C684EE016AF11284A90DFC8EF52F02E2F378614F07BB8ACED06AD
3,689,390 UART: [art] SIG.R = 962314E34D088406723D7AD15E843AC132C6B25412F7892FC8BA41FD8CF5EEB813AD3C2482CCCB5DF0805E7EF2061D3F
3,696,161 UART: [art] SIG.S = 81102F42A05561F96B7694FED862B0CA8928595AAC5FE87FAF1E67CC9BCFACB0896D02858F7A8125639F688951EA162A
3,719,575 UART: Caliptra RT
3,719,920 UART: [state] CFI Enabled
3,827,241 UART: [rt] RT listening for mailbox commands...
3,827,911 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,025 UART: [rt]cmd =0x41544d4e, len=14344
4,602,759 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,407 ready_for_fw is high
1,056,407 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,160,128 >>> mbox cmd response: success
3,222,907 UART:
3,222,923 UART: Running Caliptra FMC ...
3,223,331 UART:
3,223,474 UART: [state] CFI Enabled
3,234,274 UART: [fht] FMC Alias Private Key: 7
3,341,598 UART: [art] Extend RT PCRs Done
3,342,026 UART: [art] Lock RT PCRs Done
3,343,766 UART: [art] Populate DV Done
3,352,000 UART: [fht] FMC Alias Private Key: 7
3,353,130 UART: [art] Derive CDI
3,353,410 UART: [art] Store in in slot 0x4
3,438,721 UART: [art] Derive Key Pair
3,439,081 UART: [art] Store priv key in slot 0x5
3,452,403 UART: [art] Derive Key Pair - Done
3,466,924 UART: [art] Signing Cert with AUTHO
3,467,404 UART: RITY.KEYID = 7
3,482,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,513 UART: [art] PUB.X = 91D611431A619BAB495FCB99E3A2E627D5E324656C8DB587B50C737472A0A881813BE23881C3F79B39DFE7FBCA0BA1AC
3,490,287 UART: [art] PUB.Y = 7C4A923F2599E896D92D6D6E93FDD07E5AA420A2A276B10E75D7C7D91309C78E8025E180952700E254111E54C121D5D5
3,497,205 UART: [art] SIG.R = 1D4D79B01A4B1BC66CF65AF3A37EFA8E1F390CA5207C724CE5F083066454AA191C2864893E6B5A4998E765CEE10C4F0B
3,503,973 UART: [art] SIG.S = 02C989970AB5F7D075629C06804FA1666B125ABF592B43836418758919967A8DB84843BB51A18B92BBA75D017C812651
3,527,936 UART: Caliptra RT
3,528,281 UART: [state] CFI Enabled
3,636,346 UART: [rt] RT listening for mailbox commands...
3,637,016 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,062 UART: [rt]cmd =0x41544d4e, len=14344
4,404,715 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,172 UART:
192,537 UART: Running Caliptra ROM ...
193,634 UART:
193,778 UART: [state] CFI Enabled
265,329 UART: [state] LifecycleState = Unprovisioned
267,250 UART: [state] DebugLocked = No
270,124 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,334 UART: [kat] SHA2-256
445,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,547 UART: [kat] ++
455,997 UART: [kat] sha1
466,088 UART: [kat] SHA2-256
468,756 UART: [kat] SHA2-384
474,672 UART: [kat] SHA2-512-ACC
477,046 UART: [kat] ECC-384
2,766,475 UART: [kat] HMAC-384Kdf
2,777,359 UART: [kat] LMS
3,967,643 UART: [kat] --
3,972,287 UART: [cold-reset] ++
3,974,866 UART: [fht] Storing FHT @ 0x50003400
3,985,931 UART: [idev] ++
3,986,566 UART: [idev] CDI.KEYID = 6
3,987,482 UART: [idev] SUBJECT.KEYID = 7
3,988,727 UART: [idev] UDS.KEYID = 0
3,989,808 ready_for_fw is high
3,990,016 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,578 UART: [idev] Erasing UDS.KEYID = 0
7,325,894 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,659 UART: [idev] --
7,351,708 UART: [ldev] ++
7,352,276 UART: [ldev] CDI.KEYID = 6
7,353,244 UART: [ldev] SUBJECT.KEYID = 5
7,354,456 UART: [ldev] AUTHORITY.KEYID = 7
7,355,684 UART: [ldev] FE.KEYID = 1
7,398,584 UART: [ldev] Erasing FE.KEYID = 1
10,732,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,547 UART: [ldev] --
13,092,674 UART: [fwproc] Waiting for Commands...
13,095,635 UART: [fwproc] Received command 0x46574c44
13,097,814 UART: [fwproc] Received Image of size 114124 bytes
17,148,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,227,890 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,296,754 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,614,603 >>> mbox cmd response: success
17,618,640 UART: [afmc] ++
17,619,439 UART: [afmc] CDI.KEYID = 6
17,620,432 UART: [afmc] SUBJECT.KEYID = 7
17,621,543 UART: [afmc] AUTHORITY.KEYID = 5
20,986,503 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,408 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,811 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,615 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,061 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,942 UART: [afmc] --
23,356,860 UART: [cold-reset] --
23,359,985 UART: [state] Locking Datavault
23,366,202 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,899 UART: [state] Locking ICCM
23,369,568 UART: [exit] Launching FMC @ 0x40000130
23,377,960 UART:
23,378,200 UART: Running Caliptra FMC ...
23,379,499 UART:
23,379,675 UART: [state] CFI Enabled
23,445,019 UART: [fht] FMC Alias Private Key: 7
25,782,645 UART: [art] Extend RT PCRs Done
25,783,857 UART: [art] Lock RT PCRs Done
25,785,435 UART: [art] Populate DV Done
25,790,680 UART: [fht] FMC Alias Private Key: 7
25,792,214 UART: [art] Derive CDI
25,793,025 UART: [art] Store in in slot 0x4
25,853,415 UART: [art] Derive Key Pair
25,854,429 UART: [art] Store priv key in slot 0x5
29,147,749 UART: [art] Derive Key Pair - Done
29,160,795 UART: [art] Signing Cert with AUTHO
29,162,097 UART: RITY.KEYID = 7
31,448,025 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,540 UART: [art] PUB.X = BE7F09DE174726134575AC80804AB6CC615845FF52990AE2911808792CDF56237DA3CF8B81F1924D0E35365718389751
31,456,727 UART: [art] PUB.Y = 17E75B9E771917DEDE1E3DC66D641FB63BF2C2FA56139F4E9B6BB5020412EE2D997B5D6EEC1B1FB8C131D6012B7C3154
31,463,993 UART: [art] SIG.R = 517B549D1EC89B3DC1B8E7302A443E20319E3929F4CC884CF74D33397DFB1DC1F4865E7C60DF5755B96F0A770754BEDB
31,471,396 UART: [art] SIG.S = B2F48307460426B47386E7621426FB352114A47087C52573A5C7EE68F1449B4CCAD836722194430593F81E341512402B
32,776,904 UART: Caliptra RT
32,777,610 UART: [state] CFI Enabled
32,937,463 UART: [rt] RT listening for mailbox commands...
32,939,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,095,165 UART: [rt]cmd =0x41544d4e, len=14344
38,330,880 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,784,279 ready_for_fw is high
3,785,119 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,828,380 >>> mbox cmd response: success
23,521,308 UART:
23,521,692 UART: Running Caliptra FMC ...
23,522,798 UART:
23,522,963 UART: [state] CFI Enabled
23,593,416 UART: [fht] FMC Alias Private Key: 7
25,931,386 UART: [art] Extend RT PCRs Done
25,932,615 UART: [art] Lock RT PCRs Done
25,934,000 UART: [art] Populate DV Done
25,939,545 UART: [fht] FMC Alias Private Key: 7
25,941,162 UART: [art] Derive CDI
25,941,986 UART: [art] Store in in slot 0x4
26,001,844 UART: [art] Derive Key Pair
26,002,892 UART: [art] Store priv key in slot 0x5
29,296,078 UART: [art] Derive Key Pair - Done
29,309,185 UART: [art] Signing Cert with AUTHO
29,310,496 UART: RITY.KEYID = 7
31,597,530 UART: [art] Erasing AUTHORITY.KEYID = 7
31,599,036 UART: [art] PUB.X = E9708AD17CFD86C0855865F38DFD9621FEE9E78164382D8767905E1EAA4FB4CB7A775FC2938175084A43334DAA3329A5
31,606,264 UART: [art] PUB.Y = B2FEAB5FAD352225E086CA136E60CFF981D5F12226107C089FF9F5FABD41D56A724EA3B7D101A0AFE0C68664ED7056F8
31,613,545 UART: [art] SIG.R = 1D0A6A3438278830818CEA4116057259B212C51D8CE0271C2D0DA1178D6F0B14175040160439EA8D10ACC7CB89B3C873
31,620,919 UART: [art] SIG.S = B967BC9A6A1DA0913AD1BAC807F50A8D3631E6D475E4697132C09B39E26F698E1E7F4BBC02BC5BBD3C68875521902F30
32,925,514 UART: Caliptra RT
32,926,226 UART: [state] CFI Enabled
33,087,551 UART: [rt] RT listening for mailbox commands...
33,089,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,245,296 UART: [rt]cmd =0x41544d4e, len=14344
38,481,139 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
192,646 UART:
193,003 UART: Running Caliptra ROM ...
194,102 UART:
603,911 UART: [state] CFI Enabled
616,748 UART: [state] LifecycleState = Unprovisioned
618,729 UART: [state] DebugLocked = No
620,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,807 UART: [kat] SHA2-256
794,542 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,132 UART: [kat] ++
805,585 UART: [kat] sha1
817,511 UART: [kat] SHA2-256
820,228 UART: [kat] SHA2-384
825,999 UART: [kat] SHA2-512-ACC
828,367 UART: [kat] ECC-384
3,112,400 UART: [kat] HMAC-384Kdf
3,125,492 UART: [kat] LMS
4,315,562 UART: [kat] --
4,321,355 UART: [cold-reset] ++
4,323,650 UART: [fht] Storing FHT @ 0x50003400
4,335,191 UART: [idev] ++
4,335,751 UART: [idev] CDI.KEYID = 6
4,336,734 UART: [idev] SUBJECT.KEYID = 7
4,337,971 UART: [idev] UDS.KEYID = 0
4,339,060 ready_for_fw is high
4,339,256 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,604 UART: [idev] Erasing UDS.KEYID = 0
7,626,445 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,775 UART: [idev] --
7,651,879 UART: [ldev] ++
7,652,445 UART: [ldev] CDI.KEYID = 6
7,653,454 UART: [ldev] SUBJECT.KEYID = 5
7,654,766 UART: [ldev] AUTHORITY.KEYID = 7
7,655,952 UART: [ldev] FE.KEYID = 1
7,664,916 UART: [ldev] Erasing FE.KEYID = 1
10,956,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,368 UART: [ldev] --
13,316,923 UART: [fwproc] Waiting for Commands...
13,320,260 UART: [fwproc] Received command 0x46574c44
13,322,491 UART: [fwproc] Received Image of size 114124 bytes
17,372,024 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,327 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,170 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,835,933 >>> mbox cmd response: success
17,839,346 UART: [afmc] ++
17,839,938 UART: [afmc] CDI.KEYID = 6
17,840,955 UART: [afmc] SUBJECT.KEYID = 7
17,842,110 UART: [afmc] AUTHORITY.KEYID = 5
21,155,519 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,155 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,421 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,778 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,613 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,081 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,446 UART: [afmc] --
23,523,310 UART: [cold-reset] --
23,527,327 UART: [state] Locking Datavault
23,533,699 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,394 UART: [state] Locking ICCM
23,537,644 UART: [exit] Launching FMC @ 0x40000130
23,546,038 UART:
23,546,273 UART: Running Caliptra FMC ...
23,547,372 UART:
23,547,529 UART: [state] CFI Enabled
23,555,734 UART: [fht] FMC Alias Private Key: 7
25,886,539 UART: [art] Extend RT PCRs Done
25,887,751 UART: [art] Lock RT PCRs Done
25,889,203 UART: [art] Populate DV Done
25,894,675 UART: [fht] FMC Alias Private Key: 7
25,896,371 UART: [art] Derive CDI
25,897,110 UART: [art] Store in in slot 0x4
25,939,754 UART: [art] Derive Key Pair
25,940,748 UART: [art] Store priv key in slot 0x5
29,182,125 UART: [art] Derive Key Pair - Done
29,195,551 UART: [art] Signing Cert with AUTHO
29,196,857 UART: RITY.KEYID = 7
31,476,266 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,781 UART: [art] PUB.X = 9BD38BD4657FAC73002462C76E2BCDF6812706D6736F4DCE62C332F678E10DF3AC42D10C8CBCC9DBFDEFC7688341BADE
31,485,059 UART: [art] PUB.Y = A72D026D7EF717961472E9BC44D7B47F6C9D1E94A4579BC06E9CB930BB68642E41AE5DA6E10E22D142DD665FB4C5EEE2
31,492,323 UART: [art] SIG.R = CF2584288DCBC8A38E737C03F1FED238A5B9EDA46FC1A7C23B549D832C654397133D34248FF7F28E9504B75691E17EC0
31,499,751 UART: [art] SIG.S = 5946A2750F7557C74BE3129281C874BB2BA7778C9ACF8C5DFFD959F8C544534459D8EC35C175F77CD8405E1D258337ED
32,804,749 UART: Caliptra RT
32,805,439 UART: [state] CFI Enabled
32,923,997 UART: [rt] RT listening for mailbox commands...
32,926,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,081,622 UART: [rt]cmd =0x41544d4e, len=14344
38,316,889 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,125,644 ready_for_fw is high
4,126,277 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,062,172 >>> mbox cmd response: success
23,699,454 UART:
23,699,862 UART: Running Caliptra FMC ...
23,700,960 UART:
23,701,116 UART: [state] CFI Enabled
23,708,892 UART: [fht] FMC Alias Private Key: 7
26,039,717 UART: [art] Extend RT PCRs Done
26,040,946 UART: [art] Lock RT PCRs Done
26,042,792 UART: [art] Populate DV Done
26,048,469 UART: [fht] FMC Alias Private Key: 7
26,050,170 UART: [art] Derive CDI
26,050,986 UART: [art] Store in in slot 0x4
26,093,418 UART: [art] Derive Key Pair
26,094,417 UART: [art] Store priv key in slot 0x5
29,336,340 UART: [art] Derive Key Pair - Done
29,349,023 UART: [art] Signing Cert with AUTHO
29,350,327 UART: RITY.KEYID = 7
31,629,948 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,452 UART: [art] PUB.X = 81E25A9EDA3DF236C4B0662BCC9F4855304AB1E5C075E06F9514C3C3A104FB29B72E7F88C61C58EB65612C98E10CEDA0
31,638,735 UART: [art] PUB.Y = 212B050D95CC4DD481BB53B484E0605CDCAC0C52AF8B4D359C26531E2DA4D45224A2F04AABA34C63D75EBEDC55783348
31,645,984 UART: [art] SIG.R = 6AD763E2FA934D82787A4FF105AB179C97F2BB5F32873637BD789409DA8810D52D8C34687CD96472C2239E1FB2FBE05A
31,653,370 UART: [art] SIG.S = DA7811EB61E4B29EDD169EACEF2C701DCDF77CDCD8CB7DD206E96868B6CAC80B9DF195236F7BF7CEBD34ADB264161D64
32,958,410 UART: Caliptra RT
32,959,122 UART: [state] CFI Enabled
33,077,590 UART: [rt] RT listening for mailbox commands...
33,079,900 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,235,329 UART: [rt]cmd =0x41544d4e, len=14344
38,471,121 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,112 UART:
192,468 UART: Running Caliptra ROM ...
193,669 UART:
193,826 UART: [state] CFI Enabled
266,729 UART: [state] LifecycleState = Unprovisioned
268,637 UART: [state] DebugLocked = No
271,377 UART: [state] WD Timer not started. Device not locked for debugging
274,422 UART: [kat] SHA2-256
453,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,139 UART: [kat] ++
465,617 UART: [kat] sha1
476,566 UART: [kat] SHA2-256
479,568 UART: [kat] SHA2-384
486,264 UART: [kat] SHA2-512-ACC
489,209 UART: [kat] ECC-384
2,949,815 UART: [kat] HMAC-384Kdf
2,972,924 UART: [kat] LMS
3,502,392 UART: [kat] --
3,506,528 UART: [cold-reset] ++
3,507,532 UART: [fht] FHT @ 0x50003400
3,518,366 UART: [idev] ++
3,518,925 UART: [idev] CDI.KEYID = 6
3,519,960 UART: [idev] SUBJECT.KEYID = 7
3,521,064 UART: [idev] UDS.KEYID = 0
3,522,133 ready_for_fw is high
3,522,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,404 UART: [idev] Erasing UDS.KEYID = 0
6,025,491 UART: [idev] Sha1 KeyId Algorithm
6,048,750 UART: [idev] --
6,054,356 UART: [ldev] ++
6,054,934 UART: [ldev] CDI.KEYID = 6
6,055,822 UART: [ldev] SUBJECT.KEYID = 5
6,057,063 UART: [ldev] AUTHORITY.KEYID = 7
6,058,244 UART: [ldev] FE.KEYID = 1
6,101,706 UART: [ldev] Erasing FE.KEYID = 1
8,605,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,883 UART: [ldev] --
10,419,877 UART: [fwproc] Wait for Commands...
10,422,729 UART: [fwproc] Recv command 0x46574c44
10,424,829 UART: [fwproc] Recv'd Img size: 114448 bytes
13,822,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,665 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,314 >>> mbox cmd response: success
14,288,389 UART: [afmc] ++
14,288,983 UART: [afmc] CDI.KEYID = 6
14,289,890 UART: [afmc] SUBJECT.KEYID = 7
14,291,059 UART: [afmc] AUTHORITY.KEYID = 5
16,834,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,558,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,559,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,575,697 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,591,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,607,625 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,631,013 UART: [afmc] --
18,634,503 UART: [cold-reset] --
18,636,791 UART: [state] Locking Datavault
18,640,253 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,896 UART: [state] Locking ICCM
18,644,052 UART: [exit] Launching FMC @ 0x40000130
18,652,460 UART:
18,652,695 UART: Running Caliptra FMC ...
18,653,796 UART:
18,653,957 UART: [state] CFI Enabled
18,716,432 UART: [fht] FMC Alias Private Key: 7
20,480,508 UART: [art] Extend RT PCRs Done
20,481,718 UART: [art] Lock RT PCRs Done
20,483,287 UART: [art] Populate DV Done
20,488,767 UART: [fht] FMC Alias Private Key: 7
20,490,365 UART: [art] Derive CDI
20,491,181 UART: [art] Store in in slot 0x4
20,549,560 UART: [art] Derive Key Pair
20,550,590 UART: [art] Store priv key in slot 0x5
23,013,383 UART: [art] Derive Key Pair - Done
23,026,489 UART: [art] Signing Cert with AUTHO
23,027,796 UART: RITY.KEYID = 7
24,751,362 UART: [art] Erasing AUTHORITY.KEYID = 7
24,752,862 UART: [art] PUB.X = DFDA92F76A670DBEFD4252E087C183AC45D7884F14C094EEAE6C65D7BA38F252A3195AD08E48AF09EBA789A91B07FE4C
24,760,163 UART: [art] PUB.Y = 30760E7395236F6ECC0D38833863274050296C726A879CED8C07EB9B912F9400DC3FECF78860261401599CD61646A101
24,767,328 UART: [art] SIG.R = 19F53A050FB017D8558F0D20991CB55E03FC8EF001611D0E549472FF70CB0FD18BC311C0F8B3066060F59A4040F0D1B1
24,774,735 UART: [art] SIG.S = 87F26591348643C39E850731EF191391BE31DC5F03D21EC80A9ACD0689EFB7B2AB1F5892CBA1EB0AD2F726627D9119D9
25,752,724 UART: Caliptra RT
25,753,431 UART: [state] CFI Enabled
25,919,196 UART: [rt] RT listening for mailbox commands...
25,921,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,077,316 UART: [rt]cmd =0x41544d4e, len=14344
30,007,519 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,359,555 ready_for_fw is high
3,359,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,045,456 >>> mbox cmd response: success
18,345,754 UART:
18,346,148 UART: Running Caliptra FMC ...
18,347,250 UART:
18,347,408 UART: [state] CFI Enabled
18,411,838 UART: [fht] FMC Alias Private Key: 7
20,175,979 UART: [art] Extend RT PCRs Done
20,177,197 UART: [art] Lock RT PCRs Done
20,179,057 UART: [art] Populate DV Done
20,184,190 UART: [fht] FMC Alias Private Key: 7
20,185,787 UART: [art] Derive CDI
20,186,606 UART: [art] Store in in slot 0x4
20,244,738 UART: [art] Derive Key Pair
20,245,800 UART: [art] Store priv key in slot 0x5
22,708,609 UART: [art] Derive Key Pair - Done
22,721,656 UART: [art] Signing Cert with AUTHO
22,722,959 UART: RITY.KEYID = 7
24,434,384 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,885 UART: [art] PUB.X = 55B3D3F33944C35E48AE4B85363C277DEDAA1ABA78DB1570C4098E0885F5E7F0CF38658391CA1C2DC5C1B25B63D6B711
24,443,131 UART: [art] PUB.Y = E771C56E4F65D86E276B9A7A1B5BE18DA461EA59E61CD512E6077620DC21E17A3586590E4DE451ED2B69D263A5C20475
24,450,414 UART: [art] SIG.R = 0984455BBF46313E9FA09E36E4306C63FE32D7589E31385B8101859E5BD513BDE3C84EC89666DAAB6A5D384BCB6D762D
24,457,832 UART: [art] SIG.S = 5B836E93438F9FA9C4E7D21705A68DD2352189AB237E02CBDCDFAB9447ABE43F667B352BD3F9726E17CD2E8A3D5D559B
25,436,005 UART: Caliptra RT
25,436,695 UART: [state] CFI Enabled
25,604,074 UART: [rt] RT listening for mailbox commands...
25,606,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,762,390 UART: [rt]cmd =0x41544d4e, len=14344
29,693,220 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,554 UART:
192,911 UART: Running Caliptra ROM ...
194,102 UART:
603,698 UART: [state] CFI Enabled
619,226 UART: [state] LifecycleState = Unprovisioned
621,094 UART: [state] DebugLocked = No
622,686 UART: [state] WD Timer not started. Device not locked for debugging
626,857 UART: [kat] SHA2-256
805,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,583 UART: [kat] ++
818,025 UART: [kat] sha1
828,823 UART: [kat] SHA2-256
831,817 UART: [kat] SHA2-384
837,588 UART: [kat] SHA2-512-ACC
840,597 UART: [kat] ECC-384
3,285,270 UART: [kat] HMAC-384Kdf
3,297,354 UART: [kat] LMS
3,826,902 UART: [kat] --
3,833,692 UART: [cold-reset] ++
3,835,746 UART: [fht] FHT @ 0x50003400
3,846,320 UART: [idev] ++
3,846,879 UART: [idev] CDI.KEYID = 6
3,847,825 UART: [idev] SUBJECT.KEYID = 7
3,849,060 UART: [idev] UDS.KEYID = 0
3,849,954 ready_for_fw is high
3,850,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,703 UART: [idev] Erasing UDS.KEYID = 0
6,317,993 UART: [idev] Sha1 KeyId Algorithm
6,342,202 UART: [idev] --
6,346,087 UART: [ldev] ++
6,346,650 UART: [ldev] CDI.KEYID = 6
6,347,524 UART: [ldev] SUBJECT.KEYID = 5
6,348,727 UART: [ldev] AUTHORITY.KEYID = 7
6,350,011 UART: [ldev] FE.KEYID = 1
6,361,756 UART: [ldev] Erasing FE.KEYID = 1
8,835,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,157 UART: [ldev] --
10,624,660 UART: [fwproc] Wait for Commands...
10,626,418 UART: [fwproc] Recv command 0x46574c44
10,628,455 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,303 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,007 >>> mbox cmd response: success
14,492,536 UART: [afmc] ++
14,493,129 UART: [afmc] CDI.KEYID = 6
14,494,007 UART: [afmc] SUBJECT.KEYID = 7
14,495,222 UART: [afmc] AUTHORITY.KEYID = 5
16,994,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,684 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,540 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,288 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,358 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,167 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,521 UART: [afmc] --
18,790,649 UART: [cold-reset] --
18,795,215 UART: [state] Locking Datavault
18,800,237 UART: [state] Locking PCR0, PCR1 and PCR31
18,801,884 UART: [state] Locking ICCM
18,803,599 UART: [exit] Launching FMC @ 0x40000130
18,812,043 UART:
18,812,272 UART: Running Caliptra FMC ...
18,813,365 UART:
18,813,516 UART: [state] CFI Enabled
18,821,252 UART: [fht] FMC Alias Private Key: 7
20,579,074 UART: [art] Extend RT PCRs Done
20,580,294 UART: [art] Lock RT PCRs Done
20,581,858 UART: [art] Populate DV Done
20,587,318 UART: [fht] FMC Alias Private Key: 7
20,589,011 UART: [art] Derive CDI
20,589,824 UART: [art] Store in in slot 0x4
20,632,094 UART: [art] Derive Key Pair
20,633,088 UART: [art] Store priv key in slot 0x5
23,059,271 UART: [art] Derive Key Pair - Done
23,072,150 UART: [art] Signing Cert with AUTHO
23,073,449 UART: RITY.KEYID = 7
24,778,457 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,965 UART: [art] PUB.X = 204D4BEB4DA140ACCC97B9853D18364ED9A6AE58D6931CA605ABC7626DCD36AF6247BE8A2B869E8675AD6B0FDF91AD8E
24,787,256 UART: [art] PUB.Y = 3A3C2FCBBFBD5A4ABC3597316D7A59C1DB3A72C6CEC3DEAFB62F0863BEBC5A6FF4C4CC755BBC627E8CBFBD473187947B
24,794,616 UART: [art] SIG.R = 7F94E6998E8D672777D7B3687AD0FFD1C0C9EAB8D1CE7CBC305A54D986C16C283A7BE58F2FC10A59F680C14430FCD6F3
24,801,967 UART: [art] SIG.S = B8EED53F5E340E35BA25A9231FA973DEF9164AE71E60D19BF612B7DD43D465A261D9783979375A76DF98B7A5DA2830DD
25,780,191 UART: Caliptra RT
25,780,882 UART: [state] CFI Enabled
25,898,324 UART: [rt] RT listening for mailbox commands...
25,900,633 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,056,116 UART: [rt]cmd =0x41544d4e, len=14344
29,986,937 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,694,736 ready_for_fw is high
3,695,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,300 >>> mbox cmd response: success
18,516,264 UART:
18,516,693 UART: Running Caliptra FMC ...
18,517,785 UART:
18,517,928 UART: [state] CFI Enabled
18,525,676 UART: [fht] FMC Alias Private Key: 7
20,282,440 UART: [art] Extend RT PCRs Done
20,283,659 UART: [art] Lock RT PCRs Done
20,285,357 UART: [art] Populate DV Done
20,290,963 UART: [fht] FMC Alias Private Key: 7
20,292,646 UART: [art] Derive CDI
20,293,464 UART: [art] Store in in slot 0x4
20,336,011 UART: [art] Derive Key Pair
20,337,000 UART: [art] Store priv key in slot 0x5
22,763,499 UART: [art] Derive Key Pair - Done
22,776,706 UART: [art] Signing Cert with AUTHO
22,778,042 UART: RITY.KEYID = 7
24,483,432 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,936 UART: [art] PUB.X = 45C691001B6F5CDA7941BC275603494E7C2E5CECC6DFEA8E9B8794E8ED9DCD109FB7508CE427876571A217AD9EA1C7B6
24,492,234 UART: [art] PUB.Y = 8E9FC6550787E60C3CA882D5AEF1C61004C6BA76550355153AB7283DE78F29EBCEE3798F10C943A28A15251C6707F1CF
24,499,458 UART: [art] SIG.R = 85AD8367DCEE2C7808B202C2148530CD3A2AEC299B6913CE877F4AC33D6D535EDB427E405946F14E3CD8A2689FF0188E
24,506,888 UART: [art] SIG.S = 2A6E31C94E94625D830E73D6D5B68046E7FDB12ACEDAF1370A942FED58DA0840658253D0D657A24393FC26B490D08501
25,485,693 UART: Caliptra RT
25,486,382 UART: [state] CFI Enabled
25,604,750 UART: [rt] RT listening for mailbox commands...
25,607,120 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,762,432 UART: [rt]cmd =0x41544d4e, len=14344
29,692,665 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,438,632 ready_for_fw is high
3,439,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,762,711 >>> mbox cmd response: success
19,046,398 UART:
19,046,784 UART: Running Caliptra FMC ...
19,047,938 UART:
19,048,102 UART: [state] CFI Enabled
19,116,181 UART: [fht] FMC Alias Private Key: 7
20,879,939 UART: [art] Extend RT PCRs Done
20,881,174 UART: [art] Lock RT PCRs Done
20,882,645 UART: [art] Populate DV Done
20,888,105 UART: [fht] FMC Alias Private Key: 7
20,889,665 UART: [art] Derive CDI
20,890,403 UART: [art] Store in in slot 0x4
20,949,648 UART: [art] Derive Key Pair
20,950,707 UART: [art] Store priv key in slot 0x5
23,413,579 UART: [art] Derive Key Pair - Done
23,426,586 UART: [art] Signing Cert with AUTHO
23,427,888 UART: RITY.KEYID = 7
25,138,685 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,189 UART: [art] PUB.X = 1F34E34BDE0FB2F1A3F22128235DD866B16147B2322D1735F8D5FC0D47BFE4C2A3039D6E06E23D16EEF0D1A31588765B
25,147,447 UART: [art] PUB.Y = 426A5D514184146615BD178AFC3509C926E96E97F9A422DDEA4EAC5D28527356D042A6D4CFC8FB992761116E0D985F35
25,154,708 UART: [art] SIG.R = AB4F66B365BF51E7AF9E7E3766C992F81571519EB38D8CC28148A57995967472603CF7CE33CFDBE8E497F01EE7ABE499
25,162,102 UART: [art] SIG.S = EA0EA9132AA32295D00FDA81020C7435275798B90C4864A9AD4F7C6872FE6E11737668358C23B0441139C9FA7199662B
26,141,313 UART: Caliptra RT
26,142,016 UART: [state] CFI Enabled
26,305,838 UART: [rt] RT listening for mailbox commands...
26,308,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,463,730 UART: [rt]cmd =0x41544d4e, len=14344
30,394,821 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,755,826 ready_for_fw is high
3,756,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,966,967 >>> mbox cmd response: success
19,219,136 UART:
19,219,523 UART: Running Caliptra FMC ...
19,220,627 UART:
19,220,776 UART: [state] CFI Enabled
19,228,770 UART: [fht] FMC Alias Private Key: 7
20,985,805 UART: [art] Extend RT PCRs Done
20,987,055 UART: [art] Lock RT PCRs Done
20,988,603 UART: [art] Populate DV Done
20,994,112 UART: [fht] FMC Alias Private Key: 7
20,995,594 UART: [art] Derive CDI
20,996,355 UART: [art] Store in in slot 0x4
21,038,953 UART: [art] Derive Key Pair
21,039,998 UART: [art] Store priv key in slot 0x5
23,467,234 UART: [art] Derive Key Pair - Done
23,480,074 UART: [art] Signing Cert with AUTHO
23,481,378 UART: RITY.KEYID = 7
25,186,911 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,423 UART: [art] PUB.X = AC5CA8FA1284DB61031539657E0D00B5BB6A024E11A9CF29DB5FC9E22D203BB3C45D1C7021ADD4F9DB4B0652E5276795
25,195,645 UART: [art] PUB.Y = 36BDBA2A3F94F45A7B338E86B8B635CE834E661A3EE93BC83C35B95BB7BD52B5D774A98FE822A9D3E56C618C9EE04A33
25,202,947 UART: [art] SIG.R = B2198956810C4D7ED46D3BD0AA1207F4E98DAA55BA066964978DD259B9005668103CE26735770EA5D8080E92B72F2951
25,210,280 UART: [art] SIG.S = 85276B2E750BD3A50339B521757D1AC664BEAF26A62532A3F864F58E99E3CA46D280A41B25CC12D8AF71459B1B52820F
26,189,256 UART: Caliptra RT
26,189,976 UART: [state] CFI Enabled
26,307,322 UART: [rt] RT listening for mailbox commands...
26,309,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,465,094 UART: [rt]cmd =0x41544d4e, len=14344
30,395,511 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
86,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,791 UART: [kat] SHA2-256
881,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,837 UART: [kat] ++
885,989 UART: [kat] sha1
890,003 UART: [kat] SHA2-256
891,941 UART: [kat] SHA2-384
894,796 UART: [kat] SHA2-512-ACC
896,697 UART: [kat] ECC-384
902,220 UART: [kat] HMAC-384Kdf
906,700 UART: [kat] LMS
1,474,896 UART: [kat] --
1,475,803 UART: [cold-reset] ++
1,476,221 UART: [fht] Storing FHT @ 0x50003400
1,479,012 UART: [idev] ++
1,479,180 UART: [idev] CDI.KEYID = 6
1,479,540 UART: [idev] SUBJECT.KEYID = 7
1,479,964 UART: [idev] UDS.KEYID = 0
1,480,309 ready_for_fw is high
1,480,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,064 UART: [idev] Erasing UDS.KEYID = 0
1,504,502 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,182 UART: [idev] --
1,514,141 UART: [ldev] ++
1,514,309 UART: [ldev] CDI.KEYID = 6
1,514,672 UART: [ldev] SUBJECT.KEYID = 5
1,515,098 UART: [ldev] AUTHORITY.KEYID = 7
1,515,561 UART: [ldev] FE.KEYID = 1
1,520,701 UART: [ldev] Erasing FE.KEYID = 1
1,545,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,344 UART: [ldev] --
1,584,645 UART: [fwproc] Waiting for Commands...
1,585,260 UART: [fwproc] Received command 0x46574c44
1,586,051 UART: [fwproc] Received Image of size 114448 bytes
2,885,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,854 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,213 >>> mbox cmd response: success
3,079,389 UART: [afmc] ++
3,079,557 UART: [afmc] CDI.KEYID = 6
3,079,919 UART: [afmc] SUBJECT.KEYID = 7
3,080,344 UART: [afmc] AUTHORITY.KEYID = 5
3,115,631 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,637 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,417 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,030 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,720 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,603 UART: [afmc] --
3,158,625 UART: [cold-reset] --
3,159,483 UART: [state] Locking Datavault
3,160,658 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,262 UART: [state] Locking ICCM
3,161,920 UART: [exit] Launching FMC @ 0x40000130
3,167,249 UART:
3,167,265 UART: Running Caliptra FMC ...
3,167,673 UART:
3,167,727 UART: [state] CFI Enabled
3,178,416 UART: [fht] FMC Alias Private Key: 7
3,286,047 UART: [art] Extend RT PCRs Done
3,286,475 UART: [art] Lock RT PCRs Done
3,287,827 UART: [art] Populate DV Done
3,295,984 UART: [fht] FMC Alias Private Key: 7
3,297,082 UART: [art] Derive CDI
3,297,362 UART: [art] Store in in slot 0x4
3,383,241 UART: [art] Derive Key Pair
3,383,601 UART: [art] Store priv key in slot 0x5
3,396,951 UART: [art] Derive Key Pair - Done
3,411,609 UART: [art] Signing Cert with AUTHO
3,412,089 UART: RITY.KEYID = 7
3,426,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,658 UART: [art] PUB.X = 8D8B0828D1B8E5B58A628786093D756BDA56CCFE5A6A8784EF256BD0EC67687A14601E1B72FC48FD2090C1DDCC4CB061
3,434,434 UART: [art] PUB.Y = A2D490EA684F9E545727063CDF1FF7A45DDF0352AA50A92C70CB33B96795C3FC10C2193FDA77B31E7D4A02ECDF0F45CF
3,441,390 UART: [art] SIG.R = 0809810DF61F3792FC4D3DCE76E0A9CB51BC4A466D59AC3D28658ECA73371433D967819559D65E9F3F62D22942E1AF96
3,448,153 UART: [art] SIG.S = 93858B517FA23CB6487F007F50F0F6484D5CD600C75A8A05271673B008EFC1E7E000E98FEDAD9B26D721A9F65CEE48D4
3,471,852 UART: Caliptra RT
3,472,105 UART: [state] CFI Enabled
3,580,256 UART: [rt] RT listening for mailbox commands...
3,580,926 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,808 UART: [rt]cmd =0x41544d4e, len=14344
3,848,133 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,493 ready_for_fw is high
1,362,493 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,337 >>> mbox cmd response: success
2,990,873 UART:
2,990,889 UART: Running Caliptra FMC ...
2,991,297 UART:
2,991,351 UART: [state] CFI Enabled
3,001,622 UART: [fht] FMC Alias Private Key: 7
3,109,689 UART: [art] Extend RT PCRs Done
3,110,117 UART: [art] Lock RT PCRs Done
3,111,695 UART: [art] Populate DV Done
3,119,700 UART: [fht] FMC Alias Private Key: 7
3,120,652 UART: [art] Derive CDI
3,120,932 UART: [art] Store in in slot 0x4
3,206,409 UART: [art] Derive Key Pair
3,206,769 UART: [art] Store priv key in slot 0x5
3,219,673 UART: [art] Derive Key Pair - Done
3,234,126 UART: [art] Signing Cert with AUTHO
3,234,606 UART: RITY.KEYID = 7
3,250,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,779 UART: [art] PUB.X = 59E1F7FE778BBA1EB8AC3348BD36A08C7853885380F66FB9017187B1BDB421CE684A3970D40401338A84D3816BD6A84E
3,257,542 UART: [art] PUB.Y = 84E585D0AFA957E2C070B355B0CF9E44FFB5AC58F70B224E12FE9CB1018B2F1FD19C10F541D3AB7C0E071E44922F67BE
3,264,496 UART: [art] SIG.R = 43E0F075896A1ABC27BA4C1BF1B9BC48EFAC52D05E774594D2A30BF305A87A9BE8905CAA3CE49A429075B1F35DE9FF47
3,271,278 UART: [art] SIG.S = ECF92F8F34813FDDB9F73AC721EDD1CA57E237AFD11D907B8CBA268BC62CBC8EB810AD9B51436F473EE6FB7712B21962
3,294,919 UART: Caliptra RT
3,295,172 UART: [state] CFI Enabled
3,403,955 UART: [rt] RT listening for mailbox commands...
3,404,625 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,589 UART: [rt]cmd =0x41544d4e, len=14344
3,672,492 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,052 UART: [kat] SHA2-256
881,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,098 UART: [kat] ++
886,250 UART: [kat] sha1
890,442 UART: [kat] SHA2-256
892,380 UART: [kat] SHA2-384
895,125 UART: [kat] SHA2-512-ACC
897,026 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,435 UART: [kat] LMS
1,475,631 UART: [kat] --
1,476,430 UART: [cold-reset] ++
1,476,998 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 ready_for_fw is high
1,481,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,813 UART: [idev] Erasing UDS.KEYID = 0
1,505,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,427 UART: [idev] --
1,515,254 UART: [ldev] ++
1,515,422 UART: [ldev] CDI.KEYID = 6
1,515,785 UART: [ldev] SUBJECT.KEYID = 5
1,516,211 UART: [ldev] AUTHORITY.KEYID = 7
1,516,674 UART: [ldev] FE.KEYID = 1
1,522,058 UART: [ldev] Erasing FE.KEYID = 1
1,547,395 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,645 UART: [ldev] --
1,586,918 UART: [fwproc] Waiting for Commands...
1,587,653 UART: [fwproc] Received command 0x46574c44
1,588,444 UART: [fwproc] Received Image of size 114448 bytes
2,888,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,824 >>> mbox cmd response: success
3,082,026 UART: [afmc] ++
3,082,194 UART: [afmc] CDI.KEYID = 6
3,082,556 UART: [afmc] SUBJECT.KEYID = 7
3,082,981 UART: [afmc] AUTHORITY.KEYID = 5
3,117,908 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,318 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,826 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,711 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,401 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,272 UART: [afmc] --
3,161,200 UART: [cold-reset] --
3,162,056 UART: [state] Locking Datavault
3,163,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,829 UART: [state] Locking ICCM
3,164,355 UART: [exit] Launching FMC @ 0x40000130
3,169,684 UART:
3,169,700 UART: Running Caliptra FMC ...
3,170,108 UART:
3,170,251 UART: [state] CFI Enabled
3,180,804 UART: [fht] FMC Alias Private Key: 7
3,288,485 UART: [art] Extend RT PCRs Done
3,288,913 UART: [art] Lock RT PCRs Done
3,290,395 UART: [art] Populate DV Done
3,298,378 UART: [fht] FMC Alias Private Key: 7
3,299,314 UART: [art] Derive CDI
3,299,594 UART: [art] Store in in slot 0x4
3,385,473 UART: [art] Derive Key Pair
3,385,833 UART: [art] Store priv key in slot 0x5
3,399,155 UART: [art] Derive Key Pair - Done
3,413,910 UART: [art] Signing Cert with AUTHO
3,414,390 UART: RITY.KEYID = 7
3,429,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,419 UART: [art] PUB.X = D18F0EFF3FCBC185FA6A1FCC11DD3C9EE5AE6F0F8E545F8892EE330AD69387B7E4AA4AEF234D29EA0D794EAE7AFC345B
3,437,211 UART: [art] PUB.Y = B1B4B8064E9B5551A17AC03295EDBF50A8C279E31F1163CBDFF94EA793DDD55FA9DDBB635497A39EB3603C4FF8B0DD70
3,444,178 UART: [art] SIG.R = 77EBA4871354A984CC6E7DCD631116CEF2C40F6B8120B26AA3F57B08DBB617A6870286B517C8923991ABD411ED655601
3,450,938 UART: [art] SIG.S = 5461D8A4981E7A3AC515ECE010F2C4525C0F009A799D442C807652B9F3CC6FC53C1913355EB05F6D559596F839839196
3,474,718 UART: Caliptra RT
3,475,063 UART: [state] CFI Enabled
3,583,495 UART: [rt] RT listening for mailbox commands...
3,584,165 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,995 UART: [rt]cmd =0x41544d4e, len=14344
3,851,848 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,914 ready_for_fw is high
1,361,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,550 >>> mbox cmd response: success
2,990,568 UART:
2,990,584 UART: Running Caliptra FMC ...
2,990,992 UART:
2,991,135 UART: [state] CFI Enabled
3,001,460 UART: [fht] FMC Alias Private Key: 7
3,109,363 UART: [art] Extend RT PCRs Done
3,109,791 UART: [art] Lock RT PCRs Done
3,111,011 UART: [art] Populate DV Done
3,119,222 UART: [fht] FMC Alias Private Key: 7
3,120,170 UART: [art] Derive CDI
3,120,450 UART: [art] Store in in slot 0x4
3,206,391 UART: [art] Derive Key Pair
3,206,751 UART: [art] Store priv key in slot 0x5
3,220,009 UART: [art] Derive Key Pair - Done
3,235,189 UART: [art] Signing Cert with AUTHO
3,235,669 UART: RITY.KEYID = 7
3,250,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,712 UART: [art] PUB.X = DC530FAD2CE671B76C1043A809CC218AD9B534D33C020591EF52373801D35F8601EB3F1153883D6FD3723CD6BF2C2A8F
3,258,470 UART: [art] PUB.Y = E5767BB4583C007CA06359D31D7049C3E395B8451F31F3658FDECD1D33DCBD842D0ABE861F49A9FB28BB10E6406F0AA5
3,265,404 UART: [art] SIG.R = 8756C9099422E036F6806620474BB69A2CC8EBDEF595617E940FDF62D111A701D6B1322A1D13DECFD4C759C439DA994F
3,272,169 UART: [art] SIG.S = 80E8A8F736258A0BE30214065ECEA88D26F089B5AD7AED13AD8F47ACB3E86A63AC82CAD1E3C3D511F059CA8F407F5866
3,296,101 UART: Caliptra RT
3,296,446 UART: [state] CFI Enabled
3,404,964 UART: [rt] RT listening for mailbox commands...
3,405,634 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,014 UART: [rt]cmd =0x41544d4e, len=14344
3,673,405 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
893,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,591 UART: [kat] ++
897,743 UART: [kat] sha1
901,791 UART: [kat] SHA2-256
903,731 UART: [kat] SHA2-384
906,506 UART: [kat] SHA2-512-ACC
908,407 UART: [kat] ECC-384
918,178 UART: [kat] HMAC-384Kdf
922,778 UART: [kat] LMS
1,171,106 UART: [kat] --
1,171,759 UART: [cold-reset] ++
1,172,185 UART: [fht] FHT @ 0x50003400
1,174,810 UART: [idev] ++
1,174,978 UART: [idev] CDI.KEYID = 6
1,175,338 UART: [idev] SUBJECT.KEYID = 7
1,175,762 UART: [idev] UDS.KEYID = 0
1,176,107 ready_for_fw is high
1,176,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,548 UART: [idev] Erasing UDS.KEYID = 0
1,200,619 UART: [idev] Sha1 KeyId Algorithm
1,209,053 UART: [idev] --
1,210,115 UART: [ldev] ++
1,210,283 UART: [ldev] CDI.KEYID = 6
1,210,646 UART: [ldev] SUBJECT.KEYID = 5
1,211,072 UART: [ldev] AUTHORITY.KEYID = 7
1,211,535 UART: [ldev] FE.KEYID = 1
1,216,661 UART: [ldev] Erasing FE.KEYID = 1
1,243,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,929 UART: [ldev] --
1,282,412 UART: [fwproc] Wait for Commands...
1,283,216 UART: [fwproc] Recv command 0x46574c44
1,283,944 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,131 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,460 >>> mbox cmd response: success
2,776,594 UART: [afmc] ++
2,776,762 UART: [afmc] CDI.KEYID = 6
2,777,124 UART: [afmc] SUBJECT.KEYID = 7
2,777,549 UART: [afmc] AUTHORITY.KEYID = 5
2,812,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,553 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,438 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,157 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,911 UART: [afmc] --
2,855,833 UART: [cold-reset] --
2,856,871 UART: [state] Locking Datavault
2,858,198 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,802 UART: [state] Locking ICCM
2,859,230 UART: [exit] Launching FMC @ 0x40000130
2,864,559 UART:
2,864,575 UART: Running Caliptra FMC ...
2,864,983 UART:
2,865,037 UART: [state] CFI Enabled
2,875,164 UART: [fht] FMC Alias Private Key: 7
2,983,165 UART: [art] Extend RT PCRs Done
2,983,593 UART: [art] Lock RT PCRs Done
2,984,773 UART: [art] Populate DV Done
2,992,968 UART: [fht] FMC Alias Private Key: 7
2,994,010 UART: [art] Derive CDI
2,994,290 UART: [art] Store in in slot 0x4
3,080,125 UART: [art] Derive Key Pair
3,080,485 UART: [art] Store priv key in slot 0x5
3,093,065 UART: [art] Derive Key Pair - Done
3,107,837 UART: [art] Signing Cert with AUTHO
3,108,317 UART: RITY.KEYID = 7
3,123,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,070 UART: [art] PUB.X = 5BEC68953C4334EF5D154FA94AC6DF715716FA5A6C198459A6B2B1491F8BD2F8B8B4C7AC2A3B3CAFC779836EE22E61A4
3,130,856 UART: [art] PUB.Y = CC63F26A13D69879E572D9DB4204079673B590809DA45066560F8D4A8183467D15CFD0C848A342CADF0616BE1B410784
3,137,785 UART: [art] SIG.R = FE032B9091527E52CC5F65F92A254BEDC55A2F9846DD5E45CAFBC6912D39FBEAE5888611AE2A622048D4048C6E2E9D57
3,144,561 UART: [art] SIG.S = AF52EC92C88664DE2DB824F7D139A6583930B38F2268A1EDBE0B270D269F7D352D04D8BB2078CDBA25042B3E3FE7FF25
3,168,574 UART: Caliptra RT
3,168,827 UART: [state] CFI Enabled
3,276,767 UART: [rt] RT listening for mailbox commands...
3,277,437 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,325 UART: [rt]cmd =0x41544d4e, len=14344
3,544,942 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,863 ready_for_fw is high
1,059,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,393 >>> mbox cmd response: success
2,689,161 UART:
2,689,177 UART: Running Caliptra FMC ...
2,689,585 UART:
2,689,639 UART: [state] CFI Enabled
2,700,082 UART: [fht] FMC Alias Private Key: 7
2,807,793 UART: [art] Extend RT PCRs Done
2,808,221 UART: [art] Lock RT PCRs Done
2,810,017 UART: [art] Populate DV Done
2,818,096 UART: [fht] FMC Alias Private Key: 7
2,819,096 UART: [art] Derive CDI
2,819,376 UART: [art] Store in in slot 0x4
2,905,233 UART: [art] Derive Key Pair
2,905,593 UART: [art] Store priv key in slot 0x5
2,918,509 UART: [art] Derive Key Pair - Done
2,933,423 UART: [art] Signing Cert with AUTHO
2,933,903 UART: RITY.KEYID = 7
2,948,799 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,564 UART: [art] PUB.X = 31233BE1D462D127CDD0913BE419CE02F43640DA4F7FA40F9196D3C593331B5935D8FBB0E825490E59145905C20E45D4
2,956,317 UART: [art] PUB.Y = 0A9FD57428F0C709F5500615884704940B3C349798CA1C38003271335B97A80D2C2DFA428887C68B507FCABFB2648364
2,963,217 UART: [art] SIG.R = E6F9552979C122D798C4A5519E780B9700460B11D11719D4ADA7878CDBCD23CF8B9482253DBCE851B27016EA686C6BD4
2,969,961 UART: [art] SIG.S = 0FCA66065F2B7BB75AB1804A00B20EEEE52A0181645B12A4935AA7E876F74CA12FEB00F8DA14D30D54E20B0BFD4B5756
2,993,453 UART: Caliptra RT
2,993,706 UART: [state] CFI Enabled
3,100,867 UART: [rt] RT listening for mailbox commands...
3,101,537 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,719 UART: [rt]cmd =0x41544d4e, len=14344
3,369,602 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
893,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,082 UART: [kat] ++
898,234 UART: [kat] sha1
902,400 UART: [kat] SHA2-256
904,340 UART: [kat] SHA2-384
906,869 UART: [kat] SHA2-512-ACC
908,770 UART: [kat] ECC-384
918,507 UART: [kat] HMAC-384Kdf
923,201 UART: [kat] LMS
1,171,529 UART: [kat] --
1,172,314 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,501 UART: [idev] ++
1,175,669 UART: [idev] CDI.KEYID = 6
1,176,029 UART: [idev] SUBJECT.KEYID = 7
1,176,453 UART: [idev] UDS.KEYID = 0
1,176,798 ready_for_fw is high
1,176,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,475 UART: [idev] Erasing UDS.KEYID = 0
1,201,396 UART: [idev] Sha1 KeyId Algorithm
1,209,652 UART: [idev] --
1,210,708 UART: [ldev] ++
1,210,876 UART: [ldev] CDI.KEYID = 6
1,211,239 UART: [ldev] SUBJECT.KEYID = 5
1,211,665 UART: [ldev] AUTHORITY.KEYID = 7
1,212,128 UART: [ldev] FE.KEYID = 1
1,217,264 UART: [ldev] Erasing FE.KEYID = 1
1,243,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,890 UART: [ldev] --
1,283,179 UART: [fwproc] Wait for Commands...
1,283,913 UART: [fwproc] Recv command 0x46574c44
1,284,641 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,884 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,783 >>> mbox cmd response: success
2,777,995 UART: [afmc] ++
2,778,163 UART: [afmc] CDI.KEYID = 6
2,778,525 UART: [afmc] SUBJECT.KEYID = 7
2,778,950 UART: [afmc] AUTHORITY.KEYID = 5
2,815,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,750 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,478 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,363 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,082 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,982 UART: [afmc] --
2,858,894 UART: [cold-reset] --
2,859,900 UART: [state] Locking Datavault
2,861,015 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,619 UART: [state] Locking ICCM
2,862,181 UART: [exit] Launching FMC @ 0x40000130
2,867,510 UART:
2,867,526 UART: Running Caliptra FMC ...
2,867,934 UART:
2,868,077 UART: [state] CFI Enabled
2,878,574 UART: [fht] FMC Alias Private Key: 7
2,986,519 UART: [art] Extend RT PCRs Done
2,986,947 UART: [art] Lock RT PCRs Done
2,988,615 UART: [art] Populate DV Done
2,996,698 UART: [fht] FMC Alias Private Key: 7
2,997,878 UART: [art] Derive CDI
2,998,158 UART: [art] Store in in slot 0x4
3,083,839 UART: [art] Derive Key Pair
3,084,199 UART: [art] Store priv key in slot 0x5
3,097,117 UART: [art] Derive Key Pair - Done
3,111,816 UART: [art] Signing Cert with AUTHO
3,112,296 UART: RITY.KEYID = 7
3,127,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,267 UART: [art] PUB.X = 67553BF37BBF194B721CD54132191DAAB7B78F91A8AFA9370DDF84043C49979ACCC7F56C68BC4259C9E248CC62447AF9
3,135,041 UART: [art] PUB.Y = 79FC1BA16DAA83C69BADB625240A69C0FBDFEF058615468781FD6CF1EFA77F783B12DB6DD3ED19F9771A032CEC0285BD
3,142,001 UART: [art] SIG.R = 8D09A6C593CB07111FA1D13630C928F3DA8E61616F0E454033A65E8B1E85EAE6C319BFC40BB61E95551FF2B643DEA462
3,148,767 UART: [art] SIG.S = 74F75BFDC978913915E2232EC7A570F131110AE384C7071C2079A29643A58FE97358291B0C94AD5E53715A1632399C45
3,172,515 UART: Caliptra RT
3,172,860 UART: [state] CFI Enabled
3,280,689 UART: [rt] RT listening for mailbox commands...
3,281,359 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,311 UART: [rt]cmd =0x41544d4e, len=14344
3,549,414 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,116 ready_for_fw is high
1,060,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,528 >>> mbox cmd response: success
2,690,152 UART:
2,690,168 UART: Running Caliptra FMC ...
2,690,576 UART:
2,690,719 UART: [state] CFI Enabled
2,701,126 UART: [fht] FMC Alias Private Key: 7
2,808,765 UART: [art] Extend RT PCRs Done
2,809,193 UART: [art] Lock RT PCRs Done
2,810,763 UART: [art] Populate DV Done
2,818,934 UART: [fht] FMC Alias Private Key: 7
2,819,968 UART: [art] Derive CDI
2,820,248 UART: [art] Store in in slot 0x4
2,905,735 UART: [art] Derive Key Pair
2,906,095 UART: [art] Store priv key in slot 0x5
2,919,501 UART: [art] Derive Key Pair - Done
2,934,111 UART: [art] Signing Cert with AUTHO
2,934,591 UART: RITY.KEYID = 7
2,950,043 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,808 UART: [art] PUB.X = A714E93EC216583094A81F06A26B8AE59D3A14C6436ECDC3DBEC014B4DF1CBADAC1F15A3A3A5762F39E7BA549CF303B5
2,957,589 UART: [art] PUB.Y = C6F4C14BC492A02C4385592A2507FED18F029F37973880AEAAB632587601B6D9953A4489368A3AAF0C74B408D4C4CE1F
2,964,526 UART: [art] SIG.R = 420A73BD00CBC5896974A6E4DFB1C23B32E81D404BA1926F8C8704070BE02F74D4ABB45A86AD8A7F080E4D38995B611F
2,971,264 UART: [art] SIG.S = 2AACE08F4C6FB9C58E46E566BBE3142073C3C479C7EC05B4B708FDF7E324BB862E110EE61470D49970E4A3FF0BCA2DCF
2,994,599 UART: Caliptra RT
2,994,944 UART: [state] CFI Enabled
3,103,407 UART: [rt] RT listening for mailbox commands...
3,104,077 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,941 UART: [rt]cmd =0x41544d4e, len=14344
3,371,676 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,495 UART: [kat] SHA2-256
901,435 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,210 UART: [kat] LMS
1,168,522 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,783 UART: [idev] ++
1,172,951 UART: [idev] CDI.KEYID = 6
1,173,312 UART: [idev] SUBJECT.KEYID = 7
1,173,737 UART: [idev] UDS.KEYID = 0
1,174,083 ready_for_fw is high
1,174,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,593 UART: [idev] Erasing UDS.KEYID = 0
1,198,701 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,936 UART: [ldev] ++
1,209,104 UART: [ldev] CDI.KEYID = 6
1,209,468 UART: [ldev] SUBJECT.KEYID = 5
1,209,895 UART: [ldev] AUTHORITY.KEYID = 7
1,210,358 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,242,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,320 UART: [ldev] --
1,281,784 UART: [fwproc] Wait for Commands...
1,282,431 UART: [fwproc] Recv command 0x46574c44
1,283,164 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,247 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,620 >>> mbox cmd response: success
2,776,875 UART: [afmc] ++
2,777,043 UART: [afmc] CDI.KEYID = 6
2,777,406 UART: [afmc] SUBJECT.KEYID = 7
2,777,832 UART: [afmc] AUTHORITY.KEYID = 5
2,813,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,980 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,592 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,311 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,196 UART: [afmc] --
2,857,228 UART: [cold-reset] --
2,857,990 UART: [state] Locking Datavault
2,859,211 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,815 UART: [state] Locking ICCM
2,860,245 UART: [exit] Launching FMC @ 0x40000130
2,865,574 UART:
2,865,590 UART: Running Caliptra FMC ...
2,865,998 UART:
2,866,052 UART: [state] CFI Enabled
2,876,487 UART: [fht] FMC Alias Private Key: 7
2,985,318 UART: [art] Extend RT PCRs Done
2,985,746 UART: [art] Lock RT PCRs Done
2,987,178 UART: [art] Populate DV Done
2,995,353 UART: [fht] FMC Alias Private Key: 7
2,996,491 UART: [art] Derive CDI
2,996,771 UART: [art] Store in in slot 0x4
3,082,088 UART: [art] Derive Key Pair
3,082,448 UART: [art] Store priv key in slot 0x5
3,095,576 UART: [art] Derive Key Pair - Done
3,110,521 UART: [art] Signing Cert with AUTHO
3,111,001 UART: RITY.KEYID = 7
3,126,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,982 UART: [art] PUB.X = 41578AF0172212A50254816E5BBBC4F5BD315C1C63BBCAD75564EC91B1BD565A5C8053D6ECFA0E9810417A1DED6EF0CF
3,133,762 UART: [art] PUB.Y = BF593DAC073562CC0B47F3D8435731DE512DD2FE467B149DCD5C9EF9B539AF6D8FEEBD8E114290F6EF6BF1280BE30FCA
3,140,724 UART: [art] SIG.R = 08D12EDB466F7DC1742E1BBEE31C66E0ADC6014CA688E03B9458F9A5542F67015AD55881DCBE8DCB23081307AB8A2921
3,147,489 UART: [art] SIG.S = F4CC2275352128F5908491A896B5AB774976D6FDE537C381DCAECCC90AED486A741F58FE5481D7CC90F340D1B0E4EE4B
3,171,495 UART: Caliptra RT
3,171,748 UART: [state] CFI Enabled
3,278,961 UART: [rt] RT listening for mailbox commands...
3,279,631 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,781 UART: [rt]cmd =0x41544d4e, len=14344
3,547,696 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,608 ready_for_fw is high
1,055,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,614 >>> mbox cmd response: success
2,685,268 UART:
2,685,284 UART: Running Caliptra FMC ...
2,685,692 UART:
2,685,746 UART: [state] CFI Enabled
2,696,355 UART: [fht] FMC Alias Private Key: 7
2,804,312 UART: [art] Extend RT PCRs Done
2,804,740 UART: [art] Lock RT PCRs Done
2,806,430 UART: [art] Populate DV Done
2,814,783 UART: [fht] FMC Alias Private Key: 7
2,815,957 UART: [art] Derive CDI
2,816,237 UART: [art] Store in in slot 0x4
2,902,024 UART: [art] Derive Key Pair
2,902,384 UART: [art] Store priv key in slot 0x5
2,915,120 UART: [art] Derive Key Pair - Done
2,930,174 UART: [art] Signing Cert with AUTHO
2,930,654 UART: RITY.KEYID = 7
2,945,662 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,427 UART: [art] PUB.X = 0C13AA9582E7D1BFEA3DE3B6A42399967AC6A2224E8862C45F673E6E9C7DE97230C67BF173BC45DA4235996DB09E90B5
2,953,202 UART: [art] PUB.Y = 67184DA8C15087D705964AF65FF34450673BF0C2FAD2835FFEF6CDB2163098D37E95EE57A760794E948B00F90A6032E0
2,960,124 UART: [art] SIG.R = 909993E3E2E5F9E22AD5B6BB964B9A54CD46EDE7A71698AAC23D72E6002BBC273DD18579CE73988B91CBB86965D61BD9
2,966,884 UART: [art] SIG.S = 8D414D36C80D0CD2C137DCDDF6921279198506BF40CA67986DB0B206A1DB3263E3B3C2E8DD939D37156B58723641556C
2,990,835 UART: Caliptra RT
2,991,088 UART: [state] CFI Enabled
3,097,950 UART: [rt] RT listening for mailbox commands...
3,098,620 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,722 UART: [rt]cmd =0x41544d4e, len=14344
3,366,645 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,451 UART: [kat] HMAC-384Kdf
920,989 UART: [kat] LMS
1,169,301 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,400 UART: [idev] ++
1,173,568 UART: [idev] CDI.KEYID = 6
1,173,929 UART: [idev] SUBJECT.KEYID = 7
1,174,354 UART: [idev] UDS.KEYID = 0
1,174,700 ready_for_fw is high
1,174,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,584 UART: [idev] Sha1 KeyId Algorithm
1,208,704 UART: [idev] --
1,209,849 UART: [ldev] ++
1,210,017 UART: [ldev] CDI.KEYID = 6
1,210,381 UART: [ldev] SUBJECT.KEYID = 5
1,210,808 UART: [ldev] AUTHORITY.KEYID = 7
1,211,271 UART: [ldev] FE.KEYID = 1
1,216,535 UART: [ldev] Erasing FE.KEYID = 1
1,242,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,299 UART: [ldev] --
1,281,617 UART: [fwproc] Wait for Commands...
1,282,296 UART: [fwproc] Recv command 0x46574c44
1,283,029 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,464 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,669 >>> mbox cmd response: success
2,776,804 UART: [afmc] ++
2,776,972 UART: [afmc] CDI.KEYID = 6
2,777,335 UART: [afmc] SUBJECT.KEYID = 7
2,777,761 UART: [afmc] AUTHORITY.KEYID = 5
2,812,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,281 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,010 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,893 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,612 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,305 UART: [afmc] --
2,856,255 UART: [cold-reset] --
2,857,035 UART: [state] Locking Datavault
2,858,112 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,716 UART: [state] Locking ICCM
2,859,390 UART: [exit] Launching FMC @ 0x40000130
2,864,719 UART:
2,864,735 UART: Running Caliptra FMC ...
2,865,143 UART:
2,865,286 UART: [state] CFI Enabled
2,876,351 UART: [fht] FMC Alias Private Key: 7
2,983,802 UART: [art] Extend RT PCRs Done
2,984,230 UART: [art] Lock RT PCRs Done
2,985,708 UART: [art] Populate DV Done
2,993,753 UART: [fht] FMC Alias Private Key: 7
2,994,825 UART: [art] Derive CDI
2,995,105 UART: [art] Store in in slot 0x4
3,081,140 UART: [art] Derive Key Pair
3,081,500 UART: [art] Store priv key in slot 0x5
3,095,256 UART: [art] Derive Key Pair - Done
3,110,238 UART: [art] Signing Cert with AUTHO
3,110,718 UART: RITY.KEYID = 7
3,125,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,487 UART: [art] PUB.X = 0FD156193F39677C8CBAEB238D5E6F0B52A0F815E957C7BBBCFE7E115ACEDFF931DFA2740E76C5306DD367C8A38F368D
3,133,268 UART: [art] PUB.Y = 0B9DE5CA7EE9D53C7DD9E1CBF9778D84CC8E37DF7E23181FE9AE06F5028421AAAAF4C3981138C63F26F24651C46058D6
3,140,223 UART: [art] SIG.R = E770D13082A04CEF93F9DBA266C59360852E2E5062037E3F127B83DBABB8A889767D855B77777DD55A269AA568CE40B4
3,146,992 UART: [art] SIG.S = CF93D7B952AEFA5E3C0E9A6B27CAD44EA5757E83164A172C34B984C5880577396E31F8A00EFDDB654ED730320B8DEF76
3,170,975 UART: Caliptra RT
3,171,320 UART: [state] CFI Enabled
3,278,942 UART: [rt] RT listening for mailbox commands...
3,279,612 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,584 UART: [rt]cmd =0x41544d4e, len=14344
3,547,421 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,927 ready_for_fw is high
1,056,927 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,117 >>> mbox cmd response: success
2,687,551 UART:
2,687,567 UART: Running Caliptra FMC ...
2,687,975 UART:
2,688,118 UART: [state] CFI Enabled
2,699,013 UART: [fht] FMC Alias Private Key: 7
2,807,444 UART: [art] Extend RT PCRs Done
2,807,872 UART: [art] Lock RT PCRs Done
2,809,410 UART: [art] Populate DV Done
2,817,793 UART: [fht] FMC Alias Private Key: 7
2,818,865 UART: [art] Derive CDI
2,819,145 UART: [art] Store in in slot 0x4
2,904,754 UART: [art] Derive Key Pair
2,905,114 UART: [art] Store priv key in slot 0x5
2,918,338 UART: [art] Derive Key Pair - Done
2,933,081 UART: [art] Signing Cert with AUTHO
2,933,561 UART: RITY.KEYID = 7
2,949,153 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,918 UART: [art] PUB.X = 3E7A37AF2DBA15570208F1BA05D04A9C65F379AD25C3A97D3F844629A7EA3C5343DD53DAB5A61D7AE77FCDA14893F11E
2,956,695 UART: [art] PUB.Y = 3AEA46D15379D72968C90F6727FB729E9F545A609E958BC449D187F9D3D2488E108F5F88DA65AAC23A6CBC44CDAAC1E7
2,963,654 UART: [art] SIG.R = 42DD08844E8A7ABB82AD0250316DAAF9804EF64FB43803BCB5E718C847549C12345D6C5D7D6DC78F41239B5957788C06
2,970,414 UART: [art] SIG.S = D1BC4E2EB0D7E533C38FF282930104F9A839D217EC783D15DCD46982AB33089E37E12511AC43E9A4DB88F52009699273
2,994,181 UART: Caliptra RT
2,994,526 UART: [state] CFI Enabled
3,102,151 UART: [rt] RT listening for mailbox commands...
3,102,821 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,949 UART: [rt]cmd =0x41544d4e, len=14344
3,370,810 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,075 UART:
192,440 UART: Running Caliptra ROM ...
193,588 UART:
193,736 UART: [state] CFI Enabled
265,973 UART: [state] LifecycleState = Unprovisioned
267,943 UART: [state] DebugLocked = No
269,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,731 UART: [kat] SHA2-256
443,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,970 UART: [kat] ++
454,502 UART: [kat] sha1
464,888 UART: [kat] SHA2-256
467,607 UART: [kat] SHA2-384
474,370 UART: [kat] SHA2-512-ACC
476,737 UART: [kat] ECC-384
2,768,181 UART: [kat] HMAC-384Kdf
2,801,224 UART: [kat] LMS
3,991,498 UART: [kat] --
3,995,305 UART: [cold-reset] ++
3,996,180 UART: [fht] Storing FHT @ 0x50003400
4,006,804 UART: [idev] ++
4,007,368 UART: [idev] CDI.KEYID = 6
4,008,280 UART: [idev] SUBJECT.KEYID = 7
4,009,533 UART: [idev] UDS.KEYID = 0
4,010,534 ready_for_fw is high
4,010,743 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,389 UART: [idev] Erasing UDS.KEYID = 0
7,348,396 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,433 UART: [idev] --
7,373,936 UART: [ldev] ++
7,374,504 UART: [ldev] CDI.KEYID = 6
7,375,443 UART: [ldev] SUBJECT.KEYID = 5
7,376,651 UART: [ldev] AUTHORITY.KEYID = 7
7,377,934 UART: [ldev] FE.KEYID = 1
7,425,237 UART: [ldev] Erasing FE.KEYID = 1
10,754,252 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,950 UART: [ldev] --
13,117,104 UART: [fwproc] Waiting for Commands...
13,119,797 UART: [fwproc] Received command 0x46574c44
13,121,981 UART: [fwproc] Received Image of size 114124 bytes
17,178,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,123 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,323,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,641,146 >>> mbox cmd response: success
17,645,175 UART: [afmc] ++
17,645,784 UART: [afmc] CDI.KEYID = 6
17,646,668 UART: [afmc] SUBJECT.KEYID = 7
17,647,940 UART: [afmc] AUTHORITY.KEYID = 5
21,008,983 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,010 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,229 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,678 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,478 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,926 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,129 UART: [afmc] --
23,379,262 UART: [cold-reset] --
23,383,717 UART: [state] Locking Datavault
23,389,990 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,750 UART: [state] Locking ICCM
23,393,038 UART: [exit] Launching FMC @ 0x40000130
23,401,412 UART:
23,401,666 UART: Running Caliptra FMC ...
23,402,693 UART:
23,402,837 UART: [state] CFI Enabled
23,466,217 UART: [fht] FMC Alias Private Key: 7
25,803,910 UART: [art] Extend RT PCRs Done
25,805,152 UART: [art] Lock RT PCRs Done
25,807,183 UART: [art] Populate DV Done
25,812,655 UART: [fht] FMC Alias Private Key: 7
25,814,189 UART: [art] Derive CDI
25,814,928 UART: [art] Store in in slot 0x4
25,874,670 UART: [art] Derive Key Pair
25,875,708 UART: [art] Store priv key in slot 0x5
29,168,141 UART: [art] Derive Key Pair - Done
29,181,033 UART: [art] Signing Cert with AUTHO
29,182,343 UART: RITY.KEYID = 7
31,469,417 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,928 UART: [art] PUB.X = F9D5BCE77105014554CB7ED20A9F07AC896DEF1E9CA713B7D8177F7BC0FF61ECA3D4CCADF9BDFAAC89CE1E7226C321E9
31,478,201 UART: [art] PUB.Y = C8EA2110174426BFB6B3BCFC0AB52F4748BAA4C7A72688FB4FE120B664DDB748A43FBF9649E1820A3FBBFF1A26EE3058
31,485,442 UART: [art] SIG.R = A7CB12C4517B48F08D69D4CCC1491CF1D84B881F1379860FADB8A71856BCE27EDC5ED49F64AD1290EF6D14AB09E5292A
31,492,888 UART: [art] SIG.S = DB1D9CB16BA511540DBDEA9F82E0358C012F15356C10D90F54474A37FD7D9741CE7B91BDAB673639D2C780D3A8A1560C
32,797,922 UART: Caliptra RT
32,798,655 UART: [state] CFI Enabled
32,958,736 UART: [rt] RT listening for mailbox commands...
32,960,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,991,387 UART: [rt]cmd =0x44504543, len=96
38,753,343 >>> mbox cmd response data (6236 bytes)
38,783,215 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,813,907 UART: [rt]cmd =0x53574545, len=84
44,400,600 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,805,459 ready_for_fw is high
3,805,853 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,870,799 >>> mbox cmd response: success
23,569,505 UART:
23,569,883 UART: Running Caliptra FMC ...
23,571,030 UART:
23,571,195 UART: [state] CFI Enabled
23,635,478 UART: [fht] FMC Alias Private Key: 7
25,973,431 UART: [art] Extend RT PCRs Done
25,974,664 UART: [art] Lock RT PCRs Done
25,976,616 UART: [art] Populate DV Done
25,982,261 UART: [fht] FMC Alias Private Key: 7
25,983,817 UART: [art] Derive CDI
25,984,590 UART: [art] Store in in slot 0x4
26,042,731 UART: [art] Derive Key Pair
26,043,744 UART: [art] Store priv key in slot 0x5
29,336,528 UART: [art] Derive Key Pair - Done
29,349,680 UART: [art] Signing Cert with AUTHO
29,351,037 UART: RITY.KEYID = 7
31,639,024 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,542 UART: [art] PUB.X = 5FF3DD70D61FB33EE5AE1C8C458DB5E8EBFC47638F520E35D0CAC970242A877DABC3F9B528B33546BD2D8C537A26E21E
31,647,767 UART: [art] PUB.Y = E5F0AE590DF68719901B7715F253D111C4E2EC2F8F32285B69A2D5B985D15D030A0DE89F59DA2EBB3DC68D2540D7DCF0
31,655,031 UART: [art] SIG.R = 5688D5F488307F4A3D6754CC778F96617A377B61DA056A43572BCFB7F122D0E9922B8E3E02C1A59A2F41470822E1823A
31,662,396 UART: [art] SIG.S = 99E5CD45D9C23FE431184F70D0D5AAB9F0E7BD4E5B5A9D9BF097D24A62C2B48A0EE71EF3DD04975DFA01757B43B9616B
32,967,874 UART: Caliptra RT
32,968,576 UART: [state] CFI Enabled
33,130,302 UART: [rt] RT listening for mailbox commands...
33,132,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,163,105 UART: [rt]cmd =0x44504543, len=96
38,926,582 >>> mbox cmd response data (6236 bytes)
38,956,468 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,987,000 UART: [rt]cmd =0x53574545, len=84
44,572,453 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,561 UART:
192,917 UART: Running Caliptra ROM ...
194,092 UART:
603,623 UART: [state] CFI Enabled
615,934 UART: [state] LifecycleState = Unprovisioned
617,871 UART: [state] DebugLocked = No
620,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,012 UART: [kat] SHA2-256
795,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,263 UART: [kat] ++
806,711 UART: [kat] sha1
818,426 UART: [kat] SHA2-256
821,144 UART: [kat] SHA2-384
826,562 UART: [kat] SHA2-512-ACC
828,925 UART: [kat] ECC-384
3,113,819 UART: [kat] HMAC-384Kdf
3,125,007 UART: [kat] LMS
4,315,128 UART: [kat] --
4,317,935 UART: [cold-reset] ++
4,319,708 UART: [fht] Storing FHT @ 0x50003400
4,330,838 UART: [idev] ++
4,331,395 UART: [idev] CDI.KEYID = 6
4,332,337 UART: [idev] SUBJECT.KEYID = 7
4,333,567 UART: [idev] UDS.KEYID = 0
4,334,537 ready_for_fw is high
4,334,750 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,913 UART: [idev] Erasing UDS.KEYID = 0
7,622,403 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,285 UART: [idev] --
7,648,302 UART: [ldev] ++
7,648,919 UART: [ldev] CDI.KEYID = 6
7,649,882 UART: [ldev] SUBJECT.KEYID = 5
7,651,086 UART: [ldev] AUTHORITY.KEYID = 7
7,652,313 UART: [ldev] FE.KEYID = 1
7,663,708 UART: [ldev] Erasing FE.KEYID = 1
10,957,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,810 UART: [ldev] --
13,318,001 UART: [fwproc] Waiting for Commands...
13,320,795 UART: [fwproc] Received command 0x46574c44
13,322,965 UART: [fwproc] Received Image of size 114124 bytes
17,378,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,460,385 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,529,276 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,846,252 >>> mbox cmd response: success
17,850,478 UART: [afmc] ++
17,851,072 UART: [afmc] CDI.KEYID = 6
17,851,958 UART: [afmc] SUBJECT.KEYID = 7
17,853,226 UART: [afmc] AUTHORITY.KEYID = 5
21,167,338 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,340 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,650 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,033 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,858 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,507,313 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,785 UART: [afmc] --
23,530,842 UART: [cold-reset] --
23,535,834 UART: [state] Locking Datavault
23,540,966 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,716 UART: [state] Locking ICCM
23,545,509 UART: [exit] Launching FMC @ 0x40000130
23,553,902 UART:
23,554,144 UART: Running Caliptra FMC ...
23,555,245 UART:
23,555,404 UART: [state] CFI Enabled
23,563,095 UART: [fht] FMC Alias Private Key: 7
25,894,082 UART: [art] Extend RT PCRs Done
25,895,305 UART: [art] Lock RT PCRs Done
25,897,139 UART: [art] Populate DV Done
25,902,658 UART: [fht] FMC Alias Private Key: 7
25,904,154 UART: [art] Derive CDI
25,904,915 UART: [art] Store in in slot 0x4
25,947,559 UART: [art] Derive Key Pair
25,948,594 UART: [art] Store priv key in slot 0x5
29,190,200 UART: [art] Derive Key Pair - Done
29,202,707 UART: [art] Signing Cert with AUTHO
29,204,040 UART: RITY.KEYID = 7
31,482,992 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,494 UART: [art] PUB.X = E398BA1CBF8C345299CB0FA7C5AE0A8F20E0B338E2EAE35C743C34198AC440D49EE4D8BCB72D1EB54C3F7B5A25A4C4FD
31,491,774 UART: [art] PUB.Y = E2272FA53C28059FAE51FFB78D5080C8C8B4C9E2411F039D6D2ECB85A06EBA4925AD3F78F9C0902DD2B4076803C0438E
31,498,992 UART: [art] SIG.R = 732B3C78C91AF1A48489AF270BE52D9AD27931768182B249603E03F62D1983BD2AA40DABFB2159476603BD304039E7D0
31,506,364 UART: [art] SIG.S = 01ACDE61EF1BA24726A74AA29EF00B5D1AADBD7B380198B73D42EFF781186A6364239C4CC8550CCC49F331A1A4CF9339
32,811,819 UART: Caliptra RT
32,812,529 UART: [state] CFI Enabled
32,929,483 UART: [rt] RT listening for mailbox commands...
32,931,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,962,085 UART: [rt]cmd =0x44504543, len=96
38,633,616 >>> mbox cmd response data (6236 bytes)
38,663,528 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,694,264 UART: [rt]cmd =0x53574545, len=84
44,218,085 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
4,126,015 ready_for_fw is high
4,126,783 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,862 >>> mbox cmd response: success
23,718,156 UART:
23,718,575 UART: Running Caliptra FMC ...
23,719,686 UART:
23,719,833 UART: [state] CFI Enabled
23,727,906 UART: [fht] FMC Alias Private Key: 7
26,058,419 UART: [art] Extend RT PCRs Done
26,059,650 UART: [art] Lock RT PCRs Done
26,061,627 UART: [art] Populate DV Done
26,066,937 UART: [fht] FMC Alias Private Key: 7
26,068,377 UART: [art] Derive CDI
26,069,111 UART: [art] Store in in slot 0x4
26,112,024 UART: [art] Derive Key Pair
26,113,018 UART: [art] Store priv key in slot 0x5
29,355,137 UART: [art] Derive Key Pair - Done
29,368,019 UART: [art] Signing Cert with AUTHO
29,369,329 UART: RITY.KEYID = 7
31,648,683 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,206 UART: [art] PUB.X = FBED81620C0A9CE908D7D0264CFA2D587CF0EFAD9F032DEE17BA037FEDB686E8ED36760111D9DAF4DFB1D8A0FA85E015
31,657,424 UART: [art] PUB.Y = 3E8E4643962B4ACD216C33D145DE8D23B42222B0A7A630E9460CF5CAF9051521650EF872D1360AB5E0269BD421D8F6D4
31,664,703 UART: [art] SIG.R = 409F4AD6B655C568D104D01F55827D80549B48960687E7C762B30BBEB0DEE8274DD3F47DBF5B07240F5ABD55DF1B629E
31,672,069 UART: [art] SIG.S = B71218A840B837086340C6D3A8D6C9735F9AAFAA97B61B01E59C76420C2B1C1E5C329B44FB008461605AC28A507BD5FE
32,977,231 UART: Caliptra RT
32,977,938 UART: [state] CFI Enabled
33,096,315 UART: [rt] RT listening for mailbox commands...
33,098,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,128,795 UART: [rt]cmd =0x44504543, len=96
38,801,268 >>> mbox cmd response data (6236 bytes)
38,830,918 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,861,594 UART: [rt]cmd =0x53574545, len=84
44,385,341 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,091 UART:
192,480 UART: Running Caliptra ROM ...
193,667 UART:
193,822 UART: [state] CFI Enabled
265,720 UART: [state] LifecycleState = Unprovisioned
267,639 UART: [state] DebugLocked = No
269,410 UART: [state] WD Timer not started. Device not locked for debugging
272,380 UART: [kat] SHA2-256
451,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,055 UART: [kat] ++
463,591 UART: [kat] sha1
474,762 UART: [kat] SHA2-256
477,766 UART: [kat] SHA2-384
484,677 UART: [kat] SHA2-512-ACC
487,614 UART: [kat] ECC-384
2,948,380 UART: [kat] HMAC-384Kdf
2,972,563 UART: [kat] LMS
3,502,026 UART: [kat] --
3,506,662 UART: [cold-reset] ++
3,508,379 UART: [fht] FHT @ 0x50003400
3,518,359 UART: [idev] ++
3,518,920 UART: [idev] CDI.KEYID = 6
3,519,849 UART: [idev] SUBJECT.KEYID = 7
3,521,023 UART: [idev] UDS.KEYID = 0
3,522,078 ready_for_fw is high
3,522,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,214 UART: [idev] Erasing UDS.KEYID = 0
6,025,526 UART: [idev] Sha1 KeyId Algorithm
6,049,372 UART: [idev] --
6,053,539 UART: [ldev] ++
6,054,106 UART: [ldev] CDI.KEYID = 6
6,055,023 UART: [ldev] SUBJECT.KEYID = 5
6,056,244 UART: [ldev] AUTHORITY.KEYID = 7
6,057,476 UART: [ldev] FE.KEYID = 1
6,100,219 UART: [ldev] Erasing FE.KEYID = 1
8,604,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,315 UART: [ldev] --
10,413,775 UART: [fwproc] Wait for Commands...
10,415,701 UART: [fwproc] Recv command 0x46574c44
10,417,753 UART: [fwproc] Recv'd Img size: 114448 bytes
13,822,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,376 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,287,746 >>> mbox cmd response: success
14,291,790 UART: [afmc] ++
14,292,384 UART: [afmc] CDI.KEYID = 6
14,293,297 UART: [afmc] SUBJECT.KEYID = 7
14,294,457 UART: [afmc] AUTHORITY.KEYID = 5
16,829,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,062 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,897 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,874 UART: [afmc] --
18,628,959 UART: [cold-reset] --
18,631,955 UART: [state] Locking Datavault
18,636,498 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,138 UART: [state] Locking ICCM
18,640,723 UART: [exit] Launching FMC @ 0x40000130
18,649,174 UART:
18,649,415 UART: Running Caliptra FMC ...
18,650,727 UART:
18,650,902 UART: [state] CFI Enabled
18,713,191 UART: [fht] FMC Alias Private Key: 7
20,477,802 UART: [art] Extend RT PCRs Done
20,479,045 UART: [art] Lock RT PCRs Done
20,480,758 UART: [art] Populate DV Done
20,486,334 UART: [fht] FMC Alias Private Key: 7
20,487,976 UART: [art] Derive CDI
20,488,715 UART: [art] Store in in slot 0x4
20,546,194 UART: [art] Derive Key Pair
20,547,231 UART: [art] Store priv key in slot 0x5
23,010,239 UART: [art] Derive Key Pair - Done
23,023,569 UART: [art] Signing Cert with AUTHO
23,024,874 UART: RITY.KEYID = 7
24,735,520 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,061 UART: [art] PUB.X = 0F91963FE6731361423332CF450F37E429C8FC703FE473FC891167C76BA59E9394E060559574EE8F16B0A3E11FEB518A
24,744,269 UART: [art] PUB.Y = 73F0FCA743EB528ACD6C854467D03A8DDCF1314E02826B9212C722AAE68B447C4F9E7A0E68BEC3058CCDFA01DB9BC34A
24,751,522 UART: [art] SIG.R = C162F6E1DDC61DD32EC6F85CF14E5B5191FF34B7D5E6EA82E5962F75521D81A0F61C306D259F054A815C0A4B7959F9CF
24,758,922 UART: [art] SIG.S = 7F6B1468B7B6949F023E74EC9E96BC2E91E5D12E281F927C5EEBB1C887E37D5365679F71DE876887D81F8DBA14A45E0D
25,738,120 UART: Caliptra RT
25,738,851 UART: [state] CFI Enabled
25,902,925 UART: [rt] RT listening for mailbox commands...
25,904,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,936,047 UART: [rt]cmd =0x44504543, len=96
30,293,902 >>> mbox cmd response data (6236 bytes)
30,323,515 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,354,348 UART: [rt]cmd =0x53574545, len=84
34,532,840 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,363,920 ready_for_fw is high
3,364,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,034,310 >>> mbox cmd response: success
18,323,358 UART:
18,323,762 UART: Running Caliptra FMC ...
18,324,961 UART:
18,325,130 UART: [state] CFI Enabled
18,389,678 UART: [fht] FMC Alias Private Key: 7
20,153,400 UART: [art] Extend RT PCRs Done
20,154,626 UART: [art] Lock RT PCRs Done
20,156,368 UART: [art] Populate DV Done
20,161,884 UART: [fht] FMC Alias Private Key: 7
20,163,536 UART: [art] Derive CDI
20,164,354 UART: [art] Store in in slot 0x4
20,222,217 UART: [art] Derive Key Pair
20,223,253 UART: [art] Store priv key in slot 0x5
22,685,681 UART: [art] Derive Key Pair - Done
22,698,413 UART: [art] Signing Cert with AUTHO
22,699,716 UART: RITY.KEYID = 7
24,411,236 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,745 UART: [art] PUB.X = 77FC18AC3EFC96CDFBAB9E8FCB8ABEA7934524864CF82B94296B3C213F8F13F5168D44C1B8AD8A740679A0850664A566
24,420,020 UART: [art] PUB.Y = 50ACE3A4F38893B6C7D6859A8D4E1174B18DF284961AAE09BD2C5D05784AC4302C28D00C6820464F977DF960E95B293C
24,427,245 UART: [art] SIG.R = F382E9DB9748A4F94E7BEAF5209DC00A9724FFEEDA8770D7B3C40F09C962888D0436ADE907D3AF9C6834122FC9933C23
24,434,645 UART: [art] SIG.S = A5B62D041A254D95ED15DBB3532AF34B0C79FF3C9E12DB43F3BD5E17BD7F5AAE6863AB4E6B27AC5C023D8738C7944822
25,413,602 UART: Caliptra RT
25,414,307 UART: [state] CFI Enabled
25,580,138 UART: [rt] RT listening for mailbox commands...
25,582,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,613,401 UART: [rt]cmd =0x44504543, len=96
29,991,676 >>> mbox cmd response data (6236 bytes)
30,021,685 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,052,583 UART: [rt]cmd =0x53574545, len=84
34,230,273 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,565 UART:
192,950 UART: Running Caliptra ROM ...
194,153 UART:
603,662 UART: [state] CFI Enabled
617,464 UART: [state] LifecycleState = Unprovisioned
619,362 UART: [state] DebugLocked = No
622,045 UART: [state] WD Timer not started. Device not locked for debugging
625,580 UART: [kat] SHA2-256
804,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,259 UART: [kat] ++
816,785 UART: [kat] sha1
827,660 UART: [kat] SHA2-256
830,663 UART: [kat] SHA2-384
835,437 UART: [kat] SHA2-512-ACC
838,367 UART: [kat] ECC-384
3,279,245 UART: [kat] HMAC-384Kdf
3,291,190 UART: [kat] LMS
3,820,700 UART: [kat] --
3,824,394 UART: [cold-reset] ++
3,826,390 UART: [fht] FHT @ 0x50003400
3,836,814 UART: [idev] ++
3,837,417 UART: [idev] CDI.KEYID = 6
3,838,352 UART: [idev] SUBJECT.KEYID = 7
3,839,455 UART: [idev] UDS.KEYID = 0
3,840,506 ready_for_fw is high
3,840,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,350 UART: [idev] Erasing UDS.KEYID = 0
6,310,332 UART: [idev] Sha1 KeyId Algorithm
6,333,668 UART: [idev] --
6,337,686 UART: [ldev] ++
6,338,255 UART: [ldev] CDI.KEYID = 6
6,339,211 UART: [ldev] SUBJECT.KEYID = 5
6,340,363 UART: [ldev] AUTHORITY.KEYID = 7
6,341,643 UART: [ldev] FE.KEYID = 1
6,353,521 UART: [ldev] Erasing FE.KEYID = 1
8,831,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,691 UART: [ldev] --
10,623,006 UART: [fwproc] Wait for Commands...
10,625,477 UART: [fwproc] Recv command 0x46574c44
10,627,561 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,715 >>> mbox cmd response: success
14,497,106 UART: [afmc] ++
14,497,705 UART: [afmc] CDI.KEYID = 6
14,498,611 UART: [afmc] SUBJECT.KEYID = 7
14,499,764 UART: [afmc] AUTHORITY.KEYID = 5
17,002,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,211 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,001 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,018 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,845 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,837 UART: [afmc] --
18,798,766 UART: [cold-reset] --
18,803,007 UART: [state] Locking Datavault
18,809,335 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,029 UART: [state] Locking ICCM
18,813,769 UART: [exit] Launching FMC @ 0x40000130
18,822,160 UART:
18,822,397 UART: Running Caliptra FMC ...
18,823,490 UART:
18,823,644 UART: [state] CFI Enabled
18,832,008 UART: [fht] FMC Alias Private Key: 7
20,589,712 UART: [art] Extend RT PCRs Done
20,590,948 UART: [art] Lock RT PCRs Done
20,592,917 UART: [art] Populate DV Done
20,598,482 UART: [fht] FMC Alias Private Key: 7
20,600,027 UART: [art] Derive CDI
20,600,758 UART: [art] Store in in slot 0x4
20,643,236 UART: [art] Derive Key Pair
20,644,269 UART: [art] Store priv key in slot 0x5
23,070,734 UART: [art] Derive Key Pair - Done
23,083,731 UART: [art] Signing Cert with AUTHO
23,085,038 UART: RITY.KEYID = 7
24,790,900 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,374 UART: [art] PUB.X = CBE7727CAE9A600230734E5FAB84AE27855CF19264A337DF13FCA80B51E77CCC473D0B5D03D1D23109DF8ABFE8175D21
24,799,715 UART: [art] PUB.Y = 9ACE10C6D38122075EF0F2E5563789F74656E9E1410956DBBFB9AA2C8A6DC9EBBF21B64412E4759FA075CE58DD7D807F
24,806,936 UART: [art] SIG.R = 8BD3E01B3EB0E448FB903009DEEDBE81EB0172ACB3DDAE1D28A55406BBB8C2F1DA8F7EF1EEE9FBA1AA938DADF842F5F0
24,814,403 UART: [art] SIG.S = 928FF1237BAFA8C53D44F64DC2347DFA79F5DBE3D875C1F0477FC962DB65E7CD899D2DAB934BC9552B009FC1ABC4F914
25,793,153 UART: Caliptra RT
25,793,880 UART: [state] CFI Enabled
25,911,528 UART: [rt] RT listening for mailbox commands...
25,913,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,943,909 UART: [rt]cmd =0x44504543, len=96
30,226,892 >>> mbox cmd response data (6236 bytes)
30,256,765 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,287,331 UART: [rt]cmd =0x53574545, len=84
34,422,753 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,693,538 ready_for_fw is high
3,694,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,010 >>> mbox cmd response: success
18,514,015 UART:
18,514,418 UART: Running Caliptra FMC ...
18,515,613 UART:
18,515,781 UART: [state] CFI Enabled
18,523,520 UART: [fht] FMC Alias Private Key: 7
20,280,304 UART: [art] Extend RT PCRs Done
20,281,529 UART: [art] Lock RT PCRs Done
20,283,383 UART: [art] Populate DV Done
20,288,734 UART: [fht] FMC Alias Private Key: 7
20,290,272 UART: [art] Derive CDI
20,291,030 UART: [art] Store in in slot 0x4
20,333,294 UART: [art] Derive Key Pair
20,334,281 UART: [art] Store priv key in slot 0x5
22,761,006 UART: [art] Derive Key Pair - Done
22,773,542 UART: [art] Signing Cert with AUTHO
22,774,844 UART: RITY.KEYID = 7
24,480,255 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,758 UART: [art] PUB.X = 89D8363C74829C5630CA1D3022066E999D5C2959511A072537BE0CBA5C2B65A9EAE6165ACFA1E9AECC66B466777C2C85
24,489,056 UART: [art] PUB.Y = 69518198CC0FC762A8E00CF2AF4A554737CD4A3F324882604FBAD9CAD1C17CBE330AD82B9B87DD0930B9D055A67E2F3D
24,496,303 UART: [art] SIG.R = DCDA86D8F759A0749953D02E6632F851A727AFDEC59CFC0FC9D77FCD55E7BB4D08F1DBD7A41EDB7FE4372271B10C7DB5
24,503,735 UART: [art] SIG.S = 6AC650E40D819BF623E5FA5E8A78E1B184846A7A626A0DB879853E757AF1AF0D389EC614D0932F91F87B5D928DF41B54
25,482,140 UART: Caliptra RT
25,482,840 UART: [state] CFI Enabled
25,600,169 UART: [rt] RT listening for mailbox commands...
25,602,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,632,905 UART: [rt]cmd =0x44504543, len=96
29,916,435 >>> mbox cmd response data (6236 bytes)
29,946,315 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,976,849 UART: [rt]cmd =0x53574545, len=84
34,112,175 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,438,095 ready_for_fw is high
3,438,513 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,743,039 >>> mbox cmd response: success
19,026,496 UART:
19,026,895 UART: Running Caliptra FMC ...
19,028,091 UART:
19,028,270 UART: [state] CFI Enabled
19,094,705 UART: [fht] FMC Alias Private Key: 7
20,858,125 UART: [art] Extend RT PCRs Done
20,859,354 UART: [art] Lock RT PCRs Done
20,860,709 UART: [art] Populate DV Done
20,866,342 UART: [fht] FMC Alias Private Key: 7
20,868,053 UART: [art] Derive CDI
20,868,879 UART: [art] Store in in slot 0x4
20,927,702 UART: [art] Derive Key Pair
20,928,745 UART: [art] Store priv key in slot 0x5
23,391,970 UART: [art] Derive Key Pair - Done
23,404,970 UART: [art] Signing Cert with AUTHO
23,406,308 UART: RITY.KEYID = 7
25,118,391 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,913 UART: [art] PUB.X = DFFA7342B52F403A935473418617ED6F21FAB52DE0BF2B264C9B865DE846B66189DA4BC2C2C99A3F35E15352F3B483F8
25,127,158 UART: [art] PUB.Y = 5FE88A2306F976CC859BCF97C60B1A30F791E5FB462447DD8B7D5D3F96115CF250388A49669581D1E0E6E9DD894C1220
25,134,413 UART: [art] SIG.R = D34719B7E8B2E77FBBD1F32D5F13E553FAA1751107DE700394A3487B6C82EFA672739447AAEC44A20D993E2618FDF9AE
25,141,802 UART: [art] SIG.S = 9F6F95AECD5674161E54E8BC930DB8F775D75D79CF45AE2F57DBA068760D04D66A1187C8ADC95AF8D21F446797B37893
26,121,165 UART: Caliptra RT
26,121,875 UART: [state] CFI Enabled
26,286,348 UART: [rt] RT listening for mailbox commands...
26,288,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,319,499 UART: [rt]cmd =0x44504543, len=96
30,678,511 >>> mbox cmd response data (6236 bytes)
30,708,146 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,738,597 UART: [rt]cmd =0x53574545, len=84
34,916,086 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,171 writing to cptra_bootfsm_go
3,755,842 ready_for_fw is high
3,756,233 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,955,090 >>> mbox cmd response: success
19,209,096 UART:
19,209,485 UART: Running Caliptra FMC ...
19,210,601 UART:
19,210,755 UART: [state] CFI Enabled
19,218,861 UART: [fht] FMC Alias Private Key: 7
20,975,182 UART: [art] Extend RT PCRs Done
20,976,386 UART: [art] Lock RT PCRs Done
20,978,326 UART: [art] Populate DV Done
20,983,749 UART: [fht] FMC Alias Private Key: 7
20,985,255 UART: [art] Derive CDI
20,986,012 UART: [art] Store in in slot 0x4
21,028,551 UART: [art] Derive Key Pair
21,029,547 UART: [art] Store priv key in slot 0x5
23,455,514 UART: [art] Derive Key Pair - Done
23,468,629 UART: [art] Signing Cert with AUTHO
23,469,933 UART: RITY.KEYID = 7
25,176,013 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,529 UART: [art] PUB.X = 1D14FFA381053A09A4ECCA4F4E7E022053D3FF929CD0FDDED789C47D24BB496034627DA6140E7AF01DBD8DE5E0B61962
25,184,804 UART: [art] PUB.Y = 5B21EAF763FCA296F0F82B6DEDDA293704513CCF5583E5387A4E1738B82CF3CC23F7AC2ADC40C5A578FEC382D9375DD1
25,192,081 UART: [art] SIG.R = 067B7110C650D582203FA0A7E237DD1D6FF86DC76C53DFD7067FA4CF64471ED9571DAAA392F979571994B13816EDF52B
25,199,455 UART: [art] SIG.S = 7FA034984F14FF4E7D3A635F91852E0C31E8DB549275F2E3924C73CE1475ADB0886F6F111FD7928ECC1A33EC243A6A58
26,178,400 UART: Caliptra RT
26,179,107 UART: [state] CFI Enabled
26,296,762 UART: [rt] RT listening for mailbox commands...
26,298,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,329,206 UART: [rt]cmd =0x44504543, len=96
30,612,664 >>> mbox cmd response data (6236 bytes)
30,642,254 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,672,836 UART: [rt]cmd =0x53574545, len=84
34,807,981 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,723 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,245 UART: [kat] SHA2-256
882,176 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,291 UART: [kat] ++
886,443 UART: [kat] sha1
890,791 UART: [kat] SHA2-256
892,729 UART: [kat] SHA2-384
895,552 UART: [kat] SHA2-512-ACC
897,453 UART: [kat] ECC-384
903,050 UART: [kat] HMAC-384Kdf
907,480 UART: [kat] LMS
1,475,676 UART: [kat] --
1,476,799 UART: [cold-reset] ++
1,477,209 UART: [fht] Storing FHT @ 0x50003400
1,479,956 UART: [idev] ++
1,480,124 UART: [idev] CDI.KEYID = 6
1,480,484 UART: [idev] SUBJECT.KEYID = 7
1,480,908 UART: [idev] UDS.KEYID = 0
1,481,253 ready_for_fw is high
1,481,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,632 UART: [idev] Erasing UDS.KEYID = 0
1,505,310 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,134 UART: [idev] --
1,515,097 UART: [ldev] ++
1,515,265 UART: [ldev] CDI.KEYID = 6
1,515,628 UART: [ldev] SUBJECT.KEYID = 5
1,516,054 UART: [ldev] AUTHORITY.KEYID = 7
1,516,517 UART: [ldev] FE.KEYID = 1
1,521,545 UART: [ldev] Erasing FE.KEYID = 1
1,547,106 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,318 UART: [ldev] --
1,586,623 UART: [fwproc] Waiting for Commands...
1,587,290 UART: [fwproc] Received command 0x46574c44
1,588,081 UART: [fwproc] Received Image of size 114448 bytes
2,887,032 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,672 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,081 >>> mbox cmd response: success
3,080,201 UART: [afmc] ++
3,080,369 UART: [afmc] CDI.KEYID = 6
3,080,731 UART: [afmc] SUBJECT.KEYID = 7
3,081,156 UART: [afmc] AUTHORITY.KEYID = 5
3,116,451 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,493 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,273 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,001 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,886 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,576 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,459 UART: [afmc] --
3,159,439 UART: [cold-reset] --
3,160,067 UART: [state] Locking Datavault
3,161,108 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,712 UART: [state] Locking ICCM
3,162,288 UART: [exit] Launching FMC @ 0x40000130
3,167,617 UART:
3,167,633 UART: Running Caliptra FMC ...
3,168,041 UART:
3,168,095 UART: [state] CFI Enabled
3,178,694 UART: [fht] FMC Alias Private Key: 7
3,286,855 UART: [art] Extend RT PCRs Done
3,287,283 UART: [art] Lock RT PCRs Done
3,288,601 UART: [art] Populate DV Done
3,296,886 UART: [fht] FMC Alias Private Key: 7
3,297,968 UART: [art] Derive CDI
3,298,248 UART: [art] Store in in slot 0x4
3,383,823 UART: [art] Derive Key Pair
3,384,183 UART: [art] Store priv key in slot 0x5
3,397,063 UART: [art] Derive Key Pair - Done
3,412,268 UART: [art] Signing Cert with AUTHO
3,412,748 UART: RITY.KEYID = 7
3,428,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,931 UART: [art] PUB.X = 80356EFDCB20328B2E43591A4DF156129E2BB09899E312F5747355F54A88F98D8C6490C9346CE041F6456D3FDDBBFA64
3,435,703 UART: [art] PUB.Y = 5F5064F2C1331D0399564214F3233E193B2754339A7561576FAE47FC384B2F531716FEB22405D73FDD552369225B0658
3,442,628 UART: [art] SIG.R = 1D934F33D62A2C9E8903BBF134EB3C1FB27F5226876ACADBB89B54A25BACACC5087A7A25DB2A0EA1A94EFAFB7FC7F9EE
3,449,421 UART: [art] SIG.S = 2FD3DCA13451A1E1AA729DB04908944124688F9F95C2F76A5211742CB26B974BC8875409F50EEB5690AB7E50F26AE53E
3,473,621 UART: Caliptra RT
3,473,874 UART: [state] CFI Enabled
3,581,970 UART: [rt] RT listening for mailbox commands...
3,582,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,234 UART: [rt]cmd =0x44504543, len=96
3,793,801 >>> mbox cmd response data (6236 bytes)
3,793,802 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,913 UART: [rt]cmd =0x53574545, len=84
3,848,871 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,439 ready_for_fw is high
1,362,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,995 >>> mbox cmd response: success
2,991,647 UART:
2,991,663 UART: Running Caliptra FMC ...
2,992,071 UART:
2,992,125 UART: [state] CFI Enabled
3,002,574 UART: [fht] FMC Alias Private Key: 7
3,110,635 UART: [art] Extend RT PCRs Done
3,111,063 UART: [art] Lock RT PCRs Done
3,112,583 UART: [art] Populate DV Done
3,120,610 UART: [fht] FMC Alias Private Key: 7
3,121,782 UART: [art] Derive CDI
3,122,062 UART: [art] Store in in slot 0x4
3,207,787 UART: [art] Derive Key Pair
3,208,147 UART: [art] Store priv key in slot 0x5
3,220,755 UART: [art] Derive Key Pair - Done
3,235,156 UART: [art] Signing Cert with AUTHO
3,235,636 UART: RITY.KEYID = 7
3,251,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,925 UART: [art] PUB.X = D6B99EB32E8CB5320BA5B9C2FADFB16176458D17C0E69FFB1637EAE850D723FC3805AD381F03EB85B66351656844AE05
3,258,693 UART: [art] PUB.Y = FDEF91BFA4B51C99CAD0766F623ABA349C41ED4F6AD739507A23E3A51AC6E0E5B2644AE79CCF22C38C488205872454A7
3,265,654 UART: [art] SIG.R = B276AD37C6945C9F815671609C888BA3ED38BE2BA64FF7F80387C9FB5833842D6EC1FE116F4E1E68F6146DE1DD72B4B2
3,272,431 UART: [art] SIG.S = F975795F8A7D037CF84F87B96DC214B8DF6219A8512BF55EC0ED902ACAD3292700C242D11FAF5294176626D780DB407A
3,296,171 UART: Caliptra RT
3,296,424 UART: [state] CFI Enabled
3,404,662 UART: [rt] RT listening for mailbox commands...
3,405,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,746 UART: [rt]cmd =0x44504543, len=96
3,615,573 >>> mbox cmd response data (6236 bytes)
3,615,574 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,403 UART: [rt]cmd =0x53574545, len=84
3,671,537 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,504 UART: [kat] SHA2-256
882,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,550 UART: [kat] ++
886,702 UART: [kat] sha1
890,926 UART: [kat] SHA2-256
892,864 UART: [kat] SHA2-384
895,767 UART: [kat] SHA2-512-ACC
897,668 UART: [kat] ECC-384
903,461 UART: [kat] HMAC-384Kdf
908,041 UART: [kat] LMS
1,476,237 UART: [kat] --
1,477,174 UART: [cold-reset] ++
1,477,572 UART: [fht] Storing FHT @ 0x50003400
1,480,369 UART: [idev] ++
1,480,537 UART: [idev] CDI.KEYID = 6
1,480,897 UART: [idev] SUBJECT.KEYID = 7
1,481,321 UART: [idev] UDS.KEYID = 0
1,481,666 ready_for_fw is high
1,481,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,667 UART: [idev] Erasing UDS.KEYID = 0
1,505,601 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,055 UART: [idev] --
1,515,308 UART: [ldev] ++
1,515,476 UART: [ldev] CDI.KEYID = 6
1,515,839 UART: [ldev] SUBJECT.KEYID = 5
1,516,265 UART: [ldev] AUTHORITY.KEYID = 7
1,516,728 UART: [ldev] FE.KEYID = 1
1,521,904 UART: [ldev] Erasing FE.KEYID = 1
1,547,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,623 UART: [ldev] --
1,587,110 UART: [fwproc] Waiting for Commands...
1,587,807 UART: [fwproc] Received command 0x46574c44
1,588,598 UART: [fwproc] Received Image of size 114448 bytes
2,887,643 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,549 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,922 >>> mbox cmd response: success
3,081,112 UART: [afmc] ++
3,081,280 UART: [afmc] CDI.KEYID = 6
3,081,642 UART: [afmc] SUBJECT.KEYID = 7
3,082,067 UART: [afmc] AUTHORITY.KEYID = 5
3,116,986 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,236 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,016 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,744 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,629 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,319 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,336 UART: [afmc] --
3,160,232 UART: [cold-reset] --
3,160,894 UART: [state] Locking Datavault
3,162,109 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,713 UART: [state] Locking ICCM
3,163,193 UART: [exit] Launching FMC @ 0x40000130
3,168,522 UART:
3,168,538 UART: Running Caliptra FMC ...
3,168,946 UART:
3,169,089 UART: [state] CFI Enabled
3,179,784 UART: [fht] FMC Alias Private Key: 7
3,288,757 UART: [art] Extend RT PCRs Done
3,289,185 UART: [art] Lock RT PCRs Done
3,290,643 UART: [art] Populate DV Done
3,298,900 UART: [fht] FMC Alias Private Key: 7
3,299,858 UART: [art] Derive CDI
3,300,138 UART: [art] Store in in slot 0x4
3,385,625 UART: [art] Derive Key Pair
3,385,985 UART: [art] Store priv key in slot 0x5
3,399,017 UART: [art] Derive Key Pair - Done
3,413,491 UART: [art] Signing Cert with AUTHO
3,413,971 UART: RITY.KEYID = 7
3,429,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,844 UART: [art] PUB.X = C14E2EB1750A2B7839CF5E6B632F84E23842E90DC35F6690968E96839B0D57701A56C9CC0F22B83CCAB957BC86D778D4
3,436,606 UART: [art] PUB.Y = C369184C4F7497B784549E1E6D40F89EC2C059872BED91048FC567762FF14FC86517A23A1EC3D7B7F3BCA81970BF7436
3,443,555 UART: [art] SIG.R = DF4813BD16A39A4F00F03C18303DAFFBB0A1DC6B398839CE5287A77BB2671C90F2582AD51AFDDDA2A70DC4FE052848A5
3,450,315 UART: [art] SIG.S = 84E5307C94D9A55730DD68CE3201B9EFB434F62F9A29DA551E420B72C5918798551C87CFBB951327D976502524627292
3,473,772 UART: Caliptra RT
3,474,117 UART: [state] CFI Enabled
3,583,631 UART: [rt] RT listening for mailbox commands...
3,584,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,773 UART: [rt]cmd =0x44504543, len=96
3,795,546 >>> mbox cmd response data (6236 bytes)
3,795,547 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,664 UART: [rt]cmd =0x53574545, len=84
3,852,048 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,304 ready_for_fw is high
1,363,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,606 >>> mbox cmd response: success
2,993,574 UART:
2,993,590 UART: Running Caliptra FMC ...
2,993,998 UART:
2,994,141 UART: [state] CFI Enabled
3,004,920 UART: [fht] FMC Alias Private Key: 7
3,113,289 UART: [art] Extend RT PCRs Done
3,113,717 UART: [art] Lock RT PCRs Done
3,115,295 UART: [art] Populate DV Done
3,123,574 UART: [fht] FMC Alias Private Key: 7
3,124,608 UART: [art] Derive CDI
3,124,888 UART: [art] Store in in slot 0x4
3,210,609 UART: [art] Derive Key Pair
3,210,969 UART: [art] Store priv key in slot 0x5
3,224,361 UART: [art] Derive Key Pair - Done
3,239,072 UART: [art] Signing Cert with AUTHO
3,239,552 UART: RITY.KEYID = 7
3,255,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,923 UART: [art] PUB.X = 307152A9B572B0A040F66926504D1E46D8EBBBD3655920607AE8CC74A4858D76919307D58AFD28897FF489A5242CB54F
3,262,686 UART: [art] PUB.Y = B937543F6AFD597A6D3F1E8AE510FA6C547243778971D53FB4A8ED1D3F056CB7C3FF80ED7BA58115AE11F287C03AF4C5
3,269,647 UART: [art] SIG.R = FAC4DF5E2EF961B413ED194D27FB90612F47CC6A0807D801BE1EF4488383710B497C6EF789E770F149AE9226324C3AF0
3,276,411 UART: [art] SIG.S = 3B0182B4672FBB691E663CF13EBFFC12B97B845813CA57535776E15E4EC909196A7F0566B8437637B3CAD389AA70FF16
3,300,069 UART: Caliptra RT
3,300,414 UART: [state] CFI Enabled
3,408,645 UART: [rt] RT listening for mailbox commands...
3,409,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,685 UART: [rt]cmd =0x44504543, len=96
3,620,490 >>> mbox cmd response data (6236 bytes)
3,620,491 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,294 UART: [rt]cmd =0x53574545, len=84
3,675,436 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
893,546 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,671 UART: [kat] ++
897,823 UART: [kat] sha1
902,201 UART: [kat] SHA2-256
904,141 UART: [kat] SHA2-384
906,888 UART: [kat] SHA2-512-ACC
908,789 UART: [kat] ECC-384
918,526 UART: [kat] HMAC-384Kdf
923,090 UART: [kat] LMS
1,171,418 UART: [kat] --
1,172,287 UART: [cold-reset] ++
1,172,733 UART: [fht] FHT @ 0x50003400
1,175,482 UART: [idev] ++
1,175,650 UART: [idev] CDI.KEYID = 6
1,176,010 UART: [idev] SUBJECT.KEYID = 7
1,176,434 UART: [idev] UDS.KEYID = 0
1,176,779 ready_for_fw is high
1,176,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,694 UART: [idev] Erasing UDS.KEYID = 0
1,201,543 UART: [idev] Sha1 KeyId Algorithm
1,209,865 UART: [idev] --
1,210,989 UART: [ldev] ++
1,211,157 UART: [ldev] CDI.KEYID = 6
1,211,520 UART: [ldev] SUBJECT.KEYID = 5
1,211,946 UART: [ldev] AUTHORITY.KEYID = 7
1,212,409 UART: [ldev] FE.KEYID = 1
1,217,649 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,217 UART: [ldev] --
1,282,562 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,886 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,882 >>> mbox cmd response: success
2,778,128 UART: [afmc] ++
2,778,296 UART: [afmc] CDI.KEYID = 6
2,778,658 UART: [afmc] SUBJECT.KEYID = 7
2,779,083 UART: [afmc] AUTHORITY.KEYID = 5
2,814,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,167 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,528 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,247 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,175 UART: [afmc] --
2,858,213 UART: [cold-reset] --
2,859,147 UART: [state] Locking Datavault
2,860,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,936 UART: [state] Locking ICCM
2,861,594 UART: [exit] Launching FMC @ 0x40000130
2,866,923 UART:
2,866,939 UART: Running Caliptra FMC ...
2,867,347 UART:
2,867,401 UART: [state] CFI Enabled
2,878,016 UART: [fht] FMC Alias Private Key: 7
2,986,033 UART: [art] Extend RT PCRs Done
2,986,461 UART: [art] Lock RT PCRs Done
2,987,853 UART: [art] Populate DV Done
2,996,206 UART: [fht] FMC Alias Private Key: 7
2,997,292 UART: [art] Derive CDI
2,997,572 UART: [art] Store in in slot 0x4
3,083,015 UART: [art] Derive Key Pair
3,083,375 UART: [art] Store priv key in slot 0x5
3,095,797 UART: [art] Derive Key Pair - Done
3,110,472 UART: [art] Signing Cert with AUTHO
3,110,952 UART: RITY.KEYID = 7
3,126,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,863 UART: [art] PUB.X = DBABCF0F33BD283248D9DBBD5070FD30228062D4FD4A7F51847A83DAE8245FCEE13A4CB3640697248665E8BBF4B4969E
3,133,641 UART: [art] PUB.Y = 0FEC42B212C3AE19A28211A1A525D3E703D6568B4270A519D4C76F79925D7FC24E973341BB9192B9C73F4CB23CA5AFE9
3,140,591 UART: [art] SIG.R = E68DD813762D07C0F98FDF7410DF81C70550C57398F07A44FDC6630D655D42CF5598B002A024E0A88135543B385F4098
3,147,343 UART: [art] SIG.S = 6D3C2FA79EC36AA5B72722AE85616DEAAE0EEA21C833763DF3158FA153CE6682782DF080909CF5318EB36E9E734B4E2F
3,171,423 UART: Caliptra RT
3,171,676 UART: [state] CFI Enabled
3,279,143 UART: [rt] RT listening for mailbox commands...
3,279,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,123 UART: [rt]cmd =0x44504543, len=96
3,490,358 >>> mbox cmd response data (6236 bytes)
3,490,359 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,032 UART: [rt]cmd =0x53574545, len=84
3,545,578 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,185 ready_for_fw is high
1,060,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,793 >>> mbox cmd response: success
2,690,231 UART:
2,690,247 UART: Running Caliptra FMC ...
2,690,655 UART:
2,690,709 UART: [state] CFI Enabled
2,701,382 UART: [fht] FMC Alias Private Key: 7
2,808,949 UART: [art] Extend RT PCRs Done
2,809,377 UART: [art] Lock RT PCRs Done
2,810,591 UART: [art] Populate DV Done
2,819,026 UART: [fht] FMC Alias Private Key: 7
2,820,012 UART: [art] Derive CDI
2,820,292 UART: [art] Store in in slot 0x4
2,906,153 UART: [art] Derive Key Pair
2,906,513 UART: [art] Store priv key in slot 0x5
2,919,629 UART: [art] Derive Key Pair - Done
2,934,457 UART: [art] Signing Cert with AUTHO
2,934,937 UART: RITY.KEYID = 7
2,949,961 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,726 UART: [art] PUB.X = 11D327B5C3A6C1392E5FB79FA94916D4B2B9DE5A2F2875FC3D281080A6BCAD8A3AAF0201AD9E8F232A70294516AD8DC3
2,957,504 UART: [art] PUB.Y = 417297B3476D45562FA7941AB31FBB78478C3EB7F29C26E0EC94ACB9542A7447CCA6B3BB61E89033A23A477CAB3AB4A1
2,964,464 UART: [art] SIG.R = 076FD54834F3FE7C2EF81AE1EC572418C69CE2422823CB2AA052505372FAADFD9FBCCB7098876AE2448F08FAF2DFBBD7
2,971,248 UART: [art] SIG.S = 711E64EEFF6E0EC7683EDF966EC169956993C27445EECECD917015984534012DDE961241B84AF2B5B6B7D4D7FE21E1AF
2,994,839 UART: Caliptra RT
2,995,092 UART: [state] CFI Enabled
3,102,267 UART: [rt] RT listening for mailbox commands...
3,102,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,139 UART: [rt]cmd =0x44504543, len=96
3,312,998 >>> mbox cmd response data (6236 bytes)
3,312,999 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,734 UART: [rt]cmd =0x53574545, len=84
3,367,422 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
893,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,514 UART: [kat] ++
897,666 UART: [kat] sha1
901,820 UART: [kat] SHA2-256
903,760 UART: [kat] SHA2-384
906,567 UART: [kat] SHA2-512-ACC
908,468 UART: [kat] ECC-384
917,971 UART: [kat] HMAC-384Kdf
922,607 UART: [kat] LMS
1,170,935 UART: [kat] --
1,172,072 UART: [cold-reset] ++
1,172,438 UART: [fht] FHT @ 0x50003400
1,175,091 UART: [idev] ++
1,175,259 UART: [idev] CDI.KEYID = 6
1,175,619 UART: [idev] SUBJECT.KEYID = 7
1,176,043 UART: [idev] UDS.KEYID = 0
1,176,388 ready_for_fw is high
1,176,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,239 UART: [idev] Erasing UDS.KEYID = 0
1,201,392 UART: [idev] Sha1 KeyId Algorithm
1,209,942 UART: [idev] --
1,211,106 UART: [ldev] ++
1,211,274 UART: [ldev] CDI.KEYID = 6
1,211,637 UART: [ldev] SUBJECT.KEYID = 5
1,212,063 UART: [ldev] AUTHORITY.KEYID = 7
1,212,526 UART: [ldev] FE.KEYID = 1
1,217,716 UART: [ldev] Erasing FE.KEYID = 1
1,243,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,454 UART: [ldev] --
1,282,785 UART: [fwproc] Wait for Commands...
1,283,457 UART: [fwproc] Recv command 0x46574c44
1,284,185 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,618 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,889 >>> mbox cmd response: success
2,778,109 UART: [afmc] ++
2,778,277 UART: [afmc] CDI.KEYID = 6
2,778,639 UART: [afmc] SUBJECT.KEYID = 7
2,779,064 UART: [afmc] AUTHORITY.KEYID = 5
2,814,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,058 UART: [afmc] --
2,858,022 UART: [cold-reset] --
2,858,876 UART: [state] Locking Datavault
2,860,375 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,979 UART: [state] Locking ICCM
2,861,609 UART: [exit] Launching FMC @ 0x40000130
2,866,938 UART:
2,866,954 UART: Running Caliptra FMC ...
2,867,362 UART:
2,867,505 UART: [state] CFI Enabled
2,877,840 UART: [fht] FMC Alias Private Key: 7
2,986,043 UART: [art] Extend RT PCRs Done
2,986,471 UART: [art] Lock RT PCRs Done
2,987,941 UART: [art] Populate DV Done
2,996,186 UART: [fht] FMC Alias Private Key: 7
2,997,134 UART: [art] Derive CDI
2,997,414 UART: [art] Store in in slot 0x4
3,083,201 UART: [art] Derive Key Pair
3,083,561 UART: [art] Store priv key in slot 0x5
3,097,303 UART: [art] Derive Key Pair - Done
3,112,056 UART: [art] Signing Cert with AUTHO
3,112,536 UART: RITY.KEYID = 7
3,128,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,947 UART: [art] PUB.X = 6362518407885768D2D5167B37B82DE8B1576168A176B5A2A2DC819F97D01258553BB0DCE7815763930DB1A10AAC303B
3,135,700 UART: [art] PUB.Y = 05F1AC88258C84DAF6287205B295B79834FDB522D0ECFC653B19E7006B46C1759BC4AAE77013978AF07B5D75F51EDD9F
3,142,630 UART: [art] SIG.R = 69016951B3E528D06CD3F65EFF87164AC2375313D8D56E4A05B0FC6C384FDB950312B97A70D38743E113346C947CF489
3,149,387 UART: [art] SIG.S = 6B0CE26A25CE45979A9C3E7130C2A8D15BA58720F9DAA1B402EB4DFA6E1253A6EED545752E4309E45891E67895BC622E
3,173,159 UART: Caliptra RT
3,173,504 UART: [state] CFI Enabled
3,281,935 UART: [rt] RT listening for mailbox commands...
3,282,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,969 UART: [rt]cmd =0x44504543, len=96
3,492,703 >>> mbox cmd response data (6236 bytes)
3,492,704 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,597 UART: [rt]cmd =0x53574545, len=84
3,548,889 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,292 ready_for_fw is high
1,060,292 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,510 >>> mbox cmd response: success
2,691,346 UART:
2,691,362 UART: Running Caliptra FMC ...
2,691,770 UART:
2,691,913 UART: [state] CFI Enabled
2,702,344 UART: [fht] FMC Alias Private Key: 7
2,809,937 UART: [art] Extend RT PCRs Done
2,810,365 UART: [art] Lock RT PCRs Done
2,811,545 UART: [art] Populate DV Done
2,819,834 UART: [fht] FMC Alias Private Key: 7
2,820,818 UART: [art] Derive CDI
2,821,098 UART: [art] Store in in slot 0x4
2,906,723 UART: [art] Derive Key Pair
2,907,083 UART: [art] Store priv key in slot 0x5
2,920,797 UART: [art] Derive Key Pair - Done
2,935,341 UART: [art] Signing Cert with AUTHO
2,935,821 UART: RITY.KEYID = 7
2,950,921 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,686 UART: [art] PUB.X = A357DC48A426E048659C7A5CCC1B2266B87E221861FA54B940639FC1DA2D692251FF98CB0743F5AD0787AC461533725F
2,958,450 UART: [art] PUB.Y = 4FD82C9C6E3E6433C833C2375B7D523E35ACFBA1A567745B756449C380A0626A92F8CC76105B29387EE3A47568A982C9
2,965,398 UART: [art] SIG.R = 10874E450626BE90B278AFAA4F2B0A7BFD1A790AAE0F7BC88EEDB10B6BAE49E91EEA831D52B6C927C75B239A454FFC58
2,972,175 UART: [art] SIG.S = 59C537F2A72D6AD34799DDBD45BC3EE80F45D1BB3E96BC0CAC63B20F206316AE2080167F6A57B9A1A56D2C8E907F5B42
2,996,117 UART: Caliptra RT
2,996,462 UART: [state] CFI Enabled
3,103,637 UART: [rt] RT listening for mailbox commands...
3,104,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,425 UART: [rt]cmd =0x44504543, len=96
3,314,856 >>> mbox cmd response data (6236 bytes)
3,314,857 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,826 UART: [rt]cmd =0x53574545, len=84
3,369,990 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,187 UART: [kat] ++
895,339 UART: [kat] sha1
899,529 UART: [kat] SHA2-256
901,469 UART: [kat] SHA2-384
904,176 UART: [kat] SHA2-512-ACC
906,077 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,170,103 UART: [cold-reset] ++
1,170,543 UART: [fht] FHT @ 0x50003400
1,173,195 UART: [idev] ++
1,173,363 UART: [idev] CDI.KEYID = 6
1,173,724 UART: [idev] SUBJECT.KEYID = 7
1,174,149 UART: [idev] UDS.KEYID = 0
1,174,495 ready_for_fw is high
1,174,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,101 UART: [idev] Erasing UDS.KEYID = 0
1,199,027 UART: [idev] Sha1 KeyId Algorithm
1,207,725 UART: [idev] --
1,208,746 UART: [ldev] ++
1,208,914 UART: [ldev] CDI.KEYID = 6
1,209,278 UART: [ldev] SUBJECT.KEYID = 5
1,209,705 UART: [ldev] AUTHORITY.KEYID = 7
1,210,168 UART: [ldev] FE.KEYID = 1
1,215,346 UART: [ldev] Erasing FE.KEYID = 1
1,241,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,468 UART: [fwproc] Wait for Commands...
1,281,157 UART: [fwproc] Recv command 0x46574c44
1,281,890 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,782 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,850 >>> mbox cmd response: success
2,773,891 UART: [afmc] ++
2,774,059 UART: [afmc] CDI.KEYID = 6
2,774,422 UART: [afmc] SUBJECT.KEYID = 7
2,774,848 UART: [afmc] AUTHORITY.KEYID = 5
2,810,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,057 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,940 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,659 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,446 UART: [afmc] --
2,853,416 UART: [cold-reset] --
2,854,170 UART: [state] Locking Datavault
2,855,289 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,893 UART: [state] Locking ICCM
2,856,431 UART: [exit] Launching FMC @ 0x40000130
2,861,760 UART:
2,861,776 UART: Running Caliptra FMC ...
2,862,184 UART:
2,862,238 UART: [state] CFI Enabled
2,872,899 UART: [fht] FMC Alias Private Key: 7
2,980,282 UART: [art] Extend RT PCRs Done
2,980,710 UART: [art] Lock RT PCRs Done
2,982,096 UART: [art] Populate DV Done
2,990,289 UART: [fht] FMC Alias Private Key: 7
2,991,471 UART: [art] Derive CDI
2,991,751 UART: [art] Store in in slot 0x4
3,077,190 UART: [art] Derive Key Pair
3,077,550 UART: [art] Store priv key in slot 0x5
3,090,792 UART: [art] Derive Key Pair - Done
3,105,837 UART: [art] Signing Cert with AUTHO
3,106,317 UART: RITY.KEYID = 7
3,121,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,084 UART: [art] PUB.X = 80520265685822BB8A2782516D371E6B9A225E4C7F8964110AFE7E34E195FA1178144DBD938A7E685B2191DF336F6F9B
3,128,842 UART: [art] PUB.Y = 548AE8C3D2143CB731B583388BC07BAE16227EDAD48F76F614E1E9603722B63236776B7F6BAC3C701B69DB142E23780F
3,135,791 UART: [art] SIG.R = 5AAD6834255CB5D1EE903E0F3FFFA5A72F22AA253D031E5FDFC9B059F705AF61C5BB8CFC905D302CB7DCA2749A320327
3,142,569 UART: [art] SIG.S = 1FA3EC709F9E139570FAD17CFC3CB82FA8F2A37E6C4D5B4B972DBD334AD9EAAD45A7A796B44C585F79E2C5C4A24533DC
3,166,248 UART: Caliptra RT
3,166,501 UART: [state] CFI Enabled
3,275,572 UART: [rt] RT listening for mailbox commands...
3,276,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,734 UART: [rt]cmd =0x44504543, len=96
3,486,869 >>> mbox cmd response data (6236 bytes)
3,486,870 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,439 UART: [rt]cmd =0x53574545, len=84
3,541,979 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,720 ready_for_fw is high
1,056,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,630 >>> mbox cmd response: success
2,686,800 UART:
2,686,816 UART: Running Caliptra FMC ...
2,687,224 UART:
2,687,278 UART: [state] CFI Enabled
2,697,859 UART: [fht] FMC Alias Private Key: 7
2,805,534 UART: [art] Extend RT PCRs Done
2,805,962 UART: [art] Lock RT PCRs Done
2,807,680 UART: [art] Populate DV Done
2,816,091 UART: [fht] FMC Alias Private Key: 7
2,817,221 UART: [art] Derive CDI
2,817,501 UART: [art] Store in in slot 0x4
2,903,286 UART: [art] Derive Key Pair
2,903,646 UART: [art] Store priv key in slot 0x5
2,917,284 UART: [art] Derive Key Pair - Done
2,931,995 UART: [art] Signing Cert with AUTHO
2,932,475 UART: RITY.KEYID = 7
2,947,663 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,428 UART: [art] PUB.X = 6AFD5AB9D97ABAEB6F15B3790B78B8C66EFE0649C4914A45239B383548F10BDD66F365B460317F2DC50650C9A5F9FF16
2,955,196 UART: [art] PUB.Y = 7D44B3E4A5B80AD89F3629087217B23AFC974E852DB1F9707088C8B430FF0FD94C04595DE55CDBC58549179BC26383B6
2,962,136 UART: [art] SIG.R = 91FA482ABFC7447ED9E934280217106B75C3B9941EEB5B10CB446DEDB1E4A391154751502A6A1CD202810BE2ECC0FA5D
2,968,907 UART: [art] SIG.S = 9CB314AAAA395ADD1A8A5BD42D9A3829E82C06E9D4DAAF6EEA36F175B20560A6B17ECBC6D175105E5594EC05E63403F9
2,992,608 UART: Caliptra RT
2,992,861 UART: [state] CFI Enabled
3,099,917 UART: [rt] RT listening for mailbox commands...
3,100,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,009 UART: [rt]cmd =0x44504543, len=96
3,311,304 >>> mbox cmd response data (6236 bytes)
3,311,305 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,322 UART: [rt]cmd =0x53574545, len=84
3,366,778 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,796 UART: [kat] ++
895,948 UART: [kat] sha1
900,218 UART: [kat] SHA2-256
902,158 UART: [kat] SHA2-384
904,883 UART: [kat] SHA2-512-ACC
906,784 UART: [kat] ECC-384
917,223 UART: [kat] HMAC-384Kdf
921,823 UART: [kat] LMS
1,170,135 UART: [kat] --
1,171,280 UART: [cold-reset] ++
1,171,668 UART: [fht] FHT @ 0x50003400
1,174,290 UART: [idev] ++
1,174,458 UART: [idev] CDI.KEYID = 6
1,174,819 UART: [idev] SUBJECT.KEYID = 7
1,175,244 UART: [idev] UDS.KEYID = 0
1,175,590 ready_for_fw is high
1,175,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,322 UART: [idev] Erasing UDS.KEYID = 0
1,200,246 UART: [idev] Sha1 KeyId Algorithm
1,209,214 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,789 UART: [ldev] SUBJECT.KEYID = 5
1,211,216 UART: [ldev] AUTHORITY.KEYID = 7
1,211,679 UART: [ldev] FE.KEYID = 1
1,217,047 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,267 UART: [ldev] --
1,282,717 UART: [fwproc] Wait for Commands...
1,283,460 UART: [fwproc] Recv command 0x46574c44
1,284,193 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,399 >>> mbox cmd response: success
2,777,494 UART: [afmc] ++
2,777,662 UART: [afmc] CDI.KEYID = 6
2,778,025 UART: [afmc] SUBJECT.KEYID = 7
2,778,451 UART: [afmc] AUTHORITY.KEYID = 5
2,814,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,055 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,667 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,386 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,261 UART: [afmc] --
2,858,143 UART: [cold-reset] --
2,858,847 UART: [state] Locking Datavault
2,860,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,834 UART: [state] Locking ICCM
2,861,446 UART: [exit] Launching FMC @ 0x40000130
2,866,775 UART:
2,866,791 UART: Running Caliptra FMC ...
2,867,199 UART:
2,867,342 UART: [state] CFI Enabled
2,877,995 UART: [fht] FMC Alias Private Key: 7
2,985,766 UART: [art] Extend RT PCRs Done
2,986,194 UART: [art] Lock RT PCRs Done
2,987,768 UART: [art] Populate DV Done
2,995,893 UART: [fht] FMC Alias Private Key: 7
2,996,903 UART: [art] Derive CDI
2,997,183 UART: [art] Store in in slot 0x4
3,082,670 UART: [art] Derive Key Pair
3,083,030 UART: [art] Store priv key in slot 0x5
3,096,790 UART: [art] Derive Key Pair - Done
3,111,176 UART: [art] Signing Cert with AUTHO
3,111,656 UART: RITY.KEYID = 7
3,126,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,699 UART: [art] PUB.X = 808706E08A8DCA6893CA5D46B64246F294CFA80D4AB77F19646569D0CDC5536D98CD54EC41FF1B9F6A77A09D8277DB07
3,134,468 UART: [art] PUB.Y = 7B9944D7BA51BA071E5ADC37D36B2846CA7CD6CA5BEBDE8925B4AF073A6C88BDD98989C41EB031040B21EBC2F6E35D89
3,141,426 UART: [art] SIG.R = 9342F15C67E86EF2D2703A20C79ACC95894E84C84C69BEB1CB1FEEC4B13206927877D5F7C351ED4047362C50070BA49D
3,148,191 UART: [art] SIG.S = 7298FFCFFB210F08EDC11201A8F21B59B36473537FA12AA4AB2CDF36B02EBC6543566C9AC171603336711C8CB324EB33
3,171,205 UART: Caliptra RT
3,171,550 UART: [state] CFI Enabled
3,278,799 UART: [rt] RT listening for mailbox commands...
3,279,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,059 UART: [rt]cmd =0x44504543, len=96
3,491,054 >>> mbox cmd response data (6236 bytes)
3,491,055 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,964 UART: [rt]cmd =0x53574545, len=84
3,546,248 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,577 ready_for_fw is high
1,056,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,381 >>> mbox cmd response: success
2,685,805 UART:
2,685,821 UART: Running Caliptra FMC ...
2,686,229 UART:
2,686,372 UART: [state] CFI Enabled
2,696,895 UART: [fht] FMC Alias Private Key: 7
2,804,248 UART: [art] Extend RT PCRs Done
2,804,676 UART: [art] Lock RT PCRs Done
2,806,376 UART: [art] Populate DV Done
2,814,579 UART: [fht] FMC Alias Private Key: 7
2,815,729 UART: [art] Derive CDI
2,816,009 UART: [art] Store in in slot 0x4
2,901,624 UART: [art] Derive Key Pair
2,901,984 UART: [art] Store priv key in slot 0x5
2,915,246 UART: [art] Derive Key Pair - Done
2,930,065 UART: [art] Signing Cert with AUTHO
2,930,545 UART: RITY.KEYID = 7
2,945,947 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,712 UART: [art] PUB.X = B7497C29B3D265062827D0BF331D041421A48ADA5967A74F2FAF25F670629406B2068A80B123364B07AFC6CE6C7ED063
2,953,465 UART: [art] PUB.Y = C7EB894F6BC1378408337C47A7AD86863F53EF0C4BE305B38BC7CA39265707F68217D6B967123D5E15EF5912FE2378D5
2,960,403 UART: [art] SIG.R = 6075ACA118BA15199682E7990B42B4771A7E786FBA10007323F5F44C7E9A4E978AF3BE37ADA253FB25DF43CB81B8657C
2,967,154 UART: [art] SIG.S = DF0751EC5886025CC8C4A17767469BC689F6FF997A8558B097A83B7C3E20F2321EDBDFF80C23C7C45F39267BD7CC595A
2,990,644 UART: Caliptra RT
2,990,989 UART: [state] CFI Enabled
3,100,370 UART: [rt] RT listening for mailbox commands...
3,101,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,526 UART: [rt]cmd =0x44504543, len=96
3,311,906 >>> mbox cmd response data (6236 bytes)
3,311,907 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,030 UART: [rt]cmd =0x53574545, len=84
3,367,292 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,218 UART:
192,568 UART: Running Caliptra ROM ...
193,768 UART:
193,961 UART: [state] CFI Enabled
258,434 UART: [state] LifecycleState = Unprovisioned
260,416 UART: [state] DebugLocked = No
262,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,244 UART: [kat] SHA2-256
437,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,466 UART: [kat] ++
448,950 UART: [kat] sha1
460,747 UART: [kat] SHA2-256
463,439 UART: [kat] SHA2-384
467,913 UART: [kat] SHA2-512-ACC
470,284 UART: [kat] ECC-384
2,767,587 UART: [kat] HMAC-384Kdf
2,800,424 UART: [kat] LMS
3,990,760 UART: [kat] --
3,994,577 UART: [cold-reset] ++
3,996,606 UART: [fht] Storing FHT @ 0x50003400
4,008,379 UART: [idev] ++
4,008,959 UART: [idev] CDI.KEYID = 6
4,009,876 UART: [idev] SUBJECT.KEYID = 7
4,011,127 UART: [idev] UDS.KEYID = 0
4,012,109 ready_for_fw is high
4,012,312 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,864 UART: [idev] Erasing UDS.KEYID = 0
7,344,133 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,210 UART: [idev] --
7,371,579 UART: [ldev] ++
7,372,153 UART: [ldev] CDI.KEYID = 6
7,373,128 UART: [ldev] SUBJECT.KEYID = 5
7,374,343 UART: [ldev] AUTHORITY.KEYID = 7
7,375,575 UART: [ldev] FE.KEYID = 1
7,421,926 UART: [ldev] Erasing FE.KEYID = 1
10,756,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,868 UART: [ldev] --
13,138,082 UART: [fwproc] Waiting for Commands...
13,140,555 UART: [fwproc] Received command 0x46574c44
13,142,735 UART: [fwproc] Received Image of size 114124 bytes
17,190,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,123 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,988 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,654,124 >>> mbox cmd response: success
17,657,623 UART: [afmc] ++
17,658,221 UART: [afmc] CDI.KEYID = 6
17,659,192 UART: [afmc] SUBJECT.KEYID = 7
17,660,428 UART: [afmc] AUTHORITY.KEYID = 5
21,028,216 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,777 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,031 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,199 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,294 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,693 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,005 UART: [afmc] --
23,396,882 UART: [cold-reset] --
23,401,230 UART: [state] Locking Datavault
23,406,371 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,124 UART: [state] Locking ICCM
23,410,469 UART: [exit] Launching FMC @ 0x40000130
23,418,861 UART:
23,419,097 UART: Running Caliptra FMC ...
23,420,203 UART:
23,420,382 UART: [state] CFI Enabled
23,488,994 UART: [fht] FMC Alias Private Key: 7
25,826,598 UART: [art] Extend RT PCRs Done
25,827,820 UART: [art] Lock RT PCRs Done
25,829,800 UART: [art] Populate DV Done
25,835,705 UART: [fht] FMC Alias Private Key: 7
25,837,298 UART: [art] Derive CDI
25,838,111 UART: [art] Store in in slot 0x4
25,896,446 UART: [art] Derive Key Pair
25,897,452 UART: [art] Store priv key in slot 0x5
29,189,812 UART: [art] Derive Key Pair - Done
29,202,756 UART: [art] Signing Cert with AUTHO
29,204,057 UART: RITY.KEYID = 7
31,490,728 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,238 UART: [art] PUB.X = B3D92E022C39D430919C58C272FC363F8FB9A0D106F0CFBB22F067C6C9F2F8D064B87F4F9490DAD7EF40085D797AD080
31,499,494 UART: [art] PUB.Y = A9D519718B8D012641E5CFFC1DDE4D84424640AF066098184C3EBF40386F4F3651989150B05FB1CE2195FA2647F1B225
31,506,726 UART: [art] SIG.R = 35D6E61CDA01BCE0B49F81B260385C75B2AB3AD24C81A9C84ADB55FBB8BCD4AD29AFF11524DF9FE7C891E719BE5E8A2D
31,514,132 UART: [art] SIG.S = 84B75712D55D24B2035219522FCB89A4170574D486D6C2540DBC31B20101991D89B272CCD43D09ABD1B60EAE5E0CEB92
32,819,422 UART: Caliptra RT
32,820,110 UART: [state] CFI Enabled
32,980,022 UART: [rt] RT listening for mailbox commands...
32,982,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,013,260 UART: [rt]cmd =0x44504543, len=96
38,797,007 >>> mbox cmd response data (6236 bytes)
38,826,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,857,158 UART: [rt]cmd =0x44504543, len=96
38,888,458 >>> mbox cmd response data (56 bytes)
38,889,233 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,919,317 UART: [rt]cmd =0x52564348, len=36
38,921,862 >>> mbox cmd response data (8 bytes)
38,922,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,953,044 UART: [rt]cmd =0x44504543, len=96
44,725,290 >>> mbox cmd response data (6236 bytes)
44,754,099 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,784,768 UART: [rt]cmd =0x53574545, len=84
50,369,845 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,783,622 ready_for_fw is high
3,784,034 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,867,314 >>> mbox cmd response: success
23,585,038 UART:
23,585,431 UART: Running Caliptra FMC ...
23,586,564 UART:
23,586,730 UART: [state] CFI Enabled
23,655,827 UART: [fht] FMC Alias Private Key: 7
25,994,003 UART: [art] Extend RT PCRs Done
25,995,231 UART: [art] Lock RT PCRs Done
25,996,862 UART: [art] Populate DV Done
26,002,553 UART: [fht] FMC Alias Private Key: 7
26,004,202 UART: [art] Derive CDI
26,005,068 UART: [art] Store in in slot 0x4
26,063,800 UART: [art] Derive Key Pair
26,064,809 UART: [art] Store priv key in slot 0x5
29,357,665 UART: [art] Derive Key Pair - Done
29,370,656 UART: [art] Signing Cert with AUTHO
29,371,992 UART: RITY.KEYID = 7
31,658,333 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,843 UART: [art] PUB.X = C492217FE72A1112E0204F419E29911C6448A542065B1030271BE0287C3869DC6187DA4C24B24C914BF069A7234E1B21
31,667,069 UART: [art] PUB.Y = 90CC96F3FB7708EFA85C2A5DF5C0F0502B5B1E7303505357F83C897C6CEB3E8B185F67003272718D24DB9AE172D7BE8A
31,674,334 UART: [art] SIG.R = F1DB305E85357CB3CB32BC2E832E1FF9971219432A7A28A3182D6CFA44539071D123C164ADEBCB2E600A8BAF18F32D31
31,681,706 UART: [art] SIG.S = 9FA66B7B1E6D1D77A4DE2BBAD821060C38ED95D53C14CA498AB0BFB3AB67B55AD897CB02CFADB44117C769DD03A02BB6
32,986,555 UART: Caliptra RT
32,987,275 UART: [state] CFI Enabled
33,148,618 UART: [rt] RT listening for mailbox commands...
33,151,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,181,769 UART: [rt]cmd =0x44504543, len=96
38,946,318 >>> mbox cmd response data (6236 bytes)
38,975,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,006,210 UART: [rt]cmd =0x44504543, len=96
39,036,900 >>> mbox cmd response data (56 bytes)
39,037,636 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,067,702 UART: [rt]cmd =0x52564348, len=36
39,070,658 >>> mbox cmd response data (8 bytes)
39,071,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,101,686 UART: [rt]cmd =0x44504543, len=96
44,874,295 >>> mbox cmd response data (6236 bytes)
44,903,261 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,933,670 UART: [rt]cmd =0x53574545, len=84
50,519,383 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,437 UART:
192,810 UART: Running Caliptra ROM ...
194,001 UART:
603,652 UART: [state] CFI Enabled
620,856 UART: [state] LifecycleState = Unprovisioned
622,830 UART: [state] DebugLocked = No
625,145 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,157 UART: [kat] SHA2-256
799,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,433 UART: [kat] ++
810,981 UART: [kat] sha1
821,633 UART: [kat] SHA2-256
824,345 UART: [kat] SHA2-384
829,549 UART: [kat] SHA2-512-ACC
831,908 UART: [kat] ECC-384
3,114,838 UART: [kat] HMAC-384Kdf
3,126,070 UART: [kat] LMS
4,316,208 UART: [kat] --
4,323,259 UART: [cold-reset] ++
4,324,260 UART: [fht] Storing FHT @ 0x50003400
4,336,674 UART: [idev] ++
4,337,236 UART: [idev] CDI.KEYID = 6
4,338,115 UART: [idev] SUBJECT.KEYID = 7
4,339,427 UART: [idev] UDS.KEYID = 0
4,340,366 ready_for_fw is high
4,340,557 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,907 UART: [idev] Erasing UDS.KEYID = 0
7,627,937 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,548 UART: [idev] --
7,653,919 UART: [ldev] ++
7,654,489 UART: [ldev] CDI.KEYID = 6
7,655,447 UART: [ldev] SUBJECT.KEYID = 5
7,656,656 UART: [ldev] AUTHORITY.KEYID = 7
7,657,935 UART: [ldev] FE.KEYID = 1
7,669,106 UART: [ldev] Erasing FE.KEYID = 1
10,957,314 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,133 UART: [ldev] --
13,314,280 UART: [fwproc] Waiting for Commands...
13,317,355 UART: [fwproc] Received command 0x46574c44
13,319,533 UART: [fwproc] Received Image of size 114124 bytes
17,366,341 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,470 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,355 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,830,054 >>> mbox cmd response: success
17,833,642 UART: [afmc] ++
17,834,230 UART: [afmc] CDI.KEYID = 6
17,835,132 UART: [afmc] SUBJECT.KEYID = 7
17,836,404 UART: [afmc] AUTHORITY.KEYID = 5
21,152,156 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,765 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,016 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,376 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,245 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,728 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,333 UART: [afmc] --
23,518,927 UART: [cold-reset] --
23,523,271 UART: [state] Locking Datavault
23,529,332 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,082 UART: [state] Locking ICCM
23,533,498 UART: [exit] Launching FMC @ 0x40000130
23,541,894 UART:
23,542,125 UART: Running Caliptra FMC ...
23,543,221 UART:
23,543,377 UART: [state] CFI Enabled
23,551,631 UART: [fht] FMC Alias Private Key: 7
25,882,588 UART: [art] Extend RT PCRs Done
25,883,801 UART: [art] Lock RT PCRs Done
25,885,612 UART: [art] Populate DV Done
25,891,106 UART: [fht] FMC Alias Private Key: 7
25,892,756 UART: [art] Derive CDI
25,893,586 UART: [art] Store in in slot 0x4
25,936,232 UART: [art] Derive Key Pair
25,937,228 UART: [art] Store priv key in slot 0x5
29,179,113 UART: [art] Derive Key Pair - Done
29,191,885 UART: [art] Signing Cert with AUTHO
29,193,190 UART: RITY.KEYID = 7
31,472,700 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,214 UART: [art] PUB.X = B0EAAF11873C5E602308A9D31EF33161EF5EAAE4F88456FF9A3A2064C6C6BE961076E12DB041AF01DE562242CD1AC110
31,481,491 UART: [art] PUB.Y = 623906FE0C906D7F5D3DEAD5EC0077F42E8DFEA233DAC9D45F8AFC504FECF3B1B5992A8FBEDCCFA76D315710DE059545
31,488,732 UART: [art] SIG.R = 45DD78554AD8B1F33221F234895C069C0B2D9D4541EA2EA65BCAB2CD37FFFCF4DB2EB3ACD0205D6B9F8A7597706FAD2B
31,496,180 UART: [art] SIG.S = B00E7FA3601687B33E11961DE718C883C89F509113BEE8645C8FA802BBAF2522B1542F54939B6309E2D74B1B838949F5
32,801,912 UART: Caliptra RT
32,802,625 UART: [state] CFI Enabled
32,920,661 UART: [rt] RT listening for mailbox commands...
32,923,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,953,376 UART: [rt]cmd =0x44504543, len=96
38,626,511 >>> mbox cmd response data (6236 bytes)
38,655,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,686,504 UART: [rt]cmd =0x44504543, len=96
38,717,056 >>> mbox cmd response data (56 bytes)
38,717,791 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,747,813 UART: [rt]cmd =0x52564348, len=36
38,750,130 >>> mbox cmd response data (8 bytes)
38,750,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,781,206 UART: [rt]cmd =0x44504543, len=96
44,454,064 >>> mbox cmd response data (6236 bytes)
44,482,888 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,513,528 UART: [rt]cmd =0x53574545, len=84
50,037,913 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,658 writing to cptra_bootfsm_go
4,126,910 ready_for_fw is high
4,127,459 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,074,397 >>> mbox cmd response: success
23,715,679 UART:
23,716,066 UART: Running Caliptra FMC ...
23,717,214 UART:
23,717,371 UART: [state] CFI Enabled
23,725,409 UART: [fht] FMC Alias Private Key: 7
26,055,916 UART: [art] Extend RT PCRs Done
26,057,492 UART: [art] Lock RT PCRs Done
26,058,670 UART: [art] Populate DV Done
26,063,789 UART: [fht] FMC Alias Private Key: 7
26,065,403 UART: [art] Derive CDI
26,066,141 UART: [art] Store in in slot 0x4
26,109,179 UART: [art] Derive Key Pair
26,110,218 UART: [art] Store priv key in slot 0x5
29,352,526 UART: [art] Derive Key Pair - Done
29,365,583 UART: [art] Signing Cert with AUTHO
29,366,921 UART: RITY.KEYID = 7
31,646,744 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,250 UART: [art] PUB.X = 32B20CC88F3E429F3422FCEB3DF8D652F79F56CBC9E960BEAA7C5A41F0A0B1D8CB0863803761CBA1A73F873E0BF7655C
31,655,539 UART: [art] PUB.Y = 3EB8660EBBC4FE6BAEDC91970570F97EC6BE3D97AB8588AEF375F623F68D4CF6B56C2BC4B39C4B962C5392B032538057
31,662,766 UART: [art] SIG.R = B5B407AB33E86EF3B2E65F7C986D809EE4830C851BA91B3CE32551ACE8DD682A23CA15C0F34CC5F589EFDA243C56C6F9
31,670,205 UART: [art] SIG.S = 69783514A0966096DDC0081C515345D9DB9FF419809459F4812AED3A54C8209C7F9D56217D1A28FF9F03845776918F0C
32,975,243 UART: Caliptra RT
32,975,955 UART: [state] CFI Enabled
33,093,293 UART: [rt] RT listening for mailbox commands...
33,095,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,126,471 UART: [rt]cmd =0x44504543, len=96
38,799,749 >>> mbox cmd response data (6236 bytes)
38,829,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,859,927 UART: [rt]cmd =0x44504543, len=96
38,891,287 >>> mbox cmd response data (56 bytes)
38,892,050 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,921,917 UART: [rt]cmd =0x52564348, len=36
38,924,560 >>> mbox cmd response data (8 bytes)
38,925,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,955,899 UART: [rt]cmd =0x44504543, len=96
44,627,750 >>> mbox cmd response data (6236 bytes)
44,656,696 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,687,411 UART: [rt]cmd =0x53574545, len=84
50,212,164 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
191,983 UART:
192,354 UART: Running Caliptra ROM ...
193,461 UART:
193,603 UART: [state] CFI Enabled
263,311 UART: [state] LifecycleState = Unprovisioned
265,162 UART: [state] DebugLocked = No
268,033 UART: [state] WD Timer not started. Device not locked for debugging
271,998 UART: [kat] SHA2-256
451,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,643 UART: [kat] ++
463,113 UART: [kat] sha1
475,334 UART: [kat] SHA2-256
478,337 UART: [kat] SHA2-384
484,825 UART: [kat] SHA2-512-ACC
487,759 UART: [kat] ECC-384
2,947,654 UART: [kat] HMAC-384Kdf
2,971,332 UART: [kat] LMS
3,500,806 UART: [kat] --
3,503,827 UART: [cold-reset] ++
3,505,049 UART: [fht] FHT @ 0x50003400
3,516,168 UART: [idev] ++
3,516,730 UART: [idev] CDI.KEYID = 6
3,517,637 UART: [idev] SUBJECT.KEYID = 7
3,518,812 UART: [idev] UDS.KEYID = 0
3,519,858 ready_for_fw is high
3,520,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,000 UART: [idev] Erasing UDS.KEYID = 0
6,026,983 UART: [idev] Sha1 KeyId Algorithm
6,049,725 UART: [idev] --
6,052,205 UART: [ldev] ++
6,052,775 UART: [ldev] CDI.KEYID = 6
6,053,691 UART: [ldev] SUBJECT.KEYID = 5
6,054,850 UART: [ldev] AUTHORITY.KEYID = 7
6,056,134 UART: [ldev] FE.KEYID = 1
6,100,030 UART: [ldev] Erasing FE.KEYID = 1
8,602,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,318 UART: [ldev] --
10,413,566 UART: [fwproc] Wait for Commands...
10,416,155 UART: [fwproc] Recv command 0x46574c44
10,418,256 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,273,854 >>> mbox cmd response: success
14,278,233 UART: [afmc] ++
14,278,823 UART: [afmc] CDI.KEYID = 6
14,279,737 UART: [afmc] SUBJECT.KEYID = 7
14,280,898 UART: [afmc] AUTHORITY.KEYID = 5
16,808,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,087 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,830 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,876 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,779 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,982 UART: [afmc] --
18,608,143 UART: [cold-reset] --
18,611,674 UART: [state] Locking Datavault
18,618,861 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,559 UART: [state] Locking ICCM
18,622,494 UART: [exit] Launching FMC @ 0x40000130
18,630,942 UART:
18,631,182 UART: Running Caliptra FMC ...
18,632,287 UART:
18,632,447 UART: [state] CFI Enabled
18,692,103 UART: [fht] FMC Alias Private Key: 7
20,455,906 UART: [art] Extend RT PCRs Done
20,457,119 UART: [art] Lock RT PCRs Done
20,458,621 UART: [art] Populate DV Done
20,463,980 UART: [fht] FMC Alias Private Key: 7
20,465,570 UART: [art] Derive CDI
20,466,403 UART: [art] Store in in slot 0x4
20,524,472 UART: [art] Derive Key Pair
20,525,517 UART: [art] Store priv key in slot 0x5
22,988,786 UART: [art] Derive Key Pair - Done
23,001,880 UART: [art] Signing Cert with AUTHO
23,003,182 UART: RITY.KEYID = 7
24,714,764 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,264 UART: [art] PUB.X = 71E3101EA01E47838D6CAC3620161BC8021E1DE03B860AD8BBBF7DDC9AE8443296EC656E867A1BD69E9376586B34E3A6
24,723,522 UART: [art] PUB.Y = DCED6C54E67FB339B5912CB6C03DD5FAAEA3DB8B7FC5276A23F1284DF594B0F6E56F6AA580A38F6CC9D7DE2CB36BA835
24,730,830 UART: [art] SIG.R = 344F8B5CC5922B66F09B2ACF09EEE2EF7CFF6A9FBD0858D6EAC6355FED1F7158667A38C15A86653CDD0544852E0FDB51
24,738,265 UART: [art] SIG.S = 8A7C666C1ACB9EE61CBB15BE9FB845F276EFD5B820F2CEC800972C477B3C165FA2E4FE19A0BE3FAE31D3B9C28A47BB1B
25,716,993 UART: Caliptra RT
25,717,687 UART: [state] CFI Enabled
25,883,018 UART: [rt] RT listening for mailbox commands...
25,885,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,916,481 UART: [rt]cmd =0x44504543, len=96
30,295,532 >>> mbox cmd response data (6236 bytes)
30,324,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,355,375 UART: [rt]cmd =0x44504543, len=96
30,386,208 >>> mbox cmd response data (56 bytes)
30,386,929 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,416,933 UART: [rt]cmd =0x52564348, len=36
30,419,993 >>> mbox cmd response data (8 bytes)
30,420,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,451,167 UART: [rt]cmd =0x44504543, len=96
34,818,989 >>> mbox cmd response data (6236 bytes)
34,847,800 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,878,279 UART: [rt]cmd =0x53574545, len=84
39,057,467 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,362,512 ready_for_fw is high
3,362,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,055,590 >>> mbox cmd response: success
18,341,972 UART:
18,342,417 UART: Running Caliptra FMC ...
18,343,527 UART:
18,343,700 UART: [state] CFI Enabled
18,411,075 UART: [fht] FMC Alias Private Key: 7
20,175,150 UART: [art] Extend RT PCRs Done
20,176,368 UART: [art] Lock RT PCRs Done
20,178,183 UART: [art] Populate DV Done
20,183,384 UART: [fht] FMC Alias Private Key: 7
20,184,984 UART: [art] Derive CDI
20,185,800 UART: [art] Store in in slot 0x4
20,244,150 UART: [art] Derive Key Pair
20,245,187 UART: [art] Store priv key in slot 0x5
22,707,602 UART: [art] Derive Key Pair - Done
22,720,612 UART: [art] Signing Cert with AUTHO
22,721,920 UART: RITY.KEYID = 7
24,433,589 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,102 UART: [art] PUB.X = B35B276B74C5E882C9BCF39E46D802C13C35BB53D3385A0F11ABCFA3B8C5E17FEEC1778256CD7BB75E4642AFD069EF08
24,442,377 UART: [art] PUB.Y = 84FD32639D1B695460260188278CD5DBBF0B32507E5449EA662048150E96D17386DAD067BABA2740D1999B8409090B09
24,449,602 UART: [art] SIG.R = 2D0809FA80410833A8C6E56ED39770B885C9433F568721F0E2B41E8882645FE6BA5AF19B35939FE7BC8AA653E26088AE
24,457,008 UART: [art] SIG.S = AB7F06AD485A5EF67E887FA577F99F27ADBD7ED98D4C4EFA71553AC66B441C55F86555FF1798DDF2B868C98F744B80D3
25,435,348 UART: Caliptra RT
25,436,058 UART: [state] CFI Enabled
25,600,913 UART: [rt] RT listening for mailbox commands...
25,603,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,634,461 UART: [rt]cmd =0x44504543, len=96
29,993,039 >>> mbox cmd response data (6236 bytes)
30,022,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,053,227 UART: [rt]cmd =0x44504543, len=96
30,084,591 >>> mbox cmd response data (56 bytes)
30,085,320 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,115,356 UART: [rt]cmd =0x52564348, len=36
30,118,166 >>> mbox cmd response data (8 bytes)
30,118,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,149,407 UART: [rt]cmd =0x44504543, len=96
34,515,722 >>> mbox cmd response data (6236 bytes)
34,544,709 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,575,258 UART: [rt]cmd =0x53574545, len=84
38,753,050 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,242 UART:
192,612 UART: Running Caliptra ROM ...
193,706 UART:
603,334 UART: [state] CFI Enabled
614,952 UART: [state] LifecycleState = Unprovisioned
616,834 UART: [state] DebugLocked = No
618,702 UART: [state] WD Timer not started. Device not locked for debugging
622,076 UART: [kat] SHA2-256
801,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,751 UART: [kat] ++
813,192 UART: [kat] sha1
824,431 UART: [kat] SHA2-256
827,471 UART: [kat] SHA2-384
833,032 UART: [kat] SHA2-512-ACC
836,032 UART: [kat] ECC-384
3,277,907 UART: [kat] HMAC-384Kdf
3,291,134 UART: [kat] LMS
3,820,613 UART: [kat] --
3,824,605 UART: [cold-reset] ++
3,826,248 UART: [fht] FHT @ 0x50003400
3,837,164 UART: [idev] ++
3,837,722 UART: [idev] CDI.KEYID = 6
3,838,627 UART: [idev] SUBJECT.KEYID = 7
3,839,862 UART: [idev] UDS.KEYID = 0
3,840,779 ready_for_fw is high
3,840,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,682 UART: [idev] Erasing UDS.KEYID = 0
6,316,847 UART: [idev] Sha1 KeyId Algorithm
6,338,450 UART: [idev] --
6,342,743 UART: [ldev] ++
6,343,322 UART: [ldev] CDI.KEYID = 6
6,344,200 UART: [ldev] SUBJECT.KEYID = 5
6,345,349 UART: [ldev] AUTHORITY.KEYID = 7
6,346,725 UART: [ldev] FE.KEYID = 1
6,356,320 UART: [ldev] Erasing FE.KEYID = 1
8,828,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,768 UART: [ldev] --
10,616,996 UART: [fwproc] Wait for Commands...
10,619,515 UART: [fwproc] Recv command 0x46574c44
10,621,609 UART: [fwproc] Recv'd Img size: 114448 bytes
14,022,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,482,310 >>> mbox cmd response: success
14,487,248 UART: [afmc] ++
14,487,841 UART: [afmc] CDI.KEYID = 6
14,488,744 UART: [afmc] SUBJECT.KEYID = 7
14,489,896 UART: [afmc] AUTHORITY.KEYID = 5
16,988,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,759 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,519 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,403 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,874 UART: [afmc] --
18,785,787 UART: [cold-reset] --
18,788,505 UART: [state] Locking Datavault
18,794,174 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,867 UART: [state] Locking ICCM
18,797,952 UART: [exit] Launching FMC @ 0x40000130
18,806,409 UART:
18,806,638 UART: Running Caliptra FMC ...
18,807,732 UART:
18,807,887 UART: [state] CFI Enabled
18,815,945 UART: [fht] FMC Alias Private Key: 7
20,572,594 UART: [art] Extend RT PCRs Done
20,573,809 UART: [art] Lock RT PCRs Done
20,575,611 UART: [art] Populate DV Done
20,581,000 UART: [fht] FMC Alias Private Key: 7
20,582,634 UART: [art] Derive CDI
20,583,398 UART: [art] Store in in slot 0x4
20,626,308 UART: [art] Derive Key Pair
20,627,304 UART: [art] Store priv key in slot 0x5
23,054,406 UART: [art] Derive Key Pair - Done
23,067,501 UART: [art] Signing Cert with AUTHO
23,068,824 UART: RITY.KEYID = 7
24,774,768 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,276 UART: [art] PUB.X = 97BCCA7C4C73DD7D0E3E7FE39511AA5EAB278D20320FE810091108604A78A3C4587E9C1DD6ECCCCD5F4405C6A3E33F93
24,783,563 UART: [art] PUB.Y = A0673E388D6193FB89006B5E400D8C91D4AA63E2869A924AB85A6FED456FA7C8C71A4465A01FBBCB9AE8477633F963AE
24,790,822 UART: [art] SIG.R = 3663A94457A64961D9E50B430D349DAB78A1C6527DA0E3794121BE847DC0EBB960E6BDAE0C4A75C2A3F62AE870417B85
24,798,220 UART: [art] SIG.S = 9242086E5BDF95C4175B85B21D6E5D1DEE448ECE6089E3C87A8949762038FD908C15331CE16AF9453C1A0C4E6692E431
25,776,779 UART: Caliptra RT
25,777,463 UART: [state] CFI Enabled
25,895,403 UART: [rt] RT listening for mailbox commands...
25,897,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,928,721 UART: [rt]cmd =0x44504543, len=96
30,212,691 >>> mbox cmd response data (6236 bytes)
30,241,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,272,823 UART: [rt]cmd =0x44504543, len=96
30,304,031 >>> mbox cmd response data (56 bytes)
30,304,757 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,334,564 UART: [rt]cmd =0x52564348, len=36
30,337,309 >>> mbox cmd response data (8 bytes)
30,337,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,368,563 UART: [rt]cmd =0x44504543, len=96
34,652,281 >>> mbox cmd response data (6236 bytes)
34,681,955 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,712,598 UART: [rt]cmd =0x53574545, len=84
38,847,773 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
3,694,894 ready_for_fw is high
3,695,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,638 >>> mbox cmd response: success
18,519,181 UART:
18,519,579 UART: Running Caliptra FMC ...
18,520,710 UART:
18,520,863 UART: [state] CFI Enabled
18,528,751 UART: [fht] FMC Alias Private Key: 7
20,286,524 UART: [art] Extend RT PCRs Done
20,287,751 UART: [art] Lock RT PCRs Done
20,289,204 UART: [art] Populate DV Done
20,294,612 UART: [fht] FMC Alias Private Key: 7
20,296,150 UART: [art] Derive CDI
20,296,879 UART: [art] Store in in slot 0x4
20,339,730 UART: [art] Derive Key Pair
20,340,796 UART: [art] Store priv key in slot 0x5
22,767,420 UART: [art] Derive Key Pair - Done
22,780,300 UART: [art] Signing Cert with AUTHO
22,781,602 UART: RITY.KEYID = 7
24,487,401 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,897 UART: [art] PUB.X = 52BD2970E15BD98A14C3ACADC2BFC7CFA80EA54D6781C681E2900AC58B2F6A008A5678777CA05B96820ED65203328694
24,496,167 UART: [art] PUB.Y = 3F86C388E3CFB989A7D29BE72D78C780AB8A77110BC0DB307F73851019294E34ABFD65DE06574A346A6BD8C18A23117B
24,503,404 UART: [art] SIG.R = 141F2DA17BD08DD4B67DAD745563F4DF65CA01C1FF4DA93B6EE2B12B45A8D8955BCA9E3F873FD902B5EF12C81F10E594
24,510,861 UART: [art] SIG.S = 413AEE015047D56F822BFE220EFCEAB9C0508DB66E6ABEA5082664BB0F0AC28B874C205BC93BF2C4B88B9E933255B086
25,489,336 UART: Caliptra RT
25,490,044 UART: [state] CFI Enabled
25,608,433 UART: [rt] RT listening for mailbox commands...
25,610,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,641,460 UART: [rt]cmd =0x44504543, len=96
29,925,294 >>> mbox cmd response data (6236 bytes)
29,954,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
29,985,402 UART: [rt]cmd =0x44504543, len=96
30,016,813 >>> mbox cmd response data (56 bytes)
30,017,578 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,047,507 UART: [rt]cmd =0x52564348, len=36
30,050,099 >>> mbox cmd response data (8 bytes)
30,050,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,081,456 UART: [rt]cmd =0x44504543, len=96
34,365,223 >>> mbox cmd response data (6236 bytes)
34,394,013 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,424,282 UART: [rt]cmd =0x53574545, len=84
38,559,882 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,440,970 ready_for_fw is high
3,441,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,734,463 >>> mbox cmd response: success
19,027,754 UART:
19,028,148 UART: Running Caliptra FMC ...
19,029,349 UART:
19,029,518 UART: [state] CFI Enabled
19,097,594 UART: [fht] FMC Alias Private Key: 7
20,861,683 UART: [art] Extend RT PCRs Done
20,862,921 UART: [art] Lock RT PCRs Done
20,864,519 UART: [art] Populate DV Done
20,869,819 UART: [fht] FMC Alias Private Key: 7
20,871,306 UART: [art] Derive CDI
20,872,068 UART: [art] Store in in slot 0x4
20,930,520 UART: [art] Derive Key Pair
20,931,561 UART: [art] Store priv key in slot 0x5
23,394,677 UART: [art] Derive Key Pair - Done
23,408,109 UART: [art] Signing Cert with AUTHO
23,409,426 UART: RITY.KEYID = 7
25,122,190 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,722 UART: [art] PUB.X = E91295101DAE8BD38012D0528BB4A7DC03F5BA72E42688F002217C9F20DC5CCFF67D1F6C3356743F70E83B722AB4FF75
25,130,979 UART: [art] PUB.Y = CA9CFFF93EE2FDB4F483AEF8669AE1B6428E3A66E3C35E0288D29A96370F6D719DDD5B4C9EA6A2E48DC5166316BC6F7D
25,138,280 UART: [art] SIG.R = 7F8010FE25DBD23C34EA0A6614961DC0001D55861345438C51F80D81CED5E74BDD59109633C3E59C4FE2069ACF9D39B1
25,145,616 UART: [art] SIG.S = 80F1578B3B3F5FC84723EAA658B37DE5B0DF5A2C33CD38C512736D158ED3D3609D3B3089EEF58B7005951DC5073E5945
26,124,278 UART: Caliptra RT
26,125,009 UART: [state] CFI Enabled
26,290,086 UART: [rt] RT listening for mailbox commands...
26,292,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,323,701 UART: [rt]cmd =0x44504543, len=96
30,705,560 >>> mbox cmd response data (6236 bytes)
30,735,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,766,440 UART: [rt]cmd =0x44504543, len=96
30,797,772 >>> mbox cmd response data (56 bytes)
30,798,519 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,828,290 UART: [rt]cmd =0x52564348, len=36
30,830,808 >>> mbox cmd response data (8 bytes)
30,831,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,862,015 UART: [rt]cmd =0x44504543, len=96
35,227,326 >>> mbox cmd response data (6236 bytes)
35,256,298 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,286,766 UART: [rt]cmd =0x53574545, len=84
39,464,258 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,756,405 ready_for_fw is high
3,756,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,969,886 >>> mbox cmd response: success
19,222,170 UART:
19,222,555 UART: Running Caliptra FMC ...
19,223,741 UART:
19,223,916 UART: [state] CFI Enabled
19,231,862 UART: [fht] FMC Alias Private Key: 7
20,988,245 UART: [art] Extend RT PCRs Done
20,989,474 UART: [art] Lock RT PCRs Done
20,991,260 UART: [art] Populate DV Done
20,996,677 UART: [fht] FMC Alias Private Key: 7
20,998,256 UART: [art] Derive CDI
20,999,075 UART: [art] Store in in slot 0x4
21,041,672 UART: [art] Derive Key Pair
21,042,673 UART: [art] Store priv key in slot 0x5
23,469,988 UART: [art] Derive Key Pair - Done
23,482,942 UART: [art] Signing Cert with AUTHO
23,484,280 UART: RITY.KEYID = 7
25,189,853 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,359 UART: [art] PUB.X = 015CF92E76A3B9F990C6D7F5EB126A92B2551300E1AC4F5D21C470B405BAB787EC7AFEC3967FBD844B38F96F1063250B
25,198,635 UART: [art] PUB.Y = E97FC525BFB0077AAE5B720BA860F155FAAA1F70BCDE50701176CF1948016E64568FCF9C051C478F9D648ADE35E21634
25,205,907 UART: [art] SIG.R = CEC56EFE830692E7A81B58CC741E3DA6F48C31D3D075B75052E457ECB48CC6043C6EDFD3F6D70BFFB728E4EF0900476D
25,213,286 UART: [art] SIG.S = C29EB48BEFBCBD6A6BF58A3DCD39AF0648B4E3DC0496430F1E4EA1338C6AFF6FB7AE4FAD487CBA717C1DD4AE08FBCF1B
26,192,713 UART: Caliptra RT
26,193,402 UART: [state] CFI Enabled
26,310,851 UART: [rt] RT listening for mailbox commands...
26,313,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,343,571 UART: [rt]cmd =0x44504543, len=96
30,626,466 >>> mbox cmd response data (6236 bytes)
30,655,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,686,283 UART: [rt]cmd =0x44504543, len=96
30,717,371 >>> mbox cmd response data (56 bytes)
30,718,118 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,748,195 UART: [rt]cmd =0x52564348, len=36
30,750,673 >>> mbox cmd response data (8 bytes)
30,751,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,781,652 UART: [rt]cmd =0x44504543, len=96
35,065,894 >>> mbox cmd response data (6236 bytes)
35,094,856 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,125,621 UART: [rt]cmd =0x53574545, len=84
39,261,002 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,273 UART: [kat] SHA2-256
892,211 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,696 UART: [kat] HMAC-384Kdf
907,200 UART: [kat] LMS
1,475,396 UART: [kat] --
1,476,143 UART: [cold-reset] ++
1,476,597 UART: [fht] Storing FHT @ 0x50003400
1,479,246 UART: [idev] ++
1,479,414 UART: [idev] CDI.KEYID = 6
1,479,774 UART: [idev] SUBJECT.KEYID = 7
1,480,198 UART: [idev] UDS.KEYID = 0
1,480,543 ready_for_fw is high
1,480,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,678 UART: [idev] Erasing UDS.KEYID = 0
1,505,614 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,136 UART: [idev] --
1,515,049 UART: [ldev] ++
1,515,217 UART: [ldev] CDI.KEYID = 6
1,515,580 UART: [ldev] SUBJECT.KEYID = 5
1,516,006 UART: [ldev] AUTHORITY.KEYID = 7
1,516,469 UART: [ldev] FE.KEYID = 1
1,521,691 UART: [ldev] Erasing FE.KEYID = 1
1,546,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,618 UART: [ldev] --
1,585,893 UART: [fwproc] Waiting for Commands...
1,586,582 UART: [fwproc] Received command 0x46574c44
1,587,373 UART: [fwproc] Received Image of size 114448 bytes
2,885,652 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,306 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,659 >>> mbox cmd response: success
3,078,745 UART: [afmc] ++
3,078,913 UART: [afmc] CDI.KEYID = 6
3,079,275 UART: [afmc] SUBJECT.KEYID = 7
3,079,700 UART: [afmc] AUTHORITY.KEYID = 5
3,114,421 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,005 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,785 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,398 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,088 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,001 UART: [afmc] --
3,158,131 UART: [cold-reset] --
3,159,059 UART: [state] Locking Datavault
3,160,150 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,754 UART: [state] Locking ICCM
3,161,222 UART: [exit] Launching FMC @ 0x40000130
3,166,551 UART:
3,166,567 UART: Running Caliptra FMC ...
3,166,975 UART:
3,167,029 UART: [state] CFI Enabled
3,177,400 UART: [fht] FMC Alias Private Key: 7
3,285,991 UART: [art] Extend RT PCRs Done
3,286,419 UART: [art] Lock RT PCRs Done
3,288,079 UART: [art] Populate DV Done
3,296,280 UART: [fht] FMC Alias Private Key: 7
3,297,324 UART: [art] Derive CDI
3,297,604 UART: [art] Store in in slot 0x4
3,382,993 UART: [art] Derive Key Pair
3,383,353 UART: [art] Store priv key in slot 0x5
3,396,791 UART: [art] Derive Key Pair - Done
3,411,653 UART: [art] Signing Cert with AUTHO
3,412,133 UART: RITY.KEYID = 7
3,427,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,488 UART: [art] PUB.X = 38A749FD685BE254C4C8599148C5F252273AB9D4726180D0C991A3FA0CCF826BF543171817B773CA5E98886CE2B7A6B7
3,435,255 UART: [art] PUB.Y = 9DD7CF3FBD20FA617F79AD1B6E9CEF8DBDB006D50E791C3A1FA7A64B0D5929839E36918C205BE6B88FEA938A3EC17370
3,442,216 UART: [art] SIG.R = 6A6ADF4F7FCC52C5068151FDA66BD1E992797116866AC0954AF2AB0154FF4743C0D3AA2D09660AC9C9DCA4B6FFDC17D2
3,448,992 UART: [art] SIG.S = 370FFD13965ABDDA4B7EA2A7B1AAC30E89D82F91C1EBBB96A5888D074DA49E3B8E5A41BED6896D89016E0E36F28C065F
3,472,191 UART: Caliptra RT
3,472,444 UART: [state] CFI Enabled
3,580,480 UART: [rt] RT listening for mailbox commands...
3,581,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,690 UART: [rt]cmd =0x44504543, len=96
3,792,875 >>> mbox cmd response data (6236 bytes)
3,792,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,795 UART: [rt]cmd =0x44504543, len=96
3,855,103 >>> mbox cmd response data (56 bytes)
3,855,104 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,884,585 UART: [rt]cmd =0x52564348, len=36
3,886,757 >>> mbox cmd response data (8 bytes)
3,886,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,777 UART: [rt]cmd =0x44504543, len=96
4,097,194 >>> mbox cmd response data (6236 bytes)
4,097,195 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,126,924 UART: [rt]cmd =0x53574545, len=84
4,152,538 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,257 ready_for_fw is high
1,363,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,881 >>> mbox cmd response: success
2,990,841 UART:
2,990,857 UART: Running Caliptra FMC ...
2,991,265 UART:
2,991,319 UART: [state] CFI Enabled
3,001,998 UART: [fht] FMC Alias Private Key: 7
3,110,257 UART: [art] Extend RT PCRs Done
3,110,685 UART: [art] Lock RT PCRs Done
3,112,323 UART: [art] Populate DV Done
3,120,380 UART: [fht] FMC Alias Private Key: 7
3,121,498 UART: [art] Derive CDI
3,121,778 UART: [art] Store in in slot 0x4
3,207,943 UART: [art] Derive Key Pair
3,208,303 UART: [art] Store priv key in slot 0x5
3,221,415 UART: [art] Derive Key Pair - Done
3,236,162 UART: [art] Signing Cert with AUTHO
3,236,642 UART: RITY.KEYID = 7
3,251,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,481 UART: [art] PUB.X = E2C88D2CDF4345375E3F0AC57456E2CF2A9488FFAC9FB0EC09015193B89EDC34B38879B33FE49FB59C0750AE772B8980
3,259,249 UART: [art] PUB.Y = 0779535C9937E957307F0465FA8AFF9F033A64AFC54AE815640E5B280F84D83BC6F54291AAC9214322BC2CA6E6A99DB8
3,266,188 UART: [art] SIG.R = 52D8116AF03ADE388090FE8958A9E29AE41899A5E9391A39940584FC472AE0392BA8F8FDF5C5D67E1BEA929AC52379EA
3,272,963 UART: [art] SIG.S = B36387DC5252C3F14A2F10FF285ABDFAED4E2348D2422DDFEB8C21720AA9F1DD43AF1FEF9DAE9A60527B7ADF5B85F8BB
3,297,083 UART: Caliptra RT
3,297,336 UART: [state] CFI Enabled
3,405,053 UART: [rt] RT listening for mailbox commands...
3,405,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,113 UART: [rt]cmd =0x44504543, len=96
3,617,016 >>> mbox cmd response data (6236 bytes)
3,617,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,996 UART: [rt]cmd =0x44504543, len=96
3,678,554 >>> mbox cmd response data (56 bytes)
3,678,555 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,192 UART: [rt]cmd =0x52564348, len=36
3,710,178 >>> mbox cmd response data (8 bytes)
3,710,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,314 UART: [rt]cmd =0x44504543, len=96
3,921,313 >>> mbox cmd response data (6236 bytes)
3,921,314 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,213 UART: [rt]cmd =0x53574545, len=84
3,976,853 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,895 UART: [state] LifecycleState = Unprovisioned
85,550 UART: [state] DebugLocked = No
86,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,698 UART: [kat] SHA2-256
881,629 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,744 UART: [kat] ++
885,896 UART: [kat] sha1
890,130 UART: [kat] SHA2-256
892,068 UART: [kat] SHA2-384
894,945 UART: [kat] SHA2-512-ACC
896,846 UART: [kat] ECC-384
902,721 UART: [kat] HMAC-384Kdf
907,519 UART: [kat] LMS
1,475,715 UART: [kat] --
1,476,778 UART: [cold-reset] ++
1,477,304 UART: [fht] Storing FHT @ 0x50003400
1,479,969 UART: [idev] ++
1,480,137 UART: [idev] CDI.KEYID = 6
1,480,497 UART: [idev] SUBJECT.KEYID = 7
1,480,921 UART: [idev] UDS.KEYID = 0
1,481,266 ready_for_fw is high
1,481,266 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,947 UART: [idev] Erasing UDS.KEYID = 0
1,506,289 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,911 UART: [idev] --
1,515,902 UART: [ldev] ++
1,516,070 UART: [ldev] CDI.KEYID = 6
1,516,433 UART: [ldev] SUBJECT.KEYID = 5
1,516,859 UART: [ldev] AUTHORITY.KEYID = 7
1,517,322 UART: [ldev] FE.KEYID = 1
1,522,492 UART: [ldev] Erasing FE.KEYID = 1
1,548,187 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,217 UART: [ldev] --
1,587,572 UART: [fwproc] Waiting for Commands...
1,588,277 UART: [fwproc] Received command 0x46574c44
1,589,068 UART: [fwproc] Received Image of size 114448 bytes
2,888,739 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,237 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,592 >>> mbox cmd response: success
3,082,666 UART: [afmc] ++
3,082,834 UART: [afmc] CDI.KEYID = 6
3,083,196 UART: [afmc] SUBJECT.KEYID = 7
3,083,621 UART: [afmc] AUTHORITY.KEYID = 5
3,118,838 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,246 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,026 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,639 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,329 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,128 UART: [afmc] --
3,162,178 UART: [cold-reset] --
3,162,920 UART: [state] Locking Datavault
3,163,995 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,599 UART: [state] Locking ICCM
3,165,027 UART: [exit] Launching FMC @ 0x40000130
3,170,356 UART:
3,170,372 UART: Running Caliptra FMC ...
3,170,780 UART:
3,170,923 UART: [state] CFI Enabled
3,181,686 UART: [fht] FMC Alias Private Key: 7
3,289,535 UART: [art] Extend RT PCRs Done
3,289,963 UART: [art] Lock RT PCRs Done
3,291,413 UART: [art] Populate DV Done
3,299,676 UART: [fht] FMC Alias Private Key: 7
3,300,834 UART: [art] Derive CDI
3,301,114 UART: [art] Store in in slot 0x4
3,386,487 UART: [art] Derive Key Pair
3,386,847 UART: [art] Store priv key in slot 0x5
3,399,977 UART: [art] Derive Key Pair - Done
3,414,734 UART: [art] Signing Cert with AUTHO
3,415,214 UART: RITY.KEYID = 7
3,430,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,247 UART: [art] PUB.X = 336869129191B9FB42B66D319BCB2A7FBA35E613D98DA874063B4BA339E98FB6C63BED80A7E27C6801E04148855F1D8F
3,438,015 UART: [art] PUB.Y = 47504D587F45A426CE85FBD594A38B85E5EC147BDFE7930F0AB66C0BE38298113105A9D546C8BA2DAE133768FF34301B
3,444,959 UART: [art] SIG.R = 4329D1C96BFA4CB0ACDD583CD9ECD8F027E8D7AD971FB44E6AB1C5EC8ED45798E003CB4D6DE25917E56D7F1C0F6330AF
3,451,749 UART: [art] SIG.S = 38A7A9830164FFB40829E5EB9245951A44D98CEB381AA274A633F747BA499E9EC2D801F8340EE803B0A562FB7454F2FF
3,475,251 UART: Caliptra RT
3,475,596 UART: [state] CFI Enabled
3,583,750 UART: [rt] RT listening for mailbox commands...
3,584,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,046 UART: [rt]cmd =0x44504543, len=96
3,796,489 >>> mbox cmd response data (6236 bytes)
3,796,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,325 UART: [rt]cmd =0x44504543, len=96
3,858,127 >>> mbox cmd response data (56 bytes)
3,858,128 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,841 UART: [rt]cmd =0x52564348, len=36
3,889,705 >>> mbox cmd response data (8 bytes)
3,889,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,773 UART: [rt]cmd =0x44504543, len=96
4,101,141 >>> mbox cmd response data (6236 bytes)
4,101,142 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,130,919 UART: [rt]cmd =0x53574545, len=84
4,156,751 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,706 ready_for_fw is high
1,362,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,878 >>> mbox cmd response: success
2,990,788 UART:
2,990,804 UART: Running Caliptra FMC ...
2,991,212 UART:
2,991,355 UART: [state] CFI Enabled
3,002,104 UART: [fht] FMC Alias Private Key: 7
3,109,985 UART: [art] Extend RT PCRs Done
3,110,413 UART: [art] Lock RT PCRs Done
3,112,119 UART: [art] Populate DV Done
3,120,464 UART: [fht] FMC Alias Private Key: 7
3,121,444 UART: [art] Derive CDI
3,121,724 UART: [art] Store in in slot 0x4
3,207,639 UART: [art] Derive Key Pair
3,207,999 UART: [art] Store priv key in slot 0x5
3,221,485 UART: [art] Derive Key Pair - Done
3,236,240 UART: [art] Signing Cert with AUTHO
3,236,720 UART: RITY.KEYID = 7
3,251,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,963 UART: [art] PUB.X = 6DF5C49AC8179A2FB79A97ED2D224014D7F53E2476384BC0F668E779E9837534CF409BD6816D8C29FB87D4602E85623F
3,258,733 UART: [art] PUB.Y = 77EF097215824831B302DC4979C1EBE740B1915C04A0D13A51B858DF84F47131C1FD5828B8A1371C517A0D0D15742A94
3,265,662 UART: [art] SIG.R = 780444B67B23D6695830B7DD4816977E622CD36336CD94FA87E3AFB274D8C453F776F5B074FBFB4C372775DAB89342C7
3,272,429 UART: [art] SIG.S = C1529015AAA5E66F59E308CEF0F1F58A3221A2ADEEC1D7B8C71EAD35932F2B431A1A3EE670984710F4E4368BE294AB3D
3,296,203 UART: Caliptra RT
3,296,548 UART: [state] CFI Enabled
3,405,189 UART: [rt] RT listening for mailbox commands...
3,405,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,475 UART: [rt]cmd =0x44504543, len=96
3,617,915 >>> mbox cmd response data (6236 bytes)
3,617,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,745 UART: [rt]cmd =0x44504543, len=96
3,680,051 >>> mbox cmd response data (56 bytes)
3,680,052 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,707 UART: [rt]cmd =0x52564348, len=36
3,711,583 >>> mbox cmd response data (8 bytes)
3,711,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,509 UART: [rt]cmd =0x44504543, len=96
3,922,033 >>> mbox cmd response data (6236 bytes)
3,922,034 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,787 UART: [rt]cmd =0x53574545, len=84
3,978,537 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,809 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
893,594 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,719 UART: [kat] ++
897,871 UART: [kat] sha1
901,943 UART: [kat] SHA2-256
903,883 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,312 UART: [kat] HMAC-384Kdf
922,922 UART: [kat] LMS
1,171,250 UART: [kat] --
1,172,117 UART: [cold-reset] ++
1,172,529 UART: [fht] FHT @ 0x50003400
1,175,218 UART: [idev] ++
1,175,386 UART: [idev] CDI.KEYID = 6
1,175,746 UART: [idev] SUBJECT.KEYID = 7
1,176,170 UART: [idev] UDS.KEYID = 0
1,176,515 ready_for_fw is high
1,176,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,900 UART: [idev] Erasing UDS.KEYID = 0
1,200,587 UART: [idev] Sha1 KeyId Algorithm
1,209,019 UART: [idev] --
1,210,151 UART: [ldev] ++
1,210,319 UART: [ldev] CDI.KEYID = 6
1,210,682 UART: [ldev] SUBJECT.KEYID = 5
1,211,108 UART: [ldev] AUTHORITY.KEYID = 7
1,211,571 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,243,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,903 UART: [ldev] --
1,282,300 UART: [fwproc] Wait for Commands...
1,283,020 UART: [fwproc] Recv command 0x46574c44
1,283,748 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,599 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,014 >>> mbox cmd response: success
2,777,030 UART: [afmc] ++
2,777,198 UART: [afmc] CDI.KEYID = 6
2,777,560 UART: [afmc] SUBJECT.KEYID = 7
2,777,985 UART: [afmc] AUTHORITY.KEYID = 5
2,813,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,609 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,222 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,763 UART: [afmc] --
2,856,673 UART: [cold-reset] --
2,857,451 UART: [state] Locking Datavault
2,858,808 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,412 UART: [state] Locking ICCM
2,859,876 UART: [exit] Launching FMC @ 0x40000130
2,865,205 UART:
2,865,221 UART: Running Caliptra FMC ...
2,865,629 UART:
2,865,683 UART: [state] CFI Enabled
2,876,134 UART: [fht] FMC Alias Private Key: 7
2,984,393 UART: [art] Extend RT PCRs Done
2,984,821 UART: [art] Lock RT PCRs Done
2,986,227 UART: [art] Populate DV Done
2,994,410 UART: [fht] FMC Alias Private Key: 7
2,995,514 UART: [art] Derive CDI
2,995,794 UART: [art] Store in in slot 0x4
3,081,477 UART: [art] Derive Key Pair
3,081,837 UART: [art] Store priv key in slot 0x5
3,094,389 UART: [art] Derive Key Pair - Done
3,108,923 UART: [art] Signing Cert with AUTHO
3,109,403 UART: RITY.KEYID = 7
3,124,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,212 UART: [art] PUB.X = 1B78A3CE6EAF7E921B35254920EDC490EFE4B6628C31D0E63CBD8A14B6F68E5D2E7A33A6D0A21239CE6D8E51B5B598AE
3,132,000 UART: [art] PUB.Y = 9EE74CEBD9AB13F53D1F2EB3DD23D11D2A5AF66B8AB8D40D661B87F6B20B5E53EAB6A4C16B8FE1302D4060522E1D657F
3,138,966 UART: [art] SIG.R = A31F043EEF720A14C983D5A770079CC223ABF33B959950F65594E8EDB73E0F7468C6EE53EA06187B20C9C5BEF0E6B117
3,145,729 UART: [art] SIG.S = 6F51F1D1E4BE0FBC4C72FC780CFEC77BB35DE8434479F298F34D9BD56154C936C6D24CD7CE3E60A6A5889A9077DDC2C5
3,169,398 UART: Caliptra RT
3,169,651 UART: [state] CFI Enabled
3,278,256 UART: [rt] RT listening for mailbox commands...
3,278,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,464 UART: [rt]cmd =0x44504543, len=96
3,489,899 >>> mbox cmd response data (6236 bytes)
3,489,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,129 UART: [rt]cmd =0x44504543, len=96
3,551,915 >>> mbox cmd response data (56 bytes)
3,551,916 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,535 UART: [rt]cmd =0x52564348, len=36
3,583,815 >>> mbox cmd response data (8 bytes)
3,583,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,671 UART: [rt]cmd =0x44504543, len=96
3,793,581 >>> mbox cmd response data (6236 bytes)
3,793,582 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,379 UART: [rt]cmd =0x53574545, len=84
3,849,087 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,893 ready_for_fw is high
1,059,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,867 >>> mbox cmd response: success
2,690,041 UART:
2,690,057 UART: Running Caliptra FMC ...
2,690,465 UART:
2,690,519 UART: [state] CFI Enabled
2,701,482 UART: [fht] FMC Alias Private Key: 7
2,809,101 UART: [art] Extend RT PCRs Done
2,809,529 UART: [art] Lock RT PCRs Done
2,811,317 UART: [art] Populate DV Done
2,819,522 UART: [fht] FMC Alias Private Key: 7
2,820,456 UART: [art] Derive CDI
2,820,736 UART: [art] Store in in slot 0x4
2,906,125 UART: [art] Derive Key Pair
2,906,485 UART: [art] Store priv key in slot 0x5
2,919,867 UART: [art] Derive Key Pair - Done
2,934,734 UART: [art] Signing Cert with AUTHO
2,935,214 UART: RITY.KEYID = 7
2,950,508 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,273 UART: [art] PUB.X = E92C65F2E346674C6420F9B7B803F088BB781AE537A7FC97C75F650F6C7DA9E73122B90B7D887035129785B4DE1BF5C1
2,958,036 UART: [art] PUB.Y = 93D43F455DDB123659FDB8E6E3B31236D1DEDEDD099E91DD53C5FFCACDE9A08ACF66D1779F91D98EB2EBD92140762693
2,965,003 UART: [art] SIG.R = 720B0162031B295C3F4B6942294865DD2532B6E4B5226FCB5EA6512D85E1B01593C731B46A2BA5389FAD7EE34F65F47D
2,971,764 UART: [art] SIG.S = 9DB6ED199326B2583D61B23F2C5439FAE8F7F609F34EB7FBAD78810867F204B2AB646896F65DA5B1EAFA2677FE9D91B7
2,995,270 UART: Caliptra RT
2,995,523 UART: [state] CFI Enabled
3,103,334 UART: [rt] RT listening for mailbox commands...
3,104,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,338 UART: [rt]cmd =0x44504543, len=96
3,315,073 >>> mbox cmd response data (6236 bytes)
3,315,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,073 UART: [rt]cmd =0x44504543, len=96
3,376,631 >>> mbox cmd response data (56 bytes)
3,376,632 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,067 UART: [rt]cmd =0x52564348, len=36
3,408,297 >>> mbox cmd response data (8 bytes)
3,408,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,315 UART: [rt]cmd =0x44504543, len=96
3,619,205 >>> mbox cmd response data (6236 bytes)
3,619,206 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,931 UART: [rt]cmd =0x53574545, len=84
3,674,399 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
893,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,904 UART: [kat] ++
898,056 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
907,077 UART: [kat] SHA2-512-ACC
908,978 UART: [kat] ECC-384
918,329 UART: [kat] HMAC-384Kdf
923,139 UART: [kat] LMS
1,171,467 UART: [kat] --
1,172,344 UART: [cold-reset] ++
1,172,882 UART: [fht] FHT @ 0x50003400
1,175,611 UART: [idev] ++
1,175,779 UART: [idev] CDI.KEYID = 6
1,176,139 UART: [idev] SUBJECT.KEYID = 7
1,176,563 UART: [idev] UDS.KEYID = 0
1,176,908 ready_for_fw is high
1,176,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,649 UART: [idev] Erasing UDS.KEYID = 0
1,201,602 UART: [idev] Sha1 KeyId Algorithm
1,210,132 UART: [idev] --
1,211,016 UART: [ldev] ++
1,211,184 UART: [ldev] CDI.KEYID = 6
1,211,547 UART: [ldev] SUBJECT.KEYID = 5
1,211,973 UART: [ldev] AUTHORITY.KEYID = 7
1,212,436 UART: [ldev] FE.KEYID = 1
1,217,610 UART: [ldev] Erasing FE.KEYID = 1
1,244,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,594 UART: [ldev] --
1,282,971 UART: [fwproc] Wait for Commands...
1,283,671 UART: [fwproc] Recv command 0x46574c44
1,284,399 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,880 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,889 >>> mbox cmd response: success
2,776,115 UART: [afmc] ++
2,776,283 UART: [afmc] CDI.KEYID = 6
2,776,645 UART: [afmc] SUBJECT.KEYID = 7
2,777,070 UART: [afmc] AUTHORITY.KEYID = 5
2,813,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,468 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,081 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,800 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,548 UART: [afmc] --
2,856,460 UART: [cold-reset] --
2,857,458 UART: [state] Locking Datavault
2,858,741 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,345 UART: [state] Locking ICCM
2,859,973 UART: [exit] Launching FMC @ 0x40000130
2,865,302 UART:
2,865,318 UART: Running Caliptra FMC ...
2,865,726 UART:
2,865,869 UART: [state] CFI Enabled
2,876,668 UART: [fht] FMC Alias Private Key: 7
2,984,289 UART: [art] Extend RT PCRs Done
2,984,717 UART: [art] Lock RT PCRs Done
2,986,199 UART: [art] Populate DV Done
2,994,794 UART: [fht] FMC Alias Private Key: 7
2,995,828 UART: [art] Derive CDI
2,996,108 UART: [art] Store in in slot 0x4
3,081,849 UART: [art] Derive Key Pair
3,082,209 UART: [art] Store priv key in slot 0x5
3,095,425 UART: [art] Derive Key Pair - Done
3,110,405 UART: [art] Signing Cert with AUTHO
3,110,885 UART: RITY.KEYID = 7
3,126,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,254 UART: [art] PUB.X = 2F67A60FCE5D744FBD94FF880D1EFA4DC33A77148E3B181C099B5063BA1A8807CAB0C5C39556A928CB2C8C85979F05A7
3,134,021 UART: [art] PUB.Y = 22E444402EDB98BB64675C544F81FFFF502B6A524A151C04D59B90EE1F65D9B541BB8417C8F774CBCA1E6AE0309CA25F
3,140,980 UART: [art] SIG.R = 9B4F8D312B6B9B3C93267A298D0D2A4DA0D93E98CCD7EA46F53DF9E4F84C460A9C3348DD492D61B3D2F12CAA84D2127E
3,147,760 UART: [art] SIG.S = 6896AC7EDF606A156F8C26D722DBF3C08985F8EB4FC2497AD23F17A06990FA284C59E11164C9777BF166A63A770F6AA8
3,172,096 UART: Caliptra RT
3,172,441 UART: [state] CFI Enabled
3,280,274 UART: [rt] RT listening for mailbox commands...
3,280,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,422 UART: [rt]cmd =0x44504543, len=96
3,492,348 >>> mbox cmd response data (6236 bytes)
3,492,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,432 UART: [rt]cmd =0x44504543, len=96
3,554,536 >>> mbox cmd response data (56 bytes)
3,554,537 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,198 UART: [rt]cmd =0x52564348, len=36
3,586,412 >>> mbox cmd response data (8 bytes)
3,586,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,286 UART: [rt]cmd =0x44504543, len=96
3,796,035 >>> mbox cmd response data (6236 bytes)
3,796,036 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,819 UART: [rt]cmd =0x53574545, len=84
3,851,207 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,630 ready_for_fw is high
1,060,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,704 >>> mbox cmd response: success
2,691,470 UART:
2,691,486 UART: Running Caliptra FMC ...
2,691,894 UART:
2,692,037 UART: [state] CFI Enabled
2,702,828 UART: [fht] FMC Alias Private Key: 7
2,810,137 UART: [art] Extend RT PCRs Done
2,810,565 UART: [art] Lock RT PCRs Done
2,812,117 UART: [art] Populate DV Done
2,820,270 UART: [fht] FMC Alias Private Key: 7
2,821,396 UART: [art] Derive CDI
2,821,676 UART: [art] Store in in slot 0x4
2,907,441 UART: [art] Derive Key Pair
2,907,801 UART: [art] Store priv key in slot 0x5
2,921,471 UART: [art] Derive Key Pair - Done
2,936,570 UART: [art] Signing Cert with AUTHO
2,937,050 UART: RITY.KEYID = 7
2,951,812 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,577 UART: [art] PUB.X = 753B7A967185438CF40AA6F1FDAFAEE936E54BB261B442D5E154B7BE35F7B0EE45D66C029020D0F636823D4C2A6A2941
2,959,349 UART: [art] PUB.Y = B3FE68C38D88AC75E3032E03D5C4A573F6C9B23326CFE4EB0A3B878F8FC26BE7FC41A2519CD2E0D3223950DCC6B79764
2,966,304 UART: [art] SIG.R = 84E693FF2F54606492AA264B83B6AEEE6199EA859C32BA998C02B17571C3F5FAFD1BF95C27BD8C31072E2D6AFB7541AE
2,973,082 UART: [art] SIG.S = D3711F8EA4F336931D9C8C58768340A0E78BAB024F63864B2CFE20EF98A520CB6D79E7CE6F3AB8748152EAF21C13D37B
2,996,648 UART: Caliptra RT
2,996,993 UART: [state] CFI Enabled
3,104,861 UART: [rt] RT listening for mailbox commands...
3,105,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,701 UART: [rt]cmd =0x44504543, len=96
3,317,188 >>> mbox cmd response data (6236 bytes)
3,317,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,140 UART: [rt]cmd =0x44504543, len=96
3,379,584 >>> mbox cmd response data (56 bytes)
3,379,585 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,082 UART: [rt]cmd =0x52564348, len=36
3,411,328 >>> mbox cmd response data (8 bytes)
3,411,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,378 UART: [rt]cmd =0x44504543, len=96
3,622,955 >>> mbox cmd response data (6236 bytes)
3,622,956 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,721 UART: [rt]cmd =0x53574545, len=84
3,678,679 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,505 UART: [kat] ++
895,657 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,336 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,581 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,174,379 ready_for_fw is high
1,174,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,201 UART: [idev] Erasing UDS.KEYID = 0
1,199,337 UART: [idev] Sha1 KeyId Algorithm
1,208,417 UART: [idev] --
1,209,492 UART: [ldev] ++
1,209,660 UART: [ldev] CDI.KEYID = 6
1,210,024 UART: [ldev] SUBJECT.KEYID = 5
1,210,451 UART: [ldev] AUTHORITY.KEYID = 7
1,210,914 UART: [ldev] FE.KEYID = 1
1,216,058 UART: [ldev] Erasing FE.KEYID = 1
1,242,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,762 UART: [ldev] --
1,282,074 UART: [fwproc] Wait for Commands...
1,282,807 UART: [fwproc] Recv command 0x46574c44
1,283,540 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,865 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,174 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,116 >>> mbox cmd response: success
2,774,305 UART: [afmc] ++
2,774,473 UART: [afmc] CDI.KEYID = 6
2,774,836 UART: [afmc] SUBJECT.KEYID = 7
2,775,262 UART: [afmc] AUTHORITY.KEYID = 5
2,810,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,919 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,802 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,521 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,498 UART: [afmc] --
2,854,390 UART: [cold-reset] --
2,855,322 UART: [state] Locking Datavault
2,856,645 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,249 UART: [state] Locking ICCM
2,857,727 UART: [exit] Launching FMC @ 0x40000130
2,863,056 UART:
2,863,072 UART: Running Caliptra FMC ...
2,863,480 UART:
2,863,534 UART: [state] CFI Enabled
2,874,301 UART: [fht] FMC Alias Private Key: 7
2,982,680 UART: [art] Extend RT PCRs Done
2,983,108 UART: [art] Lock RT PCRs Done
2,984,500 UART: [art] Populate DV Done
2,992,735 UART: [fht] FMC Alias Private Key: 7
2,993,669 UART: [art] Derive CDI
2,993,949 UART: [art] Store in in slot 0x4
3,079,318 UART: [art] Derive Key Pair
3,079,678 UART: [art] Store priv key in slot 0x5
3,092,940 UART: [art] Derive Key Pair - Done
3,107,708 UART: [art] Signing Cert with AUTHO
3,108,188 UART: RITY.KEYID = 7
3,123,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,563 UART: [art] PUB.X = 91C47D36EC0D2A4190712686D28661D1E0E41EB5FAF250BBF25DD16996E5818D3AF876C01C203CC7D74C593A83D1D3AD
3,131,338 UART: [art] PUB.Y = B52AEBFE6D676268A870B2396F54C01C6F383860025C73764C086C8B457FE647242747238D8FB5494679CDA5C99FB02B
3,138,278 UART: [art] SIG.R = F324AB3C422FF29DE3DC4896DB8980267E12344C16B172086AFF38E1F2B053F30C1F9DFC0BBE227912A6DEC578D20BFE
3,145,050 UART: [art] SIG.S = 0892CBFA1DF9B0854BF748111A7CFC5A46AC9A9E84D0C4EF5F7C7D1C4A4F5FEE4602172B88E37FBE54F614E4A158A31A
3,168,673 UART: Caliptra RT
3,168,926 UART: [state] CFI Enabled
3,276,355 UART: [rt] RT listening for mailbox commands...
3,277,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,505 UART: [rt]cmd =0x44504543, len=96
3,487,085 >>> mbox cmd response data (6236 bytes)
3,487,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,157 UART: [rt]cmd =0x44504543, len=96
3,548,903 >>> mbox cmd response data (56 bytes)
3,548,904 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,309 UART: [rt]cmd =0x52564348, len=36
3,580,685 >>> mbox cmd response data (8 bytes)
3,580,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,497 UART: [rt]cmd =0x44504543, len=96
3,791,979 >>> mbox cmd response data (6236 bytes)
3,791,980 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,719 UART: [rt]cmd =0x53574545, len=84
3,846,807 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,798 ready_for_fw is high
1,055,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,794 >>> mbox cmd response: success
2,685,268 UART:
2,685,284 UART: Running Caliptra FMC ...
2,685,692 UART:
2,685,746 UART: [state] CFI Enabled
2,696,247 UART: [fht] FMC Alias Private Key: 7
2,804,772 UART: [art] Extend RT PCRs Done
2,805,200 UART: [art] Lock RT PCRs Done
2,806,574 UART: [art] Populate DV Done
2,814,625 UART: [fht] FMC Alias Private Key: 7
2,815,777 UART: [art] Derive CDI
2,816,057 UART: [art] Store in in slot 0x4
2,901,436 UART: [art] Derive Key Pair
2,901,796 UART: [art] Store priv key in slot 0x5
2,914,604 UART: [art] Derive Key Pair - Done
2,929,648 UART: [art] Signing Cert with AUTHO
2,930,128 UART: RITY.KEYID = 7
2,945,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,599 UART: [art] PUB.X = 1421430044A72C0740D386C90CBCC16BAA5230D6460A3BC7043BF4893EFB5D24A71AA48DED1CF1A0B4B79606555BD903
2,953,335 UART: [art] PUB.Y = DDFA05487EB73D34A40044847809B70AFAA30BAC5D7A247B3063147F281AF545F69FC7815A429FE54D8176A2585CCB24
2,960,255 UART: [art] SIG.R = B87F2F1095D1B26F2C619D48D048F73E03260C098B146C543A23427B655E1113B54BBEA1DCE08587EFCB94C7E1A31D9B
2,967,022 UART: [art] SIG.S = 232B1A7B6606D80BB4AA7B37EA80BE2FFE2541E15ECD2D7C7A66D2CE14980F1D52BADE56F4F8B9674D18C313DF5BA311
2,990,414 UART: Caliptra RT
2,990,667 UART: [state] CFI Enabled
3,097,704 UART: [rt] RT listening for mailbox commands...
3,098,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,662 UART: [rt]cmd =0x44504543, len=96
3,308,140 >>> mbox cmd response data (6236 bytes)
3,308,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,152 UART: [rt]cmd =0x44504543, len=96
3,368,942 >>> mbox cmd response data (56 bytes)
3,368,943 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,468 UART: [rt]cmd =0x52564348, len=36
3,400,672 >>> mbox cmd response data (8 bytes)
3,400,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,454 UART: [rt]cmd =0x44504543, len=96
3,611,453 >>> mbox cmd response data (6236 bytes)
3,611,454 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,327 UART: [rt]cmd =0x53574545, len=84
3,667,461 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,787 UART: [kat] LMS
1,169,099 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,328 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,174,138 ready_for_fw is high
1,174,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,422 UART: [idev] Erasing UDS.KEYID = 0
1,198,372 UART: [idev] Sha1 KeyId Algorithm
1,207,152 UART: [idev] --
1,208,159 UART: [ldev] ++
1,208,327 UART: [ldev] CDI.KEYID = 6
1,208,691 UART: [ldev] SUBJECT.KEYID = 5
1,209,118 UART: [ldev] AUTHORITY.KEYID = 7
1,209,581 UART: [ldev] FE.KEYID = 1
1,214,663 UART: [ldev] Erasing FE.KEYID = 1
1,240,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,899 UART: [ldev] --
1,280,275 UART: [fwproc] Wait for Commands...
1,281,056 UART: [fwproc] Recv command 0x46574c44
1,281,789 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,521 >>> mbox cmd response: success
2,773,656 UART: [afmc] ++
2,773,824 UART: [afmc] CDI.KEYID = 6
2,774,187 UART: [afmc] SUBJECT.KEYID = 7
2,774,613 UART: [afmc] AUTHORITY.KEYID = 5
2,810,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,883 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,495 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,214 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,137 UART: [afmc] --
2,854,207 UART: [cold-reset] --
2,855,139 UART: [state] Locking Datavault
2,856,242 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,846 UART: [state] Locking ICCM
2,857,298 UART: [exit] Launching FMC @ 0x40000130
2,862,627 UART:
2,862,643 UART: Running Caliptra FMC ...
2,863,051 UART:
2,863,194 UART: [state] CFI Enabled
2,874,073 UART: [fht] FMC Alias Private Key: 7
2,981,860 UART: [art] Extend RT PCRs Done
2,982,288 UART: [art] Lock RT PCRs Done
2,983,826 UART: [art] Populate DV Done
2,992,085 UART: [fht] FMC Alias Private Key: 7
2,993,025 UART: [art] Derive CDI
2,993,305 UART: [art] Store in in slot 0x4
3,079,114 UART: [art] Derive Key Pair
3,079,474 UART: [art] Store priv key in slot 0x5
3,093,406 UART: [art] Derive Key Pair - Done
3,108,460 UART: [art] Signing Cert with AUTHO
3,108,940 UART: RITY.KEYID = 7
3,124,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,031 UART: [art] PUB.X = A65C5B1A1A6EECD377BCEE5174D2275EF23269D3E6483B17D637E4ECD5DA6C468B7825354621CD5CC853A2AE6DC76045
3,131,813 UART: [art] PUB.Y = 4EE93CDE4A54911F9F852DB9631E92C8AAF377B5CD7207DFEB9EE0E17E9FD0C05F074D4BACDC989D0801B4619EF1B44F
3,138,773 UART: [art] SIG.R = 338AFE3D33E53CFCF8DE74A91C7C74B88F839151B090BFECE71AD9318B59BA3A1C83A95B61FD57BC80219351A3B16779
3,145,555 UART: [art] SIG.S = A8CB30AE14061AB8F6E576E19757DE367AE03CD15069E74804CE15C5561CA1C98D303FE265CA9B5788D605C473298DAA
3,169,419 UART: Caliptra RT
3,169,764 UART: [state] CFI Enabled
3,279,033 UART: [rt] RT listening for mailbox commands...
3,279,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,995 UART: [rt]cmd =0x44504543, len=96
3,491,221 >>> mbox cmd response data (6236 bytes)
3,491,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,275 UART: [rt]cmd =0x44504543, len=96
3,552,767 >>> mbox cmd response data (56 bytes)
3,552,768 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,485 UART: [rt]cmd =0x52564348, len=36
3,584,453 >>> mbox cmd response data (8 bytes)
3,584,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,343 UART: [rt]cmd =0x44504543, len=96
3,795,514 >>> mbox cmd response data (6236 bytes)
3,795,515 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,492 UART: [rt]cmd =0x53574545, len=84
3,851,010 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,621 ready_for_fw is high
1,056,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,903 >>> mbox cmd response: success
2,686,911 UART:
2,686,927 UART: Running Caliptra FMC ...
2,687,335 UART:
2,687,478 UART: [state] CFI Enabled
2,697,807 UART: [fht] FMC Alias Private Key: 7
2,805,848 UART: [art] Extend RT PCRs Done
2,806,276 UART: [art] Lock RT PCRs Done
2,807,634 UART: [art] Populate DV Done
2,816,089 UART: [fht] FMC Alias Private Key: 7
2,817,161 UART: [art] Derive CDI
2,817,441 UART: [art] Store in in slot 0x4
2,902,840 UART: [art] Derive Key Pair
2,903,200 UART: [art] Store priv key in slot 0x5
2,916,560 UART: [art] Derive Key Pair - Done
2,931,320 UART: [art] Signing Cert with AUTHO
2,931,800 UART: RITY.KEYID = 7
2,946,858 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,623 UART: [art] PUB.X = 456ED0EB2EDB30C089E92A83244F1B70F7072A7C1DBE519CB4C11FD1C0A52FE52AA336F2ED30D6DB98B61BE92CE881CA
2,954,412 UART: [art] PUB.Y = F7C89FE0FD819EBF851406367043CFE06DE4FF35D65F4D488070FF82823CCAF621114E1723B3D0EE2832B4CA594806B9
2,961,362 UART: [art] SIG.R = 5CA75BDAF01DAF24756C1D15245402BAE2E96B040E390374DF95FC232D3E99BD1EF770E77B3BD8C32B47FE72BBBF4121
2,968,136 UART: [art] SIG.S = 3023697B02E0D4CCA4633BD64F8830AB12B138CA402DC01092E3E61570DEA7748613D6C6EBF33AFCFE92AF7EBEAB0B1E
2,991,897 UART: Caliptra RT
2,992,242 UART: [state] CFI Enabled
3,098,981 UART: [rt] RT listening for mailbox commands...
3,099,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,451 UART: [rt]cmd =0x44504543, len=96
3,313,025 >>> mbox cmd response data (6236 bytes)
3,313,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,847 UART: [rt]cmd =0x44504543, len=96
3,374,701 >>> mbox cmd response data (56 bytes)
3,374,702 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,307 UART: [rt]cmd =0x52564348, len=36
3,406,345 >>> mbox cmd response data (8 bytes)
3,406,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,343 UART: [rt]cmd =0x44504543, len=96
3,616,808 >>> mbox cmd response data (6236 bytes)
3,616,809 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,660 UART: [rt]cmd =0x53574545, len=84
3,673,240 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,357 UART:
192,709 UART: Running Caliptra ROM ...
193,904 UART:
194,058 UART: [state] CFI Enabled
266,011 UART: [state] LifecycleState = Unprovisioned
267,947 UART: [state] DebugLocked = No
270,472 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,559 UART: [kat] SHA2-256
444,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,712 UART: [kat] ++
455,319 UART: [kat] sha1
467,289 UART: [kat] SHA2-256
469,946 UART: [kat] SHA2-384
475,746 UART: [kat] SHA2-512-ACC
478,102 UART: [kat] ECC-384
2,767,220 UART: [kat] HMAC-384Kdf
2,798,986 UART: [kat] LMS
3,989,259 UART: [kat] --
3,994,892 UART: [cold-reset] ++
3,996,209 UART: [fht] Storing FHT @ 0x50003400
4,006,913 UART: [idev] ++
4,007,482 UART: [idev] CDI.KEYID = 6
4,008,397 UART: [idev] SUBJECT.KEYID = 7
4,009,644 UART: [idev] UDS.KEYID = 0
4,010,671 ready_for_fw is high
4,010,887 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,485 UART: [idev] Erasing UDS.KEYID = 0
7,341,524 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,407 UART: [idev] --
7,365,566 UART: [ldev] ++
7,366,147 UART: [ldev] CDI.KEYID = 6
7,367,116 UART: [ldev] SUBJECT.KEYID = 5
7,368,330 UART: [ldev] AUTHORITY.KEYID = 7
7,369,561 UART: [ldev] FE.KEYID = 1
7,399,552 UART: [ldev] Erasing FE.KEYID = 1
10,730,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,092 UART: [ldev] --
13,095,387 UART: [fwproc] Waiting for Commands...
13,097,111 UART: [fwproc] Received command 0x46574c44
13,099,312 UART: [fwproc] Received Image of size 114124 bytes
17,155,734 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,580 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,619,943 >>> mbox cmd response: success
17,623,932 UART: [afmc] ++
17,624,530 UART: [afmc] CDI.KEYID = 6
17,625,449 UART: [afmc] SUBJECT.KEYID = 7
17,626,671 UART: [afmc] AUTHORITY.KEYID = 5
20,988,886 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,847 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,105 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,518 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,370 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,762 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,684 UART: [afmc] --
23,357,419 UART: [cold-reset] --
23,362,831 UART: [state] Locking Datavault
23,368,896 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,652 UART: [state] Locking ICCM
23,372,265 UART: [exit] Launching FMC @ 0x40000130
23,380,614 UART:
23,380,850 UART: Running Caliptra FMC ...
23,381,953 UART:
23,382,114 UART: [state] CFI Enabled
23,447,184 UART: [fht] FMC Alias Private Key: 7
25,785,495 UART: [art] Extend RT PCRs Done
25,786,713 UART: [art] Lock RT PCRs Done
25,788,096 UART: [art] Populate DV Done
25,793,454 UART: [fht] FMC Alias Private Key: 7
25,794,993 UART: [art] Derive CDI
25,795,754 UART: [art] Store in in slot 0x4
25,855,897 UART: [art] Derive Key Pair
25,856,933 UART: [art] Store priv key in slot 0x5
29,150,174 UART: [art] Derive Key Pair - Done
29,162,951 UART: [art] Signing Cert with AUTHO
29,164,257 UART: RITY.KEYID = 7
31,452,088 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,600 UART: [art] PUB.X = 0EDFA6CED04C6A4CD6C9331FDC6A9F3B00800B832340AB51293856EAEFB91FE80D868DF7B90505F3F97440D49A1CD5E4
31,460,848 UART: [art] PUB.Y = ED6644BCCB39227BC21833DB0782ECA5663929F1473ECF1FBF40AC8DA63AFB569113B11DB471B7D13CD73253AE773460
31,468,087 UART: [art] SIG.R = 58C1F411B3F03FB55F628672EE04A91D4B924B3E7B6489C8E7BBB9FA41C96823B1F87164B6927E3F90B7D09F39C3D8D5
31,475,476 UART: [art] SIG.S = 764327291F32B6B420D564C4BDC42CA5A6870722851BF0DB386B166B3C34996E454E30ACA4744752FC99CE50718BD64C
32,780,702 UART: Caliptra RT
32,781,403 UART: [state] CFI Enabled
32,942,239 UART: [rt] RT listening for mailbox commands...
32,944,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,975,182 UART: [rt]cmd =0x44504543, len=96
38,738,563 >>> mbox cmd response data (6236 bytes)
38,767,664 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,798,234 UART: [rt]cmd =0x53574545, len=84
44,384,489 >>> mbox cmd response data (200 bytes)
44,771,535 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,802,417 UART: [rt]cmd =0x44504543, len=96
44,832,841 >>> mbox cmd response data (56 bytes)
44,833,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,864,160 UART: [rt]cmd =0x44504543, len=96
44,914,638 >>> mbox cmd response data (24 bytes)
44,915,233 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,945,699 UART: [rt]cmd =0x53574545, len=84
50,527,055 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,804,662 ready_for_fw is high
3,805,086 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,870,213 >>> mbox cmd response: success
23,564,779 UART:
23,565,158 UART: Running Caliptra FMC ...
23,566,357 UART:
23,566,529 UART: [state] CFI Enabled
23,634,650 UART: [fht] FMC Alias Private Key: 7
25,972,321 UART: [art] Extend RT PCRs Done
25,973,541 UART: [art] Lock RT PCRs Done
25,975,121 UART: [art] Populate DV Done
25,980,214 UART: [fht] FMC Alias Private Key: 7
25,981,756 UART: [art] Derive CDI
25,982,574 UART: [art] Store in in slot 0x4
26,042,331 UART: [art] Derive Key Pair
26,043,390 UART: [art] Store priv key in slot 0x5
29,335,774 UART: [art] Derive Key Pair - Done
29,348,825 UART: [art] Signing Cert with AUTHO
29,350,133 UART: RITY.KEYID = 7
31,638,467 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,974 UART: [art] PUB.X = F50111B7005BA80C204FA77DCADA4B3CFC6DA09DEBB2807BA64798794E85D03A6523A7BF762F82F0FE373DB5AC5E38E8
31,647,186 UART: [art] PUB.Y = 7BDA2AD8906F433A7573B214A030CE757BED717E4192E6F970D676F63E8385FEF24C2C51F2E101026B388228F6CD57F5
31,654,447 UART: [art] SIG.R = BB44F61280848F26A834C6F0E5F7652F808CD39A5E6FCEAB65A1671B4CC7A5440E8FFA966EAA1E33D22DE90E34059209
31,661,870 UART: [art] SIG.S = B8FABE6FB407417B69D7514CEFD06B847CA8B5D53B710DED1C694A5EED44471D9BC0CB134F1BEAC9D3CA69AC9859B733
32,967,672 UART: Caliptra RT
32,968,391 UART: [state] CFI Enabled
33,128,639 UART: [rt] RT listening for mailbox commands...
33,131,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,161,553 UART: [rt]cmd =0x44504543, len=96
38,945,432 >>> mbox cmd response data (6236 bytes)
38,974,480 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,004,909 UART: [rt]cmd =0x53574545, len=84
44,589,277 >>> mbox cmd response data (200 bytes)
44,975,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,006,478 UART: [rt]cmd =0x44504543, len=96
45,037,341 >>> mbox cmd response data (56 bytes)
45,038,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,068,709 UART: [rt]cmd =0x44504543, len=96
45,118,707 >>> mbox cmd response data (24 bytes)
45,119,278 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,149,583 UART: [rt]cmd =0x53574545, len=84
50,732,152 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,437 UART:
192,789 UART: Running Caliptra ROM ...
193,980 UART:
603,477 UART: [state] CFI Enabled
615,655 UART: [state] LifecycleState = Unprovisioned
617,605 UART: [state] DebugLocked = No
619,191 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,815 UART: [kat] SHA2-256
794,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,081 UART: [kat] ++
805,599 UART: [kat] sha1
817,886 UART: [kat] SHA2-256
820,602 UART: [kat] SHA2-384
826,735 UART: [kat] SHA2-512-ACC
829,094 UART: [kat] ECC-384
3,112,811 UART: [kat] HMAC-384Kdf
3,124,830 UART: [kat] LMS
4,314,919 UART: [kat] --
4,318,556 UART: [cold-reset] ++
4,320,618 UART: [fht] Storing FHT @ 0x50003400
4,332,515 UART: [idev] ++
4,333,150 UART: [idev] CDI.KEYID = 6
4,334,021 UART: [idev] SUBJECT.KEYID = 7
4,335,298 UART: [idev] UDS.KEYID = 0
4,336,328 ready_for_fw is high
4,336,518 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,825 UART: [idev] Erasing UDS.KEYID = 0
7,627,669 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,212 UART: [idev] --
7,653,507 UART: [ldev] ++
7,654,066 UART: [ldev] CDI.KEYID = 6
7,655,081 UART: [ldev] SUBJECT.KEYID = 5
7,656,290 UART: [ldev] AUTHORITY.KEYID = 7
7,657,517 UART: [ldev] FE.KEYID = 1
7,670,987 UART: [ldev] Erasing FE.KEYID = 1
10,954,766 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,914 UART: [ldev] --
13,314,144 UART: [fwproc] Waiting for Commands...
13,316,013 UART: [fwproc] Received command 0x46574c44
13,318,246 UART: [fwproc] Received Image of size 114124 bytes
17,373,181 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,096 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,985 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,831,711 >>> mbox cmd response: success
17,835,594 UART: [afmc] ++
17,836,244 UART: [afmc] CDI.KEYID = 6
17,837,295 UART: [afmc] SUBJECT.KEYID = 7
17,838,395 UART: [afmc] AUTHORITY.KEYID = 5
21,156,252 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,464 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,712 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,103 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,928 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,367 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,278 UART: [afmc] --
23,521,095 UART: [cold-reset] --
23,525,133 UART: [state] Locking Datavault
23,530,597 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,348 UART: [state] Locking ICCM
23,534,384 UART: [exit] Launching FMC @ 0x40000130
23,542,773 UART:
23,543,011 UART: Running Caliptra FMC ...
23,544,111 UART:
23,544,268 UART: [state] CFI Enabled
23,552,468 UART: [fht] FMC Alias Private Key: 7
25,882,875 UART: [art] Extend RT PCRs Done
25,884,094 UART: [art] Lock RT PCRs Done
25,886,026 UART: [art] Populate DV Done
25,891,330 UART: [fht] FMC Alias Private Key: 7
25,892,820 UART: [art] Derive CDI
25,893,578 UART: [art] Store in in slot 0x4
25,936,328 UART: [art] Derive Key Pair
25,937,369 UART: [art] Store priv key in slot 0x5
29,179,342 UART: [art] Derive Key Pair - Done
29,192,274 UART: [art] Signing Cert with AUTHO
29,193,577 UART: RITY.KEYID = 7
31,473,246 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,750 UART: [art] PUB.X = C00164B108B3790385EDA5016E4C2D0F6D173CE8AB42D8261F08AC866D18CB9D279B5BA0D9531FA4AA988DF81B5621B5
31,481,982 UART: [art] PUB.Y = 8927DBA54E51B07A3B405CC1B092ADD73710EC0A82A7D71B19FFDB98601CAC82A706EED83DD036AD5F2544A724D9EACA
31,489,243 UART: [art] SIG.R = D539F28297AC26A77896D800ECC73242361F63FD97319A64B9A30921D8E033A556199781B270B68610712E4657905810
31,496,554 UART: [art] SIG.S = 44CAA1C43D4B5B5F7C402BBEEB10675E88C469E6284CFA2D3C60507F712731F58A965F7E057C39FF3EC4BAD3241B865C
32,801,650 UART: Caliptra RT
32,802,356 UART: [state] CFI Enabled
32,920,142 UART: [rt] RT listening for mailbox commands...
32,922,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,952,988 UART: [rt]cmd =0x44504543, len=96
38,625,477 >>> mbox cmd response data (6236 bytes)
38,654,812 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,685,635 UART: [rt]cmd =0x53574545, len=84
44,210,053 >>> mbox cmd response data (200 bytes)
44,601,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,632,763 UART: [rt]cmd =0x44504543, len=96
44,664,061 >>> mbox cmd response data (56 bytes)
44,664,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,695,602 UART: [rt]cmd =0x44504543, len=96
44,734,342 >>> mbox cmd response data (24 bytes)
44,734,940 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,765,299 UART: [rt]cmd =0x53574545, len=84
50,289,634 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,126,082 ready_for_fw is high
4,126,533 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,065,178 >>> mbox cmd response: success
23,699,934 UART:
23,700,340 UART: Running Caliptra FMC ...
23,701,440 UART:
23,701,593 UART: [state] CFI Enabled
23,710,124 UART: [fht] FMC Alias Private Key: 7
26,040,920 UART: [art] Extend RT PCRs Done
26,042,141 UART: [art] Lock RT PCRs Done
26,043,601 UART: [art] Populate DV Done
26,048,911 UART: [fht] FMC Alias Private Key: 7
26,050,512 UART: [art] Derive CDI
26,051,276 UART: [art] Store in in slot 0x4
26,093,723 UART: [art] Derive Key Pair
26,094,758 UART: [art] Store priv key in slot 0x5
29,336,668 UART: [art] Derive Key Pair - Done
29,349,661 UART: [art] Signing Cert with AUTHO
29,350,964 UART: RITY.KEYID = 7
31,630,530 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,032 UART: [art] PUB.X = DD14154990FCACD2619BE63109B40EBAE1BAFA57A4040ABBB743680D965FCDD21649F1AA96B0DEE4E15B1860A1FFBA43
31,639,266 UART: [art] PUB.Y = 18A6EE1DC3F3C0386C67613603EDE845CBAAA0656F46F3A06A673350F2E7626292087CB537B959B9309E82F290A0C95E
31,646,538 UART: [art] SIG.R = B26F66F8058258A96072A409797B2947C1BD2449472BF502EEC95F62997A744D0E507838C56588B3EA5BF08B90551369
31,653,864 UART: [art] SIG.S = 2D1C35E7C18E34BD2F6CD372D4E15215C25DFE0BFF0D1407BDF1156F655EBA3EFF99EAAC38BB75D6A3CA29A561347708
32,959,386 UART: Caliptra RT
32,960,102 UART: [state] CFI Enabled
33,077,505 UART: [rt] RT listening for mailbox commands...
33,079,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,110,434 UART: [rt]cmd =0x44504543, len=96
38,783,723 >>> mbox cmd response data (6236 bytes)
38,812,981 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,843,602 UART: [rt]cmd =0x53574545, len=84
44,368,690 >>> mbox cmd response data (200 bytes)
44,761,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,792,410 UART: [rt]cmd =0x44504543, len=96
44,824,027 >>> mbox cmd response data (56 bytes)
44,824,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,855,271 UART: [rt]cmd =0x44504543, len=96
44,893,195 >>> mbox cmd response data (24 bytes)
44,893,807 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,924,109 UART: [rt]cmd =0x53574545, len=84
50,448,312 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
192,247 UART:
192,618 UART: Running Caliptra ROM ...
193,730 UART:
193,874 UART: [state] CFI Enabled
263,667 UART: [state] LifecycleState = Unprovisioned
265,612 UART: [state] DebugLocked = No
267,423 UART: [state] WD Timer not started. Device not locked for debugging
271,523 UART: [kat] SHA2-256
450,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,243 UART: [kat] ++
462,776 UART: [kat] sha1
474,156 UART: [kat] SHA2-256
477,228 UART: [kat] SHA2-384
483,499 UART: [kat] SHA2-512-ACC
486,502 UART: [kat] ECC-384
2,948,023 UART: [kat] HMAC-384Kdf
2,970,921 UART: [kat] LMS
3,500,346 UART: [kat] --
3,504,775 UART: [cold-reset] ++
3,506,139 UART: [fht] FHT @ 0x50003400
3,517,701 UART: [idev] ++
3,518,280 UART: [idev] CDI.KEYID = 6
3,519,163 UART: [idev] SUBJECT.KEYID = 7
3,520,400 UART: [idev] UDS.KEYID = 0
3,521,301 ready_for_fw is high
3,521,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,797 UART: [idev] Erasing UDS.KEYID = 0
6,026,857 UART: [idev] Sha1 KeyId Algorithm
6,049,407 UART: [idev] --
6,053,511 UART: [ldev] ++
6,054,084 UART: [ldev] CDI.KEYID = 6
6,055,012 UART: [ldev] SUBJECT.KEYID = 5
6,056,177 UART: [ldev] AUTHORITY.KEYID = 7
6,057,463 UART: [ldev] FE.KEYID = 1
6,092,849 UART: [ldev] Erasing FE.KEYID = 1
8,596,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,604 UART: [ldev] --
10,404,893 UART: [fwproc] Wait for Commands...
10,406,879 UART: [fwproc] Recv command 0x46574c44
10,408,918 UART: [fwproc] Recv'd Img size: 114448 bytes
13,813,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,275,354 >>> mbox cmd response: success
14,280,495 UART: [afmc] ++
14,281,100 UART: [afmc] CDI.KEYID = 6
14,282,013 UART: [afmc] SUBJECT.KEYID = 7
14,283,183 UART: [afmc] AUTHORITY.KEYID = 5
16,822,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,544,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,546,022 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,561,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,577,832 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,593,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,616,722 UART: [afmc] --
18,620,692 UART: [cold-reset] --
18,625,522 UART: [state] Locking Datavault
18,630,717 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,360 UART: [state] Locking ICCM
18,634,669 UART: [exit] Launching FMC @ 0x40000130
18,643,117 UART:
18,643,350 UART: Running Caliptra FMC ...
18,644,451 UART:
18,644,616 UART: [state] CFI Enabled
18,703,845 UART: [fht] FMC Alias Private Key: 7
20,468,022 UART: [art] Extend RT PCRs Done
20,469,246 UART: [art] Lock RT PCRs Done
20,470,869 UART: [art] Populate DV Done
20,476,597 UART: [fht] FMC Alias Private Key: 7
20,478,237 UART: [art] Derive CDI
20,479,050 UART: [art] Store in in slot 0x4
20,536,907 UART: [art] Derive Key Pair
20,537,945 UART: [art] Store priv key in slot 0x5
23,000,540 UART: [art] Derive Key Pair - Done
23,013,535 UART: [art] Signing Cert with AUTHO
23,014,836 UART: RITY.KEYID = 7
24,726,864 UART: [art] Erasing AUTHORITY.KEYID = 7
24,728,373 UART: [art] PUB.X = BE4A40338E5B2D7B7E6B3A35504D36309A0E29FCEBF9B2244B3A711758CFE1370EAED0C7BB47CE4AD0D4F18907A27876
24,735,653 UART: [art] PUB.Y = E2889F33942CDC39D3F1A6D05DBC47DD0630C7A5241774DF7333120F8735AB63463A3C5D66036AB355032043AFD540C5
24,742,904 UART: [art] SIG.R = 4E435E35857F4B89C3F83DDDF31F00C6737FC5952C1366E2228583A788A0D816EB484A21AFDC840173A34C891AA30A3A
24,750,260 UART: [art] SIG.S = 20EA3A011459631FBEB06265603113D00B62BA742D7D7B302C010E0A3F9DDBE53A4BD7486481050273D1EB40F5F01185
25,729,289 UART: Caliptra RT
25,729,994 UART: [state] CFI Enabled
25,894,635 UART: [rt] RT listening for mailbox commands...
25,897,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,928,466 UART: [rt]cmd =0x44504543, len=96
30,308,058 >>> mbox cmd response data (6236 bytes)
30,337,314 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,367,881 UART: [rt]cmd =0x53574545, len=84
34,546,725 >>> mbox cmd response data (200 bytes)
34,928,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,959,401 UART: [rt]cmd =0x44504543, len=96
34,990,386 >>> mbox cmd response data (56 bytes)
34,991,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,021,748 UART: [rt]cmd =0x44504543, len=96
35,074,972 >>> mbox cmd response data (24 bytes)
35,075,581 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,106,157 UART: [rt]cmd =0x53574545, len=84
39,282,952 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,362,634 ready_for_fw is high
3,363,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,055,929 >>> mbox cmd response: success
18,343,401 UART:
18,343,788 UART: Running Caliptra FMC ...
18,344,993 UART:
18,345,163 UART: [state] CFI Enabled
18,413,222 UART: [fht] FMC Alias Private Key: 7
20,177,551 UART: [art] Extend RT PCRs Done
20,178,775 UART: [art] Lock RT PCRs Done
20,180,513 UART: [art] Populate DV Done
20,185,771 UART: [fht] FMC Alias Private Key: 7
20,187,362 UART: [art] Derive CDI
20,188,178 UART: [art] Store in in slot 0x4
20,246,320 UART: [art] Derive Key Pair
20,247,356 UART: [art] Store priv key in slot 0x5
22,710,383 UART: [art] Derive Key Pair - Done
22,723,172 UART: [art] Signing Cert with AUTHO
22,724,482 UART: RITY.KEYID = 7
24,436,316 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,819 UART: [art] PUB.X = 75511A6D66EB0511E67DE9C2AC81306F1AFB0B2926B092926348BAC4032A0F0486F372BAE503489D72C84D264F54FE98
24,445,106 UART: [art] PUB.Y = 4FF0ABBA886117723EB388C7B45B0376EECBDD406074413478B34A7DD29A8ED521D5E2E18848C05CC47AFBFBE73D3E33
24,452,362 UART: [art] SIG.R = 151DA6A9B01EF2EF8C7AA4D215306F12022108C356F6D0E06808292985A765EF8128BF6F2F6869C58DDEFDDAE1602C4A
24,459,710 UART: [art] SIG.S = BA9C2F8A28E622F8C79F73C9B64EB6A561757AA671BB982739AA7DB58950832A24A5780C593374A0119DDB29A6F9A67A
25,438,548 UART: Caliptra RT
25,439,238 UART: [state] CFI Enabled
25,605,878 UART: [rt] RT listening for mailbox commands...
25,608,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,639,308 UART: [rt]cmd =0x44504543, len=96
30,017,661 >>> mbox cmd response data (6236 bytes)
30,047,110 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,077,464 UART: [rt]cmd =0x53574545, len=84
34,256,332 >>> mbox cmd response data (200 bytes)
34,640,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,671,206 UART: [rt]cmd =0x44504543, len=96
34,702,241 >>> mbox cmd response data (56 bytes)
34,703,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,733,730 UART: [rt]cmd =0x44504543, len=96
34,784,930 >>> mbox cmd response data (24 bytes)
34,785,531 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,816,106 UART: [rt]cmd =0x53574545, len=84
38,993,073 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,330 UART:
192,709 UART: Running Caliptra ROM ...
193,845 UART:
603,282 UART: [state] CFI Enabled
619,290 UART: [state] LifecycleState = Unprovisioned
621,166 UART: [state] DebugLocked = No
623,315 UART: [state] WD Timer not started. Device not locked for debugging
627,830 UART: [kat] SHA2-256
806,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,514 UART: [kat] ++
818,954 UART: [kat] sha1
831,614 UART: [kat] SHA2-256
834,611 UART: [kat] SHA2-384
841,514 UART: [kat] SHA2-512-ACC
844,442 UART: [kat] ECC-384
3,284,870 UART: [kat] HMAC-384Kdf
3,297,386 UART: [kat] LMS
3,826,903 UART: [kat] --
3,830,326 UART: [cold-reset] ++
3,831,181 UART: [fht] FHT @ 0x50003400
3,843,570 UART: [idev] ++
3,844,134 UART: [idev] CDI.KEYID = 6
3,845,033 UART: [idev] SUBJECT.KEYID = 7
3,846,271 UART: [idev] UDS.KEYID = 0
3,847,188 ready_for_fw is high
3,847,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,470 UART: [idev] Erasing UDS.KEYID = 0
6,320,490 UART: [idev] Sha1 KeyId Algorithm
6,343,319 UART: [idev] --
6,348,114 UART: [ldev] ++
6,348,680 UART: [ldev] CDI.KEYID = 6
6,349,594 UART: [ldev] SUBJECT.KEYID = 5
6,350,744 UART: [ldev] AUTHORITY.KEYID = 7
6,352,022 UART: [ldev] FE.KEYID = 1
6,363,109 UART: [ldev] Erasing FE.KEYID = 1
8,842,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,327 UART: [ldev] --
10,633,774 UART: [fwproc] Wait for Commands...
10,635,381 UART: [fwproc] Recv command 0x46574c44
10,637,485 UART: [fwproc] Recv'd Img size: 114448 bytes
14,040,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,119,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,188,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,507,558 >>> mbox cmd response: success
14,511,549 UART: [afmc] ++
14,512,146 UART: [afmc] CDI.KEYID = 6
14,513,051 UART: [afmc] SUBJECT.KEYID = 7
14,514,207 UART: [afmc] AUTHORITY.KEYID = 5
17,012,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,731,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,733,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,749,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,765,179 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,781,067 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,804,472 UART: [afmc] --
18,807,537 UART: [cold-reset] --
18,809,235 UART: [state] Locking Datavault
18,813,512 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,205 UART: [state] Locking ICCM
18,817,294 UART: [exit] Launching FMC @ 0x40000130
18,825,736 UART:
18,825,962 UART: Running Caliptra FMC ...
18,827,052 UART:
18,827,209 UART: [state] CFI Enabled
18,835,572 UART: [fht] FMC Alias Private Key: 7
20,592,693 UART: [art] Extend RT PCRs Done
20,593,896 UART: [art] Lock RT PCRs Done
20,595,483 UART: [art] Populate DV Done
20,600,827 UART: [fht] FMC Alias Private Key: 7
20,602,932 UART: [art] Derive CDI
20,603,717 UART: [art] Store in in slot 0x4
20,645,972 UART: [art] Derive Key Pair
20,646,980 UART: [art] Store priv key in slot 0x5
23,073,678 UART: [art] Derive Key Pair - Done
23,086,723 UART: [art] Signing Cert with AUTHO
23,088,057 UART: RITY.KEYID = 7
24,793,237 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,728 UART: [art] PUB.X = D0BEAEDAE5A40B2EDB84FCFE2FF287DB7EF497E6F07A4F4B39B8C4C133B0361C58ADA62D2716AC2CDDE7AA8151BB9179
24,802,008 UART: [art] PUB.Y = 6652A23BAAA50F1186CACBEA71065F7CCCBE69FC099B6D89C83FA9309606545F403BA50DE960B3B1F614C0CDC489E0AD
24,809,341 UART: [art] SIG.R = 8339D6515F0BB0F36D4658FA5217A801DCA9F2D5CB865F50787335CC197FA95B1EAE8F712E7EF905ABC9052CB2C32199
24,816,717 UART: [art] SIG.S = 3419F482B3754C31D92CF0C7CD27623F6373F68A3D506F69257D3EE87BD0BE5B50D38FB01BAFC262D4C79EFBDD8453F1
25,795,515 UART: Caliptra RT
25,796,208 UART: [state] CFI Enabled
25,913,220 UART: [rt] RT listening for mailbox commands...
25,915,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,946,258 UART: [rt]cmd =0x44504543, len=96
30,231,312 >>> mbox cmd response data (6236 bytes)
30,260,465 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,291,185 UART: [rt]cmd =0x53574545, len=84
34,427,017 >>> mbox cmd response data (200 bytes)
34,817,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,848,716 UART: [rt]cmd =0x44504543, len=96
34,879,667 >>> mbox cmd response data (56 bytes)
34,880,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,910,911 UART: [rt]cmd =0x44504543, len=96
34,949,168 >>> mbox cmd response data (24 bytes)
34,949,756 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,980,273 UART: [rt]cmd =0x53574545, len=84
39,115,534 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,695,497 ready_for_fw is high
3,695,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,585 >>> mbox cmd response: success
18,519,356 UART:
18,519,808 UART: Running Caliptra FMC ...
18,520,918 UART:
18,521,062 UART: [state] CFI Enabled
18,529,057 UART: [fht] FMC Alias Private Key: 7
20,285,484 UART: [art] Extend RT PCRs Done
20,286,705 UART: [art] Lock RT PCRs Done
20,288,489 UART: [art] Populate DV Done
20,293,955 UART: [fht] FMC Alias Private Key: 7
20,295,601 UART: [art] Derive CDI
20,296,408 UART: [art] Store in in slot 0x4
20,338,888 UART: [art] Derive Key Pair
20,339,887 UART: [art] Store priv key in slot 0x5
22,767,608 UART: [art] Derive Key Pair - Done
22,780,664 UART: [art] Signing Cert with AUTHO
22,781,997 UART: RITY.KEYID = 7
24,487,627 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,133 UART: [art] PUB.X = 61BA07EEA56A93E049B82365719A9E8A43DB19E92ED4DAADBA54D86E072354DA77BAC8D528205CDE294B35C780888977
24,496,401 UART: [art] PUB.Y = 8A52BC48B1A5C7D3B62DE53642526CB88BC316713197E82E2949C34EF2780B48D3A2C303F741BCB9BA00A45DA137C9B5
24,503,640 UART: [art] SIG.R = F69A1165CAFC20A96A0FC43B9570EB1B3640B0765976F9108790C90075C69CD4B4C87387FAF6DD07D92C6E99009A886E
24,511,032 UART: [art] SIG.S = 7054D052AC116C415C00C6EF39270F234FD8D9B5D8ED0622EE7B57A1342744FB6FB5F1191A9587ED27EFA47114EB0E6A
25,489,385 UART: Caliptra RT
25,490,097 UART: [state] CFI Enabled
25,607,975 UART: [rt] RT listening for mailbox commands...
25,610,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,641,114 UART: [rt]cmd =0x44504543, len=96
29,924,244 >>> mbox cmd response data (6236 bytes)
29,953,758 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,984,438 UART: [rt]cmd =0x53574545, len=84
34,119,642 >>> mbox cmd response data (200 bytes)
34,510,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,540,950 UART: [rt]cmd =0x44504543, len=96
34,571,716 >>> mbox cmd response data (56 bytes)
34,572,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,603,043 UART: [rt]cmd =0x44504543, len=96
34,641,874 >>> mbox cmd response data (24 bytes)
34,642,440 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,672,876 UART: [rt]cmd =0x53574545, len=84
38,807,665 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,439,334 ready_for_fw is high
3,439,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,287 >>> mbox cmd response: success
19,023,731 UART:
19,024,132 UART: Running Caliptra FMC ...
19,025,341 UART:
19,025,514 UART: [state] CFI Enabled
19,093,466 UART: [fht] FMC Alias Private Key: 7
20,857,654 UART: [art] Extend RT PCRs Done
20,858,877 UART: [art] Lock RT PCRs Done
20,860,418 UART: [art] Populate DV Done
20,865,886 UART: [fht] FMC Alias Private Key: 7
20,867,497 UART: [art] Derive CDI
20,868,271 UART: [art] Store in in slot 0x4
20,926,784 UART: [art] Derive Key Pair
20,927,788 UART: [art] Store priv key in slot 0x5
23,391,229 UART: [art] Derive Key Pair - Done
23,404,173 UART: [art] Signing Cert with AUTHO
23,405,479 UART: RITY.KEYID = 7
25,116,338 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,844 UART: [art] PUB.X = 2690030AEEF47D2CCB09C35E1A314133754516D9C695923815F1B42CABDB03282828086BCAE64F5874B42A2F2857B879
25,125,094 UART: [art] PUB.Y = AE01CB56CA51C688BEB7FFB904ACE038C1F36F49AD1FAE2E95C862903F48C2D826524089C116F1A3ADC748F5412CBE8A
25,132,345 UART: [art] SIG.R = D9A4A99C50816A536033B8507DD9C8E8E86F3F946ED1B26DADB361D311EF2CCB1D584A8C39A519B4D7A1A114F1FA9113
25,139,784 UART: [art] SIG.S = DB968D058D746CC10A7FE8741C6748D628C76EA37F8F6878AB1AC3141D942F88672DE8B73FD556CA1B0E79EFC8EEBA63
26,118,867 UART: Caliptra RT
26,119,584 UART: [state] CFI Enabled
26,284,416 UART: [rt] RT listening for mailbox commands...
26,286,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,318,103 UART: [rt]cmd =0x44504543, len=96
30,698,101 >>> mbox cmd response data (6236 bytes)
30,727,308 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,757,980 UART: [rt]cmd =0x53574545, len=84
34,936,041 >>> mbox cmd response data (200 bytes)
35,321,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,352,371 UART: [rt]cmd =0x44504543, len=96
35,383,592 >>> mbox cmd response data (56 bytes)
35,384,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,414,884 UART: [rt]cmd =0x44504543, len=96
35,463,716 >>> mbox cmd response data (24 bytes)
35,464,317 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,494,456 UART: [rt]cmd =0x53574545, len=84
39,670,999 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,758,566 ready_for_fw is high
3,758,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,963,228 >>> mbox cmd response: success
19,213,553 UART:
19,213,956 UART: Running Caliptra FMC ...
19,215,064 UART:
19,215,216 UART: [state] CFI Enabled
19,223,216 UART: [fht] FMC Alias Private Key: 7
20,980,390 UART: [art] Extend RT PCRs Done
20,981,612 UART: [art] Lock RT PCRs Done
20,983,532 UART: [art] Populate DV Done
20,988,937 UART: [fht] FMC Alias Private Key: 7
20,990,363 UART: [art] Derive CDI
20,991,108 UART: [art] Store in in slot 0x4
21,033,705 UART: [art] Derive Key Pair
21,034,749 UART: [art] Store priv key in slot 0x5
23,460,872 UART: [art] Derive Key Pair - Done
23,473,813 UART: [art] Signing Cert with AUTHO
23,475,303 UART: RITY.KEYID = 7
25,180,625 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,135 UART: [art] PUB.X = 19330844F2C6CF87E1093BFA3686721E5A81BD0AF0091B89AEB1ABBA9BFD4BF81D43C02C1D9A7FAF3102CE5A8F89B162
25,189,424 UART: [art] PUB.Y = 6A6AA3B7CBA6D3CF148C6591BC6F6235553471EEAE292F49809DCB1B7282B35EDBB8579738AF2709C65EC68411E540BA
25,196,710 UART: [art] SIG.R = 597A9E23547A180FD5A6D0742179C529C4789DED57C2565BCDB30A0953F9622CAB1F33D5E7B54E47B7B26CCB329F0026
25,204,079 UART: [art] SIG.S = EF771D2829AA708347B0F095C3F8E32EC8325DB171F7B0D940CA55EEAA4DA400C7F2F3CD7CCBC630D675A5CF4E49C0A4
26,183,111 UART: Caliptra RT
26,183,800 UART: [state] CFI Enabled
26,301,447 UART: [rt] RT listening for mailbox commands...
26,303,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,334,477 UART: [rt]cmd =0x44504543, len=96
30,618,106 >>> mbox cmd response data (6236 bytes)
30,647,149 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,677,866 UART: [rt]cmd =0x53574545, len=84
34,813,234 >>> mbox cmd response data (200 bytes)
35,205,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,236,901 UART: [rt]cmd =0x44504543, len=96
35,267,927 >>> mbox cmd response data (56 bytes)
35,268,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,299,420 UART: [rt]cmd =0x44504543, len=96
35,337,679 >>> mbox cmd response data (24 bytes)
35,338,295 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,368,835 UART: [rt]cmd =0x53574545, len=84
39,503,643 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,851 UART: [kat] SHA2-256
881,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,897 UART: [kat] ++
886,049 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
895,084 UART: [kat] SHA2-512-ACC
896,985 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
907,166 UART: [kat] LMS
1,475,362 UART: [kat] --
1,476,085 UART: [cold-reset] ++
1,476,437 UART: [fht] Storing FHT @ 0x50003400
1,479,124 UART: [idev] ++
1,479,292 UART: [idev] CDI.KEYID = 6
1,479,652 UART: [idev] SUBJECT.KEYID = 7
1,480,076 UART: [idev] UDS.KEYID = 0
1,480,421 ready_for_fw is high
1,480,421 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,966 UART: [idev] Erasing UDS.KEYID = 0
1,504,004 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,486 UART: [idev] --
1,513,537 UART: [ldev] ++
1,513,705 UART: [ldev] CDI.KEYID = 6
1,514,068 UART: [ldev] SUBJECT.KEYID = 5
1,514,494 UART: [ldev] AUTHORITY.KEYID = 7
1,514,957 UART: [ldev] FE.KEYID = 1
1,520,099 UART: [ldev] Erasing FE.KEYID = 1
1,545,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,416 UART: [ldev] --
1,584,877 UART: [fwproc] Waiting for Commands...
1,585,698 UART: [fwproc] Received command 0x46574c44
1,586,489 UART: [fwproc] Received Image of size 114448 bytes
2,885,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,296 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,648 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,593 >>> mbox cmd response: success
3,078,655 UART: [afmc] ++
3,078,823 UART: [afmc] CDI.KEYID = 6
3,079,185 UART: [afmc] SUBJECT.KEYID = 7
3,079,610 UART: [afmc] AUTHORITY.KEYID = 5
3,114,043 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,215 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,995 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,723 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,608 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,298 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,165 UART: [afmc] --
3,157,111 UART: [cold-reset] --
3,157,889 UART: [state] Locking Datavault
3,159,048 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,652 UART: [state] Locking ICCM
3,160,278 UART: [exit] Launching FMC @ 0x40000130
3,165,607 UART:
3,165,623 UART: Running Caliptra FMC ...
3,166,031 UART:
3,166,085 UART: [state] CFI Enabled
3,176,924 UART: [fht] FMC Alias Private Key: 7
3,285,023 UART: [art] Extend RT PCRs Done
3,285,451 UART: [art] Lock RT PCRs Done
3,287,247 UART: [art] Populate DV Done
3,295,432 UART: [fht] FMC Alias Private Key: 7
3,296,586 UART: [art] Derive CDI
3,296,866 UART: [art] Store in in slot 0x4
3,382,175 UART: [art] Derive Key Pair
3,382,535 UART: [art] Store priv key in slot 0x5
3,395,939 UART: [art] Derive Key Pair - Done
3,410,915 UART: [art] Signing Cert with AUTHO
3,411,395 UART: RITY.KEYID = 7
3,426,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,880 UART: [art] PUB.X = 566F6BC97138A0A164F08FB1DD834C31F8776BB2C3307F4CD443F5F9DDD82048987E54584AF85592AADB95D7A48B91D9
3,433,656 UART: [art] PUB.Y = EB639A99BE080B7A0AA0218FC37D4CF9E0E9DC58ED96D16120FF181833E2D6BF0E82E3178FDF14C38AED1159BD3211A8
3,440,610 UART: [art] SIG.R = 83DAD26245AD8F155D431C026C2D0E4FFFB09A03FBA271F08EF5AD3C841F6886155A0AADD3D69F776A25BCB762CCF13F
3,447,388 UART: [art] SIG.S = C6795DE3000243533A21E7784DFD71B5BF79C4BBA9936BB3029F688A38CAD1EA084B56AD660951B072787BF018D3E020
3,470,779 UART: Caliptra RT
3,471,032 UART: [state] CFI Enabled
3,579,692 UART: [rt] RT listening for mailbox commands...
3,580,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,874 UART: [rt]cmd =0x44504543, len=96
3,791,685 >>> mbox cmd response data (6236 bytes)
3,791,686 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,381 UART: [rt]cmd =0x53574545, len=84
3,846,175 >>> mbox cmd response data (200 bytes)
3,846,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,061 UART: [rt]cmd =0x44504543, len=96
3,908,571 >>> mbox cmd response data (56 bytes)
3,908,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,519 UART: [rt]cmd =0x44504543, len=96
3,978,568 >>> mbox cmd response data (24 bytes)
3,978,569 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,008,448 UART: [rt]cmd =0x53574545, len=84
4,034,138 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,743 ready_for_fw is high
1,361,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,149 >>> mbox cmd response: success
2,988,037 UART:
2,988,053 UART: Running Caliptra FMC ...
2,988,461 UART:
2,988,515 UART: [state] CFI Enabled
2,999,140 UART: [fht] FMC Alias Private Key: 7
3,106,721 UART: [art] Extend RT PCRs Done
3,107,149 UART: [art] Lock RT PCRs Done
3,108,421 UART: [art] Populate DV Done
3,116,818 UART: [fht] FMC Alias Private Key: 7
3,117,916 UART: [art] Derive CDI
3,118,196 UART: [art] Store in in slot 0x4
3,204,227 UART: [art] Derive Key Pair
3,204,587 UART: [art] Store priv key in slot 0x5
3,218,107 UART: [art] Derive Key Pair - Done
3,232,865 UART: [art] Signing Cert with AUTHO
3,233,345 UART: RITY.KEYID = 7
3,248,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,262 UART: [art] PUB.X = 465334F5AF4B37A8513779129F9222CEEB06CF2B98C8D836C7D250E7EE47C35CA95A7E9B193C024949CD31D633FA1A0A
3,256,029 UART: [art] PUB.Y = 133AB7E65A48D043C7127CD174ABE56333212DABFCD0DCE53CD0EB28360BD7F394072B87202029FF75EC81D6AA040867
3,262,975 UART: [art] SIG.R = E02E658AA2FDCAAFC2ED0397C2A49B1395FDC23939B62955E8A1973E010ABF4613DE66AA69C7BD8F560529642FBF86AE
3,269,749 UART: [art] SIG.S = A95D58A52E07B6BC80A8360EB3C9D61DAC2B39FEB171BE3D6361ABAAAE05F679660A4AE1B4C5387B211BBE3B72616038
3,293,382 UART: Caliptra RT
3,293,635 UART: [state] CFI Enabled
3,401,545 UART: [rt] RT listening for mailbox commands...
3,402,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,799 UART: [rt]cmd =0x44504543, len=96
3,613,635 >>> mbox cmd response data (6236 bytes)
3,613,636 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,433 UART: [rt]cmd =0x53574545, len=84
3,668,321 >>> mbox cmd response data (200 bytes)
3,668,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,215 UART: [rt]cmd =0x44504543, len=96
3,729,755 >>> mbox cmd response data (56 bytes)
3,729,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,563 UART: [rt]cmd =0x44504543, len=96
3,799,140 >>> mbox cmd response data (24 bytes)
3,799,141 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,830 UART: [rt]cmd =0x53574545, len=84
3,854,546 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,893 UART: [state] LifecycleState = Unprovisioned
86,548 UART: [state] DebugLocked = No
87,240 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,826 UART: [kat] SHA2-256
882,757 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,872 UART: [kat] ++
887,024 UART: [kat] sha1
891,174 UART: [kat] SHA2-256
893,112 UART: [kat] SHA2-384
895,963 UART: [kat] SHA2-512-ACC
897,864 UART: [kat] ECC-384
903,545 UART: [kat] HMAC-384Kdf
908,191 UART: [kat] LMS
1,476,387 UART: [kat] --
1,477,412 UART: [cold-reset] ++
1,477,768 UART: [fht] Storing FHT @ 0x50003400
1,480,597 UART: [idev] ++
1,480,765 UART: [idev] CDI.KEYID = 6
1,481,125 UART: [idev] SUBJECT.KEYID = 7
1,481,549 UART: [idev] UDS.KEYID = 0
1,481,894 ready_for_fw is high
1,481,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,539 UART: [idev] Erasing UDS.KEYID = 0
1,506,349 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,977 UART: [idev] --
1,515,942 UART: [ldev] ++
1,516,110 UART: [ldev] CDI.KEYID = 6
1,516,473 UART: [ldev] SUBJECT.KEYID = 5
1,516,899 UART: [ldev] AUTHORITY.KEYID = 7
1,517,362 UART: [ldev] FE.KEYID = 1
1,522,724 UART: [ldev] Erasing FE.KEYID = 1
1,548,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,087 UART: [ldev] --
1,587,568 UART: [fwproc] Waiting for Commands...
1,588,383 UART: [fwproc] Received command 0x46574c44
1,589,174 UART: [fwproc] Received Image of size 114448 bytes
2,888,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,827 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,284 >>> mbox cmd response: success
3,082,472 UART: [afmc] ++
3,082,640 UART: [afmc] CDI.KEYID = 6
3,083,002 UART: [afmc] SUBJECT.KEYID = 7
3,083,427 UART: [afmc] AUTHORITY.KEYID = 5
3,118,574 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,258 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,143 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,833 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,840 UART: [afmc] --
3,161,876 UART: [cold-reset] --
3,162,634 UART: [state] Locking Datavault
3,163,685 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,289 UART: [state] Locking ICCM
3,164,831 UART: [exit] Launching FMC @ 0x40000130
3,170,160 UART:
3,170,176 UART: Running Caliptra FMC ...
3,170,584 UART:
3,170,727 UART: [state] CFI Enabled
3,181,532 UART: [fht] FMC Alias Private Key: 7
3,289,643 UART: [art] Extend RT PCRs Done
3,290,071 UART: [art] Lock RT PCRs Done
3,291,817 UART: [art] Populate DV Done
3,299,920 UART: [fht] FMC Alias Private Key: 7
3,301,042 UART: [art] Derive CDI
3,301,322 UART: [art] Store in in slot 0x4
3,386,995 UART: [art] Derive Key Pair
3,387,355 UART: [art] Store priv key in slot 0x5
3,400,391 UART: [art] Derive Key Pair - Done
3,415,390 UART: [art] Signing Cert with AUTHO
3,415,870 UART: RITY.KEYID = 7
3,430,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,639 UART: [art] PUB.X = B973A603B27284E29465AB26312795FE41B88FCD8B64CBA125309577DE473A749637F69425ABD0F18B726DB7852AB04F
3,438,404 UART: [art] PUB.Y = A5691BAF8D5FE60023E7E8FBDED6F6C7FC4E82AD3158A98C0D58D189AF92D74F1FB7ED47499D7C9285324BB1BCB6C88E
3,445,351 UART: [art] SIG.R = 80A04FE15ADF44C75F38B5041808E5F6C910DAED71A3DDD6874509A12CB74F508CACCAA44CA2AF91AE35236FABC589A2
3,452,132 UART: [art] SIG.S = CC00E2CC4CC1B23781D22C564A33A0928B44121FA3412760C505BE807752DE7B33AA908996BD71C55C73CE7F756485F3
3,476,036 UART: Caliptra RT
3,476,381 UART: [state] CFI Enabled
3,585,933 UART: [rt] RT listening for mailbox commands...
3,586,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,777 UART: [rt]cmd =0x44504543, len=96
3,798,243 >>> mbox cmd response data (6236 bytes)
3,798,244 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,203 UART: [rt]cmd =0x53574545, len=84
3,853,453 >>> mbox cmd response data (200 bytes)
3,853,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,461 UART: [rt]cmd =0x44504543, len=96
3,914,795 >>> mbox cmd response data (56 bytes)
3,914,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,743 UART: [rt]cmd =0x44504543, len=96
3,984,652 >>> mbox cmd response data (24 bytes)
3,984,653 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,588 UART: [rt]cmd =0x53574545, len=84
4,040,844 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,824 ready_for_fw is high
1,362,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,084 >>> mbox cmd response: success
2,992,560 UART:
2,992,576 UART: Running Caliptra FMC ...
2,992,984 UART:
2,993,127 UART: [state] CFI Enabled
3,003,802 UART: [fht] FMC Alias Private Key: 7
3,112,361 UART: [art] Extend RT PCRs Done
3,112,789 UART: [art] Lock RT PCRs Done
3,114,213 UART: [art] Populate DV Done
3,122,678 UART: [fht] FMC Alias Private Key: 7
3,123,800 UART: [art] Derive CDI
3,124,080 UART: [art] Store in in slot 0x4
3,209,551 UART: [art] Derive Key Pair
3,209,911 UART: [art] Store priv key in slot 0x5
3,222,847 UART: [art] Derive Key Pair - Done
3,237,323 UART: [art] Signing Cert with AUTHO
3,237,803 UART: RITY.KEYID = 7
3,253,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,936 UART: [art] PUB.X = 124A4840B783D54BBC7FA5BBBC3201DA10D098FCF4FF6979313151DEEF6287A78C56136963BB3062BDD100AA370D4A98
3,260,686 UART: [art] PUB.Y = C624CA1EE86D57ECE5F5A2B986F4BED480D098164896AC1F005FF8FA7E357BB9F65536F7667E8F567387703D8B114898
3,267,618 UART: [art] SIG.R = E5C8A9F96F1209CF72E09C4F76E74F7462A444E9A085BD6E2B0EC4C21ADD23857390623BFE0BAAC83934B8645DCC60AE
3,274,393 UART: [art] SIG.S = 2F8FFD75116D511E08DCBC5C0572E6990F634FB665212A1BED0C64DA49767E1F2C19063037ED4ECB9E59EEAD83932223
3,297,569 UART: Caliptra RT
3,297,914 UART: [state] CFI Enabled
3,405,239 UART: [rt] RT listening for mailbox commands...
3,405,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,221 UART: [rt]cmd =0x44504543, len=96
3,617,451 >>> mbox cmd response data (6236 bytes)
3,617,452 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,293 UART: [rt]cmd =0x53574545, len=84
3,672,805 >>> mbox cmd response data (200 bytes)
3,672,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,891 UART: [rt]cmd =0x44504543, len=96
3,734,961 >>> mbox cmd response data (56 bytes)
3,734,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,959 UART: [rt]cmd =0x44504543, len=96
3,804,460 >>> mbox cmd response data (24 bytes)
3,804,461 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,398 UART: [rt]cmd =0x53574545, len=84
3,860,866 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
893,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,297 UART: [kat] ++
897,449 UART: [kat] sha1
901,759 UART: [kat] SHA2-256
903,699 UART: [kat] SHA2-384
906,286 UART: [kat] SHA2-512-ACC
908,187 UART: [kat] ECC-384
918,036 UART: [kat] HMAC-384Kdf
922,792 UART: [kat] LMS
1,171,120 UART: [kat] --
1,171,861 UART: [cold-reset] ++
1,172,199 UART: [fht] FHT @ 0x50003400
1,174,852 UART: [idev] ++
1,175,020 UART: [idev] CDI.KEYID = 6
1,175,380 UART: [idev] SUBJECT.KEYID = 7
1,175,804 UART: [idev] UDS.KEYID = 0
1,176,149 ready_for_fw is high
1,176,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,678 UART: [idev] Erasing UDS.KEYID = 0
1,201,169 UART: [idev] Sha1 KeyId Algorithm
1,209,793 UART: [idev] --
1,211,041 UART: [ldev] ++
1,211,209 UART: [ldev] CDI.KEYID = 6
1,211,572 UART: [ldev] SUBJECT.KEYID = 5
1,211,998 UART: [ldev] AUTHORITY.KEYID = 7
1,212,461 UART: [ldev] FE.KEYID = 1
1,217,801 UART: [ldev] Erasing FE.KEYID = 1
1,243,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,795 UART: [ldev] --
1,282,070 UART: [fwproc] Wait for Commands...
1,282,768 UART: [fwproc] Recv command 0x46574c44
1,283,496 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,308 >>> mbox cmd response: success
2,775,392 UART: [afmc] ++
2,775,560 UART: [afmc] CDI.KEYID = 6
2,775,922 UART: [afmc] SUBJECT.KEYID = 7
2,776,347 UART: [afmc] AUTHORITY.KEYID = 5
2,811,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,298 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,017 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,073 UART: [afmc] --
2,855,089 UART: [cold-reset] --
2,855,947 UART: [state] Locking Datavault
2,857,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,796 UART: [state] Locking ICCM
2,858,218 UART: [exit] Launching FMC @ 0x40000130
2,863,547 UART:
2,863,563 UART: Running Caliptra FMC ...
2,863,971 UART:
2,864,025 UART: [state] CFI Enabled
2,874,584 UART: [fht] FMC Alias Private Key: 7
2,982,791 UART: [art] Extend RT PCRs Done
2,983,219 UART: [art] Lock RT PCRs Done
2,985,065 UART: [art] Populate DV Done
2,993,264 UART: [fht] FMC Alias Private Key: 7
2,994,242 UART: [art] Derive CDI
2,994,522 UART: [art] Store in in slot 0x4
3,080,245 UART: [art] Derive Key Pair
3,080,605 UART: [art] Store priv key in slot 0x5
3,093,779 UART: [art] Derive Key Pair - Done
3,108,748 UART: [art] Signing Cert with AUTHO
3,109,228 UART: RITY.KEYID = 7
3,124,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,835 UART: [art] PUB.X = C44A2B792C39B92EC09A7A670A0B276CD9A889194E4866AA5EDEB481AF441BF7F4E80E72BDD2625BCCCDE04E41444DA7
3,131,614 UART: [art] PUB.Y = 17122C60990AF8D287A465139A2EF76BE4A5DAAB47B342870E69326BAD473029D30CF2FB787D5753B698AFD84B759CE6
3,138,559 UART: [art] SIG.R = DDCC52E5B9DF3958AC993F947749736E3C11D008AB84C7575C538B6C45E7C0E915DC10726C9CA59BE0487E811972B4D5
3,145,330 UART: [art] SIG.S = 659F65AD0C7CE09CD386BD7460034EDEEE7B46C458E02C968F8EEBA353637F52362E7B23F5656CFF0CBD67E438170ECC
3,168,711 UART: Caliptra RT
3,168,964 UART: [state] CFI Enabled
3,276,419 UART: [rt] RT listening for mailbox commands...
3,277,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,241 UART: [rt]cmd =0x44504543, len=96
3,488,377 >>> mbox cmd response data (6236 bytes)
3,488,378 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,419 UART: [rt]cmd =0x53574545, len=84
3,543,935 >>> mbox cmd response data (200 bytes)
3,543,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,177 UART: [rt]cmd =0x44504543, len=96
3,606,109 >>> mbox cmd response data (56 bytes)
3,606,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,121 UART: [rt]cmd =0x44504543, len=96
3,675,470 >>> mbox cmd response data (24 bytes)
3,675,471 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,192 UART: [rt]cmd =0x53574545, len=84
3,730,358 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,839 ready_for_fw is high
1,060,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,845 >>> mbox cmd response: success
2,691,101 UART:
2,691,117 UART: Running Caliptra FMC ...
2,691,525 UART:
2,691,579 UART: [state] CFI Enabled
2,701,878 UART: [fht] FMC Alias Private Key: 7
2,809,559 UART: [art] Extend RT PCRs Done
2,809,987 UART: [art] Lock RT PCRs Done
2,811,593 UART: [art] Populate DV Done
2,820,034 UART: [fht] FMC Alias Private Key: 7
2,820,976 UART: [art] Derive CDI
2,821,256 UART: [art] Store in in slot 0x4
2,906,623 UART: [art] Derive Key Pair
2,906,983 UART: [art] Store priv key in slot 0x5
2,920,529 UART: [art] Derive Key Pair - Done
2,935,369 UART: [art] Signing Cert with AUTHO
2,935,849 UART: RITY.KEYID = 7
2,951,321 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,086 UART: [art] PUB.X = 02F841E438385DE3E80F46A8836269C2594074BB7E3DD6BE43AFCDA77D77D8B987D1642E618C80E10A702D4DB6D910FD
2,958,853 UART: [art] PUB.Y = C229DB7E7C4111D3FF8326503E66E3CEFDF32341A052FF992160AD9D065848B3D49AAB0A26BEE8005BAC3647DB2536C4
2,965,785 UART: [art] SIG.R = A1AEFAB27C05684099EC52A8F030567C14760473DC0DB9DA6FE7C5F422F2DA3AEFCB6518DE20B8D9449C162819B70203
2,972,550 UART: [art] SIG.S = A6DB0EFC65CF83C570BB0A3CFC3249F2AE45DCA3E4B7C27ED16E4C3CC48CE7EE419DEA0186645C41F5C722F979042895
2,996,351 UART: Caliptra RT
2,996,604 UART: [state] CFI Enabled
3,104,126 UART: [rt] RT listening for mailbox commands...
3,104,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,296 UART: [rt]cmd =0x44504543, len=96
3,316,320 >>> mbox cmd response data (6236 bytes)
3,316,321 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,342 UART: [rt]cmd =0x53574545, len=84
3,371,486 >>> mbox cmd response data (200 bytes)
3,371,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,410 UART: [rt]cmd =0x44504543, len=96
3,432,200 >>> mbox cmd response data (56 bytes)
3,432,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,970 UART: [rt]cmd =0x44504543, len=96
3,501,309 >>> mbox cmd response data (24 bytes)
3,501,310 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,415 UART: [rt]cmd =0x53574545, len=84
3,557,353 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
893,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,284 UART: [kat] ++
897,436 UART: [kat] sha1
901,718 UART: [kat] SHA2-256
903,658 UART: [kat] SHA2-384
906,399 UART: [kat] SHA2-512-ACC
908,300 UART: [kat] ECC-384
917,971 UART: [kat] HMAC-384Kdf
922,583 UART: [kat] LMS
1,170,911 UART: [kat] --
1,171,920 UART: [cold-reset] ++
1,172,470 UART: [fht] FHT @ 0x50003400
1,174,991 UART: [idev] ++
1,175,159 UART: [idev] CDI.KEYID = 6
1,175,519 UART: [idev] SUBJECT.KEYID = 7
1,175,943 UART: [idev] UDS.KEYID = 0
1,176,288 ready_for_fw is high
1,176,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,411 UART: [idev] Erasing UDS.KEYID = 0
1,200,888 UART: [idev] Sha1 KeyId Algorithm
1,209,312 UART: [idev] --
1,210,278 UART: [ldev] ++
1,210,446 UART: [ldev] CDI.KEYID = 6
1,210,809 UART: [ldev] SUBJECT.KEYID = 5
1,211,235 UART: [ldev] AUTHORITY.KEYID = 7
1,211,698 UART: [ldev] FE.KEYID = 1
1,216,970 UART: [ldev] Erasing FE.KEYID = 1
1,242,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,132 UART: [ldev] --
1,282,619 UART: [fwproc] Wait for Commands...
1,283,429 UART: [fwproc] Recv command 0x46574c44
1,284,157 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,026 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,330 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,445 >>> mbox cmd response: success
2,777,595 UART: [afmc] ++
2,777,763 UART: [afmc] CDI.KEYID = 6
2,778,125 UART: [afmc] SUBJECT.KEYID = 7
2,778,550 UART: [afmc] AUTHORITY.KEYID = 5
2,814,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,894 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,622 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,507 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,226 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,222 UART: [afmc] --
2,858,238 UART: [cold-reset] --
2,858,942 UART: [state] Locking Datavault
2,860,271 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,875 UART: [state] Locking ICCM
2,861,469 UART: [exit] Launching FMC @ 0x40000130
2,866,798 UART:
2,866,814 UART: Running Caliptra FMC ...
2,867,222 UART:
2,867,365 UART: [state] CFI Enabled
2,877,804 UART: [fht] FMC Alias Private Key: 7
2,985,813 UART: [art] Extend RT PCRs Done
2,986,241 UART: [art] Lock RT PCRs Done
2,987,655 UART: [art] Populate DV Done
2,996,012 UART: [fht] FMC Alias Private Key: 7
2,997,058 UART: [art] Derive CDI
2,997,338 UART: [art] Store in in slot 0x4
3,083,107 UART: [art] Derive Key Pair
3,083,467 UART: [art] Store priv key in slot 0x5
3,096,981 UART: [art] Derive Key Pair - Done
3,112,100 UART: [art] Signing Cert with AUTHO
3,112,580 UART: RITY.KEYID = 7
3,127,566 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,331 UART: [art] PUB.X = 4A68EDD0C683BD0F02B3EF9A622262731BF1266FE34F6F09FF408DD29336E371E6D9EC17D9D31ADB661993310B9AE953
3,135,097 UART: [art] PUB.Y = B2893D7D2752BF0EE75DA41AB800012796C466D23D6B91F933217B61217C7B616D87C1E08D5854EDA79337F0B8CEBB6A
3,142,023 UART: [art] SIG.R = 5266EFE1F74642923DC38385B28FC4B58F0B7E79AA9105E3A9C29D19F891380B235C6BF850F452F7E25650DAE8153535
3,148,782 UART: [art] SIG.S = 32921C8C0AA82F1F109B12A3230D9C39A81ABAF1DF19E7D706743F34D7614F230B5583F09AEAB03CB905E5AAFF2FEDBB
3,172,980 UART: Caliptra RT
3,173,325 UART: [state] CFI Enabled
3,281,554 UART: [rt] RT listening for mailbox commands...
3,282,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,520 UART: [rt]cmd =0x44504543, len=96
3,493,248 >>> mbox cmd response data (6236 bytes)
3,493,249 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,140 UART: [rt]cmd =0x53574545, len=84
3,549,080 >>> mbox cmd response data (200 bytes)
3,549,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,892 UART: [rt]cmd =0x44504543, len=96
3,610,340 >>> mbox cmd response data (56 bytes)
3,610,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,042 UART: [rt]cmd =0x44504543, len=96
3,678,753 >>> mbox cmd response data (24 bytes)
3,678,754 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,669 UART: [rt]cmd =0x53574545, len=84
3,734,591 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,048 ready_for_fw is high
1,060,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,468 >>> mbox cmd response: success
2,690,476 UART:
2,690,492 UART: Running Caliptra FMC ...
2,690,900 UART:
2,691,043 UART: [state] CFI Enabled
2,701,614 UART: [fht] FMC Alias Private Key: 7
2,809,667 UART: [art] Extend RT PCRs Done
2,810,095 UART: [art] Lock RT PCRs Done
2,811,237 UART: [art] Populate DV Done
2,819,498 UART: [fht] FMC Alias Private Key: 7
2,820,540 UART: [art] Derive CDI
2,820,820 UART: [art] Store in in slot 0x4
2,905,999 UART: [art] Derive Key Pair
2,906,359 UART: [art] Store priv key in slot 0x5
2,919,575 UART: [art] Derive Key Pair - Done
2,934,599 UART: [art] Signing Cert with AUTHO
2,935,079 UART: RITY.KEYID = 7
2,950,395 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,160 UART: [art] PUB.X = 664D6A7FC64FFD44A8F14015AC37F9084EE2C2170FE8F65D0096C1C9FE3A7A456A5E8D9F7ADBF50C0E6BF8CFC78890BF
2,957,918 UART: [art] PUB.Y = D1B82FB0F9B896A64F80687708599777EA4F33840CF41AD1491C92272CD55DF28C2DA71E10E1BB217EF8B9BDF57C537D
2,964,870 UART: [art] SIG.R = 33484CFAB99311652AA8ACA2DD31D47DD7C4385624AADAB749E73EF4FAA094EFC92F16B2675A6F760AAED09D974B067F
2,971,652 UART: [art] SIG.S = 7FFF7C32F08A1BC4CBFF773A2B2845313EEFC52023EA66E3724DC972DFDB400F30363C4FF090F0CB66A1CE6F7665CD4A
2,995,404 UART: Caliptra RT
2,995,749 UART: [state] CFI Enabled
3,103,896 UART: [rt] RT listening for mailbox commands...
3,104,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,242 UART: [rt]cmd =0x44504543, len=96
3,316,059 >>> mbox cmd response data (6236 bytes)
3,316,060 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,733 UART: [rt]cmd =0x53574545, len=84
3,371,721 >>> mbox cmd response data (200 bytes)
3,371,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,781 UART: [rt]cmd =0x44504543, len=96
3,434,141 >>> mbox cmd response data (56 bytes)
3,434,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,911 UART: [rt]cmd =0x44504543, len=96
3,503,028 >>> mbox cmd response data (24 bytes)
3,503,029 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,772 UART: [rt]cmd =0x53574545, len=84
3,557,740 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,792 UART: [kat] SHA2-512-ACC
906,693 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,900 UART: [kat] LMS
1,169,212 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,401 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,174,395 ready_for_fw is high
1,174,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,199,039 UART: [idev] Sha1 KeyId Algorithm
1,207,917 UART: [idev] --
1,208,966 UART: [ldev] ++
1,209,134 UART: [ldev] CDI.KEYID = 6
1,209,498 UART: [ldev] SUBJECT.KEYID = 5
1,209,925 UART: [ldev] AUTHORITY.KEYID = 7
1,210,388 UART: [ldev] FE.KEYID = 1
1,215,652 UART: [ldev] Erasing FE.KEYID = 1
1,242,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,710 UART: [ldev] --
1,281,208 UART: [fwproc] Wait for Commands...
1,281,893 UART: [fwproc] Recv command 0x46574c44
1,282,626 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,698 >>> mbox cmd response: success
2,773,929 UART: [afmc] ++
2,774,097 UART: [afmc] CDI.KEYID = 6
2,774,460 UART: [afmc] SUBJECT.KEYID = 7
2,774,886 UART: [afmc] AUTHORITY.KEYID = 5
2,810,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,522 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,134 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,853 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,682 UART: [afmc] --
2,853,712 UART: [cold-reset] --
2,854,760 UART: [state] Locking Datavault
2,855,977 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,581 UART: [state] Locking ICCM
2,857,107 UART: [exit] Launching FMC @ 0x40000130
2,862,436 UART:
2,862,452 UART: Running Caliptra FMC ...
2,862,860 UART:
2,862,914 UART: [state] CFI Enabled
2,873,439 UART: [fht] FMC Alias Private Key: 7
2,981,336 UART: [art] Extend RT PCRs Done
2,981,764 UART: [art] Lock RT PCRs Done
2,983,306 UART: [art] Populate DV Done
2,991,249 UART: [fht] FMC Alias Private Key: 7
2,992,185 UART: [art] Derive CDI
2,992,465 UART: [art] Store in in slot 0x4
3,078,136 UART: [art] Derive Key Pair
3,078,496 UART: [art] Store priv key in slot 0x5
3,091,484 UART: [art] Derive Key Pair - Done
3,105,959 UART: [art] Signing Cert with AUTHO
3,106,439 UART: RITY.KEYID = 7
3,121,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,562 UART: [art] PUB.X = C3BE3A5E05F623655D39DCF8A31E011F894B37566644CE39173C640A385DF65267F9E7BCFE81CB3480ACF4E576103CDE
3,129,331 UART: [art] PUB.Y = B1D019389BB7C139A6E5AA8638BED3433ACFEEBF9FCE1AEBD70737DAD6CC148EEF4E8C1BEADAE5FD2E8267501A8D4F7D
3,136,314 UART: [art] SIG.R = B6470F1AD12B20829C7E9F825551991FF00EF3772E5899F3454EE8F5B728943C695BA93AF10FB0EA7AB97C8242E94972
3,143,075 UART: [art] SIG.S = 4AA5D31EC8A13944DE8EBE05C75774A2D6A8ACFDA69E7BE0C8A79E35D231581A0EED5E4308B8A598930FBE5E8ADBADA5
3,166,760 UART: Caliptra RT
3,167,013 UART: [state] CFI Enabled
3,274,256 UART: [rt] RT listening for mailbox commands...
3,274,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,316 UART: [rt]cmd =0x44504543, len=96
3,486,395 >>> mbox cmd response data (6236 bytes)
3,486,396 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,123 UART: [rt]cmd =0x53574545, len=84
3,542,361 >>> mbox cmd response data (200 bytes)
3,542,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,209 UART: [rt]cmd =0x44504543, len=96
3,603,865 >>> mbox cmd response data (56 bytes)
3,603,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,907 UART: [rt]cmd =0x44504543, len=96
3,673,638 >>> mbox cmd response data (24 bytes)
3,673,639 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,432 UART: [rt]cmd =0x53574545, len=84
3,728,584 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,102 ready_for_fw is high
1,056,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,970 >>> mbox cmd response: success
2,685,136 UART:
2,685,152 UART: Running Caliptra FMC ...
2,685,560 UART:
2,685,614 UART: [state] CFI Enabled
2,696,057 UART: [fht] FMC Alias Private Key: 7
2,804,178 UART: [art] Extend RT PCRs Done
2,804,606 UART: [art] Lock RT PCRs Done
2,805,974 UART: [art] Populate DV Done
2,814,193 UART: [fht] FMC Alias Private Key: 7
2,815,131 UART: [art] Derive CDI
2,815,411 UART: [art] Store in in slot 0x4
2,901,036 UART: [art] Derive Key Pair
2,901,396 UART: [art] Store priv key in slot 0x5
2,914,584 UART: [art] Derive Key Pair - Done
2,929,089 UART: [art] Signing Cert with AUTHO
2,929,569 UART: RITY.KEYID = 7
2,944,963 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,728 UART: [art] PUB.X = 3AA11EBA27924520A625CD7476DB0742ACD075F86A52BA5498FC4E4BB9C1FA15D71C01303EE0C7F0B3E662216D020D9B
2,952,496 UART: [art] PUB.Y = 3C0C67A422ED6F8EFCA2092734081403C6DA58D90547B63BBADE5D5BDD36869FD71CF132A4CB8BF684313ACA4C7EEE9B
2,959,451 UART: [art] SIG.R = CA29932A67D0113952F7674C251EAD38ED8C6D7102A8188A1EB9374B00B364FBA68A2DC5D476594F9DB69119748E53A4
2,966,196 UART: [art] SIG.S = AA7D2CE2CE29E53B3CE1C23219C41B538017CD47992DE8E8485D9EA25DCD00BC2D8F830B3D1002E03F3D548767D0A4F5
2,990,171 UART: Caliptra RT
2,990,424 UART: [state] CFI Enabled
3,096,890 UART: [rt] RT listening for mailbox commands...
3,097,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,966 UART: [rt]cmd =0x44504543, len=96
3,308,841 >>> mbox cmd response data (6236 bytes)
3,308,842 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,725 UART: [rt]cmd =0x53574545, len=84
3,364,577 >>> mbox cmd response data (200 bytes)
3,364,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,435 UART: [rt]cmd =0x44504543, len=96
3,426,099 >>> mbox cmd response data (56 bytes)
3,426,100 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,211 UART: [rt]cmd =0x44504543, len=96
3,495,484 >>> mbox cmd response data (24 bytes)
3,495,485 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,352 UART: [rt]cmd =0x53574545, len=84
3,550,746 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,000 UART: [kat] ++
896,152 UART: [kat] sha1
900,552 UART: [kat] SHA2-256
902,492 UART: [kat] SHA2-384
905,117 UART: [kat] SHA2-512-ACC
907,018 UART: [kat] ECC-384
917,089 UART: [kat] HMAC-384Kdf
921,789 UART: [kat] LMS
1,170,101 UART: [kat] --
1,170,894 UART: [cold-reset] ++
1,171,314 UART: [fht] FHT @ 0x50003400
1,174,112 UART: [idev] ++
1,174,280 UART: [idev] CDI.KEYID = 6
1,174,641 UART: [idev] SUBJECT.KEYID = 7
1,175,066 UART: [idev] UDS.KEYID = 0
1,175,412 ready_for_fw is high
1,175,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,148 UART: [idev] Erasing UDS.KEYID = 0
1,200,616 UART: [idev] Sha1 KeyId Algorithm
1,209,512 UART: [idev] --
1,210,611 UART: [ldev] ++
1,210,779 UART: [ldev] CDI.KEYID = 6
1,211,143 UART: [ldev] SUBJECT.KEYID = 5
1,211,570 UART: [ldev] AUTHORITY.KEYID = 7
1,212,033 UART: [ldev] FE.KEYID = 1
1,217,103 UART: [ldev] Erasing FE.KEYID = 1
1,243,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,075 UART: [ldev] --
1,283,573 UART: [fwproc] Wait for Commands...
1,284,344 UART: [fwproc] Recv command 0x46574c44
1,285,077 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,703 >>> mbox cmd response: success
2,778,794 UART: [afmc] ++
2,778,962 UART: [afmc] CDI.KEYID = 6
2,779,325 UART: [afmc] SUBJECT.KEYID = 7
2,779,751 UART: [afmc] AUTHORITY.KEYID = 5
2,815,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,152 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,035 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,754 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,437 UART: [afmc] --
2,858,365 UART: [cold-reset] --
2,859,237 UART: [state] Locking Datavault
2,860,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,814 UART: [state] Locking ICCM
2,861,480 UART: [exit] Launching FMC @ 0x40000130
2,866,809 UART:
2,866,825 UART: Running Caliptra FMC ...
2,867,233 UART:
2,867,376 UART: [state] CFI Enabled
2,878,303 UART: [fht] FMC Alias Private Key: 7
2,985,844 UART: [art] Extend RT PCRs Done
2,986,272 UART: [art] Lock RT PCRs Done
2,987,804 UART: [art] Populate DV Done
2,995,969 UART: [fht] FMC Alias Private Key: 7
2,996,973 UART: [art] Derive CDI
2,997,253 UART: [art] Store in in slot 0x4
3,082,970 UART: [art] Derive Key Pair
3,083,330 UART: [art] Store priv key in slot 0x5
3,096,888 UART: [art] Derive Key Pair - Done
3,111,637 UART: [art] Signing Cert with AUTHO
3,112,117 UART: RITY.KEYID = 7
3,127,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,438 UART: [art] PUB.X = 2D98F89770656DA45A87226C8570BC215D3216B67CDE1A4F563793A9DE7033C5527BA295A1AED9A36C59549619B63957
3,135,202 UART: [art] PUB.Y = 895B430585AC2958FB360BE724C00D28F20AD10ACD3532E93AD1142A35D5F45377224E583E21DD53702A8CF7A54939C7
3,142,135 UART: [art] SIG.R = 45EBD5926B6405AC61C1F2BEF832D2A687E5F7497169192EC8155363BC597BF67E52482DF7F61580903A45BB3B27F2C8
3,148,902 UART: [art] SIG.S = 62BE4D5AA3CCAB9252FB53C21D1C4E83D1B1CBAF8E4AD647D8A3F4B27F287D4A1A077A9E1CC6670A0C6361B10F7A4232
3,172,789 UART: Caliptra RT
3,173,134 UART: [state] CFI Enabled
3,281,279 UART: [rt] RT listening for mailbox commands...
3,281,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,401 UART: [rt]cmd =0x44504543, len=96
3,493,700 >>> mbox cmd response data (6236 bytes)
3,493,701 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,674 UART: [rt]cmd =0x53574545, len=84
3,549,888 >>> mbox cmd response data (200 bytes)
3,549,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,678 UART: [rt]cmd =0x44504543, len=96
3,611,850 >>> mbox cmd response data (56 bytes)
3,611,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,020 UART: [rt]cmd =0x44504543, len=96
3,681,897 >>> mbox cmd response data (24 bytes)
3,681,898 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,933 UART: [rt]cmd =0x53574545, len=84
3,737,619 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,525 ready_for_fw is high
1,056,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,385 >>> mbox cmd response: success
2,687,447 UART:
2,687,463 UART: Running Caliptra FMC ...
2,687,871 UART:
2,688,014 UART: [state] CFI Enabled
2,698,635 UART: [fht] FMC Alias Private Key: 7
2,806,622 UART: [art] Extend RT PCRs Done
2,807,050 UART: [art] Lock RT PCRs Done
2,808,602 UART: [art] Populate DV Done
2,816,903 UART: [fht] FMC Alias Private Key: 7
2,818,037 UART: [art] Derive CDI
2,818,317 UART: [art] Store in in slot 0x4
2,903,924 UART: [art] Derive Key Pair
2,904,284 UART: [art] Store priv key in slot 0x5
2,917,894 UART: [art] Derive Key Pair - Done
2,932,566 UART: [art] Signing Cert with AUTHO
2,933,046 UART: RITY.KEYID = 7
2,948,094 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,859 UART: [art] PUB.X = 8AC7CDC28DF238A112F41CB1B6D2667DA76BCB1E0B1E115214D76774D06DC65EB11BF9611D124A66D0B729CA31012883
2,955,631 UART: [art] PUB.Y = D9498253A5268DB78C9224A7488C12E73D46B0FE4FA5CF77A2A2546F4C841C41D4DF9839538B65D30ED40C23473F0F05
2,962,569 UART: [art] SIG.R = 7D7C96FF8419107422037A53AF077C12D31B0DCD9DC84D4FC7E27304011F47309DD1C0F5E2718C98F32200CAC40C5C31
2,969,301 UART: [art] SIG.S = E1E13B96D00DB99D95B19F9E9FFC1746BD4886F111D38AE731A39A72023C9D71F196B1A5188AAA3A2EAEC7BA5801CE12
2,993,285 UART: Caliptra RT
2,993,630 UART: [state] CFI Enabled
3,101,757 UART: [rt] RT listening for mailbox commands...
3,102,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,855 UART: [rt]cmd =0x44504543, len=96
3,313,850 >>> mbox cmd response data (6236 bytes)
3,313,851 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,784 UART: [rt]cmd =0x53574545, len=84
3,369,062 >>> mbox cmd response data (200 bytes)
3,369,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,960 UART: [rt]cmd =0x44504543, len=96
3,430,288 >>> mbox cmd response data (56 bytes)
3,430,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,160 UART: [rt]cmd =0x44504543, len=96
3,499,725 >>> mbox cmd response data (24 bytes)
3,499,726 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,439 UART: [rt]cmd =0x53574545, len=84
3,554,461 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
191,994 UART:
192,367 UART: Running Caliptra ROM ...
193,509 UART:
193,659 UART: [state] CFI Enabled
267,915 UART: [state] LifecycleState = Unprovisioned
269,910 UART: [state] DebugLocked = No
271,400 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,421 UART: [kat] SHA2-256
445,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,590 UART: [kat] ++
456,040 UART: [kat] sha1
467,625 UART: [kat] SHA2-256
470,348 UART: [kat] SHA2-384
476,901 UART: [kat] SHA2-512-ACC
479,277 UART: [kat] ECC-384
2,770,061 UART: [kat] HMAC-384Kdf
2,781,157 UART: [kat] LMS
3,971,446 UART: [kat] --
3,974,961 UART: [cold-reset] ++
3,977,528 UART: [fht] Storing FHT @ 0x50003400
3,988,941 UART: [idev] ++
3,989,503 UART: [idev] CDI.KEYID = 6
3,990,555 UART: [idev] SUBJECT.KEYID = 7
3,991,730 UART: [idev] UDS.KEYID = 0
3,992,760 ready_for_fw is high
3,992,964 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,735 UART: [idev] Erasing UDS.KEYID = 0
7,328,784 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,710 UART: [idev] --
7,354,434 UART: [ldev] ++
7,355,010 UART: [ldev] CDI.KEYID = 6
7,355,959 UART: [ldev] SUBJECT.KEYID = 5
7,357,173 UART: [ldev] AUTHORITY.KEYID = 7
7,358,409 UART: [ldev] FE.KEYID = 1
7,403,598 UART: [ldev] Erasing FE.KEYID = 1
10,733,693 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,012 UART: [ldev] --
13,098,736 UART: [fwproc] Waiting for Commands...
13,101,370 UART: [fwproc] Received command 0x46574c44
13,103,551 UART: [fwproc] Received Image of size 114124 bytes
17,159,278 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,645 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,549 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,624,511 >>> mbox cmd response: success
17,629,245 UART: [afmc] ++
17,629,846 UART: [afmc] CDI.KEYID = 6
17,630,764 UART: [afmc] SUBJECT.KEYID = 7
17,631,983 UART: [afmc] AUTHORITY.KEYID = 5
20,991,579 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,703 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,986 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,402 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,194 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,649 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,151 UART: [afmc] --
23,361,887 UART: [cold-reset] --
23,366,673 UART: [state] Locking Datavault
23,370,787 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,541 UART: [state] Locking ICCM
23,373,560 UART: [exit] Launching FMC @ 0x40000130
23,381,967 UART:
23,382,246 UART: Running Caliptra FMC ...
23,383,356 UART:
23,383,523 UART: [state] CFI Enabled
23,449,197 UART: [fht] FMC Alias Private Key: 7
25,787,769 UART: [art] Extend RT PCRs Done
25,789,017 UART: [art] Lock RT PCRs Done
25,790,674 UART: [art] Populate DV Done
25,796,032 UART: [fht] FMC Alias Private Key: 7
25,797,574 UART: [art] Derive CDI
25,798,389 UART: [art] Store in in slot 0x4
25,857,544 UART: [art] Derive Key Pair
25,858,583 UART: [art] Store priv key in slot 0x5
29,151,768 UART: [art] Derive Key Pair - Done
29,164,866 UART: [art] Signing Cert with AUTHO
29,166,175 UART: RITY.KEYID = 7
31,453,938 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,457 UART: [art] PUB.X = A28DA530746071645118D8E417F84215BCFDCD361A70FC3961FCE6FA44F2ECAADD79B4057715789396FF97F84A8C5B7F
31,462,683 UART: [art] PUB.Y = 524FF97D11210821ABD4DA189E72CE51E3706A18A423BD354B933F88781CF452F6A4060BBF7229EA5E01E70A5EEFE478
31,469,926 UART: [art] SIG.R = BA08B9BA3D40A3E836D998EDC5E288AA78828D93396D51F7ACADB298A384CC0F2EA3D3AAEF99C17A46F0BF08C01F5E97
31,477,329 UART: [art] SIG.S = FF39B270787362D75B5493506FEF372DE7CB948B41A10C7386A7E3AF50AC2162ED23C0A8F7EFE2317043A236E9FF3B4A
32,782,640 UART: Caliptra RT
32,783,372 UART: [state] CFI Enabled
32,942,970 UART: [rt] RT listening for mailbox commands...
32,944,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,975,778 UART: [rt]cmd =0x44504543, len=96
38,739,762 >>> mbox cmd response data (6236 bytes)
38,769,114 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,799,457 UART: [rt]cmd =0x53574545, len=84
38,803,116 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,807,116 ready_for_fw is high
3,807,725 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,899,287 >>> mbox cmd response: success
23,603,532 UART:
23,603,898 UART: Running Caliptra FMC ...
23,605,110 UART:
23,605,280 UART: [state] CFI Enabled
23,672,748 UART: [fht] FMC Alias Private Key: 7
26,010,664 UART: [art] Extend RT PCRs Done
26,012,068 UART: [art] Lock RT PCRs Done
26,013,745 UART: [art] Populate DV Done
26,019,000 UART: [fht] FMC Alias Private Key: 7
26,020,611 UART: [art] Derive CDI
26,021,431 UART: [art] Store in in slot 0x4
26,080,527 UART: [art] Derive Key Pair
26,081,526 UART: [art] Store priv key in slot 0x5
29,374,440 UART: [art] Derive Key Pair - Done
29,387,453 UART: [art] Signing Cert with AUTHO
29,388,778 UART: RITY.KEYID = 7
31,676,411 UART: [art] Erasing AUTHORITY.KEYID = 7
31,677,930 UART: [art] PUB.X = 8C2E54361BFCA9A71C3AA10EA88F141AE7A661449885A1374C07CA2F10BBA72A2AF82350DC58A43DAD45634FCE326340
31,685,152 UART: [art] PUB.Y = 9C488B9FD3C307C2243DFCF1602C1126BE4E684933707390A224BEB28763CFA7F2F36AFDEB4063A62518915A6986D85B
31,692,398 UART: [art] SIG.R = 5856BE713C6DFA8214A86786B2126A9F377FE6D6016C1B4B561197EBF44B961086F6CA57906548CAA5E978127942DEAE
31,699,775 UART: [art] SIG.S = EBD07B3700C444F2FA753A134F81FBFBF89152D4F212B77586D0F10A968DD638F94BD7153DCB9F93613430B1E8160845
33,004,905 UART: Caliptra RT
33,005,613 UART: [state] CFI Enabled
33,167,864 UART: [rt] RT listening for mailbox commands...
33,169,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,200,578 UART: [rt]cmd =0x44504543, len=96
38,984,866 >>> mbox cmd response data (6236 bytes)
39,014,287 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,045,109 UART: [rt]cmd =0x53574545, len=84
39,048,614 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,394 UART:
192,765 UART: Running Caliptra ROM ...
193,940 UART:
603,523 UART: [state] CFI Enabled
620,319 UART: [state] LifecycleState = Unprovisioned
622,191 UART: [state] DebugLocked = No
624,921 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,761 UART: [kat] SHA2-256
799,542 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,062 UART: [kat] ++
810,540 UART: [kat] sha1
821,335 UART: [kat] SHA2-256
824,050 UART: [kat] SHA2-384
829,752 UART: [kat] SHA2-512-ACC
832,121 UART: [kat] ECC-384
3,114,632 UART: [kat] HMAC-384Kdf
3,126,873 UART: [kat] LMS
4,317,000 UART: [kat] --
4,320,036 UART: [cold-reset] ++
4,321,974 UART: [fht] Storing FHT @ 0x50003400
4,333,183 UART: [idev] ++
4,333,755 UART: [idev] CDI.KEYID = 6
4,334,666 UART: [idev] SUBJECT.KEYID = 7
4,335,904 UART: [idev] UDS.KEYID = 0
4,336,958 ready_for_fw is high
4,337,178 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,542 UART: [idev] Erasing UDS.KEYID = 0
7,623,491 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,787 UART: [idev] --
7,649,403 UART: [ldev] ++
7,649,966 UART: [ldev] CDI.KEYID = 6
7,650,923 UART: [ldev] SUBJECT.KEYID = 5
7,652,133 UART: [ldev] AUTHORITY.KEYID = 7
7,653,413 UART: [ldev] FE.KEYID = 1
7,664,862 UART: [ldev] Erasing FE.KEYID = 1
10,950,842 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,640 UART: [ldev] --
13,308,474 UART: [fwproc] Waiting for Commands...
13,311,585 UART: [fwproc] Received command 0x46574c44
13,313,818 UART: [fwproc] Received Image of size 114124 bytes
17,361,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,115 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,005 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,828,143 >>> mbox cmd response: success
17,831,684 UART: [afmc] ++
17,832,278 UART: [afmc] CDI.KEYID = 6
17,833,180 UART: [afmc] SUBJECT.KEYID = 7
17,834,444 UART: [afmc] AUTHORITY.KEYID = 5
21,149,230 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,234 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,499 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,884 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,698 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,142 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,625 UART: [afmc] --
23,516,281 UART: [cold-reset] --
23,521,772 UART: [state] Locking Datavault
23,527,996 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,747 UART: [state] Locking ICCM
23,532,161 UART: [exit] Launching FMC @ 0x40000130
23,540,557 UART:
23,540,796 UART: Running Caliptra FMC ...
23,541,895 UART:
23,542,053 UART: [state] CFI Enabled
23,549,959 UART: [fht] FMC Alias Private Key: 7
25,880,488 UART: [art] Extend RT PCRs Done
25,881,705 UART: [art] Lock RT PCRs Done
25,883,431 UART: [art] Populate DV Done
25,888,618 UART: [fht] FMC Alias Private Key: 7
25,890,109 UART: [art] Derive CDI
25,890,865 UART: [art] Store in in slot 0x4
25,933,557 UART: [art] Derive Key Pair
25,934,593 UART: [art] Store priv key in slot 0x5
29,177,172 UART: [art] Derive Key Pair - Done
29,190,274 UART: [art] Signing Cert with AUTHO
29,191,601 UART: RITY.KEYID = 7
31,470,590 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,090 UART: [art] PUB.X = C77AFAB9D445C6A6E6ACCE6C1F3F889C258793FE27BB813DC428AD615F01F8097DAA4849255E7A989A8C251030C3FF2E
31,479,321 UART: [art] PUB.Y = ACD390E8360309B4E48FE272BEDC8915EF1DE9A1DFDDAD8902D9219718A7520DC869881933C4B03E99EBB8458982CEA5
31,486,589 UART: [art] SIG.R = F09148022861DB54CF369E5B92260BDBDF402EB395381FEB90B400A4D3874894EA29012A44C63E494B3CC1C703A80328
31,493,978 UART: [art] SIG.S = 9257BA2550A51C43AB85C41E5B4CD1F41EF09652C0B15833275002232B8030849C4320BD5BB3946D5A399FF44C31FF4A
32,798,882 UART: Caliptra RT
32,799,592 UART: [state] CFI Enabled
32,917,838 UART: [rt] RT listening for mailbox commands...
32,919,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,950,204 UART: [rt]cmd =0x44504543, len=96
38,622,050 >>> mbox cmd response data (6236 bytes)
38,651,629 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,682,191 UART: [rt]cmd =0x53574545, len=84
38,685,526 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
4,128,400 ready_for_fw is high
4,128,806 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,082,707 >>> mbox cmd response: success
23,721,849 UART:
23,722,248 UART: Running Caliptra FMC ...
23,723,379 UART:
23,723,536 UART: [state] CFI Enabled
23,731,657 UART: [fht] FMC Alias Private Key: 7
26,062,322 UART: [art] Extend RT PCRs Done
26,063,553 UART: [art] Lock RT PCRs Done
26,065,236 UART: [art] Populate DV Done
26,070,928 UART: [fht] FMC Alias Private Key: 7
26,072,524 UART: [art] Derive CDI
26,073,339 UART: [art] Store in in slot 0x4
26,116,219 UART: [art] Derive Key Pair
26,117,260 UART: [art] Store priv key in slot 0x5
29,359,433 UART: [art] Derive Key Pair - Done
29,372,711 UART: [art] Signing Cert with AUTHO
29,374,015 UART: RITY.KEYID = 7
31,653,276 UART: [art] Erasing AUTHORITY.KEYID = 7
31,654,781 UART: [art] PUB.X = 3738F464E0197DD8EEAD49726C86B67457DB917E1AC3D4713CBEB8D6692035789E94190D76294E44BC66732981966E20
31,661,965 UART: [art] PUB.Y = C98E68FBD3FAAC8487A6457222076BDC21AE90D38BAD0B474A6C52C705335C8BD41B9815EF1ECC271A9F7EFC7D3A448C
31,669,238 UART: [art] SIG.R = A66C5FC51CF2BF6106F4E3B782CE99D036CA032E9C0809647F46330F8E18C5B6DD2E77C798C2F02AE5A60ED0E8B53853
31,676,622 UART: [art] SIG.S = E8A9FCF0FBCBDF43111CED1B3DAD34F7E13E7FC2FCD9EFDE7DDB4BE84B253FE7784AEEBD801EF9B8A9491C491A234607
32,981,534 UART: Caliptra RT
32,982,278 UART: [state] CFI Enabled
33,099,403 UART: [rt] RT listening for mailbox commands...
33,101,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,132,052 UART: [rt]cmd =0x44504543, len=96
38,803,990 >>> mbox cmd response data (6236 bytes)
38,833,504 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,863,908 UART: [rt]cmd =0x53574545, len=84
38,867,355 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
192,015 UART:
192,383 UART: Running Caliptra ROM ...
193,523 UART:
193,674 UART: [state] CFI Enabled
263,026 UART: [state] LifecycleState = Unprovisioned
264,936 UART: [state] DebugLocked = No
266,740 UART: [state] WD Timer not started. Device not locked for debugging
270,419 UART: [kat] SHA2-256
449,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,073 UART: [kat] ++
461,610 UART: [kat] sha1
473,201 UART: [kat] SHA2-256
476,209 UART: [kat] SHA2-384
483,192 UART: [kat] SHA2-512-ACC
486,126 UART: [kat] ECC-384
2,948,960 UART: [kat] HMAC-384Kdf
2,972,173 UART: [kat] LMS
3,501,594 UART: [kat] --
3,505,660 UART: [cold-reset] ++
3,508,227 UART: [fht] FHT @ 0x50003400
3,519,348 UART: [idev] ++
3,519,915 UART: [idev] CDI.KEYID = 6
3,520,800 UART: [idev] SUBJECT.KEYID = 7
3,522,038 UART: [idev] UDS.KEYID = 0
3,522,945 ready_for_fw is high
3,523,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,488 UART: [idev] Erasing UDS.KEYID = 0
6,024,945 UART: [idev] Sha1 KeyId Algorithm
6,046,830 UART: [idev] --
6,051,834 UART: [ldev] ++
6,052,415 UART: [ldev] CDI.KEYID = 6
6,053,346 UART: [ldev] SUBJECT.KEYID = 5
6,054,524 UART: [ldev] AUTHORITY.KEYID = 7
6,055,761 UART: [ldev] FE.KEYID = 1
6,100,438 UART: [ldev] Erasing FE.KEYID = 1
8,603,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,511 UART: [ldev] --
10,415,854 UART: [fwproc] Wait for Commands...
10,418,810 UART: [fwproc] Recv command 0x46574c44
10,420,897 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,270 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,317 >>> mbox cmd response: success
14,286,466 UART: [afmc] ++
14,287,063 UART: [afmc] CDI.KEYID = 6
14,287,959 UART: [afmc] SUBJECT.KEYID = 7
14,289,171 UART: [afmc] AUTHORITY.KEYID = 5
16,832,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,544 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,539 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,427 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,841 UART: [afmc] --
18,628,780 UART: [cold-reset] --
18,633,078 UART: [state] Locking Datavault
18,638,431 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,076 UART: [state] Locking ICCM
18,641,201 UART: [exit] Launching FMC @ 0x40000130
18,649,617 UART:
18,649,857 UART: Running Caliptra FMC ...
18,650,956 UART:
18,651,122 UART: [state] CFI Enabled
18,713,049 UART: [fht] FMC Alias Private Key: 7
20,478,141 UART: [art] Extend RT PCRs Done
20,479,354 UART: [art] Lock RT PCRs Done
20,480,995 UART: [art] Populate DV Done
20,486,290 UART: [fht] FMC Alias Private Key: 7
20,487,928 UART: [art] Derive CDI
20,488,740 UART: [art] Store in in slot 0x4
20,546,586 UART: [art] Derive Key Pair
20,547,623 UART: [art] Store priv key in slot 0x5
23,011,004 UART: [art] Derive Key Pair - Done
23,024,281 UART: [art] Signing Cert with AUTHO
23,025,588 UART: RITY.KEYID = 7
24,736,823 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,323 UART: [art] PUB.X = 3CADA74A0698B0CD3D804A9B3A74286AB1C3B3693AC2408C127B4838AC2AD39E98CBEB7EC3090AA2BF3832EB0473B370
24,745,576 UART: [art] PUB.Y = 0A1CB7A974D587441427CFF5E36FEBE7588F8A45308D657E4A5B94757E492AF8BEC48AC4D23846EE79C7B5ADBD17FB79
24,752,870 UART: [art] SIG.R = A8FB9697AB828882D7651BD7DDE5A1FFBB694429E151A182308093D050BD8431B05DA61BB0EC0A29799CC083E93F776D
24,760,297 UART: [art] SIG.S = 6C8F81D4EF8D95FCADAB7873C1173CFE389F8F31359A160F12EDD26E4B38263CD70B1FD87774CB66CA671590C5E4A98A
25,738,714 UART: Caliptra RT
25,739,411 UART: [state] CFI Enabled
25,904,929 UART: [rt] RT listening for mailbox commands...
25,906,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,938,059 UART: [rt]cmd =0x44504543, len=96
30,316,932 >>> mbox cmd response data (6236 bytes)
30,346,213 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,376,615 UART: [rt]cmd =0x53574545, len=84
30,380,415 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,382,817 ready_for_fw is high
3,383,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,080,006 >>> mbox cmd response: success
18,365,627 UART:
18,366,035 UART: Running Caliptra FMC ...
18,367,233 UART:
18,367,401 UART: [state] CFI Enabled
18,433,979 UART: [fht] FMC Alias Private Key: 7
20,197,305 UART: [art] Extend RT PCRs Done
20,198,524 UART: [art] Lock RT PCRs Done
20,200,307 UART: [art] Populate DV Done
20,205,770 UART: [fht] FMC Alias Private Key: 7
20,207,361 UART: [art] Derive CDI
20,208,173 UART: [art] Store in in slot 0x4
20,266,181 UART: [art] Derive Key Pair
20,267,179 UART: [art] Store priv key in slot 0x5
22,729,636 UART: [art] Derive Key Pair - Done
22,742,420 UART: [art] Signing Cert with AUTHO
22,743,729 UART: RITY.KEYID = 7
24,454,932 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,458 UART: [art] PUB.X = A44F2DE00B9D5D6EC77677B816A8DF68BF36A13674EDBC23E63E855140CEC1C9563F798DE7E472104ECC4E24AC328DF0
24,463,713 UART: [art] PUB.Y = BD54DDE1B2D892F8A7987EFE6D00B4F67E9193D63819C35734795E2B309BFC91D69BA39EA5C96869FECD58C4539AF846
24,470,969 UART: [art] SIG.R = D2CC672DD0D2B862FE653F4F692CD9955EBF77A527471217FFA0F15C82307921D00F7C0B863544B32BFA34EEB988CD1E
24,478,360 UART: [art] SIG.S = 13A3170E7FDD3CA117F272904EDAB0FC5A68C58CF677B2A710F6F293E475F9903D0BD0B39CF460168A040163FC17EA70
25,458,198 UART: Caliptra RT
25,458,900 UART: [state] CFI Enabled
25,621,968 UART: [rt] RT listening for mailbox commands...
25,623,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,654,971 UART: [rt]cmd =0x44504543, len=96
30,013,407 >>> mbox cmd response data (6236 bytes)
30,042,791 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,073,409 UART: [rt]cmd =0x53574545, len=84
30,077,395 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,381 UART:
192,736 UART: Running Caliptra ROM ...
193,831 UART:
603,608 UART: [state] CFI Enabled
617,192 UART: [state] LifecycleState = Unprovisioned
619,181 UART: [state] DebugLocked = No
621,352 UART: [state] WD Timer not started. Device not locked for debugging
624,601 UART: [kat] SHA2-256
803,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,255 UART: [kat] ++
815,698 UART: [kat] sha1
825,638 UART: [kat] SHA2-256
828,713 UART: [kat] SHA2-384
835,189 UART: [kat] SHA2-512-ACC
838,115 UART: [kat] ECC-384
3,281,519 UART: [kat] HMAC-384Kdf
3,294,740 UART: [kat] LMS
3,824,267 UART: [kat] --
3,827,191 UART: [cold-reset] ++
3,829,819 UART: [fht] FHT @ 0x50003400
3,841,070 UART: [idev] ++
3,841,626 UART: [idev] CDI.KEYID = 6
3,842,503 UART: [idev] SUBJECT.KEYID = 7
3,843,731 UART: [idev] UDS.KEYID = 0
3,844,771 ready_for_fw is high
3,844,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,807 UART: [idev] Erasing UDS.KEYID = 0
6,317,575 UART: [idev] Sha1 KeyId Algorithm
6,341,018 UART: [idev] --
6,345,546 UART: [ldev] ++
6,346,105 UART: [ldev] CDI.KEYID = 6
6,346,996 UART: [ldev] SUBJECT.KEYID = 5
6,348,202 UART: [ldev] AUTHORITY.KEYID = 7
6,349,482 UART: [ldev] FE.KEYID = 1
6,360,038 UART: [ldev] Erasing FE.KEYID = 1
8,830,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,764 UART: [ldev] --
10,621,545 UART: [fwproc] Wait for Commands...
10,623,165 UART: [fwproc] Recv command 0x46574c44
10,625,265 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,482,727 >>> mbox cmd response: success
14,487,545 UART: [afmc] ++
14,488,131 UART: [afmc] CDI.KEYID = 6
14,489,037 UART: [afmc] SUBJECT.KEYID = 7
14,490,248 UART: [afmc] AUTHORITY.KEYID = 5
16,987,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,384 UART: [afmc] --
18,786,398 UART: [cold-reset] --
18,788,963 UART: [state] Locking Datavault
18,794,738 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,427 UART: [state] Locking ICCM
18,798,485 UART: [exit] Launching FMC @ 0x40000130
18,806,935 UART:
18,807,165 UART: Running Caliptra FMC ...
18,808,257 UART:
18,808,408 UART: [state] CFI Enabled
18,816,935 UART: [fht] FMC Alias Private Key: 7
20,572,920 UART: [art] Extend RT PCRs Done
20,574,108 UART: [art] Lock RT PCRs Done
20,575,879 UART: [art] Populate DV Done
20,581,436 UART: [fht] FMC Alias Private Key: 7
20,583,131 UART: [art] Derive CDI
20,583,931 UART: [art] Store in in slot 0x4
20,626,548 UART: [art] Derive Key Pair
20,627,595 UART: [art] Store priv key in slot 0x5
23,053,911 UART: [art] Derive Key Pair - Done
23,066,731 UART: [art] Signing Cert with AUTHO
23,068,046 UART: RITY.KEYID = 7
24,773,122 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,611 UART: [art] PUB.X = A0809A9D2B5D46934F7A4B5ED879CE7162C9002EAFB00888B17DF8DAFDD5E9B6F221F4338394F0B3AAC49780AEFDC7A4
24,781,902 UART: [art] PUB.Y = 80E4015A111B82C2B4A80C876CC11E2C21E3FBCE2D50294404BC6F95363EC281239F5FFDE1E4EFAE5AC0D279FB61B78C
24,789,231 UART: [art] SIG.R = F7AC5BA4531CDBC8E9937CCF8B6DF5CB87A27A05A83C1C75B9B340202425E015CE6D34ED79948C28E8F447F7C382DD9D
24,796,618 UART: [art] SIG.S = 05613A57844B5A28AF5BB1EBE9A8930D01E61DF90D10D7948CC2E2C9FB24D4177E66ACD89CACF044DD26E370ED73A2B8
25,775,343 UART: Caliptra RT
25,776,052 UART: [state] CFI Enabled
25,892,953 UART: [rt] RT listening for mailbox commands...
25,894,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,925,702 UART: [rt]cmd =0x44504543, len=96
30,206,816 >>> mbox cmd response data (6236 bytes)
30,236,822 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,267,380 UART: [rt]cmd =0x53574545, len=84
30,271,148 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,694,700 ready_for_fw is high
3,695,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,816 >>> mbox cmd response: success
18,517,538 UART:
18,517,943 UART: Running Caliptra FMC ...
18,519,065 UART:
18,519,216 UART: [state] CFI Enabled
18,526,846 UART: [fht] FMC Alias Private Key: 7
20,283,472 UART: [art] Extend RT PCRs Done
20,284,693 UART: [art] Lock RT PCRs Done
20,286,357 UART: [art] Populate DV Done
20,291,712 UART: [fht] FMC Alias Private Key: 7
20,293,463 UART: [art] Derive CDI
20,294,191 UART: [art] Store in in slot 0x4
20,336,833 UART: [art] Derive Key Pair
20,337,825 UART: [art] Store priv key in slot 0x5
22,764,932 UART: [art] Derive Key Pair - Done
22,778,087 UART: [art] Signing Cert with AUTHO
22,779,394 UART: RITY.KEYID = 7
24,484,790 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,311 UART: [art] PUB.X = FFED6C1407D9CE4DFB20A48EC15575547E7DF40A2E49FC52644EE9A27C471F11470E178615355ADF6AD7F690192A29C9
24,493,548 UART: [art] PUB.Y = 3301269E0DBA5626716F8E5719C3F933E412D837D3F6BA336E93463E83685F68F5AD4FFE7500E67E043FA36BBD39DBB6
24,500,772 UART: [art] SIG.R = 1DA5CCF76483767D075A0B39605E6CF99FA136C1CFE908C8508EF1539AAD47023DF52284B1515CD5724960A53305E5F1
24,508,151 UART: [art] SIG.S = 7934750601755353FED6D65F9CDC449C3FBC9E989FE1F03068546FE6BCC45E57B4104F867D0DFD0CC26EEE6A284E53A2
25,487,107 UART: Caliptra RT
25,487,820 UART: [state] CFI Enabled
25,605,151 UART: [rt] RT listening for mailbox commands...
25,607,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,637,730 UART: [rt]cmd =0x44504543, len=96
29,919,873 >>> mbox cmd response data (6236 bytes)
29,949,244 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,979,593 UART: [rt]cmd =0x53574545, len=84
29,983,069 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,440,469 ready_for_fw is high
3,441,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,740,261 >>> mbox cmd response: success
19,030,905 UART:
19,031,737 UART: Running Caliptra FMC ...
19,032,854 UART:
19,033,010 UART: [state] CFI Enabled
19,099,036 UART: [fht] FMC Alias Private Key: 7
20,862,999 UART: [art] Extend RT PCRs Done
20,864,226 UART: [art] Lock RT PCRs Done
20,866,155 UART: [art] Populate DV Done
20,871,354 UART: [fht] FMC Alias Private Key: 7
20,872,839 UART: [art] Derive CDI
20,873,606 UART: [art] Store in in slot 0x4
20,931,785 UART: [art] Derive Key Pair
20,932,818 UART: [art] Store priv key in slot 0x5
23,397,132 UART: [art] Derive Key Pair - Done
23,410,413 UART: [art] Signing Cert with AUTHO
23,411,764 UART: RITY.KEYID = 7
25,122,647 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,162 UART: [art] PUB.X = FEA363BA9058FBBDA220132FB4ACCC2261516EBD206E9EC360AB3B3E46E6E652D9962BBC4201A000696BEFFBCB68B52B
25,131,414 UART: [art] PUB.Y = 138ABAC177802557B5D07B23A3A339180E39BD0B5AE6C19663C3F7F46A7058FBD13665A73349D334D9BB19D601DCEB65
25,138,668 UART: [art] SIG.R = 4E5BD8B0BB0B77CF8A417C79160B26768D2A893A9D47A77BACDECEF72E18CC03393599596DD4FF09293AE10E78DECB3E
25,146,118 UART: [art] SIG.S = 48371A65265BD2585EB0B56D8D92563DA9DA85654CAA3560BB5237B06B7E753171F76B536B016E2CC48AD4BD553A13A2
26,124,951 UART: Caliptra RT
26,125,662 UART: [state] CFI Enabled
26,290,695 UART: [rt] RT listening for mailbox commands...
26,292,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,323,836 UART: [rt]cmd =0x44504543, len=96
30,682,033 >>> mbox cmd response data (6236 bytes)
30,711,423 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,741,768 UART: [rt]cmd =0x53574545, len=84
30,745,264 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,756,942 ready_for_fw is high
3,757,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,956,434 >>> mbox cmd response: success
19,210,370 UART:
19,210,757 UART: Running Caliptra FMC ...
19,211,948 UART:
19,212,115 UART: [state] CFI Enabled
19,220,163 UART: [fht] FMC Alias Private Key: 7
20,977,420 UART: [art] Extend RT PCRs Done
20,978,637 UART: [art] Lock RT PCRs Done
20,980,209 UART: [art] Populate DV Done
20,985,779 UART: [fht] FMC Alias Private Key: 7
20,987,326 UART: [art] Derive CDI
20,988,158 UART: [art] Store in in slot 0x4
21,030,810 UART: [art] Derive Key Pair
21,031,809 UART: [art] Store priv key in slot 0x5
23,459,270 UART: [art] Derive Key Pair - Done
23,472,326 UART: [art] Signing Cert with AUTHO
23,473,616 UART: RITY.KEYID = 7
25,179,446 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,951 UART: [art] PUB.X = F7EC0C865C286A240C3AA9804A37AB18B434246A80598EBDC147B1089D2FE24ABC07DF7BBBC41BF7F09C573027729150
25,188,242 UART: [art] PUB.Y = 0747619D38C023B73A5F28A75F52186880F6F0E552246C9C897817938C641307FC2E08807E6BBF5D80D4E65B2EA4D1DA
25,195,457 UART: [art] SIG.R = 9081E233A7F50BE2A5FFEAF9CF1DF71BB26E9CA4EB6C9562A5BC4B69F6C7523A3242B57CFF64AECD2A0E9F3EAA3192AC
25,202,895 UART: [art] SIG.S = EB7FF146B2BBDF36BA0663D2E2292A11D486FBD2AB4F4C1C52A8A169CEAF3FAB775E2283FBE977995A98D593E43C5A2C
26,181,816 UART: Caliptra RT
26,182,502 UART: [state] CFI Enabled
26,299,446 UART: [rt] RT listening for mailbox commands...
26,301,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,332,125 UART: [rt]cmd =0x44504543, len=96
30,616,340 >>> mbox cmd response data (6236 bytes)
30,645,841 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,676,560 UART: [rt]cmd =0x53574545, len=84
30,680,547 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,687 UART: [kat] SHA2-256
881,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,733 UART: [kat] ++
885,885 UART: [kat] sha1
890,337 UART: [kat] SHA2-256
892,275 UART: [kat] SHA2-384
895,136 UART: [kat] SHA2-512-ACC
897,037 UART: [kat] ECC-384
902,830 UART: [kat] HMAC-384Kdf
907,386 UART: [kat] LMS
1,475,582 UART: [kat] --
1,476,311 UART: [cold-reset] ++
1,476,661 UART: [fht] Storing FHT @ 0x50003400
1,479,444 UART: [idev] ++
1,479,612 UART: [idev] CDI.KEYID = 6
1,479,972 UART: [idev] SUBJECT.KEYID = 7
1,480,396 UART: [idev] UDS.KEYID = 0
1,480,741 ready_for_fw is high
1,480,741 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,178 UART: [idev] Erasing UDS.KEYID = 0
1,504,924 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,610 UART: [idev] --
1,514,689 UART: [ldev] ++
1,514,857 UART: [ldev] CDI.KEYID = 6
1,515,220 UART: [ldev] SUBJECT.KEYID = 5
1,515,646 UART: [ldev] AUTHORITY.KEYID = 7
1,516,109 UART: [ldev] FE.KEYID = 1
1,521,003 UART: [ldev] Erasing FE.KEYID = 1
1,546,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,532 UART: [ldev] --
1,585,917 UART: [fwproc] Waiting for Commands...
1,586,610 UART: [fwproc] Received command 0x46574c44
1,587,401 UART: [fwproc] Received Image of size 114448 bytes
2,887,232 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,796 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,148 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,093 >>> mbox cmd response: success
3,081,333 UART: [afmc] ++
3,081,501 UART: [afmc] CDI.KEYID = 6
3,081,863 UART: [afmc] SUBJECT.KEYID = 7
3,082,288 UART: [afmc] AUTHORITY.KEYID = 5
3,117,867 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,799 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,307 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,192 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,882 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,713 UART: [afmc] --
3,160,729 UART: [cold-reset] --
3,161,433 UART: [state] Locking Datavault
3,162,680 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,284 UART: [state] Locking ICCM
3,163,750 UART: [exit] Launching FMC @ 0x40000130
3,169,079 UART:
3,169,095 UART: Running Caliptra FMC ...
3,169,503 UART:
3,169,557 UART: [state] CFI Enabled
3,180,016 UART: [fht] FMC Alias Private Key: 7
3,288,615 UART: [art] Extend RT PCRs Done
3,289,043 UART: [art] Lock RT PCRs Done
3,290,917 UART: [art] Populate DV Done
3,298,756 UART: [fht] FMC Alias Private Key: 7
3,299,752 UART: [art] Derive CDI
3,300,032 UART: [art] Store in in slot 0x4
3,385,543 UART: [art] Derive Key Pair
3,385,903 UART: [art] Store priv key in slot 0x5
3,399,491 UART: [art] Derive Key Pair - Done
3,414,501 UART: [art] Signing Cert with AUTHO
3,414,981 UART: RITY.KEYID = 7
3,430,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,832 UART: [art] PUB.X = D2320C394864BFF543C8ECEEDAC109052DFF4CFD335BC2890945249CC4A13F8C9C8DB2D8E67D02E43FF474634F1614C4
3,437,599 UART: [art] PUB.Y = 4613F9326C130A7C924FA08DFA77075DB7EC3B37BA57F913B0A2E396D15A2012FC7D110258F71CE57370CF8BEAB3DDDE
3,444,554 UART: [art] SIG.R = DEB1DDDD0646C9DFDDFA2C2D31B31B32C0790D2FC2C28560C66B092F9B36192C46F68E8BABEB74642C3865C6D6B7265A
3,451,333 UART: [art] SIG.S = BB9B8F3ECD9073D7727C8DAB9334F8AAB6B796C774B4C7252E1F8A12927F592B4E4774663151D8908C4B7B40776D6D7C
3,475,006 UART: Caliptra RT
3,475,259 UART: [state] CFI Enabled
3,583,563 UART: [rt] RT listening for mailbox commands...
3,584,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,599 UART: [rt]cmd =0x44504543, len=96
3,795,403 >>> mbox cmd response data (6236 bytes)
3,795,404 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,429 UART: [rt]cmd =0x53574545, len=84
3,828,549 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,503 ready_for_fw is high
1,362,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,733 >>> mbox cmd response: success
2,990,183 UART:
2,990,199 UART: Running Caliptra FMC ...
2,990,607 UART:
2,990,661 UART: [state] CFI Enabled
3,001,226 UART: [fht] FMC Alias Private Key: 7
3,109,459 UART: [art] Extend RT PCRs Done
3,109,887 UART: [art] Lock RT PCRs Done
3,111,171 UART: [art] Populate DV Done
3,119,292 UART: [fht] FMC Alias Private Key: 7
3,120,466 UART: [art] Derive CDI
3,120,746 UART: [art] Store in in slot 0x4
3,206,239 UART: [art] Derive Key Pair
3,206,599 UART: [art] Store priv key in slot 0x5
3,219,939 UART: [art] Derive Key Pair - Done
3,234,550 UART: [art] Signing Cert with AUTHO
3,235,030 UART: RITY.KEYID = 7
3,249,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,713 UART: [art] PUB.X = BA0368A5821426F54B92023A63C7E7924211E9180F06F6A1D1BB10C1D490018F7D64B6F6E44A18317F2CE577ED19E7B3
3,257,466 UART: [art] PUB.Y = E4267F2698A2378B88BEA992B343F8EAFCAFE6C090C4E0CDFED22B7BA44BA41F3962B723C59F0BEFE613993A5449DE07
3,264,428 UART: [art] SIG.R = AC5EE485397AEF1FFC0158875FF5793F4BCAA2DE6C3442A99DBF9E05AF97CCE17F3D539F270267AAE9F2DFDA98B0A04D
3,271,215 UART: [art] SIG.S = E70674580E745EA1023CD647643221BD7F3858DF75C65CEBE4413C6E9F868CA26916DCC0FFABD6FD0845F7CB4D990AFE
3,295,257 UART: Caliptra RT
3,295,510 UART: [state] CFI Enabled
3,402,748 UART: [rt] RT listening for mailbox commands...
3,403,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,826 UART: [rt]cmd =0x44504543, len=96
3,614,120 >>> mbox cmd response data (6236 bytes)
3,614,121 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,832 UART: [rt]cmd =0x53574545, len=84
3,647,344 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
86,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,494 UART: [kat] SHA2-256
882,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,540 UART: [kat] ++
886,692 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,477 UART: [kat] SHA2-512-ACC
897,378 UART: [kat] ECC-384
903,033 UART: [kat] HMAC-384Kdf
907,741 UART: [kat] LMS
1,475,937 UART: [kat] --
1,476,864 UART: [cold-reset] ++
1,477,278 UART: [fht] Storing FHT @ 0x50003400
1,480,065 UART: [idev] ++
1,480,233 UART: [idev] CDI.KEYID = 6
1,480,593 UART: [idev] SUBJECT.KEYID = 7
1,481,017 UART: [idev] UDS.KEYID = 0
1,481,362 ready_for_fw is high
1,481,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,859 UART: [idev] Erasing UDS.KEYID = 0
1,505,687 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,503 UART: [idev] --
1,515,408 UART: [ldev] ++
1,515,576 UART: [ldev] CDI.KEYID = 6
1,515,939 UART: [ldev] SUBJECT.KEYID = 5
1,516,365 UART: [ldev] AUTHORITY.KEYID = 7
1,516,828 UART: [ldev] FE.KEYID = 1
1,522,020 UART: [ldev] Erasing FE.KEYID = 1
1,547,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,403 UART: [ldev] --
1,586,910 UART: [fwproc] Waiting for Commands...
1,587,711 UART: [fwproc] Received command 0x46574c44
1,588,502 UART: [fwproc] Received Image of size 114448 bytes
2,887,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,871 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,223 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,228 >>> mbox cmd response: success
3,081,384 UART: [afmc] ++
3,081,552 UART: [afmc] CDI.KEYID = 6
3,081,914 UART: [afmc] SUBJECT.KEYID = 7
3,082,339 UART: [afmc] AUTHORITY.KEYID = 5
3,117,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,508 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,288 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,901 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,591 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,512 UART: [afmc] --
3,160,454 UART: [cold-reset] --
3,161,284 UART: [state] Locking Datavault
3,162,541 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,145 UART: [state] Locking ICCM
3,163,787 UART: [exit] Launching FMC @ 0x40000130
3,169,116 UART:
3,169,132 UART: Running Caliptra FMC ...
3,169,540 UART:
3,169,683 UART: [state] CFI Enabled
3,180,436 UART: [fht] FMC Alias Private Key: 7
3,288,491 UART: [art] Extend RT PCRs Done
3,288,919 UART: [art] Lock RT PCRs Done
3,290,617 UART: [art] Populate DV Done
3,298,762 UART: [fht] FMC Alias Private Key: 7
3,299,784 UART: [art] Derive CDI
3,300,064 UART: [art] Store in in slot 0x4
3,385,879 UART: [art] Derive Key Pair
3,386,239 UART: [art] Store priv key in slot 0x5
3,398,759 UART: [art] Derive Key Pair - Done
3,413,477 UART: [art] Signing Cert with AUTHO
3,413,957 UART: RITY.KEYID = 7
3,428,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,748 UART: [art] PUB.X = 470318071848977595071EC34A8EC0928ABC041BB115149FC47817EB478772AA43478593F358D2489A34C4AC59EAC111
3,436,494 UART: [art] PUB.Y = 63C182F599DE1DC70EEEE7219257923DC60CC4DF46C14E6E2D981BAFA198D94FE5E06D23DFF483458E010E5CD1F2E35B
3,443,448 UART: [art] SIG.R = 0DE7AE7BF4E1DD2FE397945100229B2171DCA2E1E0BFDADE2B5ADBB7E5B29D8D1AD153B5A68AF0E5600147224DBB9833
3,450,212 UART: [art] SIG.S = 2A76BE0D4E5CC0FCF117034A5C5F2230CCE02FDCC0E9B69D69D9A64124B2E73B734FD5CCBDA9C59F134BDECDE09F1491
3,474,065 UART: Caliptra RT
3,474,410 UART: [state] CFI Enabled
3,582,548 UART: [rt] RT listening for mailbox commands...
3,583,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,270 UART: [rt]cmd =0x44504543, len=96
3,794,113 >>> mbox cmd response data (6236 bytes)
3,794,114 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,807 UART: [rt]cmd =0x53574545, len=84
3,827,369 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,142 ready_for_fw is high
1,363,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,898 >>> mbox cmd response: success
2,991,800 UART:
2,991,816 UART: Running Caliptra FMC ...
2,992,224 UART:
2,992,367 UART: [state] CFI Enabled
3,003,120 UART: [fht] FMC Alias Private Key: 7
3,111,309 UART: [art] Extend RT PCRs Done
3,111,737 UART: [art] Lock RT PCRs Done
3,113,183 UART: [art] Populate DV Done
3,121,588 UART: [fht] FMC Alias Private Key: 7
3,122,762 UART: [art] Derive CDI
3,123,042 UART: [art] Store in in slot 0x4
3,208,819 UART: [art] Derive Key Pair
3,209,179 UART: [art] Store priv key in slot 0x5
3,222,525 UART: [art] Derive Key Pair - Done
3,237,203 UART: [art] Signing Cert with AUTHO
3,237,683 UART: RITY.KEYID = 7
3,253,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,176 UART: [art] PUB.X = 6812F8F236542705A60C5668276146F79B30B79CD9E658BCA86C421DF05F29094941AEECBC8464B127020DE58CB1A64D
3,260,929 UART: [art] PUB.Y = 9973CD279A7B3461135FA851A8296827296559580226CD2D9DC468254EC21030A3F5DDBD83EF33C533F1DDC7F99E34C9
3,267,874 UART: [art] SIG.R = CACF0E239714CC88530971B9D3C6B7BAE7432D4E8FFB8EAEBE3FD2DD35A63BC03393CFC74F6A64FAACC5E5E84284976D
3,274,664 UART: [art] SIG.S = EF17573EF0867F524B188833A9FE215C9AB2164C50E60D96D859DCD234D5124942DF75777CFD5F2AE4CB7A213ADEB9B4
3,298,322 UART: Caliptra RT
3,298,667 UART: [state] CFI Enabled
3,407,299 UART: [rt] RT listening for mailbox commands...
3,407,969 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,289 UART: [rt]cmd =0x44504543, len=96
3,618,616 >>> mbox cmd response data (6236 bytes)
3,618,617 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,442 UART: [rt]cmd =0x53574545, len=84
3,651,698 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
893,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,541 UART: [kat] ++
897,693 UART: [kat] sha1
901,871 UART: [kat] SHA2-256
903,811 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
917,724 UART: [kat] HMAC-384Kdf
922,424 UART: [kat] LMS
1,170,752 UART: [kat] --
1,171,461 UART: [cold-reset] ++
1,171,985 UART: [fht] FHT @ 0x50003400
1,174,656 UART: [idev] ++
1,174,824 UART: [idev] CDI.KEYID = 6
1,175,184 UART: [idev] SUBJECT.KEYID = 7
1,175,608 UART: [idev] UDS.KEYID = 0
1,175,953 ready_for_fw is high
1,175,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,856 UART: [idev] Erasing UDS.KEYID = 0
1,201,183 UART: [idev] Sha1 KeyId Algorithm
1,209,691 UART: [idev] --
1,210,715 UART: [ldev] ++
1,210,883 UART: [ldev] CDI.KEYID = 6
1,211,246 UART: [ldev] SUBJECT.KEYID = 5
1,211,672 UART: [ldev] AUTHORITY.KEYID = 7
1,212,135 UART: [ldev] FE.KEYID = 1
1,217,339 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,407 UART: [ldev] --
1,281,670 UART: [fwproc] Wait for Commands...
1,282,414 UART: [fwproc] Recv command 0x46574c44
1,283,142 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,281 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,224 >>> mbox cmd response: success
2,776,470 UART: [afmc] ++
2,776,638 UART: [afmc] CDI.KEYID = 6
2,777,000 UART: [afmc] SUBJECT.KEYID = 7
2,777,425 UART: [afmc] AUTHORITY.KEYID = 5
2,812,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,265 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,993 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,878 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,597 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,515 UART: [afmc] --
2,856,591 UART: [cold-reset] --
2,857,107 UART: [state] Locking Datavault
2,858,470 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,074 UART: [state] Locking ICCM
2,859,720 UART: [exit] Launching FMC @ 0x40000130
2,865,049 UART:
2,865,065 UART: Running Caliptra FMC ...
2,865,473 UART:
2,865,527 UART: [state] CFI Enabled
2,875,768 UART: [fht] FMC Alias Private Key: 7
2,983,379 UART: [art] Extend RT PCRs Done
2,983,807 UART: [art] Lock RT PCRs Done
2,985,209 UART: [art] Populate DV Done
2,993,318 UART: [fht] FMC Alias Private Key: 7
2,994,340 UART: [art] Derive CDI
2,994,620 UART: [art] Store in in slot 0x4
3,080,127 UART: [art] Derive Key Pair
3,080,487 UART: [art] Store priv key in slot 0x5
3,093,345 UART: [art] Derive Key Pair - Done
3,108,595 UART: [art] Signing Cert with AUTHO
3,109,075 UART: RITY.KEYID = 7
3,123,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,486 UART: [art] PUB.X = 163818F64B5C06591CB2C29A2011E05F04269817AA9421C08B13A073B635328E09059C90F3DD062507B50EE523320AED
3,131,222 UART: [art] PUB.Y = C2121E82D79A3D2F0E56A67BA361D497FEB119A091543A9A4E2627D1D1834C3793AEE011FF5D27B6DF5A9548607935C8
3,138,171 UART: [art] SIG.R = 0430300E40C421CA1132C31345D96DA814B08F876D2523E64F34B8B4B3984AA0B6FF56875415328F804A7EA741EDB1B1
3,144,931 UART: [art] SIG.S = ED74EE0877E0AC4C40B17B9552B7D6A6D6D06D2BF589C3957D5C74A608AD46552DFA6BF360D46ED5AB63ACF8B49F7A6C
3,168,754 UART: Caliptra RT
3,169,007 UART: [state] CFI Enabled
3,277,042 UART: [rt] RT listening for mailbox commands...
3,277,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,068 UART: [rt]cmd =0x44504543, len=96
3,488,533 >>> mbox cmd response data (6236 bytes)
3,488,534 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,565 UART: [rt]cmd =0x53574545, len=84
3,521,757 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,419 ready_for_fw is high
1,059,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,317 >>> mbox cmd response: success
2,688,597 UART:
2,688,613 UART: Running Caliptra FMC ...
2,689,021 UART:
2,689,075 UART: [state] CFI Enabled
2,699,434 UART: [fht] FMC Alias Private Key: 7
2,806,861 UART: [art] Extend RT PCRs Done
2,807,289 UART: [art] Lock RT PCRs Done
2,808,929 UART: [art] Populate DV Done
2,817,262 UART: [fht] FMC Alias Private Key: 7
2,818,398 UART: [art] Derive CDI
2,818,678 UART: [art] Store in in slot 0x4
2,904,615 UART: [art] Derive Key Pair
2,904,975 UART: [art] Store priv key in slot 0x5
2,917,531 UART: [art] Derive Key Pair - Done
2,932,380 UART: [art] Signing Cert with AUTHO
2,932,860 UART: RITY.KEYID = 7
2,947,934 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,699 UART: [art] PUB.X = 67424B5C1DA5A2E8CBB10BBE446B9CE4E834E97BE725BEB0E8A927067E69444E30E8D8761D1790AA6508CEBEA089F3DC
2,955,476 UART: [art] PUB.Y = E8538FC2330FDD40B836C5B6994B9AB1B8862766A237C47DC358D6E36F14E17C6FE987E7C647776D6C219B6478802DDF
2,962,425 UART: [art] SIG.R = 4306FB136D97A5D06DBC60AF8D75893118073E628701EAB70416B4B305F139406DCE9F6AA8639ED5C66F04EB6F6523A3
2,969,179 UART: [art] SIG.S = 44581EE267811E1E437E23F998FC50B46576AC582C2B24EC17103A4209EBDB73E010C991825A73F2124A0F465A12F126
2,993,210 UART: Caliptra RT
2,993,463 UART: [state] CFI Enabled
3,100,134 UART: [rt] RT listening for mailbox commands...
3,100,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,116 UART: [rt]cmd =0x44504543, len=96
3,311,468 >>> mbox cmd response data (6236 bytes)
3,311,469 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,316 UART: [rt]cmd =0x53574545, len=84
3,344,486 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
901,986 UART: [kat] SHA2-256
903,926 UART: [kat] SHA2-384
906,759 UART: [kat] SHA2-512-ACC
908,660 UART: [kat] ECC-384
918,673 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,360 UART: [cold-reset] ++
1,172,838 UART: [fht] FHT @ 0x50003400
1,175,515 UART: [idev] ++
1,175,683 UART: [idev] CDI.KEYID = 6
1,176,043 UART: [idev] SUBJECT.KEYID = 7
1,176,467 UART: [idev] UDS.KEYID = 0
1,176,812 ready_for_fw is high
1,176,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,145 UART: [idev] Erasing UDS.KEYID = 0
1,200,778 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,302 UART: [ldev] ++
1,210,470 UART: [ldev] CDI.KEYID = 6
1,210,833 UART: [ldev] SUBJECT.KEYID = 5
1,211,259 UART: [ldev] AUTHORITY.KEYID = 7
1,211,722 UART: [ldev] FE.KEYID = 1
1,216,738 UART: [ldev] Erasing FE.KEYID = 1
1,243,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,044 UART: [ldev] --
1,282,377 UART: [fwproc] Wait for Commands...
1,283,175 UART: [fwproc] Recv command 0x46574c44
1,283,903 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,330 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,634 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,579 >>> mbox cmd response: success
2,776,653 UART: [afmc] ++
2,776,821 UART: [afmc] CDI.KEYID = 6
2,777,183 UART: [afmc] SUBJECT.KEYID = 7
2,777,608 UART: [afmc] AUTHORITY.KEYID = 5
2,813,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,948 UART: [afmc] --
2,856,868 UART: [cold-reset] --
2,857,696 UART: [state] Locking Datavault
2,858,821 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,425 UART: [state] Locking ICCM
2,860,081 UART: [exit] Launching FMC @ 0x40000130
2,865,410 UART:
2,865,426 UART: Running Caliptra FMC ...
2,865,834 UART:
2,865,977 UART: [state] CFI Enabled
2,876,718 UART: [fht] FMC Alias Private Key: 7
2,984,695 UART: [art] Extend RT PCRs Done
2,985,123 UART: [art] Lock RT PCRs Done
2,986,635 UART: [art] Populate DV Done
2,994,832 UART: [fht] FMC Alias Private Key: 7
2,995,884 UART: [art] Derive CDI
2,996,164 UART: [art] Store in in slot 0x4
3,081,685 UART: [art] Derive Key Pair
3,082,045 UART: [art] Store priv key in slot 0x5
3,095,805 UART: [art] Derive Key Pair - Done
3,110,354 UART: [art] Signing Cert with AUTHO
3,110,834 UART: RITY.KEYID = 7
3,126,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,827 UART: [art] PUB.X = 810B00BA9B1A810E585432CCBCFB59A47881BDBC5BEAA44E64EC255982E06D5CAE97F288AF0C690D184DBF2C0820D195
3,133,576 UART: [art] PUB.Y = 7F6559ACC7D6B312BADD5BE64ACDACF347DC1542888C067F82334B828669A1A07BE86A546B5B05C7B3103D311A4B76A7
3,140,530 UART: [art] SIG.R = A6C67B0692159819AA0CBE57D36137AAF21D05E0A1FFDB872D5209BF4B6FA335503133FABFBF1D1C7D55F274DF534F07
3,147,299 UART: [art] SIG.S = 1ECFAF3A4B030E3573472865DF35458C63B29F95BFE8C1260FBAAE68D572EAB7002748FFC4D2DDD270FD1CFA91AFD4C5
3,170,605 UART: Caliptra RT
3,170,950 UART: [state] CFI Enabled
3,279,053 UART: [rt] RT listening for mailbox commands...
3,279,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,237 UART: [rt]cmd =0x44504543, len=96
3,490,826 >>> mbox cmd response data (6236 bytes)
3,490,827 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,528 UART: [rt]cmd =0x53574545, len=84
3,523,416 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,586 ready_for_fw is high
1,060,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,864 >>> mbox cmd response: success
2,692,514 UART:
2,692,530 UART: Running Caliptra FMC ...
2,692,938 UART:
2,693,081 UART: [state] CFI Enabled
2,702,992 UART: [fht] FMC Alias Private Key: 7
2,811,389 UART: [art] Extend RT PCRs Done
2,811,817 UART: [art] Lock RT PCRs Done
2,813,133 UART: [art] Populate DV Done
2,821,556 UART: [fht] FMC Alias Private Key: 7
2,822,584 UART: [art] Derive CDI
2,822,864 UART: [art] Store in in slot 0x4
2,908,713 UART: [art] Derive Key Pair
2,909,073 UART: [art] Store priv key in slot 0x5
2,922,245 UART: [art] Derive Key Pair - Done
2,937,107 UART: [art] Signing Cert with AUTHO
2,937,587 UART: RITY.KEYID = 7
2,953,095 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,860 UART: [art] PUB.X = 71193EC80A621120F9BF03F0975439B5212D975806BD622B126DE6836BEDEBDA59D7C26AD6E5312AEF1A885ACD564FC5
2,960,629 UART: [art] PUB.Y = ECCE279ACE4CB13DB211583AD71019F01AD699CED7D12427A5BA23D1B72A5509DF91E4CFFF3B34D147D2499135481F53
2,967,588 UART: [art] SIG.R = BA2B9A77510DFAF7FEEDAA708957558E17B87E2E0B1CC0B6A39AF006F209ACB4EC6592123F0CC378327E150B06A72AF8
2,974,353 UART: [art] SIG.S = 2F8A26F9E1055282EEA795203F89A3FDCF82F1BF9DF42446849A0BE60B2A99E9F0EC73FFE9EAD24B53D0102C05CE6C76
2,997,710 UART: Caliptra RT
2,998,055 UART: [state] CFI Enabled
3,104,732 UART: [rt] RT listening for mailbox commands...
3,105,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,964 UART: [rt]cmd =0x44504543, len=96
3,317,485 >>> mbox cmd response data (6236 bytes)
3,317,486 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,361 UART: [rt]cmd =0x53574545, len=84
3,350,145 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
915,880 UART: [kat] HMAC-384Kdf
920,396 UART: [kat] LMS
1,168,708 UART: [kat] --
1,169,517 UART: [cold-reset] ++
1,170,071 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,173,991 ready_for_fw is high
1,173,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,198,073 UART: [idev] Sha1 KeyId Algorithm
1,207,093 UART: [idev] --
1,208,078 UART: [ldev] ++
1,208,246 UART: [ldev] CDI.KEYID = 6
1,208,610 UART: [ldev] SUBJECT.KEYID = 5
1,209,037 UART: [ldev] AUTHORITY.KEYID = 7
1,209,500 UART: [ldev] FE.KEYID = 1
1,214,778 UART: [ldev] Erasing FE.KEYID = 1
1,241,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,372 UART: [ldev] --
1,280,834 UART: [fwproc] Wait for Commands...
1,281,563 UART: [fwproc] Recv command 0x46574c44
1,282,296 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,830 >>> mbox cmd response: success
2,775,035 UART: [afmc] ++
2,775,203 UART: [afmc] CDI.KEYID = 6
2,775,566 UART: [afmc] SUBJECT.KEYID = 7
2,775,992 UART: [afmc] AUTHORITY.KEYID = 5
2,811,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,224 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,943 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,860 UART: [afmc] --
2,854,906 UART: [cold-reset] --
2,855,812 UART: [state] Locking Datavault
2,857,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,669 UART: [state] Locking ICCM
2,858,281 UART: [exit] Launching FMC @ 0x40000130
2,863,610 UART:
2,863,626 UART: Running Caliptra FMC ...
2,864,034 UART:
2,864,088 UART: [state] CFI Enabled
2,874,535 UART: [fht] FMC Alias Private Key: 7
2,982,480 UART: [art] Extend RT PCRs Done
2,982,908 UART: [art] Lock RT PCRs Done
2,984,380 UART: [art] Populate DV Done
2,992,821 UART: [fht] FMC Alias Private Key: 7
2,993,937 UART: [art] Derive CDI
2,994,217 UART: [art] Store in in slot 0x4
3,080,140 UART: [art] Derive Key Pair
3,080,500 UART: [art] Store priv key in slot 0x5
3,093,492 UART: [art] Derive Key Pair - Done
3,108,105 UART: [art] Signing Cert with AUTHO
3,108,585 UART: RITY.KEYID = 7
3,123,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,712 UART: [art] PUB.X = F4FBF8C15AF76D4F8B6995480E62D9B1CD97E26D1167F490EB3B39F23D7F0AC378528721C007C033592A20A33CF45446
3,131,475 UART: [art] PUB.Y = 91EAF4CCFCA9BCCB022EC0B1B01FB2AD02AA08BADC470CAF234479A09F42F477CBAC3005B37DD792B2092974A697187A
3,138,429 UART: [art] SIG.R = 5FD41E42F52949EB803652451A3CEE0C779EDAE2E9E0729188E8DC46137D6A8D24253687F93088D3B9D83D334F354D91
3,145,194 UART: [art] SIG.S = BCAB93766588CE5B96A06F616A48AFFA66F4E0B2EC66E14C042B555CBA13900489BD204DD3880F83A11A87A41BDF8096
3,168,240 UART: Caliptra RT
3,168,493 UART: [state] CFI Enabled
3,275,476 UART: [rt] RT listening for mailbox commands...
3,276,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,324 UART: [rt]cmd =0x44504543, len=96
3,486,511 >>> mbox cmd response data (6236 bytes)
3,486,512 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,221 UART: [rt]cmd =0x53574545, len=84
3,519,847 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,290 ready_for_fw is high
1,056,290 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,766 >>> mbox cmd response: success
2,686,166 UART:
2,686,182 UART: Running Caliptra FMC ...
2,686,590 UART:
2,686,644 UART: [state] CFI Enabled
2,696,927 UART: [fht] FMC Alias Private Key: 7
2,804,914 UART: [art] Extend RT PCRs Done
2,805,342 UART: [art] Lock RT PCRs Done
2,806,564 UART: [art] Populate DV Done
2,814,801 UART: [fht] FMC Alias Private Key: 7
2,815,899 UART: [art] Derive CDI
2,816,179 UART: [art] Store in in slot 0x4
2,901,842 UART: [art] Derive Key Pair
2,902,202 UART: [art] Store priv key in slot 0x5
2,914,848 UART: [art] Derive Key Pair - Done
2,929,850 UART: [art] Signing Cert with AUTHO
2,930,330 UART: RITY.KEYID = 7
2,945,418 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,183 UART: [art] PUB.X = B1F2D759495BC66119FF97A470A6B5565C761E125141C5ADAB3CC82F6686553DE03A43A49789A2784161D8D819E3BD9C
2,952,953 UART: [art] PUB.Y = 4F639A6A8499074091085FE895F1C6EFABFCDF2B02FCF7A7F80E505A2B787B59BD10BC216DD35CCFD49B645B8F0C2447
2,959,904 UART: [art] SIG.R = FD4FC23F3B9C7A959AB59D163C11E216C17F811398F14AA631DB4167ED011CF10935BD5B9387D0AB57A46DBFF466A371
2,966,678 UART: [art] SIG.S = BEC45C32FC16BBB4373200B8161CFA30EF2FEFC6221DD3B2E64B6DC6FA9C01605545199FB4BD8775980F75FD498998BB
2,990,865 UART: Caliptra RT
2,991,118 UART: [state] CFI Enabled
3,099,434 UART: [rt] RT listening for mailbox commands...
3,100,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,804 UART: [rt]cmd =0x44504543, len=96
3,310,963 >>> mbox cmd response data (6236 bytes)
3,310,964 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,911 UART: [rt]cmd =0x53574545, len=84
3,343,725 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
891,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,986 UART: [kat] ++
896,138 UART: [kat] sha1
900,476 UART: [kat] SHA2-256
902,416 UART: [kat] SHA2-384
905,041 UART: [kat] SHA2-512-ACC
906,942 UART: [kat] ECC-384
916,895 UART: [kat] HMAC-384Kdf
921,465 UART: [kat] LMS
1,169,777 UART: [kat] --
1,170,816 UART: [cold-reset] ++
1,171,144 UART: [fht] FHT @ 0x50003400
1,173,900 UART: [idev] ++
1,174,068 UART: [idev] CDI.KEYID = 6
1,174,429 UART: [idev] SUBJECT.KEYID = 7
1,174,854 UART: [idev] UDS.KEYID = 0
1,175,200 ready_for_fw is high
1,175,200 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,199,928 UART: [idev] Sha1 KeyId Algorithm
1,208,908 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,757 UART: [ldev] Erasing FE.KEYID = 1
1,243,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,515 UART: [ldev] --
1,282,967 UART: [fwproc] Wait for Commands...
1,283,790 UART: [fwproc] Recv command 0x46574c44
1,284,523 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,463 >>> mbox cmd response: success
2,778,548 UART: [afmc] ++
2,778,716 UART: [afmc] CDI.KEYID = 6
2,779,079 UART: [afmc] SUBJECT.KEYID = 7
2,779,505 UART: [afmc] AUTHORITY.KEYID = 5
2,815,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,803 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,532 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,415 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,134 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,875 UART: [afmc] --
2,858,919 UART: [cold-reset] --
2,859,687 UART: [state] Locking Datavault
2,860,784 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,388 UART: [state] Locking ICCM
2,861,866 UART: [exit] Launching FMC @ 0x40000130
2,867,195 UART:
2,867,211 UART: Running Caliptra FMC ...
2,867,619 UART:
2,867,762 UART: [state] CFI Enabled
2,878,747 UART: [fht] FMC Alias Private Key: 7
2,986,138 UART: [art] Extend RT PCRs Done
2,986,566 UART: [art] Lock RT PCRs Done
2,988,140 UART: [art] Populate DV Done
2,996,633 UART: [fht] FMC Alias Private Key: 7
2,997,723 UART: [art] Derive CDI
2,998,003 UART: [art] Store in in slot 0x4
3,083,646 UART: [art] Derive Key Pair
3,084,006 UART: [art] Store priv key in slot 0x5
3,097,082 UART: [art] Derive Key Pair - Done
3,111,644 UART: [art] Signing Cert with AUTHO
3,112,124 UART: RITY.KEYID = 7
3,127,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,197 UART: [art] PUB.X = 5EFF42ED9390446A4777F60BFEFF05CBD87DA7988BE28312EFEA7FEC34E49582484DFFF3D9F91F5B23DD510F1A249B2A
3,134,978 UART: [art] PUB.Y = F1D4215513949D07EB3B32F98E82614F49180B10BED7BC37427A95B532F33B9E02A73746F0741A810729739B0C74C3EF
3,141,907 UART: [art] SIG.R = 6212C87A51782DE714297145E9509E89595C351066DE4D45106905374B17AFCF9E50B8734420072500E96C509B7DF868
3,148,631 UART: [art] SIG.S = 525DDD70DAB5C3F0A2D3330474A8FBE6FD6F9522BA3201ED5D8D02D6B84A339F0F50B335982EBBE450845A4D508C2D98
3,172,146 UART: Caliptra RT
3,172,491 UART: [state] CFI Enabled
3,280,672 UART: [rt] RT listening for mailbox commands...
3,281,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,676 UART: [rt]cmd =0x44504543, len=96
3,491,779 >>> mbox cmd response data (6236 bytes)
3,491,780 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,407 UART: [rt]cmd =0x53574545, len=84
3,524,601 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,383 ready_for_fw is high
1,056,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,453 >>> mbox cmd response: success
2,687,225 UART:
2,687,241 UART: Running Caliptra FMC ...
2,687,649 UART:
2,687,792 UART: [state] CFI Enabled
2,698,253 UART: [fht] FMC Alias Private Key: 7
2,806,766 UART: [art] Extend RT PCRs Done
2,807,194 UART: [art] Lock RT PCRs Done
2,808,768 UART: [art] Populate DV Done
2,816,973 UART: [fht] FMC Alias Private Key: 7
2,818,055 UART: [art] Derive CDI
2,818,335 UART: [art] Store in in slot 0x4
2,903,906 UART: [art] Derive Key Pair
2,904,266 UART: [art] Store priv key in slot 0x5
2,918,012 UART: [art] Derive Key Pair - Done
2,932,774 UART: [art] Signing Cert with AUTHO
2,933,254 UART: RITY.KEYID = 7
2,948,516 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,281 UART: [art] PUB.X = 2B26C7B1CBFCA2F73D7D429EFD9DE5F640098B9879E48157F43F5F2C526D1D223F92B32D688F6599E88B955FC6E08325
2,956,054 UART: [art] PUB.Y = 75FC7530E08848D371023A314FA330C62E7F8BF2F427E010A0840AAF3388E7C05D5AB4BFA08BFFF5CD83D87752D90F3A
2,963,005 UART: [art] SIG.R = 7C9ACBA2B9069D316599115FE03ED0908C6D78D894D4A51EDC0251F9192F55D4074DC821416D3E3046E633BB8D80A645
2,969,766 UART: [art] SIG.S = 264AB8E063E1B1EE9DBD420E9C941D016F3CD743312FFBD9DCF2301F90A5CFFF4C51DE04F6760949D45C1F5F53E2F9BA
2,993,469 UART: Caliptra RT
2,993,814 UART: [state] CFI Enabled
3,101,039 UART: [rt] RT listening for mailbox commands...
3,101,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,261 UART: [rt]cmd =0x44504543, len=96
3,311,648 >>> mbox cmd response data (6236 bytes)
3,311,649 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,656 UART: [rt]cmd =0x53574545, len=84
3,344,266 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
191,991 UART:
192,359 UART: Running Caliptra ROM ...
193,489 UART:
193,632 UART: [state] CFI Enabled
264,071 UART: [state] LifecycleState = Unprovisioned
266,059 UART: [state] DebugLocked = No
268,152 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,955 UART: [kat] SHA2-256
442,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,203 UART: [kat] ++
453,651 UART: [kat] sha1
464,597 UART: [kat] SHA2-256
467,325 UART: [kat] SHA2-384
473,597 UART: [kat] SHA2-512-ACC
475,964 UART: [kat] ECC-384
2,766,931 UART: [kat] HMAC-384Kdf
2,798,773 UART: [kat] LMS
3,989,049 UART: [kat] --
3,993,090 UART: [cold-reset] ++
3,995,097 UART: [fht] Storing FHT @ 0x50003400
4,005,729 UART: [idev] ++
4,006,310 UART: [idev] CDI.KEYID = 6
4,007,196 UART: [idev] SUBJECT.KEYID = 7
4,008,441 UART: [idev] UDS.KEYID = 0
4,009,411 ready_for_fw is high
4,009,614 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,166 UART: [idev] Erasing UDS.KEYID = 0
7,346,800 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,142 UART: [idev] --
7,372,593 UART: [ldev] ++
7,373,156 UART: [ldev] CDI.KEYID = 6
7,374,093 UART: [ldev] SUBJECT.KEYID = 5
7,375,362 UART: [ldev] AUTHORITY.KEYID = 7
7,376,515 UART: [ldev] FE.KEYID = 1
7,421,718 UART: [ldev] Erasing FE.KEYID = 1
10,755,766 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,136 UART: [ldev] --
13,135,098 UART: [fwproc] Waiting for Commands...
13,137,897 UART: [fwproc] Received command 0x46574c44
13,140,075 UART: [fwproc] Received Image of size 114124 bytes
17,200,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,805 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,659,741 >>> mbox cmd response: success
17,663,345 UART: [afmc] ++
17,663,944 UART: [afmc] CDI.KEYID = 6
17,664,904 UART: [afmc] SUBJECT.KEYID = 7
17,666,120 UART: [afmc] AUTHORITY.KEYID = 5
21,027,894 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,519 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,772 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,201 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,034 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,553 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,838 UART: [afmc] --
23,398,429 UART: [cold-reset] --
23,402,788 UART: [state] Locking Datavault
23,409,759 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,464 UART: [state] Locking ICCM
23,413,480 UART: [exit] Launching FMC @ 0x40000130
23,421,871 UART:
23,422,104 UART: Running Caliptra FMC ...
23,423,146 UART:
23,423,302 UART: [state] CFI Enabled
23,486,586 UART: [fht] FMC Alias Private Key: 7
25,824,835 UART: [art] Extend RT PCRs Done
25,826,054 UART: [art] Lock RT PCRs Done
25,827,496 UART: [art] Populate DV Done
25,832,805 UART: [fht] FMC Alias Private Key: 7
25,834,291 UART: [art] Derive CDI
25,835,049 UART: [art] Store in in slot 0x4
25,894,528 UART: [art] Derive Key Pair
25,895,570 UART: [art] Store priv key in slot 0x5
29,188,559 UART: [art] Derive Key Pair - Done
29,201,667 UART: [art] Signing Cert with AUTHO
29,202,973 UART: RITY.KEYID = 7
31,489,833 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,336 UART: [art] PUB.X = FD4369F040F08ED1359753DCC576F91ABDA13BCB6A7C67B22751DC18B8226A4B4959F8CF1F37D8595C4F9A109035C5CE
31,498,602 UART: [art] PUB.Y = 0A8FC067DC5CE260591E92958A1E2B3384601FE0B5D2C87A91AAABBD3BD77A63FFD6DE0FBD8502ACA80A97E8E5C5338D
31,505,886 UART: [art] SIG.R = 569EF773E32CC88890B1D1388974C47ABCDA99F8C21D68F767C218DC6572EFF8EC04526867903847FBE95EEDEB1FD064
31,513,220 UART: [art] SIG.S = 7F7A31C62C81543906F06CA5F28F00EBA43DD9BC9BAE8466A81033E5A20806E129D31DD2513BEF7A2C9192CA990950FA
32,818,247 UART: Caliptra RT
32,818,948 UART: [state] CFI Enabled
32,979,822 UART: [rt] RT listening for mailbox commands...
32,981,724 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,012,270 UART: [rt]cmd =0x53574545, len=84
33,016,175 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,784,927 ready_for_fw is high
3,785,369 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,855,561 >>> mbox cmd response: success
23,552,766 UART:
23,553,140 UART: Running Caliptra FMC ...
23,554,270 UART:
23,554,434 UART: [state] CFI Enabled
23,619,518 UART: [fht] FMC Alias Private Key: 7
25,957,078 UART: [art] Extend RT PCRs Done
25,958,318 UART: [art] Lock RT PCRs Done
25,959,871 UART: [art] Populate DV Done
25,965,139 UART: [fht] FMC Alias Private Key: 7
25,966,635 UART: [art] Derive CDI
25,967,405 UART: [art] Store in in slot 0x4
26,028,214 UART: [art] Derive Key Pair
26,029,275 UART: [art] Store priv key in slot 0x5
29,322,454 UART: [art] Derive Key Pair - Done
29,335,290 UART: [art] Signing Cert with AUTHO
29,336,590 UART: RITY.KEYID = 7
31,624,217 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,720 UART: [art] PUB.X = C8E95DCBBCCD2446F3F39AE0F107A0E232CA08C1E37D1986501B131FE8E378D96B82C260DC6CFD15B8794E1F5EBD2F75
31,632,934 UART: [art] PUB.Y = 3015BB5CB4C793E0B1C9B17F0565A4ABA3D8131ED437EB1BA830321A69850377C74B83FE8FB662182EA5BD938E654E80
31,640,188 UART: [art] SIG.R = 0B2AE4E6CF720E5AF11272F7EB72DD85740AEC9CC3B44AE888B6A7F6D1FC1DDADF1FFE0F1077245E2B8290FC617E1F3A
31,647,606 UART: [art] SIG.S = CAB690A2455077079021E28C0CB80986A02F10B1C2D979D374AC439AE021F10B15B0B979C0789297B3E176C170AEA04C
32,952,432 UART: Caliptra RT
32,953,145 UART: [state] CFI Enabled
33,115,596 UART: [rt] RT listening for mailbox commands...
33,117,479 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,147,788 UART: [rt]cmd =0x53574545, len=84
33,151,208 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,411 UART:
192,773 UART: Running Caliptra ROM ...
193,952 UART:
603,688 UART: [state] CFI Enabled
617,661 UART: [state] LifecycleState = Unprovisioned
619,596 UART: [state] DebugLocked = No
621,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,843 UART: [kat] SHA2-256
796,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,104 UART: [kat] ++
807,546 UART: [kat] sha1
818,625 UART: [kat] SHA2-256
821,298 UART: [kat] SHA2-384
827,289 UART: [kat] SHA2-512-ACC
829,653 UART: [kat] ECC-384
3,111,971 UART: [kat] HMAC-384Kdf
3,124,202 UART: [kat] LMS
4,314,360 UART: [kat] --
4,317,716 UART: [cold-reset] ++
4,318,791 UART: [fht] Storing FHT @ 0x50003400
4,329,696 UART: [idev] ++
4,330,324 UART: [idev] CDI.KEYID = 6
4,331,226 UART: [idev] SUBJECT.KEYID = 7
4,332,469 UART: [idev] UDS.KEYID = 0
4,333,525 ready_for_fw is high
4,333,749 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,144 UART: [idev] Erasing UDS.KEYID = 0
7,625,509 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,540 UART: [idev] --
7,651,516 UART: [ldev] ++
7,652,120 UART: [ldev] CDI.KEYID = 6
7,653,002 UART: [ldev] SUBJECT.KEYID = 5
7,654,271 UART: [ldev] AUTHORITY.KEYID = 7
7,655,503 UART: [ldev] FE.KEYID = 1
7,667,468 UART: [ldev] Erasing FE.KEYID = 1
10,957,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,847 UART: [ldev] --
13,314,777 UART: [fwproc] Waiting for Commands...
13,317,236 UART: [fwproc] Received command 0x46574c44
13,319,467 UART: [fwproc] Received Image of size 114124 bytes
17,369,832 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,306 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,185 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,833,930 >>> mbox cmd response: success
17,838,431 UART: [afmc] ++
17,839,020 UART: [afmc] CDI.KEYID = 6
17,839,936 UART: [afmc] SUBJECT.KEYID = 7
17,841,208 UART: [afmc] AUTHORITY.KEYID = 5
21,152,177 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,536 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,800 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,158 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,985 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,479 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,210 UART: [afmc] --
23,517,648 UART: [cold-reset] --
23,521,582 UART: [state] Locking Datavault
23,527,804 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,556 UART: [state] Locking ICCM
23,530,731 UART: [exit] Launching FMC @ 0x40000130
23,539,120 UART:
23,539,351 UART: Running Caliptra FMC ...
23,540,448 UART:
23,540,599 UART: [state] CFI Enabled
23,548,910 UART: [fht] FMC Alias Private Key: 7
25,879,598 UART: [art] Extend RT PCRs Done
25,880,812 UART: [art] Lock RT PCRs Done
25,882,648 UART: [art] Populate DV Done
25,887,843 UART: [fht] FMC Alias Private Key: 7
25,889,525 UART: [art] Derive CDI
25,890,346 UART: [art] Store in in slot 0x4
25,933,324 UART: [art] Derive Key Pair
25,934,338 UART: [art] Store priv key in slot 0x5
29,176,391 UART: [art] Derive Key Pair - Done
29,189,378 UART: [art] Signing Cert with AUTHO
29,190,672 UART: RITY.KEYID = 7
31,469,884 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,383 UART: [art] PUB.X = AF79258DD6B3CEF221EA1EDE2C4EB81D4EFD3D19F8C3DF63A77F494712FBEF2130C816EC66412AC064DAAD5B352FF392
31,478,606 UART: [art] PUB.Y = AD6FE52ACD93C5914C6014BAD82D142D564D1120132E80575F96AAC81B7136F9AF22D65166F7FB677D3065628A438C97
31,485,872 UART: [art] SIG.R = 2543440699ED3C35711F89F2AF1A0B79C8034DCB6BB14464E17846029BD9B286074BF9009165B2BA316E8C4761806592
31,493,225 UART: [art] SIG.S = 15998BB9D85644CE37BF00C8FACB5B730AB6EE1352A505A8E3AD9536C34A55D2116FFDA5CE62DBD99078EB4E602086CD
32,798,560 UART: Caliptra RT
32,799,259 UART: [state] CFI Enabled
32,916,965 UART: [rt] RT listening for mailbox commands...
32,918,834 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,949,483 UART: [rt]cmd =0x53574545, len=84
32,952,788 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
4,125,010 ready_for_fw is high
4,125,414 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,313 >>> mbox cmd response: success
23,711,093 UART:
23,711,500 UART: Running Caliptra FMC ...
23,712,616 UART:
23,712,772 UART: [state] CFI Enabled
23,720,496 UART: [fht] FMC Alias Private Key: 7
26,051,824 UART: [art] Extend RT PCRs Done
26,053,064 UART: [art] Lock RT PCRs Done
26,054,809 UART: [art] Populate DV Done
26,060,015 UART: [fht] FMC Alias Private Key: 7
26,061,557 UART: [art] Derive CDI
26,062,289 UART: [art] Store in in slot 0x4
26,105,257 UART: [art] Derive Key Pair
26,106,254 UART: [art] Store priv key in slot 0x5
29,347,933 UART: [art] Derive Key Pair - Done
29,361,202 UART: [art] Signing Cert with AUTHO
29,362,503 UART: RITY.KEYID = 7
31,641,962 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,460 UART: [art] PUB.X = A38B2D6C519096F6F05F14D62A072294E7FA635B8589055FC904E9A8CC430E9DA6B8ECA57C8C7FC498EF2ECC0206FFEF
31,650,767 UART: [art] PUB.Y = 79DC7DDE5B49C43D22F4194D5E9753941F028F3A7B5923FF487E30C241BCDDB6F0EE65980A13964A14B53BB7E8749B21
31,657,956 UART: [art] SIG.R = B5FB5BE074904D4F6546566DC3630489A0B02DD28C8747BE470CCBE9FA0A3BA6866954812FBA4557D528EF7547933862
31,665,337 UART: [art] SIG.S = B7F07B0D6C6718F0C5794D4E68DF4818052837912F366374A1CDE0D0FBE8A4B2B4687AF57C7313BD56BC812D7F3D1DF7
32,969,892 UART: Caliptra RT
32,970,869 UART: [state] CFI Enabled
33,089,222 UART: [rt] RT listening for mailbox commands...
33,091,118 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,121,604 UART: [rt]cmd =0x53574545, len=84
33,125,254 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,016 UART:
192,380 UART: Running Caliptra ROM ...
193,573 UART:
193,730 UART: [state] CFI Enabled
263,115 UART: [state] LifecycleState = Unprovisioned
264,969 UART: [state] DebugLocked = No
267,840 UART: [state] WD Timer not started. Device not locked for debugging
270,767 UART: [kat] SHA2-256
449,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,405 UART: [kat] ++
461,938 UART: [kat] sha1
471,684 UART: [kat] SHA2-256
474,760 UART: [kat] SHA2-384
481,313 UART: [kat] SHA2-512-ACC
484,242 UART: [kat] ECC-384
2,947,014 UART: [kat] HMAC-384Kdf
2,973,130 UART: [kat] LMS
3,502,603 UART: [kat] --
3,508,610 UART: [cold-reset] ++
3,510,112 UART: [fht] FHT @ 0x50003400
3,521,466 UART: [idev] ++
3,522,034 UART: [idev] CDI.KEYID = 6
3,523,068 UART: [idev] SUBJECT.KEYID = 7
3,524,172 UART: [idev] UDS.KEYID = 0
3,525,096 ready_for_fw is high
3,525,325 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,371 UART: [idev] Erasing UDS.KEYID = 0
6,028,318 UART: [idev] Sha1 KeyId Algorithm
6,052,646 UART: [idev] --
6,057,828 UART: [ldev] ++
6,058,396 UART: [ldev] CDI.KEYID = 6
6,059,307 UART: [ldev] SUBJECT.KEYID = 5
6,060,471 UART: [ldev] AUTHORITY.KEYID = 7
6,061,702 UART: [ldev] FE.KEYID = 1
6,101,413 UART: [ldev] Erasing FE.KEYID = 1
8,602,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,082 UART: [ldev] --
10,393,614 UART: [fwproc] Wait for Commands...
10,396,239 UART: [fwproc] Recv command 0x46574c44
10,398,330 UART: [fwproc] Recv'd Img size: 114448 bytes
13,793,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,864,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,933,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,251,365 >>> mbox cmd response: success
14,255,427 UART: [afmc] ++
14,256,018 UART: [afmc] CDI.KEYID = 6
14,256,932 UART: [afmc] SUBJECT.KEYID = 7
14,258,092 UART: [afmc] AUTHORITY.KEYID = 5
16,787,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,513,824 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,529,566 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,545,607 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,561,477 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,583,320 UART: [afmc] --
18,586,267 UART: [cold-reset] --
18,590,408 UART: [state] Locking Datavault
18,596,234 UART: [state] Locking PCR0, PCR1 and PCR31
18,597,883 UART: [state] Locking ICCM
18,598,999 UART: [exit] Launching FMC @ 0x40000130
18,607,395 UART:
18,607,624 UART: Running Caliptra FMC ...
18,608,720 UART:
18,608,882 UART: [state] CFI Enabled
18,669,970 UART: [fht] FMC Alias Private Key: 7
20,433,294 UART: [art] Extend RT PCRs Done
20,434,506 UART: [art] Lock RT PCRs Done
20,435,986 UART: [art] Populate DV Done
20,441,609 UART: [fht] FMC Alias Private Key: 7
20,443,140 UART: [art] Derive CDI
20,443,951 UART: [art] Store in in slot 0x4
20,502,279 UART: [art] Derive Key Pair
20,503,275 UART: [art] Store priv key in slot 0x5
22,966,278 UART: [art] Derive Key Pair - Done
22,979,213 UART: [art] Signing Cert with AUTHO
22,980,517 UART: RITY.KEYID = 7
24,691,365 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,867 UART: [art] PUB.X = 2D5B08BFBAFEA016AA6086A2AB6A38632CD6A86DC622E9D9D8C0E5BD699B7E69B467A6456A2A53678BC5411C445D4066
24,700,132 UART: [art] PUB.Y = 4FDC64DCEC020A14F46C374878C79B47D2EB51FF1876C12560D9A7AA9C20B365511FBC19F13A59D6707DB494BE20B458
24,707,362 UART: [art] SIG.R = 31D215BAE7D13442CF823C000D0ABC5096CBC954F896AA1EADB11E4AA5EA2E31F7B25033620BA6C5B2036932E243CD4A
24,714,786 UART: [art] SIG.S = 87EA8B6C13AD972932159EBA68A41E68A45542A8B5CA0470269F3FF8C79F6F79E3478589621E8F5D36A004B352DA853E
25,693,213 UART: Caliptra RT
25,693,910 UART: [state] CFI Enabled
25,859,086 UART: [rt] RT listening for mailbox commands...
25,860,965 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,892,061 UART: [rt]cmd =0x53574545, len=84
25,896,031 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,383,716 ready_for_fw is high
3,384,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,097,731 >>> mbox cmd response: success
18,391,312 UART:
18,391,703 UART: Running Caliptra FMC ...
18,392,841 UART:
18,393,002 UART: [state] CFI Enabled
18,456,789 UART: [fht] FMC Alias Private Key: 7
20,220,598 UART: [art] Extend RT PCRs Done
20,221,826 UART: [art] Lock RT PCRs Done
20,223,583 UART: [art] Populate DV Done
20,229,274 UART: [fht] FMC Alias Private Key: 7
20,230,982 UART: [art] Derive CDI
20,231,805 UART: [art] Store in in slot 0x4
20,289,077 UART: [art] Derive Key Pair
20,290,131 UART: [art] Store priv key in slot 0x5
22,752,815 UART: [art] Derive Key Pair - Done
22,765,809 UART: [art] Signing Cert with AUTHO
22,767,114 UART: RITY.KEYID = 7
24,478,983 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,488 UART: [art] PUB.X = F144997DB51298D3E6DB7DCBD3ED50F597D24FD1046E646018E5C27631D1DA48740EBDD9D887ADC84654AF764CC4C4C8
24,487,733 UART: [art] PUB.Y = BF949D2ABBA25A505C23ACCC79B0F4142272525E0BC3F03244A9884252F78AC9DC8508F09F9A4A37DAF75C31E531D5F7
24,495,035 UART: [art] SIG.R = 6477185AB0294EA22AA0397159DD3693210A4F90DE04A499AB8715AFFAB825D13AB4B482176986E4B8B38D7269F9196E
24,502,475 UART: [art] SIG.S = 3E2281D57DC03F7019D2F3985C1A16A06D40C3487E748C8A89BCCAF40EF0B8FFE73FEAB1E875423A87B118CE2C654086
25,481,122 UART: Caliptra RT
25,481,818 UART: [state] CFI Enabled
25,646,462 UART: [rt] RT listening for mailbox commands...
25,648,344 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,679,331 UART: [rt]cmd =0x53574545, len=84
25,682,849 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
192,381 UART:
192,769 UART: Running Caliptra ROM ...
193,908 UART:
603,659 UART: [state] CFI Enabled
617,172 UART: [state] LifecycleState = Unprovisioned
619,039 UART: [state] DebugLocked = No
621,491 UART: [state] WD Timer not started. Device not locked for debugging
625,675 UART: [kat] SHA2-256
804,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,382 UART: [kat] ++
816,916 UART: [kat] sha1
827,741 UART: [kat] SHA2-256
830,712 UART: [kat] SHA2-384
837,129 UART: [kat] SHA2-512-ACC
840,056 UART: [kat] ECC-384
3,282,557 UART: [kat] HMAC-384Kdf
3,294,862 UART: [kat] LMS
3,824,373 UART: [kat] --
3,828,719 UART: [cold-reset] ++
3,829,645 UART: [fht] FHT @ 0x50003400
3,839,479 UART: [idev] ++
3,840,033 UART: [idev] CDI.KEYID = 6
3,841,056 UART: [idev] SUBJECT.KEYID = 7
3,842,152 UART: [idev] UDS.KEYID = 0
3,843,066 ready_for_fw is high
3,843,263 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,366 UART: [idev] Erasing UDS.KEYID = 0
6,314,604 UART: [idev] Sha1 KeyId Algorithm
6,336,749 UART: [idev] --
6,341,924 UART: [ldev] ++
6,342,530 UART: [ldev] CDI.KEYID = 6
6,343,462 UART: [ldev] SUBJECT.KEYID = 5
6,344,559 UART: [ldev] AUTHORITY.KEYID = 7
6,345,839 UART: [ldev] FE.KEYID = 1
6,354,856 UART: [ldev] Erasing FE.KEYID = 1
8,829,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,429 UART: [ldev] --
10,615,171 UART: [fwproc] Wait for Commands...
10,617,528 UART: [fwproc] Recv command 0x46574c44
10,619,610 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,485,954 >>> mbox cmd response: success
14,490,885 UART: [afmc] ++
14,491,477 UART: [afmc] CDI.KEYID = 6
14,492,381 UART: [afmc] SUBJECT.KEYID = 7
14,493,587 UART: [afmc] AUTHORITY.KEYID = 5
16,994,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,194 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,122 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,547 UART: [afmc] --
18,788,298 UART: [cold-reset] --
18,792,261 UART: [state] Locking Datavault
18,797,228 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,920 UART: [state] Locking ICCM
18,800,377 UART: [exit] Launching FMC @ 0x40000130
18,808,773 UART:
18,809,005 UART: Running Caliptra FMC ...
18,810,104 UART:
18,810,259 UART: [state] CFI Enabled
18,818,302 UART: [fht] FMC Alias Private Key: 7
20,574,714 UART: [art] Extend RT PCRs Done
20,575,933 UART: [art] Lock RT PCRs Done
20,577,682 UART: [art] Populate DV Done
20,583,152 UART: [fht] FMC Alias Private Key: 7
20,584,727 UART: [art] Derive CDI
20,585,491 UART: [art] Store in in slot 0x4
20,628,022 UART: [art] Derive Key Pair
20,629,019 UART: [art] Store priv key in slot 0x5
23,055,577 UART: [art] Derive Key Pair - Done
23,068,518 UART: [art] Signing Cert with AUTHO
23,069,874 UART: RITY.KEYID = 7
24,775,388 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,895 UART: [art] PUB.X = BD81319BA8A531A631170B47ECCF1D8A948582DDA1884FAC1A11E3B8D73728437DC24DE5DD7010AE3975FB53BB317E8B
24,784,185 UART: [art] PUB.Y = F7E05BE59437E7BE102B3B878714B34A5BFDC970E1870DE61A1B0BA644FC5D9D729E3240A820CBAD1C0D71C594C1C8D7
24,791,451 UART: [art] SIG.R = 14DA28711CCAB1F04D3442C311DB785871D27FAB3063B2998D5494445EDA4F2311E2FB7A4AB33B633712E5C5815472A5
24,798,820 UART: [art] SIG.S = 78D09155D575A829416D64304CF34DCC631DD029D5DE94A6A7EEDB8305D252728C00B9F8BB0C5D1FDA070C71F18CB82D
25,778,035 UART: Caliptra RT
25,778,722 UART: [state] CFI Enabled
25,896,924 UART: [rt] RT listening for mailbox commands...
25,898,796 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,929,210 UART: [rt]cmd =0x53574545, len=84
25,933,178 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,688,770 ready_for_fw is high
3,689,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,846 >>> mbox cmd response: success
18,516,935 UART:
18,517,316 UART: Running Caliptra FMC ...
18,518,437 UART:
18,518,587 UART: [state] CFI Enabled
18,527,026 UART: [fht] FMC Alias Private Key: 7
20,283,720 UART: [art] Extend RT PCRs Done
20,284,940 UART: [art] Lock RT PCRs Done
20,286,891 UART: [art] Populate DV Done
20,292,185 UART: [fht] FMC Alias Private Key: 7
20,293,881 UART: [art] Derive CDI
20,294,695 UART: [art] Store in in slot 0x4
20,337,421 UART: [art] Derive Key Pair
20,338,459 UART: [art] Store priv key in slot 0x5
22,765,080 UART: [art] Derive Key Pair - Done
22,777,787 UART: [art] Signing Cert with AUTHO
22,779,122 UART: RITY.KEYID = 7
24,484,557 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,050 UART: [art] PUB.X = 6E4D9609E731CF56C0BC8DCD10F0C78610B5611C328E542242E5C26138F687794B9F2DED414D38170C59A5CCFAAE5EBF
24,493,321 UART: [art] PUB.Y = 3D1F2A6FD194AD6520474E2D42621F61AD7FE604094724F00B7002CA4F4BB8B7DB2E14CB6FEAC16EB2F2A921E3CAB90C
24,500,600 UART: [art] SIG.R = 8180E32C1F3DCC4E917093F206FE6B9CB4960109BDE5EE6DFB815DCDD1491A88247A57CDB5BBD1B5B9CB7B2ADE82972F
24,508,041 UART: [art] SIG.S = 71E0D6DA80D3FA6CA0CD9FA5D70818025473B442CC4B038301786EBA05630FC8D19DC82B5E915E5FE8E1A905AFADF112
25,486,673 UART: Caliptra RT
25,487,369 UART: [state] CFI Enabled
25,604,655 UART: [rt] RT listening for mailbox commands...
25,606,533 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,637,007 UART: [rt]cmd =0x53574545, len=84
25,640,876 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,437,792 ready_for_fw is high
3,438,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,321 >>> mbox cmd response: success
19,026,391 UART:
19,026,787 UART: Running Caliptra FMC ...
19,027,930 UART:
19,028,111 UART: [state] CFI Enabled
19,096,557 UART: [fht] FMC Alias Private Key: 7
20,860,331 UART: [art] Extend RT PCRs Done
20,861,546 UART: [art] Lock RT PCRs Done
20,863,223 UART: [art] Populate DV Done
20,868,523 UART: [fht] FMC Alias Private Key: 7
20,870,175 UART: [art] Derive CDI
20,870,994 UART: [art] Store in in slot 0x4
20,929,330 UART: [art] Derive Key Pair
20,930,367 UART: [art] Store priv key in slot 0x5
23,393,174 UART: [art] Derive Key Pair - Done
23,406,159 UART: [art] Signing Cert with AUTHO
23,407,492 UART: RITY.KEYID = 7
25,119,331 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,836 UART: [art] PUB.X = E0BDE2AE039DF371F61FFBF3C780D17D0B92508A6021DAE6E78009D5A7C0DA5F93398F1B7D040923CF4745278A77A5F3
25,128,082 UART: [art] PUB.Y = 386DCB098C9E74AA959CEECE85FAD9A222FDE83E51EB2CF6DACFAAA4BDCEC6FAEE78E1F3CB201B3AA412205E51B906B7
25,135,418 UART: [art] SIG.R = A9D59C99312104144CC19325245D6CF527D7BA200138BBCB5411037C8288DDFF2280EBF06F4FF1FCB91E42F42F5F86F9
25,142,810 UART: [art] SIG.S = 9D6F89D6004ECEA07C834E2AB138CAC4AA06649A99E66F2FABFD7E6FE56483965CDB71FC70F659EECCCA6E2442EBE3B4
26,121,898 UART: Caliptra RT
26,122,591 UART: [state] CFI Enabled
26,287,970 UART: [rt] RT listening for mailbox commands...
26,289,842 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,320,814 UART: [rt]cmd =0x53574545, len=84
26,324,613 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,755,433 ready_for_fw is high
3,756,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,946,590 >>> mbox cmd response: success
19,197,078 UART:
19,197,478 UART: Running Caliptra FMC ...
19,198,662 UART:
19,198,823 UART: [state] CFI Enabled
19,206,766 UART: [fht] FMC Alias Private Key: 7
20,963,398 UART: [art] Extend RT PCRs Done
20,964,619 UART: [art] Lock RT PCRs Done
20,965,972 UART: [art] Populate DV Done
20,971,624 UART: [fht] FMC Alias Private Key: 7
20,973,230 UART: [art] Derive CDI
20,973,987 UART: [art] Store in in slot 0x4
21,016,904 UART: [art] Derive Key Pair
21,017,986 UART: [art] Store priv key in slot 0x5
23,444,151 UART: [art] Derive Key Pair - Done
23,457,143 UART: [art] Signing Cert with AUTHO
23,458,436 UART: RITY.KEYID = 7
25,163,858 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,340 UART: [art] PUB.X = F9D9F738A87E3AFE4F66633A5337FD451A479E5124B8574FE552054A3243E11739BD5F343538B6EDEBD66C17DAC61D97
25,172,633 UART: [art] PUB.Y = 4A9F9C8B9FBE6456EBE959A0E1D361B329B54A0EB77E7DA7648770B46D97028394F2E08060841660649D8D4A426B13A2
25,179,856 UART: [art] SIG.R = C28C7662DE7B09D2D401FC1851620D66F0A1951DEF742F1C9FCF611FAF8AFAA11D6EBE7BBD80420669D0B70A7BB4883B
25,187,274 UART: [art] SIG.S = 508413D81B36389C09B66B56F71E4839D07A5F04E9A5C24328D41FFA50A5EA9AA6445C309BEEFDB50208719818FDCFB5
26,166,076 UART: Caliptra RT
26,166,779 UART: [state] CFI Enabled
26,283,620 UART: [rt] RT listening for mailbox commands...
26,285,514 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,315,981 UART: [rt]cmd =0x53574545, len=84
26,319,381 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,023 UART: [kat] SHA2-256
881,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,069 UART: [kat] ++
886,221 UART: [kat] sha1
890,395 UART: [kat] SHA2-256
892,333 UART: [kat] SHA2-384
895,000 UART: [kat] SHA2-512-ACC
896,901 UART: [kat] ECC-384
902,548 UART: [kat] HMAC-384Kdf
907,032 UART: [kat] LMS
1,475,228 UART: [kat] --
1,475,915 UART: [cold-reset] ++
1,476,457 UART: [fht] Storing FHT @ 0x50003400
1,479,184 UART: [idev] ++
1,479,352 UART: [idev] CDI.KEYID = 6
1,479,712 UART: [idev] SUBJECT.KEYID = 7
1,480,136 UART: [idev] UDS.KEYID = 0
1,480,481 ready_for_fw is high
1,480,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,348 UART: [idev] Erasing UDS.KEYID = 0
1,505,004 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,872 UART: [idev] --
1,515,075 UART: [ldev] ++
1,515,243 UART: [ldev] CDI.KEYID = 6
1,515,606 UART: [ldev] SUBJECT.KEYID = 5
1,516,032 UART: [ldev] AUTHORITY.KEYID = 7
1,516,495 UART: [ldev] FE.KEYID = 1
1,521,529 UART: [ldev] Erasing FE.KEYID = 1
1,546,552 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,202 UART: [ldev] --
1,585,635 UART: [fwproc] Waiting for Commands...
1,586,278 UART: [fwproc] Received command 0x46574c44
1,587,069 UART: [fwproc] Received Image of size 114448 bytes
2,885,476 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,564 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,916 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,977 >>> mbox cmd response: success
3,079,017 UART: [afmc] ++
3,079,185 UART: [afmc] CDI.KEYID = 6
3,079,547 UART: [afmc] SUBJECT.KEYID = 7
3,079,972 UART: [afmc] AUTHORITY.KEYID = 5
3,115,119 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,223 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,003 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,731 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,616 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,306 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,991 UART: [afmc] --
3,158,107 UART: [cold-reset] --
3,158,857 UART: [state] Locking Datavault
3,159,970 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,574 UART: [state] Locking ICCM
3,161,030 UART: [exit] Launching FMC @ 0x40000130
3,166,359 UART:
3,166,375 UART: Running Caliptra FMC ...
3,166,783 UART:
3,166,837 UART: [state] CFI Enabled
3,177,302 UART: [fht] FMC Alias Private Key: 7
3,285,787 UART: [art] Extend RT PCRs Done
3,286,215 UART: [art] Lock RT PCRs Done
3,287,887 UART: [art] Populate DV Done
3,296,158 UART: [fht] FMC Alias Private Key: 7
3,297,224 UART: [art] Derive CDI
3,297,504 UART: [art] Store in in slot 0x4
3,383,023 UART: [art] Derive Key Pair
3,383,383 UART: [art] Store priv key in slot 0x5
3,396,393 UART: [art] Derive Key Pair - Done
3,411,302 UART: [art] Signing Cert with AUTHO
3,411,782 UART: RITY.KEYID = 7
3,426,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,717 UART: [art] PUB.X = 549227958C4A1A995EF97EED5B5E75EA2199C81BB3D44E51785F5021423DB64D0144409BC1E808842E05A18C8D10F77D
3,434,476 UART: [art] PUB.Y = 5E5376308BE78C2B9D66F557C65CBC5AF4ED7AFBF40559186163AB46E42F5AB4EDBB60EFD90835447937B50499C812A5
3,441,425 UART: [art] SIG.R = 7C8B3CB3388626676B1CD0D227C22EEBD2CCC2E3A4BF9AC26AE98D66939C78C06F730599AB8944B52C1D94B09114955B
3,448,200 UART: [art] SIG.S = 24A462C8953A7002529F3D9DE460E1868CA1BB5A9F76D29EFEF29E6777F8F6BC39D99017190033D671B741E3587291CD
3,472,070 UART: Caliptra RT
3,472,323 UART: [state] CFI Enabled
3,580,223 UART: [rt] RT listening for mailbox commands...
3,580,893 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,385 UART: [rt]cmd =0x53574545, len=84
3,614,454 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,271 ready_for_fw is high
1,362,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,635 >>> mbox cmd response: success
2,991,307 UART:
2,991,323 UART: Running Caliptra FMC ...
2,991,731 UART:
2,991,785 UART: [state] CFI Enabled
3,002,368 UART: [fht] FMC Alias Private Key: 7
3,110,781 UART: [art] Extend RT PCRs Done
3,111,209 UART: [art] Lock RT PCRs Done
3,112,875 UART: [art] Populate DV Done
3,120,976 UART: [fht] FMC Alias Private Key: 7
3,122,152 UART: [art] Derive CDI
3,122,432 UART: [art] Store in in slot 0x4
3,208,191 UART: [art] Derive Key Pair
3,208,551 UART: [art] Store priv key in slot 0x5
3,221,271 UART: [art] Derive Key Pair - Done
3,236,245 UART: [art] Signing Cert with AUTHO
3,236,725 UART: RITY.KEYID = 7
3,252,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,830 UART: [art] PUB.X = 6AC8975CF9E5EB92C1D59B8DB1E145DD4252ECE03A9C4E3D09E9AF21846C842F55ED104635C6AED5ED99A7F87DF8EDD0
3,259,619 UART: [art] PUB.Y = 7200B36D77C0762713215A6E35BF8C8FEC1127559381765785587816B210B47352EE7E174CE8023C32C36A143E06892A
3,266,525 UART: [art] SIG.R = AAB1581BC981EEB54673530C4DEBC1009C66704EC5C44222C7A2E608C4FC199F63041641750BCEC868490263D43A207C
3,273,258 UART: [art] SIG.S = F6C0A7DAFD5D3274212397FF162C256E97024D0524449C472528A8EFF1805EEA14C7B65B6E5DD18881CA176CCBCC6C80
3,296,897 UART: Caliptra RT
3,297,150 UART: [state] CFI Enabled
3,405,550 UART: [rt] RT listening for mailbox commands...
3,406,220 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,634 UART: [rt]cmd =0x53574545, len=84
3,440,329 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,008 UART: [kat] SHA2-256
881,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,054 UART: [kat] ++
886,206 UART: [kat] sha1
890,424 UART: [kat] SHA2-256
892,362 UART: [kat] SHA2-384
895,289 UART: [kat] SHA2-512-ACC
897,190 UART: [kat] ECC-384
902,801 UART: [kat] HMAC-384Kdf
907,425 UART: [kat] LMS
1,475,621 UART: [kat] --
1,476,912 UART: [cold-reset] ++
1,477,286 UART: [fht] Storing FHT @ 0x50003400
1,480,181 UART: [idev] ++
1,480,349 UART: [idev] CDI.KEYID = 6
1,480,709 UART: [idev] SUBJECT.KEYID = 7
1,481,133 UART: [idev] UDS.KEYID = 0
1,481,478 ready_for_fw is high
1,481,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,893 UART: [idev] Erasing UDS.KEYID = 0
1,505,315 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,941 UART: [idev] --
1,515,148 UART: [ldev] ++
1,515,316 UART: [ldev] CDI.KEYID = 6
1,515,679 UART: [ldev] SUBJECT.KEYID = 5
1,516,105 UART: [ldev] AUTHORITY.KEYID = 7
1,516,568 UART: [ldev] FE.KEYID = 1
1,521,778 UART: [ldev] Erasing FE.KEYID = 1
1,546,951 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,849 UART: [ldev] --
1,586,146 UART: [fwproc] Waiting for Commands...
1,586,807 UART: [fwproc] Received command 0x46574c44
1,587,598 UART: [fwproc] Received Image of size 114448 bytes
2,887,787 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,623 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,975 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,996 >>> mbox cmd response: success
3,081,006 UART: [afmc] ++
3,081,174 UART: [afmc] CDI.KEYID = 6
3,081,536 UART: [afmc] SUBJECT.KEYID = 7
3,081,961 UART: [afmc] AUTHORITY.KEYID = 5
3,116,488 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,844 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,352 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,237 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,927 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,028 UART: [afmc] --
3,160,040 UART: [cold-reset] --
3,160,822 UART: [state] Locking Datavault
3,162,163 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,767 UART: [state] Locking ICCM
3,163,365 UART: [exit] Launching FMC @ 0x40000130
3,168,694 UART:
3,168,710 UART: Running Caliptra FMC ...
3,169,118 UART:
3,169,261 UART: [state] CFI Enabled
3,180,014 UART: [fht] FMC Alias Private Key: 7
3,288,337 UART: [art] Extend RT PCRs Done
3,288,765 UART: [art] Lock RT PCRs Done
3,290,491 UART: [art] Populate DV Done
3,298,766 UART: [fht] FMC Alias Private Key: 7
3,299,804 UART: [art] Derive CDI
3,300,084 UART: [art] Store in in slot 0x4
3,385,843 UART: [art] Derive Key Pair
3,386,203 UART: [art] Store priv key in slot 0x5
3,399,163 UART: [art] Derive Key Pair - Done
3,414,273 UART: [art] Signing Cert with AUTHO
3,414,753 UART: RITY.KEYID = 7
3,429,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,708 UART: [art] PUB.X = FE00109C1570C9A4DD4AD78EA837B6DF83AC7FD54584826E4CC25E229B6992D1E6052FB42396E71A07146B52CAAAA626
3,437,458 UART: [art] PUB.Y = 92B7222D51DE56B225B3BF7FD0291F7BF2A5BE5423F7DEEA52D49E2212797E0E79C8565F3A803A4E02C61CB8B0C34A3C
3,444,414 UART: [art] SIG.R = DBAF43A6316E6F8B06A49C3D39C63C3CB1246778F4E70ECEBB0E4CF69D21DF99F2E346F73953BC2B242FF11798807687
3,451,185 UART: [art] SIG.S = F753D1F380B3C198C7DBA48018ECA728D429F49016A4E6C8BEE083DB4A9B122458C2E282853E0211C0BEC109EF026859
3,474,769 UART: Caliptra RT
3,475,114 UART: [state] CFI Enabled
3,582,796 UART: [rt] RT listening for mailbox commands...
3,583,466 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,066 UART: [rt]cmd =0x53574545, len=84
3,617,213 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,860 ready_for_fw is high
1,362,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,698 >>> mbox cmd response: success
2,991,848 UART:
2,991,864 UART: Running Caliptra FMC ...
2,992,272 UART:
2,992,415 UART: [state] CFI Enabled
3,003,130 UART: [fht] FMC Alias Private Key: 7
3,111,301 UART: [art] Extend RT PCRs Done
3,111,729 UART: [art] Lock RT PCRs Done
3,112,991 UART: [art] Populate DV Done
3,121,448 UART: [fht] FMC Alias Private Key: 7
3,122,498 UART: [art] Derive CDI
3,122,778 UART: [art] Store in in slot 0x4
3,208,367 UART: [art] Derive Key Pair
3,208,727 UART: [art] Store priv key in slot 0x5
3,222,191 UART: [art] Derive Key Pair - Done
3,237,082 UART: [art] Signing Cert with AUTHO
3,237,562 UART: RITY.KEYID = 7
3,252,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,693 UART: [art] PUB.X = 73655F6BAC41A758E1593F5BE0D0A4AD7ECB7B31CCDB4A286D548BC2C850A8C72D5BEC57E37933E9678D2F052F276F3D
3,260,476 UART: [art] PUB.Y = 52F6EF529B89D64ECACA04C41CBF47254DB724C55060346A60C18A9798763EE0F1A28BBD0CC18C25C0510C63E7411FB7
3,267,425 UART: [art] SIG.R = 037816157DC421C43C314BD0E368FFD0ECC273490B971F4FAD79662F912D3E5D2A4E332240C08B57AD3F48041C94DB45
3,274,188 UART: [art] SIG.S = F58144CFFA593A4B641632E90B72B6EF862D9EDFE67739304F62B5BD325611311E0A205E850F9635FC943F2D3CDF1C01
3,298,385 UART: Caliptra RT
3,298,730 UART: [state] CFI Enabled
3,408,641 UART: [rt] RT listening for mailbox commands...
3,409,311 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,493 UART: [rt]cmd =0x53574545, len=84
3,442,682 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
893,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,391 UART: [kat] ++
897,543 UART: [kat] sha1
901,857 UART: [kat] SHA2-256
903,797 UART: [kat] SHA2-384
906,510 UART: [kat] SHA2-512-ACC
908,411 UART: [kat] ECC-384
918,360 UART: [kat] HMAC-384Kdf
923,184 UART: [kat] LMS
1,171,512 UART: [kat] --
1,172,217 UART: [cold-reset] ++
1,172,699 UART: [fht] FHT @ 0x50003400
1,175,328 UART: [idev] ++
1,175,496 UART: [idev] CDI.KEYID = 6
1,175,856 UART: [idev] SUBJECT.KEYID = 7
1,176,280 UART: [idev] UDS.KEYID = 0
1,176,625 ready_for_fw is high
1,176,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,502 UART: [idev] Erasing UDS.KEYID = 0
1,201,175 UART: [idev] Sha1 KeyId Algorithm
1,209,803 UART: [idev] --
1,210,773 UART: [ldev] ++
1,210,941 UART: [ldev] CDI.KEYID = 6
1,211,304 UART: [ldev] SUBJECT.KEYID = 5
1,211,730 UART: [ldev] AUTHORITY.KEYID = 7
1,212,193 UART: [ldev] FE.KEYID = 1
1,217,111 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,547 UART: [ldev] --
1,283,018 UART: [fwproc] Wait for Commands...
1,283,598 UART: [fwproc] Recv command 0x46574c44
1,284,326 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,758 >>> mbox cmd response: success
2,775,972 UART: [afmc] ++
2,776,140 UART: [afmc] CDI.KEYID = 6
2,776,502 UART: [afmc] SUBJECT.KEYID = 7
2,776,927 UART: [afmc] AUTHORITY.KEYID = 5
2,812,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,137 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,885 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,613 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,498 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,217 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,815 UART: [afmc] --
2,855,799 UART: [cold-reset] --
2,856,583 UART: [state] Locking Datavault
2,857,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,460 UART: [state] Locking ICCM
2,858,956 UART: [exit] Launching FMC @ 0x40000130
2,864,285 UART:
2,864,301 UART: Running Caliptra FMC ...
2,864,709 UART:
2,864,763 UART: [state] CFI Enabled
2,875,356 UART: [fht] FMC Alias Private Key: 7
2,982,681 UART: [art] Extend RT PCRs Done
2,983,109 UART: [art] Lock RT PCRs Done
2,984,549 UART: [art] Populate DV Done
2,992,806 UART: [fht] FMC Alias Private Key: 7
2,993,862 UART: [art] Derive CDI
2,994,142 UART: [art] Store in in slot 0x4
3,079,725 UART: [art] Derive Key Pair
3,080,085 UART: [art] Store priv key in slot 0x5
3,093,859 UART: [art] Derive Key Pair - Done
3,108,644 UART: [art] Signing Cert with AUTHO
3,109,124 UART: RITY.KEYID = 7
3,124,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,037 UART: [art] PUB.X = 9932633D2D61AD85CDEEE454483956F293CD007ABFB4A6FC25B0B5C162185732A6C12B21A24ABC2ECC849495D6F93DB2
3,131,795 UART: [art] PUB.Y = 3E26456AA4310F85F814F7D65495B2FE6C9CB70ED70D4FBB7D5756CCC87F7CE43E4A0D1E751217DCABD590E6A39338CB
3,138,749 UART: [art] SIG.R = F71F9360580C78C43A44B3A1FFF1449EA2C907C762B5D676FC6AF61F052CBE11F7EF95D6492B9B0ADE62B3D3E63AC3FA
3,145,525 UART: [art] SIG.S = 58F34DF537F7F936B3FBCE517597BD25D0B9B6306DCAF4C2882C92C77689FC100FDE7310275510A2B4670D00D512653A
3,169,946 UART: Caliptra RT
3,170,199 UART: [state] CFI Enabled
3,278,820 UART: [rt] RT listening for mailbox commands...
3,279,490 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,748 UART: [rt]cmd =0x53574545, len=84
3,313,207 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,577 ready_for_fw is high
1,060,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,701 >>> mbox cmd response: success
2,690,959 UART:
2,690,975 UART: Running Caliptra FMC ...
2,691,383 UART:
2,691,437 UART: [state] CFI Enabled
2,702,264 UART: [fht] FMC Alias Private Key: 7
2,810,123 UART: [art] Extend RT PCRs Done
2,810,551 UART: [art] Lock RT PCRs Done
2,812,269 UART: [art] Populate DV Done
2,820,682 UART: [fht] FMC Alias Private Key: 7
2,821,822 UART: [art] Derive CDI
2,822,102 UART: [art] Store in in slot 0x4
2,907,945 UART: [art] Derive Key Pair
2,908,305 UART: [art] Store priv key in slot 0x5
2,921,463 UART: [art] Derive Key Pair - Done
2,936,364 UART: [art] Signing Cert with AUTHO
2,936,844 UART: RITY.KEYID = 7
2,952,034 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,799 UART: [art] PUB.X = 24E638E5D9ED67C81401EEE0BC73D004850059415A3AECA7F8AE3C714DB4D17590A589E9268F78B8358AB1ABB9249D63
2,959,547 UART: [art] PUB.Y = E9C464E5C2208C1432FE9747375E1EF73A59D93BF51BA2FF884EB584C34B6342CDA755C99BC1217C9EC92BFA8879EC61
2,966,507 UART: [art] SIG.R = DEA081730523BFC44AE2906D70E0BBA5152224FE56CE2E763BBFE4C8C7865417053181FC005F5E629DC04BBE9D7955C0
2,973,257 UART: [art] SIG.S = 281E209B3647BCC62F1F58D15545BDA4A96106FBDE14D142898EC5048FF797F295B61E1E1D07E1F8CF3A3CD60F9382F1
2,997,266 UART: Caliptra RT
2,997,519 UART: [state] CFI Enabled
3,105,262 UART: [rt] RT listening for mailbox commands...
3,105,932 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,414 UART: [rt]cmd =0x53574545, len=84
3,140,075 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
893,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,444 UART: [kat] ++
897,596 UART: [kat] sha1
901,970 UART: [kat] SHA2-256
903,910 UART: [kat] SHA2-384
906,627 UART: [kat] SHA2-512-ACC
908,528 UART: [kat] ECC-384
918,541 UART: [kat] HMAC-384Kdf
923,051 UART: [kat] LMS
1,171,379 UART: [kat] --
1,172,300 UART: [cold-reset] ++
1,172,660 UART: [fht] FHT @ 0x50003400
1,175,367 UART: [idev] ++
1,175,535 UART: [idev] CDI.KEYID = 6
1,175,895 UART: [idev] SUBJECT.KEYID = 7
1,176,319 UART: [idev] UDS.KEYID = 0
1,176,664 ready_for_fw is high
1,176,664 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,165 UART: [idev] Erasing UDS.KEYID = 0
1,201,164 UART: [idev] Sha1 KeyId Algorithm
1,209,672 UART: [idev] --
1,210,868 UART: [ldev] ++
1,211,036 UART: [ldev] CDI.KEYID = 6
1,211,399 UART: [ldev] SUBJECT.KEYID = 5
1,211,825 UART: [ldev] AUTHORITY.KEYID = 7
1,212,288 UART: [ldev] FE.KEYID = 1
1,217,742 UART: [ldev] Erasing FE.KEYID = 1
1,244,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,462 UART: [ldev] --
1,283,787 UART: [fwproc] Wait for Commands...
1,284,371 UART: [fwproc] Recv command 0x46574c44
1,285,099 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,665 >>> mbox cmd response: success
2,778,745 UART: [afmc] ++
2,778,913 UART: [afmc] CDI.KEYID = 6
2,779,275 UART: [afmc] SUBJECT.KEYID = 7
2,779,700 UART: [afmc] AUTHORITY.KEYID = 5
2,815,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,386 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,114 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,999 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,718 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,598 UART: [afmc] --
2,858,632 UART: [cold-reset] --
2,859,320 UART: [state] Locking Datavault
2,860,527 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,131 UART: [state] Locking ICCM
2,861,699 UART: [exit] Launching FMC @ 0x40000130
2,867,028 UART:
2,867,044 UART: Running Caliptra FMC ...
2,867,452 UART:
2,867,595 UART: [state] CFI Enabled
2,878,664 UART: [fht] FMC Alias Private Key: 7
2,987,113 UART: [art] Extend RT PCRs Done
2,987,541 UART: [art] Lock RT PCRs Done
2,989,211 UART: [art] Populate DV Done
2,997,376 UART: [fht] FMC Alias Private Key: 7
2,998,484 UART: [art] Derive CDI
2,998,764 UART: [art] Store in in slot 0x4
3,084,613 UART: [art] Derive Key Pair
3,084,973 UART: [art] Store priv key in slot 0x5
3,098,481 UART: [art] Derive Key Pair - Done
3,113,329 UART: [art] Signing Cert with AUTHO
3,113,809 UART: RITY.KEYID = 7
3,129,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,792 UART: [art] PUB.X = CB98657C98971A05EFE6E7D1A696EE4B5CBE341769BFE0421557F32137160F50FDC2E3453AE2F239C3FC3A035EC098CD
3,136,563 UART: [art] PUB.Y = EF37610F5E255A893664C8BDBD50361BD0147AE64D9ED6F47687877C044624D16F87F7E38083C948941D6D21FC93CF4A
3,143,507 UART: [art] SIG.R = 6FDD06E03C573A563D5FBD098A988FA47016A147CE08D7B49F4ACBF6B903547EB8FEB2913D1FF9E14A68020226A88926
3,150,267 UART: [art] SIG.S = 4DAF5EF7E9B98800A730C8C66C91D469B5A7625262E973201818C1E098FE6F5E03E8015172F5D3C8903762B20D192465
3,174,505 UART: Caliptra RT
3,174,850 UART: [state] CFI Enabled
3,282,689 UART: [rt] RT listening for mailbox commands...
3,283,359 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,425 UART: [rt]cmd =0x53574545, len=84
3,316,694 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,944 ready_for_fw is high
1,059,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,818 >>> mbox cmd response: success
2,689,398 UART:
2,689,414 UART: Running Caliptra FMC ...
2,689,822 UART:
2,689,965 UART: [state] CFI Enabled
2,700,678 UART: [fht] FMC Alias Private Key: 7
2,807,969 UART: [art] Extend RT PCRs Done
2,808,397 UART: [art] Lock RT PCRs Done
2,810,219 UART: [art] Populate DV Done
2,818,410 UART: [fht] FMC Alias Private Key: 7
2,819,522 UART: [art] Derive CDI
2,819,802 UART: [art] Store in in slot 0x4
2,905,329 UART: [art] Derive Key Pair
2,905,689 UART: [art] Store priv key in slot 0x5
2,919,157 UART: [art] Derive Key Pair - Done
2,933,968 UART: [art] Signing Cert with AUTHO
2,934,448 UART: RITY.KEYID = 7
2,949,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,221 UART: [art] PUB.X = 668EA37D28E98F7DCF10BC72546EAC337457D3ADD99278CE64DB555D3E5DF7F034957EEF1B8C4032D053614DCFED3943
2,957,003 UART: [art] PUB.Y = E442401123056F8800EB1D2A1E8B627E4D274CAF4E9660DC98E5D78D1652900048533AFC5822A6FFEE80FF99069C3262
2,963,901 UART: [art] SIG.R = 900F01E49AAF03284A72D8E84BA9CDA52FED1968207CEC8A76E8251B542AE6FC403DA8485EBD8FFE20F8900487CB5A85
2,970,673 UART: [art] SIG.S = 41BF928963C712D68802662C18F16322DC5AA8C03E4B4637E8FB0A80AB4007DEE46427BA061CDFF666566F9B422EB523
2,994,612 UART: Caliptra RT
2,994,957 UART: [state] CFI Enabled
3,102,520 UART: [rt] RT listening for mailbox commands...
3,103,190 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,668 UART: [rt]cmd =0x53574545, len=84
3,136,327 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,977 UART: [kat] SHA2-256
901,917 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,536 UART: [kat] LMS
1,168,848 UART: [kat] --
1,169,513 UART: [cold-reset] ++
1,169,969 UART: [fht] FHT @ 0x50003400
1,172,557 UART: [idev] ++
1,172,725 UART: [idev] CDI.KEYID = 6
1,173,086 UART: [idev] SUBJECT.KEYID = 7
1,173,511 UART: [idev] UDS.KEYID = 0
1,173,857 ready_for_fw is high
1,173,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,485 UART: [idev] Erasing UDS.KEYID = 0
1,198,747 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] --
1,208,562 UART: [ldev] ++
1,208,730 UART: [ldev] CDI.KEYID = 6
1,209,094 UART: [ldev] SUBJECT.KEYID = 5
1,209,521 UART: [ldev] AUTHORITY.KEYID = 7
1,209,984 UART: [ldev] FE.KEYID = 1
1,215,166 UART: [ldev] Erasing FE.KEYID = 1
1,241,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,778 UART: [ldev] --
1,281,272 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,086 >>> mbox cmd response: success
2,776,279 UART: [afmc] ++
2,776,447 UART: [afmc] CDI.KEYID = 6
2,776,810 UART: [afmc] SUBJECT.KEYID = 7
2,777,236 UART: [afmc] AUTHORITY.KEYID = 5
2,812,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,152 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,764 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,418 UART: [afmc] --
2,856,318 UART: [cold-reset] --
2,857,352 UART: [state] Locking Datavault
2,858,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,375 UART: [state] Locking ICCM
2,859,877 UART: [exit] Launching FMC @ 0x40000130
2,865,206 UART:
2,865,222 UART: Running Caliptra FMC ...
2,865,630 UART:
2,865,684 UART: [state] CFI Enabled
2,875,993 UART: [fht] FMC Alias Private Key: 7
2,984,124 UART: [art] Extend RT PCRs Done
2,984,552 UART: [art] Lock RT PCRs Done
2,986,214 UART: [art] Populate DV Done
2,994,559 UART: [fht] FMC Alias Private Key: 7
2,995,553 UART: [art] Derive CDI
2,995,833 UART: [art] Store in in slot 0x4
3,081,346 UART: [art] Derive Key Pair
3,081,706 UART: [art] Store priv key in slot 0x5
3,094,892 UART: [art] Derive Key Pair - Done
3,109,589 UART: [art] Signing Cert with AUTHO
3,110,069 UART: RITY.KEYID = 7
3,125,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,940 UART: [art] PUB.X = 6331C18AAB7011E1B350DBB0E2C18DD5DE4A28B72B29674878D695CB88FD03B00AD025E1FC93856A43156FAB12DCD1DE
3,132,718 UART: [art] PUB.Y = F5BCBFA894B741DA157E034F46B545E6AD1BA366ED77D9FF984BE175308D39F4EDB453FF10338DBDF85BAC28B61CDCE5
3,139,689 UART: [art] SIG.R = 1738EE64E35693EEB52FA4C289B383BDA6F2429CA6056039B3F8DEE7CACAB06CAE269E963A05CDD4FA9E5F8D0F3ADD6C
3,146,476 UART: [art] SIG.S = 8E9B1B71D9844AAD26BD6033D8EE7A028FE7487E8566DC8FFD2C5B5BDA6FEB26AE181AEB31ABDA61854F5E82109CF5A9
3,169,936 UART: Caliptra RT
3,170,189 UART: [state] CFI Enabled
3,277,290 UART: [rt] RT listening for mailbox commands...
3,277,960 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,540 UART: [rt]cmd =0x53574545, len=84
3,311,957 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,374 ready_for_fw is high
1,056,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,038 >>> mbox cmd response: success
2,686,158 UART:
2,686,174 UART: Running Caliptra FMC ...
2,686,582 UART:
2,686,636 UART: [state] CFI Enabled
2,697,039 UART: [fht] FMC Alias Private Key: 7
2,805,506 UART: [art] Extend RT PCRs Done
2,805,934 UART: [art] Lock RT PCRs Done
2,807,546 UART: [art] Populate DV Done
2,815,819 UART: [fht] FMC Alias Private Key: 7
2,816,963 UART: [art] Derive CDI
2,817,243 UART: [art] Store in in slot 0x4
2,902,466 UART: [art] Derive Key Pair
2,902,826 UART: [art] Store priv key in slot 0x5
2,915,520 UART: [art] Derive Key Pair - Done
2,930,108 UART: [art] Signing Cert with AUTHO
2,930,588 UART: RITY.KEYID = 7
2,945,690 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,455 UART: [art] PUB.X = CACFED16D2610AB44E5EA55AB08EB6A715F47E8818B79E219EF771EF6B47EADAADAEA8D4BB01DFB4B5AEDEE03F2B1BC7
2,953,259 UART: [art] PUB.Y = 130440F6828AD87470DF24C4F9DC4CDD541520F8FE21EA4DDF389BDAE746E0F3F96AC280AABEEFB49E1D70DA35A429CC
2,960,230 UART: [art] SIG.R = A5D903318755EC8AEE1E438E3B0478B2AEF58B83287054DCD7A0081A8F301212079319783172B91404305D522B56BFFF
2,966,979 UART: [art] SIG.S = 77F1E52752292D0107BB9928AB3541FFC3669DE70ED68033A8CC17AEEE8EB2E9C69D1958C26DA130FE50CBC2DDACC4CF
2,990,885 UART: Caliptra RT
2,991,138 UART: [state] CFI Enabled
3,099,003 UART: [rt] RT listening for mailbox commands...
3,099,673 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,819 UART: [rt]cmd =0x53574545, len=84
3,132,974 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
87,134 UART: [state] WD Timer not started. Device not locked for debugging
88,353 UART: [kat] SHA2-256
891,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,032 UART: [kat] ++
896,184 UART: [kat] sha1
900,328 UART: [kat] SHA2-256
902,268 UART: [kat] SHA2-384
905,097 UART: [kat] SHA2-512-ACC
906,998 UART: [kat] ECC-384
916,957 UART: [kat] HMAC-384Kdf
921,673 UART: [kat] LMS
1,169,985 UART: [kat] --
1,171,182 UART: [cold-reset] ++
1,171,634 UART: [fht] FHT @ 0x50003400
1,174,164 UART: [idev] ++
1,174,332 UART: [idev] CDI.KEYID = 6
1,174,693 UART: [idev] SUBJECT.KEYID = 7
1,175,118 UART: [idev] UDS.KEYID = 0
1,175,464 ready_for_fw is high
1,175,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,266 UART: [idev] Erasing UDS.KEYID = 0
1,200,494 UART: [idev] Sha1 KeyId Algorithm
1,209,230 UART: [idev] --
1,210,241 UART: [ldev] ++
1,210,409 UART: [ldev] CDI.KEYID = 6
1,210,773 UART: [ldev] SUBJECT.KEYID = 5
1,211,200 UART: [ldev] AUTHORITY.KEYID = 7
1,211,663 UART: [ldev] FE.KEYID = 1
1,217,095 UART: [ldev] Erasing FE.KEYID = 1
1,243,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,029 UART: [ldev] --
1,282,521 UART: [fwproc] Wait for Commands...
1,283,132 UART: [fwproc] Recv command 0x46574c44
1,283,865 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,376 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,685 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,591 >>> mbox cmd response: success
2,776,704 UART: [afmc] ++
2,776,872 UART: [afmc] CDI.KEYID = 6
2,777,235 UART: [afmc] SUBJECT.KEYID = 7
2,777,661 UART: [afmc] AUTHORITY.KEYID = 5
2,813,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,051 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,770 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,719 UART: [afmc] --
2,856,781 UART: [cold-reset] --
2,857,439 UART: [state] Locking Datavault
2,858,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,282 UART: [state] Locking ICCM
2,859,808 UART: [exit] Launching FMC @ 0x40000130
2,865,137 UART:
2,865,153 UART: Running Caliptra FMC ...
2,865,561 UART:
2,865,704 UART: [state] CFI Enabled
2,875,967 UART: [fht] FMC Alias Private Key: 7
2,984,312 UART: [art] Extend RT PCRs Done
2,984,740 UART: [art] Lock RT PCRs Done
2,986,192 UART: [art] Populate DV Done
2,994,667 UART: [fht] FMC Alias Private Key: 7
2,995,797 UART: [art] Derive CDI
2,996,077 UART: [art] Store in in slot 0x4
3,081,630 UART: [art] Derive Key Pair
3,081,990 UART: [art] Store priv key in slot 0x5
3,095,472 UART: [art] Derive Key Pair - Done
3,110,408 UART: [art] Signing Cert with AUTHO
3,110,888 UART: RITY.KEYID = 7
3,126,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,765 UART: [art] PUB.X = F2D7D3C33A233D68812690DFDCCA865EA63657AA1139AC55BB1D156B4837625BB764D2B623F7E1E1FD8B949DEA709283
3,133,543 UART: [art] PUB.Y = 97A2DF71555CC13DBF2075234F876D7C86F3F17E20CC09278E23C2B9C511436CDE0C8AB640A12DA1633EF917BAC140F1
3,140,495 UART: [art] SIG.R = 00D9FE4325528993E480EE7CCAAB75C5CE9D561824CC16B163907913FA716830226997EB1BC7AD5410F61DAC94CDD00C
3,147,246 UART: [art] SIG.S = 46F48FF92370B0F3745521FB34373949E545F1D63D498E84BAD083BCB67AF73221175ADAFFB71583CF18ADFAF1386E58
3,170,717 UART: Caliptra RT
3,171,062 UART: [state] CFI Enabled
3,279,584 UART: [rt] RT listening for mailbox commands...
3,280,254 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,552 UART: [rt]cmd =0x53574545, len=84
3,314,255 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,047 ready_for_fw is high
1,056,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,879 >>> mbox cmd response: success
2,685,899 UART:
2,685,915 UART: Running Caliptra FMC ...
2,686,323 UART:
2,686,466 UART: [state] CFI Enabled
2,697,017 UART: [fht] FMC Alias Private Key: 7
2,805,084 UART: [art] Extend RT PCRs Done
2,805,512 UART: [art] Lock RT PCRs Done
2,807,378 UART: [art] Populate DV Done
2,815,649 UART: [fht] FMC Alias Private Key: 7
2,816,707 UART: [art] Derive CDI
2,816,987 UART: [art] Store in in slot 0x4
2,902,978 UART: [art] Derive Key Pair
2,903,338 UART: [art] Store priv key in slot 0x5
2,916,806 UART: [art] Derive Key Pair - Done
2,931,376 UART: [art] Signing Cert with AUTHO
2,931,856 UART: RITY.KEYID = 7
2,947,050 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,815 UART: [art] PUB.X = C7B13FB27E5AEB44486DBB4E3FCAA796938B747EA8E82024A51FDBD420A32696CD188F258C112C28975D1DE782CB3455
2,954,595 UART: [art] PUB.Y = FB43338ED6D3D212717E525805A7B3CEA6233E7DDBAED3E8C26F99DF99DF7E3D3C1234C704F1425BCD38BF178ECA24B5
2,961,557 UART: [art] SIG.R = 65F675F3BE884817A7174195478AAA397E323488937D0352BDC54426ADD4A6271858237ADCF28B060C8B9795511C7A50
2,968,308 UART: [art] SIG.S = 91CD254E4015901A479E43B0C06861D6FA84F49718A2B882368E41E6FCA9428D909AE057D26C7A3FBBA76C8747CDBEE2
2,992,267 UART: Caliptra RT
2,992,612 UART: [state] CFI Enabled
3,100,003 UART: [rt] RT listening for mailbox commands...
3,100,673 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,113 UART: [rt]cmd =0x53574545, len=84
3,134,410 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,090 UART:
192,459 UART: Running Caliptra ROM ...
193,665 UART:
193,823 UART: [state] CFI Enabled
268,206 UART: [state] LifecycleState = Unprovisioned
270,207 UART: [state] DebugLocked = No
272,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,825 UART: [kat] SHA2-256
447,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,026 UART: [kat] ++
458,503 UART: [kat] sha1
469,879 UART: [kat] SHA2-256
472,599 UART: [kat] SHA2-384
478,515 UART: [kat] SHA2-512-ACC
480,891 UART: [kat] ECC-384
2,770,638 UART: [kat] HMAC-384Kdf
2,800,888 UART: [kat] LMS
3,991,164 UART: [kat] --
3,994,881 UART: [cold-reset] ++
3,996,528 UART: [fht] Storing FHT @ 0x50003400
4,007,687 UART: [idev] ++
4,008,298 UART: [idev] CDI.KEYID = 6
4,009,194 UART: [idev] SUBJECT.KEYID = 7
4,010,445 UART: [idev] UDS.KEYID = 0
4,011,439 ready_for_fw is high
4,011,661 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,121 UART: [idev] Erasing UDS.KEYID = 0
7,345,654 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,918 UART: [idev] --
7,370,891 UART: [ldev] ++
7,371,468 UART: [ldev] CDI.KEYID = 6
7,372,449 UART: [ldev] SUBJECT.KEYID = 5
7,373,609 UART: [ldev] AUTHORITY.KEYID = 7
7,374,895 UART: [ldev] FE.KEYID = 1
7,422,097 UART: [ldev] Erasing FE.KEYID = 1
10,746,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,837 UART: [ldev] --
13,128,748 UART: [fwproc] Waiting for Commands...
13,131,226 UART: [fwproc] Received command 0x46574c44
13,133,406 UART: [fwproc] Received Image of size 114124 bytes
17,189,833 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,491 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,649,111 >>> mbox cmd response: success
17,652,739 UART: [afmc] ++
17,653,349 UART: [afmc] CDI.KEYID = 6
17,654,282 UART: [afmc] SUBJECT.KEYID = 7
17,655,497 UART: [afmc] AUTHORITY.KEYID = 5
21,018,281 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,319,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,322,160 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,336,541 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,351,393 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,365,979 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,387,029 UART: [afmc] --
23,390,198 UART: [cold-reset] --
23,392,818 UART: [state] Locking Datavault
23,400,225 UART: [state] Locking PCR0, PCR1 and PCR31
23,401,989 UART: [state] Locking ICCM
23,403,767 UART: [exit] Launching FMC @ 0x40000130
23,412,162 UART:
23,412,396 UART: Running Caliptra FMC ...
23,413,502 UART:
23,413,669 UART: [state] CFI Enabled
23,479,915 UART: [fht] FMC Alias Private Key: 7
25,818,026 UART: [art] Extend RT PCRs Done
25,819,247 UART: [art] Lock RT PCRs Done
25,820,978 UART: [art] Populate DV Done
25,826,446 UART: [fht] FMC Alias Private Key: 7
25,828,091 UART: [art] Derive CDI
25,828,859 UART: [art] Store in in slot 0x4
25,887,737 UART: [art] Derive Key Pair
25,888,786 UART: [art] Store priv key in slot 0x5
29,181,677 UART: [art] Derive Key Pair - Done
29,194,349 UART: [art] Signing Cert with AUTHO
29,195,653 UART: RITY.KEYID = 7
31,484,024 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,527 UART: [art] PUB.X = B196B5483ADA1EE8F313AE220C45288FA1282FCC73226D6E16AA574660B90531D433FC976BAB9CE78A04A3D658B6D057
31,492,773 UART: [art] PUB.Y = BD523D7549056D1F98F435715BF94DCA1B3E1F4FF5E9DFE3F262727E82177F93E2E4F3320B2801C0F07C6A1C2943CC23
31,500,007 UART: [art] SIG.R = 8E70AD4D6BDDDDEA353BCF1803A457BC6119B5AA3CC21E32DB801240FA218BDB01ADAB689110047EF03BA03063D10FB6
31,507,412 UART: [art] SIG.S = EF21DE77A256F262297FFCC2FEFC06972A931E3FCDAD781E1A1DC5D599B048053545614DE9BF92B5ACF654B1E540C51C
32,812,541 UART: Caliptra RT
32,813,248 UART: [state] CFI Enabled
32,972,465 UART: [rt] RT listening for mailbox commands...
32,974,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,005,646 UART: [rt]cmd =0x44504543, len=96
38,768,920 >>> mbox cmd response data (6236 bytes)
38,798,101 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,829,012 UART: [rt]cmd =0x53574545, len=84
44,413,299 >>> mbox cmd response data (200 bytes)
44,800,517 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,831,046 UART: [rt]cmd =0x52564348, len=36
44,833,502 >>> mbox cmd response data (8 bytes)
44,833,894 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,864,406 UART: [rt]cmd =0x53574545, len=84
44,867,963 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,794,778 ready_for_fw is high
3,795,410 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,847,435 >>> mbox cmd response: success
23,548,786 UART:
23,549,244 UART: Running Caliptra FMC ...
23,550,365 UART:
23,550,523 UART: [state] CFI Enabled
23,614,051 UART: [fht] FMC Alias Private Key: 7
25,951,690 UART: [art] Extend RT PCRs Done
25,952,942 UART: [art] Lock RT PCRs Done
25,954,437 UART: [art] Populate DV Done
25,959,926 UART: [fht] FMC Alias Private Key: 7
25,961,426 UART: [art] Derive CDI
25,962,164 UART: [art] Store in in slot 0x4
26,024,681 UART: [art] Derive Key Pair
26,025,730 UART: [art] Store priv key in slot 0x5
29,318,639 UART: [art] Derive Key Pair - Done
29,331,695 UART: [art] Signing Cert with AUTHO
29,333,022 UART: RITY.KEYID = 7
31,619,800 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,306 UART: [art] PUB.X = 8FEDCAB4BB9FD78EF57B6D40A3D8B34000AE0279228CC4DCFF94CC07337ECC82937950374BB8610831F83EAFE22D9548
31,628,585 UART: [art] PUB.Y = C9F0D72A44BA03E22545009F05D9258B91BEE0A400AC872DA567CA008A736F6BD41B5BC747F91A65383C377BB4757DD7
31,635,802 UART: [art] SIG.R = 0DCE7EBBD5E979D8D3F61717F8F3796E20A6D198ECBAF0C9E38DF807F6DA4334C61FAA96D4EB9F108684E1A2FBB93329
31,643,214 UART: [art] SIG.S = 4FAA55D9C2EED519E32F2BDC35AD3CE3A0332BC73BF08A0D10689E94092EFDAB99432B2289A9FB7224A0D6169DB00836
32,948,758 UART: Caliptra RT
32,949,475 UART: [state] CFI Enabled
33,108,319 UART: [rt] RT listening for mailbox commands...
33,110,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,141,595 UART: [rt]cmd =0x44504543, len=96
38,904,807 >>> mbox cmd response data (6236 bytes)
38,933,998 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,964,565 UART: [rt]cmd =0x53574545, len=84
44,548,293 >>> mbox cmd response data (200 bytes)
44,930,842 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,961,060 UART: [rt]cmd =0x52564348, len=36
44,963,315 >>> mbox cmd response data (8 bytes)
44,963,670 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,994,166 UART: [rt]cmd =0x53574545, len=84
44,997,421 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,377 UART:
192,754 UART: Running Caliptra ROM ...
193,887 UART:
603,612 UART: [state] CFI Enabled
618,982 UART: [state] LifecycleState = Unprovisioned
620,918 UART: [state] DebugLocked = No
623,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,371 UART: [kat] SHA2-256
797,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,628 UART: [kat] ++
808,077 UART: [kat] sha1
819,655 UART: [kat] SHA2-256
822,373 UART: [kat] SHA2-384
828,304 UART: [kat] SHA2-512-ACC
830,666 UART: [kat] ECC-384
3,116,503 UART: [kat] HMAC-384Kdf
3,127,820 UART: [kat] LMS
4,317,929 UART: [kat] --
4,322,924 UART: [cold-reset] ++
4,325,512 UART: [fht] Storing FHT @ 0x50003400
4,336,251 UART: [idev] ++
4,336,823 UART: [idev] CDI.KEYID = 6
4,337,851 UART: [idev] SUBJECT.KEYID = 7
4,339,019 UART: [idev] UDS.KEYID = 0
4,340,047 ready_for_fw is high
4,340,250 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,433 UART: [idev] Erasing UDS.KEYID = 0
7,621,766 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,568 UART: [idev] --
7,648,184 UART: [ldev] ++
7,648,806 UART: [ldev] CDI.KEYID = 6
7,649,686 UART: [ldev] SUBJECT.KEYID = 5
7,650,939 UART: [ldev] AUTHORITY.KEYID = 7
7,652,216 UART: [ldev] FE.KEYID = 1
7,662,695 UART: [ldev] Erasing FE.KEYID = 1
10,949,787 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,032 UART: [ldev] --
13,307,646 UART: [fwproc] Waiting for Commands...
13,311,030 UART: [fwproc] Received command 0x46574c44
13,313,209 UART: [fwproc] Received Image of size 114124 bytes
17,365,105 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,513 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,403 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,828,397 >>> mbox cmd response: success
17,832,666 UART: [afmc] ++
17,833,261 UART: [afmc] CDI.KEYID = 6
17,834,192 UART: [afmc] SUBJECT.KEYID = 7
17,835,452 UART: [afmc] AUTHORITY.KEYID = 5
21,149,896 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,528 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,894 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,719 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,152 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,933 UART: [afmc] --
23,513,731 UART: [cold-reset] --
23,517,696 UART: [state] Locking Datavault
23,523,820 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,065 UART: [state] Locking ICCM
23,528,257 UART: [exit] Launching FMC @ 0x40000130
23,536,656 UART:
23,536,897 UART: Running Caliptra FMC ...
23,537,915 UART:
23,538,053 UART: [state] CFI Enabled
23,546,365 UART: [fht] FMC Alias Private Key: 7
25,877,144 UART: [art] Extend RT PCRs Done
25,878,356 UART: [art] Lock RT PCRs Done
25,880,068 UART: [art] Populate DV Done
25,885,484 UART: [fht] FMC Alias Private Key: 7
25,887,130 UART: [art] Derive CDI
25,887,859 UART: [art] Store in in slot 0x4
25,930,499 UART: [art] Derive Key Pair
25,931,534 UART: [art] Store priv key in slot 0x5
29,172,973 UART: [art] Derive Key Pair - Done
29,186,132 UART: [art] Signing Cert with AUTHO
29,187,438 UART: RITY.KEYID = 7
31,466,760 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,267 UART: [art] PUB.X = 5F04A8810659D4CEBFE43F8E09BDF8BBA8C5D00FAC5911D019DD98771558B72F1EC3D91982401F4B27C80C442050F2B5
31,475,488 UART: [art] PUB.Y = 33BE75C4A965967DB29B6621C64C04CA3E0937A568C28EF2FA9FAAF442A15803BA513707CFAEA785260C982D50849588
31,482,751 UART: [art] SIG.R = C4119C50A8912C95F0A796C5DCDA446D7816821414F79D7081F753096FA7BD6A9D31D3CC9727D3A878228782A125DD99
31,490,132 UART: [art] SIG.S = D04FDF6AFD6E6D1426939543AFE92A6A854E4F39A4FF9FDDA86DD2449F47A8B2049C110A2CD024BCCC007DAEAF0B4BC3
32,795,636 UART: Caliptra RT
32,796,353 UART: [state] CFI Enabled
32,913,852 UART: [rt] RT listening for mailbox commands...
32,916,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,947,092 UART: [rt]cmd =0x44504543, len=96
38,619,937 >>> mbox cmd response data (6236 bytes)
38,649,271 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,679,892 UART: [rt]cmd =0x53574545, len=84
44,203,689 >>> mbox cmd response data (200 bytes)
44,594,839 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,625,334 UART: [rt]cmd =0x52564348, len=36
44,628,014 >>> mbox cmd response data (8 bytes)
44,628,371 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,658,866 UART: [rt]cmd =0x53574545, len=84
44,662,499 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,993 writing to cptra_bootfsm_go
4,131,198 ready_for_fw is high
4,132,161 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,072,456 >>> mbox cmd response: success
23,711,064 UART:
23,711,458 UART: Running Caliptra FMC ...
23,712,584 UART:
23,712,736 UART: [state] CFI Enabled
23,720,806 UART: [fht] FMC Alias Private Key: 7
26,051,238 UART: [art] Extend RT PCRs Done
26,052,464 UART: [art] Lock RT PCRs Done
26,054,009 UART: [art] Populate DV Done
26,059,380 UART: [fht] FMC Alias Private Key: 7
26,061,084 UART: [art] Derive CDI
26,061,900 UART: [art] Store in in slot 0x4
26,104,155 UART: [art] Derive Key Pair
26,105,169 UART: [art] Store priv key in slot 0x5
29,347,385 UART: [art] Derive Key Pair - Done
29,360,604 UART: [art] Signing Cert with AUTHO
29,361,905 UART: RITY.KEYID = 7
31,641,059 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,572 UART: [art] PUB.X = 4304241081F444C2680337BA77C739A78735998F169BD33472888C0101869CF807024EAB4365E99E1A2B8515159908F1
31,649,774 UART: [art] PUB.Y = 7D67858A0EFCA4CB4AEAF32D9086A14A1B1D1751389E6C55BAF2944766D38C1B6F875E51B6A6740767CDD2D37AA57B03
31,656,995 UART: [art] SIG.R = 1AB52F484B8F24F0D46D7F02C4017B417F276A2D5D123FF73F6858AB6B371CE3504E46CB9CB2AD6EE5F2C7DE14EA6EAF
31,664,435 UART: [art] SIG.S = 66411872F04EBD178866486D760F005BC2C279F2925F17BAE0DD4ABB6C766DE277E6940A4A303F82201E2524BF67112E
32,969,910 UART: Caliptra RT
32,970,610 UART: [state] CFI Enabled
33,087,614 UART: [rt] RT listening for mailbox commands...
33,090,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,120,781 UART: [rt]cmd =0x44504543, len=96
38,792,851 >>> mbox cmd response data (6236 bytes)
38,821,998 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,852,611 UART: [rt]cmd =0x53574545, len=84
44,377,024 >>> mbox cmd response data (200 bytes)
44,768,503 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,798,878 UART: [rt]cmd =0x52564348, len=36
44,801,618 >>> mbox cmd response data (8 bytes)
44,802,062 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,832,533 UART: [rt]cmd =0x53574545, len=84
44,836,335 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
192,078 UART:
192,466 UART: Running Caliptra ROM ...
193,579 UART:
193,722 UART: [state] CFI Enabled
263,054 UART: [state] LifecycleState = Unprovisioned
264,912 UART: [state] DebugLocked = No
267,216 UART: [state] WD Timer not started. Device not locked for debugging
270,746 UART: [kat] SHA2-256
449,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,456 UART: [kat] ++
461,990 UART: [kat] sha1
473,300 UART: [kat] SHA2-256
476,377 UART: [kat] SHA2-384
482,647 UART: [kat] SHA2-512-ACC
485,649 UART: [kat] ECC-384
2,947,519 UART: [kat] HMAC-384Kdf
2,971,791 UART: [kat] LMS
3,501,216 UART: [kat] --
3,506,780 UART: [cold-reset] ++
3,508,147 UART: [fht] FHT @ 0x50003400
3,520,713 UART: [idev] ++
3,521,271 UART: [idev] CDI.KEYID = 6
3,522,161 UART: [idev] SUBJECT.KEYID = 7
3,523,274 UART: [idev] UDS.KEYID = 0
3,524,386 ready_for_fw is high
3,524,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,632 UART: [idev] Erasing UDS.KEYID = 0
6,029,670 UART: [idev] Sha1 KeyId Algorithm
6,053,662 UART: [idev] --
6,057,491 UART: [ldev] ++
6,058,061 UART: [ldev] CDI.KEYID = 6
6,058,955 UART: [ldev] SUBJECT.KEYID = 5
6,060,162 UART: [ldev] AUTHORITY.KEYID = 7
6,061,416 UART: [ldev] FE.KEYID = 1
6,100,608 UART: [ldev] Erasing FE.KEYID = 1
8,603,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,340 UART: [ldev] --
10,411,362 UART: [fwproc] Wait for Commands...
10,413,663 UART: [fwproc] Recv command 0x46574c44
10,415,703 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,464 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,264 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,395 >>> mbox cmd response: success
14,281,353 UART: [afmc] ++
14,281,968 UART: [afmc] CDI.KEYID = 6
14,282,879 UART: [afmc] SUBJECT.KEYID = 7
14,284,038 UART: [afmc] AUTHORITY.KEYID = 5
16,806,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,234 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,021 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,284 UART: [afmc] --
18,606,451 UART: [cold-reset] --
18,610,848 UART: [state] Locking Datavault
18,614,955 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,651 UART: [state] Locking ICCM
18,619,154 UART: [exit] Launching FMC @ 0x40000130
18,627,542 UART:
18,627,799 UART: Running Caliptra FMC ...
18,628,827 UART:
18,628,976 UART: [state] CFI Enabled
18,690,860 UART: [fht] FMC Alias Private Key: 7
20,454,800 UART: [art] Extend RT PCRs Done
20,456,024 UART: [art] Lock RT PCRs Done
20,457,543 UART: [art] Populate DV Done
20,462,846 UART: [fht] FMC Alias Private Key: 7
20,464,491 UART: [art] Derive CDI
20,465,304 UART: [art] Store in in slot 0x4
20,523,810 UART: [art] Derive Key Pair
20,524,848 UART: [art] Store priv key in slot 0x5
22,989,488 UART: [art] Derive Key Pair - Done
23,002,441 UART: [art] Signing Cert with AUTHO
23,003,741 UART: RITY.KEYID = 7
24,714,712 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,235 UART: [art] PUB.X = C5156270725B77C5F53DE5D047893B20AA309880EC084942B2BA1FB7466336FEF31AD3F12B5CCE6AEEEFD265265CAFD3
24,723,500 UART: [art] PUB.Y = 1AF98AAE78FAAE33BD93BCCA8DC3120939A7B6120BB2AD33C6CA5C5B40D837A6E802F726D472CE87FAEE54DB96B1747F
24,730,800 UART: [art] SIG.R = 6C9523F10BFF11138A8F2B276D2961689789AEB6BEE666869E80C8C4EB295C7529FA77E3290532354521EAAE2E0CB170
24,738,150 UART: [art] SIG.S = 4CBF0A1D2012665708BD711DCC7F056736EECE9BD4D059CBBDA1917863BCA868BBB8A49406ED40C67059C873AB4AACCD
25,716,868 UART: Caliptra RT
25,717,602 UART: [state] CFI Enabled
25,881,155 UART: [rt] RT listening for mailbox commands...
25,883,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,914,803 UART: [rt]cmd =0x44504543, len=96
30,273,279 >>> mbox cmd response data (6236 bytes)
30,302,524 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,333,126 UART: [rt]cmd =0x53574545, len=84
34,512,411 >>> mbox cmd response data (200 bytes)
34,895,759 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,926,077 UART: [rt]cmd =0x52564348, len=36
34,928,470 >>> mbox cmd response data (8 bytes)
34,928,841 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,959,300 UART: [rt]cmd =0x53574545, len=84
34,962,851 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,358,638 ready_for_fw is high
3,359,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,018,903 >>> mbox cmd response: success
18,299,708 UART:
18,300,113 UART: Running Caliptra FMC ...
18,301,256 UART:
18,301,419 UART: [state] CFI Enabled
18,365,280 UART: [fht] FMC Alias Private Key: 7
20,129,853 UART: [art] Extend RT PCRs Done
20,131,087 UART: [art] Lock RT PCRs Done
20,132,662 UART: [art] Populate DV Done
20,138,140 UART: [fht] FMC Alias Private Key: 7
20,139,855 UART: [art] Derive CDI
20,140,675 UART: [art] Store in in slot 0x4
20,198,544 UART: [art] Derive Key Pair
20,199,582 UART: [art] Store priv key in slot 0x5
22,662,515 UART: [art] Derive Key Pair - Done
22,675,622 UART: [art] Signing Cert with AUTHO
22,676,930 UART: RITY.KEYID = 7
24,388,359 UART: [art] Erasing AUTHORITY.KEYID = 7
24,389,866 UART: [art] PUB.X = C7B080320D350C5D32B103A65CA8C7B036E2B7B63D6585B5F8D08CFE4CBBF33175CDA0D14AC1679E3271C88E18B82205
24,397,171 UART: [art] PUB.Y = 57C41E48DAD2F659FBAD9EB9848FB40BFAEF03804074852F8FC2B365947B7B2D910883898AD043C4FB329A802E425147
24,404,424 UART: [art] SIG.R = CCC07F9BA4ABDA7FDB1186E916C1B67B7F309728D29C2BC1270AFA6D3B2730A97CA239175B3DB4D3150F1C86B5E13A0E
24,411,836 UART: [art] SIG.S = 105A84BACBAC224E077BE9A1AFC3838962DD6E892A83283C1C8E5BE3002A3819D2624715A1312A4593574734AA79F457
25,390,305 UART: Caliptra RT
25,391,018 UART: [state] CFI Enabled
25,555,766 UART: [rt] RT listening for mailbox commands...
25,558,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,589,508 UART: [rt]cmd =0x44504543, len=96
29,968,401 >>> mbox cmd response data (6236 bytes)
29,997,975 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,028,484 UART: [rt]cmd =0x53574545, len=84
34,205,652 >>> mbox cmd response data (200 bytes)
34,589,953 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,620,362 UART: [rt]cmd =0x52564348, len=36
34,622,886 >>> mbox cmd response data (8 bytes)
34,623,321 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,653,718 UART: [rt]cmd =0x53574545, len=84
34,657,361 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,507 UART:
192,873 UART: Running Caliptra ROM ...
194,090 UART:
603,467 UART: [state] CFI Enabled
620,454 UART: [state] LifecycleState = Unprovisioned
622,274 UART: [state] DebugLocked = No
623,580 UART: [state] WD Timer not started. Device not locked for debugging
627,113 UART: [kat] SHA2-256
806,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,871 UART: [kat] ++
818,319 UART: [kat] sha1
828,755 UART: [kat] SHA2-256
831,760 UART: [kat] SHA2-384
836,326 UART: [kat] SHA2-512-ACC
839,253 UART: [kat] ECC-384
3,282,390 UART: [kat] HMAC-384Kdf
3,294,642 UART: [kat] LMS
3,824,135 UART: [kat] --
3,827,947 UART: [cold-reset] ++
3,829,406 UART: [fht] FHT @ 0x50003400
3,840,309 UART: [idev] ++
3,840,875 UART: [idev] CDI.KEYID = 6
3,841,799 UART: [idev] SUBJECT.KEYID = 7
3,842,964 UART: [idev] UDS.KEYID = 0
3,844,005 ready_for_fw is high
3,844,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,015 UART: [idev] Erasing UDS.KEYID = 0
6,317,941 UART: [idev] Sha1 KeyId Algorithm
6,340,308 UART: [idev] --
6,345,163 UART: [ldev] ++
6,345,726 UART: [ldev] CDI.KEYID = 6
6,346,732 UART: [ldev] SUBJECT.KEYID = 5
6,347,825 UART: [ldev] AUTHORITY.KEYID = 7
6,349,097 UART: [ldev] FE.KEYID = 1
6,359,278 UART: [ldev] Erasing FE.KEYID = 1
8,834,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,492 UART: [ldev] --
10,623,665 UART: [fwproc] Wait for Commands...
10,626,719 UART: [fwproc] Recv command 0x46574c44
10,628,843 UART: [fwproc] Recv'd Img size: 114448 bytes
14,035,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,843 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,639 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,499,824 >>> mbox cmd response: success
14,504,806 UART: [afmc] ++
14,505,386 UART: [afmc] CDI.KEYID = 6
14,506,475 UART: [afmc] SUBJECT.KEYID = 7
14,507,572 UART: [afmc] AUTHORITY.KEYID = 5
17,005,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,177 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,013 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,677 UART: [afmc] --
18,801,501 UART: [cold-reset] --
18,804,872 UART: [state] Locking Datavault
18,808,978 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,616 UART: [state] Locking ICCM
18,813,244 UART: [exit] Launching FMC @ 0x40000130
18,821,641 UART:
18,821,868 UART: Running Caliptra FMC ...
18,822,978 UART:
18,823,132 UART: [state] CFI Enabled
18,831,493 UART: [fht] FMC Alias Private Key: 7
20,588,130 UART: [art] Extend RT PCRs Done
20,589,348 UART: [art] Lock RT PCRs Done
20,591,047 UART: [art] Populate DV Done
20,596,615 UART: [fht] FMC Alias Private Key: 7
20,598,262 UART: [art] Derive CDI
20,599,073 UART: [art] Store in in slot 0x4
20,641,722 UART: [art] Derive Key Pair
20,642,757 UART: [art] Store priv key in slot 0x5
23,069,572 UART: [art] Derive Key Pair - Done
23,082,135 UART: [art] Signing Cert with AUTHO
23,083,440 UART: RITY.KEYID = 7
24,788,677 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,177 UART: [art] PUB.X = 16E1B452C59E25A3DA7609816D29BE00F657BA2B0E2D60F6F3A24E6F27AF239E8CD1C2D6C29A961240E33D6D2EE1F115
24,797,505 UART: [art] PUB.Y = 383CCB856D40429BBF7EEF32A49CEDC6CD636540BA106739551DD5580489ED588462D24C141A2D9991B5ABFE860679A1
24,804,714 UART: [art] SIG.R = 966A762C76341000E793B6F790C5BDDE71283EC0F3AF8E6C404081B6255D4E77DE463556824424B09ABDF5CBF0FC3166
24,812,094 UART: [art] SIG.S = 2E477861531102CA874CD58CCC35F9E87501B4CEFECAC973E0ED3AE653C14DCF325C7D57E812BAFA197AE5101DEA62C9
25,791,087 UART: Caliptra RT
25,791,787 UART: [state] CFI Enabled
25,908,411 UART: [rt] RT listening for mailbox commands...
25,910,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,941,550 UART: [rt]cmd =0x44504543, len=96
30,224,180 >>> mbox cmd response data (6236 bytes)
30,253,534 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,284,047 UART: [rt]cmd =0x53574545, len=84
34,419,817 >>> mbox cmd response data (200 bytes)
34,809,594 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,840,107 UART: [rt]cmd =0x52564348, len=36
34,842,955 >>> mbox cmd response data (8 bytes)
34,843,303 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,873,431 UART: [rt]cmd =0x53574545, len=84
34,877,296 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,696,899 ready_for_fw is high
3,697,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,286,732 >>> mbox cmd response: success
18,535,713 UART:
18,536,114 UART: Running Caliptra FMC ...
18,537,314 UART:
18,537,488 UART: [state] CFI Enabled
18,545,373 UART: [fht] FMC Alias Private Key: 7
20,302,234 UART: [art] Extend RT PCRs Done
20,303,458 UART: [art] Lock RT PCRs Done
20,304,921 UART: [art] Populate DV Done
20,310,542 UART: [fht] FMC Alias Private Key: 7
20,312,187 UART: [art] Derive CDI
20,312,995 UART: [art] Store in in slot 0x4
20,355,432 UART: [art] Derive Key Pair
20,356,467 UART: [art] Store priv key in slot 0x5
22,783,238 UART: [art] Derive Key Pair - Done
22,796,148 UART: [art] Signing Cert with AUTHO
22,797,449 UART: RITY.KEYID = 7
24,503,235 UART: [art] Erasing AUTHORITY.KEYID = 7
24,504,730 UART: [art] PUB.X = 06AD14553C0F9947C4171FDD82D9123699F8A4D3571335B97A7995E8ACF6C6E7D967DFD952D50BB6BB5F777004030663
24,512,016 UART: [art] PUB.Y = 1A1EC9E73054CA000795DDF9A4DF7AF3F5DBFCFA51E2A86E256BE007246DF5C4D98A29F2C78C65908B8A481FF5046F12
24,519,271 UART: [art] SIG.R = 52CCE295301E8C4894895B6FFE1B8A82F314A7A581D18675C5E1C47993850FC8E9D6B47C78E7E7835F2D64B8374F4468
24,526,642 UART: [art] SIG.S = 2F762214AF83295CA8B3FDA2F737FC686CBC1378F61D29909EC87E2C5477E5A29CD82016DB7F8DEF7E89EB56DB5AD1ED
25,505,326 UART: Caliptra RT
25,506,019 UART: [state] CFI Enabled
25,623,041 UART: [rt] RT listening for mailbox commands...
25,625,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,656,084 UART: [rt]cmd =0x44504543, len=96
29,939,363 >>> mbox cmd response data (6236 bytes)
29,968,718 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,999,216 UART: [rt]cmd =0x53574545, len=84
34,134,543 >>> mbox cmd response data (200 bytes)
34,523,360 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,553,845 UART: [rt]cmd =0x52564348, len=36
34,556,741 >>> mbox cmd response data (8 bytes)
34,557,231 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,587,511 UART: [rt]cmd =0x53574545, len=84
34,590,986 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,438,035 ready_for_fw is high
3,438,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,755,803 >>> mbox cmd response: success
19,048,551 UART:
19,048,952 UART: Running Caliptra FMC ...
19,050,104 UART:
19,050,271 UART: [state] CFI Enabled
19,115,091 UART: [fht] FMC Alias Private Key: 7
20,879,747 UART: [art] Extend RT PCRs Done
20,880,960 UART: [art] Lock RT PCRs Done
20,882,580 UART: [art] Populate DV Done
20,887,773 UART: [fht] FMC Alias Private Key: 7
20,889,418 UART: [art] Derive CDI
20,890,253 UART: [art] Store in in slot 0x4
20,947,745 UART: [art] Derive Key Pair
20,948,786 UART: [art] Store priv key in slot 0x5
23,412,042 UART: [art] Derive Key Pair - Done
23,425,044 UART: [art] Signing Cert with AUTHO
23,426,357 UART: RITY.KEYID = 7
25,137,647 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,156 UART: [art] PUB.X = BE96A237D7EAD9E94C1BE4E6F2338FBD02D8F6FD7EA0D44AE6AD0D05A9A9AF09190D87FB0A21F76418107EBF76E3BBA4
25,146,408 UART: [art] PUB.Y = B961A77767C6449EFE592C67DBFF1FD789F91499E80F5DBF469AF6627BD016CD5BAC5B0450135637A176CC7E0E43743F
25,153,708 UART: [art] SIG.R = 2EABC3FAD4378541647CDB2D94319D516F1CE1623714D80CF28BC7ABA9495174BD87F46A9E733C8029290EDF0CA077C0
25,161,092 UART: [art] SIG.S = 625F35842446721EC80400B6F0D21BCE7D35BBE09DCA140D82791A36E57FFA5A09A247EE271AD4823BF70DC5BA34BD29
26,139,891 UART: Caliptra RT
26,140,583 UART: [state] CFI Enabled
26,306,014 UART: [rt] RT listening for mailbox commands...
26,308,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,339,708 UART: [rt]cmd =0x44504543, len=96
30,717,778 >>> mbox cmd response data (6236 bytes)
30,746,947 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,777,359 UART: [rt]cmd =0x53574545, len=84
34,956,036 >>> mbox cmd response data (200 bytes)
35,339,496 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,369,935 UART: [rt]cmd =0x52564348, len=36
35,372,508 >>> mbox cmd response data (8 bytes)
35,372,961 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,403,530 UART: [rt]cmd =0x53574545, len=84
35,406,886 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,761,001 ready_for_fw is high
3,761,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,961,399 >>> mbox cmd response: success
19,216,912 UART:
19,217,284 UART: Running Caliptra FMC ...
19,218,422 UART:
19,218,597 UART: [state] CFI Enabled
19,226,654 UART: [fht] FMC Alias Private Key: 7
20,983,813 UART: [art] Extend RT PCRs Done
20,985,036 UART: [art] Lock RT PCRs Done
20,986,715 UART: [art] Populate DV Done
20,992,062 UART: [fht] FMC Alias Private Key: 7
20,993,599 UART: [art] Derive CDI
20,994,410 UART: [art] Store in in slot 0x4
21,036,961 UART: [art] Derive Key Pair
21,038,036 UART: [art] Store priv key in slot 0x5
23,464,326 UART: [art] Derive Key Pair - Done
23,477,424 UART: [art] Signing Cert with AUTHO
23,478,727 UART: RITY.KEYID = 7
25,183,944 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,446 UART: [art] PUB.X = B8F3DF651DFEB528DA1898D7277758C1CF259FB497F227493CBE15894FE2C900AC3B44520B1F9B11111F1B5048C07F74
25,192,873 UART: [art] PUB.Y = 121903EB9578E1928D1CB4AE55AB3E186DD5E3408084F7F9E17E071E0249C83F70A3F9AF0D629011422CEFBFAA947D8E
25,199,979 UART: [art] SIG.R = 8DDF5081882C2B8222919C0D75FE9875A42D37C2B1A5C30A8F4E108B6C4F9BE5698000B091A8A0C0F4EC80914B3C9BA1
25,207,366 UART: [art] SIG.S = 69D9F7106D22927C3EC8FB65D730BC7FCEFDFFA265BA4B7A806A84A0782C82F4194F1E80715FE129B112DC16070258E0
26,185,991 UART: Caliptra RT
26,186,681 UART: [state] CFI Enabled
26,304,598 UART: [rt] RT listening for mailbox commands...
26,306,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,337,663 UART: [rt]cmd =0x44504543, len=96
30,619,994 >>> mbox cmd response data (6236 bytes)
30,649,602 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,680,066 UART: [rt]cmd =0x53574545, len=84
34,815,856 >>> mbox cmd response data (200 bytes)
35,207,687 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,237,989 UART: [rt]cmd =0x52564348, len=36
35,240,565 >>> mbox cmd response data (8 bytes)
35,241,000 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,271,625 UART: [rt]cmd =0x53574545, len=84
35,275,166 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,730 UART: [state] LifecycleState = Unprovisioned
86,385 UART: [state] DebugLocked = No
86,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,529 UART: [kat] SHA2-256
882,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,575 UART: [kat] ++
886,727 UART: [kat] sha1
890,907 UART: [kat] SHA2-256
892,845 UART: [kat] SHA2-384
895,616 UART: [kat] SHA2-512-ACC
897,517 UART: [kat] ECC-384
902,902 UART: [kat] HMAC-384Kdf
907,516 UART: [kat] LMS
1,475,712 UART: [kat] --
1,476,459 UART: [cold-reset] ++
1,476,909 UART: [fht] Storing FHT @ 0x50003400
1,479,698 UART: [idev] ++
1,479,866 UART: [idev] CDI.KEYID = 6
1,480,226 UART: [idev] SUBJECT.KEYID = 7
1,480,650 UART: [idev] UDS.KEYID = 0
1,480,995 ready_for_fw is high
1,480,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,950 UART: [idev] Erasing UDS.KEYID = 0
1,505,610 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,058 UART: [idev] --
1,514,913 UART: [ldev] ++
1,515,081 UART: [ldev] CDI.KEYID = 6
1,515,444 UART: [ldev] SUBJECT.KEYID = 5
1,515,870 UART: [ldev] AUTHORITY.KEYID = 7
1,516,333 UART: [ldev] FE.KEYID = 1
1,521,569 UART: [ldev] Erasing FE.KEYID = 1
1,546,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,554 UART: [ldev] --
1,585,833 UART: [fwproc] Waiting for Commands...
1,586,534 UART: [fwproc] Received command 0x46574c44
1,587,325 UART: [fwproc] Received Image of size 114448 bytes
2,886,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,938 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,290 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,303 >>> mbox cmd response: success
3,079,559 UART: [afmc] ++
3,079,727 UART: [afmc] CDI.KEYID = 6
3,080,089 UART: [afmc] SUBJECT.KEYID = 7
3,080,514 UART: [afmc] AUTHORITY.KEYID = 5
3,115,009 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,313 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,093 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,821 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,706 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,396 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,307 UART: [afmc] --
3,158,287 UART: [cold-reset] --
3,159,113 UART: [state] Locking Datavault
3,160,152 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,756 UART: [state] Locking ICCM
3,161,190 UART: [exit] Launching FMC @ 0x40000130
3,166,519 UART:
3,166,535 UART: Running Caliptra FMC ...
3,166,943 UART:
3,166,997 UART: [state] CFI Enabled
3,177,516 UART: [fht] FMC Alias Private Key: 7
3,285,397 UART: [art] Extend RT PCRs Done
3,285,825 UART: [art] Lock RT PCRs Done
3,287,023 UART: [art] Populate DV Done
3,295,340 UART: [fht] FMC Alias Private Key: 7
3,296,366 UART: [art] Derive CDI
3,296,646 UART: [art] Store in in slot 0x4
3,382,485 UART: [art] Derive Key Pair
3,382,845 UART: [art] Store priv key in slot 0x5
3,396,077 UART: [art] Derive Key Pair - Done
3,410,431 UART: [art] Signing Cert with AUTHO
3,410,911 UART: RITY.KEYID = 7
3,425,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,536 UART: [art] PUB.X = 9B467D547E6CC8CE73A817D97B44B8C75507292B33A98420627F16BF710CAD3AFBB53F22323BAFBD1F36AA34C54D06A3
3,433,307 UART: [art] PUB.Y = 1C40C888585E3F5ABC358668039B502862C8DA6CB648A26B834A8FF4401894BE2EF727D3E1646733FBC243780916320A
3,440,242 UART: [art] SIG.R = 6328770E0A96B022BFCA5FF108CCE0BD13DA0E78FBC7AFCA5304DBF8B2B8E52ABC308721BDB8746805895BCCC41B712F
3,447,016 UART: [art] SIG.S = 86FF6E591F1DDABE9F5438A5F6093370E95AF9A9602006488108A1EF326E0941B62C270026F4D32889C3E46C13771B91
3,471,125 UART: Caliptra RT
3,471,378 UART: [state] CFI Enabled
3,579,825 UART: [rt] RT listening for mailbox commands...
3,580,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,073 UART: [rt]cmd =0x44504543, len=96
3,791,357 >>> mbox cmd response data (6236 bytes)
3,791,358 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,145 UART: [rt]cmd =0x53574545, len=84
3,847,841 >>> mbox cmd response data (200 bytes)
3,847,842 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,369 UART: [rt]cmd =0x52564348, len=36
3,879,921 >>> mbox cmd response data (8 bytes)
3,879,922 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,847 UART: [rt]cmd =0x53574545, len=84
3,912,646 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,737 ready_for_fw is high
1,362,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,371 >>> mbox cmd response: success
2,991,701 UART:
2,991,717 UART: Running Caliptra FMC ...
2,992,125 UART:
2,992,179 UART: [state] CFI Enabled
3,002,586 UART: [fht] FMC Alias Private Key: 7
3,111,077 UART: [art] Extend RT PCRs Done
3,111,505 UART: [art] Lock RT PCRs Done
3,113,193 UART: [art] Populate DV Done
3,121,280 UART: [fht] FMC Alias Private Key: 7
3,122,334 UART: [art] Derive CDI
3,122,614 UART: [art] Store in in slot 0x4
3,208,321 UART: [art] Derive Key Pair
3,208,681 UART: [art] Store priv key in slot 0x5
3,221,931 UART: [art] Derive Key Pair - Done
3,236,969 UART: [art] Signing Cert with AUTHO
3,237,449 UART: RITY.KEYID = 7
3,252,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,552 UART: [art] PUB.X = DD0A94D1EFA06C4BD2AF2982CCB49A48E77935B0C75A43B1C56B277398C5720D78CDD82F6E494017EB33390B4EE608E6
3,260,320 UART: [art] PUB.Y = 7B6F6EF78D2D2D8891D2729128F562177C5E4E0B537EAF6759ED1EAA54D8580E55A1DE5CD373F410400A28E2DF9AB16D
3,267,271 UART: [art] SIG.R = 96DA7EC6CAF75259A0E970E31EF000D9C427207C0F58190CEAE73D55F3D6E195F7A3399477EAE5E1B411A8070E25EC2A
3,274,017 UART: [art] SIG.S = 0312907F7205481F351E40B850B50BC7D05CFB943AACA05803A198AF0A3642E144D82FFE93BEB9B2DBC917214CB15FC4
3,297,739 UART: Caliptra RT
3,297,992 UART: [state] CFI Enabled
3,406,081 UART: [rt] RT listening for mailbox commands...
3,406,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,067 UART: [rt]cmd =0x44504543, len=96
3,617,573 >>> mbox cmd response data (6236 bytes)
3,617,574 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,293 UART: [rt]cmd =0x53574545, len=84
3,672,427 >>> mbox cmd response data (200 bytes)
3,672,428 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,049 UART: [rt]cmd =0x52564348, len=36
3,704,009 >>> mbox cmd response data (8 bytes)
3,704,010 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,881 UART: [rt]cmd =0x53574545, len=84
3,737,514 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,931 UART: [state] LifecycleState = Unprovisioned
86,586 UART: [state] DebugLocked = No
87,282 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,840 UART: [kat] SHA2-256
882,771 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,886 UART: [kat] ++
887,038 UART: [kat] sha1
891,228 UART: [kat] SHA2-256
893,166 UART: [kat] SHA2-384
896,081 UART: [kat] SHA2-512-ACC
897,982 UART: [kat] ECC-384
903,461 UART: [kat] HMAC-384Kdf
908,099 UART: [kat] LMS
1,476,295 UART: [kat] --
1,477,170 UART: [cold-reset] ++
1,477,702 UART: [fht] Storing FHT @ 0x50003400
1,480,599 UART: [idev] ++
1,480,767 UART: [idev] CDI.KEYID = 6
1,481,127 UART: [idev] SUBJECT.KEYID = 7
1,481,551 UART: [idev] UDS.KEYID = 0
1,481,896 ready_for_fw is high
1,481,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,773 UART: [idev] Erasing UDS.KEYID = 0
1,506,489 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,173 UART: [idev] --
1,516,210 UART: [ldev] ++
1,516,378 UART: [ldev] CDI.KEYID = 6
1,516,741 UART: [ldev] SUBJECT.KEYID = 5
1,517,167 UART: [ldev] AUTHORITY.KEYID = 7
1,517,630 UART: [ldev] FE.KEYID = 1
1,523,014 UART: [ldev] Erasing FE.KEYID = 1
1,548,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,273 UART: [ldev] --
1,587,616 UART: [fwproc] Waiting for Commands...
1,588,347 UART: [fwproc] Received command 0x46574c44
1,589,138 UART: [fwproc] Received Image of size 114448 bytes
2,888,817 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,501 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,853 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,930 >>> mbox cmd response: success
3,082,966 UART: [afmc] ++
3,083,134 UART: [afmc] CDI.KEYID = 6
3,083,496 UART: [afmc] SUBJECT.KEYID = 7
3,083,921 UART: [afmc] AUTHORITY.KEYID = 5
3,119,480 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,592 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,372 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,100 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,985 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,675 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,540 UART: [afmc] --
3,162,554 UART: [cold-reset] --
3,163,216 UART: [state] Locking Datavault
3,164,761 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,365 UART: [state] Locking ICCM
3,165,979 UART: [exit] Launching FMC @ 0x40000130
3,171,308 UART:
3,171,324 UART: Running Caliptra FMC ...
3,171,732 UART:
3,171,875 UART: [state] CFI Enabled
3,182,458 UART: [fht] FMC Alias Private Key: 7
3,290,739 UART: [art] Extend RT PCRs Done
3,291,167 UART: [art] Lock RT PCRs Done
3,292,811 UART: [art] Populate DV Done
3,301,038 UART: [fht] FMC Alias Private Key: 7
3,302,022 UART: [art] Derive CDI
3,302,302 UART: [art] Store in in slot 0x4
3,387,769 UART: [art] Derive Key Pair
3,388,129 UART: [art] Store priv key in slot 0x5
3,401,497 UART: [art] Derive Key Pair - Done
3,416,491 UART: [art] Signing Cert with AUTHO
3,416,971 UART: RITY.KEYID = 7
3,432,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,018 UART: [art] PUB.X = 024C56C793D76B23CB34360AABE6E7DB1C964F18BE2E02BB44060F0A3AA640DF9C0A04B14DFC67F9DE6C05EC4B44B920
3,439,779 UART: [art] PUB.Y = CD0912187FB4860815D6545CF1839DC82344BA1AC6660CA5335EDBC324C456881B96604E61E14BDAAA5CB7F26CF04095
3,446,724 UART: [art] SIG.R = 2017D6134320348A1EF3E18DA82ECD1191C41088DBBEABAB6F3AA02C69217530330A4243CDE33C40C21B49DC639208B8
3,453,492 UART: [art] SIG.S = 34ADCA9278782843EFE1D63F07C910631473F315F69A1D63B71F714739E4049E50B82648D99AB8ABB59FF8DC581B6D7C
3,477,457 UART: Caliptra RT
3,477,802 UART: [state] CFI Enabled
3,586,482 UART: [rt] RT listening for mailbox commands...
3,587,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,802 UART: [rt]cmd =0x44504543, len=96
3,798,586 >>> mbox cmd response data (6236 bytes)
3,798,587 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,428 UART: [rt]cmd =0x53574545, len=84
3,854,256 >>> mbox cmd response data (200 bytes)
3,854,257 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,904 UART: [rt]cmd =0x52564348, len=36
3,886,302 >>> mbox cmd response data (8 bytes)
3,886,303 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,110 UART: [rt]cmd =0x53574545, len=84
3,919,399 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,724 ready_for_fw is high
1,362,724 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,214 >>> mbox cmd response: success
2,992,032 UART:
2,992,048 UART: Running Caliptra FMC ...
2,992,456 UART:
2,992,599 UART: [state] CFI Enabled
3,002,980 UART: [fht] FMC Alias Private Key: 7
3,111,267 UART: [art] Extend RT PCRs Done
3,111,695 UART: [art] Lock RT PCRs Done
3,113,241 UART: [art] Populate DV Done
3,121,602 UART: [fht] FMC Alias Private Key: 7
3,122,758 UART: [art] Derive CDI
3,123,038 UART: [art] Store in in slot 0x4
3,209,035 UART: [art] Derive Key Pair
3,209,395 UART: [art] Store priv key in slot 0x5
3,222,689 UART: [art] Derive Key Pair - Done
3,237,484 UART: [art] Signing Cert with AUTHO
3,237,964 UART: RITY.KEYID = 7
3,253,598 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,363 UART: [art] PUB.X = 21B1C1791A81D21AD797CEF88A27EC515FB4E824E4DB15158AC1B63A25E89E6A2946D7CAB88ACF6F69D1FF351C84CCB4
3,261,151 UART: [art] PUB.Y = 260EA6EC5BE7A27EEE39081CBE6F505425B4A12E7262F4CD27CFA539936535F7EFF3A36DB6B8D0F5111802CC679AA053
3,268,104 UART: [art] SIG.R = 58BB1016734B9E4B93D5F5D75799E5309F179EA4BC09D5D0306FEC8134B5841D90FD264B4A866F4CD2847D11EFE86F00
3,274,853 UART: [art] SIG.S = 429521B7D0A7078F7DFB9747AC082E862E0E5EC6A809BD12283DC1A9485359EFC054BAEC414FDD09A8ECF49398CC78E8
3,299,153 UART: Caliptra RT
3,299,498 UART: [state] CFI Enabled
3,408,814 UART: [rt] RT listening for mailbox commands...
3,409,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,010 UART: [rt]cmd =0x44504543, len=96
3,620,868 >>> mbox cmd response data (6236 bytes)
3,620,869 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,780 UART: [rt]cmd =0x53574545, len=84
3,677,154 >>> mbox cmd response data (200 bytes)
3,677,155 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,722 UART: [rt]cmd =0x52564348, len=36
3,708,902 >>> mbox cmd response data (8 bytes)
3,708,903 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,986 UART: [rt]cmd =0x53574545, len=84
3,741,993 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,754 UART: [state] LifecycleState = Unprovisioned
85,409 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,178 UART: [kat] SHA2-256
892,828 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,953 UART: [kat] ++
897,105 UART: [kat] sha1
901,419 UART: [kat] SHA2-256
903,359 UART: [kat] SHA2-384
906,062 UART: [kat] SHA2-512-ACC
907,963 UART: [kat] ECC-384
917,516 UART: [kat] HMAC-384Kdf
922,154 UART: [kat] LMS
1,170,482 UART: [kat] --
1,171,633 UART: [cold-reset] ++
1,172,037 UART: [fht] FHT @ 0x50003400
1,174,632 UART: [idev] ++
1,174,800 UART: [idev] CDI.KEYID = 6
1,175,160 UART: [idev] SUBJECT.KEYID = 7
1,175,584 UART: [idev] UDS.KEYID = 0
1,175,929 ready_for_fw is high
1,175,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,258 UART: [idev] Erasing UDS.KEYID = 0
1,200,003 UART: [idev] Sha1 KeyId Algorithm
1,208,357 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,118 UART: [ldev] SUBJECT.KEYID = 5
1,210,544 UART: [ldev] AUTHORITY.KEYID = 7
1,211,007 UART: [ldev] FE.KEYID = 1
1,216,309 UART: [ldev] Erasing FE.KEYID = 1
1,242,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,877 UART: [ldev] --
1,281,186 UART: [fwproc] Wait for Commands...
1,281,782 UART: [fwproc] Recv command 0x46574c44
1,282,510 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,734 >>> mbox cmd response: success
2,775,962 UART: [afmc] ++
2,776,130 UART: [afmc] CDI.KEYID = 6
2,776,492 UART: [afmc] SUBJECT.KEYID = 7
2,776,917 UART: [afmc] AUTHORITY.KEYID = 5
2,812,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,884 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,603 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,497 UART: [afmc] --
2,855,445 UART: [cold-reset] --
2,856,389 UART: [state] Locking Datavault
2,857,504 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,108 UART: [state] Locking ICCM
2,858,712 UART: [exit] Launching FMC @ 0x40000130
2,864,041 UART:
2,864,057 UART: Running Caliptra FMC ...
2,864,465 UART:
2,864,519 UART: [state] CFI Enabled
2,874,876 UART: [fht] FMC Alias Private Key: 7
2,983,097 UART: [art] Extend RT PCRs Done
2,983,525 UART: [art] Lock RT PCRs Done
2,985,109 UART: [art] Populate DV Done
2,993,124 UART: [fht] FMC Alias Private Key: 7
2,994,208 UART: [art] Derive CDI
2,994,488 UART: [art] Store in in slot 0x4
3,080,001 UART: [art] Derive Key Pair
3,080,361 UART: [art] Store priv key in slot 0x5
3,093,405 UART: [art] Derive Key Pair - Done
3,108,206 UART: [art] Signing Cert with AUTHO
3,108,686 UART: RITY.KEYID = 7
3,123,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,625 UART: [art] PUB.X = 6A3219C60E3D6D44613C76C4B2674F9B4B367D7A0BEF0FC363438C04E0C95CE1C9EBA6D7D4DFF6624E6FECBB60170EBE
3,131,400 UART: [art] PUB.Y = B0F0F7A210438748B9DE8980CEF6C2B0DA989D4BF476C42AB1A6F35C16F19880DE240A629FE8F9F4AC3FDC60177D4AFD
3,138,365 UART: [art] SIG.R = A260FA9694AC5FB02EB4407BA7C7778BD4E0B06B90A834B7BFB97BD804FE74B2033DB1EF3CBBCF0889FAEDD3D1285D33
3,145,150 UART: [art] SIG.S = 642BA659DECFC0CA7BA5E23CB0B477AA8937B11A4EB4C9CAD55193C25B9AC29A15E6A1E497BAC8E9FC814F50AB7CCC0F
3,168,890 UART: Caliptra RT
3,169,143 UART: [state] CFI Enabled
3,276,788 UART: [rt] RT listening for mailbox commands...
3,277,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,616 UART: [rt]cmd =0x44504543, len=96
3,487,994 >>> mbox cmd response data (6236 bytes)
3,487,995 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,988 UART: [rt]cmd =0x53574545, len=84
3,542,948 >>> mbox cmd response data (200 bytes)
3,542,949 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,360 UART: [rt]cmd =0x52564348, len=36
3,574,606 >>> mbox cmd response data (8 bytes)
3,574,607 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,604,470 UART: [rt]cmd =0x53574545, len=84
3,607,919 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,081 ready_for_fw is high
1,060,081 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,097 >>> mbox cmd response: success
2,689,529 UART:
2,689,545 UART: Running Caliptra FMC ...
2,689,953 UART:
2,690,007 UART: [state] CFI Enabled
2,700,274 UART: [fht] FMC Alias Private Key: 7
2,808,283 UART: [art] Extend RT PCRs Done
2,808,711 UART: [art] Lock RT PCRs Done
2,810,411 UART: [art] Populate DV Done
2,818,644 UART: [fht] FMC Alias Private Key: 7
2,819,586 UART: [art] Derive CDI
2,819,866 UART: [art] Store in in slot 0x4
2,905,227 UART: [art] Derive Key Pair
2,905,587 UART: [art] Store priv key in slot 0x5
2,918,811 UART: [art] Derive Key Pair - Done
2,933,296 UART: [art] Signing Cert with AUTHO
2,933,776 UART: RITY.KEYID = 7
2,948,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,467 UART: [art] PUB.X = BC579ACD401378176D2455AA509480E0D56E531FEB26D03DFEA64A857D5721E200D5F95458C3BF552C0B9F00FF38EFAF
2,956,200 UART: [art] PUB.Y = 1AD7006A33FAEF973256EC944B974BD211587DA8B324202F68FBC5DF279244D30D0E8214A81517CC5163BBC4075AC089
2,963,121 UART: [art] SIG.R = 9F74D314094E4EEFCB813BA39763ED84C1CE9293114683EEC54DFDF5AB5BCAA9EB127BC03E373EFAE4B702D7D6B1EEE6
2,969,911 UART: [art] SIG.S = 983B628422DF81231A36924450CDDE988FC4B1003F3F196114248B7521579FEDD3ED25202DBC80A8C3702034811EEB6B
2,993,924 UART: Caliptra RT
2,994,177 UART: [state] CFI Enabled
3,101,395 UART: [rt] RT listening for mailbox commands...
3,102,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,293 UART: [rt]cmd =0x44504543, len=96
3,311,602 >>> mbox cmd response data (6236 bytes)
3,311,603 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,342 UART: [rt]cmd =0x53574545, len=84
3,367,390 >>> mbox cmd response data (200 bytes)
3,367,391 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,840 UART: [rt]cmd =0x52564348, len=36
3,398,808 >>> mbox cmd response data (8 bytes)
3,398,809 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,934 UART: [rt]cmd =0x53574545, len=84
3,432,187 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
893,173 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,298 UART: [kat] ++
897,450 UART: [kat] sha1
901,638 UART: [kat] SHA2-256
903,578 UART: [kat] SHA2-384
906,285 UART: [kat] SHA2-512-ACC
908,186 UART: [kat] ECC-384
918,221 UART: [kat] HMAC-384Kdf
922,979 UART: [kat] LMS
1,171,307 UART: [kat] --
1,172,420 UART: [cold-reset] ++
1,172,962 UART: [fht] FHT @ 0x50003400
1,175,463 UART: [idev] ++
1,175,631 UART: [idev] CDI.KEYID = 6
1,175,991 UART: [idev] SUBJECT.KEYID = 7
1,176,415 UART: [idev] UDS.KEYID = 0
1,176,760 ready_for_fw is high
1,176,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,373 UART: [idev] Erasing UDS.KEYID = 0
1,201,636 UART: [idev] Sha1 KeyId Algorithm
1,210,032 UART: [idev] --
1,211,104 UART: [ldev] ++
1,211,272 UART: [ldev] CDI.KEYID = 6
1,211,635 UART: [ldev] SUBJECT.KEYID = 5
1,212,061 UART: [ldev] AUTHORITY.KEYID = 7
1,212,524 UART: [ldev] FE.KEYID = 1
1,217,858 UART: [ldev] Erasing FE.KEYID = 1
1,244,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,474 UART: [ldev] --
1,283,923 UART: [fwproc] Wait for Commands...
1,284,597 UART: [fwproc] Recv command 0x46574c44
1,285,325 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,649 >>> mbox cmd response: success
2,778,823 UART: [afmc] ++
2,778,991 UART: [afmc] CDI.KEYID = 6
2,779,353 UART: [afmc] SUBJECT.KEYID = 7
2,779,778 UART: [afmc] AUTHORITY.KEYID = 5
2,815,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,304 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,032 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,917 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,636 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,698 UART: [afmc] --
2,858,792 UART: [cold-reset] --
2,859,754 UART: [state] Locking Datavault
2,861,317 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,921 UART: [state] Locking ICCM
2,862,445 UART: [exit] Launching FMC @ 0x40000130
2,867,774 UART:
2,867,790 UART: Running Caliptra FMC ...
2,868,198 UART:
2,868,341 UART: [state] CFI Enabled
2,879,026 UART: [fht] FMC Alias Private Key: 7
2,987,001 UART: [art] Extend RT PCRs Done
2,987,429 UART: [art] Lock RT PCRs Done
2,988,867 UART: [art] Populate DV Done
2,996,992 UART: [fht] FMC Alias Private Key: 7
2,998,122 UART: [art] Derive CDI
2,998,402 UART: [art] Store in in slot 0x4
3,084,323 UART: [art] Derive Key Pair
3,084,683 UART: [art] Store priv key in slot 0x5
3,098,021 UART: [art] Derive Key Pair - Done
3,112,831 UART: [art] Signing Cert with AUTHO
3,113,311 UART: RITY.KEYID = 7
3,128,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,682 UART: [art] PUB.X = 7F36F246805DA8A55C06CCFA8814BDB81060B6581F7D754593CE7F40A3551C5FB0DE8561EB6F650AB36DB8CFD03DD0A0
3,136,460 UART: [art] PUB.Y = 5B2FE55BB3BB77FCF9496A8CFC093979576EA2CFB908059F45419BE0356F45776254C924530CC3F516B9E151411BB180
3,143,398 UART: [art] SIG.R = 1BBA575AD0956D3DD0D26029776A99DDF60B0C1F8A3D04AB595680F1C60C00353CC74C89BA6987623D2CB641D93CC3B1
3,150,142 UART: [art] SIG.S = 77A1BD8358BF297AEA463E5FC83CDB59E4481A23549FC4AB36D58381ED1AFD4EB78832C4B1EA8785ECA149DAAF16A597
3,173,605 UART: Caliptra RT
3,173,950 UART: [state] CFI Enabled
3,282,069 UART: [rt] RT listening for mailbox commands...
3,282,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,201 UART: [rt]cmd =0x44504543, len=96
3,492,729 >>> mbox cmd response data (6236 bytes)
3,492,730 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,645 UART: [rt]cmd =0x53574545, len=84
3,549,157 >>> mbox cmd response data (200 bytes)
3,549,158 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,797 UART: [rt]cmd =0x52564348, len=36
3,580,949 >>> mbox cmd response data (8 bytes)
3,580,950 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,911 UART: [rt]cmd =0x53574545, len=84
3,614,228 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,926 ready_for_fw is high
1,060,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,892 >>> mbox cmd response: success
2,689,486 UART:
2,689,502 UART: Running Caliptra FMC ...
2,689,910 UART:
2,690,053 UART: [state] CFI Enabled
2,700,606 UART: [fht] FMC Alias Private Key: 7
2,808,587 UART: [art] Extend RT PCRs Done
2,809,015 UART: [art] Lock RT PCRs Done
2,810,261 UART: [art] Populate DV Done
2,818,464 UART: [fht] FMC Alias Private Key: 7
2,819,630 UART: [art] Derive CDI
2,819,910 UART: [art] Store in in slot 0x4
2,906,155 UART: [art] Derive Key Pair
2,906,515 UART: [art] Store priv key in slot 0x5
2,919,507 UART: [art] Derive Key Pair - Done
2,934,322 UART: [art] Signing Cert with AUTHO
2,934,802 UART: RITY.KEYID = 7
2,949,474 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,239 UART: [art] PUB.X = 3CC2EB7936CBCCADCFA68C988E03432521D47528A58F5E2AC3C64790F252060D16D9A6FC7F48F60B738E44BC3E2469AC
2,957,009 UART: [art] PUB.Y = 7D33C81DBAC8EF00E28CC2A5B3B660E563E14180AB4E1E555AD3949323191A039091D2831D0ABC112F03292855D0489B
2,963,928 UART: [art] SIG.R = DBC24F29B2F0DB362F30BBB0C5514CB37FBA099A47532FCC5929017A0DDDE84BEBAA01D3AA9D6D07B8503B5861110E99
2,970,698 UART: [art] SIG.S = 39ACBCA66B6DCB4A9155A3343812950512B5E5407D133FA4B8E51028170E84C5B1C580799D5814AA9ADAE2777F6752C6
2,994,307 UART: Caliptra RT
2,994,652 UART: [state] CFI Enabled
3,102,901 UART: [rt] RT listening for mailbox commands...
3,103,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,021 UART: [rt]cmd =0x44504543, len=96
3,314,432 >>> mbox cmd response data (6236 bytes)
3,314,433 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,338 UART: [rt]cmd =0x53574545, len=84
3,370,248 >>> mbox cmd response data (200 bytes)
3,370,249 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,782 UART: [rt]cmd =0x52564348, len=36
3,401,928 >>> mbox cmd response data (8 bytes)
3,401,929 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,758 UART: [rt]cmd =0x53574545, len=84
3,434,563 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,666 UART: [state] LifecycleState = Unprovisioned
86,321 UART: [state] DebugLocked = No
86,981 UART: [state] WD Timer not started. Device not locked for debugging
88,130 UART: [kat] SHA2-256
891,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,809 UART: [kat] ++
895,961 UART: [kat] sha1
900,277 UART: [kat] SHA2-256
902,217 UART: [kat] SHA2-384
905,094 UART: [kat] SHA2-512-ACC
906,995 UART: [kat] ECC-384
916,830 UART: [kat] HMAC-384Kdf
921,440 UART: [kat] LMS
1,169,752 UART: [kat] --
1,170,657 UART: [cold-reset] ++
1,171,127 UART: [fht] FHT @ 0x50003400
1,173,829 UART: [idev] ++
1,173,997 UART: [idev] CDI.KEYID = 6
1,174,358 UART: [idev] SUBJECT.KEYID = 7
1,174,783 UART: [idev] UDS.KEYID = 0
1,175,129 ready_for_fw is high
1,175,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,883 UART: [idev] Erasing UDS.KEYID = 0
1,199,915 UART: [idev] Sha1 KeyId Algorithm
1,208,837 UART: [idev] --
1,209,880 UART: [ldev] ++
1,210,048 UART: [ldev] CDI.KEYID = 6
1,210,412 UART: [ldev] SUBJECT.KEYID = 5
1,210,839 UART: [ldev] AUTHORITY.KEYID = 7
1,211,302 UART: [ldev] FE.KEYID = 1
1,216,420 UART: [ldev] Erasing FE.KEYID = 1
1,243,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,792 UART: [ldev] --
1,282,298 UART: [fwproc] Wait for Commands...
1,282,901 UART: [fwproc] Recv command 0x46574c44
1,283,634 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,976 >>> mbox cmd response: success
2,775,997 UART: [afmc] ++
2,776,165 UART: [afmc] CDI.KEYID = 6
2,776,528 UART: [afmc] SUBJECT.KEYID = 7
2,776,954 UART: [afmc] AUTHORITY.KEYID = 5
2,812,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,535 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,137 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,968 UART: [afmc] --
2,855,864 UART: [cold-reset] --
2,856,660 UART: [state] Locking Datavault
2,857,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,537 UART: [state] Locking ICCM
2,859,131 UART: [exit] Launching FMC @ 0x40000130
2,864,460 UART:
2,864,476 UART: Running Caliptra FMC ...
2,864,884 UART:
2,864,938 UART: [state] CFI Enabled
2,875,237 UART: [fht] FMC Alias Private Key: 7
2,983,614 UART: [art] Extend RT PCRs Done
2,984,042 UART: [art] Lock RT PCRs Done
2,985,514 UART: [art] Populate DV Done
2,993,823 UART: [fht] FMC Alias Private Key: 7
2,994,845 UART: [art] Derive CDI
2,995,125 UART: [art] Store in in slot 0x4
3,080,634 UART: [art] Derive Key Pair
3,080,994 UART: [art] Store priv key in slot 0x5
3,094,222 UART: [art] Derive Key Pair - Done
3,109,426 UART: [art] Signing Cert with AUTHO
3,109,906 UART: RITY.KEYID = 7
3,125,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,887 UART: [art] PUB.X = 9AB6366A17C8C2A1AD0412639BCCAB9C842A5F0C2AC16DBEB19D84B32E46FDEC0FFAB842840A2F65D7170B24302D03A6
3,132,657 UART: [art] PUB.Y = 7AA72A564585906201D1EB43F5A8DEDD1D7B9D52B2EE6F030306AA831BB08B56666E651067389E0EC1B03C71C641DCD6
3,139,598 UART: [art] SIG.R = 978F89D6BE48BBAFCEB8D2EDCC887AC4A43D682D161215AFD8667906289C5FC8D6EEAA34860AB0F45EFAEBF0CA91829D
3,146,388 UART: [art] SIG.S = FF1D9D6DC77ECBDB6A1EC37440B8BF4CEAE716777A57F033DC589A8A4F82CFD3C2C6207257DAFDC2CA677DEFBECF37A4
3,170,151 UART: Caliptra RT
3,170,404 UART: [state] CFI Enabled
3,278,286 UART: [rt] RT listening for mailbox commands...
3,278,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,388 UART: [rt]cmd =0x44504543, len=96
3,489,434 >>> mbox cmd response data (6236 bytes)
3,489,435 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,404 UART: [rt]cmd =0x53574545, len=84
3,544,300 >>> mbox cmd response data (200 bytes)
3,544,301 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,124 UART: [rt]cmd =0x52564348, len=36
3,576,510 >>> mbox cmd response data (8 bytes)
3,576,511 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,434 UART: [rt]cmd =0x53574545, len=84
3,609,071 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,976 ready_for_fw is high
1,055,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,630 >>> mbox cmd response: success
2,684,874 UART:
2,684,890 UART: Running Caliptra FMC ...
2,685,298 UART:
2,685,352 UART: [state] CFI Enabled
2,696,231 UART: [fht] FMC Alias Private Key: 7
2,804,310 UART: [art] Extend RT PCRs Done
2,804,738 UART: [art] Lock RT PCRs Done
2,806,670 UART: [art] Populate DV Done
2,815,095 UART: [fht] FMC Alias Private Key: 7
2,816,157 UART: [art] Derive CDI
2,816,437 UART: [art] Store in in slot 0x4
2,902,472 UART: [art] Derive Key Pair
2,902,832 UART: [art] Store priv key in slot 0x5
2,916,096 UART: [art] Derive Key Pair - Done
2,930,621 UART: [art] Signing Cert with AUTHO
2,931,101 UART: RITY.KEYID = 7
2,946,039 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,804 UART: [art] PUB.X = 7C113C6BC3FBCC203770F66BEF4EE4BDE900491C947394577FE9991484215FB2664E97ACB136E5033A170A65BD7CD641
2,953,550 UART: [art] PUB.Y = 0AF308D1199767D5CE51ADC5D6A63069F973339830A42B985B6732ED04BAAEF93831139460088F1AE13A1C73451556BE
2,960,484 UART: [art] SIG.R = A2B8FF2B803AEAC8E926FBD3C4C329D3547A3AFC2CDD674DDE00D28F8F907A7B830E60210BF5F91B7D8DD22732860342
2,967,239 UART: [art] SIG.S = 56076554D17724931CDDC755A2179DA1578EB6A11691D484B859A87AC854EE2912A576919E222BB0AC092E1D85E7BFA2
2,990,976 UART: Caliptra RT
2,991,229 UART: [state] CFI Enabled
3,099,322 UART: [rt] RT listening for mailbox commands...
3,099,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,520 UART: [rt]cmd =0x44504543, len=96
3,311,173 >>> mbox cmd response data (6236 bytes)
3,311,174 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,955 UART: [rt]cmd =0x53574545, len=84
3,366,773 >>> mbox cmd response data (200 bytes)
3,366,774 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,333 UART: [rt]cmd =0x52564348, len=36
3,398,689 >>> mbox cmd response data (8 bytes)
3,398,690 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,789 UART: [rt]cmd =0x53574545, len=84
3,431,906 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
87,096 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [kat] SHA2-256
891,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,106 UART: [kat] ++
896,258 UART: [kat] sha1
900,558 UART: [kat] SHA2-256
902,498 UART: [kat] SHA2-384
905,211 UART: [kat] SHA2-512-ACC
907,112 UART: [kat] ECC-384
916,959 UART: [kat] HMAC-384Kdf
921,507 UART: [kat] LMS
1,169,819 UART: [kat] --
1,170,644 UART: [cold-reset] ++
1,171,166 UART: [fht] FHT @ 0x50003400
1,173,826 UART: [idev] ++
1,173,994 UART: [idev] CDI.KEYID = 6
1,174,355 UART: [idev] SUBJECT.KEYID = 7
1,174,780 UART: [idev] UDS.KEYID = 0
1,175,126 ready_for_fw is high
1,175,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,724 UART: [idev] Erasing UDS.KEYID = 0
1,200,098 UART: [idev] Sha1 KeyId Algorithm
1,209,030 UART: [idev] --
1,210,091 UART: [ldev] ++
1,210,259 UART: [ldev] CDI.KEYID = 6
1,210,623 UART: [ldev] SUBJECT.KEYID = 5
1,211,050 UART: [ldev] AUTHORITY.KEYID = 7
1,211,513 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,243,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,851 UART: [ldev] --
1,283,359 UART: [fwproc] Wait for Commands...
1,284,104 UART: [fwproc] Recv command 0x46574c44
1,284,837 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,749 >>> mbox cmd response: success
2,778,820 UART: [afmc] ++
2,778,988 UART: [afmc] CDI.KEYID = 6
2,779,351 UART: [afmc] SUBJECT.KEYID = 7
2,779,777 UART: [afmc] AUTHORITY.KEYID = 5
2,815,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,367 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,889 UART: [afmc] --
2,858,971 UART: [cold-reset] --
2,859,517 UART: [state] Locking Datavault
2,860,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,180 UART: [state] Locking ICCM
2,861,786 UART: [exit] Launching FMC @ 0x40000130
2,867,115 UART:
2,867,131 UART: Running Caliptra FMC ...
2,867,539 UART:
2,867,682 UART: [state] CFI Enabled
2,878,345 UART: [fht] FMC Alias Private Key: 7
2,986,736 UART: [art] Extend RT PCRs Done
2,987,164 UART: [art] Lock RT PCRs Done
2,988,806 UART: [art] Populate DV Done
2,997,047 UART: [fht] FMC Alias Private Key: 7
2,998,159 UART: [art] Derive CDI
2,998,439 UART: [art] Store in in slot 0x4
3,083,988 UART: [art] Derive Key Pair
3,084,348 UART: [art] Store priv key in slot 0x5
3,097,524 UART: [art] Derive Key Pair - Done
3,112,607 UART: [art] Signing Cert with AUTHO
3,113,087 UART: RITY.KEYID = 7
3,128,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,222 UART: [art] PUB.X = 3196E1D7DEDDDFF50EB869725FA9919AD5731DB682C423D9BB06FBEB52AD3B253BF65E7C9A91CDF229A1189EA090D52B
3,136,006 UART: [art] PUB.Y = F696AEB674C2DC6AF61E37610C2D4BDB750920534F2A9C53F75413A1E6E39AF0AF27A9C6AB1CB2DF91ADDFB11E92FBB3
3,142,974 UART: [art] SIG.R = A174DD4FF91442E6653ECEA6246688353363B7EC1F3109D76F693209CCE997E6C4E07286F95C1B33730A9D4FF716B458
3,149,733 UART: [art] SIG.S = 15E5890DC7C7D93FD14F96AFEC7D0419EE2BE7B222F309A920248BA33FB8E2955D5EBE8A8E11F1F151EC658B602DE495
3,173,747 UART: Caliptra RT
3,174,092 UART: [state] CFI Enabled
3,282,079 UART: [rt] RT listening for mailbox commands...
3,282,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,887 UART: [rt]cmd =0x44504543, len=96
3,493,799 >>> mbox cmd response data (6236 bytes)
3,493,800 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,343 UART: [rt]cmd =0x53574545, len=84
3,549,575 >>> mbox cmd response data (200 bytes)
3,549,576 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,223 UART: [rt]cmd =0x52564348, len=36
3,581,641 >>> mbox cmd response data (8 bytes)
3,581,642 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,595 UART: [rt]cmd =0x53574545, len=84
3,614,514 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,973 ready_for_fw is high
1,056,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,775 >>> mbox cmd response: success
2,686,889 UART:
2,686,905 UART: Running Caliptra FMC ...
2,687,313 UART:
2,687,456 UART: [state] CFI Enabled
2,697,939 UART: [fht] FMC Alias Private Key: 7
2,805,330 UART: [art] Extend RT PCRs Done
2,805,758 UART: [art] Lock RT PCRs Done
2,807,674 UART: [art] Populate DV Done
2,815,867 UART: [fht] FMC Alias Private Key: 7
2,816,925 UART: [art] Derive CDI
2,817,205 UART: [art] Store in in slot 0x4
2,902,532 UART: [art] Derive Key Pair
2,902,892 UART: [art] Store priv key in slot 0x5
2,915,844 UART: [art] Derive Key Pair - Done
2,930,537 UART: [art] Signing Cert with AUTHO
2,931,017 UART: RITY.KEYID = 7
2,945,633 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,398 UART: [art] PUB.X = 72488142651BA96F242975D1E6993E802C1DE5EC4FF6C7D04115A74745723E27BBDD03208328D2D740A629794D6B1526
2,953,155 UART: [art] PUB.Y = 9993530E91C8410C3197D873994A69DF0C7688DC7BDF77DB8EA9A267C0A10B398CE99A33BBDA137024D7FCC937730602
2,960,089 UART: [art] SIG.R = 5F0775646A05EA6F665C8E088727F0220E8024C7BA3E8776024D317BED547424F7B8AD21310F8A650486AE0C906A8349
2,966,827 UART: [art] SIG.S = A088F77A18B6279174AEC4F9EDCC9C15BCB12D5E9B23DF62D8116FFF76B01DD8E075B1D9A207459697C73D7E38FB2109
2,990,562 UART: Caliptra RT
2,990,907 UART: [state] CFI Enabled
3,098,830 UART: [rt] RT listening for mailbox commands...
3,099,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,946 UART: [rt]cmd =0x44504543, len=96
3,310,580 >>> mbox cmd response data (6236 bytes)
3,310,581 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,364 UART: [rt]cmd =0x53574545, len=84
3,366,946 >>> mbox cmd response data (200 bytes)
3,366,947 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,610 UART: [rt]cmd =0x52564348, len=36
3,399,122 >>> mbox cmd response data (8 bytes)
3,399,123 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,960 UART: [rt]cmd =0x53574545, len=84
3,431,867 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
Truncated 2675 bytes from beginning
ceived command 0x46574c44
13,141,193 UART: [fwproc] Received Image of size 78740 bytes
16,761,931 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,831,167 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,900,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,094,097 >>> mbox cmd response: success
17,094,684 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,097,657 UART: [afmc] ++
17,098,249 UART: [afmc] CDI.KEYID = 6
17,099,232 UART: [afmc] SUBJECT.KEYID = 7
17,100,454 UART: [afmc] AUTHORITY.KEYID = 5
20,454,636 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,753,847 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,756,105 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,770,563 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,785,376 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,799,773 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,820,790 UART: [afmc] --
22,823,903 UART: [cold-reset] --
22,828,308 UART: [state] Locking Datavault
22,834,584 UART: [state] Locking PCR0, PCR1 and PCR31
22,836,288 UART: [state] Locking ICCM
22,837,471 UART: [exit] Launching FMC @ 0x40000130
22,845,868 UART:
22,846,107 UART: Running Caliptra FMC ...
22,847,212 UART:
22,847,371 UART: [state] CFI Enabled
22,914,566 UART: [fht] FMC Alias Private Key: 7
25,252,716 UART: [art] Extend RT PCRs Done
25,253,936 UART: [art] Lock RT PCRs Done
25,255,715 UART: [art] Populate DV Done
25,260,985 UART: [fht] FMC Alias Private Key: 7
25,262,527 UART: [art] Derive CDI
25,263,340 UART: [art] Store in in slot 0x4
25,323,597 UART: [art] Derive Key Pair
25,324,601 UART: [art] Store priv key in slot 0x5
28,617,428 UART: [art] Derive Key Pair - Done
28,630,800 UART: [art] Signing Cert with AUTHO
28,632,101 UART: RITY.KEYID = 7
30,919,410 UART: [art] Erasing AUTHORITY.KEYID = 7
30,920,928 UART: [art] PUB.X = 636DE99EB340A2D9277D8E8F3FCF1C058D8353E1106EC588106DC6E27B8B52BB04ECF50E555B50453B9A9A5F5CA976B4
30,928,115 UART: [art] PUB.Y = 89B95929D7BBF37A35E6EA68312FFE8DE33728E9A287B9ADF29391270AF05AC8F456CD12B0A31417AF714A900E1C34FB
30,935,395 UART: [art] SIG.R = 166AB3F3F33F0ADBDE0BF06DF6F768155D383089FD3D8C3EE2C5D9F66A9DBD5B99168B555A8127F3EE2B3457D74B5B4D
30,942,794 UART: [art] SIG.S = A638B9585CAFB3EBD074D48A1B5C0152300F2E5D172F0539D7B10570983C62459894FB22C51DC2AC19F0799A8043A5D6
32,247,175 UART: mbox::rt_entry...
32,248,123 UART: ____ _ _ _ ____ _____
32,250,050 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,252,081 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,253,942 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,255,870 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,257,728 UART: |_|
32,258,611 UART:
32,372,498 UART: [rt] Runtime listening for mailbox commands...
32,374,682 >>> mbox cmd response data (48 bytes)
34,508,402 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,652,776 UART:
34,653,168 UART: Running Caliptra ROM ...
34,654,240 UART:
34,654,395 UART: [state] CFI Enabled
34,716,752 UART: [state] LifecycleState = Unprovisioned
34,718,692 UART: [state] DebugLocked = No
34,721,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,725,924 UART: [kat] SHA2-256
34,895,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,906,094 UART: [kat] ++
34,906,560 UART: [kat] sha1
34,916,581 UART: [kat] SHA2-256
34,919,273 UART: [kat] SHA2-384
34,924,882 UART: [kat] SHA2-512-ACC
34,927,237 UART: [kat] ECC-384
37,219,719 UART: [kat] HMAC-384Kdf
37,252,738 UART: [kat] LMS
38,443,106 UART: [kat] --
38,448,950 UART: [update-reset] ++
42,587,710 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,590,616 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,972,916 >>> mbox cmd response: success
42,973,311 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,974,320 UART: [update-reset] Copying MAN_2 To MAN_1
42,996,773 UART: [update-reset Success] --
43,000,522 UART: [state] Locking Datavault
43,003,459 UART: [state] Locking PCR0, PCR1 and PCR31
43,005,255 UART: [state] Locking ICCM
43,006,882 UART: [exit] Launching FMC @ 0x40000130
43,015,290 UART:
43,015,545 UART: Running Caliptra FMC ...
43,016,656 UART:
43,016,828 UART: [state] CFI Enabled
43,110,700 UART: [art] Extend RT PCRs Done
43,111,899 UART: [art] Lock RT PCRs Done
43,113,463 UART: [art] Populate DV Done
43,118,975 UART: [fht] FMC Alias Private Key: 7
43,120,456 UART: [art] Derive CDI
43,121,215 UART: [art] Store in in slot 0x4
43,180,008 UART: [art] Derive Key Pair
43,181,047 UART: [art] Store priv key in slot 0x5
46,474,302 UART: [art] Derive Key Pair - Done
46,487,620 UART: [art] Signing Cert with AUTHO
46,488,925 UART: RITY.KEYID = 7
48,775,871 UART: [art] Erasing AUTHORITY.KEYID = 7
48,777,385 UART: [art] PUB.X = 0395A67D37863557CFDEB0325B2775D46F7D596DEFD4077E722D364AE5EAB7C920AB4A5F9A2E9458C77F7CD4941F865C
48,784,684 UART: [art] PUB.Y = 4449B8B801224B5AB8E62A0315A93AAFC1C1C9DB5CAF1C8B354AAD5AB98C8D65CA34F9DC189C7174BC74ABDD076D16A9
48,791,923 UART: [art] SIG.R = 3C66D577751BA41583E624BB5CA33A5DB11874816FA37410F1378D5C334CE9C1082BFADCB8700B65FB4A919F587F3F58
48,799,261 UART: [art] SIG.S = 7C7F018D0403D105A1DBE5BD62A4799E366921699CEE82F1702DB2E8488FD154B7BAA0BD8A4205D4E6F399F6B4059C90
50,104,950 UART: Caliptra RT
50,105,684 UART: [state] CFI Enabled
50,433,668 UART: [rt] RT listening for mailbox commands...
50,465,945 UART: [rt]cmd =0x4d454153, len=108
50,484,903 >>> mbox cmd response data (12 bytes)
52,604,239 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,704,858 UART:
52,705,225 UART: Running Caliptra ROM ...
52,706,351 UART:
52,706,539 UART: [state] CFI Enabled
52,767,203 UART: [state] LifecycleState = Unprovisioned
52,769,263 UART: [state] DebugLocked = No
52,771,142 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,776,151 UART: [kat] SHA2-256
52,945,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,956,312 UART: [kat] ++
52,956,860 UART: [kat] sha1
52,967,422 UART: [kat] SHA2-256
52,970,107 UART: [kat] SHA2-384
52,976,629 UART: [kat] SHA2-512-ACC
52,978,978 UART: [kat] ECC-384
55,269,913 UART: [kat] HMAC-384Kdf
55,301,153 UART: [kat] LMS
56,491,471 UART: [kat] --
56,496,505 UART: [update-reset] ++
60,206,995 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,209,877 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
60,468,319 >>> mbox cmd response: success
62,588,638 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
62,688,155 UART: [update-reset] Copying MAN_2 To MAN_1
62,690,002 UART: [update-reset Success] --
62,691,177 UART: [state] Locking Datavault
62,692,333 UART: [state] Locking PCR0, PCR1 and PCR31
62,693,881 UART: [state] Locking ICCM
62,694,775 UART: [exit] Launching FMC @ 0x40000130
62,696,123 UART:
62,696,268 UART: Running Caliptra FMC ...
62,697,367 UART:
62,697,526 UART: [state] CFI Enabled
62,698,441 UART: [art] Extend RT PCRs Done
62,699,582 UART: [art] Lock RT PCRs Done
62,700,646 UART: [art] Populate DV Done
62,701,676 UART: [fht] FMC Alias Private Key: 7
62,702,987 UART: [art] Derive CDI
62,703,749 UART: [art] Store in in slot 0x4
62,704,917 UART: [art] Derive Key Pair
62,705,909 UART: [art] Store priv key in slot 0x5
63,964,989 UART: [art] Derive Key Pair - Done
63,977,958 UART: [art] Signing Cert with AUTHO
63,979,279 UART: RITY.KEYID = 7
66,266,049 UART: [art] Erasing AUTHORITY.KEYID = 7
66,267,566 UART: [art] PUB.X = 531451AAED598E302336DF8F1B4C03A1E7B6D4D832FB9D232004AC1BE604D263C7C85E54724179C323F16E34B1B85820
66,274,825 UART: [art] PUB.Y = 3C6C41D87ADA6D83A19FAA49EE729C99D9B34D542483EE6880F158D6D1C056837716F6317A93B675381F3E123CC28C4C
66,282,054 UART: [art] SIG.R = CA9DA79D24013F8632F920536459C775364241A56B2A16DC4337BFA12C063DC752CD0CAADC38624B8F6C26AB56F50FC5
66,289,439 UART: [art] SIG.S = 61E3C64ADE8FBC983213F53171F749152C3CBCC3B7A25802C1312292D0E36EF329ED472FC311B12546601DF7A8FE7ECC
67,593,830 UART: mbox::rt_entry...
67,594,782 UART: ____ _ _ _ ____ _____
67,596,809 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,598,826 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,600,762 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,602,641 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,604,489 UART: |_|
67,605,315 UART:
67,888,909 UART: [rt] Runtime listening for mailbox commands...
67,890,862 UART:
67,891,028 UART: Running Caliptra ROM ...
67,892,142 UART:
67,892,303 UART: [state] CFI Enabled
67,951,617 UART: [state] LifecycleState = Unprovisioned
67,953,510 UART: [state] DebugLocked = No
67,955,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,961,372 UART: [kat] SHA2-256
68,131,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,141,543 UART: [kat] ++
68,142,000 UART: [kat] sha1
68,153,164 UART: [kat] SHA2-256
68,155,816 UART: [kat] SHA2-384
68,162,398 UART: [kat] SHA2-512-ACC
68,164,760 UART: [kat] ECC-384
70,452,622 UART: [kat] HMAC-384Kdf
70,486,831 UART: [kat] LMS
71,677,191 UART: [kat] --
71,681,625 UART: [update-reset] ++
75,389,544 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,393,818 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
75,652,223 >>> mbox cmd response: success
75,652,588 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,652,941 UART: [update-reset] Copying MAN_2 To MAN_1
75,675,382 UART: [update-reset Success] --
75,680,431 UART: [state] Locking Datavault
75,684,820 UART: [state] Locking PCR0, PCR1 and PCR31
75,686,576 UART: [state] Locking ICCM
75,687,937 UART: [exit] Launching FMC @ 0x40000130
75,696,397 UART:
75,696,630 UART: Running Caliptra FMC ...
75,697,736 UART:
75,697,895 UART: [state] CFI Enabled
75,787,392 UART: [art] Extend RT PCRs Done
75,788,567 UART: [art] Lock RT PCRs Done
75,789,855 UART: [art] Populate DV Done
75,795,314 UART: [fht] FMC Alias Private Key: 7
75,797,021 UART: [art] Derive CDI
75,797,840 UART: [art] Store in in slot 0x4
75,856,804 UART: [art] Derive Key Pair
75,857,848 UART: [art] Store priv key in slot 0x5
79,150,865 UART: [art] Derive Key Pair - Done
79,164,178 UART: [art] Signing Cert with AUTHO
79,165,477 UART: RITY.KEYID = 7
81,452,409 UART: [art] Erasing AUTHORITY.KEYID = 7
81,453,908 UART: [art] PUB.X = 55A2BB0513E5AA30D20B946DA5589C27C10D3B0EEC250077AB196EAE10B8D8793DAC8060DF8463F19406FC8452B1ED94
81,461,158 UART: [art] PUB.Y = DE48E85D3119D1D2A5874149F3D3EDBDFFAFEF4750BB6BC2DB5ABCF319A3D3CFA130B4F5C7E0D56184D80EA59FDDA520
81,468,454 UART: [art] SIG.R = 7C3CDB55FEA2DF6691A98BD088963A4B9DDA1326DE4569BF67990D948A99508906677A877BB2EC2DC0980384E9CEC2FB
81,475,853 UART: [art] SIG.S = 6200890884FB1F1DA1185C8B90F05D05135F5A8DC652773CD82BA30F355F7D7A6F20EE751FE39B6CE265BE1E7A2287F3
82,780,521 UART: mbox::rt_entry...
82,781,485 UART: ____ _ _ _ ____ _____
82,783,503 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,785,466 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,787,402 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,789,259 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,791,183 UART: |_|
82,791,996 UART:
83,075,056 UART: [rt] Runtime listening for mailbox commands...
83,077,240 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,808,098 ready_for_fw is high
3,808,518 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,163,339 >>> mbox cmd response: success
17,164,042 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,865,647 UART:
22,866,472 UART: Running Caliptra FMC ...
22,867,612 UART:
22,867,772 UART: [state] CFI Enabled
22,932,352 UART: [fht] FMC Alias Private Key: 7
25,269,665 UART: [art] Extend RT PCRs Done
25,270,889 UART: [art] Lock RT PCRs Done
25,272,947 UART: [art] Populate DV Done
25,278,483 UART: [fht] FMC Alias Private Key: 7
25,279,928 UART: [art] Derive CDI
25,280,700 UART: [art] Store in in slot 0x4
25,341,404 UART: [art] Derive Key Pair
25,342,447 UART: [art] Store priv key in slot 0x5
28,635,312 UART: [art] Derive Key Pair - Done
28,648,096 UART: [art] Signing Cert with AUTHO
28,649,408 UART: RITY.KEYID = 7
30,936,873 UART: [art] Erasing AUTHORITY.KEYID = 7
30,938,378 UART: [art] PUB.X = 07958D4962299FB24C06D44CF22BA125DACA860B0ED54C69D6440CC31731D808993AA61476CC49F487DC8A3403A24CAB
30,945,657 UART: [art] PUB.Y = 3573DC036BDBC4D8AC9267AAC2A61F8AB4434188D96EFA8CFBA10921E3D29A17E34B963FBC909F1F8BE2D57BD3BEF2F2
30,952,907 UART: [art] SIG.R = 59016A2359C4E6904062F853896A5F55F6463B31B2645C6EE822F27A00F61C9939605BFBCB1A08E49EF4EA0A33FE082A
30,960,278 UART: [art] SIG.S = FB06E032C402D1C06E446C32ABE04198B348C307B6B7DC027F3868710DA4F900ABA4C82A2645FED6E304FD5EB7FDEFA8
32,264,990 UART: mbox::rt_entry...
32,265,948 UART: ____ _ _ _ ____ _____
32,267,912 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,269,925 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,271,789 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,273,755 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,275,637 UART: |_|
32,276,523 UART:
32,390,073 UART: [rt] Runtime listening for mailbox commands...
32,392,199 >>> mbox cmd response data (48 bytes)
34,525,223 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,256,929 >>> mbox cmd response: success
43,257,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,290,567 UART:
43,290,867 UART: Running Caliptra FMC ...
43,291,993 UART:
43,292,158 UART: [state] CFI Enabled
43,378,841 UART: [art] Extend RT PCRs Done
43,380,040 UART: [art] Lock RT PCRs Done
43,381,616 UART: [art] Populate DV Done
43,387,459 UART: [fht] FMC Alias Private Key: 7
43,388,995 UART: [art] Derive CDI
43,389,810 UART: [art] Store in in slot 0x4
43,448,498 UART: [art] Derive Key Pair
43,449,502 UART: [art] Store priv key in slot 0x5
46,741,704 UART: [art] Derive Key Pair - Done
46,754,865 UART: [art] Signing Cert with AUTHO
46,756,177 UART: RITY.KEYID = 7
49,043,084 UART: [art] Erasing AUTHORITY.KEYID = 7
49,044,608 UART: [art] PUB.X = 6E30451A50428C63A6455D47904818F23EEF95837B427A97D18DDEA7A1FA91FF4126B45E5F4A3C665763FEB3DE4E5627
49,051,857 UART: [art] PUB.Y = 4291D76943DE47A9CA2D137AD03E1DE18D9249CCECBE0F7FA2A7DD2A2F745C4EA21EE94DAD52E20BCEB48A17101BEB14
49,059,152 UART: [art] SIG.R = 0304B65D1C55A2C6B3861156CDE1A8944A0B75B94EB942F8FE1DD4064C5A525831E00A089883693C9B3FBBC11D777269
49,066,475 UART: [art] SIG.S = 4346CCE7E3C85DB5F879220F43C9EF088150AF6E2642DEB96D8A5E1AB63D1F2E218AE5F87EFE62CD6733CF52000CD998
50,371,599 UART: Caliptra RT
50,372,297 UART: [state] CFI Enabled
50,706,646 UART: [rt] RT listening for mailbox commands...
50,739,056 UART: [rt]cmd =0x4d454153, len=108
50,756,912 >>> mbox cmd response data (12 bytes)
52,878,051 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,854,839 >>> mbox cmd response: success
62,973,353 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
63,073,049 UART:
63,073,422 UART: Running Caliptra FMC ...
63,074,556 UART:
63,074,737 UART: [state] CFI Enabled
63,075,672 UART: [art] Extend RT PCRs Done
63,076,818 UART: [art] Lock RT PCRs Done
63,077,886 UART: [art] Populate DV Done
63,078,924 UART: [fht] FMC Alias Private Key: 7
63,080,252 UART: [art] Derive CDI
63,080,997 UART: [art] Store in in slot 0x4
63,082,170 UART: [art] Derive Key Pair
63,083,121 UART: [art] Store priv key in slot 0x5
64,357,926 UART: [art] Derive Key Pair - Done
64,371,146 UART: [art] Signing Cert with AUTHO
64,372,457 UART: RITY.KEYID = 7
66,660,335 UART: [art] Erasing AUTHORITY.KEYID = 7
66,661,855 UART: [art] PUB.X = 4F85045BBEC1D512718DB30C3B03C0B037A5EBE411EEFDA319B888C70CCE98DD28B46D66A7C7C6A903387FAA0194F317
66,669,078 UART: [art] PUB.Y = 55CF1E13BE66F47623C41B99C82EB812E82842D4F361C4DD1C1F407B7D4042647A54E03BE1AF2711C276ACF748A973F1
66,676,359 UART: [art] SIG.R = DA81418BB86D8101C8DEEA6698678053037C53C0F9F4CB21DE97CDF19619016814A6E6B0E1273F4A3F25B34303A5C90A
66,683,694 UART: [art] SIG.S = 16F7D53B1CF0FA0A54A2E053811B005B4B7A22E8E77B93A97751D353B2D53CDB5315621BDCD420C667B2939D2AF8A274
67,988,041 UART: mbox::rt_entry...
67,989,009 UART: ____ _ _ _ ____ _____
67,991,001 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,993,015 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,994,952 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,996,885 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,998,742 UART: |_|
67,999,603 UART:
68,286,388 UART: [rt] Runtime listening for mailbox commands...
76,134,367 >>> mbox cmd response: success
76,134,757 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
76,167,641 UART:
76,167,900 UART: Running Caliptra FMC ...
76,169,010 UART:
76,169,175 UART: [state] CFI Enabled
76,266,422 UART: [art] Extend RT PCRs Done
76,267,615 UART: [art] Lock RT PCRs Done
76,269,023 UART: [art] Populate DV Done
76,274,498 UART: [fht] FMC Alias Private Key: 7
76,276,034 UART: [art] Derive CDI
76,276,855 UART: [art] Store in in slot 0x4
76,335,819 UART: [art] Derive Key Pair
76,336,820 UART: [art] Store priv key in slot 0x5
79,629,682 UART: [art] Derive Key Pair - Done
79,642,574 UART: [art] Signing Cert with AUTHO
79,643,884 UART: RITY.KEYID = 7
81,930,941 UART: [art] Erasing AUTHORITY.KEYID = 7
81,932,468 UART: [art] PUB.X = 040D296318661010A265A8015839F84A76FE7F9C90E73784EB25355FAAEC52EF2C843791541B1D1AA776333106DC8C43
81,939,935 UART: [art] PUB.Y = 9D4B3F2AD7D65616A9C617861B001ACD87108D5260B1CBC7112F7AEA95F32DACC772A245109E8922ADBB729072D25125
81,946,886 UART: [art] SIG.R = 72446290E9B1B21078EF3704CDB90E539B32EA0C09CE0775FFBBB66F26EE49E056A79B09409632084EED294F970C10BD
81,954,305 UART: [art] SIG.S = F63994C3860FC0315AD650A7B28899F4EE76A0078217ADBE76AF41FDAABBAF8CD2406B3A20A3388D85749A80C629454F
83,258,936 UART: mbox::rt_entry...
83,259,882 UART: ____ _ _ _ ____ _____
83,261,927 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,263,938 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,265,865 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,267,793 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,269,720 UART: |_|
83,270,557 UART:
83,553,651 UART: [rt] Runtime listening for mailbox commands...
83,555,821 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.30s
Truncated 2675 bytes from beginning
ceived command 0x46574c44
13,313,580 UART: [fwproc] Received Image of size 78740 bytes
16,929,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,005,060 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,073,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,267,266 >>> mbox cmd response: success
17,267,747 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,272,200 UART: [afmc] ++
17,272,781 UART: [afmc] CDI.KEYID = 6
17,273,743 UART: [afmc] SUBJECT.KEYID = 7
17,274,974 UART: [afmc] AUTHORITY.KEYID = 5
20,588,680 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,882,642 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,884,953 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,899,326 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,914,112 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,928,568 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,950,918 UART: [afmc] --
22,954,561 UART: [cold-reset] --
22,958,472 UART: [state] Locking Datavault
22,964,753 UART: [state] Locking PCR0, PCR1 and PCR31
22,966,543 UART: [state] Locking ICCM
22,968,153 UART: [exit] Launching FMC @ 0x40000130
22,976,493 UART:
22,976,721 UART: Running Caliptra FMC ...
22,977,819 UART:
22,977,990 UART: [state] CFI Enabled
22,986,413 UART: [fht] FMC Alias Private Key: 7
25,317,323 UART: [art] Extend RT PCRs Done
25,318,544 UART: [art] Lock RT PCRs Done
25,320,164 UART: [art] Populate DV Done
25,325,518 UART: [fht] FMC Alias Private Key: 7
25,327,170 UART: [art] Derive CDI
25,327,984 UART: [art] Store in in slot 0x4
25,370,747 UART: [art] Derive Key Pair
25,371,788 UART: [art] Store priv key in slot 0x5
28,613,439 UART: [art] Derive Key Pair - Done
28,626,534 UART: [art] Signing Cert with AUTHO
28,627,843 UART: RITY.KEYID = 7
30,907,743 UART: [art] Erasing AUTHORITY.KEYID = 7
30,909,252 UART: [art] PUB.X = 663F0AC5206C0FE5B6D40581A601264AAD7019E57C2B45F18BCA58E34EFD3E1505A80FBF2AF4F12ACED8FDB4C9EA19C1
30,916,544 UART: [art] PUB.Y = E34898FE3286BEBEE75A56F85D79BB7745A175A74DB215D82F731A145D97A7ED0C2CB414BD71710600B86D99F516160A
30,923,783 UART: [art] SIG.R = 465758A964D4ADCCC9C55E23B5B87ED6C80B512646F340DF03FB0600668E66E0D0F38E61CF1633F035E07F6EB79FD222
30,931,118 UART: [art] SIG.S = 5A44F2AFB1F32ADED0DA7D051B941AE0E3CD4EEC9BD085BCBED369884C8BF1F9A51A87B8EFD7368B71172AD33C47BE13
32,235,465 UART: mbox::rt_entry...
32,236,403 UART: ____ _ _ _ ____ _____
32,238,378 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,240,329 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,242,252 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,244,732 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,246,597 UART: |_|
32,247,426 UART:
32,359,856 UART: [rt] Runtime listening for mailbox commands...
32,362,022 >>> mbox cmd response data (48 bytes)
34,418,700 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,562,952 UART:
34,563,362 UART: Running Caliptra ROM ...
34,564,410 UART:
34,564,562 UART: [state] CFI Enabled
34,579,660 UART: [state] LifecycleState = Unprovisioned
34,581,561 UART: [state] DebugLocked = No
34,583,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,588,586 UART: [kat] SHA2-256
34,758,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,768,860 UART: [kat] ++
34,769,354 UART: [kat] sha1
34,779,206 UART: [kat] SHA2-256
34,781,888 UART: [kat] SHA2-384
34,786,808 UART: [kat] SHA2-512-ACC
34,789,160 UART: [kat] ECC-384
37,073,373 UART: [kat] HMAC-384Kdf
37,086,095 UART: [kat] LMS
38,276,134 UART: [kat] --
38,280,082 UART: [update-reset] ++
42,414,074 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,416,993 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,799,278 >>> mbox cmd response: success
42,799,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,800,765 UART: [update-reset] Copying MAN_2 To MAN_1
42,823,199 UART: [update-reset Success] --
42,826,812 UART: [state] Locking Datavault
42,830,119 UART: [state] Locking PCR0, PCR1 and PCR31
42,831,877 UART: [state] Locking ICCM
42,833,105 UART: [exit] Launching FMC @ 0x40000130
42,841,518 UART:
42,841,764 UART: Running Caliptra FMC ...
42,842,861 UART:
42,843,014 UART: [state] CFI Enabled
42,887,394 UART: [art] Extend RT PCRs Done
42,888,566 UART: [art] Lock RT PCRs Done
42,889,852 UART: [art] Populate DV Done
42,895,413 UART: [fht] FMC Alias Private Key: 7
42,896,890 UART: [art] Derive CDI
42,897,646 UART: [art] Store in in slot 0x4
42,940,282 UART: [art] Derive Key Pair
42,941,276 UART: [art] Store priv key in slot 0x5
46,183,355 UART: [art] Derive Key Pair - Done
46,196,139 UART: [art] Signing Cert with AUTHO
46,197,447 UART: RITY.KEYID = 7
48,477,112 UART: [art] Erasing AUTHORITY.KEYID = 7
48,478,638 UART: [art] PUB.X = E31A483E429D3A91D8AF59C08FFF5C123659D728C1576846394C4B98DA0002472D2810517BE2E935E365E9EC2A7E114F
48,485,857 UART: [art] PUB.Y = DB7376154E00C787E84FFD887AD43DEBE034C67549F864E1CBCB4E29806B1BD7D4EE2048A2F305F0471A4C63B36FA6EA
48,493,095 UART: [art] SIG.R = 1CA5E108F497E4D5729228FC6097F9FF1427AFD1169671771727995C45F1597EA7867F79C97DD9C996D18B5F38C1EFC1
48,500,432 UART: [art] SIG.S = BFDC74913C9E33F662D6A7A431D597374140EA6841647BC3167966B6C48E78456B54F57FD2DC2359E2FD397A785A9AE0
49,805,583 UART: Caliptra RT
49,806,300 UART: [state] CFI Enabled
50,097,101 UART: [rt] RT listening for mailbox commands...
50,129,224 UART: [rt]cmd =0x4d454153, len=108
50,147,819 >>> mbox cmd response data (12 bytes)
52,193,170 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,293,921 UART:
52,294,283 UART: Running Caliptra ROM ...
52,295,427 UART:
52,295,596 UART: [state] CFI Enabled
52,306,808 UART: [state] LifecycleState = Unprovisioned
52,308,747 UART: [state] DebugLocked = No
52,311,309 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,316,418 UART: [kat] SHA2-256
52,486,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,496,634 UART: [kat] ++
52,497,086 UART: [kat] sha1
52,508,250 UART: [kat] SHA2-256
52,510,942 UART: [kat] SHA2-384
52,515,462 UART: [kat] SHA2-512-ACC
52,517,856 UART: [kat] ECC-384
54,800,694 UART: [kat] HMAC-384Kdf
54,813,093 UART: [kat] LMS
56,003,158 UART: [kat] --
56,005,208 UART: [update-reset] ++
59,711,392 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,715,427 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
59,973,830 >>> mbox cmd response: success
62,017,133 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
62,116,668 UART: [update-reset] Copying MAN_2 To MAN_1
62,118,362 UART: [update-reset Success] --
62,119,524 UART: [state] Locking Datavault
62,120,664 UART: [state] Locking PCR0, PCR1 and PCR31
62,122,193 UART: [state] Locking ICCM
62,123,108 UART: [exit] Launching FMC @ 0x40000130
62,124,529 UART:
62,124,684 UART: Running Caliptra FMC ...
62,125,776 UART:
62,125,926 UART: [state] CFI Enabled
62,126,855 UART: [art] Extend RT PCRs Done
62,127,989 UART: [art] Lock RT PCRs Done
62,129,046 UART: [art] Populate DV Done
62,130,019 UART: [fht] FMC Alias Private Key: 7
62,131,324 UART: [art] Derive CDI
62,132,048 UART: [art] Store in in slot 0x4
62,133,158 UART: [art] Derive Key Pair
62,134,057 UART: [art] Store priv key in slot 0x5
63,359,433 UART: [art] Derive Key Pair - Done
63,372,108 UART: [art] Signing Cert with AUTHO
63,373,444 UART: RITY.KEYID = 7
65,652,423 UART: [art] Erasing AUTHORITY.KEYID = 7
65,653,938 UART: [art] PUB.X = EABA76DC174EEA92E8437EA2CF697DDF51F96BD937F749A2597386F474265145296D02FA758D29FBEAE9B83D756A8B7E
65,661,182 UART: [art] PUB.Y = 2FABD21673C2A1BC7FAA6F01028CE7E76AEF4180FDCF50049C32EFD8CA89C3DE572BADD8DE5255DE181191A4F4D4BA0F
65,668,456 UART: [art] SIG.R = 2893FF2EE55E74E4CCBC9BA90D7E91DCBCB97A7807114CC9074687D66022FCC844AA51511AA3A7992655A44A904E3B1E
65,675,835 UART: [art] SIG.S = BC76FA157C00DC49E7B8C66BB86F70CFBE95703481CA50C63843D534B1BA96BED4FFD48A22EF0D5002AE0CD2B38D2787
66,980,864 UART: mbox::rt_entry...
66,981,813 UART: ____ _ _ _ ____ _____
66,983,791 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,985,790 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,987,718 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,989,644 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,991,489 UART: |_|
66,992,283 UART:
67,278,884 UART: [rt] Runtime listening for mailbox commands...
67,280,956 UART:
67,281,120 UART: Running Caliptra ROM ...
67,282,225 UART:
67,282,767 UART: [state] CFI Enabled
67,298,187 UART: [state] LifecycleState = Unprovisioned
67,300,085 UART: [state] DebugLocked = No
67,303,034 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,308,434 UART: [kat] SHA2-256
67,478,134 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
67,488,656 UART: [kat] ++
67,489,243 UART: [kat] sha1
67,501,697 UART: [kat] SHA2-256
67,504,381 UART: [kat] SHA2-384
67,510,088 UART: [kat] SHA2-512-ACC
67,512,429 UART: [kat] ECC-384
69,799,163 UART: [kat] HMAC-384Kdf
69,809,931 UART: [kat] LMS
71,000,017 UART: [kat] --
71,004,009 UART: [update-reset] ++
74,708,012 UART: [update-reset] Image verified using Vendor ECC Key Index 0
74,711,141 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
74,969,567 >>> mbox cmd response: success
74,969,934 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
74,970,404 UART: [update-reset] Copying MAN_2 To MAN_1
74,992,778 UART: [update-reset Success] --
74,999,430 UART: [state] Locking Datavault
75,002,241 UART: [state] Locking PCR0, PCR1 and PCR31
75,003,992 UART: [state] Locking ICCM
75,005,247 UART: [exit] Launching FMC @ 0x40000130
75,013,633 UART:
75,013,862 UART: Running Caliptra FMC ...
75,014,884 UART:
75,015,024 UART: [state] CFI Enabled
75,059,581 UART: [art] Extend RT PCRs Done
75,060,765 UART: [art] Lock RT PCRs Done
75,062,027 UART: [art] Populate DV Done
75,067,493 UART: [fht] FMC Alias Private Key: 7
75,069,129 UART: [art] Derive CDI
75,069,862 UART: [art] Store in in slot 0x4
75,112,416 UART: [art] Derive Key Pair
75,113,412 UART: [art] Store priv key in slot 0x5
78,355,732 UART: [art] Derive Key Pair - Done
78,368,402 UART: [art] Signing Cert with AUTHO
78,369,704 UART: RITY.KEYID = 7
80,649,069 UART: [art] Erasing AUTHORITY.KEYID = 7
80,650,597 UART: [art] PUB.X = CA6B740CED71FB276C7FF55A1F0F4E3309699F2A1109BDADCA28D446E21CA4E33A1ED29AB670AE910EE4703FAD136541
80,657,847 UART: [art] PUB.Y = 1666343DF8F1371D03BA7B78EE3FF5349FA6CBACD9C115CE5D0E615F1F42B296535BE2B179734D320C240030CDAE5F44
80,665,068 UART: [art] SIG.R = 79EC5AAF2D955991BF0E4071B772ABF2751329A1DC4DE968B6C89ED84F0EBF8B27F4598793EE81453079634E2B69C5E0
80,672,464 UART: [art] SIG.S = 73146E2AEF5CD3CD6525549C02E57899642C65D31CCFB72B910C58F5B94E05FB9379D2C06C3F1DA65CCA385FDF0DA5DB
81,977,370 UART: mbox::rt_entry...
81,978,315 UART: ____ _ _ _ ____ _____
81,980,235 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
81,982,230 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
81,984,076 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
81,985,994 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
81,987,887 UART: |_|
81,988,764 UART:
82,272,780 UART: [rt] Runtime listening for mailbox commands...
82,274,926 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,124,149 ready_for_fw is high
4,124,688 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,351,011 >>> mbox cmd response: success
17,351,696 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,990,841 UART:
22,991,272 UART: Running Caliptra FMC ...
22,992,409 UART:
22,992,561 UART: [state] CFI Enabled
22,999,999 UART: [fht] FMC Alias Private Key: 7
25,331,135 UART: [art] Extend RT PCRs Done
25,332,365 UART: [art] Lock RT PCRs Done
25,334,052 UART: [art] Populate DV Done
25,339,436 UART: [fht] FMC Alias Private Key: 7
25,341,153 UART: [art] Derive CDI
25,341,965 UART: [art] Store in in slot 0x4
25,384,721 UART: [art] Derive Key Pair
25,385,718 UART: [art] Store priv key in slot 0x5
28,627,621 UART: [art] Derive Key Pair - Done
28,640,779 UART: [art] Signing Cert with AUTHO
28,642,081 UART: RITY.KEYID = 7
30,921,997 UART: [art] Erasing AUTHORITY.KEYID = 7
30,923,505 UART: [art] PUB.X = F0D3A7CCF856C1693CD3ECD4E89C6C183D820E760E29B6877C907E62C9BD39F015272EEF6088858493ECDA77E7A9A021
30,930,754 UART: [art] PUB.Y = 448F59236CE2ECFA4ABE05F90FB348ACD324A378412C5A935EBAF65BE8D91E98DED6E1FEDA702D6CC0558BD95AC1C559
30,938,030 UART: [art] SIG.R = 876991854910C725F81EF2F2FCF9E6091E66B187D489F7FC2100E6ACE776A072FEE307C58A16D0E0F7E70A503CC4D862
30,945,381 UART: [art] SIG.S = 80EB2542832BEEBCCBE829765BE4D57C95A2D546A75D298C027F9BBDCE9A38F45B3AF32A9AB06520D6757622E8281F87
32,249,939 UART: mbox::rt_entry...
32,250,880 UART: ____ _ _ _ ____ _____
32,252,855 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,254,857 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,256,777 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,258,730 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,260,654 UART: |_|
32,261,481 UART:
32,374,804 UART: [rt] Runtime listening for mailbox commands...
32,376,981 >>> mbox cmd response data (48 bytes)
34,434,409 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,094,116 >>> mbox cmd response: success
43,094,695 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,129,526 UART:
43,129,810 UART: Running Caliptra FMC ...
43,130,837 UART:
43,130,977 UART: [state] CFI Enabled
43,175,115 UART: [art] Extend RT PCRs Done
43,176,301 UART: [art] Lock RT PCRs Done
43,177,457 UART: [art] Populate DV Done
43,183,028 UART: [fht] FMC Alias Private Key: 7
43,184,732 UART: [art] Derive CDI
43,185,543 UART: [art] Store in in slot 0x4
43,228,130 UART: [art] Derive Key Pair
43,229,123 UART: [art] Store priv key in slot 0x5
46,471,281 UART: [art] Derive Key Pair - Done
46,484,025 UART: [art] Signing Cert with AUTHO
46,485,336 UART: RITY.KEYID = 7
48,765,086 UART: [art] Erasing AUTHORITY.KEYID = 7
48,766,598 UART: [art] PUB.X = D00D6DEFA820F97762C820CEFCE6F5E003CA823321C579A7A7109198370912E24EE2142BF695E865B5CB412CAF14C596
48,773,816 UART: [art] PUB.Y = 3FAE6D4F490BF1811F6078C416D2EE5DF3EA8DA77347B9558FAA4EC4C3145CF476EEDD86E0D0CBA6CA21A8B335CA7EC2
48,781,052 UART: [art] SIG.R = 6F7F30D4F5B6AC2FAE369799D48952001851D4A018087648127A274E8754693A6AFA1744FB9FE48231AE8B41924485C0
48,788,440 UART: [art] SIG.S = D90066ADD5C5225E92DAFAF693FE0D6CC6298B7797556868BF418148516E14BDD4511CB59B6BF28640C6368F29BDC063
50,093,348 UART: Caliptra RT
50,094,063 UART: [state] CFI Enabled
50,384,386 UART: [rt] RT listening for mailbox commands...
50,416,602 UART: [rt]cmd =0x4d454153, len=108
50,435,421 >>> mbox cmd response data (12 bytes)
52,480,877 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,374,472 >>> mbox cmd response: success
62,417,912 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
62,517,550 UART:
62,517,909 UART: Running Caliptra FMC ...
62,518,957 UART:
62,519,100 UART: [state] CFI Enabled
62,519,973 UART: [art] Extend RT PCRs Done
62,521,113 UART: [art] Lock RT PCRs Done
62,522,184 UART: [art] Populate DV Done
62,523,157 UART: [fht] FMC Alias Private Key: 7
62,524,475 UART: [art] Derive CDI
62,525,203 UART: [art] Store in in slot 0x4
62,526,287 UART: [art] Derive Key Pair
62,527,271 UART: [art] Store priv key in slot 0x5
63,753,996 UART: [art] Derive Key Pair - Done
63,767,307 UART: [art] Signing Cert with AUTHO
63,768,616 UART: RITY.KEYID = 7
66,047,996 UART: [art] Erasing AUTHORITY.KEYID = 7
66,049,512 UART: [art] PUB.X = 68AA070371FC8141AE5840E337C2330C461B69F34188E55CA91E8A42B66E055D1F09538742C555B13B3692B04304D769
66,056,749 UART: [art] PUB.Y = 0C53C773254347E04332C9E8BACDE21C0CC771A3584FF25B064F6E369EE3B9D694FF3D2CA412AB48A09E2059827BBAA0
66,064,004 UART: [art] SIG.R = 6CD3BB3F26145927D11EDEC2DE8388A581599EEAFA7E077735497609FF10B6B50C5A39DD66FFEF7AB51D9424E0E02DDE
66,071,402 UART: [art] SIG.S = 24335E62B5D313DCE2C63C95E234E2160DC72D1968AB1D4EB64314FDED66FAFF721800C858742CD41B40004A8C25E0EC
67,375,966 UART: mbox::rt_entry...
67,376,918 UART: ____ _ _ _ ____ _____
67,378,843 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,380,842 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,382,692 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,384,619 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,386,463 UART: |_|
67,387,339 UART:
67,668,764 UART: [rt] Runtime listening for mailbox commands...
75,457,765 >>> mbox cmd response: success
75,458,147 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,493,255 UART:
75,493,543 UART: Running Caliptra FMC ...
75,494,575 UART:
75,494,718 UART: [state] CFI Enabled
75,538,246 UART: [art] Extend RT PCRs Done
75,539,387 UART: [art] Lock RT PCRs Done
75,540,748 UART: [art] Populate DV Done
75,546,364 UART: [fht] FMC Alias Private Key: 7
75,547,999 UART: [art] Derive CDI
75,548,728 UART: [art] Store in in slot 0x4
75,591,590 UART: [art] Derive Key Pair
75,592,627 UART: [art] Store priv key in slot 0x5
78,834,912 UART: [art] Derive Key Pair - Done
78,848,019 UART: [art] Signing Cert with AUTHO
78,849,337 UART: RITY.KEYID = 7
81,129,038 UART: [art] Erasing AUTHORITY.KEYID = 7
81,130,545 UART: [art] PUB.X = C0BF7CB6626BB2188D3239F89D729A54C7C7405C37351749AA9A38084A368C883E5907746062B8897438F80F216D5FB3
81,137,730 UART: [art] PUB.Y = 720D36A5D569156E088B727EC647F6D71D689033E959E313116C680D10F7A909DB5020ED71B51615EDB1891D3A87D32F
81,144,960 UART: [art] SIG.R = 8768C7020E9D0DCDB15E0C7B943C30904A834C472B95B3BB4E9C253504F770E053A6AB739EC1A51DEC695BE817991FE9
81,152,347 UART: [art] SIG.S = CF0C6FCC4D0DA611DA48D73F3EC62CEA8E8453E8F928F2B12F235C9AEEF576525041AA7F7D192A71B705C5C69DCFF753
82,457,187 UART: mbox::rt_entry...
82,458,157 UART: ____ _ _ _ ____ _____
82,460,203 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,462,208 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,464,134 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,466,059 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,467,983 UART: |_|
82,468,781 UART:
82,751,521 UART: [rt] Runtime listening for mailbox commands...
82,753,666 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.25s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,410,501 UART: [ldev] --
10,414,861 UART: [fwproc] Wait for Commands...
10,416,416 UART: [fwproc] Recv command 0x46574c44
10,418,508 UART: [fwproc] Recv'd Img size: 78704 bytes
13,380,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,450,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,519,708 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,712,413 >>> mbox cmd response: success
13,712,913 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,716,040 UART: [afmc] ++
13,716,656 UART: [afmc] CDI.KEYID = 6
13,717,593 UART: [afmc] SUBJECT.KEYID = 7
13,718,762 UART: [afmc] AUTHORITY.KEYID = 5
16,252,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,977,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,979,617 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,995,342 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,011,397 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,027,259 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,050,351 UART: [afmc] --
18,054,485 UART: [cold-reset] --
18,058,398 UART: [state] Locking Datavault
18,063,051 UART: [state] Locking PCR0, PCR1 and PCR31
18,064,762 UART: [state] Locking ICCM
18,066,105 UART: [exit] Launching FMC @ 0x40000130
18,074,504 UART:
18,074,737 UART: Running Caliptra FMC ...
18,075,862 UART:
18,076,026 UART: [state] CFI Enabled
18,135,493 UART: [fht] FMC Alias Private Key: 7
19,899,543 UART: [art] Extend RT PCRs Done
19,900,764 UART: [art] Lock RT PCRs Done
19,902,467 UART: [art] Populate DV Done
19,908,200 UART: [fht] FMC Alias Private Key: 7
19,909,849 UART: [art] Derive CDI
19,910,585 UART: [art] Store in in slot 0x4
19,967,711 UART: [art] Derive Key Pair
19,968,742 UART: [art] Store priv key in slot 0x5
22,431,839 UART: [art] Derive Key Pair - Done
22,445,008 UART: [art] Signing Cert with AUTHO
22,446,313 UART: RITY.KEYID = 7
24,157,210 UART: [art] Erasing AUTHORITY.KEYID = 7
24,158,755 UART: [art] PUB.X = 496CEDDD7A35FBB945C41B31DA861EB5BE1B4C94A00915EF8955AA74E18DA1A7F945DEE41BF19B18238CD13583AA4F9C
24,166,065 UART: [art] PUB.Y = 59F4520EF9EF0AB9D71095BE0F4F0EBC46EDBA2995B2A078D603C2730065CB967498EF0174A8C3F2EF46A92FC7E854CC
24,173,259 UART: [art] SIG.R = CEB820BA088C3C3D642D7F0D83461FFCBF118C34FC60DCEF2DE0DF7273BDD9B2BF3365048AA50B5485706091F9596B32
24,180,655 UART: [art] SIG.S = 70CD0AFF40A5E587A024C0C5881D90DCFB5BEBED8B372AE5B6F747DFA6D277845408A9058C369D03CE9BD98FBBF4E482
25,159,293 UART: mbox::rt_entry...
25,160,261 UART: ____ _ _ _ ____ _____
25,162,195 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,164,203 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,166,058 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,167,986 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,169,865 UART: |_|
25,170,745 UART:
25,284,181 UART: [rt] Runtime listening for mailbox commands...
25,286,349 >>> mbox cmd response data (48 bytes)
27,346,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,491,135 UART:
27,491,558 UART: Running Caliptra ROM ...
27,492,604 UART:
27,492,764 UART: [state] CFI Enabled
27,569,384 UART: [state] LifecycleState = Unprovisioned
27,571,269 UART: [state] DebugLocked = No
27,573,761 UART: [state] WD Timer not started. Device not locked for debugging
27,577,123 UART: [kat] SHA2-256
27,756,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,767,808 UART: [kat] ++
27,768,266 UART: [kat] sha1
27,779,419 UART: [kat] SHA2-256
27,782,407 UART: [kat] SHA2-384
27,787,265 UART: [kat] SHA2-512-ACC
27,790,206 UART: [kat] ECC-384
30,251,586 UART: [kat] HMAC-384Kdf
30,275,211 UART: [kat] LMS
30,804,693 UART: [kat] --
30,809,245 UART: [update-reset] ++
34,230,170 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,233,049 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,616,363 >>> mbox cmd response: success
34,616,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,617,502 UART: [update-reset] Copying MAN_2 To MAN_1
34,639,833 UART: [update-reset Success] --
34,644,469 UART: [state] Locking Datavault
34,647,217 UART: [state] Locking PCR0, PCR1 and PCR31
34,648,924 UART: [state] Locking ICCM
34,650,410 UART: [exit] Launching FMC @ 0x40000130
34,658,877 UART:
34,659,116 UART: Running Caliptra FMC ...
34,660,563 UART:
34,660,731 UART: [state] CFI Enabled
34,767,072 UART: [art] Extend RT PCRs Done
34,768,288 UART: [art] Lock RT PCRs Done
34,769,906 UART: [art] Populate DV Done
34,775,476 UART: [fht] FMC Alias Private Key: 7
34,776,955 UART: [art] Derive CDI
34,777,776 UART: [art] Store in in slot 0x4
34,835,669 UART: [art] Derive Key Pair
34,836,710 UART: [art] Store priv key in slot 0x5
37,300,207 UART: [art] Derive Key Pair - Done
37,313,414 UART: [art] Signing Cert with AUTHO
37,314,709 UART: RITY.KEYID = 7
39,025,134 UART: [art] Erasing AUTHORITY.KEYID = 7
39,026,649 UART: [art] PUB.X = D239DB2E54B2FBD8D3A03E31DFD8CF3DC2F2EF9A06BB5037F1D7C55AF153ED496F2DB8DD0DECE23C50638E4F778C7366
39,033,910 UART: [art] PUB.Y = 42A0DB2EB9BB8721B5288C8ACAE6ACC63DAFA64BACE80E67B816BF8BCA0A665E689F391783CDF8B6D692D87A1FA1FD58
39,041,213 UART: [art] SIG.R = A686C9C94A79EC59BFD7780CD3656EAABC2D9AACB82F856D053AFCFA7B2CAB2127B322AFF57C74F4B85FF7C77548EE12
39,048,672 UART: [art] SIG.S = 05506F3418BE208C5C4E542BF5E02806CA9D87291BC7B4FE92ECB2BDFD89425EDB44501CBC6F84459023B3FE4B138D94
40,027,601 UART: Caliptra RT
40,028,304 UART: [state] CFI Enabled
40,365,251 UART: [rt] RT listening for mailbox commands...
40,397,421 UART: [rt]cmd =0x4d454153, len=108
40,415,922 >>> mbox cmd response data (12 bytes)
42,491,758 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,592,495 UART:
42,592,861 UART: Running Caliptra ROM ...
42,593,988 UART:
42,594,183 UART: [state] CFI Enabled
42,649,686 UART: [state] LifecycleState = Unprovisioned
42,651,564 UART: [state] DebugLocked = No
42,654,471 UART: [state] WD Timer not started. Device not locked for debugging
42,658,428 UART: [kat] SHA2-256
42,837,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,849,148 UART: [kat] ++
42,849,698 UART: [kat] sha1
42,861,618 UART: [kat] SHA2-256
42,864,642 UART: [kat] SHA2-384
42,870,249 UART: [kat] SHA2-512-ACC
42,873,185 UART: [kat] ECC-384
45,333,127 UART: [kat] HMAC-384Kdf
45,356,370 UART: [kat] LMS
45,885,788 UART: [kat] --
45,891,830 UART: [update-reset] ++
48,883,101 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,886,584 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,144,806 >>> mbox cmd response: success
51,202,571 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
51,302,070 UART: [update-reset] Copying MAN_2 To MAN_1
51,303,747 UART: [update-reset Success] --
51,304,913 UART: [state] Locking Datavault
51,306,061 UART: [state] Locking PCR0, PCR1 and PCR31
51,307,603 UART: [state] Locking ICCM
51,308,492 UART: [exit] Launching FMC @ 0x40000130
51,309,840 UART:
51,309,987 UART: Running Caliptra FMC ...
51,311,048 UART:
51,311,200 UART: [state] CFI Enabled
51,312,058 UART: [art] Extend RT PCRs Done
51,313,203 UART: [art] Lock RT PCRs Done
51,314,193 UART: [art] Populate DV Done
51,315,135 UART: [fht] FMC Alias Private Key: 7
51,316,394 UART: [art] Derive CDI
51,317,138 UART: [art] Store in in slot 0x4
51,318,308 UART: [art] Derive Key Pair
51,319,299 UART: [art] Store priv key in slot 0x5
51,823,591 UART: [art] Derive Key Pair - Done
51,836,919 UART: [art] Signing Cert with AUTHO
51,838,227 UART: RITY.KEYID = 7
53,548,558 UART: [art] Erasing AUTHORITY.KEYID = 7
53,550,071 UART: [art] PUB.X = 18031556638DE9E69EE7DA50FDB6C1666B388A75F24DDF974E74C0CADBAD0B4E52F2E399F5E05B5D422722C8B51A5DB7
53,557,341 UART: [art] PUB.Y = 02FF4D0EA7617C3E076FAB165DC0A9D47CE408D17AF57E92C1E4B790CAEB073FDCD7837874AF93AA260886008117C6E4
53,564,584 UART: [art] SIG.R = 2D2C8E4EF8B1A18D031346981B09387510D8C9E118690716811B98F5BAE37B597F722C08377AF5DAE766C0F12FAAA018
53,571,932 UART: [art] SIG.S = 7779712C2EE26EA25FAF452AF1D443F3F8F533BFD40D83A64BD229D34023DAC518B1218ECFD8FD72BB22CD8467DE3A92
54,550,561 UART: mbox::rt_entry...
54,551,510 UART: ____ _ _ _ ____ _____
54,553,493 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,555,497 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,557,433 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,559,362 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,561,289 UART: |_|
54,562,100 UART:
54,847,221 UART: [rt] Runtime listening for mailbox commands...
54,849,292 UART:
54,849,455 UART: Running Caliptra ROM ...
54,850,474 UART:
54,850,621 UART: [state] CFI Enabled
54,910,819 UART: [state] LifecycleState = Unprovisioned
54,912,692 UART: [state] DebugLocked = No
54,915,403 UART: [state] WD Timer not started. Device not locked for debugging
54,919,425 UART: [kat] SHA2-256
55,098,558 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
55,110,142 UART: [kat] ++
55,110,598 UART: [kat] sha1
55,121,857 UART: [kat] SHA2-256
55,124,906 UART: [kat] SHA2-384
55,131,117 UART: [kat] SHA2-512-ACC
55,134,056 UART: [kat] ECC-384
57,597,651 UART: [kat] HMAC-384Kdf
57,618,701 UART: [kat] LMS
58,148,177 UART: [kat] --
58,153,411 UART: [update-reset] ++
61,142,655 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,145,861 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
61,404,068 >>> mbox cmd response: success
61,404,435 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,405,930 UART: [update-reset] Copying MAN_2 To MAN_1
61,428,256 UART: [update-reset Success] --
61,432,539 UART: [state] Locking Datavault
61,435,037 UART: [state] Locking PCR0, PCR1 and PCR31
61,436,680 UART: [state] Locking ICCM
61,438,100 UART: [exit] Launching FMC @ 0x40000130
61,446,555 UART:
61,446,831 UART: Running Caliptra FMC ...
61,447,859 UART:
61,448,006 UART: [state] CFI Enabled
61,553,654 UART: [art] Extend RT PCRs Done
61,554,835 UART: [art] Lock RT PCRs Done
61,556,212 UART: [art] Populate DV Done
61,561,568 UART: [fht] FMC Alias Private Key: 7
61,563,211 UART: [art] Derive CDI
61,564,022 UART: [art] Store in in slot 0x4
61,622,571 UART: [art] Derive Key Pair
61,623,607 UART: [art] Store priv key in slot 0x5
64,086,274 UART: [art] Derive Key Pair - Done
64,099,191 UART: [art] Signing Cert with AUTHO
64,100,503 UART: RITY.KEYID = 7
65,811,560 UART: [art] Erasing AUTHORITY.KEYID = 7
65,813,057 UART: [art] PUB.X = A060E1D24A96E2940BE000F2956EF0BD82C0AB55FCC2730F398B7B1713E75FB464296F89423435051ACFE4D2C5E957D9
65,820,263 UART: [art] PUB.Y = 29A0FD7729D3FB39CBB2707947FC3D372EE8E3BFB9E1F9541BFF0CEA62B85DED78BD89C4886DE793A2ACF39BE9B845CC
65,827,606 UART: [art] SIG.R = 2AEE86D4C50C24ABBBC66B35B3FE3BA8370789FBEDFC75FD3E6E548DB0693060AC338C9700D887BE033B4F8420B5035C
65,834,969 UART: [art] SIG.S = 6262F4EBD0FCB5CC54B54DCF0BBAF59FF525A3267F2A8D5724D62F041E77137692ECCB081E8DC874614F4D872E92C2F6
66,812,904 UART: mbox::rt_entry...
66,813,868 UART: ____ _ _ _ ____ _____
66,815,848 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,817,854 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,819,782 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,821,710 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,823,659 UART: |_|
66,824,649 UART:
67,109,652 UART: [rt] Runtime listening for mailbox commands...
67,111,827 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,373,592 ready_for_fw is high
3,374,178 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,484,794 >>> mbox cmd response: success
13,485,459 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,782,146 UART:
17,782,536 UART: Running Caliptra FMC ...
17,783,678 UART:
17,783,844 UART: [state] CFI Enabled
17,849,587 UART: [fht] FMC Alias Private Key: 7
19,613,503 UART: [art] Extend RT PCRs Done
19,614,706 UART: [art] Lock RT PCRs Done
19,616,458 UART: [art] Populate DV Done
19,621,999 UART: [fht] FMC Alias Private Key: 7
19,623,650 UART: [art] Derive CDI
19,624,463 UART: [art] Store in in slot 0x4
19,682,235 UART: [art] Derive Key Pair
19,683,292 UART: [art] Store priv key in slot 0x5
22,146,068 UART: [art] Derive Key Pair - Done
22,158,810 UART: [art] Signing Cert with AUTHO
22,160,115 UART: RITY.KEYID = 7
23,872,386 UART: [art] Erasing AUTHORITY.KEYID = 7
23,873,883 UART: [art] PUB.X = A79714EEE85727CBC15050B22540748CCE12CA8D0FDFC89DF121EB3CEDEC543EBE0DFFF5D019CEC735C02C8E8E172A80
23,881,220 UART: [art] PUB.Y = B69AC7DDED9D334351CF32D197B987DCD103967EB2829CB444649A3AEDBA692470D4A79E7EDE1366836F099F3AB46DB2
23,888,460 UART: [art] SIG.R = B57166D73BC7585144846B819D4204849836BB22F31FCBCEACCAA1B4C27956AA8136F6C814DD3EC52C327973EDD5469F
23,895,860 UART: [art] SIG.S = B3B7119B13EF13765FF23CDE7B93EE6D2CB51103983200E844549626FBFCE924DC9568443F32C7AA5BAED0B54D4EE807
24,874,585 UART: mbox::rt_entry...
24,875,542 UART: ____ _ _ _ ____ _____
24,877,471 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,879,504 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,881,361 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,883,319 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,885,203 UART: |_|
24,886,092 UART:
24,999,312 UART: [rt] Runtime listening for mailbox commands...
25,001,480 >>> mbox cmd response data (48 bytes)
27,071,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,203,670 >>> mbox cmd response: success
34,204,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,237,672 UART:
34,237,962 UART: Running Caliptra FMC ...
34,239,018 UART:
34,239,173 UART: [state] CFI Enabled
34,331,988 UART: [art] Extend RT PCRs Done
34,333,187 UART: [art] Lock RT PCRs Done
34,334,673 UART: [art] Populate DV Done
34,340,245 UART: [fht] FMC Alias Private Key: 7
34,341,942 UART: [art] Derive CDI
34,342,676 UART: [art] Store in in slot 0x4
34,400,832 UART: [art] Derive Key Pair
34,401,874 UART: [art] Store priv key in slot 0x5
36,864,835 UART: [art] Derive Key Pair - Done
36,877,886 UART: [art] Signing Cert with AUTHO
36,879,193 UART: RITY.KEYID = 7
38,590,814 UART: [art] Erasing AUTHORITY.KEYID = 7
38,592,319 UART: [art] PUB.X = B1E1153699E88A18B5A793C1BC9A85EA65646B4F41C4ED101848FD916E854693098DCD5471793759D7D72033BB2680D1
38,599,657 UART: [art] PUB.Y = 1EC938E51612D4F524E8B729C31AF00D985AEBC9F8DBF31AC753C90ECD8813D746B1719B8C68251FC663E0C068ACA080
38,606,810 UART: [art] SIG.R = 89D29853B5F025C4A834E56AFC95C5FFD4C9201170F5D579FDBFB4CCE34751418FEF7DCA750FB27A4BFA26F39707C3F6
38,614,254 UART: [art] SIG.S = FA3A97B943AC203250F092A1B7298582B3E49A05CCBF59765774A0A26C447E2BA90BED52D6BEAE68E587DFDA3599C19D
39,593,163 UART: Caliptra RT
39,593,851 UART: [state] CFI Enabled
39,927,558 UART: [rt] RT listening for mailbox commands...
39,959,586 UART: [rt]cmd =0x4d454153, len=108
39,978,551 >>> mbox cmd response data (12 bytes)
42,025,095 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,557,414 >>> mbox cmd response: success
50,602,373 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
50,701,909 UART:
50,702,278 UART: Running Caliptra FMC ...
50,703,370 UART:
50,703,532 UART: [state] CFI Enabled
50,704,395 UART: [art] Extend RT PCRs Done
50,705,540 UART: [art] Lock RT PCRs Done
50,706,612 UART: [art] Populate DV Done
50,707,645 UART: [fht] FMC Alias Private Key: 7
50,708,961 UART: [art] Derive CDI
50,709,696 UART: [art] Store in in slot 0x4
50,710,783 UART: [art] Derive Key Pair
50,711,717 UART: [art] Store priv key in slot 0x5
51,219,367 UART: [art] Derive Key Pair - Done
51,232,424 UART: [art] Signing Cert with AUTHO
51,233,724 UART: RITY.KEYID = 7
52,944,777 UART: [art] Erasing AUTHORITY.KEYID = 7
52,946,298 UART: [art] PUB.X = D3DF038C3ED1FD4DAA2AD18B631525F9E5B54BBC95576BD00970ADB67E679C60FA0618E713F02EA6D48DABFCC8797DA4
52,953,545 UART: [art] PUB.Y = 0E8F88959C0940B9D9C1AA9CC58CC178260A35922BC5E166434005A752463518862109DCD697162906E2FE9EC8AC0784
52,960,836 UART: [art] SIG.R = C42C4B3DE7F78FCE8013127F778CA9EA75FC7EE8212E7FFC797131D18D8D1BFA5499D338FA5A66CE03AC43E6893AF743
52,968,220 UART: [art] SIG.S = 328E3F75734117D41389BAB8A2B9B1A0947766D27B60B287E5134ADDE5EFA27A561BB12779B9930228FD7A64EC749893
53,946,805 UART: mbox::rt_entry...
53,947,747 UART: ____ _ _ _ ____ _____
53,949,673 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,951,673 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,953,526 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,955,446 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,957,331 UART: |_|
53,958,211 UART:
54,241,144 UART: [rt] Runtime listening for mailbox commands...
60,671,164 >>> mbox cmd response: success
60,671,567 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,706,361 UART:
60,706,678 UART: Running Caliptra FMC ...
60,707,714 UART:
60,707,862 UART: [state] CFI Enabled
60,802,931 UART: [art] Extend RT PCRs Done
60,804,116 UART: [art] Lock RT PCRs Done
60,805,331 UART: [art] Populate DV Done
60,810,629 UART: [fht] FMC Alias Private Key: 7
60,812,220 UART: [art] Derive CDI
60,813,031 UART: [art] Store in in slot 0x4
60,871,461 UART: [art] Derive Key Pair
60,872,501 UART: [art] Store priv key in slot 0x5
63,335,496 UART: [art] Derive Key Pair - Done
63,348,370 UART: [art] Signing Cert with AUTHO
63,349,678 UART: RITY.KEYID = 7
65,060,994 UART: [art] Erasing AUTHORITY.KEYID = 7
65,062,490 UART: [art] PUB.X = EB40FB6A5375765EA8DDDC12E8D5B2D3D8707DD4A15A0B9CBC7A4FA5FC01C8AC14E93CCF0BAAB5E930299A4EC3E0B700
65,069,811 UART: [art] PUB.Y = 07384B566B144921251EA7EC6A28B271F22B3E3362FE283027FE14059225FA6A198CE04D952F6CF645192165FB50A8D4
65,077,043 UART: [art] SIG.R = 47063EFDAA857DD33CE02D0C11635D2152D9B26936B5E57572E6302456519FFAC4BE6BAACEF17DF996C105577A2E68B5
65,084,483 UART: [art] SIG.S = C327AEC9F6AA30963A825F965628B417E02CA72374E109B8404684F890773313E9B01E6852C12D1CD9397A846F6A6266
66,062,722 UART: mbox::rt_entry...
66,063,682 UART: ____ _ _ _ ____ _____
66,065,769 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,067,782 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,069,641 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,071,581 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,073,515 UART: |_|
66,074,324 UART:
66,358,129 UART: [rt] Runtime listening for mailbox commands...
66,360,328 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.43s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,619,801 UART: [ldev] --
10,623,927 UART: [fwproc] Wait for Commands...
10,626,771 UART: [fwproc] Recv command 0x46574c44
10,628,853 UART: [fwproc] Recv'd Img size: 78704 bytes
13,593,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,666,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,735,037 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,928,989 >>> mbox cmd response: success
13,929,481 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,933,895 UART: [afmc] ++
13,934,483 UART: [afmc] CDI.KEYID = 6
13,935,387 UART: [afmc] SUBJECT.KEYID = 7
13,936,603 UART: [afmc] AUTHORITY.KEYID = 5
16,439,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,156,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,157,920 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,173,680 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,189,699 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,205,554 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,228,250 UART: [afmc] --
18,231,460 UART: [cold-reset] --
18,236,951 UART: [state] Locking Datavault
18,243,043 UART: [state] Locking PCR0, PCR1 and PCR31
18,244,749 UART: [state] Locking ICCM
18,247,433 UART: [exit] Launching FMC @ 0x40000130
18,255,843 UART:
18,256,082 UART: Running Caliptra FMC ...
18,257,178 UART:
18,257,333 UART: [state] CFI Enabled
18,265,425 UART: [fht] FMC Alias Private Key: 7
20,022,225 UART: [art] Extend RT PCRs Done
20,023,448 UART: [art] Lock RT PCRs Done
20,024,918 UART: [art] Populate DV Done
20,030,325 UART: [fht] FMC Alias Private Key: 7
20,031,908 UART: [art] Derive CDI
20,032,718 UART: [art] Store in in slot 0x4
20,075,141 UART: [art] Derive Key Pair
20,076,288 UART: [art] Store priv key in slot 0x5
22,503,412 UART: [art] Derive Key Pair - Done
22,516,078 UART: [art] Signing Cert with AUTHO
22,517,387 UART: RITY.KEYID = 7
24,222,826 UART: [art] Erasing AUTHORITY.KEYID = 7
24,224,333 UART: [art] PUB.X = B721DC09FE8DE6094836C19FBF4EC28ACD67EF0AB603E1E38C10DB987163E36684F68CDB7028DA755ABA64BC8F7A287C
24,231,623 UART: [art] PUB.Y = 80A60778EB3F833BB2426A6598EBCDA01FB46FCD1C2C7B4E5FDE0C875284E2C05B6D40856925DEAAC6859DF07E41CE2B
24,238,885 UART: [art] SIG.R = 45AE87A6BD4218D47BA7A34E20A5CA509759ECF9FC0C25CEBCB04B18570BFE61B8EF856BEA7663FDA7644025E557B3BD
24,246,337 UART: [art] SIG.S = D8C66F7CF3B15C2DBDED6BD83B026160CAA01BCD28A0F0A1D6A301F36488D07F5A99A5C61CC626FFF98D8AD3FE5611EB
25,226,028 UART: mbox::rt_entry...
25,226,985 UART: ____ _ _ _ ____ _____
25,228,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,230,958 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,232,875 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,234,795 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,236,721 UART: |_|
25,237,521 UART:
25,350,752 UART: [rt] Runtime listening for mailbox commands...
25,352,964 >>> mbox cmd response data (48 bytes)
27,413,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,557,916 UART:
27,558,301 UART: Running Caliptra ROM ...
27,559,432 UART:
27,559,596 UART: [state] CFI Enabled
27,574,616 UART: [state] LifecycleState = Unprovisioned
27,576,446 UART: [state] DebugLocked = No
27,577,874 UART: [state] WD Timer not started. Device not locked for debugging
27,581,604 UART: [kat] SHA2-256
27,760,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,772,350 UART: [kat] ++
27,772,900 UART: [kat] sha1
27,784,977 UART: [kat] SHA2-256
27,788,037 UART: [kat] SHA2-384
27,795,207 UART: [kat] SHA2-512-ACC
27,798,150 UART: [kat] ECC-384
30,239,042 UART: [kat] HMAC-384Kdf
30,252,530 UART: [kat] LMS
30,782,026 UART: [kat] --
30,786,131 UART: [update-reset] ++
34,216,910 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,220,457 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,603,811 >>> mbox cmd response: success
34,604,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,605,717 UART: [update-reset] Copying MAN_2 To MAN_1
34,628,038 UART: [update-reset Success] --
34,633,744 UART: [state] Locking Datavault
34,635,594 UART: [state] Locking PCR0, PCR1 and PCR31
34,637,246 UART: [state] Locking ICCM
34,639,944 UART: [exit] Launching FMC @ 0x40000130
34,648,389 UART:
34,648,614 UART: Running Caliptra FMC ...
34,650,085 UART:
34,650,248 UART: [state] CFI Enabled
34,694,097 UART: [art] Extend RT PCRs Done
34,695,244 UART: [art] Lock RT PCRs Done
34,696,523 UART: [art] Populate DV Done
34,702,189 UART: [fht] FMC Alias Private Key: 7
34,703,721 UART: [art] Derive CDI
34,704,523 UART: [art] Store in in slot 0x4
34,746,853 UART: [art] Derive Key Pair
34,747,895 UART: [art] Store priv key in slot 0x5
37,175,071 UART: [art] Derive Key Pair - Done
37,188,418 UART: [art] Signing Cert with AUTHO
37,189,718 UART: RITY.KEYID = 7
38,895,254 UART: [art] Erasing AUTHORITY.KEYID = 7
38,896,756 UART: [art] PUB.X = C6887F6309BC4D4801ED0A69220735903C228E7AD529424FCCB7D31B6EFE41D4A5AFCEB2BB5458ED8CE969909BB78C16
38,904,052 UART: [art] PUB.Y = 2D8FC37103B769866B623F37EE5FA145F22049CC44F9FEA75F3ABCA05294AB0597CC18A85DC3AF5FB3F429F8B328701B
38,911,342 UART: [art] SIG.R = CE476DBD28C7FC5DE715DF3D5FB9DD6587D401A8B4E54A7FAAA1DE52848A741B95280ABEBC3748C22FB11F88658B6665
38,918,784 UART: [art] SIG.S = 9BA12A263194B17A5FB18B0A745A1A8C407E942626FFB4F983C0EF204564E3553CE071407930EFDDE8F497228C68404B
39,897,711 UART: Caliptra RT
39,898,401 UART: [state] CFI Enabled
40,184,379 UART: [rt] RT listening for mailbox commands...
40,216,550 UART: [rt]cmd =0x4d454153, len=108
40,236,002 >>> mbox cmd response data (12 bytes)
42,285,052 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,385,820 UART:
42,386,198 UART: Running Caliptra ROM ...
42,387,327 UART:
42,387,489 UART: [state] CFI Enabled
42,400,688 UART: [state] LifecycleState = Unprovisioned
42,402,564 UART: [state] DebugLocked = No
42,403,842 UART: [state] WD Timer not started. Device not locked for debugging
42,407,577 UART: [kat] SHA2-256
42,586,746 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,598,320 UART: [kat] ++
42,598,858 UART: [kat] sha1
42,610,286 UART: [kat] SHA2-256
42,613,344 UART: [kat] SHA2-384
42,618,775 UART: [kat] SHA2-512-ACC
42,621,757 UART: [kat] ECC-384
45,062,298 UART: [kat] HMAC-384Kdf
45,076,104 UART: [kat] LMS
45,605,586 UART: [kat] --
45,609,030 UART: [update-reset] ++
48,606,597 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,610,452 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
48,868,658 >>> mbox cmd response: success
50,913,641 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
51,013,193 UART: [update-reset] Copying MAN_2 To MAN_1
51,014,896 UART: [update-reset Success] --
51,015,974 UART: [state] Locking Datavault
51,017,120 UART: [state] Locking PCR0, PCR1 and PCR31
51,018,656 UART: [state] Locking ICCM
51,019,529 UART: [exit] Launching FMC @ 0x40000130
51,020,868 UART:
51,021,007 UART: Running Caliptra FMC ...
51,022,122 UART:
51,022,276 UART: [state] CFI Enabled
51,023,149 UART: [art] Extend RT PCRs Done
51,024,281 UART: [art] Lock RT PCRs Done
51,025,312 UART: [art] Populate DV Done
51,026,341 UART: [fht] FMC Alias Private Key: 7
51,027,573 UART: [art] Derive CDI
51,028,291 UART: [art] Store in in slot 0x4
51,029,453 UART: [art] Derive Key Pair
51,030,357 UART: [art] Store priv key in slot 0x5
51,439,336 UART: [art] Derive Key Pair - Done
51,452,474 UART: [art] Signing Cert with AUTHO
51,453,770 UART: RITY.KEYID = 7
53,159,632 UART: [art] Erasing AUTHORITY.KEYID = 7
53,161,153 UART: [art] PUB.X = E1D79528D263D60E494CF9802C4920106436E70DF6A99950E5A8083D8845A48B4FEFDD37D30AF4EAD42DB71DE22462B2
53,168,397 UART: [art] PUB.Y = 57C7A818692E6E0EE3159EC5B6FDF9BCAA58E4167208554E0B346ADC8EF042D0E2CA811BB0FFCFA3ECC9935F761EF5FD
53,175,697 UART: [art] SIG.R = 56D28CA3EBF1B54E2E8C7CA35F20974C19F7D6D0D20C2A28E0F618F50E1917570BE1D18EF004E766842536BC4C4D0EA9
53,183,080 UART: [art] SIG.S = E0EE3B2859DF2DB052D6E5C4426EAC0D83EAECA587AB1D996ABEC1F9D75EB7E08783947A2310901E2D927F70D64EF2AF
54,161,366 UART: mbox::rt_entry...
54,162,311 UART: ____ _ _ _ ____ _____
54,164,229 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,166,224 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,168,068 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,169,985 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,171,903 UART: |_|
54,172,701 UART:
54,455,094 UART: [rt] Runtime listening for mailbox commands...
54,457,153 UART:
54,457,312 UART: Running Caliptra ROM ...
54,458,407 UART:
54,458,723 UART: [state] CFI Enabled
54,472,758 UART: [state] LifecycleState = Unprovisioned
54,474,739 UART: [state] DebugLocked = No
54,477,306 UART: [state] WD Timer not started. Device not locked for debugging
54,480,714 UART: [kat] SHA2-256
54,659,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
54,671,448 UART: [kat] ++
54,671,977 UART: [kat] sha1
54,683,722 UART: [kat] SHA2-256
54,686,725 UART: [kat] SHA2-384
54,693,615 UART: [kat] SHA2-512-ACC
54,696,548 UART: [kat] ECC-384
57,136,041 UART: [kat] HMAC-384Kdf
57,148,971 UART: [kat] LMS
57,678,491 UART: [kat] --
57,681,569 UART: [update-reset] ++
60,666,791 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
60,669,510 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
60,927,726 >>> mbox cmd response: success
60,928,776 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,929,180 UART: [update-reset] Copying MAN_2 To MAN_1
60,951,294 UART: [update-reset Success] --
60,957,101 UART: [state] Locking Datavault
60,960,874 UART: [state] Locking PCR0, PCR1 and PCR31
60,962,571 UART: [state] Locking ICCM
60,964,500 UART: [exit] Launching FMC @ 0x40000130
60,972,941 UART:
60,973,178 UART: Running Caliptra FMC ...
60,974,272 UART:
60,974,420 UART: [state] CFI Enabled
61,018,851 UART: [art] Extend RT PCRs Done
61,019,990 UART: [art] Lock RT PCRs Done
61,021,644 UART: [art] Populate DV Done
61,026,933 UART: [fht] FMC Alias Private Key: 7
61,028,478 UART: [art] Derive CDI
61,029,286 UART: [art] Store in in slot 0x4
61,072,151 UART: [art] Derive Key Pair
61,073,190 UART: [art] Store priv key in slot 0x5
63,499,895 UART: [art] Derive Key Pair - Done
63,512,886 UART: [art] Signing Cert with AUTHO
63,514,365 UART: RITY.KEYID = 7
65,219,979 UART: [art] Erasing AUTHORITY.KEYID = 7
65,221,463 UART: [art] PUB.X = 9A0BE9997947A183806C25513714045CD6EF10CD5FB9ABCE62BC543B47B033F6327A66652D32F57D3F296431AEAFB182
65,228,695 UART: [art] PUB.Y = B65BF6CE4BE2C68B4EDA38FA06493D34D9CFB8AFA527C3FB874E290ED89D5D739AEBB11B4564D43FA94D20CD723794AE
65,236,018 UART: [art] SIG.R = EA8B22F8D3FEE4A040ADB1C9531A82419218BEE39FE39882690926BC4B069C694C0324A18EAC23AFC52A00AEA66A83BD
65,243,415 UART: [art] SIG.S = EC8B208FF1AD7A767D19818CC6AEDA865EE3B4A64B54EB24A9905FECAA063D29D8D50426CD669AD1EC5F76E867FD557D
66,221,886 UART: mbox::rt_entry...
66,222,846 UART: ____ _ _ _ ____ _____
66,224,766 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,226,762 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,228,628 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,230,545 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,232,414 UART: |_|
66,233,234 UART:
66,518,777 UART: [rt] Runtime listening for mailbox commands...
66,520,945 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.44s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,699,052 ready_for_fw is high
3,699,807 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,703,788 >>> mbox cmd response: success
13,704,838 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,953,559 UART:
17,953,968 UART: Running Caliptra FMC ...
17,955,157 UART:
17,955,315 UART: [state] CFI Enabled
17,963,314 UART: [fht] FMC Alias Private Key: 7
19,719,855 UART: [art] Extend RT PCRs Done
19,721,070 UART: [art] Lock RT PCRs Done
19,722,594 UART: [art] Populate DV Done
19,727,709 UART: [fht] FMC Alias Private Key: 7
19,729,367 UART: [art] Derive CDI
19,730,179 UART: [art] Store in in slot 0x4
19,772,340 UART: [art] Derive Key Pair
19,773,375 UART: [art] Store priv key in slot 0x5
22,200,621 UART: [art] Derive Key Pair - Done
22,213,930 UART: [art] Signing Cert with AUTHO
22,215,231 UART: RITY.KEYID = 7
23,920,608 UART: [art] Erasing AUTHORITY.KEYID = 7
23,922,111 UART: [art] PUB.X = 771514CF4274D745603AA51996CDE375634D4877BC9B45B2913142BBDAF5D51627BF95AA1FC585A27459ADDB005F1F2A
23,929,356 UART: [art] PUB.Y = 881E82A4E594BB192C44DBC948BBAC98D713B43017A33540A3604C15981ACFB8EA729515561C88A24B7C02F8D015F862
23,936,582 UART: [art] SIG.R = 4582AA907D15EBF609812287E7BEB6C7BCC7AF968F4F091D6344EE00994D21D4A55225CB52BD5384E50BD3592E3E8ADF
23,943,971 UART: [art] SIG.S = 67FA79B516986EE1C4970C9AF9241863F17074FDCBF46454F074D5F960F719C51350AFC64E0F12144E8DFF90BAF2A28B
24,922,050 UART: mbox::rt_entry...
24,923,015 UART: ____ _ _ _ ____ _____
24,924,999 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,927,021 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,928,950 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,930,904 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,932,825 UART: |_|
24,933,654 UART:
25,047,463 UART: [rt] Runtime listening for mailbox commands...
25,049,633 >>> mbox cmd response data (48 bytes)
27,109,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,157,145 >>> mbox cmd response: success
34,157,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,192,927 UART:
34,193,218 UART: Running Caliptra FMC ...
34,194,353 UART:
34,194,505 UART: [state] CFI Enabled
34,238,799 UART: [art] Extend RT PCRs Done
34,239,983 UART: [art] Lock RT PCRs Done
34,241,548 UART: [art] Populate DV Done
34,247,011 UART: [fht] FMC Alias Private Key: 7
34,248,546 UART: [art] Derive CDI
34,249,353 UART: [art] Store in in slot 0x4
34,292,100 UART: [art] Derive Key Pair
34,293,094 UART: [art] Store priv key in slot 0x5
36,720,441 UART: [art] Derive Key Pair - Done
36,733,385 UART: [art] Signing Cert with AUTHO
36,734,680 UART: RITY.KEYID = 7
38,440,037 UART: [art] Erasing AUTHORITY.KEYID = 7
38,441,562 UART: [art] PUB.X = E2D5D5D2850842E5A424B280A3ECF2432FC1CB4EDDDD3F1751462345DA843332CED6B8AF2EF4151FDD79CA715983C37F
38,448,872 UART: [art] PUB.Y = 82CADE164D9DC42E2C539BFCA22E234D2BC98D4E026B8BB2EE92D949900E8F2E9B0F7221082F14F6427258AE8828CE00
38,456,117 UART: [art] SIG.R = ACBADB846D3184392275090D4FB173D46370B179CF41EE8107A8BD094CEF7C52730B1DA227729AC3B42373E2664C5836
38,463,496 UART: [art] SIG.S = 3598B758194EEA8AE1EE58FD7800C78A3AE11E226C097737DC97E26794ED893EF014FA0D9A5420D8C0AB0DCF651EF8EB
39,442,794 UART: Caliptra RT
39,443,499 UART: [state] CFI Enabled
39,734,570 UART: [rt] RT listening for mailbox commands...
39,766,749 UART: [rt]cmd =0x4d454153, len=108
39,785,439 >>> mbox cmd response data (12 bytes)
41,830,881 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,278,848 >>> mbox cmd response: success
50,323,596 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
50,423,142 UART:
50,423,498 UART: Running Caliptra FMC ...
50,424,536 UART:
50,424,692 UART: [state] CFI Enabled
50,425,611 UART: [art] Extend RT PCRs Done
50,426,748 UART: [art] Lock RT PCRs Done
50,427,806 UART: [art] Populate DV Done
50,428,827 UART: [fht] FMC Alias Private Key: 7
50,430,138 UART: [art] Derive CDI
50,430,866 UART: [art] Store in in slot 0x4
50,432,029 UART: [art] Derive Key Pair
50,432,972 UART: [art] Store priv key in slot 0x5
50,837,394 UART: [art] Derive Key Pair - Done
50,850,378 UART: [art] Signing Cert with AUTHO
50,851,673 UART: RITY.KEYID = 7
52,557,337 UART: [art] Erasing AUTHORITY.KEYID = 7
52,558,868 UART: [art] PUB.X = 31713D8DA207B8041F4BFF9364BB40748E67504F8E7BB2A5B55F6FFA724092BFAC4897A0F361A1DBA0E3430855BDFE1D
52,566,121 UART: [art] PUB.Y = 697689C79933C0F902A9D96CAF2B6D29ECEE2BBA0DE98B6A620F51B992FB5160BA2D5DD22A92754DDC62EEA2719A8155
52,573,361 UART: [art] SIG.R = 8C883D232BBFA22AC59EE1106D95A0CE6E0AABE9417CFA24D628D6B0DD2057E62C6F1D2DF0BF2F6CDCE08FDF6D498F46
52,580,803 UART: [art] SIG.S = FE1F85CE5B3A7352CE510C5EAD7CC8E20F76442C3218E8422CE5AD9910724344F65FAD52EE1722A660679E100E1C6045
53,558,877 UART: mbox::rt_entry...
53,559,813 UART: ____ _ _ _ ____ _____
53,561,787 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,563,786 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,565,717 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,567,643 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,569,489 UART: |_|
53,570,281 UART:
53,856,896 UART: [rt] Runtime listening for mailbox commands...
60,192,286 >>> mbox cmd response: success
60,193,510 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,226,991 UART:
60,227,427 UART: Running Caliptra FMC ...
60,228,517 UART:
60,228,670 UART: [state] CFI Enabled
60,272,677 UART: [art] Extend RT PCRs Done
60,273,819 UART: [art] Lock RT PCRs Done
60,275,159 UART: [art] Populate DV Done
60,280,733 UART: [fht] FMC Alias Private Key: 7
60,282,209 UART: [art] Derive CDI
60,282,963 UART: [art] Store in in slot 0x4
60,325,784 UART: [art] Derive Key Pair
60,326,816 UART: [art] Store priv key in slot 0x5
62,753,310 UART: [art] Derive Key Pair - Done
62,766,183 UART: [art] Signing Cert with AUTHO
62,767,487 UART: RITY.KEYID = 7
64,473,301 UART: [art] Erasing AUTHORITY.KEYID = 7
64,474,817 UART: [art] PUB.X = 630D18E520ACD4E4AF0D64261AE3D6EDE8C252C1A4CE90D9304CE18DC733F48AC1126472B3F97442C7D1A8364F4AE13B
64,482,140 UART: [art] PUB.Y = 8BFF96DF4EC12088691146E9F4A32683C525B7C0FD11F0E433D9BE7585BBB57DE85530590DDA83E9D39BED2C4E825EE6
64,489,368 UART: [art] SIG.R = EF8B8E3C58EA9A84EE6F1ECC7F7C250A095CC2374B3205500700C6CA3613C9BC5C8C3ECBC79678752CCA8967AB57FC91
64,496,755 UART: [art] SIG.S = 7F624F95DD8CABBAB50FF2FD8F09E649E02E1F130A1CC82AE55148661512FBA896C31CA2ED6CD94E84EBB623D6AA4A71
65,475,243 UART: mbox::rt_entry...
65,476,188 UART: ____ _ _ _ ____ _____
65,478,267 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
65,480,270 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
65,482,189 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
65,484,109 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
65,486,028 UART: |_|
65,486,832 UART:
65,771,262 UART: [rt] Runtime listening for mailbox commands...
65,773,427 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,438,491 ready_for_fw is high
3,439,155 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,988,851 >>> mbox cmd response: success
13,989,523 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,278,952 UART:
18,279,349 UART: Running Caliptra FMC ...
18,280,460 UART:
18,280,612 UART: [state] CFI Enabled
18,346,093 UART: [fht] FMC Alias Private Key: 7
20,110,583 UART: [art] Extend RT PCRs Done
20,111,811 UART: [art] Lock RT PCRs Done
20,113,231 UART: [art] Populate DV Done
20,118,816 UART: [fht] FMC Alias Private Key: 7
20,120,488 UART: [art] Derive CDI
20,121,231 UART: [art] Store in in slot 0x4
20,178,192 UART: [art] Derive Key Pair
20,179,190 UART: [art] Store priv key in slot 0x5
22,642,044 UART: [art] Derive Key Pair - Done
22,655,474 UART: [art] Signing Cert with AUTHO
22,656,771 UART: RITY.KEYID = 7
24,368,456 UART: [art] Erasing AUTHORITY.KEYID = 7
24,369,968 UART: [art] PUB.X = CC4805A712744FA70F91286A744CB0A45D3B91AC8DBF811C8E2EC4E8302B053921D221B5D11C5075782DA5392C2AF14C
24,377,219 UART: [art] PUB.Y = CEB94556FF0098F20D4C4E7F61A532D526EBBD7CDDD34C2E3199059701B7F1D9C0B4BDAC7FBA02C994955ACC5F6A9878
24,384,452 UART: [art] SIG.R = C8FEAAA558CB217FECBDBF9BB7E5DD5C19175E3D17CEDCF5D163240DAAA9366A9A55D5E1A5D2F93C35A811D0E9EF92EF
24,391,894 UART: [art] SIG.S = F7ECF4D74132FE53EBEB96C3D1CD4C5B4CE29FBD5DCCE9316BECFDCFABFE7EE3608CCC0B1C11AAB767181072449574FB
25,370,216 UART: mbox::rt_entry...
25,371,184 UART: ____ _ _ _ ____ _____
25,373,167 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,375,168 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,377,116 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,379,081 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,381,012 UART: |_|
25,382,025 UART:
25,495,053 UART: [rt] Runtime listening for mailbox commands...
25,497,171 >>> mbox cmd response data (48 bytes)
27,560,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,385,585 >>> mbox cmd response: success
35,386,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,418,590 UART:
35,418,878 UART: Running Caliptra FMC ...
35,420,001 UART:
35,420,190 UART: [state] CFI Enabled
35,510,960 UART: [art] Extend RT PCRs Done
35,512,143 UART: [art] Lock RT PCRs Done
35,513,386 UART: [art] Populate DV Done
35,518,797 UART: [fht] FMC Alias Private Key: 7
35,520,273 UART: [art] Derive CDI
35,521,055 UART: [art] Store in in slot 0x4
35,579,914 UART: [art] Derive Key Pair
35,580,947 UART: [art] Store priv key in slot 0x5
38,044,395 UART: [art] Derive Key Pair - Done
38,057,185 UART: [art] Signing Cert with AUTHO
38,058,495 UART: RITY.KEYID = 7
39,769,473 UART: [art] Erasing AUTHORITY.KEYID = 7
39,770,974 UART: [art] PUB.X = 64EEB56729491338D8B9BA31FC49AB782C79DC59AFEB6B4790ACD82383E35B6417EB993585B66642AC19CE4787D22184
39,778,227 UART: [art] PUB.Y = 6F7B30576BDC1207095E83A2D78C6CCE8006F08F04D3AA7638CD485B308A53FFB39CB3AC47C7C18651D0BD09D02CED21
39,785,488 UART: [art] SIG.R = 11D48BC8BF894FA0410FB0206A651E2EAC0FC9B60CC07E20DF3050F5A0F188CD8CE2285D20DBC2FB189512E5D1380B36
39,792,905 UART: [art] SIG.S = 55D9F5DE2AD2DBA214979538C841927B4C4AA44D07494C1B00F160D1AC34445F323DAE6B38FC1913AC8B84CC5392C256
40,771,841 UART: Caliptra RT
40,772,538 UART: [state] CFI Enabled
41,112,345 UART: [rt] RT listening for mailbox commands...
41,144,666 UART: [rt]cmd =0x4d454153, len=108
41,162,804 >>> mbox cmd response data (12 bytes)
43,211,032 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
50,212,751 >>> mbox cmd response: success
52,259,086 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
52,358,927 UART:
52,359,328 UART: Running Caliptra FMC ...
52,360,406 UART:
52,360,568 UART: [state] CFI Enabled
52,361,442 UART: [art] Extend RT PCRs Done
52,362,584 UART: [art] Lock RT PCRs Done
52,363,659 UART: [art] Populate DV Done
52,364,689 UART: [fht] FMC Alias Private Key: 7
52,366,005 UART: [art] Derive CDI
52,366,751 UART: [art] Store in in slot 0x4
52,367,919 UART: [art] Derive Key Pair
52,368,857 UART: [art] Store priv key in slot 0x5
52,872,191 UART: [art] Derive Key Pair - Done
52,885,274 UART: [art] Signing Cert with AUTHO
52,886,574 UART: RITY.KEYID = 7
54,598,212 UART: [art] Erasing AUTHORITY.KEYID = 7
54,599,719 UART: [art] PUB.X = 4EECA2BF84E3794ABB27332C970608C694F50D2B66352DF1EFED46C53AD89C3EEA960A22E96AB57C7C55AF7BDFFD654C
54,607,043 UART: [art] PUB.Y = 2595E6D93B03E03B87B1DBDA93AA43B73EB9635FEC46CCAB8C18E4F1F6E3563C64770E479E5EA05F51DDD481067EDBAB
54,614,331 UART: [art] SIG.R = 1766EED2859D523701C9400000E9F4C694C8F64B5B102161E2311E694875186F8A64B499884B07D3519C55A7E189EC72
54,621,660 UART: [art] SIG.S = 8BE37459826122F29CDE0C8C4807762ADC360BC6E5A91FC1B3ECE87C3C45D6B6F33CB30860D88E9349185BDA3897B7C0
55,600,496 UART: mbox::rt_entry...
55,601,464 UART: ____ _ _ _ ____ _____
55,603,445 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,605,447 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,607,374 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,609,300 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,611,234 UART: |_|
55,612,215 UART:
55,899,168 UART: [rt] Runtime listening for mailbox commands...
62,809,852 >>> mbox cmd response: success
62,810,242 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,844,280 UART:
62,844,584 UART: Running Caliptra FMC ...
62,845,725 UART:
62,845,884 UART: [state] CFI Enabled
62,945,802 UART: [art] Extend RT PCRs Done
62,946,986 UART: [art] Lock RT PCRs Done
62,948,389 UART: [art] Populate DV Done
62,953,630 UART: [fht] FMC Alias Private Key: 7
62,955,333 UART: [art] Derive CDI
62,956,142 UART: [art] Store in in slot 0x4
63,014,555 UART: [art] Derive Key Pair
63,015,595 UART: [art] Store priv key in slot 0x5
65,478,387 UART: [art] Derive Key Pair - Done
65,491,766 UART: [art] Signing Cert with AUTHO
65,493,071 UART: RITY.KEYID = 7
67,204,917 UART: [art] Erasing AUTHORITY.KEYID = 7
67,206,423 UART: [art] PUB.X = 4BE2EE40A4FF26FA6564538B59623B92524724215C26985B03A5B5DD0438128B01C22F9DFAC1517BDB9D776B5A77A202
67,213,728 UART: [art] PUB.Y = DFAFC643B80E10088B25255A601C42F27A1852976C8713245321341AEC98E0A005A1D62E77356C8101FE522DBC76623E
67,220,924 UART: [art] SIG.R = B40DA1B706A98E6B5A83147315F2C50AD4782B6129A33994FEFF3B66E2809075EB066B32B8D9A7AE1EB4DD2B54B3B57F
67,228,352 UART: [art] SIG.S = 4449319D1591DFDC9100201AD4350272E8A04C43B5FFE3C716C28FC27DD03C511EBCED02B41AD93C3C5D3E7FAA93A5E7
68,206,442 UART: mbox::rt_entry...
68,207,386 UART: ____ _ _ _ ____ _____
68,209,420 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,211,425 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,213,355 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,215,288 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,217,140 UART: |_|
68,217,942 UART:
68,504,662 UART: [rt] Runtime listening for mailbox commands...
68,506,829 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,753,211 ready_for_fw is high
3,753,633 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,203,668 >>> mbox cmd response: success
14,204,382 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,457,224 UART:
18,457,647 UART: Running Caliptra FMC ...
18,458,764 UART:
18,458,907 UART: [state] CFI Enabled
18,466,920 UART: [fht] FMC Alias Private Key: 7
20,223,970 UART: [art] Extend RT PCRs Done
20,225,186 UART: [art] Lock RT PCRs Done
20,226,791 UART: [art] Populate DV Done
20,232,306 UART: [fht] FMC Alias Private Key: 7
20,234,060 UART: [art] Derive CDI
20,234,794 UART: [art] Store in in slot 0x4
20,277,548 UART: [art] Derive Key Pair
20,278,585 UART: [art] Store priv key in slot 0x5
22,705,497 UART: [art] Derive Key Pair - Done
22,718,546 UART: [art] Signing Cert with AUTHO
22,719,844 UART: RITY.KEYID = 7
24,425,095 UART: [art] Erasing AUTHORITY.KEYID = 7
24,426,595 UART: [art] PUB.X = 48C6C4854F286F0F51CA1374CA4563D3F0FBA6A6B6522B39B99F983FC07D86505A6EC54BE551D1EDE0EBD68DCA99F630
24,433,840 UART: [art] PUB.Y = F6E73F77625B274B489661F4B5E61CFAA7BFE8B3D8AE182BE22DB4C6C53B8C01EBD68BCCC82848142EB2F5D8512D1E4E
24,441,128 UART: [art] SIG.R = D7DD48F01591F7340F04246DBA27857AAFF3D3F00C7AAD66ACFCE298BA694D54730B6905F7945A5C76A126D1123821FB
24,448,517 UART: [art] SIG.S = EFBA071ACED78F32E7823711755283EE62FA19680FB9A1E4AFDD7AD7BF4E96511AFDE17C7290C0C46100131A00801747
25,426,752 UART: mbox::rt_entry...
25,427,720 UART: ____ _ _ _ ____ _____
25,429,703 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,431,700 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,433,622 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,435,581 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,437,424 UART: |_|
25,438,295 UART:
25,551,731 UART: [rt] Runtime listening for mailbox commands...
25,553,898 >>> mbox cmd response data (48 bytes)
27,611,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,343,500 >>> mbox cmd response: success
35,344,183 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,377,405 UART:
35,377,699 UART: Running Caliptra FMC ...
35,378,810 UART:
35,378,965 UART: [state] CFI Enabled
35,422,626 UART: [art] Extend RT PCRs Done
35,423,814 UART: [art] Lock RT PCRs Done
35,425,213 UART: [art] Populate DV Done
35,430,642 UART: [fht] FMC Alias Private Key: 7
35,432,131 UART: [art] Derive CDI
35,432,884 UART: [art] Store in in slot 0x4
35,476,123 UART: [art] Derive Key Pair
35,477,160 UART: [art] Store priv key in slot 0x5
37,904,521 UART: [art] Derive Key Pair - Done
37,917,408 UART: [art] Signing Cert with AUTHO
37,918,702 UART: RITY.KEYID = 7
39,624,366 UART: [art] Erasing AUTHORITY.KEYID = 7
39,625,865 UART: [art] PUB.X = 97D45F792074498F4AFA901B40584AC03C6D943E2090D52A5E35E2693F8461F16713F5D3A5940F78E5F00F19D43B081A
39,633,158 UART: [art] PUB.Y = 88DDF10B7FC0D2ECF3EB52FD536774FAA88E4BF054AFDC19CCA8605AF24DE667750A9BA47D4D62B7A31A0DD12D00FFBB
39,640,435 UART: [art] SIG.R = 2818062CF4C23316E72B1B36344E86DCB9243D7191FDAD996CCBDA061991BDA5410BD627A8F7F447BBEF5AB4F7F25D93
39,647,819 UART: [art] SIG.S = D2C07F61C600A88655F738882608007E595700FC3388E2D26E5576933C6A9B8BDD5A64F96845E292DC2134D7CFAE6AF7
40,626,321 UART: Caliptra RT
40,627,019 UART: [state] CFI Enabled
40,916,477 UART: [rt] RT listening for mailbox commands...
40,948,683 UART: [rt]cmd =0x4d454153, len=108
40,967,288 >>> mbox cmd response data (12 bytes)
43,016,555 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
49,949,488 >>> mbox cmd response: success
51,993,546 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
52,093,075 UART:
52,093,458 UART: Running Caliptra FMC ...
52,094,592 UART:
52,094,749 UART: [state] CFI Enabled
52,095,664 UART: [art] Extend RT PCRs Done
52,096,821 UART: [art] Lock RT PCRs Done
52,097,892 UART: [art] Populate DV Done
52,098,916 UART: [fht] FMC Alias Private Key: 7
52,100,231 UART: [art] Derive CDI
52,100,961 UART: [art] Store in in slot 0x4
52,102,119 UART: [art] Derive Key Pair
52,103,430 UART: [art] Store priv key in slot 0x5
52,508,386 UART: [art] Derive Key Pair - Done
52,521,257 UART: [art] Signing Cert with AUTHO
52,522,551 UART: RITY.KEYID = 7
54,227,599 UART: [art] Erasing AUTHORITY.KEYID = 7
54,229,105 UART: [art] PUB.X = 9E433ACB4BEFC2E0B589695239172381A9F575E55126BD945B5506F43DEEA63A8D1C3C8981778EE555CB5C2BAB7F3CDD
54,236,400 UART: [art] PUB.Y = A5B57357ED4F103DE7E5DA7E263FA4A6C63BCDA260800A872279062E7947CE15B12F05536CBEC3B88F4DE099F347B0DF
54,243,690 UART: [art] SIG.R = A5E29F2373C7F8107DB6B766E0AFEE85E22BA9D7A57F57977DAAFE11CC522084EB942D4D44D54999C248D4ED47DB2F18
54,251,072 UART: [art] SIG.S = 96285C588534D946E39886B58706271890EF5EB50AFEBA7CA152A325EA1F9F4DD932987D16D71763333026428810BA85
55,229,414 UART: mbox::rt_entry...
55,230,385 UART: ____ _ _ _ ____ _____
55,232,284 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,234,275 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,236,122 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,238,036 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,239,883 UART: |_|
55,240,755 UART:
55,527,544 UART: [rt] Runtime listening for mailbox commands...
62,357,405 >>> mbox cmd response: success
62,358,434 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,391,302 UART:
62,391,572 UART: Running Caliptra FMC ...
62,392,684 UART:
62,392,835 UART: [state] CFI Enabled
62,437,236 UART: [art] Extend RT PCRs Done
62,438,424 UART: [art] Lock RT PCRs Done
62,439,787 UART: [art] Populate DV Done
62,445,407 UART: [fht] FMC Alias Private Key: 7
62,446,881 UART: [art] Derive CDI
62,447,637 UART: [art] Store in in slot 0x4
62,490,058 UART: [art] Derive Key Pair
62,491,057 UART: [art] Store priv key in slot 0x5
64,917,948 UART: [art] Derive Key Pair - Done
64,930,676 UART: [art] Signing Cert with AUTHO
64,931,973 UART: RITY.KEYID = 7
66,637,465 UART: [art] Erasing AUTHORITY.KEYID = 7
66,638,959 UART: [art] PUB.X = 1085CF414D8ABBABF7CCC7AC16BC7F5FF221AFEB8DC6A7053BF9B28BE8F4D905209098155E734E29A9614741A2C2688E
66,646,249 UART: [art] PUB.Y = 45EF0A404F217D30E610113343C19913EAB4F2512B978E5FAA8067D31325CB3651E7E799312F3F6798B6961D6E5D302D
66,653,477 UART: [art] SIG.R = 325C4F139F90867E87EDC5FE81C940925FE2B2D7842631C4688957DB3C552DC7391E7575AB0BF6628F400A55158ED781
66,660,867 UART: [art] SIG.S = 48708D03B0EC18623A8F5BB3D4502C0DCCB993513B0EB57B2B645873A1086A627F7DEFE18F95054B786021EB251B95AE
67,638,892 UART: mbox::rt_entry...
67,639,833 UART: ____ _ _ _ ____ _____
67,641,896 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,643,902 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,645,825 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,647,752 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,649,597 UART: |_|
67,650,474 UART:
67,937,025 UART: [rt] Runtime listening for mailbox commands...
67,939,197 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.51s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,505,047 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,399 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,924 >>> mbox cmd response: success
2,616,924 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,617,998 UART: [afmc] ++
2,618,166 UART: [afmc] CDI.KEYID = 6
2,618,528 UART: [afmc] SUBJECT.KEYID = 7
2,618,953 UART: [afmc] AUTHORITY.KEYID = 5
2,653,822 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,110 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,503 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,193 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,152 UART: [afmc] --
2,697,276 UART: [cold-reset] --
2,698,056 UART: [state] Locking Datavault
2,699,279 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,883 UART: [state] Locking ICCM
2,700,551 UART: [exit] Launching FMC @ 0x40000130
2,705,880 UART:
2,705,896 UART: Running Caliptra FMC ...
2,706,304 UART:
2,706,358 UART: [state] CFI Enabled
2,716,809 UART: [fht] FMC Alias Private Key: 7
2,825,476 UART: [art] Extend RT PCRs Done
2,825,904 UART: [art] Lock RT PCRs Done
2,827,672 UART: [art] Populate DV Done
2,835,949 UART: [fht] FMC Alias Private Key: 7
2,837,051 UART: [art] Derive CDI
2,837,331 UART: [art] Store in in slot 0x4
2,923,050 UART: [art] Derive Key Pair
2,923,410 UART: [art] Store priv key in slot 0x5
2,937,458 UART: [art] Derive Key Pair - Done
2,952,735 UART: [art] Signing Cert with AUTHO
2,953,215 UART: RITY.KEYID = 7
2,968,265 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,030 UART: [art] PUB.X = 1AAA12C5FD7783D54072F9A279F1BFA23840F2E0FD60B8B493A1BBA374CC7AB49A82796940F752F1E04AB39A3BC3E7AE
2,975,816 UART: [art] PUB.Y = 3F22916F91AEE0E28B72B7D51A143D75185694C375678CD7FE0E25A7D20544928CB0268B1CDCBACADEFB7F2E968EC78F
2,982,774 UART: [art] SIG.R = 28BE6029198E83E3AD15F4DF75446544150EB72E2E5AD1AF08AD1667AB3120CEE7BE99D767A82E2C729ADBFFFD9E166D
2,989,554 UART: [art] SIG.S = FB60B502E9C2C7D4B9FDD986A5ABF8B240F954AC83481C4319D9763E82ACA30051DB9463CBAF8EE5E622FAE4CC09BE16
3,013,755 UART: mbox::rt_entry...
3,014,127 UART: ____ _ _ _ ____ _____
3,014,911 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,015,711 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,479 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,247 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,015 UART: |_|
3,018,327 UART:
3,125,387 UART: [rt] Runtime listening for mailbox commands...
3,126,574 >>> mbox cmd response data (48 bytes)
3,126,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,126,689 UART:
3,126,705 UART: Running Caliptra ROM ...
3,127,113 UART:
3,127,167 UART: [state] CFI Enabled
3,129,507 UART: [state] LifecycleState = Unprovisioned
3,130,162 UART: [state] DebugLocked = No
3,130,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,132,461 UART: [kat] SHA2-256
3,926,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,930,507 UART: [kat] ++
3,930,659 UART: [kat] sha1
3,935,021 UART: [kat] SHA2-256
3,936,959 UART: [kat] SHA2-384
3,939,880 UART: [kat] SHA2-512-ACC
3,941,780 UART: [kat] ECC-384
3,947,485 UART: [kat] HMAC-384Kdf
3,952,081 UART: [kat] LMS
4,520,277 UART: [kat] --
4,521,198 UART: [update-reset] ++
5,856,735 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,857,993 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,008,043 >>> mbox cmd response: success
6,008,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,008,290 UART: [update-reset] Copying MAN_2 To MAN_1
6,016,304 UART: [update-reset Success] --
6,017,153 UART: [state] Locking Datavault
6,017,955 UART: [state] Locking PCR0, PCR1 and PCR31
6,018,559 UART: [state] Locking ICCM
6,019,029 UART: [exit] Launching FMC @ 0x40000130
6,024,358 UART:
6,024,374 UART: Running Caliptra FMC ...
6,024,782 UART:
6,024,836 UART: [state] CFI Enabled
6,114,293 UART: [art] Extend RT PCRs Done
6,114,721 UART: [art] Lock RT PCRs Done
6,115,872 UART: [art] Populate DV Done
6,124,259 UART: [fht] FMC Alias Private Key: 7
6,125,327 UART: [art] Derive CDI
6,125,607 UART: [art] Store in in slot 0x4
6,211,688 UART: [art] Derive Key Pair
6,212,048 UART: [art] Store priv key in slot 0x5
6,224,766 UART: [art] Derive Key Pair - Done
6,239,418 UART: [art] Signing Cert with AUTHO
6,239,898 UART: RITY.KEYID = 7
6,254,972 UART: [art] Erasing AUTHORITY.KEYID = 7
6,255,737 UART: [art] PUB.X = F0C217A56BB5A8047E8387573DEFDE6BBD816727C8228A00E588EB8DF90E7936A8F3D41926359863C48136BCAC70E367
6,262,481 UART: [art] PUB.Y = CF8CC9352D286151F113F3042E8124C996F2F68CCFC30982CCAF03DBFD38BA7E3A7F0ABE9CA65D7A7F73A11833C981B8
6,269,435 UART: [art] SIG.R = CC13462251896C7BE0711449EFDF0960535D788A9F343322E934303A260B0C1E43D0C0B3A8263D08F6353BDA2A622B9E
6,276,189 UART: [art] SIG.S = 109DCFCE63A9AB366A63A2B3995A1FABF35B24F751386156BADCC2DD3565A29ABB3289696BC5FFF5D1F9443C47FE5ABB
6,299,928 UART: Caliptra RT
6,300,181 UART: [state] CFI Enabled
6,578,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,610,062 UART: [rt]cmd =0x4d454153, len=108
6,630,316 >>> mbox cmd response data (12 bytes)
6,630,317 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,631,197 UART:
6,631,213 UART: Running Caliptra ROM ...
6,631,621 UART:
6,631,675 UART: [state] CFI Enabled
6,634,633 UART: [state] LifecycleState = Unprovisioned
6,635,288 UART: [state] DebugLocked = No
6,635,774 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,637,365 UART: [kat] SHA2-256
7,431,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,435,411 UART: [kat] ++
7,435,563 UART: [kat] sha1
7,439,821 UART: [kat] SHA2-256
7,441,759 UART: [kat] SHA2-384
7,444,398 UART: [kat] SHA2-512-ACC
7,446,298 UART: [kat] ECC-384
7,451,817 UART: [kat] HMAC-384Kdf
7,456,475 UART: [kat] LMS
8,024,671 UART: [kat] --
8,025,450 UART: [update-reset] ++
8,953,848 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,955,132 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,051,566 >>> mbox cmd response: success
9,051,566 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
9,051,921 UART: [update-reset] Copying MAN_2 To MAN_1
9,059,935 UART: [update-reset Success] --
9,061,192 UART: [state] Locking Datavault
9,062,202 UART: [state] Locking PCR0, PCR1 and PCR31
9,062,806 UART: [state] Locking ICCM
9,063,396 UART: [exit] Launching FMC @ 0x40000130
9,068,725 UART:
9,068,741 UART: Running Caliptra FMC ...
9,069,149 UART:
9,069,203 UART: [state] CFI Enabled
9,158,726 UART: [art] Extend RT PCRs Done
9,159,154 UART: [art] Lock RT PCRs Done
9,160,249 UART: [art] Populate DV Done
9,168,386 UART: [fht] FMC Alias Private Key: 7
9,169,374 UART: [art] Derive CDI
9,169,654 UART: [art] Store in in slot 0x4
9,254,973 UART: [art] Derive Key Pair
9,255,333 UART: [art] Store priv key in slot 0x5
9,268,071 UART: [art] Derive Key Pair - Done
9,282,821 UART: [art] Signing Cert with AUTHO
9,283,301 UART: RITY.KEYID = 7
9,298,705 UART: [art] Erasing AUTHORITY.KEYID = 7
9,299,470 UART: [art] PUB.X = 9B6B71DB82A1B39A3B8654761BEFFAD4C8BA63FC2743245FF46D5AD4D09FAD58A6C3F35475B0A13D769F89EF8E80DE96
9,306,258 UART: [art] PUB.Y = B96496F9B93E09C34E16B6AAB664C9E0A3F2EA35E1FD1C6C4DB85669D6684E5089065E376F25CD8B8A7378DC8C52BC4C
9,313,214 UART: [art] SIG.R = DB261BF88C31A90535EF6E6A5946CA30F129599FC088407BD627DD10C47D99214C71CE4C5648A75AEFB6B86A6ACF9E46
9,319,991 UART: [art] SIG.S = C71CC33C55A086372E76E81D79DB0A7663200C7F4E4D3C8D4AFD3B4A632D964B1FAAA15B7B063C8FE677A3BE4B46D2DF
9,343,655 UART: mbox::rt_entry...
9,344,027 UART: ____ _ _ _ ____ _____
9,344,811 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,345,611 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,346,379 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,347,147 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,347,915 UART: |_|
9,348,227 UART:
9,625,754 UART: [rt] Runtime listening for mailbox commands...
9,626,721 UART:
9,626,737 UART: Running Caliptra ROM ...
9,627,145 UART:
9,627,199 UART: [state] CFI Enabled
9,629,895 UART: [state] LifecycleState = Unprovisioned
9,630,550 UART: [state] DebugLocked = No
9,631,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,632,823 UART: [kat] SHA2-256
10,426,754 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,430,869 UART: [kat] ++
10,431,021 UART: [kat] sha1
10,435,095 UART: [kat] SHA2-256
10,437,033 UART: [kat] SHA2-384
10,439,850 UART: [kat] SHA2-512-ACC
10,441,750 UART: [kat] ECC-384
10,447,185 UART: [kat] HMAC-384Kdf
10,451,809 UART: [kat] LMS
11,020,005 UART: [kat] --
11,020,820 UART: [update-reset] ++
11,947,242 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,948,330 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
12,044,764 >>> mbox cmd response: success
12,044,764 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,044,991 UART: [update-reset] Copying MAN_2 To MAN_1
12,053,005 UART: [update-reset Success] --
12,054,154 UART: [state] Locking Datavault
12,055,022 UART: [state] Locking PCR0, PCR1 and PCR31
12,055,626 UART: [state] Locking ICCM
12,056,288 UART: [exit] Launching FMC @ 0x40000130
12,061,617 UART:
12,061,633 UART: Running Caliptra FMC ...
12,062,041 UART:
12,062,095 UART: [state] CFI Enabled
12,151,146 UART: [art] Extend RT PCRs Done
12,151,574 UART: [art] Lock RT PCRs Done
12,152,969 UART: [art] Populate DV Done
12,161,166 UART: [fht] FMC Alias Private Key: 7
12,162,286 UART: [art] Derive CDI
12,162,566 UART: [art] Store in in slot 0x4
12,248,563 UART: [art] Derive Key Pair
12,248,923 UART: [art] Store priv key in slot 0x5
12,262,281 UART: [art] Derive Key Pair - Done
12,277,151 UART: [art] Signing Cert with AUTHO
12,277,631 UART: RITY.KEYID = 7
12,292,773 UART: [art] Erasing AUTHORITY.KEYID = 7
12,293,538 UART: [art] PUB.X = C19321FB8EEA4979DC69861DEB7155E16EC19418206DE52C017D7DB2ABBEC232FC1291DADE801959BC7ECD6A389A09FC
12,300,320 UART: [art] PUB.Y = D6BC83E1ECDE7C80422B4D24693F6110F76FDEDFE9FFBE25AFA19C08508C703805C681292531F860A0E710EC41195CAC
12,307,276 UART: [art] SIG.R = 11692877E25D6E4E489CD292D447DDB31B16DA8894A5C9895AA6ACCA50D16C980B34E30BF6E060199A23F728ADFDC54C
12,314,050 UART: [art] SIG.S = 1A289E9FE9CD7CCE6E4D29CF68E4E77EE0A5F82AE965926501A56A7C86FB4BA68000E6B9446D3E5D9F4DB4E827C1F4E1
12,338,068 UART: mbox::rt_entry...
12,338,440 UART: ____ _ _ _ ____ _____
12,339,224 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,340,024 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,340,792 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,341,560 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,342,328 UART: |_|
12,342,640 UART:
12,619,277 UART: [rt] Runtime listening for mailbox commands...
12,620,473 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,627 ready_for_fw is high
1,361,627 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,308 >>> mbox cmd response: success
2,465,308 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,526,414 UART:
2,526,430 UART: Running Caliptra FMC ...
2,526,838 UART:
2,526,892 UART: [state] CFI Enabled
2,537,697 UART: [fht] FMC Alias Private Key: 7
2,644,972 UART: [art] Extend RT PCRs Done
2,645,400 UART: [art] Lock RT PCRs Done
2,647,190 UART: [art] Populate DV Done
2,655,287 UART: [fht] FMC Alias Private Key: 7
2,656,215 UART: [art] Derive CDI
2,656,495 UART: [art] Store in in slot 0x4
2,741,782 UART: [art] Derive Key Pair
2,742,142 UART: [art] Store priv key in slot 0x5
2,755,104 UART: [art] Derive Key Pair - Done
2,769,646 UART: [art] Signing Cert with AUTHO
2,770,126 UART: RITY.KEYID = 7
2,785,718 UART: [art] Erasing AUTHORITY.KEYID = 7
2,786,483 UART: [art] PUB.X = ACF492BF6B74F80A0D4AD09D882BB541F337990A4A92AF1B327B8D45F8423543CB172E141157CF968AF22035D97E3131
2,793,246 UART: [art] PUB.Y = 6CD987C6DB1521B11F1A68A3C13B1371E48F66033B4A30FCADC1B6AFC178B8B1987E7D882635BBAE2C4FBF41CBB95942
2,800,209 UART: [art] SIG.R = 129863850A7A8F02628C1907D7B7409951DBCF297F88C83983D731FA6B78350CC4183C522071C161AD22B16A4F893317
2,806,955 UART: [art] SIG.S = 131332BA94C8D4F684CA609C7BBFE13412BCCEA41A481E4FE9BB28F41AAE9EBB781140E01938FB904A7D062CEF728CFA
2,830,945 UART: mbox::rt_entry...
2,831,317 UART: ____ _ _ _ ____ _____
2,832,101 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,832,901 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,833,669 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,834,437 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,205 UART: |_|
2,835,517 UART:
2,943,230 UART: [rt] Runtime listening for mailbox commands...
2,944,417 >>> mbox cmd response data (48 bytes)
2,944,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,707,166 >>> mbox cmd response: success
5,707,166 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,720,595 UART:
5,720,611 UART: Running Caliptra FMC ...
5,721,019 UART:
5,721,073 UART: [state] CFI Enabled
5,810,308 UART: [art] Extend RT PCRs Done
5,810,736 UART: [art] Lock RT PCRs Done
5,812,009 UART: [art] Populate DV Done
5,820,268 UART: [fht] FMC Alias Private Key: 7
5,821,392 UART: [art] Derive CDI
5,821,672 UART: [art] Store in in slot 0x4
5,907,467 UART: [art] Derive Key Pair
5,907,827 UART: [art] Store priv key in slot 0x5
5,920,591 UART: [art] Derive Key Pair - Done
5,935,665 UART: [art] Signing Cert with AUTHO
5,936,145 UART: RITY.KEYID = 7
5,951,075 UART: [art] Erasing AUTHORITY.KEYID = 7
5,951,840 UART: [art] PUB.X = 983420815981560CB06E24A7EEA78F34855B28D66A721842102DFBE8ACF147B1F3F5F004EC1E3CB20B3CE81208FF4F2A
5,958,604 UART: [art] PUB.Y = 07BEE9F48015CAB25C6632DB06BD5F95BC4283296B9978C6024EF18937FBF02A9175785D0B53F5B2915266E2DBABB5B6
5,965,548 UART: [art] SIG.R = BE4BF0F49D807DB9AD1AA56641DE17FD5948B7456DEAC07193FC5D737C0E07E010E10B498066002BB36D4015970BB344
5,972,290 UART: [art] SIG.S = 4FDF3F484E24D2D977902EEC145C82EC7B6E2F6E82475EBF62231B3F0433DAFDFF50C26D49863222C9BBF53D1BD0E573
5,996,360 UART: Caliptra RT
5,996,613 UART: [state] CFI Enabled
6,271,670 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,302,586 UART: [rt]cmd =0x4d454153, len=108
6,322,890 >>> mbox cmd response data (12 bytes)
6,322,891 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,623,850 >>> mbox cmd response: success
8,623,850 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,637,157 UART:
8,637,173 UART: Running Caliptra FMC ...
8,637,581 UART:
8,637,635 UART: [state] CFI Enabled
8,726,490 UART: [art] Extend RT PCRs Done
8,726,918 UART: [art] Lock RT PCRs Done
8,727,983 UART: [art] Populate DV Done
8,736,280 UART: [fht] FMC Alias Private Key: 7
8,737,226 UART: [art] Derive CDI
8,737,506 UART: [art] Store in in slot 0x4
8,823,175 UART: [art] Derive Key Pair
8,823,535 UART: [art] Store priv key in slot 0x5
8,837,013 UART: [art] Derive Key Pair - Done
8,851,893 UART: [art] Signing Cert with AUTHO
8,852,373 UART: RITY.KEYID = 7
8,867,113 UART: [art] Erasing AUTHORITY.KEYID = 7
8,867,878 UART: [art] PUB.X = AB66D32468FA5A1DE77B50A574D1CC91AC57E7879A058267BD055F4CB6F01BD464416062592227F7C765B7FEA7A7A2C9
8,874,648 UART: [art] PUB.Y = 9BD51615F1F8687DE456845690FE123E17E922D8A738D6020A0AA3086AEBEACA36EACF357B63CBAAFE91AA93218CDF95
8,881,602 UART: [art] SIG.R = 20FFD3705BB57471946B01AF8C08F3696489D78C12F95CADE8F229B636AD2A32A5BE75810B2300083BEC22BC4D176FA9
8,888,344 UART: [art] SIG.S = 865064D2D1D1914DF574F0FF1BA2DAC1B6FF2211015F952D49A9D3142D189E0905C2F1A1EDCA4A8A8413145F4DAD9526
8,912,328 UART: mbox::rt_entry...
8,912,700 UART: ____ _ _ _ ____ _____
8,913,484 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,914,284 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,915,052 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,915,820 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,916,588 UART: |_|
8,916,900 UART:
9,196,260 UART: [rt] Runtime listening for mailbox commands...
11,497,936 >>> mbox cmd response: success
11,497,936 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,511,315 UART:
11,511,331 UART: Running Caliptra FMC ...
11,511,739 UART:
11,511,793 UART: [state] CFI Enabled
11,600,878 UART: [art] Extend RT PCRs Done
11,601,306 UART: [art] Lock RT PCRs Done
11,602,517 UART: [art] Populate DV Done
11,610,748 UART: [fht] FMC Alias Private Key: 7
11,611,818 UART: [art] Derive CDI
11,612,098 UART: [art] Store in in slot 0x4
11,697,669 UART: [art] Derive Key Pair
11,698,029 UART: [art] Store priv key in slot 0x5
11,711,275 UART: [art] Derive Key Pair - Done
11,726,105 UART: [art] Signing Cert with AUTHO
11,726,585 UART: RITY.KEYID = 7
11,741,869 UART: [art] Erasing AUTHORITY.KEYID = 7
11,742,634 UART: [art] PUB.X = 6789A55759B05C48231005C00F267BF89CDDB8FD25BDBBAD4AD9014B292CD3574107A2DF3CCEF8DE6FD07C465596E06B
11,749,406 UART: [art] PUB.Y = B918DF78D96EAFA3D9F3061B724738BB29DE4159FB910B892F61B17D4586EED94CFF2C9C21A689BCDA65954140CED294
11,756,362 UART: [art] SIG.R = 6A20C134EA5DCAFA457CAA6B71902538D54A2A1D4DF22B0C5F87AB6C663919B65E3A8BC5CE48B87884A762208DA13A30
11,763,141 UART: [art] SIG.S = 21E94DC866D675B8B348BF9176E6D6E352EF5058FABEF7D125EE7DB11BF545CA538A52FD9F9FB2BFADF798D9EF4E6DB3
11,787,104 UART: mbox::rt_entry...
11,787,476 UART: ____ _ _ _ ____ _____
11,788,260 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,789,060 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,789,828 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,790,596 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,791,364 UART: |_|
11,791,676 UART:
12,071,433 UART: [rt] Runtime listening for mailbox commands...
12,072,629 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.50s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,505,882 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,234 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,757 >>> mbox cmd response: success
2,617,757 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,618,859 UART: [afmc] ++
2,619,027 UART: [afmc] CDI.KEYID = 6
2,619,389 UART: [afmc] SUBJECT.KEYID = 7
2,619,814 UART: [afmc] AUTHORITY.KEYID = 5
2,655,047 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,251 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,031 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,759 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,644 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,334 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,193 UART: [afmc] --
2,698,195 UART: [cold-reset] --
2,698,927 UART: [state] Locking Datavault
2,700,108 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,712 UART: [state] Locking ICCM
2,701,300 UART: [exit] Launching FMC @ 0x40000130
2,706,629 UART:
2,706,645 UART: Running Caliptra FMC ...
2,707,053 UART:
2,707,196 UART: [state] CFI Enabled
2,717,489 UART: [fht] FMC Alias Private Key: 7
2,826,020 UART: [art] Extend RT PCRs Done
2,826,448 UART: [art] Lock RT PCRs Done
2,828,060 UART: [art] Populate DV Done
2,836,179 UART: [fht] FMC Alias Private Key: 7
2,837,295 UART: [art] Derive CDI
2,837,575 UART: [art] Store in in slot 0x4
2,922,842 UART: [art] Derive Key Pair
2,923,202 UART: [art] Store priv key in slot 0x5
2,937,294 UART: [art] Derive Key Pair - Done
2,952,223 UART: [art] Signing Cert with AUTHO
2,952,703 UART: RITY.KEYID = 7
2,967,743 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,508 UART: [art] PUB.X = 8F142E96BE234A5E8665B736E4864C8B5A7648396A0B954073B7DA6B7D96249FCBC1D0E85126696E35DE6A3EE2B673B8
2,975,277 UART: [art] PUB.Y = DC1C3A6E67F2871C3DC90E87FA63820BD6F425BDEF96A39352FB8CD0F8E827FA3D1829D36F529802651D8EE1BFCD1547
2,982,232 UART: [art] SIG.R = 8039B119B597BCF52535695373F07728804E7084B27F369D1B8567A37C3F33E7064ED4DD6FF47E56653CB032B4F7C167
2,988,991 UART: [art] SIG.S = C17C0183F1783F220424088B2FBF2585B80CEC63F310D220E42858434EC50259566348D1BA0297A085B2CA604E2CCBC9
3,012,554 UART: mbox::rt_entry...
3,012,926 UART: ____ _ _ _ ____ _____
3,013,710 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,510 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,278 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,016,046 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,814 UART: |_|
3,017,126 UART:
3,124,957 UART: [rt] Runtime listening for mailbox commands...
3,126,144 >>> mbox cmd response data (48 bytes)
3,126,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,126,259 UART:
3,126,275 UART: Running Caliptra ROM ...
3,126,683 UART:
3,126,824 UART: [state] CFI Enabled
3,129,394 UART: [state] LifecycleState = Unprovisioned
3,130,049 UART: [state] DebugLocked = No
3,130,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,132,270 UART: [kat] SHA2-256
3,926,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,930,316 UART: [kat] ++
3,930,468 UART: [kat] sha1
3,934,640 UART: [kat] SHA2-256
3,936,578 UART: [kat] SHA2-384
3,939,361 UART: [kat] SHA2-512-ACC
3,941,261 UART: [kat] ECC-384
3,947,128 UART: [kat] HMAC-384Kdf
3,951,750 UART: [kat] LMS
4,519,946 UART: [kat] --
4,520,961 UART: [update-reset] ++
5,857,440 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,858,594 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,008,644 >>> mbox cmd response: success
6,008,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,008,947 UART: [update-reset] Copying MAN_2 To MAN_1
6,016,961 UART: [update-reset Success] --
6,017,942 UART: [state] Locking Datavault
6,018,820 UART: [state] Locking PCR0, PCR1 and PCR31
6,019,424 UART: [state] Locking ICCM
6,020,052 UART: [exit] Launching FMC @ 0x40000130
6,025,381 UART:
6,025,397 UART: Running Caliptra FMC ...
6,025,805 UART:
6,025,948 UART: [state] CFI Enabled
6,114,861 UART: [art] Extend RT PCRs Done
6,115,289 UART: [art] Lock RT PCRs Done
6,116,460 UART: [art] Populate DV Done
6,124,575 UART: [fht] FMC Alias Private Key: 7
6,125,723 UART: [art] Derive CDI
6,126,003 UART: [art] Store in in slot 0x4
6,211,606 UART: [art] Derive Key Pair
6,211,966 UART: [art] Store priv key in slot 0x5
6,224,728 UART: [art] Derive Key Pair - Done
6,239,776 UART: [art] Signing Cert with AUTHO
6,240,256 UART: RITY.KEYID = 7
6,255,566 UART: [art] Erasing AUTHORITY.KEYID = 7
6,256,331 UART: [art] PUB.X = B45A245B34AE3E7AD20ADF0CD88B054753CFFA0F17ADC24128569AF8BA5C8EF75A5970CC0A15EA5D0B43B2FE234D24E8
6,263,105 UART: [art] PUB.Y = 10C02194900A4C35A99AF44C821CEA36AE6B6B995C709DCE731861C2CD0F441FEC6703633141D6D4530DBFC2B41D00E4
6,270,027 UART: [art] SIG.R = 126AC7A6F5B4063368C3AD3C6CB507EBCC20F1833564CF315570F643B1F507949AA304F08D3277DC026184A1555C57C1
6,276,780 UART: [art] SIG.S = BDA134B9EAC80FC2C14653059FF5DC1580644ED64F7299CEBD11B5A35E10F274B92419541548EE786810ABF2F9F715C5
6,300,531 UART: Caliptra RT
6,300,876 UART: [state] CFI Enabled
6,584,059 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,615,369 UART: [rt]cmd =0x4d454153, len=108
6,635,603 >>> mbox cmd response data (12 bytes)
6,635,604 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,636,466 UART:
6,636,482 UART: Running Caliptra ROM ...
6,636,890 UART:
6,637,031 UART: [state] CFI Enabled
6,640,161 UART: [state] LifecycleState = Unprovisioned
6,640,816 UART: [state] DebugLocked = No
6,641,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,642,979 UART: [kat] SHA2-256
7,436,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,441,025 UART: [kat] ++
7,441,177 UART: [kat] sha1
7,445,431 UART: [kat] SHA2-256
7,447,369 UART: [kat] SHA2-384
7,450,336 UART: [kat] SHA2-512-ACC
7,452,236 UART: [kat] ECC-384
7,457,693 UART: [kat] HMAC-384Kdf
7,462,389 UART: [kat] LMS
8,030,585 UART: [kat] --
8,031,562 UART: [update-reset] ++
8,959,584 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,960,666 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,057,100 >>> mbox cmd response: success
9,057,100 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
9,057,289 UART: [update-reset] Copying MAN_2 To MAN_1
9,065,303 UART: [update-reset Success] --
9,066,444 UART: [state] Locking Datavault
9,067,166 UART: [state] Locking PCR0, PCR1 and PCR31
9,067,770 UART: [state] Locking ICCM
9,068,376 UART: [exit] Launching FMC @ 0x40000130
9,073,705 UART:
9,073,721 UART: Running Caliptra FMC ...
9,074,129 UART:
9,074,272 UART: [state] CFI Enabled
9,163,661 UART: [art] Extend RT PCRs Done
9,164,089 UART: [art] Lock RT PCRs Done
9,165,478 UART: [art] Populate DV Done
9,173,845 UART: [fht] FMC Alias Private Key: 7
9,174,983 UART: [art] Derive CDI
9,175,263 UART: [art] Store in in slot 0x4
9,260,748 UART: [art] Derive Key Pair
9,261,108 UART: [art] Store priv key in slot 0x5
9,274,060 UART: [art] Derive Key Pair - Done
9,288,791 UART: [art] Signing Cert with AUTHO
9,289,271 UART: RITY.KEYID = 7
9,304,443 UART: [art] Erasing AUTHORITY.KEYID = 7
9,305,208 UART: [art] PUB.X = 37F0DD8CF63609092D68F6BDC9F0C56C870E06FF5E436A1EAD3ACD42A640D0D302DED36DDA2FEEF2EF031E97A8AA0430
9,311,981 UART: [art] PUB.Y = 3FBE1B5BA7C5FB22D4DBFE0C89212FDED45963E96C11AFB595CDEE467EB15A47C4794F6B55F57596C8B354006A62B56A
9,318,924 UART: [art] SIG.R = 883B1CA7AD39A69BF1DEC03B7A2F040BDA40735B78A7B7F8170240FA7650563EA5B710D2E5E751A4E536E620386F8C15
9,325,691 UART: [art] SIG.S = 087914665666E7D2D46D1B39AA6FE9DC421D5DA18D4F6502DAFBD43D7C72401A2695FA30709A5C2793BFDAD80C180D92
9,349,144 UART: mbox::rt_entry...
9,349,516 UART: ____ _ _ _ ____ _____
9,350,300 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,351,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,351,868 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,352,636 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,353,404 UART: |_|
9,353,716 UART:
9,634,754 UART: [rt] Runtime listening for mailbox commands...
9,635,721 UART:
9,635,737 UART: Running Caliptra ROM ...
9,636,145 UART:
9,636,286 UART: [state] CFI Enabled
9,639,350 UART: [state] LifecycleState = Unprovisioned
9,640,005 UART: [state] DebugLocked = No
9,640,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,642,398 UART: [kat] SHA2-256
10,436,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,440,444 UART: [kat] ++
10,440,596 UART: [kat] sha1
10,444,904 UART: [kat] SHA2-256
10,446,842 UART: [kat] SHA2-384
10,449,689 UART: [kat] SHA2-512-ACC
10,451,589 UART: [kat] ECC-384
10,457,316 UART: [kat] HMAC-384Kdf
10,461,754 UART: [kat] LMS
11,029,950 UART: [kat] --
11,030,699 UART: [update-reset] ++
11,956,917 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,958,059 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
12,054,493 >>> mbox cmd response: success
12,054,493 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,054,662 UART: [update-reset] Copying MAN_2 To MAN_1
12,062,676 UART: [update-reset Success] --
12,063,795 UART: [state] Locking Datavault
12,064,573 UART: [state] Locking PCR0, PCR1 and PCR31
12,065,177 UART: [state] Locking ICCM
12,065,719 UART: [exit] Launching FMC @ 0x40000130
12,071,048 UART:
12,071,064 UART: Running Caliptra FMC ...
12,071,472 UART:
12,071,615 UART: [state] CFI Enabled
12,161,068 UART: [art] Extend RT PCRs Done
12,161,496 UART: [art] Lock RT PCRs Done
12,162,761 UART: [art] Populate DV Done
12,170,956 UART: [fht] FMC Alias Private Key: 7
12,172,058 UART: [art] Derive CDI
12,172,338 UART: [art] Store in in slot 0x4
12,258,251 UART: [art] Derive Key Pair
12,258,611 UART: [art] Store priv key in slot 0x5
12,272,009 UART: [art] Derive Key Pair - Done
12,286,708 UART: [art] Signing Cert with AUTHO
12,287,188 UART: RITY.KEYID = 7
12,302,246 UART: [art] Erasing AUTHORITY.KEYID = 7
12,303,011 UART: [art] PUB.X = 1D8764A089EF8ECFA4534CBE5FC7A9078745E7927DBC5B73012EECA4C74CBCA827BD3101D67E48B709CDAECF8664970B
12,309,784 UART: [art] PUB.Y = 4C426D4F7B890277D703B910C2EDFAB9130FFFA4123F6078998396B542549D46E243924B122A48087C91C3817CDAADC6
12,316,720 UART: [art] SIG.R = 575B9C4B7E1D97814864E628793CFEEB904B5197365ADD5A7ADB9374D57F5F338A9F94A7C14592655185C04B067519C9
12,323,483 UART: [art] SIG.S = 68A8CF198368DE757349E9F54505C511385B97C6DFC98C9B09EB33F5CC89F84B8F1813E2AF45C45E651DB8A84BABF797
12,347,864 UART: mbox::rt_entry...
12,348,236 UART: ____ _ _ _ ____ _____
12,349,020 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,349,820 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,350,588 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,351,356 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,352,124 UART: |_|
12,352,436 UART:
12,632,451 UART: [rt] Runtime listening for mailbox commands...
12,633,647 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,140 ready_for_fw is high
1,363,140 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,765 >>> mbox cmd response: success
2,467,765 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,529,161 UART:
2,529,177 UART: Running Caliptra FMC ...
2,529,585 UART:
2,529,728 UART: [state] CFI Enabled
2,540,731 UART: [fht] FMC Alias Private Key: 7
2,648,602 UART: [art] Extend RT PCRs Done
2,649,030 UART: [art] Lock RT PCRs Done
2,650,594 UART: [art] Populate DV Done
2,658,917 UART: [fht] FMC Alias Private Key: 7
2,659,857 UART: [art] Derive CDI
2,660,137 UART: [art] Store in in slot 0x4
2,746,230 UART: [art] Derive Key Pair
2,746,590 UART: [art] Store priv key in slot 0x5
2,759,372 UART: [art] Derive Key Pair - Done
2,774,246 UART: [art] Signing Cert with AUTHO
2,774,726 UART: RITY.KEYID = 7
2,789,640 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,405 UART: [art] PUB.X = F46F0B198383B2EC34BF0DFD14165E0DA1206E035DD331FAB3E44B6A96EA4771904C042D18B9F77B2AF79984B3BD1DC9
2,797,172 UART: [art] PUB.Y = 34B7189DA84523CB88D4FE133A326BACDBEE3F0A9CA615622604B9D16B64AEB80A24C04A1111B5E2A6279C125908E45E
2,804,118 UART: [art] SIG.R = 3B24E745D59633460880CA6F663DE44DC9B814714755AB38CF2A949EC1BB416328D034F5502DF27A21B771A57BA3F1E6
2,810,885 UART: [art] SIG.S = 3E217AB72528E7C96A95FA043CFEB9F7DF0D34189B1459901FAEC08FE9C4668E94000BA1A74E4D8C83F40AF9AFEDEE8B
2,834,800 UART: mbox::rt_entry...
2,835,172 UART: ____ _ _ _ ____ _____
2,835,956 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,756 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,524 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,292 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,060 UART: |_|
2,839,372 UART:
2,947,041 UART: [rt] Runtime listening for mailbox commands...
2,948,228 >>> mbox cmd response data (48 bytes)
2,948,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,711,368 >>> mbox cmd response: success
5,711,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,724,737 UART:
5,724,753 UART: Running Caliptra FMC ...
5,725,161 UART:
5,725,304 UART: [state] CFI Enabled
5,814,211 UART: [art] Extend RT PCRs Done
5,814,639 UART: [art] Lock RT PCRs Done
5,815,964 UART: [art] Populate DV Done
5,824,209 UART: [fht] FMC Alias Private Key: 7
5,825,269 UART: [art] Derive CDI
5,825,549 UART: [art] Store in in slot 0x4
5,911,072 UART: [art] Derive Key Pair
5,911,432 UART: [art] Store priv key in slot 0x5
5,924,428 UART: [art] Derive Key Pair - Done
5,938,984 UART: [art] Signing Cert with AUTHO
5,939,464 UART: RITY.KEYID = 7
5,954,766 UART: [art] Erasing AUTHORITY.KEYID = 7
5,955,531 UART: [art] PUB.X = 5D9D03F277314D3B98F620FDF777A5011F2D95F1A843D25ECE56D010B9CF63993ED65DB2B9525B90A9AB47ABC5301C45
5,962,303 UART: [art] PUB.Y = 96DCE37D8D1B7545CFD21E1E42A386E3271B48B6122DCE550AA943C219EC1DF7B6BB1B159062A90410FD73E8431D7A55
5,969,255 UART: [art] SIG.R = E63A5929E121C533F997626BA94499EAC7CF5DE43FADCFB7AB1C255F86F6278F20B5A06166442491A071D3CB95FBCB3C
5,976,037 UART: [art] SIG.S = 3D1D18552483324770757BFF7D3A9DE44B7086722DF775321FC21CE6098082AF55744DE6D24DEF05B5AD32209A195E33
5,999,754 UART: Caliptra RT
6,000,099 UART: [state] CFI Enabled
6,279,456 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,310,634 UART: [rt]cmd =0x4d454153, len=108
6,331,088 >>> mbox cmd response data (12 bytes)
6,331,089 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,631,563 >>> mbox cmd response: success
8,631,563 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,644,754 UART:
8,644,770 UART: Running Caliptra FMC ...
8,645,178 UART:
8,645,321 UART: [state] CFI Enabled
8,734,724 UART: [art] Extend RT PCRs Done
8,735,152 UART: [art] Lock RT PCRs Done
8,736,625 UART: [art] Populate DV Done
8,744,828 UART: [fht] FMC Alias Private Key: 7
8,745,908 UART: [art] Derive CDI
8,746,188 UART: [art] Store in in slot 0x4
8,832,009 UART: [art] Derive Key Pair
8,832,369 UART: [art] Store priv key in slot 0x5
8,845,505 UART: [art] Derive Key Pair - Done
8,860,383 UART: [art] Signing Cert with AUTHO
8,860,863 UART: RITY.KEYID = 7
8,875,873 UART: [art] Erasing AUTHORITY.KEYID = 7
8,876,638 UART: [art] PUB.X = 47E7714D58F3F55E41FCBAD680EE1EF712A0EC2DEFE64DFF8FF38DCDF9B23850B34785D170E2D05F3274ADAAD6A46E01
8,883,429 UART: [art] PUB.Y = FD718080927B79B20BB10E5B664FBD1EBA5C7CB2D5E023460DCD9C39B9C45543ABAB023A1D90771184075C0E427E0D10
8,890,366 UART: [art] SIG.R = A55442AA349E16B5CBF28420AF021603B4E0C14EC9C323383A371360B90AE3EB5B78F4C162510A24270576C082A0E58A
8,897,119 UART: [art] SIG.S = 2B577B6E15F08A38BF418E59808A65BFA941753F25F8937670424DAC5CE8397F2DA01C7D57B2219B3F8F473D60B8F77A
8,920,414 UART: mbox::rt_entry...
8,920,786 UART: ____ _ _ _ ____ _____
8,921,570 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,922,370 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,923,138 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,923,906 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,924,674 UART: |_|
8,924,986 UART:
9,207,418 UART: [rt] Runtime listening for mailbox commands...
11,507,911 >>> mbox cmd response: success
11,507,911 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,521,518 UART:
11,521,534 UART: Running Caliptra FMC ...
11,521,942 UART:
11,522,085 UART: [state] CFI Enabled
11,611,124 UART: [art] Extend RT PCRs Done
11,611,552 UART: [art] Lock RT PCRs Done
11,612,725 UART: [art] Populate DV Done
11,620,960 UART: [fht] FMC Alias Private Key: 7
11,621,992 UART: [art] Derive CDI
11,622,272 UART: [art] Store in in slot 0x4
11,708,293 UART: [art] Derive Key Pair
11,708,653 UART: [art] Store priv key in slot 0x5
11,721,713 UART: [art] Derive Key Pair - Done
11,736,502 UART: [art] Signing Cert with AUTHO
11,736,982 UART: RITY.KEYID = 7
11,752,740 UART: [art] Erasing AUTHORITY.KEYID = 7
11,753,505 UART: [art] PUB.X = 5D24AD93F965BF676F17A39F8E7B4A6326371A8F2AD66540A4BD97EECCF7910765DAA07F1C666182A23634BF742A6C49
11,760,278 UART: [art] PUB.Y = F4276EC2C1B98FAEE7A3925084F0757DD4EF4D616030ADBF2A2EE1D0D6B7F6A706B62A6DF424FB5CF5C1B99CC92BA63A
11,767,249 UART: [art] SIG.R = 9A5BE5553E1E820A0FDA3B96FE6C74704724A5214CD628A70ED207FC24F1D3A0EFEE5229EE9D95ABA253A5A2B98FE963
11,774,023 UART: [art] SIG.S = 7A0E13AC84093F81CED5EEE83D9F6A0ADD95F696354E9857D69F02A39814AD783078142F697DADD269FB1519F781E711
11,797,744 UART: mbox::rt_entry...
11,798,116 UART: ____ _ _ _ ____ _____
11,798,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,799,700 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,800,468 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,801,236 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,802,004 UART: |_|
11,802,316 UART:
12,082,866 UART: [rt] Runtime listening for mailbox commands...
12,084,062 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.68s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,281,304 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,248 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,309,561 >>> mbox cmd response: success
2,309,561 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,310,653 UART: [afmc] ++
2,310,821 UART: [afmc] CDI.KEYID = 6
2,311,183 UART: [afmc] SUBJECT.KEYID = 7
2,311,608 UART: [afmc] AUTHORITY.KEYID = 5
2,347,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,188 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,916 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,801 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,520 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,394 UART: [afmc] --
2,390,512 UART: [cold-reset] --
2,391,314 UART: [state] Locking Datavault
2,392,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,957 UART: [state] Locking ICCM
2,393,389 UART: [exit] Launching FMC @ 0x40000130
2,398,718 UART:
2,398,734 UART: Running Caliptra FMC ...
2,399,142 UART:
2,399,196 UART: [state] CFI Enabled
2,409,791 UART: [fht] FMC Alias Private Key: 7
2,517,816 UART: [art] Extend RT PCRs Done
2,518,244 UART: [art] Lock RT PCRs Done
2,519,802 UART: [art] Populate DV Done
2,527,931 UART: [fht] FMC Alias Private Key: 7
2,528,953 UART: [art] Derive CDI
2,529,233 UART: [art] Store in in slot 0x4
2,614,566 UART: [art] Derive Key Pair
2,614,926 UART: [art] Store priv key in slot 0x5
2,627,986 UART: [art] Derive Key Pair - Done
2,642,818 UART: [art] Signing Cert with AUTHO
2,643,298 UART: RITY.KEYID = 7
2,658,240 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,005 UART: [art] PUB.X = 678E65A618007DD5074F7551FC1376849304FE390A3A3401C85FDE58F991EB906AF6A76CCB61E0DEEBADB742DD84404A
2,665,749 UART: [art] PUB.Y = 8DECBB183023E3B9002500A4F1B8DCBEF581457D599A317221A5EFD619E3A08A6E4128D381296EF4FCF5498EE0AF637D
2,672,665 UART: [art] SIG.R = CE7103DDA6CCB2C79AA30A65C70FBF092D697489798C3999BF276DAA331595ACF3255AEDA1494BB5FD54E85D26DF2A38
2,679,439 UART: [art] SIG.S = FA2A883998008660DAA0770B45412ABAF8A9F4F1731C7A49F481C7BF444CF8ACFF51F5DFD823D98DA754448BFB838A4D
2,703,005 UART: mbox::rt_entry...
2,703,377 UART: ____ _ _ _ ____ _____
2,704,161 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,704,961 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,705,729 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,706,497 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,707,265 UART: |_|
2,707,577 UART:
2,814,880 UART: [rt] Runtime listening for mailbox commands...
2,816,067 >>> mbox cmd response data (48 bytes)
2,816,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,816,179 UART:
2,816,195 UART: Running Caliptra ROM ...
2,816,603 UART:
2,816,658 UART: [state] CFI Enabled
2,818,734 UART: [state] LifecycleState = Unprovisioned
2,819,389 UART: [state] DebugLocked = No
2,820,037 UART: [state] WD Timer not started. Device not locked for debugging
2,821,287 UART: [kat] SHA2-256
3,626,937 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,631,062 UART: [kat] ++
3,631,214 UART: [kat] sha1
3,635,450 UART: [kat] SHA2-256
3,637,390 UART: [kat] SHA2-384
3,640,171 UART: [kat] SHA2-512-ACC
3,642,071 UART: [kat] ECC-384
3,651,644 UART: [kat] HMAC-384Kdf
3,656,426 UART: [kat] LMS
3,904,754 UART: [kat] --
3,905,820 UART: [update-reset] ++
5,218,941 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,219,970 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,369,968 >>> mbox cmd response: success
5,369,968 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,370,121 UART: [update-reset] Copying MAN_2 To MAN_1
5,378,135 UART: [update-reset Success] --
5,378,928 UART: [state] Locking Datavault
5,379,634 UART: [state] Locking PCR0, PCR1 and PCR31
5,380,238 UART: [state] Locking ICCM
5,380,860 UART: [exit] Launching FMC @ 0x40000130
5,386,189 UART:
5,386,205 UART: Running Caliptra FMC ...
5,386,613 UART:
5,386,667 UART: [state] CFI Enabled
5,475,682 UART: [art] Extend RT PCRs Done
5,476,110 UART: [art] Lock RT PCRs Done
5,477,489 UART: [art] Populate DV Done
5,485,738 UART: [fht] FMC Alias Private Key: 7
5,486,846 UART: [art] Derive CDI
5,487,126 UART: [art] Store in in slot 0x4
5,572,425 UART: [art] Derive Key Pair
5,572,785 UART: [art] Store priv key in slot 0x5
5,586,141 UART: [art] Derive Key Pair - Done
5,600,578 UART: [art] Signing Cert with AUTHO
5,601,058 UART: RITY.KEYID = 7
5,616,030 UART: [art] Erasing AUTHORITY.KEYID = 7
5,616,795 UART: [art] PUB.X = 9332978563D55F7FBF40E7C32EC23E297DDAD1673AD0294172CA567162CAF2B0867D3A31F7894F5538FB59998EEBBEDF
5,623,573 UART: [art] PUB.Y = 4268E5002E47670EE681707DC5FEE27A33902413965C6F7A2C095A6F0F3510F2B86578410D5BBF9D69184D94C955D9F1
5,630,483 UART: [art] SIG.R = D44E4C93B21166B569AC2FC0D6A387F3E4C4EC2E88CA9228021974209513BF9705ED1D48E9E2CC196B36229285D29F22
5,637,247 UART: [art] SIG.S = EAA8B88AF0C2C793597562C4E44B4B7D076594135FAB77117E19D2670A8394F7DAAF00395F032A0B79E95C4467E94264
5,661,116 UART: Caliptra RT
5,661,369 UART: [state] CFI Enabled
5,941,871 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,973,119 UART: [rt]cmd =0x4d454153, len=108
5,993,969 >>> mbox cmd response data (12 bytes)
5,993,970 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,994,819 UART:
5,994,835 UART: Running Caliptra ROM ...
5,995,243 UART:
5,995,298 UART: [state] CFI Enabled
5,997,524 UART: [state] LifecycleState = Unprovisioned
5,998,179 UART: [state] DebugLocked = No
5,998,835 UART: [state] WD Timer not started. Device not locked for debugging
6,000,017 UART: [kat] SHA2-256
6,805,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,809,792 UART: [kat] ++
6,809,944 UART: [kat] sha1
6,814,174 UART: [kat] SHA2-256
6,816,114 UART: [kat] SHA2-384
6,818,777 UART: [kat] SHA2-512-ACC
6,820,677 UART: [kat] ECC-384
6,830,226 UART: [kat] HMAC-384Kdf
6,834,688 UART: [kat] LMS
7,083,016 UART: [kat] --
7,084,014 UART: [update-reset] ++
7,988,318 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,989,337 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,085,719 >>> mbox cmd response: success
8,085,719 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,086,014 UART: [update-reset] Copying MAN_2 To MAN_1
8,094,028 UART: [update-reset Success] --
8,095,001 UART: [state] Locking Datavault
8,095,911 UART: [state] Locking PCR0, PCR1 and PCR31
8,096,515 UART: [state] Locking ICCM
8,097,011 UART: [exit] Launching FMC @ 0x40000130
8,102,340 UART:
8,102,356 UART: Running Caliptra FMC ...
8,102,764 UART:
8,102,818 UART: [state] CFI Enabled
8,192,331 UART: [art] Extend RT PCRs Done
8,192,759 UART: [art] Lock RT PCRs Done
8,193,866 UART: [art] Populate DV Done
8,201,957 UART: [fht] FMC Alias Private Key: 7
8,202,987 UART: [art] Derive CDI
8,203,267 UART: [art] Store in in slot 0x4
8,288,854 UART: [art] Derive Key Pair
8,289,214 UART: [art] Store priv key in slot 0x5
8,301,940 UART: [art] Derive Key Pair - Done
8,316,657 UART: [art] Signing Cert with AUTHO
8,317,137 UART: RITY.KEYID = 7
8,332,621 UART: [art] Erasing AUTHORITY.KEYID = 7
8,333,386 UART: [art] PUB.X = A053D30794FC39A341AED6804168942C191D642B08C70C163D51BB478E574ED5B5426C9CB07D4D35A151C3DBA1FB7B52
8,340,151 UART: [art] PUB.Y = FF144BA933519ECE574C20EF6870D1C85F1CC5381041ED1EAAEFE8B9AFD6EC2A6658181A0D1BEA08946C41161C8E4C08
8,347,108 UART: [art] SIG.R = 94CEF641AEF99DBC65E2388372086A96368A735D4F468119186FCD6F228F26291ECA791C857F82ABF1728DFBA3EDACC3
8,353,885 UART: [art] SIG.S = C255C25EB68D41F504750B4C0B6E298EBAED3C986B8D61C4B9348227E1229E58A4BFBA1FAF8D4A970EC6FA2F8C9CD7BF
8,377,590 UART: mbox::rt_entry...
8,377,962 UART: ____ _ _ _ ____ _____
8,378,746 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,379,546 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,380,314 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,381,082 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,381,850 UART: |_|
8,382,162 UART:
8,659,649 UART: [rt] Runtime listening for mailbox commands...
8,660,613 UART:
8,660,629 UART: Running Caliptra ROM ...
8,661,037 UART:
8,661,092 UART: [state] CFI Enabled
8,663,702 UART: [state] LifecycleState = Unprovisioned
8,664,357 UART: [state] DebugLocked = No
8,665,039 UART: [state] WD Timer not started. Device not locked for debugging
8,666,209 UART: [kat] SHA2-256
9,471,859 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,475,984 UART: [kat] ++
9,476,136 UART: [kat] sha1
9,480,446 UART: [kat] SHA2-256
9,482,386 UART: [kat] SHA2-384
9,485,245 UART: [kat] SHA2-512-ACC
9,487,145 UART: [kat] ECC-384
9,496,880 UART: [kat] HMAC-384Kdf
9,501,438 UART: [kat] LMS
9,749,766 UART: [kat] --
9,750,508 UART: [update-reset] ++
10,654,878 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,655,875 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,752,257 >>> mbox cmd response: success
10,752,257 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,752,372 UART: [update-reset] Copying MAN_2 To MAN_1
10,760,386 UART: [update-reset Success] --
10,761,091 UART: [state] Locking Datavault
10,761,903 UART: [state] Locking PCR0, PCR1 and PCR31
10,762,507 UART: [state] Locking ICCM
10,763,021 UART: [exit] Launching FMC @ 0x40000130
10,768,350 UART:
10,768,366 UART: Running Caliptra FMC ...
10,768,774 UART:
10,768,828 UART: [state] CFI Enabled
10,858,199 UART: [art] Extend RT PCRs Done
10,858,627 UART: [art] Lock RT PCRs Done
10,859,896 UART: [art] Populate DV Done
10,868,049 UART: [fht] FMC Alias Private Key: 7
10,869,223 UART: [art] Derive CDI
10,869,503 UART: [art] Store in in slot 0x4
10,955,442 UART: [art] Derive Key Pair
10,955,802 UART: [art] Store priv key in slot 0x5
10,968,262 UART: [art] Derive Key Pair - Done
10,982,907 UART: [art] Signing Cert with AUTHO
10,983,387 UART: RITY.KEYID = 7
10,998,607 UART: [art] Erasing AUTHORITY.KEYID = 7
10,999,372 UART: [art] PUB.X = 5EBB51447037B75DFB0D369515CBCE8D91AD75D1F19A4C6168E2898BF5C914F439141A5F4234BDE013BDB5E343290382
11,006,140 UART: [art] PUB.Y = 40DF55DB1A6D0CBEDAE377F7028FFFD35D84A7C5517AD889A5EF5F1659A01F69E79B18E2E1D16CBB128353B20B49EAAA
11,013,103 UART: [art] SIG.R = C231B66AF7D119B7A8E4479A03230A084832E2D251D3623ED8E650BBE40CCE234A5A4A5DAAF457E48625281EF147CF9E
11,019,869 UART: [art] SIG.S = 044DEF3D4CEE32E5347B40C991B96EB4D17B0EB220607FE3145A433FC5FA45F0CE9A721E20DBF7EEB4C3CF89DE008A17
11,043,566 UART: mbox::rt_entry...
11,043,938 UART: ____ _ _ _ ____ _____
11,044,722 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,045,522 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,046,290 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,047,058 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,047,826 UART: |_|
11,048,138 UART:
11,327,416 UART: [rt] Runtime listening for mailbox commands...
11,328,612 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,281 ready_for_fw is high
1,060,281 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,244 >>> mbox cmd response: success
2,165,244 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,227,260 UART:
2,227,276 UART: Running Caliptra FMC ...
2,227,684 UART:
2,227,738 UART: [state] CFI Enabled
2,238,375 UART: [fht] FMC Alias Private Key: 7
2,346,414 UART: [art] Extend RT PCRs Done
2,346,842 UART: [art] Lock RT PCRs Done
2,348,510 UART: [art] Populate DV Done
2,356,965 UART: [fht] FMC Alias Private Key: 7
2,357,929 UART: [art] Derive CDI
2,358,209 UART: [art] Store in in slot 0x4
2,443,636 UART: [art] Derive Key Pair
2,443,996 UART: [art] Store priv key in slot 0x5
2,456,996 UART: [art] Derive Key Pair - Done
2,471,672 UART: [art] Signing Cert with AUTHO
2,472,152 UART: RITY.KEYID = 7
2,487,492 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,257 UART: [art] PUB.X = 525BC57669DAB07C0D3AF523FEC373A1A6ABB7AC12C595DCC7CB94330F160A2683740397CCCC39AD35E7C482B4F60F6F
2,495,028 UART: [art] PUB.Y = 2D31719090ED9643B91F59B90EE19550A23C5E53B10480581C9FDC907B2F7E8ED6AC94D40257D7637ABCAFB318E6C7AB
2,501,977 UART: [art] SIG.R = 2FCF1B8EA3E39AEE56AD2F972F00CBC41E242495FAAED2AB66FE51196A1FD980C0ECE07D852A509FD0BCAD483153D8A6
2,508,751 UART: [art] SIG.S = 9A15462D2FBCE709692175F3A003CED207D0F6FEC0C984E9F501D2C7902D242402710C4218C6D3EB493267B7CE805369
2,531,674 UART: mbox::rt_entry...
2,532,046 UART: ____ _ _ _ ____ _____
2,532,830 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,630 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,398 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,166 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,934 UART: |_|
2,536,246 UART:
2,642,612 UART: [rt] Runtime listening for mailbox commands...
2,643,799 >>> mbox cmd response data (48 bytes)
2,643,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,083,243 >>> mbox cmd response: success
5,083,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,096,837 UART:
5,096,853 UART: Running Caliptra FMC ...
5,097,261 UART:
5,097,315 UART: [state] CFI Enabled
5,186,722 UART: [art] Extend RT PCRs Done
5,187,150 UART: [art] Lock RT PCRs Done
5,188,033 UART: [art] Populate DV Done
5,196,196 UART: [fht] FMC Alias Private Key: 7
5,197,278 UART: [art] Derive CDI
5,197,558 UART: [art] Store in in slot 0x4
5,283,343 UART: [art] Derive Key Pair
5,283,703 UART: [art] Store priv key in slot 0x5
5,296,949 UART: [art] Derive Key Pair - Done
5,311,562 UART: [art] Signing Cert with AUTHO
5,312,042 UART: RITY.KEYID = 7
5,327,504 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,269 UART: [art] PUB.X = 155F6E2B5F2417AF514C8C5AEBB3894238EB24FD324E84EB6DD16C3F6FB53138E540EB2AA94AC01146925185EDF71588
5,335,047 UART: [art] PUB.Y = D0E5F3DAC9C59B79DEA26433D0A77BA288D8ED45B3CBBD9EC9DA359EC856A0B276FBEE70E49EFB876D9D4A63B62AD57D
5,342,027 UART: [art] SIG.R = 27E84126D8BF79DA0D7BDAA64005DEAA9BC7274BB4A8ECD0D37517DBFA0844B629A4C954C342AF463154E59A0FB295C9
5,348,801 UART: [art] SIG.S = B5604FD30394D5115B4CB46A0A92199553CC357FF9BC0C6B9E88F6C0DCDD13D7AA5413990CB4D61820A3C18FABA95281
5,372,782 UART: Caliptra RT
5,373,035 UART: [state] CFI Enabled
5,657,402 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,688,366 UART: [rt]cmd =0x4d454153, len=108
5,709,312 >>> mbox cmd response data (12 bytes)
5,709,313 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,686,763 >>> mbox cmd response: success
7,686,763 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,700,263 UART:
7,700,279 UART: Running Caliptra FMC ...
7,700,687 UART:
7,700,741 UART: [state] CFI Enabled
7,790,000 UART: [art] Extend RT PCRs Done
7,790,428 UART: [art] Lock RT PCRs Done
7,791,649 UART: [art] Populate DV Done
7,799,782 UART: [fht] FMC Alias Private Key: 7
7,800,778 UART: [art] Derive CDI
7,801,058 UART: [art] Store in in slot 0x4
7,886,753 UART: [art] Derive Key Pair
7,887,113 UART: [art] Store priv key in slot 0x5
7,900,463 UART: [art] Derive Key Pair - Done
7,915,304 UART: [art] Signing Cert with AUTHO
7,915,784 UART: RITY.KEYID = 7
7,931,068 UART: [art] Erasing AUTHORITY.KEYID = 7
7,931,833 UART: [art] PUB.X = D48927DF6581F8B9BC3AAD883444EEC49F24C6A3983CBEA77ABE2F5C0EA9B6F394B42EF722BC032394247603E6A93265
7,938,604 UART: [art] PUB.Y = 6DE6A0D7BF3641B95005EF0512881E88A0C5BB754F91FFD0CB9AEDC3FCDFA51F922601FADE163366BBB118552468B463
7,945,559 UART: [art] SIG.R = 27A6E183B5456C2C7D6C47E7A359C5ED1A1EDCBB01BF58DD605DF5040A9E2917D932EFA389BA0C6EBD7FADA235B8629B
7,952,339 UART: [art] SIG.S = 1FAF66971854BD4947B715947C64CCF4F3DAC4FB7AB0576E05B2108C5D05803DC88A2608AB6DEE10A445017FC814C82D
7,976,358 UART: mbox::rt_entry...
7,976,730 UART: ____ _ _ _ ____ _____
7,977,514 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,978,314 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,979,082 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,979,850 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,980,618 UART: |_|
7,980,930 UART:
8,257,406 UART: [rt] Runtime listening for mailbox commands...
10,234,557 >>> mbox cmd response: success
10,234,557 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,248,245 UART:
10,248,261 UART: Running Caliptra FMC ...
10,248,669 UART:
10,248,723 UART: [state] CFI Enabled
10,337,786 UART: [art] Extend RT PCRs Done
10,338,214 UART: [art] Lock RT PCRs Done
10,339,373 UART: [art] Populate DV Done
10,347,474 UART: [fht] FMC Alias Private Key: 7
10,348,452 UART: [art] Derive CDI
10,348,732 UART: [art] Store in in slot 0x4
10,434,235 UART: [art] Derive Key Pair
10,434,595 UART: [art] Store priv key in slot 0x5
10,447,205 UART: [art] Derive Key Pair - Done
10,462,030 UART: [art] Signing Cert with AUTHO
10,462,510 UART: RITY.KEYID = 7
10,477,804 UART: [art] Erasing AUTHORITY.KEYID = 7
10,478,569 UART: [art] PUB.X = 31B297F182BFF83128F31FF5CCF46A13570CD17BE2524558FCBA16F7394048E1F8C4383BDBE8C316D92F03F777B0E89B
10,485,341 UART: [art] PUB.Y = 7FABB2BF2C8FA0040C888DBD923344ABB9DDF2D97F3FFCB069F5B2EEA5691F3D1D19513AAE33C5938A43114A5C442749
10,492,303 UART: [art] SIG.R = 97EEDF3629BE9C4AE239D3D7505E6D8E5573F0ED58FD0CEC2611E46645AFAFC1DB5E1BA18B992621E2C079366844D959
10,499,082 UART: [art] SIG.S = 4CC34F769F71752AC30E6C4DA47695ABB60909819C148921877B7D12363CC500DAD538388BCA2C2A3049475D5E57EA63
10,523,008 UART: mbox::rt_entry...
10,523,380 UART: ____ _ _ _ ____ _____
10,524,164 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,524,964 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,525,732 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,526,500 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,527,268 UART: |_|
10,527,580 UART:
10,805,976 UART: [rt] Runtime listening for mailbox commands...
10,807,172 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.30s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,283,947 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,673 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,050 >>> mbox cmd response: success
2,313,050 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,314,298 UART: [afmc] ++
2,314,466 UART: [afmc] CDI.KEYID = 6
2,314,828 UART: [afmc] SUBJECT.KEYID = 7
2,315,253 UART: [afmc] AUTHORITY.KEYID = 5
2,351,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,037 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,650 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,373 UART: [afmc] --
2,395,481 UART: [cold-reset] --
2,396,335 UART: [state] Locking Datavault
2,397,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,362 UART: [state] Locking ICCM
2,398,972 UART: [exit] Launching FMC @ 0x40000130
2,404,301 UART:
2,404,317 UART: Running Caliptra FMC ...
2,404,725 UART:
2,404,868 UART: [state] CFI Enabled
2,415,381 UART: [fht] FMC Alias Private Key: 7
2,524,074 UART: [art] Extend RT PCRs Done
2,524,502 UART: [art] Lock RT PCRs Done
2,526,048 UART: [art] Populate DV Done
2,534,203 UART: [fht] FMC Alias Private Key: 7
2,535,291 UART: [art] Derive CDI
2,535,571 UART: [art] Store in in slot 0x4
2,621,200 UART: [art] Derive Key Pair
2,621,560 UART: [art] Store priv key in slot 0x5
2,634,986 UART: [art] Derive Key Pair - Done
2,649,786 UART: [art] Signing Cert with AUTHO
2,650,266 UART: RITY.KEYID = 7
2,665,496 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,261 UART: [art] PUB.X = 606599C11B13A5952D697DE43F352817688D0805024FCCF76A99AD46F7AC1DC5D14F19BEBD212F222663FC286A843BC7
2,673,024 UART: [art] PUB.Y = 7F7130C71B641CAE0530E1330F75214F4FFECA2E9293D695292DAA28E66A5A28F57B17E6BE5E1FC0B8ECC2063BC69B0A
2,679,976 UART: [art] SIG.R = 5EE36180B3F8AF17F5520347E36A3071D966CE7B013A0912957CB2DAAE34615CD799CD05155F7BAD5D462EAECD232E5B
2,686,744 UART: [art] SIG.S = 1DC6EE97ACDAD0B4C3BA2213BEFC144D3CF1BBF8E2EBC4D4CD63159A506BCA0887923F90460DE4758B1BA98F59BA9962
2,710,321 UART: mbox::rt_entry...
2,710,693 UART: ____ _ _ _ ____ _____
2,711,477 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,712,277 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,713,045 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,813 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,581 UART: |_|
2,714,893 UART:
2,822,345 UART: [rt] Runtime listening for mailbox commands...
2,823,532 >>> mbox cmd response data (48 bytes)
2,823,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,823,644 UART:
2,823,660 UART: Running Caliptra ROM ...
2,824,068 UART:
2,824,210 UART: [state] CFI Enabled
2,827,286 UART: [state] LifecycleState = Unprovisioned
2,827,941 UART: [state] DebugLocked = No
2,828,561 UART: [state] WD Timer not started. Device not locked for debugging
2,829,907 UART: [kat] SHA2-256
3,635,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,639,682 UART: [kat] ++
3,639,834 UART: [kat] sha1
3,643,852 UART: [kat] SHA2-256
3,645,792 UART: [kat] SHA2-384
3,648,737 UART: [kat] SHA2-512-ACC
3,650,637 UART: [kat] ECC-384
3,660,642 UART: [kat] HMAC-384Kdf
3,665,304 UART: [kat] LMS
3,913,632 UART: [kat] --
3,914,476 UART: [update-reset] ++
5,228,009 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,229,112 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,379,110 >>> mbox cmd response: success
5,379,110 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,379,381 UART: [update-reset] Copying MAN_2 To MAN_1
5,387,395 UART: [update-reset Success] --
5,388,352 UART: [state] Locking Datavault
5,389,316 UART: [state] Locking PCR0, PCR1 and PCR31
5,389,920 UART: [state] Locking ICCM
5,390,430 UART: [exit] Launching FMC @ 0x40000130
5,395,759 UART:
5,395,775 UART: Running Caliptra FMC ...
5,396,183 UART:
5,396,326 UART: [state] CFI Enabled
5,486,027 UART: [art] Extend RT PCRs Done
5,486,455 UART: [art] Lock RT PCRs Done
5,487,852 UART: [art] Populate DV Done
5,496,243 UART: [fht] FMC Alias Private Key: 7
5,497,171 UART: [art] Derive CDI
5,497,451 UART: [art] Store in in slot 0x4
5,583,186 UART: [art] Derive Key Pair
5,583,546 UART: [art] Store priv key in slot 0x5
5,596,992 UART: [art] Derive Key Pair - Done
5,611,680 UART: [art] Signing Cert with AUTHO
5,612,160 UART: RITY.KEYID = 7
5,627,602 UART: [art] Erasing AUTHORITY.KEYID = 7
5,628,367 UART: [art] PUB.X = E471DD0DC96B6C5821BCB2A6887D586FE8B40C8DAE047D901D64F6AE0F6FE1399653381191BF479331653BA91FD532F3
5,635,131 UART: [art] PUB.Y = EA1C4D6A13F081FD2DBDF90DEF9EAF4B10CAECC76F39272D9D94A2476ABB24E000628FD695CE5D3741FAA556ED78A2C6
5,642,082 UART: [art] SIG.R = E9E674457B74DF95758F427DD22A8D81BB3A5FF7FEEF028065C376AC4A3F63D13834EBE46C340386D8C323D5D9CB219F
5,648,856 UART: [art] SIG.S = D387C08FF84C8D0EA6A4D4511440DBE248F48A0EF3164C2E41A5B68516EDB2EDA695AB40562F50749E2A93D66855410C
5,672,284 UART: Caliptra RT
5,672,629 UART: [state] CFI Enabled
5,954,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,985,793 UART: [rt]cmd =0x4d454153, len=108
6,006,021 >>> mbox cmd response data (12 bytes)
6,006,022 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,133 UART:
6,007,149 UART: Running Caliptra ROM ...
6,007,557 UART:
6,007,699 UART: [state] CFI Enabled
6,010,373 UART: [state] LifecycleState = Unprovisioned
6,011,028 UART: [state] DebugLocked = No
6,011,542 UART: [state] WD Timer not started. Device not locked for debugging
6,012,654 UART: [kat] SHA2-256
6,818,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,822,429 UART: [kat] ++
6,822,581 UART: [kat] sha1
6,826,991 UART: [kat] SHA2-256
6,828,931 UART: [kat] SHA2-384
6,831,778 UART: [kat] SHA2-512-ACC
6,833,678 UART: [kat] ECC-384
6,843,439 UART: [kat] HMAC-384Kdf
6,848,055 UART: [kat] LMS
7,096,383 UART: [kat] --
7,097,403 UART: [update-reset] ++
8,003,043 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,004,194 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,100,576 >>> mbox cmd response: success
8,100,576 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,100,867 UART: [update-reset] Copying MAN_2 To MAN_1
8,108,881 UART: [update-reset Success] --
8,110,012 UART: [state] Locking Datavault
8,110,710 UART: [state] Locking PCR0, PCR1 and PCR31
8,111,314 UART: [state] Locking ICCM
8,111,920 UART: [exit] Launching FMC @ 0x40000130
8,117,249 UART:
8,117,265 UART: Running Caliptra FMC ...
8,117,673 UART:
8,117,816 UART: [state] CFI Enabled
8,207,533 UART: [art] Extend RT PCRs Done
8,207,961 UART: [art] Lock RT PCRs Done
8,209,112 UART: [art] Populate DV Done
8,217,451 UART: [fht] FMC Alias Private Key: 7
8,218,557 UART: [art] Derive CDI
8,218,837 UART: [art] Store in in slot 0x4
8,304,792 UART: [art] Derive Key Pair
8,305,152 UART: [art] Store priv key in slot 0x5
8,318,094 UART: [art] Derive Key Pair - Done
8,332,684 UART: [art] Signing Cert with AUTHO
8,333,164 UART: RITY.KEYID = 7
8,348,036 UART: [art] Erasing AUTHORITY.KEYID = 7
8,348,801 UART: [art] PUB.X = ABA530EB87864129F6C2B1DEBAD63634C049E05BE4E0A6293C1FD354736B732C657F365D56038AB13B0CDA67CEF8FD0F
8,355,576 UART: [art] PUB.Y = 0C20D368A7C5CB2D5E773880486BB82046D01BB182D174636EBE4039EF09FC12A86F3E9E5942BC81E27F33933A1AD9E4
8,362,524 UART: [art] SIG.R = 3FD72287E7E7D475BC7B35CFF50974883DEEA8435AD45870DAFCDD8B0FEF28523418E4C169264FCE86B97E9E7D23A15D
8,369,302 UART: [art] SIG.S = 0559CC06EFD23208ECD59DBBF0D818E18A7A2A7341C2EDA653B865B22030F4F6983E3E2B4446C737953974AF66D02E19
8,392,832 UART: mbox::rt_entry...
8,393,204 UART: ____ _ _ _ ____ _____
8,393,988 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,394,788 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,395,556 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,396,324 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,397,092 UART: |_|
8,397,404 UART:
8,676,538 UART: [rt] Runtime listening for mailbox commands...
8,677,502 UART:
8,677,518 UART: Running Caliptra ROM ...
8,677,926 UART:
8,678,068 UART: [state] CFI Enabled
8,681,124 UART: [state] LifecycleState = Unprovisioned
8,681,779 UART: [state] DebugLocked = No
8,682,495 UART: [state] WD Timer not started. Device not locked for debugging
8,683,727 UART: [kat] SHA2-256
9,489,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,493,502 UART: [kat] ++
9,493,654 UART: [kat] sha1
9,497,990 UART: [kat] SHA2-256
9,499,930 UART: [kat] SHA2-384
9,502,603 UART: [kat] SHA2-512-ACC
9,504,503 UART: [kat] ECC-384
9,514,676 UART: [kat] HMAC-384Kdf
9,519,444 UART: [kat] LMS
9,767,772 UART: [kat] --
9,768,866 UART: [update-reset] ++
10,673,356 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,674,529 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,770,911 >>> mbox cmd response: success
10,770,911 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,771,230 UART: [update-reset] Copying MAN_2 To MAN_1
10,779,244 UART: [update-reset Success] --
10,780,275 UART: [state] Locking Datavault
10,781,141 UART: [state] Locking PCR0, PCR1 and PCR31
10,781,745 UART: [state] Locking ICCM
10,782,381 UART: [exit] Launching FMC @ 0x40000130
10,787,710 UART:
10,787,726 UART: Running Caliptra FMC ...
10,788,134 UART:
10,788,277 UART: [state] CFI Enabled
10,877,278 UART: [art] Extend RT PCRs Done
10,877,706 UART: [art] Lock RT PCRs Done
10,878,867 UART: [art] Populate DV Done
10,886,938 UART: [fht] FMC Alias Private Key: 7
10,888,012 UART: [art] Derive CDI
10,888,292 UART: [art] Store in in slot 0x4
10,974,045 UART: [art] Derive Key Pair
10,974,405 UART: [art] Store priv key in slot 0x5
10,987,645 UART: [art] Derive Key Pair - Done
11,002,176 UART: [art] Signing Cert with AUTHO
11,002,656 UART: RITY.KEYID = 7
11,017,432 UART: [art] Erasing AUTHORITY.KEYID = 7
11,018,197 UART: [art] PUB.X = 4DC4A00E5E3B337F2106FD9992CEA339C405D1563114D85AF2AFE4FF664FA4F78DB176670B45EDC3012F900F55391AB7
11,024,957 UART: [art] PUB.Y = 68FFDBEAC72877AB8BCDFF1BA12964F36807CCAC2D08810112C3D696A3E21A73C8D80B711790734036629D09B057CC8C
11,031,900 UART: [art] SIG.R = 824B7960191B06112FA8A5925307F14E2B75B3857F790E03960B94F0403B25628D26259CB169DC9E987A0784E4266A08
11,038,633 UART: [art] SIG.S = BD8D4C1E2FFB8D4B9A2D82A2824DA74DBCB8075AB4C0598747960A21B33D2AB3B35350A033F66A4DBD8190AC9C2859BC
11,062,470 UART: mbox::rt_entry...
11,062,842 UART: ____ _ _ _ ____ _____
11,063,626 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,064,426 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,065,194 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,065,962 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,066,730 UART: |_|
11,067,042 UART:
11,342,313 UART: [rt] Runtime listening for mailbox commands...
11,343,509 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,970 ready_for_fw is high
1,060,970 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,163,607 >>> mbox cmd response: success
2,163,607 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,226,529 UART:
2,226,545 UART: Running Caliptra FMC ...
2,226,953 UART:
2,227,096 UART: [state] CFI Enabled
2,237,795 UART: [fht] FMC Alias Private Key: 7
2,345,550 UART: [art] Extend RT PCRs Done
2,345,978 UART: [art] Lock RT PCRs Done
2,347,558 UART: [art] Populate DV Done
2,355,641 UART: [fht] FMC Alias Private Key: 7
2,356,717 UART: [art] Derive CDI
2,356,997 UART: [art] Store in in slot 0x4
2,442,896 UART: [art] Derive Key Pair
2,443,256 UART: [art] Store priv key in slot 0x5
2,456,724 UART: [art] Derive Key Pair - Done
2,471,554 UART: [art] Signing Cert with AUTHO
2,472,034 UART: RITY.KEYID = 7
2,487,746 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,511 UART: [art] PUB.X = EDFA48AA3E3BD3F824835DEAD6A9DA4FA0FD48E56AC81A0441006D9CFE884E9D8224E19EAF3799D9D0A40E93CCD41B74
2,495,277 UART: [art] PUB.Y = 12EAB1009F35A3E51721BD3E326EA9D2600F4199760F01C127C622F5A1AB2CACBC4A9E2CCF7A2B894B1C692F59D0DBF8
2,502,212 UART: [art] SIG.R = B1DAB462F162D779A16C9B7BB3D873D874CCAD32767C9C1E840A9FDB84376C9E63AFB666A18355D0B58D7915DAFDB3C2
2,508,995 UART: [art] SIG.S = CDBD507BD575D9FD9CAD6748459FA00195E8C5A753DF1B99BECE272F41E1D39DEDBD10E4FC221B3FF2AEB804C9598610
2,532,472 UART: mbox::rt_entry...
2,532,844 UART: ____ _ _ _ ____ _____
2,533,628 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,428 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,196 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,964 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,732 UART: |_|
2,537,044 UART:
2,643,547 UART: [rt] Runtime listening for mailbox commands...
2,644,734 >>> mbox cmd response data (48 bytes)
2,644,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,082,763 >>> mbox cmd response: success
5,082,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,095,927 UART:
5,095,943 UART: Running Caliptra FMC ...
5,096,351 UART:
5,096,494 UART: [state] CFI Enabled
5,185,363 UART: [art] Extend RT PCRs Done
5,185,791 UART: [art] Lock RT PCRs Done
5,187,106 UART: [art] Populate DV Done
5,195,445 UART: [fht] FMC Alias Private Key: 7
5,196,397 UART: [art] Derive CDI
5,196,677 UART: [art] Store in in slot 0x4
5,282,454 UART: [art] Derive Key Pair
5,282,814 UART: [art] Store priv key in slot 0x5
5,295,790 UART: [art] Derive Key Pair - Done
5,310,616 UART: [art] Signing Cert with AUTHO
5,311,096 UART: RITY.KEYID = 7
5,326,192 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,957 UART: [art] PUB.X = F474C56155952BCBA44302287054617881267988862B74945AF5FA4DC75D9A6805AEF4B3D333C1C2DE9F32AB8F7574DA
5,333,719 UART: [art] PUB.Y = ABD83ABF2C2663516BD56BAAE593FE3424D89D2CE1CE68955FB7BC1B896C2D9D61A81E97AED5F138E3AAC3697ADA961C
5,340,693 UART: [art] SIG.R = 51CD9E9DEF7C862F32AD9E327BA18934B1643249C7BA9B75C6409BC19DFD61D4C3E0C1740EE18FA728C2CC485BCFD8C2
5,347,478 UART: [art] SIG.S = 749B1009ECC0CDFAEA5148819F5CD67A185F5954AB57011E785AB80AEC2167783787B14C05B5E53416210D4B40F82F71
5,370,974 UART: Caliptra RT
5,371,319 UART: [state] CFI Enabled
5,655,346 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,686,724 UART: [rt]cmd =0x4d454153, len=108
5,707,416 >>> mbox cmd response data (12 bytes)
5,707,417 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,683,936 >>> mbox cmd response: success
7,683,936 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,697,506 UART:
7,697,522 UART: Running Caliptra FMC ...
7,697,930 UART:
7,698,073 UART: [state] CFI Enabled
7,786,936 UART: [art] Extend RT PCRs Done
7,787,364 UART: [art] Lock RT PCRs Done
7,788,591 UART: [art] Populate DV Done
7,797,088 UART: [fht] FMC Alias Private Key: 7
7,798,086 UART: [art] Derive CDI
7,798,366 UART: [art] Store in in slot 0x4
7,884,095 UART: [art] Derive Key Pair
7,884,455 UART: [art] Store priv key in slot 0x5
7,898,023 UART: [art] Derive Key Pair - Done
7,912,658 UART: [art] Signing Cert with AUTHO
7,913,138 UART: RITY.KEYID = 7
7,928,438 UART: [art] Erasing AUTHORITY.KEYID = 7
7,929,203 UART: [art] PUB.X = 5AE57CA1C2798836D1BB3D0E64DE24E7C91255F32C8156D7510C34EAFB1C68C7B14AA5E74A713BBEAC8FB17558EAFF49
7,935,985 UART: [art] PUB.Y = 6A0E51AFD281BB22B31298BB1577E6C079A1F8EA3A6C9B4D786107BA4C55FE4D639678F557E83C957E07564ECE4058BA
7,942,934 UART: [art] SIG.R = 6A9C6EDD786B07EC54E5E90555C4C3FC1D68AF85AB6086A98C8594F5C90C87CCAD41982B91DC933ADF2F0C1BCF177EC7
7,949,712 UART: [art] SIG.S = EC27496DA27F615FD32EECC31BDA49651EE87A059EED84B000EB6E83B654CD13B4C4DD03F773853AAEF453EB53FBE0BC
7,973,535 UART: mbox::rt_entry...
7,973,907 UART: ____ _ _ _ ____ _____
7,974,691 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,975,491 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,976,259 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,977,027 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,977,795 UART: |_|
7,978,107 UART:
8,263,343 UART: [rt] Runtime listening for mailbox commands...
10,240,819 >>> mbox cmd response: success
10,240,819 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,253,857 UART:
10,253,873 UART: Running Caliptra FMC ...
10,254,281 UART:
10,254,424 UART: [state] CFI Enabled
10,343,299 UART: [art] Extend RT PCRs Done
10,343,727 UART: [art] Lock RT PCRs Done
10,344,874 UART: [art] Populate DV Done
10,353,131 UART: [fht] FMC Alias Private Key: 7
10,354,135 UART: [art] Derive CDI
10,354,415 UART: [art] Store in in slot 0x4
10,440,202 UART: [art] Derive Key Pair
10,440,562 UART: [art] Store priv key in slot 0x5
10,453,636 UART: [art] Derive Key Pair - Done
10,468,517 UART: [art] Signing Cert with AUTHO
10,468,997 UART: RITY.KEYID = 7
10,483,959 UART: [art] Erasing AUTHORITY.KEYID = 7
10,484,724 UART: [art] PUB.X = 3AEF6DE26786690A833D50105E1ADDC92F3B60FDA5310AAD4D0868120F100DABC4B033EE8F88075FA1E60330D27F20AA
10,491,485 UART: [art] PUB.Y = 8CA3265AFCD1A648BB52D0DCFF9FAA29DCB0D33B803DFC0F3955CC2B2C639C632283BAAC6936E66AAB9809F3CA7EDA11
10,498,457 UART: [art] SIG.R = 9E853CD9F2FCB3C23FB3F4293F053A1F34327CD1B5D54A0A96B9602A0E30D125FF2B8F46C85CDD9214B7B9744DD0A8CE
10,505,234 UART: [art] SIG.S = 509B0C0DD7CA5088D06CCB0292D98DDF9869199B3F49BEAF132458F4BC6A9D6A9A069881E29520676F03A8DCF995A10C
10,528,759 UART: mbox::rt_entry...
10,529,131 UART: ____ _ _ _ ____ _____
10,529,915 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,530,715 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,531,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,532,251 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,533,019 UART: |_|
10,533,331 UART:
10,811,683 UART: [rt] Runtime listening for mailbox commands...
10,812,879 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.37s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,283,744 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,459 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,933 >>> mbox cmd response: success
2,311,933 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,313,054 UART: [afmc] ++
2,313,222 UART: [afmc] CDI.KEYID = 6
2,313,585 UART: [afmc] SUBJECT.KEYID = 7
2,314,011 UART: [afmc] AUTHORITY.KEYID = 5
2,348,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,644 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,527 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,246 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,103 UART: [afmc] --
2,392,001 UART: [cold-reset] --
2,392,771 UART: [state] Locking Datavault
2,393,860 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,464 UART: [state] Locking ICCM
2,394,992 UART: [exit] Launching FMC @ 0x40000130
2,400,321 UART:
2,400,337 UART: Running Caliptra FMC ...
2,400,745 UART:
2,400,799 UART: [state] CFI Enabled
2,411,488 UART: [fht] FMC Alias Private Key: 7
2,519,739 UART: [art] Extend RT PCRs Done
2,520,167 UART: [art] Lock RT PCRs Done
2,521,703 UART: [art] Populate DV Done
2,530,002 UART: [fht] FMC Alias Private Key: 7
2,531,064 UART: [art] Derive CDI
2,531,344 UART: [art] Store in in slot 0x4
2,617,191 UART: [art] Derive Key Pair
2,617,551 UART: [art] Store priv key in slot 0x5
2,630,387 UART: [art] Derive Key Pair - Done
2,645,026 UART: [art] Signing Cert with AUTHO
2,645,506 UART: RITY.KEYID = 7
2,660,750 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,515 UART: [art] PUB.X = D4FD10BF0C697A7ACF65BFB2DBFEE9077E0CC6F0C0D3D8BC77F755F8E51307F08BFEB141AD25F950707C8F9CB501C591
2,668,294 UART: [art] PUB.Y = 8BB013E84DA567EEAC1E9F61AF67E331C11465D4D58AC4B5E3D2954423A588DF45DABEC6228478D650D7627CFD2090BA
2,675,256 UART: [art] SIG.R = B8BB9261CD7331455169B9AE09F71ED34FBEB9735F3612B7B7DE31911126806ED41393132DB4EEE9C9F680998CDBEEA3
2,682,031 UART: [art] SIG.S = 08B79D180DB2C15957281C168D196DF377D593E88456A1962A9EB9BEBA1EC78240402EA39916389E4F5907141AA85419
2,706,177 UART: mbox::rt_entry...
2,706,549 UART: ____ _ _ _ ____ _____
2,707,333 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,133 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,901 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,669 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,437 UART: |_|
2,710,749 UART:
2,816,419 UART: [rt] Runtime listening for mailbox commands...
2,817,606 >>> mbox cmd response data (48 bytes)
2,817,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,817,718 UART:
2,817,734 UART: Running Caliptra ROM ...
2,818,142 UART:
2,818,197 UART: [state] CFI Enabled
2,820,579 UART: [state] LifecycleState = Unprovisioned
2,821,234 UART: [state] DebugLocked = No
2,821,858 UART: [state] WD Timer not started. Device not locked for debugging
2,823,072 UART: [kat] SHA2-256
3,626,622 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,630,751 UART: [kat] ++
3,630,903 UART: [kat] sha1
3,634,965 UART: [kat] SHA2-256
3,636,905 UART: [kat] SHA2-384
3,639,534 UART: [kat] SHA2-512-ACC
3,641,434 UART: [kat] ECC-384
3,651,281 UART: [kat] HMAC-384Kdf
3,655,973 UART: [kat] LMS
3,904,285 UART: [kat] --
3,905,341 UART: [update-reset] ++
5,217,925 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,219,022 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,369,020 >>> mbox cmd response: success
5,369,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,369,165 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,179 UART: [update-reset Success] --
5,378,128 UART: [state] Locking Datavault
5,378,794 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,398 UART: [state] Locking ICCM
5,379,926 UART: [exit] Launching FMC @ 0x40000130
5,385,255 UART:
5,385,271 UART: Running Caliptra FMC ...
5,385,679 UART:
5,385,733 UART: [state] CFI Enabled
5,474,806 UART: [art] Extend RT PCRs Done
5,475,234 UART: [art] Lock RT PCRs Done
5,476,347 UART: [art] Populate DV Done
5,484,878 UART: [fht] FMC Alias Private Key: 7
5,485,914 UART: [art] Derive CDI
5,486,194 UART: [art] Store in in slot 0x4
5,571,953 UART: [art] Derive Key Pair
5,572,313 UART: [art] Store priv key in slot 0x5
5,585,771 UART: [art] Derive Key Pair - Done
5,600,550 UART: [art] Signing Cert with AUTHO
5,601,030 UART: RITY.KEYID = 7
5,616,354 UART: [art] Erasing AUTHORITY.KEYID = 7
5,617,119 UART: [art] PUB.X = 31FAFDE2A48B1BC3D18951CF2ACF1C12ECB428A4DAD33CEA76A1AD0731B97D4120FE93CDBBF41F76870C50E5BB0C2BB0
5,623,910 UART: [art] PUB.Y = 4A6B1CA3502B72DF293F75ED8988D44CC5D74577D0BDA682FA71BD54720ADCF211993B6DA3D535EEC608413ABC5B1786
5,630,866 UART: [art] SIG.R = 777F11D0F3C28A90D793ECEA3F05CCEADCF49EC874AE04C501B9FA8C6479CB8B368A3C3D03D8673F2B09106563F2752B
5,637,635 UART: [art] SIG.S = 61CC831BE1CA8413AFC368B9A6BA52A2A90FA3D49FD0CA20DFFFB07DA984B45CBD1F7FCBC1A5DF31EB219CFB899874CE
5,660,823 UART: Caliptra RT
5,661,076 UART: [state] CFI Enabled
5,943,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,973,973 UART: [rt]cmd =0x4d454153, len=108
5,994,277 >>> mbox cmd response data (12 bytes)
5,994,278 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,995,219 UART:
5,995,235 UART: Running Caliptra ROM ...
5,995,643 UART:
5,995,698 UART: [state] CFI Enabled
5,998,612 UART: [state] LifecycleState = Unprovisioned
5,999,267 UART: [state] DebugLocked = No
5,999,941 UART: [state] WD Timer not started. Device not locked for debugging
6,001,049 UART: [kat] SHA2-256
6,804,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,808,728 UART: [kat] ++
6,808,880 UART: [kat] sha1
6,813,162 UART: [kat] SHA2-256
6,815,102 UART: [kat] SHA2-384
6,817,687 UART: [kat] SHA2-512-ACC
6,819,587 UART: [kat] ECC-384
6,828,818 UART: [kat] HMAC-384Kdf
6,833,430 UART: [kat] LMS
7,081,742 UART: [kat] --
7,082,680 UART: [update-reset] ++
7,987,113 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,988,322 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,084,704 >>> mbox cmd response: success
8,084,704 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,084,957 UART: [update-reset] Copying MAN_2 To MAN_1
8,092,971 UART: [update-reset Success] --
8,094,284 UART: [state] Locking Datavault
8,094,932 UART: [state] Locking PCR0, PCR1 and PCR31
8,095,536 UART: [state] Locking ICCM
8,096,104 UART: [exit] Launching FMC @ 0x40000130
8,101,433 UART:
8,101,449 UART: Running Caliptra FMC ...
8,101,857 UART:
8,101,911 UART: [state] CFI Enabled
8,190,796 UART: [art] Extend RT PCRs Done
8,191,224 UART: [art] Lock RT PCRs Done
8,192,629 UART: [art] Populate DV Done
8,200,748 UART: [fht] FMC Alias Private Key: 7
8,201,706 UART: [art] Derive CDI
8,201,986 UART: [art] Store in in slot 0x4
8,287,679 UART: [art] Derive Key Pair
8,288,039 UART: [art] Store priv key in slot 0x5
8,301,115 UART: [art] Derive Key Pair - Done
8,315,877 UART: [art] Signing Cert with AUTHO
8,316,357 UART: RITY.KEYID = 7
8,331,429 UART: [art] Erasing AUTHORITY.KEYID = 7
8,332,194 UART: [art] PUB.X = 13C0628D8F09F47A5139F749186F6012F3F1EA23879B943D30D84C97214F94E83E4ADB311ABDFC2F0E6BD45915F0EB3D
8,338,964 UART: [art] PUB.Y = D5B131389630FB18D593DFDBCC6342B6BEDD94BF6E2709F9BAAC54D0DDFE7A870F5DA8772B8FA55C8D9E97E3B9810FEE
8,345,931 UART: [art] SIG.R = 56FC6ABF68BBFBB1A6CE8862F169B0702969D44B404EF74BD697DF28A61D5EE8F42D19D68A9EE3BA34A2F284ECF4DF39
8,352,723 UART: [art] SIG.S = 44A86D39CBA9359496B3A3C25F2851215614431BD80EAC5E0932EE8CFD76B17EC84F0801A3B8F59C5D9AB252A1DE5FFE
8,376,052 UART: mbox::rt_entry...
8,376,424 UART: ____ _ _ _ ____ _____
8,377,208 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,378,008 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,378,776 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,379,544 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,380,312 UART: |_|
8,380,624 UART:
8,661,726 UART: [rt] Runtime listening for mailbox commands...
8,662,690 UART:
8,662,706 UART: Running Caliptra ROM ...
8,663,114 UART:
8,663,169 UART: [state] CFI Enabled
8,666,065 UART: [state] LifecycleState = Unprovisioned
8,666,720 UART: [state] DebugLocked = No
8,667,276 UART: [state] WD Timer not started. Device not locked for debugging
8,668,600 UART: [kat] SHA2-256
9,472,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,476,279 UART: [kat] ++
9,476,431 UART: [kat] sha1
9,480,705 UART: [kat] SHA2-256
9,482,645 UART: [kat] SHA2-384
9,485,328 UART: [kat] SHA2-512-ACC
9,487,228 UART: [kat] ECC-384
9,496,855 UART: [kat] HMAC-384Kdf
9,501,683 UART: [kat] LMS
9,749,995 UART: [kat] --
9,750,959 UART: [update-reset] ++
10,655,506 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,656,665 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,753,047 >>> mbox cmd response: success
10,753,047 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,753,302 UART: [update-reset] Copying MAN_2 To MAN_1
10,761,316 UART: [update-reset Success] --
10,762,085 UART: [state] Locking Datavault
10,762,717 UART: [state] Locking PCR0, PCR1 and PCR31
10,763,321 UART: [state] Locking ICCM
10,763,945 UART: [exit] Launching FMC @ 0x40000130
10,769,274 UART:
10,769,290 UART: Running Caliptra FMC ...
10,769,698 UART:
10,769,752 UART: [state] CFI Enabled
10,859,033 UART: [art] Extend RT PCRs Done
10,859,461 UART: [art] Lock RT PCRs Done
10,860,680 UART: [art] Populate DV Done
10,868,893 UART: [fht] FMC Alias Private Key: 7
10,869,873 UART: [art] Derive CDI
10,870,153 UART: [art] Store in in slot 0x4
10,955,836 UART: [art] Derive Key Pair
10,956,196 UART: [art] Store priv key in slot 0x5
10,969,382 UART: [art] Derive Key Pair - Done
10,984,230 UART: [art] Signing Cert with AUTHO
10,984,710 UART: RITY.KEYID = 7
10,999,910 UART: [art] Erasing AUTHORITY.KEYID = 7
11,000,675 UART: [art] PUB.X = D8A478D1D9A6820CAE9B0C3CDB36D38DB711CE3A69E9911B248AE35B44058BAE0682D3224B9E5C327C42438DD3F8E101
11,007,440 UART: [art] PUB.Y = 62C0BC028E9D5F2B611C2347A762766A0166C66B998EFCF1AC1C56E3A8E4311891FD3DBADE8E484E36BA7062CDE81EF9
11,014,398 UART: [art] SIG.R = FD93B8A734069100449F0570EA25D5CB83ED98F4DFC643E19DE5EA6375F6B19BCB039EB6D59589C7366C6B4544E8F8F1
11,021,145 UART: [art] SIG.S = 2DA423B291F94D4ED49D0FD7C3FFDA13CA97E92AFC0DB337C12A2257CADD95E193A719868611C8C7F6872C1FFCDDB6C9
11,044,816 UART: mbox::rt_entry...
11,045,188 UART: ____ _ _ _ ____ _____
11,045,972 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,046,772 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,047,540 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,048,308 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,049,076 UART: |_|
11,049,388 UART:
11,333,776 UART: [rt] Runtime listening for mailbox commands...
11,334,972 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,098 ready_for_fw is high
1,056,098 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,159,921 >>> mbox cmd response: success
2,159,921 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,221,857 UART:
2,221,873 UART: Running Caliptra FMC ...
2,222,281 UART:
2,222,335 UART: [state] CFI Enabled
2,232,990 UART: [fht] FMC Alias Private Key: 7
2,341,053 UART: [art] Extend RT PCRs Done
2,341,481 UART: [art] Lock RT PCRs Done
2,342,731 UART: [art] Populate DV Done
2,350,876 UART: [fht] FMC Alias Private Key: 7
2,351,986 UART: [art] Derive CDI
2,352,266 UART: [art] Store in in slot 0x4
2,437,695 UART: [art] Derive Key Pair
2,438,055 UART: [art] Store priv key in slot 0x5
2,451,011 UART: [art] Derive Key Pair - Done
2,466,030 UART: [art] Signing Cert with AUTHO
2,466,510 UART: RITY.KEYID = 7
2,481,596 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,361 UART: [art] PUB.X = FDDF8993665CE3F89441C7C01424622DCDFB248D8CAFF4629088EF2A586893FC0D254028630BABF8F30B8425457A8229
2,489,124 UART: [art] PUB.Y = 0910A31FE8118228ADBEB9C56D9BFC2887E31D8B9CAD186C2DD8C805784768A4729B9792B1CE59A068621EB498E84C21
2,496,072 UART: [art] SIG.R = C41B4F69816C1566CB63C697407BD070DEA3E3CEEF43F2FC947AB8497C4E765BD75178A087C236129D27EA10D8E6E8FE
2,502,852 UART: [art] SIG.S = 2DB6B8672DA0918A2426634E9AA57850FB6E25BA9B0F880A131BCFBEB49994AB3E3A0466799C729FA2179DF2C474FC87
2,526,928 UART: mbox::rt_entry...
2,527,300 UART: ____ _ _ _ ____ _____
2,528,084 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,884 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,652 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,420 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,188 UART: |_|
2,531,500 UART:
2,637,880 UART: [rt] Runtime listening for mailbox commands...
2,639,067 >>> mbox cmd response data (48 bytes)
2,639,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,074,259 >>> mbox cmd response: success
5,074,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,087,229 UART:
5,087,245 UART: Running Caliptra FMC ...
5,087,653 UART:
5,087,707 UART: [state] CFI Enabled
5,176,602 UART: [art] Extend RT PCRs Done
5,177,030 UART: [art] Lock RT PCRs Done
5,178,431 UART: [art] Populate DV Done
5,186,638 UART: [fht] FMC Alias Private Key: 7
5,187,708 UART: [art] Derive CDI
5,187,988 UART: [art] Store in in slot 0x4
5,273,489 UART: [art] Derive Key Pair
5,273,849 UART: [art] Store priv key in slot 0x5
5,287,165 UART: [art] Derive Key Pair - Done
5,301,712 UART: [art] Signing Cert with AUTHO
5,302,192 UART: RITY.KEYID = 7
5,317,114 UART: [art] Erasing AUTHORITY.KEYID = 7
5,317,879 UART: [art] PUB.X = 94DDF7FC2DEBA8F7EEC372CA1613E3ECD62D70E1F2302EF473AA7C1F377B2C4EBF7B431EC3BE3E235B57008F3E334CBB
5,324,655 UART: [art] PUB.Y = E8CCE4013E5DBC09A93290F59E1A4942F26C18C3CB8D3A09507BD5E515F4CBE3761157F1553829F6BD5279F05F4AFB57
5,331,604 UART: [art] SIG.R = B00B931499D6C2939A82E8287B882F608F1E1DCDF16EE4DD333338FF6B6B8F9656180D3856114A2D90959BB60C846259
5,338,361 UART: [art] SIG.S = 18DA945170397098DE8CB524B88A0A27ADA1A7F4C139C02BD24D967E09C54F1FAE1A918970A69A99FD2D1DE50B3224AC
5,362,047 UART: Caliptra RT
5,362,300 UART: [state] CFI Enabled
5,645,347 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,676,453 UART: [rt]cmd =0x4d454153, len=108
5,697,383 >>> mbox cmd response data (12 bytes)
5,697,384 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,668,069 >>> mbox cmd response: success
7,668,069 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,681,701 UART:
7,681,717 UART: Running Caliptra FMC ...
7,682,125 UART:
7,682,179 UART: [state] CFI Enabled
7,771,000 UART: [art] Extend RT PCRs Done
7,771,428 UART: [art] Lock RT PCRs Done
7,772,727 UART: [art] Populate DV Done
7,780,860 UART: [fht] FMC Alias Private Key: 7
7,781,960 UART: [art] Derive CDI
7,782,240 UART: [art] Store in in slot 0x4
7,868,187 UART: [art] Derive Key Pair
7,868,547 UART: [art] Store priv key in slot 0x5
7,881,663 UART: [art] Derive Key Pair - Done
7,896,259 UART: [art] Signing Cert with AUTHO
7,896,739 UART: RITY.KEYID = 7
7,912,123 UART: [art] Erasing AUTHORITY.KEYID = 7
7,912,888 UART: [art] PUB.X = 0FD2D8563AFF8C34971BF8D106A3D19E9DBC6AFBF717E2CBB3497B9C82A532FD9E0ACDC3EBA5703B2F3572843489D450
7,919,667 UART: [art] PUB.Y = 9CB60AF9D6BD1EFFC11E95F7192F0C53F65C3AA963E07FAD48C493F18CA38A6DD4D62E30F607F7309A698DC5204A5087
7,926,622 UART: [art] SIG.R = 0729CEBC27BFD1AE54D2F13002438CA771E1852ED37CBA0ABB2D3AEEC4A40D04C00D8DC15B9E6BF5E684C57C91FD71A1
7,933,398 UART: [art] SIG.S = E91119178C78413E4885E42B99EF97726AD735CE88F2806C1E2A3FB2AA4DAA51560EDD4F2C97A7B2A7B02D0254F18C0A
7,956,710 UART: mbox::rt_entry...
7,957,082 UART: ____ _ _ _ ____ _____
7,957,866 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,958,666 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,959,434 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,960,202 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,960,970 UART: |_|
7,961,282 UART:
8,238,472 UART: [rt] Runtime listening for mailbox commands...
10,209,986 >>> mbox cmd response: success
10,209,986 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,223,428 UART:
10,223,444 UART: Running Caliptra FMC ...
10,223,852 UART:
10,223,906 UART: [state] CFI Enabled
10,312,697 UART: [art] Extend RT PCRs Done
10,313,125 UART: [art] Lock RT PCRs Done
10,314,362 UART: [art] Populate DV Done
10,322,707 UART: [fht] FMC Alias Private Key: 7
10,323,695 UART: [art] Derive CDI
10,323,975 UART: [art] Store in in slot 0x4
10,409,118 UART: [art] Derive Key Pair
10,409,478 UART: [art] Store priv key in slot 0x5
10,422,826 UART: [art] Derive Key Pair - Done
10,437,860 UART: [art] Signing Cert with AUTHO
10,438,340 UART: RITY.KEYID = 7
10,453,654 UART: [art] Erasing AUTHORITY.KEYID = 7
10,454,419 UART: [art] PUB.X = 65A1D174EC90B381049FCFBDC93CF5A8A83A9C948FD493B83B3010CC74D88B7C2D3B1C82126D5362E7BEE5441C6FCBB2
10,461,202 UART: [art] PUB.Y = 86C45968DF55D0C4F87898831A9BB2BDFC9EA641F2F8442A02317AACA2B7FBF498C7B8865D6C672D191D77F5DD084C57
10,468,156 UART: [art] SIG.R = D7AD39102E5BFE16C46B661EB866BF7F135B2B9BC72534744E9F5180A01C8D78E5B8383252F3A035E87BB2C08E008CA3
10,474,910 UART: [art] SIG.S = 3E2DBE5C6B25DDE4CC1D1555356329A83FC690C63FD50E096505D6415602E7FC7648E374C98EF0C7AB0CD44086F7EB7D
10,498,164 UART: mbox::rt_entry...
10,498,536 UART: ____ _ _ _ ____ _____
10,499,320 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,500,120 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,500,888 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,501,656 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,502,424 UART: |_|
10,502,736 UART:
10,784,918 UART: [rt] Runtime listening for mailbox commands...
10,786,114 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.54s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,283,291 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,821 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,130 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,384 >>> mbox cmd response: success
2,311,384 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,312,607 UART: [afmc] ++
2,312,775 UART: [afmc] CDI.KEYID = 6
2,313,138 UART: [afmc] SUBJECT.KEYID = 7
2,313,564 UART: [afmc] AUTHORITY.KEYID = 5
2,348,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,869 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,332 UART: [afmc] --
2,392,246 UART: [cold-reset] --
2,393,160 UART: [state] Locking Datavault
2,394,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,905 UART: [state] Locking ICCM
2,395,529 UART: [exit] Launching FMC @ 0x40000130
2,400,858 UART:
2,400,874 UART: Running Caliptra FMC ...
2,401,282 UART:
2,401,425 UART: [state] CFI Enabled
2,411,668 UART: [fht] FMC Alias Private Key: 7
2,519,583 UART: [art] Extend RT PCRs Done
2,520,011 UART: [art] Lock RT PCRs Done
2,521,501 UART: [art] Populate DV Done
2,529,374 UART: [fht] FMC Alias Private Key: 7
2,530,362 UART: [art] Derive CDI
2,530,642 UART: [art] Store in in slot 0x4
2,616,467 UART: [art] Derive Key Pair
2,616,827 UART: [art] Store priv key in slot 0x5
2,631,081 UART: [art] Derive Key Pair - Done
2,645,899 UART: [art] Signing Cert with AUTHO
2,646,379 UART: RITY.KEYID = 7
2,662,023 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,788 UART: [art] PUB.X = DC176AD50E1C1C7E8BEA245738594D5AD46725147959AFE797B582047C351EB04C87C053EBA8FB54F027C50432546AA5
2,669,551 UART: [art] PUB.Y = D9E9FA31741C918A0696B21ED535C12DF60347CCA9B6BDD0985571FC811C49EB500DAED1793D95951383E72BFBEE6164
2,676,500 UART: [art] SIG.R = 684F3DAA89C41645BCF15EA19A6C98341BFBF8ACC81BE6A2F90896ABBFD918BC419DA8D38F94D7F84A50C516B0668850
2,683,283 UART: [art] SIG.S = D25EEB56D485C2D107F8E1DF5E44ED708AF589FD155C3E3CE9C0FBDD8E1CC1D71544536AF72E242E57D12B488A14629F
2,707,123 UART: mbox::rt_entry...
2,707,495 UART: ____ _ _ _ ____ _____
2,708,279 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,079 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,847 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,615 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,383 UART: |_|
2,711,695 UART:
2,817,847 UART: [rt] Runtime listening for mailbox commands...
2,819,034 >>> mbox cmd response data (48 bytes)
2,819,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,819,146 UART:
2,819,162 UART: Running Caliptra ROM ...
2,819,570 UART:
2,819,712 UART: [state] CFI Enabled
2,822,342 UART: [state] LifecycleState = Unprovisioned
2,822,997 UART: [state] DebugLocked = No
2,823,727 UART: [state] WD Timer not started. Device not locked for debugging
2,824,981 UART: [kat] SHA2-256
3,628,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,632,660 UART: [kat] ++
3,632,812 UART: [kat] sha1
3,637,124 UART: [kat] SHA2-256
3,639,064 UART: [kat] SHA2-384
3,641,799 UART: [kat] SHA2-512-ACC
3,643,699 UART: [kat] ECC-384
3,652,952 UART: [kat] HMAC-384Kdf
3,657,764 UART: [kat] LMS
3,906,076 UART: [kat] --
3,906,588 UART: [update-reset] ++
5,220,422 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,221,431 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,371,429 >>> mbox cmd response: success
5,371,429 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,371,658 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,672 UART: [update-reset Success] --
5,380,743 UART: [state] Locking Datavault
5,381,647 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,251 UART: [state] Locking ICCM
5,382,905 UART: [exit] Launching FMC @ 0x40000130
5,388,234 UART:
5,388,250 UART: Running Caliptra FMC ...
5,388,658 UART:
5,388,801 UART: [state] CFI Enabled
5,477,434 UART: [art] Extend RT PCRs Done
5,477,862 UART: [art] Lock RT PCRs Done
5,479,205 UART: [art] Populate DV Done
5,487,284 UART: [fht] FMC Alias Private Key: 7
5,488,300 UART: [art] Derive CDI
5,488,580 UART: [art] Store in in slot 0x4
5,574,161 UART: [art] Derive Key Pair
5,574,521 UART: [art] Store priv key in slot 0x5
5,588,019 UART: [art] Derive Key Pair - Done
5,602,876 UART: [art] Signing Cert with AUTHO
5,603,356 UART: RITY.KEYID = 7
5,618,050 UART: [art] Erasing AUTHORITY.KEYID = 7
5,618,815 UART: [art] PUB.X = DEDAFDE3AEE0CD43A9818C3072DF8F0097DB56FC1A2C26CA7131E3BC85C0D0565D1C2B2A67514D6FBBA379CD882599C5
5,625,585 UART: [art] PUB.Y = 3DE7C66FD9397B8909BA1FF4550CCFD386A93581DA81D2E2B60D5C72D2B60367D3AB80F7BBD9BCB992A27FA2B2740B17
5,632,536 UART: [art] SIG.R = 55BA9CA0187BDCF1C548D5C1A5A3A5A72E5FA6CA35DE2FC029A464B380A594F41D751EE12D2C10C070B54AABB90DCC61
5,639,325 UART: [art] SIG.S = 6AF15681F553CC3A4528955FBFCC2F54AFE1D8A8BB3C10148317EB03B70441CE36FC044CA171F286C4F5E9A9FAB0F763
5,663,481 UART: Caliptra RT
5,663,826 UART: [state] CFI Enabled
5,947,041 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,353 UART: [rt]cmd =0x4d454153, len=108
5,999,261 >>> mbox cmd response data (12 bytes)
5,999,262 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,999,919 UART:
5,999,935 UART: Running Caliptra ROM ...
6,000,343 UART:
6,000,485 UART: [state] CFI Enabled
6,003,499 UART: [state] LifecycleState = Unprovisioned
6,004,154 UART: [state] DebugLocked = No
6,004,636 UART: [state] WD Timer not started. Device not locked for debugging
6,005,776 UART: [kat] SHA2-256
6,809,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,813,455 UART: [kat] ++
6,813,607 UART: [kat] sha1
6,817,863 UART: [kat] SHA2-256
6,819,803 UART: [kat] SHA2-384
6,822,580 UART: [kat] SHA2-512-ACC
6,824,480 UART: [kat] ECC-384
6,834,457 UART: [kat] HMAC-384Kdf
6,839,157 UART: [kat] LMS
7,087,469 UART: [kat] --
7,088,171 UART: [update-reset] ++
7,993,166 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,994,239 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,090,621 >>> mbox cmd response: success
8,090,621 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,090,908 UART: [update-reset] Copying MAN_2 To MAN_1
8,098,922 UART: [update-reset Success] --
8,099,951 UART: [state] Locking Datavault
8,100,579 UART: [state] Locking PCR0, PCR1 and PCR31
8,101,183 UART: [state] Locking ICCM
8,101,677 UART: [exit] Launching FMC @ 0x40000130
8,107,006 UART:
8,107,022 UART: Running Caliptra FMC ...
8,107,430 UART:
8,107,573 UART: [state] CFI Enabled
8,196,562 UART: [art] Extend RT PCRs Done
8,196,990 UART: [art] Lock RT PCRs Done
8,198,323 UART: [art] Populate DV Done
8,206,598 UART: [fht] FMC Alias Private Key: 7
8,207,694 UART: [art] Derive CDI
8,207,974 UART: [art] Store in in slot 0x4
8,293,223 UART: [art] Derive Key Pair
8,293,583 UART: [art] Store priv key in slot 0x5
8,307,275 UART: [art] Derive Key Pair - Done
8,321,881 UART: [art] Signing Cert with AUTHO
8,322,361 UART: RITY.KEYID = 7
8,337,549 UART: [art] Erasing AUTHORITY.KEYID = 7
8,338,314 UART: [art] PUB.X = 382384FB9C8E0BED174DE249CB4E45C7BA74F1971E2214D4184A71933444A4D68A1D069FADEDC06E1AA0639120507F3A
8,345,084 UART: [art] PUB.Y = 47B1795C9BE2788369A744E3C1D3EBDD0FD0AC9665FC4F6101B36D7CA2BAA6BF5789F24A3B24F77E4F64C8C476538683
8,352,038 UART: [art] SIG.R = 77C60D0DCD610ACA7415A372BCCBF5D955863CF02C87CB84040AE781548B11751EAD2E9FDDB502964E9E8DBC1A90884D
8,358,804 UART: [art] SIG.S = F9038125ABB329E0389FF599CDF8BBB7F9B6887ED2B122EED028CB93F0998CA317793BE67E969F7B382C23EED7D67324
8,382,482 UART: mbox::rt_entry...
8,382,854 UART: ____ _ _ _ ____ _____
8,383,638 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,384,438 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,385,206 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,385,974 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,386,742 UART: |_|
8,387,054 UART:
8,663,130 UART: [rt] Runtime listening for mailbox commands...
8,664,094 UART:
8,664,110 UART: Running Caliptra ROM ...
8,664,518 UART:
8,664,660 UART: [state] CFI Enabled
8,667,114 UART: [state] LifecycleState = Unprovisioned
8,667,769 UART: [state] DebugLocked = No
8,668,377 UART: [state] WD Timer not started. Device not locked for debugging
8,669,669 UART: [kat] SHA2-256
9,473,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,477,348 UART: [kat] ++
9,477,500 UART: [kat] sha1
9,481,684 UART: [kat] SHA2-256
9,483,624 UART: [kat] SHA2-384
9,486,405 UART: [kat] SHA2-512-ACC
9,488,305 UART: [kat] ECC-384
9,497,802 UART: [kat] HMAC-384Kdf
9,502,298 UART: [kat] LMS
9,750,610 UART: [kat] --
9,751,390 UART: [update-reset] ++
10,656,903 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,657,922 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
10,754,304 >>> mbox cmd response: success
10,754,304 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,754,427 UART: [update-reset] Copying MAN_2 To MAN_1
10,762,441 UART: [update-reset Success] --
10,763,400 UART: [state] Locking Datavault
10,764,188 UART: [state] Locking PCR0, PCR1 and PCR31
10,764,792 UART: [state] Locking ICCM
10,765,258 UART: [exit] Launching FMC @ 0x40000130
10,770,587 UART:
10,770,603 UART: Running Caliptra FMC ...
10,771,011 UART:
10,771,154 UART: [state] CFI Enabled
10,860,133 UART: [art] Extend RT PCRs Done
10,860,561 UART: [art] Lock RT PCRs Done
10,861,992 UART: [art] Populate DV Done
10,870,249 UART: [fht] FMC Alias Private Key: 7
10,871,219 UART: [art] Derive CDI
10,871,499 UART: [art] Store in in slot 0x4
10,957,370 UART: [art] Derive Key Pair
10,957,730 UART: [art] Store priv key in slot 0x5
10,971,034 UART: [art] Derive Key Pair - Done
10,986,087 UART: [art] Signing Cert with AUTHO
10,986,567 UART: RITY.KEYID = 7
11,001,923 UART: [art] Erasing AUTHORITY.KEYID = 7
11,002,688 UART: [art] PUB.X = 8B9B2B9C09C59B2EEABCFFD932CFAA1F3EF829DB10C03B85869EA260E66A1990D5A01E5E62FD03766C44D58DD1FCAF06
11,009,473 UART: [art] PUB.Y = B4C6DC31FD8E4EAA77622A94613711A9DE24C29E2F784A41029B2B89366EAF50C6D818317058D41F1C4A774B6A1E4D58
11,016,424 UART: [art] SIG.R = 6DAD8B2B301B44BD7F4371419A642486CB360C6F3FBDCA1D8E8B5BFDD7989FA644ED91CEE03D869A5AE91B1CD370E1B9
11,023,213 UART: [art] SIG.S = 7014965AB020AFC29A51814FD114836D67FE5303062BC78732B49E2AC12BD728ABD99E5E3AE78760B282AAE1935F28FC
11,046,926 UART: mbox::rt_entry...
11,047,298 UART: ____ _ _ _ ____ _____
11,048,082 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,048,882 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,049,650 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,050,418 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,051,186 UART: |_|
11,051,498 UART:
11,326,730 UART: [rt] Runtime listening for mailbox commands...
11,327,926 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,301 ready_for_fw is high
1,056,301 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,830 >>> mbox cmd response: success
2,162,830 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,225,866 UART:
2,225,882 UART: Running Caliptra FMC ...
2,226,290 UART:
2,226,433 UART: [state] CFI Enabled
2,236,708 UART: [fht] FMC Alias Private Key: 7
2,344,271 UART: [art] Extend RT PCRs Done
2,344,699 UART: [art] Lock RT PCRs Done
2,346,099 UART: [art] Populate DV Done
2,354,464 UART: [fht] FMC Alias Private Key: 7
2,355,568 UART: [art] Derive CDI
2,355,848 UART: [art] Store in in slot 0x4
2,441,523 UART: [art] Derive Key Pair
2,441,883 UART: [art] Store priv key in slot 0x5
2,454,963 UART: [art] Derive Key Pair - Done
2,469,976 UART: [art] Signing Cert with AUTHO
2,470,456 UART: RITY.KEYID = 7
2,485,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,091 UART: [art] PUB.X = 8173C63A25B2030B5F7695F1B2B64ADCC5776962888133D722F7626D319EC03618D9CD4CA1DC6CA3557DCDAB390CDF71
2,492,858 UART: [art] PUB.Y = 57E56D05A60C83CABC547CFBC8DD4522C25BE79BA8CA490945D2F6A99905313EB43CD8FAC9762AF858CC987096782584
2,499,804 UART: [art] SIG.R = BA77A40C49C5F8392CADE5DB2404212B22244E94386E6EDE6B3160EB30A28DD5EFDEB6A547D51E20FAD19893D9192B1B
2,506,582 UART: [art] SIG.S = 0FD225E95D3B3548DCD250B8E8F6ADDC917AC8D083624C6FE74EB798E7F9BC8184EAC9089139C2B206D1236EA74AF10A
2,530,109 UART: mbox::rt_entry...
2,530,481 UART: ____ _ _ _ ____ _____
2,531,265 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,065 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,833 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,601 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,369 UART: |_|
2,534,681 UART:
2,640,037 UART: [rt] Runtime listening for mailbox commands...
2,641,224 >>> mbox cmd response data (48 bytes)
2,641,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,075,520 >>> mbox cmd response: success
5,075,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,088,918 UART:
5,088,934 UART: Running Caliptra FMC ...
5,089,342 UART:
5,089,485 UART: [state] CFI Enabled
5,178,506 UART: [art] Extend RT PCRs Done
5,178,934 UART: [art] Lock RT PCRs Done
5,180,351 UART: [art] Populate DV Done
5,188,700 UART: [fht] FMC Alias Private Key: 7
5,189,790 UART: [art] Derive CDI
5,190,070 UART: [art] Store in in slot 0x4
5,275,789 UART: [art] Derive Key Pair
5,276,149 UART: [art] Store priv key in slot 0x5
5,289,631 UART: [art] Derive Key Pair - Done
5,304,672 UART: [art] Signing Cert with AUTHO
5,305,152 UART: RITY.KEYID = 7
5,320,264 UART: [art] Erasing AUTHORITY.KEYID = 7
5,321,029 UART: [art] PUB.X = D303FEA3CBCF9E01370DA9DE291C9494E060028A30827D5EB3281F98B3F731218E3A458F3CB38F2EB8BB81D671A7F1B1
5,327,797 UART: [art] PUB.Y = 028354E2B668BE45D3A7411AD7FB319132D4065D71804D9F1BF66BAB5C16EA700EC01F3757F55884E26F633AA5C91FEE
5,334,744 UART: [art] SIG.R = 7367BF6D56C23982F09333169E7F7299A36E87157E3C50D22DCC757752D9EA9058DAA23364C58AED317BA20151A8EC02
5,341,506 UART: [art] SIG.S = 44EF0C21F2C185EF70C850171364182EDAF2287AE9BFAA81E72806B6B4E50DE991ED9034EC01F880CE9022A4AF8CD0A3
5,365,409 UART: Caliptra RT
5,365,754 UART: [state] CFI Enabled
5,645,783 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,676,887 UART: [rt]cmd =0x4d454153, len=108
5,697,241 >>> mbox cmd response data (12 bytes)
5,697,242 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,670,208 >>> mbox cmd response: success
7,670,208 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,683,578 UART:
7,683,594 UART: Running Caliptra FMC ...
7,684,002 UART:
7,684,145 UART: [state] CFI Enabled
7,772,828 UART: [art] Extend RT PCRs Done
7,773,256 UART: [art] Lock RT PCRs Done
7,774,253 UART: [art] Populate DV Done
7,782,602 UART: [fht] FMC Alias Private Key: 7
7,783,630 UART: [art] Derive CDI
7,783,910 UART: [art] Store in in slot 0x4
7,869,931 UART: [art] Derive Key Pair
7,870,291 UART: [art] Store priv key in slot 0x5
7,883,863 UART: [art] Derive Key Pair - Done
7,898,747 UART: [art] Signing Cert with AUTHO
7,899,227 UART: RITY.KEYID = 7
7,914,711 UART: [art] Erasing AUTHORITY.KEYID = 7
7,915,476 UART: [art] PUB.X = 89D81F0D2EB3265A750B23B68FE41E3ED0C07EF07A2F77A58CEB22134132776A40399C14F449DCEDB93C9A96026CD9BC
7,922,247 UART: [art] PUB.Y = 7994BDB32FF144BF9FF47C2A96DEE343CAEA2DA39A70701F63F33F61DD075A5BC6C69581373A5C001105234C58CDC99D
7,929,181 UART: [art] SIG.R = 73931D75C51304197C2C0CC90AB8FA2876D94E2EB39064E561D2B1C570D796DFC157CDDF7532AA778A0C20035C326468
7,935,936 UART: [art] SIG.S = 43192FD6F508A2C56A12754DD1615FE378BD01BDF5C76A6A0889DA40D41378322038A9E27D2F45D0FA3B07BAB0EBF3D7
7,959,703 UART: mbox::rt_entry...
7,960,075 UART: ____ _ _ _ ____ _____
7,960,859 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,961,659 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,962,427 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,963,195 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,963,963 UART: |_|
7,964,275 UART:
8,247,995 UART: [rt] Runtime listening for mailbox commands...
10,220,734 >>> mbox cmd response: success
10,220,734 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,234,318 UART:
10,234,334 UART: Running Caliptra FMC ...
10,234,742 UART:
10,234,885 UART: [state] CFI Enabled
10,323,928 UART: [art] Extend RT PCRs Done
10,324,356 UART: [art] Lock RT PCRs Done
10,325,751 UART: [art] Populate DV Done
10,334,168 UART: [fht] FMC Alias Private Key: 7
10,335,262 UART: [art] Derive CDI
10,335,542 UART: [art] Store in in slot 0x4
10,421,021 UART: [art] Derive Key Pair
10,421,381 UART: [art] Store priv key in slot 0x5
10,434,905 UART: [art] Derive Key Pair - Done
10,449,478 UART: [art] Signing Cert with AUTHO
10,449,958 UART: RITY.KEYID = 7
10,464,862 UART: [art] Erasing AUTHORITY.KEYID = 7
10,465,627 UART: [art] PUB.X = ABC2D5C8F3D8CBD0A608941EB4DF1B398FA463356C9E719AE0EFDB323567C102DA7BEFB9C6E678A16E535B4E8609B3B6
10,472,408 UART: [art] PUB.Y = 044655B1CA83C6432DE2A0B6FAD9EB957F8ECD8732064A0315FB95445A364999A53AF80C2F6FB6DFAC178BF3566D288D
10,479,356 UART: [art] SIG.R = E34AF5E6DED1C5E001490CEF8F51F0B3A85735E791C540153058290218F5F35E142CE5AE04A8C22371FB68C8076AC8EA
10,486,117 UART: [art] SIG.S = 313CE50FCFE80A804E2183B2ABA4BD747BEBDF5A36857BAA0DB1E9D166D634F04A423593EA3885BE78EF647DAF4A7E64
10,510,199 UART: mbox::rt_entry...
10,510,571 UART: ____ _ _ _ ____ _____
10,511,355 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,512,155 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,512,923 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,513,691 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,514,459 UART: |_|
10,514,771 UART:
10,799,921 UART: [rt] Runtime listening for mailbox commands...
10,801,117 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
192,303 UART:
192,677 UART: Running Caliptra ROM ...
193,885 UART:
194,041 UART: [state] CFI Enabled
265,258 UART: [state] LifecycleState = Unprovisioned
267,340 UART: [state] DebugLocked = No
270,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,767 UART: [kat] SHA2-256
444,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,977 UART: [kat] ++
455,472 UART: [kat] sha1
466,703 UART: [kat] SHA2-256
469,354 UART: [kat] SHA2-384
474,989 UART: [kat] SHA2-512-ACC
477,358 UART: [kat] ECC-384
2,765,420 UART: [kat] HMAC-384Kdf
2,777,309 UART: [kat] LMS
3,967,593 UART: [kat] --
3,971,332 UART: [cold-reset] ++
3,973,128 UART: [fht] Storing FHT @ 0x50003400
3,984,824 UART: [idev] ++
3,985,398 UART: [idev] CDI.KEYID = 6
3,986,310 UART: [idev] SUBJECT.KEYID = 7
3,987,558 UART: [idev] UDS.KEYID = 0
3,988,597 ready_for_fw is high
3,988,812 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,424 UART: [idev] Erasing UDS.KEYID = 0
7,324,011 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,738 UART: [idev] --
7,348,895 UART: [ldev] ++
7,349,463 UART: [ldev] CDI.KEYID = 6
7,350,430 UART: [ldev] SUBJECT.KEYID = 5
7,351,648 UART: [ldev] AUTHORITY.KEYID = 7
7,352,884 UART: [ldev] FE.KEYID = 1
7,400,901 UART: [ldev] Erasing FE.KEYID = 1
10,732,879 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,276 UART: [ldev] --
13,095,893 UART: [fwproc] Waiting for Commands...
13,098,220 UART: [fwproc] Received command 0x46574c44
13,100,407 UART: [fwproc] Received Image of size 114124 bytes
17,155,602 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,230,094 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,298,960 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,615,654 >>> mbox cmd response: success
17,619,258 UART: [afmc] ++
17,619,855 UART: [afmc] CDI.KEYID = 6
17,620,823 UART: [afmc] SUBJECT.KEYID = 7
17,622,038 UART: [afmc] AUTHORITY.KEYID = 5
20,979,579 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,278,518 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,280,826 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,295,201 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,310,076 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,324,497 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,345,875 UART: [afmc] --
23,350,554 UART: [cold-reset] --
23,353,498 UART: [state] Locking Datavault
23,359,719 UART: [state] Locking PCR0, PCR1 and PCR31
23,361,480 UART: [state] Locking ICCM
23,364,171 UART: [exit] Launching FMC @ 0x40000130
23,372,563 UART:
23,372,799 UART: Running Caliptra FMC ...
23,373,899 UART:
23,374,060 UART: [state] CFI Enabled
23,437,241 UART: [fht] FMC Alias Private Key: 7
25,775,504 UART: [art] Extend RT PCRs Done
25,776,731 UART: [art] Lock RT PCRs Done
25,778,206 UART: [art] Populate DV Done
25,783,408 UART: [fht] FMC Alias Private Key: 7
25,785,055 UART: [art] Derive CDI
25,785,816 UART: [art] Store in in slot 0x4
25,846,006 UART: [art] Derive Key Pair
25,847,058 UART: [art] Store priv key in slot 0x5
29,140,180 UART: [art] Derive Key Pair - Done
29,152,950 UART: [art] Signing Cert with AUTHO
29,154,278 UART: RITY.KEYID = 7
31,442,207 UART: [art] Erasing AUTHORITY.KEYID = 7
31,443,711 UART: [art] PUB.X = 8BA2C306C7CD262C0637425FA83DD3FABF76CE0810AEDF97F37A183F62EDB16EEABCBEF4A055AA9A8FB6FC65824A5389
31,451,016 UART: [art] PUB.Y = 4E627524EDD7D4DE20F5B539FE76D579BC7F7E873ACF8162C2F57D34C4CB4526AE9E740824F7C5C89A780484687BFB63
31,458,260 UART: [art] SIG.R = AC18BDF01363422FE44D5B12AC47B592CE9704DA832425ECBDAB6C45EE1D20BCF757B494A6EE4F391E28AF7E7290042B
31,465,650 UART: [art] SIG.S = BA20FB93D1354A412D9F4C9778BBEEB4DF94639CE00277172E14E4356E1C76B6DBCFBE091D9780474F97E05758C9D698
32,771,346 UART: Caliptra RT
32,772,073 UART: [state] CFI Enabled
32,931,782 UART: [rt] RT listening for mailbox commands...
32,934,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,964,861 UART: [rt]cmd =0x4d454153, len=108
32,984,112 >>> mbox cmd response data (12 bytes)
35,109,587 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,210,276 UART:
35,210,625 UART: Running Caliptra ROM ...
35,211,755 UART:
35,211,932 UART: [state] CFI Enabled
35,283,513 UART: [state] LifecycleState = Unprovisioned
35,285,454 UART: [state] DebugLocked = No
35,288,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,292,508 UART: [kat] SHA2-256
35,462,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,472,741 UART: [kat] ++
35,473,225 UART: [kat] sha1
35,484,817 UART: [kat] SHA2-256
35,487,514 UART: [kat] SHA2-384
35,494,089 UART: [kat] SHA2-512-ACC
35,496,445 UART: [kat] ECC-384
37,783,096 UART: [kat] HMAC-384Kdf
37,796,023 UART: [kat] LMS
38,986,363 UART: [kat] --
38,989,612 UART: [update-reset] ++
42,700,857 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,704,100 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,962,526 >>> mbox cmd response: success
42,962,901 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,963,853 UART: [update-reset] Copying MAN_2 To MAN_1
42,986,296 UART: [update-reset Success] --
42,989,341 UART: [state] Locking Datavault
42,991,489 UART: [state] Locking PCR0, PCR1 and PCR31
42,993,252 UART: [state] Locking ICCM
42,994,710 UART: [exit] Launching FMC @ 0x40000130
43,003,165 UART:
43,003,409 UART: Running Caliptra FMC ...
43,004,518 UART:
43,004,685 UART: [state] CFI Enabled
43,097,586 UART: [art] Extend RT PCRs Done
43,098,776 UART: [art] Lock RT PCRs Done
43,100,232 UART: [art] Populate DV Done
43,105,751 UART: [fht] FMC Alias Private Key: 7
43,107,449 UART: [art] Derive CDI
43,108,270 UART: [art] Store in in slot 0x4
43,166,210 UART: [art] Derive Key Pair
43,167,252 UART: [art] Store priv key in slot 0x5
46,459,769 UART: [art] Derive Key Pair - Done
46,472,945 UART: [art] Signing Cert with AUTHO
46,474,252 UART: RITY.KEYID = 7
48,764,140 UART: [art] Erasing AUTHORITY.KEYID = 7
48,765,641 UART: [art] PUB.X = 97E54438BC70BA36AEDFE4374F8F7CA3657C3015F8341A2EC83B07462258E31846291B496B5063424C3E479D4A83375F
48,772,873 UART: [art] PUB.Y = 906FFFF8CAACB730D7FFE6387DE533B10EFF29AFCF58E346BDED5CCE6E3D1BC600D1EF8EB1C7144FB229D2442A098850
48,780,111 UART: [art] SIG.R = 228C6EE2823AC01A080280001DD1AB90EE10008F55B9F5C0C0CC6C93B0EBD1F030D8B18961217C1C34BECD6BC54B9EFA
48,787,500 UART: [art] SIG.S = 59C80CC9E7DE143A7E9216EA75EF62E8E9F750FE4669403173EF33DC9C484C41701F7545F2609904BB6B62D57B6FC563
50,091,934 UART: mbox::rt_entry...
50,092,910 UART: ____ _ _ _ ____ _____
50,094,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,096,914 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,098,848 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,100,778 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,102,702 UART: |_|
50,103,541 UART:
50,387,788 UART: [rt] Runtime listening for mailbox commands...
50,389,924 >>> mbox cmd response data (48 bytes)
50,390,489 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,392,809 >>> mbox cmd response data (48 bytes)
50,393,701 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,407,540 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,804,239 ready_for_fw is high
3,804,677 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,868,173 >>> mbox cmd response: success
23,564,522 UART:
23,564,921 UART: Running Caliptra FMC ...
23,566,056 UART:
23,566,226 UART: [state] CFI Enabled
23,634,309 UART: [fht] FMC Alias Private Key: 7
25,972,409 UART: [art] Extend RT PCRs Done
25,973,632 UART: [art] Lock RT PCRs Done
25,975,098 UART: [art] Populate DV Done
25,980,654 UART: [fht] FMC Alias Private Key: 7
25,982,370 UART: [art] Derive CDI
25,983,111 UART: [art] Store in in slot 0x4
26,042,805 UART: [art] Derive Key Pair
26,043,845 UART: [art] Store priv key in slot 0x5
29,336,421 UART: [art] Derive Key Pair - Done
29,349,691 UART: [art] Signing Cert with AUTHO
29,350,992 UART: RITY.KEYID = 7
31,637,987 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,491 UART: [art] PUB.X = 22C41AD97017E41BA6B3343BDF6B77327BB9BDDD9A85818F72E66EEF00763A820528D55B5B6789BE20906E57B07689B5
31,646,715 UART: [art] PUB.Y = DF620B7D13FAA57E66188AE8867428ACB1FDB299F670B139FC654D9C7FDD74008E886EEE6BFAB8E5B9A50985938D2A1E
31,653,973 UART: [art] SIG.R = 1321F423112D492CD4C525A6CDB7AB4BCCB561BD565D6ABE8E09234563959B55166E9630E9CF1F41B1DDC4C48D84F63D
31,661,392 UART: [art] SIG.S = 8745612A7CE8D6A74B2193D621B37384C9EA4AE7F0946D74977AEFE371BADA65537E8D7CC6A6F3BD312920135FE5D6E8
32,966,485 UART: Caliptra RT
32,967,183 UART: [state] CFI Enabled
33,148,297 UART: [rt] RT listening for mailbox commands...
33,150,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,181,301 UART: [rt]cmd =0x4d454153, len=108
33,199,985 >>> mbox cmd response data (12 bytes)
35,325,950 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,309,621 >>> mbox cmd response: success
43,310,143 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,343,710 UART:
43,343,987 UART: Running Caliptra FMC ...
43,345,108 UART:
43,345,276 UART: [state] CFI Enabled
43,442,079 UART: [art] Extend RT PCRs Done
43,443,272 UART: [art] Lock RT PCRs Done
43,444,703 UART: [art] Populate DV Done
43,450,011 UART: [fht] FMC Alias Private Key: 7
43,451,669 UART: [art] Derive CDI
43,452,992 UART: [art] Store in in slot 0x4
43,511,043 UART: [art] Derive Key Pair
43,512,051 UART: [art] Store priv key in slot 0x5
46,805,220 UART: [art] Derive Key Pair - Done
46,817,784 UART: [art] Signing Cert with AUTHO
46,819,121 UART: RITY.KEYID = 7
49,106,272 UART: [art] Erasing AUTHORITY.KEYID = 7
49,107,789 UART: [art] PUB.X = 6951794BD02958EE44C8210D16918CD1EB2D7BFC0BA2E7E434DF09E5671DEDBD877D6F34514286094D863D6724FACDE6
49,115,069 UART: [art] PUB.Y = 58B98D8039220FB38CD9497C44BAC5F9703DF5D083942DA55938CD5DBAE13E55456A2EB8081903A21A732A5FAC55AE70
49,122,319 UART: [art] SIG.R = EE1403B0646C378E8D5BBB53F1FE5E9BC359BFADA2400B00D9F6087E64D08FB5DEEE41C9AB91ABF171D9411446379DFE
49,129,683 UART: [art] SIG.S = 02DE2E684CADDD13098988C4A2B789BD4EFF7CC03BC22AB4C7B4D8D4C8F81B29561C836C20106A8174BE9379D700FF2E
50,434,238 UART: mbox::rt_entry...
50,435,200 UART: ____ _ _ _ ____ _____
50,437,165 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,439,175 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,441,034 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,442,959 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,444,843 UART: |_|
50,445,726 UART:
50,722,748 UART: [rt] Runtime listening for mailbox commands...
50,724,879 >>> mbox cmd response data (48 bytes)
50,725,450 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,727,770 >>> mbox cmd response data (48 bytes)
50,728,665 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,742,528 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,597 UART:
192,959 UART: Running Caliptra ROM ...
194,135 UART:
603,661 UART: [state] CFI Enabled
619,502 UART: [state] LifecycleState = Unprovisioned
621,417 UART: [state] DebugLocked = No
622,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,677 UART: [kat] SHA2-256
797,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,925 UART: [kat] ++
808,409 UART: [kat] sha1
818,438 UART: [kat] SHA2-256
821,159 UART: [kat] SHA2-384
826,363 UART: [kat] SHA2-512-ACC
828,724 UART: [kat] ECC-384
3,112,073 UART: [kat] HMAC-384Kdf
3,124,021 UART: [kat] LMS
4,314,089 UART: [kat] --
4,316,928 UART: [cold-reset] ++
4,318,646 UART: [fht] Storing FHT @ 0x50003400
4,330,980 UART: [idev] ++
4,331,539 UART: [idev] CDI.KEYID = 6
4,332,565 UART: [idev] SUBJECT.KEYID = 7
4,333,732 UART: [idev] UDS.KEYID = 0
4,334,773 ready_for_fw is high
4,334,995 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,371 UART: [idev] Erasing UDS.KEYID = 0
7,618,120 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,783 UART: [idev] --
7,645,227 UART: [ldev] ++
7,645,844 UART: [ldev] CDI.KEYID = 6
7,646,814 UART: [ldev] SUBJECT.KEYID = 5
7,648,018 UART: [ldev] AUTHORITY.KEYID = 7
7,649,244 UART: [ldev] FE.KEYID = 1
7,659,192 UART: [ldev] Erasing FE.KEYID = 1
10,950,659 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,565 UART: [ldev] --
13,310,713 UART: [fwproc] Waiting for Commands...
13,313,392 UART: [fwproc] Received command 0x46574c44
13,315,585 UART: [fwproc] Received Image of size 114124 bytes
17,363,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,272 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,830,168 >>> mbox cmd response: success
17,834,536 UART: [afmc] ++
17,835,131 UART: [afmc] CDI.KEYID = 6
17,836,035 UART: [afmc] SUBJECT.KEYID = 7
17,837,245 UART: [afmc] AUTHORITY.KEYID = 5
21,151,169 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,133 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,512 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,333 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,771 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,601 UART: [afmc] --
23,517,447 UART: [cold-reset] --
23,520,068 UART: [state] Locking Datavault
23,526,071 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,827 UART: [state] Locking ICCM
23,530,028 UART: [exit] Launching FMC @ 0x40000130
23,538,370 UART:
23,538,600 UART: Running Caliptra FMC ...
23,539,698 UART:
23,539,852 UART: [state] CFI Enabled
23,547,945 UART: [fht] FMC Alias Private Key: 7
25,878,642 UART: [art] Extend RT PCRs Done
25,879,862 UART: [art] Lock RT PCRs Done
25,881,591 UART: [art] Populate DV Done
25,886,995 UART: [fht] FMC Alias Private Key: 7
25,888,524 UART: [art] Derive CDI
25,889,333 UART: [art] Store in in slot 0x4
25,932,215 UART: [art] Derive Key Pair
25,933,257 UART: [art] Store priv key in slot 0x5
29,174,872 UART: [art] Derive Key Pair - Done
29,188,052 UART: [art] Signing Cert with AUTHO
29,189,359 UART: RITY.KEYID = 7
31,469,090 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,600 UART: [art] PUB.X = A5014D062E38B4FE7B5733FDC2D30F765E342084F9E15D345146B74C3A54C7DBEB56605E66B4E9B5F17AFB29588D8A9B
31,477,831 UART: [art] PUB.Y = D37A9BBB95BE519933980ACF072FE468BD316F45D7BA26ED7A1FE353612A268A9C8F30A549702273B5A337C45B2DE549
31,485,091 UART: [art] SIG.R = 48ADEC68D37B93ACD502D8EDAF519CDE2755B4A3AED3DF83F70F65BF29D6EFB03FE632B07047E6BF5156BC66444525B2
31,492,466 UART: [art] SIG.S = 9C9B92450F504637E41DD4AB41139C78B9C43523CEB63A5B7274F4DE7C0ADB6C47B6A018C3E83E914CD135F1B657CED6
32,797,570 UART: Caliptra RT
32,798,278 UART: [state] CFI Enabled
32,916,255 UART: [rt] RT listening for mailbox commands...
32,918,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,949,222 UART: [rt]cmd =0x4d454153, len=108
32,967,445 >>> mbox cmd response data (12 bytes)
35,019,333 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,120,282 UART:
35,120,627 UART: Running Caliptra ROM ...
35,121,752 UART:
35,121,913 UART: [state] CFI Enabled
35,138,231 UART: [state] LifecycleState = Unprovisioned
35,140,121 UART: [state] DebugLocked = No
35,141,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,146,227 UART: [kat] SHA2-256
35,315,957 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,326,487 UART: [kat] ++
35,326,940 UART: [kat] sha1
35,337,951 UART: [kat] SHA2-256
35,340,647 UART: [kat] SHA2-384
35,345,283 UART: [kat] SHA2-512-ACC
35,347,676 UART: [kat] ECC-384
37,631,455 UART: [kat] HMAC-384Kdf
37,643,252 UART: [kat] LMS
38,833,362 UART: [kat] --
38,838,667 UART: [update-reset] ++
42,549,455 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,552,861 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,811,280 >>> mbox cmd response: success
42,811,647 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,812,297 UART: [update-reset] Copying MAN_2 To MAN_1
42,834,726 UART: [update-reset Success] --
42,837,822 UART: [state] Locking Datavault
42,841,065 UART: [state] Locking PCR0, PCR1 and PCR31
42,842,836 UART: [state] Locking ICCM
42,844,226 UART: [exit] Launching FMC @ 0x40000130
42,852,674 UART:
42,852,902 UART: Running Caliptra FMC ...
42,853,996 UART:
42,854,145 UART: [state] CFI Enabled
42,898,326 UART: [art] Extend RT PCRs Done
42,899,512 UART: [art] Lock RT PCRs Done
42,900,797 UART: [art] Populate DV Done
42,906,248 UART: [fht] FMC Alias Private Key: 7
42,907,785 UART: [art] Derive CDI
42,908,544 UART: [art] Store in in slot 0x4
42,950,971 UART: [art] Derive Key Pair
42,952,006 UART: [art] Store priv key in slot 0x5
46,194,521 UART: [art] Derive Key Pair - Done
46,207,580 UART: [art] Signing Cert with AUTHO
46,208,901 UART: RITY.KEYID = 7
48,488,250 UART: [art] Erasing AUTHORITY.KEYID = 7
48,489,757 UART: [art] PUB.X = C6AC975286BBDFC5A6E327A582ED67CE2A663B8F1E4539BFC14C5E10E3E985575D6FFE106CAFF5D7901FB9605C466FA2
48,496,992 UART: [art] PUB.Y = CFAA82707191A94D8F5F52E7A56DDAA13C8CACB36A8257BEAEB9113E0677B3F636F0B36CCF46974070B6A0BB2AAF69E6
48,504,259 UART: [art] SIG.R = 74B5AE6EDE8253278F76180186C8BC467BECD83B18D0C95F66DAB191864521B040C79679863F29236A277276A9DCABB8
48,511,646 UART: [art] SIG.S = 81DC90D8616F0E6EBFF0EEFBA721DE5840EE1BD9840E58ABFDA271503D94D02D568B198C267D5F64526C0A7BE4B64247
49,816,081 UART: mbox::rt_entry...
49,817,031 UART: ____ _ _ _ ____ _____
49,819,003 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,820,931 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,822,859 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,824,785 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,826,712 UART: |_|
49,827,515 UART:
50,113,194 UART: [rt] Runtime listening for mailbox commands...
50,115,363 >>> mbox cmd response data (48 bytes)
50,115,958 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,118,281 >>> mbox cmd response data (48 bytes)
50,119,166 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,133,038 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,129,294 ready_for_fw is high
4,129,704 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,060,385 >>> mbox cmd response: success
23,700,822 UART:
23,701,212 UART: Running Caliptra FMC ...
23,702,325 UART:
23,702,473 UART: [state] CFI Enabled
23,710,769 UART: [fht] FMC Alias Private Key: 7
26,041,370 UART: [art] Extend RT PCRs Done
26,042,593 UART: [art] Lock RT PCRs Done
26,044,297 UART: [art] Populate DV Done
26,049,869 UART: [fht] FMC Alias Private Key: 7
26,051,567 UART: [art] Derive CDI
26,052,301 UART: [art] Store in in slot 0x4
26,094,949 UART: [art] Derive Key Pair
26,095,947 UART: [art] Store priv key in slot 0x5
29,337,647 UART: [art] Derive Key Pair - Done
29,350,323 UART: [art] Signing Cert with AUTHO
29,351,620 UART: RITY.KEYID = 7
31,630,407 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,913 UART: [art] PUB.X = 0F004BACE5413C215D786B85E41284A59E32CADF182334F4F68F6855C7A5EE86C92403B8DDFF19B0EAFEAE0D03A811E3
31,639,222 UART: [art] PUB.Y = 7A920C5FFE869C6A56690A65CAAB19B28B224735F2A9E0F81F3E9A7BF46439642A7EB5A0776BA19FF9AA10F949BDD5FC
31,646,449 UART: [art] SIG.R = F332EEE94AB68C571F8937981BA8F85246BBC385E0AC90CBD857D5EBD740C0577D2CA822CB6AB5993B0E013B263A9511
31,653,850 UART: [art] SIG.S = BA956259DACBB0C05C1DBDA084E13E7BE055D2482FFC0D01F3BE874748B43BFCB2BFD05A25A30D591637E4AE125B9095
32,958,855 UART: Caliptra RT
32,959,569 UART: [state] CFI Enabled
33,078,097 UART: [rt] RT listening for mailbox commands...
33,080,483 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,111,323 UART: [rt]cmd =0x4d454153, len=108
33,130,106 >>> mbox cmd response data (12 bytes)
35,180,180 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,068,853 >>> mbox cmd response: success
43,069,398 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,103,986 UART:
43,104,298 UART: Running Caliptra FMC ...
43,105,356 UART:
43,105,502 UART: [state] CFI Enabled
43,149,740 UART: [art] Extend RT PCRs Done
43,150,887 UART: [art] Lock RT PCRs Done
43,152,361 UART: [art] Populate DV Done
43,158,160 UART: [fht] FMC Alias Private Key: 7
43,159,901 UART: [art] Derive CDI
43,160,723 UART: [art] Store in in slot 0x4
43,203,851 UART: [art] Derive Key Pair
43,204,850 UART: [art] Store priv key in slot 0x5
46,447,140 UART: [art] Derive Key Pair - Done
46,460,029 UART: [art] Signing Cert with AUTHO
46,461,336 UART: RITY.KEYID = 7
48,740,945 UART: [art] Erasing AUTHORITY.KEYID = 7
48,742,449 UART: [art] PUB.X = 055926598C1B56682A976913794953D2C5E46A91795A2DA5ABD0875D98902829B08959336F4EA8539EADB383860450DD
48,749,688 UART: [art] PUB.Y = 1C58394EFCAE7D28939A2825FC0F06F4F14E58FFD621332ADA8DE2CF28B19813B2367BBE6A6EBCC0F3BA0471C780A1AD
48,756,975 UART: [art] SIG.R = 9E92C25EEF0B466550D822D27F481907F992095A664F90B66A82A5B117D630E6A8E24BC83055E3BF2FE1935B4FAAA1AC
48,764,324 UART: [art] SIG.S = 0606FA19BC1E4145F39DB9EE6DC06FF19CABCEB8456B95BA41BA22B51C2F2A43E66A795A528B6489A317B167C1D53C7E
50,069,312 UART: mbox::rt_entry...
50,070,275 UART: ____ _ _ _ ____ _____
50,072,257 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,074,259 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,076,186 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,078,112 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,080,036 UART: |_|
50,080,844 UART:
50,360,593 UART: [rt] Runtime listening for mailbox commands...
50,362,715 >>> mbox cmd response data (48 bytes)
50,363,289 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,365,606 >>> mbox cmd response data (48 bytes)
50,366,494 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,380,370 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,140 UART:
192,516 UART: Running Caliptra ROM ...
193,718 UART:
193,875 UART: [state] CFI Enabled
260,717 UART: [state] LifecycleState = Unprovisioned
262,623 UART: [state] DebugLocked = No
265,152 UART: [state] WD Timer not started. Device not locked for debugging
268,397 UART: [kat] SHA2-256
447,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,155 UART: [kat] ++
459,693 UART: [kat] sha1
471,563 UART: [kat] SHA2-256
474,611 UART: [kat] SHA2-384
480,037 UART: [kat] SHA2-512-ACC
482,977 UART: [kat] ECC-384
2,927,202 UART: [kat] HMAC-384Kdf
2,949,747 UART: [kat] LMS
3,479,142 UART: [kat] --
3,483,415 UART: [cold-reset] ++
3,485,549 UART: [fht] FHT @ 0x50003400
3,496,375 UART: [idev] ++
3,496,933 UART: [idev] CDI.KEYID = 6
3,497,883 UART: [idev] SUBJECT.KEYID = 7
3,499,050 UART: [idev] UDS.KEYID = 0
3,500,023 ready_for_fw is high
3,500,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,644,530 UART: [idev] Erasing UDS.KEYID = 0
6,002,912 UART: [idev] Sha1 KeyId Algorithm
6,024,971 UART: [idev] --
6,029,722 UART: [ldev] ++
6,030,291 UART: [ldev] CDI.KEYID = 6
6,031,221 UART: [ldev] SUBJECT.KEYID = 5
6,032,381 UART: [ldev] AUTHORITY.KEYID = 7
6,033,576 UART: [ldev] FE.KEYID = 1
6,078,434 UART: [ldev] Erasing FE.KEYID = 1
8,584,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,660 UART: [ldev] --
10,393,285 UART: [fwproc] Wait for Commands...
10,395,053 UART: [fwproc] Recv command 0x46574c44
10,397,143 UART: [fwproc] Recv'd Img size: 114448 bytes
13,803,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,877,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,264,638 >>> mbox cmd response: success
14,268,860 UART: [afmc] ++
14,269,479 UART: [afmc] CDI.KEYID = 6
14,270,391 UART: [afmc] SUBJECT.KEYID = 7
14,271,489 UART: [afmc] AUTHORITY.KEYID = 5
16,806,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,210 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,040 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,049 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,461 UART: [afmc] --
18,607,899 UART: [cold-reset] --
18,611,861 UART: [state] Locking Datavault
18,617,485 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,176 UART: [state] Locking ICCM
18,620,819 UART: [exit] Launching FMC @ 0x40000130
18,629,257 UART:
18,629,521 UART: Running Caliptra FMC ...
18,630,548 UART:
18,630,695 UART: [state] CFI Enabled
18,688,941 UART: [fht] FMC Alias Private Key: 7
20,453,304 UART: [art] Extend RT PCRs Done
20,454,517 UART: [art] Lock RT PCRs Done
20,456,331 UART: [art] Populate DV Done
20,461,788 UART: [fht] FMC Alias Private Key: 7
20,463,411 UART: [art] Derive CDI
20,464,155 UART: [art] Store in in slot 0x4
20,521,780 UART: [art] Derive Key Pair
20,522,773 UART: [art] Store priv key in slot 0x5
22,985,710 UART: [art] Derive Key Pair - Done
22,998,532 UART: [art] Signing Cert with AUTHO
22,999,829 UART: RITY.KEYID = 7
24,711,856 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,371 UART: [art] PUB.X = 938FBB641290E7838DAE1919B184489999A61559EADFA833D5D5449CE69CD3904ADF2ACAD4D3093B89676AAC9EEE328C
24,720,628 UART: [art] PUB.Y = BB6921B816AF607BF1642F994BB12A3DF2B5148D2DCA96C7A91DA844F4D1978FC1D96F34A3B61A74D4E05376661FFB35
24,727,876 UART: [art] SIG.R = 747033D6CF945BE55AA90CA0CA58C7A12D42766E0C7FDCF4CF4E860DC55D579550333821C278E814D57D340F262A2881
24,735,274 UART: [art] SIG.S = 7B2987C1AA09F3970E0455988244197D2D4F42EE7256A4ECC397DB2A23B64769693DBA199FF4F287021361858067BBD6
25,713,983 UART: Caliptra RT
25,714,682 UART: [state] CFI Enabled
25,881,088 UART: [rt] RT listening for mailbox commands...
25,883,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,914,893 UART: [rt]cmd =0x4d454153, len=108
25,933,396 >>> mbox cmd response data (12 bytes)
27,990,692 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,091,509 UART:
28,091,893 UART: Running Caliptra ROM ...
28,092,947 UART:
28,093,100 UART: [state] CFI Enabled
28,165,554 UART: [state] LifecycleState = Unprovisioned
28,167,439 UART: [state] DebugLocked = No
28,168,910 UART: [state] WD Timer not started. Device not locked for debugging
28,172,596 UART: [kat] SHA2-256
28,351,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,363,296 UART: [kat] ++
28,363,749 UART: [kat] sha1
28,375,009 UART: [kat] SHA2-256
28,378,029 UART: [kat] SHA2-384
28,383,748 UART: [kat] SHA2-512-ACC
28,386,673 UART: [kat] ECC-384
30,850,999 UART: [kat] HMAC-384Kdf
30,873,898 UART: [kat] LMS
31,403,302 UART: [kat] --
31,407,395 UART: [update-reset] ++
34,400,678 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,403,316 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,661,539 >>> mbox cmd response: success
34,661,934 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,663,260 UART: [update-reset] Copying MAN_2 To MAN_1
34,685,588 UART: [update-reset Success] --
34,690,409 UART: [state] Locking Datavault
34,694,354 UART: [state] Locking PCR0, PCR1 and PCR31
34,695,994 UART: [state] Locking ICCM
34,697,627 UART: [exit] Launching FMC @ 0x40000130
34,706,028 UART:
34,706,304 UART: Running Caliptra FMC ...
34,707,334 UART:
34,707,479 UART: [state] CFI Enabled
34,810,121 UART: [art] Extend RT PCRs Done
34,811,329 UART: [art] Lock RT PCRs Done
34,813,036 UART: [art] Populate DV Done
34,818,606 UART: [fht] FMC Alias Private Key: 7
34,820,135 UART: [art] Derive CDI
34,820,895 UART: [art] Store in in slot 0x4
34,879,961 UART: [art] Derive Key Pair
34,881,016 UART: [art] Store priv key in slot 0x5
37,343,715 UART: [art] Derive Key Pair - Done
37,357,037 UART: [art] Signing Cert with AUTHO
37,358,342 UART: RITY.KEYID = 7
39,070,350 UART: [art] Erasing AUTHORITY.KEYID = 7
39,071,851 UART: [art] PUB.X = 13A1BCFD3677EFD65A031536C813D904A876EE86115843B364838D1C9178ECB720142A59B25D70521C54D6708E8D38A5
39,079,057 UART: [art] PUB.Y = 005FA17AC07F2053E1AD23EE75F418381266E16C1AF66E2FC3E6A19C7BF8E81FE29F89DC1052C11FA19896967AA60E96
39,086,292 UART: [art] SIG.R = 9BA179351C6C5925CD7361C9E89C07902491A12C613CBAF5642B0A377327F46305DE7BB8AAD0ACC5D2A5775229C9B8ED
39,093,694 UART: [art] SIG.S = C3A10A52CA20F2158F4BA75C9D97A1A4925B27EEAD95EC11ECB5B0849FD17C6A01FE60BF99951F270FBB7E77D52F7703
40,071,804 UART: mbox::rt_entry...
40,072,757 UART: ____ _ _ _ ____ _____
40,074,689 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,076,703 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,078,563 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,080,491 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,082,375 UART: |_|
40,083,205 UART:
40,364,458 UART: [rt] Runtime listening for mailbox commands...
40,366,622 >>> mbox cmd response data (48 bytes)
40,367,225 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,369,562 >>> mbox cmd response data (48 bytes)
40,370,461 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,384,321 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,359,004 ready_for_fw is high
3,359,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,050,003 >>> mbox cmd response: success
18,343,023 UART:
18,343,414 UART: Running Caliptra FMC ...
18,344,531 UART:
18,344,684 UART: [state] CFI Enabled
18,412,421 UART: [fht] FMC Alias Private Key: 7
20,176,305 UART: [art] Extend RT PCRs Done
20,177,525 UART: [art] Lock RT PCRs Done
20,178,960 UART: [art] Populate DV Done
20,184,367 UART: [fht] FMC Alias Private Key: 7
20,185,917 UART: [art] Derive CDI
20,186,654 UART: [art] Store in in slot 0x4
20,245,485 UART: [art] Derive Key Pair
20,246,526 UART: [art] Store priv key in slot 0x5
22,709,427 UART: [art] Derive Key Pair - Done
22,722,316 UART: [art] Signing Cert with AUTHO
22,723,621 UART: RITY.KEYID = 7
24,435,275 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,780 UART: [art] PUB.X = 4A2A73510A027401C92A5F1CEDB85F1C0166F5E518831188BB8FBBDED7F50B9BDA51223E102E38364C3BE824130ECFE3
24,444,084 UART: [art] PUB.Y = A040308C3E89F6ACE15E95889BF69F9FB73E7A5A1801A56D81F9C862FC9E9E002A873B0363B3A2603AD978D837BF63A2
24,451,284 UART: [art] SIG.R = 3B8FDEF74030DC78788452045F498B8C6C5ECA658E06DDA68243ACD0E723A463990616DC1FB127D978F28BE7DBEA7B64
24,458,672 UART: [art] SIG.S = 13F661B71518E4802F86D413983164032463ADA097F5DC2AE63683A1D5462F3FAC5A47FAD6A066E67BC1861AC4A2F6B4
25,437,593 UART: Caliptra RT
25,438,287 UART: [state] CFI Enabled
25,603,502 UART: [rt] RT listening for mailbox commands...
25,605,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,637,289 UART: [rt]cmd =0x4d454153, len=108
25,655,888 >>> mbox cmd response data (12 bytes)
27,710,510 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,206,174 >>> mbox cmd response: success
34,206,662 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,240,555 UART:
34,240,885 UART: Running Caliptra FMC ...
34,241,928 UART:
34,242,079 UART: [state] CFI Enabled
34,342,177 UART: [art] Extend RT PCRs Done
34,343,364 UART: [art] Lock RT PCRs Done
34,344,848 UART: [art] Populate DV Done
34,350,372 UART: [fht] FMC Alias Private Key: 7
34,352,012 UART: [art] Derive CDI
34,352,754 UART: [art] Store in in slot 0x4
34,411,127 UART: [art] Derive Key Pair
34,412,187 UART: [art] Store priv key in slot 0x5
36,875,187 UART: [art] Derive Key Pair - Done
36,887,914 UART: [art] Signing Cert with AUTHO
36,889,208 UART: RITY.KEYID = 7
38,600,725 UART: [art] Erasing AUTHORITY.KEYID = 7
38,602,239 UART: [art] PUB.X = CDE861D58F243CDE186773302114CFB75FC3E3114C10D9B4FE9C6A5EE1B84237CF0BA6C14F33292F3F68DF197ED2E288
38,609,486 UART: [art] PUB.Y = 52AF03E4AD47D10CF44B06DD636DBE5727AF36E2D813EADC1AA55C522F61D0216BAB200E7E4E5D31BD116E2C2E6F9E8E
38,616,770 UART: [art] SIG.R = FCB0D5A8DA44C258F18EDBEF4C3D221BB3D4AF91C86A778128148732541EA2A4EC4900BE89E90F29C00110E8337D2574
38,624,246 UART: [art] SIG.S = 88A591C2AA3C8270F61E5C4F0311A675B3E37103432AEB79F0E5A4ABE3A40C2469B40430BF76747343B11DA0C126B8AC
39,603,090 UART: mbox::rt_entry...
39,604,029 UART: ____ _ _ _ ____ _____
39,605,959 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,607,965 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,609,894 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,611,819 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,613,749 UART: |_|
39,614,606 UART:
39,897,892 UART: [rt] Runtime listening for mailbox commands...
39,900,022 >>> mbox cmd response data (48 bytes)
39,900,642 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,902,973 >>> mbox cmd response data (48 bytes)
39,904,083 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,918,008 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,334 UART:
192,696 UART: Running Caliptra ROM ...
193,819 UART:
603,430 UART: [state] CFI Enabled
616,542 UART: [state] LifecycleState = Unprovisioned
618,355 UART: [state] DebugLocked = No
621,161 UART: [state] WD Timer not started. Device not locked for debugging
625,209 UART: [kat] SHA2-256
804,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,963 UART: [kat] ++
816,496 UART: [kat] sha1
827,583 UART: [kat] SHA2-256
830,592 UART: [kat] SHA2-384
835,655 UART: [kat] SHA2-512-ACC
838,581 UART: [kat] ECC-384
3,277,093 UART: [kat] HMAC-384Kdf
3,290,201 UART: [kat] LMS
3,819,641 UART: [kat] --
3,824,840 UART: [cold-reset] ++
3,826,419 UART: [fht] FHT @ 0x50003400
3,837,246 UART: [idev] ++
3,837,803 UART: [idev] CDI.KEYID = 6
3,838,828 UART: [idev] SUBJECT.KEYID = 7
3,839,942 UART: [idev] UDS.KEYID = 0
3,840,866 ready_for_fw is high
3,841,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,921 UART: [idev] Erasing UDS.KEYID = 0
6,314,904 UART: [idev] Sha1 KeyId Algorithm
6,337,965 UART: [idev] --
6,340,414 UART: [ldev] ++
6,341,003 UART: [ldev] CDI.KEYID = 6
6,341,919 UART: [ldev] SUBJECT.KEYID = 5
6,343,072 UART: [ldev] AUTHORITY.KEYID = 7
6,344,296 UART: [ldev] FE.KEYID = 1
6,353,422 UART: [ldev] Erasing FE.KEYID = 1
8,825,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,706 UART: [ldev] --
10,618,583 UART: [fwproc] Wait for Commands...
10,620,838 UART: [fwproc] Recv command 0x46574c44
10,622,924 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,244 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,482,998 >>> mbox cmd response: success
14,486,964 UART: [afmc] ++
14,487,551 UART: [afmc] CDI.KEYID = 6
14,488,451 UART: [afmc] SUBJECT.KEYID = 7
14,489,680 UART: [afmc] AUTHORITY.KEYID = 5
16,990,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,992 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,049 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,917 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,393 UART: [afmc] --
18,784,934 UART: [cold-reset] --
18,787,757 UART: [state] Locking Datavault
18,791,000 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,642 UART: [state] Locking ICCM
18,794,512 UART: [exit] Launching FMC @ 0x40000130
18,802,957 UART:
18,803,192 UART: Running Caliptra FMC ...
18,804,283 UART:
18,804,438 UART: [state] CFI Enabled
18,812,490 UART: [fht] FMC Alias Private Key: 7
20,569,300 UART: [art] Extend RT PCRs Done
20,570,528 UART: [art] Lock RT PCRs Done
20,572,600 UART: [art] Populate DV Done
20,578,279 UART: [fht] FMC Alias Private Key: 7
20,579,811 UART: [art] Derive CDI
20,580,564 UART: [art] Store in in slot 0x4
20,623,256 UART: [art] Derive Key Pair
20,624,252 UART: [art] Store priv key in slot 0x5
23,051,250 UART: [art] Derive Key Pair - Done
23,063,781 UART: [art] Signing Cert with AUTHO
23,065,084 UART: RITY.KEYID = 7
24,770,602 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,110 UART: [art] PUB.X = 566998C30AFEAD8A013CB97E2848EEE459355EEC8BE0D5F6D86FFC9CDAE6566DC0E54D0F02A374E037FC79CAE1227820
24,779,398 UART: [art] PUB.Y = 6CABEFC15E8393FD4FE0FC39F1B0DF2C64FD4AD164EC4BA15CE33B7AC27E016119F9E010785075059524B8C120C2A98A
24,786,720 UART: [art] SIG.R = 992719D37375CF8DE187E8FB8E8344F96BC6C8F384FF0DEB061806A788FA7EC79C0753A26C9EBCF1320514DEE2401E07
24,794,100 UART: [art] SIG.S = 670CDFBC78E91CBD70A0A54AACF915A22B521FB8190ADCAC13D3A7CA5BB04E26375278CD58F374C0B5204823B739EFD2
25,773,171 UART: Caliptra RT
25,773,880 UART: [state] CFI Enabled
25,891,388 UART: [rt] RT listening for mailbox commands...
25,893,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,924,335 UART: [rt]cmd =0x4d454153, len=108
25,943,172 >>> mbox cmd response data (12 bytes)
27,995,174 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,095,913 UART:
28,096,293 UART: Running Caliptra ROM ...
28,097,417 UART:
28,097,581 UART: [state] CFI Enabled
28,110,168 UART: [state] LifecycleState = Unprovisioned
28,112,005 UART: [state] DebugLocked = No
28,113,762 UART: [state] WD Timer not started. Device not locked for debugging
28,117,243 UART: [kat] SHA2-256
28,296,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,307,992 UART: [kat] ++
28,308,525 UART: [kat] sha1
28,319,953 UART: [kat] SHA2-256
28,322,969 UART: [kat] SHA2-384
28,329,490 UART: [kat] SHA2-512-ACC
28,332,414 UART: [kat] ECC-384
30,772,277 UART: [kat] HMAC-384Kdf
30,784,566 UART: [kat] LMS
31,314,075 UART: [kat] --
31,318,543 UART: [update-reset] ++
34,310,373 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,313,593 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,571,818 >>> mbox cmd response: success
34,572,169 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,573,051 UART: [update-reset] Copying MAN_2 To MAN_1
34,595,378 UART: [update-reset Success] --
34,599,440 UART: [state] Locking Datavault
34,603,705 UART: [state] Locking PCR0, PCR1 and PCR31
34,605,341 UART: [state] Locking ICCM
34,607,646 UART: [exit] Launching FMC @ 0x40000130
34,616,089 UART:
34,616,321 UART: Running Caliptra FMC ...
34,617,413 UART:
34,617,562 UART: [state] CFI Enabled
34,660,692 UART: [art] Extend RT PCRs Done
34,661,885 UART: [art] Lock RT PCRs Done
34,663,172 UART: [art] Populate DV Done
34,668,681 UART: [fht] FMC Alias Private Key: 7
34,670,261 UART: [art] Derive CDI
34,671,062 UART: [art] Store in in slot 0x4
34,713,345 UART: [art] Derive Key Pair
34,714,338 UART: [art] Store priv key in slot 0x5
37,140,970 UART: [art] Derive Key Pair - Done
37,153,910 UART: [art] Signing Cert with AUTHO
37,155,214 UART: RITY.KEYID = 7
38,860,911 UART: [art] Erasing AUTHORITY.KEYID = 7
38,862,414 UART: [art] PUB.X = BD1210D23156E58092C1C4DAFFE444DAA22096CB724C3A73CA165A26B73AFF797B393BE5B5CFCB696B36B8BB9A85B0B7
38,869,711 UART: [art] PUB.Y = 47699FCDD11D82AB4103B55AF0FE63C9397D4E016C92998C0BE67FFA37F74A57220FAF8160E91FE9A2867A1DD5D2C19C
38,876,986 UART: [art] SIG.R = 43F0FAF860A31171FD6AC01DA3A2EA18F89D6791395EDFED2CC3F06BC5F8F693CB2D0CEA77A3589D9659B891A76D6C23
38,884,420 UART: [art] SIG.S = 2C9A0CEB093EC3D2E14127F40B049259968A3115CE136D0036483CE2BC97D4B9E570047EE2C7BB64C6AA88E1C1696E06
39,863,514 UART: mbox::rt_entry...
39,864,460 UART: ____ _ _ _ ____ _____
39,866,553 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,868,552 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,870,396 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,872,308 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,874,169 UART: |_|
39,875,040 UART:
40,155,603 UART: [rt] Runtime listening for mailbox commands...
40,157,818 >>> mbox cmd response data (48 bytes)
40,158,467 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,160,794 >>> mbox cmd response data (48 bytes)
40,161,816 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,175,664 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,700,651 ready_for_fw is high
3,701,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,287,396 >>> mbox cmd response: success
18,537,347 UART:
18,537,753 UART: Running Caliptra FMC ...
18,538,863 UART:
18,539,022 UART: [state] CFI Enabled
18,546,748 UART: [fht] FMC Alias Private Key: 7
20,303,329 UART: [art] Extend RT PCRs Done
20,304,547 UART: [art] Lock RT PCRs Done
20,306,442 UART: [art] Populate DV Done
20,311,574 UART: [fht] FMC Alias Private Key: 7
20,313,166 UART: [art] Derive CDI
20,313,973 UART: [art] Store in in slot 0x4
20,356,343 UART: [art] Derive Key Pair
20,357,335 UART: [art] Store priv key in slot 0x5
22,784,068 UART: [art] Derive Key Pair - Done
22,797,085 UART: [art] Signing Cert with AUTHO
22,798,387 UART: RITY.KEYID = 7
24,503,687 UART: [art] Erasing AUTHORITY.KEYID = 7
24,505,194 UART: [art] PUB.X = 8FA92C3CD5BEEB2CD08E4F2716AEC1C2D3FF1A10E03C9DCDECEE68623014BCECF1437EF0AF4388F91A82D490BD0A0046
24,512,469 UART: [art] PUB.Y = 52E51B836D6F805CD2F64B1513EC8067668B2099016935C9A70AE07A43FE53158EE829D7678B93DCB0E628605210CA22
24,519,696 UART: [art] SIG.R = 4F093924AED3495CA65397BF46481F77AA8F1FBDB4075D283C9CF6A27EC47F5896DD6D7A2CEB79623E879AAA6E443AD9
24,527,100 UART: [art] SIG.S = 4C983157031D4B03741D0B92718FAE37D28236871FCB2BF5D7A13F198EABE479A852E0E49AACFB154C3EEE1BE168A88A
25,506,616 UART: Caliptra RT
25,507,311 UART: [state] CFI Enabled
25,624,855 UART: [rt] RT listening for mailbox commands...
25,627,281 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,658,001 UART: [rt]cmd =0x4d454153, len=108
25,676,818 >>> mbox cmd response data (12 bytes)
27,730,970 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,169,194 >>> mbox cmd response: success
34,169,690 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,203,097 UART:
34,203,430 UART: Running Caliptra FMC ...
34,204,462 UART:
34,204,599 UART: [state] CFI Enabled
34,249,267 UART: [art] Extend RT PCRs Done
34,250,410 UART: [art] Lock RT PCRs Done
34,251,831 UART: [art] Populate DV Done
34,257,137 UART: [fht] FMC Alias Private Key: 7
34,258,668 UART: [art] Derive CDI
34,259,394 UART: [art] Store in in slot 0x4
34,302,090 UART: [art] Derive Key Pair
34,303,134 UART: [art] Store priv key in slot 0x5
36,730,301 UART: [art] Derive Key Pair - Done
36,743,401 UART: [art] Signing Cert with AUTHO
36,744,699 UART: RITY.KEYID = 7
38,450,541 UART: [art] Erasing AUTHORITY.KEYID = 7
38,452,048 UART: [art] PUB.X = 90C2218231B38D977B030FE803922E10B13FFF4B577DF6E8DFAD3D0A1BDE99DB8C62B159A27F9CB95BE1E6A046E8ED1C
38,459,350 UART: [art] PUB.Y = 62297DFBFF7FC910BEB99E8A87C6C9EA9F4562051AAA21BDA1891A1655F5F48C639DA657854E9F0655D8C22204F20FEC
38,466,633 UART: [art] SIG.R = 1E37E4F1A4ED16B0AB899B55345B662A4723C535A8DD3B73CFC3A50B7554DFF5C9FD700F5DA16AC678EF3F9F74F14E07
38,474,011 UART: [art] SIG.S = 946D7F1091922B31C3D8D3CFBDFEF12452799A9A45B252FBA45BC4D084E4A9D364CECF6D8E3E653829DE57937B9F8FCE
39,452,414 UART: mbox::rt_entry...
39,453,376 UART: ____ _ _ _ ____ _____
39,455,357 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,457,352 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,459,272 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,461,194 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,463,116 UART: |_|
39,463,915 UART:
39,752,039 UART: [rt] Runtime listening for mailbox commands...
39,754,199 >>> mbox cmd response data (48 bytes)
39,754,775 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,757,093 >>> mbox cmd response data (48 bytes)
39,758,003 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,771,906 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,439,346 ready_for_fw is high
3,439,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,748,691 >>> mbox cmd response: success
19,028,003 UART:
19,028,391 UART: Running Caliptra FMC ...
19,029,581 UART:
19,029,753 UART: [state] CFI Enabled
19,096,022 UART: [fht] FMC Alias Private Key: 7
20,859,628 UART: [art] Extend RT PCRs Done
20,860,849 UART: [art] Lock RT PCRs Done
20,862,316 UART: [art] Populate DV Done
20,867,945 UART: [fht] FMC Alias Private Key: 7
20,869,539 UART: [art] Derive CDI
20,870,385 UART: [art] Store in in slot 0x4
20,928,795 UART: [art] Derive Key Pair
20,929,830 UART: [art] Store priv key in slot 0x5
23,392,658 UART: [art] Derive Key Pair - Done
23,405,979 UART: [art] Signing Cert with AUTHO
23,407,281 UART: RITY.KEYID = 7
25,118,673 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,182 UART: [art] PUB.X = 1EAD9CF49EE5A79A52BCAC786B4A2E879D154B583861AD857AECAFB791D535425DC2C286FE376F02F27E755B09ED8EF2
25,127,433 UART: [art] PUB.Y = F583EAC1B11571820473CF2224DD7420174DB1830A597C5EC95A086BF7F80DA698869FA2338D772143F4853A34768C6F
25,134,679 UART: [art] SIG.R = C185E3DA5A93B1D688D1CB950782849B6FF5728FBD532D0D216B3359D1EE3712D39FEC686869DA5E0D1804CEB7F873B7
25,142,122 UART: [art] SIG.S = A4DCF9A4D4A0A8102428001C4EF32EA945E8D2B6D3651927A4FA0D4A8A4B7F1470AC16C586A8B768C211FAF0389607E8
26,121,068 UART: Caliptra RT
26,121,762 UART: [state] CFI Enabled
26,286,045 UART: [rt] RT listening for mailbox commands...
26,288,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,319,493 UART: [rt]cmd =0x4d454153, len=108
26,337,587 >>> mbox cmd response data (12 bytes)
28,391,993 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,371,595 >>> mbox cmd response: success
35,372,112 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,408,335 UART:
35,408,654 UART: Running Caliptra FMC ...
35,409,831 UART:
35,409,993 UART: [state] CFI Enabled
35,497,053 UART: [art] Extend RT PCRs Done
35,498,248 UART: [art] Lock RT PCRs Done
35,499,672 UART: [art] Populate DV Done
35,505,155 UART: [fht] FMC Alias Private Key: 7
35,506,823 UART: [art] Derive CDI
35,507,562 UART: [art] Store in in slot 0x4
35,565,725 UART: [art] Derive Key Pair
35,566,768 UART: [art] Store priv key in slot 0x5
38,029,738 UART: [art] Derive Key Pair - Done
38,042,412 UART: [art] Signing Cert with AUTHO
38,043,711 UART: RITY.KEYID = 7
39,755,302 UART: [art] Erasing AUTHORITY.KEYID = 7
39,756,820 UART: [art] PUB.X = E46C6E788B6775CBCD6DA3055595B50F26FA14E5B0A21BE56DDAEB3637E26A56EDC8B9A62F9E63D5251764E6E7877B0A
39,764,068 UART: [art] PUB.Y = C6C00A2551D7C6D12440BE88C916E8B836628B469358420C8E9E88D64309D52B3A683A9EEC41E00553C3EDA963AD8053
39,771,298 UART: [art] SIG.R = B88FA2D4F1B2CBED3F7C0DDD9B18BDAB88EA62FE4C91841F84F32824306710224136637A3FF889D3B55F088F40E703B7
39,778,716 UART: [art] SIG.S = 5628F83BE3C1FF1EEEA1BDA5F247E61D2A15D945C92288EBB27F0F7946E4CF0E161B3EEAABCFA5A2A1DE7077CFDB730F
40,756,971 UART: mbox::rt_entry...
40,757,938 UART: ____ _ _ _ ____ _____
40,759,885 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,761,892 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,763,841 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,765,773 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,767,698 UART: |_|
40,768,530 UART:
41,049,399 UART: [rt] Runtime listening for mailbox commands...
41,051,549 >>> mbox cmd response data (48 bytes)
41,052,134 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,054,469 >>> mbox cmd response data (48 bytes)
41,055,350 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,069,221 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,757,225 ready_for_fw is high
3,757,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,399 >>> mbox cmd response: success
19,206,187 UART:
19,206,573 UART: Running Caliptra FMC ...
19,207,723 UART:
19,207,877 UART: [state] CFI Enabled
19,215,592 UART: [fht] FMC Alias Private Key: 7
20,972,448 UART: [art] Extend RT PCRs Done
20,973,674 UART: [art] Lock RT PCRs Done
20,975,300 UART: [art] Populate DV Done
20,980,655 UART: [fht] FMC Alias Private Key: 7
20,982,199 UART: [art] Derive CDI
20,983,010 UART: [art] Store in in slot 0x4
21,025,515 UART: [art] Derive Key Pair
21,026,556 UART: [art] Store priv key in slot 0x5
23,453,048 UART: [art] Derive Key Pair - Done
23,466,206 UART: [art] Signing Cert with AUTHO
23,467,504 UART: RITY.KEYID = 7
25,173,148 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,658 UART: [art] PUB.X = 56DD391917D73ADDDFDED0514055CF6ADC54EA9C6B7EE8454063C2A34A6E2F5C30707CFDF715FA15DE7F0962BD6DC99D
25,181,969 UART: [art] PUB.Y = 271A392EDC36A934D010D0D3DA2AD2421584CE18F833F58E970848B5C5260AAB4C3C42223D9D69E13DF921E0F2B8D117
25,189,192 UART: [art] SIG.R = 5946DDA1E514B44A0C63168F414990DBFF8B668EB44EA14EA98EC3E0468D3823EB7A7C8D6C768A0FDBB2DFE734B5AA9F
25,196,615 UART: [art] SIG.S = 657F67A7E15C65740DAD92D23D9B2040DE02F58A68564BBAECA8CFEDF9A384CB859B976CBA8F7BC28484051E0048E10A
26,175,441 UART: Caliptra RT
26,176,131 UART: [state] CFI Enabled
26,293,535 UART: [rt] RT listening for mailbox commands...
26,295,908 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,326,617 UART: [rt]cmd =0x4d454153, len=108
26,345,507 >>> mbox cmd response data (12 bytes)
28,396,819 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,316,765 >>> mbox cmd response: success
35,317,244 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,353,368 UART:
35,353,650 UART: Running Caliptra FMC ...
35,354,759 UART:
35,354,918 UART: [state] CFI Enabled
35,399,486 UART: [art] Extend RT PCRs Done
35,400,665 UART: [art] Lock RT PCRs Done
35,402,185 UART: [art] Populate DV Done
35,407,700 UART: [fht] FMC Alias Private Key: 7
35,409,295 UART: [art] Derive CDI
35,410,107 UART: [art] Store in in slot 0x4
35,452,153 UART: [art] Derive Key Pair
35,453,148 UART: [art] Store priv key in slot 0x5
37,880,521 UART: [art] Derive Key Pair - Done
37,893,569 UART: [art] Signing Cert with AUTHO
37,894,867 UART: RITY.KEYID = 7
39,600,517 UART: [art] Erasing AUTHORITY.KEYID = 7
39,602,041 UART: [art] PUB.X = 16D4F376B3773D3B017CA51C75481B70A262442F75C91396E868866901841C3ABBEC4ACE153FBA825E50FDE8403BC56C
39,609,240 UART: [art] PUB.Y = AEC9E8CD25A02125262BE77BA2310D8084BFBEFEEA5FDBE0C1A6B733B924142370CD5BD74B52E90A3647A150E111E920
39,616,527 UART: [art] SIG.R = B969CAFF6BB0AF87829E0921B24463161537CDD0B02C38D6A0CE93A04221398262EC4A1941E9C8F1A02818C61FE84D20
39,623,923 UART: [art] SIG.S = 1C43EDF27E0C4CC90B4B9EA3E51FFC6AAA598A602A45306E36EB5427460EC4B9A41F82A96A0A84E31126A476174E03F5
40,602,412 UART: mbox::rt_entry...
40,603,377 UART: ____ _ _ _ ____ _____
40,605,355 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,607,361 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,609,307 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,611,237 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,613,083 UART: |_|
40,613,876 UART:
40,902,343 UART: [rt] Runtime listening for mailbox commands...
40,904,548 >>> mbox cmd response data (48 bytes)
40,905,103 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,907,414 >>> mbox cmd response data (48 bytes)
40,908,330 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,922,186 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,155 UART: [kat] SHA2-256
882,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,201 UART: [kat] ++
886,353 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
894,966 UART: [kat] SHA2-512-ACC
896,867 UART: [kat] ECC-384
902,232 UART: [kat] HMAC-384Kdf
906,708 UART: [kat] LMS
1,474,904 UART: [kat] --
1,475,817 UART: [cold-reset] ++
1,476,323 UART: [fht] Storing FHT @ 0x50003400
1,479,072 UART: [idev] ++
1,479,240 UART: [idev] CDI.KEYID = 6
1,479,600 UART: [idev] SUBJECT.KEYID = 7
1,480,024 UART: [idev] UDS.KEYID = 0
1,480,369 ready_for_fw is high
1,480,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,946 UART: [idev] Erasing UDS.KEYID = 0
1,504,524 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,086 UART: [idev] --
1,514,097 UART: [ldev] ++
1,514,265 UART: [ldev] CDI.KEYID = 6
1,514,628 UART: [ldev] SUBJECT.KEYID = 5
1,515,054 UART: [ldev] AUTHORITY.KEYID = 7
1,515,517 UART: [ldev] FE.KEYID = 1
1,520,597 UART: [ldev] Erasing FE.KEYID = 1
1,545,632 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,448 UART: [ldev] --
1,584,715 UART: [fwproc] Waiting for Commands...
1,585,564 UART: [fwproc] Received command 0x46574c44
1,586,355 UART: [fwproc] Received Image of size 114448 bytes
2,886,282 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,606 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,958 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,119 >>> mbox cmd response: success
3,080,255 UART: [afmc] ++
3,080,423 UART: [afmc] CDI.KEYID = 6
3,080,785 UART: [afmc] SUBJECT.KEYID = 7
3,081,210 UART: [afmc] AUTHORITY.KEYID = 5
3,116,135 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,391 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,171 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,899 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,784 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,474 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,267 UART: [afmc] --
3,159,231 UART: [cold-reset] --
3,160,181 UART: [state] Locking Datavault
3,161,440 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,044 UART: [state] Locking ICCM
3,162,616 UART: [exit] Launching FMC @ 0x40000130
3,167,945 UART:
3,167,961 UART: Running Caliptra FMC ...
3,168,369 UART:
3,168,423 UART: [state] CFI Enabled
3,178,798 UART: [fht] FMC Alias Private Key: 7
3,286,583 UART: [art] Extend RT PCRs Done
3,287,011 UART: [art] Lock RT PCRs Done
3,288,323 UART: [art] Populate DV Done
3,296,416 UART: [fht] FMC Alias Private Key: 7
3,297,516 UART: [art] Derive CDI
3,297,796 UART: [art] Store in in slot 0x4
3,383,591 UART: [art] Derive Key Pair
3,383,951 UART: [art] Store priv key in slot 0x5
3,396,535 UART: [art] Derive Key Pair - Done
3,411,299 UART: [art] Signing Cert with AUTHO
3,411,779 UART: RITY.KEYID = 7
3,426,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,434 UART: [art] PUB.X = 680F5C6FB8E632A5A82B7D8423FB0BADCBEA8E9E5D2D69D52D747DA1973B626105081F7FED64E46DA1770EAC3429DAD3
3,434,207 UART: [art] PUB.Y = 17EE8FC3B0449CEE6E21468C0E07CD4DEC939C06B3D4DC4EDF776CE9F97D40237189A3C41D7D0BED685C131C47701088
3,441,157 UART: [art] SIG.R = C743FD84BBE78C2BB5AE716D4FED6A33510C60E2ECA4D9A1D51FF51AAB212E938ECB29FCBF8515CDD74D21BA5C97E7A5
3,447,954 UART: [art] SIG.S = B155AAAF207F023BE76F639628DB53F84331B2A96A87E30D51F38F7ED82FA7BACD7E377EFD1BA9E57D71D982E9FDA301
3,471,250 UART: Caliptra RT
3,471,503 UART: [state] CFI Enabled
3,579,761 UART: [rt] RT listening for mailbox commands...
3,580,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,133 UART: [rt]cmd =0x4d454153, len=108
3,631,625 >>> mbox cmd response data (12 bytes)
3,631,626 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,562 UART:
3,632,578 UART: Running Caliptra ROM ...
3,632,986 UART:
3,633,040 UART: [state] CFI Enabled
3,635,728 UART: [state] LifecycleState = Unprovisioned
3,636,383 UART: [state] DebugLocked = No
3,636,883 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,638,504 UART: [kat] SHA2-256
4,432,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,436,550 UART: [kat] ++
4,436,702 UART: [kat] sha1
4,440,998 UART: [kat] SHA2-256
4,442,936 UART: [kat] SHA2-384
4,445,743 UART: [kat] SHA2-512-ACC
4,447,643 UART: [kat] ECC-384
4,453,440 UART: [kat] HMAC-384Kdf
4,458,036 UART: [kat] LMS
5,026,232 UART: [kat] --
5,027,357 UART: [update-reset] ++
5,953,477 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,954,593 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,051,027 >>> mbox cmd response: success
6,051,027 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,051,272 UART: [update-reset] Copying MAN_2 To MAN_1
6,059,286 UART: [update-reset Success] --
6,060,359 UART: [state] Locking Datavault
6,061,113 UART: [state] Locking PCR0, PCR1 and PCR31
6,061,717 UART: [state] Locking ICCM
6,062,341 UART: [exit] Launching FMC @ 0x40000130
6,067,670 UART:
6,067,686 UART: Running Caliptra FMC ...
6,068,094 UART:
6,068,148 UART: [state] CFI Enabled
6,157,347 UART: [art] Extend RT PCRs Done
6,157,775 UART: [art] Lock RT PCRs Done
6,159,120 UART: [art] Populate DV Done
6,167,383 UART: [fht] FMC Alias Private Key: 7
6,168,401 UART: [art] Derive CDI
6,168,681 UART: [art] Store in in slot 0x4
6,254,546 UART: [art] Derive Key Pair
6,254,906 UART: [art] Store priv key in slot 0x5
6,267,652 UART: [art] Derive Key Pair - Done
6,282,407 UART: [art] Signing Cert with AUTHO
6,282,887 UART: RITY.KEYID = 7
6,297,969 UART: [art] Erasing AUTHORITY.KEYID = 7
6,298,734 UART: [art] PUB.X = 49CDDC589CEA38A4CEB0BA492C680FD7F1D732A45562AFCC68376B6258322A781A4659A7583E9E93EBC5087140C2938A
6,305,504 UART: [art] PUB.Y = 0E1672A9AAFBFFE6BC84B0A91FBE9648930084B77774B66439271BD07D969651A10933B732BB1FF4433A58D2CF91FD29
6,312,430 UART: [art] SIG.R = 0C009FF851E75FD0D17374308887D5D545E87B49827F9A1D3276D5A2DA0E882FB5BEE7E84862395B066A12817A4FB2E2
6,319,169 UART: [art] SIG.S = 27DD1F2D77764F7AF3024797D0DCF2CC5D9DFBBFE6A491453F1BDB5B807955E1949BBFED938C2A7243F7058469E08FBA
6,342,848 UART: mbox::rt_entry...
6,343,220 UART: ____ _ _ _ ____ _____
6,344,004 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,344,804 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,345,572 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,346,340 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,347,108 UART: |_|
6,347,420 UART:
6,623,107 UART: [rt] Runtime listening for mailbox commands...
6,624,297 >>> mbox cmd response data (48 bytes)
6,624,298 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,627,081 >>> mbox cmd response data (48 bytes)
6,627,082 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,642,219 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,301 ready_for_fw is high
1,362,301 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,889 >>> mbox cmd response: success
2,990,523 UART:
2,990,539 UART: Running Caliptra FMC ...
2,990,947 UART:
2,991,001 UART: [state] CFI Enabled
3,001,440 UART: [fht] FMC Alias Private Key: 7
3,109,043 UART: [art] Extend RT PCRs Done
3,109,471 UART: [art] Lock RT PCRs Done
3,111,379 UART: [art] Populate DV Done
3,119,848 UART: [fht] FMC Alias Private Key: 7
3,120,912 UART: [art] Derive CDI
3,121,192 UART: [art] Store in in slot 0x4
3,207,027 UART: [art] Derive Key Pair
3,207,387 UART: [art] Store priv key in slot 0x5
3,220,645 UART: [art] Derive Key Pair - Done
3,235,358 UART: [art] Signing Cert with AUTHO
3,235,838 UART: RITY.KEYID = 7
3,250,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,565 UART: [art] PUB.X = E3CB4D7A134B0B581213BD457D7DFE484D72D81C9396A02957D1491E687E8127883E21F0FACBE6E32236CBEDCE69EF17
3,258,342 UART: [art] PUB.Y = 2A2ADC55E30A96251FB2BAF35D5A1122F3FB13E6F3F24B6816FA990F10AE2A74578AA779B25285D0E34925049DBB6AB7
3,265,293 UART: [art] SIG.R = 9372A07ABE5AB058D6EEBF95A73D15154FF014E49BFC00BA4C8F88E1C599B0BB9F445B4E391D0FB2ADB982698EC02C05
3,272,053 UART: [art] SIG.S = A61DC811E52DC5F6F642F3103B3745A2D15C42A4CBE87C38EA3DF41FE3B5DBD9AEEEF3DFDBB10499294E853D37D42106
3,295,984 UART: Caliptra RT
3,296,237 UART: [state] CFI Enabled
3,404,905 UART: [rt] RT listening for mailbox commands...
3,405,575 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,953 UART: [rt]cmd =0x4d454153, len=108
3,456,133 >>> mbox cmd response data (12 bytes)
3,456,134 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,756,335 >>> mbox cmd response: success
5,756,335 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,769,734 UART:
5,769,750 UART: Running Caliptra FMC ...
5,770,158 UART:
5,770,212 UART: [state] CFI Enabled
5,858,999 UART: [art] Extend RT PCRs Done
5,859,427 UART: [art] Lock RT PCRs Done
5,860,554 UART: [art] Populate DV Done
5,868,929 UART: [fht] FMC Alias Private Key: 7
5,869,859 UART: [art] Derive CDI
5,870,139 UART: [art] Store in in slot 0x4
5,955,510 UART: [art] Derive Key Pair
5,955,870 UART: [art] Store priv key in slot 0x5
5,969,016 UART: [art] Derive Key Pair - Done
5,983,668 UART: [art] Signing Cert with AUTHO
5,984,148 UART: RITY.KEYID = 7
5,999,302 UART: [art] Erasing AUTHORITY.KEYID = 7
6,000,067 UART: [art] PUB.X = 6E1F090813E6349A338E59294C5756C91976EDCC6E015F3563E9E61E2E0E2E5E908D187911C4040EB996C6CDCE504D89
6,006,817 UART: [art] PUB.Y = BEA4BEDDB210843CDF98601513D327347D0A9DD307622D3C7D3D6F0653D3476FCD987C6CEB708E382935E75FFB31C95E
6,013,768 UART: [art] SIG.R = 44FA2F133FBEBA1ADF4CDE4A3D24317454FDF7E31FC79DA79B95169C5F4B8BC15F20E165CA60C4EB88FDBBD9B219489A
6,020,564 UART: [art] SIG.S = 7222DEE78CC9EB0A9BB3A54B207A63557F5C8782364FFA333FB8B1ECFF6C2B9A645E444554D80546AB201B27EFA63C5A
6,044,451 UART: mbox::rt_entry...
6,044,823 UART: ____ _ _ _ ____ _____
6,045,607 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,046,407 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,047,175 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,047,943 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,048,711 UART: |_|
6,049,023 UART:
6,330,690 UART: [rt] Runtime listening for mailbox commands...
6,331,880 >>> mbox cmd response data (48 bytes)
6,331,881 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,334,664 >>> mbox cmd response data (48 bytes)
6,334,665 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,349,802 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
87,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,676 UART: [kat] SHA2-256
882,607 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,722 UART: [kat] ++
886,874 UART: [kat] sha1
890,984 UART: [kat] SHA2-256
892,922 UART: [kat] SHA2-384
895,847 UART: [kat] SHA2-512-ACC
897,748 UART: [kat] ECC-384
903,321 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,476,864 UART: [cold-reset] ++
1,477,362 UART: [fht] Storing FHT @ 0x50003400
1,480,125 UART: [idev] ++
1,480,293 UART: [idev] CDI.KEYID = 6
1,480,653 UART: [idev] SUBJECT.KEYID = 7
1,481,077 UART: [idev] UDS.KEYID = 0
1,481,422 ready_for_fw is high
1,481,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,017 UART: [idev] Erasing UDS.KEYID = 0
1,506,165 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,703 UART: [idev] --
1,515,804 UART: [ldev] ++
1,515,972 UART: [ldev] CDI.KEYID = 6
1,516,335 UART: [ldev] SUBJECT.KEYID = 5
1,516,761 UART: [ldev] AUTHORITY.KEYID = 7
1,517,224 UART: [ldev] FE.KEYID = 1
1,522,288 UART: [ldev] Erasing FE.KEYID = 1
1,547,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,975 UART: [ldev] --
1,587,482 UART: [fwproc] Waiting for Commands...
1,588,127 UART: [fwproc] Received command 0x46574c44
1,588,918 UART: [fwproc] Received Image of size 114448 bytes
2,887,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,445 >>> mbox cmd response: success
3,081,485 UART: [afmc] ++
3,081,653 UART: [afmc] CDI.KEYID = 6
3,082,015 UART: [afmc] SUBJECT.KEYID = 7
3,082,440 UART: [afmc] AUTHORITY.KEYID = 5
3,117,257 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,437 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,830 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,520 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,333 UART: [afmc] --
3,160,329 UART: [cold-reset] --
3,160,923 UART: [state] Locking Datavault
3,162,122 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,726 UART: [state] Locking ICCM
3,163,162 UART: [exit] Launching FMC @ 0x40000130
3,168,491 UART:
3,168,507 UART: Running Caliptra FMC ...
3,168,915 UART:
3,169,058 UART: [state] CFI Enabled
3,179,517 UART: [fht] FMC Alias Private Key: 7
3,287,414 UART: [art] Extend RT PCRs Done
3,287,842 UART: [art] Lock RT PCRs Done
3,289,304 UART: [art] Populate DV Done
3,297,625 UART: [fht] FMC Alias Private Key: 7
3,298,703 UART: [art] Derive CDI
3,298,983 UART: [art] Store in in slot 0x4
3,384,534 UART: [art] Derive Key Pair
3,384,894 UART: [art] Store priv key in slot 0x5
3,398,144 UART: [art] Derive Key Pair - Done
3,412,600 UART: [art] Signing Cert with AUTHO
3,413,080 UART: RITY.KEYID = 7
3,428,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,367 UART: [art] PUB.X = AA429B63854CF441B61B77EFB9E2C5613FB83586A5E2D68F1996CF8317EB6AD6BC48F99E9A7084BA0658CF62D539F12E
3,436,144 UART: [art] PUB.Y = CA3493BE976E80795DA04D51FE175E47F837F814F9273D2F8D3E8C8844F47DF730A53B9679DADC9D1E7FA95528CB50BB
3,443,104 UART: [art] SIG.R = D03AAB74711C1E79104917E70D539C8C6706EE4DDEF7009210BB6B126BDE7A263BA027E379B953D97B4E50CB23FE5C6D
3,449,856 UART: [art] SIG.S = 6CB2D71313D936EC93DC9F21C62184DBA6901518EE664ABD480AA7CCBFB21E666C6C58A1317D819B5142D0B0C70E1B60
3,473,903 UART: Caliptra RT
3,474,248 UART: [state] CFI Enabled
3,581,641 UART: [rt] RT listening for mailbox commands...
3,582,311 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,209 UART: [rt]cmd =0x4d454153, len=108
3,633,825 >>> mbox cmd response data (12 bytes)
3,633,826 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,700 UART:
3,634,716 UART: Running Caliptra ROM ...
3,635,124 UART:
3,635,265 UART: [state] CFI Enabled
3,637,881 UART: [state] LifecycleState = Unprovisioned
3,638,536 UART: [state] DebugLocked = No
3,639,196 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,640,919 UART: [kat] SHA2-256
4,434,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,438,965 UART: [kat] ++
4,439,117 UART: [kat] sha1
4,443,529 UART: [kat] SHA2-256
4,445,467 UART: [kat] SHA2-384
4,448,026 UART: [kat] SHA2-512-ACC
4,449,926 UART: [kat] ECC-384
4,455,683 UART: [kat] HMAC-384Kdf
4,460,417 UART: [kat] LMS
5,028,613 UART: [kat] --
5,029,430 UART: [update-reset] ++
5,956,817 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,957,981 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,054,415 >>> mbox cmd response: success
6,054,415 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,054,610 UART: [update-reset] Copying MAN_2 To MAN_1
6,062,624 UART: [update-reset Success] --
6,063,655 UART: [state] Locking Datavault
6,064,269 UART: [state] Locking PCR0, PCR1 and PCR31
6,064,873 UART: [state] Locking ICCM
6,065,431 UART: [exit] Launching FMC @ 0x40000130
6,070,760 UART:
6,070,776 UART: Running Caliptra FMC ...
6,071,184 UART:
6,071,327 UART: [state] CFI Enabled
6,160,810 UART: [art] Extend RT PCRs Done
6,161,238 UART: [art] Lock RT PCRs Done
6,162,633 UART: [art] Populate DV Done
6,170,812 UART: [fht] FMC Alias Private Key: 7
6,171,770 UART: [art] Derive CDI
6,172,050 UART: [art] Store in in slot 0x4
6,257,679 UART: [art] Derive Key Pair
6,258,039 UART: [art] Store priv key in slot 0x5
6,271,199 UART: [art] Derive Key Pair - Done
6,286,035 UART: [art] Signing Cert with AUTHO
6,286,515 UART: RITY.KEYID = 7
6,301,971 UART: [art] Erasing AUTHORITY.KEYID = 7
6,302,736 UART: [art] PUB.X = 9A867CB8E2F9CDEF052B74EE335BDA5A7CA007DB4937E81E138901221BDF2B741BAA4E2C9242C316BCB5BFCA4916A6D3
6,309,517 UART: [art] PUB.Y = 42B1AB3C2BEC048A27779762F11A3545B847A2784BD3C0636153B453D6115955090031266D0BCE82F94924C0883C82FA
6,316,426 UART: [art] SIG.R = CD5146C158FEF07C43355ED074644994C88BD5B6C7D4D375716F636B2B50C05282A53AEAE0A6DDE07BD3369FE96EE170
6,323,204 UART: [art] SIG.S = 40D7305462F6218C826CE01E96BBE0428D8AE2997F99553FF95722BE8B7B88EE9CA011C7F8D0834059631D8C60154B7D
6,347,375 UART: mbox::rt_entry...
6,347,747 UART: ____ _ _ _ ____ _____
6,348,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,349,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,350,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,350,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,351,635 UART: |_|
6,351,947 UART:
6,632,739 UART: [rt] Runtime listening for mailbox commands...
6,633,929 >>> mbox cmd response data (48 bytes)
6,633,930 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,636,713 >>> mbox cmd response data (48 bytes)
6,636,714 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,651,851 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,088 ready_for_fw is high
1,363,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,598 >>> mbox cmd response: success
2,993,270 UART:
2,993,286 UART: Running Caliptra FMC ...
2,993,694 UART:
2,993,837 UART: [state] CFI Enabled
3,004,934 UART: [fht] FMC Alias Private Key: 7
3,112,889 UART: [art] Extend RT PCRs Done
3,113,317 UART: [art] Lock RT PCRs Done
3,114,705 UART: [art] Populate DV Done
3,122,852 UART: [fht] FMC Alias Private Key: 7
3,124,032 UART: [art] Derive CDI
3,124,312 UART: [art] Store in in slot 0x4
3,210,063 UART: [art] Derive Key Pair
3,210,423 UART: [art] Store priv key in slot 0x5
3,223,711 UART: [art] Derive Key Pair - Done
3,238,604 UART: [art] Signing Cert with AUTHO
3,239,084 UART: RITY.KEYID = 7
3,254,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,933 UART: [art] PUB.X = 1066B041DEB3F2A652C5414B0E541FE027F2A3EB11767F3E6E23BF69D105765666FB32E8BE4910D311D2AB171C27B62D
3,261,701 UART: [art] PUB.Y = 84AED099D5B5F741ABC9A90ABEE3467984C0B6C029D59294F9F6C88F350570C83B40E6EAD190B3D1EB352E78C73AA992
3,268,655 UART: [art] SIG.R = FC99A3740B409A79263A50B384B78FE5A508811B97E490E3CF475C835D3EB2D31C502B8601201584A1AF637392E91370
3,275,408 UART: [art] SIG.S = 1F2E6571727BFCB7C1C95E937905678F2A0BEFBCBDAF36B997EE117FE4D2CE089E272CE7E588D2209DE874887A2DD537
3,299,058 UART: Caliptra RT
3,299,403 UART: [state] CFI Enabled
3,408,306 UART: [rt] RT listening for mailbox commands...
3,408,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,096 UART: [rt]cmd =0x4d454153, len=108
3,459,702 >>> mbox cmd response data (12 bytes)
3,459,703 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,925 >>> mbox cmd response: success
5,761,925 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,775,650 UART:
5,775,666 UART: Running Caliptra FMC ...
5,776,074 UART:
5,776,217 UART: [state] CFI Enabled
5,865,020 UART: [art] Extend RT PCRs Done
5,865,448 UART: [art] Lock RT PCRs Done
5,866,847 UART: [art] Populate DV Done
5,875,124 UART: [fht] FMC Alias Private Key: 7
5,876,256 UART: [art] Derive CDI
5,876,536 UART: [art] Store in in slot 0x4
5,962,095 UART: [art] Derive Key Pair
5,962,455 UART: [art] Store priv key in slot 0x5
5,975,735 UART: [art] Derive Key Pair - Done
5,990,429 UART: [art] Signing Cert with AUTHO
5,990,909 UART: RITY.KEYID = 7
6,006,221 UART: [art] Erasing AUTHORITY.KEYID = 7
6,006,986 UART: [art] PUB.X = F85F24D8694BAD69069E23F589721167523691996E99159DD54C54B24419D2C62B980CD57703DCEC5E53D19871B6A765
6,013,737 UART: [art] PUB.Y = EBDDB0A75A39E4CF877A9007215D67E400AF887C747853962FCF7FD31FB0C06A8EEA4278D24682131495FF4B6F71BA3D
6,020,672 UART: [art] SIG.R = A634F7008569B64EDF8890E6584CD14CE97AE0DBEF93A3856D0B0456F5DC04E5FF6CB290DB0C7112CB0AA432DA09309A
6,027,416 UART: [art] SIG.S = F2E1289ACED49A18EF3E0B4BACC99F718476E338A2F3F8D3313925EFD425946DA0D67BC43125F53CF0AE5D53F2F1A05F
6,050,772 UART: mbox::rt_entry...
6,051,144 UART: ____ _ _ _ ____ _____
6,051,928 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,052,728 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,053,496 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,054,264 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,055,032 UART: |_|
6,055,344 UART:
6,333,245 UART: [rt] Runtime listening for mailbox commands...
6,334,435 >>> mbox cmd response data (48 bytes)
6,334,436 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,337,219 >>> mbox cmd response data (48 bytes)
6,337,220 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,352,357 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
893,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,439 UART: [kat] ++
897,591 UART: [kat] sha1
901,905 UART: [kat] SHA2-256
903,845 UART: [kat] SHA2-384
906,546 UART: [kat] SHA2-512-ACC
908,447 UART: [kat] ECC-384
918,310 UART: [kat] HMAC-384Kdf
923,014 UART: [kat] LMS
1,171,342 UART: [kat] --
1,172,189 UART: [cold-reset] ++
1,172,665 UART: [fht] FHT @ 0x50003400
1,175,384 UART: [idev] ++
1,175,552 UART: [idev] CDI.KEYID = 6
1,175,912 UART: [idev] SUBJECT.KEYID = 7
1,176,336 UART: [idev] UDS.KEYID = 0
1,176,681 ready_for_fw is high
1,176,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,296 UART: [idev] Erasing UDS.KEYID = 0
1,201,001 UART: [idev] Sha1 KeyId Algorithm
1,209,529 UART: [idev] --
1,210,775 UART: [ldev] ++
1,210,943 UART: [ldev] CDI.KEYID = 6
1,211,306 UART: [ldev] SUBJECT.KEYID = 5
1,211,732 UART: [ldev] AUTHORITY.KEYID = 7
1,212,195 UART: [ldev] FE.KEYID = 1
1,217,133 UART: [ldev] Erasing FE.KEYID = 1
1,243,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,031 UART: [ldev] --
1,282,388 UART: [fwproc] Wait for Commands...
1,283,164 UART: [fwproc] Recv command 0x46574c44
1,283,892 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,940 >>> mbox cmd response: success
2,777,184 UART: [afmc] ++
2,777,352 UART: [afmc] CDI.KEYID = 6
2,777,714 UART: [afmc] SUBJECT.KEYID = 7
2,778,139 UART: [afmc] AUTHORITY.KEYID = 5
2,813,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,598 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,111 UART: [afmc] --
2,857,089 UART: [cold-reset] --
2,858,145 UART: [state] Locking Datavault
2,859,458 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,062 UART: [state] Locking ICCM
2,860,568 UART: [exit] Launching FMC @ 0x40000130
2,865,897 UART:
2,865,913 UART: Running Caliptra FMC ...
2,866,321 UART:
2,866,375 UART: [state] CFI Enabled
2,876,882 UART: [fht] FMC Alias Private Key: 7
2,984,785 UART: [art] Extend RT PCRs Done
2,985,213 UART: [art] Lock RT PCRs Done
2,986,901 UART: [art] Populate DV Done
2,995,502 UART: [fht] FMC Alias Private Key: 7
2,996,598 UART: [art] Derive CDI
2,996,878 UART: [art] Store in in slot 0x4
3,082,749 UART: [art] Derive Key Pair
3,083,109 UART: [art] Store priv key in slot 0x5
3,096,209 UART: [art] Derive Key Pair - Done
3,110,628 UART: [art] Signing Cert with AUTHO
3,111,108 UART: RITY.KEYID = 7
3,126,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,343 UART: [art] PUB.X = 35EBB064D58882F6B7F32B9D758749C9CF1F064B0CB4BFC784B84392F268F2433962E410107ED9377B492AADB7C5E0AC
3,134,113 UART: [art] PUB.Y = 691AF0FCAB8A865657DA104BE5648ADB8B3695346B89696E966923186591638017D45D1078517DD9C73215EC70420A75
3,141,048 UART: [art] SIG.R = EFD2A0013B2C91B4717EBC11859BD2BA73F37D664BD306AEC69B3E021E2E3196973C4BA85BCD619F4410FF3378367159
3,147,815 UART: [art] SIG.S = E7A5B9C9CB54AC6FB07BA158CA9207C246C88A7FA667A4AA2CF04CEE30A9FE668A2032664A3A0EAF8A4F8BEBE192107E
3,171,372 UART: Caliptra RT
3,171,625 UART: [state] CFI Enabled
3,279,377 UART: [rt] RT listening for mailbox commands...
3,280,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,559 UART: [rt]cmd =0x4d454153, len=108
3,330,959 >>> mbox cmd response data (12 bytes)
3,330,960 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,725 UART:
3,331,741 UART: Running Caliptra ROM ...
3,332,149 UART:
3,332,204 UART: [state] CFI Enabled
3,334,844 UART: [state] LifecycleState = Unprovisioned
3,335,499 UART: [state] DebugLocked = No
3,336,101 UART: [state] WD Timer not started. Device not locked for debugging
3,337,259 UART: [kat] SHA2-256
4,142,909 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,147,034 UART: [kat] ++
4,147,186 UART: [kat] sha1
4,151,458 UART: [kat] SHA2-256
4,153,398 UART: [kat] SHA2-384
4,156,229 UART: [kat] SHA2-512-ACC
4,158,129 UART: [kat] ECC-384
4,167,928 UART: [kat] HMAC-384Kdf
4,172,516 UART: [kat] LMS
4,420,844 UART: [kat] --
4,421,636 UART: [update-reset] ++
5,325,989 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,326,996 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,423,378 >>> mbox cmd response: success
5,423,378 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,423,541 UART: [update-reset] Copying MAN_2 To MAN_1
5,431,555 UART: [update-reset Success] --
5,432,694 UART: [state] Locking Datavault
5,433,522 UART: [state] Locking PCR0, PCR1 and PCR31
5,434,126 UART: [state] Locking ICCM
5,434,672 UART: [exit] Launching FMC @ 0x40000130
5,440,001 UART:
5,440,017 UART: Running Caliptra FMC ...
5,440,425 UART:
5,440,479 UART: [state] CFI Enabled
5,529,364 UART: [art] Extend RT PCRs Done
5,529,792 UART: [art] Lock RT PCRs Done
5,531,059 UART: [art] Populate DV Done
5,539,584 UART: [fht] FMC Alias Private Key: 7
5,540,748 UART: [art] Derive CDI
5,541,028 UART: [art] Store in in slot 0x4
5,626,937 UART: [art] Derive Key Pair
5,627,297 UART: [art] Store priv key in slot 0x5
5,640,295 UART: [art] Derive Key Pair - Done
5,654,929 UART: [art] Signing Cert with AUTHO
5,655,409 UART: RITY.KEYID = 7
5,670,307 UART: [art] Erasing AUTHORITY.KEYID = 7
5,671,072 UART: [art] PUB.X = FEC7460E33CBEB4E8ACB01D59AFD42A272DA8849850AC7F524EE948E837A73EB4D00AEBE18583578437FC38BD01CE167
5,677,827 UART: [art] PUB.Y = 1952B986E792D7672F2A2FFDABE41C397ADCAA3C803F3FDA71E372FE7E3159589695A4BCFD936B21C256242D95A1FA25
5,684,789 UART: [art] SIG.R = C4C345DC0CEC03105D4A04A132D9B419E8CE254C4484FF278CD12C75206202801127FB8E55F499860EC20B3E2C416913
5,691,539 UART: [art] SIG.S = 2EF52CA3D6B75512B80693397D8BC22203A95DA8631CDE6192962780489994F7B1404ECCA462D473F8149CBDEF0D9E81
5,715,483 UART: mbox::rt_entry...
5,715,855 UART: ____ _ _ _ ____ _____
5,716,639 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,717,439 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,718,207 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,718,975 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,719,743 UART: |_|
5,720,055 UART:
6,000,607 UART: [rt] Runtime listening for mailbox commands...
6,001,797 >>> mbox cmd response data (48 bytes)
6,001,798 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,004,581 >>> mbox cmd response data (48 bytes)
6,004,582 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,019,719 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,483 ready_for_fw is high
1,060,483 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,715 >>> mbox cmd response: success
2,689,079 UART:
2,689,095 UART: Running Caliptra FMC ...
2,689,503 UART:
2,689,557 UART: [state] CFI Enabled
2,700,114 UART: [fht] FMC Alias Private Key: 7
2,807,871 UART: [art] Extend RT PCRs Done
2,808,299 UART: [art] Lock RT PCRs Done
2,810,075 UART: [art] Populate DV Done
2,818,392 UART: [fht] FMC Alias Private Key: 7
2,819,534 UART: [art] Derive CDI
2,819,814 UART: [art] Store in in slot 0x4
2,905,261 UART: [art] Derive Key Pair
2,905,621 UART: [art] Store priv key in slot 0x5
2,918,635 UART: [art] Derive Key Pair - Done
2,932,956 UART: [art] Signing Cert with AUTHO
2,933,436 UART: RITY.KEYID = 7
2,948,350 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,115 UART: [art] PUB.X = 011A45702E8E5E8B702500E44264B1B49614C64AE619EB2BF0328D88915D3E7153E7B8442DAFA59A30943BD663C37BBE
2,955,860 UART: [art] PUB.Y = 9D5E08D98B449678ADEBD5EC54AF5639EB4E84C3BD24353E4FDA3FE74B81BAC8B23E5303B56484F56BCBE0EADC25411D
2,962,826 UART: [art] SIG.R = 6194E2AA34C66DFB30676D029A03973612D4BA0559A8EA708786561AEC1752A72A196B589705DBD0387CA1CBCDFABE08
2,969,587 UART: [art] SIG.S = 27AEC8693D60E251CA8BB6C224F389F2A701D716F39BFE3197870EABFF5E7AC4104CA07BF0EDCB29252C25C58CB19EE2
2,993,474 UART: Caliptra RT
2,993,727 UART: [state] CFI Enabled
3,101,538 UART: [rt] RT listening for mailbox commands...
3,102,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,570 UART: [rt]cmd =0x4d454153, len=108
3,152,370 >>> mbox cmd response data (12 bytes)
3,152,371 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,128,813 >>> mbox cmd response: success
5,128,813 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,142,239 UART:
5,142,255 UART: Running Caliptra FMC ...
5,142,663 UART:
5,142,717 UART: [state] CFI Enabled
5,231,816 UART: [art] Extend RT PCRs Done
5,232,244 UART: [art] Lock RT PCRs Done
5,233,457 UART: [art] Populate DV Done
5,241,676 UART: [fht] FMC Alias Private Key: 7
5,242,712 UART: [art] Derive CDI
5,242,992 UART: [art] Store in in slot 0x4
5,328,837 UART: [art] Derive Key Pair
5,329,197 UART: [art] Store priv key in slot 0x5
5,341,977 UART: [art] Derive Key Pair - Done
5,356,658 UART: [art] Signing Cert with AUTHO
5,357,138 UART: RITY.KEYID = 7
5,372,082 UART: [art] Erasing AUTHORITY.KEYID = 7
5,372,847 UART: [art] PUB.X = A9908ACE0C90236B1834524AF9658FB2CDB8621146CA6904CEBACD0FBCEA728E9914CC25A7C53C31DF067561F4D4426B
5,379,617 UART: [art] PUB.Y = E89D1AE14B84781B6392F8E3B2A948439BC750B3336EDB946BBA6773CA757400C230E97624A928FE982421B9CF0C231E
5,386,542 UART: [art] SIG.R = 30A0201EA2E147B318108288C1C2899CB1B0C9969D061C2F2D99656347561F88A0F5F60DBC8EC6EA600CB66CB2D4AAD2
5,393,309 UART: [art] SIG.S = D73D0EB62D136366965A755873D9E1997BE071CE21FF339A9E4495C8337B9788B8FBDCBC8BC37413430985FD599450CD
5,416,988 UART: mbox::rt_entry...
5,417,360 UART: ____ _ _ _ ____ _____
5,418,144 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,418,944 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,419,712 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,420,480 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,421,248 UART: |_|
5,421,560 UART:
5,697,302 UART: [rt] Runtime listening for mailbox commands...
5,698,492 >>> mbox cmd response data (48 bytes)
5,698,493 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,701,276 >>> mbox cmd response data (48 bytes)
5,701,277 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,716,414 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
893,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,046 UART: [kat] ++
898,198 UART: [kat] sha1
902,424 UART: [kat] SHA2-256
904,364 UART: [kat] SHA2-384
907,261 UART: [kat] SHA2-512-ACC
909,162 UART: [kat] ECC-384
919,329 UART: [kat] HMAC-384Kdf
923,871 UART: [kat] LMS
1,172,199 UART: [kat] --
1,173,410 UART: [cold-reset] ++
1,173,758 UART: [fht] FHT @ 0x50003400
1,176,625 UART: [idev] ++
1,176,793 UART: [idev] CDI.KEYID = 6
1,177,153 UART: [idev] SUBJECT.KEYID = 7
1,177,577 UART: [idev] UDS.KEYID = 0
1,177,922 ready_for_fw is high
1,177,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,431 UART: [idev] Erasing UDS.KEYID = 0
1,202,684 UART: [idev] Sha1 KeyId Algorithm
1,211,068 UART: [idev] --
1,212,174 UART: [ldev] ++
1,212,342 UART: [ldev] CDI.KEYID = 6
1,212,705 UART: [ldev] SUBJECT.KEYID = 5
1,213,131 UART: [ldev] AUTHORITY.KEYID = 7
1,213,594 UART: [ldev] FE.KEYID = 1
1,218,524 UART: [ldev] Erasing FE.KEYID = 1
1,245,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,538 UART: [ldev] --
1,285,015 UART: [fwproc] Wait for Commands...
1,285,587 UART: [fwproc] Recv command 0x46574c44
1,286,315 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,399 >>> mbox cmd response: success
2,779,609 UART: [afmc] ++
2,779,777 UART: [afmc] CDI.KEYID = 6
2,780,139 UART: [afmc] SUBJECT.KEYID = 7
2,780,564 UART: [afmc] AUTHORITY.KEYID = 5
2,816,845 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,990 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,718 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,603 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,322 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,324 UART: [afmc] --
2,860,420 UART: [cold-reset] --
2,861,462 UART: [state] Locking Datavault
2,863,021 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,625 UART: [state] Locking ICCM
2,864,265 UART: [exit] Launching FMC @ 0x40000130
2,869,594 UART:
2,869,610 UART: Running Caliptra FMC ...
2,870,018 UART:
2,870,161 UART: [state] CFI Enabled
2,880,870 UART: [fht] FMC Alias Private Key: 7
2,988,149 UART: [art] Extend RT PCRs Done
2,988,577 UART: [art] Lock RT PCRs Done
2,990,281 UART: [art] Populate DV Done
2,998,544 UART: [fht] FMC Alias Private Key: 7
2,999,592 UART: [art] Derive CDI
2,999,872 UART: [art] Store in in slot 0x4
3,085,785 UART: [art] Derive Key Pair
3,086,145 UART: [art] Store priv key in slot 0x5
3,099,539 UART: [art] Derive Key Pair - Done
3,114,756 UART: [art] Signing Cert with AUTHO
3,115,236 UART: RITY.KEYID = 7
3,130,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,977 UART: [art] PUB.X = 99F82846B8CB67CAD3ACF407D20E504A32DC59AD2C9F40E702ECBBCAFF302866911FC6CFCBF286C1A5077966F7725D3A
3,137,753 UART: [art] PUB.Y = CF62717A2E93929AB49AE9B70AF1F7ADEE2E3CD04BAC3016933AF2C9E78538BCEF7479E81908A8637F0B553905748D9C
3,144,701 UART: [art] SIG.R = 75A43ADD21296B0D27232852023E9D878B3186C06B417957FF25B40B58DDF24F0FA130DE00E1975553E8017AB4A44450
3,151,428 UART: [art] SIG.S = C4449D6BE620D5ED9308E2EF117664AAA1F6C5A5DBC7E0573EEE83214B92A2CD3E20A3270F42CD9E5309B54E731FA84C
3,174,906 UART: Caliptra RT
3,175,251 UART: [state] CFI Enabled
3,284,408 UART: [rt] RT listening for mailbox commands...
3,285,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,552 UART: [rt]cmd =0x4d454153, len=108
3,335,492 >>> mbox cmd response data (12 bytes)
3,335,493 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,040 UART:
3,336,056 UART: Running Caliptra ROM ...
3,336,464 UART:
3,336,606 UART: [state] CFI Enabled
3,339,198 UART: [state] LifecycleState = Unprovisioned
3,339,853 UART: [state] DebugLocked = No
3,340,529 UART: [state] WD Timer not started. Device not locked for debugging
3,341,861 UART: [kat] SHA2-256
4,147,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,151,636 UART: [kat] ++
4,151,788 UART: [kat] sha1
4,155,988 UART: [kat] SHA2-256
4,157,928 UART: [kat] SHA2-384
4,160,861 UART: [kat] SHA2-512-ACC
4,162,761 UART: [kat] ECC-384
4,172,606 UART: [kat] HMAC-384Kdf
4,177,064 UART: [kat] LMS
4,425,392 UART: [kat] --
4,426,010 UART: [update-reset] ++
5,331,820 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,332,845 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,429,227 >>> mbox cmd response: success
5,429,227 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,429,430 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,444 UART: [update-reset Success] --
5,438,613 UART: [state] Locking Datavault
5,439,415 UART: [state] Locking PCR0, PCR1 and PCR31
5,440,019 UART: [state] Locking ICCM
5,440,447 UART: [exit] Launching FMC @ 0x40000130
5,445,776 UART:
5,445,792 UART: Running Caliptra FMC ...
5,446,200 UART:
5,446,343 UART: [state] CFI Enabled
5,535,568 UART: [art] Extend RT PCRs Done
5,535,996 UART: [art] Lock RT PCRs Done
5,537,391 UART: [art] Populate DV Done
5,545,782 UART: [fht] FMC Alias Private Key: 7
5,546,772 UART: [art] Derive CDI
5,547,052 UART: [art] Store in in slot 0x4
5,632,789 UART: [art] Derive Key Pair
5,633,149 UART: [art] Store priv key in slot 0x5
5,647,225 UART: [art] Derive Key Pair - Done
5,661,718 UART: [art] Signing Cert with AUTHO
5,662,198 UART: RITY.KEYID = 7
5,677,512 UART: [art] Erasing AUTHORITY.KEYID = 7
5,678,277 UART: [art] PUB.X = 7DF6429639024D34AC510E23D62A5B005A91D7C94F51355BD641120F4C8F17CCB48795485B98EF51C03D104DB5137A14
5,685,012 UART: [art] PUB.Y = 05643A26589C1F4B880DE496CB8E8ECB5B28C06700564B2D00671E63539796A22F8F2A52A4591C70B2628239CF01E8D6
5,691,903 UART: [art] SIG.R = 9A3C3B491B2646E1CE03882DAA153EEB4381C7E647F11C2E072D8FC646B141ECFC55B79FEAC1376BACA39F8749017C76
5,698,676 UART: [art] SIG.S = 1F89DD5EFD41CFCDE0D4EED78795BA1B99CEFB13CF1624EF331409DDBBB0566C4E557A243A739146F645C31B08AB5E79
5,722,657 UART: mbox::rt_entry...
5,723,029 UART: ____ _ _ _ ____ _____
5,723,813 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,724,613 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,725,381 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,726,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,726,917 UART: |_|
5,727,229 UART:
6,008,031 UART: [rt] Runtime listening for mailbox commands...
6,009,221 >>> mbox cmd response data (48 bytes)
6,009,222 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,012,005 >>> mbox cmd response data (48 bytes)
6,012,006 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,027,143 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,428 ready_for_fw is high
1,060,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,868 >>> mbox cmd response: success
2,689,954 UART:
2,689,970 UART: Running Caliptra FMC ...
2,690,378 UART:
2,690,521 UART: [state] CFI Enabled
2,700,852 UART: [fht] FMC Alias Private Key: 7
2,808,853 UART: [art] Extend RT PCRs Done
2,809,281 UART: [art] Lock RT PCRs Done
2,810,797 UART: [art] Populate DV Done
2,818,870 UART: [fht] FMC Alias Private Key: 7
2,819,892 UART: [art] Derive CDI
2,820,172 UART: [art] Store in in slot 0x4
2,905,621 UART: [art] Derive Key Pair
2,905,981 UART: [art] Store priv key in slot 0x5
2,919,467 UART: [art] Derive Key Pair - Done
2,934,168 UART: [art] Signing Cert with AUTHO
2,934,648 UART: RITY.KEYID = 7
2,949,626 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,391 UART: [art] PUB.X = 9486ED08EF7E4A335EA504A76B6E2BDF5A1118AE7558411A13F0FB83F54A594D209C540FE75578F4526CA79CDBA229BF
2,957,162 UART: [art] PUB.Y = 46857C3B05AE6A2551CE80AFC45FD6B7D137620CE77DC60B95B41F15FA5615B4050A052498C644126848C0855E00E517
2,964,068 UART: [art] SIG.R = DFABA9CE2795AF6CE21D64B69E269B7B6AFDD6E20D34CDA446D8039977A36E8E21451A3CADE256CE4ED61B7F8AE68DB0
2,970,858 UART: [art] SIG.S = 708CE333AEE6F39529DEB24E2D187A847597AF1AE49C22EF73A5F4287F90D3D9E12A8178C3D1469DA5052BBD1A987F41
2,993,926 UART: Caliptra RT
2,994,271 UART: [state] CFI Enabled
3,102,680 UART: [rt] RT listening for mailbox commands...
3,103,350 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,830 UART: [rt]cmd =0x4d454153, len=108
3,154,798 >>> mbox cmd response data (12 bytes)
3,154,799 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,131,482 >>> mbox cmd response: success
5,131,482 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,144,964 UART:
5,144,980 UART: Running Caliptra FMC ...
5,145,388 UART:
5,145,531 UART: [state] CFI Enabled
5,234,366 UART: [art] Extend RT PCRs Done
5,234,794 UART: [art] Lock RT PCRs Done
5,236,033 UART: [art] Populate DV Done
5,244,256 UART: [fht] FMC Alias Private Key: 7
5,245,366 UART: [art] Derive CDI
5,245,646 UART: [art] Store in in slot 0x4
5,330,995 UART: [art] Derive Key Pair
5,331,355 UART: [art] Store priv key in slot 0x5
5,344,391 UART: [art] Derive Key Pair - Done
5,359,047 UART: [art] Signing Cert with AUTHO
5,359,527 UART: RITY.KEYID = 7
5,374,719 UART: [art] Erasing AUTHORITY.KEYID = 7
5,375,484 UART: [art] PUB.X = 20C80C73E67FA533A529B4A196ECC03F2EBC8FD51211B8CDF6D079A503EE2C33631FB44C25B3D70234AAA4A12F2FD2BA
5,382,263 UART: [art] PUB.Y = 952AAFB270A8445AD7871A824F6D6775D8953838463EE261A90B5237F7A2B1B5150D4F84375C3B8F7D9D6DC20619056F
5,389,197 UART: [art] SIG.R = 908C821FC44969C819CF3531BC35B478800A9E15CF9F051FFEEBA4D26E0E80AB43F749EE65C9E6CA0C04378680B2F8E3
5,395,962 UART: [art] SIG.S = 8AF566051A83B4825A53D383B9562820A739FBBC678B94DCFEA86788B917AE56F14E98C126AE63383BB590F7DA2D30DC
5,419,428 UART: mbox::rt_entry...
5,419,800 UART: ____ _ _ _ ____ _____
5,420,584 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,421,384 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,422,152 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,422,920 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,423,688 UART: |_|
5,424,000 UART:
5,703,525 UART: [rt] Runtime listening for mailbox commands...
5,704,715 >>> mbox cmd response data (48 bytes)
5,704,716 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,707,499 >>> mbox cmd response data (48 bytes)
5,707,500 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,722,637 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,906 UART: [kat] HMAC-384Kdf
921,656 UART: [kat] LMS
1,169,968 UART: [kat] --
1,170,805 UART: [cold-reset] ++
1,171,251 UART: [fht] FHT @ 0x50003400
1,173,915 UART: [idev] ++
1,174,083 UART: [idev] CDI.KEYID = 6
1,174,444 UART: [idev] SUBJECT.KEYID = 7
1,174,869 UART: [idev] UDS.KEYID = 0
1,175,215 ready_for_fw is high
1,175,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,833 UART: [idev] Erasing UDS.KEYID = 0
1,199,699 UART: [idev] Sha1 KeyId Algorithm
1,208,607 UART: [idev] --
1,209,660 UART: [ldev] ++
1,209,828 UART: [ldev] CDI.KEYID = 6
1,210,192 UART: [ldev] SUBJECT.KEYID = 5
1,210,619 UART: [ldev] AUTHORITY.KEYID = 7
1,211,082 UART: [ldev] FE.KEYID = 1
1,216,350 UART: [ldev] Erasing FE.KEYID = 1
1,242,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,908 UART: [ldev] --
1,281,194 UART: [fwproc] Wait for Commands...
1,281,789 UART: [fwproc] Recv command 0x46574c44
1,282,522 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,976 >>> mbox cmd response: success
2,775,057 UART: [afmc] ++
2,775,225 UART: [afmc] CDI.KEYID = 6
2,775,588 UART: [afmc] SUBJECT.KEYID = 7
2,776,014 UART: [afmc] AUTHORITY.KEYID = 5
2,811,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,096 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,815 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,604 UART: [afmc] --
2,854,582 UART: [cold-reset] --
2,855,264 UART: [state] Locking Datavault
2,856,325 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,929 UART: [state] Locking ICCM
2,857,503 UART: [exit] Launching FMC @ 0x40000130
2,862,832 UART:
2,862,848 UART: Running Caliptra FMC ...
2,863,256 UART:
2,863,310 UART: [state] CFI Enabled
2,874,053 UART: [fht] FMC Alias Private Key: 7
2,981,834 UART: [art] Extend RT PCRs Done
2,982,262 UART: [art] Lock RT PCRs Done
2,983,578 UART: [art] Populate DV Done
2,991,965 UART: [fht] FMC Alias Private Key: 7
2,992,947 UART: [art] Derive CDI
2,993,227 UART: [art] Store in in slot 0x4
3,078,786 UART: [art] Derive Key Pair
3,079,146 UART: [art] Store priv key in slot 0x5
3,092,454 UART: [art] Derive Key Pair - Done
3,107,043 UART: [art] Signing Cert with AUTHO
3,107,523 UART: RITY.KEYID = 7
3,122,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,054 UART: [art] PUB.X = 1C02552636976A913811C77098B1CC5938470E6C9C27FAB0FFE3CF47C035287DDC917DBA6DEF1D06E8D6D5A9AD069516
3,129,818 UART: [art] PUB.Y = 5B7D3B25F78976E362EDC2DE53652182E274CB3E014F82BE2C1FD6BAF264E6AC5ED7CACE04C08558AD4C143EE9E86BC5
3,136,782 UART: [art] SIG.R = 38E2B1169389D32F4BC75481931D9AF51AFE31513CADB1B7BCCE3375F35FCFF44B623B67CE2012989C56D6DB5B7C1DA3
3,143,566 UART: [art] SIG.S = 93F83FD4A7C6DB913E5766157BD82CEB96FB70D64C8B99B063DD44A547BA5B833AD30195EBCDB50D7014BA24B6EE39E4
3,167,751 UART: Caliptra RT
3,168,004 UART: [state] CFI Enabled
3,276,139 UART: [rt] RT listening for mailbox commands...
3,276,809 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,301 UART: [rt]cmd =0x4d454153, len=108
3,327,929 >>> mbox cmd response data (12 bytes)
3,327,930 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,825 UART:
3,328,841 UART: Running Caliptra ROM ...
3,329,249 UART:
3,329,304 UART: [state] CFI Enabled
3,331,384 UART: [state] LifecycleState = Unprovisioned
3,332,039 UART: [state] DebugLocked = No
3,332,679 UART: [state] WD Timer not started. Device not locked for debugging
3,333,921 UART: [kat] SHA2-256
4,137,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,141,600 UART: [kat] ++
4,141,752 UART: [kat] sha1
4,145,978 UART: [kat] SHA2-256
4,147,918 UART: [kat] SHA2-384
4,150,791 UART: [kat] SHA2-512-ACC
4,152,691 UART: [kat] ECC-384
4,162,422 UART: [kat] HMAC-384Kdf
4,167,098 UART: [kat] LMS
4,415,410 UART: [kat] --
4,416,104 UART: [update-reset] ++
5,319,465 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,320,670 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,417,052 >>> mbox cmd response: success
5,417,052 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,417,373 UART: [update-reset] Copying MAN_2 To MAN_1
5,425,387 UART: [update-reset Success] --
5,426,532 UART: [state] Locking Datavault
5,427,202 UART: [state] Locking PCR0, PCR1 and PCR31
5,427,806 UART: [state] Locking ICCM
5,428,376 UART: [exit] Launching FMC @ 0x40000130
5,433,705 UART:
5,433,721 UART: Running Caliptra FMC ...
5,434,129 UART:
5,434,183 UART: [state] CFI Enabled
5,522,592 UART: [art] Extend RT PCRs Done
5,523,020 UART: [art] Lock RT PCRs Done
5,524,639 UART: [art] Populate DV Done
5,532,790 UART: [fht] FMC Alias Private Key: 7
5,533,800 UART: [art] Derive CDI
5,534,080 UART: [art] Store in in slot 0x4
5,620,033 UART: [art] Derive Key Pair
5,620,393 UART: [art] Store priv key in slot 0x5
5,633,551 UART: [art] Derive Key Pair - Done
5,648,122 UART: [art] Signing Cert with AUTHO
5,648,602 UART: RITY.KEYID = 7
5,663,256 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,021 UART: [art] PUB.X = 34C1ADA6B37C376BC6A3EAA7C1EEFA9DC292AF51D69B03AA54AE78563F7BEA6868EFAFCC905C74559E86AD0FA0EE331D
5,670,815 UART: [art] PUB.Y = 55C1DEDCF01FAD496E7916B232827518764CAC15329DA71A92214DB270D1EDA7914CE490DE80EDA4946FC9CE32229010
5,677,771 UART: [art] SIG.R = AEA862DCC7A8FD6D8D436CFCEEEDF34298B798C2D196CFB7001985B461289A7476488CF2DA7E0F7635C8CEA4E3EB7F87
5,684,536 UART: [art] SIG.S = 74990F17E8DAEBF29197BDBB18C0B6E9F1768DD0943DA2E6DE45CB2CE365707AC3E12116A48D0FE69DD07C1772ECD0BA
5,707,975 UART: mbox::rt_entry...
5,708,347 UART: ____ _ _ _ ____ _____
5,709,131 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,709,931 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,710,699 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,711,467 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,712,235 UART: |_|
5,712,547 UART:
5,992,033 UART: [rt] Runtime listening for mailbox commands...
5,993,223 >>> mbox cmd response data (48 bytes)
5,993,224 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,996,007 >>> mbox cmd response data (48 bytes)
5,996,008 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,011,145 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,192 ready_for_fw is high
1,056,192 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,290 >>> mbox cmd response: success
2,686,262 UART:
2,686,278 UART: Running Caliptra FMC ...
2,686,686 UART:
2,686,740 UART: [state] CFI Enabled
2,697,003 UART: [fht] FMC Alias Private Key: 7
2,804,804 UART: [art] Extend RT PCRs Done
2,805,232 UART: [art] Lock RT PCRs Done
2,806,698 UART: [art] Populate DV Done
2,815,109 UART: [fht] FMC Alias Private Key: 7
2,816,157 UART: [art] Derive CDI
2,816,437 UART: [art] Store in in slot 0x4
2,902,014 UART: [art] Derive Key Pair
2,902,374 UART: [art] Store priv key in slot 0x5
2,915,864 UART: [art] Derive Key Pair - Done
2,930,451 UART: [art] Signing Cert with AUTHO
2,930,931 UART: RITY.KEYID = 7
2,946,025 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,790 UART: [art] PUB.X = 6C737C673CD1495C41D2C1942AC589C2B15CE6797BFB136F19F2AB2408B7F515BDB210FE0DDBAB9AE8CB80B9ED40B823
2,953,572 UART: [art] PUB.Y = F5526E200BD18E198A6D4D7725F2448B4BA8EE95F2FEF955755940D9E1534EA327C4A316B7D05FEB58C22B2FD64D9EB0
2,960,529 UART: [art] SIG.R = 768B2A59CFEDE5DA414A67FE333F698CFF84F1B9B6BE547C4696E194047B8D09414CB6E8FE7C3A2F72C5A814AB8122B0
2,967,307 UART: [art] SIG.S = C6B7081AA7548A644BB63F0051E9FD9AEF3CC064EA516C25C0D3B9A84AD85DC6BE2EB48DD658D3C18578BB4918847C67
2,991,213 UART: Caliptra RT
2,991,466 UART: [state] CFI Enabled
3,099,577 UART: [rt] RT listening for mailbox commands...
3,100,247 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,967 UART: [rt]cmd =0x4d454153, len=108
3,151,053 >>> mbox cmd response data (12 bytes)
3,151,054 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,122,869 >>> mbox cmd response: success
5,122,869 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,136,475 UART:
5,136,491 UART: Running Caliptra FMC ...
5,136,899 UART:
5,136,953 UART: [state] CFI Enabled
5,225,950 UART: [art] Extend RT PCRs Done
5,226,378 UART: [art] Lock RT PCRs Done
5,227,699 UART: [art] Populate DV Done
5,236,044 UART: [fht] FMC Alias Private Key: 7
5,236,992 UART: [art] Derive CDI
5,237,272 UART: [art] Store in in slot 0x4
5,322,819 UART: [art] Derive Key Pair
5,323,179 UART: [art] Store priv key in slot 0x5
5,336,111 UART: [art] Derive Key Pair - Done
5,351,102 UART: [art] Signing Cert with AUTHO
5,351,582 UART: RITY.KEYID = 7
5,366,814 UART: [art] Erasing AUTHORITY.KEYID = 7
5,367,579 UART: [art] PUB.X = 9B95A1F82ABF8C061B8CCD276D8E6C940F2004560A681DA9B3CD670CE4AA2767A2FFC94F94CA180CA23FE24C47F0A5F1
5,374,349 UART: [art] PUB.Y = FB8E46297A9EE3EB3DCB7B17B1C14FD4AD3CFE274012DDEF5C7652A4EDAE656709018637BC0A064E9E04C868DDF574A0
5,381,304 UART: [art] SIG.R = 7D75E5492ECE2B71AFCF6E9AC6DBE32E5E986BD21EDB7D6DF176E518932F05686E5DF3F9978BFB7DD760A41AD3E91238
5,388,091 UART: [art] SIG.S = AB849B3F3632FF5F1ABE1075358E9ABECBBE215AD1A51988331539B2E695FBF96D09500726BC27FD312F22978BA76BB4
5,411,946 UART: mbox::rt_entry...
5,412,318 UART: ____ _ _ _ ____ _____
5,413,102 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,413,902 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,414,670 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,415,438 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,416,206 UART: |_|
5,416,518 UART:
5,692,386 UART: [rt] Runtime listening for mailbox commands...
5,693,576 >>> mbox cmd response data (48 bytes)
5,693,577 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,696,360 >>> mbox cmd response data (48 bytes)
5,696,361 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,711,498 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
891,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,792 UART: [kat] ++
895,944 UART: [kat] sha1
900,218 UART: [kat] SHA2-256
902,158 UART: [kat] SHA2-384
905,101 UART: [kat] SHA2-512-ACC
907,002 UART: [kat] ECC-384
916,947 UART: [kat] HMAC-384Kdf
921,369 UART: [kat] LMS
1,169,681 UART: [kat] --
1,170,498 UART: [cold-reset] ++
1,170,960 UART: [fht] FHT @ 0x50003400
1,173,546 UART: [idev] ++
1,173,714 UART: [idev] CDI.KEYID = 6
1,174,075 UART: [idev] SUBJECT.KEYID = 7
1,174,500 UART: [idev] UDS.KEYID = 0
1,174,846 ready_for_fw is high
1,174,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,540 UART: [idev] Erasing UDS.KEYID = 0
1,199,282 UART: [idev] Sha1 KeyId Algorithm
1,208,274 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,215,517 UART: [ldev] Erasing FE.KEYID = 1
1,241,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,425 UART: [ldev] --
1,280,755 UART: [fwproc] Wait for Commands...
1,281,566 UART: [fwproc] Recv command 0x46574c44
1,282,299 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,220 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,569 >>> mbox cmd response: success
2,774,784 UART: [afmc] ++
2,774,952 UART: [afmc] CDI.KEYID = 6
2,775,315 UART: [afmc] SUBJECT.KEYID = 7
2,775,741 UART: [afmc] AUTHORITY.KEYID = 5
2,811,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,261 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,990 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,873 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,592 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,623 UART: [afmc] --
2,855,595 UART: [cold-reset] --
2,856,525 UART: [state] Locking Datavault
2,857,662 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,266 UART: [state] Locking ICCM
2,858,868 UART: [exit] Launching FMC @ 0x40000130
2,864,197 UART:
2,864,213 UART: Running Caliptra FMC ...
2,864,621 UART:
2,864,764 UART: [state] CFI Enabled
2,875,311 UART: [fht] FMC Alias Private Key: 7
2,983,474 UART: [art] Extend RT PCRs Done
2,983,902 UART: [art] Lock RT PCRs Done
2,985,336 UART: [art] Populate DV Done
2,993,739 UART: [fht] FMC Alias Private Key: 7
2,994,901 UART: [art] Derive CDI
2,995,181 UART: [art] Store in in slot 0x4
3,081,176 UART: [art] Derive Key Pair
3,081,536 UART: [art] Store priv key in slot 0x5
3,095,380 UART: [art] Derive Key Pair - Done
3,110,146 UART: [art] Signing Cert with AUTHO
3,110,626 UART: RITY.KEYID = 7
3,125,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,235 UART: [art] PUB.X = C476EC20688FAEB99ADB247F56E70963440C4B9B86B160BD77ECFF7AC4102260D03C23DE30FD87BE40846175760F11D6
3,133,002 UART: [art] PUB.Y = E2E9EDD8798CE379FD59C52B132B904756F2A19630FE2764DC1F9FEC79071E121390AF1C72AE693BCF8C494606ECAC7C
3,139,958 UART: [art] SIG.R = 938E79DC31ADA80F9596D9BD14165C0B015B35C000A1E8BD018A112B637467BADFFF4654263BE7A7EBF5A66C2BF138B5
3,146,706 UART: [art] SIG.S = 8BFBB7EE12924F816CE80023B321FED0DEE05EB68B1D2ED0DAF100C5482249745454D0153D73AAE99AEEF03B3DC65DA0
3,170,281 UART: Caliptra RT
3,170,626 UART: [state] CFI Enabled
3,277,208 UART: [rt] RT listening for mailbox commands...
3,277,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,428 UART: [rt]cmd =0x4d454153, len=108
3,329,204 >>> mbox cmd response data (12 bytes)
3,329,205 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,886 UART:
3,329,902 UART: Running Caliptra ROM ...
3,330,310 UART:
3,330,452 UART: [state] CFI Enabled
3,333,220 UART: [state] LifecycleState = Unprovisioned
3,333,875 UART: [state] DebugLocked = No
3,334,483 UART: [state] WD Timer not started. Device not locked for debugging
3,335,727 UART: [kat] SHA2-256
4,139,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,143,406 UART: [kat] ++
4,143,558 UART: [kat] sha1
4,147,774 UART: [kat] SHA2-256
4,149,714 UART: [kat] SHA2-384
4,152,515 UART: [kat] SHA2-512-ACC
4,154,415 UART: [kat] ECC-384
4,164,112 UART: [kat] HMAC-384Kdf
4,168,972 UART: [kat] LMS
4,417,284 UART: [kat] --
4,418,042 UART: [update-reset] ++
5,324,247 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,325,364 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,421,746 >>> mbox cmd response: success
5,421,746 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,422,025 UART: [update-reset] Copying MAN_2 To MAN_1
5,430,039 UART: [update-reset Success] --
5,430,882 UART: [state] Locking Datavault
5,431,668 UART: [state] Locking PCR0, PCR1 and PCR31
5,432,272 UART: [state] Locking ICCM
5,432,732 UART: [exit] Launching FMC @ 0x40000130
5,438,061 UART:
5,438,077 UART: Running Caliptra FMC ...
5,438,485 UART:
5,438,628 UART: [state] CFI Enabled
5,527,651 UART: [art] Extend RT PCRs Done
5,528,079 UART: [art] Lock RT PCRs Done
5,529,022 UART: [art] Populate DV Done
5,537,239 UART: [fht] FMC Alias Private Key: 7
5,538,385 UART: [art] Derive CDI
5,538,665 UART: [art] Store in in slot 0x4
5,624,276 UART: [art] Derive Key Pair
5,624,636 UART: [art] Store priv key in slot 0x5
5,638,344 UART: [art] Derive Key Pair - Done
5,652,813 UART: [art] Signing Cert with AUTHO
5,653,293 UART: RITY.KEYID = 7
5,668,615 UART: [art] Erasing AUTHORITY.KEYID = 7
5,669,380 UART: [art] PUB.X = 3A0D0EA4CB7CA90385D583247EA17CE84E32174A9ABC91E671AD7A5B5A83A11179BC800A0780B622EEABD7B9C4900B6D
5,676,146 UART: [art] PUB.Y = 848B202EC387E35B45149CC8AB87C17169B6E03F0EC43B9777063FAF7CEBA60B6FFBC05BF57E40D27670CAFB272AB289
5,683,101 UART: [art] SIG.R = 94CD6A0F88114EC89300FE58046AF1DCF6D0C1F0B18851A7B6221F533F0A7DB97525C700B08BEB48BA61BFD05F0EEC28
5,689,829 UART: [art] SIG.S = BA37443490A52E48CC6652F332D95B03FBCCA53C868D8725B9030C1E281DE497694E5F57824FB1C184E50F21E258C17E
5,713,762 UART: mbox::rt_entry...
5,714,134 UART: ____ _ _ _ ____ _____
5,714,918 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,715,718 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,716,486 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,717,254 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,718,022 UART: |_|
5,718,334 UART:
6,001,095 UART: [rt] Runtime listening for mailbox commands...
6,002,285 >>> mbox cmd response data (48 bytes)
6,002,286 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,005,069 >>> mbox cmd response data (48 bytes)
6,005,070 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,020,207 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,657 ready_for_fw is high
1,056,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,047 >>> mbox cmd response: success
2,687,917 UART:
2,687,933 UART: Running Caliptra FMC ...
2,688,341 UART:
2,688,484 UART: [state] CFI Enabled
2,699,201 UART: [fht] FMC Alias Private Key: 7
2,807,072 UART: [art] Extend RT PCRs Done
2,807,500 UART: [art] Lock RT PCRs Done
2,809,234 UART: [art] Populate DV Done
2,817,293 UART: [fht] FMC Alias Private Key: 7
2,818,381 UART: [art] Derive CDI
2,818,661 UART: [art] Store in in slot 0x4
2,904,376 UART: [art] Derive Key Pair
2,904,736 UART: [art] Store priv key in slot 0x5
2,917,936 UART: [art] Derive Key Pair - Done
2,932,776 UART: [art] Signing Cert with AUTHO
2,933,256 UART: RITY.KEYID = 7
2,948,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,599 UART: [art] PUB.X = 0C7E437FC3532D4CE270501494F638F88399F5C3316DD01D1E6593F1F6D016604ACB801A4F9DCD4A16E06D9E37E15502
2,956,363 UART: [art] PUB.Y = E3A362B46EFC49002BF2C3A275A1F82D56FE0BACED4DAA8629399F1E0FECAF4830ACB9C4FC8478558D7B01007324309A
2,963,276 UART: [art] SIG.R = 1A9565BF58DF6783FFC915FFE95DB4D1FF5EEC127F3F24A8E886AFF6792988E25C558C92A27F25019E5F75D2434CA1F5
2,970,055 UART: [art] SIG.S = 4B92329E312D30BA04F0803E10E67CB307195F7E2E3101FB2E0C825924B326563D347B12C0A1EB1782772913BD9629D0
2,993,708 UART: Caliptra RT
2,994,053 UART: [state] CFI Enabled
3,100,802 UART: [rt] RT listening for mailbox commands...
3,101,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,106 UART: [rt]cmd =0x4d454153, len=108
3,153,366 >>> mbox cmd response data (12 bytes)
3,153,367 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,126,609 >>> mbox cmd response: success
5,126,609 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,140,007 UART:
5,140,023 UART: Running Caliptra FMC ...
5,140,431 UART:
5,140,574 UART: [state] CFI Enabled
5,229,397 UART: [art] Extend RT PCRs Done
5,229,825 UART: [art] Lock RT PCRs Done
5,231,076 UART: [art] Populate DV Done
5,239,441 UART: [fht] FMC Alias Private Key: 7
5,240,533 UART: [art] Derive CDI
5,240,813 UART: [art] Store in in slot 0x4
5,326,872 UART: [art] Derive Key Pair
5,327,232 UART: [art] Store priv key in slot 0x5
5,340,668 UART: [art] Derive Key Pair - Done
5,355,666 UART: [art] Signing Cert with AUTHO
5,356,146 UART: RITY.KEYID = 7
5,370,944 UART: [art] Erasing AUTHORITY.KEYID = 7
5,371,709 UART: [art] PUB.X = 1ABDCD579177E287626AC381656D9A5387B491F02F317A3861E1ED14EE9F53C6BFD527DD18C2F19194C15D329B527606
5,378,476 UART: [art] PUB.Y = 8D7F23D6D0C51139976D244BF392CD2002429F8E996338657509493C582A7983DB274956E0E4EE9240B953461432F347
5,385,402 UART: [art] SIG.R = 7F4F0D84EC991AABC207AEC8736B374C636D898C013E3C34F36D8C3BE7FDF08FA7CF04E47852E4772F8400A1DDFAEC22
5,392,156 UART: [art] SIG.S = FE6820D161BD6EE391E0E646675BB0837B000153B3445584CCDF8F9E05F4E1218BEB02D9851C39B364753942EEAB80D7
5,415,878 UART: mbox::rt_entry...
5,416,250 UART: ____ _ _ _ ____ _____
5,417,034 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,417,834 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,418,602 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,419,370 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,420,138 UART: |_|
5,420,450 UART:
5,701,078 UART: [rt] Runtime listening for mailbox commands...
5,702,268 >>> mbox cmd response data (48 bytes)
5,702,269 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,705,052 >>> mbox cmd response data (48 bytes)
5,705,053 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,720,190 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
192,063 UART:
192,429 UART: Running Caliptra ROM ...
193,608 UART:
193,762 UART: [state] CFI Enabled
263,514 UART: [state] LifecycleState = Unprovisioned
265,486 UART: [state] DebugLocked = No
267,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,827 UART: [kat] SHA2-256
441,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,098 UART: [kat] ++
452,582 UART: [kat] sha1
463,598 UART: [kat] SHA2-256
466,324 UART: [kat] SHA2-384
470,960 UART: [kat] SHA2-512-ACC
473,326 UART: [kat] ECC-384
2,767,019 UART: [kat] HMAC-384Kdf
2,799,370 UART: [kat] LMS
3,989,690 UART: [kat] --
3,994,363 UART: [cold-reset] ++
3,995,948 UART: [fht] Storing FHT @ 0x50003400
4,007,140 UART: [idev] ++
4,007,718 UART: [idev] CDI.KEYID = 6
4,008,635 UART: [idev] SUBJECT.KEYID = 7
4,009,884 UART: [idev] UDS.KEYID = 0
4,010,867 ready_for_fw is high
4,011,064 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,635 UART: [idev] Erasing UDS.KEYID = 0
7,344,357 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,499 UART: [idev] --
7,370,015 UART: [ldev] ++
7,370,591 UART: [ldev] CDI.KEYID = 6
7,371,563 UART: [ldev] SUBJECT.KEYID = 5
7,372,776 UART: [ldev] AUTHORITY.KEYID = 7
7,374,005 UART: [ldev] FE.KEYID = 1
7,400,932 UART: [ldev] Erasing FE.KEYID = 1
10,733,587 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,431 UART: [ldev] --
13,095,138 UART: [fwproc] Waiting for Commands...
13,097,082 UART: [fwproc] Received command 0x46574c44
13,099,269 UART: [fwproc] Received Image of size 114124 bytes
17,153,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,438 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,618,993 >>> mbox cmd response: success
17,619,570 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,623,035 UART: [afmc] ++
17,623,650 UART: [afmc] CDI.KEYID = 6
17,624,570 UART: [afmc] SUBJECT.KEYID = 7
17,625,790 UART: [afmc] AUTHORITY.KEYID = 5
20,987,904 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,990 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,244 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,667 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,505 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,938 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,000 UART: [afmc] --
23,357,389 UART: [cold-reset] --
23,361,687 UART: [state] Locking Datavault
23,367,257 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,011 UART: [state] Locking ICCM
23,371,437 UART: [exit] Launching FMC @ 0x40000130
23,379,838 UART:
23,380,101 UART: Running Caliptra FMC ...
23,381,207 UART:
23,381,372 UART: [state] CFI Enabled
23,445,702 UART: [fht] FMC Alias Private Key: 7
25,784,359 UART: [art] Extend RT PCRs Done
25,785,591 UART: [art] Lock RT PCRs Done
25,787,164 UART: [art] Populate DV Done
25,792,738 UART: [fht] FMC Alias Private Key: 7
25,794,394 UART: [art] Derive CDI
25,795,210 UART: [art] Store in in slot 0x4
25,855,033 UART: [art] Derive Key Pair
25,856,074 UART: [art] Store priv key in slot 0x5
29,148,662 UART: [art] Derive Key Pair - Done
29,161,759 UART: [art] Signing Cert with AUTHO
29,163,061 UART: RITY.KEYID = 7
31,450,153 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,666 UART: [art] PUB.X = B1E9C91D66D445FCFF81AB4063E2C9C99FAE97BF7B38698B5056017F06C60EE246B7A8781C6BAD8204900E08A6339A70
31,458,914 UART: [art] PUB.Y = 7652D613FF61E12D38E2DD0CFA34240D04B4106A8C32FFD3B5DB8DBEF6CEBBE7B5BC7924C639691FE4932FE47A4236A5
31,466,143 UART: [art] SIG.R = 79444891034C88504A4B68B6E2AA4EC3608592361CE5182E07FAADF49DF3DC477686A39C7DAFD211A64B17028EDFE117
31,473,533 UART: [art] SIG.S = 23E7451E179F686C66ECBF4B81FF54CAA9C46BB3FC11AD6A59037755D7ECF189793CBC20F9C4F61DA930DD0A19EBD33C
32,778,488 UART: Caliptra RT
32,779,207 UART: [state] CFI Enabled
32,940,060 UART: [rt] RT listening for mailbox commands...
32,971,702 UART: [rt]cmd =0x54514754, len=24
32,974,351 >>> mbox cmd response data (8 bytes)
32,974,865 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,004,942 UART: [rt]cmd =0x54514754, len=24
33,006,866 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,802,548 ready_for_fw is high
3,802,940 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,863,853 >>> mbox cmd response: success
17,864,622 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,563,296 UART:
23,563,703 UART: Running Caliptra FMC ...
23,564,851 UART:
23,565,015 UART: [state] CFI Enabled
23,633,871 UART: [fht] FMC Alias Private Key: 7
25,971,828 UART: [art] Extend RT PCRs Done
25,973,057 UART: [art] Lock RT PCRs Done
25,974,743 UART: [art] Populate DV Done
25,980,050 UART: [fht] FMC Alias Private Key: 7
25,981,713 UART: [art] Derive CDI
25,982,533 UART: [art] Store in in slot 0x4
26,041,846 UART: [art] Derive Key Pair
26,042,882 UART: [art] Store priv key in slot 0x5
29,335,535 UART: [art] Derive Key Pair - Done
29,348,374 UART: [art] Signing Cert with AUTHO
29,349,680 UART: RITY.KEYID = 7
31,636,404 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,923 UART: [art] PUB.X = 97E34EF8BC88068351EADCEC87C13EF411A74DD66D0DFF0000901C10ECF82059B9144062E683DB0A196DE4D86E390205
31,645,091 UART: [art] PUB.Y = 6EDB78E8866446B939689D600E3410FE15FF008F7A008B01F12D3F2AAF391DE3D23E67D6E9CF89FA25C6EF135E163AC4
31,652,343 UART: [art] SIG.R = F20008471540AD100ADD6E7B9DCFD1549C15C787C8F00D1E6ABC56C75D69FB57822046868222F65305CAE656825D9288
31,659,640 UART: [art] SIG.S = D5C9E8A4BA80DC0BE28AED537284AEB2E076C8E0D9A32B4490445836279E39A9DF39773E96FD4245866A976C6F994973
32,964,286 UART: Caliptra RT
32,965,003 UART: [state] CFI Enabled
33,127,343 UART: [rt] RT listening for mailbox commands...
33,158,706 UART: [rt]cmd =0x54514754, len=24
33,161,230 >>> mbox cmd response data (8 bytes)
33,161,725 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,191,689 UART: [rt]cmd =0x54514754, len=24
33,193,129 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,375 UART:
192,739 UART: Running Caliptra ROM ...
193,867 UART:
603,517 UART: [state] CFI Enabled
619,020 UART: [state] LifecycleState = Unprovisioned
620,966 UART: [state] DebugLocked = No
622,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,077 UART: [kat] SHA2-256
796,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,337 UART: [kat] ++
807,854 UART: [kat] sha1
818,650 UART: [kat] SHA2-256
821,368 UART: [kat] SHA2-384
828,120 UART: [kat] SHA2-512-ACC
830,388 UART: [kat] ECC-384
3,114,577 UART: [kat] HMAC-384Kdf
3,126,472 UART: [kat] LMS
4,316,620 UART: [kat] --
4,322,176 UART: [cold-reset] ++
4,323,391 UART: [fht] Storing FHT @ 0x50003400
4,334,935 UART: [idev] ++
4,335,562 UART: [idev] CDI.KEYID = 6
4,336,438 UART: [idev] SUBJECT.KEYID = 7
4,337,741 UART: [idev] UDS.KEYID = 0
4,338,714 ready_for_fw is high
4,338,938 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,336 UART: [idev] Erasing UDS.KEYID = 0
7,626,921 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,139 UART: [idev] --
7,653,711 UART: [ldev] ++
7,654,343 UART: [ldev] CDI.KEYID = 6
7,655,248 UART: [ldev] SUBJECT.KEYID = 5
7,656,455 UART: [ldev] AUTHORITY.KEYID = 7
7,657,731 UART: [ldev] FE.KEYID = 1
7,667,828 UART: [ldev] Erasing FE.KEYID = 1
10,955,636 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,624 UART: [ldev] --
13,317,958 UART: [fwproc] Waiting for Commands...
13,320,809 UART: [fwproc] Received command 0x46574c44
13,322,984 UART: [fwproc] Received Image of size 114124 bytes
17,374,631 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,307 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,233 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,837,147 >>> mbox cmd response: success
17,837,741 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,841,412 UART: [afmc] ++
17,842,057 UART: [afmc] CDI.KEYID = 6
17,842,968 UART: [afmc] SUBJECT.KEYID = 7
17,844,179 UART: [afmc] AUTHORITY.KEYID = 5
21,159,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,966 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,215 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,610 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,462 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,863 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,022 UART: [afmc] --
23,521,934 UART: [cold-reset] --
23,525,861 UART: [state] Locking Datavault
23,529,866 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,610 UART: [state] Locking ICCM
23,533,295 UART: [exit] Launching FMC @ 0x40000130
23,541,680 UART:
23,541,907 UART: Running Caliptra FMC ...
23,543,004 UART:
23,543,159 UART: [state] CFI Enabled
23,551,310 UART: [fht] FMC Alias Private Key: 7
25,881,993 UART: [art] Extend RT PCRs Done
25,883,222 UART: [art] Lock RT PCRs Done
25,884,542 UART: [art] Populate DV Done
25,889,954 UART: [fht] FMC Alias Private Key: 7
25,891,646 UART: [art] Derive CDI
25,892,375 UART: [art] Store in in slot 0x4
25,935,606 UART: [art] Derive Key Pair
25,936,617 UART: [art] Store priv key in slot 0x5
29,178,788 UART: [art] Derive Key Pair - Done
29,191,999 UART: [art] Signing Cert with AUTHO
29,193,303 UART: RITY.KEYID = 7
31,472,909 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,417 UART: [art] PUB.X = DD865020040130B7B2BA9FAE1355CDA8C178EC66BD555D72B5A43D088252AC255FE5D29FFE3A06D11F8E390DB46843BA
31,481,710 UART: [art] PUB.Y = DC1A52D23B99F8DBF2894EFC78C4A9CD9E994CF8B860C60E115FF213EC33B2294D3B9EBA7EF85A5FF2CFB264B8E5C6A9
31,488,976 UART: [art] SIG.R = 4436DA576C40367DAECEB123ADB6CBD152E1412F4C3442F4EBF3DA07A8D03080F88959A9314581152FA0FC22EE6756A2
31,496,363 UART: [art] SIG.S = A4E5DC165C527387E5B5C9744FB49EEF75D39C4924BEC20F5711634F7375E707707C1B724C0E61B6EBDFB16120A7ADDE
32,801,711 UART: Caliptra RT
32,802,424 UART: [state] CFI Enabled
32,919,321 UART: [rt] RT listening for mailbox commands...
32,950,469 UART: [rt]cmd =0x54514754, len=24
32,952,998 >>> mbox cmd response data (8 bytes)
32,953,540 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,983,334 UART: [rt]cmd =0x54514754, len=24
32,985,269 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,124,123 ready_for_fw is high
4,124,680 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,059,003 >>> mbox cmd response: success
18,059,936 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,707,074 UART:
23,707,479 UART: Running Caliptra FMC ...
23,708,574 UART:
23,708,718 UART: [state] CFI Enabled
23,716,997 UART: [fht] FMC Alias Private Key: 7
26,048,054 UART: [art] Extend RT PCRs Done
26,049,298 UART: [art] Lock RT PCRs Done
26,050,789 UART: [art] Populate DV Done
26,056,425 UART: [fht] FMC Alias Private Key: 7
26,058,076 UART: [art] Derive CDI
26,058,892 UART: [art] Store in in slot 0x4
26,101,229 UART: [art] Derive Key Pair
26,102,276 UART: [art] Store priv key in slot 0x5
29,344,244 UART: [art] Derive Key Pair - Done
29,356,920 UART: [art] Signing Cert with AUTHO
29,358,216 UART: RITY.KEYID = 7
31,637,306 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,809 UART: [art] PUB.X = 3A11D0E88459559EE2B3872FD3F71E922390EA593CB05529C32259047085E63AF540FB2937B193B7821D6583E8CC606A
31,646,057 UART: [art] PUB.Y = 153246B914CC5056D640DAD034CBAE45C1519B1AB924F69FD0959EC68C251FE58EC6BB08A6F5D36BD5E94508F2ECF2B3
31,653,299 UART: [art] SIG.R = CB477E618CE0078D51F49B5FB284E832F14CC15CC3106AA35DE1AD85700472D5A07BB9A05681CE0BED1ABC11120C14C7
31,660,693 UART: [art] SIG.S = B7E0CCE7AAE3F2A3524AFE773E5B6EEAC5E8F1139FE65F2AF4B2F6321F55B66067F51E9AD7A0EB5653AF7E515314D03F
32,966,591 UART: Caliptra RT
32,967,435 UART: [state] CFI Enabled
33,086,337 UART: [rt] RT listening for mailbox commands...
33,117,906 UART: [rt]cmd =0x54514754, len=24
33,120,698 >>> mbox cmd response data (8 bytes)
33,121,205 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,151,060 UART: [rt]cmd =0x54514754, len=24
33,152,796 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,018 UART:
192,404 UART: Running Caliptra ROM ...
193,595 UART:
193,750 UART: [state] CFI Enabled
265,613 UART: [state] LifecycleState = Unprovisioned
267,454 UART: [state] DebugLocked = No
270,337 UART: [state] WD Timer not started. Device not locked for debugging
273,451 UART: [kat] SHA2-256
452,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,164 UART: [kat] ++
464,694 UART: [kat] sha1
476,142 UART: [kat] SHA2-256
479,207 UART: [kat] SHA2-384
484,908 UART: [kat] SHA2-512-ACC
487,842 UART: [kat] ECC-384
2,949,062 UART: [kat] HMAC-384Kdf
2,971,375 UART: [kat] LMS
3,500,817 UART: [kat] --
3,506,872 UART: [cold-reset] ++
3,509,153 UART: [fht] FHT @ 0x50003400
3,519,647 UART: [idev] ++
3,520,214 UART: [idev] CDI.KEYID = 6
3,521,213 UART: [idev] SUBJECT.KEYID = 7
3,522,390 UART: [idev] UDS.KEYID = 0
3,523,318 ready_for_fw is high
3,523,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,548 UART: [idev] Erasing UDS.KEYID = 0
6,026,090 UART: [idev] Sha1 KeyId Algorithm
6,048,782 UART: [idev] --
6,052,162 UART: [ldev] ++
6,052,739 UART: [ldev] CDI.KEYID = 6
6,053,652 UART: [ldev] SUBJECT.KEYID = 5
6,054,874 UART: [ldev] AUTHORITY.KEYID = 7
6,056,056 UART: [ldev] FE.KEYID = 1
6,100,137 UART: [ldev] Erasing FE.KEYID = 1
8,603,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,147 UART: [ldev] --
10,412,316 UART: [fwproc] Wait for Commands...
10,414,691 UART: [fwproc] Recv command 0x46574c44
10,416,785 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,685 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,283,255 >>> mbox cmd response: success
14,283,789 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,288,189 UART: [afmc] ++
14,288,821 UART: [afmc] CDI.KEYID = 6
14,289,714 UART: [afmc] SUBJECT.KEYID = 7
14,290,896 UART: [afmc] AUTHORITY.KEYID = 5
16,822,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,986 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,827 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,650 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,380 UART: [afmc] --
18,627,615 UART: [cold-reset] --
18,630,936 UART: [state] Locking Datavault
18,636,394 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,032 UART: [state] Locking ICCM
18,639,781 UART: [exit] Launching FMC @ 0x40000130
18,648,179 UART:
18,648,413 UART: Running Caliptra FMC ...
18,649,439 UART:
18,649,603 UART: [state] CFI Enabled
18,712,852 UART: [fht] FMC Alias Private Key: 7
20,476,432 UART: [art] Extend RT PCRs Done
20,477,648 UART: [art] Lock RT PCRs Done
20,479,568 UART: [art] Populate DV Done
20,485,027 UART: [fht] FMC Alias Private Key: 7
20,486,724 UART: [art] Derive CDI
20,487,539 UART: [art] Store in in slot 0x4
20,546,078 UART: [art] Derive Key Pair
20,547,116 UART: [art] Store priv key in slot 0x5
23,009,352 UART: [art] Derive Key Pair - Done
23,022,347 UART: [art] Signing Cert with AUTHO
23,023,652 UART: RITY.KEYID = 7
24,735,210 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,695 UART: [art] PUB.X = A949328E6C4F604867557DD57D5F81EF564C5DC1848A1FA5F4F272109FEB48F9C39D702F1139DC8F358CE0E0B81CB116
24,743,955 UART: [art] PUB.Y = E3AAE9C65743DA88D33C63FA104C72B659CFD2D4DD990A33CB5042EEB38C05D0BC21D1C048EABDFDB0A7816609C52F70
24,751,266 UART: [art] SIG.R = BE8E717ADE80A6DD6DBB748ED1E4B1D3F709D7CDEC007A57A1BDBF6E58599EC3F05C81F567BE381CF134A51B3A78E158
24,758,661 UART: [art] SIG.S = 2F8C90CACCAFFD22E20D4E7D7B798B29278119B5C743C190A53341705A44C461F340B82AF7F0CE29E6D7394837A39AAC
25,737,777 UART: Caliptra RT
25,738,488 UART: [state] CFI Enabled
25,902,991 UART: [rt] RT listening for mailbox commands...
25,934,458 UART: [rt]cmd =0x54514754, len=24
25,937,424 >>> mbox cmd response data (8 bytes)
25,937,958 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,967,864 UART: [rt]cmd =0x54514754, len=24
25,969,550 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,380,836 ready_for_fw is high
3,381,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,064,782 >>> mbox cmd response: success
14,065,401 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,346,388 UART:
18,346,780 UART: Running Caliptra FMC ...
18,347,885 UART:
18,348,037 UART: [state] CFI Enabled
18,411,089 UART: [fht] FMC Alias Private Key: 7
20,175,069 UART: [art] Extend RT PCRs Done
20,176,297 UART: [art] Lock RT PCRs Done
20,177,952 UART: [art] Populate DV Done
20,183,522 UART: [fht] FMC Alias Private Key: 7
20,185,180 UART: [art] Derive CDI
20,186,015 UART: [art] Store in in slot 0x4
20,244,386 UART: [art] Derive Key Pair
20,245,432 UART: [art] Store priv key in slot 0x5
22,708,245 UART: [art] Derive Key Pair - Done
22,721,405 UART: [art] Signing Cert with AUTHO
22,722,709 UART: RITY.KEYID = 7
24,434,290 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,793 UART: [art] PUB.X = 5A49318661AA12E68125584F07D317DC6670DBD31AE06E3362AA52FBE30312EF1BE2F0169F1E5D89D8BC66A5A557CDDC
24,443,049 UART: [art] PUB.Y = 69E674624DDF8CDF37BCB90AEB00A384B6DA99C064F8857E7D6DA45856A869428CA52EC4B77BE4E51BB444694A3EF995
24,450,310 UART: [art] SIG.R = 120C10E81C28A87BD0B9E76348393A321D82A506ABFF543B0FED4FE8B56E078D16826D7D64D56CBFE46B065229FD7CAC
24,457,743 UART: [art] SIG.S = 4E5058A7C139D7AFFBA897BDCF90A7A98D645AAD393D4F84464BAA6EE0336D7D4ABFC511F2CD450B5D8EDA8FF53A9B51
25,436,532 UART: Caliptra RT
25,437,234 UART: [state] CFI Enabled
25,601,088 UART: [rt] RT listening for mailbox commands...
25,632,775 UART: [rt]cmd =0x54514754, len=24
25,635,464 >>> mbox cmd response data (8 bytes)
25,636,002 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,665,862 UART: [rt]cmd =0x54514754, len=24
25,667,385 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,459 UART:
192,836 UART: Running Caliptra ROM ...
193,972 UART:
603,492 UART: [state] CFI Enabled
617,023 UART: [state] LifecycleState = Unprovisioned
618,952 UART: [state] DebugLocked = No
621,256 UART: [state] WD Timer not started. Device not locked for debugging
625,922 UART: [kat] SHA2-256
805,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,635 UART: [kat] ++
817,163 UART: [kat] sha1
828,319 UART: [kat] SHA2-256
831,399 UART: [kat] SHA2-384
838,302 UART: [kat] SHA2-512-ACC
841,307 UART: [kat] ECC-384
3,282,293 UART: [kat] HMAC-384Kdf
3,296,475 UART: [kat] LMS
3,825,930 UART: [kat] --
3,829,715 UART: [cold-reset] ++
3,830,646 UART: [fht] FHT @ 0x50003400
3,841,900 UART: [idev] ++
3,842,465 UART: [idev] CDI.KEYID = 6
3,843,367 UART: [idev] SUBJECT.KEYID = 7
3,844,599 UART: [idev] UDS.KEYID = 0
3,845,521 ready_for_fw is high
3,845,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,524 UART: [idev] Erasing UDS.KEYID = 0
6,318,759 UART: [idev] Sha1 KeyId Algorithm
6,341,677 UART: [idev] --
6,345,400 UART: [ldev] ++
6,345,967 UART: [ldev] CDI.KEYID = 6
6,346,974 UART: [ldev] SUBJECT.KEYID = 5
6,348,068 UART: [ldev] AUTHORITY.KEYID = 7
6,349,345 UART: [ldev] FE.KEYID = 1
6,358,416 UART: [ldev] Erasing FE.KEYID = 1
8,828,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,410 UART: [ldev] --
10,617,910 UART: [fwproc] Wait for Commands...
10,619,767 UART: [fwproc] Recv command 0x46574c44
10,621,869 UART: [fwproc] Recv'd Img size: 114448 bytes
14,024,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,467 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,484,233 >>> mbox cmd response: success
14,484,772 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,488,719 UART: [afmc] ++
14,489,301 UART: [afmc] CDI.KEYID = 6
14,490,209 UART: [afmc] SUBJECT.KEYID = 7
14,491,423 UART: [afmc] AUTHORITY.KEYID = 5
16,992,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,480 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,500 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,339 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,746 UART: [afmc] --
18,787,936 UART: [cold-reset] --
18,790,829 UART: [state] Locking Datavault
18,796,503 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,139 UART: [state] Locking ICCM
18,800,173 UART: [exit] Launching FMC @ 0x40000130
18,808,562 UART:
18,808,798 UART: Running Caliptra FMC ...
18,809,890 UART:
18,810,044 UART: [state] CFI Enabled
18,817,983 UART: [fht] FMC Alias Private Key: 7
20,574,527 UART: [art] Extend RT PCRs Done
20,575,758 UART: [art] Lock RT PCRs Done
20,577,409 UART: [art] Populate DV Done
20,582,596 UART: [fht] FMC Alias Private Key: 7
20,584,079 UART: [art] Derive CDI
20,584,836 UART: [art] Store in in slot 0x4
20,627,290 UART: [art] Derive Key Pair
20,628,325 UART: [art] Store priv key in slot 0x5
23,055,176 UART: [art] Derive Key Pair - Done
23,068,058 UART: [art] Signing Cert with AUTHO
23,069,361 UART: RITY.KEYID = 7
24,774,720 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,356 UART: [art] PUB.X = 1BC27C1DE8B86B63CEB58F7DE6EFE5C59F02584BC42B8959D95B9F694118A93839D63956036849AC039B7581B351ECE0
24,783,483 UART: [art] PUB.Y = C642A3D4BEE817D7446B952814E8C4030727E9594BA49E635677E103C3CE6DD1C43CC6185FF6880D52CC6BB23A275CC7
24,790,756 UART: [art] SIG.R = 72DAEE26C52634696887BDE795AAC3BD203E089B59FF3D7840804EC4EE8EFA349854FF2F9FD65858FF2DA371963BA789
24,798,133 UART: [art] SIG.S = 71B6DF9615256F625EAF856C34C1B663EF0BFBC1276DC701F4647EA1754504F663AF4AE349623251D28E58B2BB98A673
25,777,312 UART: Caliptra RT
25,778,020 UART: [state] CFI Enabled
25,895,591 UART: [rt] RT listening for mailbox commands...
25,927,324 UART: [rt]cmd =0x54514754, len=24
25,930,063 >>> mbox cmd response data (8 bytes)
25,930,602 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,960,576 UART: [rt]cmd =0x54514754, len=24
25,962,058 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,698,259 ready_for_fw is high
3,698,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,271,081 >>> mbox cmd response: success
14,271,918 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,521,802 UART:
18,522,183 UART: Running Caliptra FMC ...
18,523,400 UART:
18,523,560 UART: [state] CFI Enabled
18,530,963 UART: [fht] FMC Alias Private Key: 7
20,287,867 UART: [art] Extend RT PCRs Done
20,289,087 UART: [art] Lock RT PCRs Done
20,290,843 UART: [art] Populate DV Done
20,296,461 UART: [fht] FMC Alias Private Key: 7
20,298,112 UART: [art] Derive CDI
20,298,847 UART: [art] Store in in slot 0x4
20,341,703 UART: [art] Derive Key Pair
20,342,694 UART: [art] Store priv key in slot 0x5
22,769,558 UART: [art] Derive Key Pair - Done
22,782,605 UART: [art] Signing Cert with AUTHO
22,783,895 UART: RITY.KEYID = 7
24,489,944 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,448 UART: [art] PUB.X = 9FECD38AE8750F4DE3A88EC337EF8D6B84435BBF8B40C3F846F58E1239DEF6CF87093B8D595EE664A7CAD5A473B38FDE
24,498,764 UART: [art] PUB.Y = D01E29DDE59258CBC29108A028FDC70E71A8E9FDEE335A5B6F73CA7FD637272ED5A069BD288465DCA7D7DF899CBAEC74
24,506,102 UART: [art] SIG.R = 97193A96CD7A283072C800266A0152E622FDF2044E9D3E93354FE08FBCBB4522CBDE0291A7ED01D67982E543D6674D7F
24,513,397 UART: [art] SIG.S = 4F0405A7A208297FAD0044E8FE3425A62619AD1F897F38799C082AEC4833FAB69737B4F129B8501986D9478EAF61015C
25,492,573 UART: Caliptra RT
25,493,266 UART: [state] CFI Enabled
25,610,813 UART: [rt] RT listening for mailbox commands...
25,642,113 UART: [rt]cmd =0x54514754, len=24
25,644,888 >>> mbox cmd response data (8 bytes)
25,645,381 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,675,375 UART: [rt]cmd =0x54514754, len=24
25,677,454 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,441,362 ready_for_fw is high
3,441,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,095 >>> mbox cmd response: success
14,738,920 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,029,107 UART:
19,029,507 UART: Running Caliptra FMC ...
19,030,646 UART:
19,030,804 UART: [state] CFI Enabled
19,097,305 UART: [fht] FMC Alias Private Key: 7
20,861,700 UART: [art] Extend RT PCRs Done
20,862,926 UART: [art] Lock RT PCRs Done
20,864,656 UART: [art] Populate DV Done
20,870,176 UART: [fht] FMC Alias Private Key: 7
20,871,899 UART: [art] Derive CDI
20,872,715 UART: [art] Store in in slot 0x4
20,930,002 UART: [art] Derive Key Pair
20,931,049 UART: [art] Store priv key in slot 0x5
23,394,171 UART: [art] Derive Key Pair - Done
23,407,008 UART: [art] Signing Cert with AUTHO
23,408,317 UART: RITY.KEYID = 7
25,120,303 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,808 UART: [art] PUB.X = D11DE74CB6B1E852D54E63215578091AD1DCA80D50168D40E31B2AFE829EA3866E759534919A5A26CE43AF2864907D9B
25,129,064 UART: [art] PUB.Y = 3103A860898BB21399C68A9B7509CB0A2DD1B9650C41A37169B0B0B0636EB9F16CAD9EB31CFAEA3E40FED29B5F1DD067
25,136,321 UART: [art] SIG.R = 2433AFA7730479B89550DFBB4D7B70880540EC0B07438B95B21870EF73BA0480CA310437164E707B073F9BBB0052567C
25,143,663 UART: [art] SIG.S = D68DB13B58128672AA1047593D971BF0601AB52E2B9168020BE860F49705B494B54D2EB445D249BA36A549D5B048D047
26,122,182 UART: Caliptra RT
26,122,864 UART: [state] CFI Enabled
26,288,555 UART: [rt] RT listening for mailbox commands...
26,320,150 UART: [rt]cmd =0x54514754, len=24
26,322,866 >>> mbox cmd response data (8 bytes)
26,323,381 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,353,249 UART: [rt]cmd =0x54514754, len=24
26,355,042 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,757,281 ready_for_fw is high
3,757,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,981 >>> mbox cmd response: success
14,963,619 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,220,582 UART:
19,220,959 UART: Running Caliptra FMC ...
19,222,177 UART:
19,222,337 UART: [state] CFI Enabled
19,230,013 UART: [fht] FMC Alias Private Key: 7
20,986,528 UART: [art] Extend RT PCRs Done
20,987,754 UART: [art] Lock RT PCRs Done
20,989,603 UART: [art] Populate DV Done
20,995,012 UART: [fht] FMC Alias Private Key: 7
20,996,724 UART: [art] Derive CDI
20,997,539 UART: [art] Store in in slot 0x4
21,040,071 UART: [art] Derive Key Pair
21,041,074 UART: [art] Store priv key in slot 0x5
23,468,282 UART: [art] Derive Key Pair - Done
23,481,169 UART: [art] Signing Cert with AUTHO
23,482,462 UART: RITY.KEYID = 7
25,187,950 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,460 UART: [art] PUB.X = 08CF11BED4CA9494CE6C1F743AEC1F30CDE0FE1C1A872746287E3C20C44B6EAD17D36C8ED29A98A4E8F0C659B666E932
25,196,720 UART: [art] PUB.Y = AC09DAF0025B8EB21E6287FD52B175CE28D64F71936D465A2651B86A9C0313056EFD74C4ED2C6A4F0E63FC9521AAD04C
25,204,026 UART: [art] SIG.R = F98006DD2E76C6523D30D2ED9EDCB80D6BFC0B919C4287B2EA04EFA79EC64435342EB6365F7C196A8AD44D5471BD9EDA
25,211,456 UART: [art] SIG.S = 5F4650A777CD7268C946835025ADE92F602583E51F42CC1D0B2F1833DAC7F20474233D60BA83B2C2B417D4D511375D77
26,190,132 UART: Caliptra RT
26,190,820 UART: [state] CFI Enabled
26,308,449 UART: [rt] RT listening for mailbox commands...
26,339,896 UART: [rt]cmd =0x54514754, len=24
26,342,504 >>> mbox cmd response data (8 bytes)
26,342,990 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,372,996 UART: [rt]cmd =0x54514754, len=24
26,374,695 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,588 UART: [state] LifecycleState = Unprovisioned
86,243 UART: [state] DebugLocked = No
86,781 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,355 UART: [kat] SHA2-256
882,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,401 UART: [kat] ++
886,553 UART: [kat] sha1
890,795 UART: [kat] SHA2-256
892,733 UART: [kat] SHA2-384
895,416 UART: [kat] SHA2-512-ACC
897,317 UART: [kat] ECC-384
902,674 UART: [kat] HMAC-384Kdf
907,056 UART: [kat] LMS
1,475,252 UART: [kat] --
1,476,121 UART: [cold-reset] ++
1,476,459 UART: [fht] Storing FHT @ 0x50003400
1,479,296 UART: [idev] ++
1,479,464 UART: [idev] CDI.KEYID = 6
1,479,824 UART: [idev] SUBJECT.KEYID = 7
1,480,248 UART: [idev] UDS.KEYID = 0
1,480,593 ready_for_fw is high
1,480,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,112 UART: [idev] Erasing UDS.KEYID = 0
1,504,936 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,634 UART: [idev] --
1,514,561 UART: [ldev] ++
1,514,729 UART: [ldev] CDI.KEYID = 6
1,515,092 UART: [ldev] SUBJECT.KEYID = 5
1,515,518 UART: [ldev] AUTHORITY.KEYID = 7
1,515,981 UART: [ldev] FE.KEYID = 1
1,521,107 UART: [ldev] Erasing FE.KEYID = 1
1,546,544 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,724 UART: [ldev] --
1,586,053 UART: [fwproc] Waiting for Commands...
1,586,826 UART: [fwproc] Received command 0x46574c44
1,587,617 UART: [fwproc] Received Image of size 114448 bytes
2,887,630 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,240 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,753 >>> mbox cmd response: success
3,080,753 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,081,973 UART: [afmc] ++
3,082,141 UART: [afmc] CDI.KEYID = 6
3,082,503 UART: [afmc] SUBJECT.KEYID = 7
3,082,928 UART: [afmc] AUTHORITY.KEYID = 5
3,117,443 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,565 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,073 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,958 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,648 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,601 UART: [afmc] --
3,160,663 UART: [cold-reset] --
3,161,243 UART: [state] Locking Datavault
3,162,426 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,030 UART: [state] Locking ICCM
3,163,610 UART: [exit] Launching FMC @ 0x40000130
3,168,939 UART:
3,168,955 UART: Running Caliptra FMC ...
3,169,363 UART:
3,169,417 UART: [state] CFI Enabled
3,179,852 UART: [fht] FMC Alias Private Key: 7
3,287,623 UART: [art] Extend RT PCRs Done
3,288,051 UART: [art] Lock RT PCRs Done
3,289,347 UART: [art] Populate DV Done
3,297,832 UART: [fht] FMC Alias Private Key: 7
3,298,994 UART: [art] Derive CDI
3,299,274 UART: [art] Store in in slot 0x4
3,384,919 UART: [art] Derive Key Pair
3,385,279 UART: [art] Store priv key in slot 0x5
3,398,489 UART: [art] Derive Key Pair - Done
3,413,427 UART: [art] Signing Cert with AUTHO
3,413,907 UART: RITY.KEYID = 7
3,429,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,248 UART: [art] PUB.X = 85A1316B2F0CEF3B48A59A958082FB0193645FD58A07E692C5B1C1A8C891F5B5EE1657EB264B1FD1E6B66DE2CD11DB8A
3,437,023 UART: [art] PUB.Y = F39CF38B5901B0C548CBE739C4FD8BD1DA3C101C261EB5BE6B106A2FD51DBE88E0196EE6CD3E147897D0F0913312D16F
3,443,986 UART: [art] SIG.R = 3C46CA26AB3097D426F0EBE2FE67B1378E784CF1A031A5607131B0C2CD3585E3A5C0C3A85AC9840038D44045EA7DD4BD
3,450,744 UART: [art] SIG.S = BDE3E89F3A34583E10E568EF6F52710CFBBFCC4730CFED35E16F6D2F205A0D096F0C25C866416C9EA015E6E92D0BF08F
3,475,006 UART: Caliptra RT
3,475,259 UART: [state] CFI Enabled
3,583,942 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,512 UART: [rt]cmd =0x54514754, len=24
3,616,572 >>> mbox cmd response data (8 bytes)
3,616,573 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,102 UART: [rt]cmd =0x54514754, len=24
3,647,505 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,453 ready_for_fw is high
1,362,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,967 >>> mbox cmd response: success
2,928,967 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,441 UART:
2,990,457 UART: Running Caliptra FMC ...
2,990,865 UART:
2,990,919 UART: [state] CFI Enabled
3,001,694 UART: [fht] FMC Alias Private Key: 7
3,110,433 UART: [art] Extend RT PCRs Done
3,110,861 UART: [art] Lock RT PCRs Done
3,112,777 UART: [art] Populate DV Done
3,120,978 UART: [fht] FMC Alias Private Key: 7
3,122,056 UART: [art] Derive CDI
3,122,336 UART: [art] Store in in slot 0x4
3,207,869 UART: [art] Derive Key Pair
3,208,229 UART: [art] Store priv key in slot 0x5
3,220,901 UART: [art] Derive Key Pair - Done
3,235,731 UART: [art] Signing Cert with AUTHO
3,236,211 UART: RITY.KEYID = 7
3,251,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,720 UART: [art] PUB.X = 9256CD820EBC735E84AB7D6809A06E81F2D625B809B2199D9AC3F34285CB2A39AB53E943BD6A953D4633BC042F1EDFB8
3,259,488 UART: [art] PUB.Y = 6614F7735B8FBC5D0F20BE89C2A7697EB34C7F76F5B97D3D6F209BFB1D174B352B10E8CED672E48AB7FA3E214D35D909
3,266,446 UART: [art] SIG.R = F92ECB5C90B43E3C43481F31BCEC20AF022137813F7FE5DC4A23B71816D0BF05B72B1C11ACBD104AAC665192E214937B
3,273,222 UART: [art] SIG.S = E724E8D073AADB5EFDE583E87AFA86FE87EC2BC1489950EDB6E6FD165B0DA7B24034C4937EFE61E5587BEF8529B72A89
3,296,934 UART: Caliptra RT
3,297,187 UART: [state] CFI Enabled
3,404,685 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,385 UART: [rt]cmd =0x54514754, len=24
3,437,547 >>> mbox cmd response data (8 bytes)
3,437,548 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,227 UART: [rt]cmd =0x54514754, len=24
3,468,590 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,194 UART: [kat] SHA2-256
882,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,240 UART: [kat] ++
886,392 UART: [kat] sha1
890,786 UART: [kat] SHA2-256
892,724 UART: [kat] SHA2-384
895,387 UART: [kat] SHA2-512-ACC
897,288 UART: [kat] ECC-384
903,025 UART: [kat] HMAC-384Kdf
907,805 UART: [kat] LMS
1,476,001 UART: [kat] --
1,476,968 UART: [cold-reset] ++
1,477,484 UART: [fht] Storing FHT @ 0x50003400
1,480,259 UART: [idev] ++
1,480,427 UART: [idev] CDI.KEYID = 6
1,480,787 UART: [idev] SUBJECT.KEYID = 7
1,481,211 UART: [idev] UDS.KEYID = 0
1,481,556 ready_for_fw is high
1,481,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,249 UART: [idev] Erasing UDS.KEYID = 0
1,505,795 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,447 UART: [idev] --
1,515,470 UART: [ldev] ++
1,515,638 UART: [ldev] CDI.KEYID = 6
1,516,001 UART: [ldev] SUBJECT.KEYID = 5
1,516,427 UART: [ldev] AUTHORITY.KEYID = 7
1,516,890 UART: [ldev] FE.KEYID = 1
1,522,270 UART: [ldev] Erasing FE.KEYID = 1
1,547,407 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,307 UART: [ldev] --
1,586,700 UART: [fwproc] Waiting for Commands...
1,587,539 UART: [fwproc] Received command 0x46574c44
1,588,330 UART: [fwproc] Received Image of size 114448 bytes
2,888,255 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,495 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,847 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,946 >>> mbox cmd response: success
3,080,946 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,082,122 UART: [afmc] ++
3,082,290 UART: [afmc] CDI.KEYID = 6
3,082,652 UART: [afmc] SUBJECT.KEYID = 7
3,083,077 UART: [afmc] AUTHORITY.KEYID = 5
3,118,098 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,506 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,899 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,589 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,330 UART: [afmc] --
3,161,262 UART: [cold-reset] --
3,162,008 UART: [state] Locking Datavault
3,163,071 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,675 UART: [state] Locking ICCM
3,164,257 UART: [exit] Launching FMC @ 0x40000130
3,169,586 UART:
3,169,602 UART: Running Caliptra FMC ...
3,170,010 UART:
3,170,153 UART: [state] CFI Enabled
3,180,972 UART: [fht] FMC Alias Private Key: 7
3,289,159 UART: [art] Extend RT PCRs Done
3,289,587 UART: [art] Lock RT PCRs Done
3,291,273 UART: [art] Populate DV Done
3,299,478 UART: [fht] FMC Alias Private Key: 7
3,300,416 UART: [art] Derive CDI
3,300,696 UART: [art] Store in in slot 0x4
3,386,123 UART: [art] Derive Key Pair
3,386,483 UART: [art] Store priv key in slot 0x5
3,400,247 UART: [art] Derive Key Pair - Done
3,414,856 UART: [art] Signing Cert with AUTHO
3,415,336 UART: RITY.KEYID = 7
3,430,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,393 UART: [art] PUB.X = E2F4D81886FD940905A32E9D69FD7028B9BFEB66F53CC2CDD5EAF141222EBD1CFCEAE6AF97E40A057B6663C885DD5537
3,438,171 UART: [art] PUB.Y = 0B315712B9D6510B66C241A84F97E14EDED043BAD111E99DB9523135B0A3AEB8B46362E606524330B850E150DBC33266
3,445,110 UART: [art] SIG.R = B6140D61C49DFBEC135FED4FC4DF1033F5A3E22694175D8AD90EA30FD25C10EDA1C353186FD9448D7C5F08E30E9FEE9F
3,451,885 UART: [art] SIG.S = 7CE35B4C9ABC8AF73102A464D28EDE2CD56C913A15CDEB56F91B2D410F53C131E076ED221DA6E5460CEB13DD29A7A3D2
3,476,231 UART: Caliptra RT
3,476,576 UART: [state] CFI Enabled
3,585,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,965 UART: [rt]cmd =0x54514754, len=24
3,617,769 >>> mbox cmd response data (8 bytes)
3,617,770 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,141 UART: [rt]cmd =0x54514754, len=24
3,648,660 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,110 ready_for_fw is high
1,363,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,752 >>> mbox cmd response: success
2,929,752 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,991,980 UART:
2,991,996 UART: Running Caliptra FMC ...
2,992,404 UART:
2,992,547 UART: [state] CFI Enabled
3,003,006 UART: [fht] FMC Alias Private Key: 7
3,111,471 UART: [art] Extend RT PCRs Done
3,111,899 UART: [art] Lock RT PCRs Done
3,113,123 UART: [art] Populate DV Done
3,121,468 UART: [fht] FMC Alias Private Key: 7
3,122,446 UART: [art] Derive CDI
3,122,726 UART: [art] Store in in slot 0x4
3,208,283 UART: [art] Derive Key Pair
3,208,643 UART: [art] Store priv key in slot 0x5
3,222,061 UART: [art] Derive Key Pair - Done
3,237,022 UART: [art] Signing Cert with AUTHO
3,237,502 UART: RITY.KEYID = 7
3,252,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,503 UART: [art] PUB.X = A85EECA182B6A9BBC4E0F31BEBF89317D287830043A46DFA1E9FF1AEBBB2857444C0F75460BCB52913CFA2F05E77D9A3
3,260,271 UART: [art] PUB.Y = 6A28BF7875E0E013B5A31F9A720939FC37AE9B86B05651C55604B203E145E6C2A2B9FA5E909D46582CA2938989223D03
3,267,205 UART: [art] SIG.R = 0421BF25D9EEECFF76A9330C340D9E4F3FFC91AE5602F589F7F18840D5EA864541DC58F8A2BF36C4DB40403A3E597AB0
3,273,977 UART: [art] SIG.S = 8BA99F61DCC5899991FC4B421C05765D7DB695CFF94B3B61D22DA2DDE954DB2170C0D136D89AF5D83D040CAD4AE2AF57
3,297,787 UART: Caliptra RT
3,298,132 UART: [state] CFI Enabled
3,406,471 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,039 UART: [rt]cmd =0x54514754, len=24
3,439,275 >>> mbox cmd response data (8 bytes)
3,439,276 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,769 UART: [rt]cmd =0x54514754, len=24
3,470,126 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
893,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,213 UART: [kat] ++
897,365 UART: [kat] sha1
901,507 UART: [kat] SHA2-256
903,447 UART: [kat] SHA2-384
906,234 UART: [kat] SHA2-512-ACC
908,135 UART: [kat] ECC-384
918,032 UART: [kat] HMAC-384Kdf
922,614 UART: [kat] LMS
1,170,942 UART: [kat] --
1,171,793 UART: [cold-reset] ++
1,172,231 UART: [fht] FHT @ 0x50003400
1,174,886 UART: [idev] ++
1,175,054 UART: [idev] CDI.KEYID = 6
1,175,414 UART: [idev] SUBJECT.KEYID = 7
1,175,838 UART: [idev] UDS.KEYID = 0
1,176,183 ready_for_fw is high
1,176,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,854 UART: [idev] Erasing UDS.KEYID = 0
1,200,687 UART: [idev] Sha1 KeyId Algorithm
1,209,115 UART: [idev] --
1,210,099 UART: [ldev] ++
1,210,267 UART: [ldev] CDI.KEYID = 6
1,210,630 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,881 UART: [ldev] Erasing FE.KEYID = 1
1,244,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,819 UART: [ldev] --
1,283,296 UART: [fwproc] Wait for Commands...
1,284,024 UART: [fwproc] Recv command 0x46574c44
1,284,752 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,501 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,516 >>> mbox cmd response: success
2,776,516 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,684 UART: [afmc] ++
2,777,852 UART: [afmc] CDI.KEYID = 6
2,778,214 UART: [afmc] SUBJECT.KEYID = 7
2,778,639 UART: [afmc] AUTHORITY.KEYID = 5
2,814,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,803 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,688 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,407 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,271 UART: [afmc] --
2,858,299 UART: [cold-reset] --
2,859,141 UART: [state] Locking Datavault
2,860,280 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,884 UART: [state] Locking ICCM
2,861,406 UART: [exit] Launching FMC @ 0x40000130
2,866,735 UART:
2,866,751 UART: Running Caliptra FMC ...
2,867,159 UART:
2,867,213 UART: [state] CFI Enabled
2,877,756 UART: [fht] FMC Alias Private Key: 7
2,985,753 UART: [art] Extend RT PCRs Done
2,986,181 UART: [art] Lock RT PCRs Done
2,987,827 UART: [art] Populate DV Done
2,996,210 UART: [fht] FMC Alias Private Key: 7
2,997,370 UART: [art] Derive CDI
2,997,650 UART: [art] Store in in slot 0x4
3,082,665 UART: [art] Derive Key Pair
3,083,025 UART: [art] Store priv key in slot 0x5
3,096,097 UART: [art] Derive Key Pair - Done
3,110,455 UART: [art] Signing Cert with AUTHO
3,110,935 UART: RITY.KEYID = 7
3,126,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,814 UART: [art] PUB.X = EBFE70A4FD719F66B3C7C314F5D1CFB3D9AD67A9E6AA725967D237D254C0FCD6AB87A1B3F9395BB1A9D08D7FF2C5F153
3,133,608 UART: [art] PUB.Y = CB7BCC667BC76E9D11D18A2196DB5E8B2DA6397C493517471666CDE71DE515EEECB2F0D3C37836AE6C820B2A38040099
3,140,540 UART: [art] SIG.R = 74019A222F113E06E3183A58CEF76EFF5E83459B53D2ACF0EBC74D2A9DED21C14874C93CF087E8F61C45082BC2CBC2F3
3,147,315 UART: [art] SIG.S = D925F39198D0529ABEAD9DC4730D3A5E8BBC7D92C10727B22C454A7FC86503C81CE843014B9EB5CEB43C92BDB598FB65
3,171,324 UART: Caliptra RT
3,171,577 UART: [state] CFI Enabled
3,280,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,626 UART: [rt]cmd =0x54514754, len=24
3,313,046 >>> mbox cmd response data (8 bytes)
3,313,047 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,508 UART: [rt]cmd =0x54514754, len=24
3,343,949 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,779 ready_for_fw is high
1,059,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,101 >>> mbox cmd response: success
2,626,101 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,688,085 UART:
2,688,101 UART: Running Caliptra FMC ...
2,688,509 UART:
2,688,563 UART: [state] CFI Enabled
2,699,076 UART: [fht] FMC Alias Private Key: 7
2,807,829 UART: [art] Extend RT PCRs Done
2,808,257 UART: [art] Lock RT PCRs Done
2,809,379 UART: [art] Populate DV Done
2,817,552 UART: [fht] FMC Alias Private Key: 7
2,818,514 UART: [art] Derive CDI
2,818,794 UART: [art] Store in in slot 0x4
2,904,269 UART: [art] Derive Key Pair
2,904,629 UART: [art] Store priv key in slot 0x5
2,917,753 UART: [art] Derive Key Pair - Done
2,932,570 UART: [art] Signing Cert with AUTHO
2,933,050 UART: RITY.KEYID = 7
2,948,348 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,113 UART: [art] PUB.X = 45C98BF6BD33E44DCBF6AF7108440D85549FAE48F491B44F0B0B0F2E32C65C5D62DFB7F2CC71B33C6B6E57EED355D745
2,955,886 UART: [art] PUB.Y = 6F7EEA6E3A73BDA18746EB2EF7BC55700666042B30C9F59295EB43504B7D70F8BC4924F2C4A9DB31DDB1026E716FCCBA
2,962,843 UART: [art] SIG.R = 1F695A1F62524B2AFE78BCFB950EB9DFE5EE9BF996DCFA62B55EFC033D007E24D2C1350ED79F842A01D93D7A1CAC9E29
2,969,603 UART: [art] SIG.S = 6F5548F8400062EAEA68B0089BCAFB03E7331AAF2941C32257EE0251A1BABE7E67DB6B991E8B9FB169C17C175A2758E9
2,992,991 UART: Caliptra RT
2,993,244 UART: [state] CFI Enabled
3,100,907 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,563 UART: [rt]cmd =0x54514754, len=24
3,133,593 >>> mbox cmd response data (8 bytes)
3,133,594 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,169 UART: [rt]cmd =0x54514754, len=24
3,164,702 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,396 UART: [kat] SHA2-256
904,336 UART: [kat] SHA2-384
907,131 UART: [kat] SHA2-512-ACC
909,032 UART: [kat] ECC-384
918,869 UART: [kat] HMAC-384Kdf
923,421 UART: [kat] LMS
1,171,749 UART: [kat] --
1,172,582 UART: [cold-reset] ++
1,173,128 UART: [fht] FHT @ 0x50003400
1,175,989 UART: [idev] ++
1,176,157 UART: [idev] CDI.KEYID = 6
1,176,517 UART: [idev] SUBJECT.KEYID = 7
1,176,941 UART: [idev] UDS.KEYID = 0
1,177,286 ready_for_fw is high
1,177,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,767 UART: [idev] Erasing UDS.KEYID = 0
1,201,616 UART: [idev] Sha1 KeyId Algorithm
1,210,142 UART: [idev] --
1,211,412 UART: [ldev] ++
1,211,580 UART: [ldev] CDI.KEYID = 6
1,211,943 UART: [ldev] SUBJECT.KEYID = 5
1,212,369 UART: [ldev] AUTHORITY.KEYID = 7
1,212,832 UART: [ldev] FE.KEYID = 1
1,218,370 UART: [ldev] Erasing FE.KEYID = 1
1,244,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,260 UART: [ldev] --
1,283,683 UART: [fwproc] Wait for Commands...
1,284,281 UART: [fwproc] Recv command 0x46574c44
1,285,009 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,855 >>> mbox cmd response: success
2,776,855 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,923 UART: [afmc] ++
2,778,091 UART: [afmc] CDI.KEYID = 6
2,778,453 UART: [afmc] SUBJECT.KEYID = 7
2,778,878 UART: [afmc] AUTHORITY.KEYID = 5
2,814,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,222 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,107 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,826 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,616 UART: [afmc] --
2,857,706 UART: [cold-reset] --
2,858,476 UART: [state] Locking Datavault
2,859,643 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,247 UART: [state] Locking ICCM
2,860,869 UART: [exit] Launching FMC @ 0x40000130
2,866,198 UART:
2,866,214 UART: Running Caliptra FMC ...
2,866,622 UART:
2,866,765 UART: [state] CFI Enabled
2,877,028 UART: [fht] FMC Alias Private Key: 7
2,985,253 UART: [art] Extend RT PCRs Done
2,985,681 UART: [art] Lock RT PCRs Done
2,987,053 UART: [art] Populate DV Done
2,995,204 UART: [fht] FMC Alias Private Key: 7
2,996,354 UART: [art] Derive CDI
2,996,634 UART: [art] Store in in slot 0x4
3,082,179 UART: [art] Derive Key Pair
3,082,539 UART: [art] Store priv key in slot 0x5
3,095,793 UART: [art] Derive Key Pair - Done
3,110,496 UART: [art] Signing Cert with AUTHO
3,110,976 UART: RITY.KEYID = 7
3,126,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,991 UART: [art] PUB.X = 2337381CE4FB678A58F7A29ED4629526AAF78A9E6F552E9D099BE52B7FE12AC280DAA0F25874C248B7706A25A8B4EE17
3,133,766 UART: [art] PUB.Y = 27259571CBEDC1F51B70F6290EAA7D881E3DE64B3875C176C811644E0D6BD7E87FA707EC9EA110F192C9E22D45763006
3,140,708 UART: [art] SIG.R = 4A4522A9BD9D1A25FE9DFA60346D35E115CB06703E73973F182CA5333A1C4A95C0199631BC38792C53A55C33EFD264AF
3,147,479 UART: [art] SIG.S = 5B57426AA8BCAD65BCBA0C601B840B9BDD39DD5BA49A27212FF23E46E3863EFC7219EA6AC57B87855E799338370FB759
3,171,189 UART: Caliptra RT
3,171,534 UART: [state] CFI Enabled
3,279,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,673 UART: [rt]cmd =0x54514754, len=24
3,311,947 >>> mbox cmd response data (8 bytes)
3,311,948 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,383 UART: [rt]cmd =0x54514754, len=24
3,342,852 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,794 ready_for_fw is high
1,060,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,076 >>> mbox cmd response: success
2,629,076 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,692,068 UART:
2,692,084 UART: Running Caliptra FMC ...
2,692,492 UART:
2,692,635 UART: [state] CFI Enabled
2,703,416 UART: [fht] FMC Alias Private Key: 7
2,810,991 UART: [art] Extend RT PCRs Done
2,811,419 UART: [art] Lock RT PCRs Done
2,812,837 UART: [art] Populate DV Done
2,821,080 UART: [fht] FMC Alias Private Key: 7
2,822,056 UART: [art] Derive CDI
2,822,336 UART: [art] Store in in slot 0x4
2,907,769 UART: [art] Derive Key Pair
2,908,129 UART: [art] Store priv key in slot 0x5
2,921,509 UART: [art] Derive Key Pair - Done
2,936,407 UART: [art] Signing Cert with AUTHO
2,936,887 UART: RITY.KEYID = 7
2,951,969 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,734 UART: [art] PUB.X = A266762D28B0CB0EC1F0956F30A5220E357E8B902CA8C8E1D5C33C88BF865CCB496F6816E6CADA875E249AC256100B1E
2,959,505 UART: [art] PUB.Y = A715D0441632DE24B1796940F56712CBA2644CC2E25E5A289ACDBD78B79C6906E11F72468B88D7A9FCAA4918417A41B8
2,966,454 UART: [art] SIG.R = A77EA5B41EB200FAF1968F0D7E464193A816375D58A16FE87BF28FA78370368B6266C1FBA36621611F2D4F8577676F01
2,973,194 UART: [art] SIG.S = BAC4ECD61573F8279154B657AC10F6F56F8282500032C68B21309AAF8115E51E0051485063C70960D8A9A70DFD91DEEF
2,997,047 UART: Caliptra RT
2,997,392 UART: [state] CFI Enabled
3,104,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,942 UART: [rt]cmd =0x54514754, len=24
3,137,098 >>> mbox cmd response data (8 bytes)
3,137,099 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,532 UART: [rt]cmd =0x54514754, len=24
3,167,997 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
915,846 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,259 UART: [idev] Erasing UDS.KEYID = 0
1,197,915 UART: [idev] Sha1 KeyId Algorithm
1,206,833 UART: [idev] --
1,207,982 UART: [ldev] ++
1,208,150 UART: [ldev] CDI.KEYID = 6
1,208,514 UART: [ldev] SUBJECT.KEYID = 5
1,208,941 UART: [ldev] AUTHORITY.KEYID = 7
1,209,404 UART: [ldev] FE.KEYID = 1
1,214,446 UART: [ldev] Erasing FE.KEYID = 1
1,240,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,904 UART: [ldev] --
1,280,326 UART: [fwproc] Wait for Commands...
1,280,995 UART: [fwproc] Recv command 0x46574c44
1,281,728 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,406 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,490 >>> mbox cmd response: success
2,774,490 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,601 UART: [afmc] ++
2,775,769 UART: [afmc] CDI.KEYID = 6
2,776,132 UART: [afmc] SUBJECT.KEYID = 7
2,776,558 UART: [afmc] AUTHORITY.KEYID = 5
2,811,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,684 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,296 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,015 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,810 UART: [afmc] --
2,854,712 UART: [cold-reset] --
2,855,602 UART: [state] Locking Datavault
2,856,617 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,221 UART: [state] Locking ICCM
2,857,647 UART: [exit] Launching FMC @ 0x40000130
2,862,976 UART:
2,862,992 UART: Running Caliptra FMC ...
2,863,400 UART:
2,863,454 UART: [state] CFI Enabled
2,873,511 UART: [fht] FMC Alias Private Key: 7
2,981,170 UART: [art] Extend RT PCRs Done
2,981,598 UART: [art] Lock RT PCRs Done
2,983,262 UART: [art] Populate DV Done
2,991,739 UART: [fht] FMC Alias Private Key: 7
2,992,831 UART: [art] Derive CDI
2,993,111 UART: [art] Store in in slot 0x4
3,079,076 UART: [art] Derive Key Pair
3,079,436 UART: [art] Store priv key in slot 0x5
3,092,820 UART: [art] Derive Key Pair - Done
3,108,012 UART: [art] Signing Cert with AUTHO
3,108,492 UART: RITY.KEYID = 7
3,123,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,571 UART: [art] PUB.X = 438553AE6E5F5DDB959129BEC4CFD0449FB67C0B7899A033A7D828C0CF750A9773C26FB66809963AD536203A91CE0AFD
3,131,337 UART: [art] PUB.Y = 899AE089839B4F9480759D631C98E79CD87576EA7F7D9C544B50C1C1DCBA9C1C62CC55E0D0474528BDE589D44FE1D9ED
3,138,297 UART: [art] SIG.R = FEC7AAA1360812485FA884BFCE36B3CAA444B89340473C0B79519046D85009CD93AB89F3027E77425F2213642F17FB88
3,145,053 UART: [art] SIG.S = 051886E24677E240A77B20D95E40FD96108FD2CA87A1540577527C7AB7D18E7F9B1B2DEF22BC23C5E9D5011CFE8580AE
3,168,551 UART: Caliptra RT
3,168,804 UART: [state] CFI Enabled
3,276,677 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,411 UART: [rt]cmd =0x54514754, len=24
3,309,491 >>> mbox cmd response data (8 bytes)
3,309,492 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,827 UART: [rt]cmd =0x54514754, len=24
3,340,378 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,852 ready_for_fw is high
1,055,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,594 >>> mbox cmd response: success
2,624,594 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,108 UART:
2,686,124 UART: Running Caliptra FMC ...
2,686,532 UART:
2,686,586 UART: [state] CFI Enabled
2,697,309 UART: [fht] FMC Alias Private Key: 7
2,805,796 UART: [art] Extend RT PCRs Done
2,806,224 UART: [art] Lock RT PCRs Done
2,807,708 UART: [art] Populate DV Done
2,816,011 UART: [fht] FMC Alias Private Key: 7
2,817,167 UART: [art] Derive CDI
2,817,447 UART: [art] Store in in slot 0x4
2,903,174 UART: [art] Derive Key Pair
2,903,534 UART: [art] Store priv key in slot 0x5
2,916,572 UART: [art] Derive Key Pair - Done
2,931,431 UART: [art] Signing Cert with AUTHO
2,931,911 UART: RITY.KEYID = 7
2,947,233 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,998 UART: [art] PUB.X = 822E4AEB5B1FC7094A9D2573444D3CFCC02C3CC6B7B872F3A6EB54BAF90E20B08E0E056EE094A3334D3B0F7D3327AED4
2,954,771 UART: [art] PUB.Y = 01B1C26B099C59B6CB0A728DA720E9699A0CD356C2EDE9C54DC6A9870B2A8F09BF4D599734A38A8F35A44D1FF57A6479
2,961,713 UART: [art] SIG.R = 1FDF99C12762AC56BD3A0CA844F32361D1C9D4FE9FF306E46ADCEE910916D2A0BDDF1AFBBC4D8EB88E7A75B36E93B39F
2,968,502 UART: [art] SIG.S = D77ABD4AA7AB7C41E0CDB87D3D567A9E10967BF0DBC556482DD1B3801D0B5302B41A9FA6282E9FE77A8859F0B0809F9C
2,992,779 UART: Caliptra RT
2,993,032 UART: [state] CFI Enabled
3,101,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,315 UART: [rt]cmd =0x54514754, len=24
3,134,255 >>> mbox cmd response data (8 bytes)
3,134,256 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,769 UART: [rt]cmd =0x54514754, len=24
3,165,252 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
891,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,345 UART: [kat] SHA2-512-ACC
906,246 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,624 UART: [fht] FHT @ 0x50003400
1,173,312 UART: [idev] ++
1,173,480 UART: [idev] CDI.KEYID = 6
1,173,841 UART: [idev] SUBJECT.KEYID = 7
1,174,266 UART: [idev] UDS.KEYID = 0
1,174,612 ready_for_fw is high
1,174,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,514 UART: [idev] Erasing UDS.KEYID = 0
1,199,586 UART: [idev] Sha1 KeyId Algorithm
1,208,268 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,775 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,215,775 UART: [ldev] Erasing FE.KEYID = 1
1,242,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,497 UART: [ldev] --
1,281,843 UART: [fwproc] Wait for Commands...
1,282,482 UART: [fwproc] Recv command 0x46574c44
1,283,215 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,111 >>> mbox cmd response: success
2,773,111 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,248 UART: [afmc] ++
2,774,416 UART: [afmc] CDI.KEYID = 6
2,774,779 UART: [afmc] SUBJECT.KEYID = 7
2,775,205 UART: [afmc] AUTHORITY.KEYID = 5
2,810,704 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,621 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,350 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,233 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,952 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,877 UART: [afmc] --
2,853,947 UART: [cold-reset] --
2,854,857 UART: [state] Locking Datavault
2,856,254 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,858 UART: [state] Locking ICCM
2,857,290 UART: [exit] Launching FMC @ 0x40000130
2,862,619 UART:
2,862,635 UART: Running Caliptra FMC ...
2,863,043 UART:
2,863,186 UART: [state] CFI Enabled
2,873,913 UART: [fht] FMC Alias Private Key: 7
2,981,554 UART: [art] Extend RT PCRs Done
2,981,982 UART: [art] Lock RT PCRs Done
2,983,182 UART: [art] Populate DV Done
2,991,511 UART: [fht] FMC Alias Private Key: 7
2,992,591 UART: [art] Derive CDI
2,992,871 UART: [art] Store in in slot 0x4
3,078,298 UART: [art] Derive Key Pair
3,078,658 UART: [art] Store priv key in slot 0x5
3,092,292 UART: [art] Derive Key Pair - Done
3,106,996 UART: [art] Signing Cert with AUTHO
3,107,476 UART: RITY.KEYID = 7
3,122,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,285 UART: [art] PUB.X = 9D084BF413D4C58C906CC888E61611B4598E0F13658D05426145070A526E3895E83E22E65DF6344D9DC0645FFEC5C1ED
3,130,038 UART: [art] PUB.Y = F946FBB9210990B0015FB82362CCF64850153F2169A689139699C96B8F000AAD41405779F7AC6F8B2942E619BB42EECD
3,136,955 UART: [art] SIG.R = 3EBA7296D9DD7ADDE8E4FB7A65A836AB14FE1D6CE89A407496329AB68B0C989F8806BF09AA4799FB57BDE3F4CF5E3419
3,143,736 UART: [art] SIG.S = B36D65BF671FDB0B5043A0AA2D83C4FE37C4BEBB17DB80ADEC662C63E82F8919320E310F4D9B44C5F2DAE73DB6653E86
3,166,856 UART: Caliptra RT
3,167,201 UART: [state] CFI Enabled
3,274,614 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,528 UART: [rt]cmd =0x54514754, len=24
3,307,536 >>> mbox cmd response data (8 bytes)
3,307,537 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,042 UART: [rt]cmd =0x54514754, len=24
3,338,271 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,819 ready_for_fw is high
1,056,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,359 >>> mbox cmd response: success
2,627,359 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,179 UART:
2,690,195 UART: Running Caliptra FMC ...
2,690,603 UART:
2,690,746 UART: [state] CFI Enabled
2,701,231 UART: [fht] FMC Alias Private Key: 7
2,809,218 UART: [art] Extend RT PCRs Done
2,809,646 UART: [art] Lock RT PCRs Done
2,811,096 UART: [art] Populate DV Done
2,819,301 UART: [fht] FMC Alias Private Key: 7
2,820,235 UART: [art] Derive CDI
2,820,515 UART: [art] Store in in slot 0x4
2,906,708 UART: [art] Derive Key Pair
2,907,068 UART: [art] Store priv key in slot 0x5
2,920,334 UART: [art] Derive Key Pair - Done
2,934,882 UART: [art] Signing Cert with AUTHO
2,935,362 UART: RITY.KEYID = 7
2,950,894 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,659 UART: [art] PUB.X = AC117FF7A93FB0874F368E2F912EE4D196413F92D480A4F03C138A334EBF394B738B194469C5C0B978E00C29944A9B1B
2,958,428 UART: [art] PUB.Y = 53E7B97AC8D06F1C56A725ABD02693C2B2D56FA41BCA0E31047738920E4B253984C98086FF20AD54A9CDCB4C72CF8BBB
2,965,383 UART: [art] SIG.R = 7C153B1EAAA8C0F24F27A7073D7AE492F0C921FAE989C5BE749C2EFFB3CACEC042B4AECAD79411FD5C5423B7B84885E5
2,972,174 UART: [art] SIG.S = 8FA7D6128B377E2B42C81B5D9CD5E3885AF7FD4B935F925DAA8DA35BA435FEE9AD477900EB43C02888E12190F3EF817B
2,996,011 UART: Caliptra RT
2,996,356 UART: [state] CFI Enabled
3,104,561 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,929 UART: [rt]cmd =0x54514754, len=24
3,137,009 >>> mbox cmd response data (8 bytes)
3,137,010 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,451 UART: [rt]cmd =0x54514754, len=24
3,167,752 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,048 UART:
192,418 UART: Running Caliptra ROM ...
193,519 UART:
193,662 UART: [state] CFI Enabled
265,845 UART: [state] LifecycleState = Unprovisioned
267,781 UART: [state] DebugLocked = No
269,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,995 UART: [kat] SHA2-256
443,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,226 UART: [kat] ++
454,720 UART: [kat] sha1
466,379 UART: [kat] SHA2-256
469,051 UART: [kat] SHA2-384
475,689 UART: [kat] SHA2-512-ACC
478,065 UART: [kat] ECC-384
2,767,303 UART: [kat] HMAC-384Kdf
2,778,546 UART: [kat] LMS
3,968,884 UART: [kat] --
3,975,514 UART: [cold-reset] ++
3,976,662 UART: [fht] Storing FHT @ 0x50003400
3,989,282 UART: [idev] ++
3,989,848 UART: [idev] CDI.KEYID = 6
3,990,763 UART: [idev] SUBJECT.KEYID = 7
3,992,010 UART: [idev] UDS.KEYID = 0
3,993,059 ready_for_fw is high
3,993,275 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,831 UART: [idev] Erasing UDS.KEYID = 0
7,325,704 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,411 UART: [idev] --
7,350,110 UART: [ldev] ++
7,350,677 UART: [ldev] CDI.KEYID = 6
7,351,619 UART: [ldev] SUBJECT.KEYID = 5
7,352,752 UART: [ldev] AUTHORITY.KEYID = 7
7,354,088 UART: [ldev] FE.KEYID = 1
7,401,226 UART: [ldev] Erasing FE.KEYID = 1
10,733,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,096 UART: [ldev] --
13,092,727 UART: [fwproc] Waiting for Commands...
13,094,827 UART: [fwproc] Received command 0x46574c44
13,097,011 UART: [fwproc] Received Image of size 114124 bytes
17,147,049 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,248 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,139 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,604,147 >>> mbox cmd response: success
17,604,665 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,608,278 UART: [afmc] ++
17,608,872 UART: [afmc] CDI.KEYID = 6
17,609,948 UART: [afmc] SUBJECT.KEYID = 7
17,611,006 UART: [afmc] AUTHORITY.KEYID = 5
20,979,628 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,282,182 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,429 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,817 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,687 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,328,113 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,349,716 UART: [afmc] --
23,353,494 UART: [cold-reset] --
23,358,221 UART: [state] Locking Datavault
23,364,229 UART: [state] Locking PCR0, PCR1 and PCR31
23,365,976 UART: [state] Locking ICCM
23,367,585 UART: [exit] Launching FMC @ 0x40000130
23,375,980 UART:
23,376,224 UART: Running Caliptra FMC ...
23,377,323 UART:
23,377,481 UART: [state] CFI Enabled
23,441,817 UART: [fht] FMC Alias Private Key: 7
25,779,808 UART: [art] Extend RT PCRs Done
25,781,025 UART: [art] Lock RT PCRs Done
25,782,652 UART: [art] Populate DV Done
25,788,114 UART: [fht] FMC Alias Private Key: 7
25,789,770 UART: [art] Derive CDI
25,790,583 UART: [art] Store in in slot 0x4
25,850,627 UART: [art] Derive Key Pair
25,851,646 UART: [art] Store priv key in slot 0x5
29,144,193 UART: [art] Derive Key Pair - Done
29,157,072 UART: [art] Signing Cert with AUTHO
29,158,401 UART: RITY.KEYID = 7
31,446,939 UART: [art] Erasing AUTHORITY.KEYID = 7
31,448,446 UART: [art] PUB.X = 77CAC9D7A966577F963CC8B03D7613415343378C67074CACCC5CAB3F4EA14CA4815784EAF367DF65A81BAFB7E3F40044
31,455,692 UART: [art] PUB.Y = BA74BFBC97E0F056D42F68C88F2274D806BC524B534DA67D43E9778A78EAB9294A5DD47165DDFAD2EE1F9EAAA1C853EC
31,462,974 UART: [art] SIG.R = BCDF2D6DDCFF2919792407AF7A3CE41C49321A17503B903D90FB7151FC9B703C0C212AA36417219F3742072D3AB30A0E
31,470,359 UART: [art] SIG.S = ACB5DCD51C23FDB8A7E68BDC193B25366A276F3784355B33DB75077C33C5F596CA1E0454C9C5A4B871245E5677D7E136
32,775,594 UART: Caliptra RT
32,776,306 UART: [state] CFI Enabled
32,938,542 UART: [rt] RT listening for mailbox commands...
32,970,229 UART: [rt]cmd =0x47544744, len=8
32,972,001 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,803,881 ready_for_fw is high
3,804,327 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,891,633 >>> mbox cmd response: success
17,892,220 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,592,075 UART:
23,592,457 UART: Running Caliptra FMC ...
23,593,595 UART:
23,593,753 UART: [state] CFI Enabled
23,661,393 UART: [fht] FMC Alias Private Key: 7
25,999,251 UART: [art] Extend RT PCRs Done
26,000,482 UART: [art] Lock RT PCRs Done
26,001,794 UART: [art] Populate DV Done
26,007,113 UART: [fht] FMC Alias Private Key: 7
26,008,826 UART: [art] Derive CDI
26,009,647 UART: [art] Store in in slot 0x4
26,069,935 UART: [art] Derive Key Pair
26,071,006 UART: [art] Store priv key in slot 0x5
29,363,572 UART: [art] Derive Key Pair - Done
29,376,587 UART: [art] Signing Cert with AUTHO
29,377,902 UART: RITY.KEYID = 7
31,664,754 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,267 UART: [art] PUB.X = 0FAB1B649976414420F90E10FC70080A62A5E0B161366F875D15DE5EB2024DD0EDEC0939EA3D7F781EA7D5A9BA9E91FC
31,673,483 UART: [art] PUB.Y = FD47B8FD501AEDF7A919B88E971DF5271910FA777E44B3AC34A4AB6FB2921C1B1AC41B2E1CE8892DA4CD19C76CF2FE1B
31,680,784 UART: [art] SIG.R = 1C558E43F89C847B4B3E5A46E134191DFFA73595E4617DF7746EE1FB8DEFC5A2A0AB5E469C28E558F37F0D3265764566
31,688,146 UART: [art] SIG.S = 021B42AC02C46187F7C500C97D2BB168D46827BC8B01028E46366222202D99450429D4ABBCC0D244673C18DDC3C0DEF2
32,992,853 UART: Caliptra RT
32,993,551 UART: [state] CFI Enabled
33,154,877 UART: [rt] RT listening for mailbox commands...
33,186,467 UART: [rt]cmd =0x47544744, len=8
33,188,577 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,575 UART:
192,960 UART: Running Caliptra ROM ...
194,111 UART:
603,753 UART: [state] CFI Enabled
614,859 UART: [state] LifecycleState = Unprovisioned
616,799 UART: [state] DebugLocked = No
618,100 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,521 UART: [kat] SHA2-256
793,256 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,770 UART: [kat] ++
804,215 UART: [kat] sha1
815,435 UART: [kat] SHA2-256
818,083 UART: [kat] SHA2-384
824,394 UART: [kat] SHA2-512-ACC
826,801 UART: [kat] ECC-384
3,112,442 UART: [kat] HMAC-384Kdf
3,124,392 UART: [kat] LMS
4,314,541 UART: [kat] --
4,320,500 UART: [cold-reset] ++
4,322,937 UART: [fht] Storing FHT @ 0x50003400
4,334,269 UART: [idev] ++
4,334,826 UART: [idev] CDI.KEYID = 6
4,335,848 UART: [idev] SUBJECT.KEYID = 7
4,337,021 UART: [idev] UDS.KEYID = 0
4,338,047 ready_for_fw is high
4,338,246 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,546 UART: [idev] Erasing UDS.KEYID = 0
7,621,539 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,508 UART: [idev] --
7,646,852 UART: [ldev] ++
7,647,413 UART: [ldev] CDI.KEYID = 6
7,648,345 UART: [ldev] SUBJECT.KEYID = 5
7,649,603 UART: [ldev] AUTHORITY.KEYID = 7
7,650,827 UART: [ldev] FE.KEYID = 1
7,661,731 UART: [ldev] Erasing FE.KEYID = 1
10,947,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,017 UART: [ldev] --
13,306,890 UART: [fwproc] Waiting for Commands...
13,309,635 UART: [fwproc] Received command 0x46574c44
13,311,864 UART: [fwproc] Received Image of size 114124 bytes
17,372,675 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,059 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,957 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,747 >>> mbox cmd response: success
17,835,326 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,839,419 UART: [afmc] ++
17,840,015 UART: [afmc] CDI.KEYID = 6
17,840,892 UART: [afmc] SUBJECT.KEYID = 7
17,842,159 UART: [afmc] AUTHORITY.KEYID = 5
21,152,956 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,827 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,080 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,523 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,303 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,746 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,879 UART: [afmc] --
23,522,276 UART: [cold-reset] --
23,525,649 UART: [state] Locking Datavault
23,532,610 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,301 UART: [state] Locking ICCM
23,537,113 UART: [exit] Launching FMC @ 0x40000130
23,545,516 UART:
23,545,810 UART: Running Caliptra FMC ...
23,546,840 UART:
23,546,980 UART: [state] CFI Enabled
23,555,240 UART: [fht] FMC Alias Private Key: 7
25,886,544 UART: [art] Extend RT PCRs Done
25,887,759 UART: [art] Lock RT PCRs Done
25,889,494 UART: [art] Populate DV Done
25,895,171 UART: [fht] FMC Alias Private Key: 7
25,896,700 UART: [art] Derive CDI
25,897,457 UART: [art] Store in in slot 0x4
25,939,930 UART: [art] Derive Key Pair
25,941,139 UART: [art] Store priv key in slot 0x5
29,182,471 UART: [art] Derive Key Pair - Done
29,195,523 UART: [art] Signing Cert with AUTHO
29,196,832 UART: RITY.KEYID = 7
31,476,746 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,268 UART: [art] PUB.X = 7B8EB5838219E9346426B41FE04E4900BD58C210EDED6B80C71390AB5291D7D06A70C8D4FBD3BF6919D845A0E3D5A6F3
31,485,504 UART: [art] PUB.Y = 4BB426975D41EFDAA1D0F002E75023047BB943C547F9D718066ACEAE8091AE9123109FB244A0D84DB71B8B4CB1D15C9E
31,492,774 UART: [art] SIG.R = 6D3B04624A594CF3D78DD1FD731D559EB95A43032840626216FFA658A765C01195A941D834C5A387879765A39BEEE9D3
31,500,103 UART: [art] SIG.S = 660D60A0095F70D55B3EE279C5A643106687BAF8CE5B59BF2DCFEF722903DA412C52B3469F1DAF4F5A53A326C594D6CB
32,805,120 UART: Caliptra RT
32,805,831 UART: [state] CFI Enabled
32,923,758 UART: [rt] RT listening for mailbox commands...
32,955,007 UART: [rt]cmd =0x47544744, len=8
32,957,215 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,126,591 ready_for_fw is high
4,126,963 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,058,585 >>> mbox cmd response: success
18,059,198 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,700,056 UART:
23,700,439 UART: Running Caliptra FMC ...
23,701,531 UART:
23,701,699 UART: [state] CFI Enabled
23,709,712 UART: [fht] FMC Alias Private Key: 7
26,040,789 UART: [art] Extend RT PCRs Done
26,042,017 UART: [art] Lock RT PCRs Done
26,043,308 UART: [art] Populate DV Done
26,048,573 UART: [fht] FMC Alias Private Key: 7
26,050,169 UART: [art] Derive CDI
26,050,903 UART: [art] Store in in slot 0x4
26,093,717 UART: [art] Derive Key Pair
26,094,761 UART: [art] Store priv key in slot 0x5
29,336,963 UART: [art] Derive Key Pair - Done
29,349,743 UART: [art] Signing Cert with AUTHO
29,351,082 UART: RITY.KEYID = 7
31,630,334 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,846 UART: [art] PUB.X = A3F0BBB8AD7B88549275128B1933C83317396AF74EFC20C527343F4C1CBB55EBDE80549E0B037EC1F1E0DA2BECF4ED81
31,639,089 UART: [art] PUB.Y = 406431BDD6536BF82482F6DA08140CEC68090C3B6AAE4418FD7DD7859AF55C76DB849C16761BE7BC32DEA07290E7AEA5
31,646,336 UART: [art] SIG.R = 4C9889BB3FDF941DA78BF9B62B2FA730C59A55DEE43AF3CD4A2F76E54E8534058747E4F57D8F25E0869204B9CAF1586A
31,653,725 UART: [art] SIG.S = 9BE36AC3DE2E5E7295F36CD8C271909A45EEDD0EBD8C4DBCA4411B45649BDA04A394F28CB9B3BDD057539F3514BB717A
32,959,132 UART: Caliptra RT
32,959,857 UART: [state] CFI Enabled
33,077,689 UART: [rt] RT listening for mailbox commands...
33,109,103 UART: [rt]cmd =0x47544744, len=8
33,111,125 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,244 UART:
192,593 UART: Running Caliptra ROM ...
193,783 UART:
193,937 UART: [state] CFI Enabled
266,444 UART: [state] LifecycleState = Unprovisioned
268,348 UART: [state] DebugLocked = No
271,227 UART: [state] WD Timer not started. Device not locked for debugging
275,467 UART: [kat] SHA2-256
454,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,163 UART: [kat] ++
466,697 UART: [kat] sha1
477,649 UART: [kat] SHA2-256
480,653 UART: [kat] SHA2-384
486,920 UART: [kat] SHA2-512-ACC
489,927 UART: [kat] ECC-384
2,949,174 UART: [kat] HMAC-384Kdf
2,971,659 UART: [kat] LMS
3,501,132 UART: [kat] --
3,507,608 UART: [cold-reset] ++
3,509,743 UART: [fht] FHT @ 0x50003400
3,520,294 UART: [idev] ++
3,520,870 UART: [idev] CDI.KEYID = 6
3,521,791 UART: [idev] SUBJECT.KEYID = 7
3,522,966 UART: [idev] UDS.KEYID = 0
3,523,910 ready_for_fw is high
3,524,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,143 UART: [idev] Erasing UDS.KEYID = 0
6,028,445 UART: [idev] Sha1 KeyId Algorithm
6,052,005 UART: [idev] --
6,055,733 UART: [ldev] ++
6,056,307 UART: [ldev] CDI.KEYID = 6
6,057,224 UART: [ldev] SUBJECT.KEYID = 5
6,058,523 UART: [ldev] AUTHORITY.KEYID = 7
6,059,659 UART: [ldev] FE.KEYID = 1
6,099,663 UART: [ldev] Erasing FE.KEYID = 1
8,602,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,382 UART: [ldev] --
10,412,382 UART: [fwproc] Wait for Commands...
10,415,499 UART: [fwproc] Recv command 0x46574c44
10,417,535 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,306 >>> mbox cmd response: success
14,277,810 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,280,693 UART: [afmc] ++
14,281,310 UART: [afmc] CDI.KEYID = 6
14,282,220 UART: [afmc] SUBJECT.KEYID = 7
14,283,383 UART: [afmc] AUTHORITY.KEYID = 5
16,828,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,573,020 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,588,835 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,604,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,620,695 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,642,846 UART: [afmc] --
18,646,229 UART: [cold-reset] --
18,649,434 UART: [state] Locking Datavault
18,655,055 UART: [state] Locking PCR0, PCR1 and PCR31
18,656,699 UART: [state] Locking ICCM
18,658,201 UART: [exit] Launching FMC @ 0x40000130
18,666,602 UART:
18,666,837 UART: Running Caliptra FMC ...
18,667,935 UART:
18,668,091 UART: [state] CFI Enabled
18,729,588 UART: [fht] FMC Alias Private Key: 7
20,493,097 UART: [art] Extend RT PCRs Done
20,494,319 UART: [art] Lock RT PCRs Done
20,496,311 UART: [art] Populate DV Done
20,501,669 UART: [fht] FMC Alias Private Key: 7
20,503,369 UART: [art] Derive CDI
20,504,177 UART: [art] Store in in slot 0x4
20,562,011 UART: [art] Derive Key Pair
20,563,049 UART: [art] Store priv key in slot 0x5
23,026,086 UART: [art] Derive Key Pair - Done
23,039,298 UART: [art] Signing Cert with AUTHO
23,040,595 UART: RITY.KEYID = 7
24,751,300 UART: [art] Erasing AUTHORITY.KEYID = 7
24,752,795 UART: [art] PUB.X = 35CD688EB890DE87B4893EE232DC9A02CD67DBB9E181D65C2D5C4B61188CBBEE2F20C40AA48995E9654114754DC14A4C
24,760,100 UART: [art] PUB.Y = AEBF0EE22DB0B9477332F5DFBFC48853C72754DBD01DA699A59AAA4A143CCB9C20B11B90D6CCB149DD07A1ADC4123299
24,767,400 UART: [art] SIG.R = 1A1D4A6F98F3BE6A91F68EE62C9F4FB60AC496FCF68C6B0A107F21AE75C74F1263A060EE92AF60AE950AF40E47374A3F
24,774,796 UART: [art] SIG.S = 69B72688002BC8F70967075FF6902442796469177A520CB046719DCDE1746B84A5EDA102FE8B04B02EBBD48D88E80A91
25,753,759 UART: Caliptra RT
25,754,463 UART: [state] CFI Enabled
25,918,876 UART: [rt] RT listening for mailbox commands...
25,950,242 UART: [rt]cmd =0x47544744, len=8
25,952,229 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,374,945 ready_for_fw is high
3,375,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,052,658 >>> mbox cmd response: success
14,053,345 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,335,181 UART:
18,335,572 UART: Running Caliptra FMC ...
18,336,679 UART:
18,336,830 UART: [state] CFI Enabled
18,406,240 UART: [fht] FMC Alias Private Key: 7
20,170,114 UART: [art] Extend RT PCRs Done
20,171,343 UART: [art] Lock RT PCRs Done
20,173,245 UART: [art] Populate DV Done
20,178,730 UART: [fht] FMC Alias Private Key: 7
20,180,216 UART: [art] Derive CDI
20,181,032 UART: [art] Store in in slot 0x4
20,239,082 UART: [art] Derive Key Pair
20,240,127 UART: [art] Store priv key in slot 0x5
22,703,260 UART: [art] Derive Key Pair - Done
22,716,156 UART: [art] Signing Cert with AUTHO
22,717,500 UART: RITY.KEYID = 7
24,428,141 UART: [art] Erasing AUTHORITY.KEYID = 7
24,429,644 UART: [art] PUB.X = 04A8C10D83FFE5F9E71EF559EF3DCBB2E609DD36E1229FE9AFC2B7C0832B5871C3F643A0F54907852439329AEC029392
24,436,942 UART: [art] PUB.Y = E410E4A9C0AF2CE30FF52A0238DB738D85DDD886F09B0FC2FB96702843515DE47E9FE29C51C494FA32C224A0B64F0220
24,444,191 UART: [art] SIG.R = 2C328224A94B50FEAEE8AA9C399B4435E0E30E30C01FE0BE950A3E90F03FD9447D7C4D09708097BB3568837A51B1BE1D
24,451,626 UART: [art] SIG.S = 1BD9221438746821B258006CC7D09EDC382E6B2A1137970539F0B07DD162BC0DE7B070E57D2E757CC47AEC02DF28280B
25,430,617 UART: Caliptra RT
25,431,330 UART: [state] CFI Enabled
25,596,329 UART: [rt] RT listening for mailbox commands...
25,627,875 UART: [rt]cmd =0x47544744, len=8
25,629,868 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,423 writing to cptra_bootfsm_go
193,678 UART:
194,051 UART: Running Caliptra ROM ...
195,241 UART:
604,672 UART: [state] CFI Enabled
618,750 UART: [state] LifecycleState = Unprovisioned
620,617 UART: [state] DebugLocked = No
623,346 UART: [state] WD Timer not started. Device not locked for debugging
627,086 UART: [kat] SHA2-256
806,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,817 UART: [kat] ++
818,260 UART: [kat] sha1
829,410 UART: [kat] SHA2-256
832,503 UART: [kat] SHA2-384
837,562 UART: [kat] SHA2-512-ACC
840,485 UART: [kat] ECC-384
3,279,562 UART: [kat] HMAC-384Kdf
3,292,892 UART: [kat] LMS
3,822,418 UART: [kat] --
3,826,405 UART: [cold-reset] ++
3,827,706 UART: [fht] FHT @ 0x50003400
3,839,389 UART: [idev] ++
3,839,944 UART: [idev] CDI.KEYID = 6
3,840,821 UART: [idev] SUBJECT.KEYID = 7
3,842,129 UART: [idev] UDS.KEYID = 0
3,843,030 ready_for_fw is high
3,843,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,842 UART: [idev] Erasing UDS.KEYID = 0
6,320,118 UART: [idev] Sha1 KeyId Algorithm
6,342,283 UART: [idev] --
6,344,844 UART: [ldev] ++
6,345,421 UART: [ldev] CDI.KEYID = 6
6,346,294 UART: [ldev] SUBJECT.KEYID = 5
6,347,415 UART: [ldev] AUTHORITY.KEYID = 7
6,348,744 UART: [ldev] FE.KEYID = 1
6,359,138 UART: [ldev] Erasing FE.KEYID = 1
8,830,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,966 UART: [ldev] --
10,621,439 UART: [fwproc] Wait for Commands...
10,624,340 UART: [fwproc] Recv command 0x46574c44
10,626,369 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,492,814 >>> mbox cmd response: success
14,493,344 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,497,473 UART: [afmc] ++
14,498,049 UART: [afmc] CDI.KEYID = 6
14,498,962 UART: [afmc] SUBJECT.KEYID = 7
14,500,178 UART: [afmc] AUTHORITY.KEYID = 5
16,999,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,429 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,215 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,065 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,817 UART: [afmc] --
18,796,798 UART: [cold-reset] --
18,800,862 UART: [state] Locking Datavault
18,804,197 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,892 UART: [state] Locking ICCM
18,808,011 UART: [exit] Launching FMC @ 0x40000130
18,816,456 UART:
18,816,684 UART: Running Caliptra FMC ...
18,817,775 UART:
18,817,924 UART: [state] CFI Enabled
18,826,172 UART: [fht] FMC Alias Private Key: 7
20,582,712 UART: [art] Extend RT PCRs Done
20,583,926 UART: [art] Lock RT PCRs Done
20,585,304 UART: [art] Populate DV Done
20,590,662 UART: [fht] FMC Alias Private Key: 7
20,592,189 UART: [art] Derive CDI
20,592,913 UART: [art] Store in in slot 0x4
20,635,784 UART: [art] Derive Key Pair
20,636,782 UART: [art] Store priv key in slot 0x5
23,063,676 UART: [art] Derive Key Pair - Done
23,076,347 UART: [art] Signing Cert with AUTHO
23,077,647 UART: RITY.KEYID = 7
24,782,841 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,337 UART: [art] PUB.X = 584BF43B5F99A6462C058FB42A10F9FCE031EF25B3432A75866E5F422B01D73AAFEB1286825937E77D8CAA7F5CB1A07C
24,791,572 UART: [art] PUB.Y = FE914234FB04422284A3A31206CC5EA4E91BB8FF4F1CD88B4D49C5CDAEF1BB65F87D5237E0A1259168D084591009AE84
24,798,856 UART: [art] SIG.R = 3EFEB2A717B6B94C1718C718C9BE83FCFBA80E4DB8DD30A38B2B695173BBD785B67890E9909AC178957B3A77A0FE4A9C
24,806,326 UART: [art] SIG.S = 3A638B1574F3D620E4A2FF756301F82AC7B3F2FACE998BB2AA48CB71ABA4E2A9B85F85583F30B31081539575C007653A
25,785,148 UART: Caliptra RT
25,785,859 UART: [state] CFI Enabled
25,903,082 UART: [rt] RT listening for mailbox commands...
25,934,584 UART: [rt]cmd =0x47544744, len=8
25,936,600 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,697,258 ready_for_fw is high
3,697,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,276,269 >>> mbox cmd response: success
14,277,022 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,530,998 UART:
18,531,396 UART: Running Caliptra FMC ...
18,532,497 UART:
18,532,643 UART: [state] CFI Enabled
18,540,281 UART: [fht] FMC Alias Private Key: 7
20,297,615 UART: [art] Extend RT PCRs Done
20,298,838 UART: [art] Lock RT PCRs Done
20,300,217 UART: [art] Populate DV Done
20,305,575 UART: [fht] FMC Alias Private Key: 7
20,307,218 UART: [art] Derive CDI
20,307,951 UART: [art] Store in in slot 0x4
20,350,545 UART: [art] Derive Key Pair
20,351,582 UART: [art] Store priv key in slot 0x5
22,778,087 UART: [art] Derive Key Pair - Done
22,791,201 UART: [art] Signing Cert with AUTHO
22,792,510 UART: RITY.KEYID = 7
24,497,995 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,496 UART: [art] PUB.X = 93AB64B77E88C48447EF25926EEB1352655549E4276B3B7A8F0A7A4930F9D4B780EC3B9971CFE2BAFF9A7CBA1EACB2B2
24,506,739 UART: [art] PUB.Y = 490D960F1F9A16C36575A8EC11D9C4034172F2A9D0128FD012742AE5FE3A4CFCAAE66A428E24CF6C60E36100588BBF9F
24,513,999 UART: [art] SIG.R = BBF134706B5D9748BEC26FC6506CED372DB6D2E8312699E2669B2205AD6B577D26ED0A540ACA2ED2A1325226A5587A15
24,521,408 UART: [art] SIG.S = D42132EC8D1ACED16BC16B3122E8E0EAB2EA07D54FBE70F05D7A5B18CE5A7121B7894C834CA8D5DAB4BECD6AEFF8ECFF
25,500,164 UART: Caliptra RT
25,500,866 UART: [state] CFI Enabled
25,617,782 UART: [rt] RT listening for mailbox commands...
25,649,352 UART: [rt]cmd =0x47544744, len=8
25,651,316 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,436,808 ready_for_fw is high
3,437,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,746,337 >>> mbox cmd response: success
14,747,092 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,029,277 UART:
19,029,688 UART: Running Caliptra FMC ...
19,030,800 UART:
19,030,993 UART: [state] CFI Enabled
19,094,595 UART: [fht] FMC Alias Private Key: 7
20,858,248 UART: [art] Extend RT PCRs Done
20,859,475 UART: [art] Lock RT PCRs Done
20,861,078 UART: [art] Populate DV Done
20,866,547 UART: [fht] FMC Alias Private Key: 7
20,868,092 UART: [art] Derive CDI
20,868,832 UART: [art] Store in in slot 0x4
20,926,718 UART: [art] Derive Key Pair
20,927,762 UART: [art] Store priv key in slot 0x5
23,391,014 UART: [art] Derive Key Pair - Done
23,404,288 UART: [art] Signing Cert with AUTHO
23,405,599 UART: RITY.KEYID = 7
25,116,050 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,691 UART: [art] PUB.X = 7069BF9CA583314455CBA276A9760CA390C8F4CD6F3945CCF352705E704607FC9C459940F7C0DF4B6AEED7C0006D503C
25,124,835 UART: [art] PUB.Y = 6BC88C5D53AA63A3448862E47F50F37F4C031F9302A6725B249FF9C65B1532A6B1E950DCF3680AD06F9956332A27D492
25,132,048 UART: [art] SIG.R = 45BA008249005193FEF2EC6FAFAD5BE014B59D946D7CC829D182E44C2E0E69E94ADBC416A4045367185B21D7F18B9E7C
25,139,391 UART: [art] SIG.S = F4E10F2473BDA0871AD902004CBF862F43106654C1C910FD91420DECBD906560C3DF545491403DE5C2DC7D91C6E2AC03
26,118,220 UART: Caliptra RT
26,118,911 UART: [state] CFI Enabled
26,284,634 UART: [rt] RT listening for mailbox commands...
26,315,794 UART: [rt]cmd =0x47544744, len=8
26,317,747 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,757,014 ready_for_fw is high
3,757,613 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,453 >>> mbox cmd response: success
14,966,097 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,223,904 UART:
19,224,287 UART: Running Caliptra FMC ...
19,225,466 UART:
19,225,621 UART: [state] CFI Enabled
19,233,457 UART: [fht] FMC Alias Private Key: 7
20,989,957 UART: [art] Extend RT PCRs Done
20,991,171 UART: [art] Lock RT PCRs Done
20,992,656 UART: [art] Populate DV Done
20,998,008 UART: [fht] FMC Alias Private Key: 7
20,999,560 UART: [art] Derive CDI
21,000,289 UART: [art] Store in in slot 0x4
21,042,996 UART: [art] Derive Key Pair
21,044,039 UART: [art] Store priv key in slot 0x5
23,470,419 UART: [art] Derive Key Pair - Done
23,483,430 UART: [art] Signing Cert with AUTHO
23,484,732 UART: RITY.KEYID = 7
25,190,168 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,672 UART: [art] PUB.X = 22E73339DB9ADE6AD4AAFC9A72EB238BA643151F6179F61F673F3B80FE42C4163B5BD09402465DB2CC08549CD059A268
25,198,913 UART: [art] PUB.Y = A711E6B7BD8D7614BB2D613FDB646A4AF872F895BE67E28EE87F574888331CE8730B6EFD314172CCB05504A6A2FCA67C
25,206,210 UART: [art] SIG.R = 4BFC2876EB5495ABA5282DF6D2AE18EE00F980624E71D3AD1CE9BB8C4A9518DA8F14B56B9AB647ADBB012BB67F0EFD02
25,213,591 UART: [art] SIG.S = B9D16486C7122E3B1D0B8394F64A4AE915954B52B99C05E0805B06447015D6666EC225B4E869F02E8F45011E1EC7FB59
26,192,448 UART: Caliptra RT
26,193,155 UART: [state] CFI Enabled
26,309,796 UART: [rt] RT listening for mailbox commands...
26,341,158 UART: [rt]cmd =0x47544744, len=8
26,343,252 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,753 UART: [kat] SHA2-256
881,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,799 UART: [kat] ++
885,951 UART: [kat] sha1
890,101 UART: [kat] SHA2-256
892,039 UART: [kat] SHA2-384
894,886 UART: [kat] SHA2-512-ACC
896,787 UART: [kat] ECC-384
902,554 UART: [kat] HMAC-384Kdf
907,124 UART: [kat] LMS
1,475,320 UART: [kat] --
1,476,389 UART: [cold-reset] ++
1,476,915 UART: [fht] Storing FHT @ 0x50003400
1,479,646 UART: [idev] ++
1,479,814 UART: [idev] CDI.KEYID = 6
1,480,174 UART: [idev] SUBJECT.KEYID = 7
1,480,598 UART: [idev] UDS.KEYID = 0
1,480,943 ready_for_fw is high
1,480,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,726 UART: [idev] Erasing UDS.KEYID = 0
1,505,424 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,016 UART: [idev] --
1,515,027 UART: [ldev] ++
1,515,195 UART: [ldev] CDI.KEYID = 6
1,515,558 UART: [ldev] SUBJECT.KEYID = 5
1,515,984 UART: [ldev] AUTHORITY.KEYID = 7
1,516,447 UART: [ldev] FE.KEYID = 1
1,522,047 UART: [ldev] Erasing FE.KEYID = 1
1,547,714 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,582 UART: [ldev] --
1,586,893 UART: [fwproc] Waiting for Commands...
1,587,728 UART: [fwproc] Received command 0x46574c44
1,588,519 UART: [fwproc] Received Image of size 114448 bytes
2,889,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,220 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,572 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,623 >>> mbox cmd response: success
3,080,623 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,081,639 UART: [afmc] ++
3,081,807 UART: [afmc] CDI.KEYID = 6
3,082,169 UART: [afmc] SUBJECT.KEYID = 7
3,082,594 UART: [afmc] AUTHORITY.KEYID = 5
3,117,773 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,923 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,316 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,006 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,009 UART: [afmc] --
3,160,947 UART: [cold-reset] --
3,161,821 UART: [state] Locking Datavault
3,163,150 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,754 UART: [state] Locking ICCM
3,164,258 UART: [exit] Launching FMC @ 0x40000130
3,169,587 UART:
3,169,603 UART: Running Caliptra FMC ...
3,170,011 UART:
3,170,065 UART: [state] CFI Enabled
3,180,356 UART: [fht] FMC Alias Private Key: 7
3,288,009 UART: [art] Extend RT PCRs Done
3,288,437 UART: [art] Lock RT PCRs Done
3,289,991 UART: [art] Populate DV Done
3,298,118 UART: [fht] FMC Alias Private Key: 7
3,299,068 UART: [art] Derive CDI
3,299,348 UART: [art] Store in in slot 0x4
3,384,773 UART: [art] Derive Key Pair
3,385,133 UART: [art] Store priv key in slot 0x5
3,398,165 UART: [art] Derive Key Pair - Done
3,412,955 UART: [art] Signing Cert with AUTHO
3,413,435 UART: RITY.KEYID = 7
3,428,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,876 UART: [art] PUB.X = 6C19737C8CC4ECDF96AEFB20877EDAE6C81D03B62A039ED05FBC13D6F2E00EB796335F79D159C04E821E6001A6046253
3,435,641 UART: [art] PUB.Y = BB6B578628465884CA6E34AB9077809BBDF0FEF2E6CB2B13A83CB15B3304E297A429539EF1CF20602862FEB0CF560197
3,442,591 UART: [art] SIG.R = 385E4B3053D7B572FC89CBD2B9A36FF319CB964CA98BF81C66EBBBC0F8650F9A1FEE3CC32F52181D69AE2C73B4E1DEB4
3,449,382 UART: [art] SIG.S = 2B251CB098C82E003E6EAFD18898206DA192251611999987C87C8C58674E3BF3CC7513C76728217E1863E789E7C5942E
3,473,117 UART: Caliptra RT
3,473,370 UART: [state] CFI Enabled
3,582,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,870 UART: [rt]cmd =0x47544744, len=8
3,614,420 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,973 ready_for_fw is high
1,362,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,655 >>> mbox cmd response: success
2,929,655 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,990,705 UART:
2,990,721 UART: Running Caliptra FMC ...
2,991,129 UART:
2,991,183 UART: [state] CFI Enabled
3,001,378 UART: [fht] FMC Alias Private Key: 7
3,108,991 UART: [art] Extend RT PCRs Done
3,109,419 UART: [art] Lock RT PCRs Done
3,111,265 UART: [art] Populate DV Done
3,119,378 UART: [fht] FMC Alias Private Key: 7
3,120,366 UART: [art] Derive CDI
3,120,646 UART: [art] Store in in slot 0x4
3,206,135 UART: [art] Derive Key Pair
3,206,495 UART: [art] Store priv key in slot 0x5
3,219,181 UART: [art] Derive Key Pair - Done
3,233,725 UART: [art] Signing Cert with AUTHO
3,234,205 UART: RITY.KEYID = 7
3,249,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,208 UART: [art] PUB.X = 850D5415DE79EF018854EAFC64E7148BB02879507FE26A4D24C9C5CAEEE8CCAA33B58DF13235183357EC5218C9E1DA49
3,256,982 UART: [art] PUB.Y = DB86A4AFAFC1712F135DD3D3777129F89BA9A1761FF7C5526FDB1D95078016202EE47ED296C44B3AA2A28E4A2DF0438B
3,263,941 UART: [art] SIG.R = 6A99D1D7ACC56C7731B7EE1293CA26C37A554A37A52C2526EBB6928AAC0873196FA9F13FF28EB69742111A6E4AB02174
3,270,714 UART: [art] SIG.S = 8F035528F1695E6CB3614435B44FBCFF970FF5F77F6A70F1A2F1CC6EF9CE6F494267B4F6C37EC3D6DF1875AB7AD5D174
3,294,299 UART: Caliptra RT
3,294,552 UART: [state] CFI Enabled
3,402,325 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,733 UART: [rt]cmd =0x47544744, len=8
3,434,541 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,716 UART: [state] DebugLocked = No
86,242 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,728 UART: [kat] SHA2-256
881,659 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,774 UART: [kat] ++
885,926 UART: [kat] sha1
890,232 UART: [kat] SHA2-256
892,170 UART: [kat] SHA2-384
894,771 UART: [kat] SHA2-512-ACC
896,672 UART: [kat] ECC-384
902,131 UART: [kat] HMAC-384Kdf
906,721 UART: [kat] LMS
1,474,917 UART: [kat] --
1,475,884 UART: [cold-reset] ++
1,476,398 UART: [fht] Storing FHT @ 0x50003400
1,479,215 UART: [idev] ++
1,479,383 UART: [idev] CDI.KEYID = 6
1,479,743 UART: [idev] SUBJECT.KEYID = 7
1,480,167 UART: [idev] UDS.KEYID = 0
1,480,512 ready_for_fw is high
1,480,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,221 UART: [idev] Erasing UDS.KEYID = 0
1,505,111 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,703 UART: [idev] --
1,514,874 UART: [ldev] ++
1,515,042 UART: [ldev] CDI.KEYID = 6
1,515,405 UART: [ldev] SUBJECT.KEYID = 5
1,515,831 UART: [ldev] AUTHORITY.KEYID = 7
1,516,294 UART: [ldev] FE.KEYID = 1
1,521,594 UART: [ldev] Erasing FE.KEYID = 1
1,547,415 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,361 UART: [ldev] --
1,586,660 UART: [fwproc] Waiting for Commands...
1,587,415 UART: [fwproc] Received command 0x46574c44
1,588,206 UART: [fwproc] Received Image of size 114448 bytes
2,887,537 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,993 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,345 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,416 >>> mbox cmd response: success
3,079,416 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,080,606 UART: [afmc] ++
3,080,774 UART: [afmc] CDI.KEYID = 6
3,081,136 UART: [afmc] SUBJECT.KEYID = 7
3,081,561 UART: [afmc] AUTHORITY.KEYID = 5
3,116,674 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,056 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,836 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,564 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,449 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,139 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,950 UART: [afmc] --
3,159,984 UART: [cold-reset] --
3,160,784 UART: [state] Locking Datavault
3,161,983 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,587 UART: [state] Locking ICCM
3,163,121 UART: [exit] Launching FMC @ 0x40000130
3,168,450 UART:
3,168,466 UART: Running Caliptra FMC ...
3,168,874 UART:
3,169,017 UART: [state] CFI Enabled
3,179,692 UART: [fht] FMC Alias Private Key: 7
3,288,041 UART: [art] Extend RT PCRs Done
3,288,469 UART: [art] Lock RT PCRs Done
3,290,311 UART: [art] Populate DV Done
3,298,634 UART: [fht] FMC Alias Private Key: 7
3,299,582 UART: [art] Derive CDI
3,299,862 UART: [art] Store in in slot 0x4
3,385,445 UART: [art] Derive Key Pair
3,385,805 UART: [art] Store priv key in slot 0x5
3,398,829 UART: [art] Derive Key Pair - Done
3,413,504 UART: [art] Signing Cert with AUTHO
3,413,984 UART: RITY.KEYID = 7
3,429,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,227 UART: [art] PUB.X = 466DCCED2B35176AB7CCAA2C60E4313C08EBDA179400496B0C62DCDA68C47F9C9135E487BD17F059966A22592199F23A
3,436,977 UART: [art] PUB.Y = AD21E1C0A5499992447B946B846D1DF11C734462EB6A81AEDBB5DB801D7EDFC6D514D67208FDC47BEBA57C61E27AF919
3,443,940 UART: [art] SIG.R = 43D062CEF152C50AFD974B9F790707B0058BE086248341ED3BC7B5F0B3513AA90C61B706F005C823C9D9D7EEEEEFDE9F
3,450,703 UART: [art] SIG.S = 32A0E4C3B6DC4873798E8D5D1CB57FA7540FA965F26689E78EBA8F3BA3E627B27566BE29499BF4388F78B9DA39656870
3,474,201 UART: Caliptra RT
3,474,546 UART: [state] CFI Enabled
3,583,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,662 UART: [rt]cmd =0x47544744, len=8
3,615,082 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,620 ready_for_fw is high
1,362,620 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,942 >>> mbox cmd response: success
2,930,942 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,992,450 UART:
2,992,466 UART: Running Caliptra FMC ...
2,992,874 UART:
2,993,017 UART: [state] CFI Enabled
3,003,910 UART: [fht] FMC Alias Private Key: 7
3,111,329 UART: [art] Extend RT PCRs Done
3,111,757 UART: [art] Lock RT PCRs Done
3,113,397 UART: [art] Populate DV Done
3,121,722 UART: [fht] FMC Alias Private Key: 7
3,122,662 UART: [art] Derive CDI
3,122,942 UART: [art] Store in in slot 0x4
3,208,885 UART: [art] Derive Key Pair
3,209,245 UART: [art] Store priv key in slot 0x5
3,222,745 UART: [art] Derive Key Pair - Done
3,237,891 UART: [art] Signing Cert with AUTHO
3,238,371 UART: RITY.KEYID = 7
3,253,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,374 UART: [art] PUB.X = F5C9DB1B793F447D47B8E71C3039BD37D155D1213E4DCF404B0255D7D88EF157332E8CD582D8E3E5BC0C14BADEDE7FB5
3,261,156 UART: [art] PUB.Y = 4CC76963FDB186CFD15FD4D8125F4CBCCCA7C856705CAF0C42963D9CF418D25DC19926AE282BFA4523005EC3E225761B
3,268,095 UART: [art] SIG.R = CD8FEABA7DC35E56E6C7FBA82E023189A7379A9D5B7395D06CCEE5B921B9CEED69EA0336277BC6F4835A80202719691D
3,274,873 UART: [art] SIG.S = A5010E0B116E1905F94A0CA1F688827EC629F304B01FEBC0479294B46B7A7691B39F4CF733B3FB45A42106E268745812
3,298,477 UART: Caliptra RT
3,298,822 UART: [state] CFI Enabled
3,408,188 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,856 UART: [rt]cmd =0x47544744, len=8
3,440,318 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
893,106 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,231 UART: [kat] ++
897,383 UART: [kat] sha1
901,689 UART: [kat] SHA2-256
903,629 UART: [kat] SHA2-384
906,180 UART: [kat] SHA2-512-ACC
908,081 UART: [kat] ECC-384
917,788 UART: [kat] HMAC-384Kdf
922,420 UART: [kat] LMS
1,170,748 UART: [kat] --
1,171,637 UART: [cold-reset] ++
1,172,135 UART: [fht] FHT @ 0x50003400
1,174,738 UART: [idev] ++
1,174,906 UART: [idev] CDI.KEYID = 6
1,175,266 UART: [idev] SUBJECT.KEYID = 7
1,175,690 UART: [idev] UDS.KEYID = 0
1,176,035 ready_for_fw is high
1,176,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,782 UART: [idev] Erasing UDS.KEYID = 0
1,200,449 UART: [idev] Sha1 KeyId Algorithm
1,208,847 UART: [idev] --
1,209,939 UART: [ldev] ++
1,210,107 UART: [ldev] CDI.KEYID = 6
1,210,470 UART: [ldev] SUBJECT.KEYID = 5
1,210,896 UART: [ldev] AUTHORITY.KEYID = 7
1,211,359 UART: [ldev] FE.KEYID = 1
1,216,313 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,282,218 UART: [fwproc] Wait for Commands...
1,283,030 UART: [fwproc] Recv command 0x46574c44
1,283,758 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,191 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,524 >>> mbox cmd response: success
2,774,524 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,775,644 UART: [afmc] ++
2,775,812 UART: [afmc] CDI.KEYID = 6
2,776,174 UART: [afmc] SUBJECT.KEYID = 7
2,776,599 UART: [afmc] AUTHORITY.KEYID = 5
2,811,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,709 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,437 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,322 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,041 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,723 UART: [afmc] --
2,854,849 UART: [cold-reset] --
2,855,975 UART: [state] Locking Datavault
2,857,178 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,782 UART: [state] Locking ICCM
2,858,284 UART: [exit] Launching FMC @ 0x40000130
2,863,613 UART:
2,863,629 UART: Running Caliptra FMC ...
2,864,037 UART:
2,864,091 UART: [state] CFI Enabled
2,874,826 UART: [fht] FMC Alias Private Key: 7
2,983,161 UART: [art] Extend RT PCRs Done
2,983,589 UART: [art] Lock RT PCRs Done
2,984,971 UART: [art] Populate DV Done
2,993,282 UART: [fht] FMC Alias Private Key: 7
2,994,316 UART: [art] Derive CDI
2,994,596 UART: [art] Store in in slot 0x4
3,080,493 UART: [art] Derive Key Pair
3,080,853 UART: [art] Store priv key in slot 0x5
3,094,043 UART: [art] Derive Key Pair - Done
3,108,426 UART: [art] Signing Cert with AUTHO
3,108,906 UART: RITY.KEYID = 7
3,124,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,907 UART: [art] PUB.X = E173D5E28CF2D5390D9E92394D92CC815C2FC21C3D93B160F5CA1584D9F563136653A08329A0A4DFF8C07992727721B9
3,131,672 UART: [art] PUB.Y = 2B2DB9881F703AA45CA7C78767A786A40B0B08CF411680B37F1A0F25C2AD0D2F1AA28A26BEB4384156DE1793454A7CCE
3,138,617 UART: [art] SIG.R = 6EC290DCDC41C177A00C261511630C4947F007DF4602CA4D9CF1B653C957A38F03BA425A1D4C344E61994B0B9043E162
3,145,369 UART: [art] SIG.S = CCE3E89DCFA4436874A9D980F31D23CCA4EABB7B4AC2C4FCF53F7FFD6039E1B0AED8624FDEC3BAAA8DCD44C768F4A955
3,169,506 UART: Caliptra RT
3,169,759 UART: [state] CFI Enabled
3,276,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,066 UART: [rt]cmd =0x47544744, len=8
3,308,688 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,237 ready_for_fw is high
1,060,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,487 >>> mbox cmd response: success
2,628,487 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,690,143 UART:
2,690,159 UART: Running Caliptra FMC ...
2,690,567 UART:
2,690,621 UART: [state] CFI Enabled
2,701,146 UART: [fht] FMC Alias Private Key: 7
2,810,267 UART: [art] Extend RT PCRs Done
2,810,695 UART: [art] Lock RT PCRs Done
2,812,341 UART: [art] Populate DV Done
2,820,550 UART: [fht] FMC Alias Private Key: 7
2,821,546 UART: [art] Derive CDI
2,821,826 UART: [art] Store in in slot 0x4
2,907,461 UART: [art] Derive Key Pair
2,907,821 UART: [art] Store priv key in slot 0x5
2,920,855 UART: [art] Derive Key Pair - Done
2,935,563 UART: [art] Signing Cert with AUTHO
2,936,043 UART: RITY.KEYID = 7
2,951,355 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,120 UART: [art] PUB.X = 81E29CC6A890DCFAE179ECD3E81AD98CE9A8363EF19D854AA6607541310E49D86477F4507323C4F26CFC5653CAD142AE
2,958,897 UART: [art] PUB.Y = 93560D0A0FC86CCEBF4FEA131C722EF100CC97048BABB16A8160072BCBB0A5C25F79ABE678137105238A6C33BEBE3635
2,965,821 UART: [art] SIG.R = 9B88CFF22B8A740ABCF874978EC282628F79840C7F2A5C378B57D23CE3A71DCCAA7834D6729A7EC7C2037D3ABB5478F5
2,972,594 UART: [art] SIG.S = 834494576045BA9CE491BB423EDFD745883AB02C0D551453301D2EBD98807809A0DB50EF96781C78B56F9574FB5054AE
2,996,319 UART: Caliptra RT
2,996,572 UART: [state] CFI Enabled
3,104,348 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,076 UART: [rt]cmd =0x47544744, len=8
3,136,460 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,146 UART: [kat] SHA2-256
904,086 UART: [kat] SHA2-384
906,877 UART: [kat] SHA2-512-ACC
908,778 UART: [kat] ECC-384
918,881 UART: [kat] HMAC-384Kdf
923,487 UART: [kat] LMS
1,171,815 UART: [kat] --
1,172,660 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,747 UART: [idev] ++
1,175,915 UART: [idev] CDI.KEYID = 6
1,176,275 UART: [idev] SUBJECT.KEYID = 7
1,176,699 UART: [idev] UDS.KEYID = 0
1,177,044 ready_for_fw is high
1,177,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,653 UART: [idev] Erasing UDS.KEYID = 0
1,201,592 UART: [idev] Sha1 KeyId Algorithm
1,210,048 UART: [idev] --
1,210,902 UART: [ldev] ++
1,211,070 UART: [ldev] CDI.KEYID = 6
1,211,433 UART: [ldev] SUBJECT.KEYID = 5
1,211,859 UART: [ldev] AUTHORITY.KEYID = 7
1,212,322 UART: [ldev] FE.KEYID = 1
1,217,720 UART: [ldev] Erasing FE.KEYID = 1
1,244,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,702 UART: [ldev] --
1,283,069 UART: [fwproc] Wait for Commands...
1,283,851 UART: [fwproc] Recv command 0x46574c44
1,284,579 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,212 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,623 >>> mbox cmd response: success
2,775,623 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,776,641 UART: [afmc] ++
2,776,809 UART: [afmc] CDI.KEYID = 6
2,777,171 UART: [afmc] SUBJECT.KEYID = 7
2,777,596 UART: [afmc] AUTHORITY.KEYID = 5
2,813,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,381 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,100 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,850 UART: [afmc] --
2,856,872 UART: [cold-reset] --
2,857,624 UART: [state] Locking Datavault
2,858,705 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,309 UART: [state] Locking ICCM
2,859,769 UART: [exit] Launching FMC @ 0x40000130
2,865,098 UART:
2,865,114 UART: Running Caliptra FMC ...
2,865,522 UART:
2,865,665 UART: [state] CFI Enabled
2,876,604 UART: [fht] FMC Alias Private Key: 7
2,983,769 UART: [art] Extend RT PCRs Done
2,984,197 UART: [art] Lock RT PCRs Done
2,985,975 UART: [art] Populate DV Done
2,994,240 UART: [fht] FMC Alias Private Key: 7
2,995,202 UART: [art] Derive CDI
2,995,482 UART: [art] Store in in slot 0x4
3,081,217 UART: [art] Derive Key Pair
3,081,577 UART: [art] Store priv key in slot 0x5
3,094,951 UART: [art] Derive Key Pair - Done
3,109,719 UART: [art] Signing Cert with AUTHO
3,110,199 UART: RITY.KEYID = 7
3,125,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,314 UART: [art] PUB.X = 8BE3FD0D271AF112E2536D41E990512F46470B4A5B67EA5EEA928E7671412EF14293A93BFB2D2E4F257C673B67079F49
3,133,077 UART: [art] PUB.Y = D2C299274BB5875BCA8A6FD9D8FA9D0F5DE582BE99353FA91CEB345A7B187B389B02FFDDD76B12087CBA1BEFEBB4CD61
3,140,046 UART: [art] SIG.R = 8150F8EB07FB5F3270BA0CD29AEADD3AC813A12EC3E7D7C43B9AB90535DAB4E10F32FC63803E554BCD585E40ADC21966
3,146,824 UART: [art] SIG.S = A04988C349A7CCE04EF8B4624FF66E26F6E7179C28CCFB23912839C8E5A82F535F99AD373EB66724A998EAF75F142FBF
3,170,459 UART: Caliptra RT
3,170,804 UART: [state] CFI Enabled
3,279,022 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,812 UART: [rt]cmd =0x47544744, len=8
3,311,600 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,456 ready_for_fw is high
1,060,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,082 >>> mbox cmd response: success
2,629,082 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,691,058 UART:
2,691,074 UART: Running Caliptra FMC ...
2,691,482 UART:
2,691,625 UART: [state] CFI Enabled
2,702,098 UART: [fht] FMC Alias Private Key: 7
2,809,939 UART: [art] Extend RT PCRs Done
2,810,367 UART: [art] Lock RT PCRs Done
2,812,119 UART: [art] Populate DV Done
2,820,334 UART: [fht] FMC Alias Private Key: 7
2,821,346 UART: [art] Derive CDI
2,821,626 UART: [art] Store in in slot 0x4
2,906,903 UART: [art] Derive Key Pair
2,907,263 UART: [art] Store priv key in slot 0x5
2,920,189 UART: [art] Derive Key Pair - Done
2,935,244 UART: [art] Signing Cert with AUTHO
2,935,724 UART: RITY.KEYID = 7
2,951,092 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,857 UART: [art] PUB.X = 5B4EF76E9B06F8703CF0DFB42A9BCF6D1B7AA25A2F572C299A3612D38DC43DD060AA5E0AF173A06DE5C8845AAE7F18FC
2,958,645 UART: [art] PUB.Y = B86088ADAF27C4FE6CA6F2C1E2A6D06016DF577ABBDDE5CD22D7F9F987BD3E1DD14FD29C5ED1576E8D103DDC953A68C9
2,965,623 UART: [art] SIG.R = 262B6E18AB6CFF2545563ED80CE7C3C92BD2738AE58D8B44367FAAF5348FB347977C1C0E19AB74E13B2F6AC7300037E7
2,972,375 UART: [art] SIG.S = E563FB50E7C8BEA498DE28F201C950DB65E88F68FCC44D12081439E00E6568D7550568050D670A000FC524AD303D6B4F
2,996,232 UART: Caliptra RT
2,996,577 UART: [state] CFI Enabled
3,103,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,354 UART: [rt]cmd =0x47544744, len=8
3,135,856 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
900,059 UART: [kat] SHA2-256
901,999 UART: [kat] SHA2-384
904,968 UART: [kat] SHA2-512-ACC
906,869 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,254 UART: [kat] LMS
1,169,566 UART: [kat] --
1,170,363 UART: [cold-reset] ++
1,170,877 UART: [fht] FHT @ 0x50003400
1,173,583 UART: [idev] ++
1,173,751 UART: [idev] CDI.KEYID = 6
1,174,112 UART: [idev] SUBJECT.KEYID = 7
1,174,537 UART: [idev] UDS.KEYID = 0
1,174,883 ready_for_fw is high
1,174,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,647 UART: [idev] Erasing UDS.KEYID = 0
1,199,387 UART: [idev] Sha1 KeyId Algorithm
1,208,223 UART: [idev] --
1,209,220 UART: [ldev] ++
1,209,388 UART: [ldev] CDI.KEYID = 6
1,209,752 UART: [ldev] SUBJECT.KEYID = 5
1,210,179 UART: [ldev] AUTHORITY.KEYID = 7
1,210,642 UART: [ldev] FE.KEYID = 1
1,215,520 UART: [ldev] Erasing FE.KEYID = 1
1,242,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,632 UART: [ldev] --
1,280,918 UART: [fwproc] Wait for Commands...
1,281,507 UART: [fwproc] Recv command 0x46574c44
1,282,240 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,525 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,826 >>> mbox cmd response: success
2,773,826 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,775,031 UART: [afmc] ++
2,775,199 UART: [afmc] CDI.KEYID = 6
2,775,562 UART: [afmc] SUBJECT.KEYID = 7
2,775,988 UART: [afmc] AUTHORITY.KEYID = 5
2,811,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,256 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,975 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,662 UART: [afmc] --
2,855,780 UART: [cold-reset] --
2,856,716 UART: [state] Locking Datavault
2,857,643 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,247 UART: [state] Locking ICCM
2,858,785 UART: [exit] Launching FMC @ 0x40000130
2,864,114 UART:
2,864,130 UART: Running Caliptra FMC ...
2,864,538 UART:
2,864,592 UART: [state] CFI Enabled
2,875,191 UART: [fht] FMC Alias Private Key: 7
2,983,052 UART: [art] Extend RT PCRs Done
2,983,480 UART: [art] Lock RT PCRs Done
2,984,980 UART: [art] Populate DV Done
2,993,203 UART: [fht] FMC Alias Private Key: 7
2,994,239 UART: [art] Derive CDI
2,994,519 UART: [art] Store in in slot 0x4
3,080,272 UART: [art] Derive Key Pair
3,080,632 UART: [art] Store priv key in slot 0x5
3,094,218 UART: [art] Derive Key Pair - Done
3,108,922 UART: [art] Signing Cert with AUTHO
3,109,402 UART: RITY.KEYID = 7
3,124,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,631 UART: [art] PUB.X = 2B5B8566D6E068AF627589E94F57E90A04BDBF2C465642E6070679BAAE5B4AF3A8498F25D6B771D3216943F41B294872
3,132,387 UART: [art] PUB.Y = 8BE5AEC743F4905EAE9C58027E020F2E739AB733FA97714406E9A6356F0803EF0DA889FCC45341FC27DCF8507CC4F409
3,139,321 UART: [art] SIG.R = 0553AB2C00FE68225C79653FCEDE1B1F5F04EFAFA53861A02D43F5E449E04FA9728F102A0C070ADB8076289EC21CD655
3,146,064 UART: [art] SIG.S = 33A592F1FB0EE2679D5E05C93E4880276801A5D17EADC3C8D29FC37FCCF245383AAF1A9B17E0BBC96834D2C7F087ABEC
3,169,520 UART: Caliptra RT
3,169,773 UART: [state] CFI Enabled
3,277,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,962 UART: [rt]cmd =0x47544744, len=8
3,309,122 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,798 ready_for_fw is high
1,055,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,120 >>> mbox cmd response: success
2,623,120 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,685,294 UART:
2,685,310 UART: Running Caliptra FMC ...
2,685,718 UART:
2,685,772 UART: [state] CFI Enabled
2,696,413 UART: [fht] FMC Alias Private Key: 7
2,804,578 UART: [art] Extend RT PCRs Done
2,805,006 UART: [art] Lock RT PCRs Done
2,806,600 UART: [art] Populate DV Done
2,815,159 UART: [fht] FMC Alias Private Key: 7
2,816,253 UART: [art] Derive CDI
2,816,533 UART: [art] Store in in slot 0x4
2,902,152 UART: [art] Derive Key Pair
2,902,512 UART: [art] Store priv key in slot 0x5
2,915,898 UART: [art] Derive Key Pair - Done
2,930,874 UART: [art] Signing Cert with AUTHO
2,931,354 UART: RITY.KEYID = 7
2,946,346 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,111 UART: [art] PUB.X = 1DF4EE9C14E2C0FF73B442CF81EFC11923EBB7B77FB2C4D135DA745C6B701C6363E9F0824313EB219022DA5A5B32DC14
2,953,895 UART: [art] PUB.Y = 7A2456B9F8FE235B97A7ECA48B400390EB94752585F4C0593E626912508FF83CAA1D83D8F3C50CD684E0CABE5EC285BE
2,960,849 UART: [art] SIG.R = 2062C68DF6C15E283C01D3EC12D3C3C553B77AFE7966637F56C037C66F1644A0FD936A7BCD1ECE5E8A93F4583297AB21
2,967,624 UART: [art] SIG.S = 804DF4C68DCC2576EF2D17E9E377264FF84382EB2A589077E8DF710019CAFCC1DC7E86071B6B708F1A72AFC34CDA5F75
2,991,598 UART: Caliptra RT
2,991,851 UART: [state] CFI Enabled
3,099,372 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,028 UART: [rt]cmd =0x47544744, len=8
3,131,414 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,268 UART: [kat] SHA2-256
902,208 UART: [kat] SHA2-384
905,037 UART: [kat] SHA2-512-ACC
906,938 UART: [kat] ECC-384
916,691 UART: [kat] HMAC-384Kdf
921,359 UART: [kat] LMS
1,169,671 UART: [kat] --
1,170,602 UART: [cold-reset] ++
1,170,968 UART: [fht] FHT @ 0x50003400
1,173,732 UART: [idev] ++
1,173,900 UART: [idev] CDI.KEYID = 6
1,174,261 UART: [idev] SUBJECT.KEYID = 7
1,174,686 UART: [idev] UDS.KEYID = 0
1,175,032 ready_for_fw is high
1,175,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,940 UART: [idev] Erasing UDS.KEYID = 0
1,200,474 UART: [idev] Sha1 KeyId Algorithm
1,209,380 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,909 UART: [ldev] SUBJECT.KEYID = 5
1,211,336 UART: [ldev] AUTHORITY.KEYID = 7
1,211,799 UART: [ldev] FE.KEYID = 1
1,217,123 UART: [ldev] Erasing FE.KEYID = 1
1,243,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,759 UART: [ldev] --
1,283,259 UART: [fwproc] Wait for Commands...
1,284,036 UART: [fwproc] Recv command 0x46574c44
1,284,769 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,869 >>> mbox cmd response: success
2,776,869 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,777,888 UART: [afmc] ++
2,778,056 UART: [afmc] CDI.KEYID = 6
2,778,419 UART: [afmc] SUBJECT.KEYID = 7
2,778,845 UART: [afmc] AUTHORITY.KEYID = 5
2,814,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,729 UART: [afmc] --
2,857,705 UART: [cold-reset] --
2,858,607 UART: [state] Locking Datavault
2,859,818 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,422 UART: [state] Locking ICCM
2,860,942 UART: [exit] Launching FMC @ 0x40000130
2,866,271 UART:
2,866,287 UART: Running Caliptra FMC ...
2,866,695 UART:
2,866,838 UART: [state] CFI Enabled
2,877,295 UART: [fht] FMC Alias Private Key: 7
2,985,602 UART: [art] Extend RT PCRs Done
2,986,030 UART: [art] Lock RT PCRs Done
2,987,382 UART: [art] Populate DV Done
2,995,805 UART: [fht] FMC Alias Private Key: 7
2,996,745 UART: [art] Derive CDI
2,997,025 UART: [art] Store in in slot 0x4
3,082,976 UART: [art] Derive Key Pair
3,083,336 UART: [art] Store priv key in slot 0x5
3,096,774 UART: [art] Derive Key Pair - Done
3,111,523 UART: [art] Signing Cert with AUTHO
3,112,003 UART: RITY.KEYID = 7
3,127,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,848 UART: [art] PUB.X = 237F497487B950BB3DED0F37BD8B48655F81F7DBE1984861C9C9C3678BD1E772301EBFC1944E32C7AFE60EB1A826339D
3,134,620 UART: [art] PUB.Y = 4D841784BCCB7EAA7702B344F55692D4D5E1ED662F9D588F4FCA78286938819B6E12E5C4A86D2B2758417B0332676C9D
3,141,564 UART: [art] SIG.R = 12DDDD242A29C997503D6C9BEBEE8C218EB3B9D763F3668C333B3BEADC84E56AB77D492F0FD07D3CAF22F8C1810BCA3A
3,148,352 UART: [art] SIG.S = C01DFF61E64300163239BAA8E0C3CA5BEB4B816A1243F05127F5C40CFDE41D7207906B68901983BE61CC018B86F6BCCA
3,172,158 UART: Caliptra RT
3,172,503 UART: [state] CFI Enabled
3,280,010 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,362 UART: [rt]cmd =0x47544744, len=8
3,311,820 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,787 ready_for_fw is high
1,055,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,881 >>> mbox cmd response: success
2,625,881 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,688,277 UART:
2,688,293 UART: Running Caliptra FMC ...
2,688,701 UART:
2,688,844 UART: [state] CFI Enabled
2,699,549 UART: [fht] FMC Alias Private Key: 7
2,806,832 UART: [art] Extend RT PCRs Done
2,807,260 UART: [art] Lock RT PCRs Done
2,808,736 UART: [art] Populate DV Done
2,817,055 UART: [fht] FMC Alias Private Key: 7
2,818,085 UART: [art] Derive CDI
2,818,365 UART: [art] Store in in slot 0x4
2,904,544 UART: [art] Derive Key Pair
2,904,904 UART: [art] Store priv key in slot 0x5
2,918,098 UART: [art] Derive Key Pair - Done
2,932,778 UART: [art] Signing Cert with AUTHO
2,933,258 UART: RITY.KEYID = 7
2,948,270 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,035 UART: [art] PUB.X = B33B66007B79A5326D4FAF31378CD06FE933747D65961513A883EC478CF661759849A7EDDB25E5D9D5645D373DCABB07
2,955,782 UART: [art] PUB.Y = 35DC0A085821C417A5E76774A56D2DEF769ECC8DE166FB4E77B4666D1024971FA154EFB36FA93909969E5112E3C62E4E
2,962,727 UART: [art] SIG.R = 076CAAA4F3A80382982226001FE81561166C3F573892E6EED323ECD22ADCE653FE17B0EF23F7B96DA7B0B3E70409C3F2
2,969,471 UART: [art] SIG.S = 1DF147CFB788267840D654D909442B6CE34665613A8468C2D8AC2DDE82CCA5C442D4F76FB6A702777473254C5B94845A
2,993,336 UART: Caliptra RT
2,993,681 UART: [state] CFI Enabled
3,102,460 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,012 UART: [rt]cmd =0x47544744, len=8
3,134,534 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,139 UART:
192,529 UART: Running Caliptra ROM ...
193,670 UART:
193,825 UART: [state] CFI Enabled
265,499 UART: [state] LifecycleState = Unprovisioned
267,496 UART: [state] DebugLocked = No
269,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,698 UART: [kat] SHA2-256
443,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,933 UART: [kat] ++
454,405 UART: [kat] sha1
466,224 UART: [kat] SHA2-256
468,876 UART: [kat] SHA2-384
476,073 UART: [kat] SHA2-512-ACC
478,380 UART: [kat] ECC-384
2,767,570 UART: [kat] HMAC-384Kdf
2,778,403 UART: [kat] LMS
3,968,681 UART: [kat] --
3,971,833 UART: [cold-reset] ++
3,973,557 UART: [fht] Storing FHT @ 0x50003400
3,985,172 UART: [idev] ++
3,985,736 UART: [idev] CDI.KEYID = 6
3,986,701 UART: [idev] SUBJECT.KEYID = 7
3,987,945 UART: [idev] UDS.KEYID = 0
3,988,969 ready_for_fw is high
3,989,187 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,833 UART: [idev] Erasing UDS.KEYID = 0
7,327,256 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,495 UART: [idev] --
7,352,684 UART: [ldev] ++
7,353,260 UART: [ldev] CDI.KEYID = 6
7,354,278 UART: [ldev] SUBJECT.KEYID = 5
7,355,434 UART: [ldev] AUTHORITY.KEYID = 7
7,356,665 UART: [ldev] FE.KEYID = 1
7,401,391 UART: [ldev] Erasing FE.KEYID = 1
10,731,425 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,117 UART: [ldev] --
13,094,743 UART: [fwproc] Waiting for Commands...
13,097,111 UART: [fwproc] Received command 0x46574c44
13,099,311 UART: [fwproc] Received Image of size 114124 bytes
17,153,065 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,455 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,361 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,617,725 >>> mbox cmd response: success
17,618,291 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,621,497 UART: [afmc] ++
17,622,083 UART: [afmc] CDI.KEYID = 6
17,623,112 UART: [afmc] SUBJECT.KEYID = 7
17,624,276 UART: [afmc] AUTHORITY.KEYID = 5
20,978,340 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,489 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,799 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,187 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,981 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,449 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,619 UART: [afmc] --
23,356,058 UART: [cold-reset] --
23,358,366 UART: [state] Locking Datavault
23,363,457 UART: [state] Locking PCR0, PCR1 and PCR31
23,365,207 UART: [state] Locking ICCM
23,367,466 UART: [exit] Launching FMC @ 0x40000130
23,375,863 UART:
23,376,105 UART: Running Caliptra FMC ...
23,377,210 UART:
23,377,376 UART: [state] CFI Enabled
23,443,870 UART: [fht] FMC Alias Private Key: 7
25,781,901 UART: [art] Extend RT PCRs Done
25,783,134 UART: [art] Lock RT PCRs Done
25,784,951 UART: [art] Populate DV Done
25,790,253 UART: [fht] FMC Alias Private Key: 7
25,791,952 UART: [art] Derive CDI
25,792,710 UART: [art] Store in in slot 0x4
25,852,920 UART: [art] Derive Key Pair
25,853,962 UART: [art] Store priv key in slot 0x5
29,146,668 UART: [art] Derive Key Pair - Done
29,159,984 UART: [art] Signing Cert with AUTHO
29,161,316 UART: RITY.KEYID = 7
31,448,721 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,229 UART: [art] PUB.X = 1E21B969FD2102061DA5FE7CF8644192E678BFC4BAB6722CAD885D05E2241BE900F30D973FD13AE80CE388A927D57B22
31,457,470 UART: [art] PUB.Y = A7F4506F3F95E0A96BCE0EDD015F5051B76F6DD16E8705EFCDA193CC4F39B2C8DE582A76B3500651C5388D16CFF77CF0
31,464,760 UART: [art] SIG.R = 45486762D7DA34463147FD000371406726F17D3E5EC3384B28CA64DA703808B9DFEB776603AA6552CA830698A5707364
31,472,099 UART: [art] SIG.S = C0FD6D54271EF6F109C39E09D4AE0FEC4E1C88BC8D793CA4A9FFD4EE85644B026F45FAA83ECC8DC7290BE0237CB6B8B7
32,776,684 UART: Caliptra RT
32,777,385 UART: [state] CFI Enabled
32,940,003 UART: [rt] RT listening for mailbox commands...
32,971,479 UART: [rt]cmd =0x54514754, len=24
32,974,229 >>> mbox cmd response data (8 bytes)
32,974,702 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,004,448 UART: [rt]cmd =0x54514754, len=24
33,006,732 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,808,174 ready_for_fw is high
3,808,664 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,897,923 >>> mbox cmd response: success
17,898,900 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,587,105 UART:
23,587,628 UART: Running Caliptra FMC ...
23,588,850 UART:
23,589,055 UART: [state] CFI Enabled
23,657,008 UART: [fht] FMC Alias Private Key: 7
25,994,829 UART: [art] Extend RT PCRs Done
25,996,076 UART: [art] Lock RT PCRs Done
25,998,042 UART: [art] Populate DV Done
26,003,321 UART: [fht] FMC Alias Private Key: 7
26,004,817 UART: [art] Derive CDI
26,005,587 UART: [art] Store in in slot 0x4
26,065,095 UART: [art] Derive Key Pair
26,066,103 UART: [art] Store priv key in slot 0x5
29,358,995 UART: [art] Derive Key Pair - Done
29,372,159 UART: [art] Signing Cert with AUTHO
29,373,465 UART: RITY.KEYID = 7
31,659,559 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,081 UART: [art] PUB.X = C451937198D5FCBA6325D8CC1503A4D37AA4E78517C9A7ECC3D6F56D5BF63F736662C8FA85EAB2AA71FC4493B345285F
31,668,380 UART: [art] PUB.Y = 0BF15F8ABB737509AA66392155B2E92B0905BC3D76F9A51AC96F5A871BB66BDF210F43B286EBD52976AE746A0C706C2C
31,675,610 UART: [art] SIG.R = 5EA3BF50F53811067010E73FDB36F72C6A40BD9CAA8E9311C9FB2D3E6DC97647B27B9DCE442A0DFDC5EC96CE4B727226
31,682,978 UART: [art] SIG.S = 5203DA30F599850614A2C5C8FD03D2B1890DE8F4F26D4D1DF926F8C50DA143A013E653C2BFD576B6E5B06000D4B68AEC
32,988,130 UART: Caliptra RT
32,988,846 UART: [state] CFI Enabled
33,149,063 UART: [rt] RT listening for mailbox commands...
33,180,544 UART: [rt]cmd =0x54514754, len=24
33,183,407 >>> mbox cmd response data (8 bytes)
33,183,876 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,213,804 UART: [rt]cmd =0x54514754, len=24
33,216,296 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
192,627 UART:
192,987 UART: Running Caliptra ROM ...
194,179 UART:
603,635 UART: [state] CFI Enabled
621,214 UART: [state] LifecycleState = Unprovisioned
623,186 UART: [state] DebugLocked = No
625,147 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,879 UART: [kat] SHA2-256
799,664 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,197 UART: [kat] ++
810,723 UART: [kat] sha1
822,096 UART: [kat] SHA2-256
824,823 UART: [kat] SHA2-384
830,879 UART: [kat] SHA2-512-ACC
833,237 UART: [kat] ECC-384
3,117,273 UART: [kat] HMAC-384Kdf
3,128,652 UART: [kat] LMS
4,318,764 UART: [kat] --
4,321,901 UART: [cold-reset] ++
4,324,340 UART: [fht] Storing FHT @ 0x50003400
4,337,093 UART: [idev] ++
4,337,656 UART: [idev] CDI.KEYID = 6
4,338,632 UART: [idev] SUBJECT.KEYID = 7
4,339,873 UART: [idev] UDS.KEYID = 0
4,340,917 ready_for_fw is high
4,341,127 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,465 UART: [idev] Erasing UDS.KEYID = 0
7,625,568 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,364 UART: [idev] --
7,651,777 UART: [ldev] ++
7,652,337 UART: [ldev] CDI.KEYID = 6
7,653,294 UART: [ldev] SUBJECT.KEYID = 5
7,655,070 UART: [ldev] AUTHORITY.KEYID = 7
7,656,267 UART: [ldev] FE.KEYID = 1
7,667,161 UART: [ldev] Erasing FE.KEYID = 1
10,955,732 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,833 UART: [ldev] --
13,317,943 UART: [fwproc] Waiting for Commands...
13,320,633 UART: [fwproc] Received command 0x46574c44
13,322,807 UART: [fwproc] Received Image of size 114124 bytes
17,379,597 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,887 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,815 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,836,684 >>> mbox cmd response: success
17,837,214 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,840,671 UART: [afmc] ++
17,841,304 UART: [afmc] CDI.KEYID = 6
17,842,183 UART: [afmc] SUBJECT.KEYID = 7
17,843,442 UART: [afmc] AUTHORITY.KEYID = 5
21,155,903 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,616 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,989 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,840 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,346 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,017 UART: [afmc] --
23,522,718 UART: [cold-reset] --
23,526,894 UART: [state] Locking Datavault
23,532,782 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,529 UART: [state] Locking ICCM
23,536,323 UART: [exit] Launching FMC @ 0x40000130
23,544,704 UART:
23,544,933 UART: Running Caliptra FMC ...
23,545,954 UART:
23,546,094 UART: [state] CFI Enabled
23,554,782 UART: [fht] FMC Alias Private Key: 7
25,885,941 UART: [art] Extend RT PCRs Done
25,887,156 UART: [art] Lock RT PCRs Done
25,888,761 UART: [art] Populate DV Done
25,894,133 UART: [fht] FMC Alias Private Key: 7
25,895,704 UART: [art] Derive CDI
25,896,439 UART: [art] Store in in slot 0x4
25,939,193 UART: [art] Derive Key Pair
25,940,187 UART: [art] Store priv key in slot 0x5
29,182,273 UART: [art] Derive Key Pair - Done
29,194,998 UART: [art] Signing Cert with AUTHO
29,196,302 UART: RITY.KEYID = 7
31,475,762 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,269 UART: [art] PUB.X = 9F094490736E2064262D952C89570EC528DED15106593EACE28B8C8A108B43F47C1607FAFAE9475E83024812380C05F3
31,484,507 UART: [art] PUB.Y = 3B5925813561EA7C6EF851064A85F8D0916AD12150F499D0F2A53E781CC82AF67ADE6B07F7EA844AF9D8A1036DC543BB
31,491,727 UART: [art] SIG.R = 06FDBE9CB08C394AE4A8AB91A8489B7925D8856D66531935EF51AE5428C045C6EF31B6D7643EF9574FF8C2E621CB499F
31,499,156 UART: [art] SIG.S = A3AF348BFDC513EEA8CF132283A91296C04C5D38098BF7D4758220F6F74E95CA96AC2116EEF438A108F28E1D342C907A
32,804,899 UART: Caliptra RT
32,805,610 UART: [state] CFI Enabled
32,923,888 UART: [rt] RT listening for mailbox commands...
32,955,572 UART: [rt]cmd =0x54514754, len=24
32,958,184 >>> mbox cmd response data (8 bytes)
32,958,786 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,988,539 UART: [rt]cmd =0x54514754, len=24
32,991,154 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
4,127,059 ready_for_fw is high
4,127,690 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,075,373 >>> mbox cmd response: success
18,076,111 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,712,409 UART:
23,712,808 UART: Running Caliptra FMC ...
23,713,913 UART:
23,714,066 UART: [state] CFI Enabled
23,721,676 UART: [fht] FMC Alias Private Key: 7
26,052,390 UART: [art] Extend RT PCRs Done
26,053,616 UART: [art] Lock RT PCRs Done
26,055,378 UART: [art] Populate DV Done
26,060,849 UART: [fht] FMC Alias Private Key: 7
26,062,445 UART: [art] Derive CDI
26,063,261 UART: [art] Store in in slot 0x4
26,106,134 UART: [art] Derive Key Pair
26,107,169 UART: [art] Store priv key in slot 0x5
29,348,944 UART: [art] Derive Key Pair - Done
29,361,662 UART: [art] Signing Cert with AUTHO
29,362,976 UART: RITY.KEYID = 7
31,642,443 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,952 UART: [art] PUB.X = A5880CB95F91D4853B4EFD066A0BE2D164E2A8DF133DC809B395A3A4694AA6679D964D6B7B71D231C6D06AC1B51B1EDC
31,651,200 UART: [art] PUB.Y = FB863344051497F48C643FBD18C84D2201610FE133564CEE26DC6FC82A98F0AE59EA5CC51F851733201973540A9093F8
31,658,431 UART: [art] SIG.R = 487A875EE0998F4EAFF3198F23F408C52EFF4AD6AF8CEBBC70211D0D9F726061255577988713172098BB9BA66A6C3D69
31,665,847 UART: [art] SIG.S = 6E118EF7382811EB0E626AFEAEEB2BCD8400BFE002E5371BE33DED570A26F5E18B5483CFD50CF8F17947CC8D18EB7917
32,970,852 UART: Caliptra RT
32,971,576 UART: [state] CFI Enabled
33,089,401 UART: [rt] RT listening for mailbox commands...
33,120,867 UART: [rt]cmd =0x54514754, len=24
33,123,335 >>> mbox cmd response data (8 bytes)
33,123,836 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,153,640 UART: [rt]cmd =0x54514754, len=24
33,156,031 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,401 UART:
192,759 UART: Running Caliptra ROM ...
193,940 UART:
194,093 UART: [state] CFI Enabled
265,551 UART: [state] LifecycleState = Unprovisioned
267,447 UART: [state] DebugLocked = No
268,712 UART: [state] WD Timer not started. Device not locked for debugging
272,461 UART: [kat] SHA2-256
451,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,162 UART: [kat] ++
463,688 UART: [kat] sha1
474,941 UART: [kat] SHA2-256
477,928 UART: [kat] SHA2-384
484,007 UART: [kat] SHA2-512-ACC
486,958 UART: [kat] ECC-384
2,949,311 UART: [kat] HMAC-384Kdf
2,971,588 UART: [kat] LMS
3,501,033 UART: [kat] --
3,505,881 UART: [cold-reset] ++
3,507,171 UART: [fht] FHT @ 0x50003400
3,519,516 UART: [idev] ++
3,520,124 UART: [idev] CDI.KEYID = 6
3,521,061 UART: [idev] SUBJECT.KEYID = 7
3,522,176 UART: [idev] UDS.KEYID = 0
3,523,102 ready_for_fw is high
3,523,290 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,076 UART: [idev] Erasing UDS.KEYID = 0
6,030,707 UART: [idev] Sha1 KeyId Algorithm
6,052,397 UART: [idev] --
6,056,943 UART: [ldev] ++
6,057,523 UART: [ldev] CDI.KEYID = 6
6,058,435 UART: [ldev] SUBJECT.KEYID = 5
6,059,594 UART: [ldev] AUTHORITY.KEYID = 7
6,060,827 UART: [ldev] FE.KEYID = 1
6,101,240 UART: [ldev] Erasing FE.KEYID = 1
8,605,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,942 UART: [ldev] --
10,415,085 UART: [fwproc] Wait for Commands...
10,417,236 UART: [fwproc] Recv command 0x46574c44
10,419,280 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,286,253 >>> mbox cmd response: success
14,286,807 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,289,687 UART: [afmc] ++
14,290,302 UART: [afmc] CDI.KEYID = 6
14,291,214 UART: [afmc] SUBJECT.KEYID = 7
14,292,383 UART: [afmc] AUTHORITY.KEYID = 5
16,831,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,863 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,734 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,116 UART: [afmc] --
18,632,037 UART: [cold-reset] --
18,635,293 UART: [state] Locking Datavault
18,639,847 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,553 UART: [state] Locking ICCM
18,644,134 UART: [exit] Launching FMC @ 0x40000130
18,652,580 UART:
18,652,811 UART: Running Caliptra FMC ...
18,653,912 UART:
18,654,077 UART: [state] CFI Enabled
18,714,354 UART: [fht] FMC Alias Private Key: 7
20,478,589 UART: [art] Extend RT PCRs Done
20,479,810 UART: [art] Lock RT PCRs Done
20,481,461 UART: [art] Populate DV Done
20,486,606 UART: [fht] FMC Alias Private Key: 7
20,488,362 UART: [art] Derive CDI
20,489,176 UART: [art] Store in in slot 0x4
20,547,432 UART: [art] Derive Key Pair
20,548,431 UART: [art] Store priv key in slot 0x5
23,011,501 UART: [art] Derive Key Pair - Done
23,024,612 UART: [art] Signing Cert with AUTHO
23,025,920 UART: RITY.KEYID = 7
24,737,091 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,604 UART: [art] PUB.X = BEEAC1CE36A31566244F01DD825A10506EE2BA5D1F577C6CBB80AB22E7938A2E9715DEC493FBFA13AFF049D1645A0F00
24,745,865 UART: [art] PUB.Y = F2A08DB85F943424C49E9EFDF2508E484CF568A8703062B7ED8C4DED70A086F0DEA69E9849E67AAECB3087EEC9597528
24,753,160 UART: [art] SIG.R = B10366E3B50BA59B81B913B42E59000B6BB3C4EBA02794473B45D0556F2FA5F0CE91F1A73DB029DC6D1E47C851AEAD81
24,760,496 UART: [art] SIG.S = 2341ED281F16489F767AF3521BDC3AF2244C459DC27ACDE0131BAA1DA9731C93B81DBD741B7FA25EB9AB78EEB45F7A66
25,739,409 UART: Caliptra RT
25,740,120 UART: [state] CFI Enabled
25,903,856 UART: [rt] RT listening for mailbox commands...
25,935,271 UART: [rt]cmd =0x54514754, len=24
25,938,045 >>> mbox cmd response data (8 bytes)
25,938,600 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,968,462 UART: [rt]cmd =0x54514754, len=24
25,970,702 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,384,172 ready_for_fw is high
3,384,576 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,074,256 >>> mbox cmd response: success
14,075,177 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,371,475 UART:
18,371,864 UART: Running Caliptra FMC ...
18,373,065 UART:
18,373,234 UART: [state] CFI Enabled
18,436,062 UART: [fht] FMC Alias Private Key: 7
20,199,739 UART: [art] Extend RT PCRs Done
20,200,962 UART: [art] Lock RT PCRs Done
20,202,427 UART: [art] Populate DV Done
20,207,840 UART: [fht] FMC Alias Private Key: 7
20,209,378 UART: [art] Derive CDI
20,210,133 UART: [art] Store in in slot 0x4
20,268,664 UART: [art] Derive Key Pair
20,269,704 UART: [art] Store priv key in slot 0x5
22,732,910 UART: [art] Derive Key Pair - Done
22,745,692 UART: [art] Signing Cert with AUTHO
22,746,998 UART: RITY.KEYID = 7
24,458,901 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,449 UART: [art] PUB.X = 836C0853AF48A925788E640058E34FBAC470C4CF038EA41A82E7DC76688B25B122D848EE84ECF52C99472ADEF0205F7A
24,467,644 UART: [art] PUB.Y = CDDB3D91D70A4D05531B69C8D0571D06F785224141D76081ED015753B38ADFF3E879889B463DFC2DEA6CD68697B2A79B
24,474,888 UART: [art] SIG.R = 7F2DC8215090CC63B67B8FCD1D67CB5DDD7924A2F3BAEA6B7A32F2E8C6660CC2E9F6E3F0F99AA20489B612D0244E125D
24,482,344 UART: [art] SIG.S = 647119126D11929EB3EA11C577DC5D75939AF6052A7E9C73F1AE45417258A87F51333C214F6DD2544DCDD5547F32BCE0
25,461,287 UART: Caliptra RT
25,461,977 UART: [state] CFI Enabled
25,626,581 UART: [rt] RT listening for mailbox commands...
25,658,001 UART: [rt]cmd =0x54514754, len=24
25,660,320 >>> mbox cmd response data (8 bytes)
25,660,771 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,690,732 UART: [rt]cmd =0x54514754, len=24
25,693,069 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
192,355 UART:
192,728 UART: Running Caliptra ROM ...
193,865 UART:
603,330 UART: [state] CFI Enabled
616,589 UART: [state] LifecycleState = Unprovisioned
618,489 UART: [state] DebugLocked = No
620,363 UART: [state] WD Timer not started. Device not locked for debugging
623,897 UART: [kat] SHA2-256
803,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,580 UART: [kat] ++
815,027 UART: [kat] sha1
826,463 UART: [kat] SHA2-256
829,535 UART: [kat] SHA2-384
835,730 UART: [kat] SHA2-512-ACC
838,681 UART: [kat] ECC-384
3,284,365 UART: [kat] HMAC-384Kdf
3,295,626 UART: [kat] LMS
3,825,116 UART: [kat] --
3,829,664 UART: [cold-reset] ++
3,831,384 UART: [fht] FHT @ 0x50003400
3,842,916 UART: [idev] ++
3,843,489 UART: [idev] CDI.KEYID = 6
3,844,367 UART: [idev] SUBJECT.KEYID = 7
3,845,600 UART: [idev] UDS.KEYID = 0
3,846,640 ready_for_fw is high
3,846,851 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,692 UART: [idev] Erasing UDS.KEYID = 0
6,316,805 UART: [idev] Sha1 KeyId Algorithm
6,340,037 UART: [idev] --
6,343,060 UART: [ldev] ++
6,343,632 UART: [ldev] CDI.KEYID = 6
6,344,548 UART: [ldev] SUBJECT.KEYID = 5
6,345,753 UART: [ldev] AUTHORITY.KEYID = 7
6,346,975 UART: [ldev] FE.KEYID = 1
6,357,336 UART: [ldev] Erasing FE.KEYID = 1
8,831,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,424 UART: [ldev] --
10,623,763 UART: [fwproc] Wait for Commands...
10,625,740 UART: [fwproc] Recv command 0x46574c44
10,627,822 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,942 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,717 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,489,741 >>> mbox cmd response: success
14,490,278 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,493,299 UART: [afmc] ++
14,493,875 UART: [afmc] CDI.KEYID = 6
14,494,750 UART: [afmc] SUBJECT.KEYID = 7
14,495,956 UART: [afmc] AUTHORITY.KEYID = 5
16,997,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,799 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,554 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,581 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,475 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,586 UART: [afmc] --
18,793,196 UART: [cold-reset] --
18,798,017 UART: [state] Locking Datavault
18,801,148 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,837 UART: [state] Locking ICCM
18,805,278 UART: [exit] Launching FMC @ 0x40000130
18,813,715 UART:
18,813,937 UART: Running Caliptra FMC ...
18,814,959 UART:
18,815,097 UART: [state] CFI Enabled
18,823,210 UART: [fht] FMC Alias Private Key: 7
20,580,446 UART: [art] Extend RT PCRs Done
20,581,664 UART: [art] Lock RT PCRs Done
20,583,672 UART: [art] Populate DV Done
20,589,079 UART: [fht] FMC Alias Private Key: 7
20,590,772 UART: [art] Derive CDI
20,591,498 UART: [art] Store in in slot 0x4
20,634,142 UART: [art] Derive Key Pair
20,635,178 UART: [art] Store priv key in slot 0x5
23,062,149 UART: [art] Derive Key Pair - Done
23,075,046 UART: [art] Signing Cert with AUTHO
23,076,348 UART: RITY.KEYID = 7
24,782,116 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,612 UART: [art] PUB.X = 6276AE7579E2F01E03D8F4574C0379085770901BA3F1BED4CEDE7969FF503D2911454D383065C1F9D1C13A36FD11353B
24,790,903 UART: [art] PUB.Y = 1AAB50A94EB321CDACBB089C4CDE70F781BE39D1067C7B3E37985B82F26C97E9A985277AC580780E65C81BD37BDA55E6
24,798,174 UART: [art] SIG.R = DADAE0F571ABFACE2DDFA0324F78FFE4701BBDBD61C03253C061E3055A6BC0845AB0D5F50704B9B06B32C85A9B288288
24,805,573 UART: [art] SIG.S = 09900307F70B3706AC0486FEACDB4FE9AAF7050662D6D8E2195AEE8DEF4D00E25939591F4292534AAB9A6FECF0540C75
25,784,439 UART: Caliptra RT
25,785,137 UART: [state] CFI Enabled
25,903,067 UART: [rt] RT listening for mailbox commands...
25,934,538 UART: [rt]cmd =0x54514754, len=24
25,937,009 >>> mbox cmd response data (8 bytes)
25,937,537 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,967,670 UART: [rt]cmd =0x54514754, len=24
25,970,342 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,698,440 ready_for_fw is high
3,698,828 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,095 >>> mbox cmd response: success
14,273,946 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,521,670 UART:
18,522,059 UART: Running Caliptra FMC ...
18,523,159 UART:
18,523,305 UART: [state] CFI Enabled
18,531,251 UART: [fht] FMC Alias Private Key: 7
20,288,190 UART: [art] Extend RT PCRs Done
20,289,409 UART: [art] Lock RT PCRs Done
20,290,896 UART: [art] Populate DV Done
20,296,302 UART: [fht] FMC Alias Private Key: 7
20,297,891 UART: [art] Derive CDI
20,298,617 UART: [art] Store in in slot 0x4
20,340,987 UART: [art] Derive Key Pair
20,341,997 UART: [art] Store priv key in slot 0x5
22,768,612 UART: [art] Derive Key Pair - Done
22,781,551 UART: [art] Signing Cert with AUTHO
22,782,859 UART: RITY.KEYID = 7
24,487,978 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,480 UART: [art] PUB.X = 1EE2CDE02C848A671D11FDEE30E42564F564EDB6EC62B459C80B6BBA9D68CD9A2A5CFDC9A02995C6C822ACAD442A0A26
24,496,779 UART: [art] PUB.Y = 4C0D638B1B712C6029909EB6F47D46A84C876B218CEF64B280A19852BE79818145C5FEB023E440C1437C0BCDF39A3C5A
24,504,082 UART: [art] SIG.R = 57C0C5C1386D5DF694CF13FE1A766D83040A296B2348AA2B2A0E23A2658E26260CF2FB9B9B9140C20539EDE708D1AC3C
24,511,510 UART: [art] SIG.S = F55691BC3018F4DDA5C43406B02921D142FE1CCDA62B8469EE75B26181CA4C21A0FC4792329778E1AE91CDCA0C32C323
25,490,174 UART: Caliptra RT
25,490,875 UART: [state] CFI Enabled
25,609,671 UART: [rt] RT listening for mailbox commands...
25,640,866 UART: [rt]cmd =0x54514754, len=24
25,643,491 >>> mbox cmd response data (8 bytes)
25,643,898 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,673,834 UART: [rt]cmd =0x54514754, len=24
25,675,875 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,427,966 ready_for_fw is high
3,428,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,757,641 >>> mbox cmd response: success
14,758,301 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,058,848 UART:
19,059,235 UART: Running Caliptra FMC ...
19,060,374 UART:
19,060,536 UART: [state] CFI Enabled
19,128,069 UART: [fht] FMC Alias Private Key: 7
20,891,431 UART: [art] Extend RT PCRs Done
20,892,795 UART: [art] Lock RT PCRs Done
20,894,129 UART: [art] Populate DV Done
20,899,570 UART: [fht] FMC Alias Private Key: 7
20,901,220 UART: [art] Derive CDI
20,901,957 UART: [art] Store in in slot 0x4
20,960,590 UART: [art] Derive Key Pair
20,961,589 UART: [art] Store priv key in slot 0x5
23,424,320 UART: [art] Derive Key Pair - Done
23,437,370 UART: [art] Signing Cert with AUTHO
23,438,676 UART: RITY.KEYID = 7
25,150,171 UART: [art] Erasing AUTHORITY.KEYID = 7
25,151,674 UART: [art] PUB.X = 087182D24DE9F95E38F01BDB4D7587BC3304562904BC3F60E92B43011FD34DB12F9E95CF7C94F22ED3EFA235DAA582A0
25,158,971 UART: [art] PUB.Y = 3798A19D973F80DA4BD5697131628F466E82465A0B7482FBFA51B0733E12A1B7FD1CCB97E6F2A13EE7D35F077AAD5D57
25,166,218 UART: [art] SIG.R = 50BCE9FA0D6906B35F3C89E430C5D676CB67635B3D3189DD60B645C60E83A41DE380132E025821A9FD0457D3610DC2E7
25,173,610 UART: [art] SIG.S = 71CC25CB71E1081752D039F9EF9FC3A75BB1FA2BDE4C86BD345B4940AD43A6B89C2D384B2256FD7F37A6C42537C09D78
26,152,246 UART: Caliptra RT
26,152,935 UART: [state] CFI Enabled
26,317,383 UART: [rt] RT listening for mailbox commands...
26,349,131 UART: [rt]cmd =0x54514754, len=24
26,351,693 >>> mbox cmd response data (8 bytes)
26,352,116 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,381,904 UART: [rt]cmd =0x54514754, len=24
26,384,098 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,756,747 ready_for_fw is high
3,757,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,957,541 >>> mbox cmd response: success
14,958,154 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,217,193 UART:
19,217,595 UART: Running Caliptra FMC ...
19,218,691 UART:
19,218,836 UART: [state] CFI Enabled
19,226,621 UART: [fht] FMC Alias Private Key: 7
20,984,047 UART: [art] Extend RT PCRs Done
20,985,283 UART: [art] Lock RT PCRs Done
20,986,966 UART: [art] Populate DV Done
20,992,437 UART: [fht] FMC Alias Private Key: 7
20,994,134 UART: [art] Derive CDI
20,994,948 UART: [art] Store in in slot 0x4
21,037,597 UART: [art] Derive Key Pair
21,038,637 UART: [art] Store priv key in slot 0x5
23,465,206 UART: [art] Derive Key Pair - Done
23,478,040 UART: [art] Signing Cert with AUTHO
23,479,343 UART: RITY.KEYID = 7
25,184,680 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,189 UART: [art] PUB.X = 4650D851D877829B52331F83D54B6E56446E13841ABB89EE23C3317ED5DCB43EC0C0171536424A4AF686E4EBF8622A30
25,193,382 UART: [art] PUB.Y = 95A0FE98120B22B38A51678CF19F92A5D4DA40071D91E11AAF04125AFCE1615E1B641BEC7CBD4E1BDF4FC8379F2FDC56
25,200,696 UART: [art] SIG.R = 78D23C4AC52730254AA3820C382E3792F0BFB2066CC487B1ECF36FE148FEC7184F5D24C281ABC47CEA42C9007DE0EC09
25,208,032 UART: [art] SIG.S = FE7F3195604401055426AB30D2CF8ABFC677A2CD5F7330FE097440E794A79B67F906A063C6F0A61DC8BAD125A2648B66
26,186,612 UART: Caliptra RT
26,187,324 UART: [state] CFI Enabled
26,304,457 UART: [rt] RT listening for mailbox commands...
26,336,035 UART: [rt]cmd =0x54514754, len=24
26,338,729 >>> mbox cmd response data (8 bytes)
26,339,229 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,369,024 UART: [rt]cmd =0x54514754, len=24
26,371,054 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,455 UART: [kat] SHA2-256
882,386 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,501 UART: [kat] ++
886,653 UART: [kat] sha1
890,749 UART: [kat] SHA2-256
892,687 UART: [kat] SHA2-384
895,346 UART: [kat] SHA2-512-ACC
897,247 UART: [kat] ECC-384
902,548 UART: [kat] HMAC-384Kdf
907,276 UART: [kat] LMS
1,475,472 UART: [kat] --
1,476,329 UART: [cold-reset] ++
1,476,907 UART: [fht] Storing FHT @ 0x50003400
1,479,588 UART: [idev] ++
1,479,756 UART: [idev] CDI.KEYID = 6
1,480,116 UART: [idev] SUBJECT.KEYID = 7
1,480,540 UART: [idev] UDS.KEYID = 0
1,480,885 ready_for_fw is high
1,480,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,594 UART: [idev] Erasing UDS.KEYID = 0
1,505,594 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,146 UART: [idev] --
1,515,197 UART: [ldev] ++
1,515,365 UART: [ldev] CDI.KEYID = 6
1,515,728 UART: [ldev] SUBJECT.KEYID = 5
1,516,154 UART: [ldev] AUTHORITY.KEYID = 7
1,516,617 UART: [ldev] FE.KEYID = 1
1,521,763 UART: [ldev] Erasing FE.KEYID = 1
1,547,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,592 UART: [ldev] --
1,586,057 UART: [fwproc] Waiting for Commands...
1,586,814 UART: [fwproc] Received command 0x46574c44
1,587,605 UART: [fwproc] Received Image of size 114448 bytes
2,886,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,390 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,699 >>> mbox cmd response: success
3,079,699 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,823 UART: [afmc] ++
3,080,991 UART: [afmc] CDI.KEYID = 6
3,081,353 UART: [afmc] SUBJECT.KEYID = 7
3,081,778 UART: [afmc] AUTHORITY.KEYID = 5
3,117,115 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,507 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,015 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,900 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,590 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,307 UART: [afmc] --
3,160,273 UART: [cold-reset] --
3,160,937 UART: [state] Locking Datavault
3,162,164 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,768 UART: [state] Locking ICCM
3,163,206 UART: [exit] Launching FMC @ 0x40000130
3,168,535 UART:
3,168,551 UART: Running Caliptra FMC ...
3,168,959 UART:
3,169,013 UART: [state] CFI Enabled
3,179,320 UART: [fht] FMC Alias Private Key: 7
3,287,457 UART: [art] Extend RT PCRs Done
3,287,885 UART: [art] Lock RT PCRs Done
3,289,625 UART: [art] Populate DV Done
3,297,810 UART: [fht] FMC Alias Private Key: 7
3,298,828 UART: [art] Derive CDI
3,299,108 UART: [art] Store in in slot 0x4
3,384,973 UART: [art] Derive Key Pair
3,385,333 UART: [art] Store priv key in slot 0x5
3,398,825 UART: [art] Derive Key Pair - Done
3,413,753 UART: [art] Signing Cert with AUTHO
3,414,233 UART: RITY.KEYID = 7
3,429,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,992 UART: [art] PUB.X = B0B39142DE32C4178E0D395A2C541451DCEB7D5B1389B8D1D15FD9655E6651A821EE4DEF3B6CE8E25A6DDD5A2325B427
3,436,771 UART: [art] PUB.Y = 3F09DA33C294BB0666CF9327969D4BD6573E84BBF9FCDD0718FC7E2EC5975EA18412C59ED840E39924DC666D20209BD3
3,443,720 UART: [art] SIG.R = 823AF4738F7799F2A8936447BDCD73D5D33CF8F5532890D5DDDFB3A000AD4599F79CB2B1511829A0F6CAEF417BCF6D15
3,450,480 UART: [art] SIG.S = 8829E465504DCE8CD56F0D67C570756A66979DC0C7C580A681E2BF9CCD67F2FA19E4FBFF6CDF7C0457726463A1166BB6
3,474,283 UART: Caliptra RT
3,474,536 UART: [state] CFI Enabled
3,582,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,232 UART: [rt]cmd =0x54514754, len=24
3,615,282 >>> mbox cmd response data (8 bytes)
3,615,283 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,794 UART: [rt]cmd =0x54514754, len=24
3,646,854 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,499 ready_for_fw is high
1,362,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,633 >>> mbox cmd response: success
2,928,633 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,487 UART:
2,990,503 UART: Running Caliptra FMC ...
2,990,911 UART:
2,990,965 UART: [state] CFI Enabled
3,001,516 UART: [fht] FMC Alias Private Key: 7
3,109,459 UART: [art] Extend RT PCRs Done
3,109,887 UART: [art] Lock RT PCRs Done
3,111,483 UART: [art] Populate DV Done
3,119,642 UART: [fht] FMC Alias Private Key: 7
3,120,588 UART: [art] Derive CDI
3,120,868 UART: [art] Store in in slot 0x4
3,206,201 UART: [art] Derive Key Pair
3,206,561 UART: [art] Store priv key in slot 0x5
3,219,657 UART: [art] Derive Key Pair - Done
3,234,447 UART: [art] Signing Cert with AUTHO
3,234,927 UART: RITY.KEYID = 7
3,250,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,434 UART: [art] PUB.X = 129F461C776686DF938929819FA9E119EF4A499C2565B96EC59E47ABD9578DDDC1E762EDA3C735DD26968A63F3C2BA44
3,258,210 UART: [art] PUB.Y = 6582E14ADC154766A36A29B0F72A4B7C12DAF59DC577801B8016BE9537545CCCA63EFF114CCA0229FA625F806D5076DC
3,265,165 UART: [art] SIG.R = 478DE0224BFCBE36443BE7BFAB0CB08A477D786C21F4E69DA8CC008AAE9E820D9A30B5096BA799FDE2AAAB17030235B1
3,271,918 UART: [art] SIG.S = 9E0CF099BF3859FEEB9C8BD4A790DFE7455DB1F8E8B6A81B488A8D5AFA329975CDEE6FE7D9AE82ACCDCAC1C2D09DAAB6
3,295,774 UART: Caliptra RT
3,296,027 UART: [state] CFI Enabled
3,404,318 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,942 UART: [rt]cmd =0x54514754, len=24
3,437,118 >>> mbox cmd response data (8 bytes)
3,437,119 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,458 UART: [rt]cmd =0x54514754, len=24
3,468,576 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,360 UART: [kat] SHA2-256
882,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,406 UART: [kat] ++
886,558 UART: [kat] sha1
890,924 UART: [kat] SHA2-256
892,862 UART: [kat] SHA2-384
895,659 UART: [kat] SHA2-512-ACC
897,560 UART: [kat] ECC-384
902,971 UART: [kat] HMAC-384Kdf
907,655 UART: [kat] LMS
1,475,851 UART: [kat] --
1,476,964 UART: [cold-reset] ++
1,477,488 UART: [fht] Storing FHT @ 0x50003400
1,480,347 UART: [idev] ++
1,480,515 UART: [idev] CDI.KEYID = 6
1,480,875 UART: [idev] SUBJECT.KEYID = 7
1,481,299 UART: [idev] UDS.KEYID = 0
1,481,644 ready_for_fw is high
1,481,644 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,367 UART: [idev] Erasing UDS.KEYID = 0
1,506,773 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,389 UART: [idev] --
1,516,390 UART: [ldev] ++
1,516,558 UART: [ldev] CDI.KEYID = 6
1,516,921 UART: [ldev] SUBJECT.KEYID = 5
1,517,347 UART: [ldev] AUTHORITY.KEYID = 7
1,517,810 UART: [ldev] FE.KEYID = 1
1,523,050 UART: [ldev] Erasing FE.KEYID = 1
1,548,333 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,765 UART: [ldev] --
1,588,226 UART: [fwproc] Waiting for Commands...
1,588,901 UART: [fwproc] Received command 0x46574c44
1,589,692 UART: [fwproc] Received Image of size 114448 bytes
2,888,663 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,017 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,406 >>> mbox cmd response: success
3,081,406 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,082,462 UART: [afmc] ++
3,082,630 UART: [afmc] CDI.KEYID = 6
3,082,992 UART: [afmc] SUBJECT.KEYID = 7
3,083,417 UART: [afmc] AUTHORITY.KEYID = 5
3,119,298 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,656 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,164 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,148,049 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,739 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,622 UART: [afmc] --
3,162,630 UART: [cold-reset] --
3,163,448 UART: [state] Locking Datavault
3,164,295 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,899 UART: [state] Locking ICCM
3,165,379 UART: [exit] Launching FMC @ 0x40000130
3,170,708 UART:
3,170,724 UART: Running Caliptra FMC ...
3,171,132 UART:
3,171,275 UART: [state] CFI Enabled
3,181,702 UART: [fht] FMC Alias Private Key: 7
3,290,133 UART: [art] Extend RT PCRs Done
3,290,561 UART: [art] Lock RT PCRs Done
3,292,199 UART: [art] Populate DV Done
3,300,522 UART: [fht] FMC Alias Private Key: 7
3,301,496 UART: [art] Derive CDI
3,301,776 UART: [art] Store in in slot 0x4
3,387,235 UART: [art] Derive Key Pair
3,387,595 UART: [art] Store priv key in slot 0x5
3,401,053 UART: [art] Derive Key Pair - Done
3,415,704 UART: [art] Signing Cert with AUTHO
3,416,184 UART: RITY.KEYID = 7
3,431,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,149 UART: [art] PUB.X = 4628BE0A63ED81D4ABF6E1A8ABA48F343FFC704BF806C0259DE1E2620928A6E1BA3C689E3B7A47693DE4F26C3AF93458
3,438,924 UART: [art] PUB.Y = 00EEE140944589F209FD4077339F1EB11AC56569AD4E80542E4FBB279F6D317C398F8946D302152F5E1BF401A6120BD9
3,445,838 UART: [art] SIG.R = 7D55ADC252D45275FB4122498EF120AA8800B684225A1F984A4A86A6FFB61184006B4E2A0DEEED1E6B306C25963A0B03
3,452,559 UART: [art] SIG.S = 0D04CA0E753C9B8259B62B5F509C9B38BC410CDA2501C7384BE46501F4EEB0B1F69F25DC4E0983C8998AD5FFE84E236F
3,476,273 UART: Caliptra RT
3,476,618 UART: [state] CFI Enabled
3,584,434 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,336 UART: [rt]cmd =0x54514754, len=24
3,617,258 >>> mbox cmd response data (8 bytes)
3,617,259 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,622 UART: [rt]cmd =0x54514754, len=24
3,648,526 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,880 ready_for_fw is high
1,362,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,590 >>> mbox cmd response: success
2,930,590 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,992,152 UART:
2,992,168 UART: Running Caliptra FMC ...
2,992,576 UART:
2,992,719 UART: [state] CFI Enabled
3,002,942 UART: [fht] FMC Alias Private Key: 7
3,110,797 UART: [art] Extend RT PCRs Done
3,111,225 UART: [art] Lock RT PCRs Done
3,112,485 UART: [art] Populate DV Done
3,120,758 UART: [fht] FMC Alias Private Key: 7
3,121,906 UART: [art] Derive CDI
3,122,186 UART: [art] Store in in slot 0x4
3,208,101 UART: [art] Derive Key Pair
3,208,461 UART: [art] Store priv key in slot 0x5
3,222,269 UART: [art] Derive Key Pair - Done
3,236,844 UART: [art] Signing Cert with AUTHO
3,237,324 UART: RITY.KEYID = 7
3,252,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,393 UART: [art] PUB.X = ADB416608318EE19DCECC7FE9B9A237F963248B83934B35CFDA1DC6764685C36C773F489A69AF3036E4E26232515D3F5
3,260,164 UART: [art] PUB.Y = BD32E0A41D325E001ED19630EAF2E0C2FE0ED9B02801898B552FB8FCB51F0F2D9ED877E02FE2C4E872C85286FFF21FCD
3,267,103 UART: [art] SIG.R = 394A8479F81A0851C6561E49E3332DB10388B68B26D85AA3C7066D51B8ECEA4560D5A2AC1DEAD74EE060B0FB08F33D26
3,273,869 UART: [art] SIG.S = 7F965A0908E6E013969F50724127E445994393BEB1F5BB7BCC6E45890077ED99F6E46C5B30797AEE84F1A1765B0C6E4C
3,297,113 UART: Caliptra RT
3,297,458 UART: [state] CFI Enabled
3,406,460 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,860 UART: [rt]cmd =0x54514754, len=24
3,438,966 >>> mbox cmd response data (8 bytes)
3,438,967 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,380 UART: [rt]cmd =0x54514754, len=24
3,470,386 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
893,026 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,151 UART: [kat] ++
897,303 UART: [kat] sha1
901,575 UART: [kat] SHA2-256
903,515 UART: [kat] SHA2-384
906,228 UART: [kat] SHA2-512-ACC
908,129 UART: [kat] ECC-384
917,494 UART: [kat] HMAC-384Kdf
921,932 UART: [kat] LMS
1,170,260 UART: [kat] --
1,171,311 UART: [cold-reset] ++
1,171,699 UART: [fht] FHT @ 0x50003400
1,174,464 UART: [idev] ++
1,174,632 UART: [idev] CDI.KEYID = 6
1,174,992 UART: [idev] SUBJECT.KEYID = 7
1,175,416 UART: [idev] UDS.KEYID = 0
1,175,761 ready_for_fw is high
1,175,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,292 UART: [idev] Erasing UDS.KEYID = 0
1,200,177 UART: [idev] Sha1 KeyId Algorithm
1,208,513 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,072 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,089 UART: [ldev] Erasing FE.KEYID = 1
1,242,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,896 UART: [fwproc] Wait for Commands...
1,282,468 UART: [fwproc] Recv command 0x46574c44
1,283,196 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,704 >>> mbox cmd response: success
2,773,704 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,940 UART: [afmc] ++
2,775,108 UART: [afmc] CDI.KEYID = 6
2,775,470 UART: [afmc] SUBJECT.KEYID = 7
2,775,895 UART: [afmc] AUTHORITY.KEYID = 5
2,811,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,298 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,017 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,951 UART: [afmc] --
2,854,951 UART: [cold-reset] --
2,855,769 UART: [state] Locking Datavault
2,856,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,566 UART: [state] Locking ICCM
2,858,118 UART: [exit] Launching FMC @ 0x40000130
2,863,447 UART:
2,863,463 UART: Running Caliptra FMC ...
2,863,871 UART:
2,863,925 UART: [state] CFI Enabled
2,874,302 UART: [fht] FMC Alias Private Key: 7
2,981,713 UART: [art] Extend RT PCRs Done
2,982,141 UART: [art] Lock RT PCRs Done
2,983,573 UART: [art] Populate DV Done
2,991,760 UART: [fht] FMC Alias Private Key: 7
2,992,846 UART: [art] Derive CDI
2,993,126 UART: [art] Store in in slot 0x4
3,078,753 UART: [art] Derive Key Pair
3,079,113 UART: [art] Store priv key in slot 0x5
3,091,603 UART: [art] Derive Key Pair - Done
3,106,247 UART: [art] Signing Cert with AUTHO
3,106,727 UART: RITY.KEYID = 7
3,121,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,510 UART: [art] PUB.X = F26FC4365689157042574445F6CD304D1CF5A28F73DEC9F72E33C56CB3F55DC98ECE1937D9CE11B2FC1A5209646897B4
3,129,281 UART: [art] PUB.Y = F9B2EABB5D17D580844331DA08FB02D2265E3E1E9F43ED06C0A72C4EA85DA8D9CB47AFF449B619703758F20C9B2AD866
3,136,233 UART: [art] SIG.R = C1E851DC61B6C18F4447FE79EB890E95E09BD190ACC541C5CEC49DD1A6BA62B6E2BA5CD5AE9308AEEACE049EF9911B86
3,143,020 UART: [art] SIG.S = 070FFFA872FDC877F83D17DB38A9626DF63496C8999EF64F2257FB77FBBE9BAE469EA633EE604CB0C8A6DF51EAB43460
3,167,475 UART: Caliptra RT
3,167,728 UART: [state] CFI Enabled
3,276,237 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,693 UART: [rt]cmd =0x54514754, len=24
3,308,933 >>> mbox cmd response data (8 bytes)
3,308,934 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,493 UART: [rt]cmd =0x54514754, len=24
3,340,423 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,107 ready_for_fw is high
1,060,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,315 >>> mbox cmd response: success
2,626,315 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,688,457 UART:
2,688,473 UART: Running Caliptra FMC ...
2,688,881 UART:
2,688,935 UART: [state] CFI Enabled
2,699,410 UART: [fht] FMC Alias Private Key: 7
2,807,125 UART: [art] Extend RT PCRs Done
2,807,553 UART: [art] Lock RT PCRs Done
2,808,937 UART: [art] Populate DV Done
2,817,282 UART: [fht] FMC Alias Private Key: 7
2,818,428 UART: [art] Derive CDI
2,818,708 UART: [art] Store in in slot 0x4
2,904,423 UART: [art] Derive Key Pair
2,904,783 UART: [art] Store priv key in slot 0x5
2,918,123 UART: [art] Derive Key Pair - Done
2,933,083 UART: [art] Signing Cert with AUTHO
2,933,563 UART: RITY.KEYID = 7
2,948,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,672 UART: [art] PUB.X = 301B0E296888C1C138878138DD12977C5B7CF41D7BED01B3D1C4A7F2F03AF87BF07AAD84A2F7A581104A28AB0721863F
2,956,439 UART: [art] PUB.Y = 04236DB942AF4272B967B1A3242B6B639C38C823EBC6B8A6B2DD63875FAE633E5747542C0F6C95422A3D64486BC1A950
2,963,383 UART: [art] SIG.R = FA1BBD081935446C9311B2AA2AC47CA11AF58FD54DC0C6F2AB1027939C66BB20BC4B8CA4168C4F6EB737F35E706D0D7C
2,970,165 UART: [art] SIG.S = 153F6856AF0464024BB4AA56700D771047A42C311B92EFD44E261892F63C83E10B8D8921D00DABB3F5014A262F628295
2,994,314 UART: Caliptra RT
2,994,567 UART: [state] CFI Enabled
3,102,374 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,098 UART: [rt]cmd =0x54514754, len=24
3,135,314 >>> mbox cmd response data (8 bytes)
3,135,315 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,826 UART: [rt]cmd =0x54514754, len=24
3,166,536 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,217 UART: [kat] SHA2-256
893,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,992 UART: [kat] ++
898,144 UART: [kat] sha1
902,408 UART: [kat] SHA2-256
904,348 UART: [kat] SHA2-384
907,241 UART: [kat] SHA2-512-ACC
909,142 UART: [kat] ECC-384
919,325 UART: [kat] HMAC-384Kdf
923,903 UART: [kat] LMS
1,172,231 UART: [kat] --
1,173,014 UART: [cold-reset] ++
1,173,498 UART: [fht] FHT @ 0x50003400
1,176,259 UART: [idev] ++
1,176,427 UART: [idev] CDI.KEYID = 6
1,176,787 UART: [idev] SUBJECT.KEYID = 7
1,177,211 UART: [idev] UDS.KEYID = 0
1,177,556 ready_for_fw is high
1,177,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,451 UART: [idev] Erasing UDS.KEYID = 0
1,202,108 UART: [idev] Sha1 KeyId Algorithm
1,210,414 UART: [idev] --
1,211,398 UART: [ldev] ++
1,211,566 UART: [ldev] CDI.KEYID = 6
1,211,929 UART: [ldev] SUBJECT.KEYID = 5
1,212,355 UART: [ldev] AUTHORITY.KEYID = 7
1,212,818 UART: [ldev] FE.KEYID = 1
1,218,400 UART: [ldev] Erasing FE.KEYID = 1
1,244,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,656 UART: [ldev] --
1,284,075 UART: [fwproc] Wait for Commands...
1,284,761 UART: [fwproc] Recv command 0x46574c44
1,285,489 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,461 >>> mbox cmd response: success
2,776,461 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,559 UART: [afmc] ++
2,777,727 UART: [afmc] CDI.KEYID = 6
2,778,089 UART: [afmc] SUBJECT.KEYID = 7
2,778,514 UART: [afmc] AUTHORITY.KEYID = 5
2,814,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,338 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,066 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,951 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,670 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,576 UART: [afmc] --
2,857,684 UART: [cold-reset] --
2,858,400 UART: [state] Locking Datavault
2,859,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,327 UART: [state] Locking ICCM
2,860,999 UART: [exit] Launching FMC @ 0x40000130
2,866,328 UART:
2,866,344 UART: Running Caliptra FMC ...
2,866,752 UART:
2,866,895 UART: [state] CFI Enabled
2,877,764 UART: [fht] FMC Alias Private Key: 7
2,985,341 UART: [art] Extend RT PCRs Done
2,985,769 UART: [art] Lock RT PCRs Done
2,987,449 UART: [art] Populate DV Done
2,995,430 UART: [fht] FMC Alias Private Key: 7
2,996,474 UART: [art] Derive CDI
2,996,754 UART: [art] Store in in slot 0x4
3,082,175 UART: [art] Derive Key Pair
3,082,535 UART: [art] Store priv key in slot 0x5
3,095,927 UART: [art] Derive Key Pair - Done
3,110,398 UART: [art] Signing Cert with AUTHO
3,110,878 UART: RITY.KEYID = 7
3,126,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,823 UART: [art] PUB.X = 1D240CB38D932443766190ADAC7AF3B8DB5AA6800208CEC9B6F227342B4E032FD650EA41EB538A62FD29C19C94694A71
3,133,587 UART: [art] PUB.Y = AF5CE63C16F318AE2E71BB82411666A9DFC40B1785D2569B24DBD0628F7E24D2821796273A18B360E4361647FC511434
3,140,530 UART: [art] SIG.R = FF1B2FA173856B70584B70C520E29B59CAD091FB1A45F8F278D89017ACB322FA300EBE9619544EAFDD8046FB54B8AA20
3,147,309 UART: [art] SIG.S = 2552C28398917D15E407A27691EA5C8550222523F8931EC4FE86E9D5589DDFDBF93E95D7D70716482E6A09F84677630E
3,171,996 UART: Caliptra RT
3,172,341 UART: [state] CFI Enabled
3,280,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,634 UART: [rt]cmd =0x54514754, len=24
3,312,816 >>> mbox cmd response data (8 bytes)
3,312,817 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,222 UART: [rt]cmd =0x54514754, len=24
3,344,012 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,934 ready_for_fw is high
1,060,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,190 >>> mbox cmd response: success
2,629,190 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,691,184 UART:
2,691,200 UART: Running Caliptra FMC ...
2,691,608 UART:
2,691,751 UART: [state] CFI Enabled
2,702,522 UART: [fht] FMC Alias Private Key: 7
2,809,973 UART: [art] Extend RT PCRs Done
2,810,401 UART: [art] Lock RT PCRs Done
2,811,775 UART: [art] Populate DV Done
2,819,884 UART: [fht] FMC Alias Private Key: 7
2,821,048 UART: [art] Derive CDI
2,821,328 UART: [art] Store in in slot 0x4
2,906,791 UART: [art] Derive Key Pair
2,907,151 UART: [art] Store priv key in slot 0x5
2,920,361 UART: [art] Derive Key Pair - Done
2,935,657 UART: [art] Signing Cert with AUTHO
2,936,137 UART: RITY.KEYID = 7
2,951,607 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,372 UART: [art] PUB.X = 4AED1D88BE6575A276E8C6289AB3F31A1035C100EBDC5F6B679DF9213E5DFAC9132194C57A42D400CC1538384A030520
2,959,096 UART: [art] PUB.Y = 0CB34EAC17B908EAE37E2E272608AFC425EF31C43DD784CD7452720D70616A5CACDF63D7AF36E6039B44A6D49C0132CB
2,966,042 UART: [art] SIG.R = 0C577C9C61BE65AF425615A4EBD9BBEBB58AF23A69E9B49738BB3BF6BB6E178AA99232B7C6893027C395F62F3421AAF2
2,972,823 UART: [art] SIG.S = 13CEF6E519AF887E0BA9AA0E9CBDB99EA15F2316CC3ACBBE29110B3A290D53617F85F0CDA7AECC7319554FA45985DC06
2,996,693 UART: Caliptra RT
2,997,038 UART: [state] CFI Enabled
3,104,997 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,595 UART: [rt]cmd =0x54514754, len=24
3,137,573 >>> mbox cmd response data (8 bytes)
3,137,574 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,149 UART: [rt]cmd =0x54514754, len=24
3,169,273 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,786 UART: [state] LifecycleState = Unprovisioned
86,441 UART: [state] DebugLocked = No
87,055 UART: [state] WD Timer not started. Device not locked for debugging
88,266 UART: [kat] SHA2-256
891,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,945 UART: [kat] ++
896,097 UART: [kat] sha1
900,371 UART: [kat] SHA2-256
902,311 UART: [kat] SHA2-384
904,872 UART: [kat] SHA2-512-ACC
906,773 UART: [kat] ECC-384
916,468 UART: [kat] HMAC-384Kdf
921,016 UART: [kat] LMS
1,169,328 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,805 UART: [fht] FHT @ 0x50003400
1,173,505 UART: [idev] ++
1,173,673 UART: [idev] CDI.KEYID = 6
1,174,034 UART: [idev] SUBJECT.KEYID = 7
1,174,459 UART: [idev] UDS.KEYID = 0
1,174,805 ready_for_fw is high
1,174,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,299 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,580 UART: [ldev] ++
1,208,748 UART: [ldev] CDI.KEYID = 6
1,209,112 UART: [ldev] SUBJECT.KEYID = 5
1,209,539 UART: [ldev] AUTHORITY.KEYID = 7
1,210,002 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,668 UART: [ldev] --
1,281,132 UART: [fwproc] Wait for Commands...
1,281,707 UART: [fwproc] Recv command 0x46574c44
1,282,440 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,752 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,648 >>> mbox cmd response: success
2,773,648 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,787 UART: [afmc] ++
2,774,955 UART: [afmc] CDI.KEYID = 6
2,775,318 UART: [afmc] SUBJECT.KEYID = 7
2,775,744 UART: [afmc] AUTHORITY.KEYID = 5
2,811,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,259 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,142 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,861 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,620 UART: [afmc] --
2,854,700 UART: [cold-reset] --
2,855,702 UART: [state] Locking Datavault
2,856,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,593 UART: [state] Locking ICCM
2,858,035 UART: [exit] Launching FMC @ 0x40000130
2,863,364 UART:
2,863,380 UART: Running Caliptra FMC ...
2,863,788 UART:
2,863,842 UART: [state] CFI Enabled
2,874,025 UART: [fht] FMC Alias Private Key: 7
2,981,764 UART: [art] Extend RT PCRs Done
2,982,192 UART: [art] Lock RT PCRs Done
2,983,952 UART: [art] Populate DV Done
2,992,143 UART: [fht] FMC Alias Private Key: 7
2,993,121 UART: [art] Derive CDI
2,993,401 UART: [art] Store in in slot 0x4
3,078,928 UART: [art] Derive Key Pair
3,079,288 UART: [art] Store priv key in slot 0x5
3,092,146 UART: [art] Derive Key Pair - Done
3,107,052 UART: [art] Signing Cert with AUTHO
3,107,532 UART: RITY.KEYID = 7
3,122,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,589 UART: [art] PUB.X = 835526944F837A47DF727182561BDA5D26613094BEEB9AC45044F34A67CE1E588DBC2C6F30CC9EE83D5A3543AE9A0700
3,130,338 UART: [art] PUB.Y = 2A92F9D7A956BD1078E29B5717474519A234852623233090F8D39D7034EF497876D46BF42992448676FB377B27AD176F
3,137,272 UART: [art] SIG.R = 0F25C345B05DB3D85E4AD41F14E0FBA39FC5C954D27CD637162DF4D4C0EAB9A15E3F16F08427D5ED72CEF1D46529FA52
3,144,057 UART: [art] SIG.S = 77CC6CE602421C2FD20D2E2FB70C37FB63C145AE75C331D8B141DDC37D742A2D73E81352DDE8682C370A4D72F9F1BDEF
3,167,810 UART: Caliptra RT
3,168,063 UART: [state] CFI Enabled
3,276,098 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,528 UART: [rt]cmd =0x54514754, len=24
3,308,738 >>> mbox cmd response data (8 bytes)
3,308,739 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,292 UART: [rt]cmd =0x54514754, len=24
3,340,316 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,998 ready_for_fw is high
1,055,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,156 >>> mbox cmd response: success
2,623,156 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,800 UART:
2,684,816 UART: Running Caliptra FMC ...
2,685,224 UART:
2,685,278 UART: [state] CFI Enabled
2,695,693 UART: [fht] FMC Alias Private Key: 7
2,804,240 UART: [art] Extend RT PCRs Done
2,804,668 UART: [art] Lock RT PCRs Done
2,806,000 UART: [art] Populate DV Done
2,814,199 UART: [fht] FMC Alias Private Key: 7
2,815,325 UART: [art] Derive CDI
2,815,605 UART: [art] Store in in slot 0x4
2,901,240 UART: [art] Derive Key Pair
2,901,600 UART: [art] Store priv key in slot 0x5
2,914,020 UART: [art] Derive Key Pair - Done
2,928,722 UART: [art] Signing Cert with AUTHO
2,929,202 UART: RITY.KEYID = 7
2,944,570 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,335 UART: [art] PUB.X = 7C1A1619D01F4ABBB24418EFC7C6F9E97E555D15B2042032A8238FB748F153BE1A74EDA17D11A8E245A87C12C0C91C88
2,952,110 UART: [art] PUB.Y = 48921989E0BA75FDB2D788E23DB103EB44541EE03A27EFCBE5266A64EA97A9DA48ECDA8258630A93F5C2FCCEB2EC01A4
2,959,071 UART: [art] SIG.R = 8E609E932A5EF2A75420200F97005CB88E8B72E0DC5E10FE5524D3B169924B675D523B9A6B9936B3DEA7831669B4D353
2,965,814 UART: [art] SIG.S = B1D59C864CC60CDC1B6AC255AE2C3FB8AD5C0E3FE761652898E59810D8AB02EE8346EA72805614F94E434F01FF83327A
2,989,681 UART: Caliptra RT
2,989,934 UART: [state] CFI Enabled
3,097,366 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,928 UART: [rt]cmd =0x54514754, len=24
3,130,140 >>> mbox cmd response data (8 bytes)
3,130,141 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,666 UART: [rt]cmd =0x54514754, len=24
3,161,804 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,123 UART: [state] LifecycleState = Unprovisioned
86,778 UART: [state] DebugLocked = No
87,444 UART: [state] WD Timer not started. Device not locked for debugging
88,671 UART: [kat] SHA2-256
892,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,350 UART: [kat] ++
896,502 UART: [kat] sha1
900,766 UART: [kat] SHA2-256
902,706 UART: [kat] SHA2-384
905,333 UART: [kat] SHA2-512-ACC
907,234 UART: [kat] ECC-384
917,091 UART: [kat] HMAC-384Kdf
921,763 UART: [kat] LMS
1,170,075 UART: [kat] --
1,170,798 UART: [cold-reset] ++
1,171,292 UART: [fht] FHT @ 0x50003400
1,173,952 UART: [idev] ++
1,174,120 UART: [idev] CDI.KEYID = 6
1,174,481 UART: [idev] SUBJECT.KEYID = 7
1,174,906 UART: [idev] UDS.KEYID = 0
1,175,252 ready_for_fw is high
1,175,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,910 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,209,066 UART: [idev] --
1,210,061 UART: [ldev] ++
1,210,229 UART: [ldev] CDI.KEYID = 6
1,210,593 UART: [ldev] SUBJECT.KEYID = 5
1,211,020 UART: [ldev] AUTHORITY.KEYID = 7
1,211,483 UART: [ldev] FE.KEYID = 1
1,216,745 UART: [ldev] Erasing FE.KEYID = 1
1,243,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,289 UART: [ldev] --
1,282,557 UART: [fwproc] Wait for Commands...
1,283,326 UART: [fwproc] Recv command 0x46574c44
1,284,059 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,712 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,133 >>> mbox cmd response: success
2,775,133 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,300 UART: [afmc] ++
2,776,468 UART: [afmc] CDI.KEYID = 6
2,776,831 UART: [afmc] SUBJECT.KEYID = 7
2,777,257 UART: [afmc] AUTHORITY.KEYID = 5
2,813,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,713 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,442 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,325 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,044 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,853 UART: [afmc] --
2,856,939 UART: [cold-reset] --
2,857,687 UART: [state] Locking Datavault
2,858,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,592 UART: [state] Locking ICCM
2,860,254 UART: [exit] Launching FMC @ 0x40000130
2,865,583 UART:
2,865,599 UART: Running Caliptra FMC ...
2,866,007 UART:
2,866,150 UART: [state] CFI Enabled
2,876,307 UART: [fht] FMC Alias Private Key: 7
2,984,814 UART: [art] Extend RT PCRs Done
2,985,242 UART: [art] Lock RT PCRs Done
2,986,708 UART: [art] Populate DV Done
2,994,721 UART: [fht] FMC Alias Private Key: 7
2,995,661 UART: [art] Derive CDI
2,995,941 UART: [art] Store in in slot 0x4
3,081,852 UART: [art] Derive Key Pair
3,082,212 UART: [art] Store priv key in slot 0x5
3,095,552 UART: [art] Derive Key Pair - Done
3,110,086 UART: [art] Signing Cert with AUTHO
3,110,566 UART: RITY.KEYID = 7
3,125,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,675 UART: [art] PUB.X = FB39C48688F0B8437392BE425A4EA539648AB93DA39811C0C5037B8CAFAECD26F601AB3E28F7C9BDE1C79A579FB0CF1F
3,133,457 UART: [art] PUB.Y = 361DCF1193C0DC543C636BEEC815F5B24D98E0C28FD4F762551167A2A949AEF1D942AA3E9E37A669D23738AB243E9963
3,140,413 UART: [art] SIG.R = F1C51831F85036FA30138902A927D1CD6ED9EE1EABFC277F6FAA584F385B1F73C8A6C5FE563AD33AF40CDA86F06BB3F6
3,147,197 UART: [art] SIG.S = A1108DBFBA343D24D2910DB1CE04B43BB2FA487BCBC65D74594A031191BA9F27DD527CA46E85B241FBAB7CCA17F16496
3,171,177 UART: Caliptra RT
3,171,522 UART: [state] CFI Enabled
3,279,010 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,656 UART: [rt]cmd =0x54514754, len=24
3,311,560 >>> mbox cmd response data (8 bytes)
3,311,561 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,362 UART: [rt]cmd =0x54514754, len=24
3,343,182 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,895 ready_for_fw is high
1,056,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,749 >>> mbox cmd response: success
2,626,749 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,143 UART:
2,689,159 UART: Running Caliptra FMC ...
2,689,567 UART:
2,689,710 UART: [state] CFI Enabled
2,700,461 UART: [fht] FMC Alias Private Key: 7
2,807,894 UART: [art] Extend RT PCRs Done
2,808,322 UART: [art] Lock RT PCRs Done
2,809,786 UART: [art] Populate DV Done
2,818,035 UART: [fht] FMC Alias Private Key: 7
2,819,183 UART: [art] Derive CDI
2,819,463 UART: [art] Store in in slot 0x4
2,904,620 UART: [art] Derive Key Pair
2,904,980 UART: [art] Store priv key in slot 0x5
2,918,280 UART: [art] Derive Key Pair - Done
2,933,151 UART: [art] Signing Cert with AUTHO
2,933,631 UART: RITY.KEYID = 7
2,949,171 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,936 UART: [art] PUB.X = 5A021AC670C1E56536EE999AFF426663E3E043AC19C85966A27BEAEDC918C46C7AE2FB6B9E6040826495C9CFAF74CBBC
2,956,719 UART: [art] PUB.Y = 0C145784646172E1D463BBD0BEE336CB78126F8A073081BE67C8B2167472C282D2F79236931B057A023F3EC9FC042CD9
2,963,650 UART: [art] SIG.R = AAF5F0919697197B775DC72AB8A49A24AFF761FAAC7328F5B40C04C823B998AA1D455575F731F872D65E774D3C669C49
2,970,418 UART: [art] SIG.S = A692A071FAE3F25CC8F528A7182E4609CB7E90E0E692E56EAF93063AF3F70EBAE7C6A29010B9D219160D0917A1829845
2,993,686 UART: Caliptra RT
2,994,031 UART: [state] CFI Enabled
3,101,927 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,799 UART: [rt]cmd =0x54514754, len=24
3,134,987 >>> mbox cmd response data (8 bytes)
3,134,988 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,511 UART: [rt]cmd =0x54514754, len=24
3,166,395 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,135 UART:
192,487 UART: Running Caliptra ROM ...
193,633 UART:
193,783 UART: [state] CFI Enabled
263,527 UART: [state] LifecycleState = Unprovisioned
265,515 UART: [state] DebugLocked = No
268,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,759 UART: [kat] SHA2-256
443,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,926 UART: [kat] ++
454,373 UART: [kat] sha1
465,074 UART: [kat] SHA2-256
467,747 UART: [kat] SHA2-384
473,662 UART: [kat] SHA2-512-ACC
476,027 UART: [kat] ECC-384
2,770,770 UART: [kat] HMAC-384Kdf
2,802,328 UART: [kat] LMS
3,992,640 UART: [kat] --
3,998,846 UART: [cold-reset] ++
4,000,206 UART: [fht] Storing FHT @ 0x50003400
4,011,686 UART: [idev] ++
4,012,262 UART: [idev] CDI.KEYID = 6
4,013,249 UART: [idev] SUBJECT.KEYID = 7
4,014,496 UART: [idev] UDS.KEYID = 0
4,015,474 ready_for_fw is high
4,015,673 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,211 UART: [idev] Erasing UDS.KEYID = 0
7,349,144 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,306 UART: [idev] --
7,373,381 UART: [ldev] ++
7,373,952 UART: [ldev] CDI.KEYID = 6
7,374,920 UART: [ldev] SUBJECT.KEYID = 5
7,376,131 UART: [ldev] AUTHORITY.KEYID = 7
7,377,437 UART: [ldev] FE.KEYID = 1
7,423,797 UART: [ldev] Erasing FE.KEYID = 1
10,749,534 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,971 UART: [ldev] --
13,116,019 UART: [fwproc] Waiting for Commands...
13,117,684 UART: [fwproc] Received command 0x46574c44
13,119,888 UART: [fwproc] Received Image of size 114124 bytes
17,178,265 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,449 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,642,620 >>> mbox cmd response: success
17,643,140 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,647,364 UART: [afmc] ++
17,647,948 UART: [afmc] CDI.KEYID = 6
17,648,972 UART: [afmc] SUBJECT.KEYID = 7
17,650,137 UART: [afmc] AUTHORITY.KEYID = 5
21,006,332 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,906 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,162 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,547 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,386 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,866 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,333 UART: [afmc] --
23,376,946 UART: [cold-reset] --
23,381,078 UART: [state] Locking Datavault
23,386,499 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,209 UART: [state] Locking ICCM
23,389,712 UART: [exit] Launching FMC @ 0x40000130
23,398,060 UART:
23,398,298 UART: Running Caliptra FMC ...
23,399,400 UART:
23,399,561 UART: [state] CFI Enabled
23,463,902 UART: [fht] FMC Alias Private Key: 7
25,802,024 UART: [art] Extend RT PCRs Done
25,803,252 UART: [art] Lock RT PCRs Done
25,804,857 UART: [art] Populate DV Done
25,810,293 UART: [fht] FMC Alias Private Key: 7
25,811,830 UART: [art] Derive CDI
25,812,668 UART: [art] Store in in slot 0x4
25,872,835 UART: [art] Derive Key Pair
25,873,878 UART: [art] Store priv key in slot 0x5
29,166,311 UART: [art] Derive Key Pair - Done
29,178,932 UART: [art] Signing Cert with AUTHO
29,180,236 UART: RITY.KEYID = 7
31,468,043 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,548 UART: [art] PUB.X = E97A45DAF0E11BCBF26D0762504A2FBA7EB6F8724FBFAFA11646E6443A7233D9C9288E1CB819DFC95E27FA40D5A8F852
31,476,790 UART: [art] PUB.Y = D92E2E15D43744C00C004B84D9B74694B2A962780B713BE1A27F53C67062326A3E54BB0208905F1777C9F17D8CF0E607
31,484,037 UART: [art] SIG.R = 8116E8B6DF713FC41D837851AD066048136FFC4A96DCBA7981C1889486576104F6942F8A24190B11451669B260AFEF42
31,491,381 UART: [art] SIG.S = ADF4ECE72D7B5067F88769F70635DD8188604BF8F1C4CB2D58DF566E694BECAFD7F1A75781DFD95FA7A1982BBBBD7604
32,796,245 UART: Caliptra RT
32,796,957 UART: [state] CFI Enabled
32,977,558 UART: [rt] RT listening for mailbox commands...
33,009,087 UART: [rt]cmd =0x54514754, len=24
33,011,905 >>> mbox cmd response data (8 bytes)
33,012,433 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,041,956 UART: [rt]cmd =0x47544744, len=8
33,045,105 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,805,233 ready_for_fw is high
3,805,633 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,886,522 >>> mbox cmd response: success
17,887,130 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,585,556 UART:
23,585,938 UART: Running Caliptra FMC ...
23,587,038 UART:
23,587,193 UART: [state] CFI Enabled
23,655,909 UART: [fht] FMC Alias Private Key: 7
25,994,163 UART: [art] Extend RT PCRs Done
25,995,386 UART: [art] Lock RT PCRs Done
25,996,669 UART: [art] Populate DV Done
26,002,140 UART: [fht] FMC Alias Private Key: 7
26,003,720 UART: [art] Derive CDI
26,004,471 UART: [art] Store in in slot 0x4
26,064,467 UART: [art] Derive Key Pair
26,065,473 UART: [art] Store priv key in slot 0x5
29,358,435 UART: [art] Derive Key Pair - Done
29,371,433 UART: [art] Signing Cert with AUTHO
29,372,743 UART: RITY.KEYID = 7
31,659,508 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,012 UART: [art] PUB.X = 203B2CA7DB6CDA3636BD157572393319D3DAC612709EB76E67392094C84929184C0F790DFB49B1F2C2E7F6A400FE8610
31,668,229 UART: [art] PUB.Y = 542EEAF12624F552242906B78D30C8AE682C48636B8F121AAB05B6C26D25FA5109BA4FD04AD6ACA8124126CC97A8FA21
31,675,446 UART: [art] SIG.R = 5D71FEF87F304553C51ACD533136CDB55CAE875689D5192BD2771A07AE3C7EC84319328712694906E3DA3087EE5D934A
31,682,902 UART: [art] SIG.S = 7EE304E0D629AADCF5DA52A6F90C594BDBDC556528F0F8023E0EE54FA1285B69ED9A812FB3ED55D44F9855178F8A05AE
32,988,467 UART: Caliptra RT
32,989,173 UART: [state] CFI Enabled
33,148,652 UART: [rt] RT listening for mailbox commands...
33,179,850 UART: [rt]cmd =0x54514754, len=24
33,182,679 >>> mbox cmd response data (8 bytes)
33,183,078 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,213,068 UART: [rt]cmd =0x47544744, len=8
33,216,251 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,330 UART:
192,703 UART: Running Caliptra ROM ...
193,833 UART:
603,481 UART: [state] CFI Enabled
619,629 UART: [state] LifecycleState = Unprovisioned
621,574 UART: [state] DebugLocked = No
624,156 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,581 UART: [kat] SHA2-256
798,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,899 UART: [kat] ++
809,365 UART: [kat] sha1
821,298 UART: [kat] SHA2-256
824,017 UART: [kat] SHA2-384
828,731 UART: [kat] SHA2-512-ACC
831,094 UART: [kat] ECC-384
3,113,836 UART: [kat] HMAC-384Kdf
3,125,783 UART: [kat] LMS
4,315,908 UART: [kat] --
4,320,360 UART: [cold-reset] ++
4,321,439 UART: [fht] Storing FHT @ 0x50003400
4,332,698 UART: [idev] ++
4,333,254 UART: [idev] CDI.KEYID = 6
4,334,225 UART: [idev] SUBJECT.KEYID = 7
4,335,468 UART: [idev] UDS.KEYID = 0
4,336,469 ready_for_fw is high
4,336,695 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,110 UART: [idev] Erasing UDS.KEYID = 0
7,624,745 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,566 UART: [idev] --
7,651,294 UART: [ldev] ++
7,651,865 UART: [ldev] CDI.KEYID = 6
7,652,798 UART: [ldev] SUBJECT.KEYID = 5
7,654,004 UART: [ldev] AUTHORITY.KEYID = 7
7,655,291 UART: [ldev] FE.KEYID = 1
7,664,394 UART: [ldev] Erasing FE.KEYID = 1
10,951,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,446 UART: [ldev] --
13,310,432 UART: [fwproc] Waiting for Commands...
13,312,916 UART: [fwproc] Received command 0x46574c44
13,315,100 UART: [fwproc] Received Image of size 114124 bytes
17,375,433 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,207 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,103 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,834,272 >>> mbox cmd response: success
17,834,810 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,837,835 UART: [afmc] ++
17,838,414 UART: [afmc] CDI.KEYID = 6
17,839,431 UART: [afmc] SUBJECT.KEYID = 7
17,840,585 UART: [afmc] AUTHORITY.KEYID = 5
21,150,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,946 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,176 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,547 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,408 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,886 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,626 UART: [afmc] --
23,516,248 UART: [cold-reset] --
23,519,669 UART: [state] Locking Datavault
23,523,827 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,575 UART: [state] Locking ICCM
23,527,124 UART: [exit] Launching FMC @ 0x40000130
23,535,514 UART:
23,535,742 UART: Running Caliptra FMC ...
23,536,838 UART:
23,536,991 UART: [state] CFI Enabled
23,545,135 UART: [fht] FMC Alias Private Key: 7
25,876,430 UART: [art] Extend RT PCRs Done
25,877,656 UART: [art] Lock RT PCRs Done
25,879,215 UART: [art] Populate DV Done
25,884,785 UART: [fht] FMC Alias Private Key: 7
25,886,323 UART: [art] Derive CDI
25,887,087 UART: [art] Store in in slot 0x4
25,930,050 UART: [art] Derive Key Pair
25,931,060 UART: [art] Store priv key in slot 0x5
29,173,094 UART: [art] Derive Key Pair - Done
29,186,309 UART: [art] Signing Cert with AUTHO
29,187,603 UART: RITY.KEYID = 7
31,466,683 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,192 UART: [art] PUB.X = 2302EEFFABB170A52E5FDE302A73D490FDEE04987B2724B96FE8B7FCB7C1448B622D8D12BADEA834710EF14EF25FE676
31,475,483 UART: [art] PUB.Y = A9D5B79A011397FD0E40A282CEFA247A3077DC478086E425FB2278E885F3AE317F2008EFDDFE9685E985E550D6BA2C35
31,482,703 UART: [art] SIG.R = D35A0E2A4846AEAD7B79726E35439492CDEE2E5DDB75F8300A4093AB650DEB9827DB79144D1FD4EB220AA7E9E92B894C
31,490,129 UART: [art] SIG.S = 4D4C2AD496E6C71F2FB852B45E651DE76344754DFB78A950BA361FBB90489ADE41C9F109C8E3B3197175299A58CCE88A
32,795,349 UART: Caliptra RT
32,796,045 UART: [state] CFI Enabled
32,914,241 UART: [rt] RT listening for mailbox commands...
32,946,067 UART: [rt]cmd =0x54514754, len=24
32,948,641 >>> mbox cmd response data (8 bytes)
32,949,132 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
32,978,909 UART: [rt]cmd =0x47544744, len=8
32,981,942 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
4,124,907 ready_for_fw is high
4,125,327 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,069,441 >>> mbox cmd response: success
18,070,273 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,708,854 UART:
23,709,227 UART: Running Caliptra FMC ...
23,710,426 UART:
23,710,585 UART: [state] CFI Enabled
23,718,685 UART: [fht] FMC Alias Private Key: 7
26,049,568 UART: [art] Extend RT PCRs Done
26,050,798 UART: [art] Lock RT PCRs Done
26,052,560 UART: [art] Populate DV Done
26,058,193 UART: [fht] FMC Alias Private Key: 7
26,059,851 UART: [art] Derive CDI
26,060,669 UART: [art] Store in in slot 0x4
26,103,168 UART: [art] Derive Key Pair
26,104,209 UART: [art] Store priv key in slot 0x5
29,346,636 UART: [art] Derive Key Pair - Done
29,359,532 UART: [art] Signing Cert with AUTHO
29,360,838 UART: RITY.KEYID = 7
31,639,987 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,494 UART: [art] PUB.X = B87F7834B18D174F8DC7B8650909382A2E7801017F3BE525A4066C0EA838E7F3932BE020A6BB24C9E4F76B8E65406890
31,648,734 UART: [art] PUB.Y = 42A595A94251BCDD316EC4583A4E0AF95EB08A285642291A5BA07BA58115522D238D73352575D0DD391A1CABA6C22F80
31,655,972 UART: [art] SIG.R = 370097A318D6D28C6A6A752825385AB56BDF5A400B04D89C065B30E182E343A56DAEEB1416C7CB6514FAC2289E8E3426
31,663,365 UART: [art] SIG.S = B3D8327090CE7B746B9B9AB1D8F47702BEB261B96DC224A46A82D0C8E6ACF88D8E02AD00D92AA0292264FAE20EAF06B6
32,968,085 UART: Caliptra RT
32,968,799 UART: [state] CFI Enabled
33,086,726 UART: [rt] RT listening for mailbox commands...
33,118,410 UART: [rt]cmd =0x54514754, len=24
33,120,611 >>> mbox cmd response data (8 bytes)
33,121,020 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,150,690 UART: [rt]cmd =0x47544744, len=8
33,153,761 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,012 UART:
192,389 UART: Running Caliptra ROM ...
193,578 UART:
193,753 UART: [state] CFI Enabled
263,169 UART: [state] LifecycleState = Unprovisioned
265,088 UART: [state] DebugLocked = No
266,843 UART: [state] WD Timer not started. Device not locked for debugging
270,451 UART: [kat] SHA2-256
449,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,159 UART: [kat] ++
461,696 UART: [kat] sha1
472,647 UART: [kat] SHA2-256
475,651 UART: [kat] SHA2-384
482,354 UART: [kat] SHA2-512-ACC
485,316 UART: [kat] ECC-384
2,950,695 UART: [kat] HMAC-384Kdf
2,972,818 UART: [kat] LMS
3,502,273 UART: [kat] --
3,505,275 UART: [cold-reset] ++
3,506,373 UART: [fht] FHT @ 0x50003400
3,517,281 UART: [idev] ++
3,517,854 UART: [idev] CDI.KEYID = 6
3,518,882 UART: [idev] SUBJECT.KEYID = 7
3,519,986 UART: [idev] UDS.KEYID = 0
3,520,913 ready_for_fw is high
3,521,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,066 UART: [idev] Erasing UDS.KEYID = 0
6,026,668 UART: [idev] Sha1 KeyId Algorithm
6,049,687 UART: [idev] --
6,053,901 UART: [ldev] ++
6,054,487 UART: [ldev] CDI.KEYID = 6
6,055,410 UART: [ldev] SUBJECT.KEYID = 5
6,056,575 UART: [ldev] AUTHORITY.KEYID = 7
6,057,807 UART: [ldev] FE.KEYID = 1
6,100,921 UART: [ldev] Erasing FE.KEYID = 1
8,605,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,820 UART: [ldev] --
10,413,610 UART: [fwproc] Wait for Commands...
10,415,166 UART: [fwproc] Recv command 0x46574c44
10,417,257 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,279,246 >>> mbox cmd response: success
14,279,797 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,282,978 UART: [afmc] ++
14,283,593 UART: [afmc] CDI.KEYID = 6
14,284,529 UART: [afmc] SUBJECT.KEYID = 7
14,285,636 UART: [afmc] AUTHORITY.KEYID = 5
16,824,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,070 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,900 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,753 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,131 UART: [afmc] --
18,628,071 UART: [cold-reset] --
18,632,741 UART: [state] Locking Datavault
18,637,442 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,141 UART: [state] Locking ICCM
18,640,406 UART: [exit] Launching FMC @ 0x40000130
18,648,811 UART:
18,649,084 UART: Running Caliptra FMC ...
18,650,133 UART:
18,650,281 UART: [state] CFI Enabled
18,710,016 UART: [fht] FMC Alias Private Key: 7
20,474,129 UART: [art] Extend RT PCRs Done
20,475,347 UART: [art] Lock RT PCRs Done
20,476,996 UART: [art] Populate DV Done
20,482,296 UART: [fht] FMC Alias Private Key: 7
20,483,836 UART: [art] Derive CDI
20,484,604 UART: [art] Store in in slot 0x4
20,542,820 UART: [art] Derive Key Pair
20,543,819 UART: [art] Store priv key in slot 0x5
23,006,674 UART: [art] Derive Key Pair - Done
23,019,133 UART: [art] Signing Cert with AUTHO
23,020,437 UART: RITY.KEYID = 7
24,732,430 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,944 UART: [art] PUB.X = F32894124CDE6AD056BD591FAFAADC9E50DCD9F4EEFFC1106E58730D42852DFE667222048A55C70DC81954100BCD71DC
24,741,233 UART: [art] PUB.Y = 609A04070C318962BE0A5C7DDBDF46A9E5E0E64EA9987C4D7243D4BB8A8F0F53515C2023A42B0D78CFC30FB70AF7D3F6
24,748,470 UART: [art] SIG.R = 1D959DCD34FED00665694D6816FBBA9C261AF729BD954FCB7A7FD506274C84F6871D7BC856793EF9AC8C0AE1AA90823C
24,755,916 UART: [art] SIG.S = EDF931069CABA5C97BE3805E6C0ED24D792ED27E909904AADF3E4469CA4C001DA8C13FA6A64E6BDDF5361EC23F67012F
25,734,689 UART: Caliptra RT
25,735,405 UART: [state] CFI Enabled
25,900,336 UART: [rt] RT listening for mailbox commands...
25,931,742 UART: [rt]cmd =0x54514754, len=24
25,934,357 >>> mbox cmd response data (8 bytes)
25,934,909 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,964,737 UART: [rt]cmd =0x47544744, len=8
25,967,718 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,354,638 ready_for_fw is high
3,355,006 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,029,884 >>> mbox cmd response: success
14,030,639 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,313,896 UART:
18,314,311 UART: Running Caliptra FMC ...
18,315,424 UART:
18,315,579 UART: [state] CFI Enabled
18,381,770 UART: [fht] FMC Alias Private Key: 7
20,145,110 UART: [art] Extend RT PCRs Done
20,146,331 UART: [art] Lock RT PCRs Done
20,147,871 UART: [art] Populate DV Done
20,153,286 UART: [fht] FMC Alias Private Key: 7
20,154,774 UART: [art] Derive CDI
20,155,509 UART: [art] Store in in slot 0x4
20,214,518 UART: [art] Derive Key Pair
20,215,519 UART: [art] Store priv key in slot 0x5
22,678,604 UART: [art] Derive Key Pair - Done
22,691,607 UART: [art] Signing Cert with AUTHO
22,692,905 UART: RITY.KEYID = 7
24,404,293 UART: [art] Erasing AUTHORITY.KEYID = 7
24,405,816 UART: [art] PUB.X = 44CED14498CE5243B8D5D350F99304E6DEFE78C2D749796F94B1A3C18223B88BF8309DA3E36AFCE1038A459EB97A2E7D
24,413,070 UART: [art] PUB.Y = A4E9F743CA5E05FF065CF761841D143E3794A6FE92A7A2CE4F7D5D67290AFEFA737E2D10669C0279FFB364CFA6AF69AF
24,420,326 UART: [art] SIG.R = 906AA9E7B1153FBB4812AA6758A53B78528CBFAFDA910BD9AA8579426E2281C88D4E1AF9456E28FB86D7B0E65D830664
24,427,730 UART: [art] SIG.S = 9A1DCEE768AFA3FCB5142719ED68FD8EAEDF6CE678AD0A54E330AD81F1C73D742B8CB70B20C62342A36BC516DBE8F52A
25,406,790 UART: Caliptra RT
25,407,513 UART: [state] CFI Enabled
25,572,770 UART: [rt] RT listening for mailbox commands...
25,604,337 UART: [rt]cmd =0x54514754, len=24
25,606,851 >>> mbox cmd response data (8 bytes)
25,607,384 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,637,073 UART: [rt]cmd =0x47544744, len=8
25,640,229 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
192,413 UART:
192,784 UART: Running Caliptra ROM ...
193,928 UART:
603,569 UART: [state] CFI Enabled
618,996 UART: [state] LifecycleState = Unprovisioned
620,793 UART: [state] DebugLocked = No
622,457 UART: [state] WD Timer not started. Device not locked for debugging
627,000 UART: [kat] SHA2-256
806,099 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,692 UART: [kat] ++
818,130 UART: [kat] sha1
829,346 UART: [kat] SHA2-256
832,414 UART: [kat] SHA2-384
838,107 UART: [kat] SHA2-512-ACC
841,041 UART: [kat] ECC-384
3,281,773 UART: [kat] HMAC-384Kdf
3,294,433 UART: [kat] LMS
3,823,957 UART: [kat] --
3,827,235 UART: [cold-reset] ++
3,829,230 UART: [fht] FHT @ 0x50003400
3,840,404 UART: [idev] ++
3,840,963 UART: [idev] CDI.KEYID = 6
3,841,865 UART: [idev] SUBJECT.KEYID = 7
3,843,114 UART: [idev] UDS.KEYID = 0
3,844,031 ready_for_fw is high
3,844,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,943 UART: [idev] Erasing UDS.KEYID = 0
6,312,588 UART: [idev] Sha1 KeyId Algorithm
6,335,590 UART: [idev] --
6,340,709 UART: [ldev] ++
6,341,266 UART: [ldev] CDI.KEYID = 6
6,342,170 UART: [ldev] SUBJECT.KEYID = 5
6,343,372 UART: [ldev] AUTHORITY.KEYID = 7
6,344,594 UART: [ldev] FE.KEYID = 1
6,354,206 UART: [ldev] Erasing FE.KEYID = 1
8,829,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,580 UART: [ldev] --
10,620,928 UART: [fwproc] Wait for Commands...
10,622,852 UART: [fwproc] Recv command 0x46574c44
10,624,939 UART: [fwproc] Recv'd Img size: 114448 bytes
14,029,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,208 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,490,657 >>> mbox cmd response: success
14,491,225 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,494,632 UART: [afmc] ++
14,495,211 UART: [afmc] CDI.KEYID = 6
14,496,116 UART: [afmc] SUBJECT.KEYID = 7
14,497,325 UART: [afmc] AUTHORITY.KEYID = 5
16,992,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,177 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,941 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,956 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,858 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,545 UART: [afmc] --
18,788,196 UART: [cold-reset] --
18,793,884 UART: [state] Locking Datavault
18,799,026 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,666 UART: [state] Locking ICCM
18,802,324 UART: [exit] Launching FMC @ 0x40000130
18,810,714 UART:
18,810,951 UART: Running Caliptra FMC ...
18,812,046 UART:
18,812,196 UART: [state] CFI Enabled
18,820,425 UART: [fht] FMC Alias Private Key: 7
20,577,385 UART: [art] Extend RT PCRs Done
20,578,622 UART: [art] Lock RT PCRs Done
20,580,296 UART: [art] Populate DV Done
20,585,645 UART: [fht] FMC Alias Private Key: 7
20,587,174 UART: [art] Derive CDI
20,587,898 UART: [art] Store in in slot 0x4
20,630,427 UART: [art] Derive Key Pair
20,631,463 UART: [art] Store priv key in slot 0x5
23,058,096 UART: [art] Derive Key Pair - Done
23,071,091 UART: [art] Signing Cert with AUTHO
23,072,394 UART: RITY.KEYID = 7
24,777,471 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,968 UART: [art] PUB.X = 62A8A8B15C999C9C475A900652A32D673067AE1A9D1CCB297770D2166AF026B082180985245F743A6339609F0E9C8849
24,786,203 UART: [art] PUB.Y = B270A59F5F80D01908A2DFBB864C63553E35C3D437068997381E4831973B371745293DD7E532E2287642780AD5722E15
24,793,476 UART: [art] SIG.R = D2277B39E8DC5DE6C4F473E7D8672E7EAE3AE1791A9F16578D1A61BFE8EA9A89D8E7D191ED19BF1CACFBD1EA1D4E0483
24,800,851 UART: [art] SIG.S = C754DB3E27574791EBA5E339A08DFD25B91A08EEACA5448321D6F967D5F854CAFFE59793AC5B23038E8186DD962E8143
25,779,769 UART: Caliptra RT
25,780,485 UART: [state] CFI Enabled
25,897,352 UART: [rt] RT listening for mailbox commands...
25,928,889 UART: [rt]cmd =0x54514754, len=24
25,931,475 >>> mbox cmd response data (8 bytes)
25,931,933 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,961,485 UART: [rt]cmd =0x47544744, len=8
25,964,670 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,698,355 ready_for_fw is high
3,698,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,368 >>> mbox cmd response: success
14,267,974 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,509,241 UART:
18,509,631 UART: Running Caliptra FMC ...
18,510,811 UART:
18,510,994 UART: [state] CFI Enabled
18,518,938 UART: [fht] FMC Alias Private Key: 7
20,275,643 UART: [art] Extend RT PCRs Done
20,276,870 UART: [art] Lock RT PCRs Done
20,278,188 UART: [art] Populate DV Done
20,283,550 UART: [fht] FMC Alias Private Key: 7
20,285,259 UART: [art] Derive CDI
20,286,072 UART: [art] Store in in slot 0x4
20,328,454 UART: [art] Derive Key Pair
20,329,447 UART: [art] Store priv key in slot 0x5
22,756,461 UART: [art] Derive Key Pair - Done
22,769,423 UART: [art] Signing Cert with AUTHO
22,770,721 UART: RITY.KEYID = 7
24,476,055 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,561 UART: [art] PUB.X = 848C3D9B34B21F18350348B44B3D3C54E8F90566D856B171FA4ADAAE63A2D23FF7E020B33D33B9F011DA38DD261AC857
24,484,808 UART: [art] PUB.Y = B95E9FCB871A7C1D0DDB656EEAD7753D868D06A632BF61E3D562E38F87E37FF5577328A18BA3BDF3C6844290522A631C
24,492,058 UART: [art] SIG.R = DD02C0856A1245AFF76EA22C34CB38785CABEEFFD8BEFE6FAA820A503107401AFB3597B19EBDD3416C1CC1BE2D424E7E
24,499,558 UART: [art] SIG.S = 1E0A70EBF58D25A14705ADB707EA09676D984A0C7965B98F6877C7CD4F4355D4B9371397F0D7042EB8CAEBE4FFC82B63
25,478,771 UART: Caliptra RT
25,479,467 UART: [state] CFI Enabled
25,597,138 UART: [rt] RT listening for mailbox commands...
25,628,378 UART: [rt]cmd =0x54514754, len=24
25,631,148 >>> mbox cmd response data (8 bytes)
25,631,563 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,661,427 UART: [rt]cmd =0x47544744, len=8
25,664,408 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,437,922 ready_for_fw is high
3,438,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,733,847 >>> mbox cmd response: success
14,734,479 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,027,927 UART:
19,028,325 UART: Running Caliptra FMC ...
19,029,459 UART:
19,029,620 UART: [state] CFI Enabled
19,093,073 UART: [fht] FMC Alias Private Key: 7
20,857,528 UART: [art] Extend RT PCRs Done
20,858,743 UART: [art] Lock RT PCRs Done
20,860,149 UART: [art] Populate DV Done
20,865,520 UART: [fht] FMC Alias Private Key: 7
20,867,011 UART: [art] Derive CDI
20,867,773 UART: [art] Store in in slot 0x4
20,926,184 UART: [art] Derive Key Pair
20,927,188 UART: [art] Store priv key in slot 0x5
23,390,093 UART: [art] Derive Key Pair - Done
23,403,057 UART: [art] Signing Cert with AUTHO
23,404,368 UART: RITY.KEYID = 7
25,116,823 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,325 UART: [art] PUB.X = 4C178F268402CD57C872FC93E0A3132C61F8DE1B68E2600934CA9592A2B6860B06202E79A871514150A07010A5E8765D
25,125,564 UART: [art] PUB.Y = 8ECE368ED7ED58732335D6464B9BF9630BD80D6B7D8C5E009D4D35938D2AD7299F71BB3DBA26F20A630ECB1E81F18F78
25,132,816 UART: [art] SIG.R = 32274EC0AB7E2FEDBBBF1AE287865FE4F2DC23CE280AC6A635A296016D51397680A0D6B2EEF9824194FBD6E68AC655EA
25,140,215 UART: [art] SIG.S = E37F65153692570574B84A5C513DE07A77C623BD5F61CA72EDE3AD818567A99802517C3BD7F01BC4670D58BC6A1E075B
26,118,510 UART: Caliptra RT
26,119,201 UART: [state] CFI Enabled
26,285,691 UART: [rt] RT listening for mailbox commands...
26,317,490 UART: [rt]cmd =0x54514754, len=24
26,320,159 >>> mbox cmd response data (8 bytes)
26,320,664 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,350,438 UART: [rt]cmd =0x47544744, len=8
26,353,534 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
3,755,730 ready_for_fw is high
3,756,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,211 >>> mbox cmd response: success
14,951,987 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,203,633 UART:
19,204,021 UART: Running Caliptra FMC ...
19,205,147 UART:
19,205,298 UART: [state] CFI Enabled
19,213,447 UART: [fht] FMC Alias Private Key: 7
20,969,725 UART: [art] Extend RT PCRs Done
20,970,957 UART: [art] Lock RT PCRs Done
20,972,710 UART: [art] Populate DV Done
20,978,165 UART: [fht] FMC Alias Private Key: 7
20,979,812 UART: [art] Derive CDI
20,980,621 UART: [art] Store in in slot 0x4
21,023,052 UART: [art] Derive Key Pair
21,024,097 UART: [art] Store priv key in slot 0x5
23,450,849 UART: [art] Derive Key Pair - Done
23,464,064 UART: [art] Signing Cert with AUTHO
23,465,375 UART: RITY.KEYID = 7
25,171,138 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,645 UART: [art] PUB.X = 22FE036A70EA87F9465974CD08E614057E7DE0BC599F5DA33AF8C3F646F7F1E0FF2168471545333E638F08B21337FF9E
25,179,890 UART: [art] PUB.Y = 1984FD178AB40CDF895580055989B09B17BB79229010B11AD3A6ABA29941610C63D1F201ECBA7AA5895D1BA3527E4652
25,187,143 UART: [art] SIG.R = 846DD605DD21BAE04AAA0DD8D24D3A7EE78E19E54A7C9DD1C2A5DEC6432E95E007AC2AB13CA03202D3109C8F4D4A2442
25,194,528 UART: [art] SIG.S = 9246C2E74A298B0227BCC743891B1E16F523BD3F60F142DD491DCF65BA7844811E7D2256EEDC60229B429CEC199072E7
26,173,467 UART: Caliptra RT
26,174,178 UART: [state] CFI Enabled
26,292,115 UART: [rt] RT listening for mailbox commands...
26,323,537 UART: [rt]cmd =0x54514754, len=24
26,326,231 >>> mbox cmd response data (8 bytes)
26,326,729 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,356,285 UART: [rt]cmd =0x47544744, len=8
26,359,155 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,781 UART: [kat] SHA2-256
881,712 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,827 UART: [kat] ++
885,979 UART: [kat] sha1
890,269 UART: [kat] SHA2-256
892,207 UART: [kat] SHA2-384
895,056 UART: [kat] SHA2-512-ACC
896,957 UART: [kat] ECC-384
902,666 UART: [kat] HMAC-384Kdf
907,170 UART: [kat] LMS
1,475,366 UART: [kat] --
1,476,157 UART: [cold-reset] ++
1,476,523 UART: [fht] Storing FHT @ 0x50003400
1,479,284 UART: [idev] ++
1,479,452 UART: [idev] CDI.KEYID = 6
1,479,812 UART: [idev] SUBJECT.KEYID = 7
1,480,236 UART: [idev] UDS.KEYID = 0
1,480,581 ready_for_fw is high
1,480,581 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,988 UART: [idev] Erasing UDS.KEYID = 0
1,504,626 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,220 UART: [idev] --
1,514,301 UART: [ldev] ++
1,514,469 UART: [ldev] CDI.KEYID = 6
1,514,832 UART: [ldev] SUBJECT.KEYID = 5
1,515,258 UART: [ldev] AUTHORITY.KEYID = 7
1,515,721 UART: [ldev] FE.KEYID = 1
1,520,823 UART: [ldev] Erasing FE.KEYID = 1
1,545,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,978 UART: [ldev] --
1,585,391 UART: [fwproc] Waiting for Commands...
1,586,046 UART: [fwproc] Received command 0x46574c44
1,586,837 UART: [fwproc] Received Image of size 114448 bytes
2,886,224 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,572 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,924 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,843 >>> mbox cmd response: success
3,078,843 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,879 UART: [afmc] ++
3,080,047 UART: [afmc] CDI.KEYID = 6
3,080,409 UART: [afmc] SUBJECT.KEYID = 7
3,080,834 UART: [afmc] AUTHORITY.KEYID = 5
3,115,921 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,175 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,568 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,258 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,967 UART: [afmc] --
3,159,059 UART: [cold-reset] --
3,159,783 UART: [state] Locking Datavault
3,160,896 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,500 UART: [state] Locking ICCM
3,162,120 UART: [exit] Launching FMC @ 0x40000130
3,167,449 UART:
3,167,465 UART: Running Caliptra FMC ...
3,167,873 UART:
3,167,927 UART: [state] CFI Enabled
3,178,274 UART: [fht] FMC Alias Private Key: 7
3,286,289 UART: [art] Extend RT PCRs Done
3,286,717 UART: [art] Lock RT PCRs Done
3,287,941 UART: [art] Populate DV Done
3,295,996 UART: [fht] FMC Alias Private Key: 7
3,297,044 UART: [art] Derive CDI
3,297,324 UART: [art] Store in in slot 0x4
3,383,341 UART: [art] Derive Key Pair
3,383,701 UART: [art] Store priv key in slot 0x5
3,396,659 UART: [art] Derive Key Pair - Done
3,411,389 UART: [art] Signing Cert with AUTHO
3,411,869 UART: RITY.KEYID = 7
3,427,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,064 UART: [art] PUB.X = 7CFF65D5F581CC5D1D464BCA533D6ECC82CD09703C8FAC84F1E44EFB5E48FFC2A12508E4920DC2870B46558B4AA420FE
3,434,842 UART: [art] PUB.Y = 0FAF5D75FA67A8C7DEAB891053DEEEAEDCE3244BA12C8C75FDCCFE4D26397A82A4F6AB022D2E0072A103EC40AF077FF2
3,441,788 UART: [art] SIG.R = 019B9B4883EAB663DF87FC3D7B911ED51C587D20F06E5046C59B077165AB6E71B0E6F892D91AE53E0442B4F3B836C817
3,448,553 UART: [art] SIG.S = 7E6A3CA994FB2D95A93AD89C47B7BB432F060E7D71B9AEDFF0D17ED06614394B5D3AA398AA7F5A64AEFBF05485809E39
3,472,376 UART: Caliptra RT
3,472,629 UART: [state] CFI Enabled
3,580,615 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,331 UART: [rt]cmd =0x54514754, len=24
3,613,783 >>> mbox cmd response data (8 bytes)
3,613,784 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,133 UART: [rt]cmd =0x47544744, len=8
3,645,494 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,849 ready_for_fw is high
1,362,849 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,021 >>> mbox cmd response: success
2,930,021 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,937 UART:
2,990,953 UART: Running Caliptra FMC ...
2,991,361 UART:
2,991,415 UART: [state] CFI Enabled
3,001,976 UART: [fht] FMC Alias Private Key: 7
3,109,961 UART: [art] Extend RT PCRs Done
3,110,389 UART: [art] Lock RT PCRs Done
3,111,907 UART: [art] Populate DV Done
3,119,956 UART: [fht] FMC Alias Private Key: 7
3,121,072 UART: [art] Derive CDI
3,121,352 UART: [art] Store in in slot 0x4
3,206,817 UART: [art] Derive Key Pair
3,207,177 UART: [art] Store priv key in slot 0x5
3,219,903 UART: [art] Derive Key Pair - Done
3,234,921 UART: [art] Signing Cert with AUTHO
3,235,401 UART: RITY.KEYID = 7
3,250,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,124 UART: [art] PUB.X = 1AB0557CD0DECE2FB29D3B447A6B269B88FDBDB8E70EFA6483AC2313C7E5CDE3A29938A77475B3ACC16A96EBDDAFDB25
3,257,921 UART: [art] PUB.Y = 372D2D8D29F229CAB4ADAEEE4F65696247A113610A8E14CCDCFAC40B62F7DB46E3BC2A3877F4A82C9CF21CE3E6BA6E96
3,264,889 UART: [art] SIG.R = 2D2E08FDC580ED86EB48222C46CAD3341698CFA45F23B6499D8B11A51660D41C6BAFAEB115FBCD044623673CF7617791
3,271,661 UART: [art] SIG.S = 83CAA4BCAE1A17F87A7252881E9E5F042EBCBC6615E96D52C72508BDB3BBE19191459132DDC7554AB76A4370545FACC2
3,295,288 UART: Caliptra RT
3,295,541 UART: [state] CFI Enabled
3,403,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,542 UART: [rt]cmd =0x54514754, len=24
3,436,534 >>> mbox cmd response data (8 bytes)
3,436,535 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,890 UART: [rt]cmd =0x47544744, len=8
3,468,649 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,189 UART: [state] LifecycleState = Unprovisioned
86,844 UART: [state] DebugLocked = No
87,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,932 UART: [kat] SHA2-256
882,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,978 UART: [kat] ++
887,130 UART: [kat] sha1
891,406 UART: [kat] SHA2-256
893,344 UART: [kat] SHA2-384
896,125 UART: [kat] SHA2-512-ACC
898,026 UART: [kat] ECC-384
903,703 UART: [kat] HMAC-384Kdf
908,347 UART: [kat] LMS
1,476,543 UART: [kat] --
1,477,612 UART: [cold-reset] ++
1,478,150 UART: [fht] Storing FHT @ 0x50003400
1,480,965 UART: [idev] ++
1,481,133 UART: [idev] CDI.KEYID = 6
1,481,493 UART: [idev] SUBJECT.KEYID = 7
1,481,917 UART: [idev] UDS.KEYID = 0
1,482,262 ready_for_fw is high
1,482,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,689 UART: [idev] Erasing UDS.KEYID = 0
1,506,387 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,215 UART: [idev] --
1,516,300 UART: [ldev] ++
1,516,468 UART: [ldev] CDI.KEYID = 6
1,516,831 UART: [ldev] SUBJECT.KEYID = 5
1,517,257 UART: [ldev] AUTHORITY.KEYID = 7
1,517,720 UART: [ldev] FE.KEYID = 1
1,523,076 UART: [ldev] Erasing FE.KEYID = 1
1,548,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,293 UART: [ldev] --
1,587,736 UART: [fwproc] Waiting for Commands...
1,588,599 UART: [fwproc] Received command 0x46574c44
1,589,390 UART: [fwproc] Received Image of size 114448 bytes
2,888,192 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,234 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,503 >>> mbox cmd response: success
3,080,503 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,081,725 UART: [afmc] ++
3,081,893 UART: [afmc] CDI.KEYID = 6
3,082,255 UART: [afmc] SUBJECT.KEYID = 7
3,082,680 UART: [afmc] AUTHORITY.KEYID = 5
3,117,285 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,629 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,409 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,137 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,022 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,712 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,609 UART: [afmc] --
3,160,493 UART: [cold-reset] --
3,161,515 UART: [state] Locking Datavault
3,162,802 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,406 UART: [state] Locking ICCM
3,164,066 UART: [exit] Launching FMC @ 0x40000130
3,169,395 UART:
3,169,411 UART: Running Caliptra FMC ...
3,169,819 UART:
3,169,962 UART: [state] CFI Enabled
3,180,523 UART: [fht] FMC Alias Private Key: 7
3,287,920 UART: [art] Extend RT PCRs Done
3,288,348 UART: [art] Lock RT PCRs Done
3,289,932 UART: [art] Populate DV Done
3,298,105 UART: [fht] FMC Alias Private Key: 7
3,299,049 UART: [art] Derive CDI
3,299,329 UART: [art] Store in in slot 0x4
3,384,820 UART: [art] Derive Key Pair
3,385,180 UART: [art] Store priv key in slot 0x5
3,398,648 UART: [art] Derive Key Pair - Done
3,413,477 UART: [art] Signing Cert with AUTHO
3,413,957 UART: RITY.KEYID = 7
3,428,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,524 UART: [art] PUB.X = C8D7D3429C84E93D5E4A5135898BC3E956BACFAB7DE178C3E3A6CD2FA0334EC49240E19E3396124AAB367E35D55486DE
3,436,306 UART: [art] PUB.Y = E63CD9E4C9941796F82A058B888313867251CBEDA2A9CA0DC3A8A2FCF39E7A7626BE3C0733D2CC1F33B918F56CEBF802
3,443,258 UART: [art] SIG.R = C8BC36EF5FA18B207E201E68754722FBDC4F2D81F257A53DEDE9A51C5E8927651CE5551257CE40235C17479C4E33C9DE
3,450,036 UART: [art] SIG.S = 5D0A3E108844D791F01EA14EB2A3503972D0292E88CA428F6413F9BDEDB01E2EEC7875FB12922E5C3C89A78DFB77D8A1
3,473,516 UART: Caliptra RT
3,473,861 UART: [state] CFI Enabled
3,582,146 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,568 UART: [rt]cmd =0x54514754, len=24
3,614,738 >>> mbox cmd response data (8 bytes)
3,614,739 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,240 UART: [rt]cmd =0x47544744, len=8
3,646,963 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,922 ready_for_fw is high
1,362,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,180 >>> mbox cmd response: success
2,931,180 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,992,610 UART:
2,992,626 UART: Running Caliptra FMC ...
2,993,034 UART:
2,993,177 UART: [state] CFI Enabled
3,003,904 UART: [fht] FMC Alias Private Key: 7
3,112,191 UART: [art] Extend RT PCRs Done
3,112,619 UART: [art] Lock RT PCRs Done
3,114,113 UART: [art] Populate DV Done
3,122,250 UART: [fht] FMC Alias Private Key: 7
3,123,374 UART: [art] Derive CDI
3,123,654 UART: [art] Store in in slot 0x4
3,209,039 UART: [art] Derive Key Pair
3,209,399 UART: [art] Store priv key in slot 0x5
3,222,689 UART: [art] Derive Key Pair - Done
3,237,335 UART: [art] Signing Cert with AUTHO
3,237,815 UART: RITY.KEYID = 7
3,252,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,708 UART: [art] PUB.X = C76969C634104ED8915E98C0A2A24CC710C87B8B14671438ED544DFDF5523916D82534238D6BD0F3D95637AEC8581746
3,260,472 UART: [art] PUB.Y = 489AB7E08E95F624BDFB1EBABB0BB9D5292276BD12DCBCC1E6229144358B8EF611454DD819C65BF62C988C25C2694C55
3,267,431 UART: [art] SIG.R = BE7B1297C3C4D0FA488952704D7B84A9226AC5AB81762D6CCB4E2A95977EAFD200F8C3BECB6848FD9E7F887D8A2167B7
3,274,193 UART: [art] SIG.S = 890427C10DC634E365142D5B72DD7B7E237AA05531B546D88DE4E901C0A893AD11845F7DEEC6C170C88BFFB30A2B99FA
3,298,304 UART: Caliptra RT
3,298,649 UART: [state] CFI Enabled
3,407,859 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,321 UART: [rt]cmd =0x54514754, len=24
3,440,727 >>> mbox cmd response data (8 bytes)
3,440,728 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,003 UART: [rt]cmd =0x47544744, len=8
3,472,400 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
893,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,409 UART: [kat] ++
897,561 UART: [kat] sha1
901,845 UART: [kat] SHA2-256
903,785 UART: [kat] SHA2-384
906,538 UART: [kat] SHA2-512-ACC
908,439 UART: [kat] ECC-384
918,374 UART: [kat] HMAC-384Kdf
923,038 UART: [kat] LMS
1,171,366 UART: [kat] --
1,172,393 UART: [cold-reset] ++
1,172,911 UART: [fht] FHT @ 0x50003400
1,175,564 UART: [idev] ++
1,175,732 UART: [idev] CDI.KEYID = 6
1,176,092 UART: [idev] SUBJECT.KEYID = 7
1,176,516 UART: [idev] UDS.KEYID = 0
1,176,861 ready_for_fw is high
1,176,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,240 UART: [idev] Erasing UDS.KEYID = 0
1,200,943 UART: [idev] Sha1 KeyId Algorithm
1,209,359 UART: [idev] --
1,210,523 UART: [ldev] ++
1,210,691 UART: [ldev] CDI.KEYID = 6
1,211,054 UART: [ldev] SUBJECT.KEYID = 5
1,211,480 UART: [ldev] AUTHORITY.KEYID = 7
1,211,943 UART: [ldev] FE.KEYID = 1
1,217,063 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,238 UART: [fwproc] Wait for Commands...
1,282,990 UART: [fwproc] Recv command 0x46574c44
1,283,718 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,042 >>> mbox cmd response: success
2,775,042 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,182 UART: [afmc] ++
2,776,350 UART: [afmc] CDI.KEYID = 6
2,776,712 UART: [afmc] SUBJECT.KEYID = 7
2,777,137 UART: [afmc] AUTHORITY.KEYID = 5
2,812,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,117 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,845 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,730 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,449 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,369 UART: [afmc] --
2,856,435 UART: [cold-reset] --
2,857,079 UART: [state] Locking Datavault
2,858,160 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,764 UART: [state] Locking ICCM
2,859,426 UART: [exit] Launching FMC @ 0x40000130
2,864,755 UART:
2,864,771 UART: Running Caliptra FMC ...
2,865,179 UART:
2,865,233 UART: [state] CFI Enabled
2,875,638 UART: [fht] FMC Alias Private Key: 7
2,982,691 UART: [art] Extend RT PCRs Done
2,983,119 UART: [art] Lock RT PCRs Done
2,984,891 UART: [art] Populate DV Done
2,993,040 UART: [fht] FMC Alias Private Key: 7
2,994,028 UART: [art] Derive CDI
2,994,308 UART: [art] Store in in slot 0x4
3,080,055 UART: [art] Derive Key Pair
3,080,415 UART: [art] Store priv key in slot 0x5
3,093,897 UART: [art] Derive Key Pair - Done
3,108,473 UART: [art] Signing Cert with AUTHO
3,108,953 UART: RITY.KEYID = 7
3,124,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,844 UART: [art] PUB.X = EB56EAC83789E51FE1087D5F8198B1725DC1E92E8A2FBE41A9AD3B6E2E7EB5DC7816764A4D1751C371F7CAC96E80668F
3,131,625 UART: [art] PUB.Y = 1C9E813F6196529D4069F0E9D4B7EDF88D7ABE32AC7CE10D59BC347E68FF6E8A952D03AD90D5F51483D8B94CA6F9391B
3,138,583 UART: [art] SIG.R = E8D962F741A523DA6E3E9AC95845C94B1C9BF1BF6DC6DCB9BF709CF47596BFEB894758631BFDA06C5EBD73479664CC78
3,145,371 UART: [art] SIG.S = 4B7FFC3B936435B82239186959A374013DC66D6EF9DB420ABAD8B3059F8CE27B284FE4E04CBBA8C59F412E053FA4EF8B
3,169,480 UART: Caliptra RT
3,169,733 UART: [state] CFI Enabled
3,277,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,472 UART: [rt]cmd =0x54514754, len=24
3,310,402 >>> mbox cmd response data (8 bytes)
3,310,403 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,686 UART: [rt]cmd =0x47544744, len=8
3,342,219 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,075 ready_for_fw is high
1,060,075 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,555 >>> mbox cmd response: success
2,626,555 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,688,581 UART:
2,688,597 UART: Running Caliptra FMC ...
2,689,005 UART:
2,689,059 UART: [state] CFI Enabled
2,699,418 UART: [fht] FMC Alias Private Key: 7
2,807,229 UART: [art] Extend RT PCRs Done
2,807,657 UART: [art] Lock RT PCRs Done
2,809,107 UART: [art] Populate DV Done
2,817,262 UART: [fht] FMC Alias Private Key: 7
2,818,224 UART: [art] Derive CDI
2,818,504 UART: [art] Store in in slot 0x4
2,904,037 UART: [art] Derive Key Pair
2,904,397 UART: [art] Store priv key in slot 0x5
2,917,441 UART: [art] Derive Key Pair - Done
2,932,463 UART: [art] Signing Cert with AUTHO
2,932,943 UART: RITY.KEYID = 7
2,947,821 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,586 UART: [art] PUB.X = 8E9CC4BF2FFBDECB1D47A87FFD7C59F14F82FF2A3DF0EA5CFA387E1DD7ADF9514AADF56BFB25D05C8065F8609D7C5B6F
2,955,394 UART: [art] PUB.Y = 90E56AED4C6EA6202F2052D968EE1B71134D8AB69DBF7B8F27582245657F1BB689EF5EFC23448F2AD805DC5EEE1369E8
2,962,353 UART: [art] SIG.R = A8ABAD3B9AB988CB51DD4E9FB3A5A93F920E15717E2233D413BF2FEA0BDB225B6E0265EE3DFDF4C303B81437C6B8577F
2,969,133 UART: [art] SIG.S = AADFEE421FE4310A1B9EA7198977F96E005BDBC2E923CE5CEF7DDB917CDF964EE512A614BE9ADE4A3B60D0A6A60F184A
2,992,930 UART: Caliptra RT
2,993,183 UART: [state] CFI Enabled
3,100,685 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,349 UART: [rt]cmd =0x54514754, len=24
3,133,285 >>> mbox cmd response data (8 bytes)
3,133,286 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,579 UART: [rt]cmd =0x47544744, len=8
3,165,246 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
893,625 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,750 UART: [kat] ++
897,902 UART: [kat] sha1
902,322 UART: [kat] SHA2-256
904,262 UART: [kat] SHA2-384
906,929 UART: [kat] SHA2-512-ACC
908,830 UART: [kat] ECC-384
918,905 UART: [kat] HMAC-384Kdf
923,473 UART: [kat] LMS
1,171,801 UART: [kat] --
1,172,518 UART: [cold-reset] ++
1,173,026 UART: [fht] FHT @ 0x50003400
1,175,725 UART: [idev] ++
1,175,893 UART: [idev] CDI.KEYID = 6
1,176,253 UART: [idev] SUBJECT.KEYID = 7
1,176,677 UART: [idev] UDS.KEYID = 0
1,177,022 ready_for_fw is high
1,177,022 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,515 UART: [idev] Erasing UDS.KEYID = 0
1,201,514 UART: [idev] Sha1 KeyId Algorithm
1,210,202 UART: [idev] --
1,211,388 UART: [ldev] ++
1,211,556 UART: [ldev] CDI.KEYID = 6
1,211,919 UART: [ldev] SUBJECT.KEYID = 5
1,212,345 UART: [ldev] AUTHORITY.KEYID = 7
1,212,808 UART: [ldev] FE.KEYID = 1
1,218,092 UART: [ldev] Erasing FE.KEYID = 1
1,244,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,328 UART: [ldev] --
1,283,633 UART: [fwproc] Wait for Commands...
1,284,349 UART: [fwproc] Recv command 0x46574c44
1,285,077 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,574 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,885 >>> mbox cmd response: success
2,775,885 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,977 UART: [afmc] ++
2,777,145 UART: [afmc] CDI.KEYID = 6
2,777,507 UART: [afmc] SUBJECT.KEYID = 7
2,777,932 UART: [afmc] AUTHORITY.KEYID = 5
2,814,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,420 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,148 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,033 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,752 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,594 UART: [afmc] --
2,857,518 UART: [cold-reset] --
2,858,400 UART: [state] Locking Datavault
2,859,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,315 UART: [state] Locking ICCM
2,860,955 UART: [exit] Launching FMC @ 0x40000130
2,866,284 UART:
2,866,300 UART: Running Caliptra FMC ...
2,866,708 UART:
2,866,851 UART: [state] CFI Enabled
2,877,502 UART: [fht] FMC Alias Private Key: 7
2,985,589 UART: [art] Extend RT PCRs Done
2,986,017 UART: [art] Lock RT PCRs Done
2,987,843 UART: [art] Populate DV Done
2,996,124 UART: [fht] FMC Alias Private Key: 7
2,997,222 UART: [art] Derive CDI
2,997,502 UART: [art] Store in in slot 0x4
3,083,041 UART: [art] Derive Key Pair
3,083,401 UART: [art] Store priv key in slot 0x5
3,096,311 UART: [art] Derive Key Pair - Done
3,110,860 UART: [art] Signing Cert with AUTHO
3,111,340 UART: RITY.KEYID = 7
3,126,216 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,981 UART: [art] PUB.X = 9D16734D5AAC775C4CF666C5242930EAD1A1B507709225A4DCC1C267252276C7BC8980678C4262F122E90D7CB4F860E3
3,133,743 UART: [art] PUB.Y = F1D555D1F44B668131C1E6AE5FCC27BD4CE703B6D438E0AFF4A2938A77AEC8EF3311BA6A783BFF97411BDD22BB7AA979
3,140,712 UART: [art] SIG.R = 8291D491CC7D25A28528EF0C02366C3F0CEC4A5BFD7641B411243D4301BBFF9FD24ACB145CC20AD96CA1192288756528
3,147,473 UART: [art] SIG.S = F01BA9B4EA4DCFA7D899D1E1C55564F03EC82DB15C8494AAB88555B352F60338ACEBAAF4CEEBCDBF61E77C0484E1B4C9
3,171,392 UART: Caliptra RT
3,171,737 UART: [state] CFI Enabled
3,280,379 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,759 UART: [rt]cmd =0x54514754, len=24
3,312,713 >>> mbox cmd response data (8 bytes)
3,312,714 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,845 UART: [rt]cmd =0x47544744, len=8
3,344,338 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,706 ready_for_fw is high
1,060,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,412 >>> mbox cmd response: success
2,629,412 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,691,914 UART:
2,691,930 UART: Running Caliptra FMC ...
2,692,338 UART:
2,692,481 UART: [state] CFI Enabled
2,703,116 UART: [fht] FMC Alias Private Key: 7
2,810,935 UART: [art] Extend RT PCRs Done
2,811,363 UART: [art] Lock RT PCRs Done
2,812,881 UART: [art] Populate DV Done
2,820,972 UART: [fht] FMC Alias Private Key: 7
2,822,136 UART: [art] Derive CDI
2,822,416 UART: [art] Store in in slot 0x4
2,908,141 UART: [art] Derive Key Pair
2,908,501 UART: [art] Store priv key in slot 0x5
2,922,153 UART: [art] Derive Key Pair - Done
2,937,079 UART: [art] Signing Cert with AUTHO
2,937,559 UART: RITY.KEYID = 7
2,952,799 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,564 UART: [art] PUB.X = D5D3AE79836A5F200C3EE30820D1842A15F35D8F04E1504594479868CEB5A237A3C3C8F7B872672C8C9ED59A00189086
2,960,299 UART: [art] PUB.Y = 4C57F67FA2947AB21CA8E2B5FDD0B820C0371067BDAF0128A7AC3D1776F29AA5553B879941756610E1911ECD419281EF
2,967,250 UART: [art] SIG.R = BFE8E65981135F0C4E910E1FCB78AB06B9FD63DF08ED7997217CA463B24E52BDCC59963AFDD7F1887419688FC6E4E8DF
2,974,024 UART: [art] SIG.S = 467F9149C2EFDC0BC4F078840DF03E7634FF0C10DED59F6C3D9486456EF447349BE6C5D81DA8E5ED5EBC77EFFEB5BCE8
2,997,712 UART: Caliptra RT
2,998,057 UART: [state] CFI Enabled
3,105,036 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,854 UART: [rt]cmd =0x54514754, len=24
3,137,810 >>> mbox cmd response data (8 bytes)
3,137,811 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,032 UART: [rt]cmd =0x47544744, len=8
3,169,455 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,323 UART: [kat] SHA2-256
901,263 UART: [kat] SHA2-384
904,016 UART: [kat] SHA2-512-ACC
905,917 UART: [kat] ECC-384
915,586 UART: [kat] HMAC-384Kdf
920,278 UART: [kat] LMS
1,168,590 UART: [kat] --
1,169,439 UART: [cold-reset] ++
1,169,935 UART: [fht] FHT @ 0x50003400
1,172,701 UART: [idev] ++
1,172,869 UART: [idev] CDI.KEYID = 6
1,173,230 UART: [idev] SUBJECT.KEYID = 7
1,173,655 UART: [idev] UDS.KEYID = 0
1,174,001 ready_for_fw is high
1,174,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,198,323 UART: [idev] Sha1 KeyId Algorithm
1,207,005 UART: [idev] --
1,207,932 UART: [ldev] ++
1,208,100 UART: [ldev] CDI.KEYID = 6
1,208,464 UART: [ldev] SUBJECT.KEYID = 5
1,208,891 UART: [ldev] AUTHORITY.KEYID = 7
1,209,354 UART: [ldev] FE.KEYID = 1
1,214,478 UART: [ldev] Erasing FE.KEYID = 1
1,240,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,334 UART: [fwproc] Wait for Commands...
1,281,029 UART: [fwproc] Recv command 0x46574c44
1,281,762 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,302 >>> mbox cmd response: success
2,772,302 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,361 UART: [afmc] ++
2,773,529 UART: [afmc] CDI.KEYID = 6
2,773,892 UART: [afmc] SUBJECT.KEYID = 7
2,774,318 UART: [afmc] AUTHORITY.KEYID = 5
2,809,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,540 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,259 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,070 UART: [afmc] --
2,852,948 UART: [cold-reset] --
2,853,872 UART: [state] Locking Datavault
2,854,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,347 UART: [state] Locking ICCM
2,855,769 UART: [exit] Launching FMC @ 0x40000130
2,861,098 UART:
2,861,114 UART: Running Caliptra FMC ...
2,861,522 UART:
2,861,576 UART: [state] CFI Enabled
2,871,961 UART: [fht] FMC Alias Private Key: 7
2,980,294 UART: [art] Extend RT PCRs Done
2,980,722 UART: [art] Lock RT PCRs Done
2,982,000 UART: [art] Populate DV Done
2,990,093 UART: [fht] FMC Alias Private Key: 7
2,991,079 UART: [art] Derive CDI
2,991,359 UART: [art] Store in in slot 0x4
3,076,620 UART: [art] Derive Key Pair
3,076,980 UART: [art] Store priv key in slot 0x5
3,090,138 UART: [art] Derive Key Pair - Done
3,105,230 UART: [art] Signing Cert with AUTHO
3,105,710 UART: RITY.KEYID = 7
3,120,670 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,435 UART: [art] PUB.X = C6F35CC4488A588A2CB8BF0FAA0F8C2EE6772EE74BBCB210DED42CF668A8E893AEB887DB57455311D03431DF6B89329C
3,128,217 UART: [art] PUB.Y = 5B47EDF13A3968AC3AF1C4794291032C96B32275C9FE6F341E03EA1F05568A82C17D0242F1BB7855D8D6C36082DE371E
3,135,157 UART: [art] SIG.R = F7B976DB969EA63364A18291AC508750BB0DDEEC2EB9D36EF1DCB9C3ECF6EDE7D9D849615EA4F5E772C4193F20B5FCAF
3,141,950 UART: [art] SIG.S = 374685D0E85F6A71EA2C2E60E05B75AB4B9CE795294FDD2F54B88458CFE95588996FAF3716F485E2F23053E06C5C9C6E
3,165,829 UART: Caliptra RT
3,166,082 UART: [state] CFI Enabled
3,274,351 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,091 UART: [rt]cmd =0x54514754, len=24
3,307,003 >>> mbox cmd response data (8 bytes)
3,307,004 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,333 UART: [rt]cmd =0x47544744, len=8
3,338,960 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,616 ready_for_fw is high
1,055,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,702 >>> mbox cmd response: success
2,624,702 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,542 UART:
2,687,558 UART: Running Caliptra FMC ...
2,687,966 UART:
2,688,020 UART: [state] CFI Enabled
2,698,439 UART: [fht] FMC Alias Private Key: 7
2,806,192 UART: [art] Extend RT PCRs Done
2,806,620 UART: [art] Lock RT PCRs Done
2,808,274 UART: [art] Populate DV Done
2,816,315 UART: [fht] FMC Alias Private Key: 7
2,817,431 UART: [art] Derive CDI
2,817,711 UART: [art] Store in in slot 0x4
2,903,478 UART: [art] Derive Key Pair
2,903,838 UART: [art] Store priv key in slot 0x5
2,916,788 UART: [art] Derive Key Pair - Done
2,931,821 UART: [art] Signing Cert with AUTHO
2,932,301 UART: RITY.KEYID = 7
2,947,697 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,462 UART: [art] PUB.X = C04B8A8653A1DFE828391B481657B8E9586856BDE5CE8ED1816D5E5F9A35888AD15C310D0D506A4C4CC5E67384480E9C
2,955,227 UART: [art] PUB.Y = 8D63BE2D5D5446E6B492B6D8BD632CAC7845AAE1D103D63E8B27FAEA6683AF89074763D3476A93AAF66F6BC9AD5C2B2B
2,962,189 UART: [art] SIG.R = 436B516544AD93CBB48627667D55573C924C50C36B98A205C70C899D903A462FDEAADC51B7623E382020BEB576B91DC2
2,968,953 UART: [art] SIG.S = C5FCEFD96C7B65468558A7A8755FFF675EE0EF29BDB23B96952E575AA7A9BB94E72EC7A386ECD4F092E1EF753B232D00
2,992,344 UART: Caliptra RT
2,992,597 UART: [state] CFI Enabled
3,100,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,536 UART: [rt]cmd =0x54514754, len=24
3,132,480 >>> mbox cmd response data (8 bytes)
3,132,481 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,662 UART: [rt]cmd =0x47544744, len=8
3,164,321 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,939 UART: [kat] SHA2-512-ACC
906,840 UART: [kat] ECC-384
916,707 UART: [kat] HMAC-384Kdf
921,551 UART: [kat] LMS
1,169,863 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,268 UART: [fht] FHT @ 0x50003400
1,173,716 UART: [idev] ++
1,173,884 UART: [idev] CDI.KEYID = 6
1,174,245 UART: [idev] SUBJECT.KEYID = 7
1,174,670 UART: [idev] UDS.KEYID = 0
1,175,016 ready_for_fw is high
1,175,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,594 UART: [idev] Erasing UDS.KEYID = 0
1,200,178 UART: [idev] Sha1 KeyId Algorithm
1,209,018 UART: [idev] --
1,209,949 UART: [ldev] ++
1,210,117 UART: [ldev] CDI.KEYID = 6
1,210,481 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,155 UART: [ldev] --
1,282,517 UART: [fwproc] Wait for Commands...
1,283,150 UART: [fwproc] Recv command 0x46574c44
1,283,883 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,933 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,969 >>> mbox cmd response: success
2,775,969 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,122 UART: [afmc] ++
2,777,290 UART: [afmc] CDI.KEYID = 6
2,777,653 UART: [afmc] SUBJECT.KEYID = 7
2,778,079 UART: [afmc] AUTHORITY.KEYID = 5
2,813,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,197 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,926 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,809 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,528 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,221 UART: [afmc] --
2,857,229 UART: [cold-reset] --
2,857,987 UART: [state] Locking Datavault
2,859,162 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,766 UART: [state] Locking ICCM
2,860,192 UART: [exit] Launching FMC @ 0x40000130
2,865,521 UART:
2,865,537 UART: Running Caliptra FMC ...
2,865,945 UART:
2,866,088 UART: [state] CFI Enabled
2,876,379 UART: [fht] FMC Alias Private Key: 7
2,984,238 UART: [art] Extend RT PCRs Done
2,984,666 UART: [art] Lock RT PCRs Done
2,986,572 UART: [art] Populate DV Done
2,994,691 UART: [fht] FMC Alias Private Key: 7
2,995,817 UART: [art] Derive CDI
2,996,097 UART: [art] Store in in slot 0x4
3,081,826 UART: [art] Derive Key Pair
3,082,186 UART: [art] Store priv key in slot 0x5
3,094,930 UART: [art] Derive Key Pair - Done
3,109,680 UART: [art] Signing Cert with AUTHO
3,110,160 UART: RITY.KEYID = 7
3,125,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,299 UART: [art] PUB.X = 7C44BC7D1EBFD18C9B9D8B3FE22595ED3B361EDC71218D78C746E3A997A83DE70083F9D3CFB0BC9CACEC601A8B3BEBFD
3,133,077 UART: [art] PUB.Y = 67A6CD20F68F44805203D61695D0DC4EB35E5B2547D4ED6875C56751DB1E39157A4BA1F651E3DCAE5C8DEB97B8258129
3,140,030 UART: [art] SIG.R = 0F314CFE6423382FF44F050E15A29D5620156A03C7DAC9AABFFED031EAD754F114F89DF3ABB9DF984E8D2DDB6649A4C0
3,146,808 UART: [art] SIG.S = 1DFACB906251C07AFA3594F84891C678E81AE54ADCD5AE4E01A15EDD2D6D7F11D5CEE736F27E7D241774DC1450387A92
3,170,064 UART: Caliptra RT
3,170,409 UART: [state] CFI Enabled
3,278,304 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,158 UART: [rt]cmd =0x54514754, len=24
3,311,410 >>> mbox cmd response data (8 bytes)
3,311,411 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,056 UART: [rt]cmd =0x47544744, len=8
3,343,719 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,375 ready_for_fw is high
1,056,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,705 >>> mbox cmd response: success
2,624,705 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,127 UART:
2,687,143 UART: Running Caliptra FMC ...
2,687,551 UART:
2,687,694 UART: [state] CFI Enabled
2,698,299 UART: [fht] FMC Alias Private Key: 7
2,806,812 UART: [art] Extend RT PCRs Done
2,807,240 UART: [art] Lock RT PCRs Done
2,808,776 UART: [art] Populate DV Done
2,817,113 UART: [fht] FMC Alias Private Key: 7
2,818,181 UART: [art] Derive CDI
2,818,461 UART: [art] Store in in slot 0x4
2,904,604 UART: [art] Derive Key Pair
2,904,964 UART: [art] Store priv key in slot 0x5
2,918,384 UART: [art] Derive Key Pair - Done
2,932,927 UART: [art] Signing Cert with AUTHO
2,933,407 UART: RITY.KEYID = 7
2,948,371 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,136 UART: [art] PUB.X = 21F5EC739E4F5945481FD2AABDB670C28DB3169636C952371F23170A9DA6175AADB802AAA1D262BF268A7FF1A93AECA6
2,955,914 UART: [art] PUB.Y = 04FA50EBD5B3CD0D5D549D54FBCD066C645F4522042A8A819C7B35ED1F2293E20B2E98EEAF189F599FCB64846FEBCA32
2,962,867 UART: [art] SIG.R = 4B50B0C428894317A33207BC605D282EBF9FBBB0C2680A2DCCCB456747136D1923C052653F73C44A8611998F41BAF022
2,969,629 UART: [art] SIG.S = 888E6C85E55C1181899BDE9189063F10B37F1AE1BE44C882C1E1E22612CED32F49178BF29839F076EC32A8AE33CE9587
2,993,551 UART: Caliptra RT
2,993,896 UART: [state] CFI Enabled
3,102,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,785 UART: [rt]cmd =0x54514754, len=24
3,134,895 >>> mbox cmd response data (8 bytes)
3,134,896 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,399 UART: [rt]cmd =0x47544744, len=8
3,166,794 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,321 UART:
192,689 UART: Running Caliptra ROM ...
193,876 UART:
194,035 UART: [state] CFI Enabled
266,524 UART: [state] LifecycleState = Unprovisioned
268,451 UART: [state] DebugLocked = No
269,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,352 UART: [kat] SHA2-256
445,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,564 UART: [kat] ++
456,067 UART: [kat] sha1
468,392 UART: [kat] SHA2-256
471,043 UART: [kat] SHA2-384
477,040 UART: [kat] SHA2-512-ACC
479,415 UART: [kat] ECC-384
2,768,927 UART: [kat] HMAC-384Kdf
2,801,526 UART: [kat] LMS
3,991,813 UART: [kat] --
3,998,466 UART: [cold-reset] ++
4,000,684 UART: [fht] Storing FHT @ 0x50003400
4,013,517 UART: [idev] ++
4,014,164 UART: [idev] CDI.KEYID = 6
4,015,051 UART: [idev] SUBJECT.KEYID = 7
4,016,299 UART: [idev] UDS.KEYID = 0
4,017,291 ready_for_fw is high
4,017,502 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,161,098 UART: [idev] Erasing UDS.KEYID = 0
7,370,915 UART: [idev] Using Sha1 for KeyId Algorithm
7,392,774 UART: [idev] --
7,397,474 UART: [ldev] ++
7,398,044 UART: [ldev] CDI.KEYID = 6
7,399,015 UART: [ldev] SUBJECT.KEYID = 5
7,400,235 UART: [ldev] AUTHORITY.KEYID = 7
7,401,467 UART: [ldev] FE.KEYID = 1
7,446,362 UART: [ldev] Erasing FE.KEYID = 1
10,779,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,263 UART: [ldev] --
13,139,255 UART: [fwproc] Waiting for Commands...
13,141,628 UART: [fwproc] Received command 0x46574c44
13,143,830 UART: [fwproc] Received Image of size 114124 bytes
17,195,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,278,251 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,347,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,664,572 >>> mbox cmd response: success
17,665,163 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,668,849 UART: [afmc] ++
17,669,437 UART: [afmc] CDI.KEYID = 6
17,670,324 UART: [afmc] SUBJECT.KEYID = 7
17,671,592 UART: [afmc] AUTHORITY.KEYID = 5
21,030,446 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,602 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,909 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,268 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,101 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,557 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,945 UART: [afmc] --
23,402,327 UART: [cold-reset] --
23,405,815 UART: [state] Locking Datavault
23,412,291 UART: [state] Locking PCR0, PCR1 and PCR31
23,414,067 UART: [state] Locking ICCM
23,416,657 UART: [exit] Launching FMC @ 0x40000130
23,425,058 UART:
23,425,294 UART: Running Caliptra FMC ...
23,426,397 UART:
23,426,557 UART: [state] CFI Enabled
23,493,809 UART: [fht] FMC Alias Private Key: 7
25,832,269 UART: [art] Extend RT PCRs Done
25,833,478 UART: [art] Lock RT PCRs Done
25,835,316 UART: [art] Populate DV Done
25,840,724 UART: [fht] FMC Alias Private Key: 7
25,842,208 UART: [art] Derive CDI
25,842,990 UART: [art] Store in in slot 0x4
25,902,084 UART: [art] Derive Key Pair
25,903,109 UART: [art] Store priv key in slot 0x5
29,196,382 UART: [art] Derive Key Pair - Done
29,209,217 UART: [art] Signing Cert with AUTHO
29,210,521 UART: RITY.KEYID = 7
31,498,253 UART: [art] Erasing AUTHORITY.KEYID = 7
31,499,768 UART: [art] PUB.X = F7E97A57DD8D6AD4C2FC0320F2C3AAD9146293AFB4F493CD743A066A0879DE158C6C9891728ACD2F84DE55D47B3A502F
31,507,016 UART: [art] PUB.Y = 3A9119D17E25673D71AA27D9E0C5121690EFE7353F08CB05006D5847B8B045F1B387C9EBE6364D579B61275F0619C09A
31,514,256 UART: [art] SIG.R = 458A9F3FF2E1810EED3C692F4B1750B7B30E1F7F3BB78AAA813CF5D9CB39463A228FA4E1B48FEFD58A57F3CC5A8B90CC
31,521,652 UART: [art] SIG.S = EDE5B81E693A732712CD246D59E8534D39AAF4EF57D337C16A38A6E86D77F1D4396965846B592E2EDC1AC5793732CEB1
32,826,944 UART: Caliptra RT
32,827,643 UART: [state] CFI Enabled
32,989,336 UART: [rt] RT listening for mailbox commands...
33,020,796 UART: [rt]cmd =0x54514754, len=24
33,023,626 >>> mbox cmd response data (8 bytes)
33,024,644 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,054,855 UART: [rt]cmd =0x44504543, len=36
33,092,246 >>> mbox cmd response data (24 bytes)
33,092,895 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,122,726 UART: [rt]cmd =0x47544744, len=8
33,124,562 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,785,183 ready_for_fw is high
3,785,778 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,857,156 >>> mbox cmd response: success
17,857,813 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,545,804 UART:
23,546,184 UART: Running Caliptra FMC ...
23,547,286 UART:
23,547,439 UART: [state] CFI Enabled
23,615,843 UART: [fht] FMC Alias Private Key: 7
25,954,045 UART: [art] Extend RT PCRs Done
25,955,266 UART: [art] Lock RT PCRs Done
25,956,864 UART: [art] Populate DV Done
25,962,195 UART: [fht] FMC Alias Private Key: 7
25,963,794 UART: [art] Derive CDI
25,964,536 UART: [art] Store in in slot 0x4
26,023,442 UART: [art] Derive Key Pair
26,024,484 UART: [art] Store priv key in slot 0x5
29,317,105 UART: [art] Derive Key Pair - Done
29,330,209 UART: [art] Signing Cert with AUTHO
29,331,525 UART: RITY.KEYID = 7
31,618,919 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,425 UART: [art] PUB.X = 34356AD5B9B638D2BFCACAC294B319FE9C725FB67DB9D24249445D1703266955D0D9FD3AFFBBCAAACEA9DBDB6A9239A7
31,627,689 UART: [art] PUB.Y = 025211DEA7274495C68E24D01A3E48E7A0BBDDF01EA0E49E2653408440C7A7DB6CFC971EE6EE2CE090975C993F08BC88
31,634,949 UART: [art] SIG.R = 4B97D81055626E70C4143684B74A4CD3B4D111D3D1F009314CA2609D6B105E29B2958758E48CBC6382040518923A787B
31,642,306 UART: [art] SIG.S = AC05CDC6F141D5851903D7D70330592F09D1E450878F84DA98BACD9B824A84F71311D087083122EDDA396B5224613A18
32,947,912 UART: Caliptra RT
32,948,626 UART: [state] CFI Enabled
33,107,779 UART: [rt] RT listening for mailbox commands...
33,139,368 UART: [rt]cmd =0x54514754, len=24
33,141,886 >>> mbox cmd response data (8 bytes)
33,142,764 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,172,809 UART: [rt]cmd =0x44504543, len=36
33,210,839 >>> mbox cmd response data (24 bytes)
33,211,464 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,241,311 UART: [rt]cmd =0x47544744, len=8
33,243,187 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,277 UART:
192,655 UART: Running Caliptra ROM ...
193,752 UART:
603,322 UART: [state] CFI Enabled
618,652 UART: [state] LifecycleState = Unprovisioned
620,554 UART: [state] DebugLocked = No
622,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,227 UART: [kat] SHA2-256
797,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,483 UART: [kat] ++
809,084 UART: [kat] sha1
819,536 UART: [kat] SHA2-256
822,259 UART: [kat] SHA2-384
827,887 UART: [kat] SHA2-512-ACC
830,251 UART: [kat] ECC-384
3,114,087 UART: [kat] HMAC-384Kdf
3,124,547 UART: [kat] LMS
4,314,674 UART: [kat] --
4,318,674 UART: [cold-reset] ++
4,319,911 UART: [fht] Storing FHT @ 0x50003400
4,331,530 UART: [idev] ++
4,332,161 UART: [idev] CDI.KEYID = 6
4,333,037 UART: [idev] SUBJECT.KEYID = 7
4,334,356 UART: [idev] UDS.KEYID = 0
4,335,342 ready_for_fw is high
4,335,538 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,869 UART: [idev] Erasing UDS.KEYID = 0
7,621,867 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,268 UART: [idev] --
7,648,471 UART: [ldev] ++
7,649,092 UART: [ldev] CDI.KEYID = 6
7,650,003 UART: [ldev] SUBJECT.KEYID = 5
7,651,260 UART: [ldev] AUTHORITY.KEYID = 7
7,652,506 UART: [ldev] FE.KEYID = 1
7,662,020 UART: [ldev] Erasing FE.KEYID = 1
10,954,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,818 UART: [ldev] --
13,315,487 UART: [fwproc] Waiting for Commands...
13,317,465 UART: [fwproc] Received command 0x46574c44
13,319,695 UART: [fwproc] Received Image of size 114124 bytes
17,369,488 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,430 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,836,976 >>> mbox cmd response: success
17,837,489 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,841,114 UART: [afmc] ++
17,841,700 UART: [afmc] CDI.KEYID = 6
17,842,657 UART: [afmc] SUBJECT.KEYID = 7
17,843,870 UART: [afmc] AUTHORITY.KEYID = 5
21,161,676 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,262 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,569 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,942 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,772 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,209 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,195 UART: [afmc] --
23,525,675 UART: [cold-reset] --
23,530,286 UART: [state] Locking Datavault
23,536,710 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,405 UART: [state] Locking ICCM
23,541,087 UART: [exit] Launching FMC @ 0x40000130
23,549,480 UART:
23,549,712 UART: Running Caliptra FMC ...
23,550,839 UART:
23,550,997 UART: [state] CFI Enabled
23,558,604 UART: [fht] FMC Alias Private Key: 7
25,889,382 UART: [art] Extend RT PCRs Done
25,890,598 UART: [art] Lock RT PCRs Done
25,892,054 UART: [art] Populate DV Done
25,897,650 UART: [fht] FMC Alias Private Key: 7
25,899,299 UART: [art] Derive CDI
25,900,115 UART: [art] Store in in slot 0x4
25,942,648 UART: [art] Derive Key Pair
25,943,646 UART: [art] Store priv key in slot 0x5
29,185,422 UART: [art] Derive Key Pair - Done
29,198,515 UART: [art] Signing Cert with AUTHO
29,199,809 UART: RITY.KEYID = 7
31,479,075 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,582 UART: [art] PUB.X = 31244EDA88CA4C1BE87B9CB7D0C7A5123E1C65BC97A789EB3A053EA0ACFA3AB33417390362DFDC21E06A844D1595BDEA
31,487,892 UART: [art] PUB.Y = 63242CB6ADF36BFB7EF42AD28A93602FE10B9439B36DA419D05B3CD43D73A77EF8850B8748D97F0DDC27CC8D4717062C
31,495,102 UART: [art] SIG.R = 64976C62C7E08B2FA314F7D8F14F21D36A050974EE3396421AA71D68E7FDF4BC3DA83C99DD08DD6629CD89A366E36902
31,502,500 UART: [art] SIG.S = A44FA67869336DCC08BFB1676998ADF1C57DF42D84FE3E6818E87CDE0AD314B14E73147B19E7340004CA0F0E5B21DCF6
32,807,811 UART: Caliptra RT
32,808,522 UART: [state] CFI Enabled
32,925,584 UART: [rt] RT listening for mailbox commands...
32,956,927 UART: [rt]cmd =0x54514754, len=24
32,959,698 >>> mbox cmd response data (8 bytes)
32,960,639 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
32,990,689 UART: [rt]cmd =0x44504543, len=36
33,028,619 >>> mbox cmd response data (24 bytes)
33,029,283 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,059,010 UART: [rt]cmd =0x47544744, len=8
33,060,902 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
4,127,239 ready_for_fw is high
4,127,848 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,064,640 >>> mbox cmd response: success
18,065,309 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,702,075 UART:
23,702,456 UART: Running Caliptra FMC ...
23,703,556 UART:
23,703,699 UART: [state] CFI Enabled
23,711,707 UART: [fht] FMC Alias Private Key: 7
26,042,817 UART: [art] Extend RT PCRs Done
26,044,044 UART: [art] Lock RT PCRs Done
26,045,891 UART: [art] Populate DV Done
26,051,422 UART: [fht] FMC Alias Private Key: 7
26,053,018 UART: [art] Derive CDI
26,053,831 UART: [art] Store in in slot 0x4
26,096,274 UART: [art] Derive Key Pair
26,097,310 UART: [art] Store priv key in slot 0x5
29,339,499 UART: [art] Derive Key Pair - Done
29,352,218 UART: [art] Signing Cert with AUTHO
29,353,522 UART: RITY.KEYID = 7
31,632,974 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,484 UART: [art] PUB.X = 600E91AAED77AD35C2509BD6D80C755D7FE5AF7C6C49D7C2E77F7DD639248F83F623395CF9B2A78A0042B9071A6128F7
31,641,742 UART: [art] PUB.Y = 3158FF2DCD4E3791D9CEB617316A5CA581D1FE73D316CBA4A43EB5EF88B8E7C1B7B0D3DAE86A1A63E6642D756370899B
31,648,974 UART: [art] SIG.R = 11438AEC8C181A3066E88841E6F3B534B8BAB00ED3E55F9649F98CF7C7D996B8D7A4477917A2E9A601B4392C85C7BC2D
31,656,355 UART: [art] SIG.S = 4CBFE566155572EB36E165B3B55F31F29C241FE391D0CEDC917686BC1B84E39B531D10AD2B6DB456B7A35461D2B3C653
32,961,837 UART: Caliptra RT
32,962,538 UART: [state] CFI Enabled
33,080,460 UART: [rt] RT listening for mailbox commands...
33,112,270 UART: [rt]cmd =0x54514754, len=24
33,114,754 >>> mbox cmd response data (8 bytes)
33,115,777 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,145,640 UART: [rt]cmd =0x44504543, len=36
33,183,052 >>> mbox cmd response data (24 bytes)
33,183,665 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,213,616 UART: [rt]cmd =0x47544744, len=8
33,215,482 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,093 UART:
192,462 UART: Running Caliptra ROM ...
193,658 UART:
193,810 UART: [state] CFI Enabled
264,191 UART: [state] LifecycleState = Unprovisioned
266,026 UART: [state] DebugLocked = No
267,279 UART: [state] WD Timer not started. Device not locked for debugging
271,584 UART: [kat] SHA2-256
450,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,292 UART: [kat] ++
462,831 UART: [kat] sha1
474,297 UART: [kat] SHA2-256
477,295 UART: [kat] SHA2-384
484,840 UART: [kat] SHA2-512-ACC
487,768 UART: [kat] ECC-384
2,946,847 UART: [kat] HMAC-384Kdf
2,972,226 UART: [kat] LMS
3,501,694 UART: [kat] --
3,504,571 UART: [cold-reset] ++
3,506,782 UART: [fht] FHT @ 0x50003400
3,517,329 UART: [idev] ++
3,517,895 UART: [idev] CDI.KEYID = 6
3,518,817 UART: [idev] SUBJECT.KEYID = 7
3,519,991 UART: [idev] UDS.KEYID = 0
3,520,913 ready_for_fw is high
3,521,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,051 UART: [idev] Erasing UDS.KEYID = 0
6,023,859 UART: [idev] Sha1 KeyId Algorithm
6,046,220 UART: [idev] --
6,050,377 UART: [ldev] ++
6,050,948 UART: [ldev] CDI.KEYID = 6
6,051,832 UART: [ldev] SUBJECT.KEYID = 5
6,053,042 UART: [ldev] AUTHORITY.KEYID = 7
6,054,280 UART: [ldev] FE.KEYID = 1
6,101,661 UART: [ldev] Erasing FE.KEYID = 1
8,603,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,959 UART: [ldev] --
10,395,945 UART: [fwproc] Wait for Commands...
10,398,522 UART: [fwproc] Recv command 0x46574c44
10,400,578 UART: [fwproc] Recv'd Img size: 114448 bytes
13,805,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,591 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,263,637 >>> mbox cmd response: success
14,264,226 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,267,537 UART: [afmc] ++
14,268,152 UART: [afmc] CDI.KEYID = 6
14,269,068 UART: [afmc] SUBJECT.KEYID = 7
14,270,233 UART: [afmc] AUTHORITY.KEYID = 5
16,814,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,537,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,538,971 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,554,769 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,570,764 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,586,692 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,610,179 UART: [afmc] --
18,614,053 UART: [cold-reset] --
18,617,861 UART: [state] Locking Datavault
18,623,425 UART: [state] Locking PCR0, PCR1 and PCR31
18,625,067 UART: [state] Locking ICCM
18,626,733 UART: [exit] Launching FMC @ 0x40000130
18,635,189 UART:
18,635,424 UART: Running Caliptra FMC ...
18,636,529 UART:
18,636,694 UART: [state] CFI Enabled
18,694,773 UART: [fht] FMC Alias Private Key: 7
20,458,682 UART: [art] Extend RT PCRs Done
20,459,901 UART: [art] Lock RT PCRs Done
20,461,499 UART: [art] Populate DV Done
20,466,848 UART: [fht] FMC Alias Private Key: 7
20,468,486 UART: [art] Derive CDI
20,469,239 UART: [art] Store in in slot 0x4
20,527,283 UART: [art] Derive Key Pair
20,528,323 UART: [art] Store priv key in slot 0x5
22,990,696 UART: [art] Derive Key Pair - Done
23,003,529 UART: [art] Signing Cert with AUTHO
23,004,836 UART: RITY.KEYID = 7
24,716,389 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,889 UART: [art] PUB.X = 91CDF1686B546DF6FF54828251262D4228FAE1999DADDB85967B05D9658EE2CD18F7E4D8A9A70206DF3F48CEF3AD26B0
24,725,149 UART: [art] PUB.Y = 4F61D661DFAA84DFD518072F40327459AD47FE6DB92E56CBDF149729253C4983AFE9EEC98945933473271F4DC44AF0CD
24,732,445 UART: [art] SIG.R = B9E213387CA9A64AE6CC769A6D7BFCCD1321CD4BB1387AE0F2DCB0CD6F83BB035AD96631008039E09DEEB9788DAFF169
24,739,886 UART: [art] SIG.S = B726648839BED059AFC1B6065761DFB6B6C168C38C0A77DC780D9176B11F07BB6B32C88143F35C62B7B6391B2A048177
25,719,005 UART: Caliptra RT
25,719,700 UART: [state] CFI Enabled
25,884,516 UART: [rt] RT listening for mailbox commands...
25,915,934 UART: [rt]cmd =0x54514754, len=24
25,918,520 >>> mbox cmd response data (8 bytes)
25,919,551 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,949,616 UART: [rt]cmd =0x44504543, len=36
25,987,237 >>> mbox cmd response data (24 bytes)
25,987,847 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,017,461 UART: [rt]cmd =0x47544744, len=8
26,019,050 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,373,549 ready_for_fw is high
3,373,972 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,056,340 >>> mbox cmd response: success
14,056,919 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,339,882 UART:
18,340,273 UART: Running Caliptra FMC ...
18,341,374 UART:
18,341,529 UART: [state] CFI Enabled
18,406,884 UART: [fht] FMC Alias Private Key: 7
20,171,000 UART: [art] Extend RT PCRs Done
20,172,235 UART: [art] Lock RT PCRs Done
20,173,754 UART: [art] Populate DV Done
20,179,445 UART: [fht] FMC Alias Private Key: 7
20,180,969 UART: [art] Derive CDI
20,181,738 UART: [art] Store in in slot 0x4
20,239,407 UART: [art] Derive Key Pair
20,240,405 UART: [art] Store priv key in slot 0x5
22,703,751 UART: [art] Derive Key Pair - Done
22,716,546 UART: [art] Signing Cert with AUTHO
22,717,859 UART: RITY.KEYID = 7
24,429,489 UART: [art] Erasing AUTHORITY.KEYID = 7
24,430,996 UART: [art] PUB.X = 14489F5C8B21DECCE04AB86143AA55A84EE3053DB973CD925123142E6F5EA3D59D4FAD045A4BE5F402DC562079586699
24,438,293 UART: [art] PUB.Y = 561C85EDDD807C91F497D7AF8ABE9F59F13E34BE348A404C06B0D0C20546F32B1625D7BF1B35EB20FA6BFCA70F80F0E9
24,445,544 UART: [art] SIG.R = 3A9E25C10E892D6086B3DC49943F31898BC40FA06B0FC33731946E7A3A9BC6B6FCA96AA2B432651A21F7990FE65FEBE6
24,452,944 UART: [art] SIG.S = 247058D0B45CD137DD7A56A8D56024C2553539827F9ADE8A8D6EAF1B9776B254A35C84B0A441D2484F3A27D993F572F1
25,431,982 UART: Caliptra RT
25,432,679 UART: [state] CFI Enabled
25,598,763 UART: [rt] RT listening for mailbox commands...
25,630,225 UART: [rt]cmd =0x54514754, len=24
25,632,946 >>> mbox cmd response data (8 bytes)
25,633,712 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,663,913 UART: [rt]cmd =0x44504543, len=36
25,701,200 >>> mbox cmd response data (24 bytes)
25,701,860 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,731,807 UART: [rt]cmd =0x47544744, len=8
25,733,969 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
192,414 UART:
192,777 UART: Running Caliptra ROM ...
193,884 UART:
603,605 UART: [state] CFI Enabled
617,986 UART: [state] LifecycleState = Unprovisioned
619,889 UART: [state] DebugLocked = No
622,699 UART: [state] WD Timer not started. Device not locked for debugging
626,725 UART: [kat] SHA2-256
805,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,412 UART: [kat] ++
817,857 UART: [kat] sha1
829,856 UART: [kat] SHA2-256
832,850 UART: [kat] SHA2-384
838,119 UART: [kat] SHA2-512-ACC
841,054 UART: [kat] ECC-384
3,281,455 UART: [kat] HMAC-384Kdf
3,292,476 UART: [kat] LMS
3,821,987 UART: [kat] --
3,826,824 UART: [cold-reset] ++
3,829,316 UART: [fht] FHT @ 0x50003400
3,840,212 UART: [idev] ++
3,840,778 UART: [idev] CDI.KEYID = 6
3,841,674 UART: [idev] SUBJECT.KEYID = 7
3,842,910 UART: [idev] UDS.KEYID = 0
3,843,834 ready_for_fw is high
3,844,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,723 UART: [idev] Erasing UDS.KEYID = 0
6,316,897 UART: [idev] Sha1 KeyId Algorithm
6,339,101 UART: [idev] --
6,343,033 UART: [ldev] ++
6,343,602 UART: [ldev] CDI.KEYID = 6
6,344,557 UART: [ldev] SUBJECT.KEYID = 5
6,345,708 UART: [ldev] AUTHORITY.KEYID = 7
6,346,981 UART: [ldev] FE.KEYID = 1
6,358,857 UART: [ldev] Erasing FE.KEYID = 1
8,834,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,434 UART: [ldev] --
10,625,464 UART: [fwproc] Wait for Commands...
10,628,313 UART: [fwproc] Recv command 0x46574c44
10,630,397 UART: [fwproc] Recv'd Img size: 114448 bytes
14,036,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,496,435 >>> mbox cmd response: success
14,496,977 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,501,341 UART: [afmc] ++
14,501,918 UART: [afmc] CDI.KEYID = 6
14,502,983 UART: [afmc] SUBJECT.KEYID = 7
14,504,079 UART: [afmc] AUTHORITY.KEYID = 5
17,002,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,383 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,421 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,273 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,794,863 UART: [afmc] --
18,798,687 UART: [cold-reset] --
18,802,277 UART: [state] Locking Datavault
18,808,975 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,673 UART: [state] Locking ICCM
18,812,817 UART: [exit] Launching FMC @ 0x40000130
18,821,256 UART:
18,821,483 UART: Running Caliptra FMC ...
18,822,573 UART:
18,822,722 UART: [state] CFI Enabled
18,830,949 UART: [fht] FMC Alias Private Key: 7
20,587,049 UART: [art] Extend RT PCRs Done
20,588,272 UART: [art] Lock RT PCRs Done
20,590,001 UART: [art] Populate DV Done
20,595,627 UART: [fht] FMC Alias Private Key: 7
20,597,221 UART: [art] Derive CDI
20,598,026 UART: [art] Store in in slot 0x4
20,640,520 UART: [art] Derive Key Pair
20,641,556 UART: [art] Store priv key in slot 0x5
23,067,557 UART: [art] Derive Key Pair - Done
23,080,405 UART: [art] Signing Cert with AUTHO
23,081,703 UART: RITY.KEYID = 7
24,787,736 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,249 UART: [art] PUB.X = 4F590255D0497E81F97DD95147BEF024BC3E6C1C60BA40BF80561F4A6F89179F06A0F188D9B6D1386E9BA4F2A181690C
24,796,486 UART: [art] PUB.Y = FE6EEDF5C130DD3DB12C983A1DEA3A0EE7F1ADD015895E6B055EF7DB5D278FF8215901A8C0FFBE39DB1C988D67021AD0
24,803,814 UART: [art] SIG.R = 0C6921E625A7801857CFFBA62288965DC472F11D284618B8F20E44422FB3E1BB4C08DE480784CB5686B7FCC65BF2CE26
24,811,199 UART: [art] SIG.S = FD5834EFDD98C9292B833D52E00D2A121532EA665FEE0D437003EADDC02A7B7A424F5291F587923D917E884FFAB8F29C
25,790,499 UART: Caliptra RT
25,791,212 UART: [state] CFI Enabled
25,908,290 UART: [rt] RT listening for mailbox commands...
25,939,968 UART: [rt]cmd =0x54514754, len=24
25,942,541 >>> mbox cmd response data (8 bytes)
25,943,746 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,974,108 UART: [rt]cmd =0x44504543, len=36
26,011,010 >>> mbox cmd response data (24 bytes)
26,011,670 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,041,286 UART: [rt]cmd =0x47544744, len=8
26,042,900 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,705,091 ready_for_fw is high
3,705,650 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,251 >>> mbox cmd response: success
14,273,877 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,514,320 UART:
18,514,716 UART: Running Caliptra FMC ...
18,515,852 UART:
18,516,002 UART: [state] CFI Enabled
18,523,898 UART: [fht] FMC Alias Private Key: 7
20,280,824 UART: [art] Extend RT PCRs Done
20,282,022 UART: [art] Lock RT PCRs Done
20,283,751 UART: [art] Populate DV Done
20,289,199 UART: [fht] FMC Alias Private Key: 7
20,290,795 UART: [art] Derive CDI
20,291,605 UART: [art] Store in in slot 0x4
20,334,219 UART: [art] Derive Key Pair
20,335,259 UART: [art] Store priv key in slot 0x5
22,761,602 UART: [art] Derive Key Pair - Done
22,774,601 UART: [art] Signing Cert with AUTHO
22,775,894 UART: RITY.KEYID = 7
24,482,004 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,493 UART: [art] PUB.X = 2AA6C042993D8615D3077772DBE102834CB0217C2ABE911758458B897B77DE16E8A5FDC93B15E54475DE8BC46CE391F8
24,490,732 UART: [art] PUB.Y = 6F1F6F4911072C7D2865BCAD4EC4E982BC1EA299489594353F8920EC771647B42C67947B8419A1A75320991265015CE6
24,497,960 UART: [art] SIG.R = 310C46D3B59DBA3CC268A461F4C7B9BA0B576CB228145828734B1810B16D6EB1C48C4E252908F5614D9BEA2B178CAD5F
24,505,370 UART: [art] SIG.S = 09C0D7750E3B3177C984E3D33F5041BAD6E8C694BB019CEA2C88AFD1F4701CDA76515BB138DFAC23E228E40ADFA66D03
25,484,273 UART: Caliptra RT
25,484,987 UART: [state] CFI Enabled
25,602,914 UART: [rt] RT listening for mailbox commands...
25,634,750 UART: [rt]cmd =0x54514754, len=24
25,637,309 >>> mbox cmd response data (8 bytes)
25,638,193 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,668,034 UART: [rt]cmd =0x44504543, len=36
25,705,307 >>> mbox cmd response data (24 bytes)
25,705,964 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,735,576 UART: [rt]cmd =0x47544744, len=8
25,737,620 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,440,058 ready_for_fw is high
3,440,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,742,031 >>> mbox cmd response: success
14,742,777 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,053,998 UART:
19,054,421 UART: Running Caliptra FMC ...
19,055,728 UART:
19,055,903 UART: [state] CFI Enabled
19,118,414 UART: [fht] FMC Alias Private Key: 7
20,883,202 UART: [art] Extend RT PCRs Done
20,884,422 UART: [art] Lock RT PCRs Done
20,886,266 UART: [art] Populate DV Done
20,891,684 UART: [fht] FMC Alias Private Key: 7
20,893,175 UART: [art] Derive CDI
20,893,938 UART: [art] Store in in slot 0x4
20,951,506 UART: [art] Derive Key Pair
20,952,543 UART: [art] Store priv key in slot 0x5
23,415,724 UART: [art] Derive Key Pair - Done
23,428,994 UART: [art] Signing Cert with AUTHO
23,430,294 UART: RITY.KEYID = 7
25,141,654 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,166 UART: [art] PUB.X = 7E777864D8F2F3CE4BD383CF85886C7092A63ADEDF90B3277E4D684ECBB5A6DC44B86C69B484DBF77628520C1C1A8794
25,150,414 UART: [art] PUB.Y = E71980B5B05A74C237BC6A83738EEF7DE4E69925CB67DBB93FDC239A817C8DBF38F6EE98D864E3F65E757A7D761BB509
25,157,726 UART: [art] SIG.R = F4762732F7965BD5F4CB51C19A5A4B9D4ACAF4CE1258F4566C5BFBA0C24BBCE0F358B622652FB1C2B6D33C387D6DE64C
25,165,120 UART: [art] SIG.S = FA417CB92C0F990A7D90D5AE47B8DE647DB6AD558A61DA66E0EFEA8889B650BE20D3EABD41AC81EF8A293B1F7422FAAD
26,144,229 UART: Caliptra RT
26,144,920 UART: [state] CFI Enabled
26,309,863 UART: [rt] RT listening for mailbox commands...
26,341,435 UART: [rt]cmd =0x54514754, len=24
26,344,072 >>> mbox cmd response data (8 bytes)
26,345,031 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,375,212 UART: [rt]cmd =0x44504543, len=36
26,412,901 >>> mbox cmd response data (24 bytes)
26,413,517 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,443,082 UART: [rt]cmd =0x47544744, len=8
26,445,086 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,753,137 ready_for_fw is high
3,753,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,952,474 >>> mbox cmd response: success
14,953,291 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,202,072 UART:
19,202,462 UART: Running Caliptra FMC ...
19,203,554 UART:
19,203,701 UART: [state] CFI Enabled
19,211,600 UART: [fht] FMC Alias Private Key: 7
20,968,507 UART: [art] Extend RT PCRs Done
20,969,719 UART: [art] Lock RT PCRs Done
20,971,450 UART: [art] Populate DV Done
20,977,678 UART: [fht] FMC Alias Private Key: 7
20,979,065 UART: [art] Derive CDI
20,979,810 UART: [art] Store in in slot 0x4
21,022,508 UART: [art] Derive Key Pair
21,023,530 UART: [art] Store priv key in slot 0x5
23,449,938 UART: [art] Derive Key Pair - Done
23,462,437 UART: [art] Signing Cert with AUTHO
23,463,767 UART: RITY.KEYID = 7
25,169,007 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,523 UART: [art] PUB.X = 4B2D5DDD3DB3FB3EE0C956B85A05BAC3FCA2BF381D4F08B64D055FF28ACAC5F15A193C0754B72B2B0286086A2B1DDD38
25,177,816 UART: [art] PUB.Y = C3D7BBE988DBDA53705CC4498D974D7575C535599398990A6D99B635E3C60E6D2E5DAC0445ACD9668D8E84702B2F2E1E
25,185,040 UART: [art] SIG.R = 7F5545B129EDC531A17F5F2032D7C3391800233A5DC13E1C514322C7C3D1B7232ECB3EDBB26CD20B5127C5F6862980D2
25,192,427 UART: [art] SIG.S = 954705CEC3829CC481B4BA8546B80B81F5DF5C29E09E2F4AF108BE35058ED818BB54C48BC5DCB76D73430DEFA967F9F2
26,171,613 UART: Caliptra RT
26,172,298 UART: [state] CFI Enabled
26,289,746 UART: [rt] RT listening for mailbox commands...
26,321,370 UART: [rt]cmd =0x54514754, len=24
26,324,110 >>> mbox cmd response data (8 bytes)
26,325,133 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,355,103 UART: [rt]cmd =0x44504543, len=36
26,392,473 >>> mbox cmd response data (24 bytes)
26,393,153 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,422,620 UART: [rt]cmd =0x47544744, len=8
26,424,705 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,615 UART: [kat] SHA2-256
881,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,661 UART: [kat] ++
885,813 UART: [kat] sha1
889,981 UART: [kat] SHA2-256
891,919 UART: [kat] SHA2-384
894,626 UART: [kat] SHA2-512-ACC
896,527 UART: [kat] ECC-384
901,870 UART: [kat] HMAC-384Kdf
906,510 UART: [kat] LMS
1,474,706 UART: [kat] --
1,475,649 UART: [cold-reset] ++
1,476,067 UART: [fht] Storing FHT @ 0x50003400
1,478,828 UART: [idev] ++
1,478,996 UART: [idev] CDI.KEYID = 6
1,479,356 UART: [idev] SUBJECT.KEYID = 7
1,479,780 UART: [idev] UDS.KEYID = 0
1,480,125 ready_for_fw is high
1,480,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,584 UART: [idev] Erasing UDS.KEYID = 0
1,503,656 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,408 UART: [idev] --
1,513,561 UART: [ldev] ++
1,513,729 UART: [ldev] CDI.KEYID = 6
1,514,092 UART: [ldev] SUBJECT.KEYID = 5
1,514,518 UART: [ldev] AUTHORITY.KEYID = 7
1,514,981 UART: [ldev] FE.KEYID = 1
1,520,331 UART: [ldev] Erasing FE.KEYID = 1
1,545,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,724 UART: [ldev] --
1,585,049 UART: [fwproc] Waiting for Commands...
1,585,680 UART: [fwproc] Received command 0x46574c44
1,586,471 UART: [fwproc] Received Image of size 114448 bytes
2,886,218 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,436 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,823 >>> mbox cmd response: success
3,078,823 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,085 UART: [afmc] ++
3,080,253 UART: [afmc] CDI.KEYID = 6
3,080,615 UART: [afmc] SUBJECT.KEYID = 7
3,081,040 UART: [afmc] AUTHORITY.KEYID = 5
3,115,849 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,047 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,827 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,555 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,440 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,130 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,193 UART: [afmc] --
3,159,143 UART: [cold-reset] --
3,160,181 UART: [state] Locking Datavault
3,161,304 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,908 UART: [state] Locking ICCM
3,162,460 UART: [exit] Launching FMC @ 0x40000130
3,167,789 UART:
3,167,805 UART: Running Caliptra FMC ...
3,168,213 UART:
3,168,267 UART: [state] CFI Enabled
3,178,756 UART: [fht] FMC Alias Private Key: 7
3,287,513 UART: [art] Extend RT PCRs Done
3,287,941 UART: [art] Lock RT PCRs Done
3,289,453 UART: [art] Populate DV Done
3,297,968 UART: [fht] FMC Alias Private Key: 7
3,299,080 UART: [art] Derive CDI
3,299,360 UART: [art] Store in in slot 0x4
3,384,483 UART: [art] Derive Key Pair
3,384,843 UART: [art] Store priv key in slot 0x5
3,397,711 UART: [art] Derive Key Pair - Done
3,412,232 UART: [art] Signing Cert with AUTHO
3,412,712 UART: RITY.KEYID = 7
3,427,670 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,435 UART: [art] PUB.X = 72CF0FEEB772D26440C485B34E0CB395F406178C0A71AEAF15327B43C8996B164C257F29C17EB9D43C567C33CC9494CD
3,435,199 UART: [art] PUB.Y = A93100ACEC5DAC0D82D2EBAFC55F7FA389030729BA0D4418557592E01245B7F10840C58ECC58A7C8BBE7C72B31BA8BB1
3,442,128 UART: [art] SIG.R = B4C8D42B5AEA80AD55C6F09B02920B679DD8516AC190D19B3CC4487261341238D490FC485DF4897CF8CCD9B65ACDAEDD
3,448,908 UART: [art] SIG.S = 4D263EE832B616EEEB65482E177DB462298FAEE9B0C0998F33E330E0541214AA96F180DC258E365FC486D09D3AF899A4
3,472,561 UART: Caliptra RT
3,472,814 UART: [state] CFI Enabled
3,581,135 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,795 UART: [rt]cmd =0x54514754, len=24
3,614,053 >>> mbox cmd response data (8 bytes)
3,614,054 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,697 UART: [rt]cmd =0x44504543, len=36
3,681,157 >>> mbox cmd response data (24 bytes)
3,681,158 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,685 UART: [rt]cmd =0x47544744, len=8
3,712,263 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,873 ready_for_fw is high
1,362,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,997 >>> mbox cmd response: success
2,929,997 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,991,259 UART:
2,991,275 UART: Running Caliptra FMC ...
2,991,683 UART:
2,991,737 UART: [state] CFI Enabled
3,002,092 UART: [fht] FMC Alias Private Key: 7
3,110,801 UART: [art] Extend RT PCRs Done
3,111,229 UART: [art] Lock RT PCRs Done
3,112,703 UART: [art] Populate DV Done
3,120,572 UART: [fht] FMC Alias Private Key: 7
3,121,620 UART: [art] Derive CDI
3,121,900 UART: [art] Store in in slot 0x4
3,207,565 UART: [art] Derive Key Pair
3,207,925 UART: [art] Store priv key in slot 0x5
3,221,073 UART: [art] Derive Key Pair - Done
3,235,692 UART: [art] Signing Cert with AUTHO
3,236,172 UART: RITY.KEYID = 7
3,251,670 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,435 UART: [art] PUB.X = 742A250F2400A09954F474AC8D82BC8C3B20433AC06936C9C995CB4524D67EC4B39A21991EE305C63D10499EE6AF873F
3,259,177 UART: [art] PUB.Y = A49C26986089747C5FEEB8DA3277A98D478C50E8C4EE6B5A0D008163097BEFD95D63AADA8B8792F55430120C3EE8C79B
3,266,104 UART: [art] SIG.R = DB491B8AF19FA6CE44627DF31F930E3C9B701B464845B27B485555297AC18615992261C044E62E39AC0BEE69D9CA858C
3,272,870 UART: [art] SIG.S = 00E6F3CA887B52337EE850C6A08BAF58D988C1584810F8991D34B4C9D063C8F5D80D5C8570BE682ACF011F5C0A24DB88
3,296,882 UART: Caliptra RT
3,297,135 UART: [state] CFI Enabled
3,405,393 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,899 UART: [rt]cmd =0x54514754, len=24
3,438,013 >>> mbox cmd response data (8 bytes)
3,438,014 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,387 UART: [rt]cmd =0x44504543, len=36
3,505,057 >>> mbox cmd response data (24 bytes)
3,505,058 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,535 UART: [rt]cmd =0x47544744, len=8
3,536,053 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,438 UART: [kat] SHA2-256
882,369 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,484 UART: [kat] ++
886,636 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,767 UART: [kat] SHA2-512-ACC
897,668 UART: [kat] ECC-384
903,151 UART: [kat] HMAC-384Kdf
907,615 UART: [kat] LMS
1,475,811 UART: [kat] --
1,476,684 UART: [cold-reset] ++
1,477,236 UART: [fht] Storing FHT @ 0x50003400
1,480,065 UART: [idev] ++
1,480,233 UART: [idev] CDI.KEYID = 6
1,480,593 UART: [idev] SUBJECT.KEYID = 7
1,481,017 UART: [idev] UDS.KEYID = 0
1,481,362 ready_for_fw is high
1,481,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,035 UART: [idev] Erasing UDS.KEYID = 0
1,506,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,545 UART: [idev] --
1,515,688 UART: [ldev] ++
1,515,856 UART: [ldev] CDI.KEYID = 6
1,516,219 UART: [ldev] SUBJECT.KEYID = 5
1,516,645 UART: [ldev] AUTHORITY.KEYID = 7
1,517,108 UART: [ldev] FE.KEYID = 1
1,522,218 UART: [ldev] Erasing FE.KEYID = 1
1,548,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,907 UART: [ldev] --
1,587,416 UART: [fwproc] Waiting for Commands...
1,588,123 UART: [fwproc] Received command 0x46574c44
1,588,914 UART: [fwproc] Received Image of size 114448 bytes
2,888,707 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,825 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,177 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,272 >>> mbox cmd response: success
3,081,272 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,082,352 UART: [afmc] ++
3,082,520 UART: [afmc] CDI.KEYID = 6
3,082,882 UART: [afmc] SUBJECT.KEYID = 7
3,083,307 UART: [afmc] AUTHORITY.KEYID = 5
3,118,386 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,452 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,232 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,960 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,845 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,535 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,344 UART: [afmc] --
3,161,330 UART: [cold-reset] --
3,162,158 UART: [state] Locking Datavault
3,163,463 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,067 UART: [state] Locking ICCM
3,164,711 UART: [exit] Launching FMC @ 0x40000130
3,170,040 UART:
3,170,056 UART: Running Caliptra FMC ...
3,170,464 UART:
3,170,607 UART: [state] CFI Enabled
3,181,618 UART: [fht] FMC Alias Private Key: 7
3,289,437 UART: [art] Extend RT PCRs Done
3,289,865 UART: [art] Lock RT PCRs Done
3,291,479 UART: [art] Populate DV Done
3,299,718 UART: [fht] FMC Alias Private Key: 7
3,300,760 UART: [art] Derive CDI
3,301,040 UART: [art] Store in in slot 0x4
3,386,519 UART: [art] Derive Key Pair
3,386,879 UART: [art] Store priv key in slot 0x5
3,399,919 UART: [art] Derive Key Pair - Done
3,414,515 UART: [art] Signing Cert with AUTHO
3,414,995 UART: RITY.KEYID = 7
3,430,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,898 UART: [art] PUB.X = F917E38482A962A9EE9B5870603B66575D9EF37A123B3B0DD3DEBA413D0ECE6DC6646D0E02666A0439C346254C4E14CD
3,437,659 UART: [art] PUB.Y = 96F0C84694506E13D8129E3C5F225A3A4B17E629432F318DF668FE1143EDDC3065B7B04B881C5366B097809119C5F19D
3,444,603 UART: [art] SIG.R = 89DE7032E499E5E6723B68777A8E6F9DFCBBA8893575697FDF70815971D8AFFC396FF2630B2EF0B138CD7AE168E8C7B5
3,451,380 UART: [art] SIG.S = 51128F0D70B74F8A23FD0C76F817B606A254010A58560DE72DC70E45F39E2FE83A966F9BF59A53A884058BD88AD8CB6F
3,475,271 UART: Caliptra RT
3,475,616 UART: [state] CFI Enabled
3,583,713 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,943 UART: [rt]cmd =0x54514754, len=24
3,616,109 >>> mbox cmd response data (8 bytes)
3,616,110 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,765 UART: [rt]cmd =0x44504543, len=36
3,683,023 >>> mbox cmd response data (24 bytes)
3,683,024 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,439 UART: [rt]cmd =0x47544744, len=8
3,714,027 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,044 ready_for_fw is high
1,362,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,444 >>> mbox cmd response: success
2,928,444 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,950 UART:
2,989,966 UART: Running Caliptra FMC ...
2,990,374 UART:
2,990,517 UART: [state] CFI Enabled
3,000,968 UART: [fht] FMC Alias Private Key: 7
3,108,791 UART: [art] Extend RT PCRs Done
3,109,219 UART: [art] Lock RT PCRs Done
3,110,779 UART: [art] Populate DV Done
3,119,012 UART: [fht] FMC Alias Private Key: 7
3,120,038 UART: [art] Derive CDI
3,120,318 UART: [art] Store in in slot 0x4
3,205,751 UART: [art] Derive Key Pair
3,206,111 UART: [art] Store priv key in slot 0x5
3,219,131 UART: [art] Derive Key Pair - Done
3,233,569 UART: [art] Signing Cert with AUTHO
3,234,049 UART: RITY.KEYID = 7
3,248,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,752 UART: [art] PUB.X = 97DA84CA332B66293EDBAA2F2010A64115BCB542882CA9BED3FB1EF4371FF90773DB2514BD0053D7ABC2A5F1977D9339
3,256,509 UART: [art] PUB.Y = C20526F823055776748A4D5359E8B03770A7829864E6428BFF43DF1FC2C64CFB11642DBF5AE4FF90D4E9E15F484213A7
3,263,453 UART: [art] SIG.R = 61795016D6497E14DE7FD5A89B1CBDBCC5192BA0EF7AD2781F960A7BC3323C8B8DB90293A86A40DB3CC5B0DC19E985BC
3,270,235 UART: [art] SIG.S = FBC24F1331E54C40BAFEC86D6406B245294412EA5C07740B37675DBD5A4714B2B17C7EDAEB7FDB6A6D0EE56F37A04E79
3,293,396 UART: Caliptra RT
3,293,741 UART: [state] CFI Enabled
3,402,372 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,140 UART: [rt]cmd =0x54514754, len=24
3,435,162 >>> mbox cmd response data (8 bytes)
3,435,163 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,080 UART: [rt]cmd =0x44504543, len=36
3,503,044 >>> mbox cmd response data (24 bytes)
3,503,045 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,464 UART: [rt]cmd =0x47544744, len=8
3,533,822 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,200 UART: [kat] SHA2-256
892,850 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,975 UART: [kat] ++
897,127 UART: [kat] sha1
901,401 UART: [kat] SHA2-256
903,341 UART: [kat] SHA2-384
905,962 UART: [kat] SHA2-512-ACC
907,863 UART: [kat] ECC-384
917,302 UART: [kat] HMAC-384Kdf
921,890 UART: [kat] LMS
1,170,218 UART: [kat] --
1,171,197 UART: [cold-reset] ++
1,171,657 UART: [fht] FHT @ 0x50003400
1,174,170 UART: [idev] ++
1,174,338 UART: [idev] CDI.KEYID = 6
1,174,698 UART: [idev] SUBJECT.KEYID = 7
1,175,122 UART: [idev] UDS.KEYID = 0
1,175,467 ready_for_fw is high
1,175,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,092 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,945 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,356 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,958 UART: [fwproc] Wait for Commands...
1,282,780 UART: [fwproc] Recv command 0x46574c44
1,283,508 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,102 >>> mbox cmd response: success
2,774,102 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,290 UART: [afmc] ++
2,775,458 UART: [afmc] CDI.KEYID = 6
2,775,820 UART: [afmc] SUBJECT.KEYID = 7
2,776,245 UART: [afmc] AUTHORITY.KEYID = 5
2,811,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,501 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,386 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,105 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,913 UART: [afmc] --
2,854,905 UART: [cold-reset] --
2,855,875 UART: [state] Locking Datavault
2,857,050 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,654 UART: [state] Locking ICCM
2,858,150 UART: [exit] Launching FMC @ 0x40000130
2,863,479 UART:
2,863,495 UART: Running Caliptra FMC ...
2,863,903 UART:
2,863,957 UART: [state] CFI Enabled
2,874,374 UART: [fht] FMC Alias Private Key: 7
2,983,063 UART: [art] Extend RT PCRs Done
2,983,491 UART: [art] Lock RT PCRs Done
2,985,075 UART: [art] Populate DV Done
2,993,500 UART: [fht] FMC Alias Private Key: 7
2,994,666 UART: [art] Derive CDI
2,994,946 UART: [art] Store in in slot 0x4
3,080,763 UART: [art] Derive Key Pair
3,081,123 UART: [art] Store priv key in slot 0x5
3,095,357 UART: [art] Derive Key Pair - Done
3,110,213 UART: [art] Signing Cert with AUTHO
3,110,693 UART: RITY.KEYID = 7
3,125,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,750 UART: [art] PUB.X = E17E1BF32FAA14CE2054A8769727EE8E4001766D096889DCB1919347244EE42916265A10A2E5D6D7669D4C2862242EFE
3,133,510 UART: [art] PUB.Y = 09D51C70089362B99CAA79CAE75CEF96E229E5DE36016D81466E43CFB205E0753F11B45311B42EB691DEC3557B5B8249
3,140,450 UART: [art] SIG.R = 9C2724A80F9280AC2B4424EED265606F38DD6F902A370DDE56009169F69DEFF30055CEC676EEE689C6ADD1D35EDB0C6B
3,147,181 UART: [art] SIG.S = B9EA7101463AF532078CD4E8D6AEAF57DCCB7F0086CBF791AFB9F8BC3D899770A4F3566E7321504266CFB026F18683B9
3,170,880 UART: Caliptra RT
3,171,133 UART: [state] CFI Enabled
3,279,311 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,923 UART: [rt]cmd =0x54514754, len=24
3,311,825 >>> mbox cmd response data (8 bytes)
3,311,826 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,575 UART: [rt]cmd =0x44504543, len=36
3,379,913 >>> mbox cmd response data (24 bytes)
3,379,914 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,225 UART: [rt]cmd =0x47544744, len=8
3,410,829 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,933 ready_for_fw is high
1,059,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,005 >>> mbox cmd response: success
2,629,005 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,691,009 UART:
2,691,025 UART: Running Caliptra FMC ...
2,691,433 UART:
2,691,487 UART: [state] CFI Enabled
2,701,546 UART: [fht] FMC Alias Private Key: 7
2,808,877 UART: [art] Extend RT PCRs Done
2,809,305 UART: [art] Lock RT PCRs Done
2,810,827 UART: [art] Populate DV Done
2,819,004 UART: [fht] FMC Alias Private Key: 7
2,820,108 UART: [art] Derive CDI
2,820,388 UART: [art] Store in in slot 0x4
2,905,769 UART: [art] Derive Key Pair
2,906,129 UART: [art] Store priv key in slot 0x5
2,919,131 UART: [art] Derive Key Pair - Done
2,933,780 UART: [art] Signing Cert with AUTHO
2,934,260 UART: RITY.KEYID = 7
2,949,454 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,219 UART: [art] PUB.X = 40668619D98276C2F5A2F4B549C01F5E5CA1E9B0C8D9533F692359C29201FD8A1A04E0E468A9E874E010207A0989108F
2,956,974 UART: [art] PUB.Y = AF92585C6AAC4E6BB6A099FFB6F41DC160FC9E073F4A317EE470816281E89C39CD84B14DE13A5DEC982004A5D44AF5FF
2,963,936 UART: [art] SIG.R = E3633836B6D6D673EEAED2A0BF7795FCE994C14C11AD1BFDDFCAD84933FCF8F336713D3AB1BFF6FA20A245EF5C31C042
2,970,732 UART: [art] SIG.S = F7EB6A66AAE45377659EDB61F95B72B118EF8E00DC3277C8F470D7A7DB5E976166949481CCB8F2719D9CA9C03A0FDE42
2,994,440 UART: Caliptra RT
2,994,693 UART: [state] CFI Enabled
3,102,583 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,439 UART: [rt]cmd =0x54514754, len=24
3,135,487 >>> mbox cmd response data (8 bytes)
3,135,488 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,055 UART: [rt]cmd =0x44504543, len=36
3,203,257 >>> mbox cmd response data (24 bytes)
3,203,258 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,761 UART: [rt]cmd =0x47544744, len=8
3,234,317 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
893,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,842 UART: [kat] ++
897,994 UART: [kat] sha1
902,218 UART: [kat] SHA2-256
904,158 UART: [kat] SHA2-384
907,049 UART: [kat] SHA2-512-ACC
908,950 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
923,059 UART: [kat] LMS
1,171,387 UART: [kat] --
1,172,292 UART: [cold-reset] ++
1,172,644 UART: [fht] FHT @ 0x50003400
1,175,083 UART: [idev] ++
1,175,251 UART: [idev] CDI.KEYID = 6
1,175,611 UART: [idev] SUBJECT.KEYID = 7
1,176,035 UART: [idev] UDS.KEYID = 0
1,176,380 ready_for_fw is high
1,176,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,101 UART: [idev] Erasing UDS.KEYID = 0
1,200,980 UART: [idev] Sha1 KeyId Algorithm
1,209,474 UART: [idev] --
1,210,412 UART: [ldev] ++
1,210,580 UART: [ldev] CDI.KEYID = 6
1,210,943 UART: [ldev] SUBJECT.KEYID = 5
1,211,369 UART: [ldev] AUTHORITY.KEYID = 7
1,211,832 UART: [ldev] FE.KEYID = 1
1,217,096 UART: [ldev] Erasing FE.KEYID = 1
1,243,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,338 UART: [ldev] --
1,282,709 UART: [fwproc] Wait for Commands...
1,283,339 UART: [fwproc] Recv command 0x46574c44
1,284,067 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,557 >>> mbox cmd response: success
2,776,557 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,689 UART: [afmc] ++
2,777,857 UART: [afmc] CDI.KEYID = 6
2,778,219 UART: [afmc] SUBJECT.KEYID = 7
2,778,644 UART: [afmc] AUTHORITY.KEYID = 5
2,814,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,100 UART: [afmc] --
2,858,130 UART: [cold-reset] --
2,858,984 UART: [state] Locking Datavault
2,860,219 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,823 UART: [state] Locking ICCM
2,861,453 UART: [exit] Launching FMC @ 0x40000130
2,866,782 UART:
2,866,798 UART: Running Caliptra FMC ...
2,867,206 UART:
2,867,349 UART: [state] CFI Enabled
2,877,830 UART: [fht] FMC Alias Private Key: 7
2,986,079 UART: [art] Extend RT PCRs Done
2,986,507 UART: [art] Lock RT PCRs Done
2,988,147 UART: [art] Populate DV Done
2,996,166 UART: [fht] FMC Alias Private Key: 7
2,997,246 UART: [art] Derive CDI
2,997,526 UART: [art] Store in in slot 0x4
3,082,699 UART: [art] Derive Key Pair
3,083,059 UART: [art] Store priv key in slot 0x5
3,096,211 UART: [art] Derive Key Pair - Done
3,110,978 UART: [art] Signing Cert with AUTHO
3,111,458 UART: RITY.KEYID = 7
3,126,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,523 UART: [art] PUB.X = 38624E965ADFA776F8F714319D5F7F80BF2ECEC484F8F027679775B259769EA487858E372A8C1E5F6169714C2B41894F
3,134,289 UART: [art] PUB.Y = F951FF77FB439E76022DE37DA69C7318568EB56F1B1B5E7CD702AE471A5F4E955BDB49C3194628D1FCDCDF13FAF17744
3,141,247 UART: [art] SIG.R = 95697A07DD0B619D8A283F87A02F65CF653606B4B5B526019CA31B81EF72282C5852250C17B75B9ED9D28E7A2FE73208
3,147,997 UART: [art] SIG.S = 919D010EBBB71CF6DFE1F88A6EF436FFD828C0DB67896A031184D28F67930F1C7762BF5AA092D32CD99C1950C9F7F2C2
3,171,038 UART: Caliptra RT
3,171,383 UART: [state] CFI Enabled
3,279,993 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,557 UART: [rt]cmd =0x54514754, len=24
3,312,673 >>> mbox cmd response data (8 bytes)
3,312,674 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,407 UART: [rt]cmd =0x44504543, len=36
3,380,217 >>> mbox cmd response data (24 bytes)
3,380,218 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,633 UART: [rt]cmd =0x47544744, len=8
3,411,359 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,592 ready_for_fw is high
1,060,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,631,018 >>> mbox cmd response: success
2,631,018 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,693,538 UART:
2,693,554 UART: Running Caliptra FMC ...
2,693,962 UART:
2,694,105 UART: [state] CFI Enabled
2,704,856 UART: [fht] FMC Alias Private Key: 7
2,813,297 UART: [art] Extend RT PCRs Done
2,813,725 UART: [art] Lock RT PCRs Done
2,815,537 UART: [art] Populate DV Done
2,823,894 UART: [fht] FMC Alias Private Key: 7
2,824,928 UART: [art] Derive CDI
2,825,208 UART: [art] Store in in slot 0x4
2,910,877 UART: [art] Derive Key Pair
2,911,237 UART: [art] Store priv key in slot 0x5
2,924,631 UART: [art] Derive Key Pair - Done
2,939,508 UART: [art] Signing Cert with AUTHO
2,939,988 UART: RITY.KEYID = 7
2,955,272 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,037 UART: [art] PUB.X = 71D08F3D5157B28F0EA1AB87083770CB1A2E0E0427699A70D52F1ADC8504463B75C6022C366542F6C4748C3E727DECCE
2,962,791 UART: [art] PUB.Y = 2A1833947711D2C81239F382BB0800DF6116E46DD76ECAB5DCF796D322E9AE12579CA0E65D1018BF0620BF95AC906E5C
2,969,719 UART: [art] SIG.R = F2BC5E2EC41F5759B857C76B39D48555C5187450A7D65687591950CF1820B60FC52EB9781F7632C0CACFB2A15BBC1F19
2,976,490 UART: [art] SIG.S = CE0D0D03F7AC74DD9908935B227F795587E8AA6935B8FEE4C01FBF588420EFCD113B76FA24A4EEB4828876B02C8A6B64
3,000,231 UART: Caliptra RT
3,000,576 UART: [state] CFI Enabled
3,109,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,728 UART: [rt]cmd =0x54514754, len=24
3,141,770 >>> mbox cmd response data (8 bytes)
3,141,771 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,452 UART: [rt]cmd =0x44504543, len=36
3,209,788 >>> mbox cmd response data (24 bytes)
3,209,789 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,239,058 UART: [rt]cmd =0x47544744, len=8
3,240,700 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
890,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,085 UART: [kat] ++
895,237 UART: [kat] sha1
899,379 UART: [kat] SHA2-256
901,319 UART: [kat] SHA2-384
903,858 UART: [kat] SHA2-512-ACC
905,759 UART: [kat] ECC-384
915,316 UART: [kat] HMAC-384Kdf
919,942 UART: [kat] LMS
1,168,254 UART: [kat] --
1,168,755 UART: [cold-reset] ++
1,169,125 UART: [fht] FHT @ 0x50003400
1,171,785 UART: [idev] ++
1,171,953 UART: [idev] CDI.KEYID = 6
1,172,314 UART: [idev] SUBJECT.KEYID = 7
1,172,739 UART: [idev] UDS.KEYID = 0
1,173,085 ready_for_fw is high
1,173,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,745 UART: [idev] Erasing UDS.KEYID = 0
1,197,371 UART: [idev] Sha1 KeyId Algorithm
1,206,061 UART: [idev] --
1,207,056 UART: [ldev] ++
1,207,224 UART: [ldev] CDI.KEYID = 6
1,207,588 UART: [ldev] SUBJECT.KEYID = 5
1,208,015 UART: [ldev] AUTHORITY.KEYID = 7
1,208,478 UART: [ldev] FE.KEYID = 1
1,213,558 UART: [ldev] Erasing FE.KEYID = 1
1,240,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,774 UART: [ldev] --
1,279,284 UART: [fwproc] Wait for Commands...
1,280,109 UART: [fwproc] Recv command 0x46574c44
1,280,842 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,990 >>> mbox cmd response: success
2,772,990 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,197 UART: [afmc] ++
2,774,365 UART: [afmc] CDI.KEYID = 6
2,774,728 UART: [afmc] SUBJECT.KEYID = 7
2,775,154 UART: [afmc] AUTHORITY.KEYID = 5
2,810,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,147 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,030 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,749 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,380 UART: [afmc] --
2,853,462 UART: [cold-reset] --
2,854,322 UART: [state] Locking Datavault
2,855,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,301 UART: [state] Locking ICCM
2,856,785 UART: [exit] Launching FMC @ 0x40000130
2,862,114 UART:
2,862,130 UART: Running Caliptra FMC ...
2,862,538 UART:
2,862,592 UART: [state] CFI Enabled
2,872,979 UART: [fht] FMC Alias Private Key: 7
2,980,356 UART: [art] Extend RT PCRs Done
2,980,784 UART: [art] Lock RT PCRs Done
2,982,162 UART: [art] Populate DV Done
2,990,547 UART: [fht] FMC Alias Private Key: 7
2,991,581 UART: [art] Derive CDI
2,991,861 UART: [art] Store in in slot 0x4
3,077,232 UART: [art] Derive Key Pair
3,077,592 UART: [art] Store priv key in slot 0x5
3,090,946 UART: [art] Derive Key Pair - Done
3,105,647 UART: [art] Signing Cert with AUTHO
3,106,127 UART: RITY.KEYID = 7
3,121,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,160 UART: [art] PUB.X = 1DC832D2EA99656192C79DE5986088352117B2773AD7CA9D652F981C0D83BCAF008506553660B832AE2B5E30C76DBFF6
3,128,902 UART: [art] PUB.Y = 226E50D2DE1844C41EA78717A89886AC88CE0ED78506512949C7C888F54A40FEFE8E3BC5B37F56CBB7D6B74A7C5C6562
3,135,854 UART: [art] SIG.R = 7348405B77FE58FBD310B7D85038CF24FD923197287FB6119995F7333D1B91C2DD3F557C51C7D6512D7E87FCDC73E42E
3,142,626 UART: [art] SIG.S = 1280F0C2E105786D0EA19821566D7C51BC664488230835E2C8A753D4993A99706EF2B6A4949EED3A3ABDCDF00422A3E0
3,166,265 UART: Caliptra RT
3,166,518 UART: [state] CFI Enabled
3,275,297 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,093 UART: [rt]cmd =0x54514754, len=24
3,308,321 >>> mbox cmd response data (8 bytes)
3,308,322 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,971 UART: [rt]cmd =0x44504543, len=36
3,375,839 >>> mbox cmd response data (24 bytes)
3,375,840 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,951 UART: [rt]cmd =0x47544744, len=8
3,406,445 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,626 ready_for_fw is high
1,055,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,906 >>> mbox cmd response: success
2,623,906 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,306 UART:
2,685,322 UART: Running Caliptra FMC ...
2,685,730 UART:
2,685,784 UART: [state] CFI Enabled
2,696,117 UART: [fht] FMC Alias Private Key: 7
2,803,810 UART: [art] Extend RT PCRs Done
2,804,238 UART: [art] Lock RT PCRs Done
2,805,958 UART: [art] Populate DV Done
2,814,203 UART: [fht] FMC Alias Private Key: 7
2,815,235 UART: [art] Derive CDI
2,815,515 UART: [art] Store in in slot 0x4
2,900,916 UART: [art] Derive Key Pair
2,901,276 UART: [art] Store priv key in slot 0x5
2,914,118 UART: [art] Derive Key Pair - Done
2,929,055 UART: [art] Signing Cert with AUTHO
2,929,535 UART: RITY.KEYID = 7
2,944,415 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,180 UART: [art] PUB.X = 7A569BC1FF10B84221C65594E2625BFE0B9A759619657A2488D765A5C5E412F7EAA0D6A37E7DBDC5BF8C693EADD814A1
2,951,959 UART: [art] PUB.Y = DC3D522508092993594E14BF3DED1E003507256F525D2CCF9A8B2C1AE9678A3585678CC3F8BE6D6B3B56E2956725F359
2,958,878 UART: [art] SIG.R = CB295196B8928687BFEEAA21F695B5B43CE01C11D083129BCE8F8BCD28D32FE7D2B0A40B5BF018F3480EB133C14CDFC0
2,965,660 UART: [art] SIG.S = C35D537466622C68B547DF59FAF3B445368C96A49D412FB1DC1D58BEB407E327794BC75DF96D65C17412ED3A5ADE5D7A
2,989,464 UART: Caliptra RT
2,989,717 UART: [state] CFI Enabled
3,097,945 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,585 UART: [rt]cmd =0x54514754, len=24
3,130,861 >>> mbox cmd response data (8 bytes)
3,130,862 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,263 UART: [rt]cmd =0x44504543, len=36
3,197,877 >>> mbox cmd response data (24 bytes)
3,197,878 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,271 UART: [rt]cmd =0x47544744, len=8
3,228,793 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,962 UART: [kat] SHA2-256
901,902 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,170,160 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,174,496 ready_for_fw is high
1,174,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,442 UART: [idev] Erasing UDS.KEYID = 0
1,199,758 UART: [idev] Sha1 KeyId Algorithm
1,208,772 UART: [idev] --
1,210,011 UART: [ldev] ++
1,210,179 UART: [ldev] CDI.KEYID = 6
1,210,543 UART: [ldev] SUBJECT.KEYID = 5
1,210,970 UART: [ldev] AUTHORITY.KEYID = 7
1,211,433 UART: [ldev] FE.KEYID = 1
1,216,711 UART: [ldev] Erasing FE.KEYID = 1
1,242,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,155 UART: [ldev] --
1,282,421 UART: [fwproc] Wait for Commands...
1,283,012 UART: [fwproc] Recv command 0x46574c44
1,283,745 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,551 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,517 >>> mbox cmd response: success
2,775,517 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,542 UART: [afmc] ++
2,776,710 UART: [afmc] CDI.KEYID = 6
2,777,073 UART: [afmc] SUBJECT.KEYID = 7
2,777,499 UART: [afmc] AUTHORITY.KEYID = 5
2,813,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,211 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,823 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,542 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,587 UART: [afmc] --
2,856,569 UART: [cold-reset] --
2,857,467 UART: [state] Locking Datavault
2,858,682 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,286 UART: [state] Locking ICCM
2,859,958 UART: [exit] Launching FMC @ 0x40000130
2,865,287 UART:
2,865,303 UART: Running Caliptra FMC ...
2,865,711 UART:
2,865,854 UART: [state] CFI Enabled
2,876,483 UART: [fht] FMC Alias Private Key: 7
2,984,008 UART: [art] Extend RT PCRs Done
2,984,436 UART: [art] Lock RT PCRs Done
2,985,826 UART: [art] Populate DV Done
2,993,915 UART: [fht] FMC Alias Private Key: 7
2,995,027 UART: [art] Derive CDI
2,995,307 UART: [art] Store in in slot 0x4
3,080,732 UART: [art] Derive Key Pair
3,081,092 UART: [art] Store priv key in slot 0x5
3,094,554 UART: [art] Derive Key Pair - Done
3,109,382 UART: [art] Signing Cert with AUTHO
3,109,862 UART: RITY.KEYID = 7
3,125,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,999 UART: [art] PUB.X = 4CDB411C0845EE2FF62358587B6404678D2FB088088AA1719E622D851D10BB9E680A9F41E5C29D01E04C041F24D0B34A
3,132,751 UART: [art] PUB.Y = ACA8BE3DF6724F2D9B5C0FC9956B5D50C54D718455CB7167546B79312F18EBAF19BBEE1232CA69512F971ABC9A383CD7
3,139,712 UART: [art] SIG.R = C8AC4BF7FB988C7869E07352FDEAEB12D48C78F2038C0B73E2910B406F3E88296ECDFCD2AE71E326B65BF36E63BCFC44
3,146,493 UART: [art] SIG.S = D0F26CF0BAB9E46469B83FB058F01B8EACF2FFD76C5F5285A5083878948D5DD1DEAD8EA466A63FB54DFB7CDA55297BED
3,170,185 UART: Caliptra RT
3,170,530 UART: [state] CFI Enabled
3,278,448 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,352 UART: [rt]cmd =0x54514754, len=24
3,311,532 >>> mbox cmd response data (8 bytes)
3,311,533 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,150 UART: [rt]cmd =0x44504543, len=36
3,379,612 >>> mbox cmd response data (24 bytes)
3,379,613 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,952 UART: [rt]cmd =0x47544744, len=8
3,410,574 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,805 ready_for_fw is high
1,056,805 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,693 >>> mbox cmd response: success
2,623,693 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,179 UART:
2,685,195 UART: Running Caliptra FMC ...
2,685,603 UART:
2,685,746 UART: [state] CFI Enabled
2,696,971 UART: [fht] FMC Alias Private Key: 7
2,804,740 UART: [art] Extend RT PCRs Done
2,805,168 UART: [art] Lock RT PCRs Done
2,806,600 UART: [art] Populate DV Done
2,814,821 UART: [fht] FMC Alias Private Key: 7
2,815,835 UART: [art] Derive CDI
2,816,115 UART: [art] Store in in slot 0x4
2,901,464 UART: [art] Derive Key Pair
2,901,824 UART: [art] Store priv key in slot 0x5
2,914,938 UART: [art] Derive Key Pair - Done
2,929,674 UART: [art] Signing Cert with AUTHO
2,930,154 UART: RITY.KEYID = 7
2,945,724 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,489 UART: [art] PUB.X = 002D36DCD7A17D73F50780203784014CBDFC75004D9EEBE6A0AD5BB28684D47DDC29FACC65E94EC945E4B557C5056443
2,953,216 UART: [art] PUB.Y = F6FFFECF8867DB7AB6F4AF631F4F065CE15E47F51E5043B955646BA441CB9DE4F92EE46004D8BD94AFF7FC4D5BD011D6
2,960,184 UART: [art] SIG.R = 873D0BF66C1DEB9FF3F8B4470BD95631793D8C3B108937C8E2309D8114A7D1DAEB5A74EE08D556DBF6A1295F2997F6BA
2,966,957 UART: [art] SIG.S = 6AC060F760D29DC2E66F97A1ED849B2EF34E4CFD05AA7650FBD216992DCC888F736AC0D20305116D8F3106FCDA2CA62C
2,990,792 UART: Caliptra RT
2,991,137 UART: [state] CFI Enabled
3,099,376 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,150 UART: [rt]cmd =0x54514754, len=24
3,132,142 >>> mbox cmd response data (8 bytes)
3,132,143 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,752 UART: [rt]cmd =0x44504543, len=36
3,199,400 >>> mbox cmd response data (24 bytes)
3,199,401 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,812 UART: [rt]cmd =0x47544744, len=8
3,230,272 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
192,223 UART:
192,584 UART: Running Caliptra ROM ...
193,771 UART:
193,948 UART: [state] CFI Enabled
264,508 UART: [state] LifecycleState = Unprovisioned
266,423 UART: [state] DebugLocked = No
267,954 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,470 UART: [kat] SHA2-256
442,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,715 UART: [kat] ++
453,159 UART: [kat] sha1
464,244 UART: [kat] SHA2-256
466,970 UART: [kat] SHA2-384
474,024 UART: [kat] SHA2-512-ACC
476,392 UART: [kat] ECC-384
2,766,497 UART: [kat] HMAC-384Kdf
2,799,000 UART: [kat] LMS
3,989,301 UART: [kat] --
3,992,580 UART: [cold-reset] ++
3,994,029 UART: [fht] Storing FHT @ 0x50003400
4,004,892 UART: [idev] ++
4,005,508 UART: [idev] CDI.KEYID = 6
4,006,407 UART: [idev] SUBJECT.KEYID = 7
4,007,593 UART: [idev] UDS.KEYID = 0
4,008,562 ready_for_fw is high
4,008,765 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,152,149 UART: [idev] Erasing UDS.KEYID = 0
7,347,121 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,429 UART: [idev] --
7,373,265 UART: [ldev] ++
7,373,842 UART: [ldev] CDI.KEYID = 6
7,374,821 UART: [ldev] SUBJECT.KEYID = 5
7,376,036 UART: [ldev] AUTHORITY.KEYID = 7
7,377,269 UART: [ldev] FE.KEYID = 1
7,421,666 UART: [ldev] Erasing FE.KEYID = 1
10,754,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,978 UART: [ldev] --
13,133,931 UART: [fwproc] Waiting for Commands...
13,136,999 UART: [fwproc] Received command 0x46574c44
13,139,179 UART: [fwproc] Received Image of size 114124 bytes
17,196,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,268,232 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,337,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,653,768 >>> mbox cmd response: success
17,654,319 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,658,759 UART: [afmc] ++
17,659,353 UART: [afmc] CDI.KEYID = 6
17,660,313 UART: [afmc] SUBJECT.KEYID = 7
17,661,531 UART: [afmc] AUTHORITY.KEYID = 5
21,015,816 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,316,622 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,318,875 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,333,291 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,348,146 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,362,623 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,383,069 UART: [afmc] --
23,386,139 UART: [cold-reset] --
23,390,324 UART: [state] Locking Datavault
23,396,113 UART: [state] Locking PCR0, PCR1 and PCR31
23,397,865 UART: [state] Locking ICCM
23,400,583 UART: [exit] Launching FMC @ 0x40000130
23,408,988 UART:
23,409,222 UART: Running Caliptra FMC ...
23,410,343 UART:
23,410,501 UART: [state] CFI Enabled
23,477,541 UART: [fht] FMC Alias Private Key: 7
25,815,354 UART: [art] Extend RT PCRs Done
25,816,569 UART: [art] Lock RT PCRs Done
25,818,492 UART: [art] Populate DV Done
25,823,960 UART: [fht] FMC Alias Private Key: 7
25,825,550 UART: [art] Derive CDI
25,826,292 UART: [art] Store in in slot 0x4
25,886,232 UART: [art] Derive Key Pair
25,887,268 UART: [art] Store priv key in slot 0x5
29,180,195 UART: [art] Derive Key Pair - Done
29,192,755 UART: [art] Signing Cert with AUTHO
29,194,056 UART: RITY.KEYID = 7
31,482,508 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,010 UART: [art] PUB.X = 24D14F3E45B17814C2EA51F0BBC6F2B25569C9F8D41A854012477C1BC41BC556AC44AA1F3BE5BB32A0455A1F5EB1DBFB
31,491,279 UART: [art] PUB.Y = 85F339CD808BC566112B78FF212C76CF20FF6C53188DE1BC41786FE8FDFB281425FCE7DF068C05157C525C4B98F61F35
31,498,520 UART: [art] SIG.R = E725A27F50A10241504F8F249A711AB1DAEE6A4982551C82D4FD236F87B83F08A1EE00E3B601FA187F2D0495F5BE40EF
31,505,859 UART: [art] SIG.S = 7FDF19D69B82D31CD04429A2422164C28876FCEDC464B2F8B42625F5536EEFA96B313C7BF09F9BAA9B2AC57E71E84BEF
32,811,126 UART: Caliptra RT
32,811,839 UART: [state] CFI Enabled
32,973,264 UART: [rt] RT listening for mailbox commands...
33,004,566 UART: [rt]cmd =0x54514754, len=24
33,006,925 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,783,852 ready_for_fw is high
3,784,280 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,826,291 >>> mbox cmd response: success
17,827,054 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,543,938 UART:
23,544,313 UART: Running Caliptra FMC ...
23,545,425 UART:
23,545,578 UART: [state] CFI Enabled
23,614,045 UART: [fht] FMC Alias Private Key: 7
25,951,955 UART: [art] Extend RT PCRs Done
25,953,182 UART: [art] Lock RT PCRs Done
25,955,057 UART: [art] Populate DV Done
25,960,432 UART: [fht] FMC Alias Private Key: 7
25,962,086 UART: [art] Derive CDI
25,962,907 UART: [art] Store in in slot 0x4
26,023,011 UART: [art] Derive Key Pair
26,024,080 UART: [art] Store priv key in slot 0x5
29,316,806 UART: [art] Derive Key Pair - Done
29,329,639 UART: [art] Signing Cert with AUTHO
29,330,946 UART: RITY.KEYID = 7
31,618,834 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,343 UART: [art] PUB.X = 1AD6441253D133001DF2DA4C9C09EB6B232B58DDABB5BF06F7BB946D8CEE625D7EE7431A530144F397897E393B7C1B97
31,627,560 UART: [art] PUB.Y = 9A68E1562858A3EF15D88947A6D17B43168D7623DF1AE37DE4D884173DB304C834FD63E207FFEC9EEA6CF79D048B5692
31,634,815 UART: [art] SIG.R = 74DE92115E256F7E5DA32661C98D8515ED8D899D55FE4A5DF258A7F7977D33862CA5584E152A6E644C46C4BFA6D4A5AD
31,642,232 UART: [art] SIG.S = 5F623F9E4C5F42FF350D2D5C70B1C18422D9FEE999F06307A2A1E4365DA0FD1F0DDA1EB93D74F3DE0AB496C24B788B3D
32,947,183 UART: Caliptra RT
32,947,893 UART: [state] CFI Enabled
33,108,787 UART: [rt] RT listening for mailbox commands...
33,140,517 UART: [rt]cmd =0x54514754, len=24
33,142,683 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,544 UART:
192,907 UART: Running Caliptra ROM ...
194,077 UART:
603,923 UART: [state] CFI Enabled
618,365 UART: [state] LifecycleState = Unprovisioned
620,294 UART: [state] DebugLocked = No
621,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,788 UART: [kat] SHA2-256
795,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,102 UART: [kat] ++
806,548 UART: [kat] sha1
818,198 UART: [kat] SHA2-256
820,850 UART: [kat] SHA2-384
825,419 UART: [kat] SHA2-512-ACC
827,783 UART: [kat] ECC-384
3,112,365 UART: [kat] HMAC-384Kdf
3,124,236 UART: [kat] LMS
4,314,378 UART: [kat] --
4,319,680 UART: [cold-reset] ++
4,320,972 UART: [fht] Storing FHT @ 0x50003400
4,333,087 UART: [idev] ++
4,333,650 UART: [idev] CDI.KEYID = 6
4,334,567 UART: [idev] SUBJECT.KEYID = 7
4,335,826 UART: [idev] UDS.KEYID = 0
4,336,893 ready_for_fw is high
4,337,118 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,476 UART: [idev] Erasing UDS.KEYID = 0
7,622,377 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,793 UART: [idev] --
7,646,997 UART: [ldev] ++
7,647,558 UART: [ldev] CDI.KEYID = 6
7,648,494 UART: [ldev] SUBJECT.KEYID = 5
7,649,698 UART: [ldev] AUTHORITY.KEYID = 7
7,650,975 UART: [ldev] FE.KEYID = 1
7,663,276 UART: [ldev] Erasing FE.KEYID = 1
10,951,458 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,745 UART: [ldev] --
13,312,273 UART: [fwproc] Waiting for Commands...
13,314,582 UART: [fwproc] Received command 0x46574c44
13,316,755 UART: [fwproc] Received Image of size 114124 bytes
17,368,278 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,439,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,802 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,826,407 >>> mbox cmd response: success
17,826,956 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,830,954 UART: [afmc] ++
17,831,538 UART: [afmc] CDI.KEYID = 6
17,832,474 UART: [afmc] SUBJECT.KEYID = 7
17,833,679 UART: [afmc] AUTHORITY.KEYID = 5
21,149,018 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,580 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,852 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,200 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,073 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,517 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,284 UART: [afmc] --
23,516,747 UART: [cold-reset] --
23,518,496 UART: [state] Locking Datavault
23,525,790 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,546 UART: [state] Locking ICCM
23,528,934 UART: [exit] Launching FMC @ 0x40000130
23,537,322 UART:
23,537,552 UART: Running Caliptra FMC ...
23,538,647 UART:
23,538,800 UART: [state] CFI Enabled
23,546,568 UART: [fht] FMC Alias Private Key: 7
25,876,953 UART: [art] Extend RT PCRs Done
25,878,200 UART: [art] Lock RT PCRs Done
25,879,849 UART: [art] Populate DV Done
25,885,578 UART: [fht] FMC Alias Private Key: 7
25,887,055 UART: [art] Derive CDI
25,887,785 UART: [art] Store in in slot 0x4
25,930,158 UART: [art] Derive Key Pair
25,931,198 UART: [art] Store priv key in slot 0x5
29,173,238 UART: [art] Derive Key Pair - Done
29,186,058 UART: [art] Signing Cert with AUTHO
29,187,393 UART: RITY.KEYID = 7
31,466,630 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,133 UART: [art] PUB.X = 2BEE02B8A8D8C29179DB1D2F4BF942FF0B6BE5AE38BAF33F215CC3A5DF233B0DA1BD3E043B13E403FB2AF3A661D94675
31,475,426 UART: [art] PUB.Y = AE46612BB936F456C4198EA87507673ED34665E62767B40C1E3CD9379C9E06C9DC940B872C027B098CE72D805CE234C9
31,482,644 UART: [art] SIG.R = 68D57958BEF0EAE875EC08D842832F62BD5A0269FE27E69E32D1AACAD474E6957C2DE5C0822DFC312A959DBE162FA43A
31,490,018 UART: [art] SIG.S = 04B17CE29C830BF8CDD1776B2EF13AE38D49C42B8D779483EA291B4C98F561B5D46AF768D678DD3D066F7A4C6A2BC886
32,795,446 UART: Caliptra RT
32,796,178 UART: [state] CFI Enabled
32,913,927 UART: [rt] RT listening for mailbox commands...
32,945,809 UART: [rt]cmd =0x54514754, len=24
32,948,238 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
4,124,293 ready_for_fw is high
4,124,705 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,077,353 >>> mbox cmd response: success
18,078,165 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,713,527 UART:
23,713,910 UART: Running Caliptra FMC ...
23,715,007 UART:
23,715,158 UART: [state] CFI Enabled
23,723,227 UART: [fht] FMC Alias Private Key: 7
26,053,960 UART: [art] Extend RT PCRs Done
26,055,193 UART: [art] Lock RT PCRs Done
26,056,528 UART: [art] Populate DV Done
26,061,895 UART: [fht] FMC Alias Private Key: 7
26,063,384 UART: [art] Derive CDI
26,064,148 UART: [art] Store in in slot 0x4
26,106,974 UART: [art] Derive Key Pair
26,108,015 UART: [art] Store priv key in slot 0x5
29,349,593 UART: [art] Derive Key Pair - Done
29,362,425 UART: [art] Signing Cert with AUTHO
29,363,722 UART: RITY.KEYID = 7
31,642,933 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,434 UART: [art] PUB.X = 3DEE486A0F68034C55D3C09FF14FB26A4F72049BC35E429616C88119C5140FAD5E4EA24D8D86E9288614D25657019659
31,651,676 UART: [art] PUB.Y = CE2D8A2DE64B1FEA55300DB6C6FAD2ABF1A649AF3B21A5FFD2ABF34373DFC6C2F08D66C1D0A5D3E0EEC975CA591AA9D1
31,658,963 UART: [art] SIG.R = 33E5AF9D43DA3DB1867DEB7C2D1F9B77A3724571A671D55D9D153B559D94C589C184BA2FCFFE44B520D5E4E4843AE28E
31,666,368 UART: [art] SIG.S = C90FC4FC25DDFC70E67C6740FBE798495B9F8AC2B6CC2542490F735EEB6256BF6D517563FCA19CE6B11FCD440CAFE2C3
32,971,356 UART: Caliptra RT
32,972,062 UART: [state] CFI Enabled
33,090,528 UART: [rt] RT listening for mailbox commands...
33,121,888 UART: [rt]cmd =0x54514754, len=24
33,124,126 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,164 UART:
192,548 UART: Running Caliptra ROM ...
193,664 UART:
193,815 UART: [state] CFI Enabled
263,267 UART: [state] LifecycleState = Unprovisioned
265,112 UART: [state] DebugLocked = No
266,647 UART: [state] WD Timer not started. Device not locked for debugging
271,032 UART: [kat] SHA2-256
450,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,734 UART: [kat] ++
462,265 UART: [kat] sha1
474,167 UART: [kat] SHA2-256
477,221 UART: [kat] SHA2-384
483,994 UART: [kat] SHA2-512-ACC
486,928 UART: [kat] ECC-384
2,946,346 UART: [kat] HMAC-384Kdf
2,971,436 UART: [kat] LMS
3,500,924 UART: [kat] --
3,505,491 UART: [cold-reset] ++
3,507,877 UART: [fht] FHT @ 0x50003400
3,517,577 UART: [idev] ++
3,518,135 UART: [idev] CDI.KEYID = 6
3,519,087 UART: [idev] SUBJECT.KEYID = 7
3,520,261 UART: [idev] UDS.KEYID = 0
3,521,291 ready_for_fw is high
3,521,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,427 UART: [idev] Erasing UDS.KEYID = 0
6,026,244 UART: [idev] Sha1 KeyId Algorithm
6,048,288 UART: [idev] --
6,050,989 UART: [ldev] ++
6,051,555 UART: [ldev] CDI.KEYID = 6
6,052,498 UART: [ldev] SUBJECT.KEYID = 5
6,053,574 UART: [ldev] AUTHORITY.KEYID = 7
6,054,909 UART: [ldev] FE.KEYID = 1
6,100,214 UART: [ldev] Erasing FE.KEYID = 1
8,600,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,683 UART: [ldev] --
10,405,017 UART: [fwproc] Wait for Commands...
10,407,811 UART: [fwproc] Recv command 0x46574c44
10,409,845 UART: [fwproc] Recv'd Img size: 114448 bytes
13,817,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,519 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,276,537 >>> mbox cmd response: success
14,277,073 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,281,573 UART: [afmc] ++
14,282,180 UART: [afmc] CDI.KEYID = 6
14,283,066 UART: [afmc] SUBJECT.KEYID = 7
14,284,171 UART: [afmc] AUTHORITY.KEYID = 5
16,818,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,375 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,191 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,191 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,077 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,618,589 UART: [afmc] --
18,622,555 UART: [cold-reset] --
18,626,306 UART: [state] Locking Datavault
18,633,589 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,250 UART: [state] Locking ICCM
18,637,835 UART: [exit] Launching FMC @ 0x40000130
18,646,284 UART:
18,646,517 UART: Running Caliptra FMC ...
18,647,614 UART:
18,647,770 UART: [state] CFI Enabled
18,703,399 UART: [fht] FMC Alias Private Key: 7
20,467,909 UART: [art] Extend RT PCRs Done
20,469,120 UART: [art] Lock RT PCRs Done
20,470,845 UART: [art] Populate DV Done
20,476,527 UART: [fht] FMC Alias Private Key: 7
20,478,067 UART: [art] Derive CDI
20,478,804 UART: [art] Store in in slot 0x4
20,536,033 UART: [art] Derive Key Pair
20,537,029 UART: [art] Store priv key in slot 0x5
23,000,120 UART: [art] Derive Key Pair - Done
23,012,794 UART: [art] Signing Cert with AUTHO
23,014,096 UART: RITY.KEYID = 7
24,725,869 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,366 UART: [art] PUB.X = D6D5A9704833CDEE4C03040E6A90D07E6CA2414D2C8C81549C187CD8DF5728571193F5E793C7B6ABD97E6040BBD10B90
24,734,625 UART: [art] PUB.Y = E6BCD47DFE332CCC01A88023D502003F59C5D8FF92B95FEEE5FF3C47FBD9F1238212F40A2B85C3580F5904ECA8D7E7C2
24,741,915 UART: [art] SIG.R = D1D194126BBFCDDD016B0BED41671E73253BC174649B5DDEE5D4F07F9F32B7297F50D9A82BA2A75E5D910E2236A7CCDC
24,749,300 UART: [art] SIG.S = 1967CAF9FFC0413FFC53BD12D263D46D59DDE094221DE29827F0ECA7084D068A7CB16C71DF2BA63B956FD1E64EB93795
25,727,962 UART: Caliptra RT
25,728,655 UART: [state] CFI Enabled
25,893,486 UART: [rt] RT listening for mailbox commands...
25,924,836 UART: [rt]cmd =0x54514754, len=24
25,927,375 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,361,301 ready_for_fw is high
3,361,704 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,044,194 >>> mbox cmd response: success
14,044,952 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,325,074 UART:
18,325,469 UART: Running Caliptra FMC ...
18,326,607 UART:
18,326,764 UART: [state] CFI Enabled
18,394,129 UART: [fht] FMC Alias Private Key: 7
20,157,320 UART: [art] Extend RT PCRs Done
20,158,544 UART: [art] Lock RT PCRs Done
20,160,249 UART: [art] Populate DV Done
20,165,547 UART: [fht] FMC Alias Private Key: 7
20,167,192 UART: [art] Derive CDI
20,167,927 UART: [art] Store in in slot 0x4
20,226,840 UART: [art] Derive Key Pair
20,227,878 UART: [art] Store priv key in slot 0x5
22,690,904 UART: [art] Derive Key Pair - Done
22,703,792 UART: [art] Signing Cert with AUTHO
22,705,085 UART: RITY.KEYID = 7
24,416,686 UART: [art] Erasing AUTHORITY.KEYID = 7
24,418,189 UART: [art] PUB.X = AE5F40F9B220FE4B0D9970682A19466C5B4809642354864059D1E78C3997179A18BCD2D0849373B0AA93EEF89B7F5E14
24,425,440 UART: [art] PUB.Y = 5E76E40BC862443B4B97A34FBB77A339817125A535BC6863EF9867CDE074A985B479E7C925387614C028CFFA75B2E3EF
24,432,637 UART: [art] SIG.R = 0B1E61CD06981BED2A3F2680CE6B17755EEB04F7D0A523E3C08E0F6DB3EDB8487C590E775723981A15BDF55E3BF552FE
24,440,276 UART: [art] SIG.S = BE7486592033E3EF04E6E931729C13B27E2EE853902127D5DC75E9D32C2A40E45EA069F1F86E936751E8C05F5F654201
25,419,260 UART: Caliptra RT
25,419,955 UART: [state] CFI Enabled
25,585,588 UART: [rt] RT listening for mailbox commands...
25,617,163 UART: [rt]cmd =0x54514754, len=24
25,619,509 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,991 writing to cptra_bootfsm_go
193,147 UART:
193,527 UART: Running Caliptra ROM ...
194,713 UART:
604,424 UART: [state] CFI Enabled
617,720 UART: [state] LifecycleState = Unprovisioned
619,581 UART: [state] DebugLocked = No
621,679 UART: [state] WD Timer not started. Device not locked for debugging
624,497 UART: [kat] SHA2-256
803,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,241 UART: [kat] ++
815,769 UART: [kat] sha1
827,425 UART: [kat] SHA2-256
830,416 UART: [kat] SHA2-384
835,548 UART: [kat] SHA2-512-ACC
838,474 UART: [kat] ECC-384
3,280,237 UART: [kat] HMAC-384Kdf
3,292,496 UART: [kat] LMS
3,821,984 UART: [kat] --
3,826,534 UART: [cold-reset] ++
3,828,097 UART: [fht] FHT @ 0x50003400
3,838,290 UART: [idev] ++
3,838,845 UART: [idev] CDI.KEYID = 6
3,839,865 UART: [idev] SUBJECT.KEYID = 7
3,841,079 UART: [idev] UDS.KEYID = 0
3,842,230 ready_for_fw is high
3,842,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,010 UART: [idev] Erasing UDS.KEYID = 0
6,313,133 UART: [idev] Sha1 KeyId Algorithm
6,336,731 UART: [idev] --
6,340,210 UART: [ldev] ++
6,340,777 UART: [ldev] CDI.KEYID = 6
6,341,707 UART: [ldev] SUBJECT.KEYID = 5
6,342,930 UART: [ldev] AUTHORITY.KEYID = 7
6,344,155 UART: [ldev] FE.KEYID = 1
6,354,984 UART: [ldev] Erasing FE.KEYID = 1
8,832,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,000 UART: [ldev] --
10,623,417 UART: [fwproc] Wait for Commands...
10,625,725 UART: [fwproc] Recv command 0x46574c44
10,627,807 UART: [fwproc] Recv'd Img size: 114448 bytes
14,036,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,498,972 >>> mbox cmd response: success
14,499,484 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,502,940 UART: [afmc] ++
14,503,513 UART: [afmc] CDI.KEYID = 6
14,504,417 UART: [afmc] SUBJECT.KEYID = 7
14,505,624 UART: [afmc] AUTHORITY.KEYID = 5
17,004,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,798 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,642 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,759 UART: [afmc] --
18,800,341 UART: [cold-reset] --
18,802,288 UART: [state] Locking Datavault
18,807,757 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,397 UART: [state] Locking ICCM
18,812,158 UART: [exit] Launching FMC @ 0x40000130
18,820,547 UART:
18,820,775 UART: Running Caliptra FMC ...
18,821,868 UART:
18,822,018 UART: [state] CFI Enabled
18,830,596 UART: [fht] FMC Alias Private Key: 7
20,587,195 UART: [art] Extend RT PCRs Done
20,588,418 UART: [art] Lock RT PCRs Done
20,590,036 UART: [art] Populate DV Done
20,595,444 UART: [fht] FMC Alias Private Key: 7
20,597,131 UART: [art] Derive CDI
20,597,937 UART: [art] Store in in slot 0x4
20,640,410 UART: [art] Derive Key Pair
20,641,587 UART: [art] Store priv key in slot 0x5
23,067,817 UART: [art] Derive Key Pair - Done
23,080,651 UART: [art] Signing Cert with AUTHO
23,081,970 UART: RITY.KEYID = 7
24,787,195 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,691 UART: [art] PUB.X = 0EF36C058210260A670C34135114F26CA197DA3EE6C795F21031584B7DE33F7BFB00B944187A0724BE99EAD07E10E360
24,795,922 UART: [art] PUB.Y = F1D50B685A9537AB8EB66AD6242B56A2DB9CA5C0F9B9110A2218EBAA05978783EC5E67420DA5CE1A093E7D648E07F3C6
24,803,181 UART: [art] SIG.R = E7230CAC6214398E80C06488550B8DEECD9760FD273FF7B4870839CAD4FBD27071BB01F89D833E1E17739AE703230143
24,810,575 UART: [art] SIG.S = 5A3B31FA9781243BD253C5C344D9813A2CB722F037C7F8BAB031D3E223DA1992CFAFDB22C236F0C286B9339B521BDD89
25,789,753 UART: Caliptra RT
25,790,447 UART: [state] CFI Enabled
25,907,602 UART: [rt] RT listening for mailbox commands...
25,939,422 UART: [rt]cmd =0x54514754, len=24
25,941,901 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,694,195 ready_for_fw is high
3,694,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,272,720 >>> mbox cmd response: success
14,273,588 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,520,757 UART:
18,521,146 UART: Running Caliptra FMC ...
18,522,332 UART:
18,522,492 UART: [state] CFI Enabled
18,530,434 UART: [fht] FMC Alias Private Key: 7
20,287,450 UART: [art] Extend RT PCRs Done
20,288,690 UART: [art] Lock RT PCRs Done
20,289,995 UART: [art] Populate DV Done
20,295,303 UART: [fht] FMC Alias Private Key: 7
20,296,898 UART: [art] Derive CDI
20,297,708 UART: [art] Store in in slot 0x4
20,340,197 UART: [art] Derive Key Pair
20,341,243 UART: [art] Store priv key in slot 0x5
22,768,011 UART: [art] Derive Key Pair - Done
22,781,117 UART: [art] Signing Cert with AUTHO
22,782,411 UART: RITY.KEYID = 7
24,487,800 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,307 UART: [art] PUB.X = D23B12D562962D7983173C4997AED77F92445D6253DC1568E41FC3A1D0FFE7A10EDB8E7BD1AD8702B1D88823DC772B17
24,496,552 UART: [art] PUB.Y = 8A2D228546C3658B8F68404A75C9FB9FCFAA4CF22BE54F7FA5168E5EC07665DC37FE986D53B2A6A4B8F8B236B192FAEC
24,503,840 UART: [art] SIG.R = 30DC91A52658BF39D5B9957D996E2B76B20150BBC3CEDC9D23B690AA61F6FBAF9EB9ECCD956DE9143DA0F2A836F19D30
24,511,244 UART: [art] SIG.S = ECC3B4A35AD55250E2D4A0322F56841E16334AFDACFC4B5837A4443B9985232CCDC8046ABE3243318E1429FBD57F1698
25,489,491 UART: Caliptra RT
25,490,227 UART: [state] CFI Enabled
25,606,979 UART: [rt] RT listening for mailbox commands...
25,638,277 UART: [rt]cmd =0x54514754, len=24
25,640,495 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,442,534 ready_for_fw is high
3,443,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,750,674 >>> mbox cmd response: success
14,751,482 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,045,748 UART:
19,046,149 UART: Running Caliptra FMC ...
19,047,344 UART:
19,047,512 UART: [state] CFI Enabled
19,115,976 UART: [fht] FMC Alias Private Key: 7
20,879,757 UART: [art] Extend RT PCRs Done
20,880,982 UART: [art] Lock RT PCRs Done
20,882,742 UART: [art] Populate DV Done
20,888,262 UART: [fht] FMC Alias Private Key: 7
20,889,857 UART: [art] Derive CDI
20,890,673 UART: [art] Store in in slot 0x4
20,948,730 UART: [art] Derive Key Pair
20,949,777 UART: [art] Store priv key in slot 0x5
23,412,779 UART: [art] Derive Key Pair - Done
23,425,888 UART: [art] Signing Cert with AUTHO
23,427,194 UART: RITY.KEYID = 7
25,138,925 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,426 UART: [art] PUB.X = 5CB55E5CD1BFCC0623CA093D00B7D1A27B9F30CB2E71D6C0498D22340E7A462990BC876CD2CF82B2EC6DEB70B716EAC5
25,147,729 UART: [art] PUB.Y = FD1033260AA4445AC1B4C843D2D276734EC592AD52A60F07DC457FA992C200E11D394A5CEBA73144A5EDC6F9F4A999C6
25,154,958 UART: [art] SIG.R = CE82B605782EB2465FF6732063AAACF4642E27B990BA2053CA7D38D9D16795B9A32D50B870F1F1501CE968C02E19A6B4
25,162,364 UART: [art] SIG.S = 6BE9CDCEDD147A4B7656AA9647CF41634DFCAF09EFD013CB0F267E94BAED6D9E175C5943C96DEBD3212C8C660225B0E9
26,141,314 UART: Caliptra RT
26,142,005 UART: [state] CFI Enabled
26,308,200 UART: [rt] RT listening for mailbox commands...
26,339,772 UART: [rt]cmd =0x54514754, len=24
26,342,179 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,754,561 ready_for_fw is high
3,754,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,968,633 >>> mbox cmd response: success
14,969,427 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,223,651 UART:
19,224,031 UART: Running Caliptra FMC ...
19,225,146 UART:
19,225,287 UART: [state] CFI Enabled
19,233,073 UART: [fht] FMC Alias Private Key: 7
20,990,213 UART: [art] Extend RT PCRs Done
20,991,432 UART: [art] Lock RT PCRs Done
20,993,129 UART: [art] Populate DV Done
20,998,595 UART: [fht] FMC Alias Private Key: 7
21,000,250 UART: [art] Derive CDI
21,001,090 UART: [art] Store in in slot 0x4
21,043,855 UART: [art] Derive Key Pair
21,044,855 UART: [art] Store priv key in slot 0x5
23,471,812 UART: [art] Derive Key Pair - Done
23,484,709 UART: [art] Signing Cert with AUTHO
23,486,006 UART: RITY.KEYID = 7
25,191,770 UART: [art] Erasing AUTHORITY.KEYID = 7
25,193,272 UART: [art] PUB.X = 24509EFF469BB43B0B7AAAFDBF983592FBFFDA77F6A2D23AE6821144D3D117B491E6485FE7F99F66FF460F363186707A
25,200,566 UART: [art] PUB.Y = F4CFAFDADB0C640DCC643FE1115E34E2AAB5CF44912CC4E6A238E1D233892103D51084C78B90BEAAA2AD5963156FE053
25,207,873 UART: [art] SIG.R = E3AC3B78B43B2E30266387CCF756B162EE11C472D7B5F987D8182C213D9D2B8AAD793AEA90CBB4C7A2C5111533F17CF7
25,215,268 UART: [art] SIG.S = B70E3A865B0EA7F5446E504D08D2685C187A2A7D974BABF9DE147819AE2615B3D7EF70F47B4EBED8B34BFB7E88EC48B2
26,194,226 UART: Caliptra RT
26,194,907 UART: [state] CFI Enabled
26,311,906 UART: [rt] RT listening for mailbox commands...
26,343,398 UART: [rt]cmd =0x54514754, len=24
26,345,750 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,644 UART: [state] LifecycleState = Unprovisioned
85,299 UART: [state] DebugLocked = No
85,973 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,569 UART: [kat] SHA2-256
881,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,615 UART: [kat] ++
885,767 UART: [kat] sha1
890,027 UART: [kat] SHA2-256
891,965 UART: [kat] SHA2-384
894,792 UART: [kat] SHA2-512-ACC
896,693 UART: [kat] ECC-384
902,298 UART: [kat] HMAC-384Kdf
906,760 UART: [kat] LMS
1,474,956 UART: [kat] --
1,475,621 UART: [cold-reset] ++
1,476,057 UART: [fht] Storing FHT @ 0x50003400
1,478,872 UART: [idev] ++
1,479,040 UART: [idev] CDI.KEYID = 6
1,479,400 UART: [idev] SUBJECT.KEYID = 7
1,479,824 UART: [idev] UDS.KEYID = 0
1,480,169 ready_for_fw is high
1,480,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,582 UART: [idev] Erasing UDS.KEYID = 0
1,504,284 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,770 UART: [idev] --
1,513,697 UART: [ldev] ++
1,513,865 UART: [ldev] CDI.KEYID = 6
1,514,228 UART: [ldev] SUBJECT.KEYID = 5
1,514,654 UART: [ldev] AUTHORITY.KEYID = 7
1,515,117 UART: [ldev] FE.KEYID = 1
1,520,117 UART: [ldev] Erasing FE.KEYID = 1
1,545,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,540 UART: [ldev] --
1,584,825 UART: [fwproc] Waiting for Commands...
1,585,474 UART: [fwproc] Received command 0x46574c44
1,586,265 UART: [fwproc] Received Image of size 114448 bytes
2,884,866 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,860 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,233 >>> mbox cmd response: success
3,077,233 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,078,483 UART: [afmc] ++
3,078,651 UART: [afmc] CDI.KEYID = 6
3,079,013 UART: [afmc] SUBJECT.KEYID = 7
3,079,438 UART: [afmc] AUTHORITY.KEYID = 5
3,113,977 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,687 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,080 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,770 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,583 UART: [afmc] --
3,156,631 UART: [cold-reset] --
3,157,555 UART: [state] Locking Datavault
3,158,666 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,270 UART: [state] Locking ICCM
3,159,772 UART: [exit] Launching FMC @ 0x40000130
3,165,101 UART:
3,165,117 UART: Running Caliptra FMC ...
3,165,525 UART:
3,165,579 UART: [state] CFI Enabled
3,175,772 UART: [fht] FMC Alias Private Key: 7
3,283,801 UART: [art] Extend RT PCRs Done
3,284,229 UART: [art] Lock RT PCRs Done
3,285,929 UART: [art] Populate DV Done
3,294,130 UART: [fht] FMC Alias Private Key: 7
3,295,086 UART: [art] Derive CDI
3,295,366 UART: [art] Store in in slot 0x4
3,381,161 UART: [art] Derive Key Pair
3,381,521 UART: [art] Store priv key in slot 0x5
3,394,737 UART: [art] Derive Key Pair - Done
3,409,339 UART: [art] Signing Cert with AUTHO
3,409,819 UART: RITY.KEYID = 7
3,425,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,060 UART: [art] PUB.X = 429A6CE2F222B1FD505F103175718E739F9579912D0473DC5A903270C4BF0C36508CA966F424A95F0CE24584A5E9A506
3,432,812 UART: [art] PUB.Y = 4DE04599BDA8D01C51ADF44BA231BFB9CD8F3B0411E15AAB952E8B6BD916BACE4C9BA0F4C8F7E8907AA1DF86E7E7F949
3,439,787 UART: [art] SIG.R = 881F8CA48CF8B9386AD976549E6032A4B00A2E84FA75DF4F78C321C5BB9373064FF0E0858EE62D43DCF34DEF26805402
3,446,554 UART: [art] SIG.S = 51C8CFB07D8864440F425C0D9CC8BF52D7E80F69FB6280D7B253B0B3E9DEE022D9DC23E750E69C4C29091E47E8A4DE6E
3,470,339 UART: Caliptra RT
3,470,592 UART: [state] CFI Enabled
3,579,033 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,013 UART: [rt]cmd =0x54514754, len=24
3,611,768 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,563 ready_for_fw is high
1,362,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,027 >>> mbox cmd response: success
2,930,027 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,992,097 UART:
2,992,113 UART: Running Caliptra FMC ...
2,992,521 UART:
2,992,575 UART: [state] CFI Enabled
3,002,906 UART: [fht] FMC Alias Private Key: 7
3,110,643 UART: [art] Extend RT PCRs Done
3,111,071 UART: [art] Lock RT PCRs Done
3,112,709 UART: [art] Populate DV Done
3,120,896 UART: [fht] FMC Alias Private Key: 7
3,121,966 UART: [art] Derive CDI
3,122,246 UART: [art] Store in in slot 0x4
3,208,093 UART: [art] Derive Key Pair
3,208,453 UART: [art] Store priv key in slot 0x5
3,221,825 UART: [art] Derive Key Pair - Done
3,236,279 UART: [art] Signing Cert with AUTHO
3,236,759 UART: RITY.KEYID = 7
3,251,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,546 UART: [art] PUB.X = 2ABFD4A1C8712A3E3DDD0A887E8CED149EDF11B0259E2C5E5611789F2056C72D8FCA7B52C92DB75D6D9F6893DFF77112
3,259,329 UART: [art] PUB.Y = EA7020F7157699EDCD48CCE72638EA748A8D15463E93F31B05663A7E4B9785538AD8319048F539CFBE6230FD858CA7CE
3,266,280 UART: [art] SIG.R = 91968BDAD4B1DACC1A8EE86F43FED1B24A32E0406B7AD3969EAF0808A9BFDBCAE7D0E140B45C84B94C5DE5E280CE95D3
3,273,072 UART: [art] SIG.S = 40C4688B69F067746B5B731A4B0554416DADA6C1437F5CC1DEA2D22060512A024EEAD5D86789BED675B768EEEE7D5766
3,296,775 UART: Caliptra RT
3,297,028 UART: [state] CFI Enabled
3,405,033 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,489 UART: [rt]cmd =0x54514754, len=24
3,437,348 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,364 UART: [kat] SHA2-256
882,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,410 UART: [kat] ++
886,562 UART: [kat] sha1
890,588 UART: [kat] SHA2-256
892,526 UART: [kat] SHA2-384
895,147 UART: [kat] SHA2-512-ACC
897,048 UART: [kat] ECC-384
902,819 UART: [kat] HMAC-384Kdf
907,491 UART: [kat] LMS
1,475,687 UART: [kat] --
1,476,314 UART: [cold-reset] ++
1,476,888 UART: [fht] Storing FHT @ 0x50003400
1,479,521 UART: [idev] ++
1,479,689 UART: [idev] CDI.KEYID = 6
1,480,049 UART: [idev] SUBJECT.KEYID = 7
1,480,473 UART: [idev] UDS.KEYID = 0
1,480,818 ready_for_fw is high
1,480,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,573 UART: [idev] Erasing UDS.KEYID = 0
1,505,335 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,013 UART: [idev] --
1,514,944 UART: [ldev] ++
1,515,112 UART: [ldev] CDI.KEYID = 6
1,515,475 UART: [ldev] SUBJECT.KEYID = 5
1,515,901 UART: [ldev] AUTHORITY.KEYID = 7
1,516,364 UART: [ldev] FE.KEYID = 1
1,521,808 UART: [ldev] Erasing FE.KEYID = 1
1,546,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,345 UART: [ldev] --
1,585,670 UART: [fwproc] Waiting for Commands...
1,586,497 UART: [fwproc] Received command 0x46574c44
1,587,288 UART: [fwproc] Received Image of size 114448 bytes
2,887,177 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,433 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,785 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,704 >>> mbox cmd response: success
3,079,704 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,754 UART: [afmc] ++
3,080,922 UART: [afmc] CDI.KEYID = 6
3,081,284 UART: [afmc] SUBJECT.KEYID = 7
3,081,709 UART: [afmc] AUTHORITY.KEYID = 5
3,116,874 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,090 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,818 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,703 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,393 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,388 UART: [afmc] --
3,160,382 UART: [cold-reset] --
3,161,160 UART: [state] Locking Datavault
3,162,297 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,901 UART: [state] Locking ICCM
3,163,479 UART: [exit] Launching FMC @ 0x40000130
3,168,808 UART:
3,168,824 UART: Running Caliptra FMC ...
3,169,232 UART:
3,169,375 UART: [state] CFI Enabled
3,179,700 UART: [fht] FMC Alias Private Key: 7
3,287,877 UART: [art] Extend RT PCRs Done
3,288,305 UART: [art] Lock RT PCRs Done
3,289,793 UART: [art] Populate DV Done
3,297,988 UART: [fht] FMC Alias Private Key: 7
3,299,072 UART: [art] Derive CDI
3,299,352 UART: [art] Store in in slot 0x4
3,384,873 UART: [art] Derive Key Pair
3,385,233 UART: [art] Store priv key in slot 0x5
3,398,317 UART: [art] Derive Key Pair - Done
3,412,805 UART: [art] Signing Cert with AUTHO
3,413,285 UART: RITY.KEYID = 7
3,428,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,308 UART: [art] PUB.X = 7B2E25750AB78C412B8F3D89425F31B52D825E2452647EDBC8DFAB5D2BC0DAF509048BD133E094A96A97BD42B29AA193
3,436,079 UART: [art] PUB.Y = 640E8D808BA7F4CF8218961A04F47D51B843FD1D178ED0844F874FB91F6910B76D587F3A30DF57ACB4E9D88E4A3CE673
3,443,031 UART: [art] SIG.R = C60470427C0F96C78FEF9CED8F219FE7BF81E7FD3402BFE467BEDC93BF106BCD95335893FE4DBCAE3639CCCB618BB6C9
3,449,818 UART: [art] SIG.S = EA72E9D9C40C1B0ED93027CCE2E5ACEE7CFE910ACF4399239A6C3A3E90FAE1839AE1EE12F2334291DE2060B444BA866C
3,473,324 UART: Caliptra RT
3,473,669 UART: [state] CFI Enabled
3,582,059 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,347 UART: [rt]cmd =0x54514754, len=24
3,614,160 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,354 ready_for_fw is high
1,363,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,816 >>> mbox cmd response: success
2,929,816 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,992,064 UART:
2,992,080 UART: Running Caliptra FMC ...
2,992,488 UART:
2,992,631 UART: [state] CFI Enabled
3,003,356 UART: [fht] FMC Alias Private Key: 7
3,111,623 UART: [art] Extend RT PCRs Done
3,112,051 UART: [art] Lock RT PCRs Done
3,113,613 UART: [art] Populate DV Done
3,122,092 UART: [fht] FMC Alias Private Key: 7
3,123,022 UART: [art] Derive CDI
3,123,302 UART: [art] Store in in slot 0x4
3,209,155 UART: [art] Derive Key Pair
3,209,515 UART: [art] Store priv key in slot 0x5
3,223,319 UART: [art] Derive Key Pair - Done
3,237,697 UART: [art] Signing Cert with AUTHO
3,238,177 UART: RITY.KEYID = 7
3,253,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,918 UART: [art] PUB.X = 1A6D040676D2AF372603EF31D5CF64D11D4A081F0AEC2C38AB5CAB05A5B8AEAB74ED084B3138A26D37D5DCEC6A416BD2
3,260,689 UART: [art] PUB.Y = 2D9490FCECB1DC53AD3F291803A3BE8FD994C669A0533F9684862D26633CF3A76D48C2E7617EFB71DCE5A65F22477BCD
3,267,648 UART: [art] SIG.R = 1D4E92F36AF90D8D84E5BFD31EC009DF714115E52FFEC368B3E9B02D8D72C8A5ACCDE0DD6E7D0C09C04FB8C7167B194A
3,274,430 UART: [art] SIG.S = 241A05296E4A136C96B7EC106A138EFAE9A67F9375B36350BE6C3264DF894AD514C7B486A7BAF9EEE140A95FF41495AF
3,298,490 UART: Caliptra RT
3,298,835 UART: [state] CFI Enabled
3,406,069 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,765 UART: [rt]cmd =0x54514754, len=24
3,438,348 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
893,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,565 UART: [kat] ++
897,717 UART: [kat] sha1
902,097 UART: [kat] SHA2-256
904,037 UART: [kat] SHA2-384
906,864 UART: [kat] SHA2-512-ACC
908,765 UART: [kat] ECC-384
918,338 UART: [kat] HMAC-384Kdf
923,002 UART: [kat] LMS
1,171,330 UART: [kat] --
1,172,353 UART: [cold-reset] ++
1,172,853 UART: [fht] FHT @ 0x50003400
1,175,442 UART: [idev] ++
1,175,610 UART: [idev] CDI.KEYID = 6
1,175,970 UART: [idev] SUBJECT.KEYID = 7
1,176,394 UART: [idev] UDS.KEYID = 0
1,176,739 ready_for_fw is high
1,176,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,406 UART: [idev] Erasing UDS.KEYID = 0
1,200,623 UART: [idev] Sha1 KeyId Algorithm
1,209,063 UART: [idev] --
1,210,155 UART: [ldev] ++
1,210,323 UART: [ldev] CDI.KEYID = 6
1,210,686 UART: [ldev] SUBJECT.KEYID = 5
1,211,112 UART: [ldev] AUTHORITY.KEYID = 7
1,211,575 UART: [ldev] FE.KEYID = 1
1,216,581 UART: [ldev] Erasing FE.KEYID = 1
1,243,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,934 UART: [fwproc] Wait for Commands...
1,282,544 UART: [fwproc] Recv command 0x46574c44
1,283,272 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,610 >>> mbox cmd response: success
2,775,610 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,704 UART: [afmc] ++
2,776,872 UART: [afmc] CDI.KEYID = 6
2,777,234 UART: [afmc] SUBJECT.KEYID = 7
2,777,659 UART: [afmc] AUTHORITY.KEYID = 5
2,813,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,100 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,819 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,821 UART: [afmc] --
2,856,923 UART: [cold-reset] --
2,857,737 UART: [state] Locking Datavault
2,858,774 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,378 UART: [state] Locking ICCM
2,859,864 UART: [exit] Launching FMC @ 0x40000130
2,865,193 UART:
2,865,209 UART: Running Caliptra FMC ...
2,865,617 UART:
2,865,671 UART: [state] CFI Enabled
2,876,004 UART: [fht] FMC Alias Private Key: 7
2,984,627 UART: [art] Extend RT PCRs Done
2,985,055 UART: [art] Lock RT PCRs Done
2,986,571 UART: [art] Populate DV Done
2,994,512 UART: [fht] FMC Alias Private Key: 7
2,995,472 UART: [art] Derive CDI
2,995,752 UART: [art] Store in in slot 0x4
3,081,439 UART: [art] Derive Key Pair
3,081,799 UART: [art] Store priv key in slot 0x5
3,095,187 UART: [art] Derive Key Pair - Done
3,110,097 UART: [art] Signing Cert with AUTHO
3,110,577 UART: RITY.KEYID = 7
3,125,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,538 UART: [art] PUB.X = 3A0EA83A704A7C920AD957141E83CA4B25E72FB3CF41B9F524E59F1D65BF14539FEF6BF8ED2D6A279AF0AD37D4DD034C
3,133,319 UART: [art] PUB.Y = 3C9053B83B4F5A81D5CF6FD25AC75F67AA4019813934548A79490DED0C27EDCE0BF4F576402E0B9A9206543262F0E49D
3,140,258 UART: [art] SIG.R = 03A4C9C6CDB58C28952119B35480E56658EC800D4096B9447FC9C2CC063E51A1BF95AF4ECCA8A86B6352D88554DD4C3A
3,147,027 UART: [art] SIG.S = 1A6864B41C0B0283E442E05856928BDF873A1DB03FD9B83C8EC10B9A0D5B2B19C95A1D074D2D30A42040394AC2C8E1C4
3,171,055 UART: Caliptra RT
3,171,308 UART: [state] CFI Enabled
3,279,121 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,643 UART: [rt]cmd =0x54514754, len=24
3,311,718 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,487 ready_for_fw is high
1,060,487 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,104 >>> mbox cmd response: success
2,627,104 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,690,340 UART:
2,690,356 UART: Running Caliptra FMC ...
2,690,764 UART:
2,690,818 UART: [state] CFI Enabled
2,701,291 UART: [fht] FMC Alias Private Key: 7
2,809,480 UART: [art] Extend RT PCRs Done
2,809,908 UART: [art] Lock RT PCRs Done
2,811,686 UART: [art] Populate DV Done
2,819,681 UART: [fht] FMC Alias Private Key: 7
2,820,727 UART: [art] Derive CDI
2,821,007 UART: [art] Store in in slot 0x4
2,906,366 UART: [art] Derive Key Pair
2,906,726 UART: [art] Store priv key in slot 0x5
2,920,232 UART: [art] Derive Key Pair - Done
2,935,203 UART: [art] Signing Cert with AUTHO
2,935,683 UART: RITY.KEYID = 7
2,950,901 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,666 UART: [art] PUB.X = 27AE9B7F63274C5786DFE843F6955DACC95617EFA6502A6EA313DD2D7850720316D31D9A7D27764259BB2914A96641DA
2,958,433 UART: [art] PUB.Y = 68AA7E122A092294A8D8F7A7D7FDEF3AEDD794933463C3E83F1AA04639B3054DEE1845ACEB388ADB0D8C9B81D532B2BE
2,965,392 UART: [art] SIG.R = FDC41DA1B3459D861A7E1F271288F1265E835EFFC336713CACC6FAF2AE3FBA83898C61CB24C0942454D1BD7BDB9BB80D
2,972,179 UART: [art] SIG.S = 466EE261D18BE4A196B9C07430EED0BDD02E66BDB9651C4BF51C26C42C49DF0F421604BEA8CEB2A49756F6314D29F5B4
2,996,388 UART: Caliptra RT
2,996,641 UART: [state] CFI Enabled
3,104,960 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,562 UART: [rt]cmd =0x54514754, len=24
3,137,681 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
893,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,902 UART: [kat] ++
898,054 UART: [kat] sha1
902,462 UART: [kat] SHA2-256
904,402 UART: [kat] SHA2-384
907,161 UART: [kat] SHA2-512-ACC
909,062 UART: [kat] ECC-384
918,683 UART: [kat] HMAC-384Kdf
923,083 UART: [kat] LMS
1,171,411 UART: [kat] --
1,172,110 UART: [cold-reset] ++
1,172,544 UART: [fht] FHT @ 0x50003400
1,175,211 UART: [idev] ++
1,175,379 UART: [idev] CDI.KEYID = 6
1,175,739 UART: [idev] SUBJECT.KEYID = 7
1,176,163 UART: [idev] UDS.KEYID = 0
1,176,508 ready_for_fw is high
1,176,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,715 UART: [idev] Erasing UDS.KEYID = 0
1,201,190 UART: [idev] Sha1 KeyId Algorithm
1,209,828 UART: [idev] --
1,210,794 UART: [ldev] ++
1,210,962 UART: [ldev] CDI.KEYID = 6
1,211,325 UART: [ldev] SUBJECT.KEYID = 5
1,211,751 UART: [ldev] AUTHORITY.KEYID = 7
1,212,214 UART: [ldev] FE.KEYID = 1
1,217,490 UART: [ldev] Erasing FE.KEYID = 1
1,243,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,274 UART: [ldev] --
1,282,709 UART: [fwproc] Wait for Commands...
1,283,461 UART: [fwproc] Recv command 0x46574c44
1,284,189 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,720 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,595 >>> mbox cmd response: success
2,775,595 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,735 UART: [afmc] ++
2,776,903 UART: [afmc] CDI.KEYID = 6
2,777,265 UART: [afmc] SUBJECT.KEYID = 7
2,777,690 UART: [afmc] AUTHORITY.KEYID = 5
2,813,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,447 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,166 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,056 UART: [afmc] --
2,856,994 UART: [cold-reset] --
2,857,678 UART: [state] Locking Datavault
2,859,005 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,609 UART: [state] Locking ICCM
2,860,233 UART: [exit] Launching FMC @ 0x40000130
2,865,562 UART:
2,865,578 UART: Running Caliptra FMC ...
2,865,986 UART:
2,866,129 UART: [state] CFI Enabled
2,876,560 UART: [fht] FMC Alias Private Key: 7
2,985,331 UART: [art] Extend RT PCRs Done
2,985,759 UART: [art] Lock RT PCRs Done
2,987,145 UART: [art] Populate DV Done
2,995,544 UART: [fht] FMC Alias Private Key: 7
2,996,640 UART: [art] Derive CDI
2,996,920 UART: [art] Store in in slot 0x4
3,082,595 UART: [art] Derive Key Pair
3,082,955 UART: [art] Store priv key in slot 0x5
3,096,375 UART: [art] Derive Key Pair - Done
3,111,226 UART: [art] Signing Cert with AUTHO
3,111,706 UART: RITY.KEYID = 7
3,126,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,567 UART: [art] PUB.X = C33CF6102AB5CDAC50C7C8B1DA1EAF23DCBA4383B8DC6BF52AE2DFF0C8E81765A3C76F5C2C0777E4EA170DABD1DC92BC
3,134,367 UART: [art] PUB.Y = 480E4FAEF6306D04DF1B347CEE4C8444D5D2D86A0D1308FD68F9682DDB2B270BA45679C855711A9F9B9241B7D8A7632A
3,141,310 UART: [art] SIG.R = EC14226512DD961CECD13AD84F26E79A431B312493B01FB1CF6D3D272672D6EE40316B3539A20C431043E39AFF11D202
3,148,076 UART: [art] SIG.S = 8AC27E0AF4DEEB2DBCD81F4E325CBF47147BB4BC4657FD7C61D13752436E24352C7D8D754389F627FD4805209632866C
3,171,885 UART: Caliptra RT
3,172,230 UART: [state] CFI Enabled
3,280,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,072 UART: [rt]cmd =0x54514754, len=24
3,313,285 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,272 ready_for_fw is high
1,060,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,178 >>> mbox cmd response: success
2,630,178 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,691,934 UART:
2,691,950 UART: Running Caliptra FMC ...
2,692,358 UART:
2,692,501 UART: [state] CFI Enabled
2,703,126 UART: [fht] FMC Alias Private Key: 7
2,811,087 UART: [art] Extend RT PCRs Done
2,811,515 UART: [art] Lock RT PCRs Done
2,813,087 UART: [art] Populate DV Done
2,821,260 UART: [fht] FMC Alias Private Key: 7
2,822,384 UART: [art] Derive CDI
2,822,664 UART: [art] Store in in slot 0x4
2,908,233 UART: [art] Derive Key Pair
2,908,593 UART: [art] Store priv key in slot 0x5
2,922,037 UART: [art] Derive Key Pair - Done
2,937,008 UART: [art] Signing Cert with AUTHO
2,937,488 UART: RITY.KEYID = 7
2,952,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,159 UART: [art] PUB.X = 8F3988CA7A0E2D3E3AFD7B5B3FB8E22973213D90777B92E787AE8ED11C55E15E73763D3E1B76A318C445054DA1B09F9F
2,959,931 UART: [art] PUB.Y = 8E173E09395D99588C18B8C6148A2F95EF4BAB5E6EFFD14BB553C9AA0BD93C5C6981C6F6D02CD183B9B91772F72B9A60
2,966,887 UART: [art] SIG.R = 2EC7BAC29D7CDEEC0FF80FADB83F64B9D799B69327C582E07E17F709372D4561635D422C1A65556B7FF02BC63DFB2558
2,973,660 UART: [art] SIG.S = F0AD072AA56E22076463583071DCBEBF1375B9F73DA62325FE25A073511E9BF12DFB14BC8512003ADB76E9247EE5116A
2,997,275 UART: Caliptra RT
2,997,620 UART: [state] CFI Enabled
3,105,375 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,205 UART: [rt]cmd =0x54514754, len=24
3,138,188 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,133 UART: [kat] ++
895,285 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
916,018 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,729 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,174,321 ready_for_fw is high
1,174,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,198,129 UART: [idev] Sha1 KeyId Algorithm
1,206,897 UART: [idev] --
1,207,826 UART: [ldev] ++
1,207,994 UART: [ldev] CDI.KEYID = 6
1,208,358 UART: [ldev] SUBJECT.KEYID = 5
1,208,785 UART: [ldev] AUTHORITY.KEYID = 7
1,209,248 UART: [ldev] FE.KEYID = 1
1,214,622 UART: [ldev] Erasing FE.KEYID = 1
1,241,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,810 UART: [ldev] --
1,280,136 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,694 >>> mbox cmd response: success
2,772,694 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,721 UART: [afmc] ++
2,773,889 UART: [afmc] CDI.KEYID = 6
2,774,252 UART: [afmc] SUBJECT.KEYID = 7
2,774,678 UART: [afmc] AUTHORITY.KEYID = 5
2,809,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,866 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,595 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,478 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,197 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,980 UART: [afmc] --
2,853,062 UART: [cold-reset] --
2,853,708 UART: [state] Locking Datavault
2,854,869 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,473 UART: [state] Locking ICCM
2,856,053 UART: [exit] Launching FMC @ 0x40000130
2,861,382 UART:
2,861,398 UART: Running Caliptra FMC ...
2,861,806 UART:
2,861,860 UART: [state] CFI Enabled
2,872,213 UART: [fht] FMC Alias Private Key: 7
2,980,530 UART: [art] Extend RT PCRs Done
2,980,958 UART: [art] Lock RT PCRs Done
2,982,796 UART: [art] Populate DV Done
2,990,761 UART: [fht] FMC Alias Private Key: 7
2,991,741 UART: [art] Derive CDI
2,992,021 UART: [art] Store in in slot 0x4
3,077,764 UART: [art] Derive Key Pair
3,078,124 UART: [art] Store priv key in slot 0x5
3,091,030 UART: [art] Derive Key Pair - Done
3,105,788 UART: [art] Signing Cert with AUTHO
3,106,268 UART: RITY.KEYID = 7
3,121,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,513 UART: [art] PUB.X = 5A4FD5A347BA1481DB73C49C0B1140527B5C8947AF5C90C22D4A38382801463B399832200E4EF3024873B07CAB271613
3,129,263 UART: [art] PUB.Y = A1DC27E9E6257E878997A3F9F7F85AD3FD8ED0081A81FDD4CE55A7F235081074C83544788EB3A6CAA03E4673DF418CF0
3,136,217 UART: [art] SIG.R = DC544D8D96F88FDEBFDE6C62F06030F2F519CFEA0102FA87AEF223C3DFA6788EE4152D966032F8A6077F40F5277591B4
3,142,990 UART: [art] SIG.S = BC20A7DBE3D407EC652B7C022519492584E435005E3BEF669E20646E08B0E98C135A7BB4C125C01B432FC4FB0066E854
3,166,652 UART: Caliptra RT
3,166,905 UART: [state] CFI Enabled
3,275,165 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,815 UART: [rt]cmd =0x54514754, len=24
3,307,890 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,238 ready_for_fw is high
1,056,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,812 >>> mbox cmd response: success
2,623,812 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,258 UART:
2,686,274 UART: Running Caliptra FMC ...
2,686,682 UART:
2,686,736 UART: [state] CFI Enabled
2,696,775 UART: [fht] FMC Alias Private Key: 7
2,804,226 UART: [art] Extend RT PCRs Done
2,804,654 UART: [art] Lock RT PCRs Done
2,806,088 UART: [art] Populate DV Done
2,814,439 UART: [fht] FMC Alias Private Key: 7
2,815,405 UART: [art] Derive CDI
2,815,685 UART: [art] Store in in slot 0x4
2,902,050 UART: [art] Derive Key Pair
2,902,410 UART: [art] Store priv key in slot 0x5
2,915,002 UART: [art] Derive Key Pair - Done
2,929,835 UART: [art] Signing Cert with AUTHO
2,930,315 UART: RITY.KEYID = 7
2,945,711 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,476 UART: [art] PUB.X = 72275442CEBCCB776F521CDB78D3EA58D341C456AC8D235505F618757D87DE1D01B4D35F376A5F3BEB0B4DD274EA5EDB
2,953,253 UART: [art] PUB.Y = F42C9DFF9E3CC10E36D1A1F3BE0A8CE4B39A267270713E606BB520225FA1571A6D0E26A1DD7F0C22444FFD095949D5D9
2,960,200 UART: [art] SIG.R = EE51001935A73F569BA75AF51ED6891BCE697F7EEFF9EFF21C3959695593EBB886F081F986D896ABCF836FBF2A7F17C4
2,966,962 UART: [art] SIG.S = 570B310C322087CB38E8EC9AC54EE668D5786395A30CB11940AE026D73C6A5A45C5B49012DCB86CFE9ED680168E0A7A3
2,990,713 UART: Caliptra RT
2,990,966 UART: [state] CFI Enabled
3,097,807 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,591 UART: [rt]cmd =0x54514754, len=24
3,130,536 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
891,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,831 UART: [kat] SHA2-512-ACC
906,732 UART: [kat] ECC-384
916,683 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,230 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,174,798 ready_for_fw is high
1,174,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,592 UART: [idev] Erasing UDS.KEYID = 0
1,199,944 UART: [idev] Sha1 KeyId Algorithm
1,208,770 UART: [idev] --
1,209,795 UART: [ldev] ++
1,209,963 UART: [ldev] CDI.KEYID = 6
1,210,327 UART: [ldev] SUBJECT.KEYID = 5
1,210,754 UART: [ldev] AUTHORITY.KEYID = 7
1,211,217 UART: [ldev] FE.KEYID = 1
1,216,227 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,545 UART: [ldev] --
1,282,013 UART: [fwproc] Wait for Commands...
1,282,730 UART: [fwproc] Recv command 0x46574c44
1,283,463 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,457 >>> mbox cmd response: success
2,775,457 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,622 UART: [afmc] ++
2,776,790 UART: [afmc] CDI.KEYID = 6
2,777,153 UART: [afmc] SUBJECT.KEYID = 7
2,777,579 UART: [afmc] AUTHORITY.KEYID = 5
2,813,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,684 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,435 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,164 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,047 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,766 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,471 UART: [afmc] --
2,856,361 UART: [cold-reset] --
2,857,241 UART: [state] Locking Datavault
2,858,558 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,162 UART: [state] Locking ICCM
2,859,692 UART: [exit] Launching FMC @ 0x40000130
2,865,021 UART:
2,865,037 UART: Running Caliptra FMC ...
2,865,445 UART:
2,865,588 UART: [state] CFI Enabled
2,875,945 UART: [fht] FMC Alias Private Key: 7
2,984,488 UART: [art] Extend RT PCRs Done
2,984,916 UART: [art] Lock RT PCRs Done
2,986,296 UART: [art] Populate DV Done
2,994,525 UART: [fht] FMC Alias Private Key: 7
2,995,641 UART: [art] Derive CDI
2,995,921 UART: [art] Store in in slot 0x4
3,081,194 UART: [art] Derive Key Pair
3,081,554 UART: [art] Store priv key in slot 0x5
3,095,030 UART: [art] Derive Key Pair - Done
3,109,815 UART: [art] Signing Cert with AUTHO
3,110,295 UART: RITY.KEYID = 7
3,125,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,226 UART: [art] PUB.X = 3A1E54E61EDF3D847D511DB43CAACB3BC4A57D9A294657B1C6C87A8C08275122E5D9010AE2192A7B9FDD31BA8159C0BA
3,133,003 UART: [art] PUB.Y = 7965D95F744E61B698C59F7A1BC741A4B31306ED0B6D2A0CA1E43F20B94E6B5BEC2EDF119FD93C46D37DE30A2D0373C1
3,139,952 UART: [art] SIG.R = 946E3C3EB79FA15DDC74616A450578DCD4F6DDD624387ACE887EAD57C861F29D99FAF42CD9247D1935684E424B360B40
3,146,724 UART: [art] SIG.S = 03D71E68933775528DCA9EA73DC266E27105DF5911477635AA9E1CCE83CC981DDE4D4E8C60EA275B9D6349A43E766934
3,170,209 UART: Caliptra RT
3,170,554 UART: [state] CFI Enabled
3,277,781 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,389 UART: [rt]cmd =0x54514754, len=24
3,310,604 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,935 ready_for_fw is high
1,055,935 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,113 >>> mbox cmd response: success
2,625,113 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,253 UART:
2,687,269 UART: Running Caliptra FMC ...
2,687,677 UART:
2,687,820 UART: [state] CFI Enabled
2,698,321 UART: [fht] FMC Alias Private Key: 7
2,806,648 UART: [art] Extend RT PCRs Done
2,807,076 UART: [art] Lock RT PCRs Done
2,808,724 UART: [art] Populate DV Done
2,816,997 UART: [fht] FMC Alias Private Key: 7
2,818,049 UART: [art] Derive CDI
2,818,329 UART: [art] Store in in slot 0x4
2,903,934 UART: [art] Derive Key Pair
2,904,294 UART: [art] Store priv key in slot 0x5
2,917,778 UART: [art] Derive Key Pair - Done
2,932,520 UART: [art] Signing Cert with AUTHO
2,933,000 UART: RITY.KEYID = 7
2,948,092 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,857 UART: [art] PUB.X = 131FE66CCE55669985F0EA817652CC8B24E170500104966EBFDE8DCA6DB0B6FC64C8C3F39DF12421488D8E989D5E6F50
2,955,629 UART: [art] PUB.Y = 5064064C862E7D2967CA0FE4735608C8954A09106602DB7DAD1D9422E97B9388BA0F35A8FEFABDDF758F4BB21B0BFF1F
2,962,570 UART: [art] SIG.R = 3C91022FC96180329F98082CAD7D0E6009880C5759AD0B82E384D083E79F351A275571E073A46149C900B9205CC10D44
2,969,285 UART: [art] SIG.S = 1F8B668D07C89F37B789177FCB4C3563DEE9A27D1D5CA940F70E8413BB3DBBA16003C80DE5FCD1F7B7C56574C45545C4
2,992,534 UART: Caliptra RT
2,992,879 UART: [state] CFI Enabled
3,101,374 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,894 UART: [rt]cmd =0x54514754, len=24
3,133,765 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,067 UART:
192,436 UART: Running Caliptra ROM ...
193,563 UART:
193,710 UART: [state] CFI Enabled
266,026 UART: [state] LifecycleState = Unprovisioned
268,003 UART: [state] DebugLocked = No
269,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,132 UART: [kat] SHA2-256
443,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,308 UART: [kat] ++
454,763 UART: [kat] sha1
467,201 UART: [kat] SHA2-256
469,861 UART: [kat] SHA2-384
476,013 UART: [kat] SHA2-512-ACC
478,353 UART: [kat] ECC-384
2,768,843 UART: [kat] HMAC-384Kdf
2,800,552 UART: [kat] LMS
3,990,893 UART: [kat] --
3,995,624 UART: [cold-reset] ++
3,998,129 UART: [fht] Storing FHT @ 0x50003400
4,009,043 UART: [idev] ++
4,009,628 UART: [idev] CDI.KEYID = 6
4,010,557 UART: [idev] SUBJECT.KEYID = 7
4,011,805 UART: [idev] UDS.KEYID = 0
4,012,874 ready_for_fw is high
4,013,098 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,740 UART: [idev] Erasing UDS.KEYID = 0
7,344,373 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,986 UART: [idev] --
7,372,020 UART: [ldev] ++
7,372,591 UART: [ldev] CDI.KEYID = 6
7,373,530 UART: [ldev] SUBJECT.KEYID = 5
7,374,801 UART: [ldev] AUTHORITY.KEYID = 7
7,376,033 UART: [ldev] FE.KEYID = 1
7,424,332 UART: [ldev] Erasing FE.KEYID = 1
10,756,323 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,987 UART: [ldev] --
13,117,043 UART: [fwproc] Waiting for Commands...
13,118,924 UART: [fwproc] Received command 0x46574c44
13,121,106 UART: [fwproc] Received Image of size 114124 bytes
17,170,191 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,383 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,628,107 >>> mbox cmd response: success
17,628,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,631,565 UART: [afmc] ++
17,632,156 UART: [afmc] CDI.KEYID = 6
17,633,076 UART: [afmc] SUBJECT.KEYID = 7
17,634,297 UART: [afmc] AUTHORITY.KEYID = 5
20,993,870 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,293,901 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,296,158 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,310,579 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,325,415 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,339,907 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,360,947 UART: [afmc] --
23,365,026 UART: [cold-reset] --
23,368,432 UART: [state] Locking Datavault
23,373,304 UART: [state] Locking PCR0, PCR1 and PCR31
23,375,063 UART: [state] Locking ICCM
23,377,437 UART: [exit] Launching FMC @ 0x40000130
23,385,834 UART:
23,386,075 UART: Running Caliptra FMC ...
23,387,180 UART:
23,387,342 UART: [state] CFI Enabled
23,452,481 UART: [fht] FMC Alias Private Key: 7
25,790,234 UART: [art] Extend RT PCRs Done
25,791,458 UART: [art] Lock RT PCRs Done
25,793,224 UART: [art] Populate DV Done
25,798,528 UART: [fht] FMC Alias Private Key: 7
25,800,237 UART: [art] Derive CDI
25,801,054 UART: [art] Store in in slot 0x4
25,861,361 UART: [art] Derive Key Pair
25,862,416 UART: [art] Store priv key in slot 0x5
29,155,500 UART: [art] Derive Key Pair - Done
29,168,325 UART: [art] Signing Cert with AUTHO
29,169,658 UART: RITY.KEYID = 7
31,456,433 UART: [art] Erasing AUTHORITY.KEYID = 7
31,457,938 UART: [art] PUB.X = EBBCCD8B8A679C385A7423A54F26FBCCFAC34F65D212860669E96CC3F3623101C5D0043C165775F8AD6FEECE2E66FCEC
31,465,187 UART: [art] PUB.Y = 1A0556737F2DEF45B2FAA858ECC4B1662C4F25CDE59782DD3BE364E024622B72910BC533EEE32B8598182FA3B584904D
31,472,418 UART: [art] SIG.R = 91D926ADAE9913E693F4AE73DB2F545B4B726D99903CF8DFFB543823F32AEB350712829757663FE9ED2F517E3C10AECF
31,479,815 UART: [art] SIG.S = F752B9C327E87A14C07CF2F7B64192AF7FC77A7AD223B5E9717F61A6BE69835461467D7CCD58EC733527AC1BF06D68DE
32,785,469 UART: Caliptra RT
32,786,173 UART: [state] CFI Enabled
32,945,924 UART: [rt] RT listening for mailbox commands...
32,977,573 UART: [rt]cmd =0x44504543, len=96
33,026,343 >>> mbox cmd response data (56 bytes)
33,027,505 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,057,547 UART: [rt]cmd =0x54514754, len=24
33,059,941 >>> mbox cmd response: failed
33,060,363 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,090,079 UART: [rt]cmd =0x54514754, len=24
33,092,825 >>> mbox cmd response data (8 bytes)
33,093,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,124,083 UART: [rt]cmd =0x44504543, len=96
33,175,570 >>> mbox cmd response data (56 bytes)
33,176,293 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,206,234 UART: [rt]cmd =0x47544744, len=8
33,209,440 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,396 writing to cptra_bootfsm_go
3,786,550 ready_for_fw is high
3,786,961 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,876,154 >>> mbox cmd response: success
17,876,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,565,223 UART:
23,565,664 UART: Running Caliptra FMC ...
23,566,803 UART:
23,566,963 UART: [state] CFI Enabled
23,636,238 UART: [fht] FMC Alias Private Key: 7
25,974,791 UART: [art] Extend RT PCRs Done
25,976,019 UART: [art] Lock RT PCRs Done
25,978,002 UART: [art] Populate DV Done
25,983,700 UART: [fht] FMC Alias Private Key: 7
25,985,361 UART: [art] Derive CDI
25,986,109 UART: [art] Store in in slot 0x4
26,045,235 UART: [art] Derive Key Pair
26,046,275 UART: [art] Store priv key in slot 0x5
29,339,272 UART: [art] Derive Key Pair - Done
29,352,380 UART: [art] Signing Cert with AUTHO
29,353,684 UART: RITY.KEYID = 7
31,640,832 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,342 UART: [art] PUB.X = 44E55C8F0FBD36330535E122295142DF581D28343DA476D66BBAC6C2D729C52026EB0DD564C53169C99FFD65DAF764E2
31,649,582 UART: [art] PUB.Y = 40EF4C5B64226879F607534A7AC560CC869CB4581B9E01BBB122392DA5562602A8D83038ADF379D1FD9E1F1C43312185
31,656,795 UART: [art] SIG.R = 5BE62311D512B56831E57EC32F695E7FD77229867F678467CD32185471A0519FFBFD215875E4A69D5D500BA2E273DE23
31,664,166 UART: [art] SIG.S = 998AE1030386F044EDF02B7820B64FC09C9A588C99DCFE697E95DECE7A48E4E9EDE728467742E66B2F3AECDE5CD837C4
32,969,382 UART: Caliptra RT
32,970,089 UART: [state] CFI Enabled
33,130,335 UART: [rt] RT listening for mailbox commands...
33,162,617 UART: [rt]cmd =0x44504543, len=96
33,209,407 >>> mbox cmd response data (56 bytes)
33,210,791 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,240,716 UART: [rt]cmd =0x54514754, len=24
33,242,969 >>> mbox cmd response: failed
33,243,467 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,273,587 UART: [rt]cmd =0x54514754, len=24
33,276,180 >>> mbox cmd response data (8 bytes)
33,276,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,307,350 UART: [rt]cmd =0x44504543, len=96
33,359,552 >>> mbox cmd response data (56 bytes)
33,360,261 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,390,004 UART: [rt]cmd =0x47544744, len=8
33,393,036 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,500 UART:
192,875 UART: Running Caliptra ROM ...
194,066 UART:
603,507 UART: [state] CFI Enabled
618,299 UART: [state] LifecycleState = Unprovisioned
620,236 UART: [state] DebugLocked = No
622,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,828 UART: [kat] SHA2-256
796,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,091 UART: [kat] ++
807,607 UART: [kat] sha1
818,563 UART: [kat] SHA2-256
821,329 UART: [kat] SHA2-384
826,754 UART: [kat] SHA2-512-ACC
829,119 UART: [kat] ECC-384
3,112,415 UART: [kat] HMAC-384Kdf
3,122,743 UART: [kat] LMS
4,312,911 UART: [kat] --
4,318,208 UART: [cold-reset] ++
4,319,934 UART: [fht] Storing FHT @ 0x50003400
4,331,550 UART: [idev] ++
4,332,105 UART: [idev] CDI.KEYID = 6
4,332,983 UART: [idev] SUBJECT.KEYID = 7
4,334,306 UART: [idev] UDS.KEYID = 0
4,335,290 ready_for_fw is high
4,335,505 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,684 UART: [idev] Erasing UDS.KEYID = 0
7,621,224 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,679 UART: [idev] --
7,647,130 UART: [ldev] ++
7,647,694 UART: [ldev] CDI.KEYID = 6
7,648,652 UART: [ldev] SUBJECT.KEYID = 5
7,649,857 UART: [ldev] AUTHORITY.KEYID = 7
7,651,136 UART: [ldev] FE.KEYID = 1
7,660,533 UART: [ldev] Erasing FE.KEYID = 1
10,950,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,111 UART: [ldev] --
13,309,055 UART: [fwproc] Waiting for Commands...
13,312,339 UART: [fwproc] Received command 0x46574c44
13,314,526 UART: [fwproc] Received Image of size 114124 bytes
17,366,428 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,439,422 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,336 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,826,499 >>> mbox cmd response: success
17,827,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,831,534 UART: [afmc] ++
17,832,114 UART: [afmc] CDI.KEYID = 6
17,833,025 UART: [afmc] SUBJECT.KEYID = 7
17,834,297 UART: [afmc] AUTHORITY.KEYID = 5
21,145,092 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,944 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,256 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,638 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,441 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,894 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,864 UART: [afmc] --
23,510,138 UART: [cold-reset] --
23,515,237 UART: [state] Locking Datavault
23,519,452 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,200 UART: [state] Locking ICCM
23,522,532 UART: [exit] Launching FMC @ 0x40000130
23,530,921 UART:
23,531,156 UART: Running Caliptra FMC ...
23,532,255 UART:
23,532,413 UART: [state] CFI Enabled
23,540,676 UART: [fht] FMC Alias Private Key: 7
25,871,714 UART: [art] Extend RT PCRs Done
25,872,935 UART: [art] Lock RT PCRs Done
25,874,933 UART: [art] Populate DV Done
25,880,144 UART: [fht] FMC Alias Private Key: 7
25,881,628 UART: [art] Derive CDI
25,882,361 UART: [art] Store in in slot 0x4
25,925,159 UART: [art] Derive Key Pair
25,926,147 UART: [art] Store priv key in slot 0x5
29,168,069 UART: [art] Derive Key Pair - Done
29,181,242 UART: [art] Signing Cert with AUTHO
29,182,546 UART: RITY.KEYID = 7
31,462,036 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,543 UART: [art] PUB.X = BFDD193CD84003686714B1A921C3558EBA645A641B2B3766BB279306B03D3F9C750F4AD6F9FF038602F412BB6F4C7ED5
31,470,779 UART: [art] PUB.Y = DBB819303B0E34C91B44848055DFD4B451C9F8EDC04F02120572844D4C5077C03D2EC9F2805B8BE18F071DD82F3CD90C
31,478,004 UART: [art] SIG.R = E8E28F72BF2557FB68F48CDBB939CE7D4823DDD1EAC528D68AE34606AD7C378CC1C1905A04DBFA2030204CAD784A7BAE
31,485,446 UART: [art] SIG.S = ECACCB40D01EF224B8C36795C53A81E4DEC6A1855632E524DB7C5AE8CE0D882A046D93F5BA667BC73352406DCF3284C7
32,790,790 UART: Caliptra RT
32,791,506 UART: [state] CFI Enabled
32,909,186 UART: [rt] RT listening for mailbox commands...
32,941,159 UART: [rt]cmd =0x44504543, len=96
32,977,440 >>> mbox cmd response data (56 bytes)
32,978,905 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,008,832 UART: [rt]cmd =0x54514754, len=24
33,011,096 >>> mbox cmd response: failed
33,011,516 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,041,413 UART: [rt]cmd =0x54514754, len=24
33,044,015 >>> mbox cmd response data (8 bytes)
33,044,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,075,154 UART: [rt]cmd =0x44504543, len=96
33,110,339 >>> mbox cmd response data (56 bytes)
33,111,031 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,140,657 UART: [rt]cmd =0x47544744, len=8
33,143,620 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
4,124,975 ready_for_fw is high
4,125,409 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,068,285 >>> mbox cmd response: success
18,068,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,711,583 UART:
23,711,958 UART: Running Caliptra FMC ...
23,713,050 UART:
23,713,198 UART: [state] CFI Enabled
23,721,317 UART: [fht] FMC Alias Private Key: 7
26,051,618 UART: [art] Extend RT PCRs Done
26,052,847 UART: [art] Lock RT PCRs Done
26,054,207 UART: [art] Populate DV Done
26,059,585 UART: [fht] FMC Alias Private Key: 7
26,061,181 UART: [art] Derive CDI
26,061,997 UART: [art] Store in in slot 0x4
26,104,338 UART: [art] Derive Key Pair
26,105,376 UART: [art] Store priv key in slot 0x5
29,347,955 UART: [art] Derive Key Pair - Done
29,360,975 UART: [art] Signing Cert with AUTHO
29,362,277 UART: RITY.KEYID = 7
31,641,720 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,223 UART: [art] PUB.X = 5A69A84EC83010630BD2F02ACDE2CCFA331EEE39F9288CA1A993D8FD99D71B4312175D70741368BFDB4131F55928D36D
31,650,475 UART: [art] PUB.Y = 8C5D1DF49B80BD4C8FE5CEB33C2037BB574BE0CFDE484A0CD8DB563534705937D68216AA139C61852B95975D13F0A78D
31,657,706 UART: [art] SIG.R = B8400A5D117076DB0CCD7CDDC962DF9FC4C34F9F2D40F6DC249200840B980E3C72D6FD2E059DBD16F186D43CB354B737
31,665,091 UART: [art] SIG.S = 6C1E6CB4FCF007858E7698813EA355F70284D170DF2CE6F5EB96FEC7875B5DDCB10489C8A0106012E4FD08DCCFEDF5CB
32,969,924 UART: Caliptra RT
32,970,641 UART: [state] CFI Enabled
33,088,259 UART: [rt] RT listening for mailbox commands...
33,120,491 UART: [rt]cmd =0x44504543, len=96
33,156,937 >>> mbox cmd response data (56 bytes)
33,158,220 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,188,247 UART: [rt]cmd =0x54514754, len=24
33,190,831 >>> mbox cmd response: failed
33,191,253 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,221,276 UART: [rt]cmd =0x54514754, len=24
33,224,328 >>> mbox cmd response data (8 bytes)
33,224,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,255,471 UART: [rt]cmd =0x44504543, len=96
33,292,129 >>> mbox cmd response data (56 bytes)
33,292,825 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,322,727 UART: [rt]cmd =0x47544744, len=8
33,325,640 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
191,968 UART:
192,330 UART: Running Caliptra ROM ...
193,442 UART:
193,586 UART: [state] CFI Enabled
264,799 UART: [state] LifecycleState = Unprovisioned
266,973 UART: [state] DebugLocked = No
268,006 UART: [state] WD Timer not started. Device not locked for debugging
272,335 UART: [kat] SHA2-256
451,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,032 UART: [kat] ++
463,480 UART: [kat] sha1
474,489 UART: [kat] SHA2-256
477,559 UART: [kat] SHA2-384
482,905 UART: [kat] SHA2-512-ACC
485,908 UART: [kat] ECC-384
2,946,878 UART: [kat] HMAC-384Kdf
2,971,048 UART: [kat] LMS
3,500,503 UART: [kat] --
3,505,721 UART: [cold-reset] ++
3,506,935 UART: [fht] FHT @ 0x50003400
3,517,870 UART: [idev] ++
3,518,456 UART: [idev] CDI.KEYID = 6
3,519,338 UART: [idev] SUBJECT.KEYID = 7
3,520,579 UART: [idev] UDS.KEYID = 0
3,521,492 ready_for_fw is high
3,521,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,615 UART: [idev] Erasing UDS.KEYID = 0
6,026,984 UART: [idev] Sha1 KeyId Algorithm
6,049,567 UART: [idev] --
6,054,529 UART: [ldev] ++
6,055,106 UART: [ldev] CDI.KEYID = 6
6,056,021 UART: [ldev] SUBJECT.KEYID = 5
6,057,187 UART: [ldev] AUTHORITY.KEYID = 7
6,058,474 UART: [ldev] FE.KEYID = 1
6,098,394 UART: [ldev] Erasing FE.KEYID = 1
8,600,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,874 UART: [ldev] --
10,412,240 UART: [fwproc] Wait for Commands...
10,413,898 UART: [fwproc] Recv command 0x46574c44
10,415,985 UART: [fwproc] Recv'd Img size: 114448 bytes
13,818,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,540 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,334 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,282,031 >>> mbox cmd response: success
14,282,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,285,897 UART: [afmc] ++
14,286,506 UART: [afmc] CDI.KEYID = 6
14,287,571 UART: [afmc] SUBJECT.KEYID = 7
14,288,676 UART: [afmc] AUTHORITY.KEYID = 5
16,826,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,881 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,673 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,672 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,564 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,825 UART: [afmc] --
18,627,170 UART: [cold-reset] --
18,631,839 UART: [state] Locking Datavault
18,638,429 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,130 UART: [state] Locking ICCM
18,642,171 UART: [exit] Launching FMC @ 0x40000130
18,650,619 UART:
18,650,852 UART: Running Caliptra FMC ...
18,651,950 UART:
18,652,111 UART: [state] CFI Enabled
18,706,512 UART: [fht] FMC Alias Private Key: 7
20,470,425 UART: [art] Extend RT PCRs Done
20,471,636 UART: [art] Lock RT PCRs Done
20,473,315 UART: [art] Populate DV Done
20,478,780 UART: [fht] FMC Alias Private Key: 7
20,480,369 UART: [art] Derive CDI
20,481,182 UART: [art] Store in in slot 0x4
20,539,068 UART: [art] Derive Key Pair
20,540,104 UART: [art] Store priv key in slot 0x5
23,002,747 UART: [art] Derive Key Pair - Done
23,015,313 UART: [art] Signing Cert with AUTHO
23,016,612 UART: RITY.KEYID = 7
24,728,993 UART: [art] Erasing AUTHORITY.KEYID = 7
24,730,670 UART: [art] PUB.X = C391AD5295B63A328E22DA4385875C9DE2E126675F5F90A3E9E6E917226519D5709B227E49B26ACA10A939797E092A5C
24,737,714 UART: [art] PUB.Y = E7057EA253338C094027A7D1A07E7A25C75796CD98D99484F1B2AEB377A540181ABD24C76EB116D2DE3A805BECC131B0
24,745,017 UART: [art] SIG.R = BF2F26CC8F87C2992A1B26714A26BF8FE899AB5112467907AEB5C215690DFD343D3BA11E4C4E1F44483B6CC86F659F25
24,752,487 UART: [art] SIG.S = 2F1A21257703F303E5F499E10B8BC9A50D06D9419962CC0AEA8D06A34145309EC1375F42C8932CF29F37A5CB83E2CBC2
25,730,945 UART: Caliptra RT
25,731,644 UART: [state] CFI Enabled
25,897,437 UART: [rt] RT listening for mailbox commands...
25,929,735 UART: [rt]cmd =0x44504543, len=96
25,978,083 >>> mbox cmd response data (56 bytes)
25,979,607 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,009,546 UART: [rt]cmd =0x54514754, len=24
26,012,126 >>> mbox cmd response: failed
26,012,615 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,042,657 UART: [rt]cmd =0x54514754, len=24
26,045,181 >>> mbox cmd response data (8 bytes)
26,045,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,076,371 UART: [rt]cmd =0x44504543, len=96
26,127,298 >>> mbox cmd response data (56 bytes)
26,128,036 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,157,939 UART: [rt]cmd =0x47544744, len=8
26,161,035 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,382,005 ready_for_fw is high
3,382,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,088,963 >>> mbox cmd response: success
14,089,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,369,150 UART:
18,369,567 UART: Running Caliptra FMC ...
18,370,762 UART:
18,370,932 UART: [state] CFI Enabled
18,435,550 UART: [fht] FMC Alias Private Key: 7
20,198,902 UART: [art] Extend RT PCRs Done
20,200,117 UART: [art] Lock RT PCRs Done
20,202,125 UART: [art] Populate DV Done
20,207,590 UART: [fht] FMC Alias Private Key: 7
20,209,131 UART: [art] Derive CDI
20,209,943 UART: [art] Store in in slot 0x4
20,268,370 UART: [art] Derive Key Pair
20,269,413 UART: [art] Store priv key in slot 0x5
22,732,728 UART: [art] Derive Key Pair - Done
22,745,781 UART: [art] Signing Cert with AUTHO
22,747,086 UART: RITY.KEYID = 7
24,458,621 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,107 UART: [art] PUB.X = 5B9ACB4BAFF6CDFA0679DCAE8904DEA33CE7310FCD58FD3BBF9155DDEB91056C5835ABCAD885D5C12FEEA34837D5939B
24,467,455 UART: [art] PUB.Y = 0C1022E4D7A017123B601B3C158C59B0672EED09D14F22C3B2B83D1984E2267918E6C69E9781BB81B750651E282090A9
24,474,697 UART: [art] SIG.R = 637D7F4A528046D9BA23E4A8F8E307A715D1AE0584853AEBFE0FD355165473E4741D94FFED2843F79188D6DA4B69AA1D
24,482,127 UART: [art] SIG.S = DAB0FAD592F6882FC54FCD6F003018A7D692CFE528D422001635D7E2D6F3046A01BA002B317D68547D7163CD71C02409
25,461,010 UART: Caliptra RT
25,461,732 UART: [state] CFI Enabled
25,628,343 UART: [rt] RT listening for mailbox commands...
25,660,466 UART: [rt]cmd =0x44504543, len=96
25,707,012 >>> mbox cmd response data (56 bytes)
25,708,340 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,738,524 UART: [rt]cmd =0x54514754, len=24
25,740,933 >>> mbox cmd response: failed
25,741,614 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,771,425 UART: [rt]cmd =0x54514754, len=24
25,774,004 >>> mbox cmd response data (8 bytes)
25,774,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,805,119 UART: [rt]cmd =0x44504543, len=96
25,856,692 >>> mbox cmd response data (56 bytes)
25,857,425 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,887,144 UART: [rt]cmd =0x47544744, len=8
25,890,135 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,291 UART:
192,662 UART: Running Caliptra ROM ...
193,763 UART:
603,246 UART: [state] CFI Enabled
618,054 UART: [state] LifecycleState = Unprovisioned
619,920 UART: [state] DebugLocked = No
621,225 UART: [state] WD Timer not started. Device not locked for debugging
625,332 UART: [kat] SHA2-256
804,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,003 UART: [kat] ++
816,457 UART: [kat] sha1
826,967 UART: [kat] SHA2-256
830,049 UART: [kat] SHA2-384
835,044 UART: [kat] SHA2-512-ACC
837,978 UART: [kat] ECC-384
3,279,975 UART: [kat] HMAC-384Kdf
3,293,485 UART: [kat] LMS
3,822,998 UART: [kat] --
3,827,576 UART: [cold-reset] ++
3,829,500 UART: [fht] FHT @ 0x50003400
3,842,101 UART: [idev] ++
3,842,681 UART: [idev] CDI.KEYID = 6
3,843,555 UART: [idev] SUBJECT.KEYID = 7
3,844,790 UART: [idev] UDS.KEYID = 0
3,845,864 ready_for_fw is high
3,846,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,815 UART: [idev] Erasing UDS.KEYID = 0
6,321,405 UART: [idev] Sha1 KeyId Algorithm
6,344,357 UART: [idev] --
6,347,960 UART: [ldev] ++
6,348,517 UART: [ldev] CDI.KEYID = 6
6,349,391 UART: [ldev] SUBJECT.KEYID = 5
6,350,597 UART: [ldev] AUTHORITY.KEYID = 7
6,351,875 UART: [ldev] FE.KEYID = 1
6,362,647 UART: [ldev] Erasing FE.KEYID = 1
8,834,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,062 UART: [ldev] --
10,621,821 UART: [fwproc] Wait for Commands...
10,623,581 UART: [fwproc] Recv command 0x46574c44
10,625,614 UART: [fwproc] Recv'd Img size: 114448 bytes
14,021,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,478,149 >>> mbox cmd response: success
14,478,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,482,403 UART: [afmc] ++
14,482,984 UART: [afmc] CDI.KEYID = 6
14,483,865 UART: [afmc] SUBJECT.KEYID = 7
14,485,074 UART: [afmc] AUTHORITY.KEYID = 5
16,986,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,077 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,151 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,997 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,084 UART: [afmc] --
18,786,098 UART: [cold-reset] --
18,790,284 UART: [state] Locking Datavault
18,794,823 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,460 UART: [state] Locking ICCM
18,798,306 UART: [exit] Launching FMC @ 0x40000130
18,806,745 UART:
18,806,971 UART: Running Caliptra FMC ...
18,808,066 UART:
18,808,219 UART: [state] CFI Enabled
18,816,467 UART: [fht] FMC Alias Private Key: 7
20,572,977 UART: [art] Extend RT PCRs Done
20,574,189 UART: [art] Lock RT PCRs Done
20,575,853 UART: [art] Populate DV Done
20,581,309 UART: [fht] FMC Alias Private Key: 7
20,582,949 UART: [art] Derive CDI
20,583,754 UART: [art] Store in in slot 0x4
20,626,667 UART: [art] Derive Key Pair
20,627,706 UART: [art] Store priv key in slot 0x5
23,053,940 UART: [art] Derive Key Pair - Done
23,066,819 UART: [art] Signing Cert with AUTHO
23,068,109 UART: RITY.KEYID = 7
24,773,712 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,202 UART: [art] PUB.X = 55B8F3F83682B82F45458D86C5938849268751C75CD4A6412A16B796CFA153DA01A71835F7937F28601DB9A92C15404A
24,782,440 UART: [art] PUB.Y = 0917E7CAC122BCE23F41B3664B7548B98491E337BEF9019D9220BB96A5006E88C6214B568FE67924410E14AEDF1A2E47
24,789,663 UART: [art] SIG.R = 01A85595EC19591587CA08C07D60FDDC5227A4637A948CC818F34E78DA9508D3933F8A2A694BBB2DDEF5AB9C6DB58319
24,797,063 UART: [art] SIG.S = 6CCF37BAFA48C79464F5716DF63C0E35DDF396B1FC4C7EBCFC993EF3F4175C70B2643C24CD0927510DE888BFC3625588
25,775,811 UART: Caliptra RT
25,776,511 UART: [state] CFI Enabled
25,893,689 UART: [rt] RT listening for mailbox commands...
25,925,640 UART: [rt]cmd =0x44504543, len=96
25,961,753 >>> mbox cmd response data (56 bytes)
25,963,071 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,992,955 UART: [rt]cmd =0x54514754, len=24
25,995,177 >>> mbox cmd response: failed
25,995,685 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,025,910 UART: [rt]cmd =0x54514754, len=24
26,028,450 >>> mbox cmd response data (8 bytes)
26,029,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,059,520 UART: [rt]cmd =0x44504543, len=96
26,095,309 >>> mbox cmd response data (56 bytes)
26,096,022 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,125,780 UART: [rt]cmd =0x47544744, len=8
26,128,476 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,689,817 ready_for_fw is high
3,690,216 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,251,335 >>> mbox cmd response: success
14,252,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,496,441 UART:
18,496,877 UART: Running Caliptra FMC ...
18,498,069 UART:
18,498,229 UART: [state] CFI Enabled
18,506,349 UART: [fht] FMC Alias Private Key: 7
20,263,707 UART: [art] Extend RT PCRs Done
20,264,910 UART: [art] Lock RT PCRs Done
20,266,439 UART: [art] Populate DV Done
20,271,730 UART: [fht] FMC Alias Private Key: 7
20,273,438 UART: [art] Derive CDI
20,274,246 UART: [art] Store in in slot 0x4
20,316,895 UART: [art] Derive Key Pair
20,317,937 UART: [art] Store priv key in slot 0x5
22,744,483 UART: [art] Derive Key Pair - Done
22,757,380 UART: [art] Signing Cert with AUTHO
22,758,678 UART: RITY.KEYID = 7
24,464,320 UART: [art] Erasing AUTHORITY.KEYID = 7
24,465,816 UART: [art] PUB.X = 41F2A0EEB61D280D9A2BD4B0D5C466F16BBABC1A5FC2EDE5A97B4EFDDB18D4EC6B6DA33288DA84B8D73B825D4EE2E172
24,473,112 UART: [art] PUB.Y = 503005EEC6444BF48281BCD8475653731022B3F8A8C1E93B73C339B38462E74F77485C571F8FC6F17FE699151892094F
24,480,353 UART: [art] SIG.R = 90EA5AF7D0DAA5317A0D9CECDD8E1DF02E864E11D644DDEF4BBA38659A3A8B4A5153C6914EFCC1C5147B1E399B12643C
24,487,804 UART: [art] SIG.S = 9983D8C44BD80E3052D97A8F34F00300D7001E8B81B3CC054592CF728F64D1AD92764ED378DDBBF5C75F2BEC467DFE2C
25,466,735 UART: Caliptra RT
25,467,442 UART: [state] CFI Enabled
25,584,580 UART: [rt] RT listening for mailbox commands...
25,616,638 UART: [rt]cmd =0x44504543, len=96
25,652,691 >>> mbox cmd response data (56 bytes)
25,654,133 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,684,156 UART: [rt]cmd =0x54514754, len=24
25,686,466 >>> mbox cmd response: failed
25,687,159 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,716,798 UART: [rt]cmd =0x54514754, len=24
25,719,447 >>> mbox cmd response data (8 bytes)
25,719,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,750,691 UART: [rt]cmd =0x44504543, len=96
25,786,461 >>> mbox cmd response data (56 bytes)
25,787,167 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,816,958 UART: [rt]cmd =0x47544744, len=8
25,820,198 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,440,145 ready_for_fw is high
3,440,755 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,731,877 >>> mbox cmd response: success
14,732,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,022,917 UART:
19,023,322 UART: Running Caliptra FMC ...
19,024,434 UART:
19,024,592 UART: [state] CFI Enabled
19,093,279 UART: [fht] FMC Alias Private Key: 7
20,856,954 UART: [art] Extend RT PCRs Done
20,858,179 UART: [art] Lock RT PCRs Done
20,859,890 UART: [art] Populate DV Done
20,865,031 UART: [fht] FMC Alias Private Key: 7
20,866,516 UART: [art] Derive CDI
20,867,285 UART: [art] Store in in slot 0x4
20,925,926 UART: [art] Derive Key Pair
20,926,965 UART: [art] Store priv key in slot 0x5
23,389,480 UART: [art] Derive Key Pair - Done
23,402,641 UART: [art] Signing Cert with AUTHO
23,403,937 UART: RITY.KEYID = 7
25,115,733 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,240 UART: [art] PUB.X = 5E559519FE15FC88C0515379CC9E2AE5AD3F1FE6907EA57590C1831F1FE8A78712975B1B300A38C14707A88E3A962F6A
25,124,486 UART: [art] PUB.Y = CBB0F93471369991E1AE951492DB8757355835BB4C78F1618BECC26284CF92B57BA7EF2903DB53709E6195644F5C85F2
25,131,750 UART: [art] SIG.R = 75EA689EE457E5AB6BC32B87E902E8F4E4D4029699FFB99A0C91287DA57A7D0BBCC5B1B2DC076566946F8B963008581F
25,139,158 UART: [art] SIG.S = 324A3FD3D8FDBC4F8CC6DFB905769BB957A7168EC4CB0569FE09EECA28AE5C7817651D48B0FA2962E8561FF2B6B13946
26,117,658 UART: Caliptra RT
26,118,344 UART: [state] CFI Enabled
26,284,143 UART: [rt] RT listening for mailbox commands...
26,316,039 UART: [rt]cmd =0x44504543, len=96
26,363,395 >>> mbox cmd response data (56 bytes)
26,364,657 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,394,576 UART: [rt]cmd =0x54514754, len=24
26,396,678 >>> mbox cmd response: failed
26,397,099 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,426,974 UART: [rt]cmd =0x54514754, len=24
26,429,499 >>> mbox cmd response data (8 bytes)
26,429,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,460,396 UART: [rt]cmd =0x44504543, len=96
26,512,783 >>> mbox cmd response data (56 bytes)
26,513,519 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,543,425 UART: [rt]cmd =0x47544744, len=8
26,546,579 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,760,637 ready_for_fw is high
3,761,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,953,819 >>> mbox cmd response: success
14,954,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,200,884 UART:
19,201,292 UART: Running Caliptra FMC ...
19,202,387 UART:
19,202,534 UART: [state] CFI Enabled
19,210,806 UART: [fht] FMC Alias Private Key: 7
20,968,911 UART: [art] Extend RT PCRs Done
20,970,145 UART: [art] Lock RT PCRs Done
20,972,009 UART: [art] Populate DV Done
20,977,320 UART: [fht] FMC Alias Private Key: 7
20,978,994 UART: [art] Derive CDI
20,979,745 UART: [art] Store in in slot 0x4
21,022,238 UART: [art] Derive Key Pair
21,023,242 UART: [art] Store priv key in slot 0x5
23,450,298 UART: [art] Derive Key Pair - Done
23,462,999 UART: [art] Signing Cert with AUTHO
23,464,344 UART: RITY.KEYID = 7
25,170,611 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,116 UART: [art] PUB.X = B6538ECFC2EB74AB67E001F6F51B50B9E1092472B8D9E7782BE024651F74E98AC2A5D11AE26AA941B6ED15E159E028A3
25,179,416 UART: [art] PUB.Y = A39D60D24CF2A2008D221ECAFBCA5340CEB8D1CDC584AC5CB98FA0A3D6EB5BD2F013631375E97CA060BB35DE49E5E5F6
25,186,659 UART: [art] SIG.R = 54F94BF49C36032533321F260760F4381E734C284933EB6533E30A7E85D028ADCF067EE822E1D63176E19E78C7615567
25,194,053 UART: [art] SIG.S = 701E4EC988B8EAAADB3582476D900B8059CCA65E6404C078626432925B399DEAFDFB1D68A8F2F0E31FA4BE368C146523
26,172,710 UART: Caliptra RT
26,173,422 UART: [state] CFI Enabled
26,290,561 UART: [rt] RT listening for mailbox commands...
26,322,462 UART: [rt]cmd =0x44504543, len=96
26,357,433 >>> mbox cmd response data (56 bytes)
26,358,863 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,388,723 UART: [rt]cmd =0x54514754, len=24
26,390,916 >>> mbox cmd response: failed
26,391,417 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,421,184 UART: [rt]cmd =0x54514754, len=24
26,423,543 >>> mbox cmd response data (8 bytes)
26,424,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,454,818 UART: [rt]cmd =0x44504543, len=96
26,490,219 >>> mbox cmd response data (56 bytes)
26,490,928 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,520,642 UART: [rt]cmd =0x47544744, len=8
26,523,498 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,853 UART: [kat] SHA2-256
881,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,899 UART: [kat] ++
886,051 UART: [kat] sha1
890,233 UART: [kat] SHA2-256
892,171 UART: [kat] SHA2-384
894,888 UART: [kat] SHA2-512-ACC
896,789 UART: [kat] ECC-384
902,412 UART: [kat] HMAC-384Kdf
907,034 UART: [kat] LMS
1,475,230 UART: [kat] --
1,476,145 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,388 UART: [idev] ++
1,479,556 UART: [idev] CDI.KEYID = 6
1,479,916 UART: [idev] SUBJECT.KEYID = 7
1,480,340 UART: [idev] UDS.KEYID = 0
1,480,685 ready_for_fw is high
1,480,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,082 UART: [idev] Erasing UDS.KEYID = 0
1,504,574 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,252 UART: [idev] --
1,514,327 UART: [ldev] ++
1,514,495 UART: [ldev] CDI.KEYID = 6
1,514,858 UART: [ldev] SUBJECT.KEYID = 5
1,515,284 UART: [ldev] AUTHORITY.KEYID = 7
1,515,747 UART: [ldev] FE.KEYID = 1
1,520,951 UART: [ldev] Erasing FE.KEYID = 1
1,546,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,970 UART: [ldev] --
1,586,311 UART: [fwproc] Waiting for Commands...
1,587,174 UART: [fwproc] Received command 0x46574c44
1,587,965 UART: [fwproc] Received Image of size 114448 bytes
2,887,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,482 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,834 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,859 >>> mbox cmd response: success
3,079,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,081,099 UART: [afmc] ++
3,081,267 UART: [afmc] CDI.KEYID = 6
3,081,629 UART: [afmc] SUBJECT.KEYID = 7
3,082,054 UART: [afmc] AUTHORITY.KEYID = 5
3,117,063 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,383 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,163 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,891 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,776 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,466 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,327 UART: [afmc] --
3,160,313 UART: [cold-reset] --
3,161,355 UART: [state] Locking Datavault
3,162,382 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,986 UART: [state] Locking ICCM
3,163,608 UART: [exit] Launching FMC @ 0x40000130
3,168,937 UART:
3,168,953 UART: Running Caliptra FMC ...
3,169,361 UART:
3,169,415 UART: [state] CFI Enabled
3,179,982 UART: [fht] FMC Alias Private Key: 7
3,287,983 UART: [art] Extend RT PCRs Done
3,288,411 UART: [art] Lock RT PCRs Done
3,289,865 UART: [art] Populate DV Done
3,298,076 UART: [fht] FMC Alias Private Key: 7
3,299,004 UART: [art] Derive CDI
3,299,284 UART: [art] Store in in slot 0x4
3,384,957 UART: [art] Derive Key Pair
3,385,317 UART: [art] Store priv key in slot 0x5
3,398,363 UART: [art] Derive Key Pair - Done
3,413,227 UART: [art] Signing Cert with AUTHO
3,413,707 UART: RITY.KEYID = 7
3,429,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,902 UART: [art] PUB.X = 89BBB69343B6BF95C6F6521E2364CB5B3606E725C747A7D6C8FA60A4224766255749333EFA8AF3FC3552E8A9EE135E6D
3,436,673 UART: [art] PUB.Y = 055CA1D3C5015600BA04B54EA46501BBC001D1CC45EE535306E8467A097E89824CA2C66DFFDCE5DAB89F29BF3250F06E
3,443,592 UART: [art] SIG.R = DDCDC2E02CCE5BD107B6D80F5F71EC6294FAAFF3EB4A49F77B54FEE49E2D2954D7621F0C235836E998A3CA2942D45F4E
3,450,375 UART: [art] SIG.S = 2A1A0F4442D741B12243E5E507F0B23E82F76CB8A0473FFAF16CE64B0BE59FFDC99F63B0289E12E1EC86E3214D85C9F4
3,474,233 UART: Caliptra RT
3,474,486 UART: [state] CFI Enabled
3,583,741 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,749 UART: [rt]cmd =0x44504543, len=96
3,651,854 >>> mbox cmd response data (56 bytes)
3,651,855 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,681,590 UART: [rt]cmd =0x54514754, len=24
3,683,393 >>> mbox cmd response: failed
3,683,393 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,683 UART: [rt]cmd =0x54514754, len=24
3,714,614 >>> mbox cmd response data (8 bytes)
3,714,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,676 UART: [rt]cmd =0x44504543, len=96
3,780,608 >>> mbox cmd response data (56 bytes)
3,780,609 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,952 UART: [rt]cmd =0x47544744, len=8
3,812,577 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,265 ready_for_fw is high
1,363,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,555 >>> mbox cmd response: success
2,929,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,990,769 UART:
2,990,785 UART: Running Caliptra FMC ...
2,991,193 UART:
2,991,247 UART: [state] CFI Enabled
3,001,848 UART: [fht] FMC Alias Private Key: 7
3,109,751 UART: [art] Extend RT PCRs Done
3,110,179 UART: [art] Lock RT PCRs Done
3,111,707 UART: [art] Populate DV Done
3,120,124 UART: [fht] FMC Alias Private Key: 7
3,121,210 UART: [art] Derive CDI
3,121,490 UART: [art] Store in in slot 0x4
3,207,511 UART: [art] Derive Key Pair
3,207,871 UART: [art] Store priv key in slot 0x5
3,221,377 UART: [art] Derive Key Pair - Done
3,236,105 UART: [art] Signing Cert with AUTHO
3,236,585 UART: RITY.KEYID = 7
3,251,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,556 UART: [art] PUB.X = 61253DB81320DD131464CD9826BC83F71620E89B0F97ED642F7F36888BEA83A8C64D13FA13295C63D6CED70CFB1C9842
3,259,324 UART: [art] PUB.Y = 291828AC516091B99167261A2D2454D3551A3F4CFD20069637858A199CCA284EB5CBB0A144FAC93F008DCBEC0F90C03C
3,266,250 UART: [art] SIG.R = 2B22425272E298FAAC2ACCA48321225B56E329E5CFE896FE6942A37CB923A872E21E8B1D0AB4663E0B78E38C965CCF5F
3,273,024 UART: [art] SIG.S = FEC2ABDD562C5FC54C2882A21BBC1476281D7FEC6C5C8F3D61B3E51D9138D800536AEA0552F71E9221ABEBF6FC59AEC0
3,296,818 UART: Caliptra RT
3,297,071 UART: [state] CFI Enabled
3,404,832 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,864 UART: [rt]cmd =0x44504543, len=96
3,472,241 >>> mbox cmd response data (56 bytes)
3,472,242 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,857 UART: [rt]cmd =0x54514754, len=24
3,503,812 >>> mbox cmd response: failed
3,503,812 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,326 UART: [rt]cmd =0x54514754, len=24
3,535,427 >>> mbox cmd response data (8 bytes)
3,535,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,127 UART: [rt]cmd =0x44504543, len=96
3,601,631 >>> mbox cmd response data (56 bytes)
3,601,632 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,061 UART: [rt]cmd =0x47544744, len=8
3,633,402 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,370 UART: [kat] SHA2-256
882,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,416 UART: [kat] ++
886,568 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,405 UART: [kat] SHA2-512-ACC
897,306 UART: [kat] ECC-384
902,819 UART: [kat] HMAC-384Kdf
907,305 UART: [kat] LMS
1,475,501 UART: [kat] --
1,476,196 UART: [cold-reset] ++
1,476,664 UART: [fht] Storing FHT @ 0x50003400
1,479,473 UART: [idev] ++
1,479,641 UART: [idev] CDI.KEYID = 6
1,480,001 UART: [idev] SUBJECT.KEYID = 7
1,480,425 UART: [idev] UDS.KEYID = 0
1,480,770 ready_for_fw is high
1,480,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,139 UART: [idev] Erasing UDS.KEYID = 0
1,504,973 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,679 UART: [idev] --
1,514,702 UART: [ldev] ++
1,514,870 UART: [ldev] CDI.KEYID = 6
1,515,233 UART: [ldev] SUBJECT.KEYID = 5
1,515,659 UART: [ldev] AUTHORITY.KEYID = 7
1,516,122 UART: [ldev] FE.KEYID = 1
1,521,318 UART: [ldev] Erasing FE.KEYID = 1
1,547,415 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,291 UART: [ldev] --
1,586,758 UART: [fwproc] Waiting for Commands...
1,587,503 UART: [fwproc] Received command 0x46574c44
1,588,294 UART: [fwproc] Received Image of size 114448 bytes
2,887,115 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,120 >>> mbox cmd response: success
3,079,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,080,294 UART: [afmc] ++
3,080,462 UART: [afmc] CDI.KEYID = 6
3,080,824 UART: [afmc] SUBJECT.KEYID = 7
3,081,249 UART: [afmc] AUTHORITY.KEYID = 5
3,116,422 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,842 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,622 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,350 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,235 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,925 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,846 UART: [afmc] --
3,159,806 UART: [cold-reset] --
3,160,540 UART: [state] Locking Datavault
3,161,427 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,031 UART: [state] Locking ICCM
3,162,483 UART: [exit] Launching FMC @ 0x40000130
3,167,812 UART:
3,167,828 UART: Running Caliptra FMC ...
3,168,236 UART:
3,168,379 UART: [state] CFI Enabled
3,178,960 UART: [fht] FMC Alias Private Key: 7
3,286,925 UART: [art] Extend RT PCRs Done
3,287,353 UART: [art] Lock RT PCRs Done
3,289,043 UART: [art] Populate DV Done
3,297,272 UART: [fht] FMC Alias Private Key: 7
3,298,444 UART: [art] Derive CDI
3,298,724 UART: [art] Store in in slot 0x4
3,384,437 UART: [art] Derive Key Pair
3,384,797 UART: [art] Store priv key in slot 0x5
3,398,179 UART: [art] Derive Key Pair - Done
3,413,034 UART: [art] Signing Cert with AUTHO
3,413,514 UART: RITY.KEYID = 7
3,428,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,519 UART: [art] PUB.X = 87CDD515FC9360A01C9F185436459788C13F81C8C117668D6FFA69297A8A2C4EE0A617C84DD17E6C7A66DB69CF9E894F
3,436,295 UART: [art] PUB.Y = 83A72DEB384A45271C71B6AA4C03CBC4C432502284FE9C139EBFBCDC492B7ECCC5093B8F3404A2032E30BF11BE46282B
3,443,247 UART: [art] SIG.R = 0047BECE29C2FBB9C52724B9F3D4D348436A9615AB21A6E127D208C4AD65BB13171407E6A9EBB68118008C49C5077D8A
3,449,968 UART: [art] SIG.S = 44EB887EEDCD274A89810E18E73C9A048575EF25F747FAB4A3875D132D5D19AF30F0364B4FF5681E0CCD0BE6AD7E159F
3,474,113 UART: Caliptra RT
3,474,458 UART: [state] CFI Enabled
3,582,937 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,295 UART: [rt]cmd =0x44504543, len=96
3,650,812 >>> mbox cmd response data (56 bytes)
3,650,813 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,154 UART: [rt]cmd =0x54514754, len=24
3,681,927 >>> mbox cmd response: failed
3,681,927 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,361 UART: [rt]cmd =0x54514754, len=24
3,713,652 >>> mbox cmd response data (8 bytes)
3,713,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,712 UART: [rt]cmd =0x44504543, len=96
3,780,438 >>> mbox cmd response data (56 bytes)
3,780,439 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,648 UART: [rt]cmd =0x47544744, len=8
3,812,279 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,608 ready_for_fw is high
1,362,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,644 >>> mbox cmd response: success
2,929,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,992,004 UART:
2,992,020 UART: Running Caliptra FMC ...
2,992,428 UART:
2,992,571 UART: [state] CFI Enabled
3,003,498 UART: [fht] FMC Alias Private Key: 7
3,111,359 UART: [art] Extend RT PCRs Done
3,111,787 UART: [art] Lock RT PCRs Done
3,113,495 UART: [art] Populate DV Done
3,121,822 UART: [fht] FMC Alias Private Key: 7
3,122,784 UART: [art] Derive CDI
3,123,064 UART: [art] Store in in slot 0x4
3,208,835 UART: [art] Derive Key Pair
3,209,195 UART: [art] Store priv key in slot 0x5
3,222,331 UART: [art] Derive Key Pair - Done
3,237,246 UART: [art] Signing Cert with AUTHO
3,237,726 UART: RITY.KEYID = 7
3,253,056 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,821 UART: [art] PUB.X = D27FD36416AA3F8F167474B36950E757810F0C9CA3C44A8ECE4A5736CC90F6236F7CEC663CF003A1F13769EE39E79EE1
3,260,590 UART: [art] PUB.Y = 04A8EBF6084F2CE9241C920C580EEB520AF26AE91B98F0A81645A6F9A72854F0E893AB80ABA6F4E68EF9024AEADF3B83
3,267,538 UART: [art] SIG.R = 8C6ECAA42E1A873E61B9A27C8D452A8D21F9E015F5B638B53234D98DAA0E52BF598C9C5C8101B8BD7B6F472B645958A0
3,274,312 UART: [art] SIG.S = A77902FF230DBDFB438BF9148DAD94315A12A8AEEB4CCC83B925A1EA7A02B141BA9DD7E68A59ED1482A3787CDB25704F
3,298,524 UART: Caliptra RT
3,298,869 UART: [state] CFI Enabled
3,407,999 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,059 UART: [rt]cmd =0x44504543, len=96
3,475,256 >>> mbox cmd response data (56 bytes)
3,475,257 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,862 UART: [rt]cmd =0x54514754, len=24
3,506,837 >>> mbox cmd response: failed
3,506,837 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,141 UART: [rt]cmd =0x54514754, len=24
3,538,458 >>> mbox cmd response data (8 bytes)
3,538,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,208 UART: [rt]cmd =0x44504543, len=96
3,604,842 >>> mbox cmd response data (56 bytes)
3,604,843 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,114 UART: [rt]cmd =0x47544744, len=8
3,636,461 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
893,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,447 UART: [kat] ++
897,599 UART: [kat] sha1
901,935 UART: [kat] SHA2-256
903,875 UART: [kat] SHA2-384
906,638 UART: [kat] SHA2-512-ACC
908,539 UART: [kat] ECC-384
918,270 UART: [kat] HMAC-384Kdf
922,842 UART: [kat] LMS
1,171,170 UART: [kat] --
1,172,193 UART: [cold-reset] ++
1,172,721 UART: [fht] FHT @ 0x50003400
1,175,400 UART: [idev] ++
1,175,568 UART: [idev] CDI.KEYID = 6
1,175,928 UART: [idev] SUBJECT.KEYID = 7
1,176,352 UART: [idev] UDS.KEYID = 0
1,176,697 ready_for_fw is high
1,176,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,256 UART: [idev] Erasing UDS.KEYID = 0
1,201,593 UART: [idev] Sha1 KeyId Algorithm
1,210,109 UART: [idev] --
1,211,287 UART: [ldev] ++
1,211,455 UART: [ldev] CDI.KEYID = 6
1,211,818 UART: [ldev] SUBJECT.KEYID = 5
1,212,244 UART: [ldev] AUTHORITY.KEYID = 7
1,212,707 UART: [ldev] FE.KEYID = 1
1,217,849 UART: [ldev] Erasing FE.KEYID = 1
1,243,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,919 UART: [ldev] --
1,282,384 UART: [fwproc] Wait for Commands...
1,283,076 UART: [fwproc] Recv command 0x46574c44
1,283,804 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,795 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,684 >>> mbox cmd response: success
2,775,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,776,788 UART: [afmc] ++
2,776,956 UART: [afmc] CDI.KEYID = 6
2,777,318 UART: [afmc] SUBJECT.KEYID = 7
2,777,743 UART: [afmc] AUTHORITY.KEYID = 5
2,813,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,655 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,383 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,268 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,987 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,891 UART: [afmc] --
2,856,915 UART: [cold-reset] --
2,857,685 UART: [state] Locking Datavault
2,858,570 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,174 UART: [state] Locking ICCM
2,859,758 UART: [exit] Launching FMC @ 0x40000130
2,865,087 UART:
2,865,103 UART: Running Caliptra FMC ...
2,865,511 UART:
2,865,565 UART: [state] CFI Enabled
2,876,266 UART: [fht] FMC Alias Private Key: 7
2,984,461 UART: [art] Extend RT PCRs Done
2,984,889 UART: [art] Lock RT PCRs Done
2,986,479 UART: [art] Populate DV Done
2,994,790 UART: [fht] FMC Alias Private Key: 7
2,995,896 UART: [art] Derive CDI
2,996,176 UART: [art] Store in in slot 0x4
3,081,413 UART: [art] Derive Key Pair
3,081,773 UART: [art] Store priv key in slot 0x5
3,095,275 UART: [art] Derive Key Pair - Done
3,109,926 UART: [art] Signing Cert with AUTHO
3,110,406 UART: RITY.KEYID = 7
3,125,336 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,101 UART: [art] PUB.X = 2B75BD8853CE69EAA99B835A5D94A23587AF8E3401834CEC040F58513474B07D22364CE201D962BC4AD1EF7DB4376242
3,132,861 UART: [art] PUB.Y = A2B8FD1251EFA6A128B202FCB863F5F6E81E7DE4ECB86665C6F9C3AFE56ACAD5A82CEFEA5A61C0F70BAA0F2A91499868
3,139,830 UART: [art] SIG.R = 83AB900F128D977B29CC8E125D549148632E0676459D3B265B8912CA555BCDC37C3036DA6633B6EAA9FD61F7A3C58CA8
3,146,598 UART: [art] SIG.S = 22D239E1EC79E88E540C7B69F8DA7657E33080795495C5663E2FD66FA6F18AA5B44558C4B47AD19DBDEC9F9644933A88
3,170,580 UART: Caliptra RT
3,170,833 UART: [state] CFI Enabled
3,279,322 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,554 UART: [rt]cmd =0x44504543, len=96
3,347,657 >>> mbox cmd response data (56 bytes)
3,347,658 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,301 UART: [rt]cmd =0x54514754, len=24
3,379,202 >>> mbox cmd response: failed
3,379,202 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,632 UART: [rt]cmd =0x54514754, len=24
3,410,847 >>> mbox cmd response data (8 bytes)
3,410,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,911 UART: [rt]cmd =0x44504543, len=96
3,477,455 >>> mbox cmd response data (56 bytes)
3,477,456 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,899 UART: [rt]cmd =0x47544744, len=8
3,509,394 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,949 ready_for_fw is high
1,059,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,037 >>> mbox cmd response: success
2,629,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,691,225 UART:
2,691,241 UART: Running Caliptra FMC ...
2,691,649 UART:
2,691,703 UART: [state] CFI Enabled
2,702,012 UART: [fht] FMC Alias Private Key: 7
2,809,643 UART: [art] Extend RT PCRs Done
2,810,071 UART: [art] Lock RT PCRs Done
2,811,879 UART: [art] Populate DV Done
2,820,222 UART: [fht] FMC Alias Private Key: 7
2,821,238 UART: [art] Derive CDI
2,821,518 UART: [art] Store in in slot 0x4
2,907,065 UART: [art] Derive Key Pair
2,907,425 UART: [art] Store priv key in slot 0x5
2,920,655 UART: [art] Derive Key Pair - Done
2,935,424 UART: [art] Signing Cert with AUTHO
2,935,904 UART: RITY.KEYID = 7
2,950,990 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,755 UART: [art] PUB.X = 1098801F8040F98B8014E73D622F7D5E5BDC97F493445A96560C3F3BB9DCC90D8883C94482D6F5F395E3E5EEAA75AE07
2,958,520 UART: [art] PUB.Y = 2F0B9559DBF4EE7D512D2C30D0776463363BEFB50CEDF2096400AC16C69CA77EDE6C70EB975A5C5E92F0BC8317EEEF2B
2,965,459 UART: [art] SIG.R = CB364EA124E3A8281439BBAF0B4DAAFADB89BCA8E86E75C04016BEFBBFE9A96ABBC8D582DC33F40D2704961AA8FF3A51
2,972,250 UART: [art] SIG.S = C9FA27661CAA0E87A9E46DD23531159BC32568FB36694B484BE50EAA217DFDAC99ABBF8B32709D0403C2149F0A8AF67E
2,995,970 UART: Caliptra RT
2,996,223 UART: [state] CFI Enabled
3,104,071 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,911 UART: [rt]cmd =0x44504543, len=96
3,171,192 >>> mbox cmd response data (56 bytes)
3,171,193 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,200,718 UART: [rt]cmd =0x54514754, len=24
3,202,693 >>> mbox cmd response: failed
3,202,693 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,219 UART: [rt]cmd =0x54514754, len=24
3,234,430 >>> mbox cmd response data (8 bytes)
3,234,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,264,388 UART: [rt]cmd =0x44504543, len=96
3,301,308 >>> mbox cmd response data (56 bytes)
3,301,309 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,626 UART: [rt]cmd =0x47544744, len=8
3,333,325 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
893,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,468 UART: [kat] ++
897,620 UART: [kat] sha1
901,968 UART: [kat] SHA2-256
903,908 UART: [kat] SHA2-384
906,737 UART: [kat] SHA2-512-ACC
908,638 UART: [kat] ECC-384
918,281 UART: [kat] HMAC-384Kdf
923,109 UART: [kat] LMS
1,171,437 UART: [kat] --
1,172,324 UART: [cold-reset] ++
1,172,902 UART: [fht] FHT @ 0x50003400
1,175,595 UART: [idev] ++
1,175,763 UART: [idev] CDI.KEYID = 6
1,176,123 UART: [idev] SUBJECT.KEYID = 7
1,176,547 UART: [idev] UDS.KEYID = 0
1,176,892 ready_for_fw is high
1,176,892 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,873 UART: [idev] Erasing UDS.KEYID = 0
1,202,040 UART: [idev] Sha1 KeyId Algorithm
1,210,392 UART: [idev] --
1,211,406 UART: [ldev] ++
1,211,574 UART: [ldev] CDI.KEYID = 6
1,211,937 UART: [ldev] SUBJECT.KEYID = 5
1,212,363 UART: [ldev] AUTHORITY.KEYID = 7
1,212,826 UART: [ldev] FE.KEYID = 1
1,217,822 UART: [ldev] Erasing FE.KEYID = 1
1,244,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,346 UART: [ldev] --
1,283,615 UART: [fwproc] Wait for Commands...
1,284,367 UART: [fwproc] Recv command 0x46574c44
1,285,095 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,138 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,425 >>> mbox cmd response: success
2,777,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,778,457 UART: [afmc] ++
2,778,625 UART: [afmc] CDI.KEYID = 6
2,778,987 UART: [afmc] SUBJECT.KEYID = 7
2,779,412 UART: [afmc] AUTHORITY.KEYID = 5
2,814,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,002 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,615 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,334 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,198 UART: [afmc] --
2,858,104 UART: [cold-reset] --
2,859,050 UART: [state] Locking Datavault
2,860,547 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,151 UART: [state] Locking ICCM
2,861,671 UART: [exit] Launching FMC @ 0x40000130
2,867,000 UART:
2,867,016 UART: Running Caliptra FMC ...
2,867,424 UART:
2,867,567 UART: [state] CFI Enabled
2,878,284 UART: [fht] FMC Alias Private Key: 7
2,986,209 UART: [art] Extend RT PCRs Done
2,986,637 UART: [art] Lock RT PCRs Done
2,988,019 UART: [art] Populate DV Done
2,996,150 UART: [fht] FMC Alias Private Key: 7
2,997,182 UART: [art] Derive CDI
2,997,462 UART: [art] Store in in slot 0x4
3,083,049 UART: [art] Derive Key Pair
3,083,409 UART: [art] Store priv key in slot 0x5
3,096,553 UART: [art] Derive Key Pair - Done
3,111,278 UART: [art] Signing Cert with AUTHO
3,111,758 UART: RITY.KEYID = 7
3,126,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,601 UART: [art] PUB.X = 81EBD429709CAD6BB89B5E19C31E8DC26463140BF1229BB1F69199FA549CE0E9712979EB031C06E4CCB0520416ABE400
3,134,343 UART: [art] PUB.Y = 48F192F56D5F1734F43E8AB299A699C40606DACE53E0BF687894B2C5544BECDF68956733234D83C9D1D60FD7B91141AD
3,141,288 UART: [art] SIG.R = 08E03AF57D49504859B2E11BE80172D7FE45B82DD5AD59AFCBFBB1E2D8D4892E2B736004E614DCFC59A82E3CFDA42F6C
3,148,069 UART: [art] SIG.S = 14B4C32AF8DE89FBB1328EC13E2E1929BDD1CEC41AF68491D965E63E4E04CA5F8D2EFCA959D8092B989AA2CBB4CEF82E
3,172,218 UART: Caliptra RT
3,172,563 UART: [state] CFI Enabled
3,280,492 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,432 UART: [rt]cmd =0x44504543, len=96
3,348,405 >>> mbox cmd response data (56 bytes)
3,348,406 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,935 UART: [rt]cmd =0x54514754, len=24
3,380,106 >>> mbox cmd response: failed
3,380,106 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,352 UART: [rt]cmd =0x54514754, len=24
3,411,519 >>> mbox cmd response data (8 bytes)
3,411,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,501 UART: [rt]cmd =0x44504543, len=96
3,477,347 >>> mbox cmd response data (56 bytes)
3,477,348 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,675 UART: [rt]cmd =0x47544744, len=8
3,509,388 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,396 ready_for_fw is high
1,060,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,732 >>> mbox cmd response: success
2,627,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,689,964 UART:
2,689,980 UART: Running Caliptra FMC ...
2,690,388 UART:
2,690,531 UART: [state] CFI Enabled
2,700,858 UART: [fht] FMC Alias Private Key: 7
2,808,837 UART: [art] Extend RT PCRs Done
2,809,265 UART: [art] Lock RT PCRs Done
2,810,825 UART: [art] Populate DV Done
2,819,364 UART: [fht] FMC Alias Private Key: 7
2,820,344 UART: [art] Derive CDI
2,820,624 UART: [art] Store in in slot 0x4
2,906,109 UART: [art] Derive Key Pair
2,906,469 UART: [art] Store priv key in slot 0x5
2,919,613 UART: [art] Derive Key Pair - Done
2,934,292 UART: [art] Signing Cert with AUTHO
2,934,772 UART: RITY.KEYID = 7
2,949,938 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,703 UART: [art] PUB.X = 7FC9839158F468E8B34485211073875CE035D4DDA152CB3527F7F18CF159AAB6C85B0E0D3F9E8948E93261C3B210CF82
2,957,467 UART: [art] PUB.Y = A2D4300949A042C1C148C4F7ECF054829ABD5635B6C828CF52466067D678464C89A8F6656A847BB945807F7C961649DE
2,964,408 UART: [art] SIG.R = 079C2A2571CB6F1C23082A3E26AB93E30CF8B6B8FEE68BE9D0CCAAB393F81082D8D91A0C23C4710A3DD8FCEBB3F9DA93
2,971,187 UART: [art] SIG.S = FCC01C9C0FBC1EF2F9595676F9D353EB6B778BB76457DBD33BD0D5D1249CA0C3BE1D7BB0FC4F4F5C32EA68E280A7DAC6
2,994,833 UART: Caliptra RT
2,995,178 UART: [state] CFI Enabled
3,102,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,901 UART: [rt]cmd =0x44504543, len=96
3,170,886 >>> mbox cmd response data (56 bytes)
3,170,887 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,200,194 UART: [rt]cmd =0x54514754, len=24
3,201,993 >>> mbox cmd response: failed
3,201,993 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,513 UART: [rt]cmd =0x54514754, len=24
3,233,612 >>> mbox cmd response data (8 bytes)
3,233,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,263,502 UART: [rt]cmd =0x44504543, len=96
3,299,978 >>> mbox cmd response data (56 bytes)
3,299,979 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,452 UART: [rt]cmd =0x47544744, len=8
3,332,231 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,736 UART: [state] LifecycleState = Unprovisioned
85,391 UART: [state] DebugLocked = No
85,947 UART: [state] WD Timer not started. Device not locked for debugging
87,112 UART: [kat] SHA2-256
890,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,791 UART: [kat] ++
894,943 UART: [kat] sha1
899,109 UART: [kat] SHA2-256
901,049 UART: [kat] SHA2-384
903,734 UART: [kat] SHA2-512-ACC
905,635 UART: [kat] ECC-384
915,338 UART: [kat] HMAC-384Kdf
919,974 UART: [kat] LMS
1,168,286 UART: [kat] --
1,169,039 UART: [cold-reset] ++
1,169,519 UART: [fht] FHT @ 0x50003400
1,172,103 UART: [idev] ++
1,172,271 UART: [idev] CDI.KEYID = 6
1,172,632 UART: [idev] SUBJECT.KEYID = 7
1,173,057 UART: [idev] UDS.KEYID = 0
1,173,403 ready_for_fw is high
1,173,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,067 UART: [idev] Erasing UDS.KEYID = 0
1,198,541 UART: [idev] Sha1 KeyId Algorithm
1,207,529 UART: [idev] --
1,208,488 UART: [ldev] ++
1,208,656 UART: [ldev] CDI.KEYID = 6
1,209,020 UART: [ldev] SUBJECT.KEYID = 5
1,209,447 UART: [ldev] AUTHORITY.KEYID = 7
1,209,910 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,241,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,986 UART: [ldev] --
1,281,470 UART: [fwproc] Wait for Commands...
1,282,231 UART: [fwproc] Recv command 0x46574c44
1,282,964 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,453 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,762 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,664 >>> mbox cmd response: success
2,773,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,813 UART: [afmc] ++
2,774,981 UART: [afmc] CDI.KEYID = 6
2,775,344 UART: [afmc] SUBJECT.KEYID = 7
2,775,770 UART: [afmc] AUTHORITY.KEYID = 5
2,811,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,447 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,330 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,049 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,820 UART: [afmc] --
2,854,878 UART: [cold-reset] --
2,855,616 UART: [state] Locking Datavault
2,856,767 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,371 UART: [state] Locking ICCM
2,858,039 UART: [exit] Launching FMC @ 0x40000130
2,863,368 UART:
2,863,384 UART: Running Caliptra FMC ...
2,863,792 UART:
2,863,846 UART: [state] CFI Enabled
2,874,203 UART: [fht] FMC Alias Private Key: 7
2,982,154 UART: [art] Extend RT PCRs Done
2,982,582 UART: [art] Lock RT PCRs Done
2,984,208 UART: [art] Populate DV Done
2,992,505 UART: [fht] FMC Alias Private Key: 7
2,993,447 UART: [art] Derive CDI
2,993,727 UART: [art] Store in in slot 0x4
3,079,352 UART: [art] Derive Key Pair
3,079,712 UART: [art] Store priv key in slot 0x5
3,092,876 UART: [art] Derive Key Pair - Done
3,107,804 UART: [art] Signing Cert with AUTHO
3,108,284 UART: RITY.KEYID = 7
3,123,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,947 UART: [art] PUB.X = 28BEE5789CF5A3742916C586E04561801CC186FA524E0945D338666A7E5FB955C17BE1E03D41670E0F21D0EC1EB9CA9C
3,130,712 UART: [art] PUB.Y = 628F42ADA1817634526DDC7D72C9CC5A6A2FD7B77722CB389AF896E1635B1247DE41F0DA691247C0EA48F930CBBADE09
3,137,671 UART: [art] SIG.R = 71EAF56D852A6A86A3CC22C33E158EAD0E0697131D2E099AAD1D50CBD3A135C979D5C64BE211E6769C8297B5AA9D23A4
3,144,444 UART: [art] SIG.S = 56E3DB9BCE30E157721690A8502C1C6CA86F23DD5953802DC81F0FF57153F533F8E242E0390FE712FCB56ADD129C7CBF
3,168,025 UART: Caliptra RT
3,168,278 UART: [state] CFI Enabled
3,277,061 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,967 UART: [rt]cmd =0x44504543, len=96
3,344,356 >>> mbox cmd response data (56 bytes)
3,344,357 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,666 UART: [rt]cmd =0x54514754, len=24
3,375,663 >>> mbox cmd response: failed
3,375,663 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,233 UART: [rt]cmd =0x54514754, len=24
3,407,440 >>> mbox cmd response data (8 bytes)
3,407,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,532 UART: [rt]cmd =0x44504543, len=96
3,474,598 >>> mbox cmd response data (56 bytes)
3,474,599 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,948 UART: [rt]cmd =0x47544744, len=8
3,506,307 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,708 ready_for_fw is high
1,055,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,384 >>> mbox cmd response: success
2,622,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,684,092 UART:
2,684,108 UART: Running Caliptra FMC ...
2,684,516 UART:
2,684,570 UART: [state] CFI Enabled
2,694,791 UART: [fht] FMC Alias Private Key: 7
2,802,972 UART: [art] Extend RT PCRs Done
2,803,400 UART: [art] Lock RT PCRs Done
2,805,042 UART: [art] Populate DV Done
2,813,449 UART: [fht] FMC Alias Private Key: 7
2,814,517 UART: [art] Derive CDI
2,814,797 UART: [art] Store in in slot 0x4
2,900,258 UART: [art] Derive Key Pair
2,900,618 UART: [art] Store priv key in slot 0x5
2,914,068 UART: [art] Derive Key Pair - Done
2,928,747 UART: [art] Signing Cert with AUTHO
2,929,227 UART: RITY.KEYID = 7
2,943,901 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,666 UART: [art] PUB.X = 47F0026ADC047ED5B158652E896CB6FDBED5911394544060888F5749009BB41E487F8B62AD95C377A7F8F0A6590BF0C7
2,951,405 UART: [art] PUB.Y = 61CA6FAFEB4A27EB9486803EC3257896EB7C3DA91B48B22C25DE4F6AA3F09BC6EBA4AEFFC34C01139D959EE31A3553AD
2,958,376 UART: [art] SIG.R = D241B82B9E694418EA57173565A8EB55C97A9AE2FB05E8D45B68B606F051D835C64C8E72428BBF93E3AE1AA434A1490C
2,965,143 UART: [art] SIG.S = E4AA0268600E2E364032AC906221C49D5ADE8616A0EE706FFF1E66C0A9406D31D12F1A3AB7509B3702B4B77DCDD5B6F1
2,988,863 UART: Caliptra RT
2,989,116 UART: [state] CFI Enabled
3,096,324 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,700 UART: [rt]cmd =0x44504543, len=96
3,164,037 >>> mbox cmd response data (56 bytes)
3,164,038 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,329 UART: [rt]cmd =0x54514754, len=24
3,195,298 >>> mbox cmd response: failed
3,195,298 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,702 UART: [rt]cmd =0x54514754, len=24
3,226,819 >>> mbox cmd response data (8 bytes)
3,226,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,256,587 UART: [rt]cmd =0x44504543, len=96
3,293,731 >>> mbox cmd response data (56 bytes)
3,293,732 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,335 UART: [rt]cmd =0x47544744, len=8
3,325,624 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,312 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
891,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,336 UART: [kat] ++
895,488 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,825 UART: [kat] HMAC-384Kdf
921,511 UART: [kat] LMS
1,169,823 UART: [kat] --
1,170,650 UART: [cold-reset] ++
1,171,108 UART: [fht] FHT @ 0x50003400
1,173,570 UART: [idev] ++
1,173,738 UART: [idev] CDI.KEYID = 6
1,174,099 UART: [idev] SUBJECT.KEYID = 7
1,174,524 UART: [idev] UDS.KEYID = 0
1,174,870 ready_for_fw is high
1,174,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,572 UART: [idev] Erasing UDS.KEYID = 0
1,200,000 UART: [idev] Sha1 KeyId Algorithm
1,208,872 UART: [idev] --
1,209,779 UART: [ldev] ++
1,209,947 UART: [ldev] CDI.KEYID = 6
1,210,311 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,085 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x46574c44
1,283,521 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,726 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,125 >>> mbox cmd response: success
2,773,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,280 UART: [afmc] ++
2,774,448 UART: [afmc] CDI.KEYID = 6
2,774,811 UART: [afmc] SUBJECT.KEYID = 7
2,775,237 UART: [afmc] AUTHORITY.KEYID = 5
2,810,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,603 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,215 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,934 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,769 UART: [afmc] --
2,853,707 UART: [cold-reset] --
2,854,481 UART: [state] Locking Datavault
2,855,658 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,262 UART: [state] Locking ICCM
2,856,788 UART: [exit] Launching FMC @ 0x40000130
2,862,117 UART:
2,862,133 UART: Running Caliptra FMC ...
2,862,541 UART:
2,862,684 UART: [state] CFI Enabled
2,873,221 UART: [fht] FMC Alias Private Key: 7
2,981,016 UART: [art] Extend RT PCRs Done
2,981,444 UART: [art] Lock RT PCRs Done
2,982,862 UART: [art] Populate DV Done
2,991,149 UART: [fht] FMC Alias Private Key: 7
2,992,307 UART: [art] Derive CDI
2,992,587 UART: [art] Store in in slot 0x4
3,078,322 UART: [art] Derive Key Pair
3,078,682 UART: [art] Store priv key in slot 0x5
3,091,902 UART: [art] Derive Key Pair - Done
3,106,569 UART: [art] Signing Cert with AUTHO
3,107,049 UART: RITY.KEYID = 7
3,122,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,286 UART: [art] PUB.X = B3018D534D0DFF430E35E7CFC411C7098136F90CF66E2A5F4019B23913EA0FAB4CDA180C019F6D2A0688E6F363CB7E6B
3,130,041 UART: [art] PUB.Y = 3CB335479B19B5C226E17E5D52D7A2A1E822EE5C961753E0B4291CBBCF9B5FCDA6A8CD74FEA2DA689CF8A5903FC937FE
3,137,013 UART: [art] SIG.R = E5768461CB343A1E41C164C8EEC804B47504A3359A191DA1E838B140350ED3B72B2F32F525FFDC3E31A31E583B4D2DC1
3,143,780 UART: [art] SIG.S = B6ADAA57DEF6F386A93E4714AC26D14F9ACB062715C548C3C3F5C66A7F1382FF5D86D8487586F083CB29380300CB8B08
3,167,776 UART: Caliptra RT
3,168,121 UART: [state] CFI Enabled
3,276,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,251 UART: [rt]cmd =0x44504543, len=96
3,343,738 >>> mbox cmd response data (56 bytes)
3,343,739 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,200 UART: [rt]cmd =0x54514754, len=24
3,375,097 >>> mbox cmd response: failed
3,375,097 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,491 UART: [rt]cmd =0x54514754, len=24
3,406,554 >>> mbox cmd response data (8 bytes)
3,406,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,522 UART: [rt]cmd =0x44504543, len=96
3,472,952 >>> mbox cmd response data (56 bytes)
3,472,953 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,602 UART: [rt]cmd =0x47544744, len=8
3,505,021 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,787 ready_for_fw is high
1,056,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,693 >>> mbox cmd response: success
2,624,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,687,589 UART:
2,687,605 UART: Running Caliptra FMC ...
2,688,013 UART:
2,688,156 UART: [state] CFI Enabled
2,698,503 UART: [fht] FMC Alias Private Key: 7
2,806,046 UART: [art] Extend RT PCRs Done
2,806,474 UART: [art] Lock RT PCRs Done
2,808,156 UART: [art] Populate DV Done
2,816,277 UART: [fht] FMC Alias Private Key: 7
2,817,341 UART: [art] Derive CDI
2,817,621 UART: [art] Store in in slot 0x4
2,903,178 UART: [art] Derive Key Pair
2,903,538 UART: [art] Store priv key in slot 0x5
2,916,922 UART: [art] Derive Key Pair - Done
2,931,457 UART: [art] Signing Cert with AUTHO
2,931,937 UART: RITY.KEYID = 7
2,946,955 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,720 UART: [art] PUB.X = 0A9A5B8505C423CE6F485081D7AA638EDB774CBCD9301B9626EF8A19CA9A1ED559BEE066A93D2943749E24BA33A1266C
2,954,494 UART: [art] PUB.Y = A1B032ED94DBC8127CD152837B06994A24829DFAC55CC2CCF96B670F42EA8D9EB745F9AC0C8901172C2A25C569D85B5C
2,961,444 UART: [art] SIG.R = 3B92D9370E07D9D3FE5120051EE6F5888D3F5642D2ADFB8AB6CDB4239534067C247E3D6C2620CE2B678E5642BAC5310F
2,968,205 UART: [art] SIG.S = 67D974B591F8C94F7DF5F9AA4284A43CF52937C00075E357E3153DEFD50A7E55E5230C489099270823710900F308BBA5
2,992,357 UART: Caliptra RT
2,992,702 UART: [state] CFI Enabled
3,100,613 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,859 UART: [rt]cmd =0x44504543, len=96
3,168,536 >>> mbox cmd response data (56 bytes)
3,168,537 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,694 UART: [rt]cmd =0x54514754, len=24
3,199,429 >>> mbox cmd response: failed
3,199,429 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,013 UART: [rt]cmd =0x54514754, len=24
3,230,978 >>> mbox cmd response data (8 bytes)
3,230,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,972 UART: [rt]cmd =0x44504543, len=96
3,297,656 >>> mbox cmd response data (56 bytes)
3,297,657 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,002 UART: [rt]cmd =0x47544744, len=8
3,329,697 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
191,983 UART:
192,344 UART: Running Caliptra ROM ...
193,554 UART:
193,727 UART: [state] CFI Enabled
266,897 UART: [state] LifecycleState = Unprovisioned
268,900 UART: [state] DebugLocked = No
270,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,892 UART: [kat] SHA2-256
445,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,095 UART: [kat] ++
456,582 UART: [kat] sha1
468,525 UART: [kat] SHA2-256
471,258 UART: [kat] SHA2-384
476,822 UART: [kat] SHA2-512-ACC
479,191 UART: [kat] ECC-384
2,768,321 UART: [kat] HMAC-384Kdf
2,801,013 UART: [kat] LMS
3,991,286 UART: [kat] --
3,997,528 UART: [cold-reset] ++
3,999,538 UART: [fht] Storing FHT @ 0x50003400
4,011,612 UART: [idev] ++
4,012,223 UART: [idev] CDI.KEYID = 6
4,013,111 UART: [idev] SUBJECT.KEYID = 7
4,014,427 UART: [idev] UDS.KEYID = 0
4,015,405 ready_for_fw is high
4,015,609 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,114,787 UART: [idev] Erasing UDS.KEYID = 0
7,347,303 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,975 UART: [idev] --
7,373,700 UART: [ldev] ++
7,374,279 UART: [ldev] CDI.KEYID = 6
7,375,271 UART: [ldev] SUBJECT.KEYID = 5
7,376,374 UART: [ldev] AUTHORITY.KEYID = 7
7,377,714 UART: [ldev] FE.KEYID = 1
7,422,124 UART: [ldev] Erasing FE.KEYID = 1
10,753,944 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,555 UART: [ldev] --
13,116,879 UART: [fwproc] Waiting for Commands...
13,119,997 UART: [fwproc] Received command 0x46574c44
13,122,229 UART: [fwproc] Received Image of size 78740 bytes
16,740,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,821,181 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,890,076 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,082,826 >>> mbox cmd response: success
17,083,327 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,086,846 UART: [afmc] ++
17,087,459 UART: [afmc] CDI.KEYID = 6
17,088,381 UART: [afmc] SUBJECT.KEYID = 7
17,089,605 UART: [afmc] AUTHORITY.KEYID = 5
20,450,872 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,754,277 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,756,548 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,770,978 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,785,835 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,800,242 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,821,658 UART: [afmc] --
22,826,347 UART: [cold-reset] --
22,830,053 UART: [state] Locking Datavault
22,834,768 UART: [state] Locking PCR0, PCR1 and PCR31
22,836,521 UART: [state] Locking ICCM
22,838,347 UART: [exit] Launching FMC @ 0x40000130
22,846,749 UART:
22,847,005 UART: Running Caliptra FMC ...
22,848,114 UART:
22,848,274 UART: [state] CFI Enabled
22,914,609 UART: [fht] FMC Alias Private Key: 7
25,251,623 UART: [art] Extend RT PCRs Done
25,252,854 UART: [art] Lock RT PCRs Done
25,254,813 UART: [art] Populate DV Done
25,260,395 UART: [fht] FMC Alias Private Key: 7
25,261,936 UART: [art] Derive CDI
25,262,752 UART: [art] Store in in slot 0x4
25,323,028 UART: [art] Derive Key Pair
25,324,078 UART: [art] Store priv key in slot 0x5
28,616,988 UART: [art] Derive Key Pair - Done
28,630,311 UART: [art] Signing Cert with AUTHO
28,631,621 UART: RITY.KEYID = 7
30,919,224 UART: [art] Erasing AUTHORITY.KEYID = 7
30,920,744 UART: [art] PUB.X = 9113EE4C3C9A9E39027304BC5B6278C6071AE1348C4BC0A42D079D7B8320FFF5E43C530E5AF998CAA7DC583A5F394192
30,927,990 UART: [art] PUB.Y = E1C9454C0DEE4D8BF2BE5463498AD64F1A8BA596BAAA0D2ED3A21AD275B506C4C8511748F9DDA9A5C2E4E2E8328AFA4A
30,935,286 UART: [art] SIG.R = 32AE6672F83333714A8CCCF6C6E451E1D273314D3D7D5F1C504381797DE818DD47522EA1C0DD71FAA1704C03C1A46EB8
30,942,621 UART: [art] SIG.S = 82DE5316EB02367DDEA9F65BB14A38FD5A37AF0E4C7125F8157AC3426490A2B2AC8AB556981CCD0B9670B3F97FAAE605
32,247,808 UART: mbox::rt_entry...
32,248,768 UART: ____ _ _ _ ____ _____
32,250,704 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,252,713 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,254,650 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,592 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,258,525 UART: |_|
32,259,337 UART:
32,373,103 UART: [rt] Runtime listening for mailbox commands...
32,375,118 >>> mbox cmd response data (0 bytes)
34,507,132 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,651,464 UART:
34,651,860 UART: Running Caliptra ROM ...
34,652,915 UART:
34,653,079 UART: [state] CFI Enabled
34,712,995 UART: [state] LifecycleState = Unprovisioned
34,714,897 UART: [state] DebugLocked = No
34,716,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,720,801 UART: [kat] SHA2-256
34,890,498 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,901,014 UART: [kat] ++
34,901,498 UART: [kat] sha1
34,912,892 UART: [kat] SHA2-256
34,915,593 UART: [kat] SHA2-384
34,919,800 UART: [kat] SHA2-512-ACC
34,922,215 UART: [kat] ECC-384
37,220,859 UART: [kat] HMAC-384Kdf
37,251,614 UART: [kat] LMS
38,441,949 UART: [kat] --
38,447,797 UART: [update-reset] ++
42,581,381 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,584,518 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,966,797 >>> mbox cmd response: success
42,971,330 UART: [update-reset] Copying MAN_2 To MAN_1
42,991,234 UART: [update-reset Success] --
42,995,591 UART: [state] Locking Datavault
42,998,049 UART: [state] Locking PCR0, PCR1 and PCR31
42,999,812 UART: [state] Locking ICCM
43,001,489 UART: [exit] Launching FMC @ 0x40000130
43,009,900 UART:
43,010,149 UART: Running Caliptra FMC ...
43,011,252 UART:
43,011,417 UART: [state] CFI Enabled
43,107,139 UART: [art] Extend RT PCRs Done
43,108,330 UART: [art] Lock RT PCRs Done
43,109,793 UART: [art] Populate DV Done
43,115,362 UART: [fht] FMC Alias Private Key: 7
43,117,002 UART: [art] Derive CDI
43,117,822 UART: [art] Store in in slot 0x4
43,176,251 UART: [art] Derive Key Pair
43,177,318 UART: [art] Store priv key in slot 0x5
46,469,645 UART: [art] Derive Key Pair - Done
46,482,651 UART: [art] Signing Cert with AUTHO
46,483,964 UART: RITY.KEYID = 7
48,771,118 UART: [art] Erasing AUTHORITY.KEYID = 7
48,772,625 UART: [art] PUB.X = 27FAF9BAD9A59DA719D73DA13D959186F28A7A1DD0C29F393CE288279DDF5C1D7D84F89D86C3DDF1F8C46CA1B4BCFF0D
48,779,920 UART: [art] PUB.Y = FE9A76A45939C849F48A8487B3E72525FC9AB9DDC04701EBF76FFA6B6F5D09AD67B58A5F6184908E48607E4B1203DA07
48,787,163 UART: [art] SIG.R = A666517FDF2E492EC98598D02C15F30A5057406FE15B179EAE2E6FA13E7EC9E5E829AB47870F24E76DEF0328772DE84B
48,794,535 UART: [art] SIG.S = 55ED6BC737F915507DC2567933EFAFC4F671DB1B4389E2ABA93530C742810D5B02FB7E3B6900BF4413B961B348586B53
50,099,190 UART: Caliptra RT
50,099,901 UART: [state] CFI Enabled
50,432,044 UART: [rt] RT failed reset flow
50,433,259 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,785,370 ready_for_fw is high
3,785,776 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,131,077 >>> mbox cmd response: success
17,131,833 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
22,821,222 UART:
22,821,635 UART: Running Caliptra FMC ...
22,822,747 UART:
22,822,902 UART: [state] CFI Enabled
22,890,105 UART: [fht] FMC Alias Private Key: 7
25,227,600 UART: [art] Extend RT PCRs Done
25,228,826 UART: [art] Lock RT PCRs Done
25,230,547 UART: [art] Populate DV Done
25,236,026 UART: [fht] FMC Alias Private Key: 7
25,237,576 UART: [art] Derive CDI
25,238,310 UART: [art] Store in in slot 0x4
25,289,545 UART: [art] Derive Key Pair
25,290,546 UART: [art] Store priv key in slot 0x5
28,584,122 UART: [art] Derive Key Pair - Done
28,596,960 UART: [art] Signing Cert with AUTHO
28,598,264 UART: RITY.KEYID = 7
30,886,247 UART: [art] Erasing AUTHORITY.KEYID = 7
30,887,773 UART: [art] PUB.X = 6A5A04264C2DFEEA3A7F636CCB060F53981728B50D287AD6F0F5EE9FC1F9FA099AFCBFF8BA8F1E7B3CACB7FB6CA2B847
30,895,097 UART: [art] PUB.Y = 610769B3CFC94966C4F5B1AB3A9CFDEF6967CFD32B773CD777A25092CAC288FE86924240109C2F86A7C3DE2F0D019DAF
30,902,278 UART: [art] SIG.R = C379562CF5431EA739CABFB690EEF4D29CBD31E5DE669EB953F5FB7E56A2D160573A5164EE4ADBE2E4AFDD21EEF9E601
30,909,692 UART: [art] SIG.S = F90A2DFD266C7344177696E94732A55F67B157E73E73EEDAF699D972F4E58F505A0E962CB0623C1024A90C25E7BDCAAE
32,214,843 UART: mbox::rt_entry...
32,215,810 UART: ____ _ _ _ ____ _____
32,217,802 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,219,809 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,221,741 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,223,705 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,225,638 UART: |_|
32,226,476 UART:
32,339,361 UART: [rt] Runtime listening for mailbox commands...
32,341,378 >>> mbox cmd response data (0 bytes)
34,473,026 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,204,749 >>> mbox cmd response: success
43,240,081 UART:
43,240,410 UART: Running Caliptra FMC ...
43,241,537 UART:
43,241,710 UART: [state] CFI Enabled
43,331,414 UART: [art] Extend RT PCRs Done
43,332,607 UART: [art] Lock RT PCRs Done
43,334,095 UART: [art] Populate DV Done
43,339,938 UART: [fht] FMC Alias Private Key: 7
43,341,472 UART: [art] Derive CDI
43,342,209 UART: [art] Store in in slot 0x4
43,400,552 UART: [art] Derive Key Pair
43,401,580 UART: [art] Store priv key in slot 0x5
46,694,064 UART: [art] Derive Key Pair - Done
46,706,794 UART: [art] Signing Cert with AUTHO
46,708,099 UART: RITY.KEYID = 7
48,995,683 UART: [art] Erasing AUTHORITY.KEYID = 7
48,997,190 UART: [art] PUB.X = 0CE8B17DE49D86B40AA65D56EFE5CA686D59E90B5C5888AA76617218236EBA8C804D0C8516D19D8E8A6A9256F4CA0C2E
49,004,421 UART: [art] PUB.Y = 2B3A097A8D0A8015E58D4BEA79A7F23F2035256DF5E0E417C48BFF1242DD73E221E9144EE97F0E97164BA6441BB5FEC2
49,011,692 UART: [art] SIG.R = 55DEF34F98367C27716E79FCF7977578B7C2900AA21F1ED097DFC6F01932935368C780BB072E6F63E5E372211D89CA87
49,019,005 UART: [art] SIG.S = E0534FDDA2E799C6C43033F84F4CFF988C8D99D2C01BB33D54C05129982972431BDBDEF761561C947639777CD04F5BCE
50,324,098 UART: Caliptra RT
50,324,805 UART: [state] CFI Enabled
50,656,374 UART: [rt] RT failed reset flow
50,657,574 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,346 UART:
192,720 UART: Running Caliptra ROM ...
193,813 UART:
603,569 UART: [state] CFI Enabled
618,854 UART: [state] LifecycleState = Unprovisioned
620,715 UART: [state] DebugLocked = No
622,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,212 UART: [kat] SHA2-256
797,941 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,538 UART: [kat] ++
808,994 UART: [kat] sha1
820,425 UART: [kat] SHA2-256
823,137 UART: [kat] SHA2-384
828,149 UART: [kat] SHA2-512-ACC
830,619 UART: [kat] ECC-384
3,114,833 UART: [kat] HMAC-384Kdf
3,126,124 UART: [kat] LMS
4,316,243 UART: [kat] --
4,319,976 UART: [cold-reset] ++
4,322,265 UART: [fht] Storing FHT @ 0x50003400
4,334,022 UART: [idev] ++
4,334,594 UART: [idev] CDI.KEYID = 6
4,335,510 UART: [idev] SUBJECT.KEYID = 7
4,336,748 UART: [idev] UDS.KEYID = 0
4,337,830 ready_for_fw is high
4,338,053 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,437,245 UART: [idev] Erasing UDS.KEYID = 0
7,625,175 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,264 UART: [idev] --
7,651,415 UART: [ldev] ++
7,651,992 UART: [ldev] CDI.KEYID = 6
7,652,952 UART: [ldev] SUBJECT.KEYID = 5
7,654,161 UART: [ldev] AUTHORITY.KEYID = 7
7,655,389 UART: [ldev] FE.KEYID = 1
7,666,242 UART: [ldev] Erasing FE.KEYID = 1
10,953,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,269 UART: [ldev] --
13,314,928 UART: [fwproc] Waiting for Commands...
13,318,260 UART: [fwproc] Received command 0x46574c44
13,320,444 UART: [fwproc] Received Image of size 78740 bytes
16,941,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,017,799 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,086,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,280,267 >>> mbox cmd response: success
17,280,753 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,284,969 UART: [afmc] ++
17,285,604 UART: [afmc] CDI.KEYID = 6
17,286,483 UART: [afmc] SUBJECT.KEYID = 7
17,287,744 UART: [afmc] AUTHORITY.KEYID = 5
20,606,499 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,901,431 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,903,741 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,918,125 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,932,921 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,947,369 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,968,955 UART: [afmc] --
22,972,330 UART: [cold-reset] --
22,975,992 UART: [state] Locking Datavault
22,981,828 UART: [state] Locking PCR0, PCR1 and PCR31
22,983,520 UART: [state] Locking ICCM
22,985,041 UART: [exit] Launching FMC @ 0x40000130
22,993,435 UART:
22,993,729 UART: Running Caliptra FMC ...
22,994,764 UART:
22,994,905 UART: [state] CFI Enabled
23,002,684 UART: [fht] FMC Alias Private Key: 7
25,333,540 UART: [art] Extend RT PCRs Done
25,334,757 UART: [art] Lock RT PCRs Done
25,336,353 UART: [art] Populate DV Done
25,341,596 UART: [fht] FMC Alias Private Key: 7
25,343,244 UART: [art] Derive CDI
25,344,054 UART: [art] Store in in slot 0x4
25,386,268 UART: [art] Derive Key Pair
25,387,280 UART: [art] Store priv key in slot 0x5
28,629,288 UART: [art] Derive Key Pair - Done
28,642,392 UART: [art] Signing Cert with AUTHO
28,643,694 UART: RITY.KEYID = 7
30,923,324 UART: [art] Erasing AUTHORITY.KEYID = 7
30,924,827 UART: [art] PUB.X = 3EDD1DF0AC9813CFE817BC1085D043722FE8DE1D25F993A771D301FBC9D40532EE07A4E7A61B70CF31EACA075E582217
30,932,062 UART: [art] PUB.Y = F7726F1A79E0DE53933E98EE8BC4C39061C6C41D91F5F0C443778F36AB5CAD10C6E2280E01BDDD10CB13F3E013B22A6A
30,939,340 UART: [art] SIG.R = 266DCD056F47ACA996E22F2685D5AF2AE8BF154F51B7F1A97B5D342476ECE0D35D5AFB943332F286419BF84A19AE192C
30,946,724 UART: [art] SIG.S = 76C5B454B9271AC28811388E1426AA2DBC6D380808AF3ADDA8049A25F657DDC6FB03C1DFF995616395EF64C171F1A192
32,251,474 UART: mbox::rt_entry...
32,252,436 UART: ____ _ _ _ ____ _____
32,254,518 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,256,520 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,258,446 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,260,366 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,262,288 UART: |_|
32,263,284 UART:
32,376,452 UART: [rt] Runtime listening for mailbox commands...
32,378,489 >>> mbox cmd response data (0 bytes)
34,433,006 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,577,276 UART:
34,577,651 UART: Running Caliptra ROM ...
34,578,695 UART:
34,578,898 UART: [state] CFI Enabled
34,591,086 UART: [state] LifecycleState = Unprovisioned
34,593,024 UART: [state] DebugLocked = No
34,594,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,600,224 UART: [kat] SHA2-256
34,769,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,780,482 UART: [kat] ++
34,780,935 UART: [kat] sha1
34,791,864 UART: [kat] SHA2-256
34,794,600 UART: [kat] SHA2-384
34,799,931 UART: [kat] SHA2-512-ACC
34,802,340 UART: [kat] ECC-384
37,087,717 UART: [kat] HMAC-384Kdf
37,099,423 UART: [kat] LMS
38,289,503 UART: [kat] --
38,294,481 UART: [update-reset] ++
42,441,976 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,445,054 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,827,302 >>> mbox cmd response: success
42,832,314 UART: [update-reset] Copying MAN_2 To MAN_1
42,850,519 UART: [update-reset Success] --
42,854,595 UART: [state] Locking Datavault
42,858,339 UART: [state] Locking PCR0, PCR1 and PCR31
42,860,137 UART: [state] Locking ICCM
42,862,102 UART: [exit] Launching FMC @ 0x40000130
42,870,553 UART:
42,870,780 UART: Running Caliptra FMC ...
42,871,800 UART:
42,871,941 UART: [state] CFI Enabled
42,916,001 UART: [art] Extend RT PCRs Done
42,917,202 UART: [art] Lock RT PCRs Done
42,918,483 UART: [art] Populate DV Done
42,924,003 UART: [fht] FMC Alias Private Key: 7
42,925,488 UART: [art] Derive CDI
42,926,217 UART: [art] Store in in slot 0x4
42,969,279 UART: [art] Derive Key Pair
42,970,271 UART: [art] Store priv key in slot 0x5
46,212,506 UART: [art] Derive Key Pair - Done
46,225,562 UART: [art] Signing Cert with AUTHO
46,226,860 UART: RITY.KEYID = 7
48,506,170 UART: [art] Erasing AUTHORITY.KEYID = 7
48,507,672 UART: [art] PUB.X = 3516718CB89E8078F69D5B768BABDAFE8C5CCF00C05D459E9059686869B9E938E3A42079F9FCCF80B456A79464C39E27
48,514,957 UART: [art] PUB.Y = A9F3874BDAE325087C5D750C66BB719E590C21A102FC905FF416ECED54D67BF494F462491B08574684397AAD8686A093
48,522,233 UART: [art] SIG.R = E9084B7BBACCBB4BACE168519EA216118D85B52626DFA14EF23BA3C6254C9B3252BF6E72D3BC068E3E7F350BFB123840
48,529,577 UART: [art] SIG.S = 11596B8DEA1A8AA6B5911D50302CE61E9133BA3DC81323E70227D4069654D524E07BB01905C03A1828E8F9CCD6B0C0B0
49,835,130 UART: Caliptra RT
49,835,822 UART: [state] CFI Enabled
50,122,437 UART: [rt] RT failed reset flow
50,123,658 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,125,754 ready_for_fw is high
4,126,361 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,354,426 >>> mbox cmd response: success
17,355,048 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
22,986,096 UART:
22,986,479 UART: Running Caliptra FMC ...
22,987,605 UART:
22,987,755 UART: [state] CFI Enabled
22,995,784 UART: [fht] FMC Alias Private Key: 7
25,327,271 UART: [art] Extend RT PCRs Done
25,328,501 UART: [art] Lock RT PCRs Done
25,330,343 UART: [art] Populate DV Done
25,335,829 UART: [fht] FMC Alias Private Key: 7
25,337,369 UART: [art] Derive CDI
25,338,186 UART: [art] Store in in slot 0x4
25,380,683 UART: [art] Derive Key Pair
25,381,720 UART: [art] Store priv key in slot 0x5
28,623,580 UART: [art] Derive Key Pair - Done
28,636,830 UART: [art] Signing Cert with AUTHO
28,638,137 UART: RITY.KEYID = 7
30,917,851 UART: [art] Erasing AUTHORITY.KEYID = 7
30,919,363 UART: [art] PUB.X = F402ED0594B1364EFC65C0263D586AA409D6B795A8C5CF0EE253CCF4B1BB43C1CF68BC1F56411C50AA2DE06385717BC5
30,926,669 UART: [art] PUB.Y = DDEAAA6111B17C803009CF2E233E6F6244A9CA7A0F4D50B697C412067508A1DCB6D253FA36EEB0507FC38882F541A787
30,933,863 UART: [art] SIG.R = 43CE99609BE4FCBEF48C4A7BFF9041AB25268868F059EE0D47B2FDB09DA21F17C34554537E255B1DE709AC138000BD52
30,941,248 UART: [art] SIG.S = AFA3BB49D086C7732797B2C7A80A07F26BBBE7F61188732204010EC1AF2A0738EC5B1E04AF1DC390A0C5E492EE0D8CBE
32,246,147 UART: mbox::rt_entry...
32,247,340 UART: ____ _ _ _ ____ _____
32,249,326 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,251,345 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,253,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,255,224 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,257,146 UART: |_|
32,257,947 UART:
32,371,564 UART: [rt] Runtime listening for mailbox commands...
32,373,569 >>> mbox cmd response data (0 bytes)
34,428,459 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,088,655 >>> mbox cmd response: success
43,124,711 UART:
43,125,020 UART: Running Caliptra FMC ...
43,126,149 UART:
43,126,341 UART: [state] CFI Enabled
43,170,160 UART: [art] Extend RT PCRs Done
43,171,318 UART: [art] Lock RT PCRs Done
43,172,792 UART: [art] Populate DV Done
43,178,516 UART: [fht] FMC Alias Private Key: 7
43,180,103 UART: [art] Derive CDI
43,180,912 UART: [art] Store in in slot 0x4
43,223,405 UART: [art] Derive Key Pair
43,224,445 UART: [art] Store priv key in slot 0x5
46,466,084 UART: [art] Derive Key Pair - Done
46,479,094 UART: [art] Signing Cert with AUTHO
46,480,399 UART: RITY.KEYID = 7
48,759,367 UART: [art] Erasing AUTHORITY.KEYID = 7
48,760,876 UART: [art] PUB.X = B24553EB7EACC1BA33B4AD0DB13A39FB295DBB7A87DAA4977B641B584195946877F96C9C0447A95F51955F6F1D4EBF54
48,768,157 UART: [art] PUB.Y = CF81041F98423740E5C505434875BBB0663EFC1FEDA6807B6768353A7568D5D52E75DDB5FB7BF5A784A1A861E8496DE6
48,775,408 UART: [art] SIG.R = B3B61052DE453BE162FEE04304C9CCB38761CCB512E6ED4D47E4C310AF90407C6B50F4655E8844AB38FE2AF521260F94
48,782,786 UART: [art] SIG.S = D7350DFA436F9F58F66E053DACB4F17A8827811657108EFE9898310133874C708CC81D3C4F33CE35370D01EA78071277
50,087,684 UART: Caliptra RT
50,088,407 UART: [state] CFI Enabled
50,376,685 UART: [rt] RT failed reset flow
50,377,881 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,112 UART:
192,479 UART: Running Caliptra ROM ...
193,610 UART:
193,757 UART: [state] CFI Enabled
263,616 UART: [state] LifecycleState = Unprovisioned
265,405 UART: [state] DebugLocked = No
267,537 UART: [state] WD Timer not started. Device not locked for debugging
270,466 UART: [kat] SHA2-256
449,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,164 UART: [kat] ++
461,616 UART: [kat] sha1
473,215 UART: [kat] SHA2-256
476,292 UART: [kat] SHA2-384
483,415 UART: [kat] SHA2-512-ACC
486,349 UART: [kat] ECC-384
2,947,710 UART: [kat] HMAC-384Kdf
2,971,789 UART: [kat] LMS
3,501,272 UART: [kat] --
3,505,195 UART: [cold-reset] ++
3,506,481 UART: [fht] FHT @ 0x50003400
3,517,596 UART: [idev] ++
3,518,163 UART: [idev] CDI.KEYID = 6
3,519,084 UART: [idev] SUBJECT.KEYID = 7
3,520,261 UART: [idev] UDS.KEYID = 0
3,521,186 ready_for_fw is high
3,521,400 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,620,585 UART: [idev] Erasing UDS.KEYID = 0
6,024,095 UART: [idev] Sha1 KeyId Algorithm
6,046,593 UART: [idev] --
6,051,265 UART: [ldev] ++
6,051,839 UART: [ldev] CDI.KEYID = 6
6,052,732 UART: [ldev] SUBJECT.KEYID = 5
6,053,945 UART: [ldev] AUTHORITY.KEYID = 7
6,055,179 UART: [ldev] FE.KEYID = 1
6,098,208 UART: [ldev] Erasing FE.KEYID = 1
8,598,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,972 UART: [ldev] --
10,391,585 UART: [fwproc] Wait for Commands...
10,393,517 UART: [fwproc] Recv command 0x46574c44
10,395,621 UART: [fwproc] Recv'd Img size: 78704 bytes
13,365,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,432,435 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,501,187 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,694,759 >>> mbox cmd response: success
13,695,246 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,698,397 UART: [afmc] ++
13,699,012 UART: [afmc] CDI.KEYID = 6
13,699,931 UART: [afmc] SUBJECT.KEYID = 7
13,701,094 UART: [afmc] AUTHORITY.KEYID = 5
16,230,238 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,954,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,956,386 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,972,176 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,988,183 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,004,042 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,027,291 UART: [afmc] --
18,030,225 UART: [cold-reset] --
18,033,388 UART: [state] Locking Datavault
18,040,252 UART: [state] Locking PCR0, PCR1 and PCR31
18,041,896 UART: [state] Locking ICCM
18,044,023 UART: [exit] Launching FMC @ 0x40000130
18,052,422 UART:
18,052,655 UART: Running Caliptra FMC ...
18,053,683 UART:
18,053,832 UART: [state] CFI Enabled
18,110,459 UART: [fht] FMC Alias Private Key: 7
19,874,206 UART: [art] Extend RT PCRs Done
19,875,421 UART: [art] Lock RT PCRs Done
19,877,231 UART: [art] Populate DV Done
19,882,480 UART: [fht] FMC Alias Private Key: 7
19,884,175 UART: [art] Derive CDI
19,885,006 UART: [art] Store in in slot 0x4
19,943,532 UART: [art] Derive Key Pair
19,944,535 UART: [art] Store priv key in slot 0x5
22,407,177 UART: [art] Derive Key Pair - Done
22,419,842 UART: [art] Signing Cert with AUTHO
22,421,137 UART: RITY.KEYID = 7
24,132,927 UART: [art] Erasing AUTHORITY.KEYID = 7
24,134,425 UART: [art] PUB.X = 30786A0EBC9D13254054DA7460C957F622E5EC8A69FCB1538368EDAD5D393405376844183B941E955AA13C0685C2728E
24,141,674 UART: [art] PUB.Y = A60850D33EFF5EFF413BBB2515A432F03E1E0C4F7CAE63279EEFA4A16FB188558E3E6D1B9ABE468059AF268D446A7BFD
24,148,972 UART: [art] SIG.R = 2BFE768FE04479D1030AEE6BFF737383A3FFDC4906AAB2322F89C865E7F9E30BC2A5DEAFFF22FF4B1DB78313C25B544C
24,156,364 UART: [art] SIG.S = 35F111FF8A2825B670AA8E0DBE69E98FEFAC3F6791CF41333342E8C91D6DDCD39DC04D3A5B93949DDD9BE705AB7B7FCD
25,135,020 UART: mbox::rt_entry...
25,135,967 UART: ____ _ _ _ ____ _____
25,137,892 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,139,896 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,141,753 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,143,699 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,145,633 UART: |_|
25,146,442 UART:
25,259,689 UART: [rt] Runtime listening for mailbox commands...
25,261,690 >>> mbox cmd response data (0 bytes)
27,330,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,475,120 UART:
27,475,502 UART: Running Caliptra ROM ...
27,476,576 UART:
27,476,735 UART: [state] CFI Enabled
27,544,495 UART: [state] LifecycleState = Unprovisioned
27,546,335 UART: [state] DebugLocked = No
27,548,463 UART: [state] WD Timer not started. Device not locked for debugging
27,552,273 UART: [kat] SHA2-256
27,731,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,742,963 UART: [kat] ++
27,743,423 UART: [kat] sha1
27,754,253 UART: [kat] SHA2-256
27,757,325 UART: [kat] SHA2-384
27,762,552 UART: [kat] SHA2-512-ACC
27,765,488 UART: [kat] ECC-384
30,227,242 UART: [kat] HMAC-384Kdf
30,251,353 UART: [kat] LMS
30,780,796 UART: [kat] --
30,786,735 UART: [update-reset] ++
34,219,081 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,222,499 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,605,810 >>> mbox cmd response: success
34,610,448 UART: [update-reset] Copying MAN_2 To MAN_1
34,629,140 UART: [update-reset Success] --
34,633,390 UART: [state] Locking Datavault
34,635,779 UART: [state] Locking PCR0, PCR1 and PCR31
34,637,475 UART: [state] Locking ICCM
34,639,032 UART: [exit] Launching FMC @ 0x40000130
34,647,488 UART:
34,647,719 UART: Running Caliptra FMC ...
34,649,218 UART:
34,649,389 UART: [state] CFI Enabled
34,739,918 UART: [art] Extend RT PCRs Done
34,741,103 UART: [art] Lock RT PCRs Done
34,742,447 UART: [art] Populate DV Done
34,747,830 UART: [fht] FMC Alias Private Key: 7
34,749,407 UART: [art] Derive CDI
34,750,229 UART: [art] Store in in slot 0x4
34,809,210 UART: [art] Derive Key Pair
34,810,198 UART: [art] Store priv key in slot 0x5
37,273,371 UART: [art] Derive Key Pair - Done
37,286,854 UART: [art] Signing Cert with AUTHO
37,288,153 UART: RITY.KEYID = 7
38,999,183 UART: [art] Erasing AUTHORITY.KEYID = 7
39,000,685 UART: [art] PUB.X = 9AA919D6680754A2554ABA458BD0978BE11108F258082FCAC03CB5C30208830D6D57187D58B45404E424C59435BC35ED
39,007,951 UART: [art] PUB.Y = B715E9F3FA91085C4A9A56E1BEF4E5453FB61895499996A35DE769DAC4AFA6B53C5925B411942E802EEE62D6E6CA0CD0
39,015,198 UART: [art] SIG.R = 764FCD36B94D0ABDF85EE560949BF72DD36A7136C7CC65D6EF86AA6114BF43AB4535E33B9F11D26F6B3F9629271ECBB5
39,022,600 UART: [art] SIG.S = 5360412193C818E910692D54511A5EB0F6B291AA282DC449473A452B2336288F9CD7505E52F5E43D4BD49DFB37FB2023
40,001,789 UART: Caliptra RT
40,002,494 UART: [state] CFI Enabled
40,340,482 UART: [rt] RT failed reset flow
40,341,692 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,384,568 ready_for_fw is high
3,385,164 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,516,871 >>> mbox cmd response: success
13,517,473 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,812,967 UART:
17,813,347 UART: Running Caliptra FMC ...
17,814,546 UART:
17,814,729 UART: [state] CFI Enabled
17,880,235 UART: [fht] FMC Alias Private Key: 7
19,644,937 UART: [art] Extend RT PCRs Done
19,646,129 UART: [art] Lock RT PCRs Done
19,648,039 UART: [art] Populate DV Done
19,653,248 UART: [fht] FMC Alias Private Key: 7
19,654,842 UART: [art] Derive CDI
19,655,657 UART: [art] Store in in slot 0x4
19,712,934 UART: [art] Derive Key Pair
19,713,922 UART: [art] Store priv key in slot 0x5
22,177,840 UART: [art] Derive Key Pair - Done
22,190,678 UART: [art] Signing Cert with AUTHO
22,191,981 UART: RITY.KEYID = 7
23,903,501 UART: [art] Erasing AUTHORITY.KEYID = 7
23,905,004 UART: [art] PUB.X = 1AD806FC124BFF9CBFC92B1782C5B93F2EC516FAF317C906349E024D808350C4F2FDFD09E90BA997C7F291C59458A108
23,912,261 UART: [art] PUB.Y = C9D95AF08070B6B9E5CA912FED93239BE4A8AB5DCC0E49A4D5A93B04608327C0C10F2B85231BA3B4DFFD107652997FAC
23,919,541 UART: [art] SIG.R = F2525972232FD2CFE62661D220F5FAA5F24CF2EB812C1D40441903FDCA5B1DCDD5E24815C3B51D422F194A806BC94161
23,926,952 UART: [art] SIG.S = CD4692B1BC3FF81BB63239B56BABE0E87D833FD4C13F87D143656F321FD6FB5BF3ABE7526B03B96A8F01A96B02CF7CD9
24,905,316 UART: mbox::rt_entry...
24,906,258 UART: ____ _ _ _ ____ _____
24,908,241 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,910,244 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,912,170 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,914,131 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,916,062 UART: |_|
24,916,900 UART:
25,029,742 UART: [rt] Runtime listening for mailbox commands...
25,031,764 >>> mbox cmd response data (0 bytes)
27,085,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,220,681 >>> mbox cmd response: success
34,255,372 UART:
34,255,686 UART: Running Caliptra FMC ...
34,256,723 UART:
34,256,883 UART: [state] CFI Enabled
34,343,687 UART: [art] Extend RT PCRs Done
34,344,906 UART: [art] Lock RT PCRs Done
34,346,314 UART: [art] Populate DV Done
34,351,937 UART: [fht] FMC Alias Private Key: 7
34,353,472 UART: [art] Derive CDI
34,354,282 UART: [art] Store in in slot 0x4
34,413,015 UART: [art] Derive Key Pair
34,414,057 UART: [art] Store priv key in slot 0x5
36,877,125 UART: [art] Derive Key Pair - Done
36,890,391 UART: [art] Signing Cert with AUTHO
36,891,692 UART: RITY.KEYID = 7
38,602,337 UART: [art] Erasing AUTHORITY.KEYID = 7
38,603,843 UART: [art] PUB.X = 34181CC476C4DB33114908D9D13F9D7822022B08F49FA22416907C2E1DFDA22A07DD991654B8CBFDA6E77DCE5CF54494
38,611,138 UART: [art] PUB.Y = 5B28DD85006B6BDFE175FD6B8364D025212702BF85F73BE31EFEC42ED2D4CFF4936E83B05926E20F1A0A08F6B4580808
38,618,363 UART: [art] SIG.R = 132CFF91643D398EF832A8A9724AB2C0B2E28AA5F217276D487B2B7A711F0C8AE48FB99E3C6B9A3DDCF466D695C2DF77
38,625,751 UART: [art] SIG.S = F6285BBD11CDBDABFA1BD4B66807187B4CA3CC0D435DF04FB6805E4169E55FE66CB8E346BF07B93FFC1FBCE9FF127711
39,605,012 UART: Caliptra RT
39,605,703 UART: [state] CFI Enabled
39,939,353 UART: [rt] RT failed reset flow
39,940,554 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,511 UART:
192,877 UART: Running Caliptra ROM ...
194,073 UART:
603,545 UART: [state] CFI Enabled
617,546 UART: [state] LifecycleState = Unprovisioned
619,439 UART: [state] DebugLocked = No
620,677 UART: [state] WD Timer not started. Device not locked for debugging
625,271 UART: [kat] SHA2-256
804,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,943 UART: [kat] ++
816,472 UART: [kat] sha1
827,273 UART: [kat] SHA2-256
830,344 UART: [kat] SHA2-384
836,891 UART: [kat] SHA2-512-ACC
839,892 UART: [kat] ECC-384
3,282,797 UART: [kat] HMAC-384Kdf
3,294,680 UART: [kat] LMS
3,824,172 UART: [kat] --
3,829,086 UART: [cold-reset] ++
3,831,651 UART: [fht] FHT @ 0x50003400
3,842,319 UART: [idev] ++
3,842,893 UART: [idev] CDI.KEYID = 6
3,843,917 UART: [idev] SUBJECT.KEYID = 7
3,845,011 UART: [idev] UDS.KEYID = 0
3,846,051 ready_for_fw is high
3,846,252 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,945,232 UART: [idev] Erasing UDS.KEYID = 0
6,317,326 UART: [idev] Sha1 KeyId Algorithm
6,340,231 UART: [idev] --
6,343,680 UART: [ldev] ++
6,344,244 UART: [ldev] CDI.KEYID = 6
6,345,165 UART: [ldev] SUBJECT.KEYID = 5
6,346,315 UART: [ldev] AUTHORITY.KEYID = 7
6,347,592 UART: [ldev] FE.KEYID = 1
6,360,288 UART: [ldev] Erasing FE.KEYID = 1
8,834,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,952 UART: [ldev] --
10,625,206 UART: [fwproc] Wait for Commands...
10,627,072 UART: [fwproc] Recv command 0x46574c44
10,629,159 UART: [fwproc] Recv'd Img size: 78704 bytes
13,593,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,661,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,730,236 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,924,098 >>> mbox cmd response: success
13,924,577 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,927,558 UART: [afmc] ++
13,928,141 UART: [afmc] CDI.KEYID = 6
13,929,015 UART: [afmc] SUBJECT.KEYID = 7
13,930,228 UART: [afmc] AUTHORITY.KEYID = 5
16,429,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,152,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,154,055 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,169,833 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,185,870 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,201,724 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,225,609 UART: [afmc] --
18,229,092 UART: [cold-reset] --
18,233,603 UART: [state] Locking Datavault
18,239,159 UART: [state] Locking PCR0, PCR1 and PCR31
18,240,831 UART: [state] Locking ICCM
18,243,413 UART: [exit] Launching FMC @ 0x40000130
18,251,809 UART:
18,252,050 UART: Running Caliptra FMC ...
18,253,095 UART:
18,253,241 UART: [state] CFI Enabled
18,261,410 UART: [fht] FMC Alias Private Key: 7
20,017,646 UART: [art] Extend RT PCRs Done
20,018,882 UART: [art] Lock RT PCRs Done
20,020,643 UART: [art] Populate DV Done
20,026,106 UART: [fht] FMC Alias Private Key: 7
20,027,804 UART: [art] Derive CDI
20,028,535 UART: [art] Store in in slot 0x4
20,070,640 UART: [art] Derive Key Pair
20,071,741 UART: [art] Store priv key in slot 0x5
22,498,333 UART: [art] Derive Key Pair - Done
22,511,151 UART: [art] Signing Cert with AUTHO
22,512,450 UART: RITY.KEYID = 7
24,218,171 UART: [art] Erasing AUTHORITY.KEYID = 7
24,219,682 UART: [art] PUB.X = 503FFEB6AF918F97C463F363DCF11644234838B014E02327CF83139308C6C27B168965E3F9136B55C8E9C2C5B3843367
24,226,929 UART: [art] PUB.Y = 37AA9B80DE9E997044192DD25FD41FF276B87264C72FE3417BBD70B5F872B96B51676792AED9821B3EC91356EA14BA00
24,234,121 UART: [art] SIG.R = 890223DBE4212A764F97341F2AE212D847BA5E32B1DA2DC0791DDB5C9B132EDBA639B911511DB1834D7E6FC621DCA9F9
24,241,515 UART: [art] SIG.S = D6C72E1F85CCE7E805FDD351B77691B36D4CE90DC2E35755EAB6B1B9BFEE40E190174324327F53540C8052C38F490A63
25,219,953 UART: mbox::rt_entry...
25,220,921 UART: ____ _ _ _ ____ _____
25,222,908 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,224,909 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,226,832 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,228,751 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,230,682 UART: |_|
25,231,484 UART:
25,344,769 UART: [rt] Runtime listening for mailbox commands...
25,346,782 >>> mbox cmd response data (0 bytes)
27,406,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,550,963 UART:
27,551,335 UART: Running Caliptra ROM ...
27,552,460 UART:
27,552,628 UART: [state] CFI Enabled
27,564,429 UART: [state] LifecycleState = Unprovisioned
27,566,256 UART: [state] DebugLocked = No
27,568,202 UART: [state] WD Timer not started. Device not locked for debugging
27,572,201 UART: [kat] SHA2-256
27,751,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,762,976 UART: [kat] ++
27,763,433 UART: [kat] sha1
27,773,824 UART: [kat] SHA2-256
27,776,836 UART: [kat] SHA2-384
27,782,815 UART: [kat] SHA2-512-ACC
27,785,800 UART: [kat] ECC-384
30,229,508 UART: [kat] HMAC-384Kdf
30,241,736 UART: [kat] LMS
30,771,266 UART: [kat] --
30,775,193 UART: [update-reset] ++
34,197,430 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,200,752 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,584,040 >>> mbox cmd response: success
34,588,623 UART: [update-reset] Copying MAN_2 To MAN_1
34,606,978 UART: [update-reset Success] --
34,610,849 UART: [state] Locking Datavault
34,612,908 UART: [state] Locking PCR0, PCR1 and PCR31
34,614,606 UART: [state] Locking ICCM
34,616,933 UART: [exit] Launching FMC @ 0x40000130
34,625,379 UART:
34,625,621 UART: Running Caliptra FMC ...
34,627,070 UART:
34,627,235 UART: [state] CFI Enabled
34,671,310 UART: [art] Extend RT PCRs Done
34,672,502 UART: [art] Lock RT PCRs Done
34,673,628 UART: [art] Populate DV Done
34,678,975 UART: [fht] FMC Alias Private Key: 7
34,680,578 UART: [art] Derive CDI
34,681,392 UART: [art] Store in in slot 0x4
34,723,967 UART: [art] Derive Key Pair
34,725,014 UART: [art] Store priv key in slot 0x5
37,152,543 UART: [art] Derive Key Pair - Done
37,165,441 UART: [art] Signing Cert with AUTHO
37,166,742 UART: RITY.KEYID = 7
38,872,097 UART: [art] Erasing AUTHORITY.KEYID = 7
38,873,744 UART: [art] PUB.X = F08D377A312D34206F7E18F5AA668C6BC5842225580BDD367535ACCDA91FC738B7D9667086D62D99B227C7B328D7FC86
38,880,849 UART: [art] PUB.Y = 4FFC3A00D05CE1585E0150965B56139A2487A8DD67ADB07A79547700BFF55C29AA5B2CE3A9D941A8DF6FDB75A659360A
38,888,095 UART: [art] SIG.R = 9E0BF5E34EB99838D4C90EBACD411B75C7356D7127A5830B443CD69B66727D789CABCCD46F2634FF33C3DCA589B7AF33
38,895,453 UART: [art] SIG.S = 942D64A718BD7A18BD83450E81CA0FDBD96B536192F8F97B2853AACB72F23C79EC76C71DDF9002295AC7E9E76D4A399F
39,874,623 UART: Caliptra RT
39,875,339 UART: [state] CFI Enabled
40,158,713 UART: [rt] RT failed reset flow
40,160,029 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
3,703,160 ready_for_fw is high
3,703,524 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,707,620 >>> mbox cmd response: success
13,708,332 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,954,994 UART:
17,955,398 UART: Running Caliptra FMC ...
17,956,490 UART:
17,956,654 UART: [state] CFI Enabled
17,964,496 UART: [fht] FMC Alias Private Key: 7
19,720,791 UART: [art] Extend RT PCRs Done
19,722,003 UART: [art] Lock RT PCRs Done
19,723,644 UART: [art] Populate DV Done
19,729,224 UART: [fht] FMC Alias Private Key: 7
19,730,814 UART: [art] Derive CDI
19,731,626 UART: [art] Store in in slot 0x4
19,774,000 UART: [art] Derive Key Pair
19,775,043 UART: [art] Store priv key in slot 0x5
22,201,494 UART: [art] Derive Key Pair - Done
22,214,429 UART: [art] Signing Cert with AUTHO
22,215,728 UART: RITY.KEYID = 7
23,921,363 UART: [art] Erasing AUTHORITY.KEYID = 7
23,922,867 UART: [art] PUB.X = 0F77253D4CE2F5663CEB54C541312D69046C40779656FE52E38C2D63C3B07FECFABD32682B3CD734E322C058A7247074
23,930,110 UART: [art] PUB.Y = 7D3A9F2AF05815EC2A8F44BA9BC481F69EFF2DFE209090CE0627FA32EDB17A7442A344B9B1E47E15BC70EFA38781A2EE
23,937,363 UART: [art] SIG.R = B33392148A290041C089308E752752B81481CCE104DD3FC36315D6429A6A51CD2E97B0209D0516799274108A1D7C518F
23,944,704 UART: [art] SIG.S = C7999F53782E7ECAE59BE517092123F7F72B5C274E4014AEC095553872CEB60919846608D2F6CE2BD8E1A7A7430A7FC2
24,923,126 UART: mbox::rt_entry...
24,924,067 UART: ____ _ _ _ ____ _____
24,925,994 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,927,988 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,929,912 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,931,868 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,933,796 UART: |_|
24,934,595 UART:
25,048,971 UART: [rt] Runtime listening for mailbox commands...
25,050,990 >>> mbox cmd response data (0 bytes)
27,106,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,161,392 >>> mbox cmd response: success
34,194,776 UART:
34,195,072 UART: Running Caliptra FMC ...
34,196,108 UART:
34,196,248 UART: [state] CFI Enabled
34,240,659 UART: [art] Extend RT PCRs Done
34,241,845 UART: [art] Lock RT PCRs Done
34,243,376 UART: [art] Populate DV Done
34,248,562 UART: [fht] FMC Alias Private Key: 7
34,250,147 UART: [art] Derive CDI
34,250,877 UART: [art] Store in in slot 0x4
34,293,839 UART: [art] Derive Key Pair
34,294,833 UART: [art] Store priv key in slot 0x5
36,721,727 UART: [art] Derive Key Pair - Done
36,734,503 UART: [art] Signing Cert with AUTHO
36,735,824 UART: RITY.KEYID = 7
38,441,117 UART: [art] Erasing AUTHORITY.KEYID = 7
38,442,616 UART: [art] PUB.X = 191D614B13D9199221B94E6ADC47A7D4703C6A9016A39D5FE9C13FE0BB35B1F4727B44F6031F19599432ED72EB7BFBAB
38,449,885 UART: [art] PUB.Y = 0DCAD772A6AA272D1943AE12D16C2E97084E40FF0520ADF1A83174424B76ED0CA28B03439DA6C61C4A6FE9CDD545CEE6
38,457,156 UART: [art] SIG.R = D3EF607B72D861064A7D4E802960E76C29A9FD1671500CD92E39C1673677CF316011DC85240526972BD794DDBE572405
38,464,476 UART: [art] SIG.S = E59755A458C57FF73DF1D911D0220335D9D6855A0FEB9668EB75B6443D5138ACCE4155B074F1136B83CFF1F97C592052
39,443,109 UART: Caliptra RT
39,443,796 UART: [state] CFI Enabled
39,730,001 UART: [rt] RT failed reset flow
39,731,184 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,437,613 ready_for_fw is high
3,438,164 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,968,952 >>> mbox cmd response: success
13,969,564 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
18,257,545 UART:
18,257,946 UART: Running Caliptra FMC ...
18,259,046 UART:
18,259,201 UART: [state] CFI Enabled
18,326,248 UART: [fht] FMC Alias Private Key: 7
20,090,687 UART: [art] Extend RT PCRs Done
20,091,937 UART: [art] Lock RT PCRs Done
20,093,598 UART: [art] Populate DV Done
20,098,966 UART: [fht] FMC Alias Private Key: 7
20,100,510 UART: [art] Derive CDI
20,101,246 UART: [art] Store in in slot 0x4
20,159,238 UART: [art] Derive Key Pair
20,160,273 UART: [art] Store priv key in slot 0x5
22,623,178 UART: [art] Derive Key Pair - Done
22,636,010 UART: [art] Signing Cert with AUTHO
22,637,313 UART: RITY.KEYID = 7
24,348,716 UART: [art] Erasing AUTHORITY.KEYID = 7
24,350,224 UART: [art] PUB.X = D4909DB8191C2DED0DD67532516B18D6F635A438BBD3A31C4A41E27F375C30E9D0904CC6590A045C660D08D16A3525AC
24,357,466 UART: [art] PUB.Y = C55B90989D67A679B4A5214A8014AB3F762BEADDCF31CCFA9C3BAB7E0195DF7C09D52187B9D82CB1BEED6E29D29A8EAC
24,364,754 UART: [art] SIG.R = A7CD3CC871FA06021C9E5836FC9A0DF41342734B1BB4780A3679C57D4C8D4DEC8FEC222B9D48C796C6628B000C5EC890
24,372,140 UART: [art] SIG.S = CA7D4A4D8FE5905230CD04E4A62775323A9D03055228E5CDE7CAAA8EB3974C8DADC55C9A5FCF825243BB6D3B77E1A0F1
25,350,708 UART: mbox::rt_entry...
25,351,680 UART: ____ _ _ _ ____ _____
25,353,615 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,355,625 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,357,480 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,359,637 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,361,501 UART: |_|
25,362,386 UART:
25,475,302 UART: [rt] Runtime listening for mailbox commands...
25,477,330 >>> mbox cmd response data (0 bytes)
27,547,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,373,402 >>> mbox cmd response: success
35,409,473 UART:
35,409,790 UART: Running Caliptra FMC ...
35,410,915 UART:
35,411,085 UART: [state] CFI Enabled
35,515,972 UART: [art] Extend RT PCRs Done
35,517,156 UART: [art] Lock RT PCRs Done
35,518,581 UART: [art] Populate DV Done
35,524,064 UART: [fht] FMC Alias Private Key: 7
35,525,778 UART: [art] Derive CDI
35,526,608 UART: [art] Store in in slot 0x4
35,584,738 UART: [art] Derive Key Pair
35,585,739 UART: [art] Store priv key in slot 0x5
38,049,066 UART: [art] Derive Key Pair - Done
38,061,956 UART: [art] Signing Cert with AUTHO
38,063,268 UART: RITY.KEYID = 7
39,775,143 UART: [art] Erasing AUTHORITY.KEYID = 7
39,776,627 UART: [art] PUB.X = 0DC5674B046122497BFCCC127EA57E7CE6ECCFB0890BC654CE10378644F5E571AB135956E6F4BA5F7357B8FE20930D3B
39,783,935 UART: [art] PUB.Y = 372FC27B11C1777A3EE470E4C3EE80D135CFEDB0AA61D94DD0278FDF7F5EB3D50251C77E2EDCD8111B22C13A7692A282
39,791,218 UART: [art] SIG.R = 8712ECD66193EBB2EA6F9841AADABBCFD988BCB32A7153F20F327BBF095C67DCD0A1D8CBFB2059DFAF214FB58ACA8F2E
39,798,669 UART: [art] SIG.S = 8F90F1788C127947C9DFD62ADCCF86311A296F32E5A493F7918808FB2AC5F11D7053A71F74812C2B3B90FA771B38A755
40,777,466 UART: Caliptra RT
40,778,177 UART: [state] CFI Enabled
41,113,471 UART: [rt] RT failed reset flow
41,114,662 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,756,279 ready_for_fw is high
3,756,692 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,203,142 >>> mbox cmd response: success
14,203,687 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
18,450,913 UART:
18,451,285 UART: Running Caliptra FMC ...
18,452,465 UART:
18,452,624 UART: [state] CFI Enabled
18,460,351 UART: [fht] FMC Alias Private Key: 7
20,217,043 UART: [art] Extend RT PCRs Done
20,218,265 UART: [art] Lock RT PCRs Done
20,220,273 UART: [art] Populate DV Done
20,225,577 UART: [fht] FMC Alias Private Key: 7
20,227,279 UART: [art] Derive CDI
20,228,090 UART: [art] Store in in slot 0x4
20,270,412 UART: [art] Derive Key Pair
20,271,457 UART: [art] Store priv key in slot 0x5
22,698,209 UART: [art] Derive Key Pair - Done
22,711,096 UART: [art] Signing Cert with AUTHO
22,712,396 UART: RITY.KEYID = 7
24,417,800 UART: [art] Erasing AUTHORITY.KEYID = 7
24,419,304 UART: [art] PUB.X = B94C8A7DFAE01253226A7312F305650073D7B1E94A839FC85F471E0293CAB6331C524A973E55FD4B232826666ADE6C6F
24,426,550 UART: [art] PUB.Y = C085E0560439ED09192A00E597673391D3F34B3BDC68BD53E3C4A20B3ABE869FC814AC8EC2F5DA1124B1982BE61E4CE3
24,433,775 UART: [art] SIG.R = 318F18804637B9727C829C3940B98A613587CD3D288140F52EB2711E8E811F00C34AFDF109C0A15B8BDC4FE18A8F4E78
24,441,175 UART: [art] SIG.S = 2595395D07799F685BC78E89F0F6805231FE39A70964F7C6CD1D64D19F3413AB16F7936DED32A633521E6C93B45B2460
25,419,935 UART: mbox::rt_entry...
25,420,888 UART: ____ _ _ _ ____ _____
25,422,861 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,424,858 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,426,791 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,428,743 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,430,687 UART: |_|
25,431,518 UART:
25,545,180 UART: [rt] Runtime listening for mailbox commands...
25,547,181 >>> mbox cmd response data (0 bytes)
27,602,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,339,759 >>> mbox cmd response: success
35,374,616 UART:
35,374,944 UART: Running Caliptra FMC ...
35,376,063 UART:
35,376,231 UART: [state] CFI Enabled
35,420,783 UART: [art] Extend RT PCRs Done
35,421,917 UART: [art] Lock RT PCRs Done
35,423,330 UART: [art] Populate DV Done
35,428,900 UART: [fht] FMC Alias Private Key: 7
35,430,443 UART: [art] Derive CDI
35,431,249 UART: [art] Store in in slot 0x4
35,473,956 UART: [art] Derive Key Pair
35,474,994 UART: [art] Store priv key in slot 0x5
37,902,417 UART: [art] Derive Key Pair - Done
37,915,642 UART: [art] Signing Cert with AUTHO
37,916,942 UART: RITY.KEYID = 7
39,622,715 UART: [art] Erasing AUTHORITY.KEYID = 7
39,624,219 UART: [art] PUB.X = B1589742EBB0F8FDB5E22CCF8E3650098FD852B3B52576D007C8613F7DB7654B6CB7B68A9958D5DD57019F2B2D67CEF8
39,631,488 UART: [art] PUB.Y = 47859489CD30FCC140D12CD11F29D9004FB98C3310CCF978B699093E7DCDD182E74A05F8D5CA1CA42C698F3D80FBA2E9
39,638,745 UART: [art] SIG.R = 6241FA2DC767B8AB104F9E68B5C427451D816F4614D7578DA134AE6A7381DE0E1FD423DE5206B6ECB31970ED60E47908
39,646,116 UART: [art] SIG.S = 76E3B2B67531D537AF1F99B2AFFF8274E9FAC60DAFA388E2835B9CC5CE14B7140EBBC68EA9DACCCB0016D1401D4D345C
40,625,327 UART: Caliptra RT
40,626,022 UART: [state] CFI Enabled
40,916,201 UART: [rt] RT failed reset flow
40,917,394 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,465 UART: [kat] SHA2-256
892,403 UART: [kat] SHA2-384
894,926 UART: [kat] SHA2-512-ACC
896,827 UART: [kat] ECC-384
902,276 UART: [kat] HMAC-384Kdf
906,922 UART: [kat] LMS
1,475,118 UART: [kat] --
1,475,763 UART: [cold-reset] ++
1,476,335 UART: [fht] Storing FHT @ 0x50003400
1,479,118 UART: [idev] ++
1,479,286 UART: [idev] CDI.KEYID = 6
1,479,646 UART: [idev] SUBJECT.KEYID = 7
1,480,070 UART: [idev] UDS.KEYID = 0
1,480,415 ready_for_fw is high
1,480,415 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,076 UART: [idev] Erasing UDS.KEYID = 0
1,504,364 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,146 UART: [idev] --
1,514,331 UART: [ldev] ++
1,514,499 UART: [ldev] CDI.KEYID = 6
1,514,862 UART: [ldev] SUBJECT.KEYID = 5
1,515,288 UART: [ldev] AUTHORITY.KEYID = 7
1,515,751 UART: [ldev] FE.KEYID = 1
1,521,059 UART: [ldev] Erasing FE.KEYID = 1
1,546,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,744 UART: [ldev] --
1,586,199 UART: [fwproc] Waiting for Commands...
1,587,040 UART: [fwproc] Received command 0x46574c44
1,587,831 UART: [fwproc] Received Image of size 78704 bytes
2,478,039 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,551 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,903 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,246 >>> mbox cmd response: success
2,616,246 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,617,372 UART: [afmc] ++
2,617,540 UART: [afmc] CDI.KEYID = 6
2,617,902 UART: [afmc] SUBJECT.KEYID = 7
2,618,327 UART: [afmc] AUTHORITY.KEYID = 5
2,653,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,958 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,351 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,041 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,144 UART: [afmc] --
2,697,082 UART: [cold-reset] --
2,697,904 UART: [state] Locking Datavault
2,698,985 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,589 UART: [state] Locking ICCM
2,700,021 UART: [exit] Launching FMC @ 0x40000130
2,705,350 UART:
2,705,366 UART: Running Caliptra FMC ...
2,705,774 UART:
2,705,828 UART: [state] CFI Enabled
2,716,091 UART: [fht] FMC Alias Private Key: 7
2,823,838 UART: [art] Extend RT PCRs Done
2,824,266 UART: [art] Lock RT PCRs Done
2,825,846 UART: [art] Populate DV Done
2,834,167 UART: [fht] FMC Alias Private Key: 7
2,835,321 UART: [art] Derive CDI
2,835,601 UART: [art] Store in in slot 0x4
2,921,390 UART: [art] Derive Key Pair
2,921,750 UART: [art] Store priv key in slot 0x5
2,935,158 UART: [art] Derive Key Pair - Done
2,949,688 UART: [art] Signing Cert with AUTHO
2,950,168 UART: RITY.KEYID = 7
2,965,088 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,853 UART: [art] PUB.X = A97123C667864B465306EE65FA03D0B3010D79AE62091E312C06859B1725C11014FFD9ECE1F816B9C09218014F6B3D56
2,972,596 UART: [art] PUB.Y = 3FD9A3CCC0629BB2594BB2622F2DEBCFAFA17951B705CEB59A4625E5408AB8A648D9AF592FE52E41696015E137E553F8
2,979,555 UART: [art] SIG.R = 205137BE6FE2DD98D89E14F2AF2EA73CE010598959BD31AC0C24F6D39F12FA7DCDF9FFB1B7AF34B144205E8782EC7A1C
2,986,342 UART: [art] SIG.S = E2F7BC95A2DB9FC73EEE05C695CEE1DFAC3FE5631FE11A5844AEA037FFAC210D5B13206FD7319A1C52326970872A3CDB
3,010,383 UART: mbox::rt_entry...
3,010,755 UART: ____ _ _ _ ____ _____
3,011,539 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,339 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,107 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,875 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,643 UART: |_|
3,014,955 UART:
3,122,815 UART: [rt] Runtime listening for mailbox commands...
3,123,749 >>> mbox cmd response data (0 bytes)
3,123,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,123,864 UART:
3,123,880 UART: Running Caliptra ROM ...
3,124,288 UART:
3,124,342 UART: [state] CFI Enabled
3,126,988 UART: [state] LifecycleState = Unprovisioned
3,127,643 UART: [state] DebugLocked = No
3,128,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,816 UART: [kat] SHA2-256
3,923,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,862 UART: [kat] ++
3,928,014 UART: [kat] sha1
3,932,358 UART: [kat] SHA2-256
3,934,296 UART: [kat] SHA2-384
3,936,849 UART: [kat] SHA2-512-ACC
3,938,749 UART: [kat] ECC-384
3,944,234 UART: [kat] HMAC-384Kdf
3,948,882 UART: [kat] LMS
4,517,078 UART: [kat] --
4,518,123 UART: [update-reset] ++
5,853,982 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,855,218 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,005,268 >>> mbox cmd response: success
6,005,399 UART: [update-reset] Copying MAN_2 To MAN_1
6,013,413 UART: [update-reset Success] --
6,014,144 UART: [state] Locking Datavault
6,015,038 UART: [state] Locking PCR0, PCR1 and PCR31
6,015,642 UART: [state] Locking ICCM
6,016,228 UART: [exit] Launching FMC @ 0x40000130
6,021,557 UART:
6,021,573 UART: Running Caliptra FMC ...
6,021,981 UART:
6,022,035 UART: [state] CFI Enabled
6,111,538 UART: [art] Extend RT PCRs Done
6,111,966 UART: [art] Lock RT PCRs Done
6,113,135 UART: [art] Populate DV Done
6,121,364 UART: [fht] FMC Alias Private Key: 7
6,122,324 UART: [art] Derive CDI
6,122,604 UART: [art] Store in in slot 0x4
6,208,569 UART: [art] Derive Key Pair
6,208,929 UART: [art] Store priv key in slot 0x5
6,221,815 UART: [art] Derive Key Pair - Done
6,236,683 UART: [art] Signing Cert with AUTHO
6,237,163 UART: RITY.KEYID = 7
6,252,253 UART: [art] Erasing AUTHORITY.KEYID = 7
6,253,018 UART: [art] PUB.X = AA12D13530CBD2B393388D8BD672A0AE1A1B45ADDE53B6FC345E33FB463D3BBE7EA8322FB35E8736BED8E0E7EFDD023A
6,259,811 UART: [art] PUB.Y = 7AC335AD8B871D5BBDABC1281D70128BAF29530E6F0967DFB54BF7F8A700CB43F4C500026E4EEA3D30A73EA516CB3FFF
6,266,730 UART: [art] SIG.R = 092467A623A2A983766F8FE080905F90B514FE4D66AB3BAAAB4E93D2DE0626753A59BA2FE591C3151A4A91F45DCAC11A
6,273,504 UART: [art] SIG.S = 6B381CC1A7ADF460C3BC34FA0C8BCD8815E7B1CDCEC47742462085EE8CD7746D71DD979E537F77C2686550E40B80B4F5
6,297,257 UART: Caliptra RT
6,297,510 UART: [state] CFI Enabled
6,581,473 UART: [rt] RT failed reset flow
6,581,904 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,109 ready_for_fw is high
1,363,109 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,830 >>> mbox cmd response: success
2,465,830 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,527,796 UART:
2,527,812 UART: Running Caliptra FMC ...
2,528,220 UART:
2,528,274 UART: [state] CFI Enabled
2,538,957 UART: [fht] FMC Alias Private Key: 7
2,646,692 UART: [art] Extend RT PCRs Done
2,647,120 UART: [art] Lock RT PCRs Done
2,648,892 UART: [art] Populate DV Done
2,656,921 UART: [fht] FMC Alias Private Key: 7
2,657,873 UART: [art] Derive CDI
2,658,153 UART: [art] Store in in slot 0x4
2,743,574 UART: [art] Derive Key Pair
2,743,934 UART: [art] Store priv key in slot 0x5
2,756,742 UART: [art] Derive Key Pair - Done
2,771,631 UART: [art] Signing Cert with AUTHO
2,772,111 UART: RITY.KEYID = 7
2,787,535 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,300 UART: [art] PUB.X = 7B6C783F7E1145335D6DFAE196E4F13D5741B6C2C2BD74529FDA4F5960B4607F5675A9298FEE9708ABEF750AEB73F9D5
2,795,074 UART: [art] PUB.Y = 0F79AE02E5DA1C3FA6FAAF5F85D48536825296BF19BC9D84610CE34EBDBD4627100CBCD7AE839BBDB421BC1E49B8B559
2,802,034 UART: [art] SIG.R = 873E148CC8286D9C325CCC3F95FD020D17E7A643F58E7F4F9135C6A08E0CF0EBDBCB0974E46C6141875CB35862665CC0
2,808,800 UART: [art] SIG.S = A6EB9F3FD6E36A2BE723824AE96D69F36A793652A07258EAA79019C554ECBB6E481F996DE23538BF294FA22B9C6A079D
2,832,462 UART: mbox::rt_entry...
2,832,834 UART: ____ _ _ _ ____ _____
2,833,618 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,418 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,186 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,954 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,722 UART: |_|
2,837,034 UART:
2,944,235 UART: [rt] Runtime listening for mailbox commands...
2,945,169 >>> mbox cmd response data (0 bytes)
2,945,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,708,460 >>> mbox cmd response: success
5,721,639 UART:
5,721,655 UART: Running Caliptra FMC ...
5,722,063 UART:
5,722,117 UART: [state] CFI Enabled
5,811,274 UART: [art] Extend RT PCRs Done
5,811,702 UART: [art] Lock RT PCRs Done
5,812,881 UART: [art] Populate DV Done
5,821,410 UART: [fht] FMC Alias Private Key: 7
5,822,558 UART: [art] Derive CDI
5,822,838 UART: [art] Store in in slot 0x4
5,908,545 UART: [art] Derive Key Pair
5,908,905 UART: [art] Store priv key in slot 0x5
5,921,515 UART: [art] Derive Key Pair - Done
5,936,315 UART: [art] Signing Cert with AUTHO
5,936,795 UART: RITY.KEYID = 7
5,952,043 UART: [art] Erasing AUTHORITY.KEYID = 7
5,952,808 UART: [art] PUB.X = 2AE72B7CA4D908DFFA05B426F4D5A1169573B1452BA5BC9AEA9B8880FF7C91DB432D84E130FC1E1741C7911FDB245A24
5,959,586 UART: [art] PUB.Y = A6CD8145B537916E5EB58122DFC42A30DAA47E227D9976572C06A4B0FF27945B37CEFF9D0DDDBF5A0A6D5E72BBE229B7
5,966,545 UART: [art] SIG.R = D7BFAE1AC3D1623A18098D90D405BB9D8CECD07CE2FA2387B975BD44A38369B1E219E676370D42F5B8C3915907E3ADDD
5,973,317 UART: [art] SIG.S = 488B6E5FFDD6383CF5AF7DBC4620CDA72F069644449ED97A9560F7C6789CED01B4FD51D277A6C044E0172443A4562D26
5,996,772 UART: Caliptra RT
5,997,025 UART: [state] CFI Enabled
6,279,635 UART: [rt] RT failed reset flow
6,280,066 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,090 UART: [kat] SHA2-256
882,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,136 UART: [kat] ++
886,288 UART: [kat] sha1
890,500 UART: [kat] SHA2-256
892,438 UART: [kat] SHA2-384
895,109 UART: [kat] SHA2-512-ACC
897,010 UART: [kat] ECC-384
902,591 UART: [kat] HMAC-384Kdf
907,171 UART: [kat] LMS
1,475,367 UART: [kat] --
1,476,434 UART: [cold-reset] ++
1,476,862 UART: [fht] Storing FHT @ 0x50003400
1,479,697 UART: [idev] ++
1,479,865 UART: [idev] CDI.KEYID = 6
1,480,225 UART: [idev] SUBJECT.KEYID = 7
1,480,649 UART: [idev] UDS.KEYID = 0
1,480,994 ready_for_fw is high
1,480,994 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,929 UART: [idev] Erasing UDS.KEYID = 0
1,505,193 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,785 UART: [idev] --
1,514,884 UART: [ldev] ++
1,515,052 UART: [ldev] CDI.KEYID = 6
1,515,415 UART: [ldev] SUBJECT.KEYID = 5
1,515,841 UART: [ldev] AUTHORITY.KEYID = 7
1,516,304 UART: [ldev] FE.KEYID = 1
1,521,696 UART: [ldev] Erasing FE.KEYID = 1
1,546,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,489 UART: [ldev] --
1,585,892 UART: [fwproc] Waiting for Commands...
1,586,683 UART: [fwproc] Received command 0x46574c44
1,587,474 UART: [fwproc] Received Image of size 78704 bytes
2,477,734 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,216 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,568 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,045 >>> mbox cmd response: success
2,617,045 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,618,143 UART: [afmc] ++
2,618,311 UART: [afmc] CDI.KEYID = 6
2,618,673 UART: [afmc] SUBJECT.KEYID = 7
2,619,098 UART: [afmc] AUTHORITY.KEYID = 5
2,653,817 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,825 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,218 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,908 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,001 UART: [afmc] --
2,697,113 UART: [cold-reset] --
2,697,961 UART: [state] Locking Datavault
2,699,138 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,742 UART: [state] Locking ICCM
2,700,388 UART: [exit] Launching FMC @ 0x40000130
2,705,717 UART:
2,705,733 UART: Running Caliptra FMC ...
2,706,141 UART:
2,706,284 UART: [state] CFI Enabled
2,716,683 UART: [fht] FMC Alias Private Key: 7
2,824,424 UART: [art] Extend RT PCRs Done
2,824,852 UART: [art] Lock RT PCRs Done
2,826,512 UART: [art] Populate DV Done
2,835,015 UART: [fht] FMC Alias Private Key: 7
2,836,061 UART: [art] Derive CDI
2,836,341 UART: [art] Store in in slot 0x4
2,922,186 UART: [art] Derive Key Pair
2,922,546 UART: [art] Store priv key in slot 0x5
2,935,530 UART: [art] Derive Key Pair - Done
2,950,375 UART: [art] Signing Cert with AUTHO
2,950,855 UART: RITY.KEYID = 7
2,966,319 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,084 UART: [art] PUB.X = 9E1C146A4EB3DE94243C95BC9637167FB6C70C3786658AFB04DACA3D569659CD15ADDF8583F8227BC10B6350DE15E0FC
2,973,857 UART: [art] PUB.Y = 8D8CE2E8515090FE9C8F13427F6221107D6E9757D0B04584E90BABD11D173960AD23D42D99EC6309B57678886F6C128A
2,980,797 UART: [art] SIG.R = A0911F13EF4C65D802BD05488BD00551770D7749C86B63201C4A8D4D8685044C5B7F39CEE32C0275D16DC14A71D642F4
2,987,547 UART: [art] SIG.S = 7191AF84CF939C1FAB3CDB5A895BB82A32A6186A5C0BDC3E77D256C30C391514C2B50634BEAD8FF49D919392C7E685CC
3,011,365 UART: mbox::rt_entry...
3,011,737 UART: ____ _ _ _ ____ _____
3,012,521 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,321 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,089 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,857 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,625 UART: |_|
3,015,937 UART:
3,123,081 UART: [rt] Runtime listening for mailbox commands...
3,124,015 >>> mbox cmd response data (0 bytes)
3,124,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,124,130 UART:
3,124,146 UART: Running Caliptra ROM ...
3,124,554 UART:
3,124,695 UART: [state] CFI Enabled
3,127,973 UART: [state] LifecycleState = Unprovisioned
3,128,628 UART: [state] DebugLocked = No
3,129,246 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,130,731 UART: [kat] SHA2-256
3,924,662 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,928,777 UART: [kat] ++
3,928,929 UART: [kat] sha1
3,933,079 UART: [kat] SHA2-256
3,935,017 UART: [kat] SHA2-384
3,937,946 UART: [kat] SHA2-512-ACC
3,939,846 UART: [kat] ECC-384
3,945,575 UART: [kat] HMAC-384Kdf
3,950,321 UART: [kat] LMS
4,518,517 UART: [kat] --
4,519,456 UART: [update-reset] ++
5,855,271 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,856,365 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,006,415 >>> mbox cmd response: success
6,006,652 UART: [update-reset] Copying MAN_2 To MAN_1
6,014,666 UART: [update-reset Success] --
6,015,731 UART: [state] Locking Datavault
6,016,563 UART: [state] Locking PCR0, PCR1 and PCR31
6,017,167 UART: [state] Locking ICCM
6,017,645 UART: [exit] Launching FMC @ 0x40000130
6,022,974 UART:
6,022,990 UART: Running Caliptra FMC ...
6,023,398 UART:
6,023,541 UART: [state] CFI Enabled
6,112,908 UART: [art] Extend RT PCRs Done
6,113,336 UART: [art] Lock RT PCRs Done
6,114,669 UART: [art] Populate DV Done
6,122,770 UART: [fht] FMC Alias Private Key: 7
6,123,950 UART: [art] Derive CDI
6,124,230 UART: [art] Store in in slot 0x4
6,209,969 UART: [art] Derive Key Pair
6,210,329 UART: [art] Store priv key in slot 0x5
6,223,937 UART: [art] Derive Key Pair - Done
6,239,086 UART: [art] Signing Cert with AUTHO
6,239,566 UART: RITY.KEYID = 7
6,255,154 UART: [art] Erasing AUTHORITY.KEYID = 7
6,255,919 UART: [art] PUB.X = 8D1572F7EB6B36006BD78F84771F11DAF71E8040C4371BA05E2EBD55E4130FFD6FBE8418E5E1C0BA7F73EE2F212AFA97
6,262,680 UART: [art] PUB.Y = D0F45B232CD08334B21C0722678B405FF327A21B5B4ED8B6796DF77A838A1E5EC875F181073F152A4D96A22BB23CAAA8
6,269,630 UART: [art] SIG.R = B459FA6E016AE421C802544FD1AF8B14D2500A7658A55771FF7FFD1BF2477DE5A5BFCF60BF569E5CC6D7AF286B0F1195
6,276,404 UART: [art] SIG.S = FB08F25C888BDAA63B5ED0D7E35547108D0AE1A805868256DD03EEF5ADE818D11545845DA9854512C3E2521FAA826213
6,300,665 UART: Caliptra RT
6,301,010 UART: [state] CFI Enabled
6,583,273 UART: [rt] RT failed reset flow
6,583,704 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,726 ready_for_fw is high
1,362,726 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,355 >>> mbox cmd response: success
2,467,355 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,529,739 UART:
2,529,755 UART: Running Caliptra FMC ...
2,530,163 UART:
2,530,306 UART: [state] CFI Enabled
2,540,933 UART: [fht] FMC Alias Private Key: 7
2,648,578 UART: [art] Extend RT PCRs Done
2,649,006 UART: [art] Lock RT PCRs Done
2,650,664 UART: [art] Populate DV Done
2,658,873 UART: [fht] FMC Alias Private Key: 7
2,659,875 UART: [art] Derive CDI
2,660,155 UART: [art] Store in in slot 0x4
2,745,568 UART: [art] Derive Key Pair
2,745,928 UART: [art] Store priv key in slot 0x5
2,759,494 UART: [art] Derive Key Pair - Done
2,774,259 UART: [art] Signing Cert with AUTHO
2,774,739 UART: RITY.KEYID = 7
2,789,757 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,522 UART: [art] PUB.X = DB7506C4A2F2024866A230EC5D10228E8C7850273E6B299D47ACD1FFA16BE07A41B50CA31327EACD81E01190942E3FDA
2,797,291 UART: [art] PUB.Y = CC52E3BF7E0A81B235FE016F931EC39796ECEBEE3BF498A7D5B1D093493E3D34AD5F8FEB173DDD3819A7B7937E8F884C
2,804,255 UART: [art] SIG.R = 686114091B143593EE3DEA8DBB4CB53E985CD6AE005C9828AF80CB8B47F7E63B8EE99C513D8468B1EF1BD08B51B02F39
2,811,012 UART: [art] SIG.S = ADBFF055CE5C1B93BB1444C6799557C351D64152B1135412084C52AACF0AAB81D13FD0FA34A7A5E1812CA4EAA1B6AE24
2,834,675 UART: mbox::rt_entry...
2,835,047 UART: ____ _ _ _ ____ _____
2,835,831 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,631 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,399 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,167 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,935 UART: |_|
2,839,247 UART:
2,946,399 UART: [rt] Runtime listening for mailbox commands...
2,947,333 >>> mbox cmd response data (0 bytes)
2,947,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,710,675 >>> mbox cmd response: success
5,723,806 UART:
5,723,822 UART: Running Caliptra FMC ...
5,724,230 UART:
5,724,373 UART: [state] CFI Enabled
5,813,246 UART: [art] Extend RT PCRs Done
5,813,674 UART: [art] Lock RT PCRs Done
5,814,927 UART: [art] Populate DV Done
5,823,026 UART: [fht] FMC Alias Private Key: 7
5,824,112 UART: [art] Derive CDI
5,824,392 UART: [art] Store in in slot 0x4
5,910,069 UART: [art] Derive Key Pair
5,910,429 UART: [art] Store priv key in slot 0x5
5,924,417 UART: [art] Derive Key Pair - Done
5,939,074 UART: [art] Signing Cert with AUTHO
5,939,554 UART: RITY.KEYID = 7
5,954,696 UART: [art] Erasing AUTHORITY.KEYID = 7
5,955,461 UART: [art] PUB.X = A7FE455EDD3D360FAB2ED397675965B9C0C614F832C42FE548230383A9C68445846974085B05FA9F46CA3E24A608E4A4
5,962,216 UART: [art] PUB.Y = 4E2C78B1ACA1575A8532DD2531DEA1B0F107BA3A9C36A48C9194BAEE89A40A739A59073A8ADC70FF315886AC3FA56C2D
5,969,173 UART: [art] SIG.R = 99B9683EFCD8CD83FCD851D5E9C7E1780E06D18891C10E90F31091297153F6824DF4DA1216012734AA5C1FB0E33F7D08
5,975,930 UART: [art] SIG.S = 09C98B6D3D3C5EE2CD633466479E3861B149D55966BC16E072D08F3C7035729DC9CC92AAF1F4CD7B076F43BCE06F28F1
5,999,445 UART: Caliptra RT
5,999,790 UART: [state] CFI Enabled
6,282,486 UART: [rt] RT failed reset flow
6,282,917 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
893,648 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,773 UART: [kat] ++
897,925 UART: [kat] sha1
902,237 UART: [kat] SHA2-256
904,177 UART: [kat] SHA2-384
906,796 UART: [kat] SHA2-512-ACC
908,697 UART: [kat] ECC-384
919,088 UART: [kat] HMAC-384Kdf
923,624 UART: [kat] LMS
1,171,952 UART: [kat] --
1,172,915 UART: [cold-reset] ++
1,173,325 UART: [fht] FHT @ 0x50003400
1,175,962 UART: [idev] ++
1,176,130 UART: [idev] CDI.KEYID = 6
1,176,490 UART: [idev] SUBJECT.KEYID = 7
1,176,914 UART: [idev] UDS.KEYID = 0
1,177,259 ready_for_fw is high
1,177,259 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,908 UART: [idev] Erasing UDS.KEYID = 0
1,201,813 UART: [idev] Sha1 KeyId Algorithm
1,210,345 UART: [idev] --
1,211,281 UART: [ldev] ++
1,211,449 UART: [ldev] CDI.KEYID = 6
1,211,812 UART: [ldev] SUBJECT.KEYID = 5
1,212,238 UART: [ldev] AUTHORITY.KEYID = 7
1,212,701 UART: [ldev] FE.KEYID = 1
1,217,653 UART: [ldev] Erasing FE.KEYID = 1
1,244,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,053 UART: [ldev] --
1,283,514 UART: [fwproc] Wait for Commands...
1,284,148 UART: [fwproc] Recv command 0x46574c44
1,284,876 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,702 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,015 >>> mbox cmd response: success
2,313,015 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,314,101 UART: [afmc] ++
2,314,269 UART: [afmc] CDI.KEYID = 6
2,314,631 UART: [afmc] SUBJECT.KEYID = 7
2,315,056 UART: [afmc] AUTHORITY.KEYID = 5
2,351,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,856 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,460 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,330 UART: [afmc] --
2,394,394 UART: [cold-reset] --
2,395,186 UART: [state] Locking Datavault
2,396,371 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,975 UART: [state] Locking ICCM
2,397,443 UART: [exit] Launching FMC @ 0x40000130
2,402,772 UART:
2,402,788 UART: Running Caliptra FMC ...
2,403,196 UART:
2,403,250 UART: [state] CFI Enabled
2,413,895 UART: [fht] FMC Alias Private Key: 7
2,522,222 UART: [art] Extend RT PCRs Done
2,522,650 UART: [art] Lock RT PCRs Done
2,524,244 UART: [art] Populate DV Done
2,532,293 UART: [fht] FMC Alias Private Key: 7
2,533,301 UART: [art] Derive CDI
2,533,581 UART: [art] Store in in slot 0x4
2,618,834 UART: [art] Derive Key Pair
2,619,194 UART: [art] Store priv key in slot 0x5
2,632,330 UART: [art] Derive Key Pair - Done
2,647,075 UART: [art] Signing Cert with AUTHO
2,647,555 UART: RITY.KEYID = 7
2,662,569 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,334 UART: [art] PUB.X = EC2FB6FEB2D8355157A53A86264D1BCEA610B72034DE8EFB0105C6445EF299D2108E5451F2A10D350B26CCAC48876189
2,670,098 UART: [art] PUB.Y = 63D8A75A29C3026C3E22DDBF45E6D971CF727FFD9F62C612A0D792AD175306513553913326593135F3FA3CE6F8963210
2,677,038 UART: [art] SIG.R = 4688D42E4AC017F41F40FC62296B5F276DA56CFAFDE032A0FC97A2D75DFD4237981D7555DB1B7AE0997E25E10698719F
2,683,813 UART: [art] SIG.S = D996B907C0B6ACC3806A181B860F4401E73DAC8437B37F3930118B1DD8B0DC433DAE668BB599BDBAC4FCD1692C80FBB9
2,707,597 UART: mbox::rt_entry...
2,707,969 UART: ____ _ _ _ ____ _____
2,708,753 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,553 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,321 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,089 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,857 UART: |_|
2,712,169 UART:
2,819,099 UART: [rt] Runtime listening for mailbox commands...
2,820,033 >>> mbox cmd response data (0 bytes)
2,820,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,820,145 UART:
2,820,161 UART: Running Caliptra ROM ...
2,820,569 UART:
2,820,624 UART: [state] CFI Enabled
2,823,204 UART: [state] LifecycleState = Unprovisioned
2,823,859 UART: [state] DebugLocked = No
2,824,553 UART: [state] WD Timer not started. Device not locked for debugging
2,825,911 UART: [kat] SHA2-256
3,631,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,635,686 UART: [kat] ++
3,635,838 UART: [kat] sha1
3,640,106 UART: [kat] SHA2-256
3,642,046 UART: [kat] SHA2-384
3,644,785 UART: [kat] SHA2-512-ACC
3,646,685 UART: [kat] ECC-384
3,656,178 UART: [kat] HMAC-384Kdf
3,660,726 UART: [kat] LMS
3,909,054 UART: [kat] --
3,909,770 UART: [update-reset] ++
5,222,963 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,224,032 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,374,030 >>> mbox cmd response: success
5,374,223 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,237 UART: [update-reset Success] --
5,383,292 UART: [state] Locking Datavault
5,384,218 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,822 UART: [state] Locking ICCM
5,385,296 UART: [exit] Launching FMC @ 0x40000130
5,390,625 UART:
5,390,641 UART: Running Caliptra FMC ...
5,391,049 UART:
5,391,103 UART: [state] CFI Enabled
5,480,652 UART: [art] Extend RT PCRs Done
5,481,080 UART: [art] Lock RT PCRs Done
5,482,335 UART: [art] Populate DV Done
5,490,602 UART: [fht] FMC Alias Private Key: 7
5,491,642 UART: [art] Derive CDI
5,491,922 UART: [art] Store in in slot 0x4
5,577,499 UART: [art] Derive Key Pair
5,577,859 UART: [art] Store priv key in slot 0x5
5,591,333 UART: [art] Derive Key Pair - Done
5,606,350 UART: [art] Signing Cert with AUTHO
5,606,830 UART: RITY.KEYID = 7
5,621,662 UART: [art] Erasing AUTHORITY.KEYID = 7
5,622,427 UART: [art] PUB.X = 8F0E41AB4BA8C39CF04AF73D66EEE13E84C0DC3E75B5A4629AA166B3C2D817A79A3AE2AFFF1D8802599B528A20DAB298
5,629,211 UART: [art] PUB.Y = 5283EB12697355682A853F53B4928ABD0061ED2DD8C7D8EAAC70BB362EFD600A5FA9719BB12758F5E4DD218F6E1D276E
5,636,146 UART: [art] SIG.R = 32B39306F8D6B8D13032E615A5A6A98A4DA1DF1E36CBF8CAA4CE2B500FA0E9585A40D23612E21ABAB22C259969458661
5,642,918 UART: [art] SIG.S = EC3F97EC536928FC0A61E49EC922B3826125649D21E2D71A71BA46B162709C916806FD994D4D92EB508437F8C41181E3
5,666,445 UART: Caliptra RT
5,666,698 UART: [state] CFI Enabled
5,950,016 UART: [rt] RT failed reset flow
5,950,447 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,049 ready_for_fw is high
1,060,049 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,034 >>> mbox cmd response: success
2,165,034 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,226,500 UART:
2,226,516 UART: Running Caliptra FMC ...
2,226,924 UART:
2,226,978 UART: [state] CFI Enabled
2,237,579 UART: [fht] FMC Alias Private Key: 7
2,345,980 UART: [art] Extend RT PCRs Done
2,346,408 UART: [art] Lock RT PCRs Done
2,348,214 UART: [art] Populate DV Done
2,356,515 UART: [fht] FMC Alias Private Key: 7
2,357,493 UART: [art] Derive CDI
2,357,773 UART: [art] Store in in slot 0x4
2,443,556 UART: [art] Derive Key Pair
2,443,916 UART: [art] Store priv key in slot 0x5
2,457,136 UART: [art] Derive Key Pair - Done
2,471,937 UART: [art] Signing Cert with AUTHO
2,472,417 UART: RITY.KEYID = 7
2,487,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,102 UART: [art] PUB.X = 11D02553CCD7B1528797EC48033098AC77C47FAA600268EE3976B52DC0B129D0000E8041119FB306ECB4CE2B7C2CB0EE
2,494,844 UART: [art] PUB.Y = 70C20D669B437CE06C19102A92B53BD8A0C7DEA54989E9D07B6412EAB76CD02D973D14168519C02E8514D98D386F455C
2,501,791 UART: [art] SIG.R = 3A98EB0ABB7702720586F35EAA25A4F29755D3D2754298D1B091EB1C5502B59BF37351E124073C12D327B5845697C751
2,508,538 UART: [art] SIG.S = D41CA6ED02FD49E7E6507296D29B7EAA0BDFBD8E7A507820E85D1659054F23902AFDF2784358A0C056A74B306A9C09CC
2,532,375 UART: mbox::rt_entry...
2,532,747 UART: ____ _ _ _ ____ _____
2,533,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,635 UART: |_|
2,536,947 UART:
2,644,127 UART: [rt] Runtime listening for mailbox commands...
2,645,061 >>> mbox cmd response data (0 bytes)
2,645,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,083,305 >>> mbox cmd response: success
5,096,773 UART:
5,096,789 UART: Running Caliptra FMC ...
5,097,197 UART:
5,097,251 UART: [state] CFI Enabled
5,186,672 UART: [art] Extend RT PCRs Done
5,187,100 UART: [art] Lock RT PCRs Done
5,188,581 UART: [art] Populate DV Done
5,196,808 UART: [fht] FMC Alias Private Key: 7
5,197,832 UART: [art] Derive CDI
5,198,112 UART: [art] Store in in slot 0x4
5,283,641 UART: [art] Derive Key Pair
5,284,001 UART: [art] Store priv key in slot 0x5
5,297,497 UART: [art] Derive Key Pair - Done
5,312,533 UART: [art] Signing Cert with AUTHO
5,313,013 UART: RITY.KEYID = 7
5,328,809 UART: [art] Erasing AUTHORITY.KEYID = 7
5,329,574 UART: [art] PUB.X = FBC3AB5BEDFA7307F824FD8DC6DE760064748E1D539827FAE742BA2F5F0B3E3BD192C421D740F3B1FCAC5628B215A840
5,336,334 UART: [art] PUB.Y = 69B25B21107127E7EFF0B5AC022EA608E4ACB1D11CCFA62FFFF446727461A5647290116FD5CEC3C5118CEB997EB88D99
5,343,290 UART: [art] SIG.R = 34746616DC5213F62EDD25722E24B9D3B42C75AAEE99B79DE29928259C317BD9DF16A75C1EC55646EAD1FCCBACF16CB0
5,350,076 UART: [art] SIG.S = 9BCF93DAAD072FDAB682BE79334B22ABE4CFCCA4BA58B3EE3D1BFA31D1417DA3D88EC55D24C99C087C2CD127C559A325
5,373,679 UART: Caliptra RT
5,373,932 UART: [state] CFI Enabled
5,657,950 UART: [rt] RT failed reset flow
5,658,381 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
893,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,592 UART: [kat] ++
897,744 UART: [kat] sha1
902,184 UART: [kat] SHA2-256
904,124 UART: [kat] SHA2-384
906,953 UART: [kat] SHA2-512-ACC
908,854 UART: [kat] ECC-384
918,825 UART: [kat] HMAC-384Kdf
923,561 UART: [kat] LMS
1,171,889 UART: [kat] --
1,172,410 UART: [cold-reset] ++
1,172,804 UART: [fht] FHT @ 0x50003400
1,175,391 UART: [idev] ++
1,175,559 UART: [idev] CDI.KEYID = 6
1,175,919 UART: [idev] SUBJECT.KEYID = 7
1,176,343 UART: [idev] UDS.KEYID = 0
1,176,688 ready_for_fw is high
1,176,688 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,565 UART: [idev] Erasing UDS.KEYID = 0
1,202,098 UART: [idev] Sha1 KeyId Algorithm
1,210,552 UART: [idev] --
1,211,564 UART: [ldev] ++
1,211,732 UART: [ldev] CDI.KEYID = 6
1,212,095 UART: [ldev] SUBJECT.KEYID = 5
1,212,521 UART: [ldev] AUTHORITY.KEYID = 7
1,212,984 UART: [ldev] FE.KEYID = 1
1,218,274 UART: [ldev] Erasing FE.KEYID = 1
1,244,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,274 UART: [ldev] --
1,283,545 UART: [fwproc] Wait for Commands...
1,284,255 UART: [fwproc] Recv command 0x46574c44
1,284,983 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,227 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,642 >>> mbox cmd response: success
2,313,642 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,314,880 UART: [afmc] ++
2,315,048 UART: [afmc] CDI.KEYID = 6
2,315,410 UART: [afmc] SUBJECT.KEYID = 7
2,315,835 UART: [afmc] AUTHORITY.KEYID = 5
2,351,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,411 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,024 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,743 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,611 UART: [afmc] --
2,394,579 UART: [cold-reset] --
2,395,615 UART: [state] Locking Datavault
2,396,556 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,160 UART: [state] Locking ICCM
2,397,648 UART: [exit] Launching FMC @ 0x40000130
2,402,977 UART:
2,402,993 UART: Running Caliptra FMC ...
2,403,401 UART:
2,403,544 UART: [state] CFI Enabled
2,414,133 UART: [fht] FMC Alias Private Key: 7
2,522,178 UART: [art] Extend RT PCRs Done
2,522,606 UART: [art] Lock RT PCRs Done
2,523,984 UART: [art] Populate DV Done
2,532,223 UART: [fht] FMC Alias Private Key: 7
2,533,315 UART: [art] Derive CDI
2,533,595 UART: [art] Store in in slot 0x4
2,619,096 UART: [art] Derive Key Pair
2,619,456 UART: [art] Store priv key in slot 0x5
2,632,868 UART: [art] Derive Key Pair - Done
2,647,909 UART: [art] Signing Cert with AUTHO
2,648,389 UART: RITY.KEYID = 7
2,663,977 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,742 UART: [art] PUB.X = BD2B1F263FF77793CF883B4C1503E041BFEE49256F270ECA77FE61F9673CB40656B70AF355DC70ABAD861E3E2553A59F
2,671,512 UART: [art] PUB.Y = 221580199552B0543E4945226768435EE3E3EC255509542DEF969FA28A1161E05D4CEC0EB02EA2447464932A28AB5747
2,678,444 UART: [art] SIG.R = 2B606F702DD4F504C3C5F99259E81A933646AE9BF22553B58A952E65E8DAC869B840FB4DA94AF3F657F481D907528600
2,685,186 UART: [art] SIG.S = EB27B9B27DF0F3A97C46515182925F983755BBB30149F0224EC0E7C6843908F5F1CE89C317BB1593D50F6BCE7790F4A3
2,709,234 UART: mbox::rt_entry...
2,709,606 UART: ____ _ _ _ ____ _____
2,710,390 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,190 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,958 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,494 UART: |_|
2,713,806 UART:
2,820,956 UART: [rt] Runtime listening for mailbox commands...
2,821,890 >>> mbox cmd response data (0 bytes)
2,821,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,822,002 UART:
2,822,018 UART: Running Caliptra ROM ...
2,822,426 UART:
2,822,568 UART: [state] CFI Enabled
2,825,564 UART: [state] LifecycleState = Unprovisioned
2,826,219 UART: [state] DebugLocked = No
2,826,763 UART: [state] WD Timer not started. Device not locked for debugging
2,828,013 UART: [kat] SHA2-256
3,633,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,637,788 UART: [kat] ++
3,637,940 UART: [kat] sha1
3,642,302 UART: [kat] SHA2-256
3,644,242 UART: [kat] SHA2-384
3,647,129 UART: [kat] SHA2-512-ACC
3,649,029 UART: [kat] ECC-384
3,659,076 UART: [kat] HMAC-384Kdf
3,663,602 UART: [kat] LMS
3,911,930 UART: [kat] --
3,912,772 UART: [update-reset] ++
5,227,175 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,228,366 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,378,364 >>> mbox cmd response: success
5,378,541 UART: [update-reset] Copying MAN_2 To MAN_1
5,386,555 UART: [update-reset Success] --
5,387,484 UART: [state] Locking Datavault
5,388,290 UART: [state] Locking PCR0, PCR1 and PCR31
5,388,894 UART: [state] Locking ICCM
5,389,432 UART: [exit] Launching FMC @ 0x40000130
5,394,761 UART:
5,394,777 UART: Running Caliptra FMC ...
5,395,185 UART:
5,395,328 UART: [state] CFI Enabled
5,484,373 UART: [art] Extend RT PCRs Done
5,484,801 UART: [art] Lock RT PCRs Done
5,486,242 UART: [art] Populate DV Done
5,494,319 UART: [fht] FMC Alias Private Key: 7
5,495,257 UART: [art] Derive CDI
5,495,537 UART: [art] Store in in slot 0x4
5,580,930 UART: [art] Derive Key Pair
5,581,290 UART: [art] Store priv key in slot 0x5
5,595,240 UART: [art] Derive Key Pair - Done
5,610,278 UART: [art] Signing Cert with AUTHO
5,610,758 UART: RITY.KEYID = 7
5,625,986 UART: [art] Erasing AUTHORITY.KEYID = 7
5,626,751 UART: [art] PUB.X = EA8413F3E9E47B1F387D637585D05EC34B8347199EDFE7E2B5C93CC972CC9ED9976214BB5462988C4A3D8B63CF8C9D30
5,633,529 UART: [art] PUB.Y = 25AE750BE9DD94305AD973D68F0C03FA971709F44E669FE867D88A510BB2F393C7418FC39159C1568CC2405EB6F0863F
5,640,466 UART: [art] SIG.R = 5CEEFAF35DC17CFDED39A2C6AE303F1E0D6CEF6481B83E046B232202DB3667379AF0F3CC16B1221DC70BA6AB8F45AD7D
5,647,250 UART: [art] SIG.S = 7E21BE46677DFDB665DB6D117D68DC4805BA37377875270C1F65F606C65010234113456A3C783B8EF408806B3348480B
5,671,096 UART: Caliptra RT
5,671,441 UART: [state] CFI Enabled
5,952,003 UART: [rt] RT failed reset flow
5,952,434 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,190 ready_for_fw is high
1,061,190 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,167,447 >>> mbox cmd response: success
2,167,447 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,229,359 UART:
2,229,375 UART: Running Caliptra FMC ...
2,229,783 UART:
2,229,926 UART: [state] CFI Enabled
2,240,473 UART: [fht] FMC Alias Private Key: 7
2,348,480 UART: [art] Extend RT PCRs Done
2,348,908 UART: [art] Lock RT PCRs Done
2,350,624 UART: [art] Populate DV Done
2,358,895 UART: [fht] FMC Alias Private Key: 7
2,359,863 UART: [art] Derive CDI
2,360,143 UART: [art] Store in in slot 0x4
2,445,582 UART: [art] Derive Key Pair
2,445,942 UART: [art] Store priv key in slot 0x5
2,459,544 UART: [art] Derive Key Pair - Done
2,474,356 UART: [art] Signing Cert with AUTHO
2,474,836 UART: RITY.KEYID = 7
2,489,918 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,683 UART: [art] PUB.X = 71C16627B1761AFB78C6705C935563C5F2E26443D7286A22F6AFD077A533F90DE3FF7B19AB3D4A8C2B9C50F81B15CEBE
2,497,460 UART: [art] PUB.Y = E6E51D16020C7C5661FAEACF44C2E0A2C7CD4A64E5812E7FDDDAE1C2643CEE9C8B280F22F8439473B077EA10359CD177
2,504,417 UART: [art] SIG.R = 1734BE705CDD25959D91265D001BFFC94BE90B3F10CD141FC3DF01B1B26E1236027B8D3FD52C0E8E55C30BF494941227
2,511,156 UART: [art] SIG.S = 49D0F86F524FF660B35A14197D9FFB3D748CB9822222EE0CB0C1052A1A46F6E61D79969AF4FEDDAB81F4CBBAB608FE4E
2,534,878 UART: mbox::rt_entry...
2,535,250 UART: ____ _ _ _ ____ _____
2,536,034 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,834 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,602 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,538,370 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,539,138 UART: |_|
2,539,450 UART:
2,644,344 UART: [rt] Runtime listening for mailbox commands...
2,645,278 >>> mbox cmd response data (0 bytes)
2,645,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,084,711 >>> mbox cmd response: success
5,098,077 UART:
5,098,093 UART: Running Caliptra FMC ...
5,098,501 UART:
5,098,644 UART: [state] CFI Enabled
5,187,565 UART: [art] Extend RT PCRs Done
5,187,993 UART: [art] Lock RT PCRs Done
5,189,074 UART: [art] Populate DV Done
5,197,199 UART: [fht] FMC Alias Private Key: 7
5,198,281 UART: [art] Derive CDI
5,198,561 UART: [art] Store in in slot 0x4
5,284,010 UART: [art] Derive Key Pair
5,284,370 UART: [art] Store priv key in slot 0x5
5,297,130 UART: [art] Derive Key Pair - Done
5,311,891 UART: [art] Signing Cert with AUTHO
5,312,371 UART: RITY.KEYID = 7
5,327,521 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,286 UART: [art] PUB.X = F52D96A8434862952331D1FCE5E169033AF144B13C22D9ADDDDEB99F81C3829C903CA521A32558B0E91F82C38E29F2B3
5,335,057 UART: [art] PUB.Y = C1E89497DA584E0D2FCD369F34E49FD1263C43B4DB990BBD6F4B2CA6C1F7C211DF67FE4CB113C3BCB50CF4D3D081E5D0
5,342,022 UART: [art] SIG.R = 88F7D050D9D5E7F1BEB4709531BEA301718532BE4A110A9E12393793360A3F3D8367969B80685313C2387A7675E2E645
5,348,771 UART: [art] SIG.S = C022088E3C4BFB7951DBE791EF21C2AE57531523D3D666A798049A05D419AB8E0C99F4FB8FEACE908D17B1521F167652
5,372,318 UART: Caliptra RT
5,372,663 UART: [state] CFI Enabled
5,651,094 UART: [rt] RT failed reset flow
5,651,525 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,491 UART: [fht] FHT @ 0x50003400
1,173,193 UART: [idev] ++
1,173,361 UART: [idev] CDI.KEYID = 6
1,173,722 UART: [idev] SUBJECT.KEYID = 7
1,174,147 UART: [idev] UDS.KEYID = 0
1,174,493 ready_for_fw is high
1,174,493 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,305 UART: [idev] Erasing UDS.KEYID = 0
1,199,455 UART: [idev] Sha1 KeyId Algorithm
1,208,175 UART: [idev] --
1,209,232 UART: [ldev] ++
1,209,400 UART: [ldev] CDI.KEYID = 6
1,209,764 UART: [ldev] SUBJECT.KEYID = 5
1,210,191 UART: [ldev] AUTHORITY.KEYID = 7
1,210,654 UART: [ldev] FE.KEYID = 1
1,216,036 UART: [ldev] Erasing FE.KEYID = 1
1,242,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,112 UART: [ldev] --
1,281,418 UART: [fwproc] Wait for Commands...
1,282,207 UART: [fwproc] Recv command 0x46574c44
1,282,940 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,009 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,367 >>> mbox cmd response: success
2,312,367 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,313,398 UART: [afmc] ++
2,313,566 UART: [afmc] CDI.KEYID = 6
2,313,929 UART: [afmc] SUBJECT.KEYID = 7
2,314,355 UART: [afmc] AUTHORITY.KEYID = 5
2,349,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,586 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,469 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,188 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,867 UART: [afmc] --
2,392,941 UART: [cold-reset] --
2,393,699 UART: [state] Locking Datavault
2,394,628 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,232 UART: [state] Locking ICCM
2,395,654 UART: [exit] Launching FMC @ 0x40000130
2,400,983 UART:
2,400,999 UART: Running Caliptra FMC ...
2,401,407 UART:
2,401,461 UART: [state] CFI Enabled
2,411,414 UART: [fht] FMC Alias Private Key: 7
2,519,035 UART: [art] Extend RT PCRs Done
2,519,463 UART: [art] Lock RT PCRs Done
2,521,079 UART: [art] Populate DV Done
2,529,400 UART: [fht] FMC Alias Private Key: 7
2,530,546 UART: [art] Derive CDI
2,530,826 UART: [art] Store in in slot 0x4
2,616,885 UART: [art] Derive Key Pair
2,617,245 UART: [art] Store priv key in slot 0x5
2,630,399 UART: [art] Derive Key Pair - Done
2,645,043 UART: [art] Signing Cert with AUTHO
2,645,523 UART: RITY.KEYID = 7
2,660,453 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,218 UART: [art] PUB.X = 2809CBAB75D9A5264C2EF77716A1AB17DDCD5279175141AE67F38BFA18F6C3CD299211232ABA7F9039EE1C0C43A7DCA3
2,667,996 UART: [art] PUB.Y = F91EF1A98B8C5B165ABB2906858A7B26BEBC8E316A285469DB0BA74AD1E3D40F112E8A6A3CF6D74CB5B0775886083670
2,674,944 UART: [art] SIG.R = 48FD04CAC45F3B734CF9423E643F882D9D42FFF5917057745228E779C89C3168B579408CE67915A514B3FCCAAF23806C
2,681,711 UART: [art] SIG.S = DC19EFDD21AF05DCBBBB7D4CC302829A8B45F74C3AD9D36EF244F8C58E62468CC4079BEFDB8AC4045BD4D5204ABCC948
2,705,878 UART: mbox::rt_entry...
2,706,250 UART: ____ _ _ _ ____ _____
2,707,034 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,834 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,602 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,370 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,138 UART: |_|
2,710,450 UART:
2,817,360 UART: [rt] Runtime listening for mailbox commands...
2,818,294 >>> mbox cmd response data (0 bytes)
2,818,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,818,406 UART:
2,818,422 UART: Running Caliptra ROM ...
2,818,830 UART:
2,818,885 UART: [state] CFI Enabled
2,821,835 UART: [state] LifecycleState = Unprovisioned
2,822,490 UART: [state] DebugLocked = No
2,823,160 UART: [state] WD Timer not started. Device not locked for debugging
2,824,428 UART: [kat] SHA2-256
3,627,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,632,107 UART: [kat] ++
3,632,259 UART: [kat] sha1
3,636,375 UART: [kat] SHA2-256
3,638,315 UART: [kat] SHA2-384
3,640,964 UART: [kat] SHA2-512-ACC
3,642,864 UART: [kat] ECC-384
3,652,649 UART: [kat] HMAC-384Kdf
3,657,195 UART: [kat] LMS
3,905,507 UART: [kat] --
3,906,273 UART: [update-reset] ++
5,219,935 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,221,020 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,371,018 >>> mbox cmd response: success
5,371,371 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,385 UART: [update-reset Success] --
5,380,482 UART: [state] Locking Datavault
5,381,354 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,958 UART: [state] Locking ICCM
5,382,554 UART: [exit] Launching FMC @ 0x40000130
5,387,883 UART:
5,387,899 UART: Running Caliptra FMC ...
5,388,307 UART:
5,388,361 UART: [state] CFI Enabled
5,477,308 UART: [art] Extend RT PCRs Done
5,477,736 UART: [art] Lock RT PCRs Done
5,478,807 UART: [art] Populate DV Done
5,487,234 UART: [fht] FMC Alias Private Key: 7
5,488,380 UART: [art] Derive CDI
5,488,660 UART: [art] Store in in slot 0x4
5,574,997 UART: [art] Derive Key Pair
5,575,357 UART: [art] Store priv key in slot 0x5
5,588,519 UART: [art] Derive Key Pair - Done
5,603,506 UART: [art] Signing Cert with AUTHO
5,603,986 UART: RITY.KEYID = 7
5,619,128 UART: [art] Erasing AUTHORITY.KEYID = 7
5,619,893 UART: [art] PUB.X = A6F3E1F8DEEA94F2B83415D82B2CC0539BE26CD84B088421137ED7A02331FDAF68E2E533688F364AB879F5FB62C09072
5,626,668 UART: [art] PUB.Y = 1009F087BA620AAD4050E5769EE2059D23F041A5C85977774201ABAFE660290A693DA794E51C2103AA01903FBD00F1B1
5,633,573 UART: [art] SIG.R = E2687A6DA2FB14923B3AE89FECE2E7C7FCCCF2365C704F6EE21DD50E180C0260471155EE4BE28F012F6130155749D469
5,640,339 UART: [art] SIG.S = 37A152E43FEB12350E5E15500F18DDBBF80F07E6B5E8001053DEC76DFFB61D6EF134B33C9020E261362DC46A9EAEC687
5,664,194 UART: Caliptra RT
5,664,447 UART: [state] CFI Enabled
5,945,955 UART: [rt] RT failed reset flow
5,946,386 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,460 ready_for_fw is high
1,055,460 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,611 >>> mbox cmd response: success
2,160,611 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,222,673 UART:
2,222,689 UART: Running Caliptra FMC ...
2,223,097 UART:
2,223,151 UART: [state] CFI Enabled
2,233,634 UART: [fht] FMC Alias Private Key: 7
2,341,637 UART: [art] Extend RT PCRs Done
2,342,065 UART: [art] Lock RT PCRs Done
2,343,487 UART: [art] Populate DV Done
2,351,888 UART: [fht] FMC Alias Private Key: 7
2,352,840 UART: [art] Derive CDI
2,353,120 UART: [art] Store in in slot 0x4
2,438,759 UART: [art] Derive Key Pair
2,439,119 UART: [art] Store priv key in slot 0x5
2,452,601 UART: [art] Derive Key Pair - Done
2,467,392 UART: [art] Signing Cert with AUTHO
2,467,872 UART: RITY.KEYID = 7
2,483,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,241 UART: [art] PUB.X = 1ED724EF4D3CC7C5CC66DF99EA3F7F046267663A0FBB725B9E64E6077F81108A5A2E126509FDBCD45B87F35DAE53F68F
2,491,015 UART: [art] PUB.Y = 06D89D5AE2923F8391C7C33D022C288FAFA66170C32C5C8F1748BD34705324A6D227A3B79FC9DCF0C5379A131A08DACF
2,497,964 UART: [art] SIG.R = 85ADF312C07F5C06024617E1CD23712F088FBC36A1C85B484723A6D0F09DB614791EC319B8EFDC42AAFC1DAB5E955895
2,504,735 UART: [art] SIG.S = 44AB9AB290A9D1F5BD1AA465148C275F42AF554D17FFDEC681C14FFBA8004FE1D97F02B1625ADEA9FFFC57B1F9F1A01A
2,528,375 UART: mbox::rt_entry...
2,528,747 UART: ____ _ _ _ ____ _____
2,529,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,635 UART: |_|
2,532,947 UART:
2,639,247 UART: [rt] Runtime listening for mailbox commands...
2,640,181 >>> mbox cmd response data (0 bytes)
2,640,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,073,080 >>> mbox cmd response: success
5,086,610 UART:
5,086,626 UART: Running Caliptra FMC ...
5,087,034 UART:
5,087,088 UART: [state] CFI Enabled
5,176,111 UART: [art] Extend RT PCRs Done
5,176,539 UART: [art] Lock RT PCRs Done
5,178,162 UART: [art] Populate DV Done
5,186,271 UART: [fht] FMC Alias Private Key: 7
5,187,245 UART: [art] Derive CDI
5,187,525 UART: [art] Store in in slot 0x4
5,273,028 UART: [art] Derive Key Pair
5,273,388 UART: [art] Store priv key in slot 0x5
5,286,384 UART: [art] Derive Key Pair - Done
5,301,215 UART: [art] Signing Cert with AUTHO
5,301,695 UART: RITY.KEYID = 7
5,316,881 UART: [art] Erasing AUTHORITY.KEYID = 7
5,317,646 UART: [art] PUB.X = F2CF88FA038D71725F623C115CDD097788DA276E837C92DD2493B6B917B2B8920D08432F59611557FD78465732B6F042
5,324,396 UART: [art] PUB.Y = 05EDAE2FDE88DFEDE240F011E51A7F331EDD18C6B591B4025B70FB4CDDA69CB8ECCA4B73F0BE86F91C72046E10EB1D39
5,331,365 UART: [art] SIG.R = 8A1472EDB5B3C4402EA812DB98EA9A4EE79D30C35A834661D434083D26329D2D5ADE01C107C737A647F79353840F8137
5,338,121 UART: [art] SIG.S = F69D2E67E1A83A1AD3133B1919407F237B377FDAEA2859219DAB956F7B492CEF642913C3623C5F1151C824015982968F
5,362,783 UART: Caliptra RT
5,363,036 UART: [state] CFI Enabled
5,643,437 UART: [rt] RT failed reset flow
5,643,868 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,886 UART: [kat] ++
896,038 UART: [kat] sha1
900,224 UART: [kat] SHA2-256
902,164 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,511 UART: [kat] HMAC-384Kdf
921,115 UART: [kat] LMS
1,169,427 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,174,530 ready_for_fw is high
1,174,530 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,666 UART: [idev] Erasing UDS.KEYID = 0
1,199,566 UART: [idev] Sha1 KeyId Algorithm
1,208,448 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,973 UART: [ldev] SUBJECT.KEYID = 5
1,210,400 UART: [ldev] AUTHORITY.KEYID = 7
1,210,863 UART: [ldev] FE.KEYID = 1
1,216,357 UART: [ldev] Erasing FE.KEYID = 1
1,243,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,735 UART: [ldev] --
1,282,053 UART: [fwproc] Wait for Commands...
1,282,654 UART: [fwproc] Recv command 0x46574c44
1,283,387 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,211 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,520 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,800 >>> mbox cmd response: success
2,312,800 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,313,985 UART: [afmc] ++
2,314,153 UART: [afmc] CDI.KEYID = 6
2,314,516 UART: [afmc] SUBJECT.KEYID = 7
2,314,942 UART: [afmc] AUTHORITY.KEYID = 5
2,350,413 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,801 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,684 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,403 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,288 UART: [afmc] --
2,394,418 UART: [cold-reset] --
2,395,216 UART: [state] Locking Datavault
2,396,391 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,995 UART: [state] Locking ICCM
2,397,665 UART: [exit] Launching FMC @ 0x40000130
2,402,994 UART:
2,403,010 UART: Running Caliptra FMC ...
2,403,418 UART:
2,403,561 UART: [state] CFI Enabled
2,414,450 UART: [fht] FMC Alias Private Key: 7
2,522,421 UART: [art] Extend RT PCRs Done
2,522,849 UART: [art] Lock RT PCRs Done
2,524,337 UART: [art] Populate DV Done
2,532,502 UART: [fht] FMC Alias Private Key: 7
2,533,552 UART: [art] Derive CDI
2,533,832 UART: [art] Store in in slot 0x4
2,619,591 UART: [art] Derive Key Pair
2,619,951 UART: [art] Store priv key in slot 0x5
2,632,857 UART: [art] Derive Key Pair - Done
2,647,678 UART: [art] Signing Cert with AUTHO
2,648,158 UART: RITY.KEYID = 7
2,663,132 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,897 UART: [art] PUB.X = DCF26E75E3376C1F1B16BA680FC716D512AF4C64DA97467D427D31345440C76E833EC44B3069FE0D0A4DEA54058DDB6C
2,670,665 UART: [art] PUB.Y = 47C6C96960CF2FBB855A422212F4EFE40410BF84AF340122E588273B1C71E9F92EAD9836D8A06990CB3FC7E21DDFD761
2,677,617 UART: [art] SIG.R = 00C56FFCB4FE2FA1FFB5C0030A215AEFFE74B8EC3F7759E36E84C447A31F3074371D6E9E09D79758D48D831915667744
2,684,362 UART: [art] SIG.S = 53428AACA475158A07713B745EED31BB4D4EA6F6B04E04768FBD502B38AF6254710E843BEF221E31A0A265034CDE1BC7
2,707,837 UART: mbox::rt_entry...
2,708,209 UART: ____ _ _ _ ____ _____
2,708,993 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,793 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,561 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,329 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,097 UART: |_|
2,712,409 UART:
2,819,262 UART: [rt] Runtime listening for mailbox commands...
2,820,196 >>> mbox cmd response data (0 bytes)
2,820,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,820,308 UART:
2,820,324 UART: Running Caliptra ROM ...
2,820,732 UART:
2,820,874 UART: [state] CFI Enabled
2,823,718 UART: [state] LifecycleState = Unprovisioned
2,824,373 UART: [state] DebugLocked = No
2,824,941 UART: [state] WD Timer not started. Device not locked for debugging
2,826,067 UART: [kat] SHA2-256
3,629,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,633,746 UART: [kat] ++
3,633,898 UART: [kat] sha1
3,638,236 UART: [kat] SHA2-256
3,640,176 UART: [kat] SHA2-384
3,642,931 UART: [kat] SHA2-512-ACC
3,644,831 UART: [kat] ECC-384
3,654,524 UART: [kat] HMAC-384Kdf
3,659,304 UART: [kat] LMS
3,907,616 UART: [kat] --
3,908,494 UART: [update-reset] ++
5,222,150 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,223,159 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,373,157 >>> mbox cmd response: success
5,373,346 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,360 UART: [update-reset Success] --
5,382,127 UART: [state] Locking Datavault
5,382,711 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,315 UART: [state] Locking ICCM
5,383,953 UART: [exit] Launching FMC @ 0x40000130
5,389,282 UART:
5,389,298 UART: Running Caliptra FMC ...
5,389,706 UART:
5,389,849 UART: [state] CFI Enabled
5,479,380 UART: [art] Extend RT PCRs Done
5,479,808 UART: [art] Lock RT PCRs Done
5,481,015 UART: [art] Populate DV Done
5,489,366 UART: [fht] FMC Alias Private Key: 7
5,490,308 UART: [art] Derive CDI
5,490,588 UART: [art] Store in in slot 0x4
5,576,215 UART: [art] Derive Key Pair
5,576,575 UART: [art] Store priv key in slot 0x5
5,590,705 UART: [art] Derive Key Pair - Done
5,605,610 UART: [art] Signing Cert with AUTHO
5,606,090 UART: RITY.KEYID = 7
5,621,212 UART: [art] Erasing AUTHORITY.KEYID = 7
5,621,977 UART: [art] PUB.X = 1FD9F8804DF7D6B9E3A6C25AD4956FB9644C7D78760322253BADE22AAC14072FE939CD273C68826191C6BD697EA55183
5,628,745 UART: [art] PUB.Y = B46CD5C9119B2AA09772F38D9A62EEC9F163155DFA45D76297ABB31B8E248C0E220AEB06C8021BB8106B3007DAC38DC0
5,635,692 UART: [art] SIG.R = A325E0A4D2AA5EFA338563487C0EF53295585500D1B219C4354F22F0DE87A428036CB88E9188FA225ED0DF8E11B98360
5,642,434 UART: [art] SIG.S = EE7ACF04FD97DAB0CCBBBD813D8D173337CE844799E870940F1F7645DC579E564F6B5003F5C7AC7BE87FB66C9B748916
5,666,434 UART: Caliptra RT
5,666,779 UART: [state] CFI Enabled
5,949,980 UART: [rt] RT failed reset flow
5,950,411 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,125 ready_for_fw is high
1,056,125 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,364 >>> mbox cmd response: success
2,162,364 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,224,968 UART:
2,224,984 UART: Running Caliptra FMC ...
2,225,392 UART:
2,225,535 UART: [state] CFI Enabled
2,235,856 UART: [fht] FMC Alias Private Key: 7
2,344,947 UART: [art] Extend RT PCRs Done
2,345,375 UART: [art] Lock RT PCRs Done
2,347,005 UART: [art] Populate DV Done
2,355,024 UART: [fht] FMC Alias Private Key: 7
2,356,072 UART: [art] Derive CDI
2,356,352 UART: [art] Store in in slot 0x4
2,441,923 UART: [art] Derive Key Pair
2,442,283 UART: [art] Store priv key in slot 0x5
2,455,159 UART: [art] Derive Key Pair - Done
2,470,255 UART: [art] Signing Cert with AUTHO
2,470,735 UART: RITY.KEYID = 7
2,485,849 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,614 UART: [art] PUB.X = 1D1D850B4E3449003315BB12CB959DA05C267DF349263BBF2FAB78DB36113781803013AFF548C568C8ED5B89D1915E7B
2,493,361 UART: [art] PUB.Y = 7A0CA4E101FE23483A568E41CC04BAD752B561E1E4194F17385BDD55833853DDB779C6170B90B1A551F9775EBC38DEFE
2,500,307 UART: [art] SIG.R = FC67BD85735FB5D0D71D29E272232F821FC842FF8B78BE06092451A4D75DD61D034DEDB7DC9F856C319D6E1F67C56236
2,507,076 UART: [art] SIG.S = 941C8D357C99617A853961962FC61CD5285E2EAE63C7DBB781CBDB58E6FD54720359D35A82DCDDCF5C40682A73F59333
2,530,890 UART: mbox::rt_entry...
2,531,262 UART: ____ _ _ _ ____ _____
2,532,046 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,846 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,614 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,382 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,150 UART: |_|
2,535,462 UART:
2,642,609 UART: [rt] Runtime listening for mailbox commands...
2,643,543 >>> mbox cmd response data (0 bytes)
2,643,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,077,307 >>> mbox cmd response: success
5,090,513 UART:
5,090,529 UART: Running Caliptra FMC ...
5,090,937 UART:
5,091,080 UART: [state] CFI Enabled
5,180,819 UART: [art] Extend RT PCRs Done
5,181,247 UART: [art] Lock RT PCRs Done
5,182,544 UART: [art] Populate DV Done
5,190,935 UART: [fht] FMC Alias Private Key: 7
5,191,979 UART: [art] Derive CDI
5,192,259 UART: [art] Store in in slot 0x4
5,278,098 UART: [art] Derive Key Pair
5,278,458 UART: [art] Store priv key in slot 0x5
5,291,928 UART: [art] Derive Key Pair - Done
5,307,123 UART: [art] Signing Cert with AUTHO
5,307,603 UART: RITY.KEYID = 7
5,322,843 UART: [art] Erasing AUTHORITY.KEYID = 7
5,323,608 UART: [art] PUB.X = 315FF9D4CC8B7C30E71A72EE27325A88C9722A2AA8124FB0DABEB732BC1789F2A790EF9A6B253138BCBCA96FBF8294BD
5,330,398 UART: [art] PUB.Y = CB4C7D53E881BB771FA639ED6FB64DF7F649160E2E1AF2C112229D9E41A95D788FD009D07DCF7758738AAF038A58BE93
5,337,351 UART: [art] SIG.R = 59342E0E027CAB909471DF48C7037877483CE463047C5E0C7B89F8F67E86449C80099E2AA226448398DB73F96B95F261
5,344,093 UART: [art] SIG.S = 5D22769D70219C946186A56F3BB204B9DE91B21662F376CE4D69DDFBF734E3FD6F1C132485F10E04FE3C178A19F579EE
5,367,617 UART: Caliptra RT
5,367,962 UART: [state] CFI Enabled
5,650,414 UART: [rt] RT failed reset flow
5,650,845 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
191,968 UART:
192,347 UART: Running Caliptra ROM ...
193,449 UART:
193,590 UART: [state] CFI Enabled
263,046 UART: [state] LifecycleState = Unprovisioned
265,041 UART: [state] DebugLocked = No
266,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,290 UART: [kat] SHA2-256
440,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,480 UART: [kat] ++
451,931 UART: [kat] sha1
463,245 UART: [kat] SHA2-256
465,897 UART: [kat] SHA2-384
472,095 UART: [kat] SHA2-512-ACC
474,463 UART: [kat] ECC-384
2,770,341 UART: [kat] HMAC-384Kdf
2,802,591 UART: [kat] LMS
3,992,949 UART: [kat] --
3,996,798 UART: [cold-reset] ++
3,999,432 UART: [fht] Storing FHT @ 0x50003400
4,009,772 UART: [idev] ++
4,010,502 UART: [idev] CDI.KEYID = 6
4,011,415 UART: [idev] SUBJECT.KEYID = 7
4,012,529 UART: [idev] UDS.KEYID = 0
4,013,573 ready_for_fw is high
4,013,789 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,113,016 UART: [idev] Erasing UDS.KEYID = 0
7,348,253 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,750 UART: [idev] --
7,373,746 UART: [ldev] ++
7,374,325 UART: [ldev] CDI.KEYID = 6
7,375,248 UART: [ldev] SUBJECT.KEYID = 5
7,376,461 UART: [ldev] AUTHORITY.KEYID = 7
7,377,748 UART: [ldev] FE.KEYID = 1
7,404,818 UART: [ldev] Erasing FE.KEYID = 1
10,738,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,822 UART: [ldev] --
13,098,463 UART: [fwproc] Waiting for Commands...
13,101,262 UART: [fwproc] Received command 0x46574c44
13,103,460 UART: [fwproc] Received Image of size 78740 bytes
16,724,258 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,802,600 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,871,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,065,360 >>> mbox cmd response: success
17,065,842 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,069,605 UART: [afmc] ++
17,070,197 UART: [afmc] CDI.KEYID = 6
17,071,113 UART: [afmc] SUBJECT.KEYID = 7
17,072,395 UART: [afmc] AUTHORITY.KEYID = 5
20,436,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,735,459 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,737,750 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,752,147 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,766,969 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,781,430 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,803,150 UART: [afmc] --
22,807,832 UART: [cold-reset] --
22,811,611 UART: [state] Locking Datavault
22,818,143 UART: [state] Locking PCR0, PCR1 and PCR31
22,819,897 UART: [state] Locking ICCM
22,820,999 UART: [exit] Launching FMC @ 0x40000130
22,829,393 UART:
22,829,628 UART: Running Caliptra FMC ...
22,830,652 UART:
22,830,801 UART: [state] CFI Enabled
22,893,509 UART: [fht] FMC Alias Private Key: 7
25,231,457 UART: [art] Extend RT PCRs Done
25,232,687 UART: [art] Lock RT PCRs Done
25,234,399 UART: [art] Populate DV Done
25,239,868 UART: [fht] FMC Alias Private Key: 7
25,241,462 UART: [art] Derive CDI
25,242,220 UART: [art] Store in in slot 0x4
25,301,828 UART: [art] Derive Key Pair
25,302,870 UART: [art] Store priv key in slot 0x5
28,595,293 UART: [art] Derive Key Pair - Done
28,608,498 UART: [art] Signing Cert with AUTHO
28,609,792 UART: RITY.KEYID = 7
30,898,011 UART: [art] Erasing AUTHORITY.KEYID = 7
30,899,847 UART: [art] PUB.X = 4129D802624DE3D64274FB33F394E071CB4AE02EC7D005A0241F832B6B8EE27A33109ACD1A2FF8522F2BFC8600132286
30,906,775 UART: [art] PUB.Y = 818664CDDF2FB70A1454C99C4E3FF76F5C451B8144801F3DC8C007AB4E58ED7B8F144208531CB95ED7A73CA7103BC2CD
30,914,061 UART: [art] SIG.R = AE5E99DF29EC6E808947825CB122BD1651A3FCA54E40C361F0B415E42587D0B4B5763BEC02164D71831F774F9D0A6C19
30,921,402 UART: [art] SIG.S = 51DE37F847C97D9B3B6F1F750685A0FD303B37ACCCD78E5FF38BE2BA376AEF52CB59514AD0E4F170DAF85221C6B8F5D5
32,225,226 UART: mbox::rt_entry...
32,226,195 UART: ____ _ _ _ ____ _____
32,228,129 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,230,136 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,232,066 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,234,017 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,235,952 UART: |_|
32,236,761 UART:
32,349,468 UART: [rt] Runtime listening for mailbox commands...
32,351,709 >>> mbox cmd response data (0 bytes)
34,481,175 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,625,509 UART:
34,625,865 UART: Running Caliptra ROM ...
34,626,994 UART:
34,627,173 UART: [state] CFI Enabled
34,697,152 UART: [state] LifecycleState = Unprovisioned
34,699,090 UART: [state] DebugLocked = No
34,701,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,705,459 UART: [kat] SHA2-256
34,875,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,885,673 UART: [kat] ++
34,886,131 UART: [kat] sha1
34,896,857 UART: [kat] SHA2-256
34,899,586 UART: [kat] SHA2-384
34,905,418 UART: [kat] SHA2-512-ACC
34,907,779 UART: [kat] ECC-384
37,198,405 UART: [kat] HMAC-384Kdf
37,231,937 UART: [kat] LMS
38,422,285 UART: [kat] --
38,425,640 UART: [update-reset] ++
42,556,030 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,559,975 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,942,239 >>> mbox cmd response: success
42,947,090 UART: [update-reset] Copying MAN_2 To MAN_1
42,965,561 UART: [update-reset Success] --
42,971,687 UART: [state] Locking Datavault
42,975,208 UART: [state] Locking PCR0, PCR1 and PCR31
42,976,967 UART: [state] Locking ICCM
42,978,600 UART: [exit] Launching FMC @ 0x40000130
42,987,055 UART:
42,987,292 UART: Running Caliptra FMC ...
42,988,389 UART:
42,988,558 UART: [state] CFI Enabled
43,093,068 UART: [art] Extend RT PCRs Done
43,094,269 UART: [art] Lock RT PCRs Done
43,095,784 UART: [art] Populate DV Done
43,101,353 UART: [fht] FMC Alias Private Key: 7
43,102,939 UART: [art] Derive CDI
43,103,749 UART: [art] Store in in slot 0x4
43,162,363 UART: [art] Derive Key Pair
43,163,398 UART: [art] Store priv key in slot 0x5
46,455,915 UART: [art] Derive Key Pair - Done
46,468,841 UART: [art] Signing Cert with AUTHO
46,470,208 UART: RITY.KEYID = 7
48,766,466 UART: [art] Erasing AUTHORITY.KEYID = 7
48,768,492 UART: [art] PUB.X = C472FE38894FC81FCC03205358A063D3FE1A6CA28D0205569DBF4AABC70DFF222771DA278208F289D14E43400EDA0735
48,775,265 UART: [art] PUB.Y = B21ECF7C17C1AD76A9D860F3B07F73BBF81C9B983E47BCFA4DE52F580FFA0807C97AAC95FB38F9B5445DC88800DDA773
48,782,488 UART: [art] SIG.R = 2DBE56978740EA9377B6A297D228C706CF1CD6CFB5139ABBAA739EA8C5DA821B0A2416ABD4433FBF1BD88DB3A8EB33F4
48,789,930 UART: [art] SIG.S = ED64AB9877276D89A06EF95A6A78F0BCF6BCF6DA08F901FDAEAB3339042E1180BEBEF40F739BECF026A3381A44884B29
50,095,738 UART: Caliptra RT
50,096,469 UART: [state] CFI Enabled
50,431,982 UART: [rt] RT failed reset flow
50,433,186 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,786,273 ready_for_fw is high
3,786,880 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,134,222 >>> mbox cmd response: success
17,134,835 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
22,820,408 UART:
22,820,789 UART: Running Caliptra FMC ...
22,821,930 UART:
22,822,089 UART: [state] CFI Enabled
22,872,220 UART: [fht] FMC Alias Private Key: 7
25,210,076 UART: [art] Extend RT PCRs Done
25,211,317 UART: [art] Lock RT PCRs Done
25,213,269 UART: [art] Populate DV Done
25,218,636 UART: [fht] FMC Alias Private Key: 7
25,220,291 UART: [art] Derive CDI
25,221,109 UART: [art] Store in in slot 0x4
25,279,916 UART: [art] Derive Key Pair
25,280,981 UART: [art] Store priv key in slot 0x5
28,574,029 UART: [art] Derive Key Pair - Done
28,587,135 UART: [art] Signing Cert with AUTHO
28,588,446 UART: RITY.KEYID = 7
30,874,917 UART: [art] Erasing AUTHORITY.KEYID = 7
30,876,430 UART: [art] PUB.X = EBD9CDC7E6B2916ED4354887906A00AB2CB10C24435B8FDC3CE9489B215BCC76B33A501AD1E56690CC118E1ECB7DA5C1
30,883,707 UART: [art] PUB.Y = BB837427C8823267015D2E4C81B32CE0D0E67C40CBDD09E828D8DA292CD10AF7C0A06CB49F7F0D3431229C87297A698E
30,890,955 UART: [art] SIG.R = 702ABE5F7A8CDFED9136E2EDA1C9D51C2EA0151D64D9B449E43CF6512AAA57005D52A0D3A995BB1E8EAE7B4F11BC5460
30,898,314 UART: [art] SIG.S = 5C32645C8FB11EA2126CA39A3C616E8C954E28DA107AC1F5D565DDD56016151F24D598F3ABBB82B06EE97265E13C78E6
32,202,447 UART: mbox::rt_entry...
32,203,413 UART: ____ _ _ _ ____ _____
32,205,414 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,207,433 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,209,368 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,211,333 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,213,264 UART: |_|
32,214,097 UART:
32,327,411 UART: [rt] Runtime listening for mailbox commands...
32,329,581 >>> mbox cmd response data (0 bytes)
34,458,122 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,179,152 >>> mbox cmd response: success
43,212,942 UART:
43,213,256 UART: Running Caliptra FMC ...
43,214,377 UART:
43,214,548 UART: [state] CFI Enabled
43,318,015 UART: [art] Extend RT PCRs Done
43,319,217 UART: [art] Lock RT PCRs Done
43,320,461 UART: [art] Populate DV Done
43,325,837 UART: [fht] FMC Alias Private Key: 7
43,327,324 UART: [art] Derive CDI
43,328,090 UART: [art] Store in in slot 0x4
43,387,618 UART: [art] Derive Key Pair
43,388,623 UART: [art] Store priv key in slot 0x5
46,681,086 UART: [art] Derive Key Pair - Done
46,694,145 UART: [art] Signing Cert with AUTHO
46,695,452 UART: RITY.KEYID = 7
48,982,620 UART: [art] Erasing AUTHORITY.KEYID = 7
48,984,126 UART: [art] PUB.X = 246FD4C4DFC69D30608AFAF46B8601240BDCE5B718CE2AE3C270215C66844FABC170C34DE49F64F76FA057902E386388
48,991,359 UART: [art] PUB.Y = 55940DD2AF05A0A0432FB04B6F47C8ACC67BDFF93FA38915F55AF26616A73A1C2158391BF84B6AFCAA7CB27F230B48C2
48,998,648 UART: [art] SIG.R = 8A8A8A6A05610007A19B4895A07DE8C59A89DEA0B2C5420B1304CD1061C37196E591D224806E3A9D474E00480B9A77F9
49,005,986 UART: [art] SIG.S = 80AC555E93FFBF5973C61DEF12C04BA2161E405B6D59CE872F0C43580ADE70A8B8A9AF90BEA5FC15B4D0AD3649BB3EE6
50,311,190 UART: Caliptra RT
50,311,896 UART: [state] CFI Enabled
50,643,983 UART: [rt] RT failed reset flow
50,645,193 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
192,434 UART:
192,800 UART: Running Caliptra ROM ...
193,946 UART:
603,792 UART: [state] CFI Enabled
617,802 UART: [state] LifecycleState = Unprovisioned
619,747 UART: [state] DebugLocked = No
622,254 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,037 UART: [kat] SHA2-256
796,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,279 UART: [kat] ++
807,722 UART: [kat] sha1
819,509 UART: [kat] SHA2-256
822,218 UART: [kat] SHA2-384
827,988 UART: [kat] SHA2-512-ACC
830,351 UART: [kat] ECC-384
3,112,792 UART: [kat] HMAC-384Kdf
3,125,946 UART: [kat] LMS
4,316,045 UART: [kat] --
4,320,288 UART: [cold-reset] ++
4,321,295 UART: [fht] Storing FHT @ 0x50003400
4,332,054 UART: [idev] ++
4,332,615 UART: [idev] CDI.KEYID = 6
4,333,588 UART: [idev] SUBJECT.KEYID = 7
4,334,824 UART: [idev] UDS.KEYID = 0
4,335,809 ready_for_fw is high
4,336,011 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,435,127 UART: [idev] Erasing UDS.KEYID = 0
7,622,276 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,320 UART: [idev] --
7,647,022 UART: [ldev] ++
7,647,597 UART: [ldev] CDI.KEYID = 6
7,648,557 UART: [ldev] SUBJECT.KEYID = 5
7,649,758 UART: [ldev] AUTHORITY.KEYID = 7
7,651,032 UART: [ldev] FE.KEYID = 1
7,663,150 UART: [ldev] Erasing FE.KEYID = 1
10,952,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,949 UART: [ldev] --
13,313,487 UART: [fwproc] Waiting for Commands...
13,316,378 UART: [fwproc] Received command 0x46574c44
13,318,562 UART: [fwproc] Received Image of size 78740 bytes
16,940,164 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,016,925 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,085,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,278,471 >>> mbox cmd response: success
17,278,936 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,282,647 UART: [afmc] ++
17,283,250 UART: [afmc] CDI.KEYID = 6
17,284,159 UART: [afmc] SUBJECT.KEYID = 7
17,285,419 UART: [afmc] AUTHORITY.KEYID = 5
20,597,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,891,662 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,893,924 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,908,282 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,923,156 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,937,567 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,958,825 UART: [afmc] --
22,962,150 UART: [cold-reset] --
22,966,382 UART: [state] Locking Datavault
22,973,460 UART: [state] Locking PCR0, PCR1 and PCR31
22,975,219 UART: [state] Locking ICCM
22,977,146 UART: [exit] Launching FMC @ 0x40000130
22,985,533 UART:
22,985,782 UART: Running Caliptra FMC ...
22,986,883 UART:
22,987,033 UART: [state] CFI Enabled
22,995,300 UART: [fht] FMC Alias Private Key: 7
25,326,777 UART: [art] Extend RT PCRs Done
25,327,998 UART: [art] Lock RT PCRs Done
25,329,512 UART: [art] Populate DV Done
25,334,915 UART: [fht] FMC Alias Private Key: 7
25,336,620 UART: [art] Derive CDI
25,337,429 UART: [art] Store in in slot 0x4
25,380,230 UART: [art] Derive Key Pair
25,381,217 UART: [art] Store priv key in slot 0x5
28,623,518 UART: [art] Derive Key Pair - Done
28,636,361 UART: [art] Signing Cert with AUTHO
28,637,669 UART: RITY.KEYID = 7
30,917,079 UART: [art] Erasing AUTHORITY.KEYID = 7
30,918,603 UART: [art] PUB.X = 692A8CB5AA43FF5A70360F87775F5B62D9B528BA270A46E0CE8BA4C732D8EB5CBEF6F6AF0ED6CFA56B11A4961FD3C2DA
30,925,845 UART: [art] PUB.Y = C4BF91C359F9C54E9E30672A910D6A93BAA9FD2C892B1064D05DECE42B0EC2538ABBFD7576A499C1EE582FDD8E8B8A68
30,933,121 UART: [art] SIG.R = B7794A7BEE24FFC5DF6930127341F6943C256F57D19DC56A18B3FE6AC1F949C2454C5D2C2ADD4D691AD1CA7D6E09F223
30,940,499 UART: [art] SIG.S = 291D0F2574416B5813A436CFFF6848FD3323F63305A4CDDDE5AC718BCD2346A383B41B97F2D8F93BB4B1D9A64BAF7678
32,244,910 UART: mbox::rt_entry...
32,245,846 UART: ____ _ _ _ ____ _____
32,247,824 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,249,823 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,251,744 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,253,666 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,255,589 UART: |_|
32,256,393 UART:
32,369,157 UART: [rt] Runtime listening for mailbox commands...
32,371,376 >>> mbox cmd response data (0 bytes)
34,425,056 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,569,521 UART:
34,569,904 UART: Running Caliptra ROM ...
34,570,978 UART:
34,571,137 UART: [state] CFI Enabled
34,586,071 UART: [state] LifecycleState = Unprovisioned
34,587,967 UART: [state] DebugLocked = No
34,590,016 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,595,417 UART: [kat] SHA2-256
34,765,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,775,651 UART: [kat] ++
34,776,134 UART: [kat] sha1
34,786,120 UART: [kat] SHA2-256
34,788,818 UART: [kat] SHA2-384
34,793,345 UART: [kat] SHA2-512-ACC
34,795,745 UART: [kat] ECC-384
37,081,537 UART: [kat] HMAC-384Kdf
37,092,415 UART: [kat] LMS
38,282,510 UART: [kat] --
38,285,211 UART: [update-reset] ++
42,429,640 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,433,738 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,816,009 >>> mbox cmd response: success
42,820,654 UART: [update-reset] Copying MAN_2 To MAN_1
42,840,099 UART: [update-reset Success] --
42,845,738 UART: [state] Locking Datavault
42,848,025 UART: [state] Locking PCR0, PCR1 and PCR31
42,849,802 UART: [state] Locking ICCM
42,850,869 UART: [exit] Launching FMC @ 0x40000130
42,859,269 UART:
42,859,510 UART: Running Caliptra FMC ...
42,860,608 UART:
42,860,762 UART: [state] CFI Enabled
42,905,043 UART: [art] Extend RT PCRs Done
42,906,185 UART: [art] Lock RT PCRs Done
42,907,844 UART: [art] Populate DV Done
42,913,567 UART: [fht] FMC Alias Private Key: 7
42,915,150 UART: [art] Derive CDI
42,915,969 UART: [art] Store in in slot 0x4
42,958,664 UART: [art] Derive Key Pair
42,959,676 UART: [art] Store priv key in slot 0x5
46,201,757 UART: [art] Derive Key Pair - Done
46,215,087 UART: [art] Signing Cert with AUTHO
46,216,392 UART: RITY.KEYID = 7
48,495,881 UART: [art] Erasing AUTHORITY.KEYID = 7
48,497,392 UART: [art] PUB.X = 6356112A0F3862F068283EB6B1FE1959D0A7B9D9254D0FE779FA16203D0A5BEA0EB4BEF95A9238279B5E6D37E7D29483
48,504,626 UART: [art] PUB.Y = D278CD53F1C7F9501A720D42591ECBA6C5007B9672D8172E15237408A501B80703D29A8EBB240990B87F44A031653E18
48,511,871 UART: [art] SIG.R = 96CE1D963FCA3E33AF58F5538528227845E0A82B086A68A8264D8FF92D5DFC57CA1123B8C1EBBF09AC5CB8AD0EF680DB
48,519,247 UART: [art] SIG.S = 33D92C9632AE1ECC4D06687D471C95DF5A33E1E36AEF544F61192138262968B346176D405F550D1D73FFB5BCC7AD1776
49,823,978 UART: Caliptra RT
49,824,693 UART: [state] CFI Enabled
50,112,980 UART: [rt] RT failed reset flow
50,114,169 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,127,984 ready_for_fw is high
4,128,403 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,359,246 >>> mbox cmd response: success
17,359,835 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
23,000,433 UART:
23,000,822 UART: Running Caliptra FMC ...
23,001,957 UART:
23,002,110 UART: [state] CFI Enabled
23,010,258 UART: [fht] FMC Alias Private Key: 7
25,340,742 UART: [art] Extend RT PCRs Done
25,341,971 UART: [art] Lock RT PCRs Done
25,343,624 UART: [art] Populate DV Done
25,348,771 UART: [fht] FMC Alias Private Key: 7
25,350,275 UART: [art] Derive CDI
25,351,036 UART: [art] Store in in slot 0x4
25,393,783 UART: [art] Derive Key Pair
25,394,781 UART: [art] Store priv key in slot 0x5
28,636,837 UART: [art] Derive Key Pair - Done
28,649,940 UART: [art] Signing Cert with AUTHO
28,651,244 UART: RITY.KEYID = 7
30,930,409 UART: [art] Erasing AUTHORITY.KEYID = 7
30,931,916 UART: [art] PUB.X = E97AF4CF6FB093B98BFDB4111D6531852DC05BFA2D1CCE8FCAA779AB05E85F3D03567C119B2395E8A180AECFBE18B937
30,939,210 UART: [art] PUB.Y = CA31487B67BFCC44B6732B0F21CFDDE933C646EBC59873FA5A45B023AAB66BAC09F2987AE0F1356777CF636BA62C37E6
30,946,476 UART: [art] SIG.R = CFF3D35F5E797FF2BC75BBF0718D2CD20E3A0098DDF96D1DCD55816072D821387816463E8458805A0D0BDB39C2D89A86
30,953,824 UART: [art] SIG.S = 1CBEBC2778A895215C360E09DD0F4BFB1E99C50337AF4F457DE81FD9D64AA00ED46CFD69C29C99C25EE5F3A24792CE78
32,258,279 UART: mbox::rt_entry...
32,259,220 UART: ____ _ _ _ ____ _____
32,261,158 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,263,165 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,265,089 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,267,052 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,268,984 UART: |_|
32,269,785 UART:
32,383,123 UART: [rt] Runtime listening for mailbox commands...
32,385,381 >>> mbox cmd response data (0 bytes)
34,437,219 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,081,207 >>> mbox cmd response: success
43,116,255 UART:
43,116,606 UART: Running Caliptra FMC ...
43,117,769 UART:
43,117,938 UART: [state] CFI Enabled
43,161,738 UART: [art] Extend RT PCRs Done
43,162,883 UART: [art] Lock RT PCRs Done
43,164,489 UART: [art] Populate DV Done
43,169,679 UART: [fht] FMC Alias Private Key: 7
43,171,426 UART: [art] Derive CDI
43,172,234 UART: [art] Store in in slot 0x4
43,214,518 UART: [art] Derive Key Pair
43,215,564 UART: [art] Store priv key in slot 0x5
46,457,789 UART: [art] Derive Key Pair - Done
46,470,847 UART: [art] Signing Cert with AUTHO
46,472,181 UART: RITY.KEYID = 7
48,751,454 UART: [art] Erasing AUTHORITY.KEYID = 7
48,753,149 UART: [art] PUB.X = 9A0BBC0E0AF306FBDD3CB26BDD1126F6197A70268DC521F431FEC30E70747F0B5B3642E63DAE694141CEE8405368D3C9
48,760,224 UART: [art] PUB.Y = 12B178A96D233F79BA6A8ADBFA90E49CC13D50D9A631C3A9636521619E117EF17A7383EDA85219616503BE8A32A12812
48,767,468 UART: [art] SIG.R = 0F18A1A79185E42356942A13A588780A4B139EB4770CDF780BC794BC6D6F4F44BD117F46CDDB4D6D18371B6DD065BDCC
48,774,850 UART: [art] SIG.S = 43E2DFFA9A9728881E764C589FD68CC8A4383A25D5DF700E25ACE20ED08D8298CB88647982DDECB772B3808BE279F42B
50,080,671 UART: Caliptra RT
50,081,965 UART: [state] CFI Enabled
50,368,593 UART: [rt] RT failed reset flow
50,369,788 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,093 UART:
192,469 UART: Running Caliptra ROM ...
193,564 UART:
193,728 UART: [state] CFI Enabled
263,195 UART: [state] LifecycleState = Unprovisioned
265,111 UART: [state] DebugLocked = No
267,910 UART: [state] WD Timer not started. Device not locked for debugging
272,224 UART: [kat] SHA2-256
451,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,896 UART: [kat] ++
463,347 UART: [kat] sha1
474,502 UART: [kat] SHA2-256
477,515 UART: [kat] SHA2-384
483,535 UART: [kat] SHA2-512-ACC
486,437 UART: [kat] ECC-384
2,946,960 UART: [kat] HMAC-384Kdf
2,971,418 UART: [kat] LMS
3,500,870 UART: [kat] --
3,506,495 UART: [cold-reset] ++
3,507,804 UART: [fht] FHT @ 0x50003400
3,518,144 UART: [idev] ++
3,518,854 UART: [idev] CDI.KEYID = 6
3,519,845 UART: [idev] SUBJECT.KEYID = 7
3,520,954 UART: [idev] UDS.KEYID = 0
3,521,885 ready_for_fw is high
3,522,070 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,621,163 UART: [idev] Erasing UDS.KEYID = 0
6,028,888 UART: [idev] Sha1 KeyId Algorithm
6,051,946 UART: [idev] --
6,055,610 UART: [ldev] ++
6,056,175 UART: [ldev] CDI.KEYID = 6
6,057,090 UART: [ldev] SUBJECT.KEYID = 5
6,058,252 UART: [ldev] AUTHORITY.KEYID = 7
6,059,479 UART: [ldev] FE.KEYID = 1
6,098,813 UART: [ldev] Erasing FE.KEYID = 1
8,606,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,750 UART: [ldev] --
10,414,538 UART: [fwproc] Wait for Commands...
10,416,799 UART: [fwproc] Recv command 0x46574c44
10,418,837 UART: [fwproc] Recv'd Img size: 78704 bytes
13,386,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,460,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,529,035 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,722,205 >>> mbox cmd response: success
13,722,673 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,727,218 UART: [afmc] ++
13,727,832 UART: [afmc] CDI.KEYID = 6
13,728,765 UART: [afmc] SUBJECT.KEYID = 7
13,729,929 UART: [afmc] AUTHORITY.KEYID = 5
16,270,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,994,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,996,582 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,012,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,028,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,044,256 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,068,560 UART: [afmc] --
18,071,939 UART: [cold-reset] --
18,076,229 UART: [state] Locking Datavault
18,082,517 UART: [state] Locking PCR0, PCR1 and PCR31
18,084,201 UART: [state] Locking ICCM
18,085,442 UART: [exit] Launching FMC @ 0x40000130
18,093,836 UART:
18,094,082 UART: Running Caliptra FMC ...
18,095,208 UART:
18,095,371 UART: [state] CFI Enabled
18,151,649 UART: [fht] FMC Alias Private Key: 7
19,915,787 UART: [art] Extend RT PCRs Done
19,917,000 UART: [art] Lock RT PCRs Done
19,918,520 UART: [art] Populate DV Done
19,923,810 UART: [fht] FMC Alias Private Key: 7
19,925,297 UART: [art] Derive CDI
19,926,059 UART: [art] Store in in slot 0x4
19,983,774 UART: [art] Derive Key Pair
19,984,775 UART: [art] Store priv key in slot 0x5
22,447,675 UART: [art] Derive Key Pair - Done
22,460,771 UART: [art] Signing Cert with AUTHO
22,462,075 UART: RITY.KEYID = 7
24,173,633 UART: [art] Erasing AUTHORITY.KEYID = 7
24,175,138 UART: [art] PUB.X = B005B6D4CAF2C691F895CEAB69A270605FD312C93FF6CD60B9CA408E3D65E4EC355816CB8E9501901042848661F8B054
24,182,415 UART: [art] PUB.Y = 4E8F3E6D6B245F3BD96A6563FBA3D616CB045D628D23C0819C31EEC4250970C8B1CA30A681A76541232C462E646766AA
24,189,653 UART: [art] SIG.R = E01795A395DDD07310A8EAC02DC4E05D6D2BB0D447329607D6E130BD4837ACDE3A1A867BB091FB435FF2DD7DB63BA7D0
24,197,059 UART: [art] SIG.S = 0EE1C5190FBE0B96B233ECD8CB2BAB62F218AFF5F2226D32CC085591696F31ACF5827031D689940A4718C96A3EF93484
25,175,688 UART: mbox::rt_entry...
25,176,648 UART: ____ _ _ _ ____ _____
25,178,576 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,180,575 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,182,431 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,184,353 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,186,231 UART: |_|
25,187,113 UART:
25,299,133 UART: [rt] Runtime listening for mailbox commands...
25,301,298 >>> mbox cmd response data (0 bytes)
27,362,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,507,789 UART:
27,508,169 UART: Running Caliptra ROM ...
27,509,220 UART:
27,509,373 UART: [state] CFI Enabled
27,584,044 UART: [state] LifecycleState = Unprovisioned
27,585,936 UART: [state] DebugLocked = No
27,588,589 UART: [state] WD Timer not started. Device not locked for debugging
27,593,094 UART: [kat] SHA2-256
27,772,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,783,796 UART: [kat] ++
27,784,251 UART: [kat] sha1
27,795,941 UART: [kat] SHA2-256
27,798,968 UART: [kat] SHA2-384
27,805,437 UART: [kat] SHA2-512-ACC
27,808,380 UART: [kat] ECC-384
30,268,824 UART: [kat] HMAC-384Kdf
30,290,010 UART: [kat] LMS
30,819,476 UART: [kat] --
30,824,381 UART: [update-reset] ++
34,254,214 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,257,625 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,640,957 >>> mbox cmd response: success
34,645,356 UART: [update-reset] Copying MAN_2 To MAN_1
34,664,364 UART: [update-reset Success] --
34,668,958 UART: [state] Locking Datavault
34,673,406 UART: [state] Locking PCR0, PCR1 and PCR31
34,675,048 UART: [state] Locking ICCM
34,676,992 UART: [exit] Launching FMC @ 0x40000130
34,685,398 UART:
34,685,635 UART: Running Caliptra FMC ...
34,687,114 UART:
34,687,280 UART: [state] CFI Enabled
34,780,012 UART: [art] Extend RT PCRs Done
34,781,211 UART: [art] Lock RT PCRs Done
34,782,453 UART: [art] Populate DV Done
34,788,025 UART: [fht] FMC Alias Private Key: 7
34,789,561 UART: [art] Derive CDI
34,790,371 UART: [art] Store in in slot 0x4
34,848,579 UART: [art] Derive Key Pair
34,849,624 UART: [art] Store priv key in slot 0x5
37,312,862 UART: [art] Derive Key Pair - Done
37,325,920 UART: [art] Signing Cert with AUTHO
37,327,227 UART: RITY.KEYID = 7
39,037,417 UART: [art] Erasing AUTHORITY.KEYID = 7
39,038,925 UART: [art] PUB.X = F584F3AEDA5E8A3EDBCC0464D6748523455B824F4D3C99C3B8B41A6C6DD02014DEF673615C25F3A5195B69FBC7924E17
39,046,209 UART: [art] PUB.Y = C1C63EA850941ADFAC081456F558E95FE996C6A28A566D3C85EE2C6E41ABC42CFD414D874462EA0734A08112A369ACB1
39,053,453 UART: [art] SIG.R = 6FE4C9EE71AB249C8828A2A90E00A7212C9F64F1ED414F115E5B074BABBCD4839855C6F662A5F6BB5E83F743CD957F2C
39,060,800 UART: [art] SIG.S = 4D0D30BAC690187FEA99D58B759885E65E908A85567B767BE3B2F09DBE37FDBBED7745CB2AD1BEABF82FDCBD65E14116
40,039,648 UART: Caliptra RT
40,040,369 UART: [state] CFI Enabled
40,375,036 UART: [rt] RT failed reset flow
40,376,234 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,358,881 ready_for_fw is high
3,359,641 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,483,765 >>> mbox cmd response: success
13,484,810 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,770,650 UART:
17,771,057 UART: Running Caliptra FMC ...
17,772,159 UART:
17,772,314 UART: [state] CFI Enabled
17,834,287 UART: [fht] FMC Alias Private Key: 7
19,598,800 UART: [art] Extend RT PCRs Done
19,600,018 UART: [art] Lock RT PCRs Done
19,601,567 UART: [art] Populate DV Done
19,607,039 UART: [fht] FMC Alias Private Key: 7
19,608,526 UART: [art] Derive CDI
19,609,282 UART: [art] Store in in slot 0x4
19,667,000 UART: [art] Derive Key Pair
19,668,041 UART: [art] Store priv key in slot 0x5
22,131,425 UART: [art] Derive Key Pair - Done
22,144,470 UART: [art] Signing Cert with AUTHO
22,145,778 UART: RITY.KEYID = 7
23,857,580 UART: [art] Erasing AUTHORITY.KEYID = 7
23,859,211 UART: [art] PUB.X = 8E20E7DEA9AD0DAD17F0C3D1302FFAA27656FEA8D35EBEA4353C4B37E64BE2E7C5EDD19F9F20EBE8B17D860B2FBB6E04
23,866,408 UART: [art] PUB.Y = 629828FBFEB5C9DFFEBC2E510B9045919432DBD2684F62C6D9851FE115811F2A4A27E11885725985A31DE0A0A7CA7662
23,873,686 UART: [art] SIG.R = ED3C91D6798DDF0D8DA521C7383BED47F3D917C715160C3990FE23D5619FD2ABD2175499690C272A5462ECB3ED814769
23,881,019 UART: [art] SIG.S = 091403E2F5580139105A2F0EBE2263DA575D078B4784552D6C1EEC3766752EE3F8CFDC7B75D2861C09954EBB2B3248C2
24,859,339 UART: mbox::rt_entry...
24,860,277 UART: ____ _ _ _ ____ _____
24,862,254 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,864,258 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,866,188 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,868,181 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,870,130 UART: |_|
24,870,935 UART:
24,982,536 UART: [rt] Runtime listening for mailbox commands...
24,984,767 >>> mbox cmd response data (0 bytes)
27,038,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,141,443 >>> mbox cmd response: success
34,178,002 UART:
34,178,526 UART: Running Caliptra FMC ...
34,179,574 UART:
34,179,727 UART: [state] CFI Enabled
34,273,527 UART: [art] Extend RT PCRs Done
34,274,734 UART: [art] Lock RT PCRs Done
34,276,435 UART: [art] Populate DV Done
34,281,682 UART: [fht] FMC Alias Private Key: 7
34,283,220 UART: [art] Derive CDI
34,283,987 UART: [art] Store in in slot 0x4
34,343,138 UART: [art] Derive Key Pair
34,344,170 UART: [art] Store priv key in slot 0x5
36,807,131 UART: [art] Derive Key Pair - Done
36,819,856 UART: [art] Signing Cert with AUTHO
36,821,192 UART: RITY.KEYID = 7
38,532,761 UART: [art] Erasing AUTHORITY.KEYID = 7
38,534,269 UART: [art] PUB.X = 8A4F3A42DC13FF4D9DA3B8993ACFD0D861A63BAC3F1E2A6EB389C7E290647506BA4F8ACB64473C82C96CBF3518F8B34F
38,541,529 UART: [art] PUB.Y = 95B18CF00628D6EB2FA002A1344C3A35A6FC744CED943A65AE1914BF1390A719A57D3D2F1483106D24C1955549974C78
38,548,770 UART: [art] SIG.R = 999B251B5D6D25C4C721E5AFA5579317F72D2FE7EF01B868F0A5C65165C88521AB7297403B67D7238124722A3CBB53A4
38,556,168 UART: [art] SIG.S = 30DD87505A8F5EF6783F52BA10ACDB8B6D2B175D56B092E532C8809490F69E704C7ECB660EDA525698A9C2CAC67D25B6
39,535,662 UART: Caliptra RT
39,536,371 UART: [state] CFI Enabled
39,868,349 UART: [rt] RT failed reset flow
39,869,562 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,297 UART:
192,671 UART: Running Caliptra ROM ...
193,795 UART:
603,214 UART: [state] CFI Enabled
615,965 UART: [state] LifecycleState = Unprovisioned
617,791 UART: [state] DebugLocked = No
620,382 UART: [state] WD Timer not started. Device not locked for debugging
624,620 UART: [kat] SHA2-256
803,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,294 UART: [kat] ++
815,820 UART: [kat] sha1
826,669 UART: [kat] SHA2-256
829,695 UART: [kat] SHA2-384
835,890 UART: [kat] SHA2-512-ACC
838,819 UART: [kat] ECC-384
3,280,457 UART: [kat] HMAC-384Kdf
3,293,898 UART: [kat] LMS
3,823,427 UART: [kat] --
3,828,785 UART: [cold-reset] ++
3,830,070 UART: [fht] FHT @ 0x50003400
3,840,261 UART: [idev] ++
3,840,821 UART: [idev] CDI.KEYID = 6
3,841,723 UART: [idev] SUBJECT.KEYID = 7
3,842,959 UART: [idev] UDS.KEYID = 0
3,843,875 ready_for_fw is high
3,844,061 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,942,965 UART: [idev] Erasing UDS.KEYID = 0
6,318,709 UART: [idev] Sha1 KeyId Algorithm
6,342,488 UART: [idev] --
6,346,153 UART: [ldev] ++
6,346,712 UART: [ldev] CDI.KEYID = 6
6,347,616 UART: [ldev] SUBJECT.KEYID = 5
6,348,818 UART: [ldev] AUTHORITY.KEYID = 7
6,350,038 UART: [ldev] FE.KEYID = 1
6,360,192 UART: [ldev] Erasing FE.KEYID = 1
8,836,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,727 UART: [ldev] --
10,626,754 UART: [fwproc] Wait for Commands...
10,628,470 UART: [fwproc] Recv command 0x46574c44
10,630,555 UART: [fwproc] Recv'd Img size: 78704 bytes
13,601,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,671,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,740,755 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,933,289 >>> mbox cmd response: success
13,933,760 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,937,084 UART: [afmc] ++
13,937,665 UART: [afmc] CDI.KEYID = 6
13,938,564 UART: [afmc] SUBJECT.KEYID = 7
13,939,712 UART: [afmc] AUTHORITY.KEYID = 5
16,435,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,156,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,158,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,174,399 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,190,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,206,267 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,228,892 UART: [afmc] --
18,232,515 UART: [cold-reset] --
18,237,453 UART: [state] Locking Datavault
18,243,070 UART: [state] Locking PCR0, PCR1 and PCR31
18,244,709 UART: [state] Locking ICCM
18,246,687 UART: [exit] Launching FMC @ 0x40000130
18,255,132 UART:
18,255,359 UART: Running Caliptra FMC ...
18,256,447 UART:
18,256,601 UART: [state] CFI Enabled
18,264,477 UART: [fht] FMC Alias Private Key: 7
20,021,481 UART: [art] Extend RT PCRs Done
20,022,691 UART: [art] Lock RT PCRs Done
20,024,553 UART: [art] Populate DV Done
20,029,960 UART: [fht] FMC Alias Private Key: 7
20,031,553 UART: [art] Derive CDI
20,032,365 UART: [art] Store in in slot 0x4
20,074,725 UART: [art] Derive Key Pair
20,075,883 UART: [art] Store priv key in slot 0x5
22,502,660 UART: [art] Derive Key Pair - Done
22,515,549 UART: [art] Signing Cert with AUTHO
22,516,844 UART: RITY.KEYID = 7
24,222,279 UART: [art] Erasing AUTHORITY.KEYID = 7
24,223,759 UART: [art] PUB.X = C7343218109304F79ED0EE0A77E9D5811AE425932E2A22D58A64EABB9EF5E2F9508B27A0E4C59C6A2F462BD43E7B005C
24,230,987 UART: [art] PUB.Y = BA9FD103E0177AE018E5ACB5BB160D754713946A3D93D248967A5C26E97B943B7FE9C4F911414403BD0CE8AA392B0119
24,238,257 UART: [art] SIG.R = 07BD3A08B67107D9677C2252910CAEE1ACFA78850B04C3D122F4C2BF5FC865D0594185E03A70252D58B2840DE53C2D78
24,245,648 UART: [art] SIG.S = B0EABE96EF4A3FCAAEA699384CA274B16077640F1509B469184EE8375B86DD94F47217754CEFCD44FA0C7AB83346D476
25,224,113 UART: mbox::rt_entry...
25,225,080 UART: ____ _ _ _ ____ _____
25,227,003 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,229,006 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,230,930 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,232,848 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,234,786 UART: |_|
25,235,610 UART:
25,349,120 UART: [rt] Runtime listening for mailbox commands...
25,351,335 >>> mbox cmd response data (0 bytes)
27,403,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,548,348 UART:
27,548,773 UART: Running Caliptra ROM ...
27,549,814 UART:
27,549,969 UART: [state] CFI Enabled
27,565,054 UART: [state] LifecycleState = Unprovisioned
27,566,919 UART: [state] DebugLocked = No
27,569,603 UART: [state] WD Timer not started. Device not locked for debugging
27,573,396 UART: [kat] SHA2-256
27,752,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,764,145 UART: [kat] ++
27,764,676 UART: [kat] sha1
27,775,614 UART: [kat] SHA2-256
27,778,620 UART: [kat] SHA2-384
27,785,082 UART: [kat] SHA2-512-ACC
27,788,016 UART: [kat] ECC-384
30,227,442 UART: [kat] HMAC-384Kdf
30,241,132 UART: [kat] LMS
30,770,671 UART: [kat] --
30,774,276 UART: [update-reset] ++
34,199,767 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,203,201 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,586,511 >>> mbox cmd response: success
34,591,117 UART: [update-reset] Copying MAN_2 To MAN_1
34,610,720 UART: [update-reset Success] --
34,615,206 UART: [state] Locking Datavault
34,618,471 UART: [state] Locking PCR0, PCR1 and PCR31
34,620,169 UART: [state] Locking ICCM
34,622,448 UART: [exit] Launching FMC @ 0x40000130
34,630,889 UART:
34,631,122 UART: Running Caliptra FMC ...
34,632,458 UART:
34,632,609 UART: [state] CFI Enabled
34,676,479 UART: [art] Extend RT PCRs Done
34,677,644 UART: [art] Lock RT PCRs Done
34,678,929 UART: [art] Populate DV Done
34,684,437 UART: [fht] FMC Alias Private Key: 7
34,686,126 UART: [art] Derive CDI
34,686,926 UART: [art] Store in in slot 0x4
34,729,502 UART: [art] Derive Key Pair
34,730,543 UART: [art] Store priv key in slot 0x5
37,157,104 UART: [art] Derive Key Pair - Done
37,170,220 UART: [art] Signing Cert with AUTHO
37,171,709 UART: RITY.KEYID = 7
38,876,917 UART: [art] Erasing AUTHORITY.KEYID = 7
38,878,426 UART: [art] PUB.X = F5FB561AE8BC07DB05C3476483C86DE0002BFC5EFF6B079208BE617319125F6CD03F78111FB6E799F9E6DD017E98C953
38,885,661 UART: [art] PUB.Y = 2E1342F9909863E2CDE0FB0C69E148ED1C9B10378600C92B2D62EB361D56F2062627CEADFA55F7D5138F3D1CF35B3729
38,892,929 UART: [art] SIG.R = CB0B92BE89E2F56AF9F42DFD5CA5BA3FCA9ECC89C8D5E55CE5F6450126103B08DB9FF4FCD6081C6C9B18EA00B9C20307
38,900,304 UART: [art] SIG.S = D791E923E6985DFF3012BA347C8A707363BADB4DA4CF9B573CFC153C192FD2737F9AF03A2B6927BA643007D999EF2F92
39,880,422 UART: Caliptra RT
39,881,154 UART: [state] CFI Enabled
40,165,624 UART: [rt] RT failed reset flow
40,166,817 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,694,181 ready_for_fw is high
3,694,769 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,690,950 >>> mbox cmd response: success
13,691,618 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,942,660 UART:
17,943,061 UART: Running Caliptra FMC ...
17,944,199 UART:
17,944,353 UART: [state] CFI Enabled
17,952,337 UART: [fht] FMC Alias Private Key: 7
19,709,055 UART: [art] Extend RT PCRs Done
19,710,290 UART: [art] Lock RT PCRs Done
19,712,243 UART: [art] Populate DV Done
19,717,869 UART: [fht] FMC Alias Private Key: 7
19,719,467 UART: [art] Derive CDI
19,720,224 UART: [art] Store in in slot 0x4
19,763,020 UART: [art] Derive Key Pair
19,764,016 UART: [art] Store priv key in slot 0x5
22,190,715 UART: [art] Derive Key Pair - Done
22,203,761 UART: [art] Signing Cert with AUTHO
22,205,054 UART: RITY.KEYID = 7
23,910,383 UART: [art] Erasing AUTHORITY.KEYID = 7
23,911,890 UART: [art] PUB.X = 8DA8E2D8475B1370D6839A4C3705C590C7D5663946791C4F1C67AE709B86D060C3788E50E4B1232A454709A4BD653C4F
23,919,131 UART: [art] PUB.Y = D4ADF987895C420308725B8FC7F4BCBDE066160281DC2CCBC8460FE04ED5C26C868F06881FD7CF5116E3F6151C7514A8
23,926,418 UART: [art] SIG.R = CB3C1C67750C21E5CC52DC9BC4E292035FFDCCDA48743E770BA2FC772CAB4D13CD636A41B48A675441F9C40195B13C5A
23,933,813 UART: [art] SIG.S = E5EB146CF81401541DDF9CEA28E3E50DBDE2B9A7141E68D64F68B5BCFEFFC81A0B86A0AE27E4424B53D83DDBA2ED06E7
24,912,489 UART: mbox::rt_entry...
24,913,463 UART: ____ _ _ _ ____ _____
24,915,441 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,917,437 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,919,360 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,921,317 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,923,239 UART: |_|
24,924,040 UART:
25,037,152 UART: [rt] Runtime listening for mailbox commands...
25,039,375 >>> mbox cmd response data (0 bytes)
27,092,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,141,545 >>> mbox cmd response: success
34,174,858 UART:
34,175,178 UART: Running Caliptra FMC ...
34,176,215 UART:
34,176,357 UART: [state] CFI Enabled
34,220,876 UART: [art] Extend RT PCRs Done
34,222,064 UART: [art] Lock RT PCRs Done
34,223,548 UART: [art] Populate DV Done
34,228,955 UART: [fht] FMC Alias Private Key: 7
34,230,698 UART: [art] Derive CDI
34,231,427 UART: [art] Store in in slot 0x4
34,274,079 UART: [art] Derive Key Pair
34,275,116 UART: [art] Store priv key in slot 0x5
36,701,575 UART: [art] Derive Key Pair - Done
36,714,570 UART: [art] Signing Cert with AUTHO
36,715,863 UART: RITY.KEYID = 7
38,421,191 UART: [art] Erasing AUTHORITY.KEYID = 7
38,422,695 UART: [art] PUB.X = 09FD264AF3A366588F8197E0BF4D67AEA591611C534A5E50DF2B89D60890DAA674B87510715C83BDB7277A6A471216FC
38,429,948 UART: [art] PUB.Y = 3C10B87AC77B6698FA6AB3F29D57BB0FFE13EB7E3F0B96ACD34DD152423F21AC27B9F86E7DAFE3D8A5C414424E3227ED
38,437,219 UART: [art] SIG.R = DB39517678A122A858CD15BC7844915246E1FB87747114ED9A4578C37C5E602CFAB37AB6E86190FA51711D89B312F968
38,444,605 UART: [art] SIG.S = C9722D3763FCA161EC0FFE31531D73C8A0187397391D9E8D9E076ADF7D546EABA549BE27D137E7CA3E42DCC5A0490BED
39,424,014 UART: Caliptra RT
39,424,726 UART: [state] CFI Enabled
39,711,658 UART: [rt] RT failed reset flow
39,712,848 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,438,309 ready_for_fw is high
3,438,697 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,960,793 >>> mbox cmd response: success
13,961,427 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
18,263,139 UART:
18,263,578 UART: Running Caliptra FMC ...
18,264,773 UART:
18,264,935 UART: [state] CFI Enabled
18,326,341 UART: [fht] FMC Alias Private Key: 7
20,090,300 UART: [art] Extend RT PCRs Done
20,091,536 UART: [art] Lock RT PCRs Done
20,093,291 UART: [art] Populate DV Done
20,098,923 UART: [fht] FMC Alias Private Key: 7
20,100,420 UART: [art] Derive CDI
20,101,184 UART: [art] Store in in slot 0x4
20,159,448 UART: [art] Derive Key Pair
20,160,489 UART: [art] Store priv key in slot 0x5
22,623,171 UART: [art] Derive Key Pair - Done
22,636,120 UART: [art] Signing Cert with AUTHO
22,637,423 UART: RITY.KEYID = 7
24,348,988 UART: [art] Erasing AUTHORITY.KEYID = 7
24,350,647 UART: [art] PUB.X = 90F93F7255F5A95A3217E2804FFE47EDA68CF9C7DD98E4F14F97312257F52006F84294AD4EE895E80ABE38211ADD00F9
24,357,737 UART: [art] PUB.Y = D592F143E0E803B239541E69F789D48605E9655B3D599BBFC541C2D8A446F1E07D6F3CE8789FEBE09FC8FEBACBACE1AB
24,365,025 UART: [art] SIG.R = 67954FD6FED79D94BA4419D3A4105CBEC62E85F912394B8CC0C3A869D8EC1DDAFE3CB9521C3BD77D2A8D401D97F7AC6B
24,372,474 UART: [art] SIG.S = E6381095835402B70ECE5A1D91786E33F84BE87E9786DFB1D08EE2E28C52C4E380A3A6CB929D8DB1DBD77E357B2582A7
25,350,964 UART: mbox::rt_entry...
25,351,915 UART: ____ _ _ _ ____ _____
25,353,893 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,355,900 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,357,827 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,359,789 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,361,718 UART: |_|
25,362,529 UART:
25,475,603 UART: [rt] Runtime listening for mailbox commands...
25,477,824 >>> mbox cmd response data (0 bytes)
27,530,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,333,783 >>> mbox cmd response: success
35,366,274 UART:
35,366,572 UART: Running Caliptra FMC ...
35,367,691 UART:
35,367,860 UART: [state] CFI Enabled
35,470,554 UART: [art] Extend RT PCRs Done
35,471,747 UART: [art] Lock RT PCRs Done
35,473,587 UART: [art] Populate DV Done
35,479,157 UART: [fht] FMC Alias Private Key: 7
35,480,804 UART: [art] Derive CDI
35,481,623 UART: [art] Store in in slot 0x4
35,539,529 UART: [art] Derive Key Pair
35,540,527 UART: [art] Store priv key in slot 0x5
38,003,598 UART: [art] Derive Key Pair - Done
38,016,233 UART: [art] Signing Cert with AUTHO
38,017,542 UART: RITY.KEYID = 7
39,729,459 UART: [art] Erasing AUTHORITY.KEYID = 7
39,730,960 UART: [art] PUB.X = D980E4E6EBDA0FA39B100A226F1B0B1EAA143B56F28C60ABEE3F204E55B3EEE3D8EC94BF39C9451BBF9EDC743B28D855
39,738,282 UART: [art] PUB.Y = 9E2A53911CDDE1932C6D4A58C6B2593C2FEE202D29E5B01D321E8D37403BCCBC5893153ED4EA1DB9461DFD46812AFDD1
39,745,583 UART: [art] SIG.R = C55505C995795385C7D540CD0170C9F89ADD5CF37A22A0078DE1E7F7B011A878A21E732195E37CD22E21D40C526A8C36
39,752,986 UART: [art] SIG.S = 1C585C4435E0982C356CD35C18C701D875902EEE055AF291742CC9EB23F18BD1A701F8F43F171C46EEE7297A3E4F75BC
40,732,160 UART: Caliptra RT
40,732,868 UART: [state] CFI Enabled
41,067,737 UART: [rt] RT failed reset flow
41,068,942 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
3,753,529 ready_for_fw is high
3,753,914 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,190,237 >>> mbox cmd response: success
14,190,931 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
18,437,707 UART:
18,438,087 UART: Running Caliptra FMC ...
18,439,277 UART:
18,439,438 UART: [state] CFI Enabled
18,446,832 UART: [fht] FMC Alias Private Key: 7
20,203,701 UART: [art] Extend RT PCRs Done
20,204,925 UART: [art] Lock RT PCRs Done
20,206,518 UART: [art] Populate DV Done
20,211,993 UART: [fht] FMC Alias Private Key: 7
20,213,689 UART: [art] Derive CDI
20,214,496 UART: [art] Store in in slot 0x4
20,257,145 UART: [art] Derive Key Pair
20,258,181 UART: [art] Store priv key in slot 0x5
22,685,003 UART: [art] Derive Key Pair - Done
22,697,900 UART: [art] Signing Cert with AUTHO
22,699,204 UART: RITY.KEYID = 7
24,404,860 UART: [art] Erasing AUTHORITY.KEYID = 7
24,406,364 UART: [art] PUB.X = 50F012463677B44932231F23DD1D515051DA13CF50E81448002F2A563011E2976E46037FB3B01E04AA75548F105A8A02
24,413,606 UART: [art] PUB.Y = 288A5681287F0829BCB85FC8D1B688F07730B8DA57866E0B50422E588DE885096F8786D4A357B11BFB692DA0A6200E9E
24,420,840 UART: [art] SIG.R = 4A18F5D3699FD4D3A9AD5B83332086B7EFD03DFC49E144F605CCA21A938A76A0D0F258FE3069281BF6E7D8AF5BCD4221
24,428,228 UART: [art] SIG.S = A1A9A3CDD2465DDCFA6E1103DE2DB9FD338561C118EDC116DFBE28533D3E244D4D91A733B19802C1ED1988C24AFA7321
25,406,937 UART: mbox::rt_entry...
25,407,902 UART: ____ _ _ _ ____ _____
25,410,021 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,412,030 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,413,957 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,415,917 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,417,843 UART: |_|
25,418,816 UART:
25,531,425 UART: [rt] Runtime listening for mailbox commands...
25,533,592 >>> mbox cmd response data (0 bytes)
27,587,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,317,474 >>> mbox cmd response: success
35,350,179 UART:
35,350,478 UART: Running Caliptra FMC ...
35,351,535 UART:
35,351,681 UART: [state] CFI Enabled
35,395,936 UART: [art] Extend RT PCRs Done
35,397,130 UART: [art] Lock RT PCRs Done
35,398,339 UART: [art] Populate DV Done
35,403,741 UART: [fht] FMC Alias Private Key: 7
35,405,388 UART: [art] Derive CDI
35,406,119 UART: [art] Store in in slot 0x4
35,448,443 UART: [art] Derive Key Pair
35,449,484 UART: [art] Store priv key in slot 0x5
37,876,270 UART: [art] Derive Key Pair - Done
37,889,256 UART: [art] Signing Cert with AUTHO
37,890,564 UART: RITY.KEYID = 7
39,596,101 UART: [art] Erasing AUTHORITY.KEYID = 7
39,597,598 UART: [art] PUB.X = 7C7E97DEA795D0B9875CCB800F139711DDB1B3BB102FDBF8245D326711E412E8F7D3EC3B9461E63968CC45F8B94ED593
39,604,890 UART: [art] PUB.Y = A6896B9CE9541C21C046DCE32C8797F0193460134897F4257F7CECB027D488056A4A949070A11B93C74F4FE59F0E1447
39,612,124 UART: [art] SIG.R = 972847325E015A2D68F094AC119C8AA2EF7B54FC47FB2D7711E5AB3DA212944E402EF18337943F06909200AD5950ABB7
39,619,503 UART: [art] SIG.S = 53D1290CA91CE0BDEB25ADEE30E3CB5439186CE1E097669217BB5D450F11404EF775DB1E2D908AD01AA538E12CBF1FB6
40,598,568 UART: Caliptra RT
40,599,262 UART: [state] CFI Enabled
40,889,692 UART: [rt] RT failed reset flow
40,890,884 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
85,995 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,653 UART: [kat] SHA2-256
881,584 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,699 UART: [kat] ++
885,851 UART: [kat] sha1
890,141 UART: [kat] SHA2-256
892,079 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
901,940 UART: [kat] HMAC-384Kdf
906,540 UART: [kat] LMS
1,474,736 UART: [kat] --
1,475,881 UART: [cold-reset] ++
1,476,415 UART: [fht] Storing FHT @ 0x50003400
1,479,092 UART: [idev] ++
1,479,260 UART: [idev] CDI.KEYID = 6
1,479,620 UART: [idev] SUBJECT.KEYID = 7
1,480,044 UART: [idev] UDS.KEYID = 0
1,480,389 ready_for_fw is high
1,480,389 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,487,704 UART: [idev] Erasing UDS.KEYID = 0
1,504,528 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,192 UART: [idev] --
1,514,203 UART: [ldev] ++
1,514,371 UART: [ldev] CDI.KEYID = 6
1,514,734 UART: [ldev] SUBJECT.KEYID = 5
1,515,160 UART: [ldev] AUTHORITY.KEYID = 7
1,515,623 UART: [ldev] FE.KEYID = 1
1,520,885 UART: [ldev] Erasing FE.KEYID = 1
1,546,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,054 UART: [ldev] --
1,585,437 UART: [fwproc] Waiting for Commands...
1,586,142 UART: [fwproc] Received command 0x46574c44
1,586,933 UART: [fwproc] Received Image of size 78704 bytes
2,477,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,710 >>> mbox cmd response: success
2,616,710 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,617,730 UART: [afmc] ++
2,617,898 UART: [afmc] CDI.KEYID = 6
2,618,260 UART: [afmc] SUBJECT.KEYID = 7
2,618,685 UART: [afmc] AUTHORITY.KEYID = 5
2,653,792 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,712 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,492 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,220 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,105 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,795 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,734 UART: [afmc] --
2,696,724 UART: [cold-reset] --
2,697,298 UART: [state] Locking Datavault
2,698,585 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,189 UART: [state] Locking ICCM
2,699,859 UART: [exit] Launching FMC @ 0x40000130
2,705,188 UART:
2,705,204 UART: Running Caliptra FMC ...
2,705,612 UART:
2,705,666 UART: [state] CFI Enabled
2,716,293 UART: [fht] FMC Alias Private Key: 7
2,823,694 UART: [art] Extend RT PCRs Done
2,824,122 UART: [art] Lock RT PCRs Done
2,825,630 UART: [art] Populate DV Done
2,833,989 UART: [fht] FMC Alias Private Key: 7
2,835,001 UART: [art] Derive CDI
2,835,281 UART: [art] Store in in slot 0x4
2,920,948 UART: [art] Derive Key Pair
2,921,308 UART: [art] Store priv key in slot 0x5
2,934,622 UART: [art] Derive Key Pair - Done
2,949,435 UART: [art] Signing Cert with AUTHO
2,949,915 UART: RITY.KEYID = 7
2,965,033 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,798 UART: [art] PUB.X = 4B08122F5C6D5DF6FD890F3C91AAF060E9557AA644E176D555BEC74819AF9103AA6F6186CD57780CE4DE554BEF8653A0
2,972,566 UART: [art] PUB.Y = 278224D632D5B820C142E9B87A00A0E3A42678868FCAA8FED5830CA066C348AA9900C29965F2943CB5A4CA5F5410E965
2,979,469 UART: [art] SIG.R = 8DD2212B9CC3E3255FFFB7AD54E3B58209A2BA009D4C6711242C7EA831FF9854DADF1F848E42AFBC5E800B1A14E13323
2,986,225 UART: [art] SIG.S = 22C5ECAD5A1F99AF3DC79DC2194E7C4E6EC1391CE464CC5F5AEC2758F497CBEA1BEB28C06CCB3932F4A244E04B46BCB0
3,010,340 UART: mbox::rt_entry...
3,010,712 UART: ____ _ _ _ ____ _____
3,011,496 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,296 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,064 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,832 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,600 UART: |_|
3,014,912 UART:
3,122,688 UART: [rt] Runtime listening for mailbox commands...
3,123,839 >>> mbox cmd response data (0 bytes)
3,123,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,123,955 UART:
3,123,971 UART: Running Caliptra ROM ...
3,124,379 UART:
3,124,433 UART: [state] CFI Enabled
3,127,203 UART: [state] LifecycleState = Unprovisioned
3,127,858 UART: [state] DebugLocked = No
3,128,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,871 UART: [kat] SHA2-256
3,923,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,917 UART: [kat] ++
3,928,069 UART: [kat] sha1
3,932,431 UART: [kat] SHA2-256
3,934,369 UART: [kat] SHA2-384
3,937,110 UART: [kat] SHA2-512-ACC
3,939,010 UART: [kat] ECC-384
3,944,367 UART: [kat] HMAC-384Kdf
3,949,119 UART: [kat] LMS
4,517,315 UART: [kat] --
4,517,978 UART: [update-reset] ++
5,854,173 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,855,361 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,005,411 >>> mbox cmd response: success
6,005,602 UART: [update-reset] Copying MAN_2 To MAN_1
6,013,616 UART: [update-reset Success] --
6,014,727 UART: [state] Locking Datavault
6,015,523 UART: [state] Locking PCR0, PCR1 and PCR31
6,016,127 UART: [state] Locking ICCM
6,016,601 UART: [exit] Launching FMC @ 0x40000130
6,021,930 UART:
6,021,946 UART: Running Caliptra FMC ...
6,022,354 UART:
6,022,408 UART: [state] CFI Enabled
6,111,253 UART: [art] Extend RT PCRs Done
6,111,681 UART: [art] Lock RT PCRs Done
6,112,844 UART: [art] Populate DV Done
6,121,177 UART: [fht] FMC Alias Private Key: 7
6,122,229 UART: [art] Derive CDI
6,122,509 UART: [art] Store in in slot 0x4
6,208,202 UART: [art] Derive Key Pair
6,208,562 UART: [art] Store priv key in slot 0x5
6,221,332 UART: [art] Derive Key Pair - Done
6,235,985 UART: [art] Signing Cert with AUTHO
6,236,465 UART: RITY.KEYID = 7
6,251,945 UART: [art] Erasing AUTHORITY.KEYID = 7
6,252,710 UART: [art] PUB.X = F0DED672506918ABF7E669FB7D09F7C5FE5F6D7B86F8DC69585B2B6A559A36ACE38CD838FAC630D8C83BC9F6366F204F
6,259,495 UART: [art] PUB.Y = A3BA30213EA834FC0434C9C7F772F167778A5E52774F5B19C3EBABD476B53BD7A4991B78B111132D08AFA944B17517C3
6,266,443 UART: [art] SIG.R = B33978C7618A5C607BAFF0E2EA86EA1EA274CC15D670C6780B0B5AABECF67348308A103C6F84CC4083BF2B9DBA2383BB
6,273,225 UART: [art] SIG.S = D94E04475293C3EE92ED00AD8905C106C13187A70D2729692EDB804A1077100B496D5C1FEF00E11D1F56ADAD5DCADA9A
6,296,961 UART: Caliptra RT
6,297,214 UART: [state] CFI Enabled
6,579,337 UART: [rt] RT failed reset flow
6,579,768 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,955 ready_for_fw is high
1,362,955 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,469,418 >>> mbox cmd response: success
2,469,418 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,531,344 UART:
2,531,360 UART: Running Caliptra FMC ...
2,531,768 UART:
2,531,822 UART: [state] CFI Enabled
2,542,245 UART: [fht] FMC Alias Private Key: 7
2,650,038 UART: [art] Extend RT PCRs Done
2,650,466 UART: [art] Lock RT PCRs Done
2,651,930 UART: [art] Populate DV Done
2,660,069 UART: [fht] FMC Alias Private Key: 7
2,661,065 UART: [art] Derive CDI
2,661,345 UART: [art] Store in in slot 0x4
2,747,084 UART: [art] Derive Key Pair
2,747,444 UART: [art] Store priv key in slot 0x5
2,760,808 UART: [art] Derive Key Pair - Done
2,775,753 UART: [art] Signing Cert with AUTHO
2,776,233 UART: RITY.KEYID = 7
2,791,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,791,888 UART: [art] PUB.X = C530FD842A1F5512F172E064BD8F855829DF870616DE62A9A927A9FA1FB5BC189E4B977BAA4857AEE84F79CA42EFE6B9
2,798,669 UART: [art] PUB.Y = 17557D5EA3FD2A6AAED1F708D935DA2C9DEDD69BE9671AA0AD602B8DA140F661C72793EBEF766312772B5BA6B1DE739A
2,805,636 UART: [art] SIG.R = 0903EA49AA5808A990251830D0923E69BA685FFB8B0A4941EEAB1001A1543F52C6F1AF21770430F292AAD2DCB256DA45
2,812,392 UART: [art] SIG.S = AF28C12F96F23A66790E935B3362403D3E701AD65FB9E28E5B2B6BF4CD55934DDB95546CF3E4C17D5D0172FC446B8CC1
2,836,583 UART: mbox::rt_entry...
2,836,955 UART: ____ _ _ _ ____ _____
2,837,739 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,838,539 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,307 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,840,075 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,840,843 UART: |_|
2,841,155 UART:
2,948,927 UART: [rt] Runtime listening for mailbox commands...
2,950,078 >>> mbox cmd response data (0 bytes)
2,950,079 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,712,228 >>> mbox cmd response: success
5,725,489 UART:
5,725,505 UART: Running Caliptra FMC ...
5,725,913 UART:
5,725,967 UART: [state] CFI Enabled
5,815,004 UART: [art] Extend RT PCRs Done
5,815,432 UART: [art] Lock RT PCRs Done
5,816,449 UART: [art] Populate DV Done
5,824,564 UART: [fht] FMC Alias Private Key: 7
5,825,706 UART: [art] Derive CDI
5,825,986 UART: [art] Store in in slot 0x4
5,911,671 UART: [art] Derive Key Pair
5,912,031 UART: [art] Store priv key in slot 0x5
5,925,697 UART: [art] Derive Key Pair - Done
5,940,710 UART: [art] Signing Cert with AUTHO
5,941,190 UART: RITY.KEYID = 7
5,956,262 UART: [art] Erasing AUTHORITY.KEYID = 7
5,957,027 UART: [art] PUB.X = 1FD83EB67C01BBBB6679CE39FEFC80A105DAD3A888ED3198690EF9C2FF0EF3BEBB3BDCE408DCFC39A1E5E3D2D33C8843
5,963,814 UART: [art] PUB.Y = 2C195FF66E6513AA5165480BBB8F26E44CD3176F884FEE489B91B7A7A510C48ABDC0DC2CBD4A9129A258256F680FCB84
5,970,770 UART: [art] SIG.R = AE2384A9E18FFD356E45480A7B180A3B85CCBD5AC1BA8112C0808E38265BABAD6CE5D3EE5E1AD0B7BBA34FD6D2012816
5,977,553 UART: [art] SIG.S = 0F5E63B9D731B62ADB54942584CCA478580494B1201C1A414E07DA0368235C1F00ADF1700A147A3CC3D4A5B785A47E12
6,000,915 UART: Caliptra RT
6,001,168 UART: [state] CFI Enabled
6,280,946 UART: [rt] RT failed reset flow
6,281,377 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,346 UART: [kat] SHA2-256
882,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,392 UART: [kat] ++
886,544 UART: [kat] sha1
890,572 UART: [kat] SHA2-256
892,510 UART: [kat] SHA2-384
895,123 UART: [kat] SHA2-512-ACC
897,024 UART: [kat] ECC-384
902,733 UART: [kat] HMAC-384Kdf
907,433 UART: [kat] LMS
1,475,629 UART: [kat] --
1,476,566 UART: [cold-reset] ++
1,477,122 UART: [fht] Storing FHT @ 0x50003400
1,479,949 UART: [idev] ++
1,480,117 UART: [idev] CDI.KEYID = 6
1,480,477 UART: [idev] SUBJECT.KEYID = 7
1,480,901 UART: [idev] UDS.KEYID = 0
1,481,246 ready_for_fw is high
1,481,246 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,177 UART: [idev] Erasing UDS.KEYID = 0
1,506,329 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,979 UART: [idev] --
1,515,820 UART: [ldev] ++
1,515,988 UART: [ldev] CDI.KEYID = 6
1,516,351 UART: [ldev] SUBJECT.KEYID = 5
1,516,777 UART: [ldev] AUTHORITY.KEYID = 7
1,517,240 UART: [ldev] FE.KEYID = 1
1,522,226 UART: [ldev] Erasing FE.KEYID = 1
1,547,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,071 UART: [ldev] --
1,587,584 UART: [fwproc] Waiting for Commands...
1,588,245 UART: [fwproc] Received command 0x46574c44
1,589,036 UART: [fwproc] Received Image of size 78704 bytes
2,479,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,507,146 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,536,498 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,905 >>> mbox cmd response: success
2,618,905 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,619,923 UART: [afmc] ++
2,620,091 UART: [afmc] CDI.KEYID = 6
2,620,453 UART: [afmc] SUBJECT.KEYID = 7
2,620,878 UART: [afmc] AUTHORITY.KEYID = 5
2,655,601 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,929 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,709 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,437 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,684,322 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,012 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,698,099 UART: [afmc] --
2,699,013 UART: [cold-reset] --
2,699,697 UART: [state] Locking Datavault
2,701,090 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,694 UART: [state] Locking ICCM
2,702,122 UART: [exit] Launching FMC @ 0x40000130
2,707,451 UART:
2,707,467 UART: Running Caliptra FMC ...
2,707,875 UART:
2,708,018 UART: [state] CFI Enabled
2,718,667 UART: [fht] FMC Alias Private Key: 7
2,826,766 UART: [art] Extend RT PCRs Done
2,827,194 UART: [art] Lock RT PCRs Done
2,828,710 UART: [art] Populate DV Done
2,836,971 UART: [fht] FMC Alias Private Key: 7
2,837,981 UART: [art] Derive CDI
2,838,261 UART: [art] Store in in slot 0x4
2,923,876 UART: [art] Derive Key Pair
2,924,236 UART: [art] Store priv key in slot 0x5
2,937,132 UART: [art] Derive Key Pair - Done
2,952,222 UART: [art] Signing Cert with AUTHO
2,952,702 UART: RITY.KEYID = 7
2,967,840 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,605 UART: [art] PUB.X = 857DBF7F007DB5087307F42A18887D32746837E666C786215B6E022826C54CD29D3A09F60341493D14D5FADD9079C25E
2,975,330 UART: [art] PUB.Y = EF3AEE97776C6059A072D9064F8D9ED42A46F82A5BF2F34B746F31B85F2BD74AE2B2E64D3248B28B3919A7470511352B
2,982,278 UART: [art] SIG.R = C1E70183D11DEA3F44D5EC6DAC523D126FB00B5197607F9DE1B114FEE15589F16EACB43782BABDAA208993792A66ED62
2,989,056 UART: [art] SIG.S = 8E1A82FD6DAC1B7478C74D42A0552EF1FC82ED0ABB648F6C99CF8A81FD9545266EBE20BDC5A79853D5675661E14FD596
3,013,424 UART: mbox::rt_entry...
3,013,796 UART: ____ _ _ _ ____ _____
3,014,580 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,015,380 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,148 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,016,916 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,017,684 UART: |_|
3,017,996 UART:
3,125,727 UART: [rt] Runtime listening for mailbox commands...
3,126,878 >>> mbox cmd response data (0 bytes)
3,126,879 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,126,994 UART:
3,127,010 UART: Running Caliptra ROM ...
3,127,418 UART:
3,127,559 UART: [state] CFI Enabled
3,130,607 UART: [state] LifecycleState = Unprovisioned
3,131,262 UART: [state] DebugLocked = No
3,131,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,133,523 UART: [kat] SHA2-256
3,927,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,931,569 UART: [kat] ++
3,931,721 UART: [kat] sha1
3,935,929 UART: [kat] SHA2-256
3,937,867 UART: [kat] SHA2-384
3,940,720 UART: [kat] SHA2-512-ACC
3,942,620 UART: [kat] ECC-384
3,948,203 UART: [kat] HMAC-384Kdf
3,952,977 UART: [kat] LMS
4,521,173 UART: [kat] --
4,522,304 UART: [update-reset] ++
5,857,777 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,858,979 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,009,029 >>> mbox cmd response: success
6,009,188 UART: [update-reset] Copying MAN_2 To MAN_1
6,017,202 UART: [update-reset Success] --
6,018,243 UART: [state] Locking Datavault
6,019,109 UART: [state] Locking PCR0, PCR1 and PCR31
6,019,713 UART: [state] Locking ICCM
6,020,331 UART: [exit] Launching FMC @ 0x40000130
6,025,660 UART:
6,025,676 UART: Running Caliptra FMC ...
6,026,084 UART:
6,026,227 UART: [state] CFI Enabled
6,114,896 UART: [art] Extend RT PCRs Done
6,115,324 UART: [art] Lock RT PCRs Done
6,116,465 UART: [art] Populate DV Done
6,124,814 UART: [fht] FMC Alias Private Key: 7
6,125,824 UART: [art] Derive CDI
6,126,104 UART: [art] Store in in slot 0x4
6,211,985 UART: [art] Derive Key Pair
6,212,345 UART: [art] Store priv key in slot 0x5
6,225,561 UART: [art] Derive Key Pair - Done
6,240,393 UART: [art] Signing Cert with AUTHO
6,240,873 UART: RITY.KEYID = 7
6,256,127 UART: [art] Erasing AUTHORITY.KEYID = 7
6,256,892 UART: [art] PUB.X = FA0DAD3DCE58B9E1CA60CADDF87A7CD851D683CA087E3E120680479F4D2E795994A60F246AD48F487DFA6D01C08BFEDC
6,263,671 UART: [art] PUB.Y = 537DF255D39F2D4965181D22CFA72DC4F7616CF5EB1411E3D1A73BF6C20E8B6B3E792447FB0E52CAC7B515C8DFDD2827
6,270,629 UART: [art] SIG.R = 9F83DB6EAC6DA114B69CF15296F83B2D19E5C2CCEAD47B1DB96A3FF121FA91C5AC2115F85C849B8D7BB4C993CC96725C
6,277,421 UART: [art] SIG.S = 303B8F05D6A160BC4070EB6F355AEA207715B1C9F678F3ABA22300CE929C31EDCF758F4052D4E4464D74AC0C0CA5E7DD
6,301,405 UART: Caliptra RT
6,301,750 UART: [state] CFI Enabled
6,586,802 UART: [rt] RT failed reset flow
6,587,233 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,746 ready_for_fw is high
1,362,746 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,819 >>> mbox cmd response: success
2,466,819 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,527,937 UART:
2,527,953 UART: Running Caliptra FMC ...
2,528,361 UART:
2,528,504 UART: [state] CFI Enabled
2,539,157 UART: [fht] FMC Alias Private Key: 7
2,647,250 UART: [art] Extend RT PCRs Done
2,647,678 UART: [art] Lock RT PCRs Done
2,648,980 UART: [art] Populate DV Done
2,657,101 UART: [fht] FMC Alias Private Key: 7
2,658,171 UART: [art] Derive CDI
2,658,451 UART: [art] Store in in slot 0x4
2,744,352 UART: [art] Derive Key Pair
2,744,712 UART: [art] Store priv key in slot 0x5
2,758,484 UART: [art] Derive Key Pair - Done
2,773,034 UART: [art] Signing Cert with AUTHO
2,773,514 UART: RITY.KEYID = 7
2,788,632 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,397 UART: [art] PUB.X = D64286BC95FBB76C7C1BEC1936DF962ED5C4981C3BE61AC6F0BDC4BD695F7C470D5259ADE7452DA0A5B416B806832FB6
2,796,179 UART: [art] PUB.Y = 32C7F8B7F7B5FCBFB13A777148D99D5E6AB45231CE9F82967019B93D2F7971B966955E5B07072E2557C3E79D5F918F3A
2,803,125 UART: [art] SIG.R = 30743E0EC93F920225F39614D3B8E4F4D2215E988A3F10C0CC223D59395403705EA8C447731B61B8DECC8B34C7E68C76
2,809,884 UART: [art] SIG.S = 55D9F64088D279670BE1E5F179B817C1F1ED03B84E6B0E48DC1F22FAE4F1C263ECC55EEE9990BD3EB395E98EFADBF585
2,833,790 UART: mbox::rt_entry...
2,834,162 UART: ____ _ _ _ ____ _____
2,834,946 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,746 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,514 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,282 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,050 UART: |_|
2,838,362 UART:
2,945,025 UART: [rt] Runtime listening for mailbox commands...
2,946,176 >>> mbox cmd response data (0 bytes)
2,946,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,708,791 >>> mbox cmd response: success
5,722,380 UART:
5,722,396 UART: Running Caliptra FMC ...
5,722,804 UART:
5,722,947 UART: [state] CFI Enabled
5,812,602 UART: [art] Extend RT PCRs Done
5,813,030 UART: [art] Lock RT PCRs Done
5,814,457 UART: [art] Populate DV Done
5,822,496 UART: [fht] FMC Alias Private Key: 7
5,823,570 UART: [art] Derive CDI
5,823,850 UART: [art] Store in in slot 0x4
5,910,013 UART: [art] Derive Key Pair
5,910,373 UART: [art] Store priv key in slot 0x5
5,923,107 UART: [art] Derive Key Pair - Done
5,937,729 UART: [art] Signing Cert with AUTHO
5,938,209 UART: RITY.KEYID = 7
5,953,615 UART: [art] Erasing AUTHORITY.KEYID = 7
5,954,380 UART: [art] PUB.X = 8B8CB3F3DC3DA8AE88E4506DA02613DA1161ADB367C028A8B303F7908BEE883F3866274F422F3C0ED77F43FB75280853
5,961,147 UART: [art] PUB.Y = 2CCCFC55A2534A0A9C0592BCD472764D07B6322324AFB31AF1443E05BC9443CD92E2644C36CFBA871F6D49A39D5510E9
5,968,093 UART: [art] SIG.R = 4EAA6C0D03782A798CF33A934CA0CA13AEBAA3D2355C361C5D89B163163FD7AF102B7EFD139AF1DA50DE108392FF8208
5,974,870 UART: [art] SIG.S = 9BEBC4AF88A7F1F62001ACB730BCE51312B3A10EFE210DBC9E8F1A5C2E56B905640C6345AC20984CF7D62698C4A9E524
5,999,236 UART: Caliptra RT
5,999,581 UART: [state] CFI Enabled
6,279,445 UART: [rt] RT failed reset flow
6,279,876 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
893,382 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,507 UART: [kat] ++
897,659 UART: [kat] sha1
901,871 UART: [kat] SHA2-256
903,811 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
918,084 UART: [kat] HMAC-384Kdf
922,768 UART: [kat] LMS
1,171,096 UART: [kat] --
1,172,121 UART: [cold-reset] ++
1,172,657 UART: [fht] FHT @ 0x50003400
1,175,280 UART: [idev] ++
1,175,448 UART: [idev] CDI.KEYID = 6
1,175,808 UART: [idev] SUBJECT.KEYID = 7
1,176,232 UART: [idev] UDS.KEYID = 0
1,176,577 ready_for_fw is high
1,176,577 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,204 UART: [idev] Erasing UDS.KEYID = 0
1,201,373 UART: [idev] Sha1 KeyId Algorithm
1,209,981 UART: [idev] --
1,210,911 UART: [ldev] ++
1,211,079 UART: [ldev] CDI.KEYID = 6
1,211,442 UART: [ldev] SUBJECT.KEYID = 5
1,211,868 UART: [ldev] AUTHORITY.KEYID = 7
1,212,331 UART: [ldev] FE.KEYID = 1
1,217,227 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,529 UART: [ldev] --
1,282,834 UART: [fwproc] Wait for Commands...
1,283,514 UART: [fwproc] Recv command 0x46574c44
1,284,242 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,960 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,245 >>> mbox cmd response: success
2,312,245 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,313,285 UART: [afmc] ++
2,313,453 UART: [afmc] CDI.KEYID = 6
2,313,815 UART: [afmc] SUBJECT.KEYID = 7
2,314,240 UART: [afmc] AUTHORITY.KEYID = 5
2,349,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,878 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,491 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,210 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,918 UART: [afmc] --
2,393,016 UART: [cold-reset] --
2,393,870 UART: [state] Locking Datavault
2,395,207 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,811 UART: [state] Locking ICCM
2,396,463 UART: [exit] Launching FMC @ 0x40000130
2,401,792 UART:
2,401,808 UART: Running Caliptra FMC ...
2,402,216 UART:
2,402,270 UART: [state] CFI Enabled
2,412,509 UART: [fht] FMC Alias Private Key: 7
2,520,272 UART: [art] Extend RT PCRs Done
2,520,700 UART: [art] Lock RT PCRs Done
2,522,048 UART: [art] Populate DV Done
2,530,269 UART: [fht] FMC Alias Private Key: 7
2,531,437 UART: [art] Derive CDI
2,531,717 UART: [art] Store in in slot 0x4
2,617,370 UART: [art] Derive Key Pair
2,617,730 UART: [art] Store priv key in slot 0x5
2,630,562 UART: [art] Derive Key Pair - Done
2,645,384 UART: [art] Signing Cert with AUTHO
2,645,864 UART: RITY.KEYID = 7
2,661,124 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,889 UART: [art] PUB.X = 942A04FC7F47A237355B178618757169A4D8B9334DEC605C93609DB57CECE7C70BC933FAC8BB49F2AF280AF61518ACF1
2,668,658 UART: [art] PUB.Y = B3BAEB5DEC01FDA7803B48A344D52997A355B2FA659F8AE9F3376ECC4DA444FD71049336B2DF06FE84BBD71F994A5A15
2,675,617 UART: [art] SIG.R = 20F79DCC9AF7F07504BBF7C25BEDA359674C05D7B8856F99C24A1309AEAC57A4AD9AEE993A8768764FFF94BF95B3D691
2,682,394 UART: [art] SIG.S = 853D98EA77E9FB48A601B4649FD08E008CF5AA1F31DA8A875386129A7F0D42EED10CD3FD3D9789513B3F05B77BCB348B
2,705,923 UART: mbox::rt_entry...
2,706,295 UART: ____ _ _ _ ____ _____
2,707,079 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,879 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,647 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,415 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,183 UART: |_|
2,710,495 UART:
2,817,501 UART: [rt] Runtime listening for mailbox commands...
2,818,652 >>> mbox cmd response data (0 bytes)
2,818,653 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,818,765 UART:
2,818,781 UART: Running Caliptra ROM ...
2,819,189 UART:
2,819,244 UART: [state] CFI Enabled
2,821,978 UART: [state] LifecycleState = Unprovisioned
2,822,633 UART: [state] DebugLocked = No
2,823,179 UART: [state] WD Timer not started. Device not locked for debugging
2,824,309 UART: [kat] SHA2-256
3,629,959 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,634,084 UART: [kat] ++
3,634,236 UART: [kat] sha1
3,638,518 UART: [kat] SHA2-256
3,640,458 UART: [kat] SHA2-384
3,643,197 UART: [kat] SHA2-512-ACC
3,645,097 UART: [kat] ECC-384
3,655,004 UART: [kat] HMAC-384Kdf
3,659,626 UART: [kat] LMS
3,907,954 UART: [kat] --
3,908,870 UART: [update-reset] ++
5,221,727 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,222,894 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,372,892 >>> mbox cmd response: success
5,373,125 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,139 UART: [update-reset Success] --
5,382,254 UART: [state] Locking Datavault
5,383,000 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,604 UART: [state] Locking ICCM
5,384,052 UART: [exit] Launching FMC @ 0x40000130
5,389,381 UART:
5,389,397 UART: Running Caliptra FMC ...
5,389,805 UART:
5,389,859 UART: [state] CFI Enabled
5,478,780 UART: [art] Extend RT PCRs Done
5,479,208 UART: [art] Lock RT PCRs Done
5,480,363 UART: [art] Populate DV Done
5,488,484 UART: [fht] FMC Alias Private Key: 7
5,489,424 UART: [art] Derive CDI
5,489,704 UART: [art] Store in in slot 0x4
5,575,473 UART: [art] Derive Key Pair
5,575,833 UART: [art] Store priv key in slot 0x5
5,588,655 UART: [art] Derive Key Pair - Done
5,603,519 UART: [art] Signing Cert with AUTHO
5,603,999 UART: RITY.KEYID = 7
5,619,265 UART: [art] Erasing AUTHORITY.KEYID = 7
5,620,030 UART: [art] PUB.X = 89178F70BDB0738BAAE12E95F6248B591609381E19573E8B06CD284951B4B4DE349376CAE8369D5F5B7A254D90D84A49
5,626,792 UART: [art] PUB.Y = 0F8B17738EF5131AC9AEB240F004BDBFD8B1B85F6DAC7D561FBC59AC9B596BE2FEA434949AE9CE16C454EA9CAAAD33FB
5,633,768 UART: [art] SIG.R = D18089E62467F20CFF361D1F636FDAF0331B7851FC8570B267BF7150996EC9B63EA7526416031608D533F4B26A0E5B36
5,640,522 UART: [art] SIG.S = B95EA722E030F6E5CA6EB63A32A6C1E947F9CAB1B77D544B82DF49BB208C66A8CF0C484622D4AC7BCD2B69C92964A91F
5,664,480 UART: Caliptra RT
5,664,733 UART: [state] CFI Enabled
5,951,754 UART: [rt] RT failed reset flow
5,952,185 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,865 ready_for_fw is high
1,060,865 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,180 >>> mbox cmd response: success
2,166,180 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,228,692 UART:
2,228,708 UART: Running Caliptra FMC ...
2,229,116 UART:
2,229,170 UART: [state] CFI Enabled
2,239,625 UART: [fht] FMC Alias Private Key: 7
2,347,474 UART: [art] Extend RT PCRs Done
2,347,902 UART: [art] Lock RT PCRs Done
2,349,534 UART: [art] Populate DV Done
2,357,867 UART: [fht] FMC Alias Private Key: 7
2,359,037 UART: [art] Derive CDI
2,359,317 UART: [art] Store in in slot 0x4
2,444,382 UART: [art] Derive Key Pair
2,444,742 UART: [art] Store priv key in slot 0x5
2,458,066 UART: [art] Derive Key Pair - Done
2,472,400 UART: [art] Signing Cert with AUTHO
2,472,880 UART: RITY.KEYID = 7
2,488,968 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,733 UART: [art] PUB.X = B6CDBAE305C25FE9592FBE6DE3494577A1AD1F7C9977D80BC7351495695D74EE0B356D054D1A01B33CE945C690B743AF
2,496,498 UART: [art] PUB.Y = 8C1ED44606E8E3AFD95B785D66C0982D46B7620DFC54133A87E6516596FB11AC5309A0A6E47FFCC13D6F69F48D74EDC3
2,503,449 UART: [art] SIG.R = E61830D1003767AEB392CD04520E7E87816925736ADA01D1A635A8BD837035F9F75C258D3E7F0101BF47C179E6436407
2,510,171 UART: [art] SIG.S = 483FAE318BF54A95A64C215BE420A3E93E93D566E8DA5C2CB4CD829783A4CF2EB29A76875E0C4A1339D35B0ECC1E239A
2,533,698 UART: mbox::rt_entry...
2,534,070 UART: ____ _ _ _ ____ _____
2,534,854 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,654 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,422 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,190 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,958 UART: |_|
2,538,270 UART:
2,644,258 UART: [rt] Runtime listening for mailbox commands...
2,645,409 >>> mbox cmd response data (0 bytes)
2,645,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,083,560 >>> mbox cmd response: success
5,096,852 UART:
5,096,868 UART: Running Caliptra FMC ...
5,097,276 UART:
5,097,330 UART: [state] CFI Enabled
5,186,745 UART: [art] Extend RT PCRs Done
5,187,173 UART: [art] Lock RT PCRs Done
5,188,468 UART: [art] Populate DV Done
5,196,561 UART: [fht] FMC Alias Private Key: 7
5,197,689 UART: [art] Derive CDI
5,197,969 UART: [art] Store in in slot 0x4
5,283,314 UART: [art] Derive Key Pair
5,283,674 UART: [art] Store priv key in slot 0x5
5,297,188 UART: [art] Derive Key Pair - Done
5,312,194 UART: [art] Signing Cert with AUTHO
5,312,674 UART: RITY.KEYID = 7
5,327,928 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,693 UART: [art] PUB.X = FD3D2361D4250E2B816AD35FEBD4F440C3FEB1DE43CF1C2FB133C539F70439A2D9748B5291D2815E9256C9C426B16397
5,335,463 UART: [art] PUB.Y = 1923D0CBB630CC68AB47A4384813F81BAC364C45DE215705DAAD02A41057B4B251679A50D41A34255E7AF8ED044875DC
5,342,408 UART: [art] SIG.R = 349818EA076093B8912ED9EB67C168E0BA231242918F2A1E2DDC37EA6C536F086B77CA4F30851ACE42A3FC6640BA4B48
5,349,178 UART: [art] SIG.S = E7F9609139DD9B63F8CBE66ACC186F80E65780DC4876D29F6A5D0A4E32AC50E46D5E63770A600894DBED5C4D23B52157
5,373,030 UART: Caliptra RT
5,373,283 UART: [state] CFI Enabled
5,655,931 UART: [rt] RT failed reset flow
5,656,362 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
893,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,862 UART: [kat] ++
898,014 UART: [kat] sha1
902,210 UART: [kat] SHA2-256
904,150 UART: [kat] SHA2-384
906,805 UART: [kat] SHA2-512-ACC
908,706 UART: [kat] ECC-384
918,285 UART: [kat] HMAC-384Kdf
923,019 UART: [kat] LMS
1,171,347 UART: [kat] --
1,172,072 UART: [cold-reset] ++
1,172,416 UART: [fht] FHT @ 0x50003400
1,174,995 UART: [idev] ++
1,175,163 UART: [idev] CDI.KEYID = 6
1,175,523 UART: [idev] SUBJECT.KEYID = 7
1,175,947 UART: [idev] UDS.KEYID = 0
1,176,292 ready_for_fw is high
1,176,292 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,973 UART: [idev] Erasing UDS.KEYID = 0
1,201,160 UART: [idev] Sha1 KeyId Algorithm
1,209,438 UART: [idev] --
1,210,548 UART: [ldev] ++
1,210,716 UART: [ldev] CDI.KEYID = 6
1,211,079 UART: [ldev] SUBJECT.KEYID = 5
1,211,505 UART: [ldev] AUTHORITY.KEYID = 7
1,211,968 UART: [ldev] FE.KEYID = 1
1,217,240 UART: [ldev] Erasing FE.KEYID = 1
1,243,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,660 UART: [ldev] --
1,282,945 UART: [fwproc] Wait for Commands...
1,283,535 UART: [fwproc] Recv command 0x46574c44
1,284,263 UART: [fwproc] Recv'd Img size: 78704 bytes
2,174,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,367 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,684 >>> mbox cmd response: success
2,313,684 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,314,864 UART: [afmc] ++
2,315,032 UART: [afmc] CDI.KEYID = 6
2,315,394 UART: [afmc] SUBJECT.KEYID = 7
2,315,819 UART: [afmc] AUTHORITY.KEYID = 5
2,351,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,543 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,271 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,156 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,875 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,605 UART: [afmc] --
2,394,651 UART: [cold-reset] --
2,395,553 UART: [state] Locking Datavault
2,396,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,256 UART: [state] Locking ICCM
2,397,906 UART: [exit] Launching FMC @ 0x40000130
2,403,235 UART:
2,403,251 UART: Running Caliptra FMC ...
2,403,659 UART:
2,403,802 UART: [state] CFI Enabled
2,414,375 UART: [fht] FMC Alias Private Key: 7
2,521,740 UART: [art] Extend RT PCRs Done
2,522,168 UART: [art] Lock RT PCRs Done
2,523,594 UART: [art] Populate DV Done
2,531,727 UART: [fht] FMC Alias Private Key: 7
2,532,719 UART: [art] Derive CDI
2,532,999 UART: [art] Store in in slot 0x4
2,618,370 UART: [art] Derive Key Pair
2,618,730 UART: [art] Store priv key in slot 0x5
2,631,544 UART: [art] Derive Key Pair - Done
2,646,372 UART: [art] Signing Cert with AUTHO
2,646,852 UART: RITY.KEYID = 7
2,662,494 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,259 UART: [art] PUB.X = 7BB05F340F04A7AC7B11A8B262A2D30CBB934C2A7A806BD9DA06B6EC6B5B557B96714CF125E5176B25AD182E61B99D8A
2,670,031 UART: [art] PUB.Y = 35E6059F08DDE73A8E7C3B94772188022E1DCE7A984B0B5F7094B602A5DBB717E518AAB9CF6E528D8E71AC734DB0271A
2,676,976 UART: [art] SIG.R = 4F6CCC0971F95DDB6AA2D852D76D4ADCF63F8D7048A300EC57D317C5F6A3CB7D3728A7C717A0C77B46220AFCD35A6895
2,683,734 UART: [art] SIG.S = 84285746BE0EDEC3186B61FDC675AAA4C7DFF119442B030EEC20D241249240336C17E219F8D4AEB864AB4D766C5DA149
2,707,078 UART: mbox::rt_entry...
2,707,450 UART: ____ _ _ _ ____ _____
2,708,234 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,034 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,802 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,570 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,338 UART: |_|
2,711,650 UART:
2,818,744 UART: [rt] Runtime listening for mailbox commands...
2,819,895 >>> mbox cmd response data (0 bytes)
2,819,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,820,008 UART:
2,820,024 UART: Running Caliptra ROM ...
2,820,432 UART:
2,820,574 UART: [state] CFI Enabled
2,823,412 UART: [state] LifecycleState = Unprovisioned
2,824,067 UART: [state] DebugLocked = No
2,824,549 UART: [state] WD Timer not started. Device not locked for debugging
2,825,909 UART: [kat] SHA2-256
3,631,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,635,684 UART: [kat] ++
3,635,836 UART: [kat] sha1
3,640,100 UART: [kat] SHA2-256
3,642,040 UART: [kat] SHA2-384
3,644,725 UART: [kat] SHA2-512-ACC
3,646,625 UART: [kat] ECC-384
3,656,758 UART: [kat] HMAC-384Kdf
3,661,328 UART: [kat] LMS
3,909,656 UART: [kat] --
3,910,570 UART: [update-reset] ++
5,224,183 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,225,158 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,375,156 >>> mbox cmd response: success
5,375,477 UART: [update-reset] Copying MAN_2 To MAN_1
5,383,491 UART: [update-reset Success] --
5,384,530 UART: [state] Locking Datavault
5,385,408 UART: [state] Locking PCR0, PCR1 and PCR31
5,386,012 UART: [state] Locking ICCM
5,386,610 UART: [exit] Launching FMC @ 0x40000130
5,391,939 UART:
5,391,955 UART: Running Caliptra FMC ...
5,392,363 UART:
5,392,506 UART: [state] CFI Enabled
5,481,607 UART: [art] Extend RT PCRs Done
5,482,035 UART: [art] Lock RT PCRs Done
5,483,258 UART: [art] Populate DV Done
5,491,381 UART: [fht] FMC Alias Private Key: 7
5,492,343 UART: [art] Derive CDI
5,492,623 UART: [art] Store in in slot 0x4
5,578,234 UART: [art] Derive Key Pair
5,578,594 UART: [art] Store priv key in slot 0x5
5,591,518 UART: [art] Derive Key Pair - Done
5,606,357 UART: [art] Signing Cert with AUTHO
5,606,837 UART: RITY.KEYID = 7
5,621,837 UART: [art] Erasing AUTHORITY.KEYID = 7
5,622,602 UART: [art] PUB.X = F0937F887C545C2BB978AEF9AF6DDDEF755F4864AC8C2FBCEDE9A2B9AAE4F5AA58B953DB0D4C70847C836618BD569AF9
5,629,395 UART: [art] PUB.Y = 55527D0C8F60EBDDCA53ED23FF0BD1DFDA6DAF0EB213ED8F3C0F6F54235F800E9BABDB9C9B188E28B223BA5E3514A538
5,636,358 UART: [art] SIG.R = 3D6749CF7A9C3E5C825E8540761D4BBE40204241A357A9CFD5F10A59DF4C710BE4BF32C5B6520B1C8CCD27DF0AEFBB44
5,643,134 UART: [art] SIG.S = 57B519ED99A0107EFB7DF62906AD79579F57355BABCA5CA88A59BDB053CFE5382FF2A575BE953C616F0C5E04E6BFBCE1
5,667,272 UART: Caliptra RT
5,667,617 UART: [state] CFI Enabled
5,949,423 UART: [rt] RT failed reset flow
5,949,854 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,158 ready_for_fw is high
1,060,158 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,597 >>> mbox cmd response: success
2,164,597 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,226,667 UART:
2,226,683 UART: Running Caliptra FMC ...
2,227,091 UART:
2,227,234 UART: [state] CFI Enabled
2,237,899 UART: [fht] FMC Alias Private Key: 7
2,345,988 UART: [art] Extend RT PCRs Done
2,346,416 UART: [art] Lock RT PCRs Done
2,347,918 UART: [art] Populate DV Done
2,356,085 UART: [fht] FMC Alias Private Key: 7
2,357,041 UART: [art] Derive CDI
2,357,321 UART: [art] Store in in slot 0x4
2,442,948 UART: [art] Derive Key Pair
2,443,308 UART: [art] Store priv key in slot 0x5
2,456,506 UART: [art] Derive Key Pair - Done
2,471,420 UART: [art] Signing Cert with AUTHO
2,471,900 UART: RITY.KEYID = 7
2,486,912 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,677 UART: [art] PUB.X = DDE7CBCB9D14DE82B43796E977570DDEDC99D2D0B97DFA06C23FFAC9723173DD92DA4D47E350E15EC62947EF3D33E379
2,494,461 UART: [art] PUB.Y = A930B51D85ED6F64B24A247ADD112A71F3408BFD822141A7BF62106513BFA84EEF9ACB57B5033524C579BE8D9A80E97D
2,501,418 UART: [art] SIG.R = D38903C199E3AD416DD4571B320438B6AA49261E62D656EBD6B390B82FBBB23E19CC53067AA444F6C37ECFD3562708A7
2,508,182 UART: [art] SIG.S = 20488E52F189591176094949681F9DF35E6D5D51702A831E02AF3D1D273A1D8E6FCD677DF7E9522797D5D412519F4B93
2,531,375 UART: mbox::rt_entry...
2,531,747 UART: ____ _ _ _ ____ _____
2,532,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,635 UART: |_|
2,535,947 UART:
2,641,901 UART: [rt] Runtime listening for mailbox commands...
2,643,052 >>> mbox cmd response data (0 bytes)
2,643,053 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,083,106 >>> mbox cmd response: success
5,096,616 UART:
5,096,632 UART: Running Caliptra FMC ...
5,097,040 UART:
5,097,183 UART: [state] CFI Enabled
5,186,546 UART: [art] Extend RT PCRs Done
5,186,974 UART: [art] Lock RT PCRs Done
5,188,205 UART: [art] Populate DV Done
5,196,440 UART: [fht] FMC Alias Private Key: 7
5,197,428 UART: [art] Derive CDI
5,197,708 UART: [art] Store in in slot 0x4
5,283,267 UART: [art] Derive Key Pair
5,283,627 UART: [art] Store priv key in slot 0x5
5,296,845 UART: [art] Derive Key Pair - Done
5,311,459 UART: [art] Signing Cert with AUTHO
5,311,939 UART: RITY.KEYID = 7
5,326,995 UART: [art] Erasing AUTHORITY.KEYID = 7
5,327,760 UART: [art] PUB.X = 6A668F03CFB3DEBCE44B9310FF67D5290F118799B460FC6C368C85BDB8AC3B6174C26033A0F042EC769D50CB439B35CD
5,334,536 UART: [art] PUB.Y = 138C93EC290AB6AB4341429753B3469A9876A2C674CF5ED6CA775A3E79489612D77615A7B4FAC80C9BCA40294C152628
5,341,478 UART: [art] SIG.R = 9FDC70C2E0CF21718A1B497D7F27BE6A45A54EE4C859D6D24CAC8B35457198FEA29D97FC59574ADF0A070A6EB77842E7
5,348,253 UART: [art] SIG.S = CCBB53572EDEBBF5876BE834749D0E69B176FDB099F83EFC7EF8BB09ADE28F6C1629B8487921E135BF5A5B0841C97761
5,372,267 UART: Caliptra RT
5,372,612 UART: [state] CFI Enabled
5,652,859 UART: [rt] RT failed reset flow
5,653,290 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,712 UART: [state] LifecycleState = Unprovisioned
86,367 UART: [state] DebugLocked = No
86,967 UART: [state] WD Timer not started. Device not locked for debugging
88,292 UART: [kat] SHA2-256
891,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,971 UART: [kat] ++
896,123 UART: [kat] sha1
900,273 UART: [kat] SHA2-256
902,213 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
916,410 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,319 UART: [cold-reset] ++
1,170,697 UART: [fht] FHT @ 0x50003400
1,173,405 UART: [idev] ++
1,173,573 UART: [idev] CDI.KEYID = 6
1,173,934 UART: [idev] SUBJECT.KEYID = 7
1,174,359 UART: [idev] UDS.KEYID = 0
1,174,705 ready_for_fw is high
1,174,705 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,959 UART: [idev] Erasing UDS.KEYID = 0
1,198,393 UART: [idev] Sha1 KeyId Algorithm
1,207,157 UART: [idev] --
1,208,120 UART: [ldev] ++
1,208,288 UART: [ldev] CDI.KEYID = 6
1,208,652 UART: [ldev] SUBJECT.KEYID = 5
1,209,079 UART: [ldev] AUTHORITY.KEYID = 7
1,209,542 UART: [ldev] FE.KEYID = 1
1,214,880 UART: [ldev] Erasing FE.KEYID = 1
1,241,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,216 UART: [ldev] --
1,280,612 UART: [fwproc] Wait for Commands...
1,281,367 UART: [fwproc] Recv command 0x46574c44
1,282,100 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,383 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,310,717 >>> mbox cmd response: success
2,310,717 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,311,790 UART: [afmc] ++
2,311,958 UART: [afmc] CDI.KEYID = 6
2,312,321 UART: [afmc] SUBJECT.KEYID = 7
2,312,747 UART: [afmc] AUTHORITY.KEYID = 5
2,347,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,021 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,750 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,633 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,352 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,087 UART: [afmc] --
2,391,147 UART: [cold-reset] --
2,391,863 UART: [state] Locking Datavault
2,393,078 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,682 UART: [state] Locking ICCM
2,394,154 UART: [exit] Launching FMC @ 0x40000130
2,399,483 UART:
2,399,499 UART: Running Caliptra FMC ...
2,399,907 UART:
2,399,961 UART: [state] CFI Enabled
2,410,250 UART: [fht] FMC Alias Private Key: 7
2,517,749 UART: [art] Extend RT PCRs Done
2,518,177 UART: [art] Lock RT PCRs Done
2,519,597 UART: [art] Populate DV Done
2,527,812 UART: [fht] FMC Alias Private Key: 7
2,528,834 UART: [art] Derive CDI
2,529,114 UART: [art] Store in in slot 0x4
2,614,723 UART: [art] Derive Key Pair
2,615,083 UART: [art] Store priv key in slot 0x5
2,628,965 UART: [art] Derive Key Pair - Done
2,643,733 UART: [art] Signing Cert with AUTHO
2,644,213 UART: RITY.KEYID = 7
2,659,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,374 UART: [art] PUB.X = 89B1A20C252AF22CCE6DD0C40225B3A80BCD7BF87BF374353D8536967E9B7EC0EA9B13AAD62A4472BE91BC25DE442DAF
2,667,155 UART: [art] PUB.Y = A46F75CC465EE5CDCB8F90844A4FA213484FC4A39D01B314D353B9AE5AF713A00EA0E27183B5ED4964502EF6A565FB3E
2,674,113 UART: [art] SIG.R = A8DEDF920E60447238940896F84A65EE17BEA335BE9056356579CA077798BE6DE55EC60E5A2D9D42532A74758EBC0C93
2,680,870 UART: [art] SIG.S = FEBB64EB316097F8F2FE2BBA331EA9D0599E2CF1A66B28C4ACB33D00502168C19BD36D0A0366410593DA0852E8D937C4
2,704,045 UART: mbox::rt_entry...
2,704,417 UART: ____ _ _ _ ____ _____
2,705,201 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,001 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,769 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,537 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,305 UART: |_|
2,708,617 UART:
2,814,908 UART: [rt] Runtime listening for mailbox commands...
2,816,059 >>> mbox cmd response data (0 bytes)
2,816,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,816,172 UART:
2,816,188 UART: Running Caliptra ROM ...
2,816,596 UART:
2,816,651 UART: [state] CFI Enabled
2,819,315 UART: [state] LifecycleState = Unprovisioned
2,819,970 UART: [state] DebugLocked = No
2,820,628 UART: [state] WD Timer not started. Device not locked for debugging
2,821,758 UART: [kat] SHA2-256
3,625,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,629,437 UART: [kat] ++
3,629,589 UART: [kat] sha1
3,633,627 UART: [kat] SHA2-256
3,635,567 UART: [kat] SHA2-384
3,638,322 UART: [kat] SHA2-512-ACC
3,640,222 UART: [kat] ECC-384
3,649,693 UART: [kat] HMAC-384Kdf
3,654,243 UART: [kat] LMS
3,902,555 UART: [kat] --
3,903,237 UART: [update-reset] ++
5,216,517 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,217,552 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,367,550 >>> mbox cmd response: success
5,367,679 UART: [update-reset] Copying MAN_2 To MAN_1
5,375,693 UART: [update-reset Success] --
5,376,568 UART: [state] Locking Datavault
5,377,472 UART: [state] Locking PCR0, PCR1 and PCR31
5,378,076 UART: [state] Locking ICCM
5,378,556 UART: [exit] Launching FMC @ 0x40000130
5,383,885 UART:
5,383,901 UART: Running Caliptra FMC ...
5,384,309 UART:
5,384,363 UART: [state] CFI Enabled
5,473,786 UART: [art] Extend RT PCRs Done
5,474,214 UART: [art] Lock RT PCRs Done
5,475,557 UART: [art] Populate DV Done
5,483,848 UART: [fht] FMC Alias Private Key: 7
5,484,874 UART: [art] Derive CDI
5,485,154 UART: [art] Store in in slot 0x4
5,570,815 UART: [art] Derive Key Pair
5,571,175 UART: [art] Store priv key in slot 0x5
5,584,635 UART: [art] Derive Key Pair - Done
5,599,517 UART: [art] Signing Cert with AUTHO
5,599,997 UART: RITY.KEYID = 7
5,615,265 UART: [art] Erasing AUTHORITY.KEYID = 7
5,616,030 UART: [art] PUB.X = 1D5306EDFFE1A85A1A39169B2B50233E63AB3A29ECC767C175B64DCDD0F2616924C5D9AE1DA4B3FFBD8E9002FCF12827
5,622,812 UART: [art] PUB.Y = F41EA4D76DE6A5AFB94B4295F60E0050FED4B396F5B3D46AD14C53F78B323EAFDB17EE09735820D0AE9DFEC2B6C692F5
5,629,756 UART: [art] SIG.R = 1AC001342AE188757D3DDB72941AD375335A443CBA5462CBA9A1F4BDD14C7A758CA213F8F20FF90DF7AF24BDD60F35FC
5,636,532 UART: [art] SIG.S = 578F9B5859C8E0D54C92CE08956E5B35ACC7F285318A27B02F8F5D5099F734D48F26BC9A2248355267283952F9D4C942
5,660,174 UART: Caliptra RT
5,660,427 UART: [state] CFI Enabled
5,939,449 UART: [rt] RT failed reset flow
5,939,880 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,736 ready_for_fw is high
1,055,736 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,365 >>> mbox cmd response: success
2,161,365 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,223,489 UART:
2,223,505 UART: Running Caliptra FMC ...
2,223,913 UART:
2,223,967 UART: [state] CFI Enabled
2,234,310 UART: [fht] FMC Alias Private Key: 7
2,342,265 UART: [art] Extend RT PCRs Done
2,342,693 UART: [art] Lock RT PCRs Done
2,344,131 UART: [art] Populate DV Done
2,352,276 UART: [fht] FMC Alias Private Key: 7
2,353,354 UART: [art] Derive CDI
2,353,634 UART: [art] Store in in slot 0x4
2,439,137 UART: [art] Derive Key Pair
2,439,497 UART: [art] Store priv key in slot 0x5
2,452,207 UART: [art] Derive Key Pair - Done
2,467,038 UART: [art] Signing Cert with AUTHO
2,467,518 UART: RITY.KEYID = 7
2,482,996 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,761 UART: [art] PUB.X = 16D84A53972C1B18AE8CAAB36AA10BDD9D293D6CBE65D42B1F420B1ECA243C471914857E436A06A639D39DD3F68876B2
2,490,532 UART: [art] PUB.Y = AAB96B659CDAC75D4DA242AB2BF2ED6DBFF11453ECB4201C19D448DCD99095D71F42DBFB67753E76FBA462C34B90CF7F
2,497,508 UART: [art] SIG.R = 14EEF9FABE9CD52D622D9182B6CC02E14D872F26FAC63D03EFBF07760E6629F2BD19A685BDD4687131F5F18B8351970C
2,504,275 UART: [art] SIG.S = C938BA262CE3230209D722D81D3DFAB6E5DD2942EDFC7524E6DD979739AC7F83606908B95E5E9D1CB2D14818570277E7
2,527,534 UART: mbox::rt_entry...
2,527,906 UART: ____ _ _ _ ____ _____
2,528,690 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,490 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,258 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,026 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,794 UART: |_|
2,532,106 UART:
2,639,112 UART: [rt] Runtime listening for mailbox commands...
2,640,263 >>> mbox cmd response data (0 bytes)
2,640,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,074,181 >>> mbox cmd response: success
5,087,499 UART:
5,087,515 UART: Running Caliptra FMC ...
5,087,923 UART:
5,087,977 UART: [state] CFI Enabled
5,176,628 UART: [art] Extend RT PCRs Done
5,177,056 UART: [art] Lock RT PCRs Done
5,178,623 UART: [art] Populate DV Done
5,186,612 UART: [fht] FMC Alias Private Key: 7
5,187,702 UART: [art] Derive CDI
5,187,982 UART: [art] Store in in slot 0x4
5,273,243 UART: [art] Derive Key Pair
5,273,603 UART: [art] Store priv key in slot 0x5
5,286,975 UART: [art] Derive Key Pair - Done
5,301,859 UART: [art] Signing Cert with AUTHO
5,302,339 UART: RITY.KEYID = 7
5,317,505 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,270 UART: [art] PUB.X = 1244E6CC5A03B924AD6FB64D3095454D4A7457CE37F589AA01180085293B37740C0D59207AEE5E7048F186BBD108F0A1
5,325,001 UART: [art] PUB.Y = 357ECDA24217D488DBD1291482929F14CEBD68BAAD729B4C2EE3BE7BCE4582222E156C18891219944D9235B5EC722693
5,331,953 UART: [art] SIG.R = CBF8D21FB34CF65ABFA18E17515BA44DC3FC62399EFB9FC7A7105DF662E0E70D5099891247FBA6C13D49832E91B0FF2B
5,338,738 UART: [art] SIG.S = 2C1AC207D994D4465874F498E1D850A927C3B1C0CD558A4379958415D73A785073053E820ED6FCBBCC9D44025C9865AF
5,362,901 UART: Caliptra RT
5,363,154 UART: [state] CFI Enabled
5,643,506 UART: [rt] RT failed reset flow
5,643,937 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,869 UART: [state] LifecycleState = Unprovisioned
86,524 UART: [state] DebugLocked = No
87,220 UART: [state] WD Timer not started. Device not locked for debugging
88,519 UART: [kat] SHA2-256
892,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,198 UART: [kat] ++
896,350 UART: [kat] sha1
900,684 UART: [kat] SHA2-256
902,624 UART: [kat] SHA2-384
905,447 UART: [kat] SHA2-512-ACC
907,348 UART: [kat] ECC-384
917,267 UART: [kat] HMAC-384Kdf
921,957 UART: [kat] LMS
1,170,269 UART: [kat] --
1,171,104 UART: [cold-reset] ++
1,171,464 UART: [fht] FHT @ 0x50003400
1,174,150 UART: [idev] ++
1,174,318 UART: [idev] CDI.KEYID = 6
1,174,679 UART: [idev] SUBJECT.KEYID = 7
1,175,104 UART: [idev] UDS.KEYID = 0
1,175,450 ready_for_fw is high
1,175,450 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,098 UART: [idev] Erasing UDS.KEYID = 0
1,200,356 UART: [idev] Sha1 KeyId Algorithm
1,209,072 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,541 UART: [ldev] SUBJECT.KEYID = 5
1,210,968 UART: [ldev] AUTHORITY.KEYID = 7
1,211,431 UART: [ldev] FE.KEYID = 1
1,216,839 UART: [ldev] Erasing FE.KEYID = 1
1,243,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,267 UART: [ldev] --
1,282,667 UART: [fwproc] Wait for Commands...
1,283,492 UART: [fwproc] Recv command 0x46574c44
1,284,225 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,513 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,822 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,296 >>> mbox cmd response: success
2,314,296 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,315,489 UART: [afmc] ++
2,315,657 UART: [afmc] CDI.KEYID = 6
2,316,020 UART: [afmc] SUBJECT.KEYID = 7
2,316,446 UART: [afmc] AUTHORITY.KEYID = 5
2,352,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,266 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,995 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,878 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,597 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,620 UART: [afmc] --
2,395,562 UART: [cold-reset] --
2,396,412 UART: [state] Locking Datavault
2,397,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,139 UART: [state] Locking ICCM
2,398,765 UART: [exit] Launching FMC @ 0x40000130
2,404,094 UART:
2,404,110 UART: Running Caliptra FMC ...
2,404,518 UART:
2,404,661 UART: [state] CFI Enabled
2,415,484 UART: [fht] FMC Alias Private Key: 7
2,523,029 UART: [art] Extend RT PCRs Done
2,523,457 UART: [art] Lock RT PCRs Done
2,525,003 UART: [art] Populate DV Done
2,533,520 UART: [fht] FMC Alias Private Key: 7
2,534,654 UART: [art] Derive CDI
2,534,934 UART: [art] Store in in slot 0x4
2,620,707 UART: [art] Derive Key Pair
2,621,067 UART: [art] Store priv key in slot 0x5
2,634,721 UART: [art] Derive Key Pair - Done
2,649,543 UART: [art] Signing Cert with AUTHO
2,650,023 UART: RITY.KEYID = 7
2,665,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,016 UART: [art] PUB.X = 58E2D3356A79D1147C3CA0F591B09E4E582EAB8A1DD7C86FDAB3A8E520B03F670F69449067167654C46BB345B23D0B52
2,672,784 UART: [art] PUB.Y = B697B4AC7231E05D11EF820F2FEA526C4D9C71C061C75EDD269058B663FEAB0919E034C81F7086C84BDA720BB5E8D1EA
2,679,739 UART: [art] SIG.R = 607931FB5DC454A70771755697A2EA6F74C785BD4AA88BCBC480E1D11453B030F7A14AD7227F6E3269B8103E032D63AE
2,686,505 UART: [art] SIG.S = 64E28BDBE34F4892A6F7F3917F53C17EB267099EBC5F6509FEFAE43AE7DE15E0EBC861D8154677F840DF976D7A5654D4
2,709,910 UART: mbox::rt_entry...
2,710,282 UART: ____ _ _ _ ____ _____
2,711,066 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,866 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,634 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,402 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,170 UART: |_|
2,714,482 UART:
2,820,086 UART: [rt] Runtime listening for mailbox commands...
2,821,237 >>> mbox cmd response data (0 bytes)
2,821,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,821,350 UART:
2,821,366 UART: Running Caliptra ROM ...
2,821,774 UART:
2,821,916 UART: [state] CFI Enabled
2,824,962 UART: [state] LifecycleState = Unprovisioned
2,825,617 UART: [state] DebugLocked = No
2,826,115 UART: [state] WD Timer not started. Device not locked for debugging
2,827,245 UART: [kat] SHA2-256
3,630,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,634,924 UART: [kat] ++
3,635,076 UART: [kat] sha1
3,639,318 UART: [kat] SHA2-256
3,641,258 UART: [kat] SHA2-384
3,644,021 UART: [kat] SHA2-512-ACC
3,645,921 UART: [kat] ECC-384
3,655,414 UART: [kat] HMAC-384Kdf
3,660,038 UART: [kat] LMS
3,908,350 UART: [kat] --
3,909,378 UART: [update-reset] ++
5,223,228 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,224,199 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,374,197 >>> mbox cmd response: success
5,374,314 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,328 UART: [update-reset Success] --
5,383,449 UART: [state] Locking Datavault
5,384,343 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,947 UART: [state] Locking ICCM
5,385,547 UART: [exit] Launching FMC @ 0x40000130
5,390,876 UART:
5,390,892 UART: Running Caliptra FMC ...
5,391,300 UART:
5,391,443 UART: [state] CFI Enabled
5,480,804 UART: [art] Extend RT PCRs Done
5,481,232 UART: [art] Lock RT PCRs Done
5,482,399 UART: [art] Populate DV Done
5,490,600 UART: [fht] FMC Alias Private Key: 7
5,491,626 UART: [art] Derive CDI
5,491,906 UART: [art] Store in in slot 0x4
5,577,857 UART: [art] Derive Key Pair
5,578,217 UART: [art] Store priv key in slot 0x5
5,590,879 UART: [art] Derive Key Pair - Done
5,605,886 UART: [art] Signing Cert with AUTHO
5,606,366 UART: RITY.KEYID = 7
5,621,546 UART: [art] Erasing AUTHORITY.KEYID = 7
5,622,311 UART: [art] PUB.X = 01E22B0A20E1111E4159F4C4CDF6A8D23D865F7F404ABEE8F7F264BDDFBF97260ECD8B4C1E47E18A7E41BBECD538FF84
5,629,096 UART: [art] PUB.Y = C03804CD1967C5A17F7AFB465D5B1D06D8349B11B01B814F1C2FF5F20E17138E19866FEACBE06D87E75527CE8E615E3B
5,636,047 UART: [art] SIG.R = 508124DB39DB964971C236BF8802FF5F74BCAD3417EA97D7EAF73FC8E91DC54C155BFE9ECC88DB333B51FAD66305F7AD
5,642,831 UART: [art] SIG.S = 1CF9305C9498DA6B97A25D9F09DB803F2B61B29CCA95F16491BD2303A155C65DF5F5F8C5CB73CB84647F6562E4B886BB
5,666,478 UART: Caliptra RT
5,666,823 UART: [state] CFI Enabled
5,947,347 UART: [rt] RT failed reset flow
5,947,778 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,897 ready_for_fw is high
1,056,897 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,050 >>> mbox cmd response: success
2,161,050 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,224,038 UART:
2,224,054 UART: Running Caliptra FMC ...
2,224,462 UART:
2,224,605 UART: [state] CFI Enabled
2,235,392 UART: [fht] FMC Alias Private Key: 7
2,343,071 UART: [art] Extend RT PCRs Done
2,343,499 UART: [art] Lock RT PCRs Done
2,344,867 UART: [art] Populate DV Done
2,352,940 UART: [fht] FMC Alias Private Key: 7
2,354,008 UART: [art] Derive CDI
2,354,288 UART: [art] Store in in slot 0x4
2,439,691 UART: [art] Derive Key Pair
2,440,051 UART: [art] Store priv key in slot 0x5
2,452,563 UART: [art] Derive Key Pair - Done
2,467,626 UART: [art] Signing Cert with AUTHO
2,468,106 UART: RITY.KEYID = 7
2,483,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,969 UART: [art] PUB.X = 78BBBBE60FF1C369F3B2055566742AC1D254976E6D67865E378D2F76093511215DAFA1DBA1D51C59B5BB59503FDAC5AA
2,490,740 UART: [art] PUB.Y = C3C01881A8E5AE011D7184303057AFA5885494AD884A931230959B4D0EEAFEA08E634B9252BB6C44A7A8436D88097752
2,497,677 UART: [art] SIG.R = FFEA397ADD5939C99637DDD56C3F6635DEE5F7F4C80BC04E9E4A1040A7790C0FD971BE31284CEC28299DAB1A3F27BDBB
2,504,460 UART: [art] SIG.S = 2405274A755311D581C8BD8A715009796A3C047071BF2B10F7038392770FFD47E3B98438FDAF5A8C3B7FF1630648F8A4
2,528,731 UART: mbox::rt_entry...
2,529,103 UART: ____ _ _ _ ____ _____
2,529,887 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,687 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,455 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,223 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,991 UART: |_|
2,533,303 UART:
2,639,123 UART: [rt] Runtime listening for mailbox commands...
2,640,274 >>> mbox cmd response data (0 bytes)
2,640,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,074,741 >>> mbox cmd response: success
5,088,527 UART:
5,088,543 UART: Running Caliptra FMC ...
5,088,951 UART:
5,089,094 UART: [state] CFI Enabled
5,178,375 UART: [art] Extend RT PCRs Done
5,178,803 UART: [art] Lock RT PCRs Done
5,179,998 UART: [art] Populate DV Done
5,188,307 UART: [fht] FMC Alias Private Key: 7
5,189,321 UART: [art] Derive CDI
5,189,601 UART: [art] Store in in slot 0x4
5,275,816 UART: [art] Derive Key Pair
5,276,176 UART: [art] Store priv key in slot 0x5
5,289,664 UART: [art] Derive Key Pair - Done
5,304,474 UART: [art] Signing Cert with AUTHO
5,304,954 UART: RITY.KEYID = 7
5,320,516 UART: [art] Erasing AUTHORITY.KEYID = 7
5,321,281 UART: [art] PUB.X = 4F1504CC86D6220F2B14DC522233564EF6CC296E9459109548085D93B3C124276253B1CF595AEDD08957096258B44343
5,328,025 UART: [art] PUB.Y = 49C5A7486065CD83145E318985DC12985D2485E936B6CC1403BF890008C90F2188F6806A9F556550D2BA90D092863D7D
5,334,932 UART: [art] SIG.R = 99BC93D79A933AF0B4561943D5A47B8008F41DF52991B23085BCBC0D952AD4467EA62803405C18E81F5F4166494E9205
5,341,684 UART: [art] SIG.S = E8EC4FB88184839895E826FB0E3935CDBAE31A121816DB04F8A869BC41ADD5450512161ED5A0259F8C29C87D43C81BA0
5,365,198 UART: Caliptra RT
5,365,543 UART: [state] CFI Enabled
5,641,960 UART: [rt] RT failed reset flow
5,642,391 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,080 UART:
192,451 UART: Running Caliptra ROM ...
193,644 UART:
193,801 UART: [state] CFI Enabled
264,892 UART: [state] LifecycleState = Unprovisioned
266,859 UART: [state] DebugLocked = No
269,379 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,385 UART: [kat] SHA2-256
444,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,620 UART: [kat] ++
455,103 UART: [kat] sha1
466,903 UART: [kat] SHA2-256
469,623 UART: [kat] SHA2-384
476,464 UART: [kat] SHA2-512-ACC
478,839 UART: [kat] ECC-384
2,767,817 UART: [kat] HMAC-384Kdf
2,778,947 UART: [kat] LMS
3,969,300 UART: [kat] --
3,973,679 UART: [cold-reset] ++
3,975,677 UART: [fht] Storing FHT @ 0x50003400
3,987,437 UART: [idev] ++
3,988,069 UART: [idev] CDI.KEYID = 6
3,989,001 UART: [idev] SUBJECT.KEYID = 7
3,990,248 UART: [idev] UDS.KEYID = 0
3,991,355 ready_for_fw is high
3,991,575 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,091,086 UART: [idev] Erasing UDS.KEYID = 0
7,323,749 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,939 UART: [idev] --
7,348,035 UART: [ldev] ++
7,348,661 UART: [ldev] CDI.KEYID = 6
7,349,567 UART: [ldev] SUBJECT.KEYID = 5
7,350,777 UART: [ldev] AUTHORITY.KEYID = 7
7,352,062 UART: [ldev] FE.KEYID = 1
7,382,692 UART: [ldev] Erasing FE.KEYID = 1
10,716,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,349 UART: [ldev] --
13,095,913 UART: [fwproc] Waiting for Commands...
13,099,207 UART: [fwproc] Received command 0x46574c44
13,101,394 UART: [fwproc] Received Image of size 78740 bytes
16,722,843 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,797,273 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,866,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,059,386 >>> mbox cmd response: success
17,059,872 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,063,260 UART: [afmc] ++
17,063,853 UART: [afmc] CDI.KEYID = 6
17,064,747 UART: [afmc] SUBJECT.KEYID = 7
17,066,020 UART: [afmc] AUTHORITY.KEYID = 5
20,436,141 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,733,484 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,735,764 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,750,166 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,765,019 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,779,441 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,800,623 UART: [afmc] --
22,804,702 UART: [cold-reset] --
22,809,428 UART: [state] Locking Datavault
22,815,499 UART: [state] Locking PCR0, PCR1 and PCR31
22,817,315 UART: [state] Locking ICCM
22,820,027 UART: [exit] Launching FMC @ 0x40000130
22,828,434 UART:
22,828,677 UART: Running Caliptra FMC ...
22,829,779 UART:
22,829,942 UART: [state] CFI Enabled
22,894,270 UART: [fht] FMC Alias Private Key: 7
25,232,501 UART: [art] Extend RT PCRs Done
25,233,721 UART: [art] Lock RT PCRs Done
25,235,401 UART: [art] Populate DV Done
25,240,597 UART: [fht] FMC Alias Private Key: 7
25,242,301 UART: [art] Derive CDI
25,243,119 UART: [art] Store in in slot 0x4
25,302,798 UART: [art] Derive Key Pair
25,303,843 UART: [art] Store priv key in slot 0x5
28,597,102 UART: [art] Derive Key Pair - Done
28,609,904 UART: [art] Signing Cert with AUTHO
28,611,208 UART: RITY.KEYID = 7
30,898,340 UART: [art] Erasing AUTHORITY.KEYID = 7
30,899,841 UART: [art] PUB.X = DC02C6A3014EA9F15BE371DBF913B5441FE61A299AB33639CC05EC443099B8730D9CC0F67203BC2BDBAB1DE830EC8325
30,907,145 UART: [art] PUB.Y = 8193AE744802CF1AF6BC8D2F42EBD4C74A7C2FD64BF29AB423E5E752758D38F4199604DD6493F24531680D8E378BD40B
30,914,370 UART: [art] SIG.R = 3AD5577B219A29C337A458B6A9A029CA51C0CF4D01C60BCBA885385518D9F0BC6CA05C26E15F19465DD3D29DC1D58828
30,921,760 UART: [art] SIG.S = 0579E4D3EB47238335EB7966AAE00C923AED5557CA5A534F82BF90B649BC9B53A36895C5CA536C8E9C0A097C3250B5EE
32,226,173 UART: mbox::rt_entry...
32,227,133 UART: ____ _ _ _ ____ _____
32,229,115 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,231,130 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,233,059 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,234,989 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,236,919 UART: |_|
32,237,756 UART:
32,350,291 UART: [rt] Runtime listening for mailbox commands...
32,356,121 >>> mbox cmd response data (3272 bytes)
32,371,944 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,405,353 >>> mbox cmd response data (0 bytes)
34,540,198 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,684,583 UART:
34,684,943 UART: Running Caliptra ROM ...
34,686,072 UART:
34,686,250 UART: [state] CFI Enabled
34,760,700 UART: [state] LifecycleState = Unprovisioned
34,762,651 UART: [state] DebugLocked = No
34,764,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,768,440 UART: [kat] SHA2-256
34,938,139 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,948,614 UART: [kat] ++
34,949,072 UART: [kat] sha1
34,959,691 UART: [kat] SHA2-256
34,962,383 UART: [kat] SHA2-384
34,967,394 UART: [kat] SHA2-512-ACC
34,969,793 UART: [kat] ECC-384
37,262,875 UART: [kat] HMAC-384Kdf
37,294,130 UART: [kat] LMS
38,484,426 UART: [kat] --
38,488,437 UART: [update-reset] ++
42,628,242 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,632,454 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
43,014,731 >>> mbox cmd response: success
43,019,392 UART: [update-reset] Copying MAN_2 To MAN_1
43,038,718 UART: [update-reset Success] --
43,042,275 UART: [state] Locking Datavault
43,045,537 UART: [state] Locking PCR0, PCR1 and PCR31
43,047,295 UART: [state] Locking ICCM
43,049,207 UART: [exit] Launching FMC @ 0x40000130
43,057,609 UART:
43,057,892 UART: Running Caliptra FMC ...
43,059,112 UART:
43,059,273 UART: [state] CFI Enabled
43,150,832 UART: [art] Extend RT PCRs Done
43,152,019 UART: [art] Lock RT PCRs Done
43,153,448 UART: [art] Populate DV Done
43,158,912 UART: [fht] FMC Alias Private Key: 7
43,160,608 UART: [art] Derive CDI
43,161,422 UART: [art] Store in in slot 0x4
43,219,908 UART: [art] Derive Key Pair
43,220,950 UART: [art] Store priv key in slot 0x5
46,513,267 UART: [art] Derive Key Pair - Done
46,526,594 UART: [art] Signing Cert with AUTHO
46,527,905 UART: RITY.KEYID = 7
48,816,076 UART: [art] Erasing AUTHORITY.KEYID = 7
48,817,589 UART: [art] PUB.X = EF80A2D7F6B8555B13F38A758CB20DB96BD1864172CABA6463A861B0B4D33156DB6D570E45ADCD8DFCA7AB6D16833BC0
48,824,863 UART: [art] PUB.Y = 677E0A01FAAD9DD5727CBF5C7E739163A16411F4C2DAE8BBFB0A36F52375D1C5AD572530B4E95D0C33EAE009F1F8D1E6
48,832,122 UART: [art] SIG.R = 9113D6E232A9DEF432C11865655CA7536C4E90A7A0A647382B054E0E630C663F8E9EC0108AF5B849B5CD67C0810853DE
48,839,497 UART: [art] SIG.S = 48828E220D9E587B6606C41449C0E1B123E55ED1556AA6E1FB0ED1A432F8FAC64858A323459815D0E699621229A2188A
50,144,174 UART: Caliptra RT
50,144,892 UART: [state] CFI Enabled
53,744,293 UART: Disabled attest: DPE valid fail
53,745,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,747,039 UART: [rt] RT listening for mailbox commands...
53,778,428 UART: [rt]cmd =0x494e464f, len=4
53,782,407 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,787,089 ready_for_fw is high
3,787,970 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,153,076 >>> mbox cmd response: success
17,153,922 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,845,327 UART:
22,845,715 UART: Running Caliptra FMC ...
22,846,852 UART:
22,847,033 UART: [state] CFI Enabled
22,915,653 UART: [fht] FMC Alias Private Key: 7
25,253,694 UART: [art] Extend RT PCRs Done
25,254,924 UART: [art] Lock RT PCRs Done
25,256,638 UART: [art] Populate DV Done
25,261,858 UART: [fht] FMC Alias Private Key: 7
25,263,514 UART: [art] Derive CDI
25,264,332 UART: [art] Store in in slot 0x4
25,324,446 UART: [art] Derive Key Pair
25,325,490 UART: [art] Store priv key in slot 0x5
28,618,438 UART: [art] Derive Key Pair - Done
28,631,414 UART: [art] Signing Cert with AUTHO
28,632,750 UART: RITY.KEYID = 7
30,920,722 UART: [art] Erasing AUTHORITY.KEYID = 7
30,922,224 UART: [art] PUB.X = 326BAA98996320BFAE32831AF5CACF4DBF57826397CC497A030896326F361985390E835CE36529EBBA6A8F0F5B5C5F85
30,929,449 UART: [art] PUB.Y = B94772F7E39E4D6143F47A157C163486FD1FB3B24355B6858EFE9A2C6CEC589782B20A803FCD2AA1363FB17F40E519BE
30,936,732 UART: [art] SIG.R = 5DEF05569001BD7C03EEAC58FCB925DC664C5661CC9076119234E48B3133FFB5A9AB0C540F0A4C7C1992EF2C51FB2F9C
30,944,100 UART: [art] SIG.S = 10D2504C04232F9799849936914B51B2E1FD87CA4F83AB7A243B6D3D07382D300A204707D5F8C0A1F60F9207402B9591
32,248,493 UART: mbox::rt_entry...
32,249,461 UART: ____ _ _ _ ____ _____
32,251,367 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,253,369 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,255,228 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,257,183 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,259,114 UART: |_|
32,260,100 UART:
32,374,001 UART: [rt] Runtime listening for mailbox commands...
32,379,860 >>> mbox cmd response data (3272 bytes)
32,395,799 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,429,213 >>> mbox cmd response data (0 bytes)
34,561,425 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,288,197 >>> mbox cmd response: success
43,322,978 UART:
43,323,285 UART: Running Caliptra FMC ...
43,324,335 UART:
43,324,485 UART: [state] CFI Enabled
43,428,538 UART: [art] Extend RT PCRs Done
43,429,741 UART: [art] Lock RT PCRs Done
43,431,071 UART: [art] Populate DV Done
43,436,223 UART: [fht] FMC Alias Private Key: 7
43,437,813 UART: [art] Derive CDI
43,438,559 UART: [art] Store in in slot 0x4
43,497,542 UART: [art] Derive Key Pair
43,498,544 UART: [art] Store priv key in slot 0x5
46,791,092 UART: [art] Derive Key Pair - Done
46,803,839 UART: [art] Signing Cert with AUTHO
46,805,157 UART: RITY.KEYID = 7
49,092,247 UART: [art] Erasing AUTHORITY.KEYID = 7
49,093,770 UART: [art] PUB.X = 0EDF28A9B8994E6A2710203BD1A36F3A80BC84E39EE976510E309067ED48699C8EF60F6AFCF35E79384EA3470001E218
49,100,955 UART: [art] PUB.Y = 79B214711E87466D1B13891E9598993CE1779E681E7381E8370005B0B08B0A0AE211F9D07BA5600FF2D505FB199D67B4
49,108,188 UART: [art] SIG.R = AD222503E08ECC3919E53D86AE565B6788132BD6EEAA9D7F9A19F217D8BD4AF465B552925102C26034B96C4F7C17F6BF
49,115,574 UART: [art] SIG.S = C029EEF982967656738CCEB097CD11B223F5C7E4EEAA1B8BDAF44D37F46F31AD3A126F0FE8D8EA22C556D0D2807D6AF5
50,421,470 UART: Caliptra RT
50,422,182 UART: [state] CFI Enabled
54,021,243 UART: Disabled attest: DPE valid fail
54,023,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,024,133 UART: [rt] RT listening for mailbox commands...
54,055,626 UART: [rt]cmd =0x494e464f, len=4
54,059,687 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,286 UART:
192,639 UART: Running Caliptra ROM ...
193,823 UART:
603,547 UART: [state] CFI Enabled
615,571 UART: [state] LifecycleState = Unprovisioned
617,448 UART: [state] DebugLocked = No
619,117 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,900 UART: [kat] SHA2-256
794,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,156 UART: [kat] ++
805,629 UART: [kat] sha1
816,925 UART: [kat] SHA2-256
819,635 UART: [kat] SHA2-384
825,681 UART: [kat] SHA2-512-ACC
828,027 UART: [kat] ECC-384
3,114,637 UART: [kat] HMAC-384Kdf
3,125,441 UART: [kat] LMS
4,315,558 UART: [kat] --
4,319,429 UART: [cold-reset] ++
4,320,296 UART: [fht] Storing FHT @ 0x50003400
4,332,126 UART: [idev] ++
4,332,686 UART: [idev] CDI.KEYID = 6
4,333,662 UART: [idev] SUBJECT.KEYID = 7
4,334,903 UART: [idev] UDS.KEYID = 0
4,335,881 ready_for_fw is high
4,336,063 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,435,160 UART: [idev] Erasing UDS.KEYID = 0
7,627,676 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,181 UART: [idev] --
7,652,944 UART: [ldev] ++
7,653,508 UART: [ldev] CDI.KEYID = 6
7,654,474 UART: [ldev] SUBJECT.KEYID = 5
7,655,675 UART: [ldev] AUTHORITY.KEYID = 7
7,656,954 UART: [ldev] FE.KEYID = 1
7,669,588 UART: [ldev] Erasing FE.KEYID = 1
10,958,897 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,142 UART: [ldev] --
13,316,386 UART: [fwproc] Waiting for Commands...
13,319,283 UART: [fwproc] Received command 0x46574c44
13,321,464 UART: [fwproc] Received Image of size 78740 bytes
16,942,705 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,019,644 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,088,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,282,100 >>> mbox cmd response: success
17,282,611 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,285,826 UART: [afmc] ++
17,286,415 UART: [afmc] CDI.KEYID = 6
17,287,319 UART: [afmc] SUBJECT.KEYID = 7
17,288,586 UART: [afmc] AUTHORITY.KEYID = 5
20,603,306 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,898,847 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,901,097 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,915,498 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,930,338 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,944,771 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,967,578 UART: [afmc] --
22,970,845 UART: [cold-reset] --
22,973,638 UART: [state] Locking Datavault
22,978,020 UART: [state] Locking PCR0, PCR1 and PCR31
22,979,769 UART: [state] Locking ICCM
22,982,349 UART: [exit] Launching FMC @ 0x40000130
22,990,733 UART:
22,990,982 UART: Running Caliptra FMC ...
22,992,079 UART:
22,992,240 UART: [state] CFI Enabled
23,000,012 UART: [fht] FMC Alias Private Key: 7
25,331,054 UART: [art] Extend RT PCRs Done
25,332,270 UART: [art] Lock RT PCRs Done
25,334,077 UART: [art] Populate DV Done
25,339,270 UART: [fht] FMC Alias Private Key: 7
25,340,757 UART: [art] Derive CDI
25,341,511 UART: [art] Store in in slot 0x4
25,384,239 UART: [art] Derive Key Pair
25,385,286 UART: [art] Store priv key in slot 0x5
28,626,857 UART: [art] Derive Key Pair - Done
28,640,233 UART: [art] Signing Cert with AUTHO
28,641,534 UART: RITY.KEYID = 7
30,920,691 UART: [art] Erasing AUTHORITY.KEYID = 7
30,922,205 UART: [art] PUB.X = 90CA2E4289D26E28C5F76E04D3F24D4F06738666022AE40FCB75050748D3E64B6A82DE46490DEB223C68E330752D217D
30,929,441 UART: [art] PUB.Y = 9FD024EF6D816C0CE4149F4B74BB9A32C88CC68C4F23BF29B76A3A3B4A718EBF64B971781DB2F69996ED054EBDBAE53B
30,936,715 UART: [art] SIG.R = 881A0D73197386389C1129A808D92A97708944D0BD44FA2C7B88A7E4BD512EE07D26B6888BF61E805EC7F0FF73531718
30,944,089 UART: [art] SIG.S = 88E8E3DEE8A75E61C7BA9A359F7E0DCE9954B1B45D126C39AD7E294EFA1F59FFD11CBF06B23B58106A0A7A5026D21B7A
32,249,164 UART: mbox::rt_entry...
32,250,109 UART: ____ _ _ _ ____ _____
32,252,035 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,254,035 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,255,887 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,257,814 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,259,741 UART: |_|
32,260,563 UART:
32,374,739 UART: [rt] Runtime listening for mailbox commands...
32,380,591 >>> mbox cmd response data (3272 bytes)
32,396,118 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,429,520 >>> mbox cmd response data (0 bytes)
34,486,845 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,631,215 UART:
34,631,591 UART: Running Caliptra ROM ...
34,632,727 UART:
34,632,894 UART: [state] CFI Enabled
34,647,183 UART: [state] LifecycleState = Unprovisioned
34,649,077 UART: [state] DebugLocked = No
34,651,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,656,703 UART: [kat] SHA2-256
34,826,445 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,836,975 UART: [kat] ++
34,837,510 UART: [kat] sha1
34,848,510 UART: [kat] SHA2-256
34,851,244 UART: [kat] SHA2-384
34,857,819 UART: [kat] SHA2-512-ACC
34,860,169 UART: [kat] ECC-384
37,146,046 UART: [kat] HMAC-384Kdf
37,158,280 UART: [kat] LMS
38,348,368 UART: [kat] --
38,351,341 UART: [update-reset] ++
42,482,722 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,486,201 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,868,476 >>> mbox cmd response: success
42,873,205 UART: [update-reset] Copying MAN_2 To MAN_1
42,891,670 UART: [update-reset Success] --
42,895,381 UART: [state] Locking Datavault
42,899,013 UART: [state] Locking PCR0, PCR1 and PCR31
42,900,783 UART: [state] Locking ICCM
42,903,468 UART: [exit] Launching FMC @ 0x40000130
42,911,884 UART:
42,912,128 UART: Running Caliptra FMC ...
42,913,227 UART:
42,913,379 UART: [state] CFI Enabled
42,957,187 UART: [art] Extend RT PCRs Done
42,958,328 UART: [art] Lock RT PCRs Done
42,959,875 UART: [art] Populate DV Done
42,965,004 UART: [fht] FMC Alias Private Key: 7
42,966,483 UART: [art] Derive CDI
42,967,240 UART: [art] Store in in slot 0x4
43,009,765 UART: [art] Derive Key Pair
43,010,819 UART: [art] Store priv key in slot 0x5
46,252,562 UART: [art] Derive Key Pair - Done
46,265,407 UART: [art] Signing Cert with AUTHO
46,266,742 UART: RITY.KEYID = 7
48,546,481 UART: [art] Erasing AUTHORITY.KEYID = 7
48,547,996 UART: [art] PUB.X = C664B944EDCC9C2B5FF4FB13E0AEF96D44224A5023DBC795AA988C5E21F2690F4BEA795EA692BAF7E50ACD9CD91C7159
48,555,255 UART: [art] PUB.Y = 24D64D767707B952AD9028C51AC1C472AD527073F597435DF50BBAF8D815376DA588184D14C1323433A4A0ECF25F4D2F
48,562,509 UART: [art] SIG.R = B07F5474530618470B0BFAE9CF910870691375163578AEE40B818FF9E04A0B4201D6139F9B8A65B579C04B3EB3849966
48,569,866 UART: [art] SIG.S = B9B5650530B530C08E748ABC3DAC4AF0A8D07D5CEF012227C32A65E2829DFEA8E8F9A62AC3F51236A07E215F73B56D24
49,874,813 UART: Caliptra RT
49,875,527 UART: [state] CFI Enabled
53,393,237 UART: Disabled attest: DPE valid fail
53,394,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,395,731 UART: [rt] RT listening for mailbox commands...
53,427,335 UART: [rt]cmd =0x494e464f, len=4
53,431,224 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
4,128,790 ready_for_fw is high
4,129,223 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,356,582 >>> mbox cmd response: success
17,357,367 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
23,000,337 UART:
23,000,747 UART: Running Caliptra FMC ...
23,001,872 UART:
23,002,026 UART: [state] CFI Enabled
23,009,724 UART: [fht] FMC Alias Private Key: 7
25,340,974 UART: [art] Extend RT PCRs Done
25,342,196 UART: [art] Lock RT PCRs Done
25,344,168 UART: [art] Populate DV Done
25,349,523 UART: [fht] FMC Alias Private Key: 7
25,351,117 UART: [art] Derive CDI
25,351,862 UART: [art] Store in in slot 0x4
25,394,829 UART: [art] Derive Key Pair
25,395,822 UART: [art] Store priv key in slot 0x5
28,638,015 UART: [art] Derive Key Pair - Done
28,651,069 UART: [art] Signing Cert with AUTHO
28,652,386 UART: RITY.KEYID = 7
30,931,504 UART: [art] Erasing AUTHORITY.KEYID = 7
30,933,016 UART: [art] PUB.X = C2CF2D0B12292B0A5B1D4985B5A9874D46ADDD657B5B40BFBECDB95EE70F5CABCCC1D93E7A9E2BA43859815486F4C508
30,940,349 UART: [art] PUB.Y = 6ACC01E533824ADDB31126FE34DD1E6579E3302BBB9E83B0A692954EE5DCEBBE13A5066F62B431F0E721EB2CDDFA850C
30,947,580 UART: [art] SIG.R = 7D3EF3836BF630E73DEC79A56049D5277D177705E24ABEC6D2D9A451891DE9B1CBA33C370E9227C9E4ABE1ABD0770A42
30,954,971 UART: [art] SIG.S = 7D7A19FC3A9969689B50F1693AA1A0E94BEE7C2A5B8CFB9274225A34EB3943308DF5278A1B4A7B07F97C1FC26B73F60B
32,259,088 UART: mbox::rt_entry...
32,260,063 UART: ____ _ _ _ ____ _____
32,261,998 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,264,002 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,265,856 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,267,805 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,269,652 UART: |_|
32,270,529 UART:
32,383,841 UART: [rt] Runtime listening for mailbox commands...
32,389,699 >>> mbox cmd response data (3272 bytes)
32,405,467 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,438,856 >>> mbox cmd response data (0 bytes)
34,503,292 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,168,865 >>> mbox cmd response: success
43,204,989 UART:
43,205,296 UART: Running Caliptra FMC ...
43,206,334 UART:
43,206,477 UART: [state] CFI Enabled
43,250,553 UART: [art] Extend RT PCRs Done
43,251,745 UART: [art] Lock RT PCRs Done
43,253,349 UART: [art] Populate DV Done
43,258,974 UART: [fht] FMC Alias Private Key: 7
43,260,511 UART: [art] Derive CDI
43,261,242 UART: [art] Store in in slot 0x4
43,304,047 UART: [art] Derive Key Pair
43,305,068 UART: [art] Store priv key in slot 0x5
46,546,844 UART: [art] Derive Key Pair - Done
46,559,695 UART: [art] Signing Cert with AUTHO
46,561,003 UART: RITY.KEYID = 7
48,840,140 UART: [art] Erasing AUTHORITY.KEYID = 7
48,841,656 UART: [art] PUB.X = E71320C102FF64AF0F917012349D02F2E74F7C3FC09A239BFC5AB1653DF1DF45C0AE181482CF715D58DB8BFF177F3876
48,848,903 UART: [art] PUB.Y = D29F87EFA849EB12C8179939DECD8FE12933D70C3D679A43BA6EA8AC35B7C197674D8D2B1BD45D1753B50487AD7512D4
48,856,115 UART: [art] SIG.R = 6096E446173ED4D7B460FB1633E409D8E74ADB2A4767DECB78C790F727049A638D0A45976357ACF7C4BD89664F4E6120
48,863,487 UART: [art] SIG.S = 88E4FC9E274D66BDE65FD486F8BB41FB72F1EB126B808E65AB3469F20CECC467F4C741664006CA4427A3C40B6A3EA492
50,169,378 UART: Caliptra RT
50,170,079 UART: [state] CFI Enabled
53,684,752 UART: Disabled attest: DPE valid fail
53,686,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,687,429 UART: [rt] RT listening for mailbox commands...
53,718,916 UART: [rt]cmd =0x494e464f, len=4
53,722,971 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,024 UART:
192,395 UART: Running Caliptra ROM ...
193,489 UART:
193,628 UART: [state] CFI Enabled
262,601 UART: [state] LifecycleState = Unprovisioned
264,501 UART: [state] DebugLocked = No
266,519 UART: [state] WD Timer not started. Device not locked for debugging
269,483 UART: [kat] SHA2-256
448,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,169 UART: [kat] ++
460,695 UART: [kat] sha1
471,666 UART: [kat] SHA2-256
474,741 UART: [kat] SHA2-384
481,016 UART: [kat] SHA2-512-ACC
483,964 UART: [kat] ECC-384
2,949,671 UART: [kat] HMAC-384Kdf
2,971,431 UART: [kat] LMS
3,500,847 UART: [kat] --
3,504,561 UART: [cold-reset] ++
3,505,494 UART: [fht] FHT @ 0x50003400
3,516,395 UART: [idev] ++
3,516,957 UART: [idev] CDI.KEYID = 6
3,517,866 UART: [idev] SUBJECT.KEYID = 7
3,519,042 UART: [idev] UDS.KEYID = 0
3,520,091 ready_for_fw is high
3,520,289 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,619,539 UART: [idev] Erasing UDS.KEYID = 0
6,028,902 UART: [idev] Sha1 KeyId Algorithm
6,052,077 UART: [idev] --
6,056,020 UART: [ldev] ++
6,056,594 UART: [ldev] CDI.KEYID = 6
6,057,487 UART: [ldev] SUBJECT.KEYID = 5
6,058,704 UART: [ldev] AUTHORITY.KEYID = 7
6,059,933 UART: [ldev] FE.KEYID = 1
6,102,832 UART: [ldev] Erasing FE.KEYID = 1
8,609,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,527 UART: [ldev] --
10,417,529 UART: [fwproc] Wait for Commands...
10,419,175 UART: [fwproc] Recv command 0x46574c44
10,421,246 UART: [fwproc] Recv'd Img size: 78704 bytes
13,392,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,464,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,533,562 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,727,119 >>> mbox cmd response: success
13,727,638 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,731,155 UART: [afmc] ++
13,731,768 UART: [afmc] CDI.KEYID = 6
13,732,685 UART: [afmc] SUBJECT.KEYID = 7
13,733,848 UART: [afmc] AUTHORITY.KEYID = 5
16,273,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,001,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,003,628 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,019,406 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,035,404 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,051,276 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,073,935 UART: [afmc] --
18,078,018 UART: [cold-reset] --
18,082,482 UART: [state] Locking Datavault
18,088,000 UART: [state] Locking PCR0, PCR1 and PCR31
18,089,704 UART: [state] Locking ICCM
18,090,938 UART: [exit] Launching FMC @ 0x40000130
18,099,344 UART:
18,099,627 UART: Running Caliptra FMC ...
18,100,738 UART:
18,100,906 UART: [state] CFI Enabled
18,159,527 UART: [fht] FMC Alias Private Key: 7
19,923,710 UART: [art] Extend RT PCRs Done
19,924,916 UART: [art] Lock RT PCRs Done
19,926,643 UART: [art] Populate DV Done
19,931,995 UART: [fht] FMC Alias Private Key: 7
19,933,743 UART: [art] Derive CDI
19,934,892 UART: [art] Store in in slot 0x4
19,993,001 UART: [art] Derive Key Pair
19,994,004 UART: [art] Store priv key in slot 0x5
22,457,158 UART: [art] Derive Key Pair - Done
22,470,585 UART: [art] Signing Cert with AUTHO
22,471,883 UART: RITY.KEYID = 7
24,182,951 UART: [art] Erasing AUTHORITY.KEYID = 7
24,184,501 UART: [art] PUB.X = 8924551512B1F643887333AB512D9A46EE611991A77DBA1AED91A10C8397401EAB52D6BAE3A98947FD94C60ABC343753
24,191,708 UART: [art] PUB.Y = 0CE62699102DE9331A8019DC971703CE527C7F91BF42BD7D717F75A1A126508DBD7CDCDEAEE4DFA80DD125A3403D4D62
24,199,002 UART: [art] SIG.R = 24C237E7164873B8F7D93ECF14391BA3C9C4200F78A0F18F6C012495E2665DAD04541B64A8B632691FECD4B523B805B5
24,206,347 UART: [art] SIG.S = 1677994530D90A10AABD068C09C0E77CF247BA153BBFE9540296B9AD3DF62E7FA50DD3BBD7FB84A501DF36A5BDFA702F
25,185,017 UART: mbox::rt_entry...
25,185,975 UART: ____ _ _ _ ____ _____
25,187,905 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,189,909 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,191,837 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,193,781 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,195,712 UART: |_|
25,196,547 UART:
25,310,021 UART: [rt] Runtime listening for mailbox commands...
25,315,876 >>> mbox cmd response data (3272 bytes)
25,331,526 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,364,912 >>> mbox cmd response data (0 bytes)
27,446,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,591,752 UART:
27,592,168 UART: Running Caliptra ROM ...
27,593,258 UART:
27,593,415 UART: [state] CFI Enabled
27,660,087 UART: [state] LifecycleState = Unprovisioned
27,661,980 UART: [state] DebugLocked = No
27,664,453 UART: [state] WD Timer not started. Device not locked for debugging
27,668,194 UART: [kat] SHA2-256
27,847,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,858,875 UART: [kat] ++
27,859,338 UART: [kat] sha1
27,870,495 UART: [kat] SHA2-256
27,873,508 UART: [kat] SHA2-384
27,878,794 UART: [kat] SHA2-512-ACC
27,881,735 UART: [kat] ECC-384
30,344,952 UART: [kat] HMAC-384Kdf
30,365,874 UART: [kat] LMS
30,895,303 UART: [kat] --
30,901,583 UART: [update-reset] ++
34,331,479 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,334,208 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,717,462 >>> mbox cmd response: success
34,722,088 UART: [update-reset] Copying MAN_2 To MAN_1
34,741,533 UART: [update-reset Success] --
34,745,708 UART: [state] Locking Datavault
34,749,401 UART: [state] Locking PCR0, PCR1 and PCR31
34,751,109 UART: [state] Locking ICCM
34,753,723 UART: [exit] Launching FMC @ 0x40000130
34,762,171 UART:
34,762,406 UART: Running Caliptra FMC ...
34,763,725 UART:
34,763,883 UART: [state] CFI Enabled
34,857,729 UART: [art] Extend RT PCRs Done
34,858,937 UART: [art] Lock RT PCRs Done
34,860,217 UART: [art] Populate DV Done
34,865,680 UART: [fht] FMC Alias Private Key: 7
34,867,264 UART: [art] Derive CDI
34,868,005 UART: [art] Store in in slot 0x4
34,926,265 UART: [art] Derive Key Pair
34,927,300 UART: [art] Store priv key in slot 0x5
37,390,624 UART: [art] Derive Key Pair - Done
37,403,848 UART: [art] Signing Cert with AUTHO
37,405,143 UART: RITY.KEYID = 7
39,117,018 UART: [art] Erasing AUTHORITY.KEYID = 7
39,118,527 UART: [art] PUB.X = 934F9C318C56E58F3B4F4B35B41D8890412673D1164BF7CB1E4483D4653765057BCB6707B182E6E48F6337FF9B6ABB04
39,125,736 UART: [art] PUB.Y = 756847290681BCCDD3E9C8EAABA8EE66569C31DF2BF543630E18A60F1DCD829AFDAC68B5352B541E02E8F083D1F5C53C
39,133,056 UART: [art] SIG.R = 62554DAE9A8D01B934F777EF005FDA98889C918CF9D962A49178B569B6343183C34DAEFE821A6E1E9E089F713416A943
39,140,454 UART: [art] SIG.S = DD2C5A6C5BC05F50FCF42D81739AE2F0E323B0038952F8FB7EF900E86798C45543CEC37946FDBB2FDF6C0061F3FA7380
40,119,134 UART: Caliptra RT
40,119,846 UART: [state] CFI Enabled
42,915,332 UART: Disabled attest: DPE valid fail
42,917,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,917,807 UART: [rt] RT listening for mailbox commands...
42,949,299 UART: [rt]cmd =0x494e464f, len=4
42,953,357 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,359,974 ready_for_fw is high
3,360,347 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,513,171 >>> mbox cmd response: success
13,513,735 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,790,348 UART:
17,790,734 UART: Running Caliptra FMC ...
17,791,917 UART:
17,792,086 UART: [state] CFI Enabled
17,860,328 UART: [fht] FMC Alias Private Key: 7
19,623,954 UART: [art] Extend RT PCRs Done
19,625,168 UART: [art] Lock RT PCRs Done
19,626,629 UART: [art] Populate DV Done
19,632,150 UART: [fht] FMC Alias Private Key: 7
19,633,798 UART: [art] Derive CDI
19,634,616 UART: [art] Store in in slot 0x4
19,692,827 UART: [art] Derive Key Pair
19,693,859 UART: [art] Store priv key in slot 0x5
22,156,629 UART: [art] Derive Key Pair - Done
22,169,305 UART: [art] Signing Cert with AUTHO
22,170,604 UART: RITY.KEYID = 7
23,882,728 UART: [art] Erasing AUTHORITY.KEYID = 7
23,884,233 UART: [art] PUB.X = EAD260477EC536D337AEC688E9AC49E6FAAFEBD6A16C7FAE71C80E45B163C18CD69ED41F2999BF9356BDBF15B8453DD3
23,891,480 UART: [art] PUB.Y = EBCCBD94D2D66419D266D48B907829867AFD2C0A3F97F40C8773CBD0766574CDBD0B36ECC610F3ACAAB63763A4F10638
23,898,766 UART: [art] SIG.R = 9327F3F8A28CA11A857291613EEBEFBBCCC9CADFAE07AF5FBFC9689B87BC5EB92075F0A837A8A325705CDA1E7A0B7EED
23,906,255 UART: [art] SIG.S = C75E5B134B62C8EECBDBC6C022F31033615289683FF50A192419578117D9A3823AACCFFC79EB254E3D1990624EF96DEE
24,884,998 UART: mbox::rt_entry...
24,885,934 UART: ____ _ _ _ ____ _____
24,887,912 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,889,915 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,891,846 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,893,813 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,895,671 UART: |_|
24,896,556 UART:
25,009,728 UART: [rt] Runtime listening for mailbox commands...
25,015,594 >>> mbox cmd response data (3272 bytes)
25,031,325 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,064,750 >>> mbox cmd response data (0 bytes)
27,140,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,256,785 >>> mbox cmd response: success
34,289,998 UART:
34,290,309 UART: Running Caliptra FMC ...
34,291,432 UART:
34,291,598 UART: [state] CFI Enabled
34,386,568 UART: [art] Extend RT PCRs Done
34,387,767 UART: [art] Lock RT PCRs Done
34,389,195 UART: [art] Populate DV Done
34,394,600 UART: [fht] FMC Alias Private Key: 7
34,396,083 UART: [art] Derive CDI
34,396,851 UART: [art] Store in in slot 0x4
34,455,947 UART: [art] Derive Key Pair
34,456,945 UART: [art] Store priv key in slot 0x5
36,920,352 UART: [art] Derive Key Pair - Done
36,933,366 UART: [art] Signing Cert with AUTHO
36,934,670 UART: RITY.KEYID = 7
38,646,197 UART: [art] Erasing AUTHORITY.KEYID = 7
38,647,708 UART: [art] PUB.X = 1BF31B004781F97FAD6BE7725F02FAA215E4A099F2E2AC257B4C99C57408EEA950F0467BA19037005F62CD10F898A485
38,654,960 UART: [art] PUB.Y = 80D1DEF767C9AB216547B3C2B3F8E6D3536C103F205B25B0B17490862235CBA3C16CE97AB2AC12A57EDDD1C7C5B8136E
38,662,190 UART: [art] SIG.R = A1F52A84CCF37783700FFA8862E31E56614E85823BF73B96BC84B483497B37CF6F201A811E273901691E04D20094E654
38,669,522 UART: [art] SIG.S = 404317873B060959120C5ED377B39D979B385C71848719E64016C5EECA33FF314E5916468B1CDE3E0F90161427D48CD1
39,648,539 UART: Caliptra RT
39,649,226 UART: [state] CFI Enabled
42,444,932 UART: Disabled attest: DPE valid fail
42,446,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,447,532 UART: [rt] RT listening for mailbox commands...
42,478,821 UART: [rt]cmd =0x494e464f, len=4
42,482,759 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,354 UART:
192,738 UART: Running Caliptra ROM ...
193,918 UART:
603,429 UART: [state] CFI Enabled
612,905 UART: [state] LifecycleState = Unprovisioned
614,764 UART: [state] DebugLocked = No
616,952 UART: [state] WD Timer not started. Device not locked for debugging
620,621 UART: [kat] SHA2-256
799,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,309 UART: [kat] ++
811,842 UART: [kat] sha1
823,000 UART: [kat] SHA2-256
826,072 UART: [kat] SHA2-384
832,583 UART: [kat] SHA2-512-ACC
835,555 UART: [kat] ECC-384
3,279,914 UART: [kat] HMAC-384Kdf
3,292,851 UART: [kat] LMS
3,822,314 UART: [kat] --
3,825,195 UART: [cold-reset] ++
3,826,702 UART: [fht] FHT @ 0x50003400
3,838,169 UART: [idev] ++
3,838,726 UART: [idev] CDI.KEYID = 6
3,839,651 UART: [idev] SUBJECT.KEYID = 7
3,840,817 UART: [idev] UDS.KEYID = 0
3,841,737 ready_for_fw is high
3,841,916 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,940,807 UART: [idev] Erasing UDS.KEYID = 0
6,311,731 UART: [idev] Sha1 KeyId Algorithm
6,334,367 UART: [idev] --
6,338,844 UART: [ldev] ++
6,339,402 UART: [ldev] CDI.KEYID = 6
6,340,336 UART: [ldev] SUBJECT.KEYID = 5
6,341,536 UART: [ldev] AUTHORITY.KEYID = 7
6,342,758 UART: [ldev] FE.KEYID = 1
6,353,631 UART: [ldev] Erasing FE.KEYID = 1
8,829,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,429 UART: [ldev] --
10,620,145 UART: [fwproc] Wait for Commands...
10,622,239 UART: [fwproc] Recv command 0x46574c44
10,624,328 UART: [fwproc] Recv'd Img size: 78704 bytes
13,590,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,659,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,728,591 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,922,431 >>> mbox cmd response: success
13,922,917 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,926,660 UART: [afmc] ++
13,927,237 UART: [afmc] CDI.KEYID = 6
13,928,113 UART: [afmc] SUBJECT.KEYID = 7
13,929,317 UART: [afmc] AUTHORITY.KEYID = 5
16,428,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,150,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,152,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,167,829 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,183,902 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,199,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,221,808 UART: [afmc] --
18,225,667 UART: [cold-reset] --
18,228,602 UART: [state] Locking Datavault
18,232,600 UART: [state] Locking PCR0, PCR1 and PCR31
18,234,231 UART: [state] Locking ICCM
18,236,618 UART: [exit] Launching FMC @ 0x40000130
18,245,005 UART:
18,245,238 UART: Running Caliptra FMC ...
18,246,392 UART:
18,246,548 UART: [state] CFI Enabled
18,254,506 UART: [fht] FMC Alias Private Key: 7
20,011,035 UART: [art] Extend RT PCRs Done
20,012,260 UART: [art] Lock RT PCRs Done
20,014,150 UART: [art] Populate DV Done
20,019,620 UART: [fht] FMC Alias Private Key: 7
20,021,210 UART: [art] Derive CDI
20,022,025 UART: [art] Store in in slot 0x4
20,064,520 UART: [art] Derive Key Pair
20,065,674 UART: [art] Store priv key in slot 0x5
22,491,929 UART: [art] Derive Key Pair - Done
22,504,760 UART: [art] Signing Cert with AUTHO
22,506,058 UART: RITY.KEYID = 7
24,211,657 UART: [art] Erasing AUTHORITY.KEYID = 7
24,213,137 UART: [art] PUB.X = 44FAB42729CF96710D66405D1EE40BB47DAEFBA7A9EEC001BF582D993FD6784E8150B3C8602CABA6D869FC2C7165EA68
24,220,485 UART: [art] PUB.Y = BF82CD869DC2007809335A42F05127FD9DFED63582247D95CFCC9097B8EB8340AEEC5AF0A73E9A341FA87F547CD8D9B9
24,227,705 UART: [art] SIG.R = 8ABD300DDF682EA729C5A14433687C069DE9B457FA9545037E8EB0651C019D95FC56686E774DCE70888C182D4BDAD448
24,235,097 UART: [art] SIG.S = D6A95AA93567BAB328D465D7682BC577BC72DB2CBEEE56409152B7D5435307BC71B751972C55F311199FEC8596179CCC
25,213,682 UART: mbox::rt_entry...
25,214,648 UART: ____ _ _ _ ____ _____
25,216,571 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,218,571 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,220,417 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,222,329 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,224,370 UART: |_|
25,225,170 UART:
25,338,304 UART: [rt] Runtime listening for mailbox commands...
25,344,155 >>> mbox cmd response data (3272 bytes)
25,359,969 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,393,374 >>> mbox cmd response data (0 bytes)
27,464,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,609,613 UART:
27,610,005 UART: Running Caliptra ROM ...
27,611,050 UART:
27,611,197 UART: [state] CFI Enabled
27,626,500 UART: [state] LifecycleState = Unprovisioned
27,628,392 UART: [state] DebugLocked = No
27,629,848 UART: [state] WD Timer not started. Device not locked for debugging
27,633,001 UART: [kat] SHA2-256
27,812,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,823,773 UART: [kat] ++
27,824,226 UART: [kat] sha1
27,834,398 UART: [kat] SHA2-256
27,837,401 UART: [kat] SHA2-384
27,842,159 UART: [kat] SHA2-512-ACC
27,845,093 UART: [kat] ECC-384
30,284,416 UART: [kat] HMAC-384Kdf
30,297,510 UART: [kat] LMS
30,827,027 UART: [kat] --
30,830,006 UART: [update-reset] ++
34,255,565 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,258,298 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,641,580 >>> mbox cmd response: success
34,646,111 UART: [update-reset] Copying MAN_2 To MAN_1
34,664,791 UART: [update-reset Success] --
34,669,583 UART: [state] Locking Datavault
34,673,111 UART: [state] Locking PCR0, PCR1 and PCR31
34,674,814 UART: [state] Locking ICCM
34,677,128 UART: [exit] Launching FMC @ 0x40000130
34,685,582 UART:
34,685,905 UART: Running Caliptra FMC ...
34,687,266 UART:
34,687,428 UART: [state] CFI Enabled
34,731,244 UART: [art] Extend RT PCRs Done
34,732,396 UART: [art] Lock RT PCRs Done
34,733,947 UART: [art] Populate DV Done
34,739,456 UART: [fht] FMC Alias Private Key: 7
34,741,052 UART: [art] Derive CDI
34,741,863 UART: [art] Store in in slot 0x4
34,784,930 UART: [art] Derive Key Pair
34,785,977 UART: [art] Store priv key in slot 0x5
37,211,997 UART: [art] Derive Key Pair - Done
37,224,869 UART: [art] Signing Cert with AUTHO
37,226,176 UART: RITY.KEYID = 7
38,931,559 UART: [art] Erasing AUTHORITY.KEYID = 7
38,933,056 UART: [art] PUB.X = F5E5B32890B1D59EAE5B089DF4238696FEAFB42329436CE96EE23ACFCD87B0C01646852180DF7A4885808A839DE1FFD2
38,940,322 UART: [art] PUB.Y = F7158610C37452099E3AB29BF2F6D4258B8953085191F91BBF1673FCEFA5BD2D58FFFDEAC82E93E861C3748F5E8BC9C2
38,947,586 UART: [art] SIG.R = E29BB9903672AD008EF894428E725527741C27E7F790E531438D7B2ED92F824220977E15D2118218F905C4A32E88BFC6
38,954,967 UART: [art] SIG.S = 7B61A3FD5FAEDC7816A47CB8E58C3D65F900AE4D4EB8998E9D50B0151F1C6F8D2B34DD96F9361C85AE8A9A35650EA605
39,933,481 UART: Caliptra RT
39,934,196 UART: [state] CFI Enabled
42,634,157 UART: Disabled attest: DPE valid fail
42,635,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,636,962 UART: [rt] RT listening for mailbox commands...
42,668,338 UART: [rt]cmd =0x494e464f, len=4
42,672,277 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,695,604 ready_for_fw is high
3,696,124 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,711,129 >>> mbox cmd response: success
13,711,689 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,964,397 UART:
17,964,782 UART: Running Caliptra FMC ...
17,965,970 UART:
17,966,129 UART: [state] CFI Enabled
17,974,204 UART: [fht] FMC Alias Private Key: 7
19,731,226 UART: [art] Extend RT PCRs Done
19,732,445 UART: [art] Lock RT PCRs Done
19,733,801 UART: [art] Populate DV Done
19,739,209 UART: [fht] FMC Alias Private Key: 7
19,740,779 UART: [art] Derive CDI
19,741,515 UART: [art] Store in in slot 0x4
19,783,722 UART: [art] Derive Key Pair
19,784,762 UART: [art] Store priv key in slot 0x5
22,211,674 UART: [art] Derive Key Pair - Done
22,224,737 UART: [art] Signing Cert with AUTHO
22,226,037 UART: RITY.KEYID = 7
23,931,590 UART: [art] Erasing AUTHORITY.KEYID = 7
23,933,104 UART: [art] PUB.X = 825854518D1895039292133FAEC9DD2815E64A79AF3B0E509F4D2AD6F9A0F87C8BD332805D54EAE0FBAA97F15FA8A2A2
23,940,353 UART: [art] PUB.Y = 3D32DA61B400B7B48B9A43C065C879D431EE340E67FF45C259FF6503F563D534E176F8CA8EFAB9AE724C58FB09D35731
23,947,596 UART: [art] SIG.R = B710C994AFDD6DF309795932A7DD1449C99348A6ACB92C1890C6362631F28003D0CD1482B73F1ED90120E435EDD98731
23,955,013 UART: [art] SIG.S = 87D158B27E54A5471A2B166CB315AEDB73AAE3884122ED05A4AC6A637E99E23D06FBCA9162BA96AD3F11260276160C6E
24,933,220 UART: mbox::rt_entry...
24,934,185 UART: ____ _ _ _ ____ _____
24,936,111 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,938,110 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,939,957 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,941,915 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,943,762 UART: |_|
24,944,637 UART:
25,057,671 UART: [rt] Runtime listening for mailbox commands...
25,063,538 >>> mbox cmd response data (3272 bytes)
25,079,262 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,112,671 >>> mbox cmd response data (0 bytes)
27,183,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,229,582 >>> mbox cmd response: success
34,264,982 UART:
34,265,324 UART: Running Caliptra FMC ...
34,266,446 UART:
34,266,610 UART: [state] CFI Enabled
34,310,617 UART: [art] Extend RT PCRs Done
34,311,759 UART: [art] Lock RT PCRs Done
34,313,090 UART: [art] Populate DV Done
34,318,510 UART: [fht] FMC Alias Private Key: 7
34,320,033 UART: [art] Derive CDI
34,320,803 UART: [art] Store in in slot 0x4
34,363,013 UART: [art] Derive Key Pair
34,364,010 UART: [art] Store priv key in slot 0x5
36,791,115 UART: [art] Derive Key Pair - Done
36,803,864 UART: [art] Signing Cert with AUTHO
36,805,204 UART: RITY.KEYID = 7
38,510,469 UART: [art] Erasing AUTHORITY.KEYID = 7
38,511,990 UART: [art] PUB.X = 43D7A4D47D9EE9EE1120DD8CF5A5251B77399EBAD50F5F548FC26F9EEAF12B566BF1F09B3374F93A633E036F0AA6846C
38,519,281 UART: [art] PUB.Y = 5CEE421BCEF2ACF8FDB4DBD3B91D18750A606377B9510C61AF703827F34EAE111EAC045A0E112141301FC932424F3DF6
38,526,505 UART: [art] SIG.R = FDDFA6F95A21143DCC8C0D83D6B67AAF034AC3F3944663D07650E060F9F323E478A94BAE1437DA631D9955A1BC3BE1DE
38,533,938 UART: [art] SIG.S = D6E9D88091AF97111E39675E89F06AD12119AABFDEABE97A960629BF35F51FC8AF563B5800FB42E04B573EBD53E1D891
39,512,350 UART: Caliptra RT
39,513,060 UART: [state] CFI Enabled
42,220,120 UART: Disabled attest: DPE valid fail
42,221,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,222,733 UART: [rt] RT listening for mailbox commands...
42,253,965 UART: [rt]cmd =0x494e464f, len=4
42,257,793 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,438,147 ready_for_fw is high
3,438,553 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,974,047 >>> mbox cmd response: success
13,974,827 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,276,757 UART:
18,277,166 UART: Running Caliptra FMC ...
18,278,296 UART:
18,278,457 UART: [state] CFI Enabled
18,348,694 UART: [fht] FMC Alias Private Key: 7
20,113,397 UART: [art] Extend RT PCRs Done
20,114,614 UART: [art] Lock RT PCRs Done
20,116,023 UART: [art] Populate DV Done
20,121,280 UART: [fht] FMC Alias Private Key: 7
20,122,993 UART: [art] Derive CDI
20,123,812 UART: [art] Store in in slot 0x4
20,181,808 UART: [art] Derive Key Pair
20,182,803 UART: [art] Store priv key in slot 0x5
22,647,181 UART: [art] Derive Key Pair - Done
22,660,236 UART: [art] Signing Cert with AUTHO
22,661,550 UART: RITY.KEYID = 7
24,373,924 UART: [art] Erasing AUTHORITY.KEYID = 7
24,375,739 UART: [art] PUB.X = 6AD2CCE7AA80A104DE6772180BE949AF869F76C9134B2CCA8F069FB2657F11B47E6669AB9288E6CB459B6467FCCD46CF
24,382,720 UART: [art] PUB.Y = CEC14BDBAF2E06D068CFBC8F921EABD14B379D549E605A4FE596CA1EAE4401E257703874B14C628D44072A72F963B964
24,389,997 UART: [art] SIG.R = 0582EA4EB575B2A1078CB4F47446B6F5772065775FCC17895F68BF285D732E01485105B122998277F43850340E31212C
24,397,333 UART: [art] SIG.S = 0642C2979EFBF5F8930C86A0E22A62DC32171CED035898713FC8E685EC11F6FC62AB205EFB459B6C8D858164D1500FE7
25,375,764 UART: mbox::rt_entry...
25,376,723 UART: ____ _ _ _ ____ _____
25,378,658 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,380,667 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,382,599 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,385,135 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,387,080 UART: |_|
25,387,895 UART:
25,500,936 UART: [rt] Runtime listening for mailbox commands...
25,506,791 >>> mbox cmd response data (3272 bytes)
25,522,621 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,556,049 >>> mbox cmd response data (0 bytes)
27,614,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,443,809 >>> mbox cmd response: success
35,479,632 UART:
35,479,966 UART: Running Caliptra FMC ...
35,481,038 UART:
35,481,204 UART: [state] CFI Enabled
35,588,476 UART: [art] Extend RT PCRs Done
35,589,677 UART: [art] Lock RT PCRs Done
35,591,135 UART: [art] Populate DV Done
35,596,704 UART: [fht] FMC Alias Private Key: 7
35,598,354 UART: [art] Derive CDI
35,599,171 UART: [art] Store in in slot 0x4
35,656,891 UART: [art] Derive Key Pair
35,657,976 UART: [art] Store priv key in slot 0x5
38,121,089 UART: [art] Derive Key Pair - Done
38,133,994 UART: [art] Signing Cert with AUTHO
38,135,306 UART: RITY.KEYID = 7
39,847,208 UART: [art] Erasing AUTHORITY.KEYID = 7
39,848,696 UART: [art] PUB.X = 4B2A2D174F7BA2AE12784DA31AF98762AF2CE5522BDAF95C348E59AD6CECB0D7B07DD75E6EB621638711D820C9262941
39,855,999 UART: [art] PUB.Y = 1B8133A4C8F870F4A076AF97AE4A583B95D623F4619B76515C1D3E61427AF05F5FBFEC6207325BE5D43FFA9A1B3EFCC5
39,863,226 UART: [art] SIG.R = 000AF5C73411AF3E48D1701131C58B2ABDAF34EE5ACC60EF9230A4009D8E07230F7327932ED7C1089E70BA538C06646C
39,870,653 UART: [art] SIG.S = C7D575D2A347FB6BB34F3C8944493C2718727F705B3F66BC55BFA8E19B4736EC28C403FCB065ECE5679EB13389EE5E10
40,849,379 UART: Caliptra RT
40,850,089 UART: [state] CFI Enabled
43,646,418 UART: Disabled attest: DPE valid fail
43,648,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,648,987 UART: [rt] RT listening for mailbox commands...
43,680,692 UART: [rt]cmd =0x494e464f, len=4
43,684,829 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,752,352 ready_for_fw is high
3,752,901 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,186,684 >>> mbox cmd response: success
14,187,305 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,440,819 UART:
18,441,220 UART: Running Caliptra FMC ...
18,442,353 UART:
18,442,503 UART: [state] CFI Enabled
18,450,614 UART: [fht] FMC Alias Private Key: 7
20,207,053 UART: [art] Extend RT PCRs Done
20,208,289 UART: [art] Lock RT PCRs Done
20,209,612 UART: [art] Populate DV Done
20,215,029 UART: [fht] FMC Alias Private Key: 7
20,216,782 UART: [art] Derive CDI
20,217,517 UART: [art] Store in in slot 0x4
20,260,388 UART: [art] Derive Key Pair
20,261,429 UART: [art] Store priv key in slot 0x5
22,688,323 UART: [art] Derive Key Pair - Done
22,701,045 UART: [art] Signing Cert with AUTHO
22,702,345 UART: RITY.KEYID = 7
24,407,471 UART: [art] Erasing AUTHORITY.KEYID = 7
24,409,533 UART: [art] PUB.X = BD3289FA2CAD2FCF2D53E79F3D9D4CD22AB65DEEAA3022F71AA3D863E9B0E038865DD29424F06A0946FF3E5FE48AF145
24,416,242 UART: [art] PUB.Y = 474742C2FA7407657DB60C3A4CD83B90B590E7878E5E6813B41FE67408E2B536B62F09DAE0619C8C4B1FEC0F63F8586A
24,423,527 UART: [art] SIG.R = EA64C641676C52F2A8C63B75E0C3B7CF4942E6042D2F3136F2A7FBBA0836083A4FB182603A2ED0277B8FEACAF69F2EF9
24,430,927 UART: [art] SIG.S = 4A02C83DDF4E7F426A7CBFAA7A155785D429D9D642A18F4637A23D8C2DFC0BA2910292F86BC6F20E20D5760A009E08F5
25,409,200 UART: mbox::rt_entry...
25,410,169 UART: ____ _ _ _ ____ _____
25,412,175 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,414,182 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,416,113 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,418,076 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,419,926 UART: |_|
25,420,721 UART:
25,533,915 UART: [rt] Runtime listening for mailbox commands...
25,539,723 >>> mbox cmd response data (3272 bytes)
25,555,457 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,588,833 >>> mbox cmd response data (0 bytes)
27,646,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,384,175 >>> mbox cmd response: success
35,417,985 UART:
35,418,308 UART: Running Caliptra FMC ...
35,419,425 UART:
35,419,585 UART: [state] CFI Enabled
35,463,287 UART: [art] Extend RT PCRs Done
35,464,481 UART: [art] Lock RT PCRs Done
35,465,722 UART: [art] Populate DV Done
35,471,127 UART: [fht] FMC Alias Private Key: 7
35,472,710 UART: [art] Derive CDI
35,473,521 UART: [art] Store in in slot 0x4
35,516,109 UART: [art] Derive Key Pair
35,517,100 UART: [art] Store priv key in slot 0x5
37,943,733 UART: [art] Derive Key Pair - Done
37,956,791 UART: [art] Signing Cert with AUTHO
37,958,100 UART: RITY.KEYID = 7
39,663,131 UART: [art] Erasing AUTHORITY.KEYID = 7
39,664,655 UART: [art] PUB.X = 2DC5F5ED6A01EC0C8963FC76ABDEDBA0C39FE9D151486D8E568BF4C42837BC0635B890BA28FE037395C2C2E3D5F36CBF
39,671,935 UART: [art] PUB.Y = 71B7FDB7D641D4893ED7740A37022BC0C428342E06D09F54BF4C0821E66E8F9BA9A08361D4A3C792CB66E81BC80900C7
39,679,212 UART: [art] SIG.R = 45DDC6476737B07D38988E62608145C1E343EA2F667EAA3E5571C824D04F71AB16ABC959E3FA17772C95A93564EDE896
39,686,571 UART: [art] SIG.S = 32A2EDD79FE7EAB6212F91AE661A929A0D5FFDA1E5E7A9B45BE5CD7FC3CAE8FBA464E940BD1CBB34A921F8CF291AC21E
40,665,882 UART: Caliptra RT
40,666,627 UART: [state] CFI Enabled
43,369,808 UART: Disabled attest: DPE valid fail
43,371,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,372,437 UART: [rt] RT listening for mailbox commands...
43,403,976 UART: [rt]cmd =0x494e464f, len=4
43,407,968 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,901 UART: [kat] SHA2-256
881,832 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,947 UART: [kat] ++
886,099 UART: [kat] sha1
890,179 UART: [kat] SHA2-256
892,117 UART: [kat] SHA2-384
894,902 UART: [kat] SHA2-512-ACC
896,803 UART: [kat] ECC-384
902,400 UART: [kat] HMAC-384Kdf
907,070 UART: [kat] LMS
1,475,266 UART: [kat] --
1,476,263 UART: [cold-reset] ++
1,476,827 UART: [fht] Storing FHT @ 0x50003400
1,479,730 UART: [idev] ++
1,479,898 UART: [idev] CDI.KEYID = 6
1,480,258 UART: [idev] SUBJECT.KEYID = 7
1,480,682 UART: [idev] UDS.KEYID = 0
1,481,027 ready_for_fw is high
1,481,027 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,446 UART: [idev] Erasing UDS.KEYID = 0
1,504,876 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,378 UART: [idev] --
1,514,483 UART: [ldev] ++
1,514,651 UART: [ldev] CDI.KEYID = 6
1,515,014 UART: [ldev] SUBJECT.KEYID = 5
1,515,440 UART: [ldev] AUTHORITY.KEYID = 7
1,515,903 UART: [ldev] FE.KEYID = 1
1,520,755 UART: [ldev] Erasing FE.KEYID = 1
1,546,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,166 UART: [ldev] --
1,585,507 UART: [fwproc] Waiting for Commands...
1,586,162 UART: [fwproc] Received command 0x46574c44
1,586,953 UART: [fwproc] Received Image of size 78704 bytes
2,477,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,071 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,423 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,954 >>> mbox cmd response: success
2,616,954 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,617,966 UART: [afmc] ++
2,618,134 UART: [afmc] CDI.KEYID = 6
2,618,496 UART: [afmc] SUBJECT.KEYID = 7
2,618,921 UART: [afmc] AUTHORITY.KEYID = 5
2,654,192 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,378 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,158 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,886 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,771 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,461 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,336 UART: [afmc] --
2,697,284 UART: [cold-reset] --
2,697,990 UART: [state] Locking Datavault
2,698,837 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,441 UART: [state] Locking ICCM
2,700,037 UART: [exit] Launching FMC @ 0x40000130
2,705,366 UART:
2,705,382 UART: Running Caliptra FMC ...
2,705,790 UART:
2,705,844 UART: [state] CFI Enabled
2,716,093 UART: [fht] FMC Alias Private Key: 7
2,823,980 UART: [art] Extend RT PCRs Done
2,824,408 UART: [art] Lock RT PCRs Done
2,825,518 UART: [art] Populate DV Done
2,833,651 UART: [fht] FMC Alias Private Key: 7
2,834,609 UART: [art] Derive CDI
2,834,889 UART: [art] Store in in slot 0x4
2,920,602 UART: [art] Derive Key Pair
2,920,962 UART: [art] Store priv key in slot 0x5
2,933,904 UART: [art] Derive Key Pair - Done
2,948,763 UART: [art] Signing Cert with AUTHO
2,949,243 UART: RITY.KEYID = 7
2,964,277 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,042 UART: [art] PUB.X = 8035549CD1B2A9B53E599CFEDD51A4F0BCBCDC579565852F15DD78A51FBB23932EBF9C07DB4379241FFC225728A4B666
2,971,821 UART: [art] PUB.Y = 1BD0622B0AF5EB12E97BBCC4B04D9811F6B8288D05F7E6AFD5951D32C30B2F71D5A4AD1A384E547BE77FC5C9AEE60479
2,978,777 UART: [art] SIG.R = 2829800018ED1F3469BFA010CB84978D1C40500D6B22175CD113BBE3F8FDDC50218528B5CF702924FB4279DFC8897A5C
2,985,524 UART: [art] SIG.S = F1E209E3DB02B8DF2DF6EC8AC5CFDCB4B52C828A7BAB655EDC3037831DACE103F849B64F8CAB26E701E2D96A526EB8DE
3,008,995 UART: mbox::rt_entry...
3,009,367 UART: ____ _ _ _ ____ _____
3,010,151 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,010,951 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,011,719 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,487 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,255 UART: |_|
3,013,567 UART:
3,121,491 UART: [rt] Runtime listening for mailbox commands...
3,126,459 >>> mbox cmd response data (3272 bytes)
3,126,460 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,149,546 >>> mbox cmd response data (0 bytes)
3,149,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,149,667 UART:
3,149,683 UART: Running Caliptra ROM ...
3,150,091 UART:
3,150,145 UART: [state] CFI Enabled
3,153,005 UART: [state] LifecycleState = Unprovisioned
3,153,660 UART: [state] DebugLocked = No
3,154,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,155,753 UART: [kat] SHA2-256
3,949,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,953,799 UART: [kat] ++
3,953,951 UART: [kat] sha1
3,958,145 UART: [kat] SHA2-256
3,960,083 UART: [kat] SHA2-384
3,962,980 UART: [kat] SHA2-512-ACC
3,964,880 UART: [kat] ECC-384
3,970,361 UART: [kat] HMAC-384Kdf
3,975,011 UART: [kat] LMS
4,543,207 UART: [kat] --
4,543,908 UART: [update-reset] ++
5,879,997 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,881,121 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,031,171 >>> mbox cmd response: success
6,031,304 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,318 UART: [update-reset Success] --
6,040,343 UART: [state] Locking Datavault
6,041,023 UART: [state] Locking PCR0, PCR1 and PCR31
6,041,627 UART: [state] Locking ICCM
6,042,193 UART: [exit] Launching FMC @ 0x40000130
6,047,522 UART:
6,047,538 UART: Running Caliptra FMC ...
6,047,946 UART:
6,048,000 UART: [state] CFI Enabled
6,136,549 UART: [art] Extend RT PCRs Done
6,136,977 UART: [art] Lock RT PCRs Done
6,137,968 UART: [art] Populate DV Done
6,146,123 UART: [fht] FMC Alias Private Key: 7
6,147,229 UART: [art] Derive CDI
6,147,509 UART: [art] Store in in slot 0x4
6,233,416 UART: [art] Derive Key Pair
6,233,776 UART: [art] Store priv key in slot 0x5
6,247,044 UART: [art] Derive Key Pair - Done
6,261,861 UART: [art] Signing Cert with AUTHO
6,262,341 UART: RITY.KEYID = 7
6,277,525 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,290 UART: [art] PUB.X = 460A95678DD5BE08A33048D60458047D4FF6464F58171BEC80A9AFE26777AADCA10A1DFCEC1F0CDD9B871EDD0BE6503A
6,285,057 UART: [art] PUB.Y = 615CAB24F0E4168A5CFA5B0076B771AAC88524B4AB07A43F45BD3D44DE8C0B2E7F83A320132261BA2C98A73089B187E9
6,291,987 UART: [art] SIG.R = 9C7889316DA83855A88F26E1E4F5B34C3B830EDDA92413475B04A8D5007DA2EAD9DD72E214F56D8E2C64CEF208EC5246
6,298,734 UART: [art] SIG.S = 71ECF6BA357B0F7E2CBCA74FC952AF6D51C695C288EFB443D94126AB07AC5887907C7D3F172BAD396FEABF25C613761E
6,322,189 UART: Caliptra RT
6,322,442 UART: [state] CFI Enabled
6,607,193 UART: Disabled attest: DPE valid fail
6,607,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,608,975 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,639,561 UART: [rt]cmd =0x494e464f, len=4
6,642,762 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,395 ready_for_fw is high
1,363,395 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,084 >>> mbox cmd response: success
2,466,084 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,528,666 UART:
2,528,682 UART: Running Caliptra FMC ...
2,529,090 UART:
2,529,144 UART: [state] CFI Enabled
2,539,949 UART: [fht] FMC Alias Private Key: 7
2,647,972 UART: [art] Extend RT PCRs Done
2,648,400 UART: [art] Lock RT PCRs Done
2,649,686 UART: [art] Populate DV Done
2,657,789 UART: [fht] FMC Alias Private Key: 7
2,658,895 UART: [art] Derive CDI
2,659,175 UART: [art] Store in in slot 0x4
2,744,342 UART: [art] Derive Key Pair
2,744,702 UART: [art] Store priv key in slot 0x5
2,757,260 UART: [art] Derive Key Pair - Done
2,772,238 UART: [art] Signing Cert with AUTHO
2,772,718 UART: RITY.KEYID = 7
2,788,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,393 UART: [art] PUB.X = 45DFD789723A7D5A41E47AAFE1D511E3B72ED2EE3630C762FC8BD15A1462DFF9BAD465E9E20833CFC71456BC6F3E9291
2,796,176 UART: [art] PUB.Y = 32309BABE4978C3CC4E03152B8FCED631C1434AACCC039C917A3FFBF131290618BD98E12091ABF00BD69D24F3E1E98E6
2,803,115 UART: [art] SIG.R = 37C3E250B4BDDE8F37A7C9915DE35C7CF989F3335588A02ED065FBD1311BBF2F6982C4D08096429F23195864FE98DE00
2,809,867 UART: [art] SIG.S = D0C6B452AF9B07AA9F89A896A1649B11E676801E1ABCBAE1AD3987BE8E478484E52F07169BA019C561961B36505A797F
2,833,726 UART: mbox::rt_entry...
2,834,098 UART: ____ _ _ _ ____ _____
2,834,882 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,682 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,450 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,218 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,986 UART: |_|
2,838,298 UART:
2,945,766 UART: [rt] Runtime listening for mailbox commands...
2,950,734 >>> mbox cmd response data (3272 bytes)
2,950,735 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,973,821 >>> mbox cmd response data (0 bytes)
2,973,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,735,096 >>> mbox cmd response: success
5,748,435 UART:
5,748,451 UART: Running Caliptra FMC ...
5,748,859 UART:
5,748,913 UART: [state] CFI Enabled
5,838,028 UART: [art] Extend RT PCRs Done
5,838,456 UART: [art] Lock RT PCRs Done
5,839,589 UART: [art] Populate DV Done
5,847,870 UART: [fht] FMC Alias Private Key: 7
5,848,894 UART: [art] Derive CDI
5,849,174 UART: [art] Store in in slot 0x4
5,934,589 UART: [art] Derive Key Pair
5,934,949 UART: [art] Store priv key in slot 0x5
5,947,821 UART: [art] Derive Key Pair - Done
5,962,419 UART: [art] Signing Cert with AUTHO
5,962,899 UART: RITY.KEYID = 7
5,977,925 UART: [art] Erasing AUTHORITY.KEYID = 7
5,978,690 UART: [art] PUB.X = 8076EECC58A02A26A658944FC411FEED97D4A93D9ABB0B8A948266D5B5AB81F9A84BA1517E6AA7EB6B1134E29CA758F3
5,985,473 UART: [art] PUB.Y = ADB5F8B16ECE531373B8BAC22E59BE5C39554C9F6906AC1DF833D33429CCE05BA18FB19C717FEC346ABD0D3246F8AA69
5,992,437 UART: [art] SIG.R = DD421984B2BC812850C0C21BF084596CF643CB47D82ECBF25BD9B98C5F57EA9749015AA03907436C7CD688A847263C41
5,999,203 UART: [art] SIG.S = 0EBAA697C1A492FCBABF130BC6640992FA9F83FAFA177EED34AEC0CD94A8EFE21E54E0952CBA0A317FB1951C46AB4545
6,023,284 UART: Caliptra RT
6,023,537 UART: [state] CFI Enabled
6,305,284 UART: Disabled attest: DPE valid fail
6,305,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,307,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,337,754 UART: [rt]cmd =0x494e464f, len=4
6,341,039 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,119 UART: [state] LifecycleState = Unprovisioned
86,774 UART: [state] DebugLocked = No
87,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,764 UART: [kat] SHA2-256
882,695 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,810 UART: [kat] ++
886,962 UART: [kat] sha1
891,366 UART: [kat] SHA2-256
893,304 UART: [kat] SHA2-384
896,007 UART: [kat] SHA2-512-ACC
897,908 UART: [kat] ECC-384
903,661 UART: [kat] HMAC-384Kdf
908,245 UART: [kat] LMS
1,476,441 UART: [kat] --
1,477,344 UART: [cold-reset] ++
1,477,820 UART: [fht] Storing FHT @ 0x50003400
1,480,607 UART: [idev] ++
1,480,775 UART: [idev] CDI.KEYID = 6
1,481,135 UART: [idev] SUBJECT.KEYID = 7
1,481,559 UART: [idev] UDS.KEYID = 0
1,481,904 ready_for_fw is high
1,481,904 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,493 UART: [idev] Erasing UDS.KEYID = 0
1,505,923 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,569 UART: [idev] --
1,515,532 UART: [ldev] ++
1,515,700 UART: [ldev] CDI.KEYID = 6
1,516,063 UART: [ldev] SUBJECT.KEYID = 5
1,516,489 UART: [ldev] AUTHORITY.KEYID = 7
1,516,952 UART: [ldev] FE.KEYID = 1
1,522,216 UART: [ldev] Erasing FE.KEYID = 1
1,548,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,237 UART: [ldev] --
1,587,750 UART: [fwproc] Waiting for Commands...
1,588,423 UART: [fwproc] Received command 0x46574c44
1,589,214 UART: [fwproc] Received Image of size 78704 bytes
2,479,814 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,960 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,536,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,755 >>> mbox cmd response: success
2,618,755 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,619,977 UART: [afmc] ++
2,620,145 UART: [afmc] CDI.KEYID = 6
2,620,507 UART: [afmc] SUBJECT.KEYID = 7
2,620,932 UART: [afmc] AUTHORITY.KEYID = 5
2,655,939 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,672,203 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,684,596 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,286 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,698,279 UART: [afmc] --
2,699,229 UART: [cold-reset] --
2,700,055 UART: [state] Locking Datavault
2,701,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,702,050 UART: [state] Locking ICCM
2,702,672 UART: [exit] Launching FMC @ 0x40000130
2,708,001 UART:
2,708,017 UART: Running Caliptra FMC ...
2,708,425 UART:
2,708,568 UART: [state] CFI Enabled
2,719,245 UART: [fht] FMC Alias Private Key: 7
2,826,716 UART: [art] Extend RT PCRs Done
2,827,144 UART: [art] Lock RT PCRs Done
2,828,580 UART: [art] Populate DV Done
2,836,717 UART: [fht] FMC Alias Private Key: 7
2,837,817 UART: [art] Derive CDI
2,838,097 UART: [art] Store in in slot 0x4
2,923,742 UART: [art] Derive Key Pair
2,924,102 UART: [art] Store priv key in slot 0x5
2,937,826 UART: [art] Derive Key Pair - Done
2,952,962 UART: [art] Signing Cert with AUTHO
2,953,442 UART: RITY.KEYID = 7
2,968,302 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,067 UART: [art] PUB.X = 0724C0724901780F72A5D1658E9DB3CE8D0AD06FAD94D3A8277BE7BA31E825C826B35FEA3EC759D75BB50DAD4B7E5C39
2,975,836 UART: [art] PUB.Y = 3D81D863223223F2DB435A75045D6C54A190E04D082A18627CC9068FCD2D4FD8B04EEDAD7453957C23E30A71C57BECAC
2,982,782 UART: [art] SIG.R = 40D9533FB6F47759A00D1085785076BEFA51BE945EEB0F8391381A23ADD9C9B0CED7E03016A29FB6A1BDCC76B1DC35C0
2,989,560 UART: [art] SIG.S = 78D20783761D56A0401E5C783DBA298A9F55C771A65B5FAABAB7B996D1974B20BB31CF7E20012906941BFE15FACDE7DC
3,012,944 UART: mbox::rt_entry...
3,013,316 UART: ____ _ _ _ ____ _____
3,014,100 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,900 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,668 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,016,436 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,017,204 UART: |_|
3,017,516 UART:
3,124,955 UART: [rt] Runtime listening for mailbox commands...
3,129,923 >>> mbox cmd response data (3272 bytes)
3,129,924 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,153,010 >>> mbox cmd response data (0 bytes)
3,153,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,153,131 UART:
3,153,147 UART: Running Caliptra ROM ...
3,153,555 UART:
3,153,696 UART: [state] CFI Enabled
3,156,842 UART: [state] LifecycleState = Unprovisioned
3,157,497 UART: [state] DebugLocked = No
3,158,173 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,159,822 UART: [kat] SHA2-256
3,953,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,957,868 UART: [kat] ++
3,958,020 UART: [kat] sha1
3,962,342 UART: [kat] SHA2-256
3,964,280 UART: [kat] SHA2-384
3,966,919 UART: [kat] SHA2-512-ACC
3,968,819 UART: [kat] ECC-384
3,974,568 UART: [kat] HMAC-384Kdf
3,979,142 UART: [kat] LMS
4,547,338 UART: [kat] --
4,548,055 UART: [update-reset] ++
5,884,410 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,885,692 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,035,742 >>> mbox cmd response: success
6,035,919 UART: [update-reset] Copying MAN_2 To MAN_1
6,043,933 UART: [update-reset Success] --
6,044,896 UART: [state] Locking Datavault
6,045,546 UART: [state] Locking PCR0, PCR1 and PCR31
6,046,150 UART: [state] Locking ICCM
6,046,632 UART: [exit] Launching FMC @ 0x40000130
6,051,961 UART:
6,051,977 UART: Running Caliptra FMC ...
6,052,385 UART:
6,052,528 UART: [state] CFI Enabled
6,142,115 UART: [art] Extend RT PCRs Done
6,142,543 UART: [art] Lock RT PCRs Done
6,143,898 UART: [art] Populate DV Done
6,152,195 UART: [fht] FMC Alias Private Key: 7
6,153,211 UART: [art] Derive CDI
6,153,491 UART: [art] Store in in slot 0x4
6,239,178 UART: [art] Derive Key Pair
6,239,538 UART: [art] Store priv key in slot 0x5
6,252,876 UART: [art] Derive Key Pair - Done
6,267,488 UART: [art] Signing Cert with AUTHO
6,267,968 UART: RITY.KEYID = 7
6,283,376 UART: [art] Erasing AUTHORITY.KEYID = 7
6,284,141 UART: [art] PUB.X = B37C573390A991622E038D1ADBC64A2F6FBC197ACB705735D5C438E9CA0211D1856733A2B157592A35560799BC0C3AF1
6,290,899 UART: [art] PUB.Y = 89D5EA87ED1514DCF132CBD5EBF88E931A054D433986B01529FA0E858BC6F29888D90E664011AF497475093DD3222074
6,297,835 UART: [art] SIG.R = D42A365130D381B675C74791D52AC8E7267743A76590FA0ECF5FE50A03542591008BC85450E987B9A097F37E83409FAC
6,304,568 UART: [art] SIG.S = F28F0D5ADEEC34C016438D7AA861717E139B8699429546844AB3E7F4FEE10931017F673B751B60642A9C41AB115C5E31
6,327,906 UART: Caliptra RT
6,328,251 UART: [state] CFI Enabled
6,608,719 UART: Disabled attest: DPE valid fail
6,609,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,610,631 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,641,185 UART: [rt]cmd =0x494e464f, len=4
6,644,462 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,816 ready_for_fw is high
1,362,816 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,397 >>> mbox cmd response: success
2,466,397 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,529,103 UART:
2,529,119 UART: Running Caliptra FMC ...
2,529,527 UART:
2,529,670 UART: [state] CFI Enabled
2,540,627 UART: [fht] FMC Alias Private Key: 7
2,648,312 UART: [art] Extend RT PCRs Done
2,648,740 UART: [art] Lock RT PCRs Done
2,650,296 UART: [art] Populate DV Done
2,658,443 UART: [fht] FMC Alias Private Key: 7
2,659,581 UART: [art] Derive CDI
2,659,861 UART: [art] Store in in slot 0x4
2,745,280 UART: [art] Derive Key Pair
2,745,640 UART: [art] Store priv key in slot 0x5
2,759,584 UART: [art] Derive Key Pair - Done
2,774,354 UART: [art] Signing Cert with AUTHO
2,774,834 UART: RITY.KEYID = 7
2,790,208 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,973 UART: [art] PUB.X = 91194DD4DDBFE7FBFE447735AE3036EBCB745A90D1817574FD4E9A7EB1293E25CFD3EA61CCCBBFD6C9615606E6F67713
2,797,760 UART: [art] PUB.Y = D8B000C2276CC53915CE2595ACBCE323E848102FF7FDC7D5DD979C96262C7EB195C73183DAB9E99E7533371E88DC8416
2,804,694 UART: [art] SIG.R = 62FBF1F113F66B676241E0564D81930F4C5FE63E0B2B81DDBAB9F44B771A6C477787EE19CF7C07293AEA6E87EFDA1B1B
2,811,471 UART: [art] SIG.S = B592F8A36C47CEED951F7A82C702D7BCA82CC4FBD94FDBFCF082927822F1A5DCC0DA6D3A4109E3378ED9EF5CA9DB8F6B
2,835,646 UART: mbox::rt_entry...
2,836,018 UART: ____ _ _ _ ____ _____
2,836,802 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,837,602 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,838,370 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,839,138 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,906 UART: |_|
2,840,218 UART:
2,947,746 UART: [rt] Runtime listening for mailbox commands...
2,952,714 >>> mbox cmd response data (3272 bytes)
2,952,715 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,975,801 >>> mbox cmd response data (0 bytes)
2,975,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,739,479 >>> mbox cmd response: success
5,753,028 UART:
5,753,044 UART: Running Caliptra FMC ...
5,753,452 UART:
5,753,595 UART: [state] CFI Enabled
5,843,228 UART: [art] Extend RT PCRs Done
5,843,656 UART: [art] Lock RT PCRs Done
5,844,845 UART: [art] Populate DV Done
5,852,886 UART: [fht] FMC Alias Private Key: 7
5,853,844 UART: [art] Derive CDI
5,854,124 UART: [art] Store in in slot 0x4
5,940,279 UART: [art] Derive Key Pair
5,940,639 UART: [art] Store priv key in slot 0x5
5,953,157 UART: [art] Derive Key Pair - Done
5,967,787 UART: [art] Signing Cert with AUTHO
5,968,267 UART: RITY.KEYID = 7
5,983,593 UART: [art] Erasing AUTHORITY.KEYID = 7
5,984,358 UART: [art] PUB.X = 5CFB49B48D9FE4D6743EC9F042F88B096FCEEB343852204485C770BE35CB525D8896639E3DB0D97109F972A58AA736A2
5,991,126 UART: [art] PUB.Y = 29841BF56B18CF24F1B2A8AA6360321865B784D094C30AC3794E50ECB9FF60C64617F0413817EDD8536E503122AB22A7
5,998,071 UART: [art] SIG.R = 801DA0B9B35B8795FC18BF607CDB18E16FA97BEC708D691DF873F1A8CDAB449B8CCBF013A1F3FA5605CA9D31577AC8C5
6,004,860 UART: [art] SIG.S = F71341CCDA44E917BC842924C8F34423F3AC3766D12B9839AC48D33876DE848DA1020234FE17857970EAF9B540EBCB0D
6,029,030 UART: Caliptra RT
6,029,375 UART: [state] CFI Enabled
6,314,995 UART: Disabled attest: DPE valid fail
6,315,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,317,095 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,347,761 UART: [rt]cmd =0x494e464f, len=4
6,351,188 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,564 UART: [state] LifecycleState = Unprovisioned
85,219 UART: [state] DebugLocked = No
85,923 UART: [state] WD Timer not started. Device not locked for debugging
87,056 UART: [kat] SHA2-256
892,706 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,831 UART: [kat] ++
896,983 UART: [kat] sha1
901,097 UART: [kat] SHA2-256
903,037 UART: [kat] SHA2-384
905,862 UART: [kat] SHA2-512-ACC
907,763 UART: [kat] ECC-384
917,496 UART: [kat] HMAC-384Kdf
922,040 UART: [kat] LMS
1,170,368 UART: [kat] --
1,171,369 UART: [cold-reset] ++
1,171,933 UART: [fht] FHT @ 0x50003400
1,174,618 UART: [idev] ++
1,174,786 UART: [idev] CDI.KEYID = 6
1,175,146 UART: [idev] SUBJECT.KEYID = 7
1,175,570 UART: [idev] UDS.KEYID = 0
1,175,915 ready_for_fw is high
1,175,915 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,698 UART: [idev] Erasing UDS.KEYID = 0
1,200,801 UART: [idev] Sha1 KeyId Algorithm
1,209,283 UART: [idev] --
1,210,349 UART: [ldev] ++
1,210,517 UART: [ldev] CDI.KEYID = 6
1,210,880 UART: [ldev] SUBJECT.KEYID = 5
1,211,306 UART: [ldev] AUTHORITY.KEYID = 7
1,211,769 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,243,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,705 UART: [ldev] --
1,283,124 UART: [fwproc] Wait for Commands...
1,283,698 UART: [fwproc] Recv command 0x46574c44
1,284,426 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,778 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,313,143 >>> mbox cmd response: success
2,313,143 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,223 UART: [afmc] ++
2,314,391 UART: [afmc] CDI.KEYID = 6
2,314,753 UART: [afmc] SUBJECT.KEYID = 7
2,315,178 UART: [afmc] AUTHORITY.KEYID = 5
2,350,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,442 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,327 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,046 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,712 UART: [afmc] --
2,393,800 UART: [cold-reset] --
2,394,536 UART: [state] Locking Datavault
2,395,583 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,187 UART: [state] Locking ICCM
2,396,783 UART: [exit] Launching FMC @ 0x40000130
2,402,112 UART:
2,402,128 UART: Running Caliptra FMC ...
2,402,536 UART:
2,402,590 UART: [state] CFI Enabled
2,413,135 UART: [fht] FMC Alias Private Key: 7
2,521,454 UART: [art] Extend RT PCRs Done
2,521,882 UART: [art] Lock RT PCRs Done
2,523,358 UART: [art] Populate DV Done
2,531,381 UART: [fht] FMC Alias Private Key: 7
2,532,385 UART: [art] Derive CDI
2,532,665 UART: [art] Store in in slot 0x4
2,617,972 UART: [art] Derive Key Pair
2,618,332 UART: [art] Store priv key in slot 0x5
2,631,990 UART: [art] Derive Key Pair - Done
2,646,707 UART: [art] Signing Cert with AUTHO
2,647,187 UART: RITY.KEYID = 7
2,662,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,928 UART: [art] PUB.X = 5E0674678969CB3FBF1F25E0432F08E231DB6308BE884F12E5148BB7D9857A7A808D7E5913944AFD733CBA3AE2AE75B4
2,669,695 UART: [art] PUB.Y = 9FE6C0FDED81CD1AA27E177DEEC873C343F18E3480F7469926145313FDF48A5CBE45395359E97C783A45FC48A06AC6D7
2,676,655 UART: [art] SIG.R = 305377DA29E4432B0B3EB90555F57360EB894261D27563FB8245B57410E29B827C11DA3EF76815C2D27C61E257CC705E
2,683,413 UART: [art] SIG.S = DC16AF539A38F185C57DB5BB3F75C2F1DFE8397F1CD67C8B14C4B586256265A6AB9D37693DCB164302803B7D95ED5C22
2,707,541 UART: mbox::rt_entry...
2,707,913 UART: ____ _ _ _ ____ _____
2,708,697 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,497 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,265 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,033 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,801 UART: |_|
2,712,113 UART:
2,818,681 UART: [rt] Runtime listening for mailbox commands...
2,823,649 >>> mbox cmd response data (3272 bytes)
2,823,650 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,736 >>> mbox cmd response data (0 bytes)
2,846,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,846,854 UART:
2,846,870 UART: Running Caliptra ROM ...
2,847,278 UART:
2,847,333 UART: [state] CFI Enabled
2,849,523 UART: [state] LifecycleState = Unprovisioned
2,850,178 UART: [state] DebugLocked = No
2,850,740 UART: [state] WD Timer not started. Device not locked for debugging
2,852,076 UART: [kat] SHA2-256
3,657,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,661,851 UART: [kat] ++
3,662,003 UART: [kat] sha1
3,666,359 UART: [kat] SHA2-256
3,668,299 UART: [kat] SHA2-384
3,671,030 UART: [kat] SHA2-512-ACC
3,672,930 UART: [kat] ECC-384
3,682,817 UART: [kat] HMAC-384Kdf
3,687,277 UART: [kat] LMS
3,935,605 UART: [kat] --
3,936,505 UART: [update-reset] ++
5,249,882 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,061 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,401,059 >>> mbox cmd response: success
5,401,250 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,264 UART: [update-reset Success] --
5,410,339 UART: [state] Locking Datavault
5,411,263 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,867 UART: [state] Locking ICCM
5,412,423 UART: [exit] Launching FMC @ 0x40000130
5,417,752 UART:
5,417,768 UART: Running Caliptra FMC ...
5,418,176 UART:
5,418,230 UART: [state] CFI Enabled
5,507,573 UART: [art] Extend RT PCRs Done
5,508,001 UART: [art] Lock RT PCRs Done
5,508,946 UART: [art] Populate DV Done
5,517,055 UART: [fht] FMC Alias Private Key: 7
5,518,195 UART: [art] Derive CDI
5,518,475 UART: [art] Store in in slot 0x4
5,604,230 UART: [art] Derive Key Pair
5,604,590 UART: [art] Store priv key in slot 0x5
5,618,066 UART: [art] Derive Key Pair - Done
5,632,368 UART: [art] Signing Cert with AUTHO
5,632,848 UART: RITY.KEYID = 7
5,648,214 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,979 UART: [art] PUB.X = 8DE3D6CFC66BE6F380A464B3A321549AFC5594487562EF5D45591D896224B0866B6C472794B48C77D24D49B4E12C9985
5,655,745 UART: [art] PUB.Y = 08AEFEB3014691D4685FC7DB420D88669E55FCF8C066F3779B48B529359D8180043C8C9E567753458DDC298CD5E80516
5,662,676 UART: [art] SIG.R = 52FF721B055E21F0E486EE4A5E89134F738FCC479196CF363CE780291B65B528E94F98158FFAC02436F9C677BEB772FA
5,669,447 UART: [art] SIG.S = B856921A086C9B325D33814E87574119A4B7D3BEADB0645532A326FCBF3B94EAA4365281A2A193C9F67706BD4645B0A6
5,693,100 UART: Caliptra RT
5,693,353 UART: [state] CFI Enabled
5,978,672 UART: Disabled attest: DPE valid fail
5,979,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,980,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,010,684 UART: [rt]cmd =0x494e464f, len=4
6,013,941 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,563 ready_for_fw is high
1,059,563 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,704 >>> mbox cmd response: success
2,164,704 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,310 UART:
2,226,326 UART: Running Caliptra FMC ...
2,226,734 UART:
2,226,788 UART: [state] CFI Enabled
2,237,699 UART: [fht] FMC Alias Private Key: 7
2,346,478 UART: [art] Extend RT PCRs Done
2,346,906 UART: [art] Lock RT PCRs Done
2,348,414 UART: [art] Populate DV Done
2,356,421 UART: [fht] FMC Alias Private Key: 7
2,357,399 UART: [art] Derive CDI
2,357,679 UART: [art] Store in in slot 0x4
2,443,278 UART: [art] Derive Key Pair
2,443,638 UART: [art] Store priv key in slot 0x5
2,456,950 UART: [art] Derive Key Pair - Done
2,471,889 UART: [art] Signing Cert with AUTHO
2,472,369 UART: RITY.KEYID = 7
2,487,371 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,136 UART: [art] PUB.X = E40899A4D395DAE21818A0E7AD764FC78B9D1E458E31BF08F7E9CEF78CEAE7768BEE0DF95737108B11FCBA53470855EF
2,494,910 UART: [art] PUB.Y = 19B141283BA8C34D232BCF86F0D9065DC8AE16639C073622599A0D3BA26633C41CA9272DA6CBFD6E5A1CCE6CEEC563C0
2,501,865 UART: [art] SIG.R = E8C88A60E10386F30E064AF947E99D10EB6CA1C7A400A232B48739129989041F88B1BAC39676556B71CE8618A2145B8B
2,508,597 UART: [art] SIG.S = A653C1FA3239BFB8BEA5E7DE423AC57174B1B01B5520F9E3C4D159C0225B8F972044982FE5A0CC586AB986233670E115
2,532,384 UART: mbox::rt_entry...
2,532,756 UART: ____ _ _ _ ____ _____
2,533,540 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,340 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,108 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,876 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,644 UART: |_|
2,536,956 UART:
2,643,807 UART: [rt] Runtime listening for mailbox commands...
2,648,775 >>> mbox cmd response data (3272 bytes)
2,648,776 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,862 >>> mbox cmd response data (0 bytes)
2,671,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,110,656 >>> mbox cmd response: success
5,123,948 UART:
5,123,964 UART: Running Caliptra FMC ...
5,124,372 UART:
5,124,426 UART: [state] CFI Enabled
5,212,771 UART: [art] Extend RT PCRs Done
5,213,199 UART: [art] Lock RT PCRs Done
5,214,460 UART: [art] Populate DV Done
5,222,877 UART: [fht] FMC Alias Private Key: 7
5,223,837 UART: [art] Derive CDI
5,224,117 UART: [art] Store in in slot 0x4
5,309,626 UART: [art] Derive Key Pair
5,309,986 UART: [art] Store priv key in slot 0x5
5,322,492 UART: [art] Derive Key Pair - Done
5,337,444 UART: [art] Signing Cert with AUTHO
5,337,924 UART: RITY.KEYID = 7
5,353,242 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,007 UART: [art] PUB.X = 4013A580439EC7752B7D6EDD27687658B6C573A98BD4CC5A825EDBE3BAF6592204CFCB626E5E2BE01ACB2C6DC9E64A32
5,360,790 UART: [art] PUB.Y = E884860580BC96E6DF65FCD8A0EF00AB596E61876574BCEF625608E114D4DEF9855C5315A10554FBC0D315E3D08CE5C2
5,367,717 UART: [art] SIG.R = 0AA31E036B2AD1C81F5538E3F7BB6883C69E07DCC0996763A3A5C4751BE285A1AE729FE3B61F622658DCB327AB75BFEC
5,374,492 UART: [art] SIG.S = 16A354B04C43C16BC317531D24F9F16186AD4B5E29969791F1268FD7F6D7E3C48443651BAEC98C8E1258BA2D8F156974
5,398,211 UART: Caliptra RT
5,398,464 UART: [state] CFI Enabled
5,682,407 UART: Disabled attest: DPE valid fail
5,682,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,684,457 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,714,871 UART: [rt]cmd =0x494e464f, len=4
5,718,240 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,875 UART: [state] LifecycleState = Unprovisioned
86,530 UART: [state] DebugLocked = No
87,192 UART: [state] WD Timer not started. Device not locked for debugging
88,513 UART: [kat] SHA2-256
894,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,288 UART: [kat] ++
898,440 UART: [kat] sha1
902,548 UART: [kat] SHA2-256
904,488 UART: [kat] SHA2-384
907,439 UART: [kat] SHA2-512-ACC
909,340 UART: [kat] ECC-384
919,291 UART: [kat] HMAC-384Kdf
924,035 UART: [kat] LMS
1,172,363 UART: [kat] --
1,173,072 UART: [cold-reset] ++
1,173,584 UART: [fht] FHT @ 0x50003400
1,176,313 UART: [idev] ++
1,176,481 UART: [idev] CDI.KEYID = 6
1,176,841 UART: [idev] SUBJECT.KEYID = 7
1,177,265 UART: [idev] UDS.KEYID = 0
1,177,610 ready_for_fw is high
1,177,610 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,953 UART: [idev] Erasing UDS.KEYID = 0
1,202,552 UART: [idev] Sha1 KeyId Algorithm
1,211,116 UART: [idev] --
1,212,102 UART: [ldev] ++
1,212,270 UART: [ldev] CDI.KEYID = 6
1,212,633 UART: [ldev] SUBJECT.KEYID = 5
1,213,059 UART: [ldev] AUTHORITY.KEYID = 7
1,213,522 UART: [ldev] FE.KEYID = 1
1,218,898 UART: [ldev] Erasing FE.KEYID = 1
1,245,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,700 UART: [ldev] --
1,285,173 UART: [fwproc] Wait for Commands...
1,285,983 UART: [fwproc] Recv command 0x46574c44
1,286,711 UART: [fwproc] Recv'd Img size: 78704 bytes
2,176,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,233,049 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,315,322 >>> mbox cmd response: success
2,315,322 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,316,540 UART: [afmc] ++
2,316,708 UART: [afmc] CDI.KEYID = 6
2,317,070 UART: [afmc] SUBJECT.KEYID = 7
2,317,495 UART: [afmc] AUTHORITY.KEYID = 5
2,353,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,370,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,370,769 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,376,497 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,382,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,388,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,395,997 UART: [afmc] --
2,397,033 UART: [cold-reset] --
2,397,909 UART: [state] Locking Datavault
2,399,042 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,646 UART: [state] Locking ICCM
2,400,222 UART: [exit] Launching FMC @ 0x40000130
2,405,551 UART:
2,405,567 UART: Running Caliptra FMC ...
2,405,975 UART:
2,406,118 UART: [state] CFI Enabled
2,416,631 UART: [fht] FMC Alias Private Key: 7
2,524,436 UART: [art] Extend RT PCRs Done
2,524,864 UART: [art] Lock RT PCRs Done
2,526,162 UART: [art] Populate DV Done
2,534,235 UART: [fht] FMC Alias Private Key: 7
2,535,247 UART: [art] Derive CDI
2,535,527 UART: [art] Store in in slot 0x4
2,621,248 UART: [art] Derive Key Pair
2,621,608 UART: [art] Store priv key in slot 0x5
2,634,612 UART: [art] Derive Key Pair - Done
2,649,233 UART: [art] Signing Cert with AUTHO
2,649,713 UART: RITY.KEYID = 7
2,664,793 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,558 UART: [art] PUB.X = 669966ACEF92AF0E54055BE41E7EF0DAA434D46180E9373563265D75F4F521E8F9C6E465B572DF54ACE06E7DA3FDB772
2,672,332 UART: [art] PUB.Y = 8DAD2EA8E21F9ED24BB0F6FF20645E388D0EB6FD2BA25491C7EDB590FCCF68F8E363587344173F4DE30391BD9EE86D52
2,679,294 UART: [art] SIG.R = 961F6EB1317892AC34F437F6C6AB166FC45FBB13054C6F3CECA71B5B56A67E8A2B417CC33DEF6D3F15319BFA8DED3FAE
2,686,085 UART: [art] SIG.S = 718F32F6CCF0B35FCCAA661748B83D877A4A7C28945F0D4906536906B18C5010C536221F279AE29E87827602731A12BD
2,709,266 UART: mbox::rt_entry...
2,709,638 UART: ____ _ _ _ ____ _____
2,710,422 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,222 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,990 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,758 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,526 UART: |_|
2,713,838 UART:
2,819,906 UART: [rt] Runtime listening for mailbox commands...
2,824,874 >>> mbox cmd response data (3272 bytes)
2,824,875 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,847,961 >>> mbox cmd response data (0 bytes)
2,847,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,848,079 UART:
2,848,095 UART: Running Caliptra ROM ...
2,848,503 UART:
2,848,645 UART: [state] CFI Enabled
2,850,935 UART: [state] LifecycleState = Unprovisioned
2,851,590 UART: [state] DebugLocked = No
2,852,214 UART: [state] WD Timer not started. Device not locked for debugging
2,853,544 UART: [kat] SHA2-256
3,659,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,663,319 UART: [kat] ++
3,663,471 UART: [kat] sha1
3,667,859 UART: [kat] SHA2-256
3,669,799 UART: [kat] SHA2-384
3,672,532 UART: [kat] SHA2-512-ACC
3,674,432 UART: [kat] ECC-384
3,684,599 UART: [kat] HMAC-384Kdf
3,689,303 UART: [kat] LMS
3,937,631 UART: [kat] --
3,938,303 UART: [update-reset] ++
5,251,818 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,252,919 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,402,917 >>> mbox cmd response: success
5,403,070 UART: [update-reset] Copying MAN_2 To MAN_1
5,411,084 UART: [update-reset Success] --
5,411,929 UART: [state] Locking Datavault
5,412,791 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,395 UART: [state] Locking ICCM
5,413,999 UART: [exit] Launching FMC @ 0x40000130
5,419,328 UART:
5,419,344 UART: Running Caliptra FMC ...
5,419,752 UART:
5,419,895 UART: [state] CFI Enabled
5,509,086 UART: [art] Extend RT PCRs Done
5,509,514 UART: [art] Lock RT PCRs Done
5,510,929 UART: [art] Populate DV Done
5,519,306 UART: [fht] FMC Alias Private Key: 7
5,520,308 UART: [art] Derive CDI
5,520,588 UART: [art] Store in in slot 0x4
5,606,287 UART: [art] Derive Key Pair
5,606,647 UART: [art] Store priv key in slot 0x5
5,619,615 UART: [art] Derive Key Pair - Done
5,634,407 UART: [art] Signing Cert with AUTHO
5,634,887 UART: RITY.KEYID = 7
5,649,929 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,694 UART: [art] PUB.X = 857C7B1F72ECEE70F2959650D658A49348CA15D4235F8FD73B00C8A7CE26F315403233D2029AE090E55CB42F219E5743
5,657,437 UART: [art] PUB.Y = 1CEE14F489DAF0EA03FEEE71792E164D2842B3C4E7CD7B0EB33EF17E5C3E895D3435B9F67604350007D4102061405857
5,664,355 UART: [art] SIG.R = 4E1263C44EF5923318B3968FF56768C5B31D9BDE64F1311EEB48BD563C27C52CB3158131871FC4782029D8071A0BBE5B
5,671,119 UART: [art] SIG.S = E512E46F5F14EAB95FA1A56808A8F20671F5D2B439F4B6A1E285E2147A03F06FB71538F567418F088E31D13DABD217FC
5,695,358 UART: Caliptra RT
5,695,703 UART: [state] CFI Enabled
5,977,210 UART: Disabled attest: DPE valid fail
5,977,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,978,972 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,009,274 UART: [rt]cmd =0x494e464f, len=4
6,012,509 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,012 ready_for_fw is high
1,061,012 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,833 >>> mbox cmd response: success
2,165,833 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,227,401 UART:
2,227,417 UART: Running Caliptra FMC ...
2,227,825 UART:
2,227,968 UART: [state] CFI Enabled
2,238,663 UART: [fht] FMC Alias Private Key: 7
2,345,964 UART: [art] Extend RT PCRs Done
2,346,392 UART: [art] Lock RT PCRs Done
2,347,966 UART: [art] Populate DV Done
2,356,221 UART: [fht] FMC Alias Private Key: 7
2,357,369 UART: [art] Derive CDI
2,357,649 UART: [art] Store in in slot 0x4
2,443,732 UART: [art] Derive Key Pair
2,444,092 UART: [art] Store priv key in slot 0x5
2,457,440 UART: [art] Derive Key Pair - Done
2,472,405 UART: [art] Signing Cert with AUTHO
2,472,885 UART: RITY.KEYID = 7
2,487,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,354 UART: [art] PUB.X = 99360C4FD3A68CEED3141D1AC3ACC1C70392BFA5A3735A14D5C585963B4BAB287767098602CFAE5B15C459E6E28B6C42
2,495,122 UART: [art] PUB.Y = F5FF4B5BFC4514E2821B6AA739FC69A9847537F6997A73F84BD47F12B364F5D1FE291F4ABFF2058E157928ED45AA7034
2,502,077 UART: [art] SIG.R = AAAA556332DBAC5258B093A3517AC78A6410B33EA149DAE01DCC88879CFCC58DE0CD3092ACB0607ECD4168EA65228BED
2,508,867 UART: [art] SIG.S = D7DD76284091827A4D6B0224ECE5EF1ED61BF803243028116777A8D2E5B171AA4752729EF59BAA194E33296D8D8B1C32
2,532,282 UART: mbox::rt_entry...
2,532,654 UART: ____ _ _ _ ____ _____
2,533,438 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,238 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,006 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,774 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,542 UART: |_|
2,536,854 UART:
2,643,897 UART: [rt] Runtime listening for mailbox commands...
2,648,865 >>> mbox cmd response data (3272 bytes)
2,648,866 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,952 >>> mbox cmd response data (0 bytes)
2,671,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,111,503 >>> mbox cmd response: success
5,124,603 UART:
5,124,619 UART: Running Caliptra FMC ...
5,125,027 UART:
5,125,170 UART: [state] CFI Enabled
5,213,939 UART: [art] Extend RT PCRs Done
5,214,367 UART: [art] Lock RT PCRs Done
5,215,764 UART: [art] Populate DV Done
5,223,935 UART: [fht] FMC Alias Private Key: 7
5,224,953 UART: [art] Derive CDI
5,225,233 UART: [art] Store in in slot 0x4
5,311,010 UART: [art] Derive Key Pair
5,311,370 UART: [art] Store priv key in slot 0x5
5,324,470 UART: [art] Derive Key Pair - Done
5,339,379 UART: [art] Signing Cert with AUTHO
5,339,859 UART: RITY.KEYID = 7
5,355,139 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,904 UART: [art] PUB.X = C3423117EB2A44AEEE4FBBB39582A8F2C0D13E6FCCD40CB67A4670ED04354D95711B35E76CC551808F969CDEA7D4426F
5,362,682 UART: [art] PUB.Y = D1B808FD38802B296D7F8F4105F7E1D4D82E144019154ACB1A236328CF337CFDA1A6C776040A7A6AE9873AA0A14CF4E3
5,369,628 UART: [art] SIG.R = 30C38281B9DC0041C1ABFE47A8E40C0819404F439654E8B7F28883B6445DE4BCCAF62E61C28CBEFD78E6F11B24965729
5,376,376 UART: [art] SIG.S = 34E9D89338BAE6967159E85ED09927425A8CAB6E6D7C4CB33A67FC5D05039EE8E46D56AC4A0BD2399F7B9D7483117201
5,400,105 UART: Caliptra RT
5,400,450 UART: [state] CFI Enabled
5,685,193 UART: Disabled attest: DPE valid fail
5,685,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,687,113 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,717,505 UART: [rt]cmd =0x494e464f, len=4
5,720,814 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,272 UART: [kat] SHA2-256
890,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,951 UART: [kat] ++
895,103 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
915,692 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
1,168,718 UART: [kat] --
1,169,347 UART: [cold-reset] ++
1,169,915 UART: [fht] FHT @ 0x50003400
1,172,459 UART: [idev] ++
1,172,627 UART: [idev] CDI.KEYID = 6
1,172,988 UART: [idev] SUBJECT.KEYID = 7
1,173,413 UART: [idev] UDS.KEYID = 0
1,173,759 ready_for_fw is high
1,173,759 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,335 UART: [idev] Erasing UDS.KEYID = 0
1,199,011 UART: [idev] Sha1 KeyId Algorithm
1,207,753 UART: [idev] --
1,208,742 UART: [ldev] ++
1,208,910 UART: [ldev] CDI.KEYID = 6
1,209,274 UART: [ldev] SUBJECT.KEYID = 5
1,209,701 UART: [ldev] AUTHORITY.KEYID = 7
1,210,164 UART: [ldev] FE.KEYID = 1
1,215,296 UART: [ldev] Erasing FE.KEYID = 1
1,241,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,680 UART: [ldev] --
1,280,998 UART: [fwproc] Wait for Commands...
1,281,623 UART: [fwproc] Recv command 0x46574c44
1,282,356 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,093 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,309,437 >>> mbox cmd response: success
2,309,437 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,310,630 UART: [afmc] ++
2,310,798 UART: [afmc] CDI.KEYID = 6
2,311,161 UART: [afmc] SUBJECT.KEYID = 7
2,311,587 UART: [afmc] AUTHORITY.KEYID = 5
2,347,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,729 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,458 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,341 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,060 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,879 UART: [afmc] --
2,390,937 UART: [cold-reset] --
2,391,799 UART: [state] Locking Datavault
2,392,798 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,402 UART: [state] Locking ICCM
2,394,004 UART: [exit] Launching FMC @ 0x40000130
2,399,333 UART:
2,399,349 UART: Running Caliptra FMC ...
2,399,757 UART:
2,399,811 UART: [state] CFI Enabled
2,410,206 UART: [fht] FMC Alias Private Key: 7
2,518,575 UART: [art] Extend RT PCRs Done
2,519,003 UART: [art] Lock RT PCRs Done
2,520,451 UART: [art] Populate DV Done
2,528,466 UART: [fht] FMC Alias Private Key: 7
2,529,452 UART: [art] Derive CDI
2,529,732 UART: [art] Store in in slot 0x4
2,615,335 UART: [art] Derive Key Pair
2,615,695 UART: [art] Store priv key in slot 0x5
2,629,393 UART: [art] Derive Key Pair - Done
2,644,243 UART: [art] Signing Cert with AUTHO
2,644,723 UART: RITY.KEYID = 7
2,659,647 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,412 UART: [art] PUB.X = 087B0A6F980C7AE21AE74641473C23FEA7599FCCD7269358806E729FB125D9BA0F9FF9E91A3E444D066A486AB481341A
2,667,171 UART: [art] PUB.Y = E2D8101965E065E6EB0686F702A82D22F09D2ED4D09709F703975FE9CF7C4CCC5076261E59D694D11C8B0753EC1A9387
2,674,106 UART: [art] SIG.R = 7583D7939908E2E167B4D37EC187DC719FFE039A3A3DEAAE16BC989109D95D199A75FB429B6D0A2E8B755B582214B7C0
2,680,870 UART: [art] SIG.S = E9C4D25AC7B1E77417FFA68B5CEDE216142EB6FE32A2753D8BBB11EA699CF558A4EE7D088150B135EC21682FAFC1ECE5
2,705,274 UART: mbox::rt_entry...
2,705,646 UART: ____ _ _ _ ____ _____
2,706,430 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,230 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,998 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,766 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,534 UART: |_|
2,709,846 UART:
2,816,294 UART: [rt] Runtime listening for mailbox commands...
2,821,262 >>> mbox cmd response data (3272 bytes)
2,821,263 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,844,349 >>> mbox cmd response data (0 bytes)
2,844,350 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,844,467 UART:
2,844,483 UART: Running Caliptra ROM ...
2,844,891 UART:
2,844,946 UART: [state] CFI Enabled
2,847,864 UART: [state] LifecycleState = Unprovisioned
2,848,519 UART: [state] DebugLocked = No
2,849,095 UART: [state] WD Timer not started. Device not locked for debugging
2,850,257 UART: [kat] SHA2-256
3,653,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,936 UART: [kat] ++
3,658,088 UART: [kat] sha1
3,662,494 UART: [kat] SHA2-256
3,664,434 UART: [kat] SHA2-384
3,667,057 UART: [kat] SHA2-512-ACC
3,668,957 UART: [kat] ECC-384
3,679,022 UART: [kat] HMAC-384Kdf
3,683,648 UART: [kat] LMS
3,931,960 UART: [kat] --
3,932,814 UART: [update-reset] ++
5,247,058 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,155 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,398,153 >>> mbox cmd response: success
5,398,440 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,454 UART: [update-reset Success] --
5,407,299 UART: [state] Locking Datavault
5,408,269 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,873 UART: [state] Locking ICCM
5,409,407 UART: [exit] Launching FMC @ 0x40000130
5,414,736 UART:
5,414,752 UART: Running Caliptra FMC ...
5,415,160 UART:
5,415,214 UART: [state] CFI Enabled
5,504,009 UART: [art] Extend RT PCRs Done
5,504,437 UART: [art] Lock RT PCRs Done
5,505,656 UART: [art] Populate DV Done
5,513,897 UART: [fht] FMC Alias Private Key: 7
5,515,047 UART: [art] Derive CDI
5,515,327 UART: [art] Store in in slot 0x4
5,600,964 UART: [art] Derive Key Pair
5,601,324 UART: [art] Store priv key in slot 0x5
5,615,010 UART: [art] Derive Key Pair - Done
5,629,960 UART: [art] Signing Cert with AUTHO
5,630,440 UART: RITY.KEYID = 7
5,645,904 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,669 UART: [art] PUB.X = 999F7A0C87BC016502D46C834D9F86B829F8D835E678DDBB0D8A07AF6305E3A1781E175BDB8142E8B52EF561F32F9D64
5,653,427 UART: [art] PUB.Y = C928091335651157EB8928F36A781023A5E4A62426744F3CF549E75A85FA14532035CC236FC716FFBCF3551D9FC6115D
5,660,368 UART: [art] SIG.R = C40AEB124FB105F8E0F8A05E60BCAE28F2FA777126D3210EB677E674F683884DE0E36EFB689382C150320BEC24242CEA
5,667,136 UART: [art] SIG.S = 070EE0C74BBEC878A995ED528047F2DC0033C4C7126156C5709922E48CFCB62D856BB2B0BD20C3E4CCBD26999BEAA3F5
5,690,539 UART: Caliptra RT
5,690,792 UART: [state] CFI Enabled
5,974,657 UART: Disabled attest: DPE valid fail
5,975,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,976,849 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,571 UART: [rt]cmd =0x494e464f, len=4
6,010,928 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,220 ready_for_fw is high
1,056,220 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,687 >>> mbox cmd response: success
2,160,687 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,867 UART:
2,223,883 UART: Running Caliptra FMC ...
2,224,291 UART:
2,224,345 UART: [state] CFI Enabled
2,234,804 UART: [fht] FMC Alias Private Key: 7
2,342,647 UART: [art] Extend RT PCRs Done
2,343,075 UART: [art] Lock RT PCRs Done
2,344,581 UART: [art] Populate DV Done
2,352,726 UART: [fht] FMC Alias Private Key: 7
2,353,764 UART: [art] Derive CDI
2,354,044 UART: [art] Store in in slot 0x4
2,439,957 UART: [art] Derive Key Pair
2,440,317 UART: [art] Store priv key in slot 0x5
2,453,169 UART: [art] Derive Key Pair - Done
2,467,563 UART: [art] Signing Cert with AUTHO
2,468,043 UART: RITY.KEYID = 7
2,483,451 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,216 UART: [art] PUB.X = FE57753790DCE5264E3DF3F4FAD502108F2FD48CC155C2B3FDCF937B50D9D088A76EB8DF18D95D8DBD5D377789A170F9
2,490,999 UART: [art] PUB.Y = 59B6DCC231D5BC520645C1773872092B01703BD6E56A7C19EF44BFD9DADE6BB0D42011067C1FFDFEA947AD4BEAEE86E2
2,497,957 UART: [art] SIG.R = D6D7AD87AFD7869C16988EC09C5BE09D37411DC354EBC5C759F5CA973FD75AC8A510E54115E02CFC6E800C8E76967610
2,504,734 UART: [art] SIG.S = 52E44E02C69A6404553D93E9FDF2EECDA56D2F7D6F0D337FF65EB3B8948B8D1DB8966AE99CB15B2D25E761A49F25A2ED
2,528,828 UART: mbox::rt_entry...
2,529,200 UART: ____ _ _ _ ____ _____
2,529,984 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,784 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,552 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,320 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,088 UART: |_|
2,533,400 UART:
2,640,426 UART: [rt] Runtime listening for mailbox commands...
2,645,394 >>> mbox cmd response data (3272 bytes)
2,645,395 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,668,481 >>> mbox cmd response data (0 bytes)
2,668,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,102,258 >>> mbox cmd response: success
5,115,696 UART:
5,115,712 UART: Running Caliptra FMC ...
5,116,120 UART:
5,116,174 UART: [state] CFI Enabled
5,205,097 UART: [art] Extend RT PCRs Done
5,205,525 UART: [art] Lock RT PCRs Done
5,206,786 UART: [art] Populate DV Done
5,214,967 UART: [fht] FMC Alias Private Key: 7
5,216,045 UART: [art] Derive CDI
5,216,325 UART: [art] Store in in slot 0x4
5,302,076 UART: [art] Derive Key Pair
5,302,436 UART: [art] Store priv key in slot 0x5
5,316,040 UART: [art] Derive Key Pair - Done
5,330,554 UART: [art] Signing Cert with AUTHO
5,331,034 UART: RITY.KEYID = 7
5,346,174 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,939 UART: [art] PUB.X = 31D0208E2021A19FD77D17E358466D71B0819A664A57AB7C4F9BAA100B876B7C5B3E645B61A4F32B3949EE2BCC0F2880
5,353,707 UART: [art] PUB.Y = B857F8E39A56028A9241AFC871FC82ECE7763F059BA0813F94E3B92641CD90F1F000023915E4411289EFFE29DFE155E1
5,360,628 UART: [art] SIG.R = 7CADDD8C09AAEF516256D36540E7183CB796B7D10751ECF3387B7800BE1BAE87BA417FAC3982484702150D03252FABBA
5,367,371 UART: [art] SIG.S = 2DA25AEFACA67327B20FC5EF92BABF2D8FDEA43D40C6AE7360AAA9B584C993997DE7A5B5906816C2CE46BC81D676D953
5,391,353 UART: Caliptra RT
5,391,606 UART: [state] CFI Enabled
5,677,259 UART: Disabled attest: DPE valid fail
5,677,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,679,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,709,653 UART: [rt]cmd =0x494e464f, len=4
5,713,056 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,461 UART: [kat] SHA2-512-ACC
906,362 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,174,424 ready_for_fw is high
1,174,424 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,694 UART: [idev] Erasing UDS.KEYID = 0
1,198,592 UART: [idev] Sha1 KeyId Algorithm
1,207,504 UART: [idev] --
1,208,719 UART: [ldev] ++
1,208,887 UART: [ldev] CDI.KEYID = 6
1,209,251 UART: [ldev] SUBJECT.KEYID = 5
1,209,678 UART: [ldev] AUTHORITY.KEYID = 7
1,210,141 UART: [ldev] FE.KEYID = 1
1,215,521 UART: [ldev] Erasing FE.KEYID = 1
1,241,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,025 UART: [ldev] --
1,280,349 UART: [fwproc] Wait for Commands...
1,281,014 UART: [fwproc] Recv command 0x46574c44
1,281,747 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,994 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,310,320 >>> mbox cmd response: success
2,310,320 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,473 UART: [afmc] ++
2,311,641 UART: [afmc] CDI.KEYID = 6
2,312,004 UART: [afmc] SUBJECT.KEYID = 7
2,312,430 UART: [afmc] AUTHORITY.KEYID = 5
2,348,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,612 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,120 UART: [afmc] --
2,392,024 UART: [cold-reset] --
2,392,954 UART: [state] Locking Datavault
2,394,385 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,989 UART: [state] Locking ICCM
2,395,563 UART: [exit] Launching FMC @ 0x40000130
2,400,892 UART:
2,400,908 UART: Running Caliptra FMC ...
2,401,316 UART:
2,401,459 UART: [state] CFI Enabled
2,411,796 UART: [fht] FMC Alias Private Key: 7
2,519,777 UART: [art] Extend RT PCRs Done
2,520,205 UART: [art] Lock RT PCRs Done
2,521,483 UART: [art] Populate DV Done
2,529,534 UART: [fht] FMC Alias Private Key: 7
2,530,606 UART: [art] Derive CDI
2,530,886 UART: [art] Store in in slot 0x4
2,616,519 UART: [art] Derive Key Pair
2,616,879 UART: [art] Store priv key in slot 0x5
2,631,037 UART: [art] Derive Key Pair - Done
2,645,751 UART: [art] Signing Cert with AUTHO
2,646,231 UART: RITY.KEYID = 7
2,661,229 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,994 UART: [art] PUB.X = 5B40627E90BD89827509738FA9442E3C9E8CAB9129B5B3CC28032227E3DC0D690750EE11D652E4631FFFD4B41B9F081F
2,668,751 UART: [art] PUB.Y = D78E1580FD7630BDA8354E3D7856F1CB7FB47725A234B98E61F7896EB203567415C19FC295E6CF6508BF2947D872D4DA
2,675,697 UART: [art] SIG.R = A27ADB0119B407DB9B21C76F7EEB44501595B95F40B7346F5F2399509EB7B45D306AB43EA0F34B20485F40FA38747CD0
2,682,465 UART: [art] SIG.S = 9BC8E9C08FBF71767A9789DB4260EF5146A74B7062154D09F983F7E9A03A55FAE7C9F70416C38C4D09C49F97264C4EF5
2,705,757 UART: mbox::rt_entry...
2,706,129 UART: ____ _ _ _ ____ _____
2,706,913 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,713 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,481 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,249 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,017 UART: |_|
2,710,329 UART:
2,816,920 UART: [rt] Runtime listening for mailbox commands...
2,821,888 >>> mbox cmd response data (3272 bytes)
2,821,889 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,844,975 >>> mbox cmd response data (0 bytes)
2,844,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,093 UART:
2,845,109 UART: Running Caliptra ROM ...
2,845,517 UART:
2,845,659 UART: [state] CFI Enabled
2,848,319 UART: [state] LifecycleState = Unprovisioned
2,848,974 UART: [state] DebugLocked = No
2,849,654 UART: [state] WD Timer not started. Device not locked for debugging
2,850,870 UART: [kat] SHA2-256
3,654,420 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,549 UART: [kat] ++
3,658,701 UART: [kat] sha1
3,662,901 UART: [kat] SHA2-256
3,664,841 UART: [kat] SHA2-384
3,667,612 UART: [kat] SHA2-512-ACC
3,669,512 UART: [kat] ECC-384
3,679,097 UART: [kat] HMAC-384Kdf
3,683,757 UART: [kat] LMS
3,932,069 UART: [kat] --
3,933,187 UART: [update-reset] ++
5,247,575 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,604 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,398,602 >>> mbox cmd response: success
5,398,939 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,953 UART: [update-reset Success] --
5,408,108 UART: [state] Locking Datavault
5,408,830 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,434 UART: [state] Locking ICCM
5,409,904 UART: [exit] Launching FMC @ 0x40000130
5,415,233 UART:
5,415,249 UART: Running Caliptra FMC ...
5,415,657 UART:
5,415,800 UART: [state] CFI Enabled
5,504,391 UART: [art] Extend RT PCRs Done
5,504,819 UART: [art] Lock RT PCRs Done
5,506,278 UART: [art] Populate DV Done
5,514,897 UART: [fht] FMC Alias Private Key: 7
5,515,877 UART: [art] Derive CDI
5,516,157 UART: [art] Store in in slot 0x4
5,601,734 UART: [art] Derive Key Pair
5,602,094 UART: [art] Store priv key in slot 0x5
5,614,812 UART: [art] Derive Key Pair - Done
5,629,613 UART: [art] Signing Cert with AUTHO
5,630,093 UART: RITY.KEYID = 7
5,645,341 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,106 UART: [art] PUB.X = C4C44381A3E01864CEA3A14324E488B8E91C3AFB61FB0ED2CE4A69C24BFC3AD910ACF0BAF6CC6EE1BA07607A22424251
5,652,890 UART: [art] PUB.Y = D9B2B44A7D00DA7627C8084B990C6DD8C8B63E1E33056FDF3A30417FCCB9E5B4C361DE14149B688898E5651200DC2385
5,659,791 UART: [art] SIG.R = BAEAF07D354EB7FA041B66C044566614E1A7E00827B049CB37F579585B1FF52E5DBE18E9174BB803DDE62A400E78A2F5
5,666,559 UART: [art] SIG.S = 44D5AB24A69177E59D4D530081D55070A4D499E15C55A32F8843CA2ED7F9630343BCCB42698B0CE1AA5A9DD4FCBE87DE
5,690,362 UART: Caliptra RT
5,690,707 UART: [state] CFI Enabled
5,976,606 UART: Disabled attest: DPE valid fail
5,977,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,978,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,009,026 UART: [rt]cmd =0x494e464f, len=4
6,012,377 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,799 ready_for_fw is high
1,056,799 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,992 >>> mbox cmd response: success
2,162,992 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,224,892 UART:
2,224,908 UART: Running Caliptra FMC ...
2,225,316 UART:
2,225,459 UART: [state] CFI Enabled
2,235,924 UART: [fht] FMC Alias Private Key: 7
2,342,637 UART: [art] Extend RT PCRs Done
2,343,065 UART: [art] Lock RT PCRs Done
2,344,679 UART: [art] Populate DV Done
2,352,744 UART: [fht] FMC Alias Private Key: 7
2,353,714 UART: [art] Derive CDI
2,353,994 UART: [art] Store in in slot 0x4
2,439,519 UART: [art] Derive Key Pair
2,439,879 UART: [art] Store priv key in slot 0x5
2,453,339 UART: [art] Derive Key Pair - Done
2,467,903 UART: [art] Signing Cert with AUTHO
2,468,383 UART: RITY.KEYID = 7
2,483,239 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,004 UART: [art] PUB.X = 27992DFD796982A062626518931F35896DD1339A9AC9595A796C215E73789849549A7A0B6CBE2BE0513850EDF480AAF7
2,490,763 UART: [art] PUB.Y = B6434E66AB4F9636FEADCA0544873F24A3202032AEED74CC8035D77F095DE9B23158CD3C420CA29B7F3196555E7E74B4
2,497,710 UART: [art] SIG.R = FB8FDACC9DED875DB3698686674484EDB35E941388FA4F43DF8120E3F3ACB56D3E714C14FFCDFC5271EEC2C12211DB02
2,504,497 UART: [art] SIG.S = FC5F6A8B58BA58AC916AA0785CDB69A9D01D22491DE37155D51778AEA0AA6453D5F2E2E51030E56B5C8DE36BE7BDEE0C
2,528,187 UART: mbox::rt_entry...
2,528,559 UART: ____ _ _ _ ____ _____
2,529,343 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,143 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,911 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,679 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,447 UART: |_|
2,532,759 UART:
2,639,366 UART: [rt] Runtime listening for mailbox commands...
2,644,334 >>> mbox cmd response data (3272 bytes)
2,644,335 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,667,421 >>> mbox cmd response data (0 bytes)
2,667,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,101,951 >>> mbox cmd response: success
5,115,255 UART:
5,115,271 UART: Running Caliptra FMC ...
5,115,679 UART:
5,115,822 UART: [state] CFI Enabled
5,204,505 UART: [art] Extend RT PCRs Done
5,204,933 UART: [art] Lock RT PCRs Done
5,206,382 UART: [art] Populate DV Done
5,214,265 UART: [fht] FMC Alias Private Key: 7
5,215,335 UART: [art] Derive CDI
5,215,615 UART: [art] Store in in slot 0x4
5,301,442 UART: [art] Derive Key Pair
5,301,802 UART: [art] Store priv key in slot 0x5
5,315,076 UART: [art] Derive Key Pair - Done
5,329,879 UART: [art] Signing Cert with AUTHO
5,330,359 UART: RITY.KEYID = 7
5,345,245 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,010 UART: [art] PUB.X = EBFF239C11DE17555BF8789B39491B948B224A24EC3527148E1440063C03AF5C0B9EDDECEB7F492D1116B95339D7C963
5,352,775 UART: [art] PUB.Y = 78AE5186814EE08D86FEE05C786DEF3F09FEB094D99F11EAD8DC56C43A089304E7A1595FE1F8510AE969AABEA440D7A2
5,359,729 UART: [art] SIG.R = E0BD3AF9DB21563ACD049BC497C324AD224F47DEA187F6548E7106731BE7CAB04D0E0ACA97EF71C6ABAAE48F025D331E
5,366,506 UART: [art] SIG.S = 56A33D73E4750844DB5494190D75D46B9D050D3E10C75C953D085BC8BC798A1ED41A913113E48A178FD983E7C7B7A32C
5,389,676 UART: Caliptra RT
5,390,021 UART: [state] CFI Enabled
5,674,342 UART: Disabled attest: DPE valid fail
5,674,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,676,338 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,706,828 UART: [rt]cmd =0x494e464f, len=4
5,710,261 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,004 UART:
192,379 UART: Running Caliptra ROM ...
193,582 UART:
193,754 UART: [state] CFI Enabled
264,174 UART: [state] LifecycleState = Unprovisioned
266,102 UART: [state] DebugLocked = No
268,834 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,292 UART: [kat] SHA2-256
443,044 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,567 UART: [kat] ++
454,094 UART: [kat] sha1
465,333 UART: [kat] SHA2-256
468,059 UART: [kat] SHA2-384
473,697 UART: [kat] SHA2-512-ACC
476,082 UART: [kat] ECC-384
2,769,060 UART: [kat] HMAC-384Kdf
2,802,166 UART: [kat] LMS
3,992,480 UART: [kat] --
3,997,291 UART: [cold-reset] ++
3,999,656 UART: [fht] Storing FHT @ 0x50003400
4,011,489 UART: [idev] ++
4,012,062 UART: [idev] CDI.KEYID = 6
4,012,983 UART: [idev] SUBJECT.KEYID = 7
4,014,230 UART: [idev] UDS.KEYID = 0
4,015,322 ready_for_fw is high
4,015,545 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,114,927 UART: [idev] Erasing UDS.KEYID = 0
7,348,946 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,424 UART: [idev] --
7,374,472 UART: [ldev] ++
7,375,116 UART: [ldev] CDI.KEYID = 6
7,376,027 UART: [ldev] SUBJECT.KEYID = 5
7,377,245 UART: [ldev] AUTHORITY.KEYID = 7
7,378,476 UART: [ldev] FE.KEYID = 1
7,424,919 UART: [ldev] Erasing FE.KEYID = 1
10,760,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,926 UART: [ldev] --
13,139,493 UART: [fwproc] Waiting for Commands...
13,142,176 UART: [fwproc] Received command 0x46574c44
13,144,357 UART: [fwproc] Received Image of size 78740 bytes
16,763,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,844,766 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,913,634 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,106,816 >>> mbox cmd response: success
17,107,303 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,111,609 UART: [afmc] ++
17,112,245 UART: [afmc] CDI.KEYID = 6
17,113,161 UART: [afmc] SUBJECT.KEYID = 7
17,114,375 UART: [afmc] AUTHORITY.KEYID = 5
20,475,365 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,776,734 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,779,044 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,793,414 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,808,297 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,822,750 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,845,238 UART: [afmc] --
22,848,527 UART: [cold-reset] --
22,852,497 UART: [state] Locking Datavault
22,858,682 UART: [state] Locking PCR0, PCR1 and PCR31
22,860,437 UART: [state] Locking ICCM
22,862,057 UART: [exit] Launching FMC @ 0x40000130
22,870,412 UART:
22,870,647 UART: Running Caliptra FMC ...
22,871,749 UART:
22,871,913 UART: [state] CFI Enabled
22,937,638 UART: [fht] FMC Alias Private Key: 7
25,275,599 UART: [art] Extend RT PCRs Done
25,276,823 UART: [art] Lock RT PCRs Done
25,278,289 UART: [art] Populate DV Done
25,283,866 UART: [fht] FMC Alias Private Key: 7
25,285,460 UART: [art] Derive CDI
25,286,202 UART: [art] Store in in slot 0x4
25,345,866 UART: [art] Derive Key Pair
25,346,905 UART: [art] Store priv key in slot 0x5
28,639,434 UART: [art] Derive Key Pair - Done
28,652,221 UART: [art] Signing Cert with AUTHO
28,653,530 UART: RITY.KEYID = 7
30,941,399 UART: [art] Erasing AUTHORITY.KEYID = 7
30,942,908 UART: [art] PUB.X = 055F984BA4EA3CBD202ED1279C57C04F0A182E93C8C2D3EF5C20DEB9DB401166AB97FC30F41CC37EAF30BAEBB671FDD1
30,950,149 UART: [art] PUB.Y = 2E00526240D73F51D9956341A9EAB96D4DDBA6BDC2BEF3D6F2F93DE2997C80106C63E8E23950D0DE2CB6D3ACC812857B
30,957,430 UART: [art] SIG.R = AB0F0DD74F9922963C31CAE53DB470E5F79D45F1BFE9C6C21786BF58F5E8AF480742D1FAB408A493F3E4F541CD56D3D8
30,964,811 UART: [art] SIG.S = CF4B8EBEFC3C54C179986B61034874564BD20810C382FDA160FF99EF4EB34071EC6C563440A7D2D2AE2A4DB0B0B3C9B6
32,269,748 UART: mbox::rt_entry...
32,270,711 UART: ____ _ _ _ ____ _____
32,272,997 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,275,012 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,276,948 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,278,887 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,280,818 UART: |_|
32,281,655 UART:
32,394,383 UART: [rt] Runtime listening for mailbox commands...
32,400,229 >>> mbox cmd response data (3272 bytes)
32,415,989 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,449,403 >>> mbox cmd response data (0 bytes)
34,580,489 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,724,831 UART:
34,725,202 UART: Running Caliptra ROM ...
34,726,294 UART:
34,726,457 UART: [state] CFI Enabled
34,799,892 UART: [state] LifecycleState = Unprovisioned
34,801,873 UART: [state] DebugLocked = No
34,804,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,809,800 UART: [kat] SHA2-256
34,979,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,989,977 UART: [kat] ++
34,990,460 UART: [kat] sha1
35,001,512 UART: [kat] SHA2-256
35,004,200 UART: [kat] SHA2-384
35,009,228 UART: [kat] SHA2-512-ACC
35,011,579 UART: [kat] ECC-384
37,303,809 UART: [kat] HMAC-384Kdf
37,316,263 UART: [kat] LMS
38,506,605 UART: [kat] --
38,510,346 UART: [update-reset] ++
42,647,051 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,650,456 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
43,032,701 >>> mbox cmd response: success
43,037,396 UART: [update-reset] Copying MAN_2 To MAN_1
43,055,770 UART: [update-reset Success] --
43,059,748 UART: [state] Locking Datavault
43,062,692 UART: [state] Locking PCR0, PCR1 and PCR31
43,064,451 UART: [state] Locking ICCM
43,066,504 UART: [exit] Launching FMC @ 0x40000130
43,074,950 UART:
43,075,236 UART: Running Caliptra FMC ...
43,076,349 UART:
43,076,511 UART: [state] CFI Enabled
43,173,365 UART: [art] Extend RT PCRs Done
43,174,573 UART: [art] Lock RT PCRs Done
43,175,981 UART: [art] Populate DV Done
43,181,713 UART: [fht] FMC Alias Private Key: 7
43,183,412 UART: [art] Derive CDI
43,184,237 UART: [art] Store in in slot 0x4
43,242,846 UART: [art] Derive Key Pair
43,243,885 UART: [art] Store priv key in slot 0x5
46,536,851 UART: [art] Derive Key Pair - Done
46,550,336 UART: [art] Signing Cert with AUTHO
46,551,640 UART: RITY.KEYID = 7
48,838,405 UART: [art] Erasing AUTHORITY.KEYID = 7
48,839,908 UART: [art] PUB.X = 02A32E8DB86E3666991A2DED196C9D8A530F0B65ABA183290D944DFF5ACBF769108541CE818ADDF9115A4F282984634C
48,847,130 UART: [art] PUB.Y = 9303AE56040D1CA0B92EA9F46573332A5159B900FE05F45E5BA3D3AE766DF24C171531F5F52A6FC18C9A61E207ECFD85
48,854,384 UART: [art] SIG.R = BCD7C6202F0D2DA56788C021AE359369D43E8C79648DE57083B88EF826D32CFE9E6F7A791DE96E6CB4111E7AA6B49574
48,861,755 UART: [art] SIG.S = 97D2FEC4FCF47C93FBA4B0817B73AD4E4A7FDC3DEB89975A5AA2F28D1D8E5B291E4FA7AEC6AA54F7641AF80191DF704E
50,166,857 UART: Caliptra RT
50,167,576 UART: [state] CFI Enabled
53,554,425 UART: Disabled attest: DPE valid fail
53,556,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,557,019 UART: [rt] RT listening for mailbox commands...
53,588,077 UART: [rt]cmd =0x494e464f, len=4
53,592,086 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,785,444 ready_for_fw is high
3,786,053 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,137,159 >>> mbox cmd response: success
17,137,840 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,825,223 UART:
22,825,687 UART: Running Caliptra FMC ...
22,826,809 UART:
22,826,977 UART: [state] CFI Enabled
22,895,344 UART: [fht] FMC Alias Private Key: 7
25,233,737 UART: [art] Extend RT PCRs Done
25,235,037 UART: [art] Lock RT PCRs Done
25,237,023 UART: [art] Populate DV Done
25,242,167 UART: [fht] FMC Alias Private Key: 7
25,243,641 UART: [art] Derive CDI
25,244,419 UART: [art] Store in in slot 0x4
25,304,571 UART: [art] Derive Key Pair
25,305,566 UART: [art] Store priv key in slot 0x5
28,598,433 UART: [art] Derive Key Pair - Done
28,611,334 UART: [art] Signing Cert with AUTHO
28,612,673 UART: RITY.KEYID = 7
30,900,729 UART: [art] Erasing AUTHORITY.KEYID = 7
30,902,256 UART: [art] PUB.X = FB051413C58EBC1696F33E3341D5ACCE382258C56C0F0BD6764D3CAB2AC61D86D660AC7757FAA7FF8CAE12348AA2ED7B
30,909,485 UART: [art] PUB.Y = 5CF98168971A46AD4D9BCEE894F9E4D4EC6A0208663EBF7D6699A090B4916D9B89F5109FFD21FC53EF14556BB339C7FF
30,916,748 UART: [art] SIG.R = DDC23453169384DB84F68D96E5AE8BEA7FC235D096706FBC7457D5C0DA3A7A37ED880A2922E5D4ED8FB2218AC0B534F0
30,924,146 UART: [art] SIG.S = 9085F7ADE1C07EBF23D7F53C1ACBA0ABC74BA98431A7D3BBB5DE2F038391311AD48507A6614EABB1542CF3655D3043F0
32,228,713 UART: mbox::rt_entry...
32,229,680 UART: ____ _ _ _ ____ _____
32,231,677 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,233,684 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,235,614 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,237,586 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,239,521 UART: |_|
32,240,338 UART:
32,353,870 UART: [rt] Runtime listening for mailbox commands...
32,359,724 >>> mbox cmd response data (3272 bytes)
32,375,710 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,409,138 >>> mbox cmd response data (0 bytes)
34,541,057 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,286,728 >>> mbox cmd response: success
43,323,669 UART:
43,324,007 UART: Running Caliptra FMC ...
43,325,143 UART:
43,325,313 UART: [state] CFI Enabled
43,428,301 UART: [art] Extend RT PCRs Done
43,429,491 UART: [art] Lock RT PCRs Done
43,431,272 UART: [art] Populate DV Done
43,436,625 UART: [fht] FMC Alias Private Key: 7
43,438,111 UART: [art] Derive CDI
43,438,880 UART: [art] Store in in slot 0x4
43,497,021 UART: [art] Derive Key Pair
43,498,053 UART: [art] Store priv key in slot 0x5
46,790,500 UART: [art] Derive Key Pair - Done
46,803,556 UART: [art] Signing Cert with AUTHO
46,804,867 UART: RITY.KEYID = 7
49,092,820 UART: [art] Erasing AUTHORITY.KEYID = 7
49,094,377 UART: [art] PUB.X = F21AEDD238034D166306A7C01AAD0404D27F7EF2A398881E371506EA76BDB1AE5E47E13F92A82BBAFC979766078ACBF4
49,101,603 UART: [art] PUB.Y = F8B8D584CBA9557F72CBAD6054E3CA392D4AB75FF496EEC913F665B73AC9670D48FCE5B370C74DEA04FA39A6DA65696A
49,108,868 UART: [art] SIG.R = 16DA7DB50ADEB06EE9F419219C8028E4EDFB9BC29F90D141EEF74D7E02FDB5D708F9077DCF8CE504542B00838C61B807
49,116,241 UART: [art] SIG.S = F1D48A4056D11AD4DDA089E8C301EAFE23F3F64F6B321960D545C1810A115F2F51593967A3C6CB7FF399983479C377E6
50,420,618 UART: Caliptra RT
50,421,354 UART: [state] CFI Enabled
53,809,228 UART: Disabled attest: DPE valid fail
53,811,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,811,943 UART: [rt] RT listening for mailbox commands...
53,843,393 UART: [rt]cmd =0x494e464f, len=4
53,847,263 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,524 UART:
192,914 UART: Running Caliptra ROM ...
194,097 UART:
603,645 UART: [state] CFI Enabled
618,585 UART: [state] LifecycleState = Unprovisioned
620,547 UART: [state] DebugLocked = No
622,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,870 UART: [kat] SHA2-256
797,617 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,145 UART: [kat] ++
808,589 UART: [kat] sha1
818,884 UART: [kat] SHA2-256
821,602 UART: [kat] SHA2-384
826,663 UART: [kat] SHA2-512-ACC
829,026 UART: [kat] ECC-384
3,113,905 UART: [kat] HMAC-384Kdf
3,126,503 UART: [kat] LMS
4,316,663 UART: [kat] --
4,322,437 UART: [cold-reset] ++
4,323,305 UART: [fht] Storing FHT @ 0x50003400
4,334,634 UART: [idev] ++
4,335,264 UART: [idev] CDI.KEYID = 6
4,336,184 UART: [idev] SUBJECT.KEYID = 7
4,337,422 UART: [idev] UDS.KEYID = 0
4,338,468 ready_for_fw is high
4,338,688 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,437,691 UART: [idev] Erasing UDS.KEYID = 0
7,624,009 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,421 UART: [idev] --
7,650,894 UART: [ldev] ++
7,651,454 UART: [ldev] CDI.KEYID = 6
7,652,383 UART: [ldev] SUBJECT.KEYID = 5
7,653,639 UART: [ldev] AUTHORITY.KEYID = 7
7,654,778 UART: [ldev] FE.KEYID = 1
7,664,741 UART: [ldev] Erasing FE.KEYID = 1
10,955,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,808 UART: [ldev] --
13,313,630 UART: [fwproc] Waiting for Commands...
13,315,443 UART: [fwproc] Received command 0x46574c44
13,317,622 UART: [fwproc] Received Image of size 78740 bytes
16,935,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,012,847 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,081,700 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,274,728 >>> mbox cmd response: success
17,275,215 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,278,335 UART: [afmc] ++
17,278,965 UART: [afmc] CDI.KEYID = 6
17,279,871 UART: [afmc] SUBJECT.KEYID = 7
17,281,131 UART: [afmc] AUTHORITY.KEYID = 5
20,597,180 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,889,781 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,892,085 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,906,456 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,921,292 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,935,694 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,957,014 UART: [afmc] --
22,960,943 UART: [cold-reset] --
22,963,556 UART: [state] Locking Datavault
22,968,257 UART: [state] Locking PCR0, PCR1 and PCR31
22,969,948 UART: [state] Locking ICCM
22,972,304 UART: [exit] Launching FMC @ 0x40000130
22,980,693 UART:
22,980,920 UART: Running Caliptra FMC ...
22,982,016 UART:
22,982,171 UART: [state] CFI Enabled
22,989,830 UART: [fht] FMC Alias Private Key: 7
25,320,869 UART: [art] Extend RT PCRs Done
25,322,089 UART: [art] Lock RT PCRs Done
25,323,887 UART: [art] Populate DV Done
25,329,237 UART: [fht] FMC Alias Private Key: 7
25,330,928 UART: [art] Derive CDI
25,331,737 UART: [art] Store in in slot 0x4
25,374,215 UART: [art] Derive Key Pair
25,375,255 UART: [art] Store priv key in slot 0x5
28,617,648 UART: [art] Derive Key Pair - Done
28,630,910 UART: [art] Signing Cert with AUTHO
28,632,244 UART: RITY.KEYID = 7
30,911,326 UART: [art] Erasing AUTHORITY.KEYID = 7
30,912,837 UART: [art] PUB.X = 2CD5E2FA4107DE77BC03651EF544AF5B58784E963E4BE57B4B7A989A2745636D3F6CDFC4780BC23E8C22289E51A48CD1
30,920,065 UART: [art] PUB.Y = B4A2D3FE01CE5BC45A45FF430A1B57E3E3D919689A037CB63FF2ABC0F382D629490B981FDC3E9EA489537DBB5AED2E4D
30,927,337 UART: [art] SIG.R = FBA2F636F36AB5051383ED47B2A57A5B77057147EA5AAAB3357D9AC40A057AFB2C1DFD7C3685309988104D224116D3C0
30,934,721 UART: [art] SIG.S = B28C7B1DB84D544B8F37BACC842FA8A389F374E7C4F92CB31809E9BFC9D2E9159A38E817E0B5BC21940393348A235403
32,240,082 UART: mbox::rt_entry...
32,241,046 UART: ____ _ _ _ ____ _____
32,242,975 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,244,973 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,246,822 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,248,738 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,250,608 UART: |_|
32,251,483 UART:
32,364,344 UART: [rt] Runtime listening for mailbox commands...
32,370,193 >>> mbox cmd response data (3272 bytes)
32,385,969 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,419,374 >>> mbox cmd response data (0 bytes)
34,476,567 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,620,803 UART:
34,621,161 UART: Running Caliptra ROM ...
34,622,208 UART:
34,622,464 UART: [state] CFI Enabled
34,633,348 UART: [state] LifecycleState = Unprovisioned
34,635,310 UART: [state] DebugLocked = No
34,636,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,641,609 UART: [kat] SHA2-256
34,811,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,821,852 UART: [kat] ++
34,822,302 UART: [kat] sha1
34,832,360 UART: [kat] SHA2-256
34,835,051 UART: [kat] SHA2-384
34,841,015 UART: [kat] SHA2-512-ACC
34,843,422 UART: [kat] ECC-384
37,127,709 UART: [kat] HMAC-384Kdf
37,140,155 UART: [kat] LMS
38,330,207 UART: [kat] --
38,333,784 UART: [update-reset] ++
42,479,221 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,482,560 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,864,822 >>> mbox cmd response: success
42,869,564 UART: [update-reset] Copying MAN_2 To MAN_1
42,888,370 UART: [update-reset Success] --
42,892,026 UART: [state] Locking Datavault
42,895,244 UART: [state] Locking PCR0, PCR1 and PCR31
42,897,012 UART: [state] Locking ICCM
42,898,921 UART: [exit] Launching FMC @ 0x40000130
42,907,311 UART:
42,907,538 UART: Running Caliptra FMC ...
42,908,634 UART:
42,908,790 UART: [state] CFI Enabled
42,952,717 UART: [art] Extend RT PCRs Done
42,953,912 UART: [art] Lock RT PCRs Done
42,955,257 UART: [art] Populate DV Done
42,960,776 UART: [fht] FMC Alias Private Key: 7
42,962,412 UART: [art] Derive CDI
42,963,217 UART: [art] Store in in slot 0x4
43,005,477 UART: [art] Derive Key Pair
43,006,476 UART: [art] Store priv key in slot 0x5
46,248,946 UART: [art] Derive Key Pair - Done
46,261,862 UART: [art] Signing Cert with AUTHO
46,263,163 UART: RITY.KEYID = 7
48,542,487 UART: [art] Erasing AUTHORITY.KEYID = 7
48,544,125 UART: [art] PUB.X = FEC5DCE77B1C06A44E4F3D9297BD510029F53C0760761F367DB6AC5495A56740401179CE7319D7859C4D44CFB8D3D83A
48,551,245 UART: [art] PUB.Y = 6C97E823AE7A4C3DF239C055ED67FB3EB9E4CABD49443E390CBE9712A0904A30129A7B1A06D1E61F5DDFB6E8BB8F06D7
48,558,517 UART: [art] SIG.R = 0D9FE204449B13FB48CCF57E992360054B48C272FC4EBA5C6F6E23EC464ABEF9147F672720A773D7EA50D6292D5BB45A
48,565,905 UART: [art] SIG.S = 19D294D653B2111DD510BD6D2B35F282CDB08E2D6E4261AE265E635D72ED62F8683614E61F044627F562A7642835FA0B
49,871,294 UART: Caliptra RT
49,872,007 UART: [state] CFI Enabled
53,166,637 UART: Disabled attest: DPE valid fail
53,168,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,169,068 UART: [rt] RT listening for mailbox commands...
53,200,351 UART: [rt]cmd =0x494e464f, len=4
53,204,334 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
4,130,521 ready_for_fw is high
4,131,142 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,349,839 >>> mbox cmd response: success
17,350,471 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,988,626 UART:
22,989,040 UART: Running Caliptra FMC ...
22,990,350 UART:
22,990,516 UART: [state] CFI Enabled
22,998,208 UART: [fht] FMC Alias Private Key: 7
25,329,276 UART: [art] Extend RT PCRs Done
25,330,495 UART: [art] Lock RT PCRs Done
25,332,280 UART: [art] Populate DV Done
25,337,696 UART: [fht] FMC Alias Private Key: 7
25,339,341 UART: [art] Derive CDI
25,340,150 UART: [art] Store in in slot 0x4
25,382,908 UART: [art] Derive Key Pair
25,383,904 UART: [art] Store priv key in slot 0x5
28,626,362 UART: [art] Derive Key Pair - Done
28,639,200 UART: [art] Signing Cert with AUTHO
28,640,510 UART: RITY.KEYID = 7
30,919,292 UART: [art] Erasing AUTHORITY.KEYID = 7
30,920,794 UART: [art] PUB.X = 94AAEF9619FDCF02145A480699C421E54B6766D9D83DAE93F61389B24004B7233A29FE2C96063F1AA32E0FFD9FAA2530
30,928,053 UART: [art] PUB.Y = 8EAE20C41B97109C4AF389E78BCF69E1A171A9BF4F69D15531A6541F221D4ABB762F0A7370DCC169165299C484D0431B
30,935,299 UART: [art] SIG.R = C2443EC3828CC9E68DBC688A5A83EC3F22DEE70169B43F4A4D339269D74E6FC03B0FFF4AF2D44BF78AA2167A3F9794BF
30,942,717 UART: [art] SIG.S = 12BD35FE04204F4F434C6E96C8636E4DC342EE9CAB74FB2B1CE8BAC8E2B2CF68E3CC475F235D8728FEC076F0E2E33BB8
32,246,995 UART: mbox::rt_entry...
32,247,961 UART: ____ _ _ _ ____ _____
32,249,859 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,251,860 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,253,709 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,255,654 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,257,503 UART: |_|
32,258,380 UART:
32,371,525 UART: [rt] Runtime listening for mailbox commands...
32,377,376 >>> mbox cmd response data (3272 bytes)
32,393,106 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,426,525 >>> mbox cmd response data (0 bytes)
34,483,405 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,133,316 >>> mbox cmd response: success
43,168,174 UART:
43,168,516 UART: Running Caliptra FMC ...
43,169,568 UART:
43,169,713 UART: [state] CFI Enabled
43,213,469 UART: [art] Extend RT PCRs Done
43,214,614 UART: [art] Lock RT PCRs Done
43,216,138 UART: [art] Populate DV Done
43,221,481 UART: [fht] FMC Alias Private Key: 7
43,223,222 UART: [art] Derive CDI
43,223,952 UART: [art] Store in in slot 0x4
43,266,278 UART: [art] Derive Key Pair
43,267,320 UART: [art] Store priv key in slot 0x5
46,509,078 UART: [art] Derive Key Pair - Done
46,521,829 UART: [art] Signing Cert with AUTHO
46,523,134 UART: RITY.KEYID = 7
48,802,166 UART: [art] Erasing AUTHORITY.KEYID = 7
48,804,126 UART: [art] PUB.X = 8E04386EE7214C5F4C8560EB43377C92B9A2A7FBF524815AD2DE3A278A9208E80403267119056AD50A46086F84FBCE4D
48,810,922 UART: [art] PUB.Y = F3CDB62BDB6EB71481D9742F6283D3432E3BC24A3553D40C1C18DDB14802CF68C232D69C275575F68E3F0FF93A5B28A1
48,818,125 UART: [art] SIG.R = 7D528CAA797031FB2B7A8D2BF3181EBE1C5F12FAC2495A93321A59E24895AF7B2B2A5C6AFDFEF0A6375B9B1E159220A6
48,825,545 UART: [art] SIG.S = 1D90283F233ED9DC68C1610C2E9FBD902FCD72F1E45CF282C45C9E45FC4535E3A07F639D923DE8B8B7E0C2553A64D9E7
50,130,684 UART: Caliptra RT
50,131,424 UART: [state] CFI Enabled
53,424,938 UART: Disabled attest: DPE valid fail
53,426,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,427,574 UART: [rt] RT listening for mailbox commands...
53,458,962 UART: [rt]cmd =0x494e464f, len=4
53,462,698 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
192,022 UART:
192,398 UART: Running Caliptra ROM ...
193,490 UART:
193,634 UART: [state] CFI Enabled
265,228 UART: [state] LifecycleState = Unprovisioned
267,062 UART: [state] DebugLocked = No
269,085 UART: [state] WD Timer not started. Device not locked for debugging
272,549 UART: [kat] SHA2-256
451,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,254 UART: [kat] ++
463,709 UART: [kat] sha1
474,886 UART: [kat] SHA2-256
477,905 UART: [kat] SHA2-384
485,032 UART: [kat] SHA2-512-ACC
487,975 UART: [kat] ECC-384
2,948,583 UART: [kat] HMAC-384Kdf
2,970,972 UART: [kat] LMS
3,500,412 UART: [kat] --
3,505,826 UART: [cold-reset] ++
3,508,246 UART: [fht] FHT @ 0x50003400
3,519,787 UART: [idev] ++
3,520,356 UART: [idev] CDI.KEYID = 6
3,521,238 UART: [idev] SUBJECT.KEYID = 7
3,522,480 UART: [idev] UDS.KEYID = 0
3,523,378 ready_for_fw is high
3,523,562 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,622,808 UART: [idev] Erasing UDS.KEYID = 0
6,024,474 UART: [idev] Sha1 KeyId Algorithm
6,048,300 UART: [idev] --
6,052,025 UART: [ldev] ++
6,052,603 UART: [ldev] CDI.KEYID = 6
6,053,492 UART: [ldev] SUBJECT.KEYID = 5
6,054,704 UART: [ldev] AUTHORITY.KEYID = 7
6,055,941 UART: [ldev] FE.KEYID = 1
6,099,722 UART: [ldev] Erasing FE.KEYID = 1
8,603,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,975 UART: [ldev] --
10,411,074 UART: [fwproc] Wait for Commands...
10,413,436 UART: [fwproc] Recv command 0x46574c44
10,415,592 UART: [fwproc] Recv'd Img size: 78704 bytes
13,381,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,457,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,525,872 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,719,095 >>> mbox cmd response: success
13,719,564 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,723,525 UART: [afmc] ++
13,724,135 UART: [afmc] CDI.KEYID = 6
13,725,021 UART: [afmc] SUBJECT.KEYID = 7
13,726,182 UART: [afmc] AUTHORITY.KEYID = 5
16,253,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,975,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,977,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,993,579 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,009,632 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,025,495 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,048,425 UART: [afmc] --
18,052,190 UART: [cold-reset] --
18,055,566 UART: [state] Locking Datavault
18,060,377 UART: [state] Locking PCR0, PCR1 and PCR31
18,062,074 UART: [state] Locking ICCM
18,063,906 UART: [exit] Launching FMC @ 0x40000130
18,072,355 UART:
18,072,596 UART: Running Caliptra FMC ...
18,073,697 UART:
18,073,857 UART: [state] CFI Enabled
18,134,197 UART: [fht] FMC Alias Private Key: 7
19,897,896 UART: [art] Extend RT PCRs Done
19,899,115 UART: [art] Lock RT PCRs Done
19,900,817 UART: [art] Populate DV Done
19,906,224 UART: [fht] FMC Alias Private Key: 7
19,907,972 UART: [art] Derive CDI
19,908,732 UART: [art] Store in in slot 0x4
19,966,922 UART: [art] Derive Key Pair
19,967,971 UART: [art] Store priv key in slot 0x5
22,430,462 UART: [art] Derive Key Pair - Done
22,443,397 UART: [art] Signing Cert with AUTHO
22,444,692 UART: RITY.KEYID = 7
24,157,016 UART: [art] Erasing AUTHORITY.KEYID = 7
24,158,514 UART: [art] PUB.X = 72F0C04167A66DE2252D19BD413ADC02764CAA0BAFD0C83CC7B6CBF9682A731CDE4DEB17E337A92B29ABFB965A3235F7
24,165,833 UART: [art] PUB.Y = AA1353FE44AD22CE8FC9D92D84ED60927C3F48F0EA454F1C4552D9330B623B489D5E44FBEEEE085EDCD54DB4E37D0542
24,173,076 UART: [art] SIG.R = 3714FE1889C73EC3BCEEF4F504545908D4A6B5DD522BC388A06B73A2C152374B2A5FEBC8AB01C67527F6443145282812
24,180,510 UART: [art] SIG.S = BEC2870F052CEFE6BBECD19F23F3DE32B431F5474816219F70259294E6B7460CCC31CB6D186A62E331CE5A20CD600BF8
25,158,863 UART: mbox::rt_entry...
25,159,813 UART: ____ _ _ _ ____ _____
25,161,907 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,163,910 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,165,792 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,167,737 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,169,779 UART: |_|
25,170,585 UART:
25,284,305 UART: [rt] Runtime listening for mailbox commands...
25,290,149 >>> mbox cmd response data (3272 bytes)
25,306,263 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,339,689 >>> mbox cmd response data (0 bytes)
27,400,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,545,448 UART:
27,545,822 UART: Running Caliptra ROM ...
27,546,896 UART:
27,547,049 UART: [state] CFI Enabled
27,611,011 UART: [state] LifecycleState = Unprovisioned
27,612,859 UART: [state] DebugLocked = No
27,614,646 UART: [state] WD Timer not started. Device not locked for debugging
27,619,193 UART: [kat] SHA2-256
27,798,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,809,854 UART: [kat] ++
27,810,396 UART: [kat] sha1
27,821,834 UART: [kat] SHA2-256
27,824,855 UART: [kat] SHA2-384
27,830,894 UART: [kat] SHA2-512-ACC
27,833,830 UART: [kat] ECC-384
30,294,597 UART: [kat] HMAC-384Kdf
30,319,953 UART: [kat] LMS
30,849,410 UART: [kat] --
30,854,442 UART: [update-reset] ++
34,274,922 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,277,860 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,661,212 >>> mbox cmd response: success
34,665,722 UART: [update-reset] Copying MAN_2 To MAN_1
34,684,774 UART: [update-reset Success] --
34,688,705 UART: [state] Locking Datavault
34,690,931 UART: [state] Locking PCR0, PCR1 and PCR31
34,692,632 UART: [state] Locking ICCM
34,694,813 UART: [exit] Launching FMC @ 0x40000130
34,703,206 UART:
34,703,446 UART: Running Caliptra FMC ...
34,704,751 UART:
34,704,911 UART: [state] CFI Enabled
34,809,805 UART: [art] Extend RT PCRs Done
34,811,008 UART: [art] Lock RT PCRs Done
34,812,172 UART: [art] Populate DV Done
34,817,597 UART: [fht] FMC Alias Private Key: 7
34,819,132 UART: [art] Derive CDI
34,819,871 UART: [art] Store in in slot 0x4
34,879,184 UART: [art] Derive Key Pair
34,880,185 UART: [art] Store priv key in slot 0x5
37,343,453 UART: [art] Derive Key Pair - Done
37,356,300 UART: [art] Signing Cert with AUTHO
37,357,604 UART: RITY.KEYID = 7
39,068,974 UART: [art] Erasing AUTHORITY.KEYID = 7
39,070,484 UART: [art] PUB.X = 26EDA1AF0C6567D68BD228A1549E788B8BC4BFF811B5BA3D9CDE44B03F2DD8C8A1A0A6A00E039FD93257F87B435148BE
39,077,748 UART: [art] PUB.Y = AD77D1F020B762C6C611B7EB36A18628B7B395BFEF4B9B9FE325E658812940E8DF32D17439EA519E3866D709FE806656
39,085,018 UART: [art] SIG.R = 8671E4B8FD188CB5E12D13C4E8FF5B511E63E44A5ED2C14958AF7361A8F49A2D2CD09FFE847BC1475FB2C54EAAC4B9D4
39,092,432 UART: [art] SIG.S = 59FAF48B9D80DFB4A9BBCB3640D850DD91FA32AF4BB41D26A0DD21F7877A8A5CECBE69C2F5CCE17758CB79CC306DB62B
40,071,048 UART: Caliptra RT
40,071,766 UART: [state] CFI Enabled
42,632,851 UART: Disabled attest: DPE valid fail
42,634,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,635,464 UART: [rt] RT listening for mailbox commands...
42,666,684 UART: [rt]cmd =0x494e464f, len=4
42,670,561 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,382,347 ready_for_fw is high
3,382,885 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,500,417 >>> mbox cmd response: success
13,501,021 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,790,078 UART:
17,790,476 UART: Running Caliptra FMC ...
17,791,579 UART:
17,791,736 UART: [state] CFI Enabled
17,857,601 UART: [fht] FMC Alias Private Key: 7
19,621,197 UART: [art] Extend RT PCRs Done
19,622,414 UART: [art] Lock RT PCRs Done
19,623,850 UART: [art] Populate DV Done
19,629,102 UART: [fht] FMC Alias Private Key: 7
19,630,755 UART: [art] Derive CDI
19,631,494 UART: [art] Store in in slot 0x4
19,690,089 UART: [art] Derive Key Pair
19,691,148 UART: [art] Store priv key in slot 0x5
22,153,470 UART: [art] Derive Key Pair - Done
22,166,349 UART: [art] Signing Cert with AUTHO
22,167,656 UART: RITY.KEYID = 7
23,879,598 UART: [art] Erasing AUTHORITY.KEYID = 7
23,881,097 UART: [art] PUB.X = 453226A21A3CE497E0E7C3C4F21D9984CD247BF10377CB36F546D2D0B9233072BDA5AB4BBC74C88EE2388A85C20D6296
23,888,346 UART: [art] PUB.Y = 3BC51C8629EE8C75E4FB2B1233C3E0B631DC615767227B7BB9E02CEA4821B112B585596FF52CE9456D0BC954A6EEDF61
23,895,656 UART: [art] SIG.R = 1B6D1BAFE23706A2AD7E0A7760738A1CF92088342694026338159EF136B611E386D95E8B451A7D90D7FEC4D00D3AC6F8
23,903,043 UART: [art] SIG.S = CEF45AFAAD175FE70C5EE4894DEEB08B18E210BB300097BB28A6AECEF0BC14C1C5922CEB1E117CC06C05B47F18F340D4
24,881,347 UART: mbox::rt_entry...
24,882,310 UART: ____ _ _ _ ____ _____
24,884,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,886,255 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,888,109 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,890,072 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,891,932 UART: |_|
24,892,753 UART:
25,005,511 UART: [rt] Runtime listening for mailbox commands...
25,011,372 >>> mbox cmd response data (3272 bytes)
25,027,269 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,060,686 >>> mbox cmd response data (0 bytes)
27,125,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,227,707 >>> mbox cmd response: success
34,261,505 UART:
34,261,814 UART: Running Caliptra FMC ...
34,262,858 UART:
34,263,009 UART: [state] CFI Enabled
34,360,239 UART: [art] Extend RT PCRs Done
34,361,446 UART: [art] Lock RT PCRs Done
34,363,038 UART: [art] Populate DV Done
34,368,550 UART: [fht] FMC Alias Private Key: 7
34,370,029 UART: [art] Derive CDI
34,370,764 UART: [art] Store in in slot 0x4
34,429,546 UART: [art] Derive Key Pair
34,430,586 UART: [art] Store priv key in slot 0x5
36,893,392 UART: [art] Derive Key Pair - Done
36,906,276 UART: [art] Signing Cert with AUTHO
36,907,581 UART: RITY.KEYID = 7
38,618,523 UART: [art] Erasing AUTHORITY.KEYID = 7
38,620,026 UART: [art] PUB.X = 1D6721C8D98298AA8F285C8CDF3200E38901E0A618F9D94CF9EB14C56A9FC251163F6BB81CEBE2E167A2D0EBE314A624
38,627,289 UART: [art] PUB.Y = 7D4AAB980A89F9532E98577627AF6E3ED697CCDBAFBF8FCB25C0A06913C83C6632743E5B9CB79BE55446EB04C37041E1
38,634,518 UART: [art] SIG.R = EC01BBADE8F2BFDA4C5F63616A7EE0E9BBABAFE4B6DFF14317433C29724BF5B3D040C5BE463373C206E067FB059D395D
38,641,960 UART: [art] SIG.S = C5CF5EEB439A36890E47AAC4AA495DAABA82BECC0F42466B9C58F489441F212E0DECA4CA661BE588720EF6E2A18E56B4
39,621,040 UART: Caliptra RT
39,621,772 UART: [state] CFI Enabled
42,182,745 UART: Disabled attest: DPE valid fail
42,184,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,185,130 UART: [rt] RT listening for mailbox commands...
42,216,518 UART: [rt]cmd =0x494e464f, len=4
42,220,406 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,356 UART:
192,730 UART: Running Caliptra ROM ...
193,917 UART:
603,560 UART: [state] CFI Enabled
619,920 UART: [state] LifecycleState = Unprovisioned
621,807 UART: [state] DebugLocked = No
623,968 UART: [state] WD Timer not started. Device not locked for debugging
627,573 UART: [kat] SHA2-256
806,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,213 UART: [kat] ++
818,741 UART: [kat] sha1
830,894 UART: [kat] SHA2-256
833,969 UART: [kat] SHA2-384
839,743 UART: [kat] SHA2-512-ACC
842,667 UART: [kat] ECC-384
3,285,998 UART: [kat] HMAC-384Kdf
3,300,010 UART: [kat] LMS
3,829,491 UART: [kat] --
3,834,624 UART: [cold-reset] ++
3,835,657 UART: [fht] FHT @ 0x50003400
3,846,485 UART: [idev] ++
3,847,065 UART: [idev] CDI.KEYID = 6
3,847,949 UART: [idev] SUBJECT.KEYID = 7
3,849,186 UART: [idev] UDS.KEYID = 0
3,850,079 ready_for_fw is high
3,850,266 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,949,152 UART: [idev] Erasing UDS.KEYID = 0
6,317,827 UART: [idev] Sha1 KeyId Algorithm
6,339,449 UART: [idev] --
6,343,543 UART: [ldev] ++
6,344,104 UART: [ldev] CDI.KEYID = 6
6,345,009 UART: [ldev] SUBJECT.KEYID = 5
6,346,218 UART: [ldev] AUTHORITY.KEYID = 7
6,347,440 UART: [ldev] FE.KEYID = 1
6,359,535 UART: [ldev] Erasing FE.KEYID = 1
8,834,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,161 UART: [ldev] --
10,625,116 UART: [fwproc] Wait for Commands...
10,627,579 UART: [fwproc] Recv command 0x46574c44
10,629,661 UART: [fwproc] Recv'd Img size: 78704 bytes
13,591,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,662,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,730,893 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,924,944 >>> mbox cmd response: success
13,925,444 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,928,382 UART: [afmc] ++
13,928,962 UART: [afmc] CDI.KEYID = 6
13,929,838 UART: [afmc] SUBJECT.KEYID = 7
13,931,044 UART: [afmc] AUTHORITY.KEYID = 5
16,427,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,146,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,148,380 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,164,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,180,144 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,195,997 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,217,838 UART: [afmc] --
18,221,906 UART: [cold-reset] --
18,226,245 UART: [state] Locking Datavault
18,229,806 UART: [state] Locking PCR0, PCR1 and PCR31
18,231,650 UART: [state] Locking ICCM
18,233,481 UART: [exit] Launching FMC @ 0x40000130
18,241,873 UART:
18,242,103 UART: Running Caliptra FMC ...
18,243,195 UART:
18,243,349 UART: [state] CFI Enabled
18,251,402 UART: [fht] FMC Alias Private Key: 7
20,007,985 UART: [art] Extend RT PCRs Done
20,009,206 UART: [art] Lock RT PCRs Done
20,011,071 UART: [art] Populate DV Done
20,016,436 UART: [fht] FMC Alias Private Key: 7
20,018,131 UART: [art] Derive CDI
20,018,866 UART: [art] Store in in slot 0x4
20,061,551 UART: [art] Derive Key Pair
20,062,635 UART: [art] Store priv key in slot 0x5
22,489,926 UART: [art] Derive Key Pair - Done
22,502,870 UART: [art] Signing Cert with AUTHO
22,504,161 UART: RITY.KEYID = 7
24,209,882 UART: [art] Erasing AUTHORITY.KEYID = 7
24,211,379 UART: [art] PUB.X = D302E6F88AE4B1C28DEC13560B8719C5707F386793709D12B5BECEB3333A1F6493D6108FD441526AA280F7BDA3A3BD75
24,218,615 UART: [art] PUB.Y = 4474BC98356C34F3F6B339B75B43F77237E452E6FCBD1DDEE33685AF2BD75ECF2EE75B703CE025EF132C822540FFEB5F
24,225,943 UART: [art] SIG.R = A528E79B68D48D47258F48D0A39E73C88BF954B79AC1345E4C0F1CFA9732A313502DE7476D83B63F51893A2845F8166F
24,233,338 UART: [art] SIG.S = 1343F86E8683DF01111B7756552F7A47BACB6EB1CC4065322985821F03BC4D59F794029DCE197366656D9C4F05641F39
25,211,657 UART: mbox::rt_entry...
25,212,618 UART: ____ _ _ _ ____ _____
25,214,593 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,216,591 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,218,509 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,220,429 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,222,348 UART: |_|
25,223,186 UART:
25,337,340 UART: [rt] Runtime listening for mailbox commands...
25,343,175 >>> mbox cmd response data (3272 bytes)
25,359,155 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,392,557 >>> mbox cmd response data (0 bytes)
27,451,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,596,449 UART:
27,596,832 UART: Running Caliptra ROM ...
27,597,875 UART:
27,598,020 UART: [state] CFI Enabled
27,614,135 UART: [state] LifecycleState = Unprovisioned
27,615,968 UART: [state] DebugLocked = No
27,617,805 UART: [state] WD Timer not started. Device not locked for debugging
27,621,804 UART: [kat] SHA2-256
27,800,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,812,571 UART: [kat] ++
27,813,020 UART: [kat] sha1
27,824,814 UART: [kat] SHA2-256
27,827,840 UART: [kat] SHA2-384
27,834,072 UART: [kat] SHA2-512-ACC
27,836,991 UART: [kat] ECC-384
30,278,556 UART: [kat] HMAC-384Kdf
30,291,969 UART: [kat] LMS
30,821,472 UART: [kat] --
30,826,699 UART: [update-reset] ++
34,258,457 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,262,037 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,645,368 >>> mbox cmd response: success
34,649,923 UART: [update-reset] Copying MAN_2 To MAN_1
34,668,401 UART: [update-reset Success] --
34,675,194 UART: [state] Locking Datavault
34,678,887 UART: [state] Locking PCR0, PCR1 and PCR31
34,680,533 UART: [state] Locking ICCM
34,682,300 UART: [exit] Launching FMC @ 0x40000130
34,690,751 UART:
34,690,979 UART: Running Caliptra FMC ...
34,692,306 UART:
34,692,460 UART: [state] CFI Enabled
34,736,351 UART: [art] Extend RT PCRs Done
34,737,543 UART: [art] Lock RT PCRs Done
34,738,854 UART: [art] Populate DV Done
34,744,252 UART: [fht] FMC Alias Private Key: 7
34,745,940 UART: [art] Derive CDI
34,746,741 UART: [art] Store in in slot 0x4
34,788,948 UART: [art] Derive Key Pair
34,789,939 UART: [art] Store priv key in slot 0x5
37,216,234 UART: [art] Derive Key Pair - Done
37,229,292 UART: [art] Signing Cert with AUTHO
37,230,599 UART: RITY.KEYID = 7
38,935,945 UART: [art] Erasing AUTHORITY.KEYID = 7
38,937,450 UART: [art] PUB.X = D78AAEA5AD069E564874A643E229B2D67602D560A049A8D3D0DB5C82105CE5B292AB13CA257658BE0D58D9E0E901E415
38,944,679 UART: [art] PUB.Y = FBBF5331B33ABDDBEF479E2FFAC8486217700F398E43BDAA6B5872A013F35556F295CED5883C84B4D26C61B69F7B33D3
38,952,096 UART: [art] SIG.R = A5B8C00314C7C618DB583AF59E4F43324803070B59EF592D5A40780F8F965629C38173D57E69404E75CF16363DCB0F1D
38,959,322 UART: [art] SIG.S = D3DA7B9B2C88D436A1542BC07876A71640076FAB209E64BD3E7B0DD050AD71999D8DD33212385A88DE88177BC614E3BE
39,938,241 UART: Caliptra RT
39,938,954 UART: [state] CFI Enabled
42,417,628 UART: Disabled attest: DPE valid fail
42,419,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,420,117 UART: [rt] RT listening for mailbox commands...
42,451,546 UART: [rt]cmd =0x494e464f, len=4
42,455,487 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,700,522 ready_for_fw is high
3,700,932 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,714,043 >>> mbox cmd response: success
13,714,796 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,960,657 UART:
17,961,030 UART: Running Caliptra FMC ...
17,962,226 UART:
17,962,408 UART: [state] CFI Enabled
17,970,548 UART: [fht] FMC Alias Private Key: 7
19,727,299 UART: [art] Extend RT PCRs Done
19,728,524 UART: [art] Lock RT PCRs Done
19,729,979 UART: [art] Populate DV Done
19,735,687 UART: [fht] FMC Alias Private Key: 7
19,737,227 UART: [art] Derive CDI
19,738,035 UART: [art] Store in in slot 0x4
19,780,624 UART: [art] Derive Key Pair
19,781,619 UART: [art] Store priv key in slot 0x5
22,208,542 UART: [art] Derive Key Pair - Done
22,221,289 UART: [art] Signing Cert with AUTHO
22,222,597 UART: RITY.KEYID = 7
23,928,294 UART: [art] Erasing AUTHORITY.KEYID = 7
23,929,799 UART: [art] PUB.X = 64890A38C7D24E21AC70275D480D5ACA3192523DD816E7ACE445865FFE8813E7415CF4EFADB3896FA9353B60DF9A5BC9
23,937,041 UART: [art] PUB.Y = 504CE1C306BD90597902CB6396D2F2BFF453D3CDDC8363E5A30700E61D1ABFC87BF4C0C0E088DAE9593305C367C25B11
23,944,294 UART: [art] SIG.R = B6DC0053FD98BE9F4B8EA1CC39AF16DEE8D7BA12B71EB3837C28F15113A15C07D90312A456B40D61A8DFB7D56F4381D1
23,951,687 UART: [art] SIG.S = 5C6CD2C02D94B2BCC5C5358AE52A4A158FF00E0EFF154632B98D183D1EEDE366B0EE69D52720AE7704308E6D519C66F3
24,930,595 UART: mbox::rt_entry...
24,931,550 UART: ____ _ _ _ ____ _____
24,933,474 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,935,473 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,937,320 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,939,278 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,941,206 UART: |_|
24,942,004 UART:
25,055,732 UART: [rt] Runtime listening for mailbox commands...
25,061,581 >>> mbox cmd response data (3272 bytes)
25,077,314 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,110,714 >>> mbox cmd response data (0 bytes)
27,169,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,220,549 >>> mbox cmd response: success
34,255,780 UART:
34,256,091 UART: Running Caliptra FMC ...
34,257,136 UART:
34,257,279 UART: [state] CFI Enabled
34,300,933 UART: [art] Extend RT PCRs Done
34,302,118 UART: [art] Lock RT PCRs Done
34,303,731 UART: [art] Populate DV Done
34,309,242 UART: [fht] FMC Alias Private Key: 7
34,310,772 UART: [art] Derive CDI
34,311,575 UART: [art] Store in in slot 0x4
34,354,104 UART: [art] Derive Key Pair
34,355,096 UART: [art] Store priv key in slot 0x5
36,782,337 UART: [art] Derive Key Pair - Done
36,795,489 UART: [art] Signing Cert with AUTHO
36,796,789 UART: RITY.KEYID = 7
38,502,354 UART: [art] Erasing AUTHORITY.KEYID = 7
38,503,919 UART: [art] PUB.X = ABE727A644D5722AB64AD6BFBF7E93813087151ACED593B09E76ED643F93C1EA71DA4B41DBC3E15192EFD3798784BCFF
38,511,133 UART: [art] PUB.Y = FA1A36059A09BF760D9ECB472A6F10A984695E787C217324243536037B9B8A1C8FFA9DAEB5E919A16F0290718855398A
38,518,410 UART: [art] SIG.R = CCF9B4EDBCFCB42995CDED9A102154ACC759F8CE2A71FE17AC54F81CFAA9F8ECEA770E8EB64FFB46A5095ADAEC541D06
38,525,874 UART: [art] SIG.S = A7D4ECC86283454279B1284D436ED6EB4CE89D8660A56CDF8B1FAFB5F1EC697DB7A8EB87FB7F9FDC581A57FFCDC13D35
39,505,108 UART: Caliptra RT
39,505,935 UART: [state] CFI Enabled
41,982,982 UART: Disabled attest: DPE valid fail
41,984,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,985,319 UART: [rt] RT listening for mailbox commands...
42,016,653 UART: [rt]cmd =0x494e464f, len=4
42,020,709 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,438,235 ready_for_fw is high
3,438,651 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,970,419 >>> mbox cmd response: success
13,971,014 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,255,785 UART:
18,256,168 UART: Running Caliptra FMC ...
18,257,261 UART:
18,257,415 UART: [state] CFI Enabled
18,325,267 UART: [fht] FMC Alias Private Key: 7
20,089,162 UART: [art] Extend RT PCRs Done
20,090,412 UART: [art] Lock RT PCRs Done
20,092,499 UART: [art] Populate DV Done
20,098,077 UART: [fht] FMC Alias Private Key: 7
20,099,625 UART: [art] Derive CDI
20,100,362 UART: [art] Store in in slot 0x4
20,158,412 UART: [art] Derive Key Pair
20,159,449 UART: [art] Store priv key in slot 0x5
22,622,811 UART: [art] Derive Key Pair - Done
22,635,311 UART: [art] Signing Cert with AUTHO
22,636,614 UART: RITY.KEYID = 7
24,348,395 UART: [art] Erasing AUTHORITY.KEYID = 7
24,349,895 UART: [art] PUB.X = AA38CBD38147252F5DB89D3A877D5547EAE1AFFC43FF7807AABD4ACB29595342AFD91AAF28A5F5C52C5FFBE91C19967F
24,357,239 UART: [art] PUB.Y = 5B33F743F65FF5CC8A9DE00964DC6C857D967C9C429DE5BE690C2D902F6425DE440CD07146C6DA337433810F5323F5DB
24,364,460 UART: [art] SIG.R = F828170D9E585F281C41E67B5034D7DEE8CB89AF72FFD82B2A3C16D7F965738436236BC886949BFB0BC463FB0800802E
24,371,946 UART: [art] SIG.S = 2E2356C8BE816002B84E469CCC3EC960961C7990CDB7FB49114188CD88B23A7AD4011DAF5C7CACD87436FF41BEDEA172
25,350,215 UART: mbox::rt_entry...
25,351,198 UART: ____ _ _ _ ____ _____
25,353,134 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,355,139 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,356,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,358,948 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,360,833 UART: |_|
25,361,661 UART:
25,474,786 UART: [rt] Runtime listening for mailbox commands...
25,480,631 >>> mbox cmd response data (3272 bytes)
25,496,358 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,529,757 >>> mbox cmd response data (0 bytes)
27,601,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,399,504 >>> mbox cmd response: success
35,432,773 UART:
35,433,108 UART: Running Caliptra FMC ...
35,434,235 UART:
35,434,402 UART: [state] CFI Enabled
35,534,492 UART: [art] Extend RT PCRs Done
35,535,706 UART: [art] Lock RT PCRs Done
35,537,277 UART: [art] Populate DV Done
35,542,845 UART: [fht] FMC Alias Private Key: 7
35,544,377 UART: [art] Derive CDI
35,545,112 UART: [art] Store in in slot 0x4
35,602,436 UART: [art] Derive Key Pair
35,603,481 UART: [art] Store priv key in slot 0x5
38,066,561 UART: [art] Derive Key Pair - Done
38,079,448 UART: [art] Signing Cert with AUTHO
38,080,749 UART: RITY.KEYID = 7
39,792,002 UART: [art] Erasing AUTHORITY.KEYID = 7
39,793,511 UART: [art] PUB.X = A3C086CEF82ADFDE706DA5919A5B046391A5511F98FE9DB9235053C7EE4BED85621B75F1F1AE321FAC9F4C01C9BE66E4
39,800,820 UART: [art] PUB.Y = 472AA5A58137F73C90B4A9D0043A90E599A7AF13C8E2F02284F1AF5779D734935B70D2C7BD7026A7CC894EC6AE3C1C31
39,808,094 UART: [art] SIG.R = 4522F15A5777C8431EB6F6F6C3403BDBF1F02A9D3C490533338971226E7022192D190A13AC915DFD619399BAA097D77B
39,815,464 UART: [art] SIG.S = 35EA8F0A664A3008029B1C7C9568C8A33AB7F9C0354505C84EB076AF5C8405231CC58082DCD34FF84D834A83B743D35B
40,794,553 UART: Caliptra RT
40,795,267 UART: [state] CFI Enabled
43,355,241 UART: Disabled attest: DPE valid fail
43,357,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,358,133 UART: [rt] RT listening for mailbox commands...
43,389,840 UART: [rt]cmd =0x494e464f, len=4
43,393,789 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,757,651 ready_for_fw is high
3,758,020 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,187,451 >>> mbox cmd response: success
14,188,185 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,435,672 UART:
18,436,048 UART: Running Caliptra FMC ...
18,437,245 UART:
18,437,404 UART: [state] CFI Enabled
18,445,830 UART: [fht] FMC Alias Private Key: 7
20,203,323 UART: [art] Extend RT PCRs Done
20,204,787 UART: [art] Lock RT PCRs Done
20,206,495 UART: [art] Populate DV Done
20,212,027 UART: [fht] FMC Alias Private Key: 7
20,213,572 UART: [art] Derive CDI
20,214,387 UART: [art] Store in in slot 0x4
20,257,201 UART: [art] Derive Key Pair
20,258,243 UART: [art] Store priv key in slot 0x5
22,684,810 UART: [art] Derive Key Pair - Done
22,697,743 UART: [art] Signing Cert with AUTHO
22,699,044 UART: RITY.KEYID = 7
24,403,919 UART: [art] Erasing AUTHORITY.KEYID = 7
24,405,436 UART: [art] PUB.X = 2124D5AA3FF8EE927B5A85E6D86C0643E98AAA0469746CB9C38C388CFCF3BC2BB6F5F7B46716205AC98E0D1A46D5908A
24,412,738 UART: [art] PUB.Y = C77946897067AA0E116D3BDF9C75F4A2D43F902C3BD774E2DBA7A462596BB69C08AE3382D710123A6035C2A6961B0012
24,419,920 UART: [art] SIG.R = 9267214369B73E5B5B5CD552C5B3638056A15EEB23414AD07E08047FB6A058E13BD13F7DB029E48B95B58F7F97D49E90
24,427,314 UART: [art] SIG.S = A60B39932EB9AAF6E0F76DA4F67D95F6189FF9EFE20971577E4B173DE2CAC0BA978A82982AEA87F1F45ABAE1C5708BE4
25,405,888 UART: mbox::rt_entry...
25,406,844 UART: ____ _ _ _ ____ _____
25,408,939 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,410,945 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,412,789 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,414,745 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,416,591 UART: |_|
25,417,468 UART:
25,530,347 UART: [rt] Runtime listening for mailbox commands...
25,536,212 >>> mbox cmd response data (3272 bytes)
25,552,040 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,585,437 >>> mbox cmd response data (0 bytes)
27,642,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,374,751 >>> mbox cmd response: success
35,410,935 UART:
35,411,235 UART: Running Caliptra FMC ...
35,412,345 UART:
35,412,505 UART: [state] CFI Enabled
35,456,806 UART: [art] Extend RT PCRs Done
35,457,996 UART: [art] Lock RT PCRs Done
35,459,557 UART: [art] Populate DV Done
35,464,880 UART: [fht] FMC Alias Private Key: 7
35,466,572 UART: [art] Derive CDI
35,467,302 UART: [art] Store in in slot 0x4
35,509,832 UART: [art] Derive Key Pair
35,510,823 UART: [art] Store priv key in slot 0x5
37,937,903 UART: [art] Derive Key Pair - Done
37,950,853 UART: [art] Signing Cert with AUTHO
37,952,155 UART: RITY.KEYID = 7
39,657,817 UART: [art] Erasing AUTHORITY.KEYID = 7
39,659,325 UART: [art] PUB.X = 1806352A09BD7BCB3DA744A792B06366EB950E02352A156A9B7AC54F5DB682E684E59807954F53E9F1B4BF4592D811E2
39,666,541 UART: [art] PUB.Y = B626BB6D619408969D3241F436DB921EAE1B92A7BCF78C1BD6BBCBD50E52AFF8025AEAE30D43E776F27985C66585C699
39,673,817 UART: [art] SIG.R = F64A6711F6807A22F7F340CCDD18EE5D9DAEA727B75B2A071614325A1801CE1533ECBF14EDDBE3E9F51E19991253E55F
39,681,237 UART: [art] SIG.S = 3AB00552522ED9E4BDBFA13A7A4AB57A4E90BCE14CEF97227C9B4C351CB0D1E7F3FFC99E404E82C04F9CE3644F9B4C6A
40,660,119 UART: Caliptra RT
40,660,833 UART: [state] CFI Enabled
43,138,146 UART: Disabled attest: DPE valid fail
43,139,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,140,840 UART: [rt] RT listening for mailbox commands...
43,172,216 UART: [rt]cmd =0x494e464f, len=4
43,176,270 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,634 UART: [state] LifecycleState = Unprovisioned
85,289 UART: [state] DebugLocked = No
85,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,573 UART: [kat] SHA2-256
881,504 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,619 UART: [kat] ++
885,771 UART: [kat] sha1
890,003 UART: [kat] SHA2-256
891,941 UART: [kat] SHA2-384
894,606 UART: [kat] SHA2-512-ACC
896,507 UART: [kat] ECC-384
902,020 UART: [kat] HMAC-384Kdf
906,654 UART: [kat] LMS
1,474,850 UART: [kat] --
1,475,705 UART: [cold-reset] ++
1,476,235 UART: [fht] Storing FHT @ 0x50003400
1,479,012 UART: [idev] ++
1,479,180 UART: [idev] CDI.KEYID = 6
1,479,540 UART: [idev] SUBJECT.KEYID = 7
1,479,964 UART: [idev] UDS.KEYID = 0
1,480,309 ready_for_fw is high
1,480,309 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,487,830 UART: [idev] Erasing UDS.KEYID = 0
1,504,990 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,696 UART: [idev] --
1,514,849 UART: [ldev] ++
1,515,017 UART: [ldev] CDI.KEYID = 6
1,515,380 UART: [ldev] SUBJECT.KEYID = 5
1,515,806 UART: [ldev] AUTHORITY.KEYID = 7
1,516,269 UART: [ldev] FE.KEYID = 1
1,521,685 UART: [ldev] Erasing FE.KEYID = 1
1,547,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,698 UART: [ldev] --
1,587,169 UART: [fwproc] Waiting for Commands...
1,588,000 UART: [fwproc] Received command 0x46574c44
1,588,791 UART: [fwproc] Received Image of size 78704 bytes
2,479,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,507 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,859 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,617,370 >>> mbox cmd response: success
2,617,370 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,480 UART: [afmc] ++
2,618,648 UART: [afmc] CDI.KEYID = 6
2,619,010 UART: [afmc] SUBJECT.KEYID = 7
2,619,435 UART: [afmc] AUTHORITY.KEYID = 5
2,654,118 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,090 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,818 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,703 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,393 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,364 UART: [afmc] --
2,697,402 UART: [cold-reset] --
2,698,216 UART: [state] Locking Datavault
2,699,201 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,805 UART: [state] Locking ICCM
2,700,249 UART: [exit] Launching FMC @ 0x40000130
2,705,578 UART:
2,705,594 UART: Running Caliptra FMC ...
2,706,002 UART:
2,706,056 UART: [state] CFI Enabled
2,716,237 UART: [fht] FMC Alias Private Key: 7
2,824,264 UART: [art] Extend RT PCRs Done
2,824,692 UART: [art] Lock RT PCRs Done
2,826,042 UART: [art] Populate DV Done
2,834,037 UART: [fht] FMC Alias Private Key: 7
2,835,201 UART: [art] Derive CDI
2,835,481 UART: [art] Store in in slot 0x4
2,921,156 UART: [art] Derive Key Pair
2,921,516 UART: [art] Store priv key in slot 0x5
2,934,804 UART: [art] Derive Key Pair - Done
2,949,478 UART: [art] Signing Cert with AUTHO
2,949,958 UART: RITY.KEYID = 7
2,965,196 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,961 UART: [art] PUB.X = D0958F53D8EB1577816B74C5F801FB84BE69648A23E1E9809A9CED139AD1060011BF81B7307A604C477D46CB5D6C5810
2,972,703 UART: [art] PUB.Y = 378AB93145A03AD441BFBCDF85AC894A83C6B36E1D4AF0822754D5712807DDFEF4CC3F4E8F3292A975769A1647C60835
2,979,653 UART: [art] SIG.R = 76A6AF0000CBC55590EC0A7CE7812721DE0957BCEFB26C2F878753D518F1E77623F07D9B24B7533E6CED2EF29B6FEF34
2,986,385 UART: [art] SIG.S = 1F15CF154FF3F2A13BA7B218B77D21703102CCAF0E7530248DA45589A2DBF7BDD2B056BE6AC67CBB68CA47E163B0D8E4
3,010,650 UART: mbox::rt_entry...
3,011,022 UART: ____ _ _ _ ____ _____
3,011,806 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,606 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,374 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,142 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,910 UART: |_|
3,015,222 UART:
3,122,193 UART: [rt] Runtime listening for mailbox commands...
3,127,161 >>> mbox cmd response data (3272 bytes)
3,127,162 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,150,248 >>> mbox cmd response data (0 bytes)
3,150,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,150,369 UART:
3,150,385 UART: Running Caliptra ROM ...
3,150,793 UART:
3,150,847 UART: [state] CFI Enabled
3,153,561 UART: [state] LifecycleState = Unprovisioned
3,154,216 UART: [state] DebugLocked = No
3,154,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,156,321 UART: [kat] SHA2-256
3,950,252 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,954,367 UART: [kat] ++
3,954,519 UART: [kat] sha1
3,958,559 UART: [kat] SHA2-256
3,960,497 UART: [kat] SHA2-384
3,963,214 UART: [kat] SHA2-512-ACC
3,965,114 UART: [kat] ECC-384
3,970,641 UART: [kat] HMAC-384Kdf
3,975,187 UART: [kat] LMS
4,543,383 UART: [kat] --
4,544,522 UART: [update-reset] ++
5,880,189 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,881,349 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,031,399 >>> mbox cmd response: success
6,031,708 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,722 UART: [update-reset Success] --
6,040,539 UART: [state] Locking Datavault
6,041,373 UART: [state] Locking PCR0, PCR1 and PCR31
6,041,977 UART: [state] Locking ICCM
6,042,471 UART: [exit] Launching FMC @ 0x40000130
6,047,800 UART:
6,047,816 UART: Running Caliptra FMC ...
6,048,224 UART:
6,048,278 UART: [state] CFI Enabled
6,137,369 UART: [art] Extend RT PCRs Done
6,137,797 UART: [art] Lock RT PCRs Done
6,139,152 UART: [art] Populate DV Done
6,147,321 UART: [fht] FMC Alias Private Key: 7
6,148,409 UART: [art] Derive CDI
6,148,689 UART: [art] Store in in slot 0x4
6,234,482 UART: [art] Derive Key Pair
6,234,842 UART: [art] Store priv key in slot 0x5
6,247,452 UART: [art] Derive Key Pair - Done
6,262,415 UART: [art] Signing Cert with AUTHO
6,262,895 UART: RITY.KEYID = 7
6,278,075 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,840 UART: [art] PUB.X = 041FF31C161F93071836A9E0DC4E5EA9A6D7C767405782A1E0C1C848B80323DD07262AE232C64732F8A6DA078C3446ED
6,285,595 UART: [art] PUB.Y = 6078CFA602D8BE4ABC344290621AF8BBDAFEF6A42B7060303594315A260AEFA2C0BE15F7CDDFDEC3F74BD2E52E622008
6,292,556 UART: [art] SIG.R = C82E3CFB1A9F5BB36130F86920ABA827D62CC5C3DBBB6562C9B903A5E99F2476983395A8362C44FC2E366B6E1B7DEB4A
6,299,337 UART: [art] SIG.S = E09FA02E3A9E7FF244AEF7D974A2DD709B009970D235C6132D8192862B0C523F3B3B877179AC4120368F5C0F5A1DE5D2
6,323,526 UART: Caliptra RT
6,323,779 UART: [state] CFI Enabled
6,387,193 UART: Disabled attest: DPE valid fail
6,387,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,389,003 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,419,233 UART: [rt]cmd =0x494e464f, len=4
6,422,654 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,735 ready_for_fw is high
1,361,735 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,465,690 >>> mbox cmd response: success
2,465,690 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,840 UART:
2,527,856 UART: Running Caliptra FMC ...
2,528,264 UART:
2,528,318 UART: [state] CFI Enabled
2,538,773 UART: [fht] FMC Alias Private Key: 7
2,646,780 UART: [art] Extend RT PCRs Done
2,647,208 UART: [art] Lock RT PCRs Done
2,648,652 UART: [art] Populate DV Done
2,656,975 UART: [fht] FMC Alias Private Key: 7
2,657,903 UART: [art] Derive CDI
2,658,183 UART: [art] Store in in slot 0x4
2,743,890 UART: [art] Derive Key Pair
2,744,250 UART: [art] Store priv key in slot 0x5
2,757,806 UART: [art] Derive Key Pair - Done
2,772,655 UART: [art] Signing Cert with AUTHO
2,773,135 UART: RITY.KEYID = 7
2,787,991 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,756 UART: [art] PUB.X = 992FE0073F5376D990DD64ECE0992ACD71556AE46265D7C43FF6CEFD35BC9C30F1224633860481F4599720C093651C29
2,795,516 UART: [art] PUB.Y = 7635EC2D2C4560EB6818CDF885328415954E31CF142611D3C2A8F4EE950B30795D4C44D6E015C630A9BC7CB936003A9D
2,802,441 UART: [art] SIG.R = E767686001B0138D0209F608011CA237BE7A1F2375211D4C279AE912D8964EA48F812E886A64D14A249547C48E9530C6
2,809,184 UART: [art] SIG.S = 9B7068FBAA5CEB112AC26F19E65F64BCC8DE5C61D43D412B2E94B187CA20B6FB58C6DA3C84566ADBFA9AFB2E73A20221
2,832,728 UART: mbox::rt_entry...
2,833,100 UART: ____ _ _ _ ____ _____
2,833,884 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,684 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,452 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,220 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,988 UART: |_|
2,837,300 UART:
2,943,227 UART: [rt] Runtime listening for mailbox commands...
2,948,195 >>> mbox cmd response data (3272 bytes)
2,948,196 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,971,282 >>> mbox cmd response data (0 bytes)
2,971,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,734,873 >>> mbox cmd response: success
5,748,314 UART:
5,748,330 UART: Running Caliptra FMC ...
5,748,738 UART:
5,748,792 UART: [state] CFI Enabled
5,837,697 UART: [art] Extend RT PCRs Done
5,838,125 UART: [art] Lock RT PCRs Done
5,839,620 UART: [art] Populate DV Done
5,847,947 UART: [fht] FMC Alias Private Key: 7
5,849,003 UART: [art] Derive CDI
5,849,283 UART: [art] Store in in slot 0x4
5,935,274 UART: [art] Derive Key Pair
5,935,634 UART: [art] Store priv key in slot 0x5
5,949,302 UART: [art] Derive Key Pair - Done
5,963,829 UART: [art] Signing Cert with AUTHO
5,964,309 UART: RITY.KEYID = 7
5,979,577 UART: [art] Erasing AUTHORITY.KEYID = 7
5,980,342 UART: [art] PUB.X = B0867D31AC9E0B21633F6B1A3ED6C4CE958DD53905BB1F39D0BDEA8AEEB9DC6BC58446D4EC420422AE4EAAFA271CBBC7
5,987,133 UART: [art] PUB.Y = 309CEDA6CDC5116165085D32BD51B5B8B1E8AFDF31483DB95D0AF2F743198A20575946D61AE16A55EE4736FB274BF799
5,994,085 UART: [art] SIG.R = 6FDF879C043A84EB033514544E1C1AAAA6B70F76ABC9829EA2FFB1043AE4B00A02FCA9C7600A4B97F680DDF8FF59BEE8
6,000,856 UART: [art] SIG.S = F5D2C5F7B8FB2AE9EEE82B2222180C258E84A634AA89180C66E880FACFCEDC3C65A664DCCE9D08570F68FD8DAFEEEEC3
6,024,939 UART: Caliptra RT
6,025,192 UART: [state] CFI Enabled
6,088,843 UART: Disabled attest: DPE valid fail
6,089,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,090,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,121,195 UART: [rt]cmd =0x494e464f, len=4
6,124,290 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
86,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,628 UART: [kat] SHA2-256
882,559 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,674 UART: [kat] ++
886,826 UART: [kat] sha1
891,114 UART: [kat] SHA2-256
893,052 UART: [kat] SHA2-384
895,797 UART: [kat] SHA2-512-ACC
897,698 UART: [kat] ECC-384
903,341 UART: [kat] HMAC-384Kdf
907,971 UART: [kat] LMS
1,476,167 UART: [kat] --
1,477,150 UART: [cold-reset] ++
1,477,638 UART: [fht] Storing FHT @ 0x50003400
1,480,297 UART: [idev] ++
1,480,465 UART: [idev] CDI.KEYID = 6
1,480,825 UART: [idev] SUBJECT.KEYID = 7
1,481,249 UART: [idev] UDS.KEYID = 0
1,481,594 ready_for_fw is high
1,481,594 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,489,247 UART: [idev] Erasing UDS.KEYID = 0
1,505,945 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,683 UART: [idev] --
1,515,542 UART: [ldev] ++
1,515,710 UART: [ldev] CDI.KEYID = 6
1,516,073 UART: [ldev] SUBJECT.KEYID = 5
1,516,499 UART: [ldev] AUTHORITY.KEYID = 7
1,516,962 UART: [ldev] FE.KEYID = 1
1,522,192 UART: [ldev] Erasing FE.KEYID = 1
1,547,517 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,817 UART: [ldev] --
1,587,144 UART: [fwproc] Waiting for Commands...
1,587,759 UART: [fwproc] Received command 0x46574c44
1,588,550 UART: [fwproc] Received Image of size 78704 bytes
2,478,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,968 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,536,320 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,618,681 >>> mbox cmd response: success
2,618,681 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,619,943 UART: [afmc] ++
2,620,111 UART: [afmc] CDI.KEYID = 6
2,620,473 UART: [afmc] SUBJECT.KEYID = 7
2,620,898 UART: [afmc] AUTHORITY.KEYID = 5
2,656,069 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,672,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,673,063 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,791 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,684,676 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,366 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,698,095 UART: [afmc] --
2,699,115 UART: [cold-reset] --
2,699,911 UART: [state] Locking Datavault
2,701,120 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,724 UART: [state] Locking ICCM
2,702,146 UART: [exit] Launching FMC @ 0x40000130
2,707,475 UART:
2,707,491 UART: Running Caliptra FMC ...
2,707,899 UART:
2,708,042 UART: [state] CFI Enabled
2,718,879 UART: [fht] FMC Alias Private Key: 7
2,826,706 UART: [art] Extend RT PCRs Done
2,827,134 UART: [art] Lock RT PCRs Done
2,828,784 UART: [art] Populate DV Done
2,837,123 UART: [fht] FMC Alias Private Key: 7
2,838,167 UART: [art] Derive CDI
2,838,447 UART: [art] Store in in slot 0x4
2,924,002 UART: [art] Derive Key Pair
2,924,362 UART: [art] Store priv key in slot 0x5
2,937,848 UART: [art] Derive Key Pair - Done
2,952,751 UART: [art] Signing Cert with AUTHO
2,953,231 UART: RITY.KEYID = 7
2,968,293 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,058 UART: [art] PUB.X = FC754484E23D5F24D88B4832CE5A2B8CB1B8421C3F8D9DE67075E403480639E15053E788E765CC9CB5A2E176E05DED01
2,975,823 UART: [art] PUB.Y = 49B0192298B627B4DC04CF76F6B74F4B7A640BE445DF99326FEA6254F5A1A3403B74C67C403EB54FE4FD38290C1469A8
2,982,768 UART: [art] SIG.R = BB5D6F4111DBCCBAC88ABF19EBE1D539FD5B0FAF85DFA536DFB7BCDE5085CCAF7445D36D19BF9CCDEBD5EAB9FBFDC8E5
2,989,587 UART: [art] SIG.S = 993B4F919136E9C776CF01D1C9889EF2AB17A76CE18A02F89CA759410B48DCD85BA55EA69C8F6F26B563F264A6C93CBF
3,013,187 UART: mbox::rt_entry...
3,013,559 UART: ____ _ _ _ ____ _____
3,014,343 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,015,143 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,911 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,016,679 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,017,447 UART: |_|
3,017,759 UART:
3,125,902 UART: [rt] Runtime listening for mailbox commands...
3,130,870 >>> mbox cmd response data (3272 bytes)
3,130,871 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,153,957 >>> mbox cmd response data (0 bytes)
3,153,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,154,078 UART:
3,154,094 UART: Running Caliptra ROM ...
3,154,502 UART:
3,154,643 UART: [state] CFI Enabled
3,157,361 UART: [state] LifecycleState = Unprovisioned
3,158,016 UART: [state] DebugLocked = No
3,158,738 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,160,409 UART: [kat] SHA2-256
3,954,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,958,455 UART: [kat] ++
3,958,607 UART: [kat] sha1
3,962,957 UART: [kat] SHA2-256
3,964,895 UART: [kat] SHA2-384
3,967,496 UART: [kat] SHA2-512-ACC
3,969,396 UART: [kat] ECC-384
3,974,953 UART: [kat] HMAC-384Kdf
3,979,451 UART: [kat] LMS
4,547,647 UART: [kat] --
4,548,426 UART: [update-reset] ++
5,884,895 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,886,123 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,036,173 >>> mbox cmd response: success
6,036,530 UART: [update-reset] Copying MAN_2 To MAN_1
6,044,544 UART: [update-reset Success] --
6,045,697 UART: [state] Locking Datavault
6,046,297 UART: [state] Locking PCR0, PCR1 and PCR31
6,046,901 UART: [state] Locking ICCM
6,047,405 UART: [exit] Launching FMC @ 0x40000130
6,052,734 UART:
6,052,750 UART: Running Caliptra FMC ...
6,053,158 UART:
6,053,301 UART: [state] CFI Enabled
6,142,382 UART: [art] Extend RT PCRs Done
6,142,810 UART: [art] Lock RT PCRs Done
6,144,013 UART: [art] Populate DV Done
6,152,146 UART: [fht] FMC Alias Private Key: 7
6,153,326 UART: [art] Derive CDI
6,153,606 UART: [art] Store in in slot 0x4
6,239,321 UART: [art] Derive Key Pair
6,239,681 UART: [art] Store priv key in slot 0x5
6,252,769 UART: [art] Derive Key Pair - Done
6,267,750 UART: [art] Signing Cert with AUTHO
6,268,230 UART: RITY.KEYID = 7
6,283,724 UART: [art] Erasing AUTHORITY.KEYID = 7
6,284,489 UART: [art] PUB.X = 1CCC5730CB7854B0624AB54C8025816DF5199E86199CBC976FDF32809C22F7BA5E2ECEEEB548BC616AF40A64E8A6E33E
6,291,270 UART: [art] PUB.Y = 6CAB0206E9B72D038051B22DF95D70B1A652931B283D27A9C0920CDAA813752054BEA8656569A4FA8356BCEB8A8B534F
6,298,212 UART: [art] SIG.R = B4885A730EB62DC32B80C09B95C58460F77C6816F53DCE970C4C5097B7853D033419DB428C01A7201E37DFF7F55EA5E3
6,304,972 UART: [art] SIG.S = 61C407DFB1A4388FA9EF4DA909F6C7C666920BF1CCAB1BB8B6BF97F3CBCBC0BC60BA67584CFBB4D217B3A7F4AC860B94
6,328,365 UART: Caliptra RT
6,328,710 UART: [state] CFI Enabled
6,391,785 UART: Disabled attest: DPE valid fail
6,392,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,393,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,423,783 UART: [rt]cmd =0x494e464f, len=4
6,427,192 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,854 ready_for_fw is high
1,363,854 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,468,579 >>> mbox cmd response: success
2,468,579 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,530,825 UART:
2,530,841 UART: Running Caliptra FMC ...
2,531,249 UART:
2,531,392 UART: [state] CFI Enabled
2,542,089 UART: [fht] FMC Alias Private Key: 7
2,649,862 UART: [art] Extend RT PCRs Done
2,650,290 UART: [art] Lock RT PCRs Done
2,651,962 UART: [art] Populate DV Done
2,660,365 UART: [fht] FMC Alias Private Key: 7
2,661,299 UART: [art] Derive CDI
2,661,579 UART: [art] Store in in slot 0x4
2,747,138 UART: [art] Derive Key Pair
2,747,498 UART: [art] Store priv key in slot 0x5
2,760,568 UART: [art] Derive Key Pair - Done
2,775,528 UART: [art] Signing Cert with AUTHO
2,776,008 UART: RITY.KEYID = 7
2,790,960 UART: [art] Erasing AUTHORITY.KEYID = 7
2,791,725 UART: [art] PUB.X = 36AF9EA727C80EE1844056DCC62D2ACDE9A78E66C49977809BCDC9B368E336B55EE6E3C3C43285B8A0D2ADBF3769590D
2,798,503 UART: [art] PUB.Y = DEC2E5D5262D27C0A97F8BC3F21F83A605E1D504D276D33D408CB51C8F92C5C62C9395C4EA30F3EFF5F1EC1A849283B7
2,805,461 UART: [art] SIG.R = 3FDEDD0D200E1ED76A4B1F35E6E8C34DD8CE0224287F681C24168CD02ECC6FEB1973F2D18CCAE21B2A8A69D641BF0A62
2,812,241 UART: [art] SIG.S = 2FFC0A743AC10BAC88A2F970D4E3F98F2EB67FD229EBCDCF5AA8A292288A06D9BF41AA90826D632F10EE87FF45EEEAFE
2,836,217 UART: mbox::rt_entry...
2,836,589 UART: ____ _ _ _ ____ _____
2,837,373 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,838,173 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,838,941 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,839,709 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,840,477 UART: |_|
2,840,789 UART:
2,947,936 UART: [rt] Runtime listening for mailbox commands...
2,952,904 >>> mbox cmd response data (3272 bytes)
2,952,905 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,975,991 >>> mbox cmd response data (0 bytes)
2,975,992 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,737,549 >>> mbox cmd response: success
5,751,056 UART:
5,751,072 UART: Running Caliptra FMC ...
5,751,480 UART:
5,751,623 UART: [state] CFI Enabled
5,841,204 UART: [art] Extend RT PCRs Done
5,841,632 UART: [art] Lock RT PCRs Done
5,842,991 UART: [art] Populate DV Done
5,851,326 UART: [fht] FMC Alias Private Key: 7
5,852,290 UART: [art] Derive CDI
5,852,570 UART: [art] Store in in slot 0x4
5,938,249 UART: [art] Derive Key Pair
5,938,609 UART: [art] Store priv key in slot 0x5
5,952,195 UART: [art] Derive Key Pair - Done
5,967,321 UART: [art] Signing Cert with AUTHO
5,967,801 UART: RITY.KEYID = 7
5,983,431 UART: [art] Erasing AUTHORITY.KEYID = 7
5,984,196 UART: [art] PUB.X = 90D18EA18C0B1469C8DEB5AB90BBE1D5DE9E861A213DEA6CCB59E7EA43391E5C61ABD61687A14301E7919E91A5224103
5,990,969 UART: [art] PUB.Y = 41AB6D1E5F28A5F2CEAFDA42BAAF8539FE9C0AD169C3F0E471886348EB64683497C55396C180001D9E3B6A0084EE7C05
5,997,879 UART: [art] SIG.R = 8BB4C20894BED53A70BE147C51857C9AEE5ABE8FB81AD9C10C57B70EDAA123EF7975940CDEA3A20AA8CDE0F44F581CDF
6,004,662 UART: [art] SIG.S = FB706A8FE0AB9B0EB3A3FD76BB342D1A690BD0B27422C89B16BC79A994F0380ABC56AAE09167ADBCF25F01DF8D86F1E1
6,028,315 UART: Caliptra RT
6,028,660 UART: [state] CFI Enabled
6,090,754 UART: Disabled attest: DPE valid fail
6,091,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,092,618 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,122,930 UART: [rt]cmd =0x494e464f, len=4
6,126,391 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,618 UART: [state] LifecycleState = Unprovisioned
86,273 UART: [state] DebugLocked = No
86,869 UART: [state] WD Timer not started. Device not locked for debugging
88,166 UART: [kat] SHA2-256
893,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,941 UART: [kat] ++
898,093 UART: [kat] sha1
902,383 UART: [kat] SHA2-256
904,323 UART: [kat] SHA2-384
906,954 UART: [kat] SHA2-512-ACC
908,855 UART: [kat] ECC-384
917,754 UART: [kat] HMAC-384Kdf
922,306 UART: [kat] LMS
1,170,634 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,171,965 UART: [fht] FHT @ 0x50003400
1,174,712 UART: [idev] ++
1,174,880 UART: [idev] CDI.KEYID = 6
1,175,240 UART: [idev] SUBJECT.KEYID = 7
1,175,664 UART: [idev] UDS.KEYID = 0
1,176,009 ready_for_fw is high
1,176,009 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,424 UART: [idev] Erasing UDS.KEYID = 0
1,200,271 UART: [idev] Sha1 KeyId Algorithm
1,208,609 UART: [idev] --
1,209,637 UART: [ldev] ++
1,209,805 UART: [ldev] CDI.KEYID = 6
1,210,168 UART: [ldev] SUBJECT.KEYID = 5
1,210,594 UART: [ldev] AUTHORITY.KEYID = 7
1,211,057 UART: [ldev] FE.KEYID = 1
1,216,247 UART: [ldev] Erasing FE.KEYID = 1
1,243,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,428 UART: [fwproc] Wait for Commands...
1,283,020 UART: [fwproc] Recv command 0x46574c44
1,283,748 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,202 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,577 >>> mbox cmd response: success
2,312,577 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,775 UART: [afmc] ++
2,313,943 UART: [afmc] CDI.KEYID = 6
2,314,305 UART: [afmc] SUBJECT.KEYID = 7
2,314,730 UART: [afmc] AUTHORITY.KEYID = 5
2,350,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,308 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,036 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,921 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,330 UART: [afmc] --
2,393,430 UART: [cold-reset] --
2,394,294 UART: [state] Locking Datavault
2,395,479 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,083 UART: [state] Locking ICCM
2,396,737 UART: [exit] Launching FMC @ 0x40000130
2,402,066 UART:
2,402,082 UART: Running Caliptra FMC ...
2,402,490 UART:
2,402,544 UART: [state] CFI Enabled
2,413,319 UART: [fht] FMC Alias Private Key: 7
2,521,612 UART: [art] Extend RT PCRs Done
2,522,040 UART: [art] Lock RT PCRs Done
2,523,484 UART: [art] Populate DV Done
2,531,859 UART: [fht] FMC Alias Private Key: 7
2,532,839 UART: [art] Derive CDI
2,533,119 UART: [art] Store in in slot 0x4
2,619,216 UART: [art] Derive Key Pair
2,619,576 UART: [art] Store priv key in slot 0x5
2,632,646 UART: [art] Derive Key Pair - Done
2,647,298 UART: [art] Signing Cert with AUTHO
2,647,778 UART: RITY.KEYID = 7
2,662,650 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,415 UART: [art] PUB.X = AC8A380819C1CA957C67A11D5A5D014007E8B38E5A72F186B8E63605CD0DA1F119ACBD3004E52F77C18264A050BA4FA7
2,670,175 UART: [art] PUB.Y = B994D98D981D644EE1A3B5F9244A2DF17182932B207B4E058973C96AB896FEF932EA335A434BDF56494E555B4C8E1F5C
2,677,126 UART: [art] SIG.R = 2B641B2E697B6D72B231F3ED377AF344924184811DE124378B27A5675977A33CAFE664666B4CE66203578AF6BC40F55A
2,683,889 UART: [art] SIG.S = 3717BA68704768C0E9BE10FC9F36BA055C205B5DCCE6466EDE114F6BEE69B4AD481B639ECDD0301C2334B3B3D4EF3D05
2,706,830 UART: mbox::rt_entry...
2,707,202 UART: ____ _ _ _ ____ _____
2,707,986 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,786 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,554 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,322 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,090 UART: |_|
2,711,402 UART:
2,818,084 UART: [rt] Runtime listening for mailbox commands...
2,823,052 >>> mbox cmd response data (3272 bytes)
2,823,053 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,139 >>> mbox cmd response data (0 bytes)
2,846,140 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,846,257 UART:
2,846,273 UART: Running Caliptra ROM ...
2,846,681 UART:
2,846,736 UART: [state] CFI Enabled
2,849,374 UART: [state] LifecycleState = Unprovisioned
2,850,029 UART: [state] DebugLocked = No
2,850,559 UART: [state] WD Timer not started. Device not locked for debugging
2,851,681 UART: [kat] SHA2-256
3,657,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,661,456 UART: [kat] ++
3,661,608 UART: [kat] sha1
3,665,924 UART: [kat] SHA2-256
3,667,864 UART: [kat] SHA2-384
3,670,679 UART: [kat] SHA2-512-ACC
3,672,579 UART: [kat] ECC-384
3,681,978 UART: [kat] HMAC-384Kdf
3,686,752 UART: [kat] LMS
3,935,080 UART: [kat] --
3,935,998 UART: [update-reset] ++
5,249,951 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,042 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,401,040 >>> mbox cmd response: success
5,401,251 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,265 UART: [update-reset Success] --
5,410,316 UART: [state] Locking Datavault
5,411,154 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,758 UART: [state] Locking ICCM
5,412,268 UART: [exit] Launching FMC @ 0x40000130
5,417,597 UART:
5,417,613 UART: Running Caliptra FMC ...
5,418,021 UART:
5,418,075 UART: [state] CFI Enabled
5,506,934 UART: [art] Extend RT PCRs Done
5,507,362 UART: [art] Lock RT PCRs Done
5,508,713 UART: [art] Populate DV Done
5,517,078 UART: [fht] FMC Alias Private Key: 7
5,518,112 UART: [art] Derive CDI
5,518,392 UART: [art] Store in in slot 0x4
5,603,899 UART: [art] Derive Key Pair
5,604,259 UART: [art] Store priv key in slot 0x5
5,616,795 UART: [art] Derive Key Pair - Done
5,631,603 UART: [art] Signing Cert with AUTHO
5,632,083 UART: RITY.KEYID = 7
5,647,383 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,148 UART: [art] PUB.X = CF7DACDFB692686AE3337A4A41ED36C5429AE2C2DBA7125B5510BF2818B291D264A64941716ED28DB2EBA62FA3F1D3C6
5,654,934 UART: [art] PUB.Y = 4098CAD32949388407F7C3395A1B75301D188848D44A79EC331A8D0DEC29E1E8113A61212649A79295587A4BA852BF46
5,661,868 UART: [art] SIG.R = 89E39501E223830D09831667F9283DC7307FDF71EB520949DEFAF1B7F33D21B359FDD7837099A7A9ADEF0878F8789D2A
5,668,625 UART: [art] SIG.S = D20DDEB1A41E3370958C5D5064ED9EAE0C9FF1E682C5FCB4A7BF04AEFBBD2EEADAC3D5C4B4C6995F7C539535E2C85ABF
5,692,187 UART: Caliptra RT
5,692,440 UART: [state] CFI Enabled
5,754,806 UART: Disabled attest: DPE valid fail
5,755,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,756,706 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,786,736 UART: [rt]cmd =0x494e464f, len=4
5,790,069 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,453 ready_for_fw is high
1,059,453 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,164,214 >>> mbox cmd response: success
2,164,214 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,225,654 UART:
2,225,670 UART: Running Caliptra FMC ...
2,226,078 UART:
2,226,132 UART: [state] CFI Enabled
2,236,567 UART: [fht] FMC Alias Private Key: 7
2,344,620 UART: [art] Extend RT PCRs Done
2,345,048 UART: [art] Lock RT PCRs Done
2,346,632 UART: [art] Populate DV Done
2,354,735 UART: [fht] FMC Alias Private Key: 7
2,355,885 UART: [art] Derive CDI
2,356,165 UART: [art] Store in in slot 0x4
2,441,820 UART: [art] Derive Key Pair
2,442,180 UART: [art] Store priv key in slot 0x5
2,455,508 UART: [art] Derive Key Pair - Done
2,470,491 UART: [art] Signing Cert with AUTHO
2,470,971 UART: RITY.KEYID = 7
2,486,511 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,276 UART: [art] PUB.X = 9943756484AE5371540A068AB684BA92ACF99AF594702605E35DE869B89A2D6E6286B04FD6E520FD58C2985FA54075AC
2,494,035 UART: [art] PUB.Y = 04EB23F97B3A914F0FA90112964A9491865F29031C4A00BC728D4E957E04DE6F96E3199F3FCBA0C3960C815A4F629254
2,500,943 UART: [art] SIG.R = 30DE427004DAD2F6689D1CED3C02E8AB552C555854AEDA851804722ACCC3721D364C7DE2315871D8CEF1A37AC2BFD2C3
2,507,718 UART: [art] SIG.S = 8E9C2BF683FC7FC98CFFF743F5C792B6DDCC7106B620736832F4A0F97D9D775D69851831C3E0300C515F86710648467A
2,531,134 UART: mbox::rt_entry...
2,531,506 UART: ____ _ _ _ ____ _____
2,532,290 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,090 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,858 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,626 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,394 UART: |_|
2,535,706 UART:
2,642,684 UART: [rt] Runtime listening for mailbox commands...
2,647,652 >>> mbox cmd response data (3272 bytes)
2,647,653 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,670,739 >>> mbox cmd response data (0 bytes)
2,670,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,108,827 >>> mbox cmd response: success
5,122,011 UART:
5,122,027 UART: Running Caliptra FMC ...
5,122,435 UART:
5,122,489 UART: [state] CFI Enabled
5,211,522 UART: [art] Extend RT PCRs Done
5,211,950 UART: [art] Lock RT PCRs Done
5,213,091 UART: [art] Populate DV Done
5,221,384 UART: [fht] FMC Alias Private Key: 7
5,222,358 UART: [art] Derive CDI
5,222,638 UART: [art] Store in in slot 0x4
5,308,351 UART: [art] Derive Key Pair
5,308,711 UART: [art] Store priv key in slot 0x5
5,321,523 UART: [art] Derive Key Pair - Done
5,336,083 UART: [art] Signing Cert with AUTHO
5,336,563 UART: RITY.KEYID = 7
5,351,559 UART: [art] Erasing AUTHORITY.KEYID = 7
5,352,324 UART: [art] PUB.X = AC4BCF0BC9CFCCA744E10CCB8F0FF06422AC2153F7011D87A70A2C7E1FE65DACD2112C4C718B0F9573069CAD0FC9B021
5,359,094 UART: [art] PUB.Y = 5754A436217B28D363938F649CDB75DCB59C7D76BBAC547BE41EBD80D357B6B4B0353A57706426783340E812C31FD52D
5,366,044 UART: [art] SIG.R = 1086CC6B68328192CF2BB5014010C107CF7AC302BA047B7C53F330FFB3FDD5A47DFB9FE81DD6E48A4DCB8F736BA465FF
5,372,822 UART: [art] SIG.S = 3AD5BDE3E581D19351938D844C0F29F43349D5AE055B8EF6DD7557EDC6968EB400B553C0FED05CED8F297E6AB6579EEF
5,396,611 UART: Caliptra RT
5,396,864 UART: [state] CFI Enabled
5,458,407 UART: Disabled attest: DPE valid fail
5,458,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,460,435 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,490,953 UART: [rt]cmd =0x494e464f, len=4
5,494,110 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
893,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,302 UART: [kat] ++
897,454 UART: [kat] sha1
901,668 UART: [kat] SHA2-256
903,608 UART: [kat] SHA2-384
906,439 UART: [kat] SHA2-512-ACC
908,340 UART: [kat] ECC-384
917,859 UART: [kat] HMAC-384Kdf
922,647 UART: [kat] LMS
1,170,975 UART: [kat] --
1,172,028 UART: [cold-reset] ++
1,172,482 UART: [fht] FHT @ 0x50003400
1,175,059 UART: [idev] ++
1,175,227 UART: [idev] CDI.KEYID = 6
1,175,587 UART: [idev] SUBJECT.KEYID = 7
1,176,011 UART: [idev] UDS.KEYID = 0
1,176,356 ready_for_fw is high
1,176,356 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,121 UART: [idev] Erasing UDS.KEYID = 0
1,201,436 UART: [idev] Sha1 KeyId Algorithm
1,210,082 UART: [idev] --
1,210,990 UART: [ldev] ++
1,211,158 UART: [ldev] CDI.KEYID = 6
1,211,521 UART: [ldev] SUBJECT.KEYID = 5
1,211,947 UART: [ldev] AUTHORITY.KEYID = 7
1,212,410 UART: [ldev] FE.KEYID = 1
1,217,588 UART: [ldev] Erasing FE.KEYID = 1
1,244,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,814 UART: [ldev] --
1,283,257 UART: [fwproc] Wait for Commands...
1,284,053 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,095 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,576 >>> mbox cmd response: success
2,314,576 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,315,664 UART: [afmc] ++
2,315,832 UART: [afmc] CDI.KEYID = 6
2,316,194 UART: [afmc] SUBJECT.KEYID = 7
2,316,619 UART: [afmc] AUTHORITY.KEYID = 5
2,351,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,555 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,887 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,653 UART: [afmc] --
2,394,669 UART: [cold-reset] --
2,395,687 UART: [state] Locking Datavault
2,396,552 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,156 UART: [state] Locking ICCM
2,397,752 UART: [exit] Launching FMC @ 0x40000130
2,403,081 UART:
2,403,097 UART: Running Caliptra FMC ...
2,403,505 UART:
2,403,648 UART: [state] CFI Enabled
2,414,585 UART: [fht] FMC Alias Private Key: 7
2,522,902 UART: [art] Extend RT PCRs Done
2,523,330 UART: [art] Lock RT PCRs Done
2,524,962 UART: [art] Populate DV Done
2,533,049 UART: [fht] FMC Alias Private Key: 7
2,534,139 UART: [art] Derive CDI
2,534,419 UART: [art] Store in in slot 0x4
2,619,948 UART: [art] Derive Key Pair
2,620,308 UART: [art] Store priv key in slot 0x5
2,633,096 UART: [art] Derive Key Pair - Done
2,647,728 UART: [art] Signing Cert with AUTHO
2,648,208 UART: RITY.KEYID = 7
2,663,312 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,077 UART: [art] PUB.X = CEB2385DF0BBC85DEBF7B745944BCA5227E6E0F7C107DF74E7891C3EDD33375BEA140BF8DB78D915104FEE462C932677
2,670,857 UART: [art] PUB.Y = 83D1DD114367E00C49FA108D1DC64B2AEB108AD8659A9883B3A85044F9631B7536D3ACFDFA82FAE965CAAB5637749C83
2,677,814 UART: [art] SIG.R = 91E10D08F3A02F67C01BBEF082B707591EFE7476E03B462AD8C6F0915BEC456D083AED792D5A88013E369B7B55DE45C9
2,684,577 UART: [art] SIG.S = 659479AD1A784DF8D928FD4E0E1EB3BB4D36B71CAC21378DF92089AAD79D8CBE8B615917BC19D8432FE8EB7CACFDECA0
2,708,275 UART: mbox::rt_entry...
2,708,647 UART: ____ _ _ _ ____ _____
2,709,431 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,231 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,999 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,767 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,535 UART: |_|
2,712,847 UART:
2,820,317 UART: [rt] Runtime listening for mailbox commands...
2,825,285 >>> mbox cmd response data (3272 bytes)
2,825,286 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,372 >>> mbox cmd response data (0 bytes)
2,848,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,848,490 UART:
2,848,506 UART: Running Caliptra ROM ...
2,848,914 UART:
2,849,056 UART: [state] CFI Enabled
2,851,578 UART: [state] LifecycleState = Unprovisioned
2,852,233 UART: [state] DebugLocked = No
2,852,831 UART: [state] WD Timer not started. Device not locked for debugging
2,854,009 UART: [kat] SHA2-256
3,659,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,663,784 UART: [kat] ++
3,663,936 UART: [kat] sha1
3,668,178 UART: [kat] SHA2-256
3,670,118 UART: [kat] SHA2-384
3,672,837 UART: [kat] SHA2-512-ACC
3,674,737 UART: [kat] ECC-384
3,684,292 UART: [kat] HMAC-384Kdf
3,689,116 UART: [kat] LMS
3,937,444 UART: [kat] --
3,938,226 UART: [update-reset] ++
5,251,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,252,042 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,402,040 >>> mbox cmd response: success
5,402,303 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,317 UART: [update-reset Success] --
5,411,470 UART: [state] Locking Datavault
5,412,382 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,986 UART: [state] Locking ICCM
5,413,488 UART: [exit] Launching FMC @ 0x40000130
5,418,817 UART:
5,418,833 UART: Running Caliptra FMC ...
5,419,241 UART:
5,419,384 UART: [state] CFI Enabled
5,508,415 UART: [art] Extend RT PCRs Done
5,508,843 UART: [art] Lock RT PCRs Done
5,510,218 UART: [art] Populate DV Done
5,518,171 UART: [fht] FMC Alias Private Key: 7
5,519,157 UART: [art] Derive CDI
5,519,437 UART: [art] Store in in slot 0x4
5,605,028 UART: [art] Derive Key Pair
5,605,388 UART: [art] Store priv key in slot 0x5
5,618,824 UART: [art] Derive Key Pair - Done
5,634,014 UART: [art] Signing Cert with AUTHO
5,634,494 UART: RITY.KEYID = 7
5,649,640 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,405 UART: [art] PUB.X = ACF01D91DFA4D2649AC57F47BAD115A5FC208F09005DEF8E79BC1A84057DC2235F1DDB179A9A40208F07D3BD9DB0A6E8
5,657,164 UART: [art] PUB.Y = 143EA43F52A1939228F57CE090720F9E1378C7CFE71254FC2025EBC25FB026898CA2E905E05C4826BE6E3391DBDFC32F
5,664,114 UART: [art] SIG.R = D385106814CCB10FF41E9EE3A8F08646F538B5FABFDB1FC2AE712103D9C346F278A485E8F0663802953E56B7BE797757
5,670,879 UART: [art] SIG.S = 084CFD2685C375529995DF801E96E3038A2FE189B2AAD2628ABC484CAE10B15212932CAC45B252A5B239D2736E04BD5B
5,694,655 UART: Caliptra RT
5,695,000 UART: [state] CFI Enabled
5,758,567 UART: Disabled attest: DPE valid fail
5,759,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,760,443 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,790,865 UART: [rt]cmd =0x494e464f, len=4
5,794,336 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,062 ready_for_fw is high
1,061,062 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,667 >>> mbox cmd response: success
2,166,667 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,228,043 UART:
2,228,059 UART: Running Caliptra FMC ...
2,228,467 UART:
2,228,610 UART: [state] CFI Enabled
2,239,049 UART: [fht] FMC Alias Private Key: 7
2,347,002 UART: [art] Extend RT PCRs Done
2,347,430 UART: [art] Lock RT PCRs Done
2,348,858 UART: [art] Populate DV Done
2,356,987 UART: [fht] FMC Alias Private Key: 7
2,358,093 UART: [art] Derive CDI
2,358,373 UART: [art] Store in in slot 0x4
2,444,018 UART: [art] Derive Key Pair
2,444,378 UART: [art] Store priv key in slot 0x5
2,457,762 UART: [art] Derive Key Pair - Done
2,472,324 UART: [art] Signing Cert with AUTHO
2,472,804 UART: RITY.KEYID = 7
2,488,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,903 UART: [art] PUB.X = F9E8D080B85B5C932D2335E6B77045C129AF53A27EB83BFB69752ECED893872B5240FF8A0A6043193699C0B689D26E99
2,495,670 UART: [art] PUB.Y = ED46A6F5EA7A58AAE76DD1D09933ED1E4C3C17DD441249A728608A090C1CBACCB5274BE8906918896BFA918464550F2F
2,502,621 UART: [art] SIG.R = 16CBBFD94D3F8D4E18286C6DB5F72AE030359318A2AD6A899FBAF5C4C87B7D7B5FF4A31480236466ED647B8DE210E826
2,509,403 UART: [art] SIG.S = E40107364B168E7F58BC46711B24B017B3FBC333695781826D7642B360F8B1081D4617D2481733F3CC880D70DFE2C6BD
2,532,766 UART: mbox::rt_entry...
2,533,138 UART: ____ _ _ _ ____ _____
2,533,922 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,722 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,490 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,258 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,026 UART: |_|
2,537,338 UART:
2,644,862 UART: [rt] Runtime listening for mailbox commands...
2,649,830 >>> mbox cmd response data (3272 bytes)
2,649,831 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,672,917 >>> mbox cmd response data (0 bytes)
2,672,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,110,964 >>> mbox cmd response: success
5,124,504 UART:
5,124,520 UART: Running Caliptra FMC ...
5,124,928 UART:
5,125,071 UART: [state] CFI Enabled
5,214,130 UART: [art] Extend RT PCRs Done
5,214,558 UART: [art] Lock RT PCRs Done
5,215,817 UART: [art] Populate DV Done
5,224,388 UART: [fht] FMC Alias Private Key: 7
5,225,450 UART: [art] Derive CDI
5,225,730 UART: [art] Store in in slot 0x4
5,311,673 UART: [art] Derive Key Pair
5,312,033 UART: [art] Store priv key in slot 0x5
5,325,715 UART: [art] Derive Key Pair - Done
5,340,144 UART: [art] Signing Cert with AUTHO
5,340,624 UART: RITY.KEYID = 7
5,355,846 UART: [art] Erasing AUTHORITY.KEYID = 7
5,356,611 UART: [art] PUB.X = 70C753339A25AC12B6D88F37FFBC2AD31734AF5F8D54764F69DC2CFEC914B47D55498E84B6791D44E44B960FBFB6B2AA
5,363,392 UART: [art] PUB.Y = E64A1DFE42105FCE8B6D1FD5E84B15EB817E874076689B316372D2CFB498307ABE9EBECCC67BD1CA059DF8B2861E85AC
5,370,359 UART: [art] SIG.R = 8C906E1423B574E6844A78F238E14A52E7C81D8DFCBDE9A787522012C417971CAFD11C9491CD4BFE88BB14746DE6D82D
5,377,137 UART: [art] SIG.S = 3278684F7DF11971AB946AEBB5D5269D1218CED775AA38AFDEADB8D36BA7F5CA3994C5EA605C86B68540650B2E04EE4D
5,400,558 UART: Caliptra RT
5,400,903 UART: [state] CFI Enabled
5,465,850 UART: Disabled attest: DPE valid fail
5,466,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,467,604 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,498,224 UART: [rt]cmd =0x494e464f, len=4
5,501,513 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,149 UART: [kat] ++
895,301 UART: [kat] sha1
899,785 UART: [kat] SHA2-256
901,725 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,169,793 UART: [cold-reset] ++
1,170,203 UART: [fht] FHT @ 0x50003400
1,172,663 UART: [idev] ++
1,172,831 UART: [idev] CDI.KEYID = 6
1,173,192 UART: [idev] SUBJECT.KEYID = 7
1,173,617 UART: [idev] UDS.KEYID = 0
1,173,963 ready_for_fw is high
1,173,963 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,451 UART: [idev] Erasing UDS.KEYID = 0
1,198,741 UART: [idev] Sha1 KeyId Algorithm
1,207,743 UART: [idev] --
1,208,932 UART: [ldev] ++
1,209,100 UART: [ldev] CDI.KEYID = 6
1,209,464 UART: [ldev] SUBJECT.KEYID = 5
1,209,891 UART: [ldev] AUTHORITY.KEYID = 7
1,210,354 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,242,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,292 UART: [ldev] --
1,281,574 UART: [fwproc] Wait for Commands...
1,282,345 UART: [fwproc] Recv command 0x46574c44
1,283,078 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,325 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,651 >>> mbox cmd response: success
2,311,651 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,910 UART: [afmc] ++
2,313,078 UART: [afmc] CDI.KEYID = 6
2,313,441 UART: [afmc] SUBJECT.KEYID = 7
2,313,867 UART: [afmc] AUTHORITY.KEYID = 5
2,349,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,254 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,137 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,856 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,625 UART: [afmc] --
2,392,587 UART: [cold-reset] --
2,393,333 UART: [state] Locking Datavault
2,394,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,304 UART: [state] Locking ICCM
2,395,786 UART: [exit] Launching FMC @ 0x40000130
2,401,115 UART:
2,401,131 UART: Running Caliptra FMC ...
2,401,539 UART:
2,401,593 UART: [state] CFI Enabled
2,412,210 UART: [fht] FMC Alias Private Key: 7
2,520,085 UART: [art] Extend RT PCRs Done
2,520,513 UART: [art] Lock RT PCRs Done
2,521,811 UART: [art] Populate DV Done
2,530,096 UART: [fht] FMC Alias Private Key: 7
2,531,158 UART: [art] Derive CDI
2,531,438 UART: [art] Store in in slot 0x4
2,617,351 UART: [art] Derive Key Pair
2,617,711 UART: [art] Store priv key in slot 0x5
2,631,121 UART: [art] Derive Key Pair - Done
2,645,897 UART: [art] Signing Cert with AUTHO
2,646,377 UART: RITY.KEYID = 7
2,661,615 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,380 UART: [art] PUB.X = 57C8CD7185F126E7629044EB9CD3E1E38574BE87E2C7D2898AB44DA7B7BC42114ABC8287977E84088AB5395CECC6CE39
2,669,155 UART: [art] PUB.Y = 04D4BB79538E4ADF92BD68C428B523FAB10D56D8E0D2F07ED01A3A2AD38FFF13A618CA6E0B8B309D3CFE4111449AE9DA
2,676,118 UART: [art] SIG.R = 89195368315E4347D4CFE34AEABF9E41AD727282B810C14CB3359699DC48D0298A0C045CB6FF6CD3AC2D5D50DC8A244E
2,682,892 UART: [art] SIG.S = CAC05A14B5075C0013613D781FBDADAB2BC3AA7D5589E57787EB298814EF83624C67E6245647F815AE730F90A96D97DB
2,706,203 UART: mbox::rt_entry...
2,706,575 UART: ____ _ _ _ ____ _____
2,707,359 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,159 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,927 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,695 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,463 UART: |_|
2,710,775 UART:
2,817,218 UART: [rt] Runtime listening for mailbox commands...
2,822,186 >>> mbox cmd response data (3272 bytes)
2,822,187 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,273 >>> mbox cmd response data (0 bytes)
2,845,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,391 UART:
2,845,407 UART: Running Caliptra ROM ...
2,845,815 UART:
2,845,870 UART: [state] CFI Enabled
2,848,282 UART: [state] LifecycleState = Unprovisioned
2,848,937 UART: [state] DebugLocked = No
2,849,555 UART: [state] WD Timer not started. Device not locked for debugging
2,850,731 UART: [kat] SHA2-256
3,654,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,410 UART: [kat] ++
3,658,562 UART: [kat] sha1
3,662,916 UART: [kat] SHA2-256
3,664,856 UART: [kat] SHA2-384
3,667,673 UART: [kat] SHA2-512-ACC
3,669,573 UART: [kat] ECC-384
3,679,654 UART: [kat] HMAC-384Kdf
3,684,184 UART: [kat] LMS
3,932,496 UART: [kat] --
3,933,432 UART: [update-reset] ++
5,247,492 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,697 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,398,695 >>> mbox cmd response: success
5,398,852 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,866 UART: [update-reset Success] --
5,407,915 UART: [state] Locking Datavault
5,408,667 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,271 UART: [state] Locking ICCM
5,409,831 UART: [exit] Launching FMC @ 0x40000130
5,415,160 UART:
5,415,176 UART: Running Caliptra FMC ...
5,415,584 UART:
5,415,638 UART: [state] CFI Enabled
5,504,805 UART: [art] Extend RT PCRs Done
5,505,233 UART: [art] Lock RT PCRs Done
5,506,494 UART: [art] Populate DV Done
5,514,615 UART: [fht] FMC Alias Private Key: 7
5,515,687 UART: [art] Derive CDI
5,515,967 UART: [art] Store in in slot 0x4
5,601,584 UART: [art] Derive Key Pair
5,601,944 UART: [art] Store priv key in slot 0x5
5,614,498 UART: [art] Derive Key Pair - Done
5,628,986 UART: [art] Signing Cert with AUTHO
5,629,466 UART: RITY.KEYID = 7
5,644,164 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,929 UART: [art] PUB.X = B474949BD15C17AD8CF8E779F0AB58DEF88C2BF9BE10CD2D913D66C99F15C01B41121EC7AAFA5B9EA815545BCEA98295
5,651,719 UART: [art] PUB.Y = 2E54894AA117443CF058724F634FA47E0A86A96BD0074D97172CFE8D0C197DF938AE885186E907E8BD4FDC9D2DA59CCA
5,658,667 UART: [art] SIG.R = D7EAF72AC2EB583ADDAE3DEDC0823BFEE42CA62C94D634690FE8A04B2055158A3DA962ED54967EC3FA775ABEA176180D
5,665,455 UART: [art] SIG.S = 55FA5952EF35D0FE1FDB34194093E149F5F5BDB8DFBF0680A3B89C5564BD6CEE270DF9A5A75D8A47D8D0EC589ACBF0FB
5,688,930 UART: Caliptra RT
5,689,183 UART: [state] CFI Enabled
5,751,786 UART: Disabled attest: DPE valid fail
5,752,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,753,446 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,783,884 UART: [rt]cmd =0x494e464f, len=4
5,787,189 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,038 ready_for_fw is high
1,056,038 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,159,907 >>> mbox cmd response: success
2,159,907 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,222,283 UART:
2,222,299 UART: Running Caliptra FMC ...
2,222,707 UART:
2,222,761 UART: [state] CFI Enabled
2,232,768 UART: [fht] FMC Alias Private Key: 7
2,339,861 UART: [art] Extend RT PCRs Done
2,340,289 UART: [art] Lock RT PCRs Done
2,341,953 UART: [art] Populate DV Done
2,350,222 UART: [fht] FMC Alias Private Key: 7
2,351,234 UART: [art] Derive CDI
2,351,514 UART: [art] Store in in slot 0x4
2,437,461 UART: [art] Derive Key Pair
2,437,821 UART: [art] Store priv key in slot 0x5
2,450,667 UART: [art] Derive Key Pair - Done
2,465,462 UART: [art] Signing Cert with AUTHO
2,465,942 UART: RITY.KEYID = 7
2,481,096 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,861 UART: [art] PUB.X = 23668FF521BD49D037B7E8BA5EB2A185C06591D79282F3E792AF6B7658518770FB3B3CC1383578748E30F106D00D2EB1
2,488,623 UART: [art] PUB.Y = F4E8B6A471EE35AC45B00D31774AE50849E6D91A7A2C29036D2D794551AFE2F8A1B4B7FC40C590410B83F94050611B34
2,495,563 UART: [art] SIG.R = 2449E3BF5CCAAC81E614055C201989DFE62BC62F102F660ACCD92E72D1A77759FA8CE71C667BED71D635FD2589372F23
2,502,337 UART: [art] SIG.S = 68B65432788B91BDBE5CB1F7D428191DBC7982105ECC9E1BD73364783EECF6E1DE37339C495247C15E76C46F4CB773C4
2,525,442 UART: mbox::rt_entry...
2,525,814 UART: ____ _ _ _ ____ _____
2,526,598 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,527,398 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,166 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,528,934 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,529,702 UART: |_|
2,530,014 UART:
2,635,538 UART: [rt] Runtime listening for mailbox commands...
2,640,506 >>> mbox cmd response data (3272 bytes)
2,640,507 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,663,593 >>> mbox cmd response data (0 bytes)
2,663,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,096,990 >>> mbox cmd response: success
5,110,634 UART:
5,110,650 UART: Running Caliptra FMC ...
5,111,058 UART:
5,111,112 UART: [state] CFI Enabled
5,200,139 UART: [art] Extend RT PCRs Done
5,200,567 UART: [art] Lock RT PCRs Done
5,201,882 UART: [art] Populate DV Done
5,209,889 UART: [fht] FMC Alias Private Key: 7
5,210,889 UART: [art] Derive CDI
5,211,169 UART: [art] Store in in slot 0x4
5,297,180 UART: [art] Derive Key Pair
5,297,540 UART: [art] Store priv key in slot 0x5
5,310,770 UART: [art] Derive Key Pair - Done
5,325,298 UART: [art] Signing Cert with AUTHO
5,325,778 UART: RITY.KEYID = 7
5,341,000 UART: [art] Erasing AUTHORITY.KEYID = 7
5,341,765 UART: [art] PUB.X = 755B491D222D7FC1785A88E229086DF8CAAEB5B11FBE6B07AC00E3165A4FC3D710D4422F55CF549644A8259733CF24FD
5,348,515 UART: [art] PUB.Y = 129DE65511D02AA38FFD47153E4CCCE258A9DC4535B4358D309E9931116A558C25DC23F5C3EC1F4543169D50F53A41DB
5,355,469 UART: [art] SIG.R = C3AE33878F19BD177B5D3E76ED40566E1EE026B4D1F93B10DD573E8B2351EDBD9D72AB5721840439F5030C1B78F31B54
5,362,236 UART: [art] SIG.S = 967DE0AE9283AEF4A01D555DBCE9819998EF0079ECBC012253C4763746887DAB1F54FB5AC7A126A254C9104C2635D170
5,386,652 UART: Caliptra RT
5,386,905 UART: [state] CFI Enabled
5,449,513 UART: Disabled attest: DPE valid fail
5,450,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,451,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,482,051 UART: [rt]cmd =0x494e464f, len=4
5,485,414 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,226 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
891,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,221 UART: [kat] SHA2-512-ACC
906,122 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,169,720 UART: [cold-reset] ++
1,170,270 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,174,252 ready_for_fw is high
1,174,252 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,872 UART: [idev] Erasing UDS.KEYID = 0
1,198,772 UART: [idev] Sha1 KeyId Algorithm
1,207,770 UART: [idev] --
1,208,635 UART: [ldev] ++
1,208,803 UART: [ldev] CDI.KEYID = 6
1,209,167 UART: [ldev] SUBJECT.KEYID = 5
1,209,594 UART: [ldev] AUTHORITY.KEYID = 7
1,210,057 UART: [ldev] FE.KEYID = 1
1,215,231 UART: [ldev] Erasing FE.KEYID = 1
1,241,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,787 UART: [ldev] --
1,280,275 UART: [fwproc] Wait for Commands...
1,281,008 UART: [fwproc] Recv command 0x46574c44
1,281,741 UART: [fwproc] Recv'd Img size: 78704 bytes
2,171,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,150 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,578 >>> mbox cmd response: success
2,311,578 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,709 UART: [afmc] ++
2,312,877 UART: [afmc] CDI.KEYID = 6
2,313,240 UART: [afmc] SUBJECT.KEYID = 7
2,313,666 UART: [afmc] AUTHORITY.KEYID = 5
2,349,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,408 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,137 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,020 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,739 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,342 UART: [afmc] --
2,392,306 UART: [cold-reset] --
2,393,246 UART: [state] Locking Datavault
2,394,407 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,011 UART: [state] Locking ICCM
2,395,487 UART: [exit] Launching FMC @ 0x40000130
2,400,816 UART:
2,400,832 UART: Running Caliptra FMC ...
2,401,240 UART:
2,401,383 UART: [state] CFI Enabled
2,412,302 UART: [fht] FMC Alias Private Key: 7
2,520,375 UART: [art] Extend RT PCRs Done
2,520,803 UART: [art] Lock RT PCRs Done
2,522,113 UART: [art] Populate DV Done
2,530,662 UART: [fht] FMC Alias Private Key: 7
2,531,628 UART: [art] Derive CDI
2,531,908 UART: [art] Store in in slot 0x4
2,617,603 UART: [art] Derive Key Pair
2,617,963 UART: [art] Store priv key in slot 0x5
2,630,797 UART: [art] Derive Key Pair - Done
2,645,589 UART: [art] Signing Cert with AUTHO
2,646,069 UART: RITY.KEYID = 7
2,661,411 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,176 UART: [art] PUB.X = 1D6C1E8FB1AF96A4D496A7C26AFD825244567004D5B2CB9A10BEF605EEC0003542ECABA70781C3A7771F135427B912CE
2,668,925 UART: [art] PUB.Y = D3546EE32CCE58AB3F9ED2E1E5FC08144DE2022D7D8266C02438450507E2856EA691247AEDE7C80A6A452C101D9DE99C
2,675,868 UART: [art] SIG.R = 5C73E0CAF2190D9A4B6D5EB25C860E93E7E071A02F2593887736D1F9DBEC8BABB46FA882012C5CF8092769411BFABB23
2,682,638 UART: [art] SIG.S = B954A9DA664A1B8EB1D8000FFA0968AB95B9B7AB066BB0E3C22F9D7BB2E18236FA585AA828CD902A2ABD258D2E980992
2,706,517 UART: mbox::rt_entry...
2,706,889 UART: ____ _ _ _ ____ _____
2,707,673 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,473 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,241 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,009 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,777 UART: |_|
2,711,089 UART:
2,817,563 UART: [rt] Runtime listening for mailbox commands...
2,822,531 >>> mbox cmd response data (3272 bytes)
2,822,532 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,618 >>> mbox cmd response data (0 bytes)
2,845,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,736 UART:
2,845,752 UART: Running Caliptra ROM ...
2,846,160 UART:
2,846,302 UART: [state] CFI Enabled
2,848,746 UART: [state] LifecycleState = Unprovisioned
2,849,401 UART: [state] DebugLocked = No
2,850,089 UART: [state] WD Timer not started. Device not locked for debugging
2,851,431 UART: [kat] SHA2-256
3,654,981 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,110 UART: [kat] ++
3,659,262 UART: [kat] sha1
3,663,340 UART: [kat] SHA2-256
3,665,280 UART: [kat] SHA2-384
3,668,071 UART: [kat] SHA2-512-ACC
3,669,971 UART: [kat] ECC-384
3,679,692 UART: [kat] HMAC-384Kdf
3,684,190 UART: [kat] LMS
3,932,502 UART: [kat] --
3,933,290 UART: [update-reset] ++
5,247,298 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,475 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,398,473 >>> mbox cmd response: success
5,398,680 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,694 UART: [update-reset Success] --
5,407,645 UART: [state] Locking Datavault
5,408,439 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,043 UART: [state] Locking ICCM
5,409,463 UART: [exit] Launching FMC @ 0x40000130
5,414,792 UART:
5,414,808 UART: Running Caliptra FMC ...
5,415,216 UART:
5,415,359 UART: [state] CFI Enabled
5,504,286 UART: [art] Extend RT PCRs Done
5,504,714 UART: [art] Lock RT PCRs Done
5,505,767 UART: [art] Populate DV Done
5,513,974 UART: [fht] FMC Alias Private Key: 7
5,515,148 UART: [art] Derive CDI
5,515,428 UART: [art] Store in in slot 0x4
5,601,083 UART: [art] Derive Key Pair
5,601,443 UART: [art] Store priv key in slot 0x5
5,614,965 UART: [art] Derive Key Pair - Done
5,629,816 UART: [art] Signing Cert with AUTHO
5,630,296 UART: RITY.KEYID = 7
5,645,976 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,741 UART: [art] PUB.X = 6E62676D0084B4CF74BEDB0A037A806A98F60EF271A8E5A1E5D8201EBDE09EEE74122D2E251B636E75FCB63754256343
5,653,486 UART: [art] PUB.Y = AF19B50C3B153D523B52EFAC71D23EB6ABF579A96502C12FB5A1F2EF2279170EE4CF30EB6B63F1B0AD00E0C23F1A45CB
5,660,427 UART: [art] SIG.R = 088DD3DC92E17D80AADAE4954958FE2CC3A15035D88F2E8D59CB3DEB881199EB914E80E16B443E973ED5CF8D4078D848
5,667,206 UART: [art] SIG.S = C04208BD2834DE91E92729382E43163A1449246035636ED942BBFC105119B942F6F0F98FB38BA3D8938857D5CC1F4EC5
5,691,196 UART: Caliptra RT
5,691,541 UART: [state] CFI Enabled
5,755,324 UART: Disabled attest: DPE valid fail
5,755,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,757,192 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,787,728 UART: [rt]cmd =0x494e464f, len=4
5,791,091 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,913 ready_for_fw is high
1,055,913 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,160,208 >>> mbox cmd response: success
2,160,208 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,250 UART:
2,223,266 UART: Running Caliptra FMC ...
2,223,674 UART:
2,223,817 UART: [state] CFI Enabled
2,234,548 UART: [fht] FMC Alias Private Key: 7
2,342,539 UART: [art] Extend RT PCRs Done
2,342,967 UART: [art] Lock RT PCRs Done
2,344,641 UART: [art] Populate DV Done
2,352,810 UART: [fht] FMC Alias Private Key: 7
2,353,890 UART: [art] Derive CDI
2,354,170 UART: [art] Store in in slot 0x4
2,439,801 UART: [art] Derive Key Pair
2,440,161 UART: [art] Store priv key in slot 0x5
2,453,277 UART: [art] Derive Key Pair - Done
2,467,927 UART: [art] Signing Cert with AUTHO
2,468,407 UART: RITY.KEYID = 7
2,483,885 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,650 UART: [art] PUB.X = E97B3EE17B6F28B8BBB53DE7E540557A3E5CAE054267FC3FC4F23FB4EE77F700F068DE1172C000410B098F26C798EEFD
2,491,383 UART: [art] PUB.Y = 13932023232F60EE57F8413F5D505AA1CDCCA0B58043DA994487E6C6F5F60045CB4278AB6FEC55C9679438BFB8F40462
2,498,310 UART: [art] SIG.R = A1BE0F6A115A00491DCFB13F322E4276B2A34B006BCD7CA087BC0A540953B42F84337055923832AB4A42782255B064F8
2,505,025 UART: [art] SIG.S = BD01890CF043ABAF154EA0026F39FB2117E4E4BE39170CB699F71F8EFB8792A37B6DE268D6031577C421EF890D4A2B32
2,528,966 UART: mbox::rt_entry...
2,529,338 UART: ____ _ _ _ ____ _____
2,530,122 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,922 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,690 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,458 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,226 UART: |_|
2,533,538 UART:
2,639,659 UART: [rt] Runtime listening for mailbox commands...
2,644,627 >>> mbox cmd response data (3272 bytes)
2,644,628 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,667,714 >>> mbox cmd response data (0 bytes)
2,667,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,101,460 >>> mbox cmd response: success
5,114,646 UART:
5,114,662 UART: Running Caliptra FMC ...
5,115,070 UART:
5,115,213 UART: [state] CFI Enabled
5,204,296 UART: [art] Extend RT PCRs Done
5,204,724 UART: [art] Lock RT PCRs Done
5,206,157 UART: [art] Populate DV Done
5,214,492 UART: [fht] FMC Alias Private Key: 7
5,215,554 UART: [art] Derive CDI
5,215,834 UART: [art] Store in in slot 0x4
5,301,751 UART: [art] Derive Key Pair
5,302,111 UART: [art] Store priv key in slot 0x5
5,315,431 UART: [art] Derive Key Pair - Done
5,330,610 UART: [art] Signing Cert with AUTHO
5,331,090 UART: RITY.KEYID = 7
5,345,792 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,557 UART: [art] PUB.X = B75978630AF60FE7DB06D069CD1CE47F5A48AD217F62E3E5F212749955B81A9CD614811EF9BDB530631EB6305B8755E6
5,353,322 UART: [art] PUB.Y = 4E632EC6645680779653D6FEA693F6F0856AAB9CA764E108CBABCB92DC57ED589E319F18E49CC76FCEC259EE3A02F387
5,360,280 UART: [art] SIG.R = 0FB98327829AEE2354088357025595D9829FA0CFDFA2AF7310B3F550CDD659639530142FF73198413239A03FE76CE206
5,367,030 UART: [art] SIG.S = B0B96B28615DEFC9AECF0199710BD69B94F36F67A5035EA8E5C40B0B2AC9F0DA262F52253B6A247A88F684E3C923D74F
5,390,434 UART: Caliptra RT
5,390,779 UART: [state] CFI Enabled
5,454,616 UART: Disabled attest: DPE valid fail
5,455,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,456,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,486,970 UART: [rt]cmd =0x494e464f, len=4
5,490,425 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,215 UART:
192,573 UART: Running Caliptra ROM ...
193,770 UART:
193,928 UART: [state] CFI Enabled
266,847 UART: [state] LifecycleState = Unprovisioned
268,845 UART: [state] DebugLocked = No
270,806 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,889 UART: [kat] SHA2-256
445,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,100 UART: [kat] ++
456,595 UART: [kat] sha1
468,112 UART: [kat] SHA2-256
470,782 UART: [kat] SHA2-384
476,855 UART: [kat] SHA2-512-ACC
479,266 UART: [kat] ECC-384
2,767,632 UART: [kat] HMAC-384Kdf
2,779,440 UART: [kat] LMS
3,969,760 UART: [kat] --
3,976,263 UART: [cold-reset] ++
3,977,628 UART: [fht] Storing FHT @ 0x50003400
3,988,410 UART: [idev] ++
3,988,980 UART: [idev] CDI.KEYID = 6
3,990,012 UART: [idev] SUBJECT.KEYID = 7
3,991,192 UART: [idev] UDS.KEYID = 0
3,992,226 ready_for_fw is high
3,992,432 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,091,737 UART: [idev] Erasing UDS.KEYID = 0
7,328,669 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,836 UART: [idev] --
7,354,788 UART: [ldev] ++
7,355,414 UART: [ldev] CDI.KEYID = 6
7,356,544 UART: [ldev] SUBJECT.KEYID = 5
7,357,662 UART: [ldev] AUTHORITY.KEYID = 7
7,358,960 UART: [ldev] FE.KEYID = 1
7,403,534 UART: [ldev] Erasing FE.KEYID = 1
10,732,178 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,111 UART: [ldev] --
13,097,373 UART: [fwproc] Waiting for Commands...
13,099,416 UART: [fwproc] Received command 0x46574c44
13,101,602 UART: [fwproc] Received Image of size 78740 bytes
16,721,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,801,225 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,870,086 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,063,413 >>> mbox cmd response: success
17,063,920 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,067,421 UART: [afmc] ++
17,068,012 UART: [afmc] CDI.KEYID = 6
17,068,909 UART: [afmc] SUBJECT.KEYID = 7
17,070,187 UART: [afmc] AUTHORITY.KEYID = 5
20,435,865 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,735,951 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,738,201 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,752,600 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,767,420 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,781,892 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,802,413 UART: [afmc] --
22,806,393 UART: [cold-reset] --
22,810,916 UART: [state] Locking Datavault
22,813,959 UART: [state] Locking PCR0, PCR1 and PCR31
22,815,715 UART: [state] Locking ICCM
22,817,328 UART: [exit] Launching FMC @ 0x40000130
22,825,722 UART:
22,825,958 UART: Running Caliptra FMC ...
22,827,060 UART:
22,827,227 UART: [state] CFI Enabled
22,895,065 UART: [fht] FMC Alias Private Key: 7
25,232,481 UART: [art] Extend RT PCRs Done
25,233,707 UART: [art] Lock RT PCRs Done
25,235,177 UART: [art] Populate DV Done
25,240,645 UART: [fht] FMC Alias Private Key: 7
25,242,291 UART: [art] Derive CDI
25,243,103 UART: [art] Store in in slot 0x4
25,303,546 UART: [art] Derive Key Pair
25,304,588 UART: [art] Store priv key in slot 0x5
28,597,286 UART: [art] Derive Key Pair - Done
28,610,283 UART: [art] Signing Cert with AUTHO
28,611,581 UART: RITY.KEYID = 7
30,899,582 UART: [art] Erasing AUTHORITY.KEYID = 7
30,901,077 UART: [art] PUB.X = A23C76FD8FBF91A1B304C562AAA6E5573C4A216863C3CF6D301C6E7EF64DA458EF640ACF48E8CB1869FB9CA5D20A6AE5
30,908,450 UART: [art] PUB.Y = FB5C5308E8B2750F751EE7C49899196115DB471327ACE9744376149C271787C14CE21AC4A64F6D97AEDCE1F1C11E47B1
30,915,628 UART: [art] SIG.R = D52AD7782AB03C8B9E77253FE8F7F60B4D9485748F0FD54B7F0D5E9347EB43F960255624BEB042DFAF690469B13D1FE7
30,922,961 UART: [art] SIG.S = 1393987CAC883D9081B57D4509A6BE21ED07EC557695669ECAB0BD1482B6D793E67B1D1801E478E184B542A376CD713E
32,227,170 UART: mbox::rt_entry...
32,228,122 UART: ____ _ _ _ ____ _____
32,230,106 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,232,116 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,234,048 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,235,984 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,238,142 UART: |_|
32,238,962 UART:
32,351,544 UART: [rt] Runtime listening for mailbox commands...
32,357,414 >>> mbox cmd response data (3272 bytes)
32,373,341 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,406,749 >>> mbox cmd response data (0 bytes)
34,540,131 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,684,487 UART:
34,684,840 UART: Running Caliptra ROM ...
34,685,891 UART:
34,686,072 UART: [state] CFI Enabled
34,762,315 UART: [state] LifecycleState = Unprovisioned
34,764,250 UART: [state] DebugLocked = No
34,767,124 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,771,865 UART: [kat] SHA2-256
34,941,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,952,061 UART: [kat] ++
34,952,522 UART: [kat] sha1
34,963,412 UART: [kat] SHA2-256
34,966,093 UART: [kat] SHA2-384
34,971,876 UART: [kat] SHA2-512-ACC
34,974,279 UART: [kat] ECC-384
37,263,555 UART: [kat] HMAC-384Kdf
37,275,523 UART: [kat] LMS
38,465,891 UART: [kat] --
38,470,423 UART: [update-reset] ++
42,617,284 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,621,168 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
43,003,427 >>> mbox cmd response: success
43,008,135 UART: [update-reset] Copying MAN_2 To MAN_1
43,027,267 UART: [update-reset Success] --
43,030,388 UART: [state] Locking Datavault
43,033,542 UART: [state] Locking PCR0, PCR1 and PCR31
43,035,259 UART: [state] Locking ICCM
43,036,785 UART: [exit] Launching FMC @ 0x40000130
43,045,129 UART:
43,045,380 UART: Running Caliptra FMC ...
43,046,486 UART:
43,046,670 UART: [state] CFI Enabled
43,133,250 UART: [art] Extend RT PCRs Done
43,134,445 UART: [art] Lock RT PCRs Done
43,135,611 UART: [art] Populate DV Done
43,141,022 UART: [fht] FMC Alias Private Key: 7
43,142,616 UART: [art] Derive CDI
43,143,431 UART: [art] Store in in slot 0x4
43,202,286 UART: [art] Derive Key Pair
43,203,335 UART: [art] Store priv key in slot 0x5
46,495,776 UART: [art] Derive Key Pair - Done
46,508,675 UART: [art] Signing Cert with AUTHO
46,509,983 UART: RITY.KEYID = 7
48,798,310 UART: [art] Erasing AUTHORITY.KEYID = 7
48,799,817 UART: [art] PUB.X = EC54967893F2623FE0AF470284BBD881A9A343546AF2B0C8067DE8C8BD985CAAA31946C047233EC7F502BB10BFB13082
48,807,041 UART: [art] PUB.Y = 2D5827FC6C91A39428E74BCA148C5371996D45059CD01E0C86AA53EC4ED57ACD92DC83BC25E7D486914A270C9758B8EE
48,814,300 UART: [art] SIG.R = 631194A2E56490A8F3F9F0631D53C55D024F56A95B91B73846B8DE73E03562AED2652C43EF277F8C7F32EDA8FC6D6B95
48,821,697 UART: [art] SIG.S = C2234C720BBA7C88743640ABDA5CCCAE805AFF37CEC4821C7D35B4499BF66A35E0C4B638D66B1A7DD235BC54B5538228
50,127,037 UART: Caliptra RT
50,127,753 UART: [state] CFI Enabled
53,813,891 UART: Disable attest DPE used context limit breach
53,815,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,817,000 UART: [rt] RT listening for mailbox commands...
53,848,509 UART: [rt]cmd =0x494e464f, len=4
53,852,561 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,783,679 ready_for_fw is high
3,784,048 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,156,875 >>> mbox cmd response: success
17,157,643 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,847,664 UART:
22,848,037 UART: Running Caliptra FMC ...
22,849,188 UART:
22,849,352 UART: [state] CFI Enabled
22,914,242 UART: [fht] FMC Alias Private Key: 7
25,252,361 UART: [art] Extend RT PCRs Done
25,253,589 UART: [art] Lock RT PCRs Done
25,255,354 UART: [art] Populate DV Done
25,260,555 UART: [fht] FMC Alias Private Key: 7
25,262,209 UART: [art] Derive CDI
25,262,950 UART: [art] Store in in slot 0x4
25,323,348 UART: [art] Derive Key Pair
25,324,387 UART: [art] Store priv key in slot 0x5
28,617,298 UART: [art] Derive Key Pair - Done
28,630,452 UART: [art] Signing Cert with AUTHO
28,631,793 UART: RITY.KEYID = 7
30,919,151 UART: [art] Erasing AUTHORITY.KEYID = 7
30,920,665 UART: [art] PUB.X = 6ED5125D36F901609EF1244D7564A6D0ABE2F25E88D0B89E66D7826E56DA3D30B6F2AD1AB40B59727AD4B36FEE90377F
30,927,885 UART: [art] PUB.Y = 727CC45BE02770FBC1CBD11E9101F1868507869D6947ED11D2ABE28351A32C8A06AF70CD4062E572D201D0DA1CA2EAB7
30,935,155 UART: [art] SIG.R = BE8AF49F442142A03C96CFABECB41667391DFF65A01623DF6B2DC50AF1F9B5A87139499A0FA60C55707A5B40947E2789
30,942,515 UART: [art] SIG.S = 8E44E4BB4712F208D136D2B52BAED03D354487BC13D623755D83AE23552705F2AE3541170C58BCFF5D7621BF32193CAB
32,247,956 UART: mbox::rt_entry...
32,248,898 UART: ____ _ _ _ ____ _____
32,250,883 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,252,891 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,254,821 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,783 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,258,735 UART: |_|
32,259,573 UART:
32,373,074 UART: [rt] Runtime listening for mailbox commands...
32,378,889 >>> mbox cmd response data (3272 bytes)
32,394,892 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,428,309 >>> mbox cmd response data (0 bytes)
34,560,665 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,287,516 >>> mbox cmd response: success
43,323,039 UART:
43,323,344 UART: Running Caliptra FMC ...
43,324,471 UART:
43,324,639 UART: [state] CFI Enabled
43,427,759 UART: [art] Extend RT PCRs Done
43,428,985 UART: [art] Lock RT PCRs Done
43,430,181 UART: [art] Populate DV Done
43,435,763 UART: [fht] FMC Alias Private Key: 7
43,437,469 UART: [art] Derive CDI
43,438,285 UART: [art] Store in in slot 0x4
43,496,942 UART: [art] Derive Key Pair
43,497,944 UART: [art] Store priv key in slot 0x5
46,790,499 UART: [art] Derive Key Pair - Done
46,803,657 UART: [art] Signing Cert with AUTHO
46,804,959 UART: RITY.KEYID = 7
49,092,038 UART: [art] Erasing AUTHORITY.KEYID = 7
49,093,552 UART: [art] PUB.X = 6C13A1612C3EDBFF3A4445E554F6549B6C75192C8DF4398DF9D3FB61913A62B2E0B01191991DAC4E2E994A2F34FEAB24
49,100,828 UART: [art] PUB.Y = 972790D15B0A4FC7D852A8534ED027372BA542A1A2C192292CABD67EA615323CFF9F92CABB49F6F345FCA022142ECC3A
49,108,029 UART: [art] SIG.R = 0C39A13B62F4CC0E44947A9C93D6D2BF15903D6F6860F8D2960E1D7FCC23A91FC18DFD7C07D1D189C9039B6D9874581B
49,115,418 UART: [art] SIG.S = 18CA5C95EF122E40F317260987308CFCFA20EE475A62A7E44EF45C1DC0F425633788F74D55C3336E49D900A944F17561
50,420,552 UART: Caliptra RT
50,421,272 UART: [state] CFI Enabled
54,106,158 UART: Disable attest DPE used context limit breach
54,108,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,109,164 UART: [rt] RT listening for mailbox commands...
54,140,925 UART: [rt]cmd =0x494e464f, len=4
54,144,900 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,369 UART:
192,741 UART: Running Caliptra ROM ...
193,827 UART:
603,439 UART: [state] CFI Enabled
616,263 UART: [state] LifecycleState = Unprovisioned
618,159 UART: [state] DebugLocked = No
619,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,886 UART: [kat] SHA2-256
794,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,206 UART: [kat] ++
805,649 UART: [kat] sha1
816,827 UART: [kat] SHA2-256
819,526 UART: [kat] SHA2-384
826,656 UART: [kat] SHA2-512-ACC
829,024 UART: [kat] ECC-384
3,112,622 UART: [kat] HMAC-384Kdf
3,123,642 UART: [kat] LMS
4,313,744 UART: [kat] --
4,316,885 UART: [cold-reset] ++
4,319,380 UART: [fht] Storing FHT @ 0x50003400
4,332,079 UART: [idev] ++
4,332,697 UART: [idev] CDI.KEYID = 6
4,333,582 UART: [idev] SUBJECT.KEYID = 7
4,334,627 UART: [idev] UDS.KEYID = 0
4,335,720 ready_for_fw is high
4,335,909 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,434,870 UART: [idev] Erasing UDS.KEYID = 0
7,623,136 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,614 UART: [idev] --
7,648,958 UART: [ldev] ++
7,649,525 UART: [ldev] CDI.KEYID = 6
7,650,482 UART: [ldev] SUBJECT.KEYID = 5
7,651,683 UART: [ldev] AUTHORITY.KEYID = 7
7,652,964 UART: [ldev] FE.KEYID = 1
7,665,102 UART: [ldev] Erasing FE.KEYID = 1
10,951,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,680 UART: [ldev] --
13,313,624 UART: [fwproc] Waiting for Commands...
13,316,475 UART: [fwproc] Received command 0x46574c44
13,318,651 UART: [fwproc] Received Image of size 78740 bytes
16,939,160 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,016,358 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,085,236 UART: [fwproc] Loading Runtime at address 0x40005000 len 54036
17,279,325 >>> mbox cmd response: success
17,279,836 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,283,713 UART: [afmc] ++
17,284,354 UART: [afmc] CDI.KEYID = 6
17,285,230 UART: [afmc] SUBJECT.KEYID = 7
17,286,501 UART: [afmc] AUTHORITY.KEYID = 5
20,600,848 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,895,891 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,898,144 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,912,509 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,927,350 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,941,801 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,963,012 UART: [afmc] --
22,966,771 UART: [cold-reset] --
22,970,300 UART: [state] Locking Datavault
22,976,207 UART: [state] Locking PCR0, PCR1 and PCR31
22,977,940 UART: [state] Locking ICCM
22,979,419 UART: [exit] Launching FMC @ 0x40000130
22,987,818 UART:
22,988,051 UART: Running Caliptra FMC ...
22,989,148 UART:
22,989,301 UART: [state] CFI Enabled
22,997,364 UART: [fht] FMC Alias Private Key: 7
25,328,705 UART: [art] Extend RT PCRs Done
25,329,925 UART: [art] Lock RT PCRs Done
25,331,248 UART: [art] Populate DV Done
25,336,552 UART: [fht] FMC Alias Private Key: 7
25,338,248 UART: [art] Derive CDI
25,338,979 UART: [art] Store in in slot 0x4
25,381,959 UART: [art] Derive Key Pair
25,383,001 UART: [art] Store priv key in slot 0x5
28,624,829 UART: [art] Derive Key Pair - Done
28,637,818 UART: [art] Signing Cert with AUTHO
28,639,114 UART: RITY.KEYID = 7
30,918,705 UART: [art] Erasing AUTHORITY.KEYID = 7
30,920,206 UART: [art] PUB.X = 1891FCE277A7355DDFC55D8C56FBD71BA2CE72FA2824870AE272AE6C310EC235D700F926270E7344FB312617C889AA83
30,927,441 UART: [art] PUB.Y = 62816AA6D7DD2B2452264210C281272CD64F8D4797C0ACB62B1EBC424CFED853DAE59E6B5FBFB72A7CFA4754A8E9E822
30,934,710 UART: [art] SIG.R = 6819C877DDFFFE489EBBE20447EAFCB62A66C656BEBDF50BEA56A06DF9F8F4C1B65DF95489D176869D13BE01DE5ECB9F
30,942,158 UART: [art] SIG.S = 9CFEBCA704AE34F323F4813C36109548AD4834C5B04BFE8F29FB0456F9A41FAA5E9ADE37AA412CB1C24C20BCBB66273F
32,246,378 UART: mbox::rt_entry...
32,247,340 UART: ____ _ _ _ ____ _____
32,249,267 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,251,270 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,253,409 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,255,352 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,257,281 UART: |_|
32,258,087 UART:
32,371,753 UART: [rt] Runtime listening for mailbox commands...
32,377,605 >>> mbox cmd response data (3272 bytes)
32,393,478 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,426,866 >>> mbox cmd response data (0 bytes)
34,483,485 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,628,627 UART:
34,629,041 UART: Running Caliptra ROM ...
34,630,181 UART:
34,630,344 UART: [state] CFI Enabled
34,644,877 UART: [state] LifecycleState = Unprovisioned
34,646,766 UART: [state] DebugLocked = No
34,649,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,654,293 UART: [kat] SHA2-256
34,823,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,834,519 UART: [kat] ++
34,834,966 UART: [kat] sha1
34,846,920 UART: [kat] SHA2-256
34,849,576 UART: [kat] SHA2-384
34,855,408 UART: [kat] SHA2-512-ACC
34,857,750 UART: [kat] ECC-384
37,142,163 UART: [kat] HMAC-384Kdf
37,154,880 UART: [kat] LMS
38,344,915 UART: [kat] --
38,349,956 UART: [update-reset] ++
42,487,995 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,491,669 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
42,873,959 >>> mbox cmd response: success
42,878,731 UART: [update-reset] Copying MAN_2 To MAN_1
42,897,466 UART: [update-reset Success] --
42,902,040 UART: [state] Locking Datavault
42,906,014 UART: [state] Locking PCR0, PCR1 and PCR31
42,907,735 UART: [state] Locking ICCM
42,909,677 UART: [exit] Launching FMC @ 0x40000130
42,918,075 UART:
42,918,314 UART: Running Caliptra FMC ...
42,919,415 UART:
42,919,568 UART: [state] CFI Enabled
42,964,011 UART: [art] Extend RT PCRs Done
42,965,154 UART: [art] Lock RT PCRs Done
42,966,573 UART: [art] Populate DV Done
42,972,225 UART: [fht] FMC Alias Private Key: 7
42,973,641 UART: [art] Derive CDI
42,974,377 UART: [art] Store in in slot 0x4
43,017,124 UART: [art] Derive Key Pair
43,018,126 UART: [art] Store priv key in slot 0x5
46,260,264 UART: [art] Derive Key Pair - Done
46,273,380 UART: [art] Signing Cert with AUTHO
46,274,680 UART: RITY.KEYID = 7
48,554,074 UART: [art] Erasing AUTHORITY.KEYID = 7
48,555,585 UART: [art] PUB.X = DFEBFB80D762C7F3507DD0D60F0F6057B21946A67DB71792292959E25997DE2821F8E31A33061A90A77B79A1FFBBA5C3
48,562,857 UART: [art] PUB.Y = F2C8397C86805E2B0D3C3BA6CF714F65416EBEAAF8E1F25AB700E2B42D29E642B5E3A097B1E951274D8CF43B693F025B
48,570,112 UART: [art] SIG.R = 6E0B7C56496E9F801E65915F7B23292E2547DD0D8605505C9D6298253E607F047D299BC9031E489DE7FF931CA6652682
48,577,506 UART: [art] SIG.S = 7C25598EBAA85E17E771EC054323146EB95500079810D7D1E81E11FB40979B545E519CAFE33B76CA9CD34F7E2CD0BB07
49,882,331 UART: Caliptra RT
49,883,034 UART: [state] CFI Enabled
53,475,105 UART: Disable attest DPE used context limit breach
53,477,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,478,008 UART: [rt] RT listening for mailbox commands...
53,509,067 UART: [rt]cmd =0x494e464f, len=4
53,512,801 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
4,127,387 ready_for_fw is high
4,127,823 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
17,351,942 >>> mbox cmd response: success
17,352,792 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,983,992 UART:
22,984,382 UART: Running Caliptra FMC ...
22,985,487 UART:
22,985,637 UART: [state] CFI Enabled
22,993,422 UART: [fht] FMC Alias Private Key: 7
25,324,187 UART: [art] Extend RT PCRs Done
25,325,541 UART: [art] Lock RT PCRs Done
25,327,443 UART: [art] Populate DV Done
25,333,129 UART: [fht] FMC Alias Private Key: 7
25,334,828 UART: [art] Derive CDI
25,335,558 UART: [art] Store in in slot 0x4
25,378,141 UART: [art] Derive Key Pair
25,379,133 UART: [art] Store priv key in slot 0x5
28,621,403 UART: [art] Derive Key Pair - Done
28,634,252 UART: [art] Signing Cert with AUTHO
28,635,555 UART: RITY.KEYID = 7
30,914,984 UART: [art] Erasing AUTHORITY.KEYID = 7
30,916,491 UART: [art] PUB.X = C1709ABCD303DB69CA872225B6D353FB9674F9AB711D08661083539ADC7B68444E0A9662FF0221EB5280C248BDE440A6
30,923,732 UART: [art] PUB.Y = 30E4E0FFC410051D376A30673382FA265F110742037DCC9870B94B7CE094973D43C6A85548348CB79B660DEE940F9FF9
30,930,958 UART: [art] SIG.R = B8076703F6500564FE7A3D3081C2CEFD98472CC51D218FB7447D7C85F72BF4AA6CD3A2D8409146D55FAD2B2D084F5AB7
30,938,365 UART: [art] SIG.S = E36C2267E8685CA98F0A381EAA49F103A1B9777C6C161C4897000D4BFF0DA1903DD4C9AEE22BF39D3F780E6EB1EDF6F6
32,243,450 UART: mbox::rt_entry...
32,244,414 UART: ____ _ _ _ ____ _____
32,246,392 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,248,392 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,250,321 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,252,286 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,254,132 UART: |_|
32,254,928 UART:
32,368,878 UART: [rt] Runtime listening for mailbox commands...
32,374,753 >>> mbox cmd response data (3272 bytes)
32,390,636 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,424,028 >>> mbox cmd response data (0 bytes)
34,482,021 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
43,141,213 >>> mbox cmd response: success
43,174,622 UART:
43,174,970 UART: Running Caliptra FMC ...
43,176,103 UART:
43,176,272 UART: [state] CFI Enabled
43,220,237 UART: [art] Extend RT PCRs Done
43,221,383 UART: [art] Lock RT PCRs Done
43,222,937 UART: [art] Populate DV Done
43,228,253 UART: [fht] FMC Alias Private Key: 7
43,230,002 UART: [art] Derive CDI
43,230,822 UART: [art] Store in in slot 0x4
43,273,162 UART: [art] Derive Key Pair
43,274,208 UART: [art] Store priv key in slot 0x5
46,515,885 UART: [art] Derive Key Pair - Done
46,528,942 UART: [art] Signing Cert with AUTHO
46,530,276 UART: RITY.KEYID = 7
48,810,031 UART: [art] Erasing AUTHORITY.KEYID = 7
48,811,544 UART: [art] PUB.X = F68FFD79493DBF0555F76A208B897C975F47164569D8FC05AD6E468D0864A346E07D4CAD9443B81848DD81244B241571
48,818,773 UART: [art] PUB.Y = B33F7DB67F6188D60F464BCB20E3CA610B79E3CB594780112BD34D8AA704923B80D83988F998BC9CD84192116E48291E
48,826,036 UART: [art] SIG.R = 740D6C0745C0E2DF02B9154C00A914B8DBBA6DB7E2DE7235873ECE7BEB5B95F2A9AAAED1C41CDA331AA674D3B945BEBA
48,833,400 UART: [art] SIG.S = B4D9C594D25D757683F49F34EAEC8BCEBD74DB01BB9F8CE3EBEEA0C51467503A0AD2E445CEDC62F95BBEA07033BE5635
50,138,296 UART: Caliptra RT
50,138,998 UART: [state] CFI Enabled
53,725,575 UART: Disable attest DPE used context limit breach
53,727,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,728,639 UART: [rt] RT listening for mailbox commands...
53,760,123 UART: [rt]cmd =0x494e464f, len=4
53,763,956 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,308 UART:
192,669 UART: Running Caliptra ROM ...
193,766 UART:
193,909 UART: [state] CFI Enabled
262,808 UART: [state] LifecycleState = Unprovisioned
264,705 UART: [state] DebugLocked = No
266,168 UART: [state] WD Timer not started. Device not locked for debugging
269,004 UART: [kat] SHA2-256
448,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,711 UART: [kat] ++
460,253 UART: [kat] sha1
471,988 UART: [kat] SHA2-256
475,079 UART: [kat] SHA2-384
480,642 UART: [kat] SHA2-512-ACC
483,663 UART: [kat] ECC-384
2,947,307 UART: [kat] HMAC-384Kdf
2,971,220 UART: [kat] LMS
3,500,693 UART: [kat] --
3,503,556 UART: [cold-reset] ++
3,504,422 UART: [fht] FHT @ 0x50003400
3,515,971 UART: [idev] ++
3,516,534 UART: [idev] CDI.KEYID = 6
3,517,451 UART: [idev] SUBJECT.KEYID = 7
3,518,628 UART: [idev] UDS.KEYID = 0
3,519,555 ready_for_fw is high
3,519,751 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,618,863 UART: [idev] Erasing UDS.KEYID = 0
6,026,373 UART: [idev] Sha1 KeyId Algorithm
6,049,710 UART: [idev] --
6,052,680 UART: [ldev] ++
6,053,315 UART: [ldev] CDI.KEYID = 6
6,054,210 UART: [ldev] SUBJECT.KEYID = 5
6,055,322 UART: [ldev] AUTHORITY.KEYID = 7
6,056,612 UART: [ldev] FE.KEYID = 1
6,099,994 UART: [ldev] Erasing FE.KEYID = 1
8,599,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,626 UART: [ldev] --
10,393,813 UART: [fwproc] Wait for Commands...
10,396,177 UART: [fwproc] Recv command 0x46574c44
10,398,266 UART: [fwproc] Recv'd Img size: 78704 bytes
13,363,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,437,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,506,721 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,699,141 >>> mbox cmd response: success
13,699,638 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,702,711 UART: [afmc] ++
13,703,328 UART: [afmc] CDI.KEYID = 6
13,704,242 UART: [afmc] SUBJECT.KEYID = 7
13,705,401 UART: [afmc] AUTHORITY.KEYID = 5
16,234,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,954,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,956,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,972,682 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,988,526 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,004,357 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,027,032 UART: [afmc] --
18,030,150 UART: [cold-reset] --
18,033,312 UART: [state] Locking Datavault
18,039,008 UART: [state] Locking PCR0, PCR1 and PCR31
18,040,661 UART: [state] Locking ICCM
18,043,087 UART: [exit] Launching FMC @ 0x40000130
18,051,551 UART:
18,051,789 UART: Running Caliptra FMC ...
18,053,090 UART:
18,053,268 UART: [state] CFI Enabled
18,114,867 UART: [fht] FMC Alias Private Key: 7
19,878,630 UART: [art] Extend RT PCRs Done
19,879,844 UART: [art] Lock RT PCRs Done
19,881,493 UART: [art] Populate DV Done
19,886,909 UART: [fht] FMC Alias Private Key: 7
19,888,390 UART: [art] Derive CDI
19,889,154 UART: [art] Store in in slot 0x4
19,948,536 UART: [art] Derive Key Pair
19,949,578 UART: [art] Store priv key in slot 0x5
22,413,092 UART: [art] Derive Key Pair - Done
22,425,976 UART: [art] Signing Cert with AUTHO
22,427,274 UART: RITY.KEYID = 7
24,138,302 UART: [art] Erasing AUTHORITY.KEYID = 7
24,139,803 UART: [art] PUB.X = BC34CB4BF8E1F4A2F0D721CAD46BEBAC5FB04DCE86F71CFD8BFFBC6D5CFA766EFE2F88F98F589A690322C9E3D5DF18CB
24,147,062 UART: [art] PUB.Y = AB44CD0A1945D6183F28B856E4E278AB325592D8DFA13DFD7438F0A32FC119196AB1FEFD10ECCD8301776260C3D20F10
24,154,359 UART: [art] SIG.R = 1DFF5A61A969CC97E54EFFC56735AAA09E5C62F48DA628736E00527BACD05318FB407961FCAE282CDD581ADC0A4AB7F5
24,161,753 UART: [art] SIG.S = 1437957893F37EDCF558F44D80023E8CA109DAF8D203043CB3908B43079DC50566696B0AF7FDF002494919DFB17B190C
25,140,139 UART: mbox::rt_entry...
25,141,088 UART: ____ _ _ _ ____ _____
25,143,069 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,145,074 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,147,001 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,148,935 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,150,860 UART: |_|
25,151,694 UART:
25,264,270 UART: [rt] Runtime listening for mailbox commands...
25,270,121 >>> mbox cmd response data (3272 bytes)
25,285,701 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,319,093 >>> mbox cmd response data (0 bytes)
27,380,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,524,982 UART:
27,525,372 UART: Running Caliptra ROM ...
27,526,505 UART:
27,526,679 UART: [state] CFI Enabled
27,589,085 UART: [state] LifecycleState = Unprovisioned
27,590,991 UART: [state] DebugLocked = No
27,593,298 UART: [state] WD Timer not started. Device not locked for debugging
27,596,714 UART: [kat] SHA2-256
27,775,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,787,442 UART: [kat] ++
27,787,898 UART: [kat] sha1
27,797,480 UART: [kat] SHA2-256
27,800,499 UART: [kat] SHA2-384
27,805,890 UART: [kat] SHA2-512-ACC
27,808,826 UART: [kat] ECC-384
30,254,666 UART: [kat] HMAC-384Kdf
30,277,323 UART: [kat] LMS
30,806,757 UART: [kat] --
30,810,856 UART: [update-reset] ++
34,239,979 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,244,120 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,627,411 >>> mbox cmd response: success
34,631,850 UART: [update-reset] Copying MAN_2 To MAN_1
34,650,696 UART: [update-reset Success] --
34,654,074 UART: [state] Locking Datavault
34,657,338 UART: [state] Locking PCR0, PCR1 and PCR31
34,659,035 UART: [state] Locking ICCM
34,660,435 UART: [exit] Launching FMC @ 0x40000130
34,668,884 UART:
34,669,122 UART: Running Caliptra FMC ...
34,670,515 UART:
34,670,679 UART: [state] CFI Enabled
34,768,257 UART: [art] Extend RT PCRs Done
34,769,471 UART: [art] Lock RT PCRs Done
34,770,766 UART: [art] Populate DV Done
34,776,219 UART: [fht] FMC Alias Private Key: 7
34,777,802 UART: [art] Derive CDI
34,778,622 UART: [art] Store in in slot 0x4
34,836,794 UART: [art] Derive Key Pair
34,837,795 UART: [art] Store priv key in slot 0x5
37,300,696 UART: [art] Derive Key Pair - Done
37,313,911 UART: [art] Signing Cert with AUTHO
37,315,213 UART: RITY.KEYID = 7
39,027,279 UART: [art] Erasing AUTHORITY.KEYID = 7
39,028,785 UART: [art] PUB.X = D2768B23526E15F185A60AC1AFB5FAD79C9F173683A75609046193E3C085F2E636877D29328AE9E4D1E9680E9C80CEC5
39,036,049 UART: [art] PUB.Y = 5022A75171ABD284477CC764BBF2A24FFAEDD4C40E00389CD64C45A68082E430E75111374E11F077CA32AA112AD93DF7
39,043,302 UART: [art] SIG.R = 1FE03ACDD093BC17CE3808348A1298688967A7AE029838D9A3D3D5873A6C6742BC5A18BB75925FD8F616B3D1C4A04BA0
39,050,653 UART: [art] SIG.S = B21801D93EB171BE9E0CF9B1EE751553ED4B34EAEB15C23833A34434C948002CFF941C343CFBAA9B85E55D0423057CD8
40,029,477 UART: Caliptra RT
40,030,196 UART: [state] CFI Enabled
42,868,829 UART: Disable attest DPE used context limit breach
42,870,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,872,028 UART: [rt] RT listening for mailbox commands...
42,903,309 UART: [rt]cmd =0x494e464f, len=4
42,907,099 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,360,745 ready_for_fw is high
3,361,120 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,506,927 >>> mbox cmd response: success
13,507,502 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,787,805 UART:
17,788,193 UART: Running Caliptra FMC ...
17,789,382 UART:
17,789,574 UART: [state] CFI Enabled
17,854,510 UART: [fht] FMC Alias Private Key: 7
19,618,635 UART: [art] Extend RT PCRs Done
19,619,843 UART: [art] Lock RT PCRs Done
19,621,477 UART: [art] Populate DV Done
19,626,838 UART: [fht] FMC Alias Private Key: 7
19,628,374 UART: [art] Derive CDI
19,629,188 UART: [art] Store in in slot 0x4
19,687,619 UART: [art] Derive Key Pair
19,688,658 UART: [art] Store priv key in slot 0x5
22,151,200 UART: [art] Derive Key Pair - Done
22,163,757 UART: [art] Signing Cert with AUTHO
22,165,092 UART: RITY.KEYID = 7
23,877,308 UART: [art] Erasing AUTHORITY.KEYID = 7
23,878,812 UART: [art] PUB.X = 8A17519B2D04CD64045B28B9129E2E0172304F75AEE600092B9ADCDDAF9DE63173145C2027009ABF8185867EF9960D88
23,886,002 UART: [art] PUB.Y = D0D4CCA57633127BC69CDB36FF03B2E23733DF7407DCA3D2772A5AB6E72007A3775C473EB40DDC4CBD62F2E4EE6834C6
23,893,307 UART: [art] SIG.R = 699C80ED5EF6BDC4B070A6C1503BFD842EA7CFB156404368D29CBE2954790A0710C53C401C8CA3B84272D5BC5291C0A1
23,900,703 UART: [art] SIG.S = 91FC28A5C0CD7A873FAD91F6751ACA6791B5A68F0BA0A2AD1C95DE9E3B9DCF3E766C7A48317FD69E2B87A3C6C6A213FF
24,879,150 UART: mbox::rt_entry...
24,880,095 UART: ____ _ _ _ ____ _____
24,882,075 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,884,083 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,886,012 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,887,971 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,889,902 UART: |_|
24,890,737 UART:
25,003,212 UART: [rt] Runtime listening for mailbox commands...
25,009,076 >>> mbox cmd response data (3272 bytes)
25,024,732 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,058,157 >>> mbox cmd response data (0 bytes)
27,115,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,233,696 >>> mbox cmd response: success
34,268,803 UART:
34,269,143 UART: Running Caliptra FMC ...
34,270,216 UART:
34,270,379 UART: [state] CFI Enabled
34,357,733 UART: [art] Extend RT PCRs Done
34,358,929 UART: [art] Lock RT PCRs Done
34,360,390 UART: [art] Populate DV Done
34,366,066 UART: [fht] FMC Alias Private Key: 7
34,367,666 UART: [art] Derive CDI
34,368,482 UART: [art] Store in in slot 0x4
34,426,984 UART: [art] Derive Key Pair
34,428,022 UART: [art] Store priv key in slot 0x5
36,890,962 UART: [art] Derive Key Pair - Done
36,903,915 UART: [art] Signing Cert with AUTHO
36,905,229 UART: RITY.KEYID = 7
38,616,103 UART: [art] Erasing AUTHORITY.KEYID = 7
38,617,610 UART: [art] PUB.X = C271F518CA3A603B4C99877F0FE34BAB8244DFFCF01E47E220E9CDC055B8B8B8E450727A5FD93802D02696FCBE4A2FE8
38,624,920 UART: [art] PUB.Y = 49121D02FEE46E3E1E44EC35AEE2FD9DDBA7E7B8916BCD5FE619E6DD3E8856887B28BA786CD8CD64E0679DFE650013E6
38,632,208 UART: [art] SIG.R = 024A010938C4309306734D140A10E6F34EF93D54B72640012EE5BB2F4AAAF26DA38232E2AC93600A50BC5D28BC28EE0E
38,639,577 UART: [art] SIG.S = 5CBC724728E420DE2D841B5654EECB9F94D7765F11535BDF0DB848ADC0B395344D453224ED03B65E05350FE7E680298B
39,618,699 UART: Caliptra RT
39,619,384 UART: [state] CFI Enabled
42,457,517 UART: Disable attest DPE used context limit breach
42,459,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,460,439 UART: [rt] RT listening for mailbox commands...
42,491,775 UART: [rt]cmd =0x494e464f, len=4
42,495,657 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,475 UART:
192,844 UART: Running Caliptra ROM ...
194,019 UART:
603,447 UART: [state] CFI Enabled
618,102 UART: [state] LifecycleState = Unprovisioned
619,963 UART: [state] DebugLocked = No
622,638 UART: [state] WD Timer not started. Device not locked for debugging
627,158 UART: [kat] SHA2-256
806,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,844 UART: [kat] ++
818,375 UART: [kat] sha1
829,182 UART: [kat] SHA2-256
832,178 UART: [kat] SHA2-384
837,946 UART: [kat] SHA2-512-ACC
840,873 UART: [kat] ECC-384
3,283,824 UART: [kat] HMAC-384Kdf
3,295,796 UART: [kat] LMS
3,825,271 UART: [kat] --
3,830,048 UART: [cold-reset] ++
3,831,120 UART: [fht] FHT @ 0x50003400
3,842,605 UART: [idev] ++
3,843,206 UART: [idev] CDI.KEYID = 6
3,844,110 UART: [idev] SUBJECT.KEYID = 7
3,845,226 UART: [idev] UDS.KEYID = 0
3,846,203 ready_for_fw is high
3,846,386 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,945,267 UART: [idev] Erasing UDS.KEYID = 0
6,314,383 UART: [idev] Sha1 KeyId Algorithm
6,336,913 UART: [idev] --
6,341,748 UART: [ldev] ++
6,342,314 UART: [ldev] CDI.KEYID = 6
6,343,189 UART: [ldev] SUBJECT.KEYID = 5
6,344,392 UART: [ldev] AUTHORITY.KEYID = 7
6,345,670 UART: [ldev] FE.KEYID = 1
6,357,469 UART: [ldev] Erasing FE.KEYID = 1
8,833,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,508 UART: [ldev] --
10,623,652 UART: [fwproc] Wait for Commands...
10,625,791 UART: [fwproc] Recv command 0x46574c44
10,627,869 UART: [fwproc] Recv'd Img size: 78704 bytes
13,596,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,672,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,741,537 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,933,876 >>> mbox cmd response: success
13,934,372 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,938,659 UART: [afmc] ++
13,939,236 UART: [afmc] CDI.KEYID = 6
13,940,146 UART: [afmc] SUBJECT.KEYID = 7
13,941,358 UART: [afmc] AUTHORITY.KEYID = 5
16,439,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,163,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,165,179 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,180,934 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,196,961 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,212,814 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,235,433 UART: [afmc] --
18,239,864 UART: [cold-reset] --
18,242,957 UART: [state] Locking Datavault
18,247,664 UART: [state] Locking PCR0, PCR1 and PCR31
18,249,313 UART: [state] Locking ICCM
18,251,354 UART: [exit] Launching FMC @ 0x40000130
18,259,790 UART:
18,260,018 UART: Running Caliptra FMC ...
18,261,112 UART:
18,261,262 UART: [state] CFI Enabled
18,269,108 UART: [fht] FMC Alias Private Key: 7
20,025,721 UART: [art] Extend RT PCRs Done
20,026,943 UART: [art] Lock RT PCRs Done
20,028,641 UART: [art] Populate DV Done
20,034,113 UART: [fht] FMC Alias Private Key: 7
20,035,810 UART: [art] Derive CDI
20,036,542 UART: [art] Store in in slot 0x4
20,078,933 UART: [art] Derive Key Pair
20,080,084 UART: [art] Store priv key in slot 0x5
22,507,394 UART: [art] Derive Key Pair - Done
22,520,278 UART: [art] Signing Cert with AUTHO
22,521,563 UART: RITY.KEYID = 7
24,227,335 UART: [art] Erasing AUTHORITY.KEYID = 7
24,228,848 UART: [art] PUB.X = 6369C5D7D8E07ED871338B11261E5DB8D78AD2621CCE66538A5B78D22036A05E8838D41E0AC9137387893172A3246451
24,236,090 UART: [art] PUB.Y = 12CCDFF8AD2E6CDB7915E41552D5E2AC0B55EE29E40A3D281AB31D79493BC83D6CCF159DBCFD15BA96E91BAE88DABC4B
24,243,403 UART: [art] SIG.R = 3B774D17A3E4F05F6B0E15D5DAD25959530E3A28C7BC6C153DAD30C013979471F4699986EE0CC068E2932792E983601C
24,250,750 UART: [art] SIG.S = 8FD0F26F8FAE6A44B7EF656B04B5D7646BAE16F6B3E676A0D070F98D567C3596E22897990E619D5178222894A1060D74
25,229,201 UART: mbox::rt_entry...
25,230,149 UART: ____ _ _ _ ____ _____
25,232,121 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,234,119 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,236,040 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,237,961 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,239,880 UART: |_|
25,240,677 UART:
25,353,145 UART: [rt] Runtime listening for mailbox commands...
25,359,026 >>> mbox cmd response data (3272 bytes)
25,374,704 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,408,106 >>> mbox cmd response data (0 bytes)
27,466,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,611,377 UART:
27,611,769 UART: Running Caliptra ROM ...
27,612,853 UART:
27,613,008 UART: [state] CFI Enabled
27,626,304 UART: [state] LifecycleState = Unprovisioned
27,628,138 UART: [state] DebugLocked = No
27,629,891 UART: [state] WD Timer not started. Device not locked for debugging
27,634,490 UART: [kat] SHA2-256
27,813,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,825,284 UART: [kat] ++
27,825,823 UART: [kat] sha1
27,837,677 UART: [kat] SHA2-256
27,840,687 UART: [kat] SHA2-384
27,846,130 UART: [kat] SHA2-512-ACC
27,849,078 UART: [kat] ECC-384
30,290,020 UART: [kat] HMAC-384Kdf
30,303,066 UART: [kat] LMS
30,832,573 UART: [kat] --
30,836,934 UART: [update-reset] ++
34,270,332 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,273,377 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
34,656,652 >>> mbox cmd response: success
34,660,929 UART: [update-reset] Copying MAN_2 To MAN_1
34,679,599 UART: [update-reset Success] --
34,683,947 UART: [state] Locking Datavault
34,686,728 UART: [state] Locking PCR0, PCR1 and PCR31
34,688,435 UART: [state] Locking ICCM
34,690,795 UART: [exit] Launching FMC @ 0x40000130
34,699,238 UART:
34,699,468 UART: Running Caliptra FMC ...
34,700,889 UART:
34,701,050 UART: [state] CFI Enabled
34,744,787 UART: [art] Extend RT PCRs Done
34,745,975 UART: [art] Lock RT PCRs Done
34,747,702 UART: [art] Populate DV Done
34,753,208 UART: [fht] FMC Alias Private Key: 7
34,754,798 UART: [art] Derive CDI
34,755,606 UART: [art] Store in in slot 0x4
34,798,244 UART: [art] Derive Key Pair
34,799,579 UART: [art] Store priv key in slot 0x5
37,226,395 UART: [art] Derive Key Pair - Done
37,239,527 UART: [art] Signing Cert with AUTHO
37,240,822 UART: RITY.KEYID = 7
38,945,908 UART: [art] Erasing AUTHORITY.KEYID = 7
38,947,412 UART: [art] PUB.X = 7574A618CBB97A4D935B320535991FEBCE9E8A2369033488D89584047DDFE61A3AE403BCFE07DF2396D85570A1A74840
38,954,684 UART: [art] PUB.Y = B1809BE12B243653CC634551D26811FB58312EE1D4EFCDA9FEBB9CE292D12951F9A250C5E94A6BD3F73C3F0FB61F4219
38,961,968 UART: [art] SIG.R = F0129AA3F56301610BDD6971B8AFCE5AB419625C3A376943CBBF5455B7C17D6EE56ED503FFE2DAC1323FCE32F8B59760
38,969,353 UART: [art] SIG.S = 85063FE2227C4D1B424C1FCAC77042E793DC3074AC48CB58C462387EECD44667AC25DB1464F93903FD483936ABF4B9EC
39,948,090 UART: Caliptra RT
39,948,790 UART: [state] CFI Enabled
42,721,159 UART: Disable attest DPE used context limit breach
42,723,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,724,160 UART: [rt] RT listening for mailbox commands...
42,755,318 UART: [rt]cmd =0x494e464f, len=4
42,759,260 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,700,807 ready_for_fw is high
3,701,379 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,708,010 >>> mbox cmd response: success
13,708,595 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,958,505 UART:
17,958,895 UART: Running Caliptra FMC ...
17,960,027 UART:
17,960,178 UART: [state] CFI Enabled
17,968,024 UART: [fht] FMC Alias Private Key: 7
19,724,560 UART: [art] Extend RT PCRs Done
19,725,794 UART: [art] Lock RT PCRs Done
19,727,266 UART: [art] Populate DV Done
19,733,013 UART: [fht] FMC Alias Private Key: 7
19,734,604 UART: [art] Derive CDI
19,735,343 UART: [art] Store in in slot 0x4
19,777,816 UART: [art] Derive Key Pair
19,778,811 UART: [art] Store priv key in slot 0x5
22,205,581 UART: [art] Derive Key Pair - Done
22,218,575 UART: [art] Signing Cert with AUTHO
22,219,867 UART: RITY.KEYID = 7
23,925,223 UART: [art] Erasing AUTHORITY.KEYID = 7
23,926,726 UART: [art] PUB.X = E4DBF3BBE86D413FBC88746EC5522DA8214DA3AFF1EB7A12345A323BDA458292E22CF9651B28B0A03EA65A9956A612E1
23,933,970 UART: [art] PUB.Y = 6A6C1C10BC43D1DF73C14F35888D2F3DBD7D61DE00850A6F3673C9EFF9C6935178D04543D2346D994C60E1893179558D
23,941,202 UART: [art] SIG.R = 560538B04D0D9C35092C1B89705FFD249AD01FCB704D4D4B34CBF02F6CAF68F9FED2DA49B1D36EB4B374F092AB4B6229
23,948,652 UART: [art] SIG.S = 47878733319B856D5F8E151643BC98DFBA0121CBCDFD4B3AB88AB0595C1E02373FBC9437F34944E5528B9D253679E8B2
24,927,310 UART: mbox::rt_entry...
24,928,261 UART: ____ _ _ _ ____ _____
24,930,182 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,932,177 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,934,026 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,935,976 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,937,868 UART: |_|
24,938,746 UART:
25,052,633 UART: [rt] Runtime listening for mailbox commands...
25,058,482 >>> mbox cmd response data (3272 bytes)
25,074,456 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,107,871 >>> mbox cmd response data (0 bytes)
27,178,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
34,223,022 >>> mbox cmd response: success
34,256,795 UART:
34,257,102 UART: Running Caliptra FMC ...
34,258,215 UART:
34,258,374 UART: [state] CFI Enabled
34,302,946 UART: [art] Extend RT PCRs Done
34,304,134 UART: [art] Lock RT PCRs Done
34,305,698 UART: [art] Populate DV Done
34,311,101 UART: [fht] FMC Alias Private Key: 7
34,312,635 UART: [art] Derive CDI
34,313,441 UART: [art] Store in in slot 0x4
34,355,716 UART: [art] Derive Key Pair
34,356,754 UART: [art] Store priv key in slot 0x5
36,783,817 UART: [art] Derive Key Pair - Done
36,797,263 UART: [art] Signing Cert with AUTHO
36,798,574 UART: RITY.KEYID = 7
38,503,729 UART: [art] Erasing AUTHORITY.KEYID = 7
38,505,242 UART: [art] PUB.X = 4085F5FA89BE311BAE121E3AB689010386D8A6B6F0807337E17FD4D331F39344FA1F840E367F3205A00743E26998370E
38,512,479 UART: [art] PUB.Y = FFFC03D7DEFE0B8A8A8DE38CB5979228B857DA94A622CE1C62E020B781BB5649B99383788FD6331CB531A84EFA4ECBA2
38,519,761 UART: [art] SIG.R = EA65D4C217D65B0CADF2F08192169CBD46A3DDAD7B620A061C9175CB7009D2ACC4D9623E060415FD7611A6C61EE26323
38,527,168 UART: [art] SIG.S = 0E91D3B7E53DCA766F216AC488CB0DC7FFF65AE4E4F1ED6B91401FF07A07AE5D9091D3F8CE858798C89ED7473A8DFF3E
39,506,341 UART: Caliptra RT
39,507,036 UART: [state] CFI Enabled
42,281,549 UART: Disable attest DPE used context limit breach
42,283,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,284,489 UART: [rt] RT listening for mailbox commands...
42,315,756 UART: [rt]cmd =0x494e464f, len=4
42,319,864 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
3,438,770 ready_for_fw is high
3,439,318 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
13,967,488 >>> mbox cmd response: success
13,968,180 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,255,837 UART:
18,256,209 UART: Running Caliptra FMC ...
18,257,394 UART:
18,257,562 UART: [state] CFI Enabled
18,324,344 UART: [fht] FMC Alias Private Key: 7
20,088,254 UART: [art] Extend RT PCRs Done
20,089,473 UART: [art] Lock RT PCRs Done
20,091,158 UART: [art] Populate DV Done
20,096,357 UART: [fht] FMC Alias Private Key: 7
20,098,022 UART: [art] Derive CDI
20,098,845 UART: [art] Store in in slot 0x4
20,156,736 UART: [art] Derive Key Pair
20,157,771 UART: [art] Store priv key in slot 0x5
22,620,323 UART: [art] Derive Key Pair - Done
22,633,530 UART: [art] Signing Cert with AUTHO
22,634,834 UART: RITY.KEYID = 7
24,346,017 UART: [art] Erasing AUTHORITY.KEYID = 7
24,347,520 UART: [art] PUB.X = 6277C260E2FC7772A006BCA94FB6B15288116C0AD026F69ED1C52D0CA9EC03356894A13FA9153071433F67FE4F17A776
24,354,769 UART: [art] PUB.Y = 0BA75A813507678F18B9E9F704B3A90A57F82D371408533C8D7CEF9CA88CC9FA9C38D5EACDEAC69B0552F766EEF1668A
24,361,997 UART: [art] SIG.R = 4F075237E7D1725340EA2725295F39B46B71D8F7928CD6A67922284FA7BC7B490C87EDE9BAD20089B492577EF26E8918
24,369,426 UART: [art] SIG.S = ABB06025CD69EF9AB6502CF2078EEEECC06B4C07217E1192863E71DD678CE091A15111F91123685EEB11A9ACA28E6D3F
25,347,955 UART: mbox::rt_entry...
25,348,915 UART: ____ _ _ _ ____ _____
25,350,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,352,905 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,354,876 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,356,842 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,358,774 UART: |_|
25,359,581 UART:
25,473,380 UART: [rt] Runtime listening for mailbox commands...
25,479,229 >>> mbox cmd response data (3272 bytes)
25,495,079 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,528,506 >>> mbox cmd response data (0 bytes)
27,590,081 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,407,382 >>> mbox cmd response: success
35,441,438 UART:
35,441,752 UART: Running Caliptra FMC ...
35,442,802 UART:
35,442,957 UART: [state] CFI Enabled
35,550,551 UART: [art] Extend RT PCRs Done
35,551,761 UART: [art] Lock RT PCRs Done
35,553,108 UART: [art] Populate DV Done
35,558,695 UART: [fht] FMC Alias Private Key: 7
35,560,230 UART: [art] Derive CDI
35,560,967 UART: [art] Store in in slot 0x4
35,619,261 UART: [art] Derive Key Pair
35,620,304 UART: [art] Store priv key in slot 0x5
38,083,242 UART: [art] Derive Key Pair - Done
38,096,019 UART: [art] Signing Cert with AUTHO
38,097,329 UART: RITY.KEYID = 7
39,808,992 UART: [art] Erasing AUTHORITY.KEYID = 7
39,810,508 UART: [art] PUB.X = 7FFACA431AE0C967EC6FD0712A19707F493AD2F0D7E4183A2E737B94B9C5A4397A8F7521E3B6967B0169BEB56F0CED8F
39,817,751 UART: [art] PUB.Y = 1B20196982CA7BB570A138AD60AFC560FBA1307724DB4AD58424D1FB9ED593ED76DC167BCA0129504329F624867ABC1C
39,825,033 UART: [art] SIG.R = 389CA882D1EB7837A1A02A249EA4976B355B2F3693A10976E1E7AA9E96A9F18E874042DF1F0E6EB6EC8CEBBF65FB7D02
39,832,431 UART: [art] SIG.S = BC738F2B095BED5615546F3C86881BBF9D6D59526F48AAC60768DD941FCB997D6E963A08FB617C05B029637E98362D03
40,811,094 UART: Caliptra RT
40,811,777 UART: [state] CFI Enabled
43,671,249 UART: Disable attest DPE used context limit breach
43,673,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,673,975 UART: [rt] RT listening for mailbox commands...
43,705,303 UART: [rt]cmd =0x494e464f, len=4
43,709,189 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,755,083 ready_for_fw is high
3,755,475 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
14,201,652 >>> mbox cmd response: success
14,202,188 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,460,149 UART:
18,460,549 UART: Running Caliptra FMC ...
18,461,651 UART:
18,461,795 UART: [state] CFI Enabled
18,469,642 UART: [fht] FMC Alias Private Key: 7
20,226,313 UART: [art] Extend RT PCRs Done
20,227,521 UART: [art] Lock RT PCRs Done
20,229,007 UART: [art] Populate DV Done
20,234,694 UART: [fht] FMC Alias Private Key: 7
20,236,391 UART: [art] Derive CDI
20,237,153 UART: [art] Store in in slot 0x4
20,279,900 UART: [art] Derive Key Pair
20,280,895 UART: [art] Store priv key in slot 0x5
22,707,236 UART: [art] Derive Key Pair - Done
22,720,233 UART: [art] Signing Cert with AUTHO
22,721,532 UART: RITY.KEYID = 7
24,427,225 UART: [art] Erasing AUTHORITY.KEYID = 7
24,428,718 UART: [art] PUB.X = 6BC30979CD51C6BCA9C82093BFB4CA0E64CBECBDE12A4278882C0ED8721975EF266C7EC38CCE32D128ABF325159F7296
24,436,010 UART: [art] PUB.Y = 5D244B9D8031CF3C85B36C87C1860C467279F8AEFCC04EB1616EB913320969573D7B7EC6E5F0EECB9BB4CA4DAF8473BA
24,443,302 UART: [art] SIG.R = 5E1B960C8079014031641BD7C14D08E2CAFF676A3AD804BE40F7A43AB30B14FBD2006A6B3671AAEBB8449F2CABE5E7A1
24,450,688 UART: [art] SIG.S = 3945DEF4148B84B9BCCDB765DE2FF6811FA2CD2BF92BC63F7EA3AF32AD11A0EFBC069CAA096516717BAB1728313DF221
25,429,302 UART: mbox::rt_entry...
25,430,253 UART: ____ _ _ _ ____ _____
25,432,231 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,434,226 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,436,146 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,438,100 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,440,028 UART: |_|
25,440,832 UART:
25,554,440 UART: [rt] Runtime listening for mailbox commands...
25,560,282 >>> mbox cmd response data (3272 bytes)
25,576,130 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,609,533 >>> mbox cmd response data (0 bytes)
27,667,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
35,402,142 >>> mbox cmd response: success
35,437,295 UART:
35,437,627 UART: Running Caliptra FMC ...
35,438,742 UART:
35,438,904 UART: [state] CFI Enabled
35,482,861 UART: [art] Extend RT PCRs Done
35,483,998 UART: [art] Lock RT PCRs Done
35,485,442 UART: [art] Populate DV Done
35,490,854 UART: [fht] FMC Alias Private Key: 7
35,492,392 UART: [art] Derive CDI
35,493,160 UART: [art] Store in in slot 0x4
35,536,047 UART: [art] Derive Key Pair
35,537,056 UART: [art] Store priv key in slot 0x5
37,963,868 UART: [art] Derive Key Pair - Done
37,976,697 UART: [art] Signing Cert with AUTHO
37,978,026 UART: RITY.KEYID = 7
39,683,240 UART: [art] Erasing AUTHORITY.KEYID = 7
39,684,752 UART: [art] PUB.X = 4F25CC2F1EB54BA2D4C324EF0AF5DD630F4909B3B6F0E26419DF32991E51DE7E0EBCE11EE46CD55F82D2349D680516C7
39,692,023 UART: [art] PUB.Y = 0F20980224857082F8DA8D0D8FC77A33E6F5A4AA9C44B3237D872ECCF0B934BE18575F601B814169D09FCDBA19768598
39,699,289 UART: [art] SIG.R = F90D08C0FAA34738774681F3D5461E2A5A10FC28854EB83327FACB7DD8A2DE95D6C6CA452C2BC6CBE382590FE6EECAE7
39,706,706 UART: [art] SIG.S = C01F2DA19CD34DBCEF9678685F5AAD65DDC6D8D8243F6DAFB9630E87D657E522F9D0355B0C8AD42AB9909F6FF6590B0B
40,685,545 UART: Caliptra RT
40,686,245 UART: [state] CFI Enabled
43,454,304 UART: Disable attest DPE used context limit breach
43,456,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,457,379 UART: [rt] RT listening for mailbox commands...
43,488,783 UART: [rt]cmd =0x494e464f, len=4
43,492,740 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,819 UART: [kat] SHA2-256
881,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,865 UART: [kat] ++
886,017 UART: [kat] sha1
890,327 UART: [kat] SHA2-256
892,265 UART: [kat] SHA2-384
895,018 UART: [kat] SHA2-512-ACC
896,919 UART: [kat] ECC-384
902,476 UART: [kat] HMAC-384Kdf
907,034 UART: [kat] LMS
1,475,230 UART: [kat] --
1,476,139 UART: [cold-reset] ++
1,476,655 UART: [fht] Storing FHT @ 0x50003400
1,479,544 UART: [idev] ++
1,479,712 UART: [idev] CDI.KEYID = 6
1,480,072 UART: [idev] SUBJECT.KEYID = 7
1,480,496 UART: [idev] UDS.KEYID = 0
1,480,841 ready_for_fw is high
1,480,841 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,384 UART: [idev] Erasing UDS.KEYID = 0
1,505,008 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,530 UART: [idev] --
1,514,689 UART: [ldev] ++
1,514,857 UART: [ldev] CDI.KEYID = 6
1,515,220 UART: [ldev] SUBJECT.KEYID = 5
1,515,646 UART: [ldev] AUTHORITY.KEYID = 7
1,516,109 UART: [ldev] FE.KEYID = 1
1,521,037 UART: [ldev] Erasing FE.KEYID = 1
1,546,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,080 UART: [ldev] --
1,585,385 UART: [fwproc] Waiting for Commands...
1,586,050 UART: [fwproc] Received command 0x46574c44
1,586,841 UART: [fwproc] Received Image of size 78704 bytes
2,478,047 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,972 >>> mbox cmd response: success
2,616,972 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,178 UART: [afmc] ++
2,618,346 UART: [afmc] CDI.KEYID = 6
2,618,708 UART: [afmc] SUBJECT.KEYID = 7
2,619,133 UART: [afmc] AUTHORITY.KEYID = 5
2,654,776 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,214 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,607 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,297 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,078 UART: [afmc] --
2,698,116 UART: [cold-reset] --
2,699,232 UART: [state] Locking Datavault
2,700,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,047 UART: [state] Locking ICCM
2,701,531 UART: [exit] Launching FMC @ 0x40000130
2,706,860 UART:
2,706,876 UART: Running Caliptra FMC ...
2,707,284 UART:
2,707,338 UART: [state] CFI Enabled
2,717,905 UART: [fht] FMC Alias Private Key: 7
2,826,524 UART: [art] Extend RT PCRs Done
2,826,952 UART: [art] Lock RT PCRs Done
2,828,112 UART: [art] Populate DV Done
2,836,313 UART: [fht] FMC Alias Private Key: 7
2,837,311 UART: [art] Derive CDI
2,837,591 UART: [art] Store in in slot 0x4
2,923,276 UART: [art] Derive Key Pair
2,923,636 UART: [art] Store priv key in slot 0x5
2,936,906 UART: [art] Derive Key Pair - Done
2,951,636 UART: [art] Signing Cert with AUTHO
2,952,116 UART: RITY.KEYID = 7
2,967,292 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,057 UART: [art] PUB.X = 7C956A58D66E1E09D53B3112F903EFCE4DB036CE7014E7AA4D9DB68C3CB728AF9FF5BCFA578421DB464B6461D93732C8
2,974,835 UART: [art] PUB.Y = 49FE2C64F8C0C441120B9D847B2DAC31D7450C9751BD3951BD5B21A438847EE07380907C81C19431A2F4748BFC706178
2,981,775 UART: [art] SIG.R = 3A761552D225A48D0141154626485E884F169EA9BAE42ED2EB9C643EB70CC41C807A202D60402E5D5DA12A96E8E9C3C5
2,988,541 UART: [art] SIG.S = 9435437131566CE05FEC6AAFCC87A184CCE492544DCACDB3B88EA951CA4C4C424BC431EE8A8346B74EB8AA2A45B4D7D2
3,012,044 UART: mbox::rt_entry...
3,012,416 UART: ____ _ _ _ ____ _____
3,013,200 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,000 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,768 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,536 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,304 UART: |_|
3,016,616 UART:
3,124,386 UART: [rt] Runtime listening for mailbox commands...
3,129,354 >>> mbox cmd response data (3272 bytes)
3,129,355 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,152,441 >>> mbox cmd response data (0 bytes)
3,152,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,152,562 UART:
3,152,578 UART: Running Caliptra ROM ...
3,152,986 UART:
3,153,040 UART: [state] CFI Enabled
3,155,716 UART: [state] LifecycleState = Unprovisioned
3,156,371 UART: [state] DebugLocked = No
3,157,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,158,564 UART: [kat] SHA2-256
3,952,495 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,956,610 UART: [kat] ++
3,956,762 UART: [kat] sha1
3,961,160 UART: [kat] SHA2-256
3,963,098 UART: [kat] SHA2-384
3,965,785 UART: [kat] SHA2-512-ACC
3,967,685 UART: [kat] ECC-384
3,973,108 UART: [kat] HMAC-384Kdf
3,977,676 UART: [kat] LMS
4,545,872 UART: [kat] --
4,546,795 UART: [update-reset] ++
5,882,256 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,883,494 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,033,544 >>> mbox cmd response: success
6,033,847 UART: [update-reset] Copying MAN_2 To MAN_1
6,041,861 UART: [update-reset Success] --
6,042,794 UART: [state] Locking Datavault
6,043,482 UART: [state] Locking PCR0, PCR1 and PCR31
6,044,086 UART: [state] Locking ICCM
6,044,578 UART: [exit] Launching FMC @ 0x40000130
6,049,907 UART:
6,049,923 UART: Running Caliptra FMC ...
6,050,331 UART:
6,050,385 UART: [state] CFI Enabled
6,139,670 UART: [art] Extend RT PCRs Done
6,140,098 UART: [art] Lock RT PCRs Done
6,141,495 UART: [art] Populate DV Done
6,149,830 UART: [fht] FMC Alias Private Key: 7
6,150,794 UART: [art] Derive CDI
6,151,074 UART: [art] Store in in slot 0x4
6,236,637 UART: [art] Derive Key Pair
6,236,997 UART: [art] Store priv key in slot 0x5
6,250,173 UART: [art] Derive Key Pair - Done
6,265,078 UART: [art] Signing Cert with AUTHO
6,265,558 UART: RITY.KEYID = 7
6,280,872 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,637 UART: [art] PUB.X = 0F05A72AEA0E537F95C9444F649C78CD19D8209988DD00F7282AA74C4FF8AEC1D64F81B949A4E8782D08C7DD7CFE83AB
6,288,387 UART: [art] PUB.Y = CC2FD574CEB7C66BD1F1A07073302065BA1E16113A3EDFFDABE041AD3688614A73AB5D6AE6E30971612B032FE20D8131
6,295,340 UART: [art] SIG.R = B01477909ADFB47BDDF33849F9AD8FC609CA150543AF2433DD6DEC3577A04622A8C53D8F1437B7330882007B11C0F3E2
6,302,083 UART: [art] SIG.S = 5B91E9B169BAF72C820C1F6003A0D8668A8A4A9885A8B5A3FBE8641DCF1F899575B9D5064567C56DD5B072D54F0A6BB0
6,325,842 UART: Caliptra RT
6,326,095 UART: [state] CFI Enabled
6,619,138 UART: Disable attest DPE used context limit breach
6,619,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,621,221 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,651,841 UART: [rt]cmd =0x494e464f, len=4
6,655,040 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,337 ready_for_fw is high
1,362,337 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,466,800 >>> mbox cmd response: success
2,466,800 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,542 UART:
2,527,558 UART: Running Caliptra FMC ...
2,527,966 UART:
2,528,020 UART: [state] CFI Enabled
2,538,581 UART: [fht] FMC Alias Private Key: 7
2,646,694 UART: [art] Extend RT PCRs Done
2,647,122 UART: [art] Lock RT PCRs Done
2,648,936 UART: [art] Populate DV Done
2,657,273 UART: [fht] FMC Alias Private Key: 7
2,658,205 UART: [art] Derive CDI
2,658,485 UART: [art] Store in in slot 0x4
2,744,194 UART: [art] Derive Key Pair
2,744,554 UART: [art] Store priv key in slot 0x5
2,757,334 UART: [art] Derive Key Pair - Done
2,772,075 UART: [art] Signing Cert with AUTHO
2,772,555 UART: RITY.KEYID = 7
2,787,963 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,728 UART: [art] PUB.X = B7FE714CDDEFC465AABB23127EFEA336B76BDACB727DABB0E1D8BD9B72F7398235286C5B4834D3EDF12BB48ACD342326
2,795,524 UART: [art] PUB.Y = 17C52C831CABE3FC89E03C52C57892959ADCC77C17BDCC05CDFBF8BC23A374EDC9A146A3D7FD7B7E8A52B70F973C6DC4
2,802,494 UART: [art] SIG.R = D7F1E81969D32F3BB8BCAE22CBD8461BC2EEFEAE0A7017978F0A2A01871E47AE2A02C9C736CB4AB74D762FFA1093580C
2,809,269 UART: [art] SIG.S = CDF8A4992D7A660D0BD65847A8AEC3EDA51C522F5B00AC46EE7C2A09D2449D4E3CCD87CC925BFBDCDF07DD6A501670BA
2,833,462 UART: mbox::rt_entry...
2,833,834 UART: ____ _ _ _ ____ _____
2,834,618 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,418 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,186 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,954 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,722 UART: |_|
2,838,034 UART:
2,945,871 UART: [rt] Runtime listening for mailbox commands...
2,950,839 >>> mbox cmd response data (3272 bytes)
2,950,840 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,973,926 >>> mbox cmd response data (0 bytes)
2,973,927 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,736,029 >>> mbox cmd response: success
5,749,422 UART:
5,749,438 UART: Running Caliptra FMC ...
5,749,846 UART:
5,749,900 UART: [state] CFI Enabled
5,838,587 UART: [art] Extend RT PCRs Done
5,839,015 UART: [art] Lock RT PCRs Done
5,840,276 UART: [art] Populate DV Done
5,848,433 UART: [fht] FMC Alias Private Key: 7
5,849,595 UART: [art] Derive CDI
5,849,875 UART: [art] Store in in slot 0x4
5,935,506 UART: [art] Derive Key Pair
5,935,866 UART: [art] Store priv key in slot 0x5
5,948,456 UART: [art] Derive Key Pair - Done
5,962,977 UART: [art] Signing Cert with AUTHO
5,963,457 UART: RITY.KEYID = 7
5,978,769 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,534 UART: [art] PUB.X = B6A3C001484955C37D1E4AE052227BA412369DDE6CF4EBC40519CE1D3956DA16FB172532B9999981968E4B690EA4B2D3
5,986,297 UART: [art] PUB.Y = 8BDD36CBCA6ACB27C54FDE5AA01502CDBEBCC93348909FD960179D9643A4E810AC6986346162C17D33B378D76A762082
5,993,252 UART: [art] SIG.R = 489DE347BC9AC85FC4DA1C56568B48AE66E66266E8B03E7A5AD5EC1375CB4A06F90399AB94B04DB48D4C880EB6100AF8
6,000,024 UART: [art] SIG.S = 70C045875ED54FC24FF097991F3D4E4AEFB45D549B7D1FDE262BDB2588DF44B11A8EBFBBD0346C90507F1955D215FEC4
6,024,327 UART: Caliptra RT
6,024,580 UART: [state] CFI Enabled
6,317,340 UART: Disable attest DPE used context limit breach
6,318,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,319,451 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,349,951 UART: [rt]cmd =0x494e464f, len=4
6,353,170 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,280 UART: [kat] SHA2-256
882,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,326 UART: [kat] ++
886,478 UART: [kat] sha1
890,608 UART: [kat] SHA2-256
892,546 UART: [kat] SHA2-384
895,075 UART: [kat] SHA2-512-ACC
896,976 UART: [kat] ECC-384
902,589 UART: [kat] HMAC-384Kdf
907,415 UART: [kat] LMS
1,475,611 UART: [kat] --
1,476,358 UART: [cold-reset] ++
1,476,840 UART: [fht] Storing FHT @ 0x50003400
1,479,677 UART: [idev] ++
1,479,845 UART: [idev] CDI.KEYID = 6
1,480,205 UART: [idev] SUBJECT.KEYID = 7
1,480,629 UART: [idev] UDS.KEYID = 0
1,480,974 ready_for_fw is high
1,480,974 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,488,777 UART: [idev] Erasing UDS.KEYID = 0
1,505,503 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,019 UART: [idev] --
1,514,844 UART: [ldev] ++
1,515,012 UART: [ldev] CDI.KEYID = 6
1,515,375 UART: [ldev] SUBJECT.KEYID = 5
1,515,801 UART: [ldev] AUTHORITY.KEYID = 7
1,516,264 UART: [ldev] FE.KEYID = 1
1,521,550 UART: [ldev] Erasing FE.KEYID = 1
1,546,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,603 UART: [ldev] --
1,585,958 UART: [fwproc] Waiting for Commands...
1,586,579 UART: [fwproc] Received command 0x46574c44
1,587,370 UART: [fwproc] Received Image of size 78704 bytes
2,477,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,124 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,476 UART: [fwproc] Loading Runtime at address 0x40005000 len 54020
2,616,893 >>> mbox cmd response: success
2,616,893 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,105 UART: [afmc] ++
2,618,273 UART: [afmc] CDI.KEYID = 6
2,618,635 UART: [afmc] SUBJECT.KEYID = 7
2,619,060 UART: [afmc] AUTHORITY.KEYID = 5
2,653,957 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,109 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,617 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,502 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,192 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,053 UART: [afmc] --
2,697,127 UART: [cold-reset] --
2,697,807 UART: [state] Locking Datavault
2,698,886 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,490 UART: [state] Locking ICCM
2,700,154 UART: [exit] Launching FMC @ 0x40000130
2,705,483 UART:
2,705,499 UART: Running Caliptra FMC ...
2,705,907 UART:
2,706,050 UART: [state] CFI Enabled
2,716,509 UART: [fht] FMC Alias Private Key: 7
2,823,994 UART: [art] Extend RT PCRs Done
2,824,422 UART: [art] Lock RT PCRs Done
2,825,918 UART: [art] Populate DV Done
2,834,209 UART: [fht] FMC Alias Private Key: 7
2,835,217 UART: [art] Derive CDI
2,835,497 UART: [art] Store in in slot 0x4
2,921,256 UART: [art] Derive Key Pair
2,921,616 UART: [art] Store priv key in slot 0x5
2,934,218 UART: [art] Derive Key Pair - Done
2,948,842 UART: [art] Signing Cert with AUTHO
2,949,322 UART: RITY.KEYID = 7
2,964,418 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,183 UART: [art] PUB.X = 78A8FF954D1A502D4272295C9F5633927D88F07C91BAAD7E54D4A2935EF6D95E30710F1FB8FE6D43FAF75DD642050F17
2,971,950 UART: [art] PUB.Y = 3D58EC86B449EFBE692D58629D5B49F8E5331A16014A52C9B3860F6917E216E5C73C880F93A4EFB1F0543708149A0B4A
2,978,885 UART: [art] SIG.R = 5675F9D036B772C1AF6068A56143CF055496F3E0695FC3ED62D5C60B1A9F2728102353651BF94E4D239B2934AA3EF95E
2,985,647 UART: [art] SIG.S = E2B88897A8E87EC5F95A7446401E1FA14A67DEE36BDA89959637161C18621F8F8437E5B0223A943D7FAE019A9A89DD68
3,008,923 UART: mbox::rt_entry...
3,009,295 UART: ____ _ _ _ ____ _____
3,010,079 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,010,879 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,011,647 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,415 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,183 UART: |_|
3,013,495 UART:
3,119,875 UART: [rt] Runtime listening for mailbox commands...
3,124,843 >>> mbox cmd response data (3272 bytes)
3,124,844 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,147,930 >>> mbox cmd response data (0 bytes)
3,147,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,148,051 UART:
3,148,067 UART: Running Caliptra ROM ...
3,148,475 UART:
3,148,616 UART: [state] CFI Enabled
3,151,428 UART: [state] LifecycleState = Unprovisioned
3,152,083 UART: [state] DebugLocked = No
3,152,729 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,154,390 UART: [kat] SHA2-256
3,948,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,952,436 UART: [kat] ++
3,952,588 UART: [kat] sha1
3,956,808 UART: [kat] SHA2-256
3,958,746 UART: [kat] SHA2-384
3,961,521 UART: [kat] SHA2-512-ACC
3,963,421 UART: [kat] ECC-384
3,969,336 UART: [kat] HMAC-384Kdf
3,973,768 UART: [kat] LMS
4,541,964 UART: [kat] --
4,542,933 UART: [update-reset] ++
5,879,583 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,880,675 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
6,030,725 >>> mbox cmd response: success
6,030,940 UART: [update-reset] Copying MAN_2 To MAN_1
6,038,954 UART: [update-reset Success] --
6,040,117 UART: [state] Locking Datavault
6,040,961 UART: [state] Locking PCR0, PCR1 and PCR31
6,041,565 UART: [state] Locking ICCM
6,042,181 UART: [exit] Launching FMC @ 0x40000130
6,047,510 UART:
6,047,526 UART: Running Caliptra FMC ...
6,047,934 UART:
6,048,077 UART: [state] CFI Enabled
6,137,566 UART: [art] Extend RT PCRs Done
6,137,994 UART: [art] Lock RT PCRs Done
6,139,545 UART: [art] Populate DV Done
6,147,996 UART: [fht] FMC Alias Private Key: 7
6,149,080 UART: [art] Derive CDI
6,149,360 UART: [art] Store in in slot 0x4
6,234,769 UART: [art] Derive Key Pair
6,235,129 UART: [art] Store priv key in slot 0x5
6,248,511 UART: [art] Derive Key Pair - Done
6,263,310 UART: [art] Signing Cert with AUTHO
6,263,790 UART: RITY.KEYID = 7
6,279,220 UART: [art] Erasing AUTHORITY.KEYID = 7
6,279,985 UART: [art] PUB.X = 46EF9EDB47A84FC68DF88B9096B9D41EF71579CD2AF98A006838CEE5A461762F0D30779C845A97051869DA9B6F0DE98C
6,286,732 UART: [art] PUB.Y = 991C7C952E12F0E5AD62530660D969CFD16823AC3FF3FF0D6DFD76C3B0FAC65B98EDC9306E1B1DE46F7F39754F95B270
6,293,690 UART: [art] SIG.R = 72BB57B028951BFE6A85FCA6FD9050BA4DF38ABCD5917060BD1D0BA379EF6C64B259C48A611ED791A7E45A3993EC7615
6,300,471 UART: [art] SIG.S = 9FF04309B2EBA01E77D06CC76CF07F564A093595F56DA025C1F229325E9608F8F5D15AAD1205A4E0AA375B84CC0E8FB1
6,323,735 UART: Caliptra RT
6,324,080 UART: [state] CFI Enabled
6,618,803 UART: Disable attest DPE used context limit breach
6,619,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,620,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,651,216 UART: [rt]cmd =0x494e464f, len=4
6,654,717 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,636 ready_for_fw is high
1,362,636 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,467,425 >>> mbox cmd response: success
2,467,425 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,529,401 UART:
2,529,417 UART: Running Caliptra FMC ...
2,529,825 UART:
2,529,968 UART: [state] CFI Enabled
2,540,515 UART: [fht] FMC Alias Private Key: 7
2,648,740 UART: [art] Extend RT PCRs Done
2,649,168 UART: [art] Lock RT PCRs Done
2,650,310 UART: [art] Populate DV Done
2,658,385 UART: [fht] FMC Alias Private Key: 7
2,659,359 UART: [art] Derive CDI
2,659,639 UART: [art] Store in in slot 0x4
2,745,486 UART: [art] Derive Key Pair
2,745,846 UART: [art] Store priv key in slot 0x5
2,759,422 UART: [art] Derive Key Pair - Done
2,774,279 UART: [art] Signing Cert with AUTHO
2,774,759 UART: RITY.KEYID = 7
2,790,131 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,896 UART: [art] PUB.X = EB8D7D3E095A2386CDC99DB726A8273076FFE13C0B8314A8066B19245BD4EA21F1B1237BCB709101D2460C541D0E53CB
2,797,654 UART: [art] PUB.Y = 02A727B039108402DF48E6A0B5F3155C1D747B5B21AF7A60AEB90CD783BF3BF47F981939E1F5439B1DE5CB40C5764432
2,804,599 UART: [art] SIG.R = 1DBB126A08BE80C1F142B43023B76DC9D4D5741D516253EEFB0C67208E378119EFA299D33F7CAD534B17150B1750E84C
2,811,364 UART: [art] SIG.S = F89B65B6DF7F1AA7C8880356D843004B5C9B39D8D00415FA0A49FD2DC0AC5602DB7B32D1D229B65B4140FDC87F75F493
2,834,821 UART: mbox::rt_entry...
2,835,193 UART: ____ _ _ _ ____ _____
2,835,977 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,777 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,545 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,313 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,081 UART: |_|
2,839,393 UART:
2,947,209 UART: [rt] Runtime listening for mailbox commands...
2,952,177 >>> mbox cmd response data (3272 bytes)
2,952,178 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,975,264 >>> mbox cmd response data (0 bytes)
2,975,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,739,218 >>> mbox cmd response: success
5,752,761 UART:
5,752,777 UART: Running Caliptra FMC ...
5,753,185 UART:
5,753,328 UART: [state] CFI Enabled
5,842,513 UART: [art] Extend RT PCRs Done
5,842,941 UART: [art] Lock RT PCRs Done
5,844,346 UART: [art] Populate DV Done
5,852,891 UART: [fht] FMC Alias Private Key: 7
5,853,869 UART: [art] Derive CDI
5,854,149 UART: [art] Store in in slot 0x4
5,940,112 UART: [art] Derive Key Pair
5,940,472 UART: [art] Store priv key in slot 0x5
5,954,086 UART: [art] Derive Key Pair - Done
5,968,629 UART: [art] Signing Cert with AUTHO
5,969,109 UART: RITY.KEYID = 7
5,984,093 UART: [art] Erasing AUTHORITY.KEYID = 7
5,984,858 UART: [art] PUB.X = 0CAC26EE0B2FA0EA1CC8708FCEFC23397BEC7FD9B6C0F4CB219A7A487087A9B40B53E7C22AE264C10E2E8A77F428AC58
5,991,640 UART: [art] PUB.Y = 4A61778E63877CE2AFF481A59B6992B0B3B58FD383EFF57FE88182C4F3F4CE1B10EADC411B7707C671DC58501D9A14B5
5,998,597 UART: [art] SIG.R = 81193B7A033154548A2E3844FB91BA3CD8328A47C1447DF5BDAF7DCE454460E8EB45BF299E6CB256CE572EA77BEE4379
6,005,374 UART: [art] SIG.S = 1A68D0BB6A14B286852CFE9EB527EDAA3EF3E495E13B36105C2F70A6D184DBF34ABE593D56E3B3B073A641415A774AF6
6,028,843 UART: Caliptra RT
6,029,188 UART: [state] CFI Enabled
6,320,801 UART: Disable attest DPE used context limit breach
6,321,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,322,738 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,352,930 UART: [rt]cmd =0x494e464f, len=4
6,356,181 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
892,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,961 UART: [kat] ++
897,113 UART: [kat] sha1
901,153 UART: [kat] SHA2-256
903,093 UART: [kat] SHA2-384
905,890 UART: [kat] SHA2-512-ACC
907,791 UART: [kat] ECC-384
917,408 UART: [kat] HMAC-384Kdf
921,782 UART: [kat] LMS
1,170,110 UART: [kat] --
1,171,255 UART: [cold-reset] ++
1,171,771 UART: [fht] FHT @ 0x50003400
1,174,448 UART: [idev] ++
1,174,616 UART: [idev] CDI.KEYID = 6
1,174,976 UART: [idev] SUBJECT.KEYID = 7
1,175,400 UART: [idev] UDS.KEYID = 0
1,175,745 ready_for_fw is high
1,175,745 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,280 UART: [idev] Erasing UDS.KEYID = 0
1,200,023 UART: [idev] Sha1 KeyId Algorithm
1,208,481 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,920 UART: [ldev] SUBJECT.KEYID = 5
1,210,346 UART: [ldev] AUTHORITY.KEYID = 7
1,210,809 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,241,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,731 UART: [ldev] --
1,281,046 UART: [fwproc] Wait for Commands...
1,281,808 UART: [fwproc] Recv command 0x46574c44
1,282,536 UART: [fwproc] Recv'd Img size: 78704 bytes
2,172,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,906 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,210 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,310,575 >>> mbox cmd response: success
2,310,575 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,733 UART: [afmc] ++
2,311,901 UART: [afmc] CDI.KEYID = 6
2,312,263 UART: [afmc] SUBJECT.KEYID = 7
2,312,688 UART: [afmc] AUTHORITY.KEYID = 5
2,348,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,180 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,908 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,793 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,512 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,350 UART: [afmc] --
2,392,456 UART: [cold-reset] --
2,393,450 UART: [state] Locking Datavault
2,394,787 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,391 UART: [state] Locking ICCM
2,396,061 UART: [exit] Launching FMC @ 0x40000130
2,401,390 UART:
2,401,406 UART: Running Caliptra FMC ...
2,401,814 UART:
2,401,868 UART: [state] CFI Enabled
2,412,343 UART: [fht] FMC Alias Private Key: 7
2,520,402 UART: [art] Extend RT PCRs Done
2,520,830 UART: [art] Lock RT PCRs Done
2,522,392 UART: [art] Populate DV Done
2,530,723 UART: [fht] FMC Alias Private Key: 7
2,531,795 UART: [art] Derive CDI
2,532,075 UART: [art] Store in in slot 0x4
2,617,542 UART: [art] Derive Key Pair
2,617,902 UART: [art] Store priv key in slot 0x5
2,631,154 UART: [art] Derive Key Pair - Done
2,645,893 UART: [art] Signing Cert with AUTHO
2,646,373 UART: RITY.KEYID = 7
2,661,953 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,718 UART: [art] PUB.X = 3633187034EEF91D2DA978BD41CDDFC425988605639215643EE68EA2B2BDAA25E89484AE50228AD78E76660DE5CD1103
2,669,481 UART: [art] PUB.Y = 715FF3C7725971B1C43730150AFE51B565F531E43D8E82B9C2E34C66A09552181D006063241A7D82A2F3B7445710A2C1
2,676,396 UART: [art] SIG.R = 8A1DCBE1EAE762694206F718D82573228432A55D4DFBE04090A85FB290797AD9CD95857D49AA370941D132A9A2C556E1
2,683,160 UART: [art] SIG.S = 3FDC7C29303E9A564886D611AD60FCB69F376AF98A62193520E54D9D0E824BDACD78B26631EF345B01562EC085DE6CFE
2,706,885 UART: mbox::rt_entry...
2,707,257 UART: ____ _ _ _ ____ _____
2,708,041 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,841 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,609 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,377 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,145 UART: |_|
2,711,457 UART:
2,818,717 UART: [rt] Runtime listening for mailbox commands...
2,823,685 >>> mbox cmd response data (3272 bytes)
2,823,686 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,772 >>> mbox cmd response data (0 bytes)
2,846,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,846,890 UART:
2,846,906 UART: Running Caliptra ROM ...
2,847,314 UART:
2,847,369 UART: [state] CFI Enabled
2,850,055 UART: [state] LifecycleState = Unprovisioned
2,850,710 UART: [state] DebugLocked = No
2,851,440 UART: [state] WD Timer not started. Device not locked for debugging
2,852,754 UART: [kat] SHA2-256
3,658,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,662,529 UART: [kat] ++
3,662,681 UART: [kat] sha1
3,667,007 UART: [kat] SHA2-256
3,668,947 UART: [kat] SHA2-384
3,671,796 UART: [kat] SHA2-512-ACC
3,673,696 UART: [kat] ECC-384
3,683,459 UART: [kat] HMAC-384Kdf
3,688,163 UART: [kat] LMS
3,936,491 UART: [kat] --
3,937,209 UART: [update-reset] ++
5,251,772 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,252,969 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,402,967 >>> mbox cmd response: success
5,403,212 UART: [update-reset] Copying MAN_2 To MAN_1
5,411,226 UART: [update-reset Success] --
5,412,359 UART: [state] Locking Datavault
5,413,055 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,659 UART: [state] Locking ICCM
5,414,315 UART: [exit] Launching FMC @ 0x40000130
5,419,644 UART:
5,419,660 UART: Running Caliptra FMC ...
5,420,068 UART:
5,420,122 UART: [state] CFI Enabled
5,509,217 UART: [art] Extend RT PCRs Done
5,509,645 UART: [art] Lock RT PCRs Done
5,510,816 UART: [art] Populate DV Done
5,519,379 UART: [fht] FMC Alias Private Key: 7
5,520,329 UART: [art] Derive CDI
5,520,609 UART: [art] Store in in slot 0x4
5,606,194 UART: [art] Derive Key Pair
5,606,554 UART: [art] Store priv key in slot 0x5
5,619,498 UART: [art] Derive Key Pair - Done
5,633,947 UART: [art] Signing Cert with AUTHO
5,634,427 UART: RITY.KEYID = 7
5,649,289 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,054 UART: [art] PUB.X = ED96C3E212AEBD837F2A64C0F5CAC61AA378507DDB9664A153065D51CABF453259A5A3626AA621D04EF579D326C648E4
5,656,831 UART: [art] PUB.Y = F9636CF1ACCC1D06DB532120A8656C61998301268DC51A59B9918B551CACB61ED882052845049D9E4B202E8FFCF8B8A8
5,663,773 UART: [art] SIG.R = ECA6BB8D3A73AB42FB84B8B96C9DBD6C2BACB537B74848E4234F2B2E9073E9A19D348701F2507224A2390A5BBB8DD87C
5,670,553 UART: [art] SIG.S = DD64089192F3CFB91F49120FBA2B0B0A4A46663933CBDE5D861253AF0A397D06B49E02745183B4DAE845E200A087AAD2
5,694,507 UART: Caliptra RT
5,694,760 UART: [state] CFI Enabled
5,983,902 UART: Disable attest DPE used context limit breach
5,984,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,985,665 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,521 UART: [rt]cmd =0x494e464f, len=4
6,019,706 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,275 ready_for_fw is high
1,060,275 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,165,056 >>> mbox cmd response: success
2,165,056 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,888 UART:
2,226,904 UART: Running Caliptra FMC ...
2,227,312 UART:
2,227,366 UART: [state] CFI Enabled
2,238,233 UART: [fht] FMC Alias Private Key: 7
2,346,190 UART: [art] Extend RT PCRs Done
2,346,618 UART: [art] Lock RT PCRs Done
2,347,934 UART: [art] Populate DV Done
2,356,279 UART: [fht] FMC Alias Private Key: 7
2,357,389 UART: [art] Derive CDI
2,357,669 UART: [art] Store in in slot 0x4
2,443,394 UART: [art] Derive Key Pair
2,443,754 UART: [art] Store priv key in slot 0x5
2,456,798 UART: [art] Derive Key Pair - Done
2,471,519 UART: [art] Signing Cert with AUTHO
2,471,999 UART: RITY.KEYID = 7
2,487,175 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,940 UART: [art] PUB.X = A2E5E4ADCBCB5CE050975C5E3DBB4A37113E2BA441A78AD1E5FA4CB2AF00A634ECB1C47B52854AB6FB911212E352AD34
2,494,712 UART: [art] PUB.Y = 3033DBE6F10531D620514B6C7ABC556F24749F3C2D94EC6C2E2CF111C52B712835D56ECDCA7EBDA88D1527A3DDC9527E
2,501,673 UART: [art] SIG.R = 99854B48E3D32A36095854D8A5D4B718DED47F16611FB4D9FFB909F420DB4A6CCBBBA9B95BC8BBB80F76B96EAF830B72
2,508,449 UART: [art] SIG.S = C2F4C8CAC6DCA905374B4B18B69F2A322D4E68EBB3224037131E0C862C93DBFFAA4BF437995EC9B6693888DB412DDA37
2,531,922 UART: mbox::rt_entry...
2,532,294 UART: ____ _ _ _ ____ _____
2,533,078 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,878 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,646 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,414 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,182 UART: |_|
2,536,494 UART:
2,642,753 UART: [rt] Runtime listening for mailbox commands...
2,647,721 >>> mbox cmd response data (3272 bytes)
2,647,722 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,670,808 >>> mbox cmd response data (0 bytes)
2,670,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,109,806 >>> mbox cmd response: success
5,123,304 UART:
5,123,320 UART: Running Caliptra FMC ...
5,123,728 UART:
5,123,782 UART: [state] CFI Enabled
5,212,435 UART: [art] Extend RT PCRs Done
5,212,863 UART: [art] Lock RT PCRs Done
5,214,138 UART: [art] Populate DV Done
5,222,223 UART: [fht] FMC Alias Private Key: 7
5,223,203 UART: [art] Derive CDI
5,223,483 UART: [art] Store in in slot 0x4
5,309,284 UART: [art] Derive Key Pair
5,309,644 UART: [art] Store priv key in slot 0x5
5,322,438 UART: [art] Derive Key Pair - Done
5,337,470 UART: [art] Signing Cert with AUTHO
5,337,950 UART: RITY.KEYID = 7
5,353,218 UART: [art] Erasing AUTHORITY.KEYID = 7
5,353,983 UART: [art] PUB.X = 37D7C733C18B22E11557FCBE93641DDC8D63E1F4C63D0B9A280D0AE9906634EBBB0D5C1346F9EFD090868C711D0B1C66
5,360,748 UART: [art] PUB.Y = 9B29BAB2570E0C8BA01068EB0E8E725458C085E1C46613004F4865699AE098735F3EFCEC1F4623E671F414C5670605A8
5,367,657 UART: [art] SIG.R = 2BC95A59AEEEA431AB3762A5D0D369B7F1983080F9FF2086A8203DB1DD53864EBFF4C10990E501EBE6201858651F6483
5,374,425 UART: [art] SIG.S = 7DA27FB37BF39805F8092346DF2EDAA477F3604C3836433B5C5C90A04737F2FDD30AF021F20FF10B12EE0EC06662D180
5,398,376 UART: Caliptra RT
5,398,629 UART: [state] CFI Enabled
5,689,538 UART: Disable attest DPE used context limit breach
5,690,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,691,639 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,722,093 UART: [rt]cmd =0x494e464f, len=4
5,725,412 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
893,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,470 UART: [kat] ++
897,622 UART: [kat] sha1
901,834 UART: [kat] SHA2-256
903,774 UART: [kat] SHA2-384
906,645 UART: [kat] SHA2-512-ACC
908,546 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,171 UART: [kat] LMS
1,171,499 UART: [kat] --
1,172,300 UART: [cold-reset] ++
1,172,732 UART: [fht] FHT @ 0x50003400
1,175,625 UART: [idev] ++
1,175,793 UART: [idev] CDI.KEYID = 6
1,176,153 UART: [idev] SUBJECT.KEYID = 7
1,176,577 UART: [idev] UDS.KEYID = 0
1,176,922 ready_for_fw is high
1,176,922 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,184,787 UART: [idev] Erasing UDS.KEYID = 0
1,201,574 UART: [idev] Sha1 KeyId Algorithm
1,210,208 UART: [idev] --
1,211,108 UART: [ldev] ++
1,211,276 UART: [ldev] CDI.KEYID = 6
1,211,639 UART: [ldev] SUBJECT.KEYID = 5
1,212,065 UART: [ldev] AUTHORITY.KEYID = 7
1,212,528 UART: [ldev] FE.KEYID = 1
1,217,620 UART: [ldev] Erasing FE.KEYID = 1
1,244,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,356 UART: [ldev] --
1,283,715 UART: [fwproc] Wait for Commands...
1,284,407 UART: [fwproc] Recv command 0x46574c44
1,285,135 UART: [fwproc] Recv'd Img size: 78704 bytes
2,175,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,843 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,147 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,314,514 >>> mbox cmd response: success
2,314,514 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,315,752 UART: [afmc] ++
2,315,920 UART: [afmc] CDI.KEYID = 6
2,316,282 UART: [afmc] SUBJECT.KEYID = 7
2,316,707 UART: [afmc] AUTHORITY.KEYID = 5
2,352,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,253 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,981 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,866 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,585 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,489 UART: [afmc] --
2,395,571 UART: [cold-reset] --
2,396,339 UART: [state] Locking Datavault
2,397,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,088 UART: [state] Locking ICCM
2,398,750 UART: [exit] Launching FMC @ 0x40000130
2,404,079 UART:
2,404,095 UART: Running Caliptra FMC ...
2,404,503 UART:
2,404,646 UART: [state] CFI Enabled
2,415,105 UART: [fht] FMC Alias Private Key: 7
2,522,590 UART: [art] Extend RT PCRs Done
2,523,018 UART: [art] Lock RT PCRs Done
2,524,344 UART: [art] Populate DV Done
2,532,413 UART: [fht] FMC Alias Private Key: 7
2,533,407 UART: [art] Derive CDI
2,533,687 UART: [art] Store in in slot 0x4
2,619,350 UART: [art] Derive Key Pair
2,619,710 UART: [art] Store priv key in slot 0x5
2,632,690 UART: [art] Derive Key Pair - Done
2,647,332 UART: [art] Signing Cert with AUTHO
2,647,812 UART: RITY.KEYID = 7
2,663,514 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,279 UART: [art] PUB.X = BC26894C69FC23C49C47DA4C36B235454238F71461A1501D18889132E8CC1AC5950EEB67D97F1391727C2C91669E2EC3
2,671,042 UART: [art] PUB.Y = 47C7FDFB86E69C2DAE0CCF809052F13A13499AB8333100EAD73D1886A81AF15BE8361D024B33B54CBE614A20147D2715
2,677,970 UART: [art] SIG.R = D854DFDB4F79BAF0D079AB3C1E32A3F7D1723314A6EDF4CF51095FA771E07FE62042D595E1CE54943D41E37DC04E1BC7
2,684,753 UART: [art] SIG.S = 03B41F7BBA5DD31B6DED3672823A66A51C89886DDEF2D755B0B835E98F01D6F998ADC87114BE7D7C137EBEF04074D1DA
2,708,808 UART: mbox::rt_entry...
2,709,180 UART: ____ _ _ _ ____ _____
2,709,964 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,764 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,532 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,300 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,068 UART: |_|
2,713,380 UART:
2,820,536 UART: [rt] Runtime listening for mailbox commands...
2,825,504 >>> mbox cmd response data (3272 bytes)
2,825,505 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,591 >>> mbox cmd response data (0 bytes)
2,848,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,848,709 UART:
2,848,725 UART: Running Caliptra ROM ...
2,849,133 UART:
2,849,275 UART: [state] CFI Enabled
2,852,257 UART: [state] LifecycleState = Unprovisioned
2,852,912 UART: [state] DebugLocked = No
2,853,616 UART: [state] WD Timer not started. Device not locked for debugging
2,854,754 UART: [kat] SHA2-256
3,660,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,664,529 UART: [kat] ++
3,664,681 UART: [kat] sha1
3,668,931 UART: [kat] SHA2-256
3,670,871 UART: [kat] SHA2-384
3,673,536 UART: [kat] SHA2-512-ACC
3,675,436 UART: [kat] ECC-384
3,685,193 UART: [kat] HMAC-384Kdf
3,689,713 UART: [kat] LMS
3,938,041 UART: [kat] --
3,938,895 UART: [update-reset] ++
5,253,846 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,254,985 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,404,983 >>> mbox cmd response: success
5,405,228 UART: [update-reset] Copying MAN_2 To MAN_1
5,413,242 UART: [update-reset Success] --
5,414,425 UART: [state] Locking Datavault
5,415,317 UART: [state] Locking PCR0, PCR1 and PCR31
5,415,921 UART: [state] Locking ICCM
5,416,423 UART: [exit] Launching FMC @ 0x40000130
5,421,752 UART:
5,421,768 UART: Running Caliptra FMC ...
5,422,176 UART:
5,422,319 UART: [state] CFI Enabled
5,511,690 UART: [art] Extend RT PCRs Done
5,512,118 UART: [art] Lock RT PCRs Done
5,513,435 UART: [art] Populate DV Done
5,521,574 UART: [fht] FMC Alias Private Key: 7
5,522,606 UART: [art] Derive CDI
5,522,886 UART: [art] Store in in slot 0x4
5,608,841 UART: [art] Derive Key Pair
5,609,201 UART: [art] Store priv key in slot 0x5
5,622,239 UART: [art] Derive Key Pair - Done
5,637,109 UART: [art] Signing Cert with AUTHO
5,637,589 UART: RITY.KEYID = 7
5,652,743 UART: [art] Erasing AUTHORITY.KEYID = 7
5,653,508 UART: [art] PUB.X = A1CEC7E2F5BF05585654AE9F9624116C84517D9EE4ED45C36A024FBBF01B2D3F2311FE260CBFE7DB9604DCC8CDD39128
5,660,284 UART: [art] PUB.Y = 51E387A33F77753EEF2F271DB965256E26B670B28B43C40489AF273BE473F3EF5FBE616F17C38A76F138B933E5D87C42
5,667,233 UART: [art] SIG.R = 0A8FD8EDA400F2A535C58BFF3B113A587BADEC2036F79D270129E2C93F57EA7918B313AA7DFC0607B6D5E9D3AC08B187
5,673,982 UART: [art] SIG.S = DC1D3D97CDDE3F10E3801AAE4E5503D1BFB0E4F30C8F1B94E76F074606E975559C0A316543B87B35C263806EDBAC6B60
5,697,678 UART: Caliptra RT
5,698,023 UART: [state] CFI Enabled
5,993,158 UART: Disable attest DPE used context limit breach
5,993,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,995,371 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,025,767 UART: [rt]cmd =0x494e464f, len=4
6,029,098 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,310 ready_for_fw is high
1,061,310 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,166,387 >>> mbox cmd response: success
2,166,387 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,228,405 UART:
2,228,421 UART: Running Caliptra FMC ...
2,228,829 UART:
2,228,972 UART: [state] CFI Enabled
2,239,689 UART: [fht] FMC Alias Private Key: 7
2,347,740 UART: [art] Extend RT PCRs Done
2,348,168 UART: [art] Lock RT PCRs Done
2,349,890 UART: [art] Populate DV Done
2,358,253 UART: [fht] FMC Alias Private Key: 7
2,359,337 UART: [art] Derive CDI
2,359,617 UART: [art] Store in in slot 0x4
2,445,258 UART: [art] Derive Key Pair
2,445,618 UART: [art] Store priv key in slot 0x5
2,459,192 UART: [art] Derive Key Pair - Done
2,473,986 UART: [art] Signing Cert with AUTHO
2,474,466 UART: RITY.KEYID = 7
2,489,346 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,111 UART: [art] PUB.X = D556C5C9F07CC6AA57BBCAA335E8C809689CC5DFFB3066D382EA06BD7D9903BE25BB0BFF05246500387022E32C24ABEC
2,496,862 UART: [art] PUB.Y = A2016D4438B129623B710558A08DC4EAAB75F8C41B6FA27E5FCBD1296784493192B4C03024AF8C6403ADF78FB4D5F3BF
2,503,811 UART: [art] SIG.R = 5C35E39DB1478439AA1DB6BC6748BAD7429DDB0278A13C1B13C744A04C34C7609F8853C38ED6BDB0526B098449FC02C7
2,510,578 UART: [art] SIG.S = 55E10B5B223730F62A28819D01496C6AD5A588919A0B9918010BA7A1274FA2BC2D14B5978047D72B446C05014BD022EE
2,534,126 UART: mbox::rt_entry...
2,534,498 UART: ____ _ _ _ ____ _____
2,535,282 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,082 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,850 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,618 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,386 UART: |_|
2,538,698 UART:
2,644,658 UART: [rt] Runtime listening for mailbox commands...
2,649,626 >>> mbox cmd response data (3272 bytes)
2,649,627 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,672,713 >>> mbox cmd response data (0 bytes)
2,672,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,112,292 >>> mbox cmd response: success
5,126,082 UART:
5,126,098 UART: Running Caliptra FMC ...
5,126,506 UART:
5,126,649 UART: [state] CFI Enabled
5,216,022 UART: [art] Extend RT PCRs Done
5,216,450 UART: [art] Lock RT PCRs Done
5,217,763 UART: [art] Populate DV Done
5,226,422 UART: [fht] FMC Alias Private Key: 7
5,227,512 UART: [art] Derive CDI
5,227,792 UART: [art] Store in in slot 0x4
5,313,555 UART: [art] Derive Key Pair
5,313,915 UART: [art] Store priv key in slot 0x5
5,327,433 UART: [art] Derive Key Pair - Done
5,342,075 UART: [art] Signing Cert with AUTHO
5,342,555 UART: RITY.KEYID = 7
5,357,647 UART: [art] Erasing AUTHORITY.KEYID = 7
5,358,412 UART: [art] PUB.X = E1270E0AA9537FE38C3864CA00E05E645DD58A49191F847F4328D7732A4B11EE6AEBF03662A8CBD43D6FB21BAE046D6B
5,365,163 UART: [art] PUB.Y = 01716FD08162FF1A99B7A8914787E760345E77B8D04ACCD9AAD44B2F27C42EC9A9E21C81EC951F0788E8E54514071EE8
5,372,108 UART: [art] SIG.R = FEE2CF19BEC29958288DB21A55D6D13FCDD7F492E1DD5C73BE125868DD2665665321D75D0C2A38DCD1DC27AB62C35199
5,378,889 UART: [art] SIG.S = 8F86BC03AA037108875895054F63CB023160A3C2177A5F5ACD60DC6A053C1662FA7CCED5044973627691F05D3D6250C2
5,403,113 UART: Caliptra RT
5,403,458 UART: [state] CFI Enabled
5,696,978 UART: Disable attest DPE used context limit breach
5,697,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,699,037 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,729,231 UART: [rt]cmd =0x494e464f, len=4
5,732,472 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,752 UART: [kat] HMAC-384Kdf
921,338 UART: [kat] LMS
1,169,650 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,171,115 UART: [fht] FHT @ 0x50003400
1,173,679 UART: [idev] ++
1,173,847 UART: [idev] CDI.KEYID = 6
1,174,208 UART: [idev] SUBJECT.KEYID = 7
1,174,633 UART: [idev] UDS.KEYID = 0
1,174,979 ready_for_fw is high
1,174,979 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,345 UART: [idev] Erasing UDS.KEYID = 0
1,199,609 UART: [idev] Sha1 KeyId Algorithm
1,208,523 UART: [idev] --
1,209,616 UART: [ldev] ++
1,209,784 UART: [ldev] CDI.KEYID = 6
1,210,148 UART: [ldev] SUBJECT.KEYID = 5
1,210,575 UART: [ldev] AUTHORITY.KEYID = 7
1,211,038 UART: [ldev] FE.KEYID = 1
1,216,182 UART: [ldev] Erasing FE.KEYID = 1
1,242,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,582 UART: [ldev] --
1,282,048 UART: [fwproc] Wait for Commands...
1,282,771 UART: [fwproc] Recv command 0x46574c44
1,283,504 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,915 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,312,315 >>> mbox cmd response: success
2,312,315 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,422 UART: [afmc] ++
2,313,590 UART: [afmc] CDI.KEYID = 6
2,313,953 UART: [afmc] SUBJECT.KEYID = 7
2,314,379 UART: [afmc] AUTHORITY.KEYID = 5
2,350,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,107 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,836 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,719 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,438 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,327 UART: [afmc] --
2,393,231 UART: [cold-reset] --
2,394,231 UART: [state] Locking Datavault
2,395,214 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,818 UART: [state] Locking ICCM
2,396,250 UART: [exit] Launching FMC @ 0x40000130
2,401,579 UART:
2,401,595 UART: Running Caliptra FMC ...
2,402,003 UART:
2,402,057 UART: [state] CFI Enabled
2,412,436 UART: [fht] FMC Alias Private Key: 7
2,520,625 UART: [art] Extend RT PCRs Done
2,521,053 UART: [art] Lock RT PCRs Done
2,522,669 UART: [art] Populate DV Done
2,530,936 UART: [fht] FMC Alias Private Key: 7
2,532,032 UART: [art] Derive CDI
2,532,312 UART: [art] Store in in slot 0x4
2,617,889 UART: [art] Derive Key Pair
2,618,249 UART: [art] Store priv key in slot 0x5
2,631,525 UART: [art] Derive Key Pair - Done
2,646,357 UART: [art] Signing Cert with AUTHO
2,646,837 UART: RITY.KEYID = 7
2,662,557 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,322 UART: [art] PUB.X = EE45528098DB4D133EF851C7654897C1333C1332E1E269F440469FC50ED320AC73469645DEEEAF497F7E8E05031EA769
2,670,081 UART: [art] PUB.Y = F7F4B5611EB2FEAB3325444C6104A8F1B1DB9435A8269ADF004F90342B775B6E4C9E882C34F4BBAE51FCE01EF0D5A6C2
2,677,022 UART: [art] SIG.R = AD39AFFD5002F587C7E2EE7A5940CB3BEFAA28B1DB81376C855E30B2B497E2E9D751338BBE47CA446BF1B9D0BC21407F
2,683,809 UART: [art] SIG.S = 48FAA8100AC9FBD8E95C0DC3D1B03CE92D87A59576724DAA2E590F1F69145537A0CB08A9509C8EDED372AD4DF38A4335
2,707,424 UART: mbox::rt_entry...
2,707,796 UART: ____ _ _ _ ____ _____
2,708,580 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,380 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,148 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,916 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,684 UART: |_|
2,711,996 UART:
2,818,300 UART: [rt] Runtime listening for mailbox commands...
2,823,268 >>> mbox cmd response data (3272 bytes)
2,823,269 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,355 >>> mbox cmd response data (0 bytes)
2,846,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,846,473 UART:
2,846,489 UART: Running Caliptra ROM ...
2,846,897 UART:
2,846,952 UART: [state] CFI Enabled
2,849,750 UART: [state] LifecycleState = Unprovisioned
2,850,405 UART: [state] DebugLocked = No
2,851,051 UART: [state] WD Timer not started. Device not locked for debugging
2,852,259 UART: [kat] SHA2-256
3,655,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,938 UART: [kat] ++
3,660,090 UART: [kat] sha1
3,664,182 UART: [kat] SHA2-256
3,666,122 UART: [kat] SHA2-384
3,668,655 UART: [kat] SHA2-512-ACC
3,670,555 UART: [kat] ECC-384
3,680,136 UART: [kat] HMAC-384Kdf
3,684,738 UART: [kat] LMS
3,933,050 UART: [kat] --
3,934,066 UART: [update-reset] ++
5,246,500 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,561 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,397,559 >>> mbox cmd response: success
5,397,806 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,820 UART: [update-reset Success] --
5,406,781 UART: [state] Locking Datavault
5,407,661 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,265 UART: [state] Locking ICCM
5,408,915 UART: [exit] Launching FMC @ 0x40000130
5,414,244 UART:
5,414,260 UART: Running Caliptra FMC ...
5,414,668 UART:
5,414,722 UART: [state] CFI Enabled
5,503,855 UART: [art] Extend RT PCRs Done
5,504,283 UART: [art] Lock RT PCRs Done
5,505,712 UART: [art] Populate DV Done
5,514,017 UART: [fht] FMC Alias Private Key: 7
5,515,185 UART: [art] Derive CDI
5,515,465 UART: [art] Store in in slot 0x4
5,601,230 UART: [art] Derive Key Pair
5,601,590 UART: [art] Store priv key in slot 0x5
5,614,806 UART: [art] Derive Key Pair - Done
5,630,117 UART: [art] Signing Cert with AUTHO
5,630,597 UART: RITY.KEYID = 7
5,645,979 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,744 UART: [art] PUB.X = D53AEFAF2985A4471BC50D6D49DCC1813C4D3C8B2E392E5ACB2F5410C9DA0097E2876CAED92E2C61FAFCD59E8E9875EC
5,653,513 UART: [art] PUB.Y = 10A99A44C96D8F8F56603282C8C382C8560A50F83976ED56D4D8F06ADDBF53F0CAB9AAC81FD363A076D0000229850FC7
5,660,438 UART: [art] SIG.R = 3324A26E5D1E787D1E8A5D3B07CB6303463CC1EB5851B5A7C3F45E71F69AEB87C5C5E7B69413BD2D72BBBC49E60C9D28
5,667,213 UART: [art] SIG.S = BD3EFBCF1BF614A787A625D44F9F51EC96E51492E6D218684FE238769AA75A493E26B169961856C6CA1AD6DFF6C633D6
5,691,126 UART: Caliptra RT
5,691,379 UART: [state] CFI Enabled
5,978,794 UART: Disable attest DPE used context limit breach
5,979,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,980,691 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,011,147 UART: [rt]cmd =0x494e464f, len=4
6,014,390 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,918 ready_for_fw is high
1,055,918 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,162,107 >>> mbox cmd response: success
2,162,107 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,224,573 UART:
2,224,589 UART: Running Caliptra FMC ...
2,224,997 UART:
2,225,051 UART: [state] CFI Enabled
2,235,360 UART: [fht] FMC Alias Private Key: 7
2,343,105 UART: [art] Extend RT PCRs Done
2,343,533 UART: [art] Lock RT PCRs Done
2,344,971 UART: [art] Populate DV Done
2,353,168 UART: [fht] FMC Alias Private Key: 7
2,354,156 UART: [art] Derive CDI
2,354,436 UART: [art] Store in in slot 0x4
2,440,127 UART: [art] Derive Key Pair
2,440,487 UART: [art] Store priv key in slot 0x5
2,453,507 UART: [art] Derive Key Pair - Done
2,468,341 UART: [art] Signing Cert with AUTHO
2,468,821 UART: RITY.KEYID = 7
2,483,661 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,426 UART: [art] PUB.X = F9012BEC287E8F033289831F86333B0956177ED11BC1F918DD28DFF44B0AE7FD9E41DDF35519CFD6F1E7968F405426D6
2,491,190 UART: [art] PUB.Y = DA691CC427EA8035754691A4400DAEAD534B78EC44C5657B258C148250752175A635036C4E8D605C15E36BC422F7835C
2,498,128 UART: [art] SIG.R = 4899D2836D33CED0BD1C75840791906B4053A061FE881076B1E26F81958FBD47112CF52C90521F77F32E115CC68BA852
2,504,889 UART: [art] SIG.S = D7E70D82165C8CE06D9361A21DAD42F18F0C95352509477040230305B64557A7A443C9CD36F9099FBB86BDD3D13D5A38
2,528,366 UART: mbox::rt_entry...
2,528,738 UART: ____ _ _ _ ____ _____
2,529,522 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,090 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,858 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,626 UART: |_|
2,532,938 UART:
2,638,210 UART: [rt] Runtime listening for mailbox commands...
2,643,178 >>> mbox cmd response data (3272 bytes)
2,643,179 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,666,265 >>> mbox cmd response data (0 bytes)
2,666,266 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,099,898 >>> mbox cmd response: success
5,113,282 UART:
5,113,298 UART: Running Caliptra FMC ...
5,113,706 UART:
5,113,760 UART: [state] CFI Enabled
5,202,771 UART: [art] Extend RT PCRs Done
5,203,199 UART: [art] Lock RT PCRs Done
5,204,374 UART: [art] Populate DV Done
5,212,417 UART: [fht] FMC Alias Private Key: 7
5,213,431 UART: [art] Derive CDI
5,213,711 UART: [art] Store in in slot 0x4
5,299,434 UART: [art] Derive Key Pair
5,299,794 UART: [art] Store priv key in slot 0x5
5,313,004 UART: [art] Derive Key Pair - Done
5,327,871 UART: [art] Signing Cert with AUTHO
5,328,351 UART: RITY.KEYID = 7
5,343,467 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,232 UART: [art] PUB.X = 2DB19B65906E381759967EE76D7541F26A65CE29A56E35C40430704D7E4D9FB2E9D7F4202C484B8B84D9DD587C0796A5
5,350,994 UART: [art] PUB.Y = E375BD0465C038358623A915AFAAA5D7617D3A91B29ED28C6119C5300ADB0BCC57F3AEE2B243ADEF1FD9D005BC35505F
5,357,948 UART: [art] SIG.R = CA02B48D1B7F386B8BDF30D41C7D5325FE239F4A9AA27B55EC8CB838D48026F0CCA029849A65791B865EAFCB877C7307
5,364,724 UART: [art] SIG.S = E1139D80D2CF78A73AEB12BC8692C37C3DAAA716BC0D62516A74F5CC2F5377CEA740FB1539177502C8E4078A27A35D05
5,388,581 UART: Caliptra RT
5,388,834 UART: [state] CFI Enabled
5,680,388 UART: Disable attest DPE used context limit breach
5,681,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,682,457 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,713,071 UART: [rt]cmd =0x494e464f, len=4
5,716,324 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,725 UART: [kat] SHA2-256
891,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,404 UART: [kat] ++
895,556 UART: [kat] sha1
899,920 UART: [kat] SHA2-256
901,860 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,256 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,642 UART: [idev] ++
1,173,810 UART: [idev] CDI.KEYID = 6
1,174,171 UART: [idev] SUBJECT.KEYID = 7
1,174,596 UART: [idev] UDS.KEYID = 0
1,174,942 ready_for_fw is high
1,174,942 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,598 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,397 UART: [ldev] ++
1,209,565 UART: [ldev] CDI.KEYID = 6
1,209,929 UART: [ldev] SUBJECT.KEYID = 5
1,210,356 UART: [ldev] AUTHORITY.KEYID = 7
1,210,819 UART: [ldev] FE.KEYID = 1
1,216,199 UART: [ldev] Erasing FE.KEYID = 1
1,242,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,463 UART: [fwproc] Wait for Commands...
1,283,244 UART: [fwproc] Recv command 0x46574c44
1,283,977 UART: [fwproc] Recv'd Img size: 78704 bytes
2,173,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,359 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,668 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,311,964 >>> mbox cmd response: success
2,311,964 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,075 UART: [afmc] ++
2,313,243 UART: [afmc] CDI.KEYID = 6
2,313,606 UART: [afmc] SUBJECT.KEYID = 7
2,314,032 UART: [afmc] AUTHORITY.KEYID = 5
2,350,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,377 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,260 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,979 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,890 UART: [afmc] --
2,393,850 UART: [cold-reset] --
2,394,646 UART: [state] Locking Datavault
2,396,051 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,655 UART: [state] Locking ICCM
2,397,109 UART: [exit] Launching FMC @ 0x40000130
2,402,438 UART:
2,402,454 UART: Running Caliptra FMC ...
2,402,862 UART:
2,403,005 UART: [state] CFI Enabled
2,413,572 UART: [fht] FMC Alias Private Key: 7
2,522,045 UART: [art] Extend RT PCRs Done
2,522,473 UART: [art] Lock RT PCRs Done
2,523,913 UART: [art] Populate DV Done
2,532,356 UART: [fht] FMC Alias Private Key: 7
2,533,518 UART: [art] Derive CDI
2,533,798 UART: [art] Store in in slot 0x4
2,619,487 UART: [art] Derive Key Pair
2,619,847 UART: [art] Store priv key in slot 0x5
2,633,065 UART: [art] Derive Key Pair - Done
2,647,828 UART: [art] Signing Cert with AUTHO
2,648,308 UART: RITY.KEYID = 7
2,663,640 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,405 UART: [art] PUB.X = D95BCBF1AE89F9D06ACF073A98671CCD928E60B54958CCA0F8B869297CCD1EC64160F53C281041CDC6D35FBDA45D82CF
2,671,192 UART: [art] PUB.Y = 5E07395364FC51C894B355CA012FF0C0EA71CCB42B26089274622FA8326A4A00BB2B82FE62CDC66ACD18DE48FDA037AB
2,678,125 UART: [art] SIG.R = 0F949CC4645BD7031362E6AB72360EF47B091FF1965103CC00EC0B825FEA7A24C25C62B03CF72C95707E28C18507E991
2,684,852 UART: [art] SIG.S = 303C37CEAB0BADB7CAD1BDE8FDFA91E4B268BFB3056E550FF922A57163138E0807BDFB3B7357CBCD5A458846718315FC
2,708,414 UART: mbox::rt_entry...
2,708,786 UART: ____ _ _ _ ____ _____
2,709,570 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,370 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,138 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,906 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,674 UART: |_|
2,712,986 UART:
2,820,316 UART: [rt] Runtime listening for mailbox commands...
2,825,284 >>> mbox cmd response data (3272 bytes)
2,825,285 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,371 >>> mbox cmd response data (0 bytes)
2,848,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,848,489 UART:
2,848,505 UART: Running Caliptra ROM ...
2,848,913 UART:
2,849,055 UART: [state] CFI Enabled
2,851,893 UART: [state] LifecycleState = Unprovisioned
2,852,548 UART: [state] DebugLocked = No
2,853,116 UART: [state] WD Timer not started. Device not locked for debugging
2,854,428 UART: [kat] SHA2-256
3,657,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,662,107 UART: [kat] ++
3,662,259 UART: [kat] sha1
3,666,443 UART: [kat] SHA2-256
3,668,383 UART: [kat] SHA2-384
3,671,324 UART: [kat] SHA2-512-ACC
3,673,224 UART: [kat] ECC-384
3,683,039 UART: [kat] HMAC-384Kdf
3,687,719 UART: [kat] LMS
3,936,031 UART: [kat] --
3,936,893 UART: [update-reset] ++
5,250,863 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,920 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
5,401,918 >>> mbox cmd response: success
5,402,261 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,275 UART: [update-reset Success] --
5,411,506 UART: [state] Locking Datavault
5,412,218 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,822 UART: [state] Locking ICCM
5,413,306 UART: [exit] Launching FMC @ 0x40000130
5,418,635 UART:
5,418,651 UART: Running Caliptra FMC ...
5,419,059 UART:
5,419,202 UART: [state] CFI Enabled
5,508,503 UART: [art] Extend RT PCRs Done
5,508,931 UART: [art] Lock RT PCRs Done
5,510,282 UART: [art] Populate DV Done
5,518,375 UART: [fht] FMC Alias Private Key: 7
5,519,363 UART: [art] Derive CDI
5,519,643 UART: [art] Store in in slot 0x4
5,605,166 UART: [art] Derive Key Pair
5,605,526 UART: [art] Store priv key in slot 0x5
5,619,048 UART: [art] Derive Key Pair - Done
5,633,994 UART: [art] Signing Cert with AUTHO
5,634,474 UART: RITY.KEYID = 7
5,649,946 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,711 UART: [art] PUB.X = 36AF481D2C44C8E9FCB1F3F6CE5C487866F7A432698440F21B25DF42DDFA559866A59712B9679D332274AA04B40B1BF0
5,657,479 UART: [art] PUB.Y = E725A7C621DBC030166F5C90B88868733F5B321F598A82D218370CE1C801D1562EA040006CF23A6352FFB1CC067FAB78
5,664,398 UART: [art] SIG.R = 2ED31C0C69B027092D848A014202523455888606B8DC06F6E1F0DAF2B5AA67E13C114551AFB48DF9107F394D78609ADD
5,671,150 UART: [art] SIG.S = 4A3FC1BF651A5751F636C539823B8D0BE782713A436E79706923CAEBD2A08BCB3F437AFE5209B89FCCB252C583AEDCBB
5,695,105 UART: Caliptra RT
5,695,450 UART: [state] CFI Enabled
5,988,733 UART: Disable attest DPE used context limit breach
5,989,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,990,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,021,110 UART: [rt]cmd =0x494e464f, len=4
6,024,559 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,617 ready_for_fw is high
1,056,617 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
2,161,296 >>> mbox cmd response: success
2,161,296 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,846 UART:
2,223,862 UART: Running Caliptra FMC ...
2,224,270 UART:
2,224,413 UART: [state] CFI Enabled
2,235,204 UART: [fht] FMC Alias Private Key: 7
2,343,181 UART: [art] Extend RT PCRs Done
2,343,609 UART: [art] Lock RT PCRs Done
2,345,217 UART: [art] Populate DV Done
2,353,276 UART: [fht] FMC Alias Private Key: 7
2,354,278 UART: [art] Derive CDI
2,354,558 UART: [art] Store in in slot 0x4
2,440,251 UART: [art] Derive Key Pair
2,440,611 UART: [art] Store priv key in slot 0x5
2,454,185 UART: [art] Derive Key Pair - Done
2,468,932 UART: [art] Signing Cert with AUTHO
2,469,412 UART: RITY.KEYID = 7
2,485,090 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,855 UART: [art] PUB.X = 0D1A6C4579AEFC0C2F106E1B47097A5EA4F4A9C1BE85F8DFC674EB870072DFE3CB44A41443DB342E13523D3C2D5FC61A
2,492,612 UART: [art] PUB.Y = 1DB3811F2D454986DAA599633FDE509BCDFB8933C6D98F46ECEC75E83661B1A8F4802BD9ED8A29914EAA57E5902CC565
2,499,574 UART: [art] SIG.R = EDC0F066DC5CB874E81993087C32FBA56C7B8CE08473E12F49E6339197E2EB7AF64E411F0064A2A609338E296DE01F14
2,506,320 UART: [art] SIG.S = 828240BD3DC10B76C3065C33F66160AF70A14CA8A7517CBF28487D775E3FB2CF114EAEF34C6CEC0EF9FC4FF83E0D45C2
2,530,471 UART: mbox::rt_entry...
2,530,843 UART: ____ _ _ _ ____ _____
2,531,627 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,427 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,195 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,963 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,731 UART: |_|
2,535,043 UART:
2,641,834 UART: [rt] Runtime listening for mailbox commands...
2,646,802 >>> mbox cmd response data (3272 bytes)
2,646,803 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,669,889 >>> mbox cmd response data (0 bytes)
2,669,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,102,463 >>> mbox cmd response: success
5,116,071 UART:
5,116,087 UART: Running Caliptra FMC ...
5,116,495 UART:
5,116,638 UART: [state] CFI Enabled
5,206,125 UART: [art] Extend RT PCRs Done
5,206,553 UART: [art] Lock RT PCRs Done
5,207,824 UART: [art] Populate DV Done
5,215,963 UART: [fht] FMC Alias Private Key: 7
5,217,001 UART: [art] Derive CDI
5,217,281 UART: [art] Store in in slot 0x4
5,302,808 UART: [art] Derive Key Pair
5,303,168 UART: [art] Store priv key in slot 0x5
5,316,500 UART: [art] Derive Key Pair - Done
5,331,198 UART: [art] Signing Cert with AUTHO
5,331,678 UART: RITY.KEYID = 7
5,347,288 UART: [art] Erasing AUTHORITY.KEYID = 7
5,348,053 UART: [art] PUB.X = 45273855609503CD3EE488E830D05B8A67323F7B9E5D2D6569065F9E9AED8AC2EA09287658CED440032600D7ABEC691E
5,354,789 UART: [art] PUB.Y = E55938A2477BB7D27F6702442E867D744CFE1CEC72442CF425B2221241398E05ED262152B15F29DFEE49E1EE64D875DA
5,361,735 UART: [art] SIG.R = 86E533D110B685CEE638EFBCD770D14FDBF10E7539A075A715835A092AD0FD1C5BCA29F43F937E5C710B8DDDA8D69ADF
5,368,516 UART: [art] SIG.S = 91EF8B510B3A9D9C37C91EC45F20564F1C3B473783451F1834A138BB79D90E1EDF7E49387F8A7B4843D69B10CA15C995
5,392,689 UART: Caliptra RT
5,393,034 UART: [state] CFI Enabled
5,685,688 UART: Disable attest DPE used context limit breach
5,686,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,687,779 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,718,303 UART: [rt]cmd =0x494e464f, len=4
5,721,650 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
192,004 UART:
192,367 UART: Running Caliptra ROM ...
193,560 UART:
193,722 UART: [state] CFI Enabled
265,613 UART: [state] LifecycleState = Unprovisioned
267,601 UART: [state] DebugLocked = No
269,063 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,364 UART: [kat] SHA2-256
443,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,623 UART: [kat] ++
454,117 UART: [kat] sha1
465,061 UART: [kat] SHA2-256
467,720 UART: [kat] SHA2-384
474,989 UART: [kat] SHA2-512-ACC
477,352 UART: [kat] ECC-384
2,771,177 UART: [kat] HMAC-384Kdf
2,803,751 UART: [kat] LMS
3,994,035 UART: [kat] --
3,998,054 UART: [cold-reset] ++
4,000,628 UART: [fht] Storing FHT @ 0x50003400
4,012,917 UART: [idev] ++
4,013,522 UART: [idev] CDI.KEYID = 6
4,014,448 UART: [idev] SUBJECT.KEYID = 7
4,015,705 UART: [idev] UDS.KEYID = 0
4,016,683 ready_for_fw is high
4,016,884 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,160,295 UART: [idev] Erasing UDS.KEYID = 0
7,353,012 UART: [idev] Using Sha1 for KeyId Algorithm
7,374,756 UART: [idev] --
7,378,077 UART: [ldev] ++
7,378,654 UART: [ldev] CDI.KEYID = 6
7,379,672 UART: [ldev] SUBJECT.KEYID = 5
7,380,849 UART: [ldev] AUTHORITY.KEYID = 7
7,382,080 UART: [ldev] FE.KEYID = 1
7,425,769 UART: [ldev] Erasing FE.KEYID = 1
10,761,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,076,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,090,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,105,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,120,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,138,658 UART: [ldev] --
13,143,390 UART: [fwproc] Waiting for Commands...
13,146,400 UART: [fwproc] Received command 0x46574c44
13,148,577 UART: [fwproc] Received Image of size 114124 bytes
17,202,566 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,281,168 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,350,077 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,667,263 >>> mbox cmd response: success
17,671,678 UART: [afmc] ++
17,672,273 UART: [afmc] CDI.KEYID = 6
17,673,186 UART: [afmc] SUBJECT.KEYID = 7
17,674,408 UART: [afmc] AUTHORITY.KEYID = 5
21,033,351 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,334,879 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,337,131 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,351,547 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,366,378 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,380,876 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,402,627 UART: [afmc] --
23,406,552 UART: [cold-reset] --
23,409,929 UART: [state] Locking Datavault
23,416,091 UART: [state] Locking PCR0, PCR1 and PCR31
23,417,795 UART: [state] Locking ICCM
23,420,004 UART: [exit] Launching FMC @ 0x40000130
23,428,367 UART:
23,428,604 UART: Running Caliptra FMC ...
23,429,703 UART:
23,429,862 UART: [state] CFI Enabled
23,494,860 UART: [fht] FMC Alias Private Key: 7
25,832,801 UART: [art] Extend RT PCRs Done
25,834,016 UART: [art] Lock RT PCRs Done
25,835,724 UART: [art] Populate DV Done
25,841,076 UART: [fht] FMC Alias Private Key: 7
25,842,778 UART: [art] Derive CDI
25,843,514 UART: [art] Store in in slot 0x4
25,903,633 UART: [art] Derive Key Pair
25,904,667 UART: [art] Store priv key in slot 0x5
29,197,795 UART: [art] Derive Key Pair - Done
29,211,111 UART: [art] Signing Cert with AUTHO
29,212,441 UART: RITY.KEYID = 7
31,499,854 UART: [art] Erasing AUTHORITY.KEYID = 7
31,501,358 UART: [art] PUB.X = 04B3793C811E5C76A8A5A076434236FA0C4C59AEF45AD1346EDAFB6CDBD05291945C529E83A643E58E2EEB67D3424A9C
31,508,607 UART: [art] PUB.Y = 34F80CAE38A60969157FF076D23B270666F424416B95B0D25CD436FC9B3F9BB68EB737E28F8388FE8074B7C76E0A1C9E
31,515,892 UART: [art] SIG.R = FF00D649CF24FF5333A90042530297FD65C72DA989FB2061F541EA646D22F0F0C6DF706A177FF20F9A9EA87706548333
31,523,224 UART: [art] SIG.S = D8B51D9BEE7B68E52750BBA551086CA91B2547EA3E59BF9AD7A150CB47AEC9CA4235907737C4FAB0C6A99D23C37BECBF
32,828,568 UART: Caliptra RT
32,829,287 UART: [state] CFI Enabled
32,990,867 UART: [rt] RT listening for mailbox commands...
32,993,237 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,023,044 UART: [rt]cmd =0x50435252, len=8
33,025,357 >>> mbox cmd response data (8 bytes)
35,152,079 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,252,947 UART:
35,253,308 UART: Running Caliptra ROM ...
35,254,364 UART:
35,254,516 UART: [state] CFI Enabled
35,318,522 UART: [state] LifecycleState = Unprovisioned
35,320,467 UART: [state] DebugLocked = No
35,323,187 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,327,604 UART: [kat] SHA2-256
35,497,312 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,507,827 UART: [kat] ++
35,508,287 UART: [kat] sha1
35,519,986 UART: [kat] SHA2-256
35,522,675 UART: [kat] SHA2-384
35,529,525 UART: [kat] SHA2-512-ACC
35,531,858 UART: [kat] ECC-384
37,821,244 UART: [kat] HMAC-384Kdf
37,833,452 UART: [kat] LMS
39,023,740 UART: [kat] --
39,029,639 UART: [update-reset] ++
42,736,818 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,740,001 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,998,435 >>> mbox cmd response: success
42,998,799 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,000,054 UART: [update-reset] Copying MAN_2 To MAN_1
43,022,497 UART: [update-reset Success] --
43,027,218 UART: [state] Locking Datavault
43,030,739 UART: [state] Locking PCR0, PCR1 and PCR31
43,032,493 UART: [state] Locking ICCM
43,033,756 UART: [exit] Launching FMC @ 0x40000130
43,042,204 UART:
43,042,449 UART: Running Caliptra FMC ...
43,043,487 UART:
43,043,658 UART: [state] CFI Enabled
43,136,149 UART: [art] Extend RT PCRs Done
43,137,338 UART: [art] Lock RT PCRs Done
43,138,553 UART: [art] Populate DV Done
43,144,342 UART: [fht] FMC Alias Private Key: 7
43,146,036 UART: [art] Derive CDI
43,146,774 UART: [art] Store in in slot 0x4
43,205,516 UART: [art] Derive Key Pair
43,206,511 UART: [art] Store priv key in slot 0x5
46,500,552 UART: [art] Derive Key Pair - Done
46,513,436 UART: [art] Signing Cert with AUTHO
46,514,737 UART: RITY.KEYID = 7
48,802,220 UART: [art] Erasing AUTHORITY.KEYID = 7
48,803,722 UART: [art] PUB.X = 9381C73AA491F6CBF4A7BFCFC2C9726C272FA95FA0CAE94E7502627C61691D66CD01484F97C7F2EA1D0778993BA44930
48,811,000 UART: [art] PUB.Y = 7072FDCBD1756B60CFE6BA09E97611DC6C27F8FD0962504C68E0F636B89E11913CE7A471B27413384D7DE4C46AFF5693
48,818,244 UART: [art] SIG.R = FDFA2E552C73E7E81995ED938DEDB6754A4597F894A9AE00F6A2FCE62728C3D3FE89F1D299523456DBF512FF873449D5
48,825,597 UART: [art] SIG.S = 960EEEE7042F3C901FC0D8606CBDD3E2600CD769FC215F4D839A4C423A4F76C72EB08FF8E1902CA2150941FDB454E733
50,130,879 UART: mbox::rt_entry...
50,131,833 UART: ____ _ _ _ ____ _____
50,133,813 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,135,817 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,137,748 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,139,676 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,141,606 UART: |_|
50,142,442 UART:
50,427,545 UART: [rt] Runtime listening for mailbox commands...
50,429,567 >>> mbox cmd response data (128 bytes)
52,552,868 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,652,905 UART:
52,653,257 UART: Running Caliptra ROM ...
52,654,384 UART:
52,654,565 UART: [state] CFI Enabled
52,726,178 UART: [state] LifecycleState = Unprovisioned
52,728,064 UART: [state] DebugLocked = No
52,729,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,734,462 UART: [kat] SHA2-256
52,904,156 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,914,690 UART: [kat] ++
52,915,188 UART: [kat] sha1
52,927,162 UART: [kat] SHA2-256
52,929,859 UART: [kat] SHA2-384
52,934,711 UART: [kat] SHA2-512-ACC
52,937,114 UART: [kat] ECC-384
55,230,054 UART: [kat] HMAC-384Kdf
55,242,901 UART: [kat] LMS
56,433,238 UART: [kat] --
56,438,737 UART: [update-reset] ++
60,140,697 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,143,708 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
60,402,140 >>> mbox cmd response: success
60,402,501 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,402,906 UART: [update-reset] Copying MAN_2 To MAN_1
60,425,347 UART: [update-reset Success] --
60,428,856 UART: [state] Locking Datavault
60,432,546 UART: [state] Locking PCR0, PCR1 and PCR31
60,434,242 UART: [state] Locking ICCM
60,437,073 UART: [exit] Launching FMC @ 0x40000130
60,445,524 UART:
60,445,758 UART: Running Caliptra FMC ...
60,446,868 UART:
60,447,046 UART: [state] CFI Enabled
60,545,133 UART: [art] Extend RT PCRs Done
60,546,313 UART: [art] Lock RT PCRs Done
60,547,931 UART: [art] Populate DV Done
60,553,338 UART: [fht] FMC Alias Private Key: 7
60,554,933 UART: [art] Derive CDI
60,555,754 UART: [art] Store in in slot 0x4
60,614,048 UART: [art] Derive Key Pair
60,615,076 UART: [art] Store priv key in slot 0x5
63,908,026 UART: [art] Derive Key Pair - Done
63,921,131 UART: [art] Signing Cert with AUTHO
63,922,432 UART: RITY.KEYID = 7
66,210,325 UART: [art] Erasing AUTHORITY.KEYID = 7
66,211,824 UART: [art] PUB.X = FC42EFB32B6FE93F460A4386C5211C0F6117C7D3DBD1953F12C1187EA7843C9B7B68C28F7A0227916A1C43EE3BFA7871
66,219,081 UART: [art] PUB.Y = D07AEE2AEA0B8121B0D3ACB252BD649414CE2AE463E0E21D0AD2CBD55D7BF1CD4D82DFF34E75805CCF740116D95E4BE8
66,226,363 UART: [art] SIG.R = 5FDE1FA124C08F9160667C90D1D048C9253AE9D9EA6AA03BDB3123F60E6E5232ECB92DFB1A365A37BB1ED339317C419F
66,233,771 UART: [art] SIG.S = 9E9A749A6F295120FA5F46D1939FDD7487B3C662E08E404B1E93269C538FD91AB63CD47606FAD472360CD73617F815E9
67,538,408 UART: mbox::rt_entry...
67,539,381 UART: ____ _ _ _ ____ _____
67,541,317 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,543,328 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,545,261 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,547,191 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,549,116 UART: |_|
67,549,953 UART:
67,836,140 UART: [rt] Runtime listening for mailbox commands...
67,838,147 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,808,187 ready_for_fw is high
3,808,594 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,895,691 >>> mbox cmd response: success
23,585,238 UART:
23,585,622 UART: Running Caliptra FMC ...
23,586,738 UART:
23,586,893 UART: [state] CFI Enabled
23,656,471 UART: [fht] FMC Alias Private Key: 7
25,994,656 UART: [art] Extend RT PCRs Done
25,995,883 UART: [art] Lock RT PCRs Done
25,997,660 UART: [art] Populate DV Done
26,003,093 UART: [fht] FMC Alias Private Key: 7
26,004,862 UART: [art] Derive CDI
26,005,625 UART: [art] Store in in slot 0x4
26,066,776 UART: [art] Derive Key Pair
26,067,841 UART: [art] Store priv key in slot 0x5
29,360,308 UART: [art] Derive Key Pair - Done
29,372,992 UART: [art] Signing Cert with AUTHO
29,374,298 UART: RITY.KEYID = 7
31,661,914 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,433 UART: [art] PUB.X = 7B9D14A0720A764D7DC213E59F97B170D3810F05BDBB74F27131826C8FC71B6A848A93ADB1EFCBE279E2A68F98289212
31,670,653 UART: [art] PUB.Y = 180C8C88A5BB4E1B6D8B6FC1A7A7F54C64FE8F625D477A26086083252EAC50CF7B8AAFE46A9715BDC65D533B9A50A7AD
31,677,911 UART: [art] SIG.R = 2121F793E298C84DD928D3381564EE10F8F037CAF029AABA7260B16F543E26163C1D90AAD27972E3499514BA72391BE0
31,685,284 UART: [art] SIG.S = 9665510ADE118C4BD623C96AE4656C34E396E1137543C7E790E415ED12F3C5660B0D6D5E4721E02E8A9C46A63304D953
32,990,770 UART: Caliptra RT
32,991,483 UART: [state] CFI Enabled
33,150,317 UART: [rt] RT listening for mailbox commands...
33,152,710 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,182,616 UART: [rt]cmd =0x50435252, len=8
33,184,770 >>> mbox cmd response data (8 bytes)
35,315,400 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,283,621 >>> mbox cmd response: success
43,284,238 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,318,799 UART:
43,319,104 UART: Running Caliptra FMC ...
43,320,149 UART:
43,320,303 UART: [state] CFI Enabled
43,425,259 UART: [art] Extend RT PCRs Done
43,426,442 UART: [art] Lock RT PCRs Done
43,427,905 UART: [art] Populate DV Done
43,433,425 UART: [fht] FMC Alias Private Key: 7
43,435,030 UART: [art] Derive CDI
43,435,852 UART: [art] Store in in slot 0x4
43,494,285 UART: [art] Derive Key Pair
43,495,324 UART: [art] Store priv key in slot 0x5
46,787,976 UART: [art] Derive Key Pair - Done
46,800,648 UART: [art] Signing Cert with AUTHO
46,801,948 UART: RITY.KEYID = 7
49,089,247 UART: [art] Erasing AUTHORITY.KEYID = 7
49,090,759 UART: [art] PUB.X = 2C5E28D43C71CB82521BAA216562DAA35F9E45E48BFD4D244AE169F57EA7E6E3B1EB25EF5327B83389A13B2AD9D93C98
49,097,982 UART: [art] PUB.Y = 2CC6DF4C6F856F311CEBE187246698BB5C3015919A5B4227896AD875A71D138BB70E60B78F7D3781943DB3045554BDEA
49,105,237 UART: [art] SIG.R = 2C5CC527A57D6C36D5A0D344CCBF5B662A5FF5EC282FF89A3301EC41CB279C0A5244859A9F1A1DF951ADFD8575792EA3
49,112,666 UART: [art] SIG.S = 5EA267900AFB14E9F1BBCB97842164C93D971B9E0E2E25916ED8DB96BF142EE39B26F219E6D9A266D18AB7FC2C978DB9
50,417,802 UART: mbox::rt_entry...
50,418,760 UART: ____ _ _ _ ____ _____
50,420,689 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,422,695 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,424,577 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,426,505 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,428,641 UART: |_|
50,429,462 UART:
50,711,748 UART: [rt] Runtime listening for mailbox commands...
50,713,830 >>> mbox cmd response data (128 bytes)
52,836,408 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,791,100 >>> mbox cmd response: success
60,791,608 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,824,964 UART:
60,825,246 UART: Running Caliptra FMC ...
60,826,282 UART:
60,826,452 UART: [state] CFI Enabled
60,932,392 UART: [art] Extend RT PCRs Done
60,933,586 UART: [art] Lock RT PCRs Done
60,934,861 UART: [art] Populate DV Done
60,940,273 UART: [fht] FMC Alias Private Key: 7
60,941,813 UART: [art] Derive CDI
60,942,546 UART: [art] Store in in slot 0x4
61,001,507 UART: [art] Derive Key Pair
61,002,592 UART: [art] Store priv key in slot 0x5
64,295,490 UART: [art] Derive Key Pair - Done
64,308,492 UART: [art] Signing Cert with AUTHO
64,309,796 UART: RITY.KEYID = 7
66,596,325 UART: [art] Erasing AUTHORITY.KEYID = 7
66,597,834 UART: [art] PUB.X = FBAA22025D0A309B966C45DB30D853DBACCAD775CF166E8497EC6C4CBDAC5ECBEBF0661EA9FB84F8EF71948247A94301
66,605,104 UART: [art] PUB.Y = 16D5F8A8A9C22A5B3991E70AC03D29D312419BEBA26ED32F23D21989C8F484E1DDF993B6D010735E7D3FA2BD47D6B6E8
66,612,359 UART: [art] SIG.R = 15EAFDCE5D149DC7A41BCCEB0423EEF0FD5AE8CA88EFA282685B5D6976456B46A718D254255093ED9DC5498317A87FEE
66,619,782 UART: [art] SIG.S = 72C3A8A3D989BF25B03946828225A20251C5E7C64073A57840F91FF42C45A19F1257223020C583AA842EB0E10BBCB833
67,924,116 UART: mbox::rt_entry...
67,925,083 UART: ____ _ _ _ ____ _____
67,927,076 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,929,080 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,931,014 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,932,946 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,934,876 UART: |_|
67,935,690 UART:
68,218,308 UART: [rt] Runtime listening for mailbox commands...
68,220,315 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,530 UART:
192,902 UART: Running Caliptra ROM ...
194,077 UART:
603,697 UART: [state] CFI Enabled
616,879 UART: [state] LifecycleState = Unprovisioned
618,756 UART: [state] DebugLocked = No
621,075 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,234 UART: [kat] SHA2-256
795,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,494 UART: [kat] ++
806,937 UART: [kat] sha1
818,297 UART: [kat] SHA2-256
821,018 UART: [kat] SHA2-384
825,449 UART: [kat] SHA2-512-ACC
827,832 UART: [kat] ECC-384
3,112,397 UART: [kat] HMAC-384Kdf
3,124,907 UART: [kat] LMS
4,315,027 UART: [kat] --
4,320,385 UART: [cold-reset] ++
4,322,848 UART: [fht] Storing FHT @ 0x50003400
4,333,684 UART: [idev] ++
4,334,321 UART: [idev] CDI.KEYID = 6
4,335,201 UART: [idev] SUBJECT.KEYID = 7
4,336,401 UART: [idev] UDS.KEYID = 0
4,337,434 ready_for_fw is high
4,337,657 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,471 UART: [idev] Erasing UDS.KEYID = 0
7,624,516 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,004 UART: [idev] --
7,650,463 UART: [ldev] ++
7,651,115 UART: [ldev] CDI.KEYID = 6
7,652,001 UART: [ldev] SUBJECT.KEYID = 5
7,653,215 UART: [ldev] AUTHORITY.KEYID = 7
7,654,500 UART: [ldev] FE.KEYID = 1
7,665,980 UART: [ldev] Erasing FE.KEYID = 1
10,953,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,959 UART: [ldev] --
13,313,115 UART: [fwproc] Waiting for Commands...
13,315,305 UART: [fwproc] Received command 0x46574c44
13,317,497 UART: [fwproc] Received Image of size 114124 bytes
17,365,748 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,132 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,984 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,833,170 >>> mbox cmd response: success
17,837,214 UART: [afmc] ++
17,837,808 UART: [afmc] CDI.KEYID = 6
17,838,772 UART: [afmc] SUBJECT.KEYID = 7
17,839,979 UART: [afmc] AUTHORITY.KEYID = 5
21,155,051 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,055 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,317 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,729 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,531 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,984 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,267 UART: [afmc] --
23,520,128 UART: [cold-reset] --
23,523,223 UART: [state] Locking Datavault
23,528,744 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,515 UART: [state] Locking ICCM
23,533,204 UART: [exit] Launching FMC @ 0x40000130
23,541,599 UART:
23,541,833 UART: Running Caliptra FMC ...
23,542,932 UART:
23,543,088 UART: [state] CFI Enabled
23,551,203 UART: [fht] FMC Alias Private Key: 7
25,882,276 UART: [art] Extend RT PCRs Done
25,883,495 UART: [art] Lock RT PCRs Done
25,885,444 UART: [art] Populate DV Done
25,891,015 UART: [fht] FMC Alias Private Key: 7
25,892,551 UART: [art] Derive CDI
25,893,303 UART: [art] Store in in slot 0x4
25,936,213 UART: [art] Derive Key Pair
25,937,210 UART: [art] Store priv key in slot 0x5
29,179,238 UART: [art] Derive Key Pair - Done
29,192,201 UART: [art] Signing Cert with AUTHO
29,193,503 UART: RITY.KEYID = 7
31,472,762 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,266 UART: [art] PUB.X = 59D22370CB7A1BD53677C57D35B847D93D0CA9C0A7AC6BA389FDC7A0E56863C08E2AE0C6D5E01E34EECAE83B39D0F82D
31,481,522 UART: [art] PUB.Y = A2C1A15F5F6E2C49A33F9F6EE869A6FE557B19C41959EE09FA264AC47DE377E44639CB22DE8FEDACEA57EB602A552358
31,488,785 UART: [art] SIG.R = 43F6E959B32FD72F6208E0592EB554D5BF39A14A57B78397C3BC69AAA2D7D0AF716A0232FCC4E45BB08545174DA9708A
31,496,219 UART: [art] SIG.S = 2ACB34116C6C6114760D352167FCFED4F8D704DCA45F1B8D8F54201D60FEC438B47E40E890742D093DE32930235F961A
32,800,885 UART: Caliptra RT
32,801,590 UART: [state] CFI Enabled
32,917,925 UART: [rt] RT listening for mailbox commands...
32,920,338 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
32,950,289 UART: [rt]cmd =0x50435252, len=8
32,952,535 >>> mbox cmd response data (8 bytes)
35,010,554 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,110,843 UART:
35,111,201 UART: Running Caliptra ROM ...
35,112,333 UART:
35,112,497 UART: [state] CFI Enabled
35,127,848 UART: [state] LifecycleState = Unprovisioned
35,129,790 UART: [state] DebugLocked = No
35,131,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,135,383 UART: [kat] SHA2-256
35,305,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,315,671 UART: [kat] ++
35,316,131 UART: [kat] sha1
35,327,927 UART: [kat] SHA2-256
35,330,662 UART: [kat] SHA2-384
35,335,730 UART: [kat] SHA2-512-ACC
35,338,099 UART: [kat] ECC-384
37,623,643 UART: [kat] HMAC-384Kdf
37,635,921 UART: [kat] LMS
38,825,988 UART: [kat] --
38,832,544 UART: [update-reset] ++
42,552,084 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,555,271 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,813,699 >>> mbox cmd response: success
42,814,086 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,814,975 UART: [update-reset] Copying MAN_2 To MAN_1
42,837,362 UART: [update-reset Success] --
42,842,707 UART: [state] Locking Datavault
42,845,158 UART: [state] Locking PCR0, PCR1 and PCR31
42,846,853 UART: [state] Locking ICCM
42,848,512 UART: [exit] Launching FMC @ 0x40000130
42,856,957 UART:
42,857,204 UART: Running Caliptra FMC ...
42,858,302 UART:
42,858,457 UART: [state] CFI Enabled
42,902,299 UART: [art] Extend RT PCRs Done
42,903,439 UART: [art] Lock RT PCRs Done
42,904,910 UART: [art] Populate DV Done
42,910,634 UART: [fht] FMC Alias Private Key: 7
42,912,192 UART: [art] Derive CDI
42,912,952 UART: [art] Store in in slot 0x4
42,955,430 UART: [art] Derive Key Pair
42,956,428 UART: [art] Store priv key in slot 0x5
46,198,352 UART: [art] Derive Key Pair - Done
46,211,292 UART: [art] Signing Cert with AUTHO
46,212,588 UART: RITY.KEYID = 7
48,492,496 UART: [art] Erasing AUTHORITY.KEYID = 7
48,493,998 UART: [art] PUB.X = D0BA59674C5B49FFEABC6BFB94F7088FCFC5E590AA19D4269F81FEE67DD3023CE5E0688DD31C610C2CD7C288968B8415
48,501,311 UART: [art] PUB.Y = 9B3386D7D9C12024A79BAA26EBBEF05FEF9FF0B816D05DBD10A30D47D57498C4E1E3B811F300DAD845108121B1C70EA7
48,508,534 UART: [art] SIG.R = 25C65E2781C25F37FC0BE4E3B02AABA84F36A77A329E4EB7082394A9FFCA70CA7C33AAAE305E5D5862BB600D3F697CF7
48,515,953 UART: [art] SIG.S = 5F0C1FAFFEF53EF450FD6A13BE5DF8B59DE5473F4FB1D9D113D9F50193F1FA688560F13832C70BABB10E22DE7AEBB2D7
49,820,744 UART: mbox::rt_entry...
49,821,690 UART: ____ _ _ _ ____ _____
49,823,665 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,825,665 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,827,597 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,829,531 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,831,375 UART: |_|
49,832,168 UART:
50,117,905 UART: [rt] Runtime listening for mailbox commands...
50,119,914 >>> mbox cmd response data (128 bytes)
52,167,296 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,267,378 UART:
52,267,732 UART: Running Caliptra ROM ...
52,268,781 UART:
52,269,036 UART: [state] CFI Enabled
52,282,752 UART: [state] LifecycleState = Unprovisioned
52,284,690 UART: [state] DebugLocked = No
52,286,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,291,805 UART: [kat] SHA2-256
52,461,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,472,042 UART: [kat] ++
52,472,500 UART: [kat] sha1
52,483,114 UART: [kat] SHA2-256
52,485,857 UART: [kat] SHA2-384
52,492,712 UART: [kat] SHA2-512-ACC
52,495,073 UART: [kat] ECC-384
54,779,521 UART: [kat] HMAC-384Kdf
54,792,172 UART: [kat] LMS
55,982,259 UART: [kat] --
55,986,617 UART: [update-reset] ++
59,690,411 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,694,725 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
59,953,127 >>> mbox cmd response: success
59,953,525 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
59,954,734 UART: [update-reset] Copying MAN_2 To MAN_1
59,977,172 UART: [update-reset Success] --
59,981,783 UART: [state] Locking Datavault
59,984,221 UART: [state] Locking PCR0, PCR1 and PCR31
59,985,975 UART: [state] Locking ICCM
59,988,234 UART: [exit] Launching FMC @ 0x40000130
59,996,622 UART:
59,996,884 UART: Running Caliptra FMC ...
59,997,929 UART:
59,998,070 UART: [state] CFI Enabled
60,042,148 UART: [art] Extend RT PCRs Done
60,043,337 UART: [art] Lock RT PCRs Done
60,044,627 UART: [art] Populate DV Done
60,050,044 UART: [fht] FMC Alias Private Key: 7
60,051,584 UART: [art] Derive CDI
60,052,397 UART: [art] Store in in slot 0x4
60,095,420 UART: [art] Derive Key Pair
60,096,416 UART: [art] Store priv key in slot 0x5
63,338,198 UART: [art] Derive Key Pair - Done
63,351,366 UART: [art] Signing Cert with AUTHO
63,352,677 UART: RITY.KEYID = 7
65,632,118 UART: [art] Erasing AUTHORITY.KEYID = 7
65,633,621 UART: [art] PUB.X = A57F7026AD6CCF5A1F7E8E35B2A23F977BE539A83AB27F5C90E621C09E788C8A6A6158CE56A17E803F6CAFE44B5F1C33
65,640,945 UART: [art] PUB.Y = B84F88011F39E1B29B4F79664AC7772900B6E4841DDA2EB7E39B7DFED47050834FB6C702195977DA1D2198ED14EA154F
65,648,117 UART: [art] SIG.R = F38879B016494CE7A35EFFFE5463BE6031D7A1B2CB1C1A189E577972D7A1D86F1E7FB09826E0428594A79A8C2D6AD2E9
65,655,555 UART: [art] SIG.S = 0BAD78514C9425EE2B573ABB336A9D197BFE38D174AB68D581CC0C413F15D8B12122372044FC07AF6EE3EEB75F333B39
66,960,465 UART: mbox::rt_entry...
66,961,421 UART: ____ _ _ _ ____ _____
66,963,404 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,965,403 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,967,334 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,969,264 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,971,110 UART: |_|
66,971,986 UART:
67,257,481 UART: [rt] Runtime listening for mailbox commands...
67,259,502 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
4,125,593 ready_for_fw is high
4,125,982 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,056,419 >>> mbox cmd response: success
23,696,225 UART:
23,696,632 UART: Running Caliptra FMC ...
23,697,772 UART:
23,697,927 UART: [state] CFI Enabled
23,705,478 UART: [fht] FMC Alias Private Key: 7
26,036,014 UART: [art] Extend RT PCRs Done
26,037,236 UART: [art] Lock RT PCRs Done
26,039,076 UART: [art] Populate DV Done
26,044,380 UART: [fht] FMC Alias Private Key: 7
26,046,038 UART: [art] Derive CDI
26,046,854 UART: [art] Store in in slot 0x4
26,089,776 UART: [art] Derive Key Pair
26,090,836 UART: [art] Store priv key in slot 0x5
29,333,051 UART: [art] Derive Key Pair - Done
29,345,949 UART: [art] Signing Cert with AUTHO
29,347,255 UART: RITY.KEYID = 7
31,627,229 UART: [art] Erasing AUTHORITY.KEYID = 7
31,628,734 UART: [art] PUB.X = 218142A2C164F9505A826F70AC05E37B72962D3E0F336FC6F10296D8420CCAC7C8F4DDEE4CB107053505C9DCEEE4DCCB
31,636,026 UART: [art] PUB.Y = 368A9C4E7CBBFA1AF5143BAF5AAC2CD947A0DDDC3C6BAB851FC3EB5062C74E61FE06273D117317B53C6C5DA6A67A5AEC
31,643,304 UART: [art] SIG.R = 86B3BDFD45250831D256018548FDF80CB740E4D73B5059666A6053140A7B1B0D629F64F6CFA837D10B9323C35C27A58C
31,650,633 UART: [art] SIG.S = 359DD68E57D9941A74B880A11741C8AD342F20582BAC5C153F3400C13D8FC5A4310DC7A76405715F58207705C82AA492
32,955,416 UART: Caliptra RT
32,956,116 UART: [state] CFI Enabled
33,073,431 UART: [rt] RT listening for mailbox commands...
33,075,746 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,105,767 UART: [rt]cmd =0x50435252, len=8
33,107,636 >>> mbox cmd response data (8 bytes)
35,157,267 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,058,717 >>> mbox cmd response: success
43,059,259 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,094,824 UART:
43,095,093 UART: Running Caliptra FMC ...
43,096,135 UART:
43,096,282 UART: [state] CFI Enabled
43,140,421 UART: [art] Extend RT PCRs Done
43,141,611 UART: [art] Lock RT PCRs Done
43,142,973 UART: [art] Populate DV Done
43,148,449 UART: [fht] FMC Alias Private Key: 7
43,149,984 UART: [art] Derive CDI
43,150,713 UART: [art] Store in in slot 0x4
43,193,597 UART: [art] Derive Key Pair
43,194,640 UART: [art] Store priv key in slot 0x5
46,436,331 UART: [art] Derive Key Pair - Done
46,449,386 UART: [art] Signing Cert with AUTHO
46,450,679 UART: RITY.KEYID = 7
48,729,822 UART: [art] Erasing AUTHORITY.KEYID = 7
48,731,324 UART: [art] PUB.X = 14B8CEC91F00A4B08C56EE826B6BACE9390AEE852C5E1F4273295B6F562766B260119F4A89CC1D6D44C90264E64E97CF
48,738,583 UART: [art] PUB.Y = 536349F9789AAE3E2D1E2BA3A456CB1D90A6AD80648B6E2B2A5610CBE8EDD1BD7D69AF18E69E6BE64687E18DBB052524
48,745,862 UART: [art] SIG.R = E8947344AAC9078999E9A557917446EF1F00A32F1AFB6E23492E6E1527341ED637D29F32EF6223814E4DB769CD4189FD
48,753,186 UART: [art] SIG.S = 76736681751BD344848E2B527CF76694CD91BB080472D095CBA18EB1AF8FAD9A00D5FA8F94E76EE00593A8BDADE96F2F
50,057,954 UART: mbox::rt_entry...
50,058,925 UART: ____ _ _ _ ____ _____
50,060,853 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,062,856 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,064,783 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,066,712 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,068,654 UART: |_|
50,069,483 UART:
50,358,417 UART: [rt] Runtime listening for mailbox commands...
50,360,481 >>> mbox cmd response data (128 bytes)
52,407,544 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,304,167 >>> mbox cmd response: success
60,304,734 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,340,919 UART:
60,341,233 UART: Running Caliptra FMC ...
60,342,357 UART:
60,342,513 UART: [state] CFI Enabled
60,386,852 UART: [art] Extend RT PCRs Done
60,388,010 UART: [art] Lock RT PCRs Done
60,389,303 UART: [art] Populate DV Done
60,394,661 UART: [fht] FMC Alias Private Key: 7
60,396,344 UART: [art] Derive CDI
60,397,162 UART: [art] Store in in slot 0x4
60,439,377 UART: [art] Derive Key Pair
60,440,376 UART: [art] Store priv key in slot 0x5
63,682,014 UART: [art] Derive Key Pair - Done
63,694,724 UART: [art] Signing Cert with AUTHO
63,696,037 UART: RITY.KEYID = 7
65,975,327 UART: [art] Erasing AUTHORITY.KEYID = 7
65,976,838 UART: [art] PUB.X = 9781B28BE654D0C1DA023DDE165C9745B8D91D187C7722414FEA4D26A3123B5DBD33055DD4231310DCE4E093F45089C8
65,984,084 UART: [art] PUB.Y = F6DBC8F3D6B4B93A5AC44212AE617EDC51A8DDBCF566A2FD50980CB0BF981E2CAC2C740DD743A0CD0965E89F8041A415
65,991,312 UART: [art] SIG.R = 02998B4ACCC45ECDECDCAA3B76D88C1128CB3EC66A37DA5733264E783E057945320709DDD603A6E463BC007914A26529
65,998,721 UART: [art] SIG.S = 924A611E69FFC18AB1B20CF81AF0639CC29C41743E3AAAEDAC6DC499FE490F8C9ECCE6507D726292347A379A0CAB492D
67,303,411 UART: mbox::rt_entry...
67,304,400 UART: ____ _ _ _ ____ _____
67,306,391 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,308,435 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,310,369 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,312,296 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,314,222 UART: |_|
67,315,025 UART:
67,601,648 UART: [rt] Runtime listening for mailbox commands...
67,603,655 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,353 UART:
192,714 UART: Running Caliptra ROM ...
193,901 UART:
194,059 UART: [state] CFI Enabled
262,678 UART: [state] LifecycleState = Unprovisioned
264,628 UART: [state] DebugLocked = No
266,512 UART: [state] WD Timer not started. Device not locked for debugging
270,690 UART: [kat] SHA2-256
449,865 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,388 UART: [kat] ++
461,915 UART: [kat] sha1
473,856 UART: [kat] SHA2-256
476,896 UART: [kat] SHA2-384
483,205 UART: [kat] SHA2-512-ACC
486,148 UART: [kat] ECC-384
2,947,229 UART: [kat] HMAC-384Kdf
2,971,766 UART: [kat] LMS
3,501,203 UART: [kat] --
3,506,133 UART: [cold-reset] ++
3,507,647 UART: [fht] FHT @ 0x50003400
3,517,866 UART: [idev] ++
3,518,469 UART: [idev] CDI.KEYID = 6
3,519,384 UART: [idev] SUBJECT.KEYID = 7
3,520,486 UART: [idev] UDS.KEYID = 0
3,521,549 ready_for_fw is high
3,521,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,530 UART: [idev] Erasing UDS.KEYID = 0
6,023,947 UART: [idev] Sha1 KeyId Algorithm
6,045,725 UART: [idev] --
6,049,558 UART: [ldev] ++
6,050,132 UART: [ldev] CDI.KEYID = 6
6,051,045 UART: [ldev] SUBJECT.KEYID = 5
6,052,206 UART: [ldev] AUTHORITY.KEYID = 7
6,053,492 UART: [ldev] FE.KEYID = 1
6,099,953 UART: [ldev] Erasing FE.KEYID = 1
8,601,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,328 UART: [ldev] --
10,391,513 UART: [fwproc] Wait for Commands...
10,393,012 UART: [fwproc] Recv command 0x46574c44
10,395,289 UART: [fwproc] Recv'd Img size: 114448 bytes
13,798,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,260,877 >>> mbox cmd response: success
14,265,039 UART: [afmc] ++
14,265,641 UART: [afmc] CDI.KEYID = 6
14,266,555 UART: [afmc] SUBJECT.KEYID = 7
14,267,716 UART: [afmc] AUTHORITY.KEYID = 5
16,803,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,559 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,156 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,599,966 UART: [afmc] --
18,603,719 UART: [cold-reset] --
18,607,304 UART: [state] Locking Datavault
18,612,545 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,188 UART: [state] Locking ICCM
18,616,931 UART: [exit] Launching FMC @ 0x40000130
18,625,324 UART:
18,625,555 UART: Running Caliptra FMC ...
18,626,656 UART:
18,626,817 UART: [state] CFI Enabled
18,688,239 UART: [fht] FMC Alias Private Key: 7
20,452,668 UART: [art] Extend RT PCRs Done
20,453,888 UART: [art] Lock RT PCRs Done
20,455,653 UART: [art] Populate DV Done
20,460,920 UART: [fht] FMC Alias Private Key: 7
20,462,459 UART: [art] Derive CDI
20,463,273 UART: [art] Store in in slot 0x4
20,520,969 UART: [art] Derive Key Pair
20,522,003 UART: [art] Store priv key in slot 0x5
22,984,931 UART: [art] Derive Key Pair - Done
22,997,978 UART: [art] Signing Cert with AUTHO
22,999,272 UART: RITY.KEYID = 7
24,710,325 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,827 UART: [art] PUB.X = E586332A7DE980176780E7FC645EAFEA4300DFD8FFE99D9DDA59F2ABCEDDEF92022B0B87F76AC4CD3597CEF8ACB30CB1
24,719,113 UART: [art] PUB.Y = 49543F1BC57F8AB1B29532C073A6F0ED249937DFA5C7F5D02FCE06460C329DEC8240441698ECDCFC45D983C624137076
24,726,366 UART: [art] SIG.R = 691978D0D900F4B7DAE2E9179B9CDFA3872086195B784EC2C8DFA0E76A1501D9ECCFBFE948C18299DF997A01F11F00BE
24,733,719 UART: [art] SIG.S = 7D3A7E34B9F547DA585CD2A67FDE05F1D835464789384FAC57D55F3D4D698F146EA80850FCDD2DAA042F5639162C7004
25,712,980 UART: Caliptra RT
25,713,677 UART: [state] CFI Enabled
25,878,148 UART: [rt] RT listening for mailbox commands...
25,880,392 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,910,736 UART: [rt]cmd =0x50435252, len=8
25,912,947 >>> mbox cmd response data (8 bytes)
27,980,270 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,081,243 UART:
28,081,624 UART: Running Caliptra ROM ...
28,082,762 UART:
28,082,936 UART: [state] CFI Enabled
28,141,557 UART: [state] LifecycleState = Unprovisioned
28,143,393 UART: [state] DebugLocked = No
28,145,961 UART: [state] WD Timer not started. Device not locked for debugging
28,149,055 UART: [kat] SHA2-256
28,328,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,339,743 UART: [kat] ++
28,340,295 UART: [kat] sha1
28,351,513 UART: [kat] SHA2-256
28,354,579 UART: [kat] SHA2-384
28,361,152 UART: [kat] SHA2-512-ACC
28,364,097 UART: [kat] ECC-384
30,826,205 UART: [kat] HMAC-384Kdf
30,848,751 UART: [kat] LMS
31,378,218 UART: [kat] --
31,384,690 UART: [update-reset] ++
34,383,706 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,386,811 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,645,061 >>> mbox cmd response: success
34,645,460 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,646,508 UART: [update-reset] Copying MAN_2 To MAN_1
34,668,817 UART: [update-reset Success] --
34,673,485 UART: [state] Locking Datavault
34,677,003 UART: [state] Locking PCR0, PCR1 and PCR31
34,678,652 UART: [state] Locking ICCM
34,679,671 UART: [exit] Launching FMC @ 0x40000130
34,688,066 UART:
34,688,303 UART: Running Caliptra FMC ...
34,689,403 UART:
34,689,560 UART: [state] CFI Enabled
34,785,163 UART: [art] Extend RT PCRs Done
34,786,347 UART: [art] Lock RT PCRs Done
34,787,909 UART: [art] Populate DV Done
34,793,317 UART: [fht] FMC Alias Private Key: 7
34,794,959 UART: [art] Derive CDI
34,796,103 UART: [art] Store in in slot 0x4
34,854,366 UART: [art] Derive Key Pair
34,855,386 UART: [art] Store priv key in slot 0x5
37,318,214 UART: [art] Derive Key Pair - Done
37,331,196 UART: [art] Signing Cert with AUTHO
37,332,507 UART: RITY.KEYID = 7
39,044,030 UART: [art] Erasing AUTHORITY.KEYID = 7
39,045,537 UART: [art] PUB.X = 03F2671ABF2225DB8D9A85331F5FDF65CAC9B5890C92529FB343B26A5C7B0E94D425923EB5B09A8D10D14AB30A410A5E
39,052,809 UART: [art] PUB.Y = 4D2B66ADCDE467D70EF694FE34B75712C5009BE59DC8A32646A02A82F68877EB1A2E4F422952B54255387800A0AD0397
39,060,054 UART: [art] SIG.R = 3BFA44B7F3C16DF16A2A8B09D329D26DC71BE8BED2486009FDADF95BD77252E5CCF77E20681192C042C808CF246B6EE7
39,067,455 UART: [art] SIG.S = D4104ECF88CEBF2999CB1EAB4051261B8995E42A5EC50B1C9BCDAB3FF9183544935476F19513201CF5EE3722DCEC20E8
40,046,473 UART: mbox::rt_entry...
40,047,434 UART: ____ _ _ _ ____ _____
40,049,419 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,051,427 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,053,360 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,055,289 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,057,145 UART: |_|
40,058,167 UART:
40,344,947 UART: [rt] Runtime listening for mailbox commands...
40,346,960 >>> mbox cmd response data (128 bytes)
42,414,375 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,514,353 UART:
42,514,728 UART: Running Caliptra ROM ...
42,515,776 UART:
42,515,927 UART: [state] CFI Enabled
42,584,974 UART: [state] LifecycleState = Unprovisioned
42,586,860 UART: [state] DebugLocked = No
42,589,572 UART: [state] WD Timer not started. Device not locked for debugging
42,593,039 UART: [kat] SHA2-256
42,772,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,783,759 UART: [kat] ++
42,784,216 UART: [kat] sha1
42,795,753 UART: [kat] SHA2-256
42,798,805 UART: [kat] SHA2-384
42,805,389 UART: [kat] SHA2-512-ACC
42,808,340 UART: [kat] ECC-384
45,265,288 UART: [kat] HMAC-384Kdf
45,290,220 UART: [kat] LMS
45,819,689 UART: [kat] --
45,825,134 UART: [update-reset] ++
48,820,192 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,823,851 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,082,071 >>> mbox cmd response: success
49,082,473 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,083,675 UART: [update-reset] Copying MAN_2 To MAN_1
49,105,970 UART: [update-reset Success] --
49,110,372 UART: [state] Locking Datavault
49,113,785 UART: [state] Locking PCR0, PCR1 and PCR31
49,116,037 UART: [state] Locking ICCM
49,116,932 UART: [exit] Launching FMC @ 0x40000130
49,125,019 UART:
49,125,260 UART: Running Caliptra FMC ...
49,126,362 UART:
49,126,516 UART: [state] CFI Enabled
49,227,629 UART: [art] Extend RT PCRs Done
49,228,818 UART: [art] Lock RT PCRs Done
49,230,054 UART: [art] Populate DV Done
49,235,675 UART: [fht] FMC Alias Private Key: 7
49,237,426 UART: [art] Derive CDI
49,238,238 UART: [art] Store in in slot 0x4
49,297,152 UART: [art] Derive Key Pair
49,298,209 UART: [art] Store priv key in slot 0x5
51,760,823 UART: [art] Derive Key Pair - Done
51,773,661 UART: [art] Signing Cert with AUTHO
51,774,964 UART: RITY.KEYID = 7
53,486,672 UART: [art] Erasing AUTHORITY.KEYID = 7
53,488,209 UART: [art] PUB.X = 3858A5B76A6B9DF2C4B522374E85059D6126291879B3B9DC4807DBF9648D34F140085ECE679953C85D2DF92EC65C3EF3
53,495,419 UART: [art] PUB.Y = C1C7F1843195245AA4F78BB9CA3BABD6630366DE7834290106DE2A3372F8FDCD624B3BAE47DEEDF084C522C797D2760E
53,502,726 UART: [art] SIG.R = 1F72892AC2CD9A17131C12B8B529B7CDE12018EA8292272E2F648EE0297479B1740C1265E1C99342C647F785A66881D6
53,510,071 UART: [art] SIG.S = 270C1C2BF68AFC64763D372F2C04C77F6AAEB573C0CA844836995816BC9D967651EFE8CB00507C39B72386EA34DE7224
54,488,478 UART: mbox::rt_entry...
54,489,419 UART: ____ _ _ _ ____ _____
54,491,347 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,493,346 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,495,202 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,497,121 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,499,000 UART: |_|
54,499,909 UART:
54,781,662 UART: [rt] Runtime listening for mailbox commands...
54,783,684 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,383,008 ready_for_fw is high
3,383,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,068,177 >>> mbox cmd response: success
18,365,256 UART:
18,365,644 UART: Running Caliptra FMC ...
18,366,758 UART:
18,366,908 UART: [state] CFI Enabled
18,430,599 UART: [fht] FMC Alias Private Key: 7
20,194,659 UART: [art] Extend RT PCRs Done
20,195,882 UART: [art] Lock RT PCRs Done
20,197,431 UART: [art] Populate DV Done
20,202,917 UART: [fht] FMC Alias Private Key: 7
20,204,510 UART: [art] Derive CDI
20,205,328 UART: [art] Store in in slot 0x4
20,263,646 UART: [art] Derive Key Pair
20,264,686 UART: [art] Store priv key in slot 0x5
22,728,136 UART: [art] Derive Key Pair - Done
22,741,347 UART: [art] Signing Cert with AUTHO
22,742,643 UART: RITY.KEYID = 7
24,454,353 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,853 UART: [art] PUB.X = 78A9A87E99C2A559FD3B2B28A3916AEF38A3BEC5A4028D2C129EA56EA6EBD48C2554109A7872A040D58F98B9DCF8AF99
24,463,163 UART: [art] PUB.Y = 5DE37F9CEFEC1D7E03C0132B8E61640685FBB93FD469DDC55FE87CD9709283606AFBD4262185946FE33E4CD0A8832D51
24,470,423 UART: [art] SIG.R = 72940D5E9A66D689DA36A136553E057D551032AC0ECD3D832833D0BBAC61D10FEAE0CE012151AAE0A79CF1FC0622E292
24,477,815 UART: [art] SIG.S = A379391315D70540CA8EAEE92DE159441758886FB8CBA1ED1D587387EC56D0C3FDB5DD96F369BDF46DE375807985EDD3
25,456,623 UART: Caliptra RT
25,457,330 UART: [state] CFI Enabled
25,622,998 UART: [rt] RT listening for mailbox commands...
25,625,364 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,655,792 UART: [rt]cmd =0x50435252, len=8
25,657,807 >>> mbox cmd response data (8 bytes)
27,720,302 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,247,037 >>> mbox cmd response: success
34,247,575 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,281,583 UART:
34,281,884 UART: Running Caliptra FMC ...
34,283,001 UART:
34,283,168 UART: [state] CFI Enabled
34,380,111 UART: [art] Extend RT PCRs Done
34,381,312 UART: [art] Lock RT PCRs Done
34,382,771 UART: [art] Populate DV Done
34,388,186 UART: [fht] FMC Alias Private Key: 7
34,389,788 UART: [art] Derive CDI
34,390,626 UART: [art] Store in in slot 0x4
34,448,855 UART: [art] Derive Key Pair
34,449,892 UART: [art] Store priv key in slot 0x5
36,912,886 UART: [art] Derive Key Pair - Done
36,925,893 UART: [art] Signing Cert with AUTHO
36,927,197 UART: RITY.KEYID = 7
38,639,131 UART: [art] Erasing AUTHORITY.KEYID = 7
38,640,634 UART: [art] PUB.X = EF44FC9EAB4DA533783D122CBB14E318AE9AC4D5E9A5FD99C3DB26280BA7964542FD32AA9981596C9D135A31D4F70078
38,647,886 UART: [art] PUB.Y = DF4C66E84CC94E4D75DECD0C376F4F1B9761CBF57F1EBC237CFAEBA64789832926D5040FEE41DF54831B3083E996D629
38,655,168 UART: [art] SIG.R = C6146D5B31755A3E5DE05A35E0BAE19DBD83FFF2D4998EC43D176B442592E8BFE37458364338B0C23A84208D842A16A3
38,662,557 UART: [art] SIG.S = C47B193F1D4D5227ADFF08C721DDE4044CF48CAB4B893DB95240D66DAF8E2F9CE073790DC823C1C356B1CFE13D7E6DAF
39,640,685 UART: mbox::rt_entry...
39,641,650 UART: ____ _ _ _ ____ _____
39,643,578 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,645,583 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,647,441 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,649,701 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,651,594 UART: |_|
39,652,402 UART:
39,936,257 UART: [rt] Runtime listening for mailbox commands...
39,938,307 >>> mbox cmd response data (128 bytes)
42,005,301 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,517,860 >>> mbox cmd response: success
48,518,338 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,555,099 UART:
48,555,431 UART: Running Caliptra FMC ...
48,556,560 UART:
48,556,722 UART: [state] CFI Enabled
48,652,568 UART: [art] Extend RT PCRs Done
48,653,763 UART: [art] Lock RT PCRs Done
48,655,064 UART: [art] Populate DV Done
48,660,635 UART: [fht] FMC Alias Private Key: 7
48,662,334 UART: [art] Derive CDI
48,663,148 UART: [art] Store in in slot 0x4
48,720,927 UART: [art] Derive Key Pair
48,721,972 UART: [art] Store priv key in slot 0x5
51,186,054 UART: [art] Derive Key Pair - Done
51,198,995 UART: [art] Signing Cert with AUTHO
51,200,304 UART: RITY.KEYID = 7
52,911,450 UART: [art] Erasing AUTHORITY.KEYID = 7
52,912,974 UART: [art] PUB.X = 50302AC430076FDF68560575A4DB8EFD7ED26CABE2230D24C29265614D4DCFC07DB3558146695AAC58DFF080CD63FD56
52,920,225 UART: [art] PUB.Y = D8BA8AD0EA21032FEA800C2DEFEBE7CC5426E3D2DDEAD9AD1F77D944755C16DA8FA27DA7C086753B9290D270CB7F54E2
52,927,567 UART: [art] SIG.R = 25556AD65A34A34E73AF2087797BE1BF364B0DE5666689F7EBAF7A364E810D4329F145AD439BABB60546DD4BE1FC13F9
52,934,941 UART: [art] SIG.S = B5AEAD39216DAB5475A507557E77BC2C4F35538E1651C71179F3609076B9837256B455F750C1C6EBD578B3E2F87A7C3B
53,913,260 UART: mbox::rt_entry...
53,914,208 UART: ____ _ _ _ ____ _____
53,916,187 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,918,115 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,920,041 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,921,898 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,923,819 UART: |_|
53,924,630 UART:
54,211,230 UART: [rt] Runtime listening for mailbox commands...
54,213,268 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,302 UART:
192,680 UART: Running Caliptra ROM ...
193,818 UART:
603,356 UART: [state] CFI Enabled
619,641 UART: [state] LifecycleState = Unprovisioned
621,518 UART: [state] DebugLocked = No
623,325 UART: [state] WD Timer not started. Device not locked for debugging
627,855 UART: [kat] SHA2-256
806,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,547 UART: [kat] ++
819,261 UART: [kat] sha1
830,214 UART: [kat] SHA2-256
833,217 UART: [kat] SHA2-384
839,196 UART: [kat] SHA2-512-ACC
842,121 UART: [kat] ECC-384
3,284,413 UART: [kat] HMAC-384Kdf
3,295,720 UART: [kat] LMS
3,825,183 UART: [kat] --
3,828,888 UART: [cold-reset] ++
3,831,183 UART: [fht] FHT @ 0x50003400
3,842,722 UART: [idev] ++
3,843,284 UART: [idev] CDI.KEYID = 6
3,844,184 UART: [idev] SUBJECT.KEYID = 7
3,845,351 UART: [idev] UDS.KEYID = 0
3,846,395 ready_for_fw is high
3,846,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,316 UART: [idev] Erasing UDS.KEYID = 0
6,315,166 UART: [idev] Sha1 KeyId Algorithm
6,338,281 UART: [idev] --
6,342,065 UART: [ldev] ++
6,342,657 UART: [ldev] CDI.KEYID = 6
6,343,563 UART: [ldev] SUBJECT.KEYID = 5
6,344,714 UART: [ldev] AUTHORITY.KEYID = 7
6,345,991 UART: [ldev] FE.KEYID = 1
6,356,140 UART: [ldev] Erasing FE.KEYID = 1
8,829,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,658 UART: [ldev] --
10,617,649 UART: [fwproc] Wait for Commands...
10,620,876 UART: [fwproc] Recv command 0x46574c44
10,622,906 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,487,051 >>> mbox cmd response: success
14,492,030 UART: [afmc] ++
14,492,617 UART: [afmc] CDI.KEYID = 6
14,493,522 UART: [afmc] SUBJECT.KEYID = 7
14,494,694 UART: [afmc] AUTHORITY.KEYID = 5
16,995,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,209 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,008 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,006 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,951 UART: [afmc] --
18,789,939 UART: [cold-reset] --
18,792,330 UART: [state] Locking Datavault
18,796,272 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,968 UART: [state] Locking ICCM
18,800,595 UART: [exit] Launching FMC @ 0x40000130
18,808,983 UART:
18,809,210 UART: Running Caliptra FMC ...
18,810,249 UART:
18,810,413 UART: [state] CFI Enabled
18,818,832 UART: [fht] FMC Alias Private Key: 7
20,576,021 UART: [art] Extend RT PCRs Done
20,577,221 UART: [art] Lock RT PCRs Done
20,579,186 UART: [art] Populate DV Done
20,584,850 UART: [fht] FMC Alias Private Key: 7
20,586,491 UART: [art] Derive CDI
20,587,225 UART: [art] Store in in slot 0x4
20,630,182 UART: [art] Derive Key Pair
20,631,174 UART: [art] Store priv key in slot 0x5
23,057,928 UART: [art] Derive Key Pair - Done
23,070,840 UART: [art] Signing Cert with AUTHO
23,072,141 UART: RITY.KEYID = 7
24,776,994 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,470 UART: [art] PUB.X = E95DB081E5A2F992C0941284DE93037896313BA8A79224CAF863D75A390AF34647CF5F9C54348779021F3219D635741A
24,785,744 UART: [art] PUB.Y = 7371D7A35647844ECD767AB0BF78B22081E4A35E84584ADAF3AADE7441A03BC67FBE1483A8187F2585131AA60AC39DE1
24,793,028 UART: [art] SIG.R = 000B32432DB2A4DA3FCAE04EF77A2C37517736E11138438556DEE4F04AD783B6130721D1DA95F7066DB172F08316D286
24,800,350 UART: [art] SIG.S = EE20C896730D3A5FC17E382F89253E7A3479CF6DAAC45B47F5CE3B9F074BC48AFB0300227B6BD0C3AD96C70F4109D48B
25,779,732 UART: Caliptra RT
25,780,440 UART: [state] CFI Enabled
25,896,471 UART: [rt] RT listening for mailbox commands...
25,898,675 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,928,570 UART: [rt]cmd =0x50435252, len=8
25,930,582 >>> mbox cmd response data (8 bytes)
27,994,733 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,095,641 UART:
28,095,990 UART: Running Caliptra ROM ...
28,097,121 UART:
28,097,309 UART: [state] CFI Enabled
28,107,253 UART: [state] LifecycleState = Unprovisioned
28,109,140 UART: [state] DebugLocked = No
28,110,639 UART: [state] WD Timer not started. Device not locked for debugging
28,114,701 UART: [kat] SHA2-256
28,293,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,305,465 UART: [kat] ++
28,306,003 UART: [kat] sha1
28,317,434 UART: [kat] SHA2-256
28,320,448 UART: [kat] SHA2-384
28,327,289 UART: [kat] SHA2-512-ACC
28,330,218 UART: [kat] ECC-384
30,771,585 UART: [kat] HMAC-384Kdf
30,784,926 UART: [kat] LMS
31,314,438 UART: [kat] --
31,319,800 UART: [update-reset] ++
34,310,281 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,314,309 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,572,506 >>> mbox cmd response: success
34,572,921 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,573,211 UART: [update-reset] Copying MAN_2 To MAN_1
34,595,381 UART: [update-reset Success] --
34,599,492 UART: [state] Locking Datavault
34,603,071 UART: [state] Locking PCR0, PCR1 and PCR31
34,604,714 UART: [state] Locking ICCM
34,606,911 UART: [exit] Launching FMC @ 0x40000130
34,615,305 UART:
34,615,533 UART: Running Caliptra FMC ...
34,616,628 UART:
34,616,777 UART: [state] CFI Enabled
34,661,264 UART: [art] Extend RT PCRs Done
34,662,441 UART: [art] Lock RT PCRs Done
34,664,126 UART: [art] Populate DV Done
34,669,580 UART: [fht] FMC Alias Private Key: 7
34,671,053 UART: [art] Derive CDI
34,671,806 UART: [art] Store in in slot 0x4
34,714,443 UART: [art] Derive Key Pair
34,715,435 UART: [art] Store priv key in slot 0x5
37,142,438 UART: [art] Derive Key Pair - Done
37,155,393 UART: [art] Signing Cert with AUTHO
37,156,694 UART: RITY.KEYID = 7
38,862,414 UART: [art] Erasing AUTHORITY.KEYID = 7
38,863,912 UART: [art] PUB.X = A1A17F6B75C8006FAB7E67E5F34E8E928FB7E5E184947449EB2E0E83E04BE92C5409A19FE87B3C0BB8D4EFE7F019CE2F
38,871,154 UART: [art] PUB.Y = 09EDCBA6EE157CCEAFADB6598FEF597986CBF5AB516AC96583C985F05DA9D129CC1D154BE67E6CD28AB36F14799CD5D8
38,878,482 UART: [art] SIG.R = 2F0C96179C374C6F6ECB8A65EE13014A03C56D45EAB605085290EBB7D371075B3BE72503D4C7348F8C2F41418F9638CB
38,885,862 UART: [art] SIG.S = A841D47256B03C030B967EF71884C411E5F0632941CDBC9FF6EFD899D501FC4E1DF45ED963B8E5EFCBC3035D273F0B64
39,864,013 UART: mbox::rt_entry...
39,864,983 UART: ____ _ _ _ ____ _____
39,866,926 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,868,924 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,870,770 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,872,692 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,874,616 UART: |_|
39,875,444 UART:
40,162,378 UART: [rt] Runtime listening for mailbox commands...
40,164,567 >>> mbox cmd response data (128 bytes)
42,214,068 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,314,049 UART:
42,314,411 UART: Running Caliptra ROM ...
42,315,539 UART:
42,315,736 UART: [state] CFI Enabled
42,331,565 UART: [state] LifecycleState = Unprovisioned
42,333,452 UART: [state] DebugLocked = No
42,334,772 UART: [state] WD Timer not started. Device not locked for debugging
42,338,667 UART: [kat] SHA2-256
42,517,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,529,410 UART: [kat] ++
42,529,949 UART: [kat] sha1
42,540,837 UART: [kat] SHA2-256
42,543,855 UART: [kat] SHA2-384
42,550,320 UART: [kat] SHA2-512-ACC
42,553,308 UART: [kat] ECC-384
44,992,617 UART: [kat] HMAC-384Kdf
45,006,252 UART: [kat] LMS
45,535,759 UART: [kat] --
45,540,380 UART: [update-reset] ++
48,535,811 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,539,241 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
48,797,454 >>> mbox cmd response: success
48,797,851 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,798,133 UART: [update-reset] Copying MAN_2 To MAN_1
48,820,224 UART: [update-reset Success] --
48,824,325 UART: [state] Locking Datavault
48,827,840 UART: [state] Locking PCR0, PCR1 and PCR31
48,829,488 UART: [state] Locking ICCM
48,832,170 UART: [exit] Launching FMC @ 0x40000130
48,840,616 UART:
48,840,842 UART: Running Caliptra FMC ...
48,841,879 UART:
48,842,021 UART: [state] CFI Enabled
48,885,975 UART: [art] Extend RT PCRs Done
48,887,106 UART: [art] Lock RT PCRs Done
48,888,887 UART: [art] Populate DV Done
48,894,509 UART: [fht] FMC Alias Private Key: 7
48,895,983 UART: [art] Derive CDI
48,896,733 UART: [art] Store in in slot 0x4
48,939,311 UART: [art] Derive Key Pair
48,940,347 UART: [art] Store priv key in slot 0x5
51,367,004 UART: [art] Derive Key Pair - Done
51,380,111 UART: [art] Signing Cert with AUTHO
51,381,444 UART: RITY.KEYID = 7
53,087,032 UART: [art] Erasing AUTHORITY.KEYID = 7
53,088,541 UART: [art] PUB.X = 9D69A3021BA7736F21A822C98626358E1E34AFF6C5903E948537AF9E03E8615594BD947F3690CB65106E8B9C745A939F
53,095,785 UART: [art] PUB.Y = B70A685460B5C906DE63F7BCAC94AE8550CF7E56CC7946F420A76A86CC7BFA3C0B1E9DC92B60595DD598E8917C5559B5
53,103,064 UART: [art] SIG.R = 968B2FF63A0B7310F32AD377BC1C0B00E69952E1F124E7C2B998E0737205E6296412D1F10A261A33AEB717532E9AEA3D
53,110,403 UART: [art] SIG.S = AB396F1441A8418991847A21F93F5CF3801423A0176D6B8B284425E3863747B17B862CA40EAD76E029F90D59B3341F27
54,089,102 UART: mbox::rt_entry...
54,090,045 UART: ____ _ _ _ ____ _____
54,091,989 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,093,989 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,095,839 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,097,754 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,100,323 UART: |_|
54,101,141 UART:
54,387,320 UART: [rt] Runtime listening for mailbox commands...
54,389,331 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,696,025 ready_for_fw is high
3,696,816 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,330 >>> mbox cmd response: success
18,517,040 UART:
18,517,457 UART: Running Caliptra FMC ...
18,518,651 UART:
18,518,817 UART: [state] CFI Enabled
18,526,445 UART: [fht] FMC Alias Private Key: 7
20,283,525 UART: [art] Extend RT PCRs Done
20,284,740 UART: [art] Lock RT PCRs Done
20,286,152 UART: [art] Populate DV Done
20,291,626 UART: [fht] FMC Alias Private Key: 7
20,293,330 UART: [art] Derive CDI
20,294,146 UART: [art] Store in in slot 0x4
20,336,857 UART: [art] Derive Key Pair
20,337,852 UART: [art] Store priv key in slot 0x5
22,765,141 UART: [art] Derive Key Pair - Done
22,778,028 UART: [art] Signing Cert with AUTHO
22,779,336 UART: RITY.KEYID = 7
24,484,126 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,646 UART: [art] PUB.X = FE598120BE34F178E8434D9C0E000B4355163B01AAFD9915504AB58BD4282E1CD3CC57E55B8A870CCCCB843F8277CB2D
24,492,869 UART: [art] PUB.Y = BCDBC95035B8F8947A152C137563CF8ABFCC2133A1589AF6BE51CE7C2822601F56A2EF23CA506A58336C0F9B992AFE61
24,500,170 UART: [art] SIG.R = F0E7776190ACA0F394B7B66ACDC2E904DE1E8459E02D2EE4D89966C4BDDA14AE7CC37E7CC8C20F07D1B0FCF0742E0088
24,507,593 UART: [art] SIG.S = BAC377714B261A2A0888B57F97B79FF902FE765D8AE92F3CCAC52F09E9FB3CF5359707E32FC5295BA308042B30CA9A8E
25,486,766 UART: Caliptra RT
25,487,477 UART: [state] CFI Enabled
25,604,650 UART: [rt] RT listening for mailbox commands...
25,607,067 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,636,836 UART: [rt]cmd =0x50435252, len=8
25,638,772 >>> mbox cmd response data (8 bytes)
27,690,310 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,119,024 >>> mbox cmd response: success
34,119,529 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,154,764 UART:
34,155,049 UART: Running Caliptra FMC ...
34,156,079 UART:
34,156,218 UART: [state] CFI Enabled
34,200,242 UART: [art] Extend RT PCRs Done
34,201,433 UART: [art] Lock RT PCRs Done
34,202,962 UART: [art] Populate DV Done
34,208,371 UART: [fht] FMC Alias Private Key: 7
34,209,851 UART: [art] Derive CDI
34,210,576 UART: [art] Store in in slot 0x4
34,253,314 UART: [art] Derive Key Pair
34,254,305 UART: [art] Store priv key in slot 0x5
36,681,235 UART: [art] Derive Key Pair - Done
36,694,437 UART: [art] Signing Cert with AUTHO
36,695,732 UART: RITY.KEYID = 7
38,401,250 UART: [art] Erasing AUTHORITY.KEYID = 7
38,402,785 UART: [art] PUB.X = 6092D848A230D8A1380B0AE8469221B300BF0DF0EB1C0D202E28769244B78DF1B0FC62302810C91FFAB2E0EDAE9DAF6C
38,410,032 UART: [art] PUB.Y = 3B6587250BA0750B53DE8044CEA88151F4CC2DC98CA7EA8E83E278600EB1618D514E9F029DBF3462A4B0109D0DB04971
38,417,270 UART: [art] SIG.R = 11F525395B35B1561BE7E014882134014B483932A244BD8BC4E5D3D225052ABD78E9FE43DEF7692CCA2EA6AB6554DDA2
38,424,680 UART: [art] SIG.S = 4ED2261D14762E484FA483B0130E0BAB4FA1C499076DF7BF7F6DF955E17AC5427C26B3169095837B753D7B00A4F48E50
39,402,888 UART: mbox::rt_entry...
39,403,828 UART: ____ _ _ _ ____ _____
39,405,800 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,407,799 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,409,730 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,411,655 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,413,499 UART: |_|
39,414,390 UART:
39,698,099 UART: [rt] Runtime listening for mailbox commands...
39,700,160 >>> mbox cmd response data (128 bytes)
41,748,122 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,182,959 >>> mbox cmd response: success
48,183,446 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,214,848 UART:
48,215,174 UART: Running Caliptra FMC ...
48,216,296 UART:
48,216,453 UART: [state] CFI Enabled
48,260,303 UART: [art] Extend RT PCRs Done
48,261,446 UART: [art] Lock RT PCRs Done
48,262,942 UART: [art] Populate DV Done
48,268,273 UART: [fht] FMC Alias Private Key: 7
48,269,878 UART: [art] Derive CDI
48,270,689 UART: [art] Store in in slot 0x4
48,313,035 UART: [art] Derive Key Pair
48,314,042 UART: [art] Store priv key in slot 0x5
50,740,364 UART: [art] Derive Key Pair - Done
50,753,370 UART: [art] Signing Cert with AUTHO
50,754,715 UART: RITY.KEYID = 7
52,460,393 UART: [art] Erasing AUTHORITY.KEYID = 7
52,461,902 UART: [art] PUB.X = F06C455CE99964C55CF460B22C8D212C13C31A95D708AF0979E2F9FB9CD09BE28F5FFF9184A7414227F8D57C7250E74D
52,469,210 UART: [art] PUB.Y = E5CA2D188B6240D26E4660C935C7FB49178CB932E87B2EBB77023D55117E22CEE56AA32D644B791C9FA700EC8F2B3F42
52,476,438 UART: [art] SIG.R = 212DF12F40C5BB901E6227CC865AA0B5792C4BCD50294A460EF28C88F0DF8BA0AF2E24DAD7ED611D0255753CC4C46C91
52,483,824 UART: [art] SIG.S = 57B64F04E66BF8FB28D6AD97D70A91464022ABCB017BC8586B3EC3373AA891279717C85311396D0D523B7AB8AE18208F
53,462,518 UART: mbox::rt_entry...
53,463,460 UART: ____ _ _ _ ____ _____
53,465,615 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,467,547 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,469,468 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,471,315 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,473,260 UART: |_|
53,474,064 UART:
53,760,495 UART: [rt] Runtime listening for mailbox commands...
53,762,497 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,426,550 ready_for_fw is high
3,427,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,719,467 >>> mbox cmd response: success
18,994,325 UART:
18,994,730 UART: Running Caliptra FMC ...
18,995,870 UART:
18,996,034 UART: [state] CFI Enabled
19,065,053 UART: [fht] FMC Alias Private Key: 7
20,828,263 UART: [art] Extend RT PCRs Done
20,829,485 UART: [art] Lock RT PCRs Done
20,831,158 UART: [art] Populate DV Done
20,836,410 UART: [fht] FMC Alias Private Key: 7
20,838,109 UART: [art] Derive CDI
20,839,110 UART: [art] Store in in slot 0x4
20,897,511 UART: [art] Derive Key Pair
20,898,516 UART: [art] Store priv key in slot 0x5
23,361,517 UART: [art] Derive Key Pair - Done
23,374,254 UART: [art] Signing Cert with AUTHO
23,375,564 UART: RITY.KEYID = 7
25,086,714 UART: [art] Erasing AUTHORITY.KEYID = 7
25,088,225 UART: [art] PUB.X = 9AB2E7069DE3955FEECF161ADAAAD4E3A427F0E05A205BF30876516BA0FF9D8E89EEDAE4D2ED647F0EB27324DE920963
25,095,476 UART: [art] PUB.Y = 8A6BE0C15C9EAF19E4902FF2F4C7ED29070A4D27307696E2DFA6F92EA0855C226D5CBEAEE7BE919778A5852EDCA1C9CB
25,102,778 UART: [art] SIG.R = F1141858C57E4A419CCA537EC6F3B7D7213593FA16235B1F409DCB6C4C0579E51590294A4C00702F93865A5DA2FAB139
25,110,196 UART: [art] SIG.S = B4B5F5B3A49DA6AD51716665708EC44F27F8AAB3DBE9348B7A1B9EB6C9F44E0D34EBA7265AA0DFAFED391643519629DD
26,088,969 UART: Caliptra RT
26,089,661 UART: [state] CFI Enabled
26,254,279 UART: [rt] RT listening for mailbox commands...
26,256,666 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,287,004 UART: [rt]cmd =0x50435252, len=8
26,289,348 >>> mbox cmd response data (8 bytes)
28,351,470 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,357,361 >>> mbox cmd response: success
35,358,012 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,392,230 UART:
35,392,526 UART: Running Caliptra FMC ...
35,393,580 UART:
35,393,729 UART: [state] CFI Enabled
35,480,183 UART: [art] Extend RT PCRs Done
35,481,379 UART: [art] Lock RT PCRs Done
35,482,835 UART: [art] Populate DV Done
35,488,580 UART: [fht] FMC Alias Private Key: 7
35,490,061 UART: [art] Derive CDI
35,490,796 UART: [art] Store in in slot 0x4
35,549,586 UART: [art] Derive Key Pair
35,550,585 UART: [art] Store priv key in slot 0x5
38,013,282 UART: [art] Derive Key Pair - Done
38,026,286 UART: [art] Signing Cert with AUTHO
38,027,595 UART: RITY.KEYID = 7
39,739,263 UART: [art] Erasing AUTHORITY.KEYID = 7
39,740,776 UART: [art] PUB.X = C4F00330391AA4C12D698C0CD51E1BDAA9750308B8A72ACA07E44C9F501B3EFEFDEB10E6E7C465B4817A542C1842A64F
39,748,035 UART: [art] PUB.Y = CD184A6CCEB60ECAC4729CB7986E5E167356D8FBA8E0652CE53DFD7D34DB3A31D165B4B5A22566B323D246843E47D001
39,755,287 UART: [art] SIG.R = B27C751AA33D249E40A22ED68C875785C700D381093911040DB9E4A3C647786E7B273ABDE800FE2FE68896BCCE9146E4
39,762,675 UART: [art] SIG.S = 210B4A484D78156A95011882896E48AFEC28ED5C2ED6A6D93F6A6F45BFFDD9EF283A6B0B44695BBE429CF99EDA5CE650
40,741,784 UART: mbox::rt_entry...
40,742,735 UART: ____ _ _ _ ____ _____
40,744,712 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,746,711 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,748,638 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,750,571 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,752,498 UART: |_|
40,753,305 UART:
41,037,974 UART: [rt] Runtime listening for mailbox commands...
41,040,016 >>> mbox cmd response data (128 bytes)
43,092,446 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
50,098,092 >>> mbox cmd response: success
50,098,600 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,131,259 UART:
50,131,587 UART: Running Caliptra FMC ...
50,132,713 UART:
50,132,877 UART: [state] CFI Enabled
50,221,683 UART: [art] Extend RT PCRs Done
50,222,872 UART: [art] Lock RT PCRs Done
50,224,493 UART: [art] Populate DV Done
50,229,852 UART: [fht] FMC Alias Private Key: 7
50,231,395 UART: [art] Derive CDI
50,232,209 UART: [art] Store in in slot 0x4
50,290,524 UART: [art] Derive Key Pair
50,291,557 UART: [art] Store priv key in slot 0x5
52,754,558 UART: [art] Derive Key Pair - Done
52,767,512 UART: [art] Signing Cert with AUTHO
52,768,847 UART: RITY.KEYID = 7
54,480,727 UART: [art] Erasing AUTHORITY.KEYID = 7
54,482,222 UART: [art] PUB.X = 35B9A25D11C1442EED20FEA2235F89C1535459009B5BCBAFBE7242B690A8775E614639C86B5AEEF842F94BC2C2BBBA5F
54,489,468 UART: [art] PUB.Y = 9CD47E0ABB2AAC7ADDB95FF26C142DCE559E0C319FC79BB93B2C726543CC6ED9F1D0953C55828EC6DFB59791E046DE20
54,496,750 UART: [art] SIG.R = 46EA679F86FA90AA46E28E40B9DAA45E21EE32F3EBFCEDFC384069A53F6075C5A81858219836AC8CDA345DDDF7164A13
54,504,132 UART: [art] SIG.S = E2416E7EFFB18548BC2F850D846CD6FC671E78402CA1F476877A8EAA9EB589078BB6B1B7AA3788E87DEB1B8B4B8A7DC9
55,482,627 UART: mbox::rt_entry...
55,483,579 UART: ____ _ _ _ ____ _____
55,485,562 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,487,567 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,489,498 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,491,426 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,493,279 UART: |_|
55,494,080 UART:
55,781,618 UART: [rt] Runtime listening for mailbox commands...
55,783,663 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,756,429 ready_for_fw is high
3,756,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,968,051 >>> mbox cmd response: success
19,223,070 UART:
19,223,446 UART: Running Caliptra FMC ...
19,224,575 UART:
19,224,729 UART: [state] CFI Enabled
19,233,084 UART: [fht] FMC Alias Private Key: 7
20,989,913 UART: [art] Extend RT PCRs Done
20,991,155 UART: [art] Lock RT PCRs Done
20,992,829 UART: [art] Populate DV Done
20,998,235 UART: [fht] FMC Alias Private Key: 7
20,999,717 UART: [art] Derive CDI
21,000,475 UART: [art] Store in in slot 0x4
21,042,690 UART: [art] Derive Key Pair
21,043,687 UART: [art] Store priv key in slot 0x5
23,470,468 UART: [art] Derive Key Pair - Done
23,483,624 UART: [art] Signing Cert with AUTHO
23,484,930 UART: RITY.KEYID = 7
25,190,509 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,012 UART: [art] PUB.X = C2F635CDA1DCE4BCD93489AFC3DFFC1C6886B594AB00C54F9A0F5147E98A5587FD1366137FF3BCD5FAB0B6E66BA795F6
25,199,274 UART: [art] PUB.Y = 9D17C880DD655225B9F05FDBDA64386046263C85F861E4E592175713D4B72A3089866DF8788AE70D3190C54E3BC2D5FB
25,206,541 UART: [art] SIG.R = 10F47B3BFB3BC43354C5906F173CFF3E24B1ABFD668A22CAF76FDA4FF096336C21C6A8FA6F04597E07DF9000B8C3AF36
25,213,895 UART: [art] SIG.S = 21AC78B7D0D78D2C0D478C0E4BD4F1D7FC15265784AF97CC8D008B1AF8C143FC1597F275B2322A03EA75466DC528FDEF
26,193,246 UART: Caliptra RT
26,193,968 UART: [state] CFI Enabled
26,311,902 UART: [rt] RT listening for mailbox commands...
26,314,208 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,343,960 UART: [rt]cmd =0x50435252, len=8
26,346,178 >>> mbox cmd response data (8 bytes)
28,399,969 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,319,951 >>> mbox cmd response: success
35,320,479 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,353,182 UART:
35,353,474 UART: Running Caliptra FMC ...
35,354,587 UART:
35,354,741 UART: [state] CFI Enabled
35,398,734 UART: [art] Extend RT PCRs Done
35,399,926 UART: [art] Lock RT PCRs Done
35,401,231 UART: [art] Populate DV Done
35,406,706 UART: [fht] FMC Alias Private Key: 7
35,408,182 UART: [art] Derive CDI
35,408,988 UART: [art] Store in in slot 0x4
35,451,520 UART: [art] Derive Key Pair
35,452,511 UART: [art] Store priv key in slot 0x5
37,879,431 UART: [art] Derive Key Pair - Done
37,892,698 UART: [art] Signing Cert with AUTHO
37,894,005 UART: RITY.KEYID = 7
39,599,299 UART: [art] Erasing AUTHORITY.KEYID = 7
39,600,799 UART: [art] PUB.X = 0B17171A6C125EE947C0C46C9126DABB03B1017678EA7C8D2893F6A10D5C0D56415A7CF9F283C49E7567A6AB1E2C227F
39,608,102 UART: [art] PUB.Y = 1C0E0D6B8CCEDF2E391821F758E618EDF4F1593A251C3A8BA8676F2D553A39450BB1D590B59EC200F7BD13061097A2D1
39,615,331 UART: [art] SIG.R = B1CA2DA3BFB48A8F6B059088FE4CCDD5E27CDCE43D46BE9732A138868C8F7C7963E26B60349154C907254E6AE1B08899
39,622,803 UART: [art] SIG.S = EA98F90E36B28F36F780C041FF423288E0BAB35F295F298F7E713ECDD02502A1F3FA4801188680AAA148B63CD025722B
40,601,002 UART: mbox::rt_entry...
40,601,961 UART: ____ _ _ _ ____ _____
40,603,937 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,605,936 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,607,854 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,609,772 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,611,691 UART: |_|
40,612,489 UART:
40,900,919 UART: [rt] Runtime listening for mailbox commands...
40,902,975 >>> mbox cmd response data (128 bytes)
42,951,078 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
49,870,859 >>> mbox cmd response: success
49,871,322 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,906,669 UART:
49,906,959 UART: Running Caliptra FMC ...
49,908,075 UART:
49,908,227 UART: [state] CFI Enabled
49,952,527 UART: [art] Extend RT PCRs Done
49,953,714 UART: [art] Lock RT PCRs Done
49,955,175 UART: [art] Populate DV Done
49,960,745 UART: [fht] FMC Alias Private Key: 7
49,962,275 UART: [art] Derive CDI
49,963,079 UART: [art] Store in in slot 0x4
50,005,614 UART: [art] Derive Key Pair
50,006,613 UART: [art] Store priv key in slot 0x5
52,433,073 UART: [art] Derive Key Pair - Done
52,446,030 UART: [art] Signing Cert with AUTHO
52,447,343 UART: RITY.KEYID = 7
54,152,552 UART: [art] Erasing AUTHORITY.KEYID = 7
54,154,058 UART: [art] PUB.X = 1FBBD1D8A695F5A64FD187D20180F276A0C4BF3EF9148DF6F862137D960AE8C80CE8E6C4BD1F97ECED9EB2AEFD6519C9
54,161,355 UART: [art] PUB.Y = 67BD4DD8C67A338584C4A3CE1DD3D571E607C15DE1CBFA0D814108B6C7368681376AD5ACD239C27845FFCEDA1C30C1F8
54,168,641 UART: [art] SIG.R = 5F83147F53690FE9DE90A1E7D15CBE02A8BC8212A4AEEE237A91CC371273058416FB3EC8585F3CCFBFF9D37B7593A112
54,176,026 UART: [art] SIG.S = 0074B616689E932E04A827329EFB982C49567A70A8DDA817F21739C9B44862FCEC6009D7B35C401159C4081FD1727EF2
55,154,241 UART: mbox::rt_entry...
55,155,191 UART: ____ _ _ _ ____ _____
55,157,169 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,159,166 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,161,087 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,163,009 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,164,939 UART: |_|
55,165,738 UART:
55,451,777 UART: [rt] Runtime listening for mailbox commands...
55,453,801 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,151 UART: [kat] SHA2-256
882,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,197 UART: [kat] ++
886,349 UART: [kat] sha1
890,639 UART: [kat] SHA2-256
892,577 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
902,786 UART: [kat] HMAC-384Kdf
907,368 UART: [kat] LMS
1,475,564 UART: [kat] --
1,476,431 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,908 UART: [idev] ++
1,480,076 UART: [idev] CDI.KEYID = 6
1,480,436 UART: [idev] SUBJECT.KEYID = 7
1,480,860 UART: [idev] UDS.KEYID = 0
1,481,205 ready_for_fw is high
1,481,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,954 UART: [idev] Erasing UDS.KEYID = 0
1,505,482 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,220 UART: [idev] --
1,515,347 UART: [ldev] ++
1,515,515 UART: [ldev] CDI.KEYID = 6
1,515,878 UART: [ldev] SUBJECT.KEYID = 5
1,516,304 UART: [ldev] AUTHORITY.KEYID = 7
1,516,767 UART: [ldev] FE.KEYID = 1
1,521,927 UART: [ldev] Erasing FE.KEYID = 1
1,547,778 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,672 UART: [ldev] --
1,587,043 UART: [fwproc] Waiting for Commands...
1,587,684 UART: [fwproc] Received command 0x46574c44
1,588,475 UART: [fwproc] Received Image of size 114448 bytes
2,887,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,532 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,884 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,843 >>> mbox cmd response: success
3,081,961 UART: [afmc] ++
3,082,129 UART: [afmc] CDI.KEYID = 6
3,082,491 UART: [afmc] SUBJECT.KEYID = 7
3,082,916 UART: [afmc] AUTHORITY.KEYID = 5
3,117,169 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,265 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,993 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,878 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,568 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,561 UART: [afmc] --
3,160,689 UART: [cold-reset] --
3,161,545 UART: [state] Locking Datavault
3,162,956 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,560 UART: [state] Locking ICCM
3,164,142 UART: [exit] Launching FMC @ 0x40000130
3,169,471 UART:
3,169,487 UART: Running Caliptra FMC ...
3,169,895 UART:
3,169,949 UART: [state] CFI Enabled
3,180,262 UART: [fht] FMC Alias Private Key: 7
3,288,051 UART: [art] Extend RT PCRs Done
3,288,479 UART: [art] Lock RT PCRs Done
3,289,909 UART: [art] Populate DV Done
3,298,166 UART: [fht] FMC Alias Private Key: 7
3,299,194 UART: [art] Derive CDI
3,299,474 UART: [art] Store in in slot 0x4
3,385,261 UART: [art] Derive Key Pair
3,385,621 UART: [art] Store priv key in slot 0x5
3,398,503 UART: [art] Derive Key Pair - Done
3,413,396 UART: [art] Signing Cert with AUTHO
3,413,876 UART: RITY.KEYID = 7
3,428,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,647 UART: [art] PUB.X = 828DCEE53339A749158552D63C8F903021C3BA9505AF919B841C993A84B8800BC83F85E19CC7BAC4D9AC14A887245397
3,436,409 UART: [art] PUB.Y = 1A9719C18087A46ABF395E530229919FA7E4A560D0DF12C472FA99629616E48FC5AE0BD655FC090FE484EF2EC76406F8
3,443,348 UART: [art] SIG.R = AAEC984F5DBE5D145CA34E8B6EEE053761AC8DDCB52A9AB8E3748EA16D0A325A67142679247863FED93BE3171880A577
3,450,124 UART: [art] SIG.S = 3FE4D92E4F8440905EF684AF0F2F644902445A53CF3C4F17BB8266386BFC434058C18A12E7BC30BCD3E71B2E7CF3B865
3,474,273 UART: Caliptra RT
3,474,526 UART: [state] CFI Enabled
3,583,091 UART: [rt] RT listening for mailbox commands...
3,583,761 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,655 UART: [rt]cmd =0x50435252, len=8
3,615,256 >>> mbox cmd response data (8 bytes)
3,615,257 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,931 UART:
3,615,947 UART: Running Caliptra ROM ...
3,616,355 UART:
3,616,409 UART: [state] CFI Enabled
3,618,943 UART: [state] LifecycleState = Unprovisioned
3,619,598 UART: [state] DebugLocked = No
3,620,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,899 UART: [kat] SHA2-256
4,415,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,945 UART: [kat] ++
4,420,097 UART: [kat] sha1
4,424,425 UART: [kat] SHA2-256
4,426,363 UART: [kat] SHA2-384
4,429,132 UART: [kat] SHA2-512-ACC
4,431,032 UART: [kat] ECC-384
4,436,559 UART: [kat] HMAC-384Kdf
4,440,963 UART: [kat] LMS
5,009,159 UART: [kat] --
5,010,082 UART: [update-reset] ++
5,937,314 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,938,524 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,034,958 >>> mbox cmd response: success
6,034,958 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,035,211 UART: [update-reset] Copying MAN_2 To MAN_1
6,043,225 UART: [update-reset Success] --
6,044,228 UART: [state] Locking Datavault
6,044,870 UART: [state] Locking PCR0, PCR1 and PCR31
6,045,474 UART: [state] Locking ICCM
6,046,148 UART: [exit] Launching FMC @ 0x40000130
6,051,477 UART:
6,051,493 UART: Running Caliptra FMC ...
6,051,901 UART:
6,051,955 UART: [state] CFI Enabled
6,141,132 UART: [art] Extend RT PCRs Done
6,141,560 UART: [art] Lock RT PCRs Done
6,142,945 UART: [art] Populate DV Done
6,151,322 UART: [fht] FMC Alias Private Key: 7
6,152,376 UART: [art] Derive CDI
6,152,656 UART: [art] Store in in slot 0x4
6,238,057 UART: [art] Derive Key Pair
6,238,417 UART: [art] Store priv key in slot 0x5
6,251,473 UART: [art] Derive Key Pair - Done
6,266,169 UART: [art] Signing Cert with AUTHO
6,266,649 UART: RITY.KEYID = 7
6,281,745 UART: [art] Erasing AUTHORITY.KEYID = 7
6,282,510 UART: [art] PUB.X = 37B03983297805374C6F8B9C035FBDB0EEE35C68C418344656EDFD95A83081EA96EE35C5F57D386D4C0BEC364672A6EE
6,289,277 UART: [art] PUB.Y = 4AC388ABA0F1BC71F81472E6BE1DFB717E8CD33189606666A72299FF66A47DD4DBC9891E0B3224F3B2371B5DCF407D09
6,296,231 UART: [art] SIG.R = D15BBD4BF55F5995C9861DC191C7ACDA8A941FB8F371F962B8ED90490E744D20E5941264DE15A75CA939AC33B57E1C31
6,303,008 UART: [art] SIG.S = 20627053809B3D81C9ADE0B5840744E5C99F2C06C2D5A833518B94EE81EAC9887A8F8B1D0F983B94B8AE83C4BCE37DE5
6,326,828 UART: mbox::rt_entry...
6,327,200 UART: ____ _ _ _ ____ _____
6,327,984 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,328,784 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,329,552 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,330,320 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,331,088 UART: |_|
6,331,400 UART:
6,607,248 UART: [rt] Runtime listening for mailbox commands...
6,608,295 >>> mbox cmd response data (128 bytes)
6,608,296 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,608,410 UART:
6,608,426 UART: Running Caliptra ROM ...
6,608,834 UART:
6,608,888 UART: [state] CFI Enabled
6,611,922 UART: [state] LifecycleState = Unprovisioned
6,612,577 UART: [state] DebugLocked = No
6,613,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,614,702 UART: [kat] SHA2-256
7,408,633 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,412,748 UART: [kat] ++
7,412,900 UART: [kat] sha1
7,416,938 UART: [kat] SHA2-256
7,418,876 UART: [kat] SHA2-384
7,421,749 UART: [kat] SHA2-512-ACC
7,423,649 UART: [kat] ECC-384
7,429,008 UART: [kat] HMAC-384Kdf
7,433,486 UART: [kat] LMS
8,001,682 UART: [kat] --
8,002,623 UART: [update-reset] ++
8,929,929 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,931,023 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,027,457 >>> mbox cmd response: success
9,027,457 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,027,652 UART: [update-reset] Copying MAN_2 To MAN_1
9,035,666 UART: [update-reset Success] --
9,036,633 UART: [state] Locking Datavault
9,037,333 UART: [state] Locking PCR0, PCR1 and PCR31
9,037,937 UART: [state] Locking ICCM
9,038,479 UART: [exit] Launching FMC @ 0x40000130
9,043,808 UART:
9,043,824 UART: Running Caliptra FMC ...
9,044,232 UART:
9,044,286 UART: [state] CFI Enabled
9,133,381 UART: [art] Extend RT PCRs Done
9,133,809 UART: [art] Lock RT PCRs Done
9,134,890 UART: [art] Populate DV Done
9,143,387 UART: [fht] FMC Alias Private Key: 7
9,144,529 UART: [art] Derive CDI
9,144,809 UART: [art] Store in in slot 0x4
9,230,570 UART: [art] Derive Key Pair
9,230,930 UART: [art] Store priv key in slot 0x5
9,243,994 UART: [art] Derive Key Pair - Done
9,258,564 UART: [art] Signing Cert with AUTHO
9,259,044 UART: RITY.KEYID = 7
9,274,044 UART: [art] Erasing AUTHORITY.KEYID = 7
9,274,809 UART: [art] PUB.X = DB7260E3B58058EBB82BAC94120DCB9F0FE01C9C9AACE761CF1FC1754741A3D10540638C94C7F46B14370618A02AF13C
9,281,577 UART: [art] PUB.Y = 43DEA30942D0942C6E75AF32062DAD6E39E4037DD18C92C5B7C7BC3B72AABCE077B5244E02E69DE96BA47AEC461A6A54
9,288,531 UART: [art] SIG.R = B15CDC7AC71A1F322CDD84FFAC5C28C2F1CB272B98A0D04494E168E4A9E11651BB38B6924F7BEC8520B4776AAA4FC401
9,295,316 UART: [art] SIG.S = DDAC686975DEDF69A345C14B5A80C1545A0F7E45A0F001E0FFCE69EB2DDB27B6B12E1273B4770B05D7C8A5597D9895E7
9,319,085 UART: mbox::rt_entry...
9,319,457 UART: ____ _ _ _ ____ _____
9,320,241 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,321,041 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,321,809 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,322,577 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,323,345 UART: |_|
9,323,657 UART:
9,608,002 UART: [rt] Runtime listening for mailbox commands...
9,609,049 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,223 ready_for_fw is high
1,362,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,965 >>> mbox cmd response: success
2,992,047 UART:
2,992,063 UART: Running Caliptra FMC ...
2,992,471 UART:
2,992,525 UART: [state] CFI Enabled
3,002,850 UART: [fht] FMC Alias Private Key: 7
3,110,437 UART: [art] Extend RT PCRs Done
3,110,865 UART: [art] Lock RT PCRs Done
3,112,293 UART: [art] Populate DV Done
3,120,314 UART: [fht] FMC Alias Private Key: 7
3,121,290 UART: [art] Derive CDI
3,121,570 UART: [art] Store in in slot 0x4
3,207,287 UART: [art] Derive Key Pair
3,207,647 UART: [art] Store priv key in slot 0x5
3,220,769 UART: [art] Derive Key Pair - Done
3,235,486 UART: [art] Signing Cert with AUTHO
3,235,966 UART: RITY.KEYID = 7
3,250,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,613 UART: [art] PUB.X = ACA6452447523AC0AEB27337B46B9F6FE78B8236C14205AD801B3A01947D89590AEA1DEC4CBBA62331A86F88B5C703E7
3,258,379 UART: [art] PUB.Y = CFE73C2E39424CF7AABAD03855AFF96B94196F23D3107890F2A46542AAC715CCF8492776E6E4E9A7E36429E2123CA0E2
3,265,337 UART: [art] SIG.R = D6C29221B0011F5332956C70246E9E1BB7E85760D239F78CA49D515E37A811B6BFEE227812C29CDCF0C09B2FB03318AD
3,272,108 UART: [art] SIG.S = E867805CF552E3E3C21F18FDBAE9197E5EB02C5942D44814A8BF997D4EB8E4C1BCF6BC86917994B7293B5488A1A924DB
3,296,215 UART: Caliptra RT
3,296,468 UART: [state] CFI Enabled
3,404,856 UART: [rt] RT listening for mailbox commands...
3,405,526 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,006 UART: [rt]cmd =0x50435252, len=8
3,436,775 >>> mbox cmd response data (8 bytes)
3,436,776 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,738,525 >>> mbox cmd response: success
5,738,525 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,751,848 UART:
5,751,864 UART: Running Caliptra FMC ...
5,752,272 UART:
5,752,326 UART: [state] CFI Enabled
5,841,577 UART: [art] Extend RT PCRs Done
5,842,005 UART: [art] Lock RT PCRs Done
5,843,302 UART: [art] Populate DV Done
5,851,727 UART: [fht] FMC Alias Private Key: 7
5,852,837 UART: [art] Derive CDI
5,853,117 UART: [art] Store in in slot 0x4
5,938,536 UART: [art] Derive Key Pair
5,938,896 UART: [art] Store priv key in slot 0x5
5,951,892 UART: [art] Derive Key Pair - Done
5,966,828 UART: [art] Signing Cert with AUTHO
5,967,308 UART: RITY.KEYID = 7
5,982,512 UART: [art] Erasing AUTHORITY.KEYID = 7
5,983,277 UART: [art] PUB.X = 23222075D213C65A8B0BCB08A32EA081BDDCD7535B8473685E3539D8F70381E7F3EAAD3AF4D36E33B45CFE1F231A2F9E
5,990,050 UART: [art] PUB.Y = F9B8A5C10758E9CF3D79AA5D7D12C479E6F35C2300EF7278B803C43BF94EEFEF3BEFB65A15F5AC31DE26C18BD0EA4483
5,996,994 UART: [art] SIG.R = C361DB29180B24C0A1852B80D54B5B0B35672943E1D74FF27966E580D64637B2E2B0AB5106CD3FA06F427939823B4BA6
6,003,753 UART: [art] SIG.S = F6A57B97093920EB427EDD549500F0DC5CA04A12546F5C16BBE5032687BEFF789BB43904CE35AAA28BC37B04DC03DD17
6,027,379 UART: mbox::rt_entry...
6,027,751 UART: ____ _ _ _ ____ _____
6,028,535 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,029,335 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,030,103 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,030,871 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,031,639 UART: |_|
6,031,951 UART:
6,313,056 UART: [rt] Runtime listening for mailbox commands...
6,314,103 >>> mbox cmd response data (128 bytes)
6,314,104 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,614,137 >>> mbox cmd response: success
8,614,137 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,627,380 UART:
8,627,396 UART: Running Caliptra FMC ...
8,627,804 UART:
8,627,858 UART: [state] CFI Enabled
8,716,677 UART: [art] Extend RT PCRs Done
8,717,105 UART: [art] Lock RT PCRs Done
8,718,348 UART: [art] Populate DV Done
8,726,811 UART: [fht] FMC Alias Private Key: 7
8,727,837 UART: [art] Derive CDI
8,728,117 UART: [art] Store in in slot 0x4
8,813,944 UART: [art] Derive Key Pair
8,814,304 UART: [art] Store priv key in slot 0x5
8,827,412 UART: [art] Derive Key Pair - Done
8,842,353 UART: [art] Signing Cert with AUTHO
8,842,833 UART: RITY.KEYID = 7
8,858,427 UART: [art] Erasing AUTHORITY.KEYID = 7
8,859,192 UART: [art] PUB.X = F727A9FAC590806084F01171DB11506168EF8C5F1C05A6F6D689F07011448CE7F5549AD28258671AE9DC2072E20F7517
8,865,950 UART: [art] PUB.Y = 3553DA40A89A723DB5380C290F07E152A34F52D6723AF79166AD961A21ED728925FB69B875A8F187C0A0FE8F50FE373E
8,872,893 UART: [art] SIG.R = EC1030177178521C111D19DE2691C91BCB1F0739C58C80248A168B4C68F4CC33AB9403C23BABB5FC696D7C035C5FC583
8,879,658 UART: [art] SIG.S = E873503DB9AA8E0EBEBA2B60B61FAB3EEC9AA276D69450C8BC17B9EF1C3A07344036962E177A2E6C559D79187DEA0E8A
8,903,654 UART: mbox::rt_entry...
8,904,026 UART: ____ _ _ _ ____ _____
8,904,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,905,610 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,906,378 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,907,146 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,907,914 UART: |_|
8,908,226 UART:
9,189,243 UART: [rt] Runtime listening for mailbox commands...
9,190,290 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,824 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,880 UART: [kat] SHA2-256
892,818 UART: [kat] SHA2-384
895,419 UART: [kat] SHA2-512-ACC
897,320 UART: [kat] ECC-384
902,983 UART: [kat] HMAC-384Kdf
907,723 UART: [kat] LMS
1,475,919 UART: [kat] --
1,476,774 UART: [cold-reset] ++
1,477,326 UART: [fht] Storing FHT @ 0x50003400
1,480,127 UART: [idev] ++
1,480,295 UART: [idev] CDI.KEYID = 6
1,480,655 UART: [idev] SUBJECT.KEYID = 7
1,481,079 UART: [idev] UDS.KEYID = 0
1,481,424 ready_for_fw is high
1,481,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,015 UART: [idev] Erasing UDS.KEYID = 0
1,505,537 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,213 UART: [idev] --
1,515,112 UART: [ldev] ++
1,515,280 UART: [ldev] CDI.KEYID = 6
1,515,643 UART: [ldev] SUBJECT.KEYID = 5
1,516,069 UART: [ldev] AUTHORITY.KEYID = 7
1,516,532 UART: [ldev] FE.KEYID = 1
1,521,930 UART: [ldev] Erasing FE.KEYID = 1
1,547,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,907 UART: [ldev] --
1,586,348 UART: [fwproc] Waiting for Commands...
1,586,985 UART: [fwproc] Received command 0x46574c44
1,587,776 UART: [fwproc] Received Image of size 114448 bytes
2,888,093 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,129 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,522 >>> mbox cmd response: success
3,082,638 UART: [afmc] ++
3,082,806 UART: [afmc] CDI.KEYID = 6
3,083,168 UART: [afmc] SUBJECT.KEYID = 7
3,083,593 UART: [afmc] AUTHORITY.KEYID = 5
3,118,742 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,803 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,493 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,368 UART: [afmc] --
3,162,360 UART: [cold-reset] --
3,163,280 UART: [state] Locking Datavault
3,164,355 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,959 UART: [state] Locking ICCM
3,165,477 UART: [exit] Launching FMC @ 0x40000130
3,170,806 UART:
3,170,822 UART: Running Caliptra FMC ...
3,171,230 UART:
3,171,373 UART: [state] CFI Enabled
3,182,402 UART: [fht] FMC Alias Private Key: 7
3,290,749 UART: [art] Extend RT PCRs Done
3,291,177 UART: [art] Lock RT PCRs Done
3,292,647 UART: [art] Populate DV Done
3,301,098 UART: [fht] FMC Alias Private Key: 7
3,302,062 UART: [art] Derive CDI
3,302,342 UART: [art] Store in in slot 0x4
3,387,797 UART: [art] Derive Key Pair
3,388,157 UART: [art] Store priv key in slot 0x5
3,401,707 UART: [art] Derive Key Pair - Done
3,416,403 UART: [art] Signing Cert with AUTHO
3,416,883 UART: RITY.KEYID = 7
3,432,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,018 UART: [art] PUB.X = E55D5185DD5330E390BCA5AB424BE3B0B1A2743A7723ADEDD22ED7B6C102265A66649543B20B88966ACBD74CF95FC97B
3,439,794 UART: [art] PUB.Y = 48B23EBB1F32C91256D16C8B4241D2C43BCA1E066C89415F6A76BB2BF3E85FB99D29038ABEA5C8FF3AEE8E4B0EB25FE0
3,446,757 UART: [art] SIG.R = 4A41DF98DB57801482E776A49D643CEC65B9FEA0288945C7C3EF47CF1A9C8D8B76525CDF278358E2D408477F96586EEC
3,453,530 UART: [art] SIG.S = 30495A349CCD7689BB9A69DADC96D17250F5AD0E1817F8C6E02CA1EC843DCF5017C90EDCD1EBECD438A6DC027D1A4EB9
3,477,308 UART: Caliptra RT
3,477,653 UART: [state] CFI Enabled
3,585,881 UART: [rt] RT listening for mailbox commands...
3,586,551 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,723 UART: [rt]cmd =0x50435252, len=8
3,618,180 >>> mbox cmd response data (8 bytes)
3,618,181 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,893 UART:
3,618,909 UART: Running Caliptra ROM ...
3,619,317 UART:
3,619,458 UART: [state] CFI Enabled
3,622,088 UART: [state] LifecycleState = Unprovisioned
3,622,743 UART: [state] DebugLocked = No
3,623,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,625,122 UART: [kat] SHA2-256
4,419,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,423,168 UART: [kat] ++
4,423,320 UART: [kat] sha1
4,427,666 UART: [kat] SHA2-256
4,429,604 UART: [kat] SHA2-384
4,432,539 UART: [kat] SHA2-512-ACC
4,434,439 UART: [kat] ECC-384
4,439,810 UART: [kat] HMAC-384Kdf
4,444,644 UART: [kat] LMS
5,012,840 UART: [kat] --
5,013,501 UART: [update-reset] ++
5,940,767 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,941,915 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,038,349 >>> mbox cmd response: success
6,038,349 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,038,526 UART: [update-reset] Copying MAN_2 To MAN_1
6,046,540 UART: [update-reset Success] --
6,047,703 UART: [state] Locking Datavault
6,048,377 UART: [state] Locking PCR0, PCR1 and PCR31
6,048,981 UART: [state] Locking ICCM
6,049,621 UART: [exit] Launching FMC @ 0x40000130
6,054,950 UART:
6,054,966 UART: Running Caliptra FMC ...
6,055,374 UART:
6,055,517 UART: [state] CFI Enabled
6,144,368 UART: [art] Extend RT PCRs Done
6,144,796 UART: [art] Lock RT PCRs Done
6,146,251 UART: [art] Populate DV Done
6,154,728 UART: [fht] FMC Alias Private Key: 7
6,155,836 UART: [art] Derive CDI
6,156,116 UART: [art] Store in in slot 0x4
6,242,183 UART: [art] Derive Key Pair
6,242,543 UART: [art] Store priv key in slot 0x5
6,255,799 UART: [art] Derive Key Pair - Done
6,270,489 UART: [art] Signing Cert with AUTHO
6,270,969 UART: RITY.KEYID = 7
6,286,399 UART: [art] Erasing AUTHORITY.KEYID = 7
6,287,164 UART: [art] PUB.X = 70DB84E778D8C77EC59F60E6C9406E16E2318F15F37B0873486E4A9BC617B2EE75F59423E037999F68B82F494B03884E
6,293,924 UART: [art] PUB.Y = 98FC1930990EF543CF2048DF0624A2EA0005745C3FCF9ACBF11A2D09565366AD35E4F73FFA3DFB5D6AC9A7A455C2744E
6,300,854 UART: [art] SIG.R = 33CC7361A0929F4FA9ECBFCC3A93AA876DA58EFFCD95B2A1EB5CCAA99AAFC31EC84073BF554CDF5EA6C70A6A0C5ADA64
6,307,656 UART: [art] SIG.S = 782C6FD8784146E1A3691674BF806594E73486C72C83ED67BA920AF3512670157466E49C4E7B3BE837FC32712DCC60A1
6,331,294 UART: mbox::rt_entry...
6,331,666 UART: ____ _ _ _ ____ _____
6,332,450 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,333,250 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,334,018 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,334,786 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,335,554 UART: |_|
6,335,866 UART:
6,619,699 UART: [rt] Runtime listening for mailbox commands...
6,620,746 >>> mbox cmd response data (128 bytes)
6,620,747 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,620,861 UART:
6,620,877 UART: Running Caliptra ROM ...
6,621,285 UART:
6,621,426 UART: [state] CFI Enabled
6,624,392 UART: [state] LifecycleState = Unprovisioned
6,625,047 UART: [state] DebugLocked = No
6,625,783 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,627,450 UART: [kat] SHA2-256
7,421,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,425,496 UART: [kat] ++
7,425,648 UART: [kat] sha1
7,429,896 UART: [kat] SHA2-256
7,431,834 UART: [kat] SHA2-384
7,434,649 UART: [kat] SHA2-512-ACC
7,436,549 UART: [kat] ECC-384
7,441,784 UART: [kat] HMAC-384Kdf
7,446,504 UART: [kat] LMS
8,014,700 UART: [kat] --
8,015,319 UART: [update-reset] ++
8,943,261 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,944,431 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,040,865 >>> mbox cmd response: success
9,040,865 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,041,094 UART: [update-reset] Copying MAN_2 To MAN_1
9,049,108 UART: [update-reset Success] --
9,050,251 UART: [state] Locking Datavault
9,050,911 UART: [state] Locking PCR0, PCR1 and PCR31
9,051,515 UART: [state] Locking ICCM
9,051,975 UART: [exit] Launching FMC @ 0x40000130
9,057,304 UART:
9,057,320 UART: Running Caliptra FMC ...
9,057,728 UART:
9,057,871 UART: [state] CFI Enabled
9,147,436 UART: [art] Extend RT PCRs Done
9,147,864 UART: [art] Lock RT PCRs Done
9,149,073 UART: [art] Populate DV Done
9,157,358 UART: [fht] FMC Alias Private Key: 7
9,158,476 UART: [art] Derive CDI
9,158,756 UART: [art] Store in in slot 0x4
9,244,519 UART: [art] Derive Key Pair
9,244,879 UART: [art] Store priv key in slot 0x5
9,257,971 UART: [art] Derive Key Pair - Done
9,272,611 UART: [art] Signing Cert with AUTHO
9,273,091 UART: RITY.KEYID = 7
9,288,403 UART: [art] Erasing AUTHORITY.KEYID = 7
9,289,168 UART: [art] PUB.X = 8EB0E012FEE76D7B78C7E0CD57091D39B546CBFC76E7D5DB2ED1DEF926ECD4E050BFC63E02363E62160E83562C4C3075
9,295,945 UART: [art] PUB.Y = 7F16C322DF9CD13F651AB9C88DADB1E655078C2AE37223F2DE341529382BAAD9C32291A7517D1D6498306BD261704663
9,302,892 UART: [art] SIG.R = BEA3BC96C143156B6627D92E0029552C124D3957C050D933AFB6C3A275BE8AFCC828D998B0B82A5A8B97B7618275C58A
9,309,644 UART: [art] SIG.S = F4F5E77974B4998EFAB5DA1A11BF280BB65B09DC2D5521B547DA406B14918F6622524FE3128E11A92B134264FF76A1A5
9,332,569 UART: mbox::rt_entry...
9,332,941 UART: ____ _ _ _ ____ _____
9,333,725 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,334,525 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,335,293 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,336,061 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,336,829 UART: |_|
9,337,141 UART:
9,618,320 UART: [rt] Runtime listening for mailbox commands...
9,619,367 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,196 ready_for_fw is high
1,362,196 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,974 >>> mbox cmd response: success
2,990,060 UART:
2,990,076 UART: Running Caliptra FMC ...
2,990,484 UART:
2,990,627 UART: [state] CFI Enabled
3,001,084 UART: [fht] FMC Alias Private Key: 7
3,109,665 UART: [art] Extend RT PCRs Done
3,110,093 UART: [art] Lock RT PCRs Done
3,111,595 UART: [art] Populate DV Done
3,119,774 UART: [fht] FMC Alias Private Key: 7
3,120,944 UART: [art] Derive CDI
3,121,224 UART: [art] Store in in slot 0x4
3,207,111 UART: [art] Derive Key Pair
3,207,471 UART: [art] Store priv key in slot 0x5
3,220,757 UART: [art] Derive Key Pair - Done
3,235,421 UART: [art] Signing Cert with AUTHO
3,235,901 UART: RITY.KEYID = 7
3,251,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,014 UART: [art] PUB.X = 03F09E4FC724AD219C23220014C31B87F92D81F95169591D4D0E718AF10AA292B2CAEA9DC5A946B7EDF48093BD37911B
3,258,759 UART: [art] PUB.Y = 550E7805A91D1F2436DF8E0962774D8EE857F27A85694E947E502B828E5C950F19DCEFA9850840DC450BD8A39C8B9336
3,265,689 UART: [art] SIG.R = 94AFE95B9C110C7AF16E5F7E8E37548B08387CE6BDA6AD294457B9F082CA4D6A8B0C4933E46CB962786732D8D3132F4D
3,272,458 UART: [art] SIG.S = 3C4FD2472B2ECDD468144D44DB7BB31B9FDC8CC2029748F1AF5FE75A2784364445823E6A36BED29B5473792291A3B9A0
3,296,398 UART: Caliptra RT
3,296,743 UART: [state] CFI Enabled
3,404,294 UART: [rt] RT listening for mailbox commands...
3,404,964 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,750 UART: [rt]cmd =0x50435252, len=8
3,435,975 >>> mbox cmd response data (8 bytes)
3,435,976 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,737,646 >>> mbox cmd response: success
5,737,646 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,751,277 UART:
5,751,293 UART: Running Caliptra FMC ...
5,751,701 UART:
5,751,844 UART: [state] CFI Enabled
5,841,075 UART: [art] Extend RT PCRs Done
5,841,503 UART: [art] Lock RT PCRs Done
5,842,680 UART: [art] Populate DV Done
5,851,051 UART: [fht] FMC Alias Private Key: 7
5,852,209 UART: [art] Derive CDI
5,852,489 UART: [art] Store in in slot 0x4
5,937,798 UART: [art] Derive Key Pair
5,938,158 UART: [art] Store priv key in slot 0x5
5,952,050 UART: [art] Derive Key Pair - Done
5,966,820 UART: [art] Signing Cert with AUTHO
5,967,300 UART: RITY.KEYID = 7
5,982,646 UART: [art] Erasing AUTHORITY.KEYID = 7
5,983,411 UART: [art] PUB.X = 45DC90E08A475B54133B6F1289DDA485474DEB41A5CBAC46448667AE663B8E4FACDD3B64C43FECE682893B8F6B55CD05
5,990,192 UART: [art] PUB.Y = B9752A8409A9A1BD8531515710CD5DE63C27C8BF480916DF3953A1AEB3D6AF1A9B741B51BBBDE2D944D4D711E6F36F75
5,997,148 UART: [art] SIG.R = 1717CBA4280CFF976348D3BABF26758D7D76DA77D2B50A7C2685F33B85232A3859A681DC652169B74425E623670F5A4B
6,003,907 UART: [art] SIG.S = C7D8BE2399ED135EB5368160949866E938FC0CE081FB8AC4B98EF5DEDFE80A7BAB71383B8AFF3D08047517CF9FFE61B9
6,028,080 UART: mbox::rt_entry...
6,028,452 UART: ____ _ _ _ ____ _____
6,029,236 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,030,036 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,030,804 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,031,572 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,032,340 UART: |_|
6,032,652 UART:
6,320,404 UART: [rt] Runtime listening for mailbox commands...
6,321,451 >>> mbox cmd response data (128 bytes)
6,321,452 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,622,446 >>> mbox cmd response: success
8,622,446 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,635,785 UART:
8,635,801 UART: Running Caliptra FMC ...
8,636,209 UART:
8,636,352 UART: [state] CFI Enabled
8,725,549 UART: [art] Extend RT PCRs Done
8,725,977 UART: [art] Lock RT PCRs Done
8,727,380 UART: [art] Populate DV Done
8,735,837 UART: [fht] FMC Alias Private Key: 7
8,736,837 UART: [art] Derive CDI
8,737,117 UART: [art] Store in in slot 0x4
8,822,888 UART: [art] Derive Key Pair
8,823,248 UART: [art] Store priv key in slot 0x5
8,836,632 UART: [art] Derive Key Pair - Done
8,851,194 UART: [art] Signing Cert with AUTHO
8,851,674 UART: RITY.KEYID = 7
8,867,086 UART: [art] Erasing AUTHORITY.KEYID = 7
8,867,851 UART: [art] PUB.X = 44EFD6B7E006D62E662AD671EB954C342F68C1455F255D7F0111A306CCA3A1A0779A772BEF64F8CDA0CE1526C8428674
8,874,618 UART: [art] PUB.Y = 0434FDE69BA50C88A66396094AC76738C4EC7A75E9E9A30CD6F0078593C40A93B9A21D9BA522DF7C90A42E3FADCF065C
8,881,559 UART: [art] SIG.R = CBBDCEE03F3ECB1CE4AFA4138382C0ED5663C79F4B2F976E52683673484D50CB3DB61F7BEB5F7D0B4DFBCCB9D2E0E37D
8,888,356 UART: [art] SIG.S = 0E2DE6A6CA9DBFFF9EC99FD15D0697275C2485B55CCB36C28F6F8C4D5E37C95836EC1CFE61187DE4FE7B4BBF0C196083
8,912,244 UART: mbox::rt_entry...
8,912,616 UART: ____ _ _ _ ____ _____
8,913,400 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,914,200 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,914,968 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,915,736 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,916,504 UART: |_|
8,916,816 UART:
9,197,144 UART: [rt] Runtime listening for mailbox commands...
9,198,191 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
893,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,523 UART: [kat] ++
897,675 UART: [kat] sha1
901,811 UART: [kat] SHA2-256
903,751 UART: [kat] SHA2-384
906,614 UART: [kat] SHA2-512-ACC
908,515 UART: [kat] ECC-384
917,894 UART: [kat] HMAC-384Kdf
922,664 UART: [kat] LMS
1,170,992 UART: [kat] --
1,171,925 UART: [cold-reset] ++
1,172,325 UART: [fht] FHT @ 0x50003400
1,175,104 UART: [idev] ++
1,175,272 UART: [idev] CDI.KEYID = 6
1,175,632 UART: [idev] SUBJECT.KEYID = 7
1,176,056 UART: [idev] UDS.KEYID = 0
1,176,401 ready_for_fw is high
1,176,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,574 UART: [idev] Erasing UDS.KEYID = 0
1,201,023 UART: [idev] Sha1 KeyId Algorithm
1,209,663 UART: [idev] --
1,210,611 UART: [ldev] ++
1,210,779 UART: [ldev] CDI.KEYID = 6
1,211,142 UART: [ldev] SUBJECT.KEYID = 5
1,211,568 UART: [ldev] AUTHORITY.KEYID = 7
1,212,031 UART: [ldev] FE.KEYID = 1
1,217,321 UART: [ldev] Erasing FE.KEYID = 1
1,244,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,105 UART: [ldev] --
1,283,416 UART: [fwproc] Wait for Commands...
1,284,120 UART: [fwproc] Recv command 0x46574c44
1,284,848 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,657 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,750 >>> mbox cmd response: success
2,778,894 UART: [afmc] ++
2,779,062 UART: [afmc] CDI.KEYID = 6
2,779,424 UART: [afmc] SUBJECT.KEYID = 7
2,779,849 UART: [afmc] AUTHORITY.KEYID = 5
2,814,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,869 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,473 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,223 UART: [afmc] --
2,858,157 UART: [cold-reset] --
2,859,055 UART: [state] Locking Datavault
2,860,556 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,160 UART: [state] Locking ICCM
2,861,678 UART: [exit] Launching FMC @ 0x40000130
2,867,007 UART:
2,867,023 UART: Running Caliptra FMC ...
2,867,431 UART:
2,867,485 UART: [state] CFI Enabled
2,878,276 UART: [fht] FMC Alias Private Key: 7
2,986,587 UART: [art] Extend RT PCRs Done
2,987,015 UART: [art] Lock RT PCRs Done
2,988,621 UART: [art] Populate DV Done
2,997,172 UART: [fht] FMC Alias Private Key: 7
2,998,208 UART: [art] Derive CDI
2,998,488 UART: [art] Store in in slot 0x4
3,084,241 UART: [art] Derive Key Pair
3,084,601 UART: [art] Store priv key in slot 0x5
3,097,425 UART: [art] Derive Key Pair - Done
3,112,287 UART: [art] Signing Cert with AUTHO
3,112,767 UART: RITY.KEYID = 7
3,128,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,208 UART: [art] PUB.X = 7281FA6720B24A8F9FC4777F2DA8EAE5EA086D38D790F7A447F47CBC1C3766C101294A21687D3771FC29D5C43D489A0D
3,135,975 UART: [art] PUB.Y = AC4D4E75F3361377EC2D43A774FD3C9490150145BBC209AEC45C9CF05CD3AE7908B9BF9EF79CCA6A754C2F3BF4446F53
3,142,932 UART: [art] SIG.R = 3A872B65FF9A6DF468FB882FE879CEFAE72772B8E6A46D887CF1FE6EE1FCFF3DC62F86DF2619A41E616D8263E059A9DB
3,149,724 UART: [art] SIG.S = 476338577B9AFE7F82557CB647E9170DCA898F7E1233FAD4F132F542C6CB1202674B7513FA8AC0BFDBA71809C544DE69
3,173,394 UART: Caliptra RT
3,173,647 UART: [state] CFI Enabled
3,281,868 UART: [rt] RT listening for mailbox commands...
3,282,538 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,346 UART: [rt]cmd =0x50435252, len=8
3,313,631 >>> mbox cmd response data (8 bytes)
3,313,632 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,605 UART:
3,314,621 UART: Running Caliptra ROM ...
3,315,029 UART:
3,315,084 UART: [state] CFI Enabled
3,317,902 UART: [state] LifecycleState = Unprovisioned
3,318,557 UART: [state] DebugLocked = No
3,319,075 UART: [state] WD Timer not started. Device not locked for debugging
3,320,409 UART: [kat] SHA2-256
4,126,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,130,184 UART: [kat] ++
4,130,336 UART: [kat] sha1
4,134,580 UART: [kat] SHA2-256
4,136,520 UART: [kat] SHA2-384
4,139,323 UART: [kat] SHA2-512-ACC
4,141,223 UART: [kat] ECC-384
4,150,926 UART: [kat] HMAC-384Kdf
4,155,470 UART: [kat] LMS
4,403,798 UART: [kat] --
4,404,696 UART: [update-reset] ++
5,310,566 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,311,565 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,407,947 >>> mbox cmd response: success
5,407,947 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,408,280 UART: [update-reset] Copying MAN_2 To MAN_1
5,416,294 UART: [update-reset Success] --
5,417,173 UART: [state] Locking Datavault
5,418,081 UART: [state] Locking PCR0, PCR1 and PCR31
5,418,685 UART: [state] Locking ICCM
5,419,353 UART: [exit] Launching FMC @ 0x40000130
5,424,682 UART:
5,424,698 UART: Running Caliptra FMC ...
5,425,106 UART:
5,425,160 UART: [state] CFI Enabled
5,514,407 UART: [art] Extend RT PCRs Done
5,514,835 UART: [art] Lock RT PCRs Done
5,515,974 UART: [art] Populate DV Done
5,524,185 UART: [fht] FMC Alias Private Key: 7
5,525,291 UART: [art] Derive CDI
5,525,571 UART: [art] Store in in slot 0x4
5,611,330 UART: [art] Derive Key Pair
5,611,690 UART: [art] Store priv key in slot 0x5
5,624,504 UART: [art] Derive Key Pair - Done
5,639,698 UART: [art] Signing Cert with AUTHO
5,640,178 UART: RITY.KEYID = 7
5,655,246 UART: [art] Erasing AUTHORITY.KEYID = 7
5,656,011 UART: [art] PUB.X = 3C2E792BA0CA1C8436FB492C06EB7D51493C8497BED8BEAB85AA5FAAA7EA0F792BFFC08C6BFF8E57E3213A579A04FA42
5,662,798 UART: [art] PUB.Y = 4F0CA304C454D9FDBE42B0E53F210AF43FDB6D1F87BE8469FD947940FD855B584C42AE7CA9D359630BD9EA41CCA0A83A
5,669,756 UART: [art] SIG.R = ED1AF0651D1AC311EB304B3C0B203A775966F9E29AB2C5EB05E6F12CEACE4AA5D0DED1DEE09661F0D43F3799A19F5B49
5,676,542 UART: [art] SIG.S = D9E14C9588D527B3B3C2C11A3FB0BB638089B8826F0769BA1E1D25AAB87FF9491DD122150C8908FB810D6F08304C29EE
5,700,084 UART: mbox::rt_entry...
5,700,456 UART: ____ _ _ _ ____ _____
5,701,240 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,702,040 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,702,808 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,703,576 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,704,344 UART: |_|
5,704,656 UART:
5,985,299 UART: [rt] Runtime listening for mailbox commands...
5,986,346 >>> mbox cmd response data (128 bytes)
5,986,347 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,986,458 UART:
5,986,474 UART: Running Caliptra ROM ...
5,986,882 UART:
5,986,937 UART: [state] CFI Enabled
5,989,795 UART: [state] LifecycleState = Unprovisioned
5,990,450 UART: [state] DebugLocked = No
5,991,090 UART: [state] WD Timer not started. Device not locked for debugging
5,992,404 UART: [kat] SHA2-256
6,798,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,802,179 UART: [kat] ++
6,802,331 UART: [kat] sha1
6,806,651 UART: [kat] SHA2-256
6,808,591 UART: [kat] SHA2-384
6,811,572 UART: [kat] SHA2-512-ACC
6,813,472 UART: [kat] ECC-384
6,822,945 UART: [kat] HMAC-384Kdf
6,827,339 UART: [kat] LMS
7,075,667 UART: [kat] --
7,076,401 UART: [update-reset] ++
7,981,159 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,982,248 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,078,630 >>> mbox cmd response: success
8,078,630 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,078,813 UART: [update-reset] Copying MAN_2 To MAN_1
8,086,827 UART: [update-reset Success] --
8,088,080 UART: [state] Locking Datavault
8,088,990 UART: [state] Locking PCR0, PCR1 and PCR31
8,089,594 UART: [state] Locking ICCM
8,090,058 UART: [exit] Launching FMC @ 0x40000130
8,095,387 UART:
8,095,403 UART: Running Caliptra FMC ...
8,095,811 UART:
8,095,865 UART: [state] CFI Enabled
8,184,628 UART: [art] Extend RT PCRs Done
8,185,056 UART: [art] Lock RT PCRs Done
8,186,315 UART: [art] Populate DV Done
8,194,610 UART: [fht] FMC Alias Private Key: 7
8,195,688 UART: [art] Derive CDI
8,195,968 UART: [art] Store in in slot 0x4
8,281,383 UART: [art] Derive Key Pair
8,281,743 UART: [art] Store priv key in slot 0x5
8,294,901 UART: [art] Derive Key Pair - Done
8,309,395 UART: [art] Signing Cert with AUTHO
8,309,875 UART: RITY.KEYID = 7
8,324,821 UART: [art] Erasing AUTHORITY.KEYID = 7
8,325,586 UART: [art] PUB.X = D28B440752EDF2F6DE912F855A0C705B9D9D50ABA7CC1CB1AE751D8D3CCF919DD42EC47F50B37D3F3A8A3DD401EA3ECB
8,332,375 UART: [art] PUB.Y = FE9CEF38F4543689038A03C2E21A56EEA5746B7F1B1FAE67A5FDA391568B17868CC7A504094C6684665BBA17431F4F39
8,339,317 UART: [art] SIG.R = D7BF19EC692BA366D45DC54845B07EB5656CEB6A3E5011FFD07C8E1D9F8B08CE3293A114A79F2926CE054C5597D23061
8,346,089 UART: [art] SIG.S = 5AC2FE57A5C581E41C2BDACE013CE2EF2EA1646C391E8B132194FCE295F6B75404E54442316C8418C8EEA5955CCD4144
8,369,738 UART: mbox::rt_entry...
8,370,110 UART: ____ _ _ _ ____ _____
8,370,894 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,371,694 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,372,462 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,373,230 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,373,998 UART: |_|
8,374,310 UART:
8,659,140 UART: [rt] Runtime listening for mailbox commands...
8,660,187 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,893 ready_for_fw is high
1,059,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,089 >>> mbox cmd response: success
2,688,913 UART:
2,688,929 UART: Running Caliptra FMC ...
2,689,337 UART:
2,689,391 UART: [state] CFI Enabled
2,700,136 UART: [fht] FMC Alias Private Key: 7
2,808,509 UART: [art] Extend RT PCRs Done
2,808,937 UART: [art] Lock RT PCRs Done
2,810,617 UART: [art] Populate DV Done
2,818,800 UART: [fht] FMC Alias Private Key: 7
2,819,974 UART: [art] Derive CDI
2,820,254 UART: [art] Store in in slot 0x4
2,905,741 UART: [art] Derive Key Pair
2,906,101 UART: [art] Store priv key in slot 0x5
2,919,821 UART: [art] Derive Key Pair - Done
2,934,383 UART: [art] Signing Cert with AUTHO
2,934,863 UART: RITY.KEYID = 7
2,950,325 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,090 UART: [art] PUB.X = 81FFEC719A183E97F30F94747EF0C32783A70B7E40252E9F8A70F03F19D4D25646C634ED1025EDEB1B160D8EDB50F4D0
2,957,859 UART: [art] PUB.Y = F48DDDB52E547946723CFEF6446B0833F900940D851795B89BB57122933DB773163288E211516313B38A42BCCD8D0E6D
2,964,772 UART: [art] SIG.R = 8C4FADB64D68E03461961253762845E985877C7BC1AB8DC98D02248372F07FB3478D2C9B438364064A3858DC10C3CD23
2,971,530 UART: [art] SIG.S = 988B365C5B956F3CBF4DF7691C1ACB0A2155F944C2C770F04D0D6B45AA263AE32F0498D0FE9987B11D530BBAA54789CF
2,995,195 UART: Caliptra RT
2,995,448 UART: [state] CFI Enabled
3,102,876 UART: [rt] RT listening for mailbox commands...
3,103,546 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,188 UART: [rt]cmd =0x50435252, len=8
3,134,555 >>> mbox cmd response data (8 bytes)
3,134,556 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,109,924 >>> mbox cmd response: success
5,109,924 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,122,946 UART:
5,122,962 UART: Running Caliptra FMC ...
5,123,370 UART:
5,123,424 UART: [state] CFI Enabled
5,212,195 UART: [art] Extend RT PCRs Done
5,212,623 UART: [art] Lock RT PCRs Done
5,214,010 UART: [art] Populate DV Done
5,222,273 UART: [fht] FMC Alias Private Key: 7
5,223,409 UART: [art] Derive CDI
5,223,689 UART: [art] Store in in slot 0x4
5,309,610 UART: [art] Derive Key Pair
5,309,970 UART: [art] Store priv key in slot 0x5
5,323,218 UART: [art] Derive Key Pair - Done
5,337,994 UART: [art] Signing Cert with AUTHO
5,338,474 UART: RITY.KEYID = 7
5,353,656 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,421 UART: [art] PUB.X = BB8C7AC508200A5B05EAB37DCCAEDF6AF56C207324826EAE083588953B0F568A4B2E190E5ACCD0B89A6B38EAF56AD5B9
5,361,195 UART: [art] PUB.Y = 07E829864A6E4EB54CDF1A99B44BE0287AA89ECF7331A92C2C976496C7766D55B2EEC3017BCE74EBAC0187FE1D61F8A3
5,368,150 UART: [art] SIG.R = 9146D280E70DEC742B1E6493DF91ABBA0C75D7D70DEE7AE18315E0F36D91C606224543FAFF3772246CA73605DACA2BBC
5,374,919 UART: [art] SIG.S = 4DBAAFA56A3CC746675DBE9FDC5C4FC35272D9AFA763228E76723C23879C16629143E375D4859502155AFDF58078507C
5,398,741 UART: mbox::rt_entry...
5,399,113 UART: ____ _ _ _ ____ _____
5,399,897 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,400,697 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,401,465 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,402,233 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,403,001 UART: |_|
5,403,313 UART:
5,683,455 UART: [rt] Runtime listening for mailbox commands...
5,684,502 >>> mbox cmd response data (128 bytes)
5,684,503 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,659,399 >>> mbox cmd response: success
7,659,399 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,672,895 UART:
7,672,911 UART: Running Caliptra FMC ...
7,673,319 UART:
7,673,373 UART: [state] CFI Enabled
7,762,456 UART: [art] Extend RT PCRs Done
7,762,884 UART: [art] Lock RT PCRs Done
7,764,099 UART: [art] Populate DV Done
7,772,446 UART: [fht] FMC Alias Private Key: 7
7,773,594 UART: [art] Derive CDI
7,773,874 UART: [art] Store in in slot 0x4
7,859,515 UART: [art] Derive Key Pair
7,859,875 UART: [art] Store priv key in slot 0x5
7,873,147 UART: [art] Derive Key Pair - Done
7,887,861 UART: [art] Signing Cert with AUTHO
7,888,341 UART: RITY.KEYID = 7
7,903,323 UART: [art] Erasing AUTHORITY.KEYID = 7
7,904,088 UART: [art] PUB.X = 9844DC5ABF2F1389740F6D1590AA8D3B1553909A311FC32E079FAC2CAC9EC58476A95284E31901504D7F55FAE9D000CF
7,910,833 UART: [art] PUB.Y = B077568F586688E29E8ECC06ED6316996C18DEE9AA22320513F40E35BCE9E308CE00E5B08B22C5881A4FF6C941A64404
7,917,748 UART: [art] SIG.R = 10F42BD789FF40D3B1D2D785F1895C7EFE8E56A6553A3FE7A4AB4B2C9F99943633DCABD5D313C4DB1CF620ECE58D34CF
7,924,540 UART: [art] SIG.S = EA8ADFF9230092DA44B230B649DCB408738B981F3B0F12621916A62D58162E531DB86E900B6B3C2FD61831DA44830751
7,948,139 UART: mbox::rt_entry...
7,948,511 UART: ____ _ _ _ ____ _____
7,949,295 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,950,095 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,950,863 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,951,631 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,952,399 UART: |_|
7,952,711 UART:
8,235,239 UART: [rt] Runtime listening for mailbox commands...
8,236,286 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,859 UART: [state] LifecycleState = Unprovisioned
86,514 UART: [state] DebugLocked = No
87,222 UART: [state] WD Timer not started. Device not locked for debugging
88,557 UART: [kat] SHA2-256
894,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,332 UART: [kat] ++
898,484 UART: [kat] sha1
902,922 UART: [kat] SHA2-256
904,862 UART: [kat] SHA2-384
907,519 UART: [kat] SHA2-512-ACC
909,420 UART: [kat] ECC-384
919,303 UART: [kat] HMAC-384Kdf
924,011 UART: [kat] LMS
1,172,339 UART: [kat] --
1,173,156 UART: [cold-reset] ++
1,173,700 UART: [fht] FHT @ 0x50003400
1,176,257 UART: [idev] ++
1,176,425 UART: [idev] CDI.KEYID = 6
1,176,785 UART: [idev] SUBJECT.KEYID = 7
1,177,209 UART: [idev] UDS.KEYID = 0
1,177,554 ready_for_fw is high
1,177,554 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,483 UART: [idev] Erasing UDS.KEYID = 0
1,203,124 UART: [idev] Sha1 KeyId Algorithm
1,211,484 UART: [idev] --
1,212,520 UART: [ldev] ++
1,212,688 UART: [ldev] CDI.KEYID = 6
1,213,051 UART: [ldev] SUBJECT.KEYID = 5
1,213,477 UART: [ldev] AUTHORITY.KEYID = 7
1,213,940 UART: [ldev] FE.KEYID = 1
1,219,466 UART: [ldev] Erasing FE.KEYID = 1
1,245,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,552 UART: [ldev] --
1,285,057 UART: [fwproc] Wait for Commands...
1,285,703 UART: [fwproc] Recv command 0x46574c44
1,286,431 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,342 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,455 >>> mbox cmd response: success
2,779,469 UART: [afmc] ++
2,779,637 UART: [afmc] CDI.KEYID = 6
2,779,999 UART: [afmc] SUBJECT.KEYID = 7
2,780,424 UART: [afmc] AUTHORITY.KEYID = 5
2,816,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,400 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,285 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,004 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,710 UART: [afmc] --
2,859,838 UART: [cold-reset] --
2,860,702 UART: [state] Locking Datavault
2,861,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,531 UART: [state] Locking ICCM
2,863,201 UART: [exit] Launching FMC @ 0x40000130
2,868,530 UART:
2,868,546 UART: Running Caliptra FMC ...
2,868,954 UART:
2,869,097 UART: [state] CFI Enabled
2,879,298 UART: [fht] FMC Alias Private Key: 7
2,987,957 UART: [art] Extend RT PCRs Done
2,988,385 UART: [art] Lock RT PCRs Done
2,989,705 UART: [art] Populate DV Done
2,997,826 UART: [fht] FMC Alias Private Key: 7
2,998,892 UART: [art] Derive CDI
2,999,172 UART: [art] Store in in slot 0x4
3,084,887 UART: [art] Derive Key Pair
3,085,247 UART: [art] Store priv key in slot 0x5
3,097,765 UART: [art] Derive Key Pair - Done
3,112,598 UART: [art] Signing Cert with AUTHO
3,113,078 UART: RITY.KEYID = 7
3,128,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,283 UART: [art] PUB.X = D1C68511BE56B83889BF49160F06E27FBDF59ECA1D06B86A18D8B6B4BCF65A3D218405866500BDFD91F7C21E3481519C
3,136,027 UART: [art] PUB.Y = 4FD0D40B88148F3DC4F438272AAC07E65DD97754F70DFE71F7EF8098068015478B9D48C6B248F07B95C4188E0FB1D1E9
3,142,966 UART: [art] SIG.R = B615DC3F6A082214B195E60757F9804C42190D705D5526C67427E5C881F6B8A72B951B1D524184EBD785A205095F107A
3,149,711 UART: [art] SIG.S = 571AF52CDBC9505B24C2A0359F2C0FDDCCB13D7948D4F2573858767AF988DA89418D93086B98FF4EB4BC51223AF9832B
3,173,494 UART: Caliptra RT
3,173,839 UART: [state] CFI Enabled
3,282,352 UART: [rt] RT listening for mailbox commands...
3,283,022 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,524 UART: [rt]cmd =0x50435252, len=8
3,313,821 >>> mbox cmd response data (8 bytes)
3,313,822 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,861 UART:
3,314,877 UART: Running Caliptra ROM ...
3,315,285 UART:
3,315,427 UART: [state] CFI Enabled
3,318,529 UART: [state] LifecycleState = Unprovisioned
3,319,184 UART: [state] DebugLocked = No
3,319,676 UART: [state] WD Timer not started. Device not locked for debugging
3,320,920 UART: [kat] SHA2-256
4,126,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,130,695 UART: [kat] ++
4,130,847 UART: [kat] sha1
4,135,073 UART: [kat] SHA2-256
4,137,013 UART: [kat] SHA2-384
4,139,818 UART: [kat] SHA2-512-ACC
4,141,718 UART: [kat] ECC-384
4,151,407 UART: [kat] HMAC-384Kdf
4,155,941 UART: [kat] LMS
4,404,269 UART: [kat] --
4,405,167 UART: [update-reset] ++
5,310,177 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,311,196 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,407,578 >>> mbox cmd response: success
5,407,578 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,407,927 UART: [update-reset] Copying MAN_2 To MAN_1
5,415,941 UART: [update-reset Success] --
5,417,080 UART: [state] Locking Datavault
5,417,928 UART: [state] Locking PCR0, PCR1 and PCR31
5,418,532 UART: [state] Locking ICCM
5,419,126 UART: [exit] Launching FMC @ 0x40000130
5,424,455 UART:
5,424,471 UART: Running Caliptra FMC ...
5,424,879 UART:
5,425,022 UART: [state] CFI Enabled
5,514,759 UART: [art] Extend RT PCRs Done
5,515,187 UART: [art] Lock RT PCRs Done
5,516,410 UART: [art] Populate DV Done
5,524,563 UART: [fht] FMC Alias Private Key: 7
5,525,519 UART: [art] Derive CDI
5,525,799 UART: [art] Store in in slot 0x4
5,611,330 UART: [art] Derive Key Pair
5,611,690 UART: [art] Store priv key in slot 0x5
5,625,758 UART: [art] Derive Key Pair - Done
5,640,568 UART: [art] Signing Cert with AUTHO
5,641,048 UART: RITY.KEYID = 7
5,656,058 UART: [art] Erasing AUTHORITY.KEYID = 7
5,656,823 UART: [art] PUB.X = 0B74B514CE2BA2A3AF71B802F4C09378B3ABF9A464FBB2DB33F5276C7829F64F8877DEFB38D9BD3E36B9A7F00E1123E8
5,663,600 UART: [art] PUB.Y = FEC2F619CD0B00815F5B60086968769893D4DB1919393AF1BC50B3F4115FB4621291FB7AFAA0A983FDEFE7B36EC16C92
5,670,532 UART: [art] SIG.R = FA1EB56847E706066A045A536FB8445B02B95624707D4F3E28BD41C7D72C3B7DFD712819F132501EDD2980C9E064C756
5,677,288 UART: [art] SIG.S = 88B6BE9757F315C1CB61C43BD0B3C6B83C56D4C29C6D2FAB38097D98E50EE965E1DB7CEBD2AB4105BEBD3881660C35A2
5,701,153 UART: mbox::rt_entry...
5,701,525 UART: ____ _ _ _ ____ _____
5,702,309 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,703,109 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,703,877 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,704,645 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,705,413 UART: |_|
5,705,725 UART:
5,986,026 UART: [rt] Runtime listening for mailbox commands...
5,987,073 >>> mbox cmd response data (128 bytes)
5,987,074 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,987,185 UART:
5,987,201 UART: Running Caliptra ROM ...
5,987,609 UART:
5,987,751 UART: [state] CFI Enabled
5,990,725 UART: [state] LifecycleState = Unprovisioned
5,991,380 UART: [state] DebugLocked = No
5,992,018 UART: [state] WD Timer not started. Device not locked for debugging
5,993,150 UART: [kat] SHA2-256
6,798,800 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,802,925 UART: [kat] ++
6,803,077 UART: [kat] sha1
6,807,243 UART: [kat] SHA2-256
6,809,183 UART: [kat] SHA2-384
6,811,800 UART: [kat] SHA2-512-ACC
6,813,700 UART: [kat] ECC-384
6,823,623 UART: [kat] HMAC-384Kdf
6,828,133 UART: [kat] LMS
7,076,461 UART: [kat] --
7,077,157 UART: [update-reset] ++
7,982,197 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,983,398 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,079,780 >>> mbox cmd response: success
8,079,780 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,079,989 UART: [update-reset] Copying MAN_2 To MAN_1
8,088,003 UART: [update-reset Success] --
8,088,942 UART: [state] Locking Datavault
8,089,598 UART: [state] Locking PCR0, PCR1 and PCR31
8,090,202 UART: [state] Locking ICCM
8,090,630 UART: [exit] Launching FMC @ 0x40000130
8,095,959 UART:
8,095,975 UART: Running Caliptra FMC ...
8,096,383 UART:
8,096,526 UART: [state] CFI Enabled
8,185,843 UART: [art] Extend RT PCRs Done
8,186,271 UART: [art] Lock RT PCRs Done
8,187,674 UART: [art] Populate DV Done
8,195,839 UART: [fht] FMC Alias Private Key: 7
8,196,817 UART: [art] Derive CDI
8,197,097 UART: [art] Store in in slot 0x4
8,282,908 UART: [art] Derive Key Pair
8,283,268 UART: [art] Store priv key in slot 0x5
8,296,546 UART: [art] Derive Key Pair - Done
8,311,253 UART: [art] Signing Cert with AUTHO
8,311,733 UART: RITY.KEYID = 7
8,326,899 UART: [art] Erasing AUTHORITY.KEYID = 7
8,327,664 UART: [art] PUB.X = 7F4FF7DB36829C2FF9808DB7B83DF1FD0810D6C1FB0319209231B79B9E348BD91EA35B88AE581BFD11B9CF1E3D94CC13
8,334,444 UART: [art] PUB.Y = B9E0291DA8DDC126DACBA27E20F0F779C85266FCC4AB5288C59772F19A117C1D290FBD4BB03A50AEAB7ED1525A0F9912
8,341,406 UART: [art] SIG.R = B30DA2645F74E0BF32D1E37EC0EB67F7FFF6D0BDA488662B49790CEBD2E79E4265E86CF91133E69D8FEAD7A250DB8973
8,348,188 UART: [art] SIG.S = 8DB11A7CA0BE613053565FF68F2F209237BF686AC5DCD264C4462B4B67C8539496725926E59F1605F49564B8623CE7CF
8,372,248 UART: mbox::rt_entry...
8,372,620 UART: ____ _ _ _ ____ _____
8,373,404 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,374,204 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,374,972 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,375,740 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,376,508 UART: |_|
8,376,820 UART:
8,657,125 UART: [rt] Runtime listening for mailbox commands...
8,658,172 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,674 ready_for_fw is high
1,060,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,320 >>> mbox cmd response: success
2,690,338 UART:
2,690,354 UART: Running Caliptra FMC ...
2,690,762 UART:
2,690,905 UART: [state] CFI Enabled
2,701,726 UART: [fht] FMC Alias Private Key: 7
2,810,277 UART: [art] Extend RT PCRs Done
2,810,705 UART: [art] Lock RT PCRs Done
2,812,187 UART: [art] Populate DV Done
2,820,308 UART: [fht] FMC Alias Private Key: 7
2,821,480 UART: [art] Derive CDI
2,821,760 UART: [art] Store in in slot 0x4
2,907,447 UART: [art] Derive Key Pair
2,907,807 UART: [art] Store priv key in slot 0x5
2,921,245 UART: [art] Derive Key Pair - Done
2,935,902 UART: [art] Signing Cert with AUTHO
2,936,382 UART: RITY.KEYID = 7
2,951,800 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,565 UART: [art] PUB.X = 0B97D03D27CECDFE31C95381DFCE014B80EC7E07B0F811B901E32798C360536EFA319FF59A2F5708EB94E8D37A34E62D
2,959,332 UART: [art] PUB.Y = B5D3BABEC8A2F721EEEF24262A0B2C418EE86B83B2951AB1F855DC20D6642094291AA22816E00C0A3E043A0DF1B99236
2,966,277 UART: [art] SIG.R = 417FBAD697DABA3E1987D7D2BF92EB40ABA18274571DD86835857056896E2584A40FE4C71B3AB23EB045457D4FD565C2
2,973,050 UART: [art] SIG.S = D6D5D442154718F3DEB7BC4EA0F8A7C2C23357887992D7CF1512D8D1915A9B491B8F83DD1C434EF71C08EA368175581E
2,996,700 UART: Caliptra RT
2,997,045 UART: [state] CFI Enabled
3,105,108 UART: [rt] RT listening for mailbox commands...
3,105,778 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,666 UART: [rt]cmd =0x50435252, len=8
3,137,279 >>> mbox cmd response data (8 bytes)
3,137,280 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,114,877 >>> mbox cmd response: success
5,114,877 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,127,953 UART:
5,127,969 UART: Running Caliptra FMC ...
5,128,377 UART:
5,128,520 UART: [state] CFI Enabled
5,217,861 UART: [art] Extend RT PCRs Done
5,218,289 UART: [art] Lock RT PCRs Done
5,219,666 UART: [art] Populate DV Done
5,227,911 UART: [fht] FMC Alias Private Key: 7
5,228,925 UART: [art] Derive CDI
5,229,205 UART: [art] Store in in slot 0x4
5,314,564 UART: [art] Derive Key Pair
5,314,924 UART: [art] Store priv key in slot 0x5
5,327,942 UART: [art] Derive Key Pair - Done
5,342,903 UART: [art] Signing Cert with AUTHO
5,343,383 UART: RITY.KEYID = 7
5,358,503 UART: [art] Erasing AUTHORITY.KEYID = 7
5,359,268 UART: [art] PUB.X = B84625D219ACAA0A469C6518B462CB04DD7015284C78C8E16A3F59F97A5F4DBCEAE6ED050EEA459B561DE2E3B150FF1A
5,366,044 UART: [art] PUB.Y = EEB0D8BE5E69C7F09E6F0FE86C400FEF97CED1DCE93DAD08C73F086EA40B633700139EA76547DD78527C121E75D31C0C
5,372,972 UART: [art] SIG.R = FC5DF6EA8979ED690957E448C6BF4D125227DB21E688238C5D367D4CBE6723CB40803D944851CBE55DA90F38120EDBEC
5,379,743 UART: [art] SIG.S = 4A0D0000DEADD222A2894288CB18203B14E8E9903D2E53A85F5BC8B1C24CB1A7B42BB57EBEE6DEB64607BB75F78FD82C
5,403,540 UART: mbox::rt_entry...
5,403,912 UART: ____ _ _ _ ____ _____
5,404,696 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,405,496 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,406,264 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,407,032 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,407,800 UART: |_|
5,408,112 UART:
5,692,712 UART: [rt] Runtime listening for mailbox commands...
5,693,759 >>> mbox cmd response data (128 bytes)
5,693,760 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,670,797 >>> mbox cmd response: success
7,670,797 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,683,989 UART:
7,684,005 UART: Running Caliptra FMC ...
7,684,413 UART:
7,684,556 UART: [state] CFI Enabled
7,773,809 UART: [art] Extend RT PCRs Done
7,774,237 UART: [art] Lock RT PCRs Done
7,775,474 UART: [art] Populate DV Done
7,783,689 UART: [fht] FMC Alias Private Key: 7
7,784,803 UART: [art] Derive CDI
7,785,083 UART: [art] Store in in slot 0x4
7,871,000 UART: [art] Derive Key Pair
7,871,360 UART: [art] Store priv key in slot 0x5
7,885,002 UART: [art] Derive Key Pair - Done
7,899,971 UART: [art] Signing Cert with AUTHO
7,900,451 UART: RITY.KEYID = 7
7,915,905 UART: [art] Erasing AUTHORITY.KEYID = 7
7,916,670 UART: [art] PUB.X = 7F0A8B60EFC724E461A36BD5F34A908714362DDFC840327C77FFC3179907D2953E367A22811499849A14A5BE6DDA5964
7,923,432 UART: [art] PUB.Y = 48204EB7D6BFD5649E2788E948A5457360A078894605340A5E566EC483B8F296FF1AC285669F85915206409BDFB893EF
7,930,365 UART: [art] SIG.R = 99CC26A984778BF0C01B626A4FEDAB3209FC84B6A6FFA35F092DE12D7E8035C978A340B9D079B75D9BCE7D58691E6C50
7,937,141 UART: [art] SIG.S = 4A421FBFF0D57B239FBB310A0BD348D18C37FD825428EA7C1ECFEDD2145FB8508DE7C05CC5F552C89B65570FE62B8BB1
7,960,375 UART: mbox::rt_entry...
7,960,747 UART: ____ _ _ _ ____ _____
7,961,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,962,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,963,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,963,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,964,635 UART: |_|
7,964,947 UART:
8,245,639 UART: [rt] Runtime listening for mailbox commands...
8,246,686 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,441 UART: [kat] SHA2-256
901,381 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
915,742 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,170,065 UART: [fht] FHT @ 0x50003400
1,172,633 UART: [idev] ++
1,172,801 UART: [idev] CDI.KEYID = 6
1,173,162 UART: [idev] SUBJECT.KEYID = 7
1,173,587 UART: [idev] UDS.KEYID = 0
1,173,933 ready_for_fw is high
1,173,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,967 UART: [idev] Erasing UDS.KEYID = 0
1,199,147 UART: [idev] Sha1 KeyId Algorithm
1,208,191 UART: [idev] --
1,209,328 UART: [ldev] ++
1,209,496 UART: [ldev] CDI.KEYID = 6
1,209,860 UART: [ldev] SUBJECT.KEYID = 5
1,210,287 UART: [ldev] AUTHORITY.KEYID = 7
1,210,750 UART: [ldev] FE.KEYID = 1
1,215,806 UART: [ldev] Erasing FE.KEYID = 1
1,242,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,910 UART: [ldev] --
1,281,402 UART: [fwproc] Wait for Commands...
1,282,083 UART: [fwproc] Recv command 0x46574c44
1,282,816 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,584 >>> mbox cmd response: success
2,774,677 UART: [afmc] ++
2,774,845 UART: [afmc] CDI.KEYID = 6
2,775,208 UART: [afmc] SUBJECT.KEYID = 7
2,775,634 UART: [afmc] AUTHORITY.KEYID = 5
2,810,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,525 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,276 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,005 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,888 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,607 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,456 UART: [afmc] --
2,854,508 UART: [cold-reset] --
2,855,184 UART: [state] Locking Datavault
2,856,405 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,009 UART: [state] Locking ICCM
2,857,499 UART: [exit] Launching FMC @ 0x40000130
2,862,828 UART:
2,862,844 UART: Running Caliptra FMC ...
2,863,252 UART:
2,863,306 UART: [state] CFI Enabled
2,874,149 UART: [fht] FMC Alias Private Key: 7
2,981,438 UART: [art] Extend RT PCRs Done
2,981,866 UART: [art] Lock RT PCRs Done
2,983,360 UART: [art] Populate DV Done
2,991,521 UART: [fht] FMC Alias Private Key: 7
2,992,581 UART: [art] Derive CDI
2,992,861 UART: [art] Store in in slot 0x4
3,078,490 UART: [art] Derive Key Pair
3,078,850 UART: [art] Store priv key in slot 0x5
3,091,692 UART: [art] Derive Key Pair - Done
3,106,332 UART: [art] Signing Cert with AUTHO
3,106,812 UART: RITY.KEYID = 7
3,122,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,787 UART: [art] PUB.X = 873F56FC8675BCCBFE8464B113822008D6AA90D8D446032D78186699120358AE098AC9DC028D118123BCF3B277A8135F
3,129,538 UART: [art] PUB.Y = 82738273E96AF9C9FD886D52CCB0493AD4D255C7064F64134CC55187469AABD58E4480259C2029BE546B38B885D3B72C
3,136,483 UART: [art] SIG.R = 715E3E6FB121C17033E0F930366ED4241E66A1750EC008C6F8AF60A7B15C1FF3386B484A0452728B7CB7E7B897795EE3
3,143,244 UART: [art] SIG.S = AA3D23B83C7D5B209811F8DA086F5F096C2AA3633DA14D5E5F92EAB6C4A9F130FA24EF8A176C31CFF6CEF71D65478D21
3,167,467 UART: Caliptra RT
3,167,720 UART: [state] CFI Enabled
3,275,533 UART: [rt] RT listening for mailbox commands...
3,276,203 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,893 UART: [rt]cmd =0x50435252, len=8
3,307,300 >>> mbox cmd response data (8 bytes)
3,307,301 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,960 UART:
3,307,976 UART: Running Caliptra ROM ...
3,308,384 UART:
3,308,439 UART: [state] CFI Enabled
3,310,685 UART: [state] LifecycleState = Unprovisioned
3,311,340 UART: [state] DebugLocked = No
3,311,904 UART: [state] WD Timer not started. Device not locked for debugging
3,313,160 UART: [kat] SHA2-256
4,116,710 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,120,839 UART: [kat] ++
4,120,991 UART: [kat] sha1
4,125,157 UART: [kat] SHA2-256
4,127,097 UART: [kat] SHA2-384
4,129,836 UART: [kat] SHA2-512-ACC
4,131,736 UART: [kat] ECC-384
4,141,535 UART: [kat] HMAC-384Kdf
4,146,117 UART: [kat] LMS
4,394,429 UART: [kat] --
4,395,061 UART: [update-reset] ++
5,301,202 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,302,409 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,398,791 >>> mbox cmd response: success
5,398,791 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,398,956 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,970 UART: [update-reset Success] --
5,407,835 UART: [state] Locking Datavault
5,408,623 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,227 UART: [state] Locking ICCM
5,409,885 UART: [exit] Launching FMC @ 0x40000130
5,415,214 UART:
5,415,230 UART: Running Caliptra FMC ...
5,415,638 UART:
5,415,692 UART: [state] CFI Enabled
5,504,297 UART: [art] Extend RT PCRs Done
5,504,725 UART: [art] Lock RT PCRs Done
5,505,960 UART: [art] Populate DV Done
5,514,269 UART: [fht] FMC Alias Private Key: 7
5,515,265 UART: [art] Derive CDI
5,515,545 UART: [art] Store in in slot 0x4
5,601,398 UART: [art] Derive Key Pair
5,601,758 UART: [art] Store priv key in slot 0x5
5,615,136 UART: [art] Derive Key Pair - Done
5,630,051 UART: [art] Signing Cert with AUTHO
5,630,531 UART: RITY.KEYID = 7
5,645,295 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,060 UART: [art] PUB.X = 5C6B78961B39F6648664DC2C0E4BFD66EDAC862924AA84FDC87C9581178F9893CF20BC20DC2DC90F694132A93159B5B0
5,652,830 UART: [art] PUB.Y = EDE16564106754CE837FD45671DCB80AD4F241110C6C33B14439AF2DA17EA918E04F6B7CE89F423B7C70A812539CE2F8
5,659,780 UART: [art] SIG.R = 182EEC1A4C4234E30053C77344EAAABED19144E4693D620CB7A6BE3A612D16CE24659AC0B48638232646F3FF2AE258A2
5,666,531 UART: [art] SIG.S = D1BC05C29927804DADFA47FF025C8BFADD06B02E65103D369E14DA488DC8946F41A194E9F505D0A3D63E91530DFC04A4
5,690,514 UART: mbox::rt_entry...
5,690,886 UART: ____ _ _ _ ____ _____
5,691,670 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,692,470 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,693,238 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,006 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,694,774 UART: |_|
5,695,086 UART:
5,973,874 UART: [rt] Runtime listening for mailbox commands...
5,974,921 >>> mbox cmd response data (128 bytes)
5,974,922 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,975,033 UART:
5,975,049 UART: Running Caliptra ROM ...
5,975,457 UART:
5,975,512 UART: [state] CFI Enabled
5,978,276 UART: [state] LifecycleState = Unprovisioned
5,978,931 UART: [state] DebugLocked = No
5,979,585 UART: [state] WD Timer not started. Device not locked for debugging
5,980,779 UART: [kat] SHA2-256
6,784,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,788,458 UART: [kat] ++
6,788,610 UART: [kat] sha1
6,792,894 UART: [kat] SHA2-256
6,794,834 UART: [kat] SHA2-384
6,797,451 UART: [kat] SHA2-512-ACC
6,799,351 UART: [kat] ECC-384
6,809,032 UART: [kat] HMAC-384Kdf
6,813,668 UART: [kat] LMS
7,061,980 UART: [kat] --
7,062,898 UART: [update-reset] ++
7,966,859 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,967,894 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,064,276 >>> mbox cmd response: success
8,064,276 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,064,497 UART: [update-reset] Copying MAN_2 To MAN_1
8,072,511 UART: [update-reset Success] --
8,073,600 UART: [state] Locking Datavault
8,074,292 UART: [state] Locking PCR0, PCR1 and PCR31
8,074,896 UART: [state] Locking ICCM
8,075,384 UART: [exit] Launching FMC @ 0x40000130
8,080,713 UART:
8,080,729 UART: Running Caliptra FMC ...
8,081,137 UART:
8,081,191 UART: [state] CFI Enabled
8,170,238 UART: [art] Extend RT PCRs Done
8,170,666 UART: [art] Lock RT PCRs Done
8,172,067 UART: [art] Populate DV Done
8,180,328 UART: [fht] FMC Alias Private Key: 7
8,181,308 UART: [art] Derive CDI
8,181,588 UART: [art] Store in in slot 0x4
8,267,263 UART: [art] Derive Key Pair
8,267,623 UART: [art] Store priv key in slot 0x5
8,280,885 UART: [art] Derive Key Pair - Done
8,295,582 UART: [art] Signing Cert with AUTHO
8,296,062 UART: RITY.KEYID = 7
8,311,210 UART: [art] Erasing AUTHORITY.KEYID = 7
8,311,975 UART: [art] PUB.X = E9F546D106BA82A1633BAB47289083F180F349138507968E1AE48E099F45BF7C3C89C888C5BA6D884451F5B666AB8FD8
8,318,736 UART: [art] PUB.Y = 85BCA2888E092000C31FF59C183D48ECD7C61DA0F0661F4C1A2C1662CCE5BA117B60DFEA2F846C90A40F49BFBB33A560
8,325,674 UART: [art] SIG.R = 5CA5C308D9DC6818104C933B461E586A7BE0AC6BE7EA2BCE5633634AA8A84427B19D91FFEDA885B0332397596FFE2609
8,332,446 UART: [art] SIG.S = 4E4BCBFB25CD191262F1EE5C3E965F4F776FF4CA578F7BBD9BF447FE11CBF6F8B6AC6DD87048F5DDD36BF41BD33731AD
8,356,415 UART: mbox::rt_entry...
8,356,787 UART: ____ _ _ _ ____ _____
8,357,571 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,358,371 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,359,139 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,359,907 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,360,675 UART: |_|
8,360,987 UART:
8,642,587 UART: [rt] Runtime listening for mailbox commands...
8,643,634 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,646 ready_for_fw is high
1,056,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,142 >>> mbox cmd response: success
2,686,750 UART:
2,686,766 UART: Running Caliptra FMC ...
2,687,174 UART:
2,687,228 UART: [state] CFI Enabled
2,697,991 UART: [fht] FMC Alias Private Key: 7
2,805,666 UART: [art] Extend RT PCRs Done
2,806,094 UART: [art] Lock RT PCRs Done
2,807,368 UART: [art] Populate DV Done
2,815,739 UART: [fht] FMC Alias Private Key: 7
2,816,755 UART: [art] Derive CDI
2,817,035 UART: [art] Store in in slot 0x4
2,902,714 UART: [art] Derive Key Pair
2,903,074 UART: [art] Store priv key in slot 0x5
2,916,388 UART: [art] Derive Key Pair - Done
2,931,450 UART: [art] Signing Cert with AUTHO
2,931,930 UART: RITY.KEYID = 7
2,946,920 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,685 UART: [art] PUB.X = AE45DA8BA49FAC3FF2EAA1448F991954DA76FD55E2C9FD08CE5B6E171FE673DD515EFAB5E49FAD0B75DE07EBCB8C78E8
2,954,480 UART: [art] PUB.Y = 2DD0F0DB57322D55A0E6D12DBC9AAF727BA0B02C5482114CABF87321DA33E51D3E4DE9A4C28C380A019D36B25181B01E
2,961,438 UART: [art] SIG.R = BACB9460DC55CD0E395B59D1B9216EAB4E88EC7F7844DC040C4D91F1643DED0FBEDAA62BD682D3B024DE37977D1A0A28
2,968,215 UART: [art] SIG.S = 61D6741C8EFF3DB426533B7D4311857FB3680FF3C621056CBF8347FF89E3F367EF90B2D8651251267E7EBD6A6ADF528C
2,992,196 UART: Caliptra RT
2,992,449 UART: [state] CFI Enabled
3,100,596 UART: [rt] RT listening for mailbox commands...
3,101,266 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,198 UART: [rt]cmd =0x50435252, len=8
3,132,603 >>> mbox cmd response data (8 bytes)
3,132,604 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,103,227 >>> mbox cmd response: success
5,103,227 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,116,471 UART:
5,116,487 UART: Running Caliptra FMC ...
5,116,895 UART:
5,116,949 UART: [state] CFI Enabled
5,206,050 UART: [art] Extend RT PCRs Done
5,206,478 UART: [art] Lock RT PCRs Done
5,207,739 UART: [art] Populate DV Done
5,215,756 UART: [fht] FMC Alias Private Key: 7
5,216,766 UART: [art] Derive CDI
5,217,046 UART: [art] Store in in slot 0x4
5,302,293 UART: [art] Derive Key Pair
5,302,653 UART: [art] Store priv key in slot 0x5
5,315,521 UART: [art] Derive Key Pair - Done
5,330,384 UART: [art] Signing Cert with AUTHO
5,330,864 UART: RITY.KEYID = 7
5,345,632 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,397 UART: [art] PUB.X = 0086C82EFDF8BE504A8C76E9162E2B7B8D3F5A4F18AD1ADED8A3CD73D94BB9794B532223BD496EB30D89CE7BBF21CCE9
5,353,166 UART: [art] PUB.Y = D3977368E20672C10F8AC6E12E15BB4FFDC7C41CD8B7F3BB73FF81932EB2B8CDF5370AC505382CC771608F9D3287F573
5,360,114 UART: [art] SIG.R = F8931BBEFD7239CE16EF225A2D43C3D525253FCC5054AFAFE2F01A924590BDAD3FF38B56F2DCEEA152290AFAE14677CD
5,366,905 UART: [art] SIG.S = 92543AB7D4FDE8E4407C006F324C9D6B71EADCD3FBF11A3C4182C3DDED971421F06F8A069F80A6078CD13E329B531BD7
5,390,100 UART: mbox::rt_entry...
5,390,472 UART: ____ _ _ _ ____ _____
5,391,256 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,392,056 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,392,824 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,393,592 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,394,360 UART: |_|
5,394,672 UART:
5,678,033 UART: [rt] Runtime listening for mailbox commands...
5,679,080 >>> mbox cmd response data (128 bytes)
5,679,081 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,651,378 >>> mbox cmd response: success
7,651,378 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,664,844 UART:
7,664,860 UART: Running Caliptra FMC ...
7,665,268 UART:
7,665,322 UART: [state] CFI Enabled
7,754,843 UART: [art] Extend RT PCRs Done
7,755,271 UART: [art] Lock RT PCRs Done
7,756,252 UART: [art] Populate DV Done
7,764,463 UART: [fht] FMC Alias Private Key: 7
7,765,515 UART: [art] Derive CDI
7,765,795 UART: [art] Store in in slot 0x4
7,851,140 UART: [art] Derive Key Pair
7,851,500 UART: [art] Store priv key in slot 0x5
7,865,406 UART: [art] Derive Key Pair - Done
7,880,351 UART: [art] Signing Cert with AUTHO
7,880,831 UART: RITY.KEYID = 7
7,895,907 UART: [art] Erasing AUTHORITY.KEYID = 7
7,896,672 UART: [art] PUB.X = FEC690A3C2F4C723D2CDE7423C73D547F4EF5C0C96ACBB228623B9020F82D994DE73779282F97162FEC75EF46D46E39C
7,903,443 UART: [art] PUB.Y = 1D306BDC53AAFBB33293327E924EE9078760B65C56D27E21640A438E3AAAE9F297600D0262343F8A578E2F9C39BB64DA
7,910,385 UART: [art] SIG.R = 0281C4F870C1692876918506CE2E8763D28D6309D99C734A9112332FB9FA99C3ED84A25C4621426C173BD6D8CA4072EC
7,917,140 UART: [art] SIG.S = 2A70C65292C6BF0896FA6DC719B13562A5C5762118BAC52AE633A5B6EEE916ABFCB5D65E4E84AD4776C4A4C29A14EBFE
7,941,122 UART: mbox::rt_entry...
7,941,494 UART: ____ _ _ _ ____ _____
7,942,278 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,943,078 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,943,846 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,944,614 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,945,382 UART: |_|
7,945,694 UART:
8,227,176 UART: [rt] Runtime listening for mailbox commands...
8,228,223 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,547 UART: [kat] SHA2-256
891,097 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,542 UART: [kat] SHA2-256
901,482 UART: [kat] SHA2-384
904,257 UART: [kat] SHA2-512-ACC
906,158 UART: [kat] ECC-384
915,995 UART: [kat] HMAC-384Kdf
920,575 UART: [kat] LMS
1,168,887 UART: [kat] --
1,169,546 UART: [cold-reset] ++
1,170,124 UART: [fht] FHT @ 0x50003400
1,172,914 UART: [idev] ++
1,173,082 UART: [idev] CDI.KEYID = 6
1,173,443 UART: [idev] SUBJECT.KEYID = 7
1,173,868 UART: [idev] UDS.KEYID = 0
1,174,214 ready_for_fw is high
1,174,214 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,942 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,313 UART: [ldev] ++
1,209,481 UART: [ldev] CDI.KEYID = 6
1,209,845 UART: [ldev] SUBJECT.KEYID = 5
1,210,272 UART: [ldev] AUTHORITY.KEYID = 7
1,210,735 UART: [ldev] FE.KEYID = 1
1,215,777 UART: [ldev] Erasing FE.KEYID = 1
1,242,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,883 UART: [fwproc] Wait for Commands...
1,282,692 UART: [fwproc] Recv command 0x46574c44
1,283,425 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,140 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,423 >>> mbox cmd response: success
2,776,684 UART: [afmc] ++
2,776,852 UART: [afmc] CDI.KEYID = 6
2,777,215 UART: [afmc] SUBJECT.KEYID = 7
2,777,641 UART: [afmc] AUTHORITY.KEYID = 5
2,812,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,969 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,698 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,581 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,300 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,161 UART: [afmc] --
2,856,079 UART: [cold-reset] --
2,856,971 UART: [state] Locking Datavault
2,858,156 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,760 UART: [state] Locking ICCM
2,859,310 UART: [exit] Launching FMC @ 0x40000130
2,864,639 UART:
2,864,655 UART: Running Caliptra FMC ...
2,865,063 UART:
2,865,206 UART: [state] CFI Enabled
2,875,687 UART: [fht] FMC Alias Private Key: 7
2,983,906 UART: [art] Extend RT PCRs Done
2,984,334 UART: [art] Lock RT PCRs Done
2,985,484 UART: [art] Populate DV Done
2,993,761 UART: [fht] FMC Alias Private Key: 7
2,994,721 UART: [art] Derive CDI
2,995,001 UART: [art] Store in in slot 0x4
3,080,794 UART: [art] Derive Key Pair
3,081,154 UART: [art] Store priv key in slot 0x5
3,094,426 UART: [art] Derive Key Pair - Done
3,108,670 UART: [art] Signing Cert with AUTHO
3,109,150 UART: RITY.KEYID = 7
3,124,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,361 UART: [art] PUB.X = 859BDCBB30508BC431938A0379483CA51AB15B7A55581D83AA180D3E31AA37CD012D7A307DD4FB9D64280F6BFEE804F5
3,132,126 UART: [art] PUB.Y = 22D426E4F080FFDA7C953918BDBC2D35B6F1D57D15B0AA5802769C7037E4495476277ACF8122D4EE052E67ED8D9B0ACE
3,139,077 UART: [art] SIG.R = 945F12D3E972B119FE67316B2BA28D3726C3D4548429D8D3C770E5405A120BA0B9A7828608D253184EB629C0C736D6B1
3,145,835 UART: [art] SIG.S = EBF609F8F17EBEA411FE5A3E5D7C98D915D61BF5146E7530DAEDB3D75EAAAAC68B5D55FABC628C0C4DDA645B527FF52C
3,169,514 UART: Caliptra RT
3,169,859 UART: [state] CFI Enabled
3,279,111 UART: [rt] RT listening for mailbox commands...
3,279,781 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,659 UART: [rt]cmd =0x50435252, len=8
3,310,952 >>> mbox cmd response data (8 bytes)
3,310,953 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,638 UART:
3,311,654 UART: Running Caliptra ROM ...
3,312,062 UART:
3,312,204 UART: [state] CFI Enabled
3,314,816 UART: [state] LifecycleState = Unprovisioned
3,315,471 UART: [state] DebugLocked = No
3,316,143 UART: [state] WD Timer not started. Device not locked for debugging
3,317,263 UART: [kat] SHA2-256
4,120,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,124,942 UART: [kat] ++
4,125,094 UART: [kat] sha1
4,129,318 UART: [kat] SHA2-256
4,131,258 UART: [kat] SHA2-384
4,133,925 UART: [kat] SHA2-512-ACC
4,135,825 UART: [kat] ECC-384
4,146,060 UART: [kat] HMAC-384Kdf
4,150,680 UART: [kat] LMS
4,398,992 UART: [kat] --
4,399,926 UART: [update-reset] ++
5,304,409 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,305,482 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,401,864 >>> mbox cmd response: success
5,401,864 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,401,967 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,981 UART: [update-reset Success] --
5,410,850 UART: [state] Locking Datavault
5,411,646 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,250 UART: [state] Locking ICCM
5,412,670 UART: [exit] Launching FMC @ 0x40000130
5,417,999 UART:
5,418,015 UART: Running Caliptra FMC ...
5,418,423 UART:
5,418,566 UART: [state] CFI Enabled
5,507,911 UART: [art] Extend RT PCRs Done
5,508,339 UART: [art] Lock RT PCRs Done
5,509,644 UART: [art] Populate DV Done
5,517,851 UART: [fht] FMC Alias Private Key: 7
5,518,979 UART: [art] Derive CDI
5,519,259 UART: [art] Store in in slot 0x4
5,605,282 UART: [art] Derive Key Pair
5,605,642 UART: [art] Store priv key in slot 0x5
5,619,638 UART: [art] Derive Key Pair - Done
5,634,636 UART: [art] Signing Cert with AUTHO
5,635,116 UART: RITY.KEYID = 7
5,650,694 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,459 UART: [art] PUB.X = A35BC0E80CF9333DAA5705312F14A6FA70154DDD2D4A12D0932566F8F8BEE6D442B9B1BD8BD4C5B01ED4779B2CD23DF3
5,658,241 UART: [art] PUB.Y = 6DBFB4785336EA984FF857BAE68E0E151DEC831275CBE830366BED567667B06481B720B61DC6F905D8A72CE9DC0FE824
5,665,192 UART: [art] SIG.R = 675E4E159A97B30CAB0187691D83E0F14F6AA59BACEC89291061642CA5673C37E020933B6CD50758B7A7C381E02BCC65
5,671,955 UART: [art] SIG.S = 84799C16A48DD8EE4239406CED15700B94337C6A55A79E6D8996EE2366FAB9493D27752FF646231C9CA204F362C9380A
5,696,097 UART: mbox::rt_entry...
5,696,469 UART: ____ _ _ _ ____ _____
5,697,253 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,698,053 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,698,821 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,699,589 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,700,357 UART: |_|
5,700,669 UART:
5,981,159 UART: [rt] Runtime listening for mailbox commands...
5,982,206 >>> mbox cmd response data (128 bytes)
5,982,207 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,982,318 UART:
5,982,334 UART: Running Caliptra ROM ...
5,982,742 UART:
5,982,884 UART: [state] CFI Enabled
5,985,836 UART: [state] LifecycleState = Unprovisioned
5,986,491 UART: [state] DebugLocked = No
5,987,109 UART: [state] WD Timer not started. Device not locked for debugging
5,988,451 UART: [kat] SHA2-256
6,792,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,796,130 UART: [kat] ++
6,796,282 UART: [kat] sha1
6,800,528 UART: [kat] SHA2-256
6,802,468 UART: [kat] SHA2-384
6,805,151 UART: [kat] SHA2-512-ACC
6,807,051 UART: [kat] ECC-384
6,817,000 UART: [kat] HMAC-384Kdf
6,821,728 UART: [kat] LMS
7,070,040 UART: [kat] --
7,070,884 UART: [update-reset] ++
7,976,317 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,977,280 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,073,662 >>> mbox cmd response: success
8,073,662 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,073,967 UART: [update-reset] Copying MAN_2 To MAN_1
8,081,981 UART: [update-reset Success] --
8,083,118 UART: [state] Locking Datavault
8,084,096 UART: [state] Locking PCR0, PCR1 and PCR31
8,084,700 UART: [state] Locking ICCM
8,085,302 UART: [exit] Launching FMC @ 0x40000130
8,090,631 UART:
8,090,647 UART: Running Caliptra FMC ...
8,091,055 UART:
8,091,198 UART: [state] CFI Enabled
8,179,791 UART: [art] Extend RT PCRs Done
8,180,219 UART: [art] Lock RT PCRs Done
8,181,556 UART: [art] Populate DV Done
8,189,899 UART: [fht] FMC Alias Private Key: 7
8,191,057 UART: [art] Derive CDI
8,191,337 UART: [art] Store in in slot 0x4
8,277,108 UART: [art] Derive Key Pair
8,277,468 UART: [art] Store priv key in slot 0x5
8,290,230 UART: [art] Derive Key Pair - Done
8,304,818 UART: [art] Signing Cert with AUTHO
8,305,298 UART: RITY.KEYID = 7
8,320,196 UART: [art] Erasing AUTHORITY.KEYID = 7
8,320,961 UART: [art] PUB.X = 6B2B21CB6C16379A730D98F6888D4FFA57D03CFD793DD64376A9EFC8D060A2812324410D7CB8962BCD09B3F750D53C9B
8,327,730 UART: [art] PUB.Y = E76FAABB28A41964D675A3143B6EF847BB6346971C3120F211832B791B306A9E9646A23D168E2E5C5980E280AFEAB884
8,334,680 UART: [art] SIG.R = B86CBDE72ABF4777AAEC76F1B147F764CB6C679BB3A877D294F5C97DDADA8CC56D631B49C18ACF8CCE719F24B4396065
8,341,472 UART: [art] SIG.S = 2DE7849EC15964AA2CBEE1032028B3382F087E731F58CB10C0BEC0070C2BAB92A16D3B4CCA285658992AF0BF713BB069
8,365,415 UART: mbox::rt_entry...
8,365,787 UART: ____ _ _ _ ____ _____
8,366,571 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,367,371 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,368,139 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,368,907 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,369,675 UART: |_|
8,369,987 UART:
8,648,829 UART: [rt] Runtime listening for mailbox commands...
8,649,876 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,753 ready_for_fw is high
1,056,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,811 >>> mbox cmd response: success
2,688,273 UART:
2,688,289 UART: Running Caliptra FMC ...
2,688,697 UART:
2,688,840 UART: [state] CFI Enabled
2,699,425 UART: [fht] FMC Alias Private Key: 7
2,807,516 UART: [art] Extend RT PCRs Done
2,807,944 UART: [art] Lock RT PCRs Done
2,809,108 UART: [art] Populate DV Done
2,817,283 UART: [fht] FMC Alias Private Key: 7
2,818,373 UART: [art] Derive CDI
2,818,653 UART: [art] Store in in slot 0x4
2,903,964 UART: [art] Derive Key Pair
2,904,324 UART: [art] Store priv key in slot 0x5
2,917,750 UART: [art] Derive Key Pair - Done
2,932,554 UART: [art] Signing Cert with AUTHO
2,933,034 UART: RITY.KEYID = 7
2,948,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,241 UART: [art] PUB.X = E8B8EFC416A882F9DC831CE22AA464D272AB2AF5C0AD19DAD622481C9D2D9313A92A21E3F16DFD5D707669BFE1368978
2,956,025 UART: [art] PUB.Y = 63BE92F7687F4303120FF0A7B071A0C8B8EE55A59E101F61702120FA28BC0B6E1BA61A7323A8C5813310BA44AD512632
2,962,966 UART: [art] SIG.R = 9DBD7987D2326F290AE4C028105E362C8125FDE294BF9175ABC7FDF03C2ACDB3ADA5FE3252C7D24F0C334FE144FFD4BA
2,969,752 UART: [art] SIG.S = 0EAE5256F36B39239D624D1F6009F002772F08A19CD88ACD9051DE6350837163DC7D4A5EFDEACC92011DB069BB24F2A4
2,993,678 UART: Caliptra RT
2,994,023 UART: [state] CFI Enabled
3,101,664 UART: [rt] RT listening for mailbox commands...
3,102,334 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,476 UART: [rt]cmd =0x50435252, len=8
3,134,377 >>> mbox cmd response data (8 bytes)
3,134,378 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,105,588 >>> mbox cmd response: success
5,105,588 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,119,028 UART:
5,119,044 UART: Running Caliptra FMC ...
5,119,452 UART:
5,119,595 UART: [state] CFI Enabled
5,208,780 UART: [art] Extend RT PCRs Done
5,209,208 UART: [art] Lock RT PCRs Done
5,210,421 UART: [art] Populate DV Done
5,218,666 UART: [fht] FMC Alias Private Key: 7
5,219,768 UART: [art] Derive CDI
5,220,048 UART: [art] Store in in slot 0x4
5,305,637 UART: [art] Derive Key Pair
5,305,997 UART: [art] Store priv key in slot 0x5
5,319,311 UART: [art] Derive Key Pair - Done
5,334,076 UART: [art] Signing Cert with AUTHO
5,334,556 UART: RITY.KEYID = 7
5,349,502 UART: [art] Erasing AUTHORITY.KEYID = 7
5,350,267 UART: [art] PUB.X = 48D225154021E838EA3D833F2CDB3F1C6573F3F443070F689021D6793B76F8227D22711409034AFB37D54B6B834D985D
5,357,015 UART: [art] PUB.Y = 1509385184D1E86D3C895088E786E825394226689BA7261042B10AF6AE046024F36FC382B97EA0F8D3063FBE19A78A97
5,363,943 UART: [art] SIG.R = 1C5C8080D4948CEAF20EF7C095EBB7CFBF754FF7B7ED9BAFD70F8994F9CEFE8E7C41B4953692571336C10704CBE0C668
5,370,719 UART: [art] SIG.S = 0D27888E8C2F9AD0285D984C0F91A12ABA5A252DBC5B353DE4F19D1F9D60B8399194899D240A10A1521FAF393F1E9C44
5,394,419 UART: mbox::rt_entry...
5,394,791 UART: ____ _ _ _ ____ _____
5,395,575 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,396,375 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,397,143 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,397,911 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,398,679 UART: |_|
5,398,991 UART:
5,679,701 UART: [rt] Runtime listening for mailbox commands...
5,680,748 >>> mbox cmd response data (128 bytes)
5,680,749 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,653,035 >>> mbox cmd response: success
7,653,035 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,666,295 UART:
7,666,311 UART: Running Caliptra FMC ...
7,666,719 UART:
7,666,862 UART: [state] CFI Enabled
7,756,301 UART: [art] Extend RT PCRs Done
7,756,729 UART: [art] Lock RT PCRs Done
7,758,246 UART: [art] Populate DV Done
7,766,391 UART: [fht] FMC Alias Private Key: 7
7,767,499 UART: [art] Derive CDI
7,767,779 UART: [art] Store in in slot 0x4
7,853,498 UART: [art] Derive Key Pair
7,853,858 UART: [art] Store priv key in slot 0x5
7,867,496 UART: [art] Derive Key Pair - Done
7,882,438 UART: [art] Signing Cert with AUTHO
7,882,918 UART: RITY.KEYID = 7
7,898,532 UART: [art] Erasing AUTHORITY.KEYID = 7
7,899,297 UART: [art] PUB.X = 11BB7BE9B05B4BAEADB228B394C1A326F297E359592495160A8D3936E45B46E37D25AF32D6662BCAB8FA2E4F7EDE0381
7,906,073 UART: [art] PUB.Y = C4629546C93B5917222D2E799CEA59239F5125BED5C45A31DC5388E9BB853DC37D169A56C63A207217B993764125D24A
7,913,017 UART: [art] SIG.R = E95432BA059A2F2317FDC61761C8ADFB978E13BC343F5AB1C31EB4C189950A40665F22930B4D8AE8D08A1C81884887D4
7,919,782 UART: [art] SIG.S = 5887A2F87F700499ED114AB3C84116664084370B4F620C82C8855A5F78615BAD7A76E9CA7D7CCD50D3BD19E8DE44EF6D
7,942,664 UART: mbox::rt_entry...
7,943,036 UART: ____ _ _ _ ____ _____
7,943,820 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,944,620 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,945,388 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,946,156 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,946,924 UART: |_|
7,947,236 UART:
8,224,408 UART: [rt] Runtime listening for mailbox commands...
8,225,455 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
191,971 UART:
192,339 UART: Running Caliptra ROM ...
193,487 UART:
193,638 UART: [state] CFI Enabled
266,560 UART: [state] LifecycleState = Unprovisioned
268,549 UART: [state] DebugLocked = No
270,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,127 UART: [kat] SHA2-256
443,825 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,351 UART: [kat] ++
454,882 UART: [kat] sha1
466,125 UART: [kat] SHA2-256
468,863 UART: [kat] SHA2-384
474,717 UART: [kat] SHA2-512-ACC
477,085 UART: [kat] ECC-384
2,766,512 UART: [kat] HMAC-384Kdf
2,780,581 UART: [kat] LMS
3,970,857 UART: [kat] --
3,976,574 UART: [cold-reset] ++
3,977,947 UART: [fht] Storing FHT @ 0x50003400
3,990,845 UART: [idev] ++
3,991,415 UART: [idev] CDI.KEYID = 6
3,992,325 UART: [idev] SUBJECT.KEYID = 7
3,993,567 UART: [idev] UDS.KEYID = 0
3,994,549 ready_for_fw is high
3,994,755 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,138,294 UART: [idev] Erasing UDS.KEYID = 0
7,327,862 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,268 UART: [idev] --
7,353,026 UART: [ldev] ++
7,353,648 UART: [ldev] CDI.KEYID = 6
7,354,556 UART: [ldev] SUBJECT.KEYID = 5
7,355,862 UART: [ldev] AUTHORITY.KEYID = 7
7,356,972 UART: [ldev] FE.KEYID = 1
7,400,615 UART: [ldev] Erasing FE.KEYID = 1
10,735,150 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,619 UART: [ldev] --
13,113,640 UART: [fwproc] Waiting for Commands...
13,115,315 UART: [fwproc] Received command 0x46574c44
13,117,503 UART: [fwproc] Received Image of size 114124 bytes
17,170,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,426 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,634,211 >>> mbox cmd response: success
17,638,128 UART: [afmc] ++
17,638,730 UART: [afmc] CDI.KEYID = 6
17,639,698 UART: [afmc] SUBJECT.KEYID = 7
17,640,918 UART: [afmc] AUTHORITY.KEYID = 5
21,010,065 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,618 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,916 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,327 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,171 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,570 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,199 UART: [afmc] --
23,380,928 UART: [cold-reset] --
23,384,328 UART: [state] Locking Datavault
23,389,959 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,723 UART: [state] Locking ICCM
23,393,062 UART: [exit] Launching FMC @ 0x40000130
23,401,461 UART:
23,401,697 UART: Running Caliptra FMC ...
23,403,017 UART:
23,403,207 UART: [state] CFI Enabled
23,469,793 UART: [fht] FMC Alias Private Key: 7
25,808,055 UART: [art] Extend RT PCRs Done
25,809,277 UART: [art] Lock RT PCRs Done
25,811,200 UART: [art] Populate DV Done
25,816,661 UART: [fht] FMC Alias Private Key: 7
25,818,361 UART: [art] Derive CDI
25,819,100 UART: [art] Store in in slot 0x4
25,878,354 UART: [art] Derive Key Pair
25,879,372 UART: [art] Store priv key in slot 0x5
29,172,258 UART: [art] Derive Key Pair - Done
29,185,091 UART: [art] Signing Cert with AUTHO
29,186,401 UART: RITY.KEYID = 7
31,473,821 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,322 UART: [art] PUB.X = B512984D3BA9C3B6FFEF5575555FB9F959219394EE74297A6BCD82691839B62DBE2CDE88C7D11A6891EB8851B73437F5
31,482,586 UART: [art] PUB.Y = 3E22FB319A9D14D2DCBD90CE11DB6C3F1A8A66CC4AE505557DF6A02E5A79DA91AE7A2DFB5FF6F41E5692867F41182CAB
31,489,832 UART: [art] SIG.R = 1030BCFA99E5D3F9AF71BA2B0D55C3EF8968380CC2D7A06574C4BEF1A60985B49734F3A9870BE8531B2E806981239674
31,497,225 UART: [art] SIG.S = B284308FD10622820DEDA322FDEF70B454003120B1343B3F582DD7677C3672C18F0CAAE8726A13C8FA39E363AF7C5DBC
32,802,475 UART: Caliptra RT
32,803,182 UART: [state] CFI Enabled
32,962,895 UART: [rt] RT listening for mailbox commands...
35,088,940 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,189,651 UART:
35,190,001 UART: Running Caliptra ROM ...
35,191,058 UART:
35,191,216 UART: [state] CFI Enabled
35,250,496 UART: [state] LifecycleState = Unprovisioned
35,252,434 UART: [state] DebugLocked = No
35,254,289 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,259,186 UART: [kat] SHA2-256
35,428,915 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,439,405 UART: [kat] ++
35,439,863 UART: [kat] sha1
35,451,884 UART: [kat] SHA2-256
35,454,580 UART: [kat] SHA2-384
35,461,377 UART: [kat] SHA2-512-ACC
35,463,728 UART: [kat] ECC-384
37,753,399 UART: [kat] HMAC-384Kdf
37,784,489 UART: [kat] LMS
38,974,833 UART: [kat] --
38,981,903 UART: [update-reset] ++
42,693,850 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,698,066 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,956,513 >>> mbox cmd response: success
42,956,882 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,957,764 UART: [update-reset] Copying MAN_2 To MAN_1
42,980,203 UART: [update-reset Success] --
42,984,982 UART: [state] Locking Datavault
42,989,796 UART: [state] Locking PCR0, PCR1 and PCR31
42,991,552 UART: [state] Locking ICCM
42,994,220 UART: [exit] Launching FMC @ 0x40000130
43,002,621 UART:
43,002,902 UART: Running Caliptra FMC ...
43,003,956 UART:
43,004,112 UART: [state] CFI Enabled
43,108,899 UART: [art] Extend RT PCRs Done
43,110,084 UART: [art] Lock RT PCRs Done
43,111,471 UART: [art] Populate DV Done
43,117,040 UART: [fht] FMC Alias Private Key: 7
43,118,633 UART: [art] Derive CDI
43,119,447 UART: [art] Store in in slot 0x4
43,177,926 UART: [art] Derive Key Pair
43,178,990 UART: [art] Store priv key in slot 0x5
46,471,875 UART: [art] Derive Key Pair - Done
46,484,703 UART: [art] Signing Cert with AUTHO
46,486,003 UART: RITY.KEYID = 7
48,774,016 UART: [art] Erasing AUTHORITY.KEYID = 7
48,775,517 UART: [art] PUB.X = 981B46C0556A50531570813431B512E6339DC4B88EFB6AC86E107928211715616EF92F2213CC2BE94CAFF2860A200896
48,782,706 UART: [art] PUB.Y = 46A532E096BF0B8566221D085BA3E75B1C5C90734FD4278D01ABF08EB2A06BF83F1F8145612B3F16A0F61B5C8F31AEF0
48,789,961 UART: [art] SIG.R = 98552682FE3F9DD39A08473CA29A1FB7F591CE80E496CEFB124787CFEFF09EF54D7266B88076778BC46B1DDF4EAF4D88
48,797,357 UART: [art] SIG.S = 2720BB7D1BCFA97F48E8CED00A4384C183CB32FA7349D77F7BFC21A2E93DBA2FF5F811F487D2A4073CDFAC80617D1DAB
50,101,860 UART: mbox::rt_entry...
50,102,826 UART: ____ _ _ _ ____ _____
50,104,815 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,106,823 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,108,753 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,110,682 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,112,611 UART: |_|
50,113,423 UART:
50,399,510 UART: [rt] Runtime listening for mailbox commands...
50,401,683 >>> mbox cmd response data (48 bytes)
50,402,249 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,402,683 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,805,664 ready_for_fw is high
3,806,054 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,868,019 >>> mbox cmd response: success
23,566,070 UART:
23,566,442 UART: Running Caliptra FMC ...
23,567,588 UART:
23,567,751 UART: [state] CFI Enabled
23,636,188 UART: [fht] FMC Alias Private Key: 7
25,973,468 UART: [art] Extend RT PCRs Done
25,974,693 UART: [art] Lock RT PCRs Done
25,976,347 UART: [art] Populate DV Done
25,981,927 UART: [fht] FMC Alias Private Key: 7
25,983,417 UART: [art] Derive CDI
25,984,183 UART: [art] Store in in slot 0x4
26,044,715 UART: [art] Derive Key Pair
26,045,757 UART: [art] Store priv key in slot 0x5
29,339,356 UART: [art] Derive Key Pair - Done
29,352,030 UART: [art] Signing Cert with AUTHO
29,353,338 UART: RITY.KEYID = 7
31,640,742 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,245 UART: [art] PUB.X = D0D2AFCA47A12F44CB289CD20A88183E2FA1BFE2626829FEACA4A655D5B043D3E9DCB6C23C7BD497799D3466616487F2
31,649,518 UART: [art] PUB.Y = 8065809351DAE75A0653D345709D2C6796CA446FCE099A04CD89BC5A8CCDB6CF04441E878BD4FA2DE4ABFD5C336CC7DF
31,656,786 UART: [art] SIG.R = 0521E27B0058351CBB2B20433B0B11FBB4FA12519A678D0E35305FDFD6615539F5456E790ABFF71541D2BB198AE8D068
31,664,153 UART: [art] SIG.S = FC5CD9399A8669922E29EA15D814B7B93DA97C9F54FDF49C55599C52F362031961DF0A6EE9210BA9DCA40C701B566688
32,969,070 UART: Caliptra RT
32,969,784 UART: [state] CFI Enabled
33,132,086 UART: [rt] RT listening for mailbox commands...
35,257,329 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,221,369 >>> mbox cmd response: success
43,222,068 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,256,960 UART:
43,257,269 UART: Running Caliptra FMC ...
43,258,312 UART:
43,258,464 UART: [state] CFI Enabled
43,359,724 UART: [art] Extend RT PCRs Done
43,360,922 UART: [art] Lock RT PCRs Done
43,362,250 UART: [art] Populate DV Done
43,367,756 UART: [fht] FMC Alias Private Key: 7
43,369,409 UART: [art] Derive CDI
43,370,147 UART: [art] Store in in slot 0x4
43,428,678 UART: [art] Derive Key Pair
43,429,680 UART: [art] Store priv key in slot 0x5
46,722,216 UART: [art] Derive Key Pair - Done
46,735,335 UART: [art] Signing Cert with AUTHO
46,736,646 UART: RITY.KEYID = 7
49,024,265 UART: [art] Erasing AUTHORITY.KEYID = 7
49,025,774 UART: [art] PUB.X = 995203BEE1E85A3D61C30668AA609225292FDA938E4A7B93A622C1FBCF0E58213ED6D98BFE8438D8241DC7601E7DEEE4
49,033,066 UART: [art] PUB.Y = 2E969E76E4DA939C1BB7808AD4FBB78C0B1A0B17132C5E566819AF384BE8970F7FBBFB89B23698B7D4A930BAFD21EED2
49,040,306 UART: [art] SIG.R = EC861F8A366F5305E8DB3C0F262672390BD3F43293A1F15923C6A68FA9914A6C1435F388793E963DC9D2A0EEAD38809A
49,047,681 UART: [art] SIG.S = 97D3A02E20318EF8FF007223538FE158A218B82FC9138B649EF1B1F559BDBBF0FE714B41CC726F8AF1BC2143AEABCB5E
50,351,861 UART: mbox::rt_entry...
50,352,825 UART: ____ _ _ _ ____ _____
50,354,766 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,356,775 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,358,703 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,360,633 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,362,572 UART: |_|
50,363,567 UART:
50,651,015 UART: [rt] Runtime listening for mailbox commands...
50,653,161 >>> mbox cmd response data (48 bytes)
50,653,748 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,654,216 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,369 UART:
192,740 UART: Running Caliptra ROM ...
193,934 UART:
603,462 UART: [state] CFI Enabled
616,929 UART: [state] LifecycleState = Unprovisioned
618,816 UART: [state] DebugLocked = No
620,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,343 UART: [kat] SHA2-256
795,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,658 UART: [kat] ++
806,128 UART: [kat] sha1
817,159 UART: [kat] SHA2-256
819,809 UART: [kat] SHA2-384
825,507 UART: [kat] SHA2-512-ACC
827,878 UART: [kat] ECC-384
3,110,460 UART: [kat] HMAC-384Kdf
3,123,256 UART: [kat] LMS
4,313,391 UART: [kat] --
4,316,248 UART: [cold-reset] ++
4,318,459 UART: [fht] Storing FHT @ 0x50003400
4,330,210 UART: [idev] ++
4,330,777 UART: [idev] CDI.KEYID = 6
4,331,723 UART: [idev] SUBJECT.KEYID = 7
4,332,960 UART: [idev] UDS.KEYID = 0
4,333,911 ready_for_fw is high
4,334,095 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,386 UART: [idev] Erasing UDS.KEYID = 0
7,618,321 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,618 UART: [idev] --
7,644,393 UART: [ldev] ++
7,644,957 UART: [ldev] CDI.KEYID = 6
7,645,917 UART: [ldev] SUBJECT.KEYID = 5
7,647,122 UART: [ldev] AUTHORITY.KEYID = 7
7,648,403 UART: [ldev] FE.KEYID = 1
7,658,770 UART: [ldev] Erasing FE.KEYID = 1
10,946,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,087 UART: [ldev] --
13,307,162 UART: [fwproc] Waiting for Commands...
13,309,575 UART: [fwproc] Received command 0x46574c44
13,311,765 UART: [fwproc] Received Image of size 114124 bytes
17,363,893 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,457 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,346 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,824,859 >>> mbox cmd response: success
17,828,340 UART: [afmc] ++
17,828,929 UART: [afmc] CDI.KEYID = 6
17,829,833 UART: [afmc] SUBJECT.KEYID = 7
17,831,098 UART: [afmc] AUTHORITY.KEYID = 5
21,148,393 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,510 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,773 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,134 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,002 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,443 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,146 UART: [afmc] --
23,512,440 UART: [cold-reset] --
23,515,173 UART: [state] Locking Datavault
23,519,830 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,582 UART: [state] Locking ICCM
23,522,806 UART: [exit] Launching FMC @ 0x40000130
23,531,198 UART:
23,531,425 UART: Running Caliptra FMC ...
23,532,518 UART:
23,532,676 UART: [state] CFI Enabled
23,541,417 UART: [fht] FMC Alias Private Key: 7
25,872,075 UART: [art] Extend RT PCRs Done
25,873,306 UART: [art] Lock RT PCRs Done
25,875,279 UART: [art] Populate DV Done
25,880,739 UART: [fht] FMC Alias Private Key: 7
25,882,380 UART: [art] Derive CDI
25,883,185 UART: [art] Store in in slot 0x4
25,925,915 UART: [art] Derive Key Pair
25,926,953 UART: [art] Store priv key in slot 0x5
29,169,127 UART: [art] Derive Key Pair - Done
29,182,288 UART: [art] Signing Cert with AUTHO
29,183,783 UART: RITY.KEYID = 7
31,463,295 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,802 UART: [art] PUB.X = 2AE23F8411FC0D4EF26C498122F11D498A5424DC0D194C4B6F81B918C68BCC099CEE527E9DACBF1D3DDBB95A7C84A91F
31,472,061 UART: [art] PUB.Y = F958A2ED6594BA280BF32A9F71AC07C0025D98A4C1E8D085E4115423E3D0A5D3FA3046114F6C98E72EFC6D0571833504
31,479,267 UART: [art] SIG.R = E7ADED02C337091707338E0D03BF7C2C6817F8BE5944206D98BCD4B3E84725413366E21C908C799645F0EC30D74A3639
31,486,647 UART: [art] SIG.S = 4E7956A9F1D5F35EF4D7422792F4E994882DF99A90D54F865FFC71E9A5B1C6C544AAA5EFFA208FF208C593C1E79E6F37
32,792,197 UART: Caliptra RT
32,792,912 UART: [state] CFI Enabled
32,909,692 UART: [rt] RT listening for mailbox commands...
34,960,366 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,061,312 UART:
35,061,675 UART: Running Caliptra ROM ...
35,062,735 UART:
35,062,938 UART: [state] CFI Enabled
35,075,868 UART: [state] LifecycleState = Unprovisioned
35,077,764 UART: [state] DebugLocked = No
35,079,654 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,084,276 UART: [kat] SHA2-256
35,253,999 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,264,502 UART: [kat] ++
35,264,952 UART: [kat] sha1
35,276,749 UART: [kat] SHA2-256
35,279,484 UART: [kat] SHA2-384
35,285,736 UART: [kat] SHA2-512-ACC
35,288,149 UART: [kat] ECC-384
37,570,459 UART: [kat] HMAC-384Kdf
37,582,797 UART: [kat] LMS
38,772,878 UART: [kat] --
38,776,351 UART: [update-reset] ++
42,476,870 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,480,066 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,738,501 >>> mbox cmd response: success
42,738,890 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,739,929 UART: [update-reset] Copying MAN_2 To MAN_1
42,762,361 UART: [update-reset Success] --
42,768,375 UART: [state] Locking Datavault
42,772,331 UART: [state] Locking PCR0, PCR1 and PCR31
42,774,083 UART: [state] Locking ICCM
42,775,749 UART: [exit] Launching FMC @ 0x40000130
42,784,143 UART:
42,784,431 UART: Running Caliptra FMC ...
42,785,534 UART:
42,785,685 UART: [state] CFI Enabled
42,829,368 UART: [art] Extend RT PCRs Done
42,830,569 UART: [art] Lock RT PCRs Done
42,831,943 UART: [art] Populate DV Done
42,837,338 UART: [fht] FMC Alias Private Key: 7
42,838,869 UART: [art] Derive CDI
42,839,621 UART: [art] Store in in slot 0x4
42,882,321 UART: [art] Derive Key Pair
42,883,359 UART: [art] Store priv key in slot 0x5
46,125,428 UART: [art] Derive Key Pair - Done
46,138,585 UART: [art] Signing Cert with AUTHO
46,139,880 UART: RITY.KEYID = 7
48,419,293 UART: [art] Erasing AUTHORITY.KEYID = 7
48,420,795 UART: [art] PUB.X = 3EDC1A3DB394E734DF456A35AF551C6C8212A76CEE4F172051598FDB648C2A585FF9F24E7802060A5FD9C50C884CCE74
48,428,105 UART: [art] PUB.Y = E7664A2B63CF80C99AD18E76F7125B76051F8351631626358E4BFE66313E96CC5A152F3AA777E5A7146262D12B3838C5
48,435,271 UART: [art] SIG.R = 6D12CFF40F655FD396E5B3B50300512AE2F1B76B839433067D411AD2380BDD4785127D8610591E9D501C3C653E9DC10D
48,442,647 UART: [art] SIG.S = 8C699863107429C6019F44E8C9605815811039F46E3A73DF13DD51F6492E9569EB7098ED6EA1F7628571FB4D5277072B
49,748,362 UART: mbox::rt_entry...
49,749,326 UART: ____ _ _ _ ____ _____
49,751,304 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,753,299 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,755,222 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,757,143 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,759,066 UART: |_|
49,759,872 UART:
50,042,122 UART: [rt] Runtime listening for mailbox commands...
50,044,295 >>> mbox cmd response data (48 bytes)
50,044,870 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,045,301 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,135,403 ready_for_fw is high
4,135,823 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,089,884 >>> mbox cmd response: success
23,728,543 UART:
23,728,931 UART: Running Caliptra FMC ...
23,730,248 UART:
23,730,411 UART: [state] CFI Enabled
23,738,573 UART: [fht] FMC Alias Private Key: 7
26,069,422 UART: [art] Extend RT PCRs Done
26,070,648 UART: [art] Lock RT PCRs Done
26,072,713 UART: [art] Populate DV Done
26,078,070 UART: [fht] FMC Alias Private Key: 7
26,079,718 UART: [art] Derive CDI
26,080,536 UART: [art] Store in in slot 0x4
26,122,978 UART: [art] Derive Key Pair
26,124,018 UART: [art] Store priv key in slot 0x5
29,366,073 UART: [art] Derive Key Pair - Done
29,379,354 UART: [art] Signing Cert with AUTHO
29,380,695 UART: RITY.KEYID = 7
31,660,489 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,001 UART: [art] PUB.X = 5EEB70A6DF038610D1E3E32508AB8EB5CC492430E95AFE81A72934AF71010857CA6BB44179EB6178AE7F895E8440BAEC
31,669,254 UART: [art] PUB.Y = F972881B15DF1E17ADE785F866D7BB655D359E1782477816483DF89A7CE1C54F1F6BC50489B4E761BEE79CF09DABDDC0
31,676,481 UART: [art] SIG.R = F9454624464881D8379599A4D33D78677A336588400ED7FCB362483791C3C52DA69318792FFEBC7719147EE3E7337E62
31,683,857 UART: [art] SIG.S = AB2DABBA24CB49CA8385E68E359AD9E5FC87BFC51620AE4D8E5D324F4896D8473026EFCF8D1A3D860B84C7A950361691
32,989,028 UART: Caliptra RT
32,989,750 UART: [state] CFI Enabled
33,106,657 UART: [rt] RT listening for mailbox commands...
35,156,805 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,051,523 >>> mbox cmd response: success
43,052,045 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,088,276 UART:
43,088,623 UART: Running Caliptra FMC ...
43,089,757 UART:
43,089,923 UART: [state] CFI Enabled
43,134,317 UART: [art] Extend RT PCRs Done
43,135,468 UART: [art] Lock RT PCRs Done
43,136,918 UART: [art] Populate DV Done
43,142,336 UART: [fht] FMC Alias Private Key: 7
43,143,872 UART: [art] Derive CDI
43,144,681 UART: [art] Store in in slot 0x4
43,187,380 UART: [art] Derive Key Pair
43,188,377 UART: [art] Store priv key in slot 0x5
46,430,385 UART: [art] Derive Key Pair - Done
46,443,547 UART: [art] Signing Cert with AUTHO
46,444,848 UART: RITY.KEYID = 7
48,724,130 UART: [art] Erasing AUTHORITY.KEYID = 7
48,725,634 UART: [art] PUB.X = D606F4055147D09C34D4E1C168ED6657CD76153CE2597B8CDAAD28C4346F950F54AEBDFF557A430FDC27D9F9965A989F
48,732,902 UART: [art] PUB.Y = 5A2A0DD55D6D02800C04E47ACCF2C1D786C124BDDDFDD9F866E84542417BFF6AFD483B3156B023E8DFD0448ECFF26088
48,740,114 UART: [art] SIG.R = 79E754C4F8A8F22138A35A87D7EEB90A459F98B6528F020C41BF48D21A5AFFB13E89A907DB26030E4C1ADE407C51D3A6
48,747,511 UART: [art] SIG.S = 1D93A24CA5D634438DA15626BDDAE4D271AD288612F72EDC57C318DC15FCBBA1809B6732EA4CEDE578C0413E9697146B
50,051,919 UART: mbox::rt_entry...
50,052,873 UART: ____ _ _ _ ____ _____
50,054,854 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,056,860 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,058,789 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,060,721 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,062,571 UART: |_|
50,063,384 UART:
50,351,114 UART: [rt] Runtime listening for mailbox commands...
50,353,275 >>> mbox cmd response data (48 bytes)
50,353,841 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,354,269 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,059 UART:
192,419 UART: Running Caliptra ROM ...
193,626 UART:
193,777 UART: [state] CFI Enabled
263,571 UART: [state] LifecycleState = Unprovisioned
265,496 UART: [state] DebugLocked = No
268,377 UART: [state] WD Timer not started. Device not locked for debugging
271,482 UART: [kat] SHA2-256
450,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,180 UART: [kat] ++
462,692 UART: [kat] sha1
474,588 UART: [kat] SHA2-256
477,604 UART: [kat] SHA2-384
483,880 UART: [kat] SHA2-512-ACC
486,811 UART: [kat] ECC-384
2,951,344 UART: [kat] HMAC-384Kdf
2,971,837 UART: [kat] LMS
3,501,346 UART: [kat] --
3,507,036 UART: [cold-reset] ++
3,509,181 UART: [fht] FHT @ 0x50003400
3,520,932 UART: [idev] ++
3,521,502 UART: [idev] CDI.KEYID = 6
3,522,416 UART: [idev] SUBJECT.KEYID = 7
3,523,657 UART: [idev] UDS.KEYID = 0
3,524,579 ready_for_fw is high
3,524,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,835 UART: [idev] Erasing UDS.KEYID = 0
6,025,132 UART: [idev] Sha1 KeyId Algorithm
6,047,992 UART: [idev] --
6,051,071 UART: [ldev] ++
6,051,650 UART: [ldev] CDI.KEYID = 6
6,052,566 UART: [ldev] SUBJECT.KEYID = 5
6,053,781 UART: [ldev] AUTHORITY.KEYID = 7
6,055,014 UART: [ldev] FE.KEYID = 1
6,101,486 UART: [ldev] Erasing FE.KEYID = 1
8,603,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,057 UART: [ldev] --
10,393,412 UART: [fwproc] Wait for Commands...
10,395,301 UART: [fwproc] Recv command 0x46574c44
10,397,397 UART: [fwproc] Recv'd Img size: 114448 bytes
13,800,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,938,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,257,793 >>> mbox cmd response: success
14,262,568 UART: [afmc] ++
14,263,155 UART: [afmc] CDI.KEYID = 6
14,264,064 UART: [afmc] SUBJECT.KEYID = 7
14,265,277 UART: [afmc] AUTHORITY.KEYID = 5
16,809,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,167 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,065 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,877 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,882 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,724 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,148 UART: [afmc] --
18,607,631 UART: [cold-reset] --
18,609,650 UART: [state] Locking Datavault
18,614,466 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,168 UART: [state] Locking ICCM
18,617,398 UART: [exit] Launching FMC @ 0x40000130
18,625,800 UART:
18,626,073 UART: Running Caliptra FMC ...
18,627,185 UART:
18,627,371 UART: [state] CFI Enabled
18,689,631 UART: [fht] FMC Alias Private Key: 7
20,453,789 UART: [art] Extend RT PCRs Done
20,455,011 UART: [art] Lock RT PCRs Done
20,456,366 UART: [art] Populate DV Done
20,461,785 UART: [fht] FMC Alias Private Key: 7
20,463,280 UART: [art] Derive CDI
20,464,051 UART: [art] Store in in slot 0x4
20,522,342 UART: [art] Derive Key Pair
20,523,342 UART: [art] Store priv key in slot 0x5
22,986,137 UART: [art] Derive Key Pair - Done
22,999,463 UART: [art] Signing Cert with AUTHO
23,000,769 UART: RITY.KEYID = 7
24,712,049 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,532 UART: [art] PUB.X = 325D1C5A0AB88DC1F9F25831FF9B3DE6543E369D5BCE696CF4C83148FDD3E0D9426F03B58C87371227F8A22C155CA196
24,720,841 UART: [art] PUB.Y = 420581FD77BDDBB545DDE83202F2CC7503F1020EB6CECD89D8BBA90BD986A1BD0CE2164CA96A7A7D44A9E8A623EE574B
24,728,079 UART: [art] SIG.R = 0180ABFA3597372CC651A784FC6D6E90BF7E0187E59E34DE8470087230FABB8FD894B92F7C9A83166DE10DA7468F5CCF
24,735,483 UART: [art] SIG.S = 22E1F00AE7EE538C2E9990FC9E38EE021F311A6BDD52731D0FF729CA33D4FADD8782F6FB93F8D5071B4B8E50B83DF1F4
25,714,952 UART: Caliptra RT
25,715,663 UART: [state] CFI Enabled
25,880,360 UART: [rt] RT listening for mailbox commands...
27,943,501 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,045,023 UART:
28,045,422 UART: Running Caliptra ROM ...
28,046,480 UART:
28,046,638 UART: [state] CFI Enabled
28,124,167 UART: [state] LifecycleState = Unprovisioned
28,126,052 UART: [state] DebugLocked = No
28,127,955 UART: [state] WD Timer not started. Device not locked for debugging
28,131,370 UART: [kat] SHA2-256
28,310,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,322,041 UART: [kat] ++
28,322,503 UART: [kat] sha1
28,333,384 UART: [kat] SHA2-256
28,336,414 UART: [kat] SHA2-384
28,342,024 UART: [kat] SHA2-512-ACC
28,344,963 UART: [kat] ECC-384
30,807,564 UART: [kat] HMAC-384Kdf
30,829,366 UART: [kat] LMS
31,358,855 UART: [kat] --
31,363,348 UART: [update-reset] ++
34,363,303 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,365,915 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,624,135 >>> mbox cmd response: success
34,624,540 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,624,880 UART: [update-reset] Copying MAN_2 To MAN_1
34,647,215 UART: [update-reset Success] --
34,653,013 UART: [state] Locking Datavault
34,656,640 UART: [state] Locking PCR0, PCR1 and PCR31
34,658,338 UART: [state] Locking ICCM
34,659,673 UART: [exit] Launching FMC @ 0x40000130
34,668,072 UART:
34,668,305 UART: Running Caliptra FMC ...
34,669,329 UART:
34,669,474 UART: [state] CFI Enabled
34,766,315 UART: [art] Extend RT PCRs Done
34,767,497 UART: [art] Lock RT PCRs Done
34,769,142 UART: [art] Populate DV Done
34,774,436 UART: [fht] FMC Alias Private Key: 7
34,776,073 UART: [art] Derive CDI
34,776,810 UART: [art] Store in in slot 0x4
34,835,535 UART: [art] Derive Key Pair
34,836,585 UART: [art] Store priv key in slot 0x5
37,299,504 UART: [art] Derive Key Pair - Done
37,312,608 UART: [art] Signing Cert with AUTHO
37,313,905 UART: RITY.KEYID = 7
39,025,748 UART: [art] Erasing AUTHORITY.KEYID = 7
39,027,256 UART: [art] PUB.X = A4A1DED217126F0B56D767BAFAA4A467302804382929C496655BCAC430FD7810E39798A50A63B9AA447A2372FE898F80
39,034,462 UART: [art] PUB.Y = 9B52A5BB958F633DD2CEEF1C939AA71C992FE194C4E4BE5E9D144A6A1961847FE10745A4DB9DA0C68A23E0E6834AB308
39,041,774 UART: [art] SIG.R = 18F1978897A0949FBCD9FAE51C439C9CC406A2568D0F9A867F9D04B92C3BF1D6D0957D08DBE0FB36E68DC4746FE9C350
39,049,169 UART: [art] SIG.S = C4D43BC1C530A1ECAD6BFE86460E773962A6956346704D8F472879AFB2A1E2952C42FEFDCC6139C9072552D4F1085F39
40,027,419 UART: mbox::rt_entry...
40,028,394 UART: ____ _ _ _ ____ _____
40,030,382 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,032,393 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,034,329 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,036,268 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,038,125 UART: |_|
40,038,993 UART:
40,325,165 UART: [rt] Runtime listening for mailbox commands...
40,327,341 >>> mbox cmd response data (48 bytes)
40,327,910 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,328,388 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,360,457 ready_for_fw is high
3,360,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,046,784 >>> mbox cmd response: success
18,341,349 UART:
18,341,742 UART: Running Caliptra FMC ...
18,342,898 UART:
18,343,063 UART: [state] CFI Enabled
18,410,150 UART: [fht] FMC Alias Private Key: 7
20,174,444 UART: [art] Extend RT PCRs Done
20,175,665 UART: [art] Lock RT PCRs Done
20,177,354 UART: [art] Populate DV Done
20,182,877 UART: [fht] FMC Alias Private Key: 7
20,184,371 UART: [art] Derive CDI
20,185,152 UART: [art] Store in in slot 0x4
20,242,682 UART: [art] Derive Key Pair
20,243,723 UART: [art] Store priv key in slot 0x5
22,705,957 UART: [art] Derive Key Pair - Done
22,718,943 UART: [art] Signing Cert with AUTHO
22,720,248 UART: RITY.KEYID = 7
24,431,959 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,462 UART: [art] PUB.X = F320B70EED97FE25EAEF6721ECF9689DF4E242C3CA4A07B26C89B2B66ECE42F36AC54E3D838B13396A710AAFF66DEB4C
24,440,768 UART: [art] PUB.Y = A02B8903A8A7C7BEC459047A52B2AC4C270180D30D481E8676893C1810D8BC7DB7FC098A0A4C85BFF40A7039439314ED
24,448,021 UART: [art] SIG.R = 6EDD5ACD2921ED845123A9874849E4BC0FC1344AD946E5307BD23E85AACF278BA620CF91AA75FDC03D8A0DE136817C52
24,455,414 UART: [art] SIG.S = A5E6905C947828AC6F2272DEE5B14432614A63C9ADEC4F88818E3CC839537D43BAD8E96D745544E93385BDB804D2C05C
25,434,330 UART: Caliptra RT
25,435,031 UART: [state] CFI Enabled
25,602,372 UART: [rt] RT listening for mailbox commands...
27,654,939 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,187,778 >>> mbox cmd response: success
34,188,274 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,222,759 UART:
34,223,050 UART: Running Caliptra FMC ...
34,224,088 UART:
34,224,236 UART: [state] CFI Enabled
34,316,912 UART: [art] Extend RT PCRs Done
34,318,114 UART: [art] Lock RT PCRs Done
34,319,622 UART: [art] Populate DV Done
34,325,189 UART: [fht] FMC Alias Private Key: 7
34,326,778 UART: [art] Derive CDI
34,327,588 UART: [art] Store in in slot 0x4
34,386,336 UART: [art] Derive Key Pair
34,387,372 UART: [art] Store priv key in slot 0x5
36,850,539 UART: [art] Derive Key Pair - Done
36,863,651 UART: [art] Signing Cert with AUTHO
36,864,958 UART: RITY.KEYID = 7
38,575,677 UART: [art] Erasing AUTHORITY.KEYID = 7
38,577,188 UART: [art] PUB.X = 429F50BEC890AE2255004CE43A80569EB8F77CCB80EA18BE05018B01D767714A796EEE65D23E9C6DF8820540C7C37457
38,584,428 UART: [art] PUB.Y = DE821D561E9849E4B615784083E17A24C48B3C8998C45106F28BB0A4774BD54C3D39DE69C99862A4258C9AC00FEA17F6
38,591,704 UART: [art] SIG.R = 6C3CF99BA77FE86506B0112DB21DAB4A1D76B22C8C55B8EF541651E503E57630AB0812DF230497F55F1A3B2EC05BF1FF
38,599,095 UART: [art] SIG.S = 8DA662B6F88755418D8F337091FE6CBD333B1D7F189EC463F711058D51478194A74106AE13AAF1E2B534DF73382A60D9
39,577,295 UART: mbox::rt_entry...
39,578,232 UART: ____ _ _ _ ____ _____
39,580,182 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,582,187 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,584,041 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,586,159 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,588,218 UART: |_|
39,589,029 UART:
39,875,390 UART: [rt] Runtime listening for mailbox commands...
39,877,545 >>> mbox cmd response data (48 bytes)
39,878,116 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
39,878,540 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,377 UART:
192,762 UART: Running Caliptra ROM ...
193,858 UART:
603,555 UART: [state] CFI Enabled
617,069 UART: [state] LifecycleState = Unprovisioned
618,953 UART: [state] DebugLocked = No
620,978 UART: [state] WD Timer not started. Device not locked for debugging
624,292 UART: [kat] SHA2-256
803,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,990 UART: [kat] ++
815,435 UART: [kat] sha1
826,230 UART: [kat] SHA2-256
829,228 UART: [kat] SHA2-384
835,920 UART: [kat] SHA2-512-ACC
838,925 UART: [kat] ECC-384
3,279,040 UART: [kat] HMAC-384Kdf
3,291,619 UART: [kat] LMS
3,821,159 UART: [kat] --
3,826,142 UART: [cold-reset] ++
3,828,780 UART: [fht] FHT @ 0x50003400
3,838,469 UART: [idev] ++
3,839,034 UART: [idev] CDI.KEYID = 6
3,840,061 UART: [idev] SUBJECT.KEYID = 7
3,841,085 UART: [idev] UDS.KEYID = 0
3,842,215 ready_for_fw is high
3,842,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,262 UART: [idev] Erasing UDS.KEYID = 0
6,316,110 UART: [idev] Sha1 KeyId Algorithm
6,338,735 UART: [idev] --
6,343,292 UART: [ldev] ++
6,343,863 UART: [ldev] CDI.KEYID = 6
6,344,737 UART: [ldev] SUBJECT.KEYID = 5
6,345,938 UART: [ldev] AUTHORITY.KEYID = 7
6,347,216 UART: [ldev] FE.KEYID = 1
6,359,233 UART: [ldev] Erasing FE.KEYID = 1
8,832,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,359 UART: [ldev] --
10,622,291 UART: [fwproc] Wait for Commands...
10,624,860 UART: [fwproc] Recv command 0x46574c44
10,626,942 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,665 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,479,840 >>> mbox cmd response: success
14,484,615 UART: [afmc] ++
14,485,207 UART: [afmc] CDI.KEYID = 6
14,486,087 UART: [afmc] SUBJECT.KEYID = 7
14,487,306 UART: [afmc] AUTHORITY.KEYID = 5
16,988,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,655 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,518 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,241 UART: [afmc] --
18,782,233 UART: [cold-reset] --
18,786,518 UART: [state] Locking Datavault
18,790,521 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,219 UART: [state] Locking ICCM
18,794,687 UART: [exit] Launching FMC @ 0x40000130
18,803,081 UART:
18,803,312 UART: Running Caliptra FMC ...
18,804,404 UART:
18,804,551 UART: [state] CFI Enabled
18,812,706 UART: [fht] FMC Alias Private Key: 7
20,568,859 UART: [art] Extend RT PCRs Done
20,570,078 UART: [art] Lock RT PCRs Done
20,571,703 UART: [art] Populate DV Done
20,576,916 UART: [fht] FMC Alias Private Key: 7
20,578,500 UART: [art] Derive CDI
20,579,305 UART: [art] Store in in slot 0x4
20,621,731 UART: [art] Derive Key Pair
20,622,723 UART: [art] Store priv key in slot 0x5
23,050,000 UART: [art] Derive Key Pair - Done
23,062,675 UART: [art] Signing Cert with AUTHO
23,063,968 UART: RITY.KEYID = 7
24,769,600 UART: [art] Erasing AUTHORITY.KEYID = 7
24,771,081 UART: [art] PUB.X = 172856CB8A66F36A2963D31968CC0507598C368995DC1BE83A015162190797619BDFB5F2DAD4A7966F5EC495543D092E
24,778,358 UART: [art] PUB.Y = 0CF5CE954FBB4390CFE0AF8DD3753DE7E78FDC764EAC759B5319AFECFF6201C1A35D6EEA83817CE4F7C31A4D8E576CF7
24,785,681 UART: [art] SIG.R = 093CFE0C3BF7FDFE4D987F932D2A0E6F678C23EF217124EE4A103497F277DB12324877AAAA43EC8F3B0498086F109543
24,793,048 UART: [art] SIG.S = 9F7CB3E5348AE7273298E4418D3C22396A9F92F360CA34AE51FC9EC5D09A0DBFD49C27B8C7FB3EFBF1E6DA14CFC6C9C6
25,772,418 UART: Caliptra RT
25,773,130 UART: [state] CFI Enabled
25,889,655 UART: [rt] RT listening for mailbox commands...
27,941,016 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,041,572 UART:
28,041,962 UART: Running Caliptra ROM ...
28,043,003 UART:
28,043,163 UART: [state] CFI Enabled
28,054,131 UART: [state] LifecycleState = Unprovisioned
28,056,025 UART: [state] DebugLocked = No
28,058,648 UART: [state] WD Timer not started. Device not locked for debugging
28,062,492 UART: [kat] SHA2-256
28,241,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,253,262 UART: [kat] ++
28,253,802 UART: [kat] sha1
28,264,706 UART: [kat] SHA2-256
28,267,712 UART: [kat] SHA2-384
28,274,017 UART: [kat] SHA2-512-ACC
28,277,003 UART: [kat] ECC-384
30,716,614 UART: [kat] HMAC-384Kdf
30,730,246 UART: [kat] LMS
31,259,768 UART: [kat] --
31,262,179 UART: [update-reset] ++
34,256,150 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,258,717 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,516,913 >>> mbox cmd response: success
34,517,306 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,518,345 UART: [update-reset] Copying MAN_2 To MAN_1
34,540,717 UART: [update-reset Success] --
34,544,238 UART: [state] Locking Datavault
34,547,319 UART: [state] Locking PCR0, PCR1 and PCR31
34,549,028 UART: [state] Locking ICCM
34,549,984 UART: [exit] Launching FMC @ 0x40000130
34,558,433 UART:
34,558,670 UART: Running Caliptra FMC ...
34,559,761 UART:
34,559,911 UART: [state] CFI Enabled
34,604,136 UART: [art] Extend RT PCRs Done
34,605,318 UART: [art] Lock RT PCRs Done
34,606,816 UART: [art] Populate DV Done
34,612,053 UART: [fht] FMC Alias Private Key: 7
34,613,634 UART: [art] Derive CDI
34,614,437 UART: [art] Store in in slot 0x4
34,657,076 UART: [art] Derive Key Pair
34,658,112 UART: [art] Store priv key in slot 0x5
37,084,970 UART: [art] Derive Key Pair - Done
37,097,977 UART: [art] Signing Cert with AUTHO
37,099,305 UART: RITY.KEYID = 7
38,804,385 UART: [art] Erasing AUTHORITY.KEYID = 7
38,805,889 UART: [art] PUB.X = FA1E3990D7050CEFE78125C22A05AC9D2B4969DC1585C09584BE90F0321866625A94C4694B01E74E45DFEF0D4C57AF69
38,813,147 UART: [art] PUB.Y = 6662391DD189A4B1738051A3CC5695E4E3B215011866DB714E4A156B339DFB84631451D8917A16718C4F3775CBE74241
38,820,379 UART: [art] SIG.R = BB87B158AF7E8BC9BE2D1C9493BE158B04726763C87D5EA657EF9E204F5CF935D6CA1509AC54CA814D76A345EB5546B0
38,827,755 UART: [art] SIG.S = 161CFC177A8AFED00F84D014A188C0ECF2830EC0E80D0E072929ED3E15A23AF5B3797BEA42A7B4BEF14827198AA7CD23
39,806,026 UART: mbox::rt_entry...
39,806,991 UART: ____ _ _ _ ____ _____
39,808,910 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,810,911 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,812,836 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,814,753 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,816,673 UART: |_|
39,817,472 UART:
40,100,244 UART: [rt] Runtime listening for mailbox commands...
40,102,363 >>> mbox cmd response data (48 bytes)
40,102,972 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,103,444 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,690,708 ready_for_fw is high
3,691,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,969 >>> mbox cmd response: success
18,529,178 UART:
18,529,564 UART: Running Caliptra FMC ...
18,530,750 UART:
18,530,957 UART: [state] CFI Enabled
18,538,955 UART: [fht] FMC Alias Private Key: 7
20,295,861 UART: [art] Extend RT PCRs Done
20,297,093 UART: [art] Lock RT PCRs Done
20,298,778 UART: [art] Populate DV Done
20,304,246 UART: [fht] FMC Alias Private Key: 7
20,305,890 UART: [art] Derive CDI
20,306,703 UART: [art] Store in in slot 0x4
20,349,627 UART: [art] Derive Key Pair
20,350,666 UART: [art] Store priv key in slot 0x5
22,777,007 UART: [art] Derive Key Pair - Done
22,790,018 UART: [art] Signing Cert with AUTHO
22,791,328 UART: RITY.KEYID = 7
24,496,591 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,094 UART: [art] PUB.X = 67F176B9950C9D09B5267EC213E483197EFB4222E76AC903296A6037AE612731A242BC851FE4A407650031C887903B12
24,505,330 UART: [art] PUB.Y = 0A8A6FC0C675929D82713FEC6961E3EABDAE889B2FE6B4A89D4EF23B7834C0FCE7E17F953B4483C05B2BE3AD51D58793
24,512,604 UART: [art] SIG.R = AE3C5C08FB088589A8730171C7633D563D649940CC88F6015D0E37F85E4E7DB8C2F9E5A1BCE5565ED7516AE4DDB7FC86
24,519,990 UART: [art] SIG.S = E68C2D18357B44EE511ABA3FDC0A20D6CC3236EF27A94834CCB8161A10222A461415F539A9EBD64DF89EE22297EE18D9
25,499,196 UART: Caliptra RT
25,499,893 UART: [state] CFI Enabled
25,616,854 UART: [rt] RT listening for mailbox commands...
27,672,134 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,113,994 >>> mbox cmd response: success
34,114,484 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,149,010 UART:
34,149,302 UART: Running Caliptra FMC ...
34,150,416 UART:
34,150,573 UART: [state] CFI Enabled
34,194,657 UART: [art] Extend RT PCRs Done
34,195,841 UART: [art] Lock RT PCRs Done
34,197,423 UART: [art] Populate DV Done
34,202,886 UART: [fht] FMC Alias Private Key: 7
34,204,585 UART: [art] Derive CDI
34,205,313 UART: [art] Store in in slot 0x4
34,248,166 UART: [art] Derive Key Pair
34,249,367 UART: [art] Store priv key in slot 0x5
36,675,755 UART: [art] Derive Key Pair - Done
36,688,756 UART: [art] Signing Cert with AUTHO
36,690,058 UART: RITY.KEYID = 7
38,395,905 UART: [art] Erasing AUTHORITY.KEYID = 7
38,397,398 UART: [art] PUB.X = F23055B9174FD20F23556DE5D873D654E9AF435A6ECA066871A70561F7A624456BFB599670EE29F8F3B787DEFD71FC13
38,404,690 UART: [art] PUB.Y = 888DDED3432529DC7420C61E76D909BB04EB425E64575E915B47F3AA02B53E8BDCB26E9982C11533F2C9A813404B0AE7
38,411,944 UART: [art] SIG.R = 5C7B680F52EFD0AB7379EDF348D7D4458CEC91A01F53C50FA9D976D67853DED6B9A3D8170F3488AAA7C9B49D298BA916
38,419,352 UART: [art] SIG.S = 6AC922F873DB8F24E9972AAE35FC0B23D58C6109F654E260146DADE631274C98F106105527D6E8E1D5619BF933FE3BDA
39,397,637 UART: mbox::rt_entry...
39,398,595 UART: ____ _ _ _ ____ _____
39,400,572 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,402,525 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,404,448 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,406,319 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,408,235 UART: |_|
39,409,033 UART:
39,695,415 UART: [rt] Runtime listening for mailbox commands...
39,697,616 >>> mbox cmd response data (48 bytes)
39,698,183 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
39,698,607 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,438,083 ready_for_fw is high
3,438,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,753,467 >>> mbox cmd response: success
19,039,000 UART:
19,039,377 UART: Running Caliptra FMC ...
19,040,579 UART:
19,040,748 UART: [state] CFI Enabled
19,107,402 UART: [fht] FMC Alias Private Key: 7
20,871,336 UART: [art] Extend RT PCRs Done
20,872,558 UART: [art] Lock RT PCRs Done
20,874,203 UART: [art] Populate DV Done
20,879,773 UART: [fht] FMC Alias Private Key: 7
20,881,481 UART: [art] Derive CDI
20,882,300 UART: [art] Store in in slot 0x4
20,940,215 UART: [art] Derive Key Pair
20,941,253 UART: [art] Store priv key in slot 0x5
23,404,192 UART: [art] Derive Key Pair - Done
23,417,244 UART: [art] Signing Cert with AUTHO
23,418,569 UART: RITY.KEYID = 7
25,130,358 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,857 UART: [art] PUB.X = E6F52258E6A5AFA1307198D744712C690691BB0C6A9960030FE03A870FC210F4553D031E70519D78CDEFB888D723792D
25,139,108 UART: [art] PUB.Y = 1EC0DA8F71D469206F4336FD9BBA5D44671D6DC5DD890EC09750121A255CCDCCBD2497F4AD5AACC94D1AC98016F584A3
25,146,383 UART: [art] SIG.R = 220BC2E9C139772B32D68E9CA6CCC7ECF81A13E6DD382705A34897EC071BF59F0788C9BA76FC64E421BF60242478EEBE
25,153,782 UART: [art] SIG.S = BB7C6EAF43AD63A2789783D869F777796EBE026C2DC0ABF7AEF54DE3C410F091D77C759A0531A87214E5AD6582E9B0AB
26,133,037 UART: Caliptra RT
26,133,727 UART: [state] CFI Enabled
26,298,316 UART: [rt] RT listening for mailbox commands...
28,355,957 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,378,947 >>> mbox cmd response: success
35,379,463 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,411,604 UART:
35,411,931 UART: Running Caliptra FMC ...
35,413,062 UART:
35,413,230 UART: [state] CFI Enabled
35,506,304 UART: [art] Extend RT PCRs Done
35,507,488 UART: [art] Lock RT PCRs Done
35,508,837 UART: [art] Populate DV Done
35,514,091 UART: [fht] FMC Alias Private Key: 7
35,515,807 UART: [art] Derive CDI
35,516,624 UART: [art] Store in in slot 0x4
35,575,489 UART: [art] Derive Key Pair
35,576,524 UART: [art] Store priv key in slot 0x5
38,039,698 UART: [art] Derive Key Pair - Done
38,052,693 UART: [art] Signing Cert with AUTHO
38,054,001 UART: RITY.KEYID = 7
39,765,784 UART: [art] Erasing AUTHORITY.KEYID = 7
39,767,298 UART: [art] PUB.X = CBE857F24F33402833BF14F3D5D61F6348E33AFF1ACE832E418DAE2EDFEC4A50F3A1B72EB3DD66333D84B6243045711A
39,774,539 UART: [art] PUB.Y = EE3608246978DA092AE045BE990B6228201CBB439B5A8918080860DD26A18D4FD370B3D94C4CCFA111FE42D98277D117
39,781,966 UART: [art] SIG.R = F448A94BCC5F3A843385BBAA42A1958A57383333C4829C50F4AB52745D3D82CD18D18BC7E0F34625BF46385A94C7B70C
39,789,206 UART: [art] SIG.S = FD3608689C730F5931211A43A1601A1B9C84FF299A3A0D1E8CA385981B5263AE38909D244D492BB4F51C72FCC96A47BA
40,767,877 UART: mbox::rt_entry...
40,768,818 UART: ____ _ _ _ ____ _____
40,770,794 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,772,794 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,774,718 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,776,643 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,778,566 UART: |_|
40,779,373 UART:
41,068,308 UART: [rt] Runtime listening for mailbox commands...
41,070,464 >>> mbox cmd response data (48 bytes)
41,071,030 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,071,503 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,756,725 ready_for_fw is high
3,757,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,950,634 >>> mbox cmd response: success
19,204,225 UART:
19,204,946 UART: Running Caliptra FMC ...
19,206,056 UART:
19,206,267 UART: [state] CFI Enabled
19,214,123 UART: [fht] FMC Alias Private Key: 7
20,970,817 UART: [art] Extend RT PCRs Done
20,972,042 UART: [art] Lock RT PCRs Done
20,973,582 UART: [art] Populate DV Done
20,978,966 UART: [fht] FMC Alias Private Key: 7
20,980,455 UART: [art] Derive CDI
20,981,182 UART: [art] Store in in slot 0x4
21,023,885 UART: [art] Derive Key Pair
21,024,921 UART: [art] Store priv key in slot 0x5
23,451,511 UART: [art] Derive Key Pair - Done
23,464,291 UART: [art] Signing Cert with AUTHO
23,465,596 UART: RITY.KEYID = 7
25,171,181 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,686 UART: [art] PUB.X = 2B675242BCC69A1779B01D612421AB40BC62B94AAA717DAE8B01DC25E497AA7863688A3239D3481C142CFADF45868E50
25,179,952 UART: [art] PUB.Y = 917AF61633F407C5BA5E7650C1D438A22EB982D197F91F9A282ED963C873E690C161F8B541B106246499B89059D737E9
25,187,196 UART: [art] SIG.R = A78A4D291461FFF956FA5F330BAF93DD84E2D005B6E0EBDCD42F01632D5FBAD509C05A2055C7FC9F68E92A409EB1460C
25,194,627 UART: [art] SIG.S = 507F0AB6CCCAA1E50A4E9EC51EB7A524DF0C1B2A29A6E91A04622E8868D4C8A9EE17BA8B64EDE6885D5E59AD0EB19384
26,173,686 UART: Caliptra RT
26,174,370 UART: [state] CFI Enabled
26,291,111 UART: [rt] RT listening for mailbox commands...
28,340,572 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,264,612 >>> mbox cmd response: success
35,265,161 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,299,811 UART:
35,300,107 UART: Running Caliptra FMC ...
35,301,211 UART:
35,301,376 UART: [state] CFI Enabled
35,345,346 UART: [art] Extend RT PCRs Done
35,346,530 UART: [art] Lock RT PCRs Done
35,347,825 UART: [art] Populate DV Done
35,353,304 UART: [fht] FMC Alias Private Key: 7
35,354,948 UART: [art] Derive CDI
35,355,776 UART: [art] Store in in slot 0x4
35,398,697 UART: [art] Derive Key Pair
35,399,731 UART: [art] Store priv key in slot 0x5
37,827,039 UART: [art] Derive Key Pair - Done
37,839,890 UART: [art] Signing Cert with AUTHO
37,841,201 UART: RITY.KEYID = 7
39,546,981 UART: [art] Erasing AUTHORITY.KEYID = 7
39,548,484 UART: [art] PUB.X = 3C9E644E53DFCC643C803600F617A294F2AB2D7EA200EA02FF73A580C71538957C01B3DA3F4B8A7BF3A9E3D7E3B54153
39,555,752 UART: [art] PUB.Y = 8FB9D9EDD2090E6BCE7F580D16014AEDD1BB51C44766649FE7F41304103E12B0F29C15F1D966C4C9A265D4E762CC6F24
39,562,989 UART: [art] SIG.R = CE174F3A892EE2FEDB7670A36481E63340AEA689919D4DCEA9BE28EE3AD64223BD17797BE6B0FAFE6A84497C1BDAB263
39,570,372 UART: [art] SIG.S = 09510FDC4BA887E4FD4C58AB7AAB9704868F03192170508F672B8AA51D081BC0F52F0FA2273C0A04C1DF8CAC33774166
40,549,027 UART: mbox::rt_entry...
40,549,978 UART: ____ _ _ _ ____ _____
40,551,954 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,553,949 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,555,874 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,557,832 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,559,681 UART: |_|
40,560,474 UART:
40,842,150 UART: [rt] Runtime listening for mailbox commands...
40,844,301 >>> mbox cmd response data (48 bytes)
40,844,907 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,845,339 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,073 UART: [kat] SHA2-256
882,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,119 UART: [kat] ++
886,271 UART: [kat] sha1
890,711 UART: [kat] SHA2-256
892,649 UART: [kat] SHA2-384
895,310 UART: [kat] SHA2-512-ACC
897,211 UART: [kat] ECC-384
902,586 UART: [kat] HMAC-384Kdf
907,036 UART: [kat] LMS
1,475,232 UART: [kat] --
1,475,931 UART: [cold-reset] ++
1,476,379 UART: [fht] Storing FHT @ 0x50003400
1,479,142 UART: [idev] ++
1,479,310 UART: [idev] CDI.KEYID = 6
1,479,670 UART: [idev] SUBJECT.KEYID = 7
1,480,094 UART: [idev] UDS.KEYID = 0
1,480,439 ready_for_fw is high
1,480,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,922 UART: [idev] Erasing UDS.KEYID = 0
1,504,610 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,150 UART: [idev] --
1,514,325 UART: [ldev] ++
1,514,493 UART: [ldev] CDI.KEYID = 6
1,514,856 UART: [ldev] SUBJECT.KEYID = 5
1,515,282 UART: [ldev] AUTHORITY.KEYID = 7
1,515,745 UART: [ldev] FE.KEYID = 1
1,520,825 UART: [ldev] Erasing FE.KEYID = 1
1,545,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,910 UART: [ldev] --
1,585,223 UART: [fwproc] Waiting for Commands...
1,585,872 UART: [fwproc] Received command 0x46574c44
1,586,663 UART: [fwproc] Received Image of size 114448 bytes
2,885,292 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,160 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,512 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,435 >>> mbox cmd response: success
3,078,683 UART: [afmc] ++
3,078,851 UART: [afmc] CDI.KEYID = 6
3,079,213 UART: [afmc] SUBJECT.KEYID = 7
3,079,638 UART: [afmc] AUTHORITY.KEYID = 5
3,114,759 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,101 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,881 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,609 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,494 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,184 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,995 UART: [afmc] --
3,157,893 UART: [cold-reset] --
3,158,669 UART: [state] Locking Datavault
3,159,994 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,598 UART: [state] Locking ICCM
3,161,224 UART: [exit] Launching FMC @ 0x40000130
3,166,553 UART:
3,166,569 UART: Running Caliptra FMC ...
3,166,977 UART:
3,167,031 UART: [state] CFI Enabled
3,177,760 UART: [fht] FMC Alias Private Key: 7
3,286,053 UART: [art] Extend RT PCRs Done
3,286,481 UART: [art] Lock RT PCRs Done
3,287,809 UART: [art] Populate DV Done
3,296,162 UART: [fht] FMC Alias Private Key: 7
3,297,224 UART: [art] Derive CDI
3,297,504 UART: [art] Store in in slot 0x4
3,383,145 UART: [art] Derive Key Pair
3,383,505 UART: [art] Store priv key in slot 0x5
3,396,323 UART: [art] Derive Key Pair - Done
3,411,085 UART: [art] Signing Cert with AUTHO
3,411,565 UART: RITY.KEYID = 7
3,427,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,846 UART: [art] PUB.X = 586CC7810F599CFD996ADF369E0A9F68C4C42EB26E05A8BBE9300D24C62DD565780757C43ABB8EFF2E8E721648680B10
3,434,606 UART: [art] PUB.Y = D77AE058531FDE1E0145D1FFDEF7525F1439917BBFCA4D7D975F17F53315B1FF56A7B5A075E1CD131384E55170DCBD06
3,441,562 UART: [art] SIG.R = 11749C43288BDD2ED33EA6B8B12B28E542A14DE2AC554C7B8D55711E8060AE7980C5AEBE3D58AF6B263A7F50ED85936D
3,448,344 UART: [art] SIG.S = 211949789BF2E83790FD93909AA0E51981E26A6ED4D2597FE0057B0394A190B7B0C6B3A9A906104C25A2EFC0572CED31
3,472,016 UART: Caliptra RT
3,472,269 UART: [state] CFI Enabled
3,581,169 UART: [rt] RT listening for mailbox commands...
3,581,839 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,348 UART:
3,583,364 UART: Running Caliptra ROM ...
3,583,772 UART:
3,583,826 UART: [state] CFI Enabled
3,586,608 UART: [state] LifecycleState = Unprovisioned
3,587,263 UART: [state] DebugLocked = No
3,587,943 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,484 UART: [kat] SHA2-256
4,383,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,530 UART: [kat] ++
4,387,682 UART: [kat] sha1
4,391,830 UART: [kat] SHA2-256
4,393,768 UART: [kat] SHA2-384
4,396,465 UART: [kat] SHA2-512-ACC
4,398,365 UART: [kat] ECC-384
4,403,520 UART: [kat] HMAC-384Kdf
4,407,916 UART: [kat] LMS
4,976,112 UART: [kat] --
4,976,545 UART: [update-reset] ++
5,904,671 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,905,949 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,002,383 >>> mbox cmd response: success
6,002,383 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,002,526 UART: [update-reset] Copying MAN_2 To MAN_1
6,010,540 UART: [update-reset Success] --
6,011,589 UART: [state] Locking Datavault
6,012,237 UART: [state] Locking PCR0, PCR1 and PCR31
6,012,841 UART: [state] Locking ICCM
6,013,381 UART: [exit] Launching FMC @ 0x40000130
6,018,710 UART:
6,018,726 UART: Running Caliptra FMC ...
6,019,134 UART:
6,019,188 UART: [state] CFI Enabled
6,107,943 UART: [art] Extend RT PCRs Done
6,108,371 UART: [art] Lock RT PCRs Done
6,109,582 UART: [art] Populate DV Done
6,117,955 UART: [fht] FMC Alias Private Key: 7
6,119,033 UART: [art] Derive CDI
6,119,313 UART: [art] Store in in slot 0x4
6,204,846 UART: [art] Derive Key Pair
6,205,206 UART: [art] Store priv key in slot 0x5
6,218,570 UART: [art] Derive Key Pair - Done
6,233,131 UART: [art] Signing Cert with AUTHO
6,233,611 UART: RITY.KEYID = 7
6,248,755 UART: [art] Erasing AUTHORITY.KEYID = 7
6,249,520 UART: [art] PUB.X = 538B883F7584DC8BDD98227D034AEC21053575593DA7B49ABCED80D46619478C50BCAB7395CF0D03E5081D7254E1A928
6,256,277 UART: [art] PUB.Y = 907AF5E30A7236954F0B416F9E8A0E33078EC83A075573573EC5BC64FA00B255857BD5DE3F8D9EC18512D89D841F02F8
6,263,189 UART: [art] SIG.R = 37E7107AFB39400505FF40D813050E518801218EED3CAB48236B77EF020CB0F7C03EB8AD35F93D0244E5FC32E8375E46
6,269,937 UART: [art] SIG.S = 4545E3896AB356D93372FCD325BECD94D4E50CD07ECD20B83713B4CD425DA9CE8559DAB78187B49085E98174B37B1FB9
6,293,465 UART: mbox::rt_entry...
6,293,837 UART: ____ _ _ _ ____ _____
6,294,621 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,295,421 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,296,189 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,296,957 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,297,725 UART: |_|
6,298,037 UART:
6,581,792 UART: [rt] Runtime listening for mailbox commands...
6,582,982 >>> mbox cmd response data (48 bytes)
6,582,983 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,583,091 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,401 ready_for_fw is high
1,362,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,825 >>> mbox cmd response: success
2,991,003 UART:
2,991,019 UART: Running Caliptra FMC ...
2,991,427 UART:
2,991,481 UART: [state] CFI Enabled
3,001,902 UART: [fht] FMC Alias Private Key: 7
3,110,217 UART: [art] Extend RT PCRs Done
3,110,645 UART: [art] Lock RT PCRs Done
3,112,139 UART: [art] Populate DV Done
3,120,236 UART: [fht] FMC Alias Private Key: 7
3,121,278 UART: [art] Derive CDI
3,121,558 UART: [art] Store in in slot 0x4
3,207,311 UART: [art] Derive Key Pair
3,207,671 UART: [art] Store priv key in slot 0x5
3,220,231 UART: [art] Derive Key Pair - Done
3,235,096 UART: [art] Signing Cert with AUTHO
3,235,576 UART: RITY.KEYID = 7
3,251,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,003 UART: [art] PUB.X = E2BA27ABFFA7DA2B659C796ADA81797FBFA9C40919EC9BD815EF00280FE2394E25B1B88956BC52D664111DF218B15DA3
3,258,761 UART: [art] PUB.Y = 888879C99DCACA567B482B94E832A7DAF686961819D80128C4CB0E3108C000D1D7A20EB57D41733DBBD93251A89AA9B7
3,265,681 UART: [art] SIG.R = A65186E00E8B4A8DAFD1A3F198621BA76C524F6317416EF6870BBF3290301C674BF1676C6F0DA8168B203967A02FDC2B
3,272,446 UART: [art] SIG.S = F073667A568B8BB5F1B99A55B67BF29AEAE826449C9A405738E7D04D3E3607CA8B38898706D8B7DB5FDD199F1622CA4C
3,295,975 UART: Caliptra RT
3,296,228 UART: [state] CFI Enabled
3,404,638 UART: [rt] RT listening for mailbox commands...
3,405,308 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,707,132 >>> mbox cmd response: success
5,707,132 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,720,607 UART:
5,720,623 UART: Running Caliptra FMC ...
5,721,031 UART:
5,721,085 UART: [state] CFI Enabled
5,809,724 UART: [art] Extend RT PCRs Done
5,810,152 UART: [art] Lock RT PCRs Done
5,811,411 UART: [art] Populate DV Done
5,819,370 UART: [fht] FMC Alias Private Key: 7
5,820,410 UART: [art] Derive CDI
5,820,690 UART: [art] Store in in slot 0x4
5,906,419 UART: [art] Derive Key Pair
5,906,779 UART: [art] Store priv key in slot 0x5
5,919,871 UART: [art] Derive Key Pair - Done
5,934,747 UART: [art] Signing Cert with AUTHO
5,935,227 UART: RITY.KEYID = 7
5,950,385 UART: [art] Erasing AUTHORITY.KEYID = 7
5,951,150 UART: [art] PUB.X = 93F410FFAA58B762B6BF375702F41BB2E1572095DFB4FE0B83B88BE7ECD35AEB05BE61CDFA612972DEFFE3256F896EAB
5,957,935 UART: [art] PUB.Y = 37A3471648C56EDB824C268F51A4867B78AA0FD52E12C24941D3A0E135AC7F1CE05DAF964931D3E95374888065CF5337
5,964,880 UART: [art] SIG.R = 0700B9261AB0BC1E96B4B86B801BAB9E04061504D4FE5B067EC3D627400D727817C486DB1A90CD52970AE3D2DA809C46
5,971,611 UART: [art] SIG.S = 8B415102ABC71FA40ACFAB1CCC847880404689987B571890FAB24A2CF9BF8AF748E9426F09793473D2ED08F6B763A60A
5,995,513 UART: mbox::rt_entry...
5,995,885 UART: ____ _ _ _ ____ _____
5,996,669 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,997,469 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,998,237 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,999,005 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,999,773 UART: |_|
6,000,085 UART:
6,281,325 UART: [rt] Runtime listening for mailbox commands...
6,282,515 >>> mbox cmd response data (48 bytes)
6,282,516 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,282,624 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,462 UART: [kat] SHA2-256
882,393 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,508 UART: [kat] ++
886,660 UART: [kat] sha1
890,850 UART: [kat] SHA2-256
892,788 UART: [kat] SHA2-384
895,729 UART: [kat] SHA2-512-ACC
897,630 UART: [kat] ECC-384
903,471 UART: [kat] HMAC-384Kdf
908,095 UART: [kat] LMS
1,476,291 UART: [kat] --
1,476,980 UART: [cold-reset] ++
1,477,536 UART: [fht] Storing FHT @ 0x50003400
1,480,295 UART: [idev] ++
1,480,463 UART: [idev] CDI.KEYID = 6
1,480,823 UART: [idev] SUBJECT.KEYID = 7
1,481,247 UART: [idev] UDS.KEYID = 0
1,481,592 ready_for_fw is high
1,481,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,123 UART: [idev] Erasing UDS.KEYID = 0
1,506,035 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,671 UART: [idev] --
1,515,788 UART: [ldev] ++
1,515,956 UART: [ldev] CDI.KEYID = 6
1,516,319 UART: [ldev] SUBJECT.KEYID = 5
1,516,745 UART: [ldev] AUTHORITY.KEYID = 7
1,517,208 UART: [ldev] FE.KEYID = 1
1,522,562 UART: [ldev] Erasing FE.KEYID = 1
1,548,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,741 UART: [ldev] --
1,588,198 UART: [fwproc] Waiting for Commands...
1,588,947 UART: [fwproc] Received command 0x46574c44
1,589,738 UART: [fwproc] Received Image of size 114448 bytes
2,889,739 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,891 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,083,210 >>> mbox cmd response: success
3,084,416 UART: [afmc] ++
3,084,584 UART: [afmc] CDI.KEYID = 6
3,084,946 UART: [afmc] SUBJECT.KEYID = 7
3,085,371 UART: [afmc] AUTHORITY.KEYID = 5
3,120,840 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,137,096 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,137,876 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,143,604 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,149,489 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,155,179 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,163,092 UART: [afmc] --
3,164,042 UART: [cold-reset] --
3,164,982 UART: [state] Locking Datavault
3,166,051 UART: [state] Locking PCR0, PCR1 and PCR31
3,166,655 UART: [state] Locking ICCM
3,167,185 UART: [exit] Launching FMC @ 0x40000130
3,172,514 UART:
3,172,530 UART: Running Caliptra FMC ...
3,172,938 UART:
3,173,081 UART: [state] CFI Enabled
3,183,742 UART: [fht] FMC Alias Private Key: 7
3,291,491 UART: [art] Extend RT PCRs Done
3,291,919 UART: [art] Lock RT PCRs Done
3,293,275 UART: [art] Populate DV Done
3,301,590 UART: [fht] FMC Alias Private Key: 7
3,302,744 UART: [art] Derive CDI
3,303,024 UART: [art] Store in in slot 0x4
3,387,995 UART: [art] Derive Key Pair
3,388,355 UART: [art] Store priv key in slot 0x5
3,401,227 UART: [art] Derive Key Pair - Done
3,416,402 UART: [art] Signing Cert with AUTHO
3,416,882 UART: RITY.KEYID = 7
3,432,812 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,577 UART: [art] PUB.X = B76C08E86B8AB43FF6E4E5989A3A1FA83C9DBAB0EB3151B6DC95D02D66421F3095C1F5F7AA46B3A8AB59EA1F18ADF8CA
3,440,370 UART: [art] PUB.Y = DA37CC64E88F54F7D0877713104CF63EA9F7017DA581CE45302DC765F96A93B3C174FF036DFE0CB547AE45E41D3EA195
3,447,321 UART: [art] SIG.R = DBDD9CB0C870576160833DF6278FF956B447553357FEA42D2D14BCED6C47DBC2BB7395BE782BF47BDA590AE879EEF71A
3,454,106 UART: [art] SIG.S = 9A1EC3F474A90F826E07BB9F5EC2032FF4B9D68A7DB896FCCEBE25B67320CB85CC1F7D9746AAF839DC4ECECF90BF93B2
3,477,846 UART: Caliptra RT
3,478,191 UART: [state] CFI Enabled
3,586,923 UART: [rt] RT listening for mailbox commands...
3,587,593 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,726 UART:
3,588,742 UART: Running Caliptra ROM ...
3,589,150 UART:
3,589,291 UART: [state] CFI Enabled
3,592,077 UART: [state] LifecycleState = Unprovisioned
3,592,732 UART: [state] DebugLocked = No
3,593,362 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,595,065 UART: [kat] SHA2-256
4,388,996 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,393,111 UART: [kat] ++
4,393,263 UART: [kat] sha1
4,397,627 UART: [kat] SHA2-256
4,399,565 UART: [kat] SHA2-384
4,402,270 UART: [kat] SHA2-512-ACC
4,404,170 UART: [kat] ECC-384
4,410,157 UART: [kat] HMAC-384Kdf
4,414,795 UART: [kat] LMS
4,982,991 UART: [kat] --
4,984,004 UART: [update-reset] ++
5,911,236 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,912,282 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,008,716 >>> mbox cmd response: success
6,008,716 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,008,867 UART: [update-reset] Copying MAN_2 To MAN_1
6,016,881 UART: [update-reset Success] --
6,017,900 UART: [state] Locking Datavault
6,018,636 UART: [state] Locking PCR0, PCR1 and PCR31
6,019,240 UART: [state] Locking ICCM
6,019,806 UART: [exit] Launching FMC @ 0x40000130
6,025,135 UART:
6,025,151 UART: Running Caliptra FMC ...
6,025,559 UART:
6,025,702 UART: [state] CFI Enabled
6,115,531 UART: [art] Extend RT PCRs Done
6,115,959 UART: [art] Lock RT PCRs Done
6,117,238 UART: [art] Populate DV Done
6,125,711 UART: [fht] FMC Alias Private Key: 7
6,126,783 UART: [art] Derive CDI
6,127,063 UART: [art] Store in in slot 0x4
6,212,888 UART: [art] Derive Key Pair
6,213,248 UART: [art] Store priv key in slot 0x5
6,227,096 UART: [art] Derive Key Pair - Done
6,241,764 UART: [art] Signing Cert with AUTHO
6,242,244 UART: RITY.KEYID = 7
6,257,120 UART: [art] Erasing AUTHORITY.KEYID = 7
6,257,885 UART: [art] PUB.X = 01C3CBA1EB238A343D9B0924A53085465D3677DFE6C185AF43CD1A5A595139847580626D603411A689F46F30D91F6D7B
6,264,645 UART: [art] PUB.Y = 3BE40B3EC4C1E0727AED554329F3690DA2404ED6B43E885EDB21E5E74F4880F4335D7FEECCB0E8EBE4A9F5D8C83BC5F5
6,271,611 UART: [art] SIG.R = 6FD2879037DC8661DDF393E6BA9952E4E08C0DFD97896074687F59F13D2AEFFB473F1FAD90281B5D588897E08FBAD057
6,278,386 UART: [art] SIG.S = C63F5CD264A9CC47DD18842E28F9F65FCC39DE9DDB2A0C731FAA7BA1899415EDB6C83DBC0ABFE7C39BDF1DFA697C1097
6,301,785 UART: mbox::rt_entry...
6,302,157 UART: ____ _ _ _ ____ _____
6,302,941 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,303,741 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,304,509 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,305,277 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,306,045 UART: |_|
6,306,357 UART:
6,591,489 UART: [rt] Runtime listening for mailbox commands...
6,592,679 >>> mbox cmd response data (48 bytes)
6,592,680 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,592,788 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 ready_for_fw is high
1,362,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,096 >>> mbox cmd response: success
2,990,582 UART:
2,990,598 UART: Running Caliptra FMC ...
2,991,006 UART:
2,991,149 UART: [state] CFI Enabled
3,001,568 UART: [fht] FMC Alias Private Key: 7
3,109,439 UART: [art] Extend RT PCRs Done
3,109,867 UART: [art] Lock RT PCRs Done
3,111,477 UART: [art] Populate DV Done
3,119,536 UART: [fht] FMC Alias Private Key: 7
3,120,524 UART: [art] Derive CDI
3,120,804 UART: [art] Store in in slot 0x4
3,206,065 UART: [art] Derive Key Pair
3,206,425 UART: [art] Store priv key in slot 0x5
3,219,403 UART: [art] Derive Key Pair - Done
3,233,895 UART: [art] Signing Cert with AUTHO
3,234,375 UART: RITY.KEYID = 7
3,249,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,296 UART: [art] PUB.X = 0E8D9ED8BD0EF2C95B4D762DCA3CA4DC65F39B6E2128BC7F3C66A739D9917D3B0A95E9B3B54EB88F66E18278259AA91C
3,257,075 UART: [art] PUB.Y = C8F287E5D7F723956F5A2B1DF82460CB3E1467412DBEF0E1619A9FF4C5BDE46FD58352B52A88DCF8D76812C8AB41E5BD
3,264,041 UART: [art] SIG.R = 5BF67A8EBF2FFA8D2BA62F3E77C7D5F96D86B9496B77D6777F3BEBB3D5B5B921B2320C465AE39B59FFA6CAF8BF617AA7
3,270,834 UART: [art] SIG.S = E7A61AA2C8B99E100A32343CE20ABC6FFD7A45EECE10E2E66CF76E6B7247FDE0032E6DA284AB1333C9EB3B2BA447C985
3,294,420 UART: Caliptra RT
3,294,765 UART: [state] CFI Enabled
3,402,458 UART: [rt] RT listening for mailbox commands...
3,403,128 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,704,757 >>> mbox cmd response: success
5,704,757 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,718,406 UART:
5,718,422 UART: Running Caliptra FMC ...
5,718,830 UART:
5,718,973 UART: [state] CFI Enabled
5,808,088 UART: [art] Extend RT PCRs Done
5,808,516 UART: [art] Lock RT PCRs Done
5,809,743 UART: [art] Populate DV Done
5,818,124 UART: [fht] FMC Alias Private Key: 7
5,819,184 UART: [art] Derive CDI
5,819,464 UART: [art] Store in in slot 0x4
5,905,357 UART: [art] Derive Key Pair
5,905,717 UART: [art] Store priv key in slot 0x5
5,919,427 UART: [art] Derive Key Pair - Done
5,934,255 UART: [art] Signing Cert with AUTHO
5,934,735 UART: RITY.KEYID = 7
5,950,425 UART: [art] Erasing AUTHORITY.KEYID = 7
5,951,190 UART: [art] PUB.X = DDE947A5F93C079461E877864D8C4CE2FE999B617D75C82F5A6D34DA560B351D0ACC54ED71D0BFAE816E12E33FCFA51C
5,957,969 UART: [art] PUB.Y = 245D5D0E4405E0EC6E9E6865CFCE80BD3380502BCC34A63FBB37C45E27C54526DF04DC321A77B790AAE89EAEE9B17DA1
5,964,928 UART: [art] SIG.R = EFB78E868433E8B6CF9D0B9A5DA178DB629B8745F1F5F80286EFB32214905569B993287FBB41A861AC3CDB8EB67F2404
5,971,697 UART: [art] SIG.S = 31E1F3B3E890F87049FBB481FA970B6FAA6BD6455B152A411354BFA1D41B2780910FB25A1C2DAD4F2DB7E7E6237F4189
5,995,172 UART: mbox::rt_entry...
5,995,544 UART: ____ _ _ _ ____ _____
5,996,328 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,997,128 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,997,896 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,998,664 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,999,432 UART: |_|
5,999,744 UART:
6,279,336 UART: [rt] Runtime listening for mailbox commands...
6,280,526 >>> mbox cmd response data (48 bytes)
6,280,527 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,280,635 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
893,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,341 UART: [kat] ++
897,493 UART: [kat] sha1
901,711 UART: [kat] SHA2-256
903,651 UART: [kat] SHA2-384
906,350 UART: [kat] SHA2-512-ACC
908,251 UART: [kat] ECC-384
917,834 UART: [kat] HMAC-384Kdf
922,398 UART: [kat] LMS
1,170,726 UART: [kat] --
1,171,637 UART: [cold-reset] ++
1,172,103 UART: [fht] FHT @ 0x50003400
1,174,710 UART: [idev] ++
1,174,878 UART: [idev] CDI.KEYID = 6
1,175,238 UART: [idev] SUBJECT.KEYID = 7
1,175,662 UART: [idev] UDS.KEYID = 0
1,176,007 ready_for_fw is high
1,176,007 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,582 UART: [idev] Erasing UDS.KEYID = 0
1,200,891 UART: [idev] Sha1 KeyId Algorithm
1,209,343 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,732 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,673 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,557 UART: [ldev] --
1,282,030 UART: [fwproc] Wait for Commands...
1,282,718 UART: [fwproc] Recv command 0x46574c44
1,283,446 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,996 >>> mbox cmd response: success
2,777,150 UART: [afmc] ++
2,777,318 UART: [afmc] CDI.KEYID = 6
2,777,680 UART: [afmc] SUBJECT.KEYID = 7
2,778,105 UART: [afmc] AUTHORITY.KEYID = 5
2,813,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,667 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,395 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,280 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,999 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,931 UART: [afmc] --
2,856,903 UART: [cold-reset] --
2,857,897 UART: [state] Locking Datavault
2,858,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,582 UART: [state] Locking ICCM
2,860,030 UART: [exit] Launching FMC @ 0x40000130
2,865,359 UART:
2,865,375 UART: Running Caliptra FMC ...
2,865,783 UART:
2,865,837 UART: [state] CFI Enabled
2,876,672 UART: [fht] FMC Alias Private Key: 7
2,984,661 UART: [art] Extend RT PCRs Done
2,985,089 UART: [art] Lock RT PCRs Done
2,986,723 UART: [art] Populate DV Done
2,994,834 UART: [fht] FMC Alias Private Key: 7
2,995,950 UART: [art] Derive CDI
2,996,230 UART: [art] Store in in slot 0x4
3,082,141 UART: [art] Derive Key Pair
3,082,501 UART: [art] Store priv key in slot 0x5
3,095,465 UART: [art] Derive Key Pair - Done
3,110,495 UART: [art] Signing Cert with AUTHO
3,110,975 UART: RITY.KEYID = 7
3,126,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,036 UART: [art] PUB.X = 651921D509C4985F0E3ABAF2C4B7BFB00FE74586893A08F246F671C2E7708522ACC6864ACEBE3470421347052E9B4BF0
3,133,793 UART: [art] PUB.Y = F645885774D329FB36D6D99EF699A9C348C2126D20E42F7A14765AE4E9F172DFDAF048F9D8BD6BFCB9C6C61A2198F1F2
3,140,755 UART: [art] SIG.R = 7BB72A764CD992290CDB524DF785C5952D13CD65228D98AFFD35C72569AED5AC6D9E82B06641783660AFA83B212F8382
3,147,526 UART: [art] SIG.S = D1468490D60185E447031D221B22D3992E172FBDCD90B530DA2D4A72957F9E4E0E51DF3A2E7A3759B975495FD3AD0DE9
3,171,069 UART: Caliptra RT
3,171,322 UART: [state] CFI Enabled
3,278,869 UART: [rt] RT listening for mailbox commands...
3,279,539 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,015 UART:
3,281,031 UART: Running Caliptra ROM ...
3,281,439 UART:
3,281,494 UART: [state] CFI Enabled
3,284,118 UART: [state] LifecycleState = Unprovisioned
3,284,773 UART: [state] DebugLocked = No
3,285,327 UART: [state] WD Timer not started. Device not locked for debugging
3,286,469 UART: [kat] SHA2-256
4,092,119 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,096,244 UART: [kat] ++
4,096,396 UART: [kat] sha1
4,100,712 UART: [kat] SHA2-256
4,102,652 UART: [kat] SHA2-384
4,105,231 UART: [kat] SHA2-512-ACC
4,107,131 UART: [kat] ECC-384
4,116,770 UART: [kat] HMAC-384Kdf
4,121,438 UART: [kat] LMS
4,369,766 UART: [kat] --
4,370,630 UART: [update-reset] ++
5,275,072 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,201 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,372,583 >>> mbox cmd response: success
5,372,583 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,372,892 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,906 UART: [update-reset Success] --
5,381,825 UART: [state] Locking Datavault
5,382,713 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,317 UART: [state] Locking ICCM
5,383,973 UART: [exit] Launching FMC @ 0x40000130
5,389,302 UART:
5,389,318 UART: Running Caliptra FMC ...
5,389,726 UART:
5,389,780 UART: [state] CFI Enabled
5,478,915 UART: [art] Extend RT PCRs Done
5,479,343 UART: [art] Lock RT PCRs Done
5,480,714 UART: [art] Populate DV Done
5,489,027 UART: [fht] FMC Alias Private Key: 7
5,490,139 UART: [art] Derive CDI
5,490,419 UART: [art] Store in in slot 0x4
5,576,020 UART: [art] Derive Key Pair
5,576,380 UART: [art] Store priv key in slot 0x5
5,589,656 UART: [art] Derive Key Pair - Done
5,604,584 UART: [art] Signing Cert with AUTHO
5,605,064 UART: RITY.KEYID = 7
5,620,652 UART: [art] Erasing AUTHORITY.KEYID = 7
5,621,417 UART: [art] PUB.X = F566435920AC030626879EEDB58C4F88FBFFEC84167564C9E74BDA0B6032C291B12B10BB8B071374792C1A045F0ACBBA
5,628,177 UART: [art] PUB.Y = FE0A2EC6313E8ED20A2CA7EC4AD683808A221C5DD6EA20398A52CDACA188208F8DEFCC7B54D0A167F3E787E38DDA1C7E
5,635,147 UART: [art] SIG.R = C7DCAE70CAD0AAB95AB897F7445BC5E9281C938A1FB770372E6899BDBBB1D8D62135D07D98F4721ACF333F223DE3209C
5,641,933 UART: [art] SIG.S = C52FDFBB099F357B095F815E77C1D20112CFB06B483C7403D83F7CC206E408367EE52CB714E97474469039A4D2798F71
5,665,722 UART: mbox::rt_entry...
5,666,094 UART: ____ _ _ _ ____ _____
5,666,878 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,667,678 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,668,446 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,669,214 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,669,982 UART: |_|
5,670,294 UART:
5,951,089 UART: [rt] Runtime listening for mailbox commands...
5,952,279 >>> mbox cmd response data (48 bytes)
5,952,280 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,952,388 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,273 ready_for_fw is high
1,060,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,737 >>> mbox cmd response: success
2,688,373 UART:
2,688,389 UART: Running Caliptra FMC ...
2,688,797 UART:
2,688,851 UART: [state] CFI Enabled
2,699,502 UART: [fht] FMC Alias Private Key: 7
2,807,355 UART: [art] Extend RT PCRs Done
2,807,783 UART: [art] Lock RT PCRs Done
2,809,303 UART: [art] Populate DV Done
2,817,602 UART: [fht] FMC Alias Private Key: 7
2,818,612 UART: [art] Derive CDI
2,818,892 UART: [art] Store in in slot 0x4
2,904,841 UART: [art] Derive Key Pair
2,905,201 UART: [art] Store priv key in slot 0x5
2,917,905 UART: [art] Derive Key Pair - Done
2,932,498 UART: [art] Signing Cert with AUTHO
2,932,978 UART: RITY.KEYID = 7
2,948,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,283 UART: [art] PUB.X = 85AE749D12F7A9F96FF45AF0DF3B9D2A0F0A7174410C5D9FDEAD0F3AFCDCC2351126F3772FB3E25951EEFBEC374FFFD3
2,956,069 UART: [art] PUB.Y = B8046D5641260A519C2AC0036801C337B480776A4C59036B3E74547451A2CE13C4DC1589E39EEEA15CDFC3E7E9B502FD
2,963,003 UART: [art] SIG.R = 65D1DEE8DFEFD5C676A85E20F74F53324F5CBCC0BF5EA0EEB0A83EC6273E6511CC8DF9DB3568E60838006B8A82FFA152
2,969,770 UART: [art] SIG.S = F5F9D1C688DF29BA731EB84B9E3257068AB6191A91921255830FF866357541C411E17302C370D98FFB1790D21BA724A6
2,993,580 UART: Caliptra RT
2,993,833 UART: [state] CFI Enabled
3,101,834 UART: [rt] RT listening for mailbox commands...
3,102,504 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,079,137 >>> mbox cmd response: success
5,079,137 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,092,403 UART:
5,092,419 UART: Running Caliptra FMC ...
5,092,827 UART:
5,092,881 UART: [state] CFI Enabled
5,181,770 UART: [art] Extend RT PCRs Done
5,182,198 UART: [art] Lock RT PCRs Done
5,183,317 UART: [art] Populate DV Done
5,191,634 UART: [fht] FMC Alias Private Key: 7
5,192,746 UART: [art] Derive CDI
5,193,026 UART: [art] Store in in slot 0x4
5,278,921 UART: [art] Derive Key Pair
5,279,281 UART: [art] Store priv key in slot 0x5
5,293,189 UART: [art] Derive Key Pair - Done
5,307,783 UART: [art] Signing Cert with AUTHO
5,308,263 UART: RITY.KEYID = 7
5,323,683 UART: [art] Erasing AUTHORITY.KEYID = 7
5,324,448 UART: [art] PUB.X = 0392039683E3FCCDF2C5C0CBF2807EE00B9740093FB528D6DE3B86291541C864D4FED07EE855820839A46E850666EA0E
5,331,199 UART: [art] PUB.Y = 9177C823254EC2221A3D62AC953E70A23D7E28FDE3635479A649B351FD1C0EA0B43C44B927D5A79AB5FF8F739EB108B8
5,338,149 UART: [art] SIG.R = F7BA854A475BBC5314D98250D004C3415F188B38AA6C903C7CCBAF816015038A0AACEFE1B5C27F0057B76FDB7D4E169A
5,344,902 UART: [art] SIG.S = E111554DD402800F5BAA6C8CE5A5470C18B64B6215C04CA75353699BF7312DFCBF114DB3062288ECAB4E0A94A4710B35
5,368,057 UART: mbox::rt_entry...
5,368,429 UART: ____ _ _ _ ____ _____
5,369,213 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,370,013 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,370,781 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,371,549 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,372,317 UART: |_|
5,372,629 UART:
5,650,126 UART: [rt] Runtime listening for mailbox commands...
5,651,316 >>> mbox cmd response data (48 bytes)
5,651,317 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,651,425 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [kat] SHA2-256
893,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,092 UART: [kat] ++
898,244 UART: [kat] sha1
902,428 UART: [kat] SHA2-256
904,368 UART: [kat] SHA2-384
907,181 UART: [kat] SHA2-512-ACC
909,082 UART: [kat] ECC-384
918,857 UART: [kat] HMAC-384Kdf
923,401 UART: [kat] LMS
1,171,729 UART: [kat] --
1,172,828 UART: [cold-reset] ++
1,173,186 UART: [fht] FHT @ 0x50003400
1,175,949 UART: [idev] ++
1,176,117 UART: [idev] CDI.KEYID = 6
1,176,477 UART: [idev] SUBJECT.KEYID = 7
1,176,901 UART: [idev] UDS.KEYID = 0
1,177,246 ready_for_fw is high
1,177,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,923 UART: [idev] Erasing UDS.KEYID = 0
1,201,906 UART: [idev] Sha1 KeyId Algorithm
1,210,160 UART: [idev] --
1,211,156 UART: [ldev] ++
1,211,324 UART: [ldev] CDI.KEYID = 6
1,211,687 UART: [ldev] SUBJECT.KEYID = 5
1,212,113 UART: [ldev] AUTHORITY.KEYID = 7
1,212,576 UART: [ldev] FE.KEYID = 1
1,217,684 UART: [ldev] Erasing FE.KEYID = 1
1,244,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,359 UART: [fwproc] Wait for Commands...
1,284,049 UART: [fwproc] Recv command 0x46574c44
1,284,777 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,655 >>> mbox cmd response: success
2,776,709 UART: [afmc] ++
2,776,877 UART: [afmc] CDI.KEYID = 6
2,777,239 UART: [afmc] SUBJECT.KEYID = 7
2,777,664 UART: [afmc] AUTHORITY.KEYID = 5
2,813,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,268 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,881 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,600 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,420 UART: [afmc] --
2,856,356 UART: [cold-reset] --
2,857,096 UART: [state] Locking Datavault
2,858,119 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,723 UART: [state] Locking ICCM
2,859,225 UART: [exit] Launching FMC @ 0x40000130
2,864,554 UART:
2,864,570 UART: Running Caliptra FMC ...
2,864,978 UART:
2,865,121 UART: [state] CFI Enabled
2,875,420 UART: [fht] FMC Alias Private Key: 7
2,983,129 UART: [art] Extend RT PCRs Done
2,983,557 UART: [art] Lock RT PCRs Done
2,984,947 UART: [art] Populate DV Done
2,993,226 UART: [fht] FMC Alias Private Key: 7
2,994,214 UART: [art] Derive CDI
2,994,494 UART: [art] Store in in slot 0x4
3,080,387 UART: [art] Derive Key Pair
3,080,747 UART: [art] Store priv key in slot 0x5
3,094,837 UART: [art] Derive Key Pair - Done
3,109,743 UART: [art] Signing Cert with AUTHO
3,110,223 UART: RITY.KEYID = 7
3,125,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,218 UART: [art] PUB.X = 7992B8E1D367A6D21786DBDB77D311684B2F8D080C5222AA164F5B90C3193ADAF12251327DF62F96F35822C817869C3E
3,132,980 UART: [art] PUB.Y = A50C7961575B00FF934CB7B7C48F19B8EB2CB69988314BC963347ABEBC20F58FAEFE01B924B5B15604368FE7AFADEC08
3,139,912 UART: [art] SIG.R = 9A032824C786106E0093D0486063067AA325FAD5A944C4C2AE804D1D4C791E6976FC6583AB0A3F50E190F7400FD09ABB
3,146,648 UART: [art] SIG.S = 2D854AE0A0E026FCFB8698F623504E1AFBE19DFAF0401D037BE5A56360E181C8007229DF01F2223C6723BA7E8393CFF2
3,170,513 UART: Caliptra RT
3,170,858 UART: [state] CFI Enabled
3,279,009 UART: [rt] RT listening for mailbox commands...
3,279,679 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,999 UART:
3,281,015 UART: Running Caliptra ROM ...
3,281,423 UART:
3,281,565 UART: [state] CFI Enabled
3,284,705 UART: [state] LifecycleState = Unprovisioned
3,285,360 UART: [state] DebugLocked = No
3,285,900 UART: [state] WD Timer not started. Device not locked for debugging
3,287,250 UART: [kat] SHA2-256
4,092,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,097,025 UART: [kat] ++
4,097,177 UART: [kat] sha1
4,101,493 UART: [kat] SHA2-256
4,103,433 UART: [kat] SHA2-384
4,106,078 UART: [kat] SHA2-512-ACC
4,107,978 UART: [kat] ECC-384
4,117,775 UART: [kat] HMAC-384Kdf
4,122,545 UART: [kat] LMS
4,370,873 UART: [kat] --
4,371,789 UART: [update-reset] ++
5,276,757 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,277,858 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,374,240 >>> mbox cmd response: success
5,374,240 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,374,405 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,419 UART: [update-reset Success] --
5,383,472 UART: [state] Locking Datavault
5,384,266 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,870 UART: [state] Locking ICCM
5,385,374 UART: [exit] Launching FMC @ 0x40000130
5,390,703 UART:
5,390,719 UART: Running Caliptra FMC ...
5,391,127 UART:
5,391,270 UART: [state] CFI Enabled
5,480,633 UART: [art] Extend RT PCRs Done
5,481,061 UART: [art] Lock RT PCRs Done
5,482,184 UART: [art] Populate DV Done
5,490,291 UART: [fht] FMC Alias Private Key: 7
5,491,381 UART: [art] Derive CDI
5,491,661 UART: [art] Store in in slot 0x4
5,577,224 UART: [art] Derive Key Pair
5,577,584 UART: [art] Store priv key in slot 0x5
5,591,074 UART: [art] Derive Key Pair - Done
5,606,179 UART: [art] Signing Cert with AUTHO
5,606,659 UART: RITY.KEYID = 7
5,621,743 UART: [art] Erasing AUTHORITY.KEYID = 7
5,622,508 UART: [art] PUB.X = 2BF2642A569FC66ABF9603E4F5669DF0BD843EA4A6DE54592C6B66393F0BF81DC457060C895D3CA0A9A617F5206EAAA4
5,629,278 UART: [art] PUB.Y = B4EB26CE3FD9C68188435CD65535A194264E1A23E0542B931D812265CC9C2883DA3CDC5B0DB2D9BD78527380DE5D00B8
5,636,209 UART: [art] SIG.R = F9D9440A7A8E952FF759CF5913C540287CD1E74AC62FE58DD0CF1225945FC61A6286DD5A2B200066E635A70D086446DD
5,642,952 UART: [art] SIG.S = 0A9E6B84CC7E228627A58155F4B48EDD3D7EAC803CDB4B30177E8DD0697713BB972A74D2E0C2659DEDB46B2A51C03D87
5,666,662 UART: mbox::rt_entry...
5,667,034 UART: ____ _ _ _ ____ _____
5,667,818 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,668,618 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,669,386 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,670,154 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,670,922 UART: |_|
5,671,234 UART:
5,952,642 UART: [rt] Runtime listening for mailbox commands...
5,953,832 >>> mbox cmd response data (48 bytes)
5,953,833 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,953,941 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,168 ready_for_fw is high
1,061,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,872 >>> mbox cmd response: success
2,690,340 UART:
2,690,356 UART: Running Caliptra FMC ...
2,690,764 UART:
2,690,907 UART: [state] CFI Enabled
2,701,790 UART: [fht] FMC Alias Private Key: 7
2,810,203 UART: [art] Extend RT PCRs Done
2,810,631 UART: [art] Lock RT PCRs Done
2,812,101 UART: [art] Populate DV Done
2,820,342 UART: [fht] FMC Alias Private Key: 7
2,821,436 UART: [art] Derive CDI
2,821,716 UART: [art] Store in in slot 0x4
2,907,021 UART: [art] Derive Key Pair
2,907,381 UART: [art] Store priv key in slot 0x5
2,920,565 UART: [art] Derive Key Pair - Done
2,935,565 UART: [art] Signing Cert with AUTHO
2,936,045 UART: RITY.KEYID = 7
2,951,259 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,024 UART: [art] PUB.X = A313916FA46F39BE4491C3B5C1176E5B1E988D04125054449C01B67676B30BEDD9DCE1D3C81DD1E825A92797A2199379
2,958,783 UART: [art] PUB.Y = 8C8DFDBBED10E3BD4FB841E0112C938C13513F5E0FA34A44E6B12459B9FB5B4112967DBF12B21C7A21BF42A04004B33F
2,965,741 UART: [art] SIG.R = 192C558FD77DCFBC8790AAC5317BB5ABE8D53E05C52C84DED5E0FCE4BF0C24BC54D0195ED14FB06B105F13DC3E1C8E65
2,972,531 UART: [art] SIG.S = 91F20C8D9CFF2FE7FEA3126EFD90DB86AED57C86311BEE5B366FC24A679FB536D177A122DCB8FB0B46E2C81889C3B5C4
2,995,986 UART: Caliptra RT
2,996,331 UART: [state] CFI Enabled
3,105,072 UART: [rt] RT listening for mailbox commands...
3,105,742 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,081,838 >>> mbox cmd response: success
5,081,838 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,095,196 UART:
5,095,212 UART: Running Caliptra FMC ...
5,095,620 UART:
5,095,763 UART: [state] CFI Enabled
5,185,112 UART: [art] Extend RT PCRs Done
5,185,540 UART: [art] Lock RT PCRs Done
5,187,049 UART: [art] Populate DV Done
5,195,268 UART: [fht] FMC Alias Private Key: 7
5,196,294 UART: [art] Derive CDI
5,196,574 UART: [art] Store in in slot 0x4
5,282,623 UART: [art] Derive Key Pair
5,282,983 UART: [art] Store priv key in slot 0x5
5,296,511 UART: [art] Derive Key Pair - Done
5,311,184 UART: [art] Signing Cert with AUTHO
5,311,664 UART: RITY.KEYID = 7
5,327,266 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,031 UART: [art] PUB.X = 32C2BACE5AA68E793978729EF164D36884AC2C840BA235E34CC1260161D353515ECC9E5D6F7C22D96473F506A73151E3
5,334,792 UART: [art] PUB.Y = 1F6C536FEAFBF61C47DB21F78ACBC2C47888FEC46FB11C2D4B1463EF3A3C37D864D8061E0EDE71146EC2570D6142A9EA
5,341,753 UART: [art] SIG.R = 8872E9C5A377F6FD847CE711767DEC33C3B4233C78E439A7F86950DF6EA3E15B3DF59F7051D556510667C9A3EA25B748
5,348,522 UART: [art] SIG.S = 9E0C7427ADE227DAA3BCF82FB434EF17C232EE058F96EA83EE8EA7A73D402E4E2588DFA22F6ACAC5BB75F3FAD033A59D
5,372,065 UART: mbox::rt_entry...
5,372,437 UART: ____ _ _ _ ____ _____
5,373,221 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,374,021 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,374,789 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,375,557 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,376,325 UART: |_|
5,376,637 UART:
5,660,026 UART: [rt] Runtime listening for mailbox commands...
5,661,216 >>> mbox cmd response data (48 bytes)
5,661,217 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,661,325 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,258 UART: [kat] SHA2-256
890,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,937 UART: [kat] ++
895,089 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
904,114 UART: [kat] SHA2-512-ACC
906,015 UART: [kat] ECC-384
915,740 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,407 UART: [cold-reset] ++
1,169,761 UART: [fht] FHT @ 0x50003400
1,172,367 UART: [idev] ++
1,172,535 UART: [idev] CDI.KEYID = 6
1,172,896 UART: [idev] SUBJECT.KEYID = 7
1,173,321 UART: [idev] UDS.KEYID = 0
1,173,667 ready_for_fw is high
1,173,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,099 UART: [idev] Erasing UDS.KEYID = 0
1,197,575 UART: [idev] Sha1 KeyId Algorithm
1,206,553 UART: [idev] --
1,207,592 UART: [ldev] ++
1,207,760 UART: [ldev] CDI.KEYID = 6
1,208,124 UART: [ldev] SUBJECT.KEYID = 5
1,208,551 UART: [ldev] AUTHORITY.KEYID = 7
1,209,014 UART: [ldev] FE.KEYID = 1
1,214,196 UART: [ldev] Erasing FE.KEYID = 1
1,241,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,070 UART: [ldev] --
1,280,548 UART: [fwproc] Wait for Commands...
1,281,225 UART: [fwproc] Recv command 0x46574c44
1,281,958 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,406 >>> mbox cmd response: success
2,775,649 UART: [afmc] ++
2,775,817 UART: [afmc] CDI.KEYID = 6
2,776,180 UART: [afmc] SUBJECT.KEYID = 7
2,776,606 UART: [afmc] AUTHORITY.KEYID = 5
2,812,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,208 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,937 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,820 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,539 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,278 UART: [afmc] --
2,855,378 UART: [cold-reset] --
2,856,280 UART: [state] Locking Datavault
2,857,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,045 UART: [state] Locking ICCM
2,858,513 UART: [exit] Launching FMC @ 0x40000130
2,863,842 UART:
2,863,858 UART: Running Caliptra FMC ...
2,864,266 UART:
2,864,320 UART: [state] CFI Enabled
2,874,543 UART: [fht] FMC Alias Private Key: 7
2,982,534 UART: [art] Extend RT PCRs Done
2,982,962 UART: [art] Lock RT PCRs Done
2,984,392 UART: [art] Populate DV Done
2,992,319 UART: [fht] FMC Alias Private Key: 7
2,993,451 UART: [art] Derive CDI
2,993,731 UART: [art] Store in in slot 0x4
3,079,628 UART: [art] Derive Key Pair
3,079,988 UART: [art] Store priv key in slot 0x5
3,093,446 UART: [art] Derive Key Pair - Done
3,108,058 UART: [art] Signing Cert with AUTHO
3,108,538 UART: RITY.KEYID = 7
3,124,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,911 UART: [art] PUB.X = ACE983D651E3321083458811FD24DB7DC5043733571122045CE6B7A771AAB7E55980CA3B5C881468DD5B4819211F1E26
3,131,669 UART: [art] PUB.Y = 2C8788C723732CBDE58598A121FFA2BDE70192416A1248FBE01EA3468E8732A739D76A470C7EA5127D82FFAF56CC6DB7
3,138,621 UART: [art] SIG.R = 4F13F35BDAF8E8C7C9C83AA1FD93FB12518CD442DE07763F74424A5D127493CEA6413B91D6DD16949EDD9B662307C6EF
3,145,397 UART: [art] SIG.S = F7FD8A885DA627F28E7353F80A8C1952CA3730E67CB018DD056249FA81F64DD93BBBBC5824696D8AFC6F3943B97F6F31
3,169,194 UART: Caliptra RT
3,169,447 UART: [state] CFI Enabled
3,276,266 UART: [rt] RT listening for mailbox commands...
3,276,936 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,382 UART:
3,278,398 UART: Running Caliptra ROM ...
3,278,806 UART:
3,278,861 UART: [state] CFI Enabled
3,281,271 UART: [state] LifecycleState = Unprovisioned
3,281,926 UART: [state] DebugLocked = No
3,282,464 UART: [state] WD Timer not started. Device not locked for debugging
3,283,620 UART: [kat] SHA2-256
4,087,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,299 UART: [kat] ++
4,091,451 UART: [kat] sha1
4,095,567 UART: [kat] SHA2-256
4,097,507 UART: [kat] SHA2-384
4,100,302 UART: [kat] SHA2-512-ACC
4,102,202 UART: [kat] ECC-384
4,111,547 UART: [kat] HMAC-384Kdf
4,116,193 UART: [kat] LMS
4,364,505 UART: [kat] --
4,365,095 UART: [update-reset] ++
5,269,754 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,270,719 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,367,101 >>> mbox cmd response: success
5,367,101 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,367,396 UART: [update-reset] Copying MAN_2 To MAN_1
5,375,410 UART: [update-reset Success] --
5,376,365 UART: [state] Locking Datavault
5,377,249 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,853 UART: [state] Locking ICCM
5,378,325 UART: [exit] Launching FMC @ 0x40000130
5,383,654 UART:
5,383,670 UART: Running Caliptra FMC ...
5,384,078 UART:
5,384,132 UART: [state] CFI Enabled
5,472,297 UART: [art] Extend RT PCRs Done
5,472,725 UART: [art] Lock RT PCRs Done
5,473,896 UART: [art] Populate DV Done
5,482,429 UART: [fht] FMC Alias Private Key: 7
5,483,519 UART: [art] Derive CDI
5,483,799 UART: [art] Store in in slot 0x4
5,569,132 UART: [art] Derive Key Pair
5,569,492 UART: [art] Store priv key in slot 0x5
5,581,982 UART: [art] Derive Key Pair - Done
5,596,805 UART: [art] Signing Cert with AUTHO
5,597,285 UART: RITY.KEYID = 7
5,612,649 UART: [art] Erasing AUTHORITY.KEYID = 7
5,613,414 UART: [art] PUB.X = 64C396E43751826B41B26DE9F52AA07A68B9E485AC30484350028E2B635BD21A44AA2A0CB9FAA31066EDB4E6D0B5555D
5,620,184 UART: [art] PUB.Y = 6DBDD3A3B0556E65227FC26A18B9B32CE274B27A218B88C054FC28837902B75C483A6C1F5B41A24C0D1F35C59FB46F5E
5,627,136 UART: [art] SIG.R = 0F93B339179E49DB6A24DCFADCCEDA7C811A826E04800FABFBB3B1C559C01FFABB6252866292AA9658AA61277BDBF832
5,633,917 UART: [art] SIG.S = 48430849FC7AF4569A849FE5EDCDB9460568511DD6E0B60F6B9E15751F79A595E77C6BBF0E93A8CE5DBFE70B19BC25F8
5,658,357 UART: mbox::rt_entry...
5,658,729 UART: ____ _ _ _ ____ _____
5,659,513 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,660,313 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,661,081 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,661,849 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,662,617 UART: |_|
5,662,929 UART:
5,941,401 UART: [rt] Runtime listening for mailbox commands...
5,942,591 >>> mbox cmd response data (48 bytes)
5,942,592 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,942,700 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,746 ready_for_fw is high
1,055,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,716 >>> mbox cmd response: success
2,686,010 UART:
2,686,026 UART: Running Caliptra FMC ...
2,686,434 UART:
2,686,488 UART: [state] CFI Enabled
2,696,729 UART: [fht] FMC Alias Private Key: 7
2,804,442 UART: [art] Extend RT PCRs Done
2,804,870 UART: [art] Lock RT PCRs Done
2,806,614 UART: [art] Populate DV Done
2,814,941 UART: [fht] FMC Alias Private Key: 7
2,816,113 UART: [art] Derive CDI
2,816,393 UART: [art] Store in in slot 0x4
2,902,322 UART: [art] Derive Key Pair
2,902,682 UART: [art] Store priv key in slot 0x5
2,915,622 UART: [art] Derive Key Pair - Done
2,930,462 UART: [art] Signing Cert with AUTHO
2,930,942 UART: RITY.KEYID = 7
2,945,966 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,731 UART: [art] PUB.X = 6A75082A78E667BC67C56BDE21578E57137BAA57CADF02A4D4A9F54E6D520A1B823718266E6CCAD932093094D8C4BFA7
2,953,497 UART: [art] PUB.Y = D45C22507EA5D3EFEF33BDAB9F8F641ED4D1844D4B48FDC76CF5BD0F41F82E130511F01C066777E7C2DA8A0054FAEA5F
2,960,438 UART: [art] SIG.R = 7E80A42F064143E0A753A7EAD67964F3415C268902F30BF6E7837CBB1DE5BB4D92DA447576DD33F18D0203503208BC03
2,967,187 UART: [art] SIG.S = 3DBA287B1AC242FB105C0E7B6CA39B0EF1F35629122E23AFADF38B3032AE093187580A0C2ACC1148D6AC628AFDFC0605
2,991,119 UART: Caliptra RT
2,991,372 UART: [state] CFI Enabled
3,098,433 UART: [rt] RT listening for mailbox commands...
3,099,103 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,072,975 >>> mbox cmd response: success
5,072,975 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,086,497 UART:
5,086,513 UART: Running Caliptra FMC ...
5,086,921 UART:
5,086,975 UART: [state] CFI Enabled
5,176,374 UART: [art] Extend RT PCRs Done
5,176,802 UART: [art] Lock RT PCRs Done
5,178,069 UART: [art] Populate DV Done
5,186,344 UART: [fht] FMC Alias Private Key: 7
5,187,506 UART: [art] Derive CDI
5,187,786 UART: [art] Store in in slot 0x4
5,273,083 UART: [art] Derive Key Pair
5,273,443 UART: [art] Store priv key in slot 0x5
5,286,945 UART: [art] Derive Key Pair - Done
5,301,864 UART: [art] Signing Cert with AUTHO
5,302,344 UART: RITY.KEYID = 7
5,317,410 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,175 UART: [art] PUB.X = 83ABD876C5AF2298143ECB1B007715E0B6D6D7EAB6C21BAD42416F48F7423F3F25E91C85FF8154697DFBC292B486B2F0
5,324,933 UART: [art] PUB.Y = 68AECF6807D481F0AF67037285217F0B085C389723B428F9C146D28E9AE8E532344A8628930B68D127D9D6C768EF815D
5,331,862 UART: [art] SIG.R = 8611B9E268C091A31EBEAAD1EACD60790D9314828042EC5E9E62410FD37BD76C65BDDA7F1CDA07C46A121D4DA93C462B
5,338,639 UART: [art] SIG.S = 6908E57FB75931675B806F2272DCEDA19FA28B85965CB6A674FFF82218EF11EC198F2783532CBFC95E60EA311E212166
5,362,633 UART: mbox::rt_entry...
5,363,005 UART: ____ _ _ _ ____ _____
5,363,789 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,364,589 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,365,357 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,366,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,366,893 UART: |_|
5,367,205 UART:
5,645,895 UART: [rt] Runtime listening for mailbox commands...
5,647,085 >>> mbox cmd response data (48 bytes)
5,647,086 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,647,194 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,170,464 UART: [cold-reset] ++
1,170,792 UART: [fht] FHT @ 0x50003400
1,173,394 UART: [idev] ++
1,173,562 UART: [idev] CDI.KEYID = 6
1,173,923 UART: [idev] SUBJECT.KEYID = 7
1,174,348 UART: [idev] UDS.KEYID = 0
1,174,694 ready_for_fw is high
1,174,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,694 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,537 UART: [ldev] ++
1,209,705 UART: [ldev] CDI.KEYID = 6
1,210,069 UART: [ldev] SUBJECT.KEYID = 5
1,210,496 UART: [ldev] AUTHORITY.KEYID = 7
1,210,959 UART: [ldev] FE.KEYID = 1
1,216,327 UART: [ldev] Erasing FE.KEYID = 1
1,243,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,697 UART: [fwproc] Wait for Commands...
1,283,358 UART: [fwproc] Recv command 0x46574c44
1,284,091 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,083 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,009 >>> mbox cmd response: success
2,776,128 UART: [afmc] ++
2,776,296 UART: [afmc] CDI.KEYID = 6
2,776,659 UART: [afmc] SUBJECT.KEYID = 7
2,777,085 UART: [afmc] AUTHORITY.KEYID = 5
2,813,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,449 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,061 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,467 UART: [afmc] --
2,856,469 UART: [cold-reset] --
2,857,339 UART: [state] Locking Datavault
2,858,532 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,136 UART: [state] Locking ICCM
2,859,736 UART: [exit] Launching FMC @ 0x40000130
2,865,065 UART:
2,865,081 UART: Running Caliptra FMC ...
2,865,489 UART:
2,865,632 UART: [state] CFI Enabled
2,876,615 UART: [fht] FMC Alias Private Key: 7
2,984,908 UART: [art] Extend RT PCRs Done
2,985,336 UART: [art] Lock RT PCRs Done
2,986,808 UART: [art] Populate DV Done
2,995,155 UART: [fht] FMC Alias Private Key: 7
2,996,239 UART: [art] Derive CDI
2,996,519 UART: [art] Store in in slot 0x4
3,082,106 UART: [art] Derive Key Pair
3,082,466 UART: [art] Store priv key in slot 0x5
3,095,856 UART: [art] Derive Key Pair - Done
3,110,478 UART: [art] Signing Cert with AUTHO
3,110,958 UART: RITY.KEYID = 7
3,125,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,617 UART: [art] PUB.X = 3E40736EC22C2B8D68E70A3A9A431B65F01B57DCD79DD2BB4A6F11FFD5B18A1B747C1FAE93575EBE00B2C7C4E70E8D41
3,133,379 UART: [art] PUB.Y = A3D81D40CE42049790EAC83CC05D1AB6F74C3724595E81E6183123905DCDA1277D713A6F56041986A842F91A303280B1
3,140,317 UART: [art] SIG.R = 7049BFCE0B0C0D1775F187DE1F629630E33FE1451E7B2DE68F67F0E7E2D71BD4F7B2F66051A5E40A7E2C23D33F3971A0
3,147,085 UART: [art] SIG.S = 28A1DF50D7A3691D3EAC9B79DBC601D56E753DF161A03E0DFD0DDD1DBB40DB5CB73E21C08024E2B6972E703D781510C2
3,170,985 UART: Caliptra RT
3,171,330 UART: [state] CFI Enabled
3,278,143 UART: [rt] RT listening for mailbox commands...
3,278,813 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,867 UART:
3,279,883 UART: Running Caliptra ROM ...
3,280,291 UART:
3,280,433 UART: [state] CFI Enabled
3,283,601 UART: [state] LifecycleState = Unprovisioned
3,284,256 UART: [state] DebugLocked = No
3,284,852 UART: [state] WD Timer not started. Device not locked for debugging
3,286,148 UART: [kat] SHA2-256
4,089,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,827 UART: [kat] ++
4,093,979 UART: [kat] sha1
4,098,457 UART: [kat] SHA2-256
4,100,397 UART: [kat] SHA2-384
4,103,292 UART: [kat] SHA2-512-ACC
4,105,192 UART: [kat] ECC-384
4,114,895 UART: [kat] HMAC-384Kdf
4,119,515 UART: [kat] LMS
4,367,827 UART: [kat] --
4,368,567 UART: [update-reset] ++
5,273,730 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,793 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,371,175 >>> mbox cmd response: success
5,371,175 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,371,456 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,470 UART: [update-reset Success] --
5,380,277 UART: [state] Locking Datavault
5,381,019 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,623 UART: [state] Locking ICCM
5,382,085 UART: [exit] Launching FMC @ 0x40000130
5,387,414 UART:
5,387,430 UART: Running Caliptra FMC ...
5,387,838 UART:
5,387,981 UART: [state] CFI Enabled
5,477,164 UART: [art] Extend RT PCRs Done
5,477,592 UART: [art] Lock RT PCRs Done
5,479,075 UART: [art] Populate DV Done
5,487,342 UART: [fht] FMC Alias Private Key: 7
5,488,520 UART: [art] Derive CDI
5,488,800 UART: [art] Store in in slot 0x4
5,574,797 UART: [art] Derive Key Pair
5,575,157 UART: [art] Store priv key in slot 0x5
5,588,463 UART: [art] Derive Key Pair - Done
5,603,250 UART: [art] Signing Cert with AUTHO
5,603,730 UART: RITY.KEYID = 7
5,618,964 UART: [art] Erasing AUTHORITY.KEYID = 7
5,619,729 UART: [art] PUB.X = D7D92F60C8F2981098035BB0FA23FA7BF96409967266C587A7F5A2A83ADB9B51ACA33C366507879B9A0C846B0EF49C23
5,626,488 UART: [art] PUB.Y = 3D3A6415055A5CF83904DE3459D9BFADD2D70DB24081B8E1502536C5B06233D52EB1F4F1057A298377EAF45C7F0B3A79
5,633,427 UART: [art] SIG.R = BE835E65E2B7FD380356707766049D1AB87E32DB022579ABA17E6A4E00413771CE137D2CC27B0FAABDEA2113F8C87550
5,640,169 UART: [art] SIG.S = D6FE568FAE5AAD9A08E31869C677A056CD5A489251956FFC6F106FA98511F0E43E28E37A863E448F6F0F871B3485D778
5,664,128 UART: mbox::rt_entry...
5,664,500 UART: ____ _ _ _ ____ _____
5,665,284 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,666,084 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,666,852 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,667,620 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,668,388 UART: |_|
5,668,700 UART:
5,950,275 UART: [rt] Runtime listening for mailbox commands...
5,951,465 >>> mbox cmd response data (48 bytes)
5,951,466 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,951,574 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,467 ready_for_fw is high
1,056,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,269 >>> mbox cmd response: success
2,688,357 UART:
2,688,373 UART: Running Caliptra FMC ...
2,688,781 UART:
2,688,924 UART: [state] CFI Enabled
2,699,423 UART: [fht] FMC Alias Private Key: 7
2,807,544 UART: [art] Extend RT PCRs Done
2,807,972 UART: [art] Lock RT PCRs Done
2,809,602 UART: [art] Populate DV Done
2,817,859 UART: [fht] FMC Alias Private Key: 7
2,819,027 UART: [art] Derive CDI
2,819,307 UART: [art] Store in in slot 0x4
2,904,776 UART: [art] Derive Key Pair
2,905,136 UART: [art] Store priv key in slot 0x5
2,918,242 UART: [art] Derive Key Pair - Done
2,932,864 UART: [art] Signing Cert with AUTHO
2,933,344 UART: RITY.KEYID = 7
2,948,728 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,493 UART: [art] PUB.X = EDD02D334EA7815B4DF61A786EFE1C83F2FB98C5013B39BFD8A2B749663A9E0AB7563A576572F4DD956042D861057678
2,956,258 UART: [art] PUB.Y = 9E5BA657A6E50E3AD7146D0750F5F78430DA2A0A0C094B743FF490AB39E04D2A3054740FCB02D6DDD375A1F3FD07F508
2,963,191 UART: [art] SIG.R = 0DAB9DC1CEFA66228BB8ABCF1C67C047A2C3189B01DD674F363755203AB21BBB0EF1DA258D6329C72B3B6AABEAD06404
2,969,971 UART: [art] SIG.S = D9084C7096D9DAC51BC6137B693D25F16C4C703ECFE004731A5C4E9B6C91C8F39A700E107A7354C2409F2BA54EB34F75
2,993,479 UART: Caliptra RT
2,993,824 UART: [state] CFI Enabled
3,101,551 UART: [rt] RT listening for mailbox commands...
3,102,221 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,075,222 >>> mbox cmd response: success
5,075,222 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,088,734 UART:
5,088,750 UART: Running Caliptra FMC ...
5,089,158 UART:
5,089,301 UART: [state] CFI Enabled
5,178,496 UART: [art] Extend RT PCRs Done
5,178,924 UART: [art] Lock RT PCRs Done
5,180,219 UART: [art] Populate DV Done
5,188,530 UART: [fht] FMC Alias Private Key: 7
5,189,674 UART: [art] Derive CDI
5,189,954 UART: [art] Store in in slot 0x4
5,275,845 UART: [art] Derive Key Pair
5,276,205 UART: [art] Store priv key in slot 0x5
5,289,367 UART: [art] Derive Key Pair - Done
5,304,426 UART: [art] Signing Cert with AUTHO
5,304,906 UART: RITY.KEYID = 7
5,320,310 UART: [art] Erasing AUTHORITY.KEYID = 7
5,321,075 UART: [art] PUB.X = 80AD78FB2D71AAE92BBC436B40236FA4CD7A93A206867BC2451B90D9020700B0225B543192768E0DA047764060EA709E
5,327,809 UART: [art] PUB.Y = 72CC691AB333D24C15D8477C72C87B96FFDA586F2F7ED9287583A70B74E9D68051A479A621171FF556FC0E8895B43FA5
5,334,755 UART: [art] SIG.R = 9F90874BB1006F3F677DC82EB0863FABEBA52645095F502539ACA8AB62B5CD7FE192D3FC553FB6289E61CF6EEB417379
5,341,512 UART: [art] SIG.S = 54E89CC7194872B57981E6D21C3AECA5DAAFF9CCAD80C6462D79BB28668961C7F27FAE434CAD87B6C231C14319843126
5,364,911 UART: mbox::rt_entry...
5,365,283 UART: ____ _ _ _ ____ _____
5,366,067 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,366,867 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,367,635 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,368,403 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,369,171 UART: |_|
5,369,483 UART:
5,648,655 UART: [rt] Runtime listening for mailbox commands...
5,649,845 >>> mbox cmd response data (48 bytes)
5,649,846 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,649,954 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,220 UART:
192,581 UART: Running Caliptra ROM ...
193,771 UART:
193,924 UART: [state] CFI Enabled
261,019 UART: [state] LifecycleState = Unprovisioned
263,006 UART: [state] DebugLocked = No
265,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,616 UART: [kat] SHA2-256
440,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,848 UART: [kat] ++
451,382 UART: [kat] sha1
463,966 UART: [kat] SHA2-256
466,619 UART: [kat] SHA2-384
473,670 UART: [kat] SHA2-512-ACC
476,058 UART: [kat] ECC-384
2,765,693 UART: [kat] HMAC-384Kdf
2,777,456 UART: [kat] LMS
3,967,799 UART: [kat] --
3,971,256 UART: [cold-reset] ++
3,972,768 UART: [fht] Storing FHT @ 0x50003400
3,984,604 UART: [idev] ++
3,985,248 UART: [idev] CDI.KEYID = 6
3,986,131 UART: [idev] SUBJECT.KEYID = 7
3,987,373 UART: [idev] UDS.KEYID = 0
3,988,358 ready_for_fw is high
3,988,556 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,134 UART: [idev] Erasing UDS.KEYID = 0
7,326,968 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,671 UART: [idev] --
7,354,447 UART: [ldev] ++
7,355,068 UART: [ldev] CDI.KEYID = 6
7,356,132 UART: [ldev] SUBJECT.KEYID = 5
7,357,185 UART: [ldev] AUTHORITY.KEYID = 7
7,358,393 UART: [ldev] FE.KEYID = 1
7,402,222 UART: [ldev] Erasing FE.KEYID = 1
10,731,115 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,118 UART: [ldev] --
13,094,030 UART: [fwproc] Waiting for Commands...
13,097,369 UART: [fwproc] Received command 0x46574c44
13,099,553 UART: [fwproc] Received Image of size 114124 bytes
17,152,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,798 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,645 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,612,689 >>> mbox cmd response: success
17,616,259 UART: [afmc] ++
17,616,858 UART: [afmc] CDI.KEYID = 6
17,617,773 UART: [afmc] SUBJECT.KEYID = 7
17,619,047 UART: [afmc] AUTHORITY.KEYID = 5
20,982,942 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,282,996 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,285,247 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,299,664 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,314,497 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,328,906 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,349,773 UART: [afmc] --
23,353,964 UART: [cold-reset] --
23,357,766 UART: [state] Locking Datavault
23,364,429 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,155 UART: [state] Locking ICCM
23,368,690 UART: [exit] Launching FMC @ 0x40000130
23,377,052 UART:
23,377,295 UART: Running Caliptra FMC ...
23,378,396 UART:
23,378,556 UART: [state] CFI Enabled
23,442,448 UART: [fht] FMC Alias Private Key: 7
25,780,036 UART: [art] Extend RT PCRs Done
25,781,308 UART: [art] Lock RT PCRs Done
25,783,022 UART: [art] Populate DV Done
25,788,383 UART: [fht] FMC Alias Private Key: 7
25,790,082 UART: [art] Derive CDI
25,790,823 UART: [art] Store in in slot 0x4
25,853,013 UART: [art] Derive Key Pair
25,854,054 UART: [art] Store priv key in slot 0x5
29,146,958 UART: [art] Derive Key Pair - Done
29,159,635 UART: [art] Signing Cert with AUTHO
29,160,937 UART: RITY.KEYID = 7
31,447,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,146 UART: [art] PUB.X = F602F7789E4228F4F7DFB98BE07B18F5A3AE422809F16BFBD9BDBAA1845E54C01D7BEBE9E812CD0F8EA1C5EEC5D52BE6
31,456,454 UART: [art] PUB.Y = 1F9614B8044E4C44E4678A8CF86B488A96A6F9CB7AEEDFAEA6CDD4BB01D094535B4175A41A8A26CF1E37D05CC784BCEA
31,463,730 UART: [art] SIG.R = 1AB52F7E235BE112B1B3417BC41E235F17503B0A5FC6014E16B6DBD95898D7ADCEE76D48F321CF42D6DAC6843ED27952
31,471,117 UART: [art] SIG.S = C4E1370688B977F3D43DAEBD91D440294F4B2CB5D8E19C2A9C943435EC242826402170E958638DABAB8A6B09B13DCFCC
32,775,994 UART: Caliptra RT
32,776,694 UART: [state] CFI Enabled
32,940,044 UART: [rt] RT listening for mailbox commands...
32,942,481 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,972,543 UART: [rt]cmd =0x54514754, len=24
32,975,124 >>> mbox cmd response data (8 bytes)
35,100,484 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,201,620 UART:
35,201,968 UART: Running Caliptra ROM ...
35,203,105 UART:
35,203,278 UART: [state] CFI Enabled
35,266,647 UART: [state] LifecycleState = Unprovisioned
35,268,542 UART: [state] DebugLocked = No
35,270,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,276,480 UART: [kat] SHA2-256
35,446,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,456,702 UART: [kat] ++
35,457,241 UART: [kat] sha1
35,468,412 UART: [kat] SHA2-256
35,471,105 UART: [kat] SHA2-384
35,476,602 UART: [kat] SHA2-512-ACC
35,479,005 UART: [kat] ECC-384
37,768,721 UART: [kat] HMAC-384Kdf
37,781,564 UART: [kat] LMS
38,971,871 UART: [kat] --
38,974,939 UART: [update-reset] ++
42,684,990 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,689,144 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,947,523 >>> mbox cmd response: success
42,947,909 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,948,202 UART: [update-reset] Copying MAN_2 To MAN_1
42,970,544 UART: [update-reset Success] --
42,974,225 UART: [state] Locking Datavault
42,977,971 UART: [state] Locking PCR0, PCR1 and PCR31
42,979,730 UART: [state] Locking ICCM
42,981,075 UART: [exit] Launching FMC @ 0x40000130
42,989,535 UART:
42,989,771 UART: Running Caliptra FMC ...
42,990,877 UART:
42,991,056 UART: [state] CFI Enabled
43,084,111 UART: [art] Extend RT PCRs Done
43,085,299 UART: [art] Lock RT PCRs Done
43,086,758 UART: [art] Populate DV Done
43,092,224 UART: [fht] FMC Alias Private Key: 7
43,093,962 UART: [art] Derive CDI
43,094,779 UART: [art] Store in in slot 0x4
43,153,148 UART: [art] Derive Key Pair
43,154,179 UART: [art] Store priv key in slot 0x5
46,447,289 UART: [art] Derive Key Pair - Done
46,460,294 UART: [art] Signing Cert with AUTHO
46,461,608 UART: RITY.KEYID = 7
48,749,423 UART: [art] Erasing AUTHORITY.KEYID = 7
48,750,933 UART: [art] PUB.X = 924857DF5C728D7F85C95B0703389C9DF77D990CB1B1871BA71ACC30181D6589039813E2B1888844F3729028695247F5
48,758,134 UART: [art] PUB.Y = 6F50D92D57346DB4F8D72D2BFA0DA40120CD947D43F2E4749F496317D364EACF1AD64A447EA788E88D2D8D0646DEED3D
48,765,423 UART: [art] SIG.R = 5046510365F8A3AF720D7007E08729C51F5E8661839D1C0A3EFEC8AE064900367AB41249AF7C1A4F9661647EBF6E5359
48,772,774 UART: [art] SIG.S = CB3A2512A67046344A2FF953C84BA3170A336168F4B510585DD7C25FCA1BD78D2F9611DB6F93E8F005B467434C02B3F5
50,077,564 UART: mbox::rt_entry...
50,078,533 UART: ____ _ _ _ ____ _____
50,080,520 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,082,527 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,084,460 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,086,389 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,088,322 UART: |_|
50,089,161 UART:
50,371,780 UART: [rt] Runtime listening for mailbox commands...
50,373,907 >>> mbox cmd response data (120 bytes)
52,494,666 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,594,556 UART:
52,594,891 UART: Running Caliptra ROM ...
52,595,941 UART:
52,596,095 UART: [state] CFI Enabled
52,654,995 UART: [state] LifecycleState = Unprovisioned
52,656,935 UART: [state] DebugLocked = No
52,658,898 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,663,474 UART: [kat] SHA2-256
52,833,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,843,653 UART: [kat] ++
52,844,113 UART: [kat] sha1
52,854,248 UART: [kat] SHA2-256
52,856,949 UART: [kat] SHA2-384
52,863,097 UART: [kat] SHA2-512-ACC
52,865,499 UART: [kat] ECC-384
55,154,811 UART: [kat] HMAC-384Kdf
55,167,171 UART: [kat] LMS
56,357,499 UART: [kat] --
56,362,157 UART: [update-reset] ++
60,071,740 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,075,897 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
60,334,299 >>> mbox cmd response: success
60,334,676 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,335,996 UART: [update-reset] Copying MAN_2 To MAN_1
60,358,435 UART: [update-reset Success] --
60,363,378 UART: [state] Locking Datavault
60,365,496 UART: [state] Locking PCR0, PCR1 and PCR31
60,367,249 UART: [state] Locking ICCM
60,368,703 UART: [exit] Launching FMC @ 0x40000130
60,377,104 UART:
60,377,347 UART: Running Caliptra FMC ...
60,378,452 UART:
60,378,631 UART: [state] CFI Enabled
60,470,577 UART: [art] Extend RT PCRs Done
60,471,761 UART: [art] Lock RT PCRs Done
60,473,378 UART: [art] Populate DV Done
60,478,739 UART: [fht] FMC Alias Private Key: 7
60,480,421 UART: [art] Derive CDI
60,481,241 UART: [art] Store in in slot 0x4
60,539,986 UART: [art] Derive Key Pair
60,540,992 UART: [art] Store priv key in slot 0x5
63,834,026 UART: [art] Derive Key Pair - Done
63,846,865 UART: [art] Signing Cert with AUTHO
63,848,192 UART: RITY.KEYID = 7
66,135,966 UART: [art] Erasing AUTHORITY.KEYID = 7
66,137,472 UART: [art] PUB.X = 66FCF1D2BD28412D83B4B12D9E9866B63BB70D7B794703EE6676186DE0AFF3885101D93A70643FAD6C70703350F6F719
66,144,724 UART: [art] PUB.Y = 61A26327FD32B54AE24FA5AFA33B48CB46FF726A353AAEDF9E31CC0332759B0FD763A87D3CD206896907564BDEF37697
66,151,954 UART: [art] SIG.R = F8832847CFB2844266E9BB6DB44CCAE6761AD4A77D10D8D06B219354E3B3B8BBE00FA699309F56DD4C07684964BEF4A8
66,159,438 UART: [art] SIG.S = BAB4ACB77510014B7BE451FBDF7E9D7E646187FE5B7EF6E48AAC22B47F627891C1A141245EB7C30EDA24D72F1389778D
67,463,892 UART: mbox::rt_entry...
67,464,849 UART: ____ _ _ _ ____ _____
67,466,782 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,468,788 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,470,648 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,472,571 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,474,454 UART: |_|
67,475,290 UART:
67,763,190 UART: [rt] Runtime listening for mailbox commands...
67,765,304 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,808,932 ready_for_fw is high
3,809,416 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,897,870 >>> mbox cmd response: success
23,589,216 UART:
23,589,593 UART: Running Caliptra FMC ...
23,590,709 UART:
23,590,861 UART: [state] CFI Enabled
23,659,421 UART: [fht] FMC Alias Private Key: 7
25,997,420 UART: [art] Extend RT PCRs Done
25,998,649 UART: [art] Lock RT PCRs Done
26,000,420 UART: [art] Populate DV Done
26,005,640 UART: [fht] FMC Alias Private Key: 7
26,007,301 UART: [art] Derive CDI
26,008,123 UART: [art] Store in in slot 0x4
26,068,308 UART: [art] Derive Key Pair
26,069,311 UART: [art] Store priv key in slot 0x5
29,362,099 UART: [art] Derive Key Pair - Done
29,374,996 UART: [art] Signing Cert with AUTHO
29,376,298 UART: RITY.KEYID = 7
31,664,332 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,967 UART: [art] PUB.X = 3AAB38A5A53E97808AFB7F1A4EB8061BC8236C8F22844BE6FA575CC1930D88AF04B348CA45DAFB6A6FF73D0A664DC6CC
31,673,085 UART: [art] PUB.Y = 710C0408CBA73E01CAB419A3C1629BCAB25BC7E5593734AAF033457CE77FBC37C9EBFD2E9449FC66464C1E5B037E961E
31,680,346 UART: [art] SIG.R = 39359B1D0C7B89BB6478DBDCC792D69C942796BEC63413613799AA702E29C6AAB5ACD75F939FBDCA8D26A15DD9DEAB02
31,687,783 UART: [art] SIG.S = F79079E7AC7D0D760537537DE8B143D3575F2EF0E199E2C3869C2C558D471E124E316D444D74F92A65153D39111E909A
32,992,275 UART: Caliptra RT
32,992,989 UART: [state] CFI Enabled
33,153,112 UART: [rt] RT listening for mailbox commands...
33,155,535 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,185,522 UART: [rt]cmd =0x54514754, len=24
33,188,238 >>> mbox cmd response data (8 bytes)
35,312,085 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,265,129 >>> mbox cmd response: success
43,265,598 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,299,991 UART:
43,300,316 UART: Running Caliptra FMC ...
43,301,359 UART:
43,301,511 UART: [state] CFI Enabled
43,400,753 UART: [art] Extend RT PCRs Done
43,401,941 UART: [art] Lock RT PCRs Done
43,403,363 UART: [art] Populate DV Done
43,408,944 UART: [fht] FMC Alias Private Key: 7
43,410,441 UART: [art] Derive CDI
43,411,188 UART: [art] Store in in slot 0x4
43,469,598 UART: [art] Derive Key Pair
43,470,632 UART: [art] Store priv key in slot 0x5
46,763,352 UART: [art] Derive Key Pair - Done
46,776,200 UART: [art] Signing Cert with AUTHO
46,777,523 UART: RITY.KEYID = 7
49,064,646 UART: [art] Erasing AUTHORITY.KEYID = 7
49,066,155 UART: [art] PUB.X = 71AA9939FF2A8AF475722977EA49EF782F14EFE44A098DFB67ECDF4D13D9811D1C45D4A406E8FCE1009CAFA1E6F94FF6
49,073,434 UART: [art] PUB.Y = 09215955AFE67299D38FEF27FB206619153D5CC3D61994E571BDA80D74BDCD1DBBADBD92AA3CD7FD8017EC09EF7DED38
49,080,697 UART: [art] SIG.R = CD55F2E41C5ADAB83E79011E38AC7627FA4619CEE9B580C805EE796741E4D6AF77731AFE4D08B923AA8ACF1E28B9ABF4
49,088,119 UART: [art] SIG.S = B1685145E3389FECC55FFF6B269ABCE35869CDD8C6EDC9EFE15886A49907E458622A4447B7798ADC15ED1A12B2CC316E
50,392,083 UART: mbox::rt_entry...
50,393,055 UART: ____ _ _ _ ____ _____
50,395,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,397,260 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,399,128 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,401,057 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,402,919 UART: |_|
50,403,802 UART:
50,686,641 UART: [rt] Runtime listening for mailbox commands...
50,688,734 >>> mbox cmd response data (120 bytes)
52,810,241 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,771,598 >>> mbox cmd response: success
60,772,087 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,805,191 UART:
60,805,504 UART: Running Caliptra FMC ...
60,806,545 UART:
60,806,699 UART: [state] CFI Enabled
60,908,459 UART: [art] Extend RT PCRs Done
60,909,644 UART: [art] Lock RT PCRs Done
60,910,864 UART: [art] Populate DV Done
60,916,279 UART: [fht] FMC Alias Private Key: 7
60,917,769 UART: [art] Derive CDI
60,918,555 UART: [art] Store in in slot 0x4
60,978,340 UART: [art] Derive Key Pair
60,979,379 UART: [art] Store priv key in slot 0x5
64,271,820 UART: [art] Derive Key Pair - Done
64,284,871 UART: [art] Signing Cert with AUTHO
64,286,174 UART: RITY.KEYID = 7
66,573,492 UART: [art] Erasing AUTHORITY.KEYID = 7
66,574,990 UART: [art] PUB.X = 6DA5250D926B01C1C3A6C17FD4223A4FE93DF04230739AD609CB4FBC36F74E014B783ABD6E3095C6068828794B054BF3
66,582,212 UART: [art] PUB.Y = 0F946E5C129F549D3F8B1026CCD06DB74C60A3A604ED15F7D0075B0E24D27C538C887D8B9A1F92C5FD7830092DDCBB1D
66,589,469 UART: [art] SIG.R = 31082ECBBF2BEF412098DD196AD708CB3702F82B659A3CEA88B752E68144F3053343318DC7F9046956F248079A7F49C4
66,596,837 UART: [art] SIG.S = 2B6F066FD1E7B84A256FE9D8A583105A3EFB354A47D1D8F39038736537A690DB7CC427C4317E0307B369FB4A1A40D3A3
67,902,213 UART: mbox::rt_entry...
67,903,183 UART: ____ _ _ _ ____ _____
67,905,173 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,907,177 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,909,067 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,911,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,912,908 UART: |_|
67,913,950 UART:
68,198,389 UART: [rt] Runtime listening for mailbox commands...
68,200,512 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,444 UART:
192,821 UART: Running Caliptra ROM ...
193,941 UART:
603,789 UART: [state] CFI Enabled
620,282 UART: [state] LifecycleState = Unprovisioned
622,231 UART: [state] DebugLocked = No
625,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,778 UART: [kat] SHA2-256
800,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,106 UART: [kat] ++
811,553 UART: [kat] sha1
821,567 UART: [kat] SHA2-256
824,278 UART: [kat] SHA2-384
829,712 UART: [kat] SHA2-512-ACC
832,043 UART: [kat] ECC-384
3,116,376 UART: [kat] HMAC-384Kdf
3,128,962 UART: [kat] LMS
4,319,109 UART: [kat] --
4,321,492 UART: [cold-reset] ++
4,323,424 UART: [fht] Storing FHT @ 0x50003400
4,335,535 UART: [idev] ++
4,336,099 UART: [idev] CDI.KEYID = 6
4,337,048 UART: [idev] SUBJECT.KEYID = 7
4,338,288 UART: [idev] UDS.KEYID = 0
4,339,237 ready_for_fw is high
4,339,444 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,763 UART: [idev] Erasing UDS.KEYID = 0
7,626,613 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,704 UART: [idev] --
7,652,124 UART: [ldev] ++
7,652,687 UART: [ldev] CDI.KEYID = 6
7,653,655 UART: [ldev] SUBJECT.KEYID = 5
7,654,866 UART: [ldev] AUTHORITY.KEYID = 7
7,656,145 UART: [ldev] FE.KEYID = 1
7,669,864 UART: [ldev] Erasing FE.KEYID = 1
10,953,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,602 UART: [ldev] --
13,314,648 UART: [fwproc] Waiting for Commands...
13,317,980 UART: [fwproc] Received command 0x46574c44
13,320,160 UART: [fwproc] Received Image of size 114124 bytes
17,372,872 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,871 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,841,105 >>> mbox cmd response: success
17,844,721 UART: [afmc] ++
17,845,309 UART: [afmc] CDI.KEYID = 6
17,846,322 UART: [afmc] SUBJECT.KEYID = 7
17,847,474 UART: [afmc] AUTHORITY.KEYID = 5
21,161,363 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,236 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,486 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,906 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,693 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,154 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,566 UART: [afmc] --
23,525,966 UART: [cold-reset] --
23,528,631 UART: [state] Locking Datavault
23,533,062 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,761 UART: [state] Locking ICCM
23,537,284 UART: [exit] Launching FMC @ 0x40000130
23,545,696 UART:
23,545,977 UART: Running Caliptra FMC ...
23,547,084 UART:
23,547,246 UART: [state] CFI Enabled
23,555,505 UART: [fht] FMC Alias Private Key: 7
25,886,860 UART: [art] Extend RT PCRs Done
25,888,074 UART: [art] Lock RT PCRs Done
25,889,751 UART: [art] Populate DV Done
25,895,377 UART: [fht] FMC Alias Private Key: 7
25,896,987 UART: [art] Derive CDI
25,897,796 UART: [art] Store in in slot 0x4
25,940,763 UART: [art] Derive Key Pair
25,941,758 UART: [art] Store priv key in slot 0x5
29,183,130 UART: [art] Derive Key Pair - Done
29,196,504 UART: [art] Signing Cert with AUTHO
29,197,802 UART: RITY.KEYID = 7
31,477,163 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,661 UART: [art] PUB.X = 74467679F2FB7B7AB8FD9A72BF86DD55F215FF37437F77480384C539C2D8CB00A1004BB11A1C28DBDBE8690E8D4D6F6D
31,485,889 UART: [art] PUB.Y = 9693861BAB5DB679789235BF022D246445DC99637B7C8FEC7C2E34726C79F3DB0651A97371FCECC91DE99A9AFF81338B
31,493,152 UART: [art] SIG.R = 72A389B4E4CB047EC9A7DCB2F303027DFEA58FC18E2FB4096DAA2222E541F0E2BFEBE43FE193D77124B6A1702ED9EB14
31,500,578 UART: [art] SIG.S = 802A5AB387CB8646D846C220631E8AFDD9E364EFF877C6C44455EBC2E9D15A5C310C050191B331D949736041A102DE04
32,805,673 UART: Caliptra RT
32,806,370 UART: [state] CFI Enabled
32,924,140 UART: [rt] RT listening for mailbox commands...
32,926,515 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,956,934 UART: [rt]cmd =0x54514754, len=24
32,959,527 >>> mbox cmd response data (8 bytes)
35,008,557 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
35,109,602 UART:
35,109,973 UART: Running Caliptra ROM ...
35,111,109 UART:
35,111,273 UART: [state] CFI Enabled
35,125,754 UART: [state] LifecycleState = Unprovisioned
35,127,638 UART: [state] DebugLocked = No
35,129,148 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,134,732 UART: [kat] SHA2-256
35,304,452 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,314,992 UART: [kat] ++
35,315,446 UART: [kat] sha1
35,327,082 UART: [kat] SHA2-256
35,329,776 UART: [kat] SHA2-384
35,335,435 UART: [kat] SHA2-512-ACC
35,337,831 UART: [kat] ECC-384
37,619,511 UART: [kat] HMAC-384Kdf
37,630,449 UART: [kat] LMS
38,820,533 UART: [kat] --
38,824,296 UART: [update-reset] ++
42,526,953 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,530,454 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
42,788,821 >>> mbox cmd response: success
42,789,203 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,790,026 UART: [update-reset] Copying MAN_2 To MAN_1
42,812,463 UART: [update-reset Success] --
42,816,446 UART: [state] Locking Datavault
42,820,883 UART: [state] Locking PCR0, PCR1 and PCR31
42,822,577 UART: [state] Locking ICCM
42,823,780 UART: [exit] Launching FMC @ 0x40000130
42,832,244 UART:
42,832,492 UART: Running Caliptra FMC ...
42,833,589 UART:
42,833,741 UART: [state] CFI Enabled
42,877,849 UART: [art] Extend RT PCRs Done
42,878,989 UART: [art] Lock RT PCRs Done
42,880,160 UART: [art] Populate DV Done
42,885,664 UART: [fht] FMC Alias Private Key: 7
42,887,235 UART: [art] Derive CDI
42,887,965 UART: [art] Store in in slot 0x4
42,930,874 UART: [art] Derive Key Pair
42,931,912 UART: [art] Store priv key in slot 0x5
46,173,553 UART: [art] Derive Key Pair - Done
46,186,435 UART: [art] Signing Cert with AUTHO
46,187,769 UART: RITY.KEYID = 7
48,467,057 UART: [art] Erasing AUTHORITY.KEYID = 7
48,468,555 UART: [art] PUB.X = C2194F55F63171AB0312026A06371B53EA7CA2D266EE75EA354AD014A947950A759B70E58DA35BF2475CED65AB8E84C2
48,475,853 UART: [art] PUB.Y = 92C4E053444C7B896E6D8331A63264F16AE6D15F432B4A1C6CD25D796538F31E4D7892991FE0962F70D6DC9991424FDA
48,483,073 UART: [art] SIG.R = 868351DB72CA420825EF3D5CD6A134E05830072C9661FF1F45F3C29710B988195C3C3E62F5E3F04FF8D7A492266BFC51
48,490,399 UART: [art] SIG.S = BA048D85B61F50B4224ABF0D1FE0088E47F6234A05DB93F336E08CBFB1F57EF045B22CE20013C1D31EBA2E161564E588
49,794,964 UART: mbox::rt_entry...
49,795,932 UART: ____ _ _ _ ____ _____
49,797,912 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,799,916 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,801,842 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,803,769 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,805,612 UART: |_|
49,806,402 UART:
50,088,481 UART: [rt] Runtime listening for mailbox commands...
50,090,596 >>> mbox cmd response data (120 bytes)
52,135,976 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
52,235,981 UART:
52,236,380 UART: Running Caliptra ROM ...
52,237,427 UART:
52,237,630 UART: [state] CFI Enabled
52,251,094 UART: [state] LifecycleState = Unprovisioned
52,253,053 UART: [state] DebugLocked = No
52,255,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,259,652 UART: [kat] SHA2-256
52,429,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,439,874 UART: [kat] ++
52,440,329 UART: [kat] sha1
52,451,319 UART: [kat] SHA2-256
52,454,059 UART: [kat] SHA2-384
52,460,691 UART: [kat] SHA2-512-ACC
52,463,045 UART: [kat] ECC-384
54,750,451 UART: [kat] HMAC-384Kdf
54,763,377 UART: [kat] LMS
55,953,451 UART: [kat] --
55,956,331 UART: [update-reset] ++
59,655,406 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,658,960 UART: [update-reset] Loading Runtime at address 0x40005000 len 54036
59,917,384 >>> mbox cmd response: success
59,917,809 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
59,918,904 UART: [update-reset] Copying MAN_2 To MAN_1
59,941,344 UART: [update-reset Success] --
59,946,729 UART: [state] Locking Datavault
59,950,027 UART: [state] Locking PCR0, PCR1 and PCR31
59,951,790 UART: [state] Locking ICCM
59,953,455 UART: [exit] Launching FMC @ 0x40000130
59,961,901 UART:
59,962,136 UART: Running Caliptra FMC ...
59,963,232 UART:
59,963,386 UART: [state] CFI Enabled
60,007,446 UART: [art] Extend RT PCRs Done
60,008,592 UART: [art] Lock RT PCRs Done
60,010,254 UART: [art] Populate DV Done
60,015,651 UART: [fht] FMC Alias Private Key: 7
60,017,344 UART: [art] Derive CDI
60,018,149 UART: [art] Store in in slot 0x4
60,060,816 UART: [art] Derive Key Pair
60,061,881 UART: [art] Store priv key in slot 0x5
63,303,026 UART: [art] Derive Key Pair - Done
63,316,017 UART: [art] Signing Cert with AUTHO
63,317,345 UART: RITY.KEYID = 7
65,596,644 UART: [art] Erasing AUTHORITY.KEYID = 7
65,598,146 UART: [art] PUB.X = EB14C5C7B7B9C42A55306B6F9296AA04721561E191C8EBC6D8F173AB4E71D1E9C8C390962709008571D2D3948BF29F44
65,605,379 UART: [art] PUB.Y = F0465F7F41C4C8099F9302FEDABB8E5AC2BA6B70A5944610C8CAE3C65FE56B7780F49E226B5E2909E88C3924D5C1E746
65,612,660 UART: [art] SIG.R = BB9404F3BA1D6BEB47B5BF6771CB17CAFC156B66B52A9C2AED73B89665E1060D370E1877D470CD55F72A18B9A0476209
65,620,045 UART: [art] SIG.S = C7966A39E18E6159968E9E44ADDFD3BC5D665D676DFC05A0DA53E0B9D0C9900D11AFF07FCDD7F650792728D80D2EC52E
66,924,660 UART: mbox::rt_entry...
66,925,617 UART: ____ _ _ _ ____ _____
66,927,592 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,929,590 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,931,510 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,933,431 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,935,352 UART: |_|
66,936,149 UART:
67,221,864 UART: [rt] Runtime listening for mailbox commands...
67,223,986 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,339 writing to cptra_bootfsm_go
4,134,041 ready_for_fw is high
4,134,413 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,087,749 >>> mbox cmd response: success
23,728,680 UART:
23,729,079 UART: Running Caliptra FMC ...
23,730,280 UART:
23,730,445 UART: [state] CFI Enabled
23,738,232 UART: [fht] FMC Alias Private Key: 7
26,068,996 UART: [art] Extend RT PCRs Done
26,070,225 UART: [art] Lock RT PCRs Done
26,071,905 UART: [art] Populate DV Done
26,077,494 UART: [fht] FMC Alias Private Key: 7
26,079,141 UART: [art] Derive CDI
26,079,949 UART: [art] Store in in slot 0x4
26,122,768 UART: [art] Derive Key Pair
26,123,810 UART: [art] Store priv key in slot 0x5
29,366,019 UART: [art] Derive Key Pair - Done
29,378,937 UART: [art] Signing Cert with AUTHO
29,380,247 UART: RITY.KEYID = 7
31,659,748 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,253 UART: [art] PUB.X = 54634380D0007FB1BD57D5AB82E4E693F9F4488F6D97EFEC0D6A3C98CBBBB2B012E6CF93360397756DC7B782B9C6AFCA
31,668,482 UART: [art] PUB.Y = 6893E502357C01391EEABE3C9CEECCC6B8A8C76D3AF2319E7A9C2229592CD2C0EEBB734F92867870C9C389F2AA420BF3
31,675,784 UART: [art] SIG.R = 3DBCC8FD7A5197AF180F779F0B42581E3E34EC824439104FAAA0414194AA4F45033F1B64A75820F1F07750104A6DA323
31,683,216 UART: [art] SIG.S = E3DEBE29AEE081DF6FADD789F25072CAC3FF015AE64CE8EC69318B71E2207783A51EA46398267157B04695EDCF3838B1
32,988,793 UART: Caliptra RT
32,989,493 UART: [state] CFI Enabled
33,107,040 UART: [rt] RT listening for mailbox commands...
33,109,440 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,139,334 UART: [rt]cmd =0x54514754, len=24
33,142,175 >>> mbox cmd response data (8 bytes)
35,190,046 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
43,083,976 >>> mbox cmd response: success
43,084,443 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,119,897 UART:
43,120,193 UART: Running Caliptra FMC ...
43,121,315 UART:
43,121,710 UART: [state] CFI Enabled
43,165,451 UART: [art] Extend RT PCRs Done
43,166,608 UART: [art] Lock RT PCRs Done
43,168,099 UART: [art] Populate DV Done
43,173,405 UART: [fht] FMC Alias Private Key: 7
43,174,878 UART: [art] Derive CDI
43,175,634 UART: [art] Store in in slot 0x4
43,218,077 UART: [art] Derive Key Pair
43,219,121 UART: [art] Store priv key in slot 0x5
46,461,048 UART: [art] Derive Key Pair - Done
46,474,060 UART: [art] Signing Cert with AUTHO
46,475,368 UART: RITY.KEYID = 7
48,754,744 UART: [art] Erasing AUTHORITY.KEYID = 7
48,756,248 UART: [art] PUB.X = 5F73786F2CC81FCDE0DE6A3275BE8F54EB4BE2E0C3BF69F1CEACEF1B47AA9F5DC4A1022221BE1E748C58CF1418542DA9
48,763,496 UART: [art] PUB.Y = 74B95405E0745DECB117B18FB6079B7420B5498112F6F2E3A2B15400F4362EC505783BBD18BA4430566D182E213AB949
48,770,714 UART: [art] SIG.R = 6B5E1C1AE2F11342EF94B5DE399C3E76BD9B98B269958F9DB9F4422109003F633AE2E0802FCD9F6C2651CFFC6B11E51C
48,778,124 UART: [art] SIG.S = 2E69AEB27ECF41AC83C503EF8B84AEFA5FE122EDE6C7D17CACEFC5C6C92043DD593F692AAA370718C9EAA02EBBE712A3
50,082,761 UART: mbox::rt_entry...
50,083,732 UART: ____ _ _ _ ____ _____
50,085,667 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,087,670 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,089,521 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,091,438 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,093,318 UART: |_|
50,094,138 UART:
50,379,877 UART: [rt] Runtime listening for mailbox commands...
50,382,005 >>> mbox cmd response data (120 bytes)
52,427,895 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
60,329,267 >>> mbox cmd response: success
60,329,808 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,362,188 UART:
60,362,460 UART: Running Caliptra FMC ...
60,363,489 UART:
60,363,630 UART: [state] CFI Enabled
60,408,222 UART: [art] Extend RT PCRs Done
60,409,418 UART: [art] Lock RT PCRs Done
60,410,898 UART: [art] Populate DV Done
60,416,357 UART: [fht] FMC Alias Private Key: 7
60,417,892 UART: [art] Derive CDI
60,418,619 UART: [art] Store in in slot 0x4
60,461,577 UART: [art] Derive Key Pair
60,462,571 UART: [art] Store priv key in slot 0x5
63,704,758 UART: [art] Derive Key Pair - Done
63,717,971 UART: [art] Signing Cert with AUTHO
63,719,294 UART: RITY.KEYID = 7
65,998,638 UART: [art] Erasing AUTHORITY.KEYID = 7
66,000,151 UART: [art] PUB.X = E8CFF85927C915460934C74FCBD504173BBD4AA5AA04DBBEA8258141A078CE899F5B15E3DE91C29E4DB6AD93F7E4D186
66,007,437 UART: [art] PUB.Y = EEBD4E5F4743B6C8FAE7830627F1FD8C7D32F1D0BA69C2BB206986949801B5C98A3111583748A690CE028FBD56C9294B
66,014,629 UART: [art] SIG.R = 8E05777472189CED844C51100CE80884C421AABFA5D2C8F6ED90C634A8A7BDED59EEE999D4B5709DB31C1DFE34C84917
66,022,019 UART: [art] SIG.S = A334F3F13856D9A26B3676CCFE50C01F16706A2902F11C54C23B658DF0D3844654F3CB955C0DD80D209F4F20C459E756
67,326,734 UART: mbox::rt_entry...
67,327,699 UART: ____ _ _ _ ____ _____
67,329,631 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,331,633 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,333,484 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,335,402 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,337,247 UART: |_|
67,338,121 UART:
67,625,488 UART: [rt] Runtime listening for mailbox commands...
67,627,613 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,113 UART:
192,488 UART: Running Caliptra ROM ...
193,630 UART:
193,778 UART: [state] CFI Enabled
265,676 UART: [state] LifecycleState = Unprovisioned
267,592 UART: [state] DebugLocked = No
270,054 UART: [state] WD Timer not started. Device not locked for debugging
273,943 UART: [kat] SHA2-256
453,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,653 UART: [kat] ++
465,187 UART: [kat] sha1
476,991 UART: [kat] SHA2-256
479,995 UART: [kat] SHA2-384
486,267 UART: [kat] SHA2-512-ACC
489,291 UART: [kat] ECC-384
2,949,115 UART: [kat] HMAC-384Kdf
2,973,101 UART: [kat] LMS
3,502,553 UART: [kat] --
3,508,819 UART: [cold-reset] ++
3,510,110 UART: [fht] FHT @ 0x50003400
3,519,665 UART: [idev] ++
3,520,234 UART: [idev] CDI.KEYID = 6
3,521,147 UART: [idev] SUBJECT.KEYID = 7
3,522,320 UART: [idev] UDS.KEYID = 0
3,523,313 ready_for_fw is high
3,523,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,432 UART: [idev] Erasing UDS.KEYID = 0
6,027,736 UART: [idev] Sha1 KeyId Algorithm
6,051,133 UART: [idev] --
6,054,473 UART: [ldev] ++
6,055,076 UART: [ldev] CDI.KEYID = 6
6,055,970 UART: [ldev] SUBJECT.KEYID = 5
6,057,133 UART: [ldev] AUTHORITY.KEYID = 7
6,058,421 UART: [ldev] FE.KEYID = 1
6,102,185 UART: [ldev] Erasing FE.KEYID = 1
8,606,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,726 UART: [ldev] --
10,412,584 UART: [fwproc] Wait for Commands...
10,414,766 UART: [fwproc] Recv command 0x46574c44
10,416,871 UART: [fwproc] Recv'd Img size: 114448 bytes
13,820,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,376 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,273,012 >>> mbox cmd response: success
14,277,389 UART: [afmc] ++
14,277,988 UART: [afmc] CDI.KEYID = 6
14,278,879 UART: [afmc] SUBJECT.KEYID = 7
14,280,094 UART: [afmc] AUTHORITY.KEYID = 5
16,804,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,365 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,345 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,349 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,458 UART: [afmc] --
18,610,433 UART: [cold-reset] --
18,614,293 UART: [state] Locking Datavault
18,619,923 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,589 UART: [state] Locking ICCM
18,622,612 UART: [exit] Launching FMC @ 0x40000130
18,631,011 UART:
18,631,247 UART: Running Caliptra FMC ...
18,632,348 UART:
18,632,519 UART: [state] CFI Enabled
18,695,796 UART: [fht] FMC Alias Private Key: 7
20,459,924 UART: [art] Extend RT PCRs Done
20,461,539 UART: [art] Lock RT PCRs Done
20,462,554 UART: [art] Populate DV Done
20,468,258 UART: [fht] FMC Alias Private Key: 7
20,469,793 UART: [art] Derive CDI
20,470,608 UART: [art] Store in in slot 0x4
20,527,987 UART: [art] Derive Key Pair
20,529,027 UART: [art] Store priv key in slot 0x5
22,992,212 UART: [art] Derive Key Pair - Done
23,004,895 UART: [art] Signing Cert with AUTHO
23,006,209 UART: RITY.KEYID = 7
24,717,972 UART: [art] Erasing AUTHORITY.KEYID = 7
24,719,474 UART: [art] PUB.X = C5C0349190D07858AA2A48E40B05405CD0CAE1B69053B68CDFBD4A64CD62F47919EA3F042CFED576CAA4428798BD228A
24,726,727 UART: [art] PUB.Y = 3696BFEC7EFE1681185DF8E811A2DAB8B137CD1178FA31E869EDA1C2DDCB689ED074C02C9599A588E7044A5C96437553
24,734,047 UART: [art] SIG.R = 54A58578AC043702F1C5E5B13104A2481057652B1172BA65AF159FE9EA2D84AA068F18688D4C0C069512148BDE5E2223
24,741,412 UART: [art] SIG.S = F2D7F21BA698974614EAD2E1AB8A8DDD1A997CBE0794BA900CDD59F88772D9CBE495377B39FFB27C9CB38D7441066E01
25,720,278 UART: Caliptra RT
25,720,983 UART: [state] CFI Enabled
25,885,966 UART: [rt] RT listening for mailbox commands...
25,888,186 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,918,405 UART: [rt]cmd =0x54514754, len=24
25,921,083 >>> mbox cmd response data (8 bytes)
27,971,153 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,072,166 UART:
28,072,522 UART: Running Caliptra ROM ...
28,073,572 UART:
28,073,739 UART: [state] CFI Enabled
28,131,405 UART: [state] LifecycleState = Unprovisioned
28,133,287 UART: [state] DebugLocked = No
28,135,079 UART: [state] WD Timer not started. Device not locked for debugging
28,138,931 UART: [kat] SHA2-256
28,318,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,329,617 UART: [kat] ++
28,330,070 UART: [kat] sha1
28,341,980 UART: [kat] SHA2-256
28,344,975 UART: [kat] SHA2-384
28,350,048 UART: [kat] SHA2-512-ACC
28,353,010 UART: [kat] ECC-384
30,813,701 UART: [kat] HMAC-384Kdf
30,836,095 UART: [kat] LMS
31,365,556 UART: [kat] --
31,370,675 UART: [update-reset] ++
34,364,967 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,369,096 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,627,267 >>> mbox cmd response: success
34,627,642 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,628,256 UART: [update-reset] Copying MAN_2 To MAN_1
34,650,584 UART: [update-reset Success] --
34,654,872 UART: [state] Locking Datavault
34,658,289 UART: [state] Locking PCR0, PCR1 and PCR31
34,659,953 UART: [state] Locking ICCM
34,661,081 UART: [exit] Launching FMC @ 0x40000130
34,669,531 UART:
34,669,783 UART: Running Caliptra FMC ...
34,670,883 UART:
34,671,044 UART: [state] CFI Enabled
34,772,418 UART: [art] Extend RT PCRs Done
34,773,586 UART: [art] Lock RT PCRs Done
34,775,144 UART: [art] Populate DV Done
34,780,436 UART: [fht] FMC Alias Private Key: 7
34,782,129 UART: [art] Derive CDI
34,782,938 UART: [art] Store in in slot 0x4
34,841,832 UART: [art] Derive Key Pair
34,842,858 UART: [art] Store priv key in slot 0x5
37,305,603 UART: [art] Derive Key Pair - Done
37,318,378 UART: [art] Signing Cert with AUTHO
37,319,678 UART: RITY.KEYID = 7
39,031,561 UART: [art] Erasing AUTHORITY.KEYID = 7
39,033,063 UART: [art] PUB.X = 9058A989DB494097F0522DC28D155E33D62B6D06C1A4D464B5FF7F8144F3E0B21E4FF52BD31D9891EE6347411358DDED
39,040,351 UART: [art] PUB.Y = 147798458149357BDB9259166406F272DF9E7230C814482DD7785BB46DBB6E9B440158365DB098EF7AEF91C171E14FFE
39,047,599 UART: [art] SIG.R = E8F455879F02594399C4B3DDBBD49667434353F63102FCDF4D0356C53AF1E94C363251F81304A2B765824DF4D6805FDF
39,054,977 UART: [art] SIG.S = 9C9C78570CCAF325FD6DD2D1AF684C37D382A007E186BFC61FC74E32E0B171CE67620463EB77764022D383F6207F84D9
40,034,435 UART: mbox::rt_entry...
40,035,380 UART: ____ _ _ _ ____ _____
40,037,357 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,039,360 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,041,294 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,043,224 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,045,152 UART: |_|
40,045,995 UART:
40,329,782 UART: [rt] Runtime listening for mailbox commands...
40,331,920 >>> mbox cmd response data (120 bytes)
42,377,351 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,477,245 UART:
42,477,601 UART: Running Caliptra ROM ...
42,478,732 UART:
42,478,899 UART: [state] CFI Enabled
42,547,467 UART: [state] LifecycleState = Unprovisioned
42,549,346 UART: [state] DebugLocked = No
42,551,651 UART: [state] WD Timer not started. Device not locked for debugging
42,555,443 UART: [kat] SHA2-256
42,734,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,746,168 UART: [kat] ++
42,746,706 UART: [kat] sha1
42,758,032 UART: [kat] SHA2-256
42,761,052 UART: [kat] SHA2-384
42,768,009 UART: [kat] SHA2-512-ACC
42,770,917 UART: [kat] ECC-384
45,232,411 UART: [kat] HMAC-384Kdf
45,259,186 UART: [kat] LMS
45,788,607 UART: [kat] --
45,794,071 UART: [update-reset] ++
48,793,512 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,796,997 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
49,055,221 >>> mbox cmd response: success
49,055,615 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,056,718 UART: [update-reset] Copying MAN_2 To MAN_1
49,079,045 UART: [update-reset Success] --
49,083,716 UART: [state] Locking Datavault
49,086,807 UART: [state] Locking PCR0, PCR1 and PCR31
49,088,453 UART: [state] Locking ICCM
49,090,994 UART: [exit] Launching FMC @ 0x40000130
49,099,447 UART:
49,099,704 UART: Running Caliptra FMC ...
49,100,810 UART:
49,100,971 UART: [state] CFI Enabled
49,195,549 UART: [art] Extend RT PCRs Done
49,196,724 UART: [art] Lock RT PCRs Done
49,198,177 UART: [art] Populate DV Done
49,203,637 UART: [fht] FMC Alias Private Key: 7
49,205,168 UART: [art] Derive CDI
49,205,924 UART: [art] Store in in slot 0x4
49,264,272 UART: [art] Derive Key Pair
49,265,299 UART: [art] Store priv key in slot 0x5
51,728,318 UART: [art] Derive Key Pair - Done
51,741,413 UART: [art] Signing Cert with AUTHO
51,742,709 UART: RITY.KEYID = 7
53,454,217 UART: [art] Erasing AUTHORITY.KEYID = 7
53,455,720 UART: [art] PUB.X = 73595A40B7F96923D5CE952C48E302B630A88FF4A64981208E0985BD4C78A65BCBD175B109EDB5AAFC26E278C96B95CA
53,462,998 UART: [art] PUB.Y = E92554CA63B68D18F054B0258ACD829593BB4CE87A7C6A89091AFD99F5C00176D42425A84B9DA05C33EC022181B13A09
53,470,292 UART: [art] SIG.R = 188E28C257E15CEE6F441896C7828D671E6F3CAC7DC98DB89FB25A9E3FFD7DED5A629472A02165D1F8C5074A08688EF0
53,477,632 UART: [art] SIG.S = F8486063109B86934498A19D74F92ADBB069C1DE9746B2E3A9F136FA27E0845D9F0F8D0D8450392E53573D84BA39FC1B
54,456,023 UART: mbox::rt_entry...
54,456,960 UART: ____ _ _ _ ____ _____
54,458,939 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,460,942 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,462,870 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,464,799 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,466,649 UART: |_|
54,467,451 UART:
54,754,152 UART: [rt] Runtime listening for mailbox commands...
54,756,293 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,362,615 ready_for_fw is high
3,363,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,054,501 >>> mbox cmd response: success
18,343,994 UART:
18,344,390 UART: Running Caliptra FMC ...
18,345,503 UART:
18,345,658 UART: [state] CFI Enabled
18,412,353 UART: [fht] FMC Alias Private Key: 7
20,176,424 UART: [art] Extend RT PCRs Done
20,177,643 UART: [art] Lock RT PCRs Done
20,179,298 UART: [art] Populate DV Done
20,184,773 UART: [fht] FMC Alias Private Key: 7
20,186,304 UART: [art] Derive CDI
20,187,049 UART: [art] Store in in slot 0x4
20,244,799 UART: [art] Derive Key Pair
20,245,798 UART: [art] Store priv key in slot 0x5
22,709,131 UART: [art] Derive Key Pair - Done
22,721,857 UART: [art] Signing Cert with AUTHO
22,723,154 UART: RITY.KEYID = 7
24,434,509 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,014 UART: [art] PUB.X = 8ED5C1E505B6B7950D92F15B9A4DA8FCA4125D04353EBFD7946CD0CA549EB5ABB104B8AAFD3A181E765196708AFC0806
24,443,321 UART: [art] PUB.Y = 815D5FC73DF669BAA72030FB6CA4F56AC0369A2F5891A4CD4D4A1FC917E9C9C4EB4BC9B66F3BCB826DF7670FC0C69BA5
24,450,625 UART: [art] SIG.R = 981AF2420EA0C99948D71741B0ED65016EACB6240D080785DEB18370FBD94769EA570224111C4A1AFB67523AD6E5A41E
24,458,018 UART: [art] SIG.S = 826C6B94B6FF33CC01D952E6B4AA201EEC49447EA3705EF0E6977B0E0D72950CA9AB5EF14491B6383473792E649197F0
25,437,485 UART: Caliptra RT
25,438,194 UART: [state] CFI Enabled
25,603,426 UART: [rt] RT listening for mailbox commands...
25,605,758 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,636,449 UART: [rt]cmd =0x54514754, len=24
25,639,091 >>> mbox cmd response data (8 bytes)
27,691,255 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,206,436 >>> mbox cmd response: success
34,207,118 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,242,137 UART:
34,242,434 UART: Running Caliptra FMC ...
34,243,472 UART:
34,243,644 UART: [state] CFI Enabled
34,343,114 UART: [art] Extend RT PCRs Done
34,344,317 UART: [art] Lock RT PCRs Done
34,345,806 UART: [art] Populate DV Done
34,351,057 UART: [fht] FMC Alias Private Key: 7
34,352,703 UART: [art] Derive CDI
34,353,441 UART: [art] Store in in slot 0x4
34,411,918 UART: [art] Derive Key Pair
34,412,915 UART: [art] Store priv key in slot 0x5
36,875,532 UART: [art] Derive Key Pair - Done
36,888,262 UART: [art] Signing Cert with AUTHO
36,889,575 UART: RITY.KEYID = 7
38,600,672 UART: [art] Erasing AUTHORITY.KEYID = 7
38,602,171 UART: [art] PUB.X = E92C4D4841F48E8D86CC7B3D2ED4532C8458A4AED96C07A3AE9A4B0819F7A06B402D15868F044F39E31B71A4C0F40F31
38,609,409 UART: [art] PUB.Y = 81075D3C4C6594516D2595E95021970CAD308A43F12ED6899376D17D4CB85EA9DE3BE03CCCC84A30DF25E1048B07EA85
38,616,682 UART: [art] SIG.R = C61481AF9DC4AFAD4B628B0D44FD695EF39C561DDB9B177C2E2D955B11A6CB1FCB9F60EB887B2C2FBCEE21F4B077CB8D
38,624,152 UART: [art] SIG.S = 1DA35288B34256E38B4B798AF578F7574DAEEA8A4D7D323613890C61E2F05A806D71E724A1C199DA8493A6F67F8142CD
39,602,380 UART: mbox::rt_entry...
39,603,321 UART: ____ _ _ _ ____ _____
39,605,251 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,607,258 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,609,137 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,611,063 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,612,922 UART: |_|
39,613,802 UART:
39,891,801 UART: [rt] Runtime listening for mailbox commands...
39,893,981 >>> mbox cmd response data (120 bytes)
41,943,974 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,487,870 >>> mbox cmd response: success
48,488,369 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,522,802 UART:
48,523,117 UART: Running Caliptra FMC ...
48,524,160 UART:
48,524,312 UART: [state] CFI Enabled
48,610,406 UART: [art] Extend RT PCRs Done
48,611,595 UART: [art] Lock RT PCRs Done
48,612,864 UART: [art] Populate DV Done
48,618,324 UART: [fht] FMC Alias Private Key: 7
48,620,071 UART: [art] Derive CDI
48,620,814 UART: [art] Store in in slot 0x4
48,679,940 UART: [art] Derive Key Pair
48,680,976 UART: [art] Store priv key in slot 0x5
51,143,913 UART: [art] Derive Key Pair - Done
51,156,900 UART: [art] Signing Cert with AUTHO
51,158,219 UART: RITY.KEYID = 7
52,869,244 UART: [art] Erasing AUTHORITY.KEYID = 7
52,870,757 UART: [art] PUB.X = 834A60E6C3A8FCC1BF9126A83710A68B1C4D7421271A937656E4042828801CE6FACDE0A811FA2A2E383546358EDF17A5
52,878,003 UART: [art] PUB.Y = 3F8D8569AF00DACC28A0D89767E1E226422574E9518EE50CBF1FA5347F371B00905B8F35AB62D059C6D8C4322B8A13BE
52,885,242 UART: [art] SIG.R = 57228CE9E8763BEC96F53CED75866857E7F0267C92916B3B89975A083CAD9F5FBA0C9946E29427D18C86995BC4EFA74B
52,892,632 UART: [art] SIG.S = FC687B85F37968FD2845E67E798A35A530BA409C40415B9A995F8236EE00972B38B5744F8DC37F75B03E7EAF8C0545A8
53,871,099 UART: mbox::rt_entry...
53,872,038 UART: ____ _ _ _ ____ _____
53,873,972 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,875,973 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,877,833 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,879,756 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,881,652 UART: |_|
53,882,535 UART:
54,165,203 UART: [rt] Runtime listening for mailbox commands...
54,167,317 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
192,360 UART:
192,764 UART: Running Caliptra ROM ...
193,871 UART:
603,435 UART: [state] CFI Enabled
618,300 UART: [state] LifecycleState = Unprovisioned
620,201 UART: [state] DebugLocked = No
622,937 UART: [state] WD Timer not started. Device not locked for debugging
626,608 UART: [kat] SHA2-256
805,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,308 UART: [kat] ++
817,832 UART: [kat] sha1
829,412 UART: [kat] SHA2-256
832,421 UART: [kat] SHA2-384
839,507 UART: [kat] SHA2-512-ACC
842,518 UART: [kat] ECC-384
3,281,907 UART: [kat] HMAC-384Kdf
3,293,635 UART: [kat] LMS
3,823,088 UART: [kat] --
3,828,142 UART: [cold-reset] ++
3,830,556 UART: [fht] FHT @ 0x50003400
3,842,232 UART: [idev] ++
3,842,810 UART: [idev] CDI.KEYID = 6
3,843,757 UART: [idev] SUBJECT.KEYID = 7
3,844,920 UART: [idev] UDS.KEYID = 0
3,845,885 ready_for_fw is high
3,846,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,792 UART: [idev] Erasing UDS.KEYID = 0
6,317,574 UART: [idev] Sha1 KeyId Algorithm
6,340,634 UART: [idev] --
6,344,620 UART: [ldev] ++
6,345,178 UART: [ldev] CDI.KEYID = 6
6,346,108 UART: [ldev] SUBJECT.KEYID = 5
6,347,306 UART: [ldev] AUTHORITY.KEYID = 7
6,348,526 UART: [ldev] FE.KEYID = 1
6,360,355 UART: [ldev] Erasing FE.KEYID = 1
8,834,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,133 UART: [ldev] --
10,627,005 UART: [fwproc] Wait for Commands...
10,629,254 UART: [fwproc] Recv command 0x46574c44
10,631,334 UART: [fwproc] Recv'd Img size: 114448 bytes
14,045,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,121,790 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,190,588 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,508,436 >>> mbox cmd response: success
14,512,694 UART: [afmc] ++
14,513,306 UART: [afmc] CDI.KEYID = 6
14,514,186 UART: [afmc] SUBJECT.KEYID = 7
14,515,288 UART: [afmc] AUTHORITY.KEYID = 5
17,016,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,738,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,740,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,756,223 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,772,234 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,788,056 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,811,142 UART: [afmc] --
18,814,889 UART: [cold-reset] --
18,819,009 UART: [state] Locking Datavault
18,823,384 UART: [state] Locking PCR0, PCR1 and PCR31
18,825,013 UART: [state] Locking ICCM
18,827,290 UART: [exit] Launching FMC @ 0x40000130
18,835,686 UART:
18,835,964 UART: Running Caliptra FMC ...
18,836,987 UART:
18,837,125 UART: [state] CFI Enabled
18,845,324 UART: [fht] FMC Alias Private Key: 7
20,602,755 UART: [art] Extend RT PCRs Done
20,603,957 UART: [art] Lock RT PCRs Done
20,605,813 UART: [art] Populate DV Done
20,611,538 UART: [fht] FMC Alias Private Key: 7
20,613,175 UART: [art] Derive CDI
20,613,902 UART: [art] Store in in slot 0x4
20,656,808 UART: [art] Derive Key Pair
20,657,796 UART: [art] Store priv key in slot 0x5
23,084,488 UART: [art] Derive Key Pair - Done
23,097,436 UART: [art] Signing Cert with AUTHO
23,098,746 UART: RITY.KEYID = 7
24,804,405 UART: [art] Erasing AUTHORITY.KEYID = 7
24,805,882 UART: [art] PUB.X = 40B543BCD1F68E2599685E75B7E0B69E2F2C763EEB7292A38849EC5AC9D1CBAB28494A0202D0FAD46BCE0E39D7A70314
24,813,173 UART: [art] PUB.Y = 786D7EB0698422AC1A2537391416071BB1BDC9718273755680D7248481487A7E1AEA7D8963DBA871116F8F9E8C99F85F
24,820,437 UART: [art] SIG.R = 5AB204A5B2F94624C54675CEED96D40CE7EDC2C90F7E0B0D5718AEE9468AC9BE761FE51B5254E509B108C2513D07CAA3
24,827,831 UART: [art] SIG.S = FA0A92B8FADD56FE21FA19AF9B00C3068E2DEBBBF34469F92E6E00897710A86B4D5886D7019309EEFF26FBDD0EE58216
25,807,110 UART: Caliptra RT
25,807,818 UART: [state] CFI Enabled
25,924,124 UART: [rt] RT listening for mailbox commands...
25,926,467 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,956,405 UART: [rt]cmd =0x54514754, len=24
25,959,085 >>> mbox cmd response data (8 bytes)
28,008,234 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
28,108,842 UART:
28,109,187 UART: Running Caliptra ROM ...
28,110,318 UART:
28,110,478 UART: [state] CFI Enabled
28,123,650 UART: [state] LifecycleState = Unprovisioned
28,125,553 UART: [state] DebugLocked = No
28,128,184 UART: [state] WD Timer not started. Device not locked for debugging
28,131,599 UART: [kat] SHA2-256
28,310,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,322,381 UART: [kat] ++
28,322,917 UART: [kat] sha1
28,333,583 UART: [kat] SHA2-256
28,336,586 UART: [kat] SHA2-384
28,342,838 UART: [kat] SHA2-512-ACC
28,345,769 UART: [kat] ECC-384
30,787,736 UART: [kat] HMAC-384Kdf
30,800,141 UART: [kat] LMS
31,329,679 UART: [kat] --
31,334,604 UART: [update-reset] ++
34,321,978 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,325,072 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
34,583,248 >>> mbox cmd response: success
34,583,627 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,584,723 UART: [update-reset] Copying MAN_2 To MAN_1
34,607,078 UART: [update-reset Success] --
34,610,647 UART: [state] Locking Datavault
34,614,111 UART: [state] Locking PCR0, PCR1 and PCR31
34,615,748 UART: [state] Locking ICCM
34,617,733 UART: [exit] Launching FMC @ 0x40000130
34,626,177 UART:
34,626,412 UART: Running Caliptra FMC ...
34,627,506 UART:
34,627,653 UART: [state] CFI Enabled
34,671,276 UART: [art] Extend RT PCRs Done
34,672,415 UART: [art] Lock RT PCRs Done
34,673,895 UART: [art] Populate DV Done
34,679,309 UART: [fht] FMC Alias Private Key: 7
34,680,862 UART: [art] Derive CDI
34,681,671 UART: [art] Store in in slot 0x4
34,724,372 UART: [art] Derive Key Pair
34,725,363 UART: [art] Store priv key in slot 0x5
37,151,471 UART: [art] Derive Key Pair - Done
37,164,724 UART: [art] Signing Cert with AUTHO
37,166,047 UART: RITY.KEYID = 7
38,871,310 UART: [art] Erasing AUTHORITY.KEYID = 7
38,872,813 UART: [art] PUB.X = 178DA3984828BED73009AED0A49763EB496464022703F387875019B052D4D9400CFA6668FC433E73F9A331491C026242
38,880,052 UART: [art] PUB.Y = FD45865106DC07CF662B00B03046F97B25E565A03904C569DF81F20984CE23F37D1EBDEDB8225E6093D7FE095CF12950
38,887,283 UART: [art] SIG.R = 6ED892D1B533A1E6EF92C1070B23EA163EB2211CBBF209304CCC6FD17533532A1B5DF8473B8C42B29FDA56427EEC6CCB
38,894,720 UART: [art] SIG.S = F949ACC409EEB3F093BD6AF1A4A16CC5E71E98D518259BEE79DE0DE6D27EA4DCC2A970534AE40B4E2D69E9A209BAFEE0
39,873,875 UART: mbox::rt_entry...
39,874,850 UART: ____ _ _ _ ____ _____
39,876,831 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,878,834 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,880,776 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,882,704 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,884,627 UART: |_|
39,885,428 UART:
40,170,511 UART: [rt] Runtime listening for mailbox commands...
40,172,619 >>> mbox cmd response data (120 bytes)
42,219,277 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
42,319,242 UART:
42,319,609 UART: Running Caliptra ROM ...
42,320,732 UART:
42,320,893 UART: [state] CFI Enabled
42,332,558 UART: [state] LifecycleState = Unprovisioned
42,334,404 UART: [state] DebugLocked = No
42,337,289 UART: [state] WD Timer not started. Device not locked for debugging
42,341,884 UART: [kat] SHA2-256
42,521,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,532,608 UART: [kat] ++
42,533,062 UART: [kat] sha1
42,543,942 UART: [kat] SHA2-256
42,547,010 UART: [kat] SHA2-384
42,552,611 UART: [kat] SHA2-512-ACC
42,555,557 UART: [kat] ECC-384
44,998,420 UART: [kat] HMAC-384Kdf
45,010,273 UART: [kat] LMS
45,539,794 UART: [kat] --
45,542,804 UART: [update-reset] ++
48,550,339 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,554,303 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
48,812,533 >>> mbox cmd response: success
48,812,912 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,813,195 UART: [update-reset] Copying MAN_2 To MAN_1
48,835,092 UART: [update-reset Success] --
48,837,305 UART: [state] Locking Datavault
48,839,966 UART: [state] Locking PCR0, PCR1 and PCR31
48,841,603 UART: [state] Locking ICCM
48,843,857 UART: [exit] Launching FMC @ 0x40000130
48,852,254 UART:
48,852,485 UART: Running Caliptra FMC ...
48,853,577 UART:
48,853,727 UART: [state] CFI Enabled
48,897,783 UART: [art] Extend RT PCRs Done
48,898,914 UART: [art] Lock RT PCRs Done
48,900,189 UART: [art] Populate DV Done
48,905,638 UART: [fht] FMC Alias Private Key: 7
48,907,138 UART: [art] Derive CDI
48,907,946 UART: [art] Store in in slot 0x4
48,950,747 UART: [art] Derive Key Pair
48,951,776 UART: [art] Store priv key in slot 0x5
51,378,614 UART: [art] Derive Key Pair - Done
51,391,565 UART: [art] Signing Cert with AUTHO
51,393,049 UART: RITY.KEYID = 7
53,098,367 UART: [art] Erasing AUTHORITY.KEYID = 7
53,099,868 UART: [art] PUB.X = A693F3BEEC7F4D2288770626ED952B003209C5D0467FB7D88C0C7AFED3C2EB392F5191405E5217E2C6CFE6D7883E027F
53,107,117 UART: [art] PUB.Y = F194C87FFEAAF679C63F45A6C7701F777598E974FEDEAF94644B472EF33AADDD5F7F8909F0768B5A7372438035E32ACD
53,114,394 UART: [art] SIG.R = 13761E20F0E25240122439D5A0D7D33450DD4F8EF05DE9D3614923E82B934621A35BF32F6129A2C5F8F48635AE602F1C
53,121,774 UART: [art] SIG.S = C228CAF2A79057E61FD7067850C45A1B3E47D846C3C7AC7922C9DE5AB96CA9B30EAC70B9E2C8DD85BF11DB4C7EF20EB0
54,099,980 UART: mbox::rt_entry...
54,100,922 UART: ____ _ _ _ ____ _____
54,102,901 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,104,900 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,106,844 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,108,769 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,110,613 UART: |_|
54,111,403 UART:
54,399,684 UART: [rt] Runtime listening for mailbox commands...
54,401,765 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,693,861 ready_for_fw is high
3,694,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,082 >>> mbox cmd response: success
18,518,160 UART:
18,518,545 UART: Running Caliptra FMC ...
18,519,664 UART:
18,519,816 UART: [state] CFI Enabled
18,527,700 UART: [fht] FMC Alias Private Key: 7
20,283,955 UART: [art] Extend RT PCRs Done
20,285,178 UART: [art] Lock RT PCRs Done
20,287,077 UART: [art] Populate DV Done
20,292,701 UART: [fht] FMC Alias Private Key: 7
20,294,337 UART: [art] Derive CDI
20,295,362 UART: [art] Store in in slot 0x4
20,337,782 UART: [art] Derive Key Pair
20,338,783 UART: [art] Store priv key in slot 0x5
22,765,248 UART: [art] Derive Key Pair - Done
22,778,021 UART: [art] Signing Cert with AUTHO
22,779,381 UART: RITY.KEYID = 7
24,484,553 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,047 UART: [art] PUB.X = 4D3BCA67C036F749FEC53FB4BECE4832C0B7F3528D2C624242B570E579431B0CA012A4085EBC968B9D87A56B661CD86F
24,493,357 UART: [art] PUB.Y = 9A9C73CC264B63E801CFB7425B3B4FD434FD1A045F5C49D0CB7BD3D0DBEE139E02D6764FAE4BF99E9DC025DA12BB23EB
24,500,674 UART: [art] SIG.R = 3CB0A0F0113D39704CCE7CBC3934D298D9769FF1C109B59D0C21612218EB88CC249411845F3E0B4D905C14756454A7A4
24,508,042 UART: [art] SIG.S = 5ABCC6D226E1F9265D2535D38E632ECBAFF1AA94DBA3F331B5D7F834FC33D0EBCDD3AC603BDDE28380DA02046F7EF2C4
25,487,519 UART: Caliptra RT
25,488,220 UART: [state] CFI Enabled
25,605,048 UART: [rt] RT listening for mailbox commands...
25,607,253 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,637,221 UART: [rt]cmd =0x54514754, len=24
25,639,870 >>> mbox cmd response data (8 bytes)
27,690,223 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
34,125,913 >>> mbox cmd response: success
34,126,449 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,161,480 UART:
34,161,807 UART: Running Caliptra FMC ...
34,162,937 UART:
34,163,094 UART: [state] CFI Enabled
34,207,326 UART: [art] Extend RT PCRs Done
34,208,468 UART: [art] Lock RT PCRs Done
34,210,143 UART: [art] Populate DV Done
34,215,444 UART: [fht] FMC Alias Private Key: 7
34,217,185 UART: [art] Derive CDI
34,218,000 UART: [art] Store in in slot 0x4
34,260,757 UART: [art] Derive Key Pair
34,261,748 UART: [art] Store priv key in slot 0x5
36,688,747 UART: [art] Derive Key Pair - Done
36,701,600 UART: [art] Signing Cert with AUTHO
36,702,944 UART: RITY.KEYID = 7
38,408,156 UART: [art] Erasing AUTHORITY.KEYID = 7
38,409,646 UART: [art] PUB.X = A3B66DC4C2AC50C1FDA98C976BF23C71E51E39BF9001A8E64294D68208048629D6B542B73AD5BD0706617FD011100AB0
38,416,896 UART: [art] PUB.Y = 4903CAB60A144D67D73BC9DF5D8A7A515B6A8D420B1BA870B9ED514E874B4A18AB1BBE5429879D23E9780E22BBAB2605
38,424,178 UART: [art] SIG.R = 2EAAF6623A488567D907A6268ECAC83DFBC8D0F5193706E4708252D1F35E3E0DEFDB1927BA56B0AEC6A452595D753DE3
38,431,562 UART: [art] SIG.S = BEE91E25430CC675C9A8F24445CD7C161FE08D81C9D48DF6969C4938C7F08679DB9950941F24A0FC44D047A555233E9F
39,410,036 UART: mbox::rt_entry...
39,411,004 UART: ____ _ _ _ ____ _____
39,412,995 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,415,165 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,417,097 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,419,021 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,420,945 UART: |_|
39,421,925 UART:
39,707,022 UART: [rt] Runtime listening for mailbox commands...
39,709,189 >>> mbox cmd response data (120 bytes)
41,755,727 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
48,201,221 >>> mbox cmd response: success
48,201,778 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,235,995 UART:
48,236,323 UART: Running Caliptra FMC ...
48,237,447 UART:
48,237,600 UART: [state] CFI Enabled
48,281,823 UART: [art] Extend RT PCRs Done
48,282,966 UART: [art] Lock RT PCRs Done
48,284,301 UART: [art] Populate DV Done
48,289,968 UART: [fht] FMC Alias Private Key: 7
48,291,628 UART: [art] Derive CDI
48,292,437 UART: [art] Store in in slot 0x4
48,335,186 UART: [art] Derive Key Pair
48,336,217 UART: [art] Store priv key in slot 0x5
50,762,167 UART: [art] Derive Key Pair - Done
50,774,871 UART: [art] Signing Cert with AUTHO
50,776,368 UART: RITY.KEYID = 7
52,481,462 UART: [art] Erasing AUTHORITY.KEYID = 7
52,482,965 UART: [art] PUB.X = 7B38103289A969059218FED6F63B042020C144E5862C22C1ECF3F035089D7B4E53B69088249528C22F2EB66629CE6900
52,490,153 UART: [art] PUB.Y = E4B68505E22E63AF782BE0BE1554B2B12F6DE15ADCE6B5C101CB545D42F3AC8C64CF7BDA3FD8D8CFF5810C7482CBF40E
52,497,499 UART: [art] SIG.R = 3414DE64A49E56CAA22C9583BFF6016B9A729048CD748BC9CD63364838DD8117066AAC3ED17BF4A83242D48B5B0EB77B
52,504,883 UART: [art] SIG.S = 94E53EBA597AD744B8BE18283DCE34E968BEEEDEB7D31C75FE0A5229F4F0B50A712DAAEE09ECA44EAE34900B012DBC50
53,483,009 UART: mbox::rt_entry...
53,483,975 UART: ____ _ _ _ ____ _____
53,485,954 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,487,955 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,489,902 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,491,843 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,493,694 UART: |_|
53,494,485 UART:
53,781,106 UART: [rt] Runtime listening for mailbox commands...
53,783,227 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,440,246 ready_for_fw is high
3,440,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,739,489 >>> mbox cmd response: success
19,050,379 UART:
19,050,773 UART: Running Caliptra FMC ...
19,051,916 UART:
19,052,078 UART: [state] CFI Enabled
19,118,523 UART: [fht] FMC Alias Private Key: 7
20,882,334 UART: [art] Extend RT PCRs Done
20,883,556 UART: [art] Lock RT PCRs Done
20,885,364 UART: [art] Populate DV Done
20,890,937 UART: [fht] FMC Alias Private Key: 7
20,892,585 UART: [art] Derive CDI
20,893,405 UART: [art] Store in in slot 0x4
20,950,733 UART: [art] Derive Key Pair
20,951,771 UART: [art] Store priv key in slot 0x5
23,414,769 UART: [art] Derive Key Pair - Done
23,427,764 UART: [art] Signing Cert with AUTHO
23,429,067 UART: RITY.KEYID = 7
25,140,362 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,872 UART: [art] PUB.X = A47587B41B4272BE3AB0DD9F6A09DA72E2F30F6DCC85D688B41F19ED638ADDC01CD120AB29CFE41CE95B85CD68219E77
25,149,173 UART: [art] PUB.Y = D4E7A3987897E6801C17BD5187318107EBB7295A78FE99CC84A32307A8E133508B877D64906D8AD67701C13DBCB937DD
25,156,438 UART: [art] SIG.R = 9EA4A3E0F8FD8FE0782CF80E8D767E6557D03091137BE6A8199375A4DD1598B5FDEB66FC79B0BF8AFA4924C196740EDC
25,163,832 UART: [art] SIG.S = 5E11D3A8579017AE0A3B6A624B2CCA7CEA8EAB4EF823D1D5C24749A3B9E678422E854660A519D7C6BD4617669FC58E6A
26,142,818 UART: Caliptra RT
26,143,528 UART: [state] CFI Enabled
26,308,991 UART: [rt] RT listening for mailbox commands...
26,311,351 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,341,938 UART: [rt]cmd =0x54514754, len=24
26,344,797 >>> mbox cmd response data (8 bytes)
28,426,385 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,431,688 >>> mbox cmd response: success
35,432,162 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,466,264 UART:
35,466,581 UART: Running Caliptra FMC ...
35,467,622 UART:
35,467,773 UART: [state] CFI Enabled
35,556,636 UART: [art] Extend RT PCRs Done
35,557,844 UART: [art] Lock RT PCRs Done
35,559,260 UART: [art] Populate DV Done
35,564,841 UART: [fht] FMC Alias Private Key: 7
35,566,487 UART: [art] Derive CDI
35,567,302 UART: [art] Store in in slot 0x4
35,625,833 UART: [art] Derive Key Pair
35,626,872 UART: [art] Store priv key in slot 0x5
38,089,385 UART: [art] Derive Key Pair - Done
38,102,402 UART: [art] Signing Cert with AUTHO
38,103,739 UART: RITY.KEYID = 7
39,815,064 UART: [art] Erasing AUTHORITY.KEYID = 7
39,816,567 UART: [art] PUB.X = 66FB54FCD92C35DA4F80DC52BCCAD3004396AC3081F227CC632E518DBBD49F18555342DCECE83EF0884EEA2330F29DE5
39,823,810 UART: [art] PUB.Y = 090AB61C9FCFE7FD217B13BDC6905BFD9FEAB5F037A18EA13F0280811821262F1BE9ADEF647F7882666E505A6A707966
39,831,086 UART: [art] SIG.R = 2391B23DF6A60A6D16CE3278BDA2560269C2EA52A46695E49658D1A988D0A0F70FAD829008BBC83207EF791CBBBA357E
39,838,483 UART: [art] SIG.S = 43256836056B3FDD62A59F1580E25CC2EB42EBC2401336E4A97A47B42A93393AAFDED34F13A45550674253F4C6DCEB73
40,817,147 UART: mbox::rt_entry...
40,818,130 UART: ____ _ _ _ ____ _____
40,820,062 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,822,071 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,823,934 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,825,859 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,827,715 UART: |_|
40,828,593 UART:
41,112,592 UART: [rt] Runtime listening for mailbox commands...
41,114,707 >>> mbox cmd response data (120 bytes)
43,164,559 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
50,153,468 >>> mbox cmd response: success
50,153,990 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,188,502 UART:
50,188,829 UART: Running Caliptra FMC ...
50,189,958 UART:
50,190,141 UART: [state] CFI Enabled
50,295,086 UART: [art] Extend RT PCRs Done
50,296,281 UART: [art] Lock RT PCRs Done
50,297,469 UART: [art] Populate DV Done
50,302,667 UART: [fht] FMC Alias Private Key: 7
50,304,363 UART: [art] Derive CDI
50,305,171 UART: [art] Store in in slot 0x4
50,364,303 UART: [art] Derive Key Pair
50,365,346 UART: [art] Store priv key in slot 0x5
52,828,554 UART: [art] Derive Key Pair - Done
52,841,459 UART: [art] Signing Cert with AUTHO
52,842,769 UART: RITY.KEYID = 7
54,554,985 UART: [art] Erasing AUTHORITY.KEYID = 7
54,556,492 UART: [art] PUB.X = B821273406FCAF7CB441435050C8F2975620D4BB1BF425E748C89411FC798D9260F3BDD3A780C07B40E3EBAB0795F7A2
54,563,736 UART: [art] PUB.Y = A260A09A203DB4AD6B576BB95221F32D66A77021657281B45757BE2C129C566DE3521A36D56098A9D6F6CC4996821425
54,571,013 UART: [art] SIG.R = 3DCDCBEF3A442BDE75053A071C000A94756B81F02A5C166F0A392EC98ED58A6870941FFA15782D7D7CD189DBABAC753A
54,578,449 UART: [art] SIG.S = F7BE57EDA3EC83630EDB5FA79A0B317BD92D8710FE2A06D7FA4C013CA6968522DF4C9F797F1393E0C0F93A04F2DA95B8
55,557,253 UART: mbox::rt_entry...
55,558,221 UART: ____ _ _ _ ____ _____
55,560,314 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,562,317 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,564,172 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,566,099 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,567,951 UART: |_|
55,568,831 UART:
55,853,172 UART: [rt] Runtime listening for mailbox commands...
55,855,289 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,757,964 ready_for_fw is high
3,758,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,961,885 >>> mbox cmd response: success
19,216,271 UART:
19,216,650 UART: Running Caliptra FMC ...
19,217,771 UART:
19,217,915 UART: [state] CFI Enabled
19,226,201 UART: [fht] FMC Alias Private Key: 7
20,982,715 UART: [art] Extend RT PCRs Done
20,984,077 UART: [art] Lock RT PCRs Done
20,985,408 UART: [art] Populate DV Done
20,990,665 UART: [fht] FMC Alias Private Key: 7
20,992,307 UART: [art] Derive CDI
20,993,037 UART: [art] Store in in slot 0x4
21,035,697 UART: [art] Derive Key Pair
21,036,694 UART: [art] Store priv key in slot 0x5
23,463,512 UART: [art] Derive Key Pair - Done
23,476,398 UART: [art] Signing Cert with AUTHO
23,477,700 UART: RITY.KEYID = 7
25,183,028 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,535 UART: [art] PUB.X = 953D4EB2923AC1B6687DB1560A04305DCCCB642DDEF8B5D98C767A9297F3FDD91A1CE34487247EED3F72E2F61E921FD6
25,191,809 UART: [art] PUB.Y = DAE45E8897D34C5161FBED808AD8959E59A3313DE001799A39112A95AE7A5D5187C3A27919A4F15DF1B673400BEB1217
25,199,021 UART: [art] SIG.R = F79632965E9BF722ACEEF388ECB7726B9F6A5C8E4623830F175789A98B4C81415829A0EDADDA947F16AAEF9CA64B18AF
25,206,455 UART: [art] SIG.S = 22F5ADB9AB8B6D813B7912AE17B764EFA1D6974367B46713C2CC95DD0F5F02B0D2D16E5A0625AC3C26ACF48D3AA0AE74
26,185,421 UART: Caliptra RT
26,186,130 UART: [state] CFI Enabled
26,302,646 UART: [rt] RT listening for mailbox commands...
26,304,967 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,335,048 UART: [rt]cmd =0x54514754, len=24
26,337,757 >>> mbox cmd response data (8 bytes)
28,387,897 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
35,314,705 >>> mbox cmd response: success
35,315,242 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,351,030 UART:
35,351,323 UART: Running Caliptra FMC ...
35,352,435 UART:
35,352,587 UART: [state] CFI Enabled
35,396,724 UART: [art] Extend RT PCRs Done
35,397,902 UART: [art] Lock RT PCRs Done
35,399,349 UART: [art] Populate DV Done
35,405,037 UART: [fht] FMC Alias Private Key: 7
35,406,519 UART: [art] Derive CDI
35,407,354 UART: [art] Store in in slot 0x4
35,450,164 UART: [art] Derive Key Pair
35,451,163 UART: [art] Store priv key in slot 0x5
37,878,883 UART: [art] Derive Key Pair - Done
37,891,885 UART: [art] Signing Cert with AUTHO
37,893,182 UART: RITY.KEYID = 7
39,598,413 UART: [art] Erasing AUTHORITY.KEYID = 7
39,599,911 UART: [art] PUB.X = ACBE17508DF694F29590814C0DA488861710B4CE09F42E91337811C357C1FD5C00BEB814D8806F93A43A30E80D8C94D0
39,607,152 UART: [art] PUB.Y = 0A3E3DC4F84225C9367BEB4DE518559C504A460C6C3C855D966AFB8AD5F0671BF598D08179CB0532F1A2744D26E704CE
39,614,432 UART: [art] SIG.R = C3F8026C9B89B88D3232FA54B97860FE1D1C4F892C158ED331F0D8BA08764F3794AA3A1001945898F9A0D95BA44F65DA
39,621,820 UART: [art] SIG.S = 83131C218A53F4E6AB5B1D5C8241DD9EA9B6DBC5F9EE5E1963B183B272E5382F9D24600B2AE3D871BD9C4CC4B6CEF5FF
40,600,443 UART: mbox::rt_entry...
40,601,402 UART: ____ _ _ _ ____ _____
40,603,380 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,605,379 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,607,300 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,609,242 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,611,170 UART: |_|
40,612,006 UART:
40,899,803 UART: [rt] Runtime listening for mailbox commands...
40,901,947 >>> mbox cmd response data (120 bytes)
42,948,047 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
49,867,503 >>> mbox cmd response: success
49,868,025 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,902,617 UART:
49,902,910 UART: Running Caliptra FMC ...
49,904,021 UART:
49,904,174 UART: [state] CFI Enabled
49,948,812 UART: [art] Extend RT PCRs Done
49,950,004 UART: [art] Lock RT PCRs Done
49,951,463 UART: [art] Populate DV Done
49,956,702 UART: [fht] FMC Alias Private Key: 7
49,958,239 UART: [art] Derive CDI
49,959,046 UART: [art] Store in in slot 0x4
50,001,416 UART: [art] Derive Key Pair
50,002,416 UART: [art] Store priv key in slot 0x5
52,429,166 UART: [art] Derive Key Pair - Done
52,442,213 UART: [art] Signing Cert with AUTHO
52,443,508 UART: RITY.KEYID = 7
54,148,973 UART: [art] Erasing AUTHORITY.KEYID = 7
54,150,475 UART: [art] PUB.X = 35AC62373B33A08763B9E613D20274BB8F4EFACF9C32DB87B65E09CCEC0ADD6C3960935DD38367650933829B91328DDF
54,157,719 UART: [art] PUB.Y = 086CC9C802F55EA018DECA779C835708855E90514F6ACC048075FBB544CBF5BB034DD4313AE85C4D5EBC08CA22EA20AC
54,164,995 UART: [art] SIG.R = 4B8CFEDC62E8D3053B08169745DA030007CBA09787D745E41143C504FCD822252D07DFE7AFEC64A5FDDD7F8B01FE3031
54,172,387 UART: [art] SIG.S = F63E3DDF95CA7E650685E2A1C5532BC604D90E1918D18CB5C92F607752AC4272D66854D21EFF5CA3C1F7DD2747683C02
55,151,240 UART: mbox::rt_entry...
55,152,204 UART: ____ _ _ _ ____ _____
55,154,184 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,156,194 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,158,133 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,160,061 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,161,910 UART: |_|
55,162,703 UART:
55,452,136 UART: [rt] Runtime listening for mailbox commands...
55,454,304 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,403 UART: [kat] SHA2-256
892,341 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
902,472 UART: [kat] HMAC-384Kdf
907,022 UART: [kat] LMS
1,475,218 UART: [kat] --
1,476,083 UART: [cold-reset] ++
1,476,485 UART: [fht] Storing FHT @ 0x50003400
1,479,410 UART: [idev] ++
1,479,578 UART: [idev] CDI.KEYID = 6
1,479,938 UART: [idev] SUBJECT.KEYID = 7
1,480,362 UART: [idev] UDS.KEYID = 0
1,480,707 ready_for_fw is high
1,480,707 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,836 UART: [idev] Erasing UDS.KEYID = 0
1,504,338 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,076 UART: [idev] --
1,514,141 UART: [ldev] ++
1,514,309 UART: [ldev] CDI.KEYID = 6
1,514,672 UART: [ldev] SUBJECT.KEYID = 5
1,515,098 UART: [ldev] AUTHORITY.KEYID = 7
1,515,561 UART: [ldev] FE.KEYID = 1
1,520,859 UART: [ldev] Erasing FE.KEYID = 1
1,546,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,810 UART: [ldev] --
1,586,141 UART: [fwproc] Waiting for Commands...
1,587,010 UART: [fwproc] Received command 0x46574c44
1,587,801 UART: [fwproc] Received Image of size 114448 bytes
2,886,312 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,602 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,954 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,981 >>> mbox cmd response: success
3,079,231 UART: [afmc] ++
3,079,399 UART: [afmc] CDI.KEYID = 6
3,079,761 UART: [afmc] SUBJECT.KEYID = 7
3,080,186 UART: [afmc] AUTHORITY.KEYID = 5
3,114,693 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,773 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,281 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,166 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,856 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,781 UART: [afmc] --
3,157,795 UART: [cold-reset] --
3,158,747 UART: [state] Locking Datavault
3,159,876 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,480 UART: [state] Locking ICCM
3,160,988 UART: [exit] Launching FMC @ 0x40000130
3,166,317 UART:
3,166,333 UART: Running Caliptra FMC ...
3,166,741 UART:
3,166,795 UART: [state] CFI Enabled
3,176,872 UART: [fht] FMC Alias Private Key: 7
3,285,347 UART: [art] Extend RT PCRs Done
3,285,775 UART: [art] Lock RT PCRs Done
3,287,127 UART: [art] Populate DV Done
3,295,146 UART: [fht] FMC Alias Private Key: 7
3,296,256 UART: [art] Derive CDI
3,296,536 UART: [art] Store in in slot 0x4
3,381,851 UART: [art] Derive Key Pair
3,382,211 UART: [art] Store priv key in slot 0x5
3,395,265 UART: [art] Derive Key Pair - Done
3,409,947 UART: [art] Signing Cert with AUTHO
3,410,427 UART: RITY.KEYID = 7
3,425,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,652 UART: [art] PUB.X = BCF7FA3902D29902B6A2AC6C83CF208E20717E2D2190D46F3BCCACBD5053D2B2FF44DE63A27961B25CBA5B8DEE1E8415
3,433,436 UART: [art] PUB.Y = 28A45C8E0CCACC07C4EC95B921A27F96DA7628231FFC506B697B022B5D87639F8C02104AD94006C2968204F6CE150043
3,440,346 UART: [art] SIG.R = 8C1B460E84C8EC2EA30BB329B9A1CBE3D71A9386F98BAF1B6669D84E3F2880C6B422C1BECBBA2A112412FCEA1782AFF4
3,447,132 UART: [art] SIG.S = A006B22E3C8F7D2DB3FB75E5C118CDFC2F23F6875D661A04C9F68A7B7E3D834922FA3622E77852649D7BE57170962DEA
3,470,959 UART: Caliptra RT
3,471,212 UART: [state] CFI Enabled
3,579,902 UART: [rt] RT listening for mailbox commands...
3,580,572 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,368 UART: [rt]cmd =0x54514754, len=24
3,612,454 >>> mbox cmd response data (8 bytes)
3,612,455 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,175 UART:
3,613,191 UART: Running Caliptra ROM ...
3,613,599 UART:
3,613,653 UART: [state] CFI Enabled
3,616,317 UART: [state] LifecycleState = Unprovisioned
3,616,972 UART: [state] DebugLocked = No
3,617,482 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,619,043 UART: [kat] SHA2-256
4,412,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,417,089 UART: [kat] ++
4,417,241 UART: [kat] sha1
4,421,399 UART: [kat] SHA2-256
4,423,337 UART: [kat] SHA2-384
4,426,104 UART: [kat] SHA2-512-ACC
4,428,004 UART: [kat] ECC-384
4,433,827 UART: [kat] HMAC-384Kdf
4,438,303 UART: [kat] LMS
5,006,499 UART: [kat] --
5,007,524 UART: [update-reset] ++
5,934,092 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,935,308 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,031,742 >>> mbox cmd response: success
6,031,742 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,031,845 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,859 UART: [update-reset Success] --
6,040,864 UART: [state] Locking Datavault
6,041,596 UART: [state] Locking PCR0, PCR1 and PCR31
6,042,200 UART: [state] Locking ICCM
6,042,762 UART: [exit] Launching FMC @ 0x40000130
6,048,091 UART:
6,048,107 UART: Running Caliptra FMC ...
6,048,515 UART:
6,048,569 UART: [state] CFI Enabled
6,137,998 UART: [art] Extend RT PCRs Done
6,138,426 UART: [art] Lock RT PCRs Done
6,139,927 UART: [art] Populate DV Done
6,148,120 UART: [fht] FMC Alias Private Key: 7
6,149,232 UART: [art] Derive CDI
6,149,512 UART: [art] Store in in slot 0x4
6,235,123 UART: [art] Derive Key Pair
6,235,483 UART: [art] Store priv key in slot 0x5
6,248,705 UART: [art] Derive Key Pair - Done
6,263,352 UART: [art] Signing Cert with AUTHO
6,263,832 UART: RITY.KEYID = 7
6,279,056 UART: [art] Erasing AUTHORITY.KEYID = 7
6,279,821 UART: [art] PUB.X = 431E2BBBE6DAF4AEB2E2C04E63B67F9ACFBF2BE830A13B749BA0428B6FEFDFA5CCB3A6CD3A69400B34EAD4CF7B7B967C
6,286,626 UART: [art] PUB.Y = 7C6636C20EEDDB38083881AFA5558034C976C9AF1978AD5BC991A57C516996B9E0CD12E2E4DD875765A0371DD6E13F2A
6,293,576 UART: [art] SIG.R = 83C4125D1B0506CB72962778FC8F92D9BEEC437AA7ADC3092183E5DCE55D8EDF3D58CBC4BAD6F345DA22A56DC3692A89
6,300,355 UART: [art] SIG.S = F7E33FDDFB9BF1BC5B14CAE35245DC3691E05810EE5DC2FB12D52F68EBB030A18D4608B4077D096C37751338E31A8F6A
6,323,601 UART: mbox::rt_entry...
6,323,973 UART: ____ _ _ _ ____ _____
6,324,757 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,325,557 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,326,325 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,327,093 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,327,861 UART: |_|
6,328,173 UART:
6,604,424 UART: [rt] Runtime listening for mailbox commands...
6,605,661 >>> mbox cmd response data (120 bytes)
6,605,662 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,605,776 UART:
6,605,792 UART: Running Caliptra ROM ...
6,606,200 UART:
6,606,254 UART: [state] CFI Enabled
6,609,372 UART: [state] LifecycleState = Unprovisioned
6,610,027 UART: [state] DebugLocked = No
6,610,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,612,406 UART: [kat] SHA2-256
7,406,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,410,452 UART: [kat] ++
7,410,604 UART: [kat] sha1
7,414,708 UART: [kat] SHA2-256
7,416,646 UART: [kat] SHA2-384
7,419,411 UART: [kat] SHA2-512-ACC
7,421,311 UART: [kat] ECC-384
7,427,010 UART: [kat] HMAC-384Kdf
7,431,654 UART: [kat] LMS
7,999,850 UART: [kat] --
8,000,615 UART: [update-reset] ++
8,927,446 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,928,560 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,024,994 >>> mbox cmd response: success
9,024,994 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,025,125 UART: [update-reset] Copying MAN_2 To MAN_1
9,033,139 UART: [update-reset Success] --
9,033,960 UART: [state] Locking Datavault
9,034,542 UART: [state] Locking PCR0, PCR1 and PCR31
9,035,146 UART: [state] Locking ICCM
9,035,582 UART: [exit] Launching FMC @ 0x40000130
9,040,911 UART:
9,040,927 UART: Running Caliptra FMC ...
9,041,335 UART:
9,041,389 UART: [state] CFI Enabled
9,130,902 UART: [art] Extend RT PCRs Done
9,131,330 UART: [art] Lock RT PCRs Done
9,132,821 UART: [art] Populate DV Done
9,140,830 UART: [fht] FMC Alias Private Key: 7
9,141,816 UART: [art] Derive CDI
9,142,096 UART: [art] Store in in slot 0x4
9,227,403 UART: [art] Derive Key Pair
9,227,763 UART: [art] Store priv key in slot 0x5
9,241,177 UART: [art] Derive Key Pair - Done
9,255,718 UART: [art] Signing Cert with AUTHO
9,256,198 UART: RITY.KEYID = 7
9,271,524 UART: [art] Erasing AUTHORITY.KEYID = 7
9,272,289 UART: [art] PUB.X = 5FD73D879BF4A558A89B713A04B564B029676D40DFCCCB8F04BF69FAC2037E62BDE3331C151C44F331D7D6D5D96F63C7
9,279,062 UART: [art] PUB.Y = DE680195D128830C7A38517DE9B2545E1FCB8BD4E72D5CF7063805BF1555194FB9CE034A6021BAE33AC2194EE39ABA49
9,286,005 UART: [art] SIG.R = 5F386B21F6F4D40CA58166FD02B6F5D50AB2523DEF998E69C57480FC66D3AAD216CB4BC972823A5CD463311F7A26267F
9,292,774 UART: [art] SIG.S = FD1B2F85B33975AA4461D0580D92ECC65B96F84D314B20C36BF2173C9E18F0F05E2966C480C4B947DB3027E78DCC7002
9,316,585 UART: mbox::rt_entry...
9,316,957 UART: ____ _ _ _ ____ _____
9,317,741 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,318,541 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,319,309 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,320,077 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,320,845 UART: |_|
9,321,157 UART:
9,601,585 UART: [rt] Runtime listening for mailbox commands...
9,602,822 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,425 ready_for_fw is high
1,362,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,367 >>> mbox cmd response: success
2,989,493 UART:
2,989,509 UART: Running Caliptra FMC ...
2,989,917 UART:
2,989,971 UART: [state] CFI Enabled
3,000,624 UART: [fht] FMC Alias Private Key: 7
3,109,317 UART: [art] Extend RT PCRs Done
3,109,745 UART: [art] Lock RT PCRs Done
3,111,057 UART: [art] Populate DV Done
3,119,004 UART: [fht] FMC Alias Private Key: 7
3,120,180 UART: [art] Derive CDI
3,120,460 UART: [art] Store in in slot 0x4
3,206,155 UART: [art] Derive Key Pair
3,206,515 UART: [art] Store priv key in slot 0x5
3,220,361 UART: [art] Derive Key Pair - Done
3,235,330 UART: [art] Signing Cert with AUTHO
3,235,810 UART: RITY.KEYID = 7
3,250,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,517 UART: [art] PUB.X = 3AC900ED68679C1F0A751D7E579DDEC47A03E229753ECEDC93B5D3208C01A52F5DC001A3F9D10FA80A5BC96E680BD010
3,258,258 UART: [art] PUB.Y = 33C8ECEB5B10697D0BDBF01F2F8D7E8BCF10F8D49833F05A1EE187E5522BBC60E42FB9D2C3854FB2E8BA54049DCFF098
3,265,224 UART: [art] SIG.R = 17E4907FED71B96482D687ED773A866492B7C48A609A9501BA7B860421E19F33D2D60A2280736ADA3016A467B997B416
3,271,977 UART: [art] SIG.S = CECDDAB4EECB081E03A06E93FDF628C4B441AB655EADA4FFF0D79685E37E321D5A0FCDC5FBB5BF0F8FCF4C4539F5C290
3,294,914 UART: Caliptra RT
3,295,167 UART: [state] CFI Enabled
3,403,234 UART: [rt] RT listening for mailbox commands...
3,403,904 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,932 UART: [rt]cmd =0x54514754, len=24
3,436,138 >>> mbox cmd response data (8 bytes)
3,436,139 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,736,854 >>> mbox cmd response: success
5,736,854 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,750,327 UART:
5,750,343 UART: Running Caliptra FMC ...
5,750,751 UART:
5,750,805 UART: [state] CFI Enabled
5,840,224 UART: [art] Extend RT PCRs Done
5,840,652 UART: [art] Lock RT PCRs Done
5,841,689 UART: [art] Populate DV Done
5,849,968 UART: [fht] FMC Alias Private Key: 7
5,851,074 UART: [art] Derive CDI
5,851,354 UART: [art] Store in in slot 0x4
5,936,989 UART: [art] Derive Key Pair
5,937,349 UART: [art] Store priv key in slot 0x5
5,950,649 UART: [art] Derive Key Pair - Done
5,965,570 UART: [art] Signing Cert with AUTHO
5,966,050 UART: RITY.KEYID = 7
5,981,048 UART: [art] Erasing AUTHORITY.KEYID = 7
5,981,813 UART: [art] PUB.X = 2AAEEBB7D4EFFD608E817A8F8F7176E58846C951F81D55A8100360660A45900B55C672D600913DDC716D4F6D0DB5D98D
5,988,555 UART: [art] PUB.Y = 2AA2A01DFB4CBB31ADF455CC769C7B619C19A9BD105A0A785C98B1FF07F125120453A07226DF6EEEC72DE25BE697D60A
5,995,511 UART: [art] SIG.R = 002CB72E693E1E0A5640CCE41D2653EF3680B13C48ADD62ECB2E20F5A3E95BCBCF772313F9ACABC4485F7888B8E3AB3F
6,002,276 UART: [art] SIG.S = B65AFAEE8E13BD1938D85FCA397D6EDE5C7B72795E35049909AEC074E37AA5129E9697E7495A6AE08B53BF3452C28CAC
6,025,903 UART: mbox::rt_entry...
6,026,275 UART: ____ _ _ _ ____ _____
6,027,059 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,027,859 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,028,627 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,029,395 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,030,163 UART: |_|
6,030,475 UART:
6,312,657 UART: [rt] Runtime listening for mailbox commands...
6,313,894 >>> mbox cmd response data (120 bytes)
6,313,895 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,613,346 >>> mbox cmd response: success
8,613,346 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,626,581 UART:
8,626,597 UART: Running Caliptra FMC ...
8,627,005 UART:
8,627,059 UART: [state] CFI Enabled
8,716,188 UART: [art] Extend RT PCRs Done
8,716,616 UART: [art] Lock RT PCRs Done
8,718,083 UART: [art] Populate DV Done
8,726,244 UART: [fht] FMC Alias Private Key: 7
8,727,204 UART: [art] Derive CDI
8,727,484 UART: [art] Store in in slot 0x4
8,813,221 UART: [art] Derive Key Pair
8,813,581 UART: [art] Store priv key in slot 0x5
8,826,591 UART: [art] Derive Key Pair - Done
8,841,104 UART: [art] Signing Cert with AUTHO
8,841,584 UART: RITY.KEYID = 7
8,856,504 UART: [art] Erasing AUTHORITY.KEYID = 7
8,857,269 UART: [art] PUB.X = FC47D0423FD889547E8AF54BDA4B1B64343EF94C58E8BB4D06DF128280EA2023AF105E59EDCE8A5E3B46581A447AFAE5
8,864,052 UART: [art] PUB.Y = AFD9C5764C1A7F50AC9CAD13D85B3FCA3910CBC460358EF4EDEB4F1C31C6B99D87E538C5BC08238E6C20ACF4A2D2F1C6
8,871,025 UART: [art] SIG.R = 9803A2165D9D32255450BF1A480D6E7D3DE3C38F62A8A66448CDA45106BA77F667C3996D267465E1429674D37C44B445
8,877,778 UART: [art] SIG.S = 38D1674C64577FBA5265E82C7C5DB8187906C1A2F99233545C47BB806F491E630FB2AAB4A97C29A4989155FCEFEA4B13
8,901,829 UART: mbox::rt_entry...
8,902,201 UART: ____ _ _ _ ____ _____
8,902,985 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,903,785 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,904,553 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,905,321 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,906,089 UART: |_|
8,906,401 UART:
9,186,155 UART: [rt] Runtime listening for mailbox commands...
9,187,392 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,480 UART: [kat] SHA2-256
882,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,526 UART: [kat] ++
886,678 UART: [kat] sha1
891,052 UART: [kat] SHA2-256
892,990 UART: [kat] SHA2-384
895,711 UART: [kat] SHA2-512-ACC
897,612 UART: [kat] ECC-384
903,275 UART: [kat] HMAC-384Kdf
907,987 UART: [kat] LMS
1,476,183 UART: [kat] --
1,477,248 UART: [cold-reset] ++
1,477,762 UART: [fht] Storing FHT @ 0x50003400
1,480,631 UART: [idev] ++
1,480,799 UART: [idev] CDI.KEYID = 6
1,481,159 UART: [idev] SUBJECT.KEYID = 7
1,481,583 UART: [idev] UDS.KEYID = 0
1,481,928 ready_for_fw is high
1,481,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,469 UART: [idev] Erasing UDS.KEYID = 0
1,506,219 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,775 UART: [idev] --
1,515,758 UART: [ldev] ++
1,515,926 UART: [ldev] CDI.KEYID = 6
1,516,289 UART: [ldev] SUBJECT.KEYID = 5
1,516,715 UART: [ldev] AUTHORITY.KEYID = 7
1,517,178 UART: [ldev] FE.KEYID = 1
1,522,408 UART: [ldev] Erasing FE.KEYID = 1
1,547,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,263 UART: [ldev] --
1,586,564 UART: [fwproc] Waiting for Commands...
1,587,275 UART: [fwproc] Received command 0x46574c44
1,588,066 UART: [fwproc] Received Image of size 114448 bytes
2,886,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,575 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,980 >>> mbox cmd response: success
3,080,096 UART: [afmc] ++
3,080,264 UART: [afmc] CDI.KEYID = 6
3,080,626 UART: [afmc] SUBJECT.KEYID = 7
3,081,051 UART: [afmc] AUTHORITY.KEYID = 5
3,116,254 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,908 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,688 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,416 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,301 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,991 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,840 UART: [afmc] --
3,159,874 UART: [cold-reset] --
3,160,734 UART: [state] Locking Datavault
3,162,015 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,619 UART: [state] Locking ICCM
3,163,287 UART: [exit] Launching FMC @ 0x40000130
3,168,616 UART:
3,168,632 UART: Running Caliptra FMC ...
3,169,040 UART:
3,169,183 UART: [state] CFI Enabled
3,180,048 UART: [fht] FMC Alias Private Key: 7
3,288,151 UART: [art] Extend RT PCRs Done
3,288,579 UART: [art] Lock RT PCRs Done
3,290,217 UART: [art] Populate DV Done
3,298,310 UART: [fht] FMC Alias Private Key: 7
3,299,458 UART: [art] Derive CDI
3,299,738 UART: [art] Store in in slot 0x4
3,385,583 UART: [art] Derive Key Pair
3,385,943 UART: [art] Store priv key in slot 0x5
3,399,205 UART: [art] Derive Key Pair - Done
3,413,989 UART: [art] Signing Cert with AUTHO
3,414,469 UART: RITY.KEYID = 7
3,429,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,558 UART: [art] PUB.X = 5B1AB7F66E7FE36016B06ACD9BFAD3BDEF6593CBE563DCE55BC016E2654E0C9EB30BEADC599757B4E2AC6D4E690075EE
3,437,328 UART: [art] PUB.Y = BF3AB9BDEE166314BD23AC878E7BBC212FC373947252B71709542ED8EC79D98ED2F018148A80FE58657D5107F0020C1F
3,444,272 UART: [art] SIG.R = 636829068B12D71BD24A145549F0AA344467DB73976E2B6D4779D6C657C1528D861B10DFEFF6F4B10BA71CE459C8A9C7
3,451,038 UART: [art] SIG.S = 6CE53E0025958C26839FB971E59EB78EFF1C7DCB55555C589BEB651AE9EAC46FA207B531F4AF1193A1A02BD8F2C26ED8
3,474,508 UART: Caliptra RT
3,474,853 UART: [state] CFI Enabled
3,583,625 UART: [rt] RT listening for mailbox commands...
3,584,295 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,035 UART: [rt]cmd =0x54514754, len=24
3,616,175 >>> mbox cmd response data (8 bytes)
3,616,176 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,112 UART:
3,617,128 UART: Running Caliptra ROM ...
3,617,536 UART:
3,617,677 UART: [state] CFI Enabled
3,620,581 UART: [state] LifecycleState = Unprovisioned
3,621,236 UART: [state] DebugLocked = No
3,621,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,623,345 UART: [kat] SHA2-256
4,417,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,421,391 UART: [kat] ++
4,421,543 UART: [kat] sha1
4,425,863 UART: [kat] SHA2-256
4,427,801 UART: [kat] SHA2-384
4,430,586 UART: [kat] SHA2-512-ACC
4,432,486 UART: [kat] ECC-384
4,437,745 UART: [kat] HMAC-384Kdf
4,442,531 UART: [kat] LMS
5,010,727 UART: [kat] --
5,011,536 UART: [update-reset] ++
5,938,652 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,939,766 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
6,036,200 >>> mbox cmd response: success
6,036,200 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,036,489 UART: [update-reset] Copying MAN_2 To MAN_1
6,044,503 UART: [update-reset Success] --
6,045,546 UART: [state] Locking Datavault
6,046,440 UART: [state] Locking PCR0, PCR1 and PCR31
6,047,044 UART: [state] Locking ICCM
6,047,544 UART: [exit] Launching FMC @ 0x40000130
6,052,873 UART:
6,052,889 UART: Running Caliptra FMC ...
6,053,297 UART:
6,053,440 UART: [state] CFI Enabled
6,143,061 UART: [art] Extend RT PCRs Done
6,143,489 UART: [art] Lock RT PCRs Done
6,144,634 UART: [art] Populate DV Done
6,152,967 UART: [fht] FMC Alias Private Key: 7
6,153,975 UART: [art] Derive CDI
6,154,255 UART: [art] Store in in slot 0x4
6,239,794 UART: [art] Derive Key Pair
6,240,154 UART: [art] Store priv key in slot 0x5
6,253,206 UART: [art] Derive Key Pair - Done
6,267,778 UART: [art] Signing Cert with AUTHO
6,268,258 UART: RITY.KEYID = 7
6,283,458 UART: [art] Erasing AUTHORITY.KEYID = 7
6,284,223 UART: [art] PUB.X = 2519AAFD9BEA77B9DB43447522758A5FF34AC5E520E0ABA37C1280CF124FB02EE9D46E33D199E8A5A7555A5C8802CFBE
6,291,006 UART: [art] PUB.Y = A16AFB8A1E437C1E302E295E0FEEEB125CE3A0E7B67442598557E263078F7B69BD10848FC0B5192D9336F3EF7203D85D
6,297,953 UART: [art] SIG.R = A009B2DCE57386EBA3FB69F5EDB38CAD5496FAB3A05336AE65EA51BAF082182CF847FCD670B611740548AEC49CB3B4CC
6,304,739 UART: [art] SIG.S = 1FE2A502C457AFEAC585BD0A8BC4B496BAAE2E1D18BC76B2DAD5E9A0019615ADC067041A448785EE971A27499E7FD43C
6,328,354 UART: mbox::rt_entry...
6,328,726 UART: ____ _ _ _ ____ _____
6,329,510 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,330,310 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,331,078 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,331,846 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,332,614 UART: |_|
6,332,926 UART:
6,615,988 UART: [rt] Runtime listening for mailbox commands...
6,617,225 >>> mbox cmd response data (120 bytes)
6,617,226 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
6,617,340 UART:
6,617,356 UART: Running Caliptra ROM ...
6,617,764 UART:
6,617,905 UART: [state] CFI Enabled
6,620,947 UART: [state] LifecycleState = Unprovisioned
6,621,602 UART: [state] DebugLocked = No
6,622,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,623,817 UART: [kat] SHA2-256
7,417,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,421,863 UART: [kat] ++
7,422,015 UART: [kat] sha1
7,426,303 UART: [kat] SHA2-256
7,428,241 UART: [kat] SHA2-384
7,431,110 UART: [kat] SHA2-512-ACC
7,433,010 UART: [kat] ECC-384
7,439,101 UART: [kat] HMAC-384Kdf
7,443,761 UART: [kat] LMS
8,011,957 UART: [kat] --
8,013,126 UART: [update-reset] ++
8,939,592 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,940,722 UART: [update-reset] Loading Runtime at address 0x40005000 len 54020
9,037,156 >>> mbox cmd response: success
9,037,156 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,037,409 UART: [update-reset] Copying MAN_2 To MAN_1
9,045,423 UART: [update-reset Success] --
9,046,560 UART: [state] Locking Datavault
9,047,160 UART: [state] Locking PCR0, PCR1 and PCR31
9,047,764 UART: [state] Locking ICCM
9,048,268 UART: [exit] Launching FMC @ 0x40000130
9,053,597 UART:
9,053,613 UART: Running Caliptra FMC ...
9,054,021 UART:
9,054,164 UART: [state] CFI Enabled
9,143,835 UART: [art] Extend RT PCRs Done
9,144,263 UART: [art] Lock RT PCRs Done
9,145,672 UART: [art] Populate DV Done
9,154,215 UART: [fht] FMC Alias Private Key: 7
9,155,155 UART: [art] Derive CDI
9,155,435 UART: [art] Store in in slot 0x4
9,241,286 UART: [art] Derive Key Pair
9,241,646 UART: [art] Store priv key in slot 0x5
9,254,662 UART: [art] Derive Key Pair - Done
9,269,477 UART: [art] Signing Cert with AUTHO
9,269,957 UART: RITY.KEYID = 7
9,285,025 UART: [art] Erasing AUTHORITY.KEYID = 7
9,285,790 UART: [art] PUB.X = 15954A050D857C60EF31406BD7405F276ED9EC09C80D5D9B1C8E370D15D6B012FFC5D26F7C6283CE4260FEF1476B0ED2
9,292,550 UART: [art] PUB.Y = 1EB082BD7EDDF6CEE15A0E30F81D102540B410F9DE7DB44076C83368534EBE8AF09D5B7ADD6D7B016CEA0D191534CB30
9,299,509 UART: [art] SIG.R = ACBCE0F7362556AAB402B41AD42C0031E7857A53FFC871A4D9A62E18EFA5055D87395EAB75348B55C25068AA6DE7A5A4
9,306,263 UART: [art] SIG.S = 73D939A6864E1631393D66468FA8F9995921DBB7080B4C96ADBFC9F4A503A586799ED83D548EB92B2A695349B5DCE13D
9,329,847 UART: mbox::rt_entry...
9,330,219 UART: ____ _ _ _ ____ _____
9,331,003 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,331,803 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,332,571 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,333,339 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,334,107 UART: |_|
9,334,419 UART:
9,617,397 UART: [rt] Runtime listening for mailbox commands...
9,618,634 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,302 ready_for_fw is high
1,363,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,292 >>> mbox cmd response: success
2,991,534 UART:
2,991,550 UART: Running Caliptra FMC ...
2,991,958 UART:
2,992,101 UART: [state] CFI Enabled
3,002,758 UART: [fht] FMC Alias Private Key: 7
3,110,117 UART: [art] Extend RT PCRs Done
3,110,545 UART: [art] Lock RT PCRs Done
3,112,225 UART: [art] Populate DV Done
3,120,608 UART: [fht] FMC Alias Private Key: 7
3,121,580 UART: [art] Derive CDI
3,121,860 UART: [art] Store in in slot 0x4
3,206,987 UART: [art] Derive Key Pair
3,207,347 UART: [art] Store priv key in slot 0x5
3,220,667 UART: [art] Derive Key Pair - Done
3,235,857 UART: [art] Signing Cert with AUTHO
3,236,337 UART: RITY.KEYID = 7
3,252,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,022 UART: [art] PUB.X = ADDBBFB56D3B03B60B63819D0EDC188C253D099D76B57A2B792AFB7F46FC818C3703B392B685D2AD55902203E9964647
3,259,780 UART: [art] PUB.Y = CC52275A430B0D5149FF18796811BB75C71404EE8775069913C36D36F1C3F460FEDF9A717E7ABA4A1FE8FEB50FF2A156
3,266,723 UART: [art] SIG.R = 0A64A3A3D235DD65F530BE93D3F5AF111F245D85F2092AAB3F4FF52229C8E3C275E33BF371C1C488ECCC62AB68899940
3,273,497 UART: [art] SIG.S = A531A5B5AF6AC09AEC7D26602796FDC250E21E2E0BA0EA84155CE9B2B3F85868E59790C1F7AEBD169DC1BFD954E22DF8
3,297,687 UART: Caliptra RT
3,298,032 UART: [state] CFI Enabled
3,406,131 UART: [rt] RT listening for mailbox commands...
3,406,801 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,549 UART: [rt]cmd =0x54514754, len=24
3,438,653 >>> mbox cmd response data (8 bytes)
3,438,654 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,739,974 >>> mbox cmd response: success
5,739,974 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,753,419 UART:
5,753,435 UART: Running Caliptra FMC ...
5,753,843 UART:
5,753,986 UART: [state] CFI Enabled
5,842,945 UART: [art] Extend RT PCRs Done
5,843,373 UART: [art] Lock RT PCRs Done
5,844,660 UART: [art] Populate DV Done
5,852,895 UART: [fht] FMC Alias Private Key: 7
5,854,031 UART: [art] Derive CDI
5,854,311 UART: [art] Store in in slot 0x4
5,939,870 UART: [art] Derive Key Pair
5,940,230 UART: [art] Store priv key in slot 0x5
5,953,412 UART: [art] Derive Key Pair - Done
5,968,002 UART: [art] Signing Cert with AUTHO
5,968,482 UART: RITY.KEYID = 7
5,983,876 UART: [art] Erasing AUTHORITY.KEYID = 7
5,984,641 UART: [art] PUB.X = A71F849DAD21F9A26573C5B2B83E4A3A0A75CFC9D0F975E7B8C21AD3D867534E12AE61141A1B8C62627BDED2CCE1C68E
5,991,426 UART: [art] PUB.Y = D41311E305242C57CAF47EA250CF060E41A4834B2929C6E80A127A63CC837C69BACF4312B7BA1EE1524FDB6816F0D45F
5,998,372 UART: [art] SIG.R = 4DF293FBD2EA641E7D5764957918D3EA07196A1525702749BF9F4CFC283EBF08C8D1B263C816E102B19E6F2A0E20D255
6,005,134 UART: [art] SIG.S = 493FBFD7B46349B74C9DB359E60D202F432DF5A665B1DFD1AB1AA39E1A75D633F96C340373237916B627C14A10E6B994
6,028,933 UART: mbox::rt_entry...
6,029,305 UART: ____ _ _ _ ____ _____
6,030,089 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,030,889 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,031,657 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,032,425 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,033,193 UART: |_|
6,033,505 UART:
6,311,952 UART: [rt] Runtime listening for mailbox commands...
6,313,189 >>> mbox cmd response data (120 bytes)
6,313,190 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
8,614,154 >>> mbox cmd response: success
8,614,154 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,627,315 UART:
8,627,331 UART: Running Caliptra FMC ...
8,627,739 UART:
8,627,882 UART: [state] CFI Enabled
8,717,603 UART: [art] Extend RT PCRs Done
8,718,031 UART: [art] Lock RT PCRs Done
8,719,546 UART: [art] Populate DV Done
8,727,695 UART: [fht] FMC Alias Private Key: 7
8,728,653 UART: [art] Derive CDI
8,728,933 UART: [art] Store in in slot 0x4
8,814,548 UART: [art] Derive Key Pair
8,814,908 UART: [art] Store priv key in slot 0x5
8,828,052 UART: [art] Derive Key Pair - Done
8,842,697 UART: [art] Signing Cert with AUTHO
8,843,177 UART: RITY.KEYID = 7
8,858,499 UART: [art] Erasing AUTHORITY.KEYID = 7
8,859,264 UART: [art] PUB.X = 4014098696C08440A9E428ADB1D51A05099A169C5CF2F7CCB1168E9224F4A8B53A6FE0BBE231EEBDD98DC79ED979549C
8,866,035 UART: [art] PUB.Y = E929C32AA85B1F5EAA94EAAC896CE6EC6979D60BFF8540EF0952DF3B0B2CB358ED69F6D71418CE00D21EF4E2B16191E5
8,872,974 UART: [art] SIG.R = 8539F4F49F1A37A7A94D398BAC7FE1EFBE4ECB91374B6697FC3D399401D28063AB36FB127ECD3E0A985E0572921A665D
8,879,745 UART: [art] SIG.S = 9125AA85C4DECED9BF75BB50537DB5207D2B47DE39A8F022C4432AD857E85001D23158FAD50F5FFBDC165352ECB3D20F
8,903,051 UART: mbox::rt_entry...
8,903,423 UART: ____ _ _ _ ____ _____
8,904,207 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,905,007 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,905,775 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,906,543 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,907,311 UART: |_|
8,907,623 UART:
9,187,314 UART: [rt] Runtime listening for mailbox commands...
9,188,551 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
893,486 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,611 UART: [kat] ++
897,763 UART: [kat] sha1
901,831 UART: [kat] SHA2-256
903,771 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
917,692 UART: [kat] HMAC-384Kdf
922,298 UART: [kat] LMS
1,170,626 UART: [kat] --
1,171,637 UART: [cold-reset] ++
1,172,039 UART: [fht] FHT @ 0x50003400
1,174,652 UART: [idev] ++
1,174,820 UART: [idev] CDI.KEYID = 6
1,175,180 UART: [idev] SUBJECT.KEYID = 7
1,175,604 UART: [idev] UDS.KEYID = 0
1,175,949 ready_for_fw is high
1,175,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,358 UART: [idev] Erasing UDS.KEYID = 0
1,200,579 UART: [idev] Sha1 KeyId Algorithm
1,209,045 UART: [idev] --
1,210,241 UART: [ldev] ++
1,210,409 UART: [ldev] CDI.KEYID = 6
1,210,772 UART: [ldev] SUBJECT.KEYID = 5
1,211,198 UART: [ldev] AUTHORITY.KEYID = 7
1,211,661 UART: [ldev] FE.KEYID = 1
1,216,843 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,085 UART: [ldev] --
1,282,434 UART: [fwproc] Wait for Commands...
1,283,006 UART: [fwproc] Recv command 0x46574c44
1,283,734 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,979 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,914 >>> mbox cmd response: success
2,776,924 UART: [afmc] ++
2,777,092 UART: [afmc] CDI.KEYID = 6
2,777,454 UART: [afmc] SUBJECT.KEYID = 7
2,777,879 UART: [afmc] AUTHORITY.KEYID = 5
2,812,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,089 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,817 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,065 UART: [afmc] --
2,856,093 UART: [cold-reset] --
2,856,993 UART: [state] Locking Datavault
2,858,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,758 UART: [state] Locking ICCM
2,859,184 UART: [exit] Launching FMC @ 0x40000130
2,864,513 UART:
2,864,529 UART: Running Caliptra FMC ...
2,864,937 UART:
2,864,991 UART: [state] CFI Enabled
2,875,668 UART: [fht] FMC Alias Private Key: 7
2,983,561 UART: [art] Extend RT PCRs Done
2,983,989 UART: [art] Lock RT PCRs Done
2,985,365 UART: [art] Populate DV Done
2,993,814 UART: [fht] FMC Alias Private Key: 7
2,994,938 UART: [art] Derive CDI
2,995,218 UART: [art] Store in in slot 0x4
3,080,909 UART: [art] Derive Key Pair
3,081,269 UART: [art] Store priv key in slot 0x5
3,094,513 UART: [art] Derive Key Pair - Done
3,109,669 UART: [art] Signing Cert with AUTHO
3,110,149 UART: RITY.KEYID = 7
3,125,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,852 UART: [art] PUB.X = AA843D313899DD3CDDADC70DD04386E9F6CD81747B598AC2CA93583A4C0E5DBAD75DD1E75415D2B6E08AA5982CB59562
3,132,632 UART: [art] PUB.Y = 2C741CA4909B9627D90EAEA04E40F53B7DBF6E73C072800D00E25CFC276D51122B3A86B515297555E66F80B8174E359F
3,139,554 UART: [art] SIG.R = F38D0509E192749B502C8B78904361FA1ABEF89972968E152FD1B3B6342BB797883B197ED5614B884D59FF3C16F35912
3,146,312 UART: [art] SIG.S = 16DFBBB2F33A5EC5160BAEFF7AD31E3F98B1F5EB79080162FF0FFB6A0F902D3645973DB26B486BBC0A56A5522B8966E9
3,169,761 UART: Caliptra RT
3,170,014 UART: [state] CFI Enabled
3,277,147 UART: [rt] RT listening for mailbox commands...
3,277,817 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,763 UART: [rt]cmd =0x54514754, len=24
3,309,875 >>> mbox cmd response data (8 bytes)
3,309,876 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,943 UART:
3,310,959 UART: Running Caliptra ROM ...
3,311,367 UART:
3,311,422 UART: [state] CFI Enabled
3,314,200 UART: [state] LifecycleState = Unprovisioned
3,314,855 UART: [state] DebugLocked = No
3,315,391 UART: [state] WD Timer not started. Device not locked for debugging
3,316,705 UART: [kat] SHA2-256
4,122,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,126,480 UART: [kat] ++
4,126,632 UART: [kat] sha1
4,130,720 UART: [kat] SHA2-256
4,132,660 UART: [kat] SHA2-384
4,135,371 UART: [kat] SHA2-512-ACC
4,137,271 UART: [kat] ECC-384
4,146,902 UART: [kat] HMAC-384Kdf
4,151,298 UART: [kat] LMS
4,399,626 UART: [kat] --
4,400,588 UART: [update-reset] ++
5,304,770 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,305,975 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,357 >>> mbox cmd response: success
5,402,357 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,402,694 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,708 UART: [update-reset Success] --
5,411,773 UART: [state] Locking Datavault
5,412,523 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,127 UART: [state] Locking ICCM
5,413,547 UART: [exit] Launching FMC @ 0x40000130
5,418,876 UART:
5,418,892 UART: Running Caliptra FMC ...
5,419,300 UART:
5,419,354 UART: [state] CFI Enabled
5,508,689 UART: [art] Extend RT PCRs Done
5,509,117 UART: [art] Lock RT PCRs Done
5,510,486 UART: [art] Populate DV Done
5,518,707 UART: [fht] FMC Alias Private Key: 7
5,519,829 UART: [art] Derive CDI
5,520,109 UART: [art] Store in in slot 0x4
5,605,880 UART: [art] Derive Key Pair
5,606,240 UART: [art] Store priv key in slot 0x5
5,619,894 UART: [art] Derive Key Pair - Done
5,634,697 UART: [art] Signing Cert with AUTHO
5,635,177 UART: RITY.KEYID = 7
5,650,241 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,006 UART: [art] PUB.X = 559ED875FE813C3587F5FC47FAE299B5616EC1FFF85531769D25E6BBE3ED18E83685CB6494E647F3BC4CA4F2A0D47979
5,657,786 UART: [art] PUB.Y = F54C0DE165E28822BB833ED202CCF7586D41F435D5379CAB7B42AD2BA25F4D06402E77A8B498091C30403D1C3A923808
5,664,723 UART: [art] SIG.R = C0C74CFDC04788B312BEC2799247099ED8184B1F0E2C7BEE42533737F883CEADCB268E8C13246F648B4F048BA32A50F9
5,671,492 UART: [art] SIG.S = F7A793BE9C68336E16908C7C09A659427211EAB41FEBBDFBE72CD2298701C71AD368EBD32BF96D211088463DE9B8D2DA
5,695,167 UART: mbox::rt_entry...
5,695,539 UART: ____ _ _ _ ____ _____
5,696,323 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,697,123 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,697,891 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,698,659 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,699,427 UART: |_|
5,699,739 UART:
5,978,338 UART: [rt] Runtime listening for mailbox commands...
5,979,575 >>> mbox cmd response data (120 bytes)
5,979,576 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,979,687 UART:
5,979,703 UART: Running Caliptra ROM ...
5,980,111 UART:
5,980,166 UART: [state] CFI Enabled
5,983,044 UART: [state] LifecycleState = Unprovisioned
5,983,699 UART: [state] DebugLocked = No
5,984,213 UART: [state] WD Timer not started. Device not locked for debugging
5,985,447 UART: [kat] SHA2-256
6,791,097 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,795,222 UART: [kat] ++
6,795,374 UART: [kat] sha1
6,799,742 UART: [kat] SHA2-256
6,801,682 UART: [kat] SHA2-384
6,804,329 UART: [kat] SHA2-512-ACC
6,806,229 UART: [kat] ECC-384
6,815,550 UART: [kat] HMAC-384Kdf
6,820,130 UART: [kat] LMS
7,068,458 UART: [kat] --
7,069,010 UART: [update-reset] ++
7,974,616 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,975,691 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,072,073 >>> mbox cmd response: success
8,072,073 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,072,418 UART: [update-reset] Copying MAN_2 To MAN_1
8,080,432 UART: [update-reset Success] --
8,081,323 UART: [state] Locking Datavault
8,082,037 UART: [state] Locking PCR0, PCR1 and PCR31
8,082,641 UART: [state] Locking ICCM
8,083,115 UART: [exit] Launching FMC @ 0x40000130
8,088,444 UART:
8,088,460 UART: Running Caliptra FMC ...
8,088,868 UART:
8,088,922 UART: [state] CFI Enabled
8,177,911 UART: [art] Extend RT PCRs Done
8,178,339 UART: [art] Lock RT PCRs Done
8,179,476 UART: [art] Populate DV Done
8,187,839 UART: [fht] FMC Alias Private Key: 7
8,188,921 UART: [art] Derive CDI
8,189,201 UART: [art] Store in in slot 0x4
8,275,070 UART: [art] Derive Key Pair
8,275,430 UART: [art] Store priv key in slot 0x5
8,288,386 UART: [art] Derive Key Pair - Done
8,303,248 UART: [art] Signing Cert with AUTHO
8,303,728 UART: RITY.KEYID = 7
8,318,912 UART: [art] Erasing AUTHORITY.KEYID = 7
8,319,677 UART: [art] PUB.X = C05B42B4B933D37356B9334130086F1C9ABE422A78746B7E2AA15108B1DD6E120C3D24D6B5CA271E0A8CC41240BDF9D1
8,326,441 UART: [art] PUB.Y = E180A239FFADCB5994D30C5E62DB784743F5C9649675387D138EA38A1A66CC827C4B19490728C9E3CF794979D6559868
8,333,381 UART: [art] SIG.R = 65AE7F66915F01BC94882C45FE99E4D2585DB16F56F328187D4C9A94D5DC00823CAAEE2CD0F477C45860EDF17D6D9F06
8,340,133 UART: [art] SIG.S = 3F1A6A71960CC3B7F4479C6A2D9CD1CEB858EB95156576A44165C8A67AE4BBDF05748DC196BE909EE7540529386E99CA
8,363,797 UART: mbox::rt_entry...
8,364,169 UART: ____ _ _ _ ____ _____
8,364,953 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,365,753 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,366,521 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,367,289 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,368,057 UART: |_|
8,368,369 UART:
8,649,559 UART: [rt] Runtime listening for mailbox commands...
8,650,796 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,971 ready_for_fw is high
1,059,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,424 >>> mbox cmd response: success
2,687,254 UART:
2,687,270 UART: Running Caliptra FMC ...
2,687,678 UART:
2,687,732 UART: [state] CFI Enabled
2,698,359 UART: [fht] FMC Alias Private Key: 7
2,807,234 UART: [art] Extend RT PCRs Done
2,807,662 UART: [art] Lock RT PCRs Done
2,809,288 UART: [art] Populate DV Done
2,817,685 UART: [fht] FMC Alias Private Key: 7
2,818,767 UART: [art] Derive CDI
2,819,047 UART: [art] Store in in slot 0x4
2,904,710 UART: [art] Derive Key Pair
2,905,070 UART: [art] Store priv key in slot 0x5
2,917,836 UART: [art] Derive Key Pair - Done
2,932,529 UART: [art] Signing Cert with AUTHO
2,933,009 UART: RITY.KEYID = 7
2,948,269 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,034 UART: [art] PUB.X = A53F0A122E03042191F04AE8B715EDB7701F004E36C62B8561F31324BE17E99F194943312C1E89EA5F98A05167C0576D
2,955,767 UART: [art] PUB.Y = 15DBFC8293E5FA610C7BE3EFE59391E581172B5188CD8643B4384710FFC062E0F11F0FA95FB5D9A6ED162018DA724B84
2,962,719 UART: [art] SIG.R = 32508A4C968C5EFE4EF703B817A0BF36D1AB278218A59619A862C42063F4C1DBF8B0CC8D18B985222ED3A0C5E4C53208
2,969,489 UART: [art] SIG.S = 811323C2953B720CA3FBE1B64FC059C7E827C31290259660D6A3358D7BE59D79E432DE3444834A8B9889AE83B9681992
2,992,555 UART: Caliptra RT
2,992,808 UART: [state] CFI Enabled
3,100,485 UART: [rt] RT listening for mailbox commands...
3,101,155 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,217 UART: [rt]cmd =0x54514754, len=24
3,133,333 >>> mbox cmd response data (8 bytes)
3,133,334 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,109,636 >>> mbox cmd response: success
5,109,636 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,123,104 UART:
5,123,120 UART: Running Caliptra FMC ...
5,123,528 UART:
5,123,582 UART: [state] CFI Enabled
5,212,649 UART: [art] Extend RT PCRs Done
5,213,077 UART: [art] Lock RT PCRs Done
5,214,380 UART: [art] Populate DV Done
5,222,389 UART: [fht] FMC Alias Private Key: 7
5,223,335 UART: [art] Derive CDI
5,223,615 UART: [art] Store in in slot 0x4
5,309,406 UART: [art] Derive Key Pair
5,309,766 UART: [art] Store priv key in slot 0x5
5,322,068 UART: [art] Derive Key Pair - Done
5,337,208 UART: [art] Signing Cert with AUTHO
5,337,688 UART: RITY.KEYID = 7
5,352,788 UART: [art] Erasing AUTHORITY.KEYID = 7
5,353,553 UART: [art] PUB.X = F4883AC67BD333F5BDE400D166814C778C7571DA34D14BA84A2A51C7750148868FBDFBC7D0A05A4240900B46237F96FF
5,360,299 UART: [art] PUB.Y = 98E38B36232BBED2921E31FA8DCE1E8FE93C1FAC75BD22D698764B112FBE0D939CF15A2AAB17E0FAFF412871DFFBCBC5
5,367,274 UART: [art] SIG.R = 9EC702E3A0134DA865B880F0D001E8B5098A609C797ED28C1C12578FBE9AA82D4893C7A9F685DFF1378927F95BE24DEB
5,374,043 UART: [art] SIG.S = 352763B31B9E880CF470F4DCAC7A80BD95BD2DD4C935B2B82F70E7DCFBE9E4D39BC5EC3358340A51B72271B186CFE705
5,398,015 UART: mbox::rt_entry...
5,398,387 UART: ____ _ _ _ ____ _____
5,399,171 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,399,971 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,400,739 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,401,507 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,402,275 UART: |_|
5,402,587 UART:
5,684,425 UART: [rt] Runtime listening for mailbox commands...
5,685,662 >>> mbox cmd response data (120 bytes)
5,685,663 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,661,849 >>> mbox cmd response: success
7,661,849 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,675,085 UART:
7,675,101 UART: Running Caliptra FMC ...
7,675,509 UART:
7,675,563 UART: [state] CFI Enabled
7,764,946 UART: [art] Extend RT PCRs Done
7,765,374 UART: [art] Lock RT PCRs Done
7,766,707 UART: [art] Populate DV Done
7,775,106 UART: [fht] FMC Alias Private Key: 7
7,776,262 UART: [art] Derive CDI
7,776,542 UART: [art] Store in in slot 0x4
7,862,313 UART: [art] Derive Key Pair
7,862,673 UART: [art] Store priv key in slot 0x5
7,876,187 UART: [art] Derive Key Pair - Done
7,891,053 UART: [art] Signing Cert with AUTHO
7,891,533 UART: RITY.KEYID = 7
7,906,485 UART: [art] Erasing AUTHORITY.KEYID = 7
7,907,250 UART: [art] PUB.X = 817C36162A41E9DCDECB42FD1601E6C68C8F009F57DF43287612BA76E538E0A24E63286D7F1F7723C5673DC8C1321425
7,913,995 UART: [art] PUB.Y = D38157FC9E782DA99BF702CDF9AB80CB47D0488F67F620A19A690B1DC0D4F776381EF0CCEAC0A0571B8157CC79041144
7,920,946 UART: [art] SIG.R = A3E3CD362C1E5BDA189668D94097EFC7C65FD37D7920F63F097B37692A7BEE227119223A9355DD852ED395F2F82F9A39
7,927,717 UART: [art] SIG.S = CAA0BDC83B661B97FA71AC99B0604522A2BC97ADBFC4AAF8DDF110BE7BA5C447F0ABC113B35E03179F44CFBD3363EBD4
7,952,223 UART: mbox::rt_entry...
7,952,595 UART: ____ _ _ _ ____ _____
7,953,379 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,954,179 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,954,947 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,955,715 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,956,483 UART: |_|
7,956,795 UART:
8,239,508 UART: [rt] Runtime listening for mailbox commands...
8,240,745 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,969 UART: [state] LifecycleState = Unprovisioned
85,624 UART: [state] DebugLocked = No
86,142 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [kat] SHA2-256
893,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,252 UART: [kat] ++
897,404 UART: [kat] sha1
901,796 UART: [kat] SHA2-256
903,736 UART: [kat] SHA2-384
906,541 UART: [kat] SHA2-512-ACC
908,442 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
922,871 UART: [kat] LMS
1,171,199 UART: [kat] --
1,172,356 UART: [cold-reset] ++
1,172,896 UART: [fht] FHT @ 0x50003400
1,175,615 UART: [idev] ++
1,175,783 UART: [idev] CDI.KEYID = 6
1,176,143 UART: [idev] SUBJECT.KEYID = 7
1,176,567 UART: [idev] UDS.KEYID = 0
1,176,912 ready_for_fw is high
1,176,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,635 UART: [idev] Erasing UDS.KEYID = 0
1,201,538 UART: [idev] Sha1 KeyId Algorithm
1,209,956 UART: [idev] --
1,210,982 UART: [ldev] ++
1,211,150 UART: [ldev] CDI.KEYID = 6
1,211,513 UART: [ldev] SUBJECT.KEYID = 5
1,211,939 UART: [ldev] AUTHORITY.KEYID = 7
1,212,402 UART: [ldev] FE.KEYID = 1
1,217,470 UART: [ldev] Erasing FE.KEYID = 1
1,243,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,466 UART: [ldev] --
1,282,869 UART: [fwproc] Wait for Commands...
1,283,553 UART: [fwproc] Recv command 0x46574c44
1,284,281 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,683 >>> mbox cmd response: success
2,777,929 UART: [afmc] ++
2,778,097 UART: [afmc] CDI.KEYID = 6
2,778,459 UART: [afmc] SUBJECT.KEYID = 7
2,778,884 UART: [afmc] AUTHORITY.KEYID = 5
2,814,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,932 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,660 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,545 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,264 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,156 UART: [afmc] --
2,858,208 UART: [cold-reset] --
2,858,970 UART: [state] Locking Datavault
2,860,329 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,933 UART: [state] Locking ICCM
2,861,465 UART: [exit] Launching FMC @ 0x40000130
2,866,794 UART:
2,866,810 UART: Running Caliptra FMC ...
2,867,218 UART:
2,867,361 UART: [state] CFI Enabled
2,877,790 UART: [fht] FMC Alias Private Key: 7
2,985,211 UART: [art] Extend RT PCRs Done
2,985,639 UART: [art] Lock RT PCRs Done
2,987,037 UART: [art] Populate DV Done
2,995,218 UART: [fht] FMC Alias Private Key: 7
2,996,288 UART: [art] Derive CDI
2,996,568 UART: [art] Store in in slot 0x4
3,082,099 UART: [art] Derive Key Pair
3,082,459 UART: [art] Store priv key in slot 0x5
3,095,643 UART: [art] Derive Key Pair - Done
3,110,493 UART: [art] Signing Cert with AUTHO
3,110,973 UART: RITY.KEYID = 7
3,126,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,880 UART: [art] PUB.X = F67FE8A3A26F3003F799EEA85FBC70C8324B0E8796BAD82206BAB67A2B63AA1BB99633D14DC6079F3BD9469DF6EAEBBB
3,133,660 UART: [art] PUB.Y = 221EF7AB2120372779D4FBE6D1652A120AF94985E3AC428EF86A2F4B23DDC8307211C392AC82928CF7FF5804FD832D6D
3,140,610 UART: [art] SIG.R = 1CA7DEBB12603B481852330B84CF0A93B7D336F057A9A9C402C050C2568DD1BDB6FBAA0CB26CEE61F4CABC063FC05249
3,147,383 UART: [art] SIG.S = E08C32997D107C861D1F9764F0A7D68CC3C67D9AEF47A9448DAFEE0E0940A83A9E5414B66BCA5E4901DA56F60D733E3D
3,170,742 UART: Caliptra RT
3,171,087 UART: [state] CFI Enabled
3,278,448 UART: [rt] RT listening for mailbox commands...
3,279,118 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,948 UART: [rt]cmd =0x54514754, len=24
3,310,840 >>> mbox cmd response data (8 bytes)
3,310,841 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,530 UART:
3,311,546 UART: Running Caliptra ROM ...
3,311,954 UART:
3,312,096 UART: [state] CFI Enabled
3,315,098 UART: [state] LifecycleState = Unprovisioned
3,315,753 UART: [state] DebugLocked = No
3,316,435 UART: [state] WD Timer not started. Device not locked for debugging
3,317,651 UART: [kat] SHA2-256
4,123,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,127,426 UART: [kat] ++
4,127,578 UART: [kat] sha1
4,131,840 UART: [kat] SHA2-256
4,133,780 UART: [kat] SHA2-384
4,136,531 UART: [kat] SHA2-512-ACC
4,138,431 UART: [kat] ECC-384
4,148,436 UART: [kat] HMAC-384Kdf
4,153,110 UART: [kat] LMS
4,401,438 UART: [kat] --
4,402,258 UART: [update-reset] ++
5,306,300 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,307,273 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,403,655 >>> mbox cmd response: success
5,403,655 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,403,812 UART: [update-reset] Copying MAN_2 To MAN_1
5,411,826 UART: [update-reset Success] --
5,412,803 UART: [state] Locking Datavault
5,413,719 UART: [state] Locking PCR0, PCR1 and PCR31
5,414,323 UART: [state] Locking ICCM
5,414,763 UART: [exit] Launching FMC @ 0x40000130
5,420,092 UART:
5,420,108 UART: Running Caliptra FMC ...
5,420,516 UART:
5,420,659 UART: [state] CFI Enabled
5,509,746 UART: [art] Extend RT PCRs Done
5,510,174 UART: [art] Lock RT PCRs Done
5,511,793 UART: [art] Populate DV Done
5,520,338 UART: [fht] FMC Alias Private Key: 7
5,521,346 UART: [art] Derive CDI
5,521,626 UART: [art] Store in in slot 0x4
5,606,959 UART: [art] Derive Key Pair
5,607,319 UART: [art] Store priv key in slot 0x5
5,620,579 UART: [art] Derive Key Pair - Done
5,635,448 UART: [art] Signing Cert with AUTHO
5,635,928 UART: RITY.KEYID = 7
5,651,342 UART: [art] Erasing AUTHORITY.KEYID = 7
5,652,107 UART: [art] PUB.X = 48D366194280F56A23E959C7603C82AE3BCB6B830BD82D3E98068B6A95DB367748B87CF94782395747C8D2DF52462962
5,658,863 UART: [art] PUB.Y = ABC259D797269FB7FF12EA6F7FFBF45F8CB780978C86E023831A164946550FF54B8A3BC0D90DE51327C435F2E8A8838C
5,665,815 UART: [art] SIG.R = 66A001DB7212FA6A1A5636AF4CEE200BFD29A916BE6237CB2B35EC8E61AE541DF65BAE0A3C79F1BC1ED9A17FDB8E598C
5,672,602 UART: [art] SIG.S = 7262B3F87533EE49939530632C49868B71FA5888C72A53A7214B645449F1378A03EBACA9CC5825060C4552CF2DC99C1F
5,696,464 UART: mbox::rt_entry...
5,696,836 UART: ____ _ _ _ ____ _____
5,697,620 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,698,420 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,699,188 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,699,956 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,700,724 UART: |_|
5,701,036 UART:
5,980,830 UART: [rt] Runtime listening for mailbox commands...
5,982,067 >>> mbox cmd response data (120 bytes)
5,982,068 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,982,179 UART:
5,982,195 UART: Running Caliptra ROM ...
5,982,603 UART:
5,982,745 UART: [state] CFI Enabled
5,985,261 UART: [state] LifecycleState = Unprovisioned
5,985,916 UART: [state] DebugLocked = No
5,986,416 UART: [state] WD Timer not started. Device not locked for debugging
5,987,616 UART: [kat] SHA2-256
6,793,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,797,391 UART: [kat] ++
6,797,543 UART: [kat] sha1
6,801,813 UART: [kat] SHA2-256
6,803,753 UART: [kat] SHA2-384
6,806,484 UART: [kat] SHA2-512-ACC
6,808,384 UART: [kat] ECC-384
6,818,249 UART: [kat] HMAC-384Kdf
6,822,735 UART: [kat] LMS
7,071,063 UART: [kat] --
7,072,033 UART: [update-reset] ++
7,976,155 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,977,352 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,073,734 >>> mbox cmd response: success
8,073,734 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,073,843 UART: [update-reset] Copying MAN_2 To MAN_1
8,081,857 UART: [update-reset Success] --
8,082,732 UART: [state] Locking Datavault
8,083,714 UART: [state] Locking PCR0, PCR1 and PCR31
8,084,318 UART: [state] Locking ICCM
8,084,906 UART: [exit] Launching FMC @ 0x40000130
8,090,235 UART:
8,090,251 UART: Running Caliptra FMC ...
8,090,659 UART:
8,090,802 UART: [state] CFI Enabled
8,180,001 UART: [art] Extend RT PCRs Done
8,180,429 UART: [art] Lock RT PCRs Done
8,181,868 UART: [art] Populate DV Done
8,190,127 UART: [fht] FMC Alias Private Key: 7
8,191,269 UART: [art] Derive CDI
8,191,549 UART: [art] Store in in slot 0x4
8,277,612 UART: [art] Derive Key Pair
8,277,972 UART: [art] Store priv key in slot 0x5
8,291,462 UART: [art] Derive Key Pair - Done
8,306,631 UART: [art] Signing Cert with AUTHO
8,307,111 UART: RITY.KEYID = 7
8,322,305 UART: [art] Erasing AUTHORITY.KEYID = 7
8,323,070 UART: [art] PUB.X = 2AFF5110591BBBC5DD0CB6FAD1B2F0F6195CF5900228D9CD011D3E6833694F80FEBD3B4A647DB4EEA8C7DC3D5A220F1B
8,329,852 UART: [art] PUB.Y = 83718AA6437855EE4297419AE50A5EEB5573AC5B4E95FFEA62E0F95EE92C732ADDC26A0A622598C1913ECE10869324EB
8,336,804 UART: [art] SIG.R = A215481B42646535049ED3B1D2C2140270D03D2307CBEFA08773DBD351755973211E10DBDBFB5457817FB37D979D645B
8,343,561 UART: [art] SIG.S = 68D097E01933D909CFE7EFB948E7A1AA273606B41B7C595C20BB10B7FFB07FAD09CEABD45A584AC400ED7822F2C63120
8,367,081 UART: mbox::rt_entry...
8,367,453 UART: ____ _ _ _ ____ _____
8,368,237 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,369,037 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,369,805 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,370,573 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,371,341 UART: |_|
8,371,653 UART:
8,650,919 UART: [rt] Runtime listening for mailbox commands...
8,652,156 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,540 ready_for_fw is high
1,060,540 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,384 >>> mbox cmd response: success
2,691,068 UART:
2,691,084 UART: Running Caliptra FMC ...
2,691,492 UART:
2,691,635 UART: [state] CFI Enabled
2,702,228 UART: [fht] FMC Alias Private Key: 7
2,810,509 UART: [art] Extend RT PCRs Done
2,810,937 UART: [art] Lock RT PCRs Done
2,812,349 UART: [art] Populate DV Done
2,820,646 UART: [fht] FMC Alias Private Key: 7
2,821,770 UART: [art] Derive CDI
2,822,050 UART: [art] Store in in slot 0x4
2,907,703 UART: [art] Derive Key Pair
2,908,063 UART: [art] Store priv key in slot 0x5
2,921,451 UART: [art] Derive Key Pair - Done
2,936,372 UART: [art] Signing Cert with AUTHO
2,936,852 UART: RITY.KEYID = 7
2,951,898 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,663 UART: [art] PUB.X = A888B3C63B6B3247E8E0C35F5E607C98AA382E7C5865A7B91114FED0839EC34670AA642AFF25CD3F8DC2F87E13F532FE
2,959,445 UART: [art] PUB.Y = 4E4B482D94FE21F42409ED728ADB2916BDC5749D923E5E4CFC67BD4C053C8813364B63F3D3EF34CF0930A3855D90ED65
2,966,394 UART: [art] SIG.R = E02B88F873A4473408859CE60E2FAA2687C153BD4E76704175587C582EE5AB01B047C1D8DB8AB5EA8E4E66789453AB42
2,973,157 UART: [art] SIG.S = 2133FA01AD4990099D11E3D9559B1B8B0F6766A4BF725BE22A718BE01FA16EE6D604BE0AD557B96B5E3F65134EB1EF6D
2,997,373 UART: Caliptra RT
2,997,718 UART: [state] CFI Enabled
3,104,853 UART: [rt] RT listening for mailbox commands...
3,105,523 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,647 UART: [rt]cmd =0x54514754, len=24
3,137,761 >>> mbox cmd response data (8 bytes)
3,137,762 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,114,549 >>> mbox cmd response: success
5,114,549 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,127,687 UART:
5,127,703 UART: Running Caliptra FMC ...
5,128,111 UART:
5,128,254 UART: [state] CFI Enabled
5,217,349 UART: [art] Extend RT PCRs Done
5,217,777 UART: [art] Lock RT PCRs Done
5,219,070 UART: [art] Populate DV Done
5,227,407 UART: [fht] FMC Alias Private Key: 7
5,228,493 UART: [art] Derive CDI
5,228,773 UART: [art] Store in in slot 0x4
5,314,578 UART: [art] Derive Key Pair
5,314,938 UART: [art] Store priv key in slot 0x5
5,327,698 UART: [art] Derive Key Pair - Done
5,342,221 UART: [art] Signing Cert with AUTHO
5,342,701 UART: RITY.KEYID = 7
5,357,565 UART: [art] Erasing AUTHORITY.KEYID = 7
5,358,330 UART: [art] PUB.X = 8F1A26D2DCD95FFA8A2A0931120CD4E6AEF5CCB2B108D34FFE5FDED91D0E809F29697A54C544C27BEA155A1505F47FB6
5,365,107 UART: [art] PUB.Y = 42440B2C6DC24350EA55BCA85A3F677CE3864143E4EE2F928D1284433E499C265C52E9E28A098F6B3A69DB7901DF4651
5,372,048 UART: [art] SIG.R = F4F0BBA43E3BD3604632C5F89EB28B3FFB8915D87C4D72F75173946EF2E9ED3C38158D08C38319F4916CA8536802B571
5,378,814 UART: [art] SIG.S = 758FB1FEB4961C3DD37138448DA690DA599FF382D76DD0D13477E61DA5B2497A89117A1F6D9DD4B19C6CCD4197BA3524
5,402,259 UART: mbox::rt_entry...
5,402,631 UART: ____ _ _ _ ____ _____
5,403,415 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,404,215 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,404,983 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,405,751 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,406,519 UART: |_|
5,406,831 UART:
5,688,779 UART: [rt] Runtime listening for mailbox commands...
5,690,016 >>> mbox cmd response data (120 bytes)
5,690,017 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,667,298 >>> mbox cmd response: success
7,667,298 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,680,718 UART:
7,680,734 UART: Running Caliptra FMC ...
7,681,142 UART:
7,681,285 UART: [state] CFI Enabled
7,770,782 UART: [art] Extend RT PCRs Done
7,771,210 UART: [art] Lock RT PCRs Done
7,772,337 UART: [art] Populate DV Done
7,780,592 UART: [fht] FMC Alias Private Key: 7
7,781,766 UART: [art] Derive CDI
7,782,046 UART: [art] Store in in slot 0x4
7,867,767 UART: [art] Derive Key Pair
7,868,127 UART: [art] Store priv key in slot 0x5
7,881,979 UART: [art] Derive Key Pair - Done
7,896,570 UART: [art] Signing Cert with AUTHO
7,897,050 UART: RITY.KEYID = 7
7,912,492 UART: [art] Erasing AUTHORITY.KEYID = 7
7,913,257 UART: [art] PUB.X = F089D39F457BC0F27DE4D7853B23B842FA45167943EA59938FC8E2F3A4BF52E0C1375B693D5C9FE6F1B95443CE137580
7,920,031 UART: [art] PUB.Y = 9CF3326E7D5B1A1EC142819B1B52EFB448CB355BABA166F619CCFD0CC5A0C258D1CF80340F7BE5F79A7396A545559FBA
7,926,993 UART: [art] SIG.R = 33742617C42D8DB8284F1D4CE45A7652B158FE99BD2CE75CC3AA71C5AC6028FDA6D95228AF9B808AC2532FCF2059AB2D
7,933,777 UART: [art] SIG.S = F218321BE467EEE0D3DB8569D59DCF707126525558A1CC5F89F525DB697043B6F4B2CFB661309B0C185E5057A1C6155E
7,957,447 UART: mbox::rt_entry...
7,957,819 UART: ____ _ _ _ ____ _____
7,958,603 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,959,403 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,960,171 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,960,939 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,961,707 UART: |_|
7,962,019 UART:
8,244,191 UART: [rt] Runtime listening for mailbox commands...
8,245,428 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,728 UART: [state] LifecycleState = Unprovisioned
85,383 UART: [state] DebugLocked = No
85,905 UART: [state] WD Timer not started. Device not locked for debugging
87,142 UART: [kat] SHA2-256
890,692 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,821 UART: [kat] ++
894,973 UART: [kat] sha1
899,201 UART: [kat] SHA2-256
901,141 UART: [kat] SHA2-384
903,666 UART: [kat] SHA2-512-ACC
905,567 UART: [kat] ECC-384
915,184 UART: [kat] HMAC-384Kdf
919,764 UART: [kat] LMS
1,168,076 UART: [kat] --
1,169,249 UART: [cold-reset] ++
1,169,637 UART: [fht] FHT @ 0x50003400
1,172,427 UART: [idev] ++
1,172,595 UART: [idev] CDI.KEYID = 6
1,172,956 UART: [idev] SUBJECT.KEYID = 7
1,173,381 UART: [idev] UDS.KEYID = 0
1,173,727 ready_for_fw is high
1,173,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,531 UART: [idev] Erasing UDS.KEYID = 0
1,198,531 UART: [idev] Sha1 KeyId Algorithm
1,207,393 UART: [idev] --
1,208,526 UART: [ldev] ++
1,208,694 UART: [ldev] CDI.KEYID = 6
1,209,058 UART: [ldev] SUBJECT.KEYID = 5
1,209,485 UART: [ldev] AUTHORITY.KEYID = 7
1,209,948 UART: [ldev] FE.KEYID = 1
1,215,346 UART: [ldev] Erasing FE.KEYID = 1
1,242,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,316 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,517 UART: [fwproc] Recv command 0x46574c44
1,283,250 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,594 >>> mbox cmd response: success
2,774,847 UART: [afmc] ++
2,775,015 UART: [afmc] CDI.KEYID = 6
2,775,378 UART: [afmc] SUBJECT.KEYID = 7
2,775,804 UART: [afmc] AUTHORITY.KEYID = 5
2,811,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,732 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,344 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,063 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,828 UART: [afmc] --
2,854,802 UART: [cold-reset] --
2,855,560 UART: [state] Locking Datavault
2,856,787 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,391 UART: [state] Locking ICCM
2,857,833 UART: [exit] Launching FMC @ 0x40000130
2,863,162 UART:
2,863,178 UART: Running Caliptra FMC ...
2,863,586 UART:
2,863,640 UART: [state] CFI Enabled
2,873,821 UART: [fht] FMC Alias Private Key: 7
2,982,026 UART: [art] Extend RT PCRs Done
2,982,454 UART: [art] Lock RT PCRs Done
2,984,342 UART: [art] Populate DV Done
2,992,859 UART: [fht] FMC Alias Private Key: 7
2,993,969 UART: [art] Derive CDI
2,994,249 UART: [art] Store in in slot 0x4
3,080,044 UART: [art] Derive Key Pair
3,080,404 UART: [art] Store priv key in slot 0x5
3,093,260 UART: [art] Derive Key Pair - Done
3,108,329 UART: [art] Signing Cert with AUTHO
3,108,809 UART: RITY.KEYID = 7
3,124,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,794 UART: [art] PUB.X = EAEC4F7993048BB5489E75EB0CA37245284D626D3C41DF9BC24DF02492BD305B5E6B474F81089D940B1CBB2662AC7A67
3,131,560 UART: [art] PUB.Y = 3BC7C419E6BEFC31C574F8041021BCE2454A76D048016C698C2526FEEB6EC9DFC24EE4787A2C31AC56C1131CC09DC35D
3,138,518 UART: [art] SIG.R = 626DBCDC9E4865F2D1C1C328D1FBEC34318C36E92FED6C21BDEEF77264EA46E6088503C8A564302DBE50F0BB3883E4CE
3,145,300 UART: [art] SIG.S = 92E3BD7053B7143D51BC98030060465630046BD6B269B91C40431FD515348D90EBB23D2C39CAC57DBD4F1DF5B742F84E
3,169,159 UART: Caliptra RT
3,169,412 UART: [state] CFI Enabled
3,276,083 UART: [rt] RT listening for mailbox commands...
3,276,753 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,761 UART: [rt]cmd =0x54514754, len=24
3,308,965 >>> mbox cmd response data (8 bytes)
3,308,966 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,781 UART:
3,309,797 UART: Running Caliptra ROM ...
3,310,205 UART:
3,310,260 UART: [state] CFI Enabled
3,313,046 UART: [state] LifecycleState = Unprovisioned
3,313,701 UART: [state] DebugLocked = No
3,314,213 UART: [state] WD Timer not started. Device not locked for debugging
3,315,423 UART: [kat] SHA2-256
4,118,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,123,102 UART: [kat] ++
4,123,254 UART: [kat] sha1
4,127,454 UART: [kat] SHA2-256
4,129,394 UART: [kat] SHA2-384
4,132,029 UART: [kat] SHA2-512-ACC
4,133,929 UART: [kat] ECC-384
4,143,286 UART: [kat] HMAC-384Kdf
4,147,892 UART: [kat] LMS
4,396,204 UART: [kat] --
4,396,978 UART: [update-reset] ++
5,301,809 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,302,850 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,399,232 >>> mbox cmd response: success
5,399,232 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,399,419 UART: [update-reset] Copying MAN_2 To MAN_1
5,407,433 UART: [update-reset Success] --
5,408,156 UART: [state] Locking Datavault
5,408,984 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,588 UART: [state] Locking ICCM
5,410,192 UART: [exit] Launching FMC @ 0x40000130
5,415,521 UART:
5,415,537 UART: Running Caliptra FMC ...
5,415,945 UART:
5,415,999 UART: [state] CFI Enabled
5,505,096 UART: [art] Extend RT PCRs Done
5,505,524 UART: [art] Lock RT PCRs Done
5,506,737 UART: [art] Populate DV Done
5,515,084 UART: [fht] FMC Alias Private Key: 7
5,516,184 UART: [art] Derive CDI
5,516,464 UART: [art] Store in in slot 0x4
5,602,325 UART: [art] Derive Key Pair
5,602,685 UART: [art] Store priv key in slot 0x5
5,615,833 UART: [art] Derive Key Pair - Done
5,630,401 UART: [art] Signing Cert with AUTHO
5,630,881 UART: RITY.KEYID = 7
5,646,225 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,990 UART: [art] PUB.X = 759D2486F230A31690877935E620C7B13FBF55D7434B7DDACED34D53C8C5364305302DC9F26995F2030E409098DBA3B8
5,653,747 UART: [art] PUB.Y = 164837313447553D8AEDE5A0493679E5A833BFB24471DC4C463B9ED4989EC6274972174AF517E4A51EB0D82C00FEA2C8
5,660,675 UART: [art] SIG.R = 7D96D38EAB2C8A87C2864A6B087F8943ADEFDD50ACCFA13D2DFBD1F822CB60F4A2E697B1F67FA934C7264FB4B4395CCD
5,667,468 UART: [art] SIG.S = A4374402D8B21DFF9E64F9CDA95E0692B92466B041CBD7F86AEC1E9026BE0D0FC9A6E7778FD2F4F14C17F3EE259A7E60
5,691,371 UART: mbox::rt_entry...
5,691,743 UART: ____ _ _ _ ____ _____
5,692,527 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,327 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,694,095 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,863 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,631 UART: |_|
5,695,943 UART:
5,980,631 UART: [rt] Runtime listening for mailbox commands...
5,981,868 >>> mbox cmd response data (120 bytes)
5,981,869 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,981,980 UART:
5,981,996 UART: Running Caliptra ROM ...
5,982,404 UART:
5,982,459 UART: [state] CFI Enabled
5,984,865 UART: [state] LifecycleState = Unprovisioned
5,985,520 UART: [state] DebugLocked = No
5,986,064 UART: [state] WD Timer not started. Device not locked for debugging
5,987,212 UART: [kat] SHA2-256
6,790,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,794,891 UART: [kat] ++
6,795,043 UART: [kat] sha1
6,799,413 UART: [kat] SHA2-256
6,801,353 UART: [kat] SHA2-384
6,804,028 UART: [kat] SHA2-512-ACC
6,805,928 UART: [kat] ECC-384
6,815,427 UART: [kat] HMAC-384Kdf
6,820,059 UART: [kat] LMS
7,068,371 UART: [kat] --
7,069,237 UART: [update-reset] ++
7,973,074 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,974,173 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,070,555 >>> mbox cmd response: success
8,070,555 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,070,738 UART: [update-reset] Copying MAN_2 To MAN_1
8,078,752 UART: [update-reset Success] --
8,079,761 UART: [state] Locking Datavault
8,080,737 UART: [state] Locking PCR0, PCR1 and PCR31
8,081,341 UART: [state] Locking ICCM
8,081,791 UART: [exit] Launching FMC @ 0x40000130
8,087,120 UART:
8,087,136 UART: Running Caliptra FMC ...
8,087,544 UART:
8,087,598 UART: [state] CFI Enabled
8,176,309 UART: [art] Extend RT PCRs Done
8,176,737 UART: [art] Lock RT PCRs Done
8,178,194 UART: [art] Populate DV Done
8,186,449 UART: [fht] FMC Alias Private Key: 7
8,187,517 UART: [art] Derive CDI
8,187,797 UART: [art] Store in in slot 0x4
8,273,534 UART: [art] Derive Key Pair
8,273,894 UART: [art] Store priv key in slot 0x5
8,287,550 UART: [art] Derive Key Pair - Done
8,302,312 UART: [art] Signing Cert with AUTHO
8,302,792 UART: RITY.KEYID = 7
8,318,390 UART: [art] Erasing AUTHORITY.KEYID = 7
8,319,155 UART: [art] PUB.X = A2768140CF70955D189BC6A9D3AE4266E702F1595CF9D95BFF7062277037062C7733C43C44A2CA0DCB11767C57F525D7
8,325,914 UART: [art] PUB.Y = 29E8FF6228337837D4764E98F87AAEACBC15821F1A5FA3B49C6DC19ABC0EAD63CC0C747BEAF03A48F757BF7BAB96932F
8,332,880 UART: [art] SIG.R = 45CC891895F6FAFDAC8D5BFC855BC0EAD471C12F2A711BE48EA39879ECAD18B188A424C41620EF35124236B6201D60AA
8,339,664 UART: [art] SIG.S = 2C7C63D3FF62E3C2484FE36182ACD4979D553A8CEA05BC416B60ABC50A85FCFD0702D5F7C580C982759AB9D89537C922
8,363,771 UART: mbox::rt_entry...
8,364,143 UART: ____ _ _ _ ____ _____
8,364,927 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,365,727 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,366,495 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,367,263 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,368,031 UART: |_|
8,368,343 UART:
8,654,151 UART: [rt] Runtime listening for mailbox commands...
8,655,388 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,914 ready_for_fw is high
1,055,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,080 >>> mbox cmd response: success
2,685,586 UART:
2,685,602 UART: Running Caliptra FMC ...
2,686,010 UART:
2,686,064 UART: [state] CFI Enabled
2,696,611 UART: [fht] FMC Alias Private Key: 7
2,804,332 UART: [art] Extend RT PCRs Done
2,804,760 UART: [art] Lock RT PCRs Done
2,806,474 UART: [art] Populate DV Done
2,814,875 UART: [fht] FMC Alias Private Key: 7
2,815,921 UART: [art] Derive CDI
2,816,201 UART: [art] Store in in slot 0x4
2,901,642 UART: [art] Derive Key Pair
2,902,002 UART: [art] Store priv key in slot 0x5
2,915,646 UART: [art] Derive Key Pair - Done
2,930,555 UART: [art] Signing Cert with AUTHO
2,931,035 UART: RITY.KEYID = 7
2,945,491 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,256 UART: [art] PUB.X = 6FDC3D4E43E8D507A586A07A52B39F11266C0EC690AD98DD23DF84347CFA8D6846FFD54C3E4A696501E2AC91B9BB8585
2,953,029 UART: [art] PUB.Y = 6165C27EE0994037586EFB8106584945B440F3233357EFF06DFEE7B34FA80992C3846DEC3DF2F1ED74D206FD70DB830E
2,959,971 UART: [art] SIG.R = CDE52694194A01DE77B11BC66FACE9773EA813731A634BD071DBCF9520338DD19F1755F112A6FB68C4930AFE25B939EC
2,966,745 UART: [art] SIG.S = 232A698C4EEDC5BF753E5E3640FAF99C7CC6088455B3604BBF3EB4B54DEFED84C19202261E169CDFEA8D603EC83CCFBC
2,990,350 UART: Caliptra RT
2,990,603 UART: [state] CFI Enabled
3,097,432 UART: [rt] RT listening for mailbox commands...
3,098,102 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,836 UART: [rt]cmd =0x54514754, len=24
3,129,560 >>> mbox cmd response data (8 bytes)
3,129,561 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,102,352 >>> mbox cmd response: success
5,102,352 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,115,854 UART:
5,115,870 UART: Running Caliptra FMC ...
5,116,278 UART:
5,116,332 UART: [state] CFI Enabled
5,205,373 UART: [art] Extend RT PCRs Done
5,205,801 UART: [art] Lock RT PCRs Done
5,207,076 UART: [art] Populate DV Done
5,215,355 UART: [fht] FMC Alias Private Key: 7
5,216,525 UART: [art] Derive CDI
5,216,805 UART: [art] Store in in slot 0x4
5,302,482 UART: [art] Derive Key Pair
5,302,842 UART: [art] Store priv key in slot 0x5
5,315,994 UART: [art] Derive Key Pair - Done
5,330,622 UART: [art] Signing Cert with AUTHO
5,331,102 UART: RITY.KEYID = 7
5,346,222 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,987 UART: [art] PUB.X = FE8E6A3F29E91CD693D1909B2AD7C9B720F76E65D0F4C93136D254E7CD89FE7CD8070658B073A8C4705EE3B9AC28785D
5,353,761 UART: [art] PUB.Y = E80C69FFEEA45F19043A25C8B3376AC6FCA5143FECBA8517C30AAD74A4FB173946A72202323054BE9F356F50F076341C
5,360,707 UART: [art] SIG.R = FFEAAFB6B35FDAF61B37092918645E8F0DF10185AB7381AAAB1D4837AD02D00556372793D517D053972D4D8356C277EE
5,367,468 UART: [art] SIG.S = 3F861CD077413805DD845AE1F71AFFAC9E296C48947F4185E0576CCCE8349A5175A2C4EAD5CC6F2ED59EEC8FE8002197
5,391,240 UART: mbox::rt_entry...
5,391,612 UART: ____ _ _ _ ____ _____
5,392,396 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,393,196 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,393,964 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,394,732 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,395,500 UART: |_|
5,395,812 UART:
5,671,206 UART: [rt] Runtime listening for mailbox commands...
5,672,443 >>> mbox cmd response data (120 bytes)
5,672,444 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,642,751 >>> mbox cmd response: success
7,642,751 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,656,519 UART:
7,656,535 UART: Running Caliptra FMC ...
7,656,943 UART:
7,656,997 UART: [state] CFI Enabled
7,745,950 UART: [art] Extend RT PCRs Done
7,746,378 UART: [art] Lock RT PCRs Done
7,747,617 UART: [art] Populate DV Done
7,755,878 UART: [fht] FMC Alias Private Key: 7
7,757,032 UART: [art] Derive CDI
7,757,312 UART: [art] Store in in slot 0x4
7,842,873 UART: [art] Derive Key Pair
7,843,233 UART: [art] Store priv key in slot 0x5
7,856,473 UART: [art] Derive Key Pair - Done
7,871,226 UART: [art] Signing Cert with AUTHO
7,871,706 UART: RITY.KEYID = 7
7,887,228 UART: [art] Erasing AUTHORITY.KEYID = 7
7,887,993 UART: [art] PUB.X = 5743FDCAE26734D10A0AEB6CE02D4570C60D376A5DCE95CB5EE7930C2D26124FF943F573997DBDCA1E1944E1DDA12854
7,894,765 UART: [art] PUB.Y = DB2AC45294513D5C0524CD5C0EC73E23400D3FAA1AEC39108F5698A0A2DD78B1E349A8B05603E708275B90082585D32E
7,901,699 UART: [art] SIG.R = 0BFBF71E09A146788CA8FCFBCBBAAB4EE0B8A5EFE401FD769F1E5A37FFD58090DCCC07AE2639FDE84E262FED4EC35D46
7,908,493 UART: [art] SIG.S = 959A01084A27AA542CD6EFF417454BA238EE7B4318A9261A2C6E35AC0BF0EC4E138CA5FBB6C76128B334BDC5CD87B3C4
7,932,377 UART: mbox::rt_entry...
7,932,749 UART: ____ _ _ _ ____ _____
7,933,533 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,934,333 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,935,101 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,935,869 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,936,637 UART: |_|
7,936,949 UART:
8,216,151 UART: [rt] Runtime listening for mailbox commands...
8,217,388 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,774 UART: [kat] SHA2-256
901,714 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
915,839 UART: [kat] HMAC-384Kdf
920,309 UART: [kat] LMS
1,168,621 UART: [kat] --
1,169,534 UART: [cold-reset] ++
1,169,976 UART: [fht] FHT @ 0x50003400
1,172,496 UART: [idev] ++
1,172,664 UART: [idev] CDI.KEYID = 6
1,173,025 UART: [idev] SUBJECT.KEYID = 7
1,173,450 UART: [idev] UDS.KEYID = 0
1,173,796 ready_for_fw is high
1,173,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,468 UART: [idev] Erasing UDS.KEYID = 0
1,198,680 UART: [idev] Sha1 KeyId Algorithm
1,207,736 UART: [idev] --
1,208,771 UART: [ldev] ++
1,208,939 UART: [ldev] CDI.KEYID = 6
1,209,303 UART: [ldev] SUBJECT.KEYID = 5
1,209,730 UART: [ldev] AUTHORITY.KEYID = 7
1,210,193 UART: [ldev] FE.KEYID = 1
1,215,303 UART: [ldev] Erasing FE.KEYID = 1
1,241,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,691 UART: [ldev] --
1,281,061 UART: [fwproc] Wait for Commands...
1,281,804 UART: [fwproc] Recv command 0x46574c44
1,282,537 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,797 >>> mbox cmd response: success
2,776,010 UART: [afmc] ++
2,776,178 UART: [afmc] CDI.KEYID = 6
2,776,541 UART: [afmc] SUBJECT.KEYID = 7
2,776,967 UART: [afmc] AUTHORITY.KEYID = 5
2,812,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,541 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,270 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,153 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,872 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,729 UART: [afmc] --
2,855,681 UART: [cold-reset] --
2,856,441 UART: [state] Locking Datavault
2,857,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,312 UART: [state] Locking ICCM
2,858,964 UART: [exit] Launching FMC @ 0x40000130
2,864,293 UART:
2,864,309 UART: Running Caliptra FMC ...
2,864,717 UART:
2,864,860 UART: [state] CFI Enabled
2,875,615 UART: [fht] FMC Alias Private Key: 7
2,984,094 UART: [art] Extend RT PCRs Done
2,984,522 UART: [art] Lock RT PCRs Done
2,986,146 UART: [art] Populate DV Done
2,994,565 UART: [fht] FMC Alias Private Key: 7
2,995,641 UART: [art] Derive CDI
2,995,921 UART: [art] Store in in slot 0x4
3,081,876 UART: [art] Derive Key Pair
3,082,236 UART: [art] Store priv key in slot 0x5
3,095,402 UART: [art] Derive Key Pair - Done
3,110,247 UART: [art] Signing Cert with AUTHO
3,110,727 UART: RITY.KEYID = 7
3,126,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,796 UART: [art] PUB.X = 68D1A1EE45DA11F6CF1404B8783C89F9DDF0F21711F3298542E350214C42CAB58BD144C9BA8F310C8D320FCFCAEB0CAC
3,133,572 UART: [art] PUB.Y = 923C986E27DBA9248026374537A45743F8C6B7CB34F2AC5F60E772437C113A7E336235E28C5FEBB2EAF52015767071D1
3,140,518 UART: [art] SIG.R = 0D8D74989D721EC5400802E5604E3D141AF24482274A18222EC111FA3B6A3A6A770F35551E13CF5485F463C7607184CD
3,147,268 UART: [art] SIG.S = 3DF5C58F533FB085FAB303DFA9F6EE84E366536A083503B1AF1CEE3F44385B3A4B6B9BA6617424128F41E6D344F1838D
3,170,936 UART: Caliptra RT
3,171,281 UART: [state] CFI Enabled
3,279,476 UART: [rt] RT listening for mailbox commands...
3,280,146 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,222 UART: [rt]cmd =0x54514754, len=24
3,312,480 >>> mbox cmd response data (8 bytes)
3,312,481 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,132 UART:
3,313,148 UART: Running Caliptra ROM ...
3,313,556 UART:
3,313,698 UART: [state] CFI Enabled
3,316,690 UART: [state] LifecycleState = Unprovisioned
3,317,345 UART: [state] DebugLocked = No
3,317,867 UART: [state] WD Timer not started. Device not locked for debugging
3,318,989 UART: [kat] SHA2-256
4,122,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,126,668 UART: [kat] ++
4,126,820 UART: [kat] sha1
4,130,954 UART: [kat] SHA2-256
4,132,894 UART: [kat] SHA2-384
4,135,503 UART: [kat] SHA2-512-ACC
4,137,403 UART: [kat] ECC-384
4,147,390 UART: [kat] HMAC-384Kdf
4,152,040 UART: [kat] LMS
4,400,352 UART: [kat] --
4,401,078 UART: [update-reset] ++
5,304,891 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,306,020 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
5,402,402 >>> mbox cmd response: success
5,402,402 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,402,685 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,699 UART: [update-reset Success] --
5,411,874 UART: [state] Locking Datavault
5,412,746 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,350 UART: [state] Locking ICCM
5,413,844 UART: [exit] Launching FMC @ 0x40000130
5,419,173 UART:
5,419,189 UART: Running Caliptra FMC ...
5,419,597 UART:
5,419,740 UART: [state] CFI Enabled
5,509,125 UART: [art] Extend RT PCRs Done
5,509,553 UART: [art] Lock RT PCRs Done
5,510,758 UART: [art] Populate DV Done
5,518,631 UART: [fht] FMC Alias Private Key: 7
5,519,667 UART: [art] Derive CDI
5,519,947 UART: [art] Store in in slot 0x4
5,605,472 UART: [art] Derive Key Pair
5,605,832 UART: [art] Store priv key in slot 0x5
5,619,530 UART: [art] Derive Key Pair - Done
5,634,660 UART: [art] Signing Cert with AUTHO
5,635,140 UART: RITY.KEYID = 7
5,650,798 UART: [art] Erasing AUTHORITY.KEYID = 7
5,651,563 UART: [art] PUB.X = 5D640D915CD95E6FDDE7691102477F5075541A975B148DF69D7D7FF2B87C9B20EDBC546195945617AC9DD1F5D030244C
5,658,329 UART: [art] PUB.Y = 4E832403181F82AA9C6D9066AF29EA24CC3BC8DB4361EAFA178E9C32DF3D58998D389425E60B2D1D7EEA5A2F2AE928C8
5,665,287 UART: [art] SIG.R = 5A4EC4E2D4B46F2BAF91A10F8508EE78B40FC18819D064195F27EF048785BD6CAC0494CD9F10BF741F067C47012A33B7
5,672,044 UART: [art] SIG.S = E8ED00F7476A1CD0F3F661A5779F9B43060DD7A1B08DCF004315884C5A54EA5C85E10786359D0199BFCF44406D5D1255
5,695,811 UART: mbox::rt_entry...
5,696,183 UART: ____ _ _ _ ____ _____
5,696,967 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,697,767 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,698,535 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,699,303 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,700,071 UART: |_|
5,700,383 UART:
5,977,037 UART: [rt] Runtime listening for mailbox commands...
5,978,274 >>> mbox cmd response data (120 bytes)
5,978,275 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
5,978,386 UART:
5,978,402 UART: Running Caliptra ROM ...
5,978,810 UART:
5,978,952 UART: [state] CFI Enabled
5,981,664 UART: [state] LifecycleState = Unprovisioned
5,982,319 UART: [state] DebugLocked = No
5,982,889 UART: [state] WD Timer not started. Device not locked for debugging
5,984,231 UART: [kat] SHA2-256
6,787,781 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,791,910 UART: [kat] ++
6,792,062 UART: [kat] sha1
6,796,168 UART: [kat] SHA2-256
6,798,108 UART: [kat] SHA2-384
6,800,825 UART: [kat] SHA2-512-ACC
6,802,725 UART: [kat] ECC-384
6,812,592 UART: [kat] HMAC-384Kdf
6,817,010 UART: [kat] LMS
7,065,322 UART: [kat] --
7,066,324 UART: [update-reset] ++
7,970,845 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,971,900 UART: [update-reset] Loading Runtime at addr 0x40005000 len 54020
8,068,282 >>> mbox cmd response: success
8,068,282 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,068,611 UART: [update-reset] Copying MAN_2 To MAN_1
8,076,625 UART: [update-reset Success] --
8,077,404 UART: [state] Locking Datavault
8,078,188 UART: [state] Locking PCR0, PCR1 and PCR31
8,078,792 UART: [state] Locking ICCM
8,079,246 UART: [exit] Launching FMC @ 0x40000130
8,084,575 UART:
8,084,591 UART: Running Caliptra FMC ...
8,084,999 UART:
8,085,142 UART: [state] CFI Enabled
8,174,477 UART: [art] Extend RT PCRs Done
8,174,905 UART: [art] Lock RT PCRs Done
8,176,118 UART: [art] Populate DV Done
8,184,265 UART: [fht] FMC Alias Private Key: 7
8,185,299 UART: [art] Derive CDI
8,185,579 UART: [art] Store in in slot 0x4
8,271,232 UART: [art] Derive Key Pair
8,271,592 UART: [art] Store priv key in slot 0x5
8,285,216 UART: [art] Derive Key Pair - Done
8,300,078 UART: [art] Signing Cert with AUTHO
8,300,558 UART: RITY.KEYID = 7
8,315,732 UART: [art] Erasing AUTHORITY.KEYID = 7
8,316,497 UART: [art] PUB.X = AF4BC3D7997536D08C5DCE2DF00FDA122BB74A2E78DDD73F3F2ABE531FAB816430ECB05E196C8AE72B86E0714452BC7C
8,323,286 UART: [art] PUB.Y = 3610933F080F443BF6EBDBAA9F696AB4CA401B9B7F12E32DB67F535D646FD853D3C7B77A4093B026A3B97B004F1A582B
8,330,218 UART: [art] SIG.R = 7B84C1BE5A736D8CFF26B6C2A2AC1167BC0AB4064917874496120A3C14CB5C1D13CE3BBD2BC716048970E07E778F9700
8,336,960 UART: [art] SIG.S = 1F12E54764AE005D21E03CDD3691CC2D2F6F4BCE01BD0B3704843F292E414F11EA368030B810533C275DB34022C416EE
8,360,270 UART: mbox::rt_entry...
8,360,642 UART: ____ _ _ _ ____ _____
8,361,426 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,362,226 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,362,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,363,762 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,364,530 UART: |_|
8,364,842 UART:
8,645,474 UART: [rt] Runtime listening for mailbox commands...
8,646,711 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,689 ready_for_fw is high
1,056,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,243 >>> mbox cmd response: success
2,689,293 UART:
2,689,309 UART: Running Caliptra FMC ...
2,689,717 UART:
2,689,860 UART: [state] CFI Enabled
2,700,391 UART: [fht] FMC Alias Private Key: 7
2,807,930 UART: [art] Extend RT PCRs Done
2,808,358 UART: [art] Lock RT PCRs Done
2,809,840 UART: [art] Populate DV Done
2,818,207 UART: [fht] FMC Alias Private Key: 7
2,819,175 UART: [art] Derive CDI
2,819,455 UART: [art] Store in in slot 0x4
2,905,062 UART: [art] Derive Key Pair
2,905,422 UART: [art] Store priv key in slot 0x5
2,919,270 UART: [art] Derive Key Pair - Done
2,933,915 UART: [art] Signing Cert with AUTHO
2,934,395 UART: RITY.KEYID = 7
2,949,505 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,270 UART: [art] PUB.X = 15745ED6CC85DE30543331DD01FCC57FE6C89D5104D7C57FD85AEAD7512C9E333ED47015B750DFB11CF64A5361E01600
2,957,020 UART: [art] PUB.Y = C7CC3FAE65B9A7267D7E4F38A5F0A91BDB3345EADDD99D477BF240AC1C552E675419BF5E9D98AFED48AA8474521DB864
2,963,990 UART: [art] SIG.R = 8EA2F9FEFA41B3E31B43F8B3F08F7B0278763008093F350D4FD0703A866FCB0E4D6BC73AE3928F3370E59E91B22EA4F2
2,970,755 UART: [art] SIG.S = 659FC1E3E6E858E00235050C50BD8DE0042E42C3B8626C12631FBEB79172C85AB4785814FA04B749EB84A530C03598CF
2,994,993 UART: Caliptra RT
2,995,338 UART: [state] CFI Enabled
3,103,793 UART: [rt] RT listening for mailbox commands...
3,104,463 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,427 UART: [rt]cmd =0x54514754, len=24
3,136,431 >>> mbox cmd response data (8 bytes)
3,136,432 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,109,292 >>> mbox cmd response: success
5,109,292 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,122,748 UART:
5,122,764 UART: Running Caliptra FMC ...
5,123,172 UART:
5,123,315 UART: [state] CFI Enabled
5,212,690 UART: [art] Extend RT PCRs Done
5,213,118 UART: [art] Lock RT PCRs Done
5,214,303 UART: [art] Populate DV Done
5,222,528 UART: [fht] FMC Alias Private Key: 7
5,223,648 UART: [art] Derive CDI
5,223,928 UART: [art] Store in in slot 0x4
5,309,871 UART: [art] Derive Key Pair
5,310,231 UART: [art] Store priv key in slot 0x5
5,323,255 UART: [art] Derive Key Pair - Done
5,337,884 UART: [art] Signing Cert with AUTHO
5,338,364 UART: RITY.KEYID = 7
5,353,488 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,253 UART: [art] PUB.X = 2A45E438C0790D6C79BE642DD618CA6F5B88327B0EE949C0D4DB2B1C015ED7A5BCEF525D61AA143A36CA81B20B25ECA9
5,361,029 UART: [art] PUB.Y = 89E66699145766E92A1B9B66E270A072B003E3E4DE4806D4D5DA6E014645D18953DEA05B765413DF3E015627E5FBC486
5,367,963 UART: [art] SIG.R = 32009DAE7C9A44C6A86CBE0B76E8C610B7C52147760E6EFF1E4C85B22EF069E374ECB85D2F234EF92092D0C1A38C8C84
5,374,717 UART: [art] SIG.S = 7F5145BEE829DA93F7A47B4F758DE531E632BE703470594D7EC3D77C491B13FD7F0984B9AD5C27D94D4DA77C0125001D
5,398,612 UART: mbox::rt_entry...
5,398,984 UART: ____ _ _ _ ____ _____
5,399,768 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,400,568 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,401,336 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,402,104 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,402,872 UART: |_|
5,403,184 UART:
5,687,156 UART: [rt] Runtime listening for mailbox commands...
5,688,393 >>> mbox cmd response data (120 bytes)
5,688,394 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
7,660,287 >>> mbox cmd response: success
7,660,287 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,673,419 UART:
7,673,435 UART: Running Caliptra FMC ...
7,673,843 UART:
7,673,986 UART: [state] CFI Enabled
7,762,771 UART: [art] Extend RT PCRs Done
7,763,199 UART: [art] Lock RT PCRs Done
7,764,680 UART: [art] Populate DV Done
7,773,143 UART: [fht] FMC Alias Private Key: 7
7,774,157 UART: [art] Derive CDI
7,774,437 UART: [art] Store in in slot 0x4
7,859,974 UART: [art] Derive Key Pair
7,860,334 UART: [art] Store priv key in slot 0x5
7,873,938 UART: [art] Derive Key Pair - Done
7,888,625 UART: [art] Signing Cert with AUTHO
7,889,105 UART: RITY.KEYID = 7
7,904,373 UART: [art] Erasing AUTHORITY.KEYID = 7
7,905,138 UART: [art] PUB.X = C21C1693BAB317142D8078BE659A69C89C94DD40C9A83843F29220E0483A76A16070F85F15E50090DE4191C3CF6CD31B
7,911,884 UART: [art] PUB.Y = C05602EBA888757B5A32B143D3AEC9460771C6672B476A71164ADDEA7408CED51EFF74959ED10BA80AE9F21A483393D8
7,918,825 UART: [art] SIG.R = 23227EC1F67B18BEDC04D4FD0D20F583EAD60DE290056AB5FC510D72438DCAAD1F86DB47A8990F3450FC09D0A30B2723
7,925,585 UART: [art] SIG.S = 42B9551DCA07C5B319BE43E4D813A496C8404B279B4DD4055B696AF078952748802AB57A2C8B28A88D617949C43378FA
7,949,604 UART: mbox::rt_entry...
7,949,976 UART: ____ _ _ _ ____ _____
7,950,760 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,951,560 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,952,328 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,953,096 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,953,864 UART: |_|
7,954,176 UART:
8,236,346 UART: [rt] Runtime listening for mailbox commands...
8,237,583 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
191,612 UART:
191,955 UART: Running Caliptra ROM ...
193,131 UART:
193,289 UART: [state] CFI Enabled
266,075 UART: [state] LifecycleState = Production
268,311 UART: [state] DebugLocked = Yes
269,950 UART: [state] Starting the WD Timer 40000000 cycles
274,975 UART: [kat] SHA2-256
456,961 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,433 UART: [kat] ++
469,038 UART: [kat] sha1
480,324 UART: [kat] SHA2-256
483,378 UART: [kat] SHA2-384
490,298 UART: [kat] SHA2-512-ACC
492,906 UART: [kat] ECC-384
3,775,607 UART: [kat] HMAC-384Kdf
3,801,826 UART: [kat] LMS
4,874,992 UART: [kat] --
4,878,997 UART: [cold-reset] ++
4,880,925 UART: [fht] FHT @ 0x50003400
4,892,340 UART: [idev] ++
4,893,057 UART: [idev] CDI.KEYID = 6
4,894,159 UART: [idev] SUBJECT.KEYID = 7
4,895,404 UART: [idev] UDS.KEYID = 0
4,896,352 ready_for_fw is high
4,896,548 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,996,137 UART: [idev] Erasing UDS.KEYID = 0
8,243,553 UART: [idev] Sha1 KeyId Algorithm
8,265,355 UART: [idev] --
8,268,317 UART: [ldev] ++
8,268,914 UART: [ldev] CDI.KEYID = 6
8,270,032 UART: [ldev] SUBJECT.KEYID = 5
8,271,254 UART: [ldev] AUTHORITY.KEYID = 7
8,272,355 UART: [ldev] FE.KEYID = 1
8,317,434 UART: [ldev] Erasing FE.KEYID = 1
11,650,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,874 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,978,186 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,994,176 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,010,327 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,030,406 UART: [ldev] --
14,035,024 UART: [fwproc] Wait for Commands...
14,037,182 UART: [fwproc] Recv command 0x46574c44
14,039,496 UART: [fwproc] Recv'd Img size: 78740 bytes
17,697,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,771,373 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,840,143 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,033,058 >>> mbox cmd response: success
18,038,037 UART: [afmc] ++
18,038,659 UART: [afmc] CDI.KEYID = 6
18,039,798 UART: [afmc] SUBJECT.KEYID = 7
18,040,916 UART: [afmc] AUTHORITY.KEYID = 5
21,412,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,709,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,712,093 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,728,097 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,744,190 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,760,268 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,782,644 UART: [afmc] --
23,786,275 UART: [cold-reset] --
23,791,066 UART: [state] Locking Datavault
23,796,319 UART: [state] Locking PCR0, PCR1 and PCR31
23,798,036 UART: [state] Locking ICCM
23,799,362 UART: [exit] Launching FMC @ 0x40000130
23,808,027 UART:
23,808,272 UART: Running Caliptra FMC ...
23,809,379 UART:
23,809,539 UART: [state] CFI Enabled
23,867,796 UART: [fht] FMC Alias Private Key: 7
26,205,387 UART: [art] Extend RT PCRs Done
26,206,606 UART: [art] Lock RT PCRs Done
26,207,991 UART: [art] Populate DV Done
26,213,411 UART: [fht] FMC Alias Private Key: 7
26,214,948 UART: [art] Derive CDI
26,215,767 UART: [art] Store in in slot 0x4
26,275,083 UART: [art] Derive Key Pair
26,276,125 UART: [art] Store priv key in slot 0x5
29,568,548 UART: [art] Derive Key Pair - Done
29,581,450 UART: [art] Signing Cert with AUTHO
29,582,752 UART: RITY.KEYID = 7
31,871,182 UART: [art] Erasing AUTHORITY.KEYID = 7
31,872,688 UART: [art] PUB.X = C0AAF0C34C8DD71D331AB4EA26BB0975CA2A51C7BFF5C1BEB8D60283EE505184268A19D771495C98B032FDBF10F3A4BA
31,879,950 UART: [art] PUB.Y = 2C53A49C44230B629E1C7CB16C3E690A97191AD7FE57CCA94B6A683B4F41B4308E9708516E9A60DECF4646A94459118E
31,887,203 UART: [art] SIG.R = 2B856A7E431436F163F93BC30902CFB0F13EF10945B7DD6A9609741B9CCCDD2D2EF08AF63736D64FADC34E9D203AAAE0
31,894,609 UART: [art] SIG.S = 8F2B132947FF36FBD980BA28685C75922B99AF61DEA836057D9C22EB9D7F365C4201745922C25269784819A3BCD8A403
33,199,419 UART: mbox::rt_entry...
33,200,392 UART: ____ _ _ _ ____ _____
33,202,330 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,204,341 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,206,276 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,208,205 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,210,134 UART: |_|
33,210,969 UART:
33,323,398 UART: [rt] Runtime listening for mailbox commands...
33,325,422 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,325,927 >>> mbox cmd response data (0 bytes)
Initializing fuses
996 UART:
1,146 UART: Running Caliptra ROM ...
2,164 UART:
2,308 UART: [state] CFI Enabled
58,716 UART: [state] LifecycleState = Production
60,489 UART: [state] DebugLocked = Yes
63,040 UART: [state] Starting the WD Timer 40000000 cycles
68,327 UART: [kat] SHA2-256
250,316 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
261,805 UART: [kat] ++
262,387 UART: [kat] sha1
274,186 UART: [kat] SHA2-256
277,181 UART: [kat] SHA2-384
282,048 UART: [kat] SHA2-512-ACC
284,668 UART: [kat] ECC-384
3,570,052 UART: [kat] HMAC-384Kdf
3,597,311 UART: [kat] LMS
4,670,481 UART: [kat] --
4,675,497 UART: [warm-reset] ++
4,682,212 UART: [warm-reset] --
4,685,609 UART: [state] Locking Datavault
4,688,384 UART: [state] Locking PCR0, PCR1 and PCR31
4,690,583 UART: [state] Locking ICCM
4,693,009 UART: [exit] Launching FMC @ 0x40000130
4,701,636 UART:
4,701,880 UART: Running Caliptra FMC ...
4,702,984 UART:
4,703,147 UART: [state] CFI Enabled
4,762,497 UART: [aliasrt :skip pcr extension
4,763,810 UART: [art] Extend RT PCRs Done
4,764,963 UART: [art] Lock RT PCRs Done
4,766,036 UART: [art] Populate DV Done
4,771,772 UART: [fht] FMC Alias Private Key: 7
4,773,470 UART: [art] Derive CDI
4,774,280 UART: [art] Store in in slot 0x4
4,831,356 UART: [art] Derive Key Pair
4,832,408 UART: [art] Store priv key in slot 0x5
8,125,241 UART: [art] Derive Key Pair - Done
8,138,209 UART: [art] Signing Cert with AUTHO
8,139,520 UART: RITY.KEYID = 7
10,427,740 UART: [art] Erasing AUTHORITY.KEYID = 7
10,429,248 UART: [art] PUB.X = C0AAF0C34C8DD71D331AB4EA26BB0975CA2A51C7BFF5C1BEB8D60283EE505184268A19D771495C98B032FDBF10F3A4BA
10,436,512 UART: [art] PUB.Y = 2C53A49C44230B629E1C7CB16C3E690A97191AD7FE57CCA94B6A683B4F41B4308E9708516E9A60DECF4646A94459118E
10,443,754 UART: [art] SIG.R = 2B856A7E431436F163F93BC30902CFB0F13EF10945B7DD6A9609741B9CCCDD2D2EF08AF63736D64FADC34E9D203AAAE0
10,451,154 UART: [art] SIG.S = 8F2B132947FF36FBD980BA28685C75922B99AF61DEA836057D9C22EB9D7F365C4201745922C25269784819A3BCD8A403
11,755,623 UART: mbox::rt_entry...
11,756,595 UART: ____ _ _ _ ____ _____
11,758,581 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,760,590 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,762,524 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,764,455 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,766,381 UART: |_|
11,767,215 UART:
12,052,760 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
191,598 UART:
191,973 UART: Running Caliptra ROM ...
193,154 UART:
193,307 UART: [state] CFI Enabled
252,574 UART: [state] LifecycleState = Production
254,800 UART: [state] DebugLocked = Yes
256,296 UART: [state] Starting the WD Timer 40000000 cycles
261,474 UART: [kat] SHA2-256
443,437 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
454,957 UART: [kat] ++
455,488 UART: [kat] sha1
466,825 UART: [kat] SHA2-256
469,832 UART: [kat] SHA2-384
476,102 UART: [kat] SHA2-512-ACC
478,694 UART: [kat] ECC-384
3,765,057 UART: [kat] HMAC-384Kdf
3,790,141 UART: [kat] LMS
4,863,292 UART: [kat] --
4,868,210 UART: [cold-reset] ++
4,869,572 UART: [fht] FHT @ 0x50003400
4,880,764 UART: [idev] ++
4,881,477 UART: [idev] CDI.KEYID = 6
4,882,655 UART: [idev] SUBJECT.KEYID = 7
4,883,834 UART: [idev] UDS.KEYID = 0
4,884,776 ready_for_fw is high
4,885,016 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,984,311 UART: [idev] Erasing UDS.KEYID = 0
8,229,248 UART: [idev] Sha1 KeyId Algorithm
8,250,359 UART: [idev] --
8,254,407 UART: [ldev] ++
8,254,972 UART: [ldev] CDI.KEYID = 6
8,256,135 UART: [ldev] SUBJECT.KEYID = 5
8,257,349 UART: [ldev] AUTHORITY.KEYID = 7
8,258,501 UART: [ldev] FE.KEYID = 1
8,304,392 UART: [ldev] Erasing FE.KEYID = 1
11,639,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,950,648 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,966,937 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,982,920 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,999,042 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,020,299 UART: [ldev] --
14,025,257 UART: [fwproc] Wait for Commands...
14,028,215 UART: [fwproc] Recv command 0x46574c44
14,030,469 UART: [fwproc] Recv'd Img size: 78740 bytes
17,695,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,769,190 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,837,941 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,031,227 >>> mbox cmd response: success
18,035,778 UART: [afmc] ++
18,036,405 UART: [afmc] CDI.KEYID = 6
18,037,549 UART: [afmc] SUBJECT.KEYID = 7
18,038,792 UART: [afmc] AUTHORITY.KEYID = 5
21,399,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,697,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,700,176 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,716,189 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,732,305 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,748,344 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,769,954 UART: [afmc] --
23,773,707 UART: [cold-reset] --
23,778,872 UART: [state] Locking Datavault
23,785,916 UART: [state] Locking PCR0, PCR1 and PCR31
23,787,556 UART: [state] Locking ICCM
23,789,643 UART: [exit] Launching FMC @ 0x40000130
23,798,276 UART:
23,798,558 UART: Running Caliptra FMC ...
23,799,584 UART:
23,799,736 UART: [state] CFI Enabled
23,857,041 UART: [fht] FMC Alias Private Key: 7
26,194,638 UART: [art] Extend RT PCRs Done
26,195,855 UART: [art] Lock RT PCRs Done
26,197,030 UART: [art] Populate DV Done
26,202,679 UART: [fht] FMC Alias Private Key: 7
26,204,380 UART: [art] Derive CDI
26,205,128 UART: [art] Store in in slot 0x4
26,264,923 UART: [art] Derive Key Pair
26,265,923 UART: [art] Store priv key in slot 0x5
29,559,696 UART: [art] Derive Key Pair - Done
29,572,744 UART: [art] Signing Cert with AUTHO
29,574,045 UART: RITY.KEYID = 7
31,859,984 UART: [art] Erasing AUTHORITY.KEYID = 7
31,861,484 UART: [art] PUB.X = 5540B1E3E4C10BD9024D2F6BA234320514D18A2AEC9E95A6661FCCF5FA2B2D2592F2C99B5DE1B37CDB945E67541F4D44
31,868,743 UART: [art] PUB.Y = E2726120DD373AA51173CC9B7EEA992E4547746EC0DE4AD485F1DB8A8D09D6208952C38AFC11B988C5EBF8F9C3405EE0
31,875,994 UART: [art] SIG.R = CA866276A8A343C321A07C91263431A43AE3AF41D227468CA9BED87C0A53522CB3A724EE2E25EB7B365FA8D6DB068F4A
31,883,392 UART: [art] SIG.S = AC477307333A5788568BDB99B16852A0D643AB089C2F746C52975DF691CF3021C42B8804B649072F5F6C0888D871ECAD
33,188,426 UART: mbox::rt_entry...
33,189,394 UART: ____ _ _ _ ____ _____
33,191,383 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,193,381 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,195,327 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,197,257 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,199,182 UART: |_|
33,200,023 UART:
33,312,779 UART: [rt] Runtime listening for mailbox commands...
33,314,789 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,315,305 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,025 UART:
1,290 UART: Running Caliptra ROM ...
2,343 UART:
2,703 UART: [state] CFI Enabled
56,421 UART: [state] LifecycleState = Production
58,144 UART: [state] DebugLocked = Yes
60,075 UART: [state] Starting the WD Timer 40000000 cycles
64,924 UART: [kat] SHA2-256
246,918 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
258,435 UART: [kat] ++
258,964 UART: [kat] sha1
269,902 UART: [kat] SHA2-256
272,922 UART: [kat] SHA2-384
279,278 UART: [kat] SHA2-512-ACC
281,893 UART: [kat] ECC-384
3,572,580 UART: [kat] HMAC-384Kdf
3,596,582 UART: [kat] LMS
4,669,750 UART: [kat] --
4,676,958 UART: [warm-reset] ++
4,680,794 UART: [warm-reset] --
4,685,208 UART: [state] Locking Datavault
4,690,089 UART: [state] Locking PCR0, PCR1 and PCR31
4,692,246 UART: [state] Locking ICCM
4,694,190 UART: [exit] Launching FMC @ 0x40000130
4,702,836 UART:
4,703,078 UART: Running Caliptra FMC ...
4,704,181 UART:
4,704,343 UART: [state] CFI Enabled
4,762,890 UART: [aliasrt :skip pcr extension
4,764,185 UART: [art] Extend RT PCRs Done
4,765,337 UART: [art] Lock RT PCRs Done
4,766,404 UART: [art] Populate DV Done
4,771,865 UART: [fht] FMC Alias Private Key: 7
4,773,561 UART: [art] Derive CDI
4,774,372 UART: [art] Store in in slot 0x4
4,831,584 UART: [art] Derive Key Pair
4,832,632 UART: [art] Store priv key in slot 0x5
8,125,650 UART: [art] Derive Key Pair - Done
8,138,704 UART: [art] Signing Cert with AUTHO
8,140,012 UART: RITY.KEYID = 7
10,427,941 UART: [art] Erasing AUTHORITY.KEYID = 7
10,429,442 UART: [art] PUB.X = 5540B1E3E4C10BD9024D2F6BA234320514D18A2AEC9E95A6661FCCF5FA2B2D2592F2C99B5DE1B37CDB945E67541F4D44
10,436,708 UART: [art] PUB.Y = E2726120DD373AA51173CC9B7EEA992E4547746EC0DE4AD485F1DB8A8D09D6208952C38AFC11B988C5EBF8F9C3405EE0
10,443,973 UART: [art] SIG.R = CA866276A8A343C321A07C91263431A43AE3AF41D227468CA9BED87C0A53522CB3A724EE2E25EB7B365FA8D6DB068F4A
10,451,335 UART: [art] SIG.S = AC477307333A5788568BDB99B16852A0D643AB089C2F746C52975DF691CF3021C42B8804B649072F5F6C0888D871ECAD
11,755,717 UART: mbox::rt_entry...
11,756,668 UART: ____ _ _ _ ____ _____
11,758,650 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,760,657 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,762,836 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,764,911 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,766,846 UART: |_|
11,767,655 UART:
12,053,357 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
191,817 UART:
192,184 UART: Running Caliptra ROM ...
193,380 UART:
603,051 UART: [state] CFI Enabled
616,652 UART: [state] LifecycleState = Production
618,839 UART: [state] DebugLocked = Yes
620,901 UART: [state] Starting the WD Timer 40000000 cycles
625,777 UART: [kat] SHA2-256
807,766 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,317 UART: [kat] ++
819,916 UART: [kat] sha1
829,892 UART: [kat] SHA2-256
832,900 UART: [kat] SHA2-384
838,527 UART: [kat] SHA2-512-ACC
841,173 UART: [kat] ECC-384
4,096,113 UART: [kat] HMAC-384Kdf
4,107,203 UART: [kat] LMS
5,180,360 UART: [kat] --
5,184,537 UART: [cold-reset] ++
5,185,763 UART: [fht] FHT @ 0x50003400
5,198,042 UART: [idev] ++
5,198,725 UART: [idev] CDI.KEYID = 6
5,199,901 UART: [idev] SUBJECT.KEYID = 7
5,201,360 UART: [idev] UDS.KEYID = 0
5,202,614 ready_for_fw is high
5,202,803 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
5,301,737 UART: [idev] Erasing UDS.KEYID = 0
8,492,158 UART: [idev] Sha1 KeyId Algorithm
8,515,548 UART: [idev] --
8,519,324 UART: [ldev] ++
8,519,943 UART: [ldev] CDI.KEYID = 6
8,521,116 UART: [ldev] SUBJECT.KEYID = 5
8,522,268 UART: [ldev] AUTHORITY.KEYID = 7
8,523,489 UART: [ldev] FE.KEYID = 1
8,534,856 UART: [ldev] Erasing FE.KEYID = 1
11,827,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,046 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,139,408 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,155,417 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,171,517 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,190,816 UART: [ldev] --
14,195,269 UART: [fwproc] Wait for Commands...
14,197,463 UART: [fwproc] Recv command 0x46574c44
14,199,762 UART: [fwproc] Recv'd Img size: 78740 bytes
17,870,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,945,597 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,014,381 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,207,460 >>> mbox cmd response: success
18,212,128 UART: [afmc] ++
18,212,744 UART: [afmc] CDI.KEYID = 6
18,213,951 UART: [afmc] SUBJECT.KEYID = 7
18,215,074 UART: [afmc] AUTHORITY.KEYID = 5
21,530,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,821,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,823,945 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,839,983 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,856,040 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,872,136 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,895,033 UART: [afmc] --
23,898,444 UART: [cold-reset] --
23,903,230 UART: [state] Locking Datavault
23,907,934 UART: [state] Locking PCR0, PCR1 and PCR31
23,909,572 UART: [state] Locking ICCM
23,912,313 UART: [exit] Launching FMC @ 0x40000130
23,921,025 UART:
23,921,285 UART: Running Caliptra FMC ...
23,922,409 UART:
23,922,564 UART: [state] CFI Enabled
23,930,881 UART: [fht] FMC Alias Private Key: 7
26,261,596 UART: [art] Extend RT PCRs Done
26,262,825 UART: [art] Lock RT PCRs Done
26,264,473 UART: [art] Populate DV Done
26,269,563 UART: [fht] FMC Alias Private Key: 7
26,271,154 UART: [art] Derive CDI
26,271,915 UART: [art] Store in in slot 0x4
26,314,818 UART: [art] Derive Key Pair
26,315,843 UART: [art] Store priv key in slot 0x5
29,557,646 UART: [art] Derive Key Pair - Done
29,570,850 UART: [art] Signing Cert with AUTHO
29,572,149 UART: RITY.KEYID = 7
31,851,380 UART: [art] Erasing AUTHORITY.KEYID = 7
31,852,891 UART: [art] PUB.X = BC993B33426F2C6DE6C841AE1EB1A51FA167E59D86FEADECA725062A34E50446FA6E1289B90A76E2C403D3255D5C11F1
31,860,162 UART: [art] PUB.Y = 266DF8325FB0D416B413DA06D9B22EC72ACC585578304BCD32FC519F306E1E45EE17CBBADBE57682BF9448B7A308708F
31,867,396 UART: [art] SIG.R = 0C5C3B8C511AE1F67A064F3804C7AFFE96017897C508BB5F48ABFACBCF837145B7FBA769300C914F5779287A979F9C87
31,874,790 UART: [art] SIG.S = 4E93BCC2DF3C6FD52A18BC1E0AE72A864EDB84ADACFC5C3F633A034D7267FB6144DCE166345616DB7907BDEB89D5D00A
33,179,674 UART: mbox::rt_entry...
33,180,622 UART: ____ _ _ _ ____ _____
33,182,604 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,184,604 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,186,536 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,188,463 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,190,306 UART: |_|
33,191,098 UART:
33,303,878 UART: [rt] Runtime listening for mailbox commands...
33,305,897 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,306,408 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,004 UART:
1,284 UART: Running Caliptra ROM ...
2,389 UART:
7,223,491 UART: [state] CFI Enabled
7,237,457 UART: [state] LifecycleState = Production
7,239,203 UART: [state] DebugLocked = Yes
7,241,440 UART: [state] Starting the WD Timer 40000000 cycles
7,245,987 UART: [kat] SHA2-256
7,428,018 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,439,541 UART: [kat] ++
7,440,004 UART: [kat] sha1
7,450,730 UART: [kat] SHA2-256
7,453,744 UART: [kat] SHA2-384
7,458,702 UART: [kat] SHA2-512-ACC
7,461,319 UART: [kat] ECC-384
10,716,299 UART: [kat] HMAC-384Kdf
10,727,934 UART: [kat] LMS
11,801,113 UART: [kat] --
11,806,500 UART: [warm-reset] ++
11,811,700 UART: [warm-reset] --
11,815,358 UART: [state] Locking Datavault
11,818,835 UART: [state] Locking PCR0, PCR1 and PCR31
11,821,027 UART: [state] Locking ICCM
11,822,268 UART: [exit] Launching FMC @ 0x40000130
11,830,610 UART:
11,830,842 UART: Running Caliptra FMC ...
11,831,861 UART:
11,832,001 UART: [state] CFI Enabled
11,834,108 UART: [aliasrt :skip pcr extension
11,835,349 UART: [art] Extend RT PCRs Done
11,836,401 UART: [art] Lock RT PCRs Done
11,837,457 UART: [art] Populate DV Done
11,842,639 UART: [fht] FMC Alias Private Key: 7
11,844,347 UART: [art] Derive CDI
11,845,078 UART: [art] Store in in slot 0x4
11,887,825 UART: [art] Derive Key Pair
11,888,872 UART: [art] Store priv key in slot 0x5
15,131,185 UART: [art] Derive Key Pair - Done
15,144,397 UART: [art] Signing Cert with AUTHO
15,145,697 UART: RITY.KEYID = 7
17,425,045 UART: [art] Erasing AUTHORITY.KEYID = 7
17,426,560 UART: [art] PUB.X = BC993B33426F2C6DE6C841AE1EB1A51FA167E59D86FEADECA725062A34E50446FA6E1289B90A76E2C403D3255D5C11F1
17,433,802 UART: [art] PUB.Y = 266DF8325FB0D416B413DA06D9B22EC72ACC585578304BCD32FC519F306E1E45EE17CBBADBE57682BF9448B7A308708F
17,441,080 UART: [art] SIG.R = 0C5C3B8C511AE1F67A064F3804C7AFFE96017897C508BB5F48ABFACBCF837145B7FBA769300C914F5779287A979F9C87
17,448,413 UART: [art] SIG.S = 4E93BCC2DF3C6FD52A18BC1E0AE72A864EDB84ADACFC5C3F633A034D7267FB6144DCE166345616DB7907BDEB89D5D00A
18,753,196 UART: mbox::rt_entry...
18,754,141 UART: ____ _ _ _ ____ _____
18,756,066 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,758,071 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,760,019 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,761,946 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,763,869 UART: |_|
18,764,699 UART:
19,050,497 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
191,789 UART:
192,155 UART: Running Caliptra ROM ...
193,319 UART:
602,977 UART: [state] CFI Enabled
616,595 UART: [state] LifecycleState = Production
618,792 UART: [state] DebugLocked = Yes
621,139 UART: [state] Starting the WD Timer 40000000 cycles
626,368 UART: [kat] SHA2-256
808,384 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,853 UART: [kat] ++
820,451 UART: [kat] sha1
830,221 UART: [kat] SHA2-256
833,235 UART: [kat] SHA2-384
839,519 UART: [kat] SHA2-512-ACC
842,132 UART: [kat] ECC-384
4,097,838 UART: [kat] HMAC-384Kdf
4,109,998 UART: [kat] LMS
5,183,196 UART: [kat] --
5,187,351 UART: [cold-reset] ++
5,188,945 UART: [fht] FHT @ 0x50003400
5,200,854 UART: [idev] ++
5,201,483 UART: [idev] CDI.KEYID = 6
5,202,646 UART: [idev] SUBJECT.KEYID = 7
5,204,161 UART: [idev] UDS.KEYID = 0
5,205,335 ready_for_fw is high
5,205,534 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
5,304,547 UART: [idev] Erasing UDS.KEYID = 0
8,496,704 UART: [idev] Sha1 KeyId Algorithm
8,518,190 UART: [idev] --
8,523,400 UART: [ldev] ++
8,523,971 UART: [ldev] CDI.KEYID = 6
8,525,149 UART: [ldev] SUBJECT.KEYID = 5
8,526,303 UART: [ldev] AUTHORITY.KEYID = 7
8,527,527 UART: [ldev] FE.KEYID = 1
8,538,228 UART: [ldev] Erasing FE.KEYID = 1
11,828,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,552 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,134,860 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,150,896 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,167,010 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,187,453 UART: [ldev] --
14,192,008 UART: [fwproc] Wait for Commands...
14,194,907 UART: [fwproc] Recv command 0x46574c44
14,197,267 UART: [fwproc] Recv'd Img size: 78740 bytes
17,863,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,940,452 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,009,202 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,202,343 >>> mbox cmd response: success
18,206,029 UART: [afmc] ++
18,206,642 UART: [afmc] CDI.KEYID = 6
18,207,775 UART: [afmc] SUBJECT.KEYID = 7
18,208,950 UART: [afmc] AUTHORITY.KEYID = 5
21,525,845 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,822,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,824,746 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,840,741 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,856,843 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,872,933 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,894,901 UART: [afmc] --
23,898,432 UART: [cold-reset] --
23,904,405 UART: [state] Locking Datavault
23,910,407 UART: [state] Locking PCR0, PCR1 and PCR31
23,912,097 UART: [state] Locking ICCM
23,914,085 UART: [exit] Launching FMC @ 0x40000130
23,922,801 UART:
23,923,030 UART: Running Caliptra FMC ...
23,924,127 UART:
23,924,302 UART: [state] CFI Enabled
23,932,241 UART: [fht] FMC Alias Private Key: 7
26,262,474 UART: [art] Extend RT PCRs Done
26,263,708 UART: [art] Lock RT PCRs Done
26,265,330 UART: [art] Populate DV Done
26,270,790 UART: [fht] FMC Alias Private Key: 7
26,272,488 UART: [art] Derive CDI
26,273,297 UART: [art] Store in in slot 0x4
26,315,783 UART: [art] Derive Key Pair
26,316,825 UART: [art] Store priv key in slot 0x5
29,558,472 UART: [art] Derive Key Pair - Done
29,571,196 UART: [art] Signing Cert with AUTHO
29,572,492 UART: RITY.KEYID = 7
31,851,987 UART: [art] Erasing AUTHORITY.KEYID = 7
31,853,491 UART: [art] PUB.X = 29A655B6521937E1D10A1B4F5075E4141BBFE0C3C5236601A47B85FC8ADFDE96FE4DB20D4C984A50B9EA3FFF7C55CEE1
31,860,766 UART: [art] PUB.Y = A9F3573C0AE73E2F55789780C41D14071321BFE20C61957A3C68D993E87284D60E5CB1961E1EDED35A084D7840ED0FF4
31,867,971 UART: [art] SIG.R = C4C26F0E99366923037D934465D471C97A7411AEBFB6C97D96EC960207DDFBFE3CA5E431F056B5D7C8936A0C6040D7D8
31,875,368 UART: [art] SIG.S = E8D71FABCE6355625F8557F665387BFF1919D511A97D80914E6CF5996374B7EF280B600430F7A8BED099AA5E19CBF48B
33,180,226 UART: mbox::rt_entry...
33,181,179 UART: ____ _ _ _ ____ _____
33,183,156 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,185,154 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,187,086 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,189,016 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,190,865 UART: |_|
33,191,657 UART:
33,304,723 UART: [rt] Runtime listening for mailbox commands...
33,306,727 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,307,220 >>> mbox cmd response data (0 bytes)
Initializing fuses
991 UART:
1,170 UART: Running Caliptra ROM ...
2,228 UART:
7,224,593 UART: [state] CFI Enabled
7,234,396 UART: [state] LifecycleState = Production
7,236,155 UART: [state] DebugLocked = Yes
7,238,989 UART: [state] Starting the WD Timer 40000000 cycles
7,245,191 UART: [kat] SHA2-256
7,427,191 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,438,746 UART: [kat] ++
7,439,256 UART: [kat] sha1
7,449,006 UART: [kat] SHA2-256
7,452,074 UART: [kat] SHA2-384
7,457,365 UART: [kat] SHA2-512-ACC
7,459,987 UART: [kat] ECC-384
10,716,766 UART: [kat] HMAC-384Kdf
10,727,809 UART: [kat] LMS
11,800,930 UART: [kat] --
11,805,610 UART: [warm-reset] ++
11,811,541 UART: [warm-reset] --
11,815,455 UART: [state] Locking Datavault
11,818,757 UART: [state] Locking PCR0, PCR1 and PCR31
11,820,943 UART: [state] Locking ICCM
11,822,983 UART: [exit] Launching FMC @ 0x40000130
11,831,651 UART:
11,831,884 UART: Running Caliptra FMC ...
11,832,981 UART:
11,833,136 UART: [state] CFI Enabled
11,835,128 UART: [aliasrt :skip pcr extension
11,836,366 UART: [art] Extend RT PCRs Done
11,837,494 UART: [art] Lock RT PCRs Done
11,838,824 UART: [art] Populate DV Done
11,844,381 UART: [fht] FMC Alias Private Key: 7
11,846,122 UART: [art] Derive CDI
11,846,945 UART: [art] Store in in slot 0x4
11,889,695 UART: [art] Derive Key Pair
11,890,713 UART: [art] Store priv key in slot 0x5
15,132,644 UART: [art] Derive Key Pair - Done
15,145,588 UART: [art] Signing Cert with AUTHO
15,146,897 UART: RITY.KEYID = 7
17,426,544 UART: [art] Erasing AUTHORITY.KEYID = 7
17,428,052 UART: [art] PUB.X = 29A655B6521937E1D10A1B4F5075E4141BBFE0C3C5236601A47B85FC8ADFDE96FE4DB20D4C984A50B9EA3FFF7C55CEE1
17,435,300 UART: [art] PUB.Y = A9F3573C0AE73E2F55789780C41D14071321BFE20C61957A3C68D993E87284D60E5CB1961E1EDED35A084D7840ED0FF4
17,442,524 UART: [art] SIG.R = C4C26F0E99366923037D934465D471C97A7411AEBFB6C97D96EC960207DDFBFE3CA5E431F056B5D7C8936A0C6040D7D8
17,449,956 UART: [art] SIG.S = E8D71FABCE6355625F8557F665387BFF1919D511A97D80914E6CF5996374B7EF280B600430F7A8BED099AA5E19CBF48B
18,754,562 UART: mbox::rt_entry...
18,755,503 UART: ____ _ _ _ ____ _____
18,757,481 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,759,480 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,761,407 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,763,352 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,765,203 UART: |_|
18,765,994 UART:
19,049,527 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
191,772 UART:
192,144 UART: Running Caliptra ROM ...
193,318 UART:
193,476 UART: [state] CFI Enabled
265,220 UART: [state] LifecycleState = Production
267,007 UART: [state] DebugLocked = Yes
268,368 UART: [state] Starting the WD Timer 40000000 cycles
273,669 UART: [kat] SHA2-256
452,778 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,353 UART: [kat] ++
464,888 UART: [kat] sha1
476,443 UART: [kat] SHA2-256
479,480 UART: [kat] SHA2-384
484,548 UART: [kat] SHA2-512-ACC
487,556 UART: [kat] ECC-384
2,948,963 UART: [kat] HMAC-384Kdf
2,970,594 UART: [kat] LMS
3,500,065 UART: [kat] --
3,505,163 UART: [cold-reset] ++
3,506,741 UART: [fht] FHT @ 0x50003400
3,516,440 UART: [idev] ++
3,517,008 UART: [idev] CDI.KEYID = 6
3,517,936 UART: [idev] SUBJECT.KEYID = 7
3,519,108 UART: [idev] UDS.KEYID = 0
3,520,028 ready_for_fw is high
3,520,252 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,619,460 UART: [idev] Erasing UDS.KEYID = 0
6,027,303 UART: [idev] Sha1 KeyId Algorithm
6,050,946 UART: [idev] --
6,054,542 UART: [ldev] ++
6,055,123 UART: [ldev] CDI.KEYID = 6
6,056,037 UART: [ldev] SUBJECT.KEYID = 5
6,057,198 UART: [ldev] AUTHORITY.KEYID = 7
6,058,435 UART: [ldev] FE.KEYID = 1
6,098,902 UART: [ldev] Erasing FE.KEYID = 1
8,605,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,863 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,889 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,692 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,617 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,927 UART: [ldev] --
10,414,918 UART: [fwproc] Wait for Commands...
10,416,853 UART: [fwproc] Recv command 0x46574c44
10,418,943 UART: [fwproc] Recv'd Img size: 78704 bytes
13,411,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,489,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,557,866 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,750,584 >>> mbox cmd response: success
13,755,227 UART: [afmc] ++
13,755,849 UART: [afmc] CDI.KEYID = 6
13,756,779 UART: [afmc] SUBJECT.KEYID = 7
13,757,887 UART: [afmc] AUTHORITY.KEYID = 5
16,293,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,018,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,020,448 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,036,459 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,052,312 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,068,055 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,089,774 UART: [afmc] --
18,094,258 UART: [cold-reset] --
18,096,413 UART: [state] Locking Datavault
18,101,176 UART: [state] Locking PCR0, PCR1 and PCR31
18,102,879 UART: [state] Locking ICCM
18,104,707 UART: [exit] Launching FMC @ 0x40000130
18,113,103 UART:
18,113,345 UART: Running Caliptra FMC ...
18,114,446 UART:
18,114,611 UART: [state] CFI Enabled
18,176,714 UART: [fht] FMC Alias Private Key: 7
19,941,096 UART: [art] Extend RT PCRs Done
19,942,309 UART: [art] Lock RT PCRs Done
19,943,981 UART: [art] Populate DV Done
19,949,170 UART: [fht] FMC Alias Private Key: 7
19,950,648 UART: [art] Derive CDI
19,951,408 UART: [art] Store in in slot 0x4
20,009,433 UART: [art] Derive Key Pair
20,010,519 UART: [art] Store priv key in slot 0x5
22,474,425 UART: [art] Derive Key Pair - Done
22,487,525 UART: [art] Signing Cert with AUTHO
22,488,825 UART: RITY.KEYID = 7
24,199,979 UART: [art] Erasing AUTHORITY.KEYID = 7
24,201,480 UART: [art] PUB.X = 0895EDC91361BC4A421FC4BEADDE581F008F24081D638DFCA3B0398E46C343F83163E5EE77A387FC81CBA94F1591B3F4
24,208,742 UART: [art] PUB.Y = 23F897AA42C0B202BEBCC2D0447F16D6090AF13E4007939D706A9C9AAF4698BCD6D4887E83D6FCD1D83A197EF1966BD1
24,215,990 UART: [art] SIG.R = E79A104D54D9638054BA63CE9E338499F1B28F41C826B20BD1FB12CF9C8B333068AE45717E6238931350944D4C680752
24,223,408 UART: [art] SIG.S = 47E7810101CF40B048A91F92DFE496A8B66D953046CF4A71FBAB1C737E8ECB70E3AEBA14FF9C4718037ECE9AE67EEA72
25,201,543 UART: mbox::rt_entry...
25,202,492 UART: ____ _ _ _ ____ _____
25,204,473 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,206,480 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,208,406 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,210,336 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,212,265 UART: |_|
25,213,102 UART:
25,325,914 UART: [rt] Runtime listening for mailbox commands...
25,327,926 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,328,430 >>> mbox cmd response data (0 bytes)
Initializing fuses
994 UART:
1,392 UART: Running Caliptra ROM ...
2,527 UART:
2,701 UART: [state] CFI Enabled
63,792 UART: [state] LifecycleState = Production
65,513 UART: [state] DebugLocked = Yes
66,974 UART: [state] Starting the WD Timer 40000000 cycles
71,104 UART: [kat] SHA2-256
250,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
261,850 UART: [kat] ++
262,299 UART: [kat] sha1
272,667 UART: [kat] SHA2-256
275,681 UART: [kat] SHA2-384
281,500 UART: [kat] SHA2-512-ACC
284,481 UART: [kat] ECC-384
2,749,110 UART: [kat] HMAC-384Kdf
2,768,900 UART: [kat] LMS
3,298,374 UART: [kat] --
3,303,083 UART: [warm-reset] ++
3,308,041 UART: [warm-reset] --
3,310,835 UART: [state] Locking Datavault
3,313,920 UART: [state] Locking PCR0, PCR1 and PCR31
3,315,622 UART: [state] Locking ICCM
3,317,072 UART: [exit] Launching FMC @ 0x40000130
3,325,529 UART:
3,325,767 UART: Running Caliptra FMC ...
3,326,870 UART:
3,327,049 UART: [state] CFI Enabled
3,378,848 UART: [aliasrt :skip pcr extension
3,380,145 UART: [art] Extend RT PCRs Done
3,381,292 UART: [art] Lock RT PCRs Done
3,382,524 UART: [art] Populate DV Done
3,388,145 UART: [fht] FMC Alias Private Key: 7
3,389,622 UART: [art] Derive CDI
3,390,435 UART: [art] Store in in slot 0x4
3,447,475 UART: [art] Derive Key Pair
3,448,514 UART: [art] Store priv key in slot 0x5
5,911,056 UART: [art] Derive Key Pair - Done
5,924,109 UART: [art] Signing Cert with AUTHO
5,925,441 UART: RITY.KEYID = 7
7,637,189 UART: [art] Erasing AUTHORITY.KEYID = 7
7,638,696 UART: [art] PUB.X = 0895EDC91361BC4A421FC4BEADDE581F008F24081D638DFCA3B0398E46C343F83163E5EE77A387FC81CBA94F1591B3F4
7,645,949 UART: [art] PUB.Y = 23F897AA42C0B202BEBCC2D0447F16D6090AF13E4007939D706A9C9AAF4698BCD6D4887E83D6FCD1D83A197EF1966BD1
7,653,266 UART: [art] SIG.R = E79A104D54D9638054BA63CE9E338499F1B28F41C826B20BD1FB12CF9C8B333068AE45717E6238931350944D4C680752
7,660,608 UART: [art] SIG.S = 47E7810101CF40B048A91F92DFE496A8B66D953046CF4A71FBAB1C737E8ECB70E3AEBA14FF9C4718037ECE9AE67EEA72
8,639,102 UART: mbox::rt_entry...
8,640,041 UART: ____ _ _ _ ____ _____
8,642,132 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,644,154 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,646,093 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,648,028 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,963 UART: |_|
8,650,800 UART:
8,936,271 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
191,618 UART:
191,986 UART: Running Caliptra ROM ...
193,103 UART:
193,250 UART: [state] CFI Enabled
262,731 UART: [state] LifecycleState = Production
264,533 UART: [state] DebugLocked = Yes
266,749 UART: [state] Starting the WD Timer 40000000 cycles
271,480 UART: [kat] SHA2-256
450,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,238 UART: [kat] ++
462,767 UART: [kat] sha1
474,170 UART: [kat] SHA2-256
477,189 UART: [kat] SHA2-384
482,045 UART: [kat] SHA2-512-ACC
484,984 UART: [kat] ECC-384
2,946,610 UART: [kat] HMAC-384Kdf
2,972,093 UART: [kat] LMS
3,501,614 UART: [kat] --
3,506,528 UART: [cold-reset] ++
3,508,595 UART: [fht] FHT @ 0x50003400
3,520,073 UART: [idev] ++
3,520,641 UART: [idev] CDI.KEYID = 6
3,521,550 UART: [idev] SUBJECT.KEYID = 7
3,522,722 UART: [idev] UDS.KEYID = 0
3,523,668 ready_for_fw is high
3,523,864 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,623,122 UART: [idev] Erasing UDS.KEYID = 0
6,029,918 UART: [idev] Sha1 KeyId Algorithm
6,052,752 UART: [idev] --
6,055,886 UART: [ldev] ++
6,056,461 UART: [ldev] CDI.KEYID = 6
6,057,376 UART: [ldev] SUBJECT.KEYID = 5
6,058,537 UART: [ldev] AUTHORITY.KEYID = 7
6,059,822 UART: [ldev] FE.KEYID = 1
6,101,104 UART: [ldev] Erasing FE.KEYID = 1
8,606,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,769 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,769 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,595 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,542 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,262 UART: [ldev] --
10,414,731 UART: [fwproc] Wait for Commands...
10,417,964 UART: [fwproc] Recv command 0x46574c44
10,420,056 UART: [fwproc] Recv'd Img size: 78704 bytes
13,425,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,491,400 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,560,179 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,754,053 >>> mbox cmd response: success
13,757,463 UART: [afmc] ++
13,758,072 UART: [afmc] CDI.KEYID = 6
13,758,968 UART: [afmc] SUBJECT.KEYID = 7
13,760,246 UART: [afmc] AUTHORITY.KEYID = 5
16,299,122 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,021,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,023,631 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,039,611 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,055,445 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,071,201 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,095,187 UART: [afmc] --
18,098,241 UART: [cold-reset] --
18,102,159 UART: [state] Locking Datavault
18,107,778 UART: [state] Locking PCR0, PCR1 and PCR31
18,109,430 UART: [state] Locking ICCM
18,110,774 UART: [exit] Launching FMC @ 0x40000130
18,119,173 UART:
18,119,408 UART: Running Caliptra FMC ...
18,120,506 UART:
18,120,665 UART: [state] CFI Enabled
18,178,604 UART: [fht] FMC Alias Private Key: 7
19,942,277 UART: [art] Extend RT PCRs Done
19,943,542 UART: [art] Lock RT PCRs Done
19,945,246 UART: [art] Populate DV Done
19,950,845 UART: [fht] FMC Alias Private Key: 7
19,952,392 UART: [art] Derive CDI
19,953,155 UART: [art] Store in in slot 0x4
20,011,556 UART: [art] Derive Key Pair
20,012,605 UART: [art] Store priv key in slot 0x5
22,475,609 UART: [art] Derive Key Pair - Done
22,488,419 UART: [art] Signing Cert with AUTHO
22,489,759 UART: RITY.KEYID = 7
24,201,559 UART: [art] Erasing AUTHORITY.KEYID = 7
24,203,058 UART: [art] PUB.X = 34EFC6E7D38C7DBB4879699B7833CC012E57F9AE1F193E1376157BB987FD1B0EDBA1594210BFA0499DEF0450734AC1C1
24,210,309 UART: [art] PUB.Y = 1A8DE3AD6A90D9A2A84C2777F27DE455CBBFCEF81685F10F82207E0C4AFA73BA2F0F8ED73EB26FBB20138A1FB8E53AB2
24,217,593 UART: [art] SIG.R = F787FC2B8FD57A0C6628F7273CB3924B63C3D5355E40F8120AD58CDD07B0882299E417FB442EDFAE4B1F32E65EBECB8B
24,225,033 UART: [art] SIG.S = 14D1EE6CCC540399632A7D6F7CC0DE13DE5F599B9B637F544C9EAEFF11D730D329696C35ED46E59BABA175EC3D646B36
25,203,336 UART: mbox::rt_entry...
25,204,281 UART: ____ _ _ _ ____ _____
25,206,390 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,208,426 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,210,364 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,212,295 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,214,223 UART: |_|
25,215,058 UART:
25,326,806 UART: [rt] Runtime listening for mailbox commands...
25,328,812 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,329,327 >>> mbox cmd response data (0 bytes)
Initializing fuses
998 UART:
1,177 UART: Running Caliptra ROM ...
2,221 UART:
2,364 UART: [state] CFI Enabled
63,932 UART: [state] LifecycleState = Production
65,698 UART: [state] DebugLocked = Yes
68,735 UART: [state] Starting the WD Timer 40000000 cycles
72,775 UART: [kat] SHA2-256
251,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,526 UART: [kat] ++
264,054 UART: [kat] sha1
275,915 UART: [kat] SHA2-256
278,961 UART: [kat] SHA2-384
285,372 UART: [kat] SHA2-512-ACC
288,314 UART: [kat] ECC-384
2,748,569 UART: [kat] HMAC-384Kdf
2,771,931 UART: [kat] LMS
3,301,407 UART: [kat] --
3,305,341 UART: [warm-reset] ++
3,309,764 UART: [warm-reset] --
3,313,527 UART: [state] Locking Datavault
3,316,726 UART: [state] Locking PCR0, PCR1 and PCR31
3,318,415 UART: [state] Locking ICCM
3,319,729 UART: [exit] Launching FMC @ 0x40000130
3,328,139 UART:
3,328,386 UART: Running Caliptra FMC ...
3,329,491 UART:
3,329,656 UART: [state] CFI Enabled
3,381,377 UART: [aliasrt :skip pcr extension
3,382,630 UART: [art] Extend RT PCRs Done
3,383,771 UART: [art] Lock RT PCRs Done
3,384,889 UART: [art] Populate DV Done
3,390,730 UART: [fht] FMC Alias Private Key: 7
3,392,272 UART: [art] Derive CDI
3,393,088 UART: [art] Store in in slot 0x4
3,449,873 UART: [art] Derive Key Pair
3,450,927 UART: [art] Store priv key in slot 0x5
5,913,575 UART: [art] Derive Key Pair - Done
5,926,357 UART: [art] Signing Cert with AUTHO
5,927,687 UART: RITY.KEYID = 7
7,639,929 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,440 UART: [art] PUB.X = 34EFC6E7D38C7DBB4879699B7833CC012E57F9AE1F193E1376157BB987FD1B0EDBA1594210BFA0499DEF0450734AC1C1
7,648,712 UART: [art] PUB.Y = 1A8DE3AD6A90D9A2A84C2777F27DE455CBBFCEF81685F10F82207E0C4AFA73BA2F0F8ED73EB26FBB20138A1FB8E53AB2
7,656,014 UART: [art] SIG.R = F787FC2B8FD57A0C6628F7273CB3924B63C3D5355E40F8120AD58CDD07B0882299E417FB442EDFAE4B1F32E65EBECB8B
7,663,369 UART: [art] SIG.S = 14D1EE6CCC540399632A7D6F7CC0DE13DE5F599B9B637F544C9EAEFF11D730D329696C35ED46E59BABA175EC3D646B36
8,641,308 UART: mbox::rt_entry...
8,642,251 UART: ____ _ _ _ ____ _____
8,644,236 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,646,239 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,648,168 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,650,097 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,652,036 UART: |_|
8,652,853 UART:
8,939,982 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
191,811 UART:
192,196 UART: Running Caliptra ROM ...
193,274 UART:
603,046 UART: [state] CFI Enabled
616,958 UART: [state] LifecycleState = Production
618,651 UART: [state] DebugLocked = Yes
619,932 UART: [state] Starting the WD Timer 40000000 cycles
624,599 UART: [kat] SHA2-256
803,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,318 UART: [kat] ++
815,756 UART: [kat] sha1
825,698 UART: [kat] SHA2-256
828,741 UART: [kat] SHA2-384
835,725 UART: [kat] SHA2-512-ACC
838,663 UART: [kat] ECC-384
3,279,521 UART: [kat] HMAC-384Kdf
3,293,595 UART: [kat] LMS
3,823,090 UART: [kat] --
3,827,654 UART: [cold-reset] ++
3,830,072 UART: [fht] FHT @ 0x50003400
3,839,688 UART: [idev] ++
3,840,251 UART: [idev] CDI.KEYID = 6
3,841,159 UART: [idev] SUBJECT.KEYID = 7
3,842,392 UART: [idev] UDS.KEYID = 0
3,843,307 ready_for_fw is high
3,843,511 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,942,542 UART: [idev] Erasing UDS.KEYID = 0
6,311,383 UART: [idev] Sha1 KeyId Algorithm
6,335,139 UART: [idev] --
6,338,808 UART: [ldev] ++
6,339,367 UART: [ldev] CDI.KEYID = 6
6,340,241 UART: [ldev] SUBJECT.KEYID = 5
6,341,384 UART: [ldev] AUTHORITY.KEYID = 7
6,342,715 UART: [ldev] FE.KEYID = 1
6,353,614 UART: [ldev] Erasing FE.KEYID = 1
8,830,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,372 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,561,397 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,577,209 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,593,198 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,612,732 UART: [ldev] --
10,617,988 UART: [fwproc] Wait for Commands...
10,620,612 UART: [fwproc] Recv command 0x46574c44
10,622,715 UART: [fwproc] Recv'd Img size: 78704 bytes
13,625,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,697,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,765,814 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,958,570 >>> mbox cmd response: success
13,962,843 UART: [afmc] ++
13,963,467 UART: [afmc] CDI.KEYID = 6
13,964,378 UART: [afmc] SUBJECT.KEYID = 7
13,965,473 UART: [afmc] AUTHORITY.KEYID = 5
16,460,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,181,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,183,066 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,199,047 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,214,898 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,230,605 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,254,628 UART: [afmc] --
18,257,833 UART: [cold-reset] --
18,263,204 UART: [state] Locking Datavault
18,266,718 UART: [state] Locking PCR0, PCR1 and PCR31
18,268,386 UART: [state] Locking ICCM
18,271,128 UART: [exit] Launching FMC @ 0x40000130
18,279,521 UART:
18,279,749 UART: Running Caliptra FMC ...
18,280,841 UART:
18,280,992 UART: [state] CFI Enabled
18,289,197 UART: [fht] FMC Alias Private Key: 7
20,046,780 UART: [art] Extend RT PCRs Done
20,047,999 UART: [art] Lock RT PCRs Done
20,049,684 UART: [art] Populate DV Done
20,055,199 UART: [fht] FMC Alias Private Key: 7
20,056,680 UART: [art] Derive CDI
20,057,434 UART: [art] Store in in slot 0x4
20,099,727 UART: [art] Derive Key Pair
20,100,835 UART: [art] Store priv key in slot 0x5
22,527,758 UART: [art] Derive Key Pair - Done
22,540,820 UART: [art] Signing Cert with AUTHO
22,542,122 UART: RITY.KEYID = 7
24,248,083 UART: [art] Erasing AUTHORITY.KEYID = 7
24,249,583 UART: [art] PUB.X = D08A578B564C93C258928B4A98EEAFB56617C388D75E5E891B581D1CE8F9B46589C63309EC460FA812B7F85746680B95
24,256,822 UART: [art] PUB.Y = 6512C0C38B0F933CFA2BB93727CFF4EFF3F09823CD7273F5B5D2983A7EA33059C4856A2781FAAC713C54ECEA15779DEF
24,264,159 UART: [art] SIG.R = 38F435C833FACD3FAAC60D26295974CB1746C8B96506226ACECEA47D24836AA702FCEA69DC8BFDD5135193B7C8569465
24,271,583 UART: [art] SIG.S = 8FD80F22436366A3ECC413DE47B5E1421612ECDC0B78D421163C7B9447ACBCA1C3E1C63859CAA11CA05DD18451E014AD
25,249,983 UART: mbox::rt_entry...
25,250,930 UART: ____ _ _ _ ____ _____
25,252,907 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,254,908 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,256,828 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,258,745 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,260,678 UART: |_|
25,261,483 UART:
25,374,883 UART: [rt] Runtime listening for mailbox commands...
25,376,918 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,377,412 >>> mbox cmd response data (0 bytes)
Initializing fuses
995 UART:
1,241 UART: Running Caliptra ROM ...
2,340 UART:
15,152,429 UART: [state] CFI Enabled
15,164,714 UART: [state] LifecycleState = Production
15,166,468 UART: [state] DebugLocked = Yes
15,169,235 UART: [state] Starting the WD Timer 40000000 cycles
15,173,420 UART: [kat] SHA2-256
15,352,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,364,149 UART: [kat] ++
15,364,616 UART: [kat] sha1
15,376,629 UART: [kat] SHA2-256
15,379,676 UART: [kat] SHA2-384
15,385,449 UART: [kat] SHA2-512-ACC
15,388,387 UART: [kat] ECC-384
17,829,195 UART: [kat] HMAC-384Kdf
17,841,629 UART: [kat] LMS
18,371,141 UART: [kat] --
18,377,771 UART: [warm-reset] ++
18,380,393 UART: [warm-reset] --
18,384,299 UART: [state] Locking Datavault
18,387,115 UART: [state] Locking PCR0, PCR1 and PCR31
18,388,808 UART: [state] Locking ICCM
18,390,356 UART: [exit] Launching FMC @ 0x40000130
18,398,801 UART:
18,399,031 UART: Running Caliptra FMC ...
18,400,145 UART:
18,400,297 UART: [state] CFI Enabled
18,402,347 UART: [aliasrt :skip pcr extension
18,403,585 UART: [art] Extend RT PCRs Done
18,404,712 UART: [art] Lock RT PCRs Done
18,405,824 UART: [art] Populate DV Done
18,411,338 UART: [fht] FMC Alias Private Key: 7
18,413,015 UART: [art] Derive CDI
18,413,832 UART: [art] Store in in slot 0x4
18,456,341 UART: [art] Derive Key Pair
18,457,353 UART: [art] Store priv key in slot 0x5
20,884,496 UART: [art] Derive Key Pair - Done
20,897,636 UART: [art] Signing Cert with AUTHO
20,898,964 UART: RITY.KEYID = 7
22,604,120 UART: [art] Erasing AUTHORITY.KEYID = 7
22,605,610 UART: [art] PUB.X = D08A578B564C93C258928B4A98EEAFB56617C388D75E5E891B581D1CE8F9B46589C63309EC460FA812B7F85746680B95
22,612,878 UART: [art] PUB.Y = 6512C0C38B0F933CFA2BB93727CFF4EFF3F09823CD7273F5B5D2983A7EA33059C4856A2781FAAC713C54ECEA15779DEF
22,620,169 UART: [art] SIG.R = 38F435C833FACD3FAAC60D26295974CB1746C8B96506226ACECEA47D24836AA702FCEA69DC8BFDD5135193B7C8569465
22,627,562 UART: [art] SIG.S = 8FD80F22436366A3ECC413DE47B5E1421612ECDC0B78D421163C7B9447ACBCA1C3E1C63859CAA11CA05DD18451E014AD
23,606,196 UART: mbox::rt_entry...
23,607,299 UART: ____ _ _ _ ____ _____
23,609,287 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,611,291 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,613,214 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,615,141 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,616,986 UART: |_|
23,617,776 UART:
23,905,068 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
191,751 UART:
192,139 UART: Running Caliptra ROM ...
193,317 UART:
602,725 UART: [state] CFI Enabled
616,127 UART: [state] LifecycleState = Production
617,877 UART: [state] DebugLocked = Yes
619,790 UART: [state] Starting the WD Timer 40000000 cycles
624,100 UART: [kat] SHA2-256
803,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,852 UART: [kat] ++
815,381 UART: [kat] sha1
824,718 UART: [kat] SHA2-256
827,713 UART: [kat] SHA2-384
834,406 UART: [kat] SHA2-512-ACC
837,343 UART: [kat] ECC-384
3,277,443 UART: [kat] HMAC-384Kdf
3,289,360 UART: [kat] LMS
3,818,836 UART: [kat] --
3,823,256 UART: [cold-reset] ++
3,824,825 UART: [fht] FHT @ 0x50003400
3,835,367 UART: [idev] ++
3,835,932 UART: [idev] CDI.KEYID = 6
3,836,833 UART: [idev] SUBJECT.KEYID = 7
3,837,995 UART: [idev] UDS.KEYID = 0
3,839,035 ready_for_fw is high
3,839,251 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,938,376 UART: [idev] Erasing UDS.KEYID = 0
6,309,531 UART: [idev] Sha1 KeyId Algorithm
6,331,623 UART: [idev] --
6,335,236 UART: [ldev] ++
6,335,840 UART: [ldev] CDI.KEYID = 6
6,336,720 UART: [ldev] SUBJECT.KEYID = 5
6,337,952 UART: [ldev] AUTHORITY.KEYID = 7
6,339,181 UART: [ldev] FE.KEYID = 1
6,348,602 UART: [ldev] Erasing FE.KEYID = 1
8,822,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,184 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,557,164 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,572,970 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,588,955 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,608,695 UART: [ldev] --
10,613,999 UART: [fwproc] Wait for Commands...
10,615,540 UART: [fwproc] Recv command 0x46574c44
10,617,623 UART: [fwproc] Recv'd Img size: 78704 bytes
13,614,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,688,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,757,353 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,950,025 >>> mbox cmd response: success
13,954,281 UART: [afmc] ++
13,954,892 UART: [afmc] CDI.KEYID = 6
13,955,807 UART: [afmc] SUBJECT.KEYID = 7
13,956,964 UART: [afmc] AUTHORITY.KEYID = 5
16,457,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,177,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,179,130 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,195,105 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,210,972 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,226,726 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,249,397 UART: [afmc] --
18,252,310 UART: [cold-reset] --
18,255,740 UART: [state] Locking Datavault
18,263,562 UART: [state] Locking PCR0, PCR1 and PCR31
18,265,278 UART: [state] Locking ICCM
18,267,530 UART: [exit] Launching FMC @ 0x40000130
18,275,941 UART:
18,276,174 UART: Running Caliptra FMC ...
18,277,268 UART:
18,277,420 UART: [state] CFI Enabled
18,285,626 UART: [fht] FMC Alias Private Key: 7
20,042,420 UART: [art] Extend RT PCRs Done
20,043,649 UART: [art] Lock RT PCRs Done
20,045,515 UART: [art] Populate DV Done
20,050,866 UART: [fht] FMC Alias Private Key: 7
20,052,563 UART: [art] Derive CDI
20,053,300 UART: [art] Store in in slot 0x4
20,096,090 UART: [art] Derive Key Pair
20,097,238 UART: [art] Store priv key in slot 0x5
22,524,050 UART: [art] Derive Key Pair - Done
22,537,099 UART: [art] Signing Cert with AUTHO
22,538,399 UART: RITY.KEYID = 7
24,243,835 UART: [art] Erasing AUTHORITY.KEYID = 7
24,245,327 UART: [art] PUB.X = 24559235D6CA3CF7A406810D5D1A72A641BEC3B495F629556E2FF56CA922AD1BA08FFEFC9E4D94CB8FCC2B5556D2E773
24,252,621 UART: [art] PUB.Y = 2E7716520F491009F361864F4EB9518E7C281A11E1413328D618DB6889F82C1049E1C9AE7F1CDAD43459B36CD4B63804
24,259,887 UART: [art] SIG.R = 052BE25783032EA371CB0118A3A52E809C187E740E7401C7FBB7934C515C0905735330C03B245A2DBA06A846D562E956
24,267,238 UART: [art] SIG.S = 05D56BE046911620ADDA074F4D703A4B8F9242DF7D14EF56E877E638C524CAF44B9CBD05C7690F73903C61CDF3112156
25,246,101 UART: mbox::rt_entry...
25,247,060 UART: ____ _ _ _ ____ _____
25,248,978 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,250,977 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,252,904 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,254,827 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,256,747 UART: |_|
25,257,622 UART:
25,371,306 UART: [rt] Runtime listening for mailbox commands...
25,373,317 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,374,000 >>> mbox cmd response data (0 bytes)
Initializing fuses
995 UART:
1,242 UART: Running Caliptra ROM ...
2,341 UART:
15,153,077 UART: [state] CFI Enabled
15,168,093 UART: [state] LifecycleState = Production
15,169,791 UART: [state] DebugLocked = Yes
15,171,072 UART: [state] Starting the WD Timer 40000000 cycles
15,176,121 UART: [kat] SHA2-256
15,355,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,366,847 UART: [kat] ++
15,367,301 UART: [kat] sha1
15,378,611 UART: [kat] SHA2-256
15,381,617 UART: [kat] SHA2-384
15,387,054 UART: [kat] SHA2-512-ACC
15,389,998 UART: [kat] ECC-384
17,830,391 UART: [kat] HMAC-384Kdf
17,841,904 UART: [kat] LMS
18,371,460 UART: [kat] --
18,377,225 UART: [warm-reset] ++
18,381,144 UART: [warm-reset] --
18,386,884 UART: [state] Locking Datavault
18,388,890 UART: [state] Locking PCR0, PCR1 and PCR31
18,390,535 UART: [state] Locking ICCM
18,391,897 UART: [exit] Launching FMC @ 0x40000130
18,400,338 UART:
18,400,607 UART: Running Caliptra FMC ...
18,401,626 UART:
18,401,763 UART: [state] CFI Enabled
18,403,915 UART: [aliasrt :skip pcr extension
18,405,150 UART: [art] Extend RT PCRs Done
18,406,200 UART: [art] Lock RT PCRs Done
18,407,485 UART: [art] Populate DV Done
18,412,836 UART: [fht] FMC Alias Private Key: 7
18,414,359 UART: [art] Derive CDI
18,415,081 UART: [art] Store in in slot 0x4
18,458,263 UART: [art] Derive Key Pair
18,459,274 UART: [art] Store priv key in slot 0x5
20,885,999 UART: [art] Derive Key Pair - Done
20,899,105 UART: [art] Signing Cert with AUTHO
20,900,398 UART: RITY.KEYID = 7
22,605,573 UART: [art] Erasing AUTHORITY.KEYID = 7
22,607,058 UART: [art] PUB.X = 24559235D6CA3CF7A406810D5D1A72A641BEC3B495F629556E2FF56CA922AD1BA08FFEFC9E4D94CB8FCC2B5556D2E773
22,614,301 UART: [art] PUB.Y = 2E7716520F491009F361864F4EB9518E7C281A11E1413328D618DB6889F82C1049E1C9AE7F1CDAD43459B36CD4B63804
22,621,582 UART: [art] SIG.R = 052BE25783032EA371CB0118A3A52E809C187E740E7401C7FBB7934C515C0905735330C03B245A2DBA06A846D562E956
22,628,906 UART: [art] SIG.S = 05D56BE046911620ADDA074F4D703A4B8F9242DF7D14EF56E877E638C524CAF44B9CBD05C7690F73903C61CDF3112156
23,607,799 UART: mbox::rt_entry...
23,608,757 UART: ____ _ _ _ ____ _____
23,610,698 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,612,698 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,614,545 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,616,457 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,618,303 UART: |_|
23,619,176 UART:
23,904,812 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
191,722 UART:
192,075 UART: Running Caliptra ROM ...
193,246 UART:
193,402 UART: [state] CFI Enabled
260,481 UART: [state] LifecycleState = Production
262,281 UART: [state] DebugLocked = Yes
264,491 UART: [state] Starting the WD Timer 40000000 cycles
268,726 UART: [kat] SHA2-256
447,859 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,406 UART: [kat] ++
459,930 UART: [kat] sha1
471,621 UART: [kat] SHA2-256
474,693 UART: [kat] SHA2-384
481,417 UART: [kat] SHA2-512-ACC
484,344 UART: [kat] ECC-384
2,950,791 UART: [kat] HMAC-384Kdf
2,971,003 UART: [kat] LMS
3,500,465 UART: [kat] --
3,506,375 UART: [cold-reset] ++
3,507,521 UART: [fht] FHT @ 0x50003400
3,518,707 UART: [idev] ++
3,519,304 UART: [idev] CDI.KEYID = 6
3,520,191 UART: [idev] SUBJECT.KEYID = 7
3,521,316 UART: [idev] UDS.KEYID = 0
3,522,300 ready_for_fw is high
3,522,489 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,621,587 UART: [idev] Erasing UDS.KEYID = 0
6,027,231 UART: [idev] Sha1 KeyId Algorithm
6,051,129 UART: [idev] --
6,053,985 UART: [ldev] ++
6,054,579 UART: [ldev] CDI.KEYID = 6
6,055,466 UART: [ldev] SUBJECT.KEYID = 5
6,056,795 UART: [ldev] AUTHORITY.KEYID = 7
6,057,974 UART: [ldev] FE.KEYID = 1
6,100,470 UART: [ldev] Erasing FE.KEYID = 1
8,602,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,193 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,178 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,044 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,961 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,125 UART: [ldev] --
10,413,341 UART: [fwproc] Wait for Commands...
10,415,599 UART: [fwproc] Recv command 0x46574c44
10,417,690 UART: [fwproc] Recv'd Img size: 78704 bytes
13,414,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,483,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,552,568 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,745,219 >>> mbox cmd response: success
13,749,741 UART: [afmc] ++
13,750,356 UART: [afmc] CDI.KEYID = 6
13,751,284 UART: [afmc] SUBJECT.KEYID = 7
13,752,442 UART: [afmc] AUTHORITY.KEYID = 5
16,276,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,001,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,002,941 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,018,925 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,034,794 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,050,537 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,072,176 UART: [afmc] --
18,075,203 UART: [cold-reset] --
18,077,667 UART: [state] Locking Datavault
18,083,114 UART: [state] Locking PCR0, PCR1 and PCR31
18,084,841 UART: [state] Locking ICCM
18,086,834 UART: [exit] Launching FMC @ 0x40000130
18,095,232 UART:
18,095,473 UART: Running Caliptra FMC ...
18,096,584 UART:
18,096,744 UART: [state] CFI Enabled
18,159,114 UART: [fht] FMC Alias Private Key: 7
19,922,240 UART: [art] Extend RT PCRs Done
19,923,463 UART: [art] Lock RT PCRs Done
19,925,189 UART: [art] Populate DV Done
19,930,864 UART: [fht] FMC Alias Private Key: 7
19,932,451 UART: [art] Derive CDI
19,933,262 UART: [art] Store in in slot 0x4
19,992,514 UART: [art] Derive Key Pair
19,993,510 UART: [art] Store priv key in slot 0x5
22,456,616 UART: [art] Derive Key Pair - Done
22,469,565 UART: [art] Signing Cert with AUTHO
22,470,865 UART: RITY.KEYID = 7
24,181,989 UART: [art] Erasing AUTHORITY.KEYID = 7
24,183,503 UART: [art] PUB.X = E85F8DD62A9C9A8703FA9A17BB058363D50822275A91963AE57009EA4CDE765B3410CC12E19AD65A919DD4012ED76DAD
24,190,750 UART: [art] PUB.Y = 2BE5BEE8BE39DDD559C66F0F4DA48FB9FCDD2B9D6636C65DE53F3DA6095BE720872C768ED50FD49FBAF3D6026EE9E476
24,198,031 UART: [art] SIG.R = F63A2F2C087EAEB68993E0C1943F8B242CF2A731F11C46D17BC74606670B01A48CE1D28D5E79E461A70F6121E143C27E
24,205,428 UART: [art] SIG.S = 57E4DC7DEDA5A6F1641F43D0AC25A1A94FC6386869E1F42BA8F6CABC2880CE47C4915F0F4581F8745FF00B2381C4AD50
25,183,156 UART: mbox::rt_entry...
25,184,105 UART: ____ _ _ _ ____ _____
25,186,079 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,188,083 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,190,014 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,191,945 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,193,872 UART: |_|
25,194,703 UART:
25,307,802 UART: [rt] Runtime listening for mailbox commands...
25,309,837 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,310,350 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,035 UART:
1,226 UART: Running Caliptra ROM ...
2,338 UART:
2,496 UART: [state] CFI Enabled
65,047 UART: [state] LifecycleState = Production
66,758 UART: [state] DebugLocked = Yes
69,414 UART: [state] Starting the WD Timer 40000000 cycles
74,782 UART: [kat] SHA2-256
253,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,508 UART: [kat] ++
266,037 UART: [kat] sha1
276,870 UART: [kat] SHA2-256
279,875 UART: [kat] SHA2-384
286,848 UART: [kat] SHA2-512-ACC
289,766 UART: [kat] ECC-384
2,747,285 UART: [kat] HMAC-384Kdf
2,770,521 UART: [kat] LMS
3,299,995 UART: [kat] --
3,304,738 UART: [warm-reset] ++
3,310,285 UART: [warm-reset] --
3,314,636 UART: [state] Locking Datavault
3,318,274 UART: [state] Locking PCR0, PCR1 and PCR31
3,319,918 UART: [state] Locking ICCM
3,321,528 UART: [exit] Launching FMC @ 0x40000130
3,329,975 UART:
3,330,248 UART: Running Caliptra FMC ...
3,331,362 UART:
3,331,522 UART: [state] CFI Enabled
3,380,429 UART: [aliasrt :skip pcr extension
3,381,702 UART: [art] Extend RT PCRs Done
3,382,841 UART: [art] Lock RT PCRs Done
3,384,073 UART: [art] Populate DV Done
3,389,314 UART: [fht] FMC Alias Private Key: 7
3,390,955 UART: [art] Derive CDI
3,391,766 UART: [art] Store in in slot 0x4
3,449,350 UART: [art] Derive Key Pair
3,450,396 UART: [art] Store priv key in slot 0x5
5,913,122 UART: [art] Derive Key Pair - Done
5,926,224 UART: [art] Signing Cert with AUTHO
5,927,521 UART: RITY.KEYID = 7
7,638,885 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,391 UART: [art] PUB.X = E85F8DD62A9C9A8703FA9A17BB058363D50822275A91963AE57009EA4CDE765B3410CC12E19AD65A919DD4012ED76DAD
7,647,685 UART: [art] PUB.Y = 2BE5BEE8BE39DDD559C66F0F4DA48FB9FCDD2B9D6636C65DE53F3DA6095BE720872C768ED50FD49FBAF3D6026EE9E476
7,654,938 UART: [art] SIG.R = F63A2F2C087EAEB68993E0C1943F8B242CF2A731F11C46D17BC74606670B01A48CE1D28D5E79E461A70F6121E143C27E
7,662,331 UART: [art] SIG.S = 57E4DC7DEDA5A6F1641F43D0AC25A1A94FC6386869E1F42BA8F6CABC2880CE47C4915F0F4581F8745FF00B2381C4AD50
8,640,604 UART: mbox::rt_entry...
8,641,562 UART: ____ _ _ _ ____ _____
8,643,543 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,645,548 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,647,478 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,649,407 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,651,336 UART: |_|
8,652,171 UART:
8,936,683 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
191,820 UART:
192,189 UART: Running Caliptra ROM ...
193,357 UART:
602,835 UART: [state] CFI Enabled
616,505 UART: [state] LifecycleState = Production
618,189 UART: [state] DebugLocked = Yes
621,102 UART: [state] Starting the WD Timer 40000000 cycles
625,907 UART: [kat] SHA2-256
805,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,593 UART: [kat] ++
817,034 UART: [kat] sha1
826,510 UART: [kat] SHA2-256
829,590 UART: [kat] SHA2-384
836,425 UART: [kat] SHA2-512-ACC
839,372 UART: [kat] ECC-384
3,281,913 UART: [kat] HMAC-384Kdf
3,294,217 UART: [kat] LMS
3,823,715 UART: [kat] --
3,826,572 UART: [cold-reset] ++
3,828,708 UART: [fht] FHT @ 0x50003400
3,840,405 UART: [idev] ++
3,841,002 UART: [idev] CDI.KEYID = 6
3,841,890 UART: [idev] SUBJECT.KEYID = 7
3,843,135 UART: [idev] UDS.KEYID = 0
3,844,041 ready_for_fw is high
3,844,230 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,943,173 UART: [idev] Erasing UDS.KEYID = 0
6,316,703 UART: [idev] Sha1 KeyId Algorithm
6,338,927 UART: [idev] --
6,341,837 UART: [ldev] ++
6,342,420 UART: [ldev] CDI.KEYID = 6
6,343,327 UART: [ldev] SUBJECT.KEYID = 5
6,344,533 UART: [ldev] AUTHORITY.KEYID = 7
6,345,810 UART: [ldev] FE.KEYID = 1
6,353,370 UART: [ldev] Erasing FE.KEYID = 1
8,827,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,313 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,562,321 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,578,139 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,594,086 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,614,587 UART: [ldev] --
10,619,624 UART: [fwproc] Wait for Commands...
10,621,505 UART: [fwproc] Recv command 0x46574c44
10,623,593 UART: [fwproc] Recv'd Img size: 78704 bytes
13,627,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,701,058 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,769,873 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,962,950 >>> mbox cmd response: success
13,968,034 UART: [afmc] ++
13,968,645 UART: [afmc] CDI.KEYID = 6
13,969,551 UART: [afmc] SUBJECT.KEYID = 7
13,970,707 UART: [afmc] AUTHORITY.KEYID = 5
16,466,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,186,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,188,805 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,204,784 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,220,645 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,236,537 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,259,223 UART: [afmc] --
18,263,548 UART: [cold-reset] --
18,267,680 UART: [state] Locking Datavault
18,273,297 UART: [state] Locking PCR0, PCR1 and PCR31
18,274,960 UART: [state] Locking ICCM
18,277,647 UART: [exit] Launching FMC @ 0x40000130
18,286,042 UART:
18,286,273 UART: Running Caliptra FMC ...
18,287,364 UART:
18,287,511 UART: [state] CFI Enabled
18,295,661 UART: [fht] FMC Alias Private Key: 7
20,052,094 UART: [art] Extend RT PCRs Done
20,053,319 UART: [art] Lock RT PCRs Done
20,055,318 UART: [art] Populate DV Done
20,060,833 UART: [fht] FMC Alias Private Key: 7
20,062,476 UART: [art] Derive CDI
20,063,283 UART: [art] Store in in slot 0x4
20,105,806 UART: [art] Derive Key Pair
20,106,984 UART: [art] Store priv key in slot 0x5
22,533,742 UART: [art] Derive Key Pair - Done
22,546,593 UART: [art] Signing Cert with AUTHO
22,547,891 UART: RITY.KEYID = 7
24,253,160 UART: [art] Erasing AUTHORITY.KEYID = 7
24,254,660 UART: [art] PUB.X = B459E3C3207B099282E2A574885808EBA91563BD265FB171D70A962194FCA2E11F778959F22A74E063D44CF0E6FA333D
24,261,892 UART: [art] PUB.Y = F5A3D4C4A5179072DF7A4E33488DD4A3C72CD0CC6F8A5027FA60F9BF70096946F482968E6CA90FCEB2AEE984805C77A3
24,269,174 UART: [art] SIG.R = 773BB62F15C051457F8E21D8E6CDF9D3DC3AD675FD914634CDA8BB9F48CE928D254BCFE514F7AC8A0A1D8D3E96B02671
24,276,608 UART: [art] SIG.S = 9F29E4837CA42E9AAAE851393C8DD8D1542F827219298C551372C5A761A151005FFE5F5CA1B145CBEC51600AE8801BA3
25,254,852 UART: mbox::rt_entry...
25,255,810 UART: ____ _ _ _ ____ _____
25,257,792 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,259,794 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,261,717 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,263,643 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,265,564 UART: |_|
25,266,360 UART:
25,379,338 UART: [rt] Runtime listening for mailbox commands...
25,381,368 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,381,861 >>> mbox cmd response data (0 bytes)
Initializing fuses
976 UART:
1,218 UART: Running Caliptra ROM ...
2,313 UART:
15,152,599 UART: [state] CFI Enabled
15,166,642 UART: [state] LifecycleState = Production
15,168,344 UART: [state] DebugLocked = Yes
15,170,250 UART: [state] Starting the WD Timer 40000000 cycles
15,175,630 UART: [kat] SHA2-256
15,354,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,366,344 UART: [kat] ++
15,366,793 UART: [kat] sha1
15,377,671 UART: [kat] SHA2-256
15,380,738 UART: [kat] SHA2-384
15,386,086 UART: [kat] SHA2-512-ACC
15,389,025 UART: [kat] ECC-384
17,834,055 UART: [kat] HMAC-384Kdf
17,848,012 UART: [kat] LMS
18,377,503 UART: [kat] --
18,381,237 UART: [warm-reset] ++
18,384,675 UART: [warm-reset] --
18,387,073 UART: [state] Locking Datavault
18,389,399 UART: [state] Locking PCR0, PCR1 and PCR31
18,391,036 UART: [state] Locking ICCM
18,393,265 UART: [exit] Launching FMC @ 0x40000130
18,401,706 UART:
18,401,931 UART: Running Caliptra FMC ...
18,402,949 UART:
18,403,086 UART: [state] CFI Enabled
18,405,022 UART: [aliasrt :skip pcr extension
18,406,282 UART: [art] Extend RT PCRs Done
18,407,414 UART: [art] Lock RT PCRs Done
18,408,799 UART: [art] Populate DV Done
18,414,523 UART: [fht] FMC Alias Private Key: 7
18,416,006 UART: [art] Derive CDI
18,416,766 UART: [art] Store in in slot 0x4
18,458,721 UART: [art] Derive Key Pair
18,459,761 UART: [art] Store priv key in slot 0x5
20,886,924 UART: [art] Derive Key Pair - Done
20,900,239 UART: [art] Signing Cert with AUTHO
20,901,534 UART: RITY.KEYID = 7
22,607,073 UART: [art] Erasing AUTHORITY.KEYID = 7
22,608,587 UART: [art] PUB.X = B459E3C3207B099282E2A574885808EBA91563BD265FB171D70A962194FCA2E11F778959F22A74E063D44CF0E6FA333D
22,615,850 UART: [art] PUB.Y = F5A3D4C4A5179072DF7A4E33488DD4A3C72CD0CC6F8A5027FA60F9BF70096946F482968E6CA90FCEB2AEE984805C77A3
22,623,086 UART: [art] SIG.R = 773BB62F15C051457F8E21D8E6CDF9D3DC3AD675FD914634CDA8BB9F48CE928D254BCFE514F7AC8A0A1D8D3E96B02671
22,630,497 UART: [art] SIG.S = 9F29E4837CA42E9AAAE851393C8DD8D1542F827219298C551372C5A761A151005FFE5F5CA1B145CBEC51600AE8801BA3
23,609,166 UART: mbox::rt_entry...
23,610,107 UART: ____ _ _ _ ____ _____
23,612,085 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,614,089 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,616,020 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,617,946 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,619,791 UART: |_|
23,620,584 UART:
23,905,397 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Production
85,973 UART: [state] DebugLocked = Yes
86,591 UART: [state] Starting the WD Timer 40000000 cycles
88,062 UART: [kat] SHA2-256
891,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,223 UART: [kat] SHA2-256
902,163 UART: [kat] SHA2-384
904,962 UART: [kat] SHA2-512-ACC
906,863 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,341 UART: [cold-reset] ++
1,170,672 UART: [fht] FHT @ 0x50003400
1,173,224 UART: [idev] ++
1,173,392 UART: [idev] CDI.KEYID = 6
1,173,753 UART: [idev] SUBJECT.KEYID = 7
1,174,178 UART: [idev] UDS.KEYID = 0
1,174,524 ready_for_fw is high
1,174,524 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,909 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,209 UART: [idev] --
1,209,132 UART: [ldev] ++
1,209,300 UART: [ldev] CDI.KEYID = 6
1,209,664 UART: [ldev] SUBJECT.KEYID = 5
1,210,091 UART: [ldev] AUTHORITY.KEYID = 7
1,210,554 UART: [ldev] FE.KEYID = 1
1,215,986 UART: [ldev] Erasing FE.KEYID = 1
1,241,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,397 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,091 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,961 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,667 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,571 UART: [ldev] --
1,280,969 UART: [fwproc] Wait for Commands...
1,281,736 UART: [fwproc] Recv command 0x46574c44
1,282,469 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,495 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,784 >>> mbox cmd response: success
2,337,904 UART: [afmc] ++
2,338,072 UART: [afmc] CDI.KEYID = 6
2,338,435 UART: [afmc] SUBJECT.KEYID = 7
2,338,861 UART: [afmc] AUTHORITY.KEYID = 5
2,374,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,249 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,968 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,861 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,568 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,449 UART: [afmc] --
2,417,368 UART: [cold-reset] --
2,418,142 UART: [state] Locking Datavault
2,419,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,957 UART: [state] Locking ICCM
2,420,489 UART: [exit] Launching FMC @ 0x40000130
2,425,818 UART:
2,425,834 UART: Running Caliptra FMC ...
2,426,242 UART:
2,426,296 UART: [state] CFI Enabled
2,436,983 UART: [fht] FMC Alias Private Key: 7
2,544,698 UART: [art] Extend RT PCRs Done
2,545,126 UART: [art] Lock RT PCRs Done
2,546,560 UART: [art] Populate DV Done
2,554,608 UART: [fht] FMC Alias Private Key: 7
2,555,782 UART: [art] Derive CDI
2,556,062 UART: [art] Store in in slot 0x4
2,641,911 UART: [art] Derive Key Pair
2,642,271 UART: [art] Store priv key in slot 0x5
2,655,409 UART: [art] Derive Key Pair - Done
2,669,966 UART: [art] Signing Cert with AUTHO
2,670,446 UART: RITY.KEYID = 7
2,685,584 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,349 UART: [art] PUB.X = 29E9D21ABBE787414EB3779FABFC4BC744A230929628C9BF817175E3301F288D6E3EC1DE30D0C9A69DFBB2F954076032
2,693,124 UART: [art] PUB.Y = 3D95E02E9E32751354136122044D77C3E7A716CF7EF8EBDF7AE6545A4D9F39E665A96515B23F28B047A7BAAA38F0C0FB
2,700,079 UART: [art] SIG.R = A3A3DEA8D9648E95D630BC2E6F2E23F3ABD0DF5BA3EC32270CA42C8E96E7D3B91ED93B8BD9B802C7A733059A400CF29D
2,706,859 UART: [art] SIG.S = ACB2E796E2547C13A25FC329FE5665D8139A00898C7975978759A6073A5E467ACDD4CD0FF1FC3D0A6D56E912DD9E45D5
2,730,597 UART: mbox::rt_entry...
2,730,969 UART: ____ _ _ _ ____ _____
2,731,753 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,553 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,321 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,089 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,857 UART: |_|
2,735,169 UART:
2,842,307 UART: [rt] Runtime listening for mailbox commands...
2,843,069 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,184 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,278 UART:
2,843,294 UART: Running Caliptra ROM ...
2,843,702 UART:
2,843,757 UART: [state] CFI Enabled
2,846,136 UART: [state] LifecycleState = Production
2,846,744 UART: [state] DebugLocked = Yes
2,847,272 UART: [state] Starting the WD Timer 40000000 cycles
2,848,927 UART: [kat] SHA2-256
3,652,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,606 UART: [kat] ++
3,656,758 UART: [kat] sha1
3,661,064 UART: [kat] SHA2-256
3,663,004 UART: [kat] SHA2-384
3,665,605 UART: [kat] SHA2-512-ACC
3,667,506 UART: [kat] ECC-384
3,677,381 UART: [kat] HMAC-384Kdf
3,682,107 UART: [kat] LMS
3,930,419 UART: [kat] --
3,931,297 UART: [warm-reset] ++
3,932,138 UART: [warm-reset] --
3,932,879 UART: [state] Locking Datavault
3,933,549 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,153 UART: [state] Locking ICCM
3,934,679 UART: [exit] Launching FMC @ 0x40000130
3,940,008 UART:
3,940,024 UART: Running Caliptra FMC ...
3,940,432 UART:
3,940,486 UART: [state] CFI Enabled
3,941,651 UART: [aliasrt :skip pcr extension
3,942,124 UART: [art] Extend RT PCRs Done
3,942,552 UART: [art] Lock RT PCRs Done
3,943,617 UART: [art] Populate DV Done
3,951,949 UART: [fht] FMC Alias Private Key: 7
3,953,035 UART: [art] Derive CDI
3,953,315 UART: [art] Store in in slot 0x4
4,038,842 UART: [art] Derive Key Pair
4,039,202 UART: [art] Store priv key in slot 0x5
4,052,196 UART: [art] Derive Key Pair - Done
4,067,033 UART: [art] Signing Cert with AUTHO
4,067,513 UART: RITY.KEYID = 7
4,082,719 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,484 UART: [art] PUB.X = 29E9D21ABBE787414EB3779FABFC4BC744A230929628C9BF817175E3301F288D6E3EC1DE30D0C9A69DFBB2F954076032
4,090,259 UART: [art] PUB.Y = 3D95E02E9E32751354136122044D77C3E7A716CF7EF8EBDF7AE6545A4D9F39E665A96515B23F28B047A7BAAA38F0C0FB
4,097,214 UART: [art] SIG.R = A3A3DEA8D9648E95D630BC2E6F2E23F3ABD0DF5BA3EC32270CA42C8E96E7D3B91ED93B8BD9B802C7A733059A400CF29D
4,103,994 UART: [art] SIG.S = ACB2E796E2547C13A25FC329FE5665D8139A00898C7975978759A6073A5E467ACDD4CD0FF1FC3D0A6D56E912DD9E45D5
4,127,658 UART: mbox::rt_entry...
4,128,030 UART: ____ _ _ _ ____ _____
4,128,814 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,614 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,382 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,150 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,918 UART: |_|
4,132,230 UART:
4,418,238 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Production
86,169 UART: [state] DebugLocked = Yes
86,917 UART: [state] Starting the WD Timer 40000000 cycles
88,440 UART: [kat] SHA2-256
891,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,119 UART: [kat] ++
896,271 UART: [kat] sha1
900,327 UART: [kat] SHA2-256
902,267 UART: [kat] SHA2-384
905,034 UART: [kat] SHA2-512-ACC
906,935 UART: [kat] ECC-384
917,022 UART: [kat] HMAC-384Kdf
921,666 UART: [kat] LMS
1,169,978 UART: [kat] --
1,170,855 UART: [cold-reset] ++
1,171,196 UART: [fht] FHT @ 0x50003400
1,173,766 UART: [idev] ++
1,173,934 UART: [idev] CDI.KEYID = 6
1,174,295 UART: [idev] SUBJECT.KEYID = 7
1,174,720 UART: [idev] UDS.KEYID = 0
1,175,066 ready_for_fw is high
1,175,066 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,727 UART: [idev] Erasing UDS.KEYID = 0
1,199,966 UART: [idev] Sha1 KeyId Algorithm
1,208,795 UART: [idev] --
1,209,644 UART: [ldev] ++
1,209,812 UART: [ldev] CDI.KEYID = 6
1,210,176 UART: [ldev] SUBJECT.KEYID = 5
1,210,603 UART: [ldev] AUTHORITY.KEYID = 7
1,211,066 UART: [ldev] FE.KEYID = 1
1,216,252 UART: [ldev] Erasing FE.KEYID = 1
1,242,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,483 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,177 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,047 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,753 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,999 UART: [ldev] --
1,282,479 UART: [fwproc] Wait for Commands...
1,283,064 UART: [fwproc] Recv command 0x46574c44
1,283,797 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,375 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,828 >>> mbox cmd response: success
2,339,032 UART: [afmc] ++
2,339,200 UART: [afmc] CDI.KEYID = 6
2,339,563 UART: [afmc] SUBJECT.KEYID = 7
2,339,989 UART: [afmc] AUTHORITY.KEYID = 5
2,374,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,003 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,722 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,615 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,322 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,091 UART: [afmc] --
2,418,186 UART: [cold-reset] --
2,419,018 UART: [state] Locking Datavault
2,420,121 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,725 UART: [state] Locking ICCM
2,421,229 UART: [exit] Launching FMC @ 0x40000130
2,426,558 UART:
2,426,574 UART: Running Caliptra FMC ...
2,426,982 UART:
2,427,036 UART: [state] CFI Enabled
2,437,391 UART: [fht] FMC Alias Private Key: 7
2,545,686 UART: [art] Extend RT PCRs Done
2,546,114 UART: [art] Lock RT PCRs Done
2,547,816 UART: [art] Populate DV Done
2,555,944 UART: [fht] FMC Alias Private Key: 7
2,557,016 UART: [art] Derive CDI
2,557,296 UART: [art] Store in in slot 0x4
2,642,995 UART: [art] Derive Key Pair
2,643,355 UART: [art] Store priv key in slot 0x5
2,656,573 UART: [art] Derive Key Pair - Done
2,670,930 UART: [art] Signing Cert with AUTHO
2,671,410 UART: RITY.KEYID = 7
2,686,624 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,389 UART: [art] PUB.X = EDA69876F060FA0DF1699D96D7DB6D91CB33FC05154E3AB917A76A2894AA1C66B8C9A3F1A673CBD4F724426FF4C1755F
2,694,167 UART: [art] PUB.Y = 190E7EA32EEF159261B14E6CF8825BA3EF4CF8650BE0E51C1B688D57A758F055A0A12A65DB43395C3D3C88A8F4E0A94F
2,701,123 UART: [art] SIG.R = 74EEAEF2F964A7E4DC52A3B2646E7E8D347DD6E6F2BE4EBEA160A2C8E0A21CE7D2BFC85C539793111139384864A8BEEB
2,707,913 UART: [art] SIG.S = 296BA157BA1714A2C10267EC7E614B92B6379B7D29CE3BDEF7BD455D53ADDD9E11175B41EF3E259F2557FB273905A970
2,731,378 UART: mbox::rt_entry...
2,731,750 UART: ____ _ _ _ ____ _____
2,732,534 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,102 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,870 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,638 UART: |_|
2,735,950 UART:
2,843,351 UART: [rt] Runtime listening for mailbox commands...
2,844,113 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,844,228 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,322 UART:
2,844,338 UART: Running Caliptra ROM ...
2,844,746 UART:
2,844,801 UART: [state] CFI Enabled
2,847,762 UART: [state] LifecycleState = Production
2,848,370 UART: [state] DebugLocked = Yes
2,848,938 UART: [state] Starting the WD Timer 40000000 cycles
2,850,411 UART: [kat] SHA2-256
3,653,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,090 UART: [kat] ++
3,658,242 UART: [kat] sha1
3,662,506 UART: [kat] SHA2-256
3,664,446 UART: [kat] SHA2-384
3,667,327 UART: [kat] SHA2-512-ACC
3,669,228 UART: [kat] ECC-384
3,679,119 UART: [kat] HMAC-384Kdf
3,683,535 UART: [kat] LMS
3,931,847 UART: [kat] --
3,932,849 UART: [warm-reset] ++
3,933,924 UART: [warm-reset] --
3,934,659 UART: [state] Locking Datavault
3,935,539 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,143 UART: [state] Locking ICCM
3,936,725 UART: [exit] Launching FMC @ 0x40000130
3,942,054 UART:
3,942,070 UART: Running Caliptra FMC ...
3,942,478 UART:
3,942,532 UART: [state] CFI Enabled
3,943,633 UART: [aliasrt :skip pcr extension
3,944,106 UART: [art] Extend RT PCRs Done
3,944,534 UART: [art] Lock RT PCRs Done
3,945,775 UART: [art] Populate DV Done
3,954,091 UART: [fht] FMC Alias Private Key: 7
3,955,167 UART: [art] Derive CDI
3,955,447 UART: [art] Store in in slot 0x4
4,040,816 UART: [art] Derive Key Pair
4,041,176 UART: [art] Store priv key in slot 0x5
4,053,726 UART: [art] Derive Key Pair - Done
4,068,411 UART: [art] Signing Cert with AUTHO
4,068,891 UART: RITY.KEYID = 7
4,083,877 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,642 UART: [art] PUB.X = EDA69876F060FA0DF1699D96D7DB6D91CB33FC05154E3AB917A76A2894AA1C66B8C9A3F1A673CBD4F724426FF4C1755F
4,091,420 UART: [art] PUB.Y = 190E7EA32EEF159261B14E6CF8825BA3EF4CF8650BE0E51C1B688D57A758F055A0A12A65DB43395C3D3C88A8F4E0A94F
4,098,376 UART: [art] SIG.R = 74EEAEF2F964A7E4DC52A3B2646E7E8D347DD6E6F2BE4EBEA160A2C8E0A21CE7D2BFC85C539793111139384864A8BEEB
4,105,166 UART: [art] SIG.S = 296BA157BA1714A2C10267EC7E614B92B6379B7D29CE3BDEF7BD455D53ADDD9E11175B41EF3E259F2557FB273905A970
4,128,721 UART: mbox::rt_entry...
4,129,093 UART: ____ _ _ _ ____ _____
4,129,877 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,677 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,445 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,213 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,981 UART: |_|
4,133,293 UART:
4,415,852 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Production
85,916 UART: [state] DebugLocked = Yes
86,442 UART: [state] Starting the WD Timer 40000000 cycles
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,829 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,174,771 ready_for_fw is high
1,174,771 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,170 UART: [idev] Erasing UDS.KEYID = 0
1,199,121 UART: [idev] Sha1 KeyId Algorithm
1,208,018 UART: [idev] --
1,209,139 UART: [ldev] ++
1,209,307 UART: [ldev] CDI.KEYID = 6
1,209,671 UART: [ldev] SUBJECT.KEYID = 5
1,210,098 UART: [ldev] AUTHORITY.KEYID = 7
1,210,561 UART: [ldev] FE.KEYID = 1
1,215,709 UART: [ldev] Erasing FE.KEYID = 1
1,242,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,116 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,810 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,680 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,386 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,404 UART: [ldev] --
1,281,814 UART: [fwproc] Wait for Commands...
1,282,395 UART: [fwproc] Recv command 0x46574c44
1,283,128 UART: [fwproc] Recv'd Img size: 78704 bytes
2,199,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,946 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,338,437 >>> mbox cmd response: success
2,339,687 UART: [afmc] ++
2,339,855 UART: [afmc] CDI.KEYID = 6
2,340,218 UART: [afmc] SUBJECT.KEYID = 7
2,340,644 UART: [afmc] AUTHORITY.KEYID = 5
2,376,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,393,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,393,958 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,399,677 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,405,570 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,411,277 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,419,224 UART: [afmc] --
2,420,353 UART: [cold-reset] --
2,421,275 UART: [state] Locking Datavault
2,422,300 UART: [state] Locking PCR0, PCR1 and PCR31
2,422,904 UART: [state] Locking ICCM
2,423,550 UART: [exit] Launching FMC @ 0x40000130
2,428,879 UART:
2,428,895 UART: Running Caliptra FMC ...
2,429,303 UART:
2,429,446 UART: [state] CFI Enabled
2,439,875 UART: [fht] FMC Alias Private Key: 7
2,547,626 UART: [art] Extend RT PCRs Done
2,548,054 UART: [art] Lock RT PCRs Done
2,549,570 UART: [art] Populate DV Done
2,557,776 UART: [fht] FMC Alias Private Key: 7
2,558,782 UART: [art] Derive CDI
2,559,062 UART: [art] Store in in slot 0x4
2,644,829 UART: [art] Derive Key Pair
2,645,189 UART: [art] Store priv key in slot 0x5
2,658,411 UART: [art] Derive Key Pair - Done
2,673,033 UART: [art] Signing Cert with AUTHO
2,673,513 UART: RITY.KEYID = 7
2,689,247 UART: [art] Erasing AUTHORITY.KEYID = 7
2,690,012 UART: [art] PUB.X = 4DC455CC7FBDE2C1E45FE42A65E48007F3BB6D5BDB0106E42397B3583643EA32CC48831C6B6E42F982E68F8BB2AB479F
2,696,787 UART: [art] PUB.Y = 66C4D596C79E08273EACE1E496EAADEF5C48393184846660DF7A59B03B149DE758BB3FC47B27F5BFC868831C79AC12F2
2,703,744 UART: [art] SIG.R = 8A74FA8E073C528FE533EEEF7FB5D9D118B13D78CA84C295EA19FC0EED6083268E41216EB506682C45F7CF02629A7D4B
2,710,514 UART: [art] SIG.S = A1A846795508A83610ADBE1118ABC78F59A58CF127BEC7D58C6ED17F29A18B55E62B30B1207F2B9ADE1DF0B9CA6C4036
2,734,134 UART: mbox::rt_entry...
2,734,506 UART: ____ _ _ _ ____ _____
2,735,290 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,736,090 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,736,858 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,737,626 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,738,394 UART: |_|
2,738,706 UART:
2,845,388 UART: [rt] Runtime listening for mailbox commands...
2,846,150 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,846,265 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,846,359 UART:
2,846,375 UART: Running Caliptra ROM ...
2,846,783 UART:
2,846,925 UART: [state] CFI Enabled
2,849,808 UART: [state] LifecycleState = Production
2,850,416 UART: [state] DebugLocked = Yes
2,851,116 UART: [state] Starting the WD Timer 40000000 cycles
2,852,743 UART: [kat] SHA2-256
3,656,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,660,422 UART: [kat] ++
3,660,574 UART: [kat] sha1
3,664,764 UART: [kat] SHA2-256
3,666,704 UART: [kat] SHA2-384
3,669,561 UART: [kat] SHA2-512-ACC
3,671,462 UART: [kat] ECC-384
3,681,315 UART: [kat] HMAC-384Kdf
3,686,041 UART: [kat] LMS
3,934,353 UART: [kat] --
3,935,627 UART: [warm-reset] ++
3,936,422 UART: [warm-reset] --
3,937,207 UART: [state] Locking Datavault
3,937,849 UART: [state] Locking PCR0, PCR1 and PCR31
3,938,453 UART: [state] Locking ICCM
3,938,967 UART: [exit] Launching FMC @ 0x40000130
3,944,296 UART:
3,944,312 UART: Running Caliptra FMC ...
3,944,720 UART:
3,944,863 UART: [state] CFI Enabled
3,946,342 UART: [aliasrt :skip pcr extension
3,946,815 UART: [art] Extend RT PCRs Done
3,947,243 UART: [art] Lock RT PCRs Done
3,948,738 UART: [art] Populate DV Done
3,957,046 UART: [fht] FMC Alias Private Key: 7
3,958,200 UART: [art] Derive CDI
3,958,480 UART: [art] Store in in slot 0x4
4,044,233 UART: [art] Derive Key Pair
4,044,593 UART: [art] Store priv key in slot 0x5
4,058,507 UART: [art] Derive Key Pair - Done
4,073,575 UART: [art] Signing Cert with AUTHO
4,074,055 UART: RITY.KEYID = 7
4,090,017 UART: [art] Erasing AUTHORITY.KEYID = 7
4,090,782 UART: [art] PUB.X = 4DC455CC7FBDE2C1E45FE42A65E48007F3BB6D5BDB0106E42397B3583643EA32CC48831C6B6E42F982E68F8BB2AB479F
4,097,557 UART: [art] PUB.Y = 66C4D596C79E08273EACE1E496EAADEF5C48393184846660DF7A59B03B149DE758BB3FC47B27F5BFC868831C79AC12F2
4,104,514 UART: [art] SIG.R = 8A74FA8E073C528FE533EEEF7FB5D9D118B13D78CA84C295EA19FC0EED6083268E41216EB506682C45F7CF02629A7D4B
4,111,284 UART: [art] SIG.S = A1A846795508A83610ADBE1118ABC78F59A58CF127BEC7D58C6ED17F29A18B55E62B30B1207F2B9ADE1DF0B9CA6C4036
4,134,820 UART: mbox::rt_entry...
4,135,192 UART: ____ _ _ _ ____ _____
4,135,976 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,136,776 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,137,544 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,138,312 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,139,080 UART: |_|
4,139,392 UART:
4,422,392 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Production
85,986 UART: [state] DebugLocked = Yes
86,652 UART: [state] Starting the WD Timer 40000000 cycles
88,365 UART: [kat] SHA2-256
891,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,044 UART: [kat] ++
896,196 UART: [kat] sha1
900,460 UART: [kat] SHA2-256
902,400 UART: [kat] SHA2-384
905,191 UART: [kat] SHA2-512-ACC
907,092 UART: [kat] ECC-384
916,993 UART: [kat] HMAC-384Kdf
921,475 UART: [kat] LMS
1,169,787 UART: [kat] --
1,170,582 UART: [cold-reset] ++
1,170,977 UART: [fht] FHT @ 0x50003400
1,173,717 UART: [idev] ++
1,173,885 UART: [idev] CDI.KEYID = 6
1,174,246 UART: [idev] SUBJECT.KEYID = 7
1,174,671 UART: [idev] UDS.KEYID = 0
1,175,017 ready_for_fw is high
1,175,017 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,442 UART: [idev] Erasing UDS.KEYID = 0
1,198,983 UART: [idev] Sha1 KeyId Algorithm
1,207,826 UART: [idev] --
1,208,971 UART: [ldev] ++
1,209,139 UART: [ldev] CDI.KEYID = 6
1,209,503 UART: [ldev] SUBJECT.KEYID = 5
1,209,930 UART: [ldev] AUTHORITY.KEYID = 7
1,210,393 UART: [ldev] FE.KEYID = 1
1,215,749 UART: [ldev] Erasing FE.KEYID = 1
1,241,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,406 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,100 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,970 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,676 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,862 UART: [ldev] --
1,281,236 UART: [fwproc] Wait for Commands...
1,281,953 UART: [fwproc] Recv command 0x46574c44
1,282,686 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,852 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,317 >>> mbox cmd response: success
2,337,435 UART: [afmc] ++
2,337,603 UART: [afmc] CDI.KEYID = 6
2,337,966 UART: [afmc] SUBJECT.KEYID = 7
2,338,392 UART: [afmc] AUTHORITY.KEYID = 5
2,374,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,328 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,047 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,940 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,647 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,476 UART: [afmc] --
2,417,423 UART: [cold-reset] --
2,418,391 UART: [state] Locking Datavault
2,419,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,238 UART: [state] Locking ICCM
2,420,700 UART: [exit] Launching FMC @ 0x40000130
2,426,029 UART:
2,426,045 UART: Running Caliptra FMC ...
2,426,453 UART:
2,426,596 UART: [state] CFI Enabled
2,437,387 UART: [fht] FMC Alias Private Key: 7
2,544,732 UART: [art] Extend RT PCRs Done
2,545,160 UART: [art] Lock RT PCRs Done
2,546,904 UART: [art] Populate DV Done
2,554,836 UART: [fht] FMC Alias Private Key: 7
2,555,970 UART: [art] Derive CDI
2,556,250 UART: [art] Store in in slot 0x4
2,642,131 UART: [art] Derive Key Pair
2,642,491 UART: [art] Store priv key in slot 0x5
2,655,837 UART: [art] Derive Key Pair - Done
2,670,349 UART: [art] Signing Cert with AUTHO
2,670,829 UART: RITY.KEYID = 7
2,686,345 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,110 UART: [art] PUB.X = D686E0BB875CF5419F40D2D512BF74910E5F28FC9EDF7E0F47E40CC106723FE5CABBB146F1FCDC513248CF637A8EB896
2,693,886 UART: [art] PUB.Y = 001D73444709A0EBE1095304C69A8AE97C8B8727AA95CF63C31961D62C78E864A28184F17D6B57E435494528B2A97FBB
2,700,801 UART: [art] SIG.R = A662AFC15202A3C66975E74D458C807989E80D64C3FBC29E0A43D465C74F4BF59555F62067CC843EB9D372293AA65EEB
2,707,566 UART: [art] SIG.S = 60F44CB8B5FD2C8E2FFAC6E47281A30BD0C86032CCADCEB12D406387A62052B9D78DA75ABFD45E34E8CA9031B5187EE1
2,731,344 UART: mbox::rt_entry...
2,731,716 UART: ____ _ _ _ ____ _____
2,732,500 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,300 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,068 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,836 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,604 UART: |_|
2,735,916 UART:
2,842,608 UART: [rt] Runtime listening for mailbox commands...
2,843,370 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,485 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,579 UART:
2,843,595 UART: Running Caliptra ROM ...
2,844,003 UART:
2,844,145 UART: [state] CFI Enabled
2,846,998 UART: [state] LifecycleState = Production
2,847,606 UART: [state] DebugLocked = Yes
2,848,186 UART: [state] Starting the WD Timer 40000000 cycles
2,849,771 UART: [kat] SHA2-256
3,653,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,450 UART: [kat] ++
3,657,602 UART: [kat] sha1
3,661,724 UART: [kat] SHA2-256
3,663,664 UART: [kat] SHA2-384
3,666,207 UART: [kat] SHA2-512-ACC
3,668,108 UART: [kat] ECC-384
3,677,527 UART: [kat] HMAC-384Kdf
3,681,961 UART: [kat] LMS
3,930,273 UART: [kat] --
3,931,247 UART: [warm-reset] ++
3,932,170 UART: [warm-reset] --
3,933,265 UART: [state] Locking Datavault
3,934,053 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,657 UART: [state] Locking ICCM
3,935,267 UART: [exit] Launching FMC @ 0x40000130
3,940,596 UART:
3,940,612 UART: Running Caliptra FMC ...
3,941,020 UART:
3,941,163 UART: [state] CFI Enabled
3,942,478 UART: [aliasrt :skip pcr extension
3,942,951 UART: [art] Extend RT PCRs Done
3,943,379 UART: [art] Lock RT PCRs Done
3,944,718 UART: [art] Populate DV Done
3,952,798 UART: [fht] FMC Alias Private Key: 7
3,953,942 UART: [art] Derive CDI
3,954,222 UART: [art] Store in in slot 0x4
4,040,331 UART: [art] Derive Key Pair
4,040,691 UART: [art] Store priv key in slot 0x5
4,053,303 UART: [art] Derive Key Pair - Done
4,068,099 UART: [art] Signing Cert with AUTHO
4,068,579 UART: RITY.KEYID = 7
4,083,895 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,660 UART: [art] PUB.X = D686E0BB875CF5419F40D2D512BF74910E5F28FC9EDF7E0F47E40CC106723FE5CABBB146F1FCDC513248CF637A8EB896
4,091,436 UART: [art] PUB.Y = 001D73444709A0EBE1095304C69A8AE97C8B8727AA95CF63C31961D62C78E864A28184F17D6B57E435494528B2A97FBB
4,098,351 UART: [art] SIG.R = A662AFC15202A3C66975E74D458C807989E80D64C3FBC29E0A43D465C74F4BF59555F62067CC843EB9D372293AA65EEB
4,105,116 UART: [art] SIG.S = 60F44CB8B5FD2C8E2FFAC6E47281A30BD0C86032CCADCEB12D406387A62052B9D78DA75ABFD45E34E8CA9031B5187EE1
4,128,766 UART: mbox::rt_entry...
4,129,138 UART: ____ _ _ _ ____ _____
4,129,922 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,722 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,490 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,258 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,026 UART: |_|
4,133,338 UART:
4,415,788 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Production
85,595 UART: [state] DebugLocked = Yes
86,277 UART: [state] Starting the WD Timer 40000000 cycles
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
915,890 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,046 UART: [fht] FHT @ 0x50003400
1,172,690 UART: [idev] ++
1,172,858 UART: [idev] CDI.KEYID = 6
1,173,219 UART: [idev] SUBJECT.KEYID = 7
1,173,644 UART: [idev] UDS.KEYID = 0
1,173,990 ready_for_fw is high
1,173,990 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,367 UART: [idev] Erasing UDS.KEYID = 0
1,198,318 UART: [idev] Sha1 KeyId Algorithm
1,207,151 UART: [idev] --
1,208,334 UART: [ldev] ++
1,208,502 UART: [ldev] CDI.KEYID = 6
1,208,866 UART: [ldev] SUBJECT.KEYID = 5
1,209,293 UART: [ldev] AUTHORITY.KEYID = 7
1,209,756 UART: [ldev] FE.KEYID = 1
1,214,662 UART: [ldev] Erasing FE.KEYID = 1
1,241,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,973 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,667 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,537 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,243 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,325 UART: [ldev] --
1,280,755 UART: [fwproc] Wait for Commands...
1,281,400 UART: [fwproc] Recv command 0x46574c44
1,282,133 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,816 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,125 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,334,426 >>> mbox cmd response: success
2,335,646 UART: [afmc] ++
2,335,814 UART: [afmc] CDI.KEYID = 6
2,336,177 UART: [afmc] SUBJECT.KEYID = 7
2,336,603 UART: [afmc] AUTHORITY.KEYID = 5
2,371,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,185 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,904 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,797 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,504 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,433 UART: [afmc] --
2,415,528 UART: [cold-reset] --
2,416,536 UART: [state] Locking Datavault
2,417,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,359 UART: [state] Locking ICCM
2,418,911 UART: [exit] Launching FMC @ 0x40000130
2,424,240 UART:
2,424,256 UART: Running Caliptra FMC ...
2,424,664 UART:
2,424,718 UART: [state] CFI Enabled
2,435,381 UART: [fht] FMC Alias Private Key: 7
2,543,372 UART: [art] Extend RT PCRs Done
2,543,800 UART: [art] Lock RT PCRs Done
2,544,990 UART: [art] Populate DV Done
2,553,314 UART: [fht] FMC Alias Private Key: 7
2,554,376 UART: [art] Derive CDI
2,554,656 UART: [art] Store in in slot 0x4
2,640,195 UART: [art] Derive Key Pair
2,640,555 UART: [art] Store priv key in slot 0x5
2,653,331 UART: [art] Derive Key Pair - Done
2,668,392 UART: [art] Signing Cert with AUTHO
2,668,872 UART: RITY.KEYID = 7
2,684,024 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,789 UART: [art] PUB.X = 781D7F264027A4B4CE260FC2B4C91C8D966319CB1FA4EAC30B9086E91722C355AEEAE7DF916B5636EDE89BEAD008280F
2,691,561 UART: [art] PUB.Y = 4B0230406C36924EA746539E70E7EBBD3D2A16B7107F4ABF925FCCC20541742BD766CDB948EBB1B48D5BA27B05D84961
2,698,510 UART: [art] SIG.R = 454C4E5843F95EBFBE8FAAB55564A4743E8F9E03A481B3E37479E2BDB16FEA2A1CDE0BB725919E5ABCB0933EBF60901B
2,705,294 UART: [art] SIG.S = 207425D1CC2BDFCADFE1A8E68DE5B0BF283E389B5280A5D25FC7663649C1A90F8B900D6A5F6DB351B1FB11978219FDE5
2,729,547 UART: mbox::rt_entry...
2,729,919 UART: ____ _ _ _ ____ _____
2,730,703 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,503 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,271 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,039 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,807 UART: |_|
2,734,119 UART:
2,840,686 UART: [rt] Runtime listening for mailbox commands...
2,841,448 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,841,563 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,657 UART:
2,841,673 UART: Running Caliptra ROM ...
2,842,081 UART:
2,842,136 UART: [state] CFI Enabled
2,844,431 UART: [state] LifecycleState = Production
2,845,039 UART: [state] DebugLocked = Yes
2,845,791 UART: [state] Starting the WD Timer 40000000 cycles
2,847,506 UART: [kat] SHA2-256
3,651,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,185 UART: [kat] ++
3,655,337 UART: [kat] sha1
3,659,663 UART: [kat] SHA2-256
3,661,603 UART: [kat] SHA2-384
3,664,400 UART: [kat] SHA2-512-ACC
3,666,301 UART: [kat] ECC-384
3,675,910 UART: [kat] HMAC-384Kdf
3,680,594 UART: [kat] LMS
3,928,906 UART: [kat] --
3,929,920 UART: [warm-reset] ++
3,930,857 UART: [warm-reset] --
3,931,670 UART: [state] Locking Datavault
3,932,484 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,088 UART: [state] Locking ICCM
3,933,544 UART: [exit] Launching FMC @ 0x40000130
3,938,873 UART:
3,938,889 UART: Running Caliptra FMC ...
3,939,297 UART:
3,939,351 UART: [state] CFI Enabled
3,940,768 UART: [aliasrt :skip pcr extension
3,941,241 UART: [art] Extend RT PCRs Done
3,941,669 UART: [art] Lock RT PCRs Done
3,942,834 UART: [art] Populate DV Done
3,951,256 UART: [fht] FMC Alias Private Key: 7
3,952,252 UART: [art] Derive CDI
3,952,532 UART: [art] Store in in slot 0x4
4,037,899 UART: [art] Derive Key Pair
4,038,259 UART: [art] Store priv key in slot 0x5
4,051,669 UART: [art] Derive Key Pair - Done
4,066,650 UART: [art] Signing Cert with AUTHO
4,067,130 UART: RITY.KEYID = 7
4,081,918 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,683 UART: [art] PUB.X = 781D7F264027A4B4CE260FC2B4C91C8D966319CB1FA4EAC30B9086E91722C355AEEAE7DF916B5636EDE89BEAD008280F
4,089,455 UART: [art] PUB.Y = 4B0230406C36924EA746539E70E7EBBD3D2A16B7107F4ABF925FCCC20541742BD766CDB948EBB1B48D5BA27B05D84961
4,096,404 UART: [art] SIG.R = 454C4E5843F95EBFBE8FAAB55564A4743E8F9E03A481B3E37479E2BDB16FEA2A1CDE0BB725919E5ABCB0933EBF60901B
4,103,188 UART: [art] SIG.S = 207425D1CC2BDFCADFE1A8E68DE5B0BF283E389B5280A5D25FC7663649C1A90F8B900D6A5F6DB351B1FB11978219FDE5
4,126,873 UART: mbox::rt_entry...
4,127,245 UART: ____ _ _ _ ____ _____
4,128,029 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,829 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,597 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,365 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,133 UART: |_|
4,131,445 UART:
4,410,376 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Production
85,953 UART: [state] DebugLocked = Yes
86,485 UART: [state] Starting the WD Timer 40000000 cycles
88,024 UART: [kat] SHA2-256
891,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,170 UART: [fht] FHT @ 0x50003400
1,172,906 UART: [idev] ++
1,173,074 UART: [idev] CDI.KEYID = 6
1,173,435 UART: [idev] SUBJECT.KEYID = 7
1,173,860 UART: [idev] UDS.KEYID = 0
1,174,206 ready_for_fw is high
1,174,206 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,198,304 UART: [idev] Sha1 KeyId Algorithm
1,207,121 UART: [idev] --
1,207,948 UART: [ldev] ++
1,208,116 UART: [ldev] CDI.KEYID = 6
1,208,480 UART: [ldev] SUBJECT.KEYID = 5
1,208,907 UART: [ldev] AUTHORITY.KEYID = 7
1,209,370 UART: [ldev] FE.KEYID = 1
1,214,462 UART: [ldev] Erasing FE.KEYID = 1
1,240,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,693 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,387 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,257 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,963 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,081 UART: [ldev] --
1,280,343 UART: [fwproc] Wait for Commands...
1,280,944 UART: [fwproc] Recv command 0x46574c44
1,281,677 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,379 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,688 >>> mbox cmd response: success
2,336,776 UART: [afmc] ++
2,336,944 UART: [afmc] CDI.KEYID = 6
2,337,307 UART: [afmc] SUBJECT.KEYID = 7
2,337,733 UART: [afmc] AUTHORITY.KEYID = 5
2,372,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,069 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,788 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,681 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,388 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,191 UART: [afmc] --
2,416,144 UART: [cold-reset] --
2,416,866 UART: [state] Locking Datavault
2,418,015 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,619 UART: [state] Locking ICCM
2,419,277 UART: [exit] Launching FMC @ 0x40000130
2,424,606 UART:
2,424,622 UART: Running Caliptra FMC ...
2,425,030 UART:
2,425,084 UART: [state] CFI Enabled
2,435,645 UART: [fht] FMC Alias Private Key: 7
2,544,782 UART: [art] Extend RT PCRs Done
2,545,210 UART: [art] Lock RT PCRs Done
2,546,996 UART: [art] Populate DV Done
2,555,386 UART: [fht] FMC Alias Private Key: 7
2,556,432 UART: [art] Derive CDI
2,556,712 UART: [art] Store in in slot 0x4
2,642,751 UART: [art] Derive Key Pair
2,643,111 UART: [art] Store priv key in slot 0x5
2,656,499 UART: [art] Derive Key Pair - Done
2,671,479 UART: [art] Signing Cert with AUTHO
2,671,959 UART: RITY.KEYID = 7
2,687,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,928 UART: [art] PUB.X = 213DC5949332DABFE33D1342B00496155DBD0B0DCEADAFFEEBD69D7BBE5E1C3D48D8F8ED756081BA1F7099B49F9DBAA8
2,694,717 UART: [art] PUB.Y = A057B7E8AD12BC6BC8DEDF3C79775CCA61805794F93F89871A6F51BC65905FAC62CD55D316EB70A71E921B4BC5D7E929
2,701,681 UART: [art] SIG.R = F784B81F22A0DFA4A6DEE34BABA378638623EE44E4F3BC44BCC2EBF8CF48CDD211E4B7A2C75A58D1728CA84ECD50D4A6
2,708,479 UART: [art] SIG.S = 33354DF4B986FF3A2CA3BAFAF4E1F48824034E3D6A774D40CD561F9C559B37FF28E9CDDD6606CE804E072382290DD8FF
2,731,956 UART: mbox::rt_entry...
2,732,328 UART: ____ _ _ _ ____ _____
2,733,112 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,912 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,680 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,448 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,216 UART: |_|
2,736,528 UART:
2,843,360 UART: [rt] Runtime listening for mailbox commands...
2,844,122 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,844,237 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,331 UART:
2,844,347 UART: Running Caliptra ROM ...
2,844,755 UART:
2,844,810 UART: [state] CFI Enabled
2,847,555 UART: [state] LifecycleState = Production
2,848,163 UART: [state] DebugLocked = Yes
2,848,891 UART: [state] Starting the WD Timer 40000000 cycles
2,850,440 UART: [kat] SHA2-256
3,653,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,119 UART: [kat] ++
3,658,271 UART: [kat] sha1
3,662,657 UART: [kat] SHA2-256
3,664,597 UART: [kat] SHA2-384
3,667,310 UART: [kat] SHA2-512-ACC
3,669,211 UART: [kat] ECC-384
3,678,848 UART: [kat] HMAC-384Kdf
3,683,374 UART: [kat] LMS
3,931,686 UART: [kat] --
3,932,758 UART: [warm-reset] ++
3,933,621 UART: [warm-reset] --
3,934,462 UART: [state] Locking Datavault
3,935,262 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,866 UART: [state] Locking ICCM
3,936,500 UART: [exit] Launching FMC @ 0x40000130
3,941,829 UART:
3,941,845 UART: Running Caliptra FMC ...
3,942,253 UART:
3,942,307 UART: [state] CFI Enabled
3,943,334 UART: [aliasrt :skip pcr extension
3,943,807 UART: [art] Extend RT PCRs Done
3,944,235 UART: [art] Lock RT PCRs Done
3,945,494 UART: [art] Populate DV Done
3,953,542 UART: [fht] FMC Alias Private Key: 7
3,954,678 UART: [art] Derive CDI
3,954,958 UART: [art] Store in in slot 0x4
4,040,685 UART: [art] Derive Key Pair
4,041,045 UART: [art] Store priv key in slot 0x5
4,054,127 UART: [art] Derive Key Pair - Done
4,069,167 UART: [art] Signing Cert with AUTHO
4,069,647 UART: RITY.KEYID = 7
4,084,571 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,336 UART: [art] PUB.X = 213DC5949332DABFE33D1342B00496155DBD0B0DCEADAFFEEBD69D7BBE5E1C3D48D8F8ED756081BA1F7099B49F9DBAA8
4,092,125 UART: [art] PUB.Y = A057B7E8AD12BC6BC8DEDF3C79775CCA61805794F93F89871A6F51BC65905FAC62CD55D316EB70A71E921B4BC5D7E929
4,099,089 UART: [art] SIG.R = F784B81F22A0DFA4A6DEE34BABA378638623EE44E4F3BC44BCC2EBF8CF48CDD211E4B7A2C75A58D1728CA84ECD50D4A6
4,105,887 UART: [art] SIG.S = 33354DF4B986FF3A2CA3BAFAF4E1F48824034E3D6A774D40CD561F9C559B37FF28E9CDDD6606CE804E072382290DD8FF
4,130,002 UART: mbox::rt_entry...
4,130,374 UART: ____ _ _ _ ____ _____
4,131,158 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,958 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,726 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,494 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,134,262 UART: |_|
4,134,574 UART:
4,416,000 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,648 UART: [state] LifecycleState = Production
86,256 UART: [state] DebugLocked = Yes
86,960 UART: [state] Starting the WD Timer 40000000 cycles
88,507 UART: [kat] SHA2-256
892,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,186 UART: [kat] ++
896,338 UART: [kat] sha1
900,758 UART: [kat] SHA2-256
902,698 UART: [kat] SHA2-384
905,635 UART: [kat] SHA2-512-ACC
907,536 UART: [kat] ECC-384
917,219 UART: [kat] HMAC-384Kdf
922,015 UART: [kat] LMS
1,170,327 UART: [kat] --
1,171,148 UART: [cold-reset] ++
1,171,541 UART: [fht] FHT @ 0x50003400
1,174,101 UART: [idev] ++
1,174,269 UART: [idev] CDI.KEYID = 6
1,174,630 UART: [idev] SUBJECT.KEYID = 7
1,175,055 UART: [idev] UDS.KEYID = 0
1,175,401 ready_for_fw is high
1,175,401 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,078 UART: [idev] Erasing UDS.KEYID = 0
1,199,963 UART: [idev] Sha1 KeyId Algorithm
1,208,958 UART: [idev] --
1,210,167 UART: [ldev] ++
1,210,335 UART: [ldev] CDI.KEYID = 6
1,210,699 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,705 UART: [ldev] Erasing FE.KEYID = 1
1,242,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,452 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,146 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,016 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,722 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,704 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,735 UART: [fwproc] Recv command 0x46574c44
1,283,468 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,876 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,369 >>> mbox cmd response: success
2,337,567 UART: [afmc] ++
2,337,735 UART: [afmc] CDI.KEYID = 6
2,338,098 UART: [afmc] SUBJECT.KEYID = 7
2,338,524 UART: [afmc] AUTHORITY.KEYID = 5
2,374,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,456 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,175 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,068 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,775 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,598 UART: [afmc] --
2,417,521 UART: [cold-reset] --
2,418,463 UART: [state] Locking Datavault
2,419,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,504 UART: [state] Locking ICCM
2,421,058 UART: [exit] Launching FMC @ 0x40000130
2,426,387 UART:
2,426,403 UART: Running Caliptra FMC ...
2,426,811 UART:
2,426,954 UART: [state] CFI Enabled
2,437,799 UART: [fht] FMC Alias Private Key: 7
2,544,354 UART: [art] Extend RT PCRs Done
2,544,782 UART: [art] Lock RT PCRs Done
2,546,182 UART: [art] Populate DV Done
2,554,470 UART: [fht] FMC Alias Private Key: 7
2,555,482 UART: [art] Derive CDI
2,555,762 UART: [art] Store in in slot 0x4
2,640,959 UART: [art] Derive Key Pair
2,641,319 UART: [art] Store priv key in slot 0x5
2,654,641 UART: [art] Derive Key Pair - Done
2,669,383 UART: [art] Signing Cert with AUTHO
2,669,863 UART: RITY.KEYID = 7
2,685,011 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,776 UART: [art] PUB.X = 0BCCFE6541779A1CB502D5707CBC212EC597CCDA1711CFDFC58BACBA0D222ECD70D64E33D4DAAAD8B59083178259B81C
2,692,561 UART: [art] PUB.Y = 7BFB11950C9041D6DF1CB096BEB54C8822A1ADBF481313E1F29CAA29A426DF53A4CF55D72411E8A68381E37840834B22
2,699,514 UART: [art] SIG.R = F904FB81ED5BDA00F59CE1D99150AD4E3E17474942CDCA040640B807BFFA21C2BE5B95F7A466AB2FD4A998FC8C505A95
2,706,268 UART: [art] SIG.S = 41810E1A8861E177EA0E5EADC63D0131B6D3182EBE5EE08B8C1B33AE97344688E76C70F5550CA283C63A7774BF4A37A9
2,729,817 UART: mbox::rt_entry...
2,730,189 UART: ____ _ _ _ ____ _____
2,730,973 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,773 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,541 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,309 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,077 UART: |_|
2,734,389 UART:
2,840,029 UART: [rt] Runtime listening for mailbox commands...
2,840,791 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,840,906 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,000 UART:
2,841,016 UART: Running Caliptra ROM ...
2,841,424 UART:
2,841,566 UART: [state] CFI Enabled
2,844,535 UART: [state] LifecycleState = Production
2,845,143 UART: [state] DebugLocked = Yes
2,845,777 UART: [state] Starting the WD Timer 40000000 cycles
2,847,424 UART: [kat] SHA2-256
3,650,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,103 UART: [kat] ++
3,655,255 UART: [kat] sha1
3,659,617 UART: [kat] SHA2-256
3,661,557 UART: [kat] SHA2-384
3,664,334 UART: [kat] SHA2-512-ACC
3,666,235 UART: [kat] ECC-384
3,676,066 UART: [kat] HMAC-384Kdf
3,680,656 UART: [kat] LMS
3,928,968 UART: [kat] --
3,929,764 UART: [warm-reset] ++
3,930,557 UART: [warm-reset] --
3,931,430 UART: [state] Locking Datavault
3,932,360 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,964 UART: [state] Locking ICCM
3,933,424 UART: [exit] Launching FMC @ 0x40000130
3,938,753 UART:
3,938,769 UART: Running Caliptra FMC ...
3,939,177 UART:
3,939,320 UART: [state] CFI Enabled
3,940,615 UART: [aliasrt :skip pcr extension
3,941,088 UART: [art] Extend RT PCRs Done
3,941,516 UART: [art] Lock RT PCRs Done
3,942,639 UART: [art] Populate DV Done
3,950,755 UART: [fht] FMC Alias Private Key: 7
3,951,757 UART: [art] Derive CDI
3,952,037 UART: [art] Store in in slot 0x4
4,037,484 UART: [art] Derive Key Pair
4,037,844 UART: [art] Store priv key in slot 0x5
4,051,554 UART: [art] Derive Key Pair - Done
4,066,606 UART: [art] Signing Cert with AUTHO
4,067,086 UART: RITY.KEYID = 7
4,082,250 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,015 UART: [art] PUB.X = 0BCCFE6541779A1CB502D5707CBC212EC597CCDA1711CFDFC58BACBA0D222ECD70D64E33D4DAAAD8B59083178259B81C
4,089,800 UART: [art] PUB.Y = 7BFB11950C9041D6DF1CB096BEB54C8822A1ADBF481313E1F29CAA29A426DF53A4CF55D72411E8A68381E37840834B22
4,096,753 UART: [art] SIG.R = F904FB81ED5BDA00F59CE1D99150AD4E3E17474942CDCA040640B807BFFA21C2BE5B95F7A466AB2FD4A998FC8C505A95
4,103,507 UART: [art] SIG.S = 41810E1A8861E177EA0E5EADC63D0131B6D3182EBE5EE08B8C1B33AE97344688E76C70F5550CA283C63A7774BF4A37A9
4,127,088 UART: mbox::rt_entry...
4,127,460 UART: ____ _ _ _ ____ _____
4,128,244 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,044 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,812 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,580 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,348 UART: |_|
4,131,660 UART:
4,410,900 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,676 UART: [state] LifecycleState = Production
86,284 UART: [state] DebugLocked = Yes
86,954 UART: [state] Starting the WD Timer 40000000 cycles
88,505 UART: [kat] SHA2-256
892,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,184 UART: [kat] ++
896,336 UART: [kat] sha1
900,414 UART: [kat] SHA2-256
902,354 UART: [kat] SHA2-384
905,071 UART: [kat] SHA2-512-ACC
906,972 UART: [kat] ECC-384
916,669 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,644 UART: [cold-reset] ++
1,170,985 UART: [fht] FHT @ 0x50003400
1,173,585 UART: [idev] ++
1,173,753 UART: [idev] CDI.KEYID = 6
1,174,114 UART: [idev] SUBJECT.KEYID = 7
1,174,539 UART: [idev] UDS.KEYID = 0
1,174,885 ready_for_fw is high
1,174,885 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,572 UART: [idev] Erasing UDS.KEYID = 0
1,199,681 UART: [idev] Sha1 KeyId Algorithm
1,208,464 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,087 UART: [ldev] Erasing FE.KEYID = 1
1,242,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,938 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,632 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,502 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,208 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,336 UART: [ldev] --
1,281,614 UART: [fwproc] Wait for Commands...
1,282,273 UART: [fwproc] Recv command 0x46574c44
1,283,006 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,359 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,668 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,121 >>> mbox cmd response: success
2,337,227 UART: [afmc] ++
2,337,395 UART: [afmc] CDI.KEYID = 6
2,337,758 UART: [afmc] SUBJECT.KEYID = 7
2,338,184 UART: [afmc] AUTHORITY.KEYID = 5
2,373,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,006 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,725 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,618 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,325 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,210 UART: [afmc] --
2,417,277 UART: [cold-reset] --
2,418,249 UART: [state] Locking Datavault
2,419,752 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,356 UART: [state] Locking ICCM
2,420,874 UART: [exit] Launching FMC @ 0x40000130
2,426,203 UART:
2,426,219 UART: Running Caliptra FMC ...
2,426,627 UART:
2,426,770 UART: [state] CFI Enabled
2,437,549 UART: [fht] FMC Alias Private Key: 7
2,545,798 UART: [art] Extend RT PCRs Done
2,546,226 UART: [art] Lock RT PCRs Done
2,547,706 UART: [art] Populate DV Done
2,555,864 UART: [fht] FMC Alias Private Key: 7
2,556,950 UART: [art] Derive CDI
2,557,230 UART: [art] Store in in slot 0x4
2,643,125 UART: [art] Derive Key Pair
2,643,485 UART: [art] Store priv key in slot 0x5
2,656,249 UART: [art] Derive Key Pair - Done
2,670,964 UART: [art] Signing Cert with AUTHO
2,671,444 UART: RITY.KEYID = 7
2,686,512 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,277 UART: [art] PUB.X = 15CB04F7272875A2E38282067F4E63CD5CB9DCFABEF2720A75D3CC409CEFB9BA27F6AACDEB710FF29744338F9F703603
2,694,048 UART: [art] PUB.Y = 50DE59BD5CBEC42F61DDD745284502F98EF8215EE0DEF4A652DFF8F7AD63C1D3FD1144E1BF5FC6DA97BB017AB03FAFB3
2,701,022 UART: [art] SIG.R = E15F609AD04549F8410682D9CA8A2395F54981A86F3F794FC8E748A8A601114EF8CB103B3E11D64A73BC6B710F481054
2,707,781 UART: [art] SIG.S = CAE8354F25A2F1082AE2E59A85E17613BEECB51823B138E98DB8A670009EE2FC99D3B2EE690F6B778C6C8249F265F412
2,731,632 UART: mbox::rt_entry...
2,732,004 UART: ____ _ _ _ ____ _____
2,732,788 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,588 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,356 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,124 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,892 UART: |_|
2,736,204 UART:
2,843,458 UART: [rt] Runtime listening for mailbox commands...
2,844,220 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,844,335 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,429 UART:
2,844,445 UART: Running Caliptra ROM ...
2,844,853 UART:
2,844,995 UART: [state] CFI Enabled
2,847,778 UART: [state] LifecycleState = Production
2,848,386 UART: [state] DebugLocked = Yes
2,849,034 UART: [state] Starting the WD Timer 40000000 cycles
2,850,639 UART: [kat] SHA2-256
3,654,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,318 UART: [kat] ++
3,658,470 UART: [kat] sha1
3,662,726 UART: [kat] SHA2-256
3,664,666 UART: [kat] SHA2-384
3,667,419 UART: [kat] SHA2-512-ACC
3,669,320 UART: [kat] ECC-384
3,679,419 UART: [kat] HMAC-384Kdf
3,683,927 UART: [kat] LMS
3,932,239 UART: [kat] --
3,933,183 UART: [warm-reset] ++
3,934,084 UART: [warm-reset] --
3,934,811 UART: [state] Locking Datavault
3,935,527 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,131 UART: [state] Locking ICCM
3,936,569 UART: [exit] Launching FMC @ 0x40000130
3,941,898 UART:
3,941,914 UART: Running Caliptra FMC ...
3,942,322 UART:
3,942,465 UART: [state] CFI Enabled
3,943,734 UART: [aliasrt :skip pcr extension
3,944,207 UART: [art] Extend RT PCRs Done
3,944,635 UART: [art] Lock RT PCRs Done
3,945,990 UART: [art] Populate DV Done
3,954,372 UART: [fht] FMC Alias Private Key: 7
3,955,450 UART: [art] Derive CDI
3,955,730 UART: [art] Store in in slot 0x4
4,041,435 UART: [art] Derive Key Pair
4,041,795 UART: [art] Store priv key in slot 0x5
4,055,111 UART: [art] Derive Key Pair - Done
4,070,170 UART: [art] Signing Cert with AUTHO
4,070,650 UART: RITY.KEYID = 7
4,086,082 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,847 UART: [art] PUB.X = 15CB04F7272875A2E38282067F4E63CD5CB9DCFABEF2720A75D3CC409CEFB9BA27F6AACDEB710FF29744338F9F703603
4,093,618 UART: [art] PUB.Y = 50DE59BD5CBEC42F61DDD745284502F98EF8215EE0DEF4A652DFF8F7AD63C1D3FD1144E1BF5FC6DA97BB017AB03FAFB3
4,100,592 UART: [art] SIG.R = E15F609AD04549F8410682D9CA8A2395F54981A86F3F794FC8E748A8A601114EF8CB103B3E11D64A73BC6B710F481054
4,107,351 UART: [art] SIG.S = CAE8354F25A2F1082AE2E59A85E17613BEECB51823B138E98DB8A670009EE2FC99D3B2EE690F6B778C6C8249F265F412
4,131,412 UART: mbox::rt_entry...
4,131,784 UART: ____ _ _ _ ____ _____
4,132,568 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,368 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,134,136 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,904 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,672 UART: |_|
4,135,984 UART:
4,415,808 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Production
85,791 UART: [state] DebugLocked = Yes
86,333 UART: [state] Starting the WD Timer 40000000 cycles
88,030 UART: [kat] SHA2-256
891,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,709 UART: [kat] ++
895,861 UART: [kat] sha1
900,021 UART: [kat] SHA2-256
901,961 UART: [kat] SHA2-384
904,772 UART: [kat] SHA2-512-ACC
906,673 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
920,966 UART: [kat] LMS
1,169,278 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,516 UART: [fht] FHT @ 0x50003400
1,173,268 UART: [idev] ++
1,173,436 UART: [idev] CDI.KEYID = 6
1,173,797 UART: [idev] SUBJECT.KEYID = 7
1,174,222 UART: [idev] UDS.KEYID = 0
1,174,568 ready_for_fw is high
1,174,568 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,934 UART: [idev] Sha1 KeyId Algorithm
1,207,807 UART: [idev] --
1,208,940 UART: [ldev] ++
1,209,108 UART: [ldev] CDI.KEYID = 6
1,209,472 UART: [ldev] SUBJECT.KEYID = 5
1,209,899 UART: [ldev] AUTHORITY.KEYID = 7
1,210,362 UART: [ldev] FE.KEYID = 1
1,215,682 UART: [ldev] Erasing FE.KEYID = 1
1,242,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,973 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,667 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,537 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,243 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,267 UART: [ldev] --
1,281,695 UART: [fwproc] Wait for Commands...
1,282,414 UART: [fwproc] Recv command 0x46574c44
1,283,147 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,446 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,755 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,136 >>> mbox cmd response: success
2,337,212 UART: [afmc] ++
2,337,380 UART: [afmc] CDI.KEYID = 6
2,337,743 UART: [afmc] SUBJECT.KEYID = 7
2,338,169 UART: [afmc] AUTHORITY.KEYID = 5
2,373,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,701 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,420 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,313 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,020 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,787 UART: [afmc] --
2,416,888 UART: [cold-reset] --
2,417,680 UART: [state] Locking Datavault
2,418,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,285 UART: [state] Locking ICCM
2,419,925 UART: [exit] Launching FMC @ 0x40000130
2,425,254 UART:
2,425,270 UART: Running Caliptra FMC ...
2,425,678 UART:
2,425,732 UART: [state] CFI Enabled
2,436,231 UART: [fht] FMC Alias Private Key: 7
2,544,168 UART: [art] Extend RT PCRs Done
2,544,596 UART: [art] Lock RT PCRs Done
2,546,198 UART: [art] Populate DV Done
2,554,726 UART: [fht] FMC Alias Private Key: 7
2,555,684 UART: [art] Derive CDI
2,555,964 UART: [art] Store in in slot 0x4
2,641,823 UART: [art] Derive Key Pair
2,642,183 UART: [art] Store priv key in slot 0x5
2,655,127 UART: [art] Derive Key Pair - Done
2,669,722 UART: [art] Signing Cert with AUTHO
2,670,202 UART: RITY.KEYID = 7
2,685,498 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,263 UART: [art] PUB.X = C8F42482202A4C7A62F709AD04630CE085F744F6D2B59B1100EB84A1E0FC7813F76EFB25F1523C6670870DBB2287F920
2,692,999 UART: [art] PUB.Y = A3399604EB0A3CEF29204BEA88B4E21FBCAB63137AF66E4600C2EDAE84C68B4900A0CBF11AFFE2EBCF76D958B700FF3F
2,699,903 UART: [art] SIG.R = 7919387902C16407236F2E04C5267047A98E9177BD2C7516C0115CCC93F05FEC70C97346AB603C6ED12ABA3BBC447F5D
2,706,664 UART: [art] SIG.S = CCDE70C7503EEE814FD175316F0541FD043E49AEF33D03D365552675F680D8946659B481BA44C51AF1B8034358110888
2,730,258 UART: mbox::rt_entry...
2,730,630 UART: ____ _ _ _ ____ _____
2,731,414 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,214 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,982 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,750 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,518 UART: |_|
2,734,830 UART:
2,840,344 UART: [rt] Runtime listening for mailbox commands...
2,841,106 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,841,221 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,315 UART:
2,841,331 UART: Running Caliptra ROM ...
2,841,739 UART:
2,841,794 UART: [state] CFI Enabled
2,844,643 UART: [state] LifecycleState = Production
2,845,251 UART: [state] DebugLocked = Yes
2,845,939 UART: [state] Starting the WD Timer 40000000 cycles
2,847,414 UART: [kat] SHA2-256
3,650,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,093 UART: [kat] ++
3,655,245 UART: [kat] sha1
3,659,439 UART: [kat] SHA2-256
3,661,379 UART: [kat] SHA2-384
3,664,148 UART: [kat] SHA2-512-ACC
3,666,049 UART: [kat] ECC-384
3,675,652 UART: [kat] HMAC-384Kdf
3,680,222 UART: [kat] LMS
3,928,534 UART: [kat] --
3,929,454 UART: [warm-reset] ++
3,930,345 UART: [warm-reset] --
3,931,032 UART: [state] Locking Datavault
3,931,816 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,420 UART: [state] Locking ICCM
3,933,088 UART: [exit] Launching FMC @ 0x40000130
3,938,417 UART:
3,938,433 UART: Running Caliptra FMC ...
3,938,841 UART:
3,938,895 UART: [state] CFI Enabled
3,940,188 UART: [aliasrt :skip pcr extension
3,940,661 UART: [art] Extend RT PCRs Done
3,941,089 UART: [art] Lock RT PCRs Done
3,942,524 UART: [art] Populate DV Done
3,950,498 UART: [fht] FMC Alias Private Key: 7
3,951,504 UART: [art] Derive CDI
3,951,784 UART: [art] Store in in slot 0x4
4,037,311 UART: [art] Derive Key Pair
4,037,671 UART: [art] Store priv key in slot 0x5
4,051,357 UART: [art] Derive Key Pair - Done
4,065,818 UART: [art] Signing Cert with AUTHO
4,066,298 UART: RITY.KEYID = 7
4,081,346 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,111 UART: [art] PUB.X = C8F42482202A4C7A62F709AD04630CE085F744F6D2B59B1100EB84A1E0FC7813F76EFB25F1523C6670870DBB2287F920
4,088,847 UART: [art] PUB.Y = A3399604EB0A3CEF29204BEA88B4E21FBCAB63137AF66E4600C2EDAE84C68B4900A0CBF11AFFE2EBCF76D958B700FF3F
4,095,751 UART: [art] SIG.R = 7919387902C16407236F2E04C5267047A98E9177BD2C7516C0115CCC93F05FEC70C97346AB603C6ED12ABA3BBC447F5D
4,102,512 UART: [art] SIG.S = CCDE70C7503EEE814FD175316F0541FD043E49AEF33D03D365552675F680D8946659B481BA44C51AF1B8034358110888
4,126,188 UART: mbox::rt_entry...
4,126,560 UART: ____ _ _ _ ____ _____
4,127,344 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,144 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,912 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,680 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,448 UART: |_|
4,130,760 UART:
4,416,332 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,677 UART: [state] LifecycleState = Production
85,285 UART: [state] DebugLocked = Yes
85,833 UART: [state] Starting the WD Timer 40000000 cycles
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,272 UART: [kat] SHA2-512-ACC
906,173 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,540 UART: [kat] LMS
1,168,852 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,112 UART: [idev] ++
1,173,280 UART: [idev] CDI.KEYID = 6
1,173,641 UART: [idev] SUBJECT.KEYID = 7
1,174,066 UART: [idev] UDS.KEYID = 0
1,174,412 ready_for_fw is high
1,174,412 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,198,844 UART: [idev] Sha1 KeyId Algorithm
1,207,599 UART: [idev] --
1,208,746 UART: [ldev] ++
1,208,914 UART: [ldev] CDI.KEYID = 6
1,209,278 UART: [ldev] SUBJECT.KEYID = 5
1,209,705 UART: [ldev] AUTHORITY.KEYID = 7
1,210,168 UART: [ldev] FE.KEYID = 1
1,215,400 UART: [ldev] Erasing FE.KEYID = 1
1,241,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,401 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,095 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,965 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,671 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,761 UART: [ldev] --
1,281,169 UART: [fwproc] Wait for Commands...
1,281,928 UART: [fwproc] Recv command 0x46574c44
1,282,661 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,689 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,334,990 >>> mbox cmd response: success
2,336,208 UART: [afmc] ++
2,336,376 UART: [afmc] CDI.KEYID = 6
2,336,739 UART: [afmc] SUBJECT.KEYID = 7
2,337,165 UART: [afmc] AUTHORITY.KEYID = 5
2,372,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,843 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,562 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,455 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,162 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,951 UART: [afmc] --
2,416,078 UART: [cold-reset] --
2,416,838 UART: [state] Locking Datavault
2,418,101 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,705 UART: [state] Locking ICCM
2,419,331 UART: [exit] Launching FMC @ 0x40000130
2,424,660 UART:
2,424,676 UART: Running Caliptra FMC ...
2,425,084 UART:
2,425,138 UART: [state] CFI Enabled
2,435,349 UART: [fht] FMC Alias Private Key: 7
2,543,158 UART: [art] Extend RT PCRs Done
2,543,586 UART: [art] Lock RT PCRs Done
2,545,088 UART: [art] Populate DV Done
2,553,166 UART: [fht] FMC Alias Private Key: 7
2,554,292 UART: [art] Derive CDI
2,554,572 UART: [art] Store in in slot 0x4
2,639,993 UART: [art] Derive Key Pair
2,640,353 UART: [art] Store priv key in slot 0x5
2,653,475 UART: [art] Derive Key Pair - Done
2,668,069 UART: [art] Signing Cert with AUTHO
2,668,549 UART: RITY.KEYID = 7
2,683,627 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,392 UART: [art] PUB.X = 0DF3ED653FE17BBE338E4A4FC588797AD10C8F69D08FD3B9A634CDE3ACE6F6CB16C4F1D1EE99029AFFBD636E32924401
2,691,172 UART: [art] PUB.Y = B3CC7C7E6C02F0B0018129AE572EF6A5FE1367C1516A4D210F08411F1408977250E89022A8D43257BBD2829E3959DAA2
2,698,105 UART: [art] SIG.R = 1D85272C419DC75EC441DA51D58B1C93247965954AB82D55C0C5EDD66C21AF28A0111ECDC0BE7019542EF8B0D25CACB8
2,704,887 UART: [art] SIG.S = C0987C6BFD42D11CF02BAA6D2D207D7E9263D8E72813B02C085FA170B1BD06F35BD2650FE808F41153D049596BF4BC6B
2,728,344 UART: mbox::rt_entry...
2,728,716 UART: ____ _ _ _ ____ _____
2,729,500 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,300 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,068 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,836 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,604 UART: |_|
2,732,916 UART:
2,839,374 UART: [rt] Runtime listening for mailbox commands...
2,840,136 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,840,251 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,345 UART:
2,840,361 UART: Running Caliptra ROM ...
2,840,769 UART:
2,840,824 UART: [state] CFI Enabled
2,843,523 UART: [state] LifecycleState = Production
2,844,131 UART: [state] DebugLocked = Yes
2,844,683 UART: [state] Starting the WD Timer 40000000 cycles
2,846,336 UART: [kat] SHA2-256
3,649,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,015 UART: [kat] ++
3,654,167 UART: [kat] sha1
3,658,409 UART: [kat] SHA2-256
3,660,349 UART: [kat] SHA2-384
3,663,068 UART: [kat] SHA2-512-ACC
3,664,969 UART: [kat] ECC-384
3,674,840 UART: [kat] HMAC-384Kdf
3,679,396 UART: [kat] LMS
3,927,708 UART: [kat] --
3,928,558 UART: [warm-reset] ++
3,929,557 UART: [warm-reset] --
3,930,358 UART: [state] Locking Datavault
3,931,228 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,832 UART: [state] Locking ICCM
3,932,252 UART: [exit] Launching FMC @ 0x40000130
3,937,581 UART:
3,937,597 UART: Running Caliptra FMC ...
3,938,005 UART:
3,938,059 UART: [state] CFI Enabled
3,939,452 UART: [aliasrt :skip pcr extension
3,939,925 UART: [art] Extend RT PCRs Done
3,940,353 UART: [art] Lock RT PCRs Done
3,941,604 UART: [art] Populate DV Done
3,949,668 UART: [fht] FMC Alias Private Key: 7
3,950,710 UART: [art] Derive CDI
3,950,990 UART: [art] Store in in slot 0x4
4,036,921 UART: [art] Derive Key Pair
4,037,281 UART: [art] Store priv key in slot 0x5
4,050,167 UART: [art] Derive Key Pair - Done
4,064,955 UART: [art] Signing Cert with AUTHO
4,065,435 UART: RITY.KEYID = 7
4,081,113 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,878 UART: [art] PUB.X = 0DF3ED653FE17BBE338E4A4FC588797AD10C8F69D08FD3B9A634CDE3ACE6F6CB16C4F1D1EE99029AFFBD636E32924401
4,088,658 UART: [art] PUB.Y = B3CC7C7E6C02F0B0018129AE572EF6A5FE1367C1516A4D210F08411F1408977250E89022A8D43257BBD2829E3959DAA2
4,095,591 UART: [art] SIG.R = 1D85272C419DC75EC441DA51D58B1C93247965954AB82D55C0C5EDD66C21AF28A0111ECDC0BE7019542EF8B0D25CACB8
4,102,373 UART: [art] SIG.S = C0987C6BFD42D11CF02BAA6D2D207D7E9263D8E72813B02C085FA170B1BD06F35BD2650FE808F41153D049596BF4BC6B
4,126,028 UART: mbox::rt_entry...
4,126,400 UART: ____ _ _ _ ____ _____
4,127,184 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,984 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,752 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,520 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,288 UART: |_|
4,130,600 UART:
4,404,398 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Production
85,750 UART: [state] DebugLocked = Yes
86,362 UART: [state] Starting the WD Timer 40000000 cycles
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,712 UART: [kat] ++
895,864 UART: [kat] sha1
900,222 UART: [kat] SHA2-256
902,162 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,983 UART: [fht] FHT @ 0x50003400
1,173,709 UART: [idev] ++
1,173,877 UART: [idev] CDI.KEYID = 6
1,174,238 UART: [idev] SUBJECT.KEYID = 7
1,174,663 UART: [idev] UDS.KEYID = 0
1,175,009 ready_for_fw is high
1,175,009 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,199,997 UART: [idev] Sha1 KeyId Algorithm
1,209,012 UART: [idev] --
1,210,085 UART: [ldev] ++
1,210,253 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,739 UART: [ldev] Erasing FE.KEYID = 1
1,243,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,692 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,386 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,256 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,962 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,060 UART: [ldev] --
1,282,482 UART: [fwproc] Wait for Commands...
1,283,095 UART: [fwproc] Recv command 0x46574c44
1,283,828 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,031 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,320 >>> mbox cmd response: success
2,338,500 UART: [afmc] ++
2,338,668 UART: [afmc] CDI.KEYID = 6
2,339,031 UART: [afmc] SUBJECT.KEYID = 7
2,339,457 UART: [afmc] AUTHORITY.KEYID = 5
2,374,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,041 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,760 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,653 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,360 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,289 UART: [afmc] --
2,418,364 UART: [cold-reset] --
2,419,126 UART: [state] Locking Datavault
2,420,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,121 UART: [state] Locking ICCM
2,421,705 UART: [exit] Launching FMC @ 0x40000130
2,427,034 UART:
2,427,050 UART: Running Caliptra FMC ...
2,427,458 UART:
2,427,601 UART: [state] CFI Enabled
2,438,308 UART: [fht] FMC Alias Private Key: 7
2,546,193 UART: [art] Extend RT PCRs Done
2,546,621 UART: [art] Lock RT PCRs Done
2,548,183 UART: [art] Populate DV Done
2,556,461 UART: [fht] FMC Alias Private Key: 7
2,557,417 UART: [art] Derive CDI
2,557,697 UART: [art] Store in in slot 0x4
2,643,548 UART: [art] Derive Key Pair
2,643,908 UART: [art] Store priv key in slot 0x5
2,657,322 UART: [art] Derive Key Pair - Done
2,672,371 UART: [art] Signing Cert with AUTHO
2,672,851 UART: RITY.KEYID = 7
2,688,517 UART: [art] Erasing AUTHORITY.KEYID = 7
2,689,282 UART: [art] PUB.X = 5C4508B3CF05B53A48C1777F519EBE98DBD7AA5872B60158CB87F7A87B6B0655E18F851DA2C8E376F107AE761DA0CE8D
2,696,049 UART: [art] PUB.Y = DF6832A88048E75A33E76E51FCA12D7A762245B886E8AA89AB1C0A7CCD6EEB6D0174514E138AEC457DFD30AA2EC9FAD6
2,703,013 UART: [art] SIG.R = F8C62D2F762E47788BD26897559F4706F3C38F51A0C0105BEC1292988B6D5282779A32DF17CDD59D9C1A5D66E455ED3F
2,709,782 UART: [art] SIG.S = ABA54D0BCAD0947BD0A1958AF8937D38B82EB6D687D5D6AABDC8F342E98341A9FCD0907DB594D51715C334A9ACC417B2
2,732,974 UART: mbox::rt_entry...
2,733,346 UART: ____ _ _ _ ____ _____
2,734,130 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,930 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,698 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,466 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,737,234 UART: |_|
2,737,546 UART:
2,843,678 UART: [rt] Runtime listening for mailbox commands...
2,844,440 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,844,555 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,649 UART:
2,844,665 UART: Running Caliptra ROM ...
2,845,073 UART:
2,845,215 UART: [state] CFI Enabled
2,847,820 UART: [state] LifecycleState = Production
2,848,428 UART: [state] DebugLocked = Yes
2,849,154 UART: [state] Starting the WD Timer 40000000 cycles
2,850,793 UART: [kat] SHA2-256
3,654,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,472 UART: [kat] ++
3,658,624 UART: [kat] sha1
3,662,820 UART: [kat] SHA2-256
3,664,760 UART: [kat] SHA2-384
3,667,379 UART: [kat] SHA2-512-ACC
3,669,280 UART: [kat] ECC-384
3,679,251 UART: [kat] HMAC-384Kdf
3,683,969 UART: [kat] LMS
3,932,281 UART: [kat] --
3,933,085 UART: [warm-reset] ++
3,933,844 UART: [warm-reset] --
3,934,363 UART: [state] Locking Datavault
3,935,135 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,739 UART: [state] Locking ICCM
3,936,359 UART: [exit] Launching FMC @ 0x40000130
3,941,688 UART:
3,941,704 UART: Running Caliptra FMC ...
3,942,112 UART:
3,942,255 UART: [state] CFI Enabled
3,943,362 UART: [aliasrt :skip pcr extension
3,943,835 UART: [art] Extend RT PCRs Done
3,944,263 UART: [art] Lock RT PCRs Done
3,945,464 UART: [art] Populate DV Done
3,953,562 UART: [fht] FMC Alias Private Key: 7
3,954,726 UART: [art] Derive CDI
3,955,006 UART: [art] Store in in slot 0x4
4,040,803 UART: [art] Derive Key Pair
4,041,163 UART: [art] Store priv key in slot 0x5
4,054,333 UART: [art] Derive Key Pair - Done
4,069,366 UART: [art] Signing Cert with AUTHO
4,069,846 UART: RITY.KEYID = 7
4,085,228 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,993 UART: [art] PUB.X = 5C4508B3CF05B53A48C1777F519EBE98DBD7AA5872B60158CB87F7A87B6B0655E18F851DA2C8E376F107AE761DA0CE8D
4,092,760 UART: [art] PUB.Y = DF6832A88048E75A33E76E51FCA12D7A762245B886E8AA89AB1C0A7CCD6EEB6D0174514E138AEC457DFD30AA2EC9FAD6
4,099,724 UART: [art] SIG.R = F8C62D2F762E47788BD26897559F4706F3C38F51A0C0105BEC1292988B6D5282779A32DF17CDD59D9C1A5D66E455ED3F
4,106,493 UART: [art] SIG.S = ABA54D0BCAD0947BD0A1958AF8937D38B82EB6D687D5D6AABDC8F342E98341A9FCD0907DB594D51715C334A9ACC417B2
4,129,995 UART: mbox::rt_entry...
4,130,367 UART: ____ _ _ _ ____ _____
4,131,151 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,951 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,719 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,487 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,134,255 UART: |_|
4,134,567 UART:
4,413,461 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,532 UART: [state] LifecycleState = Production
86,140 UART: [state] DebugLocked = Yes
86,732 UART: [state] Starting the WD Timer 40000000 cycles
88,365 UART: [kat] SHA2-256
891,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,044 UART: [kat] ++
896,196 UART: [kat] sha1
900,506 UART: [kat] SHA2-256
902,446 UART: [kat] SHA2-384
905,253 UART: [kat] SHA2-512-ACC
907,154 UART: [kat] ECC-384
916,729 UART: [kat] HMAC-384Kdf
921,495 UART: [kat] LMS
1,169,807 UART: [kat] --
1,170,724 UART: [cold-reset] ++
1,171,231 UART: [fht] FHT @ 0x50003400
1,173,719 UART: [idev] ++
1,173,887 UART: [idev] CDI.KEYID = 6
1,174,248 UART: [idev] SUBJECT.KEYID = 7
1,174,673 UART: [idev] UDS.KEYID = 0
1,175,019 ready_for_fw is high
1,175,019 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,890 UART: [idev] --
1,209,109 UART: [ldev] ++
1,209,277 UART: [ldev] CDI.KEYID = 6
1,209,641 UART: [ldev] SUBJECT.KEYID = 5
1,210,068 UART: [ldev] AUTHORITY.KEYID = 7
1,210,531 UART: [ldev] FE.KEYID = 1
1,215,821 UART: [ldev] Erasing FE.KEYID = 1
1,242,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,160 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,854 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,724 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,430 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,560 UART: [ldev] --
1,281,884 UART: [fwproc] Wait for Commands...
1,282,511 UART: [fwproc] Recv command 0x46574c44
1,283,244 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,699 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,008 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,379 >>> mbox cmd response: success
2,337,455 UART: [afmc] ++
2,337,623 UART: [afmc] CDI.KEYID = 6
2,337,986 UART: [afmc] SUBJECT.KEYID = 7
2,338,412 UART: [afmc] AUTHORITY.KEYID = 5
2,374,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,388 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,107 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,000 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,707 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,412 UART: [afmc] --
2,417,331 UART: [cold-reset] --
2,418,105 UART: [state] Locking Datavault
2,419,228 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,832 UART: [state] Locking ICCM
2,420,466 UART: [exit] Launching FMC @ 0x40000130
2,425,795 UART:
2,425,811 UART: Running Caliptra FMC ...
2,426,219 UART:
2,426,362 UART: [state] CFI Enabled
2,436,935 UART: [fht] FMC Alias Private Key: 7
2,544,850 UART: [art] Extend RT PCRs Done
2,545,278 UART: [art] Lock RT PCRs Done
2,546,972 UART: [art] Populate DV Done
2,555,112 UART: [fht] FMC Alias Private Key: 7
2,556,050 UART: [art] Derive CDI
2,556,330 UART: [art] Store in in slot 0x4
2,642,131 UART: [art] Derive Key Pair
2,642,491 UART: [art] Store priv key in slot 0x5
2,655,689 UART: [art] Derive Key Pair - Done
2,670,151 UART: [art] Signing Cert with AUTHO
2,670,631 UART: RITY.KEYID = 7
2,685,995 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,760 UART: [art] PUB.X = 769A43B4EFAB67FA8B8753EA3B2B52F5DD3DDA90217E72A40D5EC4B19936CA24B7FF646D91011D74526685C3CDB94CB8
2,693,538 UART: [art] PUB.Y = 1A686C6B0AB17422308DE056A0179A5A2CBBE79C4BF372176D0C5506D95312D326146957EC35FF7782419EC0AFE1A665
2,700,479 UART: [art] SIG.R = 9599C364679638970156C0536622230689676BB9A69E9A32B88537FC0E903B746D52C9E0EF16249F2CCDD40D3FD3764C
2,707,227 UART: [art] SIG.S = A4AB81076F4B8AD87CF983E6EF8A0B62A86EA72DAD522F611E1E6BCF77173E9B2130CBC5AEE75EB825BE65DA7A96A7D6
2,731,094 UART: mbox::rt_entry...
2,731,466 UART: ____ _ _ _ ____ _____
2,732,250 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,050 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,818 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,586 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,354 UART: |_|
2,735,666 UART:
2,843,522 UART: [rt] Runtime listening for mailbox commands...
2,844,284 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,844,399 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,493 UART:
2,844,509 UART: Running Caliptra ROM ...
2,844,917 UART:
2,845,059 UART: [state] CFI Enabled
2,847,918 UART: [state] LifecycleState = Production
2,848,526 UART: [state] DebugLocked = Yes
2,849,246 UART: [state] Starting the WD Timer 40000000 cycles
2,850,793 UART: [kat] SHA2-256
3,654,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,472 UART: [kat] ++
3,658,624 UART: [kat] sha1
3,662,800 UART: [kat] SHA2-256
3,664,740 UART: [kat] SHA2-384
3,667,567 UART: [kat] SHA2-512-ACC
3,669,468 UART: [kat] ECC-384
3,678,927 UART: [kat] HMAC-384Kdf
3,683,611 UART: [kat] LMS
3,931,923 UART: [kat] --
3,932,911 UART: [warm-reset] ++
3,933,724 UART: [warm-reset] --
3,934,773 UART: [state] Locking Datavault
3,935,621 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,225 UART: [state] Locking ICCM
3,936,735 UART: [exit] Launching FMC @ 0x40000130
3,942,064 UART:
3,942,080 UART: Running Caliptra FMC ...
3,942,488 UART:
3,942,631 UART: [state] CFI Enabled
3,944,124 UART: [aliasrt :skip pcr extension
3,944,597 UART: [art] Extend RT PCRs Done
3,945,025 UART: [art] Lock RT PCRs Done
3,946,484 UART: [art] Populate DV Done
3,954,760 UART: [fht] FMC Alias Private Key: 7
3,955,850 UART: [art] Derive CDI
3,956,130 UART: [art] Store in in slot 0x4
4,042,061 UART: [art] Derive Key Pair
4,042,421 UART: [art] Store priv key in slot 0x5
4,055,695 UART: [art] Derive Key Pair - Done
4,070,597 UART: [art] Signing Cert with AUTHO
4,071,077 UART: RITY.KEYID = 7
4,086,421 UART: [art] Erasing AUTHORITY.KEYID = 7
4,087,186 UART: [art] PUB.X = 769A43B4EFAB67FA8B8753EA3B2B52F5DD3DDA90217E72A40D5EC4B19936CA24B7FF646D91011D74526685C3CDB94CB8
4,093,964 UART: [art] PUB.Y = 1A686C6B0AB17422308DE056A0179A5A2CBBE79C4BF372176D0C5506D95312D326146957EC35FF7782419EC0AFE1A665
4,100,905 UART: [art] SIG.R = 9599C364679638970156C0536622230689676BB9A69E9A32B88537FC0E903B746D52C9E0EF16249F2CCDD40D3FD3764C
4,107,653 UART: [art] SIG.S = A4AB81076F4B8AD87CF983E6EF8A0B62A86EA72DAD522F611E1E6BCF77173E9B2130CBC5AEE75EB825BE65DA7A96A7D6
4,131,516 UART: mbox::rt_entry...
4,131,888 UART: ____ _ _ _ ____ _____
4,132,672 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,134,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,135,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,776 UART: |_|
4,136,088 UART:
4,420,606 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,550 UART:
191,925 UART: Running Caliptra ROM ...
193,027 UART:
193,175 UART: [state] CFI Enabled
264,484 UART: [state] LifecycleState = Production
266,723 UART: [state] DebugLocked = Yes
269,145 UART: [state] Starting the WD Timer 40000000 cycles
275,084 UART: [kat] SHA2-256
457,005 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,563 UART: [kat] ++
469,165 UART: [kat] sha1
479,078 UART: [kat] SHA2-256
482,094 UART: [kat] SHA2-384
488,366 UART: [kat] SHA2-512-ACC
491,023 UART: [kat] ECC-384
3,775,998 UART: [kat] HMAC-384Kdf
3,802,796 UART: [kat] LMS
4,875,967 UART: [kat] --
4,880,699 UART: [cold-reset] ++
4,882,429 UART: [fht] FHT @ 0x50003400
4,893,341 UART: [idev] ++
4,894,001 UART: [idev] CDI.KEYID = 6
4,895,259 UART: [idev] SUBJECT.KEYID = 7
4,896,289 UART: [idev] UDS.KEYID = 0
4,897,338 ready_for_fw is high
4,897,534 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,041,180 UART: [idev] Erasing UDS.KEYID = 0
8,245,400 UART: [idev] Sha1 KeyId Algorithm
8,266,786 UART: [idev] --
8,269,962 UART: [ldev] ++
8,270,528 UART: [ldev] CDI.KEYID = 6
8,271,761 UART: [ldev] SUBJECT.KEYID = 5
8,272,861 UART: [ldev] AUTHORITY.KEYID = 7
8,274,042 UART: [ldev] FE.KEYID = 1
8,319,622 UART: [ldev] Erasing FE.KEYID = 1
11,654,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,370 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,983,717 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,999,710 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,015,819 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,036,700 UART: [ldev] --
14,041,432 UART: [fwproc] Wait for Commands...
14,043,152 UART: [fwproc] Recv command 0x46574c44
14,045,465 UART: [fwproc] Recv'd Img size: 114124 bytes
18,148,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,217,869 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,286,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,603,614 >>> mbox cmd response: success
18,606,892 UART: [afmc] ++
18,607,516 UART: [afmc] CDI.KEYID = 6
18,608,706 UART: [afmc] SUBJECT.KEYID = 7
18,610,032 UART: [afmc] AUTHORITY.KEYID = 5
21,973,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,290,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,292,305 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,308,311 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,324,412 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,340,507 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,363,626 UART: [afmc] --
24,366,930 UART: [cold-reset] --
24,371,351 UART: [state] Locking Datavault
24,374,826 UART: [state] Locking PCR0, PCR1 and PCR31
24,376,494 UART: [state] Locking ICCM
24,378,112 UART: [exit] Launching FMC @ 0x40000130
24,386,785 UART:
24,387,020 UART: Running Caliptra FMC ...
24,388,127 UART:
24,388,293 UART: [state] CFI Enabled
24,450,886 UART: [fht] FMC Alias Private Key: 7
26,788,736 UART: [art] Extend RT PCRs Done
26,789,970 UART: [art] Lock RT PCRs Done
26,791,580 UART: [art] Populate DV Done
26,797,058 UART: [fht] FMC Alias Private Key: 7
26,798,711 UART: [art] Derive CDI
26,799,530 UART: [art] Store in in slot 0x4
26,861,008 UART: [art] Derive Key Pair
26,862,059 UART: [art] Store priv key in slot 0x5
30,154,942 UART: [art] Derive Key Pair - Done
30,167,781 UART: [art] Signing Cert with AUTHO
30,169,090 UART: RITY.KEYID = 7
32,456,091 UART: [art] Erasing AUTHORITY.KEYID = 7
32,457,607 UART: [art] PUB.X = C606FD9A56FD4B3BE642B8C2A0FCF090DEDD088C2C68570279EFEF190FDC88079A4AAA1A7A6315CBCCD3B06C987AEE65
32,464,868 UART: [art] PUB.Y = 97EE521932B5854521071306BF05B6E3DB7FC1052C9B44978F257A6AF2D9DA5D57B25C65A32646B405B30428494B58A0
32,472,074 UART: [art] SIG.R = A87C3148E654722CE944DB7F9768F252B9429BAFA08FE19DD5F8B89ECC207DFA74EB573EC7262A7BD1420588E5896EFA
32,479,486 UART: [art] SIG.S = 910EA81DE430786A3012001B4CFB270779879147DFB3D6CC99F0D7786A1879A296785ED31F9BC46C431EFB2F01DFA417
33,785,027 UART: Caliptra RT
33,785,741 UART: [state] CFI Enabled
33,947,971 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,016 UART:
1,288 UART: Running Caliptra ROM ...
2,398 UART:
2,554 UART: [state] CFI Enabled
64,772 UART: [state] LifecycleState = Production
66,536 UART: [state] DebugLocked = Yes
68,197 UART: [state] Starting the WD Timer 40000000 cycles
73,529 UART: [kat] SHA2-256
255,469 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
266,995 UART: [kat] ++
267,500 UART: [kat] sha1
278,384 UART: [kat] SHA2-256
281,412 UART: [kat] SHA2-384
287,177 UART: [kat] SHA2-512-ACC
289,782 UART: [kat] ECC-384
3,575,867 UART: [kat] HMAC-384Kdf
3,601,506 UART: [kat] LMS
4,674,647 UART: [kat] --
4,678,487 UART: [warm-reset] ++
4,683,393 UART: [warm-reset] --
4,688,177 UART: [state] Locking Datavault
4,692,403 UART: [state] Locking PCR0, PCR1 and PCR31
4,694,542 UART: [state] Locking ICCM
4,695,974 UART: [exit] Launching FMC @ 0x40000130
4,704,590 UART:
4,704,822 UART: Running Caliptra FMC ...
4,705,862 UART:
4,706,014 UART: [state] CFI Enabled
4,767,276 UART: [aliasrt :skip pcr extension
4,768,571 UART: [art] Extend RT PCRs Done
4,769,641 UART: [art] Lock RT PCRs Done
4,770,706 UART: [art] Populate DV Done
4,776,225 UART: [fht] FMC Alias Private Key: 7
4,777,759 UART: [art] Derive CDI
4,778,494 UART: [art] Store in in slot 0x4
4,836,176 UART: [art] Derive Key Pair
4,837,216 UART: [art] Store priv key in slot 0x5
8,129,984 UART: [art] Derive Key Pair - Done
8,143,259 UART: [art] Signing Cert with AUTHO
8,144,563 UART: RITY.KEYID = 7
10,431,011 UART: [art] Erasing AUTHORITY.KEYID = 7
10,432,519 UART: [art] PUB.X = C606FD9A56FD4B3BE642B8C2A0FCF090DEDD088C2C68570279EFEF190FDC88079A4AAA1A7A6315CBCCD3B06C987AEE65
10,439,766 UART: [art] PUB.Y = 97EE521932B5854521071306BF05B6E3DB7FC1052C9B44978F257A6AF2D9DA5D57B25C65A32646B405B30428494B58A0
10,447,003 UART: [art] SIG.R = A87C3148E654722CE944DB7F9768F252B9429BAFA08FE19DD5F8B89ECC207DFA74EB573EC7262A7BD1420588E5896EFA
10,454,420 UART: [art] SIG.S = 910EA81DE430786A3012001B4CFB270779879147DFB3D6CC99F0D7786A1879A296785ED31F9BC46C431EFB2F01DFA417
11,759,278 UART: Caliptra RT
11,759,993 UART: [state] CFI Enabled
12,094,074 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
191,559 UART:
191,914 UART: Running Caliptra ROM ...
193,044 UART:
193,197 UART: [state] CFI Enabled
263,855 UART: [state] LifecycleState = Production
266,090 UART: [state] DebugLocked = Yes
267,526 UART: [state] Starting the WD Timer 40000000 cycles
272,059 UART: [kat] SHA2-256
454,032 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,522 UART: [kat] ++
466,125 UART: [kat] sha1
476,819 UART: [kat] SHA2-256
479,835 UART: [kat] SHA2-384
486,608 UART: [kat] SHA2-512-ACC
489,263 UART: [kat] ECC-384
3,776,002 UART: [kat] HMAC-384Kdf
3,801,947 UART: [kat] LMS
4,875,114 UART: [kat] --
4,879,130 UART: [cold-reset] ++
4,881,493 UART: [fht] FHT @ 0x50003400
4,892,495 UART: [idev] ++
4,893,240 UART: [idev] CDI.KEYID = 6
4,894,422 UART: [idev] SUBJECT.KEYID = 7
4,895,526 UART: [idev] UDS.KEYID = 0
4,896,579 ready_for_fw is high
4,896,797 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,040,342 UART: [idev] Erasing UDS.KEYID = 0
8,241,037 UART: [idev] Sha1 KeyId Algorithm
8,264,310 UART: [idev] --
8,268,122 UART: [ldev] ++
8,268,702 UART: [ldev] CDI.KEYID = 6
8,269,809 UART: [ldev] SUBJECT.KEYID = 5
8,271,024 UART: [ldev] AUTHORITY.KEYID = 7
8,272,182 UART: [ldev] FE.KEYID = 1
8,317,967 UART: [ldev] Erasing FE.KEYID = 1
11,653,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,411 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,980,727 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,996,703 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,012,868 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,032,360 UART: [ldev] --
14,036,386 UART: [fwproc] Wait for Commands...
14,038,859 UART: [fwproc] Recv command 0x46574c44
14,041,113 UART: [fwproc] Recv'd Img size: 114124 bytes
18,149,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,225,963 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,294,704 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,611,368 >>> mbox cmd response: success
18,614,654 UART: [afmc] ++
18,615,325 UART: [afmc] CDI.KEYID = 6
18,616,236 UART: [afmc] SUBJECT.KEYID = 7
18,617,403 UART: [afmc] AUTHORITY.KEYID = 5
21,994,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,289,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,292,092 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,308,111 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,324,230 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,340,285 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,363,794 UART: [afmc] --
24,367,752 UART: [cold-reset] --
24,372,216 UART: [state] Locking Datavault
24,377,364 UART: [state] Locking PCR0, PCR1 and PCR31
24,379,019 UART: [state] Locking ICCM
24,380,906 UART: [exit] Launching FMC @ 0x40000130
24,389,589 UART:
24,389,826 UART: Running Caliptra FMC ...
24,390,949 UART:
24,391,111 UART: [state] CFI Enabled
24,450,773 UART: [fht] FMC Alias Private Key: 7
26,788,752 UART: [art] Extend RT PCRs Done
26,789,975 UART: [art] Lock RT PCRs Done
26,791,718 UART: [art] Populate DV Done
26,797,023 UART: [fht] FMC Alias Private Key: 7
26,798,510 UART: [art] Derive CDI
26,799,273 UART: [art] Store in in slot 0x4
26,859,724 UART: [art] Derive Key Pair
26,860,768 UART: [art] Store priv key in slot 0x5
30,153,888 UART: [art] Derive Key Pair - Done
30,166,680 UART: [art] Signing Cert with AUTHO
30,167,988 UART: RITY.KEYID = 7
32,455,471 UART: [art] Erasing AUTHORITY.KEYID = 7
32,456,981 UART: [art] PUB.X = A823BD8D2707E16D4B9802B47742CA0D912E1315860D333DA92D4150530EA62BD608AB3C0423444BC3F60E48A010529D
32,464,212 UART: [art] PUB.Y = D357CAC2FAB9FAB498C6A2B700444F429C61E4322907FC95FC28CF558D82EB60502708684CD9E46EA9287DA88DB5D6F6
32,471,411 UART: [art] SIG.R = EF13861CAA9A2D012FB656F25E09CA9D02B908849578462ADC208AD87BFEDF595B39AEB9639F964E5AD65CFF6DC2101B
32,478,830 UART: [art] SIG.S = 4C851114CB28521A60F9E7001D8EA23EAE78CABD4A07615B91E28CF115A557779DE07E70289C06F4F39E2B387D4A779F
33,784,584 UART: Caliptra RT
33,785,300 UART: [state] CFI Enabled
33,944,202 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,017 UART:
1,282 UART: Running Caliptra ROM ...
2,397 UART:
2,557 UART: [state] CFI Enabled
66,736 UART: [state] LifecycleState = Production
68,445 UART: [state] DebugLocked = Yes
71,325 UART: [state] Starting the WD Timer 40000000 cycles
77,309 UART: [kat] SHA2-256
259,253 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
270,773 UART: [kat] ++
271,357 UART: [kat] sha1
282,032 UART: [kat] SHA2-256
285,048 UART: [kat] SHA2-384
291,142 UART: [kat] SHA2-512-ACC
293,772 UART: [kat] ECC-384
3,578,184 UART: [kat] HMAC-384Kdf
3,603,974 UART: [kat] LMS
4,677,117 UART: [kat] --
4,681,117 UART: [warm-reset] ++
4,683,488 UART: [warm-reset] --
4,686,663 UART: [state] Locking Datavault
4,690,571 UART: [state] Locking PCR0, PCR1 and PCR31
4,692,787 UART: [state] Locking ICCM
4,695,483 UART: [exit] Launching FMC @ 0x40000130
4,704,171 UART:
4,704,426 UART: Running Caliptra FMC ...
4,705,733 UART:
4,705,904 UART: [state] CFI Enabled
4,767,991 UART: [aliasrt :skip pcr extension
4,769,252 UART: [art] Extend RT PCRs Done
4,770,395 UART: [art] Lock RT PCRs Done
4,771,522 UART: [art] Populate DV Done
4,777,147 UART: [fht] FMC Alias Private Key: 7
4,778,799 UART: [art] Derive CDI
4,779,615 UART: [art] Store in in slot 0x4
4,836,665 UART: [art] Derive Key Pair
4,837,712 UART: [art] Store priv key in slot 0x5
8,129,817 UART: [art] Derive Key Pair - Done
8,142,927 UART: [art] Signing Cert with AUTHO
8,144,232 UART: RITY.KEYID = 7
10,431,421 UART: [art] Erasing AUTHORITY.KEYID = 7
10,432,937 UART: [art] PUB.X = A823BD8D2707E16D4B9802B47742CA0D912E1315860D333DA92D4150530EA62BD608AB3C0423444BC3F60E48A010529D
10,440,232 UART: [art] PUB.Y = D357CAC2FAB9FAB498C6A2B700444F429C61E4322907FC95FC28CF558D82EB60502708684CD9E46EA9287DA88DB5D6F6
10,447,382 UART: [art] SIG.R = EF13861CAA9A2D012FB656F25E09CA9D02B908849578462ADC208AD87BFEDF595B39AEB9639F964E5AD65CFF6DC2101B
10,454,799 UART: [art] SIG.S = 4C851114CB28521A60F9E7001D8EA23EAE78CABD4A07615B91E28CF115A557779DE07E70289C06F4F39E2B387D4A779F
11,759,857 UART: Caliptra RT
11,760,578 UART: [state] CFI Enabled
12,088,032 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
191,934 UART:
192,307 UART: Running Caliptra ROM ...
193,399 UART:
603,150 UART: [state] CFI Enabled
615,597 UART: [state] LifecycleState = Production
617,855 UART: [state] DebugLocked = Yes
620,771 UART: [state] Starting the WD Timer 40000000 cycles
626,141 UART: [kat] SHA2-256
808,171 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,654 UART: [kat] ++
820,173 UART: [kat] sha1
831,187 UART: [kat] SHA2-256
834,233 UART: [kat] SHA2-384
841,083 UART: [kat] SHA2-512-ACC
843,666 UART: [kat] ECC-384
4,098,741 UART: [kat] HMAC-384Kdf
4,109,872 UART: [kat] LMS
5,183,056 UART: [kat] --
5,188,201 UART: [cold-reset] ++
5,189,492 UART: [fht] FHT @ 0x50003400
5,200,958 UART: [idev] ++
5,201,671 UART: [idev] CDI.KEYID = 6
5,202,859 UART: [idev] SUBJECT.KEYID = 7
5,204,315 UART: [idev] UDS.KEYID = 0
5,205,571 ready_for_fw is high
5,205,805 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,349,210 UART: [idev] Erasing UDS.KEYID = 0
8,491,295 UART: [idev] Sha1 KeyId Algorithm
8,512,296 UART: [idev] --
8,515,157 UART: [ldev] ++
8,515,778 UART: [ldev] CDI.KEYID = 6
8,516,952 UART: [ldev] SUBJECT.KEYID = 5
8,518,108 UART: [ldev] AUTHORITY.KEYID = 7
8,519,331 UART: [ldev] FE.KEYID = 1
8,529,547 UART: [ldev] Erasing FE.KEYID = 1
11,819,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,110,510 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,126,817 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,142,859 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,158,950 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,179,268 UART: [ldev] --
14,183,722 UART: [fwproc] Wait for Commands...
14,185,767 UART: [fwproc] Recv command 0x46574c44
14,188,071 UART: [fwproc] Recv'd Img size: 114124 bytes
18,304,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,383,086 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,451,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,769,049 >>> mbox cmd response: success
18,773,951 UART: [afmc] ++
18,774,557 UART: [afmc] CDI.KEYID = 6
18,775,746 UART: [afmc] SUBJECT.KEYID = 7
18,776,846 UART: [afmc] AUTHORITY.KEYID = 5
22,096,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,389,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,392,162 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,408,168 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,424,247 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,440,295 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,462,866 UART: [afmc] --
24,467,030 UART: [cold-reset] --
24,472,675 UART: [state] Locking Datavault
24,477,063 UART: [state] Locking PCR0, PCR1 and PCR31
24,478,756 UART: [state] Locking ICCM
24,480,233 UART: [exit] Launching FMC @ 0x40000130
24,488,891 UART:
24,489,299 UART: Running Caliptra FMC ...
24,490,429 UART:
24,490,581 UART: [state] CFI Enabled
24,498,368 UART: [fht] FMC Alias Private Key: 7
26,829,223 UART: [art] Extend RT PCRs Done
26,830,456 UART: [art] Lock RT PCRs Done
26,831,883 UART: [art] Populate DV Done
26,837,234 UART: [fht] FMC Alias Private Key: 7
26,838,713 UART: [art] Derive CDI
26,839,440 UART: [art] Store in in slot 0x4
26,881,752 UART: [art] Derive Key Pair
26,882,742 UART: [art] Store priv key in slot 0x5
30,124,517 UART: [art] Derive Key Pair - Done
30,137,241 UART: [art] Signing Cert with AUTHO
30,138,540 UART: RITY.KEYID = 7
32,418,023 UART: [art] Erasing AUTHORITY.KEYID = 7
32,419,540 UART: [art] PUB.X = DF62DC96A1D83DA94C3057EA9C969737602EA8D56061E686B98B9BCB81A06918D454B39E32AFA5A31F4FF2CDA74C61DF
32,426,734 UART: [art] PUB.Y = 422FABAFE5E5780EDD0E93A197B2C1620089938900D9EE692404938601E130E7167E1261D98E7C0EF7C2C91BC93A2B1D
32,433,970 UART: [art] SIG.R = E53D05872EF7907C22B421A209A4107327712CC698CA384F017BA131D4F400A2BF728A21524773FEC8716D8F38069FD5
32,441,314 UART: [art] SIG.S = 1CA0EC32E63E308AF533D761A18AC71F64BC429BC8F76DC307548D4C555554ECFA55563089FCD1303A6B9DC5309CF0EB
33,747,425 UART: Caliptra RT
33,748,132 UART: [state] CFI Enabled
33,865,739 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,003 UART:
1,164 UART: Running Caliptra ROM ...
2,203 UART:
6,663,490 UART: [state] CFI Enabled
6,679,897 UART: [state] LifecycleState = Production
6,681,640 UART: [state] DebugLocked = Yes
6,683,491 UART: [state] Starting the WD Timer 40000000 cycles
6,689,581 UART: [kat] SHA2-256
6,871,575 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,883,089 UART: [kat] ++
6,883,618 UART: [kat] sha1
6,894,069 UART: [kat] SHA2-256
6,897,083 UART: [kat] SHA2-384
6,904,448 UART: [kat] SHA2-512-ACC
6,907,076 UART: [kat] ECC-384
10,161,404 UART: [kat] HMAC-384Kdf
10,173,134 UART: [kat] LMS
11,246,298 UART: [kat] --
11,250,689 UART: [warm-reset] ++
11,254,678 UART: [warm-reset] --
11,258,919 UART: [state] Locking Datavault
11,262,616 UART: [state] Locking PCR0, PCR1 and PCR31
11,264,789 UART: [state] Locking ICCM
11,267,749 UART: [exit] Launching FMC @ 0x40000130
11,276,410 UART:
11,276,634 UART: Running Caliptra FMC ...
11,277,726 UART:
11,277,877 UART: [state] CFI Enabled
11,279,924 UART: [aliasrt :skip pcr extension
11,281,191 UART: [art] Extend RT PCRs Done
11,282,325 UART: [art] Lock RT PCRs Done
11,283,548 UART: [art] Populate DV Done
11,289,217 UART: [fht] FMC Alias Private Key: 7
11,290,693 UART: [art] Derive CDI
11,291,496 UART: [art] Store in in slot 0x4
11,334,511 UART: [art] Derive Key Pair
11,335,506 UART: [art] Store priv key in slot 0x5
14,577,890 UART: [art] Derive Key Pair - Done
14,591,204 UART: [art] Signing Cert with AUTHO
14,592,498 UART: RITY.KEYID = 7
16,871,840 UART: [art] Erasing AUTHORITY.KEYID = 7
16,873,342 UART: [art] PUB.X = DF62DC96A1D83DA94C3057EA9C969737602EA8D56061E686B98B9BCB81A06918D454B39E32AFA5A31F4FF2CDA74C61DF
16,880,586 UART: [art] PUB.Y = 422FABAFE5E5780EDD0E93A197B2C1620089938900D9EE692404938601E130E7167E1261D98E7C0EF7C2C91BC93A2B1D
16,887,804 UART: [art] SIG.R = E53D05872EF7907C22B421A209A4107327712CC698CA384F017BA131D4F400A2BF728A21524773FEC8716D8F38069FD5
16,895,127 UART: [art] SIG.S = 1CA0EC32E63E308AF533D761A18AC71F64BC429BC8F76DC307548D4C555554ECFA55563089FCD1303A6B9DC5309CF0EB
18,200,555 UART: Caliptra RT
18,201,275 UART: [state] CFI Enabled
18,488,101 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
191,837 UART:
192,202 UART: Running Caliptra ROM ...
193,309 UART:
603,072 UART: [state] CFI Enabled
614,912 UART: [state] LifecycleState = Production
617,146 UART: [state] DebugLocked = Yes
618,915 UART: [state] Starting the WD Timer 40000000 cycles
624,783 UART: [kat] SHA2-256
806,742 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,314 UART: [kat] ++
818,759 UART: [kat] sha1
830,149 UART: [kat] SHA2-256
833,231 UART: [kat] SHA2-384
839,076 UART: [kat] SHA2-512-ACC
841,654 UART: [kat] ECC-384
4,096,503 UART: [kat] HMAC-384Kdf
4,108,957 UART: [kat] LMS
5,182,157 UART: [kat] --
5,186,166 UART: [cold-reset] ++
5,187,814 UART: [fht] FHT @ 0x50003400
5,199,072 UART: [idev] ++
5,199,775 UART: [idev] CDI.KEYID = 6
5,200,941 UART: [idev] SUBJECT.KEYID = 7
5,202,394 UART: [idev] UDS.KEYID = 0
5,203,647 ready_for_fw is high
5,203,862 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
5,347,200 UART: [idev] Erasing UDS.KEYID = 0
8,491,156 UART: [idev] Sha1 KeyId Algorithm
8,512,456 UART: [idev] --
8,515,369 UART: [ldev] ++
8,515,934 UART: [ldev] CDI.KEYID = 6
8,517,163 UART: [ldev] SUBJECT.KEYID = 5
8,518,324 UART: [ldev] AUTHORITY.KEYID = 7
8,519,467 UART: [ldev] FE.KEYID = 1
8,530,566 UART: [ldev] Erasing FE.KEYID = 1
11,822,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,114,493 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,130,847 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,146,832 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,162,946 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,182,195 UART: [ldev] --
14,186,069 UART: [fwproc] Wait for Commands...
14,187,737 UART: [fwproc] Recv command 0x46574c44
14,190,040 UART: [fwproc] Recv'd Img size: 114124 bytes
18,288,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,369,685 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,438,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
18,755,859 >>> mbox cmd response: success
18,759,996 UART: [afmc] ++
18,760,605 UART: [afmc] CDI.KEYID = 6
18,761,712 UART: [afmc] SUBJECT.KEYID = 7
18,762,925 UART: [afmc] AUTHORITY.KEYID = 5
22,079,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,374,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,376,372 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,392,362 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,408,514 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,424,578 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,447,484 UART: [afmc] --
24,451,825 UART: [cold-reset] --
24,455,727 UART: [state] Locking Datavault
24,462,067 UART: [state] Locking PCR0, PCR1 and PCR31
24,463,717 UART: [state] Locking ICCM
24,465,217 UART: [exit] Launching FMC @ 0x40000130
24,473,938 UART:
24,474,164 UART: Running Caliptra FMC ...
24,475,265 UART:
24,475,415 UART: [state] CFI Enabled
24,483,241 UART: [fht] FMC Alias Private Key: 7
26,813,921 UART: [art] Extend RT PCRs Done
26,815,140 UART: [art] Lock RT PCRs Done
26,816,953 UART: [art] Populate DV Done
26,822,251 UART: [fht] FMC Alias Private Key: 7
26,823,802 UART: [art] Derive CDI
26,824,532 UART: [art] Store in in slot 0x4
26,867,119 UART: [art] Derive Key Pair
26,868,156 UART: [art] Store priv key in slot 0x5
30,110,422 UART: [art] Derive Key Pair - Done
30,123,370 UART: [art] Signing Cert with AUTHO
30,124,672 UART: RITY.KEYID = 7
32,404,135 UART: [art] Erasing AUTHORITY.KEYID = 7
32,405,644 UART: [art] PUB.X = D3243253783F0F4049E8162011A181C026DD7F84833118B84ED2196C63380D0CFFF3047B3B4F9612A7C512273063EE61
32,412,856 UART: [art] PUB.Y = 10F63085F95348F564534B5D50C6FE3D785EFEF5DE787BE4A6E8AA0B08C1817AE80A21544FFF5893910D6C0010A2EDA9
32,420,097 UART: [art] SIG.R = 9C9E4268C3BE975461D03011BCBD6DAA15FB6AE0F639B639879C04736E4AAD3E1C9E720878F41E5D2832D01216856E5F
32,427,442 UART: [art] SIG.S = 8F35424B8659314E00DEF09D8C4D1EA611B6A80ABE0D4BF55A82DB4F315EC58D64D1A0FD287BE3C3774B45AE15667663
33,732,224 UART: Caliptra RT
33,732,934 UART: [state] CFI Enabled
33,850,810 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,031 UART:
1,195 UART: Running Caliptra ROM ...
2,238 UART:
6,673,601 UART: [state] CFI Enabled
6,687,199 UART: [state] LifecycleState = Production
6,688,972 UART: [state] DebugLocked = Yes
6,690,742 UART: [state] Starting the WD Timer 40000000 cycles
6,695,431 UART: [kat] SHA2-256
6,877,401 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,888,948 UART: [kat] ++
6,889,482 UART: [kat] sha1
6,899,667 UART: [kat] SHA2-256
6,902,737 UART: [kat] SHA2-384
6,907,319 UART: [kat] SHA2-512-ACC
6,909,939 UART: [kat] ECC-384
10,164,915 UART: [kat] HMAC-384Kdf
10,177,744 UART: [kat] LMS
11,250,896 UART: [kat] --
11,255,418 UART: [warm-reset] ++
11,260,426 UART: [warm-reset] --
11,262,880 UART: [state] Locking Datavault
11,266,839 UART: [state] Locking PCR0, PCR1 and PCR31
11,268,974 UART: [state] Locking ICCM
11,271,715 UART: [exit] Launching FMC @ 0x40000130
11,280,389 UART:
11,280,616 UART: Running Caliptra FMC ...
11,281,637 UART:
11,281,777 UART: [state] CFI Enabled
11,283,996 UART: [aliasrt :skip pcr extension
11,285,243 UART: [art] Extend RT PCRs Done
11,286,382 UART: [art] Lock RT PCRs Done
11,287,440 UART: [art] Populate DV Done
11,292,704 UART: [fht] FMC Alias Private Key: 7
11,294,236 UART: [art] Derive CDI
11,295,043 UART: [art] Store in in slot 0x4
11,337,491 UART: [art] Derive Key Pair
11,338,566 UART: [art] Store priv key in slot 0x5
14,580,772 UART: [art] Derive Key Pair - Done
14,593,789 UART: [art] Signing Cert with AUTHO
14,595,146 UART: RITY.KEYID = 7
16,874,723 UART: [art] Erasing AUTHORITY.KEYID = 7
16,876,777 UART: [art] PUB.X = D3243253783F0F4049E8162011A181C026DD7F84833118B84ED2196C63380D0CFFF3047B3B4F9612A7C512273063EE61
16,883,438 UART: [art] PUB.Y = 10F63085F95348F564534B5D50C6FE3D785EFEF5DE787BE4A6E8AA0B08C1817AE80A21544FFF5893910D6C0010A2EDA9
16,890,672 UART: [art] SIG.R = 9C9E4268C3BE975461D03011BCBD6DAA15FB6AE0F639B639879C04736E4AAD3E1C9E720878F41E5D2832D01216856E5F
16,898,060 UART: [art] SIG.S = 8F35424B8659314E00DEF09D8C4D1EA611B6A80ABE0D4BF55A82DB4F315EC58D64D1A0FD287BE3C3774B45AE15667663
18,202,867 UART: Caliptra RT
18,203,583 UART: [state] CFI Enabled
18,490,989 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
191,564 UART:
191,933 UART: Running Caliptra ROM ...
193,127 UART:
193,287 UART: [state] CFI Enabled
265,821 UART: [state] LifecycleState = Production
267,626 UART: [state] DebugLocked = Yes
269,937 UART: [state] Starting the WD Timer 40000000 cycles
274,181 UART: [kat] SHA2-256
453,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,867 UART: [kat] ++
465,316 UART: [kat] sha1
475,707 UART: [kat] SHA2-256
478,714 UART: [kat] SHA2-384
483,992 UART: [kat] SHA2-512-ACC
487,009 UART: [kat] ECC-384
2,948,145 UART: [kat] HMAC-384Kdf
2,973,034 UART: [kat] LMS
3,502,500 UART: [kat] --
3,508,409 UART: [cold-reset] ++
3,509,771 UART: [fht] FHT @ 0x50003400
3,521,759 UART: [idev] ++
3,522,325 UART: [idev] CDI.KEYID = 6
3,523,235 UART: [idev] SUBJECT.KEYID = 7
3,524,407 UART: [idev] UDS.KEYID = 0
3,525,452 ready_for_fw is high
3,525,650 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,058 UART: [idev] Erasing UDS.KEYID = 0
6,030,428 UART: [idev] Sha1 KeyId Algorithm
6,053,960 UART: [idev] --
6,058,116 UART: [ldev] ++
6,058,691 UART: [ldev] CDI.KEYID = 6
6,059,625 UART: [ldev] SUBJECT.KEYID = 5
6,060,784 UART: [ldev] AUTHORITY.KEYID = 7
6,062,016 UART: [ldev] FE.KEYID = 1
6,102,444 UART: [ldev] Erasing FE.KEYID = 1
8,606,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,360 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,338 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,148 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,391,137 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,725 UART: [ldev] --
10,415,978 UART: [fwproc] Wait for Commands...
10,418,489 UART: [fwproc] Recv command 0x46574c44
10,420,587 UART: [fwproc] Recv'd Img size: 114448 bytes
13,850,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,988,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,306,452 >>> mbox cmd response: success
14,310,181 UART: [afmc] ++
14,310,804 UART: [afmc] CDI.KEYID = 6
14,311,720 UART: [afmc] SUBJECT.KEYID = 7
14,312,879 UART: [afmc] AUTHORITY.KEYID = 5
16,850,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,576,533 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,592,494 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,608,387 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,624,094 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,646,996 UART: [afmc] --
18,651,175 UART: [cold-reset] --
18,653,473 UART: [state] Locking Datavault
18,659,087 UART: [state] Locking PCR0, PCR1 and PCR31
18,660,740 UART: [state] Locking ICCM
18,662,186 UART: [exit] Launching FMC @ 0x40000130
18,670,579 UART:
18,670,817 UART: Running Caliptra FMC ...
18,671,917 UART:
18,672,081 UART: [state] CFI Enabled
18,735,251 UART: [fht] FMC Alias Private Key: 7
20,498,903 UART: [art] Extend RT PCRs Done
20,500,114 UART: [art] Lock RT PCRs Done
20,501,733 UART: [art] Populate DV Done
20,507,030 UART: [fht] FMC Alias Private Key: 7
20,508,675 UART: [art] Derive CDI
20,509,446 UART: [art] Store in in slot 0x4
20,568,371 UART: [art] Derive Key Pair
20,569,371 UART: [art] Store priv key in slot 0x5
23,032,599 UART: [art] Derive Key Pair - Done
23,045,864 UART: [art] Signing Cert with AUTHO
23,047,164 UART: RITY.KEYID = 7
24,758,638 UART: [art] Erasing AUTHORITY.KEYID = 7
24,760,137 UART: [art] PUB.X = 22ED1D08CB12317C9F25E53A7BD22CC90DCFF94A4FC5F3C1EEC0C6DE5440D02032E304D10B7379E5FE4F70F6398E72D7
24,767,387 UART: [art] PUB.Y = 362DAB09A8BEE056980D7DC07466EAC913869288292722EFBA3CE6EB9EF09B1026033DEEA2C379F45333045EFE945606
24,774,692 UART: [art] SIG.R = 68D78AA9DB26E9ABC68496C512BBD25C8C8465BAC1C5B81674C38D53FFFBE1DE48474672BC7BA1CB4282A54AF2E2BF11
24,782,114 UART: [art] SIG.S = C77CBC64F6C2C7A93876B919D03DBFC818BC2C9847B75940653E8D1AF4C1BB9D0CBF45F537C7439D43E22154B60D593C
25,760,948 UART: Caliptra RT
25,761,648 UART: [state] CFI Enabled
25,925,475 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,009 UART:
1,269 UART: Running Caliptra ROM ...
2,383 UART:
2,537 UART: [state] CFI Enabled
65,812 UART: [state] LifecycleState = Production
67,572 UART: [state] DebugLocked = Yes
68,961 UART: [state] Starting the WD Timer 40000000 cycles
73,466 UART: [kat] SHA2-256
252,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,199 UART: [kat] ++
264,640 UART: [kat] sha1
275,853 UART: [kat] SHA2-256
278,861 UART: [kat] SHA2-384
285,862 UART: [kat] SHA2-512-ACC
288,845 UART: [kat] ECC-384
2,751,874 UART: [kat] HMAC-384Kdf
2,772,750 UART: [kat] LMS
3,302,250 UART: [kat] --
3,306,427 UART: [warm-reset] ++
3,311,867 UART: [warm-reset] --
3,316,761 UART: [state] Locking Datavault
3,319,633 UART: [state] Locking PCR0, PCR1 and PCR31
3,321,278 UART: [state] Locking ICCM
3,323,078 UART: [exit] Launching FMC @ 0x40000130
3,331,524 UART:
3,331,766 UART: Running Caliptra FMC ...
3,332,793 UART:
3,332,962 UART: [state] CFI Enabled
3,382,040 UART: [aliasrt :skip pcr extension
3,383,335 UART: [art] Extend RT PCRs Done
3,384,402 UART: [art] Lock RT PCRs Done
3,385,791 UART: [art] Populate DV Done
3,391,526 UART: [fht] FMC Alias Private Key: 7
3,393,272 UART: [art] Derive CDI
3,394,013 UART: [art] Store in in slot 0x4
3,450,832 UART: [art] Derive Key Pair
3,451,870 UART: [art] Store priv key in slot 0x5
5,914,388 UART: [art] Derive Key Pair - Done
5,927,293 UART: [art] Signing Cert with AUTHO
5,928,618 UART: RITY.KEYID = 7
7,640,570 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,088 UART: [art] PUB.X = 22ED1D08CB12317C9F25E53A7BD22CC90DCFF94A4FC5F3C1EEC0C6DE5440D02032E304D10B7379E5FE4F70F6398E72D7
7,649,338 UART: [art] PUB.Y = 362DAB09A8BEE056980D7DC07466EAC913869288292722EFBA3CE6EB9EF09B1026033DEEA2C379F45333045EFE945606
7,656,600 UART: [art] SIG.R = 68D78AA9DB26E9ABC68496C512BBD25C8C8465BAC1C5B81674C38D53FFFBE1DE48474672BC7BA1CB4282A54AF2E2BF11
7,664,050 UART: [art] SIG.S = C77CBC64F6C2C7A93876B919D03DBFC818BC2C9847B75940653E8D1AF4C1BB9D0CBF45F537C7439D43E22154B60D593C
8,642,832 UART: Caliptra RT
8,643,521 UART: [state] CFI Enabled
8,980,980 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
191,517 UART:
191,879 UART: Running Caliptra ROM ...
192,977 UART:
193,122 UART: [state] CFI Enabled
265,347 UART: [state] LifecycleState = Production
267,091 UART: [state] DebugLocked = Yes
269,294 UART: [state] Starting the WD Timer 40000000 cycles
274,668 UART: [kat] SHA2-256
453,860 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,400 UART: [kat] ++
465,846 UART: [kat] sha1
476,740 UART: [kat] SHA2-256
479,756 UART: [kat] SHA2-384
485,680 UART: [kat] SHA2-512-ACC
488,619 UART: [kat] ECC-384
2,948,714 UART: [kat] HMAC-384Kdf
2,972,835 UART: [kat] LMS
3,502,305 UART: [kat] --
3,504,830 UART: [cold-reset] ++
3,506,761 UART: [fht] FHT @ 0x50003400
3,517,808 UART: [idev] ++
3,518,372 UART: [idev] CDI.KEYID = 6
3,519,405 UART: [idev] SUBJECT.KEYID = 7
3,520,512 UART: [idev] UDS.KEYID = 0
3,521,442 ready_for_fw is high
3,521,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,589 UART: [idev] Erasing UDS.KEYID = 0
6,026,588 UART: [idev] Sha1 KeyId Algorithm
6,049,279 UART: [idev] --
6,052,731 UART: [ldev] ++
6,053,307 UART: [ldev] CDI.KEYID = 6
6,054,220 UART: [ldev] SUBJECT.KEYID = 5
6,055,409 UART: [ldev] AUTHORITY.KEYID = 7
6,056,650 UART: [ldev] FE.KEYID = 1
6,100,842 UART: [ldev] Erasing FE.KEYID = 1
8,603,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,766 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,336,752 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,352,591 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,368,551 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,387,707 UART: [ldev] --
10,391,889 UART: [fwproc] Wait for Commands...
10,394,413 UART: [fwproc] Recv command 0x46574c44
10,396,501 UART: [fwproc] Recv'd Img size: 114448 bytes
13,828,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,292,408 >>> mbox cmd response: success
14,297,540 UART: [afmc] ++
14,298,154 UART: [afmc] CDI.KEYID = 6
14,299,072 UART: [afmc] SUBJECT.KEYID = 7
14,300,122 UART: [afmc] AUTHORITY.KEYID = 5
16,830,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,557,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,559,039 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,575,030 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,590,873 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,606,588 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,629,958 UART: [afmc] --
18,632,988 UART: [cold-reset] --
18,637,818 UART: [state] Locking Datavault
18,641,759 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,398 UART: [state] Locking ICCM
18,646,067 UART: [exit] Launching FMC @ 0x40000130
18,654,475 UART:
18,654,708 UART: Running Caliptra FMC ...
18,655,734 UART:
18,655,881 UART: [state] CFI Enabled
18,714,519 UART: [fht] FMC Alias Private Key: 7
20,478,369 UART: [art] Extend RT PCRs Done
20,479,581 UART: [art] Lock RT PCRs Done
20,481,119 UART: [art] Populate DV Done
20,486,473 UART: [fht] FMC Alias Private Key: 7
20,487,959 UART: [art] Derive CDI
20,488,698 UART: [art] Store in in slot 0x4
20,547,303 UART: [art] Derive Key Pair
20,548,340 UART: [art] Store priv key in slot 0x5
23,011,330 UART: [art] Derive Key Pair - Done
23,024,162 UART: [art] Signing Cert with AUTHO
23,025,466 UART: RITY.KEYID = 7
24,737,393 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,892 UART: [art] PUB.X = E9B794ED17E2E7026DD09734923DE13E1444352A60F46072B9A0B4BA0EC344126E52BBC01A1776FE7C86CD0FECBC3B89
24,746,160 UART: [art] PUB.Y = 87C499EB2F205766CF8D4EBC5D37BB8AA94B68A2DA38C85FE51925CD6A59936576E52CC64B5E9823F486D8DD11CC74B8
24,753,400 UART: [art] SIG.R = B9E2DB2F7E563CC55DDC8A9E2702CF959C61916746EF18322BA7EEBB40EF4255C5C73966300DFD4E4EAB9E9C95DA2C56
24,760,848 UART: [art] SIG.S = EF17745ECA84DA194BAA1FEDF45294330592A2D053ECC65F31A4DB93F62B77FB78A357CC77BD55F98C9C26A5EAF7CBCD
25,739,827 UART: Caliptra RT
25,740,526 UART: [state] CFI Enabled
25,905,699 UART: [rt] RT listening for mailbox commands...
Initializing fuses
995 UART:
1,239 UART: Running Caliptra ROM ...
2,343 UART:
2,500 UART: [state] CFI Enabled
65,254 UART: [state] LifecycleState = Production
67,005 UART: [state] DebugLocked = Yes
69,989 UART: [state] Starting the WD Timer 40000000 cycles
74,362 UART: [kat] SHA2-256
253,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,126 UART: [kat] ++
265,650 UART: [kat] sha1
276,048 UART: [kat] SHA2-256
279,098 UART: [kat] SHA2-384
284,984 UART: [kat] SHA2-512-ACC
287,984 UART: [kat] ECC-384
2,748,836 UART: [kat] HMAC-384Kdf
2,772,613 UART: [kat] LMS
3,302,070 UART: [kat] --
3,304,706 UART: [warm-reset] ++
3,309,116 UART: [warm-reset] --
3,314,870 UART: [state] Locking Datavault
3,318,063 UART: [state] Locking PCR0, PCR1 and PCR31
3,319,754 UART: [state] Locking ICCM
3,321,554 UART: [exit] Launching FMC @ 0x40000130
3,330,022 UART:
3,330,267 UART: Running Caliptra FMC ...
3,331,375 UART:
3,331,538 UART: [state] CFI Enabled
3,382,715 UART: [aliasrt :skip pcr extension
3,383,972 UART: [art] Extend RT PCRs Done
3,385,121 UART: [art] Lock RT PCRs Done
3,386,191 UART: [art] Populate DV Done
3,391,925 UART: [fht] FMC Alias Private Key: 7
3,393,462 UART: [art] Derive CDI
3,394,279 UART: [art] Store in in slot 0x4
3,451,540 UART: [art] Derive Key Pair
3,452,578 UART: [art] Store priv key in slot 0x5
5,915,567 UART: [art] Derive Key Pair - Done
5,928,507 UART: [art] Signing Cert with AUTHO
5,929,836 UART: RITY.KEYID = 7
7,640,669 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,175 UART: [art] PUB.X = E9B794ED17E2E7026DD09734923DE13E1444352A60F46072B9A0B4BA0EC344126E52BBC01A1776FE7C86CD0FECBC3B89
7,649,443 UART: [art] PUB.Y = 87C499EB2F205766CF8D4EBC5D37BB8AA94B68A2DA38C85FE51925CD6A59936576E52CC64B5E9823F486D8DD11CC74B8
7,656,681 UART: [art] SIG.R = B9E2DB2F7E563CC55DDC8A9E2702CF959C61916746EF18322BA7EEBB40EF4255C5C73966300DFD4E4EAB9E9C95DA2C56
7,664,090 UART: [art] SIG.S = EF17745ECA84DA194BAA1FEDF45294330592A2D053ECC65F31A4DB93F62B77FB78A357CC77BD55F98C9C26A5EAF7CBCD
8,642,763 UART: Caliptra RT
8,643,467 UART: [state] CFI Enabled
8,980,381 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
191,774 UART:
192,306 UART: Running Caliptra ROM ...
193,440 UART:
602,993 UART: [state] CFI Enabled
620,483 UART: [state] LifecycleState = Production
622,191 UART: [state] DebugLocked = Yes
624,817 UART: [state] Starting the WD Timer 40000000 cycles
629,757 UART: [kat] SHA2-256
808,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,458 UART: [kat] ++
820,990 UART: [kat] sha1
831,323 UART: [kat] SHA2-256
834,336 UART: [kat] SHA2-384
840,962 UART: [kat] SHA2-512-ACC
843,960 UART: [kat] ECC-384
3,285,908 UART: [kat] HMAC-384Kdf
3,297,830 UART: [kat] LMS
3,827,383 UART: [kat] --
3,831,327 UART: [cold-reset] ++
3,833,473 UART: [fht] FHT @ 0x50003400
3,844,368 UART: [idev] ++
3,844,923 UART: [idev] CDI.KEYID = 6
3,845,824 UART: [idev] SUBJECT.KEYID = 7
3,847,057 UART: [idev] UDS.KEYID = 0
3,847,978 ready_for_fw is high
3,848,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,988 UART: [idev] Erasing UDS.KEYID = 0
6,320,048 UART: [idev] Sha1 KeyId Algorithm
6,343,436 UART: [idev] --
6,347,622 UART: [ldev] ++
6,348,196 UART: [ldev] CDI.KEYID = 6
6,349,072 UART: [ldev] SUBJECT.KEYID = 5
6,350,278 UART: [ldev] AUTHORITY.KEYID = 7
6,351,571 UART: [ldev] FE.KEYID = 1
6,361,970 UART: [ldev] Erasing FE.KEYID = 1
8,832,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,193 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,565,188 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,581,036 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,596,967 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,617,037 UART: [ldev] --
10,621,053 UART: [fwproc] Wait for Commands...
10,623,582 UART: [fwproc] Recv command 0x46574c44
10,625,614 UART: [fwproc] Recv'd Img size: 114448 bytes
14,058,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,211,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,529,056 >>> mbox cmd response: success
14,533,057 UART: [afmc] ++
14,533,693 UART: [afmc] CDI.KEYID = 6
14,534,605 UART: [afmc] SUBJECT.KEYID = 7
14,535,759 UART: [afmc] AUTHORITY.KEYID = 5
17,034,391 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,756,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,758,028 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,774,022 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,789,846 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,805,607 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,829,020 UART: [afmc] --
18,832,875 UART: [cold-reset] --
18,835,759 UART: [state] Locking Datavault
18,839,811 UART: [state] Locking PCR0, PCR1 and PCR31
18,841,460 UART: [state] Locking ICCM
18,843,495 UART: [exit] Launching FMC @ 0x40000130
18,851,883 UART:
18,852,131 UART: Running Caliptra FMC ...
18,853,226 UART:
18,853,382 UART: [state] CFI Enabled
18,861,746 UART: [fht] FMC Alias Private Key: 7
20,618,753 UART: [art] Extend RT PCRs Done
20,619,967 UART: [art] Lock RT PCRs Done
20,621,721 UART: [art] Populate DV Done
20,627,502 UART: [fht] FMC Alias Private Key: 7
20,629,142 UART: [art] Derive CDI
20,629,951 UART: [art] Store in in slot 0x4
20,672,380 UART: [art] Derive Key Pair
20,673,413 UART: [art] Store priv key in slot 0x5
23,100,564 UART: [art] Derive Key Pair - Done
23,113,457 UART: [art] Signing Cert with AUTHO
23,114,760 UART: RITY.KEYID = 7
24,820,060 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,583 UART: [art] PUB.X = 6B6725C5D8A981A76B728FDF981FE66BF89B0352A7E0407D2021C4181F939FB0B148B76E773A7951604B28B4C35A54E9
24,828,820 UART: [art] PUB.Y = E87A4BE20683E550334AFF716F39C3AD57238BAEC48F4E9A48F7FAA9E89F0911BC31E500DBB707D4823967A7F986BF25
24,836,101 UART: [art] SIG.R = 2636EA6845F43F0ADCBB7889FAE6EEAA096A857D5B6FB745434C901DB1ADBE8EB598A97C51DEDCBBA098F6B564390EC3
24,843,492 UART: [art] SIG.S = 0E381C211FF3C1394C91CAD541576CD1D7D7DEA6CF435C26551292CB1AEAF3BD596621CC6316533931D1DD26607F7C0A
25,822,232 UART: Caliptra RT
25,822,932 UART: [state] CFI Enabled
25,940,116 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,005 UART:
1,267 UART: Running Caliptra ROM ...
2,370 UART:
14,583,044 UART: [state] CFI Enabled
14,596,459 UART: [state] LifecycleState = Production
14,598,202 UART: [state] DebugLocked = Yes
14,600,589 UART: [state] Starting the WD Timer 40000000 cycles
14,605,105 UART: [kat] SHA2-256
14,784,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,795,823 UART: [kat] ++
14,796,367 UART: [kat] sha1
14,807,146 UART: [kat] SHA2-256
14,810,151 UART: [kat] SHA2-384
14,817,044 UART: [kat] SHA2-512-ACC
14,819,987 UART: [kat] ECC-384
17,259,016 UART: [kat] HMAC-384Kdf
17,272,318 UART: [kat] LMS
17,801,841 UART: [kat] --
17,805,877 UART: [warm-reset] ++
17,810,284 UART: [warm-reset] --
17,814,676 UART: [state] Locking Datavault
17,817,493 UART: [state] Locking PCR0, PCR1 and PCR31
17,819,131 UART: [state] Locking ICCM
17,821,219 UART: [exit] Launching FMC @ 0x40000130
17,829,682 UART:
17,829,912 UART: Running Caliptra FMC ...
17,831,158 UART:
17,831,309 UART: [state] CFI Enabled
17,833,204 UART: [aliasrt :skip pcr extension
17,834,453 UART: [art] Extend RT PCRs Done
17,835,583 UART: [art] Lock RT PCRs Done
17,836,642 UART: [art] Populate DV Done
17,842,306 UART: [fht] FMC Alias Private Key: 7
17,843,887 UART: [art] Derive CDI
17,844,691 UART: [art] Store in in slot 0x4
17,886,895 UART: [art] Derive Key Pair
17,887,887 UART: [art] Store priv key in slot 0x5
20,314,860 UART: [art] Derive Key Pair - Done
20,328,337 UART: [art] Signing Cert with AUTHO
20,329,637 UART: RITY.KEYID = 7
22,034,971 UART: [art] Erasing AUTHORITY.KEYID = 7
22,036,479 UART: [art] PUB.X = 6B6725C5D8A981A76B728FDF981FE66BF89B0352A7E0407D2021C4181F939FB0B148B76E773A7951604B28B4C35A54E9
22,043,749 UART: [art] PUB.Y = E87A4BE20683E550334AFF716F39C3AD57238BAEC48F4E9A48F7FAA9E89F0911BC31E500DBB707D4823967A7F986BF25
22,051,008 UART: [art] SIG.R = 2636EA6845F43F0ADCBB7889FAE6EEAA096A857D5B6FB745434C901DB1ADBE8EB598A97C51DEDCBBA098F6B564390EC3
22,058,415 UART: [art] SIG.S = 0E381C211FF3C1394C91CAD541576CD1D7D7DEA6CF435C26551292CB1AEAF3BD596621CC6316533931D1DD26607F7C0A
23,036,561 UART: Caliptra RT
23,037,276 UART: [state] CFI Enabled
23,327,391 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
191,656 UART:
192,024 UART: Running Caliptra ROM ...
193,205 UART:
602,665 UART: [state] CFI Enabled
618,176 UART: [state] LifecycleState = Production
619,943 UART: [state] DebugLocked = Yes
622,634 UART: [state] Starting the WD Timer 40000000 cycles
626,796 UART: [kat] SHA2-256
805,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,553 UART: [kat] ++
818,084 UART: [kat] sha1
828,068 UART: [kat] SHA2-256
831,138 UART: [kat] SHA2-384
838,182 UART: [kat] SHA2-512-ACC
841,139 UART: [kat] ECC-384
3,282,167 UART: [kat] HMAC-384Kdf
3,295,757 UART: [kat] LMS
3,825,265 UART: [kat] --
3,828,977 UART: [cold-reset] ++
3,831,048 UART: [fht] FHT @ 0x50003400
3,841,684 UART: [idev] ++
3,842,291 UART: [idev] CDI.KEYID = 6
3,843,202 UART: [idev] SUBJECT.KEYID = 7
3,844,369 UART: [idev] UDS.KEYID = 0
3,845,288 ready_for_fw is high
3,845,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,066 UART: [idev] Erasing UDS.KEYID = 0
6,313,834 UART: [idev] Sha1 KeyId Algorithm
6,336,823 UART: [idev] --
6,341,354 UART: [ldev] ++
6,341,936 UART: [ldev] CDI.KEYID = 6
6,342,846 UART: [ldev] SUBJECT.KEYID = 5
6,343,998 UART: [ldev] AUTHORITY.KEYID = 7
6,345,273 UART: [ldev] FE.KEYID = 1
6,355,732 UART: [ldev] Erasing FE.KEYID = 1
8,830,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,225 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,563,196 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,579,062 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,594,994 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,615,754 UART: [ldev] --
10,620,257 UART: [fwproc] Wait for Commands...
10,622,068 UART: [fwproc] Recv command 0x46574c44
10,624,154 UART: [fwproc] Recv'd Img size: 114448 bytes
14,058,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,132,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,201,646 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,520,114 >>> mbox cmd response: success
14,524,896 UART: [afmc] ++
14,525,507 UART: [afmc] CDI.KEYID = 6
14,526,413 UART: [afmc] SUBJECT.KEYID = 7
14,527,565 UART: [afmc] AUTHORITY.KEYID = 5
17,024,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,744,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,746,780 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,762,761 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,778,622 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,794,318 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,816,321 UART: [afmc] --
18,820,985 UART: [cold-reset] --
18,823,656 UART: [state] Locking Datavault
18,829,434 UART: [state] Locking PCR0, PCR1 and PCR31
18,831,091 UART: [state] Locking ICCM
18,833,401 UART: [exit] Launching FMC @ 0x40000130
18,841,847 UART:
18,842,073 UART: Running Caliptra FMC ...
18,843,168 UART:
18,843,317 UART: [state] CFI Enabled
18,851,087 UART: [fht] FMC Alias Private Key: 7
20,608,105 UART: [art] Extend RT PCRs Done
20,609,324 UART: [art] Lock RT PCRs Done
20,610,889 UART: [art] Populate DV Done
20,616,295 UART: [fht] FMC Alias Private Key: 7
20,617,941 UART: [art] Derive CDI
20,618,748 UART: [art] Store in in slot 0x4
20,661,281 UART: [art] Derive Key Pair
20,662,315 UART: [art] Store priv key in slot 0x5
23,088,592 UART: [art] Derive Key Pair - Done
23,101,666 UART: [art] Signing Cert with AUTHO
23,102,970 UART: RITY.KEYID = 7
24,808,571 UART: [art] Erasing AUTHORITY.KEYID = 7
24,810,085 UART: [art] PUB.X = CBE5EF18128E2758FE03C789C51C2D7A277558A3AACA0AA8959FC3D9AA02BB05E931A0E728E8A7AD8CE98290CC31F458
24,817,393 UART: [art] PUB.Y = E7EA014C18F84B3694296990A3802A35471047B658071D3B52D5A4E444309CABAD5CED155A49417B117096B13E13F17B
24,824,619 UART: [art] SIG.R = 30BB71F19441A8DABDD0B3C8E9C160309F4BE007F0A5D70EEA129EBB2D1909B61AA1957B758A2F880E1C25A7C9E59010
24,832,012 UART: [art] SIG.S = 231599E350CAB7EFD374DB511815FA705A007F3612109E7DBD02CE882F6879ED20E4069665BA63D365C9D818F87048C9
25,811,089 UART: Caliptra RT
25,811,813 UART: [state] CFI Enabled
25,928,148 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,002 UART:
1,266 UART: Running Caliptra ROM ...
2,367 UART:
14,601,836 UART: [state] CFI Enabled
14,617,224 UART: [state] LifecycleState = Production
14,618,992 UART: [state] DebugLocked = Yes
14,621,059 UART: [state] Starting the WD Timer 40000000 cycles
14,626,708 UART: [kat] SHA2-256
14,805,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,817,429 UART: [kat] ++
14,817,968 UART: [kat] sha1
14,828,584 UART: [kat] SHA2-256
14,831,641 UART: [kat] SHA2-384
14,838,265 UART: [kat] SHA2-512-ACC
14,841,205 UART: [kat] ECC-384
17,282,761 UART: [kat] HMAC-384Kdf
17,294,497 UART: [kat] LMS
17,823,996 UART: [kat] --
17,830,021 UART: [warm-reset] ++
17,834,567 UART: [warm-reset] --
17,836,971 UART: [state] Locking Datavault
17,841,003 UART: [state] Locking PCR0, PCR1 and PCR31
17,842,648 UART: [state] Locking ICCM
17,844,306 UART: [exit] Launching FMC @ 0x40000130
17,852,751 UART:
17,852,978 UART: Running Caliptra FMC ...
17,854,071 UART:
17,854,222 UART: [state] CFI Enabled
17,856,321 UART: [aliasrt :skip pcr extension
17,857,557 UART: [art] Extend RT PCRs Done
17,858,682 UART: [art] Lock RT PCRs Done
17,859,799 UART: [art] Populate DV Done
17,865,139 UART: [fht] FMC Alias Private Key: 7
17,866,773 UART: [art] Derive CDI
17,867,574 UART: [art] Store in in slot 0x4
17,910,265 UART: [art] Derive Key Pair
17,911,298 UART: [art] Store priv key in slot 0x5
20,337,774 UART: [art] Derive Key Pair - Done
20,350,932 UART: [art] Signing Cert with AUTHO
20,352,225 UART: RITY.KEYID = 7
22,057,584 UART: [art] Erasing AUTHORITY.KEYID = 7
22,059,097 UART: [art] PUB.X = CBE5EF18128E2758FE03C789C51C2D7A277558A3AACA0AA8959FC3D9AA02BB05E931A0E728E8A7AD8CE98290CC31F458
22,066,413 UART: [art] PUB.Y = E7EA014C18F84B3694296990A3802A35471047B658071D3B52D5A4E444309CABAD5CED155A49417B117096B13E13F17B
22,073,600 UART: [art] SIG.R = 30BB71F19441A8DABDD0B3C8E9C160309F4BE007F0A5D70EEA129EBB2D1909B61AA1957B758A2F880E1C25A7C9E59010
22,080,990 UART: [art] SIG.S = 231599E350CAB7EFD374DB511815FA705A007F3612109E7DBD02CE882F6879ED20E4069665BA63D365C9D818F87048C9
23,059,695 UART: Caliptra RT
23,060,413 UART: [state] CFI Enabled
23,349,175 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
191,535 UART:
191,897 UART: Running Caliptra ROM ...
193,088 UART:
193,250 UART: [state] CFI Enabled
264,609 UART: [state] LifecycleState = Production
266,345 UART: [state] DebugLocked = Yes
268,775 UART: [state] Starting the WD Timer 40000000 cycles
273,096 UART: [kat] SHA2-256
452,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,838 UART: [kat] ++
464,287 UART: [kat] sha1
474,687 UART: [kat] SHA2-256
477,691 UART: [kat] SHA2-384
485,100 UART: [kat] SHA2-512-ACC
488,046 UART: [kat] ECC-384
2,946,839 UART: [kat] HMAC-384Kdf
2,969,829 UART: [kat] LMS
3,499,349 UART: [kat] --
3,503,863 UART: [cold-reset] ++
3,505,083 UART: [fht] FHT @ 0x50003400
3,515,135 UART: [idev] ++
3,515,691 UART: [idev] CDI.KEYID = 6
3,516,576 UART: [idev] SUBJECT.KEYID = 7
3,517,766 UART: [idev] UDS.KEYID = 0
3,518,810 ready_for_fw is high
3,519,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,957 UART: [idev] Erasing UDS.KEYID = 0
6,025,063 UART: [idev] Sha1 KeyId Algorithm
6,047,103 UART: [idev] --
6,049,937 UART: [ldev] ++
6,050,520 UART: [ldev] CDI.KEYID = 6
6,051,434 UART: [ldev] SUBJECT.KEYID = 5
6,052,617 UART: [ldev] AUTHORITY.KEYID = 7
6,053,856 UART: [ldev] FE.KEYID = 1
6,096,152 UART: [ldev] Erasing FE.KEYID = 1
8,599,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,782 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,353,776 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,369,576 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,385,513 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,406,657 UART: [ldev] --
10,411,162 UART: [fwproc] Wait for Commands...
10,413,413 UART: [fwproc] Recv command 0x46574c44
10,415,449 UART: [fwproc] Recv'd Img size: 114448 bytes
13,851,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,750 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,997,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,316,080 >>> mbox cmd response: success
14,320,011 UART: [afmc] ++
14,320,623 UART: [afmc] CDI.KEYID = 6
14,321,508 UART: [afmc] SUBJECT.KEYID = 7
14,322,613 UART: [afmc] AUTHORITY.KEYID = 5
16,846,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,568,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,570,598 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,586,579 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,602,486 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,618,241 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,641,625 UART: [afmc] --
18,644,825 UART: [cold-reset] --
18,648,038 UART: [state] Locking Datavault
18,654,579 UART: [state] Locking PCR0, PCR1 and PCR31
18,656,221 UART: [state] Locking ICCM
18,657,269 UART: [exit] Launching FMC @ 0x40000130
18,665,683 UART:
18,665,928 UART: Running Caliptra FMC ...
18,667,030 UART:
18,667,190 UART: [state] CFI Enabled
18,727,464 UART: [fht] FMC Alias Private Key: 7
20,491,354 UART: [art] Extend RT PCRs Done
20,492,557 UART: [art] Lock RT PCRs Done
20,494,286 UART: [art] Populate DV Done
20,499,692 UART: [fht] FMC Alias Private Key: 7
20,501,439 UART: [art] Derive CDI
20,502,254 UART: [art] Store in in slot 0x4
20,560,096 UART: [art] Derive Key Pair
20,561,140 UART: [art] Store priv key in slot 0x5
23,023,709 UART: [art] Derive Key Pair - Done
23,037,082 UART: [art] Signing Cert with AUTHO
23,038,381 UART: RITY.KEYID = 7
24,750,371 UART: [art] Erasing AUTHORITY.KEYID = 7
24,751,855 UART: [art] PUB.X = 0E76EEB50430A6A0276B8FBE9A77C97E79754B44A0EBC5A0048CFA33B2E036FB6D282DC5035615B29795D553C8C4E566
24,759,093 UART: [art] PUB.Y = 7A754D5F3BEF5E9168A0641DB640E7C88E9AF7164F807D07C23D6F04A6D2468BE938BD96FD40EA68559C134046577B05
24,766,380 UART: [art] SIG.R = A8AB7D66D752DF85850DF14594C4FF25C65DFDB611381DBCBD3D6E1F0E9859B4D6D81F15C232ED40AC95BBF80E99667D
24,773,806 UART: [art] SIG.S = F87C1055A0AC208B25B9D7A7BC63741D310D5499FDD25063F7A3F273689D6D583BDB25221D92580E9F1C80FCC85EAD7C
25,752,249 UART: Caliptra RT
25,752,963 UART: [state] CFI Enabled
25,916,906 UART: [rt] RT listening for mailbox commands...
Initializing fuses
999 UART:
1,243 UART: Running Caliptra ROM ...
2,347 UART:
2,504 UART: [state] CFI Enabled
66,233 UART: [state] LifecycleState = Production
67,996 UART: [state] DebugLocked = Yes
69,577 UART: [state] Starting the WD Timer 40000000 cycles
74,591 UART: [kat] SHA2-256
253,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,291 UART: [kat] ++
265,818 UART: [kat] sha1
276,111 UART: [kat] SHA2-256
279,115 UART: [kat] SHA2-384
285,200 UART: [kat] SHA2-512-ACC
288,184 UART: [kat] ECC-384
2,748,882 UART: [kat] HMAC-384Kdf
2,772,922 UART: [kat] LMS
3,302,439 UART: [kat] --
3,307,744 UART: [warm-reset] ++
3,312,046 UART: [warm-reset] --
3,314,668 UART: [state] Locking Datavault
3,317,060 UART: [state] Locking PCR0, PCR1 and PCR31
3,318,714 UART: [state] Locking ICCM
3,321,211 UART: [exit] Launching FMC @ 0x40000130
3,329,670 UART:
3,329,946 UART: Running Caliptra FMC ...
3,331,057 UART:
3,331,224 UART: [state] CFI Enabled
3,382,944 UART: [aliasrt :skip pcr extension
3,384,198 UART: [art] Extend RT PCRs Done
3,385,338 UART: [art] Lock RT PCRs Done
3,386,782 UART: [art] Populate DV Done
3,392,189 UART: [fht] FMC Alias Private Key: 7
3,393,778 UART: [art] Derive CDI
3,394,592 UART: [art] Store in in slot 0x4
3,451,632 UART: [art] Derive Key Pair
3,452,670 UART: [art] Store priv key in slot 0x5
5,916,136 UART: [art] Derive Key Pair - Done
5,928,801 UART: [art] Signing Cert with AUTHO
5,930,117 UART: RITY.KEYID = 7
7,641,982 UART: [art] Erasing AUTHORITY.KEYID = 7
7,643,519 UART: [art] PUB.X = 0E76EEB50430A6A0276B8FBE9A77C97E79754B44A0EBC5A0048CFA33B2E036FB6D282DC5035615B29795D553C8C4E566
7,650,761 UART: [art] PUB.Y = 7A754D5F3BEF5E9168A0641DB640E7C88E9AF7164F807D07C23D6F04A6D2468BE938BD96FD40EA68559C134046577B05
7,657,975 UART: [art] SIG.R = A8AB7D66D752DF85850DF14594C4FF25C65DFDB611381DBCBD3D6E1F0E9859B4D6D81F15C232ED40AC95BBF80E99667D
7,665,380 UART: [art] SIG.S = F87C1055A0AC208B25B9D7A7BC63741D310D5499FDD25063F7A3F273689D6D583BDB25221D92580E9F1C80FCC85EAD7C
8,644,690 UART: Caliptra RT
8,645,377 UART: [state] CFI Enabled
8,982,775 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
191,808 UART:
192,180 UART: Running Caliptra ROM ...
193,363 UART:
603,078 UART: [state] CFI Enabled
617,103 UART: [state] LifecycleState = Production
618,859 UART: [state] DebugLocked = Yes
621,798 UART: [state] Starting the WD Timer 40000000 cycles
626,624 UART: [kat] SHA2-256
805,752 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,291 UART: [kat] ++
817,815 UART: [kat] sha1
829,992 UART: [kat] SHA2-256
832,988 UART: [kat] SHA2-384
837,861 UART: [kat] SHA2-512-ACC
840,794 UART: [kat] ECC-384
3,282,303 UART: [kat] HMAC-384Kdf
3,294,253 UART: [kat] LMS
3,823,787 UART: [kat] --
3,826,508 UART: [cold-reset] ++
3,827,572 UART: [fht] FHT @ 0x50003400
3,838,181 UART: [idev] ++
3,838,747 UART: [idev] CDI.KEYID = 6
3,839,653 UART: [idev] SUBJECT.KEYID = 7
3,840,815 UART: [idev] UDS.KEYID = 0
3,841,859 ready_for_fw is high
3,842,063 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,862 UART: [idev] Erasing UDS.KEYID = 0
6,318,067 UART: [idev] Sha1 KeyId Algorithm
6,341,321 UART: [idev] --
6,343,871 UART: [ldev] ++
6,344,440 UART: [ldev] CDI.KEYID = 6
6,345,393 UART: [ldev] SUBJECT.KEYID = 5
6,346,596 UART: [ldev] AUTHORITY.KEYID = 7
6,347,818 UART: [ldev] FE.KEYID = 1
6,357,371 UART: [ldev] Erasing FE.KEYID = 1
8,829,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,355 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,564,349 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,580,163 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,596,097 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,616,485 UART: [ldev] --
10,621,485 UART: [fwproc] Wait for Commands...
10,624,484 UART: [fwproc] Recv command 0x46574c44
10,626,587 UART: [fwproc] Recv'd Img size: 114448 bytes
14,065,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,143,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,212,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,530,724 >>> mbox cmd response: success
14,534,268 UART: [afmc] ++
14,534,876 UART: [afmc] CDI.KEYID = 6
14,535,786 UART: [afmc] SUBJECT.KEYID = 7
14,536,940 UART: [afmc] AUTHORITY.KEYID = 5
17,036,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,758,521 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,760,433 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,776,425 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,792,262 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,807,972 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,831,385 UART: [afmc] --
18,835,552 UART: [cold-reset] --
18,838,328 UART: [state] Locking Datavault
18,845,642 UART: [state] Locking PCR0, PCR1 and PCR31
18,847,357 UART: [state] Locking ICCM
18,848,948 UART: [exit] Launching FMC @ 0x40000130
18,857,343 UART:
18,857,569 UART: Running Caliptra FMC ...
18,858,586 UART:
18,858,725 UART: [state] CFI Enabled
18,866,994 UART: [fht] FMC Alias Private Key: 7
20,623,198 UART: [art] Extend RT PCRs Done
20,624,416 UART: [art] Lock RT PCRs Done
20,626,170 UART: [art] Populate DV Done
20,631,306 UART: [fht] FMC Alias Private Key: 7
20,633,010 UART: [art] Derive CDI
20,633,819 UART: [art] Store in in slot 0x4
20,676,565 UART: [art] Derive Key Pair
20,677,550 UART: [art] Store priv key in slot 0x5
23,104,561 UART: [art] Derive Key Pair - Done
23,117,660 UART: [art] Signing Cert with AUTHO
23,118,949 UART: RITY.KEYID = 7
24,824,180 UART: [art] Erasing AUTHORITY.KEYID = 7
24,825,678 UART: [art] PUB.X = 11F04BC25EE86D38EF6D7F02A02D65E9C952D29CBD2421F0B80855D92A21292D12F70C3198C532E01B214622AFAB9670
24,832,916 UART: [art] PUB.Y = 08AF4EC108A38575FA941298EF83590897B71706977E9EF26F4ADF697DF06F7AD4DAC79659BFE230FEF62D870A53F874
24,840,195 UART: [art] SIG.R = 3D0D875D007CCF6C0B1BD32BFC1AE31D11D99CD2DAFC9B8B8B1F76F9F42C3BC99E755163973C9AC37940292950F24AF1
24,847,589 UART: [art] SIG.S = DEB145F83D616E04D38F368A0559EC205694A7228FDDAB5FC5B243C28DE30D6C5781C0C921A18B4327AF2FF6786A73E2
25,826,317 UART: Caliptra RT
25,827,027 UART: [state] CFI Enabled
25,944,795 UART: [rt] RT listening for mailbox commands...
Initializing fuses
998 UART:
1,142 UART: Running Caliptra ROM ...
2,179 UART:
14,585,609 UART: [state] CFI Enabled
14,596,906 UART: [state] LifecycleState = Production
14,598,677 UART: [state] DebugLocked = Yes
14,600,503 UART: [state] Starting the WD Timer 40000000 cycles
14,606,204 UART: [kat] SHA2-256
14,785,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,796,899 UART: [kat] ++
14,797,351 UART: [kat] sha1
14,807,634 UART: [kat] SHA2-256
14,810,642 UART: [kat] SHA2-384
14,817,490 UART: [kat] SHA2-512-ACC
14,820,440 UART: [kat] ECC-384
17,260,776 UART: [kat] HMAC-384Kdf
17,273,335 UART: [kat] LMS
17,802,881 UART: [kat] --
17,806,488 UART: [warm-reset] ++
17,812,730 UART: [warm-reset] --
17,816,929 UART: [state] Locking Datavault
17,820,825 UART: [state] Locking PCR0, PCR1 and PCR31
17,822,517 UART: [state] Locking ICCM
17,824,767 UART: [exit] Launching FMC @ 0x40000130
17,833,155 UART:
17,833,383 UART: Running Caliptra FMC ...
17,834,474 UART:
17,834,637 UART: [state] CFI Enabled
17,836,586 UART: [aliasrt :skip pcr extension
17,837,829 UART: [art] Extend RT PCRs Done
17,838,958 UART: [art] Lock RT PCRs Done
17,840,020 UART: [art] Populate DV Done
17,845,533 UART: [fht] FMC Alias Private Key: 7
17,847,115 UART: [art] Derive CDI
17,847,924 UART: [art] Store in in slot 0x4
17,890,146 UART: [art] Derive Key Pair
17,891,203 UART: [art] Store priv key in slot 0x5
20,318,115 UART: [art] Derive Key Pair - Done
20,331,218 UART: [art] Signing Cert with AUTHO
20,332,515 UART: RITY.KEYID = 7
22,038,137 UART: [art] Erasing AUTHORITY.KEYID = 7
22,039,641 UART: [art] PUB.X = 11F04BC25EE86D38EF6D7F02A02D65E9C952D29CBD2421F0B80855D92A21292D12F70C3198C532E01B214622AFAB9670
22,046,912 UART: [art] PUB.Y = 08AF4EC108A38575FA941298EF83590897B71706977E9EF26F4ADF697DF06F7AD4DAC79659BFE230FEF62D870A53F874
22,054,153 UART: [art] SIG.R = 3D0D875D007CCF6C0B1BD32BFC1AE31D11D99CD2DAFC9B8B8B1F76F9F42C3BC99E755163973C9AC37940292950F24AF1
22,061,547 UART: [art] SIG.S = DEB145F83D616E04D38F368A0559EC205694A7228FDDAB5FC5B243C28DE30D6C5781C0C921A18B4327AF2FF6786A73E2
23,040,725 UART: Caliptra RT
23,041,441 UART: [state] CFI Enabled
23,332,609 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Production
85,625 UART: [state] DebugLocked = Yes
86,255 UART: [state] Starting the WD Timer 40000000 cycles
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,370 UART: [kat] SHA2-512-ACC
906,271 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,413 UART: [cold-reset] ++
1,169,886 UART: [fht] FHT @ 0x50003400
1,172,616 UART: [idev] ++
1,172,784 UART: [idev] CDI.KEYID = 6
1,173,145 UART: [idev] SUBJECT.KEYID = 7
1,173,570 UART: [idev] UDS.KEYID = 0
1,173,916 ready_for_fw is high
1,173,916 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,505 UART: [idev] Erasing UDS.KEYID = 0
1,198,746 UART: [idev] Sha1 KeyId Algorithm
1,207,845 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,542 UART: [ldev] Erasing FE.KEYID = 1
1,241,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,361 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,055 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,925 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,631 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,931 UART: [ldev] --
1,281,249 UART: [fwproc] Wait for Commands...
1,282,030 UART: [fwproc] Recv command 0x46574c44
1,282,763 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,511 >>> mbox cmd response: success
2,800,733 UART: [afmc] ++
2,800,901 UART: [afmc] CDI.KEYID = 6
2,801,264 UART: [afmc] SUBJECT.KEYID = 7
2,801,690 UART: [afmc] AUTHORITY.KEYID = 5
2,836,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,802 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,521 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,414 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,121 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,140 UART: [afmc] --
2,880,209 UART: [cold-reset] --
2,880,985 UART: [state] Locking Datavault
2,882,170 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,774 UART: [state] Locking ICCM
2,883,352 UART: [exit] Launching FMC @ 0x40000130
2,888,681 UART:
2,888,697 UART: Running Caliptra FMC ...
2,889,105 UART:
2,889,159 UART: [state] CFI Enabled
2,899,456 UART: [fht] FMC Alias Private Key: 7
3,006,883 UART: [art] Extend RT PCRs Done
3,007,311 UART: [art] Lock RT PCRs Done
3,009,215 UART: [art] Populate DV Done
3,017,341 UART: [fht] FMC Alias Private Key: 7
3,018,453 UART: [art] Derive CDI
3,018,733 UART: [art] Store in in slot 0x4
3,104,236 UART: [art] Derive Key Pair
3,104,596 UART: [art] Store priv key in slot 0x5
3,117,786 UART: [art] Derive Key Pair - Done
3,132,915 UART: [art] Signing Cert with AUTHO
3,133,395 UART: RITY.KEYID = 7
3,148,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,298 UART: [art] PUB.X = 7A8B8903B8D7E5AD61710BA61726F1C51DCFEB806C5A6FA481F6C809230D520AE8FD327C9FAE4B1F193D967D96D0B518
3,156,065 UART: [art] PUB.Y = A311879F879C104942D5FCAF8E65A075A999AA460BE65A1D3AE4DAE104711A89D0CEE8FE89C4ED676191C0CC7F8532EF
3,163,023 UART: [art] SIG.R = 5CCA85232E587825CE1B203741A404C748B3B7D2FFF3009FDF2C61C2350C162CD670019C881E0C2060A1180410C3BF80
3,169,754 UART: [art] SIG.S = C544E5956E14C3CF0B6AA9D5AD4850C0A2E391CA43FF7785CD974B9A8822DB7ABF8E7CBBB86B533771BEED483A4D1B77
3,193,682 UART: Caliptra RT
3,193,935 UART: [state] CFI Enabled
3,302,380 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,136 UART:
3,303,152 UART: Running Caliptra ROM ...
3,303,560 UART:
3,303,615 UART: [state] CFI Enabled
3,306,288 UART: [state] LifecycleState = Production
3,306,896 UART: [state] DebugLocked = Yes
3,307,498 UART: [state] Starting the WD Timer 40000000 cycles
3,308,975 UART: [kat] SHA2-256
4,112,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,654 UART: [kat] ++
4,116,806 UART: [kat] sha1
4,121,030 UART: [kat] SHA2-256
4,122,970 UART: [kat] SHA2-384
4,125,819 UART: [kat] SHA2-512-ACC
4,127,720 UART: [kat] ECC-384
4,137,505 UART: [kat] HMAC-384Kdf
4,142,055 UART: [kat] LMS
4,390,367 UART: [kat] --
4,391,037 UART: [warm-reset] ++
4,391,816 UART: [warm-reset] --
4,392,761 UART: [state] Locking Datavault
4,393,591 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,195 UART: [state] Locking ICCM
4,394,765 UART: [exit] Launching FMC @ 0x40000130
4,400,094 UART:
4,400,110 UART: Running Caliptra FMC ...
4,400,518 UART:
4,400,572 UART: [state] CFI Enabled
4,401,763 UART: [aliasrt :skip pcr extension
4,402,236 UART: [art] Extend RT PCRs Done
4,402,664 UART: [art] Lock RT PCRs Done
4,403,887 UART: [art] Populate DV Done
4,412,139 UART: [fht] FMC Alias Private Key: 7
4,413,143 UART: [art] Derive CDI
4,413,423 UART: [art] Store in in slot 0x4
4,498,826 UART: [art] Derive Key Pair
4,499,186 UART: [art] Store priv key in slot 0x5
4,512,392 UART: [art] Derive Key Pair - Done
4,527,389 UART: [art] Signing Cert with AUTHO
4,527,869 UART: RITY.KEYID = 7
4,543,315 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,080 UART: [art] PUB.X = 7A8B8903B8D7E5AD61710BA61726F1C51DCFEB806C5A6FA481F6C809230D520AE8FD327C9FAE4B1F193D967D96D0B518
4,550,847 UART: [art] PUB.Y = A311879F879C104942D5FCAF8E65A075A999AA460BE65A1D3AE4DAE104711A89D0CEE8FE89C4ED676191C0CC7F8532EF
4,557,805 UART: [art] SIG.R = 5CCA85232E587825CE1B203741A404C748B3B7D2FFF3009FDF2C61C2350C162CD670019C881E0C2060A1180410C3BF80
4,564,536 UART: [art] SIG.S = C544E5956E14C3CF0B6AA9D5AD4850C0A2E391CA43FF7785CD974B9A8822DB7ABF8E7CBBB86B533771BEED483A4D1B77
4,588,706 UART: Caliptra RT
4,588,959 UART: [state] CFI Enabled
4,871,758 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,497 UART: [state] LifecycleState = Production
85,105 UART: [state] DebugLocked = Yes
85,789 UART: [state] Starting the WD Timer 40000000 cycles
87,272 UART: [kat] SHA2-256
890,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,951 UART: [kat] ++
895,103 UART: [kat] sha1
899,267 UART: [kat] SHA2-256
901,207 UART: [kat] SHA2-384
903,768 UART: [kat] SHA2-512-ACC
905,669 UART: [kat] ECC-384
914,942 UART: [kat] HMAC-384Kdf
919,454 UART: [kat] LMS
1,167,766 UART: [kat] --
1,168,681 UART: [cold-reset] ++
1,169,060 UART: [fht] FHT @ 0x50003400
1,171,808 UART: [idev] ++
1,171,976 UART: [idev] CDI.KEYID = 6
1,172,337 UART: [idev] SUBJECT.KEYID = 7
1,172,762 UART: [idev] UDS.KEYID = 0
1,173,108 ready_for_fw is high
1,173,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,545 UART: [idev] Erasing UDS.KEYID = 0
1,197,156 UART: [idev] Sha1 KeyId Algorithm
1,206,169 UART: [idev] --
1,207,204 UART: [ldev] ++
1,207,372 UART: [ldev] CDI.KEYID = 6
1,207,736 UART: [ldev] SUBJECT.KEYID = 5
1,208,163 UART: [ldev] AUTHORITY.KEYID = 7
1,208,626 UART: [ldev] FE.KEYID = 1
1,213,900 UART: [ldev] Erasing FE.KEYID = 1
1,240,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,023 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,717 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,587 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,293 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,215 UART: [ldev] --
1,279,529 UART: [fwproc] Wait for Commands...
1,280,192 UART: [fwproc] Recv command 0x46574c44
1,280,925 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,515 >>> mbox cmd response: success
2,799,681 UART: [afmc] ++
2,799,849 UART: [afmc] CDI.KEYID = 6
2,800,212 UART: [afmc] SUBJECT.KEYID = 7
2,800,638 UART: [afmc] AUTHORITY.KEYID = 5
2,836,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,714 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,433 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,326 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,033 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,886 UART: [afmc] --
2,879,919 UART: [cold-reset] --
2,880,939 UART: [state] Locking Datavault
2,882,228 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,832 UART: [state] Locking ICCM
2,883,318 UART: [exit] Launching FMC @ 0x40000130
2,888,647 UART:
2,888,663 UART: Running Caliptra FMC ...
2,889,071 UART:
2,889,125 UART: [state] CFI Enabled
2,899,830 UART: [fht] FMC Alias Private Key: 7
3,007,397 UART: [art] Extend RT PCRs Done
3,007,825 UART: [art] Lock RT PCRs Done
3,009,367 UART: [art] Populate DV Done
3,017,691 UART: [fht] FMC Alias Private Key: 7
3,018,851 UART: [art] Derive CDI
3,019,131 UART: [art] Store in in slot 0x4
3,104,816 UART: [art] Derive Key Pair
3,105,176 UART: [art] Store priv key in slot 0x5
3,118,322 UART: [art] Derive Key Pair - Done
3,133,195 UART: [art] Signing Cert with AUTHO
3,133,675 UART: RITY.KEYID = 7
3,148,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,378 UART: [art] PUB.X = 79398BEFD8B1D866E80473068ECE3BB5BB0FA1F943CC0488E080365AF33501B0AD1E3FCE874E4B7BAACB8166A6942527
3,156,145 UART: [art] PUB.Y = D9AEB457784C9C5F99553EF93BC0E5AC16571DED0436D769DF482FC6E403AD1CE7858D9B636C4191B6D0EB84461AB8D2
3,163,101 UART: [art] SIG.R = 96110B425583F81A09E93E03E5EDA6FCC6AF6E656244FFDD2BB38F764CC0B1794E829B099B5016810EBCE4F03E3E434F
3,169,866 UART: [art] SIG.S = 6260D908308CEF3457E1431FB13A1BF648D0330EBEC78DFB8D3935BE8722515657920B702D6256CCA1F4D4A4331DEF46
3,194,240 UART: Caliptra RT
3,194,493 UART: [state] CFI Enabled
3,302,162 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,918 UART:
3,302,934 UART: Running Caliptra ROM ...
3,303,342 UART:
3,303,397 UART: [state] CFI Enabled
3,305,818 UART: [state] LifecycleState = Production
3,306,426 UART: [state] DebugLocked = Yes
3,307,178 UART: [state] Starting the WD Timer 40000000 cycles
3,308,701 UART: [kat] SHA2-256
4,112,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,380 UART: [kat] ++
4,116,532 UART: [kat] sha1
4,120,962 UART: [kat] SHA2-256
4,122,902 UART: [kat] SHA2-384
4,125,561 UART: [kat] SHA2-512-ACC
4,127,462 UART: [kat] ECC-384
4,137,465 UART: [kat] HMAC-384Kdf
4,141,945 UART: [kat] LMS
4,390,257 UART: [kat] --
4,391,037 UART: [warm-reset] ++
4,392,002 UART: [warm-reset] --
4,392,823 UART: [state] Locking Datavault
4,393,491 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,095 UART: [state] Locking ICCM
4,394,697 UART: [exit] Launching FMC @ 0x40000130
4,400,026 UART:
4,400,042 UART: Running Caliptra FMC ...
4,400,450 UART:
4,400,504 UART: [state] CFI Enabled
4,401,717 UART: [aliasrt :skip pcr extension
4,402,190 UART: [art] Extend RT PCRs Done
4,402,618 UART: [art] Lock RT PCRs Done
4,404,129 UART: [art] Populate DV Done
4,412,199 UART: [fht] FMC Alias Private Key: 7
4,413,313 UART: [art] Derive CDI
4,413,593 UART: [art] Store in in slot 0x4
4,499,224 UART: [art] Derive Key Pair
4,499,584 UART: [art] Store priv key in slot 0x5
4,512,958 UART: [art] Derive Key Pair - Done
4,527,561 UART: [art] Signing Cert with AUTHO
4,528,041 UART: RITY.KEYID = 7
4,543,409 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,174 UART: [art] PUB.X = 79398BEFD8B1D866E80473068ECE3BB5BB0FA1F943CC0488E080365AF33501B0AD1E3FCE874E4B7BAACB8166A6942527
4,550,941 UART: [art] PUB.Y = D9AEB457784C9C5F99553EF93BC0E5AC16571DED0436D769DF482FC6E403AD1CE7858D9B636C4191B6D0EB84461AB8D2
4,557,897 UART: [art] SIG.R = 96110B425583F81A09E93E03E5EDA6FCC6AF6E656244FFDD2BB38F764CC0B1794E829B099B5016810EBCE4F03E3E434F
4,564,662 UART: [art] SIG.S = 6260D908308CEF3457E1431FB13A1BF648D0330EBEC78DFB8D3935BE8722515657920B702D6256CCA1F4D4A4331DEF46
4,588,274 UART: Caliptra RT
4,588,527 UART: [state] CFI Enabled
4,869,612 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Production
86,166 UART: [state] DebugLocked = Yes
86,796 UART: [state] Starting the WD Timer 40000000 cycles
88,469 UART: [kat] SHA2-256
892,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,148 UART: [kat] ++
896,300 UART: [kat] sha1
900,590 UART: [kat] SHA2-256
902,530 UART: [kat] SHA2-384
905,329 UART: [kat] SHA2-512-ACC
907,230 UART: [kat] ECC-384
917,353 UART: [kat] HMAC-384Kdf
921,925 UART: [kat] LMS
1,170,237 UART: [kat] --
1,171,074 UART: [cold-reset] ++
1,171,605 UART: [fht] FHT @ 0x50003400
1,174,309 UART: [idev] ++
1,174,477 UART: [idev] CDI.KEYID = 6
1,174,838 UART: [idev] SUBJECT.KEYID = 7
1,175,263 UART: [idev] UDS.KEYID = 0
1,175,609 ready_for_fw is high
1,175,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,114 UART: [idev] Erasing UDS.KEYID = 0
1,199,847 UART: [idev] Sha1 KeyId Algorithm
1,208,792 UART: [idev] --
1,209,847 UART: [ldev] ++
1,210,015 UART: [ldev] CDI.KEYID = 6
1,210,379 UART: [ldev] SUBJECT.KEYID = 5
1,210,806 UART: [ldev] AUTHORITY.KEYID = 7
1,211,269 UART: [ldev] FE.KEYID = 1
1,216,403 UART: [ldev] Erasing FE.KEYID = 1
1,242,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,064 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,758 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,628 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,334 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,236 UART: [ldev] --
1,281,606 UART: [fwproc] Wait for Commands...
1,282,199 UART: [fwproc] Recv command 0x46574c44
1,282,932 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,220 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,498 >>> mbox cmd response: success
2,801,536 UART: [afmc] ++
2,801,704 UART: [afmc] CDI.KEYID = 6
2,802,067 UART: [afmc] SUBJECT.KEYID = 7
2,802,493 UART: [afmc] AUTHORITY.KEYID = 5
2,838,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,673 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,392 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,285 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,992 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,865 UART: [afmc] --
2,881,854 UART: [cold-reset] --
2,882,888 UART: [state] Locking Datavault
2,883,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,531 UART: [state] Locking ICCM
2,885,093 UART: [exit] Launching FMC @ 0x40000130
2,890,422 UART:
2,890,438 UART: Running Caliptra FMC ...
2,890,846 UART:
2,890,989 UART: [state] CFI Enabled
2,901,546 UART: [fht] FMC Alias Private Key: 7
3,009,395 UART: [art] Extend RT PCRs Done
3,009,823 UART: [art] Lock RT PCRs Done
3,011,141 UART: [art] Populate DV Done
3,019,205 UART: [fht] FMC Alias Private Key: 7
3,020,213 UART: [art] Derive CDI
3,020,493 UART: [art] Store in in slot 0x4
3,105,810 UART: [art] Derive Key Pair
3,106,170 UART: [art] Store priv key in slot 0x5
3,119,834 UART: [art] Derive Key Pair - Done
3,134,324 UART: [art] Signing Cert with AUTHO
3,134,804 UART: RITY.KEYID = 7
3,149,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,375 UART: [art] PUB.X = CEA2B3BE803F72E64EC53416923E3DD1BEF9A513EA5E5DB231613AD836E2AF6E407EEB21F9EA8DF7DD86242D606DCD23
3,157,167 UART: [art] PUB.Y = EFE0D7A10580793A94C1B297FFC4041D4D8C005BFE5873D90C59F0E14E5DC75ACE6E9B13FF833A1AB9A07AB0A0BF1E3C
3,164,108 UART: [art] SIG.R = 874AE33DE38108DD16D6AEDEB553ACCA7422796ADC051BC47486CD25413B821D2C910DC8E89192F91D6B1615C4C519C8
3,170,877 UART: [art] SIG.S = 6F9072245373DECCBE1D2F39086D892CAFAE545DF723CBC1B829A42336A7A02EB484B9232C0986C9E4339A865C7E816F
3,194,812 UART: Caliptra RT
3,195,157 UART: [state] CFI Enabled
3,303,424 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,180 UART:
3,304,196 UART: Running Caliptra ROM ...
3,304,604 UART:
3,304,746 UART: [state] CFI Enabled
3,307,435 UART: [state] LifecycleState = Production
3,308,043 UART: [state] DebugLocked = Yes
3,308,697 UART: [state] Starting the WD Timer 40000000 cycles
3,310,230 UART: [kat] SHA2-256
4,113,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,909 UART: [kat] ++
4,118,061 UART: [kat] sha1
4,122,409 UART: [kat] SHA2-256
4,124,349 UART: [kat] SHA2-384
4,127,006 UART: [kat] SHA2-512-ACC
4,128,907 UART: [kat] ECC-384
4,138,884 UART: [kat] HMAC-384Kdf
4,143,650 UART: [kat] LMS
4,391,962 UART: [kat] --
4,392,940 UART: [warm-reset] ++
4,393,977 UART: [warm-reset] --
4,395,024 UART: [state] Locking Datavault
4,395,786 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,390 UART: [state] Locking ICCM
4,396,898 UART: [exit] Launching FMC @ 0x40000130
4,402,227 UART:
4,402,243 UART: Running Caliptra FMC ...
4,402,651 UART:
4,402,794 UART: [state] CFI Enabled
4,404,073 UART: [aliasrt :skip pcr extension
4,404,546 UART: [art] Extend RT PCRs Done
4,404,974 UART: [art] Lock RT PCRs Done
4,406,273 UART: [art] Populate DV Done
4,414,387 UART: [fht] FMC Alias Private Key: 7
4,415,467 UART: [art] Derive CDI
4,415,747 UART: [art] Store in in slot 0x4
4,501,432 UART: [art] Derive Key Pair
4,501,792 UART: [art] Store priv key in slot 0x5
4,515,100 UART: [art] Derive Key Pair - Done
4,529,960 UART: [art] Signing Cert with AUTHO
4,530,440 UART: RITY.KEYID = 7
4,545,928 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,693 UART: [art] PUB.X = CEA2B3BE803F72E64EC53416923E3DD1BEF9A513EA5E5DB231613AD836E2AF6E407EEB21F9EA8DF7DD86242D606DCD23
4,553,485 UART: [art] PUB.Y = EFE0D7A10580793A94C1B297FFC4041D4D8C005BFE5873D90C59F0E14E5DC75ACE6E9B13FF833A1AB9A07AB0A0BF1E3C
4,560,426 UART: [art] SIG.R = 874AE33DE38108DD16D6AEDEB553ACCA7422796ADC051BC47486CD25413B821D2C910DC8E89192F91D6B1615C4C519C8
4,567,195 UART: [art] SIG.S = 6F9072245373DECCBE1D2F39086D892CAFAE545DF723CBC1B829A42336A7A02EB484B9232C0986C9E4339A865C7E816F
4,591,214 UART: Caliptra RT
4,591,559 UART: [state] CFI Enabled
4,872,818 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Production
86,052 UART: [state] DebugLocked = Yes
86,648 UART: [state] Starting the WD Timer 40000000 cycles
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,864 UART: [kat] ++
896,016 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,567 UART: [kat] SHA2-512-ACC
906,468 UART: [kat] ECC-384
915,869 UART: [kat] HMAC-384Kdf
920,449 UART: [kat] LMS
1,168,761 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,603 UART: [idev] ++
1,172,771 UART: [idev] CDI.KEYID = 6
1,173,132 UART: [idev] SUBJECT.KEYID = 7
1,173,557 UART: [idev] UDS.KEYID = 0
1,173,903 ready_for_fw is high
1,173,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,340 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,207,008 UART: [idev] --
1,207,985 UART: [ldev] ++
1,208,153 UART: [ldev] CDI.KEYID = 6
1,208,517 UART: [ldev] SUBJECT.KEYID = 5
1,208,944 UART: [ldev] AUTHORITY.KEYID = 7
1,209,407 UART: [ldev] FE.KEYID = 1
1,214,609 UART: [ldev] Erasing FE.KEYID = 1
1,241,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,590 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,284 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,154 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,860 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,964 UART: [ldev] --
1,280,266 UART: [fwproc] Wait for Commands...
1,280,973 UART: [fwproc] Recv command 0x46574c44
1,281,706 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,797,552 >>> mbox cmd response: success
2,798,692 UART: [afmc] ++
2,798,860 UART: [afmc] CDI.KEYID = 6
2,799,223 UART: [afmc] SUBJECT.KEYID = 7
2,799,649 UART: [afmc] AUTHORITY.KEYID = 5
2,834,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,977 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,696 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,589 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,296 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,957 UART: [afmc] --
2,877,970 UART: [cold-reset] --
2,878,726 UART: [state] Locking Datavault
2,880,099 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,703 UART: [state] Locking ICCM
2,881,157 UART: [exit] Launching FMC @ 0x40000130
2,886,486 UART:
2,886,502 UART: Running Caliptra FMC ...
2,886,910 UART:
2,887,053 UART: [state] CFI Enabled
2,898,160 UART: [fht] FMC Alias Private Key: 7
3,006,273 UART: [art] Extend RT PCRs Done
3,006,701 UART: [art] Lock RT PCRs Done
3,008,473 UART: [art] Populate DV Done
3,016,875 UART: [fht] FMC Alias Private Key: 7
3,017,959 UART: [art] Derive CDI
3,018,239 UART: [art] Store in in slot 0x4
3,103,402 UART: [art] Derive Key Pair
3,103,762 UART: [art] Store priv key in slot 0x5
3,116,980 UART: [art] Derive Key Pair - Done
3,131,803 UART: [art] Signing Cert with AUTHO
3,132,283 UART: RITY.KEYID = 7
3,147,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,658 UART: [art] PUB.X = 5988672275B686B0771512EE592E9B5174F71761E2A0407340DF27D56DDB46C201BDE3ADF09715EC12B7C88A091B6AA6
3,155,420 UART: [art] PUB.Y = D7AC9B61277DA30011FDB142B2D965CD3FB70A98FD83CDA4DACF7975CA40A908F0B9D73B989E45975EBD92842B3E24E2
3,162,358 UART: [art] SIG.R = C3EDB93AB0273C4F2CE6FAFD731E8FB2384C6A7BE62AE5C6B14C5B44DDA5B3243BBD9363EA3CA6B4954A443A14B7BCDE
3,169,158 UART: [art] SIG.S = 3CBD11D4CEC1F6239CCB2C3676B67CB7AD280D4FEF5A0B559F019BFD7B508794191E8D581F8FF4FB0E7699FA5016D99C
3,193,045 UART: Caliptra RT
3,193,390 UART: [state] CFI Enabled
3,301,881 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,637 UART:
3,302,653 UART: Running Caliptra ROM ...
3,303,061 UART:
3,303,203 UART: [state] CFI Enabled
3,306,190 UART: [state] LifecycleState = Production
3,306,798 UART: [state] DebugLocked = Yes
3,307,550 UART: [state] Starting the WD Timer 40000000 cycles
3,309,131 UART: [kat] SHA2-256
4,112,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,810 UART: [kat] ++
4,116,962 UART: [kat] sha1
4,121,078 UART: [kat] SHA2-256
4,123,018 UART: [kat] SHA2-384
4,125,795 UART: [kat] SHA2-512-ACC
4,127,696 UART: [kat] ECC-384
4,137,729 UART: [kat] HMAC-384Kdf
4,142,499 UART: [kat] LMS
4,390,811 UART: [kat] --
4,391,715 UART: [warm-reset] ++
4,392,856 UART: [warm-reset] --
4,393,615 UART: [state] Locking Datavault
4,394,341 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,945 UART: [state] Locking ICCM
4,395,427 UART: [exit] Launching FMC @ 0x40000130
4,400,756 UART:
4,400,772 UART: Running Caliptra FMC ...
4,401,180 UART:
4,401,323 UART: [state] CFI Enabled
4,402,862 UART: [aliasrt :skip pcr extension
4,403,335 UART: [art] Extend RT PCRs Done
4,403,763 UART: [art] Lock RT PCRs Done
4,404,742 UART: [art] Populate DV Done
4,413,092 UART: [fht] FMC Alias Private Key: 7
4,414,210 UART: [art] Derive CDI
4,414,490 UART: [art] Store in in slot 0x4
4,500,225 UART: [art] Derive Key Pair
4,500,585 UART: [art] Store priv key in slot 0x5
4,513,833 UART: [art] Derive Key Pair - Done
4,528,620 UART: [art] Signing Cert with AUTHO
4,529,100 UART: RITY.KEYID = 7
4,544,682 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,447 UART: [art] PUB.X = 5988672275B686B0771512EE592E9B5174F71761E2A0407340DF27D56DDB46C201BDE3ADF09715EC12B7C88A091B6AA6
4,552,209 UART: [art] PUB.Y = D7AC9B61277DA30011FDB142B2D965CD3FB70A98FD83CDA4DACF7975CA40A908F0B9D73B989E45975EBD92842B3E24E2
4,559,147 UART: [art] SIG.R = C3EDB93AB0273C4F2CE6FAFD731E8FB2384C6A7BE62AE5C6B14C5B44DDA5B3243BBD9363EA3CA6B4954A443A14B7BCDE
4,565,947 UART: [art] SIG.S = 3CBD11D4CEC1F6239CCB2C3676B67CB7AD280D4FEF5A0B559F019BFD7B508794191E8D581F8FF4FB0E7699FA5016D99C
4,590,152 UART: Caliptra RT
4,590,497 UART: [state] CFI Enabled
4,870,854 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Production
85,731 UART: [state] DebugLocked = Yes
86,291 UART: [state] Starting the WD Timer 40000000 cycles
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,151 UART: [kat] SHA2-256
902,091 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,484 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,170,297 UART: [cold-reset] ++
1,170,834 UART: [fht] FHT @ 0x50003400
1,173,584 UART: [idev] ++
1,173,752 UART: [idev] CDI.KEYID = 6
1,174,113 UART: [idev] SUBJECT.KEYID = 7
1,174,538 UART: [idev] UDS.KEYID = 0
1,174,884 ready_for_fw is high
1,174,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,571 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,208,303 UART: [idev] --
1,209,306 UART: [ldev] ++
1,209,474 UART: [ldev] CDI.KEYID = 6
1,209,838 UART: [ldev] SUBJECT.KEYID = 5
1,210,265 UART: [ldev] AUTHORITY.KEYID = 7
1,210,728 UART: [ldev] FE.KEYID = 1
1,215,740 UART: [ldev] Erasing FE.KEYID = 1
1,241,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,269 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,963 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,833 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,539 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,719 UART: [ldev] --
1,281,037 UART: [fwproc] Wait for Commands...
1,281,808 UART: [fwproc] Recv command 0x46574c44
1,282,541 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,243 >>> mbox cmd response: success
2,800,343 UART: [afmc] ++
2,800,511 UART: [afmc] CDI.KEYID = 6
2,800,874 UART: [afmc] SUBJECT.KEYID = 7
2,801,300 UART: [afmc] AUTHORITY.KEYID = 5
2,836,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,076 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,795 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,688 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,395 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,286 UART: [afmc] --
2,880,195 UART: [cold-reset] --
2,880,877 UART: [state] Locking Datavault
2,882,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,614 UART: [state] Locking ICCM
2,883,144 UART: [exit] Launching FMC @ 0x40000130
2,888,473 UART:
2,888,489 UART: Running Caliptra FMC ...
2,888,897 UART:
2,888,951 UART: [state] CFI Enabled
2,899,076 UART: [fht] FMC Alias Private Key: 7
3,006,501 UART: [art] Extend RT PCRs Done
3,006,929 UART: [art] Lock RT PCRs Done
3,008,465 UART: [art] Populate DV Done
3,016,857 UART: [fht] FMC Alias Private Key: 7
3,017,849 UART: [art] Derive CDI
3,018,129 UART: [art] Store in in slot 0x4
3,103,906 UART: [art] Derive Key Pair
3,104,266 UART: [art] Store priv key in slot 0x5
3,117,898 UART: [art] Derive Key Pair - Done
3,132,697 UART: [art] Signing Cert with AUTHO
3,133,177 UART: RITY.KEYID = 7
3,148,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,318 UART: [art] PUB.X = 5240C22FBCA0E834CAA961BF6FAAF38A1BD1170EA92F29767F273ABC0BBBB041C5CD999DACCDCEC6ED58B8B2B7D49E36
3,156,114 UART: [art] PUB.Y = E239F823E4F978A3B840523CDDE63540935A4DD086E37E9F96C8F28387919AB416DCD9E79D9A8F8F49D76DD0C85AA458
3,163,070 UART: [art] SIG.R = 16ADD8E34277F426C7F8B4C18C3620EF219A7192FA60477E3818ECD6A33F45FEE51DE7FD74A838F2FCD58D28DBFAF495
3,169,856 UART: [art] SIG.S = E51503AC84F0F0BFCA560CB85F9B68582B6BF3266D6E0B7394FE129D39173086EBFEE390127BC33F9683E558861A72BA
3,193,426 UART: Caliptra RT
3,193,679 UART: [state] CFI Enabled
3,301,292 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,048 UART:
3,302,064 UART: Running Caliptra ROM ...
3,302,472 UART:
3,302,527 UART: [state] CFI Enabled
3,305,134 UART: [state] LifecycleState = Production
3,305,742 UART: [state] DebugLocked = Yes
3,306,294 UART: [state] Starting the WD Timer 40000000 cycles
3,307,855 UART: [kat] SHA2-256
4,111,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,534 UART: [kat] ++
4,115,686 UART: [kat] sha1
4,119,850 UART: [kat] SHA2-256
4,121,790 UART: [kat] SHA2-384
4,124,575 UART: [kat] SHA2-512-ACC
4,126,476 UART: [kat] ECC-384
4,135,995 UART: [kat] HMAC-384Kdf
4,140,427 UART: [kat] LMS
4,388,739 UART: [kat] --
4,389,293 UART: [warm-reset] ++
4,390,122 UART: [warm-reset] --
4,390,665 UART: [state] Locking Datavault
4,391,405 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,009 UART: [state] Locking ICCM
4,392,575 UART: [exit] Launching FMC @ 0x40000130
4,397,904 UART:
4,397,920 UART: Running Caliptra FMC ...
4,398,328 UART:
4,398,382 UART: [state] CFI Enabled
4,399,495 UART: [aliasrt :skip pcr extension
4,399,968 UART: [art] Extend RT PCRs Done
4,400,396 UART: [art] Lock RT PCRs Done
4,401,451 UART: [art] Populate DV Done
4,409,571 UART: [fht] FMC Alias Private Key: 7
4,410,537 UART: [art] Derive CDI
4,410,817 UART: [art] Store in in slot 0x4
4,496,330 UART: [art] Derive Key Pair
4,496,690 UART: [art] Store priv key in slot 0x5
4,509,896 UART: [art] Derive Key Pair - Done
4,525,023 UART: [art] Signing Cert with AUTHO
4,525,503 UART: RITY.KEYID = 7
4,540,679 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,444 UART: [art] PUB.X = 5240C22FBCA0E834CAA961BF6FAAF38A1BD1170EA92F29767F273ABC0BBBB041C5CD999DACCDCEC6ED58B8B2B7D49E36
4,548,240 UART: [art] PUB.Y = E239F823E4F978A3B840523CDDE63540935A4DD086E37E9F96C8F28387919AB416DCD9E79D9A8F8F49D76DD0C85AA458
4,555,196 UART: [art] SIG.R = 16ADD8E34277F426C7F8B4C18C3620EF219A7192FA60477E3818ECD6A33F45FEE51DE7FD74A838F2FCD58D28DBFAF495
4,561,982 UART: [art] SIG.S = E51503AC84F0F0BFCA560CB85F9B68582B6BF3266D6E0B7394FE129D39173086EBFEE390127BC33F9683E558861A72BA
4,585,522 UART: Caliptra RT
4,585,775 UART: [state] CFI Enabled
4,872,098 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Production
85,845 UART: [state] DebugLocked = Yes
86,591 UART: [state] Starting the WD Timer 40000000 cycles
88,174 UART: [kat] SHA2-256
891,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,853 UART: [kat] ++
896,005 UART: [kat] sha1
900,083 UART: [kat] SHA2-256
902,023 UART: [kat] SHA2-384
904,548 UART: [kat] SHA2-512-ACC
906,449 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,524 UART: [kat] LMS
1,168,836 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,230 UART: [fht] FHT @ 0x50003400
1,172,724 UART: [idev] ++
1,172,892 UART: [idev] CDI.KEYID = 6
1,173,253 UART: [idev] SUBJECT.KEYID = 7
1,173,678 UART: [idev] UDS.KEYID = 0
1,174,024 ready_for_fw is high
1,174,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,553 UART: [idev] Erasing UDS.KEYID = 0
1,198,748 UART: [idev] Sha1 KeyId Algorithm
1,207,579 UART: [idev] --
1,208,660 UART: [ldev] ++
1,208,828 UART: [ldev] CDI.KEYID = 6
1,209,192 UART: [ldev] SUBJECT.KEYID = 5
1,209,619 UART: [ldev] AUTHORITY.KEYID = 7
1,210,082 UART: [ldev] FE.KEYID = 1
1,215,198 UART: [ldev] Erasing FE.KEYID = 1
1,241,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,903 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,597 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,467 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,173 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,201 UART: [ldev] --
1,280,647 UART: [fwproc] Wait for Commands...
1,281,374 UART: [fwproc] Recv command 0x46574c44
1,282,107 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,797,363 >>> mbox cmd response: success
2,798,571 UART: [afmc] ++
2,798,739 UART: [afmc] CDI.KEYID = 6
2,799,102 UART: [afmc] SUBJECT.KEYID = 7
2,799,528 UART: [afmc] AUTHORITY.KEYID = 5
2,834,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,692 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,411 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,304 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,011 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,898 UART: [afmc] --
2,877,869 UART: [cold-reset] --
2,878,659 UART: [state] Locking Datavault
2,879,902 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,506 UART: [state] Locking ICCM
2,881,056 UART: [exit] Launching FMC @ 0x40000130
2,886,385 UART:
2,886,401 UART: Running Caliptra FMC ...
2,886,809 UART:
2,886,863 UART: [state] CFI Enabled
2,897,508 UART: [fht] FMC Alias Private Key: 7
3,004,737 UART: [art] Extend RT PCRs Done
3,005,165 UART: [art] Lock RT PCRs Done
3,006,455 UART: [art] Populate DV Done
3,014,791 UART: [fht] FMC Alias Private Key: 7
3,015,897 UART: [art] Derive CDI
3,016,177 UART: [art] Store in in slot 0x4
3,102,258 UART: [art] Derive Key Pair
3,102,618 UART: [art] Store priv key in slot 0x5
3,116,002 UART: [art] Derive Key Pair - Done
3,131,206 UART: [art] Signing Cert with AUTHO
3,131,686 UART: RITY.KEYID = 7
3,146,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,635 UART: [art] PUB.X = B3DCAA9AA1A2808981FE083C000562C2A1A381D1331A9FC2E8B88E33860ABE8F7CC8DF9FCCB86CB4B38B0540A5D70145
3,154,384 UART: [art] PUB.Y = 4C68E436A8DB788562669D08E018A5318377020246D4CA24B7C6B49B88EFEBF25F9C45FD484ACFD540028865C48FC709
3,161,319 UART: [art] SIG.R = D49B5B010794E8E41D248DCD928187E4D0C78D31B0387DC8B4D576512128958C41CE510246CA4C15CB673111665B88EA
3,168,076 UART: [art] SIG.S = D9026D1A1AC42EF109FD23FDB10D7E097749A4DE40EF6887FB1288573BEE1122334B6B645B73A6BC59ED05048741614E
3,191,645 UART: Caliptra RT
3,191,898 UART: [state] CFI Enabled
3,299,605 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,361 UART:
3,300,377 UART: Running Caliptra ROM ...
3,300,785 UART:
3,300,840 UART: [state] CFI Enabled
3,303,523 UART: [state] LifecycleState = Production
3,304,131 UART: [state] DebugLocked = Yes
3,304,723 UART: [state] Starting the WD Timer 40000000 cycles
3,306,362 UART: [kat] SHA2-256
4,109,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,041 UART: [kat] ++
4,114,193 UART: [kat] sha1
4,118,583 UART: [kat] SHA2-256
4,120,523 UART: [kat] SHA2-384
4,123,144 UART: [kat] SHA2-512-ACC
4,125,045 UART: [kat] ECC-384
4,134,924 UART: [kat] HMAC-384Kdf
4,139,528 UART: [kat] LMS
4,387,840 UART: [kat] --
4,388,928 UART: [warm-reset] ++
4,389,811 UART: [warm-reset] --
4,390,330 UART: [state] Locking Datavault
4,391,296 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,900 UART: [state] Locking ICCM
4,392,398 UART: [exit] Launching FMC @ 0x40000130
4,397,727 UART:
4,397,743 UART: Running Caliptra FMC ...
4,398,151 UART:
4,398,205 UART: [state] CFI Enabled
4,399,668 UART: [aliasrt :skip pcr extension
4,400,141 UART: [art] Extend RT PCRs Done
4,400,569 UART: [art] Lock RT PCRs Done
4,401,698 UART: [art] Populate DV Done
4,409,830 UART: [fht] FMC Alias Private Key: 7
4,410,954 UART: [art] Derive CDI
4,411,234 UART: [art] Store in in slot 0x4
4,496,743 UART: [art] Derive Key Pair
4,497,103 UART: [art] Store priv key in slot 0x5
4,510,747 UART: [art] Derive Key Pair - Done
4,525,293 UART: [art] Signing Cert with AUTHO
4,525,773 UART: RITY.KEYID = 7
4,541,179 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,944 UART: [art] PUB.X = B3DCAA9AA1A2808981FE083C000562C2A1A381D1331A9FC2E8B88E33860ABE8F7CC8DF9FCCB86CB4B38B0540A5D70145
4,548,693 UART: [art] PUB.Y = 4C68E436A8DB788562669D08E018A5318377020246D4CA24B7C6B49B88EFEBF25F9C45FD484ACFD540028865C48FC709
4,555,628 UART: [art] SIG.R = D49B5B010794E8E41D248DCD928187E4D0C78D31B0387DC8B4D576512128958C41CE510246CA4C15CB673111665B88EA
4,562,385 UART: [art] SIG.S = D9026D1A1AC42EF109FD23FDB10D7E097749A4DE40EF6887FB1288573BEE1122334B6B645B73A6BC59ED05048741614E
4,586,022 UART: Caliptra RT
4,586,275 UART: [state] CFI Enabled
4,871,786 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,670 UART: [state] LifecycleState = Production
86,278 UART: [state] DebugLocked = Yes
87,038 UART: [state] Starting the WD Timer 40000000 cycles
88,547 UART: [kat] SHA2-256
892,097 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,226 UART: [kat] ++
896,378 UART: [kat] sha1
900,620 UART: [kat] SHA2-256
902,560 UART: [kat] SHA2-384
905,339 UART: [kat] SHA2-512-ACC
907,240 UART: [kat] ECC-384
917,285 UART: [kat] HMAC-384Kdf
921,819 UART: [kat] LMS
1,170,131 UART: [kat] --
1,170,730 UART: [cold-reset] ++
1,171,147 UART: [fht] FHT @ 0x50003400
1,173,645 UART: [idev] ++
1,173,813 UART: [idev] CDI.KEYID = 6
1,174,174 UART: [idev] SUBJECT.KEYID = 7
1,174,599 UART: [idev] UDS.KEYID = 0
1,174,945 ready_for_fw is high
1,174,945 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,588 UART: [idev] Erasing UDS.KEYID = 0
1,199,919 UART: [idev] Sha1 KeyId Algorithm
1,208,834 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,295 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,493 UART: [ldev] Erasing FE.KEYID = 1
1,243,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,198 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,892 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,762 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,468 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,476 UART: [ldev] --
1,282,826 UART: [fwproc] Wait for Commands...
1,283,589 UART: [fwproc] Recv command 0x46574c44
1,284,322 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,331 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,382 >>> mbox cmd response: success
2,801,424 UART: [afmc] ++
2,801,592 UART: [afmc] CDI.KEYID = 6
2,801,955 UART: [afmc] SUBJECT.KEYID = 7
2,802,381 UART: [afmc] AUTHORITY.KEYID = 5
2,837,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,511 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,230 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,123 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,830 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,741 UART: [afmc] --
2,880,778 UART: [cold-reset] --
2,881,624 UART: [state] Locking Datavault
2,883,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,637 UART: [state] Locking ICCM
2,884,263 UART: [exit] Launching FMC @ 0x40000130
2,889,592 UART:
2,889,608 UART: Running Caliptra FMC ...
2,890,016 UART:
2,890,159 UART: [state] CFI Enabled
2,900,934 UART: [fht] FMC Alias Private Key: 7
3,008,483 UART: [art] Extend RT PCRs Done
3,008,911 UART: [art] Lock RT PCRs Done
3,010,751 UART: [art] Populate DV Done
3,019,057 UART: [fht] FMC Alias Private Key: 7
3,019,987 UART: [art] Derive CDI
3,020,267 UART: [art] Store in in slot 0x4
3,105,968 UART: [art] Derive Key Pair
3,106,328 UART: [art] Store priv key in slot 0x5
3,119,920 UART: [art] Derive Key Pair - Done
3,134,968 UART: [art] Signing Cert with AUTHO
3,135,448 UART: RITY.KEYID = 7
3,150,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,329 UART: [art] PUB.X = C806D7BF586194224CA252208E623B217044C05771B7B1D097833315F142E50C90311208BD67982316FED59B38373A2B
3,158,074 UART: [art] PUB.Y = 090E27C379BCBE0E9BD87B5B38124E17988DDA442974BB69426EA35A814BC3A8FAAB7F95ABE599058A2D9E621184D543
3,165,020 UART: [art] SIG.R = 72F5280F1B520BEA4CAB2C94D550C5EBB42D7A9ACEDB0656D8776E044CC6083300DDEE72CBD8EC280239B4F9EDAF1494
3,171,770 UART: [art] SIG.S = A082183497E54D85816151B6D60182C1C88EB91849155E6A85F977E83C23A894163ED90D700207F02960025E4DF618CC
3,195,612 UART: Caliptra RT
3,195,957 UART: [state] CFI Enabled
3,303,978 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,734 UART:
3,304,750 UART: Running Caliptra ROM ...
3,305,158 UART:
3,305,300 UART: [state] CFI Enabled
3,308,259 UART: [state] LifecycleState = Production
3,308,867 UART: [state] DebugLocked = Yes
3,309,565 UART: [state] Starting the WD Timer 40000000 cycles
3,311,202 UART: [kat] SHA2-256
4,114,752 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,881 UART: [kat] ++
4,119,033 UART: [kat] sha1
4,123,181 UART: [kat] SHA2-256
4,125,121 UART: [kat] SHA2-384
4,127,802 UART: [kat] SHA2-512-ACC
4,129,703 UART: [kat] ECC-384
4,139,736 UART: [kat] HMAC-384Kdf
4,144,406 UART: [kat] LMS
4,392,718 UART: [kat] --
4,393,652 UART: [warm-reset] ++
4,394,531 UART: [warm-reset] --
4,395,440 UART: [state] Locking Datavault
4,396,400 UART: [state] Locking PCR0, PCR1 and PCR31
4,397,004 UART: [state] Locking ICCM
4,397,444 UART: [exit] Launching FMC @ 0x40000130
4,402,773 UART:
4,402,789 UART: Running Caliptra FMC ...
4,403,197 UART:
4,403,340 UART: [state] CFI Enabled
4,404,811 UART: [aliasrt :skip pcr extension
4,405,284 UART: [art] Extend RT PCRs Done
4,405,712 UART: [art] Lock RT PCRs Done
4,406,947 UART: [art] Populate DV Done
4,415,051 UART: [fht] FMC Alias Private Key: 7
4,416,071 UART: [art] Derive CDI
4,416,351 UART: [art] Store in in slot 0x4
4,501,654 UART: [art] Derive Key Pair
4,502,014 UART: [art] Store priv key in slot 0x5
4,515,208 UART: [art] Derive Key Pair - Done
4,529,946 UART: [art] Signing Cert with AUTHO
4,530,426 UART: RITY.KEYID = 7
4,545,702 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,467 UART: [art] PUB.X = C806D7BF586194224CA252208E623B217044C05771B7B1D097833315F142E50C90311208BD67982316FED59B38373A2B
4,553,212 UART: [art] PUB.Y = 090E27C379BCBE0E9BD87B5B38124E17988DDA442974BB69426EA35A814BC3A8FAAB7F95ABE599058A2D9E621184D543
4,560,158 UART: [art] SIG.R = 72F5280F1B520BEA4CAB2C94D550C5EBB42D7A9ACEDB0656D8776E044CC6083300DDEE72CBD8EC280239B4F9EDAF1494
4,566,908 UART: [art] SIG.S = A082183497E54D85816151B6D60182C1C88EB91849155E6A85F977E83C23A894163ED90D700207F02960025E4DF618CC
4,591,198 UART: Caliptra RT
4,591,543 UART: [state] CFI Enabled
4,875,290 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Production
86,104 UART: [state] DebugLocked = Yes
86,836 UART: [state] Starting the WD Timer 40000000 cycles
88,459 UART: [kat] SHA2-256
892,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,138 UART: [kat] ++
896,290 UART: [kat] sha1
900,602 UART: [kat] SHA2-256
902,542 UART: [kat] SHA2-384
905,315 UART: [kat] SHA2-512-ACC
907,216 UART: [kat] ECC-384
917,059 UART: [kat] HMAC-384Kdf
921,493 UART: [kat] LMS
1,169,805 UART: [kat] --
1,170,484 UART: [cold-reset] ++
1,170,915 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,174,809 ready_for_fw is high
1,174,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,338 UART: [idev] Erasing UDS.KEYID = 0
1,199,771 UART: [idev] Sha1 KeyId Algorithm
1,208,778 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,074 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,768 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,638 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,344 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,542 UART: [ldev] --
1,283,010 UART: [fwproc] Wait for Commands...
1,283,743 UART: [fwproc] Recv command 0x46574c44
1,284,476 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,307 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,374 >>> mbox cmd response: success
2,801,602 UART: [afmc] ++
2,801,770 UART: [afmc] CDI.KEYID = 6
2,802,133 UART: [afmc] SUBJECT.KEYID = 7
2,802,559 UART: [afmc] AUTHORITY.KEYID = 5
2,837,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,367 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,086 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,979 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,686 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,499 UART: [afmc] --
2,880,546 UART: [cold-reset] --
2,881,514 UART: [state] Locking Datavault
2,882,569 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,173 UART: [state] Locking ICCM
2,883,687 UART: [exit] Launching FMC @ 0x40000130
2,889,016 UART:
2,889,032 UART: Running Caliptra FMC ...
2,889,440 UART:
2,889,583 UART: [state] CFI Enabled
2,899,918 UART: [fht] FMC Alias Private Key: 7
3,008,269 UART: [art] Extend RT PCRs Done
3,008,697 UART: [art] Lock RT PCRs Done
3,010,177 UART: [art] Populate DV Done
3,018,397 UART: [fht] FMC Alias Private Key: 7
3,019,521 UART: [art] Derive CDI
3,019,801 UART: [art] Store in in slot 0x4
3,105,612 UART: [art] Derive Key Pair
3,105,972 UART: [art] Store priv key in slot 0x5
3,119,646 UART: [art] Derive Key Pair - Done
3,134,323 UART: [art] Signing Cert with AUTHO
3,134,803 UART: RITY.KEYID = 7
3,149,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,754 UART: [art] PUB.X = 9DD577AFCAEFDBAD380A69C6ACA9281638CC0D89A98304828688581AD67141AE37CADDAD26AAB697AD3D8E28F4B6FEA7
3,157,539 UART: [art] PUB.Y = 9BADB8933CFF0F580BDCC257ADA13E7DB68702B179F1B8AA41095B9779773E611914D8D179FF3FB3EB10F491835AC1EA
3,164,491 UART: [art] SIG.R = E58054F64343256E5309BFA46E02ECEB63DFA11E810D234CDCBCA7E8DE004558BBE1E2146B2F9C852A975E147D6507D6
3,171,237 UART: [art] SIG.S = AB499FE60C6A920B3E5432FB69BAF86A36CD2C2ADEB57A615E0D15130BCDCA37F8CDA559DCAB5B3A2CFC2D1254AA398F
3,195,490 UART: Caliptra RT
3,195,835 UART: [state] CFI Enabled
3,304,142 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,898 UART:
3,304,914 UART: Running Caliptra ROM ...
3,305,322 UART:
3,305,464 UART: [state] CFI Enabled
3,308,053 UART: [state] LifecycleState = Production
3,308,661 UART: [state] DebugLocked = Yes
3,309,387 UART: [state] Starting the WD Timer 40000000 cycles
3,310,910 UART: [kat] SHA2-256
4,114,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,589 UART: [kat] ++
4,118,741 UART: [kat] sha1
4,122,961 UART: [kat] SHA2-256
4,124,901 UART: [kat] SHA2-384
4,127,694 UART: [kat] SHA2-512-ACC
4,129,595 UART: [kat] ECC-384
4,139,172 UART: [kat] HMAC-384Kdf
4,143,970 UART: [kat] LMS
4,392,282 UART: [kat] --
4,392,972 UART: [warm-reset] ++
4,393,825 UART: [warm-reset] --
4,394,562 UART: [state] Locking Datavault
4,395,498 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,102 UART: [state] Locking ICCM
4,396,548 UART: [exit] Launching FMC @ 0x40000130
4,401,877 UART:
4,401,893 UART: Running Caliptra FMC ...
4,402,301 UART:
4,402,444 UART: [state] CFI Enabled
4,403,731 UART: [aliasrt :skip pcr extension
4,404,204 UART: [art] Extend RT PCRs Done
4,404,632 UART: [art] Lock RT PCRs Done
4,405,793 UART: [art] Populate DV Done
4,413,649 UART: [fht] FMC Alias Private Key: 7
4,414,763 UART: [art] Derive CDI
4,415,043 UART: [art] Store in in slot 0x4
4,500,392 UART: [art] Derive Key Pair
4,500,752 UART: [art] Store priv key in slot 0x5
4,514,046 UART: [art] Derive Key Pair - Done
4,528,763 UART: [art] Signing Cert with AUTHO
4,529,243 UART: RITY.KEYID = 7
4,544,837 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,602 UART: [art] PUB.X = 9DD577AFCAEFDBAD380A69C6ACA9281638CC0D89A98304828688581AD67141AE37CADDAD26AAB697AD3D8E28F4B6FEA7
4,552,387 UART: [art] PUB.Y = 9BADB8933CFF0F580BDCC257ADA13E7DB68702B179F1B8AA41095B9779773E611914D8D179FF3FB3EB10F491835AC1EA
4,559,339 UART: [art] SIG.R = E58054F64343256E5309BFA46E02ECEB63DFA11E810D234CDCBCA7E8DE004558BBE1E2146B2F9C852A975E147D6507D6
4,566,085 UART: [art] SIG.S = AB499FE60C6A920B3E5432FB69BAF86A36CD2C2ADEB57A615E0D15130BCDCA37F8CDA559DCAB5B3A2CFC2D1254AA398F
4,589,978 UART: Caliptra RT
4,590,323 UART: [state] CFI Enabled
4,870,340 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,863 UART: [state] LifecycleState = Production
86,471 UART: [state] DebugLocked = Yes
87,161 UART: [state] Starting the WD Timer 40000000 cycles
88,682 UART: [kat] SHA2-256
892,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,361 UART: [kat] ++
896,513 UART: [kat] sha1
900,897 UART: [kat] SHA2-256
902,837 UART: [kat] SHA2-384
905,562 UART: [kat] SHA2-512-ACC
907,463 UART: [kat] ECC-384
917,272 UART: [kat] HMAC-384Kdf
921,976 UART: [kat] LMS
1,170,288 UART: [kat] --
1,170,915 UART: [cold-reset] ++
1,171,348 UART: [fht] FHT @ 0x50003400
1,174,012 UART: [idev] ++
1,174,180 UART: [idev] CDI.KEYID = 6
1,174,541 UART: [idev] SUBJECT.KEYID = 7
1,174,966 UART: [idev] UDS.KEYID = 0
1,175,312 ready_for_fw is high
1,175,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,113 UART: [idev] Erasing UDS.KEYID = 0
1,200,028 UART: [idev] Sha1 KeyId Algorithm
1,208,721 UART: [idev] --
1,209,752 UART: [ldev] ++
1,209,920 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,711 UART: [ldev] AUTHORITY.KEYID = 7
1,211,174 UART: [ldev] FE.KEYID = 1
1,216,404 UART: [ldev] Erasing FE.KEYID = 1
1,242,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,999 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,693 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,563 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,269 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,427 UART: [ldev] --
1,281,705 UART: [fwproc] Wait for Commands...
1,282,492 UART: [fwproc] Recv command 0x46574c44
1,283,225 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,072 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,997 >>> mbox cmd response: success
2,801,051 UART: [afmc] ++
2,801,219 UART: [afmc] CDI.KEYID = 6
2,801,582 UART: [afmc] SUBJECT.KEYID = 7
2,802,008 UART: [afmc] AUTHORITY.KEYID = 5
2,837,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,676 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,395 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,288 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,995 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,966 UART: [afmc] --
2,880,877 UART: [cold-reset] --
2,881,609 UART: [state] Locking Datavault
2,882,722 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,326 UART: [state] Locking ICCM
2,883,880 UART: [exit] Launching FMC @ 0x40000130
2,889,209 UART:
2,889,225 UART: Running Caliptra FMC ...
2,889,633 UART:
2,889,687 UART: [state] CFI Enabled
2,900,072 UART: [fht] FMC Alias Private Key: 7
3,007,821 UART: [art] Extend RT PCRs Done
3,008,249 UART: [art] Lock RT PCRs Done
3,009,933 UART: [art] Populate DV Done
3,017,905 UART: [fht] FMC Alias Private Key: 7
3,018,945 UART: [art] Derive CDI
3,019,225 UART: [art] Store in in slot 0x4
3,105,004 UART: [art] Derive Key Pair
3,105,364 UART: [art] Store priv key in slot 0x5
3,118,668 UART: [art] Derive Key Pair - Done
3,133,644 UART: [art] Signing Cert with AUTHO
3,134,124 UART: RITY.KEYID = 7
3,149,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,869 UART: [art] PUB.X = 6D54D3647150E28B46469E971655DBC0C5A00ADF2AAC0F2F8C84D5B2AEAA884C171EF02785C1230E9032F37A8B57C2A4
3,156,638 UART: [art] PUB.Y = CF672FDDE07A9709B262FEF859186C0A2CC5B2821E5D001ACD041823839D8FF39070544BE9B0FA741B7F20C628F137F2
3,163,563 UART: [art] SIG.R = 14D0C785307F9B65E7253574B4E22ED8FC34B92D6A164E08E241CB6349A7E42E978FB3D6F774CE31E118FF2463FE1FAA
3,170,338 UART: [art] SIG.S = 1AD5DB61676E027D57EC37F03071D2AFF4B0298815BB5E90ED50517A88691B7036E798BD94C9DF0FF6A0EF849DCC373A
3,194,775 UART: Caliptra RT
3,195,028 UART: [state] CFI Enabled
3,302,968 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,724 UART:
3,303,740 UART: Running Caliptra ROM ...
3,304,148 UART:
3,304,203 UART: [state] CFI Enabled
3,306,632 UART: [state] LifecycleState = Production
3,307,240 UART: [state] DebugLocked = Yes
3,307,776 UART: [state] Starting the WD Timer 40000000 cycles
3,309,385 UART: [kat] SHA2-256
4,112,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,064 UART: [kat] ++
4,117,216 UART: [kat] sha1
4,121,486 UART: [kat] SHA2-256
4,123,426 UART: [kat] SHA2-384
4,126,083 UART: [kat] SHA2-512-ACC
4,127,984 UART: [kat] ECC-384
4,137,655 UART: [kat] HMAC-384Kdf
4,142,273 UART: [kat] LMS
4,390,585 UART: [kat] --
4,391,269 UART: [warm-reset] ++
4,392,144 UART: [warm-reset] --
4,393,195 UART: [state] Locking Datavault
4,394,159 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,763 UART: [state] Locking ICCM
4,395,373 UART: [exit] Launching FMC @ 0x40000130
4,400,702 UART:
4,400,718 UART: Running Caliptra FMC ...
4,401,126 UART:
4,401,180 UART: [state] CFI Enabled
4,402,565 UART: [aliasrt :skip pcr extension
4,403,038 UART: [art] Extend RT PCRs Done
4,403,466 UART: [art] Lock RT PCRs Done
4,404,625 UART: [art] Populate DV Done
4,412,601 UART: [fht] FMC Alias Private Key: 7
4,413,607 UART: [art] Derive CDI
4,413,887 UART: [art] Store in in slot 0x4
4,500,216 UART: [art] Derive Key Pair
4,500,576 UART: [art] Store priv key in slot 0x5
4,513,260 UART: [art] Derive Key Pair - Done
4,528,064 UART: [art] Signing Cert with AUTHO
4,528,544 UART: RITY.KEYID = 7
4,543,776 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,541 UART: [art] PUB.X = 6D54D3647150E28B46469E971655DBC0C5A00ADF2AAC0F2F8C84D5B2AEAA884C171EF02785C1230E9032F37A8B57C2A4
4,551,310 UART: [art] PUB.Y = CF672FDDE07A9709B262FEF859186C0A2CC5B2821E5D001ACD041823839D8FF39070544BE9B0FA741B7F20C628F137F2
4,558,235 UART: [art] SIG.R = 14D0C785307F9B65E7253574B4E22ED8FC34B92D6A164E08E241CB6349A7E42E978FB3D6F774CE31E118FF2463FE1FAA
4,565,010 UART: [art] SIG.S = 1AD5DB61676E027D57EC37F03071D2AFF4B0298815BB5E90ED50517A88691B7036E798BD94C9DF0FF6A0EF849DCC373A
4,589,111 UART: Caliptra RT
4,589,364 UART: [state] CFI Enabled
4,870,046 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Production
86,143 UART: [state] DebugLocked = Yes
86,885 UART: [state] Starting the WD Timer 40000000 cycles
88,434 UART: [kat] SHA2-256
891,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,113 UART: [kat] ++
896,265 UART: [kat] sha1
900,565 UART: [kat] SHA2-256
902,505 UART: [kat] SHA2-384
905,082 UART: [kat] SHA2-512-ACC
906,983 UART: [kat] ECC-384
916,652 UART: [kat] HMAC-384Kdf
921,340 UART: [kat] LMS
1,169,652 UART: [kat] --
1,170,725 UART: [cold-reset] ++
1,171,246 UART: [fht] FHT @ 0x50003400
1,173,860 UART: [idev] ++
1,174,028 UART: [idev] CDI.KEYID = 6
1,174,389 UART: [idev] SUBJECT.KEYID = 7
1,174,814 UART: [idev] UDS.KEYID = 0
1,175,160 ready_for_fw is high
1,175,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,791 UART: [idev] Erasing UDS.KEYID = 0
1,199,534 UART: [idev] Sha1 KeyId Algorithm
1,208,487 UART: [idev] --
1,209,716 UART: [ldev] ++
1,209,884 UART: [ldev] CDI.KEYID = 6
1,210,248 UART: [ldev] SUBJECT.KEYID = 5
1,210,675 UART: [ldev] AUTHORITY.KEYID = 7
1,211,138 UART: [ldev] FE.KEYID = 1
1,216,120 UART: [ldev] Erasing FE.KEYID = 1
1,242,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,643 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,337 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,207 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,913 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,969 UART: [ldev] --
1,282,375 UART: [fwproc] Wait for Commands...
1,282,998 UART: [fwproc] Recv command 0x46574c44
1,283,731 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,315 >>> mbox cmd response: success
2,800,563 UART: [afmc] ++
2,800,731 UART: [afmc] CDI.KEYID = 6
2,801,094 UART: [afmc] SUBJECT.KEYID = 7
2,801,520 UART: [afmc] AUTHORITY.KEYID = 5
2,837,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,406 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,125 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,018 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,725 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,432 UART: [afmc] --
2,880,405 UART: [cold-reset] --
2,881,331 UART: [state] Locking Datavault
2,882,242 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,846 UART: [state] Locking ICCM
2,883,288 UART: [exit] Launching FMC @ 0x40000130
2,888,617 UART:
2,888,633 UART: Running Caliptra FMC ...
2,889,041 UART:
2,889,095 UART: [state] CFI Enabled
2,899,530 UART: [fht] FMC Alias Private Key: 7
3,007,171 UART: [art] Extend RT PCRs Done
3,007,599 UART: [art] Lock RT PCRs Done
3,009,447 UART: [art] Populate DV Done
3,017,809 UART: [fht] FMC Alias Private Key: 7
3,018,741 UART: [art] Derive CDI
3,019,021 UART: [art] Store in in slot 0x4
3,104,706 UART: [art] Derive Key Pair
3,105,066 UART: [art] Store priv key in slot 0x5
3,117,660 UART: [art] Derive Key Pair - Done
3,132,593 UART: [art] Signing Cert with AUTHO
3,133,073 UART: RITY.KEYID = 7
3,148,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,208 UART: [art] PUB.X = 2496BA6B0E3DAF1CD18760C7DC47688B8BA22D139507C2DD17694AE661EA11E207C39C634168B9D71BA99928DEA2973F
3,155,975 UART: [art] PUB.Y = A6DE346EDBA4C29190A9FD86C39CDAF6ED67314EDA1B03F24E47531D9989F4832AD0C1FC4CB827AFBBCF51FBE1B19834
3,162,946 UART: [art] SIG.R = 0C268C670C4E5FF9962F316D21C9FCAD98D8CC9EAC9691734197CB2C46C810B55AA166ADA13BDA2B03FFCA6B98F8779A
3,169,725 UART: [art] SIG.S = 7720AD5099CDFD8A1A72B3A63B4A39A35B0FFD041611A0033A495CA2C1C3B745DD211ACC4C27E2F2260A18E87F2BF883
3,193,698 UART: Caliptra RT
3,193,951 UART: [state] CFI Enabled
3,302,075 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,831 UART:
3,302,847 UART: Running Caliptra ROM ...
3,303,255 UART:
3,303,310 UART: [state] CFI Enabled
3,306,037 UART: [state] LifecycleState = Production
3,306,645 UART: [state] DebugLocked = Yes
3,307,287 UART: [state] Starting the WD Timer 40000000 cycles
3,308,910 UART: [kat] SHA2-256
4,112,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,589 UART: [kat] ++
4,116,741 UART: [kat] sha1
4,120,831 UART: [kat] SHA2-256
4,122,771 UART: [kat] SHA2-384
4,125,536 UART: [kat] SHA2-512-ACC
4,127,437 UART: [kat] ECC-384
4,137,026 UART: [kat] HMAC-384Kdf
4,141,534 UART: [kat] LMS
4,389,846 UART: [kat] --
4,390,842 UART: [warm-reset] ++
4,391,799 UART: [warm-reset] --
4,392,716 UART: [state] Locking Datavault
4,393,346 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,950 UART: [state] Locking ICCM
4,394,536 UART: [exit] Launching FMC @ 0x40000130
4,399,865 UART:
4,399,881 UART: Running Caliptra FMC ...
4,400,289 UART:
4,400,343 UART: [state] CFI Enabled
4,401,414 UART: [aliasrt :skip pcr extension
4,401,887 UART: [art] Extend RT PCRs Done
4,402,315 UART: [art] Lock RT PCRs Done
4,403,650 UART: [art] Populate DV Done
4,412,206 UART: [fht] FMC Alias Private Key: 7
4,413,226 UART: [art] Derive CDI
4,413,506 UART: [art] Store in in slot 0x4
4,499,201 UART: [art] Derive Key Pair
4,499,561 UART: [art] Store priv key in slot 0x5
4,513,021 UART: [art] Derive Key Pair - Done
4,527,864 UART: [art] Signing Cert with AUTHO
4,528,344 UART: RITY.KEYID = 7
4,543,794 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,559 UART: [art] PUB.X = 2496BA6B0E3DAF1CD18760C7DC47688B8BA22D139507C2DD17694AE661EA11E207C39C634168B9D71BA99928DEA2973F
4,551,326 UART: [art] PUB.Y = A6DE346EDBA4C29190A9FD86C39CDAF6ED67314EDA1B03F24E47531D9989F4832AD0C1FC4CB827AFBBCF51FBE1B19834
4,558,297 UART: [art] SIG.R = 0C268C670C4E5FF9962F316D21C9FCAD98D8CC9EAC9691734197CB2C46C810B55AA166ADA13BDA2B03FFCA6B98F8779A
4,565,076 UART: [art] SIG.S = 7720AD5099CDFD8A1A72B3A63B4A39A35B0FFD041611A0033A495CA2C1C3B745DD211ACC4C27E2F2260A18E87F2BF883
4,589,081 UART: Caliptra RT
4,589,334 UART: [state] CFI Enabled
4,873,468 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Production
85,940 UART: [state] DebugLocked = Yes
86,624 UART: [state] Starting the WD Timer 40000000 cycles
88,303 UART: [kat] SHA2-256
891,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,982 UART: [kat] ++
896,134 UART: [kat] sha1
900,316 UART: [kat] SHA2-256
902,256 UART: [kat] SHA2-384
904,967 UART: [kat] SHA2-512-ACC
906,868 UART: [kat] ECC-384
917,087 UART: [kat] HMAC-384Kdf
921,887 UART: [kat] LMS
1,170,199 UART: [kat] --
1,170,900 UART: [cold-reset] ++
1,171,245 UART: [fht] FHT @ 0x50003400
1,173,729 UART: [idev] ++
1,173,897 UART: [idev] CDI.KEYID = 6
1,174,258 UART: [idev] SUBJECT.KEYID = 7
1,174,683 UART: [idev] UDS.KEYID = 0
1,175,029 ready_for_fw is high
1,175,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,907 UART: [idev] Sha1 KeyId Algorithm
1,208,730 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,265 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,242,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,276 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,970 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,840 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,546 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,700 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,687 UART: [fwproc] Recv command 0x46574c44
1,283,420 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,587 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,612 >>> mbox cmd response: success
2,799,756 UART: [afmc] ++
2,799,924 UART: [afmc] CDI.KEYID = 6
2,800,287 UART: [afmc] SUBJECT.KEYID = 7
2,800,713 UART: [afmc] AUTHORITY.KEYID = 5
2,836,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,701 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,420 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,313 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,020 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,947 UART: [afmc] --
2,879,854 UART: [cold-reset] --
2,880,570 UART: [state] Locking Datavault
2,881,615 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,219 UART: [state] Locking ICCM
2,882,665 UART: [exit] Launching FMC @ 0x40000130
2,887,994 UART:
2,888,010 UART: Running Caliptra FMC ...
2,888,418 UART:
2,888,561 UART: [state] CFI Enabled
2,898,994 UART: [fht] FMC Alias Private Key: 7
3,006,947 UART: [art] Extend RT PCRs Done
3,007,375 UART: [art] Lock RT PCRs Done
3,009,229 UART: [art] Populate DV Done
3,017,559 UART: [fht] FMC Alias Private Key: 7
3,018,633 UART: [art] Derive CDI
3,018,913 UART: [art] Store in in slot 0x4
3,105,084 UART: [art] Derive Key Pair
3,105,444 UART: [art] Store priv key in slot 0x5
3,119,168 UART: [art] Derive Key Pair - Done
3,133,917 UART: [art] Signing Cert with AUTHO
3,134,397 UART: RITY.KEYID = 7
3,149,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,472 UART: [art] PUB.X = BBFF0CD37DEE0B847D91C13C85A49F2523EFBD05D68936ADCF6259C8D7F750DF997F7F79F4AE23C41CF2CEFEE5617B8C
3,157,259 UART: [art] PUB.Y = 2CF57234699C50A0240E5BE1F3FF3AD06028A23073DF7C27221754965011D2D2068D0256A38C3EE8C1A6093C3ADC6826
3,164,193 UART: [art] SIG.R = 7C9138BE1A8715F61871322A0BE35DB5B108F82CE0E9F0E40F2F0EB035E10A3F42760573D643E0CD2E0EC8ECBB818445
3,170,950 UART: [art] SIG.S = 59F62B8C0A3A37B30FF25C79D40C94116420DA95E14D908C1FAD2968AE00787FCE55785DA3A25254C7C1B1DE1DCA1BE5
3,194,450 UART: Caliptra RT
3,194,795 UART: [state] CFI Enabled
3,303,639 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,395 UART:
3,304,411 UART: Running Caliptra ROM ...
3,304,819 UART:
3,304,961 UART: [state] CFI Enabled
3,307,764 UART: [state] LifecycleState = Production
3,308,372 UART: [state] DebugLocked = Yes
3,309,084 UART: [state] Starting the WD Timer 40000000 cycles
3,310,637 UART: [kat] SHA2-256
4,114,187 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,316 UART: [kat] ++
4,118,468 UART: [kat] sha1
4,122,730 UART: [kat] SHA2-256
4,124,670 UART: [kat] SHA2-384
4,127,435 UART: [kat] SHA2-512-ACC
4,129,336 UART: [kat] ECC-384
4,139,087 UART: [kat] HMAC-384Kdf
4,143,677 UART: [kat] LMS
4,391,989 UART: [kat] --
4,392,769 UART: [warm-reset] ++
4,393,732 UART: [warm-reset] --
4,394,541 UART: [state] Locking Datavault
4,395,461 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,065 UART: [state] Locking ICCM
4,396,571 UART: [exit] Launching FMC @ 0x40000130
4,401,900 UART:
4,401,916 UART: Running Caliptra FMC ...
4,402,324 UART:
4,402,467 UART: [state] CFI Enabled
4,403,766 UART: [aliasrt :skip pcr extension
4,404,239 UART: [art] Extend RT PCRs Done
4,404,667 UART: [art] Lock RT PCRs Done
4,405,978 UART: [art] Populate DV Done
4,414,480 UART: [fht] FMC Alias Private Key: 7
4,415,444 UART: [art] Derive CDI
4,415,724 UART: [art] Store in in slot 0x4
4,501,481 UART: [art] Derive Key Pair
4,501,841 UART: [art] Store priv key in slot 0x5
4,515,061 UART: [art] Derive Key Pair - Done
4,529,752 UART: [art] Signing Cert with AUTHO
4,530,232 UART: RITY.KEYID = 7
4,545,534 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,299 UART: [art] PUB.X = BBFF0CD37DEE0B847D91C13C85A49F2523EFBD05D68936ADCF6259C8D7F750DF997F7F79F4AE23C41CF2CEFEE5617B8C
4,553,086 UART: [art] PUB.Y = 2CF57234699C50A0240E5BE1F3FF3AD06028A23073DF7C27221754965011D2D2068D0256A38C3EE8C1A6093C3ADC6826
4,560,020 UART: [art] SIG.R = 7C9138BE1A8715F61871322A0BE35DB5B108F82CE0E9F0E40F2F0EB035E10A3F42760573D643E0CD2E0EC8ECBB818445
4,566,777 UART: [art] SIG.S = 59F62B8C0A3A37B30FF25C79D40C94116420DA95E14D908C1FAD2968AE00787FCE55785DA3A25254C7C1B1DE1DCA1BE5
4,590,097 UART: Caliptra RT
4,590,442 UART: [state] CFI Enabled
4,875,238 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Production
85,582 UART: [state] DebugLocked = Yes
86,284 UART: [state] Starting the WD Timer 40000000 cycles
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,957 UART: [kat] SHA2-512-ACC
906,858 UART: [kat] ECC-384
916,557 UART: [kat] HMAC-384Kdf
921,247 UART: [kat] LMS
1,169,559 UART: [kat] --
1,170,350 UART: [cold-reset] ++
1,170,885 UART: [fht] FHT @ 0x50003400
1,173,543 UART: [idev] ++
1,173,711 UART: [idev] CDI.KEYID = 6
1,174,072 UART: [idev] SUBJECT.KEYID = 7
1,174,497 UART: [idev] UDS.KEYID = 0
1,174,843 ready_for_fw is high
1,174,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,484 UART: [idev] Erasing UDS.KEYID = 0
1,199,405 UART: [idev] Sha1 KeyId Algorithm
1,208,172 UART: [idev] --
1,209,085 UART: [ldev] ++
1,209,253 UART: [ldev] CDI.KEYID = 6
1,209,617 UART: [ldev] SUBJECT.KEYID = 5
1,210,044 UART: [ldev] AUTHORITY.KEYID = 7
1,210,507 UART: [ldev] FE.KEYID = 1
1,215,585 UART: [ldev] Erasing FE.KEYID = 1
1,241,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,944 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,638 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,508 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,214 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,346 UART: [ldev] --
1,280,828 UART: [fwproc] Wait for Commands...
1,281,489 UART: [fwproc] Recv command 0x46574c44
1,282,222 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,797,924 >>> mbox cmd response: success
2,798,998 UART: [afmc] ++
2,799,166 UART: [afmc] CDI.KEYID = 6
2,799,529 UART: [afmc] SUBJECT.KEYID = 7
2,799,955 UART: [afmc] AUTHORITY.KEYID = 5
2,835,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,959 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,678 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,571 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,278 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,085 UART: [afmc] --
2,879,034 UART: [cold-reset] --
2,879,702 UART: [state] Locking Datavault
2,880,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,353 UART: [state] Locking ICCM
2,881,793 UART: [exit] Launching FMC @ 0x40000130
2,887,122 UART:
2,887,138 UART: Running Caliptra FMC ...
2,887,546 UART:
2,887,689 UART: [state] CFI Enabled
2,898,096 UART: [fht] FMC Alias Private Key: 7
3,005,953 UART: [art] Extend RT PCRs Done
3,006,381 UART: [art] Lock RT PCRs Done
3,008,135 UART: [art] Populate DV Done
3,016,097 UART: [fht] FMC Alias Private Key: 7
3,017,115 UART: [art] Derive CDI
3,017,395 UART: [art] Store in in slot 0x4
3,102,692 UART: [art] Derive Key Pair
3,103,052 UART: [art] Store priv key in slot 0x5
3,116,318 UART: [art] Derive Key Pair - Done
3,130,889 UART: [art] Signing Cert with AUTHO
3,131,369 UART: RITY.KEYID = 7
3,146,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,960 UART: [art] PUB.X = 0D19D2676DF53125CB1CC553923CF5C3F818C38A4077B6DDC8662724E51DB7AFB6107EEC82FB1C529B9D52BBBB6EACD5
3,153,745 UART: [art] PUB.Y = C5113BD6EF1E39D96AAD06745FE36BFBA19D6AE09C0983E9B918BFA1F5B856B50B0706B2120E69D1F28BBF6A5FC73B48
3,160,695 UART: [art] SIG.R = F1FC8383D535BF8D3A285E21895DCCCF46EC168E2552EA23E7DB10EFF233EA4731A4CC228D0A3D239D542A6FAF5E39F2
3,167,480 UART: [art] SIG.S = 3B4462EA09E97960732C214D60C614378036C1065E7A623254E936542E1E1804780FA7F4EE2BA6E79193075397574EB3
3,191,090 UART: Caliptra RT
3,191,435 UART: [state] CFI Enabled
3,299,758 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,514 UART:
3,300,530 UART: Running Caliptra ROM ...
3,300,938 UART:
3,301,080 UART: [state] CFI Enabled
3,303,513 UART: [state] LifecycleState = Production
3,304,121 UART: [state] DebugLocked = Yes
3,304,845 UART: [state] Starting the WD Timer 40000000 cycles
3,306,406 UART: [kat] SHA2-256
4,109,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,085 UART: [kat] ++
4,114,237 UART: [kat] sha1
4,118,391 UART: [kat] SHA2-256
4,120,331 UART: [kat] SHA2-384
4,123,130 UART: [kat] SHA2-512-ACC
4,125,031 UART: [kat] ECC-384
4,134,728 UART: [kat] HMAC-384Kdf
4,139,428 UART: [kat] LMS
4,387,740 UART: [kat] --
4,388,758 UART: [warm-reset] ++
4,389,785 UART: [warm-reset] --
4,390,718 UART: [state] Locking Datavault
4,391,410 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,014 UART: [state] Locking ICCM
4,392,508 UART: [exit] Launching FMC @ 0x40000130
4,397,837 UART:
4,397,853 UART: Running Caliptra FMC ...
4,398,261 UART:
4,398,404 UART: [state] CFI Enabled
4,399,749 UART: [aliasrt :skip pcr extension
4,400,222 UART: [art] Extend RT PCRs Done
4,400,650 UART: [art] Lock RT PCRs Done
4,401,737 UART: [art] Populate DV Done
4,410,085 UART: [fht] FMC Alias Private Key: 7
4,411,205 UART: [art] Derive CDI
4,411,485 UART: [art] Store in in slot 0x4
4,497,032 UART: [art] Derive Key Pair
4,497,392 UART: [art] Store priv key in slot 0x5
4,511,376 UART: [art] Derive Key Pair - Done
4,526,213 UART: [art] Signing Cert with AUTHO
4,526,693 UART: RITY.KEYID = 7
4,541,633 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,398 UART: [art] PUB.X = 0D19D2676DF53125CB1CC553923CF5C3F818C38A4077B6DDC8662724E51DB7AFB6107EEC82FB1C529B9D52BBBB6EACD5
4,549,183 UART: [art] PUB.Y = C5113BD6EF1E39D96AAD06745FE36BFBA19D6AE09C0983E9B918BFA1F5B856B50B0706B2120E69D1F28BBF6A5FC73B48
4,556,133 UART: [art] SIG.R = F1FC8383D535BF8D3A285E21895DCCCF46EC168E2552EA23E7DB10EFF233EA4731A4CC228D0A3D239D542A6FAF5E39F2
4,562,918 UART: [art] SIG.S = 3B4462EA09E97960732C214D60C614378036C1065E7A623254E936542E1E1804780FA7F4EE2BA6E79193075397574EB3
4,586,972 UART: Caliptra RT
4,587,317 UART: [state] CFI Enabled
4,868,400 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
191,603 UART:
191,831 UART: Running Caliptra ROM ...
192,895 UART:
193,033 UART: [state] CFI Enabled
260,311 UART: [state] LifecycleState = Production
262,091 UART: [state] DebugLocked = Yes
263,567 UART: [state] Starting the WD Timer 40000000 cycles
269,412 UART: [kat] SHA2-256
451,421 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,917 UART: [kat] ++
463,366 UART: [kat] sha1
474,192 UART: [kat] SHA2-256
477,278 UART: [kat] SHA2-384
483,196 UART: [kat] SHA2-512-ACC
485,859 UART: [kat] ECC-384
3,775,357 UART: [kat] HMAC-384Kdf
3,799,958 UART: [kat] LMS
4,873,136 UART: [kat] --
4,878,300 UART: [cold-reset] ++
4,880,554 UART: [fht] FHT @ 0x50003400
4,890,758 UART: [idev] ++
4,891,415 UART: [idev] CDI.KEYID = 6
4,892,665 UART: [idev] SUBJECT.KEYID = 7
4,893,694 UART: [idev] UDS.KEYID = 0
4,894,690 ready_for_fw is high
4,894,891 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,994,120 UART: [idev] Erasing UDS.KEYID = 0
8,241,492 UART: [idev] Sha1 KeyId Algorithm
8,264,411 UART: [idev] --
8,267,863 UART: [ldev] ++
8,268,436 UART: [ldev] CDI.KEYID = 6
8,269,541 UART: [ldev] SUBJECT.KEYID = 5
8,270,757 UART: [ldev] AUTHORITY.KEYID = 7
8,271,910 UART: [ldev] FE.KEYID = 1
8,315,680 UART: [ldev] Erasing FE.KEYID = 1
11,651,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,203 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,977,525 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,993,506 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,009,654 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,029,788 UART: [ldev] --
14,034,894 UART: [fwproc] Wait for Commands...
14,036,556 UART: [fwproc] Recv command 0x46574c44
14,038,868 UART: [fwproc] Recv'd Img size: 78740 bytes
17,704,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,776,646 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,845,395 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,039,513 >>> mbox cmd response: success
18,043,913 UART: [afmc] ++
18,044,532 UART: [afmc] CDI.KEYID = 6
18,045,676 UART: [afmc] SUBJECT.KEYID = 7
18,046,843 UART: [afmc] AUTHORITY.KEYID = 5
21,410,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,707,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,710,168 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,726,169 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,742,280 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,758,483 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,780,911 UART: [afmc] --
23,784,490 UART: [cold-reset] --
23,787,710 UART: [state] Locking Datavault
23,793,551 UART: [state] Locking PCR0, PCR1 and PCR31
23,795,191 UART: [state] Locking ICCM
23,797,451 UART: [exit] Launching FMC @ 0x40000130
23,806,174 UART:
23,806,411 UART: Running Caliptra FMC ...
23,807,509 UART:
23,807,667 UART: [state] CFI Enabled
23,867,007 UART: [fht] FMC Alias Private Key: 7
26,205,201 UART: [art] Extend RT PCRs Done
26,206,422 UART: [art] Lock RT PCRs Done
26,208,236 UART: [art] Populate DV Done
26,213,755 UART: [fht] FMC Alias Private Key: 7
26,215,456 UART: [art] Derive CDI
26,216,269 UART: [art] Store in in slot 0x4
26,275,695 UART: [art] Derive Key Pair
26,276,738 UART: [art] Store priv key in slot 0x5
29,569,598 UART: [art] Derive Key Pair - Done
29,582,914 UART: [art] Signing Cert with AUTHO
29,584,219 UART: RITY.KEYID = 7
31,872,329 UART: [art] Erasing AUTHORITY.KEYID = 7
31,873,837 UART: [art] PUB.X = 211E48CB799EB044AA43E9B62BD779D3C5EBBE6DC037E8E4C61DA3964F49CC1A4B7FCDE582096F4BB127BDB2C6C7329D
31,881,096 UART: [art] PUB.Y = 5078785F4F638516E7CE44E479594D4E6653818A5BC59F48F9E37C305E1F9545B31153F86F53DCFC3803954F76E690AA
31,888,346 UART: [art] SIG.R = 38EE7DEEAFBE15406219D4E967EC999A220E5FD913C58AE48968DC854F5AD164E70D12B504CEA02712F680671995FFBA
31,895,708 UART: [art] SIG.S = CED2F8BD707C3765A7E03E4C36F9FBDE7904E5D3570112F8B418A59081D0256C2ECE84C68A7FEC3F44520809B171964F
33,200,402 UART: mbox::rt_entry...
33,201,355 UART: ____ _ _ _ ____ _____
33,203,336 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,205,338 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,207,195 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,209,118 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,210,972 UART: |_|
33,211,775 UART:
33,325,284 UART: [rt] Runtime listening for mailbox commands...
33,327,292 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,328,077 >>> mbox cmd response data (0 bytes)
Initializing fuses
979 UART:
1,224 UART: Running Caliptra ROM ...
2,333 UART:
2,489 UART: [state] CFI Enabled
59,867 UART: [state] LifecycleState = Production
61,638 UART: [state] DebugLocked = Yes
64,490 UART: [state] Starting the WD Timer 40000000 cycles
70,478 UART: [kat] SHA2-256
252,420 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
263,963 UART: [kat] ++
264,466 UART: [kat] sha1
275,403 UART: [kat] SHA2-256
278,447 UART: [kat] SHA2-384
284,212 UART: [kat] SHA2-512-ACC
286,841 UART: [kat] ECC-384
3,570,825 UART: [kat] HMAC-384Kdf
3,596,827 UART: [kat] LMS
4,670,130 UART: [kat] --
4,673,436 UART: [warm-reset] ++
4,679,051 UART: [warm-reset] --
4,683,383 UART: [state] Locking Datavault
4,687,458 UART: [state] Locking PCR0, PCR1 and PCR31
4,689,608 UART: [state] Locking ICCM
4,691,228 UART: [exit] Launching FMC @ 0x40000130
4,699,856 UART:
4,700,092 UART: Running Caliptra FMC ...
4,701,200 UART:
4,701,369 UART: [state] CFI Enabled
4,762,988 UART: [aliasrt :skip pcr extension
4,764,290 UART: [art] Extend RT PCRs Done
4,765,439 UART: [art] Lock RT PCRs Done
4,766,506 UART: [art] Populate DV Done
4,771,865 UART: [fht] FMC Alias Private Key: 7
4,773,359 UART: [art] Derive CDI
4,774,127 UART: [art] Store in in slot 0x4
4,831,471 UART: [art] Derive Key Pair
4,832,543 UART: [art] Store priv key in slot 0x5
8,125,888 UART: [art] Derive Key Pair - Done
8,138,796 UART: [art] Signing Cert with AUTHO
8,140,104 UART: RITY.KEYID = 7
10,427,523 UART: [art] Erasing AUTHORITY.KEYID = 7
10,429,032 UART: [art] PUB.X = 211E48CB799EB044AA43E9B62BD779D3C5EBBE6DC037E8E4C61DA3964F49CC1A4B7FCDE582096F4BB127BDB2C6C7329D
10,436,297 UART: [art] PUB.Y = 5078785F4F638516E7CE44E479594D4E6653818A5BC59F48F9E37C305E1F9545B31153F86F53DCFC3803954F76E690AA
10,443,475 UART: [art] SIG.R = 38EE7DEEAFBE15406219D4E967EC999A220E5FD913C58AE48968DC854F5AD164E70D12B504CEA02712F680671995FFBA
10,450,860 UART: [art] SIG.S = CED2F8BD707C3765A7E03E4C36F9FBDE7904E5D3570112F8B418A59081D0256C2ECE84C68A7FEC3F44520809B171964F
11,756,151 UART: mbox::rt_entry...
11,757,116 UART: ____ _ _ _ ____ _____
11,759,046 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,761,059 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,762,993 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,764,921 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,766,848 UART: |_|
11,767,700 UART:
15,334,706 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
15,339,132 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,503 UART:
191,869 UART: Running Caliptra ROM ...
193,044 UART:
193,205 UART: [state] CFI Enabled
263,754 UART: [state] LifecycleState = Production
266,006 UART: [state] DebugLocked = Yes
268,871 UART: [state] Starting the WD Timer 40000000 cycles
273,554 UART: [kat] SHA2-256
455,472 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,035 UART: [kat] ++
467,485 UART: [kat] sha1
477,392 UART: [kat] SHA2-256
480,405 UART: [kat] SHA2-384
487,608 UART: [kat] SHA2-512-ACC
490,196 UART: [kat] ECC-384
3,776,863 UART: [kat] HMAC-384Kdf
3,801,523 UART: [kat] LMS
4,874,682 UART: [kat] --
4,879,193 UART: [cold-reset] ++
4,881,835 UART: [fht] FHT @ 0x50003400
4,891,887 UART: [idev] ++
4,892,520 UART: [idev] CDI.KEYID = 6
4,893,689 UART: [idev] SUBJECT.KEYID = 7
4,894,936 UART: [idev] UDS.KEYID = 0
4,895,852 ready_for_fw is high
4,896,040 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
4,995,623 UART: [idev] Erasing UDS.KEYID = 0
8,240,889 UART: [idev] Sha1 KeyId Algorithm
8,263,903 UART: [idev] --
8,268,013 UART: [ldev] ++
8,268,692 UART: [ldev] CDI.KEYID = 6
8,269,854 UART: [ldev] SUBJECT.KEYID = 5
8,271,070 UART: [ldev] AUTHORITY.KEYID = 7
8,272,225 UART: [ldev] FE.KEYID = 1
8,316,675 UART: [ldev] Erasing FE.KEYID = 1
11,641,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,953,063 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,969,830 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,985,401 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,001,522 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,021,644 UART: [ldev] --
14,026,594 UART: [fwproc] Wait for Commands...
14,028,921 UART: [fwproc] Recv command 0x46574c44
14,031,237 UART: [fwproc] Recv'd Img size: 78740 bytes
17,695,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,778,298 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,847,067 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,040,975 >>> mbox cmd response: success
18,044,375 UART: [afmc] ++
18,045,010 UART: [afmc] CDI.KEYID = 6
18,046,157 UART: [afmc] SUBJECT.KEYID = 7
18,047,316 UART: [afmc] AUTHORITY.KEYID = 5
21,408,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,708,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,711,088 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,727,112 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,743,220 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,759,237 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,781,669 UART: [afmc] --
23,785,040 UART: [cold-reset] --
23,788,644 UART: [state] Locking Datavault
23,793,913 UART: [state] Locking PCR0, PCR1 and PCR31
23,795,559 UART: [state] Locking ICCM
23,797,501 UART: [exit] Launching FMC @ 0x40000130
23,806,182 UART:
23,806,417 UART: Running Caliptra FMC ...
23,807,520 UART:
23,807,684 UART: [state] CFI Enabled
23,867,513 UART: [fht] FMC Alias Private Key: 7
26,205,583 UART: [art] Extend RT PCRs Done
26,206,807 UART: [art] Lock RT PCRs Done
26,208,546 UART: [art] Populate DV Done
26,213,876 UART: [fht] FMC Alias Private Key: 7
26,215,512 UART: [art] Derive CDI
26,216,335 UART: [art] Store in in slot 0x4
26,275,968 UART: [art] Derive Key Pair
26,276,968 UART: [art] Store priv key in slot 0x5
29,569,842 UART: [art] Derive Key Pair - Done
29,582,608 UART: [art] Signing Cert with AUTHO
29,583,942 UART: RITY.KEYID = 7
31,872,551 UART: [art] Erasing AUTHORITY.KEYID = 7
31,874,058 UART: [art] PUB.X = 3223DDBB37491EB216126AC904FBFC0C45DD740965F2D02E1FAE9061A846883BE4AC79C2A26F71B9D5ED703A41F0EC46
31,881,331 UART: [art] PUB.Y = 5698C6AD24D1A9E954223D01AD3935D5AAA82D4EF0190A2705DCA756A3350BEEAA539DD2814018FF6AA09B9410F82B94
31,888,591 UART: [art] SIG.R = B65A2CD35FBBE630459D354177C48DC000EB42BD041C6D1EA5BD5371FC05BD928943994347714F2E8323EF3A406B2B7C
31,895,987 UART: [art] SIG.S = CD877ACFBAB94A06C6EC75FB7CFAF38E16352EFFAF352AA15CDC49E8A02572953ADC2906D9906D703D4D0ED423452506
33,200,730 UART: mbox::rt_entry...
33,201,680 UART: ____ _ _ _ ____ _____
33,203,667 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,205,705 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,207,645 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,209,584 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,211,444 UART: |_|
33,212,347 UART:
33,325,633 UART: [rt] Runtime listening for mailbox commands...
33,327,638 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,328,427 >>> mbox cmd response data (0 bytes)
Initializing fuses
991 UART:
1,243 UART: Running Caliptra ROM ...
2,269 UART:
2,415 UART: [state] CFI Enabled
58,937 UART: [state] LifecycleState = Production
60,679 UART: [state] DebugLocked = Yes
62,772 UART: [state] Starting the WD Timer 40000000 cycles
68,957 UART: [kat] SHA2-256
250,926 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
262,431 UART: [kat] ++
262,935 UART: [kat] sha1
274,632 UART: [kat] SHA2-256
277,704 UART: [kat] SHA2-384
284,864 UART: [kat] SHA2-512-ACC
287,485 UART: [kat] ECC-384
3,568,562 UART: [kat] HMAC-384Kdf
3,597,271 UART: [kat] LMS
4,670,425 UART: [kat] --
4,674,496 UART: [warm-reset] ++
4,678,603 UART: [warm-reset] --
4,684,698 UART: [state] Locking Datavault
4,687,755 UART: [state] Locking PCR0, PCR1 and PCR31
4,689,917 UART: [state] Locking ICCM
4,692,911 UART: [exit] Launching FMC @ 0x40000130
4,701,553 UART:
4,701,793 UART: Running Caliptra FMC ...
4,702,900 UART:
4,703,063 UART: [state] CFI Enabled
4,761,608 UART: [aliasrt :skip pcr extension
4,762,906 UART: [art] Extend RT PCRs Done
4,764,054 UART: [art] Lock RT PCRs Done
4,765,288 UART: [art] Populate DV Done
4,770,644 UART: [fht] FMC Alias Private Key: 7
4,772,182 UART: [art] Derive CDI
4,772,997 UART: [art] Store in in slot 0x4
4,830,056 UART: [art] Derive Key Pair
4,831,106 UART: [art] Store priv key in slot 0x5
8,124,202 UART: [art] Derive Key Pair - Done
8,137,106 UART: [art] Signing Cert with AUTHO
8,138,434 UART: RITY.KEYID = 7
10,426,153 UART: [art] Erasing AUTHORITY.KEYID = 7
10,427,663 UART: [art] PUB.X = 3223DDBB37491EB216126AC904FBFC0C45DD740965F2D02E1FAE9061A846883BE4AC79C2A26F71B9D5ED703A41F0EC46
10,434,945 UART: [art] PUB.Y = 5698C6AD24D1A9E954223D01AD3935D5AAA82D4EF0190A2705DCA756A3350BEEAA539DD2814018FF6AA09B9410F82B94
10,442,210 UART: [art] SIG.R = B65A2CD35FBBE630459D354177C48DC000EB42BD041C6D1EA5BD5371FC05BD928943994347714F2E8323EF3A406B2B7C
10,449,585 UART: [art] SIG.S = CD877ACFBAB94A06C6EC75FB7CFAF38E16352EFFAF352AA15CDC49E8A02572953ADC2906D9906D703D4D0ED423452506
11,754,080 UART: mbox::rt_entry...
11,755,055 UART: ____ _ _ _ ____ _____
11,757,044 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,759,058 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,760,992 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,762,920 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,765,056 UART: |_|
11,765,903 UART:
15,334,581 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
15,339,008 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
191,829 UART:
192,211 UART: Running Caliptra ROM ...
193,391 UART:
603,130 UART: [state] CFI Enabled
617,125 UART: [state] LifecycleState = Production
619,360 UART: [state] DebugLocked = Yes
621,575 UART: [state] Starting the WD Timer 40000000 cycles
626,741 UART: [kat] SHA2-256
808,730 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,268 UART: [kat] ++
820,866 UART: [kat] sha1
831,909 UART: [kat] SHA2-256
834,987 UART: [kat] SHA2-384
840,898 UART: [kat] SHA2-512-ACC
843,543 UART: [kat] ECC-384
4,098,379 UART: [kat] HMAC-384Kdf
4,109,902 UART: [kat] LMS
5,183,117 UART: [kat] --
5,189,056 UART: [cold-reset] ++
5,191,140 UART: [fht] FHT @ 0x50003400
5,203,604 UART: [idev] ++
5,204,306 UART: [idev] CDI.KEYID = 6
5,205,486 UART: [idev] SUBJECT.KEYID = 7
5,207,008 UART: [idev] UDS.KEYID = 0
5,208,118 ready_for_fw is high
5,208,303 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
5,307,256 UART: [idev] Erasing UDS.KEYID = 0
8,495,559 UART: [idev] Sha1 KeyId Algorithm
8,516,928 UART: [idev] --
8,521,302 UART: [ldev] ++
8,521,865 UART: [ldev] CDI.KEYID = 6
8,523,010 UART: [ldev] SUBJECT.KEYID = 5
8,524,270 UART: [ldev] AUTHORITY.KEYID = 7
8,525,417 UART: [ldev] FE.KEYID = 1
8,535,653 UART: [ldev] Erasing FE.KEYID = 1
11,828,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,880 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,137,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,153,200 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,169,266 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,188,952 UART: [ldev] --
14,193,506 UART: [fwproc] Wait for Commands...
14,195,967 UART: [fwproc] Recv command 0x46574c44
14,198,265 UART: [fwproc] Recv'd Img size: 78740 bytes
17,872,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,945,530 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,014,267 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,207,498 >>> mbox cmd response: success
18,212,064 UART: [afmc] ++
18,212,876 UART: [afmc] CDI.KEYID = 6
18,213,764 UART: [afmc] SUBJECT.KEYID = 7
18,214,981 UART: [afmc] AUTHORITY.KEYID = 5
21,533,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,831,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,833,387 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,849,336 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,865,500 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,881,535 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,904,965 UART: [afmc] --
23,908,776 UART: [cold-reset] --
23,912,578 UART: [state] Locking Datavault
23,917,817 UART: [state] Locking PCR0, PCR1 and PCR31
23,919,452 UART: [state] Locking ICCM
23,921,410 UART: [exit] Launching FMC @ 0x40000130
23,930,074 UART:
23,930,309 UART: Running Caliptra FMC ...
23,931,406 UART:
23,931,556 UART: [state] CFI Enabled
23,939,542 UART: [fht] FMC Alias Private Key: 7
26,270,011 UART: [art] Extend RT PCRs Done
26,271,248 UART: [art] Lock RT PCRs Done
26,272,710 UART: [art] Populate DV Done
26,278,010 UART: [fht] FMC Alias Private Key: 7
26,279,650 UART: [art] Derive CDI
26,280,463 UART: [art] Store in in slot 0x4
26,323,108 UART: [art] Derive Key Pair
26,324,143 UART: [art] Store priv key in slot 0x5
29,566,091 UART: [art] Derive Key Pair - Done
29,579,242 UART: [art] Signing Cert with AUTHO
29,580,573 UART: RITY.KEYID = 7
31,860,123 UART: [art] Erasing AUTHORITY.KEYID = 7
31,861,636 UART: [art] PUB.X = DD28AB909FD042C6A27BF25654639348C027250BC4B25C83942A6DBB68C88C62E1F95E9E3D423FFA993B542437D1F98F
31,868,889 UART: [art] PUB.Y = E4942AEC87C2007B996F149C6FF8473D0E7B8C79B092CBFFFF75281E44D81C4236B7039DB8ACF1476841E4EB19FB16D7
31,876,123 UART: [art] SIG.R = DD1A419708E8A791852640609C5FFF96D66DE3D9270289DBAACC36CC8518B661480F1684CE9AC6E22CECEFDCFCEAB0FA
31,883,514 UART: [art] SIG.S = DD976B13C2C2C9D0B38181CD80A671E450D1B2BB1AFAEB17798B832F96FF19DD70BBC30309429A16743B0FDFAC5362F3
33,188,250 UART: mbox::rt_entry...
33,189,242 UART: ____ _ _ _ ____ _____
33,191,166 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,193,165 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,195,013 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,196,928 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,198,775 UART: |_|
33,199,649 UART:
33,312,662 UART: [rt] Runtime listening for mailbox commands...
33,314,667 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,315,448 >>> mbox cmd response data (0 bytes)
Initializing fuses
991 UART:
1,236 UART: Running Caliptra ROM ...
2,253 UART:
7,219,340 UART: [state] CFI Enabled
7,234,572 UART: [state] LifecycleState = Production
7,236,344 UART: [state] DebugLocked = Yes
7,238,928 UART: [state] Starting the WD Timer 40000000 cycles
7,243,884 UART: [kat] SHA2-256
7,425,869 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,437,392 UART: [kat] ++
7,437,906 UART: [kat] sha1
7,448,412 UART: [kat] SHA2-256
7,451,435 UART: [kat] SHA2-384
7,456,895 UART: [kat] SHA2-512-ACC
7,459,514 UART: [kat] ECC-384
10,715,440 UART: [kat] HMAC-384Kdf
10,727,988 UART: [kat] LMS
11,801,148 UART: [kat] --
11,806,466 UART: [warm-reset] ++
11,811,759 UART: [warm-reset] --
11,814,818 UART: [state] Locking Datavault
11,818,312 UART: [state] Locking PCR0, PCR1 and PCR31
11,820,462 UART: [state] Locking ICCM
11,823,212 UART: [exit] Launching FMC @ 0x40000130
11,831,838 UART:
11,832,068 UART: Running Caliptra FMC ...
11,833,092 UART:
11,833,234 UART: [state] CFI Enabled
11,835,384 UART: [aliasrt :skip pcr extension
11,836,621 UART: [art] Extend RT PCRs Done
11,837,754 UART: [art] Lock RT PCRs Done
11,838,921 UART: [art] Populate DV Done
11,844,647 UART: [fht] FMC Alias Private Key: 7
11,846,236 UART: [art] Derive CDI
11,846,969 UART: [art] Store in in slot 0x4
11,889,687 UART: [art] Derive Key Pair
11,890,733 UART: [art] Store priv key in slot 0x5
15,133,140 UART: [art] Derive Key Pair - Done
15,146,230 UART: [art] Signing Cert with AUTHO
15,147,567 UART: RITY.KEYID = 7
17,427,105 UART: [art] Erasing AUTHORITY.KEYID = 7
17,428,610 UART: [art] PUB.X = DD28AB909FD042C6A27BF25654639348C027250BC4B25C83942A6DBB68C88C62E1F95E9E3D423FFA993B542437D1F98F
17,435,833 UART: [art] PUB.Y = E4942AEC87C2007B996F149C6FF8473D0E7B8C79B092CBFFFF75281E44D81C4236B7039DB8ACF1476841E4EB19FB16D7
17,443,098 UART: [art] SIG.R = DD1A419708E8A791852640609C5FFF96D66DE3D9270289DBAACC36CC8518B661480F1684CE9AC6E22CECEFDCFCEAB0FA
17,450,500 UART: [art] SIG.S = DD976B13C2C2C9D0B38181CD80A671E450D1B2BB1AFAEB17798B832F96FF19DD70BBC30309429A16743B0FDFAC5362F3
18,755,293 UART: mbox::rt_entry...
18,756,255 UART: ____ _ _ _ ____ _____
18,758,238 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,760,243 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,762,170 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,764,094 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,765,947 UART: |_|
18,766,737 UART:
22,293,248 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
22,297,673 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
191,736 UART:
192,140 UART: Running Caliptra ROM ...
193,319 UART:
602,766 UART: [state] CFI Enabled
617,131 UART: [state] LifecycleState = Production
619,320 UART: [state] DebugLocked = Yes
621,451 UART: [state] Starting the WD Timer 40000000 cycles
627,314 UART: [kat] SHA2-256
809,267 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,807 UART: [kat] ++
821,412 UART: [kat] sha1
831,894 UART: [kat] SHA2-256
834,891 UART: [kat] SHA2-384
841,444 UART: [kat] SHA2-512-ACC
844,027 UART: [kat] ECC-384
4,101,457 UART: [kat] HMAC-384Kdf
4,113,332 UART: [kat] LMS
5,186,499 UART: [kat] --
5,190,794 UART: [cold-reset] ++
5,193,580 UART: [fht] FHT @ 0x50003400
5,204,131 UART: [idev] ++
5,204,842 UART: [idev] CDI.KEYID = 6
5,206,082 UART: [idev] SUBJECT.KEYID = 7
5,207,468 UART: [idev] UDS.KEYID = 0
5,208,722 ready_for_fw is high
5,208,937 <<< Executing mbox cmd 0x46574c44 (78740 bytes) from SoC
5,308,088 UART: [idev] Erasing UDS.KEYID = 0
8,497,277 UART: [idev] Sha1 KeyId Algorithm
8,519,352 UART: [idev] --
8,522,638 UART: [ldev] ++
8,523,255 UART: [ldev] CDI.KEYID = 6
8,524,487 UART: [ldev] SUBJECT.KEYID = 5
8,525,585 UART: [ldev] AUTHORITY.KEYID = 7
8,526,830 UART: [ldev] FE.KEYID = 1
8,539,464 UART: [ldev] Erasing FE.KEYID = 1
11,832,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,847 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,140,203 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,156,236 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,172,286 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,193,522 UART: [ldev] --
14,197,871 UART: [fwproc] Wait for Commands...
14,199,481 UART: [fwproc] Recv command 0x46574c44
14,201,788 UART: [fwproc] Recv'd Img size: 78740 bytes
17,870,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,946,806 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,015,553 UART: [fwproc] Load Runtime at address 0x40005000 len 54036
18,208,472 >>> mbox cmd response: success
18,212,808 UART: [afmc] ++
18,213,444 UART: [afmc] CDI.KEYID = 6
18,214,580 UART: [afmc] SUBJECT.KEYID = 7
18,215,735 UART: [afmc] AUTHORITY.KEYID = 5
21,535,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,830,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,832,951 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,848,952 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,865,071 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,881,128 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,902,947 UART: [afmc] --
23,906,303 UART: [cold-reset] --
23,910,114 UART: [state] Locking Datavault
23,915,308 UART: [state] Locking PCR0, PCR1 and PCR31
23,916,946 UART: [state] Locking ICCM
23,918,226 UART: [exit] Launching FMC @ 0x40000130
23,926,944 UART:
23,927,202 UART: Running Caliptra FMC ...
23,928,300 UART:
23,928,455 UART: [state] CFI Enabled
23,936,346 UART: [fht] FMC Alias Private Key: 7
26,267,726 UART: [art] Extend RT PCRs Done
26,268,944 UART: [art] Lock RT PCRs Done
26,270,555 UART: [art] Populate DV Done
26,275,800 UART: [fht] FMC Alias Private Key: 7
26,277,342 UART: [art] Derive CDI
26,278,154 UART: [art] Store in in slot 0x4
26,320,904 UART: [art] Derive Key Pair
26,321,901 UART: [art] Store priv key in slot 0x5
29,563,298 UART: [art] Derive Key Pair - Done
29,576,394 UART: [art] Signing Cert with AUTHO
29,577,699 UART: RITY.KEYID = 7
31,857,243 UART: [art] Erasing AUTHORITY.KEYID = 7
31,858,762 UART: [art] PUB.X = 53FCB0DAB8069417F8906C21D02C5C0A3CB4F0667E13985F5A8D67DD566A45335C681D7E566534975F6C4FB8D19B139A
31,865,960 UART: [art] PUB.Y = 7032CAC4FB3C9B7F2D8C4C3C91F60B0B6FEE5785A380F30ABFB20C7718511DD7540AB52D11E55F440FB2EAE3967C39CA
31,873,250 UART: [art] SIG.R = 446CE175E0F5CD6D2FB6A5FC9EE85468C9EB86BD63CEFF8DF96FCB069E54962D1FC2C2D9F2979A92A979759925CCB37E
31,880,660 UART: [art] SIG.S = 23B58F0493DC0A5E986ED0E20CB7B473F84D7598AF151FBBDF8E467ED57C1B0B924DEAF61DE98835CDE8D090D8C0EA33
33,185,366 UART: mbox::rt_entry...
33,186,318 UART: ____ _ _ _ ____ _____
33,188,241 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,190,236 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,192,082 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,194,005 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,195,855 UART: |_|
33,196,650 UART:
33,310,695 UART: [rt] Runtime listening for mailbox commands...
33,312,714 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,313,490 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,016 UART:
1,279 UART: Running Caliptra ROM ...
2,380 UART:
7,220,104 UART: [state] CFI Enabled
7,236,276 UART: [state] LifecycleState = Production
7,238,032 UART: [state] DebugLocked = Yes
7,240,050 UART: [state] Starting the WD Timer 40000000 cycles
7,245,188 UART: [kat] SHA2-256
7,427,139 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,438,712 UART: [kat] ++
7,439,304 UART: [kat] sha1
7,449,494 UART: [kat] SHA2-256
7,452,513 UART: [kat] SHA2-384
7,458,277 UART: [kat] SHA2-512-ACC
7,460,899 UART: [kat] ECC-384
10,715,337 UART: [kat] HMAC-384Kdf
10,727,862 UART: [kat] LMS
11,800,978 UART: [kat] --
11,805,195 UART: [warm-reset] ++
11,809,668 UART: [warm-reset] --
11,814,615 UART: [state] Locking Datavault
11,819,067 UART: [state] Locking PCR0, PCR1 and PCR31
11,821,304 UART: [state] Locking ICCM
11,823,630 UART: [exit] Launching FMC @ 0x40000130
11,832,312 UART:
11,832,544 UART: Running Caliptra FMC ...
11,833,638 UART:
11,833,789 UART: [state] CFI Enabled
11,835,618 UART: [aliasrt :skip pcr extension
11,836,868 UART: [art] Extend RT PCRs Done
11,838,005 UART: [art] Lock RT PCRs Done
11,839,344 UART: [art] Populate DV Done
11,844,818 UART: [fht] FMC Alias Private Key: 7
11,846,567 UART: [art] Derive CDI
11,847,371 UART: [art] Store in in slot 0x4
11,889,983 UART: [art] Derive Key Pair
11,890,995 UART: [art] Store priv key in slot 0x5
15,133,658 UART: [art] Derive Key Pair - Done
15,146,605 UART: [art] Signing Cert with AUTHO
15,147,905 UART: RITY.KEYID = 7
17,426,821 UART: [art] Erasing AUTHORITY.KEYID = 7
17,428,327 UART: [art] PUB.X = 53FCB0DAB8069417F8906C21D02C5C0A3CB4F0667E13985F5A8D67DD566A45335C681D7E566534975F6C4FB8D19B139A
17,435,554 UART: [art] PUB.Y = 7032CAC4FB3C9B7F2D8C4C3C91F60B0B6FEE5785A380F30ABFB20C7718511DD7540AB52D11E55F440FB2EAE3967C39CA
17,442,819 UART: [art] SIG.R = 446CE175E0F5CD6D2FB6A5FC9EE85468C9EB86BD63CEFF8DF96FCB069E54962D1FC2C2D9F2979A92A979759925CCB37E
17,450,178 UART: [art] SIG.S = 23B58F0493DC0A5E986ED0E20CB7B473F84D7598AF151FBBDF8E467ED57C1B0B924DEAF61DE98835CDE8D090D8C0EA33
18,754,928 UART: mbox::rt_entry...
18,755,871 UART: ____ _ _ _ ____ _____
18,757,856 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,759,875 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,761,801 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,763,723 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,765,644 UART: |_|
18,766,445 UART:
22,292,468 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
22,296,903 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
191,520 UART:
191,895 UART: Running Caliptra ROM ...
192,992 UART:
193,133 UART: [state] CFI Enabled
262,934 UART: [state] LifecycleState = Production
264,659 UART: [state] DebugLocked = Yes
266,359 UART: [state] Starting the WD Timer 40000000 cycles
270,383 UART: [kat] SHA2-256
449,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,032 UART: [kat] ++
461,484 UART: [kat] sha1
473,444 UART: [kat] SHA2-256
476,448 UART: [kat] SHA2-384
482,434 UART: [kat] SHA2-512-ACC
485,366 UART: [kat] ECC-384
2,950,925 UART: [kat] HMAC-384Kdf
2,972,407 UART: [kat] LMS
3,501,878 UART: [kat] --
3,505,655 UART: [cold-reset] ++
3,507,228 UART: [fht] FHT @ 0x50003400
3,518,503 UART: [idev] ++
3,519,066 UART: [idev] CDI.KEYID = 6
3,519,994 UART: [idev] SUBJECT.KEYID = 7
3,521,168 UART: [idev] UDS.KEYID = 0
3,522,090 ready_for_fw is high
3,522,278 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,621,390 UART: [idev] Erasing UDS.KEYID = 0
6,025,221 UART: [idev] Sha1 KeyId Algorithm
6,047,512 UART: [idev] --
6,051,122 UART: [ldev] ++
6,051,701 UART: [ldev] CDI.KEYID = 6
6,052,583 UART: [ldev] SUBJECT.KEYID = 5
6,053,795 UART: [ldev] AUTHORITY.KEYID = 7
6,055,032 UART: [ldev] FE.KEYID = 1
6,101,137 UART: [ldev] Erasing FE.KEYID = 1
8,603,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,015 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,028 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,849 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,790 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,448 UART: [ldev] --
10,414,386 UART: [fwproc] Wait for Commands...
10,416,859 UART: [fwproc] Recv command 0x46574c44
10,418,949 UART: [fwproc] Recv'd Img size: 78704 bytes
13,434,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,501,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,570,038 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,763,713 >>> mbox cmd response: success
13,767,478 UART: [afmc] ++
13,768,084 UART: [afmc] CDI.KEYID = 6
13,768,995 UART: [afmc] SUBJECT.KEYID = 7
13,770,151 UART: [afmc] AUTHORITY.KEYID = 5
16,294,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,019,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,021,147 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,037,147 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,052,999 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,068,730 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,091,647 UART: [afmc] --
18,095,114 UART: [cold-reset] --
18,098,164 UART: [state] Locking Datavault
18,103,678 UART: [state] Locking PCR0, PCR1 and PCR31
18,105,324 UART: [state] Locking ICCM
18,107,398 UART: [exit] Launching FMC @ 0x40000130
18,115,957 UART:
18,116,234 UART: Running Caliptra FMC ...
18,117,266 UART:
18,117,415 UART: [state] CFI Enabled
18,179,435 UART: [fht] FMC Alias Private Key: 7
19,943,271 UART: [art] Extend RT PCRs Done
19,944,498 UART: [art] Lock RT PCRs Done
19,946,201 UART: [art] Populate DV Done
19,951,737 UART: [fht] FMC Alias Private Key: 7
19,953,443 UART: [art] Derive CDI
19,954,259 UART: [art] Store in in slot 0x4
20,013,189 UART: [art] Derive Key Pair
20,014,247 UART: [art] Store priv key in slot 0x5
22,477,512 UART: [art] Derive Key Pair - Done
22,490,295 UART: [art] Signing Cert with AUTHO
22,491,598 UART: RITY.KEYID = 7
24,203,464 UART: [art] Erasing AUTHORITY.KEYID = 7
24,204,961 UART: [art] PUB.X = 47D9A9FB55D23AF61B33146ABAF95E0BD603EF844E73E80069BA81C0558157F77A7657EA49810EDC2A93F18FCFACB300
24,212,226 UART: [art] PUB.Y = 86742458E857ECFDB605C84C9F681F9C8BAABED6F584CFA30849F28D847597E6E7EA1982DC216D79DCBBDE3C58DE13FC
24,219,523 UART: [art] SIG.R = 42E613736775ECE991983E6CED50642906AF15295A70FB50BA9C1DC4670C7C8999F856D6787D109804EDC660F4B393D8
24,226,888 UART: [art] SIG.S = 19D8D598FB03F859D7DD25937E8F772CADF9EE9460884A8EDDBE2F2CA35CFB55803B0EB3A2192C81DD65D3734C98CAC3
25,204,846 UART: mbox::rt_entry...
25,205,810 UART: ____ _ _ _ ____ _____
25,207,793 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,209,794 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,211,717 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,213,643 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,215,567 UART: |_|
25,216,414 UART:
25,329,345 UART: [rt] Runtime listening for mailbox commands...
25,331,355 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,332,145 >>> mbox cmd response data (0 bytes)
Initializing fuses
995 UART:
1,238 UART: Running Caliptra ROM ...
2,342 UART:
2,515 UART: [state] CFI Enabled
61,275 UART: [state] LifecycleState = Production
62,993 UART: [state] DebugLocked = Yes
64,664 UART: [state] Starting the WD Timer 40000000 cycles
68,642 UART: [kat] SHA2-256
247,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
259,357 UART: [kat] ++
259,880 UART: [kat] sha1
269,414 UART: [kat] SHA2-256
272,468 UART: [kat] SHA2-384
279,250 UART: [kat] SHA2-512-ACC
282,177 UART: [kat] ECC-384
2,725,685 UART: [kat] HMAC-384Kdf
2,748,703 UART: [kat] LMS
3,278,202 UART: [kat] --
3,282,015 UART: [warm-reset] ++
3,286,602 UART: [warm-reset] --
3,291,602 UART: [state] Locking Datavault
3,294,846 UART: [state] Locking PCR0, PCR1 and PCR31
3,296,491 UART: [state] Locking ICCM
3,299,021 UART: [exit] Launching FMC @ 0x40000130
3,307,431 UART:
3,307,669 UART: Running Caliptra FMC ...
3,308,774 UART:
3,308,936 UART: [state] CFI Enabled
3,359,245 UART: [aliasrt :skip pcr extension
3,360,527 UART: [art] Extend RT PCRs Done
3,361,671 UART: [art] Lock RT PCRs Done
3,362,845 UART: [art] Populate DV Done
3,368,358 UART: [fht] FMC Alias Private Key: 7
3,370,056 UART: [art] Derive CDI
3,370,871 UART: [art] Store in in slot 0x4
3,427,989 UART: [art] Derive Key Pair
3,429,036 UART: [art] Store priv key in slot 0x5
5,892,138 UART: [art] Derive Key Pair - Done
5,905,230 UART: [art] Signing Cert with AUTHO
5,906,570 UART: RITY.KEYID = 7
7,617,990 UART: [art] Erasing AUTHORITY.KEYID = 7
7,619,482 UART: [art] PUB.X = 47D9A9FB55D23AF61B33146ABAF95E0BD603EF844E73E80069BA81C0558157F77A7657EA49810EDC2A93F18FCFACB300
7,626,735 UART: [art] PUB.Y = 86742458E857ECFDB605C84C9F681F9C8BAABED6F584CFA30849F28D847597E6E7EA1982DC216D79DCBBDE3C58DE13FC
7,634,040 UART: [art] SIG.R = 42E613736775ECE991983E6CED50642906AF15295A70FB50BA9C1DC4670C7C8999F856D6787D109804EDC660F4B393D8
7,641,397 UART: [art] SIG.S = 19D8D598FB03F859D7DD25937E8F772CADF9EE9460884A8EDDBE2F2CA35CFB55803B0EB3A2192C81DD65D3734C98CAC3
8,620,054 UART: mbox::rt_entry...
8,621,026 UART: ____ _ _ _ ____ _____
8,623,021 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,625,239 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,627,190 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,629,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,631,073 UART: |_|
8,631,912 UART:
11,374,567 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
11,378,989 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,511 UART:
191,879 UART: Running Caliptra ROM ...
192,963 UART:
193,103 UART: [state] CFI Enabled
265,186 UART: [state] LifecycleState = Production
266,920 UART: [state] DebugLocked = Yes
268,765 UART: [state] Starting the WD Timer 40000000 cycles
272,928 UART: [kat] SHA2-256
452,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,667 UART: [kat] ++
464,206 UART: [kat] sha1
474,763 UART: [kat] SHA2-256
477,774 UART: [kat] SHA2-384
484,611 UART: [kat] SHA2-512-ACC
487,570 UART: [kat] ECC-384
2,946,387 UART: [kat] HMAC-384Kdf
2,971,916 UART: [kat] LMS
3,501,411 UART: [kat] --
3,505,149 UART: [cold-reset] ++
3,506,949 UART: [fht] FHT @ 0x50003400
3,518,713 UART: [idev] ++
3,519,277 UART: [idev] CDI.KEYID = 6
3,520,263 UART: [idev] SUBJECT.KEYID = 7
3,521,437 UART: [idev] UDS.KEYID = 0
3,522,364 ready_for_fw is high
3,522,577 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,621,930 UART: [idev] Erasing UDS.KEYID = 0
6,025,320 UART: [idev] Sha1 KeyId Algorithm
6,047,761 UART: [idev] --
6,052,293 UART: [ldev] ++
6,052,882 UART: [ldev] CDI.KEYID = 6
6,053,792 UART: [ldev] SUBJECT.KEYID = 5
6,055,009 UART: [ldev] AUTHORITY.KEYID = 7
6,056,242 UART: [ldev] FE.KEYID = 1
6,098,495 UART: [ldev] Erasing FE.KEYID = 1
8,602,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,023 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,012 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,835 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,797 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,374 UART: [ldev] --
10,413,800 UART: [fwproc] Wait for Commands...
10,416,905 UART: [fwproc] Recv command 0x46574c44
10,418,948 UART: [fwproc] Recv'd Img size: 78704 bytes
13,423,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,497,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,566,574 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,760,462 >>> mbox cmd response: success
13,763,873 UART: [afmc] ++
13,764,484 UART: [afmc] CDI.KEYID = 6
13,765,397 UART: [afmc] SUBJECT.KEYID = 7
13,766,504 UART: [afmc] AUTHORITY.KEYID = 5
16,296,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,019,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,021,298 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,037,277 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,053,189 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,068,886 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,092,745 UART: [afmc] --
18,096,783 UART: [cold-reset] --
18,101,088 UART: [state] Locking Datavault
18,106,406 UART: [state] Locking PCR0, PCR1 and PCR31
18,108,070 UART: [state] Locking ICCM
18,110,226 UART: [exit] Launching FMC @ 0x40000130
18,118,626 UART:
18,118,862 UART: Running Caliptra FMC ...
18,119,961 UART:
18,120,123 UART: [state] CFI Enabled
18,179,415 UART: [fht] FMC Alias Private Key: 7
19,943,352 UART: [art] Extend RT PCRs Done
19,944,571 UART: [art] Lock RT PCRs Done
19,946,139 UART: [art] Populate DV Done
19,951,287 UART: [fht] FMC Alias Private Key: 7
19,952,826 UART: [art] Derive CDI
19,953,641 UART: [art] Store in in slot 0x4
20,012,194 UART: [art] Derive Key Pair
20,013,262 UART: [art] Store priv key in slot 0x5
22,476,092 UART: [art] Derive Key Pair - Done
22,489,057 UART: [art] Signing Cert with AUTHO
22,490,371 UART: RITY.KEYID = 7
24,201,656 UART: [art] Erasing AUTHORITY.KEYID = 7
24,203,162 UART: [art] PUB.X = 1D1B080C79B2B2693057347E5ACC15C7B6CCD146E512098F2EF3D1D597F6BCDDCE22F26BFCB813E7483744D500DB44B2
24,210,458 UART: [art] PUB.Y = 31867B04581F335F78AEFFA7D9BA27E0C08EC40570005A883F1E650CA3767261A88BF2DC85DA90EE8FBAC4E677832851
24,217,685 UART: [art] SIG.R = ABADFC25669457E41CF521B2C8B18540A504DB735F80EDF8FB41AA83810BDB4799923DE84D743F27B43528370F171307
24,225,085 UART: [art] SIG.S = E7F5425E7C6B4E07D14182E4FA4459E15A07B175B6E975C9EF9DDA542C9C8F7AAE81945C2F5B1EE7C93F609B3E2BF26A
25,203,728 UART: mbox::rt_entry...
25,204,682 UART: ____ _ _ _ ____ _____
25,206,608 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,208,607 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,210,460 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,212,594 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,214,534 UART: |_|
25,215,369 UART:
25,328,117 UART: [rt] Runtime listening for mailbox commands...
25,330,144 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,330,933 >>> mbox cmd response data (0 bytes)
Initializing fuses
990 UART:
1,235 UART: Running Caliptra ROM ...
2,343 UART:
2,497 UART: [state] CFI Enabled
60,841 UART: [state] LifecycleState = Production
62,607 UART: [state] DebugLocked = Yes
64,999 UART: [state] Starting the WD Timer 40000000 cycles
69,894 UART: [kat] SHA2-256
249,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
260,628 UART: [kat] ++
261,168 UART: [kat] sha1
271,081 UART: [kat] SHA2-256
274,090 UART: [kat] SHA2-384
280,301 UART: [kat] SHA2-512-ACC
283,232 UART: [kat] ECC-384
2,746,817 UART: [kat] HMAC-384Kdf
2,768,919 UART: [kat] LMS
3,298,393 UART: [kat] --
3,303,963 UART: [warm-reset] ++
3,309,071 UART: [warm-reset] --
3,313,365 UART: [state] Locking Datavault
3,316,287 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,933 UART: [state] Locking ICCM
3,318,921 UART: [exit] Launching FMC @ 0x40000130
3,327,367 UART:
3,327,613 UART: Running Caliptra FMC ...
3,328,641 UART:
3,328,790 UART: [state] CFI Enabled
3,378,613 UART: [aliasrt :skip pcr extension
3,379,880 UART: [art] Extend RT PCRs Done
3,380,944 UART: [art] Lock RT PCRs Done
3,382,115 UART: [art] Populate DV Done
3,387,413 UART: [fht] FMC Alias Private Key: 7
3,389,107 UART: [art] Derive CDI
3,389,843 UART: [art] Store in in slot 0x4
3,447,291 UART: [art] Derive Key Pair
3,448,339 UART: [art] Store priv key in slot 0x5
5,911,137 UART: [art] Derive Key Pair - Done
5,924,241 UART: [art] Signing Cert with AUTHO
5,925,601 UART: RITY.KEYID = 7
7,637,686 UART: [art] Erasing AUTHORITY.KEYID = 7
7,639,196 UART: [art] PUB.X = 1D1B080C79B2B2693057347E5ACC15C7B6CCD146E512098F2EF3D1D597F6BCDDCE22F26BFCB813E7483744D500DB44B2
7,646,474 UART: [art] PUB.Y = 31867B04581F335F78AEFFA7D9BA27E0C08EC40570005A883F1E650CA3767261A88BF2DC85DA90EE8FBAC4E677832851
7,653,719 UART: [art] SIG.R = ABADFC25669457E41CF521B2C8B18540A504DB735F80EDF8FB41AA83810BDB4799923DE84D743F27B43528370F171307
7,661,065 UART: [art] SIG.S = E7F5425E7C6B4E07D14182E4FA4459E15A07B175B6E975C9EF9DDA542C9C8F7AAE81945C2F5B1EE7C93F609B3E2BF26A
8,639,832 UART: mbox::rt_entry...
8,640,773 UART: ____ _ _ _ ____ _____
8,642,755 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,644,757 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,646,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,648,612 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,650,547 UART: |_|
8,651,356 UART:
11,392,673 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
11,397,101 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
191,868 UART:
192,248 UART: Running Caliptra ROM ...
193,372 UART:
603,146 UART: [state] CFI Enabled
617,661 UART: [state] LifecycleState = Production
619,413 UART: [state] DebugLocked = Yes
620,747 UART: [state] Starting the WD Timer 40000000 cycles
625,971 UART: [kat] SHA2-256
805,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,695 UART: [kat] ++
817,143 UART: [kat] sha1
828,108 UART: [kat] SHA2-256
831,111 UART: [kat] SHA2-384
837,662 UART: [kat] SHA2-512-ACC
840,657 UART: [kat] ECC-384
3,282,650 UART: [kat] HMAC-384Kdf
3,294,470 UART: [kat] LMS
3,823,997 UART: [kat] --
3,829,214 UART: [cold-reset] ++
3,830,224 UART: [fht] FHT @ 0x50003400
3,841,195 UART: [idev] ++
3,841,752 UART: [idev] CDI.KEYID = 6
3,842,772 UART: [idev] SUBJECT.KEYID = 7
3,843,864 UART: [idev] UDS.KEYID = 0
3,844,922 ready_for_fw is high
3,845,113 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,944,152 UART: [idev] Erasing UDS.KEYID = 0
6,320,878 UART: [idev] Sha1 KeyId Algorithm
6,342,436 UART: [idev] --
6,346,231 UART: [ldev] ++
6,346,798 UART: [ldev] CDI.KEYID = 6
6,347,727 UART: [ldev] SUBJECT.KEYID = 5
6,348,927 UART: [ldev] AUTHORITY.KEYID = 7
6,350,147 UART: [ldev] FE.KEYID = 1
6,362,135 UART: [ldev] Erasing FE.KEYID = 1
8,843,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,435 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,577,453 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,593,270 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,609,224 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,630,552 UART: [ldev] --
10,636,026 UART: [fwproc] Wait for Commands...
10,638,439 UART: [fwproc] Recv command 0x46574c44
10,640,528 UART: [fwproc] Recv'd Img size: 78704 bytes
13,639,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,711,802 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,780,585 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,974,686 >>> mbox cmd response: success
13,979,841 UART: [afmc] ++
13,980,458 UART: [afmc] CDI.KEYID = 6
13,981,335 UART: [afmc] SUBJECT.KEYID = 7
13,982,432 UART: [afmc] AUTHORITY.KEYID = 5
16,477,441 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,198,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,200,524 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,216,501 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,232,326 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,248,072 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,269,743 UART: [afmc] --
18,272,887 UART: [cold-reset] --
18,276,042 UART: [state] Locking Datavault
18,280,536 UART: [state] Locking PCR0, PCR1 and PCR31
18,282,230 UART: [state] Locking ICCM
18,283,403 UART: [exit] Launching FMC @ 0x40000130
18,291,795 UART:
18,292,022 UART: Running Caliptra FMC ...
18,293,115 UART:
18,293,267 UART: [state] CFI Enabled
18,301,632 UART: [fht] FMC Alias Private Key: 7
20,058,525 UART: [art] Extend RT PCRs Done
20,059,737 UART: [art] Lock RT PCRs Done
20,061,604 UART: [art] Populate DV Done
20,067,103 UART: [fht] FMC Alias Private Key: 7
20,068,747 UART: [art] Derive CDI
20,069,502 UART: [art] Store in in slot 0x4
20,111,958 UART: [art] Derive Key Pair
20,112,991 UART: [art] Store priv key in slot 0x5
22,539,747 UART: [art] Derive Key Pair - Done
22,552,690 UART: [art] Signing Cert with AUTHO
22,553,985 UART: RITY.KEYID = 7
24,259,501 UART: [art] Erasing AUTHORITY.KEYID = 7
24,260,976 UART: [art] PUB.X = 657AF5498C228830210F74EFA74BD1146DD920ED097358E0A204BB81F9CB46F0727532C32D25E3624D83CE466401F26C
24,268,204 UART: [art] PUB.Y = 2368DB6BB6AE0E51705DF16DDF243C3B470E8EE8959424FB505F272B971A97D76F378C1382C7B70BE34A4A4975F529EF
24,275,482 UART: [art] SIG.R = F4D32FAD45177AD9C8A8A520FAF37A18CEF623ECE202E6F7491D481BB1079246A7C8E5BA07771E26C02E87B517373EAD
24,282,869 UART: [art] SIG.S = 6E18948D0B55E1FFB12DC0C297C4B77CAD000D7AD0EAF3AE05C8FAFCC23622E6E31D609F4FC0F8245BFA9BD5B0C899CB
25,261,252 UART: mbox::rt_entry...
25,262,216 UART: ____ _ _ _ ____ _____
25,264,139 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,266,154 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,268,081 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,270,002 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,271,924 UART: |_|
25,272,902 UART:
25,387,452 UART: [rt] Runtime listening for mailbox commands...
25,389,463 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,390,228 >>> mbox cmd response data (0 bytes)
Initializing fuses
966 UART:
1,200 UART: Running Caliptra ROM ...
2,303 UART:
15,138,956 UART: [state] CFI Enabled
15,151,975 UART: [state] LifecycleState = Production
15,153,715 UART: [state] DebugLocked = Yes
15,155,232 UART: [state] Starting the WD Timer 40000000 cycles
15,160,692 UART: [kat] SHA2-256
15,339,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,351,385 UART: [kat] ++
15,351,916 UART: [kat] sha1
15,361,883 UART: [kat] SHA2-256
15,364,945 UART: [kat] SHA2-384
15,371,138 UART: [kat] SHA2-512-ACC
15,374,131 UART: [kat] ECC-384
17,814,801 UART: [kat] HMAC-384Kdf
17,828,534 UART: [kat] LMS
18,358,015 UART: [kat] --
18,362,272 UART: [warm-reset] ++
18,367,711 UART: [warm-reset] --
18,371,471 UART: [state] Locking Datavault
18,373,042 UART: [state] Locking PCR0, PCR1 and PCR31
18,374,680 UART: [state] Locking ICCM
18,375,765 UART: [exit] Launching FMC @ 0x40000130
18,384,219 UART:
18,384,488 UART: Running Caliptra FMC ...
18,385,593 UART:
18,385,744 UART: [state] CFI Enabled
18,387,519 UART: [aliasrt :skip pcr extension
18,388,755 UART: [art] Extend RT PCRs Done
18,389,880 UART: [art] Lock RT PCRs Done
18,391,096 UART: [art] Populate DV Done
18,396,604 UART: [fht] FMC Alias Private Key: 7
18,398,295 UART: [art] Derive CDI
18,399,099 UART: [art] Store in in slot 0x4
18,441,769 UART: [art] Derive Key Pair
18,442,776 UART: [art] Store priv key in slot 0x5
20,869,714 UART: [art] Derive Key Pair - Done
20,882,761 UART: [art] Signing Cert with AUTHO
20,884,079 UART: RITY.KEYID = 7
22,589,467 UART: [art] Erasing AUTHORITY.KEYID = 7
22,590,972 UART: [art] PUB.X = 657AF5498C228830210F74EFA74BD1146DD920ED097358E0A204BB81F9CB46F0727532C32D25E3624D83CE466401F26C
22,598,258 UART: [art] PUB.Y = 2368DB6BB6AE0E51705DF16DDF243C3B470E8EE8959424FB505F272B971A97D76F378C1382C7B70BE34A4A4975F529EF
22,605,525 UART: [art] SIG.R = F4D32FAD45177AD9C8A8A520FAF37A18CEF623ECE202E6F7491D481BB1079246A7C8E5BA07771E26C02E87B517373EAD
22,612,893 UART: [art] SIG.S = 6E18948D0B55E1FFB12DC0C297C4B77CAD000D7AD0EAF3AE05C8FAFCC23622E6E31D609F4FC0F8245BFA9BD5B0C899CB
23,590,824 UART: mbox::rt_entry...
23,591,760 UART: ____ _ _ _ ____ _____
23,593,730 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,595,722 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,597,644 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,599,562 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,601,480 UART: |_|
23,602,281 UART:
26,312,092 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
26,316,524 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
191,812 UART:
192,170 UART: Running Caliptra ROM ...
193,345 UART:
602,836 UART: [state] CFI Enabled
615,812 UART: [state] LifecycleState = Production
617,579 UART: [state] DebugLocked = Yes
620,485 UART: [state] Starting the WD Timer 40000000 cycles
625,518 UART: [kat] SHA2-256
804,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,216 UART: [kat] ++
816,740 UART: [kat] sha1
827,361 UART: [kat] SHA2-256
830,368 UART: [kat] SHA2-384
836,782 UART: [kat] SHA2-512-ACC
839,716 UART: [kat] ECC-384
3,282,537 UART: [kat] HMAC-384Kdf
3,293,978 UART: [kat] LMS
3,823,467 UART: [kat] --
3,828,950 UART: [cold-reset] ++
3,830,480 UART: [fht] FHT @ 0x50003400
3,842,665 UART: [idev] ++
3,843,220 UART: [idev] CDI.KEYID = 6
3,844,202 UART: [idev] SUBJECT.KEYID = 7
3,845,386 UART: [idev] UDS.KEYID = 0
3,846,305 ready_for_fw is high
3,846,486 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,945,369 UART: [idev] Erasing UDS.KEYID = 0
6,320,372 UART: [idev] Sha1 KeyId Algorithm
6,342,422 UART: [idev] --
6,346,469 UART: [ldev] ++
6,347,031 UART: [ldev] CDI.KEYID = 6
6,347,934 UART: [ldev] SUBJECT.KEYID = 5
6,349,135 UART: [ldev] AUTHORITY.KEYID = 7
6,350,358 UART: [ldev] FE.KEYID = 1
6,360,882 UART: [ldev] Erasing FE.KEYID = 1
8,837,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,098 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,573,102 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,588,912 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,604,899 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,624,700 UART: [ldev] --
10,629,805 UART: [fwproc] Wait for Commands...
10,632,213 UART: [fwproc] Recv command 0x46574c44
10,634,259 UART: [fwproc] Recv'd Img size: 78704 bytes
13,631,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,703,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,772,488 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,965,188 >>> mbox cmd response: success
13,968,692 UART: [afmc] ++
13,969,305 UART: [afmc] CDI.KEYID = 6
13,970,223 UART: [afmc] SUBJECT.KEYID = 7
13,971,377 UART: [afmc] AUTHORITY.KEYID = 5
16,471,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,195,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,197,163 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,213,160 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,229,016 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,244,740 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,266,483 UART: [afmc] --
18,269,409 UART: [cold-reset] --
18,271,754 UART: [state] Locking Datavault
18,277,378 UART: [state] Locking PCR0, PCR1 and PCR31
18,279,013 UART: [state] Locking ICCM
18,280,346 UART: [exit] Launching FMC @ 0x40000130
18,288,742 UART:
18,288,976 UART: Running Caliptra FMC ...
18,290,070 UART:
18,290,222 UART: [state] CFI Enabled
18,298,586 UART: [fht] FMC Alias Private Key: 7
20,055,193 UART: [art] Extend RT PCRs Done
20,056,412 UART: [art] Lock RT PCRs Done
20,057,681 UART: [art] Populate DV Done
20,063,096 UART: [fht] FMC Alias Private Key: 7
20,064,652 UART: [art] Derive CDI
20,065,412 UART: [art] Store in in slot 0x4
20,108,080 UART: [art] Derive Key Pair
20,109,259 UART: [art] Store priv key in slot 0x5
22,536,355 UART: [art] Derive Key Pair - Done
22,549,343 UART: [art] Signing Cert with AUTHO
22,550,676 UART: RITY.KEYID = 7
24,255,954 UART: [art] Erasing AUTHORITY.KEYID = 7
24,257,445 UART: [art] PUB.X = 19C4B13A5FDF84653636A7001B927613D202106137B753B14FE136E67705E7075D4B102DF59196E9AA8F1935DB38D1C2
24,264,692 UART: [art] PUB.Y = BA64037DB3F44321BC7C2B1B6B1D8F0384E57484F448D79B84B2EF6C682F43D0E15EE3ECB3628D8C79B0EA0BB3B23CFD
24,271,972 UART: [art] SIG.R = 039E562C8647D809C4D290AD24E5F082144276EBB99D4795A608A811D6B11EB64BB7014479B3598FA95AB1FB7F7BBCEA
24,279,350 UART: [art] SIG.S = 434448399CECAEC16707F1FC000328A399F0901406C96E6F3045A13D718249AB00AE8F2AAD6340DB56A04F773B951948
25,257,804 UART: mbox::rt_entry...
25,258,750 UART: ____ _ _ _ ____ _____
25,260,689 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,262,696 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,264,620 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,266,538 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,268,655 UART: |_|
25,269,466 UART:
25,381,919 UART: [rt] Runtime listening for mailbox commands...
25,383,916 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,384,689 >>> mbox cmd response data (0 bytes)
Initializing fuses
989 UART:
1,229 UART: Running Caliptra ROM ...
2,276 UART:
15,151,753 UART: [state] CFI Enabled
15,164,968 UART: [state] LifecycleState = Production
15,166,696 UART: [state] DebugLocked = Yes
15,169,112 UART: [state] Starting the WD Timer 40000000 cycles
15,174,778 UART: [kat] SHA2-256
15,353,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,365,495 UART: [kat] ++
15,366,040 UART: [kat] sha1
15,375,690 UART: [kat] SHA2-256
15,378,752 UART: [kat] SHA2-384
15,385,163 UART: [kat] SHA2-512-ACC
15,388,106 UART: [kat] ECC-384
17,829,269 UART: [kat] HMAC-384Kdf
17,842,466 UART: [kat] LMS
18,372,021 UART: [kat] --
18,376,934 UART: [warm-reset] ++
18,382,960 UART: [warm-reset] --
18,385,585 UART: [state] Locking Datavault
18,388,235 UART: [state] Locking PCR0, PCR1 and PCR31
18,389,950 UART: [state] Locking ICCM
18,391,854 UART: [exit] Launching FMC @ 0x40000130
18,400,242 UART:
18,400,470 UART: Running Caliptra FMC ...
18,401,560 UART:
18,401,708 UART: [state] CFI Enabled
18,403,697 UART: [aliasrt :skip pcr extension
18,404,934 UART: [art] Extend RT PCRs Done
18,406,063 UART: [art] Lock RT PCRs Done
18,407,174 UART: [art] Populate DV Done
18,412,679 UART: [fht] FMC Alias Private Key: 7
18,414,260 UART: [art] Derive CDI
18,415,065 UART: [art] Store in in slot 0x4
18,457,625 UART: [art] Derive Key Pair
18,458,668 UART: [art] Store priv key in slot 0x5
20,885,565 UART: [art] Derive Key Pair - Done
20,898,576 UART: [art] Signing Cert with AUTHO
20,899,879 UART: RITY.KEYID = 7
22,605,296 UART: [art] Erasing AUTHORITY.KEYID = 7
22,606,787 UART: [art] PUB.X = 19C4B13A5FDF84653636A7001B927613D202106137B753B14FE136E67705E7075D4B102DF59196E9AA8F1935DB38D1C2
22,614,014 UART: [art] PUB.Y = BA64037DB3F44321BC7C2B1B6B1D8F0384E57484F448D79B84B2EF6C682F43D0E15EE3ECB3628D8C79B0EA0BB3B23CFD
22,621,292 UART: [art] SIG.R = 039E562C8647D809C4D290AD24E5F082144276EBB99D4795A608A811D6B11EB64BB7014479B3598FA95AB1FB7F7BBCEA
22,628,670 UART: [art] SIG.S = 434448399CECAEC16707F1FC000328A399F0901406C96E6F3045A13D718249AB00AE8F2AAD6340DB56A04F773B951948
23,607,808 UART: mbox::rt_entry...
23,608,763 UART: ____ _ _ _ ____ _____
23,610,684 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,612,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,614,523 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,616,438 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,618,282 UART: |_|
23,619,098 UART:
26,330,194 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
26,334,644 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
191,577 UART:
191,963 UART: Running Caliptra ROM ...
193,142 UART:
193,298 UART: [state] CFI Enabled
268,303 UART: [state] LifecycleState = Production
270,029 UART: [state] DebugLocked = Yes
272,967 UART: [state] Starting the WD Timer 40000000 cycles
278,056 UART: [kat] SHA2-256
457,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
468,780 UART: [kat] ++
469,309 UART: [kat] sha1
479,013 UART: [kat] SHA2-256
482,029 UART: [kat] SHA2-384
489,192 UART: [kat] SHA2-512-ACC
492,098 UART: [kat] ECC-384
2,947,601 UART: [kat] HMAC-384Kdf
2,971,093 UART: [kat] LMS
3,500,594 UART: [kat] --
3,505,603 UART: [cold-reset] ++
3,506,681 UART: [fht] FHT @ 0x50003400
3,518,795 UART: [idev] ++
3,519,358 UART: [idev] CDI.KEYID = 6
3,520,290 UART: [idev] SUBJECT.KEYID = 7
3,521,468 UART: [idev] UDS.KEYID = 0
3,522,393 ready_for_fw is high
3,522,595 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,622,161 UART: [idev] Erasing UDS.KEYID = 0
6,026,740 UART: [idev] Sha1 KeyId Algorithm
6,050,176 UART: [idev] --
6,054,605 UART: [ldev] ++
6,055,176 UART: [ldev] CDI.KEYID = 6
6,056,092 UART: [ldev] SUBJECT.KEYID = 5
6,057,258 UART: [ldev] AUTHORITY.KEYID = 7
6,058,495 UART: [ldev] FE.KEYID = 1
6,102,782 UART: [ldev] Erasing FE.KEYID = 1
8,603,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,412 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,399 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,235 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,189 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,411,539 UART: [ldev] --
10,415,807 UART: [fwproc] Wait for Commands...
10,417,306 UART: [fwproc] Recv command 0x46574c44
10,419,400 UART: [fwproc] Recv'd Img size: 78704 bytes
13,414,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,481,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,550,049 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,743,897 >>> mbox cmd response: success
13,748,723 UART: [afmc] ++
13,749,343 UART: [afmc] CDI.KEYID = 6
13,750,260 UART: [afmc] SUBJECT.KEYID = 7
13,751,420 UART: [afmc] AUTHORITY.KEYID = 5
16,279,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,020,548 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,022,424 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,038,411 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,054,281 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,070,026 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,091,723 UART: [afmc] --
18,094,782 UART: [cold-reset] --
18,099,410 UART: [state] Locking Datavault
18,104,120 UART: [state] Locking PCR0, PCR1 and PCR31
18,105,816 UART: [state] Locking ICCM
18,107,991 UART: [exit] Launching FMC @ 0x40000130
18,116,436 UART:
18,116,677 UART: Running Caliptra FMC ...
18,117,700 UART:
18,117,847 UART: [state] CFI Enabled
18,178,653 UART: [fht] FMC Alias Private Key: 7
19,943,278 UART: [art] Extend RT PCRs Done
19,944,516 UART: [art] Lock RT PCRs Done
19,946,219 UART: [art] Populate DV Done
19,951,464 UART: [fht] FMC Alias Private Key: 7
19,952,999 UART: [art] Derive CDI
19,953,812 UART: [art] Store in in slot 0x4
20,011,446 UART: [art] Derive Key Pair
20,012,478 UART: [art] Store priv key in slot 0x5
22,475,243 UART: [art] Derive Key Pair - Done
22,488,231 UART: [art] Signing Cert with AUTHO
22,489,561 UART: RITY.KEYID = 7
24,201,570 UART: [art] Erasing AUTHORITY.KEYID = 7
24,203,079 UART: [art] PUB.X = 185E25387B67AC05981182A93A1EF1DFAC1B27CA98053156605E619390CCA38EF46D9EDAA6C0097BF6384BFAB69DEE13
24,210,333 UART: [art] PUB.Y = C9F27ED668B7CC069CBD7FB1B5D5EFF2BA0E1476B24106BFA4AAE415C5CA311C2C868726F53E9A0A95EB2E6FCEB08CC7
24,217,615 UART: [art] SIG.R = 73182266107EE53D8081DA4567A3C10701365DA8BB6C44027BC42BD05AD20CD4701DD012266622598CA573399B1EF1C6
24,225,011 UART: [art] SIG.S = 501EF370BBAE66A2109325760607ECA2F83D2A832E551C5B9260CD762EEFAB7EE606AD8EA2FF39248318D6EA75647CE7
25,203,428 UART: mbox::rt_entry...
25,204,392 UART: ____ _ _ _ ____ _____
25,206,375 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,208,578 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,210,524 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,212,457 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,214,383 UART: |_|
25,215,216 UART:
25,329,147 UART: [rt] Runtime listening for mailbox commands...
25,331,156 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,331,931 >>> mbox cmd response data (0 bytes)
Initializing fuses
991 UART:
1,226 UART: Running Caliptra ROM ...
2,329 UART:
2,482 UART: [state] CFI Enabled
60,812 UART: [state] LifecycleState = Production
62,595 UART: [state] DebugLocked = Yes
65,204 UART: [state] Starting the WD Timer 40000000 cycles
70,309 UART: [kat] SHA2-256
249,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
261,034 UART: [kat] ++
261,563 UART: [kat] sha1
272,825 UART: [kat] SHA2-256
275,827 UART: [kat] SHA2-384
282,651 UART: [kat] SHA2-512-ACC
285,589 UART: [kat] ECC-384
2,745,693 UART: [kat] HMAC-384Kdf
2,767,649 UART: [kat] LMS
3,297,135 UART: [kat] --
3,301,960 UART: [warm-reset] ++
3,306,319 UART: [warm-reset] --
3,311,258 UART: [state] Locking Datavault
3,314,761 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,338 UART: [state] Locking ICCM
3,318,574 UART: [exit] Launching FMC @ 0x40000130
3,326,978 UART:
3,327,212 UART: Running Caliptra FMC ...
3,328,239 UART:
3,328,387 UART: [state] CFI Enabled
3,377,406 UART: [aliasrt :skip pcr extension
3,378,656 UART: [art] Extend RT PCRs Done
3,379,719 UART: [art] Lock RT PCRs Done
3,381,266 UART: [art] Populate DV Done
3,386,940 UART: [fht] FMC Alias Private Key: 7
3,388,528 UART: [art] Derive CDI
3,389,345 UART: [art] Store in in slot 0x4
3,446,080 UART: [art] Derive Key Pair
3,447,132 UART: [art] Store priv key in slot 0x5
5,910,292 UART: [art] Derive Key Pair - Done
5,923,392 UART: [art] Signing Cert with AUTHO
5,924,692 UART: RITY.KEYID = 7
7,635,344 UART: [art] Erasing AUTHORITY.KEYID = 7
7,636,851 UART: [art] PUB.X = 185E25387B67AC05981182A93A1EF1DFAC1B27CA98053156605E619390CCA38EF46D9EDAA6C0097BF6384BFAB69DEE13
7,644,155 UART: [art] PUB.Y = C9F27ED668B7CC069CBD7FB1B5D5EFF2BA0E1476B24106BFA4AAE415C5CA311C2C868726F53E9A0A95EB2E6FCEB08CC7
7,651,432 UART: [art] SIG.R = 73182266107EE53D8081DA4567A3C10701365DA8BB6C44027BC42BD05AD20CD4701DD012266622598CA573399B1EF1C6
7,658,766 UART: [art] SIG.S = 501EF370BBAE66A2109325760607ECA2F83D2A832E551C5B9260CD762EEFAB7EE606AD8EA2FF39248318D6EA75647CE7
8,637,574 UART: mbox::rt_entry...
8,638,517 UART: ____ _ _ _ ____ _____
8,640,496 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,642,501 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,644,436 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,646,365 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,648,296 UART: |_|
8,649,129 UART:
11,390,522 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
11,395,098 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
191,940 UART:
192,321 UART: Running Caliptra ROM ...
193,506 UART:
603,145 UART: [state] CFI Enabled
620,064 UART: [state] LifecycleState = Production
621,819 UART: [state] DebugLocked = Yes
623,515 UART: [state] Starting the WD Timer 40000000 cycles
627,605 UART: [kat] SHA2-256
808,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,262 UART: [kat] ++
818,710 UART: [kat] sha1
829,254 UART: [kat] SHA2-256
832,268 UART: [kat] SHA2-384
836,905 UART: [kat] SHA2-512-ACC
839,832 UART: [kat] ECC-384
3,279,427 UART: [kat] HMAC-384Kdf
3,291,943 UART: [kat] LMS
3,821,445 UART: [kat] --
3,824,041 UART: [cold-reset] ++
3,825,687 UART: [fht] FHT @ 0x50003400
3,836,366 UART: [idev] ++
3,836,928 UART: [idev] CDI.KEYID = 6
3,837,835 UART: [idev] SUBJECT.KEYID = 7
3,839,070 UART: [idev] UDS.KEYID = 0
3,839,991 ready_for_fw is high
3,840,194 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
3,939,129 UART: [idev] Erasing UDS.KEYID = 0
6,311,159 UART: [idev] Sha1 KeyId Algorithm
6,334,306 UART: [idev] --
6,338,890 UART: [ldev] ++
6,339,455 UART: [ldev] CDI.KEYID = 6
6,340,358 UART: [ldev] SUBJECT.KEYID = 5
6,341,562 UART: [ldev] AUTHORITY.KEYID = 7
6,342,787 UART: [ldev] FE.KEYID = 1
6,354,940 UART: [ldev] Erasing FE.KEYID = 1
8,828,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,791 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,563,791 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,579,597 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,595,549 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,615,630 UART: [ldev] --
10,619,436 UART: [fwproc] Wait for Commands...
10,621,807 UART: [fwproc] Recv command 0x46574c44
10,623,906 UART: [fwproc] Recv'd Img size: 78704 bytes
13,622,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,695,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,764,581 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
13,957,284 >>> mbox cmd response: success
13,960,692 UART: [afmc] ++
13,961,300 UART: [afmc] CDI.KEYID = 6
13,962,205 UART: [afmc] SUBJECT.KEYID = 7
13,963,416 UART: [afmc] AUTHORITY.KEYID = 5
16,458,804 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,179,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,181,876 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,197,860 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,213,703 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,229,440 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,251,624 UART: [afmc] --
18,255,512 UART: [cold-reset] --
18,259,313 UART: [state] Locking Datavault
18,264,176 UART: [state] Locking PCR0, PCR1 and PCR31
18,265,810 UART: [state] Locking ICCM
18,268,602 UART: [exit] Launching FMC @ 0x40000130
18,276,990 UART:
18,277,220 UART: Running Caliptra FMC ...
18,278,312 UART:
18,278,472 UART: [state] CFI Enabled
18,286,676 UART: [fht] FMC Alias Private Key: 7
20,043,504 UART: [art] Extend RT PCRs Done
20,044,730 UART: [art] Lock RT PCRs Done
20,046,217 UART: [art] Populate DV Done
20,051,570 UART: [fht] FMC Alias Private Key: 7
20,053,221 UART: [art] Derive CDI
20,053,964 UART: [art] Store in in slot 0x4
20,096,657 UART: [art] Derive Key Pair
20,097,728 UART: [art] Store priv key in slot 0x5
22,524,700 UART: [art] Derive Key Pair - Done
22,537,744 UART: [art] Signing Cert with AUTHO
22,539,082 UART: RITY.KEYID = 7
24,244,261 UART: [art] Erasing AUTHORITY.KEYID = 7
24,245,768 UART: [art] PUB.X = 05063D85DBEE4A1955D034E03ED6B5879554E4F44F4D9085163E9F9D3C52E3CDC345144BE809B1A37E1F50FB72081178
24,253,009 UART: [art] PUB.Y = A863D5E335F1072D1E27253D4DEE628D026A11665D65FCD082BD0ABD871994B02B13106DF38497C42FBFC57973D46AFA
24,260,246 UART: [art] SIG.R = 9DD8C6C73B6BEB5C055174C54BA0D534705BE52108DE4077D9CFAEF25A2430EA5E299F333157AD89EFBC504BBA13DC29
24,267,687 UART: [art] SIG.S = 419C11FC140FFC5CB2C65F414AAFCCB66483FF6CE38D26077970E7E294CFD42E149CAC7DE30A67363B9F8D4DACC82332
25,246,290 UART: mbox::rt_entry...
25,247,245 UART: ____ _ _ _ ____ _____
25,249,221 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,251,226 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,253,388 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,255,246 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,257,085 UART: |_|
25,257,906 UART:
25,370,320 UART: [rt] Runtime listening for mailbox commands...
25,372,328 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,373,106 >>> mbox cmd response data (0 bytes)
Initializing fuses
987 UART:
1,231 UART: Running Caliptra ROM ...
2,328 UART:
15,154,403 UART: [state] CFI Enabled
15,169,100 UART: [state] LifecycleState = Production
15,170,874 UART: [state] DebugLocked = Yes
15,173,625 UART: [state] Starting the WD Timer 40000000 cycles
15,178,475 UART: [kat] SHA2-256
15,357,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,369,169 UART: [kat] ++
15,369,618 UART: [kat] sha1
15,381,305 UART: [kat] SHA2-256
15,384,310 UART: [kat] SHA2-384
15,391,422 UART: [kat] SHA2-512-ACC
15,394,354 UART: [kat] ECC-384
17,834,474 UART: [kat] HMAC-384Kdf
17,846,916 UART: [kat] LMS
18,376,479 UART: [kat] --
18,382,489 UART: [warm-reset] ++
18,389,444 UART: [warm-reset] --
18,394,014 UART: [state] Locking Datavault
18,396,508 UART: [state] Locking PCR0, PCR1 and PCR31
18,398,146 UART: [state] Locking ICCM
18,399,801 UART: [exit] Launching FMC @ 0x40000130
18,408,271 UART:
18,408,509 UART: Running Caliptra FMC ...
18,409,605 UART:
18,409,754 UART: [state] CFI Enabled
18,411,746 UART: [aliasrt :skip pcr extension
18,412,982 UART: [art] Extend RT PCRs Done
18,414,106 UART: [art] Lock RT PCRs Done
18,415,164 UART: [art] Populate DV Done
18,420,563 UART: [fht] FMC Alias Private Key: 7
18,422,198 UART: [art] Derive CDI
18,423,006 UART: [art] Store in in slot 0x4
18,465,745 UART: [art] Derive Key Pair
18,466,799 UART: [art] Store priv key in slot 0x5
20,893,557 UART: [art] Derive Key Pair - Done
20,906,818 UART: [art] Signing Cert with AUTHO
20,908,118 UART: RITY.KEYID = 7
22,613,722 UART: [art] Erasing AUTHORITY.KEYID = 7
22,615,227 UART: [art] PUB.X = 05063D85DBEE4A1955D034E03ED6B5879554E4F44F4D9085163E9F9D3C52E3CDC345144BE809B1A37E1F50FB72081178
22,622,465 UART: [art] PUB.Y = A863D5E335F1072D1E27253D4DEE628D026A11665D65FCD082BD0ABD871994B02B13106DF38497C42FBFC57973D46AFA
22,629,735 UART: [art] SIG.R = 9DD8C6C73B6BEB5C055174C54BA0D534705BE52108DE4077D9CFAEF25A2430EA5E299F333157AD89EFBC504BBA13DC29
22,637,145 UART: [art] SIG.S = 419C11FC140FFC5CB2C65F414AAFCCB66483FF6CE38D26077970E7E294CFD42E149CAC7DE30A67363B9F8D4DACC82332
23,616,269 UART: mbox::rt_entry...
23,617,227 UART: ____ _ _ _ ____ _____
23,619,122 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,621,126 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,623,054 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,624,981 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,626,828 UART: |_|
23,627,622 UART:
26,339,946 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
26,344,400 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Production
86,087 UART: [state] DebugLocked = Yes
86,811 UART: [state] Starting the WD Timer 40000000 cycles
88,282 UART: [kat] SHA2-256
891,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,961 UART: [kat] ++
896,113 UART: [kat] sha1
900,491 UART: [kat] SHA2-256
902,431 UART: [kat] SHA2-384
905,210 UART: [kat] SHA2-512-ACC
907,111 UART: [kat] ECC-384
916,730 UART: [kat] HMAC-384Kdf
921,332 UART: [kat] LMS
1,169,644 UART: [kat] --
1,170,723 UART: [cold-reset] ++
1,171,270 UART: [fht] FHT @ 0x50003400
1,174,166 UART: [idev] ++
1,174,334 UART: [idev] CDI.KEYID = 6
1,174,695 UART: [idev] SUBJECT.KEYID = 7
1,175,120 UART: [idev] UDS.KEYID = 0
1,175,466 ready_for_fw is high
1,175,466 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,785 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,991 UART: [idev] --
1,210,104 UART: [ldev] ++
1,210,272 UART: [ldev] CDI.KEYID = 6
1,210,636 UART: [ldev] SUBJECT.KEYID = 5
1,211,063 UART: [ldev] AUTHORITY.KEYID = 7
1,211,526 UART: [ldev] FE.KEYID = 1
1,216,728 UART: [ldev] Erasing FE.KEYID = 1
1,242,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,085 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,779 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,649 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,355 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,483 UART: [ldev] --
1,281,955 UART: [fwproc] Wait for Commands...
1,282,754 UART: [fwproc] Recv command 0x46574c44
1,283,487 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,347 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,736 >>> mbox cmd response: success
2,337,844 UART: [afmc] ++
2,338,012 UART: [afmc] CDI.KEYID = 6
2,338,375 UART: [afmc] SUBJECT.KEYID = 7
2,338,801 UART: [afmc] AUTHORITY.KEYID = 5
2,374,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,485 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,204 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,097 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,804 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,615 UART: [afmc] --
2,417,744 UART: [cold-reset] --
2,418,436 UART: [state] Locking Datavault
2,419,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,197 UART: [state] Locking ICCM
2,420,781 UART: [exit] Launching FMC @ 0x40000130
2,426,110 UART:
2,426,126 UART: Running Caliptra FMC ...
2,426,534 UART:
2,426,588 UART: [state] CFI Enabled
2,436,957 UART: [fht] FMC Alias Private Key: 7
2,544,974 UART: [art] Extend RT PCRs Done
2,545,402 UART: [art] Lock RT PCRs Done
2,546,730 UART: [art] Populate DV Done
2,554,912 UART: [fht] FMC Alias Private Key: 7
2,556,010 UART: [art] Derive CDI
2,556,290 UART: [art] Store in in slot 0x4
2,641,833 UART: [art] Derive Key Pair
2,642,193 UART: [art] Store priv key in slot 0x5
2,655,035 UART: [art] Derive Key Pair - Done
2,669,459 UART: [art] Signing Cert with AUTHO
2,669,939 UART: RITY.KEYID = 7
2,684,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,634 UART: [art] PUB.X = C4CF7C6B0BCE64B16FCDD86BB0D6F311354BD768C73C40CF33D12BB868C864BC534DCB3A9CDB9388DD48C781097A6CE4
2,692,420 UART: [art] PUB.Y = 7562011ABDA2B798D29B8CFBF09BB7AB9B07AC3ACBFFB07EE9604229386FA0D76FA20EFFFF5B00B097EF9419A6DFD810
2,699,365 UART: [art] SIG.R = 679E6AE722DDD64313067E53D2A7308AFB64C523562C6B1AA65BC02FBDD8B810D0AD88F0310A592F1DD00379B1BE7FE4
2,706,138 UART: [art] SIG.S = DBEEE7F6270B43A21EA886F58A0D608FF1B2DED5C0E7384B8CFA3D7A57FBF89CDECAE93AA8CEE0E01982818D02A205D5
2,730,317 UART: mbox::rt_entry...
2,730,689 UART: ____ _ _ _ ____ _____
2,731,473 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,273 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,041 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,809 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,577 UART: |_|
2,734,889 UART:
2,841,571 UART: [rt] Runtime listening for mailbox commands...
2,842,333 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,553 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,647 UART:
2,842,663 UART: Running Caliptra ROM ...
2,843,071 UART:
2,843,126 UART: [state] CFI Enabled
2,845,991 UART: [state] LifecycleState = Production
2,846,599 UART: [state] DebugLocked = Yes
2,847,275 UART: [state] Starting the WD Timer 40000000 cycles
2,848,976 UART: [kat] SHA2-256
3,652,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,655 UART: [kat] ++
3,656,807 UART: [kat] sha1
3,661,027 UART: [kat] SHA2-256
3,662,967 UART: [kat] SHA2-384
3,665,828 UART: [kat] SHA2-512-ACC
3,667,729 UART: [kat] ECC-384
3,677,350 UART: [kat] HMAC-384Kdf
3,681,766 UART: [kat] LMS
3,930,078 UART: [kat] --
3,930,942 UART: [warm-reset] ++
3,932,067 UART: [warm-reset] --
3,932,946 UART: [state] Locking Datavault
3,933,744 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,348 UART: [state] Locking ICCM
3,934,914 UART: [exit] Launching FMC @ 0x40000130
3,940,243 UART:
3,940,259 UART: Running Caliptra FMC ...
3,940,667 UART:
3,940,721 UART: [state] CFI Enabled
3,942,086 UART: [aliasrt :skip pcr extension
3,942,559 UART: [art] Extend RT PCRs Done
3,942,987 UART: [art] Lock RT PCRs Done
3,944,008 UART: [art] Populate DV Done
3,952,158 UART: [fht] FMC Alias Private Key: 7
3,953,126 UART: [art] Derive CDI
3,953,406 UART: [art] Store in in slot 0x4
4,039,353 UART: [art] Derive Key Pair
4,039,713 UART: [art] Store priv key in slot 0x5
4,052,973 UART: [art] Derive Key Pair - Done
4,067,615 UART: [art] Signing Cert with AUTHO
4,068,095 UART: RITY.KEYID = 7
4,083,857 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,622 UART: [art] PUB.X = C4CF7C6B0BCE64B16FCDD86BB0D6F311354BD768C73C40CF33D12BB868C864BC534DCB3A9CDB9388DD48C781097A6CE4
4,091,408 UART: [art] PUB.Y = 7562011ABDA2B798D29B8CFBF09BB7AB9B07AC3ACBFFB07EE9604229386FA0D76FA20EFFFF5B00B097EF9419A6DFD810
4,098,353 UART: [art] SIG.R = 679E6AE722DDD64313067E53D2A7308AFB64C523562C6B1AA65BC02FBDD8B810D0AD88F0310A592F1DD00379B1BE7FE4
4,105,126 UART: [art] SIG.S = DBEEE7F6270B43A21EA886F58A0D608FF1B2DED5C0E7384B8CFA3D7A57FBF89CDECAE93AA8CEE0E01982818D02A205D5
4,128,995 UART: mbox::rt_entry...
4,129,367 UART: ____ _ _ _ ____ _____
4,130,151 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,951 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,719 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,487 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,255 UART: |_|
4,133,567 UART:
4,424,662 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,426,806 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,991 UART: [state] LifecycleState = Production
85,599 UART: [state] DebugLocked = Yes
86,141 UART: [state] Starting the WD Timer 40000000 cycles
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,390 UART: [fht] FHT @ 0x50003400
1,173,064 UART: [idev] ++
1,173,232 UART: [idev] CDI.KEYID = 6
1,173,593 UART: [idev] SUBJECT.KEYID = 7
1,174,018 UART: [idev] UDS.KEYID = 0
1,174,364 ready_for_fw is high
1,174,364 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,601 UART: [idev] Erasing UDS.KEYID = 0
1,199,194 UART: [idev] Sha1 KeyId Algorithm
1,208,211 UART: [idev] --
1,209,050 UART: [ldev] ++
1,209,218 UART: [ldev] CDI.KEYID = 6
1,209,582 UART: [ldev] SUBJECT.KEYID = 5
1,210,009 UART: [ldev] AUTHORITY.KEYID = 7
1,210,472 UART: [ldev] FE.KEYID = 1
1,215,404 UART: [ldev] Erasing FE.KEYID = 1
1,241,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,563 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,257 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,127 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,833 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,905 UART: [ldev] --
1,280,311 UART: [fwproc] Wait for Commands...
1,280,970 UART: [fwproc] Recv command 0x46574c44
1,281,703 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,029 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,480 >>> mbox cmd response: success
2,336,742 UART: [afmc] ++
2,336,910 UART: [afmc] CDI.KEYID = 6
2,337,273 UART: [afmc] SUBJECT.KEYID = 7
2,337,699 UART: [afmc] AUTHORITY.KEYID = 5
2,373,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,795 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,514 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,407 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,114 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,875 UART: [afmc] --
2,416,894 UART: [cold-reset] --
2,417,644 UART: [state] Locking Datavault
2,418,965 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,569 UART: [state] Locking ICCM
2,420,039 UART: [exit] Launching FMC @ 0x40000130
2,425,368 UART:
2,425,384 UART: Running Caliptra FMC ...
2,425,792 UART:
2,425,846 UART: [state] CFI Enabled
2,436,461 UART: [fht] FMC Alias Private Key: 7
2,543,534 UART: [art] Extend RT PCRs Done
2,543,962 UART: [art] Lock RT PCRs Done
2,545,418 UART: [art] Populate DV Done
2,553,702 UART: [fht] FMC Alias Private Key: 7
2,554,834 UART: [art] Derive CDI
2,555,114 UART: [art] Store in in slot 0x4
2,640,903 UART: [art] Derive Key Pair
2,641,263 UART: [art] Store priv key in slot 0x5
2,654,763 UART: [art] Derive Key Pair - Done
2,669,265 UART: [art] Signing Cert with AUTHO
2,669,745 UART: RITY.KEYID = 7
2,685,021 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,786 UART: [art] PUB.X = 25CCC7A8328FF49E1BCC7757452B0773BC6917FF90889D5272AA227792BDE8389923A0499FDD5F54800B432B8FF26FAC
2,692,554 UART: [art] PUB.Y = 756C8D80B7C3F3593DD06225DA837ADCBD044983CC3DF7C013D23D497FF0AB1E320E5B922C94FF47C8161F5B089E306C
2,699,505 UART: [art] SIG.R = 248E34D6294B359C740305F662A38D32DA02B5448156750CE90E1AE7BF73A5256D250F1C9AEB21683A8232B473C932C7
2,706,251 UART: [art] SIG.S = D0DCE5BE85363120F4183E5F8586CDC1B72100FBD5A6E2D86EC906DAABC4410CC57D4E7DEF00759D3144C3F26482B276
2,730,208 UART: mbox::rt_entry...
2,730,580 UART: ____ _ _ _ ____ _____
2,731,364 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,164 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,932 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,700 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,468 UART: |_|
2,734,780 UART:
2,841,942 UART: [rt] Runtime listening for mailbox commands...
2,842,704 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,924 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,018 UART:
2,843,034 UART: Running Caliptra ROM ...
2,843,442 UART:
2,843,497 UART: [state] CFI Enabled
2,846,024 UART: [state] LifecycleState = Production
2,846,632 UART: [state] DebugLocked = Yes
2,847,314 UART: [state] Starting the WD Timer 40000000 cycles
2,848,967 UART: [kat] SHA2-256
3,652,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,646 UART: [kat] ++
3,656,798 UART: [kat] sha1
3,660,996 UART: [kat] SHA2-256
3,662,936 UART: [kat] SHA2-384
3,665,611 UART: [kat] SHA2-512-ACC
3,667,512 UART: [kat] ECC-384
3,677,591 UART: [kat] HMAC-384Kdf
3,681,985 UART: [kat] LMS
3,930,297 UART: [kat] --
3,931,173 UART: [warm-reset] ++
3,932,018 UART: [warm-reset] --
3,932,903 UART: [state] Locking Datavault
3,933,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,313 UART: [state] Locking ICCM
3,934,907 UART: [exit] Launching FMC @ 0x40000130
3,940,236 UART:
3,940,252 UART: Running Caliptra FMC ...
3,940,660 UART:
3,940,714 UART: [state] CFI Enabled
3,941,929 UART: [aliasrt :skip pcr extension
3,942,402 UART: [art] Extend RT PCRs Done
3,942,830 UART: [art] Lock RT PCRs Done
3,944,093 UART: [art] Populate DV Done
3,952,299 UART: [fht] FMC Alias Private Key: 7
3,953,343 UART: [art] Derive CDI
3,953,623 UART: [art] Store in in slot 0x4
4,039,356 UART: [art] Derive Key Pair
4,039,716 UART: [art] Store priv key in slot 0x5
4,052,546 UART: [art] Derive Key Pair - Done
4,067,000 UART: [art] Signing Cert with AUTHO
4,067,480 UART: RITY.KEYID = 7
4,082,866 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,631 UART: [art] PUB.X = 25CCC7A8328FF49E1BCC7757452B0773BC6917FF90889D5272AA227792BDE8389923A0499FDD5F54800B432B8FF26FAC
4,090,399 UART: [art] PUB.Y = 756C8D80B7C3F3593DD06225DA837ADCBD044983CC3DF7C013D23D497FF0AB1E320E5B922C94FF47C8161F5B089E306C
4,097,350 UART: [art] SIG.R = 248E34D6294B359C740305F662A38D32DA02B5448156750CE90E1AE7BF73A5256D250F1C9AEB21683A8232B473C932C7
4,104,096 UART: [art] SIG.S = D0DCE5BE85363120F4183E5F8586CDC1B72100FBD5A6E2D86EC906DAABC4410CC57D4E7DEF00759D3144C3F26482B276
4,127,961 UART: mbox::rt_entry...
4,128,333 UART: ____ _ _ _ ____ _____
4,129,117 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,917 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,685 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,221 UART: |_|
4,132,533 UART:
4,424,104 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,426,138 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Production
86,072 UART: [state] DebugLocked = Yes
86,626 UART: [state] Starting the WD Timer 40000000 cycles
88,307 UART: [kat] SHA2-256
891,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,986 UART: [kat] ++
896,138 UART: [kat] sha1
900,350 UART: [kat] SHA2-256
902,290 UART: [kat] SHA2-384
905,089 UART: [kat] SHA2-512-ACC
906,990 UART: [kat] ECC-384
916,747 UART: [kat] HMAC-384Kdf
921,355 UART: [kat] LMS
1,169,667 UART: [kat] --
1,170,692 UART: [cold-reset] ++
1,171,237 UART: [fht] FHT @ 0x50003400
1,173,919 UART: [idev] ++
1,174,087 UART: [idev] CDI.KEYID = 6
1,174,448 UART: [idev] SUBJECT.KEYID = 7
1,174,873 UART: [idev] UDS.KEYID = 0
1,175,219 ready_for_fw is high
1,175,219 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,868 UART: [idev] Erasing UDS.KEYID = 0
1,200,399 UART: [idev] Sha1 KeyId Algorithm
1,209,056 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,495 UART: [ldev] SUBJECT.KEYID = 5
1,210,922 UART: [ldev] AUTHORITY.KEYID = 7
1,211,385 UART: [ldev] FE.KEYID = 1
1,216,645 UART: [ldev] Erasing FE.KEYID = 1
1,242,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,058 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,928 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,634 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,756 UART: [ldev] --
1,282,170 UART: [fwproc] Wait for Commands...
1,282,883 UART: [fwproc] Recv command 0x46574c44
1,283,616 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,868 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,249 >>> mbox cmd response: success
2,337,415 UART: [afmc] ++
2,337,583 UART: [afmc] CDI.KEYID = 6
2,337,946 UART: [afmc] SUBJECT.KEYID = 7
2,338,372 UART: [afmc] AUTHORITY.KEYID = 5
2,374,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,668 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,387 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,280 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,987 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,922 UART: [afmc] --
2,418,011 UART: [cold-reset] --
2,418,875 UART: [state] Locking Datavault
2,420,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,696 UART: [state] Locking ICCM
2,421,284 UART: [exit] Launching FMC @ 0x40000130
2,426,613 UART:
2,426,629 UART: Running Caliptra FMC ...
2,427,037 UART:
2,427,180 UART: [state] CFI Enabled
2,437,881 UART: [fht] FMC Alias Private Key: 7
2,545,400 UART: [art] Extend RT PCRs Done
2,545,828 UART: [art] Lock RT PCRs Done
2,547,496 UART: [art] Populate DV Done
2,555,664 UART: [fht] FMC Alias Private Key: 7
2,556,754 UART: [art] Derive CDI
2,557,034 UART: [art] Store in in slot 0x4
2,642,449 UART: [art] Derive Key Pair
2,642,809 UART: [art] Store priv key in slot 0x5
2,656,231 UART: [art] Derive Key Pair - Done
2,670,826 UART: [art] Signing Cert with AUTHO
2,671,306 UART: RITY.KEYID = 7
2,686,760 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,525 UART: [art] PUB.X = 3C310DE6137599AA5D8F59BA0F6DF005E4B1EEB12B7DFC266940E83577861B6554ACEBBA92CCD03A19399E22942FEAD5
2,694,300 UART: [art] PUB.Y = C0FC867A5B49466C9B60302F788C0A3B3C9C9E67D94987917FC2DBF179A0DEBC0011B1790F93272F409B9C04EC3F6DAD
2,701,229 UART: [art] SIG.R = 3D4179137CB1C3F305F2023EA9C443C50BFDBA1A71B82475044DAEBFA4AA14FF9E5BBB0DF1D4CC8189E9076F1E8159A0
2,707,999 UART: [art] SIG.S = 6594BC35BC6E1C625CB51FC88AA75AE1F552D5F037F55D2CFE09522DE081C6AE594125B46995657F9D0864176E92F9E9
2,731,570 UART: mbox::rt_entry...
2,731,942 UART: ____ _ _ _ ____ _____
2,732,726 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,526 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,294 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,062 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,830 UART: |_|
2,736,142 UART:
2,842,303 UART: [rt] Runtime listening for mailbox commands...
2,843,065 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,285 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,379 UART:
2,843,395 UART: Running Caliptra ROM ...
2,843,803 UART:
2,843,945 UART: [state] CFI Enabled
2,846,572 UART: [state] LifecycleState = Production
2,847,180 UART: [state] DebugLocked = Yes
2,847,832 UART: [state] Starting the WD Timer 40000000 cycles
2,849,479 UART: [kat] SHA2-256
3,653,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,158 UART: [kat] ++
3,657,310 UART: [kat] sha1
3,661,712 UART: [kat] SHA2-256
3,663,652 UART: [kat] SHA2-384
3,666,215 UART: [kat] SHA2-512-ACC
3,668,116 UART: [kat] ECC-384
3,677,873 UART: [kat] HMAC-384Kdf
3,682,517 UART: [kat] LMS
3,930,829 UART: [kat] --
3,931,593 UART: [warm-reset] ++
3,932,502 UART: [warm-reset] --
3,933,301 UART: [state] Locking Datavault
3,934,223 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,827 UART: [state] Locking ICCM
3,935,309 UART: [exit] Launching FMC @ 0x40000130
3,940,638 UART:
3,940,654 UART: Running Caliptra FMC ...
3,941,062 UART:
3,941,205 UART: [state] CFI Enabled
3,942,738 UART: [aliasrt :skip pcr extension
3,943,211 UART: [art] Extend RT PCRs Done
3,943,639 UART: [art] Lock RT PCRs Done
3,944,884 UART: [art] Populate DV Done
3,953,152 UART: [fht] FMC Alias Private Key: 7
3,954,128 UART: [art] Derive CDI
3,954,408 UART: [art] Store in in slot 0x4
4,040,315 UART: [art] Derive Key Pair
4,040,675 UART: [art] Store priv key in slot 0x5
4,054,413 UART: [art] Derive Key Pair - Done
4,069,314 UART: [art] Signing Cert with AUTHO
4,069,794 UART: RITY.KEYID = 7
4,084,582 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,347 UART: [art] PUB.X = 3C310DE6137599AA5D8F59BA0F6DF005E4B1EEB12B7DFC266940E83577861B6554ACEBBA92CCD03A19399E22942FEAD5
4,092,122 UART: [art] PUB.Y = C0FC867A5B49466C9B60302F788C0A3B3C9C9E67D94987917FC2DBF179A0DEBC0011B1790F93272F409B9C04EC3F6DAD
4,099,051 UART: [art] SIG.R = 3D4179137CB1C3F305F2023EA9C443C50BFDBA1A71B82475044DAEBFA4AA14FF9E5BBB0DF1D4CC8189E9076F1E8159A0
4,105,821 UART: [art] SIG.S = 6594BC35BC6E1C625CB51FC88AA75AE1F552D5F037F55D2CFE09522DE081C6AE594125B46995657F9D0864176E92F9E9
4,129,630 UART: mbox::rt_entry...
4,130,002 UART: ____ _ _ _ ____ _____
4,130,786 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,586 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,354 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,122 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,890 UART: |_|
4,134,202 UART:
4,426,970 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,429,196 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,772 UART: [state] LifecycleState = Production
85,380 UART: [state] DebugLocked = Yes
86,026 UART: [state] Starting the WD Timer 40000000 cycles
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
920,889 UART: [kat] LMS
1,169,201 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,163 UART: [idev] ++
1,173,331 UART: [idev] CDI.KEYID = 6
1,173,692 UART: [idev] SUBJECT.KEYID = 7
1,174,117 UART: [idev] UDS.KEYID = 0
1,174,463 ready_for_fw is high
1,174,463 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,192 UART: [idev] Erasing UDS.KEYID = 0
1,199,209 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,263 UART: [ldev] ++
1,209,431 UART: [ldev] CDI.KEYID = 6
1,209,795 UART: [ldev] SUBJECT.KEYID = 5
1,210,222 UART: [ldev] AUTHORITY.KEYID = 7
1,210,685 UART: [ldev] FE.KEYID = 1
1,215,747 UART: [ldev] Erasing FE.KEYID = 1
1,241,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,732 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,426 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,296 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,002 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,970 UART: [ldev] --
1,281,356 UART: [fwproc] Wait for Commands...
1,282,015 UART: [fwproc] Recv command 0x46574c44
1,282,748 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,738 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,015 >>> mbox cmd response: success
2,338,117 UART: [afmc] ++
2,338,285 UART: [afmc] CDI.KEYID = 6
2,338,648 UART: [afmc] SUBJECT.KEYID = 7
2,339,074 UART: [afmc] AUTHORITY.KEYID = 5
2,374,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,692 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,411 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,304 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,011 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,780 UART: [afmc] --
2,417,809 UART: [cold-reset] --
2,418,811 UART: [state] Locking Datavault
2,419,894 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,498 UART: [state] Locking ICCM
2,421,102 UART: [exit] Launching FMC @ 0x40000130
2,426,431 UART:
2,426,447 UART: Running Caliptra FMC ...
2,426,855 UART:
2,426,998 UART: [state] CFI Enabled
2,437,687 UART: [fht] FMC Alias Private Key: 7
2,545,798 UART: [art] Extend RT PCRs Done
2,546,226 UART: [art] Lock RT PCRs Done
2,547,630 UART: [art] Populate DV Done
2,556,024 UART: [fht] FMC Alias Private Key: 7
2,557,168 UART: [art] Derive CDI
2,557,448 UART: [art] Store in in slot 0x4
2,643,215 UART: [art] Derive Key Pair
2,643,575 UART: [art] Store priv key in slot 0x5
2,656,529 UART: [art] Derive Key Pair - Done
2,671,306 UART: [art] Signing Cert with AUTHO
2,671,786 UART: RITY.KEYID = 7
2,686,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,749 UART: [art] PUB.X = 6331A1792A199DE9130293EAB663EF7E225A59745AD7633ADE38389311F466BA8094AB5DBE5C749D6C8EBC11DE01D211
2,694,517 UART: [art] PUB.Y = DDA28DC0A910BAED317F7662EA8AAF709C58D7C93CAA355D029E1F8D74441FA6C688574560C235D87334F8908962A460
2,701,468 UART: [art] SIG.R = 2250CF8929B5C02E6F00D6813BF865BF77652DD5900037CB3D233FAECB39440228D5765E70389224BEE3F6B0C419A776
2,708,189 UART: [art] SIG.S = 202530FFA03173CA1694DC26B3312AF93B9F114B3415E83D188630F59EFFABA07860FC1EA00B4EB61FBD9C5FAE9275A4
2,731,741 UART: mbox::rt_entry...
2,732,113 UART: ____ _ _ _ ____ _____
2,732,897 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,697 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,465 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,233 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,001 UART: |_|
2,736,313 UART:
2,842,370 UART: [rt] Runtime listening for mailbox commands...
2,843,132 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,352 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,446 UART:
2,843,462 UART: Running Caliptra ROM ...
2,843,870 UART:
2,844,012 UART: [state] CFI Enabled
2,846,451 UART: [state] LifecycleState = Production
2,847,059 UART: [state] DebugLocked = Yes
2,847,581 UART: [state] Starting the WD Timer 40000000 cycles
2,849,102 UART: [kat] SHA2-256
3,652,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,781 UART: [kat] ++
3,656,933 UART: [kat] sha1
3,661,147 UART: [kat] SHA2-256
3,663,087 UART: [kat] SHA2-384
3,665,880 UART: [kat] SHA2-512-ACC
3,667,781 UART: [kat] ECC-384
3,677,588 UART: [kat] HMAC-384Kdf
3,682,132 UART: [kat] LMS
3,930,444 UART: [kat] --
3,931,148 UART: [warm-reset] ++
3,932,127 UART: [warm-reset] --
3,932,840 UART: [state] Locking Datavault
3,933,862 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,466 UART: [state] Locking ICCM
3,934,900 UART: [exit] Launching FMC @ 0x40000130
3,940,229 UART:
3,940,245 UART: Running Caliptra FMC ...
3,940,653 UART:
3,940,796 UART: [state] CFI Enabled
3,942,459 UART: [aliasrt :skip pcr extension
3,942,932 UART: [art] Extend RT PCRs Done
3,943,360 UART: [art] Lock RT PCRs Done
3,944,541 UART: [art] Populate DV Done
3,952,679 UART: [fht] FMC Alias Private Key: 7
3,953,673 UART: [art] Derive CDI
3,953,953 UART: [art] Store in in slot 0x4
4,040,020 UART: [art] Derive Key Pair
4,040,380 UART: [art] Store priv key in slot 0x5
4,053,728 UART: [art] Derive Key Pair - Done
4,068,513 UART: [art] Signing Cert with AUTHO
4,068,993 UART: RITY.KEYID = 7
4,084,179 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,944 UART: [art] PUB.X = 6331A1792A199DE9130293EAB663EF7E225A59745AD7633ADE38389311F466BA8094AB5DBE5C749D6C8EBC11DE01D211
4,091,712 UART: [art] PUB.Y = DDA28DC0A910BAED317F7662EA8AAF709C58D7C93CAA355D029E1F8D74441FA6C688574560C235D87334F8908962A460
4,098,663 UART: [art] SIG.R = 2250CF8929B5C02E6F00D6813BF865BF77652DD5900037CB3D233FAECB39440228D5765E70389224BEE3F6B0C419A776
4,105,384 UART: [art] SIG.S = 202530FFA03173CA1694DC26B3312AF93B9F114B3415E83D188630F59EFFABA07860FC1EA00B4EB61FBD9C5FAE9275A4
4,129,152 UART: mbox::rt_entry...
4,129,524 UART: ____ _ _ _ ____ _____
4,130,308 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,108 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,876 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,644 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,412 UART: |_|
4,133,724 UART:
4,428,794 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,430,908 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Production
85,839 UART: [state] DebugLocked = Yes
86,601 UART: [state] Starting the WD Timer 40000000 cycles
88,092 UART: [kat] SHA2-256
891,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,771 UART: [kat] ++
895,923 UART: [kat] sha1
900,169 UART: [kat] SHA2-256
902,109 UART: [kat] SHA2-384
904,872 UART: [kat] SHA2-512-ACC
906,773 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,848 UART: [kat] LMS
1,169,160 UART: [kat] --
1,170,313 UART: [cold-reset] ++
1,170,734 UART: [fht] FHT @ 0x50003400
1,173,468 UART: [idev] ++
1,173,636 UART: [idev] CDI.KEYID = 6
1,173,997 UART: [idev] SUBJECT.KEYID = 7
1,174,422 UART: [idev] UDS.KEYID = 0
1,174,768 ready_for_fw is high
1,174,768 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,379 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,208,037 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,216,000 UART: [ldev] Erasing FE.KEYID = 1
1,242,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,953 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,647 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,517 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,223 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,201 UART: [ldev] --
1,281,511 UART: [fwproc] Wait for Commands...
1,282,184 UART: [fwproc] Recv command 0x46574c44
1,282,917 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,638 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,947 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,270 >>> mbox cmd response: success
2,337,416 UART: [afmc] ++
2,337,584 UART: [afmc] CDI.KEYID = 6
2,337,947 UART: [afmc] SUBJECT.KEYID = 7
2,338,373 UART: [afmc] AUTHORITY.KEYID = 5
2,373,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,865 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,584 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,477 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,184 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,217 UART: [afmc] --
2,417,162 UART: [cold-reset] --
2,417,978 UART: [state] Locking Datavault
2,419,261 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,865 UART: [state] Locking ICCM
2,420,477 UART: [exit] Launching FMC @ 0x40000130
2,425,806 UART:
2,425,822 UART: Running Caliptra FMC ...
2,426,230 UART:
2,426,284 UART: [state] CFI Enabled
2,436,779 UART: [fht] FMC Alias Private Key: 7
2,544,092 UART: [art] Extend RT PCRs Done
2,544,520 UART: [art] Lock RT PCRs Done
2,545,944 UART: [art] Populate DV Done
2,554,266 UART: [fht] FMC Alias Private Key: 7
2,555,314 UART: [art] Derive CDI
2,555,594 UART: [art] Store in in slot 0x4
2,641,401 UART: [art] Derive Key Pair
2,641,761 UART: [art] Store priv key in slot 0x5
2,655,137 UART: [art] Derive Key Pair - Done
2,670,257 UART: [art] Signing Cert with AUTHO
2,670,737 UART: RITY.KEYID = 7
2,685,725 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,490 UART: [art] PUB.X = ED5FEF1A8DA22FF173E6B18DA3906AED62F1C7E8AAF29AF2E0102DB427EA9FB240DFD7F9696BB459BAC4318F4D5CBB74
2,693,290 UART: [art] PUB.Y = 4BD4C87568102D7F3EB5ABD6434B4652D788CF3FF2C94BDE49D36373D13F52317C84FA06E66DDD1F9E3F5F8A4D3A31CF
2,700,253 UART: [art] SIG.R = 0AE9EAFFDEC1CC3D1BEC414AD50A969BAE0D17F985AAFFA2280BE9BA2EFDA2A153D1F3DA4D64BBA2C7F7E218B4F7D0FA
2,707,055 UART: [art] SIG.S = DB7048D0CBE7E81B15354F051BBDED5369F3E45A7B10715651250477132A61E4B7ABC62B782A0E4357439BC2344C59C7
2,730,617 UART: mbox::rt_entry...
2,730,989 UART: ____ _ _ _ ____ _____
2,731,773 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,573 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,341 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,109 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,877 UART: |_|
2,735,189 UART:
2,840,917 UART: [rt] Runtime listening for mailbox commands...
2,841,679 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,899 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,993 UART:
2,842,009 UART: Running Caliptra ROM ...
2,842,417 UART:
2,842,472 UART: [state] CFI Enabled
2,845,213 UART: [state] LifecycleState = Production
2,845,821 UART: [state] DebugLocked = Yes
2,846,425 UART: [state] Starting the WD Timer 40000000 cycles
2,848,076 UART: [kat] SHA2-256
3,651,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,755 UART: [kat] ++
3,655,907 UART: [kat] sha1
3,660,245 UART: [kat] SHA2-256
3,662,185 UART: [kat] SHA2-384
3,664,910 UART: [kat] SHA2-512-ACC
3,666,811 UART: [kat] ECC-384
3,676,486 UART: [kat] HMAC-384Kdf
3,680,892 UART: [kat] LMS
3,929,204 UART: [kat] --
3,929,970 UART: [warm-reset] ++
3,931,093 UART: [warm-reset] --
3,931,814 UART: [state] Locking Datavault
3,932,620 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,224 UART: [state] Locking ICCM
3,933,762 UART: [exit] Launching FMC @ 0x40000130
3,939,091 UART:
3,939,107 UART: Running Caliptra FMC ...
3,939,515 UART:
3,939,569 UART: [state] CFI Enabled
3,940,840 UART: [aliasrt :skip pcr extension
3,941,313 UART: [art] Extend RT PCRs Done
3,941,741 UART: [art] Lock RT PCRs Done
3,943,036 UART: [art] Populate DV Done
3,951,170 UART: [fht] FMC Alias Private Key: 7
3,952,160 UART: [art] Derive CDI
3,952,440 UART: [art] Store in in slot 0x4
4,038,427 UART: [art] Derive Key Pair
4,038,787 UART: [art] Store priv key in slot 0x5
4,052,265 UART: [art] Derive Key Pair - Done
4,066,917 UART: [art] Signing Cert with AUTHO
4,067,397 UART: RITY.KEYID = 7
4,082,277 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,042 UART: [art] PUB.X = ED5FEF1A8DA22FF173E6B18DA3906AED62F1C7E8AAF29AF2E0102DB427EA9FB240DFD7F9696BB459BAC4318F4D5CBB74
4,089,842 UART: [art] PUB.Y = 4BD4C87568102D7F3EB5ABD6434B4652D788CF3FF2C94BDE49D36373D13F52317C84FA06E66DDD1F9E3F5F8A4D3A31CF
4,096,805 UART: [art] SIG.R = 0AE9EAFFDEC1CC3D1BEC414AD50A969BAE0D17F985AAFFA2280BE9BA2EFDA2A153D1F3DA4D64BBA2C7F7E218B4F7D0FA
4,103,607 UART: [art] SIG.S = DB7048D0CBE7E81B15354F051BBDED5369F3E45A7B10715651250477132A61E4B7ABC62B782A0E4357439BC2344C59C7
4,127,423 UART: mbox::rt_entry...
4,127,795 UART: ____ _ _ _ ____ _____
4,128,579 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,379 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,147 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,915 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,683 UART: |_|
4,131,995 UART:
4,423,258 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,425,474 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Production
86,371 UART: [state] DebugLocked = Yes
87,111 UART: [state] Starting the WD Timer 40000000 cycles
88,648 UART: [kat] SHA2-256
892,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,327 UART: [kat] ++
896,479 UART: [kat] sha1
900,747 UART: [kat] SHA2-256
902,687 UART: [kat] SHA2-384
905,430 UART: [kat] SHA2-512-ACC
907,331 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,444 UART: [kat] LMS
1,169,756 UART: [kat] --
1,170,503 UART: [cold-reset] ++
1,170,990 UART: [fht] FHT @ 0x50003400
1,173,674 UART: [idev] ++
1,173,842 UART: [idev] CDI.KEYID = 6
1,174,203 UART: [idev] SUBJECT.KEYID = 7
1,174,628 UART: [idev] UDS.KEYID = 0
1,174,974 ready_for_fw is high
1,174,974 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,855 UART: [idev] Erasing UDS.KEYID = 0
1,199,038 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,209,222 UART: [ldev] ++
1,209,390 UART: [ldev] CDI.KEYID = 6
1,209,754 UART: [ldev] SUBJECT.KEYID = 5
1,210,181 UART: [ldev] AUTHORITY.KEYID = 7
1,210,644 UART: [ldev] FE.KEYID = 1
1,215,762 UART: [ldev] Erasing FE.KEYID = 1
1,241,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,967 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,661 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,531 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,237 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,161 UART: [ldev] --
1,280,563 UART: [fwproc] Wait for Commands...
1,281,214 UART: [fwproc] Recv command 0x46574c44
1,281,947 UART: [fwproc] Recv'd Img size: 78704 bytes
2,196,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,014 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,323 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,334,770 >>> mbox cmd response: success
2,335,868 UART: [afmc] ++
2,336,036 UART: [afmc] CDI.KEYID = 6
2,336,399 UART: [afmc] SUBJECT.KEYID = 7
2,336,825 UART: [afmc] AUTHORITY.KEYID = 5
2,372,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,689 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,408 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,301 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,008 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,765 UART: [afmc] --
2,415,740 UART: [cold-reset] --
2,416,694 UART: [state] Locking Datavault
2,417,765 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,369 UART: [state] Locking ICCM
2,418,877 UART: [exit] Launching FMC @ 0x40000130
2,424,206 UART:
2,424,222 UART: Running Caliptra FMC ...
2,424,630 UART:
2,424,684 UART: [state] CFI Enabled
2,435,133 UART: [fht] FMC Alias Private Key: 7
2,543,502 UART: [art] Extend RT PCRs Done
2,543,930 UART: [art] Lock RT PCRs Done
2,545,664 UART: [art] Populate DV Done
2,554,014 UART: [fht] FMC Alias Private Key: 7
2,554,970 UART: [art] Derive CDI
2,555,250 UART: [art] Store in in slot 0x4
2,641,037 UART: [art] Derive Key Pair
2,641,397 UART: [art] Store priv key in slot 0x5
2,655,079 UART: [art] Derive Key Pair - Done
2,669,724 UART: [art] Signing Cert with AUTHO
2,670,204 UART: RITY.KEYID = 7
2,685,386 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,151 UART: [art] PUB.X = 08639D5FC7F47F7E1EFAACDC9C02FA02E44D177EB2023A3EE34B727500CC59F99A586BEAFF43705DA7339836D0BF038A
2,692,900 UART: [art] PUB.Y = D8FDC91E95C8BCEBC4315EA32D413B7B6F17DD78A0AA2698FE6F707E11D4DC4B8223317D277F3451641B2ACED8FADB19
2,699,870 UART: [art] SIG.R = 5092F16385003A6D44A45AD9FD6128BDCECE8FF0D116561D57A89E9F7D1F3D30837E944FECC2469BBA266B9BA4900D19
2,706,625 UART: [art] SIG.S = 73743C7BF627CCD1B7DED5AEF31C546E6445B20E94330369AED06BCE57FA5A506308DE866F31071271F0BE4F51865850
2,729,898 UART: mbox::rt_entry...
2,730,270 UART: ____ _ _ _ ____ _____
2,731,054 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,854 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,622 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,390 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,158 UART: |_|
2,734,470 UART:
2,840,927 UART: [rt] Runtime listening for mailbox commands...
2,841,689 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,909 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,003 UART:
2,842,019 UART: Running Caliptra ROM ...
2,842,427 UART:
2,842,482 UART: [state] CFI Enabled
2,844,875 UART: [state] LifecycleState = Production
2,845,483 UART: [state] DebugLocked = Yes
2,846,039 UART: [state] Starting the WD Timer 40000000 cycles
2,847,734 UART: [kat] SHA2-256
3,651,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,413 UART: [kat] ++
3,655,565 UART: [kat] sha1
3,659,917 UART: [kat] SHA2-256
3,661,857 UART: [kat] SHA2-384
3,664,710 UART: [kat] SHA2-512-ACC
3,666,611 UART: [kat] ECC-384
3,676,202 UART: [kat] HMAC-384Kdf
3,680,874 UART: [kat] LMS
3,929,186 UART: [kat] --
3,929,890 UART: [warm-reset] ++
3,931,163 UART: [warm-reset] --
3,932,014 UART: [state] Locking Datavault
3,932,662 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,266 UART: [state] Locking ICCM
3,933,732 UART: [exit] Launching FMC @ 0x40000130
3,939,061 UART:
3,939,077 UART: Running Caliptra FMC ...
3,939,485 UART:
3,939,539 UART: [state] CFI Enabled
3,940,914 UART: [aliasrt :skip pcr extension
3,941,387 UART: [art] Extend RT PCRs Done
3,941,815 UART: [art] Lock RT PCRs Done
3,942,970 UART: [art] Populate DV Done
3,951,322 UART: [fht] FMC Alias Private Key: 7
3,952,298 UART: [art] Derive CDI
3,952,578 UART: [art] Store in in slot 0x4
4,038,359 UART: [art] Derive Key Pair
4,038,719 UART: [art] Store priv key in slot 0x5
4,051,509 UART: [art] Derive Key Pair - Done
4,066,250 UART: [art] Signing Cert with AUTHO
4,066,730 UART: RITY.KEYID = 7
4,081,974 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,739 UART: [art] PUB.X = 08639D5FC7F47F7E1EFAACDC9C02FA02E44D177EB2023A3EE34B727500CC59F99A586BEAFF43705DA7339836D0BF038A
4,089,488 UART: [art] PUB.Y = D8FDC91E95C8BCEBC4315EA32D413B7B6F17DD78A0AA2698FE6F707E11D4DC4B8223317D277F3451641B2ACED8FADB19
4,096,458 UART: [art] SIG.R = 5092F16385003A6D44A45AD9FD6128BDCECE8FF0D116561D57A89E9F7D1F3D30837E944FECC2469BBA266B9BA4900D19
4,103,213 UART: [art] SIG.S = 73743C7BF627CCD1B7DED5AEF31C546E6445B20E94330369AED06BCE57FA5A506308DE866F31071271F0BE4F51865850
4,127,234 UART: mbox::rt_entry...
4,127,606 UART: ____ _ _ _ ____ _____
4,128,390 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,190 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,958 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,494 UART: |_|
4,131,806 UART:
4,422,170 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,424,420 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Production
85,732 UART: [state] DebugLocked = Yes
86,348 UART: [state] Starting the WD Timer 40000000 cycles
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,409 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,310 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,219 UART: [idev] ++
1,173,387 UART: [idev] CDI.KEYID = 6
1,173,748 UART: [idev] SUBJECT.KEYID = 7
1,174,173 UART: [idev] UDS.KEYID = 0
1,174,519 ready_for_fw is high
1,174,519 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,200,083 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,089 UART: [ldev] ++
1,210,257 UART: [ldev] CDI.KEYID = 6
1,210,621 UART: [ldev] SUBJECT.KEYID = 5
1,211,048 UART: [ldev] AUTHORITY.KEYID = 7
1,211,511 UART: [ldev] FE.KEYID = 1
1,216,533 UART: [ldev] Erasing FE.KEYID = 1
1,243,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,612 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,306 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,176 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,882 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,002 UART: [ldev] --
1,282,486 UART: [fwproc] Wait for Commands...
1,283,231 UART: [fwproc] Recv command 0x46574c44
1,283,964 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,226,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,255,382 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,643 >>> mbox cmd response: success
2,338,747 UART: [afmc] ++
2,338,915 UART: [afmc] CDI.KEYID = 6
2,339,278 UART: [afmc] SUBJECT.KEYID = 7
2,339,704 UART: [afmc] AUTHORITY.KEYID = 5
2,375,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,580 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,398,299 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,404,192 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,899 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,660 UART: [afmc] --
2,418,551 UART: [cold-reset] --
2,419,627 UART: [state] Locking Datavault
2,420,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,421,280 UART: [state] Locking ICCM
2,421,730 UART: [exit] Launching FMC @ 0x40000130
2,427,059 UART:
2,427,075 UART: Running Caliptra FMC ...
2,427,483 UART:
2,427,626 UART: [state] CFI Enabled
2,438,389 UART: [fht] FMC Alias Private Key: 7
2,546,284 UART: [art] Extend RT PCRs Done
2,546,712 UART: [art] Lock RT PCRs Done
2,548,424 UART: [art] Populate DV Done
2,556,828 UART: [fht] FMC Alias Private Key: 7
2,557,938 UART: [art] Derive CDI
2,558,218 UART: [art] Store in in slot 0x4
2,643,735 UART: [art] Derive Key Pair
2,644,095 UART: [art] Store priv key in slot 0x5
2,657,389 UART: [art] Derive Key Pair - Done
2,672,328 UART: [art] Signing Cert with AUTHO
2,672,808 UART: RITY.KEYID = 7
2,688,600 UART: [art] Erasing AUTHORITY.KEYID = 7
2,689,365 UART: [art] PUB.X = 65733710AD83ACC165EB9D28D800C43FBBD40539BEFA55F6D05EFF122B2E0A8935E67F6EFD9712BA146C8031303F0393
2,696,112 UART: [art] PUB.Y = FE9D2CDE4E4E3CA4526E18A8C5ED3731DAE7FB37B537ED7FEC3BE98F2778324A25F7B57029CB58AF0D87B7ED24842A2E
2,703,081 UART: [art] SIG.R = 362C74E747EAC96EB33A3EA476E2CE17E46CB397FCF1B97079069F5AFCE2EF985D51A167FEA9CA5C61807CDA0E54E325
2,709,863 UART: [art] SIG.S = CA9C6EB35297AFEE123A1CEF8127DB99EB15C8CBE19544CFD331872746277E98D537334E80509B4943153B7924FC0FD0
2,733,577 UART: mbox::rt_entry...
2,733,949 UART: ____ _ _ _ ____ _____
2,734,733 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,735,533 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,736,301 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,737,069 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,737,837 UART: |_|
2,738,149 UART:
2,844,277 UART: [rt] Runtime listening for mailbox commands...
2,845,039 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,845,259 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,353 UART:
2,845,369 UART: Running Caliptra ROM ...
2,845,777 UART:
2,845,919 UART: [state] CFI Enabled
2,848,678 UART: [state] LifecycleState = Production
2,849,286 UART: [state] DebugLocked = Yes
2,850,044 UART: [state] Starting the WD Timer 40000000 cycles
2,851,595 UART: [kat] SHA2-256
3,655,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,274 UART: [kat] ++
3,659,426 UART: [kat] sha1
3,663,726 UART: [kat] SHA2-256
3,665,666 UART: [kat] SHA2-384
3,668,415 UART: [kat] SHA2-512-ACC
3,670,316 UART: [kat] ECC-384
3,680,109 UART: [kat] HMAC-384Kdf
3,684,839 UART: [kat] LMS
3,933,151 UART: [kat] --
3,934,295 UART: [warm-reset] ++
3,935,202 UART: [warm-reset] --
3,936,151 UART: [state] Locking Datavault
3,936,911 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,515 UART: [state] Locking ICCM
3,938,145 UART: [exit] Launching FMC @ 0x40000130
3,943,474 UART:
3,943,490 UART: Running Caliptra FMC ...
3,943,898 UART:
3,944,041 UART: [state] CFI Enabled
3,945,600 UART: [aliasrt :skip pcr extension
3,946,073 UART: [art] Extend RT PCRs Done
3,946,501 UART: [art] Lock RT PCRs Done
3,947,928 UART: [art] Populate DV Done
3,956,252 UART: [fht] FMC Alias Private Key: 7
3,957,344 UART: [art] Derive CDI
3,957,624 UART: [art] Store in in slot 0x4
4,043,369 UART: [art] Derive Key Pair
4,043,729 UART: [art] Store priv key in slot 0x5
4,057,329 UART: [art] Derive Key Pair - Done
4,071,970 UART: [art] Signing Cert with AUTHO
4,072,450 UART: RITY.KEYID = 7
4,088,060 UART: [art] Erasing AUTHORITY.KEYID = 7
4,088,825 UART: [art] PUB.X = 65733710AD83ACC165EB9D28D800C43FBBD40539BEFA55F6D05EFF122B2E0A8935E67F6EFD9712BA146C8031303F0393
4,095,572 UART: [art] PUB.Y = FE9D2CDE4E4E3CA4526E18A8C5ED3731DAE7FB37B537ED7FEC3BE98F2778324A25F7B57029CB58AF0D87B7ED24842A2E
4,102,541 UART: [art] SIG.R = 362C74E747EAC96EB33A3EA476E2CE17E46CB397FCF1B97079069F5AFCE2EF985D51A167FEA9CA5C61807CDA0E54E325
4,109,323 UART: [art] SIG.S = CA9C6EB35297AFEE123A1CEF8127DB99EB15C8CBE19544CFD331872746277E98D537334E80509B4943153B7924FC0FD0
4,133,117 UART: mbox::rt_entry...
4,133,489 UART: ____ _ _ _ ____ _____
4,134,273 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,135,073 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,135,841 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,136,609 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,137,377 UART: |_|
4,137,689 UART:
4,431,246 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,433,276 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,640 UART: [state] LifecycleState = Production
86,248 UART: [state] DebugLocked = Yes
86,894 UART: [state] Starting the WD Timer 40000000 cycles
88,461 UART: [kat] SHA2-256
892,011 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,140 UART: [kat] ++
896,292 UART: [kat] sha1
900,478 UART: [kat] SHA2-256
902,418 UART: [kat] SHA2-384
905,073 UART: [kat] SHA2-512-ACC
906,974 UART: [kat] ECC-384
916,781 UART: [kat] HMAC-384Kdf
921,383 UART: [kat] LMS
1,169,695 UART: [kat] --
1,170,712 UART: [cold-reset] ++
1,171,079 UART: [fht] FHT @ 0x50003400
1,173,675 UART: [idev] ++
1,173,843 UART: [idev] CDI.KEYID = 6
1,174,204 UART: [idev] SUBJECT.KEYID = 7
1,174,629 UART: [idev] UDS.KEYID = 0
1,174,975 ready_for_fw is high
1,174,975 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,159 UART: [idev] Sha1 KeyId Algorithm
1,208,206 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,216,007 UART: [ldev] Erasing FE.KEYID = 1
1,241,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,780 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,474 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,344 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,050 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,068 UART: [ldev] --
1,281,400 UART: [fwproc] Wait for Commands...
1,282,199 UART: [fwproc] Recv command 0x46574c44
1,282,932 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,079 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,388 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,335,757 >>> mbox cmd response: success
2,336,841 UART: [afmc] ++
2,337,009 UART: [afmc] CDI.KEYID = 6
2,337,372 UART: [afmc] SUBJECT.KEYID = 7
2,337,798 UART: [afmc] AUTHORITY.KEYID = 5
2,372,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,720 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,439 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,332 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,039 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,888 UART: [afmc] --
2,415,843 UART: [cold-reset] --
2,416,837 UART: [state] Locking Datavault
2,418,088 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,692 UART: [state] Locking ICCM
2,419,314 UART: [exit] Launching FMC @ 0x40000130
2,424,643 UART:
2,424,659 UART: Running Caliptra FMC ...
2,425,067 UART:
2,425,210 UART: [state] CFI Enabled
2,435,963 UART: [fht] FMC Alias Private Key: 7
2,543,902 UART: [art] Extend RT PCRs Done
2,544,330 UART: [art] Lock RT PCRs Done
2,545,888 UART: [art] Populate DV Done
2,553,938 UART: [fht] FMC Alias Private Key: 7
2,555,056 UART: [art] Derive CDI
2,555,336 UART: [art] Store in in slot 0x4
2,641,239 UART: [art] Derive Key Pair
2,641,599 UART: [art] Store priv key in slot 0x5
2,654,993 UART: [art] Derive Key Pair - Done
2,669,836 UART: [art] Signing Cert with AUTHO
2,670,316 UART: RITY.KEYID = 7
2,685,396 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,161 UART: [art] PUB.X = D8258EF0AA6607F9450A96731D4A9DF073CFA773CAD202F97711DC708815DA5D0B5606741679AB756AD41D23D6686D78
2,692,916 UART: [art] PUB.Y = 088878E5B5CC4A05AB337C5AA7C9C7BA0F9D2628FA49DE0D147C03B9EC0CF7F4F59A39FEE61A627FB937F8E3780ED287
2,699,863 UART: [art] SIG.R = 65D03F608F588D9F14CA51C57E4249B9BF33D10A2A092C124B5A001B31FB8108000BC9CA8A1E384AE189263F1577631A
2,706,577 UART: [art] SIG.S = B23CA053CFD2963DDB97DB321A35B81BBD2FCBE7B9B18E0FF295A3F53D221D2DA7F125E70AA65E84B0B4FD7844819B39
2,730,246 UART: mbox::rt_entry...
2,730,618 UART: ____ _ _ _ ____ _____
2,731,402 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,202 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,970 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,738 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,506 UART: |_|
2,734,818 UART:
2,841,428 UART: [rt] Runtime listening for mailbox commands...
2,842,190 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,410 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,504 UART:
2,842,520 UART: Running Caliptra ROM ...
2,842,928 UART:
2,843,070 UART: [state] CFI Enabled
2,845,973 UART: [state] LifecycleState = Production
2,846,581 UART: [state] DebugLocked = Yes
2,847,191 UART: [state] Starting the WD Timer 40000000 cycles
2,848,700 UART: [kat] SHA2-256
3,652,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,379 UART: [kat] ++
3,656,531 UART: [kat] sha1
3,660,739 UART: [kat] SHA2-256
3,662,679 UART: [kat] SHA2-384
3,665,252 UART: [kat] SHA2-512-ACC
3,667,153 UART: [kat] ECC-384
3,677,062 UART: [kat] HMAC-384Kdf
3,681,764 UART: [kat] LMS
3,930,076 UART: [kat] --
3,930,850 UART: [warm-reset] ++
3,931,833 UART: [warm-reset] --
3,932,518 UART: [state] Locking Datavault
3,933,534 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,138 UART: [state] Locking ICCM
3,934,658 UART: [exit] Launching FMC @ 0x40000130
3,939,987 UART:
3,940,003 UART: Running Caliptra FMC ...
3,940,411 UART:
3,940,554 UART: [state] CFI Enabled
3,942,073 UART: [aliasrt :skip pcr extension
3,942,546 UART: [art] Extend RT PCRs Done
3,942,974 UART: [art] Lock RT PCRs Done
3,944,201 UART: [art] Populate DV Done
3,952,155 UART: [fht] FMC Alias Private Key: 7
3,953,123 UART: [art] Derive CDI
3,953,403 UART: [art] Store in in slot 0x4
4,039,636 UART: [art] Derive Key Pair
4,039,996 UART: [art] Store priv key in slot 0x5
4,052,960 UART: [art] Derive Key Pair - Done
4,067,737 UART: [art] Signing Cert with AUTHO
4,068,217 UART: RITY.KEYID = 7
4,083,485 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,250 UART: [art] PUB.X = D8258EF0AA6607F9450A96731D4A9DF073CFA773CAD202F97711DC708815DA5D0B5606741679AB756AD41D23D6686D78
4,091,005 UART: [art] PUB.Y = 088878E5B5CC4A05AB337C5AA7C9C7BA0F9D2628FA49DE0D147C03B9EC0CF7F4F59A39FEE61A627FB937F8E3780ED287
4,097,952 UART: [art] SIG.R = 65D03F608F588D9F14CA51C57E4249B9BF33D10A2A092C124B5A001B31FB8108000BC9CA8A1E384AE189263F1577631A
4,104,666 UART: [art] SIG.S = B23CA053CFD2963DDB97DB321A35B81BBD2FCBE7B9B18E0FF295A3F53D221D2DA7F125E70AA65E84B0B4FD7844819B39
4,127,423 UART: mbox::rt_entry...
4,127,795 UART: ____ _ _ _ ____ _____
4,128,579 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,379 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,147 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,915 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,683 UART: |_|
4,131,995 UART:
4,422,824 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,424,908 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Production
85,919 UART: [state] DebugLocked = Yes
86,543 UART: [state] Starting the WD Timer 40000000 cycles
88,040 UART: [kat] SHA2-256
891,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,719 UART: [kat] ++
895,871 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,556 UART: [kat] HMAC-384Kdf
921,296 UART: [kat] LMS
1,169,608 UART: [kat] --
1,170,493 UART: [cold-reset] ++
1,171,034 UART: [fht] FHT @ 0x50003400
1,173,764 UART: [idev] ++
1,173,932 UART: [idev] CDI.KEYID = 6
1,174,293 UART: [idev] SUBJECT.KEYID = 7
1,174,718 UART: [idev] UDS.KEYID = 0
1,175,064 ready_for_fw is high
1,175,064 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,183,037 UART: [idev] Erasing UDS.KEYID = 0
1,200,376 UART: [idev] Sha1 KeyId Algorithm
1,209,183 UART: [idev] --
1,210,200 UART: [ldev] ++
1,210,368 UART: [ldev] CDI.KEYID = 6
1,210,732 UART: [ldev] SUBJECT.KEYID = 5
1,211,159 UART: [ldev] AUTHORITY.KEYID = 7
1,211,622 UART: [ldev] FE.KEYID = 1
1,216,710 UART: [ldev] Erasing FE.KEYID = 1
1,243,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,605 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,299 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,169 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,875 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,995 UART: [ldev] --
1,282,311 UART: [fwproc] Wait for Commands...
1,283,078 UART: [fwproc] Recv command 0x46574c44
1,283,811 UART: [fwproc] Recv'd Img size: 78704 bytes
2,198,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,845 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,337,288 >>> mbox cmd response: success
2,338,542 UART: [afmc] ++
2,338,710 UART: [afmc] CDI.KEYID = 6
2,339,073 UART: [afmc] SUBJECT.KEYID = 7
2,339,499 UART: [afmc] AUTHORITY.KEYID = 5
2,374,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,481 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,200 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,093 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,800 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,621 UART: [afmc] --
2,417,742 UART: [cold-reset] --
2,418,530 UART: [state] Locking Datavault
2,419,619 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,223 UART: [state] Locking ICCM
2,420,723 UART: [exit] Launching FMC @ 0x40000130
2,426,052 UART:
2,426,068 UART: Running Caliptra FMC ...
2,426,476 UART:
2,426,530 UART: [state] CFI Enabled
2,437,081 UART: [fht] FMC Alias Private Key: 7
2,544,490 UART: [art] Extend RT PCRs Done
2,544,918 UART: [art] Lock RT PCRs Done
2,546,270 UART: [art] Populate DV Done
2,554,802 UART: [fht] FMC Alias Private Key: 7
2,555,752 UART: [art] Derive CDI
2,556,032 UART: [art] Store in in slot 0x4
2,641,983 UART: [art] Derive Key Pair
2,642,343 UART: [art] Store priv key in slot 0x5
2,656,533 UART: [art] Derive Key Pair - Done
2,671,408 UART: [art] Signing Cert with AUTHO
2,671,888 UART: RITY.KEYID = 7
2,687,296 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,061 UART: [art] PUB.X = 6CE28633A7CBE391F8B1B8CFC878D340E639925FA3F6C4341D03ADFEBAD51AB508003618850D3DCC1304ADF673054ACB
2,694,808 UART: [art] PUB.Y = FF9E5B3B7953AFA5E19C292586DE10F55B480476789AF6C6B0B5497C10F9459F6B864E47DDF7BFFB41A03494224A7BD1
2,701,763 UART: [art] SIG.R = 16EDA7F034B68F21279A2689CA77565FECA79EEA99A678E53B8679AD30848ED1F379E00152381E964E0A3E7A3F192B24
2,708,529 UART: [art] SIG.S = DD817DC44C08DBB202A9842747AD4A508E66AC8C298DEC54EB2A9A17D5937689E0BAF5DC99431DD1354EF7C9B0B89BEC
2,732,478 UART: mbox::rt_entry...
2,732,850 UART: ____ _ _ _ ____ _____
2,733,634 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,434 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,202 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,970 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,738 UART: |_|
2,737,050 UART:
2,843,686 UART: [rt] Runtime listening for mailbox commands...
2,844,448 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,844,668 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,762 UART:
2,844,778 UART: Running Caliptra ROM ...
2,845,186 UART:
2,845,241 UART: [state] CFI Enabled
2,847,732 UART: [state] LifecycleState = Production
2,848,340 UART: [state] DebugLocked = Yes
2,849,088 UART: [state] Starting the WD Timer 40000000 cycles
2,850,609 UART: [kat] SHA2-256
3,654,159 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,288 UART: [kat] ++
3,658,440 UART: [kat] sha1
3,662,646 UART: [kat] SHA2-256
3,664,586 UART: [kat] SHA2-384
3,667,361 UART: [kat] SHA2-512-ACC
3,669,262 UART: [kat] ECC-384
3,678,875 UART: [kat] HMAC-384Kdf
3,683,461 UART: [kat] LMS
3,931,773 UART: [kat] --
3,932,745 UART: [warm-reset] ++
3,933,592 UART: [warm-reset] --
3,934,549 UART: [state] Locking Datavault
3,935,439 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,043 UART: [state] Locking ICCM
3,936,665 UART: [exit] Launching FMC @ 0x40000130
3,941,994 UART:
3,942,010 UART: Running Caliptra FMC ...
3,942,418 UART:
3,942,472 UART: [state] CFI Enabled
3,943,719 UART: [aliasrt :skip pcr extension
3,944,192 UART: [art] Extend RT PCRs Done
3,944,620 UART: [art] Lock RT PCRs Done
3,945,767 UART: [art] Populate DV Done
3,954,063 UART: [fht] FMC Alias Private Key: 7
3,955,133 UART: [art] Derive CDI
3,955,413 UART: [art] Store in in slot 0x4
4,040,780 UART: [art] Derive Key Pair
4,041,140 UART: [art] Store priv key in slot 0x5
4,054,072 UART: [art] Derive Key Pair - Done
4,068,617 UART: [art] Signing Cert with AUTHO
4,069,097 UART: RITY.KEYID = 7
4,084,177 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,942 UART: [art] PUB.X = 6CE28633A7CBE391F8B1B8CFC878D340E639925FA3F6C4341D03ADFEBAD51AB508003618850D3DCC1304ADF673054ACB
4,091,689 UART: [art] PUB.Y = FF9E5B3B7953AFA5E19C292586DE10F55B480476789AF6C6B0B5497C10F9459F6B864E47DDF7BFFB41A03494224A7BD1
4,098,644 UART: [art] SIG.R = 16EDA7F034B68F21279A2689CA77565FECA79EEA99A678E53B8679AD30848ED1F379E00152381E964E0A3E7A3F192B24
4,105,410 UART: [art] SIG.S = DD817DC44C08DBB202A9842747AD4A508E66AC8C298DEC54EB2A9A17D5937689E0BAF5DC99431DD1354EF7C9B0B89BEC
4,129,129 UART: mbox::rt_entry...
4,129,501 UART: ____ _ _ _ ____ _____
4,130,285 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,085 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,853 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,621 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,389 UART: |_|
4,133,701 UART:
4,429,862 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,432,092 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,731 UART: [state] LifecycleState = Production
85,339 UART: [state] DebugLocked = Yes
86,033 UART: [state] Starting the WD Timer 40000000 cycles
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
915,740 UART: [kat] HMAC-384Kdf
920,370 UART: [kat] LMS
1,168,682 UART: [kat] --
1,169,601 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,650 UART: [idev] ++
1,172,818 UART: [idev] CDI.KEYID = 6
1,173,179 UART: [idev] SUBJECT.KEYID = 7
1,173,604 UART: [idev] UDS.KEYID = 0
1,173,950 ready_for_fw is high
1,173,950 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,181,397 UART: [idev] Erasing UDS.KEYID = 0
1,198,058 UART: [idev] Sha1 KeyId Algorithm
1,206,927 UART: [idev] --
1,207,946 UART: [ldev] ++
1,208,114 UART: [ldev] CDI.KEYID = 6
1,208,478 UART: [ldev] SUBJECT.KEYID = 5
1,208,905 UART: [ldev] AUTHORITY.KEYID = 7
1,209,368 UART: [ldev] FE.KEYID = 1
1,214,188 UART: [ldev] Erasing FE.KEYID = 1
1,240,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,009 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,703 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,573 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,279 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,505 UART: [ldev] --
1,279,799 UART: [fwproc] Wait for Commands...
1,280,484 UART: [fwproc] Recv command 0x46574c44
1,281,217 UART: [fwproc] Recv'd Img size: 78704 bytes
2,195,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,175 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,334,560 >>> mbox cmd response: success
2,335,588 UART: [afmc] ++
2,335,756 UART: [afmc] CDI.KEYID = 6
2,336,119 UART: [afmc] SUBJECT.KEYID = 7
2,336,545 UART: [afmc] AUTHORITY.KEYID = 5
2,372,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,539 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,258 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,151 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,858 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,591 UART: [afmc] --
2,415,504 UART: [cold-reset] --
2,416,344 UART: [state] Locking Datavault
2,417,279 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,883 UART: [state] Locking ICCM
2,418,367 UART: [exit] Launching FMC @ 0x40000130
2,423,696 UART:
2,423,712 UART: Running Caliptra FMC ...
2,424,120 UART:
2,424,174 UART: [state] CFI Enabled
2,434,679 UART: [fht] FMC Alias Private Key: 7
2,542,452 UART: [art] Extend RT PCRs Done
2,542,880 UART: [art] Lock RT PCRs Done
2,544,624 UART: [art] Populate DV Done
2,552,570 UART: [fht] FMC Alias Private Key: 7
2,553,600 UART: [art] Derive CDI
2,553,880 UART: [art] Store in in slot 0x4
2,639,207 UART: [art] Derive Key Pair
2,639,567 UART: [art] Store priv key in slot 0x5
2,652,965 UART: [art] Derive Key Pair - Done
2,667,891 UART: [art] Signing Cert with AUTHO
2,668,371 UART: RITY.KEYID = 7
2,684,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,888 UART: [art] PUB.X = C9E4A09052E7BAAD16466266937E67A690889ABCCE63F94DF32D52AFEA577E2E57E2F068101F18B79353C6E66F2B9164
2,691,662 UART: [art] PUB.Y = 6C79E5D6765A27E4B9786CC53F377B464013FE7436A105918F5822BEDC3D117A0CBCE306663DA83119DDAD55F63E275E
2,698,607 UART: [art] SIG.R = 4BAF52D8A0EAAFA5B1D14F4714BAE7F4E087F3D49F87B4E44277224DF563CA45508FFB382153FA88E5DD696F29F605E0
2,705,388 UART: [art] SIG.S = 085A1A9FF7726C142D25427456D4495F7BAB0649427AE2A87230D4EC15381DE5004842DF690498DD9E76E2A75F07DF34
2,729,347 UART: mbox::rt_entry...
2,729,719 UART: ____ _ _ _ ____ _____
2,730,503 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,303 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,071 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,839 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,607 UART: |_|
2,733,919 UART:
2,840,418 UART: [rt] Runtime listening for mailbox commands...
2,841,180 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,400 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,494 UART:
2,841,510 UART: Running Caliptra ROM ...
2,841,918 UART:
2,841,973 UART: [state] CFI Enabled
2,844,266 UART: [state] LifecycleState = Production
2,844,874 UART: [state] DebugLocked = Yes
2,845,574 UART: [state] Starting the WD Timer 40000000 cycles
2,847,143 UART: [kat] SHA2-256
3,650,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,822 UART: [kat] ++
3,654,974 UART: [kat] sha1
3,659,346 UART: [kat] SHA2-256
3,661,286 UART: [kat] SHA2-384
3,664,245 UART: [kat] SHA2-512-ACC
3,666,146 UART: [kat] ECC-384
3,676,053 UART: [kat] HMAC-384Kdf
3,680,607 UART: [kat] LMS
3,928,919 UART: [kat] --
3,929,921 UART: [warm-reset] ++
3,930,862 UART: [warm-reset] --
3,931,803 UART: [state] Locking Datavault
3,932,461 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,065 UART: [state] Locking ICCM
3,933,729 UART: [exit] Launching FMC @ 0x40000130
3,939,058 UART:
3,939,074 UART: Running Caliptra FMC ...
3,939,482 UART:
3,939,536 UART: [state] CFI Enabled
3,940,577 UART: [aliasrt :skip pcr extension
3,941,050 UART: [art] Extend RT PCRs Done
3,941,478 UART: [art] Lock RT PCRs Done
3,942,773 UART: [art] Populate DV Done
3,951,155 UART: [fht] FMC Alias Private Key: 7
3,952,103 UART: [art] Derive CDI
3,952,383 UART: [art] Store in in slot 0x4
4,038,048 UART: [art] Derive Key Pair
4,038,408 UART: [art] Store priv key in slot 0x5
4,050,878 UART: [art] Derive Key Pair - Done
4,065,594 UART: [art] Signing Cert with AUTHO
4,066,074 UART: RITY.KEYID = 7
4,080,958 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,723 UART: [art] PUB.X = C9E4A09052E7BAAD16466266937E67A690889ABCCE63F94DF32D52AFEA577E2E57E2F068101F18B79353C6E66F2B9164
4,088,497 UART: [art] PUB.Y = 6C79E5D6765A27E4B9786CC53F377B464013FE7436A105918F5822BEDC3D117A0CBCE306663DA83119DDAD55F63E275E
4,095,442 UART: [art] SIG.R = 4BAF52D8A0EAAFA5B1D14F4714BAE7F4E087F3D49F87B4E44277224DF563CA45508FFB382153FA88E5DD696F29F605E0
4,102,223 UART: [art] SIG.S = 085A1A9FF7726C142D25427456D4495F7BAB0649427AE2A87230D4EC15381DE5004842DF690498DD9E76E2A75F07DF34
4,125,558 UART: mbox::rt_entry...
4,125,930 UART: ____ _ _ _ ____ _____
4,126,714 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,514 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,282 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,050 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,818 UART: |_|
4,130,130 UART:
4,426,366 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,428,440 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,702 UART: [state] LifecycleState = Production
86,310 UART: [state] DebugLocked = Yes
86,872 UART: [state] Starting the WD Timer 40000000 cycles
88,521 UART: [kat] SHA2-256
892,071 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,200 UART: [kat] ++
896,352 UART: [kat] sha1
900,484 UART: [kat] SHA2-256
902,424 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,789 UART: [kat] LMS
1,169,101 UART: [kat] --
1,169,928 UART: [cold-reset] ++
1,170,377 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 ready_for_fw is high
1,174,327 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,321 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,155 UART: [ldev] ++
1,209,323 UART: [ldev] CDI.KEYID = 6
1,209,687 UART: [ldev] SUBJECT.KEYID = 5
1,210,114 UART: [ldev] AUTHORITY.KEYID = 7
1,210,577 UART: [ldev] FE.KEYID = 1
1,216,011 UART: [ldev] Erasing FE.KEYID = 1
1,241,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,144 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,838 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,708 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,414 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,374 UART: [ldev] --
1,280,656 UART: [fwproc] Wait for Commands...
1,281,271 UART: [fwproc] Recv command 0x46574c44
1,282,004 UART: [fwproc] Recv'd Img size: 78704 bytes
2,195,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,084 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,334,363 >>> mbox cmd response: success
2,335,547 UART: [afmc] ++
2,335,715 UART: [afmc] CDI.KEYID = 6
2,336,078 UART: [afmc] SUBJECT.KEYID = 7
2,336,504 UART: [afmc] AUTHORITY.KEYID = 5
2,371,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,908 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,627 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,520 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,227 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,858 UART: [afmc] --
2,414,967 UART: [cold-reset] --
2,415,619 UART: [state] Locking Datavault
2,416,832 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,436 UART: [state] Locking ICCM
2,418,092 UART: [exit] Launching FMC @ 0x40000130
2,423,421 UART:
2,423,437 UART: Running Caliptra FMC ...
2,423,845 UART:
2,423,988 UART: [state] CFI Enabled
2,434,735 UART: [fht] FMC Alias Private Key: 7
2,542,692 UART: [art] Extend RT PCRs Done
2,543,120 UART: [art] Lock RT PCRs Done
2,544,518 UART: [art] Populate DV Done
2,552,638 UART: [fht] FMC Alias Private Key: 7
2,553,708 UART: [art] Derive CDI
2,553,988 UART: [art] Store in in slot 0x4
2,639,613 UART: [art] Derive Key Pair
2,639,973 UART: [art] Store priv key in slot 0x5
2,653,323 UART: [art] Derive Key Pair - Done
2,668,113 UART: [art] Signing Cert with AUTHO
2,668,593 UART: RITY.KEYID = 7
2,683,527 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,292 UART: [art] PUB.X = 50F0560687B7E25D06218410C9ABB8725256E57AB180E86204C5081248F3302F246C7CDD8899E064F88351A7475D61EB
2,691,038 UART: [art] PUB.Y = 80DC130A5B6118DCF5A9BBD70ADD49DD99F1F00FE5CA49C7D2E8D56EFE2A9115E8607ADE36AD915CA2DBE316D2876FDE
2,698,007 UART: [art] SIG.R = 227EF46201BA71C1A40BE263F4BE0F2824BA3CABBF66291C2B1965D3F63D4E7AB9D9FA8438FAF486A46EBB7D111041AD
2,704,786 UART: [art] SIG.S = 598310066427B7BC6E98818D46309A0D86C4E04D60DB91BC3C1312B5D1B05B546FEB63E230160645B4A774990AEBF2E2
2,728,209 UART: mbox::rt_entry...
2,728,581 UART: ____ _ _ _ ____ _____
2,729,365 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,165 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,933 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,701 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,469 UART: |_|
2,732,781 UART:
2,838,322 UART: [rt] Runtime listening for mailbox commands...
2,839,084 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,839,304 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,398 UART:
2,839,414 UART: Running Caliptra ROM ...
2,839,822 UART:
2,839,964 UART: [state] CFI Enabled
2,843,113 UART: [state] LifecycleState = Production
2,843,721 UART: [state] DebugLocked = Yes
2,844,405 UART: [state] Starting the WD Timer 40000000 cycles
2,845,980 UART: [kat] SHA2-256
3,649,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,659 UART: [kat] ++
3,653,811 UART: [kat] sha1
3,658,015 UART: [kat] SHA2-256
3,659,955 UART: [kat] SHA2-384
3,662,706 UART: [kat] SHA2-512-ACC
3,664,607 UART: [kat] ECC-384
3,674,432 UART: [kat] HMAC-384Kdf
3,678,980 UART: [kat] LMS
3,927,292 UART: [kat] --
3,928,292 UART: [warm-reset] ++
3,928,993 UART: [warm-reset] --
3,929,746 UART: [state] Locking Datavault
3,930,626 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,230 UART: [state] Locking ICCM
3,931,788 UART: [exit] Launching FMC @ 0x40000130
3,937,117 UART:
3,937,133 UART: Running Caliptra FMC ...
3,937,541 UART:
3,937,684 UART: [state] CFI Enabled
3,939,007 UART: [aliasrt :skip pcr extension
3,939,480 UART: [art] Extend RT PCRs Done
3,939,908 UART: [art] Lock RT PCRs Done
3,940,879 UART: [art] Populate DV Done
3,949,279 UART: [fht] FMC Alias Private Key: 7
3,950,229 UART: [art] Derive CDI
3,950,509 UART: [art] Store in in slot 0x4
4,036,520 UART: [art] Derive Key Pair
4,036,880 UART: [art] Store priv key in slot 0x5
4,049,780 UART: [art] Derive Key Pair - Done
4,064,268 UART: [art] Signing Cert with AUTHO
4,064,748 UART: RITY.KEYID = 7
4,079,846 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,611 UART: [art] PUB.X = 50F0560687B7E25D06218410C9ABB8725256E57AB180E86204C5081248F3302F246C7CDD8899E064F88351A7475D61EB
4,087,357 UART: [art] PUB.Y = 80DC130A5B6118DCF5A9BBD70ADD49DD99F1F00FE5CA49C7D2E8D56EFE2A9115E8607ADE36AD915CA2DBE316D2876FDE
4,094,326 UART: [art] SIG.R = 227EF46201BA71C1A40BE263F4BE0F2824BA3CABBF66291C2B1965D3F63D4E7AB9D9FA8438FAF486A46EBB7D111041AD
4,101,105 UART: [art] SIG.S = 598310066427B7BC6E98818D46309A0D86C4E04D60DB91BC3C1312B5D1B05B546FEB63E230160645B4A774990AEBF2E2
4,125,134 UART: mbox::rt_entry...
4,125,506 UART: ____ _ _ _ ____ _____
4,126,290 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,090 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,858 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,626 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,394 UART: |_|
4,129,706 UART:
4,422,674 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,424,878 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Production
85,620 UART: [state] DebugLocked = Yes
86,138 UART: [state] Starting the WD Timer 40000000 cycles
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,282 UART: [kat] ++
895,434 UART: [kat] sha1
899,630 UART: [kat] SHA2-256
901,570 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,655 UART: [fht] FHT @ 0x50003400
1,173,309 UART: [idev] ++
1,173,477 UART: [idev] CDI.KEYID = 6
1,173,838 UART: [idev] SUBJECT.KEYID = 7
1,174,263 UART: [idev] UDS.KEYID = 0
1,174,609 ready_for_fw is high
1,174,609 <<< Executing mbox cmd 0x46574c44 (78704 bytes) from SoC
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,263 UART: [idev] Sha1 KeyId Algorithm
1,207,978 UART: [idev] --
1,209,019 UART: [ldev] ++
1,209,187 UART: [ldev] CDI.KEYID = 6
1,209,551 UART: [ldev] SUBJECT.KEYID = 5
1,209,978 UART: [ldev] AUTHORITY.KEYID = 7
1,210,441 UART: [ldev] FE.KEYID = 1
1,215,919 UART: [ldev] Erasing FE.KEYID = 1
1,241,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,394 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,088 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,958 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,664 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,722 UART: [ldev] --
1,281,040 UART: [fwproc] Wait for Commands...
1,281,749 UART: [fwproc] Recv command 0x46574c44
1,282,482 UART: [fwproc] Recv'd Img size: 78704 bytes
2,197,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,354 UART: [fwproc] Load Runtime at address 0x40005000 len 54020
2,336,723 >>> mbox cmd response: success
2,337,835 UART: [afmc] ++
2,338,003 UART: [afmc] CDI.KEYID = 6
2,338,366 UART: [afmc] SUBJECT.KEYID = 7
2,338,792 UART: [afmc] AUTHORITY.KEYID = 5
2,374,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,566 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,285 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,178 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,885 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,652 UART: [afmc] --
2,417,651 UART: [cold-reset] --
2,418,591 UART: [state] Locking Datavault
2,419,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,434 UART: [state] Locking ICCM
2,421,052 UART: [exit] Launching FMC @ 0x40000130
2,426,381 UART:
2,426,397 UART: Running Caliptra FMC ...
2,426,805 UART:
2,426,948 UART: [state] CFI Enabled
2,437,961 UART: [fht] FMC Alias Private Key: 7
2,546,156 UART: [art] Extend RT PCRs Done
2,546,584 UART: [art] Lock RT PCRs Done
2,547,966 UART: [art] Populate DV Done
2,556,436 UART: [fht] FMC Alias Private Key: 7
2,557,488 UART: [art] Derive CDI
2,557,768 UART: [art] Store in in slot 0x4
2,643,623 UART: [art] Derive Key Pair
2,643,983 UART: [art] Store priv key in slot 0x5
2,656,773 UART: [art] Derive Key Pair - Done
2,671,732 UART: [art] Signing Cert with AUTHO
2,672,212 UART: RITY.KEYID = 7
2,686,920 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,685 UART: [art] PUB.X = 8848BE87005084EE6A983DA84A60108AD1ACB193C5D765320A3F18104920D1358F930800D755A4288996715333E21177
2,694,387 UART: [art] PUB.Y = 96C945CE1710BAF4B6A657B3E758966A9CDB084798E6523FD4AD1B8F491E90E93391F8E8C36A6E80DCDDD3D52D3104D6
2,701,341 UART: [art] SIG.R = 820B96D48C4F4762DBB2250DD1F3062AAD20382C4CD2FB122EE452BFC2E9FF2204E0C71E484D05C04BA3B4A5FD227B9E
2,708,112 UART: [art] SIG.S = E93436AFA4B922A5D94BF4F1A13A98560F04E16FEEB5153EB9D25294CF43194E791B094B0AE4AACE67AAEFD82DE28481
2,731,161 UART: mbox::rt_entry...
2,731,533 UART: ____ _ _ _ ____ _____
2,732,317 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,117 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,885 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,653 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,421 UART: |_|
2,735,733 UART:
2,842,695 UART: [rt] Runtime listening for mailbox commands...
2,843,457 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,677 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,771 UART:
2,843,787 UART: Running Caliptra ROM ...
2,844,195 UART:
2,844,337 UART: [state] CFI Enabled
2,846,970 UART: [state] LifecycleState = Production
2,847,578 UART: [state] DebugLocked = Yes
2,848,236 UART: [state] Starting the WD Timer 40000000 cycles
2,849,867 UART: [kat] SHA2-256
3,653,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,546 UART: [kat] ++
3,657,698 UART: [kat] sha1
3,661,758 UART: [kat] SHA2-256
3,663,698 UART: [kat] SHA2-384
3,666,377 UART: [kat] SHA2-512-ACC
3,668,278 UART: [kat] ECC-384
3,677,877 UART: [kat] HMAC-384Kdf
3,682,451 UART: [kat] LMS
3,930,763 UART: [kat] --
3,931,691 UART: [warm-reset] ++
3,932,420 UART: [warm-reset] --
3,933,475 UART: [state] Locking Datavault
3,934,149 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,753 UART: [state] Locking ICCM
3,935,311 UART: [exit] Launching FMC @ 0x40000130
3,940,640 UART:
3,940,656 UART: Running Caliptra FMC ...
3,941,064 UART:
3,941,207 UART: [state] CFI Enabled
3,942,794 UART: [aliasrt :skip pcr extension
3,943,267 UART: [art] Extend RT PCRs Done
3,943,695 UART: [art] Lock RT PCRs Done
3,944,956 UART: [art] Populate DV Done
3,953,216 UART: [fht] FMC Alias Private Key: 7
3,954,246 UART: [art] Derive CDI
3,954,526 UART: [art] Store in in slot 0x4
4,040,365 UART: [art] Derive Key Pair
4,040,725 UART: [art] Store priv key in slot 0x5
4,053,063 UART: [art] Derive Key Pair - Done
4,067,882 UART: [art] Signing Cert with AUTHO
4,068,362 UART: RITY.KEYID = 7
4,083,050 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,815 UART: [art] PUB.X = 8848BE87005084EE6A983DA84A60108AD1ACB193C5D765320A3F18104920D1358F930800D755A4288996715333E21177
4,090,517 UART: [art] PUB.Y = 96C945CE1710BAF4B6A657B3E758966A9CDB084798E6523FD4AD1B8F491E90E93391F8E8C36A6E80DCDDD3D52D3104D6
4,097,471 UART: [art] SIG.R = 820B96D48C4F4762DBB2250DD1F3062AAD20382C4CD2FB122EE452BFC2E9FF2204E0C71E484D05C04BA3B4A5FD227B9E
4,104,242 UART: [art] SIG.S = E93436AFA4B922A5D94BF4F1A13A98560F04E16FEEB5153EB9D25294CF43194E791B094B0AE4AACE67AAEFD82DE28481
4,128,161 UART: mbox::rt_entry...
4,128,533 UART: ____ _ _ _ ____ _____
4,129,317 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,117 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,885 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,653 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,421 UART: |_|
4,132,733 UART:
4,426,614 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,428,742 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,993 writing to cptra_bootfsm_go
193,208 UART:
193,546 UART: Running Caliptra ROM ...
194,799 UART:
194,948 UART: [state] CFI Enabled
264,984 UART: [state] LifecycleState = Unprovisioned
267,380 UART: [state] DebugLocked = No
269,836 UART: [state] WD Timer not started. Device not locked for debugging
275,159 UART: [fake-rom-cold-reset] ++
278,256 ready_for_fw is high
278,515 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
403,469 UART: [fht] FHT @ 0x50003400
404,562 UART: [fwproc] Wait for Commands...
405,844 UART: [fwproc] Recv command 0x46574c44
407,275 UART: [fwproc] Recv'd Img size: 99400 bytes
1,682,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,758,452 UART: [fwproc] Load FMC at address 0x40000000 len 4096
1,788,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
2,374,760 >>> mbox cmd response: success
2,380,775 UART: [fake-rom-cold-reset] --
2,385,272 UART: [state] Locking Datavault
2,391,078 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,227 UART: [state] Locking ICCM
2,396,303 UART: [exit] Launching FMC @ 0x40000130
2,405,052 UART:
2,405,296 UART: Running Caliptra FMC ...
2,406,398 UART:
2,406,560 UART: [state] CFI Enabled
2,452,668 UART: Caliptra RT
2,453,301 UART: [state] CFI Enabled
2,623,327 UART: [rt] RT listening for mailbox commands...
2,625,480 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,655,310 UART: [rt]cmd =0x4c444556, len=4
2,666,540 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,070,107 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,099,930 UART: [rt]cmd =0x43455246, len=4
3,112,612 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,800 writing to cptra_bootfsm_go
192,849 UART:
193,243 UART: Running Caliptra ROM ...
194,375 UART:
194,529 UART: [state] CFI Enabled
266,395 UART: [state] LifecycleState = Unprovisioned
268,735 UART: [state] DebugLocked = No
271,417 UART: [state] WD Timer not started. Device not locked for debugging
276,141 UART: [fake-rom-cold-reset] ++
279,247 ready_for_fw is high
279,511 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
404,283 UART: [fht] FHT @ 0x50003400
405,372 UART: [fwproc] Wait for Commands...
406,673 UART: [fwproc] Recv command 0x46574c44
408,078 UART: [fwproc] Recv'd Img size: 99400 bytes
1,681,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,760,211 UART: [fwproc] Load FMC at address 0x40000000 len 4096
1,790,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
2,377,050 >>> mbox cmd response: success
2,383,121 UART: [fake-rom-cold-reset] --
2,385,564 UART: [state] Locking Datavault
2,390,542 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,689 UART: [state] Locking ICCM
2,395,060 UART: [exit] Launching FMC @ 0x40000130
2,403,858 UART:
2,404,096 UART: Running Caliptra FMC ...
2,405,203 UART:
2,405,365 UART: [state] CFI Enabled
2,454,929 UART: Caliptra RT
2,455,630 UART: [state] CFI Enabled
2,624,160 UART: [rt] RT listening for mailbox commands...
2,626,337 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,656,008 UART: [rt]cmd =0x4c444556, len=4
2,667,119 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,069,713 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,099,477 UART: [rt]cmd =0x43455246, len=4
3,112,179 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,641 UART:
193,008 UART: Running Caliptra ROM ...
194,147 UART:
604,316 UART: [state] CFI Enabled
618,348 UART: [state] LifecycleState = Unprovisioned
620,700 UART: [state] DebugLocked = No
622,861 UART: [state] WD Timer not started. Device not locked for debugging
627,960 UART: [fake-rom-cold-reset] ++
631,054 ready_for_fw is high
631,324 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
756,218 UART: [fht] FHT @ 0x50003400
757,306 UART: [fwproc] Wait for Commands...
758,587 UART: [fwproc] Recv command 0x46574c44
760,021 UART: [fwproc] Recv'd Img size: 99400 bytes
2,030,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,111,242 UART: [fwproc] Load FMC at address 0x40000000 len 4096
2,141,289 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
2,726,784 >>> mbox cmd response: success
2,732,822 UART: [fake-rom-cold-reset] --
2,735,377 UART: [state] Locking Datavault
2,740,261 UART: [state] Locking PCR0, PCR1 and PCR31
2,742,403 UART: [state] Locking ICCM
2,743,907 UART: [exit] Launching FMC @ 0x40000130
2,752,691 UART:
2,752,934 UART: Running Caliptra FMC ...
2,754,037 UART:
2,754,202 UART: [state] CFI Enabled
2,758,038 UART: Caliptra RT
2,758,730 UART: [state] CFI Enabled
2,869,310 UART: [rt] RT listening for mailbox commands...
2,871,477 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,901,087 UART: [rt]cmd =0x4c444556, len=4
2,912,147 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,316,083 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,345,700 UART: [rt]cmd =0x43455246, len=4
3,358,447 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,342 UART:
192,726 UART: Running Caliptra ROM ...
193,925 UART:
603,924 UART: [state] CFI Enabled
621,576 UART: [state] LifecycleState = Unprovisioned
623,936 UART: [state] DebugLocked = No
627,103 UART: [state] WD Timer not started. Device not locked for debugging
633,418 UART: [fake-rom-cold-reset] ++
636,517 ready_for_fw is high
636,695 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
761,588 UART: [fht] FHT @ 0x50003400
762,678 UART: [fwproc] Wait for Commands...
763,876 UART: [fwproc] Recv command 0x46574c44
765,281 UART: [fwproc] Recv'd Img size: 99400 bytes
2,043,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,120,352 UART: [fwproc] Load FMC at address 0x40000000 len 4096
2,150,459 UART: [fwproc] Load Runtime at address 0x40005000 len 89420
2,737,056 >>> mbox cmd response: success
2,743,077 UART: [fake-rom-cold-reset] --
2,747,101 UART: [state] Locking Datavault
2,754,899 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,049 UART: [state] Locking ICCM
2,759,011 UART: [exit] Launching FMC @ 0x40000130
2,767,807 UART:
2,768,042 UART: Running Caliptra FMC ...
2,769,145 UART:
2,769,305 UART: [state] CFI Enabled
2,773,249 UART: Caliptra RT
2,773,938 UART: [state] CFI Enabled
2,883,430 UART: [rt] RT listening for mailbox commands...
2,885,585 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,915,523 UART: [rt]cmd =0x4c444556, len=4
2,926,628 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,330,851 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,360,802 UART: [rt]cmd =0x43455246, len=4
3,373,598 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,873 writing to cptra_bootfsm_go
192,900 UART:
193,276 UART: Running Caliptra ROM ...
194,457 UART:
194,608 UART: [state] CFI Enabled
263,909 UART: [state] LifecycleState = Unprovisioned
266,176 UART: [state] DebugLocked = No
268,457 UART: [state] WD Timer not started. Device not locked for debugging
273,283 UART: [fake-rom-cold-reset] ++
275,603 ready_for_fw is high
275,862 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
401,069 UART: [fht] FHT @ 0x50003400
402,172 UART: [fwproc] Wait for Commands...
403,372 UART: [fwproc] Recv command 0x46574c44
404,798 UART: [fwproc] Recv'd Img size: 99748 bytes
1,709,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,781,522 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,798,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,116,445 >>> mbox cmd response: success
2,122,255 UART: [fake-rom-cold-reset] --
2,125,395 UART: [state] Locking Datavault
2,131,297 UART: [state] Locking PCR0, PCR1 and PCR31
2,132,896 UART: [state] Locking ICCM
2,135,102 UART: [exit] Launching FMC @ 0x40000130
2,143,391 UART:
2,143,638 UART: Running Caliptra FMC ...
2,144,744 UART:
2,144,902 UART: [state] CFI Enabled
2,196,726 UART: Caliptra RT
2,197,409 UART: [state] CFI Enabled
2,366,199 UART: [rt] RT listening for mailbox commands...
2,368,370 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,397,989 UART: [rt]cmd =0x4c444556, len=4
2,409,016 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,812,628 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,842,523 UART: [rt]cmd =0x43455246, len=4
2,855,225 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,744 writing to cptra_bootfsm_go
192,879 UART:
193,251 UART: Running Caliptra ROM ...
194,443 UART:
194,594 UART: [state] CFI Enabled
262,405 UART: [state] LifecycleState = Unprovisioned
264,160 UART: [state] DebugLocked = No
266,830 UART: [state] WD Timer not started. Device not locked for debugging
270,867 UART: [fake-rom-cold-reset] ++
273,265 ready_for_fw is high
273,527 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
398,727 UART: [fht] FHT @ 0x50003400
399,836 UART: [fwproc] Wait for Commands...
401,041 UART: [fwproc] Recv command 0x46574c44
402,454 UART: [fwproc] Recv'd Img size: 99748 bytes
1,702,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,771,844 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,788,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,107,807 >>> mbox cmd response: success
2,113,658 UART: [fake-rom-cold-reset] --
2,118,463 UART: [state] Locking Datavault
2,124,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,126,299 UART: [state] Locking ICCM
2,128,424 UART: [exit] Launching FMC @ 0x40000130
2,136,709 UART:
2,136,949 UART: Running Caliptra FMC ...
2,137,974 UART:
2,138,121 UART: [state] CFI Enabled
2,198,004 UART: Caliptra RT
2,198,696 UART: [state] CFI Enabled
2,366,699 UART: [rt] RT listening for mailbox commands...
2,368,867 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,398,744 UART: [rt]cmd =0x4c444556, len=4
2,409,723 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,813,167 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,843,011 UART: [rt]cmd =0x43455246, len=4
2,855,803 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,383 writing to cptra_bootfsm_go
193,504 UART:
193,879 UART: Running Caliptra ROM ...
194,976 UART:
604,401 UART: [state] CFI Enabled
618,713 UART: [state] LifecycleState = Unprovisioned
620,485 UART: [state] DebugLocked = No
622,661 UART: [state] WD Timer not started. Device not locked for debugging
627,982 UART: [fake-rom-cold-reset] ++
630,298 ready_for_fw is high
630,479 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
756,376 UART: [fht] FHT @ 0x50003400
757,611 UART: [fwproc] Wait for Commands...
758,822 UART: [fwproc] Recv command 0x46574c44
760,166 UART: [fwproc] Recv'd Img size: 99748 bytes
2,058,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,124,968 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,141,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,460,258 >>> mbox cmd response: success
2,466,101 UART: [fake-rom-cold-reset] --
2,469,849 UART: [state] Locking Datavault
2,473,741 UART: [state] Locking PCR0, PCR1 and PCR31
2,475,340 UART: [state] Locking ICCM
2,477,487 UART: [exit] Launching FMC @ 0x40000130
2,485,776 UART:
2,486,011 UART: Running Caliptra FMC ...
2,487,040 UART:
2,487,190 UART: [state] CFI Enabled
2,491,139 UART: Caliptra RT
2,491,828 UART: [state] CFI Enabled
2,601,458 UART: [rt] RT listening for mailbox commands...
2,603,644 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,633,527 UART: [rt]cmd =0x4c444556, len=4
2,644,660 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,048,580 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,078,437 UART: [rt]cmd =0x43455246, len=4
3,091,373 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,539 writing to cptra_bootfsm_go
193,727 UART:
194,079 UART: Running Caliptra ROM ...
195,274 UART:
604,960 UART: [state] CFI Enabled
615,514 UART: [state] LifecycleState = Unprovisioned
617,234 UART: [state] DebugLocked = No
620,006 UART: [state] WD Timer not started. Device not locked for debugging
623,506 UART: [fake-rom-cold-reset] ++
625,829 ready_for_fw is high
626,087 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
751,304 UART: [fht] FHT @ 0x50003400
752,394 UART: [fwproc] Wait for Commands...
753,682 UART: [fwproc] Recv command 0x46574c44
755,115 UART: [fwproc] Recv'd Img size: 99748 bytes
2,046,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,115,701 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,132,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,450,954 >>> mbox cmd response: success
2,456,814 UART: [fake-rom-cold-reset] --
2,460,259 UART: [state] Locking Datavault
2,464,560 UART: [state] Locking PCR0, PCR1 and PCR31
2,466,099 UART: [state] Locking ICCM
2,468,390 UART: [exit] Launching FMC @ 0x40000130
2,476,624 UART:
2,476,858 UART: Running Caliptra FMC ...
2,477,884 UART:
2,478,031 UART: [state] CFI Enabled
2,481,980 UART: Caliptra RT
2,482,613 UART: [state] CFI Enabled
2,593,320 UART: [rt] RT listening for mailbox commands...
2,595,473 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,625,299 UART: [rt]cmd =0x4c444556, len=4
2,636,350 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,041,379 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,071,213 UART: [rt]cmd =0x43455246, len=4
3,083,884 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
192,852 UART:
193,241 UART: Running Caliptra ROM ...
194,431 UART:
194,579 UART: [state] CFI Enabled
266,710 UART: [state] LifecycleState = Unprovisioned
268,454 UART: [state] DebugLocked = No
270,428 UART: [state] WD Timer not started. Device not locked for debugging
275,615 UART: [fake-rom-cold-reset] ++
277,930 ready_for_fw is high
278,183 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
403,480 UART: [fht] FHT @ 0x50003400
404,579 UART: [fwproc] Wait for Commands...
405,871 UART: [fwproc] Recv command 0x46574c44
407,286 UART: [fwproc] Recv'd Img size: 99748 bytes
1,708,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,782,891 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,799,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,118,329 >>> mbox cmd response: success
2,124,172 UART: [fake-rom-cold-reset] --
2,128,010 UART: [state] Locking Datavault
2,132,519 UART: [state] Locking PCR0, PCR1 and PCR31
2,134,113 UART: [state] Locking ICCM
2,135,447 UART: [exit] Launching FMC @ 0x40000130
2,143,735 UART:
2,143,968 UART: Running Caliptra FMC ...
2,145,069 UART:
2,145,229 UART: [state] CFI Enabled
2,197,445 UART: Caliptra RT
2,198,121 UART: [state] CFI Enabled
2,367,480 UART: [rt] RT listening for mailbox commands...
2,369,639 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,399,458 UART: [rt]cmd =0x4c444556, len=4
2,410,606 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,813,776 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,843,442 UART: [rt]cmd =0x43455246, len=4
2,856,206 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,364 writing to cptra_bootfsm_go
193,461 UART:
193,847 UART: Running Caliptra ROM ...
194,943 UART:
604,454 UART: [state] CFI Enabled
616,650 UART: [state] LifecycleState = Unprovisioned
618,367 UART: [state] DebugLocked = No
619,608 UART: [state] WD Timer not started. Device not locked for debugging
624,577 UART: [fake-rom-cold-reset] ++
626,960 ready_for_fw is high
627,220 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
752,569 UART: [fht] FHT @ 0x50003400
753,668 UART: [fwproc] Wait for Commands...
754,959 UART: [fwproc] Recv command 0x46574c44
756,374 UART: [fwproc] Recv'd Img size: 99748 bytes
2,055,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,126,497 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,143,490 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,462,015 >>> mbox cmd response: success
2,467,865 UART: [fake-rom-cold-reset] --
2,472,561 UART: [state] Locking Datavault
2,477,364 UART: [state] Locking PCR0, PCR1 and PCR31
2,478,908 UART: [state] Locking ICCM
2,481,557 UART: [exit] Launching FMC @ 0x40000130
2,489,789 UART:
2,490,026 UART: Running Caliptra FMC ...
2,491,134 UART:
2,491,293 UART: [state] CFI Enabled
2,495,128 UART: Caliptra RT
2,495,760 UART: [state] CFI Enabled
2,606,002 UART: [rt] RT listening for mailbox commands...
2,608,173 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,638,012 UART: [rt]cmd =0x4c444556, len=4
2,649,211 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,052,655 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,082,143 UART: [rt]cmd =0x43455246, len=4
3,095,026 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [fake-rom-cold-reset] ++
88,712 ready_for_fw is high
88,712 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
88,894 UART: [fht] FHT @ 0x50003400
92,357 UART: [fwproc] Wait for Commands...
93,002 UART: [fwproc] Recv command 0x46574c44
93,730 UART: [fwproc] Recv'd Img size: 99748 bytes
1,218,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,816 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,388,128 >>> mbox cmd response: success
1,389,286 UART: [fake-rom-cold-reset] --
1,390,028 UART: [state] Locking Datavault
1,390,983 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,587 UART: [state] Locking ICCM
1,392,209 UART: [exit] Launching FMC @ 0x40000130
1,397,531 UART:
1,397,547 UART: Running Caliptra FMC ...
1,397,955 UART:
1,398,009 UART: [state] CFI Enabled
1,400,658 UART: Caliptra RT
1,400,911 UART: [state] CFI Enabled
1,501,566 UART: [rt] RT listening for mailbox commands...
1,502,236 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,232 UART: [rt]cmd =0x4c444556, len=4
1,542,868 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,869 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,058 UART: [rt]cmd =0x43455246, len=4
1,584,192 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [fake-rom-cold-reset] ++
88,746 ready_for_fw is high
88,746 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
88,966 UART: [fht] FHT @ 0x50003400
92,307 UART: [fwproc] Wait for Commands...
92,954 UART: [fwproc] Recv command 0x46574c44
93,682 UART: [fwproc] Recv'd Img size: 99748 bytes
1,218,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,378 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,388,606 >>> mbox cmd response: success
1,389,764 UART: [fake-rom-cold-reset] --
1,390,404 UART: [state] Locking Datavault
1,391,509 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,113 UART: [state] Locking ICCM
1,392,729 UART: [exit] Launching FMC @ 0x40000130
1,398,051 UART:
1,398,067 UART: Running Caliptra FMC ...
1,398,475 UART:
1,398,529 UART: [state] CFI Enabled
1,401,190 UART: Caliptra RT
1,401,443 UART: [state] CFI Enabled
1,501,470 UART: [rt] RT listening for mailbox commands...
1,502,140 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,852 UART: [rt]cmd =0x4c444556, len=4
1,542,194 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,195 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,534 UART: [rt]cmd =0x43455246, len=4
1,583,852 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [fake-rom-cold-reset] ++
89,123 ready_for_fw is high
89,123 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,261 UART: [fht] FHT @ 0x50003400
92,486 UART: [fwproc] Wait for Commands...
93,131 UART: [fwproc] Recv command 0x46574c44
93,859 UART: [fwproc] Recv'd Img size: 99748 bytes
1,218,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,333 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,388,461 >>> mbox cmd response: success
1,389,619 UART: [fake-rom-cold-reset] --
1,390,469 UART: [state] Locking Datavault
1,391,724 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,328 UART: [state] Locking ICCM
1,392,964 UART: [exit] Launching FMC @ 0x40000130
1,398,286 UART:
1,398,302 UART: Running Caliptra FMC ...
1,398,710 UART:
1,398,851 UART: [state] CFI Enabled
1,401,469 UART: Caliptra RT
1,401,814 UART: [state] CFI Enabled
1,501,939 UART: [rt] RT listening for mailbox commands...
1,502,609 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,459 UART: [rt]cmd =0x4c444556, len=4
1,542,701 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,702 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,927 UART: [rt]cmd =0x43455246, len=4
1,583,985 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,873 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [fake-rom-cold-reset] ++
89,191 ready_for_fw is high
89,191 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,265 UART: [fht] FHT @ 0x50003400
92,556 UART: [fwproc] Wait for Commands...
93,383 UART: [fwproc] Recv command 0x46574c44
94,111 UART: [fwproc] Recv'd Img size: 99748 bytes
1,218,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,246,721 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,253,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,389,935 >>> mbox cmd response: success
1,391,093 UART: [fake-rom-cold-reset] --
1,391,899 UART: [state] Locking Datavault
1,392,978 UART: [state] Locking PCR0, PCR1 and PCR31
1,393,582 UART: [state] Locking ICCM
1,394,076 UART: [exit] Launching FMC @ 0x40000130
1,399,398 UART:
1,399,414 UART: Running Caliptra FMC ...
1,399,822 UART:
1,399,963 UART: [state] CFI Enabled
1,402,873 UART: Caliptra RT
1,403,218 UART: [state] CFI Enabled
1,502,707 UART: [rt] RT listening for mailbox commands...
1,503,377 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,533,587 UART: [rt]cmd =0x4c444556, len=4
1,544,017 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,544,018 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,573,573 UART: [rt]cmd =0x43455246, len=4
1,585,599 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [fake-rom-cold-reset] ++
88,572 ready_for_fw is high
88,572 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
88,822 UART: [fht] FHT @ 0x50003400
92,183 UART: [fwproc] Wait for Commands...
92,970 UART: [fwproc] Recv command 0x46574c44
93,698 UART: [fwproc] Recv'd Img size: 99748 bytes
1,218,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,962 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,253,190 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,389,110 >>> mbox cmd response: success
1,390,268 UART: [fake-rom-cold-reset] --
1,391,052 UART: [state] Locking Datavault
1,392,315 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,919 UART: [state] Locking ICCM
1,393,385 UART: [exit] Launching FMC @ 0x40000130
1,398,707 UART:
1,398,723 UART: Running Caliptra FMC ...
1,399,131 UART:
1,399,185 UART: [state] CFI Enabled
1,401,816 UART: Caliptra RT
1,402,069 UART: [state] CFI Enabled
1,502,160 UART: [rt] RT listening for mailbox commands...
1,502,830 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,652 UART: [rt]cmd =0x4c444556, len=4
1,543,164 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,165 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,492 UART: [rt]cmd =0x43455246, len=4
1,584,694 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,254 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [fake-rom-cold-reset] ++
88,608 ready_for_fw is high
88,608 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
88,714 UART: [fht] FHT @ 0x50003400
91,971 UART: [fwproc] Wait for Commands...
92,572 UART: [fwproc] Recv command 0x46574c44
93,300 UART: [fwproc] Recv'd Img size: 99748 bytes
1,217,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,222 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,386,398 >>> mbox cmd response: success
1,387,556 UART: [fake-rom-cold-reset] --
1,388,390 UART: [state] Locking Datavault
1,389,615 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,219 UART: [state] Locking ICCM
1,390,823 UART: [exit] Launching FMC @ 0x40000130
1,396,145 UART:
1,396,161 UART: Running Caliptra FMC ...
1,396,569 UART:
1,396,623 UART: [state] CFI Enabled
1,399,284 UART: Caliptra RT
1,399,537 UART: [state] CFI Enabled
1,499,780 UART: [rt] RT listening for mailbox commands...
1,500,450 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,272 UART: [rt]cmd =0x4c444556, len=4
1,540,628 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,629 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,998 UART: [rt]cmd =0x43455246, len=4
1,582,082 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [fake-rom-cold-reset] ++
88,837 ready_for_fw is high
88,837 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
88,939 UART: [fht] FHT @ 0x50003400
92,296 UART: [fwproc] Wait for Commands...
93,111 UART: [fwproc] Recv command 0x46574c44
93,839 UART: [fwproc] Recv'd Img size: 99748 bytes
1,220,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,247,493 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,254,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,390,669 >>> mbox cmd response: success
1,391,827 UART: [fake-rom-cold-reset] --
1,392,603 UART: [state] Locking Datavault
1,393,680 UART: [state] Locking PCR0, PCR1 and PCR31
1,394,284 UART: [state] Locking ICCM
1,394,850 UART: [exit] Launching FMC @ 0x40000130
1,400,172 UART:
1,400,188 UART: Running Caliptra FMC ...
1,400,596 UART:
1,400,737 UART: [state] CFI Enabled
1,403,597 UART: Caliptra RT
1,403,942 UART: [state] CFI Enabled
1,505,121 UART: [rt] RT listening for mailbox commands...
1,505,791 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,535,569 UART: [rt]cmd =0x4c444556, len=4
1,545,993 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,545,994 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,575,207 UART: [rt]cmd =0x43455246, len=4
1,587,157 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,813 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [fake-rom-cold-reset] ++
89,085 ready_for_fw is high
89,085 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,395 UART: [fht] FHT @ 0x50003400
92,824 UART: [fwproc] Wait for Commands...
93,435 UART: [fwproc] Recv command 0x46574c44
94,163 UART: [fwproc] Recv'd Img size: 99748 bytes
1,219,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,741 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,387,971 >>> mbox cmd response: success
1,389,129 UART: [fake-rom-cold-reset] --
1,390,045 UART: [state] Locking Datavault
1,391,290 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,894 UART: [state] Locking ICCM
1,392,324 UART: [exit] Launching FMC @ 0x40000130
1,397,646 UART:
1,397,662 UART: Running Caliptra FMC ...
1,398,070 UART:
1,398,211 UART: [state] CFI Enabled
1,401,057 UART: Caliptra RT
1,401,402 UART: [state] CFI Enabled
1,501,389 UART: [rt] RT listening for mailbox commands...
1,502,059 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,657 UART: [rt]cmd =0x4c444556, len=4
1,542,161 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,162 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,369 UART: [rt]cmd =0x43455246, len=4
1,583,455 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
88,258 UART: [fake-rom-cold-reset] ++
89,186 ready_for_fw is high
89,186 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,450 UART: [fht] FHT @ 0x50003400
92,737 UART: [fwproc] Wait for Commands...
93,582 UART: [fwproc] Recv command 0x46574c44
94,310 UART: [fwproc] Recv'd Img size: 99748 bytes
1,220,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,246,976 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,254,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,390,194 >>> mbox cmd response: success
1,391,352 UART: [fake-rom-cold-reset] --
1,392,022 UART: [state] Locking Datavault
1,393,145 UART: [state] Locking PCR0, PCR1 and PCR31
1,393,749 UART: [state] Locking ICCM
1,394,359 UART: [exit] Launching FMC @ 0x40000130
1,399,681 UART:
1,399,697 UART: Running Caliptra FMC ...
1,400,105 UART:
1,400,159 UART: [state] CFI Enabled
1,402,818 UART: Caliptra RT
1,403,071 UART: [state] CFI Enabled
1,502,792 UART: [rt] RT listening for mailbox commands...
1,503,462 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,533,310 UART: [rt]cmd =0x4c444556, len=4
1,543,852 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,853 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,573,456 UART: [rt]cmd =0x43455246, len=4
1,585,612 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
88,392 UART: [fake-rom-cold-reset] ++
89,320 ready_for_fw is high
89,320 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,544 UART: [fht] FHT @ 0x50003400
92,883 UART: [fwproc] Wait for Commands...
93,658 UART: [fwproc] Recv command 0x46574c44
94,386 UART: [fwproc] Recv'd Img size: 99748 bytes
1,219,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,246,948 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,254,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,390,230 >>> mbox cmd response: success
1,391,388 UART: [fake-rom-cold-reset] --
1,392,188 UART: [state] Locking Datavault
1,393,333 UART: [state] Locking PCR0, PCR1 and PCR31
1,393,937 UART: [state] Locking ICCM
1,394,525 UART: [exit] Launching FMC @ 0x40000130
1,399,847 UART:
1,399,863 UART: Running Caliptra FMC ...
1,400,271 UART:
1,400,325 UART: [state] CFI Enabled
1,403,128 UART: Caliptra RT
1,403,381 UART: [state] CFI Enabled
1,502,476 UART: [rt] RT listening for mailbox commands...
1,503,146 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,840 UART: [rt]cmd =0x4c444556, len=4
1,543,308 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,309 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,464 UART: [rt]cmd =0x43455246, len=4
1,584,650 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [fake-rom-cold-reset] ++
89,067 ready_for_fw is high
89,067 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,393 UART: [fht] FHT @ 0x50003400
92,686 UART: [fwproc] Wait for Commands...
93,513 UART: [fwproc] Recv command 0x46574c44
94,241 UART: [fwproc] Recv'd Img size: 99748 bytes
1,220,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,246,927 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,254,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,390,155 >>> mbox cmd response: success
1,391,313 UART: [fake-rom-cold-reset] --
1,392,159 UART: [state] Locking Datavault
1,393,216 UART: [state] Locking PCR0, PCR1 and PCR31
1,393,820 UART: [state] Locking ICCM
1,394,282 UART: [exit] Launching FMC @ 0x40000130
1,399,604 UART:
1,399,620 UART: Running Caliptra FMC ...
1,400,028 UART:
1,400,169 UART: [state] CFI Enabled
1,402,869 UART: Caliptra RT
1,403,214 UART: [state] CFI Enabled
1,503,435 UART: [rt] RT listening for mailbox commands...
1,504,105 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,534,029 UART: [rt]cmd =0x4c444556, len=4
1,544,355 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,544,356 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,573,587 UART: [rt]cmd =0x43455246, len=4
1,585,681 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fdbbf06b8736329668a57313d4b8260ec74fd6e2f0bf0a16efaaaa93bbcdf7325c527d775d895b498147ee6c0cc51e68",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [fake-rom-cold-reset] ++
89,025 ready_for_fw is high
89,025 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
89,211 UART: [fht] FHT @ 0x50003400
92,500 UART: [fwproc] Wait for Commands...
93,169 UART: [fwproc] Recv command 0x46574c44
93,897 UART: [fwproc] Recv'd Img size: 99748 bytes
1,219,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,171 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
1,388,479 >>> mbox cmd response: success
1,389,637 UART: [fake-rom-cold-reset] --
1,390,361 UART: [state] Locking Datavault
1,391,678 UART: [state] Locking PCR0, PCR1 and PCR31
1,392,282 UART: [state] Locking ICCM
1,392,724 UART: [exit] Launching FMC @ 0x40000130
1,398,046 UART:
1,398,062 UART: Running Caliptra FMC ...
1,398,470 UART:
1,398,611 UART: [state] CFI Enabled
1,401,595 UART: Caliptra RT
1,401,940 UART: [state] CFI Enabled
1,501,991 UART: [rt] RT listening for mailbox commands...
1,502,661 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,532,605 UART: [rt]cmd =0x4c444556, len=4
1,543,033 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,543,034 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,572,293 UART: [rt]cmd =0x43455246, len=4
1,584,229 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,447 UART:
192,809 UART: Running Caliptra ROM ...
193,994 UART:
194,154 UART: [state] CFI Enabled
266,822 UART: [state] LifecycleState = Production
268,683 UART: [state] DebugLocked = No
271,658 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,661 UART: [kat] SHA2-256
446,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,891 UART: [kat] ++
457,419 UART: [kat] sha1
469,357 UART: [kat] SHA2-256
471,999 UART: [kat] SHA2-384
477,478 UART: [kat] SHA2-512-ACC
479,839 UART: [kat] ECC-384
2,769,247 UART: [kat] HMAC-384Kdf
2,800,530 UART: [kat] LMS
3,990,842 UART: [kat] --
3,996,004 UART: [cold-reset] ++
3,998,451 UART: [fht] Storing FHT @ 0x50003400
4,010,136 UART: [idev] ++
4,010,700 UART: [idev] CDI.KEYID = 6
4,011,637 UART: [idev] SUBJECT.KEYID = 7
4,012,883 UART: [idev] UDS.KEYID = 0
4,013,915 ready_for_fw is high
4,014,118 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,655 UART: [idev] Erasing UDS.KEYID = 0
7,348,239 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,732 UART: [idev] --
7,373,836 UART: [ldev] ++
7,374,409 UART: [ldev] CDI.KEYID = 6
7,375,368 UART: [ldev] SUBJECT.KEYID = 5
7,376,578 UART: [ldev] AUTHORITY.KEYID = 7
7,377,855 UART: [ldev] FE.KEYID = 1
7,424,797 UART: [ldev] Erasing FE.KEYID = 1
10,754,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,995 UART: [ldev] --
13,119,521 UART: [fwproc] Waiting for Commands...
13,122,208 UART: [fwproc] Received command 0x46574c44
13,124,385 UART: [fwproc] Received Image of size 114124 bytes
21,957,797 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,039,476 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,108,341 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,425,840 >>> mbox cmd response: success
22,430,129 UART: [afmc] ++
22,430,741 UART: [afmc] CDI.KEYID = 6
22,431,671 UART: [afmc] SUBJECT.KEYID = 7
22,432,965 UART: [afmc] AUTHORITY.KEYID = 5
25,808,898 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,108,360 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,110,666 UART: [afmc] PUB.X = 5348D258DE77EF97F637AF69C21E68ACD6AF0C3F87E456B42EFD178DE46AC5C6BEE0231BC08A8C6FC4B952CC39F73A2A
28,125,293 UART: [afmc] PUB.Y = BCC845DEC9D5D652A78CC24F1E69F3EDBCC4E95D7A4708F662379DFAB92294A7E1F1880D8FDBABDA66164BAE4BC962EE
28,140,025 UART: [afmc] SIG.R = 6A0C2E7504B5CFA05081287A9C14EDB8A8C399FDE244DE866717A9AE00799D5565090397AB4DD4D8F8580529AC54AEF8
28,154,437 UART: [afmc] SIG.S = D626E0867A2A659B92DB66847BA60944DF7F20034E039E932616F92B8D8CB3EB9D4B433B717B369420F3B415311147FE
28,176,593 UART: [afmc] --
28,180,963 UART: [cold-reset] --
28,184,081 UART: [state] Locking Datavault
28,189,034 UART: [state] Locking PCR0, PCR1 and PCR31
28,190,783 UART: [state] Locking ICCM
28,192,068 UART: [exit] Launching FMC @ 0x40000130
28,200,437 UART:
28,200,693 UART: Running Caliptra FMC ...
28,201,840 UART:
28,201,997 UART: [state] CFI Enabled
28,265,988 UART: [fht] FMC Alias Private Key: 7
30,604,057 UART: [art] Extend RT PCRs Done
30,605,344 UART: [art] Lock RT PCRs Done
30,606,729 UART: [art] Populate DV Done
30,612,022 UART: [fht] FMC Alias Private Key: 7
30,613,577 UART: [art] Derive CDI
30,614,345 UART: [art] Store in in slot 0x4
30,675,349 UART: [art] Derive Key Pair
30,676,431 UART: [art] Store priv key in slot 0x5
33,968,819 UART: [art] Derive Key Pair - Done
33,981,669 UART: [art] Signing Cert with AUTHO
33,983,016 UART: RITY.KEYID = 7
36,270,747 UART: [art] Erasing AUTHORITY.KEYID = 7
36,272,308 UART: [art] PUB.X = E1125D88473320A0D45335AD683A58BC8F13C274D56BE96833C669FC26D22202571E7202AFE7CED75744CAB495BD0CD7
36,279,494 UART: [art] PUB.Y = E64A3B1B2C2370059A1D1D4AB315393E538BA18BF1A6515D7D302397A700784DBFB42733E4DDA6017C7027F1500E7CDF
36,286,684 UART: [art] SIG.R = 5F38B1D3E5704331D627D7C96F34EBE27BB1DB951FC38290AE059913B55AB251CEA211FFCB249340C943A2BBC9B51D02
36,294,108 UART: [art] SIG.S = E26D4E9502D8F99C81E07ACC1F6374DEB1A70C35F8D65DEE6B657109B23E2D0825F93466BDBC59C15E7C85935B3E1FCE
37,599,179 UART: Caliptra RT
37,599,937 UART: [state] CFI Enabled
37,762,254 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,803,857 ready_for_fw is high
3,804,237 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,436,212 >>> mbox cmd response: success
28,130,775 UART:
28,131,238 UART: Running Caliptra FMC ...
28,132,350 UART:
28,132,528 UART: [state] CFI Enabled
28,199,158 UART: [fht] FMC Alias Private Key: 7
30,536,863 UART: [art] Extend RT PCRs Done
30,538,142 UART: [art] Lock RT PCRs Done
30,539,803 UART: [art] Populate DV Done
30,545,163 UART: [fht] FMC Alias Private Key: 7
30,546,771 UART: [art] Derive CDI
30,547,561 UART: [art] Store in in slot 0x4
30,607,516 UART: [art] Derive Key Pair
30,608,561 UART: [art] Store priv key in slot 0x5
33,901,544 UART: [art] Derive Key Pair - Done
33,914,810 UART: [art] Signing Cert with AUTHO
33,916,150 UART: RITY.KEYID = 7
36,202,229 UART: [art] Erasing AUTHORITY.KEYID = 7
36,203,800 UART: [art] PUB.X = 3B0D3B57CA324B3389CF679FF05739346C4DA6E7837A7449035E3128976FED4160F91715ABC46F3DA31006141FC7C86E
36,210,944 UART: [art] PUB.Y = 6DF4FF266AD3049BBD24D8EB9B7361FDDEB5766EA05E075840CA0E2DDCAE76880E2DD03FE3B772B2207B848AAB43649C
36,218,244 UART: [art] SIG.R = 3544BD0CD334638C74DF94AEE35C9D8D4FCBE1041492F7E6D96EF5311F8ABCBBD1D9DE468A17CEA5A16D37E8D0EE6802
36,225,688 UART: [art] SIG.S = 865DBB8CDBF5D030DD237DAA05B7229C9148414366689A9998D9F357F5CD133D37FB3588026E41EE8AF8E817681F6D55
37,530,893 UART: Caliptra RT
37,531,635 UART: [state] CFI Enabled
37,692,377 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.41s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,356 UART:
192,730 UART: Running Caliptra ROM ...
193,830 UART:
603,379 UART: [state] CFI Enabled
617,985 UART: [state] LifecycleState = Production
619,747 UART: [state] DebugLocked = No
621,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,845 UART: [kat] SHA2-256
795,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,155 UART: [kat] ++
806,593 UART: [kat] sha1
817,886 UART: [kat] SHA2-256
820,537 UART: [kat] SHA2-384
827,375 UART: [kat] SHA2-512-ACC
829,696 UART: [kat] ECC-384
3,114,883 UART: [kat] HMAC-384Kdf
3,126,991 UART: [kat] LMS
4,317,066 UART: [kat] --
4,320,711 UART: [cold-reset] ++
4,322,367 UART: [fht] Storing FHT @ 0x50003400
4,334,830 UART: [idev] ++
4,335,386 UART: [idev] CDI.KEYID = 6
4,336,333 UART: [idev] SUBJECT.KEYID = 7
4,337,581 UART: [idev] UDS.KEYID = 0
4,338,525 ready_for_fw is high
4,338,720 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,112 UART: [idev] Erasing UDS.KEYID = 0
7,624,942 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,684 UART: [idev] --
7,649,413 UART: [ldev] ++
7,649,989 UART: [ldev] CDI.KEYID = 6
7,650,924 UART: [ldev] SUBJECT.KEYID = 5
7,652,050 UART: [ldev] AUTHORITY.KEYID = 7
7,653,385 UART: [ldev] FE.KEYID = 1
7,664,534 UART: [ldev] Erasing FE.KEYID = 1
10,956,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,570 UART: [ldev] --
13,318,061 UART: [fwproc] Waiting for Commands...
13,321,238 UART: [fwproc] Received command 0x46574c44
13,323,415 UART: [fwproc] Received Image of size 114124 bytes
22,314,137 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,391,955 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,460,821 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,778,441 >>> mbox cmd response: success
22,783,306 UART: [afmc] ++
22,783,917 UART: [afmc] CDI.KEYID = 6
22,784,852 UART: [afmc] SUBJECT.KEYID = 7
22,786,190 UART: [afmc] AUTHORITY.KEYID = 5
26,103,070 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,398,808 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,401,085 UART: [afmc] PUB.X = 5348D258DE77EF97F637AF69C21E68ACD6AF0C3F87E456B42EFD178DE46AC5C6BEE0231BC08A8C6FC4B952CC39F73A2A
28,415,725 UART: [afmc] PUB.Y = BCC845DEC9D5D652A78CC24F1E69F3EDBCC4E95D7A4708F662379DFAB92294A7E1F1880D8FDBABDA66164BAE4BC962EE
28,430,458 UART: [afmc] SIG.R = 6A0C2E7504B5CFA05081287A9C14EDB8A8C399FDE244DE866717A9AE00799D5565090397AB4DD4D8F8580529AC54AEF8
28,444,903 UART: [afmc] SIG.S = D626E0867A2A659B92DB66847BA60944DF7F20034E039E932616F92B8D8CB3EB9D4B433B717B369420F3B415311147FE
28,466,060 UART: [afmc] --
28,470,014 UART: [cold-reset] --
28,474,570 UART: [state] Locking Datavault
28,482,255 UART: [state] Locking PCR0, PCR1 and PCR31
28,484,061 UART: [state] Locking ICCM
28,486,141 UART: [exit] Launching FMC @ 0x40000130
28,494,507 UART:
28,494,755 UART: Running Caliptra FMC ...
28,495,894 UART:
28,496,069 UART: [state] CFI Enabled
28,503,844 UART: [fht] FMC Alias Private Key: 7
30,834,688 UART: [art] Extend RT PCRs Done
30,835,957 UART: [art] Lock RT PCRs Done
30,837,650 UART: [art] Populate DV Done
30,842,929 UART: [fht] FMC Alias Private Key: 7
30,844,632 UART: [art] Derive CDI
30,845,398 UART: [art] Store in in slot 0x4
30,887,915 UART: [art] Derive Key Pair
30,888,955 UART: [art] Store priv key in slot 0x5
34,131,658 UART: [art] Derive Key Pair - Done
34,144,620 UART: [art] Signing Cert with AUTHO
34,145,964 UART: RITY.KEYID = 7
36,425,192 UART: [art] Erasing AUTHORITY.KEYID = 7
36,426,755 UART: [art] PUB.X = 810A9B624C3322CBDDD1A927D52961D333D3C9E90C58D3959FF928A8560A10DE0F881810A27158BFFF5134D337FF51F4
36,433,981 UART: [art] PUB.Y = 56F8966A181FB419EFE434DC4622B378CD512D296E136125D0ED8D27E1828F0AC08CE141910EBE6BB7CED1C1830A315E
36,441,195 UART: [art] SIG.R = 0286FD3A729FF310F6934436FE559905967CECE34D8FC27B001F8EA988742D675226C60ED3702CAC17CBB89157E76AFA
36,448,550 UART: [art] SIG.S = C45BBBF634EBAE2E96BD5931A28F8FCB0F40967426FB72D2BF20052DD6D614289164D0D0A9157606218E6C200848D8FC
37,753,771 UART: Caliptra RT
37,754,489 UART: [state] CFI Enabled
37,872,100 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.54s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
4,121,193 ready_for_fw is high
4,121,649 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,203,770 >>> mbox cmd response: success
27,844,314 UART:
27,844,689 UART: Running Caliptra FMC ...
27,845,857 UART:
27,846,025 UART: [state] CFI Enabled
27,853,886 UART: [fht] FMC Alias Private Key: 7
30,184,550 UART: [art] Extend RT PCRs Done
30,185,815 UART: [art] Lock RT PCRs Done
30,187,497 UART: [art] Populate DV Done
30,193,020 UART: [fht] FMC Alias Private Key: 7
30,194,630 UART: [art] Derive CDI
30,195,484 UART: [art] Store in in slot 0x4
30,238,009 UART: [art] Derive Key Pair
30,239,051 UART: [art] Store priv key in slot 0x5
33,481,778 UART: [art] Derive Key Pair - Done
33,494,753 UART: [art] Signing Cert with AUTHO
33,496,096 UART: RITY.KEYID = 7
35,775,405 UART: [art] Erasing AUTHORITY.KEYID = 7
35,776,962 UART: [art] PUB.X = 9442BA59E6C2694DDC99B7B0F0B7B9175BA107D738BE185A07FCA48C9990EA00D111F24B5148635185C6B382077ECFB6
35,784,170 UART: [art] PUB.Y = 8708E29DDB9A87D94B16B2A82C7B6E11AAB04281C35F4B1638FE59A3689AACB98D136079E421CEBC678C2581BCF9341F
35,791,439 UART: [art] SIG.R = B00D018138A83433EAC331495318FDF3533E3D31FED3C1E2E8B4BE35C717D3F94DE066D8F5712C08D2C249E4A5E7CA13
35,798,878 UART: [art] SIG.S = 0BF06852DA2F2DC2A1600EF67581E2273A252FB7DFAB11D3B6FA8F541CDCC80807CFF580C63D8ABA566107F51CEE3CAA
37,104,190 UART: Caliptra RT
37,104,915 UART: [state] CFI Enabled
37,222,667 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
192,464 UART:
192,857 UART: Running Caliptra ROM ...
193,981 UART:
194,126 UART: [state] CFI Enabled
261,058 UART: [state] LifecycleState = Production
262,740 UART: [state] DebugLocked = No
264,900 UART: [state] WD Timer not started. Device not locked for debugging
268,502 UART: [kat] SHA2-256
447,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,093 UART: [kat] ++
459,656 UART: [kat] sha1
470,748 UART: [kat] SHA2-256
473,751 UART: [kat] SHA2-384
480,230 UART: [kat] SHA2-512-ACC
483,162 UART: [kat] ECC-384
2,949,269 UART: [kat] HMAC-384Kdf
2,970,677 UART: [kat] LMS
3,500,176 UART: [kat] --
3,504,320 UART: [cold-reset] ++
3,505,322 UART: [fht] FHT @ 0x50003400
3,515,229 UART: [idev] ++
3,515,797 UART: [idev] CDI.KEYID = 6
3,516,700 UART: [idev] SUBJECT.KEYID = 7
3,517,869 UART: [idev] UDS.KEYID = 0
3,518,860 ready_for_fw is high
3,519,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,028 UART: [idev] Erasing UDS.KEYID = 0
6,025,962 UART: [idev] Sha1 KeyId Algorithm
6,050,209 UART: [idev] --
6,054,235 UART: [ldev] ++
6,054,814 UART: [ldev] CDI.KEYID = 6
6,055,701 UART: [ldev] SUBJECT.KEYID = 5
6,056,912 UART: [ldev] AUTHORITY.KEYID = 7
6,058,142 UART: [ldev] FE.KEYID = 1
6,100,764 UART: [ldev] Erasing FE.KEYID = 1
8,619,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,953 UART: [ldev] --
10,417,509 UART: [fwproc] Wait for Commands...
10,420,696 UART: [fwproc] Recv command 0x46574c44
10,422,786 UART: [fwproc] Recv'd Img size: 114448 bytes
15,031,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,104,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,172,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,491,282 >>> mbox cmd response: success
15,495,420 UART: [afmc] ++
15,496,032 UART: [afmc] CDI.KEYID = 6
15,496,968 UART: [afmc] SUBJECT.KEYID = 7
15,498,111 UART: [afmc] AUTHORITY.KEYID = 5
18,028,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,755,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,757,029 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
19,773,088 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
19,789,080 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
19,804,988 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
19,828,073 UART: [afmc] --
19,831,263 UART: [cold-reset] --
19,835,583 UART: [state] Locking Datavault
19,841,078 UART: [state] Locking PCR0, PCR1 and PCR31
19,842,757 UART: [state] Locking ICCM
19,844,221 UART: [exit] Launching FMC @ 0x40000130
19,852,680 UART:
19,852,936 UART: Running Caliptra FMC ...
19,853,995 UART:
19,854,141 UART: [state] CFI Enabled
19,913,392 UART: [fht] FMC Alias Private Key: 7
21,677,616 UART: [art] Extend RT PCRs Done
21,678,877 UART: [art] Lock RT PCRs Done
21,680,363 UART: [art] Populate DV Done
21,685,962 UART: [fht] FMC Alias Private Key: 7
21,687,512 UART: [art] Derive CDI
21,688,302 UART: [art] Store in in slot 0x4
21,745,925 UART: [art] Derive Key Pair
21,747,003 UART: [art] Store priv key in slot 0x5
24,210,281 UART: [art] Derive Key Pair - Done
24,223,703 UART: [art] Signing Cert with AUTHO
24,225,042 UART: RITY.KEYID = 7
25,936,160 UART: [art] Erasing AUTHORITY.KEYID = 7
25,937,714 UART: [art] PUB.X = 2F172A75115C067A1954CDF37C69DB9B13739F225F8053548AEDACBBDE7DB475118CC68C7B4D20C8B9B3E65CB1585132
25,944,906 UART: [art] PUB.Y = BCBC853D4AD02EBBCDE6A83DECDD360A4F48AEE08FCBF9960CCD339490569E033B98411CCE2A9FA30774E364A62E2C41
25,952,240 UART: [art] SIG.R = A9161C0F1933ACEEA41D32E95EB71D0D08A8E9C1B9DCD4E8794827AA215525E428C227FD698C6FA933F4B92EBC1D7DB4
25,959,609 UART: [art] SIG.S = 0342E9CEDE8046E850A53B177EB5524B97D1FE6EF4F475B784BC9743D6880B2943D67A0D1426F99CE7FB07B90DDCC33A
26,938,705 UART: Caliptra RT
26,939,420 UART: [state] CFI Enabled
27,104,150 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,361,639 ready_for_fw is high
3,362,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,047,369 >>> mbox cmd response: success
19,343,405 UART:
19,343,782 UART: Running Caliptra FMC ...
19,344,982 UART:
19,345,166 UART: [state] CFI Enabled
19,411,914 UART: [fht] FMC Alias Private Key: 7
21,176,531 UART: [art] Extend RT PCRs Done
21,177,789 UART: [art] Lock RT PCRs Done
21,179,427 UART: [art] Populate DV Done
21,184,866 UART: [fht] FMC Alias Private Key: 7
21,186,425 UART: [art] Derive CDI
21,187,227 UART: [art] Store in in slot 0x4
21,244,382 UART: [art] Derive Key Pair
21,245,470 UART: [art] Store priv key in slot 0x5
23,708,192 UART: [art] Derive Key Pair - Done
23,721,329 UART: [art] Signing Cert with AUTHO
23,722,714 UART: RITY.KEYID = 7
25,433,329 UART: [art] Erasing AUTHORITY.KEYID = 7
25,434,883 UART: [art] PUB.X = 5F2A9A81D31314C0750DEE6AEACEE235CA8AB7FB874E033464B8C3D15AC95350969835C65BA9D4CC6A5346FBA3864CBD
25,442,183 UART: [art] PUB.Y = B6B3DA3FBEE8077E5FE950EB8170E754A79201B897949DA33813E2A8F1679A241957379E47471FB3499A1F231BA37A42
25,449,379 UART: [art] SIG.R = 28BD8DEF7B7D2CE61CFE13810AE4C3A0F68B5D6E69B45142CC455569046E147D18CBC496293F1B7E4E1793C0E685B915
25,456,816 UART: [art] SIG.S = 048A53B4B17F8E465E1356C37E06432FF113123EE78B70E7BF2E5765D781A7AD3937CDC1B1503D7AE931D12BF46A42CB
26,436,035 UART: Caliptra RT
26,436,775 UART: [state] CFI Enabled
26,600,324 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
192,823 UART:
193,193 UART: Running Caliptra ROM ...
194,280 UART:
603,759 UART: [state] CFI Enabled
617,718 UART: [state] LifecycleState = Production
619,399 UART: [state] DebugLocked = No
622,129 UART: [state] WD Timer not started. Device not locked for debugging
626,089 UART: [kat] SHA2-256
805,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,725 UART: [kat] ++
817,252 UART: [kat] sha1
827,560 UART: [kat] SHA2-256
830,559 UART: [kat] SHA2-384
836,539 UART: [kat] SHA2-512-ACC
839,485 UART: [kat] ECC-384
3,281,697 UART: [kat] HMAC-384Kdf
3,293,658 UART: [kat] LMS
3,823,132 UART: [kat] --
3,826,422 UART: [cold-reset] ++
3,828,349 UART: [fht] FHT @ 0x50003400
3,840,464 UART: [idev] ++
3,841,032 UART: [idev] CDI.KEYID = 6
3,841,946 UART: [idev] SUBJECT.KEYID = 7
3,843,120 UART: [idev] UDS.KEYID = 0
3,844,056 ready_for_fw is high
3,844,252 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,977 UART: [idev] Erasing UDS.KEYID = 0
6,314,162 UART: [idev] Sha1 KeyId Algorithm
6,335,871 UART: [idev] --
6,339,866 UART: [ldev] ++
6,340,428 UART: [ldev] CDI.KEYID = 6
6,341,389 UART: [ldev] SUBJECT.KEYID = 5
6,342,540 UART: [ldev] AUTHORITY.KEYID = 7
6,343,821 UART: [ldev] FE.KEYID = 1
6,356,677 UART: [ldev] Erasing FE.KEYID = 1
8,833,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,393 UART: [ldev] --
10,622,505 UART: [fwproc] Wait for Commands...
10,625,728 UART: [fwproc] Recv command 0x46574c44
10,627,813 UART: [fwproc] Recv'd Img size: 114448 bytes
15,200,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,269,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,338,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,657,185 >>> mbox cmd response: success
15,661,554 UART: [afmc] ++
15,662,168 UART: [afmc] CDI.KEYID = 6
15,663,074 UART: [afmc] SUBJECT.KEYID = 7
15,664,412 UART: [afmc] AUTHORITY.KEYID = 5
18,166,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,888,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,890,112 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
19,906,150 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
19,922,183 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
19,938,095 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
19,961,660 UART: [afmc] --
19,965,660 UART: [cold-reset] --
19,968,844 UART: [state] Locking Datavault
19,975,641 UART: [state] Locking PCR0, PCR1 and PCR31
19,977,318 UART: [state] Locking ICCM
19,978,814 UART: [exit] Launching FMC @ 0x40000130
19,987,274 UART:
19,987,520 UART: Running Caliptra FMC ...
19,988,657 UART:
19,988,817 UART: [state] CFI Enabled
19,996,704 UART: [fht] FMC Alias Private Key: 7
21,753,505 UART: [art] Extend RT PCRs Done
21,754,766 UART: [art] Lock RT PCRs Done
21,756,158 UART: [art] Populate DV Done
21,761,566 UART: [fht] FMC Alias Private Key: 7
21,763,120 UART: [art] Derive CDI
21,763,964 UART: [art] Store in in slot 0x4
21,806,667 UART: [art] Derive Key Pair
21,807,751 UART: [art] Store priv key in slot 0x5
24,234,158 UART: [art] Derive Key Pair - Done
24,246,754 UART: [art] Signing Cert with AUTHO
24,248,104 UART: RITY.KEYID = 7
25,952,982 UART: [art] Erasing AUTHORITY.KEYID = 7
25,954,557 UART: [art] PUB.X = A5B312309A7E492C86C072B742E35A05A7C58A3CBF0E1FA8FB6C5E2C24C7369BBFBC51F1F0D03A6CFA8A539926687045
25,961,826 UART: [art] PUB.Y = 542EFC63CA0A1A94192768CFFFC064335D12E2125D120CA1791E038EF7018E4E59986976D5C3088C9EB3D941652CB2C0
25,969,068 UART: [art] SIG.R = 15C9EAC01FCE66A7E6EA94199B7E64D7B4662F6417B55CF1191E128E9C31177BEC34E7FE0A14BD51B4E42ABA56E739AB
25,976,445 UART: [art] SIG.S = A0371408AE574691EC63872654A4E194ABE68FD14ADFA4DE07BF8FCF203AAF628660FFB65FA40972002147B2928C11EB
26,955,173 UART: Caliptra RT
26,955,889 UART: [state] CFI Enabled
27,072,710 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,573 writing to cptra_bootfsm_go
3,696,333 ready_for_fw is high
3,696,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,283,828 >>> mbox cmd response: success
19,533,939 UART:
19,534,362 UART: Running Caliptra FMC ...
19,535,485 UART:
19,535,646 UART: [state] CFI Enabled
19,543,438 UART: [fht] FMC Alias Private Key: 7
21,299,392 UART: [art] Extend RT PCRs Done
21,300,647 UART: [art] Lock RT PCRs Done
21,302,322 UART: [art] Populate DV Done
21,307,908 UART: [fht] FMC Alias Private Key: 7
21,309,430 UART: [art] Derive CDI
21,310,228 UART: [art] Store in in slot 0x4
21,353,014 UART: [art] Derive Key Pair
21,354,063 UART: [art] Store priv key in slot 0x5
23,780,948 UART: [art] Derive Key Pair - Done
23,793,732 UART: [art] Signing Cert with AUTHO
23,795,120 UART: RITY.KEYID = 7
25,500,489 UART: [art] Erasing AUTHORITY.KEYID = 7
25,502,039 UART: [art] PUB.X = 76FE0ADF3C05018353FD1106898380248FC9790BFD062C2991F40776A57FDBD623F7B0214F71C565FF370919C37ADB63
25,509,288 UART: [art] PUB.Y = 3210A7FD80FF284F86255B3516CDD2F481EACD176A3E149AE951F101D4B10FE39EB5BFE025AC3D9F443B5C17A8309315
25,516,521 UART: [art] SIG.R = 1626A3B21A6D81452302E909332BBA9CEC9F11E91422519B8D64806AB091CB54467AC8120BDB6FD6C4C113768A63C5C9
25,523,924 UART: [art] SIG.S = 1DE2A8AD68E46F5D881809D7049867ED05A5FD0E3DFCFA6ABF5B5214B5805508ABFBF8188F397A647EA69C8B8E456220
26,502,931 UART: Caliptra RT
26,503,799 UART: [state] CFI Enabled
26,620,994 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
3,436,752 ready_for_fw is high
3,437,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,917,529 >>> mbox cmd response: success
20,210,440 UART:
20,210,850 UART: Running Caliptra FMC ...
20,212,008 UART:
20,212,173 UART: [state] CFI Enabled
20,280,941 UART: [fht] FMC Alias Private Key: 7
22,045,200 UART: [art] Extend RT PCRs Done
22,046,472 UART: [art] Lock RT PCRs Done
22,047,887 UART: [art] Populate DV Done
22,053,371 UART: [fht] FMC Alias Private Key: 7
22,055,034 UART: [art] Derive CDI
22,055,896 UART: [art] Store in in slot 0x4
22,113,841 UART: [art] Derive Key Pair
22,114,927 UART: [art] Store priv key in slot 0x5
24,577,481 UART: [art] Derive Key Pair - Done
24,590,548 UART: [art] Signing Cert with AUTHO
24,591,889 UART: RITY.KEYID = 7
26,303,957 UART: [art] Erasing AUTHORITY.KEYID = 7
26,305,519 UART: [art] PUB.X = 74BC58620A3B155AD2B503B9A55187F2F86CD0F9DD3CD60E48A2A915FD02960942BCC1073207C986E364273FAD19D801
26,312,715 UART: [art] PUB.Y = B8EDF9ABEB920B5C494D9BA63FFCEBE0ABF6EF07E0938BCC65FB8F08D916E1B6BC062410AD057FE172393CDA497B3DA9
26,320,046 UART: [art] SIG.R = E901FAB2E6DA22DA6C47FF264F5CF4FD166E74687EDBC7A16BE8B174BD0F793ED65919E7B1EB66697024F6F809001697
26,327,425 UART: [art] SIG.S = 923ABCDF9881369EE4F6729E3E01C87B6D45C3CF401466D0D14C609D7030A0BE925ADCD6DD0883413E5DF0BEDE79D877
27,306,519 UART: Caliptra RT
27,307,265 UART: [state] CFI Enabled
27,472,523 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.98s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,562 writing to cptra_bootfsm_go
3,757,150 ready_for_fw is high
3,757,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,134,902 >>> mbox cmd response: success
20,384,100 UART:
20,384,838 UART: Running Caliptra FMC ...
20,385,979 UART:
20,386,140 UART: [state] CFI Enabled
20,393,553 UART: [fht] FMC Alias Private Key: 7
22,150,294 UART: [art] Extend RT PCRs Done
22,151,570 UART: [art] Lock RT PCRs Done
22,152,996 UART: [art] Populate DV Done
22,158,693 UART: [fht] FMC Alias Private Key: 7
22,160,203 UART: [art] Derive CDI
22,161,004 UART: [art] Store in in slot 0x4
22,203,442 UART: [art] Derive Key Pair
22,204,492 UART: [art] Store priv key in slot 0x5
24,631,021 UART: [art] Derive Key Pair - Done
24,643,722 UART: [art] Signing Cert with AUTHO
24,645,095 UART: RITY.KEYID = 7
26,350,026 UART: [art] Erasing AUTHORITY.KEYID = 7
26,351,637 UART: [art] PUB.X = 88FF1CF04A0CC9DC69B53CB8BA51599F813E15847AFB8C252055CF401C5A88F95484499CD3079D7AFDA9C49CCF9A0F78
26,358,866 UART: [art] PUB.Y = EC98D28F020D325F38D8565DB2782617A8E6F491C5E7B1BB6F17FFBF0A07BBF8A30DAB597EBEEE9404600F7F4D0496ED
26,366,049 UART: [art] SIG.R = 48DCE0B7386FA8E1E1A44FC0EC73A3DC37C37F70E6B07915597E0619C392CFC149FC349FF9814F8C53AB3FB103C7D55A
26,373,509 UART: [art] SIG.S = D903195CC087B699BBC11B37560D88E63879056BD534DE7227C5D9EFDCAEE74ADCCCBBB1D797312231F93896719096F4
27,353,004 UART: Caliptra RT
27,353,745 UART: [state] CFI Enabled
27,470,606 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,177 writing to cptra_bootfsm_go
192,775 UART:
193,912 UART: Running Caliptra ROM ...
195,160 UART:
195,418 UART: [state] CFI Enabled
264,090 UART: [state] LifecycleState = Unprovisioned
266,400 UART: [state] DebugLocked = Yes
267,875 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,068 UART: [kat] SHA2-256
442,821 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,205 UART: [kat] ++
454,816 UART: [kat] sha1
465,051 UART: [kat] SHA2-256
467,770 UART: [kat] SHA2-384
474,344 UART: [kat] SHA2-512-ACC
476,696 UART: [kat] ECC-384
2,769,803 UART: [kat] HMAC-384Kdf
2,788,433 UART: [kat] LMS
3,978,708 UART: [kat] --
3,981,699 UART: [cold-reset] ++
3,984,178 UART: [fht] Storing FHT @ 0x50003400
3,996,629 UART: [idev] ++
3,997,258 UART: [idev] CDI.KEYID = 6
3,998,145 UART: [idev] SUBJECT.KEYID = 7
3,999,363 UART: [idev] UDS.KEYID = 0
4,023,444 UART: [idev] Erasing UDS.KEYID = 0
7,337,086 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,935 UART: [idev] CSR upload requested
7,363,118 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,667,339 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,681,911 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,696,681 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,710,943 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
9,733,951 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,734 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
7,692 writing to cptra_bootfsm_go
196,305 UART:
197,466 UART: Running Caliptra ROM ...
198,736 UART:
607,452 UART: [state] CFI Enabled
621,971 UART: [state] LifecycleState = Unprovisioned
623,988 UART: [state] DebugLocked = Yes
626,077 UART: [state] Starting the Watchdog Timer 40000000 cycles
630,572 UART: [kat] SHA2-256
800,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,894 UART: [kat] ++
811,385 UART: [kat] sha1
822,700 UART: [kat] SHA2-256
825,448 UART: [kat] SHA2-384
831,556 UART: [kat] SHA2-512-ACC
833,894 UART: [kat] ECC-384
3,117,252 UART: [kat] HMAC-384Kdf
3,127,999 UART: [kat] LMS
4,318,146 UART: [kat] --
4,322,656 UART: [cold-reset] ++
4,324,830 UART: [fht] Storing FHT @ 0x50003400
4,336,367 UART: [idev] ++
4,336,941 UART: [idev] CDI.KEYID = 6
4,337,906 UART: [idev] SUBJECT.KEYID = 7
4,339,113 UART: [idev] UDS.KEYID = 0
4,356,273 UART: [idev] Erasing UDS.KEYID = 0
7,626,739 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,029 UART: [idev] CSR upload requested
7,653,210 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,944,588 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,959,182 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,973,880 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,988,205 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
10,011,152 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
9,333 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
192,437 UART:
193,471 UART: Running Caliptra ROM ...
194,666 UART:
194,819 UART: [state] CFI Enabled
265,410 UART: [state] LifecycleState = Unprovisioned
267,631 UART: [state] DebugLocked = Yes
269,640 UART: [state] Starting the WD Timer 40000000 cycles
273,807 UART: [kat] SHA2-256
452,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,504 UART: [kat] ++
465,052 UART: [kat] sha1
477,147 UART: [kat] SHA2-256
480,158 UART: [kat] SHA2-384
486,267 UART: [kat] SHA2-512-ACC
489,192 UART: [kat] ECC-384
2,953,645 UART: [kat] HMAC-384Kdf
2,977,690 UART: [kat] LMS
3,507,173 UART: [kat] --
3,512,931 UART: [cold-reset] ++
3,514,742 UART: [fht] FHT @ 0x50003400
3,525,844 UART: [idev] ++
3,526,411 UART: [idev] CDI.KEYID = 6
3,527,426 UART: [idev] SUBJECT.KEYID = 7
3,528,583 UART: [idev] UDS.KEYID = 0
3,549,857 UART: [idev] Erasing UDS.KEYID = 0
6,032,522 UART: [idev] Sha1 KeyId Algorithm
6,054,289 UART: [idev] CSR upload begun
6,059,008 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,787,502 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,803,561 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,819,426 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,835,286 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,859,255 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,783 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,978 writing to cptra_bootfsm_go
192,619 UART:
193,720 UART: Running Caliptra ROM ...
194,906 UART:
603,631 UART: [state] CFI Enabled
616,539 UART: [state] LifecycleState = Unprovisioned
618,404 UART: [state] DebugLocked = Yes
621,330 UART: [state] Starting the WD Timer 40000000 cycles
626,335 UART: [kat] SHA2-256
805,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,048 UART: [kat] ++
817,558 UART: [kat] sha1
829,388 UART: [kat] SHA2-256
832,435 UART: [kat] SHA2-384
838,900 UART: [kat] SHA2-512-ACC
841,900 UART: [kat] ECC-384
3,283,925 UART: [kat] HMAC-384Kdf
3,297,291 UART: [kat] LMS
3,826,822 UART: [kat] --
3,831,810 UART: [cold-reset] ++
3,833,582 UART: [fht] FHT @ 0x50003400
3,844,778 UART: [idev] ++
3,845,344 UART: [idev] CDI.KEYID = 6
3,846,256 UART: [idev] SUBJECT.KEYID = 7
3,847,408 UART: [idev] UDS.KEYID = 0
3,865,100 UART: [idev] Erasing UDS.KEYID = 0
6,320,046 UART: [idev] Sha1 KeyId Algorithm
6,341,285 UART: [idev] CSR upload begun
6,345,996 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,062,347 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,078,499 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,094,346 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,110,141 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,134,177 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,893 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,099 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
18,337 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,727 UART: [state] LifecycleState = Unprovisioned
85,383 UART: [state] DebugLocked = Yes
86,047 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,623 UART: [kat] SHA2-256
881,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,669 UART: [kat] ++
885,821 UART: [kat] sha1
890,137 UART: [kat] SHA2-256
892,075 UART: [kat] SHA2-384
895,052 UART: [kat] SHA2-512-ACC
896,953 UART: [kat] ECC-384
902,166 UART: [kat] HMAC-384Kdf
906,816 UART: [kat] LMS
1,475,012 UART: [kat] --
1,476,121 UART: [cold-reset] ++
1,476,568 UART: [fht] Storing FHT @ 0x50003400
1,479,331 UART: [idev] ++
1,479,499 UART: [idev] CDI.KEYID = 6
1,479,859 UART: [idev] SUBJECT.KEYID = 7
1,480,283 UART: [idev] UDS.KEYID = 0
1,488,510 UART: [idev] Erasing UDS.KEYID = 0
1,504,803 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,099 UART: [idev] CSR upload requested
1,514,945 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,486 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,531,198 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,537,100 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,542,804 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,551,339 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = Yes
86,802 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
890,868 UART: [kat] SHA2-256
892,806 UART: [kat] SHA2-384
895,595 UART: [kat] SHA2-512-ACC
897,496 UART: [kat] ECC-384
903,435 UART: [kat] HMAC-384Kdf
908,207 UART: [kat] LMS
1,476,403 UART: [kat] --
1,477,238 UART: [cold-reset] ++
1,477,739 UART: [fht] Storing FHT @ 0x50003400
1,480,500 UART: [idev] ++
1,480,668 UART: [idev] CDI.KEYID = 6
1,481,028 UART: [idev] SUBJECT.KEYID = 7
1,481,452 UART: [idev] UDS.KEYID = 0
1,489,533 UART: [idev] Erasing UDS.KEYID = 0
1,506,702 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,112 UART: [idev] CSR upload requested
1,516,958 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,527,875 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,533,587 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,539,489 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,545,193 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,553,728 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,399 UART: [state] Starting the WD Timer 40000000 cycles
87,912 UART: [kat] SHA2-256
893,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,687 UART: [kat] ++
897,839 UART: [kat] sha1
901,971 UART: [kat] SHA2-256
903,911 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
918,148 UART: [kat] HMAC-384Kdf
922,900 UART: [kat] LMS
1,171,228 UART: [kat] --
1,172,263 UART: [cold-reset] ++
1,172,692 UART: [fht] FHT @ 0x50003400
1,175,285 UART: [idev] ++
1,175,453 UART: [idev] CDI.KEYID = 6
1,175,813 UART: [idev] SUBJECT.KEYID = 7
1,176,237 UART: [idev] UDS.KEYID = 0
1,183,828 UART: [idev] Erasing UDS.KEYID = 0
1,201,098 UART: [idev] Sha1 KeyId Algorithm
1,209,455 UART: [idev] CSR upload begun
1,211,236 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,008 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,227,720 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,233,622 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,326 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,247,861 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = Yes
87,032 UART: [state] Starting the WD Timer 40000000 cycles
88,651 UART: [kat] SHA2-256
894,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,426 UART: [kat] ++
898,578 UART: [kat] sha1
902,804 UART: [kat] SHA2-256
904,744 UART: [kat] SHA2-384
907,395 UART: [kat] SHA2-512-ACC
909,296 UART: [kat] ECC-384
919,023 UART: [kat] HMAC-384Kdf
923,571 UART: [kat] LMS
1,171,899 UART: [kat] --
1,172,696 UART: [cold-reset] ++
1,173,091 UART: [fht] FHT @ 0x50003400
1,175,574 UART: [idev] ++
1,175,742 UART: [idev] CDI.KEYID = 6
1,176,102 UART: [idev] SUBJECT.KEYID = 7
1,176,526 UART: [idev] UDS.KEYID = 0
1,184,339 UART: [idev] Erasing UDS.KEYID = 0
1,201,267 UART: [idev] Sha1 KeyId Algorithm
1,209,694 UART: [idev] CSR upload begun
1,211,475 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,287 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,227,999 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,233,901 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,605 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,140 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = Yes
86,379 UART: [state] Starting the WD Timer 40000000 cycles
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,244 UART: [kat] LMS
1,168,556 UART: [kat] --
1,169,339 UART: [cold-reset] ++
1,169,718 UART: [fht] FHT @ 0x50003400
1,172,384 UART: [idev] ++
1,172,552 UART: [idev] CDI.KEYID = 6
1,172,913 UART: [idev] SUBJECT.KEYID = 7
1,173,338 UART: [idev] UDS.KEYID = 0
1,181,015 UART: [idev] Erasing UDS.KEYID = 0
1,197,948 UART: [idev] Sha1 KeyId Algorithm
1,206,377 UART: [idev] CSR upload begun
1,208,156 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,061 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,224,774 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,230,679 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,236,384 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,244,928 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,594 UART: [state] DebugLocked = Yes
86,336 UART: [state] Starting the WD Timer 40000000 cycles
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,637 UART: [kat] SHA2-512-ACC
906,538 UART: [kat] ECC-384
916,277 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,170,038 UART: [cold-reset] ++
1,170,553 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,683 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] CSR upload begun
1,209,653 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,064 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,225,777 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,231,682 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,237,387 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,245,931 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
Truncated 5081 bytes from beginning
82F3FCD36841038532764E478CEFEFDD00C62A9F10210
36,269,892 UART: [art] SIG.S = 3A79CC07BE1376714DB8D564B0A4AC246B1D257FC23FFCB4CB3E6B9A4F3D25C1CFCA4EE5BA2E78596BA42B1549AE47D0
37,575,904 UART: Caliptra RT
37,576,644 UART: [state] CFI Enabled
37,736,783 UART: [rt] RT listening for mailbox commands...
37,891,415 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,335,616 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,768,737 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d8, a8, 02, 3e, 68, 33, 57, 16, f9, dd, b1, 3c, fb, 44, 20, ef, 6f, dd, 0d, 5d, 5d, 2b, 3d, 79, 23, e9, d4, 77, 00, 23, e6, 03, 3d, 0a, b5, 35, a3, 35, 84, a8, 49, d8, 05, 78, 4d, 07, 00, 60]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
67:f7:07:a5:d3:e1:f8:60:58:c0:62:c0:ba:ae:da:a2:a1:e6:a1:4b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=67F707A5D3E1F86058C062C0BAAEDAA2A1E6A14B7AE7818717F2E0E8C7987405
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:26:fb:d5:83:f8:2d:f8:9c:30:6d:3a:9d:fc:06:
b5:f8:54:e4:bd:24:29:c4:12:9e:4e:c9:b9:25:f9:
70:5e:fd:a9:9a:a5:e6:64:07:24:3c:ce:a9:e3:82:
e5:d4:25:21:74:6a:c0:b7:db:26:1b:50:13:42:ee:
9d:09:fe:af:ec:fd:1c:9c:bc:31:a5:45:1d:2d:9b:
97:7b:b9:7d:59:00:a4:e3:3d:11:f0:23:b9:80:3e:
ca:66:bd:cc:fb:14:5b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0>....W3h<.... D.].oy=+]w..#..#.5.
=..5.x..I`..M..RT_INFO
X509v3 Subject Key Identifier:
67:F7:07:A5:D3:E1:F8:60:58:C0:62:C0:BA:AE:DA:A2:A1:E6:A1:4B
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:18:b4:8c:b8:a7:8a:d5:5a:65:74:d7:0b:ec:9b:
a8:de:18:99:52:3a:eb:e3:cb:44:36:48:2f:3f:cd:36:84:10:
38:53:27:64:e4:78:ce:fe:fd:d0:0c:62:a9:f1:02:10:02:30:
3a:79:cc:07:be:13:76:71:4d:b8:d5:64:b0:a4:ac:24:6b:1d:
25:7f:c2:3f:fc:b4:cb:3e:6b:9a:4f:3d:25:c1:cf:ca:4e:e5:
ba:2e:78:59:6b:a4:2b:15:49:ae:47:d0
41,229,991 <<< Executing mbox cmd 0x46574c44 (111864 bytes) from SoC
41,372,507 UART:
41,372,889 UART: Running Caliptra ROM ...
41,373,964 UART:
41,374,121 UART: [state] CFI Enabled
41,451,548 UART: [state] LifecycleState = Production
41,453,381 UART: [state] DebugLocked = Yes
41,455,993 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,461,695 UART: [kat] SHA2-256
41,631,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,641,924 UART: [kat] ++
41,642,578 UART: [kat] sha1
41,655,034 UART: [kat] SHA2-256
41,657,723 UART: [kat] SHA2-384
41,663,121 UART: [kat] SHA2-512-ACC
41,665,466 UART: [kat] ECC-384
43,956,030 UART: [kat] HMAC-384Kdf
43,985,905 UART: [kat] LMS
45,176,209 UART: [kat] --
45,180,121 UART: [update-reset] ++
53,907,192 UART: [update-reset] Image verified using Vendor ECC Key Index 0
53,910,267 UART: [update-reset] Loading Runtime at address 0x40005000 len 87160
54,284,567 >>> mbox cmd response: success
54,286,231 UART: [update-reset] Copying MAN_2 To MAN_1
54,308,607 UART: [update-reset Success] --
54,313,685 UART: [state] Locking Datavault
54,318,616 UART: [state] Locking PCR0, PCR1 and PCR31
54,320,374 UART: [state] Locking ICCM
54,322,853 UART: [exit] Launching FMC @ 0x40000130
54,331,248 UART:
54,331,480 UART: Running Caliptra FMC ...
54,332,579 UART:
54,332,743 UART: [state] CFI Enabled
54,421,105 UART: [art] Extend RT PCRs Done
54,422,282 UART: [art] Lock RT PCRs Done
54,424,034 UART: [art] Populate DV Done
54,429,332 UART: [fht] FMC Alias Private Key: 7
54,431,078 UART: [art] Derive CDI
54,431,817 UART: [art] Store in in slot 0x4
54,489,808 UART: [art] Derive Key Pair
54,490,844 UART: [art] Store priv key in slot 0x5
57,784,445 UART: [art] Derive Key Pair - Done
57,797,347 UART: [art] Signing Cert with AUTHO
57,798,648 UART: RITY.KEYID = 7
60,088,249 UART: [art] Erasing AUTHORITY.KEYID = 7
60,089,753 UART: [art] PUB.X = 52C6AFBAFEC5509857F303663932D6391DC7C019022C753AD8BCDB317CC2E3069487C2FDF14D343AB18981EBE590358E
60,097,068 UART: [art] PUB.Y = 1330D37AFC810BD0E3AA07AE4EFEE622443CDC793C1F0C5B367090C471F0F48DF454CA433244DC1230AA00BF4279095C
60,104,262 UART: [art] SIG.R = A18B18802FA1617068021D332A990B64D00F3145FB39FDF1399745A3CE96FF7B3095147B7826E198AA64BE655A4A36A6
60,111,664 UART: [art] SIG.S = E6BBF2FD93D9BFE3873EE6BE960A93BDDB935685910BA86740356FCCD0E07EA8A560412F2DC0B95AA74384B81487BB64
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
37:bc:e8:53:36:b8:1b:58:3d:f1:b9:61:9e:95:4f:f3:33:18:83:2d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=33BCE85336B81B583DF1B9619E954FF33318832D7AFAD702171E0A088FCC3192
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:52:c6:af:ba:fe:c5:50:98:57:f3:03:66:39:32:
d6:39:1d:c7:c0:19:02:2c:75:3a:d8:bc:db:31:7c:
c2:e3:06:94:87:c2:fd:f1:4d:34:3a:b1:89:81:eb:
e5:90:35:8e:13:30:d3:7a:fc:81:0b:d0:e3:aa:07:
ae:4e:fe:e6:22:44:3c:dc:79:3c:1f:0c:5b:36:70:
90:c4:71:f0:f4:8d:f4:54:ca:43:32:44:dc:12:30:
aa:00:bf:42:79:09:5c
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....01.g..
Sz..N..9..os@.|.......W..c#........m`..X)#..RT_INFO
X509v3 Subject Key Identifier:
33:BC:E8:53:36:B8:1B:58:3D:F1:B9:61:9E:95:4F:F3:33:18:83:2D
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:a1:8b:18:80:2f:a1:61:70:68:02:1d:33:2a:
99:0b:64:d0:0f:31:45:fb:39:fd:f1:39:97:45:a3:ce:96:ff:
7b:30:95:14:7b:78:26:e1:98:aa:64:be:65:5a:4a:36:a6:02:
31:00:e6:bb:f2:fd:93:d9:bf:e3:87:3e:e6:be:96:0a:93:bd:
db:93:56:85:91:0b:a8:67:40:35:6f:cc:d0:e0:7e:a8:a5:60:
41:2f:2d:c0:b9:5a:a7:43:84:b8:14:87:bb:64
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.22s
Truncated 558 bytes from beginning
5 ready_for_fw is high
3,807,602 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,239,130 >>> mbox cmd response: success
27,935,343 UART:
27,935,764 UART: Running Caliptra FMC ...
27,936,922 UART:
27,937,111 UART: [state] CFI Enabled
27,989,090 UART: [fht] FMC Alias Private Key: 7
30,326,584 UART: [art] Extend RT PCRs Done
30,327,818 UART: [art] Lock RT PCRs Done
30,329,367 UART: [art] Populate DV Done
30,334,646 UART: [fht] FMC Alias Private Key: 7
30,336,341 UART: [art] Derive CDI
30,337,172 UART: [art] Store in in slot 0x4
30,397,654 UART: [art] Derive Key Pair
30,398,652 UART: [art] Store priv key in slot 0x5
33,692,083 UART: [art] Derive Key Pair - Done
33,705,172 UART: [art] Signing Cert with AUTHO
33,706,480 UART: RITY.KEYID = 7
35,993,351 UART: [art] Erasing AUTHORITY.KEYID = 7
35,994,859 UART: [art] PUB.X = 47314B6F1B07E1A005DF7886D66313010949E0AC4589CD5687E112BACD05AC63F8616FCE490B65BB3481888E8E4E324F
36,002,114 UART: [art] PUB.Y = 6EF8F9D2C0FDA6ADABAAB2A74755B7FAFD37DA0992A168340882DCD81F01964D24A1BFB43D442CC7229542C5FA478790
36,009,357 UART: [art] SIG.R = B53E39C654511D852A9B7A4C6556A49EF14C5D60D2C8369FF737AD27668E00B74E2330AC50720104D4A22E3E9E0FE681
36,016,751 UART: [art] SIG.S = 42FDC142263DD5F84BB9BC4582C57A0AA970D2FEA8B006A68D87CB27A10ABD78571689E696E091531CCB5CC8494E2DCC
37,321,887 UART: Caliptra RT
37,322,602 UART: [state] CFI Enabled
37,482,905 UART: [rt] RT listening for mailbox commands...
37,514,329 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,959,303 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,394,240 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d8, a8, 02, 3e, 68, 33, 57, 16, f9, dd, b1, 3c, fb, 44, 20, ef, 6f, dd, 0d, 5d, 5d, 2b, 3d, 79, 23, e9, d4, 77, 00, 23, e6, 03, 3d, 0a, b5, 35, a3, 35, 84, a8, 49, d8, 05, 78, 4d, 07, 00, 60]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:e7:06:ce:6a:e3:31:49:9e:2b:95:9a:2a:19:9a:70:e7:0b:43:58
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=19E706CE6AE331499E2B959A2A199A70E70B435862C8A2A7A761AD5A16683C36
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:47:31:4b:6f:1b:07:e1:a0:05:df:78:86:d6:63:
13:01:09:49:e0:ac:45:89:cd:56:87:e1:12:ba:cd:
05:ac:63:f8:61:6f:ce:49:0b:65:bb:34:81:88:8e:
8e:4e:32:4f:6e:f8:f9:d2:c0:fd:a6:ad:ab:aa:b2:
a7:47:55:b7:fa:fd:37:da:09:92:a1:68:34:08:82:
dc:d8:1f:01:96:4d:24:a1:bf:b4:3d:44:2c:c7:22:
95:42:c5:fa:47:87:90
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0>....W3h<.... D.].oy=+]w..#..#.5.
=..5.x..I`..M..RT_INFO
X509v3 Subject Key Identifier:
19:E7:06:CE:6A:E3:31:49:9E:2B:95:9A:2A:19:9A:70:E7:0B:43:58
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:b5:3e:39:c6:54:51:1d:85:2a:9b:7a:4c:65:
56:a4:9e:f1:4c:5d:60:d2:c8:36:9f:f7:37:ad:27:66:8e:00:
b7:4e:23:30:ac:50:72:01:04:d4:a2:2e:3e:9e:0f:e6:81:02:
30:42:fd:c1:42:26:3d:d5:f8:4b:b9:bc:45:82:c5:7a:0a:a9:
70:d2:fe:a8:b0:06:a6:8d:87:cb:27:a1:0a:bd:78:57:16:89:
e6:96:e0:91:53:1c:cb:5c:c8:49:4e:2d:cc
40,856,380 <<< Executing mbox cmd 0x46574c44 (111864 bytes) from SoC
53,420,639 >>> mbox cmd response: success
53,453,289 UART:
53,453,650 UART: Running Caliptra FMC ...
53,454,883 UART:
53,455,057 UART: [state] CFI Enabled
53,553,733 UART: [art] Extend RT PCRs Done
53,554,922 UART: [art] Lock RT PCRs Done
53,556,220 UART: [art] Populate DV Done
53,562,008 UART: [fht] FMC Alias Private Key: 7
53,563,767 UART: [art] Derive CDI
53,564,603 UART: [art] Store in in slot 0x4
53,622,714 UART: [art] Derive Key Pair
53,623,752 UART: [art] Store priv key in slot 0x5
56,916,362 UART: [art] Derive Key Pair - Done
56,929,444 UART: [art] Signing Cert with AUTHO
56,930,758 UART: RITY.KEYID = 7
59,217,799 UART: [art] Erasing AUTHORITY.KEYID = 7
59,219,316 UART: [art] PUB.X = 71FE7D676A58BE7A0EB7AAD54F95F232BD4F0E81E011D142EBF6D8C40E6AB8DEA48AE497E66ACAA8DCFEA7400648BD16
59,226,573 UART: [art] PUB.Y = 8C8C1AEE86C357E77CA3C67E50D8E7514B0D6B57A6F8AF3A1BE7F0656AFFCFD74A831795C6EC5E1070EAC35092479F40
59,233,811 UART: [art] SIG.R = 25D8A36B19316221E296BD424EC0DA6542A1152815D35DD2441EBE29A41E21090E3B80994335952DFB6128B138ABAED4
59,241,210 UART: [art] SIG.S = 42F63C0CC22FAE50FEFABCD09618FFEA456DEBA21A16860643FF0CDB51840126DA076E51687A428CE180EA21B9F9DD42
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:97:04:63:6a:aa:f9:19:1e:7f:38:94:3f:4c:b3:e2:f8:de:79:ef
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=869704636AAAF9191E7F38943F4CB3E2F8DE79EF2186832EB418B37BB2B7E1C4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:71:fe:7d:67:6a:58:be:7a:0e:b7:aa:d5:4f:95:
f2:32:bd:4f:0e:81:e0:11:d1:42:eb:f6:d8:c4:0e:
6a:b8:de:a4:8a:e4:97:e6:6a:ca:a8:dc:fe:a7:40:
06:48:bd:16:8c:8c:1a:ee:86:c3:57:e7:7c:a3:c6:
7e:50:d8:e7:51:4b:0d:6b:57:a6:f8:af:3a:1b:e7:
f0:65:6a:ff:cf:d7:4a:83:17:95:c6:ec:5e:10:70:
ea:c3:50:92:47:9f:40
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....01.g..
Sz..N..9..os@.|.......W..c#........m`..X)#..RT_INFO
X509v3 Subject Key Identifier:
86:97:04:63:6A:AA:F9:19:1E:7F:38:94:3F:4C:B3:E2:F8:DE:79:EF
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:25:d8:a3:6b:19:31:62:21:e2:96:bd:42:4e:c0:
da:65:42:a1:15:28:15:d3:5d:d2:44:1e:be:29:a4:1e:21:09:
0e:3b:80:99:43:35:95:2d:fb:61:28:b1:38:ab:ae:d4:02:30:
42:f6:3c:0c:c2:2f:ae:50:fe:fa:bc:d0:96:18:ff:ea:45:6d:
eb:a2:1a:16:86:06:43:ff:0c:db:51:84:01:26:da:07:6e:51:
68:7a:42:8c:e1:80:ea:21:b9:f9:dd:42
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.18s
Truncated 5084 bytes from beginning
B94FB26902ADE86923620F55104B1A0EE6CE489B56
36,196,315 UART: [art] SIG.S = EAFE3AD005BFBFB52239D6A9B8AB3D2F9D2E7105C0F13E91D2DCC96EC709CB29B094245679F8E5325447D60D600A574E
37,501,739 UART: Caliptra RT
37,502,467 UART: [state] CFI Enabled
37,620,242 UART: [rt] RT listening for mailbox commands...
37,771,875 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,218,097 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,652,282 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d8, a8, 02, 3e, 68, 33, 57, 16, f9, dd, b1, 3c, fb, 44, 20, ef, 6f, dd, 0d, 5d, 5d, 2b, 3d, 79, 23, e9, d4, 77, 00, 23, e6, 03, 3d, 0a, b5, 35, a3, 35, 84, a8, 49, d8, 05, 78, 4d, 07, 00, 60]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6c:b7:91:dd:55:16:d6:f4:76:a3:0f:f7:16:b1:3c:27:7d:79:fe:03
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E8B791DD5516D6F476A30FF716B13C277D79FE03E1F9C1D3DCBDF23C1DD7EA5B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:39:31:32:4b:f6:f3:20:3b:e7:d2:d7:6b:6b:5d:
de:18:a0:bd:eb:8d:77:87:5d:31:f4:ee:77:86:42:
05:86:d8:0e:b0:d4:96:11:f7:94:ab:3d:ed:1a:a5:
18:1d:8e:24:6f:60:44:1f:34:2b:bb:fa:60:66:b1:
52:6f:6e:9c:f7:33:71:02:53:88:e3:c4:21:1c:8a:
21:71:aa:f0:d2:6a:b2:dc:27:6a:55:79:a4:4e:58:
5f:78:f2:6d:db:4a:4a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0>....W3h<.... D.].oy=+]w..#..#.5.
=..5.x..I`..M..RT_INFO
X509v3 Subject Key Identifier:
E8:B7:91:DD:55:16:D6:F4:76:A3:0F:F7:16:B1:3C:27:7D:79:FE:03
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:71:ff:1c:a4:72:d7:d7:94:9c:41:4c:26:c1:25:
7d:48:2c:d2:f2:10:2e:59:ca:9b:c3:bb:3e:b9:4f:b2:69:02:
ad:e8:69:23:62:0f:55:10:4b:1a:0e:e6:ce:48:9b:56:02:31:
00:ea:fe:3a:d0:05:bf:bf:b5:22:39:d6:a9:b8:ab:3d:2f:9d:
2e:71:05:c0:f1:3e:91:d2:dc:c9:6e:c7:09:cb:29:b0:94:24:
56:79:f8:e5:32:54:47:d6:0d:60:0a:57:4e
41,112,371 <<< Executing mbox cmd 0x46574c44 (111864 bytes) from SoC
41,254,716 UART:
41,255,073 UART: Running Caliptra ROM ...
41,256,127 UART:
41,256,387 UART: [state] CFI Enabled
41,271,856 UART: [state] LifecycleState = Production
41,273,639 UART: [state] DebugLocked = Yes
41,275,086 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,279,865 UART: [kat] SHA2-256
41,449,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,460,103 UART: [kat] ++
41,460,614 UART: [kat] sha1
41,473,009 UART: [kat] SHA2-256
41,475,690 UART: [kat] SHA2-384
41,480,869 UART: [kat] SHA2-512-ACC
41,483,211 UART: [kat] ECC-384
43,769,330 UART: [kat] HMAC-384Kdf
43,781,721 UART: [kat] LMS
44,971,846 UART: [kat] --
44,977,959 UART: [update-reset] ++
53,871,696 UART: [update-reset] Image verified using Vendor ECC Key Index 0
53,875,491 UART: [update-reset] Loading Runtime at address 0x40005000 len 87160
54,249,873 >>> mbox cmd response: success
54,250,800 UART: [update-reset] Copying MAN_2 To MAN_1
54,273,190 UART: [update-reset Success] --
54,277,457 UART: [state] Locking Datavault
54,280,897 UART: [state] Locking PCR0, PCR1 and PCR31
54,282,653 UART: [state] Locking ICCM
54,284,860 UART: [exit] Launching FMC @ 0x40000130
54,293,309 UART:
54,293,539 UART: Running Caliptra FMC ...
54,294,635 UART:
54,294,794 UART: [state] CFI Enabled
54,338,530 UART: [art] Extend RT PCRs Done
54,339,666 UART: [art] Lock RT PCRs Done
54,341,160 UART: [art] Populate DV Done
54,346,506 UART: [fht] FMC Alias Private Key: 7
54,348,103 UART: [art] Derive CDI
54,348,865 UART: [art] Store in in slot 0x4
54,391,418 UART: [art] Derive Key Pair
54,392,421 UART: [art] Store priv key in slot 0x5
57,634,561 UART: [art] Derive Key Pair - Done
57,647,112 UART: [art] Signing Cert with AUTHO
57,648,418 UART: RITY.KEYID = 7
59,927,820 UART: [art] Erasing AUTHORITY.KEYID = 7
59,929,325 UART: [art] PUB.X = CADA6A523DC81EE0877DE9140DBDE7EA3B956E6C1479F3E94D264B45E3DF63D18646899DB649378E1CB6A62174FDE194
59,936,625 UART: [art] PUB.Y = C9ABF57DE2C3D456626E9AC0A28258B9E6524CA062E249AA6F2AA79A8B1A35B7AA65EEBDCA022263169E2559EF71CFB4
59,943,862 UART: [art] SIG.R = CA904467E26D05D73A6D53E6F26346D0B53BEEFD2B4E096F1DFD0E75D458274F3478685533540DF1A8BF23F79511BA1D
59,951,246 UART: [art] SIG.S = FACDA19A2ABB5E0A48BED338F7ED918D817556C645F3108765776176D10545F20E94E1ADB939F598F3D0E2D465AFBA86
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
16:27:64:49:35:d4:d2:0f:9a:94:76:2f:53:71:8e:a3:2a:bd:3a:34
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9227644935D4D20F9A94762F53718EA32ABD3A340EDB9E3D68E316A625DFCC81
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ca:da:6a:52:3d:c8:1e:e0:87:7d:e9:14:0d:bd:
e7:ea:3b:95:6e:6c:14:79:f3:e9:4d:26:4b:45:e3:
df:63:d1:86:46:89:9d:b6:49:37:8e:1c:b6:a6:21:
74:fd:e1:94:c9:ab:f5:7d:e2:c3:d4:56:62:6e:9a:
c0:a2:82:58:b9:e6:52:4c:a0:62:e2:49:aa:6f:2a:
a7:9a:8b:1a:35:b7:aa:65:ee:bd:ca:02:22:63:16:
9e:25:59:ef:71:cf:b4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....01.g..
Sz..N..9..os@.|.......W..c#........m`..X)#..RT_INFO
X509v3 Subject Key Identifier:
92:27:64:49:35:D4:D2:0F:9A:94:76:2F:53:71:8E:A3:2A:BD:3A:34
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:ca:90:44:67:e2:6d:05:d7:3a:6d:53:e6:f2:
63:46:d0:b5:3b:ee:fd:2b:4e:09:6f:1d:fd:0e:75:d4:58:27:
4f:34:78:68:55:33:54:0d:f1:a8:bf:23:f7:95:11:ba:1d:02:
31:00:fa:cd:a1:9a:2a:bb:5e:0a:48:be:d3:38:f7:ed:91:8d:
81:75:56:c6:45:f3:10:87:65:77:61:76:d1:05:45:f2:0e:94:
e1:ad:b9:39:f5:98:f3:d0:e2:d4:65:af:ba:86
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.21s
Truncated 558 bytes from beginning
8 ready_for_fw is high
4,124,804 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,131,713 >>> mbox cmd response: success
27,771,081 UART:
27,771,497 UART: Running Caliptra FMC ...
27,772,615 UART:
27,772,775 UART: [state] CFI Enabled
27,780,668 UART: [fht] FMC Alias Private Key: 7
30,111,268 UART: [art] Extend RT PCRs Done
30,112,694 UART: [art] Lock RT PCRs Done
30,114,029 UART: [art] Populate DV Done
30,119,676 UART: [fht] FMC Alias Private Key: 7
30,121,329 UART: [art] Derive CDI
30,122,141 UART: [art] Store in in slot 0x4
30,164,734 UART: [art] Derive Key Pair
30,165,725 UART: [art] Store priv key in slot 0x5
33,408,369 UART: [art] Derive Key Pair - Done
33,421,548 UART: [art] Signing Cert with AUTHO
33,422,875 UART: RITY.KEYID = 7
35,702,589 UART: [art] Erasing AUTHORITY.KEYID = 7
35,704,094 UART: [art] PUB.X = 3E1800232781C8BD347F037F2D9DCB385E78060E0CCBA6CA189A48F30E0AA2BE1EFF74061B25686EED6E481F8D179FAB
35,711,352 UART: [art] PUB.Y = CBF76E24DD0CE12D5A58AB8375072091FC22A2227778625592EC7783941D25D50D30A4FB2B80249736E03A793F47BB77
35,718,598 UART: [art] SIG.R = 21E46877AD8465A487AE1290EE430ED659E9E2C28F26C956DA105D2EB6B531D6530CCD7EC28EC8859E462A0A215B3C29
35,725,999 UART: [art] SIG.S = 955A4B159F1F56FFB786BD918522A251E513E490E9B6C04F40FCF9D6A901623EAAECB48A08D609ABD28086F4C17E620A
37,030,193 UART: Caliptra RT
37,030,903 UART: [state] CFI Enabled
37,148,236 UART: [rt] RT listening for mailbox commands...
37,179,361 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,626,361 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,061,305 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d8, a8, 02, 3e, 68, 33, 57, 16, f9, dd, b1, 3c, fb, 44, 20, ef, 6f, dd, 0d, 5d, 5d, 2b, 3d, 79, 23, e9, d4, 77, 00, 23, e6, 03, 3d, 0a, b5, 35, a3, 35, 84, a8, 49, d8, 05, 78, 4d, 07, 00, 60]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
07:b2:1d:12:aa:4b:02:7c:25:36:43:44:66:c9:2d:16:c9:f9:fa:ba
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=83B21D12AA4B027C2536434466C92D16C9F9FABA639C8DF893364E6FBAFE0F0B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:3e:18:00:23:27:81:c8:bd:34:7f:03:7f:2d:9d:
cb:38:5e:78:06:0e:0c:cb:a6:ca:18:9a:48:f3:0e:
0a:a2:be:1e:ff:74:06:1b:25:68:6e:ed:6e:48:1f:
8d:17:9f:ab:cb:f7:6e:24:dd:0c:e1:2d:5a:58:ab:
83:75:07:20:91:fc:22:a2:22:77:78:62:55:92:ec:
77:83:94:1d:25:d5:0d:30:a4:fb:2b:80:24:97:36:
e0:3a:79:3f:47:bb:77
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0>....W3h<.... D.].oy=+]w..#..#.5.
=..5.x..I`..M..RT_INFO
X509v3 Subject Key Identifier:
83:B2:1D:12:AA:4B:02:7C:25:36:43:44:66:C9:2D:16:C9:F9:FA:BA
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:21:e4:68:77:ad:84:65:a4:87:ae:12:90:ee:43:
0e:d6:59:e9:e2:c2:8f:26:c9:56:da:10:5d:2e:b6:b5:31:d6:
53:0c:cd:7e:c2:8e:c8:85:9e:46:2a:0a:21:5b:3c:29:02:31:
00:95:5a:4b:15:9f:1f:56:ff:b7:86:bd:91:85:22:a2:51:e5:
13:e4:90:e9:b6:c0:4f:40:fc:f9:d6:a9:01:62:3e:aa:ec:b4:
8a:08:d6:09:ab:d2:80:86:f4:c1:7e:62:0a
40,525,628 <<< Executing mbox cmd 0x46574c44 (111864 bytes) from SoC
53,083,755 >>> mbox cmd response: success
53,118,143 UART:
53,118,458 UART: Running Caliptra FMC ...
53,119,598 UART:
53,119,755 UART: [state] CFI Enabled
53,164,235 UART: [art] Extend RT PCRs Done
53,165,447 UART: [art] Lock RT PCRs Done
53,166,877 UART: [art] Populate DV Done
53,172,173 UART: [fht] FMC Alias Private Key: 7
53,173,816 UART: [art] Derive CDI
53,174,548 UART: [art] Store in in slot 0x4
53,217,465 UART: [art] Derive Key Pair
53,218,463 UART: [art] Store priv key in slot 0x5
56,460,584 UART: [art] Derive Key Pair - Done
56,473,204 UART: [art] Signing Cert with AUTHO
56,474,505 UART: RITY.KEYID = 7
58,753,882 UART: [art] Erasing AUTHORITY.KEYID = 7
58,755,402 UART: [art] PUB.X = 043913C7B9681F911A715C1E00CAF0C7FDEF9AC8C02763D73A43E3CD66694239A16A44E6CCD2EFF65DC935B6E32C76FE
58,762,655 UART: [art] PUB.Y = 5973AEF0B6E2229E599033548DED942F08EA685880F68F180DB583C28A7E025E16E1541F30B3471BA443773B83B027C0
58,769,892 UART: [art] SIG.R = 0554B1F53A1B1AC6D67588E89944EA782992264D66AFCD142A94544ABCCCEB6E3B3C555DC5BB225ED41DC2B2A91527BE
58,777,281 UART: [art] SIG.S = 13E43B5928DC8DF6E995DFB752845539E90722E7F9A1D1C59A2EB5347D9E1CEF16F68DFE701E488422ECB8ED089E7DCF
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2c:2d:3b:88:60:11:e8:54:11:e3:da:e1:36:ed:97:75:33:22:66:32
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A82D3B886011E85411E3DAE136ED9775332266321E9472DCDE52E7A013465345
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:04:39:13:c7:b9:68:1f:91:1a:71:5c:1e:00:ca:
f0:c7:fd:ef:9a:c8:c0:27:63:d7:3a:43:e3:cd:66:
69:42:39:a1:6a:44:e6:cc:d2:ef:f6:5d:c9:35:b6:
e3:2c:76:fe:59:73:ae:f0:b6:e2:22:9e:59:90:33:
54:8d:ed:94:2f:08:ea:68:58:80:f6:8f:18:0d:b5:
83:c2:8a:7e:02:5e:16:e1:54:1f:30:b3:47:1b:a4:
43:77:3b:83:b0:27:c0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....01.g..
Sz..N..9..os@.|.......W..c#........m`..X)#..RT_INFO
X509v3 Subject Key Identifier:
A8:2D:3B:88:60:11:E8:54:11:E3:DA:E1:36:ED:97:75:33:22:66:32
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:05:54:b1:f5:3a:1b:1a:c6:d6:75:88:e8:99:44:
ea:78:29:92:26:4d:66:af:cd:14:2a:94:54:4a:bc:cc:eb:6e:
3b:3c:55:5d:c5:bb:22:5e:d4:1d:c2:b2:a9:15:27:be:02:30:
13:e4:3b:59:28:dc:8d:f6:e9:95:df:b7:52:84:55:39:e9:07:
22:e7:f9:a1:d1:c5:9a:2e:b5:34:7d:9e:1c:ef:16:f6:8d:fe:
70:1e:48:84:22:ec:b8:ed:08:9e:7d:cf
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.15s
Truncated 4974 bytes from beginning
4EFF6B02A34BE39C5DC1F3B061C8945155AC6ADB543468A2683785A36F4D48D779703B32C7CFFBAB98A913F6B006F2C8
25,951,342 UART: [art] SIG.S = D7E6EA08B73DB30BB36C8DFFBDE6398DEA78F10CD4091F0F5A5E79AF665C684683AE924BA2F46D285F34F1F2C0B591FE
26,930,488 UART: Caliptra RT
26,931,274 UART: [state] CFI Enabled
27,096,208 UART: [rt] RT listening for mailbox commands...
27,250,820 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,696,128 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,130,321 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4f:e5:29:f9:e6:22:e8:44:f8:d8:56:92:ee:88:c0:7d:b7:a9:20:05
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=CBE529F9E622E844F8D85692EE88C07DB7A92005DB3B1102023B34A9C3A42002
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:02:84:63:64:06:c0:43:10:b1:e8:46:4e:5a:83:
8c:ef:f4:69:33:35:97:6f:e0:c4:a3:bc:88:55:97:
e0:3c:8c:c2:42:7b:4e:bf:47:b0:be:f1:eb:cd:34:
7b:1f:b6:07:fc:71:d9:20:59:ca:21:85:31:61:30:
04:ed:98:05:13:9d:ae:95:37:76:a5:a3:dd:ce:a5:
77:05:de:ac:59:c6:d0:94:e5:84:bb:fe:e4:5c:94:
76:f8:de:85:6d:08:a3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
CB:E5:29:F9:E6:22:E8:44:F8:D8:56:92:EE:88:C0:7D:B7:A9:20:05
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:4e:ff:6b:02:a3:4b:e3:9c:5d:c1:f3:b0:61:c8:
94:51:55:ac:6a:db:54:34:68:a2:68:37:85:a3:6f:4d:48:d7:
79:70:3b:32:c7:cf:fb:ab:98:a9:13:f6:b0:06:f2:c8:02:31:
00:d7:e6:ea:08:b7:3d:b3:0b:b3:6c:8d:ff:bd:e6:39:8d:ea:
78:f1:0c:d4:09:1f:0f:5a:5e:79:af:66:5c:68:46:83:ae:92:
4b:a2:f4:6d:28:5f:34:f1:f2:c0:b5:91:fe
30,590,925 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
30,734,079 UART:
30,734,495 UART: Running Caliptra ROM ...
30,735,580 UART:
30,735,735 UART: [state] CFI Enabled
30,793,125 UART: [state] LifecycleState = Production
30,794,906 UART: [state] DebugLocked = Yes
30,797,628 UART: [state] Starting the WD Timer 40000000 cycles
30,803,115 UART: [kat] SHA2-256
30,982,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,993,817 UART: [kat] ++
30,994,359 UART: [kat] sha1
31,005,195 UART: [kat] SHA2-256
31,008,207 UART: [kat] SHA2-384
31,014,503 UART: [kat] SHA2-512-ACC
31,017,427 UART: [kat] ECC-384
33,477,430 UART: [kat] HMAC-384Kdf
33,499,806 UART: [kat] LMS
34,029,283 UART: [kat] --
34,032,626 UART: [update-reset] ++
38,626,539 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,629,678 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
39,005,098 >>> mbox cmd response: success
39,006,420 UART: [update-reset] Copying MAN_2 To MAN_1
39,028,716 UART: [update-reset Success] --
39,033,075 UART: [state] Locking Datavault
39,035,741 UART: [state] Locking PCR0, PCR1 and PCR31
39,037,389 UART: [state] Locking ICCM
39,039,816 UART: [exit] Launching FMC @ 0x40000130
39,048,265 UART:
39,048,507 UART: Running Caliptra FMC ...
39,049,631 UART:
39,049,801 UART: [state] CFI Enabled
39,142,649 UART: [art] Extend RT PCRs Done
39,143,834 UART: [art] Lock RT PCRs Done
39,145,455 UART: [art] Populate DV Done
39,150,971 UART: [fht] FMC Alias Private Key: 7
39,152,563 UART: [art] Derive CDI
39,153,376 UART: [art] Store in in slot 0x4
39,211,636 UART: [art] Derive Key Pair
39,212,669 UART: [art] Store priv key in slot 0x5
41,675,750 UART: [art] Derive Key Pair - Done
41,688,707 UART: [art] Signing Cert with AUTHO
41,690,011 UART: RITY.KEYID = 7
43,401,081 UART: [art] Erasing AUTHORITY.KEYID = 7
43,402,593 UART: [art] PUB.X = 75F46721E058E9375DE315DA689803B3F7DA399B29A1E039BE5A425071B8FB1C8CD156536F039CEE35B2799D69894761
43,409,870 UART: [art] PUB.Y = 5578F6599D6AD82E431AD5DBF97C6F51BD3089660FFD73AD0786206748FCA0B86CE20F50B73BC2CA48A29C6515C1876D
43,417,125 UART: [art] SIG.R = 53F75BB809C6840019388618387C9F9268B4E3A2D6C32535C49C75E4502EB0340BF0D7E101CD4478DF5A5320D8BB8437
43,424,459 UART: [art] SIG.S = 4F5CCFA53F76114871C03D180FECE696A3DEC3D7DDC35F9F0763F00C1E4A65E5EA874C723B4E52505F9CAD6CCC25FC77
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:6b:c9:0e:17:1c:43:a1:dd:99:fb:f9:08:84:4e:1a:a0:f5:64:c5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=746BC90E171C43A1DD99FBF908844E1AA0F564C56FDB192E486FC677E35DBCE7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:75:f4:67:21:e0:58:e9:37:5d:e3:15:da:68:98:
03:b3:f7:da:39:9b:29:a1:e0:39:be:5a:42:50:71:
b8:fb:1c:8c:d1:56:53:6f:03:9c:ee:35:b2:79:9d:
69:89:47:61:55:78:f6:59:9d:6a:d8:2e:43:1a:d5:
db:f9:7c:6f:51:bd:30:89:66:0f:fd:73:ad:07:86:
20:67:48:fc:a0:b8:6c:e2:0f:50:b7:3b:c2:ca:48:
a2:9c:65:15:c1:87:6d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
74:6B:C9:0E:17:1C:43:A1:DD:99:FB:F9:08:84:4E:1A:A0:F5:64:C5
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:53:f7:5b:b8:09:c6:84:00:19:38:86:18:38:7c:
9f:92:68:b4:e3:a2:d6:c3:25:35:c4:9c:75:e4:50:2e:b0:34:
0b:f0:d7:e1:01:cd:44:78:df:5a:53:20:d8:bb:84:37:02:30:
4f:5c:cf:a5:3f:76:11:48:71:c0:3d:18:0f:ec:e6:96:a3:de:
c3:d7:dd:c3:5f:9f:07:63:f0:0c:1e:4a:65:e5:ea:87:4c:72:
3b:4e:52:50:5f:9c:ad:6c:cc:25:fc:77
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.37s
Truncated 530 bytes from beginning
cptra_bootfsm_go
3,360,337 ready_for_fw is high
3,360,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,073,195 >>> mbox cmd response: success
19,365,641 UART:
19,366,043 UART: Running Caliptra FMC ...
19,367,154 UART:
19,367,300 UART: [state] CFI Enabled
19,425,646 UART: [fht] FMC Alias Private Key: 7
21,189,421 UART: [art] Extend RT PCRs Done
21,190,655 UART: [art] Lock RT PCRs Done
21,192,364 UART: [art] Populate DV Done
21,197,936 UART: [fht] FMC Alias Private Key: 7
21,199,633 UART: [art] Derive CDI
21,200,386 UART: [art] Store in in slot 0x4
21,258,981 UART: [art] Derive Key Pair
21,260,025 UART: [art] Store priv key in slot 0x5
23,723,221 UART: [art] Derive Key Pair - Done
23,736,058 UART: [art] Signing Cert with AUTHO
23,737,363 UART: RITY.KEYID = 7
25,448,860 UART: [art] Erasing AUTHORITY.KEYID = 7
25,450,365 UART: [art] PUB.X = 9577E51E03E1DDDFD39D7D36C58EF8D4470D45C0C81B7C9C62B9AF7B4A66392D71BD7915CE675745BA6C27D79E321069
25,457,668 UART: [art] PUB.Y = A0580C955F471FFE0709C0451BF3D8DDDDF761C8999C02D2978E12DE9C5662C039CD8F5E8F0F348E6FAF95EC45A60439
25,464,922 UART: [art] SIG.R = D927088D0F44A9B91746A4329BA1F9DB184711DCC1F93E9CB7B5391A2E6F47BCC9F29E0D7F8BE4D439F2CE8D39F45E4F
25,472,325 UART: [art] SIG.S = 44CD9DEB8A2E109D27CA0449EE67F9DE8CE16572D2D736B382788B98748B37F3FA6AC65594E64008BDEE6FC6E3BBD217
26,451,552 UART: Caliptra RT
26,452,269 UART: [state] CFI Enabled
26,616,983 UART: [rt] RT listening for mailbox commands...
26,648,682 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,093,580 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
27,531,279 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:9e:0f:67:9b:bd:49:a5:93:6f:13:fa:09:ce:8d:05:4f:35:e9:f2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9F9E0F679BBD49A5936F13FA09CE8D054F35E9F278775CBEE658226763FD100F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:95:77:e5:1e:03:e1:dd:df:d3:9d:7d:36:c5:8e:
f8:d4:47:0d:45:c0:c8:1b:7c:9c:62:b9:af:7b:4a:
66:39:2d:71:bd:79:15:ce:67:57:45:ba:6c:27:d7:
9e:32:10:69:a0:58:0c:95:5f:47:1f:fe:07:09:c0:
45:1b:f3:d8:dd:dd:f7:61:c8:99:9c:02:d2:97:8e:
12:de:9c:56:62:c0:39:cd:8f:5e:8f:0f:34:8e:6f:
af:95:ec:45:a6:04:39
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
9F:9E:0F:67:9B:BD:49:A5:93:6F:13:FA:09:CE:8D:05:4F:35:E9:F2
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d9:27:08:8d:0f:44:a9:b9:17:46:a4:32:9b:
a1:f9:db:18:47:11:dc:c1:f9:3e:9c:b7:b5:39:1a:2e:6f:47:
bc:c9:f2:9e:0d:7f:8b:e4:d4:39:f2:ce:8d:39:f4:5e:4f:02:
30:44:cd:9d:eb:8a:2e:10:9d:27:ca:04:49:ee:67:f9:de:8c:
e1:65:72:d2:d7:36:b3:82:78:8b:98:74:8b:37:f3:fa:6a:c6:
55:94:e6:40:08:bd:ee:6f:c6:e3:bb:d2:17
29,994,543 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
38,083,742 >>> mbox cmd response: success
38,118,406 UART:
38,118,765 UART: Running Caliptra FMC ...
38,119,998 UART:
38,120,177 UART: [state] CFI Enabled
38,215,169 UART: [art] Extend RT PCRs Done
38,216,373 UART: [art] Lock RT PCRs Done
38,217,615 UART: [art] Populate DV Done
38,223,020 UART: [fht] FMC Alias Private Key: 7
38,224,716 UART: [art] Derive CDI
38,225,529 UART: [art] Store in in slot 0x4
38,284,975 UART: [art] Derive Key Pair
38,286,016 UART: [art] Store priv key in slot 0x5
40,748,980 UART: [art] Derive Key Pair - Done
40,762,219 UART: [art] Signing Cert with AUTHO
40,763,528 UART: RITY.KEYID = 7
42,474,253 UART: [art] Erasing AUTHORITY.KEYID = 7
42,475,788 UART: [art] PUB.X = F4DB1AF6BCE4590660BA5E7A81DFC95C11E71FE1CAB09DCE5890DC876EDAEAF8130E9FA8F3AF32783313971F25D09498
42,483,039 UART: [art] PUB.Y = 902E7098FB3A9C2579D91A9CCF85EDDBCDA418AA69FAF7CE39B4FF4AEEF43323B3AB7CD53D414B57431FA5262E595956
42,490,328 UART: [art] SIG.R = D25A6A836AF0BFE461361DBF9241DD34EBC1E5937646432D9C400FB53AEC11B77319E76D9C37ED0A2EECE31F4536CB4E
42,497,778 UART: [art] SIG.S = 92DA26738779E1C8D74C8D3642F3F0DA3070116136DE056E884C4FC08583B7D3B6FB2155132A386DB74D84F797E8F696
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:5f:27:7b:f2:66:73:38:9a:d5:82:0c:42:36:92:bf:3f:0b:c0:8c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=195F277BF26673389AD5820C423692BF3F0BC08C8810F10AC32F30B97BEC6DAC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f4:db:1a:f6:bc:e4:59:06:60:ba:5e:7a:81:df:
c9:5c:11:e7:1f:e1:ca:b0:9d:ce:58:90:dc:87:6e:
da:ea:f8:13:0e:9f:a8:f3:af:32:78:33:13:97:1f:
25:d0:94:98:90:2e:70:98:fb:3a:9c:25:79:d9:1a:
9c:cf:85:ed:db:cd:a4:18:aa:69:fa:f7:ce:39:b4:
ff:4a:ee:f4:33:23:b3:ab:7c:d5:3d:41:4b:57:43:
1f:a5:26:2e:59:59:56
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
19:5F:27:7B:F2:66:73:38:9A:D5:82:0C:42:36:92:BF:3F:0B:C0:8C
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:d2:5a:6a:83:6a:f0:bf:e4:61:36:1d:bf:92:
41:dd:34:eb:c1:e5:93:76:46:43:2d:9c:40:0f:b5:3a:ec:11:
b7:73:19:e7:6d:9c:37:ed:0a:2e:ec:e3:1f:45:36:cb:4e:02:
31:00:92:da:26:73:87:79:e1:c8:d7:4c:8d:36:42:f3:f0:da:
30:70:11:61:36:de:05:6e:88:4c:4f:c0:85:83:b7:d3:b6:fb:
21:55:13:2a:38:6d:b7:4d:84:f7:97:e8:f6:96
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.33s
Truncated 4980 bytes from beginning
81A6CF57EC21EC446439592AD3838C7CAC5B9A7964501A1A8C645C1E7D8183D3536906C5C427E5740FDCB9916E
25,999,244 UART: [art] SIG.S = F0AF78E3FCD0F475A9306CAC628F26193CC9C9B0A500B7DCF38EAA021721CF99523259884CDF1E8B86F84EEBB0789FC3
26,977,730 UART: Caliptra RT
26,978,469 UART: [state] CFI Enabled
27,095,352 UART: [rt] RT listening for mailbox commands...
27,249,362 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,693,749 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,128,750 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5d:c6:6c:ce:1b:d2:02:ac:9b:8e:64:ec:fc:83:f3:92:d3:a9:59:1a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D9C66CCE1BD202AC9B8E64ECFC83F392D3A9591AC3E2330F1F6C1B0AD1F1C974
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a1:e9:d8:b0:4c:12:1a:b0:14:fa:c1:0a:67:0d:
bf:e0:dd:46:8b:e1:a5:a1:f4:09:dc:18:0e:08:3e:
1f:4d:ef:9b:5b:0a:a9:fc:b9:eb:13:9e:46:13:99:
8c:b8:db:ed:bd:29:c2:bb:71:e2:5a:68:c4:19:84:
3a:39:e1:2b:f3:0b:d0:ae:ca:d7:4e:62:b4:f7:b4:
2a:c7:de:40:71:4e:93:d3:a1:b0:1b:95:ef:84:ab:
7f:63:2e:d4:b0:60:ed
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
D9:C6:6C:CE:1B:D2:02:AC:9B:8E:64:EC:FC:83:F3:92:D3:A9:59:1A
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:ce:82:e1:81:a6:cf:57:ec:21:ec:44:64:39:
59:2a:d3:83:8c:7c:ac:5b:9a:79:64:50:1a:1a:8c:64:5c:1e:
7d:81:83:d3:53:69:06:c5:c4:27:e5:74:0f:dc:b9:91:6e:02:
31:00:f0:af:78:e3:fc:d0:f4:75:a9:30:6c:ac:62:8f:26:19:
3c:c9:c9:b0:a5:00:b7:dc:f3:8e:aa:02:17:21:cf:99:52:32:
59:88:4c:df:1e:8b:86:f8:4e:eb:b0:78:9f:c3
30,588,453 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
30,731,044 UART:
30,731,434 UART: Running Caliptra ROM ...
30,732,481 UART:
30,732,649 UART: [state] CFI Enabled
30,747,316 UART: [state] LifecycleState = Production
30,749,072 UART: [state] DebugLocked = Yes
30,750,611 UART: [state] Starting the WD Timer 40000000 cycles
30,755,234 UART: [kat] SHA2-256
30,934,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,945,972 UART: [kat] ++
30,946,426 UART: [kat] sha1
30,957,333 UART: [kat] SHA2-256
30,960,335 UART: [kat] SHA2-384
30,966,596 UART: [kat] SHA2-512-ACC
30,969,543 UART: [kat] ECC-384
33,409,662 UART: [kat] HMAC-384Kdf
33,422,597 UART: [kat] LMS
33,952,093 UART: [kat] --
33,956,242 UART: [update-reset] ++
38,569,322 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,571,866 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
38,947,203 >>> mbox cmd response: success
38,948,636 UART: [update-reset] Copying MAN_2 To MAN_1
38,970,986 UART: [update-reset Success] --
38,976,175 UART: [state] Locking Datavault
38,979,002 UART: [state] Locking PCR0, PCR1 and PCR31
38,980,656 UART: [state] Locking ICCM
38,982,364 UART: [exit] Launching FMC @ 0x40000130
38,990,812 UART:
38,991,041 UART: Running Caliptra FMC ...
38,992,064 UART:
38,992,212 UART: [state] CFI Enabled
39,036,443 UART: [art] Extend RT PCRs Done
39,037,632 UART: [art] Lock RT PCRs Done
39,039,005 UART: [art] Populate DV Done
39,044,536 UART: [fht] FMC Alias Private Key: 7
39,046,072 UART: [art] Derive CDI
39,046,808 UART: [art] Store in in slot 0x4
39,089,883 UART: [art] Derive Key Pair
39,090,882 UART: [art] Store priv key in slot 0x5
41,517,429 UART: [art] Derive Key Pair - Done
41,530,486 UART: [art] Signing Cert with AUTHO
41,531,787 UART: RITY.KEYID = 7
43,237,292 UART: [art] Erasing AUTHORITY.KEYID = 7
43,238,802 UART: [art] PUB.X = 8A1F566EA09DF320EB78EC389F02E00058D2449B2C4384599D4AC7FE1DCA8225D4100F66ACEE566EBA7483D0D15CFDCC
43,246,037 UART: [art] PUB.Y = 8856055A07AEC3AD12C0F1584B02E217A9C6BEEC6C05095F26D15DCC5ADE85D4AA68985A87747CCEEA8D638213DA0FE7
43,253,374 UART: [art] SIG.R = 7F974FABDA3FE7E561C8BFE9A421B10D2AB8C9D24783E1BC3518C740F0C636FF807BC0622621AA41D2EAF57452229916
43,260,752 UART: [art] SIG.S = B8BD29A5010E6981599567C5288B81A40355EE719C734458EE512B648936B514D97BED087E4CA4F5AE56A4D25C62D0D9
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:3e:6c:eb:43:bc:d9:c5:e4:c2:bd:bd:1b:dd:28:c1:6b:ba:d5:f4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=863E6CEB43BCD9C5E4C2BDBD1BDD28C16BBAD5F4452C21FF11F0EE5FEDECB1ED
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8a:1f:56:6e:a0:9d:f3:20:eb:78:ec:38:9f:02:
e0:00:58:d2:44:9b:2c:43:84:59:9d:4a:c7:fe:1d:
ca:82:25:d4:10:0f:66:ac:ee:56:6e:ba:74:83:d0:
d1:5c:fd:cc:88:56:05:5a:07:ae:c3:ad:12:c0:f1:
58:4b:02:e2:17:a9:c6:be:ec:6c:05:09:5f:26:d1:
5d:cc:5a:de:85:d4:aa:68:98:5a:87:74:7c:ce:ea:
8d:63:82:13:da:0f:e7
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
86:3E:6C:EB:43:BC:D9:C5:E4:C2:BD:BD:1B:DD:28:C1:6B:BA:D5:F4
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:7f:97:4f:ab:da:3f:e7:e5:61:c8:bf:e9:a4:21:
b1:0d:2a:b8:c9:d2:47:83:e1:bc:35:18:c7:40:f0:c6:36:ff:
80:7b:c0:62:26:21:aa:41:d2:ea:f5:74:52:22:99:16:02:31:
00:b8:bd:29:a5:01:0e:69:81:59:95:67:c5:28:8b:81:a4:03:
55:ee:71:9c:73:44:58:ee:51:2b:64:89:36:b5:14:d9:7b:ed:
08:7e:4c:a4:f5:ae:56:a4:d2:5c:62:d0:d9
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.36s
Truncated 527 bytes from beginning
to cptra_bootfsm_go
3,695,323 ready_for_fw is high
3,695,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,286,730 >>> mbox cmd response: success
19,539,055 UART:
19,539,472 UART: Running Caliptra FMC ...
19,540,819 UART:
19,541,008 UART: [state] CFI Enabled
19,548,545 UART: [fht] FMC Alias Private Key: 7
21,305,399 UART: [art] Extend RT PCRs Done
21,306,921 UART: [art] Lock RT PCRs Done
21,308,215 UART: [art] Populate DV Done
21,313,578 UART: [fht] FMC Alias Private Key: 7
21,315,176 UART: [art] Derive CDI
21,315,992 UART: [art] Store in in slot 0x4
21,358,742 UART: [art] Derive Key Pair
21,359,771 UART: [art] Store priv key in slot 0x5
23,786,942 UART: [art] Derive Key Pair - Done
23,799,765 UART: [art] Signing Cert with AUTHO
23,801,105 UART: RITY.KEYID = 7
25,506,330 UART: [art] Erasing AUTHORITY.KEYID = 7
25,507,864 UART: [art] PUB.X = 5A369D260C9214D8666510E6BD3F057D515B924677A88B4BEE10597AFECAE8F05833411BDE7943DBB714B6D72ED3515E
25,515,128 UART: [art] PUB.Y = 8F2CD3E006FB8BEB22BA100A0AD38523C17DE07DD4A344A423E3DA084CBC83FF319FF63537FDE7737792992553130A06
25,522,388 UART: [art] SIG.R = D679BE511066DECE6ACB8A2EEC3290A5581616DCB6295C42401B9CE99AB4E6F40F4ED168F8B10F09C9D1CF60C7C3CBC8
25,529,780 UART: [art] SIG.S = 18E935C65B21E29BABD2880EDBF72DE21B85573633270568D5F324342E2C37CEFC6C807E4A54D9EAF97912C7E0794BC7
26,508,352 UART: Caliptra RT
26,509,072 UART: [state] CFI Enabled
26,626,357 UART: [rt] RT listening for mailbox commands...
26,657,655 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,101,451 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
27,537,712 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:0a:8b:d8:2c:ad:5d:2c:14:2e:b9:60:02:ba:49:f5:f8:7f:4b:53
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=CD0A8BD82CAD5D2C142EB96002BA49F5F87F4B53080835D47BFB1EA53E03D987
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:5a:36:9d:26:0c:92:14:d8:66:65:10:e6:bd:3f:
05:7d:51:5b:92:46:77:a8:8b:4b:ee:10:59:7a:fe:
ca:e8:f0:58:33:41:1b:de:79:43:db:b7:14:b6:d7:
2e:d3:51:5e:8f:2c:d3:e0:06:fb:8b:eb:22:ba:10:
0a:0a:d3:85:23:c1:7d:e0:7d:d4:a3:44:a4:23:e3:
da:08:4c:bc:83:ff:31:9f:f6:35:37:fd:e7:73:77:
92:99:25:53:13:0a:06
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
CD:0A:8B:D8:2C:AD:5D:2C:14:2E:B9:60:02:BA:49:F5:F8:7F:4B:53
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d6:79:be:51:10:66:de:ce:6a:cb:8a:2e:ec:
32:90:a5:58:16:16:dc:b6:29:5c:42:40:1b:9c:e9:9a:b4:e6:
f4:0f:4e:d1:68:f8:b1:0f:09:c9:d1:cf:60:c7:c3:cb:c8:02:
30:18:e9:35:c6:5b:21:e2:9b:ab:d2:88:0e:db:f7:2d:e2:1b:
85:57:36:33:27:05:68:d5:f3:24:34:2e:2c:37:ce:fc:6c:80:
7e:4a:54:d9:ea:f9:79:12:c7:e0:79:4b:c7
29,999,298 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
38,031,500 >>> mbox cmd response: success
38,063,529 UART:
38,063,853 UART: Running Caliptra FMC ...
38,065,015 UART:
38,065,228 UART: [state] CFI Enabled
38,109,791 UART: [art] Extend RT PCRs Done
38,110,987 UART: [art] Lock RT PCRs Done
38,112,452 UART: [art] Populate DV Done
38,117,810 UART: [fht] FMC Alias Private Key: 7
38,119,353 UART: [art] Derive CDI
38,120,115 UART: [art] Store in in slot 0x4
38,163,085 UART: [art] Derive Key Pair
38,164,089 UART: [art] Store priv key in slot 0x5
40,590,833 UART: [art] Derive Key Pair - Done
40,604,006 UART: [art] Signing Cert with AUTHO
40,605,314 UART: RITY.KEYID = 7
42,310,790 UART: [art] Erasing AUTHORITY.KEYID = 7
42,312,307 UART: [art] PUB.X = BC1E553E4A1FD28E376E1289246C82D95637842D0FC5C02A807026A18D01B5C6D71F06C5A86AD30EAA7F0E93A674F865
42,319,563 UART: [art] PUB.Y = F806A4A297ECCE80B965EBC7B25670BA6D26D4DA52CFB302BCA0C3CF3EE1D4D62C37DB2A7582BBDD0839C3DC6F351E51
42,326,867 UART: [art] SIG.R = 80C3C6B7F19038C66C564BCCFFB5034C2E324CCA7C379DE8EAF9E9E7A8A544E8B94A8537E1B33EC4E9636783F4CCC455
42,334,271 UART: [art] SIG.S = 52C33089146488AEDC76555D432D16FA78AF03069D4B4CBE45B7E8E868BD21935754C43C388AF81DA7413198B25A1DBD
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:13:bf:22:aa:d5:9d:e5:4f:0f:06:38:7b:36:a9:a4:a5:e3:28:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1513BF22AAD59DE54F0F06387B36A9A4A5E3281272F163370923B8C76BA51AE1
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:bc:1e:55:3e:4a:1f:d2:8e:37:6e:12:89:24:6c:
82:d9:56:37:84:2d:0f:c5:c0:2a:80:70:26:a1:8d:
01:b5:c6:d7:1f:06:c5:a8:6a:d3:0e:aa:7f:0e:93:
a6:74:f8:65:f8:06:a4:a2:97:ec:ce:80:b9:65:eb:
c7:b2:56:70:ba:6d:26:d4:da:52:cf:b3:02:bc:a0:
c3:cf:3e:e1:d4:d6:2c:37:db:2a:75:82:bb:dd:08:
39:c3:dc:6f:35:1e:51
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
15:13:BF:22:AA:D5:9D:E5:4F:0F:06:38:7B:36:A9:A4:A5:E3:28:12
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:80:c3:c6:b7:f1:90:38:c6:6c:56:4b:cc:ff:
b5:03:4c:2e:32:4c:ca:7c:37:9d:e8:ea:f9:e9:e7:a8:a5:44:
e8:b9:4a:85:37:e1:b3:3e:c4:e9:63:67:83:f4:cc:c4:55:02:
30:52:c3:30:89:14:64:88:ae:dc:76:55:5d:43:2d:16:fa:78:
af:03:06:9d:4b:4c:be:45:b7:e8:e8:68:bd:21:93:57:54:c4:
3c:38:8a:f8:1d:a7:41:31:98:b2:5a:1d:bd
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
Truncated 530 bytes from beginning
cptra_bootfsm_go
3,440,374 ready_for_fw is high
3,440,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,876,827 >>> mbox cmd response: success
20,157,946 UART:
20,158,375 UART: Running Caliptra FMC ...
20,159,493 UART:
20,159,673 UART: [state] CFI Enabled
20,225,302 UART: [fht] FMC Alias Private Key: 7
21,989,742 UART: [art] Extend RT PCRs Done
21,990,963 UART: [art] Lock RT PCRs Done
21,992,398 UART: [art] Populate DV Done
21,997,699 UART: [fht] FMC Alias Private Key: 7
21,999,293 UART: [art] Derive CDI
22,000,028 UART: [art] Store in in slot 0x4
22,058,682 UART: [art] Derive Key Pair
22,059,728 UART: [art] Store priv key in slot 0x5
24,522,526 UART: [art] Derive Key Pair - Done
24,535,419 UART: [art] Signing Cert with AUTHO
24,536,731 UART: RITY.KEYID = 7
26,248,575 UART: [art] Erasing AUTHORITY.KEYID = 7
26,250,098 UART: [art] PUB.X = 60E9A53F1163C6C713A47F89F7389B17FAEA05D257DB806FDDD64DAB58FD28DAC616C9AE2AED096B1E0B7D9DE95222F0
26,257,360 UART: [art] PUB.Y = EC2DC32D2CD4A30B0A70D2355429CEBF8B81803A2D5890C593D74D90B36FAF289A63D87FF5E5AB36A4E9FDCA4A92D5DD
26,264,612 UART: [art] SIG.R = CBB31438AA0B71EA70E838A1B69765BA312B1BA9EA18DC6A0954DC17B5D691C18FE6D81B1A855E5133800FB3B2ADF322
26,272,019 UART: [art] SIG.S = 8F855515B0EA44EC99FB6F9D18BD07F755F6E22FDB9AF654DCEF8A7AA6536B5C804F968C1448AD1FB050E21E75FF3DDF
27,251,094 UART: Caliptra RT
27,251,793 UART: [state] CFI Enabled
27,415,332 UART: [rt] RT listening for mailbox commands...
27,446,946 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,892,727 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,328,094 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2d:07:35:22:c6:c5:5f:9f:ff:e0:e8:4e:9c:39:d8:d1:9e:63:da:98
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2D073522C6C55F9FFFE0E84E9C39D8D19E63DA98C554FF9F664E0C837A7981EA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:60:e9:a5:3f:11:63:c6:c7:13:a4:7f:89:f7:38:
9b:17:fa:ea:05:d2:57:db:80:6f:dd:d6:4d:ab:58:
fd:28:da:c6:16:c9:ae:2a:ed:09:6b:1e:0b:7d:9d:
e9:52:22:f0:ec:2d:c3:2d:2c:d4:a3:0b:0a:70:d2:
35:54:29:ce:bf:8b:81:80:3a:2d:58:90:c5:93:d7:
4d:90:b3:6f:af:28:9a:63:d8:7f:f5:e5:ab:36:a4:
e9:fd:ca:4a:92:d5:dd
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
2D:07:35:22:C6:C5:5F:9F:FF:E0:E8:4E:9C:39:D8:D1:9E:63:DA:98
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:cb:b3:14:38:aa:0b:71:ea:70:e8:38:a1:b6:
97:65:ba:31:2b:1b:a9:ea:18:dc:6a:09:54:dc:17:b5:d6:91:
c1:8f:e6:d8:1b:1a:85:5e:51:33:80:0f:b3:b2:ad:f3:22:02:
31:00:8f:85:55:15:b0:ea:44:ec:99:fb:6f:9d:18:bd:07:f7:
55:f6:e2:2f:db:9a:f6:54:dc:ef:8a:7a:a6:53:6b:5c:80:4f:
96:8c:14:48:ad:1f:b0:50:e2:1e:75:ff:3d:df
30,788,017 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
39,693,556 >>> mbox cmd response: success
39,728,549 UART:
39,728,885 UART: Running Caliptra FMC ...
39,730,114 UART:
39,730,285 UART: [state] CFI Enabled
39,819,539 UART: [art] Extend RT PCRs Done
39,820,763 UART: [art] Lock RT PCRs Done
39,822,227 UART: [art] Populate DV Done
39,828,065 UART: [fht] FMC Alias Private Key: 7
39,829,721 UART: [art] Derive CDI
39,830,558 UART: [art] Store in in slot 0x4
39,888,546 UART: [art] Derive Key Pair
39,889,540 UART: [art] Store priv key in slot 0x5
42,352,277 UART: [art] Derive Key Pair - Done
42,365,658 UART: [art] Signing Cert with AUTHO
42,366,971 UART: RITY.KEYID = 7
44,078,678 UART: [art] Erasing AUTHORITY.KEYID = 7
44,080,186 UART: [art] PUB.X = 9C067F4CB6A43AC3EF812D3ADFA54B2040E265267BBD5C6D6447B2CE6F9A9A84EEBC3DA462F9D4CE098163A47410B17B
44,087,444 UART: [art] PUB.Y = CD94787A2EB1360040CEE34754DF0E487ED079B0D668435CA935E630DE8E01D9CFBA770A252E33A2C16694AF9A1E4F1F
44,094,729 UART: [art] SIG.R = F152E1A6CE7834EA4F3EE9673985C49BF9AD6D2D4BDBBE82BC38BB76A44C0B5F21CF7D95A2008B2F46063650EAE98EDA
44,102,123 UART: [art] SIG.S = 06896D7ED453EA3236B94A18AEEEB88A2084711555440DB54DDB24EDF06A0D9B81A71147930124E4F041E2A3FF6C77BD
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
64:57:90:31:d2:2b:68:45:64:dd:8a:9d:fd:fa:2d:b1:16:b2:4a:43
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E0579031D22B684564DD8A9DFDFA2DB116B24A43612815648147314A8823A81A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9c:06:7f:4c:b6:a4:3a:c3:ef:81:2d:3a:df:a5:
4b:20:40:e2:65:26:7b:bd:5c:6d:64:47:b2:ce:6f:
9a:9a:84:ee:bc:3d:a4:62:f9:d4:ce:09:81:63:a4:
74:10:b1:7b:cd:94:78:7a:2e:b1:36:00:40:ce:e3:
47:54:df:0e:48:7e:d0:79:b0:d6:68:43:5c:a9:35:
e6:30:de:8e:01:d9:cf:ba:77:0a:25:2e:33:a2:c1:
66:94:af:9a:1e:4f:1f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
E0:57:90:31:D2:2B:68:45:64:DD:8A:9D:FD:FA:2D:B1:16:B2:4A:43
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:f1:52:e1:a6:ce:78:34:ea:4f:3e:e9:67:39:
85:c4:9b:f9:ad:6d:2d:4b:db:be:82:bc:38:bb:76:a4:4c:0b:
5f:21:cf:7d:95:a2:00:8b:2f:46:06:36:50:ea:e9:8e:da:02:
30:06:89:6d:7e:d4:53:ea:32:36:b9:4a:18:ae:ee:b8:8a:20:
84:71:15:55:44:0d:b5:4d:db:24:ed:f0:6a:0d:9b:81:a7:11:
47:93:01:24:e4:f0:41:e2:a3:ff:6c:77:bd
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.41s
Truncated 530 bytes from beginning
cptra_bootfsm_go
3,757,767 ready_for_fw is high
3,758,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,101,359 >>> mbox cmd response: success
20,355,035 UART:
20,355,443 UART: Running Caliptra FMC ...
20,356,591 UART:
20,356,758 UART: [state] CFI Enabled
20,364,562 UART: [fht] FMC Alias Private Key: 7
22,121,431 UART: [art] Extend RT PCRs Done
22,122,655 UART: [art] Lock RT PCRs Done
22,124,335 UART: [art] Populate DV Done
22,129,847 UART: [fht] FMC Alias Private Key: 7
22,131,391 UART: [art] Derive CDI
22,132,203 UART: [art] Store in in slot 0x4
22,174,473 UART: [art] Derive Key Pair
22,175,475 UART: [art] Store priv key in slot 0x5
24,603,182 UART: [art] Derive Key Pair - Done
24,616,353 UART: [art] Signing Cert with AUTHO
24,617,665 UART: RITY.KEYID = 7
26,323,282 UART: [art] Erasing AUTHORITY.KEYID = 7
26,324,793 UART: [art] PUB.X = 803E7E2BDE02E47541E43B358403464CB8B34FF6B6401E9F74F63C245CC7F0B6131F7BB2A80B5F5B1A274C219999065E
26,332,055 UART: [art] PUB.Y = 8E9A8A9C408514D0EE28F41D9F01DBFAED777FFC4D9B827BFDD139D5AE586936836AA1E3FDB101A19112F04CB3928FE7
26,339,290 UART: [art] SIG.R = 96B6AB7852D225C426BB0685A3E5655DFA259D611B3B525FBD0CCC9D7970DD7340718DFE3F8F8213390C2300FAD7BBA7
26,346,713 UART: [art] SIG.S = E546B669E8718B48BE3DF4408C9A0C09FA9F98011431D423B93F25CDCFD2CBA0F2FEF7E4C93CB3FB8CC93E2AF554D6EC
27,325,268 UART: Caliptra RT
27,325,973 UART: [state] CFI Enabled
27,443,307 UART: [rt] RT listening for mailbox commands...
27,474,549 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,919,856 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,356,004 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
47:13:a1:7d:9a:b6:49:08:96:86:9b:dc:8c:c0:33:15:16:8e:2c:25
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4713A17D9AB6490896869BDC8CC03315168E2C25DB19AE84252F06D6DF09D04C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:3e:7e:2b:de:02:e4:75:41:e4:3b:35:84:03:
46:4c:b8:b3:4f:f6:b6:40:1e:9f:74:f6:3c:24:5c:
c7:f0:b6:13:1f:7b:b2:a8:0b:5f:5b:1a:27:4c:21:
99:99:06:5e:8e:9a:8a:9c:40:85:14:d0:ee:28:f4:
1d:9f:01:db:fa:ed:77:7f:fc:4d:9b:82:7b:fd:d1:
39:d5:ae:58:69:36:83:6a:a1:e3:fd:b1:01:a1:91:
12:f0:4c:b3:92:8f:e7
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
47:13:A1:7D:9A:B6:49:08:96:86:9B:DC:8C:C0:33:15:16:8E:2C:25
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:96:b6:ab:78:52:d2:25:c4:26:bb:06:85:a3:
e5:65:5d:fa:25:9d:61:1b:3b:52:5f:bd:0c:cc:9d:79:70:dd:
73:40:71:8d:fe:3f:8f:82:13:39:0c:23:00:fa:d7:bb:a7:02:
31:00:e5:46:b6:69:e8:71:8b:48:be:3d:f4:40:8c:9a:0c:09:
fa:9f:98:01:14:31:d4:23:b9:3f:25:cd:cf:d2:cb:a0:f2:fe:
f7:e4:c9:3c:b3:fb:8c:c9:3e:2a:f5:54:d6:ec
30,817,280 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
39,652,229 >>> mbox cmd response: success
39,687,454 UART:
39,687,785 UART: Running Caliptra FMC ...
39,688,995 UART:
39,689,184 UART: [state] CFI Enabled
39,733,476 UART: [art] Extend RT PCRs Done
39,734,681 UART: [art] Lock RT PCRs Done
39,736,093 UART: [art] Populate DV Done
39,741,622 UART: [fht] FMC Alias Private Key: 7
39,743,209 UART: [art] Derive CDI
39,744,023 UART: [art] Store in in slot 0x4
39,786,263 UART: [art] Derive Key Pair
39,787,264 UART: [art] Store priv key in slot 0x5
42,213,817 UART: [art] Derive Key Pair - Done
42,226,612 UART: [art] Signing Cert with AUTHO
42,227,914 UART: RITY.KEYID = 7
43,933,258 UART: [art] Erasing AUTHORITY.KEYID = 7
43,934,773 UART: [art] PUB.X = 40AF8F94503B236B9CAA2742C2B172C7A9066C49A3AC259928739BC0F5A1D2DB525CEAD52B17EB20E30220449A904A06
43,942,038 UART: [art] PUB.Y = 19BCCBECA7A6D45BE60135078080780DAC2561199FAD8D83A1E8E7A9E942C17E8A05854B510F9A35BC84E5829A4BFA49
43,949,424 UART: [art] SIG.R = A7FAA558E1530ACB1285CE6ABA7B5947C5977BD06829F05EC7B15BBDD9DF042B1E620DFF651638593068BCEA324EC93D
43,956,740 UART: [art] SIG.S = 42540BDA525F76E4F6FC3F9DA42F5440CFBF7A3078EAA1EF7A97222DC8036690895FE9CB5E08676EDF7F323EE66962F0
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
75:7f:5a:58:f1:57:1a:8f:f4:a4:c6:cc:96:bb:f6:5e:61:cf:36:84
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F57F5A58F1571A8FF4A4C6CC96BBF65E61CF3684CBBA57A79AD7F11D35A4A049
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:40:af:8f:94:50:3b:23:6b:9c:aa:27:42:c2:b1:
72:c7:a9:06:6c:49:a3:ac:25:99:28:73:9b:c0:f5:
a1:d2:db:52:5c:ea:d5:2b:17:eb:20:e3:02:20:44:
9a:90:4a:06:19:bc:cb:ec:a7:a6:d4:5b:e6:01:35:
07:80:80:78:0d:ac:25:61:19:9f:ad:8d:83:a1:e8:
e7:a9:e9:42:c1:7e:8a:05:85:4b:51:0f:9a:35:bc:
84:e5:82:9a:4b:fa:49
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
F5:7F:5A:58:F1:57:1A:8F:F4:A4:C6:CC:96:BB:F6:5E:61:CF:36:84
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a7:fa:a5:58:e1:53:0a:cb:12:85:ce:6a:ba:
7b:59:47:c5:97:7b:d0:68:29:f0:5e:c7:b1:5b:bd:d9:df:04:
2b:1e:62:0d:ff:65:16:38:59:30:68:bc:ea:32:4e:c9:3d:02:
30:42:54:0b:da:52:5f:76:e4:f6:fc:3f:9d:a4:2f:54:40:cf:
bf:7a:30:78:ea:a1:ef:7a:97:22:2d:c8:03:66:90:89:5f:e9:
cb:5e:08:67:6e:df:7f:32:3e:e6:69:62:f0
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.40s
Truncated 5404 bytes from beginning
c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,838,725 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,257 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0e:a8:30:40:fd:5b:f4:8f:bc:dc:dd:1a:bf:67:ad:eb:01:96:1b:95
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0EA83040FD5BF48FBCDCDD1ABF67ADEB01961B95AFF173416AF771B520B71614
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d3:a8:87:57:0f:2d:cc:2f:8f:af:5d:3b:d6:9b:
7f:62:3d:ae:37:7c:a2:52:7e:dd:80:93:fe:2e:ef:
bf:98:5f:8b:7c:20:3c:20:5d:99:8d:77:0b:bb:f4:
0f:0d:ee:50:d3:84:5d:e6:2d:f1:a2:c5:bc:f9:3c:
7e:00:57:0b:ee:c0:69:d5:e9:a7:c1:fc:7c:08:23:
c9:f2:63:b7:c6:e8:53:cd:d8:5c:fd:8b:d6:fa:17:
39:95:a3:66:8d:17:0c
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
0E:A8:30:40:FD:5B:F4:8F:BC:DC:DD:1A:BF:67:AD:EB:01:96:1B:95
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:08:e2:1e:95:b4:4d:00:85:ff:05:b5:78:2f:c5:
d3:76:8d:64:42:de:8a:14:fa:f8:a6:bf:1c:38:19:97:40:f0:
7a:b7:26:f1:09:27:51:fe:1a:39:b3:bb:72:0f:d2:a3:02:31:
00:da:2b:66:af:22:5d:15:7c:1b:89:76:9f:58:8d:10:35:b2:
cf:45:94:88:74:65:3c:49:b2:ca:cf:27:1f:86:07:c2:56:e6:
fc:5b:b4:8d:37:a7:7e:c8:22:a5:21:b1:63
5,891,314 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,891,921 UART:
5,891,937 UART: Running Caliptra ROM ...
5,892,345 UART:
5,892,399 UART: [state] CFI Enabled
5,895,216 UART: [state] LifecycleState = Production
5,895,824 UART: [state] DebugLocked = Yes
5,896,582 UART: [state] Starting the Watchdog Timer 40000000 cycles
5,898,283 UART: [kat] SHA2-256
6,692,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,696,329 UART: [kat] ++
6,696,481 UART: [kat] sha1
6,700,761 UART: [kat] SHA2-256
6,702,699 UART: [kat] SHA2-384
6,705,502 UART: [kat] SHA2-512-ACC
6,707,402 UART: [kat] ECC-384
6,712,851 UART: [kat] HMAC-384Kdf
6,717,477 UART: [kat] LMS
7,285,673 UART: [kat] --
7,286,324 UART: [update-reset] ++
10,705,877 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,707,151 UART: [update-reset] Loading Runtime at address 0x40005000 len 87504
10,853,811 >>> mbox cmd response: success
10,854,017 UART: [update-reset] Copying MAN_2 To MAN_1
10,862,029 UART: [update-reset Success] --
10,862,932 UART: [state] Locking Datavault
10,863,712 UART: [state] Locking PCR0, PCR1 and PCR31
10,864,316 UART: [state] Locking ICCM
10,864,954 UART: [exit] Launching FMC @ 0x40000130
10,870,283 UART:
10,870,299 UART: Running Caliptra FMC ...
10,870,707 UART:
10,870,761 UART: [state] CFI Enabled
10,959,492 UART: [art] Extend RT PCRs Done
10,959,920 UART: [art] Lock RT PCRs Done
10,961,101 UART: [art] Populate DV Done
10,969,247 UART: [fht] FMC Alias Private Key: 7
10,970,175 UART: [art] Derive CDI
10,970,455 UART: [art] Store in in slot 0x4
11,056,098 UART: [art] Derive Key Pair
11,056,458 UART: [art] Store priv key in slot 0x5
11,068,938 UART: [art] Derive Key Pair - Done
11,083,643 UART: [art] Signing Cert with AUTHO
11,084,123 UART: RITY.KEYID = 7
11,099,033 UART: [art] Erasing AUTHORITY.KEYID = 7
11,099,798 UART: [art] PUB.X = 8855799A45B8E0D21D4419A1D51A149B9B6847F52CBD2350A3D274A129B7680446DFD3374C1D508F0DF5406950A45623
11,106,554 UART: [art] PUB.Y = C5545CB834676C56C74EED6DA648EE48D87FF9362EA6BA6330B71D759D64B30E1F99D6DD36DA5A9B3338E2B88AA25900
11,113,489 UART: [art] SIG.R = 13E981F1965211E8F75A36042B87EE5CB939122E4F683279713E1EECFBEF2E566291605B01E9DA832259954C546BF51C
11,120,249 UART: [art] SIG.S = A732605EE1471C9DDACB7AA8A116C7BEB00BAE16AED3F39DD77D2BF1DC6668C63E7BD62253F57E5371635F7D11C5AECE
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5e:2f:4f:e4:3c:19:2f:1c:cd:e0:29:f0:13:6b:4a:0d:17:28:09:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5A2F4FE43C192F1CCDE029F0136B4A0D17280941E42540C2B2A0F2E697A510ED
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:88:55:79:9a:45:b8:e0:d2:1d:44:19:a1:d5:1a:
14:9b:9b:68:47:f5:2c:bd:23:50:a3:d2:74:a1:29:
b7:68:04:46:df:d3:37:4c:1d:50:8f:0d:f5:40:69:
50:a4:56:23:c5:54:5c:b8:34:67:6c:56:c7:4e:ed:
6d:a6:48:ee:48:d8:7f:f9:36:2e:a6:ba:63:30:b7:
1d:75:9d:64:b3:0e:1f:99:d6:dd:36:da:5a:9b:33:
38:e2:b8:8a:a2:59:00
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
5A:2F:4F:E4:3C:19:2F:1C:CD:E0:29:F0:13:6B:4A:0D:17:28:09:41
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:13:e9:81:f1:96:52:11:e8:f7:5a:36:04:2b:87:
ee:5c:b9:39:12:2e:4f:68:32:79:71:3e:1e:ec:fb:ef:2e:56:
62:91:60:5b:01:e9:da:83:22:59:95:4c:54:6b:f5:1c:02:31:
00:a7:32:60:5e:e1:47:1c:9d:da:cb:7a:a8:a1:16:c7:be:b0:
0b:ae:16:ae:d3:f3:9d:d7:7d:2b:f1:dc:66:68:c6:3e:7b:d6:
22:53:f5:7e:53:71:63:5f:7d:11:c5:ae:ce
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.68s
Truncated 881 bytes from beginning
e
5,564,987 UART: [art] Populate DV Done
5,573,041 UART: [fht] FMC Alias Private Key: 7
5,574,191 UART: [art] Derive CDI
5,574,471 UART: [art] Store in in slot 0x4
5,659,924 UART: [art] Derive Key Pair
5,660,284 UART: [art] Store priv key in slot 0x5
5,673,098 UART: [art] Derive Key Pair - Done
5,688,020 UART: [art] Signing Cert with AUTHO
5,688,500 UART: RITY.KEYID = 7
5,703,436 UART: [art] Erasing AUTHORITY.KEYID = 7
5,704,201 UART: [art] PUB.X = 0F3CB0111E228E57AEA3A864C7A80B00804097CCA8528C2D94887460A94931BAECA7DF3CE74E2C8ECF79D23BA79BD769
5,710,955 UART: [art] PUB.Y = 229906DED300EB0D600B011127941806CF41D6EB51FB5374D455CD97FFD6575EFCCA980C9B75C315DB30FBFBBB1B7EDA
5,717,883 UART: [art] SIG.R = 7BEC26AB36A61BAE5BBFB28E1236F4312805893F9EA0FF208F8E4EF71C81A4A64ECA67E4B0C19B585CA2C0E6A6532361
5,724,666 UART: [art] SIG.S = 9C0601A470C363B981BE6F748285D3348764C21B34C6030F67C000136E8E10125FA2B0BE891FFA97BDBC6371024499DD
5,748,610 UART: Caliptra RT
5,748,863 UART: [state] CFI Enabled
5,856,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,886,967 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,926,875 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,968,683 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
27:17:95:61:06:9b:cb:33:2a:d2:9b:07:c8:df:3a:2e:f7:fb:98:ab
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A7179561069BCB332AD29B07C8DF3A2EF7FB98AB6F450D0017619D380ACF5E00
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0f:3c:b0:11:1e:22:8e:57:ae:a3:a8:64:c7:a8:
0b:00:80:40:97:cc:a8:52:8c:2d:94:88:74:60:a9:
49:31:ba:ec:a7:df:3c:e7:4e:2c:8e:cf:79:d2:3b:
a7:9b:d7:69:22:99:06:de:d3:00:eb:0d:60:0b:01:
11:27:94:18:06:cf:41:d6:eb:51:fb:53:74:d4:55:
cd:97:ff:d6:57:5e:fc:ca:98:0c:9b:75:c3:15:db:
30:fb:fb:bb:1b:7e:da
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
A7:17:95:61:06:9B:CB:33:2A:D2:9B:07:C8:DF:3A:2E:F7:FB:98:AB
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:7b:ec:26:ab:36:a6:1b:ae:5b:bf:b2:8e:12:36:
f4:31:28:05:89:3f:9e:a0:ff:20:8f:8e:4e:f7:1c:81:a4:a6:
4e:ca:67:e4:b0:c1:9b:58:5c:a2:c0:e6:a6:53:23:61:02:31:
00:9c:06:01:a4:70:c3:63:b9:81:be:6f:74:82:85:d3:34:87:
64:c2:1b:34:c6:03:0f:67:c0:00:13:6e:8e:10:12:5f:a2:b0:
be:89:1f:fa:97:bd:bc:63:71:02:44:99:dd
5,979,582 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,238,368 >>> mbox cmd response: success
11,252,070 UART:
11,252,086 UART: Running Caliptra FMC ...
11,252,494 UART:
11,252,548 UART: [state] CFI Enabled
11,341,211 UART: [art] Extend RT PCRs Done
11,341,639 UART: [art] Lock RT PCRs Done
11,342,950 UART: [art] Populate DV Done
11,351,318 UART: [fht] FMC Alias Private Key: 7
11,352,378 UART: [art] Derive CDI
11,352,658 UART: [art] Store in in slot 0x4
11,438,247 UART: [art] Derive Key Pair
11,438,607 UART: [art] Store priv key in slot 0x5
11,451,311 UART: [art] Derive Key Pair - Done
11,466,086 UART: [art] Signing Cert with AUTHO
11,466,566 UART: RITY.KEYID = 7
11,481,918 UART: [art] Erasing AUTHORITY.KEYID = 7
11,482,683 UART: [art] PUB.X = DC67017374EDCC505BF0B7226F070251F36AA4EEE6D1063D0160E121D7E1A5FFB6E6954BE57F89CA4A86BA22846290DF
11,489,448 UART: [art] PUB.Y = 1E78B75327C567FE9D872A02FA4F834FB33BC82776CDEACB2C819EF3B30C7E4056B2E1836319D6EEBC52B4EA29B0A2F8
11,496,408 UART: [art] SIG.R = 6CF3FFF2F97538210C60FCE2B2B893A3D4350E45016BFFD5C213D915C0C75495B1F716A41E8508C49237DA0B42AF87B9
11,503,169 UART: [art] SIG.S = 0A167EFDA533601D2425D838E4AE62FBA355AB7B420B6D3EFF10741492E19387B3EC8AE164CC9A4103E42C3F92E7D49A
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
16:29:82:08:4a:16:04:4d:03:df:c3:82:ef:f4:b7:0a:f9:3d:42:fc
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=162982084A16044D03DFC382EFF4B70AF93D42FCC90C835DAC057A664E33A6A9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:dc:67:01:73:74:ed:cc:50:5b:f0:b7:22:6f:07:
02:51:f3:6a:a4:ee:e6:d1:06:3d:01:60:e1:21:d7:
e1:a5:ff:b6:e6:95:4b:e5:7f:89:ca:4a:86:ba:22:
84:62:90:df:1e:78:b7:53:27:c5:67:fe:9d:87:2a:
02:fa:4f:83:4f:b3:3b:c8:27:76:cd:ea:cb:2c:81:
9e:f3:b3:0c:7e:40:56:b2:e1:83:63:19:d6:ee:bc:
52:b4:ea:29:b0:a2:f8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
16:29:82:08:4A:16:04:4D:03:DF:C3:82:EF:F4:B7:0A:F9:3D:42:FC
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:6c:f3:ff:f2:f9:75:38:21:0c:60:fc:e2:b2:b8:
93:a3:d4:35:0e:45:01:6b:ff:d5:c2:13:d9:15:c0:c7:54:95:
b1:f7:16:a4:1e:85:08:c4:92:37:da:0b:42:af:87:b9:02:30:
0a:16:7e:fd:a5:33:60:1d:24:25:d8:38:e4:ae:62:fb:a3:55:
ab:7b:42:0b:6d:3e:ff:10:74:14:92:e1:93:87:b3:ec:8a:e1:
64:cc:9a:41:03:e4:2c:3f:92:e7:d4:9a
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.79s
Truncated 5401 bytes from beginning
0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,953,543 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,995,231 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:c9:6e:52:33:ba:41:00:47:51:6a:d6:43:47:94:2c:e3:bb:bc:37
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=95C96E5233BA410047516AD64347942CE3BBBC37E92ABECF82CCEDD699200399
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:03:1f:17:2a:27:c9:f4:bc:22:27:0c:0e:16:e7:
b7:8b:e7:83:8d:23:a8:da:de:7c:98:f7:08:7c:2c:
5e:35:0b:3d:11:07:f8:4b:6f:3b:fe:9c:d4:6e:ed:
ce:b0:87:5f:0e:d2:1a:69:c1:cb:f7:5d:8c:ab:a8:
d2:cd:a4:bb:16:bf:7d:31:b2:ca:16:1c:93:c0:e6:
08:b2:83:c0:6e:34:da:7f:b3:14:32:6d:31:83:34:
53:0d:08:c9:5b:e2:85
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
95:C9:6E:52:33:BA:41:00:47:51:6A:D6:43:47:94:2C:E3:BB:BC:37
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:06:48:c4:26:b5:02:63:28:16:25:25:cd:83:5d:
5e:fb:3c:a0:ef:29:08:79:bb:8b:c3:c6:35:94:73:aa:6d:0c:
69:83:81:bf:c1:27:a6:83:c2:7f:c2:12:77:42:b4:f9:02:31:
00:a5:d5:c3:8c:6e:d9:90:ee:99:89:1d:f4:e2:1f:8f:d0:4e:
e1:19:1e:a3:80:7d:61:92:5b:45:f4:ac:bd:10:fd:34:3e:14:
fe:c5:13:a3:45:af:6d:a9:cf:de:55:2f:87
6,006,060 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,717 UART:
6,006,733 UART: Running Caliptra ROM ...
6,007,141 UART:
6,007,282 UART: [state] CFI Enabled
6,010,287 UART: [state] LifecycleState = Production
6,010,895 UART: [state] DebugLocked = Yes
6,011,643 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,013,314 UART: [kat] SHA2-256
6,807,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,811,360 UART: [kat] ++
6,811,512 UART: [kat] sha1
6,815,908 UART: [kat] SHA2-256
6,817,846 UART: [kat] SHA2-384
6,820,573 UART: [kat] SHA2-512-ACC
6,822,473 UART: [kat] ECC-384
6,828,090 UART: [kat] HMAC-384Kdf
6,832,676 UART: [kat] LMS
7,400,872 UART: [kat] --
7,401,463 UART: [update-reset] ++
10,971,460 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,972,586 UART: [update-reset] Loading Runtime at address 0x40005000 len 87504
11,119,246 >>> mbox cmd response: success
11,119,552 UART: [update-reset] Copying MAN_2 To MAN_1
11,127,564 UART: [update-reset Success] --
11,128,543 UART: [state] Locking Datavault
11,129,219 UART: [state] Locking PCR0, PCR1 and PCR31
11,129,823 UART: [state] Locking ICCM
11,130,279 UART: [exit] Launching FMC @ 0x40000130
11,135,608 UART:
11,135,624 UART: Running Caliptra FMC ...
11,136,032 UART:
11,136,175 UART: [state] CFI Enabled
11,225,428 UART: [art] Extend RT PCRs Done
11,225,856 UART: [art] Lock RT PCRs Done
11,227,117 UART: [art] Populate DV Done
11,235,217 UART: [fht] FMC Alias Private Key: 7
11,236,375 UART: [art] Derive CDI
11,236,655 UART: [art] Store in in slot 0x4
11,321,812 UART: [art] Derive Key Pair
11,322,172 UART: [art] Store priv key in slot 0x5
11,334,808 UART: [art] Derive Key Pair - Done
11,349,511 UART: [art] Signing Cert with AUTHO
11,349,991 UART: RITY.KEYID = 7
11,364,933 UART: [art] Erasing AUTHORITY.KEYID = 7
11,365,698 UART: [art] PUB.X = DA0EEA627997F90190BACB527B445E5C3F95CF44F3447EE0F39443F9E4FFE133C959A986BDF842769D3D9B02528F2B9D
11,372,469 UART: [art] PUB.Y = 3D730D868EA9DE06A4EA7B0788F78D0A4D827BA8AF69479CDC2A7DC818D2BCAC6E46375AFEAFAFC417F5947507A00977
11,379,419 UART: [art] SIG.R = 270CA80E00E2DB3B8D6312DB89554DF5C865250ADC736A90D15AC2BC132337CD36D15B1B2FFE7EF167EECE31ED62447D
11,386,174 UART: [art] SIG.S = 60DDA0E784A776720746A563C444140951E8EAC04400E7302CA6BD5DA3F9ED5536FACE121BD337B6469C4531AB6EA09E
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:7e:9f:ed:97:b1:d8:7d:0f:51:18:c8:6d:fe:71:c9:06:34:0d:47
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=917E9FED97B1D87D0F5118C86DFE71C906340D47FB59150749AFBF039E855809
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:da:0e:ea:62:79:97:f9:01:90:ba:cb:52:7b:44:
5e:5c:3f:95:cf:44:f3:44:7e:e0:f3:94:43:f9:e4:
ff:e1:33:c9:59:a9:86:bd:f8:42:76:9d:3d:9b:02:
52:8f:2b:9d:3d:73:0d:86:8e:a9:de:06:a4:ea:7b:
07:88:f7:8d:0a:4d:82:7b:a8:af:69:47:9c:dc:2a:
7d:c8:18:d2:bc:ac:6e:46:37:5a:fe:af:af:c4:17:
f5:94:75:07:a0:09:77
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
91:7E:9F:ED:97:B1:D8:7D:0F:51:18:C8:6D:FE:71:C9:06:34:0D:47
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:27:0c:a8:0e:00:e2:db:3b:8d:63:12:db:89:55:
4d:f5:c8:65:25:0a:dc:73:6a:90:d1:5a:c2:bc:13:23:37:cd:
36:d1:5b:1b:2f:fe:7e:f1:67:ee:ce:31:ed:62:44:7d:02:30:
60:dd:a0:e7:84:a7:76:72:07:46:a5:63:c4:44:14:09:51:e8:
ea:c0:44:00:e7:30:2c:a6:bd:5d:a3:f9:ed:55:36:fa:ce:12:
1b:d3:37:b6:46:9c:45:31:ab:6e:a0:9e
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.82s
Truncated 881 bytes from beginning
e
5,449,952 UART: [art] Populate DV Done
5,458,380 UART: [fht] FMC Alias Private Key: 7
5,459,350 UART: [art] Derive CDI
5,459,630 UART: [art] Store in in slot 0x4
5,544,777 UART: [art] Derive Key Pair
5,545,137 UART: [art] Store priv key in slot 0x5
5,558,645 UART: [art] Derive Key Pair - Done
5,573,293 UART: [art] Signing Cert with AUTHO
5,573,773 UART: RITY.KEYID = 7
5,588,803 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,568 UART: [art] PUB.X = 063219B3A13869F245F2C9F2B3B4C7C3E3B18B1E89B2441310855B64DE292F0812E768E7A60FF35BCB1DC2133EE5256B
5,596,331 UART: [art] PUB.Y = A047D9A2FD84A7A621A7127855CCE30540EEFFE97F695530E7E7954396DAB93FC7DEA46B368B32F7974B5CE78D70CAC3
5,603,290 UART: [art] SIG.R = 4E18D7C04E124718D50C73898E7E79622988C2313DC7FAC5388497A87CBBF5C6BC5141EED95A3ADDA182EB6AB4172195
5,610,063 UART: [art] SIG.S = 463056C6C77BE1929D3491CBA5726A235A8F6F24BB6EAA954717400162A34F20567A67E52EAE0D46F0ECE20CBD2B0981
5,634,172 UART: Caliptra RT
5,634,517 UART: [state] CFI Enabled
5,743,167 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,773,832 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,813,642 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,855,318 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7c:76:5b:11:07:7d:13:9c:65:64:95:0e:fb:ff:d1:98:79:ae:36:8d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7C765B11077D139C6564950EFBFFD19879AE368D504DCABEC7BF903CF5F2A67B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:06:32:19:b3:a1:38:69:f2:45:f2:c9:f2:b3:b4:
c7:c3:e3:b1:8b:1e:89:b2:44:13:10:85:5b:64:de:
29:2f:08:12:e7:68:e7:a6:0f:f3:5b:cb:1d:c2:13:
3e:e5:25:6b:a0:47:d9:a2:fd:84:a7:a6:21:a7:12:
78:55:cc:e3:05:40:ee:ff:e9:7f:69:55:30:e7:e7:
95:43:96:da:b9:3f:c7:de:a4:6b:36:8b:32:f7:97:
4b:5c:e7:8d:70:ca:c3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
7C:76:5B:11:07:7D:13:9C:65:64:95:0E:FB:FF:D1:98:79:AE:36:8D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:4e:18:d7:c0:4e:12:47:18:d5:0c:73:89:8e:7e:
79:62:29:88:c2:31:3d:c7:fa:c5:38:84:97:a8:7c:bb:f5:c6:
bc:51:41:ee:d9:5a:3a:dd:a1:82:eb:6a:b4:17:21:95:02:30:
46:30:56:c6:c7:7b:e1:92:9d:34:91:cb:a5:72:6a:23:5a:8f:
6f:24:bb:6e:aa:95:47:17:40:01:62:a3:4f:20:56:7a:67:e5:
2e:ae:0d:46:f0:ec:e2:0c:bd:2b:09:81
5,865,977 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,824,208 >>> mbox cmd response: success
10,837,196 UART:
10,837,212 UART: Running Caliptra FMC ...
10,837,620 UART:
10,837,763 UART: [state] CFI Enabled
10,926,586 UART: [art] Extend RT PCRs Done
10,927,014 UART: [art] Lock RT PCRs Done
10,928,137 UART: [art] Populate DV Done
10,936,269 UART: [fht] FMC Alias Private Key: 7
10,937,417 UART: [art] Derive CDI
10,937,697 UART: [art] Store in in slot 0x4
11,023,376 UART: [art] Derive Key Pair
11,023,736 UART: [art] Store priv key in slot 0x5
11,036,750 UART: [art] Derive Key Pair - Done
11,051,761 UART: [art] Signing Cert with AUTHO
11,052,241 UART: RITY.KEYID = 7
11,067,713 UART: [art] Erasing AUTHORITY.KEYID = 7
11,068,478 UART: [art] PUB.X = A57B810A73CDC565FE8B60D017598F2E3C0AC7A59144E06934F5D7AC76E8EC439172AF620B92D9EC8D10EF665C64C3D9
11,075,249 UART: [art] PUB.Y = BBE83FBDC1AA181261BA7A0F01B48F681BFFC47F651DFCDBDBAC2BE7314633EF458361B4048617DFCF7C172EEDF4B56B
11,082,218 UART: [art] SIG.R = 3D922B31C6DB049641C77105C76C2570CF1A7AA4AB5949321A48D3F3C349E5C97D45ADD6A4CFEE1189492DF2C78C9D37
11,088,990 UART: [art] SIG.S = AA4E2F9B4461EE17BEAFA8C69447494A0653C15C62F60F003E4039C4B509368563B80BF7918864F479A62372D215AD72
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
16:8c:bf:4d:20:9c:a1:c8:c2:17:39:e0:a7:6c:cb:34:04:88:ad:aa
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=128CBF4D209CA1C8C21739E0A76CCB340488ADAAEE9050BA1F89B3E208B1F4C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a5:7b:81:0a:73:cd:c5:65:fe:8b:60:d0:17:59:
8f:2e:3c:0a:c7:a5:91:44:e0:69:34:f5:d7:ac:76:
e8:ec:43:91:72:af:62:0b:92:d9:ec:8d:10:ef:66:
5c:64:c3:d9:bb:e8:3f:bd:c1:aa:18:12:61:ba:7a:
0f:01:b4:8f:68:1b:ff:c4:7f:65:1d:fc:db:db:ac:
2b:e7:31:46:33:ef:45:83:61:b4:04:86:17:df:cf:
7c:17:2e:ed:f4:b5:6b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
12:8C:BF:4D:20:9C:A1:C8:C2:17:39:E0:A7:6C:CB:34:04:88:AD:AA
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:3d:92:2b:31:c6:db:04:96:41:c7:71:05:c7:6c:
25:70:cf:1a:7a:a4:ab:59:49:32:1a:48:d3:f3:c3:49:e5:c9:
7d:45:ad:d6:a4:cf:ee:11:89:49:2d:f2:c7:8c:9d:37:02:31:
00:aa:4e:2f:9b:44:61:ee:17:be:af:a8:c6:94:47:49:4a:06:
53:c1:5c:62:f6:0f:00:3e:40:39:c4:b5:09:36:85:63:b8:0b:
f7:91:88:64:f4:79:a6:23:72:d2:15:ad:72
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.71s
Truncated 5295 bytes from beginning
al=0, next_pc=40005400
3,881,673 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,627 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,103 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:17:6f:07:47:0d:68:39:e2:d8:b6:96:df:5f:ca:93:82:a7:dc:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=74176F07470D6839E2D8B696DF5FCA9382A7DCE22AF68558BABBB228EDC28827
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a0:2c:7e:5f:bd:a2:23:a0:f3:61:31:84:bc:ef:
d6:80:ed:64:4f:17:db:f6:f1:f8:65:6c:f1:6c:cd:
41:f0:62:19:e6:71:c7:92:52:ae:ad:e2:a4:e6:86:
40:ca:18:a8:d8:0a:39:e0:2e:8c:63:56:56:d7:27:
4f:85:a6:1d:63:51:79:7b:c4:2e:f9:6f:ed:86:7e:
fc:a7:e3:38:7b:0f:ad:84:28:77:90:1d:11:d7:9d:
31:c0:22:92:33:31:a0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
74:17:6F:07:47:0D:68:39:E2:D8:B6:96:DF:5F:CA:93:82:A7:DC:E2
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e0:5f:84:33:b4:1b:a0:71:ca:9b:58:15:35:
ed:b0:90:b3:ed:6a:2a:1e:9b:2b:2e:4d:a7:6b:d1:79:0b:5e:
54:9c:eb:3e:64:97:9a:59:20:d9:2b:24:9a:4c:f9:f6:55:02:
30:57:70:18:11:ad:bc:71:56:e2:44:67:f9:b3:cd:eb:fd:f0:
ed:52:47:aa:b8:a5:1e:8d:00:f1:b9:53:0b:c3:bf:7e:2c:e5:
f6:3c:f9:40:76:ed:4c:99:81:64:99:84:e5
3,973,928 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,002 UART:
3,975,018 UART: Running Caliptra ROM ...
3,975,426 UART:
3,975,481 UART: [state] CFI Enabled
3,978,252 UART: [state] LifecycleState = Production
3,978,860 UART: [state] DebugLocked = Yes
3,979,392 UART: [state] Starting the WD Timer 40000000 cycles
3,980,942 UART: [kat] SHA2-256
4,786,592 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,790,717 UART: [kat] ++
4,790,869 UART: [kat] sha1
4,795,065 UART: [kat] SHA2-256
4,797,005 UART: [kat] SHA2-384
4,799,752 UART: [kat] SHA2-512-ACC
4,801,652 UART: [kat] ECC-384
4,811,611 UART: [kat] HMAC-384Kdf
4,816,219 UART: [kat] LMS
5,064,547 UART: [kat] --
5,065,567 UART: [update-reset] ++
6,919,970 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,921,139 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
7,067,747 >>> mbox cmd response: success
7,067,935 UART: [update-reset] Copying MAN_2 To MAN_1
7,075,947 UART: [update-reset Success] --
7,077,098 UART: [state] Locking Datavault
7,077,834 UART: [state] Locking PCR0, PCR1 and PCR31
7,078,438 UART: [state] Locking ICCM
7,078,968 UART: [exit] Launching FMC @ 0x40000130
7,084,297 UART:
7,084,313 UART: Running Caliptra FMC ...
7,084,721 UART:
7,084,775 UART: [state] CFI Enabled
7,174,028 UART: [art] Extend RT PCRs Done
7,174,456 UART: [art] Lock RT PCRs Done
7,175,425 UART: [art] Populate DV Done
7,183,523 UART: [fht] FMC Alias Private Key: 7
7,184,463 UART: [art] Derive CDI
7,184,743 UART: [art] Store in in slot 0x4
7,270,620 UART: [art] Derive Key Pair
7,270,980 UART: [art] Store priv key in slot 0x5
7,284,138 UART: [art] Derive Key Pair - Done
7,299,118 UART: [art] Signing Cert with AUTHO
7,299,598 UART: RITY.KEYID = 7
7,314,956 UART: [art] Erasing AUTHORITY.KEYID = 7
7,315,721 UART: [art] PUB.X = 6ED0DFE72FF624ED2AB570FD612A58A93F0F4E5F46CE99263FC33D1F20170A3E5A992F40345793DFDBC284522FF2AA26
7,322,499 UART: [art] PUB.Y = 84776E4C233CB23D664023235A509A7C55B017C3F82B1D18AF0731E51AE146AA63EC71899FC0B9888F6C1577CB6B88DC
7,329,448 UART: [art] SIG.R = 6E2DDFCBDBD1938FEE2CA73AEEA3A3CE40970F8DE150E5839632763158BAE0BA5AF04945FB52BF19797E928890812609
7,336,224 UART: [art] SIG.S = 5D55D274DFDA41F350FBF927843880EABB5EDB0A0698B22C4C02533AD1E10123E5E6B6E11ED51DB16A6F48F776655619
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:0b:ab:2e:cb:b0:1d:3f:8f:70:00:db:68:5b:29:62:0a:aa:e6:9e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4D0BAB2ECBB01D3F8F7000DB685B29620AAAE69E9F3D643977D2C4BE8A57C7C7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6e:d0:df:e7:2f:f6:24:ed:2a:b5:70:fd:61:2a:
58:a9:3f:0f:4e:5f:46:ce:99:26:3f:c3:3d:1f:20:
17:0a:3e:5a:99:2f:40:34:57:93:df:db:c2:84:52:
2f:f2:aa:26:84:77:6e:4c:23:3c:b2:3d:66:40:23:
23:5a:50:9a:7c:55:b0:17:c3:f8:2b:1d:18:af:07:
31:e5:1a:e1:46:aa:63:ec:71:89:9f:c0:b9:88:8f:
6c:15:77:cb:6b:88:dc
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
4D:0B:AB:2E:CB:B0:1D:3F:8F:70:00:DB:68:5B:29:62:0A:AA:E6:9E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:6e:2d:df:cb:db:d1:93:8f:ee:2c:a7:3a:ee:a3:
a3:ce:40:97:0f:8d:e1:50:e5:83:96:32:76:31:58:ba:e0:ba:
5a:f0:49:45:fb:52:bf:19:79:7e:92:88:90:81:26:09:02:30:
5d:55:d2:74:df:da:41:f3:50:fb:f9:27:84:38:80:ea:bb:5e:
db:0a:06:98:b2:2c:4c:02:53:3a:d1:e1:01:23:e5:e6:b6:e1:
1e:d5:1d:b1:6a:6f:48:f7:76:65:56:19
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.13s
Truncated 845 bytes from beginning
373,990 UART: [art] Lock RT PCRs Done
3,375,714 UART: [art] Populate DV Done
3,384,012 UART: [fht] FMC Alias Private Key: 7
3,385,002 UART: [art] Derive CDI
3,385,282 UART: [art] Store in in slot 0x4
3,470,845 UART: [art] Derive Key Pair
3,471,205 UART: [art] Store priv key in slot 0x5
3,483,825 UART: [art] Derive Key Pair - Done
3,498,811 UART: [art] Signing Cert with AUTHO
3,499,291 UART: RITY.KEYID = 7
3,514,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,515,304 UART: [art] PUB.X = FCC79753AE2DBED338265D7106590A70C410975DA8D8D5CD1E96C260109B6A82610418EDAB21D34D234ABA32E7D25131
3,522,069 UART: [art] PUB.Y = FFEFFE71B044A56F0266CA3C90DC6E58812170F598FC57B906BD455B554BAD6C0A5B444591F50CBAEE0E8422EB612D21
3,529,018 UART: [art] SIG.R = 2DC99DE87254D0A1B96EFE8AB15F14F933BEBEC1E4F5BBC41BFEEA0DFE27F9AB07E8B4EC9F31E5393F999F69F6B0173E
3,535,812 UART: [art] SIG.S = BA459E04835355B00DCA20ACCA099DE5F4DF8F3DE92796A2637E1DE02EB920A583027F6815C0A42923EDE254DD1A6AC0
3,559,407 UART: Caliptra RT
3,559,660 UART: [state] CFI Enabled
3,668,107 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,640 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,692 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,316 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:bc:f7:82:00:67:37:72:11:81:db:60:4f:06:6d:9b:bd:d5:04:15
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9BBCF782006737721181DB604F066D9BBDD504150C3668486B2C301548E066BE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:fc:c7:97:53:ae:2d:be:d3:38:26:5d:71:06:59:
0a:70:c4:10:97:5d:a8:d8:d5:cd:1e:96:c2:60:10:
9b:6a:82:61:04:18:ed:ab:21:d3:4d:23:4a:ba:32:
e7:d2:51:31:ff:ef:fe:71:b0:44:a5:6f:02:66:ca:
3c:90:dc:6e:58:81:21:70:f5:98:fc:57:b9:06:bd:
45:5b:55:4b:ad:6c:0a:5b:44:45:91:f5:0c:ba:ee:
0e:84:22:eb:61:2d:21
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
9B:BC:F7:82:00:67:37:72:11:81:DB:60:4F:06:6D:9B:BD:D5:04:15
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:2d:c9:9d:e8:72:54:d0:a1:b9:6e:fe:8a:b1:5f:
14:f9:33:be:be:c1:e4:f5:bb:c4:1b:fe:ea:0d:fe:27:f9:ab:
07:e8:b4:ec:9f:31:e5:39:3f:99:9f:69:f6:b0:17:3e:02:31:
00:ba:45:9e:04:83:53:55:b0:0d:ca:20:ac:ca:09:9d:e5:f4:
df:8f:3d:e9:27:96:a2:63:7e:1d:e0:2e:b9:20:a5:83:02:7f:
68:15:c0:a4:29:23:ed:e2:54:dd:1a:6a:c0
3,791,081 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,778,892 >>> mbox cmd response: success
6,792,249 UART:
6,792,265 UART: Running Caliptra FMC ...
6,792,673 UART:
6,792,727 UART: [state] CFI Enabled
6,881,488 UART: [art] Extend RT PCRs Done
6,881,916 UART: [art] Lock RT PCRs Done
6,883,299 UART: [art] Populate DV Done
6,891,719 UART: [fht] FMC Alias Private Key: 7
6,892,659 UART: [art] Derive CDI
6,892,939 UART: [art] Store in in slot 0x4
6,978,504 UART: [art] Derive Key Pair
6,978,864 UART: [art] Store priv key in slot 0x5
6,992,088 UART: [art] Derive Key Pair - Done
7,006,789 UART: [art] Signing Cert with AUTHO
7,007,269 UART: RITY.KEYID = 7
7,022,679 UART: [art] Erasing AUTHORITY.KEYID = 7
7,023,444 UART: [art] PUB.X = 47B5BCCBF5E5672F3E772247C5C4F1F321637F7F72FA42B8D9C2E51B9CBACBC65BC629527B0D557EBAABEF8032CDC4D5
7,030,235 UART: [art] PUB.Y = AE0320B1B73A397D5E6F8153458B9F822AC6C8868D1CD2D0B7AC1D552B65D3755B8F0F04D31EE935F458F3B916D2A661
7,037,182 UART: [art] SIG.R = 1FEFAE58638FB9ACE5ED06D85F40AAE27A4CFAECC542B09B7AA89A03A0D77281F3F98E730EA1CAB5ACBD7090E48652A8
7,043,971 UART: [art] SIG.S = 281ED649D7CD80A61AB90A89EA4186A5625C54AD0E195C97FB67D83BA07689EDAE68D286526C33ACFDF43ED50D50E65B
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:81:81:cc:6a:be:43:bd:14:72:ce:59:aa:a5:a7:b5:f9:19:9c:70
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B28181CC6ABE43BD1472CE59AAA5A7B5F9199C70DE7A182D133F6BC5FE64A575
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:47:b5:bc:cb:f5:e5:67:2f:3e:77:22:47:c5:c4:
f1:f3:21:63:7f:7f:72:fa:42:b8:d9:c2:e5:1b:9c:
ba:cb:c6:5b:c6:29:52:7b:0d:55:7e:ba:ab:ef:80:
32:cd:c4:d5:ae:03:20:b1:b7:3a:39:7d:5e:6f:81:
53:45:8b:9f:82:2a:c6:c8:86:8d:1c:d2:d0:b7:ac:
1d:55:2b:65:d3:75:5b:8f:0f:04:d3:1e:e9:35:f4:
58:f3:b9:16:d2:a6:61
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
B2:81:81:CC:6A:BE:43:BD:14:72:CE:59:AA:A5:A7:B5:F9:19:9C:70
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:1f:ef:ae:58:63:8f:b9:ac:e5:ed:06:d8:5f:40:
aa:e2:7a:4c:fa:ec:c5:42:b0:9b:7a:a8:9a:03:a0:d7:72:81:
f3:f9:8e:73:0e:a1:ca:b5:ac:bd:70:90:e4:86:52:a8:02:30:
28:1e:d6:49:d7:cd:80:a6:1a:b9:0a:89:ea:41:86:a5:62:5c:
54:ad:0e:19:5c:97:fb:67:d8:3b:a0:76:89:ed:ae:68:d2:86:
52:6c:33:ac:fd:f4:3e:d5:0d:50:e6:5b
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.09s
Truncated 5298 bytes from beginning
0, next_pc=40005400
3,874,157 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,957 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,093 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5c:d2:4b:33:65:c7:ff:d0:0a:c6:ad:f7:c5:9a:5c:65:8c:bf:66:02
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5CD24B3365C7FFD00AC6ADF7C59A5C658CBF66022A800EBB2C901A2C92566007
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ce:2d:0a:fa:8c:35:74:aa:12:0d:8e:02:80:02:
c8:f8:12:8c:1b:cd:9f:26:9d:fd:99:fd:73:c6:9c:
a0:0c:ba:40:68:63:bf:49:d9:a5:18:4e:41:90:1d:
01:57:3c:15:6d:57:29:33:9e:47:78:a2:b8:43:02:
85:97:cc:70:a3:11:19:08:61:da:ec:bf:01:a2:f5:
da:73:27:4e:f0:55:67:25:93:0e:42:e7:9f:40:9b:
8b:63:78:3d:05:89:55
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
5C:D2:4B:33:65:C7:FF:D0:0A:C6:AD:F7:C5:9A:5C:65:8C:BF:66:02
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:4e:74:a1:f1:ad:d4:c4:c6:92:9f:28:76:1b:b5:
a6:55:45:97:47:1a:f3:e8:64:3b:e6:0d:70:4f:9a:88:91:3d:
46:71:ad:6a:e1:b9:75:49:4a:90:f7:c1:85:78:08:d1:02:31:
00:fd:9e:ca:e3:36:06:e1:44:df:6c:60:c2:89:3b:dd:7c:ca:
79:01:57:44:f6:19:a2:7d:ef:61:e7:c0:5a:2f:f4:0d:8a:6b:
23:e7:95:b8:08:e2:01:d4:af:16:83:19:6c
3,966,142 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,932 UART:
3,966,948 UART: Running Caliptra ROM ...
3,967,356 UART:
3,967,498 UART: [state] CFI Enabled
3,970,287 UART: [state] LifecycleState = Production
3,970,895 UART: [state] DebugLocked = Yes
3,971,417 UART: [state] Starting the WD Timer 40000000 cycles
3,972,957 UART: [kat] SHA2-256
4,778,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,782,732 UART: [kat] ++
4,782,884 UART: [kat] sha1
4,786,962 UART: [kat] SHA2-256
4,788,902 UART: [kat] SHA2-384
4,791,523 UART: [kat] SHA2-512-ACC
4,793,423 UART: [kat] ECC-384
4,802,894 UART: [kat] HMAC-384Kdf
4,807,588 UART: [kat] LMS
5,055,916 UART: [kat] --
5,056,630 UART: [update-reset] ++
6,914,284 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,915,483 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
7,062,091 >>> mbox cmd response: success
7,062,317 UART: [update-reset] Copying MAN_2 To MAN_1
7,070,329 UART: [update-reset Success] --
7,071,320 UART: [state] Locking Datavault
7,072,078 UART: [state] Locking PCR0, PCR1 and PCR31
7,072,682 UART: [state] Locking ICCM
7,073,180 UART: [exit] Launching FMC @ 0x40000130
7,078,509 UART:
7,078,525 UART: Running Caliptra FMC ...
7,078,933 UART:
7,079,076 UART: [state] CFI Enabled
7,168,479 UART: [art] Extend RT PCRs Done
7,168,907 UART: [art] Lock RT PCRs Done
7,170,018 UART: [art] Populate DV Done
7,178,110 UART: [fht] FMC Alias Private Key: 7
7,179,064 UART: [art] Derive CDI
7,179,344 UART: [art] Store in in slot 0x4
7,264,447 UART: [art] Derive Key Pair
7,264,807 UART: [art] Store priv key in slot 0x5
7,278,203 UART: [art] Derive Key Pair - Done
7,292,971 UART: [art] Signing Cert with AUTHO
7,293,451 UART: RITY.KEYID = 7
7,308,821 UART: [art] Erasing AUTHORITY.KEYID = 7
7,309,586 UART: [art] PUB.X = 11CD8C21A5186176B0421D2035D7EF34D1CC36C13FF775079E923042057C60629117CD2B18E6EEF6032CE8D98575DAD8
7,316,345 UART: [art] PUB.Y = 47BC518E96B0568657224B5D357864039BD7709C5B1F560610E2E8DA406D11C68DF0A0B2EA9101EA4169FA731284DAAC
7,323,286 UART: [art] SIG.R = 217DFAC1B467008A5134F1927B57930D16CACF1A0DDBE377DD371962C0C6B8484AD781CD9C8E0D1A48AC080EB902DABF
7,330,032 UART: [art] SIG.S = BC4D2C9454C67C66DA78D7D8988DB60224F7F907CEF18CA30CE28B05F97F965D5728D96BF42E265824D9F19D721BA5DB
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:9e:c2:c5:ad:77:89:07:ac:d7:37:08:f4:b0:eb:2d:45:67:51:a6
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1A9EC2C5AD778907ACD73708F4B0EB2D456751A6FFE6EA891CA4DF356052C26B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:11:cd:8c:21:a5:18:61:76:b0:42:1d:20:35:d7:
ef:34:d1:cc:36:c1:3f:f7:75:07:9e:92:30:42:05:
7c:60:62:91:17:cd:2b:18:e6:ee:f6:03:2c:e8:d9:
85:75:da:d8:47:bc:51:8e:96:b0:56:86:57:22:4b:
5d:35:78:64:03:9b:d7:70:9c:5b:1f:56:06:10:e2:
e8:da:40:6d:11:c6:8d:f0:a0:b2:ea:91:01:ea:41:
69:fa:73:12:84:da:ac
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
1A:9E:C2:C5:AD:77:89:07:AC:D7:37:08:F4:B0:EB:2D:45:67:51:A6
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:21:7d:fa:c1:b4:67:00:8a:51:34:f1:92:7b:57:
93:0d:16:ca:cf:1a:0d:db:e3:77:dd:37:19:62:c0:c6:b8:48:
4a:d7:81:cd:9c:8e:0d:1a:48:ac:08:0e:b9:02:da:bf:02:31:
00:bc:4d:2c:94:54:c6:7c:66:da:78:d7:d8:98:8d:b6:02:24:
f7:f9:07:ce:f1:8c:a3:0c:e2:8b:05:f9:7f:96:5d:57:28:d9:
6b:f4:2e:26:58:24:d9:f1:9d:72:1b:a5:db
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
Truncated 848 bytes from beginning
,096 UART: [art] Lock RT PCRs Done
3,383,410 UART: [art] Populate DV Done
3,391,864 UART: [fht] FMC Alias Private Key: 7
3,392,858 UART: [art] Derive CDI
3,393,138 UART: [art] Store in in slot 0x4
3,479,031 UART: [art] Derive Key Pair
3,479,391 UART: [art] Store priv key in slot 0x5
3,492,573 UART: [art] Derive Key Pair - Done
3,507,330 UART: [art] Signing Cert with AUTHO
3,507,810 UART: RITY.KEYID = 7
3,522,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,523,651 UART: [art] PUB.X = DDFABC24DAC90275D20BED0D44CFB4C9E0A94253E0AAE8B6342E10111CC73330DAFADB50F774FAE5615CA767B107CEA4
3,530,435 UART: [art] PUB.Y = C5D8F559C089356C2B1B224A1CA288A86DCDF39DBCDBEE7E155392001EC477D60F17A7450834D424122C2D73DE696F44
3,537,363 UART: [art] SIG.R = B83CD0D74BF1471C17CAE75AC93BA135E5D2B12D36620BD81B782BD64FEF5940A31260BC1F6933B0068F07094B2611DF
3,544,129 UART: [art] SIG.S = 3DAD5B7DFE7D11469145178BDF8B144B26CF7CAD7DDE008A28963A589EE6E14CDE2711CFFD7EACCA3316F0BA6A3F5AF8
3,568,552 UART: Caliptra RT
3,568,897 UART: [state] CFI Enabled
3,677,652 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,967 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,747,749 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,381 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
66:28:25:25:c9:24:7e:0b:c5:60:40:77:b4:ad:05:aa:72:ed:46:cc
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=62282525C9247E0BC5604077B4AD05AA72ED46CCACE4299C83725CF151276E4D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:dd:fa:bc:24:da:c9:02:75:d2:0b:ed:0d:44:cf:
b4:c9:e0:a9:42:53:e0:aa:e8:b6:34:2e:10:11:1c:
c7:33:30:da:fa:db:50:f7:74:fa:e5:61:5c:a7:67:
b1:07:ce:a4:c5:d8:f5:59:c0:89:35:6c:2b:1b:22:
4a:1c:a2:88:a8:6d:cd:f3:9d:bc:db:ee:7e:15:53:
92:00:1e:c4:77:d6:0f:17:a7:45:08:34:d4:24:12:
2c:2d:73:de:69:6f:44
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
62:28:25:25:C9:24:7E:0B:C5:60:40:77:B4:AD:05:AA:72:ED:46:CC
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:b8:3c:d0:d7:4b:f1:47:1c:17:ca:e7:5a:c9:
3b:a1:35:e5:d2:b1:2d:36:62:0b:d8:1b:78:2b:d6:4f:ef:59:
40:a3:12:60:bc:1f:69:33:b0:06:8f:07:09:4b:26:11:df:02:
30:3d:ad:5b:7d:fe:7d:11:46:91:45:17:8b:df:8b:14:4b:26:
cf:7c:ad:7d:de:00:8a:28:96:3a:58:9e:e6:e1:4c:de:27:11:
cf:fd:7e:ac:ca:33:16:f0:ba:6a:3f:5a:f8
3,800,156 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,785,512 >>> mbox cmd response: success
6,798,833 UART:
6,798,849 UART: Running Caliptra FMC ...
6,799,257 UART:
6,799,400 UART: [state] CFI Enabled
6,888,671 UART: [art] Extend RT PCRs Done
6,889,099 UART: [art] Lock RT PCRs Done
6,890,276 UART: [art] Populate DV Done
6,898,466 UART: [fht] FMC Alias Private Key: 7
6,899,514 UART: [art] Derive CDI
6,899,794 UART: [art] Store in in slot 0x4
6,985,731 UART: [art] Derive Key Pair
6,986,091 UART: [art] Store priv key in slot 0x5
6,999,549 UART: [art] Derive Key Pair - Done
7,014,784 UART: [art] Signing Cert with AUTHO
7,015,264 UART: RITY.KEYID = 7
7,030,306 UART: [art] Erasing AUTHORITY.KEYID = 7
7,031,071 UART: [art] PUB.X = E33A5120FA54F6DB2265680207B20568DC1543C75B01723DA677D9D42685B49D37F2F4882773417DB2D1292E39D0BB60
7,037,821 UART: [art] PUB.Y = 67E1FCBAED1EF8F19EFC7E458E67D17894D9D208C0EA7E4ECC05E0F5BD7F7D75ECB279F77AF04D8499CAD0C418E0B5C4
7,044,793 UART: [art] SIG.R = A47237F5666EF11931AAACA37BFDE8185B82E65CD3F8A065C5FC0D6E471F4AB781F93183CD17F897E8D27FF9789F52AB
7,051,574 UART: [art] SIG.S = 73856D94C468AD338B3DEF09B791BC948FFABDE244C9E95A7E61CA7486C5F5BCDACEF5245A4CEB0949A68590E7FBC735
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4c:90:29:9f:ae:f1:bc:a9:ff:45:6e:7f:3e:53:f5:66:20:60:3a:20
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4890299FAEF1BCA9FF456E7F3E53F56620603A207403A47C7A53CA29B9D893ED
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e3:3a:51:20:fa:54:f6:db:22:65:68:02:07:b2:
05:68:dc:15:43:c7:5b:01:72:3d:a6:77:d9:d4:26:
85:b4:9d:37:f2:f4:88:27:73:41:7d:b2:d1:29:2e:
39:d0:bb:60:67:e1:fc:ba:ed:1e:f8:f1:9e:fc:7e:
45:8e:67:d1:78:94:d9:d2:08:c0:ea:7e:4e:cc:05:
e0:f5:bd:7f:7d:75:ec:b2:79:f7:7a:f0:4d:84:99:
ca:d0:c4:18:e0:b5:c4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
48:90:29:9F:AE:F1:BC:A9:FF:45:6E:7F:3E:53:F5:66:20:60:3A:20
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a4:72:37:f5:66:6e:f1:19:31:aa:ac:a3:7b:
fd:e8:18:5b:82:e6:5c:d3:f8:a0:65:c5:fc:0d:6e:47:1f:4a:
b7:81:f9:31:83:cd:17:f8:97:e8:d2:7f:f9:78:9f:52:ab:02:
30:73:85:6d:94:c4:68:ad:33:8b:3d:ef:09:b7:91:bc:94:8f:
fa:bd:e2:44:c9:e9:5a:7e:61:ca:74:86:c5:f5:bc:da:ce:f5:
24:5a:4c:eb:09:49:a6:85:90:e7:fb:c7:35
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.14s
Truncated 5298 bytes from beginning
0, next_pc=40005400
3,869,509 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,251 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,681 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6d:e8:13:be:02:8f:79:4a:eb:d3:a6:ed:c1:da:61:c1:5f:9b:50:80
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6DE813BE028F794AEBD3A6EDC1DA61C15F9B50805971EC80F38A99C2169A1A6B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:5d:d4:0f:48:c1:66:a1:12:c8:61:b8:1a:dc:a1:
0b:50:61:43:78:dd:1d:ad:97:57:5f:8e:e7:03:9a:
ea:e7:6e:6c:d2:4a:6d:60:b1:69:6e:d5:44:ad:a4:
7b:b9:48:56:5a:b8:bd:85:38:67:9d:bc:74:28:b7:
8d:71:f4:67:0a:73:32:5c:4e:34:7e:d1:35:cf:9d:
02:eb:bb:83:91:04:8f:44:c0:7c:08:64:64:00:57:
b2:18:41:58:74:20:35
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
6D:E8:13:BE:02:8F:79:4A:EB:D3:A6:ED:C1:DA:61:C1:5F:9B:50:80
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:1b:66:93:d9:63:a1:7c:c0:26:18:9e:13:b3:18:
ae:23:51:c4:21:e8:05:c3:a3:4c:8d:aa:27:54:84:4a:13:10:
a4:42:bf:5b:2d:5b:7a:cf:9b:01:d1:14:c8:cd:d0:f6:02:31:
00:a2:53:4e:22:40:e0:27:1f:12:7e:72:43:e6:cd:38:c4:4b:
60:8e:f9:6a:44:ff:e0:9c:cc:7a:24:ec:22:5e:e3:2f:df:90:
e0:ff:d2:01:82:d7:25:f5:e6:be:5a:7a:95
3,961,564 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,544 UART:
3,962,560 UART: Running Caliptra ROM ...
3,962,968 UART:
3,963,023 UART: [state] CFI Enabled
3,965,798 UART: [state] LifecycleState = Production
3,966,406 UART: [state] DebugLocked = Yes
3,966,988 UART: [state] Starting the WD Timer 40000000 cycles
3,968,696 UART: [kat] SHA2-256
4,772,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,776,375 UART: [kat] ++
4,776,527 UART: [kat] sha1
4,780,773 UART: [kat] SHA2-256
4,782,713 UART: [kat] SHA2-384
4,785,458 UART: [kat] SHA2-512-ACC
4,787,358 UART: [kat] ECC-384
4,797,351 UART: [kat] HMAC-384Kdf
4,801,753 UART: [kat] LMS
5,050,065 UART: [kat] --
5,050,905 UART: [update-reset] ++
6,899,183 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,900,326 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
7,046,934 >>> mbox cmd response: success
7,047,226 UART: [update-reset] Copying MAN_2 To MAN_1
7,055,238 UART: [update-reset Success] --
7,056,125 UART: [state] Locking Datavault
7,057,043 UART: [state] Locking PCR0, PCR1 and PCR31
7,057,647 UART: [state] Locking ICCM
7,058,279 UART: [exit] Launching FMC @ 0x40000130
7,063,608 UART:
7,063,624 UART: Running Caliptra FMC ...
7,064,032 UART:
7,064,086 UART: [state] CFI Enabled
7,152,961 UART: [art] Extend RT PCRs Done
7,153,389 UART: [art] Lock RT PCRs Done
7,154,932 UART: [art] Populate DV Done
7,163,096 UART: [fht] FMC Alias Private Key: 7
7,164,142 UART: [art] Derive CDI
7,164,422 UART: [art] Store in in slot 0x4
7,250,081 UART: [art] Derive Key Pair
7,250,441 UART: [art] Store priv key in slot 0x5
7,263,477 UART: [art] Derive Key Pair - Done
7,278,312 UART: [art] Signing Cert with AUTHO
7,278,792 UART: RITY.KEYID = 7
7,293,706 UART: [art] Erasing AUTHORITY.KEYID = 7
7,294,471 UART: [art] PUB.X = 49A94D6BF10DF8F1A737D5DF49ACECFB77B9AC93E43AE3024A1454D520B9A8EA34916188CCA2F477272504C07984E63D
7,301,242 UART: [art] PUB.Y = E203CEF9E1D02A2DCA389A688A50A02CB43B803F310B09F83DFF225DDA03ADFA19DBAC7112394995A8636F099E05BCD2
7,308,190 UART: [art] SIG.R = 5CFA30A01723D9D9D0AEBD148B844B9A47882F15626BC94248C52D40CC5E991AE0B59EF47CC02A3935FAE10A4572F2E6
7,314,967 UART: [art] SIG.S = E8AAEE521E073AD8BAFB280F443123C1241A08779AE0960F717ECE49C10F048441EE1E884B0A5EECF8666A2C480C293D
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0d:08:98:47:c3:49:f6:14:fc:99:22:57:fc:74:d2:fe:07:17:ba:27
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8D089847C349F614FC992257FC74D2FE0717BA27CC03C5D2E6C87ECCEB845624
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:49:a9:4d:6b:f1:0d:f8:f1:a7:37:d5:df:49:ac:
ec:fb:77:b9:ac:93:e4:3a:e3:02:4a:14:54:d5:20:
b9:a8:ea:34:91:61:88:cc:a2:f4:77:27:25:04:c0:
79:84:e6:3d:e2:03:ce:f9:e1:d0:2a:2d:ca:38:9a:
68:8a:50:a0:2c:b4:3b:80:3f:31:0b:09:f8:3d:ff:
22:5d:da:03:ad:fa:19:db:ac:71:12:39:49:95:a8:
63:6f:09:9e:05:bc:d2
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
8D:08:98:47:C3:49:F6:14:FC:99:22:57:FC:74:D2:FE:07:17:BA:27
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5c:fa:30:a0:17:23:d9:d9:d0:ae:bd:14:8b:84:
4b:9a:47:88:2f:15:62:6b:c9:42:48:c5:2d:40:cc:5e:99:1a:
e0:b5:9e:f4:7c:c0:2a:39:35:fa:e1:0a:45:72:f2:e6:02:31:
00:e8:aa:ee:52:1e:07:3a:d8:ba:fb:28:0f:44:31:23:c1:24:
1a:08:77:9a:e0:96:0f:71:7e:ce:49:c1:0f:04:84:41:ee:1e:
88:4b:0a:5e:ec:f8:66:6a:2c:48:0c:29:3d
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
Truncated 851 bytes from beginning
0 UART: [art] Lock RT PCRs Done
3,374,600 UART: [art] Populate DV Done
3,382,830 UART: [fht] FMC Alias Private Key: 7
3,383,886 UART: [art] Derive CDI
3,384,166 UART: [art] Store in in slot 0x4
3,470,199 UART: [art] Derive Key Pair
3,470,559 UART: [art] Store priv key in slot 0x5
3,483,181 UART: [art] Derive Key Pair - Done
3,498,124 UART: [art] Signing Cert with AUTHO
3,498,604 UART: RITY.KEYID = 7
3,513,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,514,337 UART: [art] PUB.X = C1CB375EA4968395C35BD88E23D70938671BB9A6536B06A5D81A8100959CFE692FF0EB724AC536D9970288610AF8BFC9
3,521,075 UART: [art] PUB.Y = DD780A4F16D503930E1EB3308DF12A55C85FB13AC4EF8BCBADAFF63250BF5237695BD349E776243F4089E3C044870842
3,528,019 UART: [art] SIG.R = E6F6C83C8E7EEBB72F917E646BE3127EF14B589124219ABA57028904056D3C72516BA62CC1A07297494322B982AEB808
3,534,775 UART: [art] SIG.S = EE9BC11FDAF6FEA527AAB565FF819F6E6904AFAFB2AB300E7A2679BDE1E294787AC5781306960C81BDFB3B13F46AF94B
3,558,426 UART: Caliptra RT
3,558,679 UART: [state] CFI Enabled
3,666,626 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,397 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,187 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,329 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:5b:86:83:14:39:8b:f9:af:db:db:44:74:12:be:10:eb:f5:50:25
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=255B868314398BF9AFDBDB447412BE10EBF550256A109A04F514796506488AB8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c1:cb:37:5e:a4:96:83:95:c3:5b:d8:8e:23:d7:
09:38:67:1b:b9:a6:53:6b:06:a5:d8:1a:81:00:95:
9c:fe:69:2f:f0:eb:72:4a:c5:36:d9:97:02:88:61:
0a:f8:bf:c9:dd:78:0a:4f:16:d5:03:93:0e:1e:b3:
30:8d:f1:2a:55:c8:5f:b1:3a:c4:ef:8b:cb:ad:af:
f6:32:50:bf:52:37:69:5b:d3:49:e7:76:24:3f:40:
89:e3:c0:44:87:08:42
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
25:5B:86:83:14:39:8B:F9:AF:DB:DB:44:74:12:BE:10:EB:F5:50:25
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e6:f6:c8:3c:8e:7e:eb:b7:2f:91:7e:64:6b:
e3:12:7e:f1:4b:58:91:24:21:9a:ba:57:02:89:04:05:6d:3c:
72:51:6b:a6:2c:c1:a0:72:97:49:43:22:b9:82:ae:b8:08:02:
31:00:ee:9b:c1:1f:da:f6:fe:a5:27:aa:b5:65:ff:81:9f:6e:
69:04:af:af:b2:ab:30:0e:7a:26:79:bd:e1:e2:94:78:7a:c5:
78:13:06:96:0c:81:bd:fb:3b:13:f4:6a:f9:4b
3,789,345 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,765,608 >>> mbox cmd response: success
6,778,633 UART:
6,778,649 UART: Running Caliptra FMC ...
6,779,057 UART:
6,779,111 UART: [state] CFI Enabled
6,867,786 UART: [art] Extend RT PCRs Done
6,868,214 UART: [art] Lock RT PCRs Done
6,869,635 UART: [art] Populate DV Done
6,877,927 UART: [fht] FMC Alias Private Key: 7
6,878,857 UART: [art] Derive CDI
6,879,137 UART: [art] Store in in slot 0x4
6,964,756 UART: [art] Derive Key Pair
6,965,116 UART: [art] Store priv key in slot 0x5
6,978,932 UART: [art] Derive Key Pair - Done
6,993,587 UART: [art] Signing Cert with AUTHO
6,994,067 UART: RITY.KEYID = 7
7,009,653 UART: [art] Erasing AUTHORITY.KEYID = 7
7,010,418 UART: [art] PUB.X = D269711E9539D2852FEE8EC601892CBF9A19997B91E67D26F6A5C8F55B69CE2FB9DDF20AE3413AFC87FFED41D8041BE9
7,017,195 UART: [art] PUB.Y = 5A741842F1AA264947DB7D0A202DD7DA9637A345F9B18BF48BF59E9235C2511F2BBF78CE6E5690109947C756603762B8
7,024,140 UART: [art] SIG.R = 299FFEB95C3634582AF8792DE0F80EBD2B08DF82BB4E1384D35DD3EC4897E27D1556CD40F21154FB23A727B484E78FBE
7,030,916 UART: [art] SIG.S = F9EED6A3CCC81E19B7EF69CEAC1BC918B906B03A033C74E7A12DEE49A4AD9EBE2B24C58E275D2CDEF135CAB9208F0178
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:72:f9:e9:6d:e5:11:62:cc:7b:3b:58:37:88:b5:c4:db:80:e2:2b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8172F9E96DE51162CC7B3B583788B5C4DB80E22B4BB4EE087DAF785913A30B17
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d2:69:71:1e:95:39:d2:85:2f:ee:8e:c6:01:89:
2c:bf:9a:19:99:7b:91:e6:7d:26:f6:a5:c8:f5:5b:
69:ce:2f:b9:dd:f2:0a:e3:41:3a:fc:87:ff:ed:41:
d8:04:1b:e9:5a:74:18:42:f1:aa:26:49:47:db:7d:
0a:20:2d:d7:da:96:37:a3:45:f9:b1:8b:f4:8b:f5:
9e:92:35:c2:51:1f:2b:bf:78:ce:6e:56:90:10:99:
47:c7:56:60:37:62:b8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
81:72:F9:E9:6D:E5:11:62:CC:7B:3B:58:37:88:B5:C4:DB:80:E2:2B
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:9f:fe:b9:5c:36:34:58:2a:f8:79:2d:e0:f8:
0e:bd:2b:08:df:82:bb:4e:13:84:d3:5d:d3:ec:48:97:e2:7d:
15:56:cd:40:f2:11:54:fb:23:a7:27:b4:84:e7:8f:be:02:31:
00:f9:ee:d6:a3:cc:c8:1e:19:b7:ef:69:ce:ac:1b:c9:18:b9:
06:b0:3a:03:3c:74:e7:a1:2d:ee:49:a4:ad:9e:be:2b:24:c5:
8e:27:5d:2c:de:f1:35:ca:b9:20:8f:01:78
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.11s
Truncated 5301 bytes from beginning
next_pc=40005400
3,889,661 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,929,609 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,957 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
35:c4:6b:36:44:0b:1b:b4:1f:f4:5c:f7:24:75:84:4a:57:0a:16:5b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B1C46B36440B1BB41FF45CF72475844A570A165B2F31B04FC9D20ABBF6BE8705
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8e:15:2a:f6:e7:21:a3:26:76:68:28:bd:35:67:
07:a4:84:4d:0b:9f:9a:8c:52:fe:c8:1d:92:da:1f:
30:09:af:4a:9f:8f:ad:17:3f:38:89:38:d6:6e:b4:
b6:49:73:47:dd:cc:8d:35:a8:72:bc:7a:b4:e6:62:
43:3d:37:04:00:ec:b6:e5:f0:f4:a4:42:fd:d8:98:
4a:f0:f0:9c:d8:69:7f:8e:e9:11:8d:fc:5d:88:d1:
b1:8c:d3:f1:f3:e3:a5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
B1:C4:6B:36:44:0B:1B:B4:1F:F4:5C:F7:24:75:84:4A:57:0A:16:5B
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e7:74:8a:39:ab:93:69:28:da:94:35:4e:49:
eb:4c:4d:5a:55:f2:18:6c:d3:f1:ac:62:ec:2d:38:2f:3d:99:
84:20:d7:6d:57:d7:1b:20:ae:61:7a:6b:f4:60:be:ee:d1:02:
31:00:a9:ee:7c:cd:16:96:0e:4c:a3:e9:8a:93:3b:d7:bb:b1:
03:87:bf:58:b3:90:09:f7:c5:83:42:0e:b6:c0:58:6e:04:ae:
87:87:22:85:80:ac:e4:27:4d:82:d8:89:56:dd
3,981,947 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,982,743 UART:
3,982,759 UART: Running Caliptra ROM ...
3,983,167 UART:
3,983,309 UART: [state] CFI Enabled
3,985,892 UART: [state] LifecycleState = Production
3,986,500 UART: [state] DebugLocked = Yes
3,987,206 UART: [state] Starting the WD Timer 40000000 cycles
3,988,880 UART: [kat] SHA2-256
4,792,430 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,796,559 UART: [kat] ++
4,796,711 UART: [kat] sha1
4,800,867 UART: [kat] SHA2-256
4,802,807 UART: [kat] SHA2-384
4,805,570 UART: [kat] SHA2-512-ACC
4,807,470 UART: [kat] ECC-384
4,817,373 UART: [kat] HMAC-384Kdf
4,821,873 UART: [kat] LMS
5,070,185 UART: [kat] --
5,070,921 UART: [update-reset] ++
6,920,215 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,921,372 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87504
7,067,980 >>> mbox cmd response: success
7,068,266 UART: [update-reset] Copying MAN_2 To MAN_1
7,076,278 UART: [update-reset Success] --
7,077,283 UART: [state] Locking Datavault
7,078,117 UART: [state] Locking PCR0, PCR1 and PCR31
7,078,721 UART: [state] Locking ICCM
7,079,311 UART: [exit] Launching FMC @ 0x40000130
7,084,640 UART:
7,084,656 UART: Running Caliptra FMC ...
7,085,064 UART:
7,085,207 UART: [state] CFI Enabled
7,174,564 UART: [art] Extend RT PCRs Done
7,174,992 UART: [art] Lock RT PCRs Done
7,176,179 UART: [art] Populate DV Done
7,184,719 UART: [fht] FMC Alias Private Key: 7
7,185,759 UART: [art] Derive CDI
7,186,039 UART: [art] Store in in slot 0x4
7,271,566 UART: [art] Derive Key Pair
7,271,926 UART: [art] Store priv key in slot 0x5
7,285,152 UART: [art] Derive Key Pair - Done
7,300,295 UART: [art] Signing Cert with AUTHO
7,300,775 UART: RITY.KEYID = 7
7,316,627 UART: [art] Erasing AUTHORITY.KEYID = 7
7,317,392 UART: [art] PUB.X = DCA84F8A224451599D8E8A1491DC069968339B3994EDBBF9B2D27662FBFB9D25761B0747785140B28D19606971EBC230
7,324,152 UART: [art] PUB.Y = 29EE0D3EFB567663771E8276489976D86A06345E180CFEA3CAD2526047E523973CB9B10AF3897A915E33F597FAE2E787
7,331,088 UART: [art] SIG.R = 8E2330EBAAA6C795C05AD076566105204A8324BFF2ED596CFAF624084EEB6BE345A8303D8F9C30B0B27CDC97C2601E5C
7,337,864 UART: [art] SIG.S = 71223DB24A02256B0261722E450617347BA854B48C3B016C93CF6DE3B5BDA976E49879A612F1B05378509F4D4C2D825C
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:1f:0e:f6:bc:47:37:93:e9:5b:e1:70:a9:15:31:db:e3:76:7a:ff
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D71F0EF6BC473793E95BE170A91531DBE3767AFF7316F73FF471BB5094BE5593
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:dc:a8:4f:8a:22:44:51:59:9d:8e:8a:14:91:dc:
06:99:68:33:9b:39:94:ed:bb:f9:b2:d2:76:62:fb:
fb:9d:25:76:1b:07:47:78:51:40:b2:8d:19:60:69:
71:eb:c2:30:29:ee:0d:3e:fb:56:76:63:77:1e:82:
76:48:99:76:d8:6a:06:34:5e:18:0c:fe:a3:ca:d2:
52:60:47:e5:23:97:3c:b9:b1:0a:f3:89:7a:91:5e:
33:f5:97:fa:e2:e7:87
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
D7:1F:0E:F6:BC:47:37:93:E9:5B:E1:70:A9:15:31:DB:E3:76:7A:FF
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:8e:23:30:eb:aa:a6:c7:95:c0:5a:d0:76:56:
61:05:20:4a:83:24:bf:f2:ed:59:6c:fa:f6:24:08:4e:eb:6b:
e3:45:a8:30:3d:8f:9c:30:b0:b2:7c:dc:97:c2:60:1e:5c:02:
30:71:22:3d:b2:4a:02:25:6b:02:61:72:2e:45:06:17:34:7b:
a8:54:b4:8c:3b:01:6c:93:cf:6d:e3:b5:bd:a9:76:e4:98:79:
a6:12:f1:b0:53:78:50:9f:4d:4c:2d:82:5c
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.31s
Truncated 845 bytes from beginning
388,690 UART: [art] Lock RT PCRs Done
3,390,230 UART: [art] Populate DV Done
3,398,466 UART: [fht] FMC Alias Private Key: 7
3,399,466 UART: [art] Derive CDI
3,399,746 UART: [art] Store in in slot 0x4
3,485,537 UART: [art] Derive Key Pair
3,485,897 UART: [art] Store priv key in slot 0x5
3,499,435 UART: [art] Derive Key Pair - Done
3,514,178 UART: [art] Signing Cert with AUTHO
3,514,658 UART: RITY.KEYID = 7
3,530,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,530,961 UART: [art] PUB.X = C7F2EB245F4D7C6A88BF9F69AE3E9EAAF4610F51339B36BF91EE3FEE0742B79B71A9CD8588A65E415D5D820AA575A677
3,537,738 UART: [art] PUB.Y = EA97EB28CB732D9CAB13EF4445568DBF9D962B6C198DD0B9E619E723006CDBA6CAD04AB67921AA8F4112DF440DD4811E
3,544,681 UART: [art] SIG.R = 87A589140C829C7732C8D4DECECE54D6EDAE3630E5A2F916C5309C93CB3FE3D3CB8DFEB4FE31BE99508B60C602D9A95C
3,551,465 UART: [art] SIG.S = 35F86A15608CCF82C2791DF1391AD93A30E271A6344C928C25E6BA55A033322B5E040957541A38490B6214EE936DAA67
3,575,151 UART: Caliptra RT
3,575,496 UART: [state] CFI Enabled
3,683,595 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,258 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,832 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,795,290 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [09, f4, 30, 38, ae, ba, d0, d2, c4, f7, 65, bd, b3, cd, 8f, 05, cd, 74, c9, 2e, 32, 9b, ea, 79, e7, df, ac, fe, e4, 5b, 8a, 0d, e2, f2, a4, 47, b2, c5, f4, 76, 28, e8, 8e, 99, 44, bf, c7, 24]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
35:7f:9c:05:03:ee:68:93:83:a4:5d:e7:09:c5:ec:b5:33:0c:29:80
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=357F9C0503EE689383A45DE709C5ECB5330C2980C001559244B084106F4979BF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c7:f2:eb:24:5f:4d:7c:6a:88:bf:9f:69:ae:3e:
9e:aa:f4:61:0f:51:33:9b:36:bf:91:ee:3f:ee:07:
42:b7:9b:71:a9:cd:85:88:a6:5e:41:5d:5d:82:0a:
a5:75:a6:77:ea:97:eb:28:cb:73:2d:9c:ab:13:ef:
44:45:56:8d:bf:9d:96:2b:6c:19:8d:d0:b9:e6:19:
e7:23:00:6c:db:a6:ca:d0:4a:b6:79:21:aa:8f:41:
12:df:44:0d:d4:81:1e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....080.......e........t.y..2.....[.G...v......($..D..RT_INFO
X509v3 Subject Key Identifier:
35:7F:9C:05:03:EE:68:93:83:A4:5D:E7:09:C5:EC:B5:33:0C:29:80
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:87:a5:89:14:0c:82:9c:77:32:c8:d4:de:ce:
ce:54:d6:ed:ae:36:30:e5:a2:f9:16:c5:30:9c:93:cb:3f:e3:
d3:cb:8d:fe:b4:fe:31:be:99:50:8b:60:c6:02:d9:a9:5c:02:
30:35:f8:6a:15:60:8c:cf:82:c2:79:1d:f1:39:1a:d9:3a:30:
e2:71:a6:34:4c:92:8c:25:e6:ba:55:a0:33:32:2b:5e:04:09:
57:54:1a:38:49:0b:62:14:ee:93:6d:aa:67
3,806,037 <<< Executing mbox cmd 0x46574c44 (112188 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,780,222 >>> mbox cmd response: success
6,793,505 UART:
6,793,521 UART: Running Caliptra FMC ...
6,793,929 UART:
6,794,072 UART: [state] CFI Enabled
6,883,577 UART: [art] Extend RT PCRs Done
6,884,005 UART: [art] Lock RT PCRs Done
6,885,254 UART: [art] Populate DV Done
6,893,434 UART: [fht] FMC Alias Private Key: 7
6,894,402 UART: [art] Derive CDI
6,894,682 UART: [art] Store in in slot 0x4
6,980,291 UART: [art] Derive Key Pair
6,980,651 UART: [art] Store priv key in slot 0x5
6,993,901 UART: [art] Derive Key Pair - Done
7,008,744 UART: [art] Signing Cert with AUTHO
7,009,224 UART: RITY.KEYID = 7
7,024,158 UART: [art] Erasing AUTHORITY.KEYID = 7
7,024,923 UART: [art] PUB.X = 149693D5E4B79931702E99B050375C2B37497D404049F82FBAA9787B6623B1F0C76CEF9516C144C25FDB23FB827B4B61
7,031,689 UART: [art] PUB.Y = C1B05385CDDC9C5B20B9523C04F3C69404F1F4DABCED88CFA6FD9831F8FEC96C0A8E7CD9837CC59E2E0256D33FDD3C93
7,038,651 UART: [art] SIG.R = 4EBFA50A902B917A65CE38091D79DC236C4CE21C83BC531F597CE342C8DE37B770B5F6723697F3F8677DB89646622687
7,045,415 UART: [art] SIG.S = 52B81FF07DF9C9E71C065857BA522F7CCB7D85071207E9D939F139E94A22E6BD85F9FD1024118AB3E917B0799A818BBF
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
64:58:4f:61:79:39:32:d9:d2:1b:6d:2d:a8:66:75:04:e5:d5:2e:89
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E0584F61793932D9D21B6D2DA8667504E5D52E89AA752790B006E09D155453A9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:14:96:93:d5:e4:b7:99:31:70:2e:99:b0:50:37:
5c:2b:37:49:7d:40:40:49:f8:2f:ba:a9:78:7b:66:
23:b1:f0:c7:6c:ef:95:16:c1:44:c2:5f:db:23:fb:
82:7b:4b:61:c1:b0:53:85:cd:dc:9c:5b:20:b9:52:
3c:04:f3:c6:94:04:f1:f4:da:bc:ed:88:cf:a6:fd:
98:31:f8:fe:c9:6c:0a:8e:7c:d9:83:7c:c5:9e:2e:
02:56:d3:3f:dd:3c:93
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.O...*.CT....u....:E.K^.........
V........,+$8o...RT_INFO
X509v3 Subject Key Identifier:
E0:58:4F:61:79:39:32:D9:D2:1B:6D:2D:A8:66:75:04:E5:D5:2E:89
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:4e:bf:a5:0a:90:2b:91:7a:65:ce:38:09:1d:79:
dc:23:6c:4c:e2:1c:83:bc:53:1f:59:7c:e3:42:c8:de:37:b7:
70:b5:f6:72:36:97:f3:f8:67:7d:b8:96:46:62:26:87:02:30:
52:b8:1f:f0:7d:f9:c9:e7:1c:06:58:57:ba:52:2f:7c:cb:7d:
85:07:12:07:e9:d9:39:f1:39:e9:4a:22:e6:bd:85:f9:fd:10:
24:11:8a:b3:e9:17:b0:79:9a:81:8b:bf
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,378 UART:
192,748 UART: Running Caliptra ROM ...
193,826 UART:
193,967 UART: [state] CFI Enabled
263,722 UART: [state] LifecycleState = Unprovisioned
265,670 UART: [state] DebugLocked = No
267,398 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,459 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
420,073 UART: [kat] SHA2-256
442,025 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,536 UART: [kat] ++
452,992 UART: [kat] sha1
463,163 UART: [kat] SHA2-256
465,846 UART: [kat] SHA2-384
470,955 UART: [kat] SHA2-512-ACC
473,297 UART: [kat] ECC-384
2,768,839 UART: [kat] HMAC-384Kdf
2,801,065 UART: [kat] LMS
3,991,388 UART: [kat] --
3,994,596 UART: [cold-reset] ++
3,996,535 UART: [fht] Storing FHT @ 0x50003400
4,007,145 UART: [idev] ++
4,007,712 UART: [idev] CDI.KEYID = 6
4,008,620 UART: [idev] SUBJECT.KEYID = 7
4,009,888 UART: [idev] UDS.KEYID = 0
4,035,185 UART: [idev] Erasing UDS.KEYID = 0
7,344,882 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,146 UART: [idev] --
7,372,461 UART: [ldev] ++
7,373,023 UART: [ldev] CDI.KEYID = 6
7,373,962 UART: [ldev] SUBJECT.KEYID = 5
7,375,170 UART: [ldev] AUTHORITY.KEYID = 7
7,376,454 UART: [ldev] FE.KEYID = 1
7,424,348 UART: [ldev] Erasing FE.KEYID = 1
10,754,519 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,930 UART: [ldev] --
13,117,907 UART: [fwproc] Waiting for Commands...
13,121,245 UART: [fwproc] Received command 0x46574c44
13,123,427 UART: [fwproc] Received Image of size 114124 bytes
17,169,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,262 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,631,712 >>> mbox cmd response: success
17,636,487 UART: [afmc] ++
17,637,074 UART: [afmc] CDI.KEYID = 6
17,637,963 UART: [afmc] SUBJECT.KEYID = 7
17,639,231 UART: [afmc] AUTHORITY.KEYID = 5
21,007,425 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,312,555 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,314,811 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,329,233 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,344,063 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,358,467 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,381,308 UART: [afmc] --
23,385,167 UART: [cold-reset] --
23,388,059 UART: [state] Locking Datavault
23,391,849 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,596 UART: [state] Locking ICCM
23,395,587 UART: [exit] Launching FMC @ 0x40000130
23,403,981 UART:
23,404,213 UART: Running Caliptra FMC ...
23,405,310 UART:
23,405,460 UART: [state] CFI Enabled
23,470,043 UART: [fht] FMC Alias Private Key: 7
25,808,183 UART: [art] Extend RT PCRs Done
25,809,405 UART: [art] Lock RT PCRs Done
25,811,024 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
191,857 UART:
192,210 UART: Running Caliptra ROM ...
193,349 UART:
193,492 UART: [state] CFI Enabled
261,425 UART: [state] LifecycleState = Unprovisioned
263,330 UART: [state] DebugLocked = Yes
265,180 UART: [state] Starting the Watchdog Timer 25539885 cycles
270,410 UART: [kat] SHA2-256
440,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,701 UART: [kat] ++
451,275 UART: [kat] sha1
461,301 UART: [kat] SHA2-256
463,949 UART: [kat] SHA2-384
469,077 UART: [kat] SHA2-512-ACC
471,450 UART: [kat] ECC-384
2,765,896 UART: [kat] HMAC-384Kdf
2,797,384 UART: [kat] LMS
3,987,731 UART: [kat] --
3,990,901 UART: [cold-reset] ++
3,992,840 UART: [fht] Storing FHT @ 0x50003400
4,003,411 UART: [idev] ++
4,004,051 UART: [idev] CDI.KEYID = 6
4,004,964 UART: [idev] SUBJECT.KEYID = 7
4,006,210 UART: [idev] UDS.KEYID = 0
4,007,133 ready_for_fw is high
4,007,328 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,150,890 UART: [idev] Erasing UDS.KEYID = 0
7,342,016 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,291 UART: [idev] --
7,369,609 UART: [ldev] ++
7,370,176 UART: [ldev] CDI.KEYID = 6
7,371,108 UART: [ldev] SUBJECT.KEYID = 5
7,372,370 UART: [ldev] AUTHORITY.KEYID = 7
7,373,521 UART: [ldev] FE.KEYID = 1
7,420,220 UART: [ldev] Erasing FE.KEYID = 1
10,750,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,612 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,061,126 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,075,816 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,090,127 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,109,709 UART: [ldev] --
13,113,671 UART: [fwproc] Waiting for Commands...
13,117,008 UART: [fwproc] Received command 0x46574c44
13,119,186 UART: [fwproc] Received Image of size 114124 bytes
17,165,551 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,025 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,934 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,627,472 >>> mbox cmd response: success
17,632,261 UART: [afmc] ++
17,632,857 UART: [afmc] CDI.KEYID = 6
17,633,796 UART: [afmc] SUBJECT.KEYID = 7
17,635,010 UART: [afmc] AUTHORITY.KEYID = 5
20,995,529 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,300,596 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,302,852 UART: [afmc] PUB.X = 11A9D987A8612B9A1E6CF332FEAA44682CEC1A8997B78C2C894D3037B573BDDF0ED0421E939753382648BFB0DDF5ED68
23,317,370 UART: [afmc] PUB.Y = 6A09E7024ED0376A9DEB2A80F1C6253B4C261F9CF4DAF02D838FE7C16A02E91E43C4DE0E42A02F28C6766A7F38F19B8F
23,332,144 UART: [afmc] SIG.R = 9FC17C871FD5D2A0EC7A3D3EE39653E088E649393624126F616BBA05333DA8363D3806D8FB54EFAAC6E0108F91DA7002
23,346,422 UART: [afmc] SIG.S = 4BF7A07E9CA28D2B285EADBC82C90784D59A357DAEABD5018ABF36A9030EB929903FF1FF786503001F0B621D4217F977
23,369,382 UART: [afmc] --
23,373,247 UART: [cold-reset] --
23,376,136 UART: [state] Locking Datavault
23,379,931 UART: [state] Locking PCR0, PCR1 and PCR31
23,381,671 UART: [state] Locking ICCM
23,383,671 UART: [exit] Launching FMC @ 0x40000130
23,392,065 UART:
23,392,308 UART: Running Caliptra FMC ...
23,393,410 UART:
23,393,566 UART: [state] CFI Enabled
23,457,668 UART: [fht] FMC Alias Private Key: 7
25,795,766 UART: [art] Extend RT PCRs Done
25,796,991 UART: [art] Lock RT PCRs Done
25,798,645 UART: [art] Populate DV Done
25,804,053 UART: [fht] FMC Alias Private Key: 7
25,805,652 UART: [art] Derive CDI
25,806,462 UART: [art] Store in in slot 0x4
25,809,199 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400040D4error_internal_intr_r=00000040
25,812,669 UART: WDT Expired
25,813,220 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,447 writing to cptra_bootfsm_go
268,622 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,867,806 >>> mbox cmd response: success
23,570,277 UART:
23,570,684 UART: Running Caliptra FMC ...
23,571,833 UART:
23,571,994 UART: [state] CFI Enabled
23,639,347 UART: [fht] FMC Alias Private Key: 7
25,977,438 UART: [art] Extend RT PCRs Done
25,978,664 UART: [art] Lock RT PCRs Done
25,980,294 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,800,802 ready_for_fw is high
3,801,216 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,865,260 >>> mbox cmd response: success
23,566,086 UART:
23,566,510 UART: Running Caliptra FMC ...
23,567,635 UART:
23,567,786 UART: [state] CFI Enabled
23,635,189 UART: [fht] FMC Alias Private Key: 7
25,973,158 UART: [art] Extend RT PCRs Done
25,974,391 UART: [art] Lock RT PCRs Done
25,975,994 UART: [art] Populate DV Done
25,979,682 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000407Eerror_internal_intr_r=00000040
25,983,166 UART: WDT Expired
25,983,716 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,432 UART:
192,791 UART: Running Caliptra ROM ...
193,948 UART:
603,515 UART: [state] CFI Enabled
620,872 UART: [state] LifecycleState = Unprovisioned
622,758 UART: [state] DebugLocked = No
625,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
635,464 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
778,888 UART: [kat] SHA2-256
800,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,964 UART: [kat] ++
811,499 UART: [kat] sha1
822,112 UART: [kat] SHA2-256
824,786 UART: [kat] SHA2-384
830,379 UART: [kat] SHA2-512-ACC
832,711 UART: [kat] ECC-384
3,118,121 UART: [kat] HMAC-384Kdf
3,130,140 UART: [kat] LMS
4,320,238 UART: [kat] --
4,324,226 UART: [cold-reset] ++
4,325,836 UART: [fht] Storing FHT @ 0x50003400
4,336,720 UART: [idev] ++
4,337,287 UART: [idev] CDI.KEYID = 6
4,338,255 UART: [idev] SUBJECT.KEYID = 7
4,339,461 UART: [idev] UDS.KEYID = 0
4,355,233 UART: [idev] Erasing UDS.KEYID = 0
7,628,192 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,011 UART: [idev] --
7,654,222 UART: [ldev] ++
7,654,790 UART: [ldev] CDI.KEYID = 6
7,655,753 UART: [ldev] SUBJECT.KEYID = 5
7,656,963 UART: [ldev] AUTHORITY.KEYID = 7
7,658,192 UART: [ldev] FE.KEYID = 1
7,670,074 UART: [ldev] Erasing FE.KEYID = 1
10,956,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,230 UART: [ldev] --
13,316,330 UART: [fwproc] Waiting for Commands...
13,318,800 UART: [fwproc] Received command 0x46574c44
13,321,038 UART: [fwproc] Received Image of size 114124 bytes
17,362,734 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,227 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,086 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,278 >>> mbox cmd response: success
17,828,136 UART: [afmc] ++
17,828,771 UART: [afmc] CDI.KEYID = 6
17,829,677 UART: [afmc] SUBJECT.KEYID = 7
17,830,889 UART: [afmc] AUTHORITY.KEYID = 5
21,148,141 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,789 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,041 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,423 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,270 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,674 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,632 UART: [afmc] --
23,514,009 UART: [cold-reset] --
23,518,558 UART: [state] Locking Datavault
23,523,802 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,559 UART: [state] Locking ICCM
23,527,869 UART: [exit] Launching FMC @ 0x40000130
23,536,260 UART:
23,536,487 UART: Running Caliptra FMC ...
23,537,582 UART:
23,537,740 UART: [state] CFI Enabled
23,545,937 UART: [fht] FMC Alias Private Key: 7
25,876,845 UART: [art] Extend RT PCRs Done
25,878,071 UART: [art] Lock RT PCRs Done
25,879,615 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
191,839 UART:
192,175 UART: Running Caliptra ROM ...
193,340 UART:
603,038 UART: [state] CFI Enabled
620,319 UART: [state] LifecycleState = Unprovisioned
622,237 UART: [state] DebugLocked = Yes
625,283 UART: [state] Starting the Watchdog Timer 25250080 cycles
630,596 UART: [kat] SHA2-256
800,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,906 UART: [kat] ++
811,474 UART: [kat] sha1
822,063 UART: [kat] SHA2-256
824,791 UART: [kat] SHA2-384
830,346 UART: [kat] SHA2-512-ACC
832,705 UART: [kat] ECC-384
3,118,073 UART: [kat] HMAC-384Kdf
3,130,161 UART: [kat] LMS
4,320,218 UART: [kat] --
4,324,230 UART: [cold-reset] ++
4,325,819 UART: [fht] Storing FHT @ 0x50003400
4,336,726 UART: [idev] ++
4,337,293 UART: [idev] CDI.KEYID = 6
4,338,246 UART: [idev] SUBJECT.KEYID = 7
4,339,485 UART: [idev] UDS.KEYID = 0
4,340,452 ready_for_fw is high
4,340,653 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,039 UART: [idev] Erasing UDS.KEYID = 0
7,628,213 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,085 UART: [idev] --
7,654,236 UART: [ldev] ++
7,654,799 UART: [ldev] CDI.KEYID = 6
7,655,814 UART: [ldev] SUBJECT.KEYID = 5
7,656,985 UART: [ldev] AUTHORITY.KEYID = 7
7,658,265 UART: [ldev] FE.KEYID = 1
7,670,100 UART: [ldev] Erasing FE.KEYID = 1
10,956,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,075 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,263,613 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,278,301 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,292,657 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,311,001 UART: [ldev] --
13,316,156 UART: [fwproc] Waiting for Commands...
13,318,627 UART: [fwproc] Received command 0x46574c44
13,320,805 UART: [fwproc] Received Image of size 114124 bytes
17,362,489 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,980 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,881 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,823,075 >>> mbox cmd response: success
17,827,971 UART: [afmc] ++
17,828,573 UART: [afmc] CDI.KEYID = 6
17,829,486 UART: [afmc] SUBJECT.KEYID = 7
17,830,690 UART: [afmc] AUTHORITY.KEYID = 5
21,148,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,708 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,955 UART: [afmc] PUB.X = 11A9D987A8612B9A1E6CF332FEAA44682CEC1A8997B78C2C894D3037B573BDDF0ED0421E939753382648BFB0DDF5ED68
23,459,520 UART: [afmc] PUB.Y = 6A09E7024ED0376A9DEB2A80F1C6253B4C261F9CF4DAF02D838FE7C16A02E91E43C4DE0E42A02F28C6766A7F38F19B8F
23,474,298 UART: [afmc] SIG.R = 9FC17C871FD5D2A0EC7A3D3EE39653E088E649393624126F616BBA05333DA8363D3806D8FB54EFAAC6E0108F91DA7002
23,488,633 UART: [afmc] SIG.S = 4BF7A07E9CA28D2B285EADBC82C90784D59A357DAEABD5018ABF36A9030EB929903FF1FF786503001F0B621D4217F977
23,510,616 UART: [afmc] --
23,513,991 UART: [cold-reset] --
23,518,717 UART: [state] Locking Datavault
23,523,778 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,537 UART: [state] Locking ICCM
23,527,896 UART: [exit] Launching FMC @ 0x40000130
23,536,249 UART:
23,536,483 UART: Running Caliptra FMC ...
23,537,581 UART:
23,537,736 UART: [state] CFI Enabled
23,545,992 UART: [fht] FMC Alias Private Key: 7
25,876,888 UART: [art] Extend RT PCRs Done
25,878,131 UART: [art] Lock RT PCRs Done
25,879,461 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
25,882,943 UART: WDT Expired
25,883,500 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
625,813 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,060,783 >>> mbox cmd response: success
23,705,921 UART:
23,706,328 UART: Running Caliptra FMC ...
23,707,430 UART:
23,707,579 UART: [state] CFI Enabled
23,715,627 UART: [fht] FMC Alias Private Key: 7
26,046,451 UART: [art] Extend RT PCRs Done
26,047,692 UART: [art] Lock RT PCRs Done
26,049,205 UART: [art] Populate DV Done
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
4,131,719 ready_for_fw is high
4,132,163 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,061,172 >>> mbox cmd response: success
23,706,326 UART:
23,706,713 UART: Running Caliptra FMC ...
23,707,850 UART:
23,708,010 UART: [state] CFI Enabled
23,716,095 UART: [fht] FMC Alias Private Key: 7
26,046,926 UART: [art] Extend RT PCRs Done
26,048,161 UART: [art] Lock RT PCRs Done
26,049,763 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002678error_internal_intr_r=00000040
26,053,335 UART: WDT Expired
26,053,891 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,541 writing to cptra_bootfsm_go
192,634 UART:
192,995 UART: Running Caliptra ROM ...
194,161 UART:
194,315 UART: [state] CFI Enabled
262,728 UART: [state] LifecycleState = Unprovisioned
264,601 UART: [state] DebugLocked = No
266,252 UART: [state] WD Timer not started. Device not locked for debugging
274,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
418,110 UART: [kat] SHA2-256
449,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,708 UART: [kat] ++
461,240 UART: [kat] sha1
471,361 UART: [kat] SHA2-256
474,422 UART: [kat] SHA2-384
479,799 UART: [kat] SHA2-512-ACC
482,778 UART: [kat] ECC-384
2,947,782 UART: [kat] HMAC-384Kdf
2,971,970 UART: [kat] LMS
3,501,413 UART: [kat] --
3,505,700 UART: [cold-reset] ++
3,507,533 UART: [fht] FHT @ 0x50003400
3,519,163 UART: [idev] ++
3,519,727 UART: [idev] CDI.KEYID = 6
3,520,631 UART: [idev] SUBJECT.KEYID = 7
3,521,843 UART: [idev] UDS.KEYID = 0
3,543,702 UART: [idev] Erasing UDS.KEYID = 0
6,025,612 UART: [idev] Sha1 KeyId Algorithm
6,047,710 UART: [idev] --
6,052,949 UART: [ldev] ++
6,053,520 UART: [ldev] CDI.KEYID = 6
6,054,434 UART: [ldev] SUBJECT.KEYID = 5
6,055,593 UART: [ldev] AUTHORITY.KEYID = 7
6,056,825 UART: [ldev] FE.KEYID = 1
6,099,725 UART: [ldev] Erasing FE.KEYID = 1
8,599,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,716 UART: [ldev] --
10,392,014 UART: [fwproc] Wait for Commands...
10,394,349 UART: [fwproc] Recv command 0x46574c44
10,396,389 UART: [fwproc] Recv'd Img size: 114448 bytes
13,794,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,936,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,253,956 >>> mbox cmd response: success
14,258,383 UART: [afmc] ++
14,258,964 UART: [afmc] CDI.KEYID = 6
14,259,870 UART: [afmc] SUBJECT.KEYID = 7
14,261,085 UART: [afmc] AUTHORITY.KEYID = 5
16,787,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,104 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,524,745 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,540,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,556,601 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,578,819 UART: [afmc] --
18,583,063 UART: [cold-reset] --
18,587,362 UART: [state] Locking Datavault
18,592,714 UART: [state] Locking PCR0, PCR1 and PCR31
18,594,414 UART: [state] Locking ICCM
18,595,426 UART: [exit] Launching FMC @ 0x40000130
18,603,820 UART:
18,604,061 UART: Running Caliptra FMC ...
18,605,163 UART:
18,605,320 UART: [state] CFI Enabled
18,666,445 UART: [fht] FMC Alias Private Key: 7
20,429,998 UART: [art] Extend RT PCRs Done
20,431,221 UART: [art] Lock RT PCRs Done
20,433,087 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
191,595 UART:
191,968 UART: Running Caliptra ROM ...
193,101 UART:
193,249 UART: [state] CFI Enabled
260,980 UART: [state] LifecycleState = Unprovisioned
262,774 UART: [state] DebugLocked = Yes
264,591 UART: [state] Starting the WD Timer 20164216 cycles
269,476 UART: [kat] SHA2-256
448,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,219 UART: [kat] ++
460,792 UART: [kat] sha1
470,888 UART: [kat] SHA2-256
473,886 UART: [kat] SHA2-384
479,299 UART: [kat] SHA2-512-ACC
482,302 UART: [kat] ECC-384
2,945,963 UART: [kat] HMAC-384Kdf
2,969,142 UART: [kat] LMS
3,498,565 UART: [kat] --
3,502,868 UART: [cold-reset] ++
3,504,726 UART: [fht] FHT @ 0x50003400
3,516,334 UART: [idev] ++
3,516,896 UART: [idev] CDI.KEYID = 6
3,517,773 UART: [idev] SUBJECT.KEYID = 7
3,519,012 UART: [idev] UDS.KEYID = 0
3,519,910 ready_for_fw is high
3,520,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,020 UART: [idev] Erasing UDS.KEYID = 0
6,023,898 UART: [idev] Sha1 KeyId Algorithm
6,046,046 UART: [idev] --
6,051,225 UART: [ldev] ++
6,051,793 UART: [ldev] CDI.KEYID = 6
6,052,696 UART: [ldev] SUBJECT.KEYID = 5
6,053,911 UART: [ldev] AUTHORITY.KEYID = 7
6,055,144 UART: [ldev] FE.KEYID = 1
6,098,733 UART: [ldev] Erasing FE.KEYID = 1
8,598,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,424 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,334,406 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,350,245 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,366,217 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,386,448 UART: [ldev] --
10,390,788 UART: [fwproc] Wait for Commands...
10,393,036 UART: [fwproc] Recv command 0x46574c44
10,395,132 UART: [fwproc] Recv'd Img size: 114448 bytes
13,792,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,934,936 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,252,706 >>> mbox cmd response: success
14,257,136 UART: [afmc] ++
14,257,735 UART: [afmc] CDI.KEYID = 6
14,258,647 UART: [afmc] SUBJECT.KEYID = 7
14,259,805 UART: [afmc] AUTHORITY.KEYID = 5
16,798,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,518,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,519,958 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,536,135 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,551,964 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,567,731 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,590,027 UART: [afmc] --
18,594,318 UART: [cold-reset] --
18,598,618 UART: [state] Locking Datavault
18,603,971 UART: [state] Locking PCR0, PCR1 and PCR31
18,605,669 UART: [state] Locking ICCM
18,606,649 UART: [exit] Launching FMC @ 0x40000130
18,615,044 UART:
18,615,289 UART: Running Caliptra FMC ...
18,616,386 UART:
18,616,550 UART: [state] CFI Enabled
18,678,055 UART: [fht] FMC Alias Private Key: 7
20,432,590 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400029B2error_internal_intr_r=00000040
20,436,152 UART: WDT Expired
20,436,719 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,557 writing to cptra_bootfsm_go
268,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,041,231 >>> mbox cmd response: success
18,327,349 UART:
18,327,760 UART: Running Caliptra FMC ...
18,328,891 UART:
18,329,054 UART: [state] CFI Enabled
18,396,787 UART: [fht] FMC Alias Private Key: 7
20,160,380 UART: [art] Extend RT PCRs Done
20,161,647 UART: [art] Lock RT PCRs Done
20,163,417 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,358,954 ready_for_fw is high
3,359,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,018,470 >>> mbox cmd response: success
18,298,282 UART:
18,298,688 UART: Running Caliptra FMC ...
18,299,842 UART:
18,300,008 UART: [state] CFI Enabled
18,368,732 UART: [fht] FMC Alias Private Key: 7
20,132,210 UART: [art] Extend RT PCRs Done
20,133,453 UART: [art] Lock RT PCRs Done
20,135,268 UART: [art] Populate DV Done
20,140,731 UART: [fht] FMC Alias Private Key: 7
20,142,270 UART: [art] Derive CDI
20,143,032 UART: [art] Store in in slot 0x4
20,164,135 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400029B8error_internal_intr_r=00000040
20,167,689 UART: WDT Expired
20,168,252 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,743 writing to cptra_bootfsm_go
192,824 UART:
193,183 UART: Running Caliptra ROM ...
194,302 UART:
604,125 UART: [state] CFI Enabled
620,981 UART: [state] LifecycleState = Unprovisioned
622,860 UART: [state] DebugLocked = No
625,704 UART: [state] WD Timer not started. Device not locked for debugging
633,704 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
777,646 UART: [kat] SHA2-256
808,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,215 UART: [kat] ++
820,744 UART: [kat] sha1
831,409 UART: [kat] SHA2-256
834,466 UART: [kat] SHA2-384
840,275 UART: [kat] SHA2-512-ACC
843,260 UART: [kat] ECC-384
3,285,706 UART: [kat] HMAC-384Kdf
3,298,377 UART: [kat] LMS
3,827,880 UART: [kat] --
3,831,993 UART: [cold-reset] ++
3,833,496 UART: [fht] FHT @ 0x50003400
3,845,774 UART: [idev] ++
3,846,343 UART: [idev] CDI.KEYID = 6
3,847,256 UART: [idev] SUBJECT.KEYID = 7
3,848,469 UART: [idev] UDS.KEYID = 0
3,862,352 UART: [idev] Erasing UDS.KEYID = 0
6,321,556 UART: [idev] Sha1 KeyId Algorithm
6,344,923 UART: [idev] --
6,349,297 UART: [ldev] ++
6,349,867 UART: [ldev] CDI.KEYID = 6
6,350,786 UART: [ldev] SUBJECT.KEYID = 5
6,352,002 UART: [ldev] AUTHORITY.KEYID = 7
6,353,247 UART: [ldev] FE.KEYID = 1
6,363,897 UART: [ldev] Erasing FE.KEYID = 1
8,835,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,753 UART: [ldev] --
10,625,928 UART: [fwproc] Wait for Commands...
10,627,510 UART: [fwproc] Recv command 0x46574c44
10,629,564 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,081 >>> mbox cmd response: success
14,486,505 UART: [afmc] ++
14,487,096 UART: [afmc] CDI.KEYID = 6
14,488,008 UART: [afmc] SUBJECT.KEYID = 7
14,489,169 UART: [afmc] AUTHORITY.KEYID = 5
16,992,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,202 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,070 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,851 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,863 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,720 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,748 UART: [afmc] --
18,788,594 UART: [cold-reset] --
18,793,807 UART: [state] Locking Datavault
18,800,243 UART: [state] Locking PCR0, PCR1 and PCR31
18,801,894 UART: [state] Locking ICCM
18,803,287 UART: [exit] Launching FMC @ 0x40000130
18,811,683 UART:
18,811,917 UART: Running Caliptra FMC ...
18,813,018 UART:
18,813,178 UART: [state] CFI Enabled
18,821,278 UART: [fht] FMC Alias Private Key: 7
20,577,580 UART: [art] Extend RT PCRs Done
20,578,779 UART: [art] Lock RT PCRs Done
20,580,457 UART: [art] Populate DV Done
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
191,829 UART:
192,709 UART: Running Caliptra ROM ...
193,845 UART:
603,067 UART: [state] CFI Enabled
619,903 UART: [state] LifecycleState = Unprovisioned
621,885 UART: [state] DebugLocked = Yes
624,717 UART: [state] Starting the WD Timer 19952073 cycles
629,674 UART: [kat] SHA2-256
808,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,366 UART: [kat] ++
820,951 UART: [kat] sha1
831,630 UART: [kat] SHA2-256
834,634 UART: [kat] SHA2-384
840,488 UART: [kat] SHA2-512-ACC
843,428 UART: [kat] ECC-384
3,285,888 UART: [kat] HMAC-384Kdf
3,298,623 UART: [kat] LMS
3,828,089 UART: [kat] --
3,832,237 UART: [cold-reset] ++
3,833,672 UART: [fht] FHT @ 0x50003400
3,845,995 UART: [idev] ++
3,846,563 UART: [idev] CDI.KEYID = 6
3,847,472 UART: [idev] SUBJECT.KEYID = 7
3,848,643 UART: [idev] UDS.KEYID = 0
3,849,637 ready_for_fw is high
3,849,866 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,994,286 UART: [idev] Erasing UDS.KEYID = 0
6,321,832 UART: [idev] Sha1 KeyId Algorithm
6,345,210 UART: [idev] --
6,349,569 UART: [ldev] ++
6,350,159 UART: [ldev] CDI.KEYID = 6
6,351,090 UART: [ldev] SUBJECT.KEYID = 5
6,352,252 UART: [ldev] AUTHORITY.KEYID = 7
6,353,535 UART: [ldev] FE.KEYID = 1
6,364,179 UART: [ldev] Erasing FE.KEYID = 1
8,835,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,399 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,569,391 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,585,255 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,601,172 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,621,190 UART: [ldev] --
10,626,339 UART: [fwproc] Wait for Commands...
10,627,892 UART: [fwproc] Recv command 0x46574c44
10,629,979 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,483,520 >>> mbox cmd response: success
14,486,979 UART: [afmc] ++
14,487,582 UART: [afmc] CDI.KEYID = 6
14,488,492 UART: [afmc] SUBJECT.KEYID = 7
14,489,654 UART: [afmc] AUTHORITY.KEYID = 5
16,992,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,416 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,731,585 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,747,460 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,763,246 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,786,308 UART: [afmc] --
18,789,197 UART: [cold-reset] --
18,794,412 UART: [state] Locking Datavault
18,800,845 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,484 UART: [state] Locking ICCM
18,803,873 UART: [exit] Launching FMC @ 0x40000130
18,812,279 UART:
18,812,515 UART: Running Caliptra FMC ...
18,813,536 UART:
18,813,682 UART: [state] CFI Enabled
18,821,889 UART: [fht] FMC Alias Private Key: 7
20,578,232 UART: [art] Extend RT PCRs Done
20,579,459 UART: [art] Lock RT PCRs Done
20,580,568 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026D4error_internal_intr_r=00000040
20,584,248 UART: WDT Expired
20,584,816 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,973 writing to cptra_bootfsm_go
626,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,360 >>> mbox cmd response: success
18,519,375 UART:
18,519,785 UART: Running Caliptra FMC ...
18,520,896 UART:
18,521,049 UART: [state] CFI Enabled
18,528,900 UART: [fht] FMC Alias Private Key: 7
20,285,261 UART: [art] Extend RT PCRs Done
20,286,481 UART: [art] Lock RT PCRs Done
20,288,078 UART: [art] Populate DV Done
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,701,806 ready_for_fw is high
3,702,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,376 >>> mbox cmd response: success
18,519,387 UART:
18,519,778 UART: Running Caliptra FMC ...
18,520,924 UART:
18,521,081 UART: [state] CFI Enabled
18,528,993 UART: [fht] FMC Alias Private Key: 7
20,285,338 UART: [art] Extend RT PCRs Done
20,286,572 UART: [art] Lock RT PCRs Done
20,287,881 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
20,291,420 UART: WDT Expired
20,291,977 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
269,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,709,185 >>> mbox cmd response: success
19,001,805 UART:
19,002,384 UART: Running Caliptra FMC ...
19,003,500 UART:
19,003,659 UART: [state] CFI Enabled
19,071,723 UART: [fht] FMC Alias Private Key: 7
20,835,288 UART: [art] Extend RT PCRs Done
20,836,497 UART: [art] Lock RT PCRs Done
20,838,388 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,436,134 ready_for_fw is high
3,436,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,728,018 >>> mbox cmd response: success
19,019,468 UART:
19,019,860 UART: Running Caliptra FMC ...
19,020,979 UART:
19,021,133 UART: [state] CFI Enabled
19,089,470 UART: [fht] FMC Alias Private Key: 7
20,836,897 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400029B0error_internal_intr_r=00000040
20,840,502 UART: WDT Expired
20,841,068 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,665 writing to cptra_bootfsm_go
626,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,564 >>> mbox cmd response: success
19,208,706 UART:
19,209,115 UART: Running Caliptra FMC ...
19,210,239 UART:
19,210,398 UART: [state] CFI Enabled
19,218,319 UART: [fht] FMC Alias Private Key: 7
20,974,627 UART: [art] Extend RT PCRs Done
20,975,851 UART: [art] Lock RT PCRs Done
20,977,507 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,761,137 ready_for_fw is high
3,761,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,951,273 >>> mbox cmd response: success
19,208,527 UART:
19,208,932 UART: Running Caliptra FMC ...
19,210,087 UART:
19,210,252 UART: [state] CFI Enabled
19,218,177 UART: [fht] FMC Alias Private Key: 7
20,974,482 UART: [art] Extend RT PCRs Done
20,975,726 UART: [art] Lock RT PCRs Done
20,977,300 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
20,981,067 UART: WDT Expired
20,981,641 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114448 bytes
2,885,180 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,412 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,764 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,835 >>> mbox cmd response: success
3,079,055 UART: [afmc] ++
3,079,223 UART: [afmc] CDI.KEYID = 6
3,079,585 UART: [afmc] SUBJECT.KEYID = 7
3,080,010 UART: [afmc] AUTHORITY.KEYID = 5
3,114,419 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,967 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,475 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,360 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,050 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,137 UART: [afmc] --
3,158,145 UART: [cold-reset] --
3,158,839 UART: [state] Locking Datavault
3,159,792 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,396 UART: [state] Locking ICCM
3,160,952 UART: [exit] Launching FMC @ 0x40000130
3,166,281 UART:
3,166,297 UART: Running Caliptra FMC ...
3,166,705 UART:
3,166,759 UART: [state] CFI Enabled
3,177,124 UART: [fht] FMC Alias Private Key: 7
3,285,049 UART: [art] Extend RT PCRs Done
3,285,477 UART: [art] Lock RT PCRs Done
3,286,965 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3199468 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114448 bytes
2,885,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,794 >>> mbox cmd response: success
3,079,011 UART: [afmc] ++
3,079,179 UART: [afmc] CDI.KEYID = 6
3,079,541 UART: [afmc] SUBJECT.KEYID = 7
3,079,966 UART: [afmc] AUTHORITY.KEYID = 5
3,114,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,919 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,699 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,137,410 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,143,310 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,149,039 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,157,113 UART: [afmc] --
3,158,120 UART: [cold-reset] --
3,158,814 UART: [state] Locking Datavault
3,159,767 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,371 UART: [state] Locking ICCM
3,160,927 UART: [exit] Launching FMC @ 0x40000130
3,166,256 UART:
3,166,272 UART: Running Caliptra FMC ...
3,166,680 UART:
3,166,734 UART: [state] CFI Enabled
3,177,100 UART: [fht] FMC Alias Private Key: 7
3,285,035 UART: [art] Extend RT PCRs Done
3,285,463 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,286,951 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
3,289,285 UART: WDT Expired
3,289,494 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,471 >>> mbox cmd response: success
2,988,559 UART:
2,988,575 UART: Running Caliptra FMC ...
2,988,983 UART:
2,989,037 UART: [state] CFI Enabled
2,999,402 UART: [fht] FMC Alias Private Key: 7
3,107,327 UART: [art] Extend RT PCRs Done
3,107,755 UART: [art] Lock RT PCRs Done
3,109,243 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,718 >>> mbox cmd response: success
2,988,795 UART:
2,988,811 UART: Running Caliptra FMC ...
2,989,219 UART:
2,989,273 UART: [state] CFI Enabled
2,999,639 UART: [fht] FMC Alias Private Key: 7
3,107,574 UART: [art] Extend RT PCRs Done
3,108,002 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,109,490 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028F0error_internal_intr_r=00000040
3,111,807 UART: WDT Expired
3,112,016 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114448 bytes
2,886,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,829 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,994 >>> mbox cmd response: success
3,080,226 UART: [afmc] ++
3,080,394 UART: [afmc] CDI.KEYID = 6
3,080,756 UART: [afmc] SUBJECT.KEYID = 7
3,081,181 UART: [afmc] AUTHORITY.KEYID = 5
3,116,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,598 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,483 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,173 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,130 UART: [afmc] --
3,160,070 UART: [cold-reset] --
3,161,006 UART: [state] Locking Datavault
3,162,163 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,767 UART: [state] Locking ICCM
3,163,373 UART: [exit] Launching FMC @ 0x40000130
3,168,702 UART:
3,168,718 UART: Running Caliptra FMC ...
3,169,126 UART:
3,169,269 UART: [state] CFI Enabled
3,179,896 UART: [fht] FMC Alias Private Key: 7
3,287,645 UART: [art] Extend RT PCRs Done
3,288,073 UART: [art] Lock RT PCRs Done
3,289,375 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3200889 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114448 bytes
2,886,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,437 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,953 >>> mbox cmd response: success
3,080,182 UART: [afmc] ++
3,080,350 UART: [afmc] CDI.KEYID = 6
3,080,712 UART: [afmc] SUBJECT.KEYID = 7
3,081,137 UART: [afmc] AUTHORITY.KEYID = 5
3,116,702 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,822 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,139,533 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,145,433 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,151,162 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,159,106 UART: [afmc] --
3,160,045 UART: [cold-reset] --
3,160,981 UART: [state] Locking Datavault
3,162,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,742 UART: [state] Locking ICCM
3,163,348 UART: [exit] Launching FMC @ 0x40000130
3,168,677 UART:
3,168,693 UART: Running Caliptra FMC ...
3,169,101 UART:
3,169,244 UART: [state] CFI Enabled
3,179,872 UART: [fht] FMC Alias Private Key: 7
3,287,631 UART: [art] Extend RT PCRs Done
3,288,059 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,289,361 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
3,291,685 UART: WDT Expired
3,291,894 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,630 >>> mbox cmd response: success
2,990,980 UART:
2,990,996 UART: Running Caliptra FMC ...
2,991,404 UART:
2,991,547 UART: [state] CFI Enabled
3,002,174 UART: [fht] FMC Alias Private Key: 7
3,109,923 UART: [art] Extend RT PCRs Done
3,110,351 UART: [art] Lock RT PCRs Done
3,111,653 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,877 >>> mbox cmd response: success
2,991,216 UART:
2,991,232 UART: Running Caliptra FMC ...
2,991,640 UART:
2,991,783 UART: [state] CFI Enabled
3,002,411 UART: [fht] FMC Alias Private Key: 7
3,110,170 UART: [art] Extend RT PCRs Done
3,110,598 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,111,900 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D6error_internal_intr_r=00000040
3,114,209 UART: WDT Expired
3,114,418 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,064 >>> mbox cmd response: success
2,775,220 UART: [afmc] ++
2,775,388 UART: [afmc] CDI.KEYID = 6
2,775,750 UART: [afmc] SUBJECT.KEYID = 7
2,776,175 UART: [afmc] AUTHORITY.KEYID = 5
2,811,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,966 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,685 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,435 UART: [afmc] --
2,854,507 UART: [cold-reset] --
2,855,427 UART: [state] Locking Datavault
2,856,618 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,222 UART: [state] Locking ICCM
2,857,642 UART: [exit] Launching FMC @ 0x40000130
2,862,971 UART:
2,862,987 UART: Running Caliptra FMC ...
2,863,395 UART:
2,863,449 UART: [state] CFI Enabled
2,874,034 UART: [fht] FMC Alias Private Key: 7
2,981,375 UART: [art] Extend RT PCRs Done
2,981,803 UART: [art] Lock RT PCRs Done
2,983,535 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 2896407 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,295 >>> mbox cmd response: success
2,775,448 UART: [afmc] ++
2,775,616 UART: [afmc] CDI.KEYID = 6
2,775,978 UART: [afmc] SUBJECT.KEYID = 7
2,776,403 UART: [afmc] AUTHORITY.KEYID = 5
2,811,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,577 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,834,288 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,188 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,845,885 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,853,620 UART: [afmc] --
2,854,691 UART: [cold-reset] --
2,855,611 UART: [state] Locking Datavault
2,856,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,406 UART: [state] Locking ICCM
2,857,826 UART: [exit] Launching FMC @ 0x40000130
2,863,155 UART:
2,863,171 UART: Running Caliptra FMC ...
2,863,579 UART:
2,863,633 UART: [state] CFI Enabled
2,874,219 UART: [fht] FMC Alias Private Key: 7
2,981,570 UART: [art] Extend RT PCRs Done
2,981,998 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,983,730 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,986,124 UART: WDT Expired
2,986,333 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,045 >>> mbox cmd response: success
2,687,615 UART:
2,687,631 UART: Running Caliptra FMC ...
2,688,039 UART:
2,688,093 UART: [state] CFI Enabled
2,698,678 UART: [fht] FMC Alias Private Key: 7
2,806,019 UART: [art] Extend RT PCRs Done
2,806,447 UART: [art] Lock RT PCRs Done
2,808,179 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,292 >>> mbox cmd response: success
2,687,851 UART:
2,687,867 UART: Running Caliptra FMC ...
2,688,275 UART:
2,688,329 UART: [state] CFI Enabled
2,698,915 UART: [fht] FMC Alias Private Key: 7
2,806,266 UART: [art] Extend RT PCRs Done
2,806,694 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,808,426 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,810,744 UART: WDT Expired
2,810,953 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,445 >>> mbox cmd response: success
2,776,461 UART: [afmc] ++
2,776,629 UART: [afmc] CDI.KEYID = 6
2,776,991 UART: [afmc] SUBJECT.KEYID = 7
2,777,416 UART: [afmc] AUTHORITY.KEYID = 5
2,813,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,774 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,502 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,387 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,106 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,972 UART: [afmc] --
2,856,850 UART: [cold-reset] --
2,857,894 UART: [state] Locking Datavault
2,859,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,841 UART: [state] Locking ICCM
2,860,315 UART: [exit] Launching FMC @ 0x40000130
2,865,644 UART:
2,865,660 UART: Running Caliptra FMC ...
2,866,068 UART:
2,866,211 UART: [state] CFI Enabled
2,877,140 UART: [fht] FMC Alias Private Key: 7
2,985,849 UART: [art] Extend RT PCRs Done
2,986,277 UART: [art] Lock RT PCRs Done
2,987,885 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 2899768 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,676 >>> mbox cmd response: success
2,776,689 UART: [afmc] ++
2,776,857 UART: [afmc] CDI.KEYID = 6
2,777,219 UART: [afmc] SUBJECT.KEYID = 7
2,777,644 UART: [afmc] AUTHORITY.KEYID = 5
2,813,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,998 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,836,709 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,842,609 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,848,306 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,856,157 UART: [afmc] --
2,857,034 UART: [cold-reset] --
2,858,078 UART: [state] Locking Datavault
2,859,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,025 UART: [state] Locking ICCM
2,860,499 UART: [exit] Launching FMC @ 0x40000130
2,865,828 UART:
2,865,844 UART: Running Caliptra FMC ...
2,866,252 UART:
2,866,395 UART: [state] CFI Enabled
2,877,325 UART: [fht] FMC Alias Private Key: 7
2,986,044 UART: [art] Extend RT PCRs Done
2,986,472 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,988,080 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,990,468 UART: WDT Expired
2,990,677 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,426 >>> mbox cmd response: success
2,690,288 UART:
2,690,304 UART: Running Caliptra FMC ...
2,690,712 UART:
2,690,855 UART: [state] CFI Enabled
2,701,784 UART: [fht] FMC Alias Private Key: 7
2,810,493 UART: [art] Extend RT PCRs Done
2,810,921 UART: [art] Lock RT PCRs Done
2,812,529 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,673 >>> mbox cmd response: success
2,690,524 UART:
2,690,540 UART: Running Caliptra FMC ...
2,690,948 UART:
2,691,091 UART: [state] CFI Enabled
2,702,021 UART: [fht] FMC Alias Private Key: 7
2,810,740 UART: [art] Extend RT PCRs Done
2,811,168 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,812,776 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,815,084 UART: WDT Expired
2,815,293 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,164 >>> mbox cmd response: success
2,773,327 UART: [afmc] ++
2,773,495 UART: [afmc] CDI.KEYID = 6
2,773,858 UART: [afmc] SUBJECT.KEYID = 7
2,774,284 UART: [afmc] AUTHORITY.KEYID = 5
2,809,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,098 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,572 UART: [afmc] --
2,852,644 UART: [cold-reset] --
2,853,564 UART: [state] Locking Datavault
2,854,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,359 UART: [state] Locking ICCM
2,855,779 UART: [exit] Launching FMC @ 0x40000130
2,861,108 UART:
2,861,124 UART: Running Caliptra FMC ...
2,861,532 UART:
2,861,586 UART: [state] CFI Enabled
2,872,171 UART: [fht] FMC Alias Private Key: 7
2,979,512 UART: [art] Extend RT PCRs Done
2,979,940 UART: [art] Lock RT PCRs Done
2,981,672 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 2894574 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,395 >>> mbox cmd response: success
2,773,555 UART: [afmc] ++
2,773,723 UART: [afmc] CDI.KEYID = 6
2,774,086 UART: [afmc] SUBJECT.KEYID = 7
2,774,512 UART: [afmc] AUTHORITY.KEYID = 5
2,809,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,710 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,832,422 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,838,320 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,017 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,851,757 UART: [afmc] --
2,852,828 UART: [cold-reset] --
2,853,748 UART: [state] Locking Datavault
2,854,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,543 UART: [state] Locking ICCM
2,855,963 UART: [exit] Launching FMC @ 0x40000130
2,861,292 UART:
2,861,308 UART: Running Caliptra FMC ...
2,861,716 UART:
2,861,770 UART: [state] CFI Enabled
2,872,356 UART: [fht] FMC Alias Private Key: 7
2,979,707 UART: [art] Extend RT PCRs Done
2,980,135 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,981,867 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,984,261 UART: WDT Expired
2,984,470 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,030 >>> mbox cmd response: success
2,683,630 UART:
2,683,646 UART: Running Caliptra FMC ...
2,684,054 UART:
2,684,108 UART: [state] CFI Enabled
2,694,693 UART: [fht] FMC Alias Private Key: 7
2,802,034 UART: [art] Extend RT PCRs Done
2,802,462 UART: [art] Lock RT PCRs Done
2,804,194 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,277 >>> mbox cmd response: success
2,683,866 UART:
2,683,882 UART: Running Caliptra FMC ...
2,684,290 UART:
2,684,344 UART: [state] CFI Enabled
2,694,930 UART: [fht] FMC Alias Private Key: 7
2,802,281 UART: [art] Extend RT PCRs Done
2,802,709 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,804,441 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,806,759 UART: WDT Expired
2,806,968 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,545 >>> mbox cmd response: success
2,774,568 UART: [afmc] ++
2,774,736 UART: [afmc] CDI.KEYID = 6
2,775,099 UART: [afmc] SUBJECT.KEYID = 7
2,775,525 UART: [afmc] AUTHORITY.KEYID = 5
2,811,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,109 UART: [afmc] --
2,854,987 UART: [cold-reset] --
2,856,031 UART: [state] Locking Datavault
2,857,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,978 UART: [state] Locking ICCM
2,858,452 UART: [exit] Launching FMC @ 0x40000130
2,863,781 UART:
2,863,797 UART: Running Caliptra FMC ...
2,864,205 UART:
2,864,348 UART: [state] CFI Enabled
2,875,277 UART: [fht] FMC Alias Private Key: 7
2,983,986 UART: [art] Extend RT PCRs Done
2,984,414 UART: [art] Lock RT PCRs Done
2,986,022 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 2897935 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,776 >>> mbox cmd response: success
2,774,796 UART: [afmc] ++
2,774,964 UART: [afmc] CDI.KEYID = 6
2,775,327 UART: [afmc] SUBJECT.KEYID = 7
2,775,753 UART: [afmc] AUTHORITY.KEYID = 5
2,811,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,131 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,834,843 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,741 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,846,438 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,854,294 UART: [afmc] --
2,855,171 UART: [cold-reset] --
2,856,215 UART: [state] Locking Datavault
2,857,558 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,162 UART: [state] Locking ICCM
2,858,636 UART: [exit] Launching FMC @ 0x40000130
2,863,965 UART:
2,863,981 UART: Running Caliptra FMC ...
2,864,389 UART:
2,864,532 UART: [state] CFI Enabled
2,875,462 UART: [fht] FMC Alias Private Key: 7
2,984,181 UART: [art] Extend RT PCRs Done
2,984,609 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,986,217 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,988,605 UART: WDT Expired
2,988,814 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,411 >>> mbox cmd response: success
2,686,303 UART:
2,686,319 UART: Running Caliptra FMC ...
2,686,727 UART:
2,686,870 UART: [state] CFI Enabled
2,697,799 UART: [fht] FMC Alias Private Key: 7
2,806,508 UART: [art] Extend RT PCRs Done
2,806,936 UART: [art] Lock RT PCRs Done
2,808,544 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,658 >>> mbox cmd response: success
2,686,539 UART:
2,686,555 UART: Running Caliptra FMC ...
2,686,963 UART:
2,687,106 UART: [state] CFI Enabled
2,698,036 UART: [fht] FMC Alias Private Key: 7
2,806,755 UART: [art] Extend RT PCRs Done
2,807,183 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,808,791 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,811,099 UART: WDT Expired
2,811,308 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.89s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114448 bytes
2,885,180 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,412 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,764 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,835 >>> mbox cmd response: success
3,079,055 UART: [afmc] ++
3,079,223 UART: [afmc] CDI.KEYID = 6
3,079,585 UART: [afmc] SUBJECT.KEYID = 7
3,080,010 UART: [afmc] AUTHORITY.KEYID = 5
3,114,419 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,967 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,475 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,360 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,050 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,137 UART: [afmc] --
3,158,145 UART: [cold-reset] --
3,158,839 UART: [state] Locking Datavault
3,159,792 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,396 UART: [state] Locking ICCM
3,160,952 UART: [exit] Launching FMC @ 0x40000130
3,166,281 UART:
3,166,297 UART: Running Caliptra FMC ...
3,166,705 UART:
3,166,759 UART: [state] CFI Enabled
3,177,124 UART: [fht] FMC Alias Private Key: 7
3,285,049 UART: [art] Extend RT PCRs Done
3,285,477 UART: [art] Lock RT PCRs Done
3,286,965 UART: [art] Populate DV Done
3,295,184 UART: [fht] FMC Alias Private Key: 7
3,296,208 UART: [art] Derive CDI
3,296,488 UART: [art] Store in in slot 0x4
3,381,677 UART: [art] Derive Key Pair
3,382,037 UART: [art] Store priv key in slot 0x5
3,395,141 UART: [art] Derive Key Pair - Done
3,409,721 UART: [art] Signing Cert with AUTHO
3,410,201 UART: RITY.KEYID = 7
3,425,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,372 UART: [art] PUB.X = 5120FF3523AC6BC46BCB8C3166A6D6E216FFA8BE15A0F23300EB08531B6A55509B24F4964C11AD8F32ADE97DB700719F
3,433,105 UART: [art] PUB.Y = 3C61C061E52B0782F5A8C658CFD873108976FDD129270EFC2D1D02BAE67820ECEB09CF8E8B9E286DFB63B78298781FCB
3,440,055 UART: [art] SIG.R = 6B300FA527972A5645A9FF7D9FB5B06C2D860DCAA67B75B751EB76781E6C21D4D74F7A396AB47FBEB78356CED2C559E8
3,446,833 UART: [art] SIG.S = BD5016991E99B2D4E68AE85AE0FE988EF61AE282462EAE537A6883397938B0EBE52F21A0969E2D8120F1A9E0B57E8D92
3,471,160 UART: Caliptra RT
3,471,413 UART: [state] CFI Enabled
3,579,264 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3487075 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114448 bytes
2,885,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,794 >>> mbox cmd response: success
3,079,011 UART: [afmc] ++
3,079,179 UART: [afmc] CDI.KEYID = 6
3,079,541 UART: [afmc] SUBJECT.KEYID = 7
3,079,966 UART: [afmc] AUTHORITY.KEYID = 5
3,114,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,919 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,699 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,137,410 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,143,310 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,149,039 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,157,113 UART: [afmc] --
3,158,120 UART: [cold-reset] --
3,158,814 UART: [state] Locking Datavault
3,159,767 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,371 UART: [state] Locking ICCM
3,160,927 UART: [exit] Launching FMC @ 0x40000130
3,166,256 UART:
3,166,272 UART: Running Caliptra FMC ...
3,166,680 UART:
3,166,734 UART: [state] CFI Enabled
3,177,100 UART: [fht] FMC Alias Private Key: 7
3,285,035 UART: [art] Extend RT PCRs Done
3,285,463 UART: [art] Lock RT PCRs Done
3,286,951 UART: [art] Populate DV Done
3,295,170 UART: [fht] FMC Alias Private Key: 7
3,296,194 UART: [art] Derive CDI
3,296,474 UART: [art] Store in in slot 0x4
3,381,661 UART: [art] Derive Key Pair
3,382,021 UART: [art] Store priv key in slot 0x5
3,395,125 UART: [art] Derive Key Pair - Done
3,409,718 UART: [art] Signing Cert with AUTHO
3,410,198 UART: RITY.KEYID = 7
3,425,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,369 UART: [art] PUB.X = E5CB0D6A737EF638173CCC1AD2BA838F5DA591E629A4A7077501AB97E974339EC5FD12984E929F66C94CB23DB92EB335
3,433,140 UART: [art] PUB.Y = B6F7B57F082B746493BE765C96A4AB4BB082F6F9C96468FA01CF4E3597249B3230649DFE4205638185ED9CB4E1B76635
3,440,081 UART: [art] SIG.R = F2F5F4F96D6694EDC182947527E7E2B055EA6C0CC4FA55109346A0824C4E642F1F8DD366E2922918A00E630C4F3FE427
3,446,844 UART: [art] SIG.S = 3BB06C0CB3256CF1FE0EDBB9C91D8E56A99EEDB85E2F25200A9CC4C986F2D606B4FFDA1F73F54C0D44DF645FD2B4CCB2
3,471,178 UART: Caliptra RT
3,471,431 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,574,795 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DDC ra=0x40007056 error_internal_intr_r=00000040
3,577,294 UART: [rt] WDT Expired
3,577,581 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,471 >>> mbox cmd response: success
2,988,559 UART:
2,988,575 UART: Running Caliptra FMC ...
2,988,983 UART:
2,989,037 UART: [state] CFI Enabled
2,999,402 UART: [fht] FMC Alias Private Key: 7
3,107,327 UART: [art] Extend RT PCRs Done
3,107,755 UART: [art] Lock RT PCRs Done
3,109,243 UART: [art] Populate DV Done
3,117,462 UART: [fht] FMC Alias Private Key: 7
3,118,486 UART: [art] Derive CDI
3,118,766 UART: [art] Store in in slot 0x4
3,203,955 UART: [art] Derive Key Pair
3,204,315 UART: [art] Store priv key in slot 0x5
3,217,419 UART: [art] Derive Key Pair - Done
3,232,006 UART: [art] Signing Cert with AUTHO
3,232,486 UART: RITY.KEYID = 7
3,247,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,657 UART: [art] PUB.X = 441E95D693F1AE1F65B921ADE946484E8F98F4A409A2D96F7F372E2C7466698700C2E81B88E1C85A038D730CA16770AE
3,255,396 UART: [art] PUB.Y = 54DB5D48B017BB5006E48D0F6FAFFE0122C37646D1A089C737AA6E5F729802B6A45BBF7417803949BABECB745FF9391E
3,262,344 UART: [art] SIG.R = DB45CB3E641D07E6D12AFB9A81771E5385C64606806078FF92498E3A616C5F6CBF0ED101353D53BBDD851DEAABD89151
3,269,112 UART: [art] SIG.S = ED6594CBDA26F5519B972E19E95B6C8220C47BFA976BD540199F4027608FE63E9AB28283B2C19C398A41ECB144B91BA7
3,293,439 UART: Caliptra RT
3,293,692 UART: [state] CFI Enabled
3,401,492 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,718 >>> mbox cmd response: success
2,988,795 UART:
2,988,811 UART: Running Caliptra FMC ...
2,989,219 UART:
2,989,273 UART: [state] CFI Enabled
2,999,639 UART: [fht] FMC Alias Private Key: 7
3,107,574 UART: [art] Extend RT PCRs Done
3,108,002 UART: [art] Lock RT PCRs Done
3,109,490 UART: [art] Populate DV Done
3,117,709 UART: [fht] FMC Alias Private Key: 7
3,118,733 UART: [art] Derive CDI
3,119,013 UART: [art] Store in in slot 0x4
3,204,200 UART: [art] Derive Key Pair
3,204,560 UART: [art] Store priv key in slot 0x5
3,217,664 UART: [art] Derive Key Pair - Done
3,232,255 UART: [art] Signing Cert with AUTHO
3,232,735 UART: RITY.KEYID = 7
3,248,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,906 UART: [art] PUB.X = C70400E788ED15D4F61428194474AD2ACEECBB090F202B249FB8A1F24506A8658525C98EC4A06819006229B5328F934B
3,255,616 UART: [art] PUB.Y = 074654C204011D9639E4ADB8D1278AD4B3495038BF10039A725E3610B14EDE8F5D1868977945C909C09287117B4AF7E4
3,262,541 UART: [art] SIG.R = D2768CF34FA891D7AB8659362FC31F5895A4C985E1440AC49CA2C3C04A1970C6CC188BFC74AEBEB587BCC7A9770E8D83
3,269,319 UART: [art] SIG.S = 986C631EFE3A5F04748CECCE26326227D455201351DE4029C40B73180221E50A3D271AEEE03682A619566E59B7B15C32
3,293,620 UART: Caliptra RT
3,293,873 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,397,269 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DDC ra=0x40007056 error_internal_intr_r=00000040
3,399,768 UART: [rt] WDT Expired
3,400,055 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114448 bytes
2,886,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,829 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,994 >>> mbox cmd response: success
3,080,226 UART: [afmc] ++
3,080,394 UART: [afmc] CDI.KEYID = 6
3,080,756 UART: [afmc] SUBJECT.KEYID = 7
3,081,181 UART: [afmc] AUTHORITY.KEYID = 5
3,116,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,598 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,483 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,173 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,130 UART: [afmc] --
3,160,070 UART: [cold-reset] --
3,161,006 UART: [state] Locking Datavault
3,162,163 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,767 UART: [state] Locking ICCM
3,163,373 UART: [exit] Launching FMC @ 0x40000130
3,168,702 UART:
3,168,718 UART: Running Caliptra FMC ...
3,169,126 UART:
3,169,269 UART: [state] CFI Enabled
3,179,896 UART: [fht] FMC Alias Private Key: 7
3,287,645 UART: [art] Extend RT PCRs Done
3,288,073 UART: [art] Lock RT PCRs Done
3,289,375 UART: [art] Populate DV Done
3,297,614 UART: [fht] FMC Alias Private Key: 7
3,298,628 UART: [art] Derive CDI
3,298,908 UART: [art] Store in in slot 0x4
3,384,673 UART: [art] Derive Key Pair
3,385,033 UART: [art] Store priv key in slot 0x5
3,398,251 UART: [art] Derive Key Pair - Done
3,413,041 UART: [art] Signing Cert with AUTHO
3,413,521 UART: RITY.KEYID = 7
3,428,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,676 UART: [art] PUB.X = BF55B04554034513678D15B3764A0B7830B0B96C12358C89EDC4147DEC28D2E1A56149986879EEBE191C8587B5508C2A
3,436,434 UART: [art] PUB.Y = 0DD5350C11CC963712A0071AC14EFA3E95641BEC4918AF2513A828731EA33DB9D0A9768FFF778E86C6E7715C0B7B87C4
3,443,378 UART: [art] SIG.R = 284BB2A21EAF43A85B4172581D736F414E5A63BC04FF8D6FE0100EAEE93C55973B19490791164062B80DC280F668EE8F
3,450,138 UART: [art] SIG.S = 98D7C8E4C552B2E6BBE0CDDC788CC6F0CA938BA957BA54A3EC70010049111367D018C67364B687438E554BD871FF925D
3,473,746 UART: Caliptra RT
3,474,091 UART: [state] CFI Enabled
3,582,794 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3489616 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114448 bytes
2,886,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,437 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,953 >>> mbox cmd response: success
3,080,182 UART: [afmc] ++
3,080,350 UART: [afmc] CDI.KEYID = 6
3,080,712 UART: [afmc] SUBJECT.KEYID = 7
3,081,137 UART: [afmc] AUTHORITY.KEYID = 5
3,116,702 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,822 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,139,533 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,145,433 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,151,162 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,159,106 UART: [afmc] --
3,160,045 UART: [cold-reset] --
3,160,981 UART: [state] Locking Datavault
3,162,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,742 UART: [state] Locking ICCM
3,163,348 UART: [exit] Launching FMC @ 0x40000130
3,168,677 UART:
3,168,693 UART: Running Caliptra FMC ...
3,169,101 UART:
3,169,244 UART: [state] CFI Enabled
3,179,872 UART: [fht] FMC Alias Private Key: 7
3,287,631 UART: [art] Extend RT PCRs Done
3,288,059 UART: [art] Lock RT PCRs Done
3,289,361 UART: [art] Populate DV Done
3,297,600 UART: [fht] FMC Alias Private Key: 7
3,298,614 UART: [art] Derive CDI
3,298,894 UART: [art] Store in in slot 0x4
3,384,657 UART: [art] Derive Key Pair
3,385,017 UART: [art] Store priv key in slot 0x5
3,398,235 UART: [art] Derive Key Pair - Done
3,413,019 UART: [art] Signing Cert with AUTHO
3,413,499 UART: RITY.KEYID = 7
3,428,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,654 UART: [art] PUB.X = 305DB97DE903FF4249DF10658BBA1B0954D0E2D07335717F5136A36D5D5AE7553614DADE2DE20A455CA7DCFFBB6A6EE2
3,436,431 UART: [art] PUB.Y = 226791050F0031174FB18F51C83757F1406D970EDA4EEB3B484D4F86A2D42F008E9E9C1A0DBCD22240A59A0A6BEE27E8
3,443,328 UART: [art] SIG.R = 6009FAF955E27D7B079B8FD4E35990F5CA2AE87B9F2D25028FD9CB16C371A643A27715A7DB30A5D0D23C06FA7B538DD8
3,450,098 UART: [art] SIG.S = 9EB719782EF6F0A65F69FBCA0A2CE3911BF8B8506FB60838FCA0D9258D59B51B2F544DEF1FA712288822D01CB1D0276E
3,473,729 UART: Caliptra RT
3,474,074 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,578,317 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE2 ra=0x40007056 error_internal_intr_r=00000040
3,580,814 UART: [rt] WDT Expired
3,581,101 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,630 >>> mbox cmd response: success
2,990,980 UART:
2,990,996 UART: Running Caliptra FMC ...
2,991,404 UART:
2,991,547 UART: [state] CFI Enabled
3,002,174 UART: [fht] FMC Alias Private Key: 7
3,109,923 UART: [art] Extend RT PCRs Done
3,110,351 UART: [art] Lock RT PCRs Done
3,111,653 UART: [art] Populate DV Done
3,119,892 UART: [fht] FMC Alias Private Key: 7
3,120,906 UART: [art] Derive CDI
3,121,186 UART: [art] Store in in slot 0x4
3,206,951 UART: [art] Derive Key Pair
3,207,311 UART: [art] Store priv key in slot 0x5
3,220,529 UART: [art] Derive Key Pair - Done
3,235,320 UART: [art] Signing Cert with AUTHO
3,235,800 UART: RITY.KEYID = 7
3,251,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,955 UART: [art] PUB.X = 10CA84AE609430EA82BA5C0BF8733C36DEBCB49338F6537C5A8FEDD16C4BEA9B0C7C8F06A7948926BED2CA2F95644EA6
3,258,736 UART: [art] PUB.Y = 6B4537C615243775F09879F83096C72F7329B93703CFB316F16A82C7DECD6FCD2A56C3DE53A915756F5A4703ADC992B4
3,265,680 UART: [art] SIG.R = BA6415BD3552BE1F8658BDFA5F1B492EE9A3A6D28C9437675B220C9611EB8311247B2AAE7C53F87F864D6F9BA67DDD29
3,272,459 UART: [art] SIG.S = 9E59C599B226247689A9A59194405334D84D45638F6F44AE3A21866B90F873A76553F83D2717BCB234B29E5EBD8841E2
3,296,076 UART: Caliptra RT
3,296,421 UART: [state] CFI Enabled
3,405,073 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,877 >>> mbox cmd response: success
2,991,216 UART:
2,991,232 UART: Running Caliptra FMC ...
2,991,640 UART:
2,991,783 UART: [state] CFI Enabled
3,002,411 UART: [fht] FMC Alias Private Key: 7
3,110,170 UART: [art] Extend RT PCRs Done
3,110,598 UART: [art] Lock RT PCRs Done
3,111,900 UART: [art] Populate DV Done
3,120,139 UART: [fht] FMC Alias Private Key: 7
3,121,153 UART: [art] Derive CDI
3,121,433 UART: [art] Store in in slot 0x4
3,207,196 UART: [art] Derive Key Pair
3,207,556 UART: [art] Store priv key in slot 0x5
3,220,774 UART: [art] Derive Key Pair - Done
3,235,562 UART: [art] Signing Cert with AUTHO
3,236,042 UART: RITY.KEYID = 7
3,251,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,197 UART: [art] PUB.X = EEE80E9971E64F96E3CE7882D2BBE87189060852B9540B05A32B1E9146B45FB209F393EE0A603DB4904229A91880C957
3,258,942 UART: [art] PUB.Y = EF9D1ED59AEA5A1F4FEF1334815367ED837A277054D561DD69856914B1F7B929CB46ACA0FE39F39C754DC10EB946A4B2
3,265,901 UART: [art] SIG.R = 8DBBFA066FBA88FAC8FF7FEF2A97BA9645CB921E7A941F352C02F23CF7975407B8205705F2B1F4EE22C306A354094844
3,272,663 UART: [art] SIG.S = 8C84DAD8B63C0F46B2808809513427BB11E797BA3A25DA1D82BA0257D6ED196697815C3C52BFE49ACAAFE08ACE12543D
3,296,291 UART: Caliptra RT
3,296,636 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,400,842 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DDE ra=0x40007056 error_internal_intr_r=00000040
3,403,341 UART: [rt] WDT Expired
3,403,628 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,064 >>> mbox cmd response: success
2,775,220 UART: [afmc] ++
2,775,388 UART: [afmc] CDI.KEYID = 6
2,775,750 UART: [afmc] SUBJECT.KEYID = 7
2,776,175 UART: [afmc] AUTHORITY.KEYID = 5
2,811,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,966 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,685 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,435 UART: [afmc] --
2,854,507 UART: [cold-reset] --
2,855,427 UART: [state] Locking Datavault
2,856,618 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,222 UART: [state] Locking ICCM
2,857,642 UART: [exit] Launching FMC @ 0x40000130
2,862,971 UART:
2,862,987 UART: Running Caliptra FMC ...
2,863,395 UART:
2,863,449 UART: [state] CFI Enabled
2,874,034 UART: [fht] FMC Alias Private Key: 7
2,981,375 UART: [art] Extend RT PCRs Done
2,981,803 UART: [art] Lock RT PCRs Done
2,983,535 UART: [art] Populate DV Done
2,991,814 UART: [fht] FMC Alias Private Key: 7
2,992,806 UART: [art] Derive CDI
2,993,086 UART: [art] Store in in slot 0x4
3,078,157 UART: [art] Derive Key Pair
3,078,517 UART: [art] Store priv key in slot 0x5
3,092,143 UART: [art] Derive Key Pair - Done
3,107,129 UART: [art] Signing Cert with AUTHO
3,107,609 UART: RITY.KEYID = 7
3,122,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,562 UART: [art] PUB.X = CE22EA13E14DB31DBC9CA4B497B7F7D443AF209BD38B633C24E984C48697C518151B59774E02B6F9B91BE2E11EEE9884
3,130,339 UART: [art] PUB.Y = 7E28C4C533D8F79C9B0858637B44239A648C4408F00403DADFEC2482A4F7EE5D14D22AB692F7E4D391D43B424F458579
3,137,277 UART: [art] SIG.R = 26A4B3D62D9FF3708071907444616A54D189F28FDAC2A170B016D60C0711B869D6843FB43639C7AB1A5FDCFFB18F7A7B
3,144,047 UART: [art] SIG.S = CF98838E68E77D07588D6986EF2AE926388676229998DC8D5D8DBA02EFB83F7F6AFAEA9EA49BC126BF55E7E83C765AE2
3,167,626 UART: Caliptra RT
3,167,879 UART: [state] CFI Enabled
3,275,666 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 3183846 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,295 >>> mbox cmd response: success
2,775,448 UART: [afmc] ++
2,775,616 UART: [afmc] CDI.KEYID = 6
2,775,978 UART: [afmc] SUBJECT.KEYID = 7
2,776,403 UART: [afmc] AUTHORITY.KEYID = 5
2,811,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,577 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,834,288 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,188 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,845,885 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,853,620 UART: [afmc] --
2,854,691 UART: [cold-reset] --
2,855,611 UART: [state] Locking Datavault
2,856,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,406 UART: [state] Locking ICCM
2,857,826 UART: [exit] Launching FMC @ 0x40000130
2,863,155 UART:
2,863,171 UART: Running Caliptra FMC ...
2,863,579 UART:
2,863,633 UART: [state] CFI Enabled
2,874,219 UART: [fht] FMC Alias Private Key: 7
2,981,570 UART: [art] Extend RT PCRs Done
2,981,998 UART: [art] Lock RT PCRs Done
2,983,730 UART: [art] Populate DV Done
2,992,009 UART: [fht] FMC Alias Private Key: 7
2,993,001 UART: [art] Derive CDI
2,993,281 UART: [art] Store in in slot 0x4
3,078,350 UART: [art] Derive Key Pair
3,078,710 UART: [art] Store priv key in slot 0x5
3,092,336 UART: [art] Derive Key Pair - Done
3,107,322 UART: [art] Signing Cert with AUTHO
3,107,802 UART: RITY.KEYID = 7
3,122,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,755 UART: [art] PUB.X = 2E0E5C32F4D00D83F03A8B694A91C0BDF1D16BDA71830073E07FFEFBFAA968EBB1F471F800F9F78CB68E9274ED6DEAEF
3,130,501 UART: [art] PUB.Y = F953F77F2AABC8FAFF809BA7675D00173F2A37645B509E76E0EF775261F442672E70C6CD30E640D901DD1804ED85C09E
3,137,429 UART: [art] SIG.R = 7F9DF08B916797D1C5D0CA1F35B9F289201321FE3E3C0A5EE731F51BE8F98CDF7457332AC0B042F3DBD7DB07E4E6B45E
3,144,209 UART: [art] SIG.S = EC510519E83E6F8E3DBC7CD0E93DCB4C6A86470ACF8EFC09C0EDFF5E7463CBDCD7DC6BC999449465D3A21841451BFA66
3,167,793 UART: Caliptra RT
3,168,046 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,271,468 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE6 ra=0x40007056 error_internal_intr_r=00000040
3,273,965 UART: [rt] WDT Expired
3,274,252 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,045 >>> mbox cmd response: success
2,687,615 UART:
2,687,631 UART: Running Caliptra FMC ...
2,688,039 UART:
2,688,093 UART: [state] CFI Enabled
2,698,678 UART: [fht] FMC Alias Private Key: 7
2,806,019 UART: [art] Extend RT PCRs Done
2,806,447 UART: [art] Lock RT PCRs Done
2,808,179 UART: [art] Populate DV Done
2,816,458 UART: [fht] FMC Alias Private Key: 7
2,817,450 UART: [art] Derive CDI
2,817,730 UART: [art] Store in in slot 0x4
2,902,801 UART: [art] Derive Key Pair
2,903,161 UART: [art] Store priv key in slot 0x5
2,916,787 UART: [art] Derive Key Pair - Done
2,931,784 UART: [art] Signing Cert with AUTHO
2,932,264 UART: RITY.KEYID = 7
2,947,452 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,217 UART: [art] PUB.X = 97632426EB4E15B3EDE545A78140B0AA0CDEB613396E62FDEF006F2E256FAD7BC8A38263C055915CB47D09DC0DDBF9B2
2,954,972 UART: [art] PUB.Y = A20D22833E81C86974B8D03B9E7ABD4958F268B1DC8205CD64637E46581F516D44183BBAC07356F025B4111C5AD9166A
2,961,914 UART: [art] SIG.R = B8593A5225FF113E9F3D185916744036D5EC6EB94F31200204B09A981970D39BABBC93D62554EAA33A83AFD74D61404C
2,968,678 UART: [art] SIG.S = 26E9C576F16DA061261C39541FA82C5DB46CE1B45DB0CD0F68334D1A1D1ECA3610ED4F05CF8A74DE38160339CF7EFF07
2,992,251 UART: Caliptra RT
2,992,504 UART: [state] CFI Enabled
3,100,223 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,292 >>> mbox cmd response: success
2,687,851 UART:
2,687,867 UART: Running Caliptra FMC ...
2,688,275 UART:
2,688,329 UART: [state] CFI Enabled
2,698,915 UART: [fht] FMC Alias Private Key: 7
2,806,266 UART: [art] Extend RT PCRs Done
2,806,694 UART: [art] Lock RT PCRs Done
2,808,426 UART: [art] Populate DV Done
2,816,705 UART: [fht] FMC Alias Private Key: 7
2,817,697 UART: [art] Derive CDI
2,817,977 UART: [art] Store in in slot 0x4
2,903,046 UART: [art] Derive Key Pair
2,903,406 UART: [art] Store priv key in slot 0x5
2,917,032 UART: [art] Derive Key Pair - Done
2,932,021 UART: [art] Signing Cert with AUTHO
2,932,501 UART: RITY.KEYID = 7
2,947,689 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,454 UART: [art] PUB.X = 1A04E2498EE9D0238C9B15FAAA60CDCADC24EB6AB9C0EB02677AC3FCA76CA3926AF586FF0FDA042167C529516AAEFCE0
2,955,240 UART: [art] PUB.Y = 11ED51FCB49D2F5AA57E504211A97DCD624F67D3A93D462A0D0871D6B7D6CE3D628D440B04B23ABE145E284E6C35B371
2,962,188 UART: [art] SIG.R = C1A74F9870803594BD07BF7A89857CB883555F1D1AD5262C0A1369656661A04D2367CEF9FBF2F5F2E2C2492F7E234CAD
2,968,956 UART: [art] SIG.S = 62B7CD018543E206D4B1083AA8B84B199790503D16371089FF65B62FD342E459FEAD0C1024FB777080507ABFF243794C
2,992,509 UART: Caliptra RT
2,992,762 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,095,999 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE2 ra=0x40007056 error_internal_intr_r=00000040
3,098,496 UART: [rt] WDT Expired
3,098,783 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,445 >>> mbox cmd response: success
2,776,461 UART: [afmc] ++
2,776,629 UART: [afmc] CDI.KEYID = 6
2,776,991 UART: [afmc] SUBJECT.KEYID = 7
2,777,416 UART: [afmc] AUTHORITY.KEYID = 5
2,813,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,774 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,502 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,387 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,106 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,972 UART: [afmc] --
2,856,850 UART: [cold-reset] --
2,857,894 UART: [state] Locking Datavault
2,859,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,841 UART: [state] Locking ICCM
2,860,315 UART: [exit] Launching FMC @ 0x40000130
2,865,644 UART:
2,865,660 UART: Running Caliptra FMC ...
2,866,068 UART:
2,866,211 UART: [state] CFI Enabled
2,877,140 UART: [fht] FMC Alias Private Key: 7
2,985,849 UART: [art] Extend RT PCRs Done
2,986,277 UART: [art] Lock RT PCRs Done
2,987,885 UART: [art] Populate DV Done
2,995,960 UART: [fht] FMC Alias Private Key: 7
2,996,900 UART: [art] Derive CDI
2,997,180 UART: [art] Store in in slot 0x4
3,082,761 UART: [art] Derive Key Pair
3,083,121 UART: [art] Store priv key in slot 0x5
3,096,427 UART: [art] Derive Key Pair - Done
3,111,292 UART: [art] Signing Cert with AUTHO
3,111,772 UART: RITY.KEYID = 7
3,126,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,739 UART: [art] PUB.X = 3E680794A187A0236B67459FC49CC49463DC35835E776B54FD36F7394012F00D943DCDD9B3DEFFA213A0674AD78E5A5B
3,134,507 UART: [art] PUB.Y = AC531EC2008845D4DAD88587A92538A80B2A58C5AB0FF911601756F4DDCFE17A7C7E73776065BBAF62C3082B4C682071
3,141,430 UART: [art] SIG.R = 78ED7072698F4CCB4C48466F1CAB25323B6497A589CBA0F21AD3A899FDB3EDDBD59A0217A8184E6FE29D21F9D869A889
3,148,209 UART: [art] SIG.S = 25B635E871E2D9995A02705E3FF0091396EE017D84D13AD60507E5941C4F68A8784F5441DAF157F5C14D6B747F59906B
3,172,487 UART: Caliptra RT
3,172,832 UART: [state] CFI Enabled
3,280,789 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 3187980 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,676 >>> mbox cmd response: success
2,776,689 UART: [afmc] ++
2,776,857 UART: [afmc] CDI.KEYID = 6
2,777,219 UART: [afmc] SUBJECT.KEYID = 7
2,777,644 UART: [afmc] AUTHORITY.KEYID = 5
2,813,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,998 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,836,709 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,842,609 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,848,306 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,856,157 UART: [afmc] --
2,857,034 UART: [cold-reset] --
2,858,078 UART: [state] Locking Datavault
2,859,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,025 UART: [state] Locking ICCM
2,860,499 UART: [exit] Launching FMC @ 0x40000130
2,865,828 UART:
2,865,844 UART: Running Caliptra FMC ...
2,866,252 UART:
2,866,395 UART: [state] CFI Enabled
2,877,325 UART: [fht] FMC Alias Private Key: 7
2,986,044 UART: [art] Extend RT PCRs Done
2,986,472 UART: [art] Lock RT PCRs Done
2,988,080 UART: [art] Populate DV Done
2,996,155 UART: [fht] FMC Alias Private Key: 7
2,997,095 UART: [art] Derive CDI
2,997,375 UART: [art] Store in in slot 0x4
3,082,954 UART: [art] Derive Key Pair
3,083,314 UART: [art] Store priv key in slot 0x5
3,096,620 UART: [art] Derive Key Pair - Done
3,111,488 UART: [art] Signing Cert with AUTHO
3,111,968 UART: RITY.KEYID = 7
3,127,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,935 UART: [art] PUB.X = 41CF5F31E7804147DB052781E808A8BAB02DC5B4E23B28039A02F8FBB17ABEFAA871D1B9E1C36793F8EFD3E7B6404D30
3,134,707 UART: [art] PUB.Y = 4801AF3C68C4D4AAA95416F9B20E25DD2E422427E57BF9B11BCA4546C6A3150E9BC10E672EABEB7E6E7810D21EF3B96F
3,141,661 UART: [art] SIG.R = DA1DE5D7D8756AAEA701C767719F35D9E6E619464FB9EF5B9C5DF8E18ABB2A0C24FE2DECFC5A07ECC5704D4F8550FDCB
3,148,452 UART: [art] SIG.S = 65358C10CFE7B235DBBB56D941D6CE5648418F96EAF598BE5EAD2E6BF5624ED1A5ADBC7E68A088F4109939059E097573
3,172,753 UART: Caliptra RT
3,173,098 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,276,583 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE6 ra=0x40007056 error_internal_intr_r=00000040
3,279,080 UART: [rt] WDT Expired
3,279,367 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,426 >>> mbox cmd response: success
2,690,288 UART:
2,690,304 UART: Running Caliptra FMC ...
2,690,712 UART:
2,690,855 UART: [state] CFI Enabled
2,701,784 UART: [fht] FMC Alias Private Key: 7
2,810,493 UART: [art] Extend RT PCRs Done
2,810,921 UART: [art] Lock RT PCRs Done
2,812,529 UART: [art] Populate DV Done
2,820,604 UART: [fht] FMC Alias Private Key: 7
2,821,544 UART: [art] Derive CDI
2,821,824 UART: [art] Store in in slot 0x4
2,907,405 UART: [art] Derive Key Pair
2,907,765 UART: [art] Store priv key in slot 0x5
2,921,071 UART: [art] Derive Key Pair - Done
2,935,953 UART: [art] Signing Cert with AUTHO
2,936,433 UART: RITY.KEYID = 7
2,951,635 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,400 UART: [art] PUB.X = 0B08F055CB3437F6D46261D785C4FE2C037D22E77712ED637379F6768FCB14CA5B1A763FB4DFBB28879C1D189B518BE1
2,959,167 UART: [art] PUB.Y = EA09DAB0F01F2C94D546CBBCB27D5EDBB993E3FEB386DBF74F27166394A2D4C6D3A9D593F846B5C5374957D125FBE2EF
2,966,136 UART: [art] SIG.R = CBB80BB4CA0FA10DDA2F49852AFEEF143974C6AE50BBE5D22083EBB03D94D8965F19B98D1974C6743D1164B1E5B58370
2,972,911 UART: [art] SIG.S = D00EC95C10E831EFF7F3A0EBB462BBA39D66B8A3CBD12E2835C392B2F47206956D85EF016348346C11E23DDCAEBDEB35
2,997,219 UART: Caliptra RT
2,997,564 UART: [state] CFI Enabled
3,105,488 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,673 >>> mbox cmd response: success
2,690,524 UART:
2,690,540 UART: Running Caliptra FMC ...
2,690,948 UART:
2,691,091 UART: [state] CFI Enabled
2,702,021 UART: [fht] FMC Alias Private Key: 7
2,810,740 UART: [art] Extend RT PCRs Done
2,811,168 UART: [art] Lock RT PCRs Done
2,812,776 UART: [art] Populate DV Done
2,820,851 UART: [fht] FMC Alias Private Key: 7
2,821,791 UART: [art] Derive CDI
2,822,071 UART: [art] Store in in slot 0x4
2,907,650 UART: [art] Derive Key Pair
2,908,010 UART: [art] Store priv key in slot 0x5
2,921,316 UART: [art] Derive Key Pair - Done
2,936,178 UART: [art] Signing Cert with AUTHO
2,936,658 UART: RITY.KEYID = 7
2,951,860 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,625 UART: [art] PUB.X = 385DCE0EDCA68C901505B4EBCAAA590D78E357AA6AD79097A52C658AD6238439A77F1C323D601965A249003EF9803BEA
2,959,372 UART: [art] PUB.Y = 9E72329D24B6556891F604CA490FE45D8BD6BDAEB72037DE9AFE7355E7BFD9F0B297C7E8529FF0BACDD49FB1A5DD99CF
2,966,340 UART: [art] SIG.R = 984F4C5981CC257504D9838C16275707A039EDAC5DD34A66400C748CF5A70433BB5BA1A77E9731D6DFD9CB868B97C600
2,973,078 UART: [art] SIG.S = CBDC62419923E38CDB250EF8DD29DA55D9903B2EAC15059D9E72C1CC5C668697286C87FBB1B01775B17D15749CD293FC
2,997,379 UART: Caliptra RT
2,997,724 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,101,256 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE6 ra=0x40007056 error_internal_intr_r=00000040
3,103,753 UART: [rt] WDT Expired
3,104,040 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,164 >>> mbox cmd response: success
2,773,327 UART: [afmc] ++
2,773,495 UART: [afmc] CDI.KEYID = 6
2,773,858 UART: [afmc] SUBJECT.KEYID = 7
2,774,284 UART: [afmc] AUTHORITY.KEYID = 5
2,809,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,098 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,572 UART: [afmc] --
2,852,644 UART: [cold-reset] --
2,853,564 UART: [state] Locking Datavault
2,854,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,359 UART: [state] Locking ICCM
2,855,779 UART: [exit] Launching FMC @ 0x40000130
2,861,108 UART:
2,861,124 UART: Running Caliptra FMC ...
2,861,532 UART:
2,861,586 UART: [state] CFI Enabled
2,872,171 UART: [fht] FMC Alias Private Key: 7
2,979,512 UART: [art] Extend RT PCRs Done
2,979,940 UART: [art] Lock RT PCRs Done
2,981,672 UART: [art] Populate DV Done
2,989,951 UART: [fht] FMC Alias Private Key: 7
2,990,943 UART: [art] Derive CDI
2,991,223 UART: [art] Store in in slot 0x4
3,076,294 UART: [art] Derive Key Pair
3,076,654 UART: [art] Store priv key in slot 0x5
3,090,280 UART: [art] Derive Key Pair - Done
3,105,265 UART: [art] Signing Cert with AUTHO
3,105,745 UART: RITY.KEYID = 7
3,120,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,698 UART: [art] PUB.X = D549DB9FFEDC0B86C7983A279399B815F957F2988165B5CFD90565B198E9E6D9D5CE9565A8BC98A9F2CB6D519CB55BBC
3,128,476 UART: [art] PUB.Y = D039EF3CFD72983FE7A0A3825D2D7B7F4D8BA4C6C28F596657EE800EAA6FD246992D3EE1DA35087D3142B14BEEC59134
3,135,434 UART: [art] SIG.R = 9550F1BA73381BEC17768E9E14AD3853168E212AA3EE6FC1F7639B87C19E811CE9F155A83732FB886F7DD435457DF5E7
3,142,208 UART: [art] SIG.S = 769ACA643B12CB40FA44CC4D08BDFF2FFA49F58ACD10F1E61D59FAE09384571E3A428928F89B0D55C3BE26C2BCC765D4
3,165,793 UART: Caliptra RT
3,166,046 UART: [state] CFI Enabled
3,273,765 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 3181975 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,395 >>> mbox cmd response: success
2,773,555 UART: [afmc] ++
2,773,723 UART: [afmc] CDI.KEYID = 6
2,774,086 UART: [afmc] SUBJECT.KEYID = 7
2,774,512 UART: [afmc] AUTHORITY.KEYID = 5
2,809,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,710 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,832,422 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,838,320 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,017 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,851,757 UART: [afmc] --
2,852,828 UART: [cold-reset] --
2,853,748 UART: [state] Locking Datavault
2,854,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,543 UART: [state] Locking ICCM
2,855,963 UART: [exit] Launching FMC @ 0x40000130
2,861,292 UART:
2,861,308 UART: Running Caliptra FMC ...
2,861,716 UART:
2,861,770 UART: [state] CFI Enabled
2,872,356 UART: [fht] FMC Alias Private Key: 7
2,979,707 UART: [art] Extend RT PCRs Done
2,980,135 UART: [art] Lock RT PCRs Done
2,981,867 UART: [art] Populate DV Done
2,990,146 UART: [fht] FMC Alias Private Key: 7
2,991,138 UART: [art] Derive CDI
2,991,418 UART: [art] Store in in slot 0x4
3,076,487 UART: [art] Derive Key Pair
3,076,847 UART: [art] Store priv key in slot 0x5
3,090,473 UART: [art] Derive Key Pair - Done
3,105,458 UART: [art] Signing Cert with AUTHO
3,105,938 UART: RITY.KEYID = 7
3,121,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,891 UART: [art] PUB.X = 2D7C4715DC57F67108CCDFC071EA04B78501FEE63725A7A892756A6A8AF4F49DBC62059526FEA168BA04586A84445207
3,128,645 UART: [art] PUB.Y = 865E72767CC9BA22709213741ED5BDE76559898F3B896A920996F510DB47F8B5E5401840E1C43F479D1132B3305145EF
3,135,582 UART: [art] SIG.R = 96A296A573BAF32A8BBDA35714E50E619D402D9A20F87179230041C115437645B15260FC6A1411432C3EBBE2F53117D1
3,142,321 UART: [art] SIG.S = 357E74AE7C96BC19E6E7D882507EDB049A8089E6721D8925B9C6288EE78C23EAE867DE718A15FEE855460188E1EE7CA8
3,165,890 UART: Caliptra RT
3,166,143 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,269,567 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE6 ra=0x40007056 error_internal_intr_r=00000040
3,272,064 UART: [rt] WDT Expired
3,272,351 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,030 >>> mbox cmd response: success
2,683,630 UART:
2,683,646 UART: Running Caliptra FMC ...
2,684,054 UART:
2,684,108 UART: [state] CFI Enabled
2,694,693 UART: [fht] FMC Alias Private Key: 7
2,802,034 UART: [art] Extend RT PCRs Done
2,802,462 UART: [art] Lock RT PCRs Done
2,804,194 UART: [art] Populate DV Done
2,812,473 UART: [fht] FMC Alias Private Key: 7
2,813,465 UART: [art] Derive CDI
2,813,745 UART: [art] Store in in slot 0x4
2,898,816 UART: [art] Derive Key Pair
2,899,176 UART: [art] Store priv key in slot 0x5
2,912,802 UART: [art] Derive Key Pair - Done
2,927,791 UART: [art] Signing Cert with AUTHO
2,928,271 UART: RITY.KEYID = 7
2,943,459 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,224 UART: [art] PUB.X = 1CC61CE8056D1D6EDFC8E4B88CE6F0E5E1512C2FC244B78C046B312443D9A79EAB8B6D9C9873CC2BFC5B0B176A24B242
2,951,003 UART: [art] PUB.Y = 29C4F300197B83238A296D1E13F7C58CF8C485496EEA67DB1DF5DA97374BC099FEDEA2C6B9875E81F0E191FBB45368A7
2,957,941 UART: [art] SIG.R = 20AA7A6245DEC609D2E5FC9C50779354522ABF22E4EFEA186956B716710124304B5B4E0C3DCFFC27EE5C11C01242ABC3
2,964,712 UART: [art] SIG.S = E91834DF3FC274531C14DF15EFCC37FEB5CC29FE881CE2EB5CFF6BA2416FF2B8417917B8D14861423E255ABF22E1F197
2,988,299 UART: Caliptra RT
2,988,552 UART: [state] CFI Enabled
3,096,339 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,277 >>> mbox cmd response: success
2,683,866 UART:
2,683,882 UART: Running Caliptra FMC ...
2,684,290 UART:
2,684,344 UART: [state] CFI Enabled
2,694,930 UART: [fht] FMC Alias Private Key: 7
2,802,281 UART: [art] Extend RT PCRs Done
2,802,709 UART: [art] Lock RT PCRs Done
2,804,441 UART: [art] Populate DV Done
2,812,720 UART: [fht] FMC Alias Private Key: 7
2,813,712 UART: [art] Derive CDI
2,813,992 UART: [art] Store in in slot 0x4
2,899,061 UART: [art] Derive Key Pair
2,899,421 UART: [art] Store priv key in slot 0x5
2,913,047 UART: [art] Derive Key Pair - Done
2,928,036 UART: [art] Signing Cert with AUTHO
2,928,516 UART: RITY.KEYID = 7
2,943,704 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,469 UART: [art] PUB.X = 18D8DBE73EBC76BEC09147D1BAB1ED802E1F1A9404DCCD2DC3DC47735F05D82DF01BE3BC63EDF85E4523CB4A7AFE4534
2,951,261 UART: [art] PUB.Y = D43471C527D4819968D9587C214CF48166BED408A587951FA1666D6460FFA3F1C6A8E008C5D91A3FEEAE7D6B1B4F0D64
2,958,208 UART: [art] SIG.R = 242F9E700C7BB7F51E4948410B4FF0389036E2CC24BE34A06A23AF312774D2F77E0C583B3DFA27CB10E9ACFAF4FC39FA
2,964,985 UART: [art] SIG.S = 3556CD39A5637FFECB9223B066243C2F363EDDEA7A029F936CA153B052E5943C5A60FA4FDCFFBF5F60DFEB670A0615D6
2,988,563 UART: Caliptra RT
2,988,816 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,092,115 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE6 ra=0x40007056 error_internal_intr_r=00000040
3,094,612 UART: [rt] WDT Expired
3,094,899 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,545 >>> mbox cmd response: success
2,774,568 UART: [afmc] ++
2,774,736 UART: [afmc] CDI.KEYID = 6
2,775,099 UART: [afmc] SUBJECT.KEYID = 7
2,775,525 UART: [afmc] AUTHORITY.KEYID = 5
2,811,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,109 UART: [afmc] --
2,854,987 UART: [cold-reset] --
2,856,031 UART: [state] Locking Datavault
2,857,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,978 UART: [state] Locking ICCM
2,858,452 UART: [exit] Launching FMC @ 0x40000130
2,863,781 UART:
2,863,797 UART: Running Caliptra FMC ...
2,864,205 UART:
2,864,348 UART: [state] CFI Enabled
2,875,277 UART: [fht] FMC Alias Private Key: 7
2,983,986 UART: [art] Extend RT PCRs Done
2,984,414 UART: [art] Lock RT PCRs Done
2,986,022 UART: [art] Populate DV Done
2,994,097 UART: [fht] FMC Alias Private Key: 7
2,995,037 UART: [art] Derive CDI
2,995,317 UART: [art] Store in in slot 0x4
3,080,898 UART: [art] Derive Key Pair
3,081,258 UART: [art] Store priv key in slot 0x5
3,094,564 UART: [art] Derive Key Pair - Done
3,109,430 UART: [art] Signing Cert with AUTHO
3,109,910 UART: RITY.KEYID = 7
3,125,112 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,877 UART: [art] PUB.X = E9DF34A3567686D71D144A4A82E154BC1EEF9196D05D0080358246C4914E2CA0FAF80B11ADC1A0680ED5D42D454215D7
3,132,623 UART: [art] PUB.Y = 86E2D086049A68B20A74160FC1865F9824F4EF3F5E52D722B0188CD9DB114860CD976A6F4DD8F0709ED0B6562BCCD190
3,139,568 UART: [art] SIG.R = 11E72FAA9E1FB93683597079FAF9230AB1C264867D525E9EA6CF761FAB5949F824AC5FB961606A203DC584216E149BD7
3,146,339 UART: [art] SIG.S = 1E93607C41050B1F994735B409A4F885B5B091730449418E431787792D60C91EFAA059C16BCF1BC1444E78AF54B15916
3,170,616 UART: Caliptra RT
3,170,961 UART: [state] CFI Enabled
3,278,918 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 3186139 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,776 >>> mbox cmd response: success
2,774,796 UART: [afmc] ++
2,774,964 UART: [afmc] CDI.KEYID = 6
2,775,327 UART: [afmc] SUBJECT.KEYID = 7
2,775,753 UART: [afmc] AUTHORITY.KEYID = 5
2,811,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,131 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,834,843 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,840,741 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,846,438 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,854,294 UART: [afmc] --
2,855,171 UART: [cold-reset] --
2,856,215 UART: [state] Locking Datavault
2,857,558 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,162 UART: [state] Locking ICCM
2,858,636 UART: [exit] Launching FMC @ 0x40000130
2,863,965 UART:
2,863,981 UART: Running Caliptra FMC ...
2,864,389 UART:
2,864,532 UART: [state] CFI Enabled
2,875,462 UART: [fht] FMC Alias Private Key: 7
2,984,181 UART: [art] Extend RT PCRs Done
2,984,609 UART: [art] Lock RT PCRs Done
2,986,217 UART: [art] Populate DV Done
2,994,292 UART: [fht] FMC Alias Private Key: 7
2,995,232 UART: [art] Derive CDI
2,995,512 UART: [art] Store in in slot 0x4
3,081,091 UART: [art] Derive Key Pair
3,081,451 UART: [art] Store priv key in slot 0x5
3,094,757 UART: [art] Derive Key Pair - Done
3,109,621 UART: [art] Signing Cert with AUTHO
3,110,101 UART: RITY.KEYID = 7
3,125,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,068 UART: [art] PUB.X = 9D4DA9BED0DDAB0A809EF4634C89A0ACC7E41989BA06AEDBD1E630CAF503E35234E61668A9822C99FE36F67677C37221
3,132,843 UART: [art] PUB.Y = 4A4BE1E96D740599443703D9DB4946F664043F3F370F5884A02A64F086B4A18E59C722E76E291F28F288E76151F15709
3,139,766 UART: [art] SIG.R = 919455A5737D90851C0451B8A40A26C4AFC98E722B4CD2E20D1FB8170B66DC404E8E1D4DE4A5B9F1BD1DA56E246A9BC6
3,146,536 UART: [art] SIG.S = EFC5E0FF4DA64A75A0C32BF7D65881F95D5D489E5C2622393E7835CA43B852B762D12A3923569096A22C10FE65CE2CF6
3,170,839 UART: Caliptra RT
3,171,184 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,274,712 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DDC ra=0x40007056 error_internal_intr_r=00000040
3,277,211 UART: [rt] WDT Expired
3,277,498 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,411 >>> mbox cmd response: success
2,686,303 UART:
2,686,319 UART: Running Caliptra FMC ...
2,686,727 UART:
2,686,870 UART: [state] CFI Enabled
2,697,799 UART: [fht] FMC Alias Private Key: 7
2,806,508 UART: [art] Extend RT PCRs Done
2,806,936 UART: [art] Lock RT PCRs Done
2,808,544 UART: [art] Populate DV Done
2,816,619 UART: [fht] FMC Alias Private Key: 7
2,817,559 UART: [art] Derive CDI
2,817,839 UART: [art] Store in in slot 0x4
2,903,420 UART: [art] Derive Key Pair
2,903,780 UART: [art] Store priv key in slot 0x5
2,917,086 UART: [art] Derive Key Pair - Done
2,931,960 UART: [art] Signing Cert with AUTHO
2,932,440 UART: RITY.KEYID = 7
2,947,642 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,407 UART: [art] PUB.X = 1D41425A139B6C6C9C0A00BE7CDCE1DB7EC537528610323A6A5E27F3981C10FF2B60477839A57F6A50B50CD865E31470
2,955,151 UART: [art] PUB.Y = 95A47AA6BDDFD488732F1D919CA757EB005B39C5819895AFD21FECAECA543EB67F6F2CD18D69695EC339D403B55EF126
2,962,092 UART: [art] SIG.R = C5C427D5AB6B44E1A76D0AA70FD3A1D1360E1AF6CABE2DBD9DDE827476BE876734D2261EBBD68B95CFB9D558A408EF4F
2,968,876 UART: [art] SIG.S = 6E7D3562B2F7EC6CD3A64B5B5D9BB955A12CC7CF5E0B7B6816B8D906D9D1177D63FE2906D50BDBBC3B61EEA6315FCF7C
2,993,187 UART: Caliptra RT
2,993,532 UART: [state] CFI Enabled
3,101,439 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,658 >>> mbox cmd response: success
2,686,539 UART:
2,686,555 UART: Running Caliptra FMC ...
2,686,963 UART:
2,687,106 UART: [state] CFI Enabled
2,698,036 UART: [fht] FMC Alias Private Key: 7
2,806,755 UART: [art] Extend RT PCRs Done
2,807,183 UART: [art] Lock RT PCRs Done
2,808,791 UART: [art] Populate DV Done
2,816,866 UART: [fht] FMC Alias Private Key: 7
2,817,806 UART: [art] Derive CDI
2,818,086 UART: [art] Store in in slot 0x4
2,903,665 UART: [art] Derive Key Pair
2,904,025 UART: [art] Store priv key in slot 0x5
2,917,331 UART: [art] Derive Key Pair - Done
2,932,200 UART: [art] Signing Cert with AUTHO
2,932,680 UART: RITY.KEYID = 7
2,947,882 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,647 UART: [art] PUB.X = D3950BD117DDF76F861D946E668720BB8654392CE9B7E31D341E25676E84143BC6AA4F946541EA3C92BA862D98EA9502
2,955,411 UART: [art] PUB.Y = 73778DDD64D77BC2DE3A7CB677121D8C4AE61B81CC68E9991685C23CFA4060D5438487CD5E161DEC5453A830924BB48D
2,962,367 UART: [art] SIG.R = 5C070AE78868A070C8138F45B3346ECC8F2438ECCB83B71C5E0CDAD310EB08BD084C10E66C6E1AF6757B943EF5D6B78E
2,969,136 UART: [art] SIG.S = 5707C9B38BF9F2C6662A47E64F568B269D0737F4FB9EAAD0519FD05B4A0AD5BA470BECCCC1C2913E49F48E489ADC16E6
2,993,439 UART: Caliptra RT
2,993,784 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,097,207 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DE2 ra=0x40007056 error_internal_intr_r=00000040
3,099,704 UART: [rt] WDT Expired
3,099,991 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,344 UART: [kat] SHA2-512-ACC
906,245 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,113 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
891,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,407 UART: [kat] LMS
1,168,719 UART: [kat] --
1,169,700 UART: [cold-reset] ++
1,170,026 UART: [fht] FHT @ 0x50003400
1,172,734 UART: [idev] ++
1,172,902 UART: [idev] CDI.KEYID = 6
1,173,263 UART: [idev] SUBJECT.KEYID = 7
1,173,688 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,149 UART: [kat] ++
895,301 UART: [kat] sha1
899,371 UART: [kat] SHA2-256
901,311 UART: [kat] SHA2-384
904,048 UART: [kat] SHA2-512-ACC
905,949 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,893 UART: [cold-reset] ++
1,170,457 UART: [fht] FHT @ 0x50003400
1,172,977 UART: [idev] ++
1,173,145 UART: [idev] CDI.KEYID = 6
1,173,506 UART: [idev] SUBJECT.KEYID = 7
1,173,931 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,041 UART: [state] LifecycleState = Unprovisioned
85,696 UART: [state] DebugLocked = No
86,178 UART: [state] WD Timer not started. Device not locked for debugging
87,411 UART: [kat] SHA2-256
890,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,090 UART: [kat] ++
895,242 UART: [kat] sha1
899,422 UART: [kat] SHA2-256
901,362 UART: [kat] SHA2-384
904,191 UART: [kat] SHA2-512-ACC
906,092 UART: [kat] ECC-384
915,699 UART: [kat] HMAC-384Kdf
920,315 UART: [kat] LMS
1,168,627 UART: [kat] --
1,169,610 UART: [cold-reset] ++
1,169,986 UART: [fht] FHT @ 0x50003400
1,172,422 UART: [idev] ++
1,172,590 UART: [idev] CDI.KEYID = 6
1,172,951 UART: [idev] SUBJECT.KEYID = 7
1,173,376 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
891,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,461 UART: [kat] ++
895,613 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,120 UART: [kat] HMAC-384Kdf
920,504 UART: [kat] LMS
1,168,816 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,467 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,925 UART: [kat] SHA2-512-ACC
906,826 UART: [kat] ECC-384
916,675 UART: [kat] HMAC-384Kdf
921,255 UART: [kat] LMS
1,169,567 UART: [kat] --
1,170,482 UART: [cold-reset] ++
1,171,000 UART: [fht] FHT @ 0x50003400
1,173,568 UART: [idev] ++
1,173,736 UART: [idev] CDI.KEYID = 6
1,174,097 UART: [idev] SUBJECT.KEYID = 7
1,174,522 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
191,969 UART:
192,325 UART: Running Caliptra ROM ...
193,515 UART:
193,667 UART: [state] CFI Enabled
263,186 UART: [state] LifecycleState = Production
265,008 UART: [state] DebugLocked = Yes
267,362 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,164 UART: [kat] SHA2-256
442,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,393 UART: [kat] ++
453,952 UART: [kat] sha1
464,759 UART: [kat] SHA2-256
467,474 UART: [kat] SHA2-384
473,315 UART: [kat] SHA2-512-ACC
475,686 UART: [kat] ECC-384
2,768,821 UART: [kat] HMAC-384Kdf
2,800,606 UART: [kat] LMS
3,990,944 UART: [kat] --
3,995,951 UART: [cold-reset] ++
3,997,317 UART: [fht] Storing FHT @ 0x50003400
4,007,876 UART: [idev] ++
4,008,465 UART: [idev] CDI.KEYID = 6
4,009,499 UART: [idev] SUBJECT.KEYID = 7
4,010,677 UART: [idev] UDS.KEYID = 0
4,011,614 ready_for_fw is high
4,011,814 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,392 UART: [idev] Erasing UDS.KEYID = 0
7,346,106 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,591 UART: [idev] --
7,372,125 UART: [ldev] ++
7,372,701 UART: [ldev] CDI.KEYID = 6
7,373,678 UART: [ldev] SUBJECT.KEYID = 5
7,374,888 UART: [ldev] AUTHORITY.KEYID = 7
7,376,111 UART: [ldev] FE.KEYID = 1
7,424,192 UART: [ldev] Erasing FE.KEYID = 1
10,760,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,074,490 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,089,084 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,103,725 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,118,034 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,137,455 UART: [ldev] --
13,141,421 UART: [fwproc] Waiting for Commands...
13,144,159 UART: [fwproc] Received command 0x46574c44
13,146,387 UART: [fwproc] Received Image of size 114124 bytes
17,227,493 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,306,911 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,375,869 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,693,239 >>> mbox cmd response: success
17,698,045 UART: [afmc] ++
17,698,640 UART: [afmc] CDI.KEYID = 6
17,699,609 UART: [afmc] SUBJECT.KEYID = 7
17,700,818 UART: [afmc] AUTHORITY.KEYID = 5
21,057,593 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,356,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,358,948 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,373,589 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,388,314 UART: [afmc] SIG.R = EC6891EB1A3F96540781A31816199D571A083C15DF9C4DF0C1E48A104C3935824ECED7C806B580AE3D0F3A19B3E3967B
23,402,644 UART: [afmc] SIG.S = 74A950705B0FDD287AED868A70BC469716DDBE28F41792C5E4E1BEEA41D9B1D1DCCD41BBACE162F0BE4C90875AE15673
23,423,054 UART: [afmc] --
23,426,540 UART: [cold-reset] --
23,428,672 UART: [state] Locking Datavault
23,433,267 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,022 UART: [state] Locking ICCM
23,437,312 UART: [exit] Launching FMC @ 0x40000130
23,445,705 UART:
23,445,935 UART: Running Caliptra FMC ...
23,447,032 UART:
23,447,188 UART: [state] CFI Enabled
23,517,503 UART: [fht] FMC Alias Private Key: 7
25,855,265 UART: [art] Extend RT PCRs Done
25,856,502 UART: [art] Lock RT PCRs Done
25,858,293 UART: [art] Populate DV Done
25,863,427 UART: [fht] FMC Alias Private Key: 7
25,864,908 UART: [art] Derive CDI
25,865,665 UART: [art] Store in in slot 0x4
25,925,840 UART: [art] Derive Key Pair
25,926,883 UART: [art] Store priv key in slot 0x5
29,219,533 UART: [art] Derive Key Pair - Done
29,232,477 UART: [art] Signing Cert with AUTHO
29,233,778 UART: RITY.KEYID = 7
31,521,030 UART: [art] Erasing AUTHORITY.KEYID = 7
31,522,542 UART: [art] PUB.X = 97B054D847B6D46207275E3D39644429C36C2BE5F8A4DF2471F04F9DEEC60B29A0426DCCA596471E2EEAD7F5B42D998B
31,529,796 UART: [art] PUB.Y = A35038FC501F6093B875A98FEE42249BA252F5FB4903F38B0D761B4A98D1833786BC08266A9477A9FC0391A7BEFAF021
31,536,974 UART: [art] SIG.R = 05943DFD536E00A124E4FE8C3BF449E78B71038F39C194074800805F0FCFB478658066AB374D37391E57B49E0E3116CC
31,544,362 UART: [art] SIG.S = DC48C3AB0C6C9B7893DD3FADC0AEBB9B305B718FC28FF967CEDBA0F4D24E0B552AA18A4E6988AFDBA2DA5174B537175C
32,850,164 UART: Caliptra RT
32,850,863 UART: [state] CFI Enabled
33,013,161 UART: [rt] RT listening for mailbox commands...
Initializing fuses
990 UART:
1,139 UART: Running Caliptra ROM ...
2,237 UART:
2,380 UART: [state] CFI Enabled
63,472 UART: [state] LifecycleState = Production
65,246 UART: [state] DebugLocked = Yes
66,691 UART: [state] Starting the Watchdog Timer 40000000 cycles
71,156 UART: [kat] SHA2-256
240,867 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
251,382 UART: [kat] ++
251,821 UART: [kat] sha1
262,692 UART: [kat] SHA2-256
265,395 UART: [kat] SHA2-384
272,127 UART: [kat] SHA2-512-ACC
274,515 UART: [kat] ECC-384
2,565,713 UART: [kat] HMAC-384Kdf
2,598,243 UART: [kat] LMS
3,788,573 UART: [kat] --
3,793,046 UART: [warm-reset] ++
3,798,539 UART: [warm-reset] --
3,801,896 UART: [state] Locking Datavault
3,804,015 UART: [state] Locking PCR0, PCR1 and PCR31
3,805,771 UART: [state] Locking ICCM
3,807,324 UART: [exit] Launching FMC @ 0x40000130
3,815,721 UART:
3,815,953 UART: Running Caliptra FMC ...
3,817,055 UART:
3,817,217 UART: [state] CFI Enabled
3,869,947 UART: [aliasrt :skip pcr extension
3,871,235 UART: [art] Extend RT PCRs Done
3,872,382 UART: [art] Lock RT PCRs Done
3,873,557 UART: [art] Populate DV Done
3,879,341 UART: [fht] FMC Alias Private Key: 7
3,880,876 UART: [art] Derive CDI
3,881,688 UART: [art] Store in in slot 0x4
3,938,342 UART: [art] Derive Key Pair
3,939,374 UART: [art] Store priv key in slot 0x5
7,232,793 UART: [art] Derive Key Pair - Done
7,245,265 UART: [art] Signing Cert with AUTHO
7,246,579 UART: RITY.KEYID = 7
9,534,305 UART: [art] Erasing AUTHORITY.KEYID = 7
9,535,826 UART: [art] PUB.X = 97B054D847B6D46207275E3D39644429C36C2BE5F8A4DF2471F04F9DEEC60B29A0426DCCA596471E2EEAD7F5B42D998B
9,543,072 UART: [art] PUB.Y = A35038FC501F6093B875A98FEE42249BA252F5FB4903F38B0D761B4A98D1833786BC08266A9477A9FC0391A7BEFAF021
9,550,322 UART: [art] SIG.R = 05943DFD536E00A124E4FE8C3BF449E78B71038F39C194074800805F0FCFB478658066AB374D37391E57B49E0E3116CC
9,557,685 UART: [art] SIG.S = DC48C3AB0C6C9B7893DD3FADC0AEBB9B305B718FC28FF967CEDBA0F4D24E0B552AA18A4E6988AFDBA2DA5174B537175C
10,862,703 UART: Caliptra RT
10,863,411 UART: [state] CFI Enabled
11,196,301 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,784,578 ready_for_fw is high
3,784,987 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,916,909 >>> mbox cmd response: success
23,611,762 UART:
23,612,176 UART: Running Caliptra FMC ...
23,613,296 UART:
23,613,481 UART: [state] CFI Enabled
23,682,230 UART: [fht] FMC Alias Private Key: 7
26,019,921 UART: [art] Extend RT PCRs Done
26,021,154 UART: [art] Lock RT PCRs Done
26,023,081 UART: [art] Populate DV Done
26,028,618 UART: [fht] FMC Alias Private Key: 7
26,030,328 UART: [art] Derive CDI
26,031,145 UART: [art] Store in in slot 0x4
26,091,431 UART: [art] Derive Key Pair
26,092,442 UART: [art] Store priv key in slot 0x5
29,385,425 UART: [art] Derive Key Pair - Done
29,398,366 UART: [art] Signing Cert with AUTHO
29,399,699 UART: RITY.KEYID = 7
31,687,661 UART: [art] Erasing AUTHORITY.KEYID = 7
31,689,177 UART: [art] PUB.X = 5CDCAD27DD57DE2FA36F275A7E43E8B796BCB8727A90A4722406CF020B295D60061ABF50AC5AEAF084DE925C8420235A
31,696,478 UART: [art] PUB.Y = F9C26D16F7E645075B2C7AF71DC123BD82815AD7E5B79637B1469FA0CC8CA81C7E125DB3C4A2FED1490EDF0A1370BDC6
31,703,706 UART: [art] SIG.R = 09F39F8DCA7BD717EB15CBFC9A7607BBA0B0D0FB13DAC00810CB901ED602E71EA7C063C7495310B72293282781C5795D
31,711,080 UART: [art] SIG.S = F316A58F0B92B70706E1EB850C094DA32904D5784ACFAAF88C620013D9C1C5F3C8973F7634DA93C94395D81E2F7BC347
33,016,442 UART: Caliptra RT
33,017,152 UART: [state] CFI Enabled
33,178,041 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,614,191 UART:
3,614,518 UART: Running Caliptra FMC ...
3,615,557 UART:
3,615,708 UART: [state] CFI Enabled
3,679,176 UART: [aliasrt :skip pcr extension
3,680,472 UART: [art] Extend RT PCRs Done
3,681,538 UART: [art] Lock RT PCRs Done
3,683,058 UART: [art] Populate DV Done
3,688,698 UART: [fht] FMC Alias Private Key: 7
3,690,285 UART: [art] Derive CDI
3,691,042 UART: [art] Store in in slot 0x4
3,747,657 UART: [art] Derive Key Pair
3,748,695 UART: [art] Store priv key in slot 0x5
7,041,634 UART: [art] Derive Key Pair - Done
7,054,644 UART: [art] Signing Cert with AUTHO
7,055,948 UART: RITY.KEYID = 7
9,342,598 UART: [art] Erasing AUTHORITY.KEYID = 7
9,344,108 UART: [art] PUB.X = 5CDCAD27DD57DE2FA36F275A7E43E8B796BCB8727A90A4722406CF020B295D60061ABF50AC5AEAF084DE925C8420235A
9,351,375 UART: [art] PUB.Y = F9C26D16F7E645075B2C7AF71DC123BD82815AD7E5B79637B1469FA0CC8CA81C7E125DB3C4A2FED1490EDF0A1370BDC6
9,358,625 UART: [art] SIG.R = 09F39F8DCA7BD717EB15CBFC9A7607BBA0B0D0FB13DAC00810CB901ED602E71EA7C063C7495310B72293282781C5795D
9,365,980 UART: [art] SIG.S = F316A58F0B92B70706E1EB850C094DA32904D5784ACFAAF88C620013D9C1C5F3C8973F7634DA93C94395D81E2F7BC347
10,671,168 UART: Caliptra RT
10,671,855 UART: [state] CFI Enabled
11,006,737 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
191,836 UART:
192,202 UART: Running Caliptra ROM ...
193,284 UART:
603,049 UART: [state] CFI Enabled
615,932 UART: [state] LifecycleState = Production
617,696 UART: [state] DebugLocked = Yes
620,484 UART: [state] Starting the Watchdog Timer 40000000 cycles
625,290 UART: [kat] SHA2-256
795,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,655 UART: [kat] ++
806,132 UART: [kat] sha1
817,857 UART: [kat] SHA2-256
820,504 UART: [kat] SHA2-384
826,852 UART: [kat] SHA2-512-ACC
829,215 UART: [kat] ECC-384
3,111,822 UART: [kat] HMAC-384Kdf
3,124,111 UART: [kat] LMS
4,314,265 UART: [kat] --
4,319,180 UART: [cold-reset] ++
4,321,079 UART: [fht] Storing FHT @ 0x50003400
4,331,500 UART: [idev] ++
4,332,062 UART: [idev] CDI.KEYID = 6
4,332,995 UART: [idev] SUBJECT.KEYID = 7
4,334,239 UART: [idev] UDS.KEYID = 0
4,335,160 ready_for_fw is high
4,335,393 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,628 UART: [idev] Erasing UDS.KEYID = 0
7,621,016 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,779 UART: [idev] --
7,647,023 UART: [ldev] ++
7,647,590 UART: [ldev] CDI.KEYID = 6
7,648,522 UART: [ldev] SUBJECT.KEYID = 5
7,649,783 UART: [ldev] AUTHORITY.KEYID = 7
7,651,012 UART: [ldev] FE.KEYID = 1
7,662,790 UART: [ldev] Erasing FE.KEYID = 1
10,953,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,703 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,260,230 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,274,923 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,289,288 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,308,069 UART: [ldev] --
13,312,202 UART: [fwproc] Waiting for Commands...
13,314,185 UART: [fwproc] Received command 0x46574c44
13,316,365 UART: [fwproc] Received Image of size 114124 bytes
17,403,405 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,474,914 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,543,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,861,271 >>> mbox cmd response: success
17,865,476 UART: [afmc] ++
17,866,065 UART: [afmc] CDI.KEYID = 6
17,866,957 UART: [afmc] SUBJECT.KEYID = 7
17,868,224 UART: [afmc] AUTHORITY.KEYID = 5
21,180,202 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,475,539 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,477,812 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,492,501 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,507,226 UART: [afmc] SIG.R = EC6891EB1A3F96540781A31816199D571A083C15DF9C4DF0C1E48A104C3935824ECED7C806B580AE3D0F3A19B3E3967B
23,521,630 UART: [afmc] SIG.S = 74A950705B0FDD287AED868A70BC469716DDBE28F41792C5E4E1BEEA41D9B1D1DCCD41BBACE162F0BE4C90875AE15673
23,543,547 UART: [afmc] --
23,547,732 UART: [cold-reset] --
23,551,212 UART: [state] Locking Datavault
23,555,646 UART: [state] Locking PCR0, PCR1 and PCR31
23,557,348 UART: [state] Locking ICCM
23,559,063 UART: [exit] Launching FMC @ 0x40000130
23,567,457 UART:
23,567,687 UART: Running Caliptra FMC ...
23,568,783 UART:
23,568,938 UART: [state] CFI Enabled
23,577,065 UART: [fht] FMC Alias Private Key: 7
25,907,777 UART: [art] Extend RT PCRs Done
25,909,010 UART: [art] Lock RT PCRs Done
25,910,529 UART: [art] Populate DV Done
25,916,101 UART: [fht] FMC Alias Private Key: 7
25,917,847 UART: [art] Derive CDI
25,918,655 UART: [art] Store in in slot 0x4
25,961,401 UART: [art] Derive Key Pair
25,962,411 UART: [art] Store priv key in slot 0x5
29,204,830 UART: [art] Derive Key Pair - Done
29,217,720 UART: [art] Signing Cert with AUTHO
29,219,017 UART: RITY.KEYID = 7
31,498,396 UART: [art] Erasing AUTHORITY.KEYID = 7
31,499,901 UART: [art] PUB.X = 3FEFF1D4EDFBABA288CC828CC1FAB3F43803FAC14A248ACD369DD6A6D6CD7AA10E7331B1A37B4A5CB27329706C1BDC7A
31,507,202 UART: [art] PUB.Y = A66749103B14F087DDD40C910103A67F7F8F71FC4E3532CC66F3DEF6EA2573348DA4CAA43D2F8B91D4A7728BA4D0F67F
31,514,479 UART: [art] SIG.R = 97FD18F1E836A2DCCE2F5611C40CA9A7D4D577D1A9EC73CD8BBAD653A7EA7573EA5E265CDB3F2D26DECE5CADCFDA7244
31,521,896 UART: [art] SIG.S = BA6BD13ECDB167D38518713ED98DD90AE8B895F12092792008538B32F3A23407E388DF281BE6B1D0D40299644EF46517
32,826,386 UART: Caliptra RT
32,827,112 UART: [state] CFI Enabled
32,944,120 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,004 UART:
1,269 UART: Running Caliptra ROM ...
2,380 UART:
7,584,260 UART: [state] CFI Enabled
7,601,073 UART: [state] LifecycleState = Production
7,602,878 UART: [state] DebugLocked = Yes
7,604,297 UART: [state] Starting the Watchdog Timer 40000000 cycles
7,610,213 UART: [kat] SHA2-256
7,780,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,790,540 UART: [kat] ++
7,791,025 UART: [kat] sha1
7,800,878 UART: [kat] SHA2-256
7,803,621 UART: [kat] SHA2-384
7,808,646 UART: [kat] SHA2-512-ACC
7,810,992 UART: [kat] ECC-384
10,094,589 UART: [kat] HMAC-384Kdf
10,104,876 UART: [kat] LMS
11,295,033 UART: [kat] --
11,300,468 UART: [warm-reset] ++
11,305,734 UART: [warm-reset] --
11,308,994 UART: [state] Locking Datavault
11,313,210 UART: [state] Locking PCR0, PCR1 and PCR31
11,314,995 UART: [state] Locking ICCM
11,317,390 UART: [exit] Launching FMC @ 0x40000130
11,325,778 UART:
11,326,005 UART: Running Caliptra FMC ...
11,327,030 UART:
11,327,173 UART: [state] CFI Enabled
11,329,219 UART: [aliasrt :skip pcr extension
11,330,477 UART: [art] Extend RT PCRs Done
11,331,530 UART: [art] Lock RT PCRs Done
11,332,856 UART: [art] Populate DV Done
11,338,578 UART: [fht] FMC Alias Private Key: 7
11,340,159 UART: [art] Derive CDI
11,340,903 UART: [art] Store in in slot 0x4
11,383,490 UART: [art] Derive Key Pair
11,384,545 UART: [art] Store priv key in slot 0x5
14,626,866 UART: [art] Derive Key Pair - Done
14,639,984 UART: [art] Signing Cert with AUTHO
14,641,286 UART: RITY.KEYID = 7
16,920,831 UART: [art] Erasing AUTHORITY.KEYID = 7
16,922,557 UART: [art] PUB.X = 3FEFF1D4EDFBABA288CC828CC1FAB3F43803FAC14A248ACD369DD6A6D6CD7AA10E7331B1A37B4A5CB27329706C1BDC7A
16,929,664 UART: [art] PUB.Y = A66749103B14F087DDD40C910103A67F7F8F71FC4E3532CC66F3DEF6EA2573348DA4CAA43D2F8B91D4A7728BA4D0F67F
16,936,908 UART: [art] SIG.R = 97FD18F1E836A2DCCE2F5611C40CA9A7D4D577D1A9EC73CD8BBAD653A7EA7573EA5E265CDB3F2D26DECE5CADCFDA7244
16,944,298 UART: [art] SIG.S = BA6BD13ECDB167D38518713ED98DD90AE8B895F12092792008538B32F3A23407E388DF281BE6B1D0D40299644EF46517
18,249,692 UART: Caliptra RT
18,250,406 UART: [state] CFI Enabled
18,539,536 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,127,972 ready_for_fw is high
4,128,412 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,103,615 >>> mbox cmd response: success
23,740,803 UART:
23,741,207 UART: Running Caliptra FMC ...
23,742,340 UART:
23,742,506 UART: [state] CFI Enabled
23,750,546 UART: [fht] FMC Alias Private Key: 7
26,080,683 UART: [art] Extend RT PCRs Done
26,081,922 UART: [art] Lock RT PCRs Done
26,083,956 UART: [art] Populate DV Done
26,089,485 UART: [fht] FMC Alias Private Key: 7
26,091,087 UART: [art] Derive CDI
26,091,905 UART: [art] Store in in slot 0x4
26,134,455 UART: [art] Derive Key Pair
26,135,493 UART: [art] Store priv key in slot 0x5
29,377,798 UART: [art] Derive Key Pair - Done
29,390,641 UART: [art] Signing Cert with AUTHO
29,391,950 UART: RITY.KEYID = 7
31,671,297 UART: [art] Erasing AUTHORITY.KEYID = 7
31,672,803 UART: [art] PUB.X = 408C4B84C9ED09271380ED4EC82026DA160C68E97EC6E4D447CB444921C2BE0213DB028F15FBD0DAEA28FDB0F5AE9345
31,680,070 UART: [art] PUB.Y = ECF82D678DDE7D7756F8A921F9AB0FB69247087C97ED4B7B0D8772572C209E205DA5A54D49CB9B20DDF77B5FD3F8ABAE
31,687,305 UART: [art] SIG.R = 737B79A39007F4AA63C37C711DA12F946B8666CC2689807140458800CCF4250ABA99CC189A849D9985EC1741F5A30EA8
31,694,699 UART: [art] SIG.S = 0E3892BF5C9E51735C335DB47BA36BE03D51BE7629DB8E92BC6626535A41B474B7B4B04A990928FDCE0A31E991FE576E
32,999,813 UART: Caliptra RT
33,000,514 UART: [state] CFI Enabled
33,118,008 UART: [rt] RT listening for mailbox commands...
Initializing fuses
10,940,502 UART:
10,940,880 UART: Running Caliptra FMC ...
10,941,923 UART:
10,942,072 UART: [state] CFI Enabled
10,943,941 UART: [aliasrt :skip pcr extension
10,945,100 UART: [art] Extend RT PCRs Done
10,946,149 UART: [art] Lock RT PCRs Done
10,947,755 UART: [art] Populate DV Done
10,953,452 UART: [fht] FMC Alias Private Key: 7
10,954,963 UART: [art] Derive CDI
10,955,728 UART: [art] Store in in slot 0x4
10,998,183 UART: [art] Derive Key Pair
10,999,221 UART: [art] Store priv key in slot 0x5
14,241,251 UART: [art] Derive Key Pair - Done
14,254,198 UART: [art] Signing Cert with AUTHO
14,255,499 UART: RITY.KEYID = 7
16,535,031 UART: [art] Erasing AUTHORITY.KEYID = 7
16,536,539 UART: [art] PUB.X = 408C4B84C9ED09271380ED4EC82026DA160C68E97EC6E4D447CB444921C2BE0213DB028F15FBD0DAEA28FDB0F5AE9345
16,543,793 UART: [art] PUB.Y = ECF82D678DDE7D7756F8A921F9AB0FB69247087C97ED4B7B0D8772572C209E205DA5A54D49CB9B20DDF77B5FD3F8ABAE
16,551,075 UART: [art] SIG.R = 737B79A39007F4AA63C37C711DA12F946B8666CC2689807140458800CCF4250ABA99CC189A849D9985EC1741F5A30EA8
16,558,413 UART: [art] SIG.S = 0E3892BF5C9E51735C335DB47BA36BE03D51BE7629DB8E92BC6626535A41B474B7B4B04A990928FDCE0A31E991FE576E
17,863,296 UART: Caliptra RT
17,864,007 UART: [state] CFI Enabled
18,149,533 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
191,949 UART:
192,334 UART: Running Caliptra ROM ...
193,628 UART:
193,777 UART: [state] CFI Enabled
268,712 UART: [state] LifecycleState = Production
270,508 UART: [state] DebugLocked = Yes
273,427 UART: [state] Starting the WD Timer 40000000 cycles
278,447 UART: [kat] SHA2-256
457,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
469,150 UART: [kat] ++
469,592 UART: [kat] sha1
481,546 UART: [kat] SHA2-256
484,617 UART: [kat] SHA2-384
491,249 UART: [kat] SHA2-512-ACC
494,203 UART: [kat] ECC-384
2,952,593 UART: [kat] HMAC-384Kdf
2,974,072 UART: [kat] LMS
3,503,542 UART: [kat] --
3,506,894 UART: [cold-reset] ++
3,509,035 UART: [fht] FHT @ 0x50003400
3,521,716 UART: [idev] ++
3,522,274 UART: [idev] CDI.KEYID = 6
3,523,180 UART: [idev] SUBJECT.KEYID = 7
3,524,421 UART: [idev] UDS.KEYID = 0
3,525,342 ready_for_fw is high
3,525,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,478 UART: [idev] Erasing UDS.KEYID = 0
6,030,252 UART: [idev] Sha1 KeyId Algorithm
6,052,503 UART: [idev] --
6,055,908 UART: [ldev] ++
6,056,505 UART: [ldev] CDI.KEYID = 6
6,057,392 UART: [ldev] SUBJECT.KEYID = 5
6,058,609 UART: [ldev] AUTHORITY.KEYID = 7
6,059,764 UART: [ldev] FE.KEYID = 1
6,102,946 UART: [ldev] Erasing FE.KEYID = 1
8,606,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,277 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,259 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,076 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,019 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,250 UART: [ldev] --
10,414,185 UART: [fwproc] Wait for Commands...
10,417,244 UART: [fwproc] Recv command 0x46574c44
10,419,441 UART: [fwproc] Recv'd Img size: 114448 bytes
13,860,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,931,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,000,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,319,722 >>> mbox cmd response: success
14,323,888 UART: [afmc] ++
14,324,474 UART: [afmc] CDI.KEYID = 6
14,325,379 UART: [afmc] SUBJECT.KEYID = 7
14,326,537 UART: [afmc] AUTHORITY.KEYID = 5
16,853,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,577,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,579,467 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,595,464 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,611,279 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,627,033 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,651,031 UART: [afmc] --
18,654,297 UART: [cold-reset] --
18,659,248 UART: [state] Locking Datavault
18,663,671 UART: [state] Locking PCR0, PCR1 and PCR31
18,665,345 UART: [state] Locking ICCM
18,666,988 UART: [exit] Launching FMC @ 0x40000130
18,675,380 UART:
18,675,608 UART: Running Caliptra FMC ...
18,676,643 UART:
18,676,787 UART: [state] CFI Enabled
18,735,357 UART: [fht] FMC Alias Private Key: 7
20,499,500 UART: [art] Extend RT PCRs Done
20,500,720 UART: [art] Lock RT PCRs Done
20,501,825 UART: [art] Populate DV Done
20,507,227 UART: [fht] FMC Alias Private Key: 7
20,508,924 UART: [art] Derive CDI
20,509,654 UART: [art] Store in in slot 0x4
20,569,067 UART: [art] Derive Key Pair
20,570,066 UART: [art] Store priv key in slot 0x5
23,033,053 UART: [art] Derive Key Pair - Done
23,046,122 UART: [art] Signing Cert with AUTHO
23,047,424 UART: RITY.KEYID = 7
24,759,481 UART: [art] Erasing AUTHORITY.KEYID = 7
24,760,987 UART: [art] PUB.X = 2151CB1CD4932B005864D37FF7B93D048954AE7E696B96CE7E4F28B5626029AC6561273B92F884816168CF529834A4F7
24,768,214 UART: [art] PUB.Y = E716161B64F94ECB8E3DF3611ED6F8E51E373F3499DDB9A606F869753670FD2EE67B9183590A1C9B4E505202BB43253A
24,775,468 UART: [art] SIG.R = CE96953AFDFCE19A0327C67387E5357D741683AA525D72C735DD3F8FC78274219F0979A3E3A6A3CFC57AD24711FBEFF4
24,782,881 UART: [art] SIG.S = 48E8542D31F5D994AE44924ED437B749241D817FCF4268BAB9016DEF008DF3F69886819CB71E9288337991BEA448D997
25,761,747 UART: Caliptra RT
25,762,449 UART: [state] CFI Enabled
25,928,173 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,057 UART:
1,315 UART: Running Caliptra ROM ...
2,420 UART:
2,571 UART: [state] CFI Enabled
66,245 UART: [state] LifecycleState = Production
68,027 UART: [state] DebugLocked = Yes
70,310 UART: [state] Starting the WD Timer 40000000 cycles
75,787 UART: [kat] SHA2-256
254,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
266,551 UART: [kat] ++
267,075 UART: [kat] sha1
278,931 UART: [kat] SHA2-256
281,925 UART: [kat] SHA2-384
289,027 UART: [kat] SHA2-512-ACC
292,017 UART: [kat] ECC-384
2,748,330 UART: [kat] HMAC-384Kdf
2,771,297 UART: [kat] LMS
3,300,801 UART: [kat] --
3,304,915 UART: [warm-reset] ++
3,309,440 UART: [warm-reset] --
3,313,624 UART: [state] Locking Datavault
3,315,650 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,295 UART: [state] Locking ICCM
3,318,365 UART: [exit] Launching FMC @ 0x40000130
3,326,814 UART:
3,327,048 UART: Running Caliptra FMC ...
3,328,149 UART:
3,328,308 UART: [state] CFI Enabled
3,381,114 UART: [aliasrt :skip pcr extension
3,382,401 UART: [art] Extend RT PCRs Done
3,383,549 UART: [art] Lock RT PCRs Done
3,384,828 UART: [art] Populate DV Done
3,390,555 UART: [fht] FMC Alias Private Key: 7
3,392,151 UART: [art] Derive CDI
3,392,960 UART: [art] Store in in slot 0x4
3,449,783 UART: [art] Derive Key Pair
3,450,826 UART: [art] Store priv key in slot 0x5
5,913,501 UART: [art] Derive Key Pair - Done
5,926,884 UART: [art] Signing Cert with AUTHO
5,928,192 UART: RITY.KEYID = 7
7,639,612 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,121 UART: [art] PUB.X = 2151CB1CD4932B005864D37FF7B93D048954AE7E696B96CE7E4F28B5626029AC6561273B92F884816168CF529834A4F7
7,648,364 UART: [art] PUB.Y = E716161B64F94ECB8E3DF3611ED6F8E51E373F3499DDB9A606F869753670FD2EE67B9183590A1C9B4E505202BB43253A
7,655,600 UART: [art] SIG.R = CE96953AFDFCE19A0327C67387E5357D741683AA525D72C735DD3F8FC78274219F0979A3E3A6A3CFC57AD24711FBEFF4
7,662,991 UART: [art] SIG.S = 48E8542D31F5D994AE44924ED437B749241D817FCF4268BAB9016DEF008DF3F69886819CB71E9288337991BEA448D997
8,641,414 UART: Caliptra RT
8,642,129 UART: [state] CFI Enabled
8,981,589 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,381,869 ready_for_fw is high
3,382,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,095,356 >>> mbox cmd response: success
18,384,543 UART:
18,384,934 UART: Running Caliptra FMC ...
18,386,083 UART:
18,386,245 UART: [state] CFI Enabled
18,455,096 UART: [fht] FMC Alias Private Key: 7
20,217,737 UART: [art] Extend RT PCRs Done
20,218,959 UART: [art] Lock RT PCRs Done
20,220,537 UART: [art] Populate DV Done
20,225,949 UART: [fht] FMC Alias Private Key: 7
20,227,541 UART: [art] Derive CDI
20,228,277 UART: [art] Store in in slot 0x4
20,287,380 UART: [art] Derive Key Pair
20,288,422 UART: [art] Store priv key in slot 0x5
22,751,308 UART: [art] Derive Key Pair - Done
22,764,325 UART: [art] Signing Cert with AUTHO
22,765,631 UART: RITY.KEYID = 7
24,476,656 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,175 UART: [art] PUB.X = 47A540FB34B2629C7A8C3F01903C8A96173BA2420D8E80DA68520F78EAC14141DD9FFE8D4A4287188DD03AC1BC7B8280
24,485,428 UART: [art] PUB.Y = 8FB07A9FA7819F7876FF967395881120CAF61470A6703EAC548A2A4ECF14605EC1A59E270C940B163A82F2CDE0C7DE63
24,492,693 UART: [art] SIG.R = E0F7185EA7C688EFF5BB66FD4A8FF245A203A5BB114F93E3163E7074641DF54E6017D3BF80B0A1EE87BB17247DF69E1A
24,500,120 UART: [art] SIG.S = B66F9BFBE63370A15E5C6997EEE17F515D2B71658E2EDB8DC82CE5E6975859B2BE12C00E6442FD1120F61679C654F2EE
25,478,641 UART: Caliptra RT
25,479,352 UART: [state] CFI Enabled
25,644,580 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,185,807 UART:
3,186,141 UART: Running Caliptra FMC ...
3,187,184 UART:
3,187,338 UART: [state] CFI Enabled
3,231,390 UART: [aliasrt :skip pcr extension
3,232,643 UART: [art] Extend RT PCRs Done
3,233,703 UART: [art] Lock RT PCRs Done
3,235,110 UART: [art] Populate DV Done
3,240,678 UART: [fht] FMC Alias Private Key: 7
3,242,210 UART: [art] Derive CDI
3,242,949 UART: [art] Store in in slot 0x4
3,300,085 UART: [art] Derive Key Pair
3,301,099 UART: [art] Store priv key in slot 0x5
5,763,636 UART: [art] Derive Key Pair - Done
5,776,153 UART: [art] Signing Cert with AUTHO
5,777,455 UART: RITY.KEYID = 7
7,489,611 UART: [art] Erasing AUTHORITY.KEYID = 7
7,491,119 UART: [art] PUB.X = 47A540FB34B2629C7A8C3F01903C8A96173BA2420D8E80DA68520F78EAC14141DD9FFE8D4A4287188DD03AC1BC7B8280
7,498,367 UART: [art] PUB.Y = 8FB07A9FA7819F7876FF967395881120CAF61470A6703EAC548A2A4ECF14605EC1A59E270C940B163A82F2CDE0C7DE63
7,505,653 UART: [art] SIG.R = E0F7185EA7C688EFF5BB66FD4A8FF245A203A5BB114F93E3163E7074641DF54E6017D3BF80B0A1EE87BB17247DF69E1A
7,513,039 UART: [art] SIG.S = B66F9BFBE63370A15E5C6997EEE17F515D2B71658E2EDB8DC82CE5E6975859B2BE12C00E6442FD1120F61679C654F2EE
8,491,708 UART: Caliptra RT
8,492,401 UART: [state] CFI Enabled
8,828,166 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,668 writing to cptra_bootfsm_go
192,315 UART:
192,697 UART: Running Caliptra ROM ...
193,982 UART:
603,357 UART: [state] CFI Enabled
619,490 UART: [state] LifecycleState = Production
621,178 UART: [state] DebugLocked = Yes
622,742 UART: [state] Starting the WD Timer 40000000 cycles
628,479 UART: [kat] SHA2-256
807,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,185 UART: [kat] ++
819,648 UART: [kat] sha1
830,457 UART: [kat] SHA2-256
833,460 UART: [kat] SHA2-384
839,454 UART: [kat] SHA2-512-ACC
842,384 UART: [kat] ECC-384
3,284,062 UART: [kat] HMAC-384Kdf
3,296,575 UART: [kat] LMS
3,826,109 UART: [kat] --
3,829,182 UART: [cold-reset] ++
3,831,537 UART: [fht] FHT @ 0x50003400
3,843,080 UART: [idev] ++
3,843,652 UART: [idev] CDI.KEYID = 6
3,844,576 UART: [idev] SUBJECT.KEYID = 7
3,845,751 UART: [idev] UDS.KEYID = 0
3,846,673 ready_for_fw is high
3,846,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,750 UART: [idev] Erasing UDS.KEYID = 0
6,320,928 UART: [idev] Sha1 KeyId Algorithm
6,343,970 UART: [idev] --
6,347,122 UART: [ldev] ++
6,347,695 UART: [ldev] CDI.KEYID = 6
6,348,605 UART: [ldev] SUBJECT.KEYID = 5
6,349,816 UART: [ldev] AUTHORITY.KEYID = 7
6,351,103 UART: [ldev] FE.KEYID = 1
6,362,288 UART: [ldev] Erasing FE.KEYID = 1
8,836,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,767 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,571,826 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,587,617 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,603,570 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,625,365 UART: [ldev] --
10,629,916 UART: [fwproc] Wait for Commands...
10,632,620 UART: [fwproc] Recv command 0x46574c44
10,634,707 UART: [fwproc] Recv'd Img size: 114448 bytes
14,064,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,141,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,209,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,528,993 >>> mbox cmd response: success
14,533,661 UART: [afmc] ++
14,534,245 UART: [afmc] CDI.KEYID = 6
14,535,168 UART: [afmc] SUBJECT.KEYID = 7
14,536,379 UART: [afmc] AUTHORITY.KEYID = 5
17,041,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,761,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,763,112 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,779,098 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,794,914 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,810,672 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,833,994 UART: [afmc] --
18,837,096 UART: [cold-reset] --
18,838,645 UART: [state] Locking Datavault
18,844,267 UART: [state] Locking PCR0, PCR1 and PCR31
18,845,908 UART: [state] Locking ICCM
18,848,380 UART: [exit] Launching FMC @ 0x40000130
18,856,784 UART:
18,857,020 UART: Running Caliptra FMC ...
18,858,126 UART:
18,858,285 UART: [state] CFI Enabled
18,866,868 UART: [fht] FMC Alias Private Key: 7
20,624,097 UART: [art] Extend RT PCRs Done
20,625,344 UART: [art] Lock RT PCRs Done
20,626,964 UART: [art] Populate DV Done
20,632,378 UART: [fht] FMC Alias Private Key: 7
20,633,867 UART: [art] Derive CDI
20,634,649 UART: [art] Store in in slot 0x4
20,677,790 UART: [art] Derive Key Pair
20,678,832 UART: [art] Store priv key in slot 0x5
23,105,535 UART: [art] Derive Key Pair - Done
23,118,748 UART: [art] Signing Cert with AUTHO
23,120,048 UART: RITY.KEYID = 7
24,825,564 UART: [art] Erasing AUTHORITY.KEYID = 7
24,827,077 UART: [art] PUB.X = 5499DB5179E3DBF53F17066D998E33FB91D33DB6B5A498138E62C77C80DC94E0B81366D9E68D2FF225B6658FC9265A4F
24,834,323 UART: [art] PUB.Y = D1A813833CA02AD4EF2335E5BE0050D6068DA6EDC7944B750039A9018C3435C221FDF45BD3E4C4E0D5A6FC702F030603
24,841,497 UART: [art] SIG.R = 7724DD04F4B42FCD299D2FAE162BE2CFCFE6BF63731C80ADD52EC39D85D666A96A7126AA71405C17B7FA5826B95D77AB
24,848,947 UART: [art] SIG.S = DD863495D98F15D93A34E50C4349415EEC765C1813F2E3E531D507DDEC9A96B23CB6095B898F24C3D85422E0D675D2ED
25,828,335 UART: Caliptra RT
25,829,046 UART: [state] CFI Enabled
25,944,341 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,064 UART:
1,346 UART: Running Caliptra ROM ...
2,450 UART:
14,574,573 UART: [state] CFI Enabled
14,586,977 UART: [state] LifecycleState = Production
14,588,731 UART: [state] DebugLocked = Yes
14,591,232 UART: [state] Starting the WD Timer 40000000 cycles
14,596,125 UART: [kat] SHA2-256
14,775,267 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,786,841 UART: [kat] ++
14,787,380 UART: [kat] sha1
14,799,625 UART: [kat] SHA2-256
14,802,622 UART: [kat] SHA2-384
14,807,920 UART: [kat] SHA2-512-ACC
14,810,862 UART: [kat] ECC-384
17,251,409 UART: [kat] HMAC-384Kdf
17,263,684 UART: [kat] LMS
17,793,204 UART: [kat] --
17,796,978 UART: [warm-reset] ++
17,800,636 UART: [warm-reset] --
17,803,745 UART: [state] Locking Datavault
17,808,072 UART: [state] Locking PCR0, PCR1 and PCR31
17,809,774 UART: [state] Locking ICCM
17,811,438 UART: [exit] Launching FMC @ 0x40000130
17,819,839 UART:
17,820,084 UART: Running Caliptra FMC ...
17,821,185 UART:
17,821,342 UART: [state] CFI Enabled
17,823,393 UART: [aliasrt :skip pcr extension
17,824,633 UART: [art] Extend RT PCRs Done
17,825,767 UART: [art] Lock RT PCRs Done
17,826,942 UART: [art] Populate DV Done
17,832,342 UART: [fht] FMC Alias Private Key: 7
17,833,840 UART: [art] Derive CDI
17,834,653 UART: [art] Store in in slot 0x4
17,877,510 UART: [art] Derive Key Pair
17,878,546 UART: [art] Store priv key in slot 0x5
20,304,991 UART: [art] Derive Key Pair - Done
20,317,940 UART: [art] Signing Cert with AUTHO
20,319,434 UART: RITY.KEYID = 7
22,024,990 UART: [art] Erasing AUTHORITY.KEYID = 7
22,026,505 UART: [art] PUB.X = 5499DB5179E3DBF53F17066D998E33FB91D33DB6B5A498138E62C77C80DC94E0B81366D9E68D2FF225B6658FC9265A4F
22,033,754 UART: [art] PUB.Y = D1A813833CA02AD4EF2335E5BE0050D6068DA6EDC7944B750039A9018C3435C221FDF45BD3E4C4E0D5A6FC702F030603
22,040,992 UART: [art] SIG.R = 7724DD04F4B42FCD299D2FAE162BE2CFCFE6BF63731C80ADD52EC39D85D666A96A7126AA71405C17B7FA5826B95D77AB
22,048,383 UART: [art] SIG.S = DD863495D98F15D93A34E50C4349415EEC765C1813F2E3E531D507DDEC9A96B23CB6095B898F24C3D85422E0D675D2ED
23,026,426 UART: Caliptra RT
23,027,142 UART: [state] CFI Enabled
23,315,467 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
3,699,147 ready_for_fw is high
3,699,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,305,406 >>> mbox cmd response: success
18,558,196 UART:
18,558,605 UART: Running Caliptra FMC ...
18,559,717 UART:
18,559,873 UART: [state] CFI Enabled
18,567,837 UART: [fht] FMC Alias Private Key: 7
20,324,203 UART: [art] Extend RT PCRs Done
20,325,420 UART: [art] Lock RT PCRs Done
20,326,886 UART: [art] Populate DV Done
20,332,330 UART: [fht] FMC Alias Private Key: 7
20,333,827 UART: [art] Derive CDI
20,334,587 UART: [art] Store in in slot 0x4
20,377,179 UART: [art] Derive Key Pair
20,378,177 UART: [art] Store priv key in slot 0x5
22,805,450 UART: [art] Derive Key Pair - Done
22,818,183 UART: [art] Signing Cert with AUTHO
22,819,481 UART: RITY.KEYID = 7
24,525,172 UART: [art] Erasing AUTHORITY.KEYID = 7
24,526,676 UART: [art] PUB.X = A28F929291C95C3D3EB3A759CF54A19EEAF92BAB060781BC36AD320FB9AB7DD22E4ED4B592E0009CCE89C20B9BBBE3FF
24,533,919 UART: [art] PUB.Y = 0B275797ED3A936AE9249227F3B51E120253F68E2374C79EB99F49C1BEBD4F81302F97ED6C94C656FCD637F1B4005825
24,541,212 UART: [art] SIG.R = BECFA173ACB507611CA10BA220A58A7E0FE35F1656C4656BEC215D3548C7CB3DACD7784016267260A607FEA574244526
24,548,554 UART: [art] SIG.S = 24EC06316F52E610E1A7F2496C2D68FA0ACF8467F19E4963B3D16FA2943EEE2803743095CA7C921B2A646D43FEE116C8
25,527,998 UART: Caliptra RT
25,528,703 UART: [state] CFI Enabled
25,645,116 UART: [rt] RT listening for mailbox commands...
Initializing fuses
17,985,048 UART:
17,985,406 UART: Running Caliptra FMC ...
17,986,442 UART:
17,986,591 UART: [state] CFI Enabled
17,988,552 UART: [aliasrt :skip pcr extension
17,989,801 UART: [art] Extend RT PCRs Done
17,990,936 UART: [art] Lock RT PCRs Done
17,992,091 UART: [art] Populate DV Done
17,997,557 UART: [fht] FMC Alias Private Key: 7
17,999,144 UART: [art] Derive CDI
17,999,958 UART: [art] Store in in slot 0x4
18,042,937 UART: [art] Derive Key Pair
18,043,982 UART: [art] Store priv key in slot 0x5
20,470,933 UART: [art] Derive Key Pair - Done
20,483,927 UART: [art] Signing Cert with AUTHO
20,485,251 UART: RITY.KEYID = 7
22,191,208 UART: [art] Erasing AUTHORITY.KEYID = 7
22,192,713 UART: [art] PUB.X = A28F929291C95C3D3EB3A759CF54A19EEAF92BAB060781BC36AD320FB9AB7DD22E4ED4B592E0009CCE89C20B9BBBE3FF
22,200,019 UART: [art] PUB.Y = 0B275797ED3A936AE9249227F3B51E120253F68E2374C79EB99F49C1BEBD4F81302F97ED6C94C656FCD637F1B4005825
22,207,254 UART: [art] SIG.R = BECFA173ACB507611CA10BA220A58A7E0FE35F1656C4656BEC215D3548C7CB3DACD7784016267260A607FEA574244526
22,214,647 UART: [art] SIG.S = 24EC06316F52E610E1A7F2496C2D68FA0ACF8467F19E4963B3D16FA2943EEE2803743095CA7C921B2A646D43FEE116C8
23,193,505 UART: Caliptra RT
23,194,193 UART: [state] CFI Enabled
23,479,099 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
3,438,820 ready_for_fw is high
3,439,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,787,082 >>> mbox cmd response: success
19,071,553 UART:
19,071,994 UART: Running Caliptra FMC ...
19,073,112 UART:
19,073,287 UART: [state] CFI Enabled
19,139,887 UART: [fht] FMC Alias Private Key: 7
20,903,822 UART: [art] Extend RT PCRs Done
20,905,034 UART: [art] Lock RT PCRs Done
20,906,846 UART: [art] Populate DV Done
20,912,151 UART: [fht] FMC Alias Private Key: 7
20,913,637 UART: [art] Derive CDI
20,914,396 UART: [art] Store in in slot 0x4
20,972,700 UART: [art] Derive Key Pair
20,973,762 UART: [art] Store priv key in slot 0x5
23,436,781 UART: [art] Derive Key Pair - Done
23,449,461 UART: [art] Signing Cert with AUTHO
23,450,790 UART: RITY.KEYID = 7
25,162,620 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,120 UART: [art] PUB.X = 20DB836B9AEECD1062F9EA0E32286FC4783C5055FCA0FCAC0CE2B2E8EF3E886AB85DC9958B94679728882532816C98EE
25,171,430 UART: [art] PUB.Y = AB82E859B27D6AA3E627811B6E82E6B3C631B5711DEF83C3E28390616C036FA6F92A1A8398B64093E25E6385AB278490
25,178,635 UART: [art] SIG.R = CA2968DFB141879A7D8FCA3183EA2E923318E0337E898453D68BA327AADEACCE234F9E006520F2D71CD4A098C96C61FA
25,186,035 UART: [art] SIG.S = 5150307DCEFF14A0FCD9E880622D29E897316B2436C616F2EB15F97A6153CF34C5155BA6B5D640301791E3E23804324C
26,165,445 UART: Caliptra RT
26,166,135 UART: [state] CFI Enabled
26,331,216 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,227,487 UART:
3,227,810 UART: Running Caliptra FMC ...
3,228,883 UART:
3,229,032 UART: [state] CFI Enabled
3,275,560 UART: [aliasrt :skip pcr extension
3,276,856 UART: [art] Extend RT PCRs Done
3,278,004 UART: [art] Lock RT PCRs Done
3,279,371 UART: [art] Populate DV Done
3,284,889 UART: [fht] FMC Alias Private Key: 7
3,286,424 UART: [art] Derive CDI
3,287,257 UART: [art] Store in in slot 0x4
3,344,410 UART: [art] Derive Key Pair
3,345,402 UART: [art] Store priv key in slot 0x5
5,808,232 UART: [art] Derive Key Pair - Done
5,820,954 UART: [art] Signing Cert with AUTHO
5,822,259 UART: RITY.KEYID = 7
7,534,113 UART: [art] Erasing AUTHORITY.KEYID = 7
7,535,628 UART: [art] PUB.X = 20DB836B9AEECD1062F9EA0E32286FC4783C5055FCA0FCAC0CE2B2E8EF3E886AB85DC9958B94679728882532816C98EE
7,542,886 UART: [art] PUB.Y = AB82E859B27D6AA3E627811B6E82E6B3C631B5711DEF83C3E28390616C036FA6F92A1A8398B64093E25E6385AB278490
7,550,176 UART: [art] SIG.R = CA2968DFB141879A7D8FCA3183EA2E923318E0337E898453D68BA327AADEACCE234F9E006520F2D71CD4A098C96C61FA
7,557,510 UART: [art] SIG.S = 5150307DCEFF14A0FCD9E880622D29E897316B2436C616F2EB15F97A6153CF34C5155BA6B5D640301791E3E23804324C
8,536,445 UART: Caliptra RT
8,537,136 UART: [state] CFI Enabled
8,872,903 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,664 writing to cptra_bootfsm_go
3,759,244 ready_for_fw is high
3,759,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,007,091 >>> mbox cmd response: success
19,252,988 UART:
19,253,370 UART: Running Caliptra FMC ...
19,254,520 UART:
19,254,679 UART: [state] CFI Enabled
19,262,264 UART: [fht] FMC Alias Private Key: 7
21,018,294 UART: [art] Extend RT PCRs Done
21,019,511 UART: [art] Lock RT PCRs Done
21,021,136 UART: [art] Populate DV Done
21,026,823 UART: [fht] FMC Alias Private Key: 7
21,028,478 UART: [art] Derive CDI
21,029,294 UART: [art] Store in in slot 0x4
21,072,157 UART: [art] Derive Key Pair
21,073,151 UART: [art] Store priv key in slot 0x5
23,499,796 UART: [art] Derive Key Pair - Done
23,512,955 UART: [art] Signing Cert with AUTHO
23,514,271 UART: RITY.KEYID = 7
25,219,497 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,995 UART: [art] PUB.X = 4801DE1976D51EC6282DCBA1E9CF8294AF4795CF7408A27FDF04973F6272BEAFE76182888332A1B918E427D2A7DEB06D
25,228,241 UART: [art] PUB.Y = 417A0C99ACB892AB86E87C7E259EB29AED990AB9395D8E0CA136E871EB0A9C5540D5CFF3E7C3F1AB74825EFF67493A67
25,235,587 UART: [art] SIG.R = 4CDEAFE0785F76C36B03CAD548661001AF6618707256117B33135035A721759453CC20B94794A35F623C419DBA793B66
25,242,928 UART: [art] SIG.S = C806FECBDE3394DB1C3447699429E97205F6B2550A3F8700C2759F261B735B85385947AF0B20370B286FD536DB06A47C
26,222,117 UART: Caliptra RT
26,222,829 UART: [state] CFI Enabled
26,339,404 UART: [rt] RT listening for mailbox commands...
Initializing fuses
17,346,226 UART:
17,346,969 UART: Running Caliptra FMC ...
17,348,026 UART:
17,348,189 UART: [state] CFI Enabled
17,349,641 UART: [aliasrt :skip pcr extension
17,350,915 UART: [art] Extend RT PCRs Done
17,352,058 UART: [art] Lock RT PCRs Done
17,353,624 UART: [art] Populate DV Done
17,358,935 UART: [fht] FMC Alias Private Key: 7
17,360,528 UART: [art] Derive CDI
17,361,274 UART: [art] Store in in slot 0x4
17,403,989 UART: [art] Derive Key Pair
17,405,034 UART: [art] Store priv key in slot 0x5
19,830,999 UART: [art] Derive Key Pair - Done
19,843,517 UART: [art] Signing Cert with AUTHO
19,844,826 UART: RITY.KEYID = 7
21,550,662 UART: [art] Erasing AUTHORITY.KEYID = 7
21,552,159 UART: [art] PUB.X = 4801DE1976D51EC6282DCBA1E9CF8294AF4795CF7408A27FDF04973F6272BEAFE76182888332A1B918E427D2A7DEB06D
21,559,485 UART: [art] PUB.Y = 417A0C99ACB892AB86E87C7E259EB29AED990AB9395D8E0CA136E871EB0A9C5540D5CFF3E7C3F1AB74825EFF67493A67
21,566,725 UART: [art] SIG.R = 4CDEAFE0785F76C36B03CAD548661001AF6618707256117B33135035A721759453CC20B94794A35F623C419DBA793B66
21,574,084 UART: [art] SIG.S = C806FECBDE3394DB1C3447699429E97205F6B2550A3F8700C2759F261B735B85385947AF0B20370B286FD536DB06A47C
22,553,279 UART: Caliptra RT
22,553,994 UART: [state] CFI Enabled
22,845,990 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,889 UART: [state] LifecycleState = Production
85,497 UART: [state] DebugLocked = Yes
86,117 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,851 UART: [kat] SHA2-256
881,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,897 UART: [kat] ++
886,049 UART: [kat] sha1
890,395 UART: [kat] SHA2-256
892,333 UART: [kat] SHA2-384
895,062 UART: [kat] SHA2-512-ACC
896,963 UART: [kat] ECC-384
902,402 UART: [kat] HMAC-384Kdf
906,882 UART: [kat] LMS
1,475,078 UART: [kat] --
1,475,943 UART: [cold-reset] ++
1,476,360 UART: [fht] Storing FHT @ 0x50003400
1,479,055 UART: [idev] ++
1,479,223 UART: [idev] CDI.KEYID = 6
1,479,583 UART: [idev] SUBJECT.KEYID = 7
1,480,007 UART: [idev] UDS.KEYID = 0
1,480,352 ready_for_fw is high
1,480,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,124 UART: [idev] Erasing UDS.KEYID = 0
1,504,207 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,766 UART: [idev] --
1,514,031 UART: [ldev] ++
1,514,199 UART: [ldev] CDI.KEYID = 6
1,514,562 UART: [ldev] SUBJECT.KEYID = 5
1,514,988 UART: [ldev] AUTHORITY.KEYID = 7
1,515,451 UART: [ldev] FE.KEYID = 1
1,520,873 UART: [ldev] Erasing FE.KEYID = 1
1,546,544 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,947 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,641 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,513 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,219 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,149 UART: [ldev] --
1,585,556 UART: [fwproc] Waiting for Commands...
1,586,401 UART: [fwproc] Received command 0x46574c44
1,587,192 UART: [fwproc] Received Image of size 114448 bytes
2,911,177 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,938,092 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,967,444 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,103,584 >>> mbox cmd response: success
3,104,645 UART: [afmc] ++
3,104,813 UART: [afmc] CDI.KEYID = 6
3,105,175 UART: [afmc] SUBJECT.KEYID = 7
3,105,600 UART: [afmc] AUTHORITY.KEYID = 5
3,140,175 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,156,657 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,157,437 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,163,155 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,169,050 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,174,761 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,182,523 UART: [afmc] --
3,183,540 UART: [cold-reset] --
3,184,392 UART: [state] Locking Datavault
3,185,545 UART: [state] Locking PCR0, PCR1 and PCR31
3,186,149 UART: [state] Locking ICCM
3,186,783 UART: [exit] Launching FMC @ 0x40000130
3,192,112 UART:
3,192,128 UART: Running Caliptra FMC ...
3,192,536 UART:
3,192,590 UART: [state] CFI Enabled
3,203,247 UART: [fht] FMC Alias Private Key: 7
3,311,486 UART: [art] Extend RT PCRs Done
3,311,914 UART: [art] Lock RT PCRs Done
3,313,674 UART: [art] Populate DV Done
3,321,996 UART: [fht] FMC Alias Private Key: 7
3,323,024 UART: [art] Derive CDI
3,323,304 UART: [art] Store in in slot 0x4
3,409,027 UART: [art] Derive Key Pair
3,409,387 UART: [art] Store priv key in slot 0x5
3,422,689 UART: [art] Derive Key Pair - Done
3,437,325 UART: [art] Signing Cert with AUTHO
3,437,805 UART: RITY.KEYID = 7
3,452,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,453,470 UART: [art] PUB.X = 81283A7AFAA59825BF899A2B6C89C62965B4FDE7D74A33FC553A2D6CDD86E1D88F64DA6810EAA7852AB569A53AB5A0CF
3,460,258 UART: [art] PUB.Y = 4676D4911207554E9F06FA85781F8533470A1845EA908F818F198F1BF7287C6B3A2F680896C4AD3AA5B292DFE00861F1
3,467,187 UART: [art] SIG.R = 69A2744016F5DCBD4C78D6AD3F011C6A055C5ACA60C45F3DCC8D336D3BD3989E20CE5B75BB718271D9CB073BE5E0883A
3,473,964 UART: [art] SIG.S = B5AB2BBA13B26F4D32C64405EE42ECF1D653942385A77A51A8CCCAD7AABDC6B2437D3F4D469466A51D770B5572B34CD0
3,497,875 UART: Caliptra RT
3,498,128 UART: [state] CFI Enabled
3,607,069 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,607,828 UART:
3,607,844 UART: Running Caliptra ROM ...
3,608,252 UART:
3,608,306 UART: [state] CFI Enabled
3,610,699 UART: [state] LifecycleState = Production
3,611,307 UART: [state] DebugLocked = Yes
3,611,859 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,613,653 UART: [kat] SHA2-256
4,407,584 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,411,699 UART: [kat] ++
4,411,851 UART: [kat] sha1
4,416,131 UART: [kat] SHA2-256
4,418,069 UART: [kat] SHA2-384
4,420,816 UART: [kat] SHA2-512-ACC
4,422,717 UART: [kat] ECC-384
4,428,346 UART: [kat] HMAC-384Kdf
4,432,992 UART: [kat] LMS
5,001,188 UART: [kat] --
5,001,922 UART: [warm-reset] ++
5,002,899 UART: [warm-reset] --
5,003,606 UART: [state] Locking Datavault
5,004,462 UART: [state] Locking PCR0, PCR1 and PCR31
5,005,066 UART: [state] Locking ICCM
5,005,708 UART: [exit] Launching FMC @ 0x40000130
5,011,037 UART:
5,011,053 UART: Running Caliptra FMC ...
5,011,461 UART:
5,011,515 UART: [state] CFI Enabled
5,012,750 UART: [aliasrt :skip pcr extension
5,013,223 UART: [art] Extend RT PCRs Done
5,013,651 UART: [art] Lock RT PCRs Done
5,014,872 UART: [art] Populate DV Done
5,023,234 UART: [fht] FMC Alias Private Key: 7
5,024,264 UART: [art] Derive CDI
5,024,544 UART: [art] Store in in slot 0x4
5,110,621 UART: [art] Derive Key Pair
5,110,981 UART: [art] Store priv key in slot 0x5
5,124,597 UART: [art] Derive Key Pair - Done
5,139,293 UART: [art] Signing Cert with AUTHO
5,139,773 UART: RITY.KEYID = 7
5,154,745 UART: [art] Erasing AUTHORITY.KEYID = 7
5,155,510 UART: [art] PUB.X = 81283A7AFAA59825BF899A2B6C89C62965B4FDE7D74A33FC553A2D6CDD86E1D88F64DA6810EAA7852AB569A53AB5A0CF
5,162,298 UART: [art] PUB.Y = 4676D4911207554E9F06FA85781F8533470A1845EA908F818F198F1BF7287C6B3A2F680896C4AD3AA5B292DFE00861F1
5,169,227 UART: [art] SIG.R = 69A2744016F5DCBD4C78D6AD3F011C6A055C5ACA60C45F3DCC8D336D3BD3989E20CE5B75BB718271D9CB073BE5E0883A
5,176,004 UART: [art] SIG.S = B5AB2BBA13B26F4D32C64405EE42ECF1D653942385A77A51A8CCCAD7AABDC6B2437D3F4D469466A51D770B5572B34CD0
5,199,999 UART: Caliptra RT
5,200,252 UART: [state] CFI Enabled
5,487,693 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,562 ready_for_fw is high
1,361,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,954,700 >>> mbox cmd response: success
3,016,275 UART:
3,016,291 UART: Running Caliptra FMC ...
3,016,699 UART:
3,016,753 UART: [state] CFI Enabled
3,027,284 UART: [fht] FMC Alias Private Key: 7
3,134,815 UART: [art] Extend RT PCRs Done
3,135,243 UART: [art] Lock RT PCRs Done
3,136,895 UART: [art] Populate DV Done
3,145,105 UART: [fht] FMC Alias Private Key: 7
3,146,195 UART: [art] Derive CDI
3,146,475 UART: [art] Store in in slot 0x4
3,232,158 UART: [art] Derive Key Pair
3,232,518 UART: [art] Store priv key in slot 0x5
3,246,366 UART: [art] Derive Key Pair - Done
3,261,077 UART: [art] Signing Cert with AUTHO
3,261,557 UART: RITY.KEYID = 7
3,276,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,080 UART: [art] PUB.X = C1BDF43C6F76600FC69914178BF19FA1F82F73EBB65FACAB4BFAA4ED08144C2028087FACA2AC5EC76D6BE2ACF3813055
3,283,865 UART: [art] PUB.Y = 85672CB879FB89AC96505642530FF7864DBFFA62137DA210AE16C709D410B8478A915C919BDF6F55D019031946A2F113
3,290,802 UART: [art] SIG.R = AD817A9F67A300344D88D99D34DF52F285AA224961137920D64C00A9B9F7D099886BEAB05EC15001D424F0802CD56D6A
3,297,525 UART: [art] SIG.S = 25A05392A9D6A5BBF619C6AB8D7AE035020DE8C022BB3A7B4BCBD5C262EB6247A1370369D9B7075720573FF05BE62FD6
3,321,116 UART: Caliptra RT
3,321,369 UART: [state] CFI Enabled
3,429,472 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,714,824 UART:
4,714,840 UART: Running Caliptra FMC ...
4,715,248 UART:
4,715,302 UART: [state] CFI Enabled
4,716,577 UART: [aliasrt :skip pcr extension
4,717,050 UART: [art] Extend RT PCRs Done
4,717,478 UART: [art] Lock RT PCRs Done
4,718,751 UART: [art] Populate DV Done
4,726,757 UART: [fht] FMC Alias Private Key: 7
4,727,827 UART: [art] Derive CDI
4,728,107 UART: [art] Store in in slot 0x4
4,813,654 UART: [art] Derive Key Pair
4,814,014 UART: [art] Store priv key in slot 0x5
4,826,880 UART: [art] Derive Key Pair - Done
4,841,773 UART: [art] Signing Cert with AUTHO
4,842,253 UART: RITY.KEYID = 7
4,857,603 UART: [art] Erasing AUTHORITY.KEYID = 7
4,858,368 UART: [art] PUB.X = C1BDF43C6F76600FC69914178BF19FA1F82F73EBB65FACAB4BFAA4ED08144C2028087FACA2AC5EC76D6BE2ACF3813055
4,865,153 UART: [art] PUB.Y = 85672CB879FB89AC96505642530FF7864DBFFA62137DA210AE16C709D410B8478A915C919BDF6F55D019031946A2F113
4,872,090 UART: [art] SIG.R = AD817A9F67A300344D88D99D34DF52F285AA224961137920D64C00A9B9F7D099886BEAB05EC15001D424F0802CD56D6A
4,878,813 UART: [art] SIG.S = 25A05392A9D6A5BBF619C6AB8D7AE035020DE8C022BB3A7B4BCBD5C262EB6247A1370369D9B7075720573FF05BE62FD6
4,902,856 UART: Caliptra RT
4,903,109 UART: [state] CFI Enabled
5,185,314 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Production
85,730 UART: [state] DebugLocked = Yes
86,250 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,964 UART: [kat] SHA2-256
881,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,010 UART: [kat] ++
886,162 UART: [kat] sha1
890,508 UART: [kat] SHA2-256
892,446 UART: [kat] SHA2-384
895,087 UART: [kat] SHA2-512-ACC
896,988 UART: [kat] ECC-384
902,495 UART: [kat] HMAC-384Kdf
907,073 UART: [kat] LMS
1,475,269 UART: [kat] --
1,475,958 UART: [cold-reset] ++
1,476,303 UART: [fht] Storing FHT @ 0x50003400
1,479,076 UART: [idev] ++
1,479,244 UART: [idev] CDI.KEYID = 6
1,479,604 UART: [idev] SUBJECT.KEYID = 7
1,480,028 UART: [idev] UDS.KEYID = 0
1,480,373 ready_for_fw is high
1,480,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,441 UART: [idev] Erasing UDS.KEYID = 0
1,504,894 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,557 UART: [idev] --
1,514,654 UART: [ldev] ++
1,514,822 UART: [ldev] CDI.KEYID = 6
1,515,185 UART: [ldev] SUBJECT.KEYID = 5
1,515,611 UART: [ldev] AUTHORITY.KEYID = 7
1,516,074 UART: [ldev] FE.KEYID = 1
1,521,426 UART: [ldev] Erasing FE.KEYID = 1
1,546,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,486 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,180 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,052 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,758 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,004 UART: [ldev] --
1,586,477 UART: [fwproc] Waiting for Commands...
1,587,260 UART: [fwproc] Received command 0x46574c44
1,588,051 UART: [fwproc] Received Image of size 114448 bytes
2,912,336 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,939,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,968,829 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,104,851 >>> mbox cmd response: success
3,106,040 UART: [afmc] ++
3,106,208 UART: [afmc] CDI.KEYID = 6
3,106,570 UART: [afmc] SUBJECT.KEYID = 7
3,106,995 UART: [afmc] AUTHORITY.KEYID = 5
3,142,640 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,158,574 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,159,354 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,165,072 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,170,967 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,176,678 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,184,428 UART: [afmc] --
3,185,487 UART: [cold-reset] --
3,186,321 UART: [state] Locking Datavault
3,187,430 UART: [state] Locking PCR0, PCR1 and PCR31
3,188,034 UART: [state] Locking ICCM
3,188,508 UART: [exit] Launching FMC @ 0x40000130
3,193,837 UART:
3,193,853 UART: Running Caliptra FMC ...
3,194,261 UART:
3,194,404 UART: [state] CFI Enabled
3,204,977 UART: [fht] FMC Alias Private Key: 7
3,312,538 UART: [art] Extend RT PCRs Done
3,312,966 UART: [art] Lock RT PCRs Done
3,314,842 UART: [art] Populate DV Done
3,323,210 UART: [fht] FMC Alias Private Key: 7
3,324,356 UART: [art] Derive CDI
3,324,636 UART: [art] Store in in slot 0x4
3,410,829 UART: [art] Derive Key Pair
3,411,189 UART: [art] Store priv key in slot 0x5
3,424,047 UART: [art] Derive Key Pair - Done
3,438,751 UART: [art] Signing Cert with AUTHO
3,439,231 UART: RITY.KEYID = 7
3,454,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,455,284 UART: [art] PUB.X = B8886869F6ED115008DD5A7CC5E4F27E8B5FB247D619509A09165C64863F65D04149D20DBA904954B0C25BD24F5EB76F
3,462,047 UART: [art] PUB.Y = 4C78059371D0057913B3C02E44B6C8719732D5D8DEB586EC5F25EF1FE57924BBD1D7CEF27A372141BFB13351064B8B04
3,468,987 UART: [art] SIG.R = 0A5118EBAD38AD749E566A87939323A6725FADE5EFB062A1A220FC1D484E7C2960E766E23BD46C7932B1E98ED1A5FB24
3,475,764 UART: [art] SIG.S = 387DC706317B207CDC65F344F6AC124D13A062F0DC64E8BDEFE1A6BACC111D39F7B8BF59D52BA0C0BBBCC2A32DF43DE6
3,499,376 UART: Caliptra RT
3,499,721 UART: [state] CFI Enabled
3,608,821 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,609,580 UART:
3,609,596 UART: Running Caliptra ROM ...
3,610,004 UART:
3,610,145 UART: [state] CFI Enabled
3,613,138 UART: [state] LifecycleState = Production
3,613,746 UART: [state] DebugLocked = Yes
3,614,348 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,615,924 UART: [kat] SHA2-256
4,409,855 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,413,970 UART: [kat] ++
4,414,122 UART: [kat] sha1
4,418,408 UART: [kat] SHA2-256
4,420,346 UART: [kat] SHA2-384
4,422,987 UART: [kat] SHA2-512-ACC
4,424,888 UART: [kat] ECC-384
4,430,353 UART: [kat] HMAC-384Kdf
4,435,029 UART: [kat] LMS
5,003,225 UART: [kat] --
5,004,443 UART: [warm-reset] ++
5,005,318 UART: [warm-reset] --
5,006,247 UART: [state] Locking Datavault
5,007,129 UART: [state] Locking PCR0, PCR1 and PCR31
5,007,733 UART: [state] Locking ICCM
5,008,245 UART: [exit] Launching FMC @ 0x40000130
5,013,574 UART:
5,013,590 UART: Running Caliptra FMC ...
5,013,998 UART:
5,014,141 UART: [state] CFI Enabled
5,015,608 UART: [aliasrt :skip pcr extension
5,016,081 UART: [art] Extend RT PCRs Done
5,016,509 UART: [art] Lock RT PCRs Done
5,017,766 UART: [art] Populate DV Done
5,025,756 UART: [fht] FMC Alias Private Key: 7
5,026,912 UART: [art] Derive CDI
5,027,192 UART: [art] Store in in slot 0x4
5,113,109 UART: [art] Derive Key Pair
5,113,469 UART: [art] Store priv key in slot 0x5
5,126,639 UART: [art] Derive Key Pair - Done
5,141,317 UART: [art] Signing Cert with AUTHO
5,141,797 UART: RITY.KEYID = 7
5,156,849 UART: [art] Erasing AUTHORITY.KEYID = 7
5,157,614 UART: [art] PUB.X = B8886869F6ED115008DD5A7CC5E4F27E8B5FB247D619509A09165C64863F65D04149D20DBA904954B0C25BD24F5EB76F
5,164,377 UART: [art] PUB.Y = 4C78059371D0057913B3C02E44B6C8719732D5D8DEB586EC5F25EF1FE57924BBD1D7CEF27A372141BFB13351064B8B04
5,171,317 UART: [art] SIG.R = 0A5118EBAD38AD749E566A87939323A6725FADE5EFB062A1A220FC1D484E7C2960E766E23BD46C7932B1E98ED1A5FB24
5,178,094 UART: [art] SIG.S = 387DC706317B207CDC65F344F6AC124D13A062F0DC64E8BDEFE1A6BACC111D39F7B8BF59D52BA0C0BBBCC2A32DF43DE6
5,201,756 UART: Caliptra RT
5,202,101 UART: [state] CFI Enabled
5,482,365 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,587 ready_for_fw is high
1,362,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,957,161 >>> mbox cmd response: success
3,018,778 UART:
3,018,794 UART: Running Caliptra FMC ...
3,019,202 UART:
3,019,345 UART: [state] CFI Enabled
3,029,990 UART: [fht] FMC Alias Private Key: 7
3,137,713 UART: [art] Extend RT PCRs Done
3,138,141 UART: [art] Lock RT PCRs Done
3,139,353 UART: [art] Populate DV Done
3,147,391 UART: [fht] FMC Alias Private Key: 7
3,148,449 UART: [art] Derive CDI
3,148,729 UART: [art] Store in in slot 0x4
3,234,482 UART: [art] Derive Key Pair
3,234,842 UART: [art] Store priv key in slot 0x5
3,247,916 UART: [art] Derive Key Pair - Done
3,262,844 UART: [art] Signing Cert with AUTHO
3,263,324 UART: RITY.KEYID = 7
3,278,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,113 UART: [art] PUB.X = 902C3659CD516B820BBAEF55C621C6A6E2AD92CB81D03E0978839FF193261FC0FDC4B8B2B35C94CD7C650D579C5184A5
3,285,884 UART: [art] PUB.Y = 398B3A6488D74D68982BD9820AF9C4580072DD897504013151693639C69C45C45EA6EB84E0A1D84DB2D957560BEB90CC
3,292,796 UART: [art] SIG.R = 9FB90E2E42B4F4950A7BA49E17445D30EE8B0CFBB578808AA6BFE52F7E079E7731B3F207EBF8C094C2DF2AA62169F171
3,299,565 UART: [art] SIG.S = 3089C8092D2A92FE69E355D1636607A7EDF9DCF6CD925FEF76ADC4D3471C5FB35862DBDC683850D72D11ADD92C38A691
3,323,700 UART: Caliptra RT
3,324,045 UART: [state] CFI Enabled
3,431,552 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,718,119 UART:
4,718,135 UART: Running Caliptra FMC ...
4,718,543 UART:
4,718,686 UART: [state] CFI Enabled
4,720,125 UART: [aliasrt :skip pcr extension
4,720,598 UART: [art] Extend RT PCRs Done
4,721,026 UART: [art] Lock RT PCRs Done
4,722,269 UART: [art] Populate DV Done
4,730,419 UART: [fht] FMC Alias Private Key: 7
4,731,533 UART: [art] Derive CDI
4,731,813 UART: [art] Store in in slot 0x4
4,817,392 UART: [art] Derive Key Pair
4,817,752 UART: [art] Store priv key in slot 0x5
4,831,478 UART: [art] Derive Key Pair - Done
4,846,256 UART: [art] Signing Cert with AUTHO
4,846,736 UART: RITY.KEYID = 7
4,861,938 UART: [art] Erasing AUTHORITY.KEYID = 7
4,862,703 UART: [art] PUB.X = 902C3659CD516B820BBAEF55C621C6A6E2AD92CB81D03E0978839FF193261FC0FDC4B8B2B35C94CD7C650D579C5184A5
4,869,474 UART: [art] PUB.Y = 398B3A6488D74D68982BD9820AF9C4580072DD897504013151693639C69C45C45EA6EB84E0A1D84DB2D957560BEB90CC
4,876,386 UART: [art] SIG.R = 9FB90E2E42B4F4950A7BA49E17445D30EE8B0CFBB578808AA6BFE52F7E079E7731B3F207EBF8C094C2DF2AA62169F171
4,883,155 UART: [art] SIG.S = 3089C8092D2A92FE69E355D1636607A7EDF9DCF6CD925FEF76ADC4D3471C5FB35862DBDC683850D72D11ADD92C38A691
4,907,364 UART: Caliptra RT
4,907,709 UART: [state] CFI Enabled
5,190,228 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Production
85,641 UART: [state] DebugLocked = Yes
86,223 UART: [state] Starting the WD Timer 40000000 cycles
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
902,005 UART: [kat] SHA2-256
903,945 UART: [kat] SHA2-384
906,528 UART: [kat] SHA2-512-ACC
908,429 UART: [kat] ECC-384
918,128 UART: [kat] HMAC-384Kdf
922,664 UART: [kat] LMS
1,170,992 UART: [kat] --
1,171,831 UART: [cold-reset] ++
1,172,326 UART: [fht] FHT @ 0x50003400
1,174,889 UART: [idev] ++
1,175,057 UART: [idev] CDI.KEYID = 6
1,175,417 UART: [idev] SUBJECT.KEYID = 7
1,175,841 UART: [idev] UDS.KEYID = 0
1,176,186 ready_for_fw is high
1,176,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,272 UART: [idev] Erasing UDS.KEYID = 0
1,201,390 UART: [idev] Sha1 KeyId Algorithm
1,209,853 UART: [idev] --
1,210,797 UART: [ldev] ++
1,210,965 UART: [ldev] CDI.KEYID = 6
1,211,328 UART: [ldev] SUBJECT.KEYID = 5
1,211,754 UART: [ldev] AUTHORITY.KEYID = 7
1,212,217 UART: [ldev] FE.KEYID = 1
1,217,157 UART: [ldev] Erasing FE.KEYID = 1
1,244,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,785 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,479 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,351 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,057 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,090 UART: [ldev] --
1,283,365 UART: [fwproc] Wait for Commands...
1,283,935 UART: [fwproc] Recv command 0x46574c44
1,284,663 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,636,181 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,801,399 >>> mbox cmd response: success
2,802,434 UART: [afmc] ++
2,802,602 UART: [afmc] CDI.KEYID = 6
2,802,964 UART: [afmc] SUBJECT.KEYID = 7
2,803,389 UART: [afmc] AUTHORITY.KEYID = 5
2,838,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,855,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,941 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,659 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,554 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,873,261 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,881,001 UART: [afmc] --
2,881,906 UART: [cold-reset] --
2,882,548 UART: [state] Locking Datavault
2,883,661 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,265 UART: [state] Locking ICCM
2,884,819 UART: [exit] Launching FMC @ 0x40000130
2,890,148 UART:
2,890,164 UART: Running Caliptra FMC ...
2,890,572 UART:
2,890,626 UART: [state] CFI Enabled
2,901,177 UART: [fht] FMC Alias Private Key: 7
3,008,914 UART: [art] Extend RT PCRs Done
3,009,342 UART: [art] Lock RT PCRs Done
3,010,812 UART: [art] Populate DV Done
3,018,856 UART: [fht] FMC Alias Private Key: 7
3,019,848 UART: [art] Derive CDI
3,020,128 UART: [art] Store in in slot 0x4
3,105,189 UART: [art] Derive Key Pair
3,105,549 UART: [art] Store priv key in slot 0x5
3,119,171 UART: [art] Derive Key Pair - Done
3,134,264 UART: [art] Signing Cert with AUTHO
3,134,744 UART: RITY.KEYID = 7
3,149,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,737 UART: [art] PUB.X = ED1FF5BF06E4D79440D30B85C2C0962B46867D14F85B38149FDD02211ED86598B8FD98DC3CAF0786177ACAE0276ABAC3
3,157,507 UART: [art] PUB.Y = 6BD30CFC4990B7F49D219846DBF34363EEF256774629614148BA767396C84790BA9E6FFA9C00AA54E1122459D6690EBD
3,164,429 UART: [art] SIG.R = 8076A190F3D35B28483D23AB882C4CBCE357C6D253E84107D746D403B1B54B223E79079C5AAD02FEFAC9007DB5E7B824
3,171,171 UART: [art] SIG.S = 67C9BBE343C8ADDA2A2F5F0F8E932CD76458B5297188045EDAE607BB13191CFCB89D2EC1CE85DBEC4DE46CD6E2E3058B
3,195,558 UART: Caliptra RT
3,195,811 UART: [state] CFI Enabled
3,302,578 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,334 UART:
3,303,350 UART: Running Caliptra ROM ...
3,303,758 UART:
3,303,813 UART: [state] CFI Enabled
3,306,524 UART: [state] LifecycleState = Production
3,307,132 UART: [state] DebugLocked = Yes
3,307,766 UART: [state] Starting the WD Timer 40000000 cycles
3,309,285 UART: [kat] SHA2-256
4,114,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,119,060 UART: [kat] ++
4,119,212 UART: [kat] sha1
4,123,410 UART: [kat] SHA2-256
4,125,350 UART: [kat] SHA2-384
4,127,885 UART: [kat] SHA2-512-ACC
4,129,786 UART: [kat] ECC-384
4,139,341 UART: [kat] HMAC-384Kdf
4,143,855 UART: [kat] LMS
4,392,183 UART: [kat] --
4,393,211 UART: [warm-reset] ++
4,394,332 UART: [warm-reset] --
4,395,197 UART: [state] Locking Datavault
4,395,929 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,533 UART: [state] Locking ICCM
4,397,181 UART: [exit] Launching FMC @ 0x40000130
4,402,510 UART:
4,402,526 UART: Running Caliptra FMC ...
4,402,934 UART:
4,402,988 UART: [state] CFI Enabled
4,403,987 UART: [aliasrt :skip pcr extension
4,404,460 UART: [art] Extend RT PCRs Done
4,404,888 UART: [art] Lock RT PCRs Done
4,406,181 UART: [art] Populate DV Done
4,414,405 UART: [fht] FMC Alias Private Key: 7
4,415,529 UART: [art] Derive CDI
4,415,809 UART: [art] Store in in slot 0x4
4,501,490 UART: [art] Derive Key Pair
4,501,850 UART: [art] Store priv key in slot 0x5
4,515,010 UART: [art] Derive Key Pair - Done
4,529,947 UART: [art] Signing Cert with AUTHO
4,530,427 UART: RITY.KEYID = 7
4,545,801 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,566 UART: [art] PUB.X = ED1FF5BF06E4D79440D30B85C2C0962B46867D14F85B38149FDD02211ED86598B8FD98DC3CAF0786177ACAE0276ABAC3
4,553,336 UART: [art] PUB.Y = 6BD30CFC4990B7F49D219846DBF34363EEF256774629614148BA767396C84790BA9E6FFA9C00AA54E1122459D6690EBD
4,560,258 UART: [art] SIG.R = 8076A190F3D35B28483D23AB882C4CBCE357C6D253E84107D746D403B1B54B223E79079C5AAD02FEFAC9007DB5E7B824
4,567,000 UART: [art] SIG.S = 67C9BBE343C8ADDA2A2F5F0F8E932CD76458B5297188045EDAE607BB13191CFCB89D2EC1CE85DBEC4DE46CD6E2E3058B
4,591,163 UART: Caliptra RT
4,591,416 UART: [state] CFI Enabled
4,873,477 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,262 ready_for_fw is high
1,060,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,653,942 >>> mbox cmd response: success
2,715,089 UART:
2,715,105 UART: Running Caliptra FMC ...
2,715,513 UART:
2,715,567 UART: [state] CFI Enabled
2,725,974 UART: [fht] FMC Alias Private Key: 7
2,834,615 UART: [art] Extend RT PCRs Done
2,835,043 UART: [art] Lock RT PCRs Done
2,836,467 UART: [art] Populate DV Done
2,844,667 UART: [fht] FMC Alias Private Key: 7
2,845,805 UART: [art] Derive CDI
2,846,085 UART: [art] Store in in slot 0x4
2,931,978 UART: [art] Derive Key Pair
2,932,338 UART: [art] Store priv key in slot 0x5
2,945,702 UART: [art] Derive Key Pair - Done
2,960,751 UART: [art] Signing Cert with AUTHO
2,961,231 UART: RITY.KEYID = 7
2,976,355 UART: [art] Erasing AUTHORITY.KEYID = 7
2,977,120 UART: [art] PUB.X = 827A22678B447114F51DE5893DCBAF1AC1BF718122994B1024215F3BBBE371E725C1479AF3D71169F64433CDDD585D84
2,983,890 UART: [art] PUB.Y = BFC4CA2B47F459BEAA69A0E3C813823650FF71E0627CB4E92762693757A5C802EFCE772AC3201FFEFD17FCFBCD600D60
2,990,852 UART: [art] SIG.R = 6AB3CB1B4B30BEA2E5F6A4E6C5F830CC2105073649886523BC8AF5999551691AD6718B0A4138EF17FBF44A77EED788CD
2,997,623 UART: [art] SIG.S = 06348B5CBE911207D2082AAFEC90BC5207EE1A2ADB6BF7E51705B0847FD0E2C420F8676CA1A7667A0AD045BB9E4522EE
3,021,266 UART: Caliptra RT
3,021,519 UART: [state] CFI Enabled
3,129,333 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,112,451 UART:
4,112,467 UART: Running Caliptra FMC ...
4,112,875 UART:
4,112,929 UART: [state] CFI Enabled
4,114,362 UART: [aliasrt :skip pcr extension
4,114,835 UART: [art] Extend RT PCRs Done
4,115,263 UART: [art] Lock RT PCRs Done
4,116,660 UART: [art] Populate DV Done
4,124,948 UART: [fht] FMC Alias Private Key: 7
4,126,112 UART: [art] Derive CDI
4,126,392 UART: [art] Store in in slot 0x4
4,211,907 UART: [art] Derive Key Pair
4,212,267 UART: [art] Store priv key in slot 0x5
4,225,279 UART: [art] Derive Key Pair - Done
4,240,140 UART: [art] Signing Cert with AUTHO
4,240,620 UART: RITY.KEYID = 7
4,255,886 UART: [art] Erasing AUTHORITY.KEYID = 7
4,256,651 UART: [art] PUB.X = 827A22678B447114F51DE5893DCBAF1AC1BF718122994B1024215F3BBBE371E725C1479AF3D71169F64433CDDD585D84
4,263,421 UART: [art] PUB.Y = BFC4CA2B47F459BEAA69A0E3C813823650FF71E0627CB4E92762693757A5C802EFCE772AC3201FFEFD17FCFBCD600D60
4,270,383 UART: [art] SIG.R = 6AB3CB1B4B30BEA2E5F6A4E6C5F830CC2105073649886523BC8AF5999551691AD6718B0A4138EF17FBF44A77EED788CD
4,277,154 UART: [art] SIG.S = 06348B5CBE911207D2082AAFEC90BC5207EE1A2ADB6BF7E51705B0847FD0E2C420F8676CA1A7667A0AD045BB9E4522EE
4,300,251 UART: Caliptra RT
4,300,504 UART: [state] CFI Enabled
4,579,242 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,708 UART: [state] LifecycleState = Production
86,316 UART: [state] DebugLocked = Yes
86,906 UART: [state] Starting the WD Timer 40000000 cycles
88,417 UART: [kat] SHA2-256
894,067 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,192 UART: [kat] ++
898,344 UART: [kat] sha1
902,564 UART: [kat] SHA2-256
904,504 UART: [kat] SHA2-384
907,073 UART: [kat] SHA2-512-ACC
908,974 UART: [kat] ECC-384
918,937 UART: [kat] HMAC-384Kdf
923,653 UART: [kat] LMS
1,171,981 UART: [kat] --
1,172,954 UART: [cold-reset] ++
1,173,351 UART: [fht] FHT @ 0x50003400
1,176,080 UART: [idev] ++
1,176,248 UART: [idev] CDI.KEYID = 6
1,176,608 UART: [idev] SUBJECT.KEYID = 7
1,177,032 UART: [idev] UDS.KEYID = 0
1,177,377 ready_for_fw is high
1,177,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,271 UART: [idev] Erasing UDS.KEYID = 0
1,202,849 UART: [idev] Sha1 KeyId Algorithm
1,211,158 UART: [idev] --
1,212,380 UART: [ldev] ++
1,212,548 UART: [ldev] CDI.KEYID = 6
1,212,911 UART: [ldev] SUBJECT.KEYID = 5
1,213,337 UART: [ldev] AUTHORITY.KEYID = 7
1,213,800 UART: [ldev] FE.KEYID = 1
1,219,282 UART: [ldev] Erasing FE.KEYID = 1
1,245,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,030 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,724 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,596 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,276,302 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,283,593 UART: [ldev] --
1,284,858 UART: [fwproc] Wait for Commands...
1,285,486 UART: [fwproc] Recv command 0x46574c44
1,286,214 UART: [fwproc] Recv'd Img size: 114448 bytes
2,611,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,638,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,667,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,803,660 >>> mbox cmd response: success
2,804,779 UART: [afmc] ++
2,804,947 UART: [afmc] CDI.KEYID = 6
2,805,309 UART: [afmc] SUBJECT.KEYID = 7
2,805,734 UART: [afmc] AUTHORITY.KEYID = 5
2,841,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,857,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,858,268 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,863,986 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,869,881 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,875,588 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,883,494 UART: [afmc] --
2,884,505 UART: [cold-reset] --
2,885,339 UART: [state] Locking Datavault
2,886,454 UART: [state] Locking PCR0, PCR1 and PCR31
2,887,058 UART: [state] Locking ICCM
2,887,682 UART: [exit] Launching FMC @ 0x40000130
2,893,011 UART:
2,893,027 UART: Running Caliptra FMC ...
2,893,435 UART:
2,893,578 UART: [state] CFI Enabled
2,904,397 UART: [fht] FMC Alias Private Key: 7
3,012,524 UART: [art] Extend RT PCRs Done
3,012,952 UART: [art] Lock RT PCRs Done
3,014,250 UART: [art] Populate DV Done
3,022,488 UART: [fht] FMC Alias Private Key: 7
3,023,418 UART: [art] Derive CDI
3,023,698 UART: [art] Store in in slot 0x4
3,109,821 UART: [art] Derive Key Pair
3,110,181 UART: [art] Store priv key in slot 0x5
3,123,349 UART: [art] Derive Key Pair - Done
3,138,339 UART: [art] Signing Cert with AUTHO
3,138,819 UART: RITY.KEYID = 7
3,153,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,154,300 UART: [art] PUB.X = 4649E274BA8FC992F0901AA9EB3117C0C101A25053109CCA651620B4A7F8D9B2584ED687E9C9942D52FD21D4B77232BE
3,161,069 UART: [art] PUB.Y = BCE4E2997AB006215934C8BA98C64D2A4A1BD4512E8E4F4402426C4FC4803C5C8B516CECFEE57ACE0E2E80D4FD975620
3,168,024 UART: [art] SIG.R = 5494314320C9F2DB3BAB89209779264BECBCBDDC46DE012B48BA833CDEF943B8331AFB29FB73A68405E9FA548D2ADEC8
3,174,806 UART: [art] SIG.S = 6B4183188DD632814E966CA1DBCA17A0701323C17498F3421784E8F9E231398D29F5DC3254081C8D17F5E9717142B1A0
3,198,124 UART: Caliptra RT
3,198,469 UART: [state] CFI Enabled
3,307,411 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,308,167 UART:
3,308,183 UART: Running Caliptra ROM ...
3,308,591 UART:
3,308,733 UART: [state] CFI Enabled
3,311,750 UART: [state] LifecycleState = Production
3,312,358 UART: [state] DebugLocked = Yes
3,312,892 UART: [state] Starting the WD Timer 40000000 cycles
3,314,605 UART: [kat] SHA2-256
4,120,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,124,380 UART: [kat] ++
4,124,532 UART: [kat] sha1
4,128,834 UART: [kat] SHA2-256
4,130,774 UART: [kat] SHA2-384
4,133,651 UART: [kat] SHA2-512-ACC
4,135,552 UART: [kat] ECC-384
4,145,433 UART: [kat] HMAC-384Kdf
4,150,285 UART: [kat] LMS
4,398,613 UART: [kat] --
4,399,387 UART: [warm-reset] ++
4,400,400 UART: [warm-reset] --
4,401,261 UART: [state] Locking Datavault
4,401,969 UART: [state] Locking PCR0, PCR1 and PCR31
4,402,573 UART: [state] Locking ICCM
4,403,087 UART: [exit] Launching FMC @ 0x40000130
4,408,416 UART:
4,408,432 UART: Running Caliptra FMC ...
4,408,840 UART:
4,408,983 UART: [state] CFI Enabled
4,410,404 UART: [aliasrt :skip pcr extension
4,410,877 UART: [art] Extend RT PCRs Done
4,411,305 UART: [art] Lock RT PCRs Done
4,412,554 UART: [art] Populate DV Done
4,420,786 UART: [fht] FMC Alias Private Key: 7
4,421,904 UART: [art] Derive CDI
4,422,184 UART: [art] Store in in slot 0x4
4,507,603 UART: [art] Derive Key Pair
4,507,963 UART: [art] Store priv key in slot 0x5
4,521,027 UART: [art] Derive Key Pair - Done
4,535,893 UART: [art] Signing Cert with AUTHO
4,536,373 UART: RITY.KEYID = 7
4,551,605 UART: [art] Erasing AUTHORITY.KEYID = 7
4,552,370 UART: [art] PUB.X = 4649E274BA8FC992F0901AA9EB3117C0C101A25053109CCA651620B4A7F8D9B2584ED687E9C9942D52FD21D4B77232BE
4,559,139 UART: [art] PUB.Y = BCE4E2997AB006215934C8BA98C64D2A4A1BD4512E8E4F4402426C4FC4803C5C8B516CECFEE57ACE0E2E80D4FD975620
4,566,094 UART: [art] SIG.R = 5494314320C9F2DB3BAB89209779264BECBCBDDC46DE012B48BA833CDEF943B8331AFB29FB73A68405E9FA548D2ADEC8
4,572,876 UART: [art] SIG.S = 6B4183188DD632814E966CA1DBCA17A0701323C17498F3421784E8F9E231398D29F5DC3254081C8D17F5E9717142B1A0
4,596,910 UART: Caliptra RT
4,597,255 UART: [state] CFI Enabled
4,882,163 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,941 ready_for_fw is high
1,060,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,653,259 >>> mbox cmd response: success
2,716,250 UART:
2,716,266 UART: Running Caliptra FMC ...
2,716,674 UART:
2,716,817 UART: [state] CFI Enabled
2,727,584 UART: [fht] FMC Alias Private Key: 7
2,835,699 UART: [art] Extend RT PCRs Done
2,836,127 UART: [art] Lock RT PCRs Done
2,837,599 UART: [art] Populate DV Done
2,845,573 UART: [fht] FMC Alias Private Key: 7
2,846,685 UART: [art] Derive CDI
2,846,965 UART: [art] Store in in slot 0x4
2,932,592 UART: [art] Derive Key Pair
2,932,952 UART: [art] Store priv key in slot 0x5
2,946,020 UART: [art] Derive Key Pair - Done
2,960,864 UART: [art] Signing Cert with AUTHO
2,961,344 UART: RITY.KEYID = 7
2,976,716 UART: [art] Erasing AUTHORITY.KEYID = 7
2,977,481 UART: [art] PUB.X = E7E04F206804AA31CDBF3FE4884E9F29C0696739A1E8125867AE6018239334770D771FF4A251C5C6E9C0F4BCDE64FB97
2,984,249 UART: [art] PUB.Y = D71E8909310B8816BACD1C57C1EC21E289A5A8350346C025F319ACF445162813D4FFBAD69C5407E8BCA1498A55A37E26
2,991,191 UART: [art] SIG.R = 739299F0714ADABC627FFECDAA03BE5CF24F39236818A5954686EBEDB63F2CA2F1934BDE9CC46352204B7501DB832DC8
2,997,969 UART: [art] SIG.S = 4FF7FC44CC89E22B4AA0B630592E5C29A1AB7D0D3CFB7B478F4D04E69A3A96578C2833DE259D101BAE6E26C41692249C
3,021,628 UART: Caliptra RT
3,021,973 UART: [state] CFI Enabled
3,130,791 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,115,122 UART:
4,115,138 UART: Running Caliptra FMC ...
4,115,546 UART:
4,115,689 UART: [state] CFI Enabled
4,116,760 UART: [aliasrt :skip pcr extension
4,117,233 UART: [art] Extend RT PCRs Done
4,117,661 UART: [art] Lock RT PCRs Done
4,118,832 UART: [art] Populate DV Done
4,127,114 UART: [fht] FMC Alias Private Key: 7
4,128,238 UART: [art] Derive CDI
4,128,518 UART: [art] Store in in slot 0x4
4,214,345 UART: [art] Derive Key Pair
4,214,705 UART: [art] Store priv key in slot 0x5
4,227,691 UART: [art] Derive Key Pair - Done
4,242,673 UART: [art] Signing Cert with AUTHO
4,243,153 UART: RITY.KEYID = 7
4,258,349 UART: [art] Erasing AUTHORITY.KEYID = 7
4,259,114 UART: [art] PUB.X = E7E04F206804AA31CDBF3FE4884E9F29C0696739A1E8125867AE6018239334770D771FF4A251C5C6E9C0F4BCDE64FB97
4,265,882 UART: [art] PUB.Y = D71E8909310B8816BACD1C57C1EC21E289A5A8350346C025F319ACF445162813D4FFBAD69C5407E8BCA1498A55A37E26
4,272,824 UART: [art] SIG.R = 739299F0714ADABC627FFECDAA03BE5CF24F39236818A5954686EBEDB63F2CA2F1934BDE9CC46352204B7501DB832DC8
4,279,602 UART: [art] SIG.S = 4FF7FC44CC89E22B4AA0B630592E5C29A1AB7D0D3CFB7B478F4D04E69A3A96578C2833DE259D101BAE6E26C41692249C
4,303,709 UART: Caliptra RT
4,304,054 UART: [state] CFI Enabled
4,588,412 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,737 UART: [state] LifecycleState = Production
85,345 UART: [state] DebugLocked = Yes
85,975 UART: [state] Starting the WD Timer 40000000 cycles
87,620 UART: [kat] SHA2-256
891,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,299 UART: [kat] ++
895,451 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
921,038 UART: [kat] LMS
1,169,350 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,174,648 ready_for_fw is high
1,174,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,405 UART: [idev] Erasing UDS.KEYID = 0
1,199,566 UART: [idev] Sha1 KeyId Algorithm
1,208,569 UART: [idev] --
1,209,556 UART: [ldev] ++
1,209,724 UART: [ldev] CDI.KEYID = 6
1,210,088 UART: [ldev] SUBJECT.KEYID = 5
1,210,515 UART: [ldev] AUTHORITY.KEYID = 7
1,210,978 UART: [ldev] FE.KEYID = 1
1,216,238 UART: [ldev] Erasing FE.KEYID = 1
1,242,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,163 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,857 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,727 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,433 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,653 UART: [ldev] --
1,282,005 UART: [fwproc] Wait for Commands...
1,282,772 UART: [fwproc] Recv command 0x46574c44
1,283,505 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,806 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,798,775 >>> mbox cmd response: success
2,800,015 UART: [afmc] ++
2,800,183 UART: [afmc] CDI.KEYID = 6
2,800,546 UART: [afmc] SUBJECT.KEYID = 7
2,800,972 UART: [afmc] AUTHORITY.KEYID = 5
2,836,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,002 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,721 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,614 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,321 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,248 UART: [afmc] --
2,879,211 UART: [cold-reset] --
2,880,143 UART: [state] Locking Datavault
2,881,490 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,094 UART: [state] Locking ICCM
2,882,538 UART: [exit] Launching FMC @ 0x40000130
2,887,867 UART:
2,887,883 UART: Running Caliptra FMC ...
2,888,291 UART:
2,888,345 UART: [state] CFI Enabled
2,898,434 UART: [fht] FMC Alias Private Key: 7
3,007,299 UART: [art] Extend RT PCRs Done
3,007,727 UART: [art] Lock RT PCRs Done
3,009,385 UART: [art] Populate DV Done
3,017,531 UART: [fht] FMC Alias Private Key: 7
3,018,591 UART: [art] Derive CDI
3,018,871 UART: [art] Store in in slot 0x4
3,103,890 UART: [art] Derive Key Pair
3,104,250 UART: [art] Store priv key in slot 0x5
3,116,980 UART: [art] Derive Key Pair - Done
3,131,410 UART: [art] Signing Cert with AUTHO
3,131,890 UART: RITY.KEYID = 7
3,147,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,835 UART: [art] PUB.X = 057CB92836461C288162C927D0E689E96B079C368C9496AE0BA85F8EA71BE0532A7A0E3385B1492A3FD6843DF576AFF1
3,154,593 UART: [art] PUB.Y = 027D112F9293B8D37E8605B57975AD27F713D03660DF98E565EDAD5680247D1CDB354CB9EA3E513F4CA39ECDCA0060E5
3,161,523 UART: [art] SIG.R = BF34360D4BC75BA8054D7124D72F15D8060C29A562925B7968CF5733D46F7CDA9BD019519489F513163753AB5519B294
3,168,273 UART: [art] SIG.S = E164B1E903A31C342074D59F9E1689002DAB72B00811880714A94086C024DFE593962B88CDC9B8E3048206547E2FC5AB
3,192,323 UART: Caliptra RT
3,192,576 UART: [state] CFI Enabled
3,300,021 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,777 UART:
3,300,793 UART: Running Caliptra ROM ...
3,301,201 UART:
3,301,256 UART: [state] CFI Enabled
3,304,009 UART: [state] LifecycleState = Production
3,304,617 UART: [state] DebugLocked = Yes
3,305,223 UART: [state] Starting the WD Timer 40000000 cycles
3,306,928 UART: [kat] SHA2-256
4,110,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,607 UART: [kat] ++
4,114,759 UART: [kat] sha1
4,119,205 UART: [kat] SHA2-256
4,121,145 UART: [kat] SHA2-384
4,123,946 UART: [kat] SHA2-512-ACC
4,125,847 UART: [kat] ECC-384
4,135,390 UART: [kat] HMAC-384Kdf
4,139,812 UART: [kat] LMS
4,388,124 UART: [kat] --
4,389,078 UART: [warm-reset] ++
4,389,989 UART: [warm-reset] --
4,390,752 UART: [state] Locking Datavault
4,391,494 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,098 UART: [state] Locking ICCM
4,392,560 UART: [exit] Launching FMC @ 0x40000130
4,397,889 UART:
4,397,905 UART: Running Caliptra FMC ...
4,398,313 UART:
4,398,367 UART: [state] CFI Enabled
4,399,592 UART: [aliasrt :skip pcr extension
4,400,065 UART: [art] Extend RT PCRs Done
4,400,493 UART: [art] Lock RT PCRs Done
4,401,594 UART: [art] Populate DV Done
4,409,974 UART: [fht] FMC Alias Private Key: 7
4,411,068 UART: [art] Derive CDI
4,411,348 UART: [art] Store in in slot 0x4
4,496,777 UART: [art] Derive Key Pair
4,497,137 UART: [art] Store priv key in slot 0x5
4,510,689 UART: [art] Derive Key Pair - Done
4,525,365 UART: [art] Signing Cert with AUTHO
4,525,845 UART: RITY.KEYID = 7
4,541,137 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,902 UART: [art] PUB.X = 057CB92836461C288162C927D0E689E96B079C368C9496AE0BA85F8EA71BE0532A7A0E3385B1492A3FD6843DF576AFF1
4,548,660 UART: [art] PUB.Y = 027D112F9293B8D37E8605B57975AD27F713D03660DF98E565EDAD5680247D1CDB354CB9EA3E513F4CA39ECDCA0060E5
4,555,590 UART: [art] SIG.R = BF34360D4BC75BA8054D7124D72F15D8060C29A562925B7968CF5733D46F7CDA9BD019519489F513163753AB5519B294
4,562,340 UART: [art] SIG.S = E164B1E903A31C342074D59F9E1689002DAB72B00811880714A94086C024DFE593962B88CDC9B8E3048206547E2FC5AB
4,586,404 UART: Caliptra RT
4,586,657 UART: [state] CFI Enabled
4,870,576 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,153 ready_for_fw is high
1,057,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,307 >>> mbox cmd response: success
2,710,980 UART:
2,710,996 UART: Running Caliptra FMC ...
2,711,404 UART:
2,711,458 UART: [state] CFI Enabled
2,721,775 UART: [fht] FMC Alias Private Key: 7
2,829,622 UART: [art] Extend RT PCRs Done
2,830,050 UART: [art] Lock RT PCRs Done
2,831,650 UART: [art] Populate DV Done
2,839,986 UART: [fht] FMC Alias Private Key: 7
2,841,044 UART: [art] Derive CDI
2,841,324 UART: [art] Store in in slot 0x4
2,926,861 UART: [art] Derive Key Pair
2,927,221 UART: [art] Store priv key in slot 0x5
2,940,431 UART: [art] Derive Key Pair - Done
2,954,889 UART: [art] Signing Cert with AUTHO
2,955,369 UART: RITY.KEYID = 7
2,970,961 UART: [art] Erasing AUTHORITY.KEYID = 7
2,971,726 UART: [art] PUB.X = 7E8C6CBD1456B296C372B305509E68D44FE8CE60FE6426A17CDAE9428B97433A46D6C3E563EE47BC31E80CF488B2D938
2,978,498 UART: [art] PUB.Y = 268F1E0952CA9BD423F35001694814EA1E99770AA94B8CB4E6E5154A733B746E18DFBCDE80548D755773A9027F09ECDD
2,985,437 UART: [art] SIG.R = BD4DE3F1B05CBD944B83EBE5BDFC51F52ABD94805C6F0BA841DE2A600E56F2D41463574DF38EAA704F39F6483B308096
2,992,217 UART: [art] SIG.S = 5E5E18C7DED3C1A93A23D5637D3B6053DCE296D948FD64361CBDB18AE44B43A361B282B2A2EB609E79F3CDCE6F3128DB
3,015,506 UART: Caliptra RT
3,015,759 UART: [state] CFI Enabled
3,124,380 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,103,694 UART:
4,103,710 UART: Running Caliptra FMC ...
4,104,118 UART:
4,104,172 UART: [state] CFI Enabled
4,105,505 UART: [aliasrt :skip pcr extension
4,105,978 UART: [art] Extend RT PCRs Done
4,106,406 UART: [art] Lock RT PCRs Done
4,107,707 UART: [art] Populate DV Done
4,115,915 UART: [fht] FMC Alias Private Key: 7
4,116,881 UART: [art] Derive CDI
4,117,161 UART: [art] Store in in slot 0x4
4,202,846 UART: [art] Derive Key Pair
4,203,206 UART: [art] Store priv key in slot 0x5
4,217,100 UART: [art] Derive Key Pair - Done
4,231,628 UART: [art] Signing Cert with AUTHO
4,232,108 UART: RITY.KEYID = 7
4,247,350 UART: [art] Erasing AUTHORITY.KEYID = 7
4,248,115 UART: [art] PUB.X = 7E8C6CBD1456B296C372B305509E68D44FE8CE60FE6426A17CDAE9428B97433A46D6C3E563EE47BC31E80CF488B2D938
4,254,887 UART: [art] PUB.Y = 268F1E0952CA9BD423F35001694814EA1E99770AA94B8CB4E6E5154A733B746E18DFBCDE80548D755773A9027F09ECDD
4,261,826 UART: [art] SIG.R = BD4DE3F1B05CBD944B83EBE5BDFC51F52ABD94805C6F0BA841DE2A600E56F2D41463574DF38EAA704F39F6483B308096
4,268,606 UART: [art] SIG.S = 5E5E18C7DED3C1A93A23D5637D3B6053DCE296D948FD64361CBDB18AE44B43A361B282B2A2EB609E79F3CDCE6F3128DB
4,292,291 UART: Caliptra RT
4,292,544 UART: [state] CFI Enabled
4,576,095 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Production
85,916 UART: [state] DebugLocked = Yes
86,502 UART: [state] Starting the WD Timer 40000000 cycles
88,183 UART: [kat] SHA2-256
891,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,862 UART: [kat] ++
896,014 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,079 UART: [kat] SHA2-512-ACC
906,980 UART: [kat] ECC-384
916,467 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,570 UART: [cold-reset] ++
1,171,053 UART: [fht] FHT @ 0x50003400
1,173,791 UART: [idev] ++
1,173,959 UART: [idev] CDI.KEYID = 6
1,174,320 UART: [idev] SUBJECT.KEYID = 7
1,174,745 UART: [idev] UDS.KEYID = 0
1,175,091 ready_for_fw is high
1,175,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,886 UART: [idev] Erasing UDS.KEYID = 0
1,200,149 UART: [idev] Sha1 KeyId Algorithm
1,208,926 UART: [idev] --
1,209,957 UART: [ldev] ++
1,210,125 UART: [ldev] CDI.KEYID = 6
1,210,489 UART: [ldev] SUBJECT.KEYID = 5
1,210,916 UART: [ldev] AUTHORITY.KEYID = 7
1,211,379 UART: [ldev] FE.KEYID = 1
1,216,709 UART: [ldev] Erasing FE.KEYID = 1
1,243,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,818 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,512 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,382 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,088 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,202 UART: [ldev] --
1,282,526 UART: [fwproc] Wait for Commands...
1,283,287 UART: [fwproc] Recv command 0x46574c44
1,284,020 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,800,700 >>> mbox cmd response: success
2,801,928 UART: [afmc] ++
2,802,096 UART: [afmc] CDI.KEYID = 6
2,802,459 UART: [afmc] SUBJECT.KEYID = 7
2,802,885 UART: [afmc] AUTHORITY.KEYID = 5
2,838,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,855,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,909 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,628 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,521 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,873,228 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,881,153 UART: [afmc] --
2,882,172 UART: [cold-reset] --
2,882,992 UART: [state] Locking Datavault
2,884,135 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,739 UART: [state] Locking ICCM
2,885,303 UART: [exit] Launching FMC @ 0x40000130
2,890,632 UART:
2,890,648 UART: Running Caliptra FMC ...
2,891,056 UART:
2,891,199 UART: [state] CFI Enabled
2,901,646 UART: [fht] FMC Alias Private Key: 7
3,009,405 UART: [art] Extend RT PCRs Done
3,009,833 UART: [art] Lock RT PCRs Done
3,011,603 UART: [art] Populate DV Done
3,019,791 UART: [fht] FMC Alias Private Key: 7
3,020,795 UART: [art] Derive CDI
3,021,075 UART: [art] Store in in slot 0x4
3,106,592 UART: [art] Derive Key Pair
3,106,952 UART: [art] Store priv key in slot 0x5
3,120,544 UART: [art] Derive Key Pair - Done
3,135,117 UART: [art] Signing Cert with AUTHO
3,135,597 UART: RITY.KEYID = 7
3,150,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,456 UART: [art] PUB.X = 6BC0510D6CEFB4AF054ACA589F1F385E75890AE2BEB5B15C27A94CAA8B5F1AE159779CD06B40C4668E58F855512B4845
3,158,229 UART: [art] PUB.Y = D31024D2987752D26A00E37B8FEF0A139F420E5E57CDFCA8158BD3A59A35F7AF34CAD9B1889958186D8C5BD4A869A3F3
3,165,161 UART: [art] SIG.R = 60718FB79836872FBC5EEBADEC36B8651436E7361F9EC262E538DC08CD0EA737DDB974848EB33BD6CEFB1D6BF3134728
3,171,939 UART: [art] SIG.S = 17202A814792D89EF4B53F550CB23D0E39124A5384F2F90892F7F32F5056F5D6A9D158E9AF2F6517D8858331269AF468
3,195,339 UART: Caliptra RT
3,195,684 UART: [state] CFI Enabled
3,303,784 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,540 UART:
3,304,556 UART: Running Caliptra ROM ...
3,304,964 UART:
3,305,106 UART: [state] CFI Enabled
3,308,021 UART: [state] LifecycleState = Production
3,308,629 UART: [state] DebugLocked = Yes
3,309,313 UART: [state] Starting the WD Timer 40000000 cycles
3,310,900 UART: [kat] SHA2-256
4,114,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,579 UART: [kat] ++
4,118,731 UART: [kat] sha1
4,122,969 UART: [kat] SHA2-256
4,124,909 UART: [kat] SHA2-384
4,127,632 UART: [kat] SHA2-512-ACC
4,129,533 UART: [kat] ECC-384
4,139,322 UART: [kat] HMAC-384Kdf
4,143,796 UART: [kat] LMS
4,392,108 UART: [kat] --
4,392,978 UART: [warm-reset] ++
4,394,127 UART: [warm-reset] --
4,394,802 UART: [state] Locking Datavault
4,395,612 UART: [state] Locking PCR0, PCR1 and PCR31
4,396,216 UART: [state] Locking ICCM
4,396,642 UART: [exit] Launching FMC @ 0x40000130
4,401,971 UART:
4,401,987 UART: Running Caliptra FMC ...
4,402,395 UART:
4,402,538 UART: [state] CFI Enabled
4,404,011 UART: [aliasrt :skip pcr extension
4,404,484 UART: [art] Extend RT PCRs Done
4,404,912 UART: [art] Lock RT PCRs Done
4,406,319 UART: [art] Populate DV Done
4,414,725 UART: [fht] FMC Alias Private Key: 7
4,415,747 UART: [art] Derive CDI
4,416,027 UART: [art] Store in in slot 0x4
4,501,704 UART: [art] Derive Key Pair
4,502,064 UART: [art] Store priv key in slot 0x5
4,515,018 UART: [art] Derive Key Pair - Done
4,529,647 UART: [art] Signing Cert with AUTHO
4,530,127 UART: RITY.KEYID = 7
4,545,519 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,284 UART: [art] PUB.X = 6BC0510D6CEFB4AF054ACA589F1F385E75890AE2BEB5B15C27A94CAA8B5F1AE159779CD06B40C4668E58F855512B4845
4,553,057 UART: [art] PUB.Y = D31024D2987752D26A00E37B8FEF0A139F420E5E57CDFCA8158BD3A59A35F7AF34CAD9B1889958186D8C5BD4A869A3F3
4,559,989 UART: [art] SIG.R = 60718FB79836872FBC5EEBADEC36B8651436E7361F9EC262E538DC08CD0EA737DDB974848EB33BD6CEFB1D6BF3134728
4,566,767 UART: [art] SIG.S = 17202A814792D89EF4B53F550CB23D0E39124A5384F2F90892F7F32F5056F5D6A9D158E9AF2F6517D8858331269AF468
4,590,525 UART: Caliptra RT
4,590,870 UART: [state] CFI Enabled
4,873,230 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,580 ready_for_fw is high
1,056,580 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,232 >>> mbox cmd response: success
2,712,889 UART:
2,712,905 UART: Running Caliptra FMC ...
2,713,313 UART:
2,713,456 UART: [state] CFI Enabled
2,724,281 UART: [fht] FMC Alias Private Key: 7
2,831,948 UART: [art] Extend RT PCRs Done
2,832,376 UART: [art] Lock RT PCRs Done
2,833,782 UART: [art] Populate DV Done
2,841,886 UART: [fht] FMC Alias Private Key: 7
2,842,930 UART: [art] Derive CDI
2,843,210 UART: [art] Store in in slot 0x4
2,928,839 UART: [art] Derive Key Pair
2,929,199 UART: [art] Store priv key in slot 0x5
2,942,813 UART: [art] Derive Key Pair - Done
2,957,464 UART: [art] Signing Cert with AUTHO
2,957,944 UART: RITY.KEYID = 7
2,973,154 UART: [art] Erasing AUTHORITY.KEYID = 7
2,973,919 UART: [art] PUB.X = 28EC214ED26E31C62B35B8B6FE2BB807E39A8ED2E53087D697571FB4A4277C5B826967CA963E37388A287635F4F85152
2,980,684 UART: [art] PUB.Y = 7CA8B8F84A39C3361B0ECC8472C7A6920F240A3356A49A4113105D3990B1306AA2D2A752BB3A839D516CE53FFE1846B4
2,987,627 UART: [art] SIG.R = AC20BDA7AAA07093F40D8A0137AB77F00E341F2154BD32455CF9C49D7498B0D2CDF46B02D1E796A5E4D7EFD2032EE784
2,994,396 UART: [art] SIG.S = 8C26D655E9CDA3290AF2B1AEBA03A9F121B528A8539FEEF489E17A657276128D6BC1B9ACE02AB83ABAF7B1DC15B12E41
3,017,875 UART: Caliptra RT
3,018,220 UART: [state] CFI Enabled
3,126,813 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,106,464 UART:
4,106,480 UART: Running Caliptra FMC ...
4,106,888 UART:
4,107,031 UART: [state] CFI Enabled
4,108,324 UART: [aliasrt :skip pcr extension
4,108,797 UART: [art] Extend RT PCRs Done
4,109,225 UART: [art] Lock RT PCRs Done
4,110,550 UART: [art] Populate DV Done
4,119,052 UART: [fht] FMC Alias Private Key: 7
4,120,138 UART: [art] Derive CDI
4,120,418 UART: [art] Store in in slot 0x4
4,205,883 UART: [art] Derive Key Pair
4,206,243 UART: [art] Store priv key in slot 0x5
4,219,331 UART: [art] Derive Key Pair - Done
4,233,822 UART: [art] Signing Cert with AUTHO
4,234,302 UART: RITY.KEYID = 7
4,249,550 UART: [art] Erasing AUTHORITY.KEYID = 7
4,250,315 UART: [art] PUB.X = 28EC214ED26E31C62B35B8B6FE2BB807E39A8ED2E53087D697571FB4A4277C5B826967CA963E37388A287635F4F85152
4,257,080 UART: [art] PUB.Y = 7CA8B8F84A39C3361B0ECC8472C7A6920F240A3356A49A4113105D3990B1306AA2D2A752BB3A839D516CE53FFE1846B4
4,264,023 UART: [art] SIG.R = AC20BDA7AAA07093F40D8A0137AB77F00E341F2154BD32455CF9C49D7498B0D2CDF46B02D1E796A5E4D7EFD2032EE784
4,270,792 UART: [art] SIG.S = 8C26D655E9CDA3290AF2B1AEBA03A9F121B528A8539FEEF489E17A657276128D6BC1B9ACE02AB83ABAF7B1DC15B12E41
4,294,127 UART: Caliptra RT
4,294,472 UART: [state] CFI Enabled
4,578,113 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
191,929 UART:
192,330 UART: Running Caliptra ROM ...
193,453 UART:
193,605 UART: [state] CFI Enabled
265,122 UART: [state] LifecycleState = Production
266,949 UART: [state] DebugLocked = Yes
268,807 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,774 UART: [kat] SHA2-256
443,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,023 UART: [kat] ++
454,580 UART: [kat] sha1
464,118 UART: [kat] SHA2-256
466,835 UART: [kat] SHA2-384
473,684 UART: [kat] SHA2-512-ACC
476,035 UART: [kat] ECC-384
2,767,704 UART: [kat] HMAC-384Kdf
2,800,965 UART: [kat] LMS
3,991,256 UART: [kat] --
3,993,846 UART: [cold-reset] ++
3,995,407 UART: [fht] Storing FHT @ 0x50003400
4,007,442 UART: [idev] ++
4,008,011 UART: [idev] CDI.KEYID = 6
4,008,978 UART: [idev] SUBJECT.KEYID = 7
4,010,186 UART: [idev] UDS.KEYID = 0
Initializing fuses
879 UART: [idev] Erasing UDS.KEYID = 0
2,222 UART:
2,393 UART: Running Caliptra ROM ...
3,493 UART:
3,644 UART: [state] CFI Enabled
73,334 UART: [state] LifecycleState = Production
75,152 UART: [state] DebugLocked = Yes
77,759 UART: [state] Starting the Watchdog Timer 40000000 cycles
82,481 UART: [kat] SHA2-256
252,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
262,687 UART: [kat] ++
263,218 UART: [kat] sha1
274,583 UART: [kat] SHA2-256
277,258 UART: [kat] SHA2-384
282,119 UART: [kat] SHA2-512-ACC
284,517 UART: [kat] ECC-384
2,580,286 UART: [kat] HMAC-384Kdf
2,610,455 UART: [kat] LMS
3,800,734 UART: [kat] --
3,805,716 UART: [warm-reset] ++
3,806,573 UART: [warm-reset] Previous Cold-Reset was not successful.
3,811,128 UART: ROM Fatal Error: 0x01040010test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
191,918 UART:
192,275 UART: Running Caliptra ROM ...
193,453 UART:
603,138 UART: [state] CFI Enabled
618,524 UART: [state] LifecycleState = Production
620,315 UART: [state] DebugLocked = Yes
623,431 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,802 UART: [kat] SHA2-256
798,613 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,158 UART: [kat] ++
809,634 UART: [kat] sha1
820,592 UART: [kat] SHA2-256
823,264 UART: [kat] SHA2-384
829,143 UART: [kat] SHA2-512-ACC
831,487 UART: [kat] ECC-384
3,116,052 UART: [kat] HMAC-384Kdf
3,127,654 UART: [kat] LMS
4,317,778 UART: [kat] --
4,321,760 UART: [cold-reset] ++
4,322,733 UART: [fht] Storing FHT @ 0x50003400
4,332,832 UART: [idev] ++
4,333,399 UART: [idev] CDI.KEYID = 6
4,334,356 UART: [idev] SUBJECT.KEYID = 7
4,335,608 UART: [idev] UDS.KEYID = 0
Initializing fuses
886 UART: [idev] Erasing UDS.KEYID = 0
2,246 UART:
2,419 UART: Running Caliptra ROM ...
3,517 UART:
15,987,639 UART: [state] CFI Enabled
16,003,674 UART: [state] LifecycleState = Production
16,005,439 UART: [state] DebugLocked = Yes
16,007,082 UART: [state] Starting the Watchdog Timer 40000000 cycles
16,011,879 UART: [kat] SHA2-256
16,181,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
16,192,221 UART: [kat] ++
16,192,682 UART: [kat] sha1
16,202,975 UART: [kat] SHA2-256
16,205,712 UART: [kat] SHA2-384
16,211,434 UART: [kat] SHA2-512-ACC
16,213,773 UART: [kat] ECC-384
18,496,856 UART: [kat] HMAC-384Kdf
18,507,363 UART: [kat] LMS
19,697,497 UART: [kat] --
19,701,582 UART: [warm-reset] ++
19,702,439 UART: [warm-reset] Previous Cold-Reset was not successful.
19,705,371 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
192,059 UART:
192,418 UART: Running Caliptra ROM ...
193,587 UART:
193,732 UART: [state] CFI Enabled
264,482 UART: [state] LifecycleState = Production
266,235 UART: [state] DebugLocked = Yes
269,169 UART: [state] Starting the WD Timer 40000000 cycles
273,757 UART: [kat] SHA2-256
452,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,471 UART: [kat] ++
464,947 UART: [kat] sha1
475,934 UART: [kat] SHA2-256
478,975 UART: [kat] SHA2-384
484,909 UART: [kat] SHA2-512-ACC
487,877 UART: [kat] ECC-384
2,946,655 UART: [kat] HMAC-384Kdf
2,970,357 UART: [kat] LMS
3,499,817 UART: [kat] --
3,503,724 UART: [cold-reset] ++
3,506,079 UART: [fht] FHT @ 0x50003400
3,517,791 UART: [idev] ++
3,518,370 UART: [idev] CDI.KEYID = 6
3,519,250 UART: [idev] SUBJECT.KEYID = 7
3,520,404 UART: [idev] UDS.KEYID = 0
Initializing fuses
863 UART: [idev] Erasing UDS.KEYID = 0
2,058 UART:
2,288 UART: Running Caliptra ROM ...
3,404 UART:
3,564 UART: [state] CFI Enabled
69,889 UART: [state] LifecycleState = Production
71,613 UART: [state] DebugLocked = Yes
74,950 UART: [state] Starting the WD Timer 40000000 cycles
79,259 UART: [kat] SHA2-256
258,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
270,011 UART: [kat] ++
270,563 UART: [kat] sha1
281,448 UART: [kat] SHA2-256
284,461 UART: [kat] SHA2-384
290,273 UART: [kat] SHA2-512-ACC
293,197 UART: [kat] ECC-384
2,756,262 UART: [kat] HMAC-384Kdf
2,779,078 UART: [kat] LMS
3,308,575 UART: [kat] --
3,311,426 UART: [warm-reset] ++
3,312,214 UART: [warm-reset] Prev Cold-Reset failed
3,316,844 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,744 writing to cptra_bootfsm_go
192,351 UART:
192,721 UART: Running Caliptra ROM ...
193,860 UART:
603,506 UART: [state] CFI Enabled
621,226 UART: [state] LifecycleState = Production
622,934 UART: [state] DebugLocked = Yes
624,427 UART: [state] Starting the WD Timer 40000000 cycles
629,641 UART: [kat] SHA2-256
808,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,358 UART: [kat] ++
820,807 UART: [kat] sha1
832,201 UART: [kat] SHA2-256
835,223 UART: [kat] SHA2-384
842,134 UART: [kat] SHA2-512-ACC
845,096 UART: [kat] ECC-384
3,285,416 UART: [kat] HMAC-384Kdf
3,296,919 UART: [kat] LMS
3,826,428 UART: [kat] --
3,829,887 UART: [cold-reset] ++
3,832,211 UART: [fht] FHT @ 0x50003400
3,844,208 UART: [idev] ++
3,844,774 UART: [idev] CDI.KEYID = 6
3,845,732 UART: [idev] SUBJECT.KEYID = 7
3,846,883 UART: [idev] UDS.KEYID = 0
Initializing fuses
937 UART: [idev] Erasing UDS.KEYID = 0
2,225 UART:
2,450 UART: Running Caliptra ROM ...
3,556 UART:
16,477,033 UART: [state] CFI Enabled
16,488,644 UART: [state] LifecycleState = Production
16,490,394 UART: [state] DebugLocked = Yes
16,492,003 UART: [state] Starting the WD Timer 40000000 cycles
16,497,578 UART: [kat] SHA2-256
16,676,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,688,261 UART: [kat] ++
16,688,716 UART: [kat] sha1
16,699,706 UART: [kat] SHA2-256
16,702,773 UART: [kat] SHA2-384
16,708,271 UART: [kat] SHA2-512-ACC
16,711,264 UART: [kat] ECC-384
19,152,419 UART: [kat] HMAC-384Kdf
19,164,043 UART: [kat] LMS
19,693,527 UART: [kat] --
19,696,163 UART: [warm-reset] ++
19,697,003 UART: [warm-reset] Prev Cold-Reset failed
19,700,183 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,679 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,556 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Production
85,793 UART: [state] DebugLocked = Yes
86,411 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,355 UART: [kat] SHA2-256
892,293 UART: [kat] SHA2-384
895,212 UART: [kat] SHA2-512-ACC
897,113 UART: [kat] ECC-384
902,832 UART: [kat] HMAC-384Kdf
907,450 UART: [kat] LMS
1,475,646 UART: [kat] --
1,476,705 UART: [cold-reset] ++
1,477,282 UART: [fht] Storing FHT @ 0x50003400
1,480,187 UART: [idev] ++
1,480,355 UART: [idev] CDI.KEYID = 6
1,480,715 UART: [idev] SUBJECT.KEYID = 7
1,481,139 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,481,580 UART:
1,481,596 UART: Running Caliptra ROM ...
1,482,004 UART:
1,482,058 UART: [state] CFI Enabled
1,485,025 UART: [state] LifecycleState = Production
1,485,633 UART: [state] DebugLocked = Yes
1,486,293 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,488,009 UART: [kat] SHA2-256
2,281,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,286,055 UART: [kat] ++
2,286,207 UART: [kat] sha1
2,290,535 UART: [kat] SHA2-256
2,292,473 UART: [kat] SHA2-384
2,295,240 UART: [kat] SHA2-512-ACC
2,297,141 UART: [kat] ECC-384
2,302,842 UART: [kat] HMAC-384Kdf
2,307,396 UART: [kat] LMS
2,875,592 UART: [kat] --
2,876,524 UART: [warm-reset] ++
2,876,795 UART: [warm-reset] Previous Cold-Reset was not successful.
2,878,086 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Production
86,116 UART: [state] DebugLocked = Yes
86,698 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,418 UART: [kat] SHA2-256
882,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,464 UART: [kat] ++
886,616 UART: [kat] sha1
890,774 UART: [kat] SHA2-256
892,712 UART: [kat] SHA2-384
895,489 UART: [kat] SHA2-512-ACC
897,390 UART: [kat] ECC-384
903,209 UART: [kat] HMAC-384Kdf
908,059 UART: [kat] LMS
1,476,255 UART: [kat] --
1,477,348 UART: [cold-reset] ++
1,477,799 UART: [fht] Storing FHT @ 0x50003400
1,480,540 UART: [idev] ++
1,480,708 UART: [idev] CDI.KEYID = 6
1,481,068 UART: [idev] SUBJECT.KEYID = 7
1,481,492 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,481,933 UART:
1,481,949 UART: Running Caliptra ROM ...
1,482,357 UART:
1,482,498 UART: [state] CFI Enabled
1,485,109 UART: [state] LifecycleState = Production
1,485,717 UART: [state] DebugLocked = Yes
1,486,335 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,488,023 UART: [kat] SHA2-256
2,281,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,286,069 UART: [kat] ++
2,286,221 UART: [kat] sha1
2,290,697 UART: [kat] SHA2-256
2,292,635 UART: [kat] SHA2-384
2,295,390 UART: [kat] SHA2-512-ACC
2,297,291 UART: [kat] ECC-384
2,302,600 UART: [kat] HMAC-384Kdf
2,307,382 UART: [kat] LMS
2,875,578 UART: [kat] --
2,876,406 UART: [warm-reset] ++
2,876,677 UART: [warm-reset] Previous Cold-Reset was not successful.
2,878,112 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Production
85,687 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 40000000 cycles
87,756 UART: [kat] SHA2-256
893,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,531 UART: [kat] ++
897,683 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,536 UART: [kat] SHA2-512-ACC
908,437 UART: [kat] ECC-384
917,848 UART: [kat] HMAC-384Kdf
922,500 UART: [kat] LMS
1,170,828 UART: [kat] --
1,171,737 UART: [cold-reset] ++
1,172,218 UART: [fht] FHT @ 0x50003400
1,174,689 UART: [idev] ++
1,174,857 UART: [idev] CDI.KEYID = 6
1,175,217 UART: [idev] SUBJECT.KEYID = 7
1,175,641 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,079 UART:
1,176,095 UART: Running Caliptra ROM ...
1,176,503 UART:
1,176,558 UART: [state] CFI Enabled
1,178,889 UART: [state] LifecycleState = Production
1,179,497 UART: [state] DebugLocked = Yes
1,180,253 UART: [state] Starting the WD Timer 40000000 cycles
1,181,840 UART: [kat] SHA2-256
1,987,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,991,615 UART: [kat] ++
1,991,767 UART: [kat] sha1
1,995,895 UART: [kat] SHA2-256
1,997,835 UART: [kat] SHA2-384
2,000,454 UART: [kat] SHA2-512-ACC
2,002,355 UART: [kat] ECC-384
2,011,950 UART: [kat] HMAC-384Kdf
2,016,370 UART: [kat] LMS
2,264,698 UART: [kat] --
2,265,512 UART: [warm-reset] ++
2,265,783 UART: [warm-reset] Prev Cold-Reset failed
2,266,646 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Production
86,204 UART: [state] DebugLocked = Yes
86,938 UART: [state] Starting the WD Timer 40000000 cycles
88,437 UART: [kat] SHA2-256
894,087 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,212 UART: [kat] ++
898,364 UART: [kat] sha1
902,454 UART: [kat] SHA2-256
904,394 UART: [kat] SHA2-384
906,907 UART: [kat] SHA2-512-ACC
908,808 UART: [kat] ECC-384
918,801 UART: [kat] HMAC-384Kdf
923,687 UART: [kat] LMS
1,172,015 UART: [kat] --
1,173,034 UART: [cold-reset] ++
1,173,595 UART: [fht] FHT @ 0x50003400
1,176,206 UART: [idev] ++
1,176,374 UART: [idev] CDI.KEYID = 6
1,176,734 UART: [idev] SUBJECT.KEYID = 7
1,177,158 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,177,596 UART:
1,177,612 UART: Running Caliptra ROM ...
1,178,020 UART:
1,178,162 UART: [state] CFI Enabled
1,181,257 UART: [state] LifecycleState = Production
1,181,865 UART: [state] DebugLocked = Yes
1,182,517 UART: [state] Starting the WD Timer 40000000 cycles
1,184,056 UART: [kat] SHA2-256
1,989,706 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,831 UART: [kat] ++
1,993,983 UART: [kat] sha1
1,998,163 UART: [kat] SHA2-256
2,000,103 UART: [kat] SHA2-384
2,002,852 UART: [kat] SHA2-512-ACC
2,004,753 UART: [kat] ECC-384
2,014,908 UART: [kat] HMAC-384Kdf
2,019,528 UART: [kat] LMS
2,267,856 UART: [kat] --
2,268,678 UART: [warm-reset] ++
2,268,949 UART: [warm-reset] Prev Cold-Reset failed
2,270,078 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,825 UART: [state] LifecycleState = Production
85,433 UART: [state] DebugLocked = Yes
86,011 UART: [state] Starting the WD Timer 40000000 cycles
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
915,956 UART: [kat] HMAC-384Kdf
920,640 UART: [kat] LMS
1,168,952 UART: [kat] --
1,169,985 UART: [cold-reset] ++
1,170,374 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,174,349 UART:
1,174,365 UART: Running Caliptra ROM ...
1,174,773 UART:
1,174,828 UART: [state] CFI Enabled
1,177,741 UART: [state] LifecycleState = Production
1,178,349 UART: [state] DebugLocked = Yes
1,179,091 UART: [state] Starting the WD Timer 40000000 cycles
1,180,792 UART: [kat] SHA2-256
1,984,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,471 UART: [kat] ++
1,988,623 UART: [kat] sha1
1,992,795 UART: [kat] SHA2-256
1,994,735 UART: [kat] SHA2-384
1,997,582 UART: [kat] SHA2-512-ACC
1,999,483 UART: [kat] ECC-384
2,009,192 UART: [kat] HMAC-384Kdf
2,013,950 UART: [kat] LMS
2,262,262 UART: [kat] --
2,262,964 UART: [warm-reset] ++
2,263,232 UART: [warm-reset] Prev Cold-Reset failed
2,264,071 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,864 UART: [state] LifecycleState = Production
86,472 UART: [state] DebugLocked = Yes
87,004 UART: [state] Starting the WD Timer 40000000 cycles
88,681 UART: [kat] SHA2-256
892,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,360 UART: [kat] ++
896,512 UART: [kat] sha1
900,544 UART: [kat] SHA2-256
902,484 UART: [kat] SHA2-384
905,411 UART: [kat] SHA2-512-ACC
907,312 UART: [kat] ECC-384
917,167 UART: [kat] HMAC-384Kdf
921,709 UART: [kat] LMS
1,170,021 UART: [kat] --
1,170,686 UART: [cold-reset] ++
1,171,251 UART: [fht] FHT @ 0x50003400
1,173,917 UART: [idev] ++
1,174,085 UART: [idev] CDI.KEYID = 6
1,174,446 UART: [idev] SUBJECT.KEYID = 7
1,174,871 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,310 UART:
1,175,326 UART: Running Caliptra ROM ...
1,175,734 UART:
1,175,876 UART: [state] CFI Enabled
1,178,851 UART: [state] LifecycleState = Production
1,179,459 UART: [state] DebugLocked = Yes
1,180,161 UART: [state] Starting the WD Timer 40000000 cycles
1,181,630 UART: [kat] SHA2-256
1,985,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,309 UART: [kat] ++
1,989,461 UART: [kat] sha1
1,993,777 UART: [kat] SHA2-256
1,995,717 UART: [kat] SHA2-384
1,998,288 UART: [kat] SHA2-512-ACC
2,000,189 UART: [kat] ECC-384
2,009,674 UART: [kat] HMAC-384Kdf
2,014,308 UART: [kat] LMS
2,262,620 UART: [kat] --
2,263,572 UART: [warm-reset] ++
2,263,840 UART: [warm-reset] Prev Cold-Reset failed
2,264,911 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,172 UART:
192,519 UART: Running Caliptra ROM ...
193,675 UART:
193,825 UART: [state] CFI Enabled
265,436 UART: [state] LifecycleState = Unprovisioned
267,423 UART: [state] DebugLocked = No
270,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,008 UART: [kat] SHA2-256
444,745 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,229 UART: [kat] ++
455,703 UART: [kat] sha1
467,908 UART: [kat] SHA2-256
470,316 UART: [kat] SHA2-384
477,438 UART: [kat] SHA2-512-ACC
479,788 UART: [kat] ECC-384
2,767,815 UART: [kat] HMAC-384Kdf
2,799,765 UART: [kat] LMS
3,990,054 UART: [kat] --
3,993,480 UART: [cold-reset] ++
3,994,716 UART: [fht] Storing FHT @ 0x50003400
4,006,145 UART: [idev] ++
4,006,714 UART: [idev] CDI.KEYID = 6
4,007,734 UART: [idev] SUBJECT.KEYID = 7
4,008,905 UART: [idev] UDS.KEYID = 0
6,586,034 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,730,449 UART: [idev] Erasing UDS.KEYID = 0
7,347,096 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,182 UART: [idev] --
7,373,182 UART: [ldev] ++
7,373,814 UART: [ldev] CDI.KEYID = 6
7,374,743 UART: [ldev] SUBJECT.KEYID = 5
7,375,962 UART: [ldev] AUTHORITY.KEYID = 7
7,377,196 UART: [ldev] FE.KEYID = 1
7,423,378 UART: [ldev] Erasing FE.KEYID = 1
10,756,383 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,704 UART: [ldev] --
13,117,165 UART: [fwproc] Waiting for Commands...
13,119,268 UART: [fwproc] Received command 0x46574c44
13,121,459 UART: [fwproc] Received Image of size 114124 bytes
17,177,333 UART: ROM Fatal Error: 0x000B0016
17,180,799 >>> mbox cmd response: failed
17,181,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,181,583 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
6,364,731 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,113,653 >>> mbox cmd response: failed
17,114,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,114,865 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,530 UART:
192,904 UART: Running Caliptra ROM ...
194,007 UART:
603,788 UART: [state] CFI Enabled
619,360 UART: [state] LifecycleState = Unprovisioned
621,299 UART: [state] DebugLocked = No
622,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,806 UART: [kat] SHA2-256
796,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,132 UART: [kat] ++
807,607 UART: [kat] sha1
818,236 UART: [kat] SHA2-256
820,932 UART: [kat] SHA2-384
826,102 UART: [kat] SHA2-512-ACC
828,441 UART: [kat] ECC-384
3,110,682 UART: [kat] HMAC-384Kdf
3,122,011 UART: [kat] LMS
4,312,112 UART: [kat] --
4,317,296 UART: [cold-reset] ++
4,318,855 UART: [fht] Storing FHT @ 0x50003400
4,330,395 UART: [idev] ++
4,330,962 UART: [idev] CDI.KEYID = 6
4,331,945 UART: [idev] SUBJECT.KEYID = 7
4,333,170 UART: [idev] UDS.KEYID = 0
6,908,809 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
7,053,016 UART: [idev] Erasing UDS.KEYID = 0
7,622,300 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,226 UART: [idev] --
7,647,630 UART: [ldev] ++
7,648,300 UART: [ldev] CDI.KEYID = 6
7,649,242 UART: [ldev] SUBJECT.KEYID = 5
7,650,288 UART: [ldev] AUTHORITY.KEYID = 7
7,651,638 UART: [ldev] FE.KEYID = 1
7,662,018 UART: [ldev] Erasing FE.KEYID = 1
10,949,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,488 UART: [ldev] --
13,310,078 UART: [fwproc] Waiting for Commands...
13,312,402 UART: [fwproc] Received command 0x46574c44
13,314,589 UART: [fwproc] Received Image of size 114124 bytes
17,359,408 UART: ROM Fatal Error: 0x000B0016
17,362,862 >>> mbox cmd response: failed
17,363,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,363,650 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
6,701,765 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,329,130 >>> mbox cmd response: failed
17,329,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,330,291 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,494 UART:
192,885 UART: Running Caliptra ROM ...
194,096 UART:
194,258 UART: [state] CFI Enabled
261,473 UART: [state] LifecycleState = Unprovisioned
263,360 UART: [state] DebugLocked = No
265,717 UART: [state] WD Timer not started. Device not locked for debugging
268,819 UART: [kat] SHA2-256
447,953 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,523 UART: [kat] ++
460,061 UART: [kat] sha1
471,972 UART: [kat] SHA2-256
475,037 UART: [kat] SHA2-384
480,744 UART: [kat] SHA2-512-ACC
483,732 UART: [kat] ECC-384
2,947,992 UART: [kat] HMAC-384Kdf
2,970,454 UART: [kat] LMS
3,499,887 UART: [kat] --
3,504,011 UART: [cold-reset] ++
3,505,628 UART: [fht] FHT @ 0x50003400
3,516,510 UART: [idev] ++
3,517,087 UART: [idev] CDI.KEYID = 6
3,518,001 UART: [idev] SUBJECT.KEYID = 7
3,519,223 UART: [idev] UDS.KEYID = 0
6,060,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,206,173 UART: [idev] Erasing UDS.KEYID = 0
6,207,635 UART: [idev] Sha1 KeyId Algorithm
6,208,881 UART: [idev] --
6,209,376 UART: [ldev] ++
6,209,860 UART: [ldev] CDI.KEYID = 6
6,210,781 UART: [ldev] SUBJECT.KEYID = 5
6,211,801 UART: [ldev] AUTHORITY.KEYID = 7
6,212,982 UART: [ldev] FE.KEYID = 1
6,213,851 UART: [ldev] Erasing FE.KEYID = 1
8,604,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,077 UART: [ldev] --
10,411,107 UART: [fwproc] Wait for Commands...
10,413,589 UART: [fwproc] Recv command 0x46574c44
10,415,692 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,941 UART: ROM Fatal Error: 0x000B0016
13,820,065 >>> mbox cmd response: failed
13,820,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,820,838 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,451 writing to cptra_bootfsm_go
5,892,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,614,810 >>> mbox cmd response: failed
13,615,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,615,773 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,648 UART:
193,037 UART: Running Caliptra ROM ...
194,231 UART:
603,929 UART: [state] CFI Enabled
616,828 UART: [state] LifecycleState = Unprovisioned
618,696 UART: [state] DebugLocked = No
620,720 UART: [state] WD Timer not started. Device not locked for debugging
624,312 UART: [kat] SHA2-256
803,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,027 UART: [kat] ++
815,594 UART: [kat] sha1
826,478 UART: [kat] SHA2-256
829,484 UART: [kat] SHA2-384
835,571 UART: [kat] SHA2-512-ACC
838,499 UART: [kat] ECC-384
3,281,356 UART: [kat] HMAC-384Kdf
3,293,472 UART: [kat] LMS
3,822,964 UART: [kat] --
3,829,519 UART: [cold-reset] ++
3,831,458 UART: [fht] FHT @ 0x50003400
3,842,436 UART: [idev] ++
3,843,008 UART: [idev] CDI.KEYID = 6
3,843,924 UART: [idev] SUBJECT.KEYID = 7
3,845,136 UART: [idev] UDS.KEYID = 0
6,374,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,519,366 UART: [idev] Erasing UDS.KEYID = 0
6,520,852 UART: [idev] Sha1 KeyId Algorithm
6,522,012 UART: [idev] --
6,522,499 UART: [ldev] ++
6,523,029 UART: [ldev] CDI.KEYID = 6
6,524,013 UART: [ldev] SUBJECT.KEYID = 5
6,525,040 UART: [ldev] AUTHORITY.KEYID = 7
6,526,135 UART: [ldev] FE.KEYID = 1
6,526,972 UART: [ldev] Erasing FE.KEYID = 1
8,839,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,178 UART: [ldev] --
10,628,954 UART: [fwproc] Wait for Commands...
10,630,639 UART: [fwproc] Recv command 0x46574c44
10,632,741 UART: [fwproc] Recv'd Img size: 114448 bytes
14,023,706 UART: ROM Fatal Error: 0x000B0016
14,026,841 >>> mbox cmd response: failed
14,027,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,027,561 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,090 writing to cptra_bootfsm_go
6,236,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,820,820 >>> mbox cmd response: failed
13,821,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,821,904 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
6,026,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,279,881 >>> mbox cmd response: failed
14,280,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,280,894 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
6,338,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,491,104 >>> mbox cmd response: failed
14,491,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,492,303 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,379 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,259 UART: [kat] SHA2-256
892,197 UART: [kat] SHA2-384
895,006 UART: [kat] SHA2-512-ACC
896,907 UART: [kat] ECC-384
902,592 UART: [kat] HMAC-384Kdf
907,104 UART: [kat] LMS
1,475,300 UART: [kat] --
1,476,133 UART: [cold-reset] ++
1,476,707 UART: [fht] Storing FHT @ 0x50003400
1,479,678 UART: [idev] ++
1,479,846 UART: [idev] CDI.KEYID = 6
1,480,206 UART: [idev] SUBJECT.KEYID = 7
1,480,630 UART: [idev] UDS.KEYID = 0
1,480,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,476 UART: [idev] Erasing UDS.KEYID = 0
1,504,996 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,588 UART: [idev] --
1,514,397 UART: [ldev] ++
1,514,565 UART: [ldev] CDI.KEYID = 6
1,514,928 UART: [ldev] SUBJECT.KEYID = 5
1,515,354 UART: [ldev] AUTHORITY.KEYID = 7
1,515,817 UART: [ldev] FE.KEYID = 1
1,521,131 UART: [ldev] Erasing FE.KEYID = 1
1,545,610 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,664 UART: [ldev] --
1,585,053 UART: [fwproc] Waiting for Commands...
1,585,816 UART: [fwproc] Received command 0x46574c44
1,586,607 UART: [fwproc] Received Image of size 114448 bytes
2,884,496 UART: ROM Fatal Error: 0x000B0016
2,885,653 >>> mbox cmd response: failed
2,885,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,659 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,016 >>> mbox cmd response: failed
2,740,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,022 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,390 UART: [kat] SHA2-256
882,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,436 UART: [kat] ++
886,588 UART: [kat] sha1
890,768 UART: [kat] SHA2-256
892,706 UART: [kat] SHA2-384
895,337 UART: [kat] SHA2-512-ACC
897,238 UART: [kat] ECC-384
903,263 UART: [kat] HMAC-384Kdf
907,975 UART: [kat] LMS
1,476,171 UART: [kat] --
1,476,998 UART: [cold-reset] ++
1,477,354 UART: [fht] Storing FHT @ 0x50003400
1,480,037 UART: [idev] ++
1,480,205 UART: [idev] CDI.KEYID = 6
1,480,565 UART: [idev] SUBJECT.KEYID = 7
1,480,989 UART: [idev] UDS.KEYID = 0
1,481,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,621 UART: [idev] Erasing UDS.KEYID = 0
1,505,553 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,167 UART: [idev] --
1,515,362 UART: [ldev] ++
1,515,530 UART: [ldev] CDI.KEYID = 6
1,515,893 UART: [ldev] SUBJECT.KEYID = 5
1,516,319 UART: [ldev] AUTHORITY.KEYID = 7
1,516,782 UART: [ldev] FE.KEYID = 1
1,522,052 UART: [ldev] Erasing FE.KEYID = 1
1,547,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,903 UART: [ldev] --
1,587,338 UART: [fwproc] Waiting for Commands...
1,587,955 UART: [fwproc] Received command 0x46574c44
1,588,746 UART: [fwproc] Received Image of size 114448 bytes
2,885,591 UART: ROM Fatal Error: 0x000B0016
2,886,748 >>> mbox cmd response: failed
2,886,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,754 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,625 >>> mbox cmd response: failed
2,740,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,631 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
893,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,665 UART: [kat] ++
897,817 UART: [kat] sha1
902,117 UART: [kat] SHA2-256
904,057 UART: [kat] SHA2-384
907,008 UART: [kat] SHA2-512-ACC
908,909 UART: [kat] ECC-384
918,156 UART: [kat] HMAC-384Kdf
922,644 UART: [kat] LMS
1,170,972 UART: [kat] --
1,172,073 UART: [cold-reset] ++
1,172,595 UART: [fht] FHT @ 0x50003400
1,175,286 UART: [idev] ++
1,175,454 UART: [idev] CDI.KEYID = 6
1,175,814 UART: [idev] SUBJECT.KEYID = 7
1,176,238 UART: [idev] UDS.KEYID = 0
1,176,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,296 UART: [idev] Erasing UDS.KEYID = 0
1,200,627 UART: [idev] Sha1 KeyId Algorithm
1,209,253 UART: [idev] --
1,210,295 UART: [ldev] ++
1,210,463 UART: [ldev] CDI.KEYID = 6
1,210,826 UART: [ldev] SUBJECT.KEYID = 5
1,211,252 UART: [ldev] AUTHORITY.KEYID = 7
1,211,715 UART: [ldev] FE.KEYID = 1
1,216,715 UART: [ldev] Erasing FE.KEYID = 1
1,242,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,824 UART: [fwproc] Wait for Commands...
1,283,594 UART: [fwproc] Recv command 0x46574c44
1,284,322 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,439 UART: ROM Fatal Error: 0x000B0016
2,583,596 >>> mbox cmd response: failed
2,583,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,602 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,438,457 >>> mbox cmd response: failed
2,438,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,463 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
893,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,544 UART: [kat] ++
897,696 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,681 UART: [kat] SHA2-512-ACC
908,582 UART: [kat] ECC-384
918,631 UART: [kat] HMAC-384Kdf
923,135 UART: [kat] LMS
1,171,463 UART: [kat] --
1,172,496 UART: [cold-reset] ++
1,172,934 UART: [fht] FHT @ 0x50003400
1,175,505 UART: [idev] ++
1,175,673 UART: [idev] CDI.KEYID = 6
1,176,033 UART: [idev] SUBJECT.KEYID = 7
1,176,457 UART: [idev] UDS.KEYID = 0
1,176,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,331 UART: [idev] Erasing UDS.KEYID = 0
1,201,270 UART: [idev] Sha1 KeyId Algorithm
1,209,510 UART: [idev] --
1,210,594 UART: [ldev] ++
1,210,762 UART: [ldev] CDI.KEYID = 6
1,211,125 UART: [ldev] SUBJECT.KEYID = 5
1,211,551 UART: [ldev] AUTHORITY.KEYID = 7
1,212,014 UART: [ldev] FE.KEYID = 1
1,217,230 UART: [ldev] Erasing FE.KEYID = 1
1,243,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,260 UART: [ldev] --
1,282,651 UART: [fwproc] Wait for Commands...
1,283,475 UART: [fwproc] Recv command 0x46574c44
1,284,203 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,506 UART: ROM Fatal Error: 0x000B0016
2,582,663 >>> mbox cmd response: failed
2,582,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,669 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,868 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,437,790 >>> mbox cmd response: failed
2,437,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,796 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,548 UART: [kat] SHA2-512-ACC
906,449 UART: [kat] ECC-384
916,088 UART: [kat] HMAC-384Kdf
920,812 UART: [kat] LMS
1,169,124 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,174,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,177 UART: [idev] --
1,209,382 UART: [ldev] ++
1,209,550 UART: [ldev] CDI.KEYID = 6
1,209,914 UART: [ldev] SUBJECT.KEYID = 5
1,210,341 UART: [ldev] AUTHORITY.KEYID = 7
1,210,804 UART: [ldev] FE.KEYID = 1
1,216,082 UART: [ldev] Erasing FE.KEYID = 1
1,242,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,334 UART: [ldev] --
1,281,810 UART: [fwproc] Wait for Commands...
1,282,433 UART: [fwproc] Recv command 0x46574c44
1,283,166 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,335 UART: ROM Fatal Error: 0x000B0016
2,581,492 >>> mbox cmd response: failed
2,581,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,498 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,631 >>> mbox cmd response: failed
2,432,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,637 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
916,283 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,132 UART: [cold-reset] ++
1,170,672 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,174,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,216 UART: [idev] --
1,209,317 UART: [ldev] ++
1,209,485 UART: [ldev] CDI.KEYID = 6
1,209,849 UART: [ldev] SUBJECT.KEYID = 5
1,210,276 UART: [ldev] AUTHORITY.KEYID = 7
1,210,739 UART: [ldev] FE.KEYID = 1
1,216,313 UART: [ldev] Erasing FE.KEYID = 1
1,242,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,035 UART: [fwproc] Wait for Commands...
1,282,840 UART: [fwproc] Recv command 0x46574c44
1,283,573 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,872 UART: ROM Fatal Error: 0x000B0016
2,583,029 >>> mbox cmd response: failed
2,583,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,035 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,012 >>> mbox cmd response: failed
2,434,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,018 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,234 UART:
192,684 UART: Running Caliptra ROM ...
193,815 UART:
193,966 UART: [state] CFI Enabled
264,275 UART: [state] LifecycleState = Production
266,084 UART: [state] DebugLocked = No
268,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,931 UART: [kat] SHA2-256
442,605 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,114 UART: [kat] ++
453,646 UART: [kat] sha1
463,716 UART: [kat] SHA2-256
466,408 UART: [kat] SHA2-384
472,603 UART: [kat] SHA2-512-ACC
474,942 UART: [kat] ECC-384
2,769,168 UART: [kat] HMAC-384Kdf
2,781,845 UART: [kat] LMS
3,972,157 UART: [kat] --
3,974,980 UART: [cold-reset] ++
3,977,081 UART: [fht] Storing FHT @ 0x50003400
3,989,435 UART: [idev] ++
3,990,066 UART: [idev] CDI.KEYID = 6
3,990,999 UART: [idev] SUBJECT.KEYID = 7
3,992,218 UART: [idev] UDS.KEYID = 0
3,995,247 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,138,995 UART: [idev] Erasing UDS.KEYID = 0
7,326,237 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,597 UART: [idev] --
7,353,569 UART: [ldev] ++
7,354,139 UART: [ldev] CDI.KEYID = 6
7,355,080 UART: [ldev] SUBJECT.KEYID = 5
7,356,297 UART: [ldev] AUTHORITY.KEYID = 7
7,357,480 UART: [ldev] FE.KEYID = 1
7,403,082 UART: [ldev] Erasing FE.KEYID = 1
10,735,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,375 UART: [ldev] --
13,097,859 UART: [fwproc] Waiting for Commands...
13,100,396 UART: [fwproc] Received command 0x46574c44
13,102,585 UART: [fwproc] Received Image of size 114124 bytes
13,200,641 UART: ROM Fatal Error: 0x000B0007
13,204,114 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,812,676 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,967,882 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,617 UART:
192,974 UART: Running Caliptra ROM ...
194,158 UART:
603,762 UART: [state] CFI Enabled
616,905 UART: [state] LifecycleState = Production
618,738 UART: [state] DebugLocked = No
620,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,663 UART: [kat] SHA2-256
794,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,951 UART: [kat] ++
805,494 UART: [kat] sha1
816,003 UART: [kat] SHA2-256
818,674 UART: [kat] SHA2-384
825,792 UART: [kat] SHA2-512-ACC
828,190 UART: [kat] ECC-384
3,113,721 UART: [kat] HMAC-384Kdf
3,125,118 UART: [kat] LMS
4,315,228 UART: [kat] --
4,320,974 UART: [cold-reset] ++
4,322,147 UART: [fht] Storing FHT @ 0x50003400
4,333,476 UART: [idev] ++
4,334,080 UART: [idev] CDI.KEYID = 6
4,334,973 UART: [idev] SUBJECT.KEYID = 7
4,336,244 UART: [idev] UDS.KEYID = 0
4,339,250 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,667 UART: [idev] Erasing UDS.KEYID = 0
7,618,808 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,279 UART: [idev] --
7,643,102 UART: [ldev] ++
7,643,668 UART: [ldev] CDI.KEYID = 6
7,644,643 UART: [ldev] SUBJECT.KEYID = 5
7,645,857 UART: [ldev] AUTHORITY.KEYID = 7
7,647,087 UART: [ldev] FE.KEYID = 1
7,658,705 UART: [ldev] Erasing FE.KEYID = 1
10,941,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,249,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,077 UART: [ldev] --
13,302,135 UART: [fwproc] Waiting for Commands...
13,305,284 UART: [fwproc] Received command 0x46574c44
13,307,473 UART: [fwproc] Received Image of size 114124 bytes
13,408,646 UART: ROM Fatal Error: 0x000B0007
13,412,107 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
4,124,926 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,151,609 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,407 writing to cptra_bootfsm_go
193,676 UART:
194,014 UART: Running Caliptra ROM ...
195,101 UART:
195,241 UART: [state] CFI Enabled
263,194 UART: [state] LifecycleState = Production
264,951 UART: [state] DebugLocked = No
266,406 UART: [state] WD Timer not started. Device not locked for debugging
270,594 UART: [kat] SHA2-256
449,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,287 UART: [kat] ++
461,733 UART: [kat] sha1
472,174 UART: [kat] SHA2-256
475,233 UART: [kat] SHA2-384
481,532 UART: [kat] SHA2-512-ACC
484,495 UART: [kat] ECC-384
2,941,290 UART: [kat] HMAC-384Kdf
2,955,213 UART: [kat] LMS
3,484,663 UART: [kat] --
3,489,044 UART: [cold-reset] ++
3,489,900 UART: [fht] FHT @ 0x50003400
3,501,120 UART: [idev] ++
3,501,679 UART: [idev] CDI.KEYID = 6
3,502,620 UART: [idev] SUBJECT.KEYID = 7
3,503,833 UART: [idev] UDS.KEYID = 0
3,506,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,650,950 UART: [idev] Erasing UDS.KEYID = 0
6,009,650 UART: [idev] Sha1 KeyId Algorithm
6,032,944 UART: [idev] --
6,037,163 UART: [ldev] ++
6,037,741 UART: [ldev] CDI.KEYID = 6
6,038,689 UART: [ldev] SUBJECT.KEYID = 5
6,039,852 UART: [ldev] AUTHORITY.KEYID = 7
6,041,092 UART: [ldev] FE.KEYID = 1
6,085,883 UART: [ldev] Erasing FE.KEYID = 1
8,588,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,218 UART: [ldev] --
10,399,511 UART: [fwproc] Wait for Commands...
10,401,663 UART: [fwproc] Recv command 0x46574c44
10,403,805 UART: [fwproc] Recv'd Img size: 114448 bytes
10,504,260 UART: ROM Fatal Error: 0x000B0007
10,507,411 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
3,381,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,277,322 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,559 UART:
192,936 UART: Running Caliptra ROM ...
194,107 UART:
603,532 UART: [state] CFI Enabled
613,105 UART: [state] LifecycleState = Production
614,839 UART: [state] DebugLocked = No
616,376 UART: [state] WD Timer not started. Device not locked for debugging
620,840 UART: [kat] SHA2-256
799,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,562 UART: [kat] ++
812,099 UART: [kat] sha1
822,832 UART: [kat] SHA2-256
825,837 UART: [kat] SHA2-384
832,155 UART: [kat] SHA2-512-ACC
835,151 UART: [kat] ECC-384
3,275,796 UART: [kat] HMAC-384Kdf
3,289,426 UART: [kat] LMS
3,818,949 UART: [kat] --
3,822,349 UART: [cold-reset] ++
3,824,714 UART: [fht] FHT @ 0x50003400
3,834,932 UART: [idev] ++
3,835,506 UART: [idev] CDI.KEYID = 6
3,836,415 UART: [idev] SUBJECT.KEYID = 7
3,837,627 UART: [idev] UDS.KEYID = 0
3,840,350 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,693 UART: [idev] Erasing UDS.KEYID = 0
6,308,555 UART: [idev] Sha1 KeyId Algorithm
6,332,004 UART: [idev] --
6,336,469 UART: [ldev] ++
6,337,068 UART: [ldev] CDI.KEYID = 6
6,337,989 UART: [ldev] SUBJECT.KEYID = 5
6,339,096 UART: [ldev] AUTHORITY.KEYID = 7
6,340,388 UART: [ldev] FE.KEYID = 1
6,349,955 UART: [ldev] Erasing FE.KEYID = 1
8,825,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,030 UART: [ldev] --
10,616,004 UART: [fwproc] Wait for Commands...
10,617,566 UART: [fwproc] Recv command 0x46574c44
10,619,663 UART: [fwproc] Recv'd Img size: 114448 bytes
10,716,407 UART: ROM Fatal Error: 0x000B0007
10,719,550 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,698,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,506,126 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,442,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,337,498 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,759,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,582,025 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Production
85,783 UART: [state] DebugLocked = No
86,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,015 UART: [kat] SHA2-256
881,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,061 UART: [kat] ++
886,213 UART: [kat] sha1
890,431 UART: [kat] SHA2-256
892,369 UART: [kat] SHA2-384
895,100 UART: [kat] SHA2-512-ACC
897,001 UART: [kat] ECC-384
902,736 UART: [kat] HMAC-384Kdf
907,360 UART: [kat] LMS
1,475,556 UART: [kat] --
1,476,155 UART: [cold-reset] ++
1,476,517 UART: [fht] Storing FHT @ 0x50003400
1,479,426 UART: [idev] ++
1,479,594 UART: [idev] CDI.KEYID = 6
1,479,954 UART: [idev] SUBJECT.KEYID = 7
1,480,378 UART: [idev] UDS.KEYID = 0
1,480,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,492 UART: [idev] Erasing UDS.KEYID = 0
1,504,834 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,544 UART: [idev] --
1,514,623 UART: [ldev] ++
1,514,791 UART: [ldev] CDI.KEYID = 6
1,515,154 UART: [ldev] SUBJECT.KEYID = 5
1,515,580 UART: [ldev] AUTHORITY.KEYID = 7
1,516,043 UART: [ldev] FE.KEYID = 1
1,521,341 UART: [ldev] Erasing FE.KEYID = 1
1,546,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,040 UART: [ldev] --
1,586,525 UART: [fwproc] Waiting for Commands...
1,587,172 UART: [fwproc] Received command 0x46574c44
1,587,963 UART: [fwproc] Received Image of size 114448 bytes
1,637,438 UART: ROM Fatal Error: 0x000B0007
1,638,595 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,396 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Production
86,170 UART: [state] DebugLocked = No
86,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,862 UART: [kat] SHA2-256
892,800 UART: [kat] SHA2-384
895,597 UART: [kat] SHA2-512-ACC
897,498 UART: [kat] ECC-384
903,479 UART: [kat] HMAC-384Kdf
908,349 UART: [kat] LMS
1,476,545 UART: [kat] --
1,477,758 UART: [cold-reset] ++
1,478,164 UART: [fht] Storing FHT @ 0x50003400
1,480,963 UART: [idev] ++
1,481,131 UART: [idev] CDI.KEYID = 6
1,481,491 UART: [idev] SUBJECT.KEYID = 7
1,481,915 UART: [idev] UDS.KEYID = 0
1,482,260 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,803 UART: [idev] Erasing UDS.KEYID = 0
1,506,727 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,437 UART: [idev] --
1,516,450 UART: [ldev] ++
1,516,618 UART: [ldev] CDI.KEYID = 6
1,516,981 UART: [ldev] SUBJECT.KEYID = 5
1,517,407 UART: [ldev] AUTHORITY.KEYID = 7
1,517,870 UART: [ldev] FE.KEYID = 1
1,523,082 UART: [ldev] Erasing FE.KEYID = 1
1,548,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,193 UART: [ldev] --
1,587,520 UART: [fwproc] Waiting for Commands...
1,588,339 UART: [fwproc] Received command 0x46574c44
1,589,130 UART: [fwproc] Received Image of size 114448 bytes
1,638,519 UART: ROM Fatal Error: 0x000B0007
1,639,676 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,166 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,833 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Production
85,859 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,869 UART: [kat] SHA2-256
903,809 UART: [kat] SHA2-384
906,642 UART: [kat] SHA2-512-ACC
908,543 UART: [kat] ECC-384
918,530 UART: [kat] HMAC-384Kdf
923,174 UART: [kat] LMS
1,171,502 UART: [kat] --
1,172,381 UART: [cold-reset] ++
1,172,755 UART: [fht] FHT @ 0x50003400
1,175,416 UART: [idev] ++
1,175,584 UART: [idev] CDI.KEYID = 6
1,175,944 UART: [idev] SUBJECT.KEYID = 7
1,176,368 UART: [idev] UDS.KEYID = 0
1,176,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,584 UART: [idev] Erasing UDS.KEYID = 0
1,201,715 UART: [idev] Sha1 KeyId Algorithm
1,210,319 UART: [idev] --
1,211,403 UART: [ldev] ++
1,211,571 UART: [ldev] CDI.KEYID = 6
1,211,934 UART: [ldev] SUBJECT.KEYID = 5
1,212,360 UART: [ldev] AUTHORITY.KEYID = 7
1,212,823 UART: [ldev] FE.KEYID = 1
1,217,841 UART: [ldev] Erasing FE.KEYID = 1
1,244,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,787 UART: [ldev] --
1,283,200 UART: [fwproc] Wait for Commands...
1,283,788 UART: [fwproc] Recv command 0x46574c44
1,284,516 UART: [fwproc] Recv'd Img size: 114448 bytes
1,334,609 UART: ROM Fatal Error: 0x000B0007
1,335,766 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,527 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,189,717 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Production
86,186 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
893,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,942 UART: [kat] ++
898,094 UART: [kat] sha1
902,380 UART: [kat] SHA2-256
904,320 UART: [kat] SHA2-384
907,133 UART: [kat] SHA2-512-ACC
909,034 UART: [kat] ECC-384
918,955 UART: [kat] HMAC-384Kdf
923,529 UART: [kat] LMS
1,171,857 UART: [kat] --
1,172,878 UART: [cold-reset] ++
1,173,370 UART: [fht] FHT @ 0x50003400
1,176,041 UART: [idev] ++
1,176,209 UART: [idev] CDI.KEYID = 6
1,176,569 UART: [idev] SUBJECT.KEYID = 7
1,176,993 UART: [idev] UDS.KEYID = 0
1,177,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,105 UART: [idev] Erasing UDS.KEYID = 0
1,202,438 UART: [idev] Sha1 KeyId Algorithm
1,210,736 UART: [idev] --
1,211,872 UART: [ldev] ++
1,212,040 UART: [ldev] CDI.KEYID = 6
1,212,403 UART: [ldev] SUBJECT.KEYID = 5
1,212,829 UART: [ldev] AUTHORITY.KEYID = 7
1,213,292 UART: [ldev] FE.KEYID = 1
1,218,746 UART: [ldev] Erasing FE.KEYID = 1
1,245,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,202 UART: [ldev] --
1,284,655 UART: [fwproc] Wait for Commands...
1,285,261 UART: [fwproc] Recv command 0x46574c44
1,285,989 UART: [fwproc] Recv'd Img size: 114448 bytes
1,335,804 UART: ROM Fatal Error: 0x000B0007
1,336,961 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,190,246 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Production
85,541 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
890,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,037 UART: [kat] ++
895,189 UART: [kat] sha1
899,377 UART: [kat] SHA2-256
901,317 UART: [kat] SHA2-384
904,060 UART: [kat] SHA2-512-ACC
905,961 UART: [kat] ECC-384
915,506 UART: [kat] HMAC-384Kdf
920,004 UART: [kat] LMS
1,168,316 UART: [kat] --
1,169,127 UART: [cold-reset] ++
1,169,503 UART: [fht] FHT @ 0x50003400
1,172,283 UART: [idev] ++
1,172,451 UART: [idev] CDI.KEYID = 6
1,172,812 UART: [idev] SUBJECT.KEYID = 7
1,173,237 UART: [idev] UDS.KEYID = 0
1,173,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,067 UART: [idev] Erasing UDS.KEYID = 0
1,198,299 UART: [idev] Sha1 KeyId Algorithm
1,207,001 UART: [idev] --
1,207,864 UART: [ldev] ++
1,208,032 UART: [ldev] CDI.KEYID = 6
1,208,396 UART: [ldev] SUBJECT.KEYID = 5
1,208,823 UART: [ldev] AUTHORITY.KEYID = 7
1,209,286 UART: [ldev] FE.KEYID = 1
1,214,466 UART: [ldev] Erasing FE.KEYID = 1
1,240,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,574 UART: [ldev] --
1,280,034 UART: [fwproc] Wait for Commands...
1,280,619 UART: [fwproc] Recv command 0x46574c44
1,281,352 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,649 UART: ROM Fatal Error: 0x000B0007
1,331,806 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,538 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,919 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Production
85,834 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,509 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,264 UART: [cold-reset] ++
1,170,618 UART: [fht] FHT @ 0x50003400
1,173,284 UART: [idev] ++
1,173,452 UART: [idev] CDI.KEYID = 6
1,173,813 UART: [idev] SUBJECT.KEYID = 7
1,174,238 UART: [idev] UDS.KEYID = 0
1,174,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,100 UART: [idev] Erasing UDS.KEYID = 0
1,199,518 UART: [idev] Sha1 KeyId Algorithm
1,208,408 UART: [idev] --
1,209,539 UART: [ldev] ++
1,209,707 UART: [ldev] CDI.KEYID = 6
1,210,071 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,229 UART: [ldev] --
1,281,663 UART: [fwproc] Wait for Commands...
1,282,422 UART: [fwproc] Recv command 0x46574c44
1,283,155 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,026 UART: ROM Fatal Error: 0x000B0007
1,333,183 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,530 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,150 UART:
192,509 UART: Running Caliptra ROM ...
193,631 UART:
193,777 UART: [state] CFI Enabled
266,141 UART: [state] LifecycleState = Production
267,969 UART: [state] DebugLocked = No
269,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,326 UART: [kat] SHA2-256
445,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,557 UART: [kat] ++
456,029 UART: [kat] sha1
467,725 UART: [kat] SHA2-256
470,407 UART: [kat] SHA2-384
475,357 UART: [kat] SHA2-512-ACC
477,694 UART: [kat] ECC-384
2,768,484 UART: [kat] HMAC-384Kdf
2,799,211 UART: [kat] LMS
3,989,516 UART: [kat] --
3,996,653 UART: [cold-reset] ++
3,997,832 UART: [fht] Storing FHT @ 0x50003400
4,008,911 UART: [idev] ++
4,009,487 UART: [idev] CDI.KEYID = 6
4,010,509 UART: [idev] SUBJECT.KEYID = 7
4,011,676 UART: [idev] UDS.KEYID = 0
4,014,380 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,118 UART: [idev] Erasing UDS.KEYID = 0
7,346,837 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,919 UART: [idev] --
7,371,971 UART: [ldev] ++
7,372,544 UART: [ldev] CDI.KEYID = 6
7,373,511 UART: [ldev] SUBJECT.KEYID = 5
7,374,732 UART: [ldev] AUTHORITY.KEYID = 7
7,375,966 UART: [ldev] FE.KEYID = 1
7,418,383 UART: [ldev] Erasing FE.KEYID = 1
10,752,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,577 UART: [ldev] --
13,111,466 UART: [fwproc] Waiting for Commands...
13,113,247 UART: [fwproc] Received command 0x46574c44
13,115,439 UART: [fwproc] Received Image of size 114124 bytes
13,209,602 UART: ROM Fatal Error: 0x000B0007
13,213,132 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,806,342 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,962,183 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,300 UART:
192,662 UART: Running Caliptra ROM ...
193,789 UART:
603,561 UART: [state] CFI Enabled
617,857 UART: [state] LifecycleState = Production
619,630 UART: [state] DebugLocked = No
621,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,407 UART: [kat] SHA2-256
796,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,693 UART: [kat] ++
807,135 UART: [kat] sha1
818,607 UART: [kat] SHA2-256
821,293 UART: [kat] SHA2-384
828,567 UART: [kat] SHA2-512-ACC
830,968 UART: [kat] ECC-384
3,114,110 UART: [kat] HMAC-384Kdf
3,125,989 UART: [kat] LMS
4,316,142 UART: [kat] --
4,321,541 UART: [cold-reset] ++
4,323,910 UART: [fht] Storing FHT @ 0x50003400
4,335,844 UART: [idev] ++
4,336,468 UART: [idev] CDI.KEYID = 6
4,337,376 UART: [idev] SUBJECT.KEYID = 7
4,338,646 UART: [idev] UDS.KEYID = 0
4,341,368 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,889 UART: [idev] Erasing UDS.KEYID = 0
7,625,190 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,560 UART: [idev] --
7,650,723 UART: [ldev] ++
7,651,363 UART: [ldev] CDI.KEYID = 6
7,652,257 UART: [ldev] SUBJECT.KEYID = 5
7,653,474 UART: [ldev] AUTHORITY.KEYID = 7
7,654,767 UART: [ldev] FE.KEYID = 1
7,664,577 UART: [ldev] Erasing FE.KEYID = 1
10,954,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,734 UART: [ldev] --
13,312,521 UART: [fwproc] Waiting for Commands...
13,314,285 UART: [fwproc] Received command 0x46574c44
13,316,487 UART: [fwproc] Received Image of size 114124 bytes
13,414,733 UART: ROM Fatal Error: 0x000B0007
13,418,228 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
4,130,330 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,173,710 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,880 writing to cptra_bootfsm_go
193,151 UART:
193,498 UART: Running Caliptra ROM ...
194,603 UART:
194,748 UART: [state] CFI Enabled
265,397 UART: [state] LifecycleState = Production
267,174 UART: [state] DebugLocked = No
268,628 UART: [state] WD Timer not started. Device not locked for debugging
272,611 UART: [kat] SHA2-256
451,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,323 UART: [kat] ++
463,775 UART: [kat] sha1
474,381 UART: [kat] SHA2-256
477,449 UART: [kat] SHA2-384
485,263 UART: [kat] SHA2-512-ACC
488,237 UART: [kat] ECC-384
2,950,791 UART: [kat] HMAC-384Kdf
2,974,261 UART: [kat] LMS
3,503,747 UART: [kat] --
3,509,536 UART: [cold-reset] ++
3,511,037 UART: [fht] FHT @ 0x50003400
3,521,806 UART: [idev] ++
3,522,548 UART: [idev] CDI.KEYID = 6
3,523,495 UART: [idev] SUBJECT.KEYID = 7
3,524,545 UART: [idev] UDS.KEYID = 0
3,527,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,671,266 UART: [idev] Erasing UDS.KEYID = 0
6,032,649 UART: [idev] Sha1 KeyId Algorithm
6,055,728 UART: [idev] --
6,057,998 UART: [ldev] ++
6,058,580 UART: [ldev] CDI.KEYID = 6
6,059,467 UART: [ldev] SUBJECT.KEYID = 5
6,060,599 UART: [ldev] AUTHORITY.KEYID = 7
6,061,936 UART: [ldev] FE.KEYID = 1
6,104,323 UART: [ldev] Erasing FE.KEYID = 1
8,608,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,742 UART: [ldev] --
10,397,718 UART: [fwproc] Wait for Commands...
10,399,383 UART: [fwproc] Recv command 0x46574c44
10,401,485 UART: [fwproc] Recv'd Img size: 114448 bytes
10,499,210 UART: ROM Fatal Error: 0x000B0007
10,502,299 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,381,851 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,276,636 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,464 UART:
192,842 UART: Running Caliptra ROM ...
194,024 UART:
603,617 UART: [state] CFI Enabled
618,557 UART: [state] LifecycleState = Production
620,345 UART: [state] DebugLocked = No
623,192 UART: [state] WD Timer not started. Device not locked for debugging
627,497 UART: [kat] SHA2-256
806,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,234 UART: [kat] ++
818,768 UART: [kat] sha1
829,763 UART: [kat] SHA2-256
832,767 UART: [kat] SHA2-384
839,224 UART: [kat] SHA2-512-ACC
842,207 UART: [kat] ECC-384
3,282,968 UART: [kat] HMAC-384Kdf
3,295,522 UART: [kat] LMS
3,825,005 UART: [kat] --
3,829,328 UART: [cold-reset] ++
3,831,474 UART: [fht] FHT @ 0x50003400
3,843,261 UART: [idev] ++
3,843,832 UART: [idev] CDI.KEYID = 6
3,844,717 UART: [idev] SUBJECT.KEYID = 7
3,845,934 UART: [idev] UDS.KEYID = 0
3,848,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,874 UART: [idev] Erasing UDS.KEYID = 0
6,319,629 UART: [idev] Sha1 KeyId Algorithm
6,342,378 UART: [idev] --
6,346,969 UART: [ldev] ++
6,347,541 UART: [ldev] CDI.KEYID = 6
6,348,448 UART: [ldev] SUBJECT.KEYID = 5
6,349,611 UART: [ldev] AUTHORITY.KEYID = 7
6,350,844 UART: [ldev] FE.KEYID = 1
6,360,378 UART: [ldev] Erasing FE.KEYID = 1
8,834,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,163 UART: [ldev] --
10,625,007 UART: [fwproc] Wait for Commands...
10,627,105 UART: [fwproc] Recv command 0x46574c44
10,629,199 UART: [fwproc] Recv'd Img size: 114448 bytes
10,726,479 UART: ROM Fatal Error: 0x000B0007
10,729,568 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,696,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,502,029 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,421,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,340,214 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,759,816 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,576,896 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Production
85,413 UART: [state] DebugLocked = No
85,953 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,445 UART: [kat] SHA2-256
881,376 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,491 UART: [kat] ++
885,643 UART: [kat] sha1
889,875 UART: [kat] SHA2-256
891,813 UART: [kat] SHA2-384
894,602 UART: [kat] SHA2-512-ACC
896,503 UART: [kat] ECC-384
901,932 UART: [kat] HMAC-384Kdf
906,326 UART: [kat] LMS
1,474,522 UART: [kat] --
1,475,389 UART: [cold-reset] ++
1,475,923 UART: [fht] Storing FHT @ 0x50003400
1,478,840 UART: [idev] ++
1,479,008 UART: [idev] CDI.KEYID = 6
1,479,368 UART: [idev] SUBJECT.KEYID = 7
1,479,792 UART: [idev] UDS.KEYID = 0
1,480,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,790 UART: [idev] Erasing UDS.KEYID = 0
1,504,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,676 UART: [idev] --
1,513,861 UART: [ldev] ++
1,514,029 UART: [ldev] CDI.KEYID = 6
1,514,392 UART: [ldev] SUBJECT.KEYID = 5
1,514,818 UART: [ldev] AUTHORITY.KEYID = 7
1,515,281 UART: [ldev] FE.KEYID = 1
1,520,375 UART: [ldev] Erasing FE.KEYID = 1
1,545,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,778 UART: [ldev] --
1,585,043 UART: [fwproc] Waiting for Commands...
1,585,708 UART: [fwproc] Received command 0x46574c44
1,586,499 UART: [fwproc] Received Image of size 114448 bytes
1,635,766 UART: ROM Fatal Error: 0x000B0007
1,636,923 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,434 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Production
86,102 UART: [state] DebugLocked = No
86,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,340 UART: [kat] SHA2-256
882,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,386 UART: [kat] ++
886,538 UART: [kat] sha1
890,884 UART: [kat] SHA2-256
892,822 UART: [kat] SHA2-384
895,663 UART: [kat] SHA2-512-ACC
897,564 UART: [kat] ECC-384
903,145 UART: [kat] HMAC-384Kdf
907,903 UART: [kat] LMS
1,476,099 UART: [kat] --
1,476,776 UART: [cold-reset] ++
1,477,296 UART: [fht] Storing FHT @ 0x50003400
1,480,055 UART: [idev] ++
1,480,223 UART: [idev] CDI.KEYID = 6
1,480,583 UART: [idev] SUBJECT.KEYID = 7
1,481,007 UART: [idev] UDS.KEYID = 0
1,481,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,859 UART: [idev] Erasing UDS.KEYID = 0
1,505,703 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,495 UART: [idev] --
1,515,568 UART: [ldev] ++
1,515,736 UART: [ldev] CDI.KEYID = 6
1,516,099 UART: [ldev] SUBJECT.KEYID = 5
1,516,525 UART: [ldev] AUTHORITY.KEYID = 7
1,516,988 UART: [ldev] FE.KEYID = 1
1,522,290 UART: [ldev] Erasing FE.KEYID = 1
1,547,575 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,571 UART: [ldev] --
1,587,056 UART: [fwproc] Waiting for Commands...
1,587,745 UART: [fwproc] Received command 0x46574c44
1,588,536 UART: [fwproc] Received Image of size 114448 bytes
1,637,535 UART: ROM Fatal Error: 0x000B0007
1,638,692 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,104 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,491,879 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Production
85,985 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
901,967 UART: [kat] SHA2-256
903,907 UART: [kat] SHA2-384
906,596 UART: [kat] SHA2-512-ACC
908,497 UART: [kat] ECC-384
917,890 UART: [kat] HMAC-384Kdf
922,466 UART: [kat] LMS
1,170,794 UART: [kat] --
1,171,859 UART: [cold-reset] ++
1,172,315 UART: [fht] FHT @ 0x50003400
1,175,052 UART: [idev] ++
1,175,220 UART: [idev] CDI.KEYID = 6
1,175,580 UART: [idev] SUBJECT.KEYID = 7
1,176,004 UART: [idev] UDS.KEYID = 0
1,176,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,054 UART: [idev] Erasing UDS.KEYID = 0
1,200,741 UART: [idev] Sha1 KeyId Algorithm
1,209,115 UART: [idev] --
1,210,039 UART: [ldev] ++
1,210,207 UART: [ldev] CDI.KEYID = 6
1,210,570 UART: [ldev] SUBJECT.KEYID = 5
1,210,996 UART: [ldev] AUTHORITY.KEYID = 7
1,211,459 UART: [ldev] FE.KEYID = 1
1,216,681 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,276 UART: [fwproc] Wait for Commands...
1,282,864 UART: [fwproc] Recv command 0x46574c44
1,283,592 UART: [fwproc] Recv'd Img size: 114448 bytes
1,333,463 UART: ROM Fatal Error: 0x000B0007
1,334,620 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,188,359 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Production
86,010 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
893,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,616 UART: [kat] ++
897,768 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
906,719 UART: [kat] SHA2-512-ACC
908,620 UART: [kat] ECC-384
918,437 UART: [kat] HMAC-384Kdf
922,953 UART: [kat] LMS
1,171,281 UART: [kat] --
1,171,886 UART: [cold-reset] ++
1,172,356 UART: [fht] FHT @ 0x50003400
1,174,875 UART: [idev] ++
1,175,043 UART: [idev] CDI.KEYID = 6
1,175,403 UART: [idev] SUBJECT.KEYID = 7
1,175,827 UART: [idev] UDS.KEYID = 0
1,176,172 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,643 UART: [idev] Erasing UDS.KEYID = 0
1,200,944 UART: [idev] Sha1 KeyId Algorithm
1,209,404 UART: [idev] --
1,210,338 UART: [ldev] ++
1,210,506 UART: [ldev] CDI.KEYID = 6
1,210,869 UART: [ldev] SUBJECT.KEYID = 5
1,211,295 UART: [ldev] AUTHORITY.KEYID = 7
1,211,758 UART: [ldev] FE.KEYID = 1
1,217,144 UART: [ldev] Erasing FE.KEYID = 1
1,243,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,576 UART: [ldev] --
1,282,869 UART: [fwproc] Wait for Commands...
1,283,633 UART: [fwproc] Recv command 0x46574c44
1,284,361 UART: [fwproc] Recv'd Img size: 114448 bytes
1,333,636 UART: ROM Fatal Error: 0x000B0007
1,334,793 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,906 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,190,704 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Production
85,695 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,111 UART: [kat] ++
895,263 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,118 UART: [kat] SHA2-512-ACC
906,019 UART: [kat] ECC-384
915,670 UART: [kat] HMAC-384Kdf
920,242 UART: [kat] LMS
1,168,554 UART: [kat] --
1,169,407 UART: [cold-reset] ++
1,169,793 UART: [fht] FHT @ 0x50003400
1,172,557 UART: [idev] ++
1,172,725 UART: [idev] CDI.KEYID = 6
1,173,086 UART: [idev] SUBJECT.KEYID = 7
1,173,511 UART: [idev] UDS.KEYID = 0
1,173,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,491 UART: [idev] Erasing UDS.KEYID = 0
1,198,169 UART: [idev] Sha1 KeyId Algorithm
1,207,047 UART: [idev] --
1,208,130 UART: [ldev] ++
1,208,298 UART: [ldev] CDI.KEYID = 6
1,208,662 UART: [ldev] SUBJECT.KEYID = 5
1,209,089 UART: [ldev] AUTHORITY.KEYID = 7
1,209,552 UART: [ldev] FE.KEYID = 1
1,214,694 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,034 UART: [ldev] --
1,280,462 UART: [fwproc] Wait for Commands...
1,281,035 UART: [fwproc] Recv command 0x46574c44
1,281,768 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,557 UART: ROM Fatal Error: 0x000B0007
1,331,714 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,021 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Production
86,310 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,166 UART: [kat] SHA2-256
902,106 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,761 UART: [kat] HMAC-384Kdf
921,453 UART: [kat] LMS
1,169,765 UART: [kat] --
1,170,240 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,602 UART: [idev] ++
1,173,770 UART: [idev] CDI.KEYID = 6
1,174,131 UART: [idev] SUBJECT.KEYID = 7
1,174,556 UART: [idev] UDS.KEYID = 0
1,174,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,199,174 UART: [idev] Sha1 KeyId Algorithm
1,207,980 UART: [idev] --
1,209,037 UART: [ldev] ++
1,209,205 UART: [ldev] CDI.KEYID = 6
1,209,569 UART: [ldev] SUBJECT.KEYID = 5
1,209,996 UART: [ldev] AUTHORITY.KEYID = 7
1,210,459 UART: [ldev] FE.KEYID = 1
1,215,555 UART: [ldev] Erasing FE.KEYID = 1
1,241,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,259 UART: [ldev] --
1,280,751 UART: [fwproc] Wait for Commands...
1,281,434 UART: [fwproc] Recv command 0x46574c44
1,282,167 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,750 UART: ROM Fatal Error: 0x000B0007
1,331,907 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,010 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,067 UART:
192,436 UART: Running Caliptra ROM ...
193,569 UART:
193,716 UART: [state] CFI Enabled
263,759 UART: [state] LifecycleState = Production
265,621 UART: [state] DebugLocked = No
267,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,958 UART: [kat] SHA2-256
442,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,150 UART: [kat] ++
453,629 UART: [kat] sha1
465,966 UART: [kat] SHA2-256
468,663 UART: [kat] SHA2-384
473,836 UART: [kat] SHA2-512-ACC
476,233 UART: [kat] ECC-384
2,768,855 UART: [kat] HMAC-384Kdf
2,781,376 UART: [kat] LMS
3,971,644 UART: [kat] --
3,976,084 UART: [cold-reset] ++
3,977,378 UART: [fht] Storing FHT @ 0x50003400
3,989,419 UART: [idev] ++
3,989,990 UART: [idev] CDI.KEYID = 6
3,990,932 UART: [idev] SUBJECT.KEYID = 7
3,992,201 UART: [idev] UDS.KEYID = 0
3,995,200 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,139,420 UART: [idev] Erasing UDS.KEYID = 0
7,327,831 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,643 UART: [idev] --
7,354,401 UART: [ldev] ++
7,354,971 UART: [ldev] CDI.KEYID = 6
7,355,958 UART: [ldev] SUBJECT.KEYID = 5
7,357,062 UART: [ldev] AUTHORITY.KEYID = 7
7,358,408 UART: [ldev] FE.KEYID = 1
7,404,925 UART: [ldev] Erasing FE.KEYID = 1
10,739,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,948 UART: [ldev] --
13,118,918 UART: [fwproc] Waiting for Commands...
13,121,076 UART: [fwproc] Received command 0x46574c44
13,123,269 UART: [fwproc] Received Image of size 114124 bytes
13,217,267 UART: ROM Fatal Error: 0x000B0005
13,220,738 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,806,315 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,956,325 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,309 UART:
192,685 UART: Running Caliptra ROM ...
194,007 UART:
603,362 UART: [state] CFI Enabled
621,157 UART: [state] LifecycleState = Production
623,001 UART: [state] DebugLocked = No
624,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,807 UART: [kat] SHA2-256
799,552 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,088 UART: [kat] ++
810,564 UART: [kat] sha1
822,682 UART: [kat] SHA2-256
825,369 UART: [kat] SHA2-384
831,021 UART: [kat] SHA2-512-ACC
833,415 UART: [kat] ECC-384
3,119,064 UART: [kat] HMAC-384Kdf
3,130,830 UART: [kat] LMS
4,320,963 UART: [kat] --
4,327,189 UART: [cold-reset] ++
4,329,175 UART: [fht] Storing FHT @ 0x50003400
4,341,145 UART: [idev] ++
4,341,733 UART: [idev] CDI.KEYID = 6
4,342,677 UART: [idev] SUBJECT.KEYID = 7
4,343,893 UART: [idev] UDS.KEYID = 0
4,346,713 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,490,265 UART: [idev] Erasing UDS.KEYID = 0
7,639,460 UART: [idev] Using Sha1 for KeyId Algorithm
7,660,587 UART: [idev] --
7,664,532 UART: [ldev] ++
7,665,100 UART: [ldev] CDI.KEYID = 6
7,666,116 UART: [ldev] SUBJECT.KEYID = 5
7,667,275 UART: [ldev] AUTHORITY.KEYID = 7
7,668,560 UART: [ldev] FE.KEYID = 1
7,678,509 UART: [ldev] Erasing FE.KEYID = 1
10,966,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,259,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,274,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,289,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,303,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,323,354 UART: [ldev] --
13,327,436 UART: [fwproc] Waiting for Commands...
13,330,506 UART: [fwproc] Received command 0x46574c44
13,332,691 UART: [fwproc] Received Image of size 114124 bytes
13,426,681 UART: ROM Fatal Error: 0x000B0005
13,430,196 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
4,135,053 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,165,170 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,202 UART:
192,576 UART: Running Caliptra ROM ...
193,737 UART:
193,895 UART: [state] CFI Enabled
266,351 UART: [state] LifecycleState = Production
268,112 UART: [state] DebugLocked = No
269,448 UART: [state] WD Timer not started. Device not locked for debugging
273,213 UART: [kat] SHA2-256
452,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,891 UART: [kat] ++
464,423 UART: [kat] sha1
474,392 UART: [kat] SHA2-256
477,398 UART: [kat] SHA2-384
482,745 UART: [kat] SHA2-512-ACC
485,733 UART: [kat] ECC-384
2,944,276 UART: [kat] HMAC-384Kdf
2,969,263 UART: [kat] LMS
3,498,734 UART: [kat] --
3,503,184 UART: [cold-reset] ++
3,505,495 UART: [fht] FHT @ 0x50003400
3,517,773 UART: [idev] ++
3,518,349 UART: [idev] CDI.KEYID = 6
3,519,282 UART: [idev] SUBJECT.KEYID = 7
3,520,442 UART: [idev] UDS.KEYID = 0
3,523,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,704 UART: [idev] Erasing UDS.KEYID = 0
6,033,431 UART: [idev] Sha1 KeyId Algorithm
6,056,847 UART: [idev] --
6,061,814 UART: [ldev] ++
6,062,407 UART: [ldev] CDI.KEYID = 6
6,063,329 UART: [ldev] SUBJECT.KEYID = 5
6,064,493 UART: [ldev] AUTHORITY.KEYID = 7
6,065,728 UART: [ldev] FE.KEYID = 1
6,111,115 UART: [ldev] Erasing FE.KEYID = 1
8,612,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,350,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,366,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,382,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,398,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,569 UART: [ldev] --
10,422,774 UART: [fwproc] Wait for Commands...
10,424,500 UART: [fwproc] Recv command 0x46574c44
10,426,600 UART: [fwproc] Recv'd Img size: 114448 bytes
10,517,184 UART: ROM Fatal Error: 0x000B0005
10,520,321 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,363,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,274,799 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
192,569 UART:
192,950 UART: Running Caliptra ROM ...
194,131 UART:
603,731 UART: [state] CFI Enabled
619,236 UART: [state] LifecycleState = Production
620,973 UART: [state] DebugLocked = No
623,162 UART: [state] WD Timer not started. Device not locked for debugging
626,458 UART: [kat] SHA2-256
805,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,119 UART: [kat] ++
817,565 UART: [kat] sha1
828,596 UART: [kat] SHA2-256
831,650 UART: [kat] SHA2-384
837,470 UART: [kat] SHA2-512-ACC
840,403 UART: [kat] ECC-384
3,280,351 UART: [kat] HMAC-384Kdf
3,293,017 UART: [kat] LMS
3,822,543 UART: [kat] --
3,827,203 UART: [cold-reset] ++
3,829,083 UART: [fht] FHT @ 0x50003400
3,840,134 UART: [idev] ++
3,840,699 UART: [idev] CDI.KEYID = 6
3,841,716 UART: [idev] SUBJECT.KEYID = 7
3,842,827 UART: [idev] UDS.KEYID = 0
3,845,677 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,630 UART: [idev] Erasing UDS.KEYID = 0
6,316,834 UART: [idev] Sha1 KeyId Algorithm
6,339,140 UART: [idev] --
6,344,556 UART: [ldev] ++
6,345,132 UART: [ldev] CDI.KEYID = 6
6,346,017 UART: [ldev] SUBJECT.KEYID = 5
6,347,181 UART: [ldev] AUTHORITY.KEYID = 7
6,348,460 UART: [ldev] FE.KEYID = 1
6,360,013 UART: [ldev] Erasing FE.KEYID = 1
8,830,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,447 UART: [ldev] --
10,623,581 UART: [fwproc] Wait for Commands...
10,625,450 UART: [fwproc] Recv command 0x46574c44
10,627,557 UART: [fwproc] Recv'd Img size: 114448 bytes
10,715,961 UART: ROM Fatal Error: 0x000B0005
10,719,042 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,699,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,499,591 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,441,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,327,934 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,753,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,570,456 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,740 UART: [state] LifecycleState = Production
85,347 UART: [state] DebugLocked = No
85,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,553 UART: [kat] SHA2-256
881,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,599 UART: [kat] ++
885,751 UART: [kat] sha1
889,897 UART: [kat] SHA2-256
891,835 UART: [kat] SHA2-384
894,642 UART: [kat] SHA2-512-ACC
896,543 UART: [kat] ECC-384
902,120 UART: [kat] HMAC-384Kdf
906,674 UART: [kat] LMS
1,474,870 UART: [kat] --
1,475,597 UART: [cold-reset] ++
1,476,017 UART: [fht] Storing FHT @ 0x50003400
1,478,748 UART: [idev] ++
1,478,916 UART: [idev] CDI.KEYID = 6
1,479,276 UART: [idev] SUBJECT.KEYID = 7
1,479,700 UART: [idev] UDS.KEYID = 0
1,480,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,798 UART: [idev] Erasing UDS.KEYID = 0
1,504,850 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,474 UART: [idev] --
1,514,375 UART: [ldev] ++
1,514,543 UART: [ldev] CDI.KEYID = 6
1,514,906 UART: [ldev] SUBJECT.KEYID = 5
1,515,332 UART: [ldev] AUTHORITY.KEYID = 7
1,515,795 UART: [ldev] FE.KEYID = 1
1,521,041 UART: [ldev] Erasing FE.KEYID = 1
1,546,266 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,348 UART: [ldev] --
1,585,859 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 114448 bytes
1,632,494 UART: ROM Fatal Error: 0x000B0005
1,633,651 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,486,438 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,859 UART: [state] LifecycleState = Production
85,466 UART: [state] DebugLocked = No
86,032 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,522 UART: [kat] SHA2-256
881,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,568 UART: [kat] ++
885,720 UART: [kat] sha1
889,744 UART: [kat] SHA2-256
891,682 UART: [kat] SHA2-384
894,607 UART: [kat] SHA2-512-ACC
896,508 UART: [kat] ECC-384
902,515 UART: [kat] HMAC-384Kdf
906,963 UART: [kat] LMS
1,475,159 UART: [kat] --
1,476,116 UART: [cold-reset] ++
1,476,598 UART: [fht] Storing FHT @ 0x50003400
1,479,359 UART: [idev] ++
1,479,527 UART: [idev] CDI.KEYID = 6
1,479,887 UART: [idev] SUBJECT.KEYID = 7
1,480,311 UART: [idev] UDS.KEYID = 0
1,480,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,177 UART: [idev] Erasing UDS.KEYID = 0
1,504,753 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,379 UART: [idev] --
1,514,366 UART: [ldev] ++
1,514,534 UART: [ldev] CDI.KEYID = 6
1,514,897 UART: [ldev] SUBJECT.KEYID = 5
1,515,323 UART: [ldev] AUTHORITY.KEYID = 7
1,515,786 UART: [ldev] FE.KEYID = 1
1,520,854 UART: [ldev] Erasing FE.KEYID = 1
1,546,355 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,407 UART: [ldev] --
1,585,698 UART: [fwproc] Waiting for Commands...
1,586,401 UART: [fwproc] Received command 0x46574c44
1,587,192 UART: [fwproc] Received Image of size 114448 bytes
1,632,377 UART: ROM Fatal Error: 0x000B0005
1,633,534 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,105 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Production
85,653 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
893,092 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,217 UART: [kat] ++
897,369 UART: [kat] sha1
901,503 UART: [kat] SHA2-256
903,443 UART: [kat] SHA2-384
906,248 UART: [kat] SHA2-512-ACC
908,149 UART: [kat] ECC-384
917,638 UART: [kat] HMAC-384Kdf
922,188 UART: [kat] LMS
1,170,516 UART: [kat] --
1,171,235 UART: [cold-reset] ++
1,171,751 UART: [fht] FHT @ 0x50003400
1,174,358 UART: [idev] ++
1,174,526 UART: [idev] CDI.KEYID = 6
1,174,886 UART: [idev] SUBJECT.KEYID = 7
1,175,310 UART: [idev] UDS.KEYID = 0
1,175,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,200,459 UART: [idev] Sha1 KeyId Algorithm
1,208,971 UART: [idev] --
1,210,043 UART: [ldev] ++
1,210,211 UART: [ldev] CDI.KEYID = 6
1,210,574 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,819 UART: [ldev] Erasing FE.KEYID = 1
1,243,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,941 UART: [ldev] --
1,282,344 UART: [fwproc] Wait for Commands...
1,283,088 UART: [fwproc] Recv command 0x46574c44
1,283,816 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,929 UART: ROM Fatal Error: 0x000B0005
1,330,086 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,855 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Production
86,220 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
893,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,028 UART: [kat] ++
898,180 UART: [kat] sha1
902,358 UART: [kat] SHA2-256
904,298 UART: [kat] SHA2-384
907,055 UART: [kat] SHA2-512-ACC
908,956 UART: [kat] ECC-384
919,063 UART: [kat] HMAC-384Kdf
923,773 UART: [kat] LMS
1,172,101 UART: [kat] --
1,172,938 UART: [cold-reset] ++
1,173,402 UART: [fht] FHT @ 0x50003400
1,176,033 UART: [idev] ++
1,176,201 UART: [idev] CDI.KEYID = 6
1,176,561 UART: [idev] SUBJECT.KEYID = 7
1,176,985 UART: [idev] UDS.KEYID = 0
1,177,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,965 UART: [idev] Erasing UDS.KEYID = 0
1,201,862 UART: [idev] Sha1 KeyId Algorithm
1,210,318 UART: [idev] --
1,211,394 UART: [ldev] ++
1,211,562 UART: [ldev] CDI.KEYID = 6
1,211,925 UART: [ldev] SUBJECT.KEYID = 5
1,212,351 UART: [ldev] AUTHORITY.KEYID = 7
1,212,814 UART: [ldev] FE.KEYID = 1
1,217,900 UART: [ldev] Erasing FE.KEYID = 1
1,245,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,876 UART: [ldev] --
1,284,383 UART: [fwproc] Wait for Commands...
1,284,971 UART: [fwproc] Recv command 0x46574c44
1,285,699 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,382 UART: ROM Fatal Error: 0x000B0005
1,332,539 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,364 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,598 UART: [state] LifecycleState = Production
85,205 UART: [state] DebugLocked = No
85,717 UART: [state] WD Timer not started. Device not locked for debugging
86,918 UART: [kat] SHA2-256
890,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,597 UART: [kat] ++
894,749 UART: [kat] sha1
898,875 UART: [kat] SHA2-256
900,815 UART: [kat] SHA2-384
903,544 UART: [kat] SHA2-512-ACC
905,445 UART: [kat] ECC-384
915,290 UART: [kat] HMAC-384Kdf
920,030 UART: [kat] LMS
1,168,342 UART: [kat] --
1,169,327 UART: [cold-reset] ++
1,169,711 UART: [fht] FHT @ 0x50003400
1,172,519 UART: [idev] ++
1,172,687 UART: [idev] CDI.KEYID = 6
1,173,048 UART: [idev] SUBJECT.KEYID = 7
1,173,473 UART: [idev] UDS.KEYID = 0
1,173,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,583 UART: [idev] Erasing UDS.KEYID = 0
1,198,729 UART: [idev] Sha1 KeyId Algorithm
1,207,481 UART: [idev] --
1,208,508 UART: [ldev] ++
1,208,676 UART: [ldev] CDI.KEYID = 6
1,209,040 UART: [ldev] SUBJECT.KEYID = 5
1,209,467 UART: [ldev] AUTHORITY.KEYID = 7
1,209,930 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,240,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,868 UART: [ldev] --
1,280,264 UART: [fwproc] Wait for Commands...
1,280,909 UART: [fwproc] Recv command 0x46574c44
1,281,642 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,029 UART: ROM Fatal Error: 0x000B0005
1,327,186 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,855 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Production
86,158 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,637 UART: [kat] HMAC-384Kdf
921,457 UART: [kat] LMS
1,169,769 UART: [kat] --
1,170,706 UART: [cold-reset] ++
1,171,132 UART: [fht] FHT @ 0x50003400
1,173,812 UART: [idev] ++
1,173,980 UART: [idev] CDI.KEYID = 6
1,174,341 UART: [idev] SUBJECT.KEYID = 7
1,174,766 UART: [idev] UDS.KEYID = 0
1,175,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,602 UART: [idev] Erasing UDS.KEYID = 0
1,199,622 UART: [idev] Sha1 KeyId Algorithm
1,208,378 UART: [idev] --
1,209,455 UART: [ldev] ++
1,209,623 UART: [ldev] CDI.KEYID = 6
1,209,987 UART: [ldev] SUBJECT.KEYID = 5
1,210,414 UART: [ldev] AUTHORITY.KEYID = 7
1,210,877 UART: [ldev] FE.KEYID = 1
1,215,973 UART: [ldev] Erasing FE.KEYID = 1
1,242,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,511 UART: [ldev] --
1,281,935 UART: [fwproc] Wait for Commands...
1,282,688 UART: [fwproc] Recv command 0x46574c44
1,283,421 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,164 UART: ROM Fatal Error: 0x000B0005
1,328,321 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,482 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
193,103 UART:
193,470 UART: Running Caliptra ROM ...
194,662 UART:
194,817 UART: [state] CFI Enabled
265,736 UART: [state] LifecycleState = Production
267,543 UART: [state] DebugLocked = No
269,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,239 UART: [kat] SHA2-256
444,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,432 UART: [kat] ++
455,880 UART: [kat] sha1
467,946 UART: [kat] SHA2-256
470,636 UART: [kat] SHA2-384
476,558 UART: [kat] SHA2-512-ACC
478,973 UART: [kat] ECC-384
2,767,841 UART: [kat] HMAC-384Kdf
2,800,983 UART: [kat] LMS
3,991,297 UART: [kat] --
3,996,864 UART: [cold-reset] ++
3,998,380 UART: [fht] Storing FHT @ 0x50003400
4,009,987 UART: [idev] ++
4,010,602 UART: [idev] CDI.KEYID = 6
4,011,493 UART: [idev] SUBJECT.KEYID = 7
4,012,716 UART: [idev] UDS.KEYID = 0
4,015,869 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,492 UART: [idev] Erasing UDS.KEYID = 0
7,348,136 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,312 UART: [idev] --
7,374,102 UART: [ldev] ++
7,374,681 UART: [ldev] CDI.KEYID = 6
7,375,636 UART: [ldev] SUBJECT.KEYID = 5
7,376,860 UART: [ldev] AUTHORITY.KEYID = 7
7,378,067 UART: [ldev] FE.KEYID = 1
7,423,280 UART: [ldev] Erasing FE.KEYID = 1
10,761,242 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,511 UART: [ldev] --
13,136,141 UART: [fwproc] Waiting for Commands...
13,138,847 UART: [fwproc] Received command 0x46574c44
13,141,045 UART: [fwproc] Received Image of size 114124 bytes
13,233,205 UART: ROM Fatal Error: 0x000B0005
13,236,704 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,785,023 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,957,506 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,690 UART:
193,054 UART: Running Caliptra ROM ...
194,193 UART:
603,843 UART: [state] CFI Enabled
618,443 UART: [state] LifecycleState = Production
620,226 UART: [state] DebugLocked = No
621,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,711 UART: [kat] SHA2-256
796,465 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,001 UART: [kat] ++
807,456 UART: [kat] sha1
819,520 UART: [kat] SHA2-256
822,196 UART: [kat] SHA2-384
827,633 UART: [kat] SHA2-512-ACC
830,010 UART: [kat] ECC-384
3,111,670 UART: [kat] HMAC-384Kdf
3,122,519 UART: [kat] LMS
4,312,633 UART: [kat] --
4,316,871 UART: [cold-reset] ++
4,319,402 UART: [fht] Storing FHT @ 0x50003400
4,331,319 UART: [idev] ++
4,331,945 UART: [idev] CDI.KEYID = 6
4,332,853 UART: [idev] SUBJECT.KEYID = 7
4,334,124 UART: [idev] UDS.KEYID = 0
4,336,926 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,461 UART: [idev] Erasing UDS.KEYID = 0
7,621,240 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,096 UART: [idev] --
7,647,400 UART: [ldev] ++
7,647,981 UART: [ldev] CDI.KEYID = 6
7,648,890 UART: [ldev] SUBJECT.KEYID = 5
7,650,047 UART: [ldev] AUTHORITY.KEYID = 7
7,651,417 UART: [ldev] FE.KEYID = 1
7,662,124 UART: [ldev] Erasing FE.KEYID = 1
10,955,605 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,836 UART: [ldev] --
13,315,953 UART: [fwproc] Waiting for Commands...
13,317,729 UART: [fwproc] Received command 0x46574c44
13,319,918 UART: [fwproc] Received Image of size 114124 bytes
13,408,967 UART: ROM Fatal Error: 0x000B0005
13,412,490 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,127,534 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,148,359 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,412 UART:
192,775 UART: Running Caliptra ROM ...
193,957 UART:
194,137 UART: [state] CFI Enabled
261,282 UART: [state] LifecycleState = Production
263,030 UART: [state] DebugLocked = No
265,493 UART: [state] WD Timer not started. Device not locked for debugging
268,617 UART: [kat] SHA2-256
447,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,314 UART: [kat] ++
459,850 UART: [kat] sha1
469,978 UART: [kat] SHA2-256
473,037 UART: [kat] SHA2-384
479,013 UART: [kat] SHA2-512-ACC
481,954 UART: [kat] ECC-384
2,926,405 UART: [kat] HMAC-384Kdf
2,949,662 UART: [kat] LMS
3,479,089 UART: [kat] --
3,484,068 UART: [cold-reset] ++
3,486,404 UART: [fht] FHT @ 0x50003400
3,496,950 UART: [idev] ++
3,497,522 UART: [idev] CDI.KEYID = 6
3,498,458 UART: [idev] SUBJECT.KEYID = 7
3,499,674 UART: [idev] UDS.KEYID = 0
3,502,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,646,559 UART: [idev] Erasing UDS.KEYID = 0
6,005,951 UART: [idev] Sha1 KeyId Algorithm
6,027,529 UART: [idev] --
6,031,127 UART: [ldev] ++
6,031,707 UART: [ldev] CDI.KEYID = 6
6,032,596 UART: [ldev] SUBJECT.KEYID = 5
6,033,815 UART: [ldev] AUTHORITY.KEYID = 7
6,035,054 UART: [ldev] FE.KEYID = 1
6,078,462 UART: [ldev] Erasing FE.KEYID = 1
8,579,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,808 UART: [ldev] --
10,372,180 UART: [fwproc] Wait for Commands...
10,373,949 UART: [fwproc] Recv command 0x46574c44
10,376,050 UART: [fwproc] Recv'd Img size: 114448 bytes
10,465,362 UART: ROM Fatal Error: 0x000B0005
10,468,456 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,877 writing to cptra_bootfsm_go
3,380,248 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,314,418 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,543 UART:
192,916 UART: Running Caliptra ROM ...
194,001 UART:
603,711 UART: [state] CFI Enabled
615,436 UART: [state] LifecycleState = Production
617,197 UART: [state] DebugLocked = No
619,438 UART: [state] WD Timer not started. Device not locked for debugging
622,835 UART: [kat] SHA2-256
801,955 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,528 UART: [kat] ++
814,062 UART: [kat] sha1
826,665 UART: [kat] SHA2-256
829,724 UART: [kat] SHA2-384
835,050 UART: [kat] SHA2-512-ACC
838,030 UART: [kat] ECC-384
3,279,844 UART: [kat] HMAC-384Kdf
3,292,341 UART: [kat] LMS
3,821,806 UART: [kat] --
3,825,371 UART: [cold-reset] ++
3,826,330 UART: [fht] FHT @ 0x50003400
3,836,985 UART: [idev] ++
3,837,560 UART: [idev] CDI.KEYID = 6
3,838,468 UART: [idev] SUBJECT.KEYID = 7
3,839,683 UART: [idev] UDS.KEYID = 0
3,842,580 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,575 UART: [idev] Erasing UDS.KEYID = 0
6,312,904 UART: [idev] Sha1 KeyId Algorithm
6,336,784 UART: [idev] --
6,340,077 UART: [ldev] ++
6,340,648 UART: [ldev] CDI.KEYID = 6
6,341,558 UART: [ldev] SUBJECT.KEYID = 5
6,342,717 UART: [ldev] AUTHORITY.KEYID = 7
6,344,022 UART: [ldev] FE.KEYID = 1
6,355,547 UART: [ldev] Erasing FE.KEYID = 1
8,825,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,142 UART: [ldev] --
10,618,545 UART: [fwproc] Wait for Commands...
10,620,589 UART: [fwproc] Recv command 0x46574c44
10,622,686 UART: [fwproc] Recv'd Img size: 114448 bytes
10,710,729 UART: ROM Fatal Error: 0x000B0005
10,713,820 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,695,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,494,315 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
3,442,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,349,736 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,759,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,573,610 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Production
85,487 UART: [state] DebugLocked = No
86,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,619 UART: [kat] SHA2-256
881,550 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,665 UART: [kat] ++
885,817 UART: [kat] sha1
889,915 UART: [kat] SHA2-256
891,853 UART: [kat] SHA2-384
894,538 UART: [kat] SHA2-512-ACC
896,439 UART: [kat] ECC-384
901,854 UART: [kat] HMAC-384Kdf
906,374 UART: [kat] LMS
1,474,570 UART: [kat] --
1,475,721 UART: [cold-reset] ++
1,476,243 UART: [fht] Storing FHT @ 0x50003400
1,479,116 UART: [idev] ++
1,479,284 UART: [idev] CDI.KEYID = 6
1,479,644 UART: [idev] SUBJECT.KEYID = 7
1,480,068 UART: [idev] UDS.KEYID = 0
1,480,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,790 UART: [idev] Erasing UDS.KEYID = 0
1,503,914 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,662 UART: [idev] --
1,513,645 UART: [ldev] ++
1,513,813 UART: [ldev] CDI.KEYID = 6
1,514,176 UART: [ldev] SUBJECT.KEYID = 5
1,514,602 UART: [ldev] AUTHORITY.KEYID = 7
1,515,065 UART: [ldev] FE.KEYID = 1
1,520,181 UART: [ldev] Erasing FE.KEYID = 1
1,545,348 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,984 UART: [ldev] --
1,584,483 UART: [fwproc] Waiting for Commands...
1,585,352 UART: [fwproc] Received command 0x46574c44
1,586,143 UART: [fwproc] Received Image of size 114448 bytes
1,631,016 UART: ROM Fatal Error: 0x000B0005
1,632,173 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,469 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,485,370 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,837 UART: [state] LifecycleState = Production
86,444 UART: [state] DebugLocked = No
87,100 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,804 UART: [kat] SHA2-256
882,735 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,850 UART: [kat] ++
887,002 UART: [kat] sha1
891,278 UART: [kat] SHA2-256
893,216 UART: [kat] SHA2-384
895,995 UART: [kat] SHA2-512-ACC
897,896 UART: [kat] ECC-384
903,389 UART: [kat] HMAC-384Kdf
907,923 UART: [kat] LMS
1,476,119 UART: [kat] --
1,476,958 UART: [cold-reset] ++
1,477,360 UART: [fht] Storing FHT @ 0x50003400
1,480,115 UART: [idev] ++
1,480,283 UART: [idev] CDI.KEYID = 6
1,480,643 UART: [idev] SUBJECT.KEYID = 7
1,481,067 UART: [idev] UDS.KEYID = 0
1,481,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,931 UART: [idev] Erasing UDS.KEYID = 0
1,506,135 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,805 UART: [idev] --
1,515,846 UART: [ldev] ++
1,516,014 UART: [ldev] CDI.KEYID = 6
1,516,377 UART: [ldev] SUBJECT.KEYID = 5
1,516,803 UART: [ldev] AUTHORITY.KEYID = 7
1,517,266 UART: [ldev] FE.KEYID = 1
1,522,568 UART: [ldev] Erasing FE.KEYID = 1
1,547,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,253 UART: [ldev] --
1,586,714 UART: [fwproc] Waiting for Commands...
1,587,493 UART: [fwproc] Received command 0x46574c44
1,588,284 UART: [fwproc] Received Image of size 114448 bytes
1,634,165 UART: ROM Fatal Error: 0x000B0005
1,635,322 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,486,109 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Production
85,607 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
893,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,193 UART: [kat] ++
897,345 UART: [kat] sha1
901,477 UART: [kat] SHA2-256
903,417 UART: [kat] SHA2-384
906,222 UART: [kat] SHA2-512-ACC
908,123 UART: [kat] ECC-384
917,644 UART: [kat] HMAC-384Kdf
922,470 UART: [kat] LMS
1,170,798 UART: [kat] --
1,171,559 UART: [cold-reset] ++
1,171,957 UART: [fht] FHT @ 0x50003400
1,174,734 UART: [idev] ++
1,174,902 UART: [idev] CDI.KEYID = 6
1,175,262 UART: [idev] SUBJECT.KEYID = 7
1,175,686 UART: [idev] UDS.KEYID = 0
1,176,031 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,626 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,209,093 UART: [idev] --
1,210,213 UART: [ldev] ++
1,210,381 UART: [ldev] CDI.KEYID = 6
1,210,744 UART: [ldev] SUBJECT.KEYID = 5
1,211,170 UART: [ldev] AUTHORITY.KEYID = 7
1,211,633 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,243,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,765 UART: [ldev] --
1,282,276 UART: [fwproc] Wait for Commands...
1,282,970 UART: [fwproc] Recv command 0x46574c44
1,283,698 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,345 UART: ROM Fatal Error: 0x000B0005
1,329,502 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,729 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Production
86,070 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,224 UART: [kat] SHA2-256
904,164 UART: [kat] SHA2-384
907,071 UART: [kat] SHA2-512-ACC
908,972 UART: [kat] ECC-384
919,021 UART: [kat] HMAC-384Kdf
923,549 UART: [kat] LMS
1,171,877 UART: [kat] --
1,172,744 UART: [cold-reset] ++
1,173,288 UART: [fht] FHT @ 0x50003400
1,176,115 UART: [idev] ++
1,176,283 UART: [idev] CDI.KEYID = 6
1,176,643 UART: [idev] SUBJECT.KEYID = 7
1,177,067 UART: [idev] UDS.KEYID = 0
1,177,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,059 UART: [idev] Erasing UDS.KEYID = 0
1,201,544 UART: [idev] Sha1 KeyId Algorithm
1,209,984 UART: [idev] --
1,210,926 UART: [ldev] ++
1,211,094 UART: [ldev] CDI.KEYID = 6
1,211,457 UART: [ldev] SUBJECT.KEYID = 5
1,211,883 UART: [ldev] AUTHORITY.KEYID = 7
1,212,346 UART: [ldev] FE.KEYID = 1
1,217,516 UART: [ldev] Erasing FE.KEYID = 1
1,243,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,504 UART: [ldev] --
1,282,915 UART: [fwproc] Wait for Commands...
1,283,565 UART: [fwproc] Recv command 0x46574c44
1,284,293 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,294 UART: ROM Fatal Error: 0x000B0005
1,330,451 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,520 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Production
85,755 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,473 UART: [kat] SHA2-256
901,413 UART: [kat] SHA2-384
904,064 UART: [kat] SHA2-512-ACC
905,965 UART: [kat] ECC-384
915,316 UART: [kat] HMAC-384Kdf
919,974 UART: [kat] LMS
1,168,286 UART: [kat] --
1,169,023 UART: [cold-reset] ++
1,169,383 UART: [fht] FHT @ 0x50003400
1,172,007 UART: [idev] ++
1,172,175 UART: [idev] CDI.KEYID = 6
1,172,536 UART: [idev] SUBJECT.KEYID = 7
1,172,961 UART: [idev] UDS.KEYID = 0
1,173,307 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,635 UART: [idev] Erasing UDS.KEYID = 0
1,197,551 UART: [idev] Sha1 KeyId Algorithm
1,206,399 UART: [idev] --
1,207,412 UART: [ldev] ++
1,207,580 UART: [ldev] CDI.KEYID = 6
1,207,944 UART: [ldev] SUBJECT.KEYID = 5
1,208,371 UART: [ldev] AUTHORITY.KEYID = 7
1,208,834 UART: [ldev] FE.KEYID = 1
1,214,190 UART: [ldev] Erasing FE.KEYID = 1
1,240,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,480 UART: [ldev] --
1,279,888 UART: [fwproc] Wait for Commands...
1,280,675 UART: [fwproc] Recv command 0x46574c44
1,281,408 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,815 UART: ROM Fatal Error: 0x000B0005
1,326,972 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,863 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Production
86,278 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
915,809 UART: [kat] HMAC-384Kdf
920,353 UART: [kat] LMS
1,168,665 UART: [kat] --
1,169,788 UART: [cold-reset] ++
1,170,222 UART: [fht] FHT @ 0x50003400
1,173,016 UART: [idev] ++
1,173,184 UART: [idev] CDI.KEYID = 6
1,173,545 UART: [idev] SUBJECT.KEYID = 7
1,173,970 UART: [idev] UDS.KEYID = 0
1,174,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,802 UART: [idev] Erasing UDS.KEYID = 0
1,198,898 UART: [idev] Sha1 KeyId Algorithm
1,207,622 UART: [idev] --
1,208,627 UART: [ldev] ++
1,208,795 UART: [ldev] CDI.KEYID = 6
1,209,159 UART: [ldev] SUBJECT.KEYID = 5
1,209,586 UART: [ldev] AUTHORITY.KEYID = 7
1,210,049 UART: [ldev] FE.KEYID = 1
1,215,419 UART: [ldev] Erasing FE.KEYID = 1
1,242,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,607 UART: [fwproc] Wait for Commands...
1,282,234 UART: [fwproc] Recv command 0x46574c44
1,282,967 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,268 UART: ROM Fatal Error: 0x000B0005
1,328,425 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,504 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,333 UART:
192,690 UART: Running Caliptra ROM ...
193,876 UART:
194,032 UART: [state] CFI Enabled
264,532 UART: [state] LifecycleState = Production
266,350 UART: [state] DebugLocked = No
268,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,075 UART: [kat] SHA2-256
443,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,292 UART: [kat] ++
454,764 UART: [kat] sha1
465,794 UART: [kat] SHA2-256
468,476 UART: [kat] SHA2-384
474,027 UART: [kat] SHA2-512-ACC
476,371 UART: [kat] ECC-384
2,768,323 UART: [kat] HMAC-384Kdf
2,781,163 UART: [kat] LMS
3,971,481 UART: [kat] --
3,975,924 UART: [cold-reset] ++
3,977,536 UART: [fht] Storing FHT @ 0x50003400
3,989,884 UART: [idev] ++
3,990,506 UART: [idev] CDI.KEYID = 6
3,991,414 UART: [idev] SUBJECT.KEYID = 7
3,992,714 UART: [idev] UDS.KEYID = 0
3,998,259 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,142,059 UART: [idev] Erasing UDS.KEYID = 0
7,326,220 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,436 UART: [idev] --
7,351,315 UART: [ldev] ++
7,351,888 UART: [ldev] CDI.KEYID = 6
7,352,808 UART: [ldev] SUBJECT.KEYID = 5
7,354,025 UART: [ldev] AUTHORITY.KEYID = 7
7,355,316 UART: [ldev] FE.KEYID = 1
7,382,309 UART: [ldev] Erasing FE.KEYID = 1
10,712,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,023,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,052,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,071,004 UART: [ldev] --
13,076,555 UART: [fwproc] Waiting for Commands...
13,078,556 UART: [fwproc] Received command 0x46574c44
13,080,802 UART: [fwproc] Received Image of size 114124 bytes
13,145,174 UART: ROM Fatal Error: 0x000B0003
13,148,639 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,812,593 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,922,400 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,550 UART:
192,929 UART: Running Caliptra ROM ...
194,145 UART:
603,828 UART: [state] CFI Enabled
617,827 UART: [state] LifecycleState = Production
619,598 UART: [state] DebugLocked = No
621,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,767 UART: [kat] SHA2-256
796,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,088 UART: [kat] ++
807,542 UART: [kat] sha1
819,985 UART: [kat] SHA2-256
822,710 UART: [kat] SHA2-384
828,425 UART: [kat] SHA2-512-ACC
830,761 UART: [kat] ECC-384
3,113,899 UART: [kat] HMAC-384Kdf
3,125,693 UART: [kat] LMS
4,315,829 UART: [kat] --
4,320,358 UART: [cold-reset] ++
4,322,683 UART: [fht] Storing FHT @ 0x50003400
4,334,281 UART: [idev] ++
4,334,846 UART: [idev] CDI.KEYID = 6
4,335,862 UART: [idev] SUBJECT.KEYID = 7
4,337,175 UART: [idev] UDS.KEYID = 0
4,343,079 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,529 UART: [idev] Erasing UDS.KEYID = 0
7,628,435 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,433 UART: [idev] --
7,655,726 UART: [ldev] ++
7,656,362 UART: [ldev] CDI.KEYID = 6
7,657,432 UART: [ldev] SUBJECT.KEYID = 5
7,658,539 UART: [ldev] AUTHORITY.KEYID = 7
7,659,835 UART: [ldev] FE.KEYID = 1
7,671,841 UART: [ldev] Erasing FE.KEYID = 1
10,958,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,508 UART: [ldev] --
13,316,461 UART: [fwproc] Waiting for Commands...
13,318,186 UART: [fwproc] Received command 0x46574c44
13,320,382 UART: [fwproc] Received Image of size 114124 bytes
13,381,210 UART: ROM Fatal Error: 0x000B0003
13,384,725 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
4,135,962 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,120,165 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,155 UART:
192,521 UART: Running Caliptra ROM ...
193,803 UART:
193,952 UART: [state] CFI Enabled
262,681 UART: [state] LifecycleState = Production
264,452 UART: [state] DebugLocked = No
266,374 UART: [state] WD Timer not started. Device not locked for debugging
269,607 UART: [kat] SHA2-256
448,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,306 UART: [kat] ++
460,758 UART: [kat] sha1
472,732 UART: [kat] SHA2-256
475,799 UART: [kat] SHA2-384
482,368 UART: [kat] SHA2-512-ACC
485,300 UART: [kat] ECC-384
2,948,703 UART: [kat] HMAC-384Kdf
2,971,374 UART: [kat] LMS
3,500,823 UART: [kat] --
3,504,266 UART: [cold-reset] ++
3,505,874 UART: [fht] FHT @ 0x50003400
3,517,446 UART: [idev] ++
3,518,011 UART: [idev] CDI.KEYID = 6
3,518,935 UART: [idev] SUBJECT.KEYID = 7
3,520,148 UART: [idev] UDS.KEYID = 0
3,523,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,213 UART: [idev] Erasing UDS.KEYID = 0
6,025,906 UART: [idev] Sha1 KeyId Algorithm
6,049,236 UART: [idev] --
6,052,356 UART: [ldev] ++
6,052,940 UART: [ldev] CDI.KEYID = 6
6,053,857 UART: [ldev] SUBJECT.KEYID = 5
6,055,026 UART: [ldev] AUTHORITY.KEYID = 7
6,056,264 UART: [ldev] FE.KEYID = 1
6,099,318 UART: [ldev] Erasing FE.KEYID = 1
8,602,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,934 UART: [ldev] --
10,412,338 UART: [fwproc] Wait for Commands...
10,415,569 UART: [fwproc] Recv command 0x46574c44
10,417,668 UART: [fwproc] Recv'd Img size: 114448 bytes
10,477,033 UART: ROM Fatal Error: 0x000B0003
10,480,175 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,364,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,265,838 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,463 UART:
192,834 UART: Running Caliptra ROM ...
193,998 UART:
603,435 UART: [state] CFI Enabled
612,577 UART: [state] LifecycleState = Production
614,331 UART: [state] DebugLocked = No
615,949 UART: [state] WD Timer not started. Device not locked for debugging
620,527 UART: [kat] SHA2-256
799,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,258 UART: [kat] ++
811,705 UART: [kat] sha1
822,686 UART: [kat] SHA2-256
825,684 UART: [kat] SHA2-384
830,579 UART: [kat] SHA2-512-ACC
833,560 UART: [kat] ECC-384
3,274,504 UART: [kat] HMAC-384Kdf
3,286,498 UART: [kat] LMS
3,815,998 UART: [kat] --
3,820,061 UART: [cold-reset] ++
3,822,541 UART: [fht] FHT @ 0x50003400
3,833,895 UART: [idev] ++
3,834,484 UART: [idev] CDI.KEYID = 6
3,835,397 UART: [idev] SUBJECT.KEYID = 7
3,836,612 UART: [idev] UDS.KEYID = 0
3,839,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,983,442 UART: [idev] Erasing UDS.KEYID = 0
6,308,595 UART: [idev] Sha1 KeyId Algorithm
6,331,817 UART: [idev] --
6,335,758 UART: [ldev] ++
6,336,332 UART: [ldev] CDI.KEYID = 6
6,337,246 UART: [ldev] SUBJECT.KEYID = 5
6,338,407 UART: [ldev] AUTHORITY.KEYID = 7
6,339,635 UART: [ldev] FE.KEYID = 1
6,351,898 UART: [ldev] Erasing FE.KEYID = 1
8,827,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,529 UART: [ldev] --
10,619,155 UART: [fwproc] Wait for Commands...
10,622,280 UART: [fwproc] Recv command 0x46574c44
10,624,382 UART: [fwproc] Recv'd Img size: 114448 bytes
10,685,718 UART: ROM Fatal Error: 0x000B0003
10,688,823 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,699,472 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,456,735 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,442,865 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,310,487 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,755,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,531,355 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Production
85,681 UART: [state] DebugLocked = No
86,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,254 UART: [kat] SHA2-512-ACC
897,155 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,308 UART: [kat] LMS
1,475,504 UART: [kat] --
1,476,503 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,974 UART: [idev] ++
1,480,142 UART: [idev] CDI.KEYID = 6
1,480,502 UART: [idev] SUBJECT.KEYID = 7
1,480,926 UART: [idev] UDS.KEYID = 0
1,481,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,234 UART: [idev] Erasing UDS.KEYID = 0
1,504,752 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,394 UART: [idev] --
1,514,495 UART: [ldev] ++
1,514,663 UART: [ldev] CDI.KEYID = 6
1,515,026 UART: [ldev] SUBJECT.KEYID = 5
1,515,452 UART: [ldev] AUTHORITY.KEYID = 7
1,515,915 UART: [ldev] FE.KEYID = 1
1,521,169 UART: [ldev] Erasing FE.KEYID = 1
1,546,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,376 UART: [ldev] --
1,585,779 UART: [fwproc] Waiting for Commands...
1,586,556 UART: [fwproc] Received command 0x46574c44
1,587,347 UART: [fwproc] Received Image of size 114448 bytes
1,607,087 UART: ROM Fatal Error: 0x000B0003
1,608,244 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,462,219 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,859 UART: [state] LifecycleState = Production
86,466 UART: [state] DebugLocked = No
87,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,766 UART: [kat] SHA2-256
882,697 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,812 UART: [kat] ++
886,964 UART: [kat] sha1
891,200 UART: [kat] SHA2-256
893,138 UART: [kat] SHA2-384
896,139 UART: [kat] SHA2-512-ACC
898,040 UART: [kat] ECC-384
903,325 UART: [kat] HMAC-384Kdf
908,019 UART: [kat] LMS
1,476,215 UART: [kat] --
1,477,118 UART: [cold-reset] ++
1,477,692 UART: [fht] Storing FHT @ 0x50003400
1,480,397 UART: [idev] ++
1,480,565 UART: [idev] CDI.KEYID = 6
1,480,925 UART: [idev] SUBJECT.KEYID = 7
1,481,349 UART: [idev] UDS.KEYID = 0
1,481,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,343 UART: [idev] Erasing UDS.KEYID = 0
1,506,279 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,919 UART: [idev] --
1,515,868 UART: [ldev] ++
1,516,036 UART: [ldev] CDI.KEYID = 6
1,516,399 UART: [ldev] SUBJECT.KEYID = 5
1,516,825 UART: [ldev] AUTHORITY.KEYID = 7
1,517,288 UART: [ldev] FE.KEYID = 1
1,522,544 UART: [ldev] Erasing FE.KEYID = 1
1,547,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,975 UART: [ldev] --
1,587,334 UART: [fwproc] Waiting for Commands...
1,588,115 UART: [fwproc] Received command 0x46574c44
1,588,906 UART: [fwproc] Received Image of size 114448 bytes
1,609,058 UART: ROM Fatal Error: 0x000B0003
1,610,215 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,012 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,463,396 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Production
85,801 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
893,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,519 UART: [kat] ++
897,671 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
917,898 UART: [kat] HMAC-384Kdf
922,380 UART: [kat] LMS
1,170,708 UART: [kat] --
1,171,729 UART: [cold-reset] ++
1,172,189 UART: [fht] FHT @ 0x50003400
1,174,932 UART: [idev] ++
1,175,100 UART: [idev] CDI.KEYID = 6
1,175,460 UART: [idev] SUBJECT.KEYID = 7
1,175,884 UART: [idev] UDS.KEYID = 0
1,176,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,706 UART: [idev] Erasing UDS.KEYID = 0
1,201,139 UART: [idev] Sha1 KeyId Algorithm
1,209,549 UART: [idev] --
1,210,605 UART: [ldev] ++
1,210,773 UART: [ldev] CDI.KEYID = 6
1,211,136 UART: [ldev] SUBJECT.KEYID = 5
1,211,562 UART: [ldev] AUTHORITY.KEYID = 7
1,212,025 UART: [ldev] FE.KEYID = 1
1,217,141 UART: [ldev] Erasing FE.KEYID = 1
1,242,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,679 UART: [ldev] --
1,282,102 UART: [fwproc] Wait for Commands...
1,282,846 UART: [fwproc] Recv command 0x46574c44
1,283,574 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,548 UART: ROM Fatal Error: 0x000B0003
1,304,705 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,310 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Production
85,616 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
893,187 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,312 UART: [kat] ++
897,464 UART: [kat] sha1
901,590 UART: [kat] SHA2-256
903,530 UART: [kat] SHA2-384
906,269 UART: [kat] SHA2-512-ACC
908,170 UART: [kat] ECC-384
917,933 UART: [kat] HMAC-384Kdf
922,637 UART: [kat] LMS
1,170,965 UART: [kat] --
1,171,868 UART: [cold-reset] ++
1,172,448 UART: [fht] FHT @ 0x50003400
1,174,913 UART: [idev] ++
1,175,081 UART: [idev] CDI.KEYID = 6
1,175,441 UART: [idev] SUBJECT.KEYID = 7
1,175,865 UART: [idev] UDS.KEYID = 0
1,176,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,251 UART: [idev] Erasing UDS.KEYID = 0
1,201,394 UART: [idev] Sha1 KeyId Algorithm
1,209,776 UART: [idev] --
1,210,868 UART: [ldev] ++
1,211,036 UART: [ldev] CDI.KEYID = 6
1,211,399 UART: [ldev] SUBJECT.KEYID = 5
1,211,825 UART: [ldev] AUTHORITY.KEYID = 7
1,212,288 UART: [ldev] FE.KEYID = 1
1,217,876 UART: [ldev] Erasing FE.KEYID = 1
1,244,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,750 UART: [ldev] --
1,284,253 UART: [fwproc] Wait for Commands...
1,285,059 UART: [fwproc] Recv command 0x46574c44
1,285,787 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,403 UART: ROM Fatal Error: 0x000B0003
1,307,560 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,413 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Production
85,581 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,268 UART: [kat] SHA2-512-ACC
906,169 UART: [kat] ECC-384
915,450 UART: [kat] HMAC-384Kdf
919,988 UART: [kat] LMS
1,168,300 UART: [kat] --
1,169,289 UART: [cold-reset] ++
1,169,749 UART: [fht] FHT @ 0x50003400
1,172,315 UART: [idev] ++
1,172,483 UART: [idev] CDI.KEYID = 6
1,172,844 UART: [idev] SUBJECT.KEYID = 7
1,173,269 UART: [idev] UDS.KEYID = 0
1,173,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,231 UART: [idev] Erasing UDS.KEYID = 0
1,198,879 UART: [idev] Sha1 KeyId Algorithm
1,207,699 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,215,248 UART: [ldev] Erasing FE.KEYID = 1
1,241,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,512 UART: [ldev] --
1,280,860 UART: [fwproc] Wait for Commands...
1,281,435 UART: [fwproc] Recv command 0x46574c44
1,282,168 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,707 UART: ROM Fatal Error: 0x000B0003
1,303,864 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,157,307 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Production
86,132 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,720 UART: [kat] ++
895,872 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,625 UART: [kat] HMAC-384Kdf
921,377 UART: [kat] LMS
1,169,689 UART: [kat] --
1,170,490 UART: [cold-reset] ++
1,170,844 UART: [fht] FHT @ 0x50003400
1,173,506 UART: [idev] ++
1,173,674 UART: [idev] CDI.KEYID = 6
1,174,035 UART: [idev] SUBJECT.KEYID = 7
1,174,460 UART: [idev] UDS.KEYID = 0
1,174,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,680 UART: [idev] Erasing UDS.KEYID = 0
1,199,752 UART: [idev] Sha1 KeyId Algorithm
1,208,720 UART: [idev] --
1,209,635 UART: [ldev] ++
1,209,803 UART: [ldev] CDI.KEYID = 6
1,210,167 UART: [ldev] SUBJECT.KEYID = 5
1,210,594 UART: [ldev] AUTHORITY.KEYID = 7
1,211,057 UART: [ldev] FE.KEYID = 1
1,216,427 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,413 UART: [ldev] --
1,281,881 UART: [fwproc] Wait for Commands...
1,282,630 UART: [fwproc] Recv command 0x46574c44
1,283,363 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,108 UART: ROM Fatal Error: 0x000B0003
1,304,265 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,365 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,264 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,015 UART:
192,387 UART: Running Caliptra ROM ...
193,516 UART:
193,665 UART: [state] CFI Enabled
268,497 UART: [state] LifecycleState = Production
270,338 UART: [state] DebugLocked = No
271,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,029 UART: [kat] SHA2-256
446,703 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,237 UART: [kat] ++
457,690 UART: [kat] sha1
469,024 UART: [kat] SHA2-256
471,764 UART: [kat] SHA2-384
478,441 UART: [kat] SHA2-512-ACC
480,836 UART: [kat] ECC-384
2,769,754 UART: [kat] HMAC-384Kdf
2,802,736 UART: [kat] LMS
3,993,052 UART: [kat] --
3,996,424 UART: [cold-reset] ++
3,998,740 UART: [fht] Storing FHT @ 0x50003400
4,009,952 UART: [idev] ++
4,010,581 UART: [idev] CDI.KEYID = 6
4,011,476 UART: [idev] SUBJECT.KEYID = 7
4,012,697 UART: [idev] UDS.KEYID = 0
4,015,690 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,414 UART: [idev] Erasing UDS.KEYID = 0
7,347,214 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,330 UART: [idev] --
7,373,492 UART: [ldev] ++
7,374,060 UART: [ldev] CDI.KEYID = 6
7,375,040 UART: [ldev] SUBJECT.KEYID = 5
7,376,263 UART: [ldev] AUTHORITY.KEYID = 7
7,377,494 UART: [ldev] FE.KEYID = 1
7,427,521 UART: [ldev] Erasing FE.KEYID = 1
10,758,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,892 UART: [ldev] --
13,118,784 UART: [fwproc] Waiting for Commands...
13,121,693 UART: [fwproc] Received command 0x46574c44
13,123,883 UART: [fwproc] Received Image of size 114124 bytes
13,220,442 UART: ROM Fatal Error: 0x000B0005
13,223,910 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,784,863 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,916,425 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,402 UART:
192,767 UART: Running Caliptra ROM ...
193,905 UART:
603,772 UART: [state] CFI Enabled
617,305 UART: [state] LifecycleState = Production
619,162 UART: [state] DebugLocked = No
621,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,466 UART: [kat] SHA2-256
796,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,737 UART: [kat] ++
807,253 UART: [kat] sha1
819,011 UART: [kat] SHA2-256
821,699 UART: [kat] SHA2-384
828,539 UART: [kat] SHA2-512-ACC
830,882 UART: [kat] ECC-384
3,113,201 UART: [kat] HMAC-384Kdf
3,124,902 UART: [kat] LMS
4,315,007 UART: [kat] --
4,318,162 UART: [cold-reset] ++
4,319,177 UART: [fht] Storing FHT @ 0x50003400
4,330,013 UART: [idev] ++
4,330,587 UART: [idev] CDI.KEYID = 6
4,331,526 UART: [idev] SUBJECT.KEYID = 7
4,332,797 UART: [idev] UDS.KEYID = 0
4,335,453 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,994 UART: [idev] Erasing UDS.KEYID = 0
7,617,361 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,738 UART: [idev] --
7,642,493 UART: [ldev] ++
7,643,075 UART: [ldev] CDI.KEYID = 6
7,643,993 UART: [ldev] SUBJECT.KEYID = 5
7,645,207 UART: [ldev] AUTHORITY.KEYID = 7
7,646,495 UART: [ldev] FE.KEYID = 1
7,657,429 UART: [ldev] Erasing FE.KEYID = 1
10,946,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,308 UART: [ldev] --
13,306,307 UART: [fwproc] Waiting for Commands...
13,309,213 UART: [fwproc] Received command 0x46574c44
13,311,398 UART: [fwproc] Received Image of size 114124 bytes
13,406,389 UART: ROM Fatal Error: 0x000B0005
13,409,891 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,123,452 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,149,300 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,287 UART:
192,643 UART: Running Caliptra ROM ...
193,828 UART:
194,004 UART: [state] CFI Enabled
267,079 UART: [state] LifecycleState = Production
268,847 UART: [state] DebugLocked = No
270,764 UART: [state] WD Timer not started. Device not locked for debugging
274,044 UART: [kat] SHA2-256
453,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,745 UART: [kat] ++
465,193 UART: [kat] sha1
475,693 UART: [kat] SHA2-256
478,732 UART: [kat] SHA2-384
484,067 UART: [kat] SHA2-512-ACC
486,998 UART: [kat] ECC-384
2,950,293 UART: [kat] HMAC-384Kdf
2,972,615 UART: [kat] LMS
3,502,034 UART: [kat] --
3,506,362 UART: [cold-reset] ++
3,507,295 UART: [fht] FHT @ 0x50003400
3,518,497 UART: [idev] ++
3,519,104 UART: [idev] CDI.KEYID = 6
3,520,026 UART: [idev] SUBJECT.KEYID = 7
3,521,192 UART: [idev] UDS.KEYID = 0
3,524,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,125 UART: [idev] Erasing UDS.KEYID = 0
6,030,246 UART: [idev] Sha1 KeyId Algorithm
6,054,014 UART: [idev] --
6,058,823 UART: [ldev] ++
6,059,399 UART: [ldev] CDI.KEYID = 6
6,060,318 UART: [ldev] SUBJECT.KEYID = 5
6,061,478 UART: [ldev] AUTHORITY.KEYID = 7
6,062,710 UART: [ldev] FE.KEYID = 1
6,103,401 UART: [ldev] Erasing FE.KEYID = 1
8,610,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,553 UART: [ldev] --
10,415,311 UART: [fwproc] Wait for Commands...
10,417,193 UART: [fwproc] Recv command 0x46574c44
10,419,237 UART: [fwproc] Recv'd Img size: 114448 bytes
10,507,062 UART: ROM Fatal Error: 0x000B0005
10,510,214 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,383,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,294,643 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,613 UART:
192,973 UART: Running Caliptra ROM ...
194,511 UART:
603,667 UART: [state] CFI Enabled
620,418 UART: [state] LifecycleState = Production
622,110 UART: [state] DebugLocked = No
624,212 UART: [state] WD Timer not started. Device not locked for debugging
627,813 UART: [kat] SHA2-256
806,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,486 UART: [kat] ++
818,987 UART: [kat] sha1
831,265 UART: [kat] SHA2-256
834,281 UART: [kat] SHA2-384
840,941 UART: [kat] SHA2-512-ACC
843,878 UART: [kat] ECC-384
3,284,408 UART: [kat] HMAC-384Kdf
3,296,423 UART: [kat] LMS
3,825,904 UART: [kat] --
3,829,912 UART: [cold-reset] ++
3,832,167 UART: [fht] FHT @ 0x50003400
3,843,361 UART: [idev] ++
3,843,924 UART: [idev] CDI.KEYID = 6
3,844,863 UART: [idev] SUBJECT.KEYID = 7
3,846,079 UART: [idev] UDS.KEYID = 0
3,849,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,037 UART: [idev] Erasing UDS.KEYID = 0
6,316,082 UART: [idev] Sha1 KeyId Algorithm
6,339,085 UART: [idev] --
6,342,700 UART: [ldev] ++
6,343,279 UART: [ldev] CDI.KEYID = 6
6,344,164 UART: [ldev] SUBJECT.KEYID = 5
6,345,372 UART: [ldev] AUTHORITY.KEYID = 7
6,346,620 UART: [ldev] FE.KEYID = 1
6,358,411 UART: [ldev] Erasing FE.KEYID = 1
8,832,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,193 UART: [ldev] --
10,622,134 UART: [fwproc] Wait for Commands...
10,625,094 UART: [fwproc] Recv command 0x46574c44
10,627,195 UART: [fwproc] Recv'd Img size: 114448 bytes
10,716,323 UART: ROM Fatal Error: 0x000B0005
10,719,465 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
3,701,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,503,575 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
3,442,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,347,374 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,755,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,565,505 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Production
86,095 UART: [state] DebugLocked = No
86,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,273 UART: [kat] SHA2-256
882,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,319 UART: [kat] ++
886,471 UART: [kat] sha1
890,865 UART: [kat] SHA2-256
892,803 UART: [kat] SHA2-384
895,536 UART: [kat] SHA2-512-ACC
897,437 UART: [kat] ECC-384
902,758 UART: [kat] HMAC-384Kdf
907,584 UART: [kat] LMS
1,475,780 UART: [kat] --
1,476,513 UART: [cold-reset] ++
1,476,891 UART: [fht] Storing FHT @ 0x50003400
1,479,554 UART: [idev] ++
1,479,722 UART: [idev] CDI.KEYID = 6
1,480,082 UART: [idev] SUBJECT.KEYID = 7
1,480,506 UART: [idev] UDS.KEYID = 0
1,480,851 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,724 UART: [idev] Erasing UDS.KEYID = 0
1,505,360 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,116 UART: [idev] --
1,515,165 UART: [ldev] ++
1,515,333 UART: [ldev] CDI.KEYID = 6
1,515,696 UART: [ldev] SUBJECT.KEYID = 5
1,516,122 UART: [ldev] AUTHORITY.KEYID = 7
1,516,585 UART: [ldev] FE.KEYID = 1
1,521,493 UART: [ldev] Erasing FE.KEYID = 1
1,547,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,746 UART: [ldev] --
1,586,209 UART: [fwproc] Waiting for Commands...
1,586,948 UART: [fwproc] Received command 0x46574c44
1,587,739 UART: [fwproc] Received Image of size 114448 bytes
1,633,068 UART: ROM Fatal Error: 0x000B0005
1,634,225 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,484,074 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Production
86,126 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,432 UART: [kat] SHA2-256
882,363 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,478 UART: [kat] ++
886,630 UART: [kat] sha1
890,952 UART: [kat] SHA2-256
892,890 UART: [kat] SHA2-384
895,603 UART: [kat] SHA2-512-ACC
897,504 UART: [kat] ECC-384
903,173 UART: [kat] HMAC-384Kdf
907,739 UART: [kat] LMS
1,475,935 UART: [kat] --
1,477,060 UART: [cold-reset] ++
1,477,468 UART: [fht] Storing FHT @ 0x50003400
1,480,297 UART: [idev] ++
1,480,465 UART: [idev] CDI.KEYID = 6
1,480,825 UART: [idev] SUBJECT.KEYID = 7
1,481,249 UART: [idev] UDS.KEYID = 0
1,481,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,391 UART: [idev] Erasing UDS.KEYID = 0
1,506,135 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,735 UART: [idev] --
1,515,748 UART: [ldev] ++
1,515,916 UART: [ldev] CDI.KEYID = 6
1,516,279 UART: [ldev] SUBJECT.KEYID = 5
1,516,705 UART: [ldev] AUTHORITY.KEYID = 7
1,517,168 UART: [ldev] FE.KEYID = 1
1,522,268 UART: [ldev] Erasing FE.KEYID = 1
1,547,831 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,919 UART: [ldev] --
1,587,316 UART: [fwproc] Waiting for Commands...
1,588,053 UART: [fwproc] Received command 0x46574c44
1,588,844 UART: [fwproc] Received Image of size 114448 bytes
1,634,061 UART: ROM Fatal Error: 0x000B0005
1,635,218 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,486,291 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Production
85,537 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
893,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,143 UART: [kat] ++
897,295 UART: [kat] sha1
901,601 UART: [kat] SHA2-256
903,541 UART: [kat] SHA2-384
906,268 UART: [kat] SHA2-512-ACC
908,169 UART: [kat] ECC-384
918,082 UART: [kat] HMAC-384Kdf
922,780 UART: [kat] LMS
1,171,108 UART: [kat] --
1,171,865 UART: [cold-reset] ++
1,172,393 UART: [fht] FHT @ 0x50003400
1,175,006 UART: [idev] ++
1,175,174 UART: [idev] CDI.KEYID = 6
1,175,534 UART: [idev] SUBJECT.KEYID = 7
1,175,958 UART: [idev] UDS.KEYID = 0
1,176,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,934 UART: [idev] Erasing UDS.KEYID = 0
1,200,605 UART: [idev] Sha1 KeyId Algorithm
1,209,205 UART: [idev] --
1,210,361 UART: [ldev] ++
1,210,529 UART: [ldev] CDI.KEYID = 6
1,210,892 UART: [ldev] SUBJECT.KEYID = 5
1,211,318 UART: [ldev] AUTHORITY.KEYID = 7
1,211,781 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,242,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,282,130 UART: [fwproc] Wait for Commands...
1,282,880 UART: [fwproc] Recv command 0x46574c44
1,283,608 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,551 UART: ROM Fatal Error: 0x000B0005
1,329,708 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,609 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Production
86,212 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
893,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,714 UART: [kat] ++
897,866 UART: [kat] sha1
902,100 UART: [kat] SHA2-256
904,040 UART: [kat] SHA2-384
906,597 UART: [kat] SHA2-512-ACC
908,498 UART: [kat] ECC-384
918,003 UART: [kat] HMAC-384Kdf
922,759 UART: [kat] LMS
1,171,087 UART: [kat] --
1,171,940 UART: [cold-reset] ++
1,172,312 UART: [fht] FHT @ 0x50003400
1,174,971 UART: [idev] ++
1,175,139 UART: [idev] CDI.KEYID = 6
1,175,499 UART: [idev] SUBJECT.KEYID = 7
1,175,923 UART: [idev] UDS.KEYID = 0
1,176,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,893 UART: [idev] Erasing UDS.KEYID = 0
1,200,386 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,732 UART: [ldev] ++
1,209,900 UART: [ldev] CDI.KEYID = 6
1,210,263 UART: [ldev] SUBJECT.KEYID = 5
1,210,689 UART: [ldev] AUTHORITY.KEYID = 7
1,211,152 UART: [ldev] FE.KEYID = 1
1,216,458 UART: [ldev] Erasing FE.KEYID = 1
1,243,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,554 UART: [ldev] --
1,282,973 UART: [fwproc] Wait for Commands...
1,283,589 UART: [fwproc] Recv command 0x46574c44
1,284,317 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,330 UART: ROM Fatal Error: 0x000B0005
1,330,487 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,942 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Production
85,679 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,042 UART: [kat] SHA2-512-ACC
905,943 UART: [kat] ECC-384
915,388 UART: [kat] HMAC-384Kdf
920,036 UART: [kat] LMS
1,168,348 UART: [kat] --
1,169,255 UART: [cold-reset] ++
1,169,755 UART: [fht] FHT @ 0x50003400
1,172,239 UART: [idev] ++
1,172,407 UART: [idev] CDI.KEYID = 6
1,172,768 UART: [idev] SUBJECT.KEYID = 7
1,173,193 UART: [idev] UDS.KEYID = 0
1,173,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,209 UART: [idev] Erasing UDS.KEYID = 0
1,198,501 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,526 UART: [ldev] ++
1,208,694 UART: [ldev] CDI.KEYID = 6
1,209,058 UART: [ldev] SUBJECT.KEYID = 5
1,209,485 UART: [ldev] AUTHORITY.KEYID = 7
1,209,948 UART: [ldev] FE.KEYID = 1
1,215,030 UART: [ldev] Erasing FE.KEYID = 1
1,240,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,616 UART: [ldev] --
1,279,904 UART: [fwproc] Wait for Commands...
1,280,549 UART: [fwproc] Recv command 0x46574c44
1,281,282 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,707 UART: ROM Fatal Error: 0x000B0005
1,326,864 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,425 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Production
86,182 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
899,974 UART: [kat] SHA2-256
901,914 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,197 UART: [kat] HMAC-384Kdf
920,767 UART: [kat] LMS
1,169,079 UART: [kat] --
1,169,862 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,172,820 UART: [idev] ++
1,172,988 UART: [idev] CDI.KEYID = 6
1,173,349 UART: [idev] SUBJECT.KEYID = 7
1,173,774 UART: [idev] UDS.KEYID = 0
1,174,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,908 UART: [idev] Erasing UDS.KEYID = 0
1,198,380 UART: [idev] Sha1 KeyId Algorithm
1,207,290 UART: [idev] --
1,208,473 UART: [ldev] ++
1,208,641 UART: [ldev] CDI.KEYID = 6
1,209,005 UART: [ldev] SUBJECT.KEYID = 5
1,209,432 UART: [ldev] AUTHORITY.KEYID = 7
1,209,895 UART: [ldev] FE.KEYID = 1
1,215,393 UART: [ldev] Erasing FE.KEYID = 1
1,241,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,613 UART: [ldev] --
1,280,955 UART: [fwproc] Wait for Commands...
1,281,710 UART: [fwproc] Recv command 0x46574c44
1,282,443 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,068 UART: ROM Fatal Error: 0x000B0005
1,328,225 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,900 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
4,883,731 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,622,096 >>> mbox cmd response: failed
16,622,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,623,083 >>> mbox cmd response: failed
16,623,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,623,646 >>> mbox cmd response: failed
Initializing fuses
2,056,722 writing to cptra_bootfsm_go
6,923,444 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,480,234 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
4,880,796 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,644,323 >>> mbox cmd response: failed
16,645,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,645,454 >>> mbox cmd response: failed
16,645,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,646,011 >>> mbox cmd response: failed
Initializing fuses
2,063,814 writing to cptra_bootfsm_go
6,935,753 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,530,949 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
5,187,629 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,816,119 >>> mbox cmd response: failed
16,816,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,817,110 >>> mbox cmd response: failed
16,817,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,817,692 >>> mbox cmd response: failed
Initializing fuses
2,058,730 writing to cptra_bootfsm_go
8,230,170 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,675,889 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
5,195,125 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,817,164 >>> mbox cmd response: failed
16,817,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,818,116 >>> mbox cmd response: failed
16,818,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,818,676 >>> mbox cmd response: failed
Initializing fuses
2,064,190 writing to cptra_bootfsm_go
8,231,454 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,663,228 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,461,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,435,428 >>> mbox cmd response: failed
12,436,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,436,502 >>> mbox cmd response: failed
12,436,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,437,072 >>> mbox cmd response: failed
Initializing fuses
2,060,916 writing to cptra_bootfsm_go
5,531,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,345,133 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
3,457,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,422,847 >>> mbox cmd response: failed
12,423,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,423,975 >>> mbox cmd response: failed
12,424,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,424,621 >>> mbox cmd response: failed
Initializing fuses
2,057,870 writing to cptra_bootfsm_go
5,494,444 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,328,164 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,776,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,628,086 >>> mbox cmd response: failed
12,628,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,628,964 >>> mbox cmd response: failed
12,629,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,629,519 >>> mbox cmd response: failed
Initializing fuses
2,055,707 writing to cptra_bootfsm_go
11,023,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,746,891 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,769,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,662,335 >>> mbox cmd response: failed
12,662,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,312 >>> mbox cmd response: failed
12,663,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,874 >>> mbox cmd response: failed
Initializing fuses
2,056,310 writing to cptra_bootfsm_go
10,998,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,707,618 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,475,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,471,294 >>> mbox cmd response: failed
12,471,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,228 >>> mbox cmd response: failed
12,472,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,795 >>> mbox cmd response: failed
Initializing fuses
2,064,103 writing to cptra_bootfsm_go
5,542,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,378,378 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,795,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,653,526 >>> mbox cmd response: failed
12,654,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,654,509 >>> mbox cmd response: failed
12,654,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,655,060 >>> mbox cmd response: failed
Initializing fuses
2,055,737 writing to cptra_bootfsm_go
10,990,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,726,094 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,208,330 >>> mbox cmd response: failed
1,208,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,336 >>> mbox cmd response: failed
1,208,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,342 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,724 UART: [state] LifecycleState = Unprovisioned
85,379 UART: [state] DebugLocked = No
85,979 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,515 UART: [kat] SHA2-256
881,446 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,561 UART: [kat] ++
885,713 UART: [kat] sha1
890,037 UART: [kat] SHA2-256
891,975 UART: [kat] SHA2-384
894,896 UART: [kat] SHA2-512-ACC
896,797 UART: [kat] ECC-384
902,756 UART: [kat] HMAC-384Kdf
907,194 UART: [kat] LMS
1,475,390 UART: [kat] --
1,476,071 UART: [cold-reset] ++
1,476,629 UART: [fht] Storing FHT @ 0x50003400
1,479,588 UART: [idev] ++
1,479,756 UART: [idev] CDI.KEYID = 6
1,480,116 UART: [idev] SUBJECT.KEYID = 7
1,480,540 UART: [idev] UDS.KEYID = 0
1,480,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,502 UART: [idev] Erasing UDS.KEYID = 0
1,505,664 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,326 UART: [idev] --
1,515,297 UART: [ldev] ++
1,515,465 UART: [ldev] CDI.KEYID = 6
1,515,828 UART: [ldev] SUBJECT.KEYID = 5
1,516,254 UART: [ldev] AUTHORITY.KEYID = 7
1,516,717 UART: [ldev] FE.KEYID = 1
1,521,971 UART: [ldev] Erasing FE.KEYID = 1
1,547,438 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,606 UART: [ldev] --
1,586,967 UART: [fwproc] Waiting for Commands...
1,587,604 UART: [fwproc] Received command 0x46574c44
1,588,395 UART: [fwproc] Received Image of size 114448 bytes
2,886,279 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,351 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,703 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,676 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,207,862 >>> mbox cmd response: failed
1,207,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,868 >>> mbox cmd response: failed
1,207,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,182 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,207,741 >>> mbox cmd response: failed
1,207,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,747 >>> mbox cmd response: failed
1,207,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,450 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,046 UART: [kat] SHA2-256
881,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,092 UART: [kat] ++
886,244 UART: [kat] sha1
890,346 UART: [kat] SHA2-256
892,284 UART: [kat] SHA2-384
894,923 UART: [kat] SHA2-512-ACC
896,824 UART: [kat] ECC-384
902,525 UART: [kat] HMAC-384Kdf
907,177 UART: [kat] LMS
1,475,373 UART: [kat] --
1,476,244 UART: [cold-reset] ++
1,476,670 UART: [fht] Storing FHT @ 0x50003400
1,479,357 UART: [idev] ++
1,479,525 UART: [idev] CDI.KEYID = 6
1,479,885 UART: [idev] SUBJECT.KEYID = 7
1,480,309 UART: [idev] UDS.KEYID = 0
1,480,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,425 UART: [idev] Erasing UDS.KEYID = 0
1,505,335 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,973 UART: [idev] --
1,515,092 UART: [ldev] ++
1,515,260 UART: [ldev] CDI.KEYID = 6
1,515,623 UART: [ldev] SUBJECT.KEYID = 5
1,516,049 UART: [ldev] AUTHORITY.KEYID = 7
1,516,512 UART: [ldev] FE.KEYID = 1
1,521,560 UART: [ldev] Erasing FE.KEYID = 1
1,546,787 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,403 UART: [ldev] --
1,585,754 UART: [fwproc] Waiting for Commands...
1,586,589 UART: [fwproc] Received command 0x46574c44
1,587,380 UART: [fwproc] Received Image of size 114448 bytes
2,886,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,840 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,192 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,333 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,850 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,207,197 >>> mbox cmd response: failed
1,207,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,203 >>> mbox cmd response: failed
1,207,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,355 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,075 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,204,692 >>> mbox cmd response: failed
1,204,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,698 >>> mbox cmd response: failed
1,204,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
893,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,153 UART: [kat] ++
897,305 UART: [kat] sha1
901,655 UART: [kat] SHA2-256
903,595 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
917,584 UART: [kat] HMAC-384Kdf
922,284 UART: [kat] LMS
1,170,612 UART: [kat] --
1,171,407 UART: [cold-reset] ++
1,171,761 UART: [fht] FHT @ 0x50003400
1,174,484 UART: [idev] ++
1,174,652 UART: [idev] CDI.KEYID = 6
1,175,012 UART: [idev] SUBJECT.KEYID = 7
1,175,436 UART: [idev] UDS.KEYID = 0
1,175,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,444 UART: [idev] Erasing UDS.KEYID = 0
1,199,625 UART: [idev] Sha1 KeyId Algorithm
1,208,073 UART: [idev] --
1,208,993 UART: [ldev] ++
1,209,161 UART: [ldev] CDI.KEYID = 6
1,209,524 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,241,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,445 UART: [ldev] --
1,280,958 UART: [fwproc] Wait for Commands...
1,281,644 UART: [fwproc] Recv command 0x46574c44
1,282,372 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,195 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,208,870 >>> mbox cmd response: failed
1,208,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,876 >>> mbox cmd response: failed
1,208,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,905 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,680 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,209,247 >>> mbox cmd response: failed
1,209,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,253 >>> mbox cmd response: failed
1,209,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,259 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
893,845 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,970 UART: [kat] ++
898,122 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
906,805 UART: [kat] SHA2-512-ACC
908,706 UART: [kat] ECC-384
918,281 UART: [kat] HMAC-384Kdf
923,153 UART: [kat] LMS
1,171,481 UART: [kat] --
1,172,496 UART: [cold-reset] ++
1,173,026 UART: [fht] FHT @ 0x50003400
1,175,771 UART: [idev] ++
1,175,939 UART: [idev] CDI.KEYID = 6
1,176,299 UART: [idev] SUBJECT.KEYID = 7
1,176,723 UART: [idev] UDS.KEYID = 0
1,177,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,085 UART: [idev] Erasing UDS.KEYID = 0
1,201,962 UART: [idev] Sha1 KeyId Algorithm
1,210,418 UART: [idev] --
1,211,418 UART: [ldev] ++
1,211,586 UART: [ldev] CDI.KEYID = 6
1,211,949 UART: [ldev] SUBJECT.KEYID = 5
1,212,375 UART: [ldev] AUTHORITY.KEYID = 7
1,212,838 UART: [ldev] FE.KEYID = 1
1,217,930 UART: [ldev] Erasing FE.KEYID = 1
1,243,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,738 UART: [ldev] --
1,283,073 UART: [fwproc] Wait for Commands...
1,283,731 UART: [fwproc] Recv command 0x46574c44
1,284,459 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,878 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,207,945 >>> mbox cmd response: failed
1,207,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,951 >>> mbox cmd response: failed
1,207,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,878 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,375 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,207,702 >>> mbox cmd response: failed
1,207,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,708 >>> mbox cmd response: failed
1,207,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,174,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,039 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,208,087 UART: [idev] --
1,209,108 UART: [ldev] ++
1,209,276 UART: [ldev] CDI.KEYID = 6
1,209,640 UART: [ldev] SUBJECT.KEYID = 5
1,210,067 UART: [ldev] AUTHORITY.KEYID = 7
1,210,530 UART: [ldev] FE.KEYID = 1
1,215,574 UART: [ldev] Erasing FE.KEYID = 1
1,241,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,896 UART: [ldev] --
1,280,388 UART: [fwproc] Wait for Commands...
1,280,987 UART: [fwproc] Recv command 0x46574c44
1,281,720 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,551 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,208,234 >>> mbox cmd response: failed
1,208,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,240 >>> mbox cmd response: failed
1,208,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,365 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,207,689 >>> mbox cmd response: failed
1,207,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,695 >>> mbox cmd response: failed
1,207,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,701 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,088 UART: [kat] SHA2-256
902,028 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,649 UART: [kat] HMAC-384Kdf
921,289 UART: [kat] LMS
1,169,601 UART: [kat] --
1,170,342 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,174,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,208,066 UART: [idev] --
1,209,207 UART: [ldev] ++
1,209,375 UART: [ldev] CDI.KEYID = 6
1,209,739 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,215,899 UART: [ldev] Erasing FE.KEYID = 1
1,241,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,833 UART: [ldev] --
1,281,333 UART: [fwproc] Wait for Commands...
1,282,146 UART: [fwproc] Recv command 0x46574c44
1,282,879 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,396 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,464 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,208,107 >>> mbox cmd response: failed
1,208,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,113 >>> mbox cmd response: failed
1,208,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,290 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,531 UART:
193,195 UART: Running Caliptra ROM ...
194,297 UART:
194,444 UART: [state] CFI Enabled
262,174 UART: [state] LifecycleState = Unprovisioned
264,173 UART: [state] DebugLocked = No
266,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,762 UART: [kat] SHA2-256
440,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,897 UART: [kat] ++
451,363 UART: [kat] sha1
462,402 UART: [kat] SHA2-256
465,114 UART: [kat] SHA2-384
471,639 UART: [kat] SHA2-512-ACC
474,036 UART: [kat] ECC-384
2,770,678 UART: [kat] HMAC-384Kdf
2,802,286 UART: [kat] LMS
3,992,592 UART: [kat] --
3,997,849 UART: [cold-reset] ++
3,999,951 UART: [fht] Storing FHT @ 0x50003400
4,011,438 UART: [idev] ++
4,012,011 UART: [idev] CDI.KEYID = 6
4,013,247 UART: [idev] SUBJECT.KEYID = 7
4,014,331 UART: [idev] UDS.KEYID = 0
4,017,376 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,161,197 UART: [idev] Erasing UDS.KEYID = 0
7,350,078 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,854 UART: [idev] --
7,375,860 UART: [ldev] ++
7,376,509 UART: [ldev] CDI.KEYID = 6
7,377,443 UART: [ldev] SUBJECT.KEYID = 5
7,378,607 UART: [ldev] AUTHORITY.KEYID = 7
7,379,836 UART: [ldev] FE.KEYID = 1
7,426,131 UART: [ldev] Erasing FE.KEYID = 1
10,757,563 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,342 UART: [ldev] --
13,118,230 UART: [fwproc] Waiting for Commands...
13,120,650 UART: [fwproc] Received command 0x46574c44
13,122,840 UART: [fwproc] Received Image of size 114124 bytes
16,063,616 UART: ROM Fatal Error: 0x000B0014
16,067,081 >>> mbox cmd response: failed
16,067,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,067,882 >>> mbox cmd response: failed
16,068,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,068,445 >>> mbox cmd response: failed
Initializing fuses
2,051,598 writing to cptra_bootfsm_go
2,240,884 UART:
2,241,223 UART: Running Caliptra ROM ...
2,242,270 UART:
2,242,423 UART: [state] CFI Enabled
2,311,151 UART: [state] LifecycleState = Unprovisioned
2,313,110 UART: [state] DebugLocked = No
2,314,959 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,967 UART: [kat] SHA2-256
2,489,671 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,146 UART: [kat] ++
2,500,600 UART: [kat] sha1
2,512,786 UART: [kat] SHA2-256
2,515,465 UART: [kat] SHA2-384
2,520,221 UART: [kat] SHA2-512-ACC
2,522,574 UART: [kat] ECC-384
4,813,649 UART: [kat] HMAC-384Kdf
4,826,600 UART: [kat] LMS
6,016,886 UART: [kat] --
6,020,634 UART: [cold-reset] ++
6,021,608 UART: [fht] Storing FHT @ 0x50003400
6,033,323 UART: [idev] ++
6,033,956 UART: [idev] CDI.KEYID = 6
6,034,880 UART: [idev] SUBJECT.KEYID = 7
6,036,103 UART: [idev] UDS.KEYID = 0
6,038,824 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,182,351 UART: [idev] Erasing UDS.KEYID = 0
9,376,854 UART: [idev] Using Sha1 for KeyId Algorithm
9,399,780 UART: [idev] --
9,402,888 UART: [ldev] ++
9,403,462 UART: [ldev] CDI.KEYID = 6
9,404,404 UART: [ldev] SUBJECT.KEYID = 5
9,405,661 UART: [ldev] AUTHORITY.KEYID = 7
9,406,820 UART: [ldev] FE.KEYID = 1
9,447,904 UART: [ldev] Erasing FE.KEYID = 1
12,779,566 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,074,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,089,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,104,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,118,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,137,904 UART: [ldev] --
15,141,816 UART: [fwproc] Waiting for Commands...
15,144,617 UART: [fwproc] Received command 0x46574c44
15,146,850 UART: [fwproc] Received Image of size 114124 bytes
19,199,343 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,271,559 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,340,420 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,658,141 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,788,616 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,852,299 >>> mbox cmd response: failed
15,853,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,853,403 >>> mbox cmd response: failed
15,853,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,853,973 >>> mbox cmd response: failed
Initializing fuses
2,048,991 writing to cptra_bootfsm_go
5,848,413 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,910,191 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,710 UART:
193,080 UART: Running Caliptra ROM ...
194,217 UART:
603,796 UART: [state] CFI Enabled
620,416 UART: [state] LifecycleState = Unprovisioned
622,380 UART: [state] DebugLocked = No
625,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,420 UART: [kat] SHA2-256
800,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,711 UART: [kat] ++
811,245 UART: [kat] sha1
821,592 UART: [kat] SHA2-256
824,283 UART: [kat] SHA2-384
830,697 UART: [kat] SHA2-512-ACC
833,089 UART: [kat] ECC-384
3,115,917 UART: [kat] HMAC-384Kdf
3,129,019 UART: [kat] LMS
4,319,158 UART: [kat] --
4,324,194 UART: [cold-reset] ++
4,325,701 UART: [fht] Storing FHT @ 0x50003400
4,337,668 UART: [idev] ++
4,338,252 UART: [idev] CDI.KEYID = 6
4,339,163 UART: [idev] SUBJECT.KEYID = 7
4,340,440 UART: [idev] UDS.KEYID = 0
4,343,085 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,598 UART: [idev] Erasing UDS.KEYID = 0
7,632,802 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,308 UART: [idev] --
7,658,181 UART: [ldev] ++
7,658,764 UART: [ldev] CDI.KEYID = 6
7,659,736 UART: [ldev] SUBJECT.KEYID = 5
7,660,951 UART: [ldev] AUTHORITY.KEYID = 7
7,662,187 UART: [ldev] FE.KEYID = 1
7,673,970 UART: [ldev] Erasing FE.KEYID = 1
10,961,052 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,207 UART: [ldev] --
13,321,139 UART: [fwproc] Waiting for Commands...
13,323,547 UART: [fwproc] Received command 0x46574c44
13,325,744 UART: [fwproc] Received Image of size 114124 bytes
16,264,947 UART: ROM Fatal Error: 0x000B0014
16,268,348 >>> mbox cmd response: failed
16,268,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,269,097 >>> mbox cmd response: failed
16,269,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,269,676 >>> mbox cmd response: failed
Initializing fuses
2,053,971 writing to cptra_bootfsm_go
2,243,338 UART:
2,243,693 UART: Running Caliptra ROM ...
2,244,842 UART:
4,190,613 UART: [state] CFI Enabled
4,206,021 UART: [state] LifecycleState = Unprovisioned
4,207,946 UART: [state] DebugLocked = No
4,209,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,215,006 UART: [kat] SHA2-256
4,384,712 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,395,245 UART: [kat] ++
4,395,748 UART: [kat] sha1
4,406,366 UART: [kat] SHA2-256
4,409,067 UART: [kat] SHA2-384
4,415,048 UART: [kat] SHA2-512-ACC
4,417,403 UART: [kat] ECC-384
6,699,231 UART: [kat] HMAC-384Kdf
6,711,029 UART: [kat] LMS
7,901,149 UART: [kat] --
7,904,870 UART: [cold-reset] ++
7,906,470 UART: [fht] Storing FHT @ 0x50003400
7,918,323 UART: [idev] ++
7,918,884 UART: [idev] CDI.KEYID = 6
7,919,824 UART: [idev] SUBJECT.KEYID = 7
7,921,091 UART: [idev] UDS.KEYID = 0
7,923,658 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,067,139 UART: [idev] Erasing UDS.KEYID = 0
11,211,541 UART: [idev] Using Sha1 for KeyId Algorithm
11,232,377 UART: [idev] --
11,235,677 UART: [ldev] ++
11,236,300 UART: [ldev] CDI.KEYID = 6
11,237,190 UART: [ldev] SUBJECT.KEYID = 5
11,238,541 UART: [ldev] AUTHORITY.KEYID = 7
11,239,644 UART: [ldev] FE.KEYID = 1
11,250,046 UART: [ldev] Erasing FE.KEYID = 1
14,537,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,831,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,846,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,860,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,875,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,894,346 UART: [ldev] --
16,898,698 UART: [fwproc] Waiting for Commands...
16,901,014 UART: [fwproc] Received command 0x46574c44
16,903,206 UART: [fwproc] Received Image of size 114124 bytes
20,954,167 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,030,572 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,099,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,416,738 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,125,006 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,027,358 >>> mbox cmd response: failed
16,027,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,261 >>> mbox cmd response: failed
16,028,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,778 >>> mbox cmd response: failed
Initializing fuses
2,054,529 writing to cptra_bootfsm_go
7,963,668 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,901,943 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,341 UART:
192,690 UART: Running Caliptra ROM ...
193,866 UART:
194,013 UART: [state] CFI Enabled
265,285 UART: [state] LifecycleState = Unprovisioned
267,160 UART: [state] DebugLocked = No
269,295 UART: [state] WD Timer not started. Device not locked for debugging
272,353 UART: [kat] SHA2-256
451,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,060 UART: [kat] ++
463,603 UART: [kat] sha1
474,433 UART: [kat] SHA2-256
477,452 UART: [kat] SHA2-384
484,722 UART: [kat] SHA2-512-ACC
487,657 UART: [kat] ECC-384
2,951,610 UART: [kat] HMAC-384Kdf
2,972,929 UART: [kat] LMS
3,502,383 UART: [kat] --
3,507,869 UART: [cold-reset] ++
3,509,115 UART: [fht] FHT @ 0x50003400
3,519,569 UART: [idev] ++
3,520,132 UART: [idev] CDI.KEYID = 6
3,521,111 UART: [idev] SUBJECT.KEYID = 7
3,522,210 UART: [idev] UDS.KEYID = 0
3,525,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,403 UART: [idev] Erasing UDS.KEYID = 0
6,025,344 UART: [idev] Sha1 KeyId Algorithm
6,048,045 UART: [idev] --
6,052,427 UART: [ldev] ++
6,052,999 UART: [ldev] CDI.KEYID = 6
6,053,887 UART: [ldev] SUBJECT.KEYID = 5
6,055,051 UART: [ldev] AUTHORITY.KEYID = 7
6,056,344 UART: [ldev] FE.KEYID = 1
6,102,571 UART: [ldev] Erasing FE.KEYID = 1
8,606,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,892 UART: [ldev] --
10,417,839 UART: [fwproc] Wait for Commands...
10,419,941 UART: [fwproc] Recv command 0x46574c44
10,422,039 UART: [fwproc] Recv'd Img size: 114448 bytes
12,714,724 UART: ROM Fatal Error: 0x000B0014
12,717,845 >>> mbox cmd response: failed
12,718,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,718,606 >>> mbox cmd response: failed
12,718,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,719,166 >>> mbox cmd response: failed
Initializing fuses
2,052,788 writing to cptra_bootfsm_go
2,242,090 UART:
2,242,454 UART: Running Caliptra ROM ...
2,243,586 UART:
2,243,751 UART: [state] CFI Enabled
2,307,239 UART: [state] LifecycleState = Unprovisioned
2,309,124 UART: [state] DebugLocked = No
2,311,216 UART: [state] WD Timer not started. Device not locked for debugging
2,314,046 UART: [kat] SHA2-256
2,493,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,767 UART: [kat] ++
2,505,310 UART: [kat] sha1
2,516,746 UART: [kat] SHA2-256
2,519,755 UART: [kat] SHA2-384
2,524,607 UART: [kat] SHA2-512-ACC
2,527,565 UART: [kat] ECC-384
4,974,573 UART: [kat] HMAC-384Kdf
4,996,627 UART: [kat] LMS
5,526,100 UART: [kat] --
5,531,072 UART: [cold-reset] ++
5,532,151 UART: [fht] FHT @ 0x50003400
5,543,401 UART: [idev] ++
5,543,968 UART: [idev] CDI.KEYID = 6
5,544,931 UART: [idev] SUBJECT.KEYID = 7
5,546,091 UART: [idev] UDS.KEYID = 0
5,548,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,692,617 UART: [idev] Erasing UDS.KEYID = 0
8,051,469 UART: [idev] Sha1 KeyId Algorithm
8,074,052 UART: [idev] --
8,078,785 UART: [ldev] ++
8,079,367 UART: [ldev] CDI.KEYID = 6
8,080,302 UART: [ldev] SUBJECT.KEYID = 5
8,081,406 UART: [ldev] AUTHORITY.KEYID = 7
8,082,701 UART: [ldev] FE.KEYID = 1
8,126,329 UART: [ldev] Erasing FE.KEYID = 1
10,631,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,367,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,383,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,399,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,414,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,436,033 UART: [ldev] --
12,440,270 UART: [fwproc] Wait for Commands...
12,442,579 UART: [fwproc] Recv command 0x46574c44
12,444,619 UART: [fwproc] Recv'd Img size: 114448 bytes
15,846,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,914,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,983,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,302,286 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,384,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,512,703 >>> mbox cmd response: failed
12,513,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,513,642 >>> mbox cmd response: failed
12,513,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,209 >>> mbox cmd response: failed
Initializing fuses
2,056,817 writing to cptra_bootfsm_go
5,413,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,115,677 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
192,644 UART:
193,008 UART: Running Caliptra ROM ...
194,146 UART:
603,843 UART: [state] CFI Enabled
620,018 UART: [state] LifecycleState = Unprovisioned
621,904 UART: [state] DebugLocked = No
623,072 UART: [state] WD Timer not started. Device not locked for debugging
626,689 UART: [kat] SHA2-256
805,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,397 UART: [kat] ++
817,925 UART: [kat] sha1
828,920 UART: [kat] SHA2-256
831,976 UART: [kat] SHA2-384
838,649 UART: [kat] SHA2-512-ACC
841,588 UART: [kat] ECC-384
3,284,588 UART: [kat] HMAC-384Kdf
3,298,389 UART: [kat] LMS
3,827,847 UART: [kat] --
3,831,667 UART: [cold-reset] ++
3,833,761 UART: [fht] FHT @ 0x50003400
3,845,626 UART: [idev] ++
3,846,194 UART: [idev] CDI.KEYID = 6
3,847,160 UART: [idev] SUBJECT.KEYID = 7
3,848,263 UART: [idev] UDS.KEYID = 0
3,851,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,995,082 UART: [idev] Erasing UDS.KEYID = 0
6,322,712 UART: [idev] Sha1 KeyId Algorithm
6,345,402 UART: [idev] --
6,349,291 UART: [ldev] ++
6,349,867 UART: [ldev] CDI.KEYID = 6
6,350,750 UART: [ldev] SUBJECT.KEYID = 5
6,351,964 UART: [ldev] AUTHORITY.KEYID = 7
6,353,197 UART: [ldev] FE.KEYID = 1
6,365,605 UART: [ldev] Erasing FE.KEYID = 1
8,840,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,544 UART: [ldev] --
10,631,760 UART: [fwproc] Wait for Commands...
10,634,341 UART: [fwproc] Recv command 0x46574c44
10,636,435 UART: [fwproc] Recv'd Img size: 114448 bytes
12,929,530 UART: ROM Fatal Error: 0x000B0014
12,932,659 >>> mbox cmd response: failed
12,933,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,933,343 >>> mbox cmd response: failed
12,933,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,933,903 >>> mbox cmd response: failed
Initializing fuses
2,058,198 writing to cptra_bootfsm_go
2,247,474 UART:
2,247,828 UART: Running Caliptra ROM ...
2,248,970 UART:
7,537,191 UART: [state] CFI Enabled
7,551,735 UART: [state] LifecycleState = Unprovisioned
7,553,603 UART: [state] DebugLocked = No
7,556,204 UART: [state] WD Timer not started. Device not locked for debugging
7,559,294 UART: [kat] SHA2-256
7,738,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,750,030 UART: [kat] ++
7,750,495 UART: [kat] sha1
7,762,347 UART: [kat] SHA2-256
7,765,350 UART: [kat] SHA2-384
7,771,078 UART: [kat] SHA2-512-ACC
7,774,048 UART: [kat] ECC-384
10,216,177 UART: [kat] HMAC-384Kdf
10,228,020 UART: [kat] LMS
10,757,519 UART: [kat] --
10,763,412 UART: [cold-reset] ++
10,764,586 UART: [fht] FHT @ 0x50003400
10,774,916 UART: [idev] ++
10,775,480 UART: [idev] CDI.KEYID = 6
10,776,401 UART: [idev] SUBJECT.KEYID = 7
10,777,619 UART: [idev] UDS.KEYID = 0
10,780,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,924,032 UART: [idev] Erasing UDS.KEYID = 0
13,249,234 UART: [idev] Sha1 KeyId Algorithm
13,273,160 UART: [idev] --
13,276,771 UART: [ldev] ++
13,277,335 UART: [ldev] CDI.KEYID = 6
13,278,407 UART: [ldev] SUBJECT.KEYID = 5
13,279,528 UART: [ldev] AUTHORITY.KEYID = 7
13,280,652 UART: [ldev] FE.KEYID = 1
13,291,591 UART: [ldev] Erasing FE.KEYID = 1
15,766,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,484,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,500,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,516,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,532,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,551,928 UART: [ldev] --
17,557,248 UART: [fwproc] Wait for Commands...
17,558,920 UART: [fwproc] Recv command 0x46574c44
17,561,035 UART: [fwproc] Recv'd Img size: 114448 bytes
20,972,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,042,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,111,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,429,705 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,701,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,702,121 >>> mbox cmd response: failed
12,702,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,172 >>> mbox cmd response: failed
12,703,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,819 >>> mbox cmd response: failed
Initializing fuses
2,067,482 writing to cptra_bootfsm_go
10,863,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,444,057 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,441,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,654,707 >>> mbox cmd response: failed
12,655,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,655,605 >>> mbox cmd response: failed
12,655,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,656,166 >>> mbox cmd response: failed
Initializing fuses
2,052,002 writing to cptra_bootfsm_go
5,486,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,811,006 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,756,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,872,987 >>> mbox cmd response: failed
12,873,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,873,984 >>> mbox cmd response: failed
12,874,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,874,545 >>> mbox cmd response: failed
Initializing fuses
2,054,262 writing to cptra_bootfsm_go
10,742,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,944,273 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,953 UART: [kat] SHA2-256
881,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,999 UART: [kat] ++
886,151 UART: [kat] sha1
890,175 UART: [kat] SHA2-256
892,113 UART: [kat] SHA2-384
894,920 UART: [kat] SHA2-512-ACC
896,821 UART: [kat] ECC-384
902,192 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,476,191 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,480 UART: [idev] ++
1,479,648 UART: [idev] CDI.KEYID = 6
1,480,008 UART: [idev] SUBJECT.KEYID = 7
1,480,432 UART: [idev] UDS.KEYID = 0
1,480,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,092 UART: [idev] Erasing UDS.KEYID = 0
1,504,666 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,204 UART: [idev] --
1,514,265 UART: [ldev] ++
1,514,433 UART: [ldev] CDI.KEYID = 6
1,514,796 UART: [ldev] SUBJECT.KEYID = 5
1,515,222 UART: [ldev] AUTHORITY.KEYID = 7
1,515,685 UART: [ldev] FE.KEYID = 1
1,521,017 UART: [ldev] Erasing FE.KEYID = 1
1,546,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,708 UART: [ldev] --
1,586,115 UART: [fwproc] Waiting for Commands...
1,586,916 UART: [fwproc] Received command 0x46574c44
1,587,707 UART: [fwproc] Received Image of size 114448 bytes
1,853,907 UART: ROM Fatal Error: 0x000B0014
1,855,064 >>> mbox cmd response: failed
1,855,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,070 >>> mbox cmd response: failed
1,855,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,076 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,595 UART: [kat] SHA2-256
881,526 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,641 UART: [kat] ++
885,793 UART: [kat] sha1
890,165 UART: [kat] SHA2-256
892,103 UART: [kat] SHA2-384
894,808 UART: [kat] SHA2-512-ACC
896,709 UART: [kat] ECC-384
902,248 UART: [kat] HMAC-384Kdf
906,972 UART: [kat] LMS
1,475,168 UART: [kat] --
1,475,793 UART: [cold-reset] ++
1,476,369 UART: [fht] Storing FHT @ 0x50003400
1,479,346 UART: [idev] ++
1,479,514 UART: [idev] CDI.KEYID = 6
1,479,874 UART: [idev] SUBJECT.KEYID = 7
1,480,298 UART: [idev] UDS.KEYID = 0
1,480,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,312 UART: [idev] Erasing UDS.KEYID = 0
1,505,084 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,672 UART: [idev] --
1,514,761 UART: [ldev] ++
1,514,929 UART: [ldev] CDI.KEYID = 6
1,515,292 UART: [ldev] SUBJECT.KEYID = 5
1,515,718 UART: [ldev] AUTHORITY.KEYID = 7
1,516,181 UART: [ldev] FE.KEYID = 1
1,521,267 UART: [ldev] Erasing FE.KEYID = 1
1,546,222 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,402 UART: [ldev] --
1,585,861 UART: [fwproc] Waiting for Commands...
1,586,508 UART: [fwproc] Received command 0x46574c44
1,587,299 UART: [fwproc] Received Image of size 114448 bytes
2,885,951 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,659 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,972 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,277 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,709,595 >>> mbox cmd response: failed
1,709,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,601 >>> mbox cmd response: failed
1,709,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,607 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,427 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,344 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
87,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,730 UART: [kat] SHA2-256
882,661 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,776 UART: [kat] ++
886,928 UART: [kat] sha1
891,142 UART: [kat] SHA2-256
893,080 UART: [kat] SHA2-384
895,681 UART: [kat] SHA2-512-ACC
897,582 UART: [kat] ECC-384
903,279 UART: [kat] HMAC-384Kdf
908,059 UART: [kat] LMS
1,476,255 UART: [kat] --
1,477,328 UART: [cold-reset] ++
1,477,814 UART: [fht] Storing FHT @ 0x50003400
1,480,617 UART: [idev] ++
1,480,785 UART: [idev] CDI.KEYID = 6
1,481,145 UART: [idev] SUBJECT.KEYID = 7
1,481,569 UART: [idev] UDS.KEYID = 0
1,481,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,311 UART: [idev] Erasing UDS.KEYID = 0
1,506,757 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,425 UART: [idev] --
1,516,438 UART: [ldev] ++
1,516,606 UART: [ldev] CDI.KEYID = 6
1,516,969 UART: [ldev] SUBJECT.KEYID = 5
1,517,395 UART: [ldev] AUTHORITY.KEYID = 7
1,517,858 UART: [ldev] FE.KEYID = 1
1,523,186 UART: [ldev] Erasing FE.KEYID = 1
1,548,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,623 UART: [ldev] --
1,588,072 UART: [fwproc] Waiting for Commands...
1,588,757 UART: [fwproc] Received command 0x46574c44
1,589,548 UART: [fwproc] Received Image of size 114448 bytes
1,855,838 UART: ROM Fatal Error: 0x000B0014
1,856,995 >>> mbox cmd response: failed
1,856,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,001 >>> mbox cmd response: failed
1,857,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,566 UART: [kat] SHA2-256
882,497 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,612 UART: [kat] ++
886,764 UART: [kat] sha1
891,104 UART: [kat] SHA2-256
893,042 UART: [kat] SHA2-384
895,733 UART: [kat] SHA2-512-ACC
897,634 UART: [kat] ECC-384
903,467 UART: [kat] HMAC-384Kdf
908,107 UART: [kat] LMS
1,476,303 UART: [kat] --
1,477,078 UART: [cold-reset] ++
1,477,520 UART: [fht] Storing FHT @ 0x50003400
1,480,325 UART: [idev] ++
1,480,493 UART: [idev] CDI.KEYID = 6
1,480,853 UART: [idev] SUBJECT.KEYID = 7
1,481,277 UART: [idev] UDS.KEYID = 0
1,481,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,961 UART: [idev] Erasing UDS.KEYID = 0
1,505,083 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,765 UART: [idev] --
1,514,814 UART: [ldev] ++
1,514,982 UART: [ldev] CDI.KEYID = 6
1,515,345 UART: [ldev] SUBJECT.KEYID = 5
1,515,771 UART: [ldev] AUTHORITY.KEYID = 7
1,516,234 UART: [ldev] FE.KEYID = 1
1,521,614 UART: [ldev] Erasing FE.KEYID = 1
1,548,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,985 UART: [ldev] --
1,587,368 UART: [fwproc] Waiting for Commands...
1,588,131 UART: [fwproc] Received command 0x46574c44
1,588,922 UART: [fwproc] Received Image of size 114448 bytes
2,887,624 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,756 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,033 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,892 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,707,710 >>> mbox cmd response: failed
1,707,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,716 >>> mbox cmd response: failed
1,707,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,661 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
893,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,441 UART: [kat] ++
897,593 UART: [kat] sha1
901,859 UART: [kat] SHA2-256
903,799 UART: [kat] SHA2-384
906,674 UART: [kat] SHA2-512-ACC
908,575 UART: [kat] ECC-384
918,334 UART: [kat] HMAC-384Kdf
922,974 UART: [kat] LMS
1,171,302 UART: [kat] --
1,172,209 UART: [cold-reset] ++
1,172,735 UART: [fht] FHT @ 0x50003400
1,175,314 UART: [idev] ++
1,175,482 UART: [idev] CDI.KEYID = 6
1,175,842 UART: [idev] SUBJECT.KEYID = 7
1,176,266 UART: [idev] UDS.KEYID = 0
1,176,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,006 UART: [idev] Erasing UDS.KEYID = 0
1,200,931 UART: [idev] Sha1 KeyId Algorithm
1,209,469 UART: [idev] --
1,210,537 UART: [ldev] ++
1,210,705 UART: [ldev] CDI.KEYID = 6
1,211,068 UART: [ldev] SUBJECT.KEYID = 5
1,211,494 UART: [ldev] AUTHORITY.KEYID = 7
1,211,957 UART: [ldev] FE.KEYID = 1
1,216,903 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,705 UART: [ldev] --
1,282,980 UART: [fwproc] Wait for Commands...
1,283,622 UART: [fwproc] Recv command 0x46574c44
1,284,350 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,606 UART: ROM Fatal Error: 0x000B0014
1,550,763 >>> mbox cmd response: failed
1,550,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,769 >>> mbox cmd response: failed
1,550,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
893,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,435 UART: [kat] ++
897,587 UART: [kat] sha1
901,725 UART: [kat] SHA2-256
903,665 UART: [kat] SHA2-384
906,404 UART: [kat] SHA2-512-ACC
908,305 UART: [kat] ECC-384
917,756 UART: [kat] HMAC-384Kdf
922,372 UART: [kat] LMS
1,170,700 UART: [kat] --
1,171,733 UART: [cold-reset] ++
1,172,177 UART: [fht] FHT @ 0x50003400
1,174,870 UART: [idev] ++
1,175,038 UART: [idev] CDI.KEYID = 6
1,175,398 UART: [idev] SUBJECT.KEYID = 7
1,175,822 UART: [idev] UDS.KEYID = 0
1,176,167 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,406 UART: [idev] Erasing UDS.KEYID = 0
1,200,343 UART: [idev] Sha1 KeyId Algorithm
1,208,637 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,228 UART: [ldev] SUBJECT.KEYID = 5
1,210,654 UART: [ldev] AUTHORITY.KEYID = 7
1,211,117 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,700 UART: [fwproc] Wait for Commands...
1,282,326 UART: [fwproc] Recv command 0x46574c44
1,283,054 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,602 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,949 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,366 >>> mbox cmd response: failed
1,406,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,372 >>> mbox cmd response: failed
1,406,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,378 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,654 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
902,150 UART: [kat] SHA2-256
904,090 UART: [kat] SHA2-384
906,853 UART: [kat] SHA2-512-ACC
908,754 UART: [kat] ECC-384
918,939 UART: [kat] HMAC-384Kdf
923,533 UART: [kat] LMS
1,171,861 UART: [kat] --
1,172,858 UART: [cold-reset] ++
1,173,304 UART: [fht] FHT @ 0x50003400
1,176,049 UART: [idev] ++
1,176,217 UART: [idev] CDI.KEYID = 6
1,176,577 UART: [idev] SUBJECT.KEYID = 7
1,177,001 UART: [idev] UDS.KEYID = 0
1,177,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,205 UART: [idev] Erasing UDS.KEYID = 0
1,202,708 UART: [idev] Sha1 KeyId Algorithm
1,211,036 UART: [idev] --
1,212,014 UART: [ldev] ++
1,212,182 UART: [ldev] CDI.KEYID = 6
1,212,545 UART: [ldev] SUBJECT.KEYID = 5
1,212,971 UART: [ldev] AUTHORITY.KEYID = 7
1,213,434 UART: [ldev] FE.KEYID = 1
1,218,328 UART: [ldev] Erasing FE.KEYID = 1
1,244,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,954 UART: [ldev] --
1,284,433 UART: [fwproc] Wait for Commands...
1,285,189 UART: [fwproc] Recv command 0x46574c44
1,285,917 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,889 UART: ROM Fatal Error: 0x000B0014
1,552,046 >>> mbox cmd response: failed
1,552,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,052 >>> mbox cmd response: failed
1,552,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
893,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,732 UART: [kat] ++
897,884 UART: [kat] sha1
902,218 UART: [kat] SHA2-256
904,158 UART: [kat] SHA2-384
906,927 UART: [kat] SHA2-512-ACC
908,828 UART: [kat] ECC-384
918,383 UART: [kat] HMAC-384Kdf
923,083 UART: [kat] LMS
1,171,411 UART: [kat] --
1,172,534 UART: [cold-reset] ++
1,172,956 UART: [fht] FHT @ 0x50003400
1,175,777 UART: [idev] ++
1,175,945 UART: [idev] CDI.KEYID = 6
1,176,305 UART: [idev] SUBJECT.KEYID = 7
1,176,729 UART: [idev] UDS.KEYID = 0
1,177,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,751 UART: [idev] Erasing UDS.KEYID = 0
1,202,334 UART: [idev] Sha1 KeyId Algorithm
1,210,868 UART: [idev] --
1,212,006 UART: [ldev] ++
1,212,174 UART: [ldev] CDI.KEYID = 6
1,212,537 UART: [ldev] SUBJECT.KEYID = 5
1,212,963 UART: [ldev] AUTHORITY.KEYID = 7
1,213,426 UART: [ldev] FE.KEYID = 1
1,218,518 UART: [ldev] Erasing FE.KEYID = 1
1,245,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,322 UART: [ldev] --
1,284,713 UART: [fwproc] Wait for Commands...
1,285,505 UART: [fwproc] Recv command 0x46574c44
1,286,233 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,474 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,785 >>> mbox cmd response: failed
1,406,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,791 >>> mbox cmd response: failed
1,406,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,797 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,571 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,864 UART: [kat] SHA2-512-ACC
906,765 UART: [kat] ECC-384
916,520 UART: [kat] HMAC-384Kdf
921,142 UART: [kat] LMS
1,169,454 UART: [kat] --
1,170,289 UART: [cold-reset] ++
1,170,867 UART: [fht] FHT @ 0x50003400
1,173,469 UART: [idev] ++
1,173,637 UART: [idev] CDI.KEYID = 6
1,173,998 UART: [idev] SUBJECT.KEYID = 7
1,174,423 UART: [idev] UDS.KEYID = 0
1,174,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,337 UART: [idev] Erasing UDS.KEYID = 0
1,198,733 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,336 UART: [ldev] Erasing FE.KEYID = 1
1,241,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,240 UART: [ldev] --
1,280,660 UART: [fwproc] Wait for Commands...
1,281,439 UART: [fwproc] Recv command 0x46574c44
1,282,172 UART: [fwproc] Recv'd Img size: 114448 bytes
1,546,955 UART: ROM Fatal Error: 0x000B0014
1,548,112 >>> mbox cmd response: failed
1,548,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,118 >>> mbox cmd response: failed
1,548,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
86,093 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,700 UART: [kat] HMAC-384Kdf
920,126 UART: [kat] LMS
1,168,438 UART: [kat] --
1,169,287 UART: [cold-reset] ++
1,169,613 UART: [fht] FHT @ 0x50003400
1,172,191 UART: [idev] ++
1,172,359 UART: [idev] CDI.KEYID = 6
1,172,720 UART: [idev] SUBJECT.KEYID = 7
1,173,145 UART: [idev] UDS.KEYID = 0
1,173,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,663 UART: [idev] Erasing UDS.KEYID = 0
1,197,609 UART: [idev] Sha1 KeyId Algorithm
1,206,357 UART: [idev] --
1,207,580 UART: [ldev] ++
1,207,748 UART: [ldev] CDI.KEYID = 6
1,208,112 UART: [ldev] SUBJECT.KEYID = 5
1,208,539 UART: [ldev] AUTHORITY.KEYID = 7
1,209,002 UART: [ldev] FE.KEYID = 1
1,214,198 UART: [ldev] Erasing FE.KEYID = 1
1,240,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,952 UART: [ldev] --
1,280,318 UART: [fwproc] Wait for Commands...
1,281,127 UART: [fwproc] Recv command 0x46574c44
1,281,860 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,932 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,241 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,181 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,399,641 >>> mbox cmd response: failed
1,399,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,399,647 >>> mbox cmd response: failed
1,399,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,399,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,886 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,911 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
900,084 UART: [kat] SHA2-256
902,024 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,255 UART: [kat] HMAC-384Kdf
920,665 UART: [kat] LMS
1,168,977 UART: [kat] --
1,170,172 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,278 UART: [idev] Erasing UDS.KEYID = 0
1,199,308 UART: [idev] Sha1 KeyId Algorithm
1,208,048 UART: [idev] --
1,209,183 UART: [ldev] ++
1,209,351 UART: [ldev] CDI.KEYID = 6
1,209,715 UART: [ldev] SUBJECT.KEYID = 5
1,210,142 UART: [ldev] AUTHORITY.KEYID = 7
1,210,605 UART: [ldev] FE.KEYID = 1
1,215,881 UART: [ldev] Erasing FE.KEYID = 1
1,242,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,251 UART: [ldev] --
1,281,531 UART: [fwproc] Wait for Commands...
1,282,126 UART: [fwproc] Recv command 0x46574c44
1,282,859 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,376 UART: ROM Fatal Error: 0x000B0014
1,550,533 >>> mbox cmd response: failed
1,550,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,539 >>> mbox cmd response: failed
1,550,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,712 UART: [kat] ++
895,864 UART: [kat] sha1
900,000 UART: [kat] SHA2-256
901,940 UART: [kat] SHA2-384
904,837 UART: [kat] SHA2-512-ACC
906,738 UART: [kat] ECC-384
916,711 UART: [kat] HMAC-384Kdf
921,475 UART: [kat] LMS
1,169,787 UART: [kat] --
1,170,842 UART: [cold-reset] ++
1,171,302 UART: [fht] FHT @ 0x50003400
1,174,160 UART: [idev] ++
1,174,328 UART: [idev] CDI.KEYID = 6
1,174,689 UART: [idev] SUBJECT.KEYID = 7
1,175,114 UART: [idev] UDS.KEYID = 0
1,175,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,980 UART: [idev] Sha1 KeyId Algorithm
1,209,020 UART: [idev] --
1,210,003 UART: [ldev] ++
1,210,171 UART: [ldev] CDI.KEYID = 6
1,210,535 UART: [ldev] SUBJECT.KEYID = 5
1,210,962 UART: [ldev] AUTHORITY.KEYID = 7
1,211,425 UART: [ldev] FE.KEYID = 1
1,216,617 UART: [ldev] Erasing FE.KEYID = 1
1,243,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,399 UART: [ldev] --
1,282,707 UART: [fwproc] Wait for Commands...
1,283,490 UART: [fwproc] Recv command 0x46574c44
1,284,223 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,424 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,908 >>> mbox cmd response: failed
1,402,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,914 >>> mbox cmd response: failed
1,402,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,695 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,676 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,907 writing to cptra_bootfsm_go
193,077 UART:
193,432 UART: Running Caliptra ROM ...
194,615 UART:
194,765 UART: [state] CFI Enabled
260,689 UART: [state] LifecycleState = Unprovisioned
262,602 UART: [state] DebugLocked = No
265,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,210 UART: [kat] SHA2-256
439,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,418 UART: [kat] ++
450,868 UART: [kat] sha1
461,310 UART: [kat] SHA2-256
463,996 UART: [kat] SHA2-384
469,565 UART: [kat] SHA2-512-ACC
471,958 UART: [kat] ECC-384
2,766,281 UART: [kat] HMAC-384Kdf
2,776,444 UART: [kat] LMS
3,966,759 UART: [kat] --
3,969,918 UART: [cold-reset] ++
3,971,263 UART: [fht] Storing FHT @ 0x50003400
3,982,537 UART: [idev] ++
3,983,166 UART: [idev] CDI.KEYID = 6
3,984,083 UART: [idev] SUBJECT.KEYID = 7
3,985,302 UART: [idev] UDS.KEYID = 0
3,987,943 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,131,756 UART: [idev] Erasing UDS.KEYID = 0
7,326,005 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,855 UART: [idev] --
7,354,416 UART: [ldev] ++
7,355,011 UART: [ldev] CDI.KEYID = 6
7,355,902 UART: [ldev] SUBJECT.KEYID = 5
7,357,170 UART: [ldev] AUTHORITY.KEYID = 7
7,358,401 UART: [ldev] FE.KEYID = 1
7,399,362 UART: [ldev] Erasing FE.KEYID = 1
10,731,184 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,668 UART: [ldev] --
13,111,228 UART: [fwproc] Waiting for Commands...
13,114,139 UART: [fwproc] Received command 0x46574c44
13,116,328 UART: [fwproc] Received Image of size 114124 bytes
16,059,448 UART: ROM Fatal Error: 0x000B0023
16,062,901 >>> mbox cmd response: failed
16,063,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,063,665 >>> mbox cmd response: failed
16,063,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,064,228 >>> mbox cmd response: failed
Initializing fuses
2,059,168 writing to cptra_bootfsm_go
2,248,446 UART:
2,248,789 UART: Running Caliptra ROM ...
2,249,837 UART:
2,249,989 UART: [state] CFI Enabled
2,307,858 UART: [state] LifecycleState = Unprovisioned
2,309,805 UART: [state] DebugLocked = No
2,311,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,101 UART: [kat] SHA2-256
2,484,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,282 UART: [kat] ++
2,495,744 UART: [kat] sha1
2,506,260 UART: [kat] SHA2-256
2,508,998 UART: [kat] SHA2-384
2,514,625 UART: [kat] SHA2-512-ACC
2,516,983 UART: [kat] ECC-384
4,809,159 UART: [kat] HMAC-384Kdf
4,820,995 UART: [kat] LMS
6,011,370 UART: [kat] --
6,017,245 UART: [cold-reset] ++
6,019,425 UART: [fht] Storing FHT @ 0x50003400
6,031,565 UART: [idev] ++
6,032,143 UART: [idev] CDI.KEYID = 6
6,033,056 UART: [idev] SUBJECT.KEYID = 7
6,034,332 UART: [idev] UDS.KEYID = 0
6,036,737 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,180,372 UART: [idev] Erasing UDS.KEYID = 0
9,369,098 UART: [idev] Using Sha1 for KeyId Algorithm
9,392,155 UART: [idev] --
9,395,799 UART: [ldev] ++
9,396,375 UART: [ldev] CDI.KEYID = 6
9,397,257 UART: [ldev] SUBJECT.KEYID = 5
9,398,588 UART: [ldev] AUTHORITY.KEYID = 7
9,399,692 UART: [ldev] FE.KEYID = 1
9,444,286 UART: [ldev] Erasing FE.KEYID = 1
12,775,883 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,070,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,084,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,099,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,114,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,133,017 UART: [ldev] --
15,138,089 UART: [fwproc] Waiting for Commands...
15,141,366 UART: [fwproc] Received command 0x46574c44
15,143,564 UART: [fwproc] Received Image of size 114124 bytes
19,191,738 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,265,601 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,334,468 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,652,087 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,790,212 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,834,355 >>> mbox cmd response: failed
15,834,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,835,301 >>> mbox cmd response: failed
15,835,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,835,814 >>> mbox cmd response: failed
Initializing fuses
2,058,916 writing to cptra_bootfsm_go
5,858,097 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,933,377 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,596 UART:
192,941 UART: Running Caliptra ROM ...
194,081 UART:
603,999 UART: [state] CFI Enabled
618,139 UART: [state] LifecycleState = Unprovisioned
620,063 UART: [state] DebugLocked = No
621,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,011 UART: [kat] SHA2-256
795,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,306 UART: [kat] ++
806,752 UART: [kat] sha1
816,927 UART: [kat] SHA2-256
819,615 UART: [kat] SHA2-384
824,024 UART: [kat] SHA2-512-ACC
826,439 UART: [kat] ECC-384
3,109,153 UART: [kat] HMAC-384Kdf
3,121,345 UART: [kat] LMS
4,311,441 UART: [kat] --
4,314,766 UART: [cold-reset] ++
4,317,031 UART: [fht] Storing FHT @ 0x50003400
4,329,115 UART: [idev] ++
4,329,779 UART: [idev] CDI.KEYID = 6
4,330,680 UART: [idev] SUBJECT.KEYID = 7
4,331,844 UART: [idev] UDS.KEYID = 0
4,334,436 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,076 UART: [idev] Erasing UDS.KEYID = 0
7,621,592 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,358 UART: [idev] --
7,645,810 UART: [ldev] ++
7,646,387 UART: [ldev] CDI.KEYID = 6
7,647,374 UART: [ldev] SUBJECT.KEYID = 5
7,648,592 UART: [ldev] AUTHORITY.KEYID = 7
7,649,825 UART: [ldev] FE.KEYID = 1
7,661,851 UART: [ldev] Erasing FE.KEYID = 1
10,947,781 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,474 UART: [ldev] --
13,306,599 UART: [fwproc] Waiting for Commands...
13,309,613 UART: [fwproc] Received command 0x46574c44
13,311,800 UART: [fwproc] Received Image of size 114124 bytes
16,256,079 UART: ROM Fatal Error: 0x000B0023
16,259,539 >>> mbox cmd response: failed
16,259,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,260,313 >>> mbox cmd response: failed
16,260,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,260,881 >>> mbox cmd response: failed
Initializing fuses
2,056,850 writing to cptra_bootfsm_go
2,246,156 UART:
2,246,515 UART: Running Caliptra ROM ...
2,247,653 UART:
4,192,755 UART: [state] CFI Enabled
4,206,031 UART: [state] LifecycleState = Unprovisioned
4,207,950 UART: [state] DebugLocked = No
4,209,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,215,163 UART: [kat] SHA2-256
4,384,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,395,455 UART: [kat] ++
4,396,002 UART: [kat] sha1
4,407,065 UART: [kat] SHA2-256
4,409,761 UART: [kat] SHA2-384
4,415,638 UART: [kat] SHA2-512-ACC
4,417,967 UART: [kat] ECC-384
6,701,341 UART: [kat] HMAC-384Kdf
6,712,500 UART: [kat] LMS
7,902,601 UART: [kat] --
7,907,307 UART: [cold-reset] ++
7,909,567 UART: [fht] Storing FHT @ 0x50003400
7,922,510 UART: [idev] ++
7,923,086 UART: [idev] CDI.KEYID = 6
7,924,006 UART: [idev] SUBJECT.KEYID = 7
7,925,226 UART: [idev] UDS.KEYID = 0
7,927,483 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,070,922 UART: [idev] Erasing UDS.KEYID = 0
11,213,845 UART: [idev] Using Sha1 for KeyId Algorithm
11,235,989 UART: [idev] --
11,239,526 UART: [ldev] ++
11,240,103 UART: [ldev] CDI.KEYID = 6
11,241,041 UART: [ldev] SUBJECT.KEYID = 5
11,242,302 UART: [ldev] AUTHORITY.KEYID = 7
11,243,459 UART: [ldev] FE.KEYID = 1
11,252,887 UART: [ldev] Erasing FE.KEYID = 1
14,539,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,829,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,844,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,859,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,873,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,893,488 UART: [ldev] --
16,898,986 UART: [fwproc] Waiting for Commands...
16,901,011 UART: [fwproc] Received command 0x46574c44
16,903,222 UART: [fwproc] Received Image of size 114124 bytes
20,952,026 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,028,097 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,096,967 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,414,099 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
4,130,877 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,037,777 >>> mbox cmd response: failed
16,038,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,038,686 >>> mbox cmd response: failed
16,039,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,039,311 >>> mbox cmd response: failed
Initializing fuses
2,056,369 writing to cptra_bootfsm_go
7,956,267 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,899,246 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,200 UART:
192,551 UART: Running Caliptra ROM ...
193,671 UART:
193,816 UART: [state] CFI Enabled
259,673 UART: [state] LifecycleState = Unprovisioned
261,556 UART: [state] DebugLocked = No
264,239 UART: [state] WD Timer not started. Device not locked for debugging
268,605 UART: [kat] SHA2-256
447,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,311 UART: [kat] ++
459,842 UART: [kat] sha1
471,107 UART: [kat] SHA2-256
474,156 UART: [kat] SHA2-384
480,842 UART: [kat] SHA2-512-ACC
483,772 UART: [kat] ECC-384
2,946,449 UART: [kat] HMAC-384Kdf
2,968,460 UART: [kat] LMS
3,497,932 UART: [kat] --
3,501,936 UART: [cold-reset] ++
3,504,410 UART: [fht] FHT @ 0x50003400
3,516,475 UART: [idev] ++
3,517,097 UART: [idev] CDI.KEYID = 6
3,517,990 UART: [idev] SUBJECT.KEYID = 7
3,519,154 UART: [idev] UDS.KEYID = 0
3,521,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,888 UART: [idev] Erasing UDS.KEYID = 0
6,018,575 UART: [idev] Sha1 KeyId Algorithm
6,042,026 UART: [idev] --
6,045,262 UART: [ldev] ++
6,045,832 UART: [ldev] CDI.KEYID = 6
6,046,746 UART: [ldev] SUBJECT.KEYID = 5
6,047,910 UART: [ldev] AUTHORITY.KEYID = 7
6,049,199 UART: [ldev] FE.KEYID = 1
6,077,140 UART: [ldev] Erasing FE.KEYID = 1
8,579,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,955 UART: [ldev] --
10,390,188 UART: [fwproc] Wait for Commands...
10,392,136 UART: [fwproc] Recv command 0x46574c44
10,394,234 UART: [fwproc] Recv'd Img size: 114448 bytes
12,682,201 UART: ROM Fatal Error: 0x000B0023
12,685,322 >>> mbox cmd response: failed
12,685,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,686,058 >>> mbox cmd response: failed
12,686,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,686,619 >>> mbox cmd response: failed
Initializing fuses
2,053,603 writing to cptra_bootfsm_go
2,243,007 UART:
2,243,363 UART: Running Caliptra ROM ...
2,244,506 UART:
2,244,674 UART: [state] CFI Enabled
2,312,292 UART: [state] LifecycleState = Unprovisioned
2,314,170 UART: [state] DebugLocked = No
2,316,479 UART: [state] WD Timer not started. Device not locked for debugging
2,319,531 UART: [kat] SHA2-256
2,498,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,216 UART: [kat] ++
2,510,763 UART: [kat] sha1
2,521,607 UART: [kat] SHA2-256
2,524,678 UART: [kat] SHA2-384
2,529,639 UART: [kat] SHA2-512-ACC
2,532,589 UART: [kat] ECC-384
4,977,808 UART: [kat] HMAC-384Kdf
5,000,665 UART: [kat] LMS
5,530,108 UART: [kat] --
5,534,804 UART: [cold-reset] ++
5,536,466 UART: [fht] FHT @ 0x50003400
5,547,632 UART: [idev] ++
5,548,258 UART: [idev] CDI.KEYID = 6
5,549,179 UART: [idev] SUBJECT.KEYID = 7
5,550,344 UART: [idev] UDS.KEYID = 0
5,552,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,696,504 UART: [idev] Erasing UDS.KEYID = 0
8,054,220 UART: [idev] Sha1 KeyId Algorithm
8,077,896 UART: [idev] --
8,081,679 UART: [ldev] ++
8,082,247 UART: [ldev] CDI.KEYID = 6
8,083,160 UART: [ldev] SUBJECT.KEYID = 5
8,084,327 UART: [ldev] AUTHORITY.KEYID = 7
8,085,645 UART: [ldev] FE.KEYID = 1
8,129,612 UART: [ldev] Erasing FE.KEYID = 1
10,630,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,349,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,365,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,381,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,397,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,417,614 UART: [ldev] --
12,421,531 UART: [fwproc] Wait for Commands...
12,423,559 UART: [fwproc] Recv command 0x46574c44
12,425,604 UART: [fwproc] Recv'd Img size: 114448 bytes
15,830,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,911,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,980,374 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,299,174 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,382,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,506,270 >>> mbox cmd response: failed
12,507,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,559 >>> mbox cmd response: failed
12,507,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,148 >>> mbox cmd response: failed
Initializing fuses
2,054,344 writing to cptra_bootfsm_go
5,429,868 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,127,525 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
192,473 UART:
192,839 UART: Running Caliptra ROM ...
193,965 UART:
603,582 UART: [state] CFI Enabled
615,678 UART: [state] LifecycleState = Unprovisioned
617,513 UART: [state] DebugLocked = No
619,076 UART: [state] WD Timer not started. Device not locked for debugging
623,543 UART: [kat] SHA2-256
802,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,239 UART: [kat] ++
814,705 UART: [kat] sha1
826,226 UART: [kat] SHA2-256
829,233 UART: [kat] SHA2-384
834,288 UART: [kat] SHA2-512-ACC
837,266 UART: [kat] ECC-384
3,277,332 UART: [kat] HMAC-384Kdf
3,288,917 UART: [kat] LMS
3,818,394 UART: [kat] --
3,823,164 UART: [cold-reset] ++
3,824,544 UART: [fht] FHT @ 0x50003400
3,836,343 UART: [idev] ++
3,836,947 UART: [idev] CDI.KEYID = 6
3,837,835 UART: [idev] SUBJECT.KEYID = 7
3,839,049 UART: [idev] UDS.KEYID = 0
3,841,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,541 UART: [idev] Erasing UDS.KEYID = 0
6,311,152 UART: [idev] Sha1 KeyId Algorithm
6,333,511 UART: [idev] --
6,337,320 UART: [ldev] ++
6,337,901 UART: [ldev] CDI.KEYID = 6
6,338,812 UART: [ldev] SUBJECT.KEYID = 5
6,339,972 UART: [ldev] AUTHORITY.KEYID = 7
6,341,208 UART: [ldev] FE.KEYID = 1
6,353,146 UART: [ldev] Erasing FE.KEYID = 1
8,825,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,378 UART: [ldev] --
10,614,883 UART: [fwproc] Wait for Commands...
10,617,355 UART: [fwproc] Recv command 0x46574c44
10,619,469 UART: [fwproc] Recv'd Img size: 114448 bytes
12,907,106 UART: ROM Fatal Error: 0x000B0023
12,910,233 >>> mbox cmd response: failed
12,910,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,910,905 >>> mbox cmd response: failed
12,911,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,911,456 >>> mbox cmd response: failed
Initializing fuses
2,053,753 writing to cptra_bootfsm_go
2,243,062 UART:
2,243,405 UART: Running Caliptra ROM ...
2,244,544 UART:
7,547,002 UART: [state] CFI Enabled
7,558,993 UART: [state] LifecycleState = Unprovisioned
7,560,884 UART: [state] DebugLocked = No
7,562,708 UART: [state] WD Timer not started. Device not locked for debugging
7,566,903 UART: [kat] SHA2-256
7,746,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,757,580 UART: [kat] ++
7,758,125 UART: [kat] sha1
7,769,402 UART: [kat] SHA2-256
7,772,424 UART: [kat] SHA2-384
7,778,462 UART: [kat] SHA2-512-ACC
7,781,406 UART: [kat] ECC-384
10,222,571 UART: [kat] HMAC-384Kdf
10,235,394 UART: [kat] LMS
10,764,885 UART: [kat] --
10,770,177 UART: [cold-reset] ++
10,772,376 UART: [fht] FHT @ 0x50003400
10,784,163 UART: [idev] ++
10,784,743 UART: [idev] CDI.KEYID = 6
10,785,651 UART: [idev] SUBJECT.KEYID = 7
10,786,863 UART: [idev] UDS.KEYID = 0
10,789,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,933,102 UART: [idev] Erasing UDS.KEYID = 0
13,258,392 UART: [idev] Sha1 KeyId Algorithm
13,281,940 UART: [idev] --
13,286,311 UART: [ldev] ++
13,286,877 UART: [ldev] CDI.KEYID = 6
13,287,813 UART: [ldev] SUBJECT.KEYID = 5
13,289,018 UART: [ldev] AUTHORITY.KEYID = 7
13,290,250 UART: [ldev] FE.KEYID = 1
13,301,790 UART: [ldev] Erasing FE.KEYID = 1
15,772,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,490,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,506,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,521,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,537,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,556,993 UART: [ldev] --
17,561,174 UART: [fwproc] Wait for Commands...
17,564,243 UART: [fwproc] Recv command 0x46574c44
17,566,365 UART: [fwproc] Recv'd Img size: 114448 bytes
20,966,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,038,153 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,106,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,425,914 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,701,814 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,708,444 >>> mbox cmd response: failed
12,709,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,709,307 >>> mbox cmd response: failed
12,709,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,709,870 >>> mbox cmd response: failed
Initializing fuses
2,058,940 writing to cptra_bootfsm_go
10,848,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,427,161 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,440,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,652,348 >>> mbox cmd response: failed
12,652,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,653,272 >>> mbox cmd response: failed
12,653,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,653,838 >>> mbox cmd response: failed
Initializing fuses
2,055,727 writing to cptra_bootfsm_go
5,484,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,797,454 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,759,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,875,651 >>> mbox cmd response: failed
12,876,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,876,550 >>> mbox cmd response: failed
12,876,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,877,111 >>> mbox cmd response: failed
Initializing fuses
2,061,689 writing to cptra_bootfsm_go
10,741,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,945,101 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,929 UART: [kat] SHA2-256
881,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,975 UART: [kat] ++
886,127 UART: [kat] sha1
890,509 UART: [kat] SHA2-256
892,447 UART: [kat] SHA2-384
895,256 UART: [kat] SHA2-512-ACC
897,157 UART: [kat] ECC-384
902,966 UART: [kat] HMAC-384Kdf
907,374 UART: [kat] LMS
1,475,570 UART: [kat] --
1,476,635 UART: [cold-reset] ++
1,477,105 UART: [fht] Storing FHT @ 0x50003400
1,479,776 UART: [idev] ++
1,479,944 UART: [idev] CDI.KEYID = 6
1,480,304 UART: [idev] SUBJECT.KEYID = 7
1,480,728 UART: [idev] UDS.KEYID = 0
1,481,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,442 UART: [idev] Erasing UDS.KEYID = 0
1,505,252 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,858 UART: [idev] --
1,515,027 UART: [ldev] ++
1,515,195 UART: [ldev] CDI.KEYID = 6
1,515,558 UART: [ldev] SUBJECT.KEYID = 5
1,515,984 UART: [ldev] AUTHORITY.KEYID = 7
1,516,447 UART: [ldev] FE.KEYID = 1
1,521,665 UART: [ldev] Erasing FE.KEYID = 1
1,547,046 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,794 UART: [ldev] --
1,586,123 UART: [fwproc] Waiting for Commands...
1,586,752 UART: [fwproc] Received command 0x46574c44
1,587,543 UART: [fwproc] Received Image of size 114448 bytes
1,854,042 UART: ROM Fatal Error: 0x000B0023
1,855,199 >>> mbox cmd response: failed
1,855,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,205 >>> mbox cmd response: failed
1,855,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,568 UART: [state] LifecycleState = Unprovisioned
86,223 UART: [state] DebugLocked = No
86,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,501 UART: [kat] SHA2-256
882,432 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,547 UART: [kat] ++
886,699 UART: [kat] sha1
890,919 UART: [kat] SHA2-256
892,857 UART: [kat] SHA2-384
895,708 UART: [kat] SHA2-512-ACC
897,609 UART: [kat] ECC-384
903,088 UART: [kat] HMAC-384Kdf
907,606 UART: [kat] LMS
1,475,802 UART: [kat] --
1,476,779 UART: [cold-reset] ++
1,477,301 UART: [fht] Storing FHT @ 0x50003400
1,480,136 UART: [idev] ++
1,480,304 UART: [idev] CDI.KEYID = 6
1,480,664 UART: [idev] SUBJECT.KEYID = 7
1,481,088 UART: [idev] UDS.KEYID = 0
1,481,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,268 UART: [idev] Erasing UDS.KEYID = 0
1,505,866 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,346 UART: [idev] --
1,515,467 UART: [ldev] ++
1,515,635 UART: [ldev] CDI.KEYID = 6
1,515,998 UART: [ldev] SUBJECT.KEYID = 5
1,516,424 UART: [ldev] AUTHORITY.KEYID = 7
1,516,887 UART: [ldev] FE.KEYID = 1
1,522,077 UART: [ldev] Erasing FE.KEYID = 1
1,547,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,610 UART: [ldev] --
1,585,945 UART: [fwproc] Waiting for Commands...
1,586,774 UART: [fwproc] Received command 0x46574c44
1,587,565 UART: [fwproc] Received Image of size 114448 bytes
2,887,434 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,304 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,339 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,706,520 >>> mbox cmd response: failed
1,706,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,526 >>> mbox cmd response: failed
1,706,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,890 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,568 UART: [kat] SHA2-256
882,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,614 UART: [kat] ++
886,766 UART: [kat] sha1
890,988 UART: [kat] SHA2-256
892,926 UART: [kat] SHA2-384
895,573 UART: [kat] SHA2-512-ACC
897,474 UART: [kat] ECC-384
902,841 UART: [kat] HMAC-384Kdf
907,565 UART: [kat] LMS
1,475,761 UART: [kat] --
1,476,728 UART: [cold-reset] ++
1,477,260 UART: [fht] Storing FHT @ 0x50003400
1,480,237 UART: [idev] ++
1,480,405 UART: [idev] CDI.KEYID = 6
1,480,765 UART: [idev] SUBJECT.KEYID = 7
1,481,189 UART: [idev] UDS.KEYID = 0
1,481,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,495 UART: [idev] Erasing UDS.KEYID = 0
1,506,281 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,007 UART: [idev] --
1,515,940 UART: [ldev] ++
1,516,108 UART: [ldev] CDI.KEYID = 6
1,516,471 UART: [ldev] SUBJECT.KEYID = 5
1,516,897 UART: [ldev] AUTHORITY.KEYID = 7
1,517,360 UART: [ldev] FE.KEYID = 1
1,522,942 UART: [ldev] Erasing FE.KEYID = 1
1,548,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,699 UART: [ldev] --
1,586,972 UART: [fwproc] Waiting for Commands...
1,587,611 UART: [fwproc] Received command 0x46574c44
1,588,402 UART: [fwproc] Received Image of size 114448 bytes
1,855,653 UART: ROM Fatal Error: 0x000B0023
1,856,810 >>> mbox cmd response: failed
1,856,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,816 >>> mbox cmd response: failed
1,856,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,726 UART: [kat] SHA2-256
892,664 UART: [kat] SHA2-384
895,575 UART: [kat] SHA2-512-ACC
897,476 UART: [kat] ECC-384
902,991 UART: [kat] HMAC-384Kdf
907,613 UART: [kat] LMS
1,475,809 UART: [kat] --
1,476,642 UART: [cold-reset] ++
1,477,060 UART: [fht] Storing FHT @ 0x50003400
1,479,905 UART: [idev] ++
1,480,073 UART: [idev] CDI.KEYID = 6
1,480,433 UART: [idev] SUBJECT.KEYID = 7
1,480,857 UART: [idev] UDS.KEYID = 0
1,481,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,807 UART: [idev] Erasing UDS.KEYID = 0
1,506,529 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,323 UART: [idev] --
1,516,434 UART: [ldev] ++
1,516,602 UART: [ldev] CDI.KEYID = 6
1,516,965 UART: [ldev] SUBJECT.KEYID = 5
1,517,391 UART: [ldev] AUTHORITY.KEYID = 7
1,517,854 UART: [ldev] FE.KEYID = 1
1,522,964 UART: [ldev] Erasing FE.KEYID = 1
1,548,495 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,089 UART: [ldev] --
1,587,582 UART: [fwproc] Waiting for Commands...
1,588,283 UART: [fwproc] Received command 0x46574c44
1,589,074 UART: [fwproc] Received Image of size 114448 bytes
2,887,592 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,704 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,056 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,135 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,708,141 >>> mbox cmd response: failed
1,708,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,147 >>> mbox cmd response: failed
1,708,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,046 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,299 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
893,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,527 UART: [kat] ++
897,679 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,342 UART: [kat] SHA2-512-ACC
908,243 UART: [kat] ECC-384
918,166 UART: [kat] HMAC-384Kdf
922,884 UART: [kat] LMS
1,171,212 UART: [kat] --
1,171,913 UART: [cold-reset] ++
1,172,351 UART: [fht] FHT @ 0x50003400
1,175,018 UART: [idev] ++
1,175,186 UART: [idev] CDI.KEYID = 6
1,175,546 UART: [idev] SUBJECT.KEYID = 7
1,175,970 UART: [idev] UDS.KEYID = 0
1,176,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,924 UART: [idev] Erasing UDS.KEYID = 0
1,200,887 UART: [idev] Sha1 KeyId Algorithm
1,209,317 UART: [idev] --
1,210,323 UART: [ldev] ++
1,210,491 UART: [ldev] CDI.KEYID = 6
1,210,854 UART: [ldev] SUBJECT.KEYID = 5
1,211,280 UART: [ldev] AUTHORITY.KEYID = 7
1,211,743 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,242,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,451 UART: [ldev] --
1,281,820 UART: [fwproc] Wait for Commands...
1,282,452 UART: [fwproc] Recv command 0x46574c44
1,283,180 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,773 UART: ROM Fatal Error: 0x000B0023
1,550,930 >>> mbox cmd response: failed
1,550,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,936 >>> mbox cmd response: failed
1,550,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
893,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,509 UART: [kat] ++
897,661 UART: [kat] sha1
901,793 UART: [kat] SHA2-256
903,733 UART: [kat] SHA2-384
906,496 UART: [kat] SHA2-512-ACC
908,397 UART: [kat] ECC-384
918,074 UART: [kat] HMAC-384Kdf
922,586 UART: [kat] LMS
1,170,914 UART: [kat] --
1,171,863 UART: [cold-reset] ++
1,172,359 UART: [fht] FHT @ 0x50003400
1,175,034 UART: [idev] ++
1,175,202 UART: [idev] CDI.KEYID = 6
1,175,562 UART: [idev] SUBJECT.KEYID = 7
1,175,986 UART: [idev] UDS.KEYID = 0
1,176,331 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,870 UART: [idev] Erasing UDS.KEYID = 0
1,200,231 UART: [idev] Sha1 KeyId Algorithm
1,208,929 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,572 UART: [ldev] SUBJECT.KEYID = 5
1,210,998 UART: [ldev] AUTHORITY.KEYID = 7
1,211,461 UART: [ldev] FE.KEYID = 1
1,216,611 UART: [ldev] Erasing FE.KEYID = 1
1,243,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,627 UART: [ldev] --
1,283,018 UART: [fwproc] Wait for Commands...
1,283,788 UART: [fwproc] Recv command 0x46574c44
1,284,516 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,038 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,067 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,917 >>> mbox cmd response: failed
1,406,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,923 >>> mbox cmd response: failed
1,406,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,404 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
901,974 UART: [kat] SHA2-256
903,914 UART: [kat] SHA2-384
906,591 UART: [kat] SHA2-512-ACC
908,492 UART: [kat] ECC-384
918,069 UART: [kat] HMAC-384Kdf
922,561 UART: [kat] LMS
1,170,889 UART: [kat] --
1,171,642 UART: [cold-reset] ++
1,172,188 UART: [fht] FHT @ 0x50003400
1,174,833 UART: [idev] ++
1,175,001 UART: [idev] CDI.KEYID = 6
1,175,361 UART: [idev] SUBJECT.KEYID = 7
1,175,785 UART: [idev] UDS.KEYID = 0
1,176,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,025 UART: [idev] Erasing UDS.KEYID = 0
1,201,238 UART: [idev] Sha1 KeyId Algorithm
1,209,820 UART: [idev] --
1,210,780 UART: [ldev] ++
1,210,948 UART: [ldev] CDI.KEYID = 6
1,211,311 UART: [ldev] SUBJECT.KEYID = 5
1,211,737 UART: [ldev] AUTHORITY.KEYID = 7
1,212,200 UART: [ldev] FE.KEYID = 1
1,217,454 UART: [ldev] Erasing FE.KEYID = 1
1,242,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,512 UART: [ldev] --
1,281,891 UART: [fwproc] Wait for Commands...
1,282,711 UART: [fwproc] Recv command 0x46574c44
1,283,439 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,568 UART: ROM Fatal Error: 0x000B0023
1,550,725 >>> mbox cmd response: failed
1,550,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,731 >>> mbox cmd response: failed
1,550,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,030 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
893,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,006 UART: [kat] ++
898,158 UART: [kat] sha1
902,596 UART: [kat] SHA2-256
904,536 UART: [kat] SHA2-384
907,449 UART: [kat] SHA2-512-ACC
909,350 UART: [kat] ECC-384
919,073 UART: [kat] HMAC-384Kdf
923,715 UART: [kat] LMS
1,172,043 UART: [kat] --
1,172,726 UART: [cold-reset] ++
1,173,118 UART: [fht] FHT @ 0x50003400
1,175,905 UART: [idev] ++
1,176,073 UART: [idev] CDI.KEYID = 6
1,176,433 UART: [idev] SUBJECT.KEYID = 7
1,176,857 UART: [idev] UDS.KEYID = 0
1,177,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,869 UART: [idev] Erasing UDS.KEYID = 0
1,202,210 UART: [idev] Sha1 KeyId Algorithm
1,210,524 UART: [idev] --
1,211,630 UART: [ldev] ++
1,211,798 UART: [ldev] CDI.KEYID = 6
1,212,161 UART: [ldev] SUBJECT.KEYID = 5
1,212,587 UART: [ldev] AUTHORITY.KEYID = 7
1,213,050 UART: [ldev] FE.KEYID = 1
1,218,362 UART: [ldev] Erasing FE.KEYID = 1
1,244,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,036 UART: [ldev] --
1,284,413 UART: [fwproc] Wait for Commands...
1,285,105 UART: [fwproc] Recv command 0x46574c44
1,285,833 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,279 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,583 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,518 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,502 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,574 >>> mbox cmd response: failed
1,406,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,580 >>> mbox cmd response: failed
1,406,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,232 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,929 UART: [state] WD Timer not started. Device not locked for debugging
88,082 UART: [kat] SHA2-256
891,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,076 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,174,263 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,153 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,208,101 UART: [idev] --
1,208,988 UART: [ldev] ++
1,209,156 UART: [ldev] CDI.KEYID = 6
1,209,520 UART: [ldev] SUBJECT.KEYID = 5
1,209,947 UART: [ldev] AUTHORITY.KEYID = 7
1,210,410 UART: [ldev] FE.KEYID = 1
1,215,468 UART: [ldev] Erasing FE.KEYID = 1
1,241,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,464 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,343 UART: [fwproc] Recv command 0x46574c44
1,282,076 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,156 UART: ROM Fatal Error: 0x000B0023
1,549,313 >>> mbox cmd response: failed
1,549,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,319 >>> mbox cmd response: failed
1,549,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
916,748 UART: [kat] HMAC-384Kdf
921,210 UART: [kat] LMS
1,169,522 UART: [kat] --
1,170,401 UART: [cold-reset] ++
1,170,751 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,174,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,267 UART: [idev] Erasing UDS.KEYID = 0
1,199,575 UART: [idev] Sha1 KeyId Algorithm
1,208,507 UART: [idev] --
1,209,482 UART: [ldev] ++
1,209,650 UART: [ldev] CDI.KEYID = 6
1,210,014 UART: [ldev] SUBJECT.KEYID = 5
1,210,441 UART: [ldev] AUTHORITY.KEYID = 7
1,210,904 UART: [ldev] FE.KEYID = 1
1,216,226 UART: [ldev] Erasing FE.KEYID = 1
1,242,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,276 UART: [ldev] --
1,281,792 UART: [fwproc] Wait for Commands...
1,282,487 UART: [fwproc] Recv command 0x46574c44
1,283,220 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,087 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,346 >>> mbox cmd response: failed
1,402,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,352 >>> mbox cmd response: failed
1,402,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,358 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,989 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [kat] SHA2-256
891,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,042 UART: [kat] ++
896,194 UART: [kat] sha1
900,456 UART: [kat] SHA2-256
902,396 UART: [kat] SHA2-384
905,309 UART: [kat] SHA2-512-ACC
907,210 UART: [kat] ECC-384
917,383 UART: [kat] HMAC-384Kdf
922,013 UART: [kat] LMS
1,170,325 UART: [kat] --
1,171,366 UART: [cold-reset] ++
1,171,878 UART: [fht] FHT @ 0x50003400
1,174,678 UART: [idev] ++
1,174,846 UART: [idev] CDI.KEYID = 6
1,175,207 UART: [idev] SUBJECT.KEYID = 7
1,175,632 UART: [idev] UDS.KEYID = 0
1,175,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,556 UART: [idev] Erasing UDS.KEYID = 0
1,200,146 UART: [idev] Sha1 KeyId Algorithm
1,209,054 UART: [idev] --
1,210,247 UART: [ldev] ++
1,210,415 UART: [ldev] CDI.KEYID = 6
1,210,779 UART: [ldev] SUBJECT.KEYID = 5
1,211,206 UART: [ldev] AUTHORITY.KEYID = 7
1,211,669 UART: [ldev] FE.KEYID = 1
1,216,959 UART: [ldev] Erasing FE.KEYID = 1
1,243,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,629 UART: [ldev] --
1,283,143 UART: [fwproc] Wait for Commands...
1,283,846 UART: [fwproc] Recv command 0x46574c44
1,284,579 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,533 UART: ROM Fatal Error: 0x000B0023
1,551,690 >>> mbox cmd response: failed
1,551,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,696 >>> mbox cmd response: failed
1,551,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,372 UART: [kat] ++
895,524 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,629 UART: [kat] LMS
1,168,941 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,173,074 UART: [idev] ++
1,173,242 UART: [idev] CDI.KEYID = 6
1,173,603 UART: [idev] SUBJECT.KEYID = 7
1,174,028 UART: [idev] UDS.KEYID = 0
1,174,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,806 UART: [idev] Erasing UDS.KEYID = 0
1,199,194 UART: [idev] Sha1 KeyId Algorithm
1,208,166 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,216,233 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,653 UART: [ldev] --
1,282,003 UART: [fwproc] Wait for Commands...
1,282,670 UART: [fwproc] Recv command 0x46574c44
1,283,403 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,925 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,198 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,401,603 >>> mbox cmd response: failed
1,401,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,609 >>> mbox cmd response: failed
1,401,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,615 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,924 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,211 UART:
192,573 UART: Running Caliptra ROM ...
193,766 UART:
193,920 UART: [state] CFI Enabled
263,411 UART: [state] LifecycleState = Unprovisioned
265,384 UART: [state] DebugLocked = No
267,544 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,270 UART: [kat] SHA2-256
442,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,515 UART: [kat] ++
453,050 UART: [kat] sha1
464,045 UART: [kat] SHA2-256
466,777 UART: [kat] SHA2-384
471,895 UART: [kat] SHA2-512-ACC
474,297 UART: [kat] ECC-384
2,767,484 UART: [kat] HMAC-384Kdf
2,799,986 UART: [kat] LMS
3,990,304 UART: [kat] --
3,995,604 UART: [cold-reset] ++
3,996,953 UART: [fht] Storing FHT @ 0x50003400
4,008,655 UART: [idev] ++
4,009,226 UART: [idev] CDI.KEYID = 6
4,010,178 UART: [idev] SUBJECT.KEYID = 7
4,011,399 UART: [idev] UDS.KEYID = 0
4,013,974 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,737 UART: [idev] Erasing UDS.KEYID = 0
7,349,636 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,265 UART: [idev] --
7,375,012 UART: [ldev] ++
7,375,584 UART: [ldev] CDI.KEYID = 6
7,376,547 UART: [ldev] SUBJECT.KEYID = 5
7,377,874 UART: [ldev] AUTHORITY.KEYID = 7
7,379,064 UART: [ldev] FE.KEYID = 1
7,424,313 UART: [ldev] Erasing FE.KEYID = 1
10,754,140 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,519 UART: [ldev] --
13,115,949 UART: [fwproc] Waiting for Commands...
13,118,975 UART: [fwproc] Received command 0x46574c44
13,121,159 UART: [fwproc] Received Image of size 114124 bytes
16,061,781 UART: ROM Fatal Error: 0x000B0024
16,065,247 >>> mbox cmd response: failed
16,065,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,066,027 >>> mbox cmd response: failed
16,066,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,066,597 >>> mbox cmd response: failed
Initializing fuses
2,054,807 writing to cptra_bootfsm_go
2,244,103 UART:
2,244,469 UART: Running Caliptra ROM ...
2,245,611 UART:
2,245,778 UART: [state] CFI Enabled
2,306,827 UART: [state] LifecycleState = Unprovisioned
2,308,762 UART: [state] DebugLocked = No
2,311,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,316,273 UART: [kat] SHA2-256
2,485,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,496,437 UART: [kat] ++
2,496,897 UART: [kat] sha1
2,506,974 UART: [kat] SHA2-256
2,509,674 UART: [kat] SHA2-384
2,515,130 UART: [kat] SHA2-512-ACC
2,517,468 UART: [kat] ECC-384
4,814,508 UART: [kat] HMAC-384Kdf
4,847,885 UART: [kat] LMS
6,038,206 UART: [kat] --
6,043,942 UART: [cold-reset] ++
6,045,177 UART: [fht] Storing FHT @ 0x50003400
6,057,255 UART: [idev] ++
6,057,821 UART: [idev] CDI.KEYID = 6
6,058,840 UART: [idev] SUBJECT.KEYID = 7
6,060,002 UART: [idev] UDS.KEYID = 0
6,062,356 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,206,007 UART: [idev] Erasing UDS.KEYID = 0
9,393,085 UART: [idev] Using Sha1 for KeyId Algorithm
9,414,195 UART: [idev] --
9,418,017 UART: [ldev] ++
9,418,641 UART: [ldev] CDI.KEYID = 6
9,419,561 UART: [ldev] SUBJECT.KEYID = 5
9,420,815 UART: [ldev] AUTHORITY.KEYID = 7
9,422,052 UART: [ldev] FE.KEYID = 1
9,470,965 UART: [ldev] Erasing FE.KEYID = 1
12,802,721 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,097,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,141,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,984 UART: [ldev] --
15,164,205 UART: [fwproc] Waiting for Commands...
15,167,385 UART: [fwproc] Received command 0x46574c44
15,169,628 UART: [fwproc] Received Image of size 114124 bytes
19,229,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,306,464 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,375,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,692,907 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,787,984 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,846,285 >>> mbox cmd response: failed
15,847,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,847,363 >>> mbox cmd response: failed
15,847,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,847,927 >>> mbox cmd response: failed
Initializing fuses
2,055,485 writing to cptra_bootfsm_go
5,824,844 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,875,325 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,574 UART:
192,927 UART: Running Caliptra ROM ...
194,110 UART:
603,796 UART: [state] CFI Enabled
618,772 UART: [state] LifecycleState = Unprovisioned
620,693 UART: [state] DebugLocked = No
623,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,078 UART: [kat] SHA2-256
797,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,346 UART: [kat] ++
808,827 UART: [kat] sha1
819,706 UART: [kat] SHA2-256
822,396 UART: [kat] SHA2-384
827,401 UART: [kat] SHA2-512-ACC
829,794 UART: [kat] ECC-384
3,114,274 UART: [kat] HMAC-384Kdf
3,127,213 UART: [kat] LMS
4,317,347 UART: [kat] --
4,321,668 UART: [cold-reset] ++
4,323,433 UART: [fht] Storing FHT @ 0x50003400
4,333,510 UART: [idev] ++
4,334,084 UART: [idev] CDI.KEYID = 6
4,334,988 UART: [idev] SUBJECT.KEYID = 7
4,336,259 UART: [idev] UDS.KEYID = 0
4,338,736 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,273 UART: [idev] Erasing UDS.KEYID = 0
7,619,949 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,958 UART: [idev] --
7,646,739 UART: [ldev] ++
7,647,315 UART: [ldev] CDI.KEYID = 6
7,648,257 UART: [ldev] SUBJECT.KEYID = 5
7,649,470 UART: [ldev] AUTHORITY.KEYID = 7
7,650,760 UART: [ldev] FE.KEYID = 1
7,659,657 UART: [ldev] Erasing FE.KEYID = 1
10,951,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,271 UART: [ldev] --
13,311,842 UART: [fwproc] Waiting for Commands...
13,314,264 UART: [fwproc] Received command 0x46574c44
13,316,450 UART: [fwproc] Received Image of size 114124 bytes
16,264,143 UART: ROM Fatal Error: 0x000B0024
16,267,541 >>> mbox cmd response: failed
16,267,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,268,287 >>> mbox cmd response: failed
16,268,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,268,854 >>> mbox cmd response: failed
Initializing fuses
2,058,043 writing to cptra_bootfsm_go
2,247,385 UART:
2,247,760 UART: Running Caliptra ROM ...
2,248,899 UART:
4,186,602 UART: [state] CFI Enabled
4,199,124 UART: [state] LifecycleState = Unprovisioned
4,201,077 UART: [state] DebugLocked = No
4,202,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,208,249 UART: [kat] SHA2-256
4,377,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,566 UART: [kat] ++
4,389,107 UART: [kat] sha1
4,400,165 UART: [kat] SHA2-256
4,402,918 UART: [kat] SHA2-384
4,408,739 UART: [kat] SHA2-512-ACC
4,411,087 UART: [kat] ECC-384
6,693,644 UART: [kat] HMAC-384Kdf
6,706,736 UART: [kat] LMS
7,896,863 UART: [kat] --
7,903,024 UART: [cold-reset] ++
7,904,613 UART: [fht] Storing FHT @ 0x50003400
7,915,509 UART: [idev] ++
7,916,079 UART: [idev] CDI.KEYID = 6
7,917,104 UART: [idev] SUBJECT.KEYID = 7
7,918,264 UART: [idev] UDS.KEYID = 0
7,920,992 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,064,519 UART: [idev] Erasing UDS.KEYID = 0
11,204,202 UART: [idev] Using Sha1 for KeyId Algorithm
11,227,231 UART: [idev] --
11,230,753 UART: [ldev] ++
11,231,363 UART: [ldev] CDI.KEYID = 6
11,232,286 UART: [ldev] SUBJECT.KEYID = 5
11,233,588 UART: [ldev] AUTHORITY.KEYID = 7
11,234,775 UART: [ldev] FE.KEYID = 1
11,245,489 UART: [ldev] Erasing FE.KEYID = 1
14,532,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,825,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,840,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,854,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,869,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,888,649 UART: [ldev] --
16,892,894 UART: [fwproc] Waiting for Commands...
16,895,422 UART: [fwproc] Received command 0x46574c44
16,897,668 UART: [fwproc] Received Image of size 114124 bytes
20,948,292 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,026,712 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,095,596 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,413,569 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,504 writing to cptra_bootfsm_go
4,131,876 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,031,269 >>> mbox cmd response: failed
16,031,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,032,244 >>> mbox cmd response: failed
16,032,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,032,833 >>> mbox cmd response: failed
Initializing fuses
2,056,334 writing to cptra_bootfsm_go
7,971,734 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,916,928 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,305 UART:
192,789 UART: Running Caliptra ROM ...
193,971 UART:
194,122 UART: [state] CFI Enabled
263,508 UART: [state] LifecycleState = Unprovisioned
265,383 UART: [state] DebugLocked = No
267,419 UART: [state] WD Timer not started. Device not locked for debugging
271,024 UART: [kat] SHA2-256
450,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,722 UART: [kat] ++
462,262 UART: [kat] sha1
472,390 UART: [kat] SHA2-256
475,456 UART: [kat] SHA2-384
482,459 UART: [kat] SHA2-512-ACC
485,392 UART: [kat] ECC-384
2,948,341 UART: [kat] HMAC-384Kdf
2,970,086 UART: [kat] LMS
3,499,546 UART: [kat] --
3,504,321 UART: [cold-reset] ++
3,505,556 UART: [fht] FHT @ 0x50003400
3,516,544 UART: [idev] ++
3,517,117 UART: [idev] CDI.KEYID = 6
3,518,087 UART: [idev] SUBJECT.KEYID = 7
3,519,249 UART: [idev] UDS.KEYID = 0
3,522,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,188 UART: [idev] Erasing UDS.KEYID = 0
6,025,288 UART: [idev] Sha1 KeyId Algorithm
6,048,036 UART: [idev] --
6,051,833 UART: [ldev] ++
6,052,431 UART: [ldev] CDI.KEYID = 6
6,053,347 UART: [ldev] SUBJECT.KEYID = 5
6,054,513 UART: [ldev] AUTHORITY.KEYID = 7
6,055,749 UART: [ldev] FE.KEYID = 1
6,099,900 UART: [ldev] Erasing FE.KEYID = 1
8,601,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,161 UART: [ldev] --
10,415,351 UART: [fwproc] Wait for Commands...
10,416,801 UART: [fwproc] Recv command 0x46574c44
10,418,896 UART: [fwproc] Recv'd Img size: 114448 bytes
12,710,190 UART: ROM Fatal Error: 0x000B0024
12,713,310 >>> mbox cmd response: failed
12,713,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,714,057 >>> mbox cmd response: failed
12,714,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,714,632 >>> mbox cmd response: failed
Initializing fuses
2,057,246 writing to cptra_bootfsm_go
2,246,550 UART:
2,246,897 UART: Running Caliptra ROM ...
2,248,034 UART:
2,248,205 UART: [state] CFI Enabled
2,311,296 UART: [state] LifecycleState = Unprovisioned
2,313,177 UART: [state] DebugLocked = No
2,314,468 UART: [state] WD Timer not started. Device not locked for debugging
2,317,511 UART: [kat] SHA2-256
2,496,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,508,228 UART: [kat] ++
2,508,772 UART: [kat] sha1
2,520,099 UART: [kat] SHA2-256
2,523,088 UART: [kat] SHA2-384
2,530,650 UART: [kat] SHA2-512-ACC
2,533,647 UART: [kat] ECC-384
4,996,698 UART: [kat] HMAC-384Kdf
5,019,681 UART: [kat] LMS
5,549,155 UART: [kat] --
5,552,961 UART: [cold-reset] ++
5,554,844 UART: [fht] FHT @ 0x50003400
5,564,905 UART: [idev] ++
5,565,469 UART: [idev] CDI.KEYID = 6
5,566,350 UART: [idev] SUBJECT.KEYID = 7
5,567,562 UART: [idev] UDS.KEYID = 0
5,569,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,713,871 UART: [idev] Erasing UDS.KEYID = 0
8,077,123 UART: [idev] Sha1 KeyId Algorithm
8,099,492 UART: [idev] --
8,104,264 UART: [ldev] ++
8,104,836 UART: [ldev] CDI.KEYID = 6
8,105,894 UART: [ldev] SUBJECT.KEYID = 5
8,106,951 UART: [ldev] AUTHORITY.KEYID = 7
8,108,179 UART: [ldev] FE.KEYID = 1
8,149,184 UART: [ldev] Erasing FE.KEYID = 1
10,650,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,369,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,385,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,401,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,416,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,438,019 UART: [ldev] --
12,442,962 UART: [fwproc] Wait for Commands...
12,445,919 UART: [fwproc] Recv command 0x46574c44
12,447,959 UART: [fwproc] Recv'd Img size: 114448 bytes
15,850,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,921,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,990,102 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,308,813 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,382,776 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,514,662 >>> mbox cmd response: failed
12,515,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,622 >>> mbox cmd response: failed
12,515,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,186 >>> mbox cmd response: failed
Initializing fuses
2,059,660 writing to cptra_bootfsm_go
5,414,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,122,623 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
192,686 UART:
193,035 UART: Running Caliptra ROM ...
194,266 UART:
604,016 UART: [state] CFI Enabled
617,543 UART: [state] LifecycleState = Unprovisioned
619,433 UART: [state] DebugLocked = No
620,780 UART: [state] WD Timer not started. Device not locked for debugging
623,840 UART: [kat] SHA2-256
802,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,508 UART: [kat] ++
814,954 UART: [kat] sha1
826,853 UART: [kat] SHA2-256
829,914 UART: [kat] SHA2-384
835,096 UART: [kat] SHA2-512-ACC
838,037 UART: [kat] ECC-384
3,280,922 UART: [kat] HMAC-384Kdf
3,292,552 UART: [kat] LMS
3,822,036 UART: [kat] --
3,826,686 UART: [cold-reset] ++
3,828,676 UART: [fht] FHT @ 0x50003400
3,838,517 UART: [idev] ++
3,839,075 UART: [idev] CDI.KEYID = 6
3,839,969 UART: [idev] SUBJECT.KEYID = 7
3,841,177 UART: [idev] UDS.KEYID = 0
3,843,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,871 UART: [idev] Erasing UDS.KEYID = 0
6,310,225 UART: [idev] Sha1 KeyId Algorithm
6,333,890 UART: [idev] --
6,337,719 UART: [ldev] ++
6,338,308 UART: [ldev] CDI.KEYID = 6
6,339,190 UART: [ldev] SUBJECT.KEYID = 5
6,340,401 UART: [ldev] AUTHORITY.KEYID = 7
6,341,638 UART: [ldev] FE.KEYID = 1
6,352,475 UART: [ldev] Erasing FE.KEYID = 1
8,827,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,042 UART: [ldev] --
10,619,884 UART: [fwproc] Wait for Commands...
10,621,451 UART: [fwproc] Recv command 0x46574c44
10,623,559 UART: [fwproc] Recv'd Img size: 114448 bytes
12,906,963 UART: ROM Fatal Error: 0x000B0024
12,910,090 >>> mbox cmd response: failed
12,910,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,910,853 >>> mbox cmd response: failed
12,911,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,911,523 >>> mbox cmd response: failed
Initializing fuses
2,056,433 writing to cptra_bootfsm_go
2,245,802 UART:
2,246,160 UART: Running Caliptra ROM ...
2,247,208 UART:
7,537,398 UART: [state] CFI Enabled
7,553,869 UART: [state] LifecycleState = Unprovisioned
7,555,739 UART: [state] DebugLocked = No
7,557,562 UART: [state] WD Timer not started. Device not locked for debugging
7,562,010 UART: [kat] SHA2-256
7,741,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,752,720 UART: [kat] ++
7,753,271 UART: [kat] sha1
7,763,415 UART: [kat] SHA2-256
7,766,423 UART: [kat] SHA2-384
7,772,682 UART: [kat] SHA2-512-ACC
7,775,612 UART: [kat] ECC-384
10,216,120 UART: [kat] HMAC-384Kdf
10,228,286 UART: [kat] LMS
10,757,746 UART: [kat] --
10,762,029 UART: [cold-reset] ++
10,763,643 UART: [fht] FHT @ 0x50003400
10,773,594 UART: [idev] ++
10,774,165 UART: [idev] CDI.KEYID = 6
10,775,181 UART: [idev] SUBJECT.KEYID = 7
10,776,283 UART: [idev] UDS.KEYID = 0
10,778,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,922,554 UART: [idev] Erasing UDS.KEYID = 0
13,249,805 UART: [idev] Sha1 KeyId Algorithm
13,273,249 UART: [idev] --
13,276,812 UART: [ldev] ++
13,277,379 UART: [ldev] CDI.KEYID = 6
13,278,342 UART: [ldev] SUBJECT.KEYID = 5
13,279,502 UART: [ldev] AUTHORITY.KEYID = 7
13,280,734 UART: [ldev] FE.KEYID = 1
13,289,439 UART: [ldev] Erasing FE.KEYID = 1
15,761,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,480,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,496,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,511,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,527,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,548,390 UART: [ldev] --
17,552,174 UART: [fwproc] Wait for Commands...
17,555,246 UART: [fwproc] Recv command 0x46574c44
17,557,290 UART: [fwproc] Recv'd Img size: 114448 bytes
20,952,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,025,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,094,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,412,349 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
3,697,636 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,701,843 >>> mbox cmd response: failed
12,702,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,702,689 >>> mbox cmd response: failed
12,702,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,252 >>> mbox cmd response: failed
Initializing fuses
2,054,183 writing to cptra_bootfsm_go
10,860,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,443,782 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,440,368 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,654,324 >>> mbox cmd response: failed
12,654,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,655,202 >>> mbox cmd response: failed
12,655,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,655,808 >>> mbox cmd response: failed
Initializing fuses
2,056,078 writing to cptra_bootfsm_go
5,481,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,779,855 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,756,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,876,805 >>> mbox cmd response: failed
12,877,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,877,823 >>> mbox cmd response: failed
12,878,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,878,380 >>> mbox cmd response: failed
Initializing fuses
2,057,483 writing to cptra_bootfsm_go
10,740,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,952,959 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,033 UART: [kat] SHA2-256
881,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,079 UART: [kat] ++
886,231 UART: [kat] sha1
890,613 UART: [kat] SHA2-256
892,551 UART: [kat] SHA2-384
895,170 UART: [kat] SHA2-512-ACC
897,071 UART: [kat] ECC-384
902,720 UART: [kat] HMAC-384Kdf
907,276 UART: [kat] LMS
1,475,472 UART: [kat] --
1,476,589 UART: [cold-reset] ++
1,477,049 UART: [fht] Storing FHT @ 0x50003400
1,479,892 UART: [idev] ++
1,480,060 UART: [idev] CDI.KEYID = 6
1,480,420 UART: [idev] SUBJECT.KEYID = 7
1,480,844 UART: [idev] UDS.KEYID = 0
1,481,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,054 UART: [idev] Erasing UDS.KEYID = 0
1,505,744 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,468 UART: [idev] --
1,515,543 UART: [ldev] ++
1,515,711 UART: [ldev] CDI.KEYID = 6
1,516,074 UART: [ldev] SUBJECT.KEYID = 5
1,516,500 UART: [ldev] AUTHORITY.KEYID = 7
1,516,963 UART: [ldev] FE.KEYID = 1
1,522,183 UART: [ldev] Erasing FE.KEYID = 1
1,547,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,052 UART: [ldev] --
1,587,361 UART: [fwproc] Waiting for Commands...
1,588,010 UART: [fwproc] Received command 0x46574c44
1,588,801 UART: [fwproc] Received Image of size 114448 bytes
1,855,343 UART: ROM Fatal Error: 0x000B0024
1,856,500 >>> mbox cmd response: failed
1,856,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,506 >>> mbox cmd response: failed
1,856,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,625 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,311 UART: [kat] SHA2-256
882,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,357 UART: [kat] ++
886,509 UART: [kat] sha1
890,799 UART: [kat] SHA2-256
892,737 UART: [kat] SHA2-384
895,628 UART: [kat] SHA2-512-ACC
897,529 UART: [kat] ECC-384
903,180 UART: [kat] HMAC-384Kdf
907,700 UART: [kat] LMS
1,475,896 UART: [kat] --
1,476,855 UART: [cold-reset] ++
1,477,271 UART: [fht] Storing FHT @ 0x50003400
1,480,128 UART: [idev] ++
1,480,296 UART: [idev] CDI.KEYID = 6
1,480,656 UART: [idev] SUBJECT.KEYID = 7
1,481,080 UART: [idev] UDS.KEYID = 0
1,481,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,266 UART: [idev] Erasing UDS.KEYID = 0
1,506,394 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,012 UART: [idev] --
1,515,945 UART: [ldev] ++
1,516,113 UART: [ldev] CDI.KEYID = 6
1,516,476 UART: [ldev] SUBJECT.KEYID = 5
1,516,902 UART: [ldev] AUTHORITY.KEYID = 7
1,517,365 UART: [ldev] FE.KEYID = 1
1,522,579 UART: [ldev] Erasing FE.KEYID = 1
1,548,558 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,432 UART: [ldev] --
1,587,873 UART: [fwproc] Waiting for Commands...
1,588,564 UART: [fwproc] Received command 0x46574c44
1,589,355 UART: [fwproc] Received Image of size 114448 bytes
2,888,815 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,247 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,660 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,706,219 >>> mbox cmd response: failed
1,706,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,225 >>> mbox cmd response: failed
1,706,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,942 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,067 UART: [state] LifecycleState = Unprovisioned
86,722 UART: [state] DebugLocked = No
87,212 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,694 UART: [kat] SHA2-256
882,625 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,740 UART: [kat] ++
886,892 UART: [kat] sha1
891,332 UART: [kat] SHA2-256
893,270 UART: [kat] SHA2-384
896,095 UART: [kat] SHA2-512-ACC
897,996 UART: [kat] ECC-384
903,849 UART: [kat] HMAC-384Kdf
908,319 UART: [kat] LMS
1,476,515 UART: [kat] --
1,477,702 UART: [cold-reset] ++
1,478,070 UART: [fht] Storing FHT @ 0x50003400
1,480,833 UART: [idev] ++
1,481,001 UART: [idev] CDI.KEYID = 6
1,481,361 UART: [idev] SUBJECT.KEYID = 7
1,481,785 UART: [idev] UDS.KEYID = 0
1,482,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,707 UART: [idev] Erasing UDS.KEYID = 0
1,506,225 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,783 UART: [idev] --
1,515,830 UART: [ldev] ++
1,515,998 UART: [ldev] CDI.KEYID = 6
1,516,361 UART: [ldev] SUBJECT.KEYID = 5
1,516,787 UART: [ldev] AUTHORITY.KEYID = 7
1,517,250 UART: [ldev] FE.KEYID = 1
1,522,494 UART: [ldev] Erasing FE.KEYID = 1
1,547,249 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,461 UART: [ldev] --
1,586,786 UART: [fwproc] Waiting for Commands...
1,587,489 UART: [fwproc] Received command 0x46574c44
1,588,280 UART: [fwproc] Received Image of size 114448 bytes
1,854,358 UART: ROM Fatal Error: 0x000B0024
1,855,515 >>> mbox cmd response: failed
1,855,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,521 >>> mbox cmd response: failed
1,855,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,527 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,267 UART: [state] LifecycleState = Unprovisioned
86,922 UART: [state] DebugLocked = No
87,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,088 UART: [kat] SHA2-256
883,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,134 UART: [kat] ++
887,286 UART: [kat] sha1
891,546 UART: [kat] SHA2-256
893,484 UART: [kat] SHA2-384
896,351 UART: [kat] SHA2-512-ACC
898,252 UART: [kat] ECC-384
903,881 UART: [kat] HMAC-384Kdf
908,637 UART: [kat] LMS
1,476,833 UART: [kat] --
1,477,608 UART: [cold-reset] ++
1,478,046 UART: [fht] Storing FHT @ 0x50003400
1,480,845 UART: [idev] ++
1,481,013 UART: [idev] CDI.KEYID = 6
1,481,373 UART: [idev] SUBJECT.KEYID = 7
1,481,797 UART: [idev] UDS.KEYID = 0
1,482,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,055 UART: [idev] Erasing UDS.KEYID = 0
1,507,021 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,713 UART: [idev] --
1,516,742 UART: [ldev] ++
1,516,910 UART: [ldev] CDI.KEYID = 6
1,517,273 UART: [ldev] SUBJECT.KEYID = 5
1,517,699 UART: [ldev] AUTHORITY.KEYID = 7
1,518,162 UART: [ldev] FE.KEYID = 1
1,523,560 UART: [ldev] Erasing FE.KEYID = 1
1,548,971 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,195 UART: [ldev] --
1,588,578 UART: [fwproc] Waiting for Commands...
1,589,309 UART: [fwproc] Received command 0x46574c44
1,590,100 UART: [fwproc] Received Image of size 114448 bytes
2,889,972 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,560 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,912 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,885 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,707,326 >>> mbox cmd response: failed
1,707,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,332 >>> mbox cmd response: failed
1,707,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,338 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,907 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
893,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,665 UART: [kat] ++
897,817 UART: [kat] sha1
901,983 UART: [kat] SHA2-256
903,923 UART: [kat] SHA2-384
906,770 UART: [kat] SHA2-512-ACC
908,671 UART: [kat] ECC-384
918,810 UART: [kat] HMAC-384Kdf
923,534 UART: [kat] LMS
1,171,862 UART: [kat] --
1,173,065 UART: [cold-reset] ++
1,173,545 UART: [fht] FHT @ 0x50003400
1,176,374 UART: [idev] ++
1,176,542 UART: [idev] CDI.KEYID = 6
1,176,902 UART: [idev] SUBJECT.KEYID = 7
1,177,326 UART: [idev] UDS.KEYID = 0
1,177,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,586 UART: [idev] Erasing UDS.KEYID = 0
1,202,697 UART: [idev] Sha1 KeyId Algorithm
1,211,173 UART: [idev] --
1,212,083 UART: [ldev] ++
1,212,251 UART: [ldev] CDI.KEYID = 6
1,212,614 UART: [ldev] SUBJECT.KEYID = 5
1,213,040 UART: [ldev] AUTHORITY.KEYID = 7
1,213,503 UART: [ldev] FE.KEYID = 1
1,218,385 UART: [ldev] Erasing FE.KEYID = 1
1,244,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,383 UART: [ldev] --
1,283,828 UART: [fwproc] Wait for Commands...
1,284,586 UART: [fwproc] Recv command 0x46574c44
1,285,314 UART: [fwproc] Recv'd Img size: 114448 bytes
1,551,816 UART: ROM Fatal Error: 0x000B0024
1,552,973 >>> mbox cmd response: failed
1,552,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,979 >>> mbox cmd response: failed
1,552,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,602 UART: [state] LifecycleState = Unprovisioned
86,257 UART: [state] DebugLocked = No
86,907 UART: [state] WD Timer not started. Device not locked for debugging
88,178 UART: [kat] SHA2-256
893,828 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,953 UART: [kat] ++
898,105 UART: [kat] sha1
902,339 UART: [kat] SHA2-256
904,279 UART: [kat] SHA2-384
907,050 UART: [kat] SHA2-512-ACC
908,951 UART: [kat] ECC-384
918,924 UART: [kat] HMAC-384Kdf
923,576 UART: [kat] LMS
1,171,904 UART: [kat] --
1,172,907 UART: [cold-reset] ++
1,173,237 UART: [fht] FHT @ 0x50003400
1,175,966 UART: [idev] ++
1,176,134 UART: [idev] CDI.KEYID = 6
1,176,494 UART: [idev] SUBJECT.KEYID = 7
1,176,918 UART: [idev] UDS.KEYID = 0
1,177,263 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,798 UART: [idev] Erasing UDS.KEYID = 0
1,201,269 UART: [idev] Sha1 KeyId Algorithm
1,209,753 UART: [idev] --
1,210,899 UART: [ldev] ++
1,211,067 UART: [ldev] CDI.KEYID = 6
1,211,430 UART: [ldev] SUBJECT.KEYID = 5
1,211,856 UART: [ldev] AUTHORITY.KEYID = 7
1,212,319 UART: [ldev] FE.KEYID = 1
1,217,253 UART: [ldev] Erasing FE.KEYID = 1
1,243,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,087 UART: [ldev] --
1,282,596 UART: [fwproc] Wait for Commands...
1,283,246 UART: [fwproc] Recv command 0x46574c44
1,283,974 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,407 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,405,278 >>> mbox cmd response: failed
1,405,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,284 >>> mbox cmd response: failed
1,405,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,122 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
893,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,804 UART: [kat] ++
897,956 UART: [kat] sha1
901,994 UART: [kat] SHA2-256
903,934 UART: [kat] SHA2-384
906,831 UART: [kat] SHA2-512-ACC
908,732 UART: [kat] ECC-384
918,669 UART: [kat] HMAC-384Kdf
923,273 UART: [kat] LMS
1,171,601 UART: [kat] --
1,172,678 UART: [cold-reset] ++
1,173,126 UART: [fht] FHT @ 0x50003400
1,175,665 UART: [idev] ++
1,175,833 UART: [idev] CDI.KEYID = 6
1,176,193 UART: [idev] SUBJECT.KEYID = 7
1,176,617 UART: [idev] UDS.KEYID = 0
1,176,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,609 UART: [idev] Erasing UDS.KEYID = 0
1,201,850 UART: [idev] Sha1 KeyId Algorithm
1,210,276 UART: [idev] --
1,211,376 UART: [ldev] ++
1,211,544 UART: [ldev] CDI.KEYID = 6
1,211,907 UART: [ldev] SUBJECT.KEYID = 5
1,212,333 UART: [ldev] AUTHORITY.KEYID = 7
1,212,796 UART: [ldev] FE.KEYID = 1
1,217,816 UART: [ldev] Erasing FE.KEYID = 1
1,244,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,044 UART: [ldev] --
1,283,485 UART: [fwproc] Wait for Commands...
1,284,151 UART: [fwproc] Recv command 0x46574c44
1,284,879 UART: [fwproc] Recv'd Img size: 114448 bytes
1,551,359 UART: ROM Fatal Error: 0x000B0024
1,552,516 >>> mbox cmd response: failed
1,552,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,522 >>> mbox cmd response: failed
1,552,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
893,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,696 UART: [kat] ++
897,848 UART: [kat] sha1
902,042 UART: [kat] SHA2-256
903,982 UART: [kat] SHA2-384
906,775 UART: [kat] SHA2-512-ACC
908,676 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,949 UART: [kat] LMS
1,171,277 UART: [kat] --
1,172,414 UART: [cold-reset] ++
1,172,886 UART: [fht] FHT @ 0x50003400
1,175,515 UART: [idev] ++
1,175,683 UART: [idev] CDI.KEYID = 6
1,176,043 UART: [idev] SUBJECT.KEYID = 7
1,176,467 UART: [idev] UDS.KEYID = 0
1,176,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,851 UART: [idev] Erasing UDS.KEYID = 0
1,202,222 UART: [idev] Sha1 KeyId Algorithm
1,210,644 UART: [idev] --
1,211,878 UART: [ldev] ++
1,212,046 UART: [ldev] CDI.KEYID = 6
1,212,409 UART: [ldev] SUBJECT.KEYID = 5
1,212,835 UART: [ldev] AUTHORITY.KEYID = 7
1,213,298 UART: [ldev] FE.KEYID = 1
1,218,690 UART: [ldev] Erasing FE.KEYID = 1
1,244,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,492 UART: [ldev] --
1,283,923 UART: [fwproc] Wait for Commands...
1,284,741 UART: [fwproc] Recv command 0x46574c44
1,285,469 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,113 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,022 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,407,971 >>> mbox cmd response: failed
1,407,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,977 >>> mbox cmd response: failed
1,407,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,983 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,871 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
916,108 UART: [kat] HMAC-384Kdf
920,836 UART: [kat] LMS
1,169,148 UART: [kat] --
1,170,099 UART: [cold-reset] ++
1,170,571 UART: [fht] FHT @ 0x50003400
1,173,377 UART: [idev] ++
1,173,545 UART: [idev] CDI.KEYID = 6
1,173,906 UART: [idev] SUBJECT.KEYID = 7
1,174,331 UART: [idev] UDS.KEYID = 0
1,174,677 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,049 UART: [idev] Erasing UDS.KEYID = 0
1,198,741 UART: [idev] Sha1 KeyId Algorithm
1,207,711 UART: [idev] --
1,208,754 UART: [ldev] ++
1,208,922 UART: [ldev] CDI.KEYID = 6
1,209,286 UART: [ldev] SUBJECT.KEYID = 5
1,209,713 UART: [ldev] AUTHORITY.KEYID = 7
1,210,176 UART: [ldev] FE.KEYID = 1
1,215,534 UART: [ldev] Erasing FE.KEYID = 1
1,242,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,276 UART: [ldev] --
1,281,622 UART: [fwproc] Wait for Commands...
1,282,249 UART: [fwproc] Recv command 0x46574c44
1,282,982 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,677 UART: ROM Fatal Error: 0x000B0024
1,550,834 >>> mbox cmd response: failed
1,550,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,840 >>> mbox cmd response: failed
1,550,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,846 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,600 UART: [state] LifecycleState = Unprovisioned
86,255 UART: [state] DebugLocked = No
86,775 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,169,973 UART: [fht] FHT @ 0x50003400
1,172,619 UART: [idev] ++
1,172,787 UART: [idev] CDI.KEYID = 6
1,173,148 UART: [idev] SUBJECT.KEYID = 7
1,173,573 UART: [idev] UDS.KEYID = 0
1,173,919 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,639 UART: [idev] Erasing UDS.KEYID = 0
1,198,409 UART: [idev] Sha1 KeyId Algorithm
1,207,267 UART: [idev] --
1,208,104 UART: [ldev] ++
1,208,272 UART: [ldev] CDI.KEYID = 6
1,208,636 UART: [ldev] SUBJECT.KEYID = 5
1,209,063 UART: [ldev] AUTHORITY.KEYID = 7
1,209,526 UART: [ldev] FE.KEYID = 1
1,214,594 UART: [ldev] Erasing FE.KEYID = 1
1,240,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,098 UART: [ldev] --
1,279,410 UART: [fwproc] Wait for Commands...
1,280,039 UART: [fwproc] Recv command 0x46574c44
1,280,772 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,770,821 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,400,299 >>> mbox cmd response: failed
1,400,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,305 >>> mbox cmd response: failed
1,400,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,558 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,401 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
891,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,930 UART: [kat] ++
896,082 UART: [kat] sha1
900,172 UART: [kat] SHA2-256
902,112 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,545 UART: [kat] HMAC-384Kdf
921,327 UART: [kat] LMS
1,169,639 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,712 UART: [fht] FHT @ 0x50003400
1,173,470 UART: [idev] ++
1,173,638 UART: [idev] CDI.KEYID = 6
1,173,999 UART: [idev] SUBJECT.KEYID = 7
1,174,424 UART: [idev] UDS.KEYID = 0
1,174,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,658 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,209,124 UART: [idev] --
1,210,301 UART: [ldev] ++
1,210,469 UART: [ldev] CDI.KEYID = 6
1,210,833 UART: [ldev] SUBJECT.KEYID = 5
1,211,260 UART: [ldev] AUTHORITY.KEYID = 7
1,211,723 UART: [ldev] FE.KEYID = 1
1,216,907 UART: [ldev] Erasing FE.KEYID = 1
1,243,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,255 UART: [ldev] --
1,283,677 UART: [fwproc] Wait for Commands...
1,284,272 UART: [fwproc] Recv command 0x46574c44
1,285,005 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,820 UART: ROM Fatal Error: 0x000B0024
1,550,977 >>> mbox cmd response: failed
1,550,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,983 >>> mbox cmd response: failed
1,550,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
891,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,872 UART: [kat] ++
896,024 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,579 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,912 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
1,174,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,596 UART: [idev] Sha1 KeyId Algorithm
1,208,526 UART: [idev] --
1,209,517 UART: [ldev] ++
1,209,685 UART: [ldev] CDI.KEYID = 6
1,210,049 UART: [ldev] SUBJECT.KEYID = 5
1,210,476 UART: [ldev] AUTHORITY.KEYID = 7
1,210,939 UART: [ldev] FE.KEYID = 1
1,216,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,333 UART: [ldev] --
1,281,673 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x46574c44
1,283,055 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,322 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,538 >>> mbox cmd response: failed
1,403,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,544 >>> mbox cmd response: failed
1,403,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,536 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,077 UART:
192,449 UART: Running Caliptra ROM ...
193,649 UART:
193,799 UART: [state] CFI Enabled
265,529 UART: [state] LifecycleState = Unprovisioned
267,494 UART: [state] DebugLocked = No
270,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,061 UART: [kat] SHA2-256
444,754 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,277 UART: [kat] ++
455,816 UART: [kat] sha1
467,567 UART: [kat] SHA2-256
470,243 UART: [kat] SHA2-384
476,552 UART: [kat] SHA2-512-ACC
478,952 UART: [kat] ECC-384
2,766,874 UART: [kat] HMAC-384Kdf
2,798,605 UART: [kat] LMS
3,988,885 UART: [kat] --
3,994,340 UART: [cold-reset] ++
3,995,797 UART: [fht] Storing FHT @ 0x50003400
4,007,300 UART: [idev] ++
4,007,880 UART: [idev] CDI.KEYID = 6
4,008,903 UART: [idev] SUBJECT.KEYID = 7
4,010,068 UART: [idev] UDS.KEYID = 0
4,012,565 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,344 UART: [idev] Erasing UDS.KEYID = 0
7,347,209 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,505 UART: [idev] --
7,372,262 UART: [ldev] ++
7,372,835 UART: [ldev] CDI.KEYID = 6
7,373,805 UART: [ldev] SUBJECT.KEYID = 5
7,375,019 UART: [ldev] AUTHORITY.KEYID = 7
7,376,258 UART: [ldev] FE.KEYID = 1
7,420,735 UART: [ldev] Erasing FE.KEYID = 1
10,758,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,760 UART: [ldev] --
13,136,894 UART: [fwproc] Waiting for Commands...
13,139,000 UART: [fwproc] Received command 0x46574c44
13,141,200 UART: [fwproc] Received Image of size 114124 bytes
16,085,570 UART: ROM Fatal Error: 0x000B0021
16,088,983 >>> mbox cmd response: failed
16,089,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,089,747 >>> mbox cmd response: failed
16,090,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,090,320 >>> mbox cmd response: failed
Initializing fuses
2,066,116 writing to cptra_bootfsm_go
2,255,425 UART:
2,255,768 UART: Running Caliptra ROM ...
2,256,904 UART:
2,257,073 UART: [state] CFI Enabled
2,330,060 UART: [state] LifecycleState = Unprovisioned
2,332,014 UART: [state] DebugLocked = No
2,334,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,339,344 UART: [kat] SHA2-256
2,509,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,519,524 UART: [kat] ++
2,520,028 UART: [kat] sha1
2,532,440 UART: [kat] SHA2-256
2,535,135 UART: [kat] SHA2-384
2,539,878 UART: [kat] SHA2-512-ACC
2,542,244 UART: [kat] ECC-384
4,832,130 UART: [kat] HMAC-384Kdf
4,844,229 UART: [kat] LMS
6,034,542 UART: [kat] --
6,040,420 UART: [cold-reset] ++
6,042,331 UART: [fht] Storing FHT @ 0x50003400
6,053,779 UART: [idev] ++
6,054,351 UART: [idev] CDI.KEYID = 6
6,055,317 UART: [idev] SUBJECT.KEYID = 7
6,056,539 UART: [idev] UDS.KEYID = 0
6,058,961 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,202,613 UART: [idev] Erasing UDS.KEYID = 0
9,389,979 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,912 UART: [idev] --
9,415,937 UART: [ldev] ++
9,416,516 UART: [ldev] CDI.KEYID = 6
9,417,536 UART: [ldev] SUBJECT.KEYID = 5
9,418,776 UART: [ldev] AUTHORITY.KEYID = 7
9,419,963 UART: [ldev] FE.KEYID = 1
9,466,041 UART: [ldev] Erasing FE.KEYID = 1
12,798,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,091,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,120,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,135,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,348 UART: [ldev] --
15,158,965 UART: [fwproc] Waiting for Commands...
15,161,377 UART: [fwproc] Received command 0x46574c44
15,163,577 UART: [fwproc] Received Image of size 114124 bytes
19,208,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,281,559 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,350,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,667,697 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,807,796 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,851,080 >>> mbox cmd response: failed
15,851,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,852,027 >>> mbox cmd response: failed
15,852,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,852,655 >>> mbox cmd response: failed
Initializing fuses
2,062,989 writing to cptra_bootfsm_go
5,833,523 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,896,125 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,273 UART:
192,635 UART: Running Caliptra ROM ...
193,775 UART:
603,379 UART: [state] CFI Enabled
620,341 UART: [state] LifecycleState = Unprovisioned
622,267 UART: [state] DebugLocked = No
624,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,256 UART: [kat] SHA2-256
799,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,566 UART: [kat] ++
810,041 UART: [kat] sha1
822,222 UART: [kat] SHA2-256
824,911 UART: [kat] SHA2-384
830,893 UART: [kat] SHA2-512-ACC
833,287 UART: [kat] ECC-384
3,117,817 UART: [kat] HMAC-384Kdf
3,129,695 UART: [kat] LMS
4,319,780 UART: [kat] --
4,322,491 UART: [cold-reset] ++
4,324,374 UART: [fht] Storing FHT @ 0x50003400
4,336,025 UART: [idev] ++
4,336,632 UART: [idev] CDI.KEYID = 6
4,337,523 UART: [idev] SUBJECT.KEYID = 7
4,338,819 UART: [idev] UDS.KEYID = 0
4,341,362 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,878 UART: [idev] Erasing UDS.KEYID = 0
7,621,458 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,899 UART: [idev] --
7,647,219 UART: [ldev] ++
7,647,791 UART: [ldev] CDI.KEYID = 6
7,648,809 UART: [ldev] SUBJECT.KEYID = 5
7,649,970 UART: [ldev] AUTHORITY.KEYID = 7
7,651,258 UART: [ldev] FE.KEYID = 1
7,662,718 UART: [ldev] Erasing FE.KEYID = 1
10,951,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,231 UART: [ldev] --
13,313,562 UART: [fwproc] Waiting for Commands...
13,315,840 UART: [fwproc] Received command 0x46574c44
13,318,032 UART: [fwproc] Received Image of size 114124 bytes
16,255,498 UART: ROM Fatal Error: 0x000B0021
16,258,908 >>> mbox cmd response: failed
16,259,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,259,688 >>> mbox cmd response: failed
16,259,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,260,243 >>> mbox cmd response: failed
Initializing fuses
2,056,127 writing to cptra_bootfsm_go
2,245,443 UART:
2,245,796 UART: Running Caliptra ROM ...
2,246,867 UART:
4,202,026 UART: [state] CFI Enabled
4,217,432 UART: [state] LifecycleState = Unprovisioned
4,219,346 UART: [state] DebugLocked = No
4,222,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,226,210 UART: [kat] SHA2-256
4,395,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,406,470 UART: [kat] ++
4,406,932 UART: [kat] sha1
4,417,798 UART: [kat] SHA2-256
4,420,504 UART: [kat] SHA2-384
4,426,388 UART: [kat] SHA2-512-ACC
4,428,740 UART: [kat] ECC-384
6,712,379 UART: [kat] HMAC-384Kdf
6,724,606 UART: [kat] LMS
7,914,686 UART: [kat] --
7,919,582 UART: [cold-reset] ++
7,921,896 UART: [fht] Storing FHT @ 0x50003400
7,933,329 UART: [idev] ++
7,933,894 UART: [idev] CDI.KEYID = 6
7,934,833 UART: [idev] SUBJECT.KEYID = 7
7,936,045 UART: [idev] UDS.KEYID = 0
7,938,317 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,081,746 UART: [idev] Erasing UDS.KEYID = 0
11,222,298 UART: [idev] Using Sha1 for KeyId Algorithm
11,244,923 UART: [idev] --
11,248,316 UART: [ldev] ++
11,248,880 UART: [ldev] CDI.KEYID = 6
11,249,844 UART: [ldev] SUBJECT.KEYID = 5
11,251,119 UART: [ldev] AUTHORITY.KEYID = 7
11,252,295 UART: [ldev] FE.KEYID = 1
11,262,127 UART: [ldev] Erasing FE.KEYID = 1
14,551,591 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,842,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,857,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,872,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,886,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,906,781 UART: [ldev] --
16,910,801 UART: [fwproc] Waiting for Commands...
16,913,978 UART: [fwproc] Received command 0x46574c44
16,916,170 UART: [fwproc] Received Image of size 114124 bytes
20,969,028 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,042,847 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,111,767 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,428,158 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,128,812 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,047,743 >>> mbox cmd response: failed
16,048,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,049,018 >>> mbox cmd response: failed
16,049,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,049,591 >>> mbox cmd response: failed
Initializing fuses
2,056,815 writing to cptra_bootfsm_go
7,955,641 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,893,775 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,401 UART:
192,758 UART: Running Caliptra ROM ...
193,969 UART:
194,127 UART: [state] CFI Enabled
257,989 UART: [state] LifecycleState = Unprovisioned
259,859 UART: [state] DebugLocked = No
261,160 UART: [state] WD Timer not started. Device not locked for debugging
264,200 UART: [kat] SHA2-256
443,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,881 UART: [kat] ++
455,331 UART: [kat] sha1
467,556 UART: [kat] SHA2-256
470,604 UART: [kat] SHA2-384
477,127 UART: [kat] SHA2-512-ACC
480,069 UART: [kat] ECC-384
2,946,767 UART: [kat] HMAC-384Kdf
2,969,218 UART: [kat] LMS
3,498,648 UART: [kat] --
3,505,079 UART: [cold-reset] ++
3,507,662 UART: [fht] FHT @ 0x50003400
3,518,911 UART: [idev] ++
3,519,479 UART: [idev] CDI.KEYID = 6
3,520,393 UART: [idev] SUBJECT.KEYID = 7
3,521,510 UART: [idev] UDS.KEYID = 0
3,524,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,440 UART: [idev] Erasing UDS.KEYID = 0
6,022,372 UART: [idev] Sha1 KeyId Algorithm
6,045,599 UART: [idev] --
6,049,922 UART: [ldev] ++
6,050,494 UART: [ldev] CDI.KEYID = 6
6,051,406 UART: [ldev] SUBJECT.KEYID = 5
6,052,624 UART: [ldev] AUTHORITY.KEYID = 7
6,053,810 UART: [ldev] FE.KEYID = 1
6,099,425 UART: [ldev] Erasing FE.KEYID = 1
8,606,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,980 UART: [ldev] --
10,414,412 UART: [fwproc] Wait for Commands...
10,416,622 UART: [fwproc] Recv command 0x46574c44
10,418,722 UART: [fwproc] Recv'd Img size: 114448 bytes
12,707,665 UART: ROM Fatal Error: 0x000B0021
12,710,820 >>> mbox cmd response: failed
12,711,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,711,577 >>> mbox cmd response: failed
12,711,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,712,126 >>> mbox cmd response: failed
Initializing fuses
2,052,613 writing to cptra_bootfsm_go
2,241,896 UART:
2,242,249 UART: Running Caliptra ROM ...
2,243,315 UART:
2,243,466 UART: [state] CFI Enabled
2,315,099 UART: [state] LifecycleState = Unprovisioned
2,316,987 UART: [state] DebugLocked = No
2,319,430 UART: [state] WD Timer not started. Device not locked for debugging
2,322,308 UART: [kat] SHA2-256
2,501,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,512,993 UART: [kat] ++
2,513,448 UART: [kat] sha1
2,523,901 UART: [kat] SHA2-256
2,526,914 UART: [kat] SHA2-384
2,532,087 UART: [kat] SHA2-512-ACC
2,535,088 UART: [kat] ECC-384
4,998,041 UART: [kat] HMAC-384Kdf
5,020,108 UART: [kat] LMS
5,549,546 UART: [kat] --
5,553,826 UART: [cold-reset] ++
5,554,893 UART: [fht] FHT @ 0x50003400
5,565,278 UART: [idev] ++
5,565,851 UART: [idev] CDI.KEYID = 6
5,566,738 UART: [idev] SUBJECT.KEYID = 7
5,567,947 UART: [idev] UDS.KEYID = 0
5,570,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,714,268 UART: [idev] Erasing UDS.KEYID = 0
8,075,193 UART: [idev] Sha1 KeyId Algorithm
8,098,210 UART: [idev] --
8,101,777 UART: [ldev] ++
8,102,346 UART: [ldev] CDI.KEYID = 6
8,103,230 UART: [ldev] SUBJECT.KEYID = 5
8,104,443 UART: [ldev] AUTHORITY.KEYID = 7
8,105,674 UART: [ldev] FE.KEYID = 1
8,149,875 UART: [ldev] Erasing FE.KEYID = 1
10,654,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,087 UART: [ldev] --
12,464,516 UART: [fwproc] Wait for Commands...
12,466,784 UART: [fwproc] Recv command 0x46574c44
12,468,871 UART: [fwproc] Recv'd Img size: 114448 bytes
15,873,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,952,439 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,021,251 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,338,866 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
3,362,844 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,491,758 >>> mbox cmd response: failed
12,492,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,492,660 >>> mbox cmd response: failed
12,492,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,493,226 >>> mbox cmd response: failed
Initializing fuses
2,054,472 writing to cptra_bootfsm_go
5,435,755 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,126,873 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
192,638 UART:
192,995 UART: Running Caliptra ROM ...
194,205 UART:
603,765 UART: [state] CFI Enabled
618,744 UART: [state] LifecycleState = Unprovisioned
620,588 UART: [state] DebugLocked = No
622,072 UART: [state] WD Timer not started. Device not locked for debugging
625,423 UART: [kat] SHA2-256
804,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,141 UART: [kat] ++
816,706 UART: [kat] sha1
828,320 UART: [kat] SHA2-256
831,337 UART: [kat] SHA2-384
836,611 UART: [kat] SHA2-512-ACC
839,597 UART: [kat] ECC-384
3,278,196 UART: [kat] HMAC-384Kdf
3,291,669 UART: [kat] LMS
3,821,118 UART: [kat] --
3,826,137 UART: [cold-reset] ++
3,827,482 UART: [fht] FHT @ 0x50003400
3,837,278 UART: [idev] ++
3,837,842 UART: [idev] CDI.KEYID = 6
3,838,757 UART: [idev] SUBJECT.KEYID = 7
3,839,971 UART: [idev] UDS.KEYID = 0
3,842,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,584 UART: [idev] Erasing UDS.KEYID = 0
6,311,708 UART: [idev] Sha1 KeyId Algorithm
6,335,977 UART: [idev] --
6,339,622 UART: [ldev] ++
6,340,203 UART: [ldev] CDI.KEYID = 6
6,341,113 UART: [ldev] SUBJECT.KEYID = 5
6,342,270 UART: [ldev] AUTHORITY.KEYID = 7
6,343,501 UART: [ldev] FE.KEYID = 1
6,353,665 UART: [ldev] Erasing FE.KEYID = 1
8,826,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,059 UART: [ldev] --
10,617,109 UART: [fwproc] Wait for Commands...
10,619,476 UART: [fwproc] Recv command 0x46574c44
10,621,572 UART: [fwproc] Recv'd Img size: 114448 bytes
12,912,949 UART: ROM Fatal Error: 0x000B0021
12,916,059 >>> mbox cmd response: failed
12,916,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,916,748 >>> mbox cmd response: failed
12,917,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,309 >>> mbox cmd response: failed
Initializing fuses
2,052,748 writing to cptra_bootfsm_go
2,242,054 UART:
2,242,424 UART: Running Caliptra ROM ...
2,243,523 UART:
7,535,266 UART: [state] CFI Enabled
7,549,428 UART: [state] LifecycleState = Unprovisioned
7,551,284 UART: [state] DebugLocked = No
7,552,528 UART: [state] WD Timer not started. Device not locked for debugging
7,556,973 UART: [kat] SHA2-256
7,736,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,747,637 UART: [kat] ++
7,748,189 UART: [kat] sha1
7,759,789 UART: [kat] SHA2-256
7,762,805 UART: [kat] SHA2-384
7,769,168 UART: [kat] SHA2-512-ACC
7,772,118 UART: [kat] ECC-384
10,215,816 UART: [kat] HMAC-384Kdf
10,228,242 UART: [kat] LMS
10,757,731 UART: [kat] --
10,761,252 UART: [cold-reset] ++
10,762,158 UART: [fht] FHT @ 0x50003400
10,771,620 UART: [idev] ++
10,772,190 UART: [idev] CDI.KEYID = 6
10,773,117 UART: [idev] SUBJECT.KEYID = 7
10,774,276 UART: [idev] UDS.KEYID = 0
10,776,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,920,433 UART: [idev] Erasing UDS.KEYID = 0
13,249,040 UART: [idev] Sha1 KeyId Algorithm
13,271,939 UART: [idev] --
13,276,073 UART: [ldev] ++
13,276,649 UART: [ldev] CDI.KEYID = 6
13,277,556 UART: [ldev] SUBJECT.KEYID = 5
13,278,715 UART: [ldev] AUTHORITY.KEYID = 7
13,279,942 UART: [ldev] FE.KEYID = 1
13,289,991 UART: [ldev] Erasing FE.KEYID = 1
15,766,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,483,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,499,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,515,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,531,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,551,930 UART: [ldev] --
17,556,868 UART: [fwproc] Wait for Commands...
17,558,854 UART: [fwproc] Recv command 0x46574c44
17,560,957 UART: [fwproc] Recv'd Img size: 114448 bytes
20,965,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,032,370 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,101,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,419,084 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,926 writing to cptra_bootfsm_go
3,698,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,698,599 >>> mbox cmd response: failed
12,699,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,699,519 >>> mbox cmd response: failed
12,699,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,700,076 >>> mbox cmd response: failed
Initializing fuses
2,066,256 writing to cptra_bootfsm_go
10,865,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,442,126 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,419,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,631,732 >>> mbox cmd response: failed
12,632,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,632,661 >>> mbox cmd response: failed
12,632,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,633,224 >>> mbox cmd response: failed
Initializing fuses
2,065,775 writing to cptra_bootfsm_go
5,503,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,801,227 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,759,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,873,593 >>> mbox cmd response: failed
12,874,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,874,507 >>> mbox cmd response: failed
12,874,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,875,065 >>> mbox cmd response: failed
Initializing fuses
2,058,502 writing to cptra_bootfsm_go
10,739,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,925,340 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,145 UART: [kat] SHA2-256
882,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,191 UART: [kat] ++
886,343 UART: [kat] sha1
890,447 UART: [kat] SHA2-256
892,385 UART: [kat] SHA2-384
895,156 UART: [kat] SHA2-512-ACC
897,057 UART: [kat] ECC-384
902,568 UART: [kat] HMAC-384Kdf
907,130 UART: [kat] LMS
1,475,326 UART: [kat] --
1,475,915 UART: [cold-reset] ++
1,476,443 UART: [fht] Storing FHT @ 0x50003400
1,479,226 UART: [idev] ++
1,479,394 UART: [idev] CDI.KEYID = 6
1,479,754 UART: [idev] SUBJECT.KEYID = 7
1,480,178 UART: [idev] UDS.KEYID = 0
1,480,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,148 UART: [idev] Erasing UDS.KEYID = 0
1,504,640 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,394 UART: [idev] --
1,514,311 UART: [ldev] ++
1,514,479 UART: [ldev] CDI.KEYID = 6
1,514,842 UART: [ldev] SUBJECT.KEYID = 5
1,515,268 UART: [ldev] AUTHORITY.KEYID = 7
1,515,731 UART: [ldev] FE.KEYID = 1
1,521,091 UART: [ldev] Erasing FE.KEYID = 1
1,546,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,318 UART: [ldev] --
1,585,605 UART: [fwproc] Waiting for Commands...
1,586,254 UART: [fwproc] Received command 0x46574c44
1,587,045 UART: [fwproc] Received Image of size 114448 bytes
1,853,979 UART: ROM Fatal Error: 0x000B0021
1,855,136 >>> mbox cmd response: failed
1,855,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,142 >>> mbox cmd response: failed
1,855,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,871 UART: [kat] SHA2-256
881,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,917 UART: [kat] ++
886,069 UART: [kat] sha1
890,207 UART: [kat] SHA2-256
892,145 UART: [kat] SHA2-384
894,930 UART: [kat] SHA2-512-ACC
896,831 UART: [kat] ECC-384
902,226 UART: [kat] HMAC-384Kdf
906,730 UART: [kat] LMS
1,474,926 UART: [kat] --
1,475,609 UART: [cold-reset] ++
1,476,005 UART: [fht] Storing FHT @ 0x50003400
1,478,732 UART: [idev] ++
1,478,900 UART: [idev] CDI.KEYID = 6
1,479,260 UART: [idev] SUBJECT.KEYID = 7
1,479,684 UART: [idev] UDS.KEYID = 0
1,480,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,842 UART: [idev] Erasing UDS.KEYID = 0
1,503,946 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,620 UART: [idev] --
1,513,567 UART: [ldev] ++
1,513,735 UART: [ldev] CDI.KEYID = 6
1,514,098 UART: [ldev] SUBJECT.KEYID = 5
1,514,524 UART: [ldev] AUTHORITY.KEYID = 7
1,514,987 UART: [ldev] FE.KEYID = 1
1,520,047 UART: [ldev] Erasing FE.KEYID = 1
1,545,382 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,272 UART: [ldev] --
1,584,545 UART: [fwproc] Waiting for Commands...
1,585,352 UART: [fwproc] Received command 0x46574c44
1,586,143 UART: [fwproc] Received Image of size 114448 bytes
2,885,481 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,969 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,326 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,706,423 >>> mbox cmd response: failed
1,706,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,429 >>> mbox cmd response: failed
1,706,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,435 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,786 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,462 UART: [kat] SHA2-256
892,400 UART: [kat] SHA2-384
895,165 UART: [kat] SHA2-512-ACC
897,066 UART: [kat] ECC-384
902,425 UART: [kat] HMAC-384Kdf
907,025 UART: [kat] LMS
1,475,221 UART: [kat] --
1,476,090 UART: [cold-reset] ++
1,476,622 UART: [fht] Storing FHT @ 0x50003400
1,479,435 UART: [idev] ++
1,479,603 UART: [idev] CDI.KEYID = 6
1,479,963 UART: [idev] SUBJECT.KEYID = 7
1,480,387 UART: [idev] UDS.KEYID = 0
1,480,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,291 UART: [idev] Erasing UDS.KEYID = 0
1,505,273 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,821 UART: [idev] --
1,515,000 UART: [ldev] ++
1,515,168 UART: [ldev] CDI.KEYID = 6
1,515,531 UART: [ldev] SUBJECT.KEYID = 5
1,515,957 UART: [ldev] AUTHORITY.KEYID = 7
1,516,420 UART: [ldev] FE.KEYID = 1
1,521,490 UART: [ldev] Erasing FE.KEYID = 1
1,547,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,055 UART: [ldev] --
1,586,506 UART: [fwproc] Waiting for Commands...
1,587,251 UART: [fwproc] Received command 0x46574c44
1,588,042 UART: [fwproc] Received Image of size 114448 bytes
1,854,284 UART: ROM Fatal Error: 0x000B0021
1,855,441 >>> mbox cmd response: failed
1,855,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,447 >>> mbox cmd response: failed
1,855,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,306 UART: [kat] SHA2-256
882,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,352 UART: [kat] ++
886,504 UART: [kat] sha1
890,904 UART: [kat] SHA2-256
892,842 UART: [kat] SHA2-384
895,637 UART: [kat] SHA2-512-ACC
897,538 UART: [kat] ECC-384
903,227 UART: [kat] HMAC-384Kdf
907,867 UART: [kat] LMS
1,476,063 UART: [kat] --
1,476,866 UART: [cold-reset] ++
1,477,232 UART: [fht] Storing FHT @ 0x50003400
1,480,017 UART: [idev] ++
1,480,185 UART: [idev] CDI.KEYID = 6
1,480,545 UART: [idev] SUBJECT.KEYID = 7
1,480,969 UART: [idev] UDS.KEYID = 0
1,481,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,967 UART: [idev] Erasing UDS.KEYID = 0
1,505,791 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,507 UART: [idev] --
1,515,562 UART: [ldev] ++
1,515,730 UART: [ldev] CDI.KEYID = 6
1,516,093 UART: [ldev] SUBJECT.KEYID = 5
1,516,519 UART: [ldev] AUTHORITY.KEYID = 7
1,516,982 UART: [ldev] FE.KEYID = 1
1,522,326 UART: [ldev] Erasing FE.KEYID = 1
1,547,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,481 UART: [ldev] --
1,586,886 UART: [fwproc] Waiting for Commands...
1,587,701 UART: [fwproc] Received command 0x46574c44
1,588,492 UART: [fwproc] Received Image of size 114448 bytes
2,887,954 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,720 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,072 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,035 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,707,980 >>> mbox cmd response: failed
1,707,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,986 >>> mbox cmd response: failed
1,707,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,385 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
893,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,511 UART: [kat] ++
897,663 UART: [kat] sha1
901,841 UART: [kat] SHA2-256
903,781 UART: [kat] SHA2-384
906,474 UART: [kat] SHA2-512-ACC
908,375 UART: [kat] ECC-384
917,964 UART: [kat] HMAC-384Kdf
922,490 UART: [kat] LMS
1,170,818 UART: [kat] --
1,171,735 UART: [cold-reset] ++
1,172,113 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,524 UART: [idev] Erasing UDS.KEYID = 0
1,200,089 UART: [idev] Sha1 KeyId Algorithm
1,208,635 UART: [idev] --
1,209,677 UART: [ldev] ++
1,209,845 UART: [ldev] CDI.KEYID = 6
1,210,208 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,655 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,753 UART: [ldev] --
1,282,130 UART: [fwproc] Wait for Commands...
1,282,832 UART: [fwproc] Recv command 0x46574c44
1,283,560 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,242 UART: ROM Fatal Error: 0x000B0021
1,550,399 >>> mbox cmd response: failed
1,550,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,405 >>> mbox cmd response: failed
1,550,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
893,092 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,217 UART: [kat] ++
897,369 UART: [kat] sha1
901,575 UART: [kat] SHA2-256
903,515 UART: [kat] SHA2-384
906,166 UART: [kat] SHA2-512-ACC
908,067 UART: [kat] ECC-384
917,592 UART: [kat] HMAC-384Kdf
922,132 UART: [kat] LMS
1,170,460 UART: [kat] --
1,171,213 UART: [cold-reset] ++
1,171,685 UART: [fht] FHT @ 0x50003400
1,174,234 UART: [idev] ++
1,174,402 UART: [idev] CDI.KEYID = 6
1,174,762 UART: [idev] SUBJECT.KEYID = 7
1,175,186 UART: [idev] UDS.KEYID = 0
1,175,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,302 UART: [idev] Erasing UDS.KEYID = 0
1,200,087 UART: [idev] Sha1 KeyId Algorithm
1,208,535 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,886 UART: [ldev] SUBJECT.KEYID = 5
1,210,312 UART: [ldev] AUTHORITY.KEYID = 7
1,210,775 UART: [ldev] FE.KEYID = 1
1,215,699 UART: [ldev] Erasing FE.KEYID = 1
1,241,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,541 UART: [ldev] --
1,280,926 UART: [fwproc] Wait for Commands...
1,281,720 UART: [fwproc] Recv command 0x46574c44
1,282,448 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,539 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,044 >>> mbox cmd response: failed
1,406,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,050 >>> mbox cmd response: failed
1,406,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,033 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,922 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
901,952 UART: [kat] SHA2-256
903,892 UART: [kat] SHA2-384
906,649 UART: [kat] SHA2-512-ACC
908,550 UART: [kat] ECC-384
918,373 UART: [kat] HMAC-384Kdf
923,097 UART: [kat] LMS
1,171,425 UART: [kat] --
1,172,330 UART: [cold-reset] ++
1,172,710 UART: [fht] FHT @ 0x50003400
1,175,397 UART: [idev] ++
1,175,565 UART: [idev] CDI.KEYID = 6
1,175,925 UART: [idev] SUBJECT.KEYID = 7
1,176,349 UART: [idev] UDS.KEYID = 0
1,176,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,461 UART: [idev] Erasing UDS.KEYID = 0
1,201,852 UART: [idev] Sha1 KeyId Algorithm
1,210,180 UART: [idev] --
1,211,142 UART: [ldev] ++
1,211,310 UART: [ldev] CDI.KEYID = 6
1,211,673 UART: [ldev] SUBJECT.KEYID = 5
1,212,099 UART: [ldev] AUTHORITY.KEYID = 7
1,212,562 UART: [ldev] FE.KEYID = 1
1,218,128 UART: [ldev] Erasing FE.KEYID = 1
1,244,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,216 UART: [ldev] --
1,283,521 UART: [fwproc] Wait for Commands...
1,284,271 UART: [fwproc] Recv command 0x46574c44
1,284,999 UART: [fwproc] Recv'd Img size: 114448 bytes
1,550,931 UART: ROM Fatal Error: 0x000B0021
1,552,088 >>> mbox cmd response: failed
1,552,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,094 >>> mbox cmd response: failed
1,552,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,010 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
893,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,026 UART: [kat] ++
898,178 UART: [kat] sha1
902,464 UART: [kat] SHA2-256
904,404 UART: [kat] SHA2-384
907,239 UART: [kat] SHA2-512-ACC
909,140 UART: [kat] ECC-384
918,675 UART: [kat] HMAC-384Kdf
923,231 UART: [kat] LMS
1,171,559 UART: [kat] --
1,172,400 UART: [cold-reset] ++
1,172,882 UART: [fht] FHT @ 0x50003400
1,175,541 UART: [idev] ++
1,175,709 UART: [idev] CDI.KEYID = 6
1,176,069 UART: [idev] SUBJECT.KEYID = 7
1,176,493 UART: [idev] UDS.KEYID = 0
1,176,838 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,567 UART: [idev] Erasing UDS.KEYID = 0
1,201,632 UART: [idev] Sha1 KeyId Algorithm
1,210,310 UART: [idev] --
1,211,400 UART: [ldev] ++
1,211,568 UART: [ldev] CDI.KEYID = 6
1,211,931 UART: [ldev] SUBJECT.KEYID = 5
1,212,357 UART: [ldev] AUTHORITY.KEYID = 7
1,212,820 UART: [ldev] FE.KEYID = 1
1,218,242 UART: [ldev] Erasing FE.KEYID = 1
1,244,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,300 UART: [ldev] --
1,283,805 UART: [fwproc] Wait for Commands...
1,284,515 UART: [fwproc] Recv command 0x46574c44
1,285,243 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,719 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,734 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,407,479 >>> mbox cmd response: failed
1,407,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,485 >>> mbox cmd response: failed
1,407,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,507 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,496 UART: [state] LifecycleState = Unprovisioned
85,151 UART: [state] DebugLocked = No
85,655 UART: [state] WD Timer not started. Device not locked for debugging
86,856 UART: [kat] SHA2-256
890,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,535 UART: [kat] ++
894,687 UART: [kat] sha1
899,007 UART: [kat] SHA2-256
900,947 UART: [kat] SHA2-384
903,746 UART: [kat] SHA2-512-ACC
905,647 UART: [kat] ECC-384
915,602 UART: [kat] HMAC-384Kdf
920,214 UART: [kat] LMS
1,168,526 UART: [kat] --
1,169,425 UART: [cold-reset] ++
1,169,781 UART: [fht] FHT @ 0x50003400
1,172,537 UART: [idev] ++
1,172,705 UART: [idev] CDI.KEYID = 6
1,173,066 UART: [idev] SUBJECT.KEYID = 7
1,173,491 UART: [idev] UDS.KEYID = 0
1,173,837 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,198,569 UART: [idev] Sha1 KeyId Algorithm
1,207,355 UART: [idev] --
1,208,240 UART: [ldev] ++
1,208,408 UART: [ldev] CDI.KEYID = 6
1,208,772 UART: [ldev] SUBJECT.KEYID = 5
1,209,199 UART: [ldev] AUTHORITY.KEYID = 7
1,209,662 UART: [ldev] FE.KEYID = 1
1,214,718 UART: [ldev] Erasing FE.KEYID = 1
1,241,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,576 UART: [ldev] --
1,279,970 UART: [fwproc] Wait for Commands...
1,280,687 UART: [fwproc] Recv command 0x46574c44
1,281,420 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,311 UART: ROM Fatal Error: 0x000B0021
1,549,468 >>> mbox cmd response: failed
1,549,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,474 >>> mbox cmd response: failed
1,549,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,480 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,419 UART: [kat] SHA2-256
901,359 UART: [kat] SHA2-384
904,024 UART: [kat] SHA2-512-ACC
905,925 UART: [kat] ECC-384
915,430 UART: [kat] HMAC-384Kdf
919,908 UART: [kat] LMS
1,168,220 UART: [kat] --
1,169,071 UART: [cold-reset] ++
1,169,557 UART: [fht] FHT @ 0x50003400
1,172,245 UART: [idev] ++
1,172,413 UART: [idev] CDI.KEYID = 6
1,172,774 UART: [idev] SUBJECT.KEYID = 7
1,173,199 UART: [idev] UDS.KEYID = 0
1,173,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,559 UART: [idev] Erasing UDS.KEYID = 0
1,198,289 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,207,936 UART: [ldev] ++
1,208,104 UART: [ldev] CDI.KEYID = 6
1,208,468 UART: [ldev] SUBJECT.KEYID = 5
1,208,895 UART: [ldev] AUTHORITY.KEYID = 7
1,209,358 UART: [ldev] FE.KEYID = 1
1,214,908 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,416 UART: [ldev] --
1,280,776 UART: [fwproc] Wait for Commands...
1,281,407 UART: [fwproc] Recv command 0x46574c44
1,282,140 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,843 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,399,559 >>> mbox cmd response: failed
1,399,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,399,565 >>> mbox cmd response: failed
1,399,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,399,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,598 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,549 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,054 UART: [kat] SHA2-256
901,994 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,169,724 UART: [cold-reset] ++
1,170,184 UART: [fht] FHT @ 0x50003400
1,172,950 UART: [idev] ++
1,173,118 UART: [idev] CDI.KEYID = 6
1,173,479 UART: [idev] SUBJECT.KEYID = 7
1,173,904 UART: [idev] UDS.KEYID = 0
1,174,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,892 UART: [idev] Erasing UDS.KEYID = 0
1,198,506 UART: [idev] Sha1 KeyId Algorithm
1,207,384 UART: [idev] --
1,208,481 UART: [ldev] ++
1,208,649 UART: [ldev] CDI.KEYID = 6
1,209,013 UART: [ldev] SUBJECT.KEYID = 5
1,209,440 UART: [ldev] AUTHORITY.KEYID = 7
1,209,903 UART: [ldev] FE.KEYID = 1
1,215,065 UART: [ldev] Erasing FE.KEYID = 1
1,241,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,167 UART: [ldev] --
1,280,635 UART: [fwproc] Wait for Commands...
1,281,312 UART: [fwproc] Recv command 0x46574c44
1,282,045 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,230 UART: ROM Fatal Error: 0x000B0021
1,549,387 >>> mbox cmd response: failed
1,549,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,393 >>> mbox cmd response: failed
1,549,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,399 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,883 UART: [kat] SHA2-512-ACC
906,784 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,065 UART: [kat] LMS
1,169,377 UART: [kat] --
1,170,306 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,174,634 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,198,680 UART: [idev] Sha1 KeyId Algorithm
1,207,548 UART: [idev] --
1,208,457 UART: [ldev] ++
1,208,625 UART: [ldev] CDI.KEYID = 6
1,208,989 UART: [ldev] SUBJECT.KEYID = 5
1,209,416 UART: [ldev] AUTHORITY.KEYID = 7
1,209,879 UART: [ldev] FE.KEYID = 1
1,215,229 UART: [ldev] Erasing FE.KEYID = 1
1,241,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,745 UART: [ldev] --
1,281,013 UART: [fwproc] Wait for Commands...
1,281,608 UART: [fwproc] Recv command 0x46574c44
1,282,341 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,438 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,322 >>> mbox cmd response: failed
1,402,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,328 >>> mbox cmd response: failed
1,402,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,301 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,279 UART:
192,635 UART: Running Caliptra ROM ...
193,823 UART:
193,979 UART: [state] CFI Enabled
263,550 UART: [state] LifecycleState = Unprovisioned
265,467 UART: [state] DebugLocked = No
267,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,425 UART: [kat] SHA2-256
442,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,650 UART: [kat] ++
453,184 UART: [kat] sha1
463,871 UART: [kat] SHA2-256
466,558 UART: [kat] SHA2-384
472,105 UART: [kat] SHA2-512-ACC
474,442 UART: [kat] ECC-384
2,766,166 UART: [kat] HMAC-384Kdf
2,777,929 UART: [kat] LMS
3,968,216 UART: [kat] --
3,973,348 UART: [cold-reset] ++
3,974,962 UART: [fht] Storing FHT @ 0x50003400
3,987,909 UART: [idev] ++
3,988,476 UART: [idev] CDI.KEYID = 6
3,989,455 UART: [idev] SUBJECT.KEYID = 7
3,990,671 UART: [idev] UDS.KEYID = 0
3,993,279 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,111 UART: [idev] Erasing UDS.KEYID = 0
7,326,274 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,819 UART: [idev] --
7,352,655 UART: [ldev] ++
7,353,227 UART: [ldev] CDI.KEYID = 6
7,354,189 UART: [ldev] SUBJECT.KEYID = 5
7,355,513 UART: [ldev] AUTHORITY.KEYID = 7
7,356,769 UART: [ldev] FE.KEYID = 1
7,402,779 UART: [ldev] Erasing FE.KEYID = 1
10,734,198 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,170 UART: [ldev] --
13,095,197 UART: [fwproc] Waiting for Commands...
13,097,620 UART: [fwproc] Received command 0x46574c44
13,099,810 UART: [fwproc] Received Image of size 114124 bytes
16,043,797 UART: ROM Fatal Error: 0x000B0022
16,047,258 >>> mbox cmd response: failed
16,047,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,048,017 >>> mbox cmd response: failed
16,048,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,048,587 >>> mbox cmd response: failed
Initializing fuses
2,055,390 writing to cptra_bootfsm_go
2,244,701 UART:
2,245,041 UART: Running Caliptra ROM ...
2,246,094 UART:
2,246,248 UART: [state] CFI Enabled
2,305,420 UART: [state] LifecycleState = Unprovisioned
2,307,360 UART: [state] DebugLocked = No
2,309,988 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,314,412 UART: [kat] SHA2-256
2,484,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,643 UART: [kat] ++
2,495,107 UART: [kat] sha1
2,505,076 UART: [kat] SHA2-256
2,507,790 UART: [kat] SHA2-384
2,513,975 UART: [kat] SHA2-512-ACC
2,516,343 UART: [kat] ECC-384
4,808,843 UART: [kat] HMAC-384Kdf
4,841,361 UART: [kat] LMS
6,031,683 UART: [kat] --
6,037,540 UART: [cold-reset] ++
6,039,814 UART: [fht] Storing FHT @ 0x50003400
6,050,876 UART: [idev] ++
6,051,449 UART: [idev] CDI.KEYID = 6
6,052,407 UART: [idev] SUBJECT.KEYID = 7
6,053,628 UART: [idev] UDS.KEYID = 0
6,056,125 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,199,798 UART: [idev] Erasing UDS.KEYID = 0
9,388,134 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,006 UART: [idev] --
9,414,977 UART: [ldev] ++
9,415,547 UART: [ldev] CDI.KEYID = 6
9,416,486 UART: [ldev] SUBJECT.KEYID = 5
9,417,751 UART: [ldev] AUTHORITY.KEYID = 7
9,418,991 UART: [ldev] FE.KEYID = 1
9,461,996 UART: [ldev] Erasing FE.KEYID = 1
12,796,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,109,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,124,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,139,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,153,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,173,450 UART: [ldev] --
15,177,747 UART: [fwproc] Waiting for Commands...
15,180,335 UART: [fwproc] Received command 0x46574c44
15,182,523 UART: [fwproc] Received Image of size 114124 bytes
19,232,693 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,310,092 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,378,974 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,696,760 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,787,305 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,810,653 >>> mbox cmd response: failed
15,811,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,811,644 >>> mbox cmd response: failed
15,811,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,812,196 >>> mbox cmd response: failed
Initializing fuses
2,056,004 writing to cptra_bootfsm_go
5,847,600 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,924,260 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,382 UART:
192,732 UART: Running Caliptra ROM ...
193,866 UART:
603,767 UART: [state] CFI Enabled
620,715 UART: [state] LifecycleState = Unprovisioned
622,646 UART: [state] DebugLocked = No
625,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,278 UART: [kat] SHA2-256
800,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,559 UART: [kat] ++
811,009 UART: [kat] sha1
820,884 UART: [kat] SHA2-256
823,629 UART: [kat] SHA2-384
829,856 UART: [kat] SHA2-512-ACC
832,209 UART: [kat] ECC-384
3,116,526 UART: [kat] HMAC-384Kdf
3,128,828 UART: [kat] LMS
4,318,933 UART: [kat] --
4,324,892 UART: [cold-reset] ++
4,327,367 UART: [fht] Storing FHT @ 0x50003400
4,340,098 UART: [idev] ++
4,340,717 UART: [idev] CDI.KEYID = 6
4,341,600 UART: [idev] SUBJECT.KEYID = 7
4,342,869 UART: [idev] UDS.KEYID = 0
4,345,643 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,489,058 UART: [idev] Erasing UDS.KEYID = 0
7,633,342 UART: [idev] Using Sha1 for KeyId Algorithm
7,655,007 UART: [idev] --
7,659,492 UART: [ldev] ++
7,660,057 UART: [ldev] CDI.KEYID = 6
7,661,023 UART: [ldev] SUBJECT.KEYID = 5
7,662,239 UART: [ldev] AUTHORITY.KEYID = 7
7,663,535 UART: [ldev] FE.KEYID = 1
7,674,535 UART: [ldev] Erasing FE.KEYID = 1
10,961,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,349 UART: [ldev] --
13,323,351 UART: [fwproc] Waiting for Commands...
13,325,293 UART: [fwproc] Received command 0x46574c44
13,327,533 UART: [fwproc] Received Image of size 114124 bytes
16,271,077 UART: ROM Fatal Error: 0x000B0022
16,274,475 >>> mbox cmd response: failed
16,274,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,275,142 >>> mbox cmd response: failed
16,275,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,275,737 >>> mbox cmd response: failed
Initializing fuses
2,053,812 writing to cptra_bootfsm_go
2,243,147 UART:
2,243,503 UART: Running Caliptra ROM ...
2,244,640 UART:
4,182,142 UART: [state] CFI Enabled
4,198,330 UART: [state] LifecycleState = Unprovisioned
4,200,289 UART: [state] DebugLocked = No
4,201,857 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,207,465 UART: [kat] SHA2-256
4,377,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,735 UART: [kat] ++
4,388,225 UART: [kat] sha1
4,399,281 UART: [kat] SHA2-256
4,401,982 UART: [kat] SHA2-384
4,408,835 UART: [kat] SHA2-512-ACC
4,411,188 UART: [kat] ECC-384
6,696,526 UART: [kat] HMAC-384Kdf
6,708,686 UART: [kat] LMS
7,898,783 UART: [kat] --
7,903,423 UART: [cold-reset] ++
7,905,408 UART: [fht] Storing FHT @ 0x50003400
7,917,049 UART: [idev] ++
7,917,664 UART: [idev] CDI.KEYID = 6
7,918,602 UART: [idev] SUBJECT.KEYID = 7
7,919,827 UART: [idev] UDS.KEYID = 0
7,922,225 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,065,521 UART: [idev] Erasing UDS.KEYID = 0
11,207,947 UART: [idev] Using Sha1 for KeyId Algorithm
11,229,977 UART: [idev] --
11,233,436 UART: [ldev] ++
11,234,061 UART: [ldev] CDI.KEYID = 6
11,235,024 UART: [ldev] SUBJECT.KEYID = 5
11,236,213 UART: [ldev] AUTHORITY.KEYID = 7
11,237,453 UART: [ldev] FE.KEYID = 1
11,247,400 UART: [ldev] Erasing FE.KEYID = 1
14,532,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,825,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,839,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,854,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,869,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,887,282 UART: [ldev] --
16,891,256 UART: [fwproc] Waiting for Commands...
16,894,605 UART: [fwproc] Received command 0x46574c44
16,896,794 UART: [fwproc] Received Image of size 114124 bytes
20,947,349 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,019,670 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,088,576 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,405,022 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
4,125,753 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,051,717 >>> mbox cmd response: failed
16,052,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,052,826 >>> mbox cmd response: failed
16,053,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,053,396 >>> mbox cmd response: failed
Initializing fuses
2,057,519 writing to cptra_bootfsm_go
7,943,131 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,880,306 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,215 UART:
192,605 UART: Running Caliptra ROM ...
193,719 UART:
193,858 UART: [state] CFI Enabled
262,967 UART: [state] LifecycleState = Unprovisioned
264,845 UART: [state] DebugLocked = No
267,225 UART: [state] WD Timer not started. Device not locked for debugging
271,386 UART: [kat] SHA2-256
450,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,058 UART: [kat] ++
462,513 UART: [kat] sha1
473,873 UART: [kat] SHA2-256
476,883 UART: [kat] SHA2-384
481,946 UART: [kat] SHA2-512-ACC
484,884 UART: [kat] ECC-384
2,943,973 UART: [kat] HMAC-384Kdf
2,969,231 UART: [kat] LMS
3,498,667 UART: [kat] --
3,503,117 UART: [cold-reset] ++
3,504,196 UART: [fht] FHT @ 0x50003400
3,514,855 UART: [idev] ++
3,515,422 UART: [idev] CDI.KEYID = 6
3,516,441 UART: [idev] SUBJECT.KEYID = 7
3,517,544 UART: [idev] UDS.KEYID = 0
3,520,407 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,544 UART: [idev] Erasing UDS.KEYID = 0
6,026,022 UART: [idev] Sha1 KeyId Algorithm
6,049,528 UART: [idev] --
6,054,453 UART: [ldev] ++
6,055,067 UART: [ldev] CDI.KEYID = 6
6,055,989 UART: [ldev] SUBJECT.KEYID = 5
6,057,173 UART: [ldev] AUTHORITY.KEYID = 7
6,058,415 UART: [ldev] FE.KEYID = 1
6,098,280 UART: [ldev] Erasing FE.KEYID = 1
8,600,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,913 UART: [ldev] --
10,409,988 UART: [fwproc] Wait for Commands...
10,411,491 UART: [fwproc] Recv command 0x46574c44
10,413,584 UART: [fwproc] Recv'd Img size: 114448 bytes
12,694,013 UART: ROM Fatal Error: 0x000B0022
12,697,155 >>> mbox cmd response: failed
12,697,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,697,863 >>> mbox cmd response: failed
12,698,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,698,482 >>> mbox cmd response: failed
Initializing fuses
2,057,024 writing to cptra_bootfsm_go
2,246,355 UART:
2,246,705 UART: Running Caliptra ROM ...
2,247,844 UART:
2,248,009 UART: [state] CFI Enabled
2,321,104 UART: [state] LifecycleState = Unprovisioned
2,322,986 UART: [state] DebugLocked = No
2,325,193 UART: [state] WD Timer not started. Device not locked for debugging
2,329,587 UART: [kat] SHA2-256
2,508,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,520,261 UART: [kat] ++
2,520,823 UART: [kat] sha1
2,531,991 UART: [kat] SHA2-256
2,535,010 UART: [kat] SHA2-384
2,541,865 UART: [kat] SHA2-512-ACC
2,544,810 UART: [kat] ECC-384
5,006,627 UART: [kat] HMAC-384Kdf
5,027,616 UART: [kat] LMS
5,557,076 UART: [kat] --
5,561,879 UART: [cold-reset] ++
5,563,974 UART: [fht] FHT @ 0x50003400
5,574,522 UART: [idev] ++
5,575,092 UART: [idev] CDI.KEYID = 6
5,576,019 UART: [idev] SUBJECT.KEYID = 7
5,577,237 UART: [idev] UDS.KEYID = 0
5,579,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,723,691 UART: [idev] Erasing UDS.KEYID = 0
8,081,919 UART: [idev] Sha1 KeyId Algorithm
8,105,423 UART: [idev] --
8,110,063 UART: [ldev] ++
8,110,640 UART: [ldev] CDI.KEYID = 6
8,111,524 UART: [ldev] SUBJECT.KEYID = 5
8,112,735 UART: [ldev] AUTHORITY.KEYID = 7
8,113,967 UART: [ldev] FE.KEYID = 1
8,154,232 UART: [ldev] Erasing FE.KEYID = 1
10,656,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,375,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,391,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,406,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,422,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,442,716 UART: [ldev] --
12,447,877 UART: [fwproc] Wait for Commands...
12,450,684 UART: [fwproc] Recv command 0x46574c44
12,452,802 UART: [fwproc] Recv'd Img size: 114448 bytes
15,852,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,930,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,999,271 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,318,144 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,359,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,486,889 >>> mbox cmd response: failed
12,487,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,488,196 >>> mbox cmd response: failed
12,488,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,488,757 >>> mbox cmd response: failed
Initializing fuses
2,055,076 writing to cptra_bootfsm_go
5,434,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,124,515 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,494 writing to cptra_bootfsm_go
192,671 UART:
193,033 UART: Running Caliptra ROM ...
194,245 UART:
603,747 UART: [state] CFI Enabled
615,892 UART: [state] LifecycleState = Unprovisioned
617,789 UART: [state] DebugLocked = No
619,270 UART: [state] WD Timer not started. Device not locked for debugging
622,940 UART: [kat] SHA2-256
802,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,625 UART: [kat] ++
814,152 UART: [kat] sha1
825,054 UART: [kat] SHA2-256
828,054 UART: [kat] SHA2-384
833,110 UART: [kat] SHA2-512-ACC
836,044 UART: [kat] ECC-384
3,279,228 UART: [kat] HMAC-384Kdf
3,291,077 UART: [kat] LMS
3,820,559 UART: [kat] --
3,825,538 UART: [cold-reset] ++
3,827,176 UART: [fht] FHT @ 0x50003400
3,837,282 UART: [idev] ++
3,837,885 UART: [idev] CDI.KEYID = 6
3,838,807 UART: [idev] SUBJECT.KEYID = 7
3,839,970 UART: [idev] UDS.KEYID = 0
3,842,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,541 UART: [idev] Erasing UDS.KEYID = 0
6,307,072 UART: [idev] Sha1 KeyId Algorithm
6,330,846 UART: [idev] --
6,334,840 UART: [ldev] ++
6,335,411 UART: [ldev] CDI.KEYID = 6
6,336,374 UART: [ldev] SUBJECT.KEYID = 5
6,337,534 UART: [ldev] AUTHORITY.KEYID = 7
6,338,766 UART: [ldev] FE.KEYID = 1
6,350,002 UART: [ldev] Erasing FE.KEYID = 1
8,822,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,145 UART: [ldev] --
10,611,980 UART: [fwproc] Wait for Commands...
10,614,130 UART: [fwproc] Recv command 0x46574c44
10,616,223 UART: [fwproc] Recv'd Img size: 114448 bytes
12,913,651 UART: ROM Fatal Error: 0x000B0022
12,916,787 >>> mbox cmd response: failed
12,917,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,444 >>> mbox cmd response: failed
12,917,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,918,009 >>> mbox cmd response: failed
Initializing fuses
2,060,764 writing to cptra_bootfsm_go
2,250,065 UART:
2,250,409 UART: Running Caliptra ROM ...
2,251,550 UART:
7,534,174 UART: [state] CFI Enabled
7,548,151 UART: [state] LifecycleState = Unprovisioned
7,550,046 UART: [state] DebugLocked = No
7,551,821 UART: [state] WD Timer not started. Device not locked for debugging
7,555,940 UART: [kat] SHA2-256
7,735,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,746,629 UART: [kat] ++
7,747,168 UART: [kat] sha1
7,757,739 UART: [kat] SHA2-256
7,760,806 UART: [kat] SHA2-384
7,766,951 UART: [kat] SHA2-512-ACC
7,769,891 UART: [kat] ECC-384
10,209,911 UART: [kat] HMAC-384Kdf
10,222,475 UART: [kat] LMS
10,751,923 UART: [kat] --
10,755,645 UART: [cold-reset] ++
10,757,948 UART: [fht] FHT @ 0x50003400
10,769,347 UART: [idev] ++
10,769,906 UART: [idev] CDI.KEYID = 6
10,770,786 UART: [idev] SUBJECT.KEYID = 7
10,771,996 UART: [idev] UDS.KEYID = 0
10,774,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,918,184 UART: [idev] Erasing UDS.KEYID = 0
13,245,540 UART: [idev] Sha1 KeyId Algorithm
13,269,692 UART: [idev] --
13,274,762 UART: [ldev] ++
13,275,326 UART: [ldev] CDI.KEYID = 6
13,276,205 UART: [ldev] SUBJECT.KEYID = 5
13,277,413 UART: [ldev] AUTHORITY.KEYID = 7
13,278,713 UART: [ldev] FE.KEYID = 1
13,287,711 UART: [ldev] Erasing FE.KEYID = 1
15,762,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,482,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,498,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,514,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,529,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,551,574 UART: [ldev] --
17,556,852 UART: [fwproc] Wait for Commands...
17,559,868 UART: [fwproc] Recv command 0x46574c44
17,561,908 UART: [fwproc] Recv'd Img size: 114448 bytes
20,963,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,036,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,104,847 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,422,378 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,695,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,692,463 >>> mbox cmd response: failed
12,693,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,693,395 >>> mbox cmd response: failed
12,693,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,693,958 >>> mbox cmd response: failed
Initializing fuses
2,053,450 writing to cptra_bootfsm_go
10,863,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,420,199 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,444,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,669,692 >>> mbox cmd response: failed
12,670,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,670,629 >>> mbox cmd response: failed
12,670,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,671,194 >>> mbox cmd response: failed
Initializing fuses
2,063,211 writing to cptra_bootfsm_go
5,487,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,806,391 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,766,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,892,489 >>> mbox cmd response: failed
12,893,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,893,475 >>> mbox cmd response: failed
12,893,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,894,041 >>> mbox cmd response: failed
Initializing fuses
2,055,320 writing to cptra_bootfsm_go
10,723,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,930,567 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,429 UART: [kat] SHA2-256
882,360 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,475 UART: [kat] ++
886,627 UART: [kat] sha1
890,807 UART: [kat] SHA2-256
892,745 UART: [kat] SHA2-384
895,246 UART: [kat] SHA2-512-ACC
897,147 UART: [kat] ECC-384
902,852 UART: [kat] HMAC-384Kdf
907,216 UART: [kat] LMS
1,475,412 UART: [kat] --
1,476,279 UART: [cold-reset] ++
1,476,801 UART: [fht] Storing FHT @ 0x50003400
1,479,584 UART: [idev] ++
1,479,752 UART: [idev] CDI.KEYID = 6
1,480,112 UART: [idev] SUBJECT.KEYID = 7
1,480,536 UART: [idev] UDS.KEYID = 0
1,480,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,440 UART: [idev] Erasing UDS.KEYID = 0
1,505,220 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,812 UART: [idev] --
1,515,011 UART: [ldev] ++
1,515,179 UART: [ldev] CDI.KEYID = 6
1,515,542 UART: [ldev] SUBJECT.KEYID = 5
1,515,968 UART: [ldev] AUTHORITY.KEYID = 7
1,516,431 UART: [ldev] FE.KEYID = 1
1,521,575 UART: [ldev] Erasing FE.KEYID = 1
1,547,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,124 UART: [ldev] --
1,586,523 UART: [fwproc] Waiting for Commands...
1,587,218 UART: [fwproc] Received command 0x46574c44
1,588,009 UART: [fwproc] Received Image of size 114448 bytes
1,854,461 UART: ROM Fatal Error: 0x000B0022
1,855,618 >>> mbox cmd response: failed
1,855,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,624 >>> mbox cmd response: failed
1,855,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,329 UART: [kat] SHA2-256
882,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,375 UART: [kat] ++
886,527 UART: [kat] sha1
890,753 UART: [kat] SHA2-256
892,691 UART: [kat] SHA2-384
895,520 UART: [kat] SHA2-512-ACC
897,421 UART: [kat] ECC-384
902,804 UART: [kat] HMAC-384Kdf
907,226 UART: [kat] LMS
1,475,422 UART: [kat] --
1,476,329 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,256 UART: [idev] Erasing UDS.KEYID = 0
1,504,564 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,356 UART: [idev] --
1,514,235 UART: [ldev] ++
1,514,403 UART: [ldev] CDI.KEYID = 6
1,514,766 UART: [ldev] SUBJECT.KEYID = 5
1,515,192 UART: [ldev] AUTHORITY.KEYID = 7
1,515,655 UART: [ldev] FE.KEYID = 1
1,520,775 UART: [ldev] Erasing FE.KEYID = 1
1,546,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,112 UART: [ldev] --
1,585,443 UART: [fwproc] Waiting for Commands...
1,586,130 UART: [fwproc] Received command 0x46574c44
1,586,921 UART: [fwproc] Received Image of size 114448 bytes
2,886,271 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,985 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,337 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,494 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,771 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,705,717 >>> mbox cmd response: failed
1,705,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,705,723 >>> mbox cmd response: failed
1,705,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,705,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,636 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
890,870 UART: [kat] SHA2-256
892,808 UART: [kat] SHA2-384
895,617 UART: [kat] SHA2-512-ACC
897,518 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,703 UART: [kat] LMS
1,475,899 UART: [kat] --
1,476,694 UART: [cold-reset] ++
1,477,114 UART: [fht] Storing FHT @ 0x50003400
1,479,907 UART: [idev] ++
1,480,075 UART: [idev] CDI.KEYID = 6
1,480,435 UART: [idev] SUBJECT.KEYID = 7
1,480,859 UART: [idev] UDS.KEYID = 0
1,481,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,705 UART: [idev] Erasing UDS.KEYID = 0
1,506,249 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,973 UART: [idev] --
1,516,000 UART: [ldev] ++
1,516,168 UART: [ldev] CDI.KEYID = 6
1,516,531 UART: [ldev] SUBJECT.KEYID = 5
1,516,957 UART: [ldev] AUTHORITY.KEYID = 7
1,517,420 UART: [ldev] FE.KEYID = 1
1,522,506 UART: [ldev] Erasing FE.KEYID = 1
1,548,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,137 UART: [ldev] --
1,587,640 UART: [fwproc] Waiting for Commands...
1,588,407 UART: [fwproc] Received command 0x46574c44
1,589,198 UART: [fwproc] Received Image of size 114448 bytes
1,855,352 UART: ROM Fatal Error: 0x000B0022
1,856,509 >>> mbox cmd response: failed
1,856,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,515 >>> mbox cmd response: failed
1,856,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,521 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,636 UART: [kat] SHA2-256
882,567 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,682 UART: [kat] ++
886,834 UART: [kat] sha1
890,970 UART: [kat] SHA2-256
892,908 UART: [kat] SHA2-384
895,563 UART: [kat] SHA2-512-ACC
897,464 UART: [kat] ECC-384
903,019 UART: [kat] HMAC-384Kdf
907,703 UART: [kat] LMS
1,475,899 UART: [kat] --
1,476,772 UART: [cold-reset] ++
1,477,236 UART: [fht] Storing FHT @ 0x50003400
1,479,859 UART: [idev] ++
1,480,027 UART: [idev] CDI.KEYID = 6
1,480,387 UART: [idev] SUBJECT.KEYID = 7
1,480,811 UART: [idev] UDS.KEYID = 0
1,481,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,429 UART: [idev] Erasing UDS.KEYID = 0
1,505,299 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,955 UART: [idev] --
1,515,090 UART: [ldev] ++
1,515,258 UART: [ldev] CDI.KEYID = 6
1,515,621 UART: [ldev] SUBJECT.KEYID = 5
1,516,047 UART: [ldev] AUTHORITY.KEYID = 7
1,516,510 UART: [ldev] FE.KEYID = 1
1,521,366 UART: [ldev] Erasing FE.KEYID = 1
1,546,459 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,271 UART: [ldev] --
1,585,650 UART: [fwproc] Waiting for Commands...
1,586,311 UART: [fwproc] Received command 0x46574c44
1,587,102 UART: [fwproc] Received Image of size 114448 bytes
2,885,812 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,776 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,128 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,239 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,708,010 >>> mbox cmd response: failed
1,708,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,016 >>> mbox cmd response: failed
1,708,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,701 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
893,040 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,165 UART: [kat] ++
897,317 UART: [kat] sha1
901,327 UART: [kat] SHA2-256
903,267 UART: [kat] SHA2-384
905,918 UART: [kat] SHA2-512-ACC
907,819 UART: [kat] ECC-384
917,372 UART: [kat] HMAC-384Kdf
921,896 UART: [kat] LMS
1,170,224 UART: [kat] --
1,170,901 UART: [cold-reset] ++
1,171,257 UART: [fht] FHT @ 0x50003400
1,173,944 UART: [idev] ++
1,174,112 UART: [idev] CDI.KEYID = 6
1,174,472 UART: [idev] SUBJECT.KEYID = 7
1,174,896 UART: [idev] UDS.KEYID = 0
1,175,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,948 UART: [idev] Erasing UDS.KEYID = 0
1,200,161 UART: [idev] Sha1 KeyId Algorithm
1,208,573 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,232 UART: [ldev] SUBJECT.KEYID = 5
1,210,658 UART: [ldev] AUTHORITY.KEYID = 7
1,211,121 UART: [ldev] FE.KEYID = 1
1,216,617 UART: [ldev] Erasing FE.KEYID = 1
1,242,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,543 UART: [ldev] --
1,281,818 UART: [fwproc] Wait for Commands...
1,282,562 UART: [fwproc] Recv command 0x46574c44
1,283,290 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,966 UART: ROM Fatal Error: 0x000B0022
1,550,123 >>> mbox cmd response: failed
1,550,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,129 >>> mbox cmd response: failed
1,550,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,135 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
893,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,397 UART: [kat] ++
897,549 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,492 UART: [kat] SHA2-512-ACC
908,393 UART: [kat] ECC-384
918,262 UART: [kat] HMAC-384Kdf
922,652 UART: [kat] LMS
1,170,980 UART: [kat] --
1,171,789 UART: [cold-reset] ++
1,172,201 UART: [fht] FHT @ 0x50003400
1,174,910 UART: [idev] ++
1,175,078 UART: [idev] CDI.KEYID = 6
1,175,438 UART: [idev] SUBJECT.KEYID = 7
1,175,862 UART: [idev] UDS.KEYID = 0
1,176,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,140 UART: [idev] Erasing UDS.KEYID = 0
1,201,043 UART: [idev] Sha1 KeyId Algorithm
1,209,445 UART: [idev] --
1,210,533 UART: [ldev] ++
1,210,701 UART: [ldev] CDI.KEYID = 6
1,211,064 UART: [ldev] SUBJECT.KEYID = 5
1,211,490 UART: [ldev] AUTHORITY.KEYID = 7
1,211,953 UART: [ldev] FE.KEYID = 1
1,217,081 UART: [ldev] Erasing FE.KEYID = 1
1,243,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,681 UART: [ldev] --
1,283,116 UART: [fwproc] Wait for Commands...
1,283,788 UART: [fwproc] Recv command 0x46574c44
1,284,516 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,586 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,813 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,410 >>> mbox cmd response: failed
1,406,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,416 >>> mbox cmd response: failed
1,406,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,879 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,538 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,230 UART: [state] WD Timer not started. Device not locked for debugging
87,337 UART: [kat] SHA2-256
892,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,112 UART: [kat] ++
897,264 UART: [kat] sha1
901,504 UART: [kat] SHA2-256
903,444 UART: [kat] SHA2-384
906,367 UART: [kat] SHA2-512-ACC
908,268 UART: [kat] ECC-384
917,929 UART: [kat] HMAC-384Kdf
922,419 UART: [kat] LMS
1,170,747 UART: [kat] --
1,171,690 UART: [cold-reset] ++
1,172,136 UART: [fht] FHT @ 0x50003400
1,174,877 UART: [idev] ++
1,175,045 UART: [idev] CDI.KEYID = 6
1,175,405 UART: [idev] SUBJECT.KEYID = 7
1,175,829 UART: [idev] UDS.KEYID = 0
1,176,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,637 UART: [idev] Erasing UDS.KEYID = 0
1,200,952 UART: [idev] Sha1 KeyId Algorithm
1,209,262 UART: [idev] --
1,210,340 UART: [ldev] ++
1,210,508 UART: [ldev] CDI.KEYID = 6
1,210,871 UART: [ldev] SUBJECT.KEYID = 5
1,211,297 UART: [ldev] AUTHORITY.KEYID = 7
1,211,760 UART: [ldev] FE.KEYID = 1
1,216,844 UART: [ldev] Erasing FE.KEYID = 1
1,242,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,716 UART: [ldev] --
1,282,227 UART: [fwproc] Wait for Commands...
1,282,807 UART: [fwproc] Recv command 0x46574c44
1,283,535 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,403 UART: ROM Fatal Error: 0x000B0022
1,549,560 >>> mbox cmd response: failed
1,549,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,566 >>> mbox cmd response: failed
1,549,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
893,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,680 UART: [kat] ++
897,832 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,489 UART: [kat] HMAC-384Kdf
923,079 UART: [kat] LMS
1,171,407 UART: [kat] --
1,171,974 UART: [cold-reset] ++
1,172,486 UART: [fht] FHT @ 0x50003400
1,175,267 UART: [idev] ++
1,175,435 UART: [idev] CDI.KEYID = 6
1,175,795 UART: [idev] SUBJECT.KEYID = 7
1,176,219 UART: [idev] UDS.KEYID = 0
1,176,564 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,269 UART: [idev] Erasing UDS.KEYID = 0
1,200,798 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,402 UART: [ldev] ++
1,210,570 UART: [ldev] CDI.KEYID = 6
1,210,933 UART: [ldev] SUBJECT.KEYID = 5
1,211,359 UART: [ldev] AUTHORITY.KEYID = 7
1,211,822 UART: [ldev] FE.KEYID = 1
1,217,554 UART: [ldev] Erasing FE.KEYID = 1
1,244,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,278 UART: [ldev] --
1,283,727 UART: [fwproc] Wait for Commands...
1,284,495 UART: [fwproc] Recv command 0x46574c44
1,285,223 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,635 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,564 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,406,369 >>> mbox cmd response: failed
1,406,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,375 >>> mbox cmd response: failed
1,406,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,381 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,850 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,567 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,107 UART: [kat] ++
895,259 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,288 UART: [kat] SHA2-512-ACC
906,189 UART: [kat] ECC-384
916,226 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,117 UART: [cold-reset] ++
1,170,669 UART: [fht] FHT @ 0x50003400
1,173,421 UART: [idev] ++
1,173,589 UART: [idev] CDI.KEYID = 6
1,173,950 UART: [idev] SUBJECT.KEYID = 7
1,174,375 UART: [idev] UDS.KEYID = 0
1,174,721 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,431 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,207,741 UART: [idev] --
1,208,956 UART: [ldev] ++
1,209,124 UART: [ldev] CDI.KEYID = 6
1,209,488 UART: [ldev] SUBJECT.KEYID = 5
1,209,915 UART: [ldev] AUTHORITY.KEYID = 7
1,210,378 UART: [ldev] FE.KEYID = 1
1,215,508 UART: [ldev] Erasing FE.KEYID = 1
1,241,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,368 UART: [ldev] --
1,280,680 UART: [fwproc] Wait for Commands...
1,281,471 UART: [fwproc] Recv command 0x46574c44
1,282,204 UART: [fwproc] Recv'd Img size: 114448 bytes
1,549,061 UART: ROM Fatal Error: 0x000B0022
1,550,218 >>> mbox cmd response: failed
1,550,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,224 >>> mbox cmd response: failed
1,550,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,230 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,117 UART: [kat] ++
895,269 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,096 UART: [kat] LMS
1,168,408 UART: [kat] --
1,169,179 UART: [cold-reset] ++
1,169,751 UART: [fht] FHT @ 0x50003400
1,172,379 UART: [idev] ++
1,172,547 UART: [idev] CDI.KEYID = 6
1,172,908 UART: [idev] SUBJECT.KEYID = 7
1,173,333 UART: [idev] UDS.KEYID = 0
1,173,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,193 UART: [idev] Erasing UDS.KEYID = 0
1,198,091 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,182 UART: [ldev] ++
1,208,350 UART: [ldev] CDI.KEYID = 6
1,208,714 UART: [ldev] SUBJECT.KEYID = 5
1,209,141 UART: [ldev] AUTHORITY.KEYID = 7
1,209,604 UART: [ldev] FE.KEYID = 1
1,214,480 UART: [ldev] Erasing FE.KEYID = 1
1,240,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,410 UART: [ldev] --
1,279,838 UART: [fwproc] Wait for Commands...
1,280,655 UART: [fwproc] Recv command 0x46574c44
1,281,388 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,495 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,402,321 >>> mbox cmd response: failed
1,402,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,327 >>> mbox cmd response: failed
1,402,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,838 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,079 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,565 UART: [kat] HMAC-384Kdf
921,057 UART: [kat] LMS
1,169,369 UART: [kat] --
1,170,402 UART: [cold-reset] ++
1,170,852 UART: [fht] FHT @ 0x50003400
1,173,520 UART: [idev] ++
1,173,688 UART: [idev] CDI.KEYID = 6
1,174,049 UART: [idev] SUBJECT.KEYID = 7
1,174,474 UART: [idev] UDS.KEYID = 0
1,174,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,658 UART: [idev] Erasing UDS.KEYID = 0
1,199,970 UART: [idev] Sha1 KeyId Algorithm
1,208,752 UART: [idev] --
1,209,797 UART: [ldev] ++
1,209,965 UART: [ldev] CDI.KEYID = 6
1,210,329 UART: [ldev] SUBJECT.KEYID = 5
1,210,756 UART: [ldev] AUTHORITY.KEYID = 7
1,211,219 UART: [ldev] FE.KEYID = 1
1,216,333 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,281,915 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x46574c44
1,283,349 UART: [fwproc] Recv'd Img size: 114448 bytes
1,548,872 UART: ROM Fatal Error: 0x000B0022
1,550,029 >>> mbox cmd response: failed
1,550,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,035 >>> mbox cmd response: failed
1,550,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,227 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,170,380 UART: [cold-reset] ++
1,170,904 UART: [fht] FHT @ 0x50003400
1,173,422 UART: [idev] ++
1,173,590 UART: [idev] CDI.KEYID = 6
1,173,951 UART: [idev] SUBJECT.KEYID = 7
1,174,376 UART: [idev] UDS.KEYID = 0
1,174,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,378 UART: [idev] Sha1 KeyId Algorithm
1,208,210 UART: [idev] --
1,209,237 UART: [ldev] ++
1,209,405 UART: [ldev] CDI.KEYID = 6
1,209,769 UART: [ldev] SUBJECT.KEYID = 5
1,210,196 UART: [ldev] AUTHORITY.KEYID = 7
1,210,659 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,763 UART: [fwproc] Wait for Commands...
1,282,572 UART: [fwproc] Recv command 0x46574c44
1,283,305 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,874 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,403,666 >>> mbox cmd response: failed
1,403,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,672 >>> mbox cmd response: failed
1,403,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,678 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,199 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,332 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,029 UART:
192,395 UART: Running Caliptra ROM ...
193,487 UART:
193,630 UART: [state] CFI Enabled
259,208 UART: [state] LifecycleState = Unprovisioned
261,141 UART: [state] DebugLocked = No
262,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,489 UART: [kat] SHA2-256
437,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,747 UART: [kat] ++
448,193 UART: [kat] sha1
460,206 UART: [kat] SHA2-256
462,909 UART: [kat] SHA2-384
468,132 UART: [kat] SHA2-512-ACC
470,472 UART: [kat] ECC-384
2,765,641 UART: [kat] HMAC-384Kdf
2,797,320 UART: [kat] LMS
3,987,646 UART: [kat] --
3,992,894 UART: [cold-reset] ++
3,994,670 UART: [fht] Storing FHT @ 0x50003400
4,007,449 UART: [idev] ++
4,008,027 UART: [idev] CDI.KEYID = 6
4,008,923 UART: [idev] SUBJECT.KEYID = 7
4,010,196 UART: [idev] UDS.KEYID = 0
4,012,829 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,658 UART: [idev] Erasing UDS.KEYID = 0
7,345,308 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,350 UART: [idev] --
7,370,802 UART: [ldev] ++
7,371,378 UART: [ldev] CDI.KEYID = 6
7,372,346 UART: [ldev] SUBJECT.KEYID = 5
7,373,508 UART: [ldev] AUTHORITY.KEYID = 7
7,374,794 UART: [ldev] FE.KEYID = 1
7,420,011 UART: [ldev] Erasing FE.KEYID = 1
10,750,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,639 UART: [ldev] --
13,129,829 UART: [fwproc] Waiting for Commands...
13,132,845 UART: [fwproc] Received command 0x46574c44
13,135,036 UART: [fwproc] Received Image of size 114124 bytes
15,840,623 UART: ROM Fatal Error: 0x000B003E
15,844,097 >>> mbox cmd response: failed
15,844,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,844,812 >>> mbox cmd response: failed
15,845,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,408 >>> mbox cmd response: failed
Initializing fuses
2,055,536 writing to cptra_bootfsm_go
2,244,825 UART:
2,245,163 UART: Running Caliptra ROM ...
2,246,239 UART:
2,246,399 UART: [state] CFI Enabled
2,309,251 UART: [state] LifecycleState = Unprovisioned
2,311,191 UART: [state] DebugLocked = No
2,312,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,426 UART: [kat] SHA2-256
2,488,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,648 UART: [kat] ++
2,499,135 UART: [kat] sha1
2,509,853 UART: [kat] SHA2-256
2,512,550 UART: [kat] SHA2-384
2,517,675 UART: [kat] SHA2-512-ACC
2,520,081 UART: [kat] ECC-384
4,811,918 UART: [kat] HMAC-384Kdf
4,843,762 UART: [kat] LMS
6,034,068 UART: [kat] --
6,038,139 UART: [cold-reset] ++
6,040,403 UART: [fht] Storing FHT @ 0x50003400
6,051,010 UART: [idev] ++
6,051,605 UART: [idev] CDI.KEYID = 6
6,052,521 UART: [idev] SUBJECT.KEYID = 7
6,053,813 UART: [idev] UDS.KEYID = 0
6,056,022 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,199,520 UART: [idev] Erasing UDS.KEYID = 0
9,389,843 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,000 UART: [idev] --
9,415,842 UART: [ldev] ++
9,416,421 UART: [ldev] CDI.KEYID = 6
9,417,364 UART: [ldev] SUBJECT.KEYID = 5
9,418,551 UART: [ldev] AUTHORITY.KEYID = 7
9,419,855 UART: [ldev] FE.KEYID = 1
9,466,101 UART: [ldev] Erasing FE.KEYID = 1
12,797,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,093,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,108,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,123,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,137,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,156,161 UART: [ldev] --
15,160,999 UART: [fwproc] Waiting for Commands...
15,163,894 UART: [fwproc] Received command 0x46574c44
15,166,091 UART: [fwproc] Received Image of size 114124 bytes
19,217,184 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,296,539 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,365,408 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,683,219 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,789,220 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,564,144 >>> mbox cmd response: failed
15,564,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,565,048 >>> mbox cmd response: failed
15,565,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,565,674 >>> mbox cmd response: failed
Initializing fuses
2,063,720 writing to cptra_bootfsm_go
5,859,127 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,941,239 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,552 UART:
192,901 UART: Running Caliptra ROM ...
194,086 UART:
603,948 UART: [state] CFI Enabled
619,169 UART: [state] LifecycleState = Unprovisioned
621,095 UART: [state] DebugLocked = No
622,801 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,321 UART: [kat] SHA2-256
798,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,640 UART: [kat] ++
809,128 UART: [kat] sha1
820,112 UART: [kat] SHA2-256
822,797 UART: [kat] SHA2-384
829,526 UART: [kat] SHA2-512-ACC
831,920 UART: [kat] ECC-384
3,117,086 UART: [kat] HMAC-384Kdf
3,129,510 UART: [kat] LMS
4,319,654 UART: [kat] --
4,324,159 UART: [cold-reset] ++
4,325,067 UART: [fht] Storing FHT @ 0x50003400
4,336,512 UART: [idev] ++
4,337,079 UART: [idev] CDI.KEYID = 6
4,338,021 UART: [idev] SUBJECT.KEYID = 7
4,339,291 UART: [idev] UDS.KEYID = 0
4,341,837 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,321 UART: [idev] Erasing UDS.KEYID = 0
7,623,342 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,205 UART: [idev] --
7,649,766 UART: [ldev] ++
7,650,347 UART: [ldev] CDI.KEYID = 6
7,651,229 UART: [ldev] SUBJECT.KEYID = 5
7,652,500 UART: [ldev] AUTHORITY.KEYID = 7
7,653,757 UART: [ldev] FE.KEYID = 1
7,664,653 UART: [ldev] Erasing FE.KEYID = 1
10,954,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,734 UART: [ldev] --
13,316,349 UART: [fwproc] Waiting for Commands...
13,318,934 UART: [fwproc] Received command 0x46574c44
13,321,341 UART: [fwproc] Received Image of size 114124 bytes
16,025,327 UART: ROM Fatal Error: 0x000B003E
16,028,789 >>> mbox cmd response: failed
16,029,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,689 >>> mbox cmd response: failed
16,029,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,030,298 >>> mbox cmd response: failed
Initializing fuses
2,061,959 writing to cptra_bootfsm_go
2,251,273 UART:
2,251,627 UART: Running Caliptra ROM ...
2,252,711 UART:
4,428,100 UART: [state] CFI Enabled
4,441,816 UART: [state] LifecycleState = Unprovisioned
4,443,732 UART: [state] DebugLocked = No
4,445,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,450,453 UART: [kat] SHA2-256
4,620,244 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,630,777 UART: [kat] ++
4,631,319 UART: [kat] sha1
4,642,829 UART: [kat] SHA2-256
4,645,520 UART: [kat] SHA2-384
4,651,181 UART: [kat] SHA2-512-ACC
4,653,575 UART: [kat] ECC-384
6,938,722 UART: [kat] HMAC-384Kdf
6,950,082 UART: [kat] LMS
8,140,215 UART: [kat] --
8,145,640 UART: [cold-reset] ++
8,148,062 UART: [fht] Storing FHT @ 0x50003400
8,159,438 UART: [idev] ++
8,160,070 UART: [idev] CDI.KEYID = 6
8,160,985 UART: [idev] SUBJECT.KEYID = 7
8,162,197 UART: [idev] UDS.KEYID = 0
8,164,512 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,307,953 UART: [idev] Erasing UDS.KEYID = 0
11,449,291 UART: [idev] Using Sha1 for KeyId Algorithm
11,471,035 UART: [idev] --
11,474,278 UART: [ldev] ++
11,474,847 UART: [ldev] CDI.KEYID = 6
11,475,789 UART: [ldev] SUBJECT.KEYID = 5
11,477,038 UART: [ldev] AUTHORITY.KEYID = 7
11,478,274 UART: [ldev] FE.KEYID = 1
11,489,599 UART: [ldev] Erasing FE.KEYID = 1
14,778,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,070,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,085,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,099,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,114,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,133,544 UART: [ldev] --
17,138,534 UART: [fwproc] Waiting for Commands...
17,140,859 UART: [fwproc] Received command 0x46574c44
17,143,052 UART: [fwproc] Received Image of size 114124 bytes
21,197,757 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,278,827 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,347,750 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,664,451 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,492 writing to cptra_bootfsm_go
4,124,575 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,759,213 >>> mbox cmd response: failed
15,759,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,153 >>> mbox cmd response: failed
15,760,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,721 >>> mbox cmd response: failed
Initializing fuses
2,057,378 writing to cptra_bootfsm_go
8,229,281 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,175,852 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,778 writing to cptra_bootfsm_go
193,042 UART:
193,403 UART: Running Caliptra ROM ...
194,521 UART:
194,661 UART: [state] CFI Enabled
263,066 UART: [state] LifecycleState = Unprovisioned
264,934 UART: [state] DebugLocked = No
267,044 UART: [state] WD Timer not started. Device not locked for debugging
270,711 UART: [kat] SHA2-256
449,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,416 UART: [kat] ++
461,955 UART: [kat] sha1
472,593 UART: [kat] SHA2-256
475,603 UART: [kat] SHA2-384
481,548 UART: [kat] SHA2-512-ACC
484,227 UART: [kat] ECC-384
2,945,667 UART: [kat] HMAC-384Kdf
2,969,395 UART: [kat] LMS
3,498,821 UART: [kat] --
3,503,463 UART: [cold-reset] ++
3,504,742 UART: [fht] FHT @ 0x50003400
3,515,522 UART: [idev] ++
3,516,089 UART: [idev] CDI.KEYID = 6
3,516,978 UART: [idev] SUBJECT.KEYID = 7
3,518,191 UART: [idev] UDS.KEYID = 0
3,521,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,509 UART: [idev] Erasing UDS.KEYID = 0
6,026,791 UART: [idev] Sha1 KeyId Algorithm
6,050,339 UART: [idev] --
6,054,290 UART: [ldev] ++
6,054,862 UART: [ldev] CDI.KEYID = 6
6,055,749 UART: [ldev] SUBJECT.KEYID = 5
6,056,964 UART: [ldev] AUTHORITY.KEYID = 7
6,058,197 UART: [ldev] FE.KEYID = 1
6,097,728 UART: [ldev] Erasing FE.KEYID = 1
8,600,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,103 UART: [ldev] --
10,391,471 UART: [fwproc] Wait for Commands...
10,394,538 UART: [fwproc] Recv command 0x46574c44
10,396,633 UART: [fwproc] Recv'd Img size: 114448 bytes
12,448,499 UART: ROM Fatal Error: 0x000B003E
12,451,582 >>> mbox cmd response: failed
12,451,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,310 >>> mbox cmd response: failed
12,452,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,865 >>> mbox cmd response: failed
Initializing fuses
2,053,908 writing to cptra_bootfsm_go
2,243,202 UART:
2,243,548 UART: Running Caliptra ROM ...
2,244,591 UART:
2,244,743 UART: [state] CFI Enabled
2,317,327 UART: [state] LifecycleState = Unprovisioned
2,319,202 UART: [state] DebugLocked = No
2,320,421 UART: [state] WD Timer not started. Device not locked for debugging
2,324,174 UART: [kat] SHA2-256
2,503,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,887 UART: [kat] ++
2,515,346 UART: [kat] sha1
2,525,478 UART: [kat] SHA2-256
2,528,491 UART: [kat] SHA2-384
2,533,941 UART: [kat] SHA2-512-ACC
2,536,884 UART: [kat] ECC-384
4,998,579 UART: [kat] HMAC-384Kdf
5,021,290 UART: [kat] LMS
5,550,718 UART: [kat] --
5,554,983 UART: [cold-reset] ++
5,555,948 UART: [fht] FHT @ 0x50003400
5,566,545 UART: [idev] ++
5,567,112 UART: [idev] CDI.KEYID = 6
5,568,110 UART: [idev] SUBJECT.KEYID = 7
5,569,273 UART: [idev] UDS.KEYID = 0
5,571,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,715,500 UART: [idev] Erasing UDS.KEYID = 0
8,075,939 UART: [idev] Sha1 KeyId Algorithm
8,099,223 UART: [idev] --
8,103,763 UART: [ldev] ++
8,104,328 UART: [ldev] CDI.KEYID = 6
8,105,267 UART: [ldev] SUBJECT.KEYID = 5
8,106,426 UART: [ldev] AUTHORITY.KEYID = 7
8,107,714 UART: [ldev] FE.KEYID = 1
8,150,608 UART: [ldev] Erasing FE.KEYID = 1
10,654,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,784 UART: [ldev] --
12,461,892 UART: [fwproc] Wait for Commands...
12,464,365 UART: [fwproc] Recv command 0x46574c44
12,466,465 UART: [fwproc] Recv'd Img size: 114448 bytes
15,866,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,940,014 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,008,810 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,326,685 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
3,383,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,251,069 >>> mbox cmd response: failed
12,251,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,251,938 >>> mbox cmd response: failed
12,252,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,252,505 >>> mbox cmd response: failed
Initializing fuses
2,060,245 writing to cptra_bootfsm_go
5,417,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,081,848 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,655 UART:
193,172 UART: Running Caliptra ROM ...
194,381 UART:
603,644 UART: [state] CFI Enabled
616,336 UART: [state] LifecycleState = Unprovisioned
618,264 UART: [state] DebugLocked = No
620,087 UART: [state] WD Timer not started. Device not locked for debugging
623,494 UART: [kat] SHA2-256
802,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,190 UART: [kat] ++
814,635 UART: [kat] sha1
825,830 UART: [kat] SHA2-256
828,836 UART: [kat] SHA2-384
835,456 UART: [kat] SHA2-512-ACC
838,410 UART: [kat] ECC-384
3,279,958 UART: [kat] HMAC-384Kdf
3,293,701 UART: [kat] LMS
3,823,198 UART: [kat] --
3,826,172 UART: [cold-reset] ++
3,828,328 UART: [fht] FHT @ 0x50003400
3,839,305 UART: [idev] ++
3,839,874 UART: [idev] CDI.KEYID = 6
3,840,784 UART: [idev] SUBJECT.KEYID = 7
3,842,000 UART: [idev] UDS.KEYID = 0
3,844,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,700 UART: [idev] Erasing UDS.KEYID = 0
6,321,490 UART: [idev] Sha1 KeyId Algorithm
6,345,696 UART: [idev] --
6,350,507 UART: [ldev] ++
6,351,078 UART: [ldev] CDI.KEYID = 6
6,352,011 UART: [ldev] SUBJECT.KEYID = 5
6,353,332 UART: [ldev] AUTHORITY.KEYID = 7
6,354,516 UART: [ldev] FE.KEYID = 1
6,363,707 UART: [ldev] Erasing FE.KEYID = 1
8,833,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,867 UART: [ldev] --
10,623,919 UART: [fwproc] Wait for Commands...
10,625,582 UART: [fwproc] Recv command 0x46574c44
10,627,626 UART: [fwproc] Recv'd Img size: 114448 bytes
12,678,843 UART: ROM Fatal Error: 0x000B003E
12,681,964 >>> mbox cmd response: failed
12,682,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,682,745 >>> mbox cmd response: failed
12,683,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,683,306 >>> mbox cmd response: failed
Initializing fuses
2,057,236 writing to cptra_bootfsm_go
2,246,574 UART:
2,246,946 UART: Running Caliptra ROM ...
2,248,001 UART:
7,765,240 UART: [state] CFI Enabled
7,777,445 UART: [state] LifecycleState = Unprovisioned
7,779,310 UART: [state] DebugLocked = No
7,780,757 UART: [state] WD Timer not started. Device not locked for debugging
7,785,363 UART: [kat] SHA2-256
7,964,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,976,010 UART: [kat] ++
7,976,563 UART: [kat] sha1
7,986,650 UART: [kat] SHA2-256
7,989,724 UART: [kat] SHA2-384
7,995,549 UART: [kat] SHA2-512-ACC
7,998,497 UART: [kat] ECC-384
10,440,378 UART: [kat] HMAC-384Kdf
10,453,565 UART: [kat] LMS
10,983,070 UART: [kat] --
10,986,692 UART: [cold-reset] ++
10,987,917 UART: [fht] FHT @ 0x50003400
11,000,137 UART: [idev] ++
11,000,704 UART: [idev] CDI.KEYID = 6
11,001,618 UART: [idev] SUBJECT.KEYID = 7
11,002,836 UART: [idev] UDS.KEYID = 0
11,005,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,149,022 UART: [idev] Erasing UDS.KEYID = 0
13,476,605 UART: [idev] Sha1 KeyId Algorithm
13,499,840 UART: [idev] --
13,503,891 UART: [ldev] ++
13,504,457 UART: [ldev] CDI.KEYID = 6
13,505,365 UART: [ldev] SUBJECT.KEYID = 5
13,506,523 UART: [ldev] AUTHORITY.KEYID = 7
13,507,802 UART: [ldev] FE.KEYID = 1
13,517,380 UART: [ldev] Erasing FE.KEYID = 1
15,990,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,707,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,723,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,739,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,755,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,775,423 UART: [ldev] --
17,780,697 UART: [fwproc] Wait for Commands...
17,782,222 UART: [fwproc] Recv command 0x46574c44
17,784,324 UART: [fwproc] Recv'd Img size: 114448 bytes
21,184,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,264,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,332,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,650,871 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
3,695,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,460,787 >>> mbox cmd response: failed
12,461,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,461,631 >>> mbox cmd response: failed
12,461,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,462,185 >>> mbox cmd response: failed
Initializing fuses
2,053,077 writing to cptra_bootfsm_go
11,099,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,682,417 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,442,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,303,811 >>> mbox cmd response: failed
12,304,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,686 >>> mbox cmd response: failed
12,304,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,287 >>> mbox cmd response: failed
Initializing fuses
2,055,395 writing to cptra_bootfsm_go
5,496,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,808,707 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,756,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,523,347 >>> mbox cmd response: failed
12,523,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,524,276 >>> mbox cmd response: failed
12,524,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,524,836 >>> mbox cmd response: failed
Initializing fuses
2,057,177 writing to cptra_bootfsm_go
11,086,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,287,623 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,723 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,371 UART: [kat] SHA2-256
882,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,417 UART: [kat] ++
886,569 UART: [kat] sha1
891,031 UART: [kat] SHA2-256
892,969 UART: [kat] SHA2-384
895,720 UART: [kat] SHA2-512-ACC
897,621 UART: [kat] ECC-384
903,248 UART: [kat] HMAC-384Kdf
907,910 UART: [kat] LMS
1,476,106 UART: [kat] --
1,477,003 UART: [cold-reset] ++
1,477,449 UART: [fht] Storing FHT @ 0x50003400
1,480,376 UART: [idev] ++
1,480,544 UART: [idev] CDI.KEYID = 6
1,480,904 UART: [idev] SUBJECT.KEYID = 7
1,481,328 UART: [idev] UDS.KEYID = 0
1,481,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,490 UART: [idev] Erasing UDS.KEYID = 0
1,506,242 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,808 UART: [idev] --
1,515,803 UART: [ldev] ++
1,515,971 UART: [ldev] CDI.KEYID = 6
1,516,334 UART: [ldev] SUBJECT.KEYID = 5
1,516,760 UART: [ldev] AUTHORITY.KEYID = 7
1,517,223 UART: [ldev] FE.KEYID = 1
1,522,501 UART: [ldev] Erasing FE.KEYID = 1
1,547,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,392 UART: [ldev] --
1,586,885 UART: [fwproc] Waiting for Commands...
1,587,560 UART: [fwproc] Received command 0x46574c44
1,588,351 UART: [fwproc] Received Image of size 114448 bytes
1,635,785 UART: ROM Fatal Error: 0x000B003E
1,636,944 >>> mbox cmd response: failed
1,636,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,950 >>> mbox cmd response: failed
1,636,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,837 UART: [kat] SHA2-256
881,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,883 UART: [kat] ++
886,035 UART: [kat] sha1
890,229 UART: [kat] SHA2-256
892,167 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,536 UART: [kat] HMAC-384Kdf
906,974 UART: [kat] LMS
1,475,170 UART: [kat] --
1,476,069 UART: [cold-reset] ++
1,476,605 UART: [fht] Storing FHT @ 0x50003400
1,479,502 UART: [idev] ++
1,479,670 UART: [idev] CDI.KEYID = 6
1,480,030 UART: [idev] SUBJECT.KEYID = 7
1,480,454 UART: [idev] UDS.KEYID = 0
1,480,799 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,412 UART: [idev] Erasing UDS.KEYID = 0
1,504,742 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,438 UART: [idev] --
1,514,441 UART: [ldev] ++
1,514,609 UART: [ldev] CDI.KEYID = 6
1,514,972 UART: [ldev] SUBJECT.KEYID = 5
1,515,398 UART: [ldev] AUTHORITY.KEYID = 7
1,515,861 UART: [ldev] FE.KEYID = 1
1,520,919 UART: [ldev] Erasing FE.KEYID = 1
1,546,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,996 UART: [ldev] --
1,585,447 UART: [fwproc] Waiting for Commands...
1,586,160 UART: [fwproc] Received command 0x46574c44
1,586,951 UART: [fwproc] Received Image of size 114448 bytes
2,885,573 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,717 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,069 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,098 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,486,693 >>> mbox cmd response: failed
1,486,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,699 >>> mbox cmd response: failed
1,486,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,708 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,686 UART: [kat] SHA2-256
892,624 UART: [kat] SHA2-384
895,323 UART: [kat] SHA2-512-ACC
897,224 UART: [kat] ECC-384
902,841 UART: [kat] HMAC-384Kdf
907,445 UART: [kat] LMS
1,475,641 UART: [kat] --
1,476,656 UART: [cold-reset] ++
1,477,060 UART: [fht] Storing FHT @ 0x50003400
1,479,739 UART: [idev] ++
1,479,907 UART: [idev] CDI.KEYID = 6
1,480,267 UART: [idev] SUBJECT.KEYID = 7
1,480,691 UART: [idev] UDS.KEYID = 0
1,481,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,785 UART: [idev] Erasing UDS.KEYID = 0
1,505,593 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,163 UART: [idev] --
1,515,370 UART: [ldev] ++
1,515,538 UART: [ldev] CDI.KEYID = 6
1,515,901 UART: [ldev] SUBJECT.KEYID = 5
1,516,327 UART: [ldev] AUTHORITY.KEYID = 7
1,516,790 UART: [ldev] FE.KEYID = 1
1,522,092 UART: [ldev] Erasing FE.KEYID = 1
1,547,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,005 UART: [ldev] --
1,586,500 UART: [fwproc] Waiting for Commands...
1,587,167 UART: [fwproc] Received command 0x46574c44
1,587,958 UART: [fwproc] Received Image of size 114448 bytes
1,635,782 UART: ROM Fatal Error: 0x000B003E
1,636,941 >>> mbox cmd response: failed
1,636,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,947 >>> mbox cmd response: failed
1,636,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,953 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,346 UART: [kat] SHA2-256
882,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,392 UART: [kat] ++
886,544 UART: [kat] sha1
890,554 UART: [kat] SHA2-256
892,492 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
902,799 UART: [kat] HMAC-384Kdf
907,587 UART: [kat] LMS
1,475,783 UART: [kat] --
1,476,758 UART: [cold-reset] ++
1,477,142 UART: [fht] Storing FHT @ 0x50003400
1,480,065 UART: [idev] ++
1,480,233 UART: [idev] CDI.KEYID = 6
1,480,593 UART: [idev] SUBJECT.KEYID = 7
1,481,017 UART: [idev] UDS.KEYID = 0
1,481,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,125 UART: [idev] Erasing UDS.KEYID = 0
1,505,613 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,241 UART: [idev] --
1,515,366 UART: [ldev] ++
1,515,534 UART: [ldev] CDI.KEYID = 6
1,515,897 UART: [ldev] SUBJECT.KEYID = 5
1,516,323 UART: [ldev] AUTHORITY.KEYID = 7
1,516,786 UART: [ldev] FE.KEYID = 1
1,522,248 UART: [ldev] Erasing FE.KEYID = 1
1,548,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,255 UART: [ldev] --
1,587,740 UART: [fwproc] Waiting for Commands...
1,588,493 UART: [fwproc] Received command 0x46574c44
1,589,284 UART: [fwproc] Received Image of size 114448 bytes
2,888,376 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,244 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,596 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,635 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,884 >>> mbox cmd response: failed
1,488,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,890 >>> mbox cmd response: failed
1,488,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,201 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,394 UART: [kat] SHA2-512-ACC
908,295 UART: [kat] ECC-384
918,206 UART: [kat] HMAC-384Kdf
922,836 UART: [kat] LMS
1,171,164 UART: [kat] --
1,172,043 UART: [cold-reset] ++
1,172,407 UART: [fht] FHT @ 0x50003400
1,175,140 UART: [idev] ++
1,175,308 UART: [idev] CDI.KEYID = 6
1,175,668 UART: [idev] SUBJECT.KEYID = 7
1,176,092 UART: [idev] UDS.KEYID = 0
1,176,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,388 UART: [idev] Erasing UDS.KEYID = 0
1,201,145 UART: [idev] Sha1 KeyId Algorithm
1,209,557 UART: [idev] --
1,210,517 UART: [ldev] ++
1,210,685 UART: [ldev] CDI.KEYID = 6
1,211,048 UART: [ldev] SUBJECT.KEYID = 5
1,211,474 UART: [ldev] AUTHORITY.KEYID = 7
1,211,937 UART: [ldev] FE.KEYID = 1
1,216,897 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,835 UART: [ldev] --
1,282,100 UART: [fwproc] Wait for Commands...
1,282,882 UART: [fwproc] Recv command 0x46574c44
1,283,610 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,422 UART: ROM Fatal Error: 0x000B003E
1,332,581 >>> mbox cmd response: failed
1,332,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,587 >>> mbox cmd response: failed
1,332,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
893,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,153 UART: [kat] ++
897,305 UART: [kat] sha1
901,573 UART: [kat] SHA2-256
903,513 UART: [kat] SHA2-384
906,246 UART: [kat] SHA2-512-ACC
908,147 UART: [kat] ECC-384
918,142 UART: [kat] HMAC-384Kdf
922,666 UART: [kat] LMS
1,170,994 UART: [kat] --
1,171,629 UART: [cold-reset] ++
1,172,017 UART: [fht] FHT @ 0x50003400
1,174,574 UART: [idev] ++
1,174,742 UART: [idev] CDI.KEYID = 6
1,175,102 UART: [idev] SUBJECT.KEYID = 7
1,175,526 UART: [idev] UDS.KEYID = 0
1,175,871 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,946 UART: [idev] Erasing UDS.KEYID = 0
1,201,019 UART: [idev] Sha1 KeyId Algorithm
1,209,647 UART: [idev] --
1,210,647 UART: [ldev] ++
1,210,815 UART: [ldev] CDI.KEYID = 6
1,211,178 UART: [ldev] SUBJECT.KEYID = 5
1,211,604 UART: [ldev] AUTHORITY.KEYID = 7
1,212,067 UART: [ldev] FE.KEYID = 1
1,217,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,171 UART: [ldev] --
1,282,560 UART: [fwproc] Wait for Commands...
1,283,198 UART: [fwproc] Recv command 0x46574c44
1,283,926 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,568 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,975 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,188,628 >>> mbox cmd response: failed
1,188,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,634 >>> mbox cmd response: failed
1,188,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,818 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
893,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,864 UART: [kat] ++
898,016 UART: [kat] sha1
902,162 UART: [kat] SHA2-256
904,102 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,775 UART: [kat] HMAC-384Kdf
923,453 UART: [kat] LMS
1,171,781 UART: [kat] --
1,172,734 UART: [cold-reset] ++
1,173,186 UART: [fht] FHT @ 0x50003400
1,175,981 UART: [idev] ++
1,176,149 UART: [idev] CDI.KEYID = 6
1,176,509 UART: [idev] SUBJECT.KEYID = 7
1,176,933 UART: [idev] UDS.KEYID = 0
1,177,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,829 UART: [idev] Erasing UDS.KEYID = 0
1,201,634 UART: [idev] Sha1 KeyId Algorithm
1,210,174 UART: [idev] --
1,211,132 UART: [ldev] ++
1,211,300 UART: [ldev] CDI.KEYID = 6
1,211,663 UART: [ldev] SUBJECT.KEYID = 5
1,212,089 UART: [ldev] AUTHORITY.KEYID = 7
1,212,552 UART: [ldev] FE.KEYID = 1
1,217,920 UART: [ldev] Erasing FE.KEYID = 1
1,243,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,582 UART: [ldev] --
1,283,085 UART: [fwproc] Wait for Commands...
1,283,835 UART: [fwproc] Recv command 0x46574c44
1,284,563 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,017 UART: ROM Fatal Error: 0x000B003E
1,333,176 >>> mbox cmd response: failed
1,333,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,182 >>> mbox cmd response: failed
1,333,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
893,429 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,554 UART: [kat] ++
897,706 UART: [kat] sha1
902,048 UART: [kat] SHA2-256
903,988 UART: [kat] SHA2-384
906,755 UART: [kat] SHA2-512-ACC
908,656 UART: [kat] ECC-384
918,497 UART: [kat] HMAC-384Kdf
923,277 UART: [kat] LMS
1,171,605 UART: [kat] --
1,172,626 UART: [cold-reset] ++
1,173,056 UART: [fht] FHT @ 0x50003400
1,175,655 UART: [idev] ++
1,175,823 UART: [idev] CDI.KEYID = 6
1,176,183 UART: [idev] SUBJECT.KEYID = 7
1,176,607 UART: [idev] UDS.KEYID = 0
1,176,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,595 UART: [idev] Erasing UDS.KEYID = 0
1,201,386 UART: [idev] Sha1 KeyId Algorithm
1,209,816 UART: [idev] --
1,210,970 UART: [ldev] ++
1,211,138 UART: [ldev] CDI.KEYID = 6
1,211,501 UART: [ldev] SUBJECT.KEYID = 5
1,211,927 UART: [ldev] AUTHORITY.KEYID = 7
1,212,390 UART: [ldev] FE.KEYID = 1
1,217,676 UART: [ldev] Erasing FE.KEYID = 1
1,244,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,538 UART: [ldev] --
1,283,897 UART: [fwproc] Wait for Commands...
1,284,469 UART: [fwproc] Recv command 0x46574c44
1,285,197 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,774 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,188,761 >>> mbox cmd response: failed
1,188,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,767 >>> mbox cmd response: failed
1,188,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,567 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,570 UART: [kat] HMAC-384Kdf
921,288 UART: [kat] LMS
1,169,600 UART: [kat] --
1,170,595 UART: [cold-reset] ++
1,170,945 UART: [fht] FHT @ 0x50003400
1,173,635 UART: [idev] ++
1,173,803 UART: [idev] CDI.KEYID = 6
1,174,164 UART: [idev] SUBJECT.KEYID = 7
1,174,589 UART: [idev] UDS.KEYID = 0
1,174,935 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,225 UART: [idev] Erasing UDS.KEYID = 0
1,199,641 UART: [idev] Sha1 KeyId Algorithm
1,208,697 UART: [idev] --
1,209,610 UART: [ldev] ++
1,209,778 UART: [ldev] CDI.KEYID = 6
1,210,142 UART: [ldev] SUBJECT.KEYID = 5
1,210,569 UART: [ldev] AUTHORITY.KEYID = 7
1,211,032 UART: [ldev] FE.KEYID = 1
1,216,634 UART: [ldev] Erasing FE.KEYID = 1
1,243,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,440 UART: [ldev] --
1,282,898 UART: [fwproc] Wait for Commands...
1,283,539 UART: [fwproc] Recv command 0x46574c44
1,284,272 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,801 UART: ROM Fatal Error: 0x000B003E
1,332,960 >>> mbox cmd response: failed
1,332,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,966 >>> mbox cmd response: failed
1,332,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,275 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,174,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,198,607 UART: [idev] Sha1 KeyId Algorithm
1,207,433 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,215,104 UART: [ldev] Erasing FE.KEYID = 1
1,242,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,514 UART: [ldev] --
1,281,872 UART: [fwproc] Wait for Commands...
1,282,547 UART: [fwproc] Recv command 0x46574c44
1,283,280 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,385 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,985 >>> mbox cmd response: failed
1,182,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,991 >>> mbox cmd response: failed
1,182,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,830 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,661 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,269 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,738 UART: [fht] FHT @ 0x50003400
1,173,390 UART: [idev] ++
1,173,558 UART: [idev] CDI.KEYID = 6
1,173,919 UART: [idev] SUBJECT.KEYID = 7
1,174,344 UART: [idev] UDS.KEYID = 0
1,174,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,199,358 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,207 UART: [ldev] ++
1,209,375 UART: [ldev] CDI.KEYID = 6
1,209,739 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,541 UART: [fwproc] Wait for Commands...
1,282,154 UART: [fwproc] Recv command 0x46574c44
1,282,887 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,920 UART: ROM Fatal Error: 0x000B003E
1,331,079 >>> mbox cmd response: failed
1,331,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,085 >>> mbox cmd response: failed
1,331,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
891,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,356 UART: [kat] ++
895,508 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,827 UART: [kat] LMS
1,169,139 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,173,106 UART: [idev] ++
1,173,274 UART: [idev] CDI.KEYID = 6
1,173,635 UART: [idev] SUBJECT.KEYID = 7
1,174,060 UART: [idev] UDS.KEYID = 0
1,174,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,220 UART: [idev] Erasing UDS.KEYID = 0
1,199,562 UART: [idev] Sha1 KeyId Algorithm
1,208,328 UART: [idev] --
1,209,331 UART: [ldev] ++
1,209,499 UART: [ldev] CDI.KEYID = 6
1,209,863 UART: [ldev] SUBJECT.KEYID = 5
1,210,290 UART: [ldev] AUTHORITY.KEYID = 7
1,210,753 UART: [ldev] FE.KEYID = 1
1,215,769 UART: [ldev] Erasing FE.KEYID = 1
1,241,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,845 UART: [ldev] --
1,281,315 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,787 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,434 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,682 >>> mbox cmd response: failed
1,183,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,688 >>> mbox cmd response: failed
1,183,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,694 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,174 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,086 UART:
192,460 UART: Running Caliptra ROM ...
193,600 UART:
193,745 UART: [state] CFI Enabled
260,303 UART: [state] LifecycleState = Unprovisioned
262,260 UART: [state] DebugLocked = No
264,561 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,334 UART: [kat] SHA2-256
439,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,547 UART: [kat] ++
450,060 UART: [kat] sha1
460,668 UART: [kat] SHA2-256
463,341 UART: [kat] SHA2-384
469,257 UART: [kat] SHA2-512-ACC
471,609 UART: [kat] ECC-384
2,764,818 UART: [kat] HMAC-384Kdf
2,776,839 UART: [kat] LMS
3,967,170 UART: [kat] --
3,971,996 UART: [cold-reset] ++
3,973,779 UART: [fht] Storing FHT @ 0x50003400
3,986,135 UART: [idev] ++
3,986,736 UART: [idev] CDI.KEYID = 6
3,987,653 UART: [idev] SUBJECT.KEYID = 7
3,988,924 UART: [idev] UDS.KEYID = 0
3,991,474 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,064 UART: [idev] Erasing UDS.KEYID = 0
7,326,045 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,084 UART: [idev] --
7,352,217 UART: [ldev] ++
7,352,802 UART: [ldev] CDI.KEYID = 6
7,353,715 UART: [ldev] SUBJECT.KEYID = 5
7,354,937 UART: [ldev] AUTHORITY.KEYID = 7
7,356,231 UART: [ldev] FE.KEYID = 1
7,399,127 UART: [ldev] Erasing FE.KEYID = 1
10,732,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,903 UART: [ldev] --
13,091,759 UART: [fwproc] Waiting for Commands...
13,094,187 UART: [fwproc] Received command 0x46574c44
13,096,391 UART: [fwproc] Received Image of size 114124 bytes
15,800,926 UART: ROM Fatal Error: 0x000B0018
15,804,437 >>> mbox cmd response: failed
15,804,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,805,173 >>> mbox cmd response: failed
15,805,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,805,738 >>> mbox cmd response: failed
Initializing fuses
2,055,112 writing to cptra_bootfsm_go
2,244,421 UART:
2,244,769 UART: Running Caliptra ROM ...
2,245,906 UART:
2,246,104 UART: [state] CFI Enabled
2,308,248 UART: [state] LifecycleState = Unprovisioned
2,310,183 UART: [state] DebugLocked = No
2,312,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,295 UART: [kat] SHA2-256
2,487,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,490 UART: [kat] ++
2,497,957 UART: [kat] sha1
2,508,230 UART: [kat] SHA2-256
2,510,953 UART: [kat] SHA2-384
2,517,063 UART: [kat] SHA2-512-ACC
2,519,476 UART: [kat] ECC-384
4,814,061 UART: [kat] HMAC-384Kdf
4,844,750 UART: [kat] LMS
6,035,044 UART: [kat] --
6,038,362 UART: [cold-reset] ++
6,039,677 UART: [fht] Storing FHT @ 0x50003400
6,049,978 UART: [idev] ++
6,050,548 UART: [idev] CDI.KEYID = 6
6,051,435 UART: [idev] SUBJECT.KEYID = 7
6,052,705 UART: [idev] UDS.KEYID = 0
6,054,948 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,198,490 UART: [idev] Erasing UDS.KEYID = 0
9,390,236 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,349 UART: [idev] --
9,415,616 UART: [ldev] ++
9,416,185 UART: [ldev] CDI.KEYID = 6
9,417,153 UART: [ldev] SUBJECT.KEYID = 5
9,418,357 UART: [ldev] AUTHORITY.KEYID = 7
9,419,598 UART: [ldev] FE.KEYID = 1
9,446,558 UART: [ldev] Erasing FE.KEYID = 1
12,777,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,071,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,086,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,101,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,115,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,133,584 UART: [ldev] --
15,138,631 UART: [fwproc] Waiting for Commands...
15,141,961 UART: [fwproc] Received command 0x46574c44
15,144,156 UART: [fwproc] Received Image of size 114124 bytes
19,198,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,267,883 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,336,808 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,654,340 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,786,357 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,567,246 >>> mbox cmd response: failed
15,567,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,568,272 >>> mbox cmd response: failed
15,568,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,568,829 >>> mbox cmd response: failed
Initializing fuses
2,059,304 writing to cptra_bootfsm_go
5,829,764 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,906,637 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,539 UART:
192,908 UART: Running Caliptra ROM ...
194,115 UART:
603,664 UART: [state] CFI Enabled
615,923 UART: [state] LifecycleState = Unprovisioned
617,886 UART: [state] DebugLocked = No
620,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,784 UART: [kat] SHA2-256
794,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,073 UART: [kat] ++
805,524 UART: [kat] sha1
815,649 UART: [kat] SHA2-256
818,341 UART: [kat] SHA2-384
824,592 UART: [kat] SHA2-512-ACC
826,932 UART: [kat] ECC-384
3,110,541 UART: [kat] HMAC-384Kdf
3,122,615 UART: [kat] LMS
4,312,709 UART: [kat] --
4,316,119 UART: [cold-reset] ++
4,317,442 UART: [fht] Storing FHT @ 0x50003400
4,329,043 UART: [idev] ++
4,329,668 UART: [idev] CDI.KEYID = 6
4,330,592 UART: [idev] SUBJECT.KEYID = 7
4,331,823 UART: [idev] UDS.KEYID = 0
4,334,327 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,864 UART: [idev] Erasing UDS.KEYID = 0
7,620,307 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,525 UART: [idev] --
7,644,796 UART: [ldev] ++
7,645,366 UART: [ldev] CDI.KEYID = 6
7,646,329 UART: [ldev] SUBJECT.KEYID = 5
7,647,545 UART: [ldev] AUTHORITY.KEYID = 7
7,648,782 UART: [ldev] FE.KEYID = 1
7,659,057 UART: [ldev] Erasing FE.KEYID = 1
10,942,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,234,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,248,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,263,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,278,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,492 UART: [ldev] --
13,302,326 UART: [fwproc] Waiting for Commands...
13,304,151 UART: [fwproc] Received command 0x46574c44
13,306,341 UART: [fwproc] Received Image of size 114124 bytes
16,007,167 UART: ROM Fatal Error: 0x000B0018
16,010,673 >>> mbox cmd response: failed
16,011,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,011,435 >>> mbox cmd response: failed
16,011,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,012,006 >>> mbox cmd response: failed
Initializing fuses
2,056,063 writing to cptra_bootfsm_go
2,245,376 UART:
2,245,717 UART: Running Caliptra ROM ...
2,246,877 UART:
4,429,755 UART: [state] CFI Enabled
4,442,561 UART: [state] LifecycleState = Unprovisioned
4,444,502 UART: [state] DebugLocked = No
4,446,979 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,452,267 UART: [kat] SHA2-256
4,622,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,632,543 UART: [kat] ++
4,633,083 UART: [kat] sha1
4,643,444 UART: [kat] SHA2-256
4,646,146 UART: [kat] SHA2-384
4,652,242 UART: [kat] SHA2-512-ACC
4,654,645 UART: [kat] ECC-384
6,942,234 UART: [kat] HMAC-384Kdf
6,954,024 UART: [kat] LMS
8,144,134 UART: [kat] --
8,150,440 UART: [cold-reset] ++
8,152,005 UART: [fht] Storing FHT @ 0x50003400
8,162,846 UART: [idev] ++
8,163,472 UART: [idev] CDI.KEYID = 6
8,164,356 UART: [idev] SUBJECT.KEYID = 7
8,165,620 UART: [idev] UDS.KEYID = 0
8,168,008 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,311,449 UART: [idev] Erasing UDS.KEYID = 0
11,449,791 UART: [idev] Using Sha1 for KeyId Algorithm
11,473,112 UART: [idev] --
11,476,022 UART: [ldev] ++
11,476,590 UART: [ldev] CDI.KEYID = 6
11,477,525 UART: [ldev] SUBJECT.KEYID = 5
11,478,721 UART: [ldev] AUTHORITY.KEYID = 7
11,480,071 UART: [ldev] FE.KEYID = 1
11,491,788 UART: [ldev] Erasing FE.KEYID = 1
14,781,871 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,074,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,089,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,104,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,118,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,138,085 UART: [ldev] --
17,142,598 UART: [fwproc] Waiting for Commands...
17,144,909 UART: [fwproc] Received command 0x46574c44
17,147,095 UART: [fwproc] Received Image of size 114124 bytes
21,199,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,276,609 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,345,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,662,478 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
4,131,373 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,765,546 >>> mbox cmd response: failed
15,766,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,766,695 >>> mbox cmd response: failed
15,766,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,767,269 >>> mbox cmd response: failed
Initializing fuses
2,056,105 writing to cptra_bootfsm_go
8,223,975 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,166,275 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,135 UART:
192,514 UART: Running Caliptra ROM ...
193,697 UART:
193,867 UART: [state] CFI Enabled
260,768 UART: [state] LifecycleState = Unprovisioned
262,628 UART: [state] DebugLocked = No
264,664 UART: [state] WD Timer not started. Device not locked for debugging
268,110 UART: [kat] SHA2-256
447,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,804 UART: [kat] ++
459,339 UART: [kat] sha1
471,090 UART: [kat] SHA2-256
474,109 UART: [kat] SHA2-384
480,245 UART: [kat] SHA2-512-ACC
483,233 UART: [kat] ECC-384
2,946,690 UART: [kat] HMAC-384Kdf
2,970,702 UART: [kat] LMS
3,500,161 UART: [kat] --
3,505,078 UART: [cold-reset] ++
3,507,414 UART: [fht] FHT @ 0x50003400
3,517,375 UART: [idev] ++
3,517,944 UART: [idev] CDI.KEYID = 6
3,518,855 UART: [idev] SUBJECT.KEYID = 7
3,520,065 UART: [idev] UDS.KEYID = 0
3,522,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,999 UART: [idev] Erasing UDS.KEYID = 0
6,027,065 UART: [idev] Sha1 KeyId Algorithm
6,049,707 UART: [idev] --
6,054,137 UART: [ldev] ++
6,054,707 UART: [ldev] CDI.KEYID = 6
6,055,596 UART: [ldev] SUBJECT.KEYID = 5
6,056,814 UART: [ldev] AUTHORITY.KEYID = 7
6,058,053 UART: [ldev] FE.KEYID = 1
6,098,935 UART: [ldev] Erasing FE.KEYID = 1
8,602,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,828 UART: [ldev] --
10,411,063 UART: [fwproc] Wait for Commands...
10,413,048 UART: [fwproc] Recv command 0x46574c44
10,415,146 UART: [fwproc] Recv'd Img size: 114448 bytes
12,474,212 UART: ROM Fatal Error: 0x000B0018
12,477,278 >>> mbox cmd response: failed
12,477,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,477,965 >>> mbox cmd response: failed
12,478,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,478,523 >>> mbox cmd response: failed
Initializing fuses
2,058,495 writing to cptra_bootfsm_go
2,247,783 UART:
2,248,120 UART: Running Caliptra ROM ...
2,249,255 UART:
2,249,421 UART: [state] CFI Enabled
2,312,787 UART: [state] LifecycleState = Unprovisioned
2,314,670 UART: [state] DebugLocked = No
2,317,525 UART: [state] WD Timer not started. Device not locked for debugging
2,320,786 UART: [kat] SHA2-256
2,499,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,491 UART: [kat] ++
2,511,950 UART: [kat] sha1
2,522,241 UART: [kat] SHA2-256
2,525,261 UART: [kat] SHA2-384
2,530,488 UART: [kat] SHA2-512-ACC
2,533,451 UART: [kat] ECC-384
4,998,145 UART: [kat] HMAC-384Kdf
5,018,864 UART: [kat] LMS
5,548,265 UART: [kat] --
5,554,041 UART: [cold-reset] ++
5,556,192 UART: [fht] FHT @ 0x50003400
5,566,950 UART: [idev] ++
5,567,523 UART: [idev] CDI.KEYID = 6
5,568,446 UART: [idev] SUBJECT.KEYID = 7
5,569,610 UART: [idev] UDS.KEYID = 0
5,571,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,715,907 UART: [idev] Erasing UDS.KEYID = 0
8,074,860 UART: [idev] Sha1 KeyId Algorithm
8,097,133 UART: [idev] --
8,102,175 UART: [ldev] ++
8,102,787 UART: [ldev] CDI.KEYID = 6
8,103,729 UART: [ldev] SUBJECT.KEYID = 5
8,104,841 UART: [ldev] AUTHORITY.KEYID = 7
8,106,078 UART: [ldev] FE.KEYID = 1
8,147,578 UART: [ldev] Erasing FE.KEYID = 1
10,646,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,366,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,382,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,398,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,414,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,434,746 UART: [ldev] --
12,439,916 UART: [fwproc] Wait for Commands...
12,442,076 UART: [fwproc] Recv command 0x46574c44
12,444,126 UART: [fwproc] Recv'd Img size: 114448 bytes
15,848,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,924,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,993,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,312,419 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
3,380,811 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,228,413 >>> mbox cmd response: failed
12,229,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,229,315 >>> mbox cmd response: failed
12,229,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,229,876 >>> mbox cmd response: failed
Initializing fuses
2,054,115 writing to cptra_bootfsm_go
5,423,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,126,173 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,571 UART:
192,943 UART: Running Caliptra ROM ...
194,143 UART:
603,630 UART: [state] CFI Enabled
618,387 UART: [state] LifecycleState = Unprovisioned
620,273 UART: [state] DebugLocked = No
622,085 UART: [state] WD Timer not started. Device not locked for debugging
626,078 UART: [kat] SHA2-256
805,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,785 UART: [kat] ++
817,244 UART: [kat] sha1
828,769 UART: [kat] SHA2-256
831,784 UART: [kat] SHA2-384
838,414 UART: [kat] SHA2-512-ACC
841,352 UART: [kat] ECC-384
3,284,856 UART: [kat] HMAC-384Kdf
3,296,922 UART: [kat] LMS
3,826,390 UART: [kat] --
3,830,749 UART: [cold-reset] ++
3,831,826 UART: [fht] FHT @ 0x50003400
3,842,066 UART: [idev] ++
3,842,633 UART: [idev] CDI.KEYID = 6
3,843,558 UART: [idev] SUBJECT.KEYID = 7
3,844,659 UART: [idev] UDS.KEYID = 0
3,847,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,674 UART: [idev] Erasing UDS.KEYID = 0
6,312,902 UART: [idev] Sha1 KeyId Algorithm
6,336,691 UART: [idev] --
6,341,689 UART: [ldev] ++
6,342,271 UART: [ldev] CDI.KEYID = 6
6,343,158 UART: [ldev] SUBJECT.KEYID = 5
6,344,372 UART: [ldev] AUTHORITY.KEYID = 7
6,345,605 UART: [ldev] FE.KEYID = 1
6,355,718 UART: [ldev] Erasing FE.KEYID = 1
8,829,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,063 UART: [ldev] --
10,622,195 UART: [fwproc] Wait for Commands...
10,625,260 UART: [fwproc] Recv command 0x46574c44
10,627,356 UART: [fwproc] Recv'd Img size: 114448 bytes
12,685,578 UART: ROM Fatal Error: 0x000B0018
12,688,664 >>> mbox cmd response: failed
12,689,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,689,420 >>> mbox cmd response: failed
12,689,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,689,997 >>> mbox cmd response: failed
Initializing fuses
2,053,125 writing to cptra_bootfsm_go
2,242,441 UART:
2,242,773 UART: Running Caliptra ROM ...
2,244,017 UART:
7,766,160 UART: [state] CFI Enabled
7,783,069 UART: [state] LifecycleState = Unprovisioned
7,784,927 UART: [state] DebugLocked = No
7,786,131 UART: [state] WD Timer not started. Device not locked for debugging
7,789,222 UART: [kat] SHA2-256
7,968,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,979,960 UART: [kat] ++
7,980,419 UART: [kat] sha1
7,990,332 UART: [kat] SHA2-256
7,993,347 UART: [kat] SHA2-384
7,998,684 UART: [kat] SHA2-512-ACC
8,001,634 UART: [kat] ECC-384
10,443,499 UART: [kat] HMAC-384Kdf
10,457,210 UART: [kat] LMS
10,986,728 UART: [kat] --
10,989,658 UART: [cold-reset] ++
10,991,752 UART: [fht] FHT @ 0x50003400
11,002,946 UART: [idev] ++
11,003,521 UART: [idev] CDI.KEYID = 6
11,004,643 UART: [idev] SUBJECT.KEYID = 7
11,005,679 UART: [idev] UDS.KEYID = 0
11,007,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,151,675 UART: [idev] Erasing UDS.KEYID = 0
13,483,386 UART: [idev] Sha1 KeyId Algorithm
13,506,907 UART: [idev] --
13,510,744 UART: [ldev] ++
13,511,311 UART: [ldev] CDI.KEYID = 6
13,512,194 UART: [ldev] SUBJECT.KEYID = 5
13,513,428 UART: [ldev] AUTHORITY.KEYID = 7
13,514,674 UART: [ldev] FE.KEYID = 1
13,526,453 UART: [ldev] Erasing FE.KEYID = 1
16,001,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,718,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,734,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,749,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,765,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,787,115 UART: [ldev] --
17,792,220 UART: [fwproc] Wait for Commands...
17,794,920 UART: [fwproc] Recv command 0x46574c44
17,797,021 UART: [fwproc] Recv'd Img size: 114448 bytes
21,192,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,262,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,331,210 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,649,954 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,697,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,449,699 >>> mbox cmd response: failed
12,450,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,656 >>> mbox cmd response: failed
12,450,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,451,238 >>> mbox cmd response: failed
Initializing fuses
2,054,359 writing to cptra_bootfsm_go
11,102,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,686,134 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,442,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,279,886 >>> mbox cmd response: failed
12,280,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,280,807 >>> mbox cmd response: failed
12,281,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,281,373 >>> mbox cmd response: failed
Initializing fuses
2,061,015 writing to cptra_bootfsm_go
5,492,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,796,811 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,756,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,528,352 >>> mbox cmd response: failed
12,528,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,339 >>> mbox cmd response: failed
12,529,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,914 >>> mbox cmd response: failed
Initializing fuses
2,055,237 writing to cptra_bootfsm_go
11,096,336 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,302,487 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,730 UART: [state] LifecycleState = Unprovisioned
86,385 UART: [state] DebugLocked = No
87,085 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,725 UART: [kat] SHA2-256
882,656 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,771 UART: [kat] ++
886,923 UART: [kat] sha1
891,219 UART: [kat] SHA2-256
893,157 UART: [kat] SHA2-384
895,912 UART: [kat] SHA2-512-ACC
897,813 UART: [kat] ECC-384
903,316 UART: [kat] HMAC-384Kdf
908,022 UART: [kat] LMS
1,476,218 UART: [kat] --
1,477,163 UART: [cold-reset] ++
1,477,555 UART: [fht] Storing FHT @ 0x50003400
1,480,254 UART: [idev] ++
1,480,422 UART: [idev] CDI.KEYID = 6
1,480,782 UART: [idev] SUBJECT.KEYID = 7
1,481,206 UART: [idev] UDS.KEYID = 0
1,481,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,454 UART: [idev] Erasing UDS.KEYID = 0
1,506,206 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,842 UART: [idev] --
1,515,885 UART: [ldev] ++
1,516,053 UART: [ldev] CDI.KEYID = 6
1,516,416 UART: [ldev] SUBJECT.KEYID = 5
1,516,842 UART: [ldev] AUTHORITY.KEYID = 7
1,517,305 UART: [ldev] FE.KEYID = 1
1,522,831 UART: [ldev] Erasing FE.KEYID = 1
1,548,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,280 UART: [ldev] --
1,587,703 UART: [fwproc] Waiting for Commands...
1,588,458 UART: [fwproc] Received command 0x46574c44
1,589,249 UART: [fwproc] Received Image of size 114448 bytes
1,637,256 UART: ROM Fatal Error: 0x000B0018
1,638,413 >>> mbox cmd response: failed
1,638,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,419 >>> mbox cmd response: failed
1,638,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,425 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,164 UART: [kat] SHA2-512-ACC
897,065 UART: [kat] ECC-384
902,924 UART: [kat] HMAC-384Kdf
907,566 UART: [kat] LMS
1,475,762 UART: [kat] --
1,476,687 UART: [cold-reset] ++
1,477,141 UART: [fht] Storing FHT @ 0x50003400
1,479,862 UART: [idev] ++
1,480,030 UART: [idev] CDI.KEYID = 6
1,480,390 UART: [idev] SUBJECT.KEYID = 7
1,480,814 UART: [idev] UDS.KEYID = 0
1,481,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,064 UART: [idev] Erasing UDS.KEYID = 0
1,505,568 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,114 UART: [idev] --
1,515,095 UART: [ldev] ++
1,515,263 UART: [ldev] CDI.KEYID = 6
1,515,626 UART: [ldev] SUBJECT.KEYID = 5
1,516,052 UART: [ldev] AUTHORITY.KEYID = 7
1,516,515 UART: [ldev] FE.KEYID = 1
1,521,881 UART: [ldev] Erasing FE.KEYID = 1
1,546,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,516 UART: [ldev] --
1,586,023 UART: [fwproc] Waiting for Commands...
1,586,686 UART: [fwproc] Received command 0x46574c44
1,587,477 UART: [fwproc] Received Image of size 114448 bytes
2,885,817 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,743 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,095 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,230 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,965 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,738 >>> mbox cmd response: failed
1,487,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,744 >>> mbox cmd response: failed
1,487,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,926,948 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,318 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,802 UART: [kat] SHA2-256
881,733 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,848 UART: [kat] ++
886,000 UART: [kat] sha1
890,246 UART: [kat] SHA2-256
892,184 UART: [kat] SHA2-384
894,765 UART: [kat] SHA2-512-ACC
896,666 UART: [kat] ECC-384
902,259 UART: [kat] HMAC-384Kdf
906,835 UART: [kat] LMS
1,475,031 UART: [kat] --
1,475,614 UART: [cold-reset] ++
1,476,032 UART: [fht] Storing FHT @ 0x50003400
1,478,805 UART: [idev] ++
1,478,973 UART: [idev] CDI.KEYID = 6
1,479,333 UART: [idev] SUBJECT.KEYID = 7
1,479,757 UART: [idev] UDS.KEYID = 0
1,480,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,895 UART: [idev] Erasing UDS.KEYID = 0
1,504,429 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,979 UART: [idev] --
1,514,100 UART: [ldev] ++
1,514,268 UART: [ldev] CDI.KEYID = 6
1,514,631 UART: [ldev] SUBJECT.KEYID = 5
1,515,057 UART: [ldev] AUTHORITY.KEYID = 7
1,515,520 UART: [ldev] FE.KEYID = 1
1,520,876 UART: [ldev] Erasing FE.KEYID = 1
1,546,031 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,919 UART: [ldev] --
1,585,350 UART: [fwproc] Waiting for Commands...
1,586,103 UART: [fwproc] Received command 0x46574c44
1,586,894 UART: [fwproc] Received Image of size 114448 bytes
1,634,089 UART: ROM Fatal Error: 0x000B0018
1,635,246 >>> mbox cmd response: failed
1,635,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,252 >>> mbox cmd response: failed
1,635,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,418 UART: [kat] SHA2-256
882,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,464 UART: [kat] ++
886,616 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,551 UART: [kat] SHA2-512-ACC
897,452 UART: [kat] ECC-384
902,925 UART: [kat] HMAC-384Kdf
907,407 UART: [kat] LMS
1,475,603 UART: [kat] --
1,476,364 UART: [cold-reset] ++
1,476,778 UART: [fht] Storing FHT @ 0x50003400
1,479,591 UART: [idev] ++
1,479,759 UART: [idev] CDI.KEYID = 6
1,480,119 UART: [idev] SUBJECT.KEYID = 7
1,480,543 UART: [idev] UDS.KEYID = 0
1,480,888 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,539 UART: [idev] Erasing UDS.KEYID = 0
1,505,265 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,767 UART: [idev] --
1,514,946 UART: [ldev] ++
1,515,114 UART: [ldev] CDI.KEYID = 6
1,515,477 UART: [ldev] SUBJECT.KEYID = 5
1,515,903 UART: [ldev] AUTHORITY.KEYID = 7
1,516,366 UART: [ldev] FE.KEYID = 1
1,521,630 UART: [ldev] Erasing FE.KEYID = 1
1,547,205 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,383 UART: [ldev] --
1,586,680 UART: [fwproc] Waiting for Commands...
1,587,497 UART: [fwproc] Received command 0x46574c44
1,588,288 UART: [fwproc] Received Image of size 114448 bytes
2,886,986 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,846 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,173 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,381 >>> mbox cmd response: failed
1,488,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,387 >>> mbox cmd response: failed
1,488,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,172 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,361 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
893,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,421 UART: [kat] ++
897,573 UART: [kat] sha1
901,871 UART: [kat] SHA2-256
903,811 UART: [kat] SHA2-384
906,410 UART: [kat] SHA2-512-ACC
908,311 UART: [kat] ECC-384
918,426 UART: [kat] HMAC-384Kdf
923,156 UART: [kat] LMS
1,171,484 UART: [kat] --
1,172,239 UART: [cold-reset] ++
1,172,763 UART: [fht] FHT @ 0x50003400
1,175,250 UART: [idev] ++
1,175,418 UART: [idev] CDI.KEYID = 6
1,175,778 UART: [idev] SUBJECT.KEYID = 7
1,176,202 UART: [idev] UDS.KEYID = 0
1,176,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,400 UART: [idev] Erasing UDS.KEYID = 0
1,201,217 UART: [idev] Sha1 KeyId Algorithm
1,209,715 UART: [idev] --
1,210,745 UART: [ldev] ++
1,210,913 UART: [ldev] CDI.KEYID = 6
1,211,276 UART: [ldev] SUBJECT.KEYID = 5
1,211,702 UART: [ldev] AUTHORITY.KEYID = 7
1,212,165 UART: [ldev] FE.KEYID = 1
1,217,429 UART: [ldev] Erasing FE.KEYID = 1
1,243,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,041 UART: [ldev] --
1,283,520 UART: [fwproc] Wait for Commands...
1,284,134 UART: [fwproc] Recv command 0x46574c44
1,284,862 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,813 UART: ROM Fatal Error: 0x000B0018
1,332,970 >>> mbox cmd response: failed
1,332,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,976 >>> mbox cmd response: failed
1,332,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
893,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,619 UART: [kat] ++
897,771 UART: [kat] sha1
902,067 UART: [kat] SHA2-256
904,007 UART: [kat] SHA2-384
906,778 UART: [kat] SHA2-512-ACC
908,679 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,298 UART: [kat] LMS
1,170,626 UART: [kat] --
1,171,311 UART: [cold-reset] ++
1,171,865 UART: [fht] FHT @ 0x50003400
1,174,634 UART: [idev] ++
1,174,802 UART: [idev] CDI.KEYID = 6
1,175,162 UART: [idev] SUBJECT.KEYID = 7
1,175,586 UART: [idev] UDS.KEYID = 0
1,175,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,710 UART: [idev] Erasing UDS.KEYID = 0
1,200,641 UART: [idev] Sha1 KeyId Algorithm
1,208,947 UART: [idev] --
1,210,129 UART: [ldev] ++
1,210,297 UART: [ldev] CDI.KEYID = 6
1,210,660 UART: [ldev] SUBJECT.KEYID = 5
1,211,086 UART: [ldev] AUTHORITY.KEYID = 7
1,211,549 UART: [ldev] FE.KEYID = 1
1,216,709 UART: [ldev] Erasing FE.KEYID = 1
1,242,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,618 UART: [fwproc] Wait for Commands...
1,282,294 UART: [fwproc] Recv command 0x46574c44
1,283,022 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,376 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,579 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,999 >>> mbox cmd response: failed
1,186,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,005 >>> mbox cmd response: failed
1,187,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,340 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,238 UART: [kat] SHA2-256
904,178 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,847 UART: [kat] HMAC-384Kdf
923,619 UART: [kat] LMS
1,171,947 UART: [kat] --
1,173,104 UART: [cold-reset] ++
1,173,570 UART: [fht] FHT @ 0x50003400
1,176,255 UART: [idev] ++
1,176,423 UART: [idev] CDI.KEYID = 6
1,176,783 UART: [idev] SUBJECT.KEYID = 7
1,177,207 UART: [idev] UDS.KEYID = 0
1,177,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,151 UART: [idev] Erasing UDS.KEYID = 0
1,202,260 UART: [idev] Sha1 KeyId Algorithm
1,210,696 UART: [idev] --
1,211,808 UART: [ldev] ++
1,211,976 UART: [ldev] CDI.KEYID = 6
1,212,339 UART: [ldev] SUBJECT.KEYID = 5
1,212,765 UART: [ldev] AUTHORITY.KEYID = 7
1,213,228 UART: [ldev] FE.KEYID = 1
1,219,040 UART: [ldev] Erasing FE.KEYID = 1
1,245,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,776 UART: [ldev] --
1,285,077 UART: [fwproc] Wait for Commands...
1,285,657 UART: [fwproc] Recv command 0x46574c44
1,286,385 UART: [fwproc] Recv'd Img size: 114448 bytes
1,335,050 UART: ROM Fatal Error: 0x000B0018
1,336,207 >>> mbox cmd response: failed
1,336,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,336,213 >>> mbox cmd response: failed
1,336,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,336,219 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,011 UART: [state] LifecycleState = Unprovisioned
86,666 UART: [state] DebugLocked = No
87,316 UART: [state] WD Timer not started. Device not locked for debugging
88,475 UART: [kat] SHA2-256
894,125 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,250 UART: [kat] ++
898,402 UART: [kat] sha1
902,758 UART: [kat] SHA2-256
904,698 UART: [kat] SHA2-384
907,395 UART: [kat] SHA2-512-ACC
909,296 UART: [kat] ECC-384
919,281 UART: [kat] HMAC-384Kdf
923,827 UART: [kat] LMS
1,172,155 UART: [kat] --
1,173,160 UART: [cold-reset] ++
1,173,642 UART: [fht] FHT @ 0x50003400
1,176,375 UART: [idev] ++
1,176,543 UART: [idev] CDI.KEYID = 6
1,176,903 UART: [idev] SUBJECT.KEYID = 7
1,177,327 UART: [idev] UDS.KEYID = 0
1,177,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,073 UART: [idev] Erasing UDS.KEYID = 0
1,201,662 UART: [idev] Sha1 KeyId Algorithm
1,210,096 UART: [idev] --
1,210,932 UART: [ldev] ++
1,211,100 UART: [ldev] CDI.KEYID = 6
1,211,463 UART: [ldev] SUBJECT.KEYID = 5
1,211,889 UART: [ldev] AUTHORITY.KEYID = 7
1,212,352 UART: [ldev] FE.KEYID = 1
1,217,794 UART: [ldev] Erasing FE.KEYID = 1
1,244,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,248 UART: [ldev] --
1,283,711 UART: [fwproc] Wait for Commands...
1,284,511 UART: [fwproc] Recv command 0x46574c44
1,285,239 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,178 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,366 >>> mbox cmd response: failed
1,187,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,372 >>> mbox cmd response: failed
1,187,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,378 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,993 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,696 UART: [kat] HMAC-384Kdf
920,318 UART: [kat] LMS
1,168,630 UART: [kat] --
1,169,625 UART: [cold-reset] ++
1,170,005 UART: [fht] FHT @ 0x50003400
1,172,815 UART: [idev] ++
1,172,983 UART: [idev] CDI.KEYID = 6
1,173,344 UART: [idev] SUBJECT.KEYID = 7
1,173,769 UART: [idev] UDS.KEYID = 0
1,174,115 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,637 UART: [idev] Erasing UDS.KEYID = 0
1,198,267 UART: [idev] Sha1 KeyId Algorithm
1,207,055 UART: [idev] --
1,208,210 UART: [ldev] ++
1,208,378 UART: [ldev] CDI.KEYID = 6
1,208,742 UART: [ldev] SUBJECT.KEYID = 5
1,209,169 UART: [ldev] AUTHORITY.KEYID = 7
1,209,632 UART: [ldev] FE.KEYID = 1
1,214,864 UART: [ldev] Erasing FE.KEYID = 1
1,241,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,900 UART: [ldev] --
1,280,234 UART: [fwproc] Wait for Commands...
1,280,957 UART: [fwproc] Recv command 0x46574c44
1,281,690 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,170 UART: ROM Fatal Error: 0x000B0018
1,329,327 >>> mbox cmd response: failed
1,329,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,333 >>> mbox cmd response: failed
1,329,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,339 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,818 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,170,185 UART: [fht] FHT @ 0x50003400
1,172,663 UART: [idev] ++
1,172,831 UART: [idev] CDI.KEYID = 6
1,173,192 UART: [idev] SUBJECT.KEYID = 7
1,173,617 UART: [idev] UDS.KEYID = 0
1,173,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,651 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,649 UART: [idev] --
1,208,616 UART: [ldev] ++
1,208,784 UART: [ldev] CDI.KEYID = 6
1,209,148 UART: [ldev] SUBJECT.KEYID = 5
1,209,575 UART: [ldev] AUTHORITY.KEYID = 7
1,210,038 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,074 UART: [ldev] --
1,281,406 UART: [fwproc] Wait for Commands...
1,282,009 UART: [fwproc] Recv command 0x46574c44
1,282,742 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,884 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,942 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,636 >>> mbox cmd response: failed
1,183,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,642 >>> mbox cmd response: failed
1,183,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,648 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,075 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,170,180 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,340 UART: [idev] ++
1,173,508 UART: [idev] CDI.KEYID = 6
1,173,869 UART: [idev] SUBJECT.KEYID = 7
1,174,294 UART: [idev] UDS.KEYID = 0
1,174,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,522 UART: [idev] Erasing UDS.KEYID = 0
1,199,864 UART: [idev] Sha1 KeyId Algorithm
1,208,712 UART: [idev] --
1,209,717 UART: [ldev] ++
1,209,885 UART: [ldev] CDI.KEYID = 6
1,210,249 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,413 UART: [ldev] Erasing FE.KEYID = 1
1,242,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,721 UART: [ldev] --
1,282,053 UART: [fwproc] Wait for Commands...
1,282,758 UART: [fwproc] Recv command 0x46574c44
1,283,491 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,449 UART: ROM Fatal Error: 0x000B0018
1,332,606 >>> mbox cmd response: failed
1,332,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,612 >>> mbox cmd response: failed
1,332,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,897 UART: [state] LifecycleState = Unprovisioned
85,552 UART: [state] DebugLocked = No
86,130 UART: [state] WD Timer not started. Device not locked for debugging
87,329 UART: [kat] SHA2-256
890,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,008 UART: [kat] ++
895,160 UART: [kat] sha1
899,264 UART: [kat] SHA2-256
901,204 UART: [kat] SHA2-384
904,093 UART: [kat] SHA2-512-ACC
905,994 UART: [kat] ECC-384
915,961 UART: [kat] HMAC-384Kdf
920,793 UART: [kat] LMS
1,169,105 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,174,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,190 UART: [idev] Sha1 KeyId Algorithm
1,207,986 UART: [idev] --
1,209,053 UART: [ldev] ++
1,209,221 UART: [ldev] CDI.KEYID = 6
1,209,585 UART: [ldev] SUBJECT.KEYID = 5
1,210,012 UART: [ldev] AUTHORITY.KEYID = 7
1,210,475 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,241,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,533 UART: [ldev] --
1,280,923 UART: [fwproc] Wait for Commands...
1,281,518 UART: [fwproc] Recv command 0x46574c44
1,282,251 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,812 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,914 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,555 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,657 >>> mbox cmd response: failed
1,184,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,663 >>> mbox cmd response: failed
1,184,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,844 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,044 UART:
192,423 UART: Running Caliptra ROM ...
193,621 UART:
193,772 UART: [state] CFI Enabled
265,155 UART: [state] LifecycleState = Unprovisioned
267,122 UART: [state] DebugLocked = No
268,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,222 UART: [kat] SHA2-256
442,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,429 UART: [kat] ++
453,878 UART: [kat] sha1
465,838 UART: [kat] SHA2-256
468,524 UART: [kat] SHA2-384
474,391 UART: [kat] SHA2-512-ACC
476,746 UART: [kat] ECC-384
2,766,875 UART: [kat] HMAC-384Kdf
2,798,559 UART: [kat] LMS
3,988,842 UART: [kat] --
3,992,537 UART: [cold-reset] ++
3,994,742 UART: [fht] Storing FHT @ 0x50003400
4,005,631 UART: [idev] ++
4,006,244 UART: [idev] CDI.KEYID = 6
4,007,134 UART: [idev] SUBJECT.KEYID = 7
4,008,410 UART: [idev] UDS.KEYID = 0
4,010,860 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,472 UART: [idev] Erasing UDS.KEYID = 0
7,347,585 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,320 UART: [idev] --
7,372,353 UART: [ldev] ++
7,372,985 UART: [ldev] CDI.KEYID = 6
7,373,889 UART: [ldev] SUBJECT.KEYID = 5
7,375,103 UART: [ldev] AUTHORITY.KEYID = 7
7,376,348 UART: [ldev] FE.KEYID = 1
7,423,128 UART: [ldev] Erasing FE.KEYID = 1
10,756,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,330 UART: [ldev] --
13,115,567 UART: [fwproc] Waiting for Commands...
13,117,668 UART: [fwproc] Received command 0x46574c44
13,119,859 UART: [fwproc] Received Image of size 114124 bytes
15,829,130 UART: ROM Fatal Error: 0x000B0034
15,832,623 >>> mbox cmd response: failed
15,833,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,833,419 >>> mbox cmd response: failed
15,833,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,833,986 >>> mbox cmd response: failed
Initializing fuses
2,056,473 writing to cptra_bootfsm_go
2,245,780 UART:
2,246,126 UART: Running Caliptra ROM ...
2,247,264 UART:
2,247,426 UART: [state] CFI Enabled
2,304,623 UART: [state] LifecycleState = Unprovisioned
2,306,552 UART: [state] DebugLocked = No
2,309,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,314,477 UART: [kat] SHA2-256
2,484,210 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,687 UART: [kat] ++
2,495,153 UART: [kat] sha1
2,506,423 UART: [kat] SHA2-256
2,509,119 UART: [kat] SHA2-384
2,515,378 UART: [kat] SHA2-512-ACC
2,517,784 UART: [kat] ECC-384
4,809,335 UART: [kat] HMAC-384Kdf
4,842,486 UART: [kat] LMS
6,032,786 UART: [kat] --
6,038,131 UART: [cold-reset] ++
6,040,336 UART: [fht] Storing FHT @ 0x50003400
6,051,237 UART: [idev] ++
6,051,806 UART: [idev] CDI.KEYID = 6
6,052,773 UART: [idev] SUBJECT.KEYID = 7
6,053,991 UART: [idev] UDS.KEYID = 0
6,056,321 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,199,991 UART: [idev] Erasing UDS.KEYID = 0
9,389,153 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,315 UART: [idev] --
9,414,688 UART: [ldev] ++
9,415,259 UART: [ldev] CDI.KEYID = 6
9,416,225 UART: [ldev] SUBJECT.KEYID = 5
9,417,489 UART: [ldev] AUTHORITY.KEYID = 7
9,418,731 UART: [ldev] FE.KEYID = 1
9,445,427 UART: [ldev] Erasing FE.KEYID = 1
12,773,899 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,070,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,085,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,100,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,114,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,134,163 UART: [ldev] --
15,138,603 UART: [fwproc] Waiting for Commands...
15,141,004 UART: [fwproc] Received command 0x46574c44
15,143,211 UART: [fwproc] Received Image of size 114124 bytes
19,199,448 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,276,983 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,345,897 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,663,221 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,783,629 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,522,799 >>> mbox cmd response: failed
15,523,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,523,636 >>> mbox cmd response: failed
15,523,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,524,252 >>> mbox cmd response: failed
Initializing fuses
2,057,254 writing to cptra_bootfsm_go
5,860,922 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,898,799 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,512 UART:
192,872 UART: Running Caliptra ROM ...
194,073 UART:
603,801 UART: [state] CFI Enabled
620,443 UART: [state] LifecycleState = Unprovisioned
622,377 UART: [state] DebugLocked = No
624,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,127 UART: [kat] SHA2-256
798,873 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,412 UART: [kat] ++
809,943 UART: [kat] sha1
820,935 UART: [kat] SHA2-256
823,666 UART: [kat] SHA2-384
829,590 UART: [kat] SHA2-512-ACC
831,982 UART: [kat] ECC-384
3,115,153 UART: [kat] HMAC-384Kdf
3,126,455 UART: [kat] LMS
4,316,557 UART: [kat] --
4,319,328 UART: [cold-reset] ++
4,320,669 UART: [fht] Storing FHT @ 0x50003400
4,331,721 UART: [idev] ++
4,332,299 UART: [idev] CDI.KEYID = 6
4,333,277 UART: [idev] SUBJECT.KEYID = 7
4,334,493 UART: [idev] UDS.KEYID = 0
4,337,077 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,703 UART: [idev] Erasing UDS.KEYID = 0
7,629,147 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,831 UART: [idev] --
7,655,557 UART: [ldev] ++
7,656,127 UART: [ldev] CDI.KEYID = 6
7,657,092 UART: [ldev] SUBJECT.KEYID = 5
7,658,330 UART: [ldev] AUTHORITY.KEYID = 7
7,659,567 UART: [ldev] FE.KEYID = 1
7,670,537 UART: [ldev] Erasing FE.KEYID = 1
10,959,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,342 UART: [ldev] --
13,320,256 UART: [fwproc] Waiting for Commands...
13,322,351 UART: [fwproc] Received command 0x46574c44
13,324,543 UART: [fwproc] Received Image of size 114124 bytes
16,035,300 UART: ROM Fatal Error: 0x000B0034
16,038,795 >>> mbox cmd response: failed
16,039,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,039,583 >>> mbox cmd response: failed
16,039,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,040,170 >>> mbox cmd response: failed
Initializing fuses
2,057,306 writing to cptra_bootfsm_go
2,246,632 UART:
2,246,982 UART: Running Caliptra ROM ...
2,248,124 UART:
4,414,431 UART: [state] CFI Enabled
4,427,669 UART: [state] LifecycleState = Unprovisioned
4,429,640 UART: [state] DebugLocked = No
4,431,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,436,423 UART: [kat] SHA2-256
4,606,176 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,616,710 UART: [kat] ++
4,617,278 UART: [kat] sha1
4,626,940 UART: [kat] SHA2-256
4,629,649 UART: [kat] SHA2-384
4,636,016 UART: [kat] SHA2-512-ACC
4,638,369 UART: [kat] ECC-384
6,920,155 UART: [kat] HMAC-384Kdf
6,932,986 UART: [kat] LMS
8,123,117 UART: [kat] --
8,127,406 UART: [cold-reset] ++
8,129,178 UART: [fht] Storing FHT @ 0x50003400
8,139,796 UART: [idev] ++
8,140,364 UART: [idev] CDI.KEYID = 6
8,141,379 UART: [idev] SUBJECT.KEYID = 7
8,142,537 UART: [idev] UDS.KEYID = 0
8,144,911 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,288,349 UART: [idev] Erasing UDS.KEYID = 0
11,428,831 UART: [idev] Using Sha1 for KeyId Algorithm
11,449,513 UART: [idev] --
11,452,914 UART: [ldev] ++
11,453,478 UART: [ldev] CDI.KEYID = 6
11,454,420 UART: [ldev] SUBJECT.KEYID = 5
11,455,680 UART: [ldev] AUTHORITY.KEYID = 7
11,456,835 UART: [ldev] FE.KEYID = 1
11,467,994 UART: [ldev] Erasing FE.KEYID = 1
14,756,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,050,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,065,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,080,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,094,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,112,973 UART: [ldev] --
17,117,212 UART: [fwproc] Waiting for Commands...
17,118,985 UART: [fwproc] Received command 0x46574c44
17,121,204 UART: [fwproc] Received Image of size 114124 bytes
21,169,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,246,445 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,315,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,633,157 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,136,032 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,757,934 >>> mbox cmd response: failed
15,758,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,758,835 >>> mbox cmd response: failed
15,759,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,759,478 >>> mbox cmd response: failed
Initializing fuses
2,057,422 writing to cptra_bootfsm_go
8,235,376 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,189,812 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,145 UART:
192,526 UART: Running Caliptra ROM ...
193,738 UART:
193,894 UART: [state] CFI Enabled
261,662 UART: [state] LifecycleState = Unprovisioned
263,480 UART: [state] DebugLocked = No
266,093 UART: [state] WD Timer not started. Device not locked for debugging
270,256 UART: [kat] SHA2-256
449,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,906 UART: [kat] ++
461,445 UART: [kat] sha1
472,060 UART: [kat] SHA2-256
475,126 UART: [kat] SHA2-384
481,152 UART: [kat] SHA2-512-ACC
484,135 UART: [kat] ECC-384
2,947,747 UART: [kat] HMAC-384Kdf
2,970,708 UART: [kat] LMS
3,500,196 UART: [kat] --
3,504,872 UART: [cold-reset] ++
3,507,253 UART: [fht] FHT @ 0x50003400
3,517,694 UART: [idev] ++
3,518,257 UART: [idev] CDI.KEYID = 6
3,519,235 UART: [idev] SUBJECT.KEYID = 7
3,520,357 UART: [idev] UDS.KEYID = 0
3,523,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,586 UART: [idev] Erasing UDS.KEYID = 0
6,021,317 UART: [idev] Sha1 KeyId Algorithm
6,046,009 UART: [idev] --
6,049,827 UART: [ldev] ++
6,050,410 UART: [ldev] CDI.KEYID = 6
6,051,329 UART: [ldev] SUBJECT.KEYID = 5
6,052,489 UART: [ldev] AUTHORITY.KEYID = 7
6,053,727 UART: [ldev] FE.KEYID = 1
6,097,697 UART: [ldev] Erasing FE.KEYID = 1
8,601,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,209 UART: [ldev] --
10,392,262 UART: [fwproc] Wait for Commands...
10,394,356 UART: [fwproc] Recv command 0x46574c44
10,396,452 UART: [fwproc] Recv'd Img size: 114448 bytes
12,440,179 UART: ROM Fatal Error: 0x000B0034
12,443,297 >>> mbox cmd response: failed
12,443,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,444,044 >>> mbox cmd response: failed
12,444,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,444,647 >>> mbox cmd response: failed
Initializing fuses
2,054,209 writing to cptra_bootfsm_go
2,243,542 UART:
2,243,891 UART: Running Caliptra ROM ...
2,245,052 UART:
2,245,229 UART: [state] CFI Enabled
2,301,259 UART: [state] LifecycleState = Unprovisioned
2,303,098 UART: [state] DebugLocked = No
2,305,471 UART: [state] WD Timer not started. Device not locked for debugging
2,309,033 UART: [kat] SHA2-256
2,488,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,499,714 UART: [kat] ++
2,500,178 UART: [kat] sha1
2,510,740 UART: [kat] SHA2-256
2,513,758 UART: [kat] SHA2-384
2,519,852 UART: [kat] SHA2-512-ACC
2,522,853 UART: [kat] ECC-384
4,984,866 UART: [kat] HMAC-384Kdf
5,009,363 UART: [kat] LMS
5,538,841 UART: [kat] --
5,544,953 UART: [cold-reset] ++
5,546,621 UART: [fht] FHT @ 0x50003400
5,557,660 UART: [idev] ++
5,558,230 UART: [idev] CDI.KEYID = 6
5,559,151 UART: [idev] SUBJECT.KEYID = 7
5,560,364 UART: [idev] UDS.KEYID = 0
5,562,576 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,706,624 UART: [idev] Erasing UDS.KEYID = 0
8,064,046 UART: [idev] Sha1 KeyId Algorithm
8,087,508 UART: [idev] --
8,091,131 UART: [ldev] ++
8,091,707 UART: [ldev] CDI.KEYID = 6
8,092,593 UART: [ldev] SUBJECT.KEYID = 5
8,093,757 UART: [ldev] AUTHORITY.KEYID = 7
8,095,048 UART: [ldev] FE.KEYID = 1
8,138,241 UART: [ldev] Erasing FE.KEYID = 1
10,641,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,378,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,394,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,410,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,446,158 UART: [ldev] --
12,451,041 UART: [fwproc] Wait for Commands...
12,453,312 UART: [fwproc] Recv command 0x46574c44
12,455,410 UART: [fwproc] Recv'd Img size: 114448 bytes
15,860,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,934,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,002,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,321,677 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
3,383,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,247,462 >>> mbox cmd response: failed
12,248,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,248,380 >>> mbox cmd response: failed
12,248,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,248,934 >>> mbox cmd response: failed
Initializing fuses
2,054,977 writing to cptra_bootfsm_go
5,405,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,103,045 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
192,753 UART:
193,114 UART: Running Caliptra ROM ...
194,306 UART:
603,781 UART: [state] CFI Enabled
616,267 UART: [state] LifecycleState = Unprovisioned
618,157 UART: [state] DebugLocked = No
620,183 UART: [state] WD Timer not started. Device not locked for debugging
623,948 UART: [kat] SHA2-256
803,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,683 UART: [kat] ++
815,217 UART: [kat] sha1
827,022 UART: [kat] SHA2-256
830,087 UART: [kat] SHA2-384
836,335 UART: [kat] SHA2-512-ACC
839,267 UART: [kat] ECC-384
3,279,830 UART: [kat] HMAC-384Kdf
3,291,798 UART: [kat] LMS
3,821,302 UART: [kat] --
3,826,692 UART: [cold-reset] ++
3,827,986 UART: [fht] FHT @ 0x50003400
3,838,970 UART: [idev] ++
3,839,545 UART: [idev] CDI.KEYID = 6
3,840,459 UART: [idev] SUBJECT.KEYID = 7
3,841,679 UART: [idev] UDS.KEYID = 0
3,844,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,626 UART: [idev] Erasing UDS.KEYID = 0
6,313,184 UART: [idev] Sha1 KeyId Algorithm
6,336,471 UART: [idev] --
6,340,682 UART: [ldev] ++
6,341,252 UART: [ldev] CDI.KEYID = 6
6,342,164 UART: [ldev] SUBJECT.KEYID = 5
6,343,327 UART: [ldev] AUTHORITY.KEYID = 7
6,344,613 UART: [ldev] FE.KEYID = 1
6,353,589 UART: [ldev] Erasing FE.KEYID = 1
8,823,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,938 UART: [ldev] --
10,615,274 UART: [fwproc] Wait for Commands...
10,618,191 UART: [fwproc] Recv command 0x46574c44
10,620,289 UART: [fwproc] Recv'd Img size: 114448 bytes
12,675,350 UART: ROM Fatal Error: 0x000B0034
12,678,425 >>> mbox cmd response: failed
12,678,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,679,189 >>> mbox cmd response: failed
12,679,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,679,744 >>> mbox cmd response: failed
Initializing fuses
2,053,824 writing to cptra_bootfsm_go
2,243,126 UART:
2,243,476 UART: Running Caliptra ROM ...
2,244,620 UART:
7,776,093 UART: [state] CFI Enabled
7,786,200 UART: [state] LifecycleState = Unprovisioned
7,788,087 UART: [state] DebugLocked = No
7,790,534 UART: [state] WD Timer not started. Device not locked for debugging
7,793,794 UART: [kat] SHA2-256
7,972,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,984,501 UART: [kat] ++
7,984,958 UART: [kat] sha1
7,995,627 UART: [kat] SHA2-256
7,998,695 UART: [kat] SHA2-384
8,004,895 UART: [kat] SHA2-512-ACC
8,007,839 UART: [kat] ECC-384
10,449,154 UART: [kat] HMAC-384Kdf
10,462,139 UART: [kat] LMS
10,991,602 UART: [kat] --
10,996,850 UART: [cold-reset] ++
10,998,275 UART: [fht] FHT @ 0x50003400
11,010,288 UART: [idev] ++
11,010,859 UART: [idev] CDI.KEYID = 6
11,011,800 UART: [idev] SUBJECT.KEYID = 7
11,013,013 UART: [idev] UDS.KEYID = 0
11,015,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,159,148 UART: [idev] Erasing UDS.KEYID = 0
13,479,391 UART: [idev] Sha1 KeyId Algorithm
13,503,642 UART: [idev] --
13,506,984 UART: [ldev] ++
13,507,553 UART: [ldev] CDI.KEYID = 6
13,508,432 UART: [ldev] SUBJECT.KEYID = 5
13,509,645 UART: [ldev] AUTHORITY.KEYID = 7
13,510,929 UART: [ldev] FE.KEYID = 1
13,523,057 UART: [ldev] Erasing FE.KEYID = 1
15,991,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,708,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,724,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,740,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,756,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,776,254 UART: [ldev] --
17,780,977 UART: [fwproc] Wait for Commands...
17,783,281 UART: [fwproc] Recv command 0x46574c44
17,785,334 UART: [fwproc] Recv'd Img size: 114448 bytes
21,193,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,267,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,336,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,655,537 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,513 writing to cptra_bootfsm_go
3,692,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,462,669 >>> mbox cmd response: failed
12,463,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,463,584 >>> mbox cmd response: failed
12,463,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,464,085 >>> mbox cmd response: failed
Initializing fuses
2,059,090 writing to cptra_bootfsm_go
11,104,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,684,341 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
3,439,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,301,153 >>> mbox cmd response: failed
12,301,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,033 >>> mbox cmd response: failed
12,302,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,608 >>> mbox cmd response: failed
Initializing fuses
2,054,845 writing to cptra_bootfsm_go
5,494,070 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,787,975 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
3,757,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,519,323 >>> mbox cmd response: failed
12,519,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,281 >>> mbox cmd response: failed
12,520,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,839 >>> mbox cmd response: failed
Initializing fuses
2,062,555 writing to cptra_bootfsm_go
11,103,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,299,626 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,337 UART: [kat] SHA2-256
882,268 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,383 UART: [kat] ++
886,535 UART: [kat] sha1
890,773 UART: [kat] SHA2-256
892,711 UART: [kat] SHA2-384
895,390 UART: [kat] SHA2-512-ACC
897,291 UART: [kat] ECC-384
902,624 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,297 UART: [cold-reset] ++
1,476,765 UART: [fht] Storing FHT @ 0x50003400
1,479,446 UART: [idev] ++
1,479,614 UART: [idev] CDI.KEYID = 6
1,479,974 UART: [idev] SUBJECT.KEYID = 7
1,480,398 UART: [idev] UDS.KEYID = 0
1,480,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,326 UART: [idev] Erasing UDS.KEYID = 0
1,504,212 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,754 UART: [idev] --
1,513,771 UART: [ldev] ++
1,513,939 UART: [ldev] CDI.KEYID = 6
1,514,302 UART: [ldev] SUBJECT.KEYID = 5
1,514,728 UART: [ldev] AUTHORITY.KEYID = 7
1,515,191 UART: [ldev] FE.KEYID = 1
1,520,491 UART: [ldev] Erasing FE.KEYID = 1
1,546,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,222 UART: [ldev] --
1,585,649 UART: [fwproc] Waiting for Commands...
1,586,288 UART: [fwproc] Received command 0x46574c44
1,587,079 UART: [fwproc] Received Image of size 114448 bytes
1,634,750 UART: ROM Fatal Error: 0x000B0034
1,635,907 >>> mbox cmd response: failed
1,635,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,913 >>> mbox cmd response: failed
1,635,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,109 UART: [kat] SHA2-256
882,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,155 UART: [kat] ++
886,307 UART: [kat] sha1
890,739 UART: [kat] SHA2-256
892,677 UART: [kat] SHA2-384
895,560 UART: [kat] SHA2-512-ACC
897,461 UART: [kat] ECC-384
902,934 UART: [kat] HMAC-384Kdf
907,652 UART: [kat] LMS
1,475,848 UART: [kat] --
1,476,781 UART: [cold-reset] ++
1,477,203 UART: [fht] Storing FHT @ 0x50003400
1,479,932 UART: [idev] ++
1,480,100 UART: [idev] CDI.KEYID = 6
1,480,460 UART: [idev] SUBJECT.KEYID = 7
1,480,884 UART: [idev] UDS.KEYID = 0
1,481,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,278 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,816 UART: [idev] --
1,514,985 UART: [ldev] ++
1,515,153 UART: [ldev] CDI.KEYID = 6
1,515,516 UART: [ldev] SUBJECT.KEYID = 5
1,515,942 UART: [ldev] AUTHORITY.KEYID = 7
1,516,405 UART: [ldev] FE.KEYID = 1
1,521,399 UART: [ldev] Erasing FE.KEYID = 1
1,546,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,068 UART: [ldev] --
1,585,385 UART: [fwproc] Waiting for Commands...
1,586,066 UART: [fwproc] Received command 0x46574c44
1,586,857 UART: [fwproc] Received Image of size 114448 bytes
2,885,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,413 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,762 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,180 >>> mbox cmd response: failed
1,489,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,186 >>> mbox cmd response: failed
1,489,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,192 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,177 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,494 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,382 UART: [kat] SHA2-256
882,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,428 UART: [kat] ++
886,580 UART: [kat] sha1
890,964 UART: [kat] SHA2-256
892,902 UART: [kat] SHA2-384
895,757 UART: [kat] SHA2-512-ACC
897,658 UART: [kat] ECC-384
902,979 UART: [kat] HMAC-384Kdf
907,567 UART: [kat] LMS
1,475,763 UART: [kat] --
1,476,578 UART: [cold-reset] ++
1,477,044 UART: [fht] Storing FHT @ 0x50003400
1,479,743 UART: [idev] ++
1,479,911 UART: [idev] CDI.KEYID = 6
1,480,271 UART: [idev] SUBJECT.KEYID = 7
1,480,695 UART: [idev] UDS.KEYID = 0
1,481,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,585 UART: [idev] Erasing UDS.KEYID = 0
1,505,339 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,079 UART: [idev] --
1,515,090 UART: [ldev] ++
1,515,258 UART: [ldev] CDI.KEYID = 6
1,515,621 UART: [ldev] SUBJECT.KEYID = 5
1,516,047 UART: [ldev] AUTHORITY.KEYID = 7
1,516,510 UART: [ldev] FE.KEYID = 1
1,521,708 UART: [ldev] Erasing FE.KEYID = 1
1,547,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,413 UART: [ldev] --
1,586,760 UART: [fwproc] Waiting for Commands...
1,587,413 UART: [fwproc] Received command 0x46574c44
1,588,204 UART: [fwproc] Received Image of size 114448 bytes
1,635,243 UART: ROM Fatal Error: 0x000B0034
1,636,400 >>> mbox cmd response: failed
1,636,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,406 >>> mbox cmd response: failed
1,636,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,412 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,340 UART: [kat] SHA2-256
882,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,386 UART: [kat] ++
886,538 UART: [kat] sha1
890,818 UART: [kat] SHA2-256
892,756 UART: [kat] SHA2-384
895,639 UART: [kat] SHA2-512-ACC
897,540 UART: [kat] ECC-384
902,925 UART: [kat] HMAC-384Kdf
907,551 UART: [kat] LMS
1,475,747 UART: [kat] --
1,476,638 UART: [cold-reset] ++
1,477,128 UART: [fht] Storing FHT @ 0x50003400
1,479,993 UART: [idev] ++
1,480,161 UART: [idev] CDI.KEYID = 6
1,480,521 UART: [idev] SUBJECT.KEYID = 7
1,480,945 UART: [idev] UDS.KEYID = 0
1,481,290 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,841 UART: [idev] Erasing UDS.KEYID = 0
1,505,495 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,301 UART: [idev] --
1,515,504 UART: [ldev] ++
1,515,672 UART: [ldev] CDI.KEYID = 6
1,516,035 UART: [ldev] SUBJECT.KEYID = 5
1,516,461 UART: [ldev] AUTHORITY.KEYID = 7
1,516,924 UART: [ldev] FE.KEYID = 1
1,522,368 UART: [ldev] Erasing FE.KEYID = 1
1,547,877 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,811 UART: [ldev] --
1,587,324 UART: [fwproc] Waiting for Commands...
1,588,097 UART: [fwproc] Received command 0x46574c44
1,588,888 UART: [fwproc] Received Image of size 114448 bytes
2,887,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,444 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,796 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,763 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,969 >>> mbox cmd response: failed
1,489,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,975 >>> mbox cmd response: failed
1,489,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,463 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
893,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,657 UART: [kat] ++
897,809 UART: [kat] sha1
902,083 UART: [kat] SHA2-256
904,023 UART: [kat] SHA2-384
906,578 UART: [kat] SHA2-512-ACC
908,479 UART: [kat] ECC-384
918,316 UART: [kat] HMAC-384Kdf
923,080 UART: [kat] LMS
1,171,408 UART: [kat] --
1,172,443 UART: [cold-reset] ++
1,172,789 UART: [fht] FHT @ 0x50003400
1,175,352 UART: [idev] ++
1,175,520 UART: [idev] CDI.KEYID = 6
1,175,880 UART: [idev] SUBJECT.KEYID = 7
1,176,304 UART: [idev] UDS.KEYID = 0
1,176,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,328 UART: [idev] Erasing UDS.KEYID = 0
1,200,977 UART: [idev] Sha1 KeyId Algorithm
1,209,579 UART: [idev] --
1,210,681 UART: [ldev] ++
1,210,849 UART: [ldev] CDI.KEYID = 6
1,211,212 UART: [ldev] SUBJECT.KEYID = 5
1,211,638 UART: [ldev] AUTHORITY.KEYID = 7
1,212,101 UART: [ldev] FE.KEYID = 1
1,217,487 UART: [ldev] Erasing FE.KEYID = 1
1,243,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,613 UART: [ldev] --
1,282,982 UART: [fwproc] Wait for Commands...
1,283,732 UART: [fwproc] Recv command 0x46574c44
1,284,460 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,449 UART: ROM Fatal Error: 0x000B0034
1,333,606 >>> mbox cmd response: failed
1,333,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,612 >>> mbox cmd response: failed
1,333,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,785 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
893,542 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,667 UART: [kat] ++
897,819 UART: [kat] sha1
902,047 UART: [kat] SHA2-256
903,987 UART: [kat] SHA2-384
906,864 UART: [kat] SHA2-512-ACC
908,765 UART: [kat] ECC-384
918,270 UART: [kat] HMAC-384Kdf
922,814 UART: [kat] LMS
1,171,142 UART: [kat] --
1,171,995 UART: [cold-reset] ++
1,172,411 UART: [fht] FHT @ 0x50003400
1,175,080 UART: [idev] ++
1,175,248 UART: [idev] CDI.KEYID = 6
1,175,608 UART: [idev] SUBJECT.KEYID = 7
1,176,032 UART: [idev] UDS.KEYID = 0
1,176,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,110 UART: [idev] Erasing UDS.KEYID = 0
1,201,171 UART: [idev] Sha1 KeyId Algorithm
1,209,583 UART: [idev] --
1,210,511 UART: [ldev] ++
1,210,679 UART: [ldev] CDI.KEYID = 6
1,211,042 UART: [ldev] SUBJECT.KEYID = 5
1,211,468 UART: [ldev] AUTHORITY.KEYID = 7
1,211,931 UART: [ldev] FE.KEYID = 1
1,216,829 UART: [ldev] Erasing FE.KEYID = 1
1,243,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,299 UART: [ldev] --
1,282,722 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,497 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,943 >>> mbox cmd response: failed
1,185,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,949 >>> mbox cmd response: failed
1,185,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,468 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
893,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,078 UART: [kat] ++
898,230 UART: [kat] sha1
902,396 UART: [kat] SHA2-256
904,336 UART: [kat] SHA2-384
907,077 UART: [kat] SHA2-512-ACC
908,978 UART: [kat] ECC-384
918,257 UART: [kat] HMAC-384Kdf
922,881 UART: [kat] LMS
1,171,209 UART: [kat] --
1,171,798 UART: [cold-reset] ++
1,172,168 UART: [fht] FHT @ 0x50003400
1,174,823 UART: [idev] ++
1,174,991 UART: [idev] CDI.KEYID = 6
1,175,351 UART: [idev] SUBJECT.KEYID = 7
1,175,775 UART: [idev] UDS.KEYID = 0
1,176,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,681 UART: [idev] Erasing UDS.KEYID = 0
1,200,858 UART: [idev] Sha1 KeyId Algorithm
1,209,188 UART: [idev] --
1,210,330 UART: [ldev] ++
1,210,498 UART: [ldev] CDI.KEYID = 6
1,210,861 UART: [ldev] SUBJECT.KEYID = 5
1,211,287 UART: [ldev] AUTHORITY.KEYID = 7
1,211,750 UART: [ldev] FE.KEYID = 1
1,217,106 UART: [ldev] Erasing FE.KEYID = 1
1,244,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,808 UART: [ldev] --
1,284,211 UART: [fwproc] Wait for Commands...
1,284,919 UART: [fwproc] Recv command 0x46574c44
1,285,647 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,424 UART: ROM Fatal Error: 0x000B0034
1,333,581 >>> mbox cmd response: failed
1,333,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,587 >>> mbox cmd response: failed
1,333,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
86,964 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
893,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,928 UART: [kat] ++
898,080 UART: [kat] sha1
902,410 UART: [kat] SHA2-256
904,350 UART: [kat] SHA2-384
906,979 UART: [kat] SHA2-512-ACC
908,880 UART: [kat] ECC-384
918,923 UART: [kat] HMAC-384Kdf
923,619 UART: [kat] LMS
1,171,947 UART: [kat] --
1,172,836 UART: [cold-reset] ++
1,173,240 UART: [fht] FHT @ 0x50003400
1,175,915 UART: [idev] ++
1,176,083 UART: [idev] CDI.KEYID = 6
1,176,443 UART: [idev] SUBJECT.KEYID = 7
1,176,867 UART: [idev] UDS.KEYID = 0
1,177,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,797 UART: [idev] Erasing UDS.KEYID = 0
1,201,844 UART: [idev] Sha1 KeyId Algorithm
1,210,196 UART: [idev] --
1,211,324 UART: [ldev] ++
1,211,492 UART: [ldev] CDI.KEYID = 6
1,211,855 UART: [ldev] SUBJECT.KEYID = 5
1,212,281 UART: [ldev] AUTHORITY.KEYID = 7
1,212,744 UART: [ldev] FE.KEYID = 1
1,218,110 UART: [ldev] Erasing FE.KEYID = 1
1,244,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,256 UART: [ldev] --
1,283,761 UART: [fwproc] Wait for Commands...
1,284,449 UART: [fwproc] Recv command 0x46574c44
1,285,177 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,137 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,226 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,442 >>> mbox cmd response: failed
1,186,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,448 >>> mbox cmd response: failed
1,186,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,454 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,579 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
915,650 UART: [kat] HMAC-384Kdf
920,250 UART: [kat] LMS
1,168,562 UART: [kat] --
1,169,595 UART: [cold-reset] ++
1,169,927 UART: [fht] FHT @ 0x50003400
1,172,509 UART: [idev] ++
1,172,677 UART: [idev] CDI.KEYID = 6
1,173,038 UART: [idev] SUBJECT.KEYID = 7
1,173,463 UART: [idev] UDS.KEYID = 0
1,173,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,245 UART: [idev] Erasing UDS.KEYID = 0
1,197,801 UART: [idev] Sha1 KeyId Algorithm
1,206,539 UART: [idev] --
1,207,556 UART: [ldev] ++
1,207,724 UART: [ldev] CDI.KEYID = 6
1,208,088 UART: [ldev] SUBJECT.KEYID = 5
1,208,515 UART: [ldev] AUTHORITY.KEYID = 7
1,208,978 UART: [ldev] FE.KEYID = 1
1,214,362 UART: [ldev] Erasing FE.KEYID = 1
1,240,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,258 UART: [ldev] --
1,279,734 UART: [fwproc] Wait for Commands...
1,280,505 UART: [fwproc] Recv command 0x46574c44
1,281,238 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,766 UART: ROM Fatal Error: 0x000B0034
1,329,923 >>> mbox cmd response: failed
1,329,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,929 >>> mbox cmd response: failed
1,329,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,560 UART: [state] LifecycleState = Unprovisioned
85,215 UART: [state] DebugLocked = No
85,865 UART: [state] WD Timer not started. Device not locked for debugging
87,058 UART: [kat] SHA2-256
890,608 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,737 UART: [kat] ++
894,889 UART: [kat] sha1
898,993 UART: [kat] SHA2-256
900,933 UART: [kat] SHA2-384
903,528 UART: [kat] SHA2-512-ACC
905,429 UART: [kat] ECC-384
915,328 UART: [kat] HMAC-384Kdf
920,096 UART: [kat] LMS
1,168,408 UART: [kat] --
1,169,221 UART: [cold-reset] ++
1,169,779 UART: [fht] FHT @ 0x50003400
1,172,463 UART: [idev] ++
1,172,631 UART: [idev] CDI.KEYID = 6
1,172,992 UART: [idev] SUBJECT.KEYID = 7
1,173,417 UART: [idev] UDS.KEYID = 0
1,173,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,397 UART: [idev] Erasing UDS.KEYID = 0
1,198,385 UART: [idev] Sha1 KeyId Algorithm
1,207,491 UART: [idev] --
1,208,444 UART: [ldev] ++
1,208,612 UART: [ldev] CDI.KEYID = 6
1,208,976 UART: [ldev] SUBJECT.KEYID = 5
1,209,403 UART: [ldev] AUTHORITY.KEYID = 7
1,209,866 UART: [ldev] FE.KEYID = 1
1,215,114 UART: [ldev] Erasing FE.KEYID = 1
1,241,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,234 UART: [ldev] --
1,280,714 UART: [fwproc] Wait for Commands...
1,281,285 UART: [fwproc] Recv command 0x46574c44
1,282,018 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,649 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,704 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,077 >>> mbox cmd response: failed
1,181,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,083 >>> mbox cmd response: failed
1,181,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,089 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,863 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
891,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,258 UART: [kat] ++
895,410 UART: [kat] sha1
899,498 UART: [kat] SHA2-256
901,438 UART: [kat] SHA2-384
904,143 UART: [kat] SHA2-512-ACC
906,044 UART: [kat] ECC-384
915,745 UART: [kat] HMAC-384Kdf
920,231 UART: [kat] LMS
1,168,543 UART: [kat] --
1,169,586 UART: [cold-reset] ++
1,170,152 UART: [fht] FHT @ 0x50003400
1,172,826 UART: [idev] ++
1,172,994 UART: [idev] CDI.KEYID = 6
1,173,355 UART: [idev] SUBJECT.KEYID = 7
1,173,780 UART: [idev] UDS.KEYID = 0
1,174,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,536 UART: [idev] Erasing UDS.KEYID = 0
1,198,830 UART: [idev] Sha1 KeyId Algorithm
1,207,702 UART: [idev] --
1,208,711 UART: [ldev] ++
1,208,879 UART: [ldev] CDI.KEYID = 6
1,209,243 UART: [ldev] SUBJECT.KEYID = 5
1,209,670 UART: [ldev] AUTHORITY.KEYID = 7
1,210,133 UART: [ldev] FE.KEYID = 1
1,215,291 UART: [ldev] Erasing FE.KEYID = 1
1,241,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,915 UART: [ldev] --
1,280,309 UART: [fwproc] Wait for Commands...
1,281,026 UART: [fwproc] Recv command 0x46574c44
1,281,759 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,901 UART: ROM Fatal Error: 0x000B0034
1,330,058 >>> mbox cmd response: failed
1,330,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,064 >>> mbox cmd response: failed
1,330,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,460 UART: [kat] SHA2-256
902,400 UART: [kat] SHA2-384
905,155 UART: [kat] SHA2-512-ACC
907,056 UART: [kat] ECC-384
916,847 UART: [kat] HMAC-384Kdf
921,525 UART: [kat] LMS
1,169,837 UART: [kat] --
1,170,708 UART: [cold-reset] ++
1,171,230 UART: [fht] FHT @ 0x50003400
1,173,796 UART: [idev] ++
1,173,964 UART: [idev] CDI.KEYID = 6
1,174,325 UART: [idev] SUBJECT.KEYID = 7
1,174,750 UART: [idev] UDS.KEYID = 0
1,175,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,044 UART: [idev] Erasing UDS.KEYID = 0
1,199,998 UART: [idev] Sha1 KeyId Algorithm
1,208,834 UART: [idev] --
1,209,739 UART: [ldev] ++
1,209,907 UART: [ldev] CDI.KEYID = 6
1,210,271 UART: [ldev] SUBJECT.KEYID = 5
1,210,698 UART: [ldev] AUTHORITY.KEYID = 7
1,211,161 UART: [ldev] FE.KEYID = 1
1,216,413 UART: [ldev] Erasing FE.KEYID = 1
1,242,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,211 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,172 UART: [fwproc] Recv command 0x46574c44
1,283,905 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,504 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,805 >>> mbox cmd response: failed
1,183,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,811 >>> mbox cmd response: failed
1,183,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,256 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,221 UART:
192,590 UART: Running Caliptra ROM ...
193,794 UART:
193,948 UART: [state] CFI Enabled
265,334 UART: [state] LifecycleState = Unprovisioned
267,309 UART: [state] DebugLocked = No
268,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,636 UART: [kat] SHA2-256
443,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,885 UART: [kat] ++
454,327 UART: [kat] sha1
466,175 UART: [kat] SHA2-256
468,848 UART: [kat] SHA2-384
474,402 UART: [kat] SHA2-512-ACC
476,757 UART: [kat] ECC-384
2,764,063 UART: [kat] HMAC-384Kdf
2,776,577 UART: [kat] LMS
3,966,835 UART: [kat] --
3,972,909 UART: [cold-reset] ++
3,975,131 UART: [fht] Storing FHT @ 0x50003400
3,986,650 UART: [idev] ++
3,987,232 UART: [idev] CDI.KEYID = 6
3,988,251 UART: [idev] SUBJECT.KEYID = 7
3,989,411 UART: [idev] UDS.KEYID = 0
3,992,012 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,135,838 UART: [idev] Erasing UDS.KEYID = 0
7,328,083 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,629 UART: [idev] --
7,354,637 UART: [ldev] ++
7,355,271 UART: [ldev] CDI.KEYID = 6
7,356,207 UART: [ldev] SUBJECT.KEYID = 5
7,357,427 UART: [ldev] AUTHORITY.KEYID = 7
7,358,664 UART: [ldev] FE.KEYID = 1
7,401,124 UART: [ldev] Erasing FE.KEYID = 1
10,736,734 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,326 UART: [ldev] --
13,116,759 UART: [fwproc] Waiting for Commands...
13,119,081 UART: [fwproc] Received command 0x46574c44
13,121,270 UART: [fwproc] Received Image of size 114124 bytes
15,821,895 UART: ROM Fatal Error: 0x000B0017
15,825,403 >>> mbox cmd response: failed
15,825,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,826,164 >>> mbox cmd response: failed
15,826,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,826,726 >>> mbox cmd response: failed
Initializing fuses
2,054,758 writing to cptra_bootfsm_go
2,244,072 UART:
2,244,426 UART: Running Caliptra ROM ...
2,245,473 UART:
2,245,626 UART: [state] CFI Enabled
2,318,457 UART: [state] LifecycleState = Unprovisioned
2,320,400 UART: [state] DebugLocked = No
2,321,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,480 UART: [kat] SHA2-256
2,497,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,694 UART: [kat] ++
2,508,156 UART: [kat] sha1
2,520,180 UART: [kat] SHA2-256
2,522,868 UART: [kat] SHA2-384
2,528,963 UART: [kat] SHA2-512-ACC
2,531,310 UART: [kat] ECC-384
4,822,525 UART: [kat] HMAC-384Kdf
4,853,603 UART: [kat] LMS
6,043,911 UART: [kat] --
6,048,689 UART: [cold-reset] ++
6,050,683 UART: [fht] Storing FHT @ 0x50003400
6,062,548 UART: [idev] ++
6,063,168 UART: [idev] CDI.KEYID = 6
6,064,050 UART: [idev] SUBJECT.KEYID = 7
6,065,319 UART: [idev] UDS.KEYID = 0
6,067,569 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,211,252 UART: [idev] Erasing UDS.KEYID = 0
9,400,333 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,556 UART: [idev] --
9,427,174 UART: [ldev] ++
9,427,746 UART: [ldev] CDI.KEYID = 6
9,428,800 UART: [ldev] SUBJECT.KEYID = 5
9,430,042 UART: [ldev] AUTHORITY.KEYID = 7
9,431,195 UART: [ldev] FE.KEYID = 1
9,476,377 UART: [ldev] Erasing FE.KEYID = 1
12,808,271 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,121,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,136,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,150,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,165,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,183,214 UART: [ldev] --
15,188,477 UART: [fwproc] Waiting for Commands...
15,190,155 UART: [fwproc] Received command 0x46574c44
15,192,355 UART: [fwproc] Received Image of size 114124 bytes
19,247,537 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,321,558 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,390,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,708,223 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,806,052 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,570,247 >>> mbox cmd response: failed
15,570,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,571,175 >>> mbox cmd response: failed
15,571,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,571,921 >>> mbox cmd response: failed
Initializing fuses
2,056,927 writing to cptra_bootfsm_go
5,857,016 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,935,195 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,446 UART:
192,822 UART: Running Caliptra ROM ...
194,028 UART:
603,791 UART: [state] CFI Enabled
618,755 UART: [state] LifecycleState = Unprovisioned
620,681 UART: [state] DebugLocked = No
622,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,604 UART: [kat] SHA2-256
797,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,931 UART: [kat] ++
808,461 UART: [kat] sha1
818,803 UART: [kat] SHA2-256
821,493 UART: [kat] SHA2-384
825,850 UART: [kat] SHA2-512-ACC
828,193 UART: [kat] ECC-384
3,112,617 UART: [kat] HMAC-384Kdf
3,125,087 UART: [kat] LMS
4,315,182 UART: [kat] --
4,319,252 UART: [cold-reset] ++
4,320,931 UART: [fht] Storing FHT @ 0x50003400
4,332,961 UART: [idev] ++
4,333,525 UART: [idev] CDI.KEYID = 6
4,334,545 UART: [idev] SUBJECT.KEYID = 7
4,335,703 UART: [idev] UDS.KEYID = 0
4,338,251 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,902 UART: [idev] Erasing UDS.KEYID = 0
7,627,441 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,783 UART: [idev] --
7,653,888 UART: [ldev] ++
7,654,466 UART: [ldev] CDI.KEYID = 6
7,655,436 UART: [ldev] SUBJECT.KEYID = 5
7,656,652 UART: [ldev] AUTHORITY.KEYID = 7
7,657,886 UART: [ldev] FE.KEYID = 1
7,668,538 UART: [ldev] Erasing FE.KEYID = 1
10,963,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,259,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,274,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,288,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,303,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,322,684 UART: [ldev] --
13,327,657 UART: [fwproc] Waiting for Commands...
13,330,355 UART: [fwproc] Received command 0x46574c44
13,332,543 UART: [fwproc] Received Image of size 114124 bytes
16,039,039 UART: ROM Fatal Error: 0x000B0017
16,042,567 >>> mbox cmd response: failed
16,042,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,043,326 >>> mbox cmd response: failed
16,043,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,043,895 >>> mbox cmd response: failed
Initializing fuses
2,061,715 writing to cptra_bootfsm_go
2,251,085 UART:
2,251,443 UART: Running Caliptra ROM ...
2,252,585 UART:
4,414,008 UART: [state] CFI Enabled
4,428,422 UART: [state] LifecycleState = Unprovisioned
4,430,342 UART: [state] DebugLocked = No
4,433,188 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,437,389 UART: [kat] SHA2-256
4,607,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,617,711 UART: [kat] ++
4,618,220 UART: [kat] sha1
4,628,894 UART: [kat] SHA2-256
4,631,630 UART: [kat] SHA2-384
4,636,666 UART: [kat] SHA2-512-ACC
4,639,020 UART: [kat] ECC-384
6,922,726 UART: [kat] HMAC-384Kdf
6,935,013 UART: [kat] LMS
8,125,122 UART: [kat] --
8,129,704 UART: [cold-reset] ++
8,132,096 UART: [fht] Storing FHT @ 0x50003400
8,143,918 UART: [idev] ++
8,144,489 UART: [idev] CDI.KEYID = 6
8,145,576 UART: [idev] SUBJECT.KEYID = 7
8,146,637 UART: [idev] UDS.KEYID = 0
8,148,899 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,292,183 UART: [idev] Erasing UDS.KEYID = 0
11,432,741 UART: [idev] Using Sha1 for KeyId Algorithm
11,454,884 UART: [idev] --
11,459,306 UART: [ldev] ++
11,459,929 UART: [ldev] CDI.KEYID = 6
11,460,813 UART: [ldev] SUBJECT.KEYID = 5
11,462,109 UART: [ldev] AUTHORITY.KEYID = 7
11,463,346 UART: [ldev] FE.KEYID = 1
11,474,506 UART: [ldev] Erasing FE.KEYID = 1
14,764,592 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,056,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,071,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,085,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,100,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,119,195 UART: [ldev] --
17,123,497 UART: [fwproc] Waiting for Commands...
17,125,705 UART: [fwproc] Received command 0x46574c44
17,127,894 UART: [fwproc] Received Image of size 114124 bytes
21,183,898 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,262,603 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,331,467 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,647,936 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
4,131,408 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,767,404 >>> mbox cmd response: failed
15,767,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,307 >>> mbox cmd response: failed
15,768,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,868 >>> mbox cmd response: failed
Initializing fuses
2,056,619 writing to cptra_bootfsm_go
8,239,275 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,176,195 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,714 writing to cptra_bootfsm_go
192,826 UART:
193,197 UART: Running Caliptra ROM ...
194,402 UART:
194,562 UART: [state] CFI Enabled
262,139 UART: [state] LifecycleState = Unprovisioned
263,993 UART: [state] DebugLocked = No
266,878 UART: [state] WD Timer not started. Device not locked for debugging
270,057 UART: [kat] SHA2-256
449,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,762 UART: [kat] ++
461,296 UART: [kat] sha1
472,882 UART: [kat] SHA2-256
475,909 UART: [kat] SHA2-384
482,159 UART: [kat] SHA2-512-ACC
485,142 UART: [kat] ECC-384
2,951,038 UART: [kat] HMAC-384Kdf
2,970,611 UART: [kat] LMS
3,500,064 UART: [kat] --
3,503,739 UART: [cold-reset] ++
3,505,940 UART: [fht] FHT @ 0x50003400
3,517,674 UART: [idev] ++
3,518,303 UART: [idev] CDI.KEYID = 6
3,519,192 UART: [idev] SUBJECT.KEYID = 7
3,520,407 UART: [idev] UDS.KEYID = 0
3,523,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,266 UART: [idev] Erasing UDS.KEYID = 0
6,026,760 UART: [idev] Sha1 KeyId Algorithm
6,049,909 UART: [idev] --
6,054,472 UART: [ldev] ++
6,055,047 UART: [ldev] CDI.KEYID = 6
6,055,963 UART: [ldev] SUBJECT.KEYID = 5
6,057,128 UART: [ldev] AUTHORITY.KEYID = 7
6,058,366 UART: [ldev] FE.KEYID = 1
6,098,947 UART: [ldev] Erasing FE.KEYID = 1
8,601,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,071 UART: [ldev] --
10,411,073 UART: [fwproc] Wait for Commands...
10,413,501 UART: [fwproc] Recv command 0x46574c44
10,415,600 UART: [fwproc] Recv'd Img size: 114448 bytes
12,465,779 UART: ROM Fatal Error: 0x000B0017
12,468,864 >>> mbox cmd response: failed
12,469,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,469,619 >>> mbox cmd response: failed
12,469,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,470,226 >>> mbox cmd response: failed
Initializing fuses
2,053,354 writing to cptra_bootfsm_go
2,242,638 UART:
2,242,984 UART: Running Caliptra ROM ...
2,244,083 UART:
2,244,240 UART: [state] CFI Enabled
2,317,173 UART: [state] LifecycleState = Unprovisioned
2,319,063 UART: [state] DebugLocked = No
2,320,857 UART: [state] WD Timer not started. Device not locked for debugging
2,325,058 UART: [kat] SHA2-256
2,504,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,515,765 UART: [kat] ++
2,516,312 UART: [kat] sha1
2,527,962 UART: [kat] SHA2-256
2,530,986 UART: [kat] SHA2-384
2,536,652 UART: [kat] SHA2-512-ACC
2,539,593 UART: [kat] ECC-384
5,002,814 UART: [kat] HMAC-384Kdf
5,026,450 UART: [kat] LMS
5,555,896 UART: [kat] --
5,561,823 UART: [cold-reset] ++
5,563,805 UART: [fht] FHT @ 0x50003400
5,574,517 UART: [idev] ++
5,575,081 UART: [idev] CDI.KEYID = 6
5,576,046 UART: [idev] SUBJECT.KEYID = 7
5,577,223 UART: [idev] UDS.KEYID = 0
5,579,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,723,566 UART: [idev] Erasing UDS.KEYID = 0
8,082,820 UART: [idev] Sha1 KeyId Algorithm
8,106,378 UART: [idev] --
8,111,820 UART: [ldev] ++
8,112,400 UART: [ldev] CDI.KEYID = 6
8,113,310 UART: [ldev] SUBJECT.KEYID = 5
8,114,473 UART: [ldev] AUTHORITY.KEYID = 7
8,115,707 UART: [ldev] FE.KEYID = 1
8,155,301 UART: [ldev] Erasing FE.KEYID = 1
10,661,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,789 UART: [ldev] --
12,468,850 UART: [fwproc] Wait for Commands...
12,470,844 UART: [fwproc] Recv command 0x46574c44
12,472,942 UART: [fwproc] Recv'd Img size: 114448 bytes
15,878,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,955,701 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,024,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,342,261 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,382,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,248,909 >>> mbox cmd response: failed
12,249,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,249,988 >>> mbox cmd response: failed
12,250,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,250,552 >>> mbox cmd response: failed
Initializing fuses
2,053,810 writing to cptra_bootfsm_go
5,404,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,085,943 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
192,678 UART:
193,031 UART: Running Caliptra ROM ...
194,686 UART:
603,597 UART: [state] CFI Enabled
614,805 UART: [state] LifecycleState = Unprovisioned
616,705 UART: [state] DebugLocked = No
618,292 UART: [state] WD Timer not started. Device not locked for debugging
621,691 UART: [kat] SHA2-256
800,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,412 UART: [kat] ++
812,938 UART: [kat] sha1
824,539 UART: [kat] SHA2-256
827,540 UART: [kat] SHA2-384
834,976 UART: [kat] SHA2-512-ACC
837,947 UART: [kat] ECC-384
3,280,408 UART: [kat] HMAC-384Kdf
3,293,464 UART: [kat] LMS
3,822,994 UART: [kat] --
3,826,254 UART: [cold-reset] ++
3,828,355 UART: [fht] FHT @ 0x50003400
3,838,087 UART: [idev] ++
3,838,668 UART: [idev] CDI.KEYID = 6
3,839,549 UART: [idev] SUBJECT.KEYID = 7
3,840,762 UART: [idev] UDS.KEYID = 0
3,843,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,627 UART: [idev] Erasing UDS.KEYID = 0
6,315,606 UART: [idev] Sha1 KeyId Algorithm
6,338,808 UART: [idev] --
6,343,774 UART: [ldev] ++
6,344,346 UART: [ldev] CDI.KEYID = 6
6,345,254 UART: [ldev] SUBJECT.KEYID = 5
6,346,470 UART: [ldev] AUTHORITY.KEYID = 7
6,347,700 UART: [ldev] FE.KEYID = 1
6,359,966 UART: [ldev] Erasing FE.KEYID = 1
8,832,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,904 UART: [ldev] --
10,622,275 UART: [fwproc] Wait for Commands...
10,623,775 UART: [fwproc] Recv command 0x46574c44
10,625,867 UART: [fwproc] Recv'd Img size: 114448 bytes
12,678,522 UART: ROM Fatal Error: 0x000B0017
12,681,642 >>> mbox cmd response: failed
12,682,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,682,443 >>> mbox cmd response: failed
12,682,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,683,055 >>> mbox cmd response: failed
Initializing fuses
2,052,911 writing to cptra_bootfsm_go
2,242,216 UART:
2,242,551 UART: Running Caliptra ROM ...
2,243,602 UART:
7,770,600 UART: [state] CFI Enabled
7,783,136 UART: [state] LifecycleState = Unprovisioned
7,785,007 UART: [state] DebugLocked = No
7,787,939 UART: [state] WD Timer not started. Device not locked for debugging
7,790,936 UART: [kat] SHA2-256
7,970,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,981,628 UART: [kat] ++
7,982,091 UART: [kat] sha1
7,994,056 UART: [kat] SHA2-256
7,997,071 UART: [kat] SHA2-384
8,003,392 UART: [kat] SHA2-512-ACC
8,006,343 UART: [kat] ECC-384
10,447,329 UART: [kat] HMAC-384Kdf
10,460,950 UART: [kat] LMS
10,990,415 UART: [kat] --
10,994,792 UART: [cold-reset] ++
10,996,016 UART: [fht] FHT @ 0x50003400
11,006,994 UART: [idev] ++
11,007,560 UART: [idev] CDI.KEYID = 6
11,008,510 UART: [idev] SUBJECT.KEYID = 7
11,009,674 UART: [idev] UDS.KEYID = 0
11,012,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,155,866 UART: [idev] Erasing UDS.KEYID = 0
13,483,212 UART: [idev] Sha1 KeyId Algorithm
13,505,738 UART: [idev] --
13,508,810 UART: [ldev] ++
13,509,374 UART: [ldev] CDI.KEYID = 6
13,510,259 UART: [ldev] SUBJECT.KEYID = 5
13,512,046 UART: [ldev] AUTHORITY.KEYID = 7
13,513,160 UART: [ldev] FE.KEYID = 1
13,524,375 UART: [ldev] Erasing FE.KEYID = 1
16,001,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,719,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,735,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,751,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,767,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,787,365 UART: [ldev] --
17,791,876 UART: [fwproc] Wait for Commands...
17,793,751 UART: [fwproc] Recv command 0x46574c44
17,795,844 UART: [fwproc] Recv'd Img size: 114448 bytes
21,205,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,281,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,349,930 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,667,551 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
3,693,348 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,465,591 >>> mbox cmd response: failed
12,466,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,466,465 >>> mbox cmd response: failed
12,466,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,467,028 >>> mbox cmd response: failed
Initializing fuses
2,054,537 writing to cptra_bootfsm_go
11,092,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,665,125 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,440,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,304,325 >>> mbox cmd response: failed
12,304,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,250 >>> mbox cmd response: failed
12,305,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,853 >>> mbox cmd response: failed
Initializing fuses
2,054,900 writing to cptra_bootfsm_go
5,489,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,780,557 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,754,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,513,281 >>> mbox cmd response: failed
12,513,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,183 >>> mbox cmd response: failed
12,514,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,743 >>> mbox cmd response: failed
Initializing fuses
2,056,923 writing to cptra_bootfsm_go
11,105,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,314,656 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,083 UART: [kat] SHA2-256
882,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,129 UART: [kat] ++
886,281 UART: [kat] sha1
890,471 UART: [kat] SHA2-256
892,409 UART: [kat] SHA2-384
895,088 UART: [kat] SHA2-512-ACC
896,989 UART: [kat] ECC-384
902,324 UART: [kat] HMAC-384Kdf
907,066 UART: [kat] LMS
1,475,262 UART: [kat] --
1,476,035 UART: [cold-reset] ++
1,476,371 UART: [fht] Storing FHT @ 0x50003400
1,479,192 UART: [idev] ++
1,479,360 UART: [idev] CDI.KEYID = 6
1,479,720 UART: [idev] SUBJECT.KEYID = 7
1,480,144 UART: [idev] UDS.KEYID = 0
1,480,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,784 UART: [idev] Erasing UDS.KEYID = 0
1,504,316 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,120 UART: [idev] --
1,514,121 UART: [ldev] ++
1,514,289 UART: [ldev] CDI.KEYID = 6
1,514,652 UART: [ldev] SUBJECT.KEYID = 5
1,515,078 UART: [ldev] AUTHORITY.KEYID = 7
1,515,541 UART: [ldev] FE.KEYID = 1
1,520,727 UART: [ldev] Erasing FE.KEYID = 1
1,546,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,208 UART: [ldev] --
1,585,639 UART: [fwproc] Waiting for Commands...
1,586,350 UART: [fwproc] Received command 0x46574c44
1,587,141 UART: [fwproc] Received Image of size 114448 bytes
1,634,450 UART: ROM Fatal Error: 0x000B0017
1,635,607 >>> mbox cmd response: failed
1,635,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,613 >>> mbox cmd response: failed
1,635,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,147 UART: [kat] SHA2-256
882,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,193 UART: [kat] ++
886,345 UART: [kat] sha1
890,575 UART: [kat] SHA2-256
892,513 UART: [kat] SHA2-384
895,270 UART: [kat] SHA2-512-ACC
897,171 UART: [kat] ECC-384
902,572 UART: [kat] HMAC-384Kdf
907,264 UART: [kat] LMS
1,475,460 UART: [kat] --
1,476,301 UART: [cold-reset] ++
1,476,747 UART: [fht] Storing FHT @ 0x50003400
1,479,290 UART: [idev] ++
1,479,458 UART: [idev] CDI.KEYID = 6
1,479,818 UART: [idev] SUBJECT.KEYID = 7
1,480,242 UART: [idev] UDS.KEYID = 0
1,480,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,520 UART: [idev] Erasing UDS.KEYID = 0
1,504,926 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,568 UART: [idev] --
1,514,615 UART: [ldev] ++
1,514,783 UART: [ldev] CDI.KEYID = 6
1,515,146 UART: [ldev] SUBJECT.KEYID = 5
1,515,572 UART: [ldev] AUTHORITY.KEYID = 7
1,516,035 UART: [ldev] FE.KEYID = 1
1,521,197 UART: [ldev] Erasing FE.KEYID = 1
1,546,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,300 UART: [ldev] --
1,585,721 UART: [fwproc] Waiting for Commands...
1,586,348 UART: [fwproc] Received command 0x46574c44
1,587,139 UART: [fwproc] Received Image of size 114448 bytes
2,886,127 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,025 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,377 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,436 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,228 >>> mbox cmd response: failed
1,489,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,234 >>> mbox cmd response: failed
1,489,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,204 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,931 UART: [state] LifecycleState = Unprovisioned
85,586 UART: [state] DebugLocked = No
86,218 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,702 UART: [kat] SHA2-256
881,633 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,748 UART: [kat] ++
885,900 UART: [kat] sha1
890,040 UART: [kat] SHA2-256
891,978 UART: [kat] SHA2-384
894,585 UART: [kat] SHA2-512-ACC
896,486 UART: [kat] ECC-384
901,589 UART: [kat] HMAC-384Kdf
906,035 UART: [kat] LMS
1,474,231 UART: [kat] --
1,475,296 UART: [cold-reset] ++
1,475,796 UART: [fht] Storing FHT @ 0x50003400
1,478,465 UART: [idev] ++
1,478,633 UART: [idev] CDI.KEYID = 6
1,478,993 UART: [idev] SUBJECT.KEYID = 7
1,479,417 UART: [idev] UDS.KEYID = 0
1,479,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,429 UART: [idev] Erasing UDS.KEYID = 0
1,504,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,067 UART: [idev] --
1,514,148 UART: [ldev] ++
1,514,316 UART: [ldev] CDI.KEYID = 6
1,514,679 UART: [ldev] SUBJECT.KEYID = 5
1,515,105 UART: [ldev] AUTHORITY.KEYID = 7
1,515,568 UART: [ldev] FE.KEYID = 1
1,520,714 UART: [ldev] Erasing FE.KEYID = 1
1,546,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,889 UART: [ldev] --
1,585,238 UART: [fwproc] Waiting for Commands...
1,585,925 UART: [fwproc] Received command 0x46574c44
1,586,716 UART: [fwproc] Received Image of size 114448 bytes
1,633,197 UART: ROM Fatal Error: 0x000B0017
1,634,354 >>> mbox cmd response: failed
1,634,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,360 >>> mbox cmd response: failed
1,634,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,705 UART: [state] LifecycleState = Unprovisioned
85,360 UART: [state] DebugLocked = No
85,958 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,590 UART: [kat] SHA2-256
881,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,636 UART: [kat] ++
885,788 UART: [kat] sha1
889,930 UART: [kat] SHA2-256
891,868 UART: [kat] SHA2-384
894,477 UART: [kat] SHA2-512-ACC
896,378 UART: [kat] ECC-384
902,021 UART: [kat] HMAC-384Kdf
906,593 UART: [kat] LMS
1,474,789 UART: [kat] --
1,475,470 UART: [cold-reset] ++
1,475,856 UART: [fht] Storing FHT @ 0x50003400
1,478,515 UART: [idev] ++
1,478,683 UART: [idev] CDI.KEYID = 6
1,479,043 UART: [idev] SUBJECT.KEYID = 7
1,479,467 UART: [idev] UDS.KEYID = 0
1,479,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,815 UART: [idev] Erasing UDS.KEYID = 0
1,504,611 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,077 UART: [idev] --
1,514,130 UART: [ldev] ++
1,514,298 UART: [ldev] CDI.KEYID = 6
1,514,661 UART: [ldev] SUBJECT.KEYID = 5
1,515,087 UART: [ldev] AUTHORITY.KEYID = 7
1,515,550 UART: [ldev] FE.KEYID = 1
1,520,668 UART: [ldev] Erasing FE.KEYID = 1
1,545,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,733 UART: [ldev] --
1,585,110 UART: [fwproc] Waiting for Commands...
1,585,977 UART: [fwproc] Received command 0x46574c44
1,586,768 UART: [fwproc] Received Image of size 114448 bytes
2,885,640 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,854 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,203 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,087 >>> mbox cmd response: failed
1,488,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,093 >>> mbox cmd response: failed
1,488,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,099 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,945 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
893,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,419 UART: [kat] ++
897,571 UART: [kat] sha1
901,829 UART: [kat] SHA2-256
903,769 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,304 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,171,919 UART: [cold-reset] ++
1,172,395 UART: [fht] FHT @ 0x50003400
1,175,092 UART: [idev] ++
1,175,260 UART: [idev] CDI.KEYID = 6
1,175,620 UART: [idev] SUBJECT.KEYID = 7
1,176,044 UART: [idev] UDS.KEYID = 0
1,176,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,098 UART: [idev] Erasing UDS.KEYID = 0
1,200,845 UART: [idev] Sha1 KeyId Algorithm
1,209,193 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,628 UART: [ldev] SUBJECT.KEYID = 5
1,211,054 UART: [ldev] AUTHORITY.KEYID = 7
1,211,517 UART: [ldev] FE.KEYID = 1
1,216,563 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,459 UART: [ldev] --
1,281,954 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46574c44
1,283,412 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,503 UART: ROM Fatal Error: 0x000B0017
1,331,660 >>> mbox cmd response: failed
1,331,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,666 >>> mbox cmd response: failed
1,331,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
893,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,255 UART: [kat] ++
897,407 UART: [kat] sha1
901,621 UART: [kat] SHA2-256
903,561 UART: [kat] SHA2-384
906,388 UART: [kat] SHA2-512-ACC
908,289 UART: [kat] ECC-384
917,592 UART: [kat] HMAC-384Kdf
922,194 UART: [kat] LMS
1,170,522 UART: [kat] --
1,171,093 UART: [cold-reset] ++
1,171,657 UART: [fht] FHT @ 0x50003400
1,174,140 UART: [idev] ++
1,174,308 UART: [idev] CDI.KEYID = 6
1,174,668 UART: [idev] SUBJECT.KEYID = 7
1,175,092 UART: [idev] UDS.KEYID = 0
1,175,437 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,272 UART: [idev] Erasing UDS.KEYID = 0
1,200,321 UART: [idev] Sha1 KeyId Algorithm
1,208,967 UART: [idev] --
1,209,925 UART: [ldev] ++
1,210,093 UART: [ldev] CDI.KEYID = 6
1,210,456 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,243,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,619 UART: [ldev] --
1,283,098 UART: [fwproc] Wait for Commands...
1,283,848 UART: [fwproc] Recv command 0x46574c44
1,284,576 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,062 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,365 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,651 >>> mbox cmd response: failed
1,185,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,657 >>> mbox cmd response: failed
1,185,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,835 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
893,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,860 UART: [kat] ++
898,012 UART: [kat] sha1
902,088 UART: [kat] SHA2-256
904,028 UART: [kat] SHA2-384
906,783 UART: [kat] SHA2-512-ACC
908,684 UART: [kat] ECC-384
918,651 UART: [kat] HMAC-384Kdf
923,455 UART: [kat] LMS
1,171,783 UART: [kat] --
1,172,698 UART: [cold-reset] ++
1,173,096 UART: [fht] FHT @ 0x50003400
1,175,827 UART: [idev] ++
1,175,995 UART: [idev] CDI.KEYID = 6
1,176,355 UART: [idev] SUBJECT.KEYID = 7
1,176,779 UART: [idev] UDS.KEYID = 0
1,177,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,983 UART: [idev] Erasing UDS.KEYID = 0
1,201,598 UART: [idev] Sha1 KeyId Algorithm
1,209,958 UART: [idev] --
1,210,976 UART: [ldev] ++
1,211,144 UART: [ldev] CDI.KEYID = 6
1,211,507 UART: [ldev] SUBJECT.KEYID = 5
1,211,933 UART: [ldev] AUTHORITY.KEYID = 7
1,212,396 UART: [ldev] FE.KEYID = 1
1,217,490 UART: [ldev] Erasing FE.KEYID = 1
1,243,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,730 UART: [ldev] --
1,283,157 UART: [fwproc] Wait for Commands...
1,283,963 UART: [fwproc] Recv command 0x46574c44
1,284,691 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,076 UART: ROM Fatal Error: 0x000B0017
1,333,233 >>> mbox cmd response: failed
1,333,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,239 >>> mbox cmd response: failed
1,333,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
893,289 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,414 UART: [kat] ++
897,566 UART: [kat] sha1
901,690 UART: [kat] SHA2-256
903,630 UART: [kat] SHA2-384
906,411 UART: [kat] SHA2-512-ACC
908,312 UART: [kat] ECC-384
918,213 UART: [kat] HMAC-384Kdf
923,021 UART: [kat] LMS
1,171,349 UART: [kat] --
1,172,196 UART: [cold-reset] ++
1,172,562 UART: [fht] FHT @ 0x50003400
1,175,041 UART: [idev] ++
1,175,209 UART: [idev] CDI.KEYID = 6
1,175,569 UART: [idev] SUBJECT.KEYID = 7
1,175,993 UART: [idev] UDS.KEYID = 0
1,176,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,849 UART: [idev] Erasing UDS.KEYID = 0
1,201,290 UART: [idev] Sha1 KeyId Algorithm
1,209,870 UART: [idev] --
1,210,896 UART: [ldev] ++
1,211,064 UART: [ldev] CDI.KEYID = 6
1,211,427 UART: [ldev] SUBJECT.KEYID = 5
1,211,853 UART: [ldev] AUTHORITY.KEYID = 7
1,212,316 UART: [ldev] FE.KEYID = 1
1,217,538 UART: [ldev] Erasing FE.KEYID = 1
1,243,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,726 UART: [ldev] --
1,283,119 UART: [fwproc] Wait for Commands...
1,283,697 UART: [fwproc] Recv command 0x46574c44
1,284,425 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,664 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,290 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,188,532 >>> mbox cmd response: failed
1,188,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,538 >>> mbox cmd response: failed
1,188,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,951 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
890,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,013 UART: [kat] ++
895,165 UART: [kat] sha1
899,395 UART: [kat] SHA2-256
901,335 UART: [kat] SHA2-384
904,068 UART: [kat] SHA2-512-ACC
905,969 UART: [kat] ECC-384
915,616 UART: [kat] HMAC-384Kdf
920,186 UART: [kat] LMS
1,168,498 UART: [kat] --
1,169,473 UART: [cold-reset] ++
1,169,823 UART: [fht] FHT @ 0x50003400
1,172,587 UART: [idev] ++
1,172,755 UART: [idev] CDI.KEYID = 6
1,173,116 UART: [idev] SUBJECT.KEYID = 7
1,173,541 UART: [idev] UDS.KEYID = 0
1,173,887 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,198,305 UART: [idev] Sha1 KeyId Algorithm
1,207,089 UART: [idev] --
1,208,090 UART: [ldev] ++
1,208,258 UART: [ldev] CDI.KEYID = 6
1,208,622 UART: [ldev] SUBJECT.KEYID = 5
1,209,049 UART: [ldev] AUTHORITY.KEYID = 7
1,209,512 UART: [ldev] FE.KEYID = 1
1,214,618 UART: [ldev] Erasing FE.KEYID = 1
1,240,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,384 UART: [ldev] --
1,279,870 UART: [fwproc] Wait for Commands...
1,280,479 UART: [fwproc] Recv command 0x46574c44
1,281,212 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,162 UART: ROM Fatal Error: 0x000B0017
1,329,319 >>> mbox cmd response: failed
1,329,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,325 >>> mbox cmd response: failed
1,329,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
915,536 UART: [kat] HMAC-384Kdf
920,108 UART: [kat] LMS
1,168,420 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,783 UART: [fht] FHT @ 0x50003400
1,172,481 UART: [idev] ++
1,172,649 UART: [idev] CDI.KEYID = 6
1,173,010 UART: [idev] SUBJECT.KEYID = 7
1,173,435 UART: [idev] UDS.KEYID = 0
1,173,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,453 UART: [idev] Erasing UDS.KEYID = 0
1,198,147 UART: [idev] Sha1 KeyId Algorithm
1,207,009 UART: [idev] --
1,208,040 UART: [ldev] ++
1,208,208 UART: [ldev] CDI.KEYID = 6
1,208,572 UART: [ldev] SUBJECT.KEYID = 5
1,208,999 UART: [ldev] AUTHORITY.KEYID = 7
1,209,462 UART: [ldev] FE.KEYID = 1
1,214,694 UART: [ldev] Erasing FE.KEYID = 1
1,240,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,660 UART: [ldev] --
1,279,932 UART: [fwproc] Wait for Commands...
1,280,605 UART: [fwproc] Recv command 0x46574c44
1,281,338 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,099 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,440 >>> mbox cmd response: failed
1,182,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,446 >>> mbox cmd response: failed
1,182,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,847 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,796 UART: [kat] ++
895,948 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,294 UART: [cold-reset] ++
1,170,666 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,218 UART: [idev] Erasing UDS.KEYID = 0
1,198,826 UART: [idev] Sha1 KeyId Algorithm
1,207,566 UART: [idev] --
1,208,605 UART: [ldev] ++
1,208,773 UART: [ldev] CDI.KEYID = 6
1,209,137 UART: [ldev] SUBJECT.KEYID = 5
1,209,564 UART: [ldev] AUTHORITY.KEYID = 7
1,210,027 UART: [ldev] FE.KEYID = 1
1,215,341 UART: [ldev] Erasing FE.KEYID = 1
1,241,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,109 UART: [ldev] --
1,280,477 UART: [fwproc] Wait for Commands...
1,281,216 UART: [fwproc] Recv command 0x46574c44
1,281,949 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,491 UART: ROM Fatal Error: 0x000B0017
1,330,648 >>> mbox cmd response: failed
1,330,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,654 >>> mbox cmd response: failed
1,330,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,502 UART: [fht] FHT @ 0x50003400
1,173,224 UART: [idev] ++
1,173,392 UART: [idev] CDI.KEYID = 6
1,173,753 UART: [idev] SUBJECT.KEYID = 7
1,174,178 UART: [idev] UDS.KEYID = 0
1,174,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,970 UART: [idev] Erasing UDS.KEYID = 0
1,198,866 UART: [idev] Sha1 KeyId Algorithm
1,207,762 UART: [idev] --
1,208,887 UART: [ldev] ++
1,209,055 UART: [ldev] CDI.KEYID = 6
1,209,419 UART: [ldev] SUBJECT.KEYID = 5
1,209,846 UART: [ldev] AUTHORITY.KEYID = 7
1,210,309 UART: [ldev] FE.KEYID = 1
1,215,545 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,143 UART: [ldev] --
1,281,581 UART: [fwproc] Wait for Commands...
1,282,340 UART: [fwproc] Recv command 0x46574c44
1,283,073 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,925 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,340 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,385 >>> mbox cmd response: failed
1,183,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,391 >>> mbox cmd response: failed
1,183,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,397 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,768 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,163 UART:
192,536 UART: Running Caliptra ROM ...
193,686 UART:
193,837 UART: [state] CFI Enabled
262,049 UART: [state] LifecycleState = Unprovisioned
263,985 UART: [state] DebugLocked = No
266,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,315 UART: [kat] SHA2-256
441,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,540 UART: [kat] ++
452,094 UART: [kat] sha1
461,794 UART: [kat] SHA2-256
464,476 UART: [kat] SHA2-384
469,478 UART: [kat] SHA2-512-ACC
471,869 UART: [kat] ECC-384
2,766,655 UART: [kat] HMAC-384Kdf
2,779,339 UART: [kat] LMS
3,969,622 UART: [kat] --
3,974,491 UART: [cold-reset] ++
3,976,537 UART: [fht] Storing FHT @ 0x50003400
3,987,159 UART: [idev] ++
3,987,725 UART: [idev] CDI.KEYID = 6
3,988,699 UART: [idev] SUBJECT.KEYID = 7
3,989,916 UART: [idev] UDS.KEYID = 0
3,992,518 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,384 UART: [idev] Erasing UDS.KEYID = 0
7,324,937 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,728 UART: [idev] --
7,350,161 UART: [ldev] ++
7,350,730 UART: [ldev] CDI.KEYID = 6
7,351,702 UART: [ldev] SUBJECT.KEYID = 5
7,352,867 UART: [ldev] AUTHORITY.KEYID = 7
7,354,154 UART: [ldev] FE.KEYID = 1
7,401,803 UART: [ldev] Erasing FE.KEYID = 1
10,733,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,959 UART: [ldev] --
13,095,392 UART: [fwproc] Waiting for Commands...
13,097,061 UART: [fwproc] Received command 0x46574c44
13,099,269 UART: [fwproc] Received Image of size 114124 bytes
15,803,511 UART: ROM Fatal Error: 0x000B003B
15,806,961 >>> mbox cmd response: failed
15,807,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,807,654 >>> mbox cmd response: failed
15,808,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,808,344 >>> mbox cmd response: failed
Initializing fuses
2,068,600 writing to cptra_bootfsm_go
2,257,933 UART:
2,258,278 UART: Running Caliptra ROM ...
2,259,414 UART:
2,259,574 UART: [state] CFI Enabled
2,333,748 UART: [state] LifecycleState = Unprovisioned
2,335,705 UART: [state] DebugLocked = No
2,337,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,342,056 UART: [kat] SHA2-256
2,511,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,522,244 UART: [kat] ++
2,522,749 UART: [kat] sha1
2,533,143 UART: [kat] SHA2-256
2,535,841 UART: [kat] SHA2-384
2,542,260 UART: [kat] SHA2-512-ACC
2,544,612 UART: [kat] ECC-384
4,836,256 UART: [kat] HMAC-384Kdf
4,866,531 UART: [kat] LMS
6,056,858 UART: [kat] --
6,062,054 UART: [cold-reset] ++
6,064,701 UART: [fht] Storing FHT @ 0x50003400
6,075,864 UART: [idev] ++
6,076,449 UART: [idev] CDI.KEYID = 6
6,077,392 UART: [idev] SUBJECT.KEYID = 7
6,078,664 UART: [idev] UDS.KEYID = 0
6,080,905 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,224,452 UART: [idev] Erasing UDS.KEYID = 0
9,411,356 UART: [idev] Using Sha1 for KeyId Algorithm
9,433,277 UART: [idev] --
9,437,649 UART: [ldev] ++
9,438,279 UART: [ldev] CDI.KEYID = 6
9,439,158 UART: [ldev] SUBJECT.KEYID = 5
9,440,416 UART: [ldev] AUTHORITY.KEYID = 7
9,441,661 UART: [ldev] FE.KEYID = 1
9,489,031 UART: [ldev] Erasing FE.KEYID = 1
12,820,245 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,115,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,130,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,145,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,159,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,178,488 UART: [ldev] --
15,183,166 UART: [fwproc] Waiting for Commands...
15,185,109 UART: [fwproc] Received command 0x46574c44
15,187,298 UART: [fwproc] Received Image of size 114124 bytes
19,239,956 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,313,807 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,382,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,699,965 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,808,048 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,563,207 >>> mbox cmd response: failed
15,563,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,564,216 >>> mbox cmd response: failed
15,564,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,564,787 >>> mbox cmd response: failed
Initializing fuses
2,063,087 writing to cptra_bootfsm_go
5,865,901 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,931,958 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,575 UART:
192,923 UART: Running Caliptra ROM ...
194,133 UART:
603,820 UART: [state] CFI Enabled
614,752 UART: [state] LifecycleState = Unprovisioned
616,664 UART: [state] DebugLocked = No
617,965 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,809 UART: [kat] SHA2-256
792,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,076 UART: [kat] ++
803,583 UART: [kat] sha1
814,023 UART: [kat] SHA2-256
816,714 UART: [kat] SHA2-384
821,069 UART: [kat] SHA2-512-ACC
823,408 UART: [kat] ECC-384
3,109,656 UART: [kat] HMAC-384Kdf
3,122,277 UART: [kat] LMS
4,312,401 UART: [kat] --
4,316,097 UART: [cold-reset] ++
4,317,717 UART: [fht] Storing FHT @ 0x50003400
4,330,659 UART: [idev] ++
4,331,224 UART: [idev] CDI.KEYID = 6
4,332,242 UART: [idev] SUBJECT.KEYID = 7
4,333,468 UART: [idev] UDS.KEYID = 0
4,335,999 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,479,552 UART: [idev] Erasing UDS.KEYID = 0
7,621,934 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,842 UART: [idev] --
7,646,680 UART: [ldev] ++
7,647,261 UART: [ldev] CDI.KEYID = 6
7,648,171 UART: [ldev] SUBJECT.KEYID = 5
7,649,489 UART: [ldev] AUTHORITY.KEYID = 7
7,650,787 UART: [ldev] FE.KEYID = 1
7,663,252 UART: [ldev] Erasing FE.KEYID = 1
10,950,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,199 UART: [ldev] --
13,313,785 UART: [fwproc] Waiting for Commands...
13,316,820 UART: [fwproc] Received command 0x46574c44
13,319,010 UART: [fwproc] Received Image of size 114124 bytes
16,025,162 UART: ROM Fatal Error: 0x000B003B
16,028,624 >>> mbox cmd response: failed
16,029,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,356 >>> mbox cmd response: failed
16,029,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,915 >>> mbox cmd response: failed
Initializing fuses
2,055,968 writing to cptra_bootfsm_go
2,245,304 UART:
2,245,662 UART: Running Caliptra ROM ...
2,246,707 UART:
4,427,934 UART: [state] CFI Enabled
4,438,754 UART: [state] LifecycleState = Unprovisioned
4,440,670 UART: [state] DebugLocked = No
4,443,032 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,448,480 UART: [kat] SHA2-256
4,618,190 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,628,776 UART: [kat] ++
4,629,238 UART: [kat] sha1
4,639,047 UART: [kat] SHA2-256
4,641,751 UART: [kat] SHA2-384
4,648,231 UART: [kat] SHA2-512-ACC
4,650,581 UART: [kat] ECC-384
6,934,292 UART: [kat] HMAC-384Kdf
6,945,599 UART: [kat] LMS
8,135,756 UART: [kat] --
8,138,904 UART: [cold-reset] ++
8,140,790 UART: [fht] Storing FHT @ 0x50003400
8,151,761 UART: [idev] ++
8,152,332 UART: [idev] CDI.KEYID = 6
8,153,297 UART: [idev] SUBJECT.KEYID = 7
8,154,515 UART: [idev] UDS.KEYID = 0
8,156,998 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,300,457 UART: [idev] Erasing UDS.KEYID = 0
11,445,230 UART: [idev] Using Sha1 for KeyId Algorithm
11,467,538 UART: [idev] --
11,470,970 UART: [ldev] ++
11,471,549 UART: [ldev] CDI.KEYID = 6
11,472,461 UART: [ldev] SUBJECT.KEYID = 5
11,473,717 UART: [ldev] AUTHORITY.KEYID = 7
11,474,950 UART: [ldev] FE.KEYID = 1
11,487,538 UART: [ldev] Erasing FE.KEYID = 1
14,775,334 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,068,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,083,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,098,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,112,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,130,935 UART: [ldev] --
17,135,605 UART: [fwproc] Waiting for Commands...
17,138,800 UART: [fwproc] Received command 0x46574c44
17,141,049 UART: [fwproc] Received Image of size 114124 bytes
21,191,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,270,004 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,338,876 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,656,348 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
4,126,069 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,763,906 >>> mbox cmd response: failed
15,765,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,765,491 >>> mbox cmd response: failed
15,765,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,766,057 >>> mbox cmd response: failed
Initializing fuses
2,071,634 writing to cptra_bootfsm_go
8,228,624 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,155,138 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
192,220 UART:
192,568 UART: Running Caliptra ROM ...
193,770 UART:
193,927 UART: [state] CFI Enabled
260,147 UART: [state] LifecycleState = Unprovisioned
262,014 UART: [state] DebugLocked = No
264,172 UART: [state] WD Timer not started. Device not locked for debugging
268,225 UART: [kat] SHA2-256
447,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,928 UART: [kat] ++
459,458 UART: [kat] sha1
470,720 UART: [kat] SHA2-256
473,721 UART: [kat] SHA2-384
479,824 UART: [kat] SHA2-512-ACC
482,818 UART: [kat] ECC-384
2,947,097 UART: [kat] HMAC-384Kdf
2,971,764 UART: [kat] LMS
3,501,241 UART: [kat] --
3,506,210 UART: [cold-reset] ++
3,507,057 UART: [fht] FHT @ 0x50003400
3,517,425 UART: [idev] ++
3,518,045 UART: [idev] CDI.KEYID = 6
3,518,963 UART: [idev] SUBJECT.KEYID = 7
3,520,127 UART: [idev] UDS.KEYID = 0
3,523,101 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,114 UART: [idev] Erasing UDS.KEYID = 0
6,026,838 UART: [idev] Sha1 KeyId Algorithm
6,050,227 UART: [idev] --
6,054,380 UART: [ldev] ++
6,054,957 UART: [ldev] CDI.KEYID = 6
6,055,844 UART: [ldev] SUBJECT.KEYID = 5
6,057,007 UART: [ldev] AUTHORITY.KEYID = 7
6,058,304 UART: [ldev] FE.KEYID = 1
6,100,668 UART: [ldev] Erasing FE.KEYID = 1
8,605,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,131 UART: [ldev] --
10,417,215 UART: [fwproc] Wait for Commands...
10,419,755 UART: [fwproc] Recv command 0x46574c44
10,421,802 UART: [fwproc] Recv'd Img size: 114448 bytes
12,472,720 UART: ROM Fatal Error: 0x000B003B
12,475,839 >>> mbox cmd response: failed
12,476,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,476,589 >>> mbox cmd response: failed
12,476,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,477,147 >>> mbox cmd response: failed
Initializing fuses
2,060,036 writing to cptra_bootfsm_go
2,249,363 UART:
2,249,703 UART: Running Caliptra ROM ...
2,250,839 UART:
2,251,024 UART: [state] CFI Enabled
2,315,973 UART: [state] LifecycleState = Unprovisioned
2,317,853 UART: [state] DebugLocked = No
2,319,731 UART: [state] WD Timer not started. Device not locked for debugging
2,322,890 UART: [kat] SHA2-256
2,502,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,610 UART: [kat] ++
2,514,161 UART: [kat] sha1
2,525,056 UART: [kat] SHA2-256
2,528,127 UART: [kat] SHA2-384
2,533,194 UART: [kat] SHA2-512-ACC
2,536,144 UART: [kat] ECC-384
4,980,009 UART: [kat] HMAC-384Kdf
5,003,535 UART: [kat] LMS
5,533,022 UART: [kat] --
5,538,582 UART: [cold-reset] ++
5,540,804 UART: [fht] FHT @ 0x50003400
5,551,132 UART: [idev] ++
5,551,701 UART: [idev] CDI.KEYID = 6
5,552,627 UART: [idev] SUBJECT.KEYID = 7
5,553,783 UART: [idev] UDS.KEYID = 0
5,556,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,700,184 UART: [idev] Erasing UDS.KEYID = 0
8,061,063 UART: [idev] Sha1 KeyId Algorithm
8,084,542 UART: [idev] --
8,088,032 UART: [ldev] ++
8,088,613 UART: [ldev] CDI.KEYID = 6
8,089,531 UART: [ldev] SUBJECT.KEYID = 5
8,090,692 UART: [ldev] AUTHORITY.KEYID = 7
8,091,926 UART: [ldev] FE.KEYID = 1
8,130,986 UART: [ldev] Erasing FE.KEYID = 1
10,634,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,372,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,388,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,403,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,439,178 UART: [ldev] --
12,443,578 UART: [fwproc] Wait for Commands...
12,446,161 UART: [fwproc] Recv command 0x46574c44
12,448,205 UART: [fwproc] Recv'd Img size: 114448 bytes
15,855,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,929,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,998,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,316,826 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,380,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,272,811 >>> mbox cmd response: failed
12,273,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,273,701 >>> mbox cmd response: failed
12,273,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,274,260 >>> mbox cmd response: failed
Initializing fuses
2,061,752 writing to cptra_bootfsm_go
5,443,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,097,650 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,761 UART:
193,119 UART: Running Caliptra ROM ...
194,320 UART:
603,777 UART: [state] CFI Enabled
619,061 UART: [state] LifecycleState = Unprovisioned
620,901 UART: [state] DebugLocked = No
622,977 UART: [state] WD Timer not started. Device not locked for debugging
627,139 UART: [kat] SHA2-256
806,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,847 UART: [kat] ++
818,381 UART: [kat] sha1
829,749 UART: [kat] SHA2-256
832,746 UART: [kat] SHA2-384
839,043 UART: [kat] SHA2-512-ACC
842,036 UART: [kat] ECC-384
3,284,865 UART: [kat] HMAC-384Kdf
3,296,995 UART: [kat] LMS
3,826,494 UART: [kat] --
3,832,273 UART: [cold-reset] ++
3,833,930 UART: [fht] FHT @ 0x50003400
3,845,991 UART: [idev] ++
3,846,624 UART: [idev] CDI.KEYID = 6
3,847,558 UART: [idev] SUBJECT.KEYID = 7
3,848,683 UART: [idev] UDS.KEYID = 0
3,851,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,995,258 UART: [idev] Erasing UDS.KEYID = 0
6,322,618 UART: [idev] Sha1 KeyId Algorithm
6,344,828 UART: [idev] --
6,347,314 UART: [ldev] ++
6,347,883 UART: [ldev] CDI.KEYID = 6
6,348,791 UART: [ldev] SUBJECT.KEYID = 5
6,350,006 UART: [ldev] AUTHORITY.KEYID = 7
6,351,241 UART: [ldev] FE.KEYID = 1
6,360,914 UART: [ldev] Erasing FE.KEYID = 1
8,834,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,688 UART: [ldev] --
10,624,421 UART: [fwproc] Wait for Commands...
10,627,331 UART: [fwproc] Recv command 0x46574c44
10,629,375 UART: [fwproc] Recv'd Img size: 114448 bytes
12,675,571 UART: ROM Fatal Error: 0x000B003B
12,678,638 >>> mbox cmd response: failed
12,679,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,679,417 >>> mbox cmd response: failed
12,679,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,680,017 >>> mbox cmd response: failed
Initializing fuses
2,060,331 writing to cptra_bootfsm_go
2,249,646 UART:
2,249,997 UART: Running Caliptra ROM ...
2,251,153 UART:
7,771,887 UART: [state] CFI Enabled
7,785,989 UART: [state] LifecycleState = Unprovisioned
7,787,839 UART: [state] DebugLocked = No
7,789,797 UART: [state] WD Timer not started. Device not locked for debugging
7,793,643 UART: [kat] SHA2-256
7,972,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,984,291 UART: [kat] ++
7,984,758 UART: [kat] sha1
7,994,940 UART: [kat] SHA2-256
7,997,958 UART: [kat] SHA2-384
8,004,387 UART: [kat] SHA2-512-ACC
8,007,341 UART: [kat] ECC-384
10,448,277 UART: [kat] HMAC-384Kdf
10,459,595 UART: [kat] LMS
10,989,080 UART: [kat] --
10,995,049 UART: [cold-reset] ++
10,995,903 UART: [fht] FHT @ 0x50003400
11,007,269 UART: [idev] ++
11,007,851 UART: [idev] CDI.KEYID = 6
11,008,739 UART: [idev] SUBJECT.KEYID = 7
11,009,906 UART: [idev] UDS.KEYID = 0
11,012,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,156,185 UART: [idev] Erasing UDS.KEYID = 0
13,480,452 UART: [idev] Sha1 KeyId Algorithm
13,502,652 UART: [idev] --
13,505,997 UART: [ldev] ++
13,506,566 UART: [ldev] CDI.KEYID = 6
13,507,475 UART: [ldev] SUBJECT.KEYID = 5
13,508,692 UART: [ldev] AUTHORITY.KEYID = 7
13,509,928 UART: [ldev] FE.KEYID = 1
13,519,709 UART: [ldev] Erasing FE.KEYID = 1
15,996,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,713,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,729,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,745,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,761,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,782,875 UART: [ldev] --
17,787,656 UART: [fwproc] Wait for Commands...
17,790,188 UART: [fwproc] Recv command 0x46574c44
17,792,243 UART: [fwproc] Recv'd Img size: 114448 bytes
21,190,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,263,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,332,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,650,317 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,705,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,462,987 >>> mbox cmd response: failed
12,463,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,464,291 >>> mbox cmd response: failed
12,464,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,464,877 >>> mbox cmd response: failed
Initializing fuses
2,056,685 writing to cptra_bootfsm_go
11,086,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,662,343 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,441,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,305,588 >>> mbox cmd response: failed
12,306,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,306,666 >>> mbox cmd response: failed
12,306,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,307,232 >>> mbox cmd response: failed
Initializing fuses
2,059,383 writing to cptra_bootfsm_go
5,491,555 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,786,890 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
3,759,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,518,797 >>> mbox cmd response: failed
12,519,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,519,733 >>> mbox cmd response: failed
12,520,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,306 >>> mbox cmd response: failed
Initializing fuses
2,055,638 writing to cptra_bootfsm_go
11,093,794 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,297,254 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,715 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,421 UART: [kat] SHA2-256
882,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,467 UART: [kat] ++
886,619 UART: [kat] sha1
890,977 UART: [kat] SHA2-256
892,915 UART: [kat] SHA2-384
895,630 UART: [kat] SHA2-512-ACC
897,531 UART: [kat] ECC-384
903,050 UART: [kat] HMAC-384Kdf
907,630 UART: [kat] LMS
1,475,826 UART: [kat] --
1,476,777 UART: [cold-reset] ++
1,477,113 UART: [fht] Storing FHT @ 0x50003400
1,479,968 UART: [idev] ++
1,480,136 UART: [idev] CDI.KEYID = 6
1,480,496 UART: [idev] SUBJECT.KEYID = 7
1,480,920 UART: [idev] UDS.KEYID = 0
1,481,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,908 UART: [idev] Erasing UDS.KEYID = 0
1,505,528 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,162 UART: [idev] --
1,515,121 UART: [ldev] ++
1,515,289 UART: [ldev] CDI.KEYID = 6
1,515,652 UART: [ldev] SUBJECT.KEYID = 5
1,516,078 UART: [ldev] AUTHORITY.KEYID = 7
1,516,541 UART: [ldev] FE.KEYID = 1
1,521,885 UART: [ldev] Erasing FE.KEYID = 1
1,547,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,018 UART: [ldev] --
1,586,317 UART: [fwproc] Waiting for Commands...
1,587,184 UART: [fwproc] Received command 0x46574c44
1,587,975 UART: [fwproc] Received Image of size 114448 bytes
1,635,328 UART: ROM Fatal Error: 0x000B003B
1,636,487 >>> mbox cmd response: failed
1,636,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,493 >>> mbox cmd response: failed
1,636,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,499 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,572 UART: [state] LifecycleState = Unprovisioned
85,227 UART: [state] DebugLocked = No
85,783 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,439 UART: [kat] SHA2-256
881,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,485 UART: [kat] ++
885,637 UART: [kat] sha1
889,827 UART: [kat] SHA2-256
891,765 UART: [kat] SHA2-384
894,660 UART: [kat] SHA2-512-ACC
896,561 UART: [kat] ECC-384
902,288 UART: [kat] HMAC-384Kdf
906,714 UART: [kat] LMS
1,474,910 UART: [kat] --
1,476,069 UART: [cold-reset] ++
1,476,605 UART: [fht] Storing FHT @ 0x50003400
1,479,340 UART: [idev] ++
1,479,508 UART: [idev] CDI.KEYID = 6
1,479,868 UART: [idev] SUBJECT.KEYID = 7
1,480,292 UART: [idev] UDS.KEYID = 0
1,480,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,424 UART: [idev] Erasing UDS.KEYID = 0
1,504,826 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,508 UART: [idev] --
1,514,577 UART: [ldev] ++
1,514,745 UART: [ldev] CDI.KEYID = 6
1,515,108 UART: [ldev] SUBJECT.KEYID = 5
1,515,534 UART: [ldev] AUTHORITY.KEYID = 7
1,515,997 UART: [ldev] FE.KEYID = 1
1,521,299 UART: [ldev] Erasing FE.KEYID = 1
1,546,660 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,004 UART: [ldev] --
1,586,297 UART: [fwproc] Waiting for Commands...
1,587,098 UART: [fwproc] Received command 0x46574c44
1,587,889 UART: [fwproc] Received Image of size 114448 bytes
2,886,961 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,145 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,450 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,720 >>> mbox cmd response: failed
1,488,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,726 >>> mbox cmd response: failed
1,488,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,732 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,040 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,284 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,806 UART: [kat] SHA2-256
881,737 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,852 UART: [kat] ++
886,004 UART: [kat] sha1
890,216 UART: [kat] SHA2-256
892,154 UART: [kat] SHA2-384
894,865 UART: [kat] SHA2-512-ACC
896,766 UART: [kat] ECC-384
902,683 UART: [kat] HMAC-384Kdf
907,367 UART: [kat] LMS
1,475,563 UART: [kat] --
1,476,524 UART: [cold-reset] ++
1,476,972 UART: [fht] Storing FHT @ 0x50003400
1,479,549 UART: [idev] ++
1,479,717 UART: [idev] CDI.KEYID = 6
1,480,077 UART: [idev] SUBJECT.KEYID = 7
1,480,501 UART: [idev] UDS.KEYID = 0
1,480,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,571 UART: [idev] Erasing UDS.KEYID = 0
1,505,815 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,299 UART: [idev] --
1,515,446 UART: [ldev] ++
1,515,614 UART: [ldev] CDI.KEYID = 6
1,515,977 UART: [ldev] SUBJECT.KEYID = 5
1,516,403 UART: [ldev] AUTHORITY.KEYID = 7
1,516,866 UART: [ldev] FE.KEYID = 1
1,522,184 UART: [ldev] Erasing FE.KEYID = 1
1,548,007 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,961 UART: [ldev] --
1,587,278 UART: [fwproc] Waiting for Commands...
1,587,935 UART: [fwproc] Received command 0x46574c44
1,588,726 UART: [fwproc] Received Image of size 114448 bytes
1,636,391 UART: ROM Fatal Error: 0x000B003B
1,637,550 >>> mbox cmd response: failed
1,637,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,556 >>> mbox cmd response: failed
1,637,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,562 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,422 UART: [kat] SHA2-256
882,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,468 UART: [kat] ++
886,620 UART: [kat] sha1
891,078 UART: [kat] SHA2-256
893,016 UART: [kat] SHA2-384
895,803 UART: [kat] SHA2-512-ACC
897,704 UART: [kat] ECC-384
903,413 UART: [kat] HMAC-384Kdf
907,877 UART: [kat] LMS
1,476,073 UART: [kat] --
1,477,078 UART: [cold-reset] ++
1,477,656 UART: [fht] Storing FHT @ 0x50003400
1,480,583 UART: [idev] ++
1,480,751 UART: [idev] CDI.KEYID = 6
1,481,111 UART: [idev] SUBJECT.KEYID = 7
1,481,535 UART: [idev] UDS.KEYID = 0
1,481,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,307 UART: [idev] Erasing UDS.KEYID = 0
1,505,843 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,561 UART: [idev] --
1,515,560 UART: [ldev] ++
1,515,728 UART: [ldev] CDI.KEYID = 6
1,516,091 UART: [ldev] SUBJECT.KEYID = 5
1,516,517 UART: [ldev] AUTHORITY.KEYID = 7
1,516,980 UART: [ldev] FE.KEYID = 1
1,522,386 UART: [ldev] Erasing FE.KEYID = 1
1,547,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,973 UART: [ldev] --
1,587,294 UART: [fwproc] Waiting for Commands...
1,588,141 UART: [fwproc] Received command 0x46574c44
1,588,932 UART: [fwproc] Received Image of size 114448 bytes
2,889,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,258 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,610 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,082,751 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,507 >>> mbox cmd response: failed
1,489,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,513 >>> mbox cmd response: failed
1,489,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,299 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
893,506 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,631 UART: [kat] ++
897,783 UART: [kat] sha1
902,073 UART: [kat] SHA2-256
904,013 UART: [kat] SHA2-384
906,620 UART: [kat] SHA2-512-ACC
908,521 UART: [kat] ECC-384
917,968 UART: [kat] HMAC-384Kdf
922,636 UART: [kat] LMS
1,170,964 UART: [kat] --
1,171,813 UART: [cold-reset] ++
1,172,351 UART: [fht] FHT @ 0x50003400
1,174,994 UART: [idev] ++
1,175,162 UART: [idev] CDI.KEYID = 6
1,175,522 UART: [idev] SUBJECT.KEYID = 7
1,175,946 UART: [idev] UDS.KEYID = 0
1,176,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,838 UART: [idev] Erasing UDS.KEYID = 0
1,200,701 UART: [idev] Sha1 KeyId Algorithm
1,209,053 UART: [idev] --
1,209,945 UART: [ldev] ++
1,210,113 UART: [ldev] CDI.KEYID = 6
1,210,476 UART: [ldev] SUBJECT.KEYID = 5
1,210,902 UART: [ldev] AUTHORITY.KEYID = 7
1,211,365 UART: [ldev] FE.KEYID = 1
1,216,811 UART: [ldev] Erasing FE.KEYID = 1
1,243,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,575 UART: [ldev] --
1,281,886 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x46574c44
1,283,424 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,253 UART: ROM Fatal Error: 0x000B003B
1,331,412 >>> mbox cmd response: failed
1,331,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,418 >>> mbox cmd response: failed
1,331,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,287 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
893,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,767 UART: [kat] ++
897,919 UART: [kat] sha1
902,103 UART: [kat] SHA2-256
904,043 UART: [kat] SHA2-384
906,628 UART: [kat] SHA2-512-ACC
908,529 UART: [kat] ECC-384
918,286 UART: [kat] HMAC-384Kdf
923,000 UART: [kat] LMS
1,171,328 UART: [kat] --
1,172,333 UART: [cold-reset] ++
1,172,833 UART: [fht] FHT @ 0x50003400
1,175,440 UART: [idev] ++
1,175,608 UART: [idev] CDI.KEYID = 6
1,175,968 UART: [idev] SUBJECT.KEYID = 7
1,176,392 UART: [idev] UDS.KEYID = 0
1,176,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,188 UART: [idev] Erasing UDS.KEYID = 0
1,202,061 UART: [idev] Sha1 KeyId Algorithm
1,210,617 UART: [idev] --
1,211,717 UART: [ldev] ++
1,211,885 UART: [ldev] CDI.KEYID = 6
1,212,248 UART: [ldev] SUBJECT.KEYID = 5
1,212,674 UART: [ldev] AUTHORITY.KEYID = 7
1,213,137 UART: [ldev] FE.KEYID = 1
1,218,379 UART: [ldev] Erasing FE.KEYID = 1
1,244,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,463 UART: [ldev] --
1,283,946 UART: [fwproc] Wait for Commands...
1,284,720 UART: [fwproc] Recv command 0x46574c44
1,285,448 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,856 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,955 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,007 >>> mbox cmd response: failed
1,187,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,013 >>> mbox cmd response: failed
1,187,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,717 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,392 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
893,473 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,598 UART: [kat] ++
897,750 UART: [kat] sha1
901,882 UART: [kat] SHA2-256
903,822 UART: [kat] SHA2-384
906,385 UART: [kat] SHA2-512-ACC
908,286 UART: [kat] ECC-384
918,121 UART: [kat] HMAC-384Kdf
922,991 UART: [kat] LMS
1,171,319 UART: [kat] --
1,172,276 UART: [cold-reset] ++
1,172,654 UART: [fht] FHT @ 0x50003400
1,175,323 UART: [idev] ++
1,175,491 UART: [idev] CDI.KEYID = 6
1,175,851 UART: [idev] SUBJECT.KEYID = 7
1,176,275 UART: [idev] UDS.KEYID = 0
1,176,620 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,077 UART: [idev] Erasing UDS.KEYID = 0
1,201,184 UART: [idev] Sha1 KeyId Algorithm
1,209,686 UART: [idev] --
1,210,686 UART: [ldev] ++
1,210,854 UART: [ldev] CDI.KEYID = 6
1,211,217 UART: [ldev] SUBJECT.KEYID = 5
1,211,643 UART: [ldev] AUTHORITY.KEYID = 7
1,212,106 UART: [ldev] FE.KEYID = 1
1,217,506 UART: [ldev] Erasing FE.KEYID = 1
1,243,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,240 UART: [ldev] --
1,283,505 UART: [fwproc] Wait for Commands...
1,284,159 UART: [fwproc] Recv command 0x46574c44
1,284,887 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,220 UART: ROM Fatal Error: 0x000B003B
1,332,379 >>> mbox cmd response: failed
1,332,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,385 >>> mbox cmd response: failed
1,332,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,391 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
87,028 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
893,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,950 UART: [kat] ++
898,102 UART: [kat] sha1
902,496 UART: [kat] SHA2-256
904,436 UART: [kat] SHA2-384
906,981 UART: [kat] SHA2-512-ACC
908,882 UART: [kat] ECC-384
918,745 UART: [kat] HMAC-384Kdf
923,191 UART: [kat] LMS
1,171,519 UART: [kat] --
1,172,530 UART: [cold-reset] ++
1,172,972 UART: [fht] FHT @ 0x50003400
1,175,795 UART: [idev] ++
1,175,963 UART: [idev] CDI.KEYID = 6
1,176,323 UART: [idev] SUBJECT.KEYID = 7
1,176,747 UART: [idev] UDS.KEYID = 0
1,177,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,893 UART: [idev] Erasing UDS.KEYID = 0
1,202,490 UART: [idev] Sha1 KeyId Algorithm
1,210,838 UART: [idev] --
1,212,108 UART: [ldev] ++
1,212,276 UART: [ldev] CDI.KEYID = 6
1,212,639 UART: [ldev] SUBJECT.KEYID = 5
1,213,065 UART: [ldev] AUTHORITY.KEYID = 7
1,213,528 UART: [ldev] FE.KEYID = 1
1,218,536 UART: [ldev] Erasing FE.KEYID = 1
1,244,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,990 UART: [ldev] --
1,284,375 UART: [fwproc] Wait for Commands...
1,285,137 UART: [fwproc] Recv command 0x46574c44
1,285,865 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,774 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,694 >>> mbox cmd response: failed
1,185,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,700 >>> mbox cmd response: failed
1,185,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,706 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,769 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,514 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,331 UART: [cold-reset] ++
1,170,747 UART: [fht] FHT @ 0x50003400
1,173,535 UART: [idev] ++
1,173,703 UART: [idev] CDI.KEYID = 6
1,174,064 UART: [idev] SUBJECT.KEYID = 7
1,174,489 UART: [idev] UDS.KEYID = 0
1,174,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,431 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,208,313 UART: [idev] --
1,209,338 UART: [ldev] ++
1,209,506 UART: [ldev] CDI.KEYID = 6
1,209,870 UART: [ldev] SUBJECT.KEYID = 5
1,210,297 UART: [ldev] AUTHORITY.KEYID = 7
1,210,760 UART: [ldev] FE.KEYID = 1
1,216,178 UART: [ldev] Erasing FE.KEYID = 1
1,241,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,281,006 UART: [fwproc] Wait for Commands...
1,281,821 UART: [fwproc] Recv command 0x46574c44
1,282,554 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,996 UART: ROM Fatal Error: 0x000B003B
1,331,155 >>> mbox cmd response: failed
1,331,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,161 >>> mbox cmd response: failed
1,331,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,379 UART: [kat] SHA2-256
901,319 UART: [kat] SHA2-384
904,022 UART: [kat] SHA2-512-ACC
905,923 UART: [kat] ECC-384
915,592 UART: [kat] HMAC-384Kdf
920,288 UART: [kat] LMS
1,168,600 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,189 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,174,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,665 UART: [idev] Erasing UDS.KEYID = 0
1,198,389 UART: [idev] Sha1 KeyId Algorithm
1,207,167 UART: [idev] --
1,208,208 UART: [ldev] ++
1,208,376 UART: [ldev] CDI.KEYID = 6
1,208,740 UART: [ldev] SUBJECT.KEYID = 5
1,209,167 UART: [ldev] AUTHORITY.KEYID = 7
1,209,630 UART: [ldev] FE.KEYID = 1
1,214,588 UART: [ldev] Erasing FE.KEYID = 1
1,240,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,300 UART: [ldev] --
1,279,782 UART: [fwproc] Wait for Commands...
1,280,605 UART: [fwproc] Recv command 0x46574c44
1,281,338 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,571 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,424 >>> mbox cmd response: failed
1,181,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,430 >>> mbox cmd response: failed
1,181,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,459 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
915,823 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,212 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,174,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,504 UART: [idev] Erasing UDS.KEYID = 0
1,198,312 UART: [idev] Sha1 KeyId Algorithm
1,207,024 UART: [idev] --
1,208,073 UART: [ldev] ++
1,208,241 UART: [ldev] CDI.KEYID = 6
1,208,605 UART: [ldev] SUBJECT.KEYID = 5
1,209,032 UART: [ldev] AUTHORITY.KEYID = 7
1,209,495 UART: [ldev] FE.KEYID = 1
1,214,523 UART: [ldev] Erasing FE.KEYID = 1
1,240,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,283 UART: [ldev] --
1,279,737 UART: [fwproc] Wait for Commands...
1,280,416 UART: [fwproc] Recv command 0x46574c44
1,281,149 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,571 UART: ROM Fatal Error: 0x000B003B
1,329,730 >>> mbox cmd response: failed
1,329,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,736 >>> mbox cmd response: failed
1,329,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,170,200 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,174,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,854 UART: [idev] Erasing UDS.KEYID = 0
1,198,860 UART: [idev] Sha1 KeyId Algorithm
1,207,738 UART: [idev] --
1,208,741 UART: [ldev] ++
1,208,909 UART: [ldev] CDI.KEYID = 6
1,209,273 UART: [ldev] SUBJECT.KEYID = 5
1,209,700 UART: [ldev] AUTHORITY.KEYID = 7
1,210,163 UART: [ldev] FE.KEYID = 1
1,215,265 UART: [ldev] Erasing FE.KEYID = 1
1,241,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,305 UART: [ldev] --
1,281,785 UART: [fwproc] Wait for Commands...
1,282,522 UART: [fwproc] Recv command 0x46574c44
1,283,255 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,380 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,406 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,771 >>> mbox cmd response: failed
1,183,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,777 >>> mbox cmd response: failed
1,183,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,922 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,199 UART:
192,584 UART: Running Caliptra ROM ...
193,729 UART:
193,876 UART: [state] CFI Enabled
264,852 UART: [state] LifecycleState = Manufacturing
266,994 UART: [state] DebugLocked = No
269,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,680 UART: [kat] SHA2-256
444,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,910 UART: [kat] ++
455,387 UART: [kat] sha1
465,890 UART: [kat] SHA2-256
468,578 UART: [kat] SHA2-384
475,524 UART: [kat] SHA2-512-ACC
477,924 UART: [kat] ECC-384
2,767,329 UART: [kat] HMAC-384Kdf
2,778,756 UART: [kat] LMS
3,969,055 UART: [kat] --
3,974,044 UART: [cold-reset] ++
3,976,091 UART: [fht] Storing FHT @ 0x50003400
3,986,887 UART: [idev] ++
3,987,449 UART: [idev] CDI.KEYID = 6
3,988,418 UART: [idev] SUBJECT.KEYID = 7
3,989,633 UART: [idev] UDS.KEYID = 0
3,992,618 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,386 UART: [idev] Erasing UDS.KEYID = 0
7,323,447 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,825 UART: [idev] --
7,349,519 UART: [ldev] ++
7,350,085 UART: [ldev] CDI.KEYID = 6
7,351,061 UART: [ldev] SUBJECT.KEYID = 5
7,352,282 UART: [ldev] AUTHORITY.KEYID = 7
7,353,566 UART: [ldev] FE.KEYID = 1
7,402,673 UART: [ldev] Erasing FE.KEYID = 1
10,735,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,290 UART: [ldev] --
13,094,698 UART: [fwproc] Waiting for Commands...
13,097,177 UART: [fwproc] Received command 0x46574c44
13,099,375 UART: [fwproc] Received Image of size 114124 bytes
16,070,067 UART: ROM Fatal Error: 0x000B0025
16,073,465 >>> mbox cmd response: failed
16,073,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,074,131 >>> mbox cmd response: failed
16,074,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,074,700 >>> mbox cmd response: failed
Initializing fuses
2,051,424 writing to cptra_bootfsm_go
2,240,744 UART:
2,241,092 UART: Running Caliptra ROM ...
2,242,235 UART:
2,242,403 UART: [state] CFI Enabled
2,299,895 UART: [state] LifecycleState = Manufacturing
2,301,833 UART: [state] DebugLocked = No
2,303,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,308,238 UART: [kat] SHA2-256
2,477,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,488,454 UART: [kat] ++
2,488,995 UART: [kat] sha1
2,500,325 UART: [kat] SHA2-256
2,503,055 UART: [kat] SHA2-384
2,509,587 UART: [kat] SHA2-512-ACC
2,511,945 UART: [kat] ECC-384
4,802,885 UART: [kat] HMAC-384Kdf
4,835,613 UART: [kat] LMS
6,025,881 UART: [kat] --
6,030,844 UART: [cold-reset] ++
6,033,340 UART: [fht] Storing FHT @ 0x50003400
6,044,898 UART: [idev] ++
6,045,471 UART: [idev] CDI.KEYID = 6
6,046,443 UART: [idev] SUBJECT.KEYID = 7
6,047,663 UART: [idev] UDS.KEYID = 0
6,050,491 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,194,179 UART: [idev] Erasing UDS.KEYID = 0
9,383,033 UART: [idev] Using Sha1 for KeyId Algorithm
9,404,913 UART: [idev] --
9,408,586 UART: [ldev] ++
9,409,164 UART: [ldev] CDI.KEYID = 6
9,410,186 UART: [ldev] SUBJECT.KEYID = 5
9,411,381 UART: [ldev] AUTHORITY.KEYID = 7
9,412,623 UART: [ldev] FE.KEYID = 1
9,458,426 UART: [ldev] Erasing FE.KEYID = 1
12,790,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,107,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,121,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,136,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,151,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,169,968 UART: [ldev] --
15,175,526 UART: [fwproc] Waiting for Commands...
15,178,385 UART: [fwproc] Received command 0x46574c44
15,180,577 UART: [fwproc] Received Image of size 114124 bytes
19,264,115 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,341,346 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,410,246 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,727,192 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,795,867 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,872,690 >>> mbox cmd response: failed
15,873,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,873,709 >>> mbox cmd response: failed
15,874,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,874,367 >>> mbox cmd response: failed
Initializing fuses
2,047,377 writing to cptra_bootfsm_go
5,838,663 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,947,129 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,455 UART:
192,821 UART: Running Caliptra ROM ...
193,946 UART:
603,823 UART: [state] CFI Enabled
621,723 UART: [state] LifecycleState = Manufacturing
623,665 UART: [state] DebugLocked = No
626,124 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,344 UART: [kat] SHA2-256
800,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,659 UART: [kat] ++
811,105 UART: [kat] sha1
821,337 UART: [kat] SHA2-256
824,002 UART: [kat] SHA2-384
829,517 UART: [kat] SHA2-512-ACC
831,858 UART: [kat] ECC-384
3,115,566 UART: [kat] HMAC-384Kdf
3,126,989 UART: [kat] LMS
4,317,066 UART: [kat] --
4,320,405 UART: [cold-reset] ++
4,322,993 UART: [fht] Storing FHT @ 0x50003400
4,335,179 UART: [idev] ++
4,335,807 UART: [idev] CDI.KEYID = 6
4,336,724 UART: [idev] SUBJECT.KEYID = 7
4,337,938 UART: [idev] UDS.KEYID = 0
4,340,888 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,571 UART: [idev] Erasing UDS.KEYID = 0
7,623,962 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,192 UART: [idev] --
7,650,000 UART: [ldev] ++
7,650,574 UART: [ldev] CDI.KEYID = 6
7,651,591 UART: [ldev] SUBJECT.KEYID = 5
7,652,748 UART: [ldev] AUTHORITY.KEYID = 7
7,653,980 UART: [ldev] FE.KEYID = 1
7,664,412 UART: [ldev] Erasing FE.KEYID = 1
10,956,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,915 UART: [ldev] --
13,320,192 UART: [fwproc] Waiting for Commands...
13,323,069 UART: [fwproc] Received command 0x46574c44
13,325,271 UART: [fwproc] Received Image of size 114124 bytes
16,305,952 UART: ROM Fatal Error: 0x000B0025
16,309,346 >>> mbox cmd response: failed
16,309,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,310,114 >>> mbox cmd response: failed
16,310,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,310,680 >>> mbox cmd response: failed
Initializing fuses
2,050,695 writing to cptra_bootfsm_go
2,240,027 UART:
2,240,392 UART: Running Caliptra ROM ...
2,241,534 UART:
4,153,275 UART: [state] CFI Enabled
4,167,843 UART: [state] LifecycleState = Manufacturing
4,169,804 UART: [state] DebugLocked = No
4,172,140 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,177,427 UART: [kat] SHA2-256
4,347,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,357,713 UART: [kat] ++
4,358,176 UART: [kat] sha1
4,370,579 UART: [kat] SHA2-256
4,373,323 UART: [kat] SHA2-384
4,379,474 UART: [kat] SHA2-512-ACC
4,381,883 UART: [kat] ECC-384
6,666,477 UART: [kat] HMAC-384Kdf
6,678,159 UART: [kat] LMS
7,868,245 UART: [kat] --
7,871,932 UART: [cold-reset] ++
7,873,326 UART: [fht] Storing FHT @ 0x50003400
7,885,204 UART: [idev] ++
7,885,908 UART: [idev] CDI.KEYID = 6
7,886,803 UART: [idev] SUBJECT.KEYID = 7
7,888,017 UART: [idev] UDS.KEYID = 0
7,890,721 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,034,193 UART: [idev] Erasing UDS.KEYID = 0
11,174,285 UART: [idev] Using Sha1 for KeyId Algorithm
11,196,311 UART: [idev] --
11,199,879 UART: [ldev] ++
11,200,444 UART: [ldev] CDI.KEYID = 6
11,201,409 UART: [ldev] SUBJECT.KEYID = 5
11,202,652 UART: [ldev] AUTHORITY.KEYID = 7
11,203,894 UART: [ldev] FE.KEYID = 1
11,214,221 UART: [ldev] Erasing FE.KEYID = 1
14,500,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,793,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,808,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,823,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,837,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,856,664 UART: [ldev] --
16,861,658 UART: [fwproc] Waiting for Commands...
16,864,565 UART: [fwproc] Received command 0x46574c44
16,866,751 UART: [fwproc] Received Image of size 114124 bytes
20,946,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,027,497 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,096,420 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,413,897 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,126,985 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,074,200 >>> mbox cmd response: failed
16,074,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,075,342 >>> mbox cmd response: failed
16,075,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,075,938 >>> mbox cmd response: failed
Initializing fuses
2,046,546 writing to cptra_bootfsm_go
7,914,052 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,893,235 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,156 UART:
192,524 UART: Running Caliptra ROM ...
193,645 UART:
193,789 UART: [state] CFI Enabled
260,186 UART: [state] LifecycleState = Manufacturing
262,109 UART: [state] DebugLocked = No
264,493 UART: [state] WD Timer not started. Device not locked for debugging
267,672 UART: [kat] SHA2-256
446,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,379 UART: [kat] ++
458,923 UART: [kat] sha1
469,213 UART: [kat] SHA2-256
472,215 UART: [kat] SHA2-384
479,440 UART: [kat] SHA2-512-ACC
482,371 UART: [kat] ECC-384
2,947,348 UART: [kat] HMAC-384Kdf
2,969,996 UART: [kat] LMS
3,499,413 UART: [kat] --
3,503,077 UART: [cold-reset] ++
3,504,466 UART: [fht] FHT @ 0x50003400
3,515,661 UART: [idev] ++
3,516,229 UART: [idev] CDI.KEYID = 6
3,517,135 UART: [idev] SUBJECT.KEYID = 7
3,518,351 UART: [idev] UDS.KEYID = 0
3,521,446 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,637 UART: [idev] Erasing UDS.KEYID = 0
6,025,648 UART: [idev] Sha1 KeyId Algorithm
6,048,066 UART: [idev] --
6,052,419 UART: [ldev] ++
6,053,005 UART: [ldev] CDI.KEYID = 6
6,053,896 UART: [ldev] SUBJECT.KEYID = 5
6,055,004 UART: [ldev] AUTHORITY.KEYID = 7
6,056,218 UART: [ldev] FE.KEYID = 1
6,097,706 UART: [ldev] Erasing FE.KEYID = 1
8,601,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,174 UART: [ldev] --
10,413,276 UART: [fwproc] Wait for Commands...
10,416,192 UART: [fwproc] Recv command 0x46574c44
10,418,286 UART: [fwproc] Recv'd Img size: 114448 bytes
12,752,280 UART: ROM Fatal Error: 0x000B0025
12,755,347 >>> mbox cmd response: failed
12,755,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,756,116 >>> mbox cmd response: failed
12,756,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,756,718 >>> mbox cmd response: failed
Initializing fuses
2,050,657 writing to cptra_bootfsm_go
2,239,970 UART:
2,240,326 UART: Running Caliptra ROM ...
2,242,078 UART:
2,242,266 UART: [state] CFI Enabled
2,306,905 UART: [state] LifecycleState = Manufacturing
2,308,752 UART: [state] DebugLocked = No
2,310,119 UART: [state] WD Timer not started. Device not locked for debugging
2,313,707 UART: [kat] SHA2-256
2,492,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,374 UART: [kat] ++
2,504,832 UART: [kat] sha1
2,515,873 UART: [kat] SHA2-256
2,518,942 UART: [kat] SHA2-384
2,524,765 UART: [kat] SHA2-512-ACC
2,527,713 UART: [kat] ECC-384
4,993,495 UART: [kat] HMAC-384Kdf
5,016,068 UART: [kat] LMS
5,545,536 UART: [kat] --
5,551,042 UART: [cold-reset] ++
5,552,273 UART: [fht] FHT @ 0x50003400
5,563,791 UART: [idev] ++
5,564,364 UART: [idev] CDI.KEYID = 6
5,565,275 UART: [idev] SUBJECT.KEYID = 7
5,566,488 UART: [idev] UDS.KEYID = 0
5,569,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,713,272 UART: [idev] Erasing UDS.KEYID = 0
8,069,532 UART: [idev] Sha1 KeyId Algorithm
8,091,949 UART: [idev] --
8,095,540 UART: [ldev] ++
8,096,117 UART: [ldev] CDI.KEYID = 6
8,097,001 UART: [ldev] SUBJECT.KEYID = 5
8,098,166 UART: [ldev] AUTHORITY.KEYID = 7
8,099,485 UART: [ldev] FE.KEYID = 1
8,144,779 UART: [ldev] Erasing FE.KEYID = 1
10,652,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,020 UART: [ldev] --
12,458,449 UART: [fwproc] Wait for Commands...
12,461,572 UART: [fwproc] Recv command 0x46574c44
12,463,672 UART: [fwproc] Recv'd Img size: 114448 bytes
15,890,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,963,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,032,003 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,349,650 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,365,529 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,528,942 >>> mbox cmd response: failed
12,529,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,859 >>> mbox cmd response: failed
12,530,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,427 >>> mbox cmd response: failed
Initializing fuses
2,046,504 writing to cptra_bootfsm_go
5,426,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,161,483 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,465 UART:
192,814 UART: Running Caliptra ROM ...
193,995 UART:
603,580 UART: [state] CFI Enabled
616,349 UART: [state] LifecycleState = Manufacturing
618,238 UART: [state] DebugLocked = No
619,616 UART: [state] WD Timer not started. Device not locked for debugging
623,787 UART: [kat] SHA2-256
802,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,492 UART: [kat] ++
814,941 UART: [kat] sha1
825,223 UART: [kat] SHA2-256
828,229 UART: [kat] SHA2-384
833,065 UART: [kat] SHA2-512-ACC
836,058 UART: [kat] ECC-384
3,277,455 UART: [kat] HMAC-384Kdf
3,291,381 UART: [kat] LMS
3,820,887 UART: [kat] --
3,827,516 UART: [cold-reset] ++
3,828,523 UART: [fht] FHT @ 0x50003400
3,839,875 UART: [idev] ++
3,840,460 UART: [idev] CDI.KEYID = 6
3,841,378 UART: [idev] SUBJECT.KEYID = 7
3,842,533 UART: [idev] UDS.KEYID = 0
3,845,459 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,860 UART: [idev] Erasing UDS.KEYID = 0
6,315,386 UART: [idev] Sha1 KeyId Algorithm
6,338,123 UART: [idev] --
6,342,659 UART: [ldev] ++
6,343,232 UART: [ldev] CDI.KEYID = 6
6,344,142 UART: [ldev] SUBJECT.KEYID = 5
6,345,302 UART: [ldev] AUTHORITY.KEYID = 7
6,346,590 UART: [ldev] FE.KEYID = 1
6,360,725 UART: [ldev] Erasing FE.KEYID = 1
8,831,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,549 UART: [ldev] --
10,624,474 UART: [fwproc] Wait for Commands...
10,626,534 UART: [fwproc] Recv command 0x46574c44
10,628,631 UART: [fwproc] Recv'd Img size: 114448 bytes
12,953,064 UART: ROM Fatal Error: 0x000B0025
12,956,193 >>> mbox cmd response: failed
12,956,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,956,950 >>> mbox cmd response: failed
12,957,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,957,524 >>> mbox cmd response: failed
Initializing fuses
2,049,353 writing to cptra_bootfsm_go
2,238,656 UART:
2,239,001 UART: Running Caliptra ROM ...
2,240,094 UART:
7,495,195 UART: [state] CFI Enabled
7,510,536 UART: [state] LifecycleState = Manufacturing
7,512,428 UART: [state] DebugLocked = No
7,514,389 UART: [state] WD Timer not started. Device not locked for debugging
7,518,566 UART: [kat] SHA2-256
7,697,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,709,284 UART: [kat] ++
7,709,830 UART: [kat] sha1
7,721,586 UART: [kat] SHA2-256
7,724,600 UART: [kat] SHA2-384
7,731,287 UART: [kat] SHA2-512-ACC
7,734,293 UART: [kat] ECC-384
10,174,459 UART: [kat] HMAC-384Kdf
10,188,201 UART: [kat] LMS
10,717,693 UART: [kat] --
10,722,001 UART: [cold-reset] ++
10,723,555 UART: [fht] FHT @ 0x50003400
10,734,688 UART: [idev] ++
10,735,255 UART: [idev] CDI.KEYID = 6
10,736,164 UART: [idev] SUBJECT.KEYID = 7
10,737,375 UART: [idev] UDS.KEYID = 0
10,740,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,884,051 UART: [idev] Erasing UDS.KEYID = 0
13,213,232 UART: [idev] Sha1 KeyId Algorithm
13,236,787 UART: [idev] --
13,240,830 UART: [ldev] ++
13,241,392 UART: [ldev] CDI.KEYID = 6
13,242,268 UART: [ldev] SUBJECT.KEYID = 5
13,243,496 UART: [ldev] AUTHORITY.KEYID = 7
13,244,733 UART: [ldev] FE.KEYID = 1
13,255,026 UART: [ldev] Erasing FE.KEYID = 1
15,727,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,446,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,462,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,478,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,494,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,515,722 UART: [ldev] --
17,519,857 UART: [fwproc] Wait for Commands...
17,522,497 UART: [fwproc] Recv command 0x46574c44
17,524,592 UART: [fwproc] Recv'd Img size: 114448 bytes
20,959,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,030,025 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,098,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,416,722 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,699,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,735,999 >>> mbox cmd response: failed
12,736,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,848 >>> mbox cmd response: failed
12,737,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,413 >>> mbox cmd response: failed
Initializing fuses
2,047,202 writing to cptra_bootfsm_go
10,830,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,442,492 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,919 writing to cptra_bootfsm_go
3,442,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,674,988 >>> mbox cmd response: failed
12,675,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,675,965 >>> mbox cmd response: failed
12,676,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,676,526 >>> mbox cmd response: failed
Initializing fuses
2,044,885 writing to cptra_bootfsm_go
5,484,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,823,557 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,756,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,919,934 >>> mbox cmd response: failed
12,920,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,920,855 >>> mbox cmd response: failed
12,921,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,423 >>> mbox cmd response: failed
Initializing fuses
2,057,912 writing to cptra_bootfsm_go
10,703,301 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,947,887 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Manufacturing
86,189 UART: [state] DebugLocked = No
86,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,475 UART: [kat] SHA2-256
882,406 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,521 UART: [kat] ++
886,673 UART: [kat] sha1
891,037 UART: [kat] SHA2-256
892,975 UART: [kat] SHA2-384
895,538 UART: [kat] SHA2-512-ACC
897,439 UART: [kat] ECC-384
902,914 UART: [kat] HMAC-384Kdf
907,580 UART: [kat] LMS
1,475,776 UART: [kat] --
1,476,707 UART: [cold-reset] ++
1,477,235 UART: [fht] Storing FHT @ 0x50003400
1,480,172 UART: [idev] ++
1,480,340 UART: [idev] CDI.KEYID = 6
1,480,700 UART: [idev] SUBJECT.KEYID = 7
1,481,124 UART: [idev] UDS.KEYID = 0
1,481,469 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,326 UART: [idev] Erasing UDS.KEYID = 0
1,506,222 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,810 UART: [idev] --
1,515,689 UART: [ldev] ++
1,515,857 UART: [ldev] CDI.KEYID = 6
1,516,220 UART: [ldev] SUBJECT.KEYID = 5
1,516,646 UART: [ldev] AUTHORITY.KEYID = 7
1,517,109 UART: [ldev] FE.KEYID = 1
1,522,309 UART: [ldev] Erasing FE.KEYID = 1
1,547,482 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,038 UART: [ldev] --
1,587,349 UART: [fwproc] Waiting for Commands...
1,587,984 UART: [fwproc] Received command 0x46574c44
1,588,775 UART: [fwproc] Received Image of size 114448 bytes
1,880,156 UART: ROM Fatal Error: 0x000B0025
1,881,313 >>> mbox cmd response: failed
1,881,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,319 >>> mbox cmd response: failed
1,881,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,459 UART: [kat] SHA2-256
882,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,505 UART: [kat] ++
886,657 UART: [kat] sha1
890,937 UART: [kat] SHA2-256
892,875 UART: [kat] SHA2-384
895,664 UART: [kat] SHA2-512-ACC
897,565 UART: [kat] ECC-384
903,206 UART: [kat] HMAC-384Kdf
907,716 UART: [kat] LMS
1,475,912 UART: [kat] --
1,476,877 UART: [cold-reset] ++
1,477,297 UART: [fht] Storing FHT @ 0x50003400
1,479,986 UART: [idev] ++
1,480,154 UART: [idev] CDI.KEYID = 6
1,480,514 UART: [idev] SUBJECT.KEYID = 7
1,480,938 UART: [idev] UDS.KEYID = 0
1,481,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,040 UART: [idev] Erasing UDS.KEYID = 0
1,505,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,136 UART: [idev] --
1,515,179 UART: [ldev] ++
1,515,347 UART: [ldev] CDI.KEYID = 6
1,515,710 UART: [ldev] SUBJECT.KEYID = 5
1,516,136 UART: [ldev] AUTHORITY.KEYID = 7
1,516,599 UART: [ldev] FE.KEYID = 1
1,521,887 UART: [ldev] Erasing FE.KEYID = 1
1,546,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,244 UART: [ldev] --
1,585,505 UART: [fwproc] Waiting for Commands...
1,586,310 UART: [fwproc] Received command 0x46574c44
1,587,101 UART: [fwproc] Received Image of size 114448 bytes
2,885,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,733 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,074 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,732,590 >>> mbox cmd response: failed
1,732,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,596 >>> mbox cmd response: failed
1,732,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,952 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Manufacturing
86,308 UART: [state] DebugLocked = No
86,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
890,978 UART: [kat] SHA2-256
892,916 UART: [kat] SHA2-384
895,863 UART: [kat] SHA2-512-ACC
897,764 UART: [kat] ECC-384
903,581 UART: [kat] HMAC-384Kdf
908,069 UART: [kat] LMS
1,476,265 UART: [kat] --
1,476,838 UART: [cold-reset] ++
1,477,366 UART: [fht] Storing FHT @ 0x50003400
1,479,991 UART: [idev] ++
1,480,159 UART: [idev] CDI.KEYID = 6
1,480,519 UART: [idev] SUBJECT.KEYID = 7
1,480,943 UART: [idev] UDS.KEYID = 0
1,481,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,375 UART: [idev] Erasing UDS.KEYID = 0
1,506,533 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,411 UART: [idev] --
1,516,506 UART: [ldev] ++
1,516,674 UART: [ldev] CDI.KEYID = 6
1,517,037 UART: [ldev] SUBJECT.KEYID = 5
1,517,463 UART: [ldev] AUTHORITY.KEYID = 7
1,517,926 UART: [ldev] FE.KEYID = 1
1,523,240 UART: [ldev] Erasing FE.KEYID = 1
1,548,545 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,551 UART: [ldev] --
1,587,862 UART: [fwproc] Waiting for Commands...
1,588,555 UART: [fwproc] Received command 0x46574c44
1,589,346 UART: [fwproc] Received Image of size 114448 bytes
1,881,925 UART: ROM Fatal Error: 0x000B0025
1,883,082 >>> mbox cmd response: failed
1,883,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,883,088 >>> mbox cmd response: failed
1,883,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,883,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,428 UART: [kat] SHA2-256
882,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,474 UART: [kat] ++
886,626 UART: [kat] sha1
891,012 UART: [kat] SHA2-256
892,950 UART: [kat] SHA2-384
895,657 UART: [kat] SHA2-512-ACC
897,558 UART: [kat] ECC-384
903,167 UART: [kat] HMAC-384Kdf
907,981 UART: [kat] LMS
1,476,177 UART: [kat] --
1,477,238 UART: [cold-reset] ++
1,477,676 UART: [fht] Storing FHT @ 0x50003400
1,480,491 UART: [idev] ++
1,480,659 UART: [idev] CDI.KEYID = 6
1,481,019 UART: [idev] SUBJECT.KEYID = 7
1,481,443 UART: [idev] UDS.KEYID = 0
1,481,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,553 UART: [idev] Erasing UDS.KEYID = 0
1,506,349 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,927 UART: [idev] --
1,515,984 UART: [ldev] ++
1,516,152 UART: [ldev] CDI.KEYID = 6
1,516,515 UART: [ldev] SUBJECT.KEYID = 5
1,516,941 UART: [ldev] AUTHORITY.KEYID = 7
1,517,404 UART: [ldev] FE.KEYID = 1
1,522,586 UART: [ldev] Erasing FE.KEYID = 1
1,548,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,485 UART: [ldev] --
1,587,838 UART: [fwproc] Waiting for Commands...
1,588,529 UART: [fwproc] Received command 0x46574c44
1,589,320 UART: [fwproc] Received Image of size 114448 bytes
2,888,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,666 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,018 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,117 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,734,505 >>> mbox cmd response: failed
1,734,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,511 >>> mbox cmd response: failed
1,734,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,069 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Manufacturing
86,177 UART: [state] DebugLocked = No
86,835 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [kat] SHA2-256
893,630 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,755 UART: [kat] ++
897,907 UART: [kat] sha1
902,221 UART: [kat] SHA2-256
904,161 UART: [kat] SHA2-384
907,096 UART: [kat] SHA2-512-ACC
908,997 UART: [kat] ECC-384
918,914 UART: [kat] HMAC-384Kdf
923,454 UART: [kat] LMS
1,171,782 UART: [kat] --
1,172,639 UART: [cold-reset] ++
1,173,133 UART: [fht] FHT @ 0x50003400
1,175,806 UART: [idev] ++
1,175,974 UART: [idev] CDI.KEYID = 6
1,176,334 UART: [idev] SUBJECT.KEYID = 7
1,176,758 UART: [idev] UDS.KEYID = 0
1,177,103 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,466 UART: [idev] Erasing UDS.KEYID = 0
1,201,431 UART: [idev] Sha1 KeyId Algorithm
1,209,869 UART: [idev] --
1,210,759 UART: [ldev] ++
1,210,927 UART: [ldev] CDI.KEYID = 6
1,211,290 UART: [ldev] SUBJECT.KEYID = 5
1,211,716 UART: [ldev] AUTHORITY.KEYID = 7
1,212,179 UART: [ldev] FE.KEYID = 1
1,217,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,239 UART: [ldev] --
1,282,576 UART: [fwproc] Wait for Commands...
1,283,154 UART: [fwproc] Recv command 0x46574c44
1,283,882 UART: [fwproc] Recv'd Img size: 114448 bytes
1,576,005 UART: ROM Fatal Error: 0x000B0025
1,577,162 >>> mbox cmd response: failed
1,577,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,168 >>> mbox cmd response: failed
1,577,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
893,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,537 UART: [kat] ++
897,689 UART: [kat] sha1
901,743 UART: [kat] SHA2-256
903,683 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
917,750 UART: [kat] HMAC-384Kdf
922,350 UART: [kat] LMS
1,170,678 UART: [kat] --
1,171,543 UART: [cold-reset] ++
1,172,009 UART: [fht] FHT @ 0x50003400
1,174,564 UART: [idev] ++
1,174,732 UART: [idev] CDI.KEYID = 6
1,175,092 UART: [idev] SUBJECT.KEYID = 7
1,175,516 UART: [idev] UDS.KEYID = 0
1,175,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,474 UART: [idev] Erasing UDS.KEYID = 0
1,200,159 UART: [idev] Sha1 KeyId Algorithm
1,208,647 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,012 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,169 UART: [ldev] Erasing FE.KEYID = 1
1,242,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,453 UART: [ldev] --
1,281,814 UART: [fwproc] Wait for Commands...
1,282,532 UART: [fwproc] Recv command 0x46574c44
1,283,260 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,118 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,999 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,613 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,430,757 >>> mbox cmd response: failed
1,430,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,763 >>> mbox cmd response: failed
1,430,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,520 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Manufacturing
85,928 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
893,191 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,316 UART: [kat] ++
897,468 UART: [kat] sha1
901,694 UART: [kat] SHA2-256
903,634 UART: [kat] SHA2-384
906,357 UART: [kat] SHA2-512-ACC
908,258 UART: [kat] ECC-384
917,893 UART: [kat] HMAC-384Kdf
922,499 UART: [kat] LMS
1,170,827 UART: [kat] --
1,171,772 UART: [cold-reset] ++
1,172,126 UART: [fht] FHT @ 0x50003400
1,174,869 UART: [idev] ++
1,175,037 UART: [idev] CDI.KEYID = 6
1,175,397 UART: [idev] SUBJECT.KEYID = 7
1,175,821 UART: [idev] UDS.KEYID = 0
1,176,166 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,061 UART: [idev] Erasing UDS.KEYID = 0
1,201,564 UART: [idev] Sha1 KeyId Algorithm
1,209,972 UART: [idev] --
1,211,036 UART: [ldev] ++
1,211,204 UART: [ldev] CDI.KEYID = 6
1,211,567 UART: [ldev] SUBJECT.KEYID = 5
1,211,993 UART: [ldev] AUTHORITY.KEYID = 7
1,212,456 UART: [ldev] FE.KEYID = 1
1,217,916 UART: [ldev] Erasing FE.KEYID = 1
1,243,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,814 UART: [ldev] --
1,283,087 UART: [fwproc] Wait for Commands...
1,283,703 UART: [fwproc] Recv command 0x46574c44
1,284,431 UART: [fwproc] Recv'd Img size: 114448 bytes
1,577,206 UART: ROM Fatal Error: 0x000B0025
1,578,363 >>> mbox cmd response: failed
1,578,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,369 >>> mbox cmd response: failed
1,578,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
893,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,990 UART: [kat] ++
898,142 UART: [kat] sha1
902,388 UART: [kat] SHA2-256
904,328 UART: [kat] SHA2-384
907,005 UART: [kat] SHA2-512-ACC
908,906 UART: [kat] ECC-384
918,467 UART: [kat] HMAC-384Kdf
922,899 UART: [kat] LMS
1,171,227 UART: [kat] --
1,172,082 UART: [cold-reset] ++
1,172,414 UART: [fht] FHT @ 0x50003400
1,174,997 UART: [idev] ++
1,175,165 UART: [idev] CDI.KEYID = 6
1,175,525 UART: [idev] SUBJECT.KEYID = 7
1,175,949 UART: [idev] UDS.KEYID = 0
1,176,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,043 UART: [idev] Erasing UDS.KEYID = 0
1,200,812 UART: [idev] Sha1 KeyId Algorithm
1,209,504 UART: [idev] --
1,210,538 UART: [ldev] ++
1,210,706 UART: [ldev] CDI.KEYID = 6
1,211,069 UART: [ldev] SUBJECT.KEYID = 5
1,211,495 UART: [ldev] AUTHORITY.KEYID = 7
1,211,958 UART: [ldev] FE.KEYID = 1
1,217,092 UART: [ldev] Erasing FE.KEYID = 1
1,243,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,202 UART: [ldev] --
1,282,539 UART: [fwproc] Wait for Commands...
1,283,285 UART: [fwproc] Recv command 0x46574c44
1,284,013 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,631 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,870 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,220 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,431,898 >>> mbox cmd response: failed
1,431,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,904 >>> mbox cmd response: failed
1,431,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,545 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Manufacturing
85,815 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
915,666 UART: [kat] HMAC-384Kdf
920,106 UART: [kat] LMS
1,168,418 UART: [kat] --
1,169,143 UART: [cold-reset] ++
1,169,707 UART: [fht] FHT @ 0x50003400
1,172,193 UART: [idev] ++
1,172,361 UART: [idev] CDI.KEYID = 6
1,172,722 UART: [idev] SUBJECT.KEYID = 7
1,173,147 UART: [idev] UDS.KEYID = 0
1,173,493 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,445 UART: [idev] Erasing UDS.KEYID = 0
1,198,321 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] --
1,208,142 UART: [ldev] ++
1,208,310 UART: [ldev] CDI.KEYID = 6
1,208,674 UART: [ldev] SUBJECT.KEYID = 5
1,209,101 UART: [ldev] AUTHORITY.KEYID = 7
1,209,564 UART: [ldev] FE.KEYID = 1
1,214,394 UART: [ldev] Erasing FE.KEYID = 1
1,240,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,792 UART: [ldev] --
1,280,062 UART: [fwproc] Wait for Commands...
1,280,693 UART: [fwproc] Recv command 0x46574c44
1,281,426 UART: [fwproc] Recv'd Img size: 114448 bytes
1,572,433 UART: ROM Fatal Error: 0x000B0025
1,573,590 >>> mbox cmd response: failed
1,573,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,573,596 >>> mbox cmd response: failed
1,573,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,573,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,822 UART: [state] LifecycleState = Unprovisioned
85,477 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,077 UART: [kat] ++
895,229 UART: [kat] sha1
899,351 UART: [kat] SHA2-256
901,291 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,270 UART: [kat] HMAC-384Kdf
919,856 UART: [kat] LMS
1,168,168 UART: [kat] --
1,168,897 UART: [cold-reset] ++
1,169,439 UART: [fht] FHT @ 0x50003400
1,172,051 UART: [idev] ++
1,172,219 UART: [idev] CDI.KEYID = 6
1,172,580 UART: [idev] SUBJECT.KEYID = 7
1,173,005 UART: [idev] UDS.KEYID = 0
1,173,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,077 UART: [idev] Erasing UDS.KEYID = 0
1,197,867 UART: [idev] Sha1 KeyId Algorithm
1,206,527 UART: [idev] --
1,207,446 UART: [ldev] ++
1,207,614 UART: [ldev] CDI.KEYID = 6
1,207,978 UART: [ldev] SUBJECT.KEYID = 5
1,208,405 UART: [ldev] AUTHORITY.KEYID = 7
1,208,868 UART: [ldev] FE.KEYID = 1
1,214,092 UART: [ldev] Erasing FE.KEYID = 1
1,239,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,618 UART: [ldev] --
1,279,112 UART: [fwproc] Wait for Commands...
1,279,683 UART: [fwproc] Recv command 0x46574c44
1,280,416 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,451 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,301 >>> mbox cmd response: failed
1,426,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,307 >>> mbox cmd response: failed
1,426,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,125 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Manufacturing
86,078 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,781 UART: [kat] SHA2-512-ACC
906,682 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,458 UART: [cold-reset] ++
1,171,030 UART: [fht] FHT @ 0x50003400
1,173,630 UART: [idev] ++
1,173,798 UART: [idev] CDI.KEYID = 6
1,174,159 UART: [idev] SUBJECT.KEYID = 7
1,174,584 UART: [idev] UDS.KEYID = 0
1,174,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,118 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,240 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,913 UART: [ldev] SUBJECT.KEYID = 5
1,210,340 UART: [ldev] AUTHORITY.KEYID = 7
1,210,803 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,242,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,101 UART: [ldev] --
1,281,489 UART: [fwproc] Wait for Commands...
1,282,176 UART: [fwproc] Recv command 0x46574c44
1,282,909 UART: [fwproc] Recv'd Img size: 114448 bytes
1,575,290 UART: ROM Fatal Error: 0x000B0025
1,576,447 >>> mbox cmd response: failed
1,576,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,453 >>> mbox cmd response: failed
1,576,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,459 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,358 UART: [kat] ++
895,510 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,281 UART: [kat] SHA2-512-ACC
906,182 UART: [kat] ECC-384
915,681 UART: [kat] HMAC-384Kdf
920,297 UART: [kat] LMS
1,168,609 UART: [kat] --
1,169,146 UART: [cold-reset] ++
1,169,560 UART: [fht] FHT @ 0x50003400
1,172,374 UART: [idev] ++
1,172,542 UART: [idev] CDI.KEYID = 6
1,172,903 UART: [idev] SUBJECT.KEYID = 7
1,173,328 UART: [idev] UDS.KEYID = 0
1,173,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,342 UART: [idev] Erasing UDS.KEYID = 0
1,198,580 UART: [idev] Sha1 KeyId Algorithm
1,207,462 UART: [idev] --
1,208,459 UART: [ldev] ++
1,208,627 UART: [ldev] CDI.KEYID = 6
1,208,991 UART: [ldev] SUBJECT.KEYID = 5
1,209,418 UART: [ldev] AUTHORITY.KEYID = 7
1,209,881 UART: [ldev] FE.KEYID = 1
1,214,991 UART: [ldev] Erasing FE.KEYID = 1
1,241,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,411 UART: [fwproc] Wait for Commands...
1,282,006 UART: [fwproc] Recv command 0x46574c44
1,282,739 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,552 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,849 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,268 >>> mbox cmd response: failed
1,428,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,274 >>> mbox cmd response: failed
1,428,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,280 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,900 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,162 UART:
192,526 UART: Running Caliptra ROM ...
193,707 UART:
193,861 UART: [state] CFI Enabled
263,899 UART: [state] LifecycleState = Manufacturing
265,869 UART: [state] DebugLocked = No
267,975 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,119 UART: [kat] SHA2-256
442,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,331 UART: [kat] ++
453,838 UART: [kat] sha1
465,232 UART: [kat] SHA2-256
467,914 UART: [kat] SHA2-384
474,511 UART: [kat] SHA2-512-ACC
476,905 UART: [kat] ECC-384
2,767,328 UART: [kat] HMAC-384Kdf
2,779,396 UART: [kat] LMS
3,969,707 UART: [kat] --
3,973,394 UART: [cold-reset] ++
3,975,010 UART: [fht] Storing FHT @ 0x50003400
3,987,365 UART: [idev] ++
3,987,929 UART: [idev] CDI.KEYID = 6
3,988,944 UART: [idev] SUBJECT.KEYID = 7
3,990,154 UART: [idev] UDS.KEYID = 0
3,993,143 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,906 UART: [idev] Erasing UDS.KEYID = 0
7,325,413 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,807 UART: [idev] --
7,351,860 UART: [ldev] ++
7,352,452 UART: [ldev] CDI.KEYID = 6
7,353,474 UART: [ldev] SUBJECT.KEYID = 5
7,354,638 UART: [ldev] AUTHORITY.KEYID = 7
7,355,873 UART: [ldev] FE.KEYID = 1
7,401,467 UART: [ldev] Erasing FE.KEYID = 1
10,734,701 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,816 UART: [ldev] --
13,095,586 UART: [fwproc] Waiting for Commands...
13,098,346 UART: [fwproc] Received command 0x46574c44
13,100,537 UART: [fwproc] Received Image of size 114124 bytes
16,085,259 UART: ROM Fatal Error: 0x000B0027
16,088,716 >>> mbox cmd response: failed
16,089,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,089,516 >>> mbox cmd response: failed
16,089,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,090,079 >>> mbox cmd response: failed
Initializing fuses
2,049,054 writing to cptra_bootfsm_go
2,238,377 UART:
2,238,737 UART: Running Caliptra ROM ...
2,239,872 UART:
2,240,038 UART: [state] CFI Enabled
2,304,450 UART: [state] LifecycleState = Manufacturing
2,306,396 UART: [state] DebugLocked = No
2,308,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,312,720 UART: [kat] SHA2-256
2,482,414 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,492,914 UART: [kat] ++
2,493,373 UART: [kat] sha1
2,505,666 UART: [kat] SHA2-256
2,508,367 UART: [kat] SHA2-384
2,514,462 UART: [kat] SHA2-512-ACC
2,516,821 UART: [kat] ECC-384
4,812,082 UART: [kat] HMAC-384Kdf
4,843,037 UART: [kat] LMS
6,033,390 UART: [kat] --
6,037,543 UART: [cold-reset] ++
6,039,454 UART: [fht] Storing FHT @ 0x50003400
6,051,175 UART: [idev] ++
6,051,746 UART: [idev] CDI.KEYID = 6
6,052,720 UART: [idev] SUBJECT.KEYID = 7
6,053,967 UART: [idev] UDS.KEYID = 0
6,056,498 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,200,186 UART: [idev] Erasing UDS.KEYID = 0
9,390,775 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,757 UART: [idev] --
9,416,516 UART: [ldev] ++
9,417,102 UART: [ldev] CDI.KEYID = 6
9,418,124 UART: [ldev] SUBJECT.KEYID = 5
9,419,342 UART: [ldev] AUTHORITY.KEYID = 7
9,420,528 UART: [ldev] FE.KEYID = 1
9,464,020 UART: [ldev] Erasing FE.KEYID = 1
12,796,559 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,110,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,124,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,139,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,153,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,173,697 UART: [ldev] --
15,178,760 UART: [fwproc] Waiting for Commands...
15,181,292 UART: [fwproc] Received command 0x46574c44
15,183,488 UART: [fwproc] Received Image of size 114124 bytes
19,268,005 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,345,591 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,414,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,731,829 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,807,270 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,877,518 >>> mbox cmd response: failed
15,878,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,879,147 >>> mbox cmd response: failed
15,879,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,879,715 >>> mbox cmd response: failed
Initializing fuses
2,050,080 writing to cptra_bootfsm_go
5,829,199 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,924,132 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,488 UART:
192,911 UART: Running Caliptra ROM ...
194,010 UART:
603,543 UART: [state] CFI Enabled
617,277 UART: [state] LifecycleState = Manufacturing
619,220 UART: [state] DebugLocked = No
620,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,235 UART: [kat] SHA2-256
795,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,502 UART: [kat] ++
807,034 UART: [kat] sha1
818,933 UART: [kat] SHA2-256
821,637 UART: [kat] SHA2-384
828,373 UART: [kat] SHA2-512-ACC
830,783 UART: [kat] ECC-384
3,115,528 UART: [kat] HMAC-384Kdf
3,127,124 UART: [kat] LMS
4,317,238 UART: [kat] --
4,321,583 UART: [cold-reset] ++
4,323,188 UART: [fht] Storing FHT @ 0x50003400
4,333,700 UART: [idev] ++
4,334,273 UART: [idev] CDI.KEYID = 6
4,335,293 UART: [idev] SUBJECT.KEYID = 7
4,336,452 UART: [idev] UDS.KEYID = 0
4,339,268 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,815 UART: [idev] Erasing UDS.KEYID = 0
7,621,269 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,609 UART: [idev] --
7,647,019 UART: [ldev] ++
7,647,603 UART: [ldev] CDI.KEYID = 6
7,648,623 UART: [ldev] SUBJECT.KEYID = 5
7,649,783 UART: [ldev] AUTHORITY.KEYID = 7
7,651,019 UART: [ldev] FE.KEYID = 1
7,660,452 UART: [ldev] Erasing FE.KEYID = 1
10,950,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,771 UART: [ldev] --
13,309,965 UART: [fwproc] Waiting for Commands...
13,312,066 UART: [fwproc] Received command 0x46574c44
13,314,259 UART: [fwproc] Received Image of size 114124 bytes
16,295,109 UART: ROM Fatal Error: 0x000B0027
16,298,568 >>> mbox cmd response: failed
16,298,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,299,300 >>> mbox cmd response: failed
16,299,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,299,861 >>> mbox cmd response: failed
Initializing fuses
2,047,349 writing to cptra_bootfsm_go
2,236,645 UART:
2,236,992 UART: Running Caliptra ROM ...
2,238,132 UART:
4,171,348 UART: [state] CFI Enabled
4,187,640 UART: [state] LifecycleState = Manufacturing
4,189,605 UART: [state] DebugLocked = No
4,192,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,198,113 UART: [kat] SHA2-256
4,367,885 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,378,416 UART: [kat] ++
4,378,905 UART: [kat] sha1
4,389,975 UART: [kat] SHA2-256
4,392,661 UART: [kat] SHA2-384
4,397,627 UART: [kat] SHA2-512-ACC
4,399,979 UART: [kat] ECC-384
6,684,644 UART: [kat] HMAC-384Kdf
6,697,202 UART: [kat] LMS
7,887,317 UART: [kat] --
7,893,736 UART: [cold-reset] ++
7,894,748 UART: [fht] Storing FHT @ 0x50003400
7,904,628 UART: [idev] ++
7,905,230 UART: [idev] CDI.KEYID = 6
7,906,147 UART: [idev] SUBJECT.KEYID = 7
7,907,364 UART: [idev] UDS.KEYID = 0
7,909,717 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,053,036 UART: [idev] Erasing UDS.KEYID = 0
11,197,878 UART: [idev] Using Sha1 for KeyId Algorithm
11,220,086 UART: [idev] --
11,224,619 UART: [ldev] ++
11,225,194 UART: [ldev] CDI.KEYID = 6
11,226,208 UART: [ldev] SUBJECT.KEYID = 5
11,227,407 UART: [ldev] AUTHORITY.KEYID = 7
11,228,642 UART: [ldev] FE.KEYID = 1
11,240,205 UART: [ldev] Erasing FE.KEYID = 1
14,526,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,819,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,834,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,849,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,863,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,881,803 UART: [ldev] --
16,886,148 UART: [fwproc] Waiting for Commands...
16,888,043 UART: [fwproc] Received command 0x46574c44
16,890,236 UART: [fwproc] Received Image of size 114124 bytes
20,974,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,052,350 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,121,232 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,439,212 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
4,130,280 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,097,055 >>> mbox cmd response: failed
16,097,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,098,244 >>> mbox cmd response: failed
16,098,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,098,830 >>> mbox cmd response: failed
Initializing fuses
2,049,390 writing to cptra_bootfsm_go
7,896,961 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,881,439 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,123 UART:
192,501 UART: Running Caliptra ROM ...
193,711 UART:
193,869 UART: [state] CFI Enabled
260,722 UART: [state] LifecycleState = Manufacturing
262,605 UART: [state] DebugLocked = No
264,100 UART: [state] WD Timer not started. Device not locked for debugging
267,061 UART: [kat] SHA2-256
446,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,769 UART: [kat] ++
458,305 UART: [kat] sha1
468,001 UART: [kat] SHA2-256
471,067 UART: [kat] SHA2-384
477,530 UART: [kat] SHA2-512-ACC
480,515 UART: [kat] ECC-384
2,924,022 UART: [kat] HMAC-384Kdf
2,949,292 UART: [kat] LMS
3,478,758 UART: [kat] --
3,483,161 UART: [cold-reset] ++
3,485,153 UART: [fht] FHT @ 0x50003400
3,496,833 UART: [idev] ++
3,497,396 UART: [idev] CDI.KEYID = 6
3,498,337 UART: [idev] SUBJECT.KEYID = 7
3,499,554 UART: [idev] UDS.KEYID = 0
3,502,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,646,503 UART: [idev] Erasing UDS.KEYID = 0
6,002,029 UART: [idev] Sha1 KeyId Algorithm
6,024,981 UART: [idev] --
6,029,591 UART: [ldev] ++
6,030,187 UART: [ldev] CDI.KEYID = 6
6,031,111 UART: [ldev] SUBJECT.KEYID = 5
6,032,342 UART: [ldev] AUTHORITY.KEYID = 7
6,033,585 UART: [ldev] FE.KEYID = 1
6,060,641 UART: [ldev] Erasing FE.KEYID = 1
8,565,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,076 UART: [ldev] --
10,376,914 UART: [fwproc] Wait for Commands...
10,379,063 UART: [fwproc] Recv command 0x46574c44
10,381,108 UART: [fwproc] Recv'd Img size: 114448 bytes
12,712,402 UART: ROM Fatal Error: 0x000B0027
12,715,518 >>> mbox cmd response: failed
12,715,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,716,320 >>> mbox cmd response: failed
12,716,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,716,923 >>> mbox cmd response: failed
Initializing fuses
2,052,246 writing to cptra_bootfsm_go
2,241,555 UART:
2,241,906 UART: Running Caliptra ROM ...
2,243,009 UART:
2,243,178 UART: [state] CFI Enabled
2,304,341 UART: [state] LifecycleState = Manufacturing
2,306,220 UART: [state] DebugLocked = No
2,309,016 UART: [state] WD Timer not started. Device not locked for debugging
2,311,848 UART: [kat] SHA2-256
2,490,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,502,526 UART: [kat] ++
2,503,069 UART: [kat] sha1
2,514,502 UART: [kat] SHA2-256
2,517,547 UART: [kat] SHA2-384
2,523,212 UART: [kat] SHA2-512-ACC
2,526,208 UART: [kat] ECC-384
4,988,101 UART: [kat] HMAC-384Kdf
5,011,791 UART: [kat] LMS
5,541,285 UART: [kat] --
5,546,904 UART: [cold-reset] ++
5,547,972 UART: [fht] FHT @ 0x50003400
5,560,253 UART: [idev] ++
5,560,827 UART: [idev] CDI.KEYID = 6
5,561,737 UART: [idev] SUBJECT.KEYID = 7
5,562,953 UART: [idev] UDS.KEYID = 0
5,565,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,709,516 UART: [idev] Erasing UDS.KEYID = 0
8,064,133 UART: [idev] Sha1 KeyId Algorithm
8,086,630 UART: [idev] --
8,089,976 UART: [ldev] ++
8,090,564 UART: [ldev] CDI.KEYID = 6
8,091,479 UART: [ldev] SUBJECT.KEYID = 5
8,092,643 UART: [ldev] AUTHORITY.KEYID = 7
8,093,879 UART: [ldev] FE.KEYID = 1
8,140,363 UART: [ldev] Erasing FE.KEYID = 1
10,645,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,448,609 UART: [ldev] --
12,452,839 UART: [fwproc] Wait for Commands...
12,455,526 UART: [fwproc] Recv command 0x46574c44
12,457,628 UART: [fwproc] Recv'd Img size: 114448 bytes
15,895,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,966,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,035,458 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,354,281 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,383,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,533,557 >>> mbox cmd response: failed
12,534,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,534,439 >>> mbox cmd response: failed
12,534,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,535,001 >>> mbox cmd response: failed
Initializing fuses
2,053,366 writing to cptra_bootfsm_go
5,415,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,148,139 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,565 UART:
192,934 UART: Running Caliptra ROM ...
194,121 UART:
603,615 UART: [state] CFI Enabled
616,742 UART: [state] LifecycleState = Manufacturing
618,586 UART: [state] DebugLocked = No
621,121 UART: [state] WD Timer not started. Device not locked for debugging
624,679 UART: [kat] SHA2-256
803,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,326 UART: [kat] ++
815,779 UART: [kat] sha1
826,330 UART: [kat] SHA2-256
829,386 UART: [kat] SHA2-384
836,292 UART: [kat] SHA2-512-ACC
839,226 UART: [kat] ECC-384
3,280,644 UART: [kat] HMAC-384Kdf
3,293,861 UART: [kat] LMS
3,823,329 UART: [kat] --
3,829,325 UART: [cold-reset] ++
3,831,793 UART: [fht] FHT @ 0x50003400
3,843,199 UART: [idev] ++
3,843,775 UART: [idev] CDI.KEYID = 6
3,844,692 UART: [idev] SUBJECT.KEYID = 7
3,845,875 UART: [idev] UDS.KEYID = 0
3,848,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,747 UART: [idev] Erasing UDS.KEYID = 0
6,324,494 UART: [idev] Sha1 KeyId Algorithm
6,348,479 UART: [idev] --
6,353,528 UART: [ldev] ++
6,354,111 UART: [ldev] CDI.KEYID = 6
6,355,021 UART: [ldev] SUBJECT.KEYID = 5
6,356,184 UART: [ldev] AUTHORITY.KEYID = 7
6,357,418 UART: [ldev] FE.KEYID = 1
6,370,061 UART: [ldev] Erasing FE.KEYID = 1
8,844,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,544 UART: [ldev] --
10,634,323 UART: [fwproc] Wait for Commands...
10,635,771 UART: [fwproc] Recv command 0x46574c44
10,637,863 UART: [fwproc] Recv'd Img size: 114448 bytes
12,963,614 UART: ROM Fatal Error: 0x000B0027
12,966,741 >>> mbox cmd response: failed
12,967,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,967,449 >>> mbox cmd response: failed
12,967,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,968,014 >>> mbox cmd response: failed
Initializing fuses
2,048,628 writing to cptra_bootfsm_go
2,237,938 UART:
2,238,300 UART: Running Caliptra ROM ...
2,239,351 UART:
7,490,050 UART: [state] CFI Enabled
7,503,397 UART: [state] LifecycleState = Manufacturing
7,505,261 UART: [state] DebugLocked = No
7,506,649 UART: [state] WD Timer not started. Device not locked for debugging
7,509,691 UART: [kat] SHA2-256
7,688,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,700,402 UART: [kat] ++
7,700,951 UART: [kat] sha1
7,712,600 UART: [kat] SHA2-256
7,715,625 UART: [kat] SHA2-384
7,721,072 UART: [kat] SHA2-512-ACC
7,724,021 UART: [kat] ECC-384
10,166,360 UART: [kat] HMAC-384Kdf
10,177,606 UART: [kat] LMS
10,707,102 UART: [kat] --
10,711,106 UART: [cold-reset] ++
10,712,610 UART: [fht] FHT @ 0x50003400
10,723,106 UART: [idev] ++
10,723,670 UART: [idev] CDI.KEYID = 6
10,724,581 UART: [idev] SUBJECT.KEYID = 7
10,725,791 UART: [idev] UDS.KEYID = 0
10,728,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,872,248 UART: [idev] Erasing UDS.KEYID = 0
13,202,227 UART: [idev] Sha1 KeyId Algorithm
13,224,741 UART: [idev] --
13,227,469 UART: [ldev] ++
13,228,043 UART: [ldev] CDI.KEYID = 6
13,228,959 UART: [ldev] SUBJECT.KEYID = 5
13,230,119 UART: [ldev] AUTHORITY.KEYID = 7
13,231,349 UART: [ldev] FE.KEYID = 1
13,242,011 UART: [ldev] Erasing FE.KEYID = 1
15,713,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,434,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,450,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,466,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,481,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,502,828 UART: [ldev] --
17,506,849 UART: [fwproc] Wait for Commands...
17,509,278 UART: [fwproc] Recv command 0x46574c44
17,511,378 UART: [fwproc] Recv'd Img size: 114448 bytes
20,946,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,019,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,088,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,406,925 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,698,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,728,477 >>> mbox cmd response: failed
12,729,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,729,448 >>> mbox cmd response: failed
12,729,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,730,064 >>> mbox cmd response: failed
Initializing fuses
2,061,365 writing to cptra_bootfsm_go
10,835,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,436,056 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,827 writing to cptra_bootfsm_go
3,439,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,695,524 >>> mbox cmd response: failed
12,696,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,696,644 >>> mbox cmd response: failed
12,696,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,697,255 >>> mbox cmd response: failed
Initializing fuses
2,061,095 writing to cptra_bootfsm_go
5,482,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,821,612 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,753,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,910,299 >>> mbox cmd response: failed
12,910,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,911,240 >>> mbox cmd response: failed
12,911,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,911,829 >>> mbox cmd response: failed
Initializing fuses
2,050,155 writing to cptra_bootfsm_go
10,710,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,961,118 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Manufacturing
85,861 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,017 UART: [kat] SHA2-256
881,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,063 UART: [kat] ++
886,215 UART: [kat] sha1
890,289 UART: [kat] SHA2-256
892,227 UART: [kat] SHA2-384
894,932 UART: [kat] SHA2-512-ACC
896,833 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
907,228 UART: [kat] LMS
1,475,424 UART: [kat] --
1,476,415 UART: [cold-reset] ++
1,476,981 UART: [fht] Storing FHT @ 0x50003400
1,479,640 UART: [idev] ++
1,479,808 UART: [idev] CDI.KEYID = 6
1,480,168 UART: [idev] SUBJECT.KEYID = 7
1,480,592 UART: [idev] UDS.KEYID = 0
1,480,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,630 UART: [idev] Erasing UDS.KEYID = 0
1,505,320 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,868 UART: [idev] --
1,514,893 UART: [ldev] ++
1,515,061 UART: [ldev] CDI.KEYID = 6
1,515,424 UART: [ldev] SUBJECT.KEYID = 5
1,515,850 UART: [ldev] AUTHORITY.KEYID = 7
1,516,313 UART: [ldev] FE.KEYID = 1
1,521,583 UART: [ldev] Erasing FE.KEYID = 1
1,546,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,332 UART: [ldev] --
1,585,701 UART: [fwproc] Waiting for Commands...
1,586,534 UART: [fwproc] Received command 0x46574c44
1,587,325 UART: [fwproc] Received Image of size 114448 bytes
1,879,616 UART: ROM Fatal Error: 0x000B0027
1,880,773 >>> mbox cmd response: failed
1,880,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,779 >>> mbox cmd response: failed
1,880,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,933 UART: [kat] SHA2-256
881,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,979 UART: [kat] ++
886,131 UART: [kat] sha1
890,281 UART: [kat] SHA2-256
892,219 UART: [kat] SHA2-384
895,054 UART: [kat] SHA2-512-ACC
896,955 UART: [kat] ECC-384
902,624 UART: [kat] HMAC-384Kdf
907,274 UART: [kat] LMS
1,475,470 UART: [kat] --
1,476,691 UART: [cold-reset] ++
1,477,035 UART: [fht] Storing FHT @ 0x50003400
1,479,812 UART: [idev] ++
1,479,980 UART: [idev] CDI.KEYID = 6
1,480,340 UART: [idev] SUBJECT.KEYID = 7
1,480,764 UART: [idev] UDS.KEYID = 0
1,481,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,588 UART: [idev] Erasing UDS.KEYID = 0
1,504,892 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,610 UART: [idev] --
1,514,627 UART: [ldev] ++
1,514,795 UART: [ldev] CDI.KEYID = 6
1,515,158 UART: [ldev] SUBJECT.KEYID = 5
1,515,584 UART: [ldev] AUTHORITY.KEYID = 7
1,516,047 UART: [ldev] FE.KEYID = 1
1,521,431 UART: [ldev] Erasing FE.KEYID = 1
1,546,496 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,142 UART: [ldev] --
1,585,461 UART: [fwproc] Waiting for Commands...
1,586,196 UART: [fwproc] Received command 0x46574c44
1,586,987 UART: [fwproc] Received Image of size 114448 bytes
2,885,105 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,837 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,189 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,202 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,555 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,730,050 >>> mbox cmd response: failed
1,730,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,730,056 >>> mbox cmd response: failed
1,730,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,730,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,798 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,863 UART: [state] LifecycleState = Manufacturing
86,518 UART: [state] DebugLocked = No
87,182 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,686 UART: [kat] SHA2-256
882,617 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,732 UART: [kat] ++
886,884 UART: [kat] sha1
891,130 UART: [kat] SHA2-256
893,068 UART: [kat] SHA2-384
895,733 UART: [kat] SHA2-512-ACC
897,634 UART: [kat] ECC-384
903,187 UART: [kat] HMAC-384Kdf
907,957 UART: [kat] LMS
1,476,153 UART: [kat] --
1,477,002 UART: [cold-reset] ++
1,477,402 UART: [fht] Storing FHT @ 0x50003400
1,480,075 UART: [idev] ++
1,480,243 UART: [idev] CDI.KEYID = 6
1,480,603 UART: [idev] SUBJECT.KEYID = 7
1,481,027 UART: [idev] UDS.KEYID = 0
1,481,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,129 UART: [idev] Erasing UDS.KEYID = 0
1,505,467 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,049 UART: [idev] --
1,515,180 UART: [ldev] ++
1,515,348 UART: [ldev] CDI.KEYID = 6
1,515,711 UART: [ldev] SUBJECT.KEYID = 5
1,516,137 UART: [ldev] AUTHORITY.KEYID = 7
1,516,600 UART: [ldev] FE.KEYID = 1
1,522,100 UART: [ldev] Erasing FE.KEYID = 1
1,547,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,515 UART: [ldev] --
1,586,824 UART: [fwproc] Waiting for Commands...
1,587,677 UART: [fwproc] Received command 0x46574c44
1,588,468 UART: [fwproc] Received Image of size 114448 bytes
1,880,505 UART: ROM Fatal Error: 0x000B0027
1,881,662 >>> mbox cmd response: failed
1,881,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,668 >>> mbox cmd response: failed
1,881,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,528 UART: [kat] SHA2-256
882,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,574 UART: [kat] ++
886,726 UART: [kat] sha1
890,946 UART: [kat] SHA2-256
892,884 UART: [kat] SHA2-384
895,493 UART: [kat] SHA2-512-ACC
897,394 UART: [kat] ECC-384
902,929 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,556 UART: [cold-reset] ++
1,477,054 UART: [fht] Storing FHT @ 0x50003400
1,479,939 UART: [idev] ++
1,480,107 UART: [idev] CDI.KEYID = 6
1,480,467 UART: [idev] SUBJECT.KEYID = 7
1,480,891 UART: [idev] UDS.KEYID = 0
1,481,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,711 UART: [idev] Erasing UDS.KEYID = 0
1,505,639 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,321 UART: [idev] --
1,515,286 UART: [ldev] ++
1,515,454 UART: [ldev] CDI.KEYID = 6
1,515,817 UART: [ldev] SUBJECT.KEYID = 5
1,516,243 UART: [ldev] AUTHORITY.KEYID = 7
1,516,706 UART: [ldev] FE.KEYID = 1
1,521,806 UART: [ldev] Erasing FE.KEYID = 1
1,547,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,025 UART: [ldev] --
1,586,366 UART: [fwproc] Waiting for Commands...
1,587,231 UART: [fwproc] Received command 0x46574c44
1,588,022 UART: [fwproc] Received Image of size 114448 bytes
2,887,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,286 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,613 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,733,681 >>> mbox cmd response: failed
1,733,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,687 >>> mbox cmd response: failed
1,733,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,605 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Manufacturing
85,891 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,768 UART: [kat] SHA2-512-ACC
908,669 UART: [kat] ECC-384
918,470 UART: [kat] HMAC-384Kdf
922,930 UART: [kat] LMS
1,171,258 UART: [kat] --
1,172,179 UART: [cold-reset] ++
1,172,705 UART: [fht] FHT @ 0x50003400
1,175,472 UART: [idev] ++
1,175,640 UART: [idev] CDI.KEYID = 6
1,176,000 UART: [idev] SUBJECT.KEYID = 7
1,176,424 UART: [idev] UDS.KEYID = 0
1,176,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,388 UART: [idev] Erasing UDS.KEYID = 0
1,200,959 UART: [idev] Sha1 KeyId Algorithm
1,209,457 UART: [idev] --
1,210,675 UART: [ldev] ++
1,210,843 UART: [ldev] CDI.KEYID = 6
1,211,206 UART: [ldev] SUBJECT.KEYID = 5
1,211,632 UART: [ldev] AUTHORITY.KEYID = 7
1,212,095 UART: [ldev] FE.KEYID = 1
1,217,341 UART: [ldev] Erasing FE.KEYID = 1
1,242,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,515 UART: [ldev] --
1,281,814 UART: [fwproc] Wait for Commands...
1,282,598 UART: [fwproc] Recv command 0x46574c44
1,283,326 UART: [fwproc] Recv'd Img size: 114448 bytes
1,574,709 UART: ROM Fatal Error: 0x000B0027
1,575,866 >>> mbox cmd response: failed
1,575,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,872 >>> mbox cmd response: failed
1,575,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
893,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,635 UART: [kat] ++
897,787 UART: [kat] sha1
902,049 UART: [kat] SHA2-256
903,989 UART: [kat] SHA2-384
906,740 UART: [kat] SHA2-512-ACC
908,641 UART: [kat] ECC-384
918,516 UART: [kat] HMAC-384Kdf
923,044 UART: [kat] LMS
1,171,372 UART: [kat] --
1,172,309 UART: [cold-reset] ++
1,172,881 UART: [fht] FHT @ 0x50003400
1,175,568 UART: [idev] ++
1,175,736 UART: [idev] CDI.KEYID = 6
1,176,096 UART: [idev] SUBJECT.KEYID = 7
1,176,520 UART: [idev] UDS.KEYID = 0
1,176,865 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,324 UART: [idev] Erasing UDS.KEYID = 0
1,201,319 UART: [idev] Sha1 KeyId Algorithm
1,209,873 UART: [idev] --
1,210,969 UART: [ldev] ++
1,211,137 UART: [ldev] CDI.KEYID = 6
1,211,500 UART: [ldev] SUBJECT.KEYID = 5
1,211,926 UART: [ldev] AUTHORITY.KEYID = 7
1,212,389 UART: [ldev] FE.KEYID = 1
1,217,785 UART: [ldev] Erasing FE.KEYID = 1
1,243,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,955 UART: [ldev] --
1,283,360 UART: [fwproc] Wait for Commands...
1,283,962 UART: [fwproc] Recv command 0x46574c44
1,284,690 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,712 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,016 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,075 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,431,683 >>> mbox cmd response: failed
1,431,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,689 >>> mbox cmd response: failed
1,431,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,998 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Manufacturing
86,116 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
893,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,880 UART: [kat] ++
898,032 UART: [kat] sha1
902,168 UART: [kat] SHA2-256
904,108 UART: [kat] SHA2-384
906,967 UART: [kat] SHA2-512-ACC
908,868 UART: [kat] ECC-384
918,701 UART: [kat] HMAC-384Kdf
923,175 UART: [kat] LMS
1,171,503 UART: [kat] --
1,172,454 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,437 UART: [idev] ++
1,175,605 UART: [idev] CDI.KEYID = 6
1,175,965 UART: [idev] SUBJECT.KEYID = 7
1,176,389 UART: [idev] UDS.KEYID = 0
1,176,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,213 UART: [idev] Erasing UDS.KEYID = 0
1,201,514 UART: [idev] Sha1 KeyId Algorithm
1,209,946 UART: [idev] --
1,211,132 UART: [ldev] ++
1,211,300 UART: [ldev] CDI.KEYID = 6
1,211,663 UART: [ldev] SUBJECT.KEYID = 5
1,212,089 UART: [ldev] AUTHORITY.KEYID = 7
1,212,552 UART: [ldev] FE.KEYID = 1
1,217,534 UART: [ldev] Erasing FE.KEYID = 1
1,244,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,316 UART: [ldev] --
1,283,735 UART: [fwproc] Wait for Commands...
1,284,447 UART: [fwproc] Recv command 0x46574c44
1,285,175 UART: [fwproc] Recv'd Img size: 114448 bytes
1,577,164 UART: ROM Fatal Error: 0x000B0027
1,578,321 >>> mbox cmd response: failed
1,578,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,327 >>> mbox cmd response: failed
1,578,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
893,859 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,984 UART: [kat] ++
898,136 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
906,925 UART: [kat] SHA2-512-ACC
908,826 UART: [kat] ECC-384
918,821 UART: [kat] HMAC-384Kdf
923,437 UART: [kat] LMS
1,171,765 UART: [kat] --
1,172,514 UART: [cold-reset] ++
1,172,844 UART: [fht] FHT @ 0x50003400
1,175,417 UART: [idev] ++
1,175,585 UART: [idev] CDI.KEYID = 6
1,175,945 UART: [idev] SUBJECT.KEYID = 7
1,176,369 UART: [idev] UDS.KEYID = 0
1,176,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,537 UART: [idev] Erasing UDS.KEYID = 0
1,201,824 UART: [idev] Sha1 KeyId Algorithm
1,210,460 UART: [idev] --
1,211,540 UART: [ldev] ++
1,211,708 UART: [ldev] CDI.KEYID = 6
1,212,071 UART: [ldev] SUBJECT.KEYID = 5
1,212,497 UART: [ldev] AUTHORITY.KEYID = 7
1,212,960 UART: [ldev] FE.KEYID = 1
1,218,350 UART: [ldev] Erasing FE.KEYID = 1
1,244,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,796 UART: [ldev] --
1,284,131 UART: [fwproc] Wait for Commands...
1,284,841 UART: [fwproc] Recv command 0x46574c44
1,285,569 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,408 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,432,082 >>> mbox cmd response: failed
1,432,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,088 >>> mbox cmd response: failed
1,432,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,587 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Manufacturing
85,729 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
915,854 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,174,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,923 UART: [idev] Erasing UDS.KEYID = 0
1,198,333 UART: [idev] Sha1 KeyId Algorithm
1,207,165 UART: [idev] --
1,208,186 UART: [ldev] ++
1,208,354 UART: [ldev] CDI.KEYID = 6
1,208,718 UART: [ldev] SUBJECT.KEYID = 5
1,209,145 UART: [ldev] AUTHORITY.KEYID = 7
1,209,608 UART: [ldev] FE.KEYID = 1
1,214,588 UART: [ldev] Erasing FE.KEYID = 1
1,240,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,866 UART: [ldev] --
1,280,232 UART: [fwproc] Wait for Commands...
1,281,023 UART: [fwproc] Recv command 0x46574c44
1,281,756 UART: [fwproc] Recv'd Img size: 114448 bytes
1,573,055 UART: ROM Fatal Error: 0x000B0027
1,574,212 >>> mbox cmd response: failed
1,574,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,218 >>> mbox cmd response: failed
1,574,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
916,462 UART: [kat] HMAC-384Kdf
921,286 UART: [kat] LMS
1,169,598 UART: [kat] --
1,170,513 UART: [cold-reset] ++
1,171,059 UART: [fht] FHT @ 0x50003400
1,173,593 UART: [idev] ++
1,173,761 UART: [idev] CDI.KEYID = 6
1,174,122 UART: [idev] SUBJECT.KEYID = 7
1,174,547 UART: [idev] UDS.KEYID = 0
1,174,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,647 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,946 UART: [ldev] ++
1,209,114 UART: [ldev] CDI.KEYID = 6
1,209,478 UART: [ldev] SUBJECT.KEYID = 5
1,209,905 UART: [ldev] AUTHORITY.KEYID = 7
1,210,368 UART: [ldev] FE.KEYID = 1
1,215,666 UART: [ldev] Erasing FE.KEYID = 1
1,242,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,944 UART: [ldev] --
1,282,458 UART: [fwproc] Wait for Commands...
1,283,115 UART: [fwproc] Recv command 0x46574c44
1,283,848 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,432 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,741 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,767 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,033 >>> mbox cmd response: failed
1,427,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,039 >>> mbox cmd response: failed
1,427,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,165 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Manufacturing
86,228 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,239 UART: [kat] LMS
1,169,551 UART: [kat] --
1,170,468 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,436 UART: [idev] ++
1,173,604 UART: [idev] CDI.KEYID = 6
1,173,965 UART: [idev] SUBJECT.KEYID = 7
1,174,390 UART: [idev] UDS.KEYID = 0
1,174,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,848 UART: [idev] Erasing UDS.KEYID = 0
1,200,236 UART: [idev] Sha1 KeyId Algorithm
1,209,234 UART: [idev] --
1,210,261 UART: [ldev] ++
1,210,429 UART: [ldev] CDI.KEYID = 6
1,210,793 UART: [ldev] SUBJECT.KEYID = 5
1,211,220 UART: [ldev] AUTHORITY.KEYID = 7
1,211,683 UART: [ldev] FE.KEYID = 1
1,216,845 UART: [ldev] Erasing FE.KEYID = 1
1,243,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,651 UART: [ldev] --
1,282,051 UART: [fwproc] Wait for Commands...
1,282,642 UART: [fwproc] Recv command 0x46574c44
1,283,375 UART: [fwproc] Recv'd Img size: 114448 bytes
1,574,380 UART: ROM Fatal Error: 0x000B0027
1,575,537 >>> mbox cmd response: failed
1,575,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,543 >>> mbox cmd response: failed
1,575,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
900,070 UART: [kat] SHA2-256
902,010 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,828 UART: [idev] ++
1,172,996 UART: [idev] CDI.KEYID = 6
1,173,357 UART: [idev] SUBJECT.KEYID = 7
1,173,782 UART: [idev] UDS.KEYID = 0
1,174,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,878 UART: [idev] Erasing UDS.KEYID = 0
1,199,128 UART: [idev] Sha1 KeyId Algorithm
1,207,986 UART: [idev] --
1,208,901 UART: [ldev] ++
1,209,069 UART: [ldev] CDI.KEYID = 6
1,209,433 UART: [ldev] SUBJECT.KEYID = 5
1,209,860 UART: [ldev] AUTHORITY.KEYID = 7
1,210,323 UART: [ldev] FE.KEYID = 1
1,215,693 UART: [ldev] Erasing FE.KEYID = 1
1,241,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,063 UART: [ldev] --
1,280,535 UART: [fwproc] Wait for Commands...
1,281,292 UART: [fwproc] Recv command 0x46574c44
1,282,025 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,544 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,596 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,416 >>> mbox cmd response: failed
1,428,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,422 >>> mbox cmd response: failed
1,428,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,428 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,670 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,120 UART:
192,784 UART: Running Caliptra ROM ...
193,899 UART:
194,048 UART: [state] CFI Enabled
264,184 UART: [state] LifecycleState = Unprovisioned
266,136 UART: [state] DebugLocked = No
268,125 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,721 UART: [kat] SHA2-256
443,420 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,927 UART: [kat] ++
454,403 UART: [kat] sha1
465,444 UART: [kat] SHA2-256
468,135 UART: [kat] SHA2-384
474,981 UART: [kat] SHA2-512-ACC
477,321 UART: [kat] ECC-384
2,769,315 UART: [kat] HMAC-384Kdf
2,802,131 UART: [kat] LMS
3,992,440 UART: [kat] --
3,995,764 UART: [cold-reset] ++
3,997,053 UART: [fht] Storing FHT @ 0x50003400
4,007,254 UART: [idev] ++
4,007,826 UART: [idev] CDI.KEYID = 6
4,008,769 UART: [idev] SUBJECT.KEYID = 7
4,009,996 UART: [idev] UDS.KEYID = 0
4,012,608 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,445 UART: [idev] Erasing UDS.KEYID = 0
7,351,535 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,938 UART: [idev] --
7,376,292 UART: [ldev] ++
7,376,864 UART: [ldev] CDI.KEYID = 6
7,377,833 UART: [ldev] SUBJECT.KEYID = 5
7,379,054 UART: [ldev] AUTHORITY.KEYID = 7
7,380,296 UART: [ldev] FE.KEYID = 1
7,426,419 UART: [ldev] Erasing FE.KEYID = 1
10,761,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,075,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,090,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,105,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,119,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,138,905 UART: [ldev] --
13,143,472 UART: [fwproc] Waiting for Commands...
13,146,702 UART: [fwproc] Received command 0x46574c44
13,148,891 UART: [fwproc] Received Image of size 114124 bytes
15,858,756 UART: ROM Fatal Error: 0x000B002F
15,862,212 >>> mbox cmd response: failed
15,862,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,862,965 >>> mbox cmd response: failed
15,863,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,863,525 >>> mbox cmd response: failed
Initializing fuses
2,055,482 writing to cptra_bootfsm_go
2,244,774 UART:
2,245,129 UART: Running Caliptra ROM ...
2,246,270 UART:
2,246,441 UART: [state] CFI Enabled
2,315,274 UART: [state] LifecycleState = Unprovisioned
2,317,206 UART: [state] DebugLocked = No
2,319,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,683 UART: [kat] SHA2-256
2,493,400 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,881 UART: [kat] ++
2,504,388 UART: [kat] sha1
2,515,169 UART: [kat] SHA2-256
2,517,816 UART: [kat] SHA2-384
2,522,409 UART: [kat] SHA2-512-ACC
2,524,761 UART: [kat] ECC-384
4,821,734 UART: [kat] HMAC-384Kdf
4,852,009 UART: [kat] LMS
6,042,296 UART: [kat] --
6,047,290 UART: [cold-reset] ++
6,048,804 UART: [fht] Storing FHT @ 0x50003400
6,059,587 UART: [idev] ++
6,060,170 UART: [idev] CDI.KEYID = 6
6,061,195 UART: [idev] SUBJECT.KEYID = 7
6,062,359 UART: [idev] UDS.KEYID = 0
6,064,618 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,208,277 UART: [idev] Erasing UDS.KEYID = 0
9,398,559 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,976 UART: [idev] --
9,425,567 UART: [ldev] ++
9,426,136 UART: [ldev] CDI.KEYID = 6
9,427,075 UART: [ldev] SUBJECT.KEYID = 5
9,428,346 UART: [ldev] AUTHORITY.KEYID = 7
9,429,505 UART: [ldev] FE.KEYID = 1
9,473,359 UART: [ldev] Erasing FE.KEYID = 1
12,807,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,100,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,130,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,144,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,584 UART: [ldev] --
15,169,122 UART: [fwproc] Waiting for Commands...
15,171,762 UART: [fwproc] Received command 0x46574c44
15,173,949 UART: [fwproc] Received Image of size 114124 bytes
19,234,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,313,195 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,382,102 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,700,196 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,788,961 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,571,541 >>> mbox cmd response: failed
15,572,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,572,538 >>> mbox cmd response: failed
15,572,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,573,096 >>> mbox cmd response: failed
Initializing fuses
2,062,124 writing to cptra_bootfsm_go
5,831,056 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,892,355 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,594 UART:
192,947 UART: Running Caliptra ROM ...
194,094 UART:
603,576 UART: [state] CFI Enabled
618,450 UART: [state] LifecycleState = Unprovisioned
620,379 UART: [state] DebugLocked = No
622,897 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,650 UART: [kat] SHA2-256
798,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,955 UART: [kat] ++
809,487 UART: [kat] sha1
820,636 UART: [kat] SHA2-256
823,317 UART: [kat] SHA2-384
828,805 UART: [kat] SHA2-512-ACC
831,177 UART: [kat] ECC-384
3,114,766 UART: [kat] HMAC-384Kdf
3,126,619 UART: [kat] LMS
4,316,714 UART: [kat] --
4,322,128 UART: [cold-reset] ++
4,323,421 UART: [fht] Storing FHT @ 0x50003400
4,334,473 UART: [idev] ++
4,335,038 UART: [idev] CDI.KEYID = 6
4,335,973 UART: [idev] SUBJECT.KEYID = 7
4,337,194 UART: [idev] UDS.KEYID = 0
4,339,806 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,269 UART: [idev] Erasing UDS.KEYID = 0
7,625,158 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,857 UART: [idev] --
7,653,275 UART: [ldev] ++
7,653,855 UART: [ldev] CDI.KEYID = 6
7,654,878 UART: [ldev] SUBJECT.KEYID = 5
7,656,039 UART: [ldev] AUTHORITY.KEYID = 7
7,657,276 UART: [ldev] FE.KEYID = 1
7,669,596 UART: [ldev] Erasing FE.KEYID = 1
10,955,897 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,933 UART: [ldev] --
13,316,849 UART: [fwproc] Waiting for Commands...
13,319,447 UART: [fwproc] Received command 0x46574c44
13,321,639 UART: [fwproc] Received Image of size 114124 bytes
16,027,917 UART: ROM Fatal Error: 0x000B002F
16,031,353 >>> mbox cmd response: failed
16,031,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,032,112 >>> mbox cmd response: failed
16,032,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,032,677 >>> mbox cmd response: failed
Initializing fuses
2,053,722 writing to cptra_bootfsm_go
2,243,046 UART:
2,243,418 UART: Running Caliptra ROM ...
2,244,559 UART:
4,441,347 UART: [state] CFI Enabled
4,455,864 UART: [state] LifecycleState = Unprovisioned
4,457,778 UART: [state] DebugLocked = No
4,459,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,464,931 UART: [kat] SHA2-256
4,634,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,645,210 UART: [kat] ++
4,645,753 UART: [kat] sha1
4,657,293 UART: [kat] SHA2-256
4,660,031 UART: [kat] SHA2-384
4,666,128 UART: [kat] SHA2-512-ACC
4,668,477 UART: [kat] ECC-384
6,953,032 UART: [kat] HMAC-384Kdf
6,964,912 UART: [kat] LMS
8,155,021 UART: [kat] --
8,158,941 UART: [cold-reset] ++
8,160,360 UART: [fht] Storing FHT @ 0x50003400
8,172,709 UART: [idev] ++
8,173,281 UART: [idev] CDI.KEYID = 6
8,174,205 UART: [idev] SUBJECT.KEYID = 7
8,175,471 UART: [idev] UDS.KEYID = 0
8,177,409 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,320,764 UART: [idev] Erasing UDS.KEYID = 0
11,464,106 UART: [idev] Using Sha1 for KeyId Algorithm
11,486,994 UART: [idev] --
11,491,642 UART: [ldev] ++
11,492,208 UART: [ldev] CDI.KEYID = 6
11,493,226 UART: [ldev] SUBJECT.KEYID = 5
11,494,418 UART: [ldev] AUTHORITY.KEYID = 7
11,495,651 UART: [ldev] FE.KEYID = 1
11,507,185 UART: [ldev] Erasing FE.KEYID = 1
14,793,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,087,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,101,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,116,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,131,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,148,957 UART: [ldev] --
17,153,575 UART: [fwproc] Waiting for Commands...
17,155,348 UART: [fwproc] Received command 0x46574c44
17,157,532 UART: [fwproc] Received Image of size 114124 bytes
21,212,302 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,286,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,355,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,672,925 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
4,128,534 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,763,373 >>> mbox cmd response: failed
15,764,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,381 >>> mbox cmd response: failed
15,764,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,954 >>> mbox cmd response: failed
Initializing fuses
2,056,336 writing to cptra_bootfsm_go
8,229,555 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,176,170 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,275 UART:
192,643 UART: Running Caliptra ROM ...
193,849 UART:
194,002 UART: [state] CFI Enabled
263,064 UART: [state] LifecycleState = Unprovisioned
264,933 UART: [state] DebugLocked = No
267,014 UART: [state] WD Timer not started. Device not locked for debugging
270,809 UART: [kat] SHA2-256
449,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,495 UART: [kat] ++
461,950 UART: [kat] sha1
473,365 UART: [kat] SHA2-256
476,377 UART: [kat] SHA2-384
483,655 UART: [kat] SHA2-512-ACC
486,595 UART: [kat] ECC-384
2,950,826 UART: [kat] HMAC-384Kdf
2,972,687 UART: [kat] LMS
3,502,139 UART: [kat] --
3,506,847 UART: [cold-reset] ++
3,509,429 UART: [fht] FHT @ 0x50003400
3,520,466 UART: [idev] ++
3,521,037 UART: [idev] CDI.KEYID = 6
3,521,952 UART: [idev] SUBJECT.KEYID = 7
3,523,134 UART: [idev] UDS.KEYID = 0
3,525,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,012 UART: [idev] Erasing UDS.KEYID = 0
6,027,002 UART: [idev] Sha1 KeyId Algorithm
6,051,054 UART: [idev] --
6,055,957 UART: [ldev] ++
6,056,544 UART: [ldev] CDI.KEYID = 6
6,057,462 UART: [ldev] SUBJECT.KEYID = 5
6,058,628 UART: [ldev] AUTHORITY.KEYID = 7
6,059,923 UART: [ldev] FE.KEYID = 1
6,100,871 UART: [ldev] Erasing FE.KEYID = 1
8,604,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,772 UART: [ldev] --
10,413,663 UART: [fwproc] Wait for Commands...
10,416,034 UART: [fwproc] Recv command 0x46574c44
10,418,082 UART: [fwproc] Recv'd Img size: 114448 bytes
12,467,840 UART: ROM Fatal Error: 0x000B002F
12,470,962 >>> mbox cmd response: failed
12,471,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,471,706 >>> mbox cmd response: failed
12,471,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,260 >>> mbox cmd response: failed
Initializing fuses
2,058,839 writing to cptra_bootfsm_go
2,248,101 UART:
2,248,443 UART: Running Caliptra ROM ...
2,249,510 UART:
2,249,665 UART: [state] CFI Enabled
2,319,316 UART: [state] LifecycleState = Unprovisioned
2,321,201 UART: [state] DebugLocked = No
2,322,509 UART: [state] WD Timer not started. Device not locked for debugging
2,326,143 UART: [kat] SHA2-256
2,505,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,516,886 UART: [kat] ++
2,517,347 UART: [kat] sha1
2,529,150 UART: [kat] SHA2-256
2,532,155 UART: [kat] SHA2-384
2,537,780 UART: [kat] SHA2-512-ACC
2,540,722 UART: [kat] ECC-384
5,004,132 UART: [kat] HMAC-384Kdf
5,025,986 UART: [kat] LMS
5,555,489 UART: [kat] --
5,561,179 UART: [cold-reset] ++
5,563,445 UART: [fht] FHT @ 0x50003400
5,573,699 UART: [idev] ++
5,574,283 UART: [idev] CDI.KEYID = 6
5,575,198 UART: [idev] SUBJECT.KEYID = 7
5,576,416 UART: [idev] UDS.KEYID = 0
5,578,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,722,537 UART: [idev] Erasing UDS.KEYID = 0
8,079,600 UART: [idev] Sha1 KeyId Algorithm
8,101,813 UART: [idev] --
8,104,730 UART: [ldev] ++
8,105,300 UART: [ldev] CDI.KEYID = 6
8,106,212 UART: [ldev] SUBJECT.KEYID = 5
8,107,373 UART: [ldev] AUTHORITY.KEYID = 7
8,108,604 UART: [ldev] FE.KEYID = 1
8,155,579 UART: [ldev] Erasing FE.KEYID = 1
10,656,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,374,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,390,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,405,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,421,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,441,553 UART: [ldev] --
12,446,928 UART: [fwproc] Wait for Commands...
12,448,803 UART: [fwproc] Recv command 0x46574c44
12,450,907 UART: [fwproc] Recv'd Img size: 114448 bytes
15,858,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,321,967 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,362,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,228,992 >>> mbox cmd response: failed
12,229,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,229,869 >>> mbox cmd response: failed
12,230,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,230,434 >>> mbox cmd response: failed
Initializing fuses
2,053,592 writing to cptra_bootfsm_go
5,425,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,111,472 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,516 UART:
192,890 UART: Running Caliptra ROM ...
194,101 UART:
603,534 UART: [state] CFI Enabled
616,168 UART: [state] LifecycleState = Unprovisioned
618,053 UART: [state] DebugLocked = No
619,730 UART: [state] WD Timer not started. Device not locked for debugging
624,101 UART: [kat] SHA2-256
803,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,822 UART: [kat] ++
815,299 UART: [kat] sha1
827,157 UART: [kat] SHA2-256
830,144 UART: [kat] SHA2-384
835,478 UART: [kat] SHA2-512-ACC
838,464 UART: [kat] ECC-384
3,277,788 UART: [kat] HMAC-384Kdf
3,288,840 UART: [kat] LMS
3,818,366 UART: [kat] --
3,823,606 UART: [cold-reset] ++
3,824,632 UART: [fht] FHT @ 0x50003400
3,835,449 UART: [idev] ++
3,836,012 UART: [idev] CDI.KEYID = 6
3,836,940 UART: [idev] SUBJECT.KEYID = 7
3,838,175 UART: [idev] UDS.KEYID = 0
3,841,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,985,228 UART: [idev] Erasing UDS.KEYID = 0
6,311,852 UART: [idev] Sha1 KeyId Algorithm
6,334,019 UART: [idev] --
6,337,857 UART: [ldev] ++
6,338,428 UART: [ldev] CDI.KEYID = 6
6,339,505 UART: [ldev] SUBJECT.KEYID = 5
6,340,563 UART: [ldev] AUTHORITY.KEYID = 7
6,341,809 UART: [ldev] FE.KEYID = 1
6,351,678 UART: [ldev] Erasing FE.KEYID = 1
8,826,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,108 UART: [ldev] --
10,616,212 UART: [fwproc] Wait for Commands...
10,618,793 UART: [fwproc] Recv command 0x46574c44
10,620,891 UART: [fwproc] Recv'd Img size: 114448 bytes
12,668,837 UART: ROM Fatal Error: 0x000B002F
12,671,983 >>> mbox cmd response: failed
12,672,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,740 >>> mbox cmd response: failed
12,673,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,673,310 >>> mbox cmd response: failed
Initializing fuses
2,054,565 writing to cptra_bootfsm_go
2,243,870 UART:
2,244,219 UART: Running Caliptra ROM ...
2,245,291 UART:
7,796,309 UART: [state] CFI Enabled
7,811,817 UART: [state] LifecycleState = Unprovisioned
7,813,678 UART: [state] DebugLocked = No
7,815,092 UART: [state] WD Timer not started. Device not locked for debugging
7,818,302 UART: [kat] SHA2-256
7,997,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,008,973 UART: [kat] ++
8,009,440 UART: [kat] sha1
8,021,629 UART: [kat] SHA2-256
8,024,647 UART: [kat] SHA2-384
8,029,938 UART: [kat] SHA2-512-ACC
8,032,881 UART: [kat] ECC-384
10,477,989 UART: [kat] HMAC-384Kdf
10,491,338 UART: [kat] LMS
11,020,836 UART: [kat] --
11,026,296 UART: [cold-reset] ++
11,027,775 UART: [fht] FHT @ 0x50003400
11,038,496 UART: [idev] ++
11,039,064 UART: [idev] CDI.KEYID = 6
11,039,978 UART: [idev] SUBJECT.KEYID = 7
11,041,197 UART: [idev] UDS.KEYID = 0
11,043,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,187,322 UART: [idev] Erasing UDS.KEYID = 0
13,520,033 UART: [idev] Sha1 KeyId Algorithm
13,542,939 UART: [idev] --
13,547,314 UART: [ldev] ++
13,547,884 UART: [ldev] CDI.KEYID = 6
13,548,792 UART: [ldev] SUBJECT.KEYID = 5
13,549,953 UART: [ldev] AUTHORITY.KEYID = 7
13,551,185 UART: [ldev] FE.KEYID = 1
13,563,343 UART: [ldev] Erasing FE.KEYID = 1
16,037,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,755,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,771,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,787,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,803,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,823,200 UART: [ldev] --
17,827,770 UART: [fwproc] Wait for Commands...
17,829,910 UART: [fwproc] Recv command 0x46574c44
17,832,019 UART: [fwproc] Recv'd Img size: 114448 bytes
21,235,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,301,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,370,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,688,972 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,697,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,452,888 >>> mbox cmd response: failed
12,453,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,453,785 >>> mbox cmd response: failed
12,454,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,345 >>> mbox cmd response: failed
Initializing fuses
2,053,192 writing to cptra_bootfsm_go
11,112,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,681,163 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,440,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,295,644 >>> mbox cmd response: failed
12,296,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,496 >>> mbox cmd response: failed
12,296,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,297,052 >>> mbox cmd response: failed
Initializing fuses
2,055,306 writing to cptra_bootfsm_go
5,472,677 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,768,412 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,757,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,524,959 >>> mbox cmd response: failed
12,525,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,892 >>> mbox cmd response: failed
12,526,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,462 >>> mbox cmd response: failed
Initializing fuses
2,059,631 writing to cptra_bootfsm_go
11,107,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,310,752 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,185 UART: [kat] SHA2-256
882,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,231 UART: [kat] ++
886,383 UART: [kat] sha1
890,699 UART: [kat] SHA2-256
892,637 UART: [kat] SHA2-384
895,502 UART: [kat] SHA2-512-ACC
897,403 UART: [kat] ECC-384
902,674 UART: [kat] HMAC-384Kdf
907,504 UART: [kat] LMS
1,475,700 UART: [kat] --
1,476,511 UART: [cold-reset] ++
1,477,055 UART: [fht] Storing FHT @ 0x50003400
1,479,866 UART: [idev] ++
1,480,034 UART: [idev] CDI.KEYID = 6
1,480,394 UART: [idev] SUBJECT.KEYID = 7
1,480,818 UART: [idev] UDS.KEYID = 0
1,481,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,684 UART: [idev] Erasing UDS.KEYID = 0
1,505,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,572 UART: [idev] --
1,514,415 UART: [ldev] ++
1,514,583 UART: [ldev] CDI.KEYID = 6
1,514,946 UART: [ldev] SUBJECT.KEYID = 5
1,515,372 UART: [ldev] AUTHORITY.KEYID = 7
1,515,835 UART: [ldev] FE.KEYID = 1
1,521,191 UART: [ldev] Erasing FE.KEYID = 1
1,546,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,710 UART: [ldev] --
1,586,197 UART: [fwproc] Waiting for Commands...
1,586,962 UART: [fwproc] Received command 0x46574c44
1,587,753 UART: [fwproc] Received Image of size 114448 bytes
1,635,013 UART: ROM Fatal Error: 0x000B002F
1,636,172 >>> mbox cmd response: failed
1,636,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,178 >>> mbox cmd response: failed
1,636,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Unprovisioned
85,425 UART: [state] DebugLocked = No
86,123 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,775 UART: [kat] SHA2-256
881,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,821 UART: [kat] ++
885,973 UART: [kat] sha1
890,233 UART: [kat] SHA2-256
892,171 UART: [kat] SHA2-384
894,802 UART: [kat] SHA2-512-ACC
896,703 UART: [kat] ECC-384
902,432 UART: [kat] HMAC-384Kdf
907,010 UART: [kat] LMS
1,475,206 UART: [kat] --
1,476,115 UART: [cold-reset] ++
1,476,553 UART: [fht] Storing FHT @ 0x50003400
1,479,488 UART: [idev] ++
1,479,656 UART: [idev] CDI.KEYID = 6
1,480,016 UART: [idev] SUBJECT.KEYID = 7
1,480,440 UART: [idev] UDS.KEYID = 0
1,480,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,928 UART: [idev] Erasing UDS.KEYID = 0
1,505,992 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,640 UART: [idev] --
1,515,669 UART: [ldev] ++
1,515,837 UART: [ldev] CDI.KEYID = 6
1,516,200 UART: [ldev] SUBJECT.KEYID = 5
1,516,626 UART: [ldev] AUTHORITY.KEYID = 7
1,517,089 UART: [ldev] FE.KEYID = 1
1,522,155 UART: [ldev] Erasing FE.KEYID = 1
1,547,286 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,354 UART: [ldev] --
1,586,815 UART: [fwproc] Waiting for Commands...
1,587,672 UART: [fwproc] Received command 0x46574c44
1,588,463 UART: [fwproc] Received Image of size 114448 bytes
2,886,853 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,141 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,493 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,568 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,839 >>> mbox cmd response: failed
1,487,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,845 >>> mbox cmd response: failed
1,487,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,380 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,414 UART: [kat] SHA2-256
882,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,460 UART: [kat] ++
886,612 UART: [kat] sha1
890,812 UART: [kat] SHA2-256
892,750 UART: [kat] SHA2-384
895,425 UART: [kat] SHA2-512-ACC
897,326 UART: [kat] ECC-384
902,927 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,782 UART: [cold-reset] ++
1,477,286 UART: [fht] Storing FHT @ 0x50003400
1,479,945 UART: [idev] ++
1,480,113 UART: [idev] CDI.KEYID = 6
1,480,473 UART: [idev] SUBJECT.KEYID = 7
1,480,897 UART: [idev] UDS.KEYID = 0
1,481,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,849 UART: [idev] Erasing UDS.KEYID = 0
1,505,653 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,381 UART: [idev] --
1,515,552 UART: [ldev] ++
1,515,720 UART: [ldev] CDI.KEYID = 6
1,516,083 UART: [ldev] SUBJECT.KEYID = 5
1,516,509 UART: [ldev] AUTHORITY.KEYID = 7
1,516,972 UART: [ldev] FE.KEYID = 1
1,522,320 UART: [ldev] Erasing FE.KEYID = 1
1,547,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,485 UART: [ldev] --
1,586,762 UART: [fwproc] Waiting for Commands...
1,587,631 UART: [fwproc] Received command 0x46574c44
1,588,422 UART: [fwproc] Received Image of size 114448 bytes
1,635,674 UART: ROM Fatal Error: 0x000B002F
1,636,833 >>> mbox cmd response: failed
1,636,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,839 >>> mbox cmd response: failed
1,636,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,022 UART: [kat] SHA2-256
881,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,068 UART: [kat] ++
886,220 UART: [kat] sha1
890,376 UART: [kat] SHA2-256
892,314 UART: [kat] SHA2-384
895,045 UART: [kat] SHA2-512-ACC
896,946 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,319 UART: [kat] LMS
1,475,515 UART: [kat] --
1,476,478 UART: [cold-reset] ++
1,476,890 UART: [fht] Storing FHT @ 0x50003400
1,479,795 UART: [idev] ++
1,479,963 UART: [idev] CDI.KEYID = 6
1,480,323 UART: [idev] SUBJECT.KEYID = 7
1,480,747 UART: [idev] UDS.KEYID = 0
1,481,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,419 UART: [idev] Erasing UDS.KEYID = 0
1,505,421 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,101 UART: [idev] --
1,514,954 UART: [ldev] ++
1,515,122 UART: [ldev] CDI.KEYID = 6
1,515,485 UART: [ldev] SUBJECT.KEYID = 5
1,515,911 UART: [ldev] AUTHORITY.KEYID = 7
1,516,374 UART: [ldev] FE.KEYID = 1
1,521,630 UART: [ldev] Erasing FE.KEYID = 1
1,546,967 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,991 UART: [ldev] --
1,586,414 UART: [fwproc] Waiting for Commands...
1,587,275 UART: [fwproc] Received command 0x46574c44
1,588,066 UART: [fwproc] Received Image of size 114448 bytes
2,887,486 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,218 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,523 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,480 >>> mbox cmd response: failed
1,488,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,486 >>> mbox cmd response: failed
1,488,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,768 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,987 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
892,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,077 UART: [kat] ++
897,229 UART: [kat] sha1
901,547 UART: [kat] SHA2-256
903,487 UART: [kat] SHA2-384
906,354 UART: [kat] SHA2-512-ACC
908,255 UART: [kat] ECC-384
918,230 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,171,879 UART: [cold-reset] ++
1,172,367 UART: [fht] FHT @ 0x50003400
1,174,888 UART: [idev] ++
1,175,056 UART: [idev] CDI.KEYID = 6
1,175,416 UART: [idev] SUBJECT.KEYID = 7
1,175,840 UART: [idev] UDS.KEYID = 0
1,176,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,786 UART: [idev] Erasing UDS.KEYID = 0
1,200,447 UART: [idev] Sha1 KeyId Algorithm
1,208,975 UART: [idev] --
1,209,967 UART: [ldev] ++
1,210,135 UART: [ldev] CDI.KEYID = 6
1,210,498 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,699 UART: [ldev] Erasing FE.KEYID = 1
1,242,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,282,066 UART: [fwproc] Wait for Commands...
1,282,738 UART: [fwproc] Recv command 0x46574c44
1,283,466 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,696 UART: ROM Fatal Error: 0x000B002F
1,331,855 >>> mbox cmd response: failed
1,331,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,861 >>> mbox cmd response: failed
1,331,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,867 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,557 UART: [kat] SHA2-256
903,497 UART: [kat] SHA2-384
906,122 UART: [kat] SHA2-512-ACC
908,023 UART: [kat] ECC-384
917,630 UART: [kat] HMAC-384Kdf
922,202 UART: [kat] LMS
1,170,530 UART: [kat] --
1,171,283 UART: [cold-reset] ++
1,171,751 UART: [fht] FHT @ 0x50003400
1,174,496 UART: [idev] ++
1,174,664 UART: [idev] CDI.KEYID = 6
1,175,024 UART: [idev] SUBJECT.KEYID = 7
1,175,448 UART: [idev] UDS.KEYID = 0
1,175,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,345 UART: [idev] Sha1 KeyId Algorithm
1,207,891 UART: [idev] --
1,208,945 UART: [ldev] ++
1,209,113 UART: [ldev] CDI.KEYID = 6
1,209,476 UART: [ldev] SUBJECT.KEYID = 5
1,209,902 UART: [ldev] AUTHORITY.KEYID = 7
1,210,365 UART: [ldev] FE.KEYID = 1
1,215,635 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,367 UART: [ldev] --
1,281,730 UART: [fwproc] Wait for Commands...
1,282,444 UART: [fwproc] Recv command 0x46574c44
1,283,172 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,837 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,117 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,886 >>> mbox cmd response: failed
1,185,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,892 >>> mbox cmd response: failed
1,185,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,316 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
893,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,544 UART: [kat] ++
897,696 UART: [kat] sha1
901,874 UART: [kat] SHA2-256
903,814 UART: [kat] SHA2-384
906,435 UART: [kat] SHA2-512-ACC
908,336 UART: [kat] ECC-384
918,359 UART: [kat] HMAC-384Kdf
922,905 UART: [kat] LMS
1,171,233 UART: [kat] --
1,172,138 UART: [cold-reset] ++
1,172,646 UART: [fht] FHT @ 0x50003400
1,175,225 UART: [idev] ++
1,175,393 UART: [idev] CDI.KEYID = 6
1,175,753 UART: [idev] SUBJECT.KEYID = 7
1,176,177 UART: [idev] UDS.KEYID = 0
1,176,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,489 UART: [idev] Erasing UDS.KEYID = 0
1,201,204 UART: [idev] Sha1 KeyId Algorithm
1,209,640 UART: [idev] --
1,210,616 UART: [ldev] ++
1,210,784 UART: [ldev] CDI.KEYID = 6
1,211,147 UART: [ldev] SUBJECT.KEYID = 5
1,211,573 UART: [ldev] AUTHORITY.KEYID = 7
1,212,036 UART: [ldev] FE.KEYID = 1
1,217,498 UART: [ldev] Erasing FE.KEYID = 1
1,244,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,184 UART: [ldev] --
1,283,683 UART: [fwproc] Wait for Commands...
1,284,385 UART: [fwproc] Recv command 0x46574c44
1,285,113 UART: [fwproc] Recv'd Img size: 114448 bytes
1,333,167 UART: ROM Fatal Error: 0x000B002F
1,334,326 >>> mbox cmd response: failed
1,334,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,332 >>> mbox cmd response: failed
1,334,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,338 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,254 UART: [kat] SHA2-256
904,194 UART: [kat] SHA2-384
907,075 UART: [kat] SHA2-512-ACC
908,976 UART: [kat] ECC-384
918,551 UART: [kat] HMAC-384Kdf
923,219 UART: [kat] LMS
1,171,547 UART: [kat] --
1,172,376 UART: [cold-reset] ++
1,172,918 UART: [fht] FHT @ 0x50003400
1,175,739 UART: [idev] ++
1,175,907 UART: [idev] CDI.KEYID = 6
1,176,267 UART: [idev] SUBJECT.KEYID = 7
1,176,691 UART: [idev] UDS.KEYID = 0
1,177,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,089 UART: [idev] Erasing UDS.KEYID = 0
1,202,254 UART: [idev] Sha1 KeyId Algorithm
1,210,676 UART: [idev] --
1,211,858 UART: [ldev] ++
1,212,026 UART: [ldev] CDI.KEYID = 6
1,212,389 UART: [ldev] SUBJECT.KEYID = 5
1,212,815 UART: [ldev] AUTHORITY.KEYID = 7
1,213,278 UART: [ldev] FE.KEYID = 1
1,218,714 UART: [ldev] Erasing FE.KEYID = 1
1,245,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,710 UART: [ldev] --
1,285,073 UART: [fwproc] Wait for Commands...
1,285,819 UART: [fwproc] Recv command 0x46574c44
1,286,547 UART: [fwproc] Recv'd Img size: 114448 bytes
2,586,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,932 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,189,549 >>> mbox cmd response: failed
1,189,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,555 >>> mbox cmd response: failed
1,189,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,458 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,725 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,860 UART: [kat] LMS
1,169,172 UART: [kat] --
1,170,341 UART: [cold-reset] ++
1,170,875 UART: [fht] FHT @ 0x50003400
1,173,535 UART: [idev] ++
1,173,703 UART: [idev] CDI.KEYID = 6
1,174,064 UART: [idev] SUBJECT.KEYID = 7
1,174,489 UART: [idev] UDS.KEYID = 0
1,174,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,049 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,854 UART: [ldev] ++
1,209,022 UART: [ldev] CDI.KEYID = 6
1,209,386 UART: [ldev] SUBJECT.KEYID = 5
1,209,813 UART: [ldev] AUTHORITY.KEYID = 7
1,210,276 UART: [ldev] FE.KEYID = 1
1,215,342 UART: [ldev] Erasing FE.KEYID = 1
1,241,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,800 UART: [ldev] --
1,280,286 UART: [fwproc] Wait for Commands...
1,280,975 UART: [fwproc] Recv command 0x46574c44
1,281,708 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,535 UART: ROM Fatal Error: 0x000B002F
1,329,694 >>> mbox cmd response: failed
1,329,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,700 >>> mbox cmd response: failed
1,329,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,706 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,789 UART: [state] WD Timer not started. Device not locked for debugging
88,138 UART: [kat] SHA2-256
891,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,817 UART: [kat] ++
895,969 UART: [kat] sha1
900,269 UART: [kat] SHA2-256
902,209 UART: [kat] SHA2-384
904,882 UART: [kat] SHA2-512-ACC
906,783 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,169,881 UART: [cold-reset] ++
1,170,263 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,333 UART: [idev] Erasing UDS.KEYID = 0
1,199,837 UART: [idev] Sha1 KeyId Algorithm
1,208,743 UART: [idev] --
1,209,804 UART: [ldev] ++
1,209,972 UART: [ldev] CDI.KEYID = 6
1,210,336 UART: [ldev] SUBJECT.KEYID = 5
1,210,763 UART: [ldev] AUTHORITY.KEYID = 7
1,211,226 UART: [ldev] FE.KEYID = 1
1,216,550 UART: [ldev] Erasing FE.KEYID = 1
1,242,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,242 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,437 UART: [fwproc] Recv command 0x46574c44
1,283,170 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,703 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,237 >>> mbox cmd response: failed
1,183,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,243 >>> mbox cmd response: failed
1,183,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,160 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,879 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,788 UART: [kat] SHA2-256
901,728 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
916,639 UART: [kat] HMAC-384Kdf
921,331 UART: [kat] LMS
1,169,643 UART: [kat] --
1,170,538 UART: [cold-reset] ++
1,170,926 UART: [fht] FHT @ 0x50003400
1,173,382 UART: [idev] ++
1,173,550 UART: [idev] CDI.KEYID = 6
1,173,911 UART: [idev] SUBJECT.KEYID = 7
1,174,336 UART: [idev] UDS.KEYID = 0
1,174,682 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,572 UART: [idev] --
1,209,603 UART: [ldev] ++
1,209,771 UART: [ldev] CDI.KEYID = 6
1,210,135 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,029 UART: [ldev] Erasing FE.KEYID = 1
1,242,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,282,159 UART: [fwproc] Wait for Commands...
1,282,792 UART: [fwproc] Recv command 0x46574c44
1,283,525 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,524 UART: ROM Fatal Error: 0x000B002F
1,332,683 >>> mbox cmd response: failed
1,332,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,689 >>> mbox cmd response: failed
1,332,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,933 UART: [kat] SHA2-512-ACC
906,834 UART: [kat] ECC-384
916,565 UART: [kat] HMAC-384Kdf
921,241 UART: [kat] LMS
1,169,553 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,886 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,174,916 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,762 UART: [idev] Erasing UDS.KEYID = 0
1,200,014 UART: [idev] Sha1 KeyId Algorithm
1,208,814 UART: [idev] --
1,209,841 UART: [ldev] ++
1,210,009 UART: [ldev] CDI.KEYID = 6
1,210,373 UART: [ldev] SUBJECT.KEYID = 5
1,210,800 UART: [ldev] AUTHORITY.KEYID = 7
1,211,263 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,243,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,415 UART: [ldev] --
1,282,703 UART: [fwproc] Wait for Commands...
1,283,306 UART: [fwproc] Recv command 0x46574c44
1,284,039 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,774 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,910 >>> mbox cmd response: failed
1,183,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,916 >>> mbox cmd response: failed
1,183,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,832 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
192,332 UART:
192,698 UART: Running Caliptra ROM ...
193,887 UART:
194,039 UART: [state] CFI Enabled
261,875 UART: [state] LifecycleState = Unprovisioned
263,862 UART: [state] DebugLocked = No
265,262 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,630 UART: [kat] SHA2-256
440,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,841 UART: [kat] ++
451,299 UART: [kat] sha1
461,037 UART: [kat] SHA2-256
463,726 UART: [kat] SHA2-384
469,709 UART: [kat] SHA2-512-ACC
472,101 UART: [kat] ECC-384
2,767,182 UART: [kat] HMAC-384Kdf
2,798,840 UART: [kat] LMS
3,989,141 UART: [kat] --
3,995,853 UART: [cold-reset] ++
3,997,306 UART: [fht] Storing FHT @ 0x50003400
4,010,415 UART: [idev] ++
4,010,989 UART: [idev] CDI.KEYID = 6
4,011,952 UART: [idev] SUBJECT.KEYID = 7
4,013,171 UART: [idev] UDS.KEYID = 0
4,016,201 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,978 UART: [idev] Erasing UDS.KEYID = 0
7,347,258 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,120 UART: [idev] --
7,373,014 UART: [ldev] ++
7,373,586 UART: [ldev] CDI.KEYID = 6
7,374,713 UART: [ldev] SUBJECT.KEYID = 5
7,375,824 UART: [ldev] AUTHORITY.KEYID = 7
7,377,005 UART: [ldev] FE.KEYID = 1
7,422,340 UART: [ldev] Erasing FE.KEYID = 1
10,754,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,597 UART: [ldev] --
13,136,757 UART: [fwproc] Waiting for Commands...
13,139,829 UART: [fwproc] Received command 0x46574c44
13,142,069 UART: [fwproc] Received Image of size 114124 bytes
13,198,292 UART: ROM Fatal Error: 0x000B0001
13,201,817 >>> mbox cmd response: failed
13,202,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,202,573 >>> mbox cmd response: failed
13,202,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,203,137 >>> mbox cmd response: failed
Initializing fuses
2,050,924 writing to cptra_bootfsm_go
2,240,258 UART:
2,240,606 UART: Running Caliptra ROM ...
2,241,741 UART:
2,241,916 UART: [state] CFI Enabled
2,310,756 UART: [state] LifecycleState = Unprovisioned
2,312,704 UART: [state] DebugLocked = No
2,314,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,867 UART: [kat] SHA2-256
2,489,577 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,053 UART: [kat] ++
2,500,558 UART: [kat] sha1
2,512,420 UART: [kat] SHA2-256
2,515,125 UART: [kat] SHA2-384
2,520,469 UART: [kat] SHA2-512-ACC
2,522,820 UART: [kat] ECC-384
4,815,292 UART: [kat] HMAC-384Kdf
4,846,405 UART: [kat] LMS
6,036,741 UART: [kat] --
6,041,627 UART: [cold-reset] ++
6,042,977 UART: [fht] Storing FHT @ 0x50003400
6,053,330 UART: [idev] ++
6,053,947 UART: [idev] CDI.KEYID = 6
6,054,869 UART: [idev] SUBJECT.KEYID = 7
6,056,096 UART: [idev] UDS.KEYID = 0
6,058,783 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,202,309 UART: [idev] Erasing UDS.KEYID = 0
9,393,076 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,830 UART: [idev] --
9,417,321 UART: [ldev] ++
9,417,902 UART: [ldev] CDI.KEYID = 6
9,418,920 UART: [ldev] SUBJECT.KEYID = 5
9,420,124 UART: [ldev] AUTHORITY.KEYID = 7
9,421,386 UART: [ldev] FE.KEYID = 1
9,468,872 UART: [ldev] Erasing FE.KEYID = 1
12,802,362 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,115,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,129,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,144,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,159,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,178,081 UART: [ldev] --
15,182,930 UART: [fwproc] Waiting for Commands...
15,186,162 UART: [fwproc] Received command 0x46574c44
15,188,408 UART: [fwproc] Received Image of size 114124 bytes
19,247,363 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,329,804 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,398,675 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,716,389 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,805,766 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,938,607 >>> mbox cmd response: failed
12,939,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,939,578 >>> mbox cmd response: failed
12,939,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,940,143 >>> mbox cmd response: failed
Initializing fuses
2,051,804 writing to cptra_bootfsm_go
5,815,350 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,887,749 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,618 UART:
192,964 UART: Running Caliptra ROM ...
194,144 UART:
603,919 UART: [state] CFI Enabled
617,313 UART: [state] LifecycleState = Unprovisioned
619,242 UART: [state] DebugLocked = No
621,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,819 UART: [kat] SHA2-256
796,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,094 UART: [kat] ++
807,628 UART: [kat] sha1
819,109 UART: [kat] SHA2-256
821,795 UART: [kat] SHA2-384
828,310 UART: [kat] SHA2-512-ACC
830,701 UART: [kat] ECC-384
3,117,045 UART: [kat] HMAC-384Kdf
3,127,818 UART: [kat] LMS
4,317,884 UART: [kat] --
4,321,137 UART: [cold-reset] ++
4,323,076 UART: [fht] Storing FHT @ 0x50003400
4,334,457 UART: [idev] ++
4,335,031 UART: [idev] CDI.KEYID = 6
4,335,957 UART: [idev] SUBJECT.KEYID = 7
4,337,229 UART: [idev] UDS.KEYID = 0
4,339,891 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,353 UART: [idev] Erasing UDS.KEYID = 0
7,628,480 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,138 UART: [idev] --
7,654,351 UART: [ldev] ++
7,654,982 UART: [ldev] CDI.KEYID = 6
7,655,901 UART: [ldev] SUBJECT.KEYID = 5
7,657,139 UART: [ldev] AUTHORITY.KEYID = 7
7,658,375 UART: [ldev] FE.KEYID = 1
7,670,306 UART: [ldev] Erasing FE.KEYID = 1
10,957,722 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,873 UART: [ldev] --
13,318,201 UART: [fwproc] Waiting for Commands...
13,321,542 UART: [fwproc] Received command 0x46574c44
13,323,732 UART: [fwproc] Received Image of size 114124 bytes
13,379,983 UART: ROM Fatal Error: 0x000B0001
13,383,443 >>> mbox cmd response: failed
13,383,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,384,149 >>> mbox cmd response: failed
13,384,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,384,732 >>> mbox cmd response: failed
Initializing fuses
2,049,579 writing to cptra_bootfsm_go
2,238,916 UART:
2,239,266 UART: Running Caliptra ROM ...
2,240,378 UART:
7,069,641 UART: [state] CFI Enabled
7,085,557 UART: [state] LifecycleState = Unprovisioned
7,087,505 UART: [state] DebugLocked = No
7,089,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,093,980 UART: [kat] SHA2-256
7,263,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,274,271 UART: [kat] ++
7,274,818 UART: [kat] sha1
7,285,063 UART: [kat] SHA2-256
7,287,751 UART: [kat] SHA2-384
7,294,111 UART: [kat] SHA2-512-ACC
7,296,463 UART: [kat] ECC-384
9,582,495 UART: [kat] HMAC-384Kdf
9,595,315 UART: [kat] LMS
10,785,433 UART: [kat] --
10,790,063 UART: [cold-reset] ++
10,792,592 UART: [fht] Storing FHT @ 0x50003400
10,804,072 UART: [idev] ++
10,804,646 UART: [idev] CDI.KEYID = 6
10,805,531 UART: [idev] SUBJECT.KEYID = 7
10,806,796 UART: [idev] UDS.KEYID = 0
10,809,343 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,952,767 UART: [idev] Erasing UDS.KEYID = 0
14,092,934 UART: [idev] Using Sha1 for KeyId Algorithm
14,115,576 UART: [idev] --
14,118,944 UART: [ldev] ++
14,119,521 UART: [ldev] CDI.KEYID = 6
14,120,537 UART: [ldev] SUBJECT.KEYID = 5
14,121,726 UART: [ldev] AUTHORITY.KEYID = 7
14,122,958 UART: [ldev] FE.KEYID = 1
14,135,780 UART: [ldev] Erasing FE.KEYID = 1
17,423,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,719,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,734,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,749,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,763,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,781,731 UART: [ldev] --
19,786,503 UART: [fwproc] Waiting for Commands...
19,788,146 UART: [fwproc] Received command 0x46574c44
19,790,335 UART: [fwproc] Received Image of size 114124 bytes
23,845,168 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,924,855 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,993,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,310,670 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
4,128,060 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,111,653 >>> mbox cmd response: failed
13,112,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,112,626 >>> mbox cmd response: failed
13,112,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,113,135 >>> mbox cmd response: failed
Initializing fuses
2,054,017 writing to cptra_bootfsm_go
10,889,819 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,842,207 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
192,287 UART:
192,650 UART: Running Caliptra ROM ...
193,832 UART:
193,982 UART: [state] CFI Enabled
261,197 UART: [state] LifecycleState = Unprovisioned
263,125 UART: [state] DebugLocked = No
264,989 UART: [state] WD Timer not started. Device not locked for debugging
268,328 UART: [kat] SHA2-256
447,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,033 UART: [kat] ++
459,572 UART: [kat] sha1
470,032 UART: [kat] SHA2-256
473,078 UART: [kat] SHA2-384
479,334 UART: [kat] SHA2-512-ACC
482,274 UART: [kat] ECC-384
2,945,949 UART: [kat] HMAC-384Kdf
2,970,014 UART: [kat] LMS
3,499,430 UART: [kat] --
3,502,801 UART: [cold-reset] ++
3,503,741 UART: [fht] FHT @ 0x50003400
3,514,947 UART: [idev] ++
3,515,514 UART: [idev] CDI.KEYID = 6
3,516,532 UART: [idev] SUBJECT.KEYID = 7
3,517,637 UART: [idev] UDS.KEYID = 0
3,520,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,480 UART: [idev] Erasing UDS.KEYID = 0
6,027,018 UART: [idev] Sha1 KeyId Algorithm
6,050,182 UART: [idev] --
6,054,883 UART: [ldev] ++
6,055,465 UART: [ldev] CDI.KEYID = 6
6,056,543 UART: [ldev] SUBJECT.KEYID = 5
6,057,652 UART: [ldev] AUTHORITY.KEYID = 7
6,058,829 UART: [ldev] FE.KEYID = 1
6,099,184 UART: [ldev] Erasing FE.KEYID = 1
8,604,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,451 UART: [ldev] --
10,412,824 UART: [fwproc] Wait for Commands...
10,415,427 UART: [fwproc] Recv command 0x46574c44
10,417,533 UART: [fwproc] Recv'd Img size: 114448 bytes
10,474,911 UART: ROM Fatal Error: 0x000B0001
10,477,999 >>> mbox cmd response: failed
10,478,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,478,798 >>> mbox cmd response: failed
10,479,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,479,359 >>> mbox cmd response: failed
Initializing fuses
2,049,509 writing to cptra_bootfsm_go
2,238,813 UART:
2,239,172 UART: Running Caliptra ROM ...
2,240,226 UART:
2,240,398 UART: [state] CFI Enabled
2,305,289 UART: [state] LifecycleState = Unprovisioned
2,307,169 UART: [state] DebugLocked = No
2,308,747 UART: [state] WD Timer not started. Device not locked for debugging
2,312,320 UART: [kat] SHA2-256
2,491,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,017 UART: [kat] ++
2,503,478 UART: [kat] sha1
2,514,090 UART: [kat] SHA2-256
2,517,102 UART: [kat] SHA2-384
2,523,902 UART: [kat] SHA2-512-ACC
2,526,845 UART: [kat] ECC-384
4,990,733 UART: [kat] HMAC-384Kdf
5,011,827 UART: [kat] LMS
5,541,313 UART: [kat] --
5,545,695 UART: [cold-reset] ++
5,547,917 UART: [fht] FHT @ 0x50003400
5,557,764 UART: [idev] ++
5,558,337 UART: [idev] CDI.KEYID = 6
5,559,248 UART: [idev] SUBJECT.KEYID = 7
5,560,462 UART: [idev] UDS.KEYID = 0
5,562,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,707,048 UART: [idev] Erasing UDS.KEYID = 0
8,068,868 UART: [idev] Sha1 KeyId Algorithm
8,092,321 UART: [idev] --
8,095,996 UART: [ldev] ++
8,096,577 UART: [ldev] CDI.KEYID = 6
8,097,488 UART: [ldev] SUBJECT.KEYID = 5
8,098,703 UART: [ldev] AUTHORITY.KEYID = 7
8,099,934 UART: [ldev] FE.KEYID = 1
8,141,055 UART: [ldev] Erasing FE.KEYID = 1
10,642,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,359,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,375,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,391,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,407,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,428,015 UART: [ldev] --
12,433,389 UART: [fwproc] Wait for Commands...
12,436,185 UART: [fwproc] Recv command 0x46574c44
12,438,280 UART: [fwproc] Recv'd Img size: 114448 bytes
15,843,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,916,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,985,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,303,515 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,361,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,254,893 >>> mbox cmd response: failed
10,255,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,255,778 >>> mbox cmd response: failed
10,256,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,256,288 >>> mbox cmd response: failed
Initializing fuses
2,048,279 writing to cptra_bootfsm_go
5,405,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,084,538 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
192,455 UART:
192,814 UART: Running Caliptra ROM ...
193,908 UART:
603,785 UART: [state] CFI Enabled
616,002 UART: [state] LifecycleState = Unprovisioned
617,859 UART: [state] DebugLocked = No
619,456 UART: [state] WD Timer not started. Device not locked for debugging
623,332 UART: [kat] SHA2-256
802,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,055 UART: [kat] ++
814,527 UART: [kat] sha1
825,238 UART: [kat] SHA2-256
828,248 UART: [kat] SHA2-384
832,822 UART: [kat] SHA2-512-ACC
835,751 UART: [kat] ECC-384
3,277,916 UART: [kat] HMAC-384Kdf
3,290,258 UART: [kat] LMS
3,819,716 UART: [kat] --
3,825,002 UART: [cold-reset] ++
3,826,454 UART: [fht] FHT @ 0x50003400
3,837,434 UART: [idev] ++
3,838,038 UART: [idev] CDI.KEYID = 6
3,838,956 UART: [idev] SUBJECT.KEYID = 7
3,840,177 UART: [idev] UDS.KEYID = 0
3,842,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,579 UART: [idev] Erasing UDS.KEYID = 0
6,316,018 UART: [idev] Sha1 KeyId Algorithm
6,338,743 UART: [idev] --
6,342,795 UART: [ldev] ++
6,343,366 UART: [ldev] CDI.KEYID = 6
6,344,292 UART: [ldev] SUBJECT.KEYID = 5
6,345,454 UART: [ldev] AUTHORITY.KEYID = 7
6,346,682 UART: [ldev] FE.KEYID = 1
6,357,813 UART: [ldev] Erasing FE.KEYID = 1
8,827,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,327 UART: [ldev] --
10,617,562 UART: [fwproc] Wait for Commands...
10,620,480 UART: [fwproc] Recv command 0x46574c44
10,622,599 UART: [fwproc] Recv'd Img size: 114448 bytes
10,678,551 UART: ROM Fatal Error: 0x000B0001
10,681,641 >>> mbox cmd response: failed
10,682,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,682,422 >>> mbox cmd response: failed
10,682,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,682,985 >>> mbox cmd response: failed
Initializing fuses
2,051,408 writing to cptra_bootfsm_go
2,240,715 UART:
2,241,059 UART: Running Caliptra ROM ...
2,242,196 UART:
9,776,046 UART: [state] CFI Enabled
9,790,294 UART: [state] LifecycleState = Unprovisioned
9,792,186 UART: [state] DebugLocked = No
9,794,366 UART: [state] WD Timer not started. Device not locked for debugging
9,797,895 UART: [kat] SHA2-256
9,977,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,988,582 UART: [kat] ++
9,989,046 UART: [kat] sha1
9,999,715 UART: [kat] SHA2-256
10,002,739 UART: [kat] SHA2-384
10,009,809 UART: [kat] SHA2-512-ACC
10,012,754 UART: [kat] ECC-384
12,454,050 UART: [kat] HMAC-384Kdf
12,465,682 UART: [kat] LMS
12,995,137 UART: [kat] --
12,999,984 UART: [cold-reset] ++
13,001,920 UART: [fht] FHT @ 0x50003400
13,012,386 UART: [idev] ++
13,012,955 UART: [idev] CDI.KEYID = 6
13,013,837 UART: [idev] SUBJECT.KEYID = 7
13,015,052 UART: [idev] UDS.KEYID = 0
13,017,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,161,676 UART: [idev] Erasing UDS.KEYID = 0
15,490,396 UART: [idev] Sha1 KeyId Algorithm
15,513,360 UART: [idev] --
15,517,353 UART: [ldev] ++
15,517,928 UART: [ldev] CDI.KEYID = 6
15,518,844 UART: [ldev] SUBJECT.KEYID = 5
15,520,002 UART: [ldev] AUTHORITY.KEYID = 7
15,521,241 UART: [ldev] FE.KEYID = 1
15,532,461 UART: [ldev] Erasing FE.KEYID = 1
18,004,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,723,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,739,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,755,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,771,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,792,312 UART: [ldev] --
19,796,912 UART: [fwproc] Wait for Commands...
19,798,585 UART: [fwproc] Recv command 0x46574c44
19,800,692 UART: [fwproc] Recv'd Img size: 114448 bytes
23,194,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,265,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,333,884 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,651,359 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,696,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,457,376 >>> mbox cmd response: failed
10,457,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,458,264 >>> mbox cmd response: failed
10,458,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,458,826 >>> mbox cmd response: failed
Initializing fuses
2,057,629 writing to cptra_bootfsm_go
13,098,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,687,002 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,441,707 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,300,450 >>> mbox cmd response: failed
10,301,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,301,560 >>> mbox cmd response: failed
10,301,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,302,126 >>> mbox cmd response: failed
Initializing fuses
2,045,385 writing to cptra_bootfsm_go
5,464,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,768,209 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
3,754,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,521,528 >>> mbox cmd response: failed
10,522,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,523,155 >>> mbox cmd response: failed
10,523,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,523,717 >>> mbox cmd response: failed
Initializing fuses
2,056,306 writing to cptra_bootfsm_go
13,099,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,310,367 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,581 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,103 UART: [kat] SHA2-256
882,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,149 UART: [kat] ++
886,301 UART: [kat] sha1
890,689 UART: [kat] SHA2-256
892,627 UART: [kat] SHA2-384
895,538 UART: [kat] SHA2-512-ACC
897,439 UART: [kat] ECC-384
903,062 UART: [kat] HMAC-384Kdf
907,800 UART: [kat] LMS
1,475,996 UART: [kat] --
1,477,227 UART: [cold-reset] ++
1,477,709 UART: [fht] Storing FHT @ 0x50003400
1,480,646 UART: [idev] ++
1,480,814 UART: [idev] CDI.KEYID = 6
1,481,174 UART: [idev] SUBJECT.KEYID = 7
1,481,598 UART: [idev] UDS.KEYID = 0
1,481,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,312 UART: [idev] Erasing UDS.KEYID = 0
1,506,302 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,916 UART: [idev] --
1,515,847 UART: [ldev] ++
1,516,015 UART: [ldev] CDI.KEYID = 6
1,516,378 UART: [ldev] SUBJECT.KEYID = 5
1,516,804 UART: [ldev] AUTHORITY.KEYID = 7
1,517,267 UART: [ldev] FE.KEYID = 1
1,522,597 UART: [ldev] Erasing FE.KEYID = 1
1,548,136 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,408 UART: [ldev] --
1,587,873 UART: [fwproc] Waiting for Commands...
1,588,566 UART: [fwproc] Received command 0x46574c44
1,589,357 UART: [fwproc] Received Image of size 114448 bytes
1,608,497 UART: ROM Fatal Error: 0x000B0001
1,609,654 >>> mbox cmd response: failed
1,609,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,660 >>> mbox cmd response: failed
1,609,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,459 UART: [kat] SHA2-256
892,397 UART: [kat] SHA2-384
895,070 UART: [kat] SHA2-512-ACC
896,971 UART: [kat] ECC-384
902,666 UART: [kat] HMAC-384Kdf
907,284 UART: [kat] LMS
1,475,480 UART: [kat] --
1,476,131 UART: [cold-reset] ++
1,476,709 UART: [fht] Storing FHT @ 0x50003400
1,479,434 UART: [idev] ++
1,479,602 UART: [idev] CDI.KEYID = 6
1,479,962 UART: [idev] SUBJECT.KEYID = 7
1,480,386 UART: [idev] UDS.KEYID = 0
1,480,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,332 UART: [idev] Erasing UDS.KEYID = 0
1,504,712 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,396 UART: [idev] --
1,514,431 UART: [ldev] ++
1,514,599 UART: [ldev] CDI.KEYID = 6
1,514,962 UART: [ldev] SUBJECT.KEYID = 5
1,515,388 UART: [ldev] AUTHORITY.KEYID = 7
1,515,851 UART: [ldev] FE.KEYID = 1
1,520,871 UART: [ldev] Erasing FE.KEYID = 1
1,545,964 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,146 UART: [ldev] --
1,585,587 UART: [fwproc] Waiting for Commands...
1,586,202 UART: [fwproc] Received command 0x46574c44
1,586,993 UART: [fwproc] Received Image of size 114448 bytes
2,886,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,561 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,913 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,944 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,460,615 >>> mbox cmd response: failed
1,460,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,621 >>> mbox cmd response: failed
1,460,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,860 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,426 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,058 UART: [kat] SHA2-256
881,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,104 UART: [kat] ++
886,256 UART: [kat] sha1
890,490 UART: [kat] SHA2-256
892,428 UART: [kat] SHA2-384
895,163 UART: [kat] SHA2-512-ACC
897,064 UART: [kat] ECC-384
902,845 UART: [kat] HMAC-384Kdf
907,423 UART: [kat] LMS
1,475,619 UART: [kat] --
1,476,512 UART: [cold-reset] ++
1,477,040 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,965 UART: [idev] Erasing UDS.KEYID = 0
1,506,005 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,691 UART: [idev] --
1,515,778 UART: [ldev] ++
1,515,946 UART: [ldev] CDI.KEYID = 6
1,516,309 UART: [ldev] SUBJECT.KEYID = 5
1,516,735 UART: [ldev] AUTHORITY.KEYID = 7
1,517,198 UART: [ldev] FE.KEYID = 1
1,522,256 UART: [ldev] Erasing FE.KEYID = 1
1,547,421 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,291 UART: [ldev] --
1,586,556 UART: [fwproc] Waiting for Commands...
1,587,311 UART: [fwproc] Received command 0x46574c44
1,588,102 UART: [fwproc] Received Image of size 114448 bytes
1,607,544 UART: ROM Fatal Error: 0x000B0001
1,608,701 >>> mbox cmd response: failed
1,608,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,707 >>> mbox cmd response: failed
1,608,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,628 UART: [kat] SHA2-256
882,559 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,674 UART: [kat] ++
886,826 UART: [kat] sha1
891,242 UART: [kat] SHA2-256
893,180 UART: [kat] SHA2-384
895,851 UART: [kat] SHA2-512-ACC
897,752 UART: [kat] ECC-384
903,629 UART: [kat] HMAC-384Kdf
908,431 UART: [kat] LMS
1,476,627 UART: [kat] --
1,477,396 UART: [cold-reset] ++
1,477,916 UART: [fht] Storing FHT @ 0x50003400
1,480,477 UART: [idev] ++
1,480,645 UART: [idev] CDI.KEYID = 6
1,481,005 UART: [idev] SUBJECT.KEYID = 7
1,481,429 UART: [idev] UDS.KEYID = 0
1,481,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,667 UART: [idev] Erasing UDS.KEYID = 0
1,506,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,541 UART: [idev] --
1,516,510 UART: [ldev] ++
1,516,678 UART: [ldev] CDI.KEYID = 6
1,517,041 UART: [ldev] SUBJECT.KEYID = 5
1,517,467 UART: [ldev] AUTHORITY.KEYID = 7
1,517,930 UART: [ldev] FE.KEYID = 1
1,523,538 UART: [ldev] Erasing FE.KEYID = 1
1,549,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,517 UART: [ldev] --
1,587,962 UART: [fwproc] Waiting for Commands...
1,588,823 UART: [fwproc] Received command 0x46574c44
1,589,614 UART: [fwproc] Received Image of size 114448 bytes
2,888,132 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,341 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,459,932 >>> mbox cmd response: failed
1,459,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,938 >>> mbox cmd response: failed
1,459,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,944 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,293 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
892,970 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,095 UART: [kat] ++
897,247 UART: [kat] sha1
901,331 UART: [kat] SHA2-256
903,271 UART: [kat] SHA2-384
906,022 UART: [kat] SHA2-512-ACC
907,923 UART: [kat] ECC-384
917,708 UART: [kat] HMAC-384Kdf
922,318 UART: [kat] LMS
1,170,646 UART: [kat] --
1,171,413 UART: [cold-reset] ++
1,171,913 UART: [fht] FHT @ 0x50003400
1,174,648 UART: [idev] ++
1,174,816 UART: [idev] CDI.KEYID = 6
1,175,176 UART: [idev] SUBJECT.KEYID = 7
1,175,600 UART: [idev] UDS.KEYID = 0
1,175,945 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,076 UART: [idev] Erasing UDS.KEYID = 0
1,201,329 UART: [idev] Sha1 KeyId Algorithm
1,209,827 UART: [idev] --
1,210,839 UART: [ldev] ++
1,211,007 UART: [ldev] CDI.KEYID = 6
1,211,370 UART: [ldev] SUBJECT.KEYID = 5
1,211,796 UART: [ldev] AUTHORITY.KEYID = 7
1,212,259 UART: [ldev] FE.KEYID = 1
1,217,255 UART: [ldev] Erasing FE.KEYID = 1
1,243,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,995 UART: [ldev] --
1,283,372 UART: [fwproc] Wait for Commands...
1,283,942 UART: [fwproc] Recv command 0x46574c44
1,284,670 UART: [fwproc] Recv'd Img size: 114448 bytes
1,304,140 UART: ROM Fatal Error: 0x000B0001
1,305,297 >>> mbox cmd response: failed
1,305,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,303 >>> mbox cmd response: failed
1,305,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,674 UART: [state] LifecycleState = Unprovisioned
85,329 UART: [state] DebugLocked = No
85,865 UART: [state] WD Timer not started. Device not locked for debugging
87,182 UART: [kat] SHA2-256
892,832 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,957 UART: [kat] ++
897,109 UART: [kat] sha1
901,313 UART: [kat] SHA2-256
903,253 UART: [kat] SHA2-384
905,922 UART: [kat] SHA2-512-ACC
907,823 UART: [kat] ECC-384
917,446 UART: [kat] HMAC-384Kdf
922,100 UART: [kat] LMS
1,170,428 UART: [kat] --
1,171,357 UART: [cold-reset] ++
1,171,747 UART: [fht] FHT @ 0x50003400
1,174,374 UART: [idev] ++
1,174,542 UART: [idev] CDI.KEYID = 6
1,174,902 UART: [idev] SUBJECT.KEYID = 7
1,175,326 UART: [idev] UDS.KEYID = 0
1,175,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,884 UART: [idev] Erasing UDS.KEYID = 0
1,199,911 UART: [idev] Sha1 KeyId Algorithm
1,208,577 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,118 UART: [ldev] SUBJECT.KEYID = 5
1,210,544 UART: [ldev] AUTHORITY.KEYID = 7
1,211,007 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,242,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,351 UART: [ldev] --
1,281,786 UART: [fwproc] Wait for Commands...
1,282,356 UART: [fwproc] Recv command 0x46574c44
1,283,084 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,229 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,880 >>> mbox cmd response: failed
1,159,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,886 >>> mbox cmd response: failed
1,159,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,892 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,274 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
901,916 UART: [kat] SHA2-256
903,856 UART: [kat] SHA2-384
906,611 UART: [kat] SHA2-512-ACC
908,512 UART: [kat] ECC-384
917,773 UART: [kat] HMAC-384Kdf
922,501 UART: [kat] LMS
1,170,829 UART: [kat] --
1,171,824 UART: [cold-reset] ++
1,172,172 UART: [fht] FHT @ 0x50003400
1,174,817 UART: [idev] ++
1,174,985 UART: [idev] CDI.KEYID = 6
1,175,345 UART: [idev] SUBJECT.KEYID = 7
1,175,769 UART: [idev] UDS.KEYID = 0
1,176,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,739 UART: [idev] Erasing UDS.KEYID = 0
1,201,010 UART: [idev] Sha1 KeyId Algorithm
1,209,356 UART: [idev] --
1,210,460 UART: [ldev] ++
1,210,628 UART: [ldev] CDI.KEYID = 6
1,210,991 UART: [ldev] SUBJECT.KEYID = 5
1,211,417 UART: [ldev] AUTHORITY.KEYID = 7
1,211,880 UART: [ldev] FE.KEYID = 1
1,217,370 UART: [ldev] Erasing FE.KEYID = 1
1,243,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,094 UART: [ldev] --
1,283,527 UART: [fwproc] Wait for Commands...
1,284,123 UART: [fwproc] Recv command 0x46574c44
1,284,851 UART: [fwproc] Recv'd Img size: 114448 bytes
1,304,023 UART: ROM Fatal Error: 0x000B0001
1,305,180 >>> mbox cmd response: failed
1,305,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,186 >>> mbox cmd response: failed
1,305,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,192 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
893,845 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,970 UART: [kat] ++
898,122 UART: [kat] sha1
902,398 UART: [kat] SHA2-256
904,338 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,359 UART: [kat] HMAC-384Kdf
923,061 UART: [kat] LMS
1,171,389 UART: [kat] --
1,172,608 UART: [cold-reset] ++
1,173,056 UART: [fht] FHT @ 0x50003400
1,175,733 UART: [idev] ++
1,175,901 UART: [idev] CDI.KEYID = 6
1,176,261 UART: [idev] SUBJECT.KEYID = 7
1,176,685 UART: [idev] UDS.KEYID = 0
1,177,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,445 UART: [idev] Erasing UDS.KEYID = 0
1,201,262 UART: [idev] Sha1 KeyId Algorithm
1,209,878 UART: [idev] --
1,210,806 UART: [ldev] ++
1,210,974 UART: [ldev] CDI.KEYID = 6
1,211,337 UART: [ldev] SUBJECT.KEYID = 5
1,211,763 UART: [ldev] AUTHORITY.KEYID = 7
1,212,226 UART: [ldev] FE.KEYID = 1
1,217,498 UART: [ldev] Erasing FE.KEYID = 1
1,243,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,820 UART: [ldev] --
1,283,187 UART: [fwproc] Wait for Commands...
1,283,825 UART: [fwproc] Recv command 0x46574c44
1,284,553 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,137 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,062 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,248 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,159 >>> mbox cmd response: failed
1,159,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,165 >>> mbox cmd response: failed
1,159,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,106 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,505 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
915,836 UART: [kat] HMAC-384Kdf
920,242 UART: [kat] LMS
1,168,554 UART: [kat] --
1,169,571 UART: [cold-reset] ++
1,169,917 UART: [fht] FHT @ 0x50003400
1,172,593 UART: [idev] ++
1,172,761 UART: [idev] CDI.KEYID = 6
1,173,122 UART: [idev] SUBJECT.KEYID = 7
1,173,547 UART: [idev] UDS.KEYID = 0
1,173,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,305 UART: [idev] Erasing UDS.KEYID = 0
1,198,197 UART: [idev] Sha1 KeyId Algorithm
1,206,983 UART: [idev] --
1,208,052 UART: [ldev] ++
1,208,220 UART: [ldev] CDI.KEYID = 6
1,208,584 UART: [ldev] SUBJECT.KEYID = 5
1,209,011 UART: [ldev] AUTHORITY.KEYID = 7
1,209,474 UART: [ldev] FE.KEYID = 1
1,214,482 UART: [ldev] Erasing FE.KEYID = 1
1,240,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,656 UART: [ldev] --
1,280,008 UART: [fwproc] Wait for Commands...
1,280,729 UART: [fwproc] Recv command 0x46574c44
1,281,462 UART: [fwproc] Recv'd Img size: 114448 bytes
1,300,853 UART: ROM Fatal Error: 0x000B0001
1,302,010 >>> mbox cmd response: failed
1,302,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,016 >>> mbox cmd response: failed
1,302,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,484 UART: [kat] HMAC-384Kdf
921,096 UART: [kat] LMS
1,169,408 UART: [kat] --
1,170,475 UART: [cold-reset] ++
1,170,875 UART: [fht] FHT @ 0x50003400
1,173,451 UART: [idev] ++
1,173,619 UART: [idev] CDI.KEYID = 6
1,173,980 UART: [idev] SUBJECT.KEYID = 7
1,174,405 UART: [idev] UDS.KEYID = 0
1,174,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,465 UART: [idev] Erasing UDS.KEYID = 0
1,199,499 UART: [idev] Sha1 KeyId Algorithm
1,208,575 UART: [idev] --
1,209,708 UART: [ldev] ++
1,209,876 UART: [ldev] CDI.KEYID = 6
1,210,240 UART: [ldev] SUBJECT.KEYID = 5
1,210,667 UART: [ldev] AUTHORITY.KEYID = 7
1,211,130 UART: [ldev] FE.KEYID = 1
1,216,340 UART: [ldev] Erasing FE.KEYID = 1
1,242,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,536 UART: [ldev] --
1,281,892 UART: [fwproc] Wait for Commands...
1,282,617 UART: [fwproc] Recv command 0x46574c44
1,283,350 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,973 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,055 >>> mbox cmd response: failed
1,155,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,061 >>> mbox cmd response: failed
1,155,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,067 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,537 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,311 UART: [kat] SHA2-256
891,861 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,990 UART: [kat] ++
896,142 UART: [kat] sha1
900,584 UART: [kat] SHA2-256
902,524 UART: [kat] SHA2-384
905,145 UART: [kat] SHA2-512-ACC
907,046 UART: [kat] ECC-384
917,203 UART: [kat] HMAC-384Kdf
921,829 UART: [kat] LMS
1,170,141 UART: [kat] --
1,171,030 UART: [cold-reset] ++
1,171,364 UART: [fht] FHT @ 0x50003400
1,173,992 UART: [idev] ++
1,174,160 UART: [idev] CDI.KEYID = 6
1,174,521 UART: [idev] SUBJECT.KEYID = 7
1,174,946 UART: [idev] UDS.KEYID = 0
1,175,292 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,108 UART: [idev] Erasing UDS.KEYID = 0
1,200,538 UART: [idev] Sha1 KeyId Algorithm
1,209,468 UART: [idev] --
1,210,469 UART: [ldev] ++
1,210,637 UART: [ldev] CDI.KEYID = 6
1,211,001 UART: [ldev] SUBJECT.KEYID = 5
1,211,428 UART: [ldev] AUTHORITY.KEYID = 7
1,211,891 UART: [ldev] FE.KEYID = 1
1,217,477 UART: [ldev] Erasing FE.KEYID = 1
1,244,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,437 UART: [ldev] --
1,283,857 UART: [fwproc] Wait for Commands...
1,284,616 UART: [fwproc] Recv command 0x46574c44
1,285,349 UART: [fwproc] Recv'd Img size: 114448 bytes
1,304,500 UART: ROM Fatal Error: 0x000B0001
1,305,657 >>> mbox cmd response: failed
1,305,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,663 >>> mbox cmd response: failed
1,305,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,341 UART: [kat] SHA2-256
891,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,020 UART: [kat] ++
896,172 UART: [kat] sha1
900,296 UART: [kat] SHA2-256
902,236 UART: [kat] SHA2-384
905,093 UART: [kat] SHA2-512-ACC
906,994 UART: [kat] ECC-384
916,761 UART: [kat] HMAC-384Kdf
921,459 UART: [kat] LMS
1,169,771 UART: [kat] --
1,170,612 UART: [cold-reset] ++
1,171,104 UART: [fht] FHT @ 0x50003400
1,173,724 UART: [idev] ++
1,173,892 UART: [idev] CDI.KEYID = 6
1,174,253 UART: [idev] SUBJECT.KEYID = 7
1,174,678 UART: [idev] UDS.KEYID = 0
1,175,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,590 UART: [idev] Erasing UDS.KEYID = 0
1,199,992 UART: [idev] Sha1 KeyId Algorithm
1,208,738 UART: [idev] --
1,209,845 UART: [ldev] ++
1,210,013 UART: [ldev] CDI.KEYID = 6
1,210,377 UART: [ldev] SUBJECT.KEYID = 5
1,210,804 UART: [ldev] AUTHORITY.KEYID = 7
1,211,267 UART: [ldev] FE.KEYID = 1
1,216,673 UART: [ldev] Erasing FE.KEYID = 1
1,243,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,963 UART: [ldev] --
1,282,367 UART: [fwproc] Wait for Commands...
1,283,150 UART: [fwproc] Recv command 0x46574c44
1,283,883 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,569 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,788 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,933 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,376 >>> mbox cmd response: failed
1,155,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,382 >>> mbox cmd response: failed
1,155,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,976 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
192,286 UART:
192,640 UART: Running Caliptra ROM ...
193,829 UART:
193,976 UART: [state] CFI Enabled
263,194 UART: [state] LifecycleState = Unprovisioned
265,118 UART: [state] DebugLocked = No
267,313 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,188 UART: [kat] SHA2-256
441,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,407 UART: [kat] ++
452,896 UART: [kat] sha1
463,398 UART: [kat] SHA2-256
466,080 UART: [kat] SHA2-384
472,116 UART: [kat] SHA2-512-ACC
474,453 UART: [kat] ECC-384
2,765,737 UART: [kat] HMAC-384Kdf
2,797,305 UART: [kat] LMS
3,987,605 UART: [kat] --
3,993,147 UART: [cold-reset] ++
3,995,680 UART: [fht] Storing FHT @ 0x50003400
4,008,604 UART: [idev] ++
4,009,187 UART: [idev] CDI.KEYID = 6
4,010,116 UART: [idev] SUBJECT.KEYID = 7
4,011,338 UART: [idev] UDS.KEYID = 0
4,014,347 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,138 UART: [idev] Erasing UDS.KEYID = 0
7,345,204 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,897 UART: [idev] --
7,371,615 UART: [ldev] ++
7,372,191 UART: [ldev] CDI.KEYID = 6
7,373,209 UART: [ldev] SUBJECT.KEYID = 5
7,374,368 UART: [ldev] AUTHORITY.KEYID = 7
7,375,656 UART: [ldev] FE.KEYID = 1
7,420,017 UART: [ldev] Erasing FE.KEYID = 1
10,750,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,435 UART: [ldev] --
13,111,893 UART: [fwproc] Waiting for Commands...
13,115,089 UART: [fwproc] Received command 0x46574c44
13,117,433 UART: [fwproc] Received Image of size 114124 bytes
13,171,184 UART: ROM Fatal Error: 0x000B0002
13,174,716 >>> mbox cmd response: failed
13,175,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,175,366 >>> mbox cmd response: failed
13,175,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,176,002 >>> mbox cmd response: failed
Initializing fuses
2,050,962 writing to cptra_bootfsm_go
2,240,238 UART:
2,240,581 UART: Running Caliptra ROM ...
2,241,626 UART:
2,241,801 UART: [state] CFI Enabled
2,316,201 UART: [state] LifecycleState = Unprovisioned
2,318,144 UART: [state] DebugLocked = No
2,320,154 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,736 UART: [kat] SHA2-256
2,494,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,934 UART: [kat] ++
2,505,400 UART: [kat] sha1
2,516,345 UART: [kat] SHA2-256
2,519,038 UART: [kat] SHA2-384
2,525,418 UART: [kat] SHA2-512-ACC
2,527,778 UART: [kat] ECC-384
4,821,017 UART: [kat] HMAC-384Kdf
4,852,580 UART: [kat] LMS
6,042,866 UART: [kat] --
6,049,246 UART: [cold-reset] ++
6,051,804 UART: [fht] Storing FHT @ 0x50003400
6,062,865 UART: [idev] ++
6,063,432 UART: [idev] CDI.KEYID = 6
6,064,402 UART: [idev] SUBJECT.KEYID = 7
6,065,619 UART: [idev] UDS.KEYID = 0
6,068,197 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,211,886 UART: [idev] Erasing UDS.KEYID = 0
9,398,448 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,236 UART: [idev] --
9,424,790 UART: [ldev] ++
9,425,369 UART: [ldev] CDI.KEYID = 6
9,426,339 UART: [ldev] SUBJECT.KEYID = 5
9,427,540 UART: [ldev] AUTHORITY.KEYID = 7
9,428,777 UART: [ldev] FE.KEYID = 1
9,474,309 UART: [ldev] Erasing FE.KEYID = 1
12,808,000 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,122,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,136,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,151,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,166,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,184,880 UART: [ldev] --
15,190,039 UART: [fwproc] Waiting for Commands...
15,192,680 UART: [fwproc] Received command 0x46574c44
15,194,867 UART: [fwproc] Received Image of size 114124 bytes
19,246,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,323,795 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,392,719 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,710,009 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,785,368 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,898,631 >>> mbox cmd response: failed
12,899,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,899,522 >>> mbox cmd response: failed
12,899,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,900,086 >>> mbox cmd response: failed
Initializing fuses
2,047,864 writing to cptra_bootfsm_go
5,818,973 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,906,062 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,553 UART:
192,907 UART: Running Caliptra ROM ...
194,039 UART:
603,971 UART: [state] CFI Enabled
619,687 UART: [state] LifecycleState = Unprovisioned
621,562 UART: [state] DebugLocked = No
623,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,601 UART: [kat] SHA2-256
797,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,932 UART: [kat] ++
808,464 UART: [kat] sha1
819,993 UART: [kat] SHA2-256
822,679 UART: [kat] SHA2-384
828,043 UART: [kat] SHA2-512-ACC
830,381 UART: [kat] ECC-384
3,113,405 UART: [kat] HMAC-384Kdf
3,124,011 UART: [kat] LMS
4,314,093 UART: [kat] --
4,319,076 UART: [cold-reset] ++
4,320,317 UART: [fht] Storing FHT @ 0x50003400
4,332,717 UART: [idev] ++
4,333,285 UART: [idev] CDI.KEYID = 6
4,334,254 UART: [idev] SUBJECT.KEYID = 7
4,335,410 UART: [idev] UDS.KEYID = 0
4,338,084 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,537 UART: [idev] Erasing UDS.KEYID = 0
7,621,839 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,073 UART: [idev] --
7,647,141 UART: [ldev] ++
7,647,718 UART: [ldev] CDI.KEYID = 6
7,648,758 UART: [ldev] SUBJECT.KEYID = 5
7,649,920 UART: [ldev] AUTHORITY.KEYID = 7
7,651,149 UART: [ldev] FE.KEYID = 1
7,660,713 UART: [ldev] Erasing FE.KEYID = 1
10,950,845 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,166 UART: [ldev] --
13,310,031 UART: [fwproc] Waiting for Commands...
13,313,220 UART: [fwproc] Received command 0x46574c44
13,315,405 UART: [fwproc] Received Image of size 114124 bytes
13,372,796 UART: ROM Fatal Error: 0x000B0002
13,376,345 >>> mbox cmd response: failed
13,376,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,377,071 >>> mbox cmd response: failed
13,377,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,377,633 >>> mbox cmd response: failed
Initializing fuses
2,049,840 writing to cptra_bootfsm_go
2,239,128 UART:
2,239,478 UART: Running Caliptra ROM ...
2,240,582 UART:
7,091,987 UART: [state] CFI Enabled
7,106,029 UART: [state] LifecycleState = Unprovisioned
7,107,941 UART: [state] DebugLocked = No
7,110,246 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,114,723 UART: [kat] SHA2-256
7,284,476 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,295,037 UART: [kat] ++
7,295,593 UART: [kat] sha1
7,307,680 UART: [kat] SHA2-256
7,310,379 UART: [kat] SHA2-384
7,315,718 UART: [kat] SHA2-512-ACC
7,318,124 UART: [kat] ECC-384
9,603,412 UART: [kat] HMAC-384Kdf
9,615,020 UART: [kat] LMS
10,805,123 UART: [kat] --
10,808,259 UART: [cold-reset] ++
10,810,267 UART: [fht] Storing FHT @ 0x50003400
10,821,427 UART: [idev] ++
10,822,044 UART: [idev] CDI.KEYID = 6
10,822,958 UART: [idev] SUBJECT.KEYID = 7
10,824,226 UART: [idev] UDS.KEYID = 0
10,826,472 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,969,881 UART: [idev] Erasing UDS.KEYID = 0
14,110,622 UART: [idev] Using Sha1 for KeyId Algorithm
14,133,675 UART: [idev] --
14,136,640 UART: [ldev] ++
14,137,214 UART: [ldev] CDI.KEYID = 6
14,138,231 UART: [ldev] SUBJECT.KEYID = 5
14,139,426 UART: [ldev] AUTHORITY.KEYID = 7
14,140,661 UART: [ldev] FE.KEYID = 1
14,153,392 UART: [ldev] Erasing FE.KEYID = 1
17,440,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,735,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,750,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,764,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,779,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,798,287 UART: [ldev] --
19,803,201 UART: [fwproc] Waiting for Commands...
19,806,547 UART: [fwproc] Received command 0x46574c44
19,808,734 UART: [fwproc] Received Image of size 114124 bytes
23,858,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,930,321 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,999,242 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,315,655 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,476 writing to cptra_bootfsm_go
4,129,749 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,110,011 >>> mbox cmd response: failed
13,110,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,110,957 >>> mbox cmd response: failed
13,111,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,111,527 >>> mbox cmd response: failed
Initializing fuses
2,053,815 writing to cptra_bootfsm_go
10,884,217 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,830,059 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,114 UART:
192,623 UART: Running Caliptra ROM ...
193,706 UART:
193,846 UART: [state] CFI Enabled
261,678 UART: [state] LifecycleState = Unprovisioned
263,508 UART: [state] DebugLocked = No
266,365 UART: [state] WD Timer not started. Device not locked for debugging
269,752 UART: [kat] SHA2-256
448,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,459 UART: [kat] ++
460,994 UART: [kat] sha1
472,795 UART: [kat] SHA2-256
475,857 UART: [kat] SHA2-384
481,294 UART: [kat] SHA2-512-ACC
484,225 UART: [kat] ECC-384
2,944,382 UART: [kat] HMAC-384Kdf
2,967,511 UART: [kat] LMS
3,497,005 UART: [kat] --
3,503,034 UART: [cold-reset] ++
3,503,993 UART: [fht] FHT @ 0x50003400
3,515,297 UART: [idev] ++
3,515,859 UART: [idev] CDI.KEYID = 6
3,516,787 UART: [idev] SUBJECT.KEYID = 7
3,517,893 UART: [idev] UDS.KEYID = 0
3,520,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,175 UART: [idev] Erasing UDS.KEYID = 0
6,023,415 UART: [idev] Sha1 KeyId Algorithm
6,045,614 UART: [idev] --
6,049,048 UART: [ldev] ++
6,049,630 UART: [ldev] CDI.KEYID = 6
6,050,523 UART: [ldev] SUBJECT.KEYID = 5
6,051,686 UART: [ldev] AUTHORITY.KEYID = 7
6,052,995 UART: [ldev] FE.KEYID = 1
6,096,242 UART: [ldev] Erasing FE.KEYID = 1
8,600,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,577 UART: [ldev] --
10,406,756 UART: [fwproc] Wait for Commands...
10,409,548 UART: [fwproc] Recv command 0x46574c44
10,411,643 UART: [fwproc] Recv'd Img size: 114448 bytes
10,465,429 UART: ROM Fatal Error: 0x000B0002
10,468,511 >>> mbox cmd response: failed
10,468,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,469,174 >>> mbox cmd response: failed
10,469,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,469,748 >>> mbox cmd response: failed
Initializing fuses
2,050,704 writing to cptra_bootfsm_go
2,239,978 UART:
2,240,324 UART: Running Caliptra ROM ...
2,241,371 UART:
2,241,523 UART: [state] CFI Enabled
2,312,558 UART: [state] LifecycleState = Unprovisioned
2,314,434 UART: [state] DebugLocked = No
2,315,796 UART: [state] WD Timer not started. Device not locked for debugging
2,319,865 UART: [kat] SHA2-256
2,499,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,543 UART: [kat] ++
2,511,107 UART: [kat] sha1
2,521,837 UART: [kat] SHA2-256
2,524,842 UART: [kat] SHA2-384
2,531,276 UART: [kat] SHA2-512-ACC
2,534,223 UART: [kat] ECC-384
4,997,418 UART: [kat] HMAC-384Kdf
5,018,594 UART: [kat] LMS
5,548,034 UART: [kat] --
5,551,814 UART: [cold-reset] ++
5,552,935 UART: [fht] FHT @ 0x50003400
5,564,082 UART: [idev] ++
5,564,688 UART: [idev] CDI.KEYID = 6
5,565,617 UART: [idev] SUBJECT.KEYID = 7
5,566,776 UART: [idev] UDS.KEYID = 0
5,569,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,713,366 UART: [idev] Erasing UDS.KEYID = 0
8,075,066 UART: [idev] Sha1 KeyId Algorithm
8,097,919 UART: [idev] --
8,103,163 UART: [ldev] ++
8,103,741 UART: [ldev] CDI.KEYID = 6
8,104,625 UART: [ldev] SUBJECT.KEYID = 5
8,105,837 UART: [ldev] AUTHORITY.KEYID = 7
8,107,064 UART: [ldev] FE.KEYID = 1
8,146,834 UART: [ldev] Erasing FE.KEYID = 1
10,647,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,366,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,382,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,398,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,414,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,435,771 UART: [ldev] --
12,441,092 UART: [fwproc] Wait for Commands...
12,444,248 UART: [fwproc] Recv command 0x46574c44
12,446,380 UART: [fwproc] Recv'd Img size: 114448 bytes
15,840,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,917,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,986,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,305,689 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,385,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,256,786 >>> mbox cmd response: failed
10,257,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,257,701 >>> mbox cmd response: failed
10,257,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,258,290 >>> mbox cmd response: failed
Initializing fuses
2,046,334 writing to cptra_bootfsm_go
5,392,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,071,249 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,396 UART:
192,773 UART: Running Caliptra ROM ...
193,858 UART:
603,499 UART: [state] CFI Enabled
618,360 UART: [state] LifecycleState = Unprovisioned
620,207 UART: [state] DebugLocked = No
621,829 UART: [state] WD Timer not started. Device not locked for debugging
626,292 UART: [kat] SHA2-256
805,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,985 UART: [kat] ++
817,438 UART: [kat] sha1
829,393 UART: [kat] SHA2-256
832,429 UART: [kat] SHA2-384
838,628 UART: [kat] SHA2-512-ACC
841,617 UART: [kat] ECC-384
3,283,571 UART: [kat] HMAC-384Kdf
3,297,336 UART: [kat] LMS
3,826,797 UART: [kat] --
3,830,948 UART: [cold-reset] ++
3,833,364 UART: [fht] FHT @ 0x50003400
3,845,209 UART: [idev] ++
3,845,779 UART: [idev] CDI.KEYID = 6
3,847,038 UART: [idev] SUBJECT.KEYID = 7
3,848,157 UART: [idev] UDS.KEYID = 0
3,850,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,994,707 UART: [idev] Erasing UDS.KEYID = 0
6,316,941 UART: [idev] Sha1 KeyId Algorithm
6,339,399 UART: [idev] --
6,342,972 UART: [ldev] ++
6,343,559 UART: [ldev] CDI.KEYID = 6
6,344,477 UART: [ldev] SUBJECT.KEYID = 5
6,345,641 UART: [ldev] AUTHORITY.KEYID = 7
6,346,933 UART: [ldev] FE.KEYID = 1
6,357,310 UART: [ldev] Erasing FE.KEYID = 1
8,834,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,112 UART: [ldev] --
10,626,431 UART: [fwproc] Wait for Commands...
10,629,227 UART: [fwproc] Recv command 0x46574c44
10,631,326 UART: [fwproc] Recv'd Img size: 114448 bytes
10,683,550 UART: ROM Fatal Error: 0x000B0002
10,686,658 >>> mbox cmd response: failed
10,687,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,687,462 >>> mbox cmd response: failed
10,687,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,688,016 >>> mbox cmd response: failed
Initializing fuses
2,050,899 writing to cptra_bootfsm_go
2,240,181 UART:
2,240,550 UART: Running Caliptra ROM ...
2,241,597 UART:
9,769,979 UART: [state] CFI Enabled
9,781,401 UART: [state] LifecycleState = Unprovisioned
9,783,265 UART: [state] DebugLocked = No
9,785,108 UART: [state] WD Timer not started. Device not locked for debugging
9,787,990 UART: [kat] SHA2-256
9,967,107 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,978,654 UART: [kat] ++
9,979,196 UART: [kat] sha1
9,990,683 UART: [kat] SHA2-256
9,993,750 UART: [kat] SHA2-384
9,999,906 UART: [kat] SHA2-512-ACC
10,002,848 UART: [kat] ECC-384
12,443,494 UART: [kat] HMAC-384Kdf
12,457,017 UART: [kat] LMS
12,986,512 UART: [kat] --
12,991,743 UART: [cold-reset] ++
12,993,185 UART: [fht] FHT @ 0x50003400
13,004,699 UART: [idev] ++
13,005,307 UART: [idev] CDI.KEYID = 6
13,006,220 UART: [idev] SUBJECT.KEYID = 7
13,007,381 UART: [idev] UDS.KEYID = 0
13,010,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,153,955 UART: [idev] Erasing UDS.KEYID = 0
15,479,028 UART: [idev] Sha1 KeyId Algorithm
15,501,671 UART: [idev] --
15,505,604 UART: [ldev] ++
15,506,173 UART: [ldev] CDI.KEYID = 6
15,507,079 UART: [ldev] SUBJECT.KEYID = 5
15,508,297 UART: [ldev] AUTHORITY.KEYID = 7
15,509,534 UART: [ldev] FE.KEYID = 1
15,518,668 UART: [ldev] Erasing FE.KEYID = 1
17,990,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,707,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,723,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,739,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,755,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,774,907 UART: [ldev] --
19,779,849 UART: [fwproc] Wait for Commands...
19,782,968 UART: [fwproc] Recv command 0x46574c44
19,785,072 UART: [fwproc] Recv'd Img size: 114448 bytes
23,182,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,253,026 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,321,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,640,502 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,692,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,463,809 >>> mbox cmd response: failed
10,464,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,464,735 >>> mbox cmd response: failed
10,464,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,465,296 >>> mbox cmd response: failed
Initializing fuses
2,049,411 writing to cptra_bootfsm_go
13,106,386 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,688,675 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,439,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,302,462 >>> mbox cmd response: failed
10,303,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,303,518 >>> mbox cmd response: failed
10,303,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,304,076 >>> mbox cmd response: failed
Initializing fuses
2,046,192 writing to cptra_bootfsm_go
5,467,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,774,981 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,757,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,521,478 >>> mbox cmd response: failed
10,522,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,522,366 >>> mbox cmd response: failed
10,522,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,522,931 >>> mbox cmd response: failed
Initializing fuses
2,048,115 writing to cptra_bootfsm_go
13,101,331 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,298,155 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,749 UART: [kat] SHA2-256
881,680 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,795 UART: [kat] ++
885,947 UART: [kat] sha1
890,273 UART: [kat] SHA2-256
892,211 UART: [kat] SHA2-384
894,928 UART: [kat] SHA2-512-ACC
896,829 UART: [kat] ECC-384
902,360 UART: [kat] HMAC-384Kdf
907,074 UART: [kat] LMS
1,475,270 UART: [kat] --
1,476,241 UART: [cold-reset] ++
1,476,625 UART: [fht] Storing FHT @ 0x50003400
1,479,276 UART: [idev] ++
1,479,444 UART: [idev] CDI.KEYID = 6
1,479,804 UART: [idev] SUBJECT.KEYID = 7
1,480,228 UART: [idev] UDS.KEYID = 0
1,480,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,932 UART: [idev] Erasing UDS.KEYID = 0
1,504,146 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,590 UART: [idev] --
1,513,671 UART: [ldev] ++
1,513,839 UART: [ldev] CDI.KEYID = 6
1,514,202 UART: [ldev] SUBJECT.KEYID = 5
1,514,628 UART: [ldev] AUTHORITY.KEYID = 7
1,515,091 UART: [ldev] FE.KEYID = 1
1,520,607 UART: [ldev] Erasing FE.KEYID = 1
1,545,160 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,908 UART: [ldev] --
1,584,407 UART: [fwproc] Waiting for Commands...
1,585,094 UART: [fwproc] Received command 0x46574c44
1,585,885 UART: [fwproc] Received Image of size 114448 bytes
1,605,334 UART: ROM Fatal Error: 0x000B0002
1,606,491 >>> mbox cmd response: failed
1,606,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,606,497 >>> mbox cmd response: failed
1,606,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,606,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,075 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,633 UART: [kat] SHA2-256
881,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,679 UART: [kat] ++
885,831 UART: [kat] sha1
890,081 UART: [kat] SHA2-256
892,019 UART: [kat] SHA2-384
894,788 UART: [kat] SHA2-512-ACC
896,689 UART: [kat] ECC-384
901,968 UART: [kat] HMAC-384Kdf
906,504 UART: [kat] LMS
1,474,700 UART: [kat] --
1,475,435 UART: [cold-reset] ++
1,475,945 UART: [fht] Storing FHT @ 0x50003400
1,478,922 UART: [idev] ++
1,479,090 UART: [idev] CDI.KEYID = 6
1,479,450 UART: [idev] SUBJECT.KEYID = 7
1,479,874 UART: [idev] UDS.KEYID = 0
1,480,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,860 UART: [idev] Erasing UDS.KEYID = 0
1,504,362 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,864 UART: [idev] --
1,513,895 UART: [ldev] ++
1,514,063 UART: [ldev] CDI.KEYID = 6
1,514,426 UART: [ldev] SUBJECT.KEYID = 5
1,514,852 UART: [ldev] AUTHORITY.KEYID = 7
1,515,315 UART: [ldev] FE.KEYID = 1
1,520,309 UART: [ldev] Erasing FE.KEYID = 1
1,545,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,960 UART: [ldev] --
1,585,415 UART: [fwproc] Waiting for Commands...
1,586,034 UART: [fwproc] Received command 0x46574c44
1,586,825 UART: [fwproc] Received Image of size 114448 bytes
2,885,273 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,503 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,855 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,832 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,460,804 >>> mbox cmd response: failed
1,460,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,810 >>> mbox cmd response: failed
1,460,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,916 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,862 UART: [kat] SHA2-256
881,793 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,908 UART: [kat] ++
886,060 UART: [kat] sha1
890,308 UART: [kat] SHA2-256
892,246 UART: [kat] SHA2-384
895,023 UART: [kat] SHA2-512-ACC
896,924 UART: [kat] ECC-384
902,761 UART: [kat] HMAC-384Kdf
907,497 UART: [kat] LMS
1,475,693 UART: [kat] --
1,476,516 UART: [cold-reset] ++
1,476,926 UART: [fht] Storing FHT @ 0x50003400
1,479,913 UART: [idev] ++
1,480,081 UART: [idev] CDI.KEYID = 6
1,480,441 UART: [idev] SUBJECT.KEYID = 7
1,480,865 UART: [idev] UDS.KEYID = 0
1,481,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,741 UART: [idev] Erasing UDS.KEYID = 0
1,505,477 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,919 UART: [idev] --
1,515,020 UART: [ldev] ++
1,515,188 UART: [ldev] CDI.KEYID = 6
1,515,551 UART: [ldev] SUBJECT.KEYID = 5
1,515,977 UART: [ldev] AUTHORITY.KEYID = 7
1,516,440 UART: [ldev] FE.KEYID = 1
1,522,004 UART: [ldev] Erasing FE.KEYID = 1
1,547,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,033 UART: [ldev] --
1,586,408 UART: [fwproc] Waiting for Commands...
1,587,245 UART: [fwproc] Received command 0x46574c44
1,588,036 UART: [fwproc] Received Image of size 114448 bytes
1,607,459 UART: ROM Fatal Error: 0x000B0002
1,608,616 >>> mbox cmd response: failed
1,608,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,622 >>> mbox cmd response: failed
1,608,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,628 UART: [kat] SHA2-256
882,559 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,674 UART: [kat] ++
886,826 UART: [kat] sha1
891,056 UART: [kat] SHA2-256
892,994 UART: [kat] SHA2-384
895,819 UART: [kat] SHA2-512-ACC
897,720 UART: [kat] ECC-384
903,319 UART: [kat] HMAC-384Kdf
908,101 UART: [kat] LMS
1,476,297 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,842 UART: [fht] Storing FHT @ 0x50003400
1,480,603 UART: [idev] ++
1,480,771 UART: [idev] CDI.KEYID = 6
1,481,131 UART: [idev] SUBJECT.KEYID = 7
1,481,555 UART: [idev] UDS.KEYID = 0
1,481,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,821 UART: [idev] Erasing UDS.KEYID = 0
1,506,897 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,517 UART: [idev] --
1,516,566 UART: [ldev] ++
1,516,734 UART: [ldev] CDI.KEYID = 6
1,517,097 UART: [ldev] SUBJECT.KEYID = 5
1,517,523 UART: [ldev] AUTHORITY.KEYID = 7
1,517,986 UART: [ldev] FE.KEYID = 1
1,523,016 UART: [ldev] Erasing FE.KEYID = 1
1,548,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,987 UART: [ldev] --
1,587,466 UART: [fwproc] Waiting for Commands...
1,588,317 UART: [fwproc] Received command 0x46574c44
1,589,108 UART: [fwproc] Received Image of size 114448 bytes
2,887,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,456 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,808 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,745 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,462,299 >>> mbox cmd response: failed
1,462,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,305 >>> mbox cmd response: failed
1,462,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,899 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
893,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,301 UART: [kat] ++
897,453 UART: [kat] sha1
901,701 UART: [kat] SHA2-256
903,641 UART: [kat] SHA2-384
906,370 UART: [kat] SHA2-512-ACC
908,271 UART: [kat] ECC-384
918,370 UART: [kat] HMAC-384Kdf
922,920 UART: [kat] LMS
1,171,248 UART: [kat] --
1,172,131 UART: [cold-reset] ++
1,172,627 UART: [fht] FHT @ 0x50003400
1,175,320 UART: [idev] ++
1,175,488 UART: [idev] CDI.KEYID = 6
1,175,848 UART: [idev] SUBJECT.KEYID = 7
1,176,272 UART: [idev] UDS.KEYID = 0
1,176,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,264 UART: [idev] Erasing UDS.KEYID = 0
1,200,841 UART: [idev] Sha1 KeyId Algorithm
1,209,153 UART: [idev] --
1,210,075 UART: [ldev] ++
1,210,243 UART: [ldev] CDI.KEYID = 6
1,210,606 UART: [ldev] SUBJECT.KEYID = 5
1,211,032 UART: [ldev] AUTHORITY.KEYID = 7
1,211,495 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,242,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,139 UART: [ldev] --
1,281,474 UART: [fwproc] Wait for Commands...
1,282,178 UART: [fwproc] Recv command 0x46574c44
1,282,906 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,347 UART: ROM Fatal Error: 0x000B0002
1,303,504 >>> mbox cmd response: failed
1,303,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,510 >>> mbox cmd response: failed
1,303,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,516 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
893,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,413 UART: [kat] ++
897,565 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,548 UART: [kat] SHA2-512-ACC
908,449 UART: [kat] ECC-384
918,268 UART: [kat] HMAC-384Kdf
922,976 UART: [kat] LMS
1,171,304 UART: [kat] --
1,171,947 UART: [cold-reset] ++
1,172,297 UART: [fht] FHT @ 0x50003400
1,174,874 UART: [idev] ++
1,175,042 UART: [idev] CDI.KEYID = 6
1,175,402 UART: [idev] SUBJECT.KEYID = 7
1,175,826 UART: [idev] UDS.KEYID = 0
1,176,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,856 UART: [idev] Erasing UDS.KEYID = 0
1,201,157 UART: [idev] Sha1 KeyId Algorithm
1,209,749 UART: [idev] --
1,210,925 UART: [ldev] ++
1,211,093 UART: [ldev] CDI.KEYID = 6
1,211,456 UART: [ldev] SUBJECT.KEYID = 5
1,211,882 UART: [ldev] AUTHORITY.KEYID = 7
1,212,345 UART: [ldev] FE.KEYID = 1
1,217,353 UART: [ldev] Erasing FE.KEYID = 1
1,243,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,083 UART: [ldev] --
1,282,402 UART: [fwproc] Wait for Commands...
1,283,226 UART: [fwproc] Recv command 0x46574c44
1,283,954 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,723 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,158,293 >>> mbox cmd response: failed
1,158,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,299 >>> mbox cmd response: failed
1,158,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,305 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,320 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
906,969 UART: [kat] SHA2-512-ACC
908,870 UART: [kat] ECC-384
918,853 UART: [kat] HMAC-384Kdf
923,683 UART: [kat] LMS
1,172,011 UART: [kat] --
1,172,942 UART: [cold-reset] ++
1,173,396 UART: [fht] FHT @ 0x50003400
1,176,043 UART: [idev] ++
1,176,211 UART: [idev] CDI.KEYID = 6
1,176,571 UART: [idev] SUBJECT.KEYID = 7
1,176,995 UART: [idev] UDS.KEYID = 0
1,177,340 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,059 UART: [idev] Erasing UDS.KEYID = 0
1,202,634 UART: [idev] Sha1 KeyId Algorithm
1,210,950 UART: [idev] --
1,212,086 UART: [ldev] ++
1,212,254 UART: [ldev] CDI.KEYID = 6
1,212,617 UART: [ldev] SUBJECT.KEYID = 5
1,213,043 UART: [ldev] AUTHORITY.KEYID = 7
1,213,506 UART: [ldev] FE.KEYID = 1
1,219,060 UART: [ldev] Erasing FE.KEYID = 1
1,245,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,844 UART: [ldev] --
1,285,163 UART: [fwproc] Wait for Commands...
1,285,853 UART: [fwproc] Recv command 0x46574c44
1,286,581 UART: [fwproc] Recv'd Img size: 114448 bytes
1,305,622 UART: ROM Fatal Error: 0x000B0002
1,306,779 >>> mbox cmd response: failed
1,306,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,785 >>> mbox cmd response: failed
1,306,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
893,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,718 UART: [kat] ++
897,870 UART: [kat] sha1
902,000 UART: [kat] SHA2-256
903,940 UART: [kat] SHA2-384
906,753 UART: [kat] SHA2-512-ACC
908,654 UART: [kat] ECC-384
918,265 UART: [kat] HMAC-384Kdf
923,105 UART: [kat] LMS
1,171,433 UART: [kat] --
1,172,068 UART: [cold-reset] ++
1,172,520 UART: [fht] FHT @ 0x50003400
1,175,297 UART: [idev] ++
1,175,465 UART: [idev] CDI.KEYID = 6
1,175,825 UART: [idev] SUBJECT.KEYID = 7
1,176,249 UART: [idev] UDS.KEYID = 0
1,176,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,433 UART: [idev] Erasing UDS.KEYID = 0
1,201,042 UART: [idev] Sha1 KeyId Algorithm
1,209,716 UART: [idev] --
1,210,704 UART: [ldev] ++
1,210,872 UART: [ldev] CDI.KEYID = 6
1,211,235 UART: [ldev] SUBJECT.KEYID = 5
1,211,661 UART: [ldev] AUTHORITY.KEYID = 7
1,212,124 UART: [ldev] FE.KEYID = 1
1,217,502 UART: [ldev] Erasing FE.KEYID = 1
1,244,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,180 UART: [ldev] --
1,283,589 UART: [fwproc] Wait for Commands...
1,284,381 UART: [fwproc] Recv command 0x46574c44
1,285,109 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,639 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,914 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,796 >>> mbox cmd response: failed
1,161,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,802 >>> mbox cmd response: failed
1,161,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,993 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,584 UART: [state] LifecycleState = Unprovisioned
86,239 UART: [state] DebugLocked = No
86,925 UART: [state] WD Timer not started. Device not locked for debugging
88,068 UART: [kat] SHA2-256
891,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,747 UART: [kat] ++
895,899 UART: [kat] sha1
900,223 UART: [kat] SHA2-256
902,163 UART: [kat] SHA2-384
904,854 UART: [kat] SHA2-512-ACC
906,755 UART: [kat] ECC-384
916,350 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,435 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,174,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,307 UART: [idev] Erasing UDS.KEYID = 0
1,199,801 UART: [idev] Sha1 KeyId Algorithm
1,208,597 UART: [idev] --
1,209,796 UART: [ldev] ++
1,209,964 UART: [ldev] CDI.KEYID = 6
1,210,328 UART: [ldev] SUBJECT.KEYID = 5
1,210,755 UART: [ldev] AUTHORITY.KEYID = 7
1,211,218 UART: [ldev] FE.KEYID = 1
1,216,294 UART: [ldev] Erasing FE.KEYID = 1
1,241,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,390 UART: [ldev] --
1,280,908 UART: [fwproc] Wait for Commands...
1,281,659 UART: [fwproc] Recv command 0x46574c44
1,282,392 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,066 UART: ROM Fatal Error: 0x000B0002
1,303,223 >>> mbox cmd response: failed
1,303,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,229 >>> mbox cmd response: failed
1,303,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,235 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,264 UART: [kat] SHA2-256
890,814 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,943 UART: [kat] ++
895,095 UART: [kat] sha1
899,349 UART: [kat] SHA2-256
901,289 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
916,000 UART: [kat] HMAC-384Kdf
920,640 UART: [kat] LMS
1,168,952 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,349 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,199,125 UART: [idev] Sha1 KeyId Algorithm
1,208,049 UART: [idev] --
1,208,942 UART: [ldev] ++
1,209,110 UART: [ldev] CDI.KEYID = 6
1,209,474 UART: [ldev] SUBJECT.KEYID = 5
1,209,901 UART: [ldev] AUTHORITY.KEYID = 7
1,210,364 UART: [ldev] FE.KEYID = 1
1,215,572 UART: [ldev] Erasing FE.KEYID = 1
1,241,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,510 UART: [ldev] --
1,280,926 UART: [fwproc] Wait for Commands...
1,281,717 UART: [fwproc] Recv command 0x46574c44
1,282,450 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,023 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,578 >>> mbox cmd response: failed
1,155,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,584 >>> mbox cmd response: failed
1,155,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,109 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
87,046 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,886 UART: [kat] ++
896,038 UART: [kat] sha1
900,228 UART: [kat] SHA2-256
902,168 UART: [kat] SHA2-384
904,939 UART: [kat] SHA2-512-ACC
906,840 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,186 UART: [fht] FHT @ 0x50003400
1,172,974 UART: [idev] ++
1,173,142 UART: [idev] CDI.KEYID = 6
1,173,503 UART: [idev] SUBJECT.KEYID = 7
1,173,928 UART: [idev] UDS.KEYID = 0
1,174,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,728 UART: [idev] Erasing UDS.KEYID = 0
1,199,030 UART: [idev] Sha1 KeyId Algorithm
1,208,038 UART: [idev] --
1,209,167 UART: [ldev] ++
1,209,335 UART: [ldev] CDI.KEYID = 6
1,209,699 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,216,093 UART: [ldev] Erasing FE.KEYID = 1
1,242,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,841 UART: [ldev] --
1,282,233 UART: [fwproc] Wait for Commands...
1,282,896 UART: [fwproc] Recv command 0x46574c44
1,283,629 UART: [fwproc] Recv'd Img size: 114448 bytes
1,302,991 UART: ROM Fatal Error: 0x000B0002
1,304,148 >>> mbox cmd response: failed
1,304,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,154 >>> mbox cmd response: failed
1,304,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,892 UART: [kat] ++
896,044 UART: [kat] sha1
900,424 UART: [kat] SHA2-256
902,364 UART: [kat] SHA2-384
905,319 UART: [kat] SHA2-512-ACC
907,220 UART: [kat] ECC-384
916,809 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,560 UART: [cold-reset] ++
1,171,124 UART: [fht] FHT @ 0x50003400
1,173,856 UART: [idev] ++
1,174,024 UART: [idev] CDI.KEYID = 6
1,174,385 UART: [idev] SUBJECT.KEYID = 7
1,174,810 UART: [idev] UDS.KEYID = 0
1,175,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,630 UART: [idev] Erasing UDS.KEYID = 0
1,199,884 UART: [idev] Sha1 KeyId Algorithm
1,208,790 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,413 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,611 UART: [fwproc] Wait for Commands...
1,283,432 UART: [fwproc] Recv command 0x46574c44
1,284,165 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,400 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,374 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,091 >>> mbox cmd response: failed
1,156,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,097 >>> mbox cmd response: failed
1,156,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,632 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
192,336 UART:
192,683 UART: Running Caliptra ROM ...
193,861 UART:
194,014 UART: [state] CFI Enabled
258,366 UART: [state] LifecycleState = Unprovisioned
260,278 UART: [state] DebugLocked = No
262,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
266,541 UART: [kat] SHA2-256
436,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
446,769 UART: [kat] ++
447,306 UART: [kat] sha1
457,694 UART: [kat] SHA2-256
460,370 UART: [kat] SHA2-384
467,056 UART: [kat] SHA2-512-ACC
469,407 UART: [kat] ECC-384
2,766,616 UART: [kat] HMAC-384Kdf
2,798,039 UART: [kat] LMS
3,988,324 UART: [kat] --
3,992,825 UART: [cold-reset] ++
3,995,299 UART: [fht] Storing FHT @ 0x50003400
4,005,759 UART: [idev] ++
4,006,333 UART: [idev] CDI.KEYID = 6
4,007,304 UART: [idev] SUBJECT.KEYID = 7
4,008,526 UART: [idev] UDS.KEYID = 0
4,011,359 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,088 UART: [idev] Erasing UDS.KEYID = 0
7,341,792 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,727 UART: [idev] --
7,368,255 UART: [ldev] ++
7,368,886 UART: [ldev] CDI.KEYID = 6
7,369,807 UART: [ldev] SUBJECT.KEYID = 5
7,371,022 UART: [ldev] AUTHORITY.KEYID = 7
7,372,331 UART: [ldev] FE.KEYID = 1
7,400,432 UART: [ldev] Erasing FE.KEYID = 1
10,733,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,870 UART: [ldev] --
13,114,985 UART: [fwproc] Waiting for Commands...
13,116,657 UART: [fwproc] Received command 0x46574c44
13,118,842 UART: [fwproc] Received Image of size 114124 bytes
14,515,087 UART: ROM Fatal Error: 0x000B0019
14,518,574 >>> mbox cmd response: failed
14,518,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,519,235 >>> mbox cmd response: failed
14,519,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,519,821 >>> mbox cmd response: failed
Initializing fuses
2,065,621 writing to cptra_bootfsm_go
2,254,959 UART:
2,255,322 UART: Running Caliptra ROM ...
2,256,366 UART:
2,256,517 UART: [state] CFI Enabled
2,316,764 UART: [state] LifecycleState = Unprovisioned
2,318,714 UART: [state] DebugLocked = No
2,321,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,484 UART: [kat] SHA2-256
2,496,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,694 UART: [kat] ++
2,507,181 UART: [kat] sha1
2,517,803 UART: [kat] SHA2-256
2,520,502 UART: [kat] SHA2-384
2,526,924 UART: [kat] SHA2-512-ACC
2,529,274 UART: [kat] ECC-384
4,821,924 UART: [kat] HMAC-384Kdf
4,852,734 UART: [kat] LMS
6,043,041 UART: [kat] --
6,047,428 UART: [cold-reset] ++
6,048,662 UART: [fht] Storing FHT @ 0x50003400
6,059,880 UART: [idev] ++
6,060,454 UART: [idev] CDI.KEYID = 6
6,061,338 UART: [idev] SUBJECT.KEYID = 7
6,062,612 UART: [idev] UDS.KEYID = 0
6,065,261 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,208,946 UART: [idev] Erasing UDS.KEYID = 0
9,399,482 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,552 UART: [idev] --
9,424,549 UART: [ldev] ++
9,425,119 UART: [ldev] CDI.KEYID = 6
9,426,136 UART: [ldev] SUBJECT.KEYID = 5
9,427,332 UART: [ldev] AUTHORITY.KEYID = 7
9,428,565 UART: [ldev] FE.KEYID = 1
9,475,478 UART: [ldev] Erasing FE.KEYID = 1
12,805,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,100,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,130,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,144,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,970 UART: [ldev] --
15,169,126 UART: [fwproc] Waiting for Commands...
15,172,358 UART: [fwproc] Received command 0x46574c44
15,174,561 UART: [fwproc] Received Image of size 114124 bytes
19,234,577 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,309,869 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,378,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,695,527 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,804,995 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,277,452 >>> mbox cmd response: failed
14,278,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,278,523 >>> mbox cmd response: failed
14,278,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,279,083 >>> mbox cmd response: failed
Initializing fuses
2,056,637 writing to cptra_bootfsm_go
5,864,730 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,938,848 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
192,536 UART:
192,893 UART: Running Caliptra ROM ...
194,077 UART:
603,783 UART: [state] CFI Enabled
617,333 UART: [state] LifecycleState = Unprovisioned
619,258 UART: [state] DebugLocked = No
621,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,407 UART: [kat] SHA2-256
795,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,684 UART: [kat] ++
806,174 UART: [kat] sha1
816,836 UART: [kat] SHA2-256
819,515 UART: [kat] SHA2-384
824,638 UART: [kat] SHA2-512-ACC
827,035 UART: [kat] ECC-384
3,112,004 UART: [kat] HMAC-384Kdf
3,125,107 UART: [kat] LMS
4,315,235 UART: [kat] --
4,319,326 UART: [cold-reset] ++
4,321,882 UART: [fht] Storing FHT @ 0x50003400
4,332,511 UART: [idev] ++
4,333,078 UART: [idev] CDI.KEYID = 6
4,333,988 UART: [idev] SUBJECT.KEYID = 7
4,335,257 UART: [idev] UDS.KEYID = 0
4,337,919 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,369 UART: [idev] Erasing UDS.KEYID = 0
7,625,696 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,364 UART: [idev] --
7,652,782 UART: [ldev] ++
7,653,347 UART: [ldev] CDI.KEYID = 6
7,654,361 UART: [ldev] SUBJECT.KEYID = 5
7,655,517 UART: [ldev] AUTHORITY.KEYID = 7
7,656,749 UART: [ldev] FE.KEYID = 1
7,667,668 UART: [ldev] Erasing FE.KEYID = 1
10,960,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,408 UART: [ldev] --
13,320,627 UART: [fwproc] Waiting for Commands...
13,324,022 UART: [fwproc] Received command 0x46574c44
13,326,229 UART: [fwproc] Received Image of size 114124 bytes
14,724,982 UART: ROM Fatal Error: 0x000B0019
14,728,468 >>> mbox cmd response: failed
14,728,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,729,188 >>> mbox cmd response: failed
14,729,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,729,749 >>> mbox cmd response: failed
Initializing fuses
2,051,424 writing to cptra_bootfsm_go
2,240,734 UART:
2,241,074 UART: Running Caliptra ROM ...
2,242,213 UART:
5,741,717 UART: [state] CFI Enabled
5,756,173 UART: [state] LifecycleState = Unprovisioned
5,758,128 UART: [state] DebugLocked = No
5,759,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,764,705 UART: [kat] SHA2-256
5,934,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,944,989 UART: [kat] ++
5,945,530 UART: [kat] sha1
5,956,959 UART: [kat] SHA2-256
5,959,647 UART: [kat] SHA2-384
5,965,037 UART: [kat] SHA2-512-ACC
5,967,399 UART: [kat] ECC-384
8,251,826 UART: [kat] HMAC-384Kdf
8,264,208 UART: [kat] LMS
9,454,317 UART: [kat] --
9,459,326 UART: [cold-reset] ++
9,461,740 UART: [fht] Storing FHT @ 0x50003400
9,473,080 UART: [idev] ++
9,473,712 UART: [idev] CDI.KEYID = 6
9,474,642 UART: [idev] SUBJECT.KEYID = 7
9,475,858 UART: [idev] UDS.KEYID = 0
9,478,176 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
9,621,579 UART: [idev] Erasing UDS.KEYID = 0
12,763,919 UART: [idev] Using Sha1 for KeyId Algorithm
12,786,364 UART: [idev] --
12,790,547 UART: [ldev] ++
12,791,149 UART: [ldev] CDI.KEYID = 6
12,792,119 UART: [ldev] SUBJECT.KEYID = 5
12,793,311 UART: [ldev] AUTHORITY.KEYID = 7
12,794,547 UART: [ldev] FE.KEYID = 1
12,806,757 UART: [ldev] Erasing FE.KEYID = 1
16,094,972 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,387,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,402,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,417,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,431,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,450,200 UART: [ldev] --
18,454,760 UART: [fwproc] Waiting for Commands...
18,458,045 UART: [fwproc] Received command 0x46574c44
18,460,232 UART: [fwproc] Received Image of size 114124 bytes
22,507,508 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,579,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,648,241 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,965,944 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,212 writing to cptra_bootfsm_go
4,127,930 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,449,646 >>> mbox cmd response: failed
14,450,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,450,555 >>> mbox cmd response: failed
14,450,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,451,178 >>> mbox cmd response: failed
Initializing fuses
2,051,231 writing to cptra_bootfsm_go
9,547,551 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,484,987 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,070 UART:
192,451 UART: Running Caliptra ROM ...
193,636 UART:
193,789 UART: [state] CFI Enabled
263,060 UART: [state] LifecycleState = Unprovisioned
264,938 UART: [state] DebugLocked = No
266,105 UART: [state] WD Timer not started. Device not locked for debugging
270,031 UART: [kat] SHA2-256
449,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,709 UART: [kat] ++
461,268 UART: [kat] sha1
471,990 UART: [kat] SHA2-256
475,046 UART: [kat] SHA2-384
481,187 UART: [kat] SHA2-512-ACC
484,116 UART: [kat] ECC-384
2,959,240 UART: [kat] HMAC-384Kdf
2,983,419 UART: [kat] LMS
3,512,869 UART: [kat] --
3,517,293 UART: [cold-reset] ++
3,518,908 UART: [fht] FHT @ 0x50003400
3,529,269 UART: [idev] ++
3,529,863 UART: [idev] CDI.KEYID = 6
3,530,794 UART: [idev] SUBJECT.KEYID = 7
3,532,009 UART: [idev] UDS.KEYID = 0
3,534,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,679,161 UART: [idev] Erasing UDS.KEYID = 0
6,036,492 UART: [idev] Sha1 KeyId Algorithm
6,059,866 UART: [idev] --
6,062,897 UART: [ldev] ++
6,063,469 UART: [ldev] CDI.KEYID = 6
6,064,381 UART: [ldev] SUBJECT.KEYID = 5
6,065,543 UART: [ldev] AUTHORITY.KEYID = 7
6,066,775 UART: [ldev] FE.KEYID = 1
6,112,436 UART: [ldev] Erasing FE.KEYID = 1
8,618,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,420,923 UART: [ldev] --
10,426,147 UART: [fwproc] Wait for Commands...
10,427,922 UART: [fwproc] Recv command 0x46574c44
10,430,033 UART: [fwproc] Recv'd Img size: 114448 bytes
11,502,483 UART: ROM Fatal Error: 0x000B0019
11,505,607 >>> mbox cmd response: failed
11,506,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,506,410 >>> mbox cmd response: failed
11,506,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,506,977 >>> mbox cmd response: failed
Initializing fuses
2,057,753 writing to cptra_bootfsm_go
2,247,061 UART:
2,247,408 UART: Running Caliptra ROM ...
2,248,457 UART:
2,248,612 UART: [state] CFI Enabled
2,306,165 UART: [state] LifecycleState = Unprovisioned
2,308,042 UART: [state] DebugLocked = No
2,310,573 UART: [state] WD Timer not started. Device not locked for debugging
2,315,128 UART: [kat] SHA2-256
2,494,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,505,807 UART: [kat] ++
2,506,359 UART: [kat] sha1
2,516,768 UART: [kat] SHA2-256
2,519,797 UART: [kat] SHA2-384
2,526,322 UART: [kat] SHA2-512-ACC
2,529,319 UART: [kat] ECC-384
4,992,824 UART: [kat] HMAC-384Kdf
5,017,102 UART: [kat] LMS
5,546,550 UART: [kat] --
5,551,482 UART: [cold-reset] ++
5,553,252 UART: [fht] FHT @ 0x50003400
5,563,061 UART: [idev] ++
5,563,640 UART: [idev] CDI.KEYID = 6
5,564,556 UART: [idev] SUBJECT.KEYID = 7
5,565,716 UART: [idev] UDS.KEYID = 0
5,568,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,712,430 UART: [idev] Erasing UDS.KEYID = 0
8,072,951 UART: [idev] Sha1 KeyId Algorithm
8,095,751 UART: [idev] --
8,099,861 UART: [ldev] ++
8,101,265 UART: [ldev] CDI.KEYID = 6
8,102,196 UART: [ldev] SUBJECT.KEYID = 5
8,103,241 UART: [ldev] AUTHORITY.KEYID = 7
8,104,421 UART: [ldev] FE.KEYID = 1
8,145,521 UART: [ldev] Erasing FE.KEYID = 1
10,647,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,365,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,381,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,397,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,413,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,432,246 UART: [ldev] --
12,437,145 UART: [fwproc] Wait for Commands...
12,440,389 UART: [fwproc] Recv command 0x46574c44
12,442,433 UART: [fwproc] Recv'd Img size: 114448 bytes
15,848,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,925,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,994,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,313,341 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,362,798 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,247,080 >>> mbox cmd response: failed
11,247,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,248,015 >>> mbox cmd response: failed
11,248,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,248,599 >>> mbox cmd response: failed
Initializing fuses
2,049,403 writing to cptra_bootfsm_go
5,404,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,090,014 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,638 UART:
193,015 UART: Running Caliptra ROM ...
194,135 UART:
603,870 UART: [state] CFI Enabled
617,592 UART: [state] LifecycleState = Unprovisioned
619,437 UART: [state] DebugLocked = No
621,652 UART: [state] WD Timer not started. Device not locked for debugging
625,740 UART: [kat] SHA2-256
804,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,393 UART: [kat] ++
816,836 UART: [kat] sha1
827,982 UART: [kat] SHA2-256
831,008 UART: [kat] SHA2-384
836,778 UART: [kat] SHA2-512-ACC
839,763 UART: [kat] ECC-384
3,280,291 UART: [kat] HMAC-384Kdf
3,292,633 UART: [kat] LMS
3,822,114 UART: [kat] --
3,826,912 UART: [cold-reset] ++
3,827,997 UART: [fht] FHT @ 0x50003400
3,840,139 UART: [idev] ++
3,840,700 UART: [idev] CDI.KEYID = 6
3,841,609 UART: [idev] SUBJECT.KEYID = 7
3,842,820 UART: [idev] UDS.KEYID = 0
3,845,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,329 UART: [idev] Erasing UDS.KEYID = 0
6,315,589 UART: [idev] Sha1 KeyId Algorithm
6,339,244 UART: [idev] --
6,343,156 UART: [ldev] ++
6,343,733 UART: [ldev] CDI.KEYID = 6
6,344,647 UART: [ldev] SUBJECT.KEYID = 5
6,345,812 UART: [ldev] AUTHORITY.KEYID = 7
6,347,048 UART: [ldev] FE.KEYID = 1
6,359,268 UART: [ldev] Erasing FE.KEYID = 1
8,836,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,562 UART: [ldev] --
10,627,988 UART: [fwproc] Wait for Commands...
10,630,137 UART: [fwproc] Recv command 0x46574c44
10,632,234 UART: [fwproc] Recv'd Img size: 114448 bytes
11,704,349 UART: ROM Fatal Error: 0x000B0019
11,707,466 >>> mbox cmd response: failed
11,707,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,708,240 >>> mbox cmd response: failed
11,708,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,708,799 >>> mbox cmd response: failed
Initializing fuses
2,055,565 writing to cptra_bootfsm_go
2,244,887 UART:
2,245,222 UART: Running Caliptra ROM ...
2,246,301 UART:
8,749,536 UART: [state] CFI Enabled
8,765,034 UART: [state] LifecycleState = Unprovisioned
8,766,905 UART: [state] DebugLocked = No
8,769,698 UART: [state] WD Timer not started. Device not locked for debugging
8,772,582 UART: [kat] SHA2-256
8,951,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,963,320 UART: [kat] ++
8,963,865 UART: [kat] sha1
8,974,770 UART: [kat] SHA2-256
8,977,786 UART: [kat] SHA2-384
8,983,354 UART: [kat] SHA2-512-ACC
8,986,300 UART: [kat] ECC-384
11,428,621 UART: [kat] HMAC-384Kdf
11,442,355 UART: [kat] LMS
11,971,850 UART: [kat] --
11,974,810 UART: [cold-reset] ++
11,975,983 UART: [fht] FHT @ 0x50003400
11,987,499 UART: [idev] ++
11,988,062 UART: [idev] CDI.KEYID = 6
11,989,137 UART: [idev] SUBJECT.KEYID = 7
11,990,253 UART: [idev] UDS.KEYID = 0
11,993,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,137,140 UART: [idev] Erasing UDS.KEYID = 0
14,464,779 UART: [idev] Sha1 KeyId Algorithm
14,488,694 UART: [idev] --
14,492,935 UART: [ldev] ++
14,493,533 UART: [ldev] CDI.KEYID = 6
14,494,445 UART: [ldev] SUBJECT.KEYID = 5
14,495,605 UART: [ldev] AUTHORITY.KEYID = 7
14,496,838 UART: [ldev] FE.KEYID = 1
14,507,537 UART: [ldev] Erasing FE.KEYID = 1
16,982,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,701,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,717,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,733,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,749,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,770,186 UART: [ldev] --
18,775,337 UART: [fwproc] Wait for Commands...
18,777,866 UART: [fwproc] Recv command 0x46574c44
18,779,964 UART: [fwproc] Recv'd Img size: 114448 bytes
22,178,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,250,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,318,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,637,169 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,696,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,480,341 >>> mbox cmd response: failed
11,481,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,481,392 >>> mbox cmd response: failed
11,481,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,481,954 >>> mbox cmd response: failed
Initializing fuses
2,055,047 writing to cptra_bootfsm_go
12,081,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,658,754 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,439,139 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,314,324 >>> mbox cmd response: failed
11,314,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,315,281 >>> mbox cmd response: failed
11,315,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,315,847 >>> mbox cmd response: failed
Initializing fuses
2,054,649 writing to cptra_bootfsm_go
5,478,093 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,750,559 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
3,758,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,540,819 >>> mbox cmd response: failed
11,541,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,541,751 >>> mbox cmd response: failed
11,542,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,542,316 >>> mbox cmd response: failed
Initializing fuses
2,050,313 writing to cptra_bootfsm_go
12,079,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,290,108 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,590 UART: [state] LifecycleState = Unprovisioned
86,245 UART: [state] DebugLocked = No
86,905 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,461 UART: [kat] SHA2-256
882,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,507 UART: [kat] ++
886,659 UART: [kat] sha1
890,755 UART: [kat] SHA2-256
892,693 UART: [kat] SHA2-384
895,362 UART: [kat] SHA2-512-ACC
897,263 UART: [kat] ECC-384
903,194 UART: [kat] HMAC-384Kdf
907,760 UART: [kat] LMS
1,475,956 UART: [kat] --
1,476,847 UART: [cold-reset] ++
1,477,379 UART: [fht] Storing FHT @ 0x50003400
1,480,170 UART: [idev] ++
1,480,338 UART: [idev] CDI.KEYID = 6
1,480,698 UART: [idev] SUBJECT.KEYID = 7
1,481,122 UART: [idev] UDS.KEYID = 0
1,481,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,312 UART: [idev] Erasing UDS.KEYID = 0
1,505,678 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,544 UART: [idev] --
1,515,441 UART: [ldev] ++
1,515,609 UART: [ldev] CDI.KEYID = 6
1,515,972 UART: [ldev] SUBJECT.KEYID = 5
1,516,398 UART: [ldev] AUTHORITY.KEYID = 7
1,516,861 UART: [ldev] FE.KEYID = 1
1,521,929 UART: [ldev] Erasing FE.KEYID = 1
1,547,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,814 UART: [ldev] --
1,587,119 UART: [fwproc] Waiting for Commands...
1,587,978 UART: [fwproc] Received command 0x46574c44
1,588,769 UART: [fwproc] Received Image of size 114448 bytes
1,628,354 UART: ROM Fatal Error: 0x000B0019
1,629,511 >>> mbox cmd response: failed
1,629,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,517 >>> mbox cmd response: failed
1,629,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,523 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,395 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,115 UART: [kat] SHA2-256
882,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,161 UART: [kat] ++
886,313 UART: [kat] sha1
890,605 UART: [kat] SHA2-256
892,543 UART: [kat] SHA2-384
895,362 UART: [kat] SHA2-512-ACC
897,263 UART: [kat] ECC-384
902,530 UART: [kat] HMAC-384Kdf
907,210 UART: [kat] LMS
1,475,406 UART: [kat] --
1,476,153 UART: [cold-reset] ++
1,476,517 UART: [fht] Storing FHT @ 0x50003400
1,479,544 UART: [idev] ++
1,479,712 UART: [idev] CDI.KEYID = 6
1,480,072 UART: [idev] SUBJECT.KEYID = 7
1,480,496 UART: [idev] UDS.KEYID = 0
1,480,841 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,764 UART: [idev] Erasing UDS.KEYID = 0
1,504,996 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,526 UART: [idev] --
1,514,513 UART: [ldev] ++
1,514,681 UART: [ldev] CDI.KEYID = 6
1,515,044 UART: [ldev] SUBJECT.KEYID = 5
1,515,470 UART: [ldev] AUTHORITY.KEYID = 7
1,515,933 UART: [ldev] FE.KEYID = 1
1,521,005 UART: [ldev] Erasing FE.KEYID = 1
1,546,312 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,462 UART: [ldev] --
1,585,939 UART: [fwproc] Waiting for Commands...
1,586,774 UART: [fwproc] Received command 0x46574c44
1,587,565 UART: [fwproc] Received Image of size 114448 bytes
2,886,539 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,895 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,247 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,160 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,479,266 >>> mbox cmd response: failed
1,479,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,272 >>> mbox cmd response: failed
1,479,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,969 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,622 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,943 UART: [state] LifecycleState = Unprovisioned
85,598 UART: [state] DebugLocked = No
86,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,884 UART: [kat] SHA2-256
881,815 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,930 UART: [kat] ++
886,082 UART: [kat] sha1
890,320 UART: [kat] SHA2-256
892,258 UART: [kat] SHA2-384
895,033 UART: [kat] SHA2-512-ACC
896,934 UART: [kat] ECC-384
902,613 UART: [kat] HMAC-384Kdf
907,037 UART: [kat] LMS
1,475,233 UART: [kat] --
1,476,074 UART: [cold-reset] ++
1,476,482 UART: [fht] Storing FHT @ 0x50003400
1,479,277 UART: [idev] ++
1,479,445 UART: [idev] CDI.KEYID = 6
1,479,805 UART: [idev] SUBJECT.KEYID = 7
1,480,229 UART: [idev] UDS.KEYID = 0
1,480,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,063 UART: [idev] Erasing UDS.KEYID = 0
1,504,873 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,469 UART: [idev] --
1,514,314 UART: [ldev] ++
1,514,482 UART: [ldev] CDI.KEYID = 6
1,514,845 UART: [ldev] SUBJECT.KEYID = 5
1,515,271 UART: [ldev] AUTHORITY.KEYID = 7
1,515,734 UART: [ldev] FE.KEYID = 1
1,521,222 UART: [ldev] Erasing FE.KEYID = 1
1,546,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,735 UART: [ldev] --
1,586,240 UART: [fwproc] Waiting for Commands...
1,587,079 UART: [fwproc] Received command 0x46574c44
1,587,870 UART: [fwproc] Received Image of size 114448 bytes
1,626,973 UART: ROM Fatal Error: 0x000B0019
1,628,130 >>> mbox cmd response: failed
1,628,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,136 >>> mbox cmd response: failed
1,628,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,340 UART: [kat] SHA2-256
882,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,386 UART: [kat] ++
886,538 UART: [kat] sha1
890,806 UART: [kat] SHA2-256
892,744 UART: [kat] SHA2-384
895,545 UART: [kat] SHA2-512-ACC
897,446 UART: [kat] ECC-384
903,065 UART: [kat] HMAC-384Kdf
907,555 UART: [kat] LMS
1,475,751 UART: [kat] --
1,476,480 UART: [cold-reset] ++
1,476,822 UART: [fht] Storing FHT @ 0x50003400
1,479,529 UART: [idev] ++
1,479,697 UART: [idev] CDI.KEYID = 6
1,480,057 UART: [idev] SUBJECT.KEYID = 7
1,480,481 UART: [idev] UDS.KEYID = 0
1,480,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,327 UART: [idev] Erasing UDS.KEYID = 0
1,505,145 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,625 UART: [idev] --
1,514,618 UART: [ldev] ++
1,514,786 UART: [ldev] CDI.KEYID = 6
1,515,149 UART: [ldev] SUBJECT.KEYID = 5
1,515,575 UART: [ldev] AUTHORITY.KEYID = 7
1,516,038 UART: [ldev] FE.KEYID = 1
1,521,244 UART: [ldev] Erasing FE.KEYID = 1
1,546,707 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,519 UART: [ldev] --
1,586,004 UART: [fwproc] Waiting for Commands...
1,586,661 UART: [fwproc] Received command 0x46574c44
1,587,452 UART: [fwproc] Received Image of size 114448 bytes
2,886,046 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,812 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,164 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,193 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,482,065 >>> mbox cmd response: failed
1,482,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,071 >>> mbox cmd response: failed
1,482,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,161 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,885 UART: [kat] SHA2-256
903,825 UART: [kat] SHA2-384
906,538 UART: [kat] SHA2-512-ACC
908,439 UART: [kat] ECC-384
918,104 UART: [kat] HMAC-384Kdf
922,600 UART: [kat] LMS
1,170,928 UART: [kat] --
1,172,019 UART: [cold-reset] ++
1,172,521 UART: [fht] FHT @ 0x50003400
1,175,164 UART: [idev] ++
1,175,332 UART: [idev] CDI.KEYID = 6
1,175,692 UART: [idev] SUBJECT.KEYID = 7
1,176,116 UART: [idev] UDS.KEYID = 0
1,176,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,046 UART: [idev] Erasing UDS.KEYID = 0
1,201,155 UART: [idev] Sha1 KeyId Algorithm
1,209,571 UART: [idev] --
1,210,639 UART: [ldev] ++
1,210,807 UART: [ldev] CDI.KEYID = 6
1,211,170 UART: [ldev] SUBJECT.KEYID = 5
1,211,596 UART: [ldev] AUTHORITY.KEYID = 7
1,212,059 UART: [ldev] FE.KEYID = 1
1,217,155 UART: [ldev] Erasing FE.KEYID = 1
1,243,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,623 UART: [ldev] --
1,282,988 UART: [fwproc] Wait for Commands...
1,283,608 UART: [fwproc] Recv command 0x46574c44
1,284,336 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,217 UART: ROM Fatal Error: 0x000B0019
1,325,374 >>> mbox cmd response: failed
1,325,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,380 >>> mbox cmd response: failed
1,325,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,386 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
893,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,681 UART: [kat] ++
897,833 UART: [kat] sha1
901,909 UART: [kat] SHA2-256
903,849 UART: [kat] SHA2-384
906,738 UART: [kat] SHA2-512-ACC
908,639 UART: [kat] ECC-384
918,418 UART: [kat] HMAC-384Kdf
923,082 UART: [kat] LMS
1,171,410 UART: [kat] --
1,172,337 UART: [cold-reset] ++
1,172,793 UART: [fht] FHT @ 0x50003400
1,175,440 UART: [idev] ++
1,175,608 UART: [idev] CDI.KEYID = 6
1,175,968 UART: [idev] SUBJECT.KEYID = 7
1,176,392 UART: [idev] UDS.KEYID = 0
1,176,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,190 UART: [idev] Erasing UDS.KEYID = 0
1,201,257 UART: [idev] Sha1 KeyId Algorithm
1,209,703 UART: [idev] --
1,210,713 UART: [ldev] ++
1,210,881 UART: [ldev] CDI.KEYID = 6
1,211,244 UART: [ldev] SUBJECT.KEYID = 5
1,211,670 UART: [ldev] AUTHORITY.KEYID = 7
1,212,133 UART: [ldev] FE.KEYID = 1
1,217,335 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,043 UART: [ldev] --
1,282,378 UART: [fwproc] Wait for Commands...
1,283,016 UART: [fwproc] Recv command 0x46574c44
1,283,744 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,091 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,843 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,475 >>> mbox cmd response: failed
1,178,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,481 >>> mbox cmd response: failed
1,178,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,994 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,221 UART: [kat] SHA2-256
893,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,996 UART: [kat] ++
898,148 UART: [kat] sha1
902,330 UART: [kat] SHA2-256
904,270 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,483 UART: [kat] HMAC-384Kdf
923,271 UART: [kat] LMS
1,171,599 UART: [kat] --
1,172,252 UART: [cold-reset] ++
1,172,638 UART: [fht] FHT @ 0x50003400
1,175,281 UART: [idev] ++
1,175,449 UART: [idev] CDI.KEYID = 6
1,175,809 UART: [idev] SUBJECT.KEYID = 7
1,176,233 UART: [idev] UDS.KEYID = 0
1,176,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,159 UART: [idev] Erasing UDS.KEYID = 0
1,200,914 UART: [idev] Sha1 KeyId Algorithm
1,209,342 UART: [idev] --
1,210,500 UART: [ldev] ++
1,210,668 UART: [ldev] CDI.KEYID = 6
1,211,031 UART: [ldev] SUBJECT.KEYID = 5
1,211,457 UART: [ldev] AUTHORITY.KEYID = 7
1,211,920 UART: [ldev] FE.KEYID = 1
1,217,218 UART: [ldev] Erasing FE.KEYID = 1
1,243,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,340 UART: [ldev] --
1,282,617 UART: [fwproc] Wait for Commands...
1,283,375 UART: [fwproc] Recv command 0x46574c44
1,284,103 UART: [fwproc] Recv'd Img size: 114448 bytes
1,323,834 UART: ROM Fatal Error: 0x000B0019
1,324,991 >>> mbox cmd response: failed
1,324,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,997 >>> mbox cmd response: failed
1,324,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
893,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,404 UART: [kat] ++
897,556 UART: [kat] sha1
901,782 UART: [kat] SHA2-256
903,722 UART: [kat] SHA2-384
906,365 UART: [kat] SHA2-512-ACC
908,266 UART: [kat] ECC-384
917,801 UART: [kat] HMAC-384Kdf
922,343 UART: [kat] LMS
1,170,671 UART: [kat] --
1,171,448 UART: [cold-reset] ++
1,171,972 UART: [fht] FHT @ 0x50003400
1,174,609 UART: [idev] ++
1,174,777 UART: [idev] CDI.KEYID = 6
1,175,137 UART: [idev] SUBJECT.KEYID = 7
1,175,561 UART: [idev] UDS.KEYID = 0
1,175,906 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,637 UART: [idev] Erasing UDS.KEYID = 0
1,200,480 UART: [idev] Sha1 KeyId Algorithm
1,208,998 UART: [idev] --
1,210,140 UART: [ldev] ++
1,210,308 UART: [ldev] CDI.KEYID = 6
1,210,671 UART: [ldev] SUBJECT.KEYID = 5
1,211,097 UART: [ldev] AUTHORITY.KEYID = 7
1,211,560 UART: [ldev] FE.KEYID = 1
1,217,006 UART: [ldev] Erasing FE.KEYID = 1
1,243,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,024 UART: [ldev] --
1,282,351 UART: [fwproc] Wait for Commands...
1,283,091 UART: [fwproc] Recv command 0x46574c44
1,283,819 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,872 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,988 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,272 >>> mbox cmd response: failed
1,179,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,278 >>> mbox cmd response: failed
1,179,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,854 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,315 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,865 UART: [state] WD Timer not started. Device not locked for debugging
88,162 UART: [kat] SHA2-256
891,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,841 UART: [kat] ++
895,993 UART: [kat] sha1
900,275 UART: [kat] SHA2-256
902,215 UART: [kat] SHA2-384
905,094 UART: [kat] SHA2-512-ACC
906,995 UART: [kat] ECC-384
916,756 UART: [kat] HMAC-384Kdf
921,400 UART: [kat] LMS
1,169,712 UART: [kat] --
1,170,847 UART: [cold-reset] ++
1,171,195 UART: [fht] FHT @ 0x50003400
1,173,925 UART: [idev] ++
1,174,093 UART: [idev] CDI.KEYID = 6
1,174,454 UART: [idev] SUBJECT.KEYID = 7
1,174,879 UART: [idev] UDS.KEYID = 0
1,175,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,233 UART: [idev] Erasing UDS.KEYID = 0
1,199,795 UART: [idev] Sha1 KeyId Algorithm
1,208,669 UART: [idev] --
1,209,524 UART: [ldev] ++
1,209,692 UART: [ldev] CDI.KEYID = 6
1,210,056 UART: [ldev] SUBJECT.KEYID = 5
1,210,483 UART: [ldev] AUTHORITY.KEYID = 7
1,210,946 UART: [ldev] FE.KEYID = 1
1,216,108 UART: [ldev] Erasing FE.KEYID = 1
1,242,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,116 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,143 UART: [fwproc] Recv command 0x46574c44
1,282,876 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,598 UART: ROM Fatal Error: 0x000B0019
1,322,755 >>> mbox cmd response: failed
1,322,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,761 >>> mbox cmd response: failed
1,322,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,767 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,708 UART: [state] LifecycleState = Unprovisioned
85,363 UART: [state] DebugLocked = No
86,045 UART: [state] WD Timer not started. Device not locked for debugging
87,342 UART: [kat] SHA2-256
890,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,021 UART: [kat] ++
895,173 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
915,658 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,483 UART: [cold-reset] ++
1,170,061 UART: [fht] FHT @ 0x50003400
1,172,841 UART: [idev] ++
1,173,009 UART: [idev] CDI.KEYID = 6
1,173,370 UART: [idev] SUBJECT.KEYID = 7
1,173,795 UART: [idev] UDS.KEYID = 0
1,174,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,615 UART: [idev] Erasing UDS.KEYID = 0
1,198,881 UART: [idev] Sha1 KeyId Algorithm
1,207,777 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,518 UART: [ldev] Erasing FE.KEYID = 1
1,242,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,334 UART: [ldev] --
1,281,804 UART: [fwproc] Wait for Commands...
1,282,527 UART: [fwproc] Recv command 0x46574c44
1,283,260 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,307 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,277 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,173,686 >>> mbox cmd response: failed
1,173,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,692 >>> mbox cmd response: failed
1,173,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,698 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,109 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,699 UART: [kat] SHA2-512-ACC
906,600 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,455 UART: [kat] LMS
1,168,767 UART: [kat] --
1,169,608 UART: [cold-reset] ++
1,170,040 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,174,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,408 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,897 UART: [ldev] SUBJECT.KEYID = 5
1,210,324 UART: [ldev] AUTHORITY.KEYID = 7
1,210,787 UART: [ldev] FE.KEYID = 1
1,215,951 UART: [ldev] Erasing FE.KEYID = 1
1,242,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,253 UART: [ldev] --
1,281,543 UART: [fwproc] Wait for Commands...
1,282,138 UART: [fwproc] Recv command 0x46574c44
1,282,871 UART: [fwproc] Recv'd Img size: 114448 bytes
1,322,441 UART: ROM Fatal Error: 0x000B0019
1,323,598 >>> mbox cmd response: failed
1,323,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,604 >>> mbox cmd response: failed
1,323,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,689 UART: [kat] HMAC-384Kdf
921,367 UART: [kat] LMS
1,169,679 UART: [kat] --
1,170,524 UART: [cold-reset] ++
1,171,080 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,174,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,560 UART: [idev] Erasing UDS.KEYID = 0
1,199,466 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,861 UART: [ldev] SUBJECT.KEYID = 5
1,210,288 UART: [ldev] AUTHORITY.KEYID = 7
1,210,751 UART: [ldev] FE.KEYID = 1
1,215,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,879 UART: [ldev] --
1,282,155 UART: [fwproc] Wait for Commands...
1,282,730 UART: [fwproc] Recv command 0x46574c44
1,283,463 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,528 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,174,745 >>> mbox cmd response: failed
1,174,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,751 >>> mbox cmd response: failed
1,174,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,994 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,040 UART:
192,405 UART: Running Caliptra ROM ...
193,525 UART:
193,670 UART: [state] CFI Enabled
262,544 UART: [state] LifecycleState = Unprovisioned
264,450 UART: [state] DebugLocked = No
267,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,430 UART: [kat] SHA2-256
441,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,640 UART: [kat] ++
452,116 UART: [kat] sha1
462,347 UART: [kat] SHA2-256
465,028 UART: [kat] SHA2-384
471,819 UART: [kat] SHA2-512-ACC
474,209 UART: [kat] ECC-384
2,767,135 UART: [kat] HMAC-384Kdf
2,797,127 UART: [kat] LMS
3,987,434 UART: [kat] --
3,991,615 UART: [cold-reset] ++
3,992,903 UART: [fht] Storing FHT @ 0x50003400
4,004,553 UART: [idev] ++
4,005,124 UART: [idev] CDI.KEYID = 6
4,006,028 UART: [idev] SUBJECT.KEYID = 7
4,007,308 UART: [idev] UDS.KEYID = 0
4,010,064 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,795 UART: [idev] Erasing UDS.KEYID = 0
7,344,677 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,684 UART: [idev] --
7,369,466 UART: [ldev] ++
7,370,111 UART: [ldev] CDI.KEYID = 6
7,371,005 UART: [ldev] SUBJECT.KEYID = 5
7,372,232 UART: [ldev] AUTHORITY.KEYID = 7
7,373,508 UART: [ldev] FE.KEYID = 1
7,420,502 UART: [ldev] Erasing FE.KEYID = 1
10,748,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,218 UART: [ldev] --
13,111,674 UART: [fwproc] Waiting for Commands...
13,115,020 UART: [fwproc] Received command 0x46574c44
13,117,212 UART: [fwproc] Received Image of size 114124 bytes
15,806,376 UART: ROM Fatal Error: 0x000B000F
15,809,808 >>> mbox cmd response: failed
15,810,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,810,475 >>> mbox cmd response: failed
15,810,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,811,155 >>> mbox cmd response: failed
Initializing fuses
2,055,698 writing to cptra_bootfsm_go
2,245,050 UART:
2,245,398 UART: Running Caliptra ROM ...
2,246,538 UART:
2,246,705 UART: [state] CFI Enabled
2,304,625 UART: [state] LifecycleState = Unprovisioned
2,306,574 UART: [state] DebugLocked = No
2,308,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,575 UART: [kat] SHA2-256
2,483,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,493,748 UART: [kat] ++
2,494,245 UART: [kat] sha1
2,506,755 UART: [kat] SHA2-256
2,509,457 UART: [kat] SHA2-384
2,514,966 UART: [kat] SHA2-512-ACC
2,517,372 UART: [kat] ECC-384
4,811,055 UART: [kat] HMAC-384Kdf
4,841,978 UART: [kat] LMS
6,032,297 UART: [kat] --
6,035,663 UART: [cold-reset] ++
6,037,819 UART: [fht] Storing FHT @ 0x50003400
6,048,762 UART: [idev] ++
6,049,332 UART: [idev] CDI.KEYID = 6
6,050,273 UART: [idev] SUBJECT.KEYID = 7
6,051,541 UART: [idev] UDS.KEYID = 0
6,054,141 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,197,816 UART: [idev] Erasing UDS.KEYID = 0
9,388,294 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,814 UART: [idev] --
9,415,783 UART: [ldev] ++
9,416,351 UART: [ldev] CDI.KEYID = 6
9,417,289 UART: [ldev] SUBJECT.KEYID = 5
9,418,560 UART: [ldev] AUTHORITY.KEYID = 7
9,419,737 UART: [ldev] FE.KEYID = 1
9,464,720 UART: [ldev] Erasing FE.KEYID = 1
12,797,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,093,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,108,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,123,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,137,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,156,227 UART: [ldev] --
15,160,629 UART: [fwproc] Waiting for Commands...
15,163,159 UART: [fwproc] Received command 0x46574c44
15,165,357 UART: [fwproc] Received Image of size 114124 bytes
19,213,572 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,289,437 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,358,362 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,674,920 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,786,450 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,529,311 >>> mbox cmd response: failed
15,529,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,530,143 >>> mbox cmd response: failed
15,530,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,530,711 >>> mbox cmd response: failed
Initializing fuses
2,056,646 writing to cptra_bootfsm_go
5,848,036 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,886,998 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,619 UART:
192,972 UART: Running Caliptra ROM ...
194,152 UART:
604,012 UART: [state] CFI Enabled
617,002 UART: [state] LifecycleState = Unprovisioned
619,016 UART: [state] DebugLocked = No
621,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,838 UART: [kat] SHA2-256
795,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,136 UART: [kat] ++
806,721 UART: [kat] sha1
817,874 UART: [kat] SHA2-256
820,561 UART: [kat] SHA2-384
826,880 UART: [kat] SHA2-512-ACC
829,276 UART: [kat] ECC-384
3,114,752 UART: [kat] HMAC-384Kdf
3,126,107 UART: [kat] LMS
4,316,238 UART: [kat] --
4,322,511 UART: [cold-reset] ++
4,323,854 UART: [fht] Storing FHT @ 0x50003400
4,336,796 UART: [idev] ++
4,337,369 UART: [idev] CDI.KEYID = 6
4,338,386 UART: [idev] SUBJECT.KEYID = 7
4,339,544 UART: [idev] UDS.KEYID = 0
4,342,174 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,617 UART: [idev] Erasing UDS.KEYID = 0
7,625,824 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,916 UART: [idev] --
7,653,106 UART: [ldev] ++
7,653,699 UART: [ldev] CDI.KEYID = 6
7,654,765 UART: [ldev] SUBJECT.KEYID = 5
7,655,883 UART: [ldev] AUTHORITY.KEYID = 7
7,657,118 UART: [ldev] FE.KEYID = 1
7,668,160 UART: [ldev] Erasing FE.KEYID = 1
10,960,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,253 UART: [ldev] --
13,320,871 UART: [fwproc] Waiting for Commands...
13,323,673 UART: [fwproc] Received command 0x46574c44
13,325,860 UART: [fwproc] Received Image of size 114124 bytes
16,014,969 UART: ROM Fatal Error: 0x000B000F
16,018,419 >>> mbox cmd response: failed
16,018,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,019,161 >>> mbox cmd response: failed
16,019,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,019,729 >>> mbox cmd response: failed
Initializing fuses
2,052,231 writing to cptra_bootfsm_go
2,241,568 UART:
2,241,904 UART: Running Caliptra ROM ...
2,243,041 UART:
4,451,916 UART: [state] CFI Enabled
4,469,131 UART: [state] LifecycleState = Unprovisioned
4,471,038 UART: [state] DebugLocked = No
4,472,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,477,354 UART: [kat] SHA2-256
4,647,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,657,633 UART: [kat] ++
4,658,137 UART: [kat] sha1
4,669,945 UART: [kat] SHA2-256
4,672,634 UART: [kat] SHA2-384
4,679,578 UART: [kat] SHA2-512-ACC
4,681,964 UART: [kat] ECC-384
6,967,314 UART: [kat] HMAC-384Kdf
6,978,568 UART: [kat] LMS
8,168,675 UART: [kat] --
8,173,929 UART: [cold-reset] ++
8,175,552 UART: [fht] Storing FHT @ 0x50003400
8,187,523 UART: [idev] ++
8,188,087 UART: [idev] CDI.KEYID = 6
8,189,105 UART: [idev] SUBJECT.KEYID = 7
8,190,285 UART: [idev] UDS.KEYID = 0
8,192,526 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,335,922 UART: [idev] Erasing UDS.KEYID = 0
11,479,103 UART: [idev] Using Sha1 for KeyId Algorithm
11,501,508 UART: [idev] --
11,505,294 UART: [ldev] ++
11,505,919 UART: [ldev] CDI.KEYID = 6
11,506,829 UART: [ldev] SUBJECT.KEYID = 5
11,508,081 UART: [ldev] AUTHORITY.KEYID = 7
11,509,318 UART: [ldev] FE.KEYID = 1
11,520,501 UART: [ldev] Erasing FE.KEYID = 1
14,809,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,103,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,118,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,132,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,147,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,166,085 UART: [ldev] --
17,171,260 UART: [fwproc] Waiting for Commands...
17,173,962 UART: [fwproc] Received command 0x46574c44
17,176,204 UART: [fwproc] Received Image of size 114124 bytes
21,222,442 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,300,114 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,368,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,685,762 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
4,133,544 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,748,746 >>> mbox cmd response: failed
15,749,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,749,657 >>> mbox cmd response: failed
15,749,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,750,228 >>> mbox cmd response: failed
Initializing fuses
2,050,333 writing to cptra_bootfsm_go
8,245,936 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,187,304 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,078 UART:
192,448 UART: Running Caliptra ROM ...
193,638 UART:
193,794 UART: [state] CFI Enabled
262,293 UART: [state] LifecycleState = Unprovisioned
264,119 UART: [state] DebugLocked = No
266,136 UART: [state] WD Timer not started. Device not locked for debugging
270,060 UART: [kat] SHA2-256
449,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,785 UART: [kat] ++
461,323 UART: [kat] sha1
472,587 UART: [kat] SHA2-256
475,596 UART: [kat] SHA2-384
482,059 UART: [kat] SHA2-512-ACC
485,051 UART: [kat] ECC-384
2,944,004 UART: [kat] HMAC-384Kdf
2,970,411 UART: [kat] LMS
3,499,876 UART: [kat] --
3,504,593 UART: [cold-reset] ++
3,506,746 UART: [fht] FHT @ 0x50003400
3,517,219 UART: [idev] ++
3,517,789 UART: [idev] CDI.KEYID = 6
3,518,701 UART: [idev] SUBJECT.KEYID = 7
3,519,916 UART: [idev] UDS.KEYID = 0
3,522,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,849 UART: [idev] Erasing UDS.KEYID = 0
6,024,526 UART: [idev] Sha1 KeyId Algorithm
6,046,753 UART: [idev] --
6,050,504 UART: [ldev] ++
6,051,078 UART: [ldev] CDI.KEYID = 6
6,051,969 UART: [ldev] SUBJECT.KEYID = 5
6,053,074 UART: [ldev] AUTHORITY.KEYID = 7
6,054,428 UART: [ldev] FE.KEYID = 1
6,098,370 UART: [ldev] Erasing FE.KEYID = 1
8,601,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,005 UART: [ldev] --
10,411,623 UART: [fwproc] Wait for Commands...
10,414,093 UART: [fwproc] Recv command 0x46574c44
10,416,189 UART: [fwproc] Recv'd Img size: 114448 bytes
12,453,838 UART: ROM Fatal Error: 0x000B000F
12,456,909 >>> mbox cmd response: failed
12,457,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,569 >>> mbox cmd response: failed
12,457,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,458,163 >>> mbox cmd response: failed
Initializing fuses
2,052,182 writing to cptra_bootfsm_go
2,241,475 UART:
2,241,822 UART: Running Caliptra ROM ...
2,242,868 UART:
2,243,019 UART: [state] CFI Enabled
2,313,577 UART: [state] LifecycleState = Unprovisioned
2,315,459 UART: [state] DebugLocked = No
2,316,817 UART: [state] WD Timer not started. Device not locked for debugging
2,319,855 UART: [kat] SHA2-256
2,498,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,543 UART: [kat] ++
2,511,004 UART: [kat] sha1
2,522,272 UART: [kat] SHA2-256
2,525,297 UART: [kat] SHA2-384
2,531,557 UART: [kat] SHA2-512-ACC
2,534,527 UART: [kat] ECC-384
4,993,326 UART: [kat] HMAC-384Kdf
5,019,216 UART: [kat] LMS
5,548,656 UART: [kat] --
5,554,564 UART: [cold-reset] ++
5,556,447 UART: [fht] FHT @ 0x50003400
5,567,862 UART: [idev] ++
5,568,436 UART: [idev] CDI.KEYID = 6
5,569,341 UART: [idev] SUBJECT.KEYID = 7
5,570,559 UART: [idev] UDS.KEYID = 0
5,573,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,717,207 UART: [idev] Erasing UDS.KEYID = 0
8,073,874 UART: [idev] Sha1 KeyId Algorithm
8,097,216 UART: [idev] --
8,101,697 UART: [ldev] ++
8,102,272 UART: [ldev] CDI.KEYID = 6
8,103,178 UART: [ldev] SUBJECT.KEYID = 5
8,104,341 UART: [ldev] AUTHORITY.KEYID = 7
8,105,624 UART: [ldev] FE.KEYID = 1
8,148,853 UART: [ldev] Erasing FE.KEYID = 1
10,660,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,397,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,449,903 UART: [ldev] --
12,455,111 UART: [fwproc] Wait for Commands...
12,458,003 UART: [fwproc] Recv command 0x46574c44
12,460,060 UART: [fwproc] Recv'd Img size: 114448 bytes
15,860,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,937,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,006,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,325,014 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
3,360,178 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,236,246 >>> mbox cmd response: failed
12,236,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,237,145 >>> mbox cmd response: failed
12,237,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,237,710 >>> mbox cmd response: failed
Initializing fuses
2,052,195 writing to cptra_bootfsm_go
5,435,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,129,623 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,536 UART:
192,894 UART: Running Caliptra ROM ...
193,977 UART:
603,793 UART: [state] CFI Enabled
616,115 UART: [state] LifecycleState = Unprovisioned
617,966 UART: [state] DebugLocked = No
620,798 UART: [state] WD Timer not started. Device not locked for debugging
624,667 UART: [kat] SHA2-256
803,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,384 UART: [kat] ++
815,924 UART: [kat] sha1
826,753 UART: [kat] SHA2-256
829,759 UART: [kat] SHA2-384
835,304 UART: [kat] SHA2-512-ACC
838,234 UART: [kat] ECC-384
3,284,053 UART: [kat] HMAC-384Kdf
3,297,252 UART: [kat] LMS
3,826,754 UART: [kat] --
3,830,973 UART: [cold-reset] ++
3,832,230 UART: [fht] FHT @ 0x50003400
3,842,083 UART: [idev] ++
3,842,649 UART: [idev] CDI.KEYID = 6
3,843,532 UART: [idev] SUBJECT.KEYID = 7
3,844,743 UART: [idev] UDS.KEYID = 0
3,847,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,372 UART: [idev] Erasing UDS.KEYID = 0
6,318,457 UART: [idev] Sha1 KeyId Algorithm
6,341,902 UART: [idev] --
6,345,092 UART: [ldev] ++
6,345,665 UART: [ldev] CDI.KEYID = 6
6,346,549 UART: [ldev] SUBJECT.KEYID = 5
6,347,761 UART: [ldev] AUTHORITY.KEYID = 7
6,348,996 UART: [ldev] FE.KEYID = 1
6,360,104 UART: [ldev] Erasing FE.KEYID = 1
8,836,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,166 UART: [ldev] --
10,625,242 UART: [fwproc] Wait for Commands...
10,628,220 UART: [fwproc] Recv command 0x46574c44
10,630,465 UART: [fwproc] Recv'd Img size: 114448 bytes
12,661,048 UART: ROM Fatal Error: 0x000B000F
12,664,112 >>> mbox cmd response: failed
12,664,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,664,760 >>> mbox cmd response: failed
12,665,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,320 >>> mbox cmd response: failed
Initializing fuses
2,057,665 writing to cptra_bootfsm_go
2,246,936 UART:
2,247,281 UART: Running Caliptra ROM ...
2,248,420 UART:
7,788,513 UART: [state] CFI Enabled
7,803,184 UART: [state] LifecycleState = Unprovisioned
7,805,188 UART: [state] DebugLocked = No
7,806,376 UART: [state] WD Timer not started. Device not locked for debugging
7,809,923 UART: [kat] SHA2-256
7,989,011 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,000,627 UART: [kat] ++
8,001,178 UART: [kat] sha1
8,011,383 UART: [kat] SHA2-256
8,014,400 UART: [kat] SHA2-384
8,022,010 UART: [kat] SHA2-512-ACC
8,024,965 UART: [kat] ECC-384
10,469,363 UART: [kat] HMAC-384Kdf
10,482,508 UART: [kat] LMS
11,011,970 UART: [kat] --
11,016,508 UART: [cold-reset] ++
11,019,123 UART: [fht] FHT @ 0x50003400
11,028,809 UART: [idev] ++
11,029,380 UART: [idev] CDI.KEYID = 6
11,030,347 UART: [idev] SUBJECT.KEYID = 7
11,031,507 UART: [idev] UDS.KEYID = 0
11,034,248 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,178,102 UART: [idev] Erasing UDS.KEYID = 0
13,503,657 UART: [idev] Sha1 KeyId Algorithm
13,527,314 UART: [idev] --
13,532,494 UART: [ldev] ++
13,533,055 UART: [ldev] CDI.KEYID = 6
13,533,992 UART: [ldev] SUBJECT.KEYID = 5
13,535,199 UART: [ldev] AUTHORITY.KEYID = 7
13,536,435 UART: [ldev] FE.KEYID = 1
13,546,890 UART: [ldev] Erasing FE.KEYID = 1
16,020,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,739,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,755,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,770,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,786,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,807,150 UART: [ldev] --
17,811,670 UART: [fwproc] Wait for Commands...
17,814,651 UART: [fwproc] Recv command 0x46574c44
17,816,701 UART: [fwproc] Recv'd Img size: 114448 bytes
21,219,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,291,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,360,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,678,715 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,698,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,438,870 >>> mbox cmd response: failed
12,439,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,439,916 >>> mbox cmd response: failed
12,440,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,440,475 >>> mbox cmd response: failed
Initializing fuses
2,047,919 writing to cptra_bootfsm_go
11,121,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,692,731 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,440,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,284,327 >>> mbox cmd response: failed
12,284,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,285,238 >>> mbox cmd response: failed
12,285,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,285,806 >>> mbox cmd response: failed
Initializing fuses
2,055,221 writing to cptra_bootfsm_go
5,484,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,777,497 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
3,759,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,518,183 >>> mbox cmd response: failed
12,518,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,519,145 >>> mbox cmd response: failed
12,519,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,519,698 >>> mbox cmd response: failed
Initializing fuses
2,050,223 writing to cptra_bootfsm_go
11,111,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,320,903 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,393 UART: [kat] SHA2-256
882,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,439 UART: [kat] ++
886,591 UART: [kat] sha1
890,949 UART: [kat] SHA2-256
892,887 UART: [kat] SHA2-384
895,570 UART: [kat] SHA2-512-ACC
897,471 UART: [kat] ECC-384
903,068 UART: [kat] HMAC-384Kdf
907,660 UART: [kat] LMS
1,475,856 UART: [kat] --
1,476,971 UART: [cold-reset] ++
1,477,455 UART: [fht] Storing FHT @ 0x50003400
1,480,442 UART: [idev] ++
1,480,610 UART: [idev] CDI.KEYID = 6
1,480,970 UART: [idev] SUBJECT.KEYID = 7
1,481,394 UART: [idev] UDS.KEYID = 0
1,481,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,460 UART: [idev] Erasing UDS.KEYID = 0
1,506,002 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,516 UART: [idev] --
1,515,493 UART: [ldev] ++
1,515,661 UART: [ldev] CDI.KEYID = 6
1,516,024 UART: [ldev] SUBJECT.KEYID = 5
1,516,450 UART: [ldev] AUTHORITY.KEYID = 7
1,516,913 UART: [ldev] FE.KEYID = 1
1,521,989 UART: [ldev] Erasing FE.KEYID = 1
1,547,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,890 UART: [ldev] --
1,586,387 UART: [fwproc] Waiting for Commands...
1,587,068 UART: [fwproc] Received command 0x46574c44
1,587,859 UART: [fwproc] Received Image of size 114448 bytes
1,629,175 UART: ROM Fatal Error: 0x000B000F
1,630,334 >>> mbox cmd response: failed
1,630,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,340 >>> mbox cmd response: failed
1,630,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,267 UART: [kat] SHA2-256
882,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,313 UART: [kat] ++
886,465 UART: [kat] sha1
890,595 UART: [kat] SHA2-256
892,533 UART: [kat] SHA2-384
895,230 UART: [kat] SHA2-512-ACC
897,131 UART: [kat] ECC-384
902,804 UART: [kat] HMAC-384Kdf
907,308 UART: [kat] LMS
1,475,504 UART: [kat] --
1,476,267 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,704 UART: [idev] ++
1,479,872 UART: [idev] CDI.KEYID = 6
1,480,232 UART: [idev] SUBJECT.KEYID = 7
1,480,656 UART: [idev] UDS.KEYID = 0
1,481,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,726 UART: [idev] Erasing UDS.KEYID = 0
1,505,788 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,354 UART: [idev] --
1,515,315 UART: [ldev] ++
1,515,483 UART: [ldev] CDI.KEYID = 6
1,515,846 UART: [ldev] SUBJECT.KEYID = 5
1,516,272 UART: [ldev] AUTHORITY.KEYID = 7
1,516,735 UART: [ldev] FE.KEYID = 1
1,521,657 UART: [ldev] Erasing FE.KEYID = 1
1,546,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,592 UART: [ldev] --
1,586,025 UART: [fwproc] Waiting for Commands...
1,586,844 UART: [fwproc] Received command 0x46574c44
1,587,635 UART: [fwproc] Received Image of size 114448 bytes
2,886,799 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,357 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,656 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,483,505 >>> mbox cmd response: failed
1,483,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,511 >>> mbox cmd response: failed
1,483,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,470 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,230 UART: [kat] SHA2-256
882,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,276 UART: [kat] ++
886,428 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,405 UART: [kat] SHA2-512-ACC
897,306 UART: [kat] ECC-384
903,073 UART: [kat] HMAC-384Kdf
907,677 UART: [kat] LMS
1,475,873 UART: [kat] --
1,476,704 UART: [cold-reset] ++
1,477,038 UART: [fht] Storing FHT @ 0x50003400
1,479,723 UART: [idev] ++
1,479,891 UART: [idev] CDI.KEYID = 6
1,480,251 UART: [idev] SUBJECT.KEYID = 7
1,480,675 UART: [idev] UDS.KEYID = 0
1,481,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,953 UART: [idev] Erasing UDS.KEYID = 0
1,505,775 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,463 UART: [idev] --
1,515,656 UART: [ldev] ++
1,515,824 UART: [ldev] CDI.KEYID = 6
1,516,187 UART: [ldev] SUBJECT.KEYID = 5
1,516,613 UART: [ldev] AUTHORITY.KEYID = 7
1,517,076 UART: [ldev] FE.KEYID = 1
1,522,542 UART: [ldev] Erasing FE.KEYID = 1
1,548,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,087 UART: [ldev] --
1,587,380 UART: [fwproc] Waiting for Commands...
1,588,149 UART: [fwproc] Received command 0x46574c44
1,588,940 UART: [fwproc] Received Image of size 114448 bytes
1,630,236 UART: ROM Fatal Error: 0x000B000F
1,631,395 >>> mbox cmd response: failed
1,631,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,401 >>> mbox cmd response: failed
1,631,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
86,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,528 UART: [kat] SHA2-256
882,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,574 UART: [kat] ++
886,726 UART: [kat] sha1
890,872 UART: [kat] SHA2-256
892,810 UART: [kat] SHA2-384
895,559 UART: [kat] SHA2-512-ACC
897,460 UART: [kat] ECC-384
902,919 UART: [kat] HMAC-384Kdf
907,567 UART: [kat] LMS
1,475,763 UART: [kat] --
1,476,818 UART: [cold-reset] ++
1,477,168 UART: [fht] Storing FHT @ 0x50003400
1,479,977 UART: [idev] ++
1,480,145 UART: [idev] CDI.KEYID = 6
1,480,505 UART: [idev] SUBJECT.KEYID = 7
1,480,929 UART: [idev] UDS.KEYID = 0
1,481,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,321 UART: [idev] Erasing UDS.KEYID = 0
1,505,747 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,549 UART: [idev] --
1,515,404 UART: [ldev] ++
1,515,572 UART: [ldev] CDI.KEYID = 6
1,515,935 UART: [ldev] SUBJECT.KEYID = 5
1,516,361 UART: [ldev] AUTHORITY.KEYID = 7
1,516,824 UART: [ldev] FE.KEYID = 1
1,522,142 UART: [ldev] Erasing FE.KEYID = 1
1,547,453 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,505 UART: [ldev] --
1,586,950 UART: [fwproc] Waiting for Commands...
1,587,569 UART: [fwproc] Received command 0x46574c44
1,588,360 UART: [fwproc] Received Image of size 114448 bytes
2,888,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,844 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,196 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,123 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,260 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,483,398 >>> mbox cmd response: failed
1,483,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,404 >>> mbox cmd response: failed
1,483,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,931 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
893,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,241 UART: [kat] ++
897,393 UART: [kat] sha1
901,491 UART: [kat] SHA2-256
903,431 UART: [kat] SHA2-384
906,182 UART: [kat] SHA2-512-ACC
908,083 UART: [kat] ECC-384
917,738 UART: [kat] HMAC-384Kdf
922,108 UART: [kat] LMS
1,170,436 UART: [kat] --
1,171,617 UART: [cold-reset] ++
1,172,179 UART: [fht] FHT @ 0x50003400
1,174,896 UART: [idev] ++
1,175,064 UART: [idev] CDI.KEYID = 6
1,175,424 UART: [idev] SUBJECT.KEYID = 7
1,175,848 UART: [idev] UDS.KEYID = 0
1,176,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,074 UART: [idev] Erasing UDS.KEYID = 0
1,201,021 UART: [idev] Sha1 KeyId Algorithm
1,209,591 UART: [idev] --
1,210,733 UART: [ldev] ++
1,210,901 UART: [ldev] CDI.KEYID = 6
1,211,264 UART: [ldev] SUBJECT.KEYID = 5
1,211,690 UART: [ldev] AUTHORITY.KEYID = 7
1,212,153 UART: [ldev] FE.KEYID = 1
1,217,601 UART: [ldev] Erasing FE.KEYID = 1
1,243,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,495 UART: [ldev] --
1,282,894 UART: [fwproc] Wait for Commands...
1,283,476 UART: [fwproc] Recv command 0x46574c44
1,284,204 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,672 UART: ROM Fatal Error: 0x000B000F
1,326,831 >>> mbox cmd response: failed
1,326,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,837 >>> mbox cmd response: failed
1,326,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,843 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
893,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,477 UART: [kat] ++
897,629 UART: [kat] sha1
901,699 UART: [kat] SHA2-256
903,639 UART: [kat] SHA2-384
906,258 UART: [kat] SHA2-512-ACC
908,159 UART: [kat] ECC-384
917,438 UART: [kat] HMAC-384Kdf
922,006 UART: [kat] LMS
1,170,334 UART: [kat] --
1,171,369 UART: [cold-reset] ++
1,171,825 UART: [fht] FHT @ 0x50003400
1,174,430 UART: [idev] ++
1,174,598 UART: [idev] CDI.KEYID = 6
1,174,958 UART: [idev] SUBJECT.KEYID = 7
1,175,382 UART: [idev] UDS.KEYID = 0
1,175,727 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,246 UART: [idev] Erasing UDS.KEYID = 0
1,200,073 UART: [idev] Sha1 KeyId Algorithm
1,208,661 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,240 UART: [ldev] SUBJECT.KEYID = 5
1,210,666 UART: [ldev] AUTHORITY.KEYID = 7
1,211,129 UART: [ldev] FE.KEYID = 1
1,216,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,287 UART: [ldev] --
1,282,630 UART: [fwproc] Wait for Commands...
1,283,338 UART: [fwproc] Recv command 0x46574c44
1,284,066 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,014 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,223 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,198 >>> mbox cmd response: failed
1,182,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,204 >>> mbox cmd response: failed
1,182,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,210 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,878 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,415 UART: [kat] SHA2-256
894,065 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,190 UART: [kat] ++
898,342 UART: [kat] sha1
902,404 UART: [kat] SHA2-256
904,344 UART: [kat] SHA2-384
907,029 UART: [kat] SHA2-512-ACC
908,930 UART: [kat] ECC-384
918,447 UART: [kat] HMAC-384Kdf
923,071 UART: [kat] LMS
1,171,399 UART: [kat] --
1,172,258 UART: [cold-reset] ++
1,172,772 UART: [fht] FHT @ 0x50003400
1,175,377 UART: [idev] ++
1,175,545 UART: [idev] CDI.KEYID = 6
1,175,905 UART: [idev] SUBJECT.KEYID = 7
1,176,329 UART: [idev] UDS.KEYID = 0
1,176,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,049 UART: [idev] Erasing UDS.KEYID = 0
1,201,132 UART: [idev] Sha1 KeyId Algorithm
1,209,692 UART: [idev] --
1,210,970 UART: [ldev] ++
1,211,138 UART: [ldev] CDI.KEYID = 6
1,211,501 UART: [ldev] SUBJECT.KEYID = 5
1,211,927 UART: [ldev] AUTHORITY.KEYID = 7
1,212,390 UART: [ldev] FE.KEYID = 1
1,217,550 UART: [ldev] Erasing FE.KEYID = 1
1,244,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,050 UART: [ldev] --
1,283,401 UART: [fwproc] Wait for Commands...
1,284,007 UART: [fwproc] Recv command 0x46574c44
1,284,735 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,355 UART: ROM Fatal Error: 0x000B000F
1,327,514 >>> mbox cmd response: failed
1,327,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,520 >>> mbox cmd response: failed
1,327,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
87,016 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
893,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,054 UART: [kat] ++
898,206 UART: [kat] sha1
902,366 UART: [kat] SHA2-256
904,306 UART: [kat] SHA2-384
907,239 UART: [kat] SHA2-512-ACC
909,140 UART: [kat] ECC-384
919,679 UART: [kat] HMAC-384Kdf
924,401 UART: [kat] LMS
1,172,729 UART: [kat] --
1,173,654 UART: [cold-reset] ++
1,174,134 UART: [fht] FHT @ 0x50003400
1,176,943 UART: [idev] ++
1,177,111 UART: [idev] CDI.KEYID = 6
1,177,471 UART: [idev] SUBJECT.KEYID = 7
1,177,895 UART: [idev] UDS.KEYID = 0
1,178,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,013 UART: [idev] Erasing UDS.KEYID = 0
1,203,182 UART: [idev] Sha1 KeyId Algorithm
1,211,480 UART: [idev] --
1,212,366 UART: [ldev] ++
1,212,534 UART: [ldev] CDI.KEYID = 6
1,212,897 UART: [ldev] SUBJECT.KEYID = 5
1,213,323 UART: [ldev] AUTHORITY.KEYID = 7
1,213,786 UART: [ldev] FE.KEYID = 1
1,218,900 UART: [ldev] Erasing FE.KEYID = 1
1,245,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,420 UART: [ldev] --
1,284,861 UART: [fwproc] Wait for Commands...
1,285,629 UART: [fwproc] Recv command 0x46574c44
1,286,357 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,626 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,151 >>> mbox cmd response: failed
1,182,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,157 >>> mbox cmd response: failed
1,182,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,163 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,934 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,175 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
891,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,387 UART: [kat] ++
895,539 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,796 UART: [kat] SHA2-512-ACC
906,697 UART: [kat] ECC-384
916,730 UART: [kat] HMAC-384Kdf
921,272 UART: [kat] LMS
1,169,584 UART: [kat] --
1,170,251 UART: [cold-reset] ++
1,170,683 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,174,573 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,198,647 UART: [idev] Sha1 KeyId Algorithm
1,207,687 UART: [idev] --
1,208,754 UART: [ldev] ++
1,208,922 UART: [ldev] CDI.KEYID = 6
1,209,286 UART: [ldev] SUBJECT.KEYID = 5
1,209,713 UART: [ldev] AUTHORITY.KEYID = 7
1,210,176 UART: [ldev] FE.KEYID = 1
1,215,334 UART: [ldev] Erasing FE.KEYID = 1
1,241,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,474 UART: [ldev] --
1,280,878 UART: [fwproc] Wait for Commands...
1,281,625 UART: [fwproc] Recv command 0x46574c44
1,282,358 UART: [fwproc] Recv'd Img size: 114448 bytes
1,323,336 UART: ROM Fatal Error: 0x000B000F
1,324,495 >>> mbox cmd response: failed
1,324,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,501 >>> mbox cmd response: failed
1,324,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,710 UART: [kat] LMS
1,169,022 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,173,071 UART: [idev] ++
1,173,239 UART: [idev] CDI.KEYID = 6
1,173,600 UART: [idev] SUBJECT.KEYID = 7
1,174,025 UART: [idev] UDS.KEYID = 0
1,174,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,197,959 UART: [idev] Sha1 KeyId Algorithm
1,206,781 UART: [idev] --
1,207,662 UART: [ldev] ++
1,207,830 UART: [ldev] CDI.KEYID = 6
1,208,194 UART: [ldev] SUBJECT.KEYID = 5
1,208,621 UART: [ldev] AUTHORITY.KEYID = 7
1,209,084 UART: [ldev] FE.KEYID = 1
1,214,424 UART: [ldev] Erasing FE.KEYID = 1
1,240,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,788 UART: [ldev] --
1,280,222 UART: [fwproc] Wait for Commands...
1,281,015 UART: [fwproc] Recv command 0x46574c44
1,281,748 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,137 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,255 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,740 >>> mbox cmd response: failed
1,176,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,746 >>> mbox cmd response: failed
1,176,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,237 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
891,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,820 UART: [kat] ++
895,972 UART: [kat] sha1
900,284 UART: [kat] SHA2-256
902,224 UART: [kat] SHA2-384
904,981 UART: [kat] SHA2-512-ACC
906,882 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,057 UART: [kat] LMS
1,169,369 UART: [kat] --
1,170,192 UART: [cold-reset] ++
1,170,564 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,174,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,198,914 UART: [idev] Sha1 KeyId Algorithm
1,207,870 UART: [idev] --
1,208,823 UART: [ldev] ++
1,208,991 UART: [ldev] CDI.KEYID = 6
1,209,355 UART: [ldev] SUBJECT.KEYID = 5
1,209,782 UART: [ldev] AUTHORITY.KEYID = 7
1,210,245 UART: [ldev] FE.KEYID = 1
1,215,231 UART: [ldev] Erasing FE.KEYID = 1
1,241,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,311 UART: [ldev] --
1,280,761 UART: [fwproc] Wait for Commands...
1,281,436 UART: [fwproc] Recv command 0x46574c44
1,282,169 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,243 UART: ROM Fatal Error: 0x000B000F
1,325,402 >>> mbox cmd response: failed
1,325,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,408 >>> mbox cmd response: failed
1,325,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,774 UART: [fht] FHT @ 0x50003400
1,173,340 UART: [idev] ++
1,173,508 UART: [idev] CDI.KEYID = 6
1,173,869 UART: [idev] SUBJECT.KEYID = 7
1,174,294 UART: [idev] UDS.KEYID = 0
1,174,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,732 UART: [idev] Erasing UDS.KEYID = 0
1,198,464 UART: [idev] Sha1 KeyId Algorithm
1,207,374 UART: [idev] --
1,208,437 UART: [ldev] ++
1,208,605 UART: [ldev] CDI.KEYID = 6
1,208,969 UART: [ldev] SUBJECT.KEYID = 5
1,209,396 UART: [ldev] AUTHORITY.KEYID = 7
1,209,859 UART: [ldev] FE.KEYID = 1
1,215,215 UART: [ldev] Erasing FE.KEYID = 1
1,241,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,447 UART: [ldev] --
1,280,893 UART: [fwproc] Wait for Commands...
1,281,640 UART: [fwproc] Recv command 0x46574c44
1,282,373 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,624 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,674 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,255 >>> mbox cmd response: failed
1,180,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,261 >>> mbox cmd response: failed
1,180,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,676 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
192,179 UART:
192,538 UART: Running Caliptra ROM ...
193,656 UART:
193,803 UART: [state] CFI Enabled
262,960 UART: [state] LifecycleState = Unprovisioned
264,926 UART: [state] DebugLocked = No
267,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,837 UART: [kat] SHA2-256
442,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,074 UART: [kat] ++
454,018 UART: [kat] sha1
465,421 UART: [kat] SHA2-256
468,109 UART: [kat] SHA2-384
473,114 UART: [kat] SHA2-512-ACC
475,508 UART: [kat] ECC-384
2,765,539 UART: [kat] HMAC-384Kdf
2,778,481 UART: [kat] LMS
3,968,822 UART: [kat] --
3,974,489 UART: [cold-reset] ++
3,976,514 UART: [fht] Storing FHT @ 0x50003400
3,987,577 UART: [idev] ++
3,988,147 UART: [idev] CDI.KEYID = 6
3,989,130 UART: [idev] SUBJECT.KEYID = 7
3,990,347 UART: [idev] UDS.KEYID = 0
3,993,137 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,901 UART: [idev] Erasing UDS.KEYID = 0
7,326,822 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,506 UART: [idev] --
7,353,754 UART: [ldev] ++
7,354,333 UART: [ldev] CDI.KEYID = 6
7,355,307 UART: [ldev] SUBJECT.KEYID = 5
7,356,463 UART: [ldev] AUTHORITY.KEYID = 7
7,357,749 UART: [ldev] FE.KEYID = 1
7,400,510 UART: [ldev] Erasing FE.KEYID = 1
10,731,227 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,583 UART: [ldev] --
13,092,365 UART: [fwproc] Waiting for Commands...
13,094,336 UART: [fwproc] Received command 0x46574c44
13,096,539 UART: [fwproc] Received Image of size 114124 bytes
14,503,370 UART: ROM Fatal Error: 0x000B001A
14,506,794 >>> mbox cmd response: failed
14,507,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,507,545 >>> mbox cmd response: failed
14,507,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,508,110 >>> mbox cmd response: failed
Initializing fuses
2,059,362 writing to cptra_bootfsm_go
2,248,693 UART:
2,249,040 UART: Running Caliptra ROM ...
2,250,183 UART:
2,250,347 UART: [state] CFI Enabled
2,308,324 UART: [state] LifecycleState = Unprovisioned
2,310,256 UART: [state] DebugLocked = No
2,311,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,641 UART: [kat] SHA2-256
2,485,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,821 UART: [kat] ++
2,496,303 UART: [kat] sha1
2,506,886 UART: [kat] SHA2-256
2,509,553 UART: [kat] SHA2-384
2,516,048 UART: [kat] SHA2-512-ACC
2,518,408 UART: [kat] ECC-384
4,815,734 UART: [kat] HMAC-384Kdf
4,847,788 UART: [kat] LMS
6,038,068 UART: [kat] --
6,041,911 UART: [cold-reset] ++
6,042,880 UART: [fht] Storing FHT @ 0x50003400
6,053,448 UART: [idev] ++
6,054,026 UART: [idev] CDI.KEYID = 6
6,054,943 UART: [idev] SUBJECT.KEYID = 7
6,056,213 UART: [idev] UDS.KEYID = 0
6,058,681 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,202,361 UART: [idev] Erasing UDS.KEYID = 0
9,395,254 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,209 UART: [idev] --
9,422,425 UART: [ldev] ++
9,422,996 UART: [ldev] CDI.KEYID = 6
9,423,965 UART: [ldev] SUBJECT.KEYID = 5
9,425,285 UART: [ldev] AUTHORITY.KEYID = 7
9,426,486 UART: [ldev] FE.KEYID = 1
9,469,527 UART: [ldev] Erasing FE.KEYID = 1
12,804,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,129,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,143,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,158,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,173,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,191,537 UART: [ldev] --
15,196,801 UART: [fwproc] Waiting for Commands...
15,199,282 UART: [fwproc] Received command 0x46574c44
15,201,471 UART: [fwproc] Received Image of size 114124 bytes
19,252,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,327,646 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,396,514 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,713,962 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,806,508 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,253,147 >>> mbox cmd response: failed
14,253,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,254,045 >>> mbox cmd response: failed
14,254,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,254,602 >>> mbox cmd response: failed
Initializing fuses
2,050,150 writing to cptra_bootfsm_go
5,844,775 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,930,712 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
192,448 UART:
192,826 UART: Running Caliptra ROM ...
193,926 UART:
603,460 UART: [state] CFI Enabled
616,377 UART: [state] LifecycleState = Unprovisioned
618,307 UART: [state] DebugLocked = No
621,094 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,098 UART: [kat] SHA2-256
795,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,368 UART: [kat] ++
806,895 UART: [kat] sha1
818,427 UART: [kat] SHA2-256
821,166 UART: [kat] SHA2-384
826,923 UART: [kat] SHA2-512-ACC
829,318 UART: [kat] ECC-384
3,111,695 UART: [kat] HMAC-384Kdf
3,122,523 UART: [kat] LMS
4,312,857 UART: [kat] --
4,317,403 UART: [cold-reset] ++
4,319,554 UART: [fht] Storing FHT @ 0x50003400
4,329,687 UART: [idev] ++
4,330,255 UART: [idev] CDI.KEYID = 6
4,331,272 UART: [idev] SUBJECT.KEYID = 7
4,332,432 UART: [idev] UDS.KEYID = 0
4,335,119 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,478,583 UART: [idev] Erasing UDS.KEYID = 0
7,619,978 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,121 UART: [idev] --
7,647,090 UART: [ldev] ++
7,647,665 UART: [ldev] CDI.KEYID = 6
7,648,689 UART: [ldev] SUBJECT.KEYID = 5
7,649,867 UART: [ldev] AUTHORITY.KEYID = 7
7,651,099 UART: [ldev] FE.KEYID = 1
7,662,129 UART: [ldev] Erasing FE.KEYID = 1
10,947,312 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,811 UART: [ldev] --
13,307,755 UART: [fwproc] Waiting for Commands...
13,310,881 UART: [fwproc] Received command 0x46574c44
13,313,078 UART: [fwproc] Received Image of size 114124 bytes
14,703,515 UART: ROM Fatal Error: 0x000B001A
14,706,986 >>> mbox cmd response: failed
14,707,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,707,699 >>> mbox cmd response: failed
14,707,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,708,280 >>> mbox cmd response: failed
Initializing fuses
2,060,146 writing to cptra_bootfsm_go
2,249,527 UART:
2,249,878 UART: Running Caliptra ROM ...
2,251,022 UART:
5,761,290 UART: [state] CFI Enabled
5,777,396 UART: [state] LifecycleState = Unprovisioned
5,779,336 UART: [state] DebugLocked = No
5,781,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,786,775 UART: [kat] SHA2-256
5,956,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,967,073 UART: [kat] ++
5,967,544 UART: [kat] sha1
5,977,949 UART: [kat] SHA2-256
5,980,643 UART: [kat] SHA2-384
5,986,203 UART: [kat] SHA2-512-ACC
5,988,566 UART: [kat] ECC-384
8,273,895 UART: [kat] HMAC-384Kdf
8,286,599 UART: [kat] LMS
9,476,740 UART: [kat] --
9,481,657 UART: [cold-reset] ++
9,483,265 UART: [fht] Storing FHT @ 0x50003400
9,495,718 UART: [idev] ++
9,496,290 UART: [idev] CDI.KEYID = 6
9,497,308 UART: [idev] SUBJECT.KEYID = 7
9,498,466 UART: [idev] UDS.KEYID = 0
9,500,775 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
9,644,193 UART: [idev] Erasing UDS.KEYID = 0
12,789,470 UART: [idev] Using Sha1 for KeyId Algorithm
12,812,983 UART: [idev] --
12,816,733 UART: [ldev] ++
12,817,309 UART: [ldev] CDI.KEYID = 6
12,818,327 UART: [ldev] SUBJECT.KEYID = 5
12,819,518 UART: [ldev] AUTHORITY.KEYID = 7
12,820,755 UART: [ldev] FE.KEYID = 1
12,834,755 UART: [ldev] Erasing FE.KEYID = 1
16,120,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,412,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,426,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,441,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,456,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,474,088 UART: [ldev] --
18,478,649 UART: [fwproc] Waiting for Commands...
18,481,683 UART: [fwproc] Received command 0x46574c44
18,484,013 UART: [fwproc] Received Image of size 114124 bytes
22,533,547 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,603,439 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,672,330 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,988,998 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,133,397 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,459,201 >>> mbox cmd response: failed
14,459,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,460,196 >>> mbox cmd response: failed
14,460,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,460,706 >>> mbox cmd response: failed
Initializing fuses
2,051,175 writing to cptra_bootfsm_go
9,544,867 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,486,645 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,278 UART:
192,642 UART: Running Caliptra ROM ...
193,851 UART:
194,007 UART: [state] CFI Enabled
261,157 UART: [state] LifecycleState = Unprovisioned
263,042 UART: [state] DebugLocked = No
265,130 UART: [state] WD Timer not started. Device not locked for debugging
268,131 UART: [kat] SHA2-256
447,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,812 UART: [kat] ++
459,351 UART: [kat] sha1
470,776 UART: [kat] SHA2-256
473,789 UART: [kat] SHA2-384
479,963 UART: [kat] SHA2-512-ACC
482,916 UART: [kat] ECC-384
2,944,875 UART: [kat] HMAC-384Kdf
2,969,139 UART: [kat] LMS
3,498,593 UART: [kat] --
3,503,334 UART: [cold-reset] ++
3,504,359 UART: [fht] FHT @ 0x50003400
3,515,183 UART: [idev] ++
3,515,790 UART: [idev] CDI.KEYID = 6
3,516,729 UART: [idev] SUBJECT.KEYID = 7
3,517,838 UART: [idev] UDS.KEYID = 0
3,520,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,586 UART: [idev] Erasing UDS.KEYID = 0
6,021,409 UART: [idev] Sha1 KeyId Algorithm
6,044,446 UART: [idev] --
6,046,774 UART: [ldev] ++
6,047,358 UART: [ldev] CDI.KEYID = 6
6,048,270 UART: [ldev] SUBJECT.KEYID = 5
6,049,436 UART: [ldev] AUTHORITY.KEYID = 7
6,050,734 UART: [ldev] FE.KEYID = 1
6,095,951 UART: [ldev] Erasing FE.KEYID = 1
8,599,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,523 UART: [ldev] --
10,406,718 UART: [fwproc] Wait for Commands...
10,409,678 UART: [fwproc] Recv command 0x46574c44
10,411,778 UART: [fwproc] Recv'd Img size: 114448 bytes
11,489,216 UART: ROM Fatal Error: 0x000B001A
11,492,318 >>> mbox cmd response: failed
11,492,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,493,064 >>> mbox cmd response: failed
11,493,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,493,628 >>> mbox cmd response: failed
Initializing fuses
2,052,542 writing to cptra_bootfsm_go
2,241,874 UART:
2,242,236 UART: Running Caliptra ROM ...
2,243,318 UART:
2,243,481 UART: [state] CFI Enabled
2,305,580 UART: [state] LifecycleState = Unprovisioned
2,307,468 UART: [state] DebugLocked = No
2,309,088 UART: [state] WD Timer not started. Device not locked for debugging
2,312,088 UART: [kat] SHA2-256
2,491,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,502,792 UART: [kat] ++
2,503,350 UART: [kat] sha1
2,514,356 UART: [kat] SHA2-256
2,517,397 UART: [kat] SHA2-384
2,525,226 UART: [kat] SHA2-512-ACC
2,528,174 UART: [kat] ECC-384
4,992,049 UART: [kat] HMAC-384Kdf
5,015,479 UART: [kat] LMS
5,544,889 UART: [kat] --
5,549,099 UART: [cold-reset] ++
5,550,551 UART: [fht] FHT @ 0x50003400
5,560,078 UART: [idev] ++
5,560,649 UART: [idev] CDI.KEYID = 6
5,561,558 UART: [idev] SUBJECT.KEYID = 7
5,562,772 UART: [idev] UDS.KEYID = 0
5,565,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,709,483 UART: [idev] Erasing UDS.KEYID = 0
8,067,451 UART: [idev] Sha1 KeyId Algorithm
8,089,442 UART: [idev] --
8,093,839 UART: [ldev] ++
8,094,415 UART: [ldev] CDI.KEYID = 6
8,095,329 UART: [ldev] SUBJECT.KEYID = 5
8,096,492 UART: [ldev] AUTHORITY.KEYID = 7
8,097,889 UART: [ldev] FE.KEYID = 1
8,143,397 UART: [ldev] Erasing FE.KEYID = 1
10,645,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,361,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,377,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,393,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,408,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,430,140 UART: [ldev] --
12,434,450 UART: [fwproc] Wait for Commands...
12,436,010 UART: [fwproc] Recv command 0x46574c44
12,438,120 UART: [fwproc] Recv'd Img size: 114448 bytes
15,836,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,912,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,981,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,299,634 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,384,057 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,269,971 >>> mbox cmd response: failed
11,270,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,271,011 >>> mbox cmd response: failed
11,271,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,271,579 >>> mbox cmd response: failed
Initializing fuses
2,049,551 writing to cptra_bootfsm_go
5,400,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,065,510 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,499 UART:
192,871 UART: Running Caliptra ROM ...
194,043 UART:
603,548 UART: [state] CFI Enabled
616,441 UART: [state] LifecycleState = Unprovisioned
618,351 UART: [state] DebugLocked = No
619,523 UART: [state] WD Timer not started. Device not locked for debugging
623,676 UART: [kat] SHA2-256
802,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,396 UART: [kat] ++
814,930 UART: [kat] sha1
826,463 UART: [kat] SHA2-256
829,456 UART: [kat] SHA2-384
835,754 UART: [kat] SHA2-512-ACC
838,683 UART: [kat] ECC-384
3,279,100 UART: [kat] HMAC-384Kdf
3,292,037 UART: [kat] LMS
3,821,525 UART: [kat] --
3,826,481 UART: [cold-reset] ++
3,827,495 UART: [fht] FHT @ 0x50003400
3,837,877 UART: [idev] ++
3,838,439 UART: [idev] CDI.KEYID = 6
3,839,458 UART: [idev] SUBJECT.KEYID = 7
3,840,559 UART: [idev] UDS.KEYID = 0
3,843,348 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,293 UART: [idev] Erasing UDS.KEYID = 0
6,313,380 UART: [idev] Sha1 KeyId Algorithm
6,336,876 UART: [idev] --
6,340,815 UART: [ldev] ++
6,341,386 UART: [ldev] CDI.KEYID = 6
6,342,433 UART: [ldev] SUBJECT.KEYID = 5
6,343,562 UART: [ldev] AUTHORITY.KEYID = 7
6,344,738 UART: [ldev] FE.KEYID = 1
6,355,652 UART: [ldev] Erasing FE.KEYID = 1
8,830,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,661 UART: [ldev] --
10,620,180 UART: [fwproc] Wait for Commands...
10,622,339 UART: [fwproc] Recv command 0x46574c44
10,624,441 UART: [fwproc] Recv'd Img size: 114448 bytes
11,692,706 UART: ROM Fatal Error: 0x000B001A
11,695,776 >>> mbox cmd response: failed
11,696,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,696,525 >>> mbox cmd response: failed
11,696,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,697,102 >>> mbox cmd response: failed
Initializing fuses
2,052,122 writing to cptra_bootfsm_go
2,241,404 UART:
2,241,790 UART: Running Caliptra ROM ...
2,242,849 UART:
8,762,527 UART: [state] CFI Enabled
8,775,387 UART: [state] LifecycleState = Unprovisioned
8,777,252 UART: [state] DebugLocked = No
8,778,687 UART: [state] WD Timer not started. Device not locked for debugging
8,783,088 UART: [kat] SHA2-256
8,962,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,973,826 UART: [kat] ++
8,974,290 UART: [kat] sha1
8,985,066 UART: [kat] SHA2-256
8,988,095 UART: [kat] SHA2-384
8,993,793 UART: [kat] SHA2-512-ACC
8,996,750 UART: [kat] ECC-384
11,435,555 UART: [kat] HMAC-384Kdf
11,448,590 UART: [kat] LMS
11,978,095 UART: [kat] --
11,983,085 UART: [cold-reset] ++
11,984,854 UART: [fht] FHT @ 0x50003400
11,996,373 UART: [idev] ++
11,996,938 UART: [idev] CDI.KEYID = 6
11,997,902 UART: [idev] SUBJECT.KEYID = 7
11,999,059 UART: [idev] UDS.KEYID = 0
12,001,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,145,892 UART: [idev] Erasing UDS.KEYID = 0
14,473,038 UART: [idev] Sha1 KeyId Algorithm
14,495,619 UART: [idev] --
14,499,283 UART: [ldev] ++
14,499,853 UART: [ldev] CDI.KEYID = 6
14,500,762 UART: [ldev] SUBJECT.KEYID = 5
14,501,980 UART: [ldev] AUTHORITY.KEYID = 7
14,503,212 UART: [ldev] FE.KEYID = 1
14,513,214 UART: [ldev] Erasing FE.KEYID = 1
16,987,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,706,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,722,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,738,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,754,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,774,212 UART: [ldev] --
18,778,341 UART: [fwproc] Wait for Commands...
18,781,481 UART: [fwproc] Recv command 0x46574c44
18,783,577 UART: [fwproc] Recv'd Img size: 114448 bytes
22,186,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,254,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,323,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,640,630 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,694,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,479,760 >>> mbox cmd response: failed
11,480,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,480,644 >>> mbox cmd response: failed
11,480,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,481,259 >>> mbox cmd response: failed
Initializing fuses
2,055,220 writing to cptra_bootfsm_go
12,085,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,659,572 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,442,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,328,064 >>> mbox cmd response: failed
11,328,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,329,157 >>> mbox cmd response: failed
11,329,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,329,721 >>> mbox cmd response: failed
Initializing fuses
2,048,149 writing to cptra_bootfsm_go
5,488,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,789,947 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,760,073 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,556,798 >>> mbox cmd response: failed
11,557,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,557,747 >>> mbox cmd response: failed
11,558,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,558,307 >>> mbox cmd response: failed
Initializing fuses
2,055,119 writing to cptra_bootfsm_go
12,063,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,272,397 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,731 UART: [kat] SHA2-256
881,662 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,777 UART: [kat] ++
885,929 UART: [kat] sha1
890,077 UART: [kat] SHA2-256
892,015 UART: [kat] SHA2-384
894,730 UART: [kat] SHA2-512-ACC
896,631 UART: [kat] ECC-384
902,190 UART: [kat] HMAC-384Kdf
906,936 UART: [kat] LMS
1,475,132 UART: [kat] --
1,476,221 UART: [cold-reset] ++
1,476,663 UART: [fht] Storing FHT @ 0x50003400
1,479,562 UART: [idev] ++
1,479,730 UART: [idev] CDI.KEYID = 6
1,480,090 UART: [idev] SUBJECT.KEYID = 7
1,480,514 UART: [idev] UDS.KEYID = 0
1,480,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,746 UART: [idev] Erasing UDS.KEYID = 0
1,505,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,172 UART: [idev] --
1,515,369 UART: [ldev] ++
1,515,537 UART: [ldev] CDI.KEYID = 6
1,515,900 UART: [ldev] SUBJECT.KEYID = 5
1,516,326 UART: [ldev] AUTHORITY.KEYID = 7
1,516,789 UART: [ldev] FE.KEYID = 1
1,521,981 UART: [ldev] Erasing FE.KEYID = 1
1,547,328 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,184 UART: [ldev] --
1,586,575 UART: [fwproc] Waiting for Commands...
1,587,366 UART: [fwproc] Received command 0x46574c44
1,588,157 UART: [fwproc] Received Image of size 114448 bytes
1,627,479 UART: ROM Fatal Error: 0x000B001A
1,628,638 >>> mbox cmd response: failed
1,628,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,644 >>> mbox cmd response: failed
1,628,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
895,084 UART: [kat] SHA2-512-ACC
896,985 UART: [kat] ECC-384
902,732 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,437 UART: [cold-reset] ++
1,476,945 UART: [fht] Storing FHT @ 0x50003400
1,479,852 UART: [idev] ++
1,480,020 UART: [idev] CDI.KEYID = 6
1,480,380 UART: [idev] SUBJECT.KEYID = 7
1,480,804 UART: [idev] UDS.KEYID = 0
1,481,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,272 UART: [idev] Erasing UDS.KEYID = 0
1,504,352 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,018 UART: [idev] --
1,514,083 UART: [ldev] ++
1,514,251 UART: [ldev] CDI.KEYID = 6
1,514,614 UART: [ldev] SUBJECT.KEYID = 5
1,515,040 UART: [ldev] AUTHORITY.KEYID = 7
1,515,503 UART: [ldev] FE.KEYID = 1
1,520,497 UART: [ldev] Erasing FE.KEYID = 1
1,545,884 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,154 UART: [ldev] --
1,585,609 UART: [fwproc] Waiting for Commands...
1,586,472 UART: [fwproc] Received command 0x46574c44
1,587,263 UART: [fwproc] Received Image of size 114448 bytes
2,886,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,697 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,986 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,481,007 >>> mbox cmd response: failed
1,481,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,013 >>> mbox cmd response: failed
1,481,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,726 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
87,000 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,602 UART: [kat] SHA2-256
882,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,648 UART: [kat] ++
886,800 UART: [kat] sha1
891,014 UART: [kat] SHA2-256
892,952 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
903,373 UART: [kat] HMAC-384Kdf
907,903 UART: [kat] LMS
1,476,099 UART: [kat] --
1,476,988 UART: [cold-reset] ++
1,477,502 UART: [fht] Storing FHT @ 0x50003400
1,480,271 UART: [idev] ++
1,480,439 UART: [idev] CDI.KEYID = 6
1,480,799 UART: [idev] SUBJECT.KEYID = 7
1,481,223 UART: [idev] UDS.KEYID = 0
1,481,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,351 UART: [idev] Erasing UDS.KEYID = 0
1,506,517 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,141 UART: [idev] --
1,516,326 UART: [ldev] ++
1,516,494 UART: [ldev] CDI.KEYID = 6
1,516,857 UART: [ldev] SUBJECT.KEYID = 5
1,517,283 UART: [ldev] AUTHORITY.KEYID = 7
1,517,746 UART: [ldev] FE.KEYID = 1
1,523,204 UART: [ldev] Erasing FE.KEYID = 1
1,548,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,837 UART: [ldev] --
1,588,120 UART: [fwproc] Waiting for Commands...
1,588,869 UART: [fwproc] Received command 0x46574c44
1,589,660 UART: [fwproc] Received Image of size 114448 bytes
1,628,738 UART: ROM Fatal Error: 0x000B001A
1,629,897 >>> mbox cmd response: failed
1,629,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,903 >>> mbox cmd response: failed
1,629,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Unprovisioned
85,596 UART: [state] DebugLocked = No
86,326 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,970 UART: [kat] SHA2-256
881,901 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,016 UART: [kat] ++
886,168 UART: [kat] sha1
890,548 UART: [kat] SHA2-256
892,486 UART: [kat] SHA2-384
895,171 UART: [kat] SHA2-512-ACC
897,072 UART: [kat] ECC-384
902,667 UART: [kat] HMAC-384Kdf
907,283 UART: [kat] LMS
1,475,479 UART: [kat] --
1,476,286 UART: [cold-reset] ++
1,476,860 UART: [fht] Storing FHT @ 0x50003400
1,479,677 UART: [idev] ++
1,479,845 UART: [idev] CDI.KEYID = 6
1,480,205 UART: [idev] SUBJECT.KEYID = 7
1,480,629 UART: [idev] UDS.KEYID = 0
1,480,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,649 UART: [idev] Erasing UDS.KEYID = 0
1,504,903 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,385 UART: [idev] --
1,514,236 UART: [ldev] ++
1,514,404 UART: [ldev] CDI.KEYID = 6
1,514,767 UART: [ldev] SUBJECT.KEYID = 5
1,515,193 UART: [ldev] AUTHORITY.KEYID = 7
1,515,656 UART: [ldev] FE.KEYID = 1
1,520,812 UART: [ldev] Erasing FE.KEYID = 1
1,546,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,873 UART: [ldev] --
1,585,226 UART: [fwproc] Waiting for Commands...
1,586,037 UART: [fwproc] Received command 0x46574c44
1,586,828 UART: [fwproc] Received Image of size 114448 bytes
2,885,924 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,024 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,376 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,339 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,528 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,480,368 >>> mbox cmd response: failed
1,480,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,374 >>> mbox cmd response: failed
1,480,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,635 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,873 UART: [state] WD Timer not started. Device not locked for debugging
88,038 UART: [kat] SHA2-256
893,688 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,813 UART: [kat] ++
897,965 UART: [kat] sha1
902,227 UART: [kat] SHA2-256
904,167 UART: [kat] SHA2-384
907,030 UART: [kat] SHA2-512-ACC
908,931 UART: [kat] ECC-384
918,664 UART: [kat] HMAC-384Kdf
923,256 UART: [kat] LMS
1,171,584 UART: [kat] --
1,172,459 UART: [cold-reset] ++
1,172,843 UART: [fht] FHT @ 0x50003400
1,175,340 UART: [idev] ++
1,175,508 UART: [idev] CDI.KEYID = 6
1,175,868 UART: [idev] SUBJECT.KEYID = 7
1,176,292 UART: [idev] UDS.KEYID = 0
1,176,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,598 UART: [idev] Erasing UDS.KEYID = 0
1,201,693 UART: [idev] Sha1 KeyId Algorithm
1,210,071 UART: [idev] --
1,210,963 UART: [ldev] ++
1,211,131 UART: [ldev] CDI.KEYID = 6
1,211,494 UART: [ldev] SUBJECT.KEYID = 5
1,211,920 UART: [ldev] AUTHORITY.KEYID = 7
1,212,383 UART: [ldev] FE.KEYID = 1
1,217,649 UART: [ldev] Erasing FE.KEYID = 1
1,244,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,215 UART: [ldev] --
1,283,696 UART: [fwproc] Wait for Commands...
1,284,404 UART: [fwproc] Recv command 0x46574c44
1,285,132 UART: [fwproc] Recv'd Img size: 114448 bytes
1,323,754 UART: ROM Fatal Error: 0x000B001A
1,324,913 >>> mbox cmd response: failed
1,324,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,919 >>> mbox cmd response: failed
1,324,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,007 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
892,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,061 UART: [kat] ++
897,213 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,144 UART: [kat] SHA2-512-ACC
908,045 UART: [kat] ECC-384
917,620 UART: [kat] HMAC-384Kdf
922,160 UART: [kat] LMS
1,170,488 UART: [kat] --
1,171,599 UART: [cold-reset] ++
1,172,011 UART: [fht] FHT @ 0x50003400
1,174,684 UART: [idev] ++
1,174,852 UART: [idev] CDI.KEYID = 6
1,175,212 UART: [idev] SUBJECT.KEYID = 7
1,175,636 UART: [idev] UDS.KEYID = 0
1,175,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,494 UART: [idev] Erasing UDS.KEYID = 0
1,200,279 UART: [idev] Sha1 KeyId Algorithm
1,208,801 UART: [idev] --
1,209,759 UART: [ldev] ++
1,209,927 UART: [ldev] CDI.KEYID = 6
1,210,290 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,315 UART: [ldev] Erasing FE.KEYID = 1
1,242,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,951 UART: [ldev] --
1,281,332 UART: [fwproc] Wait for Commands...
1,282,062 UART: [fwproc] Recv command 0x46574c44
1,282,790 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,729 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,352 >>> mbox cmd response: failed
1,178,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,358 >>> mbox cmd response: failed
1,178,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,470 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,903 UART: [state] LifecycleState = Unprovisioned
86,558 UART: [state] DebugLocked = No
87,226 UART: [state] WD Timer not started. Device not locked for debugging
88,437 UART: [kat] SHA2-256
894,087 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,212 UART: [kat] ++
898,364 UART: [kat] sha1
902,482 UART: [kat] SHA2-256
904,422 UART: [kat] SHA2-384
907,207 UART: [kat] SHA2-512-ACC
909,108 UART: [kat] ECC-384
918,991 UART: [kat] HMAC-384Kdf
923,641 UART: [kat] LMS
1,171,969 UART: [kat] --
1,172,786 UART: [cold-reset] ++
1,173,270 UART: [fht] FHT @ 0x50003400
1,175,987 UART: [idev] ++
1,176,155 UART: [idev] CDI.KEYID = 6
1,176,515 UART: [idev] SUBJECT.KEYID = 7
1,176,939 UART: [idev] UDS.KEYID = 0
1,177,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,349 UART: [idev] Erasing UDS.KEYID = 0
1,201,902 UART: [idev] Sha1 KeyId Algorithm
1,210,398 UART: [idev] --
1,211,534 UART: [ldev] ++
1,211,702 UART: [ldev] CDI.KEYID = 6
1,212,065 UART: [ldev] SUBJECT.KEYID = 5
1,212,491 UART: [ldev] AUTHORITY.KEYID = 7
1,212,954 UART: [ldev] FE.KEYID = 1
1,218,122 UART: [ldev] Erasing FE.KEYID = 1
1,244,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,802 UART: [ldev] --
1,284,231 UART: [fwproc] Wait for Commands...
1,284,987 UART: [fwproc] Recv command 0x46574c44
1,285,715 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,687 UART: ROM Fatal Error: 0x000B001A
1,325,846 >>> mbox cmd response: failed
1,325,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,852 >>> mbox cmd response: failed
1,325,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
893,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,738 UART: [kat] ++
897,890 UART: [kat] sha1
902,154 UART: [kat] SHA2-256
904,094 UART: [kat] SHA2-384
906,649 UART: [kat] SHA2-512-ACC
908,550 UART: [kat] ECC-384
917,909 UART: [kat] HMAC-384Kdf
922,355 UART: [kat] LMS
1,170,683 UART: [kat] --
1,171,686 UART: [cold-reset] ++
1,172,240 UART: [fht] FHT @ 0x50003400
1,174,725 UART: [idev] ++
1,174,893 UART: [idev] CDI.KEYID = 6
1,175,253 UART: [idev] SUBJECT.KEYID = 7
1,175,677 UART: [idev] UDS.KEYID = 0
1,176,022 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,869 UART: [idev] Erasing UDS.KEYID = 0
1,200,930 UART: [idev] Sha1 KeyId Algorithm
1,209,484 UART: [idev] --
1,210,468 UART: [ldev] ++
1,210,636 UART: [ldev] CDI.KEYID = 6
1,210,999 UART: [ldev] SUBJECT.KEYID = 5
1,211,425 UART: [ldev] AUTHORITY.KEYID = 7
1,211,888 UART: [ldev] FE.KEYID = 1
1,217,368 UART: [ldev] Erasing FE.KEYID = 1
1,243,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,948 UART: [ldev] --
1,283,323 UART: [fwproc] Wait for Commands...
1,284,011 UART: [fwproc] Recv command 0x46574c44
1,284,739 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,191 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,522 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,992 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,805 >>> mbox cmd response: failed
1,180,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,811 >>> mbox cmd response: failed
1,180,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,445 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,278 UART: [kat] SHA2-512-ACC
906,179 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,174,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,247 UART: [idev] Erasing UDS.KEYID = 0
1,199,823 UART: [idev] Sha1 KeyId Algorithm
1,208,623 UART: [idev] --
1,209,530 UART: [ldev] ++
1,209,698 UART: [ldev] CDI.KEYID = 6
1,210,062 UART: [ldev] SUBJECT.KEYID = 5
1,210,489 UART: [ldev] AUTHORITY.KEYID = 7
1,210,952 UART: [ldev] FE.KEYID = 1
1,216,014 UART: [ldev] Erasing FE.KEYID = 1
1,242,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,338 UART: [ldev] --
1,281,646 UART: [fwproc] Wait for Commands...
1,282,307 UART: [fwproc] Recv command 0x46574c44
1,283,040 UART: [fwproc] Recv'd Img size: 114448 bytes
1,322,585 UART: ROM Fatal Error: 0x000B001A
1,323,744 >>> mbox cmd response: failed
1,323,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,750 >>> mbox cmd response: failed
1,323,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,756 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,593 UART: [kat] SHA2-256
901,533 UART: [kat] SHA2-384
904,102 UART: [kat] SHA2-512-ACC
906,003 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,669 UART: [cold-reset] ++
1,170,029 UART: [fht] FHT @ 0x50003400
1,172,563 UART: [idev] ++
1,172,731 UART: [idev] CDI.KEYID = 6
1,173,092 UART: [idev] SUBJECT.KEYID = 7
1,173,517 UART: [idev] UDS.KEYID = 0
1,173,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,885 UART: [idev] Erasing UDS.KEYID = 0
1,198,963 UART: [idev] Sha1 KeyId Algorithm
1,207,903 UART: [idev] --
1,208,928 UART: [ldev] ++
1,209,096 UART: [ldev] CDI.KEYID = 6
1,209,460 UART: [ldev] SUBJECT.KEYID = 5
1,209,887 UART: [ldev] AUTHORITY.KEYID = 7
1,210,350 UART: [ldev] FE.KEYID = 1
1,215,242 UART: [ldev] Erasing FE.KEYID = 1
1,241,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,304 UART: [ldev] --
1,280,628 UART: [fwproc] Wait for Commands...
1,281,271 UART: [fwproc] Recv command 0x46574c44
1,282,004 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,331 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,353 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,174,003 >>> mbox cmd response: failed
1,174,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,009 >>> mbox cmd response: failed
1,174,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,015 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,503 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,174,526 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,970 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,691 UART: [ldev] ++
1,209,859 UART: [ldev] CDI.KEYID = 6
1,210,223 UART: [ldev] SUBJECT.KEYID = 5
1,210,650 UART: [ldev] AUTHORITY.KEYID = 7
1,211,113 UART: [ldev] FE.KEYID = 1
1,216,291 UART: [ldev] Erasing FE.KEYID = 1
1,243,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,229 UART: [ldev] --
1,282,533 UART: [fwproc] Wait for Commands...
1,283,218 UART: [fwproc] Recv command 0x46574c44
1,283,951 UART: [fwproc] Recv'd Img size: 114448 bytes
1,322,710 UART: ROM Fatal Error: 0x000B001A
1,323,869 >>> mbox cmd response: failed
1,323,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,875 >>> mbox cmd response: failed
1,323,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,881 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,873 UART: [state] LifecycleState = Unprovisioned
85,528 UART: [state] DebugLocked = No
86,022 UART: [state] WD Timer not started. Device not locked for debugging
87,237 UART: [kat] SHA2-256
890,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,916 UART: [kat] ++
895,068 UART: [kat] sha1
899,158 UART: [kat] SHA2-256
901,098 UART: [kat] SHA2-384
903,835 UART: [kat] SHA2-512-ACC
905,736 UART: [kat] ECC-384
915,413 UART: [kat] HMAC-384Kdf
919,961 UART: [kat] LMS
1,168,273 UART: [kat] --
1,168,990 UART: [cold-reset] ++
1,169,568 UART: [fht] FHT @ 0x50003400
1,172,170 UART: [idev] ++
1,172,338 UART: [idev] CDI.KEYID = 6
1,172,699 UART: [idev] SUBJECT.KEYID = 7
1,173,124 UART: [idev] UDS.KEYID = 0
1,173,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,056 UART: [idev] Erasing UDS.KEYID = 0
1,198,000 UART: [idev] Sha1 KeyId Algorithm
1,206,936 UART: [idev] --
1,207,909 UART: [ldev] ++
1,208,077 UART: [ldev] CDI.KEYID = 6
1,208,441 UART: [ldev] SUBJECT.KEYID = 5
1,208,868 UART: [ldev] AUTHORITY.KEYID = 7
1,209,331 UART: [ldev] FE.KEYID = 1
1,214,361 UART: [ldev] Erasing FE.KEYID = 1
1,240,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,695 UART: [ldev] --
1,280,061 UART: [fwproc] Wait for Commands...
1,280,716 UART: [fwproc] Recv command 0x46574c44
1,281,449 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,478 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,454 >>> mbox cmd response: failed
1,176,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,460 >>> mbox cmd response: failed
1,176,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,466 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,658 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
4,878,150 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,354,365 >>> mbox cmd response: failed
15,355,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,355,525 >>> mbox cmd response: failed
15,355,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,356,085 >>> mbox cmd response: failed
Initializing fuses
2,055,991 writing to cptra_bootfsm_go
6,925,319 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,481,327 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
4,880,153 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,332,763 >>> mbox cmd response: failed
15,333,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,333,744 >>> mbox cmd response: failed
15,334,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,334,307 >>> mbox cmd response: failed
Initializing fuses
2,064,532 writing to cptra_bootfsm_go
6,925,646 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,507,219 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
5,191,741 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,505,123 >>> mbox cmd response: failed
15,505,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,505,955 >>> mbox cmd response: failed
15,506,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,506,522 >>> mbox cmd response: failed
Initializing fuses
2,068,072 writing to cptra_bootfsm_go
9,547,076 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,995,705 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
5,187,255 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,506,657 >>> mbox cmd response: failed
15,507,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,507,697 >>> mbox cmd response: failed
15,507,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,508,261 >>> mbox cmd response: failed
Initializing fuses
2,056,941 writing to cptra_bootfsm_go
9,553,452 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,984,783 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,440,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,454,505 >>> mbox cmd response: failed
11,455,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,455,573 >>> mbox cmd response: failed
11,455,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,456,137 >>> mbox cmd response: failed
Initializing fuses
2,052,618 writing to cptra_bootfsm_go
5,507,428 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,316,856 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,462,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,473,109 >>> mbox cmd response: failed
11,473,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,474,241 >>> mbox cmd response: failed
11,474,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,474,805 >>> mbox cmd response: failed
Initializing fuses
2,054,576 writing to cptra_bootfsm_go
5,530,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,365,607 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
3,787,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,668,038 >>> mbox cmd response: failed
11,668,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,668,953 >>> mbox cmd response: failed
11,669,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,669,505 >>> mbox cmd response: failed
Initializing fuses
2,059,811 writing to cptra_bootfsm_go
11,985,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,735,599 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
3,792,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,683,707 >>> mbox cmd response: failed
11,684,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,684,599 >>> mbox cmd response: failed
11,684,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,685,214 >>> mbox cmd response: failed
Initializing fuses
2,056,668 writing to cptra_bootfsm_go
11,966,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,699,124 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,441,068 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,403,257 >>> mbox cmd response: failed
11,404,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,404,422 >>> mbox cmd response: failed
11,404,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,404,986 >>> mbox cmd response: failed
Initializing fuses
2,062,497 writing to cptra_bootfsm_go
5,539,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,388,008 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,780,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,644,340 >>> mbox cmd response: failed
11,645,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,645,498 >>> mbox cmd response: failed
11,645,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,646,081 >>> mbox cmd response: failed
Initializing fuses
2,059,938 writing to cptra_bootfsm_go
12,002,248 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,742,860 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,293 >>> mbox cmd response: failed
1,197,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,299 >>> mbox cmd response: failed
1,197,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,305 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,085 UART: [kat] SHA2-256
882,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,131 UART: [kat] ++
886,283 UART: [kat] sha1
890,705 UART: [kat] SHA2-256
892,643 UART: [kat] SHA2-384
895,482 UART: [kat] SHA2-512-ACC
897,383 UART: [kat] ECC-384
902,788 UART: [kat] HMAC-384Kdf
907,198 UART: [kat] LMS
1,475,394 UART: [kat] --
1,476,095 UART: [cold-reset] ++
1,476,537 UART: [fht] Storing FHT @ 0x50003400
1,479,364 UART: [idev] ++
1,479,532 UART: [idev] CDI.KEYID = 6
1,479,892 UART: [idev] SUBJECT.KEYID = 7
1,480,316 UART: [idev] UDS.KEYID = 0
1,480,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,606 UART: [idev] Erasing UDS.KEYID = 0
1,505,228 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,770 UART: [idev] --
1,514,797 UART: [ldev] ++
1,514,965 UART: [ldev] CDI.KEYID = 6
1,515,328 UART: [ldev] SUBJECT.KEYID = 5
1,515,754 UART: [ldev] AUTHORITY.KEYID = 7
1,516,217 UART: [ldev] FE.KEYID = 1
1,521,203 UART: [ldev] Erasing FE.KEYID = 1
1,545,606 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,670 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,854 UART: [fwproc] Received command 0x46574c44
1,586,645 UART: [fwproc] Received Image of size 114448 bytes
2,886,241 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,421 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,780 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,200,289 >>> mbox cmd response: failed
1,200,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,295 >>> mbox cmd response: failed
1,200,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,458 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,200,262 >>> mbox cmd response: failed
1,200,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,268 >>> mbox cmd response: failed
1,200,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,056 UART: [kat] SHA2-256
881,987 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,102 UART: [kat] ++
886,254 UART: [kat] sha1
890,470 UART: [kat] SHA2-256
892,408 UART: [kat] SHA2-384
895,011 UART: [kat] SHA2-512-ACC
896,912 UART: [kat] ECC-384
902,813 UART: [kat] HMAC-384Kdf
907,517 UART: [kat] LMS
1,475,713 UART: [kat] --
1,476,450 UART: [cold-reset] ++
1,476,918 UART: [fht] Storing FHT @ 0x50003400
1,479,711 UART: [idev] ++
1,479,879 UART: [idev] CDI.KEYID = 6
1,480,239 UART: [idev] SUBJECT.KEYID = 7
1,480,663 UART: [idev] UDS.KEYID = 0
1,481,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,855 UART: [idev] Erasing UDS.KEYID = 0
1,505,315 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,837 UART: [idev] --
1,514,962 UART: [ldev] ++
1,515,130 UART: [ldev] CDI.KEYID = 6
1,515,493 UART: [ldev] SUBJECT.KEYID = 5
1,515,919 UART: [ldev] AUTHORITY.KEYID = 7
1,516,382 UART: [ldev] FE.KEYID = 1
1,521,892 UART: [ldev] Erasing FE.KEYID = 1
1,547,587 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,323 UART: [ldev] --
1,586,780 UART: [fwproc] Waiting for Commands...
1,587,593 UART: [fwproc] Received command 0x46574c44
1,588,384 UART: [fwproc] Received Image of size 114448 bytes
2,887,870 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,604 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,956 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,055 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,950 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,200,288 >>> mbox cmd response: failed
1,200,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,294 >>> mbox cmd response: failed
1,200,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,951 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,198,919 >>> mbox cmd response: failed
1,198,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,925 >>> mbox cmd response: failed
1,198,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,618 UART: [state] LifecycleState = Unprovisioned
85,273 UART: [state] DebugLocked = No
85,913 UART: [state] WD Timer not started. Device not locked for debugging
87,196 UART: [kat] SHA2-256
892,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,971 UART: [kat] ++
897,123 UART: [kat] sha1
901,431 UART: [kat] SHA2-256
903,371 UART: [kat] SHA2-384
906,118 UART: [kat] SHA2-512-ACC
908,019 UART: [kat] ECC-384
917,622 UART: [kat] HMAC-384Kdf
922,224 UART: [kat] LMS
1,170,552 UART: [kat] --
1,171,369 UART: [cold-reset] ++
1,171,705 UART: [fht] FHT @ 0x50003400
1,174,478 UART: [idev] ++
1,174,646 UART: [idev] CDI.KEYID = 6
1,175,006 UART: [idev] SUBJECT.KEYID = 7
1,175,430 UART: [idev] UDS.KEYID = 0
1,175,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,622 UART: [idev] Erasing UDS.KEYID = 0
1,200,237 UART: [idev] Sha1 KeyId Algorithm
1,208,719 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,258 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,215,991 UART: [ldev] Erasing FE.KEYID = 1
1,241,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,993 UART: [ldev] --
1,281,368 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,782 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,650 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,757 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,198,839 >>> mbox cmd response: failed
1,198,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,845 >>> mbox cmd response: failed
1,198,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,485 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,671 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,199,564 >>> mbox cmd response: failed
1,199,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,570 >>> mbox cmd response: failed
1,199,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
893,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,526 UART: [kat] ++
897,678 UART: [kat] sha1
901,848 UART: [kat] SHA2-256
903,788 UART: [kat] SHA2-384
906,547 UART: [kat] SHA2-512-ACC
908,448 UART: [kat] ECC-384
918,229 UART: [kat] HMAC-384Kdf
922,715 UART: [kat] LMS
1,171,043 UART: [kat] --
1,172,020 UART: [cold-reset] ++
1,172,472 UART: [fht] FHT @ 0x50003400
1,175,205 UART: [idev] ++
1,175,373 UART: [idev] CDI.KEYID = 6
1,175,733 UART: [idev] SUBJECT.KEYID = 7
1,176,157 UART: [idev] UDS.KEYID = 0
1,176,502 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,001 UART: [idev] Erasing UDS.KEYID = 0
1,201,214 UART: [idev] Sha1 KeyId Algorithm
1,209,672 UART: [idev] --
1,210,730 UART: [ldev] ++
1,210,898 UART: [ldev] CDI.KEYID = 6
1,211,261 UART: [ldev] SUBJECT.KEYID = 5
1,211,687 UART: [ldev] AUTHORITY.KEYID = 7
1,212,150 UART: [ldev] FE.KEYID = 1
1,217,566 UART: [ldev] Erasing FE.KEYID = 1
1,243,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,418 UART: [ldev] --
1,282,839 UART: [fwproc] Wait for Commands...
1,283,543 UART: [fwproc] Recv command 0x46574c44
1,284,271 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,191 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,480 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,216 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,199,860 >>> mbox cmd response: failed
1,199,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,866 >>> mbox cmd response: failed
1,199,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,413 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,198,445 >>> mbox cmd response: failed
1,198,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,451 >>> mbox cmd response: failed
1,198,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
890,792 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,921 UART: [kat] ++
895,073 UART: [kat] sha1
899,291 UART: [kat] SHA2-256
901,231 UART: [kat] SHA2-384
904,002 UART: [kat] SHA2-512-ACC
905,903 UART: [kat] ECC-384
915,458 UART: [kat] HMAC-384Kdf
920,094 UART: [kat] LMS
1,168,406 UART: [kat] --
1,169,163 UART: [cold-reset] ++
1,169,609 UART: [fht] FHT @ 0x50003400
1,172,319 UART: [idev] ++
1,172,487 UART: [idev] CDI.KEYID = 6
1,172,848 UART: [idev] SUBJECT.KEYID = 7
1,173,273 UART: [idev] UDS.KEYID = 0
1,173,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,365 UART: [idev] Erasing UDS.KEYID = 0
1,198,683 UART: [idev] Sha1 KeyId Algorithm
1,207,533 UART: [idev] --
1,208,544 UART: [ldev] ++
1,208,712 UART: [ldev] CDI.KEYID = 6
1,209,076 UART: [ldev] SUBJECT.KEYID = 5
1,209,503 UART: [ldev] AUTHORITY.KEYID = 7
1,209,966 UART: [ldev] FE.KEYID = 1
1,214,846 UART: [ldev] Erasing FE.KEYID = 1
1,241,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,360 UART: [ldev] --
1,280,708 UART: [fwproc] Wait for Commands...
1,281,465 UART: [fwproc] Recv command 0x46574c44
1,282,198 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,507 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,753 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,199,255 >>> mbox cmd response: failed
1,199,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,261 >>> mbox cmd response: failed
1,199,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,829 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,400 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,200,016 >>> mbox cmd response: failed
1,200,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,022 >>> mbox cmd response: failed
1,200,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,116 UART: [state] WD Timer not started. Device not locked for debugging
88,393 UART: [kat] SHA2-256
891,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,072 UART: [kat] ++
896,224 UART: [kat] sha1
900,476 UART: [kat] SHA2-256
902,416 UART: [kat] SHA2-384
905,333 UART: [kat] SHA2-512-ACC
907,234 UART: [kat] ECC-384
917,633 UART: [kat] HMAC-384Kdf
922,169 UART: [kat] LMS
1,170,481 UART: [kat] --
1,171,550 UART: [cold-reset] ++
1,172,016 UART: [fht] FHT @ 0x50003400
1,174,572 UART: [idev] ++
1,174,740 UART: [idev] CDI.KEYID = 6
1,175,101 UART: [idev] SUBJECT.KEYID = 7
1,175,526 UART: [idev] UDS.KEYID = 0
1,175,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,380 UART: [idev] Erasing UDS.KEYID = 0
1,200,652 UART: [idev] Sha1 KeyId Algorithm
1,209,556 UART: [idev] --
1,210,455 UART: [ldev] ++
1,210,623 UART: [ldev] CDI.KEYID = 6
1,210,987 UART: [ldev] SUBJECT.KEYID = 5
1,211,414 UART: [ldev] AUTHORITY.KEYID = 7
1,211,877 UART: [ldev] FE.KEYID = 1
1,217,203 UART: [ldev] Erasing FE.KEYID = 1
1,243,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,005 UART: [ldev] --
1,283,399 UART: [fwproc] Wait for Commands...
1,284,210 UART: [fwproc] Recv command 0x46574c44
1,284,943 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,738 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,802 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,198,550 >>> mbox cmd response: failed
1,198,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,556 >>> mbox cmd response: failed
1,198,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,562 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,662 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,195 UART:
192,545 UART: Running Caliptra ROM ...
193,666 UART:
193,812 UART: [state] CFI Enabled
266,511 UART: [state] LifecycleState = Unprovisioned
268,509 UART: [state] DebugLocked = No
269,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,695 UART: [kat] SHA2-256
445,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,896 UART: [kat] ++
456,376 UART: [kat] sha1
467,796 UART: [kat] SHA2-256
470,475 UART: [kat] SHA2-384
477,214 UART: [kat] SHA2-512-ACC
479,607 UART: [kat] ECC-384
2,766,990 UART: [kat] HMAC-384Kdf
2,780,382 UART: [kat] LMS
3,970,684 UART: [kat] --
3,974,896 UART: [cold-reset] ++
3,977,152 UART: [fht] Storing FHT @ 0x50003400
3,987,827 UART: [idev] ++
3,988,407 UART: [idev] CDI.KEYID = 6
3,989,373 UART: [idev] SUBJECT.KEYID = 7
3,990,587 UART: [idev] UDS.KEYID = 0
3,993,354 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,511 UART: [idev] Erasing UDS.KEYID = 0
7,327,685 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,907 UART: [idev] --
7,352,283 UART: [ldev] ++
7,352,862 UART: [ldev] CDI.KEYID = 6
7,353,828 UART: [ldev] SUBJECT.KEYID = 5
7,354,990 UART: [ldev] AUTHORITY.KEYID = 7
7,356,281 UART: [ldev] FE.KEYID = 1
7,404,462 UART: [ldev] Erasing FE.KEYID = 1
10,735,203 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,838 UART: [ldev] --
13,118,993 UART: [fwproc] Waiting for Commands...
13,121,377 UART: [fwproc] Received command 0x46574c44
13,123,618 UART: [fwproc] Received Image of size 114124 bytes
20,403,442 UART: ROM Fatal Error: 0x000B0038
20,406,846 >>> mbox cmd response: failed
20,407,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,407,631 >>> mbox cmd response: failed
20,407,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,408,193 >>> mbox cmd response: failed
Initializing fuses
2,056,224 writing to cptra_bootfsm_go
2,245,542 UART:
2,245,883 UART: Running Caliptra ROM ...
2,247,024 UART:
2,247,198 UART: [state] CFI Enabled
2,313,646 UART: [state] LifecycleState = Unprovisioned
2,315,581 UART: [state] DebugLocked = No
2,318,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,854 UART: [kat] SHA2-256
2,492,590 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,083 UART: [kat] ++
2,503,554 UART: [kat] sha1
2,514,333 UART: [kat] SHA2-256
2,517,027 UART: [kat] SHA2-384
2,521,664 UART: [kat] SHA2-512-ACC
2,524,022 UART: [kat] ECC-384
4,814,701 UART: [kat] HMAC-384Kdf
4,847,116 UART: [kat] LMS
6,037,405 UART: [kat] --
6,042,208 UART: [cold-reset] ++
6,043,148 UART: [fht] Storing FHT @ 0x50003400
6,054,759 UART: [idev] ++
6,055,385 UART: [idev] CDI.KEYID = 6
6,056,295 UART: [idev] SUBJECT.KEYID = 7
6,057,568 UART: [idev] UDS.KEYID = 0
6,060,162 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,203,846 UART: [idev] Erasing UDS.KEYID = 0
9,391,952 UART: [idev] Using Sha1 for KeyId Algorithm
9,414,359 UART: [idev] --
9,417,197 UART: [ldev] ++
9,417,836 UART: [ldev] CDI.KEYID = 6
9,418,748 UART: [ldev] SUBJECT.KEYID = 5
9,420,084 UART: [ldev] AUTHORITY.KEYID = 7
9,421,198 UART: [ldev] FE.KEYID = 1
9,458,233 UART: [ldev] Erasing FE.KEYID = 1
12,789,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,082,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,097,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,112,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,126,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,145,790 UART: [ldev] --
15,151,267 UART: [fwproc] Waiting for Commands...
15,153,960 UART: [fwproc] Received command 0x46574c44
15,156,148 UART: [fwproc] Received Image of size 114124 bytes
19,209,288 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,287,876 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,356,743 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,674,006 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,783,431 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,963,481 >>> mbox cmd response: failed
19,964,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,964,504 >>> mbox cmd response: failed
19,964,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,965,058 >>> mbox cmd response: failed
Initializing fuses
2,051,819 writing to cptra_bootfsm_go
5,859,965 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,933,560 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,550 UART:
192,903 UART: Running Caliptra ROM ...
194,043 UART:
603,749 UART: [state] CFI Enabled
617,212 UART: [state] LifecycleState = Unprovisioned
619,147 UART: [state] DebugLocked = No
621,011 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,370 UART: [kat] SHA2-256
796,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,643 UART: [kat] ++
807,117 UART: [kat] sha1
818,933 UART: [kat] SHA2-256
821,667 UART: [kat] SHA2-384
827,372 UART: [kat] SHA2-512-ACC
829,715 UART: [kat] ECC-384
3,114,544 UART: [kat] HMAC-384Kdf
3,125,604 UART: [kat] LMS
4,315,687 UART: [kat] --
4,320,938 UART: [cold-reset] ++
4,322,816 UART: [fht] Storing FHT @ 0x50003400
4,333,165 UART: [idev] ++
4,333,741 UART: [idev] CDI.KEYID = 6
4,334,761 UART: [idev] SUBJECT.KEYID = 7
4,335,922 UART: [idev] UDS.KEYID = 0
4,338,635 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,116 UART: [idev] Erasing UDS.KEYID = 0
7,622,277 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,967 UART: [idev] --
7,647,608 UART: [ldev] ++
7,648,185 UART: [ldev] CDI.KEYID = 6
7,649,205 UART: [ldev] SUBJECT.KEYID = 5
7,650,377 UART: [ldev] AUTHORITY.KEYID = 7
7,651,611 UART: [ldev] FE.KEYID = 1
7,661,397 UART: [ldev] Erasing FE.KEYID = 1
10,950,276 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,675 UART: [ldev] --
13,310,835 UART: [fwproc] Waiting for Commands...
13,313,477 UART: [fwproc] Received command 0x46574c44
13,315,661 UART: [fwproc] Received Image of size 114124 bytes
20,908,614 UART: ROM Fatal Error: 0x000B0038
20,912,019 >>> mbox cmd response: failed
20,912,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,912,777 >>> mbox cmd response: failed
20,913,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,913,339 >>> mbox cmd response: failed
Initializing fuses
2,052,611 writing to cptra_bootfsm_go
2,241,901 UART:
2,242,266 UART: Running Caliptra ROM ...
2,243,400 UART:
2,652,948 UART: [state] CFI Enabled
2,668,942 UART: [state] LifecycleState = Unprovisioned
2,670,874 UART: [state] DebugLocked = No
2,673,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,678,841 UART: [kat] SHA2-256
2,848,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,859,168 UART: [kat] ++
2,859,704 UART: [kat] sha1
2,869,681 UART: [kat] SHA2-256
2,872,366 UART: [kat] SHA2-384
2,877,648 UART: [kat] SHA2-512-ACC
2,880,005 UART: [kat] ECC-384
5,164,807 UART: [kat] HMAC-384Kdf
5,176,285 UART: [kat] LMS
6,366,362 UART: [kat] --
6,371,423 UART: [cold-reset] ++
6,373,567 UART: [fht] Storing FHT @ 0x50003400
6,383,912 UART: [idev] ++
6,384,505 UART: [idev] CDI.KEYID = 6
6,385,434 UART: [idev] SUBJECT.KEYID = 7
6,386,651 UART: [idev] UDS.KEYID = 0
6,388,921 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,532,718 UART: [idev] Erasing UDS.KEYID = 0
9,671,339 UART: [idev] Using Sha1 for KeyId Algorithm
9,693,281 UART: [idev] --
9,697,135 UART: [ldev] ++
9,697,765 UART: [ldev] CDI.KEYID = 6
9,698,682 UART: [ldev] SUBJECT.KEYID = 5
9,699,918 UART: [ldev] AUTHORITY.KEYID = 7
9,701,161 UART: [ldev] FE.KEYID = 1
9,711,431 UART: [ldev] Erasing FE.KEYID = 1
13,000,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,294,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,308,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,323,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,338,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,357,910 UART: [ldev] --
15,363,019 UART: [fwproc] Waiting for Commands...
15,365,208 UART: [fwproc] Received command 0x46574c44
15,367,426 UART: [fwproc] Received Image of size 114124 bytes
19,418,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,495,677 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,564,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,881,284 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
4,129,933 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,656,330 >>> mbox cmd response: failed
19,656,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,657,303 >>> mbox cmd response: failed
19,657,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,657,818 >>> mbox cmd response: failed
Initializing fuses
2,053,921 writing to cptra_bootfsm_go
6,185,526 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,122,947 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,103 UART:
192,476 UART: Running Caliptra ROM ...
193,612 UART:
193,757 UART: [state] CFI Enabled
261,579 UART: [state] LifecycleState = Unprovisioned
264,028 UART: [state] DebugLocked = No
265,633 UART: [state] WD Timer not started. Device not locked for debugging
268,963 UART: [kat] SHA2-256
448,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,692 UART: [kat] ++
460,226 UART: [kat] sha1
471,162 UART: [kat] SHA2-256
474,230 UART: [kat] SHA2-384
481,447 UART: [kat] SHA2-512-ACC
484,433 UART: [kat] ECC-384
2,949,658 UART: [kat] HMAC-384Kdf
2,972,849 UART: [kat] LMS
3,502,269 UART: [kat] --
3,507,523 UART: [cold-reset] ++
3,508,538 UART: [fht] FHT @ 0x50003400
3,520,002 UART: [idev] ++
3,520,571 UART: [idev] CDI.KEYID = 6
3,521,452 UART: [idev] SUBJECT.KEYID = 7
3,522,662 UART: [idev] UDS.KEYID = 0
3,525,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,900 UART: [idev] Erasing UDS.KEYID = 0
6,026,096 UART: [idev] Sha1 KeyId Algorithm
6,048,447 UART: [idev] --
6,052,016 UART: [ldev] ++
6,052,594 UART: [ldev] CDI.KEYID = 6
6,053,512 UART: [ldev] SUBJECT.KEYID = 5
6,054,693 UART: [ldev] AUTHORITY.KEYID = 7
6,055,927 UART: [ldev] FE.KEYID = 1
6,102,646 UART: [ldev] Erasing FE.KEYID = 1
8,607,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,530 UART: [ldev] --
10,415,901 UART: [fwproc] Wait for Commands...
10,418,106 UART: [fwproc] Recv command 0x46574c44
10,420,204 UART: [fwproc] Recv'd Img size: 114448 bytes
13,602,007 UART: ROM Fatal Error: 0x000B0038
13,605,049 >>> mbox cmd response: failed
13,605,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,605,840 >>> mbox cmd response: failed
13,606,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,606,421 >>> mbox cmd response: failed
Initializing fuses
2,049,828 writing to cptra_bootfsm_go
2,239,089 UART:
2,239,440 UART: Running Caliptra ROM ...
2,240,486 UART:
2,240,638 UART: [state] CFI Enabled
2,315,409 UART: [state] LifecycleState = Unprovisioned
2,317,289 UART: [state] DebugLocked = No
2,319,572 UART: [state] WD Timer not started. Device not locked for debugging
2,323,798 UART: [kat] SHA2-256
2,502,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,501 UART: [kat] ++
2,514,960 UART: [kat] sha1
2,526,168 UART: [kat] SHA2-256
2,529,191 UART: [kat] SHA2-384
2,535,716 UART: [kat] SHA2-512-ACC
2,538,713 UART: [kat] ECC-384
4,999,335 UART: [kat] HMAC-384Kdf
5,023,504 UART: [kat] LMS
5,552,947 UART: [kat] --
5,557,330 UART: [cold-reset] ++
5,558,946 UART: [fht] FHT @ 0x50003400
5,570,790 UART: [idev] ++
5,571,356 UART: [idev] CDI.KEYID = 6
5,572,261 UART: [idev] SUBJECT.KEYID = 7
5,573,476 UART: [idev] UDS.KEYID = 0
5,575,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,720,019 UART: [idev] Erasing UDS.KEYID = 0
8,080,968 UART: [idev] Sha1 KeyId Algorithm
8,104,246 UART: [idev] --
8,107,630 UART: [ldev] ++
8,108,208 UART: [ldev] CDI.KEYID = 6
8,109,094 UART: [ldev] SUBJECT.KEYID = 5
8,110,306 UART: [ldev] AUTHORITY.KEYID = 7
8,111,540 UART: [ldev] FE.KEYID = 1
8,152,164 UART: [ldev] Erasing FE.KEYID = 1
10,655,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,389 UART: [ldev] --
12,464,217 UART: [fwproc] Wait for Commands...
12,466,236 UART: [fwproc] Recv command 0x46574c44
12,468,337 UART: [fwproc] Recv'd Img size: 114448 bytes
15,869,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,941,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,009,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,327,645 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,362,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,193,343 >>> mbox cmd response: failed
13,193,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,194,312 >>> mbox cmd response: failed
13,194,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,194,897 >>> mbox cmd response: failed
Initializing fuses
2,045,290 writing to cptra_bootfsm_go
5,418,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,108,146 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,498 UART:
192,884 UART: Running Caliptra ROM ...
194,010 UART:
603,521 UART: [state] CFI Enabled
618,189 UART: [state] LifecycleState = Unprovisioned
620,048 UART: [state] DebugLocked = No
622,623 UART: [state] WD Timer not started. Device not locked for debugging
626,878 UART: [kat] SHA2-256
805,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,559 UART: [kat] ++
818,083 UART: [kat] sha1
828,973 UART: [kat] SHA2-256
832,021 UART: [kat] SHA2-384
838,173 UART: [kat] SHA2-512-ACC
841,121 UART: [kat] ECC-384
3,282,727 UART: [kat] HMAC-384Kdf
3,295,578 UART: [kat] LMS
3,825,036 UART: [kat] --
3,830,818 UART: [cold-reset] ++
3,832,324 UART: [fht] FHT @ 0x50003400
3,843,733 UART: [idev] ++
3,844,299 UART: [idev] CDI.KEYID = 6
3,845,284 UART: [idev] SUBJECT.KEYID = 7
3,846,384 UART: [idev] UDS.KEYID = 0
3,849,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,993,850 UART: [idev] Erasing UDS.KEYID = 0
6,315,371 UART: [idev] Sha1 KeyId Algorithm
6,338,439 UART: [idev] --
6,341,891 UART: [ldev] ++
6,342,460 UART: [ldev] CDI.KEYID = 6
6,343,371 UART: [ldev] SUBJECT.KEYID = 5
6,344,619 UART: [ldev] AUTHORITY.KEYID = 7
6,345,814 UART: [ldev] FE.KEYID = 1
6,355,652 UART: [ldev] Erasing FE.KEYID = 1
8,833,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,436 UART: [ldev] --
10,623,190 UART: [fwproc] Wait for Commands...
10,625,987 UART: [fwproc] Recv command 0x46574c44
10,628,082 UART: [fwproc] Recv'd Img size: 114448 bytes
13,847,126 UART: ROM Fatal Error: 0x000B0038
13,850,264 >>> mbox cmd response: failed
13,850,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,851,040 >>> mbox cmd response: failed
13,851,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,851,604 >>> mbox cmd response: failed
Initializing fuses
2,052,452 writing to cptra_bootfsm_go
2,241,756 UART:
2,242,104 UART: Running Caliptra ROM ...
2,243,240 UART:
6,623,180 UART: [state] CFI Enabled
6,637,405 UART: [state] LifecycleState = Unprovisioned
6,639,267 UART: [state] DebugLocked = No
6,640,657 UART: [state] WD Timer not started. Device not locked for debugging
6,643,970 UART: [kat] SHA2-256
6,823,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,834,613 UART: [kat] ++
6,835,158 UART: [kat] sha1
6,846,556 UART: [kat] SHA2-256
6,849,577 UART: [kat] SHA2-384
6,856,374 UART: [kat] SHA2-512-ACC
6,859,315 UART: [kat] ECC-384
9,299,089 UART: [kat] HMAC-384Kdf
9,312,300 UART: [kat] LMS
9,841,785 UART: [kat] --
9,846,368 UART: [cold-reset] ++
9,847,863 UART: [fht] FHT @ 0x50003400
9,859,764 UART: [idev] ++
9,860,371 UART: [idev] CDI.KEYID = 6
9,861,295 UART: [idev] SUBJECT.KEYID = 7
9,862,457 UART: [idev] UDS.KEYID = 0
9,865,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,008,987 UART: [idev] Erasing UDS.KEYID = 0
12,332,659 UART: [idev] Sha1 KeyId Algorithm
12,353,855 UART: [idev] --
12,356,326 UART: [ldev] ++
12,356,899 UART: [ldev] CDI.KEYID = 6
12,357,961 UART: [ldev] SUBJECT.KEYID = 5
12,359,064 UART: [ldev] AUTHORITY.KEYID = 7
12,360,241 UART: [ldev] FE.KEYID = 1
12,368,674 UART: [ldev] Erasing FE.KEYID = 1
14,845,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,564,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,580,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,595,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,611,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,633,143 UART: [ldev] --
16,636,901 UART: [fwproc] Wait for Commands...
16,638,569 UART: [fwproc] Recv command 0x46574c44
16,640,667 UART: [fwproc] Recv'd Img size: 114448 bytes
20,040,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,118,878 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,187,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,506,911 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,692,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,390,416 >>> mbox cmd response: failed
13,391,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,391,400 >>> mbox cmd response: failed
13,391,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,391,967 >>> mbox cmd response: failed
Initializing fuses
2,048,325 writing to cptra_bootfsm_go
10,178,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,772,099 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,443,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,420,653 >>> mbox cmd response: failed
13,421,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,421,771 >>> mbox cmd response: failed
13,422,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,422,341 >>> mbox cmd response: failed
Initializing fuses
2,046,273 writing to cptra_bootfsm_go
5,464,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,770,949 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,753,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,584,800 >>> mbox cmd response: failed
13,585,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,585,754 >>> mbox cmd response: failed
13,586,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,586,320 >>> mbox cmd response: failed
Initializing fuses
2,045,914 writing to cptra_bootfsm_go
10,031,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,230,851 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,901 UART: [kat] SHA2-256
881,832 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,947 UART: [kat] ++
886,099 UART: [kat] sha1
890,219 UART: [kat] SHA2-256
892,157 UART: [kat] SHA2-384
895,034 UART: [kat] SHA2-512-ACC
896,935 UART: [kat] ECC-384
902,418 UART: [kat] HMAC-384Kdf
907,044 UART: [kat] LMS
1,475,240 UART: [kat] --
1,476,381 UART: [cold-reset] ++
1,476,879 UART: [fht] Storing FHT @ 0x50003400
1,479,810 UART: [idev] ++
1,479,978 UART: [idev] CDI.KEYID = 6
1,480,338 UART: [idev] SUBJECT.KEYID = 7
1,480,762 UART: [idev] UDS.KEYID = 0
1,481,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,504,768 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,338 UART: [idev] --
1,514,489 UART: [ldev] ++
1,514,657 UART: [ldev] CDI.KEYID = 6
1,515,020 UART: [ldev] SUBJECT.KEYID = 5
1,515,446 UART: [ldev] AUTHORITY.KEYID = 7
1,515,909 UART: [ldev] FE.KEYID = 1
1,521,219 UART: [ldev] Erasing FE.KEYID = 1
1,546,272 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,342 UART: [ldev] --
1,585,719 UART: [fwproc] Waiting for Commands...
1,586,542 UART: [fwproc] Received command 0x46574c44
1,587,333 UART: [fwproc] Received Image of size 114448 bytes
3,902,681 UART: ROM Fatal Error: 0x000B0038
3,903,838 >>> mbox cmd response: failed
3,903,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,903,844 >>> mbox cmd response: failed
3,903,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,903,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,291 UART: [kat] SHA2-256
892,229 UART: [kat] SHA2-384
894,810 UART: [kat] SHA2-512-ACC
896,711 UART: [kat] ECC-384
902,172 UART: [kat] HMAC-384Kdf
906,606 UART: [kat] LMS
1,474,802 UART: [kat] --
1,475,857 UART: [cold-reset] ++
1,476,311 UART: [fht] Storing FHT @ 0x50003400
1,479,218 UART: [idev] ++
1,479,386 UART: [idev] CDI.KEYID = 6
1,479,746 UART: [idev] SUBJECT.KEYID = 7
1,480,170 UART: [idev] UDS.KEYID = 0
1,480,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,478 UART: [idev] Erasing UDS.KEYID = 0
1,504,606 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,190 UART: [idev] --
1,514,337 UART: [ldev] ++
1,514,505 UART: [ldev] CDI.KEYID = 6
1,514,868 UART: [ldev] SUBJECT.KEYID = 5
1,515,294 UART: [ldev] AUTHORITY.KEYID = 7
1,515,757 UART: [ldev] FE.KEYID = 1
1,520,919 UART: [ldev] Erasing FE.KEYID = 1
1,546,430 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,456 UART: [ldev] --
1,585,753 UART: [fwproc] Waiting for Commands...
1,586,382 UART: [fwproc] Received command 0x46574c44
1,587,173 UART: [fwproc] Received Image of size 114448 bytes
2,886,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,361 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,713 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,828 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,642,024 >>> mbox cmd response: failed
3,642,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,642,030 >>> mbox cmd response: failed
3,642,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,642,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,379 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,306 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,444 UART: [kat] SHA2-256
882,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,490 UART: [kat] ++
886,642 UART: [kat] sha1
890,928 UART: [kat] SHA2-256
892,866 UART: [kat] SHA2-384
895,801 UART: [kat] SHA2-512-ACC
897,702 UART: [kat] ECC-384
903,365 UART: [kat] HMAC-384Kdf
907,885 UART: [kat] LMS
1,476,081 UART: [kat] --
1,476,896 UART: [cold-reset] ++
1,477,400 UART: [fht] Storing FHT @ 0x50003400
1,480,329 UART: [idev] ++
1,480,497 UART: [idev] CDI.KEYID = 6
1,480,857 UART: [idev] SUBJECT.KEYID = 7
1,481,281 UART: [idev] UDS.KEYID = 0
1,481,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,333 UART: [idev] Erasing UDS.KEYID = 0
1,506,435 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,227 UART: [idev] --
1,516,426 UART: [ldev] ++
1,516,594 UART: [ldev] CDI.KEYID = 6
1,516,957 UART: [ldev] SUBJECT.KEYID = 5
1,517,383 UART: [ldev] AUTHORITY.KEYID = 7
1,517,846 UART: [ldev] FE.KEYID = 1
1,523,172 UART: [ldev] Erasing FE.KEYID = 1
1,548,791 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,549 UART: [ldev] --
1,587,812 UART: [fwproc] Waiting for Commands...
1,588,437 UART: [fwproc] Received command 0x46574c44
1,589,228 UART: [fwproc] Received Image of size 114448 bytes
4,017,777 UART: ROM Fatal Error: 0x000B0038
4,018,934 >>> mbox cmd response: failed
4,018,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
4,018,940 >>> mbox cmd response: failed
4,018,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
4,018,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
86,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,636 UART: [kat] SHA2-256
882,567 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,682 UART: [kat] ++
886,834 UART: [kat] sha1
891,072 UART: [kat] SHA2-256
893,010 UART: [kat] SHA2-384
895,701 UART: [kat] SHA2-512-ACC
897,602 UART: [kat] ECC-384
903,311 UART: [kat] HMAC-384Kdf
907,955 UART: [kat] LMS
1,476,151 UART: [kat] --
1,476,692 UART: [cold-reset] ++
1,477,028 UART: [fht] Storing FHT @ 0x50003400
1,479,853 UART: [idev] ++
1,480,021 UART: [idev] CDI.KEYID = 6
1,480,381 UART: [idev] SUBJECT.KEYID = 7
1,480,805 UART: [idev] UDS.KEYID = 0
1,481,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,831 UART: [idev] Erasing UDS.KEYID = 0
1,505,593 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,299 UART: [idev] --
1,515,458 UART: [ldev] ++
1,515,626 UART: [ldev] CDI.KEYID = 6
1,515,989 UART: [ldev] SUBJECT.KEYID = 5
1,516,415 UART: [ldev] AUTHORITY.KEYID = 7
1,516,878 UART: [ldev] FE.KEYID = 1
1,522,238 UART: [ldev] Erasing FE.KEYID = 1
1,547,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,705 UART: [ldev] --
1,586,996 UART: [fwproc] Waiting for Commands...
1,587,717 UART: [fwproc] Received command 0x46574c44
1,588,508 UART: [fwproc] Received Image of size 114448 bytes
2,886,424 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,448 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,800 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,779 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,607,340 >>> mbox cmd response: failed
3,607,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,607,346 >>> mbox cmd response: failed
3,607,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,607,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,265 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
893,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,501 UART: [kat] ++
897,653 UART: [kat] sha1
901,959 UART: [kat] SHA2-256
903,899 UART: [kat] SHA2-384
906,746 UART: [kat] SHA2-512-ACC
908,647 UART: [kat] ECC-384
918,586 UART: [kat] HMAC-384Kdf
923,066 UART: [kat] LMS
1,171,394 UART: [kat] --
1,172,251 UART: [cold-reset] ++
1,172,627 UART: [fht] FHT @ 0x50003400
1,175,322 UART: [idev] ++
1,175,490 UART: [idev] CDI.KEYID = 6
1,175,850 UART: [idev] SUBJECT.KEYID = 7
1,176,274 UART: [idev] UDS.KEYID = 0
1,176,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,510 UART: [idev] Erasing UDS.KEYID = 0
1,200,701 UART: [idev] Sha1 KeyId Algorithm
1,209,083 UART: [idev] --
1,210,171 UART: [ldev] ++
1,210,339 UART: [ldev] CDI.KEYID = 6
1,210,702 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,683 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,083 UART: [ldev] --
1,282,470 UART: [fwproc] Wait for Commands...
1,283,108 UART: [fwproc] Recv command 0x46574c44
1,283,836 UART: [fwproc] Recv'd Img size: 114448 bytes
1,879,570 UART: ROM Fatal Error: 0x000B0038
1,880,727 >>> mbox cmd response: failed
1,880,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,733 >>> mbox cmd response: failed
1,880,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,648 UART: [state] LifecycleState = Unprovisioned
86,303 UART: [state] DebugLocked = No
86,987 UART: [state] WD Timer not started. Device not locked for debugging
88,226 UART: [kat] SHA2-256
893,876 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,001 UART: [kat] ++
898,153 UART: [kat] sha1
902,425 UART: [kat] SHA2-256
904,365 UART: [kat] SHA2-384
907,290 UART: [kat] SHA2-512-ACC
909,191 UART: [kat] ECC-384
918,694 UART: [kat] HMAC-384Kdf
923,370 UART: [kat] LMS
1,171,698 UART: [kat] --
1,172,559 UART: [cold-reset] ++
1,173,101 UART: [fht] FHT @ 0x50003400
1,175,692 UART: [idev] ++
1,175,860 UART: [idev] CDI.KEYID = 6
1,176,220 UART: [idev] SUBJECT.KEYID = 7
1,176,644 UART: [idev] UDS.KEYID = 0
1,176,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,698 UART: [idev] Erasing UDS.KEYID = 0
1,201,791 UART: [idev] Sha1 KeyId Algorithm
1,210,367 UART: [idev] --
1,211,419 UART: [ldev] ++
1,211,587 UART: [ldev] CDI.KEYID = 6
1,211,950 UART: [ldev] SUBJECT.KEYID = 5
1,212,376 UART: [ldev] AUTHORITY.KEYID = 7
1,212,839 UART: [ldev] FE.KEYID = 1
1,217,925 UART: [ldev] Erasing FE.KEYID = 1
1,244,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,475 UART: [ldev] --
1,282,810 UART: [fwproc] Wait for Commands...
1,283,622 UART: [fwproc] Recv command 0x46574c44
1,284,350 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,425 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,735,272 >>> mbox cmd response: failed
1,735,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,735,278 >>> mbox cmd response: failed
1,735,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,735,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,049 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,234 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
893,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,806 UART: [kat] ++
897,958 UART: [kat] sha1
902,374 UART: [kat] SHA2-256
904,314 UART: [kat] SHA2-384
906,913 UART: [kat] SHA2-512-ACC
908,814 UART: [kat] ECC-384
918,483 UART: [kat] HMAC-384Kdf
923,337 UART: [kat] LMS
1,171,665 UART: [kat] --
1,172,642 UART: [cold-reset] ++
1,173,136 UART: [fht] FHT @ 0x50003400
1,175,885 UART: [idev] ++
1,176,053 UART: [idev] CDI.KEYID = 6
1,176,413 UART: [idev] SUBJECT.KEYID = 7
1,176,837 UART: [idev] UDS.KEYID = 0
1,177,182 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,913 UART: [idev] Erasing UDS.KEYID = 0
1,202,112 UART: [idev] Sha1 KeyId Algorithm
1,210,462 UART: [idev] --
1,211,386 UART: [ldev] ++
1,211,554 UART: [ldev] CDI.KEYID = 6
1,211,917 UART: [ldev] SUBJECT.KEYID = 5
1,212,343 UART: [ldev] AUTHORITY.KEYID = 7
1,212,806 UART: [ldev] FE.KEYID = 1
1,218,452 UART: [ldev] Erasing FE.KEYID = 1
1,244,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,556 UART: [ldev] --
1,283,841 UART: [fwproc] Wait for Commands...
1,284,605 UART: [fwproc] Recv command 0x46574c44
1,285,333 UART: [fwproc] Recv'd Img size: 114448 bytes
1,856,523 UART: ROM Fatal Error: 0x000B0038
1,857,680 >>> mbox cmd response: failed
1,857,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,686 >>> mbox cmd response: failed
1,857,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,692 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
902,110 UART: [kat] SHA2-256
904,050 UART: [kat] SHA2-384
906,841 UART: [kat] SHA2-512-ACC
908,742 UART: [kat] ECC-384
918,733 UART: [kat] HMAC-384Kdf
923,519 UART: [kat] LMS
1,171,847 UART: [kat] --
1,172,610 UART: [cold-reset] ++
1,173,076 UART: [fht] FHT @ 0x50003400
1,175,781 UART: [idev] ++
1,175,949 UART: [idev] CDI.KEYID = 6
1,176,309 UART: [idev] SUBJECT.KEYID = 7
1,176,733 UART: [idev] UDS.KEYID = 0
1,177,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,017 UART: [idev] Erasing UDS.KEYID = 0
1,202,112 UART: [idev] Sha1 KeyId Algorithm
1,210,624 UART: [idev] --
1,211,756 UART: [ldev] ++
1,211,924 UART: [ldev] CDI.KEYID = 6
1,212,287 UART: [ldev] SUBJECT.KEYID = 5
1,212,713 UART: [ldev] AUTHORITY.KEYID = 7
1,213,176 UART: [ldev] FE.KEYID = 1
1,218,664 UART: [ldev] Erasing FE.KEYID = 1
1,245,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,302 UART: [ldev] --
1,284,757 UART: [fwproc] Wait for Commands...
1,285,367 UART: [fwproc] Recv command 0x46574c44
1,286,095 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,799 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,054 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,727,596 >>> mbox cmd response: failed
1,727,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,727,602 >>> mbox cmd response: failed
1,727,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,727,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,031 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
85,993 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,417 UART: [kat] SHA2-256
901,357 UART: [kat] SHA2-384
904,086 UART: [kat] SHA2-512-ACC
905,987 UART: [kat] ECC-384
915,882 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,509 UART: [cold-reset] ++
1,169,863 UART: [fht] FHT @ 0x50003400
1,172,671 UART: [idev] ++
1,172,839 UART: [idev] CDI.KEYID = 6
1,173,200 UART: [idev] SUBJECT.KEYID = 7
1,173,625 UART: [idev] UDS.KEYID = 0
1,173,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,841 UART: [idev] Erasing UDS.KEYID = 0
1,198,801 UART: [idev] Sha1 KeyId Algorithm
1,207,591 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,214,880 UART: [ldev] Erasing FE.KEYID = 1
1,240,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,422 UART: [ldev] --
1,279,816 UART: [fwproc] Wait for Commands...
1,280,527 UART: [fwproc] Recv command 0x46574c44
1,281,260 UART: [fwproc] Recv'd Img size: 114448 bytes
1,866,686 UART: ROM Fatal Error: 0x000B0038
1,867,843 >>> mbox cmd response: failed
1,867,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,849 >>> mbox cmd response: failed
1,867,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = No
86,833 UART: [state] WD Timer not started. Device not locked for debugging
88,072 UART: [kat] SHA2-256
891,622 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,751 UART: [kat] ++
895,903 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,680 UART: [kat] HMAC-384Kdf
921,224 UART: [kat] LMS
1,169,536 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,489 UART: [fht] FHT @ 0x50003400
1,173,233 UART: [idev] ++
1,173,401 UART: [idev] CDI.KEYID = 6
1,173,762 UART: [idev] SUBJECT.KEYID = 7
1,174,187 UART: [idev] UDS.KEYID = 0
1,174,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,407 UART: [idev] Erasing UDS.KEYID = 0
1,199,429 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,324 UART: [ldev] ++
1,209,492 UART: [ldev] CDI.KEYID = 6
1,209,856 UART: [ldev] SUBJECT.KEYID = 5
1,210,283 UART: [ldev] AUTHORITY.KEYID = 7
1,210,746 UART: [ldev] FE.KEYID = 1
1,215,854 UART: [ldev] Erasing FE.KEYID = 1
1,241,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,870 UART: [ldev] --
1,281,386 UART: [fwproc] Wait for Commands...
1,282,165 UART: [fwproc] Recv command 0x46574c44
1,282,898 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,776 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,149 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,721,866 >>> mbox cmd response: failed
1,721,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,872 >>> mbox cmd response: failed
1,721,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,714 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,651 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,840 UART: [fht] FHT @ 0x50003400
1,173,444 UART: [idev] ++
1,173,612 UART: [idev] CDI.KEYID = 6
1,173,973 UART: [idev] SUBJECT.KEYID = 7
1,174,398 UART: [idev] UDS.KEYID = 0
1,174,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,738 UART: [idev] Sha1 KeyId Algorithm
1,208,592 UART: [idev] --
1,209,779 UART: [ldev] ++
1,209,947 UART: [ldev] CDI.KEYID = 6
1,210,311 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,477 UART: [ldev] Erasing FE.KEYID = 1
1,243,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,829 UART: [fwproc] Wait for Commands...
1,283,454 UART: [fwproc] Recv command 0x46574c44
1,284,187 UART: [fwproc] Recv'd Img size: 114448 bytes
1,871,089 UART: ROM Fatal Error: 0x000B0038
1,872,246 >>> mbox cmd response: failed
1,872,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,872,252 >>> mbox cmd response: failed
1,872,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,872,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,679 UART: [kat] HMAC-384Kdf
921,369 UART: [kat] LMS
1,169,681 UART: [kat] --
1,170,566 UART: [cold-reset] ++
1,170,922 UART: [fht] FHT @ 0x50003400
1,173,422 UART: [idev] ++
1,173,590 UART: [idev] CDI.KEYID = 6
1,173,951 UART: [idev] SUBJECT.KEYID = 7
1,174,376 UART: [idev] UDS.KEYID = 0
1,174,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,624 UART: [idev] Erasing UDS.KEYID = 0
1,198,914 UART: [idev] Sha1 KeyId Algorithm
1,207,766 UART: [idev] --
1,208,667 UART: [ldev] ++
1,208,835 UART: [ldev] CDI.KEYID = 6
1,209,199 UART: [ldev] SUBJECT.KEYID = 5
1,209,626 UART: [ldev] AUTHORITY.KEYID = 7
1,210,089 UART: [ldev] FE.KEYID = 1
1,215,157 UART: [ldev] Erasing FE.KEYID = 1
1,241,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,185 UART: [ldev] --
1,280,519 UART: [fwproc] Wait for Commands...
1,281,204 UART: [fwproc] Recv command 0x46574c44
1,281,937 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,244 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,722,121 >>> mbox cmd response: failed
1,722,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,127 >>> mbox cmd response: failed
1,722,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,133 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,941 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,922 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
4,877,449 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,756,523 >>> mbox cmd response: failed
18,757,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,757,775 >>> mbox cmd response: failed
18,758,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,758,343 >>> mbox cmd response: failed
Initializing fuses
2,051,840 writing to cptra_bootfsm_go
6,917,744 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,484,232 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
4,881,086 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,954,693 >>> mbox cmd response: failed
18,955,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,955,799 >>> mbox cmd response: failed
18,956,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,956,365 >>> mbox cmd response: failed
Initializing fuses
2,054,674 writing to cptra_bootfsm_go
6,932,024 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,496,223 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
5,191,621 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,906,399 >>> mbox cmd response: failed
18,906,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,907,301 >>> mbox cmd response: failed
18,907,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,907,869 >>> mbox cmd response: failed
Initializing fuses
2,055,606 writing to cptra_bootfsm_go
7,241,837 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,677,274 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
5,185,745 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,053,121 >>> mbox cmd response: failed
19,054,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,054,506 >>> mbox cmd response: failed
19,054,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,055,091 >>> mbox cmd response: failed
Initializing fuses
2,058,440 writing to cptra_bootfsm_go
7,245,175 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,687,207 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,458,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,968,831 >>> mbox cmd response: failed
12,969,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,969,776 >>> mbox cmd response: failed
12,970,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,970,337 >>> mbox cmd response: failed
Initializing fuses
2,053,019 writing to cptra_bootfsm_go
5,482,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,325,792 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,466,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,958,612 >>> mbox cmd response: failed
12,959,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,959,572 >>> mbox cmd response: failed
12,959,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,960,203 >>> mbox cmd response: failed
Initializing fuses
2,053,591 writing to cptra_bootfsm_go
5,500,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,335,068 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,775,741 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,158,113 >>> mbox cmd response: failed
13,158,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,159,251 >>> mbox cmd response: failed
13,159,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,159,815 >>> mbox cmd response: failed
Initializing fuses
2,048,617 writing to cptra_bootfsm_go
10,489,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,217,309 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,777,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,163,787 >>> mbox cmd response: failed
13,164,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,164,754 >>> mbox cmd response: failed
13,165,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,165,335 >>> mbox cmd response: failed
Initializing fuses
2,053,891 writing to cptra_bootfsm_go
10,485,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,182,495 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
3,464,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,949,594 >>> mbox cmd response: failed
12,950,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,950,626 >>> mbox cmd response: failed
12,950,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,951,423 >>> mbox cmd response: failed
Initializing fuses
2,054,945 writing to cptra_bootfsm_go
5,509,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,311,123 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,774,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,161,102 >>> mbox cmd response: failed
13,161,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,162,049 >>> mbox cmd response: failed
13,162,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,162,611 >>> mbox cmd response: failed
Initializing fuses
2,051,260 writing to cptra_bootfsm_go
10,488,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,219,961 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,475,374 >>> mbox cmd response: failed
1,475,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,380 >>> mbox cmd response: failed
1,475,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,386 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,209 UART: [kat] SHA2-256
882,140 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,255 UART: [kat] ++
886,407 UART: [kat] sha1
890,715 UART: [kat] SHA2-256
892,653 UART: [kat] SHA2-384
895,406 UART: [kat] SHA2-512-ACC
897,307 UART: [kat] ECC-384
903,018 UART: [kat] HMAC-384Kdf
907,632 UART: [kat] LMS
1,475,828 UART: [kat] --
1,476,719 UART: [cold-reset] ++
1,477,153 UART: [fht] Storing FHT @ 0x50003400
1,479,998 UART: [idev] ++
1,480,166 UART: [idev] CDI.KEYID = 6
1,480,526 UART: [idev] SUBJECT.KEYID = 7
1,480,950 UART: [idev] UDS.KEYID = 0
1,481,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,064 UART: [idev] Erasing UDS.KEYID = 0
1,505,306 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,772 UART: [idev] --
1,515,047 UART: [ldev] ++
1,515,215 UART: [ldev] CDI.KEYID = 6
1,515,578 UART: [ldev] SUBJECT.KEYID = 5
1,516,004 UART: [ldev] AUTHORITY.KEYID = 7
1,516,467 UART: [ldev] FE.KEYID = 1
1,521,731 UART: [ldev] Erasing FE.KEYID = 1
1,547,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,134 UART: [ldev] --
1,586,427 UART: [fwproc] Waiting for Commands...
1,587,052 UART: [fwproc] Received command 0x46574c44
1,587,843 UART: [fwproc] Received Image of size 114448 bytes
2,886,571 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,521 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,873 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,824 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,479,678 >>> mbox cmd response: failed
1,479,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,684 >>> mbox cmd response: failed
1,479,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,724 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,480,255 >>> mbox cmd response: failed
1,480,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,261 >>> mbox cmd response: failed
1,480,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,484 UART: [kat] SHA2-256
882,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,530 UART: [kat] ++
886,682 UART: [kat] sha1
890,954 UART: [kat] SHA2-256
892,892 UART: [kat] SHA2-384
895,691 UART: [kat] SHA2-512-ACC
897,592 UART: [kat] ECC-384
903,087 UART: [kat] HMAC-384Kdf
907,519 UART: [kat] LMS
1,475,715 UART: [kat] --
1,476,342 UART: [cold-reset] ++
1,476,798 UART: [fht] Storing FHT @ 0x50003400
1,479,499 UART: [idev] ++
1,479,667 UART: [idev] CDI.KEYID = 6
1,480,027 UART: [idev] SUBJECT.KEYID = 7
1,480,451 UART: [idev] UDS.KEYID = 0
1,480,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,635 UART: [idev] Erasing UDS.KEYID = 0
1,505,699 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,279 UART: [idev] --
1,515,408 UART: [ldev] ++
1,515,576 UART: [ldev] CDI.KEYID = 6
1,515,939 UART: [ldev] SUBJECT.KEYID = 5
1,516,365 UART: [ldev] AUTHORITY.KEYID = 7
1,516,828 UART: [ldev] FE.KEYID = 1
1,521,892 UART: [ldev] Erasing FE.KEYID = 1
1,546,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,823 UART: [ldev] --
1,586,088 UART: [fwproc] Waiting for Commands...
1,586,829 UART: [fwproc] Received command 0x46574c44
1,587,620 UART: [fwproc] Received Image of size 114448 bytes
2,886,836 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,274 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,626 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,779 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,477,543 >>> mbox cmd response: failed
1,477,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,549 >>> mbox cmd response: failed
1,477,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,905 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,849 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,472,670 >>> mbox cmd response: failed
1,472,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,472,676 >>> mbox cmd response: failed
1,472,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,472,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
893,514 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,639 UART: [kat] ++
897,791 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
918,198 UART: [kat] HMAC-384Kdf
922,776 UART: [kat] LMS
1,171,104 UART: [kat] --
1,172,105 UART: [cold-reset] ++
1,172,437 UART: [fht] FHT @ 0x50003400
1,175,024 UART: [idev] ++
1,175,192 UART: [idev] CDI.KEYID = 6
1,175,552 UART: [idev] SUBJECT.KEYID = 7
1,175,976 UART: [idev] UDS.KEYID = 0
1,176,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,110 UART: [idev] Erasing UDS.KEYID = 0
1,201,055 UART: [idev] Sha1 KeyId Algorithm
1,209,759 UART: [idev] --
1,210,809 UART: [ldev] ++
1,210,977 UART: [ldev] CDI.KEYID = 6
1,211,340 UART: [ldev] SUBJECT.KEYID = 5
1,211,766 UART: [ldev] AUTHORITY.KEYID = 7
1,212,229 UART: [ldev] FE.KEYID = 1
1,217,367 UART: [ldev] Erasing FE.KEYID = 1
1,244,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,575 UART: [ldev] --
1,283,896 UART: [fwproc] Wait for Commands...
1,284,604 UART: [fwproc] Recv command 0x46574c44
1,285,332 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,772 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,657 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,470,361 >>> mbox cmd response: failed
1,470,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,367 >>> mbox cmd response: failed
1,470,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,350 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,282 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,475,027 >>> mbox cmd response: failed
1,475,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,033 >>> mbox cmd response: failed
1,475,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
893,781 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,906 UART: [kat] ++
898,058 UART: [kat] sha1
902,494 UART: [kat] SHA2-256
904,434 UART: [kat] SHA2-384
907,103 UART: [kat] SHA2-512-ACC
909,004 UART: [kat] ECC-384
918,539 UART: [kat] HMAC-384Kdf
923,261 UART: [kat] LMS
1,171,589 UART: [kat] --
1,172,256 UART: [cold-reset] ++
1,172,650 UART: [fht] FHT @ 0x50003400
1,175,255 UART: [idev] ++
1,175,423 UART: [idev] CDI.KEYID = 6
1,175,783 UART: [idev] SUBJECT.KEYID = 7
1,176,207 UART: [idev] UDS.KEYID = 0
1,176,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,477 UART: [idev] Erasing UDS.KEYID = 0
1,201,976 UART: [idev] Sha1 KeyId Algorithm
1,210,208 UART: [idev] --
1,211,296 UART: [ldev] ++
1,211,464 UART: [ldev] CDI.KEYID = 6
1,211,827 UART: [ldev] SUBJECT.KEYID = 5
1,212,253 UART: [ldev] AUTHORITY.KEYID = 7
1,212,716 UART: [ldev] FE.KEYID = 1
1,217,840 UART: [ldev] Erasing FE.KEYID = 1
1,244,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,808 UART: [ldev] --
1,283,217 UART: [fwproc] Wait for Commands...
1,283,811 UART: [fwproc] Recv command 0x46574c44
1,284,539 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,131 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,320 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,440 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,474,639 >>> mbox cmd response: failed
1,474,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,645 >>> mbox cmd response: failed
1,474,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,573 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,567 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,478,114 >>> mbox cmd response: failed
1,478,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,120 >>> mbox cmd response: failed
1,478,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,067 UART: [state] WD Timer not started. Device not locked for debugging
87,272 UART: [kat] SHA2-256
890,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,951 UART: [kat] ++
895,103 UART: [kat] sha1
899,233 UART: [kat] SHA2-256
901,173 UART: [kat] SHA2-384
903,894 UART: [kat] SHA2-512-ACC
905,795 UART: [kat] ECC-384
915,432 UART: [kat] HMAC-384Kdf
919,880 UART: [kat] LMS
1,168,192 UART: [kat] --
1,169,025 UART: [cold-reset] ++
1,169,479 UART: [fht] FHT @ 0x50003400
1,172,207 UART: [idev] ++
1,172,375 UART: [idev] CDI.KEYID = 6
1,172,736 UART: [idev] SUBJECT.KEYID = 7
1,173,161 UART: [idev] UDS.KEYID = 0
1,173,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,363 UART: [idev] Erasing UDS.KEYID = 0
1,197,825 UART: [idev] Sha1 KeyId Algorithm
1,206,619 UART: [idev] --
1,207,678 UART: [ldev] ++
1,207,846 UART: [ldev] CDI.KEYID = 6
1,208,210 UART: [ldev] SUBJECT.KEYID = 5
1,208,637 UART: [ldev] AUTHORITY.KEYID = 7
1,209,100 UART: [ldev] FE.KEYID = 1
1,214,278 UART: [ldev] Erasing FE.KEYID = 1
1,240,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,638 UART: [ldev] --
1,279,966 UART: [fwproc] Wait for Commands...
1,280,781 UART: [fwproc] Recv command 0x46574c44
1,281,514 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,008 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,317 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,291 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,476,319 >>> mbox cmd response: failed
1,476,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,325 >>> mbox cmd response: failed
1,476,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,903 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,475,702 >>> mbox cmd response: failed
1,475,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,708 >>> mbox cmd response: failed
1,475,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
920,861 UART: [kat] LMS
1,169,173 UART: [kat] --
1,170,102 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,310 UART: [idev] ++
1,173,478 UART: [idev] CDI.KEYID = 6
1,173,839 UART: [idev] SUBJECT.KEYID = 7
1,174,264 UART: [idev] UDS.KEYID = 0
1,174,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,138 UART: [idev] Erasing UDS.KEYID = 0
1,199,198 UART: [idev] Sha1 KeyId Algorithm
1,207,880 UART: [idev] --
1,208,977 UART: [ldev] ++
1,209,145 UART: [ldev] CDI.KEYID = 6
1,209,509 UART: [ldev] SUBJECT.KEYID = 5
1,209,936 UART: [ldev] AUTHORITY.KEYID = 7
1,210,399 UART: [ldev] FE.KEYID = 1
1,215,689 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,167 UART: [ldev] --
1,281,657 UART: [fwproc] Wait for Commands...
1,282,454 UART: [fwproc] Recv command 0x46574c44
1,283,187 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,336 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,478,987 >>> mbox cmd response: failed
1,478,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,993 >>> mbox cmd response: failed
1,478,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,333 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
4,882,965 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,998,337 >>> mbox cmd response: failed
13,999,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,999,578 >>> mbox cmd response: failed
13,999,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,000,137 >>> mbox cmd response: failed
Initializing fuses
2,064,865 writing to cptra_bootfsm_go
6,933,836 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,541,784 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
4,881,745 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,974,648 >>> mbox cmd response: failed
13,975,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,975,803 >>> mbox cmd response: failed
13,976,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,976,427 >>> mbox cmd response: failed
Initializing fuses
2,055,993 writing to cptra_bootfsm_go
6,913,346 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,493,046 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
5,183,589 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,156,010 >>> mbox cmd response: failed
14,156,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,156,838 >>> mbox cmd response: failed
14,157,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,157,402 >>> mbox cmd response: failed
Initializing fuses
2,063,796 writing to cptra_bootfsm_go
10,895,026 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,334,419 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
5,185,077 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,159,459 >>> mbox cmd response: failed
14,160,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,160,431 >>> mbox cmd response: failed
14,160,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,160,996 >>> mbox cmd response: failed
Initializing fuses
2,064,681 writing to cptra_bootfsm_go
10,893,078 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,338,556 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,460,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,459,349 >>> mbox cmd response: failed
10,459,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,460,233 >>> mbox cmd response: failed
10,460,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,460,850 >>> mbox cmd response: failed
Initializing fuses
2,053,124 writing to cptra_bootfsm_go
5,497,724 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,361,013 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,441,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,382,058 >>> mbox cmd response: failed
10,382,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,382,931 >>> mbox cmd response: failed
10,383,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,383,492 >>> mbox cmd response: failed
Initializing fuses
2,058,794 writing to cptra_bootfsm_go
5,536,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,405,112 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,780,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,634,428 >>> mbox cmd response: failed
10,634,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,635,312 >>> mbox cmd response: failed
10,635,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,635,867 >>> mbox cmd response: failed
Initializing fuses
2,053,454 writing to cptra_bootfsm_go
13,016,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,716,586 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,788,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,635,737 >>> mbox cmd response: failed
10,636,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,636,837 >>> mbox cmd response: failed
10,637,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,637,474 >>> mbox cmd response: failed
Initializing fuses
2,056,294 writing to cptra_bootfsm_go
13,010,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,728,836 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,467,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,407,140 >>> mbox cmd response: failed
10,407,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,408,305 >>> mbox cmd response: failed
10,408,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,408,868 >>> mbox cmd response: failed
Initializing fuses
2,063,067 writing to cptra_bootfsm_go
5,510,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,324,632 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,790,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,623,205 >>> mbox cmd response: failed
10,623,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,624,146 >>> mbox cmd response: failed
10,624,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,624,711 >>> mbox cmd response: failed
Initializing fuses
2,062,417 writing to cptra_bootfsm_go
13,031,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,749,579 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,026 >>> mbox cmd response: failed
1,178,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,032 >>> mbox cmd response: failed
1,178,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,038 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,865 UART: [kat] SHA2-256
881,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,911 UART: [kat] ++
886,063 UART: [kat] sha1
890,173 UART: [kat] SHA2-256
892,111 UART: [kat] SHA2-384
894,978 UART: [kat] SHA2-512-ACC
896,879 UART: [kat] ECC-384
902,484 UART: [kat] HMAC-384Kdf
907,098 UART: [kat] LMS
1,475,294 UART: [kat] --
1,476,173 UART: [cold-reset] ++
1,476,751 UART: [fht] Storing FHT @ 0x50003400
1,479,728 UART: [idev] ++
1,479,896 UART: [idev] CDI.KEYID = 6
1,480,256 UART: [idev] SUBJECT.KEYID = 7
1,480,680 UART: [idev] UDS.KEYID = 0
1,481,025 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,426 UART: [idev] Erasing UDS.KEYID = 0
1,504,842 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,500 UART: [idev] --
1,514,481 UART: [ldev] ++
1,514,649 UART: [ldev] CDI.KEYID = 6
1,515,012 UART: [ldev] SUBJECT.KEYID = 5
1,515,438 UART: [ldev] AUTHORITY.KEYID = 7
1,515,901 UART: [ldev] FE.KEYID = 1
1,520,995 UART: [ldev] Erasing FE.KEYID = 1
1,546,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,000 UART: [ldev] --
1,585,345 UART: [fwproc] Waiting for Commands...
1,586,004 UART: [fwproc] Received command 0x46574c44
1,586,795 UART: [fwproc] Received Image of size 114448 bytes
2,886,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,395 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,747 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,904 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,042 >>> mbox cmd response: failed
1,178,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,048 >>> mbox cmd response: failed
1,178,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,516 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,775 >>> mbox cmd response: failed
1,180,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,781 >>> mbox cmd response: failed
1,180,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,787 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,548 UART: [kat] SHA2-256
882,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,594 UART: [kat] ++
886,746 UART: [kat] sha1
890,920 UART: [kat] SHA2-256
892,858 UART: [kat] SHA2-384
895,703 UART: [kat] SHA2-512-ACC
897,604 UART: [kat] ECC-384
903,495 UART: [kat] HMAC-384Kdf
908,195 UART: [kat] LMS
1,476,391 UART: [kat] --
1,476,870 UART: [cold-reset] ++
1,477,198 UART: [fht] Storing FHT @ 0x50003400
1,479,921 UART: [idev] ++
1,480,089 UART: [idev] CDI.KEYID = 6
1,480,449 UART: [idev] SUBJECT.KEYID = 7
1,480,873 UART: [idev] UDS.KEYID = 0
1,481,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,233 UART: [idev] Erasing UDS.KEYID = 0
1,506,325 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,949 UART: [idev] --
1,516,120 UART: [ldev] ++
1,516,288 UART: [ldev] CDI.KEYID = 6
1,516,651 UART: [ldev] SUBJECT.KEYID = 5
1,517,077 UART: [ldev] AUTHORITY.KEYID = 7
1,517,540 UART: [ldev] FE.KEYID = 1
1,522,786 UART: [ldev] Erasing FE.KEYID = 1
1,548,133 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,025 UART: [ldev] --
1,587,416 UART: [fwproc] Waiting for Commands...
1,588,261 UART: [fwproc] Received command 0x46574c44
1,589,052 UART: [fwproc] Received Image of size 114448 bytes
2,888,180 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,346 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,698 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,649 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,757 >>> mbox cmd response: failed
1,180,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,763 >>> mbox cmd response: failed
1,180,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,409 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,302 >>> mbox cmd response: failed
1,178,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,308 >>> mbox cmd response: failed
1,178,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,793 UART: [kat] SHA2-256
903,733 UART: [kat] SHA2-384
906,498 UART: [kat] SHA2-512-ACC
908,399 UART: [kat] ECC-384
918,112 UART: [kat] HMAC-384Kdf
922,682 UART: [kat] LMS
1,171,010 UART: [kat] --
1,171,595 UART: [cold-reset] ++
1,172,001 UART: [fht] FHT @ 0x50003400
1,174,786 UART: [idev] ++
1,174,954 UART: [idev] CDI.KEYID = 6
1,175,314 UART: [idev] SUBJECT.KEYID = 7
1,175,738 UART: [idev] UDS.KEYID = 0
1,176,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,484 UART: [idev] Erasing UDS.KEYID = 0
1,200,799 UART: [idev] Sha1 KeyId Algorithm
1,209,097 UART: [idev] --
1,210,005 UART: [ldev] ++
1,210,173 UART: [ldev] CDI.KEYID = 6
1,210,536 UART: [ldev] SUBJECT.KEYID = 5
1,210,962 UART: [ldev] AUTHORITY.KEYID = 7
1,211,425 UART: [ldev] FE.KEYID = 1
1,216,753 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,381 UART: [ldev] --
1,281,748 UART: [fwproc] Wait for Commands...
1,282,550 UART: [fwproc] Recv command 0x46574c44
1,283,278 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,525 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,842 >>> mbox cmd response: failed
1,179,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,848 >>> mbox cmd response: failed
1,179,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,126 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,778 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,099 >>> mbox cmd response: failed
1,180,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,105 >>> mbox cmd response: failed
1,180,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,111 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,050 UART: [kat] SHA2-256
903,990 UART: [kat] SHA2-384
906,599 UART: [kat] SHA2-512-ACC
908,500 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
922,901 UART: [kat] LMS
1,171,229 UART: [kat] --
1,172,010 UART: [cold-reset] ++
1,172,554 UART: [fht] FHT @ 0x50003400
1,175,331 UART: [idev] ++
1,175,499 UART: [idev] CDI.KEYID = 6
1,175,859 UART: [idev] SUBJECT.KEYID = 7
1,176,283 UART: [idev] UDS.KEYID = 0
1,176,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,201 UART: [idev] Erasing UDS.KEYID = 0
1,201,264 UART: [idev] Sha1 KeyId Algorithm
1,209,580 UART: [idev] --
1,210,638 UART: [ldev] ++
1,210,806 UART: [ldev] CDI.KEYID = 6
1,211,169 UART: [ldev] SUBJECT.KEYID = 5
1,211,595 UART: [ldev] AUTHORITY.KEYID = 7
1,212,058 UART: [ldev] FE.KEYID = 1
1,216,962 UART: [ldev] Erasing FE.KEYID = 1
1,243,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,930 UART: [ldev] --
1,282,373 UART: [fwproc] Wait for Commands...
1,283,077 UART: [fwproc] Recv command 0x46574c44
1,283,805 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,321 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,574 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,417 >>> mbox cmd response: failed
1,179,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,423 >>> mbox cmd response: failed
1,179,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,135 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,907 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,426 >>> mbox cmd response: failed
1,179,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,432 >>> mbox cmd response: failed
1,179,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,438 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,023 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [kat] SHA2-256
890,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,919 UART: [kat] ++
895,071 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
916,306 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,169,825 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,172,757 UART: [idev] ++
1,172,925 UART: [idev] CDI.KEYID = 6
1,173,286 UART: [idev] SUBJECT.KEYID = 7
1,173,711 UART: [idev] UDS.KEYID = 0
1,174,057 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,905 UART: [idev] Erasing UDS.KEYID = 0
1,199,179 UART: [idev] Sha1 KeyId Algorithm
1,208,133 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,642 UART: [ldev] Erasing FE.KEYID = 1
1,241,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,281,064 UART: [fwproc] Wait for Commands...
1,281,715 UART: [fwproc] Recv command 0x46574c44
1,282,448 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,265 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,343 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,218 >>> mbox cmd response: failed
1,179,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,224 >>> mbox cmd response: failed
1,179,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,230 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,405 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,679 >>> mbox cmd response: failed
1,179,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,685 >>> mbox cmd response: failed
1,179,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,691 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,043 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,700 UART: [idev] ++
1,172,868 UART: [idev] CDI.KEYID = 6
1,173,229 UART: [idev] SUBJECT.KEYID = 7
1,173,654 UART: [idev] UDS.KEYID = 0
1,174,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,816 UART: [idev] Erasing UDS.KEYID = 0
1,198,756 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,563 UART: [ldev] ++
1,208,731 UART: [ldev] CDI.KEYID = 6
1,209,095 UART: [ldev] SUBJECT.KEYID = 5
1,209,522 UART: [ldev] AUTHORITY.KEYID = 7
1,209,985 UART: [ldev] FE.KEYID = 1
1,215,625 UART: [ldev] Erasing FE.KEYID = 1
1,241,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,281 UART: [ldev] --
1,281,733 UART: [fwproc] Wait for Commands...
1,282,412 UART: [fwproc] Recv command 0x46574c44
1,283,145 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,356 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,895 >>> mbox cmd response: failed
1,179,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,901 >>> mbox cmd response: failed
1,179,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,907 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,474 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,298 UART:
192,654 UART: Running Caliptra ROM ...
193,851 UART:
194,008 UART: [state] CFI Enabled
260,925 UART: [state] LifecycleState = Unprovisioned
262,916 UART: [state] DebugLocked = No
265,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,816 UART: [kat] SHA2-256
439,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,978 UART: [kat] ++
450,486 UART: [kat] sha1
461,687 UART: [kat] SHA2-256
464,420 UART: [kat] SHA2-384
469,262 UART: [kat] SHA2-512-ACC
471,650 UART: [kat] ECC-384
2,769,265 UART: [kat] HMAC-384Kdf
2,800,342 UART: [kat] LMS
3,990,634 UART: [kat] --
3,997,716 UART: [cold-reset] ++
3,999,206 UART: [fht] Storing FHT @ 0x50003400
4,010,860 UART: [idev] ++
4,011,506 UART: [idev] CDI.KEYID = 6
4,012,395 UART: [idev] SUBJECT.KEYID = 7
4,013,664 UART: [idev] UDS.KEYID = 0
4,019,023 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,162,816 UART: [idev] Erasing UDS.KEYID = 0
7,346,759 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,525 UART: [idev] --
7,374,196 UART: [ldev] ++
7,374,780 UART: [ldev] CDI.KEYID = 6
7,375,729 UART: [ldev] SUBJECT.KEYID = 5
7,376,949 UART: [ldev] AUTHORITY.KEYID = 7
7,378,182 UART: [ldev] FE.KEYID = 1
7,421,729 UART: [ldev] Erasing FE.KEYID = 1
10,755,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,941 UART: [ldev] --
13,139,434 UART: [fwproc] Waiting for Commands...
13,142,242 UART: [fwproc] Received command 0x46574c44
13,144,431 UART: [fwproc] Received Image of size 114124 bytes
13,206,152 UART: ROM Fatal Error: 0x000B0007
13,209,673 >>> mbox cmd response: failed
13,210,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,210,367 >>> mbox cmd response: failed
13,210,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,210,937 >>> mbox cmd response: failed
Initializing fuses
2,053,598 writing to cptra_bootfsm_go
2,242,902 UART:
2,243,250 UART: Running Caliptra ROM ...
2,244,392 UART:
2,244,559 UART: [state] CFI Enabled
2,304,546 UART: [state] LifecycleState = Unprovisioned
2,306,504 UART: [state] DebugLocked = No
2,307,792 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,312,322 UART: [kat] SHA2-256
2,482,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,492,505 UART: [kat] ++
2,493,073 UART: [kat] sha1
2,503,812 UART: [kat] SHA2-256
2,506,506 UART: [kat] SHA2-384
2,511,255 UART: [kat] SHA2-512-ACC
2,513,608 UART: [kat] ECC-384
4,810,122 UART: [kat] HMAC-384Kdf
4,840,768 UART: [kat] LMS
6,031,060 UART: [kat] --
6,034,522 UART: [cold-reset] ++
6,035,922 UART: [fht] Storing FHT @ 0x50003400
6,048,113 UART: [idev] ++
6,048,682 UART: [idev] CDI.KEYID = 6
6,049,597 UART: [idev] SUBJECT.KEYID = 7
6,050,872 UART: [idev] UDS.KEYID = 0
6,053,406 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,197,098 UART: [idev] Erasing UDS.KEYID = 0
9,385,743 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,619 UART: [idev] --
9,411,132 UART: [ldev] ++
9,411,706 UART: [ldev] CDI.KEYID = 6
9,412,674 UART: [ldev] SUBJECT.KEYID = 5
9,413,871 UART: [ldev] AUTHORITY.KEYID = 7
9,415,165 UART: [ldev] FE.KEYID = 1
9,460,694 UART: [ldev] Erasing FE.KEYID = 1
12,792,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,086,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,101,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,115,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,130,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,149,831 UART: [ldev] --
15,154,501 UART: [fwproc] Waiting for Commands...
15,156,880 UART: [fwproc] Received command 0x46574c44
15,159,087 UART: [fwproc] Received Image of size 114124 bytes
19,212,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,298,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,367,213 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,684,962 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,790,413 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,882,102 >>> mbox cmd response: failed
12,882,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,883,124 >>> mbox cmd response: failed
12,883,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,883,632 >>> mbox cmd response: failed
Initializing fuses
2,052,758 writing to cptra_bootfsm_go
5,833,569 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,905,761 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,470 UART:
192,835 UART: Running Caliptra ROM ...
193,979 UART:
603,572 UART: [state] CFI Enabled
620,624 UART: [state] LifecycleState = Unprovisioned
622,557 UART: [state] DebugLocked = No
624,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,942 UART: [kat] SHA2-256
799,735 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,238 UART: [kat] ++
810,824 UART: [kat] sha1
821,043 UART: [kat] SHA2-256
823,763 UART: [kat] SHA2-384
830,505 UART: [kat] SHA2-512-ACC
832,899 UART: [kat] ECC-384
3,117,038 UART: [kat] HMAC-384Kdf
3,128,593 UART: [kat] LMS
4,318,687 UART: [kat] --
4,323,670 UART: [cold-reset] ++
4,325,931 UART: [fht] Storing FHT @ 0x50003400
4,337,632 UART: [idev] ++
4,338,198 UART: [idev] CDI.KEYID = 6
4,339,216 UART: [idev] SUBJECT.KEYID = 7
4,340,437 UART: [idev] UDS.KEYID = 0
4,345,603 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,488,965 UART: [idev] Erasing UDS.KEYID = 0
7,629,099 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,293 UART: [idev] --
7,654,691 UART: [ldev] ++
7,655,267 UART: [ldev] CDI.KEYID = 6
7,656,286 UART: [ldev] SUBJECT.KEYID = 5
7,657,464 UART: [ldev] AUTHORITY.KEYID = 7
7,658,696 UART: [ldev] FE.KEYID = 1
7,668,645 UART: [ldev] Erasing FE.KEYID = 1
10,952,549 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,852 UART: [ldev] --
13,308,779 UART: [fwproc] Waiting for Commands...
13,311,151 UART: [fwproc] Received command 0x46574c44
13,313,338 UART: [fwproc] Received Image of size 114124 bytes
13,381,409 UART: ROM Fatal Error: 0x000B0007
13,384,920 >>> mbox cmd response: failed
13,385,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,385,731 >>> mbox cmd response: failed
13,386,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,386,323 >>> mbox cmd response: failed
Initializing fuses
2,052,605 writing to cptra_bootfsm_go
2,241,888 UART:
2,242,226 UART: Running Caliptra ROM ...
2,243,364 UART:
7,078,906 UART: [state] CFI Enabled
7,094,091 UART: [state] LifecycleState = Unprovisioned
7,096,031 UART: [state] DebugLocked = No
7,097,805 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,103,048 UART: [kat] SHA2-256
7,272,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,283,345 UART: [kat] ++
7,283,896 UART: [kat] sha1
7,293,878 UART: [kat] SHA2-256
7,296,569 UART: [kat] SHA2-384
7,302,341 UART: [kat] SHA2-512-ACC
7,304,691 UART: [kat] ECC-384
9,588,973 UART: [kat] HMAC-384Kdf
9,601,001 UART: [kat] LMS
10,791,128 UART: [kat] --
10,795,883 UART: [cold-reset] ++
10,797,299 UART: [fht] Storing FHT @ 0x50003400
10,810,082 UART: [idev] ++
10,810,668 UART: [idev] CDI.KEYID = 6
10,811,683 UART: [idev] SUBJECT.KEYID = 7
10,812,839 UART: [idev] UDS.KEYID = 0
10,815,450 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,958,857 UART: [idev] Erasing UDS.KEYID = 0
14,096,268 UART: [idev] Using Sha1 for KeyId Algorithm
14,118,518 UART: [idev] --
14,122,187 UART: [ldev] ++
14,122,755 UART: [ldev] CDI.KEYID = 6
14,123,774 UART: [ldev] SUBJECT.KEYID = 5
14,124,960 UART: [ldev] AUTHORITY.KEYID = 7
14,126,193 UART: [ldev] FE.KEYID = 1
14,135,723 UART: [ldev] Erasing FE.KEYID = 1
17,424,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,716,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,731,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,746,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,760,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,779,714 UART: [ldev] --
19,784,926 UART: [fwproc] Waiting for Commands...
19,787,726 UART: [fwproc] Received command 0x46574c44
19,789,920 UART: [fwproc] Received Image of size 114124 bytes
23,840,649 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,915,465 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,984,346 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,302,548 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
4,131,168 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,123,109 >>> mbox cmd response: failed
13,123,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,124,107 >>> mbox cmd response: failed
13,124,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,124,670 >>> mbox cmd response: failed
Initializing fuses
2,053,527 writing to cptra_bootfsm_go
10,880,566 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,824,046 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,332 UART:
192,693 UART: Running Caliptra ROM ...
193,866 UART:
194,016 UART: [state] CFI Enabled
265,136 UART: [state] LifecycleState = Unprovisioned
267,060 UART: [state] DebugLocked = No
269,525 UART: [state] WD Timer not started. Device not locked for debugging
273,400 UART: [kat] SHA2-256
452,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,120 UART: [kat] ++
464,668 UART: [kat] sha1
475,931 UART: [kat] SHA2-256
478,963 UART: [kat] SHA2-384
484,725 UART: [kat] SHA2-512-ACC
487,656 UART: [kat] ECC-384
2,950,996 UART: [kat] HMAC-384Kdf
2,972,682 UART: [kat] LMS
3,502,137 UART: [kat] --
3,507,376 UART: [cold-reset] ++
3,509,880 UART: [fht] FHT @ 0x50003400
3,521,099 UART: [idev] ++
3,521,676 UART: [idev] CDI.KEYID = 6
3,522,614 UART: [idev] SUBJECT.KEYID = 7
3,523,825 UART: [idev] UDS.KEYID = 0
3,526,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,708 UART: [idev] Erasing UDS.KEYID = 0
6,029,502 UART: [idev] Sha1 KeyId Algorithm
6,052,633 UART: [idev] --
6,055,874 UART: [ldev] ++
6,056,472 UART: [ldev] CDI.KEYID = 6
6,057,363 UART: [ldev] SUBJECT.KEYID = 5
6,058,498 UART: [ldev] AUTHORITY.KEYID = 7
6,059,787 UART: [ldev] FE.KEYID = 1
6,103,759 UART: [ldev] Erasing FE.KEYID = 1
8,605,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,112 UART: [ldev] --
10,393,845 UART: [fwproc] Wait for Commands...
10,395,782 UART: [fwproc] Recv command 0x46574c44
10,397,873 UART: [fwproc] Recv'd Img size: 114448 bytes
10,457,919 UART: ROM Fatal Error: 0x000B0007
10,461,016 >>> mbox cmd response: failed
10,461,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,461,758 >>> mbox cmd response: failed
10,462,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,462,317 >>> mbox cmd response: failed
Initializing fuses
2,049,275 writing to cptra_bootfsm_go
2,238,571 UART:
2,238,933 UART: Running Caliptra ROM ...
2,240,074 UART:
2,240,241 UART: [state] CFI Enabled
2,301,285 UART: [state] LifecycleState = Unprovisioned
2,303,148 UART: [state] DebugLocked = No
2,304,644 UART: [state] WD Timer not started. Device not locked for debugging
2,308,763 UART: [kat] SHA2-256
2,487,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,499,473 UART: [kat] ++
2,499,932 UART: [kat] sha1
2,510,869 UART: [kat] SHA2-256
2,513,889 UART: [kat] SHA2-384
2,521,283 UART: [kat] SHA2-512-ACC
2,524,278 UART: [kat] ECC-384
4,981,815 UART: [kat] HMAC-384Kdf
5,004,106 UART: [kat] LMS
5,533,580 UART: [kat] --
5,536,329 UART: [cold-reset] ++
5,538,639 UART: [fht] FHT @ 0x50003400
5,549,508 UART: [idev] ++
5,550,100 UART: [idev] CDI.KEYID = 6
5,551,017 UART: [idev] SUBJECT.KEYID = 7
5,552,238 UART: [idev] UDS.KEYID = 0
5,554,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,698,897 UART: [idev] Erasing UDS.KEYID = 0
8,058,838 UART: [idev] Sha1 KeyId Algorithm
8,081,320 UART: [idev] --
8,084,968 UART: [ldev] ++
8,085,558 UART: [ldev] CDI.KEYID = 6
8,086,475 UART: [ldev] SUBJECT.KEYID = 5
8,087,556 UART: [ldev] AUTHORITY.KEYID = 7
8,088,906 UART: [ldev] FE.KEYID = 1
8,134,154 UART: [ldev] Erasing FE.KEYID = 1
10,637,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,375,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,391,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,407,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,422,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,443,202 UART: [ldev] --
12,447,871 UART: [fwproc] Wait for Commands...
12,450,510 UART: [fwproc] Recv command 0x46574c44
12,452,606 UART: [fwproc] Recv'd Img size: 114448 bytes
15,860,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,936,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,005,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,323,024 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,367,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,248,914 >>> mbox cmd response: failed
10,249,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,249,763 >>> mbox cmd response: failed
10,250,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,250,347 >>> mbox cmd response: failed
Initializing fuses
2,049,345 writing to cptra_bootfsm_go
5,425,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,116,671 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,568 UART:
192,924 UART: Running Caliptra ROM ...
193,996 UART:
603,732 UART: [state] CFI Enabled
617,535 UART: [state] LifecycleState = Unprovisioned
619,423 UART: [state] DebugLocked = No
621,448 UART: [state] WD Timer not started. Device not locked for debugging
625,373 UART: [kat] SHA2-256
804,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,076 UART: [kat] ++
816,526 UART: [kat] sha1
826,665 UART: [kat] SHA2-256
829,681 UART: [kat] SHA2-384
836,093 UART: [kat] SHA2-512-ACC
839,029 UART: [kat] ECC-384
3,278,999 UART: [kat] HMAC-384Kdf
3,291,697 UART: [kat] LMS
3,821,189 UART: [kat] --
3,828,039 UART: [cold-reset] ++
3,828,952 UART: [fht] FHT @ 0x50003400
3,839,762 UART: [idev] ++
3,840,366 UART: [idev] CDI.KEYID = 6
3,841,281 UART: [idev] SUBJECT.KEYID = 7
3,842,445 UART: [idev] UDS.KEYID = 0
3,845,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,133 UART: [idev] Erasing UDS.KEYID = 0
6,312,537 UART: [idev] Sha1 KeyId Algorithm
6,336,348 UART: [idev] --
6,340,809 UART: [ldev] ++
6,341,389 UART: [ldev] CDI.KEYID = 6
6,342,303 UART: [ldev] SUBJECT.KEYID = 5
6,343,463 UART: [ldev] AUTHORITY.KEYID = 7
6,344,694 UART: [ldev] FE.KEYID = 1
6,355,124 UART: [ldev] Erasing FE.KEYID = 1
8,830,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,143 UART: [ldev] --
10,621,976 UART: [fwproc] Wait for Commands...
10,624,723 UART: [fwproc] Recv command 0x46574c44
10,626,821 UART: [fwproc] Recv'd Img size: 114448 bytes
10,691,533 UART: ROM Fatal Error: 0x000B0007
10,694,621 >>> mbox cmd response: failed
10,695,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,695,385 >>> mbox cmd response: failed
10,695,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,695,942 >>> mbox cmd response: failed
Initializing fuses
2,050,745 writing to cptra_bootfsm_go
2,240,070 UART:
2,240,424 UART: Running Caliptra ROM ...
2,241,563 UART:
9,772,298 UART: [state] CFI Enabled
9,787,669 UART: [state] LifecycleState = Unprovisioned
9,789,561 UART: [state] DebugLocked = No
9,792,091 UART: [state] WD Timer not started. Device not locked for debugging
9,796,164 UART: [kat] SHA2-256
9,975,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,986,899 UART: [kat] ++
9,987,442 UART: [kat] sha1
9,998,120 UART: [kat] SHA2-256
10,001,146 UART: [kat] SHA2-384
10,006,758 UART: [kat] SHA2-512-ACC
10,009,695 UART: [kat] ECC-384
12,452,491 UART: [kat] HMAC-384Kdf
12,465,266 UART: [kat] LMS
12,994,774 UART: [kat] --
12,999,569 UART: [cold-reset] ++
13,000,790 UART: [fht] FHT @ 0x50003400
13,011,821 UART: [idev] ++
13,012,390 UART: [idev] CDI.KEYID = 6
13,013,276 UART: [idev] SUBJECT.KEYID = 7
13,014,487 UART: [idev] UDS.KEYID = 0
13,017,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,160,996 UART: [idev] Erasing UDS.KEYID = 0
15,485,212 UART: [idev] Sha1 KeyId Algorithm
15,506,882 UART: [idev] --
15,510,119 UART: [ldev] ++
15,510,689 UART: [ldev] CDI.KEYID = 6
15,511,657 UART: [ldev] SUBJECT.KEYID = 5
15,512,813 UART: [ldev] AUTHORITY.KEYID = 7
15,514,038 UART: [ldev] FE.KEYID = 1
15,525,441 UART: [ldev] Erasing FE.KEYID = 1
18,000,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,719,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,735,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,751,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,767,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,786,921 UART: [ldev] --
19,792,249 UART: [fwproc] Wait for Commands...
19,794,454 UART: [fwproc] Recv command 0x46574c44
19,796,548 UART: [fwproc] Recv'd Img size: 114448 bytes
23,192,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,267,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,336,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,654,368 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,106 writing to cptra_bootfsm_go
3,695,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,474,278 >>> mbox cmd response: failed
10,474,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,475,144 >>> mbox cmd response: failed
10,475,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,475,709 >>> mbox cmd response: failed
Initializing fuses
2,056,714 writing to cptra_bootfsm_go
13,089,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,662,520 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,442,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,313,220 >>> mbox cmd response: failed
10,313,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,314,111 >>> mbox cmd response: failed
10,314,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,314,665 >>> mbox cmd response: failed
Initializing fuses
2,051,790 writing to cptra_bootfsm_go
5,477,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,768,968 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,761,056 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,540,619 >>> mbox cmd response: failed
10,541,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,541,746 >>> mbox cmd response: failed
10,542,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,542,315 >>> mbox cmd response: failed
Initializing fuses
2,056,343 writing to cptra_bootfsm_go
13,087,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,285,610 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,491 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,209 UART: [kat] SHA2-256
882,140 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,255 UART: [kat] ++
886,407 UART: [kat] sha1
890,625 UART: [kat] SHA2-256
892,563 UART: [kat] SHA2-384
895,252 UART: [kat] SHA2-512-ACC
897,153 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,150 UART: [kat] LMS
1,475,346 UART: [kat] --
1,476,169 UART: [cold-reset] ++
1,476,499 UART: [fht] Storing FHT @ 0x50003400
1,479,164 UART: [idev] ++
1,479,332 UART: [idev] CDI.KEYID = 6
1,479,692 UART: [idev] SUBJECT.KEYID = 7
1,480,116 UART: [idev] UDS.KEYID = 0
1,480,461 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,954 UART: [idev] Erasing UDS.KEYID = 0
1,504,544 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,168 UART: [idev] --
1,514,213 UART: [ldev] ++
1,514,381 UART: [ldev] CDI.KEYID = 6
1,514,744 UART: [ldev] SUBJECT.KEYID = 5
1,515,170 UART: [ldev] AUTHORITY.KEYID = 7
1,515,633 UART: [ldev] FE.KEYID = 1
1,520,815 UART: [ldev] Erasing FE.KEYID = 1
1,546,146 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,874 UART: [ldev] --
1,585,211 UART: [fwproc] Waiting for Commands...
1,585,842 UART: [fwproc] Received command 0x46574c44
1,586,633 UART: [fwproc] Received Image of size 114448 bytes
1,610,004 UART: ROM Fatal Error: 0x000B0007
1,611,161 >>> mbox cmd response: failed
1,611,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,167 >>> mbox cmd response: failed
1,611,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,173 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,659 UART: [kat] SHA2-256
881,590 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,705 UART: [kat] ++
885,857 UART: [kat] sha1
890,175 UART: [kat] SHA2-256
892,113 UART: [kat] SHA2-384
894,858 UART: [kat] SHA2-512-ACC
896,759 UART: [kat] ECC-384
902,144 UART: [kat] HMAC-384Kdf
906,816 UART: [kat] LMS
1,475,012 UART: [kat] --
1,475,937 UART: [cold-reset] ++
1,476,281 UART: [fht] Storing FHT @ 0x50003400
1,479,074 UART: [idev] ++
1,479,242 UART: [idev] CDI.KEYID = 6
1,479,602 UART: [idev] SUBJECT.KEYID = 7
1,480,026 UART: [idev] UDS.KEYID = 0
1,480,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,900 UART: [idev] Erasing UDS.KEYID = 0
1,504,562 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,216 UART: [idev] --
1,514,271 UART: [ldev] ++
1,514,439 UART: [ldev] CDI.KEYID = 6
1,514,802 UART: [ldev] SUBJECT.KEYID = 5
1,515,228 UART: [ldev] AUTHORITY.KEYID = 7
1,515,691 UART: [ldev] FE.KEYID = 1
1,520,747 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,572 UART: [ldev] --
1,585,067 UART: [fwproc] Waiting for Commands...
1,585,834 UART: [fwproc] Received command 0x46574c44
1,586,625 UART: [fwproc] Received Image of size 114448 bytes
2,886,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,281 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,772 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,945 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,465,362 >>> mbox cmd response: failed
1,465,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,368 >>> mbox cmd response: failed
1,465,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,075 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,718 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,578 UART: [kat] SHA2-256
882,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,624 UART: [kat] ++
886,776 UART: [kat] sha1
890,940 UART: [kat] SHA2-256
892,878 UART: [kat] SHA2-384
895,643 UART: [kat] SHA2-512-ACC
897,544 UART: [kat] ECC-384
903,099 UART: [kat] HMAC-384Kdf
907,683 UART: [kat] LMS
1,475,879 UART: [kat] --
1,476,762 UART: [cold-reset] ++
1,477,162 UART: [fht] Storing FHT @ 0x50003400
1,479,779 UART: [idev] ++
1,479,947 UART: [idev] CDI.KEYID = 6
1,480,307 UART: [idev] SUBJECT.KEYID = 7
1,480,731 UART: [idev] UDS.KEYID = 0
1,481,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,115 UART: [idev] Erasing UDS.KEYID = 0
1,505,293 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,045 UART: [idev] --
1,515,014 UART: [ldev] ++
1,515,182 UART: [ldev] CDI.KEYID = 6
1,515,545 UART: [ldev] SUBJECT.KEYID = 5
1,515,971 UART: [ldev] AUTHORITY.KEYID = 7
1,516,434 UART: [ldev] FE.KEYID = 1
1,522,078 UART: [ldev] Erasing FE.KEYID = 1
1,547,487 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,533 UART: [ldev] --
1,586,800 UART: [fwproc] Waiting for Commands...
1,587,443 UART: [fwproc] Received command 0x46574c44
1,588,234 UART: [fwproc] Received Image of size 114448 bytes
1,612,165 UART: ROM Fatal Error: 0x000B0007
1,613,322 >>> mbox cmd response: failed
1,613,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,328 >>> mbox cmd response: failed
1,613,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,827 UART: [state] LifecycleState = Unprovisioned
85,482 UART: [state] DebugLocked = No
86,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,664 UART: [kat] SHA2-256
881,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,710 UART: [kat] ++
885,862 UART: [kat] sha1
890,224 UART: [kat] SHA2-256
892,162 UART: [kat] SHA2-384
895,087 UART: [kat] SHA2-512-ACC
896,988 UART: [kat] ECC-384
902,555 UART: [kat] HMAC-384Kdf
907,135 UART: [kat] LMS
1,475,331 UART: [kat] --
1,476,268 UART: [cold-reset] ++
1,476,616 UART: [fht] Storing FHT @ 0x50003400
1,479,295 UART: [idev] ++
1,479,463 UART: [idev] CDI.KEYID = 6
1,479,823 UART: [idev] SUBJECT.KEYID = 7
1,480,247 UART: [idev] UDS.KEYID = 0
1,480,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,991 UART: [idev] Erasing UDS.KEYID = 0
1,504,369 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,101 UART: [idev] --
1,514,108 UART: [ldev] ++
1,514,276 UART: [ldev] CDI.KEYID = 6
1,514,639 UART: [ldev] SUBJECT.KEYID = 5
1,515,065 UART: [ldev] AUTHORITY.KEYID = 7
1,515,528 UART: [ldev] FE.KEYID = 1
1,520,732 UART: [ldev] Erasing FE.KEYID = 1
1,546,465 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,425 UART: [ldev] --
1,585,916 UART: [fwproc] Waiting for Commands...
1,586,737 UART: [fwproc] Received command 0x46574c44
1,587,528 UART: [fwproc] Received Image of size 114448 bytes
2,887,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,664 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,113 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,448 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,464,125 >>> mbox cmd response: failed
1,464,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,131 >>> mbox cmd response: failed
1,464,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,137 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,611 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,709 UART: [kat] SHA2-256
903,649 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
918,034 UART: [kat] HMAC-384Kdf
922,460 UART: [kat] LMS
1,170,788 UART: [kat] --
1,171,989 UART: [cold-reset] ++
1,172,359 UART: [fht] FHT @ 0x50003400
1,175,042 UART: [idev] ++
1,175,210 UART: [idev] CDI.KEYID = 6
1,175,570 UART: [idev] SUBJECT.KEYID = 7
1,175,994 UART: [idev] UDS.KEYID = 0
1,176,339 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,072 UART: [idev] Erasing UDS.KEYID = 0
1,200,903 UART: [idev] Sha1 KeyId Algorithm
1,209,285 UART: [idev] --
1,210,395 UART: [ldev] ++
1,210,563 UART: [ldev] CDI.KEYID = 6
1,210,926 UART: [ldev] SUBJECT.KEYID = 5
1,211,352 UART: [ldev] AUTHORITY.KEYID = 7
1,211,815 UART: [ldev] FE.KEYID = 1
1,217,111 UART: [ldev] Erasing FE.KEYID = 1
1,243,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,695 UART: [ldev] --
1,283,076 UART: [fwproc] Wait for Commands...
1,283,704 UART: [fwproc] Recv command 0x46574c44
1,284,432 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,397 UART: ROM Fatal Error: 0x000B0007
1,308,554 >>> mbox cmd response: failed
1,308,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,560 >>> mbox cmd response: failed
1,308,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,622 UART: [state] LifecycleState = Unprovisioned
85,277 UART: [state] DebugLocked = No
85,873 UART: [state] WD Timer not started. Device not locked for debugging
87,114 UART: [kat] SHA2-256
892,764 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,889 UART: [kat] ++
897,041 UART: [kat] sha1
901,271 UART: [kat] SHA2-256
903,211 UART: [kat] SHA2-384
906,112 UART: [kat] SHA2-512-ACC
908,013 UART: [kat] ECC-384
918,156 UART: [kat] HMAC-384Kdf
922,682 UART: [kat] LMS
1,171,010 UART: [kat] --
1,172,013 UART: [cold-reset] ++
1,172,549 UART: [fht] FHT @ 0x50003400
1,175,282 UART: [idev] ++
1,175,450 UART: [idev] CDI.KEYID = 6
1,175,810 UART: [idev] SUBJECT.KEYID = 7
1,176,234 UART: [idev] UDS.KEYID = 0
1,176,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,212 UART: [idev] Erasing UDS.KEYID = 0
1,200,733 UART: [idev] Sha1 KeyId Algorithm
1,209,215 UART: [idev] --
1,210,095 UART: [ldev] ++
1,210,263 UART: [ldev] CDI.KEYID = 6
1,210,626 UART: [ldev] SUBJECT.KEYID = 5
1,211,052 UART: [ldev] AUTHORITY.KEYID = 7
1,211,515 UART: [ldev] FE.KEYID = 1
1,216,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,679 UART: [ldev] --
1,281,952 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,394 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,691 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,843 >>> mbox cmd response: failed
1,162,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,849 >>> mbox cmd response: failed
1,162,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,774 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,389 UART: [kat] SHA2-256
894,039 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,164 UART: [kat] ++
898,316 UART: [kat] sha1
902,804 UART: [kat] SHA2-256
904,744 UART: [kat] SHA2-384
907,491 UART: [kat] SHA2-512-ACC
909,392 UART: [kat] ECC-384
918,757 UART: [kat] HMAC-384Kdf
923,535 UART: [kat] LMS
1,171,863 UART: [kat] --
1,172,514 UART: [cold-reset] ++
1,173,052 UART: [fht] FHT @ 0x50003400
1,175,579 UART: [idev] ++
1,175,747 UART: [idev] CDI.KEYID = 6
1,176,107 UART: [idev] SUBJECT.KEYID = 7
1,176,531 UART: [idev] UDS.KEYID = 0
1,176,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,453 UART: [idev] Erasing UDS.KEYID = 0
1,202,144 UART: [idev] Sha1 KeyId Algorithm
1,210,666 UART: [idev] --
1,211,662 UART: [ldev] ++
1,211,830 UART: [ldev] CDI.KEYID = 6
1,212,193 UART: [ldev] SUBJECT.KEYID = 5
1,212,619 UART: [ldev] AUTHORITY.KEYID = 7
1,213,082 UART: [ldev] FE.KEYID = 1
1,218,470 UART: [ldev] Erasing FE.KEYID = 1
1,244,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,522 UART: [ldev] --
1,283,825 UART: [fwproc] Wait for Commands...
1,284,453 UART: [fwproc] Recv command 0x46574c44
1,285,181 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,096 UART: ROM Fatal Error: 0x000B0007
1,310,253 >>> mbox cmd response: failed
1,310,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,259 >>> mbox cmd response: failed
1,310,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
893,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,696 UART: [kat] ++
897,848 UART: [kat] sha1
902,010 UART: [kat] SHA2-256
903,950 UART: [kat] SHA2-384
906,717 UART: [kat] SHA2-512-ACC
908,618 UART: [kat] ECC-384
918,209 UART: [kat] HMAC-384Kdf
923,051 UART: [kat] LMS
1,171,379 UART: [kat] --
1,172,314 UART: [cold-reset] ++
1,172,682 UART: [fht] FHT @ 0x50003400
1,175,275 UART: [idev] ++
1,175,443 UART: [idev] CDI.KEYID = 6
1,175,803 UART: [idev] SUBJECT.KEYID = 7
1,176,227 UART: [idev] UDS.KEYID = 0
1,176,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,661 UART: [idev] Erasing UDS.KEYID = 0
1,201,936 UART: [idev] Sha1 KeyId Algorithm
1,210,212 UART: [idev] --
1,211,190 UART: [ldev] ++
1,211,358 UART: [ldev] CDI.KEYID = 6
1,211,721 UART: [ldev] SUBJECT.KEYID = 5
1,212,147 UART: [ldev] AUTHORITY.KEYID = 7
1,212,610 UART: [ldev] FE.KEYID = 1
1,217,772 UART: [ldev] Erasing FE.KEYID = 1
1,244,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,152 UART: [ldev] --
1,283,467 UART: [fwproc] Wait for Commands...
1,284,235 UART: [fwproc] Recv command 0x46574c44
1,284,963 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,485 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,874 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,946 >>> mbox cmd response: failed
1,163,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,952 >>> mbox cmd response: failed
1,163,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,479 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,077 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,001 UART: [kat] ++
895,153 UART: [kat] sha1
899,375 UART: [kat] SHA2-256
901,315 UART: [kat] SHA2-384
904,016 UART: [kat] SHA2-512-ACC
905,917 UART: [kat] ECC-384
915,324 UART: [kat] HMAC-384Kdf
919,758 UART: [kat] LMS
1,168,070 UART: [kat] --
1,169,127 UART: [cold-reset] ++
1,169,571 UART: [fht] FHT @ 0x50003400
1,172,113 UART: [idev] ++
1,172,281 UART: [idev] CDI.KEYID = 6
1,172,642 UART: [idev] SUBJECT.KEYID = 7
1,173,067 UART: [idev] UDS.KEYID = 0
1,173,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,097 UART: [idev] Erasing UDS.KEYID = 0
1,197,861 UART: [idev] Sha1 KeyId Algorithm
1,206,549 UART: [idev] --
1,207,640 UART: [ldev] ++
1,207,808 UART: [ldev] CDI.KEYID = 6
1,208,172 UART: [ldev] SUBJECT.KEYID = 5
1,208,599 UART: [ldev] AUTHORITY.KEYID = 7
1,209,062 UART: [ldev] FE.KEYID = 1
1,214,490 UART: [ldev] Erasing FE.KEYID = 1
1,240,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,458 UART: [ldev] --
1,279,956 UART: [fwproc] Wait for Commands...
1,280,535 UART: [fwproc] Recv command 0x46574c44
1,281,268 UART: [fwproc] Recv'd Img size: 114448 bytes
1,305,823 UART: ROM Fatal Error: 0x000B0007
1,306,980 >>> mbox cmd response: failed
1,306,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,986 >>> mbox cmd response: failed
1,306,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,513 UART: [kat] SHA2-256
901,453 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,846 UART: [kat] LMS
1,169,158 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,149 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,208,281 UART: [idev] --
1,209,314 UART: [ldev] ++
1,209,482 UART: [ldev] CDI.KEYID = 6
1,209,846 UART: [ldev] SUBJECT.KEYID = 5
1,210,273 UART: [ldev] AUTHORITY.KEYID = 7
1,210,736 UART: [ldev] FE.KEYID = 1
1,215,562 UART: [ldev] Erasing FE.KEYID = 1
1,241,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,208 UART: [ldev] --
1,280,556 UART: [fwproc] Wait for Commands...
1,281,341 UART: [fwproc] Recv command 0x46574c44
1,282,074 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,765 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,159,095 >>> mbox cmd response: failed
1,159,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,101 >>> mbox cmd response: failed
1,159,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,107 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,893 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,723 UART: [state] LifecycleState = Unprovisioned
85,378 UART: [state] DebugLocked = No
86,068 UART: [state] WD Timer not started. Device not locked for debugging
87,277 UART: [kat] SHA2-256
890,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,956 UART: [kat] ++
895,108 UART: [kat] sha1
899,424 UART: [kat] SHA2-256
901,364 UART: [kat] SHA2-384
904,139 UART: [kat] SHA2-512-ACC
906,040 UART: [kat] ECC-384
916,093 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,170,072 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,172,926 UART: [idev] ++
1,173,094 UART: [idev] CDI.KEYID = 6
1,173,455 UART: [idev] SUBJECT.KEYID = 7
1,173,880 UART: [idev] UDS.KEYID = 0
1,174,226 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,198,574 UART: [idev] Sha1 KeyId Algorithm
1,207,446 UART: [idev] --
1,208,453 UART: [ldev] ++
1,208,621 UART: [ldev] CDI.KEYID = 6
1,208,985 UART: [ldev] SUBJECT.KEYID = 5
1,209,412 UART: [ldev] AUTHORITY.KEYID = 7
1,209,875 UART: [ldev] FE.KEYID = 1
1,215,053 UART: [ldev] Erasing FE.KEYID = 1
1,241,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,613 UART: [ldev] --
1,281,033 UART: [fwproc] Wait for Commands...
1,281,686 UART: [fwproc] Recv command 0x46574c44
1,282,419 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,158 UART: ROM Fatal Error: 0x000B0007
1,307,315 >>> mbox cmd response: failed
1,307,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,321 >>> mbox cmd response: failed
1,307,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,327 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,489 UART: [kat] SHA2-512-ACC
906,390 UART: [kat] ECC-384
916,097 UART: [kat] HMAC-384Kdf
920,781 UART: [kat] LMS
1,169,093 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,174,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,110 UART: [idev] Sha1 KeyId Algorithm
1,209,018 UART: [idev] --
1,209,885 UART: [ldev] ++
1,210,053 UART: [ldev] CDI.KEYID = 6
1,210,417 UART: [ldev] SUBJECT.KEYID = 5
1,210,844 UART: [ldev] AUTHORITY.KEYID = 7
1,211,307 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,243,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,375 UART: [ldev] --
1,282,769 UART: [fwproc] Wait for Commands...
1,283,528 UART: [fwproc] Recv command 0x46574c44
1,284,261 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,740 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,774 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,674 >>> mbox cmd response: failed
1,161,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,680 >>> mbox cmd response: failed
1,161,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,686 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,422 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
4,879,320 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,874,226 >>> mbox cmd response: failed
16,874,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,875,355 >>> mbox cmd response: failed
16,875,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,875,931 >>> mbox cmd response: failed
Initializing fuses
2,062,146 writing to cptra_bootfsm_go
6,938,315 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,513,715 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
4,882,698 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,867,470 >>> mbox cmd response: failed
16,868,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,868,506 >>> mbox cmd response: failed
16,868,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,869,092 >>> mbox cmd response: failed
Initializing fuses
2,056,750 writing to cptra_bootfsm_go
6,926,228 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,481,461 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
5,191,241 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,060,882 >>> mbox cmd response: failed
17,061,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,061,742 >>> mbox cmd response: failed
17,062,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,062,309 >>> mbox cmd response: failed
Initializing fuses
2,060,854 writing to cptra_bootfsm_go
7,985,488 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,415,009 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
5,190,820 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,061,353 >>> mbox cmd response: failed
17,061,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,062,354 >>> mbox cmd response: failed
17,062,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,062,918 >>> mbox cmd response: failed
Initializing fuses
2,058,132 writing to cptra_bootfsm_go
7,991,008 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,435,570 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,460,195 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,674,972 >>> mbox cmd response: failed
12,675,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,675,848 >>> mbox cmd response: failed
12,676,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,676,413 >>> mbox cmd response: failed
Initializing fuses
2,059,417 writing to cptra_bootfsm_go
5,506,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,342,830 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,463,133 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,678,325 >>> mbox cmd response: failed
12,678,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,679,217 >>> mbox cmd response: failed
12,679,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,679,819 >>> mbox cmd response: failed
Initializing fuses
2,054,480 writing to cptra_bootfsm_go
5,482,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,342,815 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,790,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,928,163 >>> mbox cmd response: failed
12,928,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,929,276 >>> mbox cmd response: failed
12,929,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,929,855 >>> mbox cmd response: failed
Initializing fuses
2,053,994 writing to cptra_bootfsm_go
10,726,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,458,146 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,790,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,915,716 >>> mbox cmd response: failed
12,916,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,916,613 >>> mbox cmd response: failed
12,916,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,198 >>> mbox cmd response: failed
Initializing fuses
2,060,827 writing to cptra_bootfsm_go
10,736,013 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,462,584 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,451,429 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,680,443 >>> mbox cmd response: failed
12,681,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,436 >>> mbox cmd response: failed
12,681,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,997 >>> mbox cmd response: failed
Initializing fuses
2,063,358 writing to cptra_bootfsm_go
5,521,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,322,446 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,790,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,904,405 >>> mbox cmd response: failed
12,905,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,905,577 >>> mbox cmd response: failed
12,905,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,906,164 >>> mbox cmd response: failed
Initializing fuses
2,059,866 writing to cptra_bootfsm_go
10,733,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,460,149 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,430,425 >>> mbox cmd response: failed
1,430,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,431 >>> mbox cmd response: failed
1,430,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,697 UART: [kat] SHA2-256
881,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,743 UART: [kat] ++
885,895 UART: [kat] sha1
890,227 UART: [kat] SHA2-256
892,165 UART: [kat] SHA2-384
894,832 UART: [kat] SHA2-512-ACC
896,733 UART: [kat] ECC-384
902,166 UART: [kat] HMAC-384Kdf
906,792 UART: [kat] LMS
1,474,988 UART: [kat] --
1,475,635 UART: [cold-reset] ++
1,476,141 UART: [fht] Storing FHT @ 0x50003400
1,478,990 UART: [idev] ++
1,479,158 UART: [idev] CDI.KEYID = 6
1,479,518 UART: [idev] SUBJECT.KEYID = 7
1,479,942 UART: [idev] UDS.KEYID = 0
1,480,287 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,738 UART: [idev] Erasing UDS.KEYID = 0
1,503,708 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,420 UART: [idev] --
1,513,455 UART: [ldev] ++
1,513,623 UART: [ldev] CDI.KEYID = 6
1,513,986 UART: [ldev] SUBJECT.KEYID = 5
1,514,412 UART: [ldev] AUTHORITY.KEYID = 7
1,514,875 UART: [ldev] FE.KEYID = 1
1,520,185 UART: [ldev] Erasing FE.KEYID = 1
1,545,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,104 UART: [ldev] --
1,584,483 UART: [fwproc] Waiting for Commands...
1,585,190 UART: [fwproc] Received command 0x46574c44
1,585,981 UART: [fwproc] Received Image of size 114448 bytes
2,885,073 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,597 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,949 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,998 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,653 >>> mbox cmd response: failed
1,427,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,659 >>> mbox cmd response: failed
1,427,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,652 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,206 >>> mbox cmd response: failed
1,428,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,212 >>> mbox cmd response: failed
1,428,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,273 UART: [kat] SHA2-512-ACC
897,174 UART: [kat] ECC-384
903,079 UART: [kat] HMAC-384Kdf
907,725 UART: [kat] LMS
1,475,921 UART: [kat] --
1,476,846 UART: [cold-reset] ++
1,477,188 UART: [fht] Storing FHT @ 0x50003400
1,479,899 UART: [idev] ++
1,480,067 UART: [idev] CDI.KEYID = 6
1,480,427 UART: [idev] SUBJECT.KEYID = 7
1,480,851 UART: [idev] UDS.KEYID = 0
1,481,196 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,149 UART: [idev] Erasing UDS.KEYID = 0
1,505,721 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,383 UART: [idev] --
1,515,282 UART: [ldev] ++
1,515,450 UART: [ldev] CDI.KEYID = 6
1,515,813 UART: [ldev] SUBJECT.KEYID = 5
1,516,239 UART: [ldev] AUTHORITY.KEYID = 7
1,516,702 UART: [ldev] FE.KEYID = 1
1,522,238 UART: [ldev] Erasing FE.KEYID = 1
1,547,575 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,183 UART: [ldev] --
1,586,698 UART: [fwproc] Waiting for Commands...
1,587,527 UART: [fwproc] Received command 0x46574c44
1,588,318 UART: [fwproc] Received Image of size 114448 bytes
2,886,980 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,048 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,400 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,485 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,032 >>> mbox cmd response: failed
1,428,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,038 >>> mbox cmd response: failed
1,428,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,755 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,426,789 >>> mbox cmd response: failed
1,426,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,795 >>> mbox cmd response: failed
1,426,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
893,392 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,517 UART: [kat] ++
897,669 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,576 UART: [kat] SHA2-512-ACC
908,477 UART: [kat] ECC-384
918,484 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,172,275 UART: [cold-reset] ++
1,172,773 UART: [fht] FHT @ 0x50003400
1,175,432 UART: [idev] ++
1,175,600 UART: [idev] CDI.KEYID = 6
1,175,960 UART: [idev] SUBJECT.KEYID = 7
1,176,384 UART: [idev] UDS.KEYID = 0
1,176,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,662 UART: [idev] Erasing UDS.KEYID = 0
1,201,803 UART: [idev] Sha1 KeyId Algorithm
1,210,213 UART: [idev] --
1,211,303 UART: [ldev] ++
1,211,471 UART: [ldev] CDI.KEYID = 6
1,211,834 UART: [ldev] SUBJECT.KEYID = 5
1,212,260 UART: [ldev] AUTHORITY.KEYID = 7
1,212,723 UART: [ldev] FE.KEYID = 1
1,217,643 UART: [ldev] Erasing FE.KEYID = 1
1,244,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,175 UART: [ldev] --
1,283,612 UART: [fwproc] Wait for Commands...
1,284,256 UART: [fwproc] Recv command 0x46574c44
1,284,984 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,940 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,265 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,785 >>> mbox cmd response: failed
1,427,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,791 >>> mbox cmd response: failed
1,427,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,797 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,811 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,048 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,852 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,694 >>> mbox cmd response: failed
1,428,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,700 >>> mbox cmd response: failed
1,428,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,706 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
893,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,880 UART: [kat] ++
898,032 UART: [kat] sha1
902,332 UART: [kat] SHA2-256
904,272 UART: [kat] SHA2-384
907,113 UART: [kat] SHA2-512-ACC
909,014 UART: [kat] ECC-384
918,619 UART: [kat] HMAC-384Kdf
923,195 UART: [kat] LMS
1,171,523 UART: [kat] --
1,172,454 UART: [cold-reset] ++
1,172,912 UART: [fht] FHT @ 0x50003400
1,175,597 UART: [idev] ++
1,175,765 UART: [idev] CDI.KEYID = 6
1,176,125 UART: [idev] SUBJECT.KEYID = 7
1,176,549 UART: [idev] UDS.KEYID = 0
1,176,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,899 UART: [idev] Erasing UDS.KEYID = 0
1,201,762 UART: [idev] Sha1 KeyId Algorithm
1,210,220 UART: [idev] --
1,211,236 UART: [ldev] ++
1,211,404 UART: [ldev] CDI.KEYID = 6
1,211,767 UART: [ldev] SUBJECT.KEYID = 5
1,212,193 UART: [ldev] AUTHORITY.KEYID = 7
1,212,656 UART: [ldev] FE.KEYID = 1
1,217,844 UART: [ldev] Erasing FE.KEYID = 1
1,244,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,702 UART: [ldev] --
1,284,099 UART: [fwproc] Wait for Commands...
1,284,731 UART: [fwproc] Recv command 0x46574c44
1,285,459 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,459 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,344 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,794 >>> mbox cmd response: failed
1,428,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,800 >>> mbox cmd response: failed
1,428,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,737 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,339 >>> mbox cmd response: failed
1,428,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,345 >>> mbox cmd response: failed
1,428,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,623 UART: [kat] ++
895,775 UART: [kat] sha1
900,103 UART: [kat] SHA2-256
902,043 UART: [kat] SHA2-384
904,978 UART: [kat] SHA2-512-ACC
906,879 UART: [kat] ECC-384
916,566 UART: [kat] HMAC-384Kdf
921,242 UART: [kat] LMS
1,169,554 UART: [kat] --
1,170,333 UART: [cold-reset] ++
1,170,869 UART: [fht] FHT @ 0x50003400
1,173,375 UART: [idev] ++
1,173,543 UART: [idev] CDI.KEYID = 6
1,173,904 UART: [idev] SUBJECT.KEYID = 7
1,174,329 UART: [idev] UDS.KEYID = 0
1,174,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,693 UART: [idev] Erasing UDS.KEYID = 0
1,200,037 UART: [idev] Sha1 KeyId Algorithm
1,208,969 UART: [idev] --
1,209,966 UART: [ldev] ++
1,210,134 UART: [ldev] CDI.KEYID = 6
1,210,498 UART: [ldev] SUBJECT.KEYID = 5
1,210,925 UART: [ldev] AUTHORITY.KEYID = 7
1,211,388 UART: [ldev] FE.KEYID = 1
1,216,624 UART: [ldev] Erasing FE.KEYID = 1
1,242,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,342 UART: [ldev] --
1,281,712 UART: [fwproc] Wait for Commands...
1,282,345 UART: [fwproc] Recv command 0x46574c44
1,283,078 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,349 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,037 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,427,741 >>> mbox cmd response: failed
1,427,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,747 >>> mbox cmd response: failed
1,427,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,917 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,428,780 >>> mbox cmd response: failed
1,428,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,786 >>> mbox cmd response: failed
1,428,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,792 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,314 UART: [fht] FHT @ 0x50003400
1,173,062 UART: [idev] ++
1,173,230 UART: [idev] CDI.KEYID = 6
1,173,591 UART: [idev] SUBJECT.KEYID = 7
1,174,016 UART: [idev] UDS.KEYID = 0
1,174,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,026 UART: [idev] Erasing UDS.KEYID = 0
1,199,860 UART: [idev] Sha1 KeyId Algorithm
1,208,830 UART: [idev] --
1,209,853 UART: [ldev] ++
1,210,021 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,981 UART: [ldev] --
1,282,277 UART: [fwproc] Wait for Commands...
1,282,888 UART: [fwproc] Recv command 0x46574c44
1,283,621 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,272 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,429,710 >>> mbox cmd response: failed
1,429,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,716 >>> mbox cmd response: failed
1,429,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,812 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,298 UART:
192,662 UART: Running Caliptra ROM ...
193,789 UART:
193,939 UART: [state] CFI Enabled
261,978 UART: [state] LifecycleState = Unprovisioned
263,952 UART: [state] DebugLocked = No
265,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,667 UART: [kat] SHA2-256
440,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,862 UART: [kat] ++
451,311 UART: [kat] sha1
463,107 UART: [kat] SHA2-256
465,793 UART: [kat] SHA2-384
470,473 UART: [kat] SHA2-512-ACC
472,864 UART: [kat] ECC-384
2,767,582 UART: [kat] HMAC-384Kdf
2,779,053 UART: [kat] LMS
3,969,359 UART: [kat] --
3,973,329 UART: [cold-reset] ++
3,975,976 UART: [fht] Storing FHT @ 0x50003400
3,988,058 UART: [idev] ++
3,988,628 UART: [idev] CDI.KEYID = 6
3,989,606 UART: [idev] SUBJECT.KEYID = 7
3,990,842 UART: [idev] UDS.KEYID = 0
3,994,059 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,137,876 UART: [idev] Erasing UDS.KEYID = 0
7,328,931 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,528 UART: [idev] --
7,352,882 UART: [ldev] ++
7,353,458 UART: [ldev] CDI.KEYID = 6
7,354,430 UART: [ldev] SUBJECT.KEYID = 5
7,355,651 UART: [ldev] AUTHORITY.KEYID = 7
7,356,887 UART: [ldev] FE.KEYID = 1
7,400,477 UART: [ldev] Erasing FE.KEYID = 1
10,732,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,336 UART: [ldev] --
13,094,964 UART: [fwproc] Waiting for Commands...
13,097,821 UART: [fwproc] Received command 0x46574c44
13,100,011 UART: [fwproc] Received Image of size 114124 bytes
17,151,248 UART: ROM Fatal Error: 0x000B0016
17,154,651 >>> mbox cmd response: failed
17,155,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,155,451 >>> mbox cmd response: failed
17,155,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,156,014 >>> mbox cmd response: failed
Initializing fuses
2,059,552 writing to cptra_bootfsm_go
2,248,872 UART:
2,249,241 UART: Running Caliptra ROM ...
2,250,287 UART:
2,250,442 UART: [state] CFI Enabled
2,324,195 UART: [state] LifecycleState = Unprovisioned
2,326,133 UART: [state] DebugLocked = No
2,328,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,333,432 UART: [kat] SHA2-256
2,503,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,513,593 UART: [kat] ++
2,514,052 UART: [kat] sha1
2,524,839 UART: [kat] SHA2-256
2,527,536 UART: [kat] SHA2-384
2,533,252 UART: [kat] SHA2-512-ACC
2,535,601 UART: [kat] ECC-384
4,829,232 UART: [kat] HMAC-384Kdf
4,859,765 UART: [kat] LMS
6,050,035 UART: [kat] --
6,054,865 UART: [cold-reset] ++
6,056,208 UART: [fht] Storing FHT @ 0x50003400
6,067,251 UART: [idev] ++
6,067,840 UART: [idev] CDI.KEYID = 6
6,068,865 UART: [idev] SUBJECT.KEYID = 7
6,070,025 UART: [idev] UDS.KEYID = 0
6,072,691 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,216,351 UART: [idev] Erasing UDS.KEYID = 0
9,408,322 UART: [idev] Using Sha1 for KeyId Algorithm
9,429,972 UART: [idev] --
9,433,240 UART: [ldev] ++
9,433,814 UART: [ldev] CDI.KEYID = 6
9,434,787 UART: [ldev] SUBJECT.KEYID = 5
9,436,063 UART: [ldev] AUTHORITY.KEYID = 7
9,437,248 UART: [ldev] FE.KEYID = 1
9,483,947 UART: [ldev] Erasing FE.KEYID = 1
12,815,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,111,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,126,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,140,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,155,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,173,440 UART: [ldev] --
15,178,816 UART: [fwproc] Waiting for Commands...
15,180,801 UART: [fwproc] Received command 0x46574c44
15,182,994 UART: [fwproc] Received Image of size 114124 bytes
19,234,656 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,315,450 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,384,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,700,996 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,786,847 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,124,934 >>> mbox cmd response: failed
17,125,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,125,913 >>> mbox cmd response: failed
17,126,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,126,476 >>> mbox cmd response: failed
Initializing fuses
2,057,554 writing to cptra_bootfsm_go
5,855,247 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,925,476 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,446 UART:
192,811 UART: Running Caliptra ROM ...
194,010 UART:
603,806 UART: [state] CFI Enabled
616,508 UART: [state] LifecycleState = Unprovisioned
618,444 UART: [state] DebugLocked = No
619,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,184 UART: [kat] SHA2-256
794,929 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,459 UART: [kat] ++
806,015 UART: [kat] sha1
816,740 UART: [kat] SHA2-256
819,417 UART: [kat] SHA2-384
826,912 UART: [kat] SHA2-512-ACC
829,250 UART: [kat] ECC-384
3,111,724 UART: [kat] HMAC-384Kdf
3,123,422 UART: [kat] LMS
4,313,511 UART: [kat] --
4,319,252 UART: [cold-reset] ++
4,320,731 UART: [fht] Storing FHT @ 0x50003400
4,332,280 UART: [idev] ++
4,332,848 UART: [idev] CDI.KEYID = 6
4,333,773 UART: [idev] SUBJECT.KEYID = 7
4,335,041 UART: [idev] UDS.KEYID = 0
4,337,690 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,204 UART: [idev] Erasing UDS.KEYID = 0
7,620,846 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,558 UART: [idev] --
7,645,425 UART: [ldev] ++
7,645,997 UART: [ldev] CDI.KEYID = 6
7,647,013 UART: [ldev] SUBJECT.KEYID = 5
7,648,175 UART: [ldev] AUTHORITY.KEYID = 7
7,649,406 UART: [ldev] FE.KEYID = 1
7,660,328 UART: [ldev] Erasing FE.KEYID = 1
10,949,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,130 UART: [ldev] --
13,309,748 UART: [fwproc] Waiting for Commands...
13,312,976 UART: [fwproc] Received command 0x46574c44
13,315,182 UART: [fwproc] Received Image of size 114124 bytes
17,362,395 UART: ROM Fatal Error: 0x000B0016
17,365,803 >>> mbox cmd response: failed
17,366,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,366,545 >>> mbox cmd response: failed
17,366,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,367,110 >>> mbox cmd response: failed
Initializing fuses
2,053,032 writing to cptra_bootfsm_go
2,242,383 UART:
2,242,742 UART: Running Caliptra ROM ...
2,243,877 UART:
3,108,747 UART: [state] CFI Enabled
3,121,560 UART: [state] LifecycleState = Unprovisioned
3,123,478 UART: [state] DebugLocked = No
3,125,138 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,130,148 UART: [kat] SHA2-256
3,299,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,310,417 UART: [kat] ++
3,310,965 UART: [kat] sha1
3,323,532 UART: [kat] SHA2-256
3,326,274 UART: [kat] SHA2-384
3,331,019 UART: [kat] SHA2-512-ACC
3,333,369 UART: [kat] ECC-384
5,616,787 UART: [kat] HMAC-384Kdf
5,628,206 UART: [kat] LMS
6,818,307 UART: [kat] --
6,823,079 UART: [cold-reset] ++
6,824,589 UART: [fht] Storing FHT @ 0x50003400
6,835,877 UART: [idev] ++
6,836,463 UART: [idev] CDI.KEYID = 6
6,837,408 UART: [idev] SUBJECT.KEYID = 7
6,838,679 UART: [idev] UDS.KEYID = 0
6,841,024 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,984,506 UART: [idev] Erasing UDS.KEYID = 0
10,131,860 UART: [idev] Using Sha1 for KeyId Algorithm
10,154,310 UART: [idev] --
10,159,359 UART: [ldev] ++
10,159,937 UART: [ldev] CDI.KEYID = 6
10,160,956 UART: [ldev] SUBJECT.KEYID = 5
10,162,152 UART: [ldev] AUTHORITY.KEYID = 7
10,163,390 UART: [ldev] FE.KEYID = 1
10,174,659 UART: [ldev] Erasing FE.KEYID = 1
13,464,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,756,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,771,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,786,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,800,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,821,023 UART: [ldev] --
15,826,397 UART: [fwproc] Waiting for Commands...
15,829,416 UART: [fwproc] Received command 0x46574c44
15,831,624 UART: [fwproc] Received Image of size 114124 bytes
19,888,336 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,968,596 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,037,495 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,355,207 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,129,351 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,332,840 >>> mbox cmd response: failed
17,333,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,333,792 >>> mbox cmd response: failed
17,334,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,334,371 >>> mbox cmd response: failed
Initializing fuses
2,049,618 writing to cptra_bootfsm_go
6,658,968 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,601,258 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,309 UART:
192,661 UART: Running Caliptra ROM ...
193,862 UART:
194,017 UART: [state] CFI Enabled
262,975 UART: [state] LifecycleState = Unprovisioned
264,856 UART: [state] DebugLocked = No
267,649 UART: [state] WD Timer not started. Device not locked for debugging
271,145 UART: [kat] SHA2-256
450,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,823 UART: [kat] ++
462,354 UART: [kat] sha1
472,260 UART: [kat] SHA2-256
475,321 UART: [kat] SHA2-384
481,523 UART: [kat] SHA2-512-ACC
484,508 UART: [kat] ECC-384
2,947,838 UART: [kat] HMAC-384Kdf
2,971,366 UART: [kat] LMS
3,500,828 UART: [kat] --
3,505,118 UART: [cold-reset] ++
3,506,291 UART: [fht] FHT @ 0x50003400
3,516,920 UART: [idev] ++
3,517,522 UART: [idev] CDI.KEYID = 6
3,518,441 UART: [idev] SUBJECT.KEYID = 7
3,519,665 UART: [idev] UDS.KEYID = 0
3,522,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,308 UART: [idev] Erasing UDS.KEYID = 0
6,025,658 UART: [idev] Sha1 KeyId Algorithm
6,050,186 UART: [idev] --
6,053,914 UART: [ldev] ++
6,054,493 UART: [ldev] CDI.KEYID = 6
6,055,405 UART: [ldev] SUBJECT.KEYID = 5
6,056,569 UART: [ldev] AUTHORITY.KEYID = 7
6,057,856 UART: [ldev] FE.KEYID = 1
6,099,026 UART: [ldev] Erasing FE.KEYID = 1
8,604,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,026 UART: [ldev] --
10,413,273 UART: [fwproc] Wait for Commands...
10,414,880 UART: [fwproc] Recv command 0x46574c44
10,416,976 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,782 UART: ROM Fatal Error: 0x000B0016
13,818,916 >>> mbox cmd response: failed
13,819,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,819,662 >>> mbox cmd response: failed
13,819,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,820,217 >>> mbox cmd response: failed
Initializing fuses
2,052,420 writing to cptra_bootfsm_go
2,241,751 UART:
2,242,093 UART: Running Caliptra ROM ...
2,243,235 UART:
2,243,397 UART: [state] CFI Enabled
2,313,305 UART: [state] LifecycleState = Unprovisioned
2,315,191 UART: [state] DebugLocked = No
2,316,419 UART: [state] WD Timer not started. Device not locked for debugging
2,320,705 UART: [kat] SHA2-256
2,499,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,402 UART: [kat] ++
2,511,951 UART: [kat] sha1
2,524,568 UART: [kat] SHA2-256
2,527,594 UART: [kat] SHA2-384
2,533,417 UART: [kat] SHA2-512-ACC
2,536,356 UART: [kat] ECC-384
5,002,617 UART: [kat] HMAC-384Kdf
5,023,872 UART: [kat] LMS
5,553,316 UART: [kat] --
5,557,436 UART: [cold-reset] ++
5,559,646 UART: [fht] FHT @ 0x50003400
5,571,060 UART: [idev] ++
5,571,637 UART: [idev] CDI.KEYID = 6
5,572,551 UART: [idev] SUBJECT.KEYID = 7
5,573,709 UART: [idev] UDS.KEYID = 0
5,576,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,720,336 UART: [idev] Erasing UDS.KEYID = 0
8,077,410 UART: [idev] Sha1 KeyId Algorithm
8,101,013 UART: [idev] --
8,103,870 UART: [ldev] ++
8,104,452 UART: [ldev] CDI.KEYID = 6
8,105,360 UART: [ldev] SUBJECT.KEYID = 5
8,106,465 UART: [ldev] AUTHORITY.KEYID = 7
8,107,806 UART: [ldev] FE.KEYID = 1
8,151,719 UART: [ldev] Erasing FE.KEYID = 1
10,655,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,970 UART: [ldev] --
12,465,695 UART: [fwproc] Wait for Commands...
12,467,251 UART: [fwproc] Recv command 0x46574c44
12,469,287 UART: [fwproc] Recv'd Img size: 114448 bytes
15,872,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,941,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,010,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,329,182 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,362,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,597,840 >>> mbox cmd response: failed
13,598,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,598,775 >>> mbox cmd response: failed
13,599,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,599,320 >>> mbox cmd response: failed
Initializing fuses
2,050,705 writing to cptra_bootfsm_go
5,416,195 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,116,081 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
192,692 UART:
193,040 UART: Running Caliptra ROM ...
194,214 UART:
603,602 UART: [state] CFI Enabled
617,335 UART: [state] LifecycleState = Unprovisioned
619,248 UART: [state] DebugLocked = No
621,427 UART: [state] WD Timer not started. Device not locked for debugging
624,491 UART: [kat] SHA2-256
803,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,072 UART: [kat] ++
815,530 UART: [kat] sha1
827,104 UART: [kat] SHA2-256
830,115 UART: [kat] SHA2-384
835,065 UART: [kat] SHA2-512-ACC
838,052 UART: [kat] ECC-384
3,276,217 UART: [kat] HMAC-384Kdf
3,288,572 UART: [kat] LMS
3,818,064 UART: [kat] --
3,822,974 UART: [cold-reset] ++
3,824,626 UART: [fht] FHT @ 0x50003400
3,835,108 UART: [idev] ++
3,835,681 UART: [idev] CDI.KEYID = 6
3,836,587 UART: [idev] SUBJECT.KEYID = 7
3,837,800 UART: [idev] UDS.KEYID = 0
3,840,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,984,829 UART: [idev] Erasing UDS.KEYID = 0
6,310,850 UART: [idev] Sha1 KeyId Algorithm
6,333,476 UART: [idev] --
6,338,977 UART: [ldev] ++
6,339,545 UART: [ldev] CDI.KEYID = 6
6,340,460 UART: [ldev] SUBJECT.KEYID = 5
6,341,676 UART: [ldev] AUTHORITY.KEYID = 7
6,342,908 UART: [ldev] FE.KEYID = 1
6,354,911 UART: [ldev] Erasing FE.KEYID = 1
8,829,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,318 UART: [ldev] --
10,619,993 UART: [fwproc] Wait for Commands...
10,622,415 UART: [fwproc] Recv command 0x46574c44
10,624,667 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,000 UART: ROM Fatal Error: 0x000B0016
14,029,155 >>> mbox cmd response: failed
14,029,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,029,909 >>> mbox cmd response: failed
14,030,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,030,678 >>> mbox cmd response: failed
Initializing fuses
2,053,020 writing to cptra_bootfsm_go
2,242,387 UART:
2,242,729 UART: Running Caliptra ROM ...
2,243,864 UART:
6,440,177 UART: [state] CFI Enabled
6,454,819 UART: [state] LifecycleState = Unprovisioned
6,456,670 UART: [state] DebugLocked = No
6,458,816 UART: [state] WD Timer not started. Device not locked for debugging
6,463,002 UART: [kat] SHA2-256
6,642,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,653,706 UART: [kat] ++
6,654,247 UART: [kat] sha1
6,665,305 UART: [kat] SHA2-256
6,668,320 UART: [kat] SHA2-384
6,674,093 UART: [kat] SHA2-512-ACC
6,677,028 UART: [kat] ECC-384
9,120,558 UART: [kat] HMAC-384Kdf
9,131,719 UART: [kat] LMS
9,661,224 UART: [kat] --
9,666,044 UART: [cold-reset] ++
9,668,414 UART: [fht] FHT @ 0x50003400
9,678,904 UART: [idev] ++
9,679,471 UART: [idev] CDI.KEYID = 6
9,680,486 UART: [idev] SUBJECT.KEYID = 7
9,681,591 UART: [idev] UDS.KEYID = 0
9,684,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,828,131 UART: [idev] Erasing UDS.KEYID = 0
12,156,631 UART: [idev] Sha1 KeyId Algorithm
12,179,369 UART: [idev] --
12,183,203 UART: [ldev] ++
12,183,769 UART: [ldev] CDI.KEYID = 6
12,184,651 UART: [ldev] SUBJECT.KEYID = 5
12,185,806 UART: [ldev] AUTHORITY.KEYID = 7
12,187,112 UART: [ldev] FE.KEYID = 1
12,198,653 UART: [ldev] Erasing FE.KEYID = 1
14,669,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,388,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,404,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,419,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,435,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,456,363 UART: [ldev] --
16,460,924 UART: [fwproc] Wait for Commands...
16,463,180 UART: [fwproc] Recv command 0x46574c44
16,465,277 UART: [fwproc] Recv'd Img size: 114448 bytes
19,871,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,940,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,009,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,327,762 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,696,926 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,801,619 >>> mbox cmd response: failed
13,802,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,802,590 >>> mbox cmd response: failed
13,802,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,803,156 >>> mbox cmd response: failed
Initializing fuses
2,049,361 writing to cptra_bootfsm_go
9,758,023 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,329,855 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,442,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,638 >>> mbox cmd response: failed
14,281,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,281,714 >>> mbox cmd response: failed
14,281,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,282,268 >>> mbox cmd response: failed
Initializing fuses
2,049,261 writing to cptra_bootfsm_go
5,480,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,777,338 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,756,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,491,178 >>> mbox cmd response: failed
14,491,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,492,112 >>> mbox cmd response: failed
14,492,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,492,726 >>> mbox cmd response: failed
Initializing fuses
2,047,397 writing to cptra_bootfsm_go
9,117,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,315,855 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,677 UART: [kat] SHA2-256
892,615 UART: [kat] SHA2-384
895,474 UART: [kat] SHA2-512-ACC
897,375 UART: [kat] ECC-384
903,178 UART: [kat] HMAC-384Kdf
907,800 UART: [kat] LMS
1,475,996 UART: [kat] --
1,476,731 UART: [cold-reset] ++
1,477,219 UART: [fht] Storing FHT @ 0x50003400
1,480,038 UART: [idev] ++
1,480,206 UART: [idev] CDI.KEYID = 6
1,480,566 UART: [idev] SUBJECT.KEYID = 7
1,480,990 UART: [idev] UDS.KEYID = 0
1,481,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,930 UART: [idev] Erasing UDS.KEYID = 0
1,505,766 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,354 UART: [idev] --
1,515,293 UART: [ldev] ++
1,515,461 UART: [ldev] CDI.KEYID = 6
1,515,824 UART: [ldev] SUBJECT.KEYID = 5
1,516,250 UART: [ldev] AUTHORITY.KEYID = 7
1,516,713 UART: [ldev] FE.KEYID = 1
1,521,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,376 UART: [ldev] --
1,586,733 UART: [fwproc] Waiting for Commands...
1,587,380 UART: [fwproc] Received command 0x46574c44
1,588,171 UART: [fwproc] Received Image of size 114448 bytes
2,886,348 UART: ROM Fatal Error: 0x000B0016
2,887,505 >>> mbox cmd response: failed
2,887,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,511 >>> mbox cmd response: failed
2,887,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
86,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,669 UART: [kat] SHA2-256
881,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,715 UART: [kat] ++
885,867 UART: [kat] sha1
889,961 UART: [kat] SHA2-256
891,899 UART: [kat] SHA2-384
894,598 UART: [kat] SHA2-512-ACC
896,499 UART: [kat] ECC-384
902,328 UART: [kat] HMAC-384Kdf
906,998 UART: [kat] LMS
1,475,194 UART: [kat] --
1,476,025 UART: [cold-reset] ++
1,476,549 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,356 UART: [idev] Erasing UDS.KEYID = 0
1,505,214 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,958 UART: [idev] --
1,514,951 UART: [ldev] ++
1,515,119 UART: [ldev] CDI.KEYID = 6
1,515,482 UART: [ldev] SUBJECT.KEYID = 5
1,515,908 UART: [ldev] AUTHORITY.KEYID = 7
1,516,371 UART: [ldev] FE.KEYID = 1
1,521,695 UART: [ldev] Erasing FE.KEYID = 1
1,547,234 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,726 UART: [ldev] --
1,586,117 UART: [fwproc] Waiting for Commands...
1,586,972 UART: [fwproc] Received command 0x46574c44
1,587,763 UART: [fwproc] Received Image of size 114448 bytes
2,886,855 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,459 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,811 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,970 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,885 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,738,593 >>> mbox cmd response: failed
2,738,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,599 >>> mbox cmd response: failed
2,738,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,875 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,890 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,330 UART: [kat] SHA2-256
882,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,376 UART: [kat] ++
886,528 UART: [kat] sha1
890,792 UART: [kat] SHA2-256
892,730 UART: [kat] SHA2-384
895,381 UART: [kat] SHA2-512-ACC
897,282 UART: [kat] ECC-384
902,795 UART: [kat] HMAC-384Kdf
907,255 UART: [kat] LMS
1,475,451 UART: [kat] --
1,476,264 UART: [cold-reset] ++
1,476,790 UART: [fht] Storing FHT @ 0x50003400
1,479,667 UART: [idev] ++
1,479,835 UART: [idev] CDI.KEYID = 6
1,480,195 UART: [idev] SUBJECT.KEYID = 7
1,480,619 UART: [idev] UDS.KEYID = 0
1,480,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,677 UART: [idev] Erasing UDS.KEYID = 0
1,505,865 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,491 UART: [idev] --
1,515,574 UART: [ldev] ++
1,515,742 UART: [ldev] CDI.KEYID = 6
1,516,105 UART: [ldev] SUBJECT.KEYID = 5
1,516,531 UART: [ldev] AUTHORITY.KEYID = 7
1,516,994 UART: [ldev] FE.KEYID = 1
1,521,992 UART: [ldev] Erasing FE.KEYID = 1
1,547,365 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,131 UART: [ldev] --
1,586,588 UART: [fwproc] Waiting for Commands...
1,587,335 UART: [fwproc] Received command 0x46574c44
1,588,126 UART: [fwproc] Received Image of size 114448 bytes
2,886,281 UART: ROM Fatal Error: 0x000B0016
2,887,438 >>> mbox cmd response: failed
2,887,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,444 >>> mbox cmd response: failed
2,887,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,288 UART: [kat] SHA2-256
882,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,334 UART: [kat] ++
886,486 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,255 UART: [kat] SHA2-512-ACC
897,156 UART: [kat] ECC-384
903,141 UART: [kat] HMAC-384Kdf
907,891 UART: [kat] LMS
1,476,087 UART: [kat] --
1,477,192 UART: [cold-reset] ++
1,477,554 UART: [fht] Storing FHT @ 0x50003400
1,480,373 UART: [idev] ++
1,480,541 UART: [idev] CDI.KEYID = 6
1,480,901 UART: [idev] SUBJECT.KEYID = 7
1,481,325 UART: [idev] UDS.KEYID = 0
1,481,670 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,281 UART: [idev] Erasing UDS.KEYID = 0
1,505,717 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,525 UART: [idev] --
1,515,650 UART: [ldev] ++
1,515,818 UART: [ldev] CDI.KEYID = 6
1,516,181 UART: [ldev] SUBJECT.KEYID = 5
1,516,607 UART: [ldev] AUTHORITY.KEYID = 7
1,517,070 UART: [ldev] FE.KEYID = 1
1,522,374 UART: [ldev] Erasing FE.KEYID = 1
1,548,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,159 UART: [ldev] --
1,587,530 UART: [fwproc] Waiting for Commands...
1,588,243 UART: [fwproc] Received command 0x46574c44
1,589,034 UART: [fwproc] Received Image of size 114448 bytes
2,888,434 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,354 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,791 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,289 >>> mbox cmd response: failed
2,740,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,295 >>> mbox cmd response: failed
2,740,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,821 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
893,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,629 UART: [kat] ++
897,781 UART: [kat] sha1
901,931 UART: [kat] SHA2-256
903,871 UART: [kat] SHA2-384
906,798 UART: [kat] SHA2-512-ACC
908,699 UART: [kat] ECC-384
918,540 UART: [kat] HMAC-384Kdf
923,068 UART: [kat] LMS
1,171,396 UART: [kat] --
1,172,537 UART: [cold-reset] ++
1,173,043 UART: [fht] FHT @ 0x50003400
1,175,682 UART: [idev] ++
1,175,850 UART: [idev] CDI.KEYID = 6
1,176,210 UART: [idev] SUBJECT.KEYID = 7
1,176,634 UART: [idev] UDS.KEYID = 0
1,176,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,398 UART: [idev] Erasing UDS.KEYID = 0
1,201,675 UART: [idev] Sha1 KeyId Algorithm
1,210,377 UART: [idev] --
1,211,385 UART: [ldev] ++
1,211,553 UART: [ldev] CDI.KEYID = 6
1,211,916 UART: [ldev] SUBJECT.KEYID = 5
1,212,342 UART: [ldev] AUTHORITY.KEYID = 7
1,212,805 UART: [ldev] FE.KEYID = 1
1,218,035 UART: [ldev] Erasing FE.KEYID = 1
1,244,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,303 UART: [ldev] --
1,283,718 UART: [fwproc] Wait for Commands...
1,284,422 UART: [fwproc] Recv command 0x46574c44
1,285,150 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,397 UART: ROM Fatal Error: 0x000B0016
2,584,554 >>> mbox cmd response: failed
2,584,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,560 >>> mbox cmd response: failed
2,584,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
893,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,503 UART: [kat] ++
897,655 UART: [kat] sha1
901,881 UART: [kat] SHA2-256
903,821 UART: [kat] SHA2-384
906,492 UART: [kat] SHA2-512-ACC
908,393 UART: [kat] ECC-384
918,396 UART: [kat] HMAC-384Kdf
922,952 UART: [kat] LMS
1,171,280 UART: [kat] --
1,172,503 UART: [cold-reset] ++
1,173,005 UART: [fht] FHT @ 0x50003400
1,175,440 UART: [idev] ++
1,175,608 UART: [idev] CDI.KEYID = 6
1,175,968 UART: [idev] SUBJECT.KEYID = 7
1,176,392 UART: [idev] UDS.KEYID = 0
1,176,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,054 UART: [idev] Erasing UDS.KEYID = 0
1,201,775 UART: [idev] Sha1 KeyId Algorithm
1,210,357 UART: [idev] --
1,211,457 UART: [ldev] ++
1,211,625 UART: [ldev] CDI.KEYID = 6
1,211,988 UART: [ldev] SUBJECT.KEYID = 5
1,212,414 UART: [ldev] AUTHORITY.KEYID = 7
1,212,877 UART: [ldev] FE.KEYID = 1
1,218,135 UART: [ldev] Erasing FE.KEYID = 1
1,245,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,253 UART: [ldev] --
1,284,546 UART: [fwproc] Wait for Commands...
1,285,366 UART: [fwproc] Recv command 0x46574c44
1,286,094 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,239 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,381 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,437,355 >>> mbox cmd response: failed
2,437,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,361 >>> mbox cmd response: failed
2,437,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,172 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
893,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,954 UART: [kat] ++
898,106 UART: [kat] sha1
902,274 UART: [kat] SHA2-256
904,214 UART: [kat] SHA2-384
907,081 UART: [kat] SHA2-512-ACC
908,982 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,209 UART: [kat] LMS
1,171,537 UART: [kat] --
1,172,596 UART: [cold-reset] ++
1,173,164 UART: [fht] FHT @ 0x50003400
1,175,847 UART: [idev] ++
1,176,015 UART: [idev] CDI.KEYID = 6
1,176,375 UART: [idev] SUBJECT.KEYID = 7
1,176,799 UART: [idev] UDS.KEYID = 0
1,177,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,569 UART: [idev] Erasing UDS.KEYID = 0
1,201,688 UART: [idev] Sha1 KeyId Algorithm
1,210,038 UART: [idev] --
1,210,968 UART: [ldev] ++
1,211,136 UART: [ldev] CDI.KEYID = 6
1,211,499 UART: [ldev] SUBJECT.KEYID = 5
1,211,925 UART: [ldev] AUTHORITY.KEYID = 7
1,212,388 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,244,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,104 UART: [ldev] --
1,283,579 UART: [fwproc] Wait for Commands...
1,284,319 UART: [fwproc] Recv command 0x46574c44
1,285,047 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,660 UART: ROM Fatal Error: 0x000B0016
2,585,817 >>> mbox cmd response: failed
2,585,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,585,823 >>> mbox cmd response: failed
2,585,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,585,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
893,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,762 UART: [kat] ++
897,914 UART: [kat] sha1
902,058 UART: [kat] SHA2-256
903,998 UART: [kat] SHA2-384
906,873 UART: [kat] SHA2-512-ACC
908,774 UART: [kat] ECC-384
918,665 UART: [kat] HMAC-384Kdf
923,277 UART: [kat] LMS
1,171,605 UART: [kat] --
1,172,486 UART: [cold-reset] ++
1,173,004 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,333 UART: [idev] Erasing UDS.KEYID = 0
1,201,250 UART: [idev] Sha1 KeyId Algorithm
1,209,686 UART: [idev] --
1,210,746 UART: [ldev] ++
1,210,914 UART: [ldev] CDI.KEYID = 6
1,211,277 UART: [ldev] SUBJECT.KEYID = 5
1,211,703 UART: [ldev] AUTHORITY.KEYID = 7
1,212,166 UART: [ldev] FE.KEYID = 1
1,217,464 UART: [ldev] Erasing FE.KEYID = 1
1,243,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,736 UART: [ldev] --
1,283,127 UART: [fwproc] Wait for Commands...
1,283,729 UART: [fwproc] Recv command 0x46574c44
1,284,457 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,641 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,945 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,810 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,437,858 >>> mbox cmd response: failed
2,437,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,864 >>> mbox cmd response: failed
2,437,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,870 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,167 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,319 UART: [kat] SHA2-256
901,259 UART: [kat] SHA2-384
904,038 UART: [kat] SHA2-512-ACC
905,939 UART: [kat] ECC-384
915,826 UART: [kat] HMAC-384Kdf
920,310 UART: [kat] LMS
1,168,622 UART: [kat] --
1,169,499 UART: [cold-reset] ++
1,170,017 UART: [fht] FHT @ 0x50003400
1,172,573 UART: [idev] ++
1,172,741 UART: [idev] CDI.KEYID = 6
1,173,102 UART: [idev] SUBJECT.KEYID = 7
1,173,527 UART: [idev] UDS.KEYID = 0
1,173,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,459 UART: [idev] Sha1 KeyId Algorithm
1,207,223 UART: [idev] --
1,208,262 UART: [ldev] ++
1,208,430 UART: [ldev] CDI.KEYID = 6
1,208,794 UART: [ldev] SUBJECT.KEYID = 5
1,209,221 UART: [ldev] AUTHORITY.KEYID = 7
1,209,684 UART: [ldev] FE.KEYID = 1
1,215,168 UART: [ldev] Erasing FE.KEYID = 1
1,241,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,464 UART: [ldev] --
1,280,730 UART: [fwproc] Wait for Commands...
1,281,429 UART: [fwproc] Recv command 0x46574c44
1,282,162 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,513 UART: ROM Fatal Error: 0x000B0016
2,581,670 >>> mbox cmd response: failed
2,581,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,676 >>> mbox cmd response: failed
2,581,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,410 UART: [kat] LMS
1,168,722 UART: [kat] --
1,169,809 UART: [cold-reset] ++
1,170,233 UART: [fht] FHT @ 0x50003400
1,172,831 UART: [idev] ++
1,172,999 UART: [idev] CDI.KEYID = 6
1,173,360 UART: [idev] SUBJECT.KEYID = 7
1,173,785 UART: [idev] UDS.KEYID = 0
1,174,131 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,189 UART: [idev] Sha1 KeyId Algorithm
1,206,933 UART: [idev] --
1,208,200 UART: [ldev] ++
1,208,368 UART: [ldev] CDI.KEYID = 6
1,208,732 UART: [ldev] SUBJECT.KEYID = 5
1,209,159 UART: [ldev] AUTHORITY.KEYID = 7
1,209,622 UART: [ldev] FE.KEYID = 1
1,214,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,698 UART: [ldev] --
1,280,216 UART: [fwproc] Wait for Commands...
1,280,827 UART: [fwproc] Recv command 0x46574c44
1,281,560 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,179 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,185 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,431,881 >>> mbox cmd response: failed
2,431,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,887 >>> mbox cmd response: failed
2,431,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,559 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Unprovisioned
85,568 UART: [state] DebugLocked = No
86,240 UART: [state] WD Timer not started. Device not locked for debugging
87,517 UART: [kat] SHA2-256
891,067 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,196 UART: [kat] ++
895,348 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
916,605 UART: [kat] HMAC-384Kdf
921,411 UART: [kat] LMS
1,169,723 UART: [kat] --
1,170,504 UART: [cold-reset] ++
1,171,052 UART: [fht] FHT @ 0x50003400
1,173,902 UART: [idev] ++
1,174,070 UART: [idev] CDI.KEYID = 6
1,174,431 UART: [idev] SUBJECT.KEYID = 7
1,174,856 UART: [idev] UDS.KEYID = 0
1,175,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,207,944 UART: [idev] --
1,208,803 UART: [ldev] ++
1,208,971 UART: [ldev] CDI.KEYID = 6
1,209,335 UART: [ldev] SUBJECT.KEYID = 5
1,209,762 UART: [ldev] AUTHORITY.KEYID = 7
1,210,225 UART: [ldev] FE.KEYID = 1
1,215,303 UART: [ldev] Erasing FE.KEYID = 1
1,241,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,171 UART: [ldev] --
1,280,555 UART: [fwproc] Wait for Commands...
1,281,284 UART: [fwproc] Recv command 0x46574c44
1,282,017 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,984 UART: ROM Fatal Error: 0x000B0016
2,581,141 >>> mbox cmd response: failed
2,581,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,147 >>> mbox cmd response: failed
2,581,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,774 UART: [kat] SHA2-256
901,714 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
916,223 UART: [kat] HMAC-384Kdf
920,885 UART: [kat] LMS
1,169,197 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,506 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,930 UART: [idev] Erasing UDS.KEYID = 0
1,199,150 UART: [idev] Sha1 KeyId Algorithm
1,208,026 UART: [idev] --
1,208,981 UART: [ldev] ++
1,209,149 UART: [ldev] CDI.KEYID = 6
1,209,513 UART: [ldev] SUBJECT.KEYID = 5
1,209,940 UART: [ldev] AUTHORITY.KEYID = 7
1,210,403 UART: [ldev] FE.KEYID = 1
1,215,559 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,777 UART: [ldev] --
1,281,249 UART: [fwproc] Wait for Commands...
1,281,832 UART: [fwproc] Recv command 0x46574c44
1,282,565 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,936 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,841 >>> mbox cmd response: failed
2,434,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,847 >>> mbox cmd response: failed
2,434,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,483 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,228 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,840 writing to cptra_bootfsm_go
193,094 UART:
193,446 UART: Running Caliptra ROM ...
194,557 UART:
194,701 UART: [state] CFI Enabled
263,775 UART: [state] LifecycleState = Unprovisioned
265,692 UART: [state] DebugLocked = No
268,505 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,194 UART: [kat] SHA2-256
443,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,396 UART: [kat] ++
454,918 UART: [kat] sha1
466,237 UART: [kat] SHA2-256
468,921 UART: [kat] SHA2-384
475,599 UART: [kat] SHA2-512-ACC
477,933 UART: [kat] ECC-384
2,766,270 UART: [kat] HMAC-384Kdf
2,798,975 UART: [kat] LMS
3,989,243 UART: [kat] --
3,993,517 UART: [cold-reset] ++
3,994,759 UART: [fht] Storing FHT @ 0x50003400
4,005,432 UART: [idev] ++
4,006,043 UART: [idev] CDI.KEYID = 6
4,006,970 UART: [idev] SUBJECT.KEYID = 7
4,008,199 UART: [idev] UDS.KEYID = 0
4,010,760 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,376 UART: [idev] Erasing UDS.KEYID = 0
7,345,923 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,023 UART: [idev] --
7,372,760 UART: [ldev] ++
7,373,341 UART: [ldev] CDI.KEYID = 6
7,374,285 UART: [ldev] SUBJECT.KEYID = 5
7,375,500 UART: [ldev] AUTHORITY.KEYID = 7
7,376,790 UART: [ldev] FE.KEYID = 1
7,422,253 UART: [ldev] Erasing FE.KEYID = 1
10,756,414 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,561 UART: [ldev] --
13,134,754 UART: [fwproc] Waiting for Commands...
13,137,015 UART: [fwproc] Received command 0x46574c44
13,139,227 UART: [fwproc] Received Image of size 114124 bytes
17,184,956 UART: ROM Fatal Error: 0x000B002A
17,188,410 >>> mbox cmd response: failed
17,188,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,189,155 >>> mbox cmd response: failed
17,189,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,189,714 >>> mbox cmd response: failed
Initializing fuses
2,061,711 writing to cptra_bootfsm_go
2,251,013 UART:
2,251,374 UART: Running Caliptra ROM ...
2,252,513 UART:
2,252,680 UART: [state] CFI Enabled
2,312,115 UART: [state] LifecycleState = Unprovisioned
2,314,089 UART: [state] DebugLocked = No
2,315,911 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,303 UART: [kat] SHA2-256
2,490,993 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,497 UART: [kat] ++
2,501,962 UART: [kat] sha1
2,512,363 UART: [kat] SHA2-256
2,515,069 UART: [kat] SHA2-384
2,521,712 UART: [kat] SHA2-512-ACC
2,524,117 UART: [kat] ECC-384
4,818,606 UART: [kat] HMAC-384Kdf
4,850,124 UART: [kat] LMS
6,040,418 UART: [kat] --
6,045,866 UART: [cold-reset] ++
6,047,095 UART: [fht] Storing FHT @ 0x50003400
6,057,396 UART: [idev] ++
6,057,992 UART: [idev] CDI.KEYID = 6
6,058,933 UART: [idev] SUBJECT.KEYID = 7
6,060,149 UART: [idev] UDS.KEYID = 0
6,062,413 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,206,156 UART: [idev] Erasing UDS.KEYID = 0
9,398,344 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,058 UART: [idev] --
9,424,438 UART: [ldev] ++
9,425,015 UART: [ldev] CDI.KEYID = 6
9,426,036 UART: [ldev] SUBJECT.KEYID = 5
9,427,246 UART: [ldev] AUTHORITY.KEYID = 7
9,428,429 UART: [ldev] FE.KEYID = 1
9,473,934 UART: [ldev] Erasing FE.KEYID = 1
12,807,961 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,119,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,163,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,183,178 UART: [ldev] --
15,187,629 UART: [fwproc] Waiting for Commands...
15,189,886 UART: [fwproc] Received command 0x46574c44
15,192,073 UART: [fwproc] Received Image of size 114124 bytes
19,242,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,319,403 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,388,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,706,184 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,811,051 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,145,108 >>> mbox cmd response: failed
17,145,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,146,200 >>> mbox cmd response: failed
17,146,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,146,710 >>> mbox cmd response: failed
Initializing fuses
2,056,524 writing to cptra_bootfsm_go
5,862,790 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,923,625 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,559 UART:
192,917 UART: Running Caliptra ROM ...
194,098 UART:
603,885 UART: [state] CFI Enabled
615,937 UART: [state] LifecycleState = Unprovisioned
617,876 UART: [state] DebugLocked = No
619,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,344 UART: [kat] SHA2-256
794,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,590 UART: [kat] ++
805,179 UART: [kat] sha1
816,062 UART: [kat] SHA2-256
818,797 UART: [kat] SHA2-384
823,257 UART: [kat] SHA2-512-ACC
825,592 UART: [kat] ECC-384
3,109,897 UART: [kat] HMAC-384Kdf
3,121,436 UART: [kat] LMS
4,311,575 UART: [kat] --
4,315,459 UART: [cold-reset] ++
4,317,011 UART: [fht] Storing FHT @ 0x50003400
4,328,655 UART: [idev] ++
4,329,284 UART: [idev] CDI.KEYID = 6
4,330,172 UART: [idev] SUBJECT.KEYID = 7
4,331,436 UART: [idev] UDS.KEYID = 0
4,334,015 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,477,848 UART: [idev] Erasing UDS.KEYID = 0
7,617,521 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,350 UART: [idev] --
7,642,615 UART: [ldev] ++
7,643,195 UART: [ldev] CDI.KEYID = 6
7,644,215 UART: [ldev] SUBJECT.KEYID = 5
7,645,373 UART: [ldev] AUTHORITY.KEYID = 7
7,646,629 UART: [ldev] FE.KEYID = 1
7,657,685 UART: [ldev] Erasing FE.KEYID = 1
10,946,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,738 UART: [ldev] --
13,307,111 UART: [fwproc] Waiting for Commands...
13,309,482 UART: [fwproc] Received command 0x46574c44
13,311,669 UART: [fwproc] Received Image of size 114124 bytes
17,360,768 UART: ROM Fatal Error: 0x000B002A
17,364,184 >>> mbox cmd response: failed
17,364,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,364,997 >>> mbox cmd response: failed
17,365,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,365,583 >>> mbox cmd response: failed
Initializing fuses
2,061,439 writing to cptra_bootfsm_go
2,250,723 UART:
2,251,073 UART: Running Caliptra ROM ...
2,252,216 UART:
3,076,408 UART: [state] CFI Enabled
3,092,098 UART: [state] LifecycleState = Unprovisioned
3,094,011 UART: [state] DebugLocked = No
3,096,210 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,100,692 UART: [kat] SHA2-256
3,270,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,280,966 UART: [kat] ++
3,281,491 UART: [kat] sha1
3,292,489 UART: [kat] SHA2-256
3,295,178 UART: [kat] SHA2-384
3,300,952 UART: [kat] SHA2-512-ACC
3,303,312 UART: [kat] ECC-384
5,588,446 UART: [kat] HMAC-384Kdf
5,600,295 UART: [kat] LMS
6,790,405 UART: [kat] --
6,795,174 UART: [cold-reset] ++
6,796,839 UART: [fht] Storing FHT @ 0x50003400
6,807,623 UART: [idev] ++
6,808,200 UART: [idev] CDI.KEYID = 6
6,809,110 UART: [idev] SUBJECT.KEYID = 7
6,810,380 UART: [idev] UDS.KEYID = 0
6,812,461 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,955,840 UART: [idev] Erasing UDS.KEYID = 0
10,099,646 UART: [idev] Using Sha1 for KeyId Algorithm
10,122,325 UART: [idev] --
10,126,910 UART: [ldev] ++
10,127,482 UART: [ldev] CDI.KEYID = 6
10,128,496 UART: [ldev] SUBJECT.KEYID = 5
10,129,685 UART: [ldev] AUTHORITY.KEYID = 7
10,130,921 UART: [ldev] FE.KEYID = 1
10,139,501 UART: [ldev] Erasing FE.KEYID = 1
13,428,371 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,718,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,732,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,747,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,761,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,781,186 UART: [ldev] --
15,786,129 UART: [fwproc] Waiting for Commands...
15,788,008 UART: [fwproc] Received command 0x46574c44
15,790,224 UART: [fwproc] Received Image of size 114124 bytes
19,838,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,909,977 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,978,897 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,296,212 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
4,130,062 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,336,978 >>> mbox cmd response: failed
17,337,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,337,932 >>> mbox cmd response: failed
17,338,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,338,498 >>> mbox cmd response: failed
Initializing fuses
2,063,305 writing to cptra_bootfsm_go
6,643,988 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,604,240 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,852 writing to cptra_bootfsm_go
193,018 UART:
193,372 UART: Running Caliptra ROM ...
194,576 UART:
194,744 UART: [state] CFI Enabled
263,569 UART: [state] LifecycleState = Unprovisioned
265,449 UART: [state] DebugLocked = No
267,328 UART: [state] WD Timer not started. Device not locked for debugging
270,567 UART: [kat] SHA2-256
449,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,285 UART: [kat] ++
461,814 UART: [kat] sha1
473,184 UART: [kat] SHA2-256
476,190 UART: [kat] SHA2-384
481,244 UART: [kat] SHA2-512-ACC
484,213 UART: [kat] ECC-384
2,946,405 UART: [kat] HMAC-384Kdf
2,970,979 UART: [kat] LMS
3,500,465 UART: [kat] --
3,503,667 UART: [cold-reset] ++
3,504,575 UART: [fht] FHT @ 0x50003400
3,514,021 UART: [idev] ++
3,514,587 UART: [idev] CDI.KEYID = 6
3,515,531 UART: [idev] SUBJECT.KEYID = 7
3,516,738 UART: [idev] UDS.KEYID = 0
3,519,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,829 UART: [idev] Erasing UDS.KEYID = 0
6,028,482 UART: [idev] Sha1 KeyId Algorithm
6,051,830 UART: [idev] --
6,055,611 UART: [ldev] ++
6,056,183 UART: [ldev] CDI.KEYID = 6
6,057,066 UART: [ldev] SUBJECT.KEYID = 5
6,058,283 UART: [ldev] AUTHORITY.KEYID = 7
6,059,535 UART: [ldev] FE.KEYID = 1
6,100,032 UART: [ldev] Erasing FE.KEYID = 1
8,602,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,163 UART: [ldev] --
10,392,613 UART: [fwproc] Wait for Commands...
10,394,443 UART: [fwproc] Recv command 0x46574c44
10,396,537 UART: [fwproc] Recv'd Img size: 114448 bytes
13,799,994 UART: ROM Fatal Error: 0x000B002A
13,803,120 >>> mbox cmd response: failed
13,803,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,803,879 >>> mbox cmd response: failed
13,804,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,804,460 >>> mbox cmd response: failed
Initializing fuses
2,067,601 writing to cptra_bootfsm_go
2,256,912 UART:
2,257,264 UART: Running Caliptra ROM ...
2,258,396 UART:
2,258,560 UART: [state] CFI Enabled
2,322,901 UART: [state] LifecycleState = Unprovisioned
2,324,779 UART: [state] DebugLocked = No
2,326,767 UART: [state] WD Timer not started. Device not locked for debugging
2,331,378 UART: [kat] SHA2-256
2,510,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,522,079 UART: [kat] ++
2,522,628 UART: [kat] sha1
2,534,464 UART: [kat] SHA2-256
2,537,535 UART: [kat] SHA2-384
2,544,329 UART: [kat] SHA2-512-ACC
2,547,280 UART: [kat] ECC-384
5,003,371 UART: [kat] HMAC-384Kdf
5,028,804 UART: [kat] LMS
5,558,233 UART: [kat] --
5,560,735 UART: [cold-reset] ++
5,562,352 UART: [fht] FHT @ 0x50003400
5,572,809 UART: [idev] ++
5,573,370 UART: [idev] CDI.KEYID = 6
5,574,303 UART: [idev] SUBJECT.KEYID = 7
5,575,512 UART: [idev] UDS.KEYID = 0
5,577,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,721,756 UART: [idev] Erasing UDS.KEYID = 0
8,084,386 UART: [idev] Sha1 KeyId Algorithm
8,106,719 UART: [idev] --
8,112,014 UART: [ldev] ++
8,112,593 UART: [ldev] CDI.KEYID = 6
8,113,505 UART: [ldev] SUBJECT.KEYID = 5
8,114,667 UART: [ldev] AUTHORITY.KEYID = 7
8,115,953 UART: [ldev] FE.KEYID = 1
8,155,642 UART: [ldev] Erasing FE.KEYID = 1
10,659,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,030 UART: [ldev] --
12,467,792 UART: [fwproc] Wait for Commands...
12,469,943 UART: [fwproc] Recv command 0x46574c44
12,472,034 UART: [fwproc] Recv'd Img size: 114448 bytes
15,877,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,948,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,017,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,334,889 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,364,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,591,774 >>> mbox cmd response: failed
13,592,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,592,710 >>> mbox cmd response: failed
13,592,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,593,264 >>> mbox cmd response: failed
Initializing fuses
2,054,053 writing to cptra_bootfsm_go
5,428,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,119,462 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
192,674 UART:
193,058 UART: Running Caliptra ROM ...
194,165 UART:
603,635 UART: [state] CFI Enabled
614,059 UART: [state] LifecycleState = Unprovisioned
615,894 UART: [state] DebugLocked = No
618,785 UART: [state] WD Timer not started. Device not locked for debugging
622,179 UART: [kat] SHA2-256
801,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,878 UART: [kat] ++
813,431 UART: [kat] sha1
824,960 UART: [kat] SHA2-256
828,012 UART: [kat] SHA2-384
834,322 UART: [kat] SHA2-512-ACC
837,311 UART: [kat] ECC-384
3,280,914 UART: [kat] HMAC-384Kdf
3,293,519 UART: [kat] LMS
3,823,014 UART: [kat] --
3,826,206 UART: [cold-reset] ++
3,827,163 UART: [fht] FHT @ 0x50003400
3,838,246 UART: [idev] ++
3,838,811 UART: [idev] CDI.KEYID = 6
3,839,779 UART: [idev] SUBJECT.KEYID = 7
3,840,945 UART: [idev] UDS.KEYID = 0
3,843,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,628 UART: [idev] Erasing UDS.KEYID = 0
6,312,960 UART: [idev] Sha1 KeyId Algorithm
6,335,271 UART: [idev] --
6,339,213 UART: [ldev] ++
6,339,783 UART: [ldev] CDI.KEYID = 6
6,340,692 UART: [ldev] SUBJECT.KEYID = 5
6,341,909 UART: [ldev] AUTHORITY.KEYID = 7
6,343,137 UART: [ldev] FE.KEYID = 1
6,353,706 UART: [ldev] Erasing FE.KEYID = 1
8,830,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,859 UART: [ldev] --
10,620,348 UART: [fwproc] Wait for Commands...
10,621,849 UART: [fwproc] Recv command 0x46574c44
10,623,911 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,401 UART: ROM Fatal Error: 0x000B002A
14,030,508 >>> mbox cmd response: failed
14,030,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,031,266 >>> mbox cmd response: failed
14,031,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,031,824 >>> mbox cmd response: failed
Initializing fuses
2,054,780 writing to cptra_bootfsm_go
2,244,122 UART:
2,244,481 UART: Running Caliptra ROM ...
2,245,528 UART:
6,424,304 UART: [state] CFI Enabled
6,436,943 UART: [state] LifecycleState = Unprovisioned
6,438,814 UART: [state] DebugLocked = No
6,440,529 UART: [state] WD Timer not started. Device not locked for debugging
6,443,903 UART: [kat] SHA2-256
6,623,011 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,634,645 UART: [kat] ++
6,635,199 UART: [kat] sha1
6,646,638 UART: [kat] SHA2-256
6,649,647 UART: [kat] SHA2-384
6,654,554 UART: [kat] SHA2-512-ACC
6,657,494 UART: [kat] ECC-384
9,100,215 UART: [kat] HMAC-384Kdf
9,112,813 UART: [kat] LMS
9,642,329 UART: [kat] --
9,646,488 UART: [cold-reset] ++
9,647,389 UART: [fht] FHT @ 0x50003400
9,657,879 UART: [idev] ++
9,658,463 UART: [idev] CDI.KEYID = 6
9,659,424 UART: [idev] SUBJECT.KEYID = 7
9,660,528 UART: [idev] UDS.KEYID = 0
9,662,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,806,710 UART: [idev] Erasing UDS.KEYID = 0
12,133,080 UART: [idev] Sha1 KeyId Algorithm
12,156,119 UART: [idev] --
12,159,873 UART: [ldev] ++
12,160,450 UART: [ldev] CDI.KEYID = 6
12,161,337 UART: [ldev] SUBJECT.KEYID = 5
12,162,551 UART: [ldev] AUTHORITY.KEYID = 7
12,163,837 UART: [ldev] FE.KEYID = 1
12,175,944 UART: [ldev] Erasing FE.KEYID = 1
14,652,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,370,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,386,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,402,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,418,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,437,858 UART: [ldev] --
16,441,872 UART: [fwproc] Wait for Commands...
16,443,654 UART: [fwproc] Recv command 0x46574c44
16,445,751 UART: [fwproc] Recv'd Img size: 114448 bytes
19,840,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,910,056 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,978,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,296,415 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
3,696,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,810,726 >>> mbox cmd response: failed
13,811,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,811,682 >>> mbox cmd response: failed
13,812,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,812,462 >>> mbox cmd response: failed
Initializing fuses
2,059,854 writing to cptra_bootfsm_go
9,743,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,311,747 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,441,752 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,260,519 >>> mbox cmd response: failed
14,261,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,261,380 >>> mbox cmd response: failed
14,261,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,261,935 >>> mbox cmd response: failed
Initializing fuses
2,058,397 writing to cptra_bootfsm_go
5,499,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,799,451 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,756,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,495,765 >>> mbox cmd response: failed
14,496,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,496,675 >>> mbox cmd response: failed
14,496,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,497,259 >>> mbox cmd response: failed
Initializing fuses
2,061,107 writing to cptra_bootfsm_go
9,119,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,314,526 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,695 UART: [kat] SHA2-256
881,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,741 UART: [kat] ++
885,893 UART: [kat] sha1
890,015 UART: [kat] SHA2-256
891,953 UART: [kat] SHA2-384
894,660 UART: [kat] SHA2-512-ACC
896,561 UART: [kat] ECC-384
902,026 UART: [kat] HMAC-384Kdf
906,710 UART: [kat] LMS
1,474,906 UART: [kat] --
1,475,879 UART: [cold-reset] ++
1,476,391 UART: [fht] Storing FHT @ 0x50003400
1,479,158 UART: [idev] ++
1,479,326 UART: [idev] CDI.KEYID = 6
1,479,686 UART: [idev] SUBJECT.KEYID = 7
1,480,110 UART: [idev] UDS.KEYID = 0
1,480,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,078 UART: [idev] Erasing UDS.KEYID = 0
1,504,564 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,050 UART: [idev] --
1,513,949 UART: [ldev] ++
1,514,117 UART: [ldev] CDI.KEYID = 6
1,514,480 UART: [ldev] SUBJECT.KEYID = 5
1,514,906 UART: [ldev] AUTHORITY.KEYID = 7
1,515,369 UART: [ldev] FE.KEYID = 1
1,520,583 UART: [ldev] Erasing FE.KEYID = 1
1,546,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,996 UART: [ldev] --
1,585,351 UART: [fwproc] Waiting for Commands...
1,585,992 UART: [fwproc] Received command 0x46574c44
1,586,783 UART: [fwproc] Received Image of size 114448 bytes
2,885,089 UART: ROM Fatal Error: 0x000B002A
2,886,248 >>> mbox cmd response: failed
2,886,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,254 >>> mbox cmd response: failed
2,886,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,260 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,772 UART: [state] LifecycleState = Unprovisioned
85,427 UART: [state] DebugLocked = No
86,115 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,729 UART: [kat] SHA2-256
881,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,775 UART: [kat] ++
885,927 UART: [kat] sha1
890,201 UART: [kat] SHA2-256
892,139 UART: [kat] SHA2-384
894,808 UART: [kat] SHA2-512-ACC
896,709 UART: [kat] ECC-384
902,314 UART: [kat] HMAC-384Kdf
906,964 UART: [kat] LMS
1,475,160 UART: [kat] --
1,475,741 UART: [cold-reset] ++
1,476,135 UART: [fht] Storing FHT @ 0x50003400
1,478,968 UART: [idev] ++
1,479,136 UART: [idev] CDI.KEYID = 6
1,479,496 UART: [idev] SUBJECT.KEYID = 7
1,479,920 UART: [idev] UDS.KEYID = 0
1,480,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,880 UART: [idev] Erasing UDS.KEYID = 0
1,504,710 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,486 UART: [idev] --
1,514,429 UART: [ldev] ++
1,514,597 UART: [ldev] CDI.KEYID = 6
1,514,960 UART: [ldev] SUBJECT.KEYID = 5
1,515,386 UART: [ldev] AUTHORITY.KEYID = 7
1,515,849 UART: [ldev] FE.KEYID = 1
1,520,791 UART: [ldev] Erasing FE.KEYID = 1
1,546,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,432 UART: [ldev] --
1,585,937 UART: [fwproc] Waiting for Commands...
1,586,738 UART: [fwproc] Received command 0x46574c44
1,587,529 UART: [fwproc] Received Image of size 114448 bytes
2,886,477 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,607 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,959 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,088 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,738,001 >>> mbox cmd response: failed
2,738,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,007 >>> mbox cmd response: failed
2,738,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,602 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,666 UART: [state] DebugLocked = No
86,178 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,666 UART: [kat] SHA2-256
881,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,712 UART: [kat] ++
885,864 UART: [kat] sha1
890,098 UART: [kat] SHA2-256
892,036 UART: [kat] SHA2-384
894,889 UART: [kat] SHA2-512-ACC
896,790 UART: [kat] ECC-384
902,513 UART: [kat] HMAC-384Kdf
907,039 UART: [kat] LMS
1,475,235 UART: [kat] --
1,475,812 UART: [cold-reset] ++
1,476,328 UART: [fht] Storing FHT @ 0x50003400
1,479,057 UART: [idev] ++
1,479,225 UART: [idev] CDI.KEYID = 6
1,479,585 UART: [idev] SUBJECT.KEYID = 7
1,480,009 UART: [idev] UDS.KEYID = 0
1,480,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,161 UART: [idev] Erasing UDS.KEYID = 0
1,504,765 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,409 UART: [idev] --
1,514,476 UART: [ldev] ++
1,514,644 UART: [ldev] CDI.KEYID = 6
1,515,007 UART: [ldev] SUBJECT.KEYID = 5
1,515,433 UART: [ldev] AUTHORITY.KEYID = 7
1,515,896 UART: [ldev] FE.KEYID = 1
1,521,316 UART: [ldev] Erasing FE.KEYID = 1
1,546,457 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,467 UART: [ldev] --
1,585,794 UART: [fwproc] Waiting for Commands...
1,586,499 UART: [fwproc] Received command 0x46574c44
1,587,290 UART: [fwproc] Received Image of size 114448 bytes
2,884,128 UART: ROM Fatal Error: 0x000B002A
2,885,287 >>> mbox cmd response: failed
2,885,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,293 >>> mbox cmd response: failed
2,885,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,812 UART: [kat] SHA2-256
892,750 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
902,653 UART: [kat] HMAC-384Kdf
907,313 UART: [kat] LMS
1,475,509 UART: [kat] --
1,476,514 UART: [cold-reset] ++
1,477,034 UART: [fht] Storing FHT @ 0x50003400
1,479,921 UART: [idev] ++
1,480,089 UART: [idev] CDI.KEYID = 6
1,480,449 UART: [idev] SUBJECT.KEYID = 7
1,480,873 UART: [idev] UDS.KEYID = 0
1,481,218 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,169 UART: [idev] Erasing UDS.KEYID = 0
1,505,599 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,337 UART: [idev] --
1,515,278 UART: [ldev] ++
1,515,446 UART: [ldev] CDI.KEYID = 6
1,515,809 UART: [ldev] SUBJECT.KEYID = 5
1,516,235 UART: [ldev] AUTHORITY.KEYID = 7
1,516,698 UART: [ldev] FE.KEYID = 1
1,521,750 UART: [ldev] Erasing FE.KEYID = 1
1,546,899 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,323 UART: [ldev] --
1,586,670 UART: [fwproc] Waiting for Commands...
1,587,385 UART: [fwproc] Received command 0x46574c44
1,588,176 UART: [fwproc] Received Image of size 114448 bytes
2,888,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,782 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,134 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,083 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,739,334 >>> mbox cmd response: failed
2,739,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,340 >>> mbox cmd response: failed
2,739,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,830 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,089 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,976 UART: [kat] SHA2-256
893,626 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,751 UART: [kat] ++
897,903 UART: [kat] sha1
902,073 UART: [kat] SHA2-256
904,013 UART: [kat] SHA2-384
906,780 UART: [kat] SHA2-512-ACC
908,681 UART: [kat] ECC-384
918,666 UART: [kat] HMAC-384Kdf
923,280 UART: [kat] LMS
1,171,608 UART: [kat] --
1,172,305 UART: [cold-reset] ++
1,172,683 UART: [fht] FHT @ 0x50003400
1,175,532 UART: [idev] ++
1,175,700 UART: [idev] CDI.KEYID = 6
1,176,060 UART: [idev] SUBJECT.KEYID = 7
1,176,484 UART: [idev] UDS.KEYID = 0
1,176,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,340 UART: [idev] Erasing UDS.KEYID = 0
1,201,013 UART: [idev] Sha1 KeyId Algorithm
1,209,439 UART: [idev] --
1,210,459 UART: [ldev] ++
1,210,627 UART: [ldev] CDI.KEYID = 6
1,210,990 UART: [ldev] SUBJECT.KEYID = 5
1,211,416 UART: [ldev] AUTHORITY.KEYID = 7
1,211,879 UART: [ldev] FE.KEYID = 1
1,217,075 UART: [ldev] Erasing FE.KEYID = 1
1,243,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,743 UART: [ldev] --
1,283,098 UART: [fwproc] Wait for Commands...
1,283,682 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,354 UART: ROM Fatal Error: 0x000B002A
2,584,513 >>> mbox cmd response: failed
2,584,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,519 >>> mbox cmd response: failed
2,584,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
893,568 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,693 UART: [kat] ++
897,845 UART: [kat] sha1
902,105 UART: [kat] SHA2-256
904,045 UART: [kat] SHA2-384
906,772 UART: [kat] SHA2-512-ACC
908,673 UART: [kat] ECC-384
918,170 UART: [kat] HMAC-384Kdf
922,894 UART: [kat] LMS
1,171,222 UART: [kat] --
1,171,951 UART: [cold-reset] ++
1,172,343 UART: [fht] FHT @ 0x50003400
1,175,160 UART: [idev] ++
1,175,328 UART: [idev] CDI.KEYID = 6
1,175,688 UART: [idev] SUBJECT.KEYID = 7
1,176,112 UART: [idev] UDS.KEYID = 0
1,176,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,318 UART: [idev] Erasing UDS.KEYID = 0
1,201,249 UART: [idev] Sha1 KeyId Algorithm
1,209,813 UART: [idev] --
1,210,771 UART: [ldev] ++
1,210,939 UART: [ldev] CDI.KEYID = 6
1,211,302 UART: [ldev] SUBJECT.KEYID = 5
1,211,728 UART: [ldev] AUTHORITY.KEYID = 7
1,212,191 UART: [ldev] FE.KEYID = 1
1,217,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,173 UART: [ldev] --
1,282,648 UART: [fwproc] Wait for Commands...
1,283,252 UART: [fwproc] Recv command 0x46574c44
1,283,980 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,245 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,859 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,850 >>> mbox cmd response: failed
2,435,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,856 >>> mbox cmd response: failed
2,435,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,710 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
893,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,576 UART: [kat] ++
897,728 UART: [kat] sha1
902,048 UART: [kat] SHA2-256
903,988 UART: [kat] SHA2-384
906,755 UART: [kat] SHA2-512-ACC
908,656 UART: [kat] ECC-384
918,081 UART: [kat] HMAC-384Kdf
922,735 UART: [kat] LMS
1,171,063 UART: [kat] --
1,171,796 UART: [cold-reset] ++
1,172,338 UART: [fht] FHT @ 0x50003400
1,174,923 UART: [idev] ++
1,175,091 UART: [idev] CDI.KEYID = 6
1,175,451 UART: [idev] SUBJECT.KEYID = 7
1,175,875 UART: [idev] UDS.KEYID = 0
1,176,220 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,243 UART: [idev] Erasing UDS.KEYID = 0
1,201,924 UART: [idev] Sha1 KeyId Algorithm
1,210,272 UART: [idev] --
1,211,150 UART: [ldev] ++
1,211,318 UART: [ldev] CDI.KEYID = 6
1,211,681 UART: [ldev] SUBJECT.KEYID = 5
1,212,107 UART: [ldev] AUTHORITY.KEYID = 7
1,212,570 UART: [ldev] FE.KEYID = 1
1,217,974 UART: [ldev] Erasing FE.KEYID = 1
1,244,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,564 UART: [ldev] --
1,283,923 UART: [fwproc] Wait for Commands...
1,284,719 UART: [fwproc] Recv command 0x46574c44
1,285,447 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,943 UART: ROM Fatal Error: 0x000B002A
2,585,102 >>> mbox cmd response: failed
2,585,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,585,108 >>> mbox cmd response: failed
2,585,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,585,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,132 UART: [state] WD Timer not started. Device not locked for debugging
88,411 UART: [kat] SHA2-256
894,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,186 UART: [kat] ++
898,338 UART: [kat] sha1
902,584 UART: [kat] SHA2-256
904,524 UART: [kat] SHA2-384
907,207 UART: [kat] SHA2-512-ACC
909,108 UART: [kat] ECC-384
919,199 UART: [kat] HMAC-384Kdf
923,773 UART: [kat] LMS
1,172,101 UART: [kat] --
1,172,914 UART: [cold-reset] ++
1,173,494 UART: [fht] FHT @ 0x50003400
1,175,987 UART: [idev] ++
1,176,155 UART: [idev] CDI.KEYID = 6
1,176,515 UART: [idev] SUBJECT.KEYID = 7
1,176,939 UART: [idev] UDS.KEYID = 0
1,177,284 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,181 UART: [idev] Erasing UDS.KEYID = 0
1,202,730 UART: [idev] Sha1 KeyId Algorithm
1,211,226 UART: [idev] --
1,212,070 UART: [ldev] ++
1,212,238 UART: [ldev] CDI.KEYID = 6
1,212,601 UART: [ldev] SUBJECT.KEYID = 5
1,213,027 UART: [ldev] AUTHORITY.KEYID = 7
1,213,490 UART: [ldev] FE.KEYID = 1
1,218,732 UART: [ldev] Erasing FE.KEYID = 1
1,244,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,606 UART: [ldev] --
1,283,973 UART: [fwproc] Wait for Commands...
1,284,619 UART: [fwproc] Recv command 0x46574c44
1,285,347 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,610 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,439,137 >>> mbox cmd response: failed
2,439,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,439,143 >>> mbox cmd response: failed
2,439,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,439,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,336 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,923 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,904 UART: [kat] HMAC-384Kdf
920,558 UART: [kat] LMS
1,168,870 UART: [kat] --
1,169,817 UART: [cold-reset] ++
1,170,333 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,198,487 UART: [idev] Sha1 KeyId Algorithm
1,207,531 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,215,078 UART: [ldev] Erasing FE.KEYID = 1
1,240,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,952 UART: [ldev] --
1,280,370 UART: [fwproc] Wait for Commands...
1,281,065 UART: [fwproc] Recv command 0x46574c44
1,281,798 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,744 UART: ROM Fatal Error: 0x000B002A
2,580,903 >>> mbox cmd response: failed
2,580,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,909 >>> mbox cmd response: failed
2,580,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,915 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
1,168,810 UART: [kat] --
1,169,351 UART: [cold-reset] ++
1,169,919 UART: [fht] FHT @ 0x50003400
1,172,437 UART: [idev] ++
1,172,605 UART: [idev] CDI.KEYID = 6
1,172,966 UART: [idev] SUBJECT.KEYID = 7
1,173,391 UART: [idev] UDS.KEYID = 0
1,173,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,167 UART: [idev] Erasing UDS.KEYID = 0
1,197,703 UART: [idev] Sha1 KeyId Algorithm
1,206,587 UART: [idev] --
1,207,596 UART: [ldev] ++
1,207,764 UART: [ldev] CDI.KEYID = 6
1,208,128 UART: [ldev] SUBJECT.KEYID = 5
1,208,555 UART: [ldev] AUTHORITY.KEYID = 7
1,209,018 UART: [ldev] FE.KEYID = 1
1,214,126 UART: [ldev] Erasing FE.KEYID = 1
1,240,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,918 UART: [ldev] --
1,279,348 UART: [fwproc] Wait for Commands...
1,280,165 UART: [fwproc] Recv command 0x46574c44
1,280,898 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,454 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,761 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,431,092 >>> mbox cmd response: failed
2,431,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,098 >>> mbox cmd response: failed
2,431,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,152 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,291 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,597 UART: [kat] LMS
1,168,909 UART: [kat] --
1,169,776 UART: [cold-reset] ++
1,170,272 UART: [fht] FHT @ 0x50003400
1,172,784 UART: [idev] ++
1,172,952 UART: [idev] CDI.KEYID = 6
1,173,313 UART: [idev] SUBJECT.KEYID = 7
1,173,738 UART: [idev] UDS.KEYID = 0
1,174,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,764 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,208,290 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,077 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,097 UART: [ldev] --
1,281,363 UART: [fwproc] Wait for Commands...
1,282,080 UART: [fwproc] Recv command 0x46574c44
1,282,813 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,503 UART: ROM Fatal Error: 0x000B002A
2,581,662 >>> mbox cmd response: failed
2,581,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,668 >>> mbox cmd response: failed
2,581,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,487 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,420 UART: [cold-reset] ++
1,170,914 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,174,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,806 UART: [idev] Erasing UDS.KEYID = 0
1,199,668 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,635 UART: [ldev] ++
1,209,803 UART: [ldev] CDI.KEYID = 6
1,210,167 UART: [ldev] SUBJECT.KEYID = 5
1,210,594 UART: [ldev] AUTHORITY.KEYID = 7
1,211,057 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,242,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,695 UART: [ldev] --
1,282,209 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,669 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,259 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,622 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,505 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,327 >>> mbox cmd response: failed
2,434,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,333 >>> mbox cmd response: failed
2,434,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,339 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,613 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,768 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,090 UART:
192,456 UART: Running Caliptra ROM ...
193,557 UART:
193,700 UART: [state] CFI Enabled
263,367 UART: [state] LifecycleState = Unprovisioned
265,349 UART: [state] DebugLocked = No
267,188 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,202 UART: [kat] SHA2-256
440,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,418 UART: [kat] ++
451,867 UART: [kat] sha1
462,692 UART: [kat] SHA2-256
465,372 UART: [kat] SHA2-384
471,834 UART: [kat] SHA2-512-ACC
474,192 UART: [kat] ECC-384
2,765,951 UART: [kat] HMAC-384Kdf
2,799,059 UART: [kat] LMS
3,989,321 UART: [kat] --
3,994,420 UART: [cold-reset] ++
3,996,742 UART: [fht] Storing FHT @ 0x50003400
4,008,442 UART: [idev] ++
4,009,013 UART: [idev] CDI.KEYID = 6
4,010,043 UART: [idev] SUBJECT.KEYID = 7
4,011,210 UART: [idev] UDS.KEYID = 0
4,013,866 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,726 UART: [idev] Erasing UDS.KEYID = 0
7,343,128 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,886 UART: [idev] --
7,367,942 UART: [ldev] ++
7,368,522 UART: [ldev] CDI.KEYID = 6
7,369,445 UART: [ldev] SUBJECT.KEYID = 5
7,370,665 UART: [ldev] AUTHORITY.KEYID = 7
7,371,955 UART: [ldev] FE.KEYID = 1
7,400,348 UART: [ldev] Erasing FE.KEYID = 1
10,734,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,831 UART: [ldev] --
13,092,696 UART: [fwproc] Waiting for Commands...
13,095,401 UART: [fwproc] Received command 0x46574c44
13,097,598 UART: [fwproc] Received Image of size 114124 bytes
17,140,751 UART: ROM Fatal Error: 0x000B002B
17,144,203 >>> mbox cmd response: failed
17,144,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,144,990 >>> mbox cmd response: failed
17,145,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,145,557 >>> mbox cmd response: failed
Initializing fuses
2,054,791 writing to cptra_bootfsm_go
2,244,123 UART:
2,244,484 UART: Running Caliptra ROM ...
2,245,626 UART:
2,245,812 UART: [state] CFI Enabled
2,315,298 UART: [state] LifecycleState = Unprovisioned
2,317,229 UART: [state] DebugLocked = No
2,318,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,106 UART: [kat] SHA2-256
2,492,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,337 UART: [kat] ++
2,503,825 UART: [kat] sha1
2,515,253 UART: [kat] SHA2-256
2,517,899 UART: [kat] SHA2-384
2,523,833 UART: [kat] SHA2-512-ACC
2,526,185 UART: [kat] ECC-384
4,820,126 UART: [kat] HMAC-384Kdf
4,852,992 UART: [kat] LMS
6,043,257 UART: [kat] --
6,049,679 UART: [cold-reset] ++
6,051,722 UART: [fht] Storing FHT @ 0x50003400
6,064,557 UART: [idev] ++
6,065,127 UART: [idev] CDI.KEYID = 6
6,066,096 UART: [idev] SUBJECT.KEYID = 7
6,067,316 UART: [idev] UDS.KEYID = 0
6,069,578 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,213,248 UART: [idev] Erasing UDS.KEYID = 0
9,418,346 UART: [idev] Using Sha1 for KeyId Algorithm
9,440,633 UART: [idev] --
9,443,590 UART: [ldev] ++
9,444,171 UART: [ldev] CDI.KEYID = 6
9,445,118 UART: [ldev] SUBJECT.KEYID = 5
9,446,406 UART: [ldev] AUTHORITY.KEYID = 7
9,447,537 UART: [ldev] FE.KEYID = 1
9,495,985 UART: [ldev] Erasing FE.KEYID = 1
12,827,207 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,124,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,139,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,153,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,168,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,186,538 UART: [ldev] --
15,190,615 UART: [fwproc] Waiting for Commands...
15,192,626 UART: [fwproc] Received command 0x46574c44
15,195,027 UART: [fwproc] Received Image of size 114124 bytes
19,247,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,322,680 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,391,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,708,170 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,785,801 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,143,738 >>> mbox cmd response: failed
17,144,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,144,962 >>> mbox cmd response: failed
17,145,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,145,556 >>> mbox cmd response: failed
Initializing fuses
2,056,082 writing to cptra_bootfsm_go
5,858,551 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,925,604 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,628 UART:
192,980 UART: Running Caliptra ROM ...
194,168 UART:
603,933 UART: [state] CFI Enabled
618,560 UART: [state] LifecycleState = Unprovisioned
620,510 UART: [state] DebugLocked = No
622,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,682 UART: [kat] SHA2-256
796,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,961 UART: [kat] ++
807,544 UART: [kat] sha1
819,993 UART: [kat] SHA2-256
822,725 UART: [kat] SHA2-384
828,439 UART: [kat] SHA2-512-ACC
830,777 UART: [kat] ECC-384
3,116,692 UART: [kat] HMAC-384Kdf
3,129,048 UART: [kat] LMS
4,319,155 UART: [kat] --
4,323,371 UART: [cold-reset] ++
4,326,060 UART: [fht] Storing FHT @ 0x50003400
4,338,086 UART: [idev] ++
4,338,654 UART: [idev] CDI.KEYID = 6
4,339,576 UART: [idev] SUBJECT.KEYID = 7
4,340,863 UART: [idev] UDS.KEYID = 0
4,343,429 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,860 UART: [idev] Erasing UDS.KEYID = 0
7,625,971 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,734 UART: [idev] --
7,653,029 UART: [ldev] ++
7,653,610 UART: [ldev] CDI.KEYID = 6
7,654,523 UART: [ldev] SUBJECT.KEYID = 5
7,655,739 UART: [ldev] AUTHORITY.KEYID = 7
7,657,037 UART: [ldev] FE.KEYID = 1
7,669,283 UART: [ldev] Erasing FE.KEYID = 1
10,954,524 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,691 UART: [ldev] --
13,313,097 UART: [fwproc] Waiting for Commands...
13,315,089 UART: [fwproc] Received command 0x46574c44
13,317,281 UART: [fwproc] Received Image of size 114124 bytes
17,363,683 UART: ROM Fatal Error: 0x000B002B
17,367,079 >>> mbox cmd response: failed
17,367,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,367,831 >>> mbox cmd response: failed
17,368,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,368,391 >>> mbox cmd response: failed
Initializing fuses
2,059,898 writing to cptra_bootfsm_go
2,249,174 UART:
2,249,512 UART: Running Caliptra ROM ...
2,250,669 UART:
3,091,629 UART: [state] CFI Enabled
3,105,280 UART: [state] LifecycleState = Unprovisioned
3,107,190 UART: [state] DebugLocked = No
3,108,949 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,113,941 UART: [kat] SHA2-256
3,283,709 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,294,240 UART: [kat] ++
3,294,783 UART: [kat] sha1
3,306,974 UART: [kat] SHA2-256
3,309,718 UART: [kat] SHA2-384
3,315,543 UART: [kat] SHA2-512-ACC
3,317,959 UART: [kat] ECC-384
5,603,330 UART: [kat] HMAC-384Kdf
5,614,977 UART: [kat] LMS
6,805,050 UART: [kat] --
6,811,229 UART: [cold-reset] ++
6,812,193 UART: [fht] Storing FHT @ 0x50003400
6,824,973 UART: [idev] ++
6,825,600 UART: [idev] CDI.KEYID = 6
6,826,535 UART: [idev] SUBJECT.KEYID = 7
6,827,753 UART: [idev] UDS.KEYID = 0
6,829,837 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,973,600 UART: [idev] Erasing UDS.KEYID = 0
10,116,117 UART: [idev] Using Sha1 for KeyId Algorithm
10,137,891 UART: [idev] --
10,142,617 UART: [ldev] ++
10,143,249 UART: [ldev] CDI.KEYID = 6
10,144,156 UART: [ldev] SUBJECT.KEYID = 5
10,145,387 UART: [ldev] AUTHORITY.KEYID = 7
10,146,620 UART: [ldev] FE.KEYID = 1
10,159,103 UART: [ldev] Erasing FE.KEYID = 1
13,447,741 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,741,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,756,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,770,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,785,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,803,745 UART: [ldev] --
15,807,991 UART: [fwproc] Waiting for Commands...
15,811,389 UART: [fwproc] Received command 0x46574c44
15,813,586 UART: [fwproc] Received Image of size 114124 bytes
19,864,455 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,941,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,010,371 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,328,143 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,139,670 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,354,101 >>> mbox cmd response: failed
17,354,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,355,031 >>> mbox cmd response: failed
17,355,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,355,561 >>> mbox cmd response: failed
Initializing fuses
2,056,949 writing to cptra_bootfsm_go
6,645,180 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,583,442 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,161 UART:
192,550 UART: Running Caliptra ROM ...
193,751 UART:
193,907 UART: [state] CFI Enabled
264,437 UART: [state] LifecycleState = Unprovisioned
266,338 UART: [state] DebugLocked = No
267,778 UART: [state] WD Timer not started. Device not locked for debugging
271,499 UART: [kat] SHA2-256
450,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,193 UART: [kat] ++
462,732 UART: [kat] sha1
472,591 UART: [kat] SHA2-256
475,595 UART: [kat] SHA2-384
481,678 UART: [kat] SHA2-512-ACC
484,670 UART: [kat] ECC-384
2,947,864 UART: [kat] HMAC-384Kdf
2,971,361 UART: [kat] LMS
3,500,783 UART: [kat] --
3,505,117 UART: [cold-reset] ++
3,506,894 UART: [fht] FHT @ 0x50003400
3,517,438 UART: [idev] ++
3,518,012 UART: [idev] CDI.KEYID = 6
3,518,897 UART: [idev] SUBJECT.KEYID = 7
3,520,105 UART: [idev] UDS.KEYID = 0
3,523,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,366 UART: [idev] Erasing UDS.KEYID = 0
6,024,365 UART: [idev] Sha1 KeyId Algorithm
6,047,869 UART: [idev] --
6,052,785 UART: [ldev] ++
6,053,357 UART: [ldev] CDI.KEYID = 6
6,054,271 UART: [ldev] SUBJECT.KEYID = 5
6,055,492 UART: [ldev] AUTHORITY.KEYID = 7
6,056,730 UART: [ldev] FE.KEYID = 1
6,100,346 UART: [ldev] Erasing FE.KEYID = 1
8,603,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,458 UART: [ldev] --
10,413,423 UART: [fwproc] Wait for Commands...
10,415,952 UART: [fwproc] Recv command 0x46574c44
10,417,992 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,879 UART: ROM Fatal Error: 0x000B002B
13,819,014 >>> mbox cmd response: failed
13,819,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,819,804 >>> mbox cmd response: failed
13,820,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,820,366 >>> mbox cmd response: failed
Initializing fuses
2,053,930 writing to cptra_bootfsm_go
2,243,235 UART:
2,243,589 UART: Running Caliptra ROM ...
2,244,724 UART:
2,244,903 UART: [state] CFI Enabled
2,313,836 UART: [state] LifecycleState = Unprovisioned
2,315,710 UART: [state] DebugLocked = No
2,318,555 UART: [state] WD Timer not started. Device not locked for debugging
2,321,761 UART: [kat] SHA2-256
2,500,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,512,487 UART: [kat] ++
2,512,946 UART: [kat] sha1
2,523,515 UART: [kat] SHA2-256
2,526,542 UART: [kat] SHA2-384
2,533,354 UART: [kat] SHA2-512-ACC
2,536,306 UART: [kat] ECC-384
5,000,879 UART: [kat] HMAC-384Kdf
5,024,265 UART: [kat] LMS
5,553,728 UART: [kat] --
5,557,824 UART: [cold-reset] ++
5,559,487 UART: [fht] FHT @ 0x50003400
5,569,189 UART: [idev] ++
5,569,770 UART: [idev] CDI.KEYID = 6
5,570,790 UART: [idev] SUBJECT.KEYID = 7
5,571,894 UART: [idev] UDS.KEYID = 0
5,574,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,325 UART: [idev] Erasing UDS.KEYID = 0
8,076,826 UART: [idev] Sha1 KeyId Algorithm
8,099,844 UART: [idev] --
8,103,166 UART: [ldev] ++
8,103,740 UART: [ldev] CDI.KEYID = 6
8,104,804 UART: [ldev] SUBJECT.KEYID = 5
8,105,910 UART: [ldev] AUTHORITY.KEYID = 7
8,107,084 UART: [ldev] FE.KEYID = 1
8,152,347 UART: [ldev] Erasing FE.KEYID = 1
10,656,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,949 UART: [ldev] --
12,465,005 UART: [fwproc] Wait for Commands...
12,467,654 UART: [fwproc] Recv command 0x46574c44
12,469,752 UART: [fwproc] Recv'd Img size: 114448 bytes
15,867,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,944,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,013,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,332,487 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,824 writing to cptra_bootfsm_go
3,386,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,616,526 >>> mbox cmd response: failed
13,617,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,617,502 >>> mbox cmd response: failed
13,617,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,618,053 >>> mbox cmd response: failed
Initializing fuses
2,060,412 writing to cptra_bootfsm_go
5,442,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,149,862 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,037 writing to cptra_bootfsm_go
193,246 UART:
193,619 UART: Running Caliptra ROM ...
194,844 UART:
604,333 UART: [state] CFI Enabled
616,154 UART: [state] LifecycleState = Unprovisioned
618,039 UART: [state] DebugLocked = No
620,685 UART: [state] WD Timer not started. Device not locked for debugging
624,014 UART: [kat] SHA2-256
803,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,691 UART: [kat] ++
815,138 UART: [kat] sha1
825,903 UART: [kat] SHA2-256
828,976 UART: [kat] SHA2-384
833,984 UART: [kat] SHA2-512-ACC
836,972 UART: [kat] ECC-384
3,279,726 UART: [kat] HMAC-384Kdf
3,292,993 UART: [kat] LMS
3,822,468 UART: [kat] --
3,827,973 UART: [cold-reset] ++
3,830,556 UART: [fht] FHT @ 0x50003400
3,841,155 UART: [idev] ++
3,841,728 UART: [idev] CDI.KEYID = 6
3,842,796 UART: [idev] SUBJECT.KEYID = 7
3,843,909 UART: [idev] UDS.KEYID = 0
3,846,811 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,594 UART: [idev] Erasing UDS.KEYID = 0
6,316,666 UART: [idev] Sha1 KeyId Algorithm
6,339,295 UART: [idev] --
6,343,263 UART: [ldev] ++
6,343,840 UART: [ldev] CDI.KEYID = 6
6,344,724 UART: [ldev] SUBJECT.KEYID = 5
6,345,940 UART: [ldev] AUTHORITY.KEYID = 7
6,347,172 UART: [ldev] FE.KEYID = 1
6,358,975 UART: [ldev] Erasing FE.KEYID = 1
8,830,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,093 UART: [ldev] --
10,625,141 UART: [fwproc] Wait for Commands...
10,627,451 UART: [fwproc] Recv command 0x46574c44
10,629,544 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,832 UART: ROM Fatal Error: 0x000B002B
14,033,922 >>> mbox cmd response: failed
14,034,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,034,636 >>> mbox cmd response: failed
14,034,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,035,363 >>> mbox cmd response: failed
Initializing fuses
2,063,916 writing to cptra_bootfsm_go
2,253,239 UART:
2,253,590 UART: Running Caliptra ROM ...
2,254,667 UART:
6,423,069 UART: [state] CFI Enabled
6,433,597 UART: [state] LifecycleState = Unprovisioned
6,435,456 UART: [state] DebugLocked = No
6,438,139 UART: [state] WD Timer not started. Device not locked for debugging
6,442,588 UART: [kat] SHA2-256
6,621,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,633,261 UART: [kat] ++
6,633,802 UART: [kat] sha1
6,644,210 UART: [kat] SHA2-256
6,647,274 UART: [kat] SHA2-384
6,654,571 UART: [kat] SHA2-512-ACC
6,657,515 UART: [kat] ECC-384
9,099,390 UART: [kat] HMAC-384Kdf
9,111,727 UART: [kat] LMS
9,641,207 UART: [kat] --
9,645,274 UART: [cold-reset] ++
9,647,479 UART: [fht] FHT @ 0x50003400
9,658,764 UART: [idev] ++
9,659,332 UART: [idev] CDI.KEYID = 6
9,660,348 UART: [idev] SUBJECT.KEYID = 7
9,661,450 UART: [idev] UDS.KEYID = 0
9,663,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,807,583 UART: [idev] Erasing UDS.KEYID = 0
12,137,923 UART: [idev] Sha1 KeyId Algorithm
12,160,760 UART: [idev] --
12,163,612 UART: [ldev] ++
12,164,197 UART: [ldev] CDI.KEYID = 6
12,165,081 UART: [ldev] SUBJECT.KEYID = 5
12,166,214 UART: [ldev] AUTHORITY.KEYID = 7
12,167,546 UART: [ldev] FE.KEYID = 1
12,178,569 UART: [ldev] Erasing FE.KEYID = 1
14,658,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,378,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,394,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,410,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,426,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,447,325 UART: [ldev] --
16,452,092 UART: [fwproc] Wait for Commands...
16,454,522 UART: [fwproc] Recv command 0x46574c44
16,456,567 UART: [fwproc] Recv'd Img size: 114448 bytes
19,872,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,946,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,014,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,332,421 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
3,698,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,814,050 >>> mbox cmd response: failed
13,814,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,814,991 >>> mbox cmd response: failed
13,815,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,815,555 >>> mbox cmd response: failed
Initializing fuses
2,058,971 writing to cptra_bootfsm_go
9,748,814 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,326,601 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,440,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,269,311 >>> mbox cmd response: failed
14,269,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,270,299 >>> mbox cmd response: failed
14,270,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,270,857 >>> mbox cmd response: failed
Initializing fuses
2,055,691 writing to cptra_bootfsm_go
5,485,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,786,271 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,759,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,502,630 >>> mbox cmd response: failed
14,503,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,503,534 >>> mbox cmd response: failed
14,503,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,504,094 >>> mbox cmd response: failed
Initializing fuses
2,056,992 writing to cptra_bootfsm_go
9,122,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,315,144 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,289 UART: [kat] SHA2-256
882,220 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,335 UART: [kat] ++
886,487 UART: [kat] sha1
890,741 UART: [kat] SHA2-256
892,679 UART: [kat] SHA2-384
895,384 UART: [kat] SHA2-512-ACC
897,285 UART: [kat] ECC-384
902,714 UART: [kat] HMAC-384Kdf
907,164 UART: [kat] LMS
1,475,360 UART: [kat] --
1,476,555 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,480,000 UART: [idev] ++
1,480,168 UART: [idev] CDI.KEYID = 6
1,480,528 UART: [idev] SUBJECT.KEYID = 7
1,480,952 UART: [idev] UDS.KEYID = 0
1,481,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,856 UART: [idev] Erasing UDS.KEYID = 0
1,505,300 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,896 UART: [idev] --
1,515,029 UART: [ldev] ++
1,515,197 UART: [ldev] CDI.KEYID = 6
1,515,560 UART: [ldev] SUBJECT.KEYID = 5
1,515,986 UART: [ldev] AUTHORITY.KEYID = 7
1,516,449 UART: [ldev] FE.KEYID = 1
1,521,491 UART: [ldev] Erasing FE.KEYID = 1
1,546,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,906 UART: [ldev] --
1,586,309 UART: [fwproc] Waiting for Commands...
1,587,108 UART: [fwproc] Received command 0x46574c44
1,587,899 UART: [fwproc] Received Image of size 114448 bytes
2,886,761 UART: ROM Fatal Error: 0x000B002B
2,887,920 >>> mbox cmd response: failed
2,887,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,926 >>> mbox cmd response: failed
2,887,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,932 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,295 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,833 UART: [kat] SHA2-256
881,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,879 UART: [kat] ++
886,031 UART: [kat] sha1
890,415 UART: [kat] SHA2-256
892,353 UART: [kat] SHA2-384
895,230 UART: [kat] SHA2-512-ACC
897,131 UART: [kat] ECC-384
902,888 UART: [kat] HMAC-384Kdf
907,684 UART: [kat] LMS
1,475,880 UART: [kat] --
1,476,895 UART: [cold-reset] ++
1,477,455 UART: [fht] Storing FHT @ 0x50003400
1,480,200 UART: [idev] ++
1,480,368 UART: [idev] CDI.KEYID = 6
1,480,728 UART: [idev] SUBJECT.KEYID = 7
1,481,152 UART: [idev] UDS.KEYID = 0
1,481,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,060 UART: [idev] Erasing UDS.KEYID = 0
1,505,626 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,216 UART: [idev] --
1,515,185 UART: [ldev] ++
1,515,353 UART: [ldev] CDI.KEYID = 6
1,515,716 UART: [ldev] SUBJECT.KEYID = 5
1,516,142 UART: [ldev] AUTHORITY.KEYID = 7
1,516,605 UART: [ldev] FE.KEYID = 1
1,521,769 UART: [ldev] Erasing FE.KEYID = 1
1,546,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,648 UART: [ldev] --
1,586,149 UART: [fwproc] Waiting for Commands...
1,586,936 UART: [fwproc] Received command 0x46574c44
1,587,727 UART: [fwproc] Received Image of size 114448 bytes
2,887,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,305 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,657 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,640 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,405 >>> mbox cmd response: failed
2,740,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,411 >>> mbox cmd response: failed
2,740,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,300 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,776 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,382 UART: [kat] SHA2-256
882,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,428 UART: [kat] ++
886,580 UART: [kat] sha1
890,732 UART: [kat] SHA2-256
892,670 UART: [kat] SHA2-384
895,485 UART: [kat] SHA2-512-ACC
897,386 UART: [kat] ECC-384
902,981 UART: [kat] HMAC-384Kdf
907,425 UART: [kat] LMS
1,475,621 UART: [kat] --
1,476,606 UART: [cold-reset] ++
1,477,148 UART: [fht] Storing FHT @ 0x50003400
1,479,981 UART: [idev] ++
1,480,149 UART: [idev] CDI.KEYID = 6
1,480,509 UART: [idev] SUBJECT.KEYID = 7
1,480,933 UART: [idev] UDS.KEYID = 0
1,481,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,035 UART: [idev] Erasing UDS.KEYID = 0
1,506,195 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,707 UART: [idev] --
1,515,670 UART: [ldev] ++
1,515,838 UART: [ldev] CDI.KEYID = 6
1,516,201 UART: [ldev] SUBJECT.KEYID = 5
1,516,627 UART: [ldev] AUTHORITY.KEYID = 7
1,517,090 UART: [ldev] FE.KEYID = 1
1,522,602 UART: [ldev] Erasing FE.KEYID = 1
1,547,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,903 UART: [ldev] --
1,587,414 UART: [fwproc] Waiting for Commands...
1,588,123 UART: [fwproc] Received command 0x46574c44
1,588,914 UART: [fwproc] Received Image of size 114448 bytes
2,886,886 UART: ROM Fatal Error: 0x000B002B
2,888,045 >>> mbox cmd response: failed
2,888,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,888,051 >>> mbox cmd response: failed
2,888,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,888,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,901 UART: [state] LifecycleState = Unprovisioned
86,556 UART: [state] DebugLocked = No
87,216 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,846 UART: [kat] SHA2-256
882,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,892 UART: [kat] ++
887,044 UART: [kat] sha1
891,296 UART: [kat] SHA2-256
893,234 UART: [kat] SHA2-384
896,091 UART: [kat] SHA2-512-ACC
897,992 UART: [kat] ECC-384
903,811 UART: [kat] HMAC-384Kdf
908,653 UART: [kat] LMS
1,476,849 UART: [kat] --
1,477,648 UART: [cold-reset] ++
1,478,004 UART: [fht] Storing FHT @ 0x50003400
1,480,891 UART: [idev] ++
1,481,059 UART: [idev] CDI.KEYID = 6
1,481,419 UART: [idev] SUBJECT.KEYID = 7
1,481,843 UART: [idev] UDS.KEYID = 0
1,482,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,937 UART: [idev] Erasing UDS.KEYID = 0
1,506,415 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,957 UART: [idev] --
1,516,078 UART: [ldev] ++
1,516,246 UART: [ldev] CDI.KEYID = 6
1,516,609 UART: [ldev] SUBJECT.KEYID = 5
1,517,035 UART: [ldev] AUTHORITY.KEYID = 7
1,517,498 UART: [ldev] FE.KEYID = 1
1,523,066 UART: [ldev] Erasing FE.KEYID = 1
1,548,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,121 UART: [ldev] --
1,587,510 UART: [fwproc] Waiting for Commands...
1,588,177 UART: [fwproc] Received command 0x46574c44
1,588,968 UART: [fwproc] Received Image of size 114448 bytes
2,888,100 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,188 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,540 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,453 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,739,610 >>> mbox cmd response: failed
2,739,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,616 >>> mbox cmd response: failed
2,739,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,622 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,875 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
893,472 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,597 UART: [kat] ++
897,749 UART: [kat] sha1
902,081 UART: [kat] SHA2-256
904,021 UART: [kat] SHA2-384
906,764 UART: [kat] SHA2-512-ACC
908,665 UART: [kat] ECC-384
918,242 UART: [kat] HMAC-384Kdf
922,674 UART: [kat] LMS
1,171,002 UART: [kat] --
1,171,825 UART: [cold-reset] ++
1,172,157 UART: [fht] FHT @ 0x50003400
1,174,746 UART: [idev] ++
1,174,914 UART: [idev] CDI.KEYID = 6
1,175,274 UART: [idev] SUBJECT.KEYID = 7
1,175,698 UART: [idev] UDS.KEYID = 0
1,176,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,540 UART: [idev] Erasing UDS.KEYID = 0
1,200,023 UART: [idev] Sha1 KeyId Algorithm
1,208,303 UART: [idev] --
1,209,353 UART: [ldev] ++
1,209,521 UART: [ldev] CDI.KEYID = 6
1,209,884 UART: [ldev] SUBJECT.KEYID = 5
1,210,310 UART: [ldev] AUTHORITY.KEYID = 7
1,210,773 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,023 UART: [ldev] --
1,282,524 UART: [fwproc] Wait for Commands...
1,283,204 UART: [fwproc] Recv command 0x46574c44
1,283,932 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,410 UART: ROM Fatal Error: 0x000B002B
2,584,569 >>> mbox cmd response: failed
2,584,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,575 >>> mbox cmd response: failed
2,584,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
892,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,031 UART: [kat] ++
897,183 UART: [kat] sha1
901,425 UART: [kat] SHA2-256
903,365 UART: [kat] SHA2-384
906,108 UART: [kat] SHA2-512-ACC
908,009 UART: [kat] ECC-384
917,774 UART: [kat] HMAC-384Kdf
922,428 UART: [kat] LMS
1,170,756 UART: [kat] --
1,171,775 UART: [cold-reset] ++
1,172,287 UART: [fht] FHT @ 0x50003400
1,174,996 UART: [idev] ++
1,175,164 UART: [idev] CDI.KEYID = 6
1,175,524 UART: [idev] SUBJECT.KEYID = 7
1,175,948 UART: [idev] UDS.KEYID = 0
1,176,293 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,474 UART: [idev] Erasing UDS.KEYID = 0
1,200,605 UART: [idev] Sha1 KeyId Algorithm
1,209,221 UART: [idev] --
1,210,349 UART: [ldev] ++
1,210,517 UART: [ldev] CDI.KEYID = 6
1,210,880 UART: [ldev] SUBJECT.KEYID = 5
1,211,306 UART: [ldev] AUTHORITY.KEYID = 7
1,211,769 UART: [ldev] FE.KEYID = 1
1,216,687 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,683 UART: [ldev] --
1,282,120 UART: [fwproc] Wait for Commands...
1,282,912 UART: [fwproc] Recv command 0x46574c44
1,283,640 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,492 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,527 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,438,092 >>> mbox cmd response: failed
2,438,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,098 >>> mbox cmd response: failed
2,438,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,793 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,452 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
893,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,998 UART: [kat] ++
898,150 UART: [kat] sha1
902,300 UART: [kat] SHA2-256
904,240 UART: [kat] SHA2-384
906,993 UART: [kat] SHA2-512-ACC
908,894 UART: [kat] ECC-384
918,579 UART: [kat] HMAC-384Kdf
923,309 UART: [kat] LMS
1,171,637 UART: [kat] --
1,172,468 UART: [cold-reset] ++
1,172,918 UART: [fht] FHT @ 0x50003400
1,175,641 UART: [idev] ++
1,175,809 UART: [idev] CDI.KEYID = 6
1,176,169 UART: [idev] SUBJECT.KEYID = 7
1,176,593 UART: [idev] UDS.KEYID = 0
1,176,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,483 UART: [idev] Erasing UDS.KEYID = 0
1,202,152 UART: [idev] Sha1 KeyId Algorithm
1,210,734 UART: [idev] --
1,211,794 UART: [ldev] ++
1,211,962 UART: [ldev] CDI.KEYID = 6
1,212,325 UART: [ldev] SUBJECT.KEYID = 5
1,212,751 UART: [ldev] AUTHORITY.KEYID = 7
1,213,214 UART: [ldev] FE.KEYID = 1
1,218,396 UART: [ldev] Erasing FE.KEYID = 1
1,245,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,528 UART: [ldev] --
1,284,995 UART: [fwproc] Wait for Commands...
1,285,689 UART: [fwproc] Recv command 0x46574c44
1,286,417 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,209 UART: ROM Fatal Error: 0x000B002B
2,585,368 >>> mbox cmd response: failed
2,585,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,585,374 >>> mbox cmd response: failed
2,585,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,585,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
893,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,774 UART: [kat] ++
897,926 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
906,859 UART: [kat] SHA2-512-ACC
908,760 UART: [kat] ECC-384
918,301 UART: [kat] HMAC-384Kdf
922,795 UART: [kat] LMS
1,171,123 UART: [kat] --
1,171,966 UART: [cold-reset] ++
1,172,506 UART: [fht] FHT @ 0x50003400
1,175,389 UART: [idev] ++
1,175,557 UART: [idev] CDI.KEYID = 6
1,175,917 UART: [idev] SUBJECT.KEYID = 7
1,176,341 UART: [idev] UDS.KEYID = 0
1,176,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,629 UART: [idev] Erasing UDS.KEYID = 0
1,201,292 UART: [idev] Sha1 KeyId Algorithm
1,209,560 UART: [idev] --
1,210,708 UART: [ldev] ++
1,210,876 UART: [ldev] CDI.KEYID = 6
1,211,239 UART: [ldev] SUBJECT.KEYID = 5
1,211,665 UART: [ldev] AUTHORITY.KEYID = 7
1,212,128 UART: [ldev] FE.KEYID = 1
1,217,524 UART: [ldev] Erasing FE.KEYID = 1
1,243,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,182 UART: [ldev] --
1,283,453 UART: [fwproc] Wait for Commands...
1,284,215 UART: [fwproc] Recv command 0x46574c44
1,284,943 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,143 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,447 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,366 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,440,231 >>> mbox cmd response: failed
2,440,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,440,237 >>> mbox cmd response: failed
2,440,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,440,243 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,933 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
904,062 UART: [kat] SHA2-512-ACC
905,963 UART: [kat] ECC-384
915,386 UART: [kat] HMAC-384Kdf
919,766 UART: [kat] LMS
1,168,078 UART: [kat] --
1,168,943 UART: [cold-reset] ++
1,169,481 UART: [fht] FHT @ 0x50003400
1,172,085 UART: [idev] ++
1,172,253 UART: [idev] CDI.KEYID = 6
1,172,614 UART: [idev] SUBJECT.KEYID = 7
1,173,039 UART: [idev] UDS.KEYID = 0
1,173,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,227 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,207,807 UART: [idev] --
1,208,780 UART: [ldev] ++
1,208,948 UART: [ldev] CDI.KEYID = 6
1,209,312 UART: [ldev] SUBJECT.KEYID = 5
1,209,739 UART: [ldev] AUTHORITY.KEYID = 7
1,210,202 UART: [ldev] FE.KEYID = 1
1,215,334 UART: [ldev] Erasing FE.KEYID = 1
1,241,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,642 UART: [ldev] --
1,280,962 UART: [fwproc] Wait for Commands...
1,281,701 UART: [fwproc] Recv command 0x46574c44
1,282,434 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,020 UART: ROM Fatal Error: 0x000B002B
2,582,179 >>> mbox cmd response: failed
2,582,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,185 >>> mbox cmd response: failed
2,582,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,384 UART: [kat] HMAC-384Kdf
920,962 UART: [kat] LMS
1,169,274 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,967 UART: [idev] Erasing UDS.KEYID = 0
1,198,713 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,592 UART: [ldev] ++
1,208,760 UART: [ldev] CDI.KEYID = 6
1,209,124 UART: [ldev] SUBJECT.KEYID = 5
1,209,551 UART: [ldev] AUTHORITY.KEYID = 7
1,210,014 UART: [ldev] FE.KEYID = 1
1,215,054 UART: [ldev] Erasing FE.KEYID = 1
1,241,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,436 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,427 UART: [fwproc] Recv command 0x46574c44
1,282,160 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,507 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,208 >>> mbox cmd response: failed
2,434,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,214 >>> mbox cmd response: failed
2,434,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,807 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,240 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,182 UART: [idev] ++
1,173,350 UART: [idev] CDI.KEYID = 6
1,173,711 UART: [idev] SUBJECT.KEYID = 7
1,174,136 UART: [idev] UDS.KEYID = 0
1,174,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,202 UART: [idev] Erasing UDS.KEYID = 0
1,199,302 UART: [idev] Sha1 KeyId Algorithm
1,208,324 UART: [idev] --
1,209,235 UART: [ldev] ++
1,209,403 UART: [ldev] CDI.KEYID = 6
1,209,767 UART: [ldev] SUBJECT.KEYID = 5
1,210,194 UART: [ldev] AUTHORITY.KEYID = 7
1,210,657 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,699 UART: [ldev] --
1,282,157 UART: [fwproc] Wait for Commands...
1,282,844 UART: [fwproc] Recv command 0x46574c44
1,283,577 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,615 UART: ROM Fatal Error: 0x000B002B
2,582,774 >>> mbox cmd response: failed
2,582,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,780 >>> mbox cmd response: failed
2,582,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,939 UART: [kat] HMAC-384Kdf
921,555 UART: [kat] LMS
1,169,867 UART: [kat] --
1,170,720 UART: [cold-reset] ++
1,171,074 UART: [fht] FHT @ 0x50003400
1,173,720 UART: [idev] ++
1,173,888 UART: [idev] CDI.KEYID = 6
1,174,249 UART: [idev] SUBJECT.KEYID = 7
1,174,674 UART: [idev] UDS.KEYID = 0
1,175,020 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,200,482 UART: [idev] Sha1 KeyId Algorithm
1,209,418 UART: [idev] --
1,210,503 UART: [ldev] ++
1,210,671 UART: [ldev] CDI.KEYID = 6
1,211,035 UART: [ldev] SUBJECT.KEYID = 5
1,211,462 UART: [ldev] AUTHORITY.KEYID = 7
1,211,925 UART: [ldev] FE.KEYID = 1
1,216,839 UART: [ldev] Erasing FE.KEYID = 1
1,243,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,165 UART: [ldev] --
1,282,483 UART: [fwproc] Wait for Commands...
1,283,078 UART: [fwproc] Recv command 0x46574c44
1,283,811 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,596 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,435,129 >>> mbox cmd response: failed
2,435,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,135 >>> mbox cmd response: failed
2,435,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,168 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,215 UART:
192,570 UART: Running Caliptra ROM ...
193,757 UART:
193,912 UART: [state] CFI Enabled
260,790 UART: [state] LifecycleState = Unprovisioned
262,758 UART: [state] DebugLocked = No
265,708 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,299 UART: [kat] SHA2-256
441,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,540 UART: [kat] ++
452,036 UART: [kat] sha1
461,950 UART: [kat] SHA2-256
464,634 UART: [kat] SHA2-384
470,345 UART: [kat] SHA2-512-ACC
472,730 UART: [kat] ECC-384
2,764,446 UART: [kat] HMAC-384Kdf
2,797,465 UART: [kat] LMS
3,987,776 UART: [kat] --
3,992,001 UART: [cold-reset] ++
3,994,306 UART: [fht] Storing FHT @ 0x50003400
4,006,066 UART: [idev] ++
4,006,650 UART: [idev] CDI.KEYID = 6
4,007,625 UART: [idev] SUBJECT.KEYID = 7
4,008,846 UART: [idev] UDS.KEYID = 0
4,011,441 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,614 UART: [idev] Erasing UDS.KEYID = 0
7,360,290 UART: [idev] Using Sha1 for KeyId Algorithm
7,381,138 UART: [idev] --
7,386,000 UART: [ldev] ++
7,386,579 UART: [ldev] CDI.KEYID = 6
7,387,544 UART: [ldev] SUBJECT.KEYID = 5
7,388,828 UART: [ldev] AUTHORITY.KEYID = 7
7,389,956 UART: [ldev] FE.KEYID = 1
7,434,539 UART: [ldev] Erasing FE.KEYID = 1
10,766,314 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,086 UART: [ldev] --
13,129,050 UART: [fwproc] Waiting for Commands...
13,130,990 UART: [fwproc] Received command 0x46574c44
13,133,233 UART: [fwproc] Received Image of size 114124 bytes
17,183,345 UART: ROM Fatal Error: 0x000B0028
17,186,764 >>> mbox cmd response: failed
17,187,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,187,516 >>> mbox cmd response: failed
17,187,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,188,097 >>> mbox cmd response: failed
Initializing fuses
2,065,971 writing to cptra_bootfsm_go
2,255,284 UART:
2,255,633 UART: Running Caliptra ROM ...
2,256,679 UART:
2,256,831 UART: [state] CFI Enabled
2,327,555 UART: [state] LifecycleState = Unprovisioned
2,329,499 UART: [state] DebugLocked = No
2,331,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,336,848 UART: [kat] SHA2-256
2,506,550 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,517,031 UART: [kat] ++
2,517,557 UART: [kat] sha1
2,529,802 UART: [kat] SHA2-256
2,532,505 UART: [kat] SHA2-384
2,538,499 UART: [kat] SHA2-512-ACC
2,540,914 UART: [kat] ECC-384
4,834,627 UART: [kat] HMAC-384Kdf
4,866,948 UART: [kat] LMS
6,057,262 UART: [kat] --
6,061,551 UART: [cold-reset] ++
6,063,603 UART: [fht] Storing FHT @ 0x50003400
6,075,853 UART: [idev] ++
6,076,425 UART: [idev] CDI.KEYID = 6
6,077,399 UART: [idev] SUBJECT.KEYID = 7
6,078,620 UART: [idev] UDS.KEYID = 0
6,080,887 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,224,630 UART: [idev] Erasing UDS.KEYID = 0
9,415,036 UART: [idev] Using Sha1 for KeyId Algorithm
9,436,000 UART: [idev] --
9,439,998 UART: [ldev] ++
9,440,625 UART: [ldev] CDI.KEYID = 6
9,441,515 UART: [ldev] SUBJECT.KEYID = 5
9,442,973 UART: [ldev] AUTHORITY.KEYID = 7
9,444,189 UART: [ldev] FE.KEYID = 1
9,489,109 UART: [ldev] Erasing FE.KEYID = 1
12,821,353 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,135,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,150,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,165,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,179,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,199,675 UART: [ldev] --
15,204,472 UART: [fwproc] Waiting for Commands...
15,207,163 UART: [fwproc] Received command 0x46574c44
15,209,382 UART: [fwproc] Received Image of size 114124 bytes
19,256,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,334,492 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,403,356 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,719,879 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,786,167 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,101,406 >>> mbox cmd response: failed
17,102,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,102,390 >>> mbox cmd response: failed
17,102,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,102,964 >>> mbox cmd response: failed
Initializing fuses
2,058,325 writing to cptra_bootfsm_go
5,859,156 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,930,613 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
192,574 UART:
192,922 UART: Running Caliptra ROM ...
194,110 UART:
603,922 UART: [state] CFI Enabled
619,303 UART: [state] LifecycleState = Unprovisioned
621,258 UART: [state] DebugLocked = No
622,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,304 UART: [kat] SHA2-256
797,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,572 UART: [kat] ++
808,153 UART: [kat] sha1
819,899 UART: [kat] SHA2-256
822,631 UART: [kat] SHA2-384
827,467 UART: [kat] SHA2-512-ACC
829,856 UART: [kat] ECC-384
3,115,934 UART: [kat] HMAC-384Kdf
3,127,035 UART: [kat] LMS
4,317,166 UART: [kat] --
4,321,886 UART: [cold-reset] ++
4,322,854 UART: [fht] Storing FHT @ 0x50003400
4,335,417 UART: [idev] ++
4,336,043 UART: [idev] CDI.KEYID = 6
4,336,937 UART: [idev] SUBJECT.KEYID = 7
4,338,120 UART: [idev] UDS.KEYID = 0
4,340,694 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,155 UART: [idev] Erasing UDS.KEYID = 0
7,625,575 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,953 UART: [idev] --
7,650,518 UART: [ldev] ++
7,651,140 UART: [ldev] CDI.KEYID = 6
7,652,158 UART: [ldev] SUBJECT.KEYID = 5
7,653,335 UART: [ldev] AUTHORITY.KEYID = 7
7,654,565 UART: [ldev] FE.KEYID = 1
7,667,157 UART: [ldev] Erasing FE.KEYID = 1
10,954,366 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,723 UART: [ldev] --
13,317,100 UART: [fwproc] Waiting for Commands...
13,320,064 UART: [fwproc] Received command 0x46574c44
13,322,305 UART: [fwproc] Received Image of size 114124 bytes
17,378,912 UART: ROM Fatal Error: 0x000B0028
17,382,366 >>> mbox cmd response: failed
17,382,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,383,087 >>> mbox cmd response: failed
17,383,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,383,676 >>> mbox cmd response: failed
Initializing fuses
2,055,322 writing to cptra_bootfsm_go
2,244,650 UART:
2,244,997 UART: Running Caliptra ROM ...
2,246,132 UART:
3,071,538 UART: [state] CFI Enabled
3,085,009 UART: [state] LifecycleState = Unprovisioned
3,086,955 UART: [state] DebugLocked = No
3,089,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,095,321 UART: [kat] SHA2-256
3,265,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,275,595 UART: [kat] ++
3,276,160 UART: [kat] sha1
3,286,677 UART: [kat] SHA2-256
3,289,374 UART: [kat] SHA2-384
3,295,412 UART: [kat] SHA2-512-ACC
3,297,763 UART: [kat] ECC-384
5,582,877 UART: [kat] HMAC-384Kdf
5,593,810 UART: [kat] LMS
6,783,898 UART: [kat] --
6,788,104 UART: [cold-reset] ++
6,790,695 UART: [fht] Storing FHT @ 0x50003400
6,801,959 UART: [idev] ++
6,802,583 UART: [idev] CDI.KEYID = 6
6,803,508 UART: [idev] SUBJECT.KEYID = 7
6,804,725 UART: [idev] UDS.KEYID = 0
6,806,969 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,950,361 UART: [idev] Erasing UDS.KEYID = 0
10,093,685 UART: [idev] Using Sha1 for KeyId Algorithm
10,115,406 UART: [idev] --
10,118,394 UART: [ldev] ++
10,118,967 UART: [ldev] CDI.KEYID = 6
10,119,984 UART: [ldev] SUBJECT.KEYID = 5
10,121,171 UART: [ldev] AUTHORITY.KEYID = 7
10,122,410 UART: [ldev] FE.KEYID = 1
10,133,177 UART: [ldev] Erasing FE.KEYID = 1
13,421,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,711,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,726,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,741,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,755,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,773,501 UART: [ldev] --
15,778,547 UART: [fwproc] Waiting for Commands...
15,780,375 UART: [fwproc] Received command 0x46574c44
15,782,590 UART: [fwproc] Received Image of size 114124 bytes
19,830,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,908,783 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,977,678 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,294,767 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
4,129,074 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,330,794 >>> mbox cmd response: failed
17,331,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,331,676 >>> mbox cmd response: failed
17,331,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,332,290 >>> mbox cmd response: failed
Initializing fuses
2,065,190 writing to cptra_bootfsm_go
6,662,861 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,606,459 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,234 UART:
192,607 UART: Running Caliptra ROM ...
193,840 UART:
194,002 UART: [state] CFI Enabled
261,013 UART: [state] LifecycleState = Unprovisioned
262,894 UART: [state] DebugLocked = No
264,470 UART: [state] WD Timer not started. Device not locked for debugging
269,014 UART: [kat] SHA2-256
448,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,693 UART: [kat] ++
460,228 UART: [kat] sha1
471,544 UART: [kat] SHA2-256
474,560 UART: [kat] SHA2-384
480,755 UART: [kat] SHA2-512-ACC
483,693 UART: [kat] ECC-384
2,949,249 UART: [kat] HMAC-384Kdf
2,971,527 UART: [kat] LMS
3,500,972 UART: [kat] --
3,505,815 UART: [cold-reset] ++
3,508,026 UART: [fht] FHT @ 0x50003400
3,519,547 UART: [idev] ++
3,520,113 UART: [idev] CDI.KEYID = 6
3,521,023 UART: [idev] SUBJECT.KEYID = 7
3,522,239 UART: [idev] UDS.KEYID = 0
3,524,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,669,066 UART: [idev] Erasing UDS.KEYID = 0
6,028,674 UART: [idev] Sha1 KeyId Algorithm
6,051,210 UART: [idev] --
6,053,484 UART: [ldev] ++
6,054,062 UART: [ldev] CDI.KEYID = 6
6,054,976 UART: [ldev] SUBJECT.KEYID = 5
6,056,142 UART: [ldev] AUTHORITY.KEYID = 7
6,057,434 UART: [ldev] FE.KEYID = 1
6,092,064 UART: [ldev] Erasing FE.KEYID = 1
8,597,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,969 UART: [ldev] --
10,405,886 UART: [fwproc] Wait for Commands...
10,407,875 UART: [fwproc] Recv command 0x46574c44
10,409,970 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,070 UART: ROM Fatal Error: 0x000B0028
13,818,201 >>> mbox cmd response: failed
13,818,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,818,997 >>> mbox cmd response: failed
13,819,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,819,555 >>> mbox cmd response: failed
Initializing fuses
2,053,133 writing to cptra_bootfsm_go
2,242,459 UART:
2,242,824 UART: Running Caliptra ROM ...
2,243,959 UART:
2,244,142 UART: [state] CFI Enabled
2,308,860 UART: [state] LifecycleState = Unprovisioned
2,310,736 UART: [state] DebugLocked = No
2,312,666 UART: [state] WD Timer not started. Device not locked for debugging
2,317,278 UART: [kat] SHA2-256
2,496,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,507,940 UART: [kat] ++
2,508,481 UART: [kat] sha1
2,519,643 UART: [kat] SHA2-256
2,522,656 UART: [kat] SHA2-384
2,529,707 UART: [kat] SHA2-512-ACC
2,532,644 UART: [kat] ECC-384
4,994,031 UART: [kat] HMAC-384Kdf
5,015,724 UART: [kat] LMS
5,545,138 UART: [kat] --
5,549,663 UART: [cold-reset] ++
5,551,975 UART: [fht] FHT @ 0x50003400
5,562,465 UART: [idev] ++
5,563,033 UART: [idev] CDI.KEYID = 6
5,564,119 UART: [idev] SUBJECT.KEYID = 7
5,565,243 UART: [idev] UDS.KEYID = 0
5,567,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,711,502 UART: [idev] Erasing UDS.KEYID = 0
8,069,056 UART: [idev] Sha1 KeyId Algorithm
8,092,017 UART: [idev] --
8,096,829 UART: [ldev] ++
8,097,429 UART: [ldev] CDI.KEYID = 6
8,098,318 UART: [ldev] SUBJECT.KEYID = 5
8,099,497 UART: [ldev] AUTHORITY.KEYID = 7
8,100,737 UART: [ldev] FE.KEYID = 1
8,144,715 UART: [ldev] Erasing FE.KEYID = 1
10,644,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,365,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,381,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,397,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,413,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,432,738 UART: [ldev] --
12,437,948 UART: [fwproc] Wait for Commands...
12,441,181 UART: [fwproc] Recv command 0x46574c44
12,443,221 UART: [fwproc] Recv'd Img size: 114448 bytes
15,841,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,916,410 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,985,189 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,303,366 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,361,475 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,596,760 >>> mbox cmd response: failed
13,597,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,597,668 >>> mbox cmd response: failed
13,597,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,598,232 >>> mbox cmd response: failed
Initializing fuses
2,058,946 writing to cptra_bootfsm_go
5,444,002 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,148,340 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
192,703 UART:
193,051 UART: Running Caliptra ROM ...
194,565 UART:
603,964 UART: [state] CFI Enabled
618,504 UART: [state] LifecycleState = Unprovisioned
620,387 UART: [state] DebugLocked = No
622,250 UART: [state] WD Timer not started. Device not locked for debugging
625,695 UART: [kat] SHA2-256
804,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,409 UART: [kat] ++
816,942 UART: [kat] sha1
827,504 UART: [kat] SHA2-256
830,568 UART: [kat] SHA2-384
837,136 UART: [kat] SHA2-512-ACC
840,057 UART: [kat] ECC-384
3,279,281 UART: [kat] HMAC-384Kdf
3,293,110 UART: [kat] LMS
3,822,577 UART: [kat] --
3,827,768 UART: [cold-reset] ++
3,829,590 UART: [fht] FHT @ 0x50003400
3,840,781 UART: [idev] ++
3,841,355 UART: [idev] CDI.KEYID = 6
3,842,371 UART: [idev] SUBJECT.KEYID = 7
3,843,474 UART: [idev] UDS.KEYID = 0
3,846,395 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,373 UART: [idev] Erasing UDS.KEYID = 0
6,316,000 UART: [idev] Sha1 KeyId Algorithm
6,338,797 UART: [idev] --
6,342,629 UART: [ldev] ++
6,343,199 UART: [ldev] CDI.KEYID = 6
6,344,084 UART: [ldev] SUBJECT.KEYID = 5
6,345,189 UART: [ldev] AUTHORITY.KEYID = 7
6,346,533 UART: [ldev] FE.KEYID = 1
6,358,668 UART: [ldev] Erasing FE.KEYID = 1
8,828,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,263 UART: [ldev] --
10,618,447 UART: [fwproc] Wait for Commands...
10,621,030 UART: [fwproc] Recv command 0x46574c44
10,623,076 UART: [fwproc] Recv'd Img size: 114448 bytes
14,028,931 UART: ROM Fatal Error: 0x000B0028
14,032,031 >>> mbox cmd response: failed
14,032,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,032,839 >>> mbox cmd response: failed
14,033,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,033,463 >>> mbox cmd response: failed
Initializing fuses
2,060,798 writing to cptra_bootfsm_go
2,250,125 UART:
2,250,479 UART: Running Caliptra ROM ...
2,251,620 UART:
6,413,741 UART: [state] CFI Enabled
6,429,785 UART: [state] LifecycleState = Unprovisioned
6,431,639 UART: [state] DebugLocked = No
6,434,513 UART: [state] WD Timer not started. Device not locked for debugging
6,439,012 UART: [kat] SHA2-256
6,618,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,629,701 UART: [kat] ++
6,630,245 UART: [kat] sha1
6,640,544 UART: [kat] SHA2-256
6,643,593 UART: [kat] SHA2-384
6,650,289 UART: [kat] SHA2-512-ACC
6,653,287 UART: [kat] ECC-384
9,094,380 UART: [kat] HMAC-384Kdf
9,106,779 UART: [kat] LMS
9,636,241 UART: [kat] --
9,641,500 UART: [cold-reset] ++
9,642,814 UART: [fht] FHT @ 0x50003400
9,652,935 UART: [idev] ++
9,653,546 UART: [idev] CDI.KEYID = 6
9,654,439 UART: [idev] SUBJECT.KEYID = 7
9,655,662 UART: [idev] UDS.KEYID = 0
9,657,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,801,768 UART: [idev] Erasing UDS.KEYID = 0
12,127,066 UART: [idev] Sha1 KeyId Algorithm
12,149,375 UART: [idev] --
12,154,009 UART: [ldev] ++
12,154,578 UART: [ldev] CDI.KEYID = 6
12,155,489 UART: [ldev] SUBJECT.KEYID = 5
12,156,706 UART: [ldev] AUTHORITY.KEYID = 7
12,157,941 UART: [ldev] FE.KEYID = 1
12,170,051 UART: [ldev] Erasing FE.KEYID = 1
14,641,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,359,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,375,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,391,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,407,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,427,134 UART: [ldev] --
16,431,749 UART: [fwproc] Wait for Commands...
16,434,547 UART: [fwproc] Recv command 0x46574c44
16,436,596 UART: [fwproc] Recv'd Img size: 114448 bytes
19,840,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,914,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,982,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,301,100 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
3,693,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,808,141 >>> mbox cmd response: failed
13,808,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,809,092 >>> mbox cmd response: failed
13,809,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,809,674 >>> mbox cmd response: failed
Initializing fuses
2,054,072 writing to cptra_bootfsm_go
9,746,512 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,328,683 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,442,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,084 >>> mbox cmd response: failed
14,277,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,278,071 >>> mbox cmd response: failed
14,278,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,278,642 >>> mbox cmd response: failed
Initializing fuses
2,068,467 writing to cptra_bootfsm_go
5,497,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,786,180 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,756,846 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,502,228 >>> mbox cmd response: failed
14,502,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,503,231 >>> mbox cmd response: failed
14,503,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,503,791 >>> mbox cmd response: failed
Initializing fuses
2,062,034 writing to cptra_bootfsm_go
9,119,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,321,751 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,805 UART: [kat] SHA2-256
881,736 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,851 UART: [kat] ++
886,003 UART: [kat] sha1
890,295 UART: [kat] SHA2-256
892,233 UART: [kat] SHA2-384
894,866 UART: [kat] SHA2-512-ACC
896,767 UART: [kat] ECC-384
902,354 UART: [kat] HMAC-384Kdf
906,990 UART: [kat] LMS
1,475,186 UART: [kat] --
1,476,025 UART: [cold-reset] ++
1,476,501 UART: [fht] Storing FHT @ 0x50003400
1,479,278 UART: [idev] ++
1,479,446 UART: [idev] CDI.KEYID = 6
1,479,806 UART: [idev] SUBJECT.KEYID = 7
1,480,230 UART: [idev] UDS.KEYID = 0
1,480,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,974 UART: [idev] Erasing UDS.KEYID = 0
1,503,970 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,538 UART: [idev] --
1,513,677 UART: [ldev] ++
1,513,845 UART: [ldev] CDI.KEYID = 6
1,514,208 UART: [ldev] SUBJECT.KEYID = 5
1,514,634 UART: [ldev] AUTHORITY.KEYID = 7
1,515,097 UART: [ldev] FE.KEYID = 1
1,520,313 UART: [ldev] Erasing FE.KEYID = 1
1,545,596 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,628 UART: [ldev] --
1,584,955 UART: [fwproc] Waiting for Commands...
1,585,634 UART: [fwproc] Received command 0x46574c44
1,586,425 UART: [fwproc] Received Image of size 114448 bytes
2,884,436 UART: ROM Fatal Error: 0x000B0028
2,885,593 >>> mbox cmd response: failed
2,885,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,599 >>> mbox cmd response: failed
2,885,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,233 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,831 UART: [kat] SHA2-256
881,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,877 UART: [kat] ++
886,029 UART: [kat] sha1
890,187 UART: [kat] SHA2-256
892,125 UART: [kat] SHA2-384
895,078 UART: [kat] SHA2-512-ACC
896,979 UART: [kat] ECC-384
902,664 UART: [kat] HMAC-384Kdf
907,168 UART: [kat] LMS
1,475,364 UART: [kat] --
1,476,445 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,816 UART: [idev] ++
1,479,984 UART: [idev] CDI.KEYID = 6
1,480,344 UART: [idev] SUBJECT.KEYID = 7
1,480,768 UART: [idev] UDS.KEYID = 0
1,481,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,850 UART: [idev] Erasing UDS.KEYID = 0
1,505,358 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,958 UART: [idev] --
1,514,957 UART: [ldev] ++
1,515,125 UART: [ldev] CDI.KEYID = 6
1,515,488 UART: [ldev] SUBJECT.KEYID = 5
1,515,914 UART: [ldev] AUTHORITY.KEYID = 7
1,516,377 UART: [ldev] FE.KEYID = 1
1,521,449 UART: [ldev] Erasing FE.KEYID = 1
1,546,940 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,090 UART: [ldev] --
1,586,603 UART: [fwproc] Waiting for Commands...
1,587,460 UART: [fwproc] Received command 0x46574c44
1,588,251 UART: [fwproc] Received Image of size 114448 bytes
2,887,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,599 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,926 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,339 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,739,690 >>> mbox cmd response: failed
2,739,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,696 >>> mbox cmd response: failed
2,739,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,982 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,468 UART: [kat] SHA2-256
882,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,514 UART: [kat] ++
886,666 UART: [kat] sha1
891,056 UART: [kat] SHA2-256
892,994 UART: [kat] SHA2-384
895,601 UART: [kat] SHA2-512-ACC
897,502 UART: [kat] ECC-384
903,067 UART: [kat] HMAC-384Kdf
907,725 UART: [kat] LMS
1,475,921 UART: [kat] --
1,477,174 UART: [cold-reset] ++
1,477,722 UART: [fht] Storing FHT @ 0x50003400
1,480,481 UART: [idev] ++
1,480,649 UART: [idev] CDI.KEYID = 6
1,481,009 UART: [idev] SUBJECT.KEYID = 7
1,481,433 UART: [idev] UDS.KEYID = 0
1,481,778 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,891 UART: [idev] Erasing UDS.KEYID = 0
1,505,389 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,191 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,521,682 UART: [ldev] Erasing FE.KEYID = 1
1,547,563 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,485 UART: [ldev] --
1,586,954 UART: [fwproc] Waiting for Commands...
1,587,613 UART: [fwproc] Received command 0x46574c44
1,588,404 UART: [fwproc] Received Image of size 114448 bytes
2,886,997 UART: ROM Fatal Error: 0x000B0028
2,888,154 >>> mbox cmd response: failed
2,888,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,888,160 >>> mbox cmd response: failed
2,888,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,888,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,911 UART: [state] LifecycleState = Unprovisioned
85,566 UART: [state] DebugLocked = No
86,290 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,978 UART: [kat] SHA2-256
881,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,024 UART: [kat] ++
886,176 UART: [kat] sha1
890,612 UART: [kat] SHA2-256
892,550 UART: [kat] SHA2-384
895,301 UART: [kat] SHA2-512-ACC
897,202 UART: [kat] ECC-384
902,927 UART: [kat] HMAC-384Kdf
907,593 UART: [kat] LMS
1,475,789 UART: [kat] --
1,476,562 UART: [cold-reset] ++
1,477,020 UART: [fht] Storing FHT @ 0x50003400
1,479,977 UART: [idev] ++
1,480,145 UART: [idev] CDI.KEYID = 6
1,480,505 UART: [idev] SUBJECT.KEYID = 7
1,480,929 UART: [idev] UDS.KEYID = 0
1,481,274 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,415 UART: [idev] Erasing UDS.KEYID = 0
1,506,265 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,841 UART: [idev] --
1,515,876 UART: [ldev] ++
1,516,044 UART: [ldev] CDI.KEYID = 6
1,516,407 UART: [ldev] SUBJECT.KEYID = 5
1,516,833 UART: [ldev] AUTHORITY.KEYID = 7
1,517,296 UART: [ldev] FE.KEYID = 1
1,522,632 UART: [ldev] Erasing FE.KEYID = 1
1,548,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,903 UART: [ldev] --
1,587,242 UART: [fwproc] Waiting for Commands...
1,588,003 UART: [fwproc] Received command 0x46574c44
1,588,794 UART: [fwproc] Received Image of size 114448 bytes
2,887,626 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,590 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,942 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,007 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,479 >>> mbox cmd response: failed
2,740,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,485 >>> mbox cmd response: failed
2,740,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,088 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,467 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Unprovisioned
86,201 UART: [state] DebugLocked = No
86,883 UART: [state] WD Timer not started. Device not locked for debugging
88,232 UART: [kat] SHA2-256
893,882 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,007 UART: [kat] ++
898,159 UART: [kat] sha1
902,521 UART: [kat] SHA2-256
904,461 UART: [kat] SHA2-384
907,290 UART: [kat] SHA2-512-ACC
909,191 UART: [kat] ECC-384
918,886 UART: [kat] HMAC-384Kdf
923,500 UART: [kat] LMS
1,171,828 UART: [kat] --
1,172,281 UART: [cold-reset] ++
1,172,719 UART: [fht] FHT @ 0x50003400
1,175,180 UART: [idev] ++
1,175,348 UART: [idev] CDI.KEYID = 6
1,175,708 UART: [idev] SUBJECT.KEYID = 7
1,176,132 UART: [idev] UDS.KEYID = 0
1,176,477 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,418 UART: [idev] Erasing UDS.KEYID = 0
1,200,737 UART: [idev] Sha1 KeyId Algorithm
1,208,969 UART: [idev] --
1,210,209 UART: [ldev] ++
1,210,377 UART: [ldev] CDI.KEYID = 6
1,210,740 UART: [ldev] SUBJECT.KEYID = 5
1,211,166 UART: [ldev] AUTHORITY.KEYID = 7
1,211,629 UART: [ldev] FE.KEYID = 1
1,216,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,459 UART: [ldev] --
1,281,752 UART: [fwproc] Wait for Commands...
1,282,410 UART: [fwproc] Recv command 0x46574c44
1,283,138 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,513 UART: ROM Fatal Error: 0x000B0028
2,581,670 >>> mbox cmd response: failed
2,581,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,676 >>> mbox cmd response: failed
2,581,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
87,976 UART: [kat] SHA2-256
893,626 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,751 UART: [kat] ++
897,903 UART: [kat] sha1
902,233 UART: [kat] SHA2-256
904,173 UART: [kat] SHA2-384
906,964 UART: [kat] SHA2-512-ACC
908,865 UART: [kat] ECC-384
918,638 UART: [kat] HMAC-384Kdf
923,214 UART: [kat] LMS
1,171,542 UART: [kat] --
1,172,449 UART: [cold-reset] ++
1,173,023 UART: [fht] FHT @ 0x50003400
1,175,848 UART: [idev] ++
1,176,016 UART: [idev] CDI.KEYID = 6
1,176,376 UART: [idev] SUBJECT.KEYID = 7
1,176,800 UART: [idev] UDS.KEYID = 0
1,177,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,864 UART: [idev] Erasing UDS.KEYID = 0
1,201,973 UART: [idev] Sha1 KeyId Algorithm
1,210,473 UART: [idev] --
1,211,361 UART: [ldev] ++
1,211,529 UART: [ldev] CDI.KEYID = 6
1,211,892 UART: [ldev] SUBJECT.KEYID = 5
1,212,318 UART: [ldev] AUTHORITY.KEYID = 7
1,212,781 UART: [ldev] FE.KEYID = 1
1,217,861 UART: [ldev] Erasing FE.KEYID = 1
1,244,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,947 UART: [ldev] --
1,283,360 UART: [fwproc] Wait for Commands...
1,284,134 UART: [fwproc] Recv command 0x46574c44
1,284,862 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,190 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,235 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,438,589 >>> mbox cmd response: failed
2,438,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,595 >>> mbox cmd response: failed
2,438,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,396 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
902,014 UART: [kat] SHA2-256
903,954 UART: [kat] SHA2-384
906,725 UART: [kat] SHA2-512-ACC
908,626 UART: [kat] ECC-384
918,117 UART: [kat] HMAC-384Kdf
922,621 UART: [kat] LMS
1,170,949 UART: [kat] --
1,171,996 UART: [cold-reset] ++
1,172,520 UART: [fht] FHT @ 0x50003400
1,175,003 UART: [idev] ++
1,175,171 UART: [idev] CDI.KEYID = 6
1,175,531 UART: [idev] SUBJECT.KEYID = 7
1,175,955 UART: [idev] UDS.KEYID = 0
1,176,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,359 UART: [idev] Erasing UDS.KEYID = 0
1,201,112 UART: [idev] Sha1 KeyId Algorithm
1,209,664 UART: [idev] --
1,210,702 UART: [ldev] ++
1,210,870 UART: [ldev] CDI.KEYID = 6
1,211,233 UART: [ldev] SUBJECT.KEYID = 5
1,211,659 UART: [ldev] AUTHORITY.KEYID = 7
1,212,122 UART: [ldev] FE.KEYID = 1
1,217,520 UART: [ldev] Erasing FE.KEYID = 1
1,243,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,850 UART: [ldev] --
1,283,135 UART: [fwproc] Wait for Commands...
1,283,719 UART: [fwproc] Recv command 0x46574c44
1,284,447 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,906 UART: ROM Fatal Error: 0x000B0028
2,584,063 >>> mbox cmd response: failed
2,584,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,069 >>> mbox cmd response: failed
2,584,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,999 UART: [state] LifecycleState = Unprovisioned
86,654 UART: [state] DebugLocked = No
87,302 UART: [state] WD Timer not started. Device not locked for debugging
88,601 UART: [kat] SHA2-256
894,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,376 UART: [kat] ++
898,528 UART: [kat] sha1
902,726 UART: [kat] SHA2-256
904,666 UART: [kat] SHA2-384
907,321 UART: [kat] SHA2-512-ACC
909,222 UART: [kat] ECC-384
918,889 UART: [kat] HMAC-384Kdf
923,683 UART: [kat] LMS
1,172,011 UART: [kat] --
1,172,794 UART: [cold-reset] ++
1,173,336 UART: [fht] FHT @ 0x50003400
1,175,907 UART: [idev] ++
1,176,075 UART: [idev] CDI.KEYID = 6
1,176,435 UART: [idev] SUBJECT.KEYID = 7
1,176,859 UART: [idev] UDS.KEYID = 0
1,177,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,519 UART: [idev] Erasing UDS.KEYID = 0
1,201,664 UART: [idev] Sha1 KeyId Algorithm
1,210,134 UART: [idev] --
1,211,382 UART: [ldev] ++
1,211,550 UART: [ldev] CDI.KEYID = 6
1,211,913 UART: [ldev] SUBJECT.KEYID = 5
1,212,339 UART: [ldev] AUTHORITY.KEYID = 7
1,212,802 UART: [ldev] FE.KEYID = 1
1,218,034 UART: [ldev] Erasing FE.KEYID = 1
1,243,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,694 UART: [ldev] --
1,282,963 UART: [fwproc] Wait for Commands...
1,283,663 UART: [fwproc] Recv command 0x46574c44
1,284,391 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,654 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,438,280 >>> mbox cmd response: failed
2,438,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,286 >>> mbox cmd response: failed
2,438,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,438,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,845 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,058 UART: [kat] HMAC-384Kdf
920,458 UART: [kat] LMS
1,168,770 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,169,933 UART: [fht] FHT @ 0x50003400
1,172,463 UART: [idev] ++
1,172,631 UART: [idev] CDI.KEYID = 6
1,172,992 UART: [idev] SUBJECT.KEYID = 7
1,173,417 UART: [idev] UDS.KEYID = 0
1,173,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,197,747 UART: [idev] Sha1 KeyId Algorithm
1,206,687 UART: [idev] --
1,207,730 UART: [ldev] ++
1,207,898 UART: [ldev] CDI.KEYID = 6
1,208,262 UART: [ldev] SUBJECT.KEYID = 5
1,208,689 UART: [ldev] AUTHORITY.KEYID = 7
1,209,152 UART: [ldev] FE.KEYID = 1
1,214,168 UART: [ldev] Erasing FE.KEYID = 1
1,239,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,068 UART: [ldev] --
1,279,334 UART: [fwproc] Wait for Commands...
1,279,989 UART: [fwproc] Recv command 0x46574c44
1,280,722 UART: [fwproc] Recv'd Img size: 114448 bytes
2,578,481 UART: ROM Fatal Error: 0x000B0028
2,579,638 >>> mbox cmd response: failed
2,579,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,644 >>> mbox cmd response: failed
2,579,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
915,972 UART: [kat] HMAC-384Kdf
920,346 UART: [kat] LMS
1,168,658 UART: [kat] --
1,169,401 UART: [cold-reset] ++
1,169,961 UART: [fht] FHT @ 0x50003400
1,172,631 UART: [idev] ++
1,172,799 UART: [idev] CDI.KEYID = 6
1,173,160 UART: [idev] SUBJECT.KEYID = 7
1,173,585 UART: [idev] UDS.KEYID = 0
1,173,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,195 UART: [idev] Erasing UDS.KEYID = 0
1,198,587 UART: [idev] Sha1 KeyId Algorithm
1,207,323 UART: [idev] --
1,208,424 UART: [ldev] ++
1,208,592 UART: [ldev] CDI.KEYID = 6
1,208,956 UART: [ldev] SUBJECT.KEYID = 5
1,209,383 UART: [ldev] AUTHORITY.KEYID = 7
1,209,846 UART: [ldev] FE.KEYID = 1
1,215,000 UART: [ldev] Erasing FE.KEYID = 1
1,241,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,024 UART: [ldev] --
1,280,436 UART: [fwproc] Wait for Commands...
1,281,251 UART: [fwproc] Recv command 0x46574c44
1,281,984 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,200 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,465 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,433,435 >>> mbox cmd response: failed
2,433,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,441 >>> mbox cmd response: failed
2,433,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,623 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,126 UART: [kat] SHA2-256
902,066 UART: [kat] SHA2-384
904,611 UART: [kat] SHA2-512-ACC
906,512 UART: [kat] ECC-384
916,527 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,170,292 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,760 UART: [idev] ++
1,173,928 UART: [idev] CDI.KEYID = 6
1,174,289 UART: [idev] SUBJECT.KEYID = 7
1,174,714 UART: [idev] UDS.KEYID = 0
1,175,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,428 UART: [idev] Sha1 KeyId Algorithm
1,209,224 UART: [idev] --
1,210,205 UART: [ldev] ++
1,210,373 UART: [ldev] CDI.KEYID = 6
1,210,737 UART: [ldev] SUBJECT.KEYID = 5
1,211,164 UART: [ldev] AUTHORITY.KEYID = 7
1,211,627 UART: [ldev] FE.KEYID = 1
1,217,087 UART: [ldev] Erasing FE.KEYID = 1
1,243,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,575 UART: [ldev] --
1,282,941 UART: [fwproc] Wait for Commands...
1,283,628 UART: [fwproc] Recv command 0x46574c44
1,284,361 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,376 UART: ROM Fatal Error: 0x000B0028
2,583,533 >>> mbox cmd response: failed
2,583,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,539 >>> mbox cmd response: failed
2,583,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,743 UART: [kat] SHA2-512-ACC
906,644 UART: [kat] ECC-384
916,769 UART: [kat] HMAC-384Kdf
921,615 UART: [kat] LMS
1,169,927 UART: [kat] --
1,170,818 UART: [cold-reset] ++
1,171,362 UART: [fht] FHT @ 0x50003400
1,174,188 UART: [idev] ++
1,174,356 UART: [idev] CDI.KEYID = 6
1,174,717 UART: [idev] SUBJECT.KEYID = 7
1,175,142 UART: [idev] UDS.KEYID = 0
1,175,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,504 UART: [idev] Erasing UDS.KEYID = 0
1,201,012 UART: [idev] Sha1 KeyId Algorithm
1,209,876 UART: [idev] --
1,210,871 UART: [ldev] ++
1,211,039 UART: [ldev] CDI.KEYID = 6
1,211,403 UART: [ldev] SUBJECT.KEYID = 5
1,211,830 UART: [ldev] AUTHORITY.KEYID = 7
1,212,293 UART: [ldev] FE.KEYID = 1
1,217,607 UART: [ldev] Erasing FE.KEYID = 1
1,243,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,679 UART: [ldev] --
1,283,151 UART: [fwproc] Wait for Commands...
1,283,886 UART: [fwproc] Recv command 0x46574c44
1,284,619 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,158 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,817 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,662 >>> mbox cmd response: failed
2,434,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,668 >>> mbox cmd response: failed
2,434,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,788 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
192,028 UART:
192,418 UART: Running Caliptra ROM ...
193,619 UART:
193,775 UART: [state] CFI Enabled
260,004 UART: [state] LifecycleState = Unprovisioned
261,993 UART: [state] DebugLocked = No
264,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,886 UART: [kat] SHA2-256
439,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,080 UART: [kat] ++
450,586 UART: [kat] sha1
462,547 UART: [kat] SHA2-256
465,288 UART: [kat] SHA2-384
470,085 UART: [kat] SHA2-512-ACC
472,435 UART: [kat] ECC-384
2,766,850 UART: [kat] HMAC-384Kdf
2,798,004 UART: [kat] LMS
3,988,310 UART: [kat] --
3,992,549 UART: [cold-reset] ++
3,994,329 UART: [fht] Storing FHT @ 0x50003400
4,005,709 UART: [idev] ++
4,006,282 UART: [idev] CDI.KEYID = 6
4,007,303 UART: [idev] SUBJECT.KEYID = 7
4,008,469 UART: [idev] UDS.KEYID = 0
4,011,169 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,802 UART: [idev] Erasing UDS.KEYID = 0
7,345,450 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,786 UART: [idev] --
7,373,729 UART: [ldev] ++
7,374,313 UART: [ldev] CDI.KEYID = 6
7,375,225 UART: [ldev] SUBJECT.KEYID = 5
7,376,441 UART: [ldev] AUTHORITY.KEYID = 7
7,377,730 UART: [ldev] FE.KEYID = 1
7,419,192 UART: [ldev] Erasing FE.KEYID = 1
10,752,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,135 UART: [ldev] --
13,113,701 UART: [fwproc] Waiting for Commands...
13,116,717 UART: [fwproc] Received command 0x46574c44
13,118,911 UART: [fwproc] Received Image of size 114124 bytes
17,169,781 UART: ROM Fatal Error: 0x000B0029
17,173,246 >>> mbox cmd response: failed
17,173,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,174,006 >>> mbox cmd response: failed
17,174,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,174,578 >>> mbox cmd response: failed
Initializing fuses
2,057,864 writing to cptra_bootfsm_go
2,247,164 UART:
2,247,511 UART: Running Caliptra ROM ...
2,248,649 UART:
2,248,820 UART: [state] CFI Enabled
2,308,479 UART: [state] LifecycleState = Unprovisioned
2,310,421 UART: [state] DebugLocked = No
2,311,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,210 UART: [kat] SHA2-256
2,486,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,434 UART: [kat] ++
2,497,980 UART: [kat] sha1
2,507,527 UART: [kat] SHA2-256
2,510,187 UART: [kat] SHA2-384
2,516,906 UART: [kat] SHA2-512-ACC
2,519,271 UART: [kat] ECC-384
4,812,458 UART: [kat] HMAC-384Kdf
4,844,297 UART: [kat] LMS
6,034,572 UART: [kat] --
6,041,322 UART: [cold-reset] ++
6,042,552 UART: [fht] Storing FHT @ 0x50003400
6,054,305 UART: [idev] ++
6,054,934 UART: [idev] CDI.KEYID = 6
6,055,818 UART: [idev] SUBJECT.KEYID = 7
6,057,087 UART: [idev] UDS.KEYID = 0
6,059,399 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,203,159 UART: [idev] Erasing UDS.KEYID = 0
9,388,049 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,346 UART: [idev] --
9,414,398 UART: [ldev] ++
9,414,978 UART: [ldev] CDI.KEYID = 6
9,415,859 UART: [ldev] SUBJECT.KEYID = 5
9,417,170 UART: [ldev] AUTHORITY.KEYID = 7
9,418,328 UART: [ldev] FE.KEYID = 1
9,466,315 UART: [ldev] Erasing FE.KEYID = 1
12,799,353 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,605 UART: [ldev] --
15,159,753 UART: [fwproc] Waiting for Commands...
15,162,507 UART: [fwproc] Received command 0x46574c44
15,164,695 UART: [fwproc] Received Image of size 114124 bytes
19,220,042 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,298,621 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,367,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,684,628 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
3,806,141 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,151,915 >>> mbox cmd response: failed
17,152,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,152,894 >>> mbox cmd response: failed
17,153,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,153,457 >>> mbox cmd response: failed
Initializing fuses
2,062,993 writing to cptra_bootfsm_go
5,867,384 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,935,183 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,613 UART:
192,967 UART: Running Caliptra ROM ...
194,113 UART:
603,695 UART: [state] CFI Enabled
616,571 UART: [state] LifecycleState = Unprovisioned
618,444 UART: [state] DebugLocked = No
620,957 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,404 UART: [kat] SHA2-256
795,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,723 UART: [kat] ++
806,261 UART: [kat] sha1
817,456 UART: [kat] SHA2-256
820,170 UART: [kat] SHA2-384
826,690 UART: [kat] SHA2-512-ACC
829,096 UART: [kat] ECC-384
3,113,475 UART: [kat] HMAC-384Kdf
3,125,812 UART: [kat] LMS
4,315,933 UART: [kat] --
4,321,240 UART: [cold-reset] ++
4,323,010 UART: [fht] Storing FHT @ 0x50003400
4,335,467 UART: [idev] ++
4,336,030 UART: [idev] CDI.KEYID = 6
4,337,111 UART: [idev] SUBJECT.KEYID = 7
4,338,233 UART: [idev] UDS.KEYID = 0
4,340,826 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,155 UART: [idev] Erasing UDS.KEYID = 0
7,625,798 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,608 UART: [idev] --
7,651,550 UART: [ldev] ++
7,652,121 UART: [ldev] CDI.KEYID = 6
7,653,138 UART: [ldev] SUBJECT.KEYID = 5
7,654,296 UART: [ldev] AUTHORITY.KEYID = 7
7,655,530 UART: [ldev] FE.KEYID = 1
7,665,802 UART: [ldev] Erasing FE.KEYID = 1
10,955,200 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,839 UART: [ldev] --
13,316,353 UART: [fwproc] Waiting for Commands...
13,318,621 UART: [fwproc] Received command 0x46574c44
13,320,808 UART: [fwproc] Received Image of size 114124 bytes
17,367,128 UART: ROM Fatal Error: 0x000B0029
17,370,571 >>> mbox cmd response: failed
17,370,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,371,295 >>> mbox cmd response: failed
17,371,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,371,859 >>> mbox cmd response: failed
Initializing fuses
2,059,847 writing to cptra_bootfsm_go
2,249,151 UART:
2,249,487 UART: Running Caliptra ROM ...
2,250,630 UART:
3,087,121 UART: [state] CFI Enabled
3,103,070 UART: [state] LifecycleState = Unprovisioned
3,104,981 UART: [state] DebugLocked = No
3,107,881 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,112,730 UART: [kat] SHA2-256
3,282,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,293,002 UART: [kat] ++
3,293,555 UART: [kat] sha1
3,303,474 UART: [kat] SHA2-256
3,306,162 UART: [kat] SHA2-384
3,312,957 UART: [kat] SHA2-512-ACC
3,315,316 UART: [kat] ECC-384
5,599,066 UART: [kat] HMAC-384Kdf
5,610,635 UART: [kat] LMS
6,800,720 UART: [kat] --
6,805,181 UART: [cold-reset] ++
6,806,569 UART: [fht] Storing FHT @ 0x50003400
6,817,253 UART: [idev] ++
6,817,886 UART: [idev] CDI.KEYID = 6
6,818,821 UART: [idev] SUBJECT.KEYID = 7
6,820,039 UART: [idev] UDS.KEYID = 0
6,822,083 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,965,477 UART: [idev] Erasing UDS.KEYID = 0
10,112,360 UART: [idev] Using Sha1 for KeyId Algorithm
10,134,375 UART: [idev] --
10,137,931 UART: [ldev] ++
10,138,499 UART: [ldev] CDI.KEYID = 6
10,139,513 UART: [ldev] SUBJECT.KEYID = 5
10,140,699 UART: [ldev] AUTHORITY.KEYID = 7
10,141,933 UART: [ldev] FE.KEYID = 1
10,153,476 UART: [ldev] Erasing FE.KEYID = 1
13,442,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,733,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,748,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,763,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,777,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,797,265 UART: [ldev] --
15,801,234 UART: [fwproc] Waiting for Commands...
15,803,499 UART: [fwproc] Received command 0x46574c44
15,805,688 UART: [fwproc] Received Image of size 114124 bytes
19,866,247 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,941,977 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,010,868 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,328,248 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,129,673 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,326,803 >>> mbox cmd response: failed
17,327,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,327,847 >>> mbox cmd response: failed
17,328,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,328,431 >>> mbox cmd response: failed
Initializing fuses
2,062,576 writing to cptra_bootfsm_go
6,666,751 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,610,444 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,256 UART:
192,624 UART: Running Caliptra ROM ...
193,803 UART:
193,953 UART: [state] CFI Enabled
263,447 UART: [state] LifecycleState = Unprovisioned
265,330 UART: [state] DebugLocked = No
267,800 UART: [state] WD Timer not started. Device not locked for debugging
272,224 UART: [kat] SHA2-256
451,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,886 UART: [kat] ++
463,419 UART: [kat] sha1
473,768 UART: [kat] SHA2-256
476,817 UART: [kat] SHA2-384
482,265 UART: [kat] SHA2-512-ACC
485,251 UART: [kat] ECC-384
2,948,021 UART: [kat] HMAC-384Kdf
2,970,372 UART: [kat] LMS
3,499,800 UART: [kat] --
3,504,868 UART: [cold-reset] ++
3,507,076 UART: [fht] FHT @ 0x50003400
3,516,977 UART: [idev] ++
3,517,584 UART: [idev] CDI.KEYID = 6
3,518,500 UART: [idev] SUBJECT.KEYID = 7
3,519,664 UART: [idev] UDS.KEYID = 0
3,522,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,419 UART: [idev] Erasing UDS.KEYID = 0
6,023,166 UART: [idev] Sha1 KeyId Algorithm
6,044,738 UART: [idev] --
6,048,965 UART: [ldev] ++
6,049,542 UART: [ldev] CDI.KEYID = 6
6,050,457 UART: [ldev] SUBJECT.KEYID = 5
6,051,622 UART: [ldev] AUTHORITY.KEYID = 7
6,052,932 UART: [ldev] FE.KEYID = 1
6,100,729 UART: [ldev] Erasing FE.KEYID = 1
8,606,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,359 UART: [ldev] --
10,415,312 UART: [fwproc] Wait for Commands...
10,418,166 UART: [fwproc] Recv command 0x46574c44
10,420,259 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,474 UART: ROM Fatal Error: 0x000B0029
13,818,598 >>> mbox cmd response: failed
13,818,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,819,261 >>> mbox cmd response: failed
13,819,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,819,953 >>> mbox cmd response: failed
Initializing fuses
2,061,046 writing to cptra_bootfsm_go
2,250,374 UART:
2,250,719 UART: Running Caliptra ROM ...
2,251,851 UART:
2,252,018 UART: [state] CFI Enabled
2,313,599 UART: [state] LifecycleState = Unprovisioned
2,315,443 UART: [state] DebugLocked = No
2,318,172 UART: [state] WD Timer not started. Device not locked for debugging
2,321,705 UART: [kat] SHA2-256
2,500,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,512,413 UART: [kat] ++
2,512,962 UART: [kat] sha1
2,524,471 UART: [kat] SHA2-256
2,527,495 UART: [kat] SHA2-384
2,534,347 UART: [kat] SHA2-512-ACC
2,537,291 UART: [kat] ECC-384
4,997,039 UART: [kat] HMAC-384Kdf
5,019,435 UART: [kat] LMS
5,548,896 UART: [kat] --
5,552,413 UART: [cold-reset] ++
5,554,077 UART: [fht] FHT @ 0x50003400
5,564,518 UART: [idev] ++
5,565,090 UART: [idev] CDI.KEYID = 6
5,566,018 UART: [idev] SUBJECT.KEYID = 7
5,567,184 UART: [idev] UDS.KEYID = 0
5,569,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,713,576 UART: [idev] Erasing UDS.KEYID = 0
8,072,950 UART: [idev] Sha1 KeyId Algorithm
8,095,345 UART: [idev] --
8,098,898 UART: [ldev] ++
8,099,480 UART: [ldev] CDI.KEYID = 6
8,100,374 UART: [ldev] SUBJECT.KEYID = 5
8,101,480 UART: [ldev] AUTHORITY.KEYID = 7
8,102,828 UART: [ldev] FE.KEYID = 1
8,148,124 UART: [ldev] Erasing FE.KEYID = 1
10,648,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,367,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,383,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,399,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,414,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,433,735 UART: [ldev] --
12,438,945 UART: [fwproc] Wait for Commands...
12,440,777 UART: [fwproc] Recv command 0x46574c44
12,442,875 UART: [fwproc] Recv'd Img size: 114448 bytes
15,839,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,910,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,978,873 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,296,646 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,486 writing to cptra_bootfsm_go
3,381,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,628,129 >>> mbox cmd response: failed
13,628,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,628,941 >>> mbox cmd response: failed
13,629,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,629,508 >>> mbox cmd response: failed
Initializing fuses
2,060,825 writing to cptra_bootfsm_go
5,430,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,131,922 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,477 UART:
192,848 UART: Running Caliptra ROM ...
193,963 UART:
603,765 UART: [state] CFI Enabled
612,993 UART: [state] LifecycleState = Unprovisioned
614,899 UART: [state] DebugLocked = No
616,085 UART: [state] WD Timer not started. Device not locked for debugging
619,806 UART: [kat] SHA2-256
798,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
810,507 UART: [kat] ++
811,002 UART: [kat] sha1
823,189 UART: [kat] SHA2-256
826,188 UART: [kat] SHA2-384
831,798 UART: [kat] SHA2-512-ACC
834,738 UART: [kat] ECC-384
3,279,124 UART: [kat] HMAC-384Kdf
3,290,384 UART: [kat] LMS
3,819,869 UART: [kat] --
3,825,541 UART: [cold-reset] ++
3,827,909 UART: [fht] FHT @ 0x50003400
3,839,265 UART: [idev] ++
3,839,842 UART: [idev] CDI.KEYID = 6
3,840,752 UART: [idev] SUBJECT.KEYID = 7
3,841,968 UART: [idev] UDS.KEYID = 0
3,844,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,834 UART: [idev] Erasing UDS.KEYID = 0
6,312,852 UART: [idev] Sha1 KeyId Algorithm
6,336,133 UART: [idev] --
6,340,605 UART: [ldev] ++
6,341,179 UART: [ldev] CDI.KEYID = 6
6,342,091 UART: [ldev] SUBJECT.KEYID = 5
6,343,311 UART: [ldev] AUTHORITY.KEYID = 7
6,344,545 UART: [ldev] FE.KEYID = 1
6,353,625 UART: [ldev] Erasing FE.KEYID = 1
8,824,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,672 UART: [ldev] --
10,618,480 UART: [fwproc] Wait for Commands...
10,621,061 UART: [fwproc] Recv command 0x46574c44
10,623,105 UART: [fwproc] Recv'd Img size: 114448 bytes
14,020,089 UART: ROM Fatal Error: 0x000B0029
14,023,204 >>> mbox cmd response: failed
14,023,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,023,876 >>> mbox cmd response: failed
14,024,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,024,549 >>> mbox cmd response: failed
Initializing fuses
2,057,801 writing to cptra_bootfsm_go
2,247,123 UART:
2,247,469 UART: Running Caliptra ROM ...
2,248,614 UART:
6,430,469 UART: [state] CFI Enabled
6,443,152 UART: [state] LifecycleState = Unprovisioned
6,445,013 UART: [state] DebugLocked = No
6,446,410 UART: [state] WD Timer not started. Device not locked for debugging
6,450,556 UART: [kat] SHA2-256
6,629,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,641,276 UART: [kat] ++
6,641,771 UART: [kat] sha1
6,653,688 UART: [kat] SHA2-256
6,656,762 UART: [kat] SHA2-384
6,662,538 UART: [kat] SHA2-512-ACC
6,665,480 UART: [kat] ECC-384
9,108,093 UART: [kat] HMAC-384Kdf
9,121,406 UART: [kat] LMS
9,650,907 UART: [kat] --
9,656,310 UART: [cold-reset] ++
9,657,436 UART: [fht] FHT @ 0x50003400
9,668,129 UART: [idev] ++
9,668,769 UART: [idev] CDI.KEYID = 6
9,669,692 UART: [idev] SUBJECT.KEYID = 7
9,670,881 UART: [idev] UDS.KEYID = 0
9,673,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,816,839 UART: [idev] Erasing UDS.KEYID = 0
12,143,462 UART: [idev] Sha1 KeyId Algorithm
12,166,367 UART: [idev] --
12,170,283 UART: [ldev] ++
12,170,860 UART: [ldev] CDI.KEYID = 6
12,171,746 UART: [ldev] SUBJECT.KEYID = 5
12,172,960 UART: [ldev] AUTHORITY.KEYID = 7
12,174,191 UART: [ldev] FE.KEYID = 1
12,187,162 UART: [ldev] Erasing FE.KEYID = 1
14,659,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,375,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,391,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,407,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,422,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,443,419 UART: [ldev] --
16,447,827 UART: [fwproc] Wait for Commands...
16,450,196 UART: [fwproc] Recv command 0x46574c44
16,452,292 UART: [fwproc] Recv'd Img size: 114448 bytes
19,864,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,944,111 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,012,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,331,394 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,701,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,827,605 >>> mbox cmd response: failed
13,828,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,828,507 >>> mbox cmd response: failed
13,828,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,829,074 >>> mbox cmd response: failed
Initializing fuses
2,058,026 writing to cptra_bootfsm_go
9,737,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,319,120 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,441,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,348 >>> mbox cmd response: failed
14,274,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,275,256 >>> mbox cmd response: failed
14,275,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,275,818 >>> mbox cmd response: failed
Initializing fuses
2,062,220 writing to cptra_bootfsm_go
5,502,401 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,799,053 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,751,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,478,171 >>> mbox cmd response: failed
14,478,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,479,183 >>> mbox cmd response: failed
14,479,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,479,752 >>> mbox cmd response: failed
Initializing fuses
2,056,308 writing to cptra_bootfsm_go
9,134,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,340,239 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,536 UART: [state] LifecycleState = Unprovisioned
86,191 UART: [state] DebugLocked = No
86,851 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,325 UART: [kat] SHA2-256
882,256 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,371 UART: [kat] ++
886,523 UART: [kat] sha1
890,867 UART: [kat] SHA2-256
892,805 UART: [kat] SHA2-384
895,582 UART: [kat] SHA2-512-ACC
897,483 UART: [kat] ECC-384
902,936 UART: [kat] HMAC-384Kdf
907,498 UART: [kat] LMS
1,475,694 UART: [kat] --
1,476,669 UART: [cold-reset] ++
1,477,207 UART: [fht] Storing FHT @ 0x50003400
1,480,034 UART: [idev] ++
1,480,202 UART: [idev] CDI.KEYID = 6
1,480,562 UART: [idev] SUBJECT.KEYID = 7
1,480,986 UART: [idev] UDS.KEYID = 0
1,481,331 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,022 UART: [idev] Erasing UDS.KEYID = 0
1,505,504 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,294 UART: [idev] --
1,515,455 UART: [ldev] ++
1,515,623 UART: [ldev] CDI.KEYID = 6
1,515,986 UART: [ldev] SUBJECT.KEYID = 5
1,516,412 UART: [ldev] AUTHORITY.KEYID = 7
1,516,875 UART: [ldev] FE.KEYID = 1
1,522,197 UART: [ldev] Erasing FE.KEYID = 1
1,547,518 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,520 UART: [ldev] --
1,586,847 UART: [fwproc] Waiting for Commands...
1,587,508 UART: [fwproc] Received command 0x46574c44
1,588,299 UART: [fwproc] Received Image of size 114448 bytes
2,885,808 UART: ROM Fatal Error: 0x000B0029
2,886,965 >>> mbox cmd response: failed
2,886,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,971 >>> mbox cmd response: failed
2,886,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,463 UART: [kat] SHA2-256
882,394 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,509 UART: [kat] ++
886,661 UART: [kat] sha1
890,787 UART: [kat] SHA2-256
892,725 UART: [kat] SHA2-384
895,458 UART: [kat] SHA2-512-ACC
897,359 UART: [kat] ECC-384
902,746 UART: [kat] HMAC-384Kdf
907,196 UART: [kat] LMS
1,475,392 UART: [kat] --
1,476,449 UART: [cold-reset] ++
1,476,841 UART: [fht] Storing FHT @ 0x50003400
1,479,470 UART: [idev] ++
1,479,638 UART: [idev] CDI.KEYID = 6
1,479,998 UART: [idev] SUBJECT.KEYID = 7
1,480,422 UART: [idev] UDS.KEYID = 0
1,480,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,612 UART: [idev] Erasing UDS.KEYID = 0
1,504,956 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,658 UART: [idev] --
1,514,879 UART: [ldev] ++
1,515,047 UART: [ldev] CDI.KEYID = 6
1,515,410 UART: [ldev] SUBJECT.KEYID = 5
1,515,836 UART: [ldev] AUTHORITY.KEYID = 7
1,516,299 UART: [ldev] FE.KEYID = 1
1,521,451 UART: [ldev] Erasing FE.KEYID = 1
1,546,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,238 UART: [ldev] --
1,585,707 UART: [fwproc] Waiting for Commands...
1,586,434 UART: [fwproc] Received command 0x46574c44
1,587,225 UART: [fwproc] Received Image of size 114448 bytes
2,885,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,181 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,533 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,514 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,739,314 >>> mbox cmd response: failed
2,739,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,320 >>> mbox cmd response: failed
2,739,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,033 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,744 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,198 UART: [kat] SHA2-256
882,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,244 UART: [kat] ++
886,396 UART: [kat] sha1
890,540 UART: [kat] SHA2-256
892,478 UART: [kat] SHA2-384
895,171 UART: [kat] SHA2-512-ACC
897,072 UART: [kat] ECC-384
902,631 UART: [kat] HMAC-384Kdf
907,175 UART: [kat] LMS
1,475,371 UART: [kat] --
1,476,112 UART: [cold-reset] ++
1,476,602 UART: [fht] Storing FHT @ 0x50003400
1,479,491 UART: [idev] ++
1,479,659 UART: [idev] CDI.KEYID = 6
1,480,019 UART: [idev] SUBJECT.KEYID = 7
1,480,443 UART: [idev] UDS.KEYID = 0
1,480,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,597 UART: [idev] Erasing UDS.KEYID = 0
1,505,181 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,943 UART: [idev] --
1,515,024 UART: [ldev] ++
1,515,192 UART: [ldev] CDI.KEYID = 6
1,515,555 UART: [ldev] SUBJECT.KEYID = 5
1,515,981 UART: [ldev] AUTHORITY.KEYID = 7
1,516,444 UART: [ldev] FE.KEYID = 1
1,521,490 UART: [ldev] Erasing FE.KEYID = 1
1,546,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,157 UART: [ldev] --
1,585,634 UART: [fwproc] Waiting for Commands...
1,586,295 UART: [fwproc] Received command 0x46574c44
1,587,086 UART: [fwproc] Received Image of size 114448 bytes
2,885,455 UART: ROM Fatal Error: 0x000B0029
2,886,612 >>> mbox cmd response: failed
2,886,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,618 >>> mbox cmd response: failed
2,886,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
87,000 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,504 UART: [kat] SHA2-256
882,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,550 UART: [kat] ++
886,702 UART: [kat] sha1
891,174 UART: [kat] SHA2-256
893,112 UART: [kat] SHA2-384
895,743 UART: [kat] SHA2-512-ACC
897,644 UART: [kat] ECC-384
903,601 UART: [kat] HMAC-384Kdf
908,113 UART: [kat] LMS
1,476,309 UART: [kat] --
1,477,098 UART: [cold-reset] ++
1,477,592 UART: [fht] Storing FHT @ 0x50003400
1,480,481 UART: [idev] ++
1,480,649 UART: [idev] CDI.KEYID = 6
1,481,009 UART: [idev] SUBJECT.KEYID = 7
1,481,433 UART: [idev] UDS.KEYID = 0
1,481,778 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,645 UART: [idev] Erasing UDS.KEYID = 0
1,505,989 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,487 UART: [idev] --
1,515,570 UART: [ldev] ++
1,515,738 UART: [ldev] CDI.KEYID = 6
1,516,101 UART: [ldev] SUBJECT.KEYID = 5
1,516,527 UART: [ldev] AUTHORITY.KEYID = 7
1,516,990 UART: [ldev] FE.KEYID = 1
1,522,216 UART: [ldev] Erasing FE.KEYID = 1
1,548,299 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,257 UART: [ldev] --
1,587,572 UART: [fwproc] Waiting for Commands...
1,588,399 UART: [fwproc] Received command 0x46574c44
1,589,190 UART: [fwproc] Received Image of size 114448 bytes
2,888,810 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,606 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,958 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,897 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,740,603 >>> mbox cmd response: failed
2,740,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,609 >>> mbox cmd response: failed
2,740,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,615 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,348 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,897 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
893,460 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,585 UART: [kat] ++
897,737 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,746 UART: [kat] SHA2-512-ACC
908,647 UART: [kat] ECC-384
918,772 UART: [kat] HMAC-384Kdf
923,414 UART: [kat] LMS
1,171,742 UART: [kat] --
1,172,849 UART: [cold-reset] ++
1,173,289 UART: [fht] FHT @ 0x50003400
1,175,860 UART: [idev] ++
1,176,028 UART: [idev] CDI.KEYID = 6
1,176,388 UART: [idev] SUBJECT.KEYID = 7
1,176,812 UART: [idev] UDS.KEYID = 0
1,177,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,492 UART: [idev] Erasing UDS.KEYID = 0
1,201,489 UART: [idev] Sha1 KeyId Algorithm
1,209,991 UART: [idev] --
1,210,965 UART: [ldev] ++
1,211,133 UART: [ldev] CDI.KEYID = 6
1,211,496 UART: [ldev] SUBJECT.KEYID = 5
1,211,922 UART: [ldev] AUTHORITY.KEYID = 7
1,212,385 UART: [ldev] FE.KEYID = 1
1,217,351 UART: [ldev] Erasing FE.KEYID = 1
1,242,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,281,838 UART: [fwproc] Wait for Commands...
1,282,624 UART: [fwproc] Recv command 0x46574c44
1,283,352 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,315 UART: ROM Fatal Error: 0x000B0029
2,583,472 >>> mbox cmd response: failed
2,583,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,478 >>> mbox cmd response: failed
2,583,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
893,438 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,563 UART: [kat] ++
897,715 UART: [kat] sha1
902,063 UART: [kat] SHA2-256
904,003 UART: [kat] SHA2-384
906,728 UART: [kat] SHA2-512-ACC
908,629 UART: [kat] ECC-384
918,310 UART: [kat] HMAC-384Kdf
922,900 UART: [kat] LMS
1,171,228 UART: [kat] --
1,172,203 UART: [cold-reset] ++
1,172,681 UART: [fht] FHT @ 0x50003400
1,175,528 UART: [idev] ++
1,175,696 UART: [idev] CDI.KEYID = 6
1,176,056 UART: [idev] SUBJECT.KEYID = 7
1,176,480 UART: [idev] UDS.KEYID = 0
1,176,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,666 UART: [idev] Erasing UDS.KEYID = 0
1,201,669 UART: [idev] Sha1 KeyId Algorithm
1,209,997 UART: [idev] --
1,211,123 UART: [ldev] ++
1,211,291 UART: [ldev] CDI.KEYID = 6
1,211,654 UART: [ldev] SUBJECT.KEYID = 5
1,212,080 UART: [ldev] AUTHORITY.KEYID = 7
1,212,543 UART: [ldev] FE.KEYID = 1
1,217,197 UART: [ldev] Erasing FE.KEYID = 1
1,243,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,479 UART: [ldev] --
1,282,762 UART: [fwproc] Wait for Commands...
1,283,372 UART: [fwproc] Recv command 0x46574c44
1,284,100 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,739 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,567 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,437,907 >>> mbox cmd response: failed
2,437,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,913 >>> mbox cmd response: failed
2,437,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,995 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,350 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,006 UART: [kat] SHA2-256
903,946 UART: [kat] SHA2-384
906,761 UART: [kat] SHA2-512-ACC
908,662 UART: [kat] ECC-384
917,913 UART: [kat] HMAC-384Kdf
922,671 UART: [kat] LMS
1,170,999 UART: [kat] --
1,172,084 UART: [cold-reset] ++
1,172,628 UART: [fht] FHT @ 0x50003400
1,175,147 UART: [idev] ++
1,175,315 UART: [idev] CDI.KEYID = 6
1,175,675 UART: [idev] SUBJECT.KEYID = 7
1,176,099 UART: [idev] UDS.KEYID = 0
1,176,444 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,937 UART: [idev] Erasing UDS.KEYID = 0
1,200,866 UART: [idev] Sha1 KeyId Algorithm
1,209,276 UART: [idev] --
1,210,292 UART: [ldev] ++
1,210,460 UART: [ldev] CDI.KEYID = 6
1,210,823 UART: [ldev] SUBJECT.KEYID = 5
1,211,249 UART: [ldev] AUTHORITY.KEYID = 7
1,211,712 UART: [ldev] FE.KEYID = 1
1,217,034 UART: [ldev] Erasing FE.KEYID = 1
1,243,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,850 UART: [ldev] --
1,283,235 UART: [fwproc] Wait for Commands...
1,284,027 UART: [fwproc] Recv command 0x46574c44
1,284,755 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,720 UART: ROM Fatal Error: 0x000B0029
2,583,877 >>> mbox cmd response: failed
2,583,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,883 >>> mbox cmd response: failed
2,583,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,899 UART: [state] LifecycleState = Unprovisioned
86,554 UART: [state] DebugLocked = No
87,052 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
893,899 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,024 UART: [kat] ++
898,176 UART: [kat] sha1
902,548 UART: [kat] SHA2-256
904,488 UART: [kat] SHA2-384
907,345 UART: [kat] SHA2-512-ACC
909,246 UART: [kat] ECC-384
919,175 UART: [kat] HMAC-384Kdf
923,749 UART: [kat] LMS
1,172,077 UART: [kat] --
1,172,704 UART: [cold-reset] ++
1,173,138 UART: [fht] FHT @ 0x50003400
1,175,717 UART: [idev] ++
1,175,885 UART: [idev] CDI.KEYID = 6
1,176,245 UART: [idev] SUBJECT.KEYID = 7
1,176,669 UART: [idev] UDS.KEYID = 0
1,177,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,995 UART: [idev] Erasing UDS.KEYID = 0
1,202,692 UART: [idev] Sha1 KeyId Algorithm
1,211,052 UART: [idev] --
1,211,978 UART: [ldev] ++
1,212,146 UART: [ldev] CDI.KEYID = 6
1,212,509 UART: [ldev] SUBJECT.KEYID = 5
1,212,935 UART: [ldev] AUTHORITY.KEYID = 7
1,213,398 UART: [ldev] FE.KEYID = 1
1,218,148 UART: [ldev] Erasing FE.KEYID = 1
1,244,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,130 UART: [ldev] --
1,283,487 UART: [fwproc] Wait for Commands...
1,284,275 UART: [fwproc] Recv command 0x46574c44
1,285,003 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,363 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,322 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,440,128 >>> mbox cmd response: failed
2,440,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,440,134 >>> mbox cmd response: failed
2,440,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,440,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,424 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,427 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,385 UART: [kat] SHA2-256
901,325 UART: [kat] SHA2-384
903,922 UART: [kat] SHA2-512-ACC
905,823 UART: [kat] ECC-384
915,344 UART: [kat] HMAC-384Kdf
919,940 UART: [kat] LMS
1,168,252 UART: [kat] --
1,169,197 UART: [cold-reset] ++
1,169,761 UART: [fht] FHT @ 0x50003400
1,172,399 UART: [idev] ++
1,172,567 UART: [idev] CDI.KEYID = 6
1,172,928 UART: [idev] SUBJECT.KEYID = 7
1,173,353 UART: [idev] UDS.KEYID = 0
1,173,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,479 UART: [idev] Erasing UDS.KEYID = 0
1,198,717 UART: [idev] Sha1 KeyId Algorithm
1,207,399 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,836 UART: [ldev] Erasing FE.KEYID = 1
1,241,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,720 UART: [ldev] --
1,281,056 UART: [fwproc] Wait for Commands...
1,281,749 UART: [fwproc] Recv command 0x46574c44
1,282,482 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,811 UART: ROM Fatal Error: 0x000B0029
2,580,968 >>> mbox cmd response: failed
2,580,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,974 >>> mbox cmd response: failed
2,580,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,980 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
916,250 UART: [kat] HMAC-384Kdf
920,922 UART: [kat] LMS
1,169,234 UART: [kat] --
1,170,275 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,195 UART: [idev] ++
1,173,363 UART: [idev] CDI.KEYID = 6
1,173,724 UART: [idev] SUBJECT.KEYID = 7
1,174,149 UART: [idev] UDS.KEYID = 0
1,174,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,639 UART: [idev] --
1,208,828 UART: [ldev] ++
1,208,996 UART: [ldev] CDI.KEYID = 6
1,209,360 UART: [ldev] SUBJECT.KEYID = 5
1,209,787 UART: [ldev] AUTHORITY.KEYID = 7
1,210,250 UART: [ldev] FE.KEYID = 1
1,215,338 UART: [ldev] Erasing FE.KEYID = 1
1,241,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,652 UART: [ldev] --
1,281,100 UART: [fwproc] Wait for Commands...
1,281,793 UART: [fwproc] Recv command 0x46574c44
1,282,526 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,801 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,444 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,432,595 >>> mbox cmd response: failed
2,432,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,601 >>> mbox cmd response: failed
2,432,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,607 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,225 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
900,330 UART: [kat] SHA2-256
902,270 UART: [kat] SHA2-384
905,157 UART: [kat] SHA2-512-ACC
907,058 UART: [kat] ECC-384
917,121 UART: [kat] HMAC-384Kdf
921,773 UART: [kat] LMS
1,170,085 UART: [kat] --
1,170,898 UART: [cold-reset] ++
1,171,312 UART: [fht] FHT @ 0x50003400
1,174,156 UART: [idev] ++
1,174,324 UART: [idev] CDI.KEYID = 6
1,174,685 UART: [idev] SUBJECT.KEYID = 7
1,175,110 UART: [idev] UDS.KEYID = 0
1,175,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,164 UART: [idev] Erasing UDS.KEYID = 0
1,200,098 UART: [idev] Sha1 KeyId Algorithm
1,209,100 UART: [idev] --
1,210,241 UART: [ldev] ++
1,210,409 UART: [ldev] CDI.KEYID = 6
1,210,773 UART: [ldev] SUBJECT.KEYID = 5
1,211,200 UART: [ldev] AUTHORITY.KEYID = 7
1,211,663 UART: [ldev] FE.KEYID = 1
1,217,063 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,783 UART: [ldev] --
1,282,141 UART: [fwproc] Wait for Commands...
1,282,860 UART: [fwproc] Recv command 0x46574c44
1,283,593 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,682 UART: ROM Fatal Error: 0x000B0029
2,581,839 >>> mbox cmd response: failed
2,581,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,845 >>> mbox cmd response: failed
2,581,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
915,819 UART: [kat] HMAC-384Kdf
920,431 UART: [kat] LMS
1,168,743 UART: [kat] --
1,169,770 UART: [cold-reset] ++
1,170,112 UART: [fht] FHT @ 0x50003400
1,173,008 UART: [idev] ++
1,173,176 UART: [idev] CDI.KEYID = 6
1,173,537 UART: [idev] SUBJECT.KEYID = 7
1,173,962 UART: [idev] UDS.KEYID = 0
1,174,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,852 UART: [idev] Erasing UDS.KEYID = 0
1,199,124 UART: [idev] Sha1 KeyId Algorithm
1,208,104 UART: [idev] --
1,209,139 UART: [ldev] ++
1,209,307 UART: [ldev] CDI.KEYID = 6
1,209,671 UART: [ldev] SUBJECT.KEYID = 5
1,210,098 UART: [ldev] AUTHORITY.KEYID = 7
1,210,561 UART: [ldev] FE.KEYID = 1
1,215,599 UART: [ldev] Erasing FE.KEYID = 1
1,242,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,473 UART: [ldev] --
1,281,981 UART: [fwproc] Wait for Commands...
1,282,760 UART: [fwproc] Recv command 0x46574c44
1,283,493 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,478 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,434,084 >>> mbox cmd response: failed
2,434,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,090 >>> mbox cmd response: failed
2,434,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,380 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,139 UART:
192,499 UART: Running Caliptra ROM ...
193,593 UART:
193,737 UART: [state] CFI Enabled
265,576 UART: [state] LifecycleState = Unprovisioned
267,503 UART: [state] DebugLocked = No
269,018 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,067 UART: [kat] SHA2-256
443,751 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,267 UART: [kat] ++
454,754 UART: [kat] sha1
465,904 UART: [kat] SHA2-256
468,591 UART: [kat] SHA2-384
474,296 UART: [kat] SHA2-512-ACC
476,692 UART: [kat] ECC-384
2,765,496 UART: [kat] HMAC-384Kdf
2,798,605 UART: [kat] LMS
3,988,882 UART: [kat] --
3,993,870 UART: [cold-reset] ++
3,995,750 UART: [fht] Storing FHT @ 0x50003400
4,007,825 UART: [idev] ++
4,008,393 UART: [idev] CDI.KEYID = 6
4,009,279 UART: [idev] SUBJECT.KEYID = 7
4,010,553 UART: [idev] UDS.KEYID = 0
4,013,074 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,915 UART: [idev] Erasing UDS.KEYID = 0
7,343,357 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,883 UART: [idev] --
7,367,933 UART: [ldev] ++
7,368,501 UART: [ldev] CDI.KEYID = 6
7,369,469 UART: [ldev] SUBJECT.KEYID = 5
7,370,685 UART: [ldev] AUTHORITY.KEYID = 7
7,371,975 UART: [ldev] FE.KEYID = 1
7,400,175 UART: [ldev] Erasing FE.KEYID = 1
10,733,146 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,471 UART: [ldev] --
13,113,614 UART: [fwproc] Waiting for Commands...
13,116,605 UART: [fwproc] Received command 0x46574c44
13,118,802 UART: [fwproc] Received Image of size 114124 bytes
15,826,231 UART: ROM Fatal Error: 0x000B003F
15,829,736 >>> mbox cmd response: failed
15,830,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,830,487 >>> mbox cmd response: failed
15,830,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,831,049 >>> mbox cmd response: failed
Initializing fuses
2,054,847 writing to cptra_bootfsm_go
2,244,098 UART:
2,244,450 UART: Running Caliptra ROM ...
2,245,497 UART:
2,245,648 UART: [state] CFI Enabled
2,308,839 UART: [state] LifecycleState = Unprovisioned
2,310,785 UART: [state] DebugLocked = No
2,312,250 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,260 UART: [kat] SHA2-256
2,486,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,498 UART: [kat] ++
2,497,957 UART: [kat] sha1
2,508,307 UART: [kat] SHA2-256
2,511,016 UART: [kat] SHA2-384
2,516,311 UART: [kat] SHA2-512-ACC
2,518,717 UART: [kat] ECC-384
4,812,762 UART: [kat] HMAC-384Kdf
4,843,250 UART: [kat] LMS
6,033,522 UART: [kat] --
6,038,171 UART: [cold-reset] ++
6,039,835 UART: [fht] Storing FHT @ 0x50003400
6,051,884 UART: [idev] ++
6,052,463 UART: [idev] CDI.KEYID = 6
6,053,404 UART: [idev] SUBJECT.KEYID = 7
6,054,674 UART: [idev] UDS.KEYID = 0
6,056,910 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,200,961 UART: [idev] Erasing UDS.KEYID = 0
9,383,137 UART: [idev] Using Sha1 for KeyId Algorithm
9,405,863 UART: [idev] --
9,411,102 UART: [ldev] ++
9,411,677 UART: [ldev] CDI.KEYID = 6
9,412,643 UART: [ldev] SUBJECT.KEYID = 5
9,413,899 UART: [ldev] AUTHORITY.KEYID = 7
9,415,137 UART: [ldev] FE.KEYID = 1
9,458,577 UART: [ldev] Erasing FE.KEYID = 1
12,790,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,084,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,098,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,113,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,128,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,146,881 UART: [ldev] --
15,150,906 UART: [fwproc] Waiting for Commands...
15,153,813 UART: [fwproc] Received command 0x46574c44
15,156,010 UART: [fwproc] Received Image of size 114124 bytes
19,204,163 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,279,603 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,348,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,665,147 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,807,212 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,575,601 >>> mbox cmd response: failed
15,576,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,576,461 >>> mbox cmd response: failed
15,576,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,577,032 >>> mbox cmd response: failed
Initializing fuses
2,054,558 writing to cptra_bootfsm_go
5,833,773 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,879,177 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,595 UART:
192,956 UART: Running Caliptra ROM ...
194,104 UART:
603,859 UART: [state] CFI Enabled
616,205 UART: [state] LifecycleState = Unprovisioned
618,131 UART: [state] DebugLocked = No
620,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,929 UART: [kat] SHA2-256
794,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,258 UART: [kat] ++
805,792 UART: [kat] sha1
816,571 UART: [kat] SHA2-256
819,254 UART: [kat] SHA2-384
826,146 UART: [kat] SHA2-512-ACC
828,538 UART: [kat] ECC-384
3,113,585 UART: [kat] HMAC-384Kdf
3,124,900 UART: [kat] LMS
4,315,034 UART: [kat] --
4,320,174 UART: [cold-reset] ++
4,321,460 UART: [fht] Storing FHT @ 0x50003400
4,332,181 UART: [idev] ++
4,332,745 UART: [idev] CDI.KEYID = 6
4,333,758 UART: [idev] SUBJECT.KEYID = 7
4,334,970 UART: [idev] UDS.KEYID = 0
4,337,502 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,338 UART: [idev] Erasing UDS.KEYID = 0
7,620,925 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,009 UART: [idev] --
7,645,492 UART: [ldev] ++
7,646,071 UART: [ldev] CDI.KEYID = 6
7,647,094 UART: [ldev] SUBJECT.KEYID = 5
7,648,275 UART: [ldev] AUTHORITY.KEYID = 7
7,649,512 UART: [ldev] FE.KEYID = 1
7,660,441 UART: [ldev] Erasing FE.KEYID = 1
10,951,973 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,066 UART: [ldev] --
13,314,533 UART: [fwproc] Waiting for Commands...
13,316,260 UART: [fwproc] Received command 0x46574c44
13,318,448 UART: [fwproc] Received Image of size 114124 bytes
16,024,819 UART: ROM Fatal Error: 0x000B003F
16,028,320 >>> mbox cmd response: failed
16,028,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,220 >>> mbox cmd response: failed
16,029,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,850 >>> mbox cmd response: failed
Initializing fuses
2,060,007 writing to cptra_bootfsm_go
2,249,339 UART:
2,249,687 UART: Running Caliptra ROM ...
2,250,824 UART:
4,428,869 UART: [state] CFI Enabled
4,441,338 UART: [state] LifecycleState = Unprovisioned
4,443,260 UART: [state] DebugLocked = No
4,445,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,449,877 UART: [kat] SHA2-256
4,619,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,630,194 UART: [kat] ++
4,630,755 UART: [kat] sha1
4,641,579 UART: [kat] SHA2-256
4,644,251 UART: [kat] SHA2-384
4,650,194 UART: [kat] SHA2-512-ACC
4,652,599 UART: [kat] ECC-384
6,936,697 UART: [kat] HMAC-384Kdf
6,948,981 UART: [kat] LMS
8,139,108 UART: [kat] --
8,142,580 UART: [cold-reset] ++
8,143,605 UART: [fht] Storing FHT @ 0x50003400
8,154,121 UART: [idev] ++
8,154,687 UART: [idev] CDI.KEYID = 6
8,155,704 UART: [idev] SUBJECT.KEYID = 7
8,156,862 UART: [idev] UDS.KEYID = 0
8,159,152 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,302,418 UART: [idev] Erasing UDS.KEYID = 0
11,443,904 UART: [idev] Using Sha1 for KeyId Algorithm
11,466,999 UART: [idev] --
11,470,350 UART: [ldev] ++
11,470,916 UART: [ldev] CDI.KEYID = 6
11,471,931 UART: [ldev] SUBJECT.KEYID = 5
11,473,122 UART: [ldev] AUTHORITY.KEYID = 7
11,474,356 UART: [ldev] FE.KEYID = 1
11,485,776 UART: [ldev] Erasing FE.KEYID = 1
14,775,365 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,066,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,080,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,095,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,110,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,129,252 UART: [ldev] --
17,133,178 UART: [fwproc] Waiting for Commands...
17,134,957 UART: [fwproc] Received command 0x46574c44
17,137,164 UART: [fwproc] Received Image of size 114124 bytes
21,190,323 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,265,681 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,334,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,651,701 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
4,134,922 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,761,080 >>> mbox cmd response: failed
15,761,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,761,987 >>> mbox cmd response: failed
15,762,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,762,555 >>> mbox cmd response: failed
Initializing fuses
2,062,539 writing to cptra_bootfsm_go
8,229,296 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,169,353 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,257 UART:
192,632 UART: Running Caliptra ROM ...
193,786 UART:
193,931 UART: [state] CFI Enabled
262,599 UART: [state] LifecycleState = Unprovisioned
264,472 UART: [state] DebugLocked = No
266,408 UART: [state] WD Timer not started. Device not locked for debugging
270,662 UART: [kat] SHA2-256
449,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,398 UART: [kat] ++
461,883 UART: [kat] sha1
472,274 UART: [kat] SHA2-256
475,293 UART: [kat] SHA2-384
482,409 UART: [kat] SHA2-512-ACC
485,345 UART: [kat] ECC-384
2,947,439 UART: [kat] HMAC-384Kdf
2,970,308 UART: [kat] LMS
3,499,770 UART: [kat] --
3,503,337 UART: [cold-reset] ++
3,504,189 UART: [fht] FHT @ 0x50003400
3,515,061 UART: [idev] ++
3,515,629 UART: [idev] CDI.KEYID = 6
3,516,564 UART: [idev] SUBJECT.KEYID = 7
3,517,779 UART: [idev] UDS.KEYID = 0
3,520,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,108 UART: [idev] Erasing UDS.KEYID = 0
6,028,318 UART: [idev] Sha1 KeyId Algorithm
6,052,371 UART: [idev] --
6,055,268 UART: [ldev] ++
6,055,852 UART: [ldev] CDI.KEYID = 6
6,056,766 UART: [ldev] SUBJECT.KEYID = 5
6,057,931 UART: [ldev] AUTHORITY.KEYID = 7
6,059,166 UART: [ldev] FE.KEYID = 1
6,098,282 UART: [ldev] Erasing FE.KEYID = 1
8,605,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,816 UART: [ldev] --
10,411,650 UART: [fwproc] Wait for Commands...
10,414,726 UART: [fwproc] Recv command 0x46574c44
10,416,824 UART: [fwproc] Recv'd Img size: 114448 bytes
12,463,813 UART: ROM Fatal Error: 0x000B003F
12,466,948 >>> mbox cmd response: failed
12,467,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,467,704 >>> mbox cmd response: failed
12,467,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,468,257 >>> mbox cmd response: failed
Initializing fuses
2,054,591 writing to cptra_bootfsm_go
2,243,885 UART:
2,244,254 UART: Running Caliptra ROM ...
2,245,387 UART:
2,245,549 UART: [state] CFI Enabled
2,303,413 UART: [state] LifecycleState = Unprovisioned
2,305,294 UART: [state] DebugLocked = No
2,307,196 UART: [state] WD Timer not started. Device not locked for debugging
2,310,773 UART: [kat] SHA2-256
2,489,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,501,513 UART: [kat] ++
2,501,974 UART: [kat] sha1
2,511,832 UART: [kat] SHA2-256
2,514,898 UART: [kat] SHA2-384
2,521,323 UART: [kat] SHA2-512-ACC
2,524,268 UART: [kat] ECC-384
4,985,705 UART: [kat] HMAC-384Kdf
5,010,349 UART: [kat] LMS
5,539,779 UART: [kat] --
5,544,638 UART: [cold-reset] ++
5,545,595 UART: [fht] FHT @ 0x50003400
5,556,194 UART: [idev] ++
5,556,768 UART: [idev] CDI.KEYID = 6
5,557,738 UART: [idev] SUBJECT.KEYID = 7
5,558,896 UART: [idev] UDS.KEYID = 0
5,561,216 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,705,266 UART: [idev] Erasing UDS.KEYID = 0
8,066,376 UART: [idev] Sha1 KeyId Algorithm
8,089,614 UART: [idev] --
8,093,776 UART: [ldev] ++
8,094,361 UART: [ldev] CDI.KEYID = 6
8,095,284 UART: [ldev] SUBJECT.KEYID = 5
8,096,448 UART: [ldev] AUTHORITY.KEYID = 7
8,097,685 UART: [ldev] FE.KEYID = 1
8,138,446 UART: [ldev] Erasing FE.KEYID = 1
10,646,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,412,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,599 UART: [ldev] --
12,452,715 UART: [fwproc] Wait for Commands...
12,455,515 UART: [fwproc] Recv command 0x46574c44
12,457,614 UART: [fwproc] Recv'd Img size: 114448 bytes
15,863,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,936,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,005,338 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,323,133 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,386,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,257,355 >>> mbox cmd response: failed
12,257,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,258,295 >>> mbox cmd response: failed
12,258,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,258,870 >>> mbox cmd response: failed
Initializing fuses
2,053,784 writing to cptra_bootfsm_go
5,416,932 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,123,533 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,331 UART:
192,695 UART: Running Caliptra ROM ...
193,863 UART:
603,686 UART: [state] CFI Enabled
616,830 UART: [state] LifecycleState = Unprovisioned
618,718 UART: [state] DebugLocked = No
619,905 UART: [state] WD Timer not started. Device not locked for debugging
623,084 UART: [kat] SHA2-256
802,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,748 UART: [kat] ++
814,213 UART: [kat] sha1
824,603 UART: [kat] SHA2-256
827,607 UART: [kat] SHA2-384
833,241 UART: [kat] SHA2-512-ACC
836,187 UART: [kat] ECC-384
3,277,445 UART: [kat] HMAC-384Kdf
3,290,912 UART: [kat] LMS
3,820,425 UART: [kat] --
3,825,776 UART: [cold-reset] ++
3,827,385 UART: [fht] FHT @ 0x50003400
3,837,724 UART: [idev] ++
3,838,298 UART: [idev] CDI.KEYID = 6
3,839,183 UART: [idev] SUBJECT.KEYID = 7
3,840,397 UART: [idev] UDS.KEYID = 0
3,843,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,086 UART: [idev] Erasing UDS.KEYID = 0
6,312,043 UART: [idev] Sha1 KeyId Algorithm
6,333,671 UART: [idev] --
6,337,076 UART: [ldev] ++
6,337,656 UART: [ldev] CDI.KEYID = 6
6,338,729 UART: [ldev] SUBJECT.KEYID = 5
6,339,836 UART: [ldev] AUTHORITY.KEYID = 7
6,341,011 UART: [ldev] FE.KEYID = 1
6,353,372 UART: [ldev] Erasing FE.KEYID = 1
8,825,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,656 UART: [ldev] --
10,616,679 UART: [fwproc] Wait for Commands...
10,619,861 UART: [fwproc] Recv command 0x46574c44
10,621,980 UART: [fwproc] Recv'd Img size: 114448 bytes
12,676,124 UART: ROM Fatal Error: 0x000B003F
12,679,255 >>> mbox cmd response: failed
12,679,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,680,021 >>> mbox cmd response: failed
12,680,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,680,581 >>> mbox cmd response: failed
Initializing fuses
2,052,931 writing to cptra_bootfsm_go
2,242,259 UART:
2,242,623 UART: Running Caliptra ROM ...
2,243,756 UART:
7,777,541 UART: [state] CFI Enabled
7,791,903 UART: [state] LifecycleState = Unprovisioned
7,793,787 UART: [state] DebugLocked = No
7,796,634 UART: [state] WD Timer not started. Device not locked for debugging
7,799,465 UART: [kat] SHA2-256
7,978,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,990,160 UART: [kat] ++
7,990,619 UART: [kat] sha1
8,003,503 UART: [kat] SHA2-256
8,006,520 UART: [kat] SHA2-384
8,011,108 UART: [kat] SHA2-512-ACC
8,014,057 UART: [kat] ECC-384
10,454,097 UART: [kat] HMAC-384Kdf
10,467,285 UART: [kat] LMS
10,996,805 UART: [kat] --
11,000,910 UART: [cold-reset] ++
11,003,437 UART: [fht] FHT @ 0x50003400
11,014,042 UART: [idev] ++
11,014,638 UART: [idev] CDI.KEYID = 6
11,015,559 UART: [idev] SUBJECT.KEYID = 7
11,016,780 UART: [idev] UDS.KEYID = 0
11,019,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,162,875 UART: [idev] Erasing UDS.KEYID = 0
13,490,562 UART: [idev] Sha1 KeyId Algorithm
13,513,685 UART: [idev] --
13,517,544 UART: [ldev] ++
13,518,116 UART: [ldev] CDI.KEYID = 6
13,518,999 UART: [ldev] SUBJECT.KEYID = 5
13,520,212 UART: [ldev] AUTHORITY.KEYID = 7
13,521,443 UART: [ldev] FE.KEYID = 1
13,530,823 UART: [ldev] Erasing FE.KEYID = 1
16,001,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,722,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,738,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,754,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,770,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,790,901 UART: [ldev] --
17,795,572 UART: [fwproc] Wait for Commands...
17,797,130 UART: [fwproc] Recv command 0x46574c44
17,799,228 UART: [fwproc] Recv'd Img size: 114448 bytes
21,200,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,277,513 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,346,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,664,328 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,696,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,457,836 >>> mbox cmd response: failed
12,458,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,458,726 >>> mbox cmd response: failed
12,458,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,289 >>> mbox cmd response: failed
Initializing fuses
2,055,123 writing to cptra_bootfsm_go
11,103,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,681,400 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,440,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,291,937 >>> mbox cmd response: failed
12,292,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,292,846 >>> mbox cmd response: failed
12,293,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,293,410 >>> mbox cmd response: failed
Initializing fuses
2,055,321 writing to cptra_bootfsm_go
5,483,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,782,718 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,757,223 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,523,730 >>> mbox cmd response: failed
12,524,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,524,708 >>> mbox cmd response: failed
12,524,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,275 >>> mbox cmd response: failed
Initializing fuses
2,058,939 writing to cptra_bootfsm_go
11,099,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,301,639 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,751 UART: [kat] SHA2-256
881,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,797 UART: [kat] ++
885,949 UART: [kat] sha1
890,303 UART: [kat] SHA2-256
892,241 UART: [kat] SHA2-384
894,822 UART: [kat] SHA2-512-ACC
896,723 UART: [kat] ECC-384
902,410 UART: [kat] HMAC-384Kdf
907,032 UART: [kat] LMS
1,475,228 UART: [kat] --
1,475,901 UART: [cold-reset] ++
1,476,243 UART: [fht] Storing FHT @ 0x50003400
1,478,894 UART: [idev] ++
1,479,062 UART: [idev] CDI.KEYID = 6
1,479,422 UART: [idev] SUBJECT.KEYID = 7
1,479,846 UART: [idev] UDS.KEYID = 0
1,480,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,894 UART: [idev] Erasing UDS.KEYID = 0
1,504,214 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,748 UART: [idev] --
1,513,965 UART: [ldev] ++
1,514,133 UART: [ldev] CDI.KEYID = 6
1,514,496 UART: [ldev] SUBJECT.KEYID = 5
1,514,922 UART: [ldev] AUTHORITY.KEYID = 7
1,515,385 UART: [ldev] FE.KEYID = 1
1,520,497 UART: [ldev] Erasing FE.KEYID = 1
1,546,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,334 UART: [ldev] --
1,585,767 UART: [fwproc] Waiting for Commands...
1,586,584 UART: [fwproc] Received command 0x46574c44
1,587,375 UART: [fwproc] Received Image of size 114448 bytes
1,634,237 UART: ROM Fatal Error: 0x000B003F
1,635,396 >>> mbox cmd response: failed
1,635,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,402 >>> mbox cmd response: failed
1,635,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,895 UART: [kat] SHA2-256
881,826 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,941 UART: [kat] ++
886,093 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
895,038 UART: [kat] SHA2-512-ACC
896,939 UART: [kat] ECC-384
902,386 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,476,349 UART: [cold-reset] ++
1,476,725 UART: [fht] Storing FHT @ 0x50003400
1,479,370 UART: [idev] ++
1,479,538 UART: [idev] CDI.KEYID = 6
1,479,898 UART: [idev] SUBJECT.KEYID = 7
1,480,322 UART: [idev] UDS.KEYID = 0
1,480,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,190 UART: [idev] Erasing UDS.KEYID = 0
1,505,000 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,586 UART: [idev] --
1,514,671 UART: [ldev] ++
1,514,839 UART: [ldev] CDI.KEYID = 6
1,515,202 UART: [ldev] SUBJECT.KEYID = 5
1,515,628 UART: [ldev] AUTHORITY.KEYID = 7
1,516,091 UART: [ldev] FE.KEYID = 1
1,521,399 UART: [ldev] Erasing FE.KEYID = 1
1,546,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,924 UART: [ldev] --
1,586,347 UART: [fwproc] Waiting for Commands...
1,587,198 UART: [fwproc] Received command 0x46574c44
1,587,989 UART: [fwproc] Received Image of size 114448 bytes
2,887,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,365 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,717 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,688 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,121 >>> mbox cmd response: failed
1,488,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,127 >>> mbox cmd response: failed
1,488,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,133 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,236 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,324 UART: [kat] SHA2-256
892,262 UART: [kat] SHA2-384
895,089 UART: [kat] SHA2-512-ACC
896,990 UART: [kat] ECC-384
902,895 UART: [kat] HMAC-384Kdf
907,725 UART: [kat] LMS
1,475,921 UART: [kat] --
1,476,906 UART: [cold-reset] ++
1,477,254 UART: [fht] Storing FHT @ 0x50003400
1,480,053 UART: [idev] ++
1,480,221 UART: [idev] CDI.KEYID = 6
1,480,581 UART: [idev] SUBJECT.KEYID = 7
1,481,005 UART: [idev] UDS.KEYID = 0
1,481,350 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,089 UART: [idev] Erasing UDS.KEYID = 0
1,506,311 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,913 UART: [idev] --
1,515,876 UART: [ldev] ++
1,516,044 UART: [ldev] CDI.KEYID = 6
1,516,407 UART: [ldev] SUBJECT.KEYID = 5
1,516,833 UART: [ldev] AUTHORITY.KEYID = 7
1,517,296 UART: [ldev] FE.KEYID = 1
1,522,628 UART: [ldev] Erasing FE.KEYID = 1
1,548,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,193 UART: [ldev] --
1,587,596 UART: [fwproc] Waiting for Commands...
1,588,433 UART: [fwproc] Received command 0x46574c44
1,589,224 UART: [fwproc] Received Image of size 114448 bytes
1,637,316 UART: ROM Fatal Error: 0x000B003F
1,638,475 >>> mbox cmd response: failed
1,638,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,481 >>> mbox cmd response: failed
1,638,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,522 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,128 UART: [kat] SHA2-256
882,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,174 UART: [kat] ++
886,326 UART: [kat] sha1
890,508 UART: [kat] SHA2-256
892,446 UART: [kat] SHA2-384
895,121 UART: [kat] SHA2-512-ACC
897,022 UART: [kat] ECC-384
902,519 UART: [kat] HMAC-384Kdf
907,167 UART: [kat] LMS
1,475,363 UART: [kat] --
1,476,050 UART: [cold-reset] ++
1,476,406 UART: [fht] Storing FHT @ 0x50003400
1,479,231 UART: [idev] ++
1,479,399 UART: [idev] CDI.KEYID = 6
1,479,759 UART: [idev] SUBJECT.KEYID = 7
1,480,183 UART: [idev] UDS.KEYID = 0
1,480,528 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,415 UART: [idev] Erasing UDS.KEYID = 0
1,505,101 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,711 UART: [idev] --
1,514,750 UART: [ldev] ++
1,514,918 UART: [ldev] CDI.KEYID = 6
1,515,281 UART: [ldev] SUBJECT.KEYID = 5
1,515,707 UART: [ldev] AUTHORITY.KEYID = 7
1,516,170 UART: [ldev] FE.KEYID = 1
1,521,504 UART: [ldev] Erasing FE.KEYID = 1
1,546,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,307 UART: [ldev] --
1,585,754 UART: [fwproc] Waiting for Commands...
1,586,561 UART: [fwproc] Received command 0x46574c44
1,587,352 UART: [fwproc] Received Image of size 114448 bytes
2,885,164 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,702 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,143 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,576 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,036 >>> mbox cmd response: failed
1,490,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,042 >>> mbox cmd response: failed
1,490,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,048 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,011 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
893,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,673 UART: [kat] ++
897,825 UART: [kat] sha1
901,969 UART: [kat] SHA2-256
903,909 UART: [kat] SHA2-384
906,542 UART: [kat] SHA2-512-ACC
908,443 UART: [kat] ECC-384
918,530 UART: [kat] HMAC-384Kdf
923,104 UART: [kat] LMS
1,171,432 UART: [kat] --
1,172,359 UART: [cold-reset] ++
1,172,895 UART: [fht] FHT @ 0x50003400
1,175,536 UART: [idev] ++
1,175,704 UART: [idev] CDI.KEYID = 6
1,176,064 UART: [idev] SUBJECT.KEYID = 7
1,176,488 UART: [idev] UDS.KEYID = 0
1,176,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,462 UART: [idev] Erasing UDS.KEYID = 0
1,201,619 UART: [idev] Sha1 KeyId Algorithm
1,210,123 UART: [idev] --
1,211,193 UART: [ldev] ++
1,211,361 UART: [ldev] CDI.KEYID = 6
1,211,724 UART: [ldev] SUBJECT.KEYID = 5
1,212,150 UART: [ldev] AUTHORITY.KEYID = 7
1,212,613 UART: [ldev] FE.KEYID = 1
1,217,861 UART: [ldev] Erasing FE.KEYID = 1
1,243,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,357 UART: [ldev] --
1,282,674 UART: [fwproc] Wait for Commands...
1,283,290 UART: [fwproc] Recv command 0x46574c44
1,284,018 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,894 UART: ROM Fatal Error: 0x000B003F
1,332,053 >>> mbox cmd response: failed
1,332,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,059 >>> mbox cmd response: failed
1,332,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,892 UART: [state] LifecycleState = Unprovisioned
86,547 UART: [state] DebugLocked = No
87,073 UART: [state] WD Timer not started. Device not locked for debugging
88,406 UART: [kat] SHA2-256
894,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,181 UART: [kat] ++
898,333 UART: [kat] sha1
902,623 UART: [kat] SHA2-256
904,563 UART: [kat] SHA2-384
907,192 UART: [kat] SHA2-512-ACC
909,093 UART: [kat] ECC-384
918,844 UART: [kat] HMAC-384Kdf
923,328 UART: [kat] LMS
1,171,656 UART: [kat] --
1,172,495 UART: [cold-reset] ++
1,173,025 UART: [fht] FHT @ 0x50003400
1,175,582 UART: [idev] ++
1,175,750 UART: [idev] CDI.KEYID = 6
1,176,110 UART: [idev] SUBJECT.KEYID = 7
1,176,534 UART: [idev] UDS.KEYID = 0
1,176,879 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,338 UART: [idev] Erasing UDS.KEYID = 0
1,201,631 UART: [idev] Sha1 KeyId Algorithm
1,210,163 UART: [idev] --
1,211,123 UART: [ldev] ++
1,211,291 UART: [ldev] CDI.KEYID = 6
1,211,654 UART: [ldev] SUBJECT.KEYID = 5
1,212,080 UART: [ldev] AUTHORITY.KEYID = 7
1,212,543 UART: [ldev] FE.KEYID = 1
1,217,693 UART: [ldev] Erasing FE.KEYID = 1
1,244,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,699 UART: [ldev] --
1,284,088 UART: [fwproc] Wait for Commands...
1,284,858 UART: [fwproc] Recv command 0x46574c44
1,285,586 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,160 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,469 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,188,574 >>> mbox cmd response: failed
1,188,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,580 >>> mbox cmd response: failed
1,188,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,416 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
918,801 UART: [kat] HMAC-384Kdf
923,397 UART: [kat] LMS
1,171,725 UART: [kat] --
1,172,582 UART: [cold-reset] ++
1,173,152 UART: [fht] FHT @ 0x50003400
1,175,725 UART: [idev] ++
1,175,893 UART: [idev] CDI.KEYID = 6
1,176,253 UART: [idev] SUBJECT.KEYID = 7
1,176,677 UART: [idev] UDS.KEYID = 0
1,177,022 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,911 UART: [idev] Erasing UDS.KEYID = 0
1,201,502 UART: [idev] Sha1 KeyId Algorithm
1,210,152 UART: [idev] --
1,211,224 UART: [ldev] ++
1,211,392 UART: [ldev] CDI.KEYID = 6
1,211,755 UART: [ldev] SUBJECT.KEYID = 5
1,212,181 UART: [ldev] AUTHORITY.KEYID = 7
1,212,644 UART: [ldev] FE.KEYID = 1
1,217,926 UART: [ldev] Erasing FE.KEYID = 1
1,243,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,738 UART: [ldev] --
1,283,209 UART: [fwproc] Wait for Commands...
1,283,967 UART: [fwproc] Recv command 0x46574c44
1,284,695 UART: [fwproc] Recv'd Img size: 114448 bytes
1,332,186 UART: ROM Fatal Error: 0x000B003F
1,333,345 >>> mbox cmd response: failed
1,333,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,351 >>> mbox cmd response: failed
1,333,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
893,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,588 UART: [kat] ++
897,740 UART: [kat] sha1
901,782 UART: [kat] SHA2-256
903,722 UART: [kat] SHA2-384
906,401 UART: [kat] SHA2-512-ACC
908,302 UART: [kat] ECC-384
918,129 UART: [kat] HMAC-384Kdf
922,647 UART: [kat] LMS
1,170,975 UART: [kat] --
1,172,064 UART: [cold-reset] ++
1,172,392 UART: [fht] FHT @ 0x50003400
1,175,257 UART: [idev] ++
1,175,425 UART: [idev] CDI.KEYID = 6
1,175,785 UART: [idev] SUBJECT.KEYID = 7
1,176,209 UART: [idev] UDS.KEYID = 0
1,176,554 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,380 UART: [idev] Sha1 KeyId Algorithm
1,209,786 UART: [idev] --
1,210,988 UART: [ldev] ++
1,211,156 UART: [ldev] CDI.KEYID = 6
1,211,519 UART: [ldev] SUBJECT.KEYID = 5
1,211,945 UART: [ldev] AUTHORITY.KEYID = 7
1,212,408 UART: [ldev] FE.KEYID = 1
1,217,884 UART: [ldev] Erasing FE.KEYID = 1
1,244,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,840 UART: [ldev] --
1,284,193 UART: [fwproc] Wait for Commands...
1,284,863 UART: [fwproc] Recv command 0x46574c44
1,285,591 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,016 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,898 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,189,089 >>> mbox cmd response: failed
1,189,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,095 >>> mbox cmd response: failed
1,189,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,663 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,524 UART: [kat] HMAC-384Kdf
921,166 UART: [kat] LMS
1,169,478 UART: [kat] --
1,170,387 UART: [cold-reset] ++
1,170,747 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,174,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,367 UART: [idev] Erasing UDS.KEYID = 0
1,199,603 UART: [idev] Sha1 KeyId Algorithm
1,208,705 UART: [idev] --
1,209,616 UART: [ldev] ++
1,209,784 UART: [ldev] CDI.KEYID = 6
1,210,148 UART: [ldev] SUBJECT.KEYID = 5
1,210,575 UART: [ldev] AUTHORITY.KEYID = 7
1,211,038 UART: [ldev] FE.KEYID = 1
1,215,956 UART: [ldev] Erasing FE.KEYID = 1
1,242,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,878 UART: [ldev] --
1,281,298 UART: [fwproc] Wait for Commands...
1,281,917 UART: [fwproc] Recv command 0x46574c44
1,282,650 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,547 UART: ROM Fatal Error: 0x000B003F
1,331,706 >>> mbox cmd response: failed
1,331,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,712 >>> mbox cmd response: failed
1,331,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,968 UART: [kat] HMAC-384Kdf
920,700 UART: [kat] LMS
1,169,012 UART: [kat] --
1,169,827 UART: [cold-reset] ++
1,170,295 UART: [fht] FHT @ 0x50003400
1,172,953 UART: [idev] ++
1,173,121 UART: [idev] CDI.KEYID = 6
1,173,482 UART: [idev] SUBJECT.KEYID = 7
1,173,907 UART: [idev] UDS.KEYID = 0
1,174,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,198,015 UART: [idev] Sha1 KeyId Algorithm
1,207,021 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,604 UART: [ldev] Erasing FE.KEYID = 1
1,241,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,932 UART: [ldev] --
1,280,386 UART: [fwproc] Wait for Commands...
1,281,125 UART: [fwproc] Recv command 0x46574c44
1,281,858 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,499 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,126 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,103 >>> mbox cmd response: failed
1,182,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,109 >>> mbox cmd response: failed
1,182,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,133 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,202 UART: [state] WD Timer not started. Device not locked for debugging
87,309 UART: [kat] SHA2-256
890,859 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,988 UART: [kat] ++
895,140 UART: [kat] sha1
899,358 UART: [kat] SHA2-256
901,298 UART: [kat] SHA2-384
903,957 UART: [kat] SHA2-512-ACC
905,858 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,515 UART: [kat] LMS
1,168,827 UART: [kat] --
1,169,390 UART: [cold-reset] ++
1,169,722 UART: [fht] FHT @ 0x50003400
1,172,470 UART: [idev] ++
1,172,638 UART: [idev] CDI.KEYID = 6
1,172,999 UART: [idev] SUBJECT.KEYID = 7
1,173,424 UART: [idev] UDS.KEYID = 0
1,173,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,434 UART: [idev] Erasing UDS.KEYID = 0
1,198,438 UART: [idev] Sha1 KeyId Algorithm
1,207,196 UART: [idev] --
1,208,277 UART: [ldev] ++
1,208,445 UART: [ldev] CDI.KEYID = 6
1,208,809 UART: [ldev] SUBJECT.KEYID = 5
1,209,236 UART: [ldev] AUTHORITY.KEYID = 7
1,209,699 UART: [ldev] FE.KEYID = 1
1,214,881 UART: [ldev] Erasing FE.KEYID = 1
1,241,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,887 UART: [ldev] --
1,280,371 UART: [fwproc] Wait for Commands...
1,280,958 UART: [fwproc] Recv command 0x46574c44
1,281,691 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,666 UART: ROM Fatal Error: 0x000B003F
1,329,825 >>> mbox cmd response: failed
1,329,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,831 >>> mbox cmd response: failed
1,329,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,837 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,828 UART: [kat] ++
895,980 UART: [kat] sha1
900,378 UART: [kat] SHA2-256
902,318 UART: [kat] SHA2-384
904,971 UART: [kat] SHA2-512-ACC
906,872 UART: [kat] ECC-384
916,819 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,778 UART: [cold-reset] ++
1,171,268 UART: [fht] FHT @ 0x50003400
1,173,864 UART: [idev] ++
1,174,032 UART: [idev] CDI.KEYID = 6
1,174,393 UART: [idev] SUBJECT.KEYID = 7
1,174,818 UART: [idev] UDS.KEYID = 0
1,175,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,074 UART: [idev] Erasing UDS.KEYID = 0
1,200,476 UART: [idev] Sha1 KeyId Algorithm
1,209,358 UART: [idev] --
1,210,311 UART: [ldev] ++
1,210,479 UART: [ldev] CDI.KEYID = 6
1,210,843 UART: [ldev] SUBJECT.KEYID = 5
1,211,270 UART: [ldev] AUTHORITY.KEYID = 7
1,211,733 UART: [ldev] FE.KEYID = 1
1,216,951 UART: [ldev] Erasing FE.KEYID = 1
1,243,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,279 UART: [ldev] --
1,282,677 UART: [fwproc] Wait for Commands...
1,283,420 UART: [fwproc] Recv command 0x46574c44
1,284,153 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,786 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,712 >>> mbox cmd response: failed
1,183,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,718 >>> mbox cmd response: failed
1,183,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,724 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,458 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,045 UART:
192,427 UART: Running Caliptra ROM ...
193,544 UART:
193,687 UART: [state] CFI Enabled
263,096 UART: [state] LifecycleState = Unprovisioned
265,082 UART: [state] DebugLocked = No
266,744 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,173 UART: [kat] SHA2-256
441,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,337 UART: [kat] ++
452,931 UART: [kat] sha1
462,900 UART: [kat] SHA2-256
465,593 UART: [kat] SHA2-384
471,624 UART: [kat] SHA2-512-ACC
474,015 UART: [kat] ECC-384
2,766,671 UART: [kat] HMAC-384Kdf
2,799,417 UART: [kat] LMS
3,989,747 UART: [kat] --
3,995,010 UART: [cold-reset] ++
3,997,005 UART: [fht] Storing FHT @ 0x50003400
4,008,330 UART: [idev] ++
4,008,902 UART: [idev] CDI.KEYID = 6
4,009,888 UART: [idev] SUBJECT.KEYID = 7
4,011,105 UART: [idev] UDS.KEYID = 0
4,013,723 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,585 UART: [idev] Erasing UDS.KEYID = 0
7,346,560 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,890 UART: [idev] --
7,372,644 UART: [ldev] ++
7,373,272 UART: [ldev] CDI.KEYID = 6
7,374,192 UART: [ldev] SUBJECT.KEYID = 5
7,375,409 UART: [ldev] AUTHORITY.KEYID = 7
7,376,702 UART: [ldev] FE.KEYID = 1
7,424,078 UART: [ldev] Erasing FE.KEYID = 1
10,758,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,233 UART: [ldev] --
13,118,315 UART: [fwproc] Waiting for Commands...
13,120,197 UART: [fwproc] Received command 0x46574c44
13,122,391 UART: [fwproc] Received Image of size 114124 bytes
15,825,613 UART: ROM Fatal Error: 0x000B003C
15,829,069 >>> mbox cmd response: failed
15,829,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,829,832 >>> mbox cmd response: failed
15,830,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,830,395 >>> mbox cmd response: failed
Initializing fuses
2,055,730 writing to cptra_bootfsm_go
2,245,039 UART:
2,245,386 UART: Running Caliptra ROM ...
2,246,523 UART:
2,246,691 UART: [state] CFI Enabled
2,317,243 UART: [state] LifecycleState = Unprovisioned
2,319,180 UART: [state] DebugLocked = No
2,320,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,668 UART: [kat] SHA2-256
2,494,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,895 UART: [kat] ++
2,505,443 UART: [kat] sha1
2,517,584 UART: [kat] SHA2-256
2,520,283 UART: [kat] SHA2-384
2,526,668 UART: [kat] SHA2-512-ACC
2,529,022 UART: [kat] ECC-384
4,819,863 UART: [kat] HMAC-384Kdf
4,849,547 UART: [kat] LMS
6,039,863 UART: [kat] --
6,044,805 UART: [cold-reset] ++
6,047,452 UART: [fht] Storing FHT @ 0x50003400
6,059,911 UART: [idev] ++
6,060,525 UART: [idev] CDI.KEYID = 6
6,061,413 UART: [idev] SUBJECT.KEYID = 7
6,062,689 UART: [idev] UDS.KEYID = 0
6,064,900 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,208,407 UART: [idev] Erasing UDS.KEYID = 0
9,399,186 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,669 UART: [idev] --
9,423,781 UART: [ldev] ++
9,424,383 UART: [ldev] CDI.KEYID = 6
9,425,296 UART: [ldev] SUBJECT.KEYID = 5
9,426,560 UART: [ldev] AUTHORITY.KEYID = 7
9,427,800 UART: [ldev] FE.KEYID = 1
9,474,104 UART: [ldev] Erasing FE.KEYID = 1
12,807,496 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,100,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,129,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,144,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,164,656 UART: [ldev] --
15,168,897 UART: [fwproc] Waiting for Commands...
15,170,998 UART: [fwproc] Received command 0x46574c44
15,173,394 UART: [fwproc] Received Image of size 114124 bytes
19,228,475 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,309,695 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,378,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,696,015 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,796 writing to cptra_bootfsm_go
3,810,411 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,591,116 >>> mbox cmd response: failed
15,591,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,592,086 >>> mbox cmd response: failed
15,592,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,592,604 >>> mbox cmd response: failed
Initializing fuses
2,056,177 writing to cptra_bootfsm_go
5,838,480 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,923,455 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,427 UART:
192,780 UART: Running Caliptra ROM ...
193,953 UART:
603,744 UART: [state] CFI Enabled
618,218 UART: [state] LifecycleState = Unprovisioned
620,101 UART: [state] DebugLocked = No
622,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,235 UART: [kat] SHA2-256
796,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,518 UART: [kat] ++
808,045 UART: [kat] sha1
819,635 UART: [kat] SHA2-256
822,310 UART: [kat] SHA2-384
827,823 UART: [kat] SHA2-512-ACC
830,164 UART: [kat] ECC-384
3,113,341 UART: [kat] HMAC-384Kdf
3,125,512 UART: [kat] LMS
4,315,650 UART: [kat] --
4,318,327 UART: [cold-reset] ++
4,319,673 UART: [fht] Storing FHT @ 0x50003400
4,331,158 UART: [idev] ++
4,331,788 UART: [idev] CDI.KEYID = 6
4,332,698 UART: [idev] SUBJECT.KEYID = 7
4,333,966 UART: [idev] UDS.KEYID = 0
4,336,513 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,334 UART: [idev] Erasing UDS.KEYID = 0
7,621,420 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,015 UART: [idev] --
7,645,717 UART: [ldev] ++
7,646,310 UART: [ldev] CDI.KEYID = 6
7,647,330 UART: [ldev] SUBJECT.KEYID = 5
7,648,490 UART: [ldev] AUTHORITY.KEYID = 7
7,649,719 UART: [ldev] FE.KEYID = 1
7,660,960 UART: [ldev] Erasing FE.KEYID = 1
10,950,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,787 UART: [ldev] --
13,306,875 UART: [fwproc] Waiting for Commands...
13,309,564 UART: [fwproc] Received command 0x46574c44
13,311,753 UART: [fwproc] Received Image of size 114124 bytes
16,024,966 UART: ROM Fatal Error: 0x000B003C
16,028,471 >>> mbox cmd response: failed
16,028,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,216 >>> mbox cmd response: failed
16,029,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,777 >>> mbox cmd response: failed
Initializing fuses
2,058,560 writing to cptra_bootfsm_go
2,247,865 UART:
2,248,200 UART: Running Caliptra ROM ...
2,249,343 UART:
4,427,271 UART: [state] CFI Enabled
4,443,978 UART: [state] LifecycleState = Unprovisioned
4,445,921 UART: [state] DebugLocked = No
4,448,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,453,075 UART: [kat] SHA2-256
4,622,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,633,360 UART: [kat] ++
4,633,863 UART: [kat] sha1
4,645,939 UART: [kat] SHA2-256
4,648,630 UART: [kat] SHA2-384
4,654,941 UART: [kat] SHA2-512-ACC
4,657,298 UART: [kat] ECC-384
6,942,391 UART: [kat] HMAC-384Kdf
6,955,096 UART: [kat] LMS
8,145,220 UART: [kat] --
8,150,200 UART: [cold-reset] ++
8,151,972 UART: [fht] Storing FHT @ 0x50003400
8,164,533 UART: [idev] ++
8,165,106 UART: [idev] CDI.KEYID = 6
8,166,121 UART: [idev] SUBJECT.KEYID = 7
8,167,279 UART: [idev] UDS.KEYID = 0
8,169,328 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,312,730 UART: [idev] Erasing UDS.KEYID = 0
11,458,086 UART: [idev] Using Sha1 for KeyId Algorithm
11,479,225 UART: [idev] --
11,483,456 UART: [ldev] ++
11,484,030 UART: [ldev] CDI.KEYID = 6
11,485,046 UART: [ldev] SUBJECT.KEYID = 5
11,486,230 UART: [ldev] AUTHORITY.KEYID = 7
11,487,462 UART: [ldev] FE.KEYID = 1
11,496,865 UART: [ldev] Erasing FE.KEYID = 1
14,786,360 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,078,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,093,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,107,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,122,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,140,892 UART: [ldev] --
17,145,472 UART: [fwproc] Waiting for Commands...
17,148,869 UART: [fwproc] Received command 0x46574c44
17,151,056 UART: [fwproc] Received Image of size 114124 bytes
21,200,889 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,275,374 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,344,262 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,661,377 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
4,130,371 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,762,372 >>> mbox cmd response: failed
15,762,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,763,279 >>> mbox cmd response: failed
15,763,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,763,849 >>> mbox cmd response: failed
Initializing fuses
2,063,593 writing to cptra_bootfsm_go
8,231,403 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,180,615 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
192,218 UART:
192,590 UART: Running Caliptra ROM ...
193,743 UART:
193,891 UART: [state] CFI Enabled
260,577 UART: [state] LifecycleState = Unprovisioned
262,491 UART: [state] DebugLocked = No
263,825 UART: [state] WD Timer not started. Device not locked for debugging
267,876 UART: [kat] SHA2-256
446,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,549 UART: [kat] ++
459,087 UART: [kat] sha1
468,892 UART: [kat] SHA2-256
471,890 UART: [kat] SHA2-384
477,539 UART: [kat] SHA2-512-ACC
480,478 UART: [kat] ECC-384
2,924,486 UART: [kat] HMAC-384Kdf
2,948,020 UART: [kat] LMS
3,477,449 UART: [kat] --
3,482,192 UART: [cold-reset] ++
3,483,311 UART: [fht] FHT @ 0x50003400
3,494,164 UART: [idev] ++
3,494,775 UART: [idev] CDI.KEYID = 6
3,495,687 UART: [idev] SUBJECT.KEYID = 7
3,496,846 UART: [idev] UDS.KEYID = 0
3,499,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,643,567 UART: [idev] Erasing UDS.KEYID = 0
6,002,686 UART: [idev] Sha1 KeyId Algorithm
6,025,208 UART: [idev] --
6,029,844 UART: [ldev] ++
6,030,416 UART: [ldev] CDI.KEYID = 6
6,031,485 UART: [ldev] SUBJECT.KEYID = 5
6,032,645 UART: [ldev] AUTHORITY.KEYID = 7
6,033,778 UART: [ldev] FE.KEYID = 1
6,077,355 UART: [ldev] Erasing FE.KEYID = 1
8,582,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,345 UART: [ldev] --
10,394,024 UART: [fwproc] Wait for Commands...
10,396,185 UART: [fwproc] Recv command 0x46574c44
10,398,280 UART: [fwproc] Recv'd Img size: 114448 bytes
12,448,846 UART: ROM Fatal Error: 0x000B003C
12,451,969 >>> mbox cmd response: failed
12,452,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,660 >>> mbox cmd response: failed
12,452,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,453,278 >>> mbox cmd response: failed
Initializing fuses
2,060,216 writing to cptra_bootfsm_go
2,249,551 UART:
2,249,911 UART: Running Caliptra ROM ...
2,251,040 UART:
2,251,218 UART: [state] CFI Enabled
2,314,210 UART: [state] LifecycleState = Unprovisioned
2,316,043 UART: [state] DebugLocked = No
2,317,706 UART: [state] WD Timer not started. Device not locked for debugging
2,321,061 UART: [kat] SHA2-256
2,500,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,773 UART: [kat] ++
2,512,318 UART: [kat] sha1
2,523,504 UART: [kat] SHA2-256
2,526,515 UART: [kat] SHA2-384
2,532,230 UART: [kat] SHA2-512-ACC
2,535,171 UART: [kat] ECC-384
4,979,098 UART: [kat] HMAC-384Kdf
5,001,696 UART: [kat] LMS
5,531,179 UART: [kat] --
5,536,780 UART: [cold-reset] ++
5,539,261 UART: [fht] FHT @ 0x50003400
5,549,537 UART: [idev] ++
5,550,097 UART: [idev] CDI.KEYID = 6
5,551,013 UART: [idev] SUBJECT.KEYID = 7
5,552,233 UART: [idev] UDS.KEYID = 0
5,554,536 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,698,573 UART: [idev] Erasing UDS.KEYID = 0
8,054,624 UART: [idev] Sha1 KeyId Algorithm
8,079,104 UART: [idev] --
8,083,778 UART: [ldev] ++
8,084,357 UART: [ldev] CDI.KEYID = 6
8,085,246 UART: [ldev] SUBJECT.KEYID = 5
8,086,406 UART: [ldev] AUTHORITY.KEYID = 7
8,087,690 UART: [ldev] FE.KEYID = 1
8,131,286 UART: [ldev] Erasing FE.KEYID = 1
10,632,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,371,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,387,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,403,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,440,531 UART: [ldev] --
12,445,959 UART: [fwproc] Wait for Commands...
12,448,432 UART: [fwproc] Recv command 0x46574c44
12,450,529 UART: [fwproc] Recv'd Img size: 114448 bytes
15,856,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,927,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,996,274 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,314,435 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,361,297 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,222,469 >>> mbox cmd response: failed
12,222,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,223,282 >>> mbox cmd response: failed
12,223,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,223,845 >>> mbox cmd response: failed
Initializing fuses
2,057,256 writing to cptra_bootfsm_go
5,422,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,089,281 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,474 writing to cptra_bootfsm_go
192,762 UART:
193,114 UART: Running Caliptra ROM ...
194,323 UART:
604,091 UART: [state] CFI Enabled
616,894 UART: [state] LifecycleState = Unprovisioned
618,774 UART: [state] DebugLocked = No
621,275 UART: [state] WD Timer not started. Device not locked for debugging
624,389 UART: [kat] SHA2-256
803,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,108 UART: [kat] ++
815,551 UART: [kat] sha1
827,015 UART: [kat] SHA2-256
830,020 UART: [kat] SHA2-384
836,217 UART: [kat] SHA2-512-ACC
839,205 UART: [kat] ECC-384
3,278,764 UART: [kat] HMAC-384Kdf
3,291,970 UART: [kat] LMS
3,821,438 UART: [kat] --
3,824,417 UART: [cold-reset] ++
3,825,976 UART: [fht] FHT @ 0x50003400
3,837,913 UART: [idev] ++
3,838,495 UART: [idev] CDI.KEYID = 6
3,839,431 UART: [idev] SUBJECT.KEYID = 7
3,840,593 UART: [idev] UDS.KEYID = 0
3,843,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,163 UART: [idev] Erasing UDS.KEYID = 0
6,317,605 UART: [idev] Sha1 KeyId Algorithm
6,339,864 UART: [idev] --
6,342,991 UART: [ldev] ++
6,343,557 UART: [ldev] CDI.KEYID = 6
6,344,439 UART: [ldev] SUBJECT.KEYID = 5
6,345,652 UART: [ldev] AUTHORITY.KEYID = 7
6,346,887 UART: [ldev] FE.KEYID = 1
6,356,909 UART: [ldev] Erasing FE.KEYID = 1
8,829,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,798 UART: [ldev] --
10,621,009 UART: [fwproc] Wait for Commands...
10,623,219 UART: [fwproc] Recv command 0x46574c44
10,625,317 UART: [fwproc] Recv'd Img size: 114448 bytes
12,678,136 UART: ROM Fatal Error: 0x000B003C
12,681,258 >>> mbox cmd response: failed
12,681,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,912 >>> mbox cmd response: failed
12,682,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,682,571 >>> mbox cmd response: failed
Initializing fuses
2,053,233 writing to cptra_bootfsm_go
2,242,525 UART:
2,242,893 UART: Running Caliptra ROM ...
2,244,036 UART:
7,769,203 UART: [state] CFI Enabled
7,783,373 UART: [state] LifecycleState = Unprovisioned
7,785,265 UART: [state] DebugLocked = No
7,787,638 UART: [state] WD Timer not started. Device not locked for debugging
7,792,145 UART: [kat] SHA2-256
7,971,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,982,824 UART: [kat] ++
7,983,368 UART: [kat] sha1
7,993,835 UART: [kat] SHA2-256
7,996,854 UART: [kat] SHA2-384
8,002,246 UART: [kat] SHA2-512-ACC
8,005,193 UART: [kat] ECC-384
10,445,115 UART: [kat] HMAC-384Kdf
10,457,351 UART: [kat] LMS
10,986,874 UART: [kat] --
10,991,084 UART: [cold-reset] ++
10,993,500 UART: [fht] FHT @ 0x50003400
11,006,039 UART: [idev] ++
11,006,607 UART: [idev] CDI.KEYID = 6
11,007,494 UART: [idev] SUBJECT.KEYID = 7
11,008,707 UART: [idev] UDS.KEYID = 0
11,011,189 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,155,052 UART: [idev] Erasing UDS.KEYID = 0
13,483,072 UART: [idev] Sha1 KeyId Algorithm
13,506,686 UART: [idev] --
13,511,324 UART: [ldev] ++
13,511,888 UART: [ldev] CDI.KEYID = 6
13,512,853 UART: [ldev] SUBJECT.KEYID = 5
13,514,011 UART: [ldev] AUTHORITY.KEYID = 7
13,515,245 UART: [ldev] FE.KEYID = 1
13,524,557 UART: [ldev] Erasing FE.KEYID = 1
15,996,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,715,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,731,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,747,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,763,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,784,194 UART: [ldev] --
17,789,067 UART: [fwproc] Wait for Commands...
17,791,833 UART: [fwproc] Recv command 0x46574c44
17,793,933 UART: [fwproc] Recv'd Img size: 114448 bytes
21,195,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,269,481 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,338,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,656,771 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,700,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,459,727 >>> mbox cmd response: failed
12,460,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,460,628 >>> mbox cmd response: failed
12,460,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,461,188 >>> mbox cmd response: failed
Initializing fuses
2,057,703 writing to cptra_bootfsm_go
11,098,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,671,096 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,439,402 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,297,930 >>> mbox cmd response: failed
12,298,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,298,846 >>> mbox cmd response: failed
12,299,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,484 >>> mbox cmd response: failed
Initializing fuses
2,057,404 writing to cptra_bootfsm_go
5,500,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,799,949 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,760,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,527,776 >>> mbox cmd response: failed
12,528,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,712 >>> mbox cmd response: failed
12,529,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,351 >>> mbox cmd response: failed
Initializing fuses
2,061,400 writing to cptra_bootfsm_go
11,088,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,293,435 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,351 UART: [kat] SHA2-256
892,289 UART: [kat] SHA2-384
895,154 UART: [kat] SHA2-512-ACC
897,055 UART: [kat] ECC-384
902,424 UART: [kat] HMAC-384Kdf
907,140 UART: [kat] LMS
1,475,336 UART: [kat] --
1,476,303 UART: [cold-reset] ++
1,476,745 UART: [fht] Storing FHT @ 0x50003400
1,479,658 UART: [idev] ++
1,479,826 UART: [idev] CDI.KEYID = 6
1,480,186 UART: [idev] SUBJECT.KEYID = 7
1,480,610 UART: [idev] UDS.KEYID = 0
1,480,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,876 UART: [idev] Erasing UDS.KEYID = 0
1,505,022 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,634 UART: [idev] --
1,514,745 UART: [ldev] ++
1,514,913 UART: [ldev] CDI.KEYID = 6
1,515,276 UART: [ldev] SUBJECT.KEYID = 5
1,515,702 UART: [ldev] AUTHORITY.KEYID = 7
1,516,165 UART: [ldev] FE.KEYID = 1
1,521,375 UART: [ldev] Erasing FE.KEYID = 1
1,546,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,740 UART: [ldev] --
1,586,163 UART: [fwproc] Waiting for Commands...
1,586,964 UART: [fwproc] Received command 0x46574c44
1,587,755 UART: [fwproc] Received Image of size 114448 bytes
1,635,333 UART: ROM Fatal Error: 0x000B003C
1,636,492 >>> mbox cmd response: failed
1,636,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,498 >>> mbox cmd response: failed
1,636,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,817 UART: [kat] SHA2-256
881,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,863 UART: [kat] ++
886,015 UART: [kat] sha1
890,199 UART: [kat] SHA2-256
892,137 UART: [kat] SHA2-384
894,960 UART: [kat] SHA2-512-ACC
896,861 UART: [kat] ECC-384
902,464 UART: [kat] HMAC-384Kdf
906,950 UART: [kat] LMS
1,475,146 UART: [kat] --
1,476,205 UART: [cold-reset] ++
1,476,593 UART: [fht] Storing FHT @ 0x50003400
1,479,414 UART: [idev] ++
1,479,582 UART: [idev] CDI.KEYID = 6
1,479,942 UART: [idev] SUBJECT.KEYID = 7
1,480,366 UART: [idev] UDS.KEYID = 0
1,480,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,120 UART: [idev] Erasing UDS.KEYID = 0
1,505,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,480 UART: [idev] --
1,514,421 UART: [ldev] ++
1,514,589 UART: [ldev] CDI.KEYID = 6
1,514,952 UART: [ldev] SUBJECT.KEYID = 5
1,515,378 UART: [ldev] AUTHORITY.KEYID = 7
1,515,841 UART: [ldev] FE.KEYID = 1
1,521,007 UART: [ldev] Erasing FE.KEYID = 1
1,546,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,444 UART: [ldev] --
1,585,885 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 114448 bytes
2,886,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,057 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,416 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,486,967 >>> mbox cmd response: failed
1,486,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,973 >>> mbox cmd response: failed
1,486,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,979 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,538 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,880 UART: [kat] SHA2-256
881,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,926 UART: [kat] ++
886,078 UART: [kat] sha1
890,174 UART: [kat] SHA2-256
892,112 UART: [kat] SHA2-384
894,843 UART: [kat] SHA2-512-ACC
896,744 UART: [kat] ECC-384
902,671 UART: [kat] HMAC-384Kdf
907,369 UART: [kat] LMS
1,475,565 UART: [kat] --
1,476,402 UART: [cold-reset] ++
1,476,930 UART: [fht] Storing FHT @ 0x50003400
1,479,531 UART: [idev] ++
1,479,699 UART: [idev] CDI.KEYID = 6
1,480,059 UART: [idev] SUBJECT.KEYID = 7
1,480,483 UART: [idev] UDS.KEYID = 0
1,480,828 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,533 UART: [idev] Erasing UDS.KEYID = 0
1,505,455 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,107 UART: [idev] --
1,515,120 UART: [ldev] ++
1,515,288 UART: [ldev] CDI.KEYID = 6
1,515,651 UART: [ldev] SUBJECT.KEYID = 5
1,516,077 UART: [ldev] AUTHORITY.KEYID = 7
1,516,540 UART: [ldev] FE.KEYID = 1
1,521,540 UART: [ldev] Erasing FE.KEYID = 1
1,546,399 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,835 UART: [ldev] --
1,586,216 UART: [fwproc] Waiting for Commands...
1,587,023 UART: [fwproc] Received command 0x46574c44
1,587,814 UART: [fwproc] Received Image of size 114448 bytes
1,634,754 UART: ROM Fatal Error: 0x000B003C
1,635,913 >>> mbox cmd response: failed
1,635,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,919 >>> mbox cmd response: failed
1,635,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,020 UART: [kat] SHA2-256
881,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,066 UART: [kat] ++
886,218 UART: [kat] sha1
890,650 UART: [kat] SHA2-256
892,588 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
903,135 UART: [kat] HMAC-384Kdf
907,739 UART: [kat] LMS
1,475,935 UART: [kat] --
1,476,802 UART: [cold-reset] ++
1,477,290 UART: [fht] Storing FHT @ 0x50003400
1,480,001 UART: [idev] ++
1,480,169 UART: [idev] CDI.KEYID = 6
1,480,529 UART: [idev] SUBJECT.KEYID = 7
1,480,953 UART: [idev] UDS.KEYID = 0
1,481,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,443 UART: [idev] Erasing UDS.KEYID = 0
1,504,937 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,769 UART: [idev] --
1,514,848 UART: [ldev] ++
1,515,016 UART: [ldev] CDI.KEYID = 6
1,515,379 UART: [ldev] SUBJECT.KEYID = 5
1,515,805 UART: [ldev] AUTHORITY.KEYID = 7
1,516,268 UART: [ldev] FE.KEYID = 1
1,521,324 UART: [ldev] Erasing FE.KEYID = 1
1,546,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,425 UART: [ldev] --
1,586,750 UART: [fwproc] Waiting for Commands...
1,587,575 UART: [fwproc] Received command 0x46574c44
1,588,366 UART: [fwproc] Received Image of size 114448 bytes
2,886,332 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,486 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,838 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,995 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,170 >>> mbox cmd response: failed
1,489,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,176 >>> mbox cmd response: failed
1,489,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,179 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,744 UART: [state] LifecycleState = Unprovisioned
85,399 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,290 UART: [kat] SHA2-256
892,940 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,065 UART: [kat] ++
897,217 UART: [kat] sha1
901,275 UART: [kat] SHA2-256
903,215 UART: [kat] SHA2-384
905,920 UART: [kat] SHA2-512-ACC
907,821 UART: [kat] ECC-384
917,404 UART: [kat] HMAC-384Kdf
921,990 UART: [kat] LMS
1,170,318 UART: [kat] --
1,171,235 UART: [cold-reset] ++
1,171,713 UART: [fht] FHT @ 0x50003400
1,174,396 UART: [idev] ++
1,174,564 UART: [idev] CDI.KEYID = 6
1,174,924 UART: [idev] SUBJECT.KEYID = 7
1,175,348 UART: [idev] UDS.KEYID = 0
1,175,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,396 UART: [idev] Erasing UDS.KEYID = 0
1,200,819 UART: [idev] Sha1 KeyId Algorithm
1,209,347 UART: [idev] --
1,210,297 UART: [ldev] ++
1,210,465 UART: [ldev] CDI.KEYID = 6
1,210,828 UART: [ldev] SUBJECT.KEYID = 5
1,211,254 UART: [ldev] AUTHORITY.KEYID = 7
1,211,717 UART: [ldev] FE.KEYID = 1
1,216,915 UART: [ldev] Erasing FE.KEYID = 1
1,243,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,653 UART: [ldev] --
1,282,986 UART: [fwproc] Wait for Commands...
1,283,580 UART: [fwproc] Recv command 0x46574c44
1,284,308 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,280 UART: ROM Fatal Error: 0x000B003C
1,332,439 >>> mbox cmd response: failed
1,332,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,445 >>> mbox cmd response: failed
1,332,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,640 UART: [kat] SHA2-512-ACC
908,541 UART: [kat] ECC-384
918,062 UART: [kat] HMAC-384Kdf
922,616 UART: [kat] LMS
1,170,944 UART: [kat] --
1,171,713 UART: [cold-reset] ++
1,172,185 UART: [fht] FHT @ 0x50003400
1,174,908 UART: [idev] ++
1,175,076 UART: [idev] CDI.KEYID = 6
1,175,436 UART: [idev] SUBJECT.KEYID = 7
1,175,860 UART: [idev] UDS.KEYID = 0
1,176,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,704 UART: [idev] Erasing UDS.KEYID = 0
1,200,875 UART: [idev] Sha1 KeyId Algorithm
1,209,349 UART: [idev] --
1,210,581 UART: [ldev] ++
1,210,749 UART: [ldev] CDI.KEYID = 6
1,211,112 UART: [ldev] SUBJECT.KEYID = 5
1,211,538 UART: [ldev] AUTHORITY.KEYID = 7
1,212,001 UART: [ldev] FE.KEYID = 1
1,217,033 UART: [ldev] Erasing FE.KEYID = 1
1,243,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,439 UART: [ldev] --
1,282,914 UART: [fwproc] Wait for Commands...
1,283,682 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,197 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,465 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,754 >>> mbox cmd response: failed
1,186,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,760 >>> mbox cmd response: failed
1,186,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,766 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,704 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
893,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,730 UART: [kat] ++
897,882 UART: [kat] sha1
902,090 UART: [kat] SHA2-256
904,030 UART: [kat] SHA2-384
906,891 UART: [kat] SHA2-512-ACC
908,792 UART: [kat] ECC-384
918,415 UART: [kat] HMAC-384Kdf
923,053 UART: [kat] LMS
1,171,381 UART: [kat] --
1,172,350 UART: [cold-reset] ++
1,172,832 UART: [fht] FHT @ 0x50003400
1,175,331 UART: [idev] ++
1,175,499 UART: [idev] CDI.KEYID = 6
1,175,859 UART: [idev] SUBJECT.KEYID = 7
1,176,283 UART: [idev] UDS.KEYID = 0
1,176,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,015 UART: [idev] Erasing UDS.KEYID = 0
1,200,992 UART: [idev] Sha1 KeyId Algorithm
1,209,484 UART: [idev] --
1,210,448 UART: [ldev] ++
1,210,616 UART: [ldev] CDI.KEYID = 6
1,210,979 UART: [ldev] SUBJECT.KEYID = 5
1,211,405 UART: [ldev] AUTHORITY.KEYID = 7
1,211,868 UART: [ldev] FE.KEYID = 1
1,217,038 UART: [ldev] Erasing FE.KEYID = 1
1,243,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,206 UART: [ldev] --
1,282,553 UART: [fwproc] Wait for Commands...
1,283,333 UART: [fwproc] Recv command 0x46574c44
1,284,061 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,183 UART: ROM Fatal Error: 0x000B003C
1,332,342 >>> mbox cmd response: failed
1,332,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,348 >>> mbox cmd response: failed
1,332,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
893,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,428 UART: [kat] ++
897,580 UART: [kat] sha1
901,800 UART: [kat] SHA2-256
903,740 UART: [kat] SHA2-384
906,509 UART: [kat] SHA2-512-ACC
908,410 UART: [kat] ECC-384
918,759 UART: [kat] HMAC-384Kdf
923,255 UART: [kat] LMS
1,171,583 UART: [kat] --
1,172,454 UART: [cold-reset] ++
1,172,856 UART: [fht] FHT @ 0x50003400
1,175,553 UART: [idev] ++
1,175,721 UART: [idev] CDI.KEYID = 6
1,176,081 UART: [idev] SUBJECT.KEYID = 7
1,176,505 UART: [idev] UDS.KEYID = 0
1,176,850 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,839 UART: [idev] Erasing UDS.KEYID = 0
1,201,952 UART: [idev] Sha1 KeyId Algorithm
1,210,490 UART: [idev] --
1,211,644 UART: [ldev] ++
1,211,812 UART: [ldev] CDI.KEYID = 6
1,212,175 UART: [ldev] SUBJECT.KEYID = 5
1,212,601 UART: [ldev] AUTHORITY.KEYID = 7
1,213,064 UART: [ldev] FE.KEYID = 1
1,218,292 UART: [ldev] Erasing FE.KEYID = 1
1,245,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,754 UART: [ldev] --
1,284,261 UART: [fwproc] Wait for Commands...
1,285,045 UART: [fwproc] Recv command 0x46574c44
1,285,773 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,586 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,225 >>> mbox cmd response: failed
1,187,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,231 >>> mbox cmd response: failed
1,187,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,237 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,965 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
890,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,113 UART: [kat] ++
895,265 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,146 UART: [kat] SHA2-512-ACC
906,047 UART: [kat] ECC-384
915,440 UART: [kat] HMAC-384Kdf
920,048 UART: [kat] LMS
1,168,360 UART: [kat] --
1,169,445 UART: [cold-reset] ++
1,169,971 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,173,967 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,198,411 UART: [idev] Sha1 KeyId Algorithm
1,207,291 UART: [idev] --
1,208,504 UART: [ldev] ++
1,208,672 UART: [ldev] CDI.KEYID = 6
1,209,036 UART: [ldev] SUBJECT.KEYID = 5
1,209,463 UART: [ldev] AUTHORITY.KEYID = 7
1,209,926 UART: [ldev] FE.KEYID = 1
1,214,804 UART: [ldev] Erasing FE.KEYID = 1
1,241,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,044 UART: [ldev] --
1,280,552 UART: [fwproc] Wait for Commands...
1,281,377 UART: [fwproc] Recv command 0x46574c44
1,282,110 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,741 UART: ROM Fatal Error: 0x000B003C
1,329,900 >>> mbox cmd response: failed
1,329,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,906 >>> mbox cmd response: failed
1,329,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,912 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
915,440 UART: [kat] HMAC-384Kdf
920,010 UART: [kat] LMS
1,168,322 UART: [kat] --
1,169,319 UART: [cold-reset] ++
1,169,751 UART: [fht] FHT @ 0x50003400
1,172,489 UART: [idev] ++
1,172,657 UART: [idev] CDI.KEYID = 6
1,173,018 UART: [idev] SUBJECT.KEYID = 7
1,173,443 UART: [idev] UDS.KEYID = 0
1,173,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,397 UART: [idev] Erasing UDS.KEYID = 0
1,198,005 UART: [idev] Sha1 KeyId Algorithm
1,206,963 UART: [idev] --
1,208,034 UART: [ldev] ++
1,208,202 UART: [ldev] CDI.KEYID = 6
1,208,566 UART: [ldev] SUBJECT.KEYID = 5
1,208,993 UART: [ldev] AUTHORITY.KEYID = 7
1,209,456 UART: [ldev] FE.KEYID = 1
1,214,524 UART: [ldev] Erasing FE.KEYID = 1
1,241,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,472 UART: [ldev] --
1,280,736 UART: [fwproc] Wait for Commands...
1,281,491 UART: [fwproc] Recv command 0x46574c44
1,282,224 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,521 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,171 >>> mbox cmd response: failed
1,183,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,177 >>> mbox cmd response: failed
1,183,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,183 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,633 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,777 UART: [kat] HMAC-384Kdf
921,405 UART: [kat] LMS
1,169,717 UART: [kat] --
1,170,618 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,668 UART: [idev] ++
1,173,836 UART: [idev] CDI.KEYID = 6
1,174,197 UART: [idev] SUBJECT.KEYID = 7
1,174,622 UART: [idev] UDS.KEYID = 0
1,174,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,858 UART: [idev] Erasing UDS.KEYID = 0
1,200,834 UART: [idev] Sha1 KeyId Algorithm
1,209,518 UART: [idev] --
1,210,385 UART: [ldev] ++
1,210,553 UART: [ldev] CDI.KEYID = 6
1,210,917 UART: [ldev] SUBJECT.KEYID = 5
1,211,344 UART: [ldev] AUTHORITY.KEYID = 7
1,211,807 UART: [ldev] FE.KEYID = 1
1,217,139 UART: [ldev] Erasing FE.KEYID = 1
1,243,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,317 UART: [ldev] --
1,282,695 UART: [fwproc] Wait for Commands...
1,283,332 UART: [fwproc] Recv command 0x46574c44
1,284,065 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,320 UART: ROM Fatal Error: 0x000B003C
1,332,479 >>> mbox cmd response: failed
1,332,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,485 >>> mbox cmd response: failed
1,332,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,727 UART: [state] LifecycleState = Unprovisioned
85,382 UART: [state] DebugLocked = No
86,048 UART: [state] WD Timer not started. Device not locked for debugging
87,395 UART: [kat] SHA2-256
890,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,074 UART: [kat] ++
895,226 UART: [kat] sha1
899,434 UART: [kat] SHA2-256
901,374 UART: [kat] SHA2-384
904,121 UART: [kat] SHA2-512-ACC
906,022 UART: [kat] ECC-384
915,959 UART: [kat] HMAC-384Kdf
920,697 UART: [kat] LMS
1,169,009 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,172,894 UART: [idev] ++
1,173,062 UART: [idev] CDI.KEYID = 6
1,173,423 UART: [idev] SUBJECT.KEYID = 7
1,173,848 UART: [idev] UDS.KEYID = 0
1,174,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,610 UART: [idev] Erasing UDS.KEYID = 0
1,198,954 UART: [idev] Sha1 KeyId Algorithm
1,207,982 UART: [idev] --
1,208,923 UART: [ldev] ++
1,209,091 UART: [ldev] CDI.KEYID = 6
1,209,455 UART: [ldev] SUBJECT.KEYID = 5
1,209,882 UART: [ldev] AUTHORITY.KEYID = 7
1,210,345 UART: [ldev] FE.KEYID = 1
1,215,665 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,293 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,502 UART: [fwproc] Recv command 0x46574c44
1,283,235 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,538 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,522 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,364 >>> mbox cmd response: failed
1,183,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,370 >>> mbox cmd response: failed
1,183,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,414 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,010 UART:
192,375 UART: Running Caliptra ROM ...
193,499 UART:
193,646 UART: [state] CFI Enabled
265,798 UART: [state] LifecycleState = Manufacturing
267,786 UART: [state] DebugLocked = No
269,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,407 UART: [kat] SHA2-256
443,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,651 UART: [kat] ++
454,107 UART: [kat] sha1
465,145 UART: [kat] SHA2-256
467,836 UART: [kat] SHA2-384
473,822 UART: [kat] SHA2-512-ACC
476,162 UART: [kat] ECC-384
2,766,018 UART: [kat] HMAC-384Kdf
2,777,672 UART: [kat] LMS
3,967,963 UART: [kat] --
3,974,035 UART: [cold-reset] ++
3,975,061 UART: [fht] Storing FHT @ 0x50003400
3,986,625 UART: [idev] ++
3,987,253 UART: [idev] CDI.KEYID = 6
3,988,168 UART: [idev] SUBJECT.KEYID = 7
3,989,386 UART: [idev] UDS.KEYID = 0
3,992,368 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,136,118 UART: [idev] Erasing UDS.KEYID = 0
7,323,213 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,067 UART: [idev] --
7,350,556 UART: [ldev] ++
7,351,131 UART: [ldev] CDI.KEYID = 6
7,352,102 UART: [ldev] SUBJECT.KEYID = 5
7,353,320 UART: [ldev] AUTHORITY.KEYID = 7
7,354,558 UART: [ldev] FE.KEYID = 1
7,401,525 UART: [ldev] Erasing FE.KEYID = 1
10,735,029 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,750 UART: [ldev] --
13,116,341 UART: [fwproc] Waiting for Commands...
13,118,763 UART: [fwproc] Received command 0x46574c44
13,121,007 UART: [fwproc] Received Image of size 114124 bytes
17,205,653 UART: ROM Fatal Error: 0x000B002C
17,209,066 >>> mbox cmd response: failed
17,209,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,209,847 >>> mbox cmd response: failed
17,210,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,210,404 >>> mbox cmd response: failed
Initializing fuses
2,049,074 writing to cptra_bootfsm_go
2,238,380 UART:
2,238,728 UART: Running Caliptra ROM ...
2,239,774 UART:
2,239,937 UART: [state] CFI Enabled
2,315,533 UART: [state] LifecycleState = Manufacturing
2,317,476 UART: [state] DebugLocked = No
2,320,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,592 UART: [kat] SHA2-256
2,494,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,778 UART: [kat] ++
2,505,266 UART: [kat] sha1
2,515,725 UART: [kat] SHA2-256
2,518,413 UART: [kat] SHA2-384
2,524,080 UART: [kat] SHA2-512-ACC
2,526,456 UART: [kat] ECC-384
4,819,251 UART: [kat] HMAC-384Kdf
4,850,068 UART: [kat] LMS
6,040,412 UART: [kat] --
6,044,526 UART: [cold-reset] ++
6,047,010 UART: [fht] Storing FHT @ 0x50003400
6,058,828 UART: [idev] ++
6,059,397 UART: [idev] CDI.KEYID = 6
6,060,339 UART: [idev] SUBJECT.KEYID = 7
6,061,612 UART: [idev] UDS.KEYID = 0
6,064,263 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,207,856 UART: [idev] Erasing UDS.KEYID = 0
9,396,250 UART: [idev] Using Sha1 for KeyId Algorithm
9,417,790 UART: [idev] --
9,420,700 UART: [ldev] ++
9,421,280 UART: [ldev] CDI.KEYID = 6
9,422,266 UART: [ldev] SUBJECT.KEYID = 5
9,423,469 UART: [ldev] AUTHORITY.KEYID = 7
9,424,709 UART: [ldev] FE.KEYID = 1
9,452,097 UART: [ldev] Erasing FE.KEYID = 1
12,783,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,079,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,094,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,109,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,123,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,141,895 UART: [ldev] --
15,146,899 UART: [fwproc] Waiting for Commands...
15,149,979 UART: [fwproc] Received command 0x46574c44
15,152,172 UART: [fwproc] Received Image of size 114124 bytes
19,238,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,309,895 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,378,816 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,696,628 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,785,834 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,178,042 >>> mbox cmd response: failed
17,178,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,178,984 >>> mbox cmd response: failed
17,179,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,179,568 >>> mbox cmd response: failed
Initializing fuses
2,046,344 writing to cptra_bootfsm_go
5,845,629 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,950,285 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,539 UART:
192,895 UART: Running Caliptra ROM ...
194,162 UART:
603,783 UART: [state] CFI Enabled
616,553 UART: [state] LifecycleState = Manufacturing
618,493 UART: [state] DebugLocked = No
620,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,801 UART: [kat] SHA2-256
795,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,144 UART: [kat] ++
806,677 UART: [kat] sha1
818,262 UART: [kat] SHA2-256
820,945 UART: [kat] SHA2-384
827,026 UART: [kat] SHA2-512-ACC
829,387 UART: [kat] ECC-384
3,112,374 UART: [kat] HMAC-384Kdf
3,122,842 UART: [kat] LMS
4,312,970 UART: [kat] --
4,317,931 UART: [cold-reset] ++
4,320,514 UART: [fht] Storing FHT @ 0x50003400
4,333,187 UART: [idev] ++
4,333,753 UART: [idev] CDI.KEYID = 6
4,334,772 UART: [idev] SUBJECT.KEYID = 7
4,335,943 UART: [idev] UDS.KEYID = 0
4,338,690 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,183 UART: [idev] Erasing UDS.KEYID = 0
7,622,846 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,513 UART: [idev] --
7,646,896 UART: [ldev] ++
7,647,471 UART: [ldev] CDI.KEYID = 6
7,648,512 UART: [ldev] SUBJECT.KEYID = 5
7,649,673 UART: [ldev] AUTHORITY.KEYID = 7
7,650,904 UART: [ldev] FE.KEYID = 1
7,661,571 UART: [ldev] Erasing FE.KEYID = 1
10,948,482 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,036 UART: [ldev] --
13,313,414 UART: [fwproc] Waiting for Commands...
13,316,195 UART: [fwproc] Received command 0x46574c44
13,318,390 UART: [fwproc] Received Image of size 114124 bytes
17,401,831 UART: ROM Fatal Error: 0x000B002C
17,405,281 >>> mbox cmd response: failed
17,405,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,406,040 >>> mbox cmd response: failed
17,406,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,406,605 >>> mbox cmd response: failed
Initializing fuses
2,053,635 writing to cptra_bootfsm_go
2,242,934 UART:
2,243,299 UART: Running Caliptra ROM ...
2,244,440 UART:
3,066,046 UART: [state] CFI Enabled
3,079,526 UART: [state] LifecycleState = Manufacturing
3,081,433 UART: [state] DebugLocked = No
3,084,173 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,089,783 UART: [kat] SHA2-256
3,259,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,270,036 UART: [kat] ++
3,270,545 UART: [kat] sha1
3,281,268 UART: [kat] SHA2-256
3,283,956 UART: [kat] SHA2-384
3,288,917 UART: [kat] SHA2-512-ACC
3,291,275 UART: [kat] ECC-384
5,576,235 UART: [kat] HMAC-384Kdf
5,588,828 UART: [kat] LMS
6,778,927 UART: [kat] --
6,781,313 UART: [cold-reset] ++
6,783,513 UART: [fht] Storing FHT @ 0x50003400
6,794,926 UART: [idev] ++
6,795,533 UART: [idev] CDI.KEYID = 6
6,796,451 UART: [idev] SUBJECT.KEYID = 7
6,797,678 UART: [idev] UDS.KEYID = 0
6,799,903 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,943,203 UART: [idev] Erasing UDS.KEYID = 0
10,082,951 UART: [idev] Using Sha1 for KeyId Algorithm
10,104,006 UART: [idev] --
10,107,311 UART: [ldev] ++
10,107,934 UART: [ldev] CDI.KEYID = 6
10,108,842 UART: [ldev] SUBJECT.KEYID = 5
10,110,087 UART: [ldev] AUTHORITY.KEYID = 7
10,111,323 UART: [ldev] FE.KEYID = 1
10,122,563 UART: [ldev] Erasing FE.KEYID = 1
13,412,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,704,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,719,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,734,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,748,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,767,177 UART: [ldev] --
15,771,390 UART: [fwproc] Waiting for Commands...
15,774,575 UART: [fwproc] Received command 0x46574c44
15,776,764 UART: [fwproc] Received Image of size 114124 bytes
19,862,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,936,797 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,005,688 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,322,932 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,233 writing to cptra_bootfsm_go
4,132,426 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,384,986 >>> mbox cmd response: failed
17,385,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,386,127 >>> mbox cmd response: failed
17,386,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,386,702 >>> mbox cmd response: failed
Initializing fuses
2,044,511 writing to cptra_bootfsm_go
6,619,343 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,604,802 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,114 UART:
192,480 UART: Running Caliptra ROM ...
193,604 UART:
193,749 UART: [state] CFI Enabled
265,662 UART: [state] LifecycleState = Manufacturing
267,543 UART: [state] DebugLocked = No
269,952 UART: [state] WD Timer not started. Device not locked for debugging
273,027 UART: [kat] SHA2-256
452,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,742 UART: [kat] ++
464,295 UART: [kat] sha1
474,099 UART: [kat] SHA2-256
477,103 UART: [kat] SHA2-384
481,833 UART: [kat] SHA2-512-ACC
484,770 UART: [kat] ECC-384
2,947,957 UART: [kat] HMAC-384Kdf
2,962,402 UART: [kat] LMS
3,491,860 UART: [kat] --
3,495,595 UART: [cold-reset] ++
3,497,909 UART: [fht] FHT @ 0x50003400
3,509,643 UART: [idev] ++
3,510,204 UART: [idev] CDI.KEYID = 6
3,511,146 UART: [idev] SUBJECT.KEYID = 7
3,512,356 UART: [idev] UDS.KEYID = 0
3,515,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,659,655 UART: [idev] Erasing UDS.KEYID = 0
6,014,349 UART: [idev] Sha1 KeyId Algorithm
6,035,763 UART: [idev] --
6,040,869 UART: [ldev] ++
6,041,452 UART: [ldev] CDI.KEYID = 6
6,042,338 UART: [ldev] SUBJECT.KEYID = 5
6,043,553 UART: [ldev] AUTHORITY.KEYID = 7
6,044,790 UART: [ldev] FE.KEYID = 1
6,090,677 UART: [ldev] Erasing FE.KEYID = 1
8,592,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,308,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,324,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,340,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,355,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,376,228 UART: [ldev] --
10,380,085 UART: [fwproc] Wait for Commands...
10,382,135 UART: [fwproc] Recv command 0x46574c44
10,384,252 UART: [fwproc] Recv'd Img size: 114448 bytes
13,819,037 UART: ROM Fatal Error: 0x000B002C
13,822,162 >>> mbox cmd response: failed
13,822,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,822,851 >>> mbox cmd response: failed
13,823,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,823,455 >>> mbox cmd response: failed
Initializing fuses
2,047,661 writing to cptra_bootfsm_go
2,236,946 UART:
2,237,276 UART: Running Caliptra ROM ...
2,238,421 UART:
2,238,591 UART: [state] CFI Enabled
2,304,300 UART: [state] LifecycleState = Manufacturing
2,306,179 UART: [state] DebugLocked = No
2,308,219 UART: [state] WD Timer not started. Device not locked for debugging
2,311,153 UART: [kat] SHA2-256
2,490,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,501,867 UART: [kat] ++
2,502,406 UART: [kat] sha1
2,512,599 UART: [kat] SHA2-256
2,515,624 UART: [kat] SHA2-384
2,521,662 UART: [kat] SHA2-512-ACC
2,524,640 UART: [kat] ECC-384
4,990,915 UART: [kat] HMAC-384Kdf
5,013,244 UART: [kat] LMS
5,542,648 UART: [kat] --
5,548,498 UART: [cold-reset] ++
5,550,380 UART: [fht] FHT @ 0x50003400
5,562,729 UART: [idev] ++
5,563,333 UART: [idev] CDI.KEYID = 6
5,564,219 UART: [idev] SUBJECT.KEYID = 7
5,565,432 UART: [idev] UDS.KEYID = 0
5,568,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,712,008 UART: [idev] Erasing UDS.KEYID = 0
8,067,612 UART: [idev] Sha1 KeyId Algorithm
8,091,494 UART: [idev] --
8,095,006 UART: [ldev] ++
8,095,586 UART: [ldev] CDI.KEYID = 6
8,096,496 UART: [ldev] SUBJECT.KEYID = 5
8,097,660 UART: [ldev] AUTHORITY.KEYID = 7
8,098,953 UART: [ldev] FE.KEYID = 1
8,134,132 UART: [ldev] Erasing FE.KEYID = 1
10,636,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,373,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,389,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,405,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,421,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,441,069 UART: [ldev] --
12,445,311 UART: [fwproc] Wait for Commands...
12,448,474 UART: [fwproc] Recv command 0x46574c44
12,450,581 UART: [fwproc] Recv'd Img size: 114448 bytes
15,879,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,951,211 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,020,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,338,636 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,365,139 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,621,806 >>> mbox cmd response: failed
13,622,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,622,942 >>> mbox cmd response: failed
13,623,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,623,502 >>> mbox cmd response: failed
Initializing fuses
2,045,027 writing to cptra_bootfsm_go
5,414,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,161,423 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,542 UART:
192,898 UART: Running Caliptra ROM ...
193,983 UART:
603,556 UART: [state] CFI Enabled
615,878 UART: [state] LifecycleState = Manufacturing
617,726 UART: [state] DebugLocked = No
619,805 UART: [state] WD Timer not started. Device not locked for debugging
623,511 UART: [kat] SHA2-256
802,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,248 UART: [kat] ++
814,786 UART: [kat] sha1
825,455 UART: [kat] SHA2-256
828,459 UART: [kat] SHA2-384
833,625 UART: [kat] SHA2-512-ACC
836,563 UART: [kat] ECC-384
3,280,662 UART: [kat] HMAC-384Kdf
3,294,468 UART: [kat] LMS
3,823,926 UART: [kat] --
3,828,080 UART: [cold-reset] ++
3,829,527 UART: [fht] FHT @ 0x50003400
3,841,636 UART: [idev] ++
3,842,239 UART: [idev] CDI.KEYID = 6
3,843,159 UART: [idev] SUBJECT.KEYID = 7
3,844,321 UART: [idev] UDS.KEYID = 0
3,847,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,904 UART: [idev] Erasing UDS.KEYID = 0
6,317,360 UART: [idev] Sha1 KeyId Algorithm
6,341,141 UART: [idev] --
6,344,542 UART: [ldev] ++
6,345,113 UART: [ldev] CDI.KEYID = 6
6,346,025 UART: [ldev] SUBJECT.KEYID = 5
6,347,194 UART: [ldev] AUTHORITY.KEYID = 7
6,348,484 UART: [ldev] FE.KEYID = 1
6,359,675 UART: [ldev] Erasing FE.KEYID = 1
8,837,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,502 UART: [ldev] --
10,627,551 UART: [fwproc] Wait for Commands...
10,629,783 UART: [fwproc] Recv command 0x46574c44
10,631,887 UART: [fwproc] Recv'd Img size: 114448 bytes
14,062,147 UART: ROM Fatal Error: 0x000B002C
14,065,282 >>> mbox cmd response: failed
14,065,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,065,997 >>> mbox cmd response: failed
14,066,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,066,595 >>> mbox cmd response: failed
Initializing fuses
2,048,789 writing to cptra_bootfsm_go
2,238,081 UART:
2,238,432 UART: Running Caliptra ROM ...
2,239,482 UART:
6,386,662 UART: [state] CFI Enabled
6,401,610 UART: [state] LifecycleState = Manufacturing
6,403,420 UART: [state] DebugLocked = No
6,405,616 UART: [state] WD Timer not started. Device not locked for debugging
6,409,281 UART: [kat] SHA2-256
6,588,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,599,977 UART: [kat] ++
6,600,525 UART: [kat] sha1
6,610,881 UART: [kat] SHA2-256
6,613,903 UART: [kat] SHA2-384
6,620,535 UART: [kat] SHA2-512-ACC
6,623,528 UART: [kat] ECC-384
9,066,349 UART: [kat] HMAC-384Kdf
9,080,085 UART: [kat] LMS
9,609,578 UART: [kat] --
9,614,615 UART: [cold-reset] ++
9,615,806 UART: [fht] FHT @ 0x50003400
9,625,899 UART: [idev] ++
9,626,468 UART: [idev] CDI.KEYID = 6
9,627,409 UART: [idev] SUBJECT.KEYID = 7
9,628,622 UART: [idev] UDS.KEYID = 0
9,631,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,775,144 UART: [idev] Erasing UDS.KEYID = 0
12,099,798 UART: [idev] Sha1 KeyId Algorithm
12,122,380 UART: [idev] --
12,126,911 UART: [ldev] ++
12,127,480 UART: [ldev] CDI.KEYID = 6
12,128,449 UART: [ldev] SUBJECT.KEYID = 5
12,129,603 UART: [ldev] AUTHORITY.KEYID = 7
12,130,833 UART: [ldev] FE.KEYID = 1
12,141,909 UART: [ldev] Erasing FE.KEYID = 1
14,616,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,335,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,351,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,367,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,382,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,403,488 UART: [ldev] --
16,408,818 UART: [fwproc] Wait for Commands...
16,410,577 UART: [fwproc] Recv command 0x46574c44
16,412,686 UART: [fwproc] Recv'd Img size: 114448 bytes
19,844,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,920,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,989,310 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,307,460 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,708,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,856,474 >>> mbox cmd response: failed
13,857,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,857,367 >>> mbox cmd response: failed
13,857,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,857,936 >>> mbox cmd response: failed
Initializing fuses
2,045,164 writing to cptra_bootfsm_go
9,700,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,309,460 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,441,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,341,866 >>> mbox cmd response: failed
14,342,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,342,805 >>> mbox cmd response: failed
14,343,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,343,375 >>> mbox cmd response: failed
Initializing fuses
2,045,204 writing to cptra_bootfsm_go
5,476,686 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,795,500 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,759,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,541,816 >>> mbox cmd response: failed
14,542,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,543,167 >>> mbox cmd response: failed
14,543,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,543,738 >>> mbox cmd response: failed
Initializing fuses
2,044,830 writing to cptra_bootfsm_go
9,080,151 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,333,316 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Manufacturing
85,911 UART: [state] DebugLocked = No
86,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,277 UART: [kat] SHA2-256
882,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,323 UART: [kat] ++
886,475 UART: [kat] sha1
890,805 UART: [kat] SHA2-256
892,743 UART: [kat] SHA2-384
895,502 UART: [kat] SHA2-512-ACC
897,403 UART: [kat] ECC-384
902,994 UART: [kat] HMAC-384Kdf
907,442 UART: [kat] LMS
1,475,638 UART: [kat] --
1,476,603 UART: [cold-reset] ++
1,477,055 UART: [fht] Storing FHT @ 0x50003400
1,479,914 UART: [idev] ++
1,480,082 UART: [idev] CDI.KEYID = 6
1,480,442 UART: [idev] SUBJECT.KEYID = 7
1,480,866 UART: [idev] UDS.KEYID = 0
1,481,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,674 UART: [idev] Erasing UDS.KEYID = 0
1,505,146 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,650 UART: [idev] --
1,514,727 UART: [ldev] ++
1,514,895 UART: [ldev] CDI.KEYID = 6
1,515,258 UART: [ldev] SUBJECT.KEYID = 5
1,515,684 UART: [ldev] AUTHORITY.KEYID = 7
1,516,147 UART: [ldev] FE.KEYID = 1
1,521,243 UART: [ldev] Erasing FE.KEYID = 1
1,547,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,728 UART: [ldev] --
1,586,017 UART: [fwproc] Waiting for Commands...
1,586,778 UART: [fwproc] Received command 0x46574c44
1,587,569 UART: [fwproc] Received Image of size 114448 bytes
2,912,016 UART: ROM Fatal Error: 0x000B002C
2,913,175 >>> mbox cmd response: failed
2,913,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,913,181 >>> mbox cmd response: failed
2,913,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,913,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,889 UART: [kat] SHA2-256
881,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,935 UART: [kat] ++
886,087 UART: [kat] sha1
890,287 UART: [kat] SHA2-256
892,225 UART: [kat] SHA2-384
894,936 UART: [kat] SHA2-512-ACC
896,837 UART: [kat] ECC-384
902,642 UART: [kat] HMAC-384Kdf
907,334 UART: [kat] LMS
1,475,530 UART: [kat] --
1,476,355 UART: [cold-reset] ++
1,476,783 UART: [fht] Storing FHT @ 0x50003400
1,479,504 UART: [idev] ++
1,479,672 UART: [idev] CDI.KEYID = 6
1,480,032 UART: [idev] SUBJECT.KEYID = 7
1,480,456 UART: [idev] UDS.KEYID = 0
1,480,801 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,240 UART: [idev] Erasing UDS.KEYID = 0
1,504,760 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,364 UART: [idev] --
1,514,311 UART: [ldev] ++
1,514,479 UART: [ldev] CDI.KEYID = 6
1,514,842 UART: [ldev] SUBJECT.KEYID = 5
1,515,268 UART: [ldev] AUTHORITY.KEYID = 7
1,515,731 UART: [ldev] FE.KEYID = 1
1,520,985 UART: [ldev] Erasing FE.KEYID = 1
1,546,464 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,316 UART: [ldev] --
1,585,635 UART: [fwproc] Waiting for Commands...
1,586,456 UART: [fwproc] Received command 0x46574c44
1,587,247 UART: [fwproc] Received Image of size 114448 bytes
2,885,249 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,267 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,619 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,742 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,765,734 >>> mbox cmd response: failed
2,765,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,765,740 >>> mbox cmd response: failed
2,765,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,765,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,926,964 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Manufacturing
86,122 UART: [state] DebugLocked = No
86,688 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,246 UART: [kat] SHA2-256
882,177 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,292 UART: [kat] ++
886,444 UART: [kat] sha1
890,550 UART: [kat] SHA2-256
892,488 UART: [kat] SHA2-384
895,391 UART: [kat] SHA2-512-ACC
897,292 UART: [kat] ECC-384
902,995 UART: [kat] HMAC-384Kdf
907,579 UART: [kat] LMS
1,475,775 UART: [kat] --
1,476,752 UART: [cold-reset] ++
1,477,266 UART: [fht] Storing FHT @ 0x50003400
1,480,009 UART: [idev] ++
1,480,177 UART: [idev] CDI.KEYID = 6
1,480,537 UART: [idev] SUBJECT.KEYID = 7
1,480,961 UART: [idev] UDS.KEYID = 0
1,481,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,193 UART: [idev] Erasing UDS.KEYID = 0
1,505,859 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,527 UART: [idev] --
1,515,428 UART: [ldev] ++
1,515,596 UART: [ldev] CDI.KEYID = 6
1,515,959 UART: [ldev] SUBJECT.KEYID = 5
1,516,385 UART: [ldev] AUTHORITY.KEYID = 7
1,516,848 UART: [ldev] FE.KEYID = 1
1,522,368 UART: [ldev] Erasing FE.KEYID = 1
1,548,001 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,759 UART: [ldev] --
1,587,224 UART: [fwproc] Waiting for Commands...
1,587,927 UART: [fwproc] Received command 0x46574c44
1,588,718 UART: [fwproc] Received Image of size 114448 bytes
2,913,019 UART: ROM Fatal Error: 0x000B002C
2,914,178 >>> mbox cmd response: failed
2,914,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,914,184 >>> mbox cmd response: failed
2,914,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,914,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
891,002 UART: [kat] SHA2-256
892,940 UART: [kat] SHA2-384
895,693 UART: [kat] SHA2-512-ACC
897,594 UART: [kat] ECC-384
903,147 UART: [kat] HMAC-384Kdf
907,809 UART: [kat] LMS
1,476,005 UART: [kat] --
1,476,986 UART: [cold-reset] ++
1,477,416 UART: [fht] Storing FHT @ 0x50003400
1,480,367 UART: [idev] ++
1,480,535 UART: [idev] CDI.KEYID = 6
1,480,895 UART: [idev] SUBJECT.KEYID = 7
1,481,319 UART: [idev] UDS.KEYID = 0
1,481,664 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,395 UART: [idev] Erasing UDS.KEYID = 0
1,506,303 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,855 UART: [idev] --
1,515,844 UART: [ldev] ++
1,516,012 UART: [ldev] CDI.KEYID = 6
1,516,375 UART: [ldev] SUBJECT.KEYID = 5
1,516,801 UART: [ldev] AUTHORITY.KEYID = 7
1,517,264 UART: [ldev] FE.KEYID = 1
1,522,610 UART: [ldev] Erasing FE.KEYID = 1
1,548,161 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,351 UART: [ldev] --
1,587,662 UART: [fwproc] Waiting for Commands...
1,588,435 UART: [fwproc] Received command 0x46574c44
1,589,226 UART: [fwproc] Received Image of size 114448 bytes
2,887,288 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,726 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,078 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,023 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,765,745 >>> mbox cmd response: failed
2,765,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,765,751 >>> mbox cmd response: failed
2,765,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,765,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,531 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,860 UART: [state] LifecycleState = Manufacturing
86,515 UART: [state] DebugLocked = No
87,191 UART: [state] WD Timer not started. Device not locked for debugging
88,300 UART: [kat] SHA2-256
893,950 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,075 UART: [kat] ++
898,227 UART: [kat] sha1
902,373 UART: [kat] SHA2-256
904,313 UART: [kat] SHA2-384
907,228 UART: [kat] SHA2-512-ACC
909,129 UART: [kat] ECC-384
918,832 UART: [kat] HMAC-384Kdf
923,222 UART: [kat] LMS
1,171,550 UART: [kat] --
1,172,399 UART: [cold-reset] ++
1,172,967 UART: [fht] FHT @ 0x50003400
1,175,550 UART: [idev] ++
1,175,718 UART: [idev] CDI.KEYID = 6
1,176,078 UART: [idev] SUBJECT.KEYID = 7
1,176,502 UART: [idev] UDS.KEYID = 0
1,176,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,748 UART: [idev] Erasing UDS.KEYID = 0
1,201,495 UART: [idev] Sha1 KeyId Algorithm
1,209,973 UART: [idev] --
1,211,069 UART: [ldev] ++
1,211,237 UART: [ldev] CDI.KEYID = 6
1,211,600 UART: [ldev] SUBJECT.KEYID = 5
1,212,026 UART: [ldev] AUTHORITY.KEYID = 7
1,212,489 UART: [ldev] FE.KEYID = 1
1,217,883 UART: [ldev] Erasing FE.KEYID = 1
1,244,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,927 UART: [ldev] --
1,284,332 UART: [fwproc] Wait for Commands...
1,285,108 UART: [fwproc] Recv command 0x46574c44
1,285,836 UART: [fwproc] Recv'd Img size: 114448 bytes
2,609,795 UART: ROM Fatal Error: 0x000B002C
2,610,954 >>> mbox cmd response: failed
2,610,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,610,960 >>> mbox cmd response: failed
2,610,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,610,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
893,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,427 UART: [kat] ++
897,579 UART: [kat] sha1
902,005 UART: [kat] SHA2-256
903,945 UART: [kat] SHA2-384
906,648 UART: [kat] SHA2-512-ACC
908,549 UART: [kat] ECC-384
918,782 UART: [kat] HMAC-384Kdf
923,402 UART: [kat] LMS
1,171,730 UART: [kat] --
1,172,577 UART: [cold-reset] ++
1,173,147 UART: [fht] FHT @ 0x50003400
1,175,622 UART: [idev] ++
1,175,790 UART: [idev] CDI.KEYID = 6
1,176,150 UART: [idev] SUBJECT.KEYID = 7
1,176,574 UART: [idev] UDS.KEYID = 0
1,176,919 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,430 UART: [idev] Erasing UDS.KEYID = 0
1,201,077 UART: [idev] Sha1 KeyId Algorithm
1,209,623 UART: [idev] --
1,210,753 UART: [ldev] ++
1,210,921 UART: [ldev] CDI.KEYID = 6
1,211,284 UART: [ldev] SUBJECT.KEYID = 5
1,211,710 UART: [ldev] AUTHORITY.KEYID = 7
1,212,173 UART: [ldev] FE.KEYID = 1
1,217,115 UART: [ldev] Erasing FE.KEYID = 1
1,243,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,237 UART: [ldev] --
1,282,710 UART: [fwproc] Wait for Commands...
1,283,404 UART: [fwproc] Recv command 0x46574c44
1,284,132 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,508 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,812 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,691 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,462,191 >>> mbox cmd response: failed
2,462,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,462,197 >>> mbox cmd response: failed
2,462,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,462,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,130 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Manufacturing
85,804 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
893,293 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,418 UART: [kat] ++
897,570 UART: [kat] sha1
901,824 UART: [kat] SHA2-256
903,764 UART: [kat] SHA2-384
906,437 UART: [kat] SHA2-512-ACC
908,338 UART: [kat] ECC-384
918,803 UART: [kat] HMAC-384Kdf
923,371 UART: [kat] LMS
1,171,699 UART: [kat] --
1,172,416 UART: [cold-reset] ++
1,172,830 UART: [fht] FHT @ 0x50003400
1,175,499 UART: [idev] ++
1,175,667 UART: [idev] CDI.KEYID = 6
1,176,027 UART: [idev] SUBJECT.KEYID = 7
1,176,451 UART: [idev] UDS.KEYID = 0
1,176,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,747 UART: [idev] Erasing UDS.KEYID = 0
1,201,408 UART: [idev] Sha1 KeyId Algorithm
1,209,680 UART: [idev] --
1,210,740 UART: [ldev] ++
1,210,908 UART: [ldev] CDI.KEYID = 6
1,211,271 UART: [ldev] SUBJECT.KEYID = 5
1,211,697 UART: [ldev] AUTHORITY.KEYID = 7
1,212,160 UART: [ldev] FE.KEYID = 1
1,217,454 UART: [ldev] Erasing FE.KEYID = 1
1,243,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,512 UART: [ldev] --
1,282,949 UART: [fwproc] Wait for Commands...
1,283,537 UART: [fwproc] Recv command 0x46574c44
1,284,265 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,306 UART: ROM Fatal Error: 0x000B002C
2,609,465 >>> mbox cmd response: failed
2,609,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,471 >>> mbox cmd response: failed
2,609,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
893,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,436 UART: [kat] ++
897,588 UART: [kat] sha1
901,824 UART: [kat] SHA2-256
903,764 UART: [kat] SHA2-384
906,549 UART: [kat] SHA2-512-ACC
908,450 UART: [kat] ECC-384
917,617 UART: [kat] HMAC-384Kdf
922,351 UART: [kat] LMS
1,170,679 UART: [kat] --
1,171,400 UART: [cold-reset] ++
1,171,900 UART: [fht] FHT @ 0x50003400
1,174,597 UART: [idev] ++
1,174,765 UART: [idev] CDI.KEYID = 6
1,175,125 UART: [idev] SUBJECT.KEYID = 7
1,175,549 UART: [idev] UDS.KEYID = 0
1,175,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,523 UART: [idev] Erasing UDS.KEYID = 0
1,200,336 UART: [idev] Sha1 KeyId Algorithm
1,208,810 UART: [idev] --
1,209,724 UART: [ldev] ++
1,209,892 UART: [ldev] CDI.KEYID = 6
1,210,255 UART: [ldev] SUBJECT.KEYID = 5
1,210,681 UART: [ldev] AUTHORITY.KEYID = 7
1,211,144 UART: [ldev] FE.KEYID = 1
1,216,344 UART: [ldev] Erasing FE.KEYID = 1
1,241,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,788 UART: [ldev] --
1,281,087 UART: [fwproc] Wait for Commands...
1,281,697 UART: [fwproc] Recv command 0x46574c44
1,282,425 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,606 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,464 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,464,904 >>> mbox cmd response: failed
2,464,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,464,910 >>> mbox cmd response: failed
2,464,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,464,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,575 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Manufacturing
85,629 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
915,460 UART: [kat] HMAC-384Kdf
920,186 UART: [kat] LMS
1,168,498 UART: [kat] --
1,169,561 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,395 UART: [idev] Sha1 KeyId Algorithm
1,208,309 UART: [idev] --
1,209,380 UART: [ldev] ++
1,209,548 UART: [ldev] CDI.KEYID = 6
1,209,912 UART: [ldev] SUBJECT.KEYID = 5
1,210,339 UART: [ldev] AUTHORITY.KEYID = 7
1,210,802 UART: [ldev] FE.KEYID = 1
1,216,286 UART: [ldev] Erasing FE.KEYID = 1
1,242,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,854 UART: [ldev] --
1,282,348 UART: [fwproc] Wait for Commands...
1,283,139 UART: [fwproc] Recv command 0x46574c44
1,283,872 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,282 UART: ROM Fatal Error: 0x000B002C
2,608,441 >>> mbox cmd response: failed
2,608,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,447 >>> mbox cmd response: failed
2,608,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,468 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,353 UART: [cold-reset] ++
1,170,799 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,174,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,225 UART: [idev] Erasing UDS.KEYID = 0
1,200,031 UART: [idev] Sha1 KeyId Algorithm
1,208,885 UART: [idev] --
1,209,836 UART: [ldev] ++
1,210,004 UART: [ldev] CDI.KEYID = 6
1,210,368 UART: [ldev] SUBJECT.KEYID = 5
1,210,795 UART: [ldev] AUTHORITY.KEYID = 7
1,211,258 UART: [ldev] FE.KEYID = 1
1,216,166 UART: [ldev] Erasing FE.KEYID = 1
1,243,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,736 UART: [ldev] --
1,282,122 UART: [fwproc] Wait for Commands...
1,282,935 UART: [fwproc] Recv command 0x46574c44
1,283,668 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,202 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,517 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,459,740 >>> mbox cmd response: failed
2,459,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,746 >>> mbox cmd response: failed
2,459,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,838 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Manufacturing
85,718 UART: [state] DebugLocked = No
86,222 UART: [state] WD Timer not started. Device not locked for debugging
87,365 UART: [kat] SHA2-256
890,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,044 UART: [kat] ++
895,196 UART: [kat] sha1
899,528 UART: [kat] SHA2-256
901,468 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
915,917 UART: [kat] HMAC-384Kdf
920,559 UART: [kat] LMS
1,168,871 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,170,154 UART: [fht] FHT @ 0x50003400
1,172,684 UART: [idev] ++
1,172,852 UART: [idev] CDI.KEYID = 6
1,173,213 UART: [idev] SUBJECT.KEYID = 7
1,173,638 UART: [idev] UDS.KEYID = 0
1,173,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,514 UART: [idev] Erasing UDS.KEYID = 0
1,198,272 UART: [idev] Sha1 KeyId Algorithm
1,207,224 UART: [idev] --
1,208,317 UART: [ldev] ++
1,208,485 UART: [ldev] CDI.KEYID = 6
1,208,849 UART: [ldev] SUBJECT.KEYID = 5
1,209,276 UART: [ldev] AUTHORITY.KEYID = 7
1,209,739 UART: [ldev] FE.KEYID = 1
1,215,185 UART: [ldev] Erasing FE.KEYID = 1
1,241,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,803 UART: [ldev] --
1,281,099 UART: [fwproc] Wait for Commands...
1,281,690 UART: [fwproc] Recv command 0x46574c44
1,282,423 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,599 UART: ROM Fatal Error: 0x000B002C
2,606,758 >>> mbox cmd response: failed
2,606,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,764 >>> mbox cmd response: failed
2,606,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,770 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,827 UART: [state] LifecycleState = Unprovisioned
85,482 UART: [state] DebugLocked = No
86,038 UART: [state] WD Timer not started. Device not locked for debugging
87,203 UART: [kat] SHA2-256
890,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,882 UART: [kat] ++
895,034 UART: [kat] sha1
899,094 UART: [kat] SHA2-256
901,034 UART: [kat] SHA2-384
903,635 UART: [kat] SHA2-512-ACC
905,536 UART: [kat] ECC-384
915,847 UART: [kat] HMAC-384Kdf
920,381 UART: [kat] LMS
1,168,693 UART: [kat] --
1,169,310 UART: [cold-reset] ++
1,169,658 UART: [fht] FHT @ 0x50003400
1,172,250 UART: [idev] ++
1,172,418 UART: [idev] CDI.KEYID = 6
1,172,779 UART: [idev] SUBJECT.KEYID = 7
1,173,204 UART: [idev] UDS.KEYID = 0
1,173,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,656 UART: [idev] Erasing UDS.KEYID = 0
1,197,694 UART: [idev] Sha1 KeyId Algorithm
1,206,456 UART: [idev] --
1,207,601 UART: [ldev] ++
1,207,769 UART: [ldev] CDI.KEYID = 6
1,208,133 UART: [ldev] SUBJECT.KEYID = 5
1,208,560 UART: [ldev] AUTHORITY.KEYID = 7
1,209,023 UART: [ldev] FE.KEYID = 1
1,214,287 UART: [ldev] Erasing FE.KEYID = 1
1,241,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,907 UART: [ldev] --
1,280,279 UART: [fwproc] Wait for Commands...
1,280,904 UART: [fwproc] Recv command 0x46574c44
1,281,637 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,190 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,459,555 >>> mbox cmd response: failed
2,459,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,561 >>> mbox cmd response: failed
2,459,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,488 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,158 UART:
192,519 UART: Running Caliptra ROM ...
193,696 UART:
193,849 UART: [state] CFI Enabled
264,265 UART: [state] LifecycleState = Manufacturing
266,195 UART: [state] DebugLocked = No
268,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,692 UART: [kat] SHA2-256
443,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,953 UART: [kat] ++
454,486 UART: [kat] sha1
465,370 UART: [kat] SHA2-256
468,045 UART: [kat] SHA2-384
473,324 UART: [kat] SHA2-512-ACC
475,658 UART: [kat] ECC-384
2,765,578 UART: [kat] HMAC-384Kdf
2,798,169 UART: [kat] LMS
3,988,468 UART: [kat] --
3,992,215 UART: [cold-reset] ++
3,994,478 UART: [fht] Storing FHT @ 0x50003400
4,006,177 UART: [idev] ++
4,006,747 UART: [idev] CDI.KEYID = 6
4,007,634 UART: [idev] SUBJECT.KEYID = 7
4,008,908 UART: [idev] UDS.KEYID = 0
4,011,630 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,367 UART: [idev] Erasing UDS.KEYID = 0
7,347,727 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,091 UART: [idev] --
7,374,580 UART: [ldev] ++
7,375,150 UART: [ldev] CDI.KEYID = 6
7,376,090 UART: [ldev] SUBJECT.KEYID = 5
7,377,275 UART: [ldev] AUTHORITY.KEYID = 7
7,378,572 UART: [ldev] FE.KEYID = 1
7,419,782 UART: [ldev] Erasing FE.KEYID = 1
10,751,163 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,388 UART: [ldev] --
13,112,853 UART: [fwproc] Waiting for Commands...
13,115,819 UART: [fwproc] Received command 0x46574c44
13,118,014 UART: [fwproc] Received Image of size 114124 bytes
17,213,558 UART: ROM Fatal Error: 0x000B002E
17,216,956 >>> mbox cmd response: failed
17,217,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,217,703 >>> mbox cmd response: failed
17,217,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,218,287 >>> mbox cmd response: failed
Initializing fuses
2,056,534 writing to cptra_bootfsm_go
2,245,875 UART:
2,246,223 UART: Running Caliptra ROM ...
2,247,360 UART:
2,247,533 UART: [state] CFI Enabled
2,311,552 UART: [state] LifecycleState = Manufacturing
2,313,487 UART: [state] DebugLocked = No
2,314,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,895 UART: [kat] SHA2-256
2,489,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,127 UART: [kat] ++
2,500,586 UART: [kat] sha1
2,511,474 UART: [kat] SHA2-256
2,514,195 UART: [kat] SHA2-384
2,520,583 UART: [kat] SHA2-512-ACC
2,522,939 UART: [kat] ECC-384
4,811,682 UART: [kat] HMAC-384Kdf
4,843,573 UART: [kat] LMS
6,033,888 UART: [kat] --
6,037,995 UART: [cold-reset] ++
6,040,307 UART: [fht] Storing FHT @ 0x50003400
6,052,441 UART: [idev] ++
6,053,018 UART: [idev] CDI.KEYID = 6
6,053,905 UART: [idev] SUBJECT.KEYID = 7
6,055,174 UART: [idev] UDS.KEYID = 0
6,057,704 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,201,390 UART: [idev] Erasing UDS.KEYID = 0
9,389,109 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,115 UART: [idev] --
9,417,335 UART: [ldev] ++
9,417,912 UART: [ldev] CDI.KEYID = 6
9,418,889 UART: [ldev] SUBJECT.KEYID = 5
9,420,105 UART: [ldev] AUTHORITY.KEYID = 7
9,421,292 UART: [ldev] FE.KEYID = 1
9,465,212 UART: [ldev] Erasing FE.KEYID = 1
12,797,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,104,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,152,521 UART: [ldev] --
15,156,635 UART: [fwproc] Waiting for Commands...
15,159,677 UART: [fwproc] Received command 0x46574c44
15,161,870 UART: [fwproc] Received Image of size 114124 bytes
19,247,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,321,479 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,390,346 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,706,792 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,807,887 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,178,739 >>> mbox cmd response: failed
17,179,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,179,655 >>> mbox cmd response: failed
17,179,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,180,221 >>> mbox cmd response: failed
Initializing fuses
2,058,997 writing to cptra_bootfsm_go
5,851,203 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,976,428 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,539 UART:
192,902 UART: Running Caliptra ROM ...
194,043 UART:
603,700 UART: [state] CFI Enabled
618,143 UART: [state] LifecycleState = Manufacturing
620,087 UART: [state] DebugLocked = No
622,984 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,020 UART: [kat] SHA2-256
797,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,314 UART: [kat] ++
808,786 UART: [kat] sha1
820,526 UART: [kat] SHA2-256
823,208 UART: [kat] SHA2-384
830,498 UART: [kat] SHA2-512-ACC
832,848 UART: [kat] ECC-384
3,114,772 UART: [kat] HMAC-384Kdf
3,126,247 UART: [kat] LMS
4,316,372 UART: [kat] --
4,319,113 UART: [cold-reset] ++
4,320,498 UART: [fht] Storing FHT @ 0x50003400
4,332,248 UART: [idev] ++
4,332,817 UART: [idev] CDI.KEYID = 6
4,333,833 UART: [idev] SUBJECT.KEYID = 7
4,334,989 UART: [idev] UDS.KEYID = 0
4,337,672 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,125 UART: [idev] Erasing UDS.KEYID = 0
7,617,863 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,261 UART: [idev] --
7,642,940 UART: [ldev] ++
7,643,534 UART: [ldev] CDI.KEYID = 6
7,644,621 UART: [ldev] SUBJECT.KEYID = 5
7,645,743 UART: [ldev] AUTHORITY.KEYID = 7
7,646,982 UART: [ldev] FE.KEYID = 1
7,660,058 UART: [ldev] Erasing FE.KEYID = 1
10,948,587 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,718 UART: [ldev] --
13,307,008 UART: [fwproc] Waiting for Commands...
13,309,928 UART: [fwproc] Received command 0x46574c44
13,312,113 UART: [fwproc] Received Image of size 114124 bytes
17,398,642 UART: ROM Fatal Error: 0x000B002E
17,402,039 >>> mbox cmd response: failed
17,402,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,402,795 >>> mbox cmd response: failed
17,403,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,403,360 >>> mbox cmd response: failed
Initializing fuses
2,051,797 writing to cptra_bootfsm_go
2,241,127 UART:
2,241,467 UART: Running Caliptra ROM ...
2,242,599 UART:
3,051,976 UART: [state] CFI Enabled
3,066,393 UART: [state] LifecycleState = Manufacturing
3,068,301 UART: [state] DebugLocked = No
3,071,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,076,521 UART: [kat] SHA2-256
3,246,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,256,791 UART: [kat] ++
3,257,328 UART: [kat] sha1
3,268,006 UART: [kat] SHA2-256
3,270,699 UART: [kat] SHA2-384
3,276,196 UART: [kat] SHA2-512-ACC
3,278,543 UART: [kat] ECC-384
5,561,963 UART: [kat] HMAC-384Kdf
5,573,043 UART: [kat] LMS
6,763,170 UART: [kat] --
6,767,867 UART: [cold-reset] ++
6,769,213 UART: [fht] Storing FHT @ 0x50003400
6,780,267 UART: [idev] ++
6,780,830 UART: [idev] CDI.KEYID = 6
6,781,863 UART: [idev] SUBJECT.KEYID = 7
6,783,027 UART: [idev] UDS.KEYID = 0
6,785,337 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,928,740 UART: [idev] Erasing UDS.KEYID = 0
10,070,967 UART: [idev] Using Sha1 for KeyId Algorithm
10,092,585 UART: [idev] --
10,096,495 UART: [ldev] ++
10,097,070 UART: [ldev] CDI.KEYID = 6
10,098,095 UART: [ldev] SUBJECT.KEYID = 5
10,099,299 UART: [ldev] AUTHORITY.KEYID = 7
10,100,537 UART: [ldev] FE.KEYID = 1
10,112,710 UART: [ldev] Erasing FE.KEYID = 1
13,401,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,694,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,708,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,723,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,738,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,756,507 UART: [ldev] --
15,761,532 UART: [fwproc] Waiting for Commands...
15,763,293 UART: [fwproc] Received command 0x46574c44
15,765,491 UART: [fwproc] Received Image of size 114124 bytes
19,856,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,930,629 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,999,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,317,491 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
4,131,643 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,377,886 >>> mbox cmd response: failed
17,378,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,379,249 >>> mbox cmd response: failed
17,379,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,379,838 >>> mbox cmd response: failed
Initializing fuses
2,058,178 writing to cptra_bootfsm_go
6,613,864 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,586,840 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,192 UART:
192,556 UART: Running Caliptra ROM ...
193,649 UART:
193,790 UART: [state] CFI Enabled
262,987 UART: [state] LifecycleState = Manufacturing
264,858 UART: [state] DebugLocked = No
267,559 UART: [state] WD Timer not started. Device not locked for debugging
271,552 UART: [kat] SHA2-256
450,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,301 UART: [kat] ++
462,773 UART: [kat] sha1
473,490 UART: [kat] SHA2-256
476,553 UART: [kat] SHA2-384
482,206 UART: [kat] SHA2-512-ACC
485,206 UART: [kat] ECC-384
2,948,040 UART: [kat] HMAC-384Kdf
2,969,564 UART: [kat] LMS
3,499,021 UART: [kat] --
3,503,243 UART: [cold-reset] ++
3,505,444 UART: [fht] FHT @ 0x50003400
3,517,661 UART: [idev] ++
3,518,223 UART: [idev] CDI.KEYID = 6
3,519,236 UART: [idev] SUBJECT.KEYID = 7
3,520,335 UART: [idev] UDS.KEYID = 0
3,523,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,667,224 UART: [idev] Erasing UDS.KEYID = 0
6,023,309 UART: [idev] Sha1 KeyId Algorithm
6,047,574 UART: [idev] --
6,051,485 UART: [ldev] ++
6,052,119 UART: [ldev] CDI.KEYID = 6
6,053,042 UART: [ldev] SUBJECT.KEYID = 5
6,054,156 UART: [ldev] AUTHORITY.KEYID = 7
6,055,395 UART: [ldev] FE.KEYID = 1
6,097,965 UART: [ldev] Erasing FE.KEYID = 1
8,598,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,416 UART: [ldev] --
10,390,856 UART: [fwproc] Wait for Commands...
10,393,279 UART: [fwproc] Recv command 0x46574c44
10,395,342 UART: [fwproc] Recv'd Img size: 114448 bytes
13,828,409 UART: ROM Fatal Error: 0x000B002E
13,831,532 >>> mbox cmd response: failed
13,831,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,832,297 >>> mbox cmd response: failed
13,832,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,832,857 >>> mbox cmd response: failed
Initializing fuses
2,053,259 writing to cptra_bootfsm_go
2,242,558 UART:
2,242,902 UART: Running Caliptra ROM ...
2,243,965 UART:
2,244,115 UART: [state] CFI Enabled
2,307,131 UART: [state] LifecycleState = Manufacturing
2,309,009 UART: [state] DebugLocked = No
2,311,025 UART: [state] WD Timer not started. Device not locked for debugging
2,314,128 UART: [kat] SHA2-256
2,493,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,809 UART: [kat] ++
2,505,268 UART: [kat] sha1
2,515,610 UART: [kat] SHA2-256
2,518,623 UART: [kat] SHA2-384
2,524,019 UART: [kat] SHA2-512-ACC
2,526,965 UART: [kat] ECC-384
4,987,322 UART: [kat] HMAC-384Kdf
5,010,636 UART: [kat] LMS
5,540,108 UART: [kat] --
5,543,671 UART: [cold-reset] ++
5,544,525 UART: [fht] FHT @ 0x50003400
5,554,873 UART: [idev] ++
5,555,444 UART: [idev] CDI.KEYID = 6
5,556,358 UART: [idev] SUBJECT.KEYID = 7
5,557,571 UART: [idev] UDS.KEYID = 0
5,560,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,704,040 UART: [idev] Erasing UDS.KEYID = 0
8,065,929 UART: [idev] Sha1 KeyId Algorithm
8,088,892 UART: [idev] --
8,091,877 UART: [ldev] ++
8,092,467 UART: [ldev] CDI.KEYID = 6
8,093,377 UART: [ldev] SUBJECT.KEYID = 5
8,094,455 UART: [ldev] AUTHORITY.KEYID = 7
8,095,806 UART: [ldev] FE.KEYID = 1
8,140,092 UART: [ldev] Erasing FE.KEYID = 1
10,643,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,397,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,429,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,448,492 UART: [ldev] --
12,453,215 UART: [fwproc] Wait for Commands...
12,456,226 UART: [fwproc] Recv command 0x46574c44
12,458,313 UART: [fwproc] Recv'd Img size: 114448 bytes
15,891,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,960,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,029,215 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,347,776 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,366,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,622,207 >>> mbox cmd response: failed
13,622,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,623,171 >>> mbox cmd response: failed
13,623,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,623,804 >>> mbox cmd response: failed
Initializing fuses
2,048,867 writing to cptra_bootfsm_go
5,419,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,115,776 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,585 UART:
192,939 UART: Running Caliptra ROM ...
194,119 UART:
603,858 UART: [state] CFI Enabled
614,793 UART: [state] LifecycleState = Manufacturing
616,660 UART: [state] DebugLocked = No
618,905 UART: [state] WD Timer not started. Device not locked for debugging
622,404 UART: [kat] SHA2-256
801,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,109 UART: [kat] ++
813,640 UART: [kat] sha1
824,365 UART: [kat] SHA2-256
827,429 UART: [kat] SHA2-384
834,702 UART: [kat] SHA2-512-ACC
837,673 UART: [kat] ECC-384
3,279,718 UART: [kat] HMAC-384Kdf
3,292,244 UART: [kat] LMS
3,821,768 UART: [kat] --
3,825,386 UART: [cold-reset] ++
3,826,617 UART: [fht] FHT @ 0x50003400
3,838,153 UART: [idev] ++
3,838,717 UART: [idev] CDI.KEYID = 6
3,839,632 UART: [idev] SUBJECT.KEYID = 7
3,840,846 UART: [idev] UDS.KEYID = 0
3,843,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,726 UART: [idev] Erasing UDS.KEYID = 0
6,312,302 UART: [idev] Sha1 KeyId Algorithm
6,335,751 UART: [idev] --
6,339,045 UART: [ldev] ++
6,339,628 UART: [ldev] CDI.KEYID = 6
6,340,538 UART: [ldev] SUBJECT.KEYID = 5
6,341,696 UART: [ldev] AUTHORITY.KEYID = 7
6,342,926 UART: [ldev] FE.KEYID = 1
6,353,079 UART: [ldev] Erasing FE.KEYID = 1
8,823,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,846 UART: [ldev] --
10,615,580 UART: [fwproc] Wait for Commands...
10,617,955 UART: [fwproc] Recv command 0x46574c44
10,620,056 UART: [fwproc] Recv'd Img size: 114448 bytes
14,051,337 UART: ROM Fatal Error: 0x000B002E
14,054,473 >>> mbox cmd response: failed
14,054,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,055,197 >>> mbox cmd response: failed
14,055,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,055,909 >>> mbox cmd response: failed
Initializing fuses
2,052,760 writing to cptra_bootfsm_go
2,242,073 UART:
2,242,417 UART: Running Caliptra ROM ...
2,243,559 UART:
6,400,023 UART: [state] CFI Enabled
6,414,344 UART: [state] LifecycleState = Manufacturing
6,416,201 UART: [state] DebugLocked = No
6,418,942 UART: [state] WD Timer not started. Device not locked for debugging
6,422,027 UART: [kat] SHA2-256
6,601,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,612,698 UART: [kat] ++
6,613,157 UART: [kat] sha1
6,624,416 UART: [kat] SHA2-256
6,627,420 UART: [kat] SHA2-384
6,633,740 UART: [kat] SHA2-512-ACC
6,636,705 UART: [kat] ECC-384
9,079,608 UART: [kat] HMAC-384Kdf
9,090,381 UART: [kat] LMS
9,619,879 UART: [kat] --
9,624,084 UART: [cold-reset] ++
9,624,988 UART: [fht] FHT @ 0x50003400
9,636,665 UART: [idev] ++
9,637,228 UART: [idev] CDI.KEYID = 6
9,638,141 UART: [idev] SUBJECT.KEYID = 7
9,639,353 UART: [idev] UDS.KEYID = 0
9,641,925 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
9,785,773 UART: [idev] Erasing UDS.KEYID = 0
12,111,788 UART: [idev] Sha1 KeyId Algorithm
12,134,458 UART: [idev] --
12,137,371 UART: [ldev] ++
12,137,939 UART: [ldev] CDI.KEYID = 6
12,139,088 UART: [ldev] SUBJECT.KEYID = 5
12,140,230 UART: [ldev] AUTHORITY.KEYID = 7
12,141,409 UART: [ldev] FE.KEYID = 1
12,151,250 UART: [ldev] Erasing FE.KEYID = 1
14,621,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,340,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,356,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,372,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,388,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,408,804 UART: [ldev] --
16,413,419 UART: [fwproc] Wait for Commands...
16,416,166 UART: [fwproc] Recv command 0x46574c44
16,418,210 UART: [fwproc] Recv'd Img size: 114448 bytes
19,851,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,920,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,989,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
20,306,734 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,694,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,836,738 >>> mbox cmd response: failed
13,837,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,837,686 >>> mbox cmd response: failed
13,837,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,838,261 >>> mbox cmd response: failed
Initializing fuses
2,055,918 writing to cptra_bootfsm_go
9,726,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,337,758 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,441,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,323,559 >>> mbox cmd response: failed
14,324,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,324,478 >>> mbox cmd response: failed
14,324,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,325,040 >>> mbox cmd response: failed
Initializing fuses
2,057,206 writing to cptra_bootfsm_go
5,496,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,845,392 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
3,757,506 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,541,115 >>> mbox cmd response: failed
14,541,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,542,300 >>> mbox cmd response: failed
14,542,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,542,861 >>> mbox cmd response: failed
Initializing fuses
2,051,287 writing to cptra_bootfsm_go
9,077,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,323,694 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Manufacturing
85,785 UART: [state] DebugLocked = No
86,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,883 UART: [kat] SHA2-256
881,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,929 UART: [kat] ++
886,081 UART: [kat] sha1
890,377 UART: [kat] SHA2-256
892,315 UART: [kat] SHA2-384
895,078 UART: [kat] SHA2-512-ACC
896,979 UART: [kat] ECC-384
902,514 UART: [kat] HMAC-384Kdf
906,964 UART: [kat] LMS
1,475,160 UART: [kat] --
1,475,937 UART: [cold-reset] ++
1,476,447 UART: [fht] Storing FHT @ 0x50003400
1,479,210 UART: [idev] ++
1,479,378 UART: [idev] CDI.KEYID = 6
1,479,738 UART: [idev] SUBJECT.KEYID = 7
1,480,162 UART: [idev] UDS.KEYID = 0
1,480,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,280 UART: [idev] Erasing UDS.KEYID = 0
1,505,546 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,270 UART: [idev] --
1,515,169 UART: [ldev] ++
1,515,337 UART: [ldev] CDI.KEYID = 6
1,515,700 UART: [ldev] SUBJECT.KEYID = 5
1,516,126 UART: [ldev] AUTHORITY.KEYID = 7
1,516,589 UART: [ldev] FE.KEYID = 1
1,521,789 UART: [ldev] Erasing FE.KEYID = 1
1,547,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,620 UART: [ldev] --
1,587,077 UART: [fwproc] Waiting for Commands...
1,587,916 UART: [fwproc] Received command 0x46574c44
1,588,707 UART: [fwproc] Received Image of size 114448 bytes
2,912,492 UART: ROM Fatal Error: 0x000B002E
2,913,651 >>> mbox cmd response: failed
2,913,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,913,657 >>> mbox cmd response: failed
2,913,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,913,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,119 UART: [kat] SHA2-256
882,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,165 UART: [kat] ++
886,317 UART: [kat] sha1
890,617 UART: [kat] SHA2-256
892,555 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,546 UART: [kat] HMAC-384Kdf
907,220 UART: [kat] LMS
1,475,416 UART: [kat] --
1,476,377 UART: [cold-reset] ++
1,476,773 UART: [fht] Storing FHT @ 0x50003400
1,479,380 UART: [idev] ++
1,479,548 UART: [idev] CDI.KEYID = 6
1,479,908 UART: [idev] SUBJECT.KEYID = 7
1,480,332 UART: [idev] UDS.KEYID = 0
1,480,677 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,184 UART: [idev] Erasing UDS.KEYID = 0
1,504,558 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,118 UART: [idev] --
1,514,129 UART: [ldev] ++
1,514,297 UART: [ldev] CDI.KEYID = 6
1,514,660 UART: [ldev] SUBJECT.KEYID = 5
1,515,086 UART: [ldev] AUTHORITY.KEYID = 7
1,515,549 UART: [ldev] FE.KEYID = 1
1,520,981 UART: [ldev] Erasing FE.KEYID = 1
1,545,846 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,938 UART: [ldev] --
1,585,267 UART: [fwproc] Waiting for Commands...
1,585,926 UART: [fwproc] Received command 0x46574c44
1,586,717 UART: [fwproc] Received Image of size 114448 bytes
2,886,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,246 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,405 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,764,794 >>> mbox cmd response: failed
2,764,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,800 >>> mbox cmd response: failed
2,764,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,576 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Manufacturing
86,260 UART: [state] DebugLocked = No
86,958 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,634 UART: [kat] SHA2-256
882,565 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,680 UART: [kat] ++
886,832 UART: [kat] sha1
891,104 UART: [kat] SHA2-256
893,042 UART: [kat] SHA2-384
895,909 UART: [kat] SHA2-512-ACC
897,810 UART: [kat] ECC-384
903,455 UART: [kat] HMAC-384Kdf
908,241 UART: [kat] LMS
1,476,437 UART: [kat] --
1,477,384 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,477 UART: [idev] ++
1,480,645 UART: [idev] CDI.KEYID = 6
1,481,005 UART: [idev] SUBJECT.KEYID = 7
1,481,429 UART: [idev] UDS.KEYID = 0
1,481,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,321 UART: [idev] Erasing UDS.KEYID = 0
1,506,319 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,959 UART: [idev] --
1,516,138 UART: [ldev] ++
1,516,306 UART: [ldev] CDI.KEYID = 6
1,516,669 UART: [ldev] SUBJECT.KEYID = 5
1,517,095 UART: [ldev] AUTHORITY.KEYID = 7
1,517,558 UART: [ldev] FE.KEYID = 1
1,522,716 UART: [ldev] Erasing FE.KEYID = 1
1,548,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,751 UART: [ldev] --
1,588,104 UART: [fwproc] Waiting for Commands...
1,588,799 UART: [fwproc] Received command 0x46574c44
1,589,590 UART: [fwproc] Received Image of size 114448 bytes
2,913,227 UART: ROM Fatal Error: 0x000B002E
2,914,386 >>> mbox cmd response: failed
2,914,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,914,392 >>> mbox cmd response: failed
2,914,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,914,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,204 UART: [kat] SHA2-256
882,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,250 UART: [kat] ++
886,402 UART: [kat] sha1
890,720 UART: [kat] SHA2-256
892,658 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
903,087 UART: [kat] HMAC-384Kdf
907,735 UART: [kat] LMS
1,475,931 UART: [kat] --
1,476,802 UART: [cold-reset] ++
1,477,376 UART: [fht] Storing FHT @ 0x50003400
1,480,171 UART: [idev] ++
1,480,339 UART: [idev] CDI.KEYID = 6
1,480,699 UART: [idev] SUBJECT.KEYID = 7
1,481,123 UART: [idev] UDS.KEYID = 0
1,481,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,213 UART: [idev] Erasing UDS.KEYID = 0
1,506,337 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,987 UART: [idev] --
1,516,036 UART: [ldev] ++
1,516,204 UART: [ldev] CDI.KEYID = 6
1,516,567 UART: [ldev] SUBJECT.KEYID = 5
1,516,993 UART: [ldev] AUTHORITY.KEYID = 7
1,517,456 UART: [ldev] FE.KEYID = 1
1,522,610 UART: [ldev] Erasing FE.KEYID = 1
1,548,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,231 UART: [ldev] --
1,587,618 UART: [fwproc] Waiting for Commands...
1,588,257 UART: [fwproc] Received command 0x46574c44
1,589,048 UART: [fwproc] Received Image of size 114448 bytes
2,887,964 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,342 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,694 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,613 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,764,481 >>> mbox cmd response: failed
2,764,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,487 >>> mbox cmd response: failed
2,764,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,922 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,691 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Manufacturing
85,831 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
893,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,535 UART: [kat] ++
897,687 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,450 UART: [kat] SHA2-512-ACC
908,351 UART: [kat] ECC-384
918,186 UART: [kat] HMAC-384Kdf
922,734 UART: [kat] LMS
1,171,062 UART: [kat] --
1,172,023 UART: [cold-reset] ++
1,172,547 UART: [fht] FHT @ 0x50003400
1,175,318 UART: [idev] ++
1,175,486 UART: [idev] CDI.KEYID = 6
1,175,846 UART: [idev] SUBJECT.KEYID = 7
1,176,270 UART: [idev] UDS.KEYID = 0
1,176,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,506 UART: [idev] Erasing UDS.KEYID = 0
1,201,917 UART: [idev] Sha1 KeyId Algorithm
1,210,317 UART: [idev] --
1,211,361 UART: [ldev] ++
1,211,529 UART: [ldev] CDI.KEYID = 6
1,211,892 UART: [ldev] SUBJECT.KEYID = 5
1,212,318 UART: [ldev] AUTHORITY.KEYID = 7
1,212,781 UART: [ldev] FE.KEYID = 1
1,217,975 UART: [ldev] Erasing FE.KEYID = 1
1,244,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,167 UART: [ldev] --
1,283,594 UART: [fwproc] Wait for Commands...
1,284,266 UART: [fwproc] Recv command 0x46574c44
1,284,994 UART: [fwproc] Recv'd Img size: 114448 bytes
2,607,831 UART: ROM Fatal Error: 0x000B002E
2,608,990 >>> mbox cmd response: failed
2,608,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,996 >>> mbox cmd response: failed
2,608,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,578 UART: [state] LifecycleState = Unprovisioned
85,233 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
892,948 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,073 UART: [kat] ++
897,225 UART: [kat] sha1
901,609 UART: [kat] SHA2-256
903,549 UART: [kat] SHA2-384
906,172 UART: [kat] SHA2-512-ACC
908,073 UART: [kat] ECC-384
917,574 UART: [kat] HMAC-384Kdf
922,012 UART: [kat] LMS
1,170,340 UART: [kat] --
1,171,395 UART: [cold-reset] ++
1,171,785 UART: [fht] FHT @ 0x50003400
1,174,450 UART: [idev] ++
1,174,618 UART: [idev] CDI.KEYID = 6
1,174,978 UART: [idev] SUBJECT.KEYID = 7
1,175,402 UART: [idev] UDS.KEYID = 0
1,175,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,244 UART: [idev] Erasing UDS.KEYID = 0
1,200,263 UART: [idev] Sha1 KeyId Algorithm
1,208,499 UART: [idev] --
1,209,583 UART: [ldev] ++
1,209,751 UART: [ldev] CDI.KEYID = 6
1,210,114 UART: [ldev] SUBJECT.KEYID = 5
1,210,540 UART: [ldev] AUTHORITY.KEYID = 7
1,211,003 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,834 UART: [fwproc] Wait for Commands...
1,282,550 UART: [fwproc] Recv command 0x46574c44
1,283,278 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,161 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,463,719 >>> mbox cmd response: failed
2,463,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,463,725 >>> mbox cmd response: failed
2,463,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,463,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,874 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Manufacturing
85,784 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
901,898 UART: [kat] SHA2-256
903,838 UART: [kat] SHA2-384
906,669 UART: [kat] SHA2-512-ACC
908,570 UART: [kat] ECC-384
918,483 UART: [kat] HMAC-384Kdf
923,005 UART: [kat] LMS
1,171,333 UART: [kat] --
1,172,114 UART: [cold-reset] ++
1,172,504 UART: [fht] FHT @ 0x50003400
1,175,309 UART: [idev] ++
1,175,477 UART: [idev] CDI.KEYID = 6
1,175,837 UART: [idev] SUBJECT.KEYID = 7
1,176,261 UART: [idev] UDS.KEYID = 0
1,176,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,219 UART: [idev] Erasing UDS.KEYID = 0
1,201,888 UART: [idev] Sha1 KeyId Algorithm
1,210,208 UART: [idev] --
1,211,282 UART: [ldev] ++
1,211,450 UART: [ldev] CDI.KEYID = 6
1,211,813 UART: [ldev] SUBJECT.KEYID = 5
1,212,239 UART: [ldev] AUTHORITY.KEYID = 7
1,212,702 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,243,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,992 UART: [ldev] --
1,283,455 UART: [fwproc] Wait for Commands...
1,284,257 UART: [fwproc] Recv command 0x46574c44
1,284,985 UART: [fwproc] Recv'd Img size: 114448 bytes
2,609,678 UART: ROM Fatal Error: 0x000B002E
2,610,837 >>> mbox cmd response: failed
2,610,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,610,843 >>> mbox cmd response: failed
2,610,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,610,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
893,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,648 UART: [kat] ++
897,800 UART: [kat] sha1
902,060 UART: [kat] SHA2-256
904,000 UART: [kat] SHA2-384
906,717 UART: [kat] SHA2-512-ACC
908,618 UART: [kat] ECC-384
918,291 UART: [kat] HMAC-384Kdf
923,149 UART: [kat] LMS
1,171,477 UART: [kat] --
1,172,420 UART: [cold-reset] ++
1,172,754 UART: [fht] FHT @ 0x50003400
1,175,423 UART: [idev] ++
1,175,591 UART: [idev] CDI.KEYID = 6
1,175,951 UART: [idev] SUBJECT.KEYID = 7
1,176,375 UART: [idev] UDS.KEYID = 0
1,176,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,049 UART: [idev] Erasing UDS.KEYID = 0
1,201,296 UART: [idev] Sha1 KeyId Algorithm
1,209,832 UART: [idev] --
1,210,926 UART: [ldev] ++
1,211,094 UART: [ldev] CDI.KEYID = 6
1,211,457 UART: [ldev] SUBJECT.KEYID = 5
1,211,883 UART: [ldev] AUTHORITY.KEYID = 7
1,212,346 UART: [ldev] FE.KEYID = 1
1,217,342 UART: [ldev] Erasing FE.KEYID = 1
1,244,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,554 UART: [ldev] --
1,283,993 UART: [fwproc] Wait for Commands...
1,284,569 UART: [fwproc] Recv command 0x46574c44
1,285,297 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,912 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,464,352 >>> mbox cmd response: failed
2,464,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,464,358 >>> mbox cmd response: failed
2,464,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,464,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,971 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Manufacturing
85,729 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,069 UART: [kat] ++
895,221 UART: [kat] sha1
899,285 UART: [kat] SHA2-256
901,225 UART: [kat] SHA2-384
903,828 UART: [kat] SHA2-512-ACC
905,729 UART: [kat] ECC-384
914,978 UART: [kat] HMAC-384Kdf
919,574 UART: [kat] LMS
1,167,886 UART: [kat] --
1,168,683 UART: [cold-reset] ++
1,169,213 UART: [fht] FHT @ 0x50003400
1,171,885 UART: [idev] ++
1,172,053 UART: [idev] CDI.KEYID = 6
1,172,414 UART: [idev] SUBJECT.KEYID = 7
1,172,839 UART: [idev] UDS.KEYID = 0
1,173,185 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,929 UART: [idev] Erasing UDS.KEYID = 0
1,198,059 UART: [idev] Sha1 KeyId Algorithm
1,206,961 UART: [idev] --
1,208,084 UART: [ldev] ++
1,208,252 UART: [ldev] CDI.KEYID = 6
1,208,616 UART: [ldev] SUBJECT.KEYID = 5
1,209,043 UART: [ldev] AUTHORITY.KEYID = 7
1,209,506 UART: [ldev] FE.KEYID = 1
1,214,740 UART: [ldev] Erasing FE.KEYID = 1
1,240,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,018 UART: [ldev] --
1,280,388 UART: [fwproc] Wait for Commands...
1,281,199 UART: [fwproc] Recv command 0x46574c44
1,281,932 UART: [fwproc] Recv'd Img size: 114448 bytes
2,605,078 UART: ROM Fatal Error: 0x000B002E
2,606,237 >>> mbox cmd response: failed
2,606,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,243 >>> mbox cmd response: failed
2,606,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,186 UART: [kat] SHA2-512-ACC
906,087 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,376 UART: [kat] LMS
1,168,688 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,169,903 UART: [fht] FHT @ 0x50003400
1,172,409 UART: [idev] ++
1,172,577 UART: [idev] CDI.KEYID = 6
1,172,938 UART: [idev] SUBJECT.KEYID = 7
1,173,363 UART: [idev] UDS.KEYID = 0
1,173,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,083 UART: [idev] Erasing UDS.KEYID = 0
1,197,821 UART: [idev] Sha1 KeyId Algorithm
1,206,707 UART: [idev] --
1,207,796 UART: [ldev] ++
1,207,964 UART: [ldev] CDI.KEYID = 6
1,208,328 UART: [ldev] SUBJECT.KEYID = 5
1,208,755 UART: [ldev] AUTHORITY.KEYID = 7
1,209,218 UART: [ldev] FE.KEYID = 1
1,214,852 UART: [ldev] Erasing FE.KEYID = 1
1,240,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,978 UART: [ldev] --
1,280,384 UART: [fwproc] Wait for Commands...
1,281,037 UART: [fwproc] Recv command 0x46574c44
1,281,770 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,980 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,289 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,275 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,090 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,458,898 >>> mbox cmd response: failed
2,458,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,904 >>> mbox cmd response: failed
2,458,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,313 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Manufacturing
86,206 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
900,138 UART: [kat] SHA2-256
902,078 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,697 UART: [kat] HMAC-384Kdf
921,203 UART: [kat] LMS
1,169,515 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,568 UART: [fht] FHT @ 0x50003400
1,173,096 UART: [idev] ++
1,173,264 UART: [idev] CDI.KEYID = 6
1,173,625 UART: [idev] SUBJECT.KEYID = 7
1,174,050 UART: [idev] UDS.KEYID = 0
1,174,396 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,216,025 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,265 UART: [ldev] --
1,281,563 UART: [fwproc] Wait for Commands...
1,282,274 UART: [fwproc] Recv command 0x46574c44
1,283,007 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,799 UART: ROM Fatal Error: 0x000B002E
2,607,958 >>> mbox cmd response: failed
2,607,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,607,964 >>> mbox cmd response: failed
2,607,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,607,970 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,170,300 UART: [cold-reset] ++
1,170,812 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,174,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,938 UART: [idev] Erasing UDS.KEYID = 0
1,198,738 UART: [idev] Sha1 KeyId Algorithm
1,207,600 UART: [idev] --
1,208,527 UART: [ldev] ++
1,208,695 UART: [ldev] CDI.KEYID = 6
1,209,059 UART: [ldev] SUBJECT.KEYID = 5
1,209,486 UART: [ldev] AUTHORITY.KEYID = 7
1,209,949 UART: [ldev] FE.KEYID = 1
1,214,895 UART: [ldev] Erasing FE.KEYID = 1
1,241,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,803 UART: [ldev] --
1,281,183 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,721 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,983 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,336 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,458,251 >>> mbox cmd response: failed
2,458,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,257 >>> mbox cmd response: failed
2,458,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,747 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,532 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
4,878,739 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,618,640 >>> mbox cmd response: failed
16,619,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,619,661 >>> mbox cmd response: failed
16,619,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,620,222 >>> mbox cmd response: failed
Initializing fuses
2,056,608 writing to cptra_bootfsm_go
6,929,421 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,512,923 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
4,879,575 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,662,728 >>> mbox cmd response: failed
16,663,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,663,691 >>> mbox cmd response: failed
16,663,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,664,256 >>> mbox cmd response: failed
Initializing fuses
2,069,318 writing to cptra_bootfsm_go
6,945,347 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,521,743 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
5,183,983 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,792,117 >>> mbox cmd response: failed
16,792,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,792,939 >>> mbox cmd response: failed
16,793,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,793,509 >>> mbox cmd response: failed
Initializing fuses
2,057,900 writing to cptra_bootfsm_go
8,258,552 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,696,454 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
5,184,474 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,793,045 >>> mbox cmd response: failed
16,793,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,794,214 >>> mbox cmd response: failed
16,794,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,794,777 >>> mbox cmd response: failed
Initializing fuses
2,059,634 writing to cptra_bootfsm_go
8,259,048 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,703,698 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
3,440,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,389,555 >>> mbox cmd response: failed
12,390,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,390,638 >>> mbox cmd response: failed
12,390,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,391,196 >>> mbox cmd response: failed
Initializing fuses
2,055,224 writing to cptra_bootfsm_go
5,505,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,295,972 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,463,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,428,546 >>> mbox cmd response: failed
12,429,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,429,912 >>> mbox cmd response: failed
12,430,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,430,474 >>> mbox cmd response: failed
Initializing fuses
2,054,696 writing to cptra_bootfsm_go
5,476,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,281,268 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,784,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,636,943 >>> mbox cmd response: failed
12,637,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,637,913 >>> mbox cmd response: failed
12,638,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,638,495 >>> mbox cmd response: failed
Initializing fuses
2,058,792 writing to cptra_bootfsm_go
11,005,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,724,643 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,783,889 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,639,613 >>> mbox cmd response: failed
12,640,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,640,688 >>> mbox cmd response: failed
12,640,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,641,248 >>> mbox cmd response: failed
Initializing fuses
2,061,226 writing to cptra_bootfsm_go
11,014,792 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,738,354 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,466,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,415,777 >>> mbox cmd response: failed
12,416,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,416,961 >>> mbox cmd response: failed
12,417,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,417,521 >>> mbox cmd response: failed
Initializing fuses
2,059,485 writing to cptra_bootfsm_go
5,511,541 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,362,046 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,786,656 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,628,784 >>> mbox cmd response: failed
12,629,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,629,961 >>> mbox cmd response: failed
12,630,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,630,551 >>> mbox cmd response: failed
Initializing fuses
2,062,608 writing to cptra_bootfsm_go
11,018,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,745,013 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,145 >>> mbox cmd response: failed
1,203,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,151 >>> mbox cmd response: failed
1,203,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,933 UART: [kat] SHA2-256
881,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,979 UART: [kat] ++
886,131 UART: [kat] sha1
890,463 UART: [kat] SHA2-256
892,401 UART: [kat] SHA2-384
895,242 UART: [kat] SHA2-512-ACC
897,143 UART: [kat] ECC-384
902,768 UART: [kat] HMAC-384Kdf
907,320 UART: [kat] LMS
1,475,516 UART: [kat] --
1,476,415 UART: [cold-reset] ++
1,476,931 UART: [fht] Storing FHT @ 0x50003400
1,479,794 UART: [idev] ++
1,479,962 UART: [idev] CDI.KEYID = 6
1,480,322 UART: [idev] SUBJECT.KEYID = 7
1,480,746 UART: [idev] UDS.KEYID = 0
1,481,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,484 UART: [idev] Erasing UDS.KEYID = 0
1,505,038 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,606 UART: [idev] --
1,514,609 UART: [ldev] ++
1,514,777 UART: [ldev] CDI.KEYID = 6
1,515,140 UART: [ldev] SUBJECT.KEYID = 5
1,515,566 UART: [ldev] AUTHORITY.KEYID = 7
1,516,029 UART: [ldev] FE.KEYID = 1
1,521,379 UART: [ldev] Erasing FE.KEYID = 1
1,547,046 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,076 UART: [ldev] --
1,586,381 UART: [fwproc] Waiting for Commands...
1,587,170 UART: [fwproc] Received command 0x46574c44
1,587,961 UART: [fwproc] Received Image of size 114448 bytes
2,886,047 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,745 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,097 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,254 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,201,551 >>> mbox cmd response: failed
1,201,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,557 >>> mbox cmd response: failed
1,201,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,270 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,272 >>> mbox cmd response: failed
1,203,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,278 >>> mbox cmd response: failed
1,203,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,953 UART: [state] LifecycleState = Unprovisioned
85,608 UART: [state] DebugLocked = No
86,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,766 UART: [kat] SHA2-256
881,697 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,812 UART: [kat] ++
885,964 UART: [kat] sha1
890,322 UART: [kat] SHA2-256
892,260 UART: [kat] SHA2-384
895,053 UART: [kat] SHA2-512-ACC
896,954 UART: [kat] ECC-384
902,723 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,432 UART: [cold-reset] ++
1,476,978 UART: [fht] Storing FHT @ 0x50003400
1,479,707 UART: [idev] ++
1,479,875 UART: [idev] CDI.KEYID = 6
1,480,235 UART: [idev] SUBJECT.KEYID = 7
1,480,659 UART: [idev] UDS.KEYID = 0
1,481,004 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,693 UART: [idev] Erasing UDS.KEYID = 0
1,505,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,783 UART: [idev] --
1,514,800 UART: [ldev] ++
1,514,968 UART: [ldev] CDI.KEYID = 6
1,515,331 UART: [ldev] SUBJECT.KEYID = 5
1,515,757 UART: [ldev] AUTHORITY.KEYID = 7
1,516,220 UART: [ldev] FE.KEYID = 1
1,521,442 UART: [ldev] Erasing FE.KEYID = 1
1,546,839 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,847 UART: [ldev] --
1,586,358 UART: [fwproc] Waiting for Commands...
1,587,025 UART: [fwproc] Received command 0x46574c44
1,587,816 UART: [fwproc] Received Image of size 114448 bytes
2,887,020 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,657 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,346 >>> mbox cmd response: failed
1,203,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,352 >>> mbox cmd response: failed
1,203,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,358 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,996 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,361 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,202,893 >>> mbox cmd response: failed
1,202,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,899 >>> mbox cmd response: failed
1,202,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,218 UART: [kat] SHA2-256
892,868 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,993 UART: [kat] ++
897,145 UART: [kat] sha1
901,423 UART: [kat] SHA2-256
903,363 UART: [kat] SHA2-384
905,986 UART: [kat] SHA2-512-ACC
907,887 UART: [kat] ECC-384
917,540 UART: [kat] HMAC-384Kdf
922,026 UART: [kat] LMS
1,170,354 UART: [kat] --
1,171,011 UART: [cold-reset] ++
1,171,583 UART: [fht] FHT @ 0x50003400
1,174,300 UART: [idev] ++
1,174,468 UART: [idev] CDI.KEYID = 6
1,174,828 UART: [idev] SUBJECT.KEYID = 7
1,175,252 UART: [idev] UDS.KEYID = 0
1,175,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,368 UART: [idev] Erasing UDS.KEYID = 0
1,200,589 UART: [idev] Sha1 KeyId Algorithm
1,209,023 UART: [idev] --
1,209,985 UART: [ldev] ++
1,210,153 UART: [ldev] CDI.KEYID = 6
1,210,516 UART: [ldev] SUBJECT.KEYID = 5
1,210,942 UART: [ldev] AUTHORITY.KEYID = 7
1,211,405 UART: [ldev] FE.KEYID = 1
1,216,831 UART: [ldev] Erasing FE.KEYID = 1
1,243,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,849 UART: [ldev] --
1,282,202 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,692 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,061 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,200,853 >>> mbox cmd response: failed
1,200,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,859 >>> mbox cmd response: failed
1,200,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,865 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,768 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,598 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,648 >>> mbox cmd response: failed
1,203,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,654 >>> mbox cmd response: failed
1,203,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,186 UART: [state] WD Timer not started. Device not locked for debugging
87,447 UART: [kat] SHA2-256
893,097 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,222 UART: [kat] ++
897,374 UART: [kat] sha1
901,594 UART: [kat] SHA2-256
903,534 UART: [kat] SHA2-384
906,371 UART: [kat] SHA2-512-ACC
908,272 UART: [kat] ECC-384
918,459 UART: [kat] HMAC-384Kdf
922,967 UART: [kat] LMS
1,171,295 UART: [kat] --
1,172,288 UART: [cold-reset] ++
1,172,784 UART: [fht] FHT @ 0x50003400
1,175,529 UART: [idev] ++
1,175,697 UART: [idev] CDI.KEYID = 6
1,176,057 UART: [idev] SUBJECT.KEYID = 7
1,176,481 UART: [idev] UDS.KEYID = 0
1,176,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,779 UART: [idev] Erasing UDS.KEYID = 0
1,201,878 UART: [idev] Sha1 KeyId Algorithm
1,210,270 UART: [idev] --
1,211,264 UART: [ldev] ++
1,211,432 UART: [ldev] CDI.KEYID = 6
1,211,795 UART: [ldev] SUBJECT.KEYID = 5
1,212,221 UART: [ldev] AUTHORITY.KEYID = 7
1,212,684 UART: [ldev] FE.KEYID = 1
1,218,032 UART: [ldev] Erasing FE.KEYID = 1
1,244,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,506 UART: [ldev] --
1,283,979 UART: [fwproc] Wait for Commands...
1,284,693 UART: [fwproc] Recv command 0x46574c44
1,285,421 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,016 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,202,826 >>> mbox cmd response: failed
1,202,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,832 >>> mbox cmd response: failed
1,202,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,838 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,166 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,551 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,202,039 >>> mbox cmd response: failed
1,202,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,045 >>> mbox cmd response: failed
1,202,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
890,860 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,989 UART: [kat] ++
895,141 UART: [kat] sha1
899,443 UART: [kat] SHA2-256
901,383 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,790 UART: [kat] HMAC-384Kdf
920,314 UART: [kat] LMS
1,168,626 UART: [kat] --
1,169,573 UART: [cold-reset] ++
1,169,937 UART: [fht] FHT @ 0x50003400
1,172,455 UART: [idev] ++
1,172,623 UART: [idev] CDI.KEYID = 6
1,172,984 UART: [idev] SUBJECT.KEYID = 7
1,173,409 UART: [idev] UDS.KEYID = 0
1,173,755 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,113 UART: [idev] Erasing UDS.KEYID = 0
1,198,051 UART: [idev] Sha1 KeyId Algorithm
1,206,931 UART: [idev] --
1,208,120 UART: [ldev] ++
1,208,288 UART: [ldev] CDI.KEYID = 6
1,208,652 UART: [ldev] SUBJECT.KEYID = 5
1,209,079 UART: [ldev] AUTHORITY.KEYID = 7
1,209,542 UART: [ldev] FE.KEYID = 1
1,214,594 UART: [ldev] Erasing FE.KEYID = 1
1,241,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,792 UART: [ldev] --
1,280,258 UART: [fwproc] Wait for Commands...
1,281,053 UART: [fwproc] Recv command 0x46574c44
1,281,786 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,269 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,759 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,202,803 >>> mbox cmd response: failed
1,202,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,809 >>> mbox cmd response: failed
1,202,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,815 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,834 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,971 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,203,088 >>> mbox cmd response: failed
1,203,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,094 >>> mbox cmd response: failed
1,203,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,232 UART: [kat] SHA2-256
902,172 UART: [kat] SHA2-384
904,917 UART: [kat] SHA2-512-ACC
906,818 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
921,015 UART: [kat] LMS
1,169,327 UART: [kat] --
1,170,170 UART: [cold-reset] ++
1,170,694 UART: [fht] FHT @ 0x50003400
1,173,354 UART: [idev] ++
1,173,522 UART: [idev] CDI.KEYID = 6
1,173,883 UART: [idev] SUBJECT.KEYID = 7
1,174,308 UART: [idev] UDS.KEYID = 0
1,174,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,396 UART: [idev] Erasing UDS.KEYID = 0
1,199,992 UART: [idev] Sha1 KeyId Algorithm
1,208,884 UART: [idev] --
1,209,927 UART: [ldev] ++
1,210,095 UART: [ldev] CDI.KEYID = 6
1,210,459 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,605 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,657 UART: [ldev] --
1,281,989 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,449 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,042 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,128 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,202,564 >>> mbox cmd response: failed
1,202,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,570 >>> mbox cmd response: failed
1,202,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,844 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,062 UART:
192,454 UART: Running Caliptra ROM ...
193,563 UART:
193,705 UART: [state] CFI Enabled
263,548 UART: [state] LifecycleState = Unprovisioned
265,453 UART: [state] DebugLocked = No
267,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,862 UART: [kat] SHA2-256
442,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,103 UART: [kat] ++
453,555 UART: [kat] sha1
464,433 UART: [kat] SHA2-256
467,086 UART: [kat] SHA2-384
472,744 UART: [kat] SHA2-512-ACC
475,135 UART: [kat] ECC-384
2,768,034 UART: [kat] HMAC-384Kdf
2,801,171 UART: [kat] LMS
3,991,460 UART: [kat] --
3,996,300 UART: [cold-reset] ++
3,998,836 UART: [fht] Storing FHT @ 0x50003400
4,009,779 UART: [idev] ++
4,010,358 UART: [idev] CDI.KEYID = 6
4,011,287 UART: [idev] SUBJECT.KEYID = 7
4,012,506 UART: [idev] UDS.KEYID = 0
4,015,032 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,798 UART: [idev] Erasing UDS.KEYID = 0
7,346,819 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,605 UART: [idev] --
7,372,788 UART: [ldev] ++
7,373,362 UART: [ldev] CDI.KEYID = 6
7,374,329 UART: [ldev] SUBJECT.KEYID = 5
7,375,544 UART: [ldev] AUTHORITY.KEYID = 7
7,376,773 UART: [ldev] FE.KEYID = 1
7,422,656 UART: [ldev] Erasing FE.KEYID = 1
10,759,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,743 UART: [ldev] --
13,139,170 UART: [fwproc] Waiting for Commands...
13,141,321 UART: [fwproc] Received command 0x46574c44
13,143,507 UART: [fwproc] Received Image of size 114124 bytes
15,848,758 UART: ROM Fatal Error: 0x000B0012
15,852,244 >>> mbox cmd response: failed
15,852,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,853,029 >>> mbox cmd response: failed
15,853,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,853,591 >>> mbox cmd response: failed
Initializing fuses
2,061,132 writing to cptra_bootfsm_go
2,250,470 UART:
2,250,821 UART: Running Caliptra ROM ...
2,251,902 UART:
2,252,066 UART: [state] CFI Enabled
2,310,429 UART: [state] LifecycleState = Unprovisioned
2,312,372 UART: [state] DebugLocked = No
2,313,772 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,431 UART: [kat] SHA2-256
2,488,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,662 UART: [kat] ++
2,499,124 UART: [kat] sha1
2,509,139 UART: [kat] SHA2-256
2,511,827 UART: [kat] SHA2-384
2,518,958 UART: [kat] SHA2-512-ACC
2,521,315 UART: [kat] ECC-384
4,812,655 UART: [kat] HMAC-384Kdf
4,844,717 UART: [kat] LMS
6,035,034 UART: [kat] --
6,040,403 UART: [cold-reset] ++
6,041,317 UART: [fht] Storing FHT @ 0x50003400
6,054,456 UART: [idev] ++
6,055,021 UART: [idev] CDI.KEYID = 6
6,055,959 UART: [idev] SUBJECT.KEYID = 7
6,057,251 UART: [idev] UDS.KEYID = 0
6,059,441 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,203,085 UART: [idev] Erasing UDS.KEYID = 0
9,391,054 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,743 UART: [idev] --
9,417,804 UART: [ldev] ++
9,418,382 UART: [ldev] CDI.KEYID = 6
9,419,324 UART: [ldev] SUBJECT.KEYID = 5
9,420,586 UART: [ldev] AUTHORITY.KEYID = 7
9,421,744 UART: [ldev] FE.KEYID = 1
9,466,387 UART: [ldev] Erasing FE.KEYID = 1
12,797,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,156,424 UART: [ldev] --
15,160,944 UART: [fwproc] Waiting for Commands...
15,163,153 UART: [fwproc] Received command 0x46574c44
15,165,349 UART: [fwproc] Received Image of size 114124 bytes
19,222,942 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,304,199 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,373,066 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,690,969 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,786,422 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,525,752 >>> mbox cmd response: failed
15,526,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,527,042 >>> mbox cmd response: failed
15,527,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,527,615 >>> mbox cmd response: failed
Initializing fuses
2,056,188 writing to cptra_bootfsm_go
5,831,287 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,888,498 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,538 UART:
192,904 UART: Running Caliptra ROM ...
194,096 UART:
603,588 UART: [state] CFI Enabled
618,557 UART: [state] LifecycleState = Unprovisioned
620,518 UART: [state] DebugLocked = No
622,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,619 UART: [kat] SHA2-256
796,362 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,898 UART: [kat] ++
807,352 UART: [kat] sha1
818,066 UART: [kat] SHA2-256
820,759 UART: [kat] SHA2-384
826,250 UART: [kat] SHA2-512-ACC
828,644 UART: [kat] ECC-384
3,113,362 UART: [kat] HMAC-384Kdf
3,126,341 UART: [kat] LMS
4,316,431 UART: [kat] --
4,320,980 UART: [cold-reset] ++
4,322,976 UART: [fht] Storing FHT @ 0x50003400
4,333,759 UART: [idev] ++
4,334,328 UART: [idev] CDI.KEYID = 6
4,335,292 UART: [idev] SUBJECT.KEYID = 7
4,336,563 UART: [idev] UDS.KEYID = 0
4,339,106 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,571 UART: [idev] Erasing UDS.KEYID = 0
7,620,247 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,127 UART: [idev] --
7,647,176 UART: [ldev] ++
7,647,744 UART: [ldev] CDI.KEYID = 6
7,648,762 UART: [ldev] SUBJECT.KEYID = 5
7,649,921 UART: [ldev] AUTHORITY.KEYID = 7
7,651,206 UART: [ldev] FE.KEYID = 1
7,662,972 UART: [ldev] Erasing FE.KEYID = 1
10,954,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,137 UART: [ldev] --
13,316,459 UART: [fwproc] Waiting for Commands...
13,319,015 UART: [fwproc] Received command 0x46574c44
13,321,209 UART: [fwproc] Received Image of size 114124 bytes
16,020,152 UART: ROM Fatal Error: 0x000B0012
16,023,679 >>> mbox cmd response: failed
16,024,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,418 >>> mbox cmd response: failed
16,024,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,983 >>> mbox cmd response: failed
Initializing fuses
2,054,649 writing to cptra_bootfsm_go
2,243,916 UART:
2,244,276 UART: Running Caliptra ROM ...
2,245,417 UART:
4,451,037 UART: [state] CFI Enabled
4,464,589 UART: [state] LifecycleState = Unprovisioned
4,466,507 UART: [state] DebugLocked = No
4,468,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,473,891 UART: [kat] SHA2-256
4,643,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,654,172 UART: [kat] ++
4,654,819 UART: [kat] sha1
4,666,957 UART: [kat] SHA2-256
4,669,658 UART: [kat] SHA2-384
4,675,543 UART: [kat] SHA2-512-ACC
4,677,903 UART: [kat] ECC-384
6,962,908 UART: [kat] HMAC-384Kdf
6,973,731 UART: [kat] LMS
8,163,857 UART: [kat] --
8,170,279 UART: [cold-reset] ++
8,172,610 UART: [fht] Storing FHT @ 0x50003400
8,183,349 UART: [idev] ++
8,183,915 UART: [idev] CDI.KEYID = 6
8,184,984 UART: [idev] SUBJECT.KEYID = 7
8,186,125 UART: [idev] UDS.KEYID = 0
8,188,540 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,331,831 UART: [idev] Erasing UDS.KEYID = 0
11,471,400 UART: [idev] Using Sha1 for KeyId Algorithm
11,493,421 UART: [idev] --
11,497,199 UART: [ldev] ++
11,497,764 UART: [ldev] CDI.KEYID = 6
11,498,777 UART: [ldev] SUBJECT.KEYID = 5
11,499,966 UART: [ldev] AUTHORITY.KEYID = 7
11,501,203 UART: [ldev] FE.KEYID = 1
11,511,269 UART: [ldev] Erasing FE.KEYID = 1
14,800,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,092,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,106,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,121,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,136,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,155,331 UART: [ldev] --
17,159,526 UART: [fwproc] Waiting for Commands...
17,161,303 UART: [fwproc] Received command 0x46574c44
17,163,490 UART: [fwproc] Received Image of size 114124 bytes
21,213,979 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,286,099 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,354,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,672,213 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,127,336 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,762,119 >>> mbox cmd response: failed
15,762,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,763,079 >>> mbox cmd response: failed
15,763,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,763,647 >>> mbox cmd response: failed
Initializing fuses
2,055,656 writing to cptra_bootfsm_go
8,230,916 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,172,184 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,134 UART:
192,504 UART: Running Caliptra ROM ...
193,725 UART:
193,870 UART: [state] CFI Enabled
265,055 UART: [state] LifecycleState = Unprovisioned
266,929 UART: [state] DebugLocked = No
268,256 UART: [state] WD Timer not started. Device not locked for debugging
271,158 UART: [kat] SHA2-256
450,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,813 UART: [kat] ++
462,319 UART: [kat] sha1
473,952 UART: [kat] SHA2-256
477,012 UART: [kat] SHA2-384
482,346 UART: [kat] SHA2-512-ACC
485,331 UART: [kat] ECC-384
2,949,512 UART: [kat] HMAC-384Kdf
2,971,258 UART: [kat] LMS
3,500,690 UART: [kat] --
3,505,990 UART: [cold-reset] ++
3,508,408 UART: [fht] FHT @ 0x50003400
3,519,385 UART: [idev] ++
3,519,955 UART: [idev] CDI.KEYID = 6
3,520,866 UART: [idev] SUBJECT.KEYID = 7
3,522,084 UART: [idev] UDS.KEYID = 0
3,524,493 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,649 UART: [idev] Erasing UDS.KEYID = 0
6,024,788 UART: [idev] Sha1 KeyId Algorithm
6,047,810 UART: [idev] --
6,052,106 UART: [ldev] ++
6,052,690 UART: [ldev] CDI.KEYID = 6
6,053,601 UART: [ldev] SUBJECT.KEYID = 5
6,054,709 UART: [ldev] AUTHORITY.KEYID = 7
6,056,058 UART: [ldev] FE.KEYID = 1
6,099,173 UART: [ldev] Erasing FE.KEYID = 1
8,600,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,491 UART: [ldev] --
10,393,777 UART: [fwproc] Wait for Commands...
10,395,989 UART: [fwproc] Recv command 0x46574c44
10,398,088 UART: [fwproc] Recv'd Img size: 114448 bytes
12,449,409 UART: ROM Fatal Error: 0x000B0012
12,452,529 >>> mbox cmd response: failed
12,452,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,453,164 >>> mbox cmd response: failed
12,453,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,453,829 >>> mbox cmd response: failed
Initializing fuses
2,053,323 writing to cptra_bootfsm_go
2,242,633 UART:
2,242,994 UART: Running Caliptra ROM ...
2,244,130 UART:
2,244,323 UART: [state] CFI Enabled
2,314,935 UART: [state] LifecycleState = Unprovisioned
2,316,817 UART: [state] DebugLocked = No
2,319,617 UART: [state] WD Timer not started. Device not locked for debugging
2,322,507 UART: [kat] SHA2-256
2,501,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,180 UART: [kat] ++
2,513,640 UART: [kat] sha1
2,525,766 UART: [kat] SHA2-256
2,528,835 UART: [kat] SHA2-384
2,534,820 UART: [kat] SHA2-512-ACC
2,537,766 UART: [kat] ECC-384
4,996,862 UART: [kat] HMAC-384Kdf
5,018,987 UART: [kat] LMS
5,548,422 UART: [kat] --
5,552,893 UART: [cold-reset] ++
5,554,029 UART: [fht] FHT @ 0x50003400
5,565,204 UART: [idev] ++
5,565,764 UART: [idev] CDI.KEYID = 6
5,566,643 UART: [idev] SUBJECT.KEYID = 7
5,567,856 UART: [idev] UDS.KEYID = 0
5,570,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,714,345 UART: [idev] Erasing UDS.KEYID = 0
8,076,420 UART: [idev] Sha1 KeyId Algorithm
8,101,057 UART: [idev] --
8,105,597 UART: [ldev] ++
8,106,162 UART: [ldev] CDI.KEYID = 6
8,107,050 UART: [ldev] SUBJECT.KEYID = 5
8,108,269 UART: [ldev] AUTHORITY.KEYID = 7
8,109,451 UART: [ldev] FE.KEYID = 1
8,147,310 UART: [ldev] Erasing FE.KEYID = 1
10,650,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,368,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,384,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,400,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,415,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,436,319 UART: [ldev] --
12,441,743 UART: [fwproc] Wait for Commands...
12,444,375 UART: [fwproc] Recv command 0x46574c44
12,446,467 UART: [fwproc] Recv'd Img size: 114448 bytes
15,852,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,925,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,993,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,313,024 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,383,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,228,155 >>> mbox cmd response: failed
12,228,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,229,094 >>> mbox cmd response: failed
12,229,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,229,688 >>> mbox cmd response: failed
Initializing fuses
2,063,081 writing to cptra_bootfsm_go
5,440,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,145,597 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,491 writing to cptra_bootfsm_go
192,608 UART:
192,961 UART: Running Caliptra ROM ...
194,172 UART:
603,736 UART: [state] CFI Enabled
617,782 UART: [state] LifecycleState = Unprovisioned
619,659 UART: [state] DebugLocked = No
622,082 UART: [state] WD Timer not started. Device not locked for debugging
625,695 UART: [kat] SHA2-256
804,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,369 UART: [kat] ++
816,904 UART: [kat] sha1
827,517 UART: [kat] SHA2-256
830,570 UART: [kat] SHA2-384
836,755 UART: [kat] SHA2-512-ACC
839,748 UART: [kat] ECC-384
3,282,528 UART: [kat] HMAC-384Kdf
3,294,307 UART: [kat] LMS
3,823,804 UART: [kat] --
3,829,093 UART: [cold-reset] ++
3,831,647 UART: [fht] FHT @ 0x50003400
3,843,128 UART: [idev] ++
3,843,697 UART: [idev] CDI.KEYID = 6
3,844,643 UART: [idev] SUBJECT.KEYID = 7
3,845,798 UART: [idev] UDS.KEYID = 0
3,848,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,390 UART: [idev] Erasing UDS.KEYID = 0
6,324,849 UART: [idev] Sha1 KeyId Algorithm
6,347,708 UART: [idev] --
6,350,732 UART: [ldev] ++
6,351,305 UART: [ldev] CDI.KEYID = 6
6,352,223 UART: [ldev] SUBJECT.KEYID = 5
6,353,434 UART: [ldev] AUTHORITY.KEYID = 7
6,354,666 UART: [ldev] FE.KEYID = 1
6,367,625 UART: [ldev] Erasing FE.KEYID = 1
8,842,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,102 UART: [ldev] --
10,631,847 UART: [fwproc] Wait for Commands...
10,633,355 UART: [fwproc] Recv command 0x46574c44
10,635,458 UART: [fwproc] Recv'd Img size: 114448 bytes
12,690,040 UART: ROM Fatal Error: 0x000B0012
12,693,171 >>> mbox cmd response: failed
12,693,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,693,935 >>> mbox cmd response: failed
12,694,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,538 >>> mbox cmd response: failed
Initializing fuses
2,053,994 writing to cptra_bootfsm_go
2,243,291 UART:
2,243,658 UART: Running Caliptra ROM ...
2,244,805 UART:
7,779,678 UART: [state] CFI Enabled
7,798,288 UART: [state] LifecycleState = Unprovisioned
7,800,152 UART: [state] DebugLocked = No
7,801,705 UART: [state] WD Timer not started. Device not locked for debugging
7,806,216 UART: [kat] SHA2-256
7,985,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,996,918 UART: [kat] ++
7,997,462 UART: [kat] sha1
8,009,761 UART: [kat] SHA2-256
8,012,791 UART: [kat] SHA2-384
8,018,552 UART: [kat] SHA2-512-ACC
8,021,510 UART: [kat] ECC-384
10,463,423 UART: [kat] HMAC-384Kdf
10,475,100 UART: [kat] LMS
11,004,592 UART: [kat] --
11,009,851 UART: [cold-reset] ++
11,012,381 UART: [fht] FHT @ 0x50003400
11,023,087 UART: [idev] ++
11,023,664 UART: [idev] CDI.KEYID = 6
11,024,634 UART: [idev] SUBJECT.KEYID = 7
11,025,798 UART: [idev] UDS.KEYID = 0
11,028,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,172,032 UART: [idev] Erasing UDS.KEYID = 0
13,502,448 UART: [idev] Sha1 KeyId Algorithm
13,526,806 UART: [idev] --
13,531,453 UART: [ldev] ++
13,532,021 UART: [ldev] CDI.KEYID = 6
13,533,106 UART: [ldev] SUBJECT.KEYID = 5
13,534,222 UART: [ldev] AUTHORITY.KEYID = 7
13,535,399 UART: [ldev] FE.KEYID = 1
13,546,279 UART: [ldev] Erasing FE.KEYID = 1
16,019,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,740,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,756,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,772,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,788,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,808,258 UART: [ldev] --
17,812,497 UART: [fwproc] Wait for Commands...
17,814,494 UART: [fwproc] Recv command 0x46574c44
17,816,590 UART: [fwproc] Recv'd Img size: 114448 bytes
21,220,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,294,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,362,833 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,681,314 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,694,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,455,527 >>> mbox cmd response: failed
12,456,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,456,435 >>> mbox cmd response: failed
12,456,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,004 >>> mbox cmd response: failed
Initializing fuses
2,056,470 writing to cptra_bootfsm_go
11,109,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,675,231 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,420,398 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,300,575 >>> mbox cmd response: failed
12,301,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,510 >>> mbox cmd response: failed
12,301,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,091 >>> mbox cmd response: failed
Initializing fuses
2,057,850 writing to cptra_bootfsm_go
5,496,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,794,257 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,755,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,520,824 >>> mbox cmd response: failed
12,521,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,521,729 >>> mbox cmd response: failed
12,522,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,522,324 >>> mbox cmd response: failed
Initializing fuses
2,054,452 writing to cptra_bootfsm_go
11,101,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,304,598 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,817 UART: [kat] SHA2-256
881,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,863 UART: [kat] ++
886,015 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
902,858 UART: [kat] HMAC-384Kdf
907,526 UART: [kat] LMS
1,475,722 UART: [kat] --
1,476,943 UART: [cold-reset] ++
1,477,365 UART: [fht] Storing FHT @ 0x50003400
1,480,058 UART: [idev] ++
1,480,226 UART: [idev] CDI.KEYID = 6
1,480,586 UART: [idev] SUBJECT.KEYID = 7
1,481,010 UART: [idev] UDS.KEYID = 0
1,481,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,658 UART: [idev] Erasing UDS.KEYID = 0
1,504,350 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,208 UART: [idev] --
1,514,223 UART: [ldev] ++
1,514,391 UART: [ldev] CDI.KEYID = 6
1,514,754 UART: [ldev] SUBJECT.KEYID = 5
1,515,180 UART: [ldev] AUTHORITY.KEYID = 7
1,515,643 UART: [ldev] FE.KEYID = 1
1,520,855 UART: [ldev] Erasing FE.KEYID = 1
1,546,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,336 UART: [ldev] --
1,585,679 UART: [fwproc] Waiting for Commands...
1,586,480 UART: [fwproc] Received command 0x46574c44
1,587,271 UART: [fwproc] Received Image of size 114448 bytes
1,634,494 UART: ROM Fatal Error: 0x000B0012
1,635,651 >>> mbox cmd response: failed
1,635,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,657 >>> mbox cmd response: failed
1,635,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,139 UART: [kat] SHA2-256
882,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,185 UART: [kat] ++
886,337 UART: [kat] sha1
890,579 UART: [kat] SHA2-256
892,517 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
906,776 UART: [kat] LMS
1,474,972 UART: [kat] --
1,475,893 UART: [cold-reset] ++
1,476,233 UART: [fht] Storing FHT @ 0x50003400
1,478,914 UART: [idev] ++
1,479,082 UART: [idev] CDI.KEYID = 6
1,479,442 UART: [idev] SUBJECT.KEYID = 7
1,479,866 UART: [idev] UDS.KEYID = 0
1,480,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,022 UART: [idev] Erasing UDS.KEYID = 0
1,504,560 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,142 UART: [idev] --
1,514,115 UART: [ldev] ++
1,514,283 UART: [ldev] CDI.KEYID = 6
1,514,646 UART: [ldev] SUBJECT.KEYID = 5
1,515,072 UART: [ldev] AUTHORITY.KEYID = 7
1,515,535 UART: [ldev] FE.KEYID = 1
1,520,543 UART: [ldev] Erasing FE.KEYID = 1
1,545,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,514 UART: [ldev] --
1,584,945 UART: [fwproc] Waiting for Commands...
1,585,756 UART: [fwproc] Received command 0x46574c44
1,586,547 UART: [fwproc] Received Image of size 114448 bytes
2,885,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,037 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,389 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,432 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,656 >>> mbox cmd response: failed
1,489,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,662 >>> mbox cmd response: failed
1,489,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,833 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,138 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,472 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,046 UART: [kat] SHA2-256
881,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,092 UART: [kat] ++
886,244 UART: [kat] sha1
890,472 UART: [kat] SHA2-256
892,410 UART: [kat] SHA2-384
895,055 UART: [kat] SHA2-512-ACC
896,956 UART: [kat] ECC-384
902,413 UART: [kat] HMAC-384Kdf
907,113 UART: [kat] LMS
1,475,309 UART: [kat] --
1,476,202 UART: [cold-reset] ++
1,476,736 UART: [fht] Storing FHT @ 0x50003400
1,479,393 UART: [idev] ++
1,479,561 UART: [idev] CDI.KEYID = 6
1,479,921 UART: [idev] SUBJECT.KEYID = 7
1,480,345 UART: [idev] UDS.KEYID = 0
1,480,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,547 UART: [idev] Erasing UDS.KEYID = 0
1,505,517 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,281 UART: [idev] --
1,515,364 UART: [ldev] ++
1,515,532 UART: [ldev] CDI.KEYID = 6
1,515,895 UART: [ldev] SUBJECT.KEYID = 5
1,516,321 UART: [ldev] AUTHORITY.KEYID = 7
1,516,784 UART: [ldev] FE.KEYID = 1
1,522,110 UART: [ldev] Erasing FE.KEYID = 1
1,548,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,959 UART: [ldev] --
1,587,414 UART: [fwproc] Waiting for Commands...
1,588,229 UART: [fwproc] Received command 0x46574c44
1,589,020 UART: [fwproc] Received Image of size 114448 bytes
1,635,589 UART: ROM Fatal Error: 0x000B0012
1,636,746 >>> mbox cmd response: failed
1,636,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,752 >>> mbox cmd response: failed
1,636,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,304 UART: [kat] SHA2-256
882,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,350 UART: [kat] ++
886,502 UART: [kat] sha1
890,898 UART: [kat] SHA2-256
892,836 UART: [kat] SHA2-384
895,517 UART: [kat] SHA2-512-ACC
897,418 UART: [kat] ECC-384
903,209 UART: [kat] HMAC-384Kdf
907,931 UART: [kat] LMS
1,476,127 UART: [kat] --
1,477,254 UART: [cold-reset] ++
1,477,686 UART: [fht] Storing FHT @ 0x50003400
1,480,341 UART: [idev] ++
1,480,509 UART: [idev] CDI.KEYID = 6
1,480,869 UART: [idev] SUBJECT.KEYID = 7
1,481,293 UART: [idev] UDS.KEYID = 0
1,481,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,429 UART: [idev] Erasing UDS.KEYID = 0
1,505,815 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,305 UART: [idev] --
1,515,454 UART: [ldev] ++
1,515,622 UART: [ldev] CDI.KEYID = 6
1,515,985 UART: [ldev] SUBJECT.KEYID = 5
1,516,411 UART: [ldev] AUTHORITY.KEYID = 7
1,516,874 UART: [ldev] FE.KEYID = 1
1,522,208 UART: [ldev] Erasing FE.KEYID = 1
1,547,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,237 UART: [ldev] --
1,586,590 UART: [fwproc] Waiting for Commands...
1,587,255 UART: [fwproc] Received command 0x46574c44
1,588,046 UART: [fwproc] Received Image of size 114448 bytes
2,886,544 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,416 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,768 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,841 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,310 >>> mbox cmd response: failed
1,487,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,316 >>> mbox cmd response: failed
1,487,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,444 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,883 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,660 UART: [state] LifecycleState = Unprovisioned
86,315 UART: [state] DebugLocked = No
86,957 UART: [state] WD Timer not started. Device not locked for debugging
88,176 UART: [kat] SHA2-256
893,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,951 UART: [kat] ++
898,103 UART: [kat] sha1
902,529 UART: [kat] SHA2-256
904,469 UART: [kat] SHA2-384
907,268 UART: [kat] SHA2-512-ACC
909,169 UART: [kat] ECC-384
919,044 UART: [kat] HMAC-384Kdf
923,654 UART: [kat] LMS
1,171,982 UART: [kat] --
1,172,921 UART: [cold-reset] ++
1,173,381 UART: [fht] FHT @ 0x50003400
1,176,130 UART: [idev] ++
1,176,298 UART: [idev] CDI.KEYID = 6
1,176,658 UART: [idev] SUBJECT.KEYID = 7
1,177,082 UART: [idev] UDS.KEYID = 0
1,177,427 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,838 UART: [idev] Erasing UDS.KEYID = 0
1,201,675 UART: [idev] Sha1 KeyId Algorithm
1,210,315 UART: [idev] --
1,211,323 UART: [ldev] ++
1,211,491 UART: [ldev] CDI.KEYID = 6
1,211,854 UART: [ldev] SUBJECT.KEYID = 5
1,212,280 UART: [ldev] AUTHORITY.KEYID = 7
1,212,743 UART: [ldev] FE.KEYID = 1
1,217,837 UART: [ldev] Erasing FE.KEYID = 1
1,243,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,877 UART: [ldev] --
1,283,216 UART: [fwproc] Wait for Commands...
1,284,022 UART: [fwproc] Recv command 0x46574c44
1,284,750 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,953 UART: ROM Fatal Error: 0x000B0012
1,333,110 >>> mbox cmd response: failed
1,333,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,116 >>> mbox cmd response: failed
1,333,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
893,584 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,709 UART: [kat] ++
897,861 UART: [kat] sha1
902,055 UART: [kat] SHA2-256
903,995 UART: [kat] SHA2-384
906,686 UART: [kat] SHA2-512-ACC
908,587 UART: [kat] ECC-384
918,362 UART: [kat] HMAC-384Kdf
922,926 UART: [kat] LMS
1,171,254 UART: [kat] --
1,172,031 UART: [cold-reset] ++
1,172,391 UART: [fht] FHT @ 0x50003400
1,175,194 UART: [idev] ++
1,175,362 UART: [idev] CDI.KEYID = 6
1,175,722 UART: [idev] SUBJECT.KEYID = 7
1,176,146 UART: [idev] UDS.KEYID = 0
1,176,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,058 UART: [idev] Erasing UDS.KEYID = 0
1,201,213 UART: [idev] Sha1 KeyId Algorithm
1,209,729 UART: [idev] --
1,210,663 UART: [ldev] ++
1,210,831 UART: [ldev] CDI.KEYID = 6
1,211,194 UART: [ldev] SUBJECT.KEYID = 5
1,211,620 UART: [ldev] AUTHORITY.KEYID = 7
1,212,083 UART: [ldev] FE.KEYID = 1
1,217,263 UART: [ldev] Erasing FE.KEYID = 1
1,243,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,755 UART: [ldev] --
1,283,070 UART: [fwproc] Wait for Commands...
1,283,770 UART: [fwproc] Recv command 0x46574c44
1,284,498 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,097 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,653 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,561 >>> mbox cmd response: failed
1,186,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,567 >>> mbox cmd response: failed
1,186,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,573 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,772 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
893,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,794 UART: [kat] ++
897,946 UART: [kat] sha1
902,238 UART: [kat] SHA2-256
904,178 UART: [kat] SHA2-384
906,925 UART: [kat] SHA2-512-ACC
908,826 UART: [kat] ECC-384
918,837 UART: [kat] HMAC-384Kdf
923,479 UART: [kat] LMS
1,171,807 UART: [kat] --
1,172,622 UART: [cold-reset] ++
1,173,150 UART: [fht] FHT @ 0x50003400
1,175,953 UART: [idev] ++
1,176,121 UART: [idev] CDI.KEYID = 6
1,176,481 UART: [idev] SUBJECT.KEYID = 7
1,176,905 UART: [idev] UDS.KEYID = 0
1,177,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,733 UART: [idev] Erasing UDS.KEYID = 0
1,201,644 UART: [idev] Sha1 KeyId Algorithm
1,210,226 UART: [idev] --
1,211,268 UART: [ldev] ++
1,211,436 UART: [ldev] CDI.KEYID = 6
1,211,799 UART: [ldev] SUBJECT.KEYID = 5
1,212,225 UART: [ldev] AUTHORITY.KEYID = 7
1,212,688 UART: [ldev] FE.KEYID = 1
1,217,818 UART: [ldev] Erasing FE.KEYID = 1
1,244,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,818 UART: [ldev] --
1,283,101 UART: [fwproc] Wait for Commands...
1,283,813 UART: [fwproc] Recv command 0x46574c44
1,284,541 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,576 UART: ROM Fatal Error: 0x000B0012
1,332,733 >>> mbox cmd response: failed
1,332,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,739 >>> mbox cmd response: failed
1,332,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
893,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,610 UART: [kat] ++
897,762 UART: [kat] sha1
902,058 UART: [kat] SHA2-256
903,998 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,229 UART: [kat] HMAC-384Kdf
922,695 UART: [kat] LMS
1,171,023 UART: [kat] --
1,172,084 UART: [cold-reset] ++
1,172,466 UART: [fht] FHT @ 0x50003400
1,174,971 UART: [idev] ++
1,175,139 UART: [idev] CDI.KEYID = 6
1,175,499 UART: [idev] SUBJECT.KEYID = 7
1,175,923 UART: [idev] UDS.KEYID = 0
1,176,268 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,019 UART: [idev] Erasing UDS.KEYID = 0
1,200,696 UART: [idev] Sha1 KeyId Algorithm
1,209,162 UART: [idev] --
1,210,144 UART: [ldev] ++
1,210,312 UART: [ldev] CDI.KEYID = 6
1,210,675 UART: [ldev] SUBJECT.KEYID = 5
1,211,101 UART: [ldev] AUTHORITY.KEYID = 7
1,211,564 UART: [ldev] FE.KEYID = 1
1,216,908 UART: [ldev] Erasing FE.KEYID = 1
1,243,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,934 UART: [ldev] --
1,283,247 UART: [fwproc] Wait for Commands...
1,283,885 UART: [fwproc] Recv command 0x46574c44
1,284,613 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,890 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,187,664 >>> mbox cmd response: failed
1,187,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,670 >>> mbox cmd response: failed
1,187,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,837 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,174,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,197 UART: [idev] Erasing UDS.KEYID = 0
1,199,207 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,164 UART: [ldev] ++
1,209,332 UART: [ldev] CDI.KEYID = 6
1,209,696 UART: [ldev] SUBJECT.KEYID = 5
1,210,123 UART: [ldev] AUTHORITY.KEYID = 7
1,210,586 UART: [ldev] FE.KEYID = 1
1,215,788 UART: [ldev] Erasing FE.KEYID = 1
1,242,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,974 UART: [ldev] --
1,281,292 UART: [fwproc] Wait for Commands...
1,281,893 UART: [fwproc] Recv command 0x46574c44
1,282,626 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,973 UART: ROM Fatal Error: 0x000B0012
1,331,130 >>> mbox cmd response: failed
1,331,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,136 >>> mbox cmd response: failed
1,331,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,602 UART: [kat] HMAC-384Kdf
920,200 UART: [kat] LMS
1,168,512 UART: [kat] --
1,169,237 UART: [cold-reset] ++
1,169,679 UART: [fht] FHT @ 0x50003400
1,172,457 UART: [idev] ++
1,172,625 UART: [idev] CDI.KEYID = 6
1,172,986 UART: [idev] SUBJECT.KEYID = 7
1,173,411 UART: [idev] UDS.KEYID = 0
1,173,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,495 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,625 UART: [idev] --
1,208,664 UART: [ldev] ++
1,208,832 UART: [ldev] CDI.KEYID = 6
1,209,196 UART: [ldev] SUBJECT.KEYID = 5
1,209,623 UART: [ldev] AUTHORITY.KEYID = 7
1,210,086 UART: [ldev] FE.KEYID = 1
1,215,382 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,528 UART: [ldev] --
1,281,002 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,539 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,249 >>> mbox cmd response: failed
1,182,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,255 >>> mbox cmd response: failed
1,182,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,675 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
891,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,714 UART: [kat] ++
895,866 UART: [kat] sha1
900,172 UART: [kat] SHA2-256
902,112 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,217 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,170,094 UART: [cold-reset] ++
1,170,564 UART: [fht] FHT @ 0x50003400
1,173,404 UART: [idev] ++
1,173,572 UART: [idev] CDI.KEYID = 6
1,173,933 UART: [idev] SUBJECT.KEYID = 7
1,174,358 UART: [idev] UDS.KEYID = 0
1,174,704 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,604 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,209,048 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,697 UART: [ldev] SUBJECT.KEYID = 5
1,211,124 UART: [ldev] AUTHORITY.KEYID = 7
1,211,587 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,244,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,657 UART: [ldev] --
1,284,119 UART: [fwproc] Wait for Commands...
1,284,892 UART: [fwproc] Recv command 0x46574c44
1,285,625 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,134 UART: ROM Fatal Error: 0x000B0012
1,332,291 >>> mbox cmd response: failed
1,332,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,297 >>> mbox cmd response: failed
1,332,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,303 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,493 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,932 UART: [fht] FHT @ 0x50003400
1,173,582 UART: [idev] ++
1,173,750 UART: [idev] CDI.KEYID = 6
1,174,111 UART: [idev] SUBJECT.KEYID = 7
1,174,536 UART: [idev] UDS.KEYID = 0
1,174,882 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,846 UART: [idev] --
1,210,053 UART: [ldev] ++
1,210,221 UART: [ldev] CDI.KEYID = 6
1,210,585 UART: [ldev] SUBJECT.KEYID = 5
1,211,012 UART: [ldev] AUTHORITY.KEYID = 7
1,211,475 UART: [ldev] FE.KEYID = 1
1,216,243 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,327 UART: [fwproc] Wait for Commands...
1,282,062 UART: [fwproc] Recv command 0x46574c44
1,282,795 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,752 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,730 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,700 >>> mbox cmd response: failed
1,182,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,706 >>> mbox cmd response: failed
1,182,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,490 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,149 UART:
192,517 UART: Running Caliptra ROM ...
193,713 UART:
193,870 UART: [state] CFI Enabled
257,865 UART: [state] LifecycleState = Unprovisioned
259,780 UART: [state] DebugLocked = No
261,544 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
266,058 UART: [kat] SHA2-256
435,773 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
446,244 UART: [kat] ++
446,737 UART: [kat] sha1
457,299 UART: [kat] SHA2-256
459,958 UART: [kat] SHA2-384
465,941 UART: [kat] SHA2-512-ACC
468,307 UART: [kat] ECC-384
2,763,964 UART: [kat] HMAC-384Kdf
2,796,287 UART: [kat] LMS
3,986,586 UART: [kat] --
3,990,405 UART: [cold-reset] ++
3,991,371 UART: [fht] Storing FHT @ 0x50003400
4,002,856 UART: [idev] ++
4,003,427 UART: [idev] CDI.KEYID = 6
4,004,398 UART: [idev] SUBJECT.KEYID = 7
4,005,619 UART: [idev] UDS.KEYID = 0
4,008,371 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,152,202 UART: [idev] Erasing UDS.KEYID = 0
7,345,303 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,989 UART: [idev] --
7,369,981 UART: [ldev] ++
7,370,553 UART: [ldev] CDI.KEYID = 6
7,371,537 UART: [ldev] SUBJECT.KEYID = 5
7,372,756 UART: [ldev] AUTHORITY.KEYID = 7
7,373,985 UART: [ldev] FE.KEYID = 1
7,421,852 UART: [ldev] Erasing FE.KEYID = 1
10,754,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,734 UART: [ldev] --
13,135,897 UART: [fwproc] Waiting for Commands...
13,139,125 UART: [fwproc] Received command 0x46574c44
13,141,315 UART: [fwproc] Received Image of size 114124 bytes
15,836,018 UART: ROM Fatal Error: 0x000B0010
15,839,472 >>> mbox cmd response: failed
15,839,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,840,242 >>> mbox cmd response: failed
15,840,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,840,803 >>> mbox cmd response: failed
Initializing fuses
2,054,037 writing to cptra_bootfsm_go
2,243,448 UART:
2,243,785 UART: Running Caliptra ROM ...
2,244,921 UART:
2,245,091 UART: [state] CFI Enabled
2,313,386 UART: [state] LifecycleState = Unprovisioned
2,315,321 UART: [state] DebugLocked = No
2,318,065 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,973 UART: [kat] SHA2-256
2,492,664 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,171 UART: [kat] ++
2,503,720 UART: [kat] sha1
2,515,478 UART: [kat] SHA2-256
2,518,165 UART: [kat] SHA2-384
2,523,826 UART: [kat] SHA2-512-ACC
2,526,191 UART: [kat] ECC-384
4,823,708 UART: [kat] HMAC-384Kdf
4,854,634 UART: [kat] LMS
6,044,978 UART: [kat] --
6,049,642 UART: [cold-reset] ++
6,051,205 UART: [fht] Storing FHT @ 0x50003400
6,061,511 UART: [idev] ++
6,062,120 UART: [idev] CDI.KEYID = 6
6,063,041 UART: [idev] SUBJECT.KEYID = 7
6,064,267 UART: [idev] UDS.KEYID = 0
6,066,379 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,209,896 UART: [idev] Erasing UDS.KEYID = 0
9,400,441 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,006 UART: [idev] --
9,424,976 UART: [ldev] ++
9,425,564 UART: [ldev] CDI.KEYID = 6
9,426,486 UART: [ldev] SUBJECT.KEYID = 5
9,427,811 UART: [ldev] AUTHORITY.KEYID = 7
9,428,993 UART: [ldev] FE.KEYID = 1
9,476,747 UART: [ldev] Erasing FE.KEYID = 1
12,814,924 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,123,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,138,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,153,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,167,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,186,385 UART: [ldev] --
15,190,313 UART: [fwproc] Waiting for Commands...
15,193,527 UART: [fwproc] Received command 0x46574c44
15,195,720 UART: [fwproc] Received Image of size 114124 bytes
19,241,490 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,314,009 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,382,883 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,700,462 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,787,332 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,549,343 >>> mbox cmd response: failed
15,550,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,550,488 >>> mbox cmd response: failed
15,550,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,551,054 >>> mbox cmd response: failed
Initializing fuses
2,061,689 writing to cptra_bootfsm_go
5,832,782 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,913,607 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,395 UART:
192,759 UART: Running Caliptra ROM ...
193,947 UART:
603,560 UART: [state] CFI Enabled
616,765 UART: [state] LifecycleState = Unprovisioned
618,689 UART: [state] DebugLocked = No
621,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,106 UART: [kat] SHA2-256
796,815 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,389 UART: [kat] ++
807,929 UART: [kat] sha1
819,406 UART: [kat] SHA2-256
822,093 UART: [kat] SHA2-384
827,338 UART: [kat] SHA2-512-ACC
829,680 UART: [kat] ECC-384
3,112,029 UART: [kat] HMAC-384Kdf
3,123,936 UART: [kat] LMS
4,314,036 UART: [kat] --
4,318,310 UART: [cold-reset] ++
4,320,083 UART: [fht] Storing FHT @ 0x50003400
4,332,008 UART: [idev] ++
4,332,577 UART: [idev] CDI.KEYID = 6
4,333,594 UART: [idev] SUBJECT.KEYID = 7
4,334,752 UART: [idev] UDS.KEYID = 0
4,337,320 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,809 UART: [idev] Erasing UDS.KEYID = 0
7,625,337 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,846 UART: [idev] --
7,652,218 UART: [ldev] ++
7,652,811 UART: [ldev] CDI.KEYID = 6
7,653,732 UART: [ldev] SUBJECT.KEYID = 5
7,654,948 UART: [ldev] AUTHORITY.KEYID = 7
7,656,254 UART: [ldev] FE.KEYID = 1
7,667,539 UART: [ldev] Erasing FE.KEYID = 1
10,957,399 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,849 UART: [ldev] --
13,316,791 UART: [fwproc] Waiting for Commands...
13,320,022 UART: [fwproc] Received command 0x46574c44
13,322,214 UART: [fwproc] Received Image of size 114124 bytes
16,021,897 UART: ROM Fatal Error: 0x000B0010
16,025,357 >>> mbox cmd response: failed
16,025,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,093 >>> mbox cmd response: failed
16,026,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,663 >>> mbox cmd response: failed
Initializing fuses
2,054,296 writing to cptra_bootfsm_go
2,243,603 UART:
2,243,962 UART: Running Caliptra ROM ...
2,245,102 UART:
4,430,151 UART: [state] CFI Enabled
4,444,016 UART: [state] LifecycleState = Unprovisioned
4,446,000 UART: [state] DebugLocked = No
4,447,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,451,837 UART: [kat] SHA2-256
4,621,537 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,632,123 UART: [kat] ++
4,632,672 UART: [kat] sha1
4,642,433 UART: [kat] SHA2-256
4,645,119 UART: [kat] SHA2-384
4,651,428 UART: [kat] SHA2-512-ACC
4,653,779 UART: [kat] ECC-384
6,936,565 UART: [kat] HMAC-384Kdf
6,947,603 UART: [kat] LMS
8,137,748 UART: [kat] --
8,141,600 UART: [cold-reset] ++
8,143,428 UART: [fht] Storing FHT @ 0x50003400
8,155,076 UART: [idev] ++
8,155,656 UART: [idev] CDI.KEYID = 6
8,156,567 UART: [idev] SUBJECT.KEYID = 7
8,157,835 UART: [idev] UDS.KEYID = 0
8,159,937 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,303,367 UART: [idev] Erasing UDS.KEYID = 0
11,441,579 UART: [idev] Using Sha1 for KeyId Algorithm
11,462,462 UART: [idev] --
11,466,506 UART: [ldev] ++
11,467,074 UART: [ldev] CDI.KEYID = 6
11,468,089 UART: [ldev] SUBJECT.KEYID = 5
11,469,279 UART: [ldev] AUTHORITY.KEYID = 7
11,470,514 UART: [ldev] FE.KEYID = 1
11,481,220 UART: [ldev] Erasing FE.KEYID = 1
14,771,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,064,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,078,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,093,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,108,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,126,182 UART: [ldev] --
17,131,145 UART: [fwproc] Waiting for Commands...
17,133,903 UART: [fwproc] Received command 0x46574c44
17,136,089 UART: [fwproc] Received Image of size 114124 bytes
21,185,703 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,259,631 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,328,504 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,645,243 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
4,125,398 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,747,742 >>> mbox cmd response: failed
15,748,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,748,684 >>> mbox cmd response: failed
15,748,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,749,248 >>> mbox cmd response: failed
Initializing fuses
2,059,539 writing to cptra_bootfsm_go
8,235,070 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,175,021 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,308 UART:
192,660 UART: Running Caliptra ROM ...
193,885 UART:
194,035 UART: [state] CFI Enabled
262,072 UART: [state] LifecycleState = Unprovisioned
263,950 UART: [state] DebugLocked = No
266,088 UART: [state] WD Timer not started. Device not locked for debugging
269,750 UART: [kat] SHA2-256
448,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,427 UART: [kat] ++
460,874 UART: [kat] sha1
471,387 UART: [kat] SHA2-256
474,432 UART: [kat] SHA2-384
481,658 UART: [kat] SHA2-512-ACC
484,652 UART: [kat] ECC-384
2,944,349 UART: [kat] HMAC-384Kdf
2,968,647 UART: [kat] LMS
3,498,076 UART: [kat] --
3,502,633 UART: [cold-reset] ++
3,504,137 UART: [fht] FHT @ 0x50003400
3,513,973 UART: [idev] ++
3,514,554 UART: [idev] CDI.KEYID = 6
3,515,528 UART: [idev] SUBJECT.KEYID = 7
3,516,690 UART: [idev] UDS.KEYID = 0
3,519,406 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,429 UART: [idev] Erasing UDS.KEYID = 0
6,021,933 UART: [idev] Sha1 KeyId Algorithm
6,044,216 UART: [idev] --
6,049,028 UART: [ldev] ++
6,049,607 UART: [ldev] CDI.KEYID = 6
6,050,519 UART: [ldev] SUBJECT.KEYID = 5
6,051,683 UART: [ldev] AUTHORITY.KEYID = 7
6,052,915 UART: [ldev] FE.KEYID = 1
6,095,844 UART: [ldev] Erasing FE.KEYID = 1
8,599,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,952 UART: [ldev] --
10,408,339 UART: [fwproc] Wait for Commands...
10,410,388 UART: [fwproc] Recv command 0x46574c44
10,412,490 UART: [fwproc] Recv'd Img size: 114448 bytes
12,457,107 UART: ROM Fatal Error: 0x000B0010
12,460,230 >>> mbox cmd response: failed
12,460,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,461,016 >>> mbox cmd response: failed
12,461,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,461,618 >>> mbox cmd response: failed
Initializing fuses
2,054,838 writing to cptra_bootfsm_go
2,244,170 UART:
2,244,537 UART: Running Caliptra ROM ...
2,245,667 UART:
2,245,833 UART: [state] CFI Enabled
2,303,741 UART: [state] LifecycleState = Unprovisioned
2,305,580 UART: [state] DebugLocked = No
2,306,880 UART: [state] WD Timer not started. Device not locked for debugging
2,311,001 UART: [kat] SHA2-256
2,490,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,501,723 UART: [kat] ++
2,502,275 UART: [kat] sha1
2,513,766 UART: [kat] SHA2-256
2,516,834 UART: [kat] SHA2-384
2,521,202 UART: [kat] SHA2-512-ACC
2,524,147 UART: [kat] ECC-384
4,988,059 UART: [kat] HMAC-384Kdf
5,009,797 UART: [kat] LMS
5,539,289 UART: [kat] --
5,544,383 UART: [cold-reset] ++
5,546,962 UART: [fht] FHT @ 0x50003400
5,557,836 UART: [idev] ++
5,558,402 UART: [idev] CDI.KEYID = 6
5,559,442 UART: [idev] SUBJECT.KEYID = 7
5,560,550 UART: [idev] UDS.KEYID = 0
5,562,878 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,706,921 UART: [idev] Erasing UDS.KEYID = 0
8,064,688 UART: [idev] Sha1 KeyId Algorithm
8,087,973 UART: [idev] --
8,091,623 UART: [ldev] ++
8,092,205 UART: [ldev] CDI.KEYID = 6
8,093,120 UART: [ldev] SUBJECT.KEYID = 5
8,094,291 UART: [ldev] AUTHORITY.KEYID = 7
8,095,579 UART: [ldev] FE.KEYID = 1
8,138,312 UART: [ldev] Erasing FE.KEYID = 1
10,643,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,412,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,449,466 UART: [ldev] --
12,453,604 UART: [fwproc] Wait for Commands...
12,456,782 UART: [fwproc] Recv command 0x46574c44
12,458,877 UART: [fwproc] Recv'd Img size: 114448 bytes
15,863,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,959 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,772 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,323,387 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,363,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,229,583 >>> mbox cmd response: failed
12,230,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,230,454 >>> mbox cmd response: failed
12,230,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,231,042 >>> mbox cmd response: failed
Initializing fuses
2,060,678 writing to cptra_bootfsm_go
5,445,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,153,152 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
192,533 UART:
192,890 UART: Running Caliptra ROM ...
194,089 UART:
603,876 UART: [state] CFI Enabled
617,807 UART: [state] LifecycleState = Unprovisioned
619,635 UART: [state] DebugLocked = No
621,714 UART: [state] WD Timer not started. Device not locked for debugging
624,608 UART: [kat] SHA2-256
803,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,330 UART: [kat] ++
815,861 UART: [kat] sha1
826,658 UART: [kat] SHA2-256
829,715 UART: [kat] SHA2-384
836,010 UART: [kat] SHA2-512-ACC
838,957 UART: [kat] ECC-384
3,282,224 UART: [kat] HMAC-384Kdf
3,293,332 UART: [kat] LMS
3,822,826 UART: [kat] --
3,829,237 UART: [cold-reset] ++
3,831,765 UART: [fht] FHT @ 0x50003400
3,841,729 UART: [idev] ++
3,842,298 UART: [idev] CDI.KEYID = 6
3,843,220 UART: [idev] SUBJECT.KEYID = 7
3,844,380 UART: [idev] UDS.KEYID = 0
3,847,402 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,369 UART: [idev] Erasing UDS.KEYID = 0
6,313,632 UART: [idev] Sha1 KeyId Algorithm
6,337,204 UART: [idev] --
6,341,476 UART: [ldev] ++
6,342,049 UART: [ldev] CDI.KEYID = 6
6,342,967 UART: [ldev] SUBJECT.KEYID = 5
6,344,132 UART: [ldev] AUTHORITY.KEYID = 7
6,345,421 UART: [ldev] FE.KEYID = 1
6,357,042 UART: [ldev] Erasing FE.KEYID = 1
8,829,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,164 UART: [ldev] --
10,617,433 UART: [fwproc] Wait for Commands...
10,620,285 UART: [fwproc] Recv command 0x46574c44
10,622,383 UART: [fwproc] Recv'd Img size: 114448 bytes
12,661,023 UART: ROM Fatal Error: 0x000B0010
12,664,100 >>> mbox cmd response: failed
12,664,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,664,854 >>> mbox cmd response: failed
12,665,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,408 >>> mbox cmd response: failed
Initializing fuses
2,052,869 writing to cptra_bootfsm_go
2,242,184 UART:
2,242,529 UART: Running Caliptra ROM ...
2,243,668 UART:
7,781,747 UART: [state] CFI Enabled
7,796,434 UART: [state] LifecycleState = Unprovisioned
7,798,369 UART: [state] DebugLocked = No
7,800,113 UART: [state] WD Timer not started. Device not locked for debugging
7,804,411 UART: [kat] SHA2-256
7,983,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,995,070 UART: [kat] ++
7,995,617 UART: [kat] sha1
8,005,973 UART: [kat] SHA2-256
8,008,999 UART: [kat] SHA2-384
8,015,148 UART: [kat] SHA2-512-ACC
8,018,150 UART: [kat] ECC-384
10,458,565 UART: [kat] HMAC-384Kdf
10,472,243 UART: [kat] LMS
11,001,709 UART: [kat] --
11,005,438 UART: [cold-reset] ++
11,007,748 UART: [fht] FHT @ 0x50003400
11,020,079 UART: [idev] ++
11,020,651 UART: [idev] CDI.KEYID = 6
11,021,586 UART: [idev] SUBJECT.KEYID = 7
11,022,751 UART: [idev] UDS.KEYID = 0
11,025,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,168,893 UART: [idev] Erasing UDS.KEYID = 0
13,500,385 UART: [idev] Sha1 KeyId Algorithm
13,523,284 UART: [idev] --
13,525,762 UART: [ldev] ++
13,526,330 UART: [ldev] CDI.KEYID = 6
13,527,237 UART: [ldev] SUBJECT.KEYID = 5
13,528,401 UART: [ldev] AUTHORITY.KEYID = 7
13,529,692 UART: [ldev] FE.KEYID = 1
13,537,745 UART: [ldev] Erasing FE.KEYID = 1
16,011,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,728,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,744,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,760,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,776,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,796,136 UART: [ldev] --
17,800,930 UART: [fwproc] Wait for Commands...
17,802,967 UART: [fwproc] Recv command 0x46574c44
17,805,023 UART: [fwproc] Recv'd Img size: 114448 bytes
21,214,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,283,994 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,352,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,671,454 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,697,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,447,965 >>> mbox cmd response: failed
12,448,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,448,897 >>> mbox cmd response: failed
12,449,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,464 >>> mbox cmd response: failed
Initializing fuses
2,054,392 writing to cptra_bootfsm_go
11,104,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,670,969 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,441,472 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,290,605 >>> mbox cmd response: failed
12,291,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,291,494 >>> mbox cmd response: failed
12,291,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,292,063 >>> mbox cmd response: failed
Initializing fuses
2,056,632 writing to cptra_bootfsm_go
5,482,391 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,776,417 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,080 writing to cptra_bootfsm_go
3,760,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,513,726 >>> mbox cmd response: failed
12,514,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,679 >>> mbox cmd response: failed
12,514,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,243 >>> mbox cmd response: failed
Initializing fuses
2,054,442 writing to cptra_bootfsm_go
11,102,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,298,493 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,135 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,693 UART: [kat] SHA2-256
881,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,739 UART: [kat] ++
885,891 UART: [kat] sha1
890,171 UART: [kat] SHA2-256
892,109 UART: [kat] SHA2-384
895,096 UART: [kat] SHA2-512-ACC
896,997 UART: [kat] ECC-384
902,436 UART: [kat] HMAC-384Kdf
906,910 UART: [kat] LMS
1,475,106 UART: [kat] --
1,475,893 UART: [cold-reset] ++
1,476,409 UART: [fht] Storing FHT @ 0x50003400
1,479,328 UART: [idev] ++
1,479,496 UART: [idev] CDI.KEYID = 6
1,479,856 UART: [idev] SUBJECT.KEYID = 7
1,480,280 UART: [idev] UDS.KEYID = 0
1,480,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,054 UART: [idev] Erasing UDS.KEYID = 0
1,503,944 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,652 UART: [idev] --
1,513,767 UART: [ldev] ++
1,513,935 UART: [ldev] CDI.KEYID = 6
1,514,298 UART: [ldev] SUBJECT.KEYID = 5
1,514,724 UART: [ldev] AUTHORITY.KEYID = 7
1,515,187 UART: [ldev] FE.KEYID = 1
1,520,631 UART: [ldev] Erasing FE.KEYID = 1
1,545,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,986 UART: [ldev] --
1,585,297 UART: [fwproc] Waiting for Commands...
1,586,038 UART: [fwproc] Received command 0x46574c44
1,586,829 UART: [fwproc] Received Image of size 114448 bytes
1,629,426 UART: ROM Fatal Error: 0x000B0010
1,630,583 >>> mbox cmd response: failed
1,630,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,589 >>> mbox cmd response: failed
1,630,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,595 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,021 UART: [kat] SHA2-256
881,952 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,067 UART: [kat] ++
886,219 UART: [kat] sha1
890,503 UART: [kat] SHA2-256
892,441 UART: [kat] SHA2-384
895,062 UART: [kat] SHA2-512-ACC
896,963 UART: [kat] ECC-384
902,564 UART: [kat] HMAC-384Kdf
907,046 UART: [kat] LMS
1,475,242 UART: [kat] --
1,476,385 UART: [cold-reset] ++
1,476,857 UART: [fht] Storing FHT @ 0x50003400
1,479,626 UART: [idev] ++
1,479,794 UART: [idev] CDI.KEYID = 6
1,480,154 UART: [idev] SUBJECT.KEYID = 7
1,480,578 UART: [idev] UDS.KEYID = 0
1,480,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,680 UART: [idev] Erasing UDS.KEYID = 0
1,504,758 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,574 UART: [idev] --
1,514,699 UART: [ldev] ++
1,514,867 UART: [ldev] CDI.KEYID = 6
1,515,230 UART: [ldev] SUBJECT.KEYID = 5
1,515,656 UART: [ldev] AUTHORITY.KEYID = 7
1,516,119 UART: [ldev] FE.KEYID = 1
1,521,585 UART: [ldev] Erasing FE.KEYID = 1
1,546,932 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,022 UART: [ldev] --
1,586,363 UART: [fwproc] Waiting for Commands...
1,587,052 UART: [fwproc] Received command 0x46574c44
1,587,843 UART: [fwproc] Received Image of size 114448 bytes
2,886,799 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,287 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,639 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,672 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,483,956 >>> mbox cmd response: failed
1,483,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,962 >>> mbox cmd response: failed
1,483,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,581 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,184 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,265 UART: [state] LifecycleState = Unprovisioned
86,920 UART: [state] DebugLocked = No
87,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,064 UART: [kat] SHA2-256
882,995 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,110 UART: [kat] ++
887,262 UART: [kat] sha1
891,426 UART: [kat] SHA2-256
893,364 UART: [kat] SHA2-384
896,139 UART: [kat] SHA2-512-ACC
898,040 UART: [kat] ECC-384
903,479 UART: [kat] HMAC-384Kdf
908,163 UART: [kat] LMS
1,476,359 UART: [kat] --
1,477,296 UART: [cold-reset] ++
1,477,774 UART: [fht] Storing FHT @ 0x50003400
1,480,651 UART: [idev] ++
1,480,819 UART: [idev] CDI.KEYID = 6
1,481,179 UART: [idev] SUBJECT.KEYID = 7
1,481,603 UART: [idev] UDS.KEYID = 0
1,481,948 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,835 UART: [idev] Erasing UDS.KEYID = 0
1,506,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,597 UART: [idev] --
1,516,678 UART: [ldev] ++
1,516,846 UART: [ldev] CDI.KEYID = 6
1,517,209 UART: [ldev] SUBJECT.KEYID = 5
1,517,635 UART: [ldev] AUTHORITY.KEYID = 7
1,518,098 UART: [ldev] FE.KEYID = 1
1,523,298 UART: [ldev] Erasing FE.KEYID = 1
1,548,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,173 UART: [ldev] --
1,587,508 UART: [fwproc] Waiting for Commands...
1,588,149 UART: [fwproc] Received command 0x46574c44
1,588,940 UART: [fwproc] Received Image of size 114448 bytes
1,631,739 UART: ROM Fatal Error: 0x000B0010
1,632,896 >>> mbox cmd response: failed
1,632,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,902 >>> mbox cmd response: failed
1,632,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,060 UART: [kat] SHA2-256
881,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,106 UART: [kat] ++
886,258 UART: [kat] sha1
890,602 UART: [kat] SHA2-256
892,540 UART: [kat] SHA2-384
895,433 UART: [kat] SHA2-512-ACC
897,334 UART: [kat] ECC-384
903,113 UART: [kat] HMAC-384Kdf
907,675 UART: [kat] LMS
1,475,871 UART: [kat] --
1,476,676 UART: [cold-reset] ++
1,477,254 UART: [fht] Storing FHT @ 0x50003400
1,479,953 UART: [idev] ++
1,480,121 UART: [idev] CDI.KEYID = 6
1,480,481 UART: [idev] SUBJECT.KEYID = 7
1,480,905 UART: [idev] UDS.KEYID = 0
1,481,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,267 UART: [idev] Erasing UDS.KEYID = 0
1,505,815 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,595 UART: [idev] --
1,515,700 UART: [ldev] ++
1,515,868 UART: [ldev] CDI.KEYID = 6
1,516,231 UART: [ldev] SUBJECT.KEYID = 5
1,516,657 UART: [ldev] AUTHORITY.KEYID = 7
1,517,120 UART: [ldev] FE.KEYID = 1
1,522,344 UART: [ldev] Erasing FE.KEYID = 1
1,547,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,413 UART: [ldev] --
1,586,734 UART: [fwproc] Waiting for Commands...
1,587,471 UART: [fwproc] Received command 0x46574c44
1,588,262 UART: [fwproc] Received Image of size 114448 bytes
2,888,278 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,012 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,364 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,403 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,485,393 >>> mbox cmd response: failed
1,485,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,399 >>> mbox cmd response: failed
1,485,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,119 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
917,694 UART: [kat] HMAC-384Kdf
922,158 UART: [kat] LMS
1,170,486 UART: [kat] --
1,171,411 UART: [cold-reset] ++
1,171,819 UART: [fht] FHT @ 0x50003400
1,174,704 UART: [idev] ++
1,174,872 UART: [idev] CDI.KEYID = 6
1,175,232 UART: [idev] SUBJECT.KEYID = 7
1,175,656 UART: [idev] UDS.KEYID = 0
1,176,001 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,138 UART: [idev] Erasing UDS.KEYID = 0
1,200,341 UART: [idev] Sha1 KeyId Algorithm
1,208,887 UART: [idev] --
1,209,915 UART: [ldev] ++
1,210,083 UART: [ldev] CDI.KEYID = 6
1,210,446 UART: [ldev] SUBJECT.KEYID = 5
1,210,872 UART: [ldev] AUTHORITY.KEYID = 7
1,211,335 UART: [ldev] FE.KEYID = 1
1,216,565 UART: [ldev] Erasing FE.KEYID = 1
1,242,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,407 UART: [ldev] --
1,281,714 UART: [fwproc] Wait for Commands...
1,282,370 UART: [fwproc] Recv command 0x46574c44
1,283,098 UART: [fwproc] Recv'd Img size: 114448 bytes
1,325,971 UART: ROM Fatal Error: 0x000B0010
1,327,128 >>> mbox cmd response: failed
1,327,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,134 >>> mbox cmd response: failed
1,327,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,896 UART: [state] LifecycleState = Unprovisioned
86,551 UART: [state] DebugLocked = No
87,197 UART: [state] WD Timer not started. Device not locked for debugging
88,388 UART: [kat] SHA2-256
894,038 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,163 UART: [kat] ++
898,315 UART: [kat] sha1
902,393 UART: [kat] SHA2-256
904,333 UART: [kat] SHA2-384
907,070 UART: [kat] SHA2-512-ACC
908,971 UART: [kat] ECC-384
918,592 UART: [kat] HMAC-384Kdf
923,118 UART: [kat] LMS
1,171,446 UART: [kat] --
1,172,387 UART: [cold-reset] ++
1,172,773 UART: [fht] FHT @ 0x50003400
1,175,448 UART: [idev] ++
1,175,616 UART: [idev] CDI.KEYID = 6
1,175,976 UART: [idev] SUBJECT.KEYID = 7
1,176,400 UART: [idev] UDS.KEYID = 0
1,176,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,428 UART: [idev] Erasing UDS.KEYID = 0
1,201,901 UART: [idev] Sha1 KeyId Algorithm
1,210,391 UART: [idev] --
1,211,319 UART: [ldev] ++
1,211,487 UART: [ldev] CDI.KEYID = 6
1,211,850 UART: [ldev] SUBJECT.KEYID = 5
1,212,276 UART: [ldev] AUTHORITY.KEYID = 7
1,212,739 UART: [ldev] FE.KEYID = 1
1,217,775 UART: [ldev] Erasing FE.KEYID = 1
1,244,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,553 UART: [ldev] --
1,283,898 UART: [fwproc] Wait for Commands...
1,284,500 UART: [fwproc] Recv command 0x46574c44
1,285,228 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,974 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,949 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,725 >>> mbox cmd response: failed
1,180,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,731 >>> mbox cmd response: failed
1,180,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,056 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,875 UART: [state] LifecycleState = Unprovisioned
86,530 UART: [state] DebugLocked = No
87,244 UART: [state] WD Timer not started. Device not locked for debugging
88,495 UART: [kat] SHA2-256
894,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,270 UART: [kat] ++
898,422 UART: [kat] sha1
902,582 UART: [kat] SHA2-256
904,522 UART: [kat] SHA2-384
907,231 UART: [kat] SHA2-512-ACC
909,132 UART: [kat] ECC-384
918,753 UART: [kat] HMAC-384Kdf
923,391 UART: [kat] LMS
1,171,719 UART: [kat] --
1,172,606 UART: [cold-reset] ++
1,172,976 UART: [fht] FHT @ 0x50003400
1,175,573 UART: [idev] ++
1,175,741 UART: [idev] CDI.KEYID = 6
1,176,101 UART: [idev] SUBJECT.KEYID = 7
1,176,525 UART: [idev] UDS.KEYID = 0
1,176,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,531 UART: [idev] Erasing UDS.KEYID = 0
1,201,078 UART: [idev] Sha1 KeyId Algorithm
1,209,628 UART: [idev] --
1,210,610 UART: [ldev] ++
1,210,778 UART: [ldev] CDI.KEYID = 6
1,211,141 UART: [ldev] SUBJECT.KEYID = 5
1,211,567 UART: [ldev] AUTHORITY.KEYID = 7
1,212,030 UART: [ldev] FE.KEYID = 1
1,217,620 UART: [ldev] Erasing FE.KEYID = 1
1,244,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,372 UART: [ldev] --
1,283,685 UART: [fwproc] Wait for Commands...
1,284,385 UART: [fwproc] Recv command 0x46574c44
1,285,113 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,712 UART: ROM Fatal Error: 0x000B0010
1,328,869 >>> mbox cmd response: failed
1,328,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,875 >>> mbox cmd response: failed
1,328,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,881 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,904 UART: [kat] SHA2-256
903,844 UART: [kat] SHA2-384
906,535 UART: [kat] SHA2-512-ACC
908,436 UART: [kat] ECC-384
918,639 UART: [kat] HMAC-384Kdf
923,415 UART: [kat] LMS
1,171,743 UART: [kat] --
1,172,710 UART: [cold-reset] ++
1,173,202 UART: [fht] FHT @ 0x50003400
1,175,847 UART: [idev] ++
1,176,015 UART: [idev] CDI.KEYID = 6
1,176,375 UART: [idev] SUBJECT.KEYID = 7
1,176,799 UART: [idev] UDS.KEYID = 0
1,177,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,879 UART: [idev] Erasing UDS.KEYID = 0
1,202,114 UART: [idev] Sha1 KeyId Algorithm
1,210,508 UART: [idev] --
1,211,516 UART: [ldev] ++
1,211,684 UART: [ldev] CDI.KEYID = 6
1,212,047 UART: [ldev] SUBJECT.KEYID = 5
1,212,473 UART: [ldev] AUTHORITY.KEYID = 7
1,212,936 UART: [ldev] FE.KEYID = 1
1,217,926 UART: [ldev] Erasing FE.KEYID = 1
1,244,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,256 UART: [ldev] --
1,283,743 UART: [fwproc] Wait for Commands...
1,284,557 UART: [fwproc] Recv command 0x46574c44
1,285,285 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,066 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,142 >>> mbox cmd response: failed
1,185,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,148 >>> mbox cmd response: failed
1,185,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,834 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,283 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,207 UART: [kat] ++
895,359 UART: [kat] sha1
899,647 UART: [kat] SHA2-256
901,587 UART: [kat] SHA2-384
904,344 UART: [kat] SHA2-512-ACC
906,245 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,021 UART: [idev] Erasing UDS.KEYID = 0
1,198,815 UART: [idev] Sha1 KeyId Algorithm
1,207,635 UART: [idev] --
1,208,570 UART: [ldev] ++
1,208,738 UART: [ldev] CDI.KEYID = 6
1,209,102 UART: [ldev] SUBJECT.KEYID = 5
1,209,529 UART: [ldev] AUTHORITY.KEYID = 7
1,209,992 UART: [ldev] FE.KEYID = 1
1,215,266 UART: [ldev] Erasing FE.KEYID = 1
1,241,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,872 UART: [ldev] --
1,280,278 UART: [fwproc] Wait for Commands...
1,280,907 UART: [fwproc] Recv command 0x46574c44
1,281,640 UART: [fwproc] Recv'd Img size: 114448 bytes
1,322,687 UART: ROM Fatal Error: 0x000B0010
1,323,844 >>> mbox cmd response: failed
1,323,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,850 >>> mbox cmd response: failed
1,323,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,276 UART: [kat] SHA2-256
890,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,955 UART: [kat] ++
895,107 UART: [kat] sha1
899,293 UART: [kat] SHA2-256
901,233 UART: [kat] SHA2-384
903,972 UART: [kat] SHA2-512-ACC
905,873 UART: [kat] ECC-384
915,932 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,855 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,198,911 UART: [idev] Sha1 KeyId Algorithm
1,207,855 UART: [idev] --
1,209,112 UART: [ldev] ++
1,209,280 UART: [ldev] CDI.KEYID = 6
1,209,644 UART: [ldev] SUBJECT.KEYID = 5
1,210,071 UART: [ldev] AUTHORITY.KEYID = 7
1,210,534 UART: [ldev] FE.KEYID = 1
1,215,818 UART: [ldev] Erasing FE.KEYID = 1
1,242,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,388 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,367 UART: [fwproc] Recv command 0x46574c44
1,283,100 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,847 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,905 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,959 >>> mbox cmd response: failed
1,176,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,965 >>> mbox cmd response: failed
1,176,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,663 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,830 UART: [kat] ++
895,982 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,355 UART: [kat] HMAC-384Kdf
920,789 UART: [kat] LMS
1,169,101 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,172,976 UART: [idev] ++
1,173,144 UART: [idev] CDI.KEYID = 6
1,173,505 UART: [idev] SUBJECT.KEYID = 7
1,173,930 UART: [idev] UDS.KEYID = 0
1,174,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,776 UART: [idev] Erasing UDS.KEYID = 0
1,198,322 UART: [idev] Sha1 KeyId Algorithm
1,207,212 UART: [idev] --
1,208,375 UART: [ldev] ++
1,208,543 UART: [ldev] CDI.KEYID = 6
1,208,907 UART: [ldev] SUBJECT.KEYID = 5
1,209,334 UART: [ldev] AUTHORITY.KEYID = 7
1,209,797 UART: [ldev] FE.KEYID = 1
1,214,865 UART: [ldev] Erasing FE.KEYID = 1
1,240,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,883 UART: [ldev] --
1,280,223 UART: [fwproc] Wait for Commands...
1,280,808 UART: [fwproc] Recv command 0x46574c44
1,281,541 UART: [fwproc] Recv'd Img size: 114448 bytes
1,324,454 UART: ROM Fatal Error: 0x000B0010
1,325,611 >>> mbox cmd response: failed
1,325,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,617 >>> mbox cmd response: failed
1,325,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,623 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,017 UART: [state] LifecycleState = Unprovisioned
86,672 UART: [state] DebugLocked = No
87,200 UART: [state] WD Timer not started. Device not locked for debugging
88,319 UART: [kat] SHA2-256
891,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,998 UART: [kat] ++
896,150 UART: [kat] sha1
900,268 UART: [kat] SHA2-256
902,208 UART: [kat] SHA2-384
905,111 UART: [kat] SHA2-512-ACC
907,012 UART: [kat] ECC-384
917,131 UART: [kat] HMAC-384Kdf
921,673 UART: [kat] LMS
1,169,985 UART: [kat] --
1,171,016 UART: [cold-reset] ++
1,171,538 UART: [fht] FHT @ 0x50003400
1,174,214 UART: [idev] ++
1,174,382 UART: [idev] CDI.KEYID = 6
1,174,743 UART: [idev] SUBJECT.KEYID = 7
1,175,168 UART: [idev] UDS.KEYID = 0
1,175,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,314 UART: [idev] Erasing UDS.KEYID = 0
1,200,154 UART: [idev] Sha1 KeyId Algorithm
1,209,074 UART: [idev] --
1,210,117 UART: [ldev] ++
1,210,285 UART: [ldev] CDI.KEYID = 6
1,210,649 UART: [ldev] SUBJECT.KEYID = 5
1,211,076 UART: [ldev] AUTHORITY.KEYID = 7
1,211,539 UART: [ldev] FE.KEYID = 1
1,216,577 UART: [ldev] Erasing FE.KEYID = 1
1,242,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,703 UART: [fwproc] Wait for Commands...
1,282,506 UART: [fwproc] Recv command 0x46574c44
1,283,239 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,044 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,908 >>> mbox cmd response: failed
1,178,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,914 >>> mbox cmd response: failed
1,178,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,486 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,254 UART:
192,619 UART: Running Caliptra ROM ...
193,825 UART:
193,988 UART: [state] CFI Enabled
257,888 UART: [state] LifecycleState = Unprovisioned
259,864 UART: [state] DebugLocked = No
261,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
266,940 UART: [kat] SHA2-256
436,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,154 UART: [kat] ++
447,610 UART: [kat] sha1
458,541 UART: [kat] SHA2-256
461,223 UART: [kat] SHA2-384
467,577 UART: [kat] SHA2-512-ACC
469,914 UART: [kat] ECC-384
2,766,221 UART: [kat] HMAC-384Kdf
2,788,406 UART: [kat] LMS
3,978,683 UART: [kat] --
3,982,977 UART: [cold-reset] ++
3,985,614 UART: [fht] Storing FHT @ 0x50003400
3,998,072 UART: [idev] ++
3,998,691 UART: [idev] CDI.KEYID = 6
3,999,581 UART: [idev] SUBJECT.KEYID = 7
4,000,804 UART: [idev] UDS.KEYID = 0
4,003,447 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,147,132 UART: [idev] Erasing UDS.KEYID = 0
7,333,319 UART: [idev] Using Sha1 for KeyId Algorithm
7,354,659 UART: [idev] --
7,358,716 UART: [ldev] ++
7,359,332 UART: [ldev] CDI.KEYID = 6
7,360,254 UART: [ldev] SUBJECT.KEYID = 5
7,361,474 UART: [ldev] AUTHORITY.KEYID = 7
7,362,762 UART: [ldev] FE.KEYID = 1
7,390,968 UART: [ldev] Erasing FE.KEYID = 1
10,725,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,020,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,034,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,049,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,064,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,083,240 UART: [ldev] --
13,088,078 UART: [fwproc] Waiting for Commands...
13,090,944 UART: [fwproc] Received command 0x46574c44
13,093,137 UART: [fwproc] Received Image of size 114124 bytes
15,799,685 UART: ROM Fatal Error: 0x000B0040
15,803,186 >>> mbox cmd response: failed
15,803,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,803,935 >>> mbox cmd response: failed
15,804,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,804,493 >>> mbox cmd response: failed
Initializing fuses
2,063,104 writing to cptra_bootfsm_go
2,252,407 UART:
2,252,754 UART: Running Caliptra ROM ...
2,253,891 UART:
2,254,056 UART: [state] CFI Enabled
2,327,222 UART: [state] LifecycleState = Unprovisioned
2,329,193 UART: [state] DebugLocked = No
2,330,921 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,336,589 UART: [kat] SHA2-256
2,506,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,516,766 UART: [kat] ++
2,517,318 UART: [kat] sha1
2,528,868 UART: [kat] SHA2-256
2,531,564 UART: [kat] SHA2-384
2,538,450 UART: [kat] SHA2-512-ACC
2,540,806 UART: [kat] ECC-384
4,830,946 UART: [kat] HMAC-384Kdf
4,843,455 UART: [kat] LMS
6,033,709 UART: [kat] --
6,036,327 UART: [cold-reset] ++
6,038,702 UART: [fht] Storing FHT @ 0x50003400
6,050,299 UART: [idev] ++
6,050,868 UART: [idev] CDI.KEYID = 6
6,051,841 UART: [idev] SUBJECT.KEYID = 7
6,053,059 UART: [idev] UDS.KEYID = 0
6,055,387 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,199,027 UART: [idev] Erasing UDS.KEYID = 0
9,387,640 UART: [idev] Using Sha1 for KeyId Algorithm
9,409,776 UART: [idev] --
9,414,336 UART: [ldev] ++
9,414,933 UART: [ldev] CDI.KEYID = 6
9,415,847 UART: [ldev] SUBJECT.KEYID = 5
9,417,112 UART: [ldev] AUTHORITY.KEYID = 7
9,418,356 UART: [ldev] FE.KEYID = 1
9,464,111 UART: [ldev] Erasing FE.KEYID = 1
12,797,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,113,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,128,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,143,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,157,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,176,342 UART: [ldev] --
15,181,497 UART: [fwproc] Waiting for Commands...
15,183,976 UART: [fwproc] Received command 0x46574c44
15,186,166 UART: [fwproc] Received Image of size 114124 bytes
19,233,495 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,315,998 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,384,893 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,702,346 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,808,240 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,570,026 >>> mbox cmd response: failed
15,570,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,570,965 >>> mbox cmd response: failed
15,571,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,571,535 >>> mbox cmd response: failed
Initializing fuses
2,062,552 writing to cptra_bootfsm_go
5,834,678 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,897,533 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,624 UART:
192,980 UART: Running Caliptra ROM ...
194,128 UART:
603,926 UART: [state] CFI Enabled
618,046 UART: [state] LifecycleState = Unprovisioned
619,976 UART: [state] DebugLocked = No
622,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,239 UART: [kat] SHA2-256
795,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,521 UART: [kat] ++
807,054 UART: [kat] sha1
817,809 UART: [kat] SHA2-256
820,526 UART: [kat] SHA2-384
827,371 UART: [kat] SHA2-512-ACC
829,715 UART: [kat] ECC-384
3,111,192 UART: [kat] HMAC-384Kdf
3,123,856 UART: [kat] LMS
4,314,007 UART: [kat] --
4,320,726 UART: [cold-reset] ++
4,322,552 UART: [fht] Storing FHT @ 0x50003400
4,334,145 UART: [idev] ++
4,334,895 UART: [idev] CDI.KEYID = 6
4,335,815 UART: [idev] SUBJECT.KEYID = 7
4,336,916 UART: [idev] UDS.KEYID = 0
4,339,462 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,798 UART: [idev] Erasing UDS.KEYID = 0
7,626,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,152 UART: [idev] --
7,653,662 UART: [ldev] ++
7,654,232 UART: [ldev] CDI.KEYID = 6
7,655,249 UART: [ldev] SUBJECT.KEYID = 5
7,656,428 UART: [ldev] AUTHORITY.KEYID = 7
7,657,660 UART: [ldev] FE.KEYID = 1
7,669,786 UART: [ldev] Erasing FE.KEYID = 1
10,960,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,063 UART: [ldev] --
13,321,061 UART: [fwproc] Waiting for Commands...
13,324,404 UART: [fwproc] Received command 0x46574c44
13,326,592 UART: [fwproc] Received Image of size 114124 bytes
16,029,929 UART: ROM Fatal Error: 0x000B0040
16,033,437 >>> mbox cmd response: failed
16,033,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,034,165 >>> mbox cmd response: failed
16,034,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,034,754 >>> mbox cmd response: failed
Initializing fuses
2,060,726 writing to cptra_bootfsm_go
2,250,014 UART:
2,250,372 UART: Running Caliptra ROM ...
2,251,516 UART:
4,421,224 UART: [state] CFI Enabled
4,438,161 UART: [state] LifecycleState = Unprovisioned
4,440,070 UART: [state] DebugLocked = No
4,442,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,446,912 UART: [kat] SHA2-256
4,616,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,627,213 UART: [kat] ++
4,627,779 UART: [kat] sha1
4,639,651 UART: [kat] SHA2-256
4,642,353 UART: [kat] SHA2-384
4,648,555 UART: [kat] SHA2-512-ACC
4,650,903 UART: [kat] ECC-384
6,934,924 UART: [kat] HMAC-384Kdf
6,945,873 UART: [kat] LMS
8,135,975 UART: [kat] --
8,141,560 UART: [cold-reset] ++
8,143,415 UART: [fht] Storing FHT @ 0x50003400
8,154,580 UART: [idev] ++
8,155,202 UART: [idev] CDI.KEYID = 6
8,156,130 UART: [idev] SUBJECT.KEYID = 7
8,157,344 UART: [idev] UDS.KEYID = 0
8,159,397 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,302,773 UART: [idev] Erasing UDS.KEYID = 0
11,441,692 UART: [idev] Using Sha1 for KeyId Algorithm
11,462,472 UART: [idev] --
11,467,702 UART: [ldev] ++
11,468,267 UART: [ldev] CDI.KEYID = 6
11,469,281 UART: [ldev] SUBJECT.KEYID = 5
11,470,467 UART: [ldev] AUTHORITY.KEYID = 7
11,471,712 UART: [ldev] FE.KEYID = 1
11,483,977 UART: [ldev] Erasing FE.KEYID = 1
14,768,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,062,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,077,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,092,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,106,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,126,106 UART: [ldev] --
17,130,883 UART: [fwproc] Waiting for Commands...
17,132,661 UART: [fwproc] Received command 0x46574c44
17,134,879 UART: [fwproc] Received Image of size 114124 bytes
21,187,067 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,265,070 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,333,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
21,650,607 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
4,130,381 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,769,180 >>> mbox cmd response: failed
15,769,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,126 >>> mbox cmd response: failed
15,770,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,715 >>> mbox cmd response: failed
Initializing fuses
2,056,106 writing to cptra_bootfsm_go
8,212,533 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,157,207 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,324 UART:
192,676 UART: Running Caliptra ROM ...
193,791 UART:
193,932 UART: [state] CFI Enabled
259,809 UART: [state] LifecycleState = Unprovisioned
261,675 UART: [state] DebugLocked = No
264,422 UART: [state] WD Timer not started. Device not locked for debugging
267,820 UART: [kat] SHA2-256
446,953 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,483 UART: [kat] ++
459,021 UART: [kat] sha1
469,477 UART: [kat] SHA2-256
472,475 UART: [kat] SHA2-384
478,204 UART: [kat] SHA2-512-ACC
481,190 UART: [kat] ECC-384
2,945,043 UART: [kat] HMAC-384Kdf
2,969,268 UART: [kat] LMS
3,498,727 UART: [kat] --
3,502,231 UART: [cold-reset] ++
3,504,477 UART: [fht] FHT @ 0x50003400
3,515,105 UART: [idev] ++
3,515,719 UART: [idev] CDI.KEYID = 6
3,516,606 UART: [idev] SUBJECT.KEYID = 7
3,517,821 UART: [idev] UDS.KEYID = 0
3,520,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,664,830 UART: [idev] Erasing UDS.KEYID = 0
6,024,439 UART: [idev] Sha1 KeyId Algorithm
6,048,218 UART: [idev] --
6,052,866 UART: [ldev] ++
6,053,446 UART: [ldev] CDI.KEYID = 6
6,054,357 UART: [ldev] SUBJECT.KEYID = 5
6,055,459 UART: [ldev] AUTHORITY.KEYID = 7
6,056,800 UART: [ldev] FE.KEYID = 1
6,098,510 UART: [ldev] Erasing FE.KEYID = 1
8,601,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,253 UART: [ldev] --
10,413,296 UART: [fwproc] Wait for Commands...
10,415,734 UART: [fwproc] Recv command 0x46574c44
10,417,830 UART: [fwproc] Recv'd Img size: 114448 bytes
12,468,317 UART: ROM Fatal Error: 0x000B0040
12,471,436 >>> mbox cmd response: failed
12,471,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,202 >>> mbox cmd response: failed
12,472,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,764 >>> mbox cmd response: failed
Initializing fuses
2,054,310 writing to cptra_bootfsm_go
2,243,596 UART:
2,243,954 UART: Running Caliptra ROM ...
2,245,049 UART:
2,245,209 UART: [state] CFI Enabled
2,318,797 UART: [state] LifecycleState = Unprovisioned
2,320,641 UART: [state] DebugLocked = No
2,322,931 UART: [state] WD Timer not started. Device not locked for debugging
2,327,456 UART: [kat] SHA2-256
2,506,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,122 UART: [kat] ++
2,518,673 UART: [kat] sha1
2,530,379 UART: [kat] SHA2-256
2,533,397 UART: [kat] SHA2-384
2,539,706 UART: [kat] SHA2-512-ACC
2,542,646 UART: [kat] ECC-384
5,002,402 UART: [kat] HMAC-384Kdf
5,025,602 UART: [kat] LMS
5,555,051 UART: [kat] --
5,558,296 UART: [cold-reset] ++
5,559,525 UART: [fht] FHT @ 0x50003400
5,569,961 UART: [idev] ++
5,570,524 UART: [idev] CDI.KEYID = 6
5,571,463 UART: [idev] SUBJECT.KEYID = 7
5,572,676 UART: [idev] UDS.KEYID = 0
5,574,993 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,719,036 UART: [idev] Erasing UDS.KEYID = 0
8,079,412 UART: [idev] Sha1 KeyId Algorithm
8,102,478 UART: [idev] --
8,106,716 UART: [ldev] ++
8,107,291 UART: [ldev] CDI.KEYID = 6
8,108,177 UART: [ldev] SUBJECT.KEYID = 5
8,109,409 UART: [ldev] AUTHORITY.KEYID = 7
8,110,641 UART: [ldev] FE.KEYID = 1
8,152,572 UART: [ldev] Erasing FE.KEYID = 1
10,658,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,844 UART: [ldev] --
12,466,569 UART: [fwproc] Wait for Commands...
12,468,284 UART: [fwproc] Recv command 0x46574c44
12,470,351 UART: [fwproc] Recv'd Img size: 114448 bytes
15,876,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,949,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,018,192 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,335,673 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
3,365,404 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,236,243 >>> mbox cmd response: failed
12,236,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,237,124 >>> mbox cmd response: failed
12,237,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,237,696 >>> mbox cmd response: failed
Initializing fuses
2,060,053 writing to cptra_bootfsm_go
5,424,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,091,844 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,505 writing to cptra_bootfsm_go
192,655 UART:
193,101 UART: Running Caliptra ROM ...
194,288 UART:
603,852 UART: [state] CFI Enabled
617,417 UART: [state] LifecycleState = Unprovisioned
619,246 UART: [state] DebugLocked = No
620,808 UART: [state] WD Timer not started. Device not locked for debugging
625,302 UART: [kat] SHA2-256
804,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,000 UART: [kat] ++
816,457 UART: [kat] sha1
827,273 UART: [kat] SHA2-256
830,317 UART: [kat] SHA2-384
835,109 UART: [kat] SHA2-512-ACC
838,098 UART: [kat] ECC-384
3,283,527 UART: [kat] HMAC-384Kdf
3,296,760 UART: [kat] LMS
3,826,251 UART: [kat] --
3,831,711 UART: [cold-reset] ++
3,833,213 UART: [fht] FHT @ 0x50003400
3,843,390 UART: [idev] ++
3,843,964 UART: [idev] CDI.KEYID = 6
3,844,887 UART: [idev] SUBJECT.KEYID = 7
3,846,068 UART: [idev] UDS.KEYID = 0
3,848,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,964 UART: [idev] Erasing UDS.KEYID = 0
6,321,086 UART: [idev] Sha1 KeyId Algorithm
6,343,772 UART: [idev] --
6,347,875 UART: [ldev] ++
6,348,480 UART: [ldev] CDI.KEYID = 6
6,349,368 UART: [ldev] SUBJECT.KEYID = 5
6,350,477 UART: [ldev] AUTHORITY.KEYID = 7
6,351,708 UART: [ldev] FE.KEYID = 1
6,363,437 UART: [ldev] Erasing FE.KEYID = 1
8,838,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,195 UART: [ldev] --
10,629,516 UART: [fwproc] Wait for Commands...
10,631,557 UART: [fwproc] Recv command 0x46574c44
10,633,650 UART: [fwproc] Recv'd Img size: 114448 bytes
12,687,139 UART: ROM Fatal Error: 0x000B0040
12,690,208 >>> mbox cmd response: failed
12,690,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,690,890 >>> mbox cmd response: failed
12,691,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,691,560 >>> mbox cmd response: failed
Initializing fuses
2,058,933 writing to cptra_bootfsm_go
2,248,245 UART:
2,248,597 UART: Running Caliptra ROM ...
2,249,760 UART:
7,759,925 UART: [state] CFI Enabled
7,771,325 UART: [state] LifecycleState = Unprovisioned
7,773,183 UART: [state] DebugLocked = No
7,774,839 UART: [state] WD Timer not started. Device not locked for debugging
7,777,829 UART: [kat] SHA2-256
7,956,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,968,493 UART: [kat] ++
7,969,031 UART: [kat] sha1
7,980,090 UART: [kat] SHA2-256
7,983,085 UART: [kat] SHA2-384
7,988,436 UART: [kat] SHA2-512-ACC
7,991,387 UART: [kat] ECC-384
10,433,003 UART: [kat] HMAC-384Kdf
10,445,878 UART: [kat] LMS
10,975,385 UART: [kat] --
10,979,821 UART: [cold-reset] ++
10,981,429 UART: [fht] FHT @ 0x50003400
10,993,001 UART: [idev] ++
10,993,575 UART: [idev] CDI.KEYID = 6
10,994,483 UART: [idev] SUBJECT.KEYID = 7
10,995,696 UART: [idev] UDS.KEYID = 0
10,997,972 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,141,807 UART: [idev] Erasing UDS.KEYID = 0
13,464,429 UART: [idev] Sha1 KeyId Algorithm
13,488,302 UART: [idev] --
13,492,409 UART: [ldev] ++
13,492,978 UART: [ldev] CDI.KEYID = 6
13,493,939 UART: [ldev] SUBJECT.KEYID = 5
13,495,194 UART: [ldev] AUTHORITY.KEYID = 7
13,496,385 UART: [ldev] FE.KEYID = 1
13,509,547 UART: [ldev] Erasing FE.KEYID = 1
15,980,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,698,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,714,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,730,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,746,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,766,742 UART: [ldev] --
17,771,791 UART: [fwproc] Wait for Commands...
17,774,483 UART: [fwproc] Recv command 0x46574c44
17,776,578 UART: [fwproc] Recv'd Img size: 114448 bytes
21,181,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,247,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,316,539 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
21,634,580 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
3,689,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,451,329 >>> mbox cmd response: failed
12,451,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,253 >>> mbox cmd response: failed
12,452,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,814 >>> mbox cmd response: failed
Initializing fuses
2,056,283 writing to cptra_bootfsm_go
11,103,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
21,692,158 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,441,598 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,298,800 >>> mbox cmd response: failed
12,299,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,683 >>> mbox cmd response: failed
12,299,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,300,250 >>> mbox cmd response: failed
Initializing fuses
2,064,610 writing to cptra_bootfsm_go
5,497,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,779,662 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,760,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,524,121 >>> mbox cmd response: failed
12,524,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,185 >>> mbox cmd response: failed
12,525,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,804 >>> mbox cmd response: failed
Initializing fuses
2,053,745 writing to cptra_bootfsm_go
11,091,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,299,185 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,185 UART: [kat] SHA2-256
882,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,231 UART: [kat] ++
886,383 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,098 UART: [kat] SHA2-512-ACC
896,999 UART: [kat] ECC-384
902,188 UART: [kat] HMAC-384Kdf
906,756 UART: [kat] LMS
1,474,952 UART: [kat] --
1,475,779 UART: [cold-reset] ++
1,476,117 UART: [fht] Storing FHT @ 0x50003400
1,478,940 UART: [idev] ++
1,479,108 UART: [idev] CDI.KEYID = 6
1,479,468 UART: [idev] SUBJECT.KEYID = 7
1,479,892 UART: [idev] UDS.KEYID = 0
1,480,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,740 UART: [idev] Erasing UDS.KEYID = 0
1,504,140 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,922 UART: [idev] --
1,513,873 UART: [ldev] ++
1,514,041 UART: [ldev] CDI.KEYID = 6
1,514,404 UART: [ldev] SUBJECT.KEYID = 5
1,514,830 UART: [ldev] AUTHORITY.KEYID = 7
1,515,293 UART: [ldev] FE.KEYID = 1
1,520,355 UART: [ldev] Erasing FE.KEYID = 1
1,545,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,588 UART: [ldev] --
1,585,087 UART: [fwproc] Waiting for Commands...
1,585,914 UART: [fwproc] Received command 0x46574c44
1,586,705 UART: [fwproc] Received Image of size 114448 bytes
1,633,910 UART: ROM Fatal Error: 0x000B0040
1,635,067 >>> mbox cmd response: failed
1,635,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,073 >>> mbox cmd response: failed
1,635,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,281 UART: [kat] SHA2-256
882,212 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,327 UART: [kat] ++
886,479 UART: [kat] sha1
890,625 UART: [kat] SHA2-256
892,563 UART: [kat] SHA2-384
895,266 UART: [kat] SHA2-512-ACC
897,167 UART: [kat] ECC-384
903,198 UART: [kat] HMAC-384Kdf
907,776 UART: [kat] LMS
1,475,972 UART: [kat] --
1,476,893 UART: [cold-reset] ++
1,477,285 UART: [fht] Storing FHT @ 0x50003400
1,480,028 UART: [idev] ++
1,480,196 UART: [idev] CDI.KEYID = 6
1,480,556 UART: [idev] SUBJECT.KEYID = 7
1,480,980 UART: [idev] UDS.KEYID = 0
1,481,325 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,714 UART: [idev] Erasing UDS.KEYID = 0
1,505,666 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,248 UART: [idev] --
1,515,393 UART: [ldev] ++
1,515,561 UART: [ldev] CDI.KEYID = 6
1,515,924 UART: [ldev] SUBJECT.KEYID = 5
1,516,350 UART: [ldev] AUTHORITY.KEYID = 7
1,516,813 UART: [ldev] FE.KEYID = 1
1,522,063 UART: [ldev] Erasing FE.KEYID = 1
1,547,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,148 UART: [ldev] --
1,586,409 UART: [fwproc] Waiting for Commands...
1,587,260 UART: [fwproc] Received command 0x46574c44
1,588,051 UART: [fwproc] Received Image of size 114448 bytes
2,886,685 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,198 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,952 >>> mbox cmd response: failed
1,488,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,958 >>> mbox cmd response: failed
1,488,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,964 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,367 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,586 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,296 UART: [kat] SHA2-256
882,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,342 UART: [kat] ++
886,494 UART: [kat] sha1
890,860 UART: [kat] SHA2-256
892,798 UART: [kat] SHA2-384
895,669 UART: [kat] SHA2-512-ACC
897,570 UART: [kat] ECC-384
903,231 UART: [kat] HMAC-384Kdf
907,841 UART: [kat] LMS
1,476,037 UART: [kat] --
1,476,768 UART: [cold-reset] ++
1,477,164 UART: [fht] Storing FHT @ 0x50003400
1,479,893 UART: [idev] ++
1,480,061 UART: [idev] CDI.KEYID = 6
1,480,421 UART: [idev] SUBJECT.KEYID = 7
1,480,845 UART: [idev] UDS.KEYID = 0
1,481,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,557 UART: [idev] Erasing UDS.KEYID = 0
1,505,363 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,867 UART: [idev] --
1,514,812 UART: [ldev] ++
1,514,980 UART: [ldev] CDI.KEYID = 6
1,515,343 UART: [ldev] SUBJECT.KEYID = 5
1,515,769 UART: [ldev] AUTHORITY.KEYID = 7
1,516,232 UART: [ldev] FE.KEYID = 1
1,521,448 UART: [ldev] Erasing FE.KEYID = 1
1,547,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,111 UART: [ldev] --
1,586,580 UART: [fwproc] Waiting for Commands...
1,587,433 UART: [fwproc] Received command 0x46574c44
1,588,224 UART: [fwproc] Received Image of size 114448 bytes
1,635,751 UART: ROM Fatal Error: 0x000B0040
1,636,908 >>> mbox cmd response: failed
1,636,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,914 >>> mbox cmd response: failed
1,636,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,835 UART: [state] LifecycleState = Unprovisioned
85,490 UART: [state] DebugLocked = No
86,138 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,662 UART: [kat] SHA2-256
881,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,708 UART: [kat] ++
885,860 UART: [kat] sha1
890,056 UART: [kat] SHA2-256
891,994 UART: [kat] SHA2-384
894,707 UART: [kat] SHA2-512-ACC
896,608 UART: [kat] ECC-384
902,127 UART: [kat] HMAC-384Kdf
906,601 UART: [kat] LMS
1,474,797 UART: [kat] --
1,475,836 UART: [cold-reset] ++
1,476,204 UART: [fht] Storing FHT @ 0x50003400
1,478,877 UART: [idev] ++
1,479,045 UART: [idev] CDI.KEYID = 6
1,479,405 UART: [idev] SUBJECT.KEYID = 7
1,479,829 UART: [idev] UDS.KEYID = 0
1,480,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,543 UART: [idev] Erasing UDS.KEYID = 0
1,504,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,291 UART: [idev] --
1,514,314 UART: [ldev] ++
1,514,482 UART: [ldev] CDI.KEYID = 6
1,514,845 UART: [ldev] SUBJECT.KEYID = 5
1,515,271 UART: [ldev] AUTHORITY.KEYID = 7
1,515,734 UART: [ldev] FE.KEYID = 1
1,520,826 UART: [ldev] Erasing FE.KEYID = 1
1,546,117 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,077 UART: [ldev] --
1,585,362 UART: [fwproc] Waiting for Commands...
1,586,159 UART: [fwproc] Received command 0x46574c44
1,586,950 UART: [fwproc] Received Image of size 114448 bytes
2,885,864 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,610 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,069 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,953 >>> mbox cmd response: failed
1,489,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,959 >>> mbox cmd response: failed
1,489,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,045 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
893,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,167 UART: [kat] ++
897,319 UART: [kat] sha1
901,615 UART: [kat] SHA2-256
903,555 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
918,402 UART: [kat] HMAC-384Kdf
922,936 UART: [kat] LMS
1,171,264 UART: [kat] --
1,172,013 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,175,010 UART: [idev] ++
1,175,178 UART: [idev] CDI.KEYID = 6
1,175,538 UART: [idev] SUBJECT.KEYID = 7
1,175,962 UART: [idev] UDS.KEYID = 0
1,176,307 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,042 UART: [idev] Erasing UDS.KEYID = 0
1,200,893 UART: [idev] Sha1 KeyId Algorithm
1,209,243 UART: [idev] --
1,210,111 UART: [ldev] ++
1,210,279 UART: [ldev] CDI.KEYID = 6
1,210,642 UART: [ldev] SUBJECT.KEYID = 5
1,211,068 UART: [ldev] AUTHORITY.KEYID = 7
1,211,531 UART: [ldev] FE.KEYID = 1
1,216,601 UART: [ldev] Erasing FE.KEYID = 1
1,242,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,039 UART: [ldev] --
1,282,452 UART: [fwproc] Wait for Commands...
1,283,080 UART: [fwproc] Recv command 0x46574c44
1,283,808 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,127 UART: ROM Fatal Error: 0x000B0040
1,332,284 >>> mbox cmd response: failed
1,332,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,290 >>> mbox cmd response: failed
1,332,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
893,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,559 UART: [kat] ++
897,711 UART: [kat] sha1
901,893 UART: [kat] SHA2-256
903,833 UART: [kat] SHA2-384
906,604 UART: [kat] SHA2-512-ACC
908,505 UART: [kat] ECC-384
918,514 UART: [kat] HMAC-384Kdf
923,094 UART: [kat] LMS
1,171,422 UART: [kat] --
1,172,373 UART: [cold-reset] ++
1,172,723 UART: [fht] FHT @ 0x50003400
1,175,272 UART: [idev] ++
1,175,440 UART: [idev] CDI.KEYID = 6
1,175,800 UART: [idev] SUBJECT.KEYID = 7
1,176,224 UART: [idev] UDS.KEYID = 0
1,176,569 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,068 UART: [idev] Erasing UDS.KEYID = 0
1,200,631 UART: [idev] Sha1 KeyId Algorithm
1,209,089 UART: [idev] --
1,210,261 UART: [ldev] ++
1,210,429 UART: [ldev] CDI.KEYID = 6
1,210,792 UART: [ldev] SUBJECT.KEYID = 5
1,211,218 UART: [ldev] AUTHORITY.KEYID = 7
1,211,681 UART: [ldev] FE.KEYID = 1
1,216,521 UART: [ldev] Erasing FE.KEYID = 1
1,242,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,188 UART: [fwproc] Wait for Commands...
1,282,840 UART: [fwproc] Recv command 0x46574c44
1,283,568 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,545 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,513 >>> mbox cmd response: failed
1,185,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,519 >>> mbox cmd response: failed
1,185,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,038 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,821 UART: [state] LifecycleState = Unprovisioned
85,476 UART: [state] DebugLocked = No
85,990 UART: [state] WD Timer not started. Device not locked for debugging
87,237 UART: [kat] SHA2-256
892,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,012 UART: [kat] ++
897,164 UART: [kat] sha1
901,276 UART: [kat] SHA2-256
903,216 UART: [kat] SHA2-384
905,925 UART: [kat] SHA2-512-ACC
907,826 UART: [kat] ECC-384
917,677 UART: [kat] HMAC-384Kdf
922,165 UART: [kat] LMS
1,170,493 UART: [kat] --
1,171,352 UART: [cold-reset] ++
1,171,874 UART: [fht] FHT @ 0x50003400
1,174,347 UART: [idev] ++
1,174,515 UART: [idev] CDI.KEYID = 6
1,174,875 UART: [idev] SUBJECT.KEYID = 7
1,175,299 UART: [idev] UDS.KEYID = 0
1,175,644 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,303 UART: [idev] Erasing UDS.KEYID = 0
1,200,066 UART: [idev] Sha1 KeyId Algorithm
1,208,532 UART: [idev] --
1,209,746 UART: [ldev] ++
1,209,914 UART: [ldev] CDI.KEYID = 6
1,210,277 UART: [ldev] SUBJECT.KEYID = 5
1,210,703 UART: [ldev] AUTHORITY.KEYID = 7
1,211,166 UART: [ldev] FE.KEYID = 1
1,216,360 UART: [ldev] Erasing FE.KEYID = 1
1,242,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,848 UART: [ldev] --
1,282,301 UART: [fwproc] Wait for Commands...
1,283,021 UART: [fwproc] Recv command 0x46574c44
1,283,749 UART: [fwproc] Recv'd Img size: 114448 bytes
1,331,152 UART: ROM Fatal Error: 0x000B0040
1,332,309 >>> mbox cmd response: failed
1,332,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,315 >>> mbox cmd response: failed
1,332,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,342 UART: [kat] SHA2-256
904,282 UART: [kat] SHA2-384
907,021 UART: [kat] SHA2-512-ACC
908,922 UART: [kat] ECC-384
919,005 UART: [kat] HMAC-384Kdf
923,711 UART: [kat] LMS
1,172,039 UART: [kat] --
1,172,970 UART: [cold-reset] ++
1,173,546 UART: [fht] FHT @ 0x50003400
1,176,231 UART: [idev] ++
1,176,399 UART: [idev] CDI.KEYID = 6
1,176,759 UART: [idev] SUBJECT.KEYID = 7
1,177,183 UART: [idev] UDS.KEYID = 0
1,177,528 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,691 UART: [idev] Erasing UDS.KEYID = 0
1,202,810 UART: [idev] Sha1 KeyId Algorithm
1,211,406 UART: [idev] --
1,212,550 UART: [ldev] ++
1,212,718 UART: [ldev] CDI.KEYID = 6
1,213,081 UART: [ldev] SUBJECT.KEYID = 5
1,213,507 UART: [ldev] AUTHORITY.KEYID = 7
1,213,970 UART: [ldev] FE.KEYID = 1
1,219,020 UART: [ldev] Erasing FE.KEYID = 1
1,245,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,544 UART: [ldev] --
1,284,863 UART: [fwproc] Wait for Commands...
1,285,599 UART: [fwproc] Recv command 0x46574c44
1,286,327 UART: [fwproc] Recv'd Img size: 114448 bytes
2,586,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,662 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,598 >>> mbox cmd response: failed
1,184,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,604 >>> mbox cmd response: failed
1,184,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,229 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
899,905 UART: [kat] SHA2-256
901,845 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,170,231 UART: [cold-reset] ++
1,170,803 UART: [fht] FHT @ 0x50003400
1,173,539 UART: [idev] ++
1,173,707 UART: [idev] CDI.KEYID = 6
1,174,068 UART: [idev] SUBJECT.KEYID = 7
1,174,493 UART: [idev] UDS.KEYID = 0
1,174,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,589 UART: [idev] Erasing UDS.KEYID = 0
1,199,185 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,208,968 UART: [ldev] ++
1,209,136 UART: [ldev] CDI.KEYID = 6
1,209,500 UART: [ldev] SUBJECT.KEYID = 5
1,209,927 UART: [ldev] AUTHORITY.KEYID = 7
1,210,390 UART: [ldev] FE.KEYID = 1
1,215,630 UART: [ldev] Erasing FE.KEYID = 1
1,241,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,832 UART: [ldev] --
1,281,310 UART: [fwproc] Wait for Commands...
1,281,979 UART: [fwproc] Recv command 0x46574c44
1,282,712 UART: [fwproc] Recv'd Img size: 114448 bytes
1,328,982 UART: ROM Fatal Error: 0x000B0040
1,330,139 >>> mbox cmd response: failed
1,330,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,145 >>> mbox cmd response: failed
1,330,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
916,610 UART: [kat] HMAC-384Kdf
921,046 UART: [kat] LMS
1,169,358 UART: [kat] --
1,170,461 UART: [cold-reset] ++
1,171,019 UART: [fht] FHT @ 0x50003400
1,173,771 UART: [idev] ++
1,173,939 UART: [idev] CDI.KEYID = 6
1,174,300 UART: [idev] SUBJECT.KEYID = 7
1,174,725 UART: [idev] UDS.KEYID = 0
1,175,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,409 UART: [idev] Erasing UDS.KEYID = 0
1,199,665 UART: [idev] Sha1 KeyId Algorithm
1,208,671 UART: [idev] --
1,209,746 UART: [ldev] ++
1,209,914 UART: [ldev] CDI.KEYID = 6
1,210,278 UART: [ldev] SUBJECT.KEYID = 5
1,210,705 UART: [ldev] AUTHORITY.KEYID = 7
1,211,168 UART: [ldev] FE.KEYID = 1
1,216,376 UART: [ldev] Erasing FE.KEYID = 1
1,243,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,900 UART: [ldev] --
1,282,346 UART: [fwproc] Wait for Commands...
1,282,919 UART: [fwproc] Recv command 0x46574c44
1,283,652 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,475 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,642 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,096 >>> mbox cmd response: failed
1,183,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,102 >>> mbox cmd response: failed
1,183,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,611 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
915,947 UART: [kat] HMAC-384Kdf
920,611 UART: [kat] LMS
1,168,923 UART: [kat] --
1,169,816 UART: [cold-reset] ++
1,170,144 UART: [fht] FHT @ 0x50003400
1,172,716 UART: [idev] ++
1,172,884 UART: [idev] CDI.KEYID = 6
1,173,245 UART: [idev] SUBJECT.KEYID = 7
1,173,670 UART: [idev] UDS.KEYID = 0
1,174,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,424 UART: [idev] Erasing UDS.KEYID = 0
1,198,510 UART: [idev] Sha1 KeyId Algorithm
1,207,350 UART: [idev] --
1,208,547 UART: [ldev] ++
1,208,715 UART: [ldev] CDI.KEYID = 6
1,209,079 UART: [ldev] SUBJECT.KEYID = 5
1,209,506 UART: [ldev] AUTHORITY.KEYID = 7
1,209,969 UART: [ldev] FE.KEYID = 1
1,215,409 UART: [ldev] Erasing FE.KEYID = 1
1,242,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,317 UART: [fwproc] Wait for Commands...
1,281,996 UART: [fwproc] Recv command 0x46574c44
1,282,729 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,853 UART: ROM Fatal Error: 0x000B0040
1,331,010 >>> mbox cmd response: failed
1,331,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,016 >>> mbox cmd response: failed
1,331,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,101 UART: [kat] HMAC-384Kdf
920,515 UART: [kat] LMS
1,168,827 UART: [kat] --
1,169,834 UART: [cold-reset] ++
1,170,218 UART: [fht] FHT @ 0x50003400
1,172,770 UART: [idev] ++
1,172,938 UART: [idev] CDI.KEYID = 6
1,173,299 UART: [idev] SUBJECT.KEYID = 7
1,173,724 UART: [idev] UDS.KEYID = 0
1,174,070 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,932 UART: [idev] Erasing UDS.KEYID = 0
1,198,722 UART: [idev] Sha1 KeyId Algorithm
1,207,600 UART: [idev] --
1,208,675 UART: [ldev] ++
1,208,843 UART: [ldev] CDI.KEYID = 6
1,209,207 UART: [ldev] SUBJECT.KEYID = 5
1,209,634 UART: [ldev] AUTHORITY.KEYID = 7
1,210,097 UART: [ldev] FE.KEYID = 1
1,215,129 UART: [ldev] Erasing FE.KEYID = 1
1,241,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,523 UART: [ldev] --
1,280,949 UART: [fwproc] Wait for Commands...
1,281,756 UART: [fwproc] Recv command 0x46574c44
1,282,489 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,152 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,243 >>> mbox cmd response: failed
1,184,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,249 >>> mbox cmd response: failed
1,184,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,255 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,968 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,262 UART:
192,631 UART: Running Caliptra ROM ...
193,756 UART:
193,901 UART: [state] CFI Enabled
261,032 UART: [state] LifecycleState = Unprovisioned
262,967 UART: [state] DebugLocked = No
265,935 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,650 UART: [kat] SHA2-256
440,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,856 UART: [kat] ++
451,302 UART: [kat] sha1
462,687 UART: [kat] SHA2-256
465,383 UART: [kat] SHA2-384
470,068 UART: [kat] SHA2-512-ACC
472,468 UART: [kat] ECC-384
2,766,160 UART: [kat] HMAC-384Kdf
2,796,717 UART: [kat] LMS
3,987,026 UART: [kat] --
3,990,675 UART: [cold-reset] ++
3,992,610 UART: [fht] Storing FHT @ 0x50003400
4,005,391 UART: [idev] ++
4,005,969 UART: [idev] CDI.KEYID = 6
4,007,037 UART: [idev] SUBJECT.KEYID = 7
4,008,151 UART: [idev] UDS.KEYID = 0
4,010,759 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,594 UART: [idev] Erasing UDS.KEYID = 0
7,341,996 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,434 UART: [idev] --
7,365,406 UART: [ldev] ++
7,365,978 UART: [ldev] CDI.KEYID = 6
7,366,958 UART: [ldev] SUBJECT.KEYID = 5
7,368,173 UART: [ldev] AUTHORITY.KEYID = 7
7,369,406 UART: [ldev] FE.KEYID = 1
7,418,548 UART: [ldev] Erasing FE.KEYID = 1
10,749,416 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,287 UART: [ldev] --
13,111,885 UART: [fwproc] Waiting for Commands...
13,115,173 UART: [fwproc] Received command 0x46574c44
13,117,413 UART: [fwproc] Received Image of size 114124 bytes
17,174,671 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,712 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,584 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,633,717 >>> mbox cmd response: success
17,636,291 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
17,761,408 UART: [afmc] ++
17,762,046 UART: [afmc] CDI.KEYID = 6
17,762,943 UART: [afmc] SUBJECT.KEYID = 7
17,763,999 UART: [afmc] AUTHORITY.KEYID = 5
21,006,002 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,087 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,363 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,769 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,568 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,075 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,035 UART: [afmc] --
23,377,275 UART: [cold-reset] --
23,379,732 UART: [state] Locking Datavault
23,385,517 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,268 UART: [state] Locking ICCM
23,389,396 UART: [exit] Launching FMC @ 0x40000130
23,397,802 UART:
23,398,084 UART: Running Caliptra FMC ...
23,399,148 UART:
23,399,300 UART: [state] CFI Enabled
23,466,109 UART: [fht] FMC Alias Private Key: 7
25,804,471 UART: [art] Extend RT PCRs Done
25,805,697 UART: [art] Lock RT PCRs Done
25,807,621 UART: [art] Populate DV Done
25,813,360 UART: [fht] FMC Alias Private Key: 7
25,814,958 UART: [art] Derive CDI
25,815,699 UART: [art] Store in in slot 0x4
25,874,683 UART: [art] Derive Key Pair
25,875,721 UART: [art] Store priv key in slot 0x5
29,168,340 UART: [art] Derive Key Pair - Done
29,181,546 UART: [art] Signing Cert with AUTHO
29,182,847 UART: RITY.KEYID = 7
31,469,029 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,547 UART: [art] PUB.X = 101A3713766090E4C9459ADE4BEFBD57EA10B13AA465652B3F397085FBC8FCA560D9A84865760324A28AB2F024576BB0
31,477,847 UART: [art] PUB.Y = FC00A2FDF3BB3134133B1E0479160094D99EC65022ED5E3D83B7419853C5C53D6828FEB0697470AEBD1FA06B3C9935CE
31,484,997 UART: [art] SIG.R = EB9875A74C79F1A12E6B3A2F5EB00253B885C42EEA25B4A7E12D44B96616A78DE33586752CF6FB33AC93DA7D53A8FE46
31,492,407 UART: [art] SIG.S = 55838749BE10F26A4732002AE50B04B9FA033087E9DF1D0BD9F8A777ADA16960F7B8C0CBCAFDC9B4A600F2C605D8C95B
32,798,043 UART: Caliptra RT
32,798,739 UART: [state] CFI Enabled
32,977,556 UART: [rt] RT listening for mailbox commands...
32,980,302 UART:
32,980,552 UART: Running Caliptra ROM ...
32,981,658 UART:
32,981,838 UART: [state] CFI Enabled
33,044,650 UART: [state] LifecycleState = Unprovisioned
33,046,586 UART: [state] DebugLocked = No
33,049,270 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,055,034 UART: [kat] SHA2-256
33,224,714 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,235,210 UART: [kat] ++
33,235,695 UART: [kat] sha1
33,247,070 UART: [kat] SHA2-256
33,249,760 UART: [kat] SHA2-384
33,255,367 UART: [kat] SHA2-512-ACC
33,257,773 UART: [kat] ECC-384
35,548,071 UART: [kat] HMAC-384Kdf
35,559,714 UART: [kat] LMS
36,750,043 UART: [kat] --
36,753,839 UART: [update-reset] ++
39,552,103 >>> mbox cmd response: failed
39,554,053 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
39,697,742 UART: ROM Non-Fatal Error: 0x000B001F
39,699,168 UART: [state] Locking Datavault
39,700,243 UART: [state] Locking PCR0, PCR1 and PCR31
39,701,780 UART: [state] Locking ICCM
39,702,659 UART: [exit] Launching FMC @ 0x40000130
39,704,000 UART:
39,704,154 UART: Running Caliptra FMC ...
39,705,256 UART:
39,705,408 UART: [state] CFI Enabled
39,706,239 UART: [art] Extend RT PCRs Done
39,707,292 UART: [art] Lock RT PCRs Done
39,708,272 UART: [art] Populate DV Done
39,709,297 UART: [fht] FMC Alias Private Key: 7
39,710,534 UART: [art] Derive CDI
39,711,282 UART: [art] Store in in slot 0x4
39,736,826 UART: [art] Derive Key Pair
39,737,873 UART: [art] Store priv key in slot 0x5
43,030,222 UART: [art] Derive Key Pair - Done
43,043,010 UART: [art] Signing Cert with AUTHO
43,044,319 UART: RITY.KEYID = 7
45,332,011 UART: [art] Erasing AUTHORITY.KEYID = 7
45,333,530 UART: [art] PUB.X = 101A3713766090E4C9459ADE4BEFBD57EA10B13AA465652B3F397085FBC8FCA560D9A84865760324A28AB2F024576BB0
45,340,809 UART: [art] PUB.Y = FC00A2FDF3BB3134133B1E0479160094D99EC65022ED5E3D83B7419853C5C53D6828FEB0697470AEBD1FA06B3C9935CE
45,348,001 UART: [art] SIG.R = EB9875A74C79F1A12E6B3A2F5EB00253B885C42EEA25B4A7E12D44B96616A78DE33586752CF6FB33AC93DA7D53A8FE46
45,355,409 UART: [art] SIG.S = 55838749BE10F26A4732002AE50B04B9FA033087E9DF1D0BD9F8A777ADA16960F7B8C0CBCAFDC9B4A600F2C605D8C95B
46,660,822 UART: Caliptra RT
46,661,535 UART: [state] CFI Enabled
46,995,075 UART: [rt] RT listening for mailbox commands...
46,997,714 UART:
46,997,881 UART: Running Caliptra ROM ...
46,999,008 UART:
46,999,169 UART: [state] CFI Enabled
47,070,889 UART: [state] LifecycleState = Unprovisioned
47,072,781 UART: [state] DebugLocked = No
47,075,601 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,080,701 UART: [kat] SHA2-256
47,250,393 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,260,890 UART: [kat] ++
47,261,339 UART: [kat] sha1
47,271,523 UART: [kat] SHA2-256
47,274,213 UART: [kat] SHA2-384
47,279,658 UART: [kat] SHA2-512-ACC
47,282,053 UART: [kat] ECC-384
49,576,513 UART: [kat] HMAC-384Kdf
49,609,525 UART: [kat] LMS
50,799,881 UART: [kat] --
50,804,229 UART: [update-reset] ++
54,945,782 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,950,158 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
55,332,435 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,808,598 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,908,375 >>> mbox cmd response: success
17,911,110 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
23,594,278 UART:
23,594,743 UART: Running Caliptra FMC ...
23,595,876 UART:
23,596,034 UART: [state] CFI Enabled
23,661,938 UART: [fht] FMC Alias Private Key: 7
26,000,152 UART: [art] Extend RT PCRs Done
26,001,435 UART: [art] Lock RT PCRs Done
26,003,129 UART: [art] Populate DV Done
26,008,655 UART: [fht] FMC Alias Private Key: 7
26,010,365 UART: [art] Derive CDI
26,011,116 UART: [art] Store in in slot 0x4
26,072,255 UART: [art] Derive Key Pair
26,073,302 UART: [art] Store priv key in slot 0x5
29,365,888 UART: [art] Derive Key Pair - Done
29,378,962 UART: [art] Signing Cert with AUTHO
29,380,278 UART: RITY.KEYID = 7
31,666,830 UART: [art] Erasing AUTHORITY.KEYID = 7
31,668,343 UART: [art] PUB.X = 775FB91A6F57497B708477008F3F29ECC5DC617BBEC3691C3640E252E14B57D9E9E0BC8E5C92D0BC6844520A929B7B1C
31,675,640 UART: [art] PUB.Y = 9CE93D4491A236240A2F890A2C707EB4DAF83AE8F9313EECC98A368B9126500587ABB0A6096EDECE1D5E7D7343E0AB5C
31,682,828 UART: [art] SIG.R = 5CE3F25D436C652BC4AFDC8FFE0CD44AA48ED593EA9152102FFAC65814A4CBC74305A4958E99A6F8DFCF53DA8E6DE1C8
31,690,313 UART: [art] SIG.S = FA0CF477C237DA956EF5557187A68F4882A5DD7FA036FA36C6E14766D988370ED7E7D3D0AE9A3B6C3A8738B16C7E1E34
32,995,024 UART: Caliptra RT
32,995,736 UART: [state] CFI Enabled
33,160,348 UART: [rt] RT listening for mailbox commands...
39,575,626 >>> mbox cmd response: failed
39,577,553 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
39,721,069 UART:
39,721,376 UART: Running Caliptra FMC ...
39,722,502 UART:
39,722,671 UART: [state] CFI Enabled
39,723,595 UART: [art] Extend RT PCRs Done
39,724,902 UART: [art] Lock RT PCRs Done
39,726,008 UART: [art] Populate DV Done
39,727,049 UART: [fht] FMC Alias Private Key: 7
39,728,288 UART: [art] Derive CDI
39,729,015 UART: [art] Store in in slot 0x4
39,757,044 UART: [art] Derive Key Pair
39,758,052 UART: [art] Store priv key in slot 0x5
43,051,409 UART: [art] Derive Key Pair - Done
43,064,625 UART: [art] Signing Cert with AUTHO
43,065,929 UART: RITY.KEYID = 7
45,352,746 UART: [art] Erasing AUTHORITY.KEYID = 7
45,354,260 UART: [art] PUB.X = 775FB91A6F57497B708477008F3F29ECC5DC617BBEC3691C3640E252E14B57D9E9E0BC8E5C92D0BC6844520A929B7B1C
45,361,529 UART: [art] PUB.Y = 9CE93D4491A236240A2F890A2C707EB4DAF83AE8F9313EECC98A368B9126500587ABB0A6096EDECE1D5E7D7343E0AB5C
45,368,783 UART: [art] SIG.R = 5CE3F25D436C652BC4AFDC8FFE0CD44AA48ED593EA9152102FFAC65814A4CBC74305A4958E99A6F8DFCF53DA8E6DE1C8
45,376,198 UART: [art] SIG.S = FA0CF477C237DA956EF5557187A68F4882A5DD7FA036FA36C6E14766D988370ED7E7D3D0AE9A3B6C3A8738B16C7E1E34
46,681,727 UART: Caliptra RT
46,682,428 UART: [state] CFI Enabled
47,011,959 UART: [rt] RT listening for mailbox commands...
55,603,647 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,567 UART:
192,920 UART: Running Caliptra ROM ...
194,106 UART:
603,829 UART: [state] CFI Enabled
617,749 UART: [state] LifecycleState = Unprovisioned
619,701 UART: [state] DebugLocked = No
622,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,982 UART: [kat] SHA2-256
796,775 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,313 UART: [kat] ++
807,857 UART: [kat] sha1
819,928 UART: [kat] SHA2-256
822,665 UART: [kat] SHA2-384
830,202 UART: [kat] SHA2-512-ACC
832,591 UART: [kat] ECC-384
3,117,201 UART: [kat] HMAC-384Kdf
3,130,311 UART: [kat] LMS
4,320,435 UART: [kat] --
4,324,291 UART: [cold-reset] ++
4,325,797 UART: [fht] Storing FHT @ 0x50003400
4,336,415 UART: [idev] ++
4,336,979 UART: [idev] CDI.KEYID = 6
4,337,902 UART: [idev] SUBJECT.KEYID = 7
4,339,173 UART: [idev] UDS.KEYID = 0
4,341,771 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,318 UART: [idev] Erasing UDS.KEYID = 0
7,627,524 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,396 UART: [idev] --
7,653,849 UART: [ldev] ++
7,654,490 UART: [ldev] CDI.KEYID = 6
7,655,401 UART: [ldev] SUBJECT.KEYID = 5
7,656,613 UART: [ldev] AUTHORITY.KEYID = 7
7,657,900 UART: [ldev] FE.KEYID = 1
7,669,194 UART: [ldev] Erasing FE.KEYID = 1
10,960,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,021 UART: [ldev] --
13,321,752 UART: [fwproc] Waiting for Commands...
13,325,094 UART: [fwproc] Received command 0x46574c44
13,327,356 UART: [fwproc] Received Image of size 114124 bytes
17,377,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,066 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,000 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,838,404 >>> mbox cmd response: success
17,840,653 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
17,965,533 UART: [afmc] ++
17,966,172 UART: [afmc] CDI.KEYID = 6
17,967,085 UART: [afmc] SUBJECT.KEYID = 7
17,968,402 UART: [afmc] AUTHORITY.KEYID = 5
21,164,599 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,103 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,363 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,741 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,568 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,024 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,181 UART: [afmc] --
23,529,369 UART: [cold-reset] --
23,533,071 UART: [state] Locking Datavault
23,540,320 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,072 UART: [state] Locking ICCM
23,544,709 UART: [exit] Launching FMC @ 0x40000130
23,553,100 UART:
23,553,343 UART: Running Caliptra FMC ...
23,554,443 UART:
23,554,601 UART: [state] CFI Enabled
23,562,969 UART: [fht] FMC Alias Private Key: 7
25,894,266 UART: [art] Extend RT PCRs Done
25,895,497 UART: [art] Lock RT PCRs Done
25,897,013 UART: [art] Populate DV Done
25,902,429 UART: [fht] FMC Alias Private Key: 7
25,904,019 UART: [art] Derive CDI
25,904,858 UART: [art] Store in in slot 0x4
25,947,722 UART: [art] Derive Key Pair
25,948,723 UART: [art] Store priv key in slot 0x5
29,190,918 UART: [art] Derive Key Pair - Done
29,203,974 UART: [art] Signing Cert with AUTHO
29,205,282 UART: RITY.KEYID = 7
31,484,991 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,503 UART: [art] PUB.X = 36F96035316E10E6B1DB762FB7E7C6452C27FAC96CCC6DB323283468E7FEB2A3778B23DD7267EE6A9BBF52F69D9E5F6F
31,493,774 UART: [art] PUB.Y = 7195007E3F7FD26F1B79CCF583B57B0E26A20A04130D68DC31C1EF314F70D02AAEEB0D9A4243A43FEA9B5CBC1CBB9540
31,501,020 UART: [art] SIG.R = 70E20DB77CFEE5149386D9A3728142ED04C7904CA84195157419C73C9104A8E6F021D208D8D916C5D2741ED9C2F030F8
31,508,358 UART: [art] SIG.S = B0807FC3CEC1BD0A0C6BCCABCBA934A294BD1EFFA65072010FEFF3C3B8519E8ED9614AEA8BA0657E8F2BDEC826A25E07
32,813,349 UART: Caliptra RT
32,814,063 UART: [state] CFI Enabled
32,930,565 UART: [rt] RT listening for mailbox commands...
32,933,475 UART:
32,933,725 UART: Running Caliptra ROM ...
32,934,847 UART:
32,935,062 UART: [state] CFI Enabled
32,946,573 UART: [state] LifecycleState = Unprovisioned
32,948,517 UART: [state] DebugLocked = No
32,950,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,955,594 UART: [kat] SHA2-256
33,125,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,135,855 UART: [kat] ++
33,136,389 UART: [kat] sha1
33,149,007 UART: [kat] SHA2-256
33,151,696 UART: [kat] SHA2-384
33,157,572 UART: [kat] SHA2-512-ACC
33,159,918 UART: [kat] ECC-384
35,442,651 UART: [kat] HMAC-384Kdf
35,454,820 UART: [kat] LMS
36,644,865 UART: [kat] --
36,648,504 UART: [update-reset] ++
39,448,722 >>> mbox cmd response: failed
39,450,430 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
39,593,849 UART: ROM Non-Fatal Error: 0x000B001F
39,595,291 UART: [state] Locking Datavault
39,596,447 UART: [state] Locking PCR0, PCR1 and PCR31
39,597,983 UART: [state] Locking ICCM
39,598,886 UART: [exit] Launching FMC @ 0x40000130
39,600,308 UART:
39,600,467 UART: Running Caliptra FMC ...
39,601,566 UART:
39,601,722 UART: [state] CFI Enabled
39,602,584 UART: [art] Extend RT PCRs Done
39,603,719 UART: [art] Lock RT PCRs Done
39,604,781 UART: [art] Populate DV Done
39,605,809 UART: [fht] FMC Alias Private Key: 7
39,607,145 UART: [art] Derive CDI
39,607,882 UART: [art] Store in in slot 0x4
39,609,051 UART: [art] Derive Key Pair
39,610,049 UART: [art] Store priv key in slot 0x5
42,809,815 UART: [art] Derive Key Pair - Done
42,822,868 UART: [art] Signing Cert with AUTHO
42,824,184 UART: RITY.KEYID = 7
45,104,119 UART: [art] Erasing AUTHORITY.KEYID = 7
45,105,633 UART: [art] PUB.X = 36F96035316E10E6B1DB762FB7E7C6452C27FAC96CCC6DB323283468E7FEB2A3778B23DD7267EE6A9BBF52F69D9E5F6F
45,112,892 UART: [art] PUB.Y = 7195007E3F7FD26F1B79CCF583B57B0E26A20A04130D68DC31C1EF314F70D02AAEEB0D9A4243A43FEA9B5CBC1CBB9540
45,120,147 UART: [art] SIG.R = 70E20DB77CFEE5149386D9A3728142ED04C7904CA84195157419C73C9104A8E6F021D208D8D916C5D2741ED9C2F030F8
45,127,508 UART: [art] SIG.S = B0807FC3CEC1BD0A0C6BCCABCBA934A294BD1EFFA65072010FEFF3C3B8519E8ED9614AEA8BA0657E8F2BDEC826A25E07
46,431,970 UART: Caliptra RT
46,432,688 UART: [state] CFI Enabled
46,725,352 UART: [rt] RT listening for mailbox commands...
46,728,529 UART:
46,728,799 UART: Running Caliptra ROM ...
46,729,854 UART:
46,730,166 UART: [state] CFI Enabled
46,744,803 UART: [state] LifecycleState = Unprovisioned
46,746,750 UART: [state] DebugLocked = No
46,749,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,754,749 UART: [kat] SHA2-256
46,924,490 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
46,934,991 UART: [kat] ++
46,935,536 UART: [kat] sha1
46,946,642 UART: [kat] SHA2-256
46,949,376 UART: [kat] SHA2-384
46,955,572 UART: [kat] SHA2-512-ACC
46,957,928 UART: [kat] ECC-384
49,240,402 UART: [kat] HMAC-384Kdf
49,252,192 UART: [kat] LMS
50,442,277 UART: [kat] --
50,447,042 UART: [update-reset] ++
54,590,933 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,595,465 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
54,977,740 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
4,125,509 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,057,487 >>> mbox cmd response: success
18,060,441 <<< Executing mbox cmd 0x46574c44 (99400 bytes) from SoC
23,698,074 UART:
23,698,486 UART: Running Caliptra FMC ...
23,699,627 UART:
23,699,788 UART: [state] CFI Enabled
23,707,832 UART: [fht] FMC Alias Private Key: 7
26,038,382 UART: [art] Extend RT PCRs Done
26,039,614 UART: [art] Lock RT PCRs Done
26,041,307 UART: [art] Populate DV Done
26,046,658 UART: [fht] FMC Alias Private Key: 7
26,048,375 UART: [art] Derive CDI
26,049,203 UART: [art] Store in in slot 0x4
26,091,493 UART: [art] Derive Key Pair
26,092,551 UART: [art] Store priv key in slot 0x5
29,334,343 UART: [art] Derive Key Pair - Done
29,347,263 UART: [art] Signing Cert with AUTHO
29,348,565 UART: RITY.KEYID = 7
31,627,676 UART: [art] Erasing AUTHORITY.KEYID = 7
31,629,183 UART: [art] PUB.X = 80A2EB4A895F9458DAD8123AEC7E621075D954109A5F91149C38C1AE328FE94140DE85CA74609D430E1A78A3CAD4D525
31,636,449 UART: [art] PUB.Y = D4D8195BA946A4E4F0F36F3F71C110763420D26942E61EFB4A4EDD2432DC7681755DE70BBCAF25642FF4C2B499688F02
31,643,684 UART: [art] SIG.R = E1BDFE85308EECE0F01769F8D232E8A99203259771F2B82C403E268CFC291911BFEFC74B53E8115C3F70FF7939A99C76
31,651,090 UART: [art] SIG.S = 4A785A9020EFBC6C91915ADFCDF4CB715B03AC8E55AC5372CEF5EB21E457AB289DC0494442C1E7DB4537E36E36027BF4
32,956,073 UART: Caliptra RT
32,956,789 UART: [state] CFI Enabled
33,073,840 UART: [rt] RT listening for mailbox commands...
39,423,863 >>> mbox cmd response: failed
39,425,669 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
39,569,094 UART:
39,569,420 UART: Running Caliptra FMC ...
39,570,464 UART:
39,570,615 UART: [state] CFI Enabled
39,571,562 UART: [art] Extend RT PCRs Done
39,572,707 UART: [art] Lock RT PCRs Done
39,573,720 UART: [art] Populate DV Done
39,574,747 UART: [fht] FMC Alias Private Key: 7
39,576,076 UART: [art] Derive CDI
39,576,817 UART: [art] Store in in slot 0x4
39,577,905 UART: [art] Derive Key Pair
39,578,899 UART: [art] Store priv key in slot 0x5
42,776,868 UART: [art] Derive Key Pair - Done
42,790,205 UART: [art] Signing Cert with AUTHO
42,791,510 UART: RITY.KEYID = 7
45,070,928 UART: [art] Erasing AUTHORITY.KEYID = 7
45,072,449 UART: [art] PUB.X = 80A2EB4A895F9458DAD8123AEC7E621075D954109A5F91149C38C1AE328FE94140DE85CA74609D430E1A78A3CAD4D525
45,079,648 UART: [art] PUB.Y = D4D8195BA946A4E4F0F36F3F71C110763420D26942E61EFB4A4EDD2432DC7681755DE70BBCAF25642FF4C2B499688F02
45,086,907 UART: [art] SIG.R = E1BDFE85308EECE0F01769F8D232E8A99203259771F2B82C403E268CFC291911BFEFC74B53E8115C3F70FF7939A99C76
45,094,313 UART: [art] SIG.S = 4A785A9020EFBC6C91915ADFCDF4CB715B03AC8E55AC5372CEF5EB21E457AB289DC0494442C1E7DB4537E36E36027BF4
46,399,161 UART: Caliptra RT
46,399,859 UART: [state] CFI Enabled
46,687,111 UART: [rt] RT listening for mailbox commands...
55,206,921 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
192,437 UART:
192,803 UART: Running Caliptra ROM ...
194,000 UART:
194,164 UART: [state] CFI Enabled
260,571 UART: [state] LifecycleState = Unprovisioned
262,458 UART: [state] DebugLocked = No
264,280 UART: [state] WD Timer not started. Device not locked for debugging
268,650 UART: [kat] SHA2-256
447,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,334 UART: [kat] ++
459,868 UART: [kat] sha1
469,998 UART: [kat] SHA2-256
473,018 UART: [kat] SHA2-384
480,188 UART: [kat] SHA2-512-ACC
483,120 UART: [kat] ECC-384
2,948,146 UART: [kat] HMAC-384Kdf
2,970,580 UART: [kat] LMS
3,500,056 UART: [kat] --
3,505,510 UART: [cold-reset] ++
3,507,607 UART: [fht] FHT @ 0x50003400
3,519,670 UART: [idev] ++
3,520,283 UART: [idev] CDI.KEYID = 6
3,521,201 UART: [idev] SUBJECT.KEYID = 7
3,522,368 UART: [idev] UDS.KEYID = 0
3,524,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,996 UART: [idev] Erasing UDS.KEYID = 0
6,026,662 UART: [idev] Sha1 KeyId Algorithm
6,049,729 UART: [idev] --
6,054,612 UART: [ldev] ++
6,055,192 UART: [ldev] CDI.KEYID = 6
6,056,108 UART: [ldev] SUBJECT.KEYID = 5
6,057,275 UART: [ldev] AUTHORITY.KEYID = 7
6,058,510 UART: [ldev] FE.KEYID = 1
6,097,526 UART: [ldev] Erasing FE.KEYID = 1
8,603,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,463 UART: [ldev] --
10,409,527 UART: [fwproc] Wait for Commands...
10,411,899 UART: [fwproc] Recv command 0x46574c44
10,413,998 UART: [fwproc] Recv'd Img size: 114448 bytes
13,816,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,321 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,277,426 >>> mbox cmd response: success
14,278,976 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
14,404,619 UART: [afmc] ++
14,405,250 UART: [afmc] CDI.KEYID = 6
14,406,146 UART: [afmc] SUBJECT.KEYID = 7
14,407,201 UART: [afmc] AUTHORITY.KEYID = 5
16,825,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,705 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,501 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,468 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,340 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,878 UART: [afmc] --
18,624,693 UART: [cold-reset] --
18,628,468 UART: [state] Locking Datavault
18,634,958 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,641 UART: [state] Locking ICCM
18,638,526 UART: [exit] Launching FMC @ 0x40000130
18,646,971 UART:
18,647,220 UART: Running Caliptra FMC ...
18,648,324 UART:
18,648,489 UART: [state] CFI Enabled
18,707,848 UART: [fht] FMC Alias Private Key: 7
20,471,848 UART: [art] Extend RT PCRs Done
20,473,073 UART: [art] Lock RT PCRs Done
20,474,997 UART: [art] Populate DV Done
20,480,462 UART: [fht] FMC Alias Private Key: 7
20,482,037 UART: [art] Derive CDI
20,482,781 UART: [art] Store in in slot 0x4
20,540,331 UART: [art] Derive Key Pair
20,541,350 UART: [art] Store priv key in slot 0x5
23,003,365 UART: [art] Derive Key Pair - Done
23,016,529 UART: [art] Signing Cert with AUTHO
23,017,830 UART: RITY.KEYID = 7
24,729,516 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,031 UART: [art] PUB.X = 161957F3E01FCDA9E82772A4EFDD6BF9ABEE9FE95B09ED32A0756493EAC4E72F9B0C3FEC01FD8F8ECB382620A277981F
24,738,281 UART: [art] PUB.Y = 6FC3FDD377F32BB0BB28D07A5F59B14DB06D529EF4B3AA4FA161A8F1EA4DB53409987DDAE18BEF1CF8054F5D4D02E37D
24,745,580 UART: [art] SIG.R = A8E2D7DBE2D1EF351ED3C52282D51FB916D4873A57F7982AB165D759C96B725CC6ECD1D4518E62F9EFAAAFF44976CED8
24,753,012 UART: [art] SIG.S = 892932CA8A0746F6DE9930740B2483AFE999B77C537EF7ED10B5BF2FB4EBF4A3FC40449603AC5CDDFBF495F9BA2A5CD6
25,731,959 UART: Caliptra RT
25,732,671 UART: [state] CFI Enabled
25,897,066 UART: [rt] RT listening for mailbox commands...
25,899,972 UART:
25,900,223 UART: Running Caliptra ROM ...
25,901,327 UART:
25,901,485 UART: [state] CFI Enabled
25,967,552 UART: [state] LifecycleState = Unprovisioned
25,969,426 UART: [state] DebugLocked = No
25,971,301 UART: [state] WD Timer not started. Device not locked for debugging
25,974,828 UART: [kat] SHA2-256
26,153,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,165,483 UART: [kat] ++
26,166,025 UART: [kat] sha1
26,177,784 UART: [kat] SHA2-256
26,180,802 UART: [kat] SHA2-384
26,187,974 UART: [kat] SHA2-512-ACC
26,190,917 UART: [kat] ECC-384
28,647,902 UART: [kat] HMAC-384Kdf
28,670,715 UART: [kat] LMS
29,200,172 UART: [kat] --
29,202,937 UART: [update-reset] ++
31,297,290 >>> mbox cmd response: failed
31,299,081 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,443,502 UART: ROM Non-Fatal Error: 0x000B001F
31,444,955 UART: [state] Locking Datavault
31,446,061 UART: [state] Locking PCR0, PCR1 and PCR31
31,447,609 UART: [state] Locking ICCM
31,448,491 UART: [exit] Launching FMC @ 0x40000130
31,449,913 UART:
31,450,074 UART: Running Caliptra FMC ...
31,451,173 UART:
31,451,329 UART: [state] CFI Enabled
31,452,246 UART: [art] Extend RT PCRs Done
31,453,379 UART: [art] Lock RT PCRs Done
31,454,446 UART: [art] Populate DV Done
31,455,475 UART: [fht] FMC Alias Private Key: 7
31,456,794 UART: [art] Derive CDI
31,457,533 UART: [art] Store in in slot 0x4
31,482,538 UART: [art] Derive Key Pair
31,483,537 UART: [art] Store priv key in slot 0x5
33,946,887 UART: [art] Derive Key Pair - Done
33,959,834 UART: [art] Signing Cert with AUTHO
33,961,140 UART: RITY.KEYID = 7
35,672,707 UART: [art] Erasing AUTHORITY.KEYID = 7
35,674,211 UART: [art] PUB.X = 161957F3E01FCDA9E82772A4EFDD6BF9ABEE9FE95B09ED32A0756493EAC4E72F9B0C3FEC01FD8F8ECB382620A277981F
35,681,561 UART: [art] PUB.Y = 6FC3FDD377F32BB0BB28D07A5F59B14DB06D529EF4B3AA4FA161A8F1EA4DB53409987DDAE18BEF1CF8054F5D4D02E37D
35,688,800 UART: [art] SIG.R = A8E2D7DBE2D1EF351ED3C52282D51FB916D4873A57F7982AB165D759C96B725CC6ECD1D4518E62F9EFAAAFF44976CED8
35,696,255 UART: [art] SIG.S = 892932CA8A0746F6DE9930740B2483AFE999B77C537EF7ED10B5BF2FB4EBF4A3FC40449603AC5CDDFBF495F9BA2A5CD6
36,674,923 UART: Caliptra RT
36,675,627 UART: [state] CFI Enabled
37,010,228 UART: [rt] RT listening for mailbox commands...
37,012,706 UART:
37,012,881 UART: Running Caliptra ROM ...
37,013,930 UART:
37,014,105 UART: [state] CFI Enabled
37,077,568 UART: [state] LifecycleState = Unprovisioned
37,079,446 UART: [state] DebugLocked = No
37,080,939 UART: [state] WD Timer not started. Device not locked for debugging
37,084,628 UART: [kat] SHA2-256
37,263,752 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
37,275,363 UART: [kat] ++
37,275,902 UART: [kat] sha1
37,285,761 UART: [kat] SHA2-256
37,288,761 UART: [kat] SHA2-384
37,294,969 UART: [kat] SHA2-512-ACC
37,297,909 UART: [kat] ECC-384
39,761,178 UART: [kat] HMAC-384Kdf
39,785,605 UART: [kat] LMS
40,315,042 UART: [kat] --
40,318,389 UART: [update-reset] ++
43,753,942 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,757,424 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
44,140,719 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,384,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,091,567 >>> mbox cmd response: success
14,093,190 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
18,384,824 UART:
18,385,215 UART: Running Caliptra FMC ...
18,386,311 UART:
18,386,462 UART: [state] CFI Enabled
18,451,552 UART: [fht] FMC Alias Private Key: 7
20,215,365 UART: [art] Extend RT PCRs Done
20,216,582 UART: [art] Lock RT PCRs Done
20,218,021 UART: [art] Populate DV Done
20,223,596 UART: [fht] FMC Alias Private Key: 7
20,225,298 UART: [art] Derive CDI
20,226,035 UART: [art] Store in in slot 0x4
20,284,087 UART: [art] Derive Key Pair
20,285,135 UART: [art] Store priv key in slot 0x5
22,747,622 UART: [art] Derive Key Pair - Done
22,760,505 UART: [art] Signing Cert with AUTHO
22,761,831 UART: RITY.KEYID = 7
24,473,440 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,953 UART: [art] PUB.X = 0F9EBBFAB0958E016C6B96105A907512F32498505498F80DDBFB1A3AC41572D39F02B21257479283D8B06704795F6B87
24,482,192 UART: [art] PUB.Y = D198566469653B669BBC35B98659D157FE396CFDFDF786696AD1B57A5C6260B8DBD2C3E482AB3468CCA761A150E47FF5
24,489,490 UART: [art] SIG.R = E5E102C644DAB8901BCF8E895E1B388D332CD65660C1A268AB9707D3F74C7C840B72A9B63CBD63B83D914B245382F9CF
24,496,876 UART: [art] SIG.S = E84E2A5955E12DC6007AD314AA4AB6F2916F7EF3C129E20934BDFB8B46FCC426DDEF5446C31A23B7DAD6D475F156F2E5
25,475,697 UART: Caliptra RT
25,476,396 UART: [state] CFI Enabled
25,641,549 UART: [rt] RT listening for mailbox commands...
30,892,195 >>> mbox cmd response: failed
30,894,138 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,038,068 UART:
31,038,404 UART: Running Caliptra FMC ...
31,039,478 UART:
31,039,640 UART: [state] CFI Enabled
31,040,574 UART: [art] Extend RT PCRs Done
31,041,720 UART: [art] Lock RT PCRs Done
31,042,790 UART: [art] Populate DV Done
31,043,906 UART: [fht] FMC Alias Private Key: 7
31,045,228 UART: [art] Derive CDI
31,045,966 UART: [art] Store in in slot 0x4
31,078,578 UART: [art] Derive Key Pair
31,079,644 UART: [art] Store priv key in slot 0x5
33,542,379 UART: [art] Derive Key Pair - Done
33,555,584 UART: [art] Signing Cert with AUTHO
33,556,921 UART: RITY.KEYID = 7
35,267,207 UART: [art] Erasing AUTHORITY.KEYID = 7
35,268,732 UART: [art] PUB.X = 0F9EBBFAB0958E016C6B96105A907512F32498505498F80DDBFB1A3AC41572D39F02B21257479283D8B06704795F6B87
35,275,962 UART: [art] PUB.Y = D198566469653B669BBC35B98659D157FE396CFDFDF786696AD1B57A5C6260B8DBD2C3E482AB3468CCA761A150E47FF5
35,283,177 UART: [art] SIG.R = E5E102C644DAB8901BCF8E895E1B388D332CD65660C1A268AB9707D3F74C7C840B72A9B63CBD63B83D914B245382F9CF
35,290,585 UART: [art] SIG.S = E84E2A5955E12DC6007AD314AA4AB6F2916F7EF3C129E20934BDFB8B46FCC426DDEF5446C31A23B7DAD6D475F156F2E5
36,269,547 UART: Caliptra RT
36,270,268 UART: [state] CFI Enabled
36,606,850 UART: [rt] RT listening for mailbox commands...
43,583,318 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,394 UART:
192,766 UART: Running Caliptra ROM ...
193,916 UART:
603,480 UART: [state] CFI Enabled
621,473 UART: [state] LifecycleState = Unprovisioned
623,377 UART: [state] DebugLocked = No
624,540 UART: [state] WD Timer not started. Device not locked for debugging
628,637 UART: [kat] SHA2-256
807,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,365 UART: [kat] ++
819,904 UART: [kat] sha1
830,571 UART: [kat] SHA2-256
833,574 UART: [kat] SHA2-384
840,952 UART: [kat] SHA2-512-ACC
843,940 UART: [kat] ECC-384
3,284,997 UART: [kat] HMAC-384Kdf
3,296,798 UART: [kat] LMS
3,826,265 UART: [kat] --
3,829,485 UART: [cold-reset] ++
3,831,259 UART: [fht] FHT @ 0x50003400
3,841,057 UART: [idev] ++
3,841,633 UART: [idev] CDI.KEYID = 6
3,842,514 UART: [idev] SUBJECT.KEYID = 7
3,843,728 UART: [idev] UDS.KEYID = 0
3,846,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,227 UART: [idev] Erasing UDS.KEYID = 0
6,315,667 UART: [idev] Sha1 KeyId Algorithm
6,339,886 UART: [idev] --
6,344,400 UART: [ldev] ++
6,344,977 UART: [ldev] CDI.KEYID = 6
6,345,865 UART: [ldev] SUBJECT.KEYID = 5
6,347,081 UART: [ldev] AUTHORITY.KEYID = 7
6,348,313 UART: [ldev] FE.KEYID = 1
6,360,068 UART: [ldev] Erasing FE.KEYID = 1
8,830,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,475 UART: [ldev] --
10,622,422 UART: [fwproc] Wait for Commands...
10,625,332 UART: [fwproc] Recv command 0x46574c44
10,627,373 UART: [fwproc] Recv'd Img size: 114448 bytes
14,030,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,488,645 >>> mbox cmd response: success
14,490,185 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
14,615,613 UART: [afmc] ++
14,616,248 UART: [afmc] CDI.KEYID = 6
14,617,160 UART: [afmc] SUBJECT.KEYID = 7
14,618,207 UART: [afmc] AUTHORITY.KEYID = 5
16,996,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,445 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,441 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,256 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,395 UART: [afmc] --
18,796,718 UART: [cold-reset] --
18,799,177 UART: [state] Locking Datavault
18,804,323 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,020 UART: [state] Locking ICCM
18,808,362 UART: [exit] Launching FMC @ 0x40000130
18,816,795 UART:
18,817,090 UART: Running Caliptra FMC ...
18,818,147 UART:
18,818,298 UART: [state] CFI Enabled
18,826,842 UART: [fht] FMC Alias Private Key: 7
20,583,200 UART: [art] Extend RT PCRs Done
20,584,447 UART: [art] Lock RT PCRs Done
20,586,098 UART: [art] Populate DV Done
20,591,620 UART: [fht] FMC Alias Private Key: 7
20,593,213 UART: [art] Derive CDI
20,594,027 UART: [art] Store in in slot 0x4
20,636,896 UART: [art] Derive Key Pair
20,637,897 UART: [art] Store priv key in slot 0x5
23,064,854 UART: [art] Derive Key Pair - Done
23,077,991 UART: [art] Signing Cert with AUTHO
23,079,303 UART: RITY.KEYID = 7
24,785,013 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,539 UART: [art] PUB.X = 18DC4A73F87231DACC8A5131A36F15B38E187C6A9B5272C3C8B789ABFE0385F3EF283546A4995526B2C2585582DC1E2C
24,793,795 UART: [art] PUB.Y = 3D1E14EC641F1A9FC52589F7F1B6E7923DC3E91D4C36FE5F17D8AA6AE7C51C5B0668FD1A247C3569A344FF340B6F8898
24,801,019 UART: [art] SIG.R = B008B3B0781EA6E24BCC121591056478D18D701E8E7A905AAC186C60F1FF99CEFB66FA7E1F23D45DE0DAA0A6EF1C01E4
24,808,427 UART: [art] SIG.S = AFCC9EB94B5D143EB1D7B0D4C1DD59870979839CB0A727C2710FFFE002D8EAEF1A0CAB8A0872AAAEB34DB3E58CA28B32
25,787,854 UART: Caliptra RT
25,788,544 UART: [state] CFI Enabled
25,906,299 UART: [rt] RT listening for mailbox commands...
25,909,140 UART:
25,909,306 UART: Running Caliptra ROM ...
25,910,417 UART:
25,910,737 UART: [state] CFI Enabled
25,925,752 UART: [state] LifecycleState = Unprovisioned
25,927,643 UART: [state] DebugLocked = No
25,929,560 UART: [state] WD Timer not started. Device not locked for debugging
25,933,770 UART: [kat] SHA2-256
26,112,936 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,124,497 UART: [kat] ++
26,124,971 UART: [kat] sha1
26,135,261 UART: [kat] SHA2-256
26,138,279 UART: [kat] SHA2-384
26,144,099 UART: [kat] SHA2-512-ACC
26,147,094 UART: [kat] ECC-384
28,589,991 UART: [kat] HMAC-384Kdf
28,601,464 UART: [kat] LMS
29,130,988 UART: [kat] --
29,135,924 UART: [update-reset] ++
31,213,964 >>> mbox cmd response: failed
31,215,908 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,359,619 UART: ROM Non-Fatal Error: 0x000B001F
31,361,088 UART: [state] Locking Datavault
31,362,204 UART: [state] Locking PCR0, PCR1 and PCR31
31,363,745 UART: [state] Locking ICCM
31,364,652 UART: [exit] Launching FMC @ 0x40000130
31,366,095 UART:
31,366,259 UART: Running Caliptra FMC ...
31,367,360 UART:
31,367,514 UART: [state] CFI Enabled
31,368,435 UART: [art] Extend RT PCRs Done
31,369,572 UART: [art] Lock RT PCRs Done
31,370,635 UART: [art] Populate DV Done
31,371,807 UART: [fht] FMC Alias Private Key: 7
31,373,049 UART: [art] Derive CDI
31,373,779 UART: [art] Store in in slot 0x4
31,374,865 UART: [art] Derive Key Pair
31,375,798 UART: [art] Store priv key in slot 0x5
33,760,322 UART: [art] Derive Key Pair - Done
33,773,694 UART: [art] Signing Cert with AUTHO
33,775,036 UART: RITY.KEYID = 7
35,480,003 UART: [art] Erasing AUTHORITY.KEYID = 7
35,481,531 UART: [art] PUB.X = 18DC4A73F87231DACC8A5131A36F15B38E187C6A9B5272C3C8B789ABFE0385F3EF283546A4995526B2C2585582DC1E2C
35,488,789 UART: [art] PUB.Y = 3D1E14EC641F1A9FC52589F7F1B6E7923DC3E91D4C36FE5F17D8AA6AE7C51C5B0668FD1A247C3569A344FF340B6F8898
35,496,003 UART: [art] SIG.R = B008B3B0781EA6E24BCC121591056478D18D701E8E7A905AAC186C60F1FF99CEFB66FA7E1F23D45DE0DAA0A6EF1C01E4
35,503,448 UART: [art] SIG.S = AFCC9EB94B5D143EB1D7B0D4C1DD59870979839CB0A727C2710FFFE002D8EAEF1A0CAB8A0872AAAEB34DB3E58CA28B32
36,482,828 UART: Caliptra RT
36,483,526 UART: [state] CFI Enabled
36,770,317 UART: [rt] RT listening for mailbox commands...
36,772,951 UART:
36,773,117 UART: Running Caliptra ROM ...
36,774,221 UART:
36,774,537 UART: [state] CFI Enabled
40,327,880 UART: [state] LifecycleState = Unprovisioned
40,329,812 UART: [state] DebugLocked = No
40,331,173 UART: [state] WD Timer not started. Device not locked for debugging
40,335,452 UART: [kat] SHA2-256
40,514,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,526,203 UART: [kat] ++
40,526,741 UART: [kat] sha1
40,537,889 UART: [kat] SHA2-256
40,540,898 UART: [kat] SHA2-384
40,546,030 UART: [kat] SHA2-512-ACC
40,548,970 UART: [kat] ECC-384
42,992,979 UART: [kat] HMAC-384Kdf
43,005,533 UART: [kat] LMS
43,535,052 UART: [kat] --
43,539,497 UART: [update-reset] ++
46,979,103 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,982,001 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
47,365,282 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,696,767 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,196 >>> mbox cmd response: success
14,275,814 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
18,524,998 UART:
18,525,388 UART: Running Caliptra FMC ...
18,526,481 UART:
18,526,635 UART: [state] CFI Enabled
18,534,292 UART: [fht] FMC Alias Private Key: 7
20,290,800 UART: [art] Extend RT PCRs Done
20,292,031 UART: [art] Lock RT PCRs Done
20,293,655 UART: [art] Populate DV Done
20,299,075 UART: [fht] FMC Alias Private Key: 7
20,300,730 UART: [art] Derive CDI
20,301,472 UART: [art] Store in in slot 0x4
20,344,009 UART: [art] Derive Key Pair
20,345,019 UART: [art] Store priv key in slot 0x5
22,772,106 UART: [art] Derive Key Pair - Done
22,785,285 UART: [art] Signing Cert with AUTHO
22,786,593 UART: RITY.KEYID = 7
24,492,375 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,870 UART: [art] PUB.X = 2F730C97B8C4273640BE24C0E7599E8301B522EBF9B2622AAB122942483F072DF13020DC8D368E4960542AD8A01FC022
24,501,080 UART: [art] PUB.Y = 44386F51093A421CCE3658CC886E7D1C8E9F2A1F8D7ABF650E7DE4EA01D95B2CC6A46768D1FB6C6E350CD0B6487B8616
24,508,360 UART: [art] SIG.R = 28ECF476184E28DE16102BA9237BBB4A50E1F0AA8A7186B2F775B9D63FBCA822A31E0BBEB530AFE439CE8F866BA0CA3C
24,515,807 UART: [art] SIG.S = D410E405D1D6D805C2923770637897926AD8DEA23DA412187DA2FBE45A2A8A38648B2FC629291201856529081B05A894
25,493,662 UART: Caliptra RT
25,494,380 UART: [state] CFI Enabled
25,610,658 UART: [rt] RT listening for mailbox commands...
30,779,894 >>> mbox cmd response: failed
30,781,715 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,925,441 UART:
30,925,758 UART: Running Caliptra FMC ...
30,926,802 UART:
30,926,955 UART: [state] CFI Enabled
30,927,885 UART: [art] Extend RT PCRs Done
30,929,030 UART: [art] Lock RT PCRs Done
30,930,100 UART: [art] Populate DV Done
30,931,222 UART: [fht] FMC Alias Private Key: 7
30,932,544 UART: [art] Derive CDI
30,933,284 UART: [art] Store in in slot 0x4
30,934,450 UART: [art] Derive Key Pair
30,935,447 UART: [art] Store priv key in slot 0x5
33,318,709 UART: [art] Derive Key Pair - Done
33,331,944 UART: [art] Signing Cert with AUTHO
33,333,251 UART: RITY.KEYID = 7
35,038,331 UART: [art] Erasing AUTHORITY.KEYID = 7
35,039,851 UART: [art] PUB.X = 2F730C97B8C4273640BE24C0E7599E8301B522EBF9B2622AAB122942483F072DF13020DC8D368E4960542AD8A01FC022
35,047,111 UART: [art] PUB.Y = 44386F51093A421CCE3658CC886E7D1C8E9F2A1F8D7ABF650E7DE4EA01D95B2CC6A46768D1FB6C6E350CD0B6487B8616
35,054,365 UART: [art] SIG.R = 28ECF476184E28DE16102BA9237BBB4A50E1F0AA8A7186B2F775B9D63FBCA822A31E0BBEB530AFE439CE8F866BA0CA3C
35,061,771 UART: [art] SIG.S = D410E405D1D6D805C2923770637897926AD8DEA23DA412187DA2FBE45A2A8A38648B2FC629291201856529081B05A894
36,040,645 UART: Caliptra RT
36,041,362 UART: [state] CFI Enabled
36,334,277 UART: [rt] RT listening for mailbox commands...
47,213,894 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,804 writing to cptra_bootfsm_go
3,442,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,718,827 >>> mbox cmd response: success
14,721,347 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
19,028,531 UART:
19,029,002 UART: Running Caliptra FMC ...
19,030,134 UART:
19,030,292 UART: [state] CFI Enabled
19,096,210 UART: [fht] FMC Alias Private Key: 7
20,860,065 UART: [art] Extend RT PCRs Done
20,861,283 UART: [art] Lock RT PCRs Done
20,862,990 UART: [art] Populate DV Done
20,868,073 UART: [fht] FMC Alias Private Key: 7
20,869,725 UART: [art] Derive CDI
20,870,553 UART: [art] Store in in slot 0x4
20,928,444 UART: [art] Derive Key Pair
20,929,483 UART: [art] Store priv key in slot 0x5
23,392,254 UART: [art] Derive Key Pair - Done
23,405,257 UART: [art] Signing Cert with AUTHO
23,406,560 UART: RITY.KEYID = 7
25,118,629 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,147 UART: [art] PUB.X = 044A2B374E2D0E5B36CAF34E3DDB59974ABFC47898F83D89AC21EEABA64A9D744DF3E18F260FE4389880B2C487260542
25,127,408 UART: [art] PUB.Y = 10F3001DF5ACDFFFD141109AEEDC06A1990786FC2542163E72761449F209EF26F0E2CB0B49AA6B93ACAB7064D70F9E0B
25,134,613 UART: [art] SIG.R = 5DDC5CF884F9FF5801DBE4CBD63B3E2B9300D03A7B5C8BBF36E51C4E8F00FD4B5A9D41C404D440851D36E36B344E10E6
25,141,994 UART: [art] SIG.S = 0093E3F0341C0E6EA888702028889CD1E4DE02D125142DF5389F87E76FCB80DE28BA7C9D0EB8BE96F0881CCFC1EDEED9
26,120,303 UART: Caliptra RT
26,120,996 UART: [state] CFI Enabled
26,285,617 UART: [rt] RT listening for mailbox commands...
31,599,734 >>> mbox cmd response: failed
31,601,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,745,656 UART:
31,745,970 UART: Running Caliptra FMC ...
31,747,049 UART:
31,747,208 UART: [state] CFI Enabled
31,748,134 UART: [art] Extend RT PCRs Done
31,749,273 UART: [art] Lock RT PCRs Done
31,750,358 UART: [art] Populate DV Done
31,751,459 UART: [fht] FMC Alias Private Key: 7
31,752,780 UART: [art] Derive CDI
31,753,518 UART: [art] Store in in slot 0x4
31,777,824 UART: [art] Derive Key Pair
31,778,873 UART: [art] Store priv key in slot 0x5
34,242,986 UART: [art] Derive Key Pair - Done
34,256,043 UART: [art] Signing Cert with AUTHO
34,257,353 UART: RITY.KEYID = 7
35,969,390 UART: [art] Erasing AUTHORITY.KEYID = 7
35,970,902 UART: [art] PUB.X = 044A2B374E2D0E5B36CAF34E3DDB59974ABFC47898F83D89AC21EEABA64A9D744DF3E18F260FE4389880B2C487260542
35,978,141 UART: [art] PUB.Y = 10F3001DF5ACDFFFD141109AEEDC06A1990786FC2542163E72761449F209EF26F0E2CB0B49AA6B93ACAB7064D70F9E0B
35,985,412 UART: [art] SIG.R = 5DDC5CF884F9FF5801DBE4CBD63B3E2B9300D03A7B5C8BBF36E51C4E8F00FD4B5A9D41C404D440851D36E36B344E10E6
35,992,749 UART: [art] SIG.S = 0093E3F0341C0E6EA888702028889CD1E4DE02D125142DF5389F87E76FCB80DE28BA7C9D0EB8BE96F0881CCFC1EDEED9
36,971,620 UART: Caliptra RT
36,972,314 UART: [state] CFI Enabled
37,305,919 UART: [rt] RT listening for mailbox commands...
44,979,651 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,757,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,967,111 >>> mbox cmd response: success
14,969,619 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
19,221,956 UART:
19,222,390 UART: Running Caliptra FMC ...
19,223,527 UART:
19,223,690 UART: [state] CFI Enabled
19,231,383 UART: [fht] FMC Alias Private Key: 7
20,988,755 UART: [art] Extend RT PCRs Done
20,989,987 UART: [art] Lock RT PCRs Done
20,991,426 UART: [art] Populate DV Done
20,996,966 UART: [fht] FMC Alias Private Key: 7
20,998,495 UART: [art] Derive CDI
20,999,234 UART: [art] Store in in slot 0x4
21,041,515 UART: [art] Derive Key Pair
21,042,524 UART: [art] Store priv key in slot 0x5
23,469,233 UART: [art] Derive Key Pair - Done
23,482,395 UART: [art] Signing Cert with AUTHO
23,483,731 UART: RITY.KEYID = 7
25,189,097 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,080 UART: [art] PUB.X = F6BB9D3E329A95E0415CEC5C5E1D992A1072A1102132D0C88C1B1589F23A3F9F86DC60D9D96C8C34B861E080ED8969DD
25,197,864 UART: [art] PUB.Y = E8A9CF692F2827B6FC84F68B3F3035FF8E9B68DDDDD3C94ED73549B180D1361D4920CC2F919A29DA30B879764FF6EA7C
25,205,133 UART: [art] SIG.R = F0FEB9710E4205362BDB09125062EDABDB31FF84DB0A9153EA2C8E470F68D033345C707AA47233B92011436A64C2D5ED
25,212,498 UART: [art] SIG.S = DEA322FFF89E647C787AC363864071F760711370AEA699F041A850A9D1A1EDCDF859FA5886D121FD8EF7A30FB7A809F8
26,191,077 UART: Caliptra RT
26,191,951 UART: [state] CFI Enabled
26,309,207 UART: [rt] RT listening for mailbox commands...
31,567,470 >>> mbox cmd response: failed
31,569,530 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
31,713,228 UART:
31,713,693 UART: Running Caliptra FMC ...
31,714,846 UART:
31,715,013 UART: [state] CFI Enabled
31,715,938 UART: [art] Extend RT PCRs Done
31,717,075 UART: [art] Lock RT PCRs Done
31,718,142 UART: [art] Populate DV Done
31,719,272 UART: [fht] FMC Alias Private Key: 7
31,720,593 UART: [art] Derive CDI
31,721,330 UART: [art] Store in in slot 0x4
31,722,502 UART: [art] Derive Key Pair
31,723,444 UART: [art] Store priv key in slot 0x5
34,108,677 UART: [art] Derive Key Pair - Done
34,121,625 UART: [art] Signing Cert with AUTHO
34,122,966 UART: RITY.KEYID = 7
35,828,664 UART: [art] Erasing AUTHORITY.KEYID = 7
35,830,173 UART: [art] PUB.X = F6BB9D3E329A95E0415CEC5C5E1D992A1072A1102132D0C88C1B1589F23A3F9F86DC60D9D96C8C34B861E080ED8969DD
35,837,434 UART: [art] PUB.Y = E8A9CF692F2827B6FC84F68B3F3035FF8E9B68DDDDD3C94ED73549B180D1361D4920CC2F919A29DA30B879764FF6EA7C
35,844,694 UART: [art] SIG.R = F0FEB9710E4205362BDB09125062EDABDB31FF84DB0A9153EA2C8E470F68D033345C707AA47233B92011436A64C2D5ED
35,852,108 UART: [art] SIG.S = DEA322FFF89E647C787AC363864071F760711370AEA699F041A850A9D1A1EDCDF859FA5886D121FD8EF7A30FB7A809F8
36,830,832 UART: Caliptra RT
36,831,547 UART: [state] CFI Enabled
37,120,273 UART: [rt] RT listening for mailbox commands...
47,908,471 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,271 UART: [kat] SHA2-256
882,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,317 UART: [kat] ++
886,469 UART: [kat] sha1
890,763 UART: [kat] SHA2-256
892,701 UART: [kat] SHA2-384
895,404 UART: [kat] SHA2-512-ACC
897,305 UART: [kat] ECC-384
902,680 UART: [kat] HMAC-384Kdf
907,428 UART: [kat] LMS
1,475,624 UART: [kat] --
1,476,673 UART: [cold-reset] ++
1,477,115 UART: [fht] Storing FHT @ 0x50003400
1,479,882 UART: [idev] ++
1,480,050 UART: [idev] CDI.KEYID = 6
1,480,410 UART: [idev] SUBJECT.KEYID = 7
1,480,834 UART: [idev] UDS.KEYID = 0
1,481,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,822 UART: [idev] Erasing UDS.KEYID = 0
1,505,198 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,846 UART: [idev] --
1,515,029 UART: [ldev] ++
1,515,197 UART: [ldev] CDI.KEYID = 6
1,515,560 UART: [ldev] SUBJECT.KEYID = 5
1,515,986 UART: [ldev] AUTHORITY.KEYID = 7
1,516,449 UART: [ldev] FE.KEYID = 1
1,521,577 UART: [ldev] Erasing FE.KEYID = 1
1,547,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,034 UART: [ldev] --
1,586,371 UART: [fwproc] Waiting for Commands...
1,587,150 UART: [fwproc] Received command 0x46574c44
1,587,941 UART: [fwproc] Received Image of size 114448 bytes
2,888,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,858 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,210 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,183 >>> mbox cmd response: success
3,081,183 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
3,082,445 UART: [afmc] ++
3,082,613 UART: [afmc] CDI.KEYID = 6
3,082,975 UART: [afmc] SUBJECT.KEYID = 7
3,083,400 UART: [afmc] AUTHORITY.KEYID = 5
3,117,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,129 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,909 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,637 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,522 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,212 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,251 UART: [afmc] --
3,161,357 UART: [cold-reset] --
3,162,207 UART: [state] Locking Datavault
3,163,634 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,238 UART: [state] Locking ICCM
3,164,742 UART: [exit] Launching FMC @ 0x40000130
3,170,071 UART:
3,170,087 UART: Running Caliptra FMC ...
3,170,495 UART:
3,170,549 UART: [state] CFI Enabled
3,181,174 UART: [fht] FMC Alias Private Key: 7
3,289,401 UART: [art] Extend RT PCRs Done
3,289,829 UART: [art] Lock RT PCRs Done
3,291,599 UART: [art] Populate DV Done
3,299,734 UART: [fht] FMC Alias Private Key: 7
3,300,850 UART: [art] Derive CDI
3,301,130 UART: [art] Store in in slot 0x4
3,386,967 UART: [art] Derive Key Pair
3,387,327 UART: [art] Store priv key in slot 0x5
3,400,447 UART: [art] Derive Key Pair - Done
3,415,128 UART: [art] Signing Cert with AUTHO
3,415,608 UART: RITY.KEYID = 7
3,430,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,523 UART: [art] PUB.X = 50121B45C3F47336C80172739037CBE0BA41D117BB66D5E5A1E676BF573485799BAEBF43970BE50EF155640456CC8E5C
3,438,281 UART: [art] PUB.Y = 38333C31803278470DCDBFF69B23483FE60B31AC2E502B09D46AC1962C1027CCC701012942565297EE71B530F3819774
3,445,206 UART: [art] SIG.R = C5719119F0AE2D32A945B0E4B2FAECA03623968640DF20C0FDA7642CDDD6AF259FC893568767E900D4446CCF7C5EF402
3,451,961 UART: [art] SIG.S = 95E8EBB52EDA2E73399A6B93E5A95B52936271C7261C6A68BB649AB3CA3301B91569F8C222990EE62D01905FF36D27D1
3,475,373 UART: Caliptra RT
3,475,626 UART: [state] CFI Enabled
3,584,126 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,029 UART:
3,586,045 UART: Running Caliptra ROM ...
3,586,453 UART:
3,586,507 UART: [state] CFI Enabled
3,588,911 UART: [state] LifecycleState = Unprovisioned
3,589,566 UART: [state] DebugLocked = No
3,590,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,591,653 UART: [kat] SHA2-256
4,385,584 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,699 UART: [kat] ++
4,389,851 UART: [kat] sha1
4,393,855 UART: [kat] SHA2-256
4,395,793 UART: [kat] SHA2-384
4,398,494 UART: [kat] SHA2-512-ACC
4,400,394 UART: [kat] ECC-384
4,405,803 UART: [kat] HMAC-384Kdf
4,410,451 UART: [kat] LMS
4,978,647 UART: [kat] --
4,979,630 UART: [update-reset] ++
5,091,905 >>> mbox cmd response: failed
5,091,905 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,092,361 UART: ROM Non-Fatal Error: 0x000B001F
5,093,265 UART: [state] Locking Datavault
5,094,203 UART: [state] Locking PCR0, PCR1 and PCR31
5,094,807 UART: [state] Locking ICCM
5,095,375 UART: [exit] Launching FMC @ 0x40000130
5,100,704 UART:
5,100,720 UART: Running Caliptra FMC ...
5,101,128 UART:
5,101,182 UART: [state] CFI Enabled
5,190,117 UART: [art] Extend RT PCRs Done
5,190,545 UART: [art] Lock RT PCRs Done
5,191,868 UART: [art] Populate DV Done
5,200,293 UART: [fht] FMC Alias Private Key: 7
5,201,451 UART: [art] Derive CDI
5,201,731 UART: [art] Store in in slot 0x4
5,287,568 UART: [art] Derive Key Pair
5,287,928 UART: [art] Store priv key in slot 0x5
5,300,772 UART: [art] Derive Key Pair - Done
5,315,393 UART: [art] Signing Cert with AUTHO
5,315,873 UART: RITY.KEYID = 7
5,331,345 UART: [art] Erasing AUTHORITY.KEYID = 7
5,332,110 UART: [art] PUB.X = 50121B45C3F47336C80172739037CBE0BA41D117BB66D5E5A1E676BF573485799BAEBF43970BE50EF155640456CC8E5C
5,338,868 UART: [art] PUB.Y = 38333C31803278470DCDBFF69B23483FE60B31AC2E502B09D46AC1962C1027CCC701012942565297EE71B530F3819774
5,345,793 UART: [art] SIG.R = C5719119F0AE2D32A945B0E4B2FAECA03623968640DF20C0FDA7642CDDD6AF259FC893568767E900D4446CCF7C5EF402
5,352,548 UART: [art] SIG.S = 95E8EBB52EDA2E73399A6B93E5A95B52936271C7261C6A68BB649AB3CA3301B91569F8C222990EE62D01905FF36D27D1
5,376,600 UART: Caliptra RT
5,376,853 UART: [state] CFI Enabled
5,660,241 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,661,781 UART:
5,661,797 UART: Running Caliptra ROM ...
5,662,205 UART:
5,662,259 UART: [state] CFI Enabled
5,664,557 UART: [state] LifecycleState = Unprovisioned
5,665,212 UART: [state] DebugLocked = No
5,665,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,667,515 UART: [kat] SHA2-256
6,461,446 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,465,561 UART: [kat] ++
6,465,713 UART: [kat] sha1
6,469,899 UART: [kat] SHA2-256
6,471,837 UART: [kat] SHA2-384
6,474,704 UART: [kat] SHA2-512-ACC
6,476,604 UART: [kat] ECC-384
6,482,183 UART: [kat] HMAC-384Kdf
6,486,999 UART: [kat] LMS
7,055,195 UART: [kat] --
7,056,100 UART: [update-reset] ++
8,392,873 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,393,929 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,543,979 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,385 >>> mbox cmd response: success
2,930,385 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,992,527 UART:
2,992,543 UART: Running Caliptra FMC ...
2,992,951 UART:
2,993,005 UART: [state] CFI Enabled
3,003,852 UART: [fht] FMC Alias Private Key: 7
3,111,497 UART: [art] Extend RT PCRs Done
3,111,925 UART: [art] Lock RT PCRs Done
3,113,281 UART: [art] Populate DV Done
3,121,638 UART: [fht] FMC Alias Private Key: 7
3,122,640 UART: [art] Derive CDI
3,122,920 UART: [art] Store in in slot 0x4
3,208,581 UART: [art] Derive Key Pair
3,208,941 UART: [art] Store priv key in slot 0x5
3,222,077 UART: [art] Derive Key Pair - Done
3,236,634 UART: [art] Signing Cert with AUTHO
3,237,114 UART: RITY.KEYID = 7
3,252,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,927 UART: [art] PUB.X = 86E35B4057CAA24B149A6119031D40BD8CF132C12146A992CF32CBFF507EA2A0F7863ACE7E8B6CBDDE6E8EE59CB7898F
3,259,712 UART: [art] PUB.Y = 1F31D776E5ED56ABE27B8BEF24AE225533AD7F00C151B7E5202502FA6807BEA5A8D228A5C0452B022811E501C6052263
3,266,627 UART: [art] SIG.R = 6F1CE088457F33E1123C51B91CC6A8C8A41920837C8B0454F8B4965B6DCC7B0AEF9C7AD0124C4C6A9C7E61BE89DA024D
3,273,400 UART: [art] SIG.S = BC657700BC9B1856D1CE08CA831425A30E6CFB08DE3F5D6E5BC4361A3A051B73AEA5C8018360D3F094CB399395A055FB
3,297,330 UART: Caliptra RT
3,297,583 UART: [state] CFI Enabled
3,405,300 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,796,708 >>> mbox cmd response: failed
4,796,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,802,347 UART:
4,802,363 UART: Running Caliptra FMC ...
4,802,771 UART:
4,802,825 UART: [state] CFI Enabled
4,891,500 UART: [art] Extend RT PCRs Done
4,891,928 UART: [art] Lock RT PCRs Done
4,893,153 UART: [art] Populate DV Done
4,901,342 UART: [fht] FMC Alias Private Key: 7
4,902,476 UART: [art] Derive CDI
4,902,756 UART: [art] Store in in slot 0x4
4,988,609 UART: [art] Derive Key Pair
4,988,969 UART: [art] Store priv key in slot 0x5
5,002,597 UART: [art] Derive Key Pair - Done
5,017,520 UART: [art] Signing Cert with AUTHO
5,018,000 UART: RITY.KEYID = 7
5,033,312 UART: [art] Erasing AUTHORITY.KEYID = 7
5,034,077 UART: [art] PUB.X = 86E35B4057CAA24B149A6119031D40BD8CF132C12146A992CF32CBFF507EA2A0F7863ACE7E8B6CBDDE6E8EE59CB7898F
5,040,862 UART: [art] PUB.Y = 1F31D776E5ED56ABE27B8BEF24AE225533AD7F00C151B7E5202502FA6807BEA5A8D228A5C0452B022811E501C6052263
5,047,777 UART: [art] SIG.R = 6F1CE088457F33E1123C51B91CC6A8C8A41920837C8B0454F8B4965B6DCC7B0AEF9C7AD0124C4C6A9C7E61BE89DA024D
5,054,550 UART: [art] SIG.S = BC657700BC9B1856D1CE08CA831425A30E6CFB08DE3F5D6E5BC4361A3A051B73AEA5C8018360D3F094CB399395A055FB
5,077,528 UART: Caliptra RT
5,077,781 UART: [state] CFI Enabled
5,358,400 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,122,774 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
87,094 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,630 UART: [kat] SHA2-256
882,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,676 UART: [kat] ++
886,828 UART: [kat] sha1
891,072 UART: [kat] SHA2-256
893,010 UART: [kat] SHA2-384
895,727 UART: [kat] SHA2-512-ACC
897,628 UART: [kat] ECC-384
902,759 UART: [kat] HMAC-384Kdf
907,537 UART: [kat] LMS
1,475,733 UART: [kat] --
1,476,502 UART: [cold-reset] ++
1,476,958 UART: [fht] Storing FHT @ 0x50003400
1,479,695 UART: [idev] ++
1,479,863 UART: [idev] CDI.KEYID = 6
1,480,223 UART: [idev] SUBJECT.KEYID = 7
1,480,647 UART: [idev] UDS.KEYID = 0
1,480,992 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,739 UART: [idev] Erasing UDS.KEYID = 0
1,505,153 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,767 UART: [idev] --
1,514,776 UART: [ldev] ++
1,514,944 UART: [ldev] CDI.KEYID = 6
1,515,307 UART: [ldev] SUBJECT.KEYID = 5
1,515,733 UART: [ldev] AUTHORITY.KEYID = 7
1,516,196 UART: [ldev] FE.KEYID = 1
1,521,330 UART: [ldev] Erasing FE.KEYID = 1
1,547,003 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,975 UART: [ldev] --
1,586,324 UART: [fwproc] Waiting for Commands...
1,587,139 UART: [fwproc] Received command 0x46574c44
1,587,930 UART: [fwproc] Received Image of size 114448 bytes
2,887,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,873 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,142 >>> mbox cmd response: success
3,080,142 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
3,081,402 UART: [afmc] ++
3,081,570 UART: [afmc] CDI.KEYID = 6
3,081,932 UART: [afmc] SUBJECT.KEYID = 7
3,082,357 UART: [afmc] AUTHORITY.KEYID = 5
3,117,898 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,984 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,764 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,492 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,377 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,067 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,872 UART: [afmc] --
3,160,914 UART: [cold-reset] --
3,161,602 UART: [state] Locking Datavault
3,162,367 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,971 UART: [state] Locking ICCM
3,163,589 UART: [exit] Launching FMC @ 0x40000130
3,168,918 UART:
3,168,934 UART: Running Caliptra FMC ...
3,169,342 UART:
3,169,485 UART: [state] CFI Enabled
3,179,864 UART: [fht] FMC Alias Private Key: 7
3,288,087 UART: [art] Extend RT PCRs Done
3,288,515 UART: [art] Lock RT PCRs Done
3,290,017 UART: [art] Populate DV Done
3,298,248 UART: [fht] FMC Alias Private Key: 7
3,299,216 UART: [art] Derive CDI
3,299,496 UART: [art] Store in in slot 0x4
3,385,305 UART: [art] Derive Key Pair
3,385,665 UART: [art] Store priv key in slot 0x5
3,399,061 UART: [art] Derive Key Pair - Done
3,413,480 UART: [art] Signing Cert with AUTHO
3,413,960 UART: RITY.KEYID = 7
3,429,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,047 UART: [art] PUB.X = 871745B7D623B7C781E82410A4706FF318D9157ADDCC25121158EC1EFC7116579F43881B134B38175DC02250B9BF92C4
3,436,811 UART: [art] PUB.Y = 2A82CFCA6D62962AD9C0A64A8DFBFCECDD65F1A5436C1846978773A0B8DACCBF66BCDF1EC891567A3A89EE9330ABBA29
3,443,789 UART: [art] SIG.R = F7CB7AEF1B5293D77B1851AF1CB3FB2157CC553693B62B94CCE876ADD8B85145114BC50831FEB3E4126D5E47D905723A
3,450,563 UART: [art] SIG.S = 71704E806AF1241AC738D1BE5CEBB4D93389B0927B37A42A2939F716DF10FF5AE809350FB3D93800E0D1991B3943D141
3,474,614 UART: Caliptra RT
3,474,959 UART: [state] CFI Enabled
3,583,208 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,289 UART:
3,585,305 UART: Running Caliptra ROM ...
3,585,713 UART:
3,585,854 UART: [state] CFI Enabled
3,588,596 UART: [state] LifecycleState = Unprovisioned
3,589,251 UART: [state] DebugLocked = No
3,589,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,591,594 UART: [kat] SHA2-256
4,385,525 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,640 UART: [kat] ++
4,389,792 UART: [kat] sha1
4,394,052 UART: [kat] SHA2-256
4,395,990 UART: [kat] SHA2-384
4,398,763 UART: [kat] SHA2-512-ACC
4,400,663 UART: [kat] ECC-384
4,406,388 UART: [kat] HMAC-384Kdf
4,411,078 UART: [kat] LMS
4,979,274 UART: [kat] --
4,980,245 UART: [update-reset] ++
5,091,542 >>> mbox cmd response: failed
5,091,542 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,091,880 UART: ROM Non-Fatal Error: 0x000B001F
5,092,848 UART: [state] Locking Datavault
5,093,574 UART: [state] Locking PCR0, PCR1 and PCR31
5,094,178 UART: [state] Locking ICCM
5,094,820 UART: [exit] Launching FMC @ 0x40000130
5,100,149 UART:
5,100,165 UART: Running Caliptra FMC ...
5,100,573 UART:
5,100,716 UART: [state] CFI Enabled
5,189,731 UART: [art] Extend RT PCRs Done
5,190,159 UART: [art] Lock RT PCRs Done
5,191,594 UART: [art] Populate DV Done
5,199,735 UART: [fht] FMC Alias Private Key: 7
5,200,677 UART: [art] Derive CDI
5,200,957 UART: [art] Store in in slot 0x4
5,286,664 UART: [art] Derive Key Pair
5,287,024 UART: [art] Store priv key in slot 0x5
5,300,822 UART: [art] Derive Key Pair - Done
5,315,333 UART: [art] Signing Cert with AUTHO
5,315,813 UART: RITY.KEYID = 7
5,330,979 UART: [art] Erasing AUTHORITY.KEYID = 7
5,331,744 UART: [art] PUB.X = 871745B7D623B7C781E82410A4706FF318D9157ADDCC25121158EC1EFC7116579F43881B134B38175DC02250B9BF92C4
5,338,508 UART: [art] PUB.Y = 2A82CFCA6D62962AD9C0A64A8DFBFCECDD65F1A5436C1846978773A0B8DACCBF66BCDF1EC891567A3A89EE9330ABBA29
5,345,486 UART: [art] SIG.R = F7CB7AEF1B5293D77B1851AF1CB3FB2157CC553693B62B94CCE876ADD8B85145114BC50831FEB3E4126D5E47D905723A
5,352,260 UART: [art] SIG.S = 71704E806AF1241AC738D1BE5CEBB4D93389B0927B37A42A2939F716DF10FF5AE809350FB3D93800E0D1991B3943D141
5,375,767 UART: Caliptra RT
5,376,112 UART: [state] CFI Enabled
5,660,901 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,662,695 UART:
5,662,711 UART: Running Caliptra ROM ...
5,663,119 UART:
5,663,260 UART: [state] CFI Enabled
5,665,976 UART: [state] LifecycleState = Unprovisioned
5,666,631 UART: [state] DebugLocked = No
5,667,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,668,820 UART: [kat] SHA2-256
6,462,751 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,466,866 UART: [kat] ++
6,467,018 UART: [kat] sha1
6,471,228 UART: [kat] SHA2-256
6,473,166 UART: [kat] SHA2-384
6,475,955 UART: [kat] SHA2-512-ACC
6,477,855 UART: [kat] ECC-384
6,483,484 UART: [kat] HMAC-384Kdf
6,488,050 UART: [kat] LMS
7,056,246 UART: [kat] --
7,057,197 UART: [update-reset] ++
8,393,094 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,394,148 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,544,198 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,396 >>> mbox cmd response: success
2,931,396 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,993,348 UART:
2,993,364 UART: Running Caliptra FMC ...
2,993,772 UART:
2,993,915 UART: [state] CFI Enabled
3,004,708 UART: [fht] FMC Alias Private Key: 7
3,112,279 UART: [art] Extend RT PCRs Done
3,112,707 UART: [art] Lock RT PCRs Done
3,114,191 UART: [art] Populate DV Done
3,122,688 UART: [fht] FMC Alias Private Key: 7
3,123,690 UART: [art] Derive CDI
3,123,970 UART: [art] Store in in slot 0x4
3,209,733 UART: [art] Derive Key Pair
3,210,093 UART: [art] Store priv key in slot 0x5
3,223,551 UART: [art] Derive Key Pair - Done
3,238,458 UART: [art] Signing Cert with AUTHO
3,238,938 UART: RITY.KEYID = 7
3,254,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,931 UART: [art] PUB.X = FF7AEEEE82E7213E37744CC79D6485AC6A481894133A282986A3A998B4CF86780B69E10BCDBCBC971D7B66640569308C
3,261,696 UART: [art] PUB.Y = 14DB667ADC528ABEADAE704B586DCA5D43BCA97EE7FAF244AD40A60D97D13F9669BFFD9D8103B09BD1B55F4F38D94FAC
3,268,670 UART: [art] SIG.R = 5A22189F7E626C71B06823487ED068C261923DE5E15E79B5A255CB4989A8C930D15D167CE3E83384DBC9179BFDF8F967
3,275,440 UART: [art] SIG.S = ADE04AD37ABEA82F5D6BE0ED43451701E7404195BF06C767984C18C4BE8807CE02AD21CFF23AFDC6CAF46E5FFD502152
3,299,567 UART: Caliptra RT
3,299,912 UART: [state] CFI Enabled
3,408,051 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,799,782 >>> mbox cmd response: failed
4,799,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,805,443 UART:
4,805,459 UART: Running Caliptra FMC ...
4,805,867 UART:
4,806,010 UART: [state] CFI Enabled
4,895,383 UART: [art] Extend RT PCRs Done
4,895,811 UART: [art] Lock RT PCRs Done
4,897,300 UART: [art] Populate DV Done
4,905,571 UART: [fht] FMC Alias Private Key: 7
4,906,701 UART: [art] Derive CDI
4,906,981 UART: [art] Store in in slot 0x4
4,992,736 UART: [art] Derive Key Pair
4,993,096 UART: [art] Store priv key in slot 0x5
5,006,054 UART: [art] Derive Key Pair - Done
5,020,671 UART: [art] Signing Cert with AUTHO
5,021,151 UART: RITY.KEYID = 7
5,036,307 UART: [art] Erasing AUTHORITY.KEYID = 7
5,037,072 UART: [art] PUB.X = FF7AEEEE82E7213E37744CC79D6485AC6A481894133A282986A3A998B4CF86780B69E10BCDBCBC971D7B66640569308C
5,043,837 UART: [art] PUB.Y = 14DB667ADC528ABEADAE704B586DCA5D43BCA97EE7FAF244AD40A60D97D13F9669BFFD9D8103B09BD1B55F4F38D94FAC
5,050,811 UART: [art] SIG.R = 5A22189F7E626C71B06823487ED068C261923DE5E15E79B5A255CB4989A8C930D15D167CE3E83384DBC9179BFDF8F967
5,057,581 UART: [art] SIG.S = ADE04AD37ABEA82F5D6BE0ED43451701E7404195BF06C767984C18C4BE8807CE02AD21CFF23AFDC6CAF46E5FFD502152
5,081,642 UART: Caliptra RT
5,081,987 UART: [state] CFI Enabled
5,366,896 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,132,291 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
893,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,515 UART: [kat] ++
897,667 UART: [kat] sha1
902,061 UART: [kat] SHA2-256
904,001 UART: [kat] SHA2-384
906,836 UART: [kat] SHA2-512-ACC
908,737 UART: [kat] ECC-384
918,552 UART: [kat] HMAC-384Kdf
923,202 UART: [kat] LMS
1,171,530 UART: [kat] --
1,172,559 UART: [cold-reset] ++
1,173,127 UART: [fht] FHT @ 0x50003400
1,175,780 UART: [idev] ++
1,175,948 UART: [idev] CDI.KEYID = 6
1,176,308 UART: [idev] SUBJECT.KEYID = 7
1,176,732 UART: [idev] UDS.KEYID = 0
1,177,077 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,712 UART: [idev] Erasing UDS.KEYID = 0
1,201,743 UART: [idev] Sha1 KeyId Algorithm
1,210,249 UART: [idev] --
1,211,153 UART: [ldev] ++
1,211,321 UART: [ldev] CDI.KEYID = 6
1,211,684 UART: [ldev] SUBJECT.KEYID = 5
1,212,110 UART: [ldev] AUTHORITY.KEYID = 7
1,212,573 UART: [ldev] FE.KEYID = 1
1,217,581 UART: [ldev] Erasing FE.KEYID = 1
1,243,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,393 UART: [ldev] --
1,282,662 UART: [fwproc] Wait for Commands...
1,283,478 UART: [fwproc] Recv command 0x46574c44
1,284,206 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,503 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,422 >>> mbox cmd response: success
2,775,422 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,776,576 UART: [afmc] ++
2,776,744 UART: [afmc] CDI.KEYID = 6
2,777,106 UART: [afmc] SUBJECT.KEYID = 7
2,777,531 UART: [afmc] AUTHORITY.KEYID = 5
2,813,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,597 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,210 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,929 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,737 UART: [afmc] --
2,856,847 UART: [cold-reset] --
2,857,519 UART: [state] Locking Datavault
2,858,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,460 UART: [state] Locking ICCM
2,860,024 UART: [exit] Launching FMC @ 0x40000130
2,865,353 UART:
2,865,369 UART: Running Caliptra FMC ...
2,865,777 UART:
2,865,831 UART: [state] CFI Enabled
2,876,392 UART: [fht] FMC Alias Private Key: 7
2,983,735 UART: [art] Extend RT PCRs Done
2,984,163 UART: [art] Lock RT PCRs Done
2,985,643 UART: [art] Populate DV Done
2,993,780 UART: [fht] FMC Alias Private Key: 7
2,994,770 UART: [art] Derive CDI
2,995,050 UART: [art] Store in in slot 0x4
3,081,233 UART: [art] Derive Key Pair
3,081,593 UART: [art] Store priv key in slot 0x5
3,094,607 UART: [art] Derive Key Pair - Done
3,109,169 UART: [art] Signing Cert with AUTHO
3,109,649 UART: RITY.KEYID = 7
3,124,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,640 UART: [art] PUB.X = 882024B00C6AF5A72EFC1C5040F4734398177AB80D584BAEEADA127F29E0A30792B6057749126A6E703E25307A6301AF
3,132,393 UART: [art] PUB.Y = EE147ADC7F6F86BF179A4C024B1F94E273E97CD21A3537A5D6CBCD86546E5DE56A0EF979478DB65877CDE575B51CF849
3,139,351 UART: [art] SIG.R = 6BF11AC3EDEB7F8C47B69677E00FEF32B0FBA184BC88305CD7E1C9CA51FCAD02C53CC597831CAADC0FD8C0B27EA17089
3,146,140 UART: [art] SIG.S = 4463D8785EBE6B3888A1A91C36BF3C4C84B09D3C23A815465A355223CE66BD5766BABD3016C26757E6EB5F5F796EB7C6
3,169,451 UART: Caliptra RT
3,169,704 UART: [state] CFI Enabled
3,277,281 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,245 UART:
3,279,261 UART: Running Caliptra ROM ...
3,279,669 UART:
3,279,724 UART: [state] CFI Enabled
3,283,056 UART: [state] LifecycleState = Unprovisioned
3,283,711 UART: [state] DebugLocked = No
3,284,217 UART: [state] WD Timer not started. Device not locked for debugging
3,285,461 UART: [kat] SHA2-256
4,091,111 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,236 UART: [kat] ++
4,095,388 UART: [kat] sha1
4,099,646 UART: [kat] SHA2-256
4,101,586 UART: [kat] SHA2-384
4,104,419 UART: [kat] SHA2-512-ACC
4,106,319 UART: [kat] ECC-384
4,116,436 UART: [kat] HMAC-384Kdf
4,120,904 UART: [kat] LMS
4,369,232 UART: [kat] --
4,369,996 UART: [update-reset] ++
4,459,911 >>> mbox cmd response: failed
4,459,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,460,265 UART: ROM Non-Fatal Error: 0x000B001F
4,461,195 UART: [state] Locking Datavault
4,462,101 UART: [state] Locking PCR0, PCR1 and PCR31
4,462,705 UART: [state] Locking ICCM
4,463,199 UART: [exit] Launching FMC @ 0x40000130
4,468,528 UART:
4,468,544 UART: Running Caliptra FMC ...
4,468,952 UART:
4,469,006 UART: [state] CFI Enabled
4,557,869 UART: [art] Extend RT PCRs Done
4,558,297 UART: [art] Lock RT PCRs Done
4,559,604 UART: [art] Populate DV Done
4,568,079 UART: [fht] FMC Alias Private Key: 7
4,569,053 UART: [art] Derive CDI
4,569,333 UART: [art] Store in in slot 0x4
4,655,016 UART: [art] Derive Key Pair
4,655,376 UART: [art] Store priv key in slot 0x5
4,668,636 UART: [art] Derive Key Pair - Done
4,683,470 UART: [art] Signing Cert with AUTHO
4,683,950 UART: RITY.KEYID = 7
4,698,840 UART: [art] Erasing AUTHORITY.KEYID = 7
4,699,605 UART: [art] PUB.X = 882024B00C6AF5A72EFC1C5040F4734398177AB80D584BAEEADA127F29E0A30792B6057749126A6E703E25307A6301AF
4,706,358 UART: [art] PUB.Y = EE147ADC7F6F86BF179A4C024B1F94E273E97CD21A3537A5D6CBCD86546E5DE56A0EF979478DB65877CDE575B51CF849
4,713,316 UART: [art] SIG.R = 6BF11AC3EDEB7F8C47B69677E00FEF32B0FBA184BC88305CD7E1C9CA51FCAD02C53CC597831CAADC0FD8C0B27EA17089
4,720,105 UART: [art] SIG.S = 4463D8785EBE6B3888A1A91C36BF3C4C84B09D3C23A815465A355223CE66BD5766BABD3016C26757E6EB5F5F796EB7C6
4,744,248 UART: Caliptra RT
4,744,501 UART: [state] CFI Enabled
5,026,814 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,028,349 UART:
5,028,365 UART: Running Caliptra ROM ...
5,028,773 UART:
5,028,828 UART: [state] CFI Enabled
5,031,708 UART: [state] LifecycleState = Unprovisioned
5,032,363 UART: [state] DebugLocked = No
5,033,037 UART: [state] WD Timer not started. Device not locked for debugging
5,034,309 UART: [kat] SHA2-256
5,839,959 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,844,084 UART: [kat] ++
5,844,236 UART: [kat] sha1
5,848,394 UART: [kat] SHA2-256
5,850,334 UART: [kat] SHA2-384
5,852,883 UART: [kat] SHA2-512-ACC
5,854,783 UART: [kat] ECC-384
5,864,748 UART: [kat] HMAC-384Kdf
5,869,296 UART: [kat] LMS
6,117,624 UART: [kat] --
6,118,234 UART: [update-reset] ++
7,432,009 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,433,038 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,583,036 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,997 >>> mbox cmd response: success
2,627,997 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,689,413 UART:
2,689,429 UART: Running Caliptra FMC ...
2,689,837 UART:
2,689,891 UART: [state] CFI Enabled
2,700,484 UART: [fht] FMC Alias Private Key: 7
2,807,857 UART: [art] Extend RT PCRs Done
2,808,285 UART: [art] Lock RT PCRs Done
2,809,989 UART: [art] Populate DV Done
2,818,324 UART: [fht] FMC Alias Private Key: 7
2,819,362 UART: [art] Derive CDI
2,819,642 UART: [art] Store in in slot 0x4
2,905,391 UART: [art] Derive Key Pair
2,905,751 UART: [art] Store priv key in slot 0x5
2,918,663 UART: [art] Derive Key Pair - Done
2,933,360 UART: [art] Signing Cert with AUTHO
2,933,840 UART: RITY.KEYID = 7
2,949,088 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,853 UART: [art] PUB.X = DC81493B06810346EF36E163A16174176FF681F2086868DE4A0F3B8FC17D6F45A8D97F6641768FFA677AC6424758273F
2,956,605 UART: [art] PUB.Y = A6545C2F9CD5500F5755B54F0B807DF5A39D188CFB4FA35D8FC96B0E9871869736893AC89E9269D8D9C5948507CF4846
2,963,543 UART: [art] SIG.R = 6D654F0A26B048493FFF11C8B3E8EBF722D4109316CA29C7F0B2A8332D82106D8A724BB18CF28C143691691E2F23E487
2,970,310 UART: [art] SIG.S = DCBE1EB7EE0BB37C34AB6E8A90463DEFCAE245B981306AAAA452711FFB781A58AD54871DA7C8606382181E2AC885CAD0
2,994,576 UART: Caliptra RT
2,994,829 UART: [state] CFI Enabled
3,102,080 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,480 >>> mbox cmd response: failed
4,169,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,175,139 UART:
4,175,155 UART: Running Caliptra FMC ...
4,175,563 UART:
4,175,617 UART: [state] CFI Enabled
4,265,432 UART: [art] Extend RT PCRs Done
4,265,860 UART: [art] Lock RT PCRs Done
4,267,369 UART: [art] Populate DV Done
4,275,464 UART: [fht] FMC Alias Private Key: 7
4,276,428 UART: [art] Derive CDI
4,276,708 UART: [art] Store in in slot 0x4
4,362,585 UART: [art] Derive Key Pair
4,362,945 UART: [art] Store priv key in slot 0x5
4,376,079 UART: [art] Derive Key Pair - Done
4,390,876 UART: [art] Signing Cert with AUTHO
4,391,356 UART: RITY.KEYID = 7
4,406,408 UART: [art] Erasing AUTHORITY.KEYID = 7
4,407,173 UART: [art] PUB.X = DC81493B06810346EF36E163A16174176FF681F2086868DE4A0F3B8FC17D6F45A8D97F6641768FFA677AC6424758273F
4,413,925 UART: [art] PUB.Y = A6545C2F9CD5500F5755B54F0B807DF5A39D188CFB4FA35D8FC96B0E9871869736893AC89E9269D8D9C5948507CF4846
4,420,863 UART: [art] SIG.R = 6D654F0A26B048493FFF11C8B3E8EBF722D4109316CA29C7F0B2A8332D82106D8A724BB18CF28C143691691E2F23E487
4,427,630 UART: [art] SIG.S = DCBE1EB7EE0BB37C34AB6E8A90463DEFCAE245B981306AAAA452711FFB781A58AD54871DA7C8606382181E2AC885CAD0
4,451,918 UART: Caliptra RT
4,452,171 UART: [state] CFI Enabled
4,730,164 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,169,963 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
893,447 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,572 UART: [kat] ++
897,724 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,599 UART: [kat] SHA2-512-ACC
908,500 UART: [kat] ECC-384
918,453 UART: [kat] HMAC-384Kdf
922,973 UART: [kat] LMS
1,171,301 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,626 UART: [fht] FHT @ 0x50003400
1,175,179 UART: [idev] ++
1,175,347 UART: [idev] CDI.KEYID = 6
1,175,707 UART: [idev] SUBJECT.KEYID = 7
1,176,131 UART: [idev] UDS.KEYID = 0
1,176,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,121 UART: [idev] Erasing UDS.KEYID = 0
1,201,256 UART: [idev] Sha1 KeyId Algorithm
1,209,732 UART: [idev] --
1,210,762 UART: [ldev] ++
1,210,930 UART: [ldev] CDI.KEYID = 6
1,211,293 UART: [ldev] SUBJECT.KEYID = 5
1,211,719 UART: [ldev] AUTHORITY.KEYID = 7
1,212,182 UART: [ldev] FE.KEYID = 1
1,217,038 UART: [ldev] Erasing FE.KEYID = 1
1,242,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,518 UART: [ldev] --
1,281,821 UART: [fwproc] Wait for Commands...
1,282,591 UART: [fwproc] Recv command 0x46574c44
1,283,319 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,639 >>> mbox cmd response: success
2,776,639 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,777,863 UART: [afmc] ++
2,778,031 UART: [afmc] CDI.KEYID = 6
2,778,393 UART: [afmc] SUBJECT.KEYID = 7
2,778,818 UART: [afmc] AUTHORITY.KEYID = 5
2,814,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,480 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,093 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,812 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,534 UART: [afmc] --
2,857,492 UART: [cold-reset] --
2,858,324 UART: [state] Locking Datavault
2,859,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,299 UART: [state] Locking ICCM
2,860,761 UART: [exit] Launching FMC @ 0x40000130
2,866,090 UART:
2,866,106 UART: Running Caliptra FMC ...
2,866,514 UART:
2,866,657 UART: [state] CFI Enabled
2,877,416 UART: [fht] FMC Alias Private Key: 7
2,985,873 UART: [art] Extend RT PCRs Done
2,986,301 UART: [art] Lock RT PCRs Done
2,987,445 UART: [art] Populate DV Done
2,995,884 UART: [fht] FMC Alias Private Key: 7
2,996,994 UART: [art] Derive CDI
2,997,274 UART: [art] Store in in slot 0x4
3,082,931 UART: [art] Derive Key Pair
3,083,291 UART: [art] Store priv key in slot 0x5
3,096,337 UART: [art] Derive Key Pair - Done
3,111,221 UART: [art] Signing Cert with AUTHO
3,111,701 UART: RITY.KEYID = 7
3,126,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,646 UART: [art] PUB.X = 96F40234F81B866B1058732378B48F9B5A3108328238DAB2EA1E1B245906FB657C839B084EF4F17AA574F5D9A71C9F84
3,134,400 UART: [art] PUB.Y = A3FB1B4A9FDB3D831CF0622C19C2D50A3CA3B4C7F90B4EF62B099E71AB5A015477015036FAAC815CB18C67AB58CF3CC3
3,141,355 UART: [art] SIG.R = 30A174778BB9032F431E9D6D7B69D8C2154003DD7B11ECDD6508B9179C1EE0721413DFFADDA06BB1F81B8F2DB52E67AC
3,148,130 UART: [art] SIG.S = 84345194CD05DED31988E6C00D5521B521A1D23E42D06266ACE6C8CE7EE710DB6D97B8EC133224C055503872FBD88405
3,172,146 UART: Caliptra RT
3,172,491 UART: [state] CFI Enabled
3,279,940 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,026 UART:
3,282,042 UART: Running Caliptra ROM ...
3,282,450 UART:
3,282,592 UART: [state] CFI Enabled
3,285,694 UART: [state] LifecycleState = Unprovisioned
3,286,349 UART: [state] DebugLocked = No
3,286,991 UART: [state] WD Timer not started. Device not locked for debugging
3,288,115 UART: [kat] SHA2-256
4,093,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,097,890 UART: [kat] ++
4,098,042 UART: [kat] sha1
4,102,414 UART: [kat] SHA2-256
4,104,354 UART: [kat] SHA2-384
4,107,257 UART: [kat] SHA2-512-ACC
4,109,157 UART: [kat] ECC-384
4,118,950 UART: [kat] HMAC-384Kdf
4,123,624 UART: [kat] LMS
4,371,952 UART: [kat] --
4,372,948 UART: [update-reset] ++
4,462,617 >>> mbox cmd response: failed
4,462,617 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,462,893 UART: ROM Non-Fatal Error: 0x000B001F
4,463,825 UART: [state] Locking Datavault
4,464,561 UART: [state] Locking PCR0, PCR1 and PCR31
4,465,165 UART: [state] Locking ICCM
4,465,791 UART: [exit] Launching FMC @ 0x40000130
4,471,120 UART:
4,471,136 UART: Running Caliptra FMC ...
4,471,544 UART:
4,471,687 UART: [state] CFI Enabled
4,561,002 UART: [art] Extend RT PCRs Done
4,561,430 UART: [art] Lock RT PCRs Done
4,562,727 UART: [art] Populate DV Done
4,570,894 UART: [fht] FMC Alias Private Key: 7
4,571,848 UART: [art] Derive CDI
4,572,128 UART: [art] Store in in slot 0x4
4,657,661 UART: [art] Derive Key Pair
4,658,021 UART: [art] Store priv key in slot 0x5
4,671,359 UART: [art] Derive Key Pair - Done
4,686,263 UART: [art] Signing Cert with AUTHO
4,686,743 UART: RITY.KEYID = 7
4,701,985 UART: [art] Erasing AUTHORITY.KEYID = 7
4,702,750 UART: [art] PUB.X = 96F40234F81B866B1058732378B48F9B5A3108328238DAB2EA1E1B245906FB657C839B084EF4F17AA574F5D9A71C9F84
4,709,504 UART: [art] PUB.Y = A3FB1B4A9FDB3D831CF0622C19C2D50A3CA3B4C7F90B4EF62B099E71AB5A015477015036FAAC815CB18C67AB58CF3CC3
4,716,459 UART: [art] SIG.R = 30A174778BB9032F431E9D6D7B69D8C2154003DD7B11ECDD6508B9179C1EE0721413DFFADDA06BB1F81B8F2DB52E67AC
4,723,234 UART: [art] SIG.S = 84345194CD05DED31988E6C00D5521B521A1D23E42D06266ACE6C8CE7EE710DB6D97B8EC133224C055503872FBD88405
4,747,400 UART: Caliptra RT
4,747,745 UART: [state] CFI Enabled
5,032,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,034,613 UART:
5,034,629 UART: Running Caliptra ROM ...
5,035,037 UART:
5,035,179 UART: [state] CFI Enabled
5,038,035 UART: [state] LifecycleState = Unprovisioned
5,038,690 UART: [state] DebugLocked = No
5,039,248 UART: [state] WD Timer not started. Device not locked for debugging
5,040,604 UART: [kat] SHA2-256
5,846,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,850,379 UART: [kat] ++
5,850,531 UART: [kat] sha1
5,854,831 UART: [kat] SHA2-256
5,856,771 UART: [kat] SHA2-384
5,859,552 UART: [kat] SHA2-512-ACC
5,861,452 UART: [kat] ECC-384
5,871,133 UART: [kat] HMAC-384Kdf
5,875,807 UART: [kat] LMS
6,124,135 UART: [kat] --
6,125,243 UART: [update-reset] ++
7,439,248 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,440,377 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,590,375 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,546 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,716 >>> mbox cmd response: success
2,629,716 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,691,310 UART:
2,691,326 UART: Running Caliptra FMC ...
2,691,734 UART:
2,691,877 UART: [state] CFI Enabled
2,702,332 UART: [fht] FMC Alias Private Key: 7
2,810,269 UART: [art] Extend RT PCRs Done
2,810,697 UART: [art] Lock RT PCRs Done
2,812,407 UART: [art] Populate DV Done
2,820,536 UART: [fht] FMC Alias Private Key: 7
2,821,678 UART: [art] Derive CDI
2,821,958 UART: [art] Store in in slot 0x4
2,907,571 UART: [art] Derive Key Pair
2,907,931 UART: [art] Store priv key in slot 0x5
2,920,915 UART: [art] Derive Key Pair - Done
2,935,487 UART: [art] Signing Cert with AUTHO
2,935,967 UART: RITY.KEYID = 7
2,951,329 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,094 UART: [art] PUB.X = 3A80399129CF66747E2404667FCC321AE41A0EA42C1F091F5F75F464FE240735DB29A7274FE3DF4D4370357EA07FE019
2,958,852 UART: [art] PUB.Y = 1CA4716F66E55F54064D8F81684D0073496C15BC99E76A3D1CE8C128629F29C080F0F6CC3FA91A41A251DBEB8DCD4111
2,965,783 UART: [art] SIG.R = 386F5A3C634464BF5BAD0E7A8AAF44C84532917462EF7495E05088D5B00953F2D6F3DDA018A045DDD7B0D1C0BC63E018
2,972,555 UART: [art] SIG.S = 0D2C1845FD8356728E46E4115E07D61481FA818FE9CFC0C194DDD40A3A01853785B6EF9FD200CDD15DF07C70641A6CC6
2,996,510 UART: Caliptra RT
2,996,855 UART: [state] CFI Enabled
3,104,060 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,171,347 >>> mbox cmd response: failed
4,171,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,177,168 UART:
4,177,184 UART: Running Caliptra FMC ...
4,177,592 UART:
4,177,735 UART: [state] CFI Enabled
4,267,458 UART: [art] Extend RT PCRs Done
4,267,886 UART: [art] Lock RT PCRs Done
4,268,847 UART: [art] Populate DV Done
4,277,054 UART: [fht] FMC Alias Private Key: 7
4,278,176 UART: [art] Derive CDI
4,278,456 UART: [art] Store in in slot 0x4
4,364,185 UART: [art] Derive Key Pair
4,364,545 UART: [art] Store priv key in slot 0x5
4,378,237 UART: [art] Derive Key Pair - Done
4,392,765 UART: [art] Signing Cert with AUTHO
4,393,245 UART: RITY.KEYID = 7
4,408,473 UART: [art] Erasing AUTHORITY.KEYID = 7
4,409,238 UART: [art] PUB.X = 3A80399129CF66747E2404667FCC321AE41A0EA42C1F091F5F75F464FE240735DB29A7274FE3DF4D4370357EA07FE019
4,415,996 UART: [art] PUB.Y = 1CA4716F66E55F54064D8F81684D0073496C15BC99E76A3D1CE8C128629F29C080F0F6CC3FA91A41A251DBEB8DCD4111
4,422,927 UART: [art] SIG.R = 386F5A3C634464BF5BAD0E7A8AAF44C84532917462EF7495E05088D5B00953F2D6F3DDA018A045DDD7B0D1C0BC63E018
4,429,699 UART: [art] SIG.S = 0D2C1845FD8356728E46E4115E07D61481FA818FE9CFC0C194DDD40A3A01853785B6EF9FD200CDD15DF07C70641A6CC6
4,453,478 UART: Caliptra RT
4,453,823 UART: [state] CFI Enabled
4,739,884 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,180,318 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
900,261 UART: [kat] SHA2-256
902,201 UART: [kat] SHA2-384
904,874 UART: [kat] SHA2-512-ACC
906,775 UART: [kat] ECC-384
916,488 UART: [kat] HMAC-384Kdf
920,996 UART: [kat] LMS
1,169,308 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,174,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,199,093 UART: [idev] Sha1 KeyId Algorithm
1,207,963 UART: [idev] --
1,208,940 UART: [ldev] ++
1,209,108 UART: [ldev] CDI.KEYID = 6
1,209,472 UART: [ldev] SUBJECT.KEYID = 5
1,209,899 UART: [ldev] AUTHORITY.KEYID = 7
1,210,362 UART: [ldev] FE.KEYID = 1
1,215,622 UART: [ldev] Erasing FE.KEYID = 1
1,241,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,074 UART: [ldev] --
1,281,556 UART: [fwproc] Wait for Commands...
1,282,253 UART: [fwproc] Recv command 0x46574c44
1,282,986 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,056 >>> mbox cmd response: success
2,775,056 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,776,285 UART: [afmc] ++
2,776,453 UART: [afmc] CDI.KEYID = 6
2,776,816 UART: [afmc] SUBJECT.KEYID = 7
2,777,242 UART: [afmc] AUTHORITY.KEYID = 5
2,812,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,070 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,799 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,682 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,401 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,182 UART: [afmc] --
2,856,234 UART: [cold-reset] --
2,856,878 UART: [state] Locking Datavault
2,858,075 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,679 UART: [state] Locking ICCM
2,859,303 UART: [exit] Launching FMC @ 0x40000130
2,864,632 UART:
2,864,648 UART: Running Caliptra FMC ...
2,865,056 UART:
2,865,110 UART: [state] CFI Enabled
2,875,577 UART: [fht] FMC Alias Private Key: 7
2,983,328 UART: [art] Extend RT PCRs Done
2,983,756 UART: [art] Lock RT PCRs Done
2,985,204 UART: [art] Populate DV Done
2,993,301 UART: [fht] FMC Alias Private Key: 7
2,994,385 UART: [art] Derive CDI
2,994,665 UART: [art] Store in in slot 0x4
3,080,374 UART: [art] Derive Key Pair
3,080,734 UART: [art] Store priv key in slot 0x5
3,094,448 UART: [art] Derive Key Pair - Done
3,109,292 UART: [art] Signing Cert with AUTHO
3,109,772 UART: RITY.KEYID = 7
3,125,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,949 UART: [art] PUB.X = 73A5B8A25FD991A1291198D975CEA6F6E76F426CEE745835AF817C37B254927C9F7688AE543C94C8847F0B8F4CD2E241
3,132,718 UART: [art] PUB.Y = 19D339282FA10F94E6D73CA1E8B3677FCE4529DA770C0BD131F9DF0622CC34E33E66320B824B5F66456FB395A7D803E0
3,139,654 UART: [art] SIG.R = 58A832AC965197A9D9DFC44E3771D0D23BF76728933812F0AA3F88D48C322A5FAEF1C43800AFA760D1B94D33CBFB8421
3,146,410 UART: [art] SIG.S = 9DEF0763E3C0C66AA603B53FDCBFB4B477D86AAD4E52DE616B05D38ED114C4918461F884C789E909A3867E77B30D813D
3,170,062 UART: Caliptra RT
3,170,315 UART: [state] CFI Enabled
3,278,448 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,446 UART:
3,280,462 UART: Running Caliptra ROM ...
3,280,870 UART:
3,280,925 UART: [state] CFI Enabled
3,283,569 UART: [state] LifecycleState = Unprovisioned
3,284,224 UART: [state] DebugLocked = No
3,284,838 UART: [state] WD Timer not started. Device not locked for debugging
3,285,988 UART: [kat] SHA2-256
4,089,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,667 UART: [kat] ++
4,093,819 UART: [kat] sha1
4,098,177 UART: [kat] SHA2-256
4,100,117 UART: [kat] SHA2-384
4,102,750 UART: [kat] SHA2-512-ACC
4,104,650 UART: [kat] ECC-384
4,114,179 UART: [kat] HMAC-384Kdf
4,118,779 UART: [kat] LMS
4,367,091 UART: [kat] --
4,368,077 UART: [update-reset] ++
4,458,391 >>> mbox cmd response: failed
4,458,391 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,458,733 UART: ROM Non-Fatal Error: 0x000B001F
4,459,643 UART: [state] Locking Datavault
4,460,543 UART: [state] Locking PCR0, PCR1 and PCR31
4,461,147 UART: [state] Locking ICCM
4,461,615 UART: [exit] Launching FMC @ 0x40000130
4,466,944 UART:
4,466,960 UART: Running Caliptra FMC ...
4,467,368 UART:
4,467,422 UART: [state] CFI Enabled
4,556,621 UART: [art] Extend RT PCRs Done
4,557,049 UART: [art] Lock RT PCRs Done
4,558,200 UART: [art] Populate DV Done
4,566,535 UART: [fht] FMC Alias Private Key: 7
4,567,593 UART: [art] Derive CDI
4,567,873 UART: [art] Store in in slot 0x4
4,653,466 UART: [art] Derive Key Pair
4,653,826 UART: [art] Store priv key in slot 0x5
4,667,366 UART: [art] Derive Key Pair - Done
4,681,666 UART: [art] Signing Cert with AUTHO
4,682,146 UART: RITY.KEYID = 7
4,697,282 UART: [art] Erasing AUTHORITY.KEYID = 7
4,698,047 UART: [art] PUB.X = 73A5B8A25FD991A1291198D975CEA6F6E76F426CEE745835AF817C37B254927C9F7688AE543C94C8847F0B8F4CD2E241
4,704,816 UART: [art] PUB.Y = 19D339282FA10F94E6D73CA1E8B3677FCE4529DA770C0BD131F9DF0622CC34E33E66320B824B5F66456FB395A7D803E0
4,711,752 UART: [art] SIG.R = 58A832AC965197A9D9DFC44E3771D0D23BF76728933812F0AA3F88D48C322A5FAEF1C43800AFA760D1B94D33CBFB8421
4,718,508 UART: [art] SIG.S = 9DEF0763E3C0C66AA603B53FDCBFB4B477D86AAD4E52DE616B05D38ED114C4918461F884C789E909A3867E77B30D813D
4,742,456 UART: Caliptra RT
4,742,709 UART: [state] CFI Enabled
5,024,042 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,025,725 UART:
5,025,741 UART: Running Caliptra ROM ...
5,026,149 UART:
5,026,204 UART: [state] CFI Enabled
5,028,828 UART: [state] LifecycleState = Unprovisioned
5,029,483 UART: [state] DebugLocked = No
5,030,133 UART: [state] WD Timer not started. Device not locked for debugging
5,031,385 UART: [kat] SHA2-256
5,834,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,839,064 UART: [kat] ++
5,839,216 UART: [kat] sha1
5,843,514 UART: [kat] SHA2-256
5,845,454 UART: [kat] SHA2-384
5,848,245 UART: [kat] SHA2-512-ACC
5,850,145 UART: [kat] ECC-384
5,859,672 UART: [kat] HMAC-384Kdf
5,864,186 UART: [kat] LMS
6,112,498 UART: [kat] --
6,113,108 UART: [update-reset] ++
7,426,158 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,427,367 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,577,365 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,316 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,468 >>> mbox cmd response: success
2,623,468 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,685,232 UART:
2,685,248 UART: Running Caliptra FMC ...
2,685,656 UART:
2,685,710 UART: [state] CFI Enabled
2,696,079 UART: [fht] FMC Alias Private Key: 7
2,804,084 UART: [art] Extend RT PCRs Done
2,804,512 UART: [art] Lock RT PCRs Done
2,805,838 UART: [art] Populate DV Done
2,814,257 UART: [fht] FMC Alias Private Key: 7
2,815,253 UART: [art] Derive CDI
2,815,533 UART: [art] Store in in slot 0x4
2,901,444 UART: [art] Derive Key Pair
2,901,804 UART: [art] Store priv key in slot 0x5
2,914,754 UART: [art] Derive Key Pair - Done
2,929,689 UART: [art] Signing Cert with AUTHO
2,930,169 UART: RITY.KEYID = 7
2,945,121 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,886 UART: [art] PUB.X = 08BF09680201A35C77FFCB817C3F67F9D206FEECF0480688BD65420C7AA7072318B6A671374139D68EF91D40E530F6D0
2,952,632 UART: [art] PUB.Y = 1D9196BB41A8AA7E233BD03F7509D32A2CB3D12329FD0EE7DE9F6889F510E6DF80823E1995D681C7200ABD77E2522760
2,959,577 UART: [art] SIG.R = 687AF5DC6B7C6D66AE99EF363889F6B005D4F0A7D6AB0128853E39B8D6FF103A17BC4B8FFD33CDD94D706FBBD0D461DD
2,966,363 UART: [art] SIG.S = 849C617D709205C7D38E3ADA4A155EAD224C4D14D9CA288C434FE2B744D118491FA332E8A7E79791B768584DB77A3808
2,989,790 UART: Caliptra RT
2,990,043 UART: [state] CFI Enabled
3,098,420 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,161,323 >>> mbox cmd response: failed
4,161,323 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,166,996 UART:
4,167,012 UART: Running Caliptra FMC ...
4,167,420 UART:
4,167,474 UART: [state] CFI Enabled
4,256,635 UART: [art] Extend RT PCRs Done
4,257,063 UART: [art] Lock RT PCRs Done
4,258,196 UART: [art] Populate DV Done
4,266,443 UART: [fht] FMC Alias Private Key: 7
4,267,439 UART: [art] Derive CDI
4,267,719 UART: [art] Store in in slot 0x4
4,353,076 UART: [art] Derive Key Pair
4,353,436 UART: [art] Store priv key in slot 0x5
4,367,060 UART: [art] Derive Key Pair - Done
4,381,725 UART: [art] Signing Cert with AUTHO
4,382,205 UART: RITY.KEYID = 7
4,397,257 UART: [art] Erasing AUTHORITY.KEYID = 7
4,398,022 UART: [art] PUB.X = 08BF09680201A35C77FFCB817C3F67F9D206FEECF0480688BD65420C7AA7072318B6A671374139D68EF91D40E530F6D0
4,404,768 UART: [art] PUB.Y = 1D9196BB41A8AA7E233BD03F7509D32A2CB3D12329FD0EE7DE9F6889F510E6DF80823E1995D681C7200ABD77E2522760
4,411,713 UART: [art] SIG.R = 687AF5DC6B7C6D66AE99EF363889F6B005D4F0A7D6AB0128853E39B8D6FF103A17BC4B8FFD33CDD94D706FBBD0D461DD
4,418,499 UART: [art] SIG.S = 849C617D709205C7D38E3ADA4A155EAD224C4D14D9CA288C434FE2B744D118491FA332E8A7E79791B768584DB77A3808
4,441,994 UART: Caliptra RT
4,442,247 UART: [state] CFI Enabled
4,723,302 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,158,618 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,541 UART: [kat] LMS
1,168,853 UART: [kat] --
1,169,700 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,174,410 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,420 UART: [idev] Erasing UDS.KEYID = 0
1,200,126 UART: [idev] Sha1 KeyId Algorithm
1,208,964 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,671 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,671 UART: [ldev] Erasing FE.KEYID = 1
1,242,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,169 UART: [ldev] --
1,282,611 UART: [fwproc] Wait for Commands...
1,283,228 UART: [fwproc] Recv command 0x46574c44
1,283,961 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,871 >>> mbox cmd response: success
2,775,871 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,777,122 UART: [afmc] ++
2,777,290 UART: [afmc] CDI.KEYID = 6
2,777,653 UART: [afmc] SUBJECT.KEYID = 7
2,778,079 UART: [afmc] AUTHORITY.KEYID = 5
2,813,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,127 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,856 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,739 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,458 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,125 UART: [afmc] --
2,857,099 UART: [cold-reset] --
2,857,685 UART: [state] Locking Datavault
2,858,890 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,494 UART: [state] Locking ICCM
2,860,118 UART: [exit] Launching FMC @ 0x40000130
2,865,447 UART:
2,865,463 UART: Running Caliptra FMC ...
2,865,871 UART:
2,866,014 UART: [state] CFI Enabled
2,876,729 UART: [fht] FMC Alias Private Key: 7
2,984,094 UART: [art] Extend RT PCRs Done
2,984,522 UART: [art] Lock RT PCRs Done
2,985,886 UART: [art] Populate DV Done
2,994,291 UART: [fht] FMC Alias Private Key: 7
2,995,451 UART: [art] Derive CDI
2,995,731 UART: [art] Store in in slot 0x4
3,081,542 UART: [art] Derive Key Pair
3,081,902 UART: [art] Store priv key in slot 0x5
3,094,634 UART: [art] Derive Key Pair - Done
3,109,191 UART: [art] Signing Cert with AUTHO
3,109,671 UART: RITY.KEYID = 7
3,125,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,790 UART: [art] PUB.X = E1343DC3DA19FD14BA5AA49EA76240CAB78CB5258ADA1C0461F11983F00420237F278807634A80357A80886612116DB5
3,132,547 UART: [art] PUB.Y = 55F50DBC9E0D82583A2E88C98C0A183BF194818EB1D7B6954E91776DEB82B51B5E43F89B768383E695D16978FDD3A0F2
3,139,492 UART: [art] SIG.R = 55467CE9D658941CAAA402D80FD8279C04CB32F3D86CA6118422234E1B9D7F7FA28351D8E718A479B7A6BE279EA201A5
3,146,254 UART: [art] SIG.S = A72BB3E83520082F9CC6FB807D44DC4C9B22A460A279CA01E2EB04E5F9D2C47075B30FB38D54EEC7217D1AA0F1B38153
3,169,919 UART: Caliptra RT
3,170,264 UART: [state] CFI Enabled
3,277,925 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,905 UART:
3,279,921 UART: Running Caliptra ROM ...
3,280,329 UART:
3,280,471 UART: [state] CFI Enabled
3,283,189 UART: [state] LifecycleState = Unprovisioned
3,283,844 UART: [state] DebugLocked = No
3,284,504 UART: [state] WD Timer not started. Device not locked for debugging
3,285,818 UART: [kat] SHA2-256
4,089,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,497 UART: [kat] ++
4,093,649 UART: [kat] sha1
4,097,907 UART: [kat] SHA2-256
4,099,847 UART: [kat] SHA2-384
4,102,784 UART: [kat] SHA2-512-ACC
4,104,684 UART: [kat] ECC-384
4,114,693 UART: [kat] HMAC-384Kdf
4,119,325 UART: [kat] LMS
4,367,637 UART: [kat] --
4,368,479 UART: [update-reset] ++
4,457,391 >>> mbox cmd response: failed
4,457,391 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,457,649 UART: ROM Non-Fatal Error: 0x000B001F
4,458,455 UART: [state] Locking Datavault
4,459,393 UART: [state] Locking PCR0, PCR1 and PCR31
4,459,997 UART: [state] Locking ICCM
4,460,647 UART: [exit] Launching FMC @ 0x40000130
4,465,976 UART:
4,465,992 UART: Running Caliptra FMC ...
4,466,400 UART:
4,466,543 UART: [state] CFI Enabled
4,555,318 UART: [art] Extend RT PCRs Done
4,555,746 UART: [art] Lock RT PCRs Done
4,557,151 UART: [art] Populate DV Done
4,565,512 UART: [fht] FMC Alias Private Key: 7
4,566,672 UART: [art] Derive CDI
4,566,952 UART: [art] Store in in slot 0x4
4,652,593 UART: [art] Derive Key Pair
4,652,953 UART: [art] Store priv key in slot 0x5
4,665,993 UART: [art] Derive Key Pair - Done
4,680,808 UART: [art] Signing Cert with AUTHO
4,681,288 UART: RITY.KEYID = 7
4,696,446 UART: [art] Erasing AUTHORITY.KEYID = 7
4,697,211 UART: [art] PUB.X = E1343DC3DA19FD14BA5AA49EA76240CAB78CB5258ADA1C0461F11983F00420237F278807634A80357A80886612116DB5
4,703,968 UART: [art] PUB.Y = 55F50DBC9E0D82583A2E88C98C0A183BF194818EB1D7B6954E91776DEB82B51B5E43F89B768383E695D16978FDD3A0F2
4,710,913 UART: [art] SIG.R = 55467CE9D658941CAAA402D80FD8279C04CB32F3D86CA6118422234E1B9D7F7FA28351D8E718A479B7A6BE279EA201A5
4,717,675 UART: [art] SIG.S = A72BB3E83520082F9CC6FB807D44DC4C9B22A460A279CA01E2EB04E5F9D2C47075B30FB38D54EEC7217D1AA0F1B38153
4,741,460 UART: Caliptra RT
4,741,805 UART: [state] CFI Enabled
5,021,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,023,203 UART:
5,023,219 UART: Running Caliptra ROM ...
5,023,627 UART:
5,023,769 UART: [state] CFI Enabled
5,026,151 UART: [state] LifecycleState = Unprovisioned
5,026,806 UART: [state] DebugLocked = No
5,027,540 UART: [state] WD Timer not started. Device not locked for debugging
5,028,766 UART: [kat] SHA2-256
5,832,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,836,445 UART: [kat] ++
5,836,597 UART: [kat] sha1
5,840,853 UART: [kat] SHA2-256
5,842,793 UART: [kat] SHA2-384
5,845,562 UART: [kat] SHA2-512-ACC
5,847,462 UART: [kat] ECC-384
5,857,195 UART: [kat] HMAC-384Kdf
5,861,829 UART: [kat] LMS
6,110,141 UART: [kat] --
6,110,927 UART: [update-reset] ++
7,425,329 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,426,504 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,576,502 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,845 >>> mbox cmd response: success
2,626,845 <<< Executing mbox cmd 0x46574c44 (99748 bytes) from SoC
2,689,797 UART:
2,689,813 UART: Running Caliptra FMC ...
2,690,221 UART:
2,690,364 UART: [state] CFI Enabled
2,701,127 UART: [fht] FMC Alias Private Key: 7
2,809,532 UART: [art] Extend RT PCRs Done
2,809,960 UART: [art] Lock RT PCRs Done
2,811,676 UART: [art] Populate DV Done
2,819,795 UART: [fht] FMC Alias Private Key: 7
2,820,829 UART: [art] Derive CDI
2,821,109 UART: [art] Store in in slot 0x4
2,906,610 UART: [art] Derive Key Pair
2,906,970 UART: [art] Store priv key in slot 0x5
2,920,414 UART: [art] Derive Key Pair - Done
2,934,979 UART: [art] Signing Cert with AUTHO
2,935,459 UART: RITY.KEYID = 7
2,950,775 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,540 UART: [art] PUB.X = 3056E18CB23850BFB6D90531BED0566ACCEAABD22E1A1D0F7EB23779D36D2B440EDDD394A8DE87E452849E663FB7D408
2,958,314 UART: [art] PUB.Y = 7A9C11B5FCAD7FD1A873D86215C2BD7B5AFA4707D8A4C6043D45727165AC206D229EC4AFC2A3061FD0E033B85C8EF092
2,965,269 UART: [art] SIG.R = B0F6ACA9EBFA7773BD6F216027F7CC2F9DBB0B83A9365FBC5DD80518B301991859845108367CC1CD4685739D598B1E98
2,972,033 UART: [art] SIG.S = 2A4066750A23B956C703FC0BBAE0616EDF33509457F4849C80C4627AAB99DDDE73E1074F9659FE9BEC8C5851B96DE585
2,995,514 UART: Caliptra RT
2,995,859 UART: [state] CFI Enabled
3,103,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,697 >>> mbox cmd response: failed
4,165,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,171,258 UART:
4,171,274 UART: Running Caliptra FMC ...
4,171,682 UART:
4,171,825 UART: [state] CFI Enabled
4,260,784 UART: [art] Extend RT PCRs Done
4,261,212 UART: [art] Lock RT PCRs Done
4,262,581 UART: [art] Populate DV Done
4,270,820 UART: [fht] FMC Alias Private Key: 7
4,271,790 UART: [art] Derive CDI
4,272,070 UART: [art] Store in in slot 0x4
4,357,909 UART: [art] Derive Key Pair
4,358,269 UART: [art] Store priv key in slot 0x5
4,371,397 UART: [art] Derive Key Pair - Done
4,386,292 UART: [art] Signing Cert with AUTHO
4,386,772 UART: RITY.KEYID = 7
4,401,810 UART: [art] Erasing AUTHORITY.KEYID = 7
4,402,575 UART: [art] PUB.X = 3056E18CB23850BFB6D90531BED0566ACCEAABD22E1A1D0F7EB23779D36D2B440EDDD394A8DE87E452849E663FB7D408
4,409,349 UART: [art] PUB.Y = 7A9C11B5FCAD7FD1A873D86215C2BD7B5AFA4707D8A4C6043D45727165AC206D229EC4AFC2A3061FD0E033B85C8EF092
4,416,304 UART: [art] SIG.R = B0F6ACA9EBFA7773BD6F216027F7CC2F9DBB0B83A9365FBC5DD80518B301991859845108367CC1CD4685739D598B1E98
4,423,068 UART: [art] SIG.S = 2A4066750A23B956C703FC0BBAE0616EDF33509457F4849C80C4627AAB99DDDE73E1074F9659FE9BEC8C5851B96DE585
4,447,261 UART: Caliptra RT
4,447,606 UART: [state] CFI Enabled
4,727,571 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,163,010 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,234 UART:
192,594 UART: Running Caliptra ROM ...
193,794 UART:
193,964 UART: [state] CFI Enabled
261,972 UART: [state] LifecycleState = Unprovisioned
263,903 UART: [state] DebugLocked = No
266,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,452 UART: [kat] SHA2-256
441,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,631 UART: [kat] ++
452,121 UART: [kat] sha1
462,945 UART: [kat] SHA2-256
465,645 UART: [kat] SHA2-384
470,766 UART: [kat] SHA2-512-ACC
473,123 UART: [kat] ECC-384
2,763,044 UART: [kat] HMAC-384Kdf
2,795,468 UART: [kat] LMS
3,985,804 UART: [kat] --
3,990,092 UART: [cold-reset] ++
3,991,601 UART: [fht] Storing FHT @ 0x50003400
4,003,301 UART: [idev] ++
4,003,873 UART: [idev] CDI.KEYID = 6
4,004,844 UART: [idev] SUBJECT.KEYID = 7
4,006,065 UART: [idev] UDS.KEYID = 0
4,008,682 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,152,405 UART: [idev] Erasing UDS.KEYID = 0
7,344,082 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,693 UART: [idev] --
7,370,719 UART: [ldev] ++
7,371,296 UART: [ldev] CDI.KEYID = 6
7,372,311 UART: [ldev] SUBJECT.KEYID = 5
7,373,471 UART: [ldev] AUTHORITY.KEYID = 7
7,374,704 UART: [ldev] FE.KEYID = 1
7,419,712 UART: [ldev] Erasing FE.KEYID = 1
10,749,278 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,109 UART: [ldev] --
13,111,636 UART: [fwproc] Waiting for Commands...
13,114,131 UART: [fwproc] Received command 0x46574c44
13,116,323 UART: [fwproc] Received Image of size 114124 bytes
17,172,348 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,437 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,636,351 >>> mbox cmd response: success
17,638,373 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,781,942 UART: [afmc] ++
17,782,589 UART: [afmc] CDI.KEYID = 6
17,783,502 UART: [afmc] SUBJECT.KEYID = 7
17,784,552 UART: [afmc] AUTHORITY.KEYID = 5
21,005,904 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,512 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,760 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,183 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,019 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,535 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,296 UART: [afmc] --
23,377,163 UART: [cold-reset] --
23,380,701 UART: [state] Locking Datavault
23,387,136 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,834 UART: [state] Locking ICCM
23,391,552 UART: [exit] Launching FMC @ 0x40000130
23,399,896 UART:
23,400,132 UART: Running Caliptra FMC ...
23,401,257 UART:
23,401,421 UART: [state] CFI Enabled
23,466,190 UART: [fht] FMC Alias Private Key: 7
25,804,041 UART: [art] Extend RT PCRs Done
25,805,262 UART: [art] Lock RT PCRs Done
25,806,756 UART: [art] Populate DV Done
25,812,277 UART: [fht] FMC Alias Private Key: 7
25,813,922 UART: [art] Derive CDI
25,814,656 UART: [art] Store in in slot 0x4
25,873,988 UART: [art] Derive Key Pair
25,875,028 UART: [art] Store priv key in slot 0x5
29,167,305 UART: [art] Derive Key Pair - Done
29,180,244 UART: [art] Signing Cert with AUTHO
29,181,541 UART: RITY.KEYID = 7
31,479,322 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,834 UART: [art] PUB.X = C6F73D192D38DAC9E6C16198D4501E010C9185BAEB76CA5B223DC41F624FDD53F06650DE0BF9546C4528E7E7FB846048
31,488,093 UART: [art] PUB.Y = 8AFD0F7CD2BCCEB9C05826F25AF909EFDA9CC3E7EC7B2700D8F9F31BF6D7A78DD6FC0E01C579840CE7C50CC59C5524F2
31,495,380 UART: [art] SIG.R = BAAF7550DF052E914CA29CF3C4505072177D6C180D02D8EC99986576FEDE1A267E91B09A02A46E7A1FDC57C9EAE025DE
31,502,775 UART: [art] SIG.S = 2223AAD5D004F7D7CBB82D3598288D2303FC8BAAEEAF1861FF8EF5F6E0F056AA4E01EEAE49FE064C97D371FA322A2203
32,808,064 UART: Caliptra RT
32,808,794 UART: [state] CFI Enabled
32,971,245 UART: [rt] RT listening for mailbox commands...
32,974,579 UART:
32,974,747 UART: Running Caliptra ROM ...
32,975,858 UART:
32,976,018 UART: [state] CFI Enabled
33,036,588 UART: [state] LifecycleState = Unprovisioned
33,038,519 UART: [state] DebugLocked = No
33,040,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,045,000 UART: [kat] SHA2-256
33,214,659 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,225,193 UART: [kat] ++
33,225,673 UART: [kat] sha1
33,237,152 UART: [kat] SHA2-256
33,239,840 UART: [kat] SHA2-384
33,246,592 UART: [kat] SHA2-512-ACC
33,248,946 UART: [kat] ECC-384
35,539,465 UART: [kat] HMAC-384Kdf
35,552,449 UART: [kat] LMS
36,742,774 UART: [kat] --
36,746,623 UART: [update-reset] ++
36,848,951 >>> mbox cmd response: failed
36,850,607 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,994,080 UART: ROM Non-Fatal Error: 0x000B001D
36,995,517 UART: [state] Locking Datavault
36,996,589 UART: [state] Locking PCR0, PCR1 and PCR31
36,998,126 UART: [state] Locking ICCM
36,999,008 UART: [exit] Launching FMC @ 0x40000130
37,000,380 UART:
37,000,536 UART: Running Caliptra FMC ...
37,001,644 UART:
37,001,809 UART: [state] CFI Enabled
37,002,653 UART: [art] Extend RT PCRs Done
37,003,709 UART: [art] Lock RT PCRs Done
37,004,780 UART: [art] Populate DV Done
37,005,735 UART: [fht] FMC Alias Private Key: 7
37,006,971 UART: [art] Derive CDI
37,007,704 UART: [art] Store in in slot 0x4
37,041,511 UART: [art] Derive Key Pair
37,042,553 UART: [art] Store priv key in slot 0x5
40,335,964 UART: [art] Derive Key Pair - Done
40,348,540 UART: [art] Signing Cert with AUTHO
40,349,847 UART: RITY.KEYID = 7
42,638,440 UART: [art] Erasing AUTHORITY.KEYID = 7
42,639,965 UART: [art] PUB.X = C6F73D192D38DAC9E6C16198D4501E010C9185BAEB76CA5B223DC41F624FDD53F06650DE0BF9546C4528E7E7FB846048
42,647,213 UART: [art] PUB.Y = 8AFD0F7CD2BCCEB9C05826F25AF909EFDA9CC3E7EC7B2700D8F9F31BF6D7A78DD6FC0E01C579840CE7C50CC59C5524F2
42,654,465 UART: [art] SIG.R = BAAF7550DF052E914CA29CF3C4505072177D6C180D02D8EC99986576FEDE1A267E91B09A02A46E7A1FDC57C9EAE025DE
42,661,863 UART: [art] SIG.S = 2223AAD5D004F7D7CBB82D3598288D2303FC8BAAEEAF1861FF8EF5F6E0F056AA4E01EEAE49FE064C97D371FA322A2203
43,967,155 UART: Caliptra RT
43,967,854 UART: [state] CFI Enabled
44,318,177 UART: [rt] RT listening for mailbox commands...
44,320,939 UART:
44,321,108 UART: Running Caliptra ROM ...
44,322,222 UART:
44,322,376 UART: [state] CFI Enabled
44,385,863 UART: [state] LifecycleState = Unprovisioned
44,387,847 UART: [state] DebugLocked = No
44,390,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,395,131 UART: [kat] SHA2-256
44,564,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,575,296 UART: [kat] ++
44,575,762 UART: [kat] sha1
44,586,810 UART: [kat] SHA2-256
44,589,501 UART: [kat] SHA2-384
44,595,487 UART: [kat] SHA2-512-ACC
44,597,834 UART: [kat] ECC-384
46,890,645 UART: [kat] HMAC-384Kdf
46,921,064 UART: [kat] LMS
48,111,380 UART: [kat] --
48,116,621 UART: [update-reset] ++
52,250,738 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,253,767 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
52,636,022 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,783,865 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,877,372 >>> mbox cmd response: success
17,879,212 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,565,342 UART:
23,565,753 UART: Running Caliptra FMC ...
23,566,862 UART:
23,567,022 UART: [state] CFI Enabled
23,635,463 UART: [fht] FMC Alias Private Key: 7
25,972,994 UART: [art] Extend RT PCRs Done
25,974,219 UART: [art] Lock RT PCRs Done
25,976,063 UART: [art] Populate DV Done
25,981,581 UART: [fht] FMC Alias Private Key: 7
25,983,261 UART: [art] Derive CDI
25,984,036 UART: [art] Store in in slot 0x4
26,039,705 UART: [art] Derive Key Pair
26,040,714 UART: [art] Store priv key in slot 0x5
29,333,064 UART: [art] Derive Key Pair - Done
29,345,904 UART: [art] Signing Cert with AUTHO
29,347,244 UART: RITY.KEYID = 7
31,642,566 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,093 UART: [art] PUB.X = BA20EA588C786731D96741EFE2AAF3C1A94CDD2BD22360A16E032A21198EE1D8ED1CE5ACBFF2F597993D885BF596D949
31,651,364 UART: [art] PUB.Y = 7BA48FEE857D333C2B98DB138D62BBBE8AAA79529D2747AB37D674A495E6B6286A394000A713227B639E6F46B7FCAD24
31,658,592 UART: [art] SIG.R = 8F8F8605FC79DEFF9BB3E09B10D307D201A56213950C68782EDD1BCB830A2049B4B1578127D151CD4E4437C303CE0597
31,665,992 UART: [art] SIG.S = AA040413CA149289173F07BFAEAD9BDD1A5F1C2C18AB20C951D67CD4363EDA2E1A450AF667B0293F9212D665A43C4038
32,971,464 UART: Caliptra RT
32,972,157 UART: [state] CFI Enabled
33,134,163 UART: [rt] RT listening for mailbox commands...
36,838,845 >>> mbox cmd response: failed
36,840,766 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,984,301 UART:
36,984,634 UART: Running Caliptra FMC ...
36,985,676 UART:
36,985,822 UART: [state] CFI Enabled
36,986,699 UART: [art] Extend RT PCRs Done
36,987,844 UART: [art] Lock RT PCRs Done
36,988,940 UART: [art] Populate DV Done
36,990,064 UART: [fht] FMC Alias Private Key: 7
36,991,310 UART: [art] Derive CDI
36,992,038 UART: [art] Store in in slot 0x4
37,030,713 UART: [art] Derive Key Pair
37,031,760 UART: [art] Store priv key in slot 0x5
40,325,697 UART: [art] Derive Key Pair - Done
40,338,489 UART: [art] Signing Cert with AUTHO
40,339,797 UART: RITY.KEYID = 7
42,627,072 UART: [art] Erasing AUTHORITY.KEYID = 7
42,628,590 UART: [art] PUB.X = BA20EA588C786731D96741EFE2AAF3C1A94CDD2BD22360A16E032A21198EE1D8ED1CE5ACBFF2F597993D885BF596D949
42,635,801 UART: [art] PUB.Y = 7BA48FEE857D333C2B98DB138D62BBBE8AAA79529D2747AB37D674A495E6B6286A394000A713227B639E6F46B7FCAD24
42,643,070 UART: [art] SIG.R = 8F8F8605FC79DEFF9BB3E09B10D307D201A56213950C68782EDD1BCB830A2049B4B1578127D151CD4E4437C303CE0597
42,650,420 UART: [art] SIG.S = AA040413CA149289173F07BFAEAD9BDD1A5F1C2C18AB20C951D67CD4363EDA2E1A450AF667B0293F9212D665A43C4038
43,955,534 UART: Caliptra RT
43,956,248 UART: [state] CFI Enabled
44,290,508 UART: [rt] RT listening for mailbox commands...
52,859,178 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,501 writing to cptra_bootfsm_go
192,648 UART:
193,359 UART: Running Caliptra ROM ...
194,503 UART:
603,697 UART: [state] CFI Enabled
622,921 UART: [state] LifecycleState = Unprovisioned
624,872 UART: [state] DebugLocked = No
627,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
632,793 UART: [kat] SHA2-256
802,539 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
813,063 UART: [kat] ++
813,539 UART: [kat] sha1
824,415 UART: [kat] SHA2-256
827,151 UART: [kat] SHA2-384
833,505 UART: [kat] SHA2-512-ACC
835,846 UART: [kat] ECC-384
3,122,390 UART: [kat] HMAC-384Kdf
3,135,720 UART: [kat] LMS
4,325,792 UART: [kat] --
4,329,217 UART: [cold-reset] ++
4,331,490 UART: [fht] Storing FHT @ 0x50003400
4,342,759 UART: [idev] ++
4,343,324 UART: [idev] CDI.KEYID = 6
4,344,289 UART: [idev] SUBJECT.KEYID = 7
4,345,556 UART: [idev] UDS.KEYID = 0
4,348,548 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,492,152 UART: [idev] Erasing UDS.KEYID = 0
7,630,733 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,635 UART: [idev] --
7,658,765 UART: [ldev] ++
7,659,378 UART: [ldev] CDI.KEYID = 6
7,660,402 UART: [ldev] SUBJECT.KEYID = 5
7,661,506 UART: [ldev] AUTHORITY.KEYID = 7
7,662,790 UART: [ldev] FE.KEYID = 1
7,673,924 UART: [ldev] Erasing FE.KEYID = 1
10,957,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,186 UART: [ldev] --
13,318,616 UART: [fwproc] Waiting for Commands...
13,320,227 UART: [fwproc] Received command 0x46574c44
13,322,438 UART: [fwproc] Received Image of size 114124 bytes
17,377,662 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,852 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,840,460 >>> mbox cmd response: success
17,842,658 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,986,122 UART: [afmc] ++
17,986,765 UART: [afmc] CDI.KEYID = 6
17,987,694 UART: [afmc] SUBJECT.KEYID = 7
17,988,742 UART: [afmc] AUTHORITY.KEYID = 5
21,163,561 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,908 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,176 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,535 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,351 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,825 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,338 UART: [afmc] --
23,528,962 UART: [cold-reset] --
23,532,231 UART: [state] Locking Datavault
23,536,015 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,718 UART: [state] Locking ICCM
23,540,026 UART: [exit] Launching FMC @ 0x40000130
23,548,370 UART:
23,548,607 UART: Running Caliptra FMC ...
23,549,715 UART:
23,549,876 UART: [state] CFI Enabled
23,558,365 UART: [fht] FMC Alias Private Key: 7
25,889,042 UART: [art] Extend RT PCRs Done
25,890,271 UART: [art] Lock RT PCRs Done
25,891,845 UART: [art] Populate DV Done
25,897,258 UART: [fht] FMC Alias Private Key: 7
25,898,820 UART: [art] Derive CDI
25,899,602 UART: [art] Store in in slot 0x4
25,942,046 UART: [art] Derive Key Pair
25,943,058 UART: [art] Store priv key in slot 0x5
29,185,259 UART: [art] Derive Key Pair - Done
29,198,036 UART: [art] Signing Cert with AUTHO
29,199,343 UART: RITY.KEYID = 7
31,478,617 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,123 UART: [art] PUB.X = E82E952186A3E4D4C24D79759DAD42C32B7B250D8B1B698735EAFB10DCE3CB917B29A8EB2FB0A794C6BFA9EEE7EC3E93
31,487,426 UART: [art] PUB.Y = 5F068502D973929535DCE12BC09207F158B26C8F174484C5FC8D7F1C6FD8854FB5928F8E273A430771FF65E768EE38CF
31,494,620 UART: [art] SIG.R = 6C5718BEDA5CA9A68235CB0C9CFF08D33F9A73FA97557831A36AF97FDC17781016BC231168B54A7ACE2FBF91D25A8CFF
31,502,051 UART: [art] SIG.S = E9B683FEFE6D291D62EDF14E5576DD5AEE084C31F948B800B29644314ABABE7DCA56999669EFC78D8401B1DBD91749D5
32,807,572 UART: Caliptra RT
32,808,280 UART: [state] CFI Enabled
32,926,213 UART: [rt] RT listening for mailbox commands...
32,929,385 UART:
32,929,552 UART: Running Caliptra ROM ...
32,930,590 UART:
32,931,012 UART: [state] CFI Enabled
32,942,963 UART: [state] LifecycleState = Unprovisioned
32,944,886 UART: [state] DebugLocked = No
32,946,713 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,951,502 UART: [kat] SHA2-256
33,121,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,131,757 UART: [kat] ++
33,132,214 UART: [kat] sha1
33,142,825 UART: [kat] SHA2-256
33,145,511 UART: [kat] SHA2-384
33,150,359 UART: [kat] SHA2-512-ACC
33,152,707 UART: [kat] ECC-384
35,435,114 UART: [kat] HMAC-384Kdf
35,446,702 UART: [kat] LMS
36,636,749 UART: [kat] --
36,641,253 UART: [update-reset] ++
36,742,281 >>> mbox cmd response: failed
36,744,030 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,887,804 UART: ROM Non-Fatal Error: 0x000B001D
36,889,246 UART: [state] Locking Datavault
36,890,406 UART: [state] Locking PCR0, PCR1 and PCR31
36,891,944 UART: [state] Locking ICCM
36,893,004 UART: [exit] Launching FMC @ 0x40000130
36,894,435 UART:
36,894,592 UART: Running Caliptra FMC ...
36,895,689 UART:
36,895,844 UART: [state] CFI Enabled
36,896,762 UART: [art] Extend RT PCRs Done
36,897,896 UART: [art] Lock RT PCRs Done
36,898,959 UART: [art] Populate DV Done
36,899,988 UART: [fht] FMC Alias Private Key: 7
36,901,320 UART: [art] Derive CDI
36,902,054 UART: [art] Store in in slot 0x4
36,903,226 UART: [art] Derive Key Pair
36,904,216 UART: [art] Store priv key in slot 0x5
40,104,098 UART: [art] Derive Key Pair - Done
40,116,976 UART: [art] Signing Cert with AUTHO
40,118,357 UART: RITY.KEYID = 7
42,397,415 UART: [art] Erasing AUTHORITY.KEYID = 7
42,398,926 UART: [art] PUB.X = E82E952186A3E4D4C24D79759DAD42C32B7B250D8B1B698735EAFB10DCE3CB917B29A8EB2FB0A794C6BFA9EEE7EC3E93
42,406,164 UART: [art] PUB.Y = 5F068502D973929535DCE12BC09207F158B26C8F174484C5FC8D7F1C6FD8854FB5928F8E273A430771FF65E768EE38CF
42,413,399 UART: [art] SIG.R = 6C5718BEDA5CA9A68235CB0C9CFF08D33F9A73FA97557831A36AF97FDC17781016BC231168B54A7ACE2FBF91D25A8CFF
42,420,782 UART: [art] SIG.S = E9B683FEFE6D291D62EDF14E5576DD5AEE084C31F948B800B29644314ABABE7DCA56999669EFC78D8401B1DBD91749D5
43,726,309 UART: Caliptra RT
43,727,019 UART: [state] CFI Enabled
44,018,234 UART: [rt] RT listening for mailbox commands...
44,020,980 UART:
44,021,258 UART: Running Caliptra ROM ...
44,022,375 UART:
44,022,646 UART: [state] CFI Enabled
44,040,044 UART: [state] LifecycleState = Unprovisioned
44,041,992 UART: [state] DebugLocked = No
44,044,288 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,049,835 UART: [kat] SHA2-256
44,219,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,230,060 UART: [kat] ++
44,230,554 UART: [kat] sha1
44,241,873 UART: [kat] SHA2-256
44,244,573 UART: [kat] SHA2-384
44,249,318 UART: [kat] SHA2-512-ACC
44,251,666 UART: [kat] ECC-384
46,537,297 UART: [kat] HMAC-384Kdf
46,547,516 UART: [kat] LMS
47,737,559 UART: [kat] --
47,743,026 UART: [update-reset] ++
51,884,719 UART: [update-reset] Image verified using Vendor ECC Key Index 0
51,888,398 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
52,270,649 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
4,132,703 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,063,709 >>> mbox cmd response: success
18,065,540 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,709,025 UART:
23,709,417 UART: Running Caliptra FMC ...
23,710,513 UART:
23,710,694 UART: [state] CFI Enabled
23,718,850 UART: [fht] FMC Alias Private Key: 7
26,050,329 UART: [art] Extend RT PCRs Done
26,051,566 UART: [art] Lock RT PCRs Done
26,053,224 UART: [art] Populate DV Done
26,058,684 UART: [fht] FMC Alias Private Key: 7
26,060,228 UART: [art] Derive CDI
26,061,174 UART: [art] Store in in slot 0x4
26,103,472 UART: [art] Derive Key Pair
26,104,478 UART: [art] Store priv key in slot 0x5
29,346,411 UART: [art] Derive Key Pair - Done
29,359,513 UART: [art] Signing Cert with AUTHO
29,360,813 UART: RITY.KEYID = 7
31,640,144 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,654 UART: [art] PUB.X = 8D41E3D52DF0D0DE08F7F43D7DAD9E8354CCCD0071C13EA1401B02CE57EB98CBEA3D5719AB11E61171CAF16272719075
31,648,842 UART: [art] PUB.Y = 6D6083FF45C6DF51C47C4A1E4A1C708B79AD341770D9183252EC124433CEE286FB86DC61F558DA82033CAA699A19EB28
31,656,119 UART: [art] SIG.R = C3592C362E0416B7848EEE96EC32EB9F10659A4400FC5A0BE746C3BF9507967B2AB14ABDB97B1D70C5D64BEB9F61FC09
31,663,529 UART: [art] SIG.S = 3BA03D89334EA66D7F09532845CD2A3F9BAFEE267FAFC318ACB31FCB727C971CF85126EA67811D222CADBE7EF0938645
32,968,251 UART: Caliptra RT
32,968,947 UART: [state] CFI Enabled
33,086,761 UART: [rt] RT listening for mailbox commands...
36,723,992 >>> mbox cmd response: failed
36,725,728 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,869,008 UART:
36,869,338 UART: Running Caliptra FMC ...
36,870,415 UART:
36,870,573 UART: [state] CFI Enabled
36,871,498 UART: [art] Extend RT PCRs Done
36,872,637 UART: [art] Lock RT PCRs Done
36,873,705 UART: [art] Populate DV Done
36,874,812 UART: [fht] FMC Alias Private Key: 7
36,876,136 UART: [art] Derive CDI
36,876,891 UART: [art] Store in in slot 0x4
36,878,063 UART: [art] Derive Key Pair
36,879,061 UART: [art] Store priv key in slot 0x5
40,079,696 UART: [art] Derive Key Pair - Done
40,092,529 UART: [art] Signing Cert with AUTHO
40,093,831 UART: RITY.KEYID = 7
42,373,661 UART: [art] Erasing AUTHORITY.KEYID = 7
42,375,166 UART: [art] PUB.X = 8D41E3D52DF0D0DE08F7F43D7DAD9E8354CCCD0071C13EA1401B02CE57EB98CBEA3D5719AB11E61171CAF16272719075
42,382,432 UART: [art] PUB.Y = 6D6083FF45C6DF51C47C4A1E4A1C708B79AD341770D9183252EC124433CEE286FB86DC61F558DA82033CAA699A19EB28
42,389,682 UART: [art] SIG.R = C3592C362E0416B7848EEE96EC32EB9F10659A4400FC5A0BE746C3BF9507967B2AB14ABDB97B1D70C5D64BEB9F61FC09
42,397,034 UART: [art] SIG.S = 3BA03D89334EA66D7F09532845CD2A3F9BAFEE267FAFC318ACB31FCB727C971CF85126EA67811D222CADBE7EF0938645
43,701,913 UART: Caliptra RT
43,702,616 UART: [state] CFI Enabled
43,993,200 UART: [rt] RT listening for mailbox commands...
52,514,168 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
192,665 UART:
193,015 UART: Running Caliptra ROM ...
194,208 UART:
194,358 UART: [state] CFI Enabled
255,715 UART: [state] LifecycleState = Unprovisioned
257,590 UART: [state] DebugLocked = No
259,027 UART: [state] WD Timer not started. Device not locked for debugging
263,339 UART: [kat] SHA2-256
442,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,024 UART: [kat] ++
454,475 UART: [kat] sha1
465,184 UART: [kat] SHA2-256
468,240 UART: [kat] SHA2-384
474,392 UART: [kat] SHA2-512-ACC
477,328 UART: [kat] ECC-384
2,940,527 UART: [kat] HMAC-384Kdf
2,964,063 UART: [kat] LMS
3,493,497 UART: [kat] --
3,496,686 UART: [cold-reset] ++
3,497,602 UART: [fht] FHT @ 0x50003400
3,508,526 UART: [idev] ++
3,509,089 UART: [idev] CDI.KEYID = 6
3,510,060 UART: [idev] SUBJECT.KEYID = 7
3,511,223 UART: [idev] UDS.KEYID = 0
3,514,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,658,348 UART: [idev] Erasing UDS.KEYID = 0
6,016,869 UART: [idev] Sha1 KeyId Algorithm
6,040,594 UART: [idev] --
6,043,942 UART: [ldev] ++
6,044,535 UART: [ldev] CDI.KEYID = 6
6,045,447 UART: [ldev] SUBJECT.KEYID = 5
6,046,607 UART: [ldev] AUTHORITY.KEYID = 7
6,047,795 UART: [ldev] FE.KEYID = 1
6,093,343 UART: [ldev] Erasing FE.KEYID = 1
8,594,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,796 UART: [ldev] --
10,403,650 UART: [fwproc] Wait for Commands...
10,406,887 UART: [fwproc] Recv command 0x46574c44
10,408,930 UART: [fwproc] Recv'd Img size: 114448 bytes
13,815,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,274,381 >>> mbox cmd response: success
14,276,446 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,420,497 UART: [afmc] ++
14,421,124 UART: [afmc] CDI.KEYID = 6
14,422,042 UART: [afmc] SUBJECT.KEYID = 7
14,423,089 UART: [afmc] AUTHORITY.KEYID = 5
16,822,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,545,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,547,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,563,581 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,579,568 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,595,449 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,617,728 UART: [afmc] --
18,621,756 UART: [cold-reset] --
18,626,908 UART: [state] Locking Datavault
18,630,603 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,303 UART: [state] Locking ICCM
18,634,940 UART: [exit] Launching FMC @ 0x40000130
18,643,343 UART:
18,643,645 UART: Running Caliptra FMC ...
18,644,761 UART:
18,644,929 UART: [state] CFI Enabled
18,704,931 UART: [fht] FMC Alias Private Key: 7
20,469,471 UART: [art] Extend RT PCRs Done
20,470,694 UART: [art] Lock RT PCRs Done
20,472,209 UART: [art] Populate DV Done
20,477,564 UART: [fht] FMC Alias Private Key: 7
20,479,300 UART: [art] Derive CDI
20,480,075 UART: [art] Store in in slot 0x4
20,537,265 UART: [art] Derive Key Pair
20,538,278 UART: [art] Store priv key in slot 0x5
23,001,393 UART: [art] Derive Key Pair - Done
23,014,235 UART: [art] Signing Cert with AUTHO
23,015,542 UART: RITY.KEYID = 7
24,727,817 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,310 UART: [art] PUB.X = 17DB637A281EE1A4D8CB61CB5FF3CC3D83B0B627918AA96FC055B91337E9967A5FD997E7BA815783495744BD363F5D44
24,736,620 UART: [art] PUB.Y = DB6BF87FE09C433E6879779DFDDAFEEC296ADCA7C3D18175F9DAC1A86D7C0084269771A044D169E0299AB44E3AB8E84D
24,743,863 UART: [art] SIG.R = 426AFBABD70CC0D7D23EF3090F9ECDFEAA96EACE7E15E677C96EDF59BAE5C7EEFE92D5F11FDAE3E1823DC7B8288D8F46
24,751,302 UART: [art] SIG.S = D2C82181D35913BEC13C7CE6D46553506B7C457C8D144A869F91D4041005EDBEB808911D2CC9EF7ECF6DA403E0FE1EE4
25,730,657 UART: Caliptra RT
25,731,372 UART: [state] CFI Enabled
25,895,812 UART: [rt] RT listening for mailbox commands...
25,898,729 UART:
25,898,894 UART: Running Caliptra ROM ...
25,899,997 UART:
25,900,158 UART: [state] CFI Enabled
25,961,785 UART: [state] LifecycleState = Unprovisioned
25,963,676 UART: [state] DebugLocked = No
25,966,415 UART: [state] WD Timer not started. Device not locked for debugging
25,970,691 UART: [kat] SHA2-256
26,149,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,161,362 UART: [kat] ++
26,161,899 UART: [kat] sha1
26,172,194 UART: [kat] SHA2-256
26,175,212 UART: [kat] SHA2-384
26,181,354 UART: [kat] SHA2-512-ACC
26,184,297 UART: [kat] ECC-384
28,647,617 UART: [kat] HMAC-384Kdf
28,670,636 UART: [kat] LMS
29,200,091 UART: [kat] --
29,205,934 UART: [update-reset] ++
29,247,139 >>> mbox cmd response: failed
29,248,825 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,392,865 UART: ROM Non-Fatal Error: 0x000B001D
29,394,299 UART: [state] Locking Datavault
29,395,454 UART: [state] Locking PCR0, PCR1 and PCR31
29,396,984 UART: [state] Locking ICCM
29,397,863 UART: [exit] Launching FMC @ 0x40000130
29,399,280 UART:
29,399,435 UART: Running Caliptra FMC ...
29,400,529 UART:
29,400,681 UART: [state] CFI Enabled
29,401,598 UART: [art] Extend RT PCRs Done
29,402,733 UART: [art] Lock RT PCRs Done
29,403,795 UART: [art] Populate DV Done
29,404,818 UART: [fht] FMC Alias Private Key: 7
29,406,132 UART: [art] Derive CDI
29,406,867 UART: [art] Store in in slot 0x4
29,434,873 UART: [art] Derive Key Pair
29,435,893 UART: [art] Store priv key in slot 0x5
31,898,408 UART: [art] Derive Key Pair - Done
31,911,618 UART: [art] Signing Cert with AUTHO
31,912,922 UART: RITY.KEYID = 7
33,624,144 UART: [art] Erasing AUTHORITY.KEYID = 7
33,625,652 UART: [art] PUB.X = 17DB637A281EE1A4D8CB61CB5FF3CC3D83B0B627918AA96FC055B91337E9967A5FD997E7BA815783495744BD363F5D44
33,632,942 UART: [art] PUB.Y = DB6BF87FE09C433E6879779DFDDAFEEC296ADCA7C3D18175F9DAC1A86D7C0084269771A044D169E0299AB44E3AB8E84D
33,640,213 UART: [art] SIG.R = 426AFBABD70CC0D7D23EF3090F9ECDFEAA96EACE7E15E677C96EDF59BAE5C7EEFE92D5F11FDAE3E1823DC7B8288D8F46
33,647,619 UART: [art] SIG.S = D2C82181D35913BEC13C7CE6D46553506B7C457C8D144A869F91D4041005EDBEB808911D2CC9EF7ECF6DA403E0FE1EE4
34,626,918 UART: Caliptra RT
34,627,608 UART: [state] CFI Enabled
34,967,118 UART: [rt] RT listening for mailbox commands...
34,969,856 UART:
34,970,105 UART: Running Caliptra ROM ...
34,971,208 UART:
34,971,366 UART: [state] CFI Enabled
35,029,336 UART: [state] LifecycleState = Unprovisioned
35,031,225 UART: [state] DebugLocked = No
35,032,599 UART: [state] WD Timer not started. Device not locked for debugging
35,036,658 UART: [kat] SHA2-256
35,215,792 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
35,227,370 UART: [kat] ++
35,227,909 UART: [kat] sha1
35,238,857 UART: [kat] SHA2-256
35,241,918 UART: [kat] SHA2-384
35,247,840 UART: [kat] SHA2-512-ACC
35,250,786 UART: [kat] ECC-384
37,713,773 UART: [kat] HMAC-384Kdf
37,736,539 UART: [kat] LMS
38,266,003 UART: [kat] --
38,270,616 UART: [update-reset] ++
41,696,668 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
41,700,122 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
42,083,429 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,384,180 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,069,819 >>> mbox cmd response: success
14,071,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,369,606 UART:
18,370,020 UART: Running Caliptra FMC ...
18,371,153 UART:
18,371,316 UART: [state] CFI Enabled
18,435,390 UART: [fht] FMC Alias Private Key: 7
20,199,350 UART: [art] Extend RT PCRs Done
20,200,571 UART: [art] Lock RT PCRs Done
20,202,412 UART: [art] Populate DV Done
20,207,710 UART: [fht] FMC Alias Private Key: 7
20,209,341 UART: [art] Derive CDI
20,210,129 UART: [art] Store in in slot 0x4
20,268,294 UART: [art] Derive Key Pair
20,269,297 UART: [art] Store priv key in slot 0x5
22,732,329 UART: [art] Derive Key Pair - Done
22,745,379 UART: [art] Signing Cert with AUTHO
22,746,677 UART: RITY.KEYID = 7
24,457,774 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,289 UART: [art] PUB.X = 989A592D332DEAB3523297F4812AB9F200B01B5B7A49F9C059A60C6B3A73B7AEF4C07F4A3299A370C57BB296A6B2C9B2
24,466,625 UART: [art] PUB.Y = C418980A16479A4DE20C25F5EA1FF31AF7493F02AF25DD3F485CC8210FAB9ACCD3A15AFB60E1B60B029AFD4F5319EA03
24,473,832 UART: [art] SIG.R = F17F7E462F1C16566AE12C1BC4F09C4656CC70B4F77D83425607FD86B4F8066586B0C4E2D1730D9F1D75C8325F4ED416
24,481,210 UART: [art] SIG.S = 24AC1D80986B75C24782AEF018C7CF5B775A09C409CE182E275E84999DB398825399BBC4E3D3243EEA8094B9795E1049
25,460,550 UART: Caliptra RT
25,461,258 UART: [state] CFI Enabled
25,624,309 UART: [rt] RT listening for mailbox commands...
28,830,885 >>> mbox cmd response: failed
28,832,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,976,896 UART:
28,977,222 UART: Running Caliptra FMC ...
28,978,285 UART:
28,978,438 UART: [state] CFI Enabled
28,979,364 UART: [art] Extend RT PCRs Done
28,980,502 UART: [art] Lock RT PCRs Done
28,981,566 UART: [art] Populate DV Done
28,982,667 UART: [fht] FMC Alias Private Key: 7
28,983,987 UART: [art] Derive CDI
28,984,724 UART: [art] Store in in slot 0x4
29,013,614 UART: [art] Derive Key Pair
29,014,664 UART: [art] Store priv key in slot 0x5
31,477,217 UART: [art] Derive Key Pair - Done
31,489,836 UART: [art] Signing Cert with AUTHO
31,491,166 UART: RITY.KEYID = 7
33,203,416 UART: [art] Erasing AUTHORITY.KEYID = 7
33,204,937 UART: [art] PUB.X = 989A592D332DEAB3523297F4812AB9F200B01B5B7A49F9C059A60C6B3A73B7AEF4C07F4A3299A370C57BB296A6B2C9B2
33,212,172 UART: [art] PUB.Y = C418980A16479A4DE20C25F5EA1FF31AF7493F02AF25DD3F485CC8210FAB9ACCD3A15AFB60E1B60B029AFD4F5319EA03
33,219,459 UART: [art] SIG.R = F17F7E462F1C16566AE12C1BC4F09C4656CC70B4F77D83425607FD86B4F8066586B0C4E2D1730D9F1D75C8325F4ED416
33,226,881 UART: [art] SIG.S = 24AC1D80986B75C24782AEF018C7CF5B775A09C409CE182E275E84999DB398825399BBC4E3D3243EEA8094B9795E1049
34,205,688 UART: Caliptra RT
34,206,376 UART: [state] CFI Enabled
34,550,199 UART: [rt] RT listening for mailbox commands...
41,518,418 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,514 writing to cptra_bootfsm_go
192,830 UART:
193,183 UART: Running Caliptra ROM ...
194,364 UART:
603,892 UART: [state] CFI Enabled
620,090 UART: [state] LifecycleState = Unprovisioned
621,980 UART: [state] DebugLocked = No
624,343 UART: [state] WD Timer not started. Device not locked for debugging
627,467 UART: [kat] SHA2-256
806,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,173 UART: [kat] ++
818,626 UART: [kat] sha1
828,634 UART: [kat] SHA2-256
831,701 UART: [kat] SHA2-384
838,539 UART: [kat] SHA2-512-ACC
841,523 UART: [kat] ECC-384
3,282,928 UART: [kat] HMAC-384Kdf
3,294,140 UART: [kat] LMS
3,823,633 UART: [kat] --
3,827,543 UART: [cold-reset] ++
3,828,505 UART: [fht] FHT @ 0x50003400
3,838,668 UART: [idev] ++
3,839,231 UART: [idev] CDI.KEYID = 6
3,840,247 UART: [idev] SUBJECT.KEYID = 7
3,841,348 UART: [idev] UDS.KEYID = 0
3,844,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,251 UART: [idev] Erasing UDS.KEYID = 0
6,309,355 UART: [idev] Sha1 KeyId Algorithm
6,332,043 UART: [idev] --
6,334,792 UART: [ldev] ++
6,335,363 UART: [ldev] CDI.KEYID = 6
6,336,279 UART: [ldev] SUBJECT.KEYID = 5
6,337,460 UART: [ldev] AUTHORITY.KEYID = 7
6,338,692 UART: [ldev] FE.KEYID = 1
6,348,236 UART: [ldev] Erasing FE.KEYID = 1
8,826,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,161 UART: [ldev] --
10,619,408 UART: [fwproc] Wait for Commands...
10,620,973 UART: [fwproc] Recv command 0x46574c44
10,623,140 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,487,669 >>> mbox cmd response: success
14,489,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,633,642 UART: [afmc] ++
14,634,282 UART: [afmc] CDI.KEYID = 6
14,635,202 UART: [afmc] SUBJECT.KEYID = 7
14,636,312 UART: [afmc] AUTHORITY.KEYID = 5
16,997,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,763 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,626 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,369 UART: [afmc] --
18,793,614 UART: [cold-reset] --
18,798,658 UART: [state] Locking Datavault
18,805,315 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,959 UART: [state] Locking ICCM
18,808,372 UART: [exit] Launching FMC @ 0x40000130
18,816,771 UART:
18,817,005 UART: Running Caliptra FMC ...
18,818,110 UART:
18,818,276 UART: [state] CFI Enabled
18,826,427 UART: [fht] FMC Alias Private Key: 7
20,583,308 UART: [art] Extend RT PCRs Done
20,584,531 UART: [art] Lock RT PCRs Done
20,586,129 UART: [art] Populate DV Done
20,591,597 UART: [fht] FMC Alias Private Key: 7
20,593,243 UART: [art] Derive CDI
20,594,063 UART: [art] Store in in slot 0x4
20,636,935 UART: [art] Derive Key Pair
20,637,981 UART: [art] Store priv key in slot 0x5
23,064,336 UART: [art] Derive Key Pair - Done
23,077,388 UART: [art] Signing Cert with AUTHO
23,078,721 UART: RITY.KEYID = 7
24,784,205 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,708 UART: [art] PUB.X = 1015204E2680D18DD0ED8B50FA2A8638A506159A693A5FE43E2FD777451B7E497F6AE5065B040E9A51AD68979D00D848
24,792,944 UART: [art] PUB.Y = F15EEA2A336473755F33B8AEBF3FFA49D552E3563F1668010A94F6AE9615682F931448E3B13C491F7D663D39AF785AF3
24,800,232 UART: [art] SIG.R = C5D38369D297E6B66F5D8C10E8C6655EB1DEA1002B9D880AE137ECF50E55D24AF7007C8D1632965C4416BE0F2849249C
24,807,572 UART: [art] SIG.S = 0CDDF1FEFF57C1C87471B1D72327D5B1F242C39E18E0C83F623B72D41DD58709776C2AE428EBFD1AE0FACC44E4A734FC
25,785,989 UART: Caliptra RT
25,786,679 UART: [state] CFI Enabled
25,903,531 UART: [rt] RT listening for mailbox commands...
25,906,872 UART:
25,907,122 UART: Running Caliptra ROM ...
25,908,227 UART:
25,908,390 UART: [state] CFI Enabled
25,920,755 UART: [state] LifecycleState = Unprovisioned
25,922,646 UART: [state] DebugLocked = No
25,924,837 UART: [state] WD Timer not started. Device not locked for debugging
25,927,792 UART: [kat] SHA2-256
26,106,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,118,541 UART: [kat] ++
26,119,086 UART: [kat] sha1
26,129,178 UART: [kat] SHA2-256
26,132,227 UART: [kat] SHA2-384
26,138,762 UART: [kat] SHA2-512-ACC
26,141,717 UART: [kat] ECC-384
28,584,114 UART: [kat] HMAC-384Kdf
28,596,382 UART: [kat] LMS
29,125,899 UART: [kat] --
29,130,161 UART: [update-reset] ++
29,169,022 >>> mbox cmd response: failed
29,170,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,314,411 UART: ROM Non-Fatal Error: 0x000B001D
29,315,835 UART: [state] Locking Datavault
29,316,934 UART: [state] Locking PCR0, PCR1 and PCR31
29,318,476 UART: [state] Locking ICCM
29,319,353 UART: [exit] Launching FMC @ 0x40000130
29,320,694 UART:
29,320,838 UART: Running Caliptra FMC ...
29,321,937 UART:
29,322,093 UART: [state] CFI Enabled
29,322,937 UART: [art] Extend RT PCRs Done
29,323,988 UART: [art] Lock RT PCRs Done
29,325,046 UART: [art] Populate DV Done
29,326,026 UART: [fht] FMC Alias Private Key: 7
29,327,570 UART: [art] Derive CDI
29,328,313 UART: [art] Store in in slot 0x4
29,329,402 UART: [art] Derive Key Pair
29,330,340 UART: [art] Store priv key in slot 0x5
31,715,138 UART: [art] Derive Key Pair - Done
31,728,191 UART: [art] Signing Cert with AUTHO
31,729,521 UART: RITY.KEYID = 7
33,435,036 UART: [art] Erasing AUTHORITY.KEYID = 7
33,436,550 UART: [art] PUB.X = 1015204E2680D18DD0ED8B50FA2A8638A506159A693A5FE43E2FD777451B7E497F6AE5065B040E9A51AD68979D00D848
33,443,783 UART: [art] PUB.Y = F15EEA2A336473755F33B8AEBF3FFA49D552E3563F1668010A94F6AE9615682F931448E3B13C491F7D663D39AF785AF3
33,451,065 UART: [art] SIG.R = C5D38369D297E6B66F5D8C10E8C6655EB1DEA1002B9D880AE137ECF50E55D24AF7007C8D1632965C4416BE0F2849249C
33,458,411 UART: [art] SIG.S = 0CDDF1FEFF57C1C87471B1D72327D5B1F242C39E18E0C83F623B72D41DD58709776C2AE428EBFD1AE0FACC44E4A734FC
34,436,892 UART: Caliptra RT
34,437,582 UART: [state] CFI Enabled
34,725,391 UART: [rt] RT listening for mailbox commands...
34,728,158 UART:
34,728,423 UART: Running Caliptra ROM ...
34,729,530 UART:
34,729,742 UART: [state] CFI Enabled
40,327,824 UART: [state] LifecycleState = Unprovisioned
40,329,749 UART: [state] DebugLocked = No
40,332,430 UART: [state] WD Timer not started. Device not locked for debugging
40,336,070 UART: [kat] SHA2-256
40,515,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,526,821 UART: [kat] ++
40,527,394 UART: [kat] sha1
40,537,967 UART: [kat] SHA2-256
40,540,979 UART: [kat] SHA2-384
40,548,043 UART: [kat] SHA2-512-ACC
40,550,991 UART: [kat] ECC-384
42,993,623 UART: [kat] HMAC-384Kdf
43,005,680 UART: [kat] LMS
43,535,212 UART: [kat] --
43,539,003 UART: [update-reset] ++
46,960,713 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,963,649 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
47,346,949 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,700,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,270,714 >>> mbox cmd response: success
14,272,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,522,589 UART:
18,523,069 UART: Running Caliptra FMC ...
18,524,195 UART:
18,524,347 UART: [state] CFI Enabled
18,532,454 UART: [fht] FMC Alias Private Key: 7
20,289,419 UART: [art] Extend RT PCRs Done
20,290,645 UART: [art] Lock RT PCRs Done
20,292,164 UART: [art] Populate DV Done
20,297,877 UART: [fht] FMC Alias Private Key: 7
20,299,571 UART: [art] Derive CDI
20,300,402 UART: [art] Store in in slot 0x4
20,342,893 UART: [art] Derive Key Pair
20,343,895 UART: [art] Store priv key in slot 0x5
22,770,402 UART: [art] Derive Key Pair - Done
22,782,955 UART: [art] Signing Cert with AUTHO
22,784,287 UART: RITY.KEYID = 7
24,489,572 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,083 UART: [art] PUB.X = 377F9A58355D02C23BC8731420408D12E801A5AFA1AEBC45BF02E839EA7061042C03544A9DF43FC8887FC0B71A174C29
24,498,331 UART: [art] PUB.Y = B15E680A2E9013EA9DFD9418ED4B0208196B5081CDAA5DAB3BBEC646C1DFFC115F78A21E633B1CD5D59046B9A58CF844
24,505,636 UART: [art] SIG.R = E976C2F6D7EEF0484E6A7C2A38213CD847EF4D18498A785BB226C1295EDCDC9349BDB044F4056CB74C4BB042483665DB
24,513,034 UART: [art] SIG.S = EF8EA05291895217DD74EF968B368E1DB6DB5882122BC46CDEFA7D9AD8237087F2B3979084E888F23B30740D2FAAAFF6
25,491,417 UART: Caliptra RT
25,492,108 UART: [state] CFI Enabled
25,608,353 UART: [rt] RT listening for mailbox commands...
28,734,152 >>> mbox cmd response: failed
28,736,053 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,879,895 UART:
28,880,207 UART: Running Caliptra FMC ...
28,881,331 UART:
28,881,496 UART: [state] CFI Enabled
28,882,412 UART: [art] Extend RT PCRs Done
28,883,552 UART: [art] Lock RT PCRs Done
28,884,617 UART: [art] Populate DV Done
28,885,720 UART: [fht] FMC Alias Private Key: 7
28,887,034 UART: [art] Derive CDI
28,887,777 UART: [art] Store in in slot 0x4
28,888,948 UART: [art] Derive Key Pair
28,889,866 UART: [art] Store priv key in slot 0x5
31,274,503 UART: [art] Derive Key Pair - Done
31,287,825 UART: [art] Signing Cert with AUTHO
31,289,130 UART: RITY.KEYID = 7
32,994,506 UART: [art] Erasing AUTHORITY.KEYID = 7
32,996,011 UART: [art] PUB.X = 377F9A58355D02C23BC8731420408D12E801A5AFA1AEBC45BF02E839EA7061042C03544A9DF43FC8887FC0B71A174C29
33,003,269 UART: [art] PUB.Y = B15E680A2E9013EA9DFD9418ED4B0208196B5081CDAA5DAB3BBEC646C1DFFC115F78A21E633B1CD5D59046B9A58CF844
33,010,532 UART: [art] SIG.R = E976C2F6D7EEF0484E6A7C2A38213CD847EF4D18498A785BB226C1295EDCDC9349BDB044F4056CB74C4BB042483665DB
33,017,954 UART: [art] SIG.S = EF8EA05291895217DD74EF968B368E1DB6DB5882122BC46CDEFA7D9AD8237087F2B3979084E888F23B30740D2FAAAFF6
33,996,864 UART: Caliptra RT
33,997,562 UART: [state] CFI Enabled
34,293,343 UART: [rt] RT listening for mailbox commands...
47,203,490 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,439,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,735,625 >>> mbox cmd response: success
14,737,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,028,801 UART:
19,029,217 UART: Running Caliptra FMC ...
19,030,580 UART:
19,030,765 UART: [state] CFI Enabled
19,095,466 UART: [fht] FMC Alias Private Key: 7
20,858,729 UART: [art] Extend RT PCRs Done
20,859,962 UART: [art] Lock RT PCRs Done
20,861,611 UART: [art] Populate DV Done
20,867,119 UART: [fht] FMC Alias Private Key: 7
20,868,770 UART: [art] Derive CDI
20,869,848 UART: [art] Store in in slot 0x4
20,927,880 UART: [art] Derive Key Pair
20,928,891 UART: [art] Store priv key in slot 0x5
23,391,605 UART: [art] Derive Key Pair - Done
23,404,607 UART: [art] Signing Cert with AUTHO
23,405,908 UART: RITY.KEYID = 7
25,117,522 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,030 UART: [art] PUB.X = 5BB5EF8D205ACC2F2656087F208500D5DB25C6C316AA0F42D740BEE996A1738BF4652BB7A741BE869BDBA4EEE75F4BD1
25,126,318 UART: [art] PUB.Y = 851F3551C4AA7F134F5B6C4484E9A1D01DA1FCBD4F646BE20835638EE2D273E4840923914A61B465017FF300C6D946BC
25,133,544 UART: [art] SIG.R = 1AC2A12DA6764355E63387700CBC74E3565240880C0418A25C613051B76B0787F6D5FB6F99EAD2E7B6090D6CD0A15E35
25,140,891 UART: [art] SIG.S = 97469E6178EB4E7B6576AF03A09099F78123D2D2676380CF712F223CC64102D62C05CF5DF72A21C8EF3BB2D8D3A38E5E
26,120,134 UART: Caliptra RT
26,120,840 UART: [state] CFI Enabled
26,284,697 UART: [rt] RT listening for mailbox commands...
29,553,969 >>> mbox cmd response: failed
29,555,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,699,692 UART:
29,700,011 UART: Running Caliptra FMC ...
29,701,141 UART:
29,701,308 UART: [state] CFI Enabled
29,702,231 UART: [art] Extend RT PCRs Done
29,703,372 UART: [art] Lock RT PCRs Done
29,704,440 UART: [art] Populate DV Done
29,705,537 UART: [fht] FMC Alias Private Key: 7
29,706,876 UART: [art] Derive CDI
29,707,611 UART: [art] Store in in slot 0x4
29,738,598 UART: [art] Derive Key Pair
29,739,604 UART: [art] Store priv key in slot 0x5
32,202,369 UART: [art] Derive Key Pair - Done
32,215,336 UART: [art] Signing Cert with AUTHO
32,216,644 UART: RITY.KEYID = 7
33,928,502 UART: [art] Erasing AUTHORITY.KEYID = 7
33,930,014 UART: [art] PUB.X = 5BB5EF8D205ACC2F2656087F208500D5DB25C6C316AA0F42D740BEE996A1738BF4652BB7A741BE869BDBA4EEE75F4BD1
33,937,254 UART: [art] PUB.Y = 851F3551C4AA7F134F5B6C4484E9A1D01DA1FCBD4F646BE20835638EE2D273E4840923914A61B465017FF300C6D946BC
33,944,537 UART: [art] SIG.R = 1AC2A12DA6764355E63387700CBC74E3565240880C0418A25C613051B76B0787F6D5FB6F99EAD2E7B6090D6CD0A15E35
33,951,862 UART: [art] SIG.S = 97469E6178EB4E7B6576AF03A09099F78123D2D2676380CF712F223CC64102D62C05CF5DF72A21C8EF3BB2D8D3A38E5E
34,930,902 UART: Caliptra RT
34,931,617 UART: [state] CFI Enabled
35,264,016 UART: [rt] RT listening for mailbox commands...
42,940,289 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,756,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,963,682 >>> mbox cmd response: success
14,966,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,215,230 UART:
19,215,688 UART: Running Caliptra FMC ...
19,216,814 UART:
19,216,978 UART: [state] CFI Enabled
19,224,700 UART: [fht] FMC Alias Private Key: 7
20,981,946 UART: [art] Extend RT PCRs Done
20,983,197 UART: [art] Lock RT PCRs Done
20,984,801 UART: [art] Populate DV Done
20,990,375 UART: [fht] FMC Alias Private Key: 7
20,991,817 UART: [art] Derive CDI
20,992,588 UART: [art] Store in in slot 0x4
21,034,888 UART: [art] Derive Key Pair
21,035,932 UART: [art] Store priv key in slot 0x5
23,462,429 UART: [art] Derive Key Pair - Done
23,475,486 UART: [art] Signing Cert with AUTHO
23,476,785 UART: RITY.KEYID = 7
25,182,405 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,923 UART: [art] PUB.X = A22277C4FD0D21CE274A6026B86EACCE0BD01BAEB7289E601C5E1950B188B87A6269EBF285D8E20FC416D2E8EAEF1CE3
25,191,229 UART: [art] PUB.Y = 4688AB94543B243E046F14DA1594775BCE38157AF1456473D59338FFE853DF6B08BD8D58F6F099429E95C2621EBC40E9
25,198,488 UART: [art] SIG.R = 89AA96C89E9BEA38A734E44B5DDBA72D605BB1F037BCAA7D6D7F34D8BC772655CBC8E194866EC421A9C382C74CC37DC9
25,205,884 UART: [art] SIG.S = 5A064F643B89F54D4D9FF6D0025BD42D7B0C95E8DC20C9CCA408B782EB95780D7B04C9ECE15E330A1BAF8E21E30219FE
26,184,680 UART: Caliptra RT
26,185,382 UART: [state] CFI Enabled
26,302,723 UART: [rt] RT listening for mailbox commands...
29,485,296 >>> mbox cmd response: failed
29,487,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,630,816 UART:
29,631,165 UART: Running Caliptra FMC ...
29,632,209 UART:
29,632,358 UART: [state] CFI Enabled
29,633,288 UART: [art] Extend RT PCRs Done
29,634,430 UART: [art] Lock RT PCRs Done
29,635,494 UART: [art] Populate DV Done
29,636,605 UART: [fht] FMC Alias Private Key: 7
29,637,927 UART: [art] Derive CDI
29,638,664 UART: [art] Store in in slot 0x4
29,639,829 UART: [art] Derive Key Pair
29,640,819 UART: [art] Store priv key in slot 0x5
32,026,796 UART: [art] Derive Key Pair - Done
32,039,744 UART: [art] Signing Cert with AUTHO
32,041,059 UART: RITY.KEYID = 7
33,746,459 UART: [art] Erasing AUTHORITY.KEYID = 7
33,747,982 UART: [art] PUB.X = A22277C4FD0D21CE274A6026B86EACCE0BD01BAEB7289E601C5E1950B188B87A6269EBF285D8E20FC416D2E8EAEF1CE3
33,755,245 UART: [art] PUB.Y = 4688AB94543B243E046F14DA1594775BCE38157AF1456473D59338FFE853DF6B08BD8D58F6F099429E95C2621EBC40E9
33,762,507 UART: [art] SIG.R = 89AA96C89E9BEA38A734E44B5DDBA72D605BB1F037BCAA7D6D7F34D8BC772655CBC8E194866EC421A9C382C74CC37DC9
33,769,918 UART: [art] SIG.S = 5A064F643B89F54D4D9FF6D0025BD42D7B0C95E8DC20C9CCA408B782EB95780D7B04C9ECE15E330A1BAF8E21E30219FE
34,748,791 UART: Caliptra RT
34,749,484 UART: [state] CFI Enabled
35,039,805 UART: [rt] RT listening for mailbox commands...
47,900,913 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,241 UART: [kat] SHA2-256
882,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,287 UART: [kat] ++
886,439 UART: [kat] sha1
890,669 UART: [kat] SHA2-256
892,607 UART: [kat] SHA2-384
895,334 UART: [kat] SHA2-512-ACC
897,235 UART: [kat] ECC-384
902,820 UART: [kat] HMAC-384Kdf
907,584 UART: [kat] LMS
1,475,780 UART: [kat] --
1,476,937 UART: [cold-reset] ++
1,477,393 UART: [fht] Storing FHT @ 0x50003400
1,480,248 UART: [idev] ++
1,480,416 UART: [idev] CDI.KEYID = 6
1,480,776 UART: [idev] SUBJECT.KEYID = 7
1,481,200 UART: [idev] UDS.KEYID = 0
1,481,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,752 UART: [idev] Erasing UDS.KEYID = 0
1,505,250 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,046 UART: [idev] --
1,515,193 UART: [ldev] ++
1,515,361 UART: [ldev] CDI.KEYID = 6
1,515,724 UART: [ldev] SUBJECT.KEYID = 5
1,516,150 UART: [ldev] AUTHORITY.KEYID = 7
1,516,613 UART: [ldev] FE.KEYID = 1
1,521,647 UART: [ldev] Erasing FE.KEYID = 1
1,547,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,600 UART: [ldev] --
1,586,113 UART: [fwproc] Waiting for Commands...
1,586,756 UART: [fwproc] Received command 0x46574c44
1,587,547 UART: [fwproc] Received Image of size 114448 bytes
2,886,754 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,200 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,552 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,553 >>> mbox cmd response: success
3,078,553 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,079,751 UART: [afmc] ++
3,079,919 UART: [afmc] CDI.KEYID = 6
3,080,281 UART: [afmc] SUBJECT.KEYID = 7
3,080,706 UART: [afmc] AUTHORITY.KEYID = 5
3,115,775 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,509 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,289 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,902 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,592 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,489 UART: [afmc] --
3,158,479 UART: [cold-reset] --
3,159,599 UART: [state] Locking Datavault
3,160,524 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,128 UART: [state] Locking ICCM
3,161,732 UART: [exit] Launching FMC @ 0x40000130
3,167,061 UART:
3,167,077 UART: Running Caliptra FMC ...
3,167,485 UART:
3,167,539 UART: [state] CFI Enabled
3,177,520 UART: [fht] FMC Alias Private Key: 7
3,285,555 UART: [art] Extend RT PCRs Done
3,285,983 UART: [art] Lock RT PCRs Done
3,287,335 UART: [art] Populate DV Done
3,295,232 UART: [fht] FMC Alias Private Key: 7
3,296,322 UART: [art] Derive CDI
3,296,602 UART: [art] Store in in slot 0x4
3,382,427 UART: [art] Derive Key Pair
3,382,787 UART: [art] Store priv key in slot 0x5
3,395,897 UART: [art] Derive Key Pair - Done
3,410,766 UART: [art] Signing Cert with AUTHO
3,411,246 UART: RITY.KEYID = 7
3,426,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,601 UART: [art] PUB.X = 062A77254D80E5C697412569D71F7D8547870147C5FB07DCD89C7F600808A3D6CF5888EF90907BD5F61F846C0397FE22
3,434,347 UART: [art] PUB.Y = 14F85457E31F0312EC40D10B766FF9DA6BE8C357AFEC5CCFB728AB6840A45A9EE397B9F2E8B47B70494AD307BF9A76B3
3,441,304 UART: [art] SIG.R = 16785EFC6C6ECE898A9A3127605CA685F95705DAC7E453843838E6493657CCECAF64C62FFCD285FAE23C0810221D4EDB
3,448,078 UART: [art] SIG.S = 90EFB7E0548B0AD131D5DD45C971B2D09F9982249E58930F602055AA70199DAFE442002D343EE04B0AAA51CAF587B93B
3,471,484 UART: Caliptra RT
3,471,737 UART: [state] CFI Enabled
3,579,530 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,607 UART:
3,581,623 UART: Running Caliptra ROM ...
3,582,031 UART:
3,582,085 UART: [state] CFI Enabled
3,584,343 UART: [state] LifecycleState = Unprovisioned
3,584,998 UART: [state] DebugLocked = No
3,585,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,587,337 UART: [kat] SHA2-256
4,381,268 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,385,383 UART: [kat] ++
4,385,535 UART: [kat] sha1
4,389,633 UART: [kat] SHA2-256
4,391,571 UART: [kat] SHA2-384
4,394,316 UART: [kat] SHA2-512-ACC
4,396,216 UART: [kat] ECC-384
4,401,941 UART: [kat] HMAC-384Kdf
4,406,569 UART: [kat] LMS
4,974,765 UART: [kat] --
4,975,498 UART: [update-reset] ++
5,013,117 >>> mbox cmd response: failed
5,013,117 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,013,363 UART: ROM Non-Fatal Error: 0x000B001D
5,014,211 UART: [state] Locking Datavault
5,015,005 UART: [state] Locking PCR0, PCR1 and PCR31
5,015,609 UART: [state] Locking ICCM
5,016,079 UART: [exit] Launching FMC @ 0x40000130
5,021,408 UART:
5,021,424 UART: Running Caliptra FMC ...
5,021,832 UART:
5,021,886 UART: [state] CFI Enabled
5,110,877 UART: [art] Extend RT PCRs Done
5,111,305 UART: [art] Lock RT PCRs Done
5,112,810 UART: [art] Populate DV Done
5,120,999 UART: [fht] FMC Alias Private Key: 7
5,121,997 UART: [art] Derive CDI
5,122,277 UART: [art] Store in in slot 0x4
5,207,908 UART: [art] Derive Key Pair
5,208,268 UART: [art] Store priv key in slot 0x5
5,221,160 UART: [art] Derive Key Pair - Done
5,235,569 UART: [art] Signing Cert with AUTHO
5,236,049 UART: RITY.KEYID = 7
5,251,093 UART: [art] Erasing AUTHORITY.KEYID = 7
5,251,858 UART: [art] PUB.X = 062A77254D80E5C697412569D71F7D8547870147C5FB07DCD89C7F600808A3D6CF5888EF90907BD5F61F846C0397FE22
5,258,604 UART: [art] PUB.Y = 14F85457E31F0312EC40D10B766FF9DA6BE8C357AFEC5CCFB728AB6840A45A9EE397B9F2E8B47B70494AD307BF9A76B3
5,265,561 UART: [art] SIG.R = 16785EFC6C6ECE898A9A3127605CA685F95705DAC7E453843838E6493657CCECAF64C62FFCD285FAE23C0810221D4EDB
5,272,335 UART: [art] SIG.S = 90EFB7E0548B0AD131D5DD45C971B2D09F9982249E58930F602055AA70199DAFE442002D343EE04B0AAA51CAF587B93B
5,296,383 UART: Caliptra RT
5,296,636 UART: [state] CFI Enabled
5,578,275 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,580,077 UART:
5,580,093 UART: Running Caliptra ROM ...
5,580,501 UART:
5,580,555 UART: [state] CFI Enabled
5,583,267 UART: [state] LifecycleState = Unprovisioned
5,583,922 UART: [state] DebugLocked = No
5,584,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,586,091 UART: [kat] SHA2-256
6,380,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,384,137 UART: [kat] ++
6,384,289 UART: [kat] sha1
6,388,529 UART: [kat] SHA2-256
6,390,467 UART: [kat] SHA2-384
6,393,184 UART: [kat] SHA2-512-ACC
6,395,084 UART: [kat] ECC-384
6,400,599 UART: [kat] HMAC-384Kdf
6,405,295 UART: [kat] LMS
6,973,491 UART: [kat] --
6,974,450 UART: [update-reset] ++
8,309,173 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,310,465 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,460,515 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,823 >>> mbox cmd response: success
2,928,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,989,639 UART:
2,989,655 UART: Running Caliptra FMC ...
2,990,063 UART:
2,990,117 UART: [state] CFI Enabled
3,000,484 UART: [fht] FMC Alias Private Key: 7
3,108,359 UART: [art] Extend RT PCRs Done
3,108,787 UART: [art] Lock RT PCRs Done
3,110,341 UART: [art] Populate DV Done
3,118,672 UART: [fht] FMC Alias Private Key: 7
3,119,838 UART: [art] Derive CDI
3,120,118 UART: [art] Store in in slot 0x4
3,205,839 UART: [art] Derive Key Pair
3,206,199 UART: [art] Store priv key in slot 0x5
3,219,567 UART: [art] Derive Key Pair - Done
3,234,334 UART: [art] Signing Cert with AUTHO
3,234,814 UART: RITY.KEYID = 7
3,250,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,937 UART: [art] PUB.X = F9DBBE84315077F9ACF3A126A813AE77A2833D5BCC4DCDD88949EDC49397382F5406EEA7A6EB16C835B670E7ACD6B9A9
3,257,722 UART: [art] PUB.Y = 4F2FE0F3AD85F1D660D2CC697D0C0D39154267628EFF6A9C1A3367DA6D71385AE521F8CD2833B692391B67ED400883A8
3,264,667 UART: [art] SIG.R = 1F9EC510C48AC74B87E3BD5062DB81AC60038FA1A693ADEA8E65EBB026470B2D41AEAB00EE5899C1F165E323A30668DA
3,271,422 UART: [art] SIG.S = AED4B81C29D206927B53B8C5B8D42DF3DDF161FF0FA645E801E695FB084A02303242EB5E85C507D8AE1639CA189F0529
3,295,354 UART: Caliptra RT
3,295,607 UART: [state] CFI Enabled
3,403,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,720,558 >>> mbox cmd response: failed
4,720,558 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,726,291 UART:
4,726,307 UART: Running Caliptra FMC ...
4,726,715 UART:
4,726,769 UART: [state] CFI Enabled
4,815,760 UART: [art] Extend RT PCRs Done
4,816,188 UART: [art] Lock RT PCRs Done
4,817,565 UART: [art] Populate DV Done
4,825,720 UART: [fht] FMC Alias Private Key: 7
4,826,764 UART: [art] Derive CDI
4,827,044 UART: [art] Store in in slot 0x4
4,912,987 UART: [art] Derive Key Pair
4,913,347 UART: [art] Store priv key in slot 0x5
4,926,625 UART: [art] Derive Key Pair - Done
4,941,082 UART: [art] Signing Cert with AUTHO
4,941,562 UART: RITY.KEYID = 7
4,956,332 UART: [art] Erasing AUTHORITY.KEYID = 7
4,957,097 UART: [art] PUB.X = F9DBBE84315077F9ACF3A126A813AE77A2833D5BCC4DCDD88949EDC49397382F5406EEA7A6EB16C835B670E7ACD6B9A9
4,963,882 UART: [art] PUB.Y = 4F2FE0F3AD85F1D660D2CC697D0C0D39154267628EFF6A9C1A3367DA6D71385AE521F8CD2833B692391B67ED400883A8
4,970,827 UART: [art] SIG.R = 1F9EC510C48AC74B87E3BD5062DB81AC60038FA1A693ADEA8E65EBB026470B2D41AEAB00EE5899C1F165E323A30668DA
4,977,582 UART: [art] SIG.S = AED4B81C29D206927B53B8C5B8D42DF3DDF161FF0FA645E801E695FB084A02303242EB5E85C507D8AE1639CA189F0529
5,001,584 UART: Caliptra RT
5,001,837 UART: [state] CFI Enabled
5,282,832 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,047,666 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,104 UART: [kat] SHA2-256
882,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,150 UART: [kat] ++
886,302 UART: [kat] sha1
890,616 UART: [kat] SHA2-256
892,554 UART: [kat] SHA2-384
895,271 UART: [kat] SHA2-512-ACC
897,172 UART: [kat] ECC-384
902,761 UART: [kat] HMAC-384Kdf
907,445 UART: [kat] LMS
1,475,641 UART: [kat] --
1,476,340 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,643 UART: [idev] ++
1,479,811 UART: [idev] CDI.KEYID = 6
1,480,171 UART: [idev] SUBJECT.KEYID = 7
1,480,595 UART: [idev] UDS.KEYID = 0
1,480,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,551 UART: [idev] Erasing UDS.KEYID = 0
1,505,323 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,907 UART: [idev] --
1,515,044 UART: [ldev] ++
1,515,212 UART: [ldev] CDI.KEYID = 6
1,515,575 UART: [ldev] SUBJECT.KEYID = 5
1,516,001 UART: [ldev] AUTHORITY.KEYID = 7
1,516,464 UART: [ldev] FE.KEYID = 1
1,521,464 UART: [ldev] Erasing FE.KEYID = 1
1,546,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,657 UART: [ldev] --
1,586,012 UART: [fwproc] Waiting for Commands...
1,586,637 UART: [fwproc] Received command 0x46574c44
1,587,428 UART: [fwproc] Received Image of size 114448 bytes
2,886,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,813 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,165 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,202 >>> mbox cmd response: success
3,080,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,081,240 UART: [afmc] ++
3,081,408 UART: [afmc] CDI.KEYID = 6
3,081,770 UART: [afmc] SUBJECT.KEYID = 7
3,082,195 UART: [afmc] AUTHORITY.KEYID = 5
3,117,258 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,494 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,887 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,577 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,634 UART: [afmc] --
3,160,730 UART: [cold-reset] --
3,161,568 UART: [state] Locking Datavault
3,162,865 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,469 UART: [state] Locking ICCM
3,164,075 UART: [exit] Launching FMC @ 0x40000130
3,169,404 UART:
3,169,420 UART: Running Caliptra FMC ...
3,169,828 UART:
3,169,971 UART: [state] CFI Enabled
3,180,344 UART: [fht] FMC Alias Private Key: 7
3,287,649 UART: [art] Extend RT PCRs Done
3,288,077 UART: [art] Lock RT PCRs Done
3,289,541 UART: [art] Populate DV Done
3,297,750 UART: [fht] FMC Alias Private Key: 7
3,298,690 UART: [art] Derive CDI
3,298,970 UART: [art] Store in in slot 0x4
3,384,649 UART: [art] Derive Key Pair
3,385,009 UART: [art] Store priv key in slot 0x5
3,398,355 UART: [art] Derive Key Pair - Done
3,413,231 UART: [art] Signing Cert with AUTHO
3,413,711 UART: RITY.KEYID = 7
3,429,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,888 UART: [art] PUB.X = 7AE7B2A2783D7F3667C0AF414F03C3D0F03CD78297F0CE6AD29DDCBB8C0F61017462F4218B57D1F0E74D1C5C693CF336
3,436,661 UART: [art] PUB.Y = 274BC5A9330D9B15F74165DF86779F2919B7933DC39A79FA976311F67B82C7E9A6197C7B7FA1319E8CDA49D956B1665A
3,443,608 UART: [art] SIG.R = B4BEF3A9029C15DCCE4BD41E9A04CD3C23BFB3C58A43FCFE0E66F4C27C8ED587616FB17AD035E2178E511A79D45F406C
3,450,391 UART: [art] SIG.S = 6B975A00D36046AD693BEDA470BAFBFA722EE778FED7ABE38808D009B7083C0073961DC138B214ACCC3A9997F0EE9EF2
3,474,295 UART: Caliptra RT
3,474,640 UART: [state] CFI Enabled
3,582,375 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,066 UART:
3,584,082 UART: Running Caliptra ROM ...
3,584,490 UART:
3,584,631 UART: [state] CFI Enabled
3,588,163 UART: [state] LifecycleState = Unprovisioned
3,588,818 UART: [state] DebugLocked = No
3,589,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,591,063 UART: [kat] SHA2-256
4,384,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,109 UART: [kat] ++
4,389,261 UART: [kat] sha1
4,393,567 UART: [kat] SHA2-256
4,395,505 UART: [kat] SHA2-384
4,398,202 UART: [kat] SHA2-512-ACC
4,400,102 UART: [kat] ECC-384
4,405,631 UART: [kat] HMAC-384Kdf
4,410,279 UART: [kat] LMS
4,978,475 UART: [kat] --
4,979,546 UART: [update-reset] ++
5,016,939 >>> mbox cmd response: failed
5,016,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,017,295 UART: ROM Non-Fatal Error: 0x000B001D
5,018,051 UART: [state] Locking Datavault
5,018,889 UART: [state] Locking PCR0, PCR1 and PCR31
5,019,493 UART: [state] Locking ICCM
5,020,093 UART: [exit] Launching FMC @ 0x40000130
5,025,422 UART:
5,025,438 UART: Running Caliptra FMC ...
5,025,846 UART:
5,025,989 UART: [state] CFI Enabled
5,114,896 UART: [art] Extend RT PCRs Done
5,115,324 UART: [art] Lock RT PCRs Done
5,116,375 UART: [art] Populate DV Done
5,124,612 UART: [fht] FMC Alias Private Key: 7
5,125,784 UART: [art] Derive CDI
5,126,064 UART: [art] Store in in slot 0x4
5,211,779 UART: [art] Derive Key Pair
5,212,139 UART: [art] Store priv key in slot 0x5
5,225,575 UART: [art] Derive Key Pair - Done
5,240,443 UART: [art] Signing Cert with AUTHO
5,240,923 UART: RITY.KEYID = 7
5,255,717 UART: [art] Erasing AUTHORITY.KEYID = 7
5,256,482 UART: [art] PUB.X = 7AE7B2A2783D7F3667C0AF414F03C3D0F03CD78297F0CE6AD29DDCBB8C0F61017462F4218B57D1F0E74D1C5C693CF336
5,263,255 UART: [art] PUB.Y = 274BC5A9330D9B15F74165DF86779F2919B7933DC39A79FA976311F67B82C7E9A6197C7B7FA1319E8CDA49D956B1665A
5,270,202 UART: [art] SIG.R = B4BEF3A9029C15DCCE4BD41E9A04CD3C23BFB3C58A43FCFE0E66F4C27C8ED587616FB17AD035E2178E511A79D45F406C
5,276,985 UART: [art] SIG.S = 6B975A00D36046AD693BEDA470BAFBFA722EE778FED7ABE38808D009B7083C0073961DC138B214ACCC3A9997F0EE9EF2
5,300,841 UART: Caliptra RT
5,301,186 UART: [state] CFI Enabled
5,583,235 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,585,021 UART:
5,585,037 UART: Running Caliptra ROM ...
5,585,445 UART:
5,585,586 UART: [state] CFI Enabled
5,588,066 UART: [state] LifecycleState = Unprovisioned
5,588,721 UART: [state] DebugLocked = No
5,589,351 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,590,970 UART: [kat] SHA2-256
6,384,901 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,389,016 UART: [kat] ++
6,389,168 UART: [kat] sha1
6,393,382 UART: [kat] SHA2-256
6,395,320 UART: [kat] SHA2-384
6,398,201 UART: [kat] SHA2-512-ACC
6,400,101 UART: [kat] ECC-384
6,405,816 UART: [kat] HMAC-384Kdf
6,410,288 UART: [kat] LMS
6,978,484 UART: [kat] --
6,979,295 UART: [update-reset] ++
8,314,388 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,315,584 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,465,634 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,928 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,074 >>> mbox cmd response: success
2,930,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,992,084 UART:
2,992,100 UART: Running Caliptra FMC ...
2,992,508 UART:
2,992,651 UART: [state] CFI Enabled
3,003,212 UART: [fht] FMC Alias Private Key: 7
3,111,495 UART: [art] Extend RT PCRs Done
3,111,923 UART: [art] Lock RT PCRs Done
3,113,533 UART: [art] Populate DV Done
3,121,820 UART: [fht] FMC Alias Private Key: 7
3,122,968 UART: [art] Derive CDI
3,123,248 UART: [art] Store in in slot 0x4
3,209,027 UART: [art] Derive Key Pair
3,209,387 UART: [art] Store priv key in slot 0x5
3,223,071 UART: [art] Derive Key Pair - Done
3,237,495 UART: [art] Signing Cert with AUTHO
3,237,975 UART: RITY.KEYID = 7
3,253,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,046 UART: [art] PUB.X = 0DDD403E848E3A64EB6C77B205DA05E861A334B29ADF25CE840FFBE162886021BAF19B3D19A97C5B3D35B08DB39C7B03
3,260,815 UART: [art] PUB.Y = EBDE7FD128016BFA129BDCF99615EAA5E8E0E074B43B0B61B6EFB84A4BA8D8989ACB5604402665E21B5B63E758FC9730
3,267,772 UART: [art] SIG.R = CD452996C97EC49FFB4D1D0965E919E66EC5233173ABA068E5B924FBECABE7FB3F88EAFEDDF4C7C9BE3049C683565B95
3,274,561 UART: [art] SIG.S = E4D48A05D73BF5A5B482EDEEBE93E11DB11A08C541343E248C1DD495B981976A89457907D9DC422078FDE1887388E556
3,298,141 UART: Caliptra RT
3,298,486 UART: [state] CFI Enabled
3,406,274 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,723,773 >>> mbox cmd response: failed
4,723,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,729,456 UART:
4,729,472 UART: Running Caliptra FMC ...
4,729,880 UART:
4,730,023 UART: [state] CFI Enabled
4,818,982 UART: [art] Extend RT PCRs Done
4,819,410 UART: [art] Lock RT PCRs Done
4,820,665 UART: [art] Populate DV Done
4,828,896 UART: [fht] FMC Alias Private Key: 7
4,829,852 UART: [art] Derive CDI
4,830,132 UART: [art] Store in in slot 0x4
4,916,097 UART: [art] Derive Key Pair
4,916,457 UART: [art] Store priv key in slot 0x5
4,929,565 UART: [art] Derive Key Pair - Done
4,943,869 UART: [art] Signing Cert with AUTHO
4,944,349 UART: RITY.KEYID = 7
4,959,491 UART: [art] Erasing AUTHORITY.KEYID = 7
4,960,256 UART: [art] PUB.X = 0DDD403E848E3A64EB6C77B205DA05E861A334B29ADF25CE840FFBE162886021BAF19B3D19A97C5B3D35B08DB39C7B03
4,967,025 UART: [art] PUB.Y = EBDE7FD128016BFA129BDCF99615EAA5E8E0E074B43B0B61B6EFB84A4BA8D8989ACB5604402665E21B5B63E758FC9730
4,973,982 UART: [art] SIG.R = CD452996C97EC49FFB4D1D0965E919E66EC5233173ABA068E5B924FBECABE7FB3F88EAFEDDF4C7C9BE3049C683565B95
4,980,771 UART: [art] SIG.S = E4D48A05D73BF5A5B482EDEEBE93E11DB11A08C541343E248C1DD495B981976A89457907D9DC422078FDE1887388E556
5,004,731 UART: Caliptra RT
5,005,076 UART: [state] CFI Enabled
5,289,162 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,054,355 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
893,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,423 UART: [kat] ++
897,575 UART: [kat] sha1
901,839 UART: [kat] SHA2-256
903,779 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
917,964 UART: [kat] HMAC-384Kdf
922,404 UART: [kat] LMS
1,170,732 UART: [kat] --
1,171,777 UART: [cold-reset] ++
1,172,343 UART: [fht] FHT @ 0x50003400
1,174,834 UART: [idev] ++
1,175,002 UART: [idev] CDI.KEYID = 6
1,175,362 UART: [idev] SUBJECT.KEYID = 7
1,175,786 UART: [idev] UDS.KEYID = 0
1,176,131 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,704 UART: [idev] Erasing UDS.KEYID = 0
1,200,727 UART: [idev] Sha1 KeyId Algorithm
1,209,155 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,768 UART: [ldev] SUBJECT.KEYID = 5
1,211,194 UART: [ldev] AUTHORITY.KEYID = 7
1,211,657 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,211 UART: [ldev] --
1,281,524 UART: [fwproc] Wait for Commands...
1,282,156 UART: [fwproc] Recv command 0x46574c44
1,282,884 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,099 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,403 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,418 >>> mbox cmd response: success
2,774,418 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,775,550 UART: [afmc] ++
2,775,718 UART: [afmc] CDI.KEYID = 6
2,776,080 UART: [afmc] SUBJECT.KEYID = 7
2,776,505 UART: [afmc] AUTHORITY.KEYID = 5
2,812,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,253 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,981 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,866 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,585 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,549 UART: [afmc] --
2,855,477 UART: [cold-reset] --
2,856,233 UART: [state] Locking Datavault
2,857,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,000 UART: [state] Locking ICCM
2,858,564 UART: [exit] Launching FMC @ 0x40000130
2,863,893 UART:
2,863,909 UART: Running Caliptra FMC ...
2,864,317 UART:
2,864,371 UART: [state] CFI Enabled
2,874,766 UART: [fht] FMC Alias Private Key: 7
2,982,531 UART: [art] Extend RT PCRs Done
2,982,959 UART: [art] Lock RT PCRs Done
2,984,495 UART: [art] Populate DV Done
2,992,792 UART: [fht] FMC Alias Private Key: 7
2,993,920 UART: [art] Derive CDI
2,994,200 UART: [art] Store in in slot 0x4
3,079,607 UART: [art] Derive Key Pair
3,079,967 UART: [art] Store priv key in slot 0x5
3,093,269 UART: [art] Derive Key Pair - Done
3,108,090 UART: [art] Signing Cert with AUTHO
3,108,570 UART: RITY.KEYID = 7
3,123,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,545 UART: [art] PUB.X = 5DF3796898B859746C09B249EE5305691B56382D6C1DCEDDA4F62F82140F153B9B0706F9ADC27BB5E4A0F4791E8AF765
3,131,304 UART: [art] PUB.Y = D892D177763059227B47FEA68A3914A091AB156BEF1CFB4637C184481754B09AB9676B369FD0CA8E96C8312D5340BAED
3,138,256 UART: [art] SIG.R = B2B995BF53DA042D5CDDE2001D9973F7A7FE4AA2221F066B8E52A41B95F102AFEFB67CFE2814E11F602E679C3841F4F3
3,145,009 UART: [art] SIG.S = 61E947A3301194D743768319B4D00056429FC59C1AAEC86B2CB3A7657B3CBDC711C3C845AF28290D21BFDFD252C8DCBE
3,168,635 UART: Caliptra RT
3,168,888 UART: [state] CFI Enabled
3,275,651 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,669 UART:
3,277,685 UART: Running Caliptra ROM ...
3,278,093 UART:
3,278,148 UART: [state] CFI Enabled
3,280,872 UART: [state] LifecycleState = Unprovisioned
3,281,527 UART: [state] DebugLocked = No
3,282,207 UART: [state] WD Timer not started. Device not locked for debugging
3,283,357 UART: [kat] SHA2-256
4,089,007 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,093,132 UART: [kat] ++
4,093,284 UART: [kat] sha1
4,097,566 UART: [kat] SHA2-256
4,099,506 UART: [kat] SHA2-384
4,102,357 UART: [kat] SHA2-512-ACC
4,104,257 UART: [kat] ECC-384
4,113,714 UART: [kat] HMAC-384Kdf
4,118,418 UART: [kat] LMS
4,366,746 UART: [kat] --
4,367,758 UART: [update-reset] ++
4,383,041 >>> mbox cmd response: failed
4,383,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,383,485 UART: ROM Non-Fatal Error: 0x000B001D
4,384,467 UART: [state] Locking Datavault
4,385,055 UART: [state] Locking PCR0, PCR1 and PCR31
4,385,659 UART: [state] Locking ICCM
4,386,243 UART: [exit] Launching FMC @ 0x40000130
4,391,572 UART:
4,391,588 UART: Running Caliptra FMC ...
4,391,996 UART:
4,392,050 UART: [state] CFI Enabled
4,481,283 UART: [art] Extend RT PCRs Done
4,481,711 UART: [art] Lock RT PCRs Done
4,482,926 UART: [art] Populate DV Done
4,491,161 UART: [fht] FMC Alias Private Key: 7
4,492,157 UART: [art] Derive CDI
4,492,437 UART: [art] Store in in slot 0x4
4,578,272 UART: [art] Derive Key Pair
4,578,632 UART: [art] Store priv key in slot 0x5
4,592,268 UART: [art] Derive Key Pair - Done
4,607,255 UART: [art] Signing Cert with AUTHO
4,607,735 UART: RITY.KEYID = 7
4,623,073 UART: [art] Erasing AUTHORITY.KEYID = 7
4,623,838 UART: [art] PUB.X = 5DF3796898B859746C09B249EE5305691B56382D6C1DCEDDA4F62F82140F153B9B0706F9ADC27BB5E4A0F4791E8AF765
4,630,597 UART: [art] PUB.Y = D892D177763059227B47FEA68A3914A091AB156BEF1CFB4637C184481754B09AB9676B369FD0CA8E96C8312D5340BAED
4,637,549 UART: [art] SIG.R = B2B995BF53DA042D5CDDE2001D9973F7A7FE4AA2221F066B8E52A41B95F102AFEFB67CFE2814E11F602E679C3841F4F3
4,644,302 UART: [art] SIG.S = 61E947A3301194D743768319B4D00056429FC59C1AAEC86B2CB3A7657B3CBDC711C3C845AF28290D21BFDFD252C8DCBE
4,668,190 UART: Caliptra RT
4,668,443 UART: [state] CFI Enabled
4,952,792 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,954,367 UART:
4,954,383 UART: Running Caliptra ROM ...
4,954,791 UART:
4,954,846 UART: [state] CFI Enabled
4,958,000 UART: [state] LifecycleState = Unprovisioned
4,958,655 UART: [state] DebugLocked = No
4,959,287 UART: [state] WD Timer not started. Device not locked for debugging
4,960,495 UART: [kat] SHA2-256
5,766,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,770,270 UART: [kat] ++
5,770,422 UART: [kat] sha1
5,774,784 UART: [kat] SHA2-256
5,776,724 UART: [kat] SHA2-384
5,779,385 UART: [kat] SHA2-512-ACC
5,781,285 UART: [kat] ECC-384
5,790,968 UART: [kat] HMAC-384Kdf
5,795,578 UART: [kat] LMS
6,043,906 UART: [kat] --
6,044,788 UART: [update-reset] ++
7,358,207 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,359,240 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,509,238 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,549 >>> mbox cmd response: success
2,627,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,690,567 UART:
2,690,583 UART: Running Caliptra FMC ...
2,690,991 UART:
2,691,045 UART: [state] CFI Enabled
2,701,434 UART: [fht] FMC Alias Private Key: 7
2,809,601 UART: [art] Extend RT PCRs Done
2,810,029 UART: [art] Lock RT PCRs Done
2,811,335 UART: [art] Populate DV Done
2,819,358 UART: [fht] FMC Alias Private Key: 7
2,820,388 UART: [art] Derive CDI
2,820,668 UART: [art] Store in in slot 0x4
2,906,473 UART: [art] Derive Key Pair
2,906,833 UART: [art] Store priv key in slot 0x5
2,920,117 UART: [art] Derive Key Pair - Done
2,934,692 UART: [art] Signing Cert with AUTHO
2,935,172 UART: RITY.KEYID = 7
2,950,974 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,739 UART: [art] PUB.X = A15F2C82064539CDEFC5237C90F983E241CC5DB70F348614F828BD66041BB8D1063F6FDFCEA20252F591028C4EDD1C5B
2,958,501 UART: [art] PUB.Y = 1D95C31B8074AD4C91150E1C3B4D7ECE916D688431077F2CAFEAAAF967893149761B8B82DE18E316E5351808E84C4686
2,965,442 UART: [art] SIG.R = 6F8492DAE9CEE007C2F647C9DAB0360A9A9AA37511AB508ABD2355699B1CD8A5EEE59D5A06850CB6DF7181DADDAA0CAE
2,972,223 UART: [art] SIG.S = 6D6BF0AA85F8C5FC84DC4048BA425FAA2155D3E6545DC3CD9A9DD3D7EB06A427DDE7372540B9A61AE1B2DB07D3E3B843
2,996,074 UART: Caliptra RT
2,996,327 UART: [state] CFI Enabled
3,104,248 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,097,526 >>> mbox cmd response: failed
4,097,526 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,103,339 UART:
4,103,355 UART: Running Caliptra FMC ...
4,103,763 UART:
4,103,817 UART: [state] CFI Enabled
4,193,118 UART: [art] Extend RT PCRs Done
4,193,546 UART: [art] Lock RT PCRs Done
4,194,705 UART: [art] Populate DV Done
4,202,892 UART: [fht] FMC Alias Private Key: 7
4,204,066 UART: [art] Derive CDI
4,204,346 UART: [art] Store in in slot 0x4
4,290,143 UART: [art] Derive Key Pair
4,290,503 UART: [art] Store priv key in slot 0x5
4,304,207 UART: [art] Derive Key Pair - Done
4,319,058 UART: [art] Signing Cert with AUTHO
4,319,538 UART: RITY.KEYID = 7
4,335,122 UART: [art] Erasing AUTHORITY.KEYID = 7
4,335,887 UART: [art] PUB.X = A15F2C82064539CDEFC5237C90F983E241CC5DB70F348614F828BD66041BB8D1063F6FDFCEA20252F591028C4EDD1C5B
4,342,649 UART: [art] PUB.Y = 1D95C31B8074AD4C91150E1C3B4D7ECE916D688431077F2CAFEAAAF967893149761B8B82DE18E316E5351808E84C4686
4,349,590 UART: [art] SIG.R = 6F8492DAE9CEE007C2F647C9DAB0360A9A9AA37511AB508ABD2355699B1CD8A5EEE59D5A06850CB6DF7181DADDAA0CAE
4,356,371 UART: [art] SIG.S = 6D6BF0AA85F8C5FC84DC4048BA425FAA2155D3E6545DC3CD9A9DD3D7EB06A427DDE7372540B9A61AE1B2DB07D3E3B843
4,380,370 UART: Caliptra RT
4,380,623 UART: [state] CFI Enabled
4,661,460 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,102,603 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,808 UART: [kat] SHA2-256
903,748 UART: [kat] SHA2-384
906,397 UART: [kat] SHA2-512-ACC
908,298 UART: [kat] ECC-384
917,421 UART: [kat] HMAC-384Kdf
922,157 UART: [kat] LMS
1,170,485 UART: [kat] --
1,171,116 UART: [cold-reset] ++
1,171,500 UART: [fht] FHT @ 0x50003400
1,174,057 UART: [idev] ++
1,174,225 UART: [idev] CDI.KEYID = 6
1,174,585 UART: [idev] SUBJECT.KEYID = 7
1,175,009 UART: [idev] UDS.KEYID = 0
1,175,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,829 UART: [idev] Erasing UDS.KEYID = 0
1,200,178 UART: [idev] Sha1 KeyId Algorithm
1,208,756 UART: [idev] --
1,209,860 UART: [ldev] ++
1,210,028 UART: [ldev] CDI.KEYID = 6
1,210,391 UART: [ldev] SUBJECT.KEYID = 5
1,210,817 UART: [ldev] AUTHORITY.KEYID = 7
1,211,280 UART: [ldev] FE.KEYID = 1
1,216,454 UART: [ldev] Erasing FE.KEYID = 1
1,242,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,966 UART: [ldev] --
1,281,235 UART: [fwproc] Wait for Commands...
1,281,965 UART: [fwproc] Recv command 0x46574c44
1,282,693 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,576 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,661 >>> mbox cmd response: success
2,775,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,776,805 UART: [afmc] ++
2,776,973 UART: [afmc] CDI.KEYID = 6
2,777,335 UART: [afmc] SUBJECT.KEYID = 7
2,777,760 UART: [afmc] AUTHORITY.KEYID = 5
2,813,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,322 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,935 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,654 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,468 UART: [afmc] --
2,856,438 UART: [cold-reset] --
2,857,208 UART: [state] Locking Datavault
2,858,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,947 UART: [state] Locking ICCM
2,859,545 UART: [exit] Launching FMC @ 0x40000130
2,864,874 UART:
2,864,890 UART: Running Caliptra FMC ...
2,865,298 UART:
2,865,441 UART: [state] CFI Enabled
2,876,004 UART: [fht] FMC Alias Private Key: 7
2,983,531 UART: [art] Extend RT PCRs Done
2,983,959 UART: [art] Lock RT PCRs Done
2,985,683 UART: [art] Populate DV Done
2,993,918 UART: [fht] FMC Alias Private Key: 7
2,994,896 UART: [art] Derive CDI
2,995,176 UART: [art] Store in in slot 0x4
3,080,633 UART: [art] Derive Key Pair
3,080,993 UART: [art] Store priv key in slot 0x5
3,094,337 UART: [art] Derive Key Pair - Done
3,108,994 UART: [art] Signing Cert with AUTHO
3,109,474 UART: RITY.KEYID = 7
3,125,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,837 UART: [art] PUB.X = 8B56279FB9BC5323E9E414EE3F9EF4E84602A67C0EF176690ECF44B30A99EA08D495B1BEF98790E6A4BDB48DA5BDD571
3,132,608 UART: [art] PUB.Y = F31C24B5F4DE12C48E3F60577DF9EB71B98378052FB7C17D5B4370813921FAF11010C10D6B48B2C4C22B8A696BD4B2E0
3,139,558 UART: [art] SIG.R = 44011B5B933E2E9F47BE4A6AF33ACB02BDA49710D352259D6E61D2D74C0176234C0D420D37DD65471BC2FE3CF4FAA4C6
3,146,325 UART: [art] SIG.S = 0607D231F71C3F55262C265BF4DE254730C474292AE840EE5C97FB6695A9083797DA57C8E983B8E969C2968E1B74E757
3,169,665 UART: Caliptra RT
3,170,010 UART: [state] CFI Enabled
3,277,363 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,977 UART:
3,278,993 UART: Running Caliptra ROM ...
3,279,401 UART:
3,279,543 UART: [state] CFI Enabled
3,282,693 UART: [state] LifecycleState = Unprovisioned
3,283,348 UART: [state] DebugLocked = No
3,283,906 UART: [state] WD Timer not started. Device not locked for debugging
3,285,022 UART: [kat] SHA2-256
4,090,672 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,797 UART: [kat] ++
4,094,949 UART: [kat] sha1
4,099,295 UART: [kat] SHA2-256
4,101,235 UART: [kat] SHA2-384
4,103,884 UART: [kat] SHA2-512-ACC
4,105,784 UART: [kat] ECC-384
4,115,433 UART: [kat] HMAC-384Kdf
4,120,027 UART: [kat] LMS
4,368,355 UART: [kat] --
4,369,191 UART: [update-reset] ++
4,384,584 >>> mbox cmd response: failed
4,384,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,384,986 UART: ROM Non-Fatal Error: 0x000B001D
4,385,816 UART: [state] Locking Datavault
4,386,600 UART: [state] Locking PCR0, PCR1 and PCR31
4,387,204 UART: [state] Locking ICCM
4,387,834 UART: [exit] Launching FMC @ 0x40000130
4,393,163 UART:
4,393,179 UART: Running Caliptra FMC ...
4,393,587 UART:
4,393,730 UART: [state] CFI Enabled
4,483,093 UART: [art] Extend RT PCRs Done
4,483,521 UART: [art] Lock RT PCRs Done
4,484,668 UART: [art] Populate DV Done
4,492,817 UART: [fht] FMC Alias Private Key: 7
4,493,901 UART: [art] Derive CDI
4,494,181 UART: [art] Store in in slot 0x4
4,580,042 UART: [art] Derive Key Pair
4,580,402 UART: [art] Store priv key in slot 0x5
4,593,614 UART: [art] Derive Key Pair - Done
4,608,325 UART: [art] Signing Cert with AUTHO
4,608,805 UART: RITY.KEYID = 7
4,624,061 UART: [art] Erasing AUTHORITY.KEYID = 7
4,624,826 UART: [art] PUB.X = 8B56279FB9BC5323E9E414EE3F9EF4E84602A67C0EF176690ECF44B30A99EA08D495B1BEF98790E6A4BDB48DA5BDD571
4,631,597 UART: [art] PUB.Y = F31C24B5F4DE12C48E3F60577DF9EB71B98378052FB7C17D5B4370813921FAF11010C10D6B48B2C4C22B8A696BD4B2E0
4,638,547 UART: [art] SIG.R = 44011B5B933E2E9F47BE4A6AF33ACB02BDA49710D352259D6E61D2D74C0176234C0D420D37DD65471BC2FE3CF4FAA4C6
4,645,314 UART: [art] SIG.S = 0607D231F71C3F55262C265BF4DE254730C474292AE840EE5C97FB6695A9083797DA57C8E983B8E969C2968E1B74E757
4,669,012 UART: Caliptra RT
4,669,357 UART: [state] CFI Enabled
4,950,588 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,952,497 UART:
4,952,513 UART: Running Caliptra ROM ...
4,952,921 UART:
4,953,063 UART: [state] CFI Enabled
4,956,123 UART: [state] LifecycleState = Unprovisioned
4,956,778 UART: [state] DebugLocked = No
4,957,338 UART: [state] WD Timer not started. Device not locked for debugging
4,958,586 UART: [kat] SHA2-256
5,764,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,768,361 UART: [kat] ++
5,768,513 UART: [kat] sha1
5,772,627 UART: [kat] SHA2-256
5,774,567 UART: [kat] SHA2-384
5,777,516 UART: [kat] SHA2-512-ACC
5,779,416 UART: [kat] ECC-384
5,789,419 UART: [kat] HMAC-384Kdf
5,793,927 UART: [kat] LMS
6,042,255 UART: [kat] --
6,043,263 UART: [update-reset] ++
7,357,872 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,358,833 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,508,831 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,806 >>> mbox cmd response: success
2,627,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,689,378 UART:
2,689,394 UART: Running Caliptra FMC ...
2,689,802 UART:
2,689,945 UART: [state] CFI Enabled
2,700,352 UART: [fht] FMC Alias Private Key: 7
2,808,437 UART: [art] Extend RT PCRs Done
2,808,865 UART: [art] Lock RT PCRs Done
2,810,021 UART: [art] Populate DV Done
2,818,338 UART: [fht] FMC Alias Private Key: 7
2,819,354 UART: [art] Derive CDI
2,819,634 UART: [art] Store in in slot 0x4
2,905,319 UART: [art] Derive Key Pair
2,905,679 UART: [art] Store priv key in slot 0x5
2,919,057 UART: [art] Derive Key Pair - Done
2,933,753 UART: [art] Signing Cert with AUTHO
2,934,233 UART: RITY.KEYID = 7
2,949,159 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,924 UART: [art] PUB.X = A61E0C1F90CC7918BFAF6ACB0CC0AC2DA6070C6EC0EDF5EE3B36E825692793442CF7C5556384861F42A9B174B84AC25C
2,956,698 UART: [art] PUB.Y = DC3BD8A9F3931B2E72F89E2AC3B579039CB5D8B34940DB7B90D748F17D1F7CDD74BB00C37FE5363F4B93146BADACD892
2,963,641 UART: [art] SIG.R = 728B8FC4538D14F902D0AEE640CB65F914539961B29DE2D85EE3331D1D94E23C1FD4C802E94EDF78C1520E6536AB6C43
2,970,408 UART: [art] SIG.S = 26326C54F7D1E56146DE3CAECE823369A6537752C5BDF1CC181DC042E991DF548F169210242304BEE3B05B01EE76E711
2,994,393 UART: Caliptra RT
2,994,738 UART: [state] CFI Enabled
3,103,459 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,880 >>> mbox cmd response: failed
4,096,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,102,753 UART:
4,102,769 UART: Running Caliptra FMC ...
4,103,177 UART:
4,103,320 UART: [state] CFI Enabled
4,192,205 UART: [art] Extend RT PCRs Done
4,192,633 UART: [art] Lock RT PCRs Done
4,193,760 UART: [art] Populate DV Done
4,201,917 UART: [fht] FMC Alias Private Key: 7
4,203,033 UART: [art] Derive CDI
4,203,313 UART: [art] Store in in slot 0x4
4,288,910 UART: [art] Derive Key Pair
4,289,270 UART: [art] Store priv key in slot 0x5
4,302,568 UART: [art] Derive Key Pair - Done
4,317,208 UART: [art] Signing Cert with AUTHO
4,317,688 UART: RITY.KEYID = 7
4,332,946 UART: [art] Erasing AUTHORITY.KEYID = 7
4,333,711 UART: [art] PUB.X = A61E0C1F90CC7918BFAF6ACB0CC0AC2DA6070C6EC0EDF5EE3B36E825692793442CF7C5556384861F42A9B174B84AC25C
4,340,485 UART: [art] PUB.Y = DC3BD8A9F3931B2E72F89E2AC3B579039CB5D8B34940DB7B90D748F17D1F7CDD74BB00C37FE5363F4B93146BADACD892
4,347,428 UART: [art] SIG.R = 728B8FC4538D14F902D0AEE640CB65F914539961B29DE2D85EE3331D1D94E23C1FD4C802E94EDF78C1520E6536AB6C43
4,354,195 UART: [art] SIG.S = 26326C54F7D1E56146DE3CAECE823369A6537752C5BDF1CC181DC042E991DF548F169210242304BEE3B05B01EE76E711
4,377,818 UART: Caliptra RT
4,378,163 UART: [state] CFI Enabled
4,661,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,102,452 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
916,314 UART: [kat] HMAC-384Kdf
920,814 UART: [kat] LMS
1,169,126 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,174,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,689 UART: [idev] --
1,208,560 UART: [ldev] ++
1,208,728 UART: [ldev] CDI.KEYID = 6
1,209,092 UART: [ldev] SUBJECT.KEYID = 5
1,209,519 UART: [ldev] AUTHORITY.KEYID = 7
1,209,982 UART: [ldev] FE.KEYID = 1
1,215,130 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,850 UART: [ldev] --
1,280,136 UART: [fwproc] Wait for Commands...
1,280,735 UART: [fwproc] Recv command 0x46574c44
1,281,468 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,964 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,964 >>> mbox cmd response: success
2,773,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,775,223 UART: [afmc] ++
2,775,391 UART: [afmc] CDI.KEYID = 6
2,775,754 UART: [afmc] SUBJECT.KEYID = 7
2,776,180 UART: [afmc] AUTHORITY.KEYID = 5
2,811,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,317 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,200 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,919 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,854 UART: [afmc] --
2,854,912 UART: [cold-reset] --
2,855,860 UART: [state] Locking Datavault
2,856,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,489 UART: [state] Locking ICCM
2,857,939 UART: [exit] Launching FMC @ 0x40000130
2,863,268 UART:
2,863,284 UART: Running Caliptra FMC ...
2,863,692 UART:
2,863,746 UART: [state] CFI Enabled
2,874,017 UART: [fht] FMC Alias Private Key: 7
2,982,100 UART: [art] Extend RT PCRs Done
2,982,528 UART: [art] Lock RT PCRs Done
2,984,118 UART: [art] Populate DV Done
2,992,301 UART: [fht] FMC Alias Private Key: 7
2,993,387 UART: [art] Derive CDI
2,993,667 UART: [art] Store in in slot 0x4
3,079,674 UART: [art] Derive Key Pair
3,080,034 UART: [art] Store priv key in slot 0x5
3,093,032 UART: [art] Derive Key Pair - Done
3,107,776 UART: [art] Signing Cert with AUTHO
3,108,256 UART: RITY.KEYID = 7
3,123,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,153 UART: [art] PUB.X = 4BE145DC2EE4AB8BA1E26B7C5888BBE44C2AE44942503A28E6385756A9068806B38ED7D7FFC34C09145552F5390A0AEF
3,130,916 UART: [art] PUB.Y = 6A2B9C0FAFCD39984AD1C47AE5BD5DE2A147F66CEDD65FE5CAD29DD5F8282BEC1671D4D4C607E2453A468039AF876D9F
3,137,884 UART: [art] SIG.R = E729BFB8E9DED2823D4C0C1C2581F3BB6D8422ADD8BD90CCB03B6CCA44EBCE7D613E4F55769A93449E10CDD94B106703
3,144,668 UART: [art] SIG.S = 49F6DE152CBC69EB03CBF59B1791ECDFD9BDC6BA4C757D28995A683550C6A603CE6F5C7CA9542827E3AE4985A7292085
3,168,395 UART: Caliptra RT
3,168,648 UART: [state] CFI Enabled
3,277,605 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,767 UART:
3,279,783 UART: Running Caliptra ROM ...
3,280,191 UART:
3,280,246 UART: [state] CFI Enabled
3,282,956 UART: [state] LifecycleState = Unprovisioned
3,283,611 UART: [state] DebugLocked = No
3,284,215 UART: [state] WD Timer not started. Device not locked for debugging
3,285,483 UART: [kat] SHA2-256
4,089,033 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,162 UART: [kat] ++
4,093,314 UART: [kat] sha1
4,097,520 UART: [kat] SHA2-256
4,099,460 UART: [kat] SHA2-384
4,102,071 UART: [kat] SHA2-512-ACC
4,103,971 UART: [kat] ECC-384
4,113,608 UART: [kat] HMAC-384Kdf
4,118,148 UART: [kat] LMS
4,366,460 UART: [kat] --
4,367,164 UART: [update-reset] ++
4,382,851 >>> mbox cmd response: failed
4,382,851 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,383,151 UART: ROM Non-Fatal Error: 0x000B001D
4,384,123 UART: [state] Locking Datavault
4,385,015 UART: [state] Locking PCR0, PCR1 and PCR31
4,385,619 UART: [state] Locking ICCM
4,386,065 UART: [exit] Launching FMC @ 0x40000130
4,391,394 UART:
4,391,410 UART: Running Caliptra FMC ...
4,391,818 UART:
4,391,872 UART: [state] CFI Enabled
4,480,651 UART: [art] Extend RT PCRs Done
4,481,079 UART: [art] Lock RT PCRs Done
4,482,430 UART: [art] Populate DV Done
4,490,901 UART: [fht] FMC Alias Private Key: 7
4,492,051 UART: [art] Derive CDI
4,492,331 UART: [art] Store in in slot 0x4
4,578,034 UART: [art] Derive Key Pair
4,578,394 UART: [art] Store priv key in slot 0x5
4,591,618 UART: [art] Derive Key Pair - Done
4,606,518 UART: [art] Signing Cert with AUTHO
4,606,998 UART: RITY.KEYID = 7
4,622,256 UART: [art] Erasing AUTHORITY.KEYID = 7
4,623,021 UART: [art] PUB.X = 4BE145DC2EE4AB8BA1E26B7C5888BBE44C2AE44942503A28E6385756A9068806B38ED7D7FFC34C09145552F5390A0AEF
4,629,784 UART: [art] PUB.Y = 6A2B9C0FAFCD39984AD1C47AE5BD5DE2A147F66CEDD65FE5CAD29DD5F8282BEC1671D4D4C607E2453A468039AF876D9F
4,636,752 UART: [art] SIG.R = E729BFB8E9DED2823D4C0C1C2581F3BB6D8422ADD8BD90CCB03B6CCA44EBCE7D613E4F55769A93449E10CDD94B106703
4,643,536 UART: [art] SIG.S = 49F6DE152CBC69EB03CBF59B1791ECDFD9BDC6BA4C757D28995A683550C6A603CE6F5C7CA9542827E3AE4985A7292085
4,667,435 UART: Caliptra RT
4,667,688 UART: [state] CFI Enabled
4,947,817 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,949,176 UART:
4,949,192 UART: Running Caliptra ROM ...
4,949,600 UART:
4,949,655 UART: [state] CFI Enabled
4,952,015 UART: [state] LifecycleState = Unprovisioned
4,952,670 UART: [state] DebugLocked = No
4,953,404 UART: [state] WD Timer not started. Device not locked for debugging
4,954,572 UART: [kat] SHA2-256
5,758,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,762,251 UART: [kat] ++
5,762,403 UART: [kat] sha1
5,766,649 UART: [kat] SHA2-256
5,768,589 UART: [kat] SHA2-384
5,771,572 UART: [kat] SHA2-512-ACC
5,773,472 UART: [kat] ECC-384
5,782,861 UART: [kat] HMAC-384Kdf
5,787,345 UART: [kat] LMS
6,035,657 UART: [kat] --
6,036,353 UART: [update-reset] ++
7,349,269 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,350,302 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,500,300 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,820 >>> mbox cmd response: success
2,623,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,686,058 UART:
2,686,074 UART: Running Caliptra FMC ...
2,686,482 UART:
2,686,536 UART: [state] CFI Enabled
2,697,163 UART: [fht] FMC Alias Private Key: 7
2,805,056 UART: [art] Extend RT PCRs Done
2,805,484 UART: [art] Lock RT PCRs Done
2,807,364 UART: [art] Populate DV Done
2,815,599 UART: [fht] FMC Alias Private Key: 7
2,816,537 UART: [art] Derive CDI
2,816,817 UART: [art] Store in in slot 0x4
2,902,652 UART: [art] Derive Key Pair
2,903,012 UART: [art] Store priv key in slot 0x5
2,916,136 UART: [art] Derive Key Pair - Done
2,930,868 UART: [art] Signing Cert with AUTHO
2,931,348 UART: RITY.KEYID = 7
2,946,872 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,637 UART: [art] PUB.X = 4413A5BD24A642879E064497947E41881D65F029F56D417694E8E50C9D908ADBDFD1D174EFF9BF267808EF909E821799
2,954,394 UART: [art] PUB.Y = 351D2D2479C6C7689042AD19D600CE0833A76DC797B7938677DD9185372C1E94A7756CD1861ABE7A9FC4F3AE0F5FBE9F
2,961,322 UART: [art] SIG.R = AB26D1C66C0D9C751AB00FE7C2BAD0C557EAE1D19E03F58ACA977F63674D186B6A7DDE4D68F5BFC943CF30F95A9F1C5A
2,968,109 UART: [art] SIG.S = F9612A8CE489C93E8BFB4323B685E638128F2D66AF3ED75FBEF65B45944640E517355229345F69B47F6719E228131A5D
2,991,504 UART: Caliptra RT
2,991,757 UART: [state] CFI Enabled
3,099,473 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,105 >>> mbox cmd response: failed
4,088,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,093,926 UART:
4,093,942 UART: Running Caliptra FMC ...
4,094,350 UART:
4,094,404 UART: [state] CFI Enabled
4,183,253 UART: [art] Extend RT PCRs Done
4,183,681 UART: [art] Lock RT PCRs Done
4,185,054 UART: [art] Populate DV Done
4,193,469 UART: [fht] FMC Alias Private Key: 7
4,194,443 UART: [art] Derive CDI
4,194,723 UART: [art] Store in in slot 0x4
4,280,412 UART: [art] Derive Key Pair
4,280,772 UART: [art] Store priv key in slot 0x5
4,293,616 UART: [art] Derive Key Pair - Done
4,308,476 UART: [art] Signing Cert with AUTHO
4,308,956 UART: RITY.KEYID = 7
4,323,916 UART: [art] Erasing AUTHORITY.KEYID = 7
4,324,681 UART: [art] PUB.X = 4413A5BD24A642879E064497947E41881D65F029F56D417694E8E50C9D908ADBDFD1D174EFF9BF267808EF909E821799
4,331,438 UART: [art] PUB.Y = 351D2D2479C6C7689042AD19D600CE0833A76DC797B7938677DD9185372C1E94A7756CD1861ABE7A9FC4F3AE0F5FBE9F
4,338,366 UART: [art] SIG.R = AB26D1C66C0D9C751AB00FE7C2BAD0C557EAE1D19E03F58ACA977F63674D186B6A7DDE4D68F5BFC943CF30F95A9F1C5A
4,345,153 UART: [art] SIG.S = F9612A8CE489C93E8BFB4323B685E638128F2D66AF3ED75FBEF65B45944640E517355229345F69B47F6719E228131A5D
4,369,378 UART: Caliptra RT
4,369,631 UART: [state] CFI Enabled
4,651,063 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,086,765 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,502 UART: [kat] SHA2-256
901,442 UART: [kat] SHA2-384
904,223 UART: [kat] SHA2-512-ACC
906,124 UART: [kat] ECC-384
915,383 UART: [kat] HMAC-384Kdf
919,819 UART: [kat] LMS
1,168,131 UART: [kat] --
1,169,050 UART: [cold-reset] ++
1,169,404 UART: [fht] FHT @ 0x50003400
1,171,910 UART: [idev] ++
1,172,078 UART: [idev] CDI.KEYID = 6
1,172,439 UART: [idev] SUBJECT.KEYID = 7
1,172,864 UART: [idev] UDS.KEYID = 0
1,173,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,966 UART: [idev] Erasing UDS.KEYID = 0
1,198,860 UART: [idev] Sha1 KeyId Algorithm
1,207,616 UART: [idev] --
1,208,593 UART: [ldev] ++
1,208,761 UART: [ldev] CDI.KEYID = 6
1,209,125 UART: [ldev] SUBJECT.KEYID = 5
1,209,552 UART: [ldev] AUTHORITY.KEYID = 7
1,210,015 UART: [ldev] FE.KEYID = 1
1,215,339 UART: [ldev] Erasing FE.KEYID = 1
1,241,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,683 UART: [ldev] --
1,280,197 UART: [fwproc] Wait for Commands...
1,280,972 UART: [fwproc] Recv command 0x46574c44
1,281,705 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,031 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,071 >>> mbox cmd response: success
2,773,071 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,774,096 UART: [afmc] ++
2,774,264 UART: [afmc] CDI.KEYID = 6
2,774,627 UART: [afmc] SUBJECT.KEYID = 7
2,775,053 UART: [afmc] AUTHORITY.KEYID = 5
2,810,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,827 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,439 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,158 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,955 UART: [afmc] --
2,853,857 UART: [cold-reset] --
2,854,533 UART: [state] Locking Datavault
2,855,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,572 UART: [state] Locking ICCM
2,857,010 UART: [exit] Launching FMC @ 0x40000130
2,862,339 UART:
2,862,355 UART: Running Caliptra FMC ...
2,862,763 UART:
2,862,906 UART: [state] CFI Enabled
2,873,655 UART: [fht] FMC Alias Private Key: 7
2,981,592 UART: [art] Extend RT PCRs Done
2,982,020 UART: [art] Lock RT PCRs Done
2,983,598 UART: [art] Populate DV Done
2,991,881 UART: [fht] FMC Alias Private Key: 7
2,992,989 UART: [art] Derive CDI
2,993,269 UART: [art] Store in in slot 0x4
3,079,176 UART: [art] Derive Key Pair
3,079,536 UART: [art] Store priv key in slot 0x5
3,093,178 UART: [art] Derive Key Pair - Done
3,107,708 UART: [art] Signing Cert with AUTHO
3,108,188 UART: RITY.KEYID = 7
3,123,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,015 UART: [art] PUB.X = DC5161BABC6BE54581856DB74A4B44CD4233671BF41A7B558D70610D29C76D100DFDA1CAC4C36586B953880F885C09B0
3,130,779 UART: [art] PUB.Y = 9A07C54C7C7A7380CFCFD5961F4CF2BBBB3ACDBD444868B109169A349E217C84427442876A6A1BA0D904A3D0D0015411
3,137,723 UART: [art] SIG.R = 2EF80114F2E2DF1634A196A4E07C9DEB1C317A4D34F49C194659893ABB5C1441BD74471F927D112BC05EF5188478E681
3,144,490 UART: [art] SIG.S = 30D7CC4B53B97CB2FFA18D6DB56F4834F0FC25B8154F6513794CA0BEC308A6F3129D45C4069B47B3BA038CAB1D4197B9
3,168,814 UART: Caliptra RT
3,169,159 UART: [state] CFI Enabled
3,277,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,096 UART:
3,279,112 UART: Running Caliptra ROM ...
3,279,520 UART:
3,279,662 UART: [state] CFI Enabled
3,282,380 UART: [state] LifecycleState = Unprovisioned
3,283,035 UART: [state] DebugLocked = No
3,283,691 UART: [state] WD Timer not started. Device not locked for debugging
3,284,917 UART: [kat] SHA2-256
4,088,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,596 UART: [kat] ++
4,092,748 UART: [kat] sha1
4,096,984 UART: [kat] SHA2-256
4,098,924 UART: [kat] SHA2-384
4,101,685 UART: [kat] SHA2-512-ACC
4,103,585 UART: [kat] ECC-384
4,113,216 UART: [kat] HMAC-384Kdf
4,117,728 UART: [kat] LMS
4,366,040 UART: [kat] --
4,366,878 UART: [update-reset] ++
4,381,949 >>> mbox cmd response: failed
4,381,949 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,382,389 UART: ROM Non-Fatal Error: 0x000B001D
4,383,375 UART: [state] Locking Datavault
4,384,183 UART: [state] Locking PCR0, PCR1 and PCR31
4,384,787 UART: [state] Locking ICCM
4,385,409 UART: [exit] Launching FMC @ 0x40000130
4,390,738 UART:
4,390,754 UART: Running Caliptra FMC ...
4,391,162 UART:
4,391,305 UART: [state] CFI Enabled
4,480,494 UART: [art] Extend RT PCRs Done
4,480,922 UART: [art] Lock RT PCRs Done
4,481,925 UART: [art] Populate DV Done
4,490,146 UART: [fht] FMC Alias Private Key: 7
4,491,246 UART: [art] Derive CDI
4,491,526 UART: [art] Store in in slot 0x4
4,577,309 UART: [art] Derive Key Pair
4,577,669 UART: [art] Store priv key in slot 0x5
4,591,485 UART: [art] Derive Key Pair - Done
4,606,065 UART: [art] Signing Cert with AUTHO
4,606,545 UART: RITY.KEYID = 7
4,621,515 UART: [art] Erasing AUTHORITY.KEYID = 7
4,622,280 UART: [art] PUB.X = DC5161BABC6BE54581856DB74A4B44CD4233671BF41A7B558D70610D29C76D100DFDA1CAC4C36586B953880F885C09B0
4,629,044 UART: [art] PUB.Y = 9A07C54C7C7A7380CFCFD5961F4CF2BBBB3ACDBD444868B109169A349E217C84427442876A6A1BA0D904A3D0D0015411
4,635,988 UART: [art] SIG.R = 2EF80114F2E2DF1634A196A4E07C9DEB1C317A4D34F49C194659893ABB5C1441BD74471F927D112BC05EF5188478E681
4,642,755 UART: [art] SIG.S = 30D7CC4B53B97CB2FFA18D6DB56F4834F0FC25B8154F6513794CA0BEC308A6F3129D45C4069B47B3BA038CAB1D4197B9
4,667,063 UART: Caliptra RT
4,667,408 UART: [state] CFI Enabled
4,948,999 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,950,396 UART:
4,950,412 UART: Running Caliptra ROM ...
4,950,820 UART:
4,950,962 UART: [state] CFI Enabled
4,953,450 UART: [state] LifecycleState = Unprovisioned
4,954,105 UART: [state] DebugLocked = No
4,954,629 UART: [state] WD Timer not started. Device not locked for debugging
4,955,967 UART: [kat] SHA2-256
5,759,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,763,646 UART: [kat] ++
5,763,798 UART: [kat] sha1
5,768,014 UART: [kat] SHA2-256
5,769,954 UART: [kat] SHA2-384
5,772,733 UART: [kat] SHA2-512-ACC
5,774,633 UART: [kat] ECC-384
5,784,610 UART: [kat] HMAC-384Kdf
5,789,244 UART: [kat] LMS
6,037,556 UART: [kat] --
6,038,782 UART: [update-reset] ++
7,351,638 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,352,729 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,502,727 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,273 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,827 >>> mbox cmd response: success
2,624,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,687,003 UART:
2,687,019 UART: Running Caliptra FMC ...
2,687,427 UART:
2,687,570 UART: [state] CFI Enabled
2,698,411 UART: [fht] FMC Alias Private Key: 7
2,806,580 UART: [art] Extend RT PCRs Done
2,807,008 UART: [art] Lock RT PCRs Done
2,808,378 UART: [art] Populate DV Done
2,816,681 UART: [fht] FMC Alias Private Key: 7
2,817,683 UART: [art] Derive CDI
2,817,963 UART: [art] Store in in slot 0x4
2,903,784 UART: [art] Derive Key Pair
2,904,144 UART: [art] Store priv key in slot 0x5
2,917,802 UART: [art] Derive Key Pair - Done
2,932,311 UART: [art] Signing Cert with AUTHO
2,932,791 UART: RITY.KEYID = 7
2,948,127 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,892 UART: [art] PUB.X = 70FE1663F93499AC6750967FDA382ACF89E03357D8858A3B804A1C2E9A3BE166573878FB01D5AA687FDDDBBC57EC58F3
2,955,669 UART: [art] PUB.Y = EB7B0D5666A689031867E17521E8313C5C7B2B2D1C595B48FEBFC9A8B185F2BD250F8E997720881B813A0746337605BE
2,962,602 UART: [art] SIG.R = FD45766ABBFB337082D10E2DD1E7F8DA49AF1F6ACAB2EFB2FB78C033A2878FD5D2417DC875DCAC0F5B0CE5407F9C9AB6
2,969,393 UART: [art] SIG.S = 90EA04031E46F587F06EE391B8EDCEA6121BAFC85ADA87B60C61B083822AD5F4DE3BEBD1E11B9782B25DF036373C7094
2,992,589 UART: Caliptra RT
2,992,934 UART: [state] CFI Enabled
3,100,756 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,089,675 >>> mbox cmd response: failed
4,089,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,095,250 UART:
4,095,266 UART: Running Caliptra FMC ...
4,095,674 UART:
4,095,817 UART: [state] CFI Enabled
4,184,936 UART: [art] Extend RT PCRs Done
4,185,364 UART: [art] Lock RT PCRs Done
4,186,613 UART: [art] Populate DV Done
4,194,742 UART: [fht] FMC Alias Private Key: 7
4,195,742 UART: [art] Derive CDI
4,196,022 UART: [art] Store in in slot 0x4
4,281,475 UART: [art] Derive Key Pair
4,281,835 UART: [art] Store priv key in slot 0x5
4,295,089 UART: [art] Derive Key Pair - Done
4,309,756 UART: [art] Signing Cert with AUTHO
4,310,236 UART: RITY.KEYID = 7
4,325,166 UART: [art] Erasing AUTHORITY.KEYID = 7
4,325,931 UART: [art] PUB.X = 70FE1663F93499AC6750967FDA382ACF89E03357D8858A3B804A1C2E9A3BE166573878FB01D5AA687FDDDBBC57EC58F3
4,332,708 UART: [art] PUB.Y = EB7B0D5666A689031867E17521E8313C5C7B2B2D1C595B48FEBFC9A8B185F2BD250F8E997720881B813A0746337605BE
4,339,641 UART: [art] SIG.R = FD45766ABBFB337082D10E2DD1E7F8DA49AF1F6ACAB2EFB2FB78C033A2878FD5D2417DC875DCAC0F5B0CE5407F9C9AB6
4,346,432 UART: [art] SIG.S = 90EA04031E46F587F06EE391B8EDCEA6121BAFC85ADA87B60C61B083822AD5F4DE3BEBD1E11B9782B25DF036373C7094
4,369,936 UART: Caliptra RT
4,370,281 UART: [state] CFI Enabled
4,655,537 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,091,996 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,308 UART:
192,667 UART: Running Caliptra ROM ...
193,758 UART:
193,926 UART: [state] CFI Enabled
258,806 UART: [state] LifecycleState = Unprovisioned
260,676 UART: [state] DebugLocked = No
262,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,274 UART: [kat] SHA2-256
437,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,451 UART: [kat] ++
448,897 UART: [kat] sha1
459,611 UART: [kat] SHA2-256
462,300 UART: [kat] SHA2-384
467,956 UART: [kat] SHA2-512-ACC
470,298 UART: [kat] ECC-384
2,763,371 UART: [kat] HMAC-384Kdf
2,793,751 UART: [kat] LMS
3,984,073 UART: [kat] --
3,989,126 UART: [cold-reset] ++
3,991,464 UART: [fht] Storing FHT @ 0x50003400
4,004,194 UART: [idev] ++
4,004,774 UART: [idev] CDI.KEYID = 6
4,005,694 UART: [idev] SUBJECT.KEYID = 7
4,006,917 UART: [idev] UDS.KEYID = 0
4,009,810 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,563 UART: [idev] Erasing UDS.KEYID = 0
7,339,008 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,902 UART: [idev] --
7,364,981 UART: [ldev] ++
7,365,553 UART: [ldev] CDI.KEYID = 6
7,366,572 UART: [ldev] SUBJECT.KEYID = 5
7,367,735 UART: [ldev] AUTHORITY.KEYID = 7
7,369,023 UART: [ldev] FE.KEYID = 1
7,415,281 UART: [ldev] Erasing FE.KEYID = 1
10,748,710 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,247 UART: [ldev] --
13,128,598 UART: [fwproc] Waiting for Commands...
13,130,966 UART: [fwproc] Received command 0x46574c44
13,133,153 UART: [fwproc] Received Image of size 114124 bytes
17,183,772 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,263,103 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,967 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,649,938 >>> mbox cmd response: success
17,651,751 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,795,382 UART: [afmc] ++
17,796,024 UART: [afmc] CDI.KEYID = 6
17,796,921 UART: [afmc] SUBJECT.KEYID = 7
17,798,145 UART: [afmc] AUTHORITY.KEYID = 5
21,036,314 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,335,412 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,337,671 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
23,352,201 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
23,367,032 UART: [afmc] SIG.R = 70DD329DB50192ACE87A6C10E1666FD5D3BD84C00AA8588EF82FC5A7305C574C4BB5029704E58EAEA71862E1752CC5F4
23,381,269 UART: [afmc] SIG.S = C2527B23317C57C01E8D1CBEE4ABD2C785E441D665A2C9DAA3E5CB0B9D451666EDB7D459C9DAEC3E09BCD9224F672B40
23,402,601 UART: [afmc] --
23,406,747 UART: [cold-reset] --
23,411,421 UART: [state] Locking Datavault
23,414,669 UART: [state] Locking PCR0, PCR1 and PCR31
23,416,371 UART: [state] Locking ICCM
23,418,497 UART: [exit] Launching FMC @ 0x40000130
23,426,890 UART:
23,427,123 UART: Running Caliptra FMC ...
23,428,147 UART:
23,428,313 UART: [state] CFI Enabled
23,496,076 UART: [fht] FMC Alias Private Key: 7
25,833,512 UART: [art] Extend RT PCRs Done
25,834,729 UART: [art] Lock RT PCRs Done
25,836,542 UART: [art] Populate DV Done
25,842,177 UART: [fht] FMC Alias Private Key: 7
25,843,721 UART: [art] Derive CDI
25,844,459 UART: [art] Store in in slot 0x4
25,906,281 UART: [art] Derive Key Pair
25,907,314 UART: [art] Store priv key in slot 0x5
29,200,634 UART: [art] Derive Key Pair - Done
29,213,310 UART: [art] Signing Cert with AUTHO
29,214,611 UART: RITY.KEYID = 7
31,502,604 UART: [art] Erasing AUTHORITY.KEYID = 7
31,504,114 UART: [art] PUB.X = 90777096FE3A6BBB6D5B8B4444B5884294571CE435109D31A29EC0EB59FFE966CC73739DF9E4954FA5258399BA442E25
31,511,314 UART: [art] PUB.Y = 3BDA1DB506D453C89013479D6B55CC4E892208443518D9A97B3BCBF7C78B632C50271FF9E4DFE9B1E2FA66AAF4B0BB72
31,518,566 UART: [art] SIG.R = D589E283829F0B5BDBBE5EB5335739D0DFF257D9B72B181F59ACCB82243437797722DBBC045F18F960B99620EC661D1E
31,525,959 UART: [art] SIG.S = F64631B31A19C6789896603AC534B4B85AD7A3732B6932C7EB72BAC81156E4041652CA2951A34C84C9935598155640F0
32,830,825 UART: Caliptra RT
32,831,535 UART: [state] CFI Enabled
32,992,443 UART: [rt] RT listening for mailbox commands...
32,995,351 UART:
32,995,519 UART: Running Caliptra ROM ...
32,996,627 UART:
32,996,785 UART: [state] CFI Enabled
33,057,675 UART: [state] LifecycleState = Unprovisioned
33,059,562 UART: [state] DebugLocked = No
33,061,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,065,927 UART: [kat] SHA2-256
33,235,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,246,152 UART: [kat] ++
33,246,607 UART: [kat] sha1
33,257,027 UART: [kat] SHA2-256
33,259,727 UART: [kat] SHA2-384
33,265,343 UART: [kat] SHA2-512-ACC
33,267,692 UART: [kat] ECC-384
35,563,980 UART: [kat] HMAC-384Kdf
35,594,249 UART: [kat] LMS
36,784,625 UART: [kat] --
36,789,050 UART: [update-reset] ++
36,897,371 >>> mbox cmd response: failed
36,899,162 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
37,042,794 UART: ROM Non-Fatal Error: 0x000B001E
37,044,236 UART: [state] Locking Datavault
37,045,394 UART: [state] Locking PCR0, PCR1 and PCR31
37,046,936 UART: [state] Locking ICCM
37,047,849 UART: [exit] Launching FMC @ 0x40000130
37,049,280 UART:
37,049,463 UART: Running Caliptra FMC ...
37,050,575 UART:
37,050,738 UART: [state] CFI Enabled
37,051,575 UART: [art] Extend RT PCRs Done
37,052,713 UART: [art] Lock RT PCRs Done
37,053,727 UART: [art] Populate DV Done
37,054,696 UART: [fht] FMC Alias Private Key: 7
37,056,019 UART: [art] Derive CDI
37,056,755 UART: [art] Store in in slot 0x4
37,083,627 UART: [art] Derive Key Pair
37,084,668 UART: [art] Store priv key in slot 0x5
40,377,204 UART: [art] Derive Key Pair - Done
40,390,308 UART: [art] Signing Cert with AUTHO
40,391,613 UART: RITY.KEYID = 7
42,679,361 UART: [art] Erasing AUTHORITY.KEYID = 7
42,680,873 UART: [art] PUB.X = 90777096FE3A6BBB6D5B8B4444B5884294571CE435109D31A29EC0EB59FFE966CC73739DF9E4954FA5258399BA442E25
42,688,084 UART: [art] PUB.Y = 3BDA1DB506D453C89013479D6B55CC4E892208443518D9A97B3BCBF7C78B632C50271FF9E4DFE9B1E2FA66AAF4B0BB72
42,695,369 UART: [art] SIG.R = D589E283829F0B5BDBBE5EB5335739D0DFF257D9B72B181F59ACCB82243437797722DBBC045F18F960B99620EC661D1E
42,702,703 UART: [art] SIG.S = F64631B31A19C6789896603AC534B4B85AD7A3732B6932C7EB72BAC81156E4041652CA2951A34C84C9935598155640F0
44,007,857 UART: Caliptra RT
44,008,576 UART: [state] CFI Enabled
44,341,925 UART: [rt] RT listening for mailbox commands...
44,344,504 UART:
44,344,666 UART: Running Caliptra ROM ...
44,345,713 UART:
44,345,864 UART: [state] CFI Enabled
44,411,136 UART: [state] LifecycleState = Unprovisioned
44,413,061 UART: [state] DebugLocked = No
44,415,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,420,462 UART: [kat] SHA2-256
44,590,194 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,600,689 UART: [kat] ++
44,601,168 UART: [kat] sha1
44,612,264 UART: [kat] SHA2-256
44,614,953 UART: [kat] SHA2-384
44,620,776 UART: [kat] SHA2-512-ACC
44,623,176 UART: [kat] ECC-384
46,912,582 UART: [kat] HMAC-384Kdf
46,942,527 UART: [kat] LMS
48,132,917 UART: [kat] --
48,138,381 UART: [update-reset] ++
52,277,093 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,280,654 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
52,662,915 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,804,979 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,890,827 >>> mbox cmd response: success
17,892,731 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,584,696 UART:
23,585,369 UART: Running Caliptra FMC ...
23,586,510 UART:
23,586,665 UART: [state] CFI Enabled
23,649,281 UART: [fht] FMC Alias Private Key: 7
25,987,082 UART: [art] Extend RT PCRs Done
25,988,350 UART: [art] Lock RT PCRs Done
25,990,010 UART: [art] Populate DV Done
25,995,343 UART: [fht] FMC Alias Private Key: 7
25,996,938 UART: [art] Derive CDI
25,997,763 UART: [art] Store in in slot 0x4
26,057,390 UART: [art] Derive Key Pair
26,058,437 UART: [art] Store priv key in slot 0x5
29,350,599 UART: [art] Derive Key Pair - Done
29,363,435 UART: [art] Signing Cert with AUTHO
29,364,742 UART: RITY.KEYID = 7
31,651,676 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,184 UART: [art] PUB.X = 6186280D83A6E61F665DD5E79B0DBF4A22C6CBF86B466C3339DF9A59CAE951FDC63CDC443F3206489520686ED38C1CB7
31,660,444 UART: [art] PUB.Y = F24203CE40744BCE3349C0D4A269B25AAE3701B87E6A280273C7AB8A6B9A7437253BBF950848E0D26397BED66AC4A063
31,667,653 UART: [art] SIG.R = 3D778D2125FB0AA90A25B01CAC8C3CAE1D2F88206A411109E0D91A98D9445CCEA906D79ABCDF14F97DDF8BE5D024384F
31,675,051 UART: [art] SIG.S = CE02616F99D0A0F6C05B00659CD23DBE566114ABD0999832B45BD4D9523C46FEF7E465DC4A65832F565CF69913C37E55
32,980,734 UART: Caliptra RT
32,981,456 UART: [state] CFI Enabled
33,143,270 UART: [rt] RT listening for mailbox commands...
36,866,074 >>> mbox cmd response: failed
36,868,598 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
37,012,284 UART:
37,012,626 UART: Running Caliptra FMC ...
37,013,753 UART:
37,013,929 UART: [state] CFI Enabled
37,014,856 UART: [art] Extend RT PCRs Done
37,015,956 UART: [art] Lock RT PCRs Done
37,016,987 UART: [art] Populate DV Done
37,018,071 UART: [fht] FMC Alias Private Key: 7
37,019,402 UART: [art] Derive CDI
37,020,141 UART: [art] Store in in slot 0x4
37,042,622 UART: [art] Derive Key Pair
37,043,621 UART: [art] Store priv key in slot 0x5
40,337,311 UART: [art] Derive Key Pair - Done
40,350,369 UART: [art] Signing Cert with AUTHO
40,351,674 UART: RITY.KEYID = 7
42,638,145 UART: [art] Erasing AUTHORITY.KEYID = 7
42,639,652 UART: [art] PUB.X = 6186280D83A6E61F665DD5E79B0DBF4A22C6CBF86B466C3339DF9A59CAE951FDC63CDC443F3206489520686ED38C1CB7
42,646,905 UART: [art] PUB.Y = F24203CE40744BCE3349C0D4A269B25AAE3701B87E6A280273C7AB8A6B9A7437253BBF950848E0D26397BED66AC4A063
42,654,146 UART: [art] SIG.R = 3D778D2125FB0AA90A25B01CAC8C3CAE1D2F88206A411109E0D91A98D9445CCEA906D79ABCDF14F97DDF8BE5D024384F
42,661,539 UART: [art] SIG.S = CE02616F99D0A0F6C05B00659CD23DBE566114ABD0999832B45BD4D9523C46FEF7E465DC4A65832F565CF69913C37E55
43,966,498 UART: Caliptra RT
43,967,189 UART: [state] CFI Enabled
44,313,483 UART: [rt] RT listening for mailbox commands...
52,904,938 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,011 writing to cptra_bootfsm_go
193,376 UART:
194,182 UART: Running Caliptra ROM ...
195,291 UART:
604,608 UART: [state] CFI Enabled
615,970 UART: [state] LifecycleState = Unprovisioned
617,902 UART: [state] DebugLocked = No
620,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,080 UART: [kat] SHA2-256
794,821 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,375 UART: [kat] ++
805,833 UART: [kat] sha1
817,687 UART: [kat] SHA2-256
820,384 UART: [kat] SHA2-384
827,013 UART: [kat] SHA2-512-ACC
829,362 UART: [kat] ECC-384
3,111,578 UART: [kat] HMAC-384Kdf
3,123,424 UART: [kat] LMS
4,313,535 UART: [kat] --
4,319,741 UART: [cold-reset] ++
4,321,978 UART: [fht] Storing FHT @ 0x50003400
4,332,928 UART: [idev] ++
4,333,547 UART: [idev] CDI.KEYID = 6
4,334,611 UART: [idev] SUBJECT.KEYID = 7
4,335,823 UART: [idev] UDS.KEYID = 0
4,339,138 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,980 UART: [idev] Erasing UDS.KEYID = 0
7,626,520 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,131 UART: [idev] --
7,653,259 UART: [ldev] ++
7,653,905 UART: [ldev] CDI.KEYID = 6
7,654,826 UART: [ldev] SUBJECT.KEYID = 5
7,656,257 UART: [ldev] AUTHORITY.KEYID = 7
7,657,377 UART: [ldev] FE.KEYID = 1
7,666,539 UART: [ldev] Erasing FE.KEYID = 1
10,951,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,918 UART: [ldev] --
13,311,814 UART: [fwproc] Waiting for Commands...
13,314,802 UART: [fwproc] Received command 0x46574c44
13,317,064 UART: [fwproc] Received Image of size 114124 bytes
17,370,942 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,446,752 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,629 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,832,241 >>> mbox cmd response: success
17,834,398 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,978,092 UART: [afmc] ++
17,978,895 UART: [afmc] CDI.KEYID = 6
17,979,806 UART: [afmc] SUBJECT.KEYID = 7
17,980,923 UART: [afmc] AUTHORITY.KEYID = 5
21,152,536 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,816 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,108 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
23,460,615 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
23,475,424 UART: [afmc] SIG.R = 70DD329DB50192ACE87A6C10E1666FD5D3BD84C00AA8588EF82FC5A7305C574C4BB5029704E58EAEA71862E1752CC5F4
23,489,809 UART: [afmc] SIG.S = C2527B23317C57C01E8D1CBEE4ABD2C785E441D665A2C9DAA3E5CB0B9D451666EDB7D459C9DAEC3E09BCD9224F672B40
23,511,668 UART: [afmc] --
23,515,757 UART: [cold-reset] --
23,520,434 UART: [state] Locking Datavault
23,523,902 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,666 UART: [state] Locking ICCM
23,528,304 UART: [exit] Launching FMC @ 0x40000130
23,536,700 UART:
23,536,935 UART: Running Caliptra FMC ...
23,538,040 UART:
23,538,209 UART: [state] CFI Enabled
23,546,497 UART: [fht] FMC Alias Private Key: 7
25,877,418 UART: [art] Extend RT PCRs Done
25,879,077 UART: [art] Lock RT PCRs Done
25,880,317 UART: [art] Populate DV Done
25,885,424 UART: [fht] FMC Alias Private Key: 7
25,887,037 UART: [art] Derive CDI
25,887,864 UART: [art] Store in in slot 0x4
25,930,723 UART: [art] Derive Key Pair
25,931,773 UART: [art] Store priv key in slot 0x5
29,173,874 UART: [art] Derive Key Pair - Done
29,186,471 UART: [art] Signing Cert with AUTHO
29,187,842 UART: RITY.KEYID = 7
31,467,336 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,270 UART: [art] PUB.X = F9721B7D4162BA3E48DDC1B37EA13A37DE853C0347797D8935997CEA2AD520DF2F211C9C4EB0173A8BED1CE11C929AFE
31,476,475 UART: [art] PUB.Y = DA7982E150AC7249AC1F1B073117885A2C2AAA32ABFD00B125C11DB975590A8AAE8DB847D84E6323C40E928385F58CEB
31,483,350 UART: [art] SIG.R = D52BF7A66D2372C7094175305D5DE29B84523947AB4F3791468D102C54B9196BFDE98C2CDD7EEB91130F0A6099DF7F1E
31,490,731 UART: [art] SIG.S = C2D0474E103F807C9324D5EE5617039E591EC8A6ED851FFC5FF7552159C31C772FF2D2ADE8A6E58D5155A8B90396B924
32,795,840 UART: Caliptra RT
32,796,930 UART: [state] CFI Enabled
32,914,655 UART: [rt] RT listening for mailbox commands...
32,917,682 UART:
32,917,914 UART: Running Caliptra ROM ...
32,919,040 UART:
32,919,311 UART: [state] CFI Enabled
32,935,681 UART: [state] LifecycleState = Unprovisioned
32,937,622 UART: [state] DebugLocked = No
32,940,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,945,206 UART: [kat] SHA2-256
33,114,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,125,494 UART: [kat] ++
33,125,976 UART: [kat] sha1
33,135,843 UART: [kat] SHA2-256
33,138,541 UART: [kat] SHA2-384
33,145,345 UART: [kat] SHA2-512-ACC
33,147,688 UART: [kat] ECC-384
35,431,440 UART: [kat] HMAC-384Kdf
35,443,119 UART: [kat] LMS
36,633,195 UART: [kat] --
36,635,746 UART: [update-reset] ++
36,746,802 >>> mbox cmd response: failed
36,749,101 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,892,920 UART: ROM Non-Fatal Error: 0x000B001E
36,894,538 UART: [state] Locking Datavault
36,895,625 UART: [state] Locking PCR0, PCR1 and PCR31
36,897,170 UART: [state] Locking ICCM
36,898,091 UART: [exit] Launching FMC @ 0x40000130
36,899,527 UART:
36,899,699 UART: Running Caliptra FMC ...
36,900,799 UART:
36,900,965 UART: [state] CFI Enabled
36,901,885 UART: [art] Extend RT PCRs Done
36,903,024 UART: [art] Lock RT PCRs Done
36,904,105 UART: [art] Populate DV Done
36,905,155 UART: [fht] FMC Alias Private Key: 7
36,906,476 UART: [art] Derive CDI
36,907,215 UART: [art] Store in in slot 0x4
36,908,308 UART: [art] Derive Key Pair
36,909,216 UART: [art] Store priv key in slot 0x5
40,106,706 UART: [art] Derive Key Pair - Done
40,119,920 UART: [art] Signing Cert with AUTHO
40,121,434 UART: RITY.KEYID = 7
42,400,933 UART: [art] Erasing AUTHORITY.KEYID = 7
42,402,895 UART: [art] PUB.X = F9721B7D4162BA3E48DDC1B37EA13A37DE853C0347797D8935997CEA2AD520DF2F211C9C4EB0173A8BED1CE11C929AFE
42,409,766 UART: [art] PUB.Y = DA7982E150AC7249AC1F1B073117885A2C2AAA32ABFD00B125C11DB975590A8AAE8DB847D84E6323C40E928385F58CEB
42,416,976 UART: [art] SIG.R = D52BF7A66D2372C7094175305D5DE29B84523947AB4F3791468D102C54B9196BFDE98C2CDD7EEB91130F0A6099DF7F1E
42,424,335 UART: [art] SIG.S = C2D0474E103F807C9324D5EE5617039E591EC8A6ED851FFC5FF7552159C31C772FF2D2ADE8A6E58D5155A8B90396B924
43,729,600 UART: Caliptra RT
43,730,753 UART: [state] CFI Enabled
44,019,703 UART: [rt] RT listening for mailbox commands...
44,022,508 UART:
44,022,701 UART: Running Caliptra ROM ...
44,023,813 UART:
44,024,134 UART: [state] CFI Enabled
44,039,153 UART: [state] LifecycleState = Unprovisioned
44,041,121 UART: [state] DebugLocked = No
44,043,589 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,049,140 UART: [kat] SHA2-256
44,218,835 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,229,355 UART: [kat] ++
44,229,892 UART: [kat] sha1
44,239,546 UART: [kat] SHA2-256
44,242,219 UART: [kat] SHA2-384
44,248,197 UART: [kat] SHA2-512-ACC
44,250,560 UART: [kat] ECC-384
46,534,022 UART: [kat] HMAC-384Kdf
46,546,888 UART: [kat] LMS
47,736,986 UART: [kat] --
47,743,210 UART: [update-reset] ++
51,876,489 UART: [update-reset] Image verified using Vendor ECC Key Index 3
51,880,172 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
52,262,482 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
4,132,894 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,063,487 >>> mbox cmd response: success
18,065,954 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,703,642 UART:
23,704,075 UART: Running Caliptra FMC ...
23,705,185 UART:
23,705,347 UART: [state] CFI Enabled
23,713,583 UART: [fht] FMC Alias Private Key: 7
26,043,727 UART: [art] Extend RT PCRs Done
26,044,955 UART: [art] Lock RT PCRs Done
26,046,555 UART: [art] Populate DV Done
26,051,957 UART: [fht] FMC Alias Private Key: 7
26,053,605 UART: [art] Derive CDI
26,054,426 UART: [art] Store in in slot 0x4
26,096,982 UART: [art] Derive Key Pair
26,098,026 UART: [art] Store priv key in slot 0x5
29,340,147 UART: [art] Derive Key Pair - Done
29,353,056 UART: [art] Signing Cert with AUTHO
29,354,366 UART: RITY.KEYID = 7
31,633,397 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,909 UART: [art] PUB.X = 91464449A880DB6A6E3850F9ECB98A88C9EE6E008C8AC009F7816762E815F7689DDBDD6CCE798217AB9F9A672141B839
31,642,102 UART: [art] PUB.Y = 3ED751ADA5DF5DB61E3F5DF6B1C703F077D015942EB19D254D7BE60A60F46B066444CDA9BF39DC16E6A20176F4729BE7
31,649,374 UART: [art] SIG.R = 87E96F77CA0519B07BCA1E35C6E9AE92481933D6A148178122268D5A8C13524B2AE977654BDE398BF32F46027B8BF2C4
31,656,761 UART: [art] SIG.S = CE1679E79F161C6AAB127038C58A4C5CFAA10D1D714069C2FCF8623546E55E5756836B11FD9B4FF30D1A7203E1BBA282
32,961,537 UART: Caliptra RT
32,962,250 UART: [state] CFI Enabled
33,080,677 UART: [rt] RT listening for mailbox commands...
36,719,081 >>> mbox cmd response: failed
36,721,413 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
36,864,856 UART:
36,865,178 UART: Running Caliptra FMC ...
36,866,218 UART:
36,866,364 UART: [state] CFI Enabled
36,867,312 UART: [art] Extend RT PCRs Done
36,868,458 UART: [art] Lock RT PCRs Done
36,869,481 UART: [art] Populate DV Done
36,870,554 UART: [fht] FMC Alias Private Key: 7
36,871,797 UART: [art] Derive CDI
36,872,528 UART: [art] Store in in slot 0x4
36,873,702 UART: [art] Derive Key Pair
36,874,615 UART: [art] Store priv key in slot 0x5
40,076,024 UART: [art] Derive Key Pair - Done
40,088,928 UART: [art] Signing Cert with AUTHO
40,090,233 UART: RITY.KEYID = 7
42,369,466 UART: [art] Erasing AUTHORITY.KEYID = 7
42,370,981 UART: [art] PUB.X = 91464449A880DB6A6E3850F9ECB98A88C9EE6E008C8AC009F7816762E815F7689DDBDD6CCE798217AB9F9A672141B839
42,378,220 UART: [art] PUB.Y = 3ED751ADA5DF5DB61E3F5DF6B1C703F077D015942EB19D254D7BE60A60F46B066444CDA9BF39DC16E6A20176F4729BE7
42,385,495 UART: [art] SIG.R = 87E96F77CA0519B07BCA1E35C6E9AE92481933D6A148178122268D5A8C13524B2AE977654BDE398BF32F46027B8BF2C4
42,392,913 UART: [art] SIG.S = CE1679E79F161C6AAB127038C58A4C5CFAA10D1D714069C2FCF8623546E55E5756836B11FD9B4FF30D1A7203E1BBA282
43,698,579 UART: Caliptra RT
43,699,299 UART: [state] CFI Enabled
43,984,300 UART: [rt] RT listening for mailbox commands...
52,486,933 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,102 UART:
192,469 UART: Running Caliptra ROM ...
193,652 UART:
193,808 UART: [state] CFI Enabled
259,779 UART: [state] LifecycleState = Unprovisioned
261,674 UART: [state] DebugLocked = No
263,275 UART: [state] WD Timer not started. Device not locked for debugging
266,306 UART: [kat] SHA2-256
445,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,018 UART: [kat] ++
457,560 UART: [kat] sha1
467,907 UART: [kat] SHA2-256
470,921 UART: [kat] SHA2-384
478,356 UART: [kat] SHA2-512-ACC
481,341 UART: [kat] ECC-384
2,942,397 UART: [kat] HMAC-384Kdf
2,966,736 UART: [kat] LMS
3,496,149 UART: [kat] --
3,500,356 UART: [cold-reset] ++
3,501,696 UART: [fht] FHT @ 0x50003400
3,513,004 UART: [idev] ++
3,513,597 UART: [idev] CDI.KEYID = 6
3,514,479 UART: [idev] SUBJECT.KEYID = 7
3,515,692 UART: [idev] UDS.KEYID = 0
3,518,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,597 UART: [idev] Erasing UDS.KEYID = 0
6,020,411 UART: [idev] Sha1 KeyId Algorithm
6,042,836 UART: [idev] --
6,047,323 UART: [ldev] ++
6,047,894 UART: [ldev] CDI.KEYID = 6
6,048,784 UART: [ldev] SUBJECT.KEYID = 5
6,049,949 UART: [ldev] AUTHORITY.KEYID = 7
6,051,239 UART: [ldev] FE.KEYID = 1
6,094,543 UART: [ldev] Erasing FE.KEYID = 1
8,594,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,818 UART: [ldev] --
10,394,838 UART: [fwproc] Wait for Commands...
10,396,772 UART: [fwproc] Recv command 0x46574c44
10,398,871 UART: [fwproc] Recv'd Img size: 114448 bytes
13,802,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,876,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,263,046 >>> mbox cmd response: success
14,265,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,409,441 UART: [afmc] ++
14,410,081 UART: [afmc] CDI.KEYID = 6
14,410,977 UART: [afmc] SUBJECT.KEYID = 7
14,412,024 UART: [afmc] AUTHORITY.KEYID = 5
16,810,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,537,199 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,553,135 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,568,993 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,584,715 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,608,204 UART: [afmc] --
18,612,875 UART: [cold-reset] --
18,616,518 UART: [state] Locking Datavault
18,622,029 UART: [state] Locking PCR0, PCR1 and PCR31
18,623,685 UART: [state] Locking ICCM
18,625,998 UART: [exit] Launching FMC @ 0x40000130
18,634,446 UART:
18,634,685 UART: Running Caliptra FMC ...
18,635,787 UART:
18,635,947 UART: [state] CFI Enabled
18,693,467 UART: [fht] FMC Alias Private Key: 7
20,457,475 UART: [art] Extend RT PCRs Done
20,458,700 UART: [art] Lock RT PCRs Done
20,460,161 UART: [art] Populate DV Done
20,465,621 UART: [fht] FMC Alias Private Key: 7
20,467,158 UART: [art] Derive CDI
20,467,984 UART: [art] Store in in slot 0x4
20,526,350 UART: [art] Derive Key Pair
20,527,384 UART: [art] Store priv key in slot 0x5
22,990,725 UART: [art] Derive Key Pair - Done
23,003,996 UART: [art] Signing Cert with AUTHO
23,005,303 UART: RITY.KEYID = 7
24,716,263 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,769 UART: [art] PUB.X = E96F6F1B2858923B63298CAD7AA50E68545E53454A7B45EAA70209606C98859DB90B3EA254E96F88DE37E523ABF609A3
24,725,038 UART: [art] PUB.Y = 8CFF722B6CF11D21546396711521DF204373504902208F01A7BA91445B091888B096076A76DB80D69FDAE1CE4E6244C8
24,732,283 UART: [art] SIG.R = 98C142AD270F97513AB90C063680B42B4BB1ED51CFF10CF430A63ACCD3DC9B26FB016DBE14994C47490A8A8388FC3363
24,739,705 UART: [art] SIG.S = 1CB4E11B7A14597CF1837E1C2DE6B0D0369CBF6C4967BE515357EAAFBF714388B4E5AB2079B5E0302F553517F77F5F11
25,719,205 UART: Caliptra RT
25,719,914 UART: [state] CFI Enabled
25,885,420 UART: [rt] RT listening for mailbox commands...
25,888,704 UART:
25,888,959 UART: Running Caliptra ROM ...
25,890,065 UART:
25,890,223 UART: [state] CFI Enabled
25,951,038 UART: [state] LifecycleState = Unprovisioned
25,952,912 UART: [state] DebugLocked = No
25,955,375 UART: [state] WD Timer not started. Device not locked for debugging
25,959,548 UART: [kat] SHA2-256
26,138,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,150,250 UART: [kat] ++
26,150,785 UART: [kat] sha1
26,161,463 UART: [kat] SHA2-256
26,164,529 UART: [kat] SHA2-384
26,169,878 UART: [kat] SHA2-512-ACC
26,172,806 UART: [kat] ECC-384
28,637,623 UART: [kat] HMAC-384Kdf
28,660,107 UART: [kat] LMS
29,189,570 UART: [kat] --
29,193,938 UART: [update-reset] ++
29,240,800 >>> mbox cmd response: failed
29,242,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,386,583 UART: ROM Non-Fatal Error: 0x000B001E
29,388,008 UART: [state] Locking Datavault
29,389,167 UART: [state] Locking PCR0, PCR1 and PCR31
29,390,702 UART: [state] Locking ICCM
29,391,611 UART: [exit] Launching FMC @ 0x40000130
29,393,032 UART:
29,393,198 UART: Running Caliptra FMC ...
29,394,294 UART:
29,394,472 UART: [state] CFI Enabled
29,395,393 UART: [art] Extend RT PCRs Done
29,396,539 UART: [art] Lock RT PCRs Done
29,397,559 UART: [art] Populate DV Done
29,398,584 UART: [fht] FMC Alias Private Key: 7
29,399,901 UART: [art] Derive CDI
29,400,638 UART: [art] Store in in slot 0x4
29,424,984 UART: [art] Derive Key Pair
29,425,986 UART: [art] Store priv key in slot 0x5
31,889,026 UART: [art] Derive Key Pair - Done
31,902,093 UART: [art] Signing Cert with AUTHO
31,903,406 UART: RITY.KEYID = 7
33,613,978 UART: [art] Erasing AUTHORITY.KEYID = 7
33,615,477 UART: [art] PUB.X = E96F6F1B2858923B63298CAD7AA50E68545E53454A7B45EAA70209606C98859DB90B3EA254E96F88DE37E523ABF609A3
33,622,778 UART: [art] PUB.Y = 8CFF722B6CF11D21546396711521DF204373504902208F01A7BA91445B091888B096076A76DB80D69FDAE1CE4E6244C8
33,630,005 UART: [art] SIG.R = 98C142AD270F97513AB90C063680B42B4BB1ED51CFF10CF430A63ACCD3DC9B26FB016DBE14994C47490A8A8388FC3363
33,637,415 UART: [art] SIG.S = 1CB4E11B7A14597CF1837E1C2DE6B0D0369CBF6C4967BE515357EAAFBF714388B4E5AB2079B5E0302F553517F77F5F11
34,616,255 UART: Caliptra RT
34,617,001 UART: [state] CFI Enabled
34,954,807 UART: [rt] RT listening for mailbox commands...
34,957,436 UART:
34,957,686 UART: Running Caliptra ROM ...
34,958,793 UART:
34,958,962 UART: [state] CFI Enabled
35,019,606 UART: [state] LifecycleState = Unprovisioned
35,021,476 UART: [state] DebugLocked = No
35,024,004 UART: [state] WD Timer not started. Device not locked for debugging
35,027,915 UART: [kat] SHA2-256
35,207,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
35,218,565 UART: [kat] ++
35,219,108 UART: [kat] sha1
35,230,269 UART: [kat] SHA2-256
35,233,299 UART: [kat] SHA2-384
35,238,960 UART: [kat] SHA2-512-ACC
35,241,900 UART: [kat] ECC-384
37,704,912 UART: [kat] HMAC-384Kdf
37,725,775 UART: [kat] LMS
38,255,217 UART: [kat] --
38,259,282 UART: [update-reset] ++
41,686,253 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
41,690,140 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
42,073,433 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,384,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,058,887 >>> mbox cmd response: success
14,060,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,346,529 UART:
18,346,924 UART: Running Caliptra FMC ...
18,348,024 UART:
18,348,181 UART: [state] CFI Enabled
18,414,018 UART: [fht] FMC Alias Private Key: 7
20,178,156 UART: [art] Extend RT PCRs Done
20,179,375 UART: [art] Lock RT PCRs Done
20,180,786 UART: [art] Populate DV Done
20,186,150 UART: [fht] FMC Alias Private Key: 7
20,187,690 UART: [art] Derive CDI
20,188,455 UART: [art] Store in in slot 0x4
20,247,630 UART: [art] Derive Key Pair
20,248,670 UART: [art] Store priv key in slot 0x5
22,711,870 UART: [art] Derive Key Pair - Done
22,724,704 UART: [art] Signing Cert with AUTHO
22,726,015 UART: RITY.KEYID = 7
24,437,630 UART: [art] Erasing AUTHORITY.KEYID = 7
24,439,142 UART: [art] PUB.X = C14C5987696AC57A56EA46A0A4B7F740F9AFBD69823E2C8A1ED6A4FA11D422E49A624CBD4ABEB236857C905229E3DFD4
24,446,421 UART: [art] PUB.Y = 64A4E8D1E49AEB838D178DFB7D5975A2A4386E5BBD991A3413AE533B436EDFEEE9FC32C4C2C2A99B0939F4BC5A017D8D
24,453,681 UART: [art] SIG.R = EAF9F99F7C535AFEA669CAC4D3B62EDE4A51A6B4FB3F1EB5B15DA22AA8FC9A3EBF34BE33958DF28D51060187DD6DEA9F
24,461,130 UART: [art] SIG.S = 02BA8B25BDC24BAC7892CFF06DFC640DFCB8F7387EE4964E36405AF606707AD7419040242674B98D084A9DF938663C72
25,440,283 UART: Caliptra RT
25,440,971 UART: [state] CFI Enabled
25,619,614 UART: [rt] RT listening for mailbox commands...
28,838,156 >>> mbox cmd response: failed
28,839,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,983,808 UART:
28,984,126 UART: Running Caliptra FMC ...
28,985,164 UART:
28,985,311 UART: [state] CFI Enabled
28,986,180 UART: [art] Extend RT PCRs Done
28,987,325 UART: [art] Lock RT PCRs Done
28,988,411 UART: [art] Populate DV Done
28,989,460 UART: [fht] FMC Alias Private Key: 7
28,990,783 UART: [art] Derive CDI
28,991,517 UART: [art] Store in in slot 0x4
29,007,891 UART: [art] Derive Key Pair
29,008,886 UART: [art] Store priv key in slot 0x5
31,471,515 UART: [art] Derive Key Pair - Done
31,484,401 UART: [art] Signing Cert with AUTHO
31,485,717 UART: RITY.KEYID = 7
33,196,798 UART: [art] Erasing AUTHORITY.KEYID = 7
33,198,304 UART: [art] PUB.X = C14C5987696AC57A56EA46A0A4B7F740F9AFBD69823E2C8A1ED6A4FA11D422E49A624CBD4ABEB236857C905229E3DFD4
33,205,621 UART: [art] PUB.Y = 64A4E8D1E49AEB838D178DFB7D5975A2A4386E5BBD991A3413AE533B436EDFEEE9FC32C4C2C2A99B0939F4BC5A017D8D
33,212,883 UART: [art] SIG.R = EAF9F99F7C535AFEA669CAC4D3B62EDE4A51A6B4FB3F1EB5B15DA22AA8FC9A3EBF34BE33958DF28D51060187DD6DEA9F
33,220,313 UART: [art] SIG.S = 02BA8B25BDC24BAC7892CFF06DFC640DFCB8F7387EE4964E36405AF606707AD7419040242674B98D084A9DF938663C72
34,199,192 UART: Caliptra RT
34,199,911 UART: [state] CFI Enabled
34,534,983 UART: [rt] RT listening for mailbox commands...
41,527,103 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,476 writing to cptra_bootfsm_go
192,722 UART:
193,087 UART: Running Caliptra ROM ...
194,276 UART:
604,042 UART: [state] CFI Enabled
615,236 UART: [state] LifecycleState = Unprovisioned
617,089 UART: [state] DebugLocked = No
619,362 UART: [state] WD Timer not started. Device not locked for debugging
623,358 UART: [kat] SHA2-256
802,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,051 UART: [kat] ++
814,503 UART: [kat] sha1
825,159 UART: [kat] SHA2-256
828,212 UART: [kat] SHA2-384
833,536 UART: [kat] SHA2-512-ACC
836,508 UART: [kat] ECC-384
3,277,979 UART: [kat] HMAC-384Kdf
3,289,123 UART: [kat] LMS
3,818,643 UART: [kat] --
3,824,202 UART: [cold-reset] ++
3,825,761 UART: [fht] FHT @ 0x50003400
3,837,113 UART: [idev] ++
3,837,686 UART: [idev] CDI.KEYID = 6
3,838,597 UART: [idev] SUBJECT.KEYID = 7
3,839,811 UART: [idev] UDS.KEYID = 0
3,842,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,393 UART: [idev] Erasing UDS.KEYID = 0
6,313,284 UART: [idev] Sha1 KeyId Algorithm
6,337,104 UART: [idev] --
6,341,964 UART: [ldev] ++
6,342,536 UART: [ldev] CDI.KEYID = 6
6,343,445 UART: [ldev] SUBJECT.KEYID = 5
6,344,624 UART: [ldev] AUTHORITY.KEYID = 7
6,345,856 UART: [ldev] FE.KEYID = 1
6,358,230 UART: [ldev] Erasing FE.KEYID = 1
8,830,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,660 UART: [ldev] --
10,622,574 UART: [fwproc] Wait for Commands...
10,624,506 UART: [fwproc] Recv command 0x46574c44
10,626,548 UART: [fwproc] Recv'd Img size: 114448 bytes
14,026,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,103,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,062 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,139 >>> mbox cmd response: success
14,493,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,637,644 UART: [afmc] ++
14,638,304 UART: [afmc] CDI.KEYID = 6
14,639,384 UART: [afmc] SUBJECT.KEYID = 7
14,640,495 UART: [afmc] AUTHORITY.KEYID = 5
16,997,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,392 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,737,398 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,753,209 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,768,998 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,790,656 UART: [afmc] --
18,795,323 UART: [cold-reset] --
18,799,076 UART: [state] Locking Datavault
18,803,028 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,674 UART: [state] Locking ICCM
18,807,327 UART: [exit] Launching FMC @ 0x40000130
18,815,732 UART:
18,815,970 UART: Running Caliptra FMC ...
18,817,012 UART:
18,817,163 UART: [state] CFI Enabled
18,825,212 UART: [fht] FMC Alias Private Key: 7
20,582,189 UART: [art] Extend RT PCRs Done
20,583,411 UART: [art] Lock RT PCRs Done
20,585,331 UART: [art] Populate DV Done
20,590,846 UART: [fht] FMC Alias Private Key: 7
20,592,335 UART: [art] Derive CDI
20,593,098 UART: [art] Store in in slot 0x4
20,636,089 UART: [art] Derive Key Pair
20,637,134 UART: [art] Store priv key in slot 0x5
23,064,001 UART: [art] Derive Key Pair - Done
23,076,729 UART: [art] Signing Cert with AUTHO
23,078,083 UART: RITY.KEYID = 7
24,783,661 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,163 UART: [art] PUB.X = 403BCCABB9F3C8875C626276B85589AEBFC6D95FF56821A246DB461D57A23D84B552DDEC5940F0027CED4E8C7EEB2FC8
24,792,445 UART: [art] PUB.Y = 587D822EEC91FA59D05EC1434A370838901071E8E94BAA2D8FBE138FFDD5EF9C78EC693E33F81A911373B7342780C331
24,799,685 UART: [art] SIG.R = 1CA06865F677D230B6A1560EEDCF4496875810DABA2E069E659076E09333F7E5A573727766A52799C900615DAE4106B3
24,807,034 UART: [art] SIG.S = 2272FF65AE798758280D53327547587E7C8D3B0823E7656C25454941EF3B3304BA22C26A6B24C2DE3EEF7D5612C22915
25,785,877 UART: Caliptra RT
25,786,578 UART: [state] CFI Enabled
25,903,874 UART: [rt] RT listening for mailbox commands...
25,907,263 UART:
25,907,431 UART: Running Caliptra ROM ...
25,908,538 UART:
25,908,802 UART: [state] CFI Enabled
25,924,328 UART: [state] LifecycleState = Unprovisioned
25,926,208 UART: [state] DebugLocked = No
25,928,473 UART: [state] WD Timer not started. Device not locked for debugging
25,932,816 UART: [kat] SHA2-256
26,112,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,123,565 UART: [kat] ++
26,124,027 UART: [kat] sha1
26,135,507 UART: [kat] SHA2-256
26,138,518 UART: [kat] SHA2-384
26,144,445 UART: [kat] SHA2-512-ACC
26,147,385 UART: [kat] ECC-384
28,586,789 UART: [kat] HMAC-384Kdf
28,599,092 UART: [kat] LMS
29,128,611 UART: [kat] --
29,133,514 UART: [update-reset] ++
29,177,521 >>> mbox cmd response: failed
29,179,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,323,054 UART: ROM Non-Fatal Error: 0x000B001E
29,324,489 UART: [state] Locking Datavault
29,325,583 UART: [state] Locking PCR0, PCR1 and PCR31
29,327,122 UART: [state] Locking ICCM
29,327,998 UART: [exit] Launching FMC @ 0x40000130
29,329,337 UART:
29,329,485 UART: Running Caliptra FMC ...
29,330,581 UART:
29,330,732 UART: [state] CFI Enabled
29,331,566 UART: [art] Extend RT PCRs Done
29,332,618 UART: [art] Lock RT PCRs Done
29,333,639 UART: [art] Populate DV Done
29,334,667 UART: [fht] FMC Alias Private Key: 7
29,335,984 UART: [art] Derive CDI
29,336,717 UART: [art] Store in in slot 0x4
29,337,802 UART: [art] Derive Key Pair
29,338,739 UART: [art] Store priv key in slot 0x5
31,722,862 UART: [art] Derive Key Pair - Done
31,736,248 UART: [art] Signing Cert with AUTHO
31,737,544 UART: RITY.KEYID = 7
33,442,803 UART: [art] Erasing AUTHORITY.KEYID = 7
33,444,312 UART: [art] PUB.X = 403BCCABB9F3C8875C626276B85589AEBFC6D95FF56821A246DB461D57A23D84B552DDEC5940F0027CED4E8C7EEB2FC8
33,451,563 UART: [art] PUB.Y = 587D822EEC91FA59D05EC1434A370838901071E8E94BAA2D8FBE138FFDD5EF9C78EC693E33F81A911373B7342780C331
33,458,856 UART: [art] SIG.R = 1CA06865F677D230B6A1560EEDCF4496875810DABA2E069E659076E09333F7E5A573727766A52799C900615DAE4106B3
33,466,202 UART: [art] SIG.S = 2272FF65AE798758280D53327547587E7C8D3B0823E7656C25454941EF3B3304BA22C26A6B24C2DE3EEF7D5612C22915
34,445,179 UART: Caliptra RT
34,445,894 UART: [state] CFI Enabled
34,736,003 UART: [rt] RT listening for mailbox commands...
34,738,537 UART:
34,738,700 UART: Running Caliptra ROM ...
34,739,751 UART:
34,740,116 UART: [state] CFI Enabled
40,325,421 UART: [state] LifecycleState = Unprovisioned
40,327,338 UART: [state] DebugLocked = No
40,329,030 UART: [state] WD Timer not started. Device not locked for debugging
40,332,615 UART: [kat] SHA2-256
40,511,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,523,345 UART: [kat] ++
40,523,884 UART: [kat] sha1
40,536,290 UART: [kat] SHA2-256
40,539,363 UART: [kat] SHA2-384
40,545,557 UART: [kat] SHA2-512-ACC
40,548,492 UART: [kat] ECC-384
42,989,981 UART: [kat] HMAC-384Kdf
43,003,929 UART: [kat] LMS
43,533,498 UART: [kat] --
43,539,158 UART: [update-reset] ++
46,965,530 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
46,969,016 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
47,352,329 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
3,691,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,257,600 >>> mbox cmd response: success
14,259,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
18,509,110 UART:
18,509,923 UART: Running Caliptra FMC ...
18,511,076 UART:
18,511,242 UART: [state] CFI Enabled
18,518,827 UART: [fht] FMC Alias Private Key: 7
20,275,089 UART: [art] Extend RT PCRs Done
20,276,536 UART: [art] Lock RT PCRs Done
20,277,893 UART: [art] Populate DV Done
20,283,271 UART: [fht] FMC Alias Private Key: 7
20,284,921 UART: [art] Derive CDI
20,285,658 UART: [art] Store in in slot 0x4
20,328,016 UART: [art] Derive Key Pair
20,329,092 UART: [art] Store priv key in slot 0x5
22,755,967 UART: [art] Derive Key Pair - Done
22,769,282 UART: [art] Signing Cert with AUTHO
22,770,628 UART: RITY.KEYID = 7
24,476,313 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,819 UART: [art] PUB.X = 9DD608ACDA99BBB535FB57166356C6754D9C75EC57806C13094B6471AEE6B4902B095AAFDB4B483DDEC185F1FFE20CBF
24,485,080 UART: [art] PUB.Y = 90F5EF9A37B43FCF1FD1D99E0B47B7AE77F3D9F0429D6435524602C1767CD2C9644775EDF6E821B033A65507376A2D7E
24,492,367 UART: [art] SIG.R = 3BFE4608B6AA248681931EFFA806FD4243FE8E44D559C88B0D7FB45371F0FE7320E30865E094CACD0A696728CDBD78BA
24,499,770 UART: [art] SIG.S = 345FDB5A4312E91E8378F3F3F7E938658F558A7080D7CFD8BABFFFB37A0E9CD8917ED765B98682992638128F3F2A9D5D
25,478,608 UART: Caliptra RT
25,479,322 UART: [state] CFI Enabled
25,596,129 UART: [rt] RT listening for mailbox commands...
28,722,652 >>> mbox cmd response: failed
28,724,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,868,441 UART:
28,868,759 UART: Running Caliptra FMC ...
28,869,893 UART:
28,870,056 UART: [state] CFI Enabled
28,870,986 UART: [art] Extend RT PCRs Done
28,872,128 UART: [art] Lock RT PCRs Done
28,873,195 UART: [art] Populate DV Done
28,874,291 UART: [fht] FMC Alias Private Key: 7
28,875,616 UART: [art] Derive CDI
28,876,357 UART: [art] Store in in slot 0x4
28,877,527 UART: [art] Derive Key Pair
28,878,529 UART: [art] Store priv key in slot 0x5
31,260,909 UART: [art] Derive Key Pair - Done
31,273,715 UART: [art] Signing Cert with AUTHO
31,275,035 UART: RITY.KEYID = 7
32,980,403 UART: [art] Erasing AUTHORITY.KEYID = 7
32,981,909 UART: [art] PUB.X = 9DD608ACDA99BBB535FB57166356C6754D9C75EC57806C13094B6471AEE6B4902B095AAFDB4B483DDEC185F1FFE20CBF
32,989,153 UART: [art] PUB.Y = 90F5EF9A37B43FCF1FD1D99E0B47B7AE77F3D9F0429D6435524602C1767CD2C9644775EDF6E821B033A65507376A2D7E
32,996,444 UART: [art] SIG.R = 3BFE4608B6AA248681931EFFA806FD4243FE8E44D559C88B0D7FB45371F0FE7320E30865E094CACD0A696728CDBD78BA
33,003,831 UART: [art] SIG.S = 345FDB5A4312E91E8378F3F3F7E938658F558A7080D7CFD8BABFFFB37A0E9CD8917ED765B98682992638128F3F2A9D5D
33,982,700 UART: Caliptra RT
33,983,413 UART: [state] CFI Enabled
34,269,829 UART: [rt] RT listening for mailbox commands...
47,207,618 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,438,393 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,710,981 >>> mbox cmd response: success
14,712,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,001,839 UART:
19,002,258 UART: Running Caliptra FMC ...
19,003,365 UART:
19,003,522 UART: [state] CFI Enabled
19,070,832 UART: [fht] FMC Alias Private Key: 7
20,834,796 UART: [art] Extend RT PCRs Done
20,836,023 UART: [art] Lock RT PCRs Done
20,837,572 UART: [art] Populate DV Done
20,842,995 UART: [fht] FMC Alias Private Key: 7
20,844,535 UART: [art] Derive CDI
20,845,271 UART: [art] Store in in slot 0x4
20,903,474 UART: [art] Derive Key Pair
20,904,519 UART: [art] Store priv key in slot 0x5
23,367,159 UART: [art] Derive Key Pair - Done
23,380,174 UART: [art] Signing Cert with AUTHO
23,381,477 UART: RITY.KEYID = 7
25,092,688 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,338 UART: [art] PUB.X = 6F4B083E7B68897669A2BF89E5F0D7DC0245818D95D727BC86B871547F8AC88DEE664654C12F60901A16BF40F2BCA136
25,101,486 UART: [art] PUB.Y = 12E921895559253C172E8E3F17D1D0EB27FD690C74342C08950594ED61E667F5AD724D828EB5F48B1E1E7497A88E7D34
25,108,696 UART: [art] SIG.R = 361A6BC4F915FD2554B46E752AF63D2A81E16977E1A18273498A11955BC04482EC18C54B20037EE03211B8B94639739F
25,116,084 UART: [art] SIG.S = 807A8A7F61C1574B0CE8B39962806152DE16596D01CC32414E13979D41CB6E7BABE0064D992D0CDDE43B242EE3A9A3C3
26,094,971 UART: Caliptra RT
26,095,668 UART: [state] CFI Enabled
26,261,840 UART: [rt] RT listening for mailbox commands...
29,516,518 >>> mbox cmd response: failed
29,518,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,662,268 UART:
29,662,587 UART: Running Caliptra FMC ...
29,663,633 UART:
29,663,781 UART: [state] CFI Enabled
29,664,730 UART: [art] Extend RT PCRs Done
29,665,880 UART: [art] Lock RT PCRs Done
29,666,897 UART: [art] Populate DV Done
29,667,935 UART: [fht] FMC Alias Private Key: 7
29,669,262 UART: [art] Derive CDI
29,669,992 UART: [art] Store in in slot 0x4
29,692,957 UART: [art] Derive Key Pair
29,693,953 UART: [art] Store priv key in slot 0x5
32,156,716 UART: [art] Derive Key Pair - Done
32,169,820 UART: [art] Signing Cert with AUTHO
32,171,118 UART: RITY.KEYID = 7
33,882,343 UART: [art] Erasing AUTHORITY.KEYID = 7
33,883,857 UART: [art] PUB.X = 6F4B083E7B68897669A2BF89E5F0D7DC0245818D95D727BC86B871547F8AC88DEE664654C12F60901A16BF40F2BCA136
33,891,093 UART: [art] PUB.Y = 12E921895559253C172E8E3F17D1D0EB27FD690C74342C08950594ED61E667F5AD724D828EB5F48B1E1E7497A88E7D34
33,898,361 UART: [art] SIG.R = 361A6BC4F915FD2554B46E752AF63D2A81E16977E1A18273498A11955BC04482EC18C54B20037EE03211B8B94639739F
33,905,721 UART: [art] SIG.S = 807A8A7F61C1574B0CE8B39962806152DE16596D01CC32414E13979D41CB6E7BABE0064D992D0CDDE43B242EE3A9A3C3
34,884,664 UART: Caliptra RT
34,885,358 UART: [state] CFI Enabled
35,222,936 UART: [rt] RT listening for mailbox commands...
42,904,207 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,755,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,954,908 >>> mbox cmd response: success
14,956,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,214,347 UART:
19,214,746 UART: Running Caliptra FMC ...
19,215,837 UART:
19,216,000 UART: [state] CFI Enabled
19,223,875 UART: [fht] FMC Alias Private Key: 7
20,979,942 UART: [art] Extend RT PCRs Done
20,981,169 UART: [art] Lock RT PCRs Done
20,982,847 UART: [art] Populate DV Done
20,988,324 UART: [fht] FMC Alias Private Key: 7
20,990,003 UART: [art] Derive CDI
20,990,829 UART: [art] Store in in slot 0x4
21,033,483 UART: [art] Derive Key Pair
21,034,529 UART: [art] Store priv key in slot 0x5
23,461,636 UART: [art] Derive Key Pair - Done
23,474,940 UART: [art] Signing Cert with AUTHO
23,476,268 UART: RITY.KEYID = 7
25,181,554 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,058 UART: [art] PUB.X = 76084D18EBE8221C888F0924B59121AD0416422DEF0A97770C18965E4D4C67E615D4E973D8436181FE2A2D8B3CBC6AF0
25,190,314 UART: [art] PUB.Y = 33AE49944339E2912269650B422F3939969F64AB1482733632A2BDD36C3DA60095E7F20252BAECCF26BCEC2ACC9BBF04
25,197,545 UART: [art] SIG.R = FBB65995626008777AFCA4CDB5A0740F3D019B02945395A94056375A60094427564D238082C80C6732D322B85C918596
25,204,866 UART: [art] SIG.S = 9250FDCE83E74C033D6B1750EAEE074BCFAD905E2E301B91CAF9B5F1F5FC351DFF9C611A1DC68B23F4A7360A732C590D
26,183,363 UART: Caliptra RT
26,184,077 UART: [state] CFI Enabled
26,301,957 UART: [rt] RT listening for mailbox commands...
29,496,376 >>> mbox cmd response: failed
29,498,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,641,923 UART:
29,642,236 UART: Running Caliptra FMC ...
29,643,358 UART:
29,643,523 UART: [state] CFI Enabled
29,644,447 UART: [art] Extend RT PCRs Done
29,645,588 UART: [art] Lock RT PCRs Done
29,646,664 UART: [art] Populate DV Done
29,647,784 UART: [fht] FMC Alias Private Key: 7
29,649,108 UART: [art] Derive CDI
29,649,847 UART: [art] Store in in slot 0x4
29,651,019 UART: [art] Derive Key Pair
29,652,020 UART: [art] Store priv key in slot 0x5
32,034,588 UART: [art] Derive Key Pair - Done
32,047,599 UART: [art] Signing Cert with AUTHO
32,048,923 UART: RITY.KEYID = 7
33,754,614 UART: [art] Erasing AUTHORITY.KEYID = 7
33,756,145 UART: [art] PUB.X = 76084D18EBE8221C888F0924B59121AD0416422DEF0A97770C18965E4D4C67E615D4E973D8436181FE2A2D8B3CBC6AF0
33,763,397 UART: [art] PUB.Y = 33AE49944339E2912269650B422F3939969F64AB1482733632A2BDD36C3DA60095E7F20252BAECCF26BCEC2ACC9BBF04
33,770,593 UART: [art] SIG.R = FBB65995626008777AFCA4CDB5A0740F3D019B02945395A94056375A60094427564D238082C80C6732D322B85C918596
33,777,948 UART: [art] SIG.S = 9250FDCE83E74C033D6B1750EAEE074BCFAD905E2E301B91CAF9B5F1F5FC351DFF9C611A1DC68B23F4A7360A732C590D
34,756,746 UART: Caliptra RT
34,757,456 UART: [state] CFI Enabled
35,049,447 UART: [rt] RT listening for mailbox commands...
47,895,965 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,437 UART: [kat] SHA2-256
892,375 UART: [kat] SHA2-384
895,068 UART: [kat] SHA2-512-ACC
896,969 UART: [kat] ECC-384
902,598 UART: [kat] HMAC-384Kdf
907,192 UART: [kat] LMS
1,475,388 UART: [kat] --
1,476,119 UART: [cold-reset] ++
1,476,495 UART: [fht] Storing FHT @ 0x50003400
1,479,146 UART: [idev] ++
1,479,314 UART: [idev] CDI.KEYID = 6
1,479,674 UART: [idev] SUBJECT.KEYID = 7
1,480,098 UART: [idev] UDS.KEYID = 0
1,480,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,046 UART: [idev] Erasing UDS.KEYID = 0
1,504,756 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,518 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,521,005 UART: [ldev] Erasing FE.KEYID = 1
1,546,124 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,132 UART: [ldev] --
1,585,611 UART: [fwproc] Waiting for Commands...
1,586,460 UART: [fwproc] Received command 0x46574c44
1,587,251 UART: [fwproc] Received Image of size 114448 bytes
2,884,896 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,911,972 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,324 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,315 >>> mbox cmd response: success
3,077,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,078,393 UART: [afmc] ++
3,078,561 UART: [afmc] CDI.KEYID = 6
3,078,923 UART: [afmc] SUBJECT.KEYID = 7
3,079,348 UART: [afmc] AUTHORITY.KEYID = 5
3,113,957 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,141 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,921 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,136,633 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,142,544 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,148,251 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,156,215 UART: [afmc] --
3,157,315 UART: [cold-reset] --
3,158,289 UART: [state] Locking Datavault
3,159,252 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,856 UART: [state] Locking ICCM
3,160,288 UART: [exit] Launching FMC @ 0x40000130
3,165,617 UART:
3,165,633 UART: Running Caliptra FMC ...
3,166,041 UART:
3,166,095 UART: [state] CFI Enabled
3,176,540 UART: [fht] FMC Alias Private Key: 7
3,284,412 UART: [art] Extend RT PCRs Done
3,284,840 UART: [art] Lock RT PCRs Done
3,286,700 UART: [art] Populate DV Done
3,295,047 UART: [fht] FMC Alias Private Key: 7
3,295,993 UART: [art] Derive CDI
3,296,273 UART: [art] Store in in slot 0x4
3,382,106 UART: [art] Derive Key Pair
3,382,466 UART: [art] Store priv key in slot 0x5
3,395,546 UART: [art] Derive Key Pair - Done
3,410,227 UART: [art] Signing Cert with AUTHO
3,410,707 UART: RITY.KEYID = 7
3,426,023 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,788 UART: [art] PUB.X = 2F62FEE0A7BDD1D4175A1302ED7D93E3E8CEE1FA253CD447CF99D8924CB12249237D165253CA97D32E92530B3967C2AA
3,433,562 UART: [art] PUB.Y = 81F39FA7B41F588E6F31A0E5964D056120B319D7A2EE2C8CFE94426D0FAC35611B844398EE8E035B7BAD0C0918738E7A
3,440,503 UART: [art] SIG.R = D054A958AD81D04E8D64C486D5BA35E89E5F56BDA1011B4B41AC0DB5E4CBAF791FE57F5BD1D2DC073BE4F4448EA823EB
3,447,288 UART: [art] SIG.S = CBEE48E15FF9623508E6AA96E76FBAA3AAEDD1EB51A8FE07B4F55A9187A86CE6E080481DB7FB1E0155B5162E9436C1C2
3,470,734 UART: Caliptra RT
3,470,987 UART: [state] CFI Enabled
3,578,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,464 UART:
3,580,480 UART: Running Caliptra ROM ...
3,580,888 UART:
3,580,942 UART: [state] CFI Enabled
3,583,296 UART: [state] LifecycleState = Unprovisioned
3,583,951 UART: [state] DebugLocked = No
3,584,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,586,138 UART: [kat] SHA2-256
4,380,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,384,184 UART: [kat] ++
4,384,336 UART: [kat] sha1
4,388,496 UART: [kat] SHA2-256
4,390,434 UART: [kat] SHA2-384
4,393,259 UART: [kat] SHA2-512-ACC
4,395,159 UART: [kat] ECC-384
4,400,546 UART: [kat] HMAC-384Kdf
4,405,176 UART: [kat] LMS
4,973,372 UART: [kat] --
4,974,193 UART: [update-reset] ++
5,013,332 >>> mbox cmd response: failed
5,013,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,013,726 UART: ROM Non-Fatal Error: 0x000B001E
5,014,564 UART: [state] Locking Datavault
5,015,366 UART: [state] Locking PCR0, PCR1 and PCR31
5,015,970 UART: [state] Locking ICCM
5,016,572 UART: [exit] Launching FMC @ 0x40000130
5,021,901 UART:
5,021,917 UART: Running Caliptra FMC ...
5,022,325 UART:
5,022,379 UART: [state] CFI Enabled
5,111,654 UART: [art] Extend RT PCRs Done
5,112,082 UART: [art] Lock RT PCRs Done
5,113,157 UART: [art] Populate DV Done
5,121,222 UART: [fht] FMC Alias Private Key: 7
5,122,216 UART: [art] Derive CDI
5,122,496 UART: [art] Store in in slot 0x4
5,208,279 UART: [art] Derive Key Pair
5,208,639 UART: [art] Store priv key in slot 0x5
5,222,107 UART: [art] Derive Key Pair - Done
5,236,878 UART: [art] Signing Cert with AUTHO
5,237,358 UART: RITY.KEYID = 7
5,252,748 UART: [art] Erasing AUTHORITY.KEYID = 7
5,253,513 UART: [art] PUB.X = 2F62FEE0A7BDD1D4175A1302ED7D93E3E8CEE1FA253CD447CF99D8924CB12249237D165253CA97D32E92530B3967C2AA
5,260,287 UART: [art] PUB.Y = 81F39FA7B41F588E6F31A0E5964D056120B319D7A2EE2C8CFE94426D0FAC35611B844398EE8E035B7BAD0C0918738E7A
5,267,228 UART: [art] SIG.R = D054A958AD81D04E8D64C486D5BA35E89E5F56BDA1011B4B41AC0DB5E4CBAF791FE57F5BD1D2DC073BE4F4448EA823EB
5,274,013 UART: [art] SIG.S = CBEE48E15FF9623508E6AA96E76FBAA3AAEDD1EB51A8FE07B4F55A9187A86CE6E080481DB7FB1E0155B5162E9436C1C2
5,297,641 UART: Caliptra RT
5,297,894 UART: [state] CFI Enabled
5,578,304 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,579,814 UART:
5,579,830 UART: Running Caliptra ROM ...
5,580,238 UART:
5,580,292 UART: [state] CFI Enabled
5,582,950 UART: [state] LifecycleState = Unprovisioned
5,583,605 UART: [state] DebugLocked = No
5,584,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,585,644 UART: [kat] SHA2-256
6,379,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,383,690 UART: [kat] ++
6,383,842 UART: [kat] sha1
6,388,022 UART: [kat] SHA2-256
6,389,960 UART: [kat] SHA2-384
6,392,661 UART: [kat] SHA2-512-ACC
6,394,561 UART: [kat] ECC-384
6,400,244 UART: [kat] HMAC-384Kdf
6,404,818 UART: [kat] LMS
6,973,014 UART: [kat] --
6,973,647 UART: [update-reset] ++
8,310,208 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,311,462 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,461,512 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,491 >>> mbox cmd response: success
2,928,491 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,990,881 UART:
2,990,897 UART: Running Caliptra FMC ...
2,991,305 UART:
2,991,359 UART: [state] CFI Enabled
3,001,856 UART: [fht] FMC Alias Private Key: 7
3,110,028 UART: [art] Extend RT PCRs Done
3,110,456 UART: [art] Lock RT PCRs Done
3,111,958 UART: [art] Populate DV Done
3,120,169 UART: [fht] FMC Alias Private Key: 7
3,121,147 UART: [art] Derive CDI
3,121,427 UART: [art] Store in in slot 0x4
3,206,936 UART: [art] Derive Key Pair
3,207,296 UART: [art] Store priv key in slot 0x5
3,220,998 UART: [art] Derive Key Pair - Done
3,235,957 UART: [art] Signing Cert with AUTHO
3,236,437 UART: RITY.KEYID = 7
3,251,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,422 UART: [art] PUB.X = 404A12935AA9AE66F8B46C2020B944AB4612B22F222284120EA06F9E64C6164783525552ED139AF9C0D33EC23023EC27
3,259,183 UART: [art] PUB.Y = 133E59C2FF6BEB41D3279412379D1C09640E0C94E5B4B7248403D058C6F8D893FDE954B922CFB131FC97FC4A0509BD46
3,266,119 UART: [art] SIG.R = 31D807110BE902CB5BCC78E63CD868AD60D5CC06322AEC2A036D224092E358F71EBC8AB8D5D206A2A9429AD90679119B
3,272,876 UART: [art] SIG.S = 45B7D4011B7FDB196CF1D302766C522EE5F70E1BB47D11D632171C71F8D62865320861B522CD62DFA2B00B2F61D40933
3,297,141 UART: Caliptra RT
3,297,394 UART: [state] CFI Enabled
3,404,996 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,724,076 >>> mbox cmd response: failed
4,724,076 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,730,145 UART:
4,730,161 UART: Running Caliptra FMC ...
4,730,569 UART:
4,730,623 UART: [state] CFI Enabled
4,819,808 UART: [art] Extend RT PCRs Done
4,820,236 UART: [art] Lock RT PCRs Done
4,821,463 UART: [art] Populate DV Done
4,829,630 UART: [fht] FMC Alias Private Key: 7
4,830,728 UART: [art] Derive CDI
4,831,008 UART: [art] Store in in slot 0x4
4,917,081 UART: [art] Derive Key Pair
4,917,441 UART: [art] Store priv key in slot 0x5
4,930,885 UART: [art] Derive Key Pair - Done
4,945,602 UART: [art] Signing Cert with AUTHO
4,946,082 UART: RITY.KEYID = 7
4,961,158 UART: [art] Erasing AUTHORITY.KEYID = 7
4,961,923 UART: [art] PUB.X = 404A12935AA9AE66F8B46C2020B944AB4612B22F222284120EA06F9E64C6164783525552ED139AF9C0D33EC23023EC27
4,968,684 UART: [art] PUB.Y = 133E59C2FF6BEB41D3279412379D1C09640E0C94E5B4B7248403D058C6F8D893FDE954B922CFB131FC97FC4A0509BD46
4,975,620 UART: [art] SIG.R = 31D807110BE902CB5BCC78E63CD868AD60D5CC06322AEC2A036D224092E358F71EBC8AB8D5D206A2A9429AD90679119B
4,982,377 UART: [art] SIG.S = 45B7D4011B7FDB196CF1D302766C522EE5F70E1BB47D11D632171C71F8D62865320861B522CD62DFA2B00B2F61D40933
5,006,206 UART: Caliptra RT
5,006,459 UART: [state] CFI Enabled
5,288,877 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,052,937 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,956 UART: [kat] SHA2-256
881,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,002 UART: [kat] ++
886,154 UART: [kat] sha1
890,412 UART: [kat] SHA2-256
892,350 UART: [kat] SHA2-384
895,217 UART: [kat] SHA2-512-ACC
897,118 UART: [kat] ECC-384
902,807 UART: [kat] HMAC-384Kdf
907,505 UART: [kat] LMS
1,475,701 UART: [kat] --
1,476,376 UART: [cold-reset] ++
1,476,810 UART: [fht] Storing FHT @ 0x50003400
1,479,431 UART: [idev] ++
1,479,599 UART: [idev] CDI.KEYID = 6
1,479,959 UART: [idev] SUBJECT.KEYID = 7
1,480,383 UART: [idev] UDS.KEYID = 0
1,480,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,133 UART: [idev] Erasing UDS.KEYID = 0
1,505,183 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,583 UART: [idev] --
1,514,686 UART: [ldev] ++
1,514,854 UART: [ldev] CDI.KEYID = 6
1,515,217 UART: [ldev] SUBJECT.KEYID = 5
1,515,643 UART: [ldev] AUTHORITY.KEYID = 7
1,516,106 UART: [ldev] FE.KEYID = 1
1,521,378 UART: [ldev] Erasing FE.KEYID = 1
1,547,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,989 UART: [ldev] --
1,586,474 UART: [fwproc] Waiting for Commands...
1,587,297 UART: [fwproc] Received command 0x46574c44
1,588,088 UART: [fwproc] Received Image of size 114448 bytes
2,887,027 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,914,643 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,995 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,930 >>> mbox cmd response: success
3,079,930 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,081,044 UART: [afmc] ++
3,081,212 UART: [afmc] CDI.KEYID = 6
3,081,574 UART: [afmc] SUBJECT.KEYID = 7
3,081,999 UART: [afmc] AUTHORITY.KEYID = 5
3,116,410 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,122 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,138,834 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,144,745 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,150,452 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,158,362 UART: [afmc] --
3,159,386 UART: [cold-reset] --
3,159,994 UART: [state] Locking Datavault
3,161,327 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,931 UART: [state] Locking ICCM
3,162,581 UART: [exit] Launching FMC @ 0x40000130
3,167,910 UART:
3,167,926 UART: Running Caliptra FMC ...
3,168,334 UART:
3,168,477 UART: [state] CFI Enabled
3,179,344 UART: [fht] FMC Alias Private Key: 7
3,287,124 UART: [art] Extend RT PCRs Done
3,287,552 UART: [art] Lock RT PCRs Done
3,289,126 UART: [art] Populate DV Done
3,297,159 UART: [fht] FMC Alias Private Key: 7
3,298,325 UART: [art] Derive CDI
3,298,605 UART: [art] Store in in slot 0x4
3,383,940 UART: [art] Derive Key Pair
3,384,300 UART: [art] Store priv key in slot 0x5
3,397,824 UART: [art] Derive Key Pair - Done
3,412,607 UART: [art] Signing Cert with AUTHO
3,413,087 UART: RITY.KEYID = 7
3,428,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,938 UART: [art] PUB.X = C481F0BF62A34612203736DB0018FF90F0163F59BAA167CD991CF8C32C4EBC770B745F404BF5C15BDAD067D3A6C13BFE
3,435,697 UART: [art] PUB.Y = FBDF7DF8F37EEABD10EF5038840DAFCCC35E48325021C4E62CBBA0F35F1FC7D791CDF780C89B3CA672E1C9BC04E8C446
3,442,669 UART: [art] SIG.R = B3F5BB6FA7B065FF2127A066DACF392FF7436485E809A675C1E0EE41254E23F3FC4F38F101050A7786491FC503925EF8
3,449,428 UART: [art] SIG.S = D510F534882B499AE780B87C04EB7A1769FC2A831B5089467861E9B3AC3E275A3E654E5C5CB86C89A2F26189A0AD29B4
3,473,232 UART: Caliptra RT
3,473,577 UART: [state] CFI Enabled
3,581,079 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,992 UART:
3,583,008 UART: Running Caliptra ROM ...
3,583,416 UART:
3,583,557 UART: [state] CFI Enabled
3,586,341 UART: [state] LifecycleState = Unprovisioned
3,586,996 UART: [state] DebugLocked = No
3,587,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,319 UART: [kat] SHA2-256
4,383,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,365 UART: [kat] ++
4,387,517 UART: [kat] sha1
4,391,709 UART: [kat] SHA2-256
4,393,647 UART: [kat] SHA2-384
4,396,390 UART: [kat] SHA2-512-ACC
4,398,290 UART: [kat] ECC-384
4,404,095 UART: [kat] HMAC-384Kdf
4,408,695 UART: [kat] LMS
4,976,891 UART: [kat] --
4,977,716 UART: [update-reset] ++
5,016,765 >>> mbox cmd response: failed
5,016,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,017,217 UART: ROM Non-Fatal Error: 0x000B001E
5,017,983 UART: [state] Locking Datavault
5,018,607 UART: [state] Locking PCR0, PCR1 and PCR31
5,019,211 UART: [state] Locking ICCM
5,019,835 UART: [exit] Launching FMC @ 0x40000130
5,025,164 UART:
5,025,180 UART: Running Caliptra FMC ...
5,025,588 UART:
5,025,731 UART: [state] CFI Enabled
5,114,796 UART: [art] Extend RT PCRs Done
5,115,224 UART: [art] Lock RT PCRs Done
5,116,721 UART: [art] Populate DV Done
5,125,134 UART: [fht] FMC Alias Private Key: 7
5,126,082 UART: [art] Derive CDI
5,126,362 UART: [art] Store in in slot 0x4
5,211,999 UART: [art] Derive Key Pair
5,212,359 UART: [art] Store priv key in slot 0x5
5,225,757 UART: [art] Derive Key Pair - Done
5,240,698 UART: [art] Signing Cert with AUTHO
5,241,178 UART: RITY.KEYID = 7
5,256,362 UART: [art] Erasing AUTHORITY.KEYID = 7
5,257,127 UART: [art] PUB.X = C481F0BF62A34612203736DB0018FF90F0163F59BAA167CD991CF8C32C4EBC770B745F404BF5C15BDAD067D3A6C13BFE
5,263,886 UART: [art] PUB.Y = FBDF7DF8F37EEABD10EF5038840DAFCCC35E48325021C4E62CBBA0F35F1FC7D791CDF780C89B3CA672E1C9BC04E8C446
5,270,858 UART: [art] SIG.R = B3F5BB6FA7B065FF2127A066DACF392FF7436485E809A675C1E0EE41254E23F3FC4F38F101050A7786491FC503925EF8
5,277,617 UART: [art] SIG.S = D510F534882B499AE780B87C04EB7A1769FC2A831B5089467861E9B3AC3E275A3E654E5C5CB86C89A2F26189A0AD29B4
5,301,635 UART: Caliptra RT
5,301,980 UART: [state] CFI Enabled
5,581,108 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,582,864 UART:
5,582,880 UART: Running Caliptra ROM ...
5,583,288 UART:
5,583,429 UART: [state] CFI Enabled
5,586,097 UART: [state] LifecycleState = Unprovisioned
5,586,752 UART: [state] DebugLocked = No
5,587,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,589,175 UART: [kat] SHA2-256
6,383,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,387,221 UART: [kat] ++
6,387,373 UART: [kat] sha1
6,391,799 UART: [kat] SHA2-256
6,393,737 UART: [kat] SHA2-384
6,396,464 UART: [kat] SHA2-512-ACC
6,398,364 UART: [kat] ECC-384
6,403,947 UART: [kat] HMAC-384Kdf
6,408,539 UART: [kat] LMS
6,976,735 UART: [kat] --
6,977,950 UART: [update-reset] ++
8,312,929 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,313,995 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
8,464,045 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,952 >>> mbox cmd response: success
2,927,952 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,989,182 UART:
2,989,198 UART: Running Caliptra FMC ...
2,989,606 UART:
2,989,749 UART: [state] CFI Enabled
3,000,798 UART: [fht] FMC Alias Private Key: 7
3,109,028 UART: [art] Extend RT PCRs Done
3,109,456 UART: [art] Lock RT PCRs Done
3,110,880 UART: [art] Populate DV Done
3,119,145 UART: [fht] FMC Alias Private Key: 7
3,120,157 UART: [art] Derive CDI
3,120,437 UART: [art] Store in in slot 0x4
3,206,306 UART: [art] Derive Key Pair
3,206,666 UART: [art] Store priv key in slot 0x5
3,220,226 UART: [art] Derive Key Pair - Done
3,234,845 UART: [art] Signing Cert with AUTHO
3,235,325 UART: RITY.KEYID = 7
3,249,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,694 UART: [art] PUB.X = 646B0E77A9CDAB0B8D1895902DCF1F5EF2DAF66B7223F65E7172F5283A28970494097290113A92C8959C37D09E0CF707
3,257,444 UART: [art] PUB.Y = A698D389F8F24C93C045D3F318A307D21C6B1B1F7E3CDA0F7519441A60030D59D976F9C550E532193703DD2F2A850612
3,264,372 UART: [art] SIG.R = F294C518023B71DD5E01F1E38B9899FE34B0947E6C026C2D0762811B4860D13838F215E2D2248ED00EDFD861646F787F
3,271,123 UART: [art] SIG.S = 2CF51B0C42C8BF0F7AFA2A218BF88B800501FEDA810F52C8F30956F16111C1C7EDC5BA54285B0318F463C405849820C6
3,295,574 UART: Caliptra RT
3,295,919 UART: [state] CFI Enabled
3,404,518 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,723,433 >>> mbox cmd response: failed
4,723,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,729,316 UART:
4,729,332 UART: Running Caliptra FMC ...
4,729,740 UART:
4,729,883 UART: [state] CFI Enabled
4,819,254 UART: [art] Extend RT PCRs Done
4,819,682 UART: [art] Lock RT PCRs Done
4,820,981 UART: [art] Populate DV Done
4,829,236 UART: [fht] FMC Alias Private Key: 7
4,830,374 UART: [art] Derive CDI
4,830,654 UART: [art] Store in in slot 0x4
4,916,031 UART: [art] Derive Key Pair
4,916,391 UART: [art] Store priv key in slot 0x5
4,929,845 UART: [art] Derive Key Pair - Done
4,944,262 UART: [art] Signing Cert with AUTHO
4,944,742 UART: RITY.KEYID = 7
4,959,862 UART: [art] Erasing AUTHORITY.KEYID = 7
4,960,627 UART: [art] PUB.X = 646B0E77A9CDAB0B8D1895902DCF1F5EF2DAF66B7223F65E7172F5283A28970494097290113A92C8959C37D09E0CF707
4,967,377 UART: [art] PUB.Y = A698D389F8F24C93C045D3F318A307D21C6B1B1F7E3CDA0F7519441A60030D59D976F9C550E532193703DD2F2A850612
4,974,305 UART: [art] SIG.R = F294C518023B71DD5E01F1E38B9899FE34B0947E6C026C2D0762811B4860D13838F215E2D2248ED00EDFD861646F787F
4,981,056 UART: [art] SIG.S = 2CF51B0C42C8BF0F7AFA2A218BF88B800501FEDA810F52C8F30956F16111C1C7EDC5BA54285B0318F463C405849820C6
5,004,885 UART: Caliptra RT
5,005,230 UART: [state] CFI Enabled
5,287,341 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,050,342 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
892,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,119 UART: [kat] ++
897,271 UART: [kat] sha1
901,363 UART: [kat] SHA2-256
903,303 UART: [kat] SHA2-384
905,886 UART: [kat] SHA2-512-ACC
907,787 UART: [kat] ECC-384
917,738 UART: [kat] HMAC-384Kdf
922,326 UART: [kat] LMS
1,170,654 UART: [kat] --
1,171,503 UART: [cold-reset] ++
1,172,057 UART: [fht] FHT @ 0x50003400
1,174,660 UART: [idev] ++
1,174,828 UART: [idev] CDI.KEYID = 6
1,175,188 UART: [idev] SUBJECT.KEYID = 7
1,175,612 UART: [idev] UDS.KEYID = 0
1,175,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,400 UART: [idev] Erasing UDS.KEYID = 0
1,200,191 UART: [idev] Sha1 KeyId Algorithm
1,208,727 UART: [idev] --
1,209,835 UART: [ldev] ++
1,210,003 UART: [ldev] CDI.KEYID = 6
1,210,366 UART: [ldev] SUBJECT.KEYID = 5
1,210,792 UART: [ldev] AUTHORITY.KEYID = 7
1,211,255 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,242,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,734 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46574c44
1,283,106 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,001 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,422 >>> mbox cmd response: success
2,774,422 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,775,478 UART: [afmc] ++
2,775,646 UART: [afmc] CDI.KEYID = 6
2,776,008 UART: [afmc] SUBJECT.KEYID = 7
2,776,433 UART: [afmc] AUTHORITY.KEYID = 5
2,811,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,647 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,359 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,270 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,984 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,712 UART: [afmc] --
2,854,832 UART: [cold-reset] --
2,855,456 UART: [state] Locking Datavault
2,856,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,149 UART: [state] Locking ICCM
2,857,743 UART: [exit] Launching FMC @ 0x40000130
2,863,072 UART:
2,863,088 UART: Running Caliptra FMC ...
2,863,496 UART:
2,863,550 UART: [state] CFI Enabled
2,874,079 UART: [fht] FMC Alias Private Key: 7
2,981,953 UART: [art] Extend RT PCRs Done
2,982,381 UART: [art] Lock RT PCRs Done
2,984,015 UART: [art] Populate DV Done
2,992,132 UART: [fht] FMC Alias Private Key: 7
2,993,226 UART: [art] Derive CDI
2,993,506 UART: [art] Store in in slot 0x4
3,078,993 UART: [art] Derive Key Pair
3,079,353 UART: [art] Store priv key in slot 0x5
3,092,395 UART: [art] Derive Key Pair - Done
3,107,351 UART: [art] Signing Cert with AUTHO
3,107,831 UART: RITY.KEYID = 7
3,122,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,322 UART: [art] PUB.X = FD2C094A36558B343FCF547119FFBEAFD67593FD5D2AF763959FDFFEA8BDF1AC85775E2C61928C2FDF57A639FC4E7CA4
3,130,113 UART: [art] PUB.Y = 99982BDDB47FCA4630D2420FAE4690E011C580771AA080F6A6BF2A1CBE5A5649615C73419D17C8EFA4725F5158BDBF98
3,137,068 UART: [art] SIG.R = 8CCEECB7E8D5BE11FB026BF8C74C41A7288AD38C81404BC5E536B17C4B7DA869C1A5CA47FAE8ED3B3F9DB05FF4C12DDD
3,143,867 UART: [art] SIG.S = DE2A47C8F716E8C00293283C271E9F7D37F169F36BC4E90297E9547A82B57365BBC0FEC3642E2BE186975B9FA6B8A60B
3,167,527 UART: Caliptra RT
3,167,780 UART: [state] CFI Enabled
3,275,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,128 UART:
3,277,144 UART: Running Caliptra ROM ...
3,277,552 UART:
3,277,607 UART: [state] CFI Enabled
3,280,217 UART: [state] LifecycleState = Unprovisioned
3,280,872 UART: [state] DebugLocked = No
3,281,438 UART: [state] WD Timer not started. Device not locked for debugging
3,282,658 UART: [kat] SHA2-256
4,088,308 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,092,433 UART: [kat] ++
4,092,585 UART: [kat] sha1
4,096,797 UART: [kat] SHA2-256
4,098,737 UART: [kat] SHA2-384
4,101,560 UART: [kat] SHA2-512-ACC
4,103,460 UART: [kat] ECC-384
4,112,683 UART: [kat] HMAC-384Kdf
4,117,261 UART: [kat] LMS
4,365,589 UART: [kat] --
4,366,677 UART: [update-reset] ++
4,384,500 >>> mbox cmd response: failed
4,384,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,384,970 UART: ROM Non-Fatal Error: 0x000B001E
4,385,974 UART: [state] Locking Datavault
4,386,904 UART: [state] Locking PCR0, PCR1 and PCR31
4,387,508 UART: [state] Locking ICCM
4,387,930 UART: [exit] Launching FMC @ 0x40000130
4,393,259 UART:
4,393,275 UART: Running Caliptra FMC ...
4,393,683 UART:
4,393,737 UART: [state] CFI Enabled
4,482,432 UART: [art] Extend RT PCRs Done
4,482,860 UART: [art] Lock RT PCRs Done
4,484,123 UART: [art] Populate DV Done
4,492,528 UART: [fht] FMC Alias Private Key: 7
4,493,674 UART: [art] Derive CDI
4,493,954 UART: [art] Store in in slot 0x4
4,580,165 UART: [art] Derive Key Pair
4,580,525 UART: [art] Store priv key in slot 0x5
4,594,105 UART: [art] Derive Key Pair - Done
4,608,811 UART: [art] Signing Cert with AUTHO
4,609,291 UART: RITY.KEYID = 7
4,624,405 UART: [art] Erasing AUTHORITY.KEYID = 7
4,625,170 UART: [art] PUB.X = FD2C094A36558B343FCF547119FFBEAFD67593FD5D2AF763959FDFFEA8BDF1AC85775E2C61928C2FDF57A639FC4E7CA4
4,631,961 UART: [art] PUB.Y = 99982BDDB47FCA4630D2420FAE4690E011C580771AA080F6A6BF2A1CBE5A5649615C73419D17C8EFA4725F5158BDBF98
4,638,916 UART: [art] SIG.R = 8CCEECB7E8D5BE11FB026BF8C74C41A7288AD38C81404BC5E536B17C4B7DA869C1A5CA47FAE8ED3B3F9DB05FF4C12DDD
4,645,715 UART: [art] SIG.S = DE2A47C8F716E8C00293283C271E9F7D37F169F36BC4E90297E9547A82B57365BBC0FEC3642E2BE186975B9FA6B8A60B
4,670,321 UART: Caliptra RT
4,670,574 UART: [state] CFI Enabled
4,954,874 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,956,493 UART:
4,956,509 UART: Running Caliptra ROM ...
4,956,917 UART:
4,956,972 UART: [state] CFI Enabled
4,959,804 UART: [state] LifecycleState = Unprovisioned
4,960,459 UART: [state] DebugLocked = No
4,961,083 UART: [state] WD Timer not started. Device not locked for debugging
4,962,273 UART: [kat] SHA2-256
5,767,923 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,772,048 UART: [kat] ++
5,772,200 UART: [kat] sha1
5,776,408 UART: [kat] SHA2-256
5,778,348 UART: [kat] SHA2-384
5,781,197 UART: [kat] SHA2-512-ACC
5,783,097 UART: [kat] ECC-384
5,792,770 UART: [kat] HMAC-384Kdf
5,797,292 UART: [kat] LMS
6,045,620 UART: [kat] --
6,046,710 UART: [update-reset] ++
7,360,087 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,361,188 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,511,186 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,341 >>> mbox cmd response: success
2,626,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,689,271 UART:
2,689,287 UART: Running Caliptra FMC ...
2,689,695 UART:
2,689,749 UART: [state] CFI Enabled
2,700,236 UART: [fht] FMC Alias Private Key: 7
2,808,560 UART: [art] Extend RT PCRs Done
2,808,988 UART: [art] Lock RT PCRs Done
2,810,634 UART: [art] Populate DV Done
2,818,749 UART: [fht] FMC Alias Private Key: 7
2,819,897 UART: [art] Derive CDI
2,820,177 UART: [art] Store in in slot 0x4
2,905,698 UART: [art] Derive Key Pair
2,906,058 UART: [art] Store priv key in slot 0x5
2,919,280 UART: [art] Derive Key Pair - Done
2,934,044 UART: [art] Signing Cert with AUTHO
2,934,524 UART: RITY.KEYID = 7
2,949,374 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,139 UART: [art] PUB.X = 8C35AE5F701D44FE6DFA45C64D358A433CC3C15A298C6EEBDD37C1E615691C3C060810839D5FBA631B7352FFCB7FED1C
2,956,921 UART: [art] PUB.Y = 148C7DED18B05ACF05B0E9D8E9465B140A24F3D80A755DC66AAFA7A875292FFA38C152E32347D8115668D23EA2131DFC
2,963,872 UART: [art] SIG.R = AB6D55E84A0466C5280399457C31DFE8C70E3C3D5560D4B27A968A1D62953C6455CABE81E7B0E7556ED4D08DCD5808A7
2,970,636 UART: [art] SIG.S = 80E6DE177D5113BF93BD4C89E047AE17299FC6F338D09932BE8A2BC34B3E93AB8AD253692767343C69FE426BC70882C9
2,994,652 UART: Caliptra RT
2,994,905 UART: [state] CFI Enabled
3,102,725 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,283 >>> mbox cmd response: failed
4,096,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,101,950 UART:
4,101,966 UART: Running Caliptra FMC ...
4,102,374 UART:
4,102,428 UART: [state] CFI Enabled
4,191,313 UART: [art] Extend RT PCRs Done
4,191,741 UART: [art] Lock RT PCRs Done
4,193,074 UART: [art] Populate DV Done
4,201,327 UART: [fht] FMC Alias Private Key: 7
4,202,495 UART: [art] Derive CDI
4,202,775 UART: [art] Store in in slot 0x4
4,288,428 UART: [art] Derive Key Pair
4,288,788 UART: [art] Store priv key in slot 0x5
4,302,582 UART: [art] Derive Key Pair - Done
4,317,496 UART: [art] Signing Cert with AUTHO
4,317,976 UART: RITY.KEYID = 7
4,332,896 UART: [art] Erasing AUTHORITY.KEYID = 7
4,333,661 UART: [art] PUB.X = 8C35AE5F701D44FE6DFA45C64D358A433CC3C15A298C6EEBDD37C1E615691C3C060810839D5FBA631B7352FFCB7FED1C
4,340,443 UART: [art] PUB.Y = 148C7DED18B05ACF05B0E9D8E9465B140A24F3D80A755DC66AAFA7A875292FFA38C152E32347D8115668D23EA2131DFC
4,347,394 UART: [art] SIG.R = AB6D55E84A0466C5280399457C31DFE8C70E3C3D5560D4B27A968A1D62953C6455CABE81E7B0E7556ED4D08DCD5808A7
4,354,158 UART: [art] SIG.S = 80E6DE177D5113BF93BD4C89E047AE17299FC6F338D09932BE8A2BC34B3E93AB8AD253692767343C69FE426BC70882C9
4,378,482 UART: Caliptra RT
4,378,735 UART: [state] CFI Enabled
4,656,231 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,094,590 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
893,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,770 UART: [kat] ++
897,922 UART: [kat] sha1
902,080 UART: [kat] SHA2-256
904,020 UART: [kat] SHA2-384
906,853 UART: [kat] SHA2-512-ACC
908,754 UART: [kat] ECC-384
918,533 UART: [kat] HMAC-384Kdf
923,255 UART: [kat] LMS
1,171,583 UART: [kat] --
1,172,328 UART: [cold-reset] ++
1,172,744 UART: [fht] FHT @ 0x50003400
1,175,315 UART: [idev] ++
1,175,483 UART: [idev] CDI.KEYID = 6
1,175,843 UART: [idev] SUBJECT.KEYID = 7
1,176,267 UART: [idev] UDS.KEYID = 0
1,176,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,697 UART: [idev] Erasing UDS.KEYID = 0
1,201,552 UART: [idev] Sha1 KeyId Algorithm
1,210,008 UART: [idev] --
1,211,180 UART: [ldev] ++
1,211,348 UART: [ldev] CDI.KEYID = 6
1,211,711 UART: [ldev] SUBJECT.KEYID = 5
1,212,137 UART: [ldev] AUTHORITY.KEYID = 7
1,212,600 UART: [ldev] FE.KEYID = 1
1,217,804 UART: [ldev] Erasing FE.KEYID = 1
1,244,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,982 UART: [ldev] --
1,283,471 UART: [fwproc] Wait for Commands...
1,284,283 UART: [fwproc] Recv command 0x46574c44
1,285,011 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,611,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,735 >>> mbox cmd response: success
2,776,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,777,813 UART: [afmc] ++
2,777,981 UART: [afmc] CDI.KEYID = 6
2,778,343 UART: [afmc] SUBJECT.KEYID = 7
2,778,768 UART: [afmc] AUTHORITY.KEYID = 5
2,814,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,598 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,837,310 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,843,221 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,848,935 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,856,787 UART: [afmc] --
2,857,701 UART: [cold-reset] --
2,858,371 UART: [state] Locking Datavault
2,859,540 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,144 UART: [state] Locking ICCM
2,860,698 UART: [exit] Launching FMC @ 0x40000130
2,866,027 UART:
2,866,043 UART: Running Caliptra FMC ...
2,866,451 UART:
2,866,594 UART: [state] CFI Enabled
2,877,195 UART: [fht] FMC Alias Private Key: 7
2,985,063 UART: [art] Extend RT PCRs Done
2,985,491 UART: [art] Lock RT PCRs Done
2,987,105 UART: [art] Populate DV Done
2,995,148 UART: [fht] FMC Alias Private Key: 7
2,996,316 UART: [art] Derive CDI
2,996,596 UART: [art] Store in in slot 0x4
3,082,559 UART: [art] Derive Key Pair
3,082,919 UART: [art] Store priv key in slot 0x5
3,096,791 UART: [art] Derive Key Pair - Done
3,111,942 UART: [art] Signing Cert with AUTHO
3,112,422 UART: RITY.KEYID = 7
3,127,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,521 UART: [art] PUB.X = 411999041109B06FD3CA69D751EBCF09C46477332B26F6DE6CD42331C3AC73C9D36A2A6FD20F8A5EEE89B54DD6056277
3,135,282 UART: [art] PUB.Y = 521268DD95F73C495E2C14ECC6BAF965FEABC815DC956F2B48351A657D670630E26D6E4F115797B9284E017E57AF2DB6
3,142,232 UART: [art] SIG.R = CFD4FBF2DA73DA6ECE02CE6A54DDF1F3401F8CF5E322F5086BE45EA62D461B7D2CE367913BAF0CE9DB3FDEEFB5733209
3,149,022 UART: [art] SIG.S = 9D867EE9AFA2ED3384121AB4A9ED9B17C8B80E5415970D5EABD0B10C504F0D5C8C18957DE39ACD7BC33668FC8C119229
3,172,469 UART: Caliptra RT
3,172,814 UART: [state] CFI Enabled
3,280,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,080 UART:
3,283,096 UART: Running Caliptra ROM ...
3,283,504 UART:
3,283,646 UART: [state] CFI Enabled
3,286,646 UART: [state] LifecycleState = Unprovisioned
3,287,301 UART: [state] DebugLocked = No
3,287,799 UART: [state] WD Timer not started. Device not locked for debugging
3,288,963 UART: [kat] SHA2-256
4,094,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,098,738 UART: [kat] ++
4,098,890 UART: [kat] sha1
4,102,972 UART: [kat] SHA2-256
4,104,912 UART: [kat] SHA2-384
4,107,589 UART: [kat] SHA2-512-ACC
4,109,489 UART: [kat] ECC-384
4,119,292 UART: [kat] HMAC-384Kdf
4,124,038 UART: [kat] LMS
4,372,366 UART: [kat] --
4,373,030 UART: [update-reset] ++
4,389,745 >>> mbox cmd response: failed
4,389,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,390,237 UART: ROM Non-Fatal Error: 0x000B001E
4,391,133 UART: [state] Locking Datavault
4,391,919 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,523 UART: [state] Locking ICCM
4,393,107 UART: [exit] Launching FMC @ 0x40000130
4,398,436 UART:
4,398,452 UART: Running Caliptra FMC ...
4,398,860 UART:
4,399,003 UART: [state] CFI Enabled
4,488,274 UART: [art] Extend RT PCRs Done
4,488,702 UART: [art] Lock RT PCRs Done
4,489,987 UART: [art] Populate DV Done
4,498,036 UART: [fht] FMC Alias Private Key: 7
4,498,994 UART: [art] Derive CDI
4,499,274 UART: [art] Store in in slot 0x4
4,584,495 UART: [art] Derive Key Pair
4,584,855 UART: [art] Store priv key in slot 0x5
4,598,447 UART: [art] Derive Key Pair - Done
4,613,056 UART: [art] Signing Cert with AUTHO
4,613,536 UART: RITY.KEYID = 7
4,628,798 UART: [art] Erasing AUTHORITY.KEYID = 7
4,629,563 UART: [art] PUB.X = 411999041109B06FD3CA69D751EBCF09C46477332B26F6DE6CD42331C3AC73C9D36A2A6FD20F8A5EEE89B54DD6056277
4,636,324 UART: [art] PUB.Y = 521268DD95F73C495E2C14ECC6BAF965FEABC815DC956F2B48351A657D670630E26D6E4F115797B9284E017E57AF2DB6
4,643,274 UART: [art] SIG.R = CFD4FBF2DA73DA6ECE02CE6A54DDF1F3401F8CF5E322F5086BE45EA62D461B7D2CE367913BAF0CE9DB3FDEEFB5733209
4,650,064 UART: [art] SIG.S = 9D867EE9AFA2ED3384121AB4A9ED9B17C8B80E5415970D5EABD0B10C504F0D5C8C18957DE39ACD7BC33668FC8C119229
4,674,661 UART: Caliptra RT
4,675,006 UART: [state] CFI Enabled
4,958,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,959,687 UART:
4,959,703 UART: Running Caliptra ROM ...
4,960,111 UART:
4,960,253 UART: [state] CFI Enabled
4,962,647 UART: [state] LifecycleState = Unprovisioned
4,963,302 UART: [state] DebugLocked = No
4,964,006 UART: [state] WD Timer not started. Device not locked for debugging
4,965,174 UART: [kat] SHA2-256
5,770,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,774,949 UART: [kat] ++
5,775,101 UART: [kat] sha1
5,779,419 UART: [kat] SHA2-256
5,781,359 UART: [kat] SHA2-384
5,783,888 UART: [kat] SHA2-512-ACC
5,785,788 UART: [kat] ECC-384
5,795,157 UART: [kat] HMAC-384Kdf
5,799,839 UART: [kat] LMS
6,048,167 UART: [kat] --
6,049,017 UART: [update-reset] ++
7,361,552 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,362,687 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,512,685 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,756 >>> mbox cmd response: success
2,629,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,692,834 UART:
2,692,850 UART: Running Caliptra FMC ...
2,693,258 UART:
2,693,401 UART: [state] CFI Enabled
2,703,546 UART: [fht] FMC Alias Private Key: 7
2,812,012 UART: [art] Extend RT PCRs Done
2,812,440 UART: [art] Lock RT PCRs Done
2,813,966 UART: [art] Populate DV Done
2,822,197 UART: [fht] FMC Alias Private Key: 7
2,823,137 UART: [art] Derive CDI
2,823,417 UART: [art] Store in in slot 0x4
2,909,088 UART: [art] Derive Key Pair
2,909,448 UART: [art] Store priv key in slot 0x5
2,923,378 UART: [art] Derive Key Pair - Done
2,938,440 UART: [art] Signing Cert with AUTHO
2,938,920 UART: RITY.KEYID = 7
2,954,228 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,993 UART: [art] PUB.X = 3C52BFFFFC73DEC59A6E8EB213D4C09D1498384548248F188520EC1CC8DA3440EA78800D4FAE3111BD456097FF241884
2,961,766 UART: [art] PUB.Y = 5F495BF3798A1AED70A51F7318E277A22EDDD36414DB806F8DACE1257BA8C15B703991D6BEBD27733DD804C99D79A3BE
2,968,727 UART: [art] SIG.R = 5B7C2461474E7770F5C24D9685F30B9F54A7A8F26B866403EDD9F0CF5B5ED26EBB08B9DBE5980860F9F178E2D223C2F7
2,975,493 UART: [art] SIG.S = 131FB08200FC2EEC346BC22F20708E35849ACBAB41B02F43E43BEB5922DAB9BC046B7F81C7FB64A46733E536027859CD
2,999,834 UART: Caliptra RT
3,000,179 UART: [state] CFI Enabled
3,109,106 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,104,021 >>> mbox cmd response: failed
4,104,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,109,860 UART:
4,109,876 UART: Running Caliptra FMC ...
4,110,284 UART:
4,110,427 UART: [state] CFI Enabled
4,199,652 UART: [art] Extend RT PCRs Done
4,200,080 UART: [art] Lock RT PCRs Done
4,201,157 UART: [art] Populate DV Done
4,209,124 UART: [fht] FMC Alias Private Key: 7
4,210,286 UART: [art] Derive CDI
4,210,566 UART: [art] Store in in slot 0x4
4,296,397 UART: [art] Derive Key Pair
4,296,757 UART: [art] Store priv key in slot 0x5
4,310,029 UART: [art] Derive Key Pair - Done
4,324,699 UART: [art] Signing Cert with AUTHO
4,325,179 UART: RITY.KEYID = 7
4,340,073 UART: [art] Erasing AUTHORITY.KEYID = 7
4,340,838 UART: [art] PUB.X = 3C52BFFFFC73DEC59A6E8EB213D4C09D1498384548248F188520EC1CC8DA3440EA78800D4FAE3111BD456097FF241884
4,347,611 UART: [art] PUB.Y = 5F495BF3798A1AED70A51F7318E277A22EDDD36414DB806F8DACE1257BA8C15B703991D6BEBD27733DD804C99D79A3BE
4,354,572 UART: [art] SIG.R = 5B7C2461474E7770F5C24D9685F30B9F54A7A8F26B866403EDD9F0CF5B5ED26EBB08B9DBE5980860F9F178E2D223C2F7
4,361,338 UART: [art] SIG.S = 131FB08200FC2EEC346BC22F20708E35849ACBAB41B02F43E43BEB5922DAB9BC046B7F81C7FB64A46733E536027859CD
4,385,537 UART: Caliptra RT
4,385,882 UART: [state] CFI Enabled
4,666,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,105,157 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
891,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,653 UART: [kat] ++
895,805 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,666 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,940 UART: [kat] LMS
1,169,252 UART: [kat] --
1,170,293 UART: [cold-reset] ++
1,170,699 UART: [fht] FHT @ 0x50003400
1,173,307 UART: [idev] ++
1,173,475 UART: [idev] CDI.KEYID = 6
1,173,836 UART: [idev] SUBJECT.KEYID = 7
1,174,261 UART: [idev] UDS.KEYID = 0
1,174,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,265 UART: [idev] Erasing UDS.KEYID = 0
1,198,995 UART: [idev] Sha1 KeyId Algorithm
1,207,937 UART: [idev] --
1,209,156 UART: [ldev] ++
1,209,324 UART: [ldev] CDI.KEYID = 6
1,209,688 UART: [ldev] SUBJECT.KEYID = 5
1,210,115 UART: [ldev] AUTHORITY.KEYID = 7
1,210,578 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,242,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,590 UART: [ldev] --
1,282,072 UART: [fwproc] Wait for Commands...
1,282,825 UART: [fwproc] Recv command 0x46574c44
1,283,558 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,179 >>> mbox cmd response: success
2,775,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,776,302 UART: [afmc] ++
2,776,470 UART: [afmc] CDI.KEYID = 6
2,776,833 UART: [afmc] SUBJECT.KEYID = 7
2,777,259 UART: [afmc] AUTHORITY.KEYID = 5
2,812,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,759 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,472 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,381 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,847,095 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,936 UART: [afmc] --
2,855,912 UART: [cold-reset] --
2,856,650 UART: [state] Locking Datavault
2,858,051 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,655 UART: [state] Locking ICCM
2,859,149 UART: [exit] Launching FMC @ 0x40000130
2,864,478 UART:
2,864,494 UART: Running Caliptra FMC ...
2,864,902 UART:
2,864,956 UART: [state] CFI Enabled
2,875,793 UART: [fht] FMC Alias Private Key: 7
2,983,067 UART: [art] Extend RT PCRs Done
2,983,495 UART: [art] Lock RT PCRs Done
2,985,123 UART: [art] Populate DV Done
2,993,514 UART: [fht] FMC Alias Private Key: 7
2,994,574 UART: [art] Derive CDI
2,994,854 UART: [art] Store in in slot 0x4
3,080,243 UART: [art] Derive Key Pair
3,080,603 UART: [art] Store priv key in slot 0x5
3,094,007 UART: [art] Derive Key Pair - Done
3,108,551 UART: [art] Signing Cert with AUTHO
3,109,031 UART: RITY.KEYID = 7
3,124,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,870 UART: [art] PUB.X = B259C00C883E6763A66701AF46B2BBB834E098F896D308933ECD9F72128BC69E767AF30DE935AA9BE3B9A942C58549C4
3,131,632 UART: [art] PUB.Y = D2214E44A6E83D93C429947608B7A2A8F31FACDC8E1633EADC5817FE0E3552321F9203FEB2F59DBA5BED24E9C1A1A452
3,138,587 UART: [art] SIG.R = 0EF45EEB53C698E97D85C500B7C2339EE34056FD38AAFBB86B983F613D3331EB2049E88C6AB3D6F7CF93467AD7AD9626
3,145,344 UART: [art] SIG.S = 9EB527B6DD63E48349E05B5925238B3B4236E16612F554E5DF8BB654D386885600395771C445AF5B34B37C19DEBEF0D0
3,169,183 UART: Caliptra RT
3,169,436 UART: [state] CFI Enabled
3,276,505 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,319 UART:
3,278,335 UART: Running Caliptra ROM ...
3,278,743 UART:
3,278,798 UART: [state] CFI Enabled
3,281,174 UART: [state] LifecycleState = Unprovisioned
3,281,829 UART: [state] DebugLocked = No
3,282,315 UART: [state] WD Timer not started. Device not locked for debugging
3,283,611 UART: [kat] SHA2-256
4,087,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,290 UART: [kat] ++
4,091,442 UART: [kat] sha1
4,095,550 UART: [kat] SHA2-256
4,097,490 UART: [kat] SHA2-384
4,100,201 UART: [kat] SHA2-512-ACC
4,102,101 UART: [kat] ECC-384
4,111,438 UART: [kat] HMAC-384Kdf
4,116,192 UART: [kat] LMS
4,364,504 UART: [kat] --
4,365,692 UART: [update-reset] ++
4,382,224 >>> mbox cmd response: failed
4,382,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,382,446 UART: ROM Non-Fatal Error: 0x000B001E
4,383,386 UART: [state] Locking Datavault
4,384,262 UART: [state] Locking PCR0, PCR1 and PCR31
4,384,866 UART: [state] Locking ICCM
4,385,530 UART: [exit] Launching FMC @ 0x40000130
4,390,859 UART:
4,390,875 UART: Running Caliptra FMC ...
4,391,283 UART:
4,391,337 UART: [state] CFI Enabled
4,480,782 UART: [art] Extend RT PCRs Done
4,481,210 UART: [art] Lock RT PCRs Done
4,482,811 UART: [art] Populate DV Done
4,491,086 UART: [fht] FMC Alias Private Key: 7
4,492,064 UART: [art] Derive CDI
4,492,344 UART: [art] Store in in slot 0x4
4,578,303 UART: [art] Derive Key Pair
4,578,663 UART: [art] Store priv key in slot 0x5
4,591,809 UART: [art] Derive Key Pair - Done
4,606,551 UART: [art] Signing Cert with AUTHO
4,607,031 UART: RITY.KEYID = 7
4,621,903 UART: [art] Erasing AUTHORITY.KEYID = 7
4,622,668 UART: [art] PUB.X = B259C00C883E6763A66701AF46B2BBB834E098F896D308933ECD9F72128BC69E767AF30DE935AA9BE3B9A942C58549C4
4,629,430 UART: [art] PUB.Y = D2214E44A6E83D93C429947608B7A2A8F31FACDC8E1633EADC5817FE0E3552321F9203FEB2F59DBA5BED24E9C1A1A452
4,636,385 UART: [art] SIG.R = 0EF45EEB53C698E97D85C500B7C2339EE34056FD38AAFBB86B983F613D3331EB2049E88C6AB3D6F7CF93467AD7AD9626
4,643,142 UART: [art] SIG.S = 9EB527B6DD63E48349E05B5925238B3B4236E16612F554E5DF8BB654D386885600395771C445AF5B34B37C19DEBEF0D0
4,666,951 UART: Caliptra RT
4,667,204 UART: [state] CFI Enabled
4,950,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,952,152 UART:
4,952,168 UART: Running Caliptra ROM ...
4,952,576 UART:
4,952,631 UART: [state] CFI Enabled
4,955,105 UART: [state] LifecycleState = Unprovisioned
4,955,760 UART: [state] DebugLocked = No
4,956,366 UART: [state] WD Timer not started. Device not locked for debugging
4,957,658 UART: [kat] SHA2-256
5,761,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,765,337 UART: [kat] ++
5,765,489 UART: [kat] sha1
5,769,753 UART: [kat] SHA2-256
5,771,693 UART: [kat] SHA2-384
5,774,344 UART: [kat] SHA2-512-ACC
5,776,244 UART: [kat] ECC-384
5,785,819 UART: [kat] HMAC-384Kdf
5,790,479 UART: [kat] LMS
6,038,791 UART: [kat] --
6,039,759 UART: [update-reset] ++
7,353,086 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,354,071 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,504,069 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,807 >>> mbox cmd response: success
2,622,807 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,684,925 UART:
2,684,941 UART: Running Caliptra FMC ...
2,685,349 UART:
2,685,403 UART: [state] CFI Enabled
2,695,804 UART: [fht] FMC Alias Private Key: 7
2,803,274 UART: [art] Extend RT PCRs Done
2,803,702 UART: [art] Lock RT PCRs Done
2,805,402 UART: [art] Populate DV Done
2,813,471 UART: [fht] FMC Alias Private Key: 7
2,814,517 UART: [art] Derive CDI
2,814,797 UART: [art] Store in in slot 0x4
2,900,286 UART: [art] Derive Key Pair
2,900,646 UART: [art] Store priv key in slot 0x5
2,913,934 UART: [art] Derive Key Pair - Done
2,929,103 UART: [art] Signing Cert with AUTHO
2,929,583 UART: RITY.KEYID = 7
2,944,515 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,280 UART: [art] PUB.X = E9DE892D9CDA727F0843C4C35C1385989D9282AD1BA9A34A1F70BDFEDC5CC5E9FDAA47CDAFF9872AD6B47A7197005029
2,952,045 UART: [art] PUB.Y = 847DD1B63C9944897750DD05E982E54215F529C3231B8D663FE1D7F87AEA5B13868D270247C250F118D66E1169BD6406
2,958,978 UART: [art] SIG.R = 6CEA021F6E15ABB9BDB02CBC02E2D888E59A648B5122CE4E0205743A1E5CF05D3865AAA4C1F9730AF3F8F3FCCD3B71E4
2,965,755 UART: [art] SIG.S = 2039A8F97C560EEEE9CD2657D8AD5962BC8E12C8C2B370F884F2621D1FA7DB04F3939AF0A93198F3000970B658093744
2,989,780 UART: Caliptra RT
2,990,033 UART: [state] CFI Enabled
3,097,944 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,301 >>> mbox cmd response: failed
4,087,301 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,092,890 UART:
4,092,906 UART: Running Caliptra FMC ...
4,093,314 UART:
4,093,368 UART: [state] CFI Enabled
4,182,747 UART: [art] Extend RT PCRs Done
4,183,175 UART: [art] Lock RT PCRs Done
4,184,374 UART: [art] Populate DV Done
4,192,737 UART: [fht] FMC Alias Private Key: 7
4,193,823 UART: [art] Derive CDI
4,194,103 UART: [art] Store in in slot 0x4
4,279,628 UART: [art] Derive Key Pair
4,279,988 UART: [art] Store priv key in slot 0x5
4,293,478 UART: [art] Derive Key Pair - Done
4,308,035 UART: [art] Signing Cert with AUTHO
4,308,515 UART: RITY.KEYID = 7
4,324,255 UART: [art] Erasing AUTHORITY.KEYID = 7
4,325,020 UART: [art] PUB.X = E9DE892D9CDA727F0843C4C35C1385989D9282AD1BA9A34A1F70BDFEDC5CC5E9FDAA47CDAFF9872AD6B47A7197005029
4,331,785 UART: [art] PUB.Y = 847DD1B63C9944897750DD05E982E54215F529C3231B8D663FE1D7F87AEA5B13868D270247C250F118D66E1169BD6406
4,338,718 UART: [art] SIG.R = 6CEA021F6E15ABB9BDB02CBC02E2D888E59A648B5122CE4E0205743A1E5CF05D3865AAA4C1F9730AF3F8F3FCCD3B71E4
4,345,495 UART: [art] SIG.S = 2039A8F97C560EEEE9CD2657D8AD5962BC8E12C8C2B370F884F2621D1FA7DB04F3939AF0A93198F3000970B658093744
4,369,252 UART: Caliptra RT
4,369,505 UART: [state] CFI Enabled
4,649,622 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,084,345 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
915,941 UART: [kat] HMAC-384Kdf
920,719 UART: [kat] LMS
1,169,031 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,174,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,780 UART: [idev] Erasing UDS.KEYID = 0
1,198,410 UART: [idev] Sha1 KeyId Algorithm
1,207,252 UART: [idev] --
1,208,299 UART: [ldev] ++
1,208,467 UART: [ldev] CDI.KEYID = 6
1,208,831 UART: [ldev] SUBJECT.KEYID = 5
1,209,258 UART: [ldev] AUTHORITY.KEYID = 7
1,209,721 UART: [ldev] FE.KEYID = 1
1,215,131 UART: [ldev] Erasing FE.KEYID = 1
1,241,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,377 UART: [ldev] --
1,280,803 UART: [fwproc] Wait for Commands...
1,281,502 UART: [fwproc] Recv command 0x46574c44
1,282,235 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,100 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,098 >>> mbox cmd response: success
2,773,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,774,351 UART: [afmc] ++
2,774,519 UART: [afmc] CDI.KEYID = 6
2,774,882 UART: [afmc] SUBJECT.KEYID = 7
2,775,308 UART: [afmc] AUTHORITY.KEYID = 5
2,811,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,900 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,613 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,522 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,236 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,081 UART: [afmc] --
2,855,193 UART: [cold-reset] --
2,855,861 UART: [state] Locking Datavault
2,857,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,814 UART: [state] Locking ICCM
2,858,266 UART: [exit] Launching FMC @ 0x40000130
2,863,595 UART:
2,863,611 UART: Running Caliptra FMC ...
2,864,019 UART:
2,864,162 UART: [state] CFI Enabled
2,874,909 UART: [fht] FMC Alias Private Key: 7
2,982,421 UART: [art] Extend RT PCRs Done
2,982,849 UART: [art] Lock RT PCRs Done
2,984,431 UART: [art] Populate DV Done
2,992,748 UART: [fht] FMC Alias Private Key: 7
2,993,906 UART: [art] Derive CDI
2,994,186 UART: [art] Store in in slot 0x4
3,079,893 UART: [art] Derive Key Pair
3,080,253 UART: [art] Store priv key in slot 0x5
3,093,951 UART: [art] Derive Key Pair - Done
3,109,113 UART: [art] Signing Cert with AUTHO
3,109,593 UART: RITY.KEYID = 7
3,124,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,464 UART: [art] PUB.X = A78A2B5F4BCF338D6772D032E1C597B2AE71AA7A6E742C936BE3835E1CC0110BC99A4840232225C715FC41E737ECE4F5
3,132,239 UART: [art] PUB.Y = 020F7598535C6641509F51CBD3943167D13A608E4FFB4CBC0B6E9C52CB01FAE1203E2CF1B692EC33F340A7F037FC3F8F
3,139,187 UART: [art] SIG.R = FDE5EADB227EC20051426BF89DB4D7E7AB4B2F80150681322D5B01711B4F756D14EA167F39DB25089D395A23D74E53CB
3,145,934 UART: [art] SIG.S = B953638D2B7C6BCA1484B0122C9FC35563C4604E88DB7043EE159DCAF10DCD84674FE6D96D5564EF282B8869C5043960
3,169,509 UART: Caliptra RT
3,169,854 UART: [state] CFI Enabled
3,277,592 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,002 UART:
3,280,018 UART: Running Caliptra ROM ...
3,280,426 UART:
3,280,568 UART: [state] CFI Enabled
3,283,436 UART: [state] LifecycleState = Unprovisioned
3,284,091 UART: [state] DebugLocked = No
3,284,753 UART: [state] WD Timer not started. Device not locked for debugging
3,286,065 UART: [kat] SHA2-256
4,089,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,093,744 UART: [kat] ++
4,093,896 UART: [kat] sha1
4,098,124 UART: [kat] SHA2-256
4,100,064 UART: [kat] SHA2-384
4,102,927 UART: [kat] SHA2-512-ACC
4,104,827 UART: [kat] ECC-384
4,114,528 UART: [kat] HMAC-384Kdf
4,119,182 UART: [kat] LMS
4,367,494 UART: [kat] --
4,368,434 UART: [update-reset] ++
4,385,426 >>> mbox cmd response: failed
4,385,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,385,844 UART: ROM Non-Fatal Error: 0x000B001E
4,386,650 UART: [state] Locking Datavault
4,387,416 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,020 UART: [state] Locking ICCM
4,388,676 UART: [exit] Launching FMC @ 0x40000130
4,394,005 UART:
4,394,021 UART: Running Caliptra FMC ...
4,394,429 UART:
4,394,572 UART: [state] CFI Enabled
4,484,005 UART: [art] Extend RT PCRs Done
4,484,433 UART: [art] Lock RT PCRs Done
4,485,752 UART: [art] Populate DV Done
4,493,975 UART: [fht] FMC Alias Private Key: 7
4,495,007 UART: [art] Derive CDI
4,495,287 UART: [art] Store in in slot 0x4
4,580,740 UART: [art] Derive Key Pair
4,581,100 UART: [art] Store priv key in slot 0x5
4,594,392 UART: [art] Derive Key Pair - Done
4,609,330 UART: [art] Signing Cert with AUTHO
4,609,810 UART: RITY.KEYID = 7
4,624,734 UART: [art] Erasing AUTHORITY.KEYID = 7
4,625,499 UART: [art] PUB.X = A78A2B5F4BCF338D6772D032E1C597B2AE71AA7A6E742C936BE3835E1CC0110BC99A4840232225C715FC41E737ECE4F5
4,632,274 UART: [art] PUB.Y = 020F7598535C6641509F51CBD3943167D13A608E4FFB4CBC0B6E9C52CB01FAE1203E2CF1B692EC33F340A7F037FC3F8F
4,639,222 UART: [art] SIG.R = FDE5EADB227EC20051426BF89DB4D7E7AB4B2F80150681322D5B01711B4F756D14EA167F39DB25089D395A23D74E53CB
4,645,969 UART: [art] SIG.S = B953638D2B7C6BCA1484B0122C9FC35563C4604E88DB7043EE159DCAF10DCD84674FE6D96D5564EF282B8869C5043960
4,669,290 UART: Caliptra RT
4,669,635 UART: [state] CFI Enabled
4,952,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,953,746 UART:
4,953,762 UART: Running Caliptra ROM ...
4,954,170 UART:
4,954,312 UART: [state] CFI Enabled
4,956,820 UART: [state] LifecycleState = Unprovisioned
4,957,475 UART: [state] DebugLocked = No
4,958,117 UART: [state] WD Timer not started. Device not locked for debugging
4,959,413 UART: [kat] SHA2-256
5,762,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,767,092 UART: [kat] ++
5,767,244 UART: [kat] sha1
5,771,608 UART: [kat] SHA2-256
5,773,548 UART: [kat] SHA2-384
5,776,099 UART: [kat] SHA2-512-ACC
5,777,999 UART: [kat] ECC-384
5,787,466 UART: [kat] HMAC-384Kdf
5,791,888 UART: [kat] LMS
6,040,200 UART: [kat] --
6,041,174 UART: [update-reset] ++
7,355,497 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,356,584 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
7,506,582 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,144 >>> mbox cmd response: success
2,622,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,684,692 UART:
2,684,708 UART: Running Caliptra FMC ...
2,685,116 UART:
2,685,259 UART: [state] CFI Enabled
2,696,204 UART: [fht] FMC Alias Private Key: 7
2,804,188 UART: [art] Extend RT PCRs Done
2,804,616 UART: [art] Lock RT PCRs Done
2,806,254 UART: [art] Populate DV Done
2,814,689 UART: [fht] FMC Alias Private Key: 7
2,815,759 UART: [art] Derive CDI
2,816,039 UART: [art] Store in in slot 0x4
2,901,644 UART: [art] Derive Key Pair
2,902,004 UART: [art] Store priv key in slot 0x5
2,915,364 UART: [art] Derive Key Pair - Done
2,930,035 UART: [art] Signing Cert with AUTHO
2,930,515 UART: RITY.KEYID = 7
2,945,731 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,496 UART: [art] PUB.X = 479FB572B4B3ACD703BDD79798C2BD12CA4E8B781F44506F10CC1046CBDC0DCD92E004DAC38D3BBF098B3547308EDAF3
2,953,274 UART: [art] PUB.Y = 394F43F8B8454BB2BE464C6C43EBBB02056D13D4A64D77A608EB933C53CF91E41B318B148DEE948175C647599F62C2AC
2,960,221 UART: [art] SIG.R = 5A4E043573C29C7E4E6F20F0EDEA23186C5D0C205F01BCAC361D82CF54715A4E07B6DFE1FF4825A9436C097132DAE854
2,966,986 UART: [art] SIG.S = DC4FF9090E3C79B2F34E91DBAF09C73C57809DC7D5BD0BABC7A254CBC6BD0B6F1F8D06FAF1C469D2C746DFAC0C7AB8B3
2,990,242 UART: Caliptra RT
2,990,587 UART: [state] CFI Enabled
3,099,046 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,842 >>> mbox cmd response: failed
4,088,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,094,605 UART:
4,094,621 UART: Running Caliptra FMC ...
4,095,029 UART:
4,095,172 UART: [state] CFI Enabled
4,184,255 UART: [art] Extend RT PCRs Done
4,184,683 UART: [art] Lock RT PCRs Done
4,185,940 UART: [art] Populate DV Done
4,194,045 UART: [fht] FMC Alias Private Key: 7
4,195,141 UART: [art] Derive CDI
4,195,421 UART: [art] Store in in slot 0x4
4,281,218 UART: [art] Derive Key Pair
4,281,578 UART: [art] Store priv key in slot 0x5
4,294,528 UART: [art] Derive Key Pair - Done
4,309,319 UART: [art] Signing Cert with AUTHO
4,309,799 UART: RITY.KEYID = 7
4,325,143 UART: [art] Erasing AUTHORITY.KEYID = 7
4,325,908 UART: [art] PUB.X = 479FB572B4B3ACD703BDD79798C2BD12CA4E8B781F44506F10CC1046CBDC0DCD92E004DAC38D3BBF098B3547308EDAF3
4,332,686 UART: [art] PUB.Y = 394F43F8B8454BB2BE464C6C43EBBB02056D13D4A64D77A608EB933C53CF91E41B318B148DEE948175C647599F62C2AC
4,339,633 UART: [art] SIG.R = 5A4E043573C29C7E4E6F20F0EDEA23186C5D0C205F01BCAC361D82CF54715A4E07B6DFE1FF4825A9436C097132DAE854
4,346,398 UART: [art] SIG.S = DC4FF9090E3C79B2F34E91DBAF09C73C57809DC7D5BD0BABC7A254CBC6BD0B6F1F8D06FAF1C469D2C746DFAC0C7AB8B3
4,370,144 UART: Caliptra RT
4,370,489 UART: [state] CFI Enabled
4,650,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,087,012 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,028 UART:
192,401 UART: Running Caliptra ROM ...
193,536 UART:
193,684 UART: [state] CFI Enabled
263,371 UART: [state] LifecycleState = Unprovisioned
265,289 UART: [state] DebugLocked = No
266,975 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,976 UART: [kat] SHA2-256
441,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,187 UART: [kat] ++
452,649 UART: [kat] sha1
463,632 UART: [kat] SHA2-256
466,320 UART: [kat] SHA2-384
473,160 UART: [kat] SHA2-512-ACC
475,551 UART: [kat] ECC-384
2,763,929 UART: [kat] HMAC-384Kdf
2,795,388 UART: [kat] LMS
3,985,683 UART: [kat] --
3,990,229 UART: [cold-reset] ++
3,992,112 UART: [fht] Storing FHT @ 0x50003400
4,002,841 UART: [idev] ++
4,003,421 UART: [idev] CDI.KEYID = 6
4,004,362 UART: [idev] SUBJECT.KEYID = 7
4,005,579 UART: [idev] UDS.KEYID = 0
4,008,638 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,152,394 UART: [idev] Erasing UDS.KEYID = 0
7,341,096 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,393 UART: [idev] --
7,366,097 UART: [ldev] ++
7,366,673 UART: [ldev] CDI.KEYID = 6
7,367,615 UART: [ldev] SUBJECT.KEYID = 5
7,368,746 UART: [ldev] AUTHORITY.KEYID = 7
7,370,092 UART: [ldev] FE.KEYID = 1
7,417,726 UART: [ldev] Erasing FE.KEYID = 1
10,750,504 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,204 UART: [ldev] --
13,112,035 UART: [fwproc] Waiting for Commands...
13,114,995 UART: [fwproc] Received command 0x46574c44
13,117,196 UART: [fwproc] Received Image of size 114124 bytes
21,913,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,995,272 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,064,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,382,210 >>> mbox cmd response: success
22,384,296 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,527,981 UART: [afmc] ++
22,528,629 UART: [afmc] CDI.KEYID = 6
22,529,551 UART: [afmc] SUBJECT.KEYID = 7
22,530,665 UART: [afmc] AUTHORITY.KEYID = 5
25,762,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,060,005 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,062,261 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,076,847 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,091,579 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,105,769 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,128,002 UART: [afmc] --
28,131,618 UART: [cold-reset] --
28,136,242 UART: [state] Locking Datavault
28,142,677 UART: [state] Locking PCR0, PCR1 and PCR31
28,144,378 UART: [state] Locking ICCM
28,146,585 UART: [exit] Launching FMC @ 0x40000130
28,154,984 UART:
28,155,219 UART: Running Caliptra FMC ...
28,156,322 UART:
28,156,490 UART: [state] CFI Enabled
28,220,633 UART: [fht] FMC Alias Private Key: 7
30,558,896 UART: [art] Extend RT PCRs Done
30,560,107 UART: [art] Lock RT PCRs Done
30,561,783 UART: [art] Populate DV Done
30,567,358 UART: [fht] FMC Alias Private Key: 7
30,568,948 UART: [art] Derive CDI
30,569,779 UART: [art] Store in in slot 0x4
30,629,564 UART: [art] Derive Key Pair
30,630,624 UART: [art] Store priv key in slot 0x5
33,923,354 UART: [art] Derive Key Pair - Done
33,936,301 UART: [art] Signing Cert with AUTHO
33,937,601 UART: RITY.KEYID = 7
36,226,007 UART: [art] Erasing AUTHORITY.KEYID = 7
36,227,515 UART: [art] PUB.X = 710425CF880344C418FF9A1EA900AE0378225A7DF9C019A9BEC49F938B005A30CD9DD85C2DF322D42A642E77766C08C8
36,234,729 UART: [art] PUB.Y = B0E5658E827AD05E4DC15BA9E1D3D0E18F6B9F899EB777F5C1750B5331235DAD8FE950B124353A4C011F2CB3D37A56C2
36,241,983 UART: [art] SIG.R = 5020538F953617C49EDBE7266915C767857F898ABF7A837422F87C23FAC2C8EEBA10306F1AA3CF54A03D41B834BD3319
36,249,349 UART: [art] SIG.S = 13876F67D4D130103E89721987AF0423A13C6FF9ED28BD7B07254FFB9A39AAC6970386C7E6CAE4ED8C9078AC94CCBBD1
37,555,009 UART: Caliptra RT
37,555,750 UART: [state] CFI Enabled
37,717,563 UART: [rt] RT listening for mailbox commands...
37,720,362 UART:
37,720,613 UART: Running Caliptra ROM ...
37,721,737 UART:
37,721,897 UART: [state] CFI Enabled
37,784,973 UART: [state] LifecycleState = Unprovisioned
37,786,952 UART: [state] DebugLocked = No
37,789,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,795,179 UART: [kat] SHA2-256
37,964,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,975,377 UART: [kat] ++
37,975,920 UART: [kat] sha1
37,986,004 UART: [kat] SHA2-256
37,988,700 UART: [kat] SHA2-384
37,994,688 UART: [kat] SHA2-512-ACC
37,997,094 UART: [kat] ECC-384
40,286,842 UART: [kat] HMAC-384Kdf
40,317,994 UART: [kat] LMS
41,508,310 UART: [kat] --
41,512,940 UART: [update-reset] ++
41,626,398 >>> mbox cmd response: failed
41,628,325 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
41,771,800 UART: ROM Non-Fatal Error: 0x000B003D
41,773,228 UART: [state] Locking Datavault
41,774,386 UART: [state] Locking PCR0, PCR1 and PCR31
41,775,927 UART: [state] Locking ICCM
41,776,833 UART: [exit] Launching FMC @ 0x40000130
41,778,256 UART:
41,778,422 UART: Running Caliptra FMC ...
41,779,516 UART:
41,779,671 UART: [state] CFI Enabled
41,780,588 UART: [art] Extend RT PCRs Done
41,781,723 UART: [art] Lock RT PCRs Done
41,782,737 UART: [art] Populate DV Done
41,783,704 UART: [fht] FMC Alias Private Key: 7
41,785,039 UART: [art] Derive CDI
41,785,781 UART: [art] Store in in slot 0x4
41,809,001 UART: [art] Derive Key Pair
41,810,020 UART: [art] Store priv key in slot 0x5
45,103,223 UART: [art] Derive Key Pair - Done
45,116,440 UART: [art] Signing Cert with AUTHO
45,117,738 UART: RITY.KEYID = 7
47,404,039 UART: [art] Erasing AUTHORITY.KEYID = 7
47,405,551 UART: [art] PUB.X = 710425CF880344C418FF9A1EA900AE0378225A7DF9C019A9BEC49F938B005A30CD9DD85C2DF322D42A642E77766C08C8
47,412,771 UART: [art] PUB.Y = B0E5658E827AD05E4DC15BA9E1D3D0E18F6B9F899EB777F5C1750B5331235DAD8FE950B124353A4C011F2CB3D37A56C2
47,420,022 UART: [art] SIG.R = 5020538F953617C49EDBE7266915C767857F898ABF7A837422F87C23FAC2C8EEBA10306F1AA3CF54A03D41B834BD3319
47,427,458 UART: [art] SIG.S = 13876F67D4D130103E89721987AF0423A13C6FF9ED28BD7B07254FFB9A39AAC6970386C7E6CAE4ED8C9078AC94CCBBD1
48,733,033 UART: Caliptra RT
48,733,740 UART: [state] CFI Enabled
49,065,776 UART: [rt] RT listening for mailbox commands...
49,068,713 UART:
49,068,989 UART: Running Caliptra ROM ...
49,070,104 UART:
49,070,265 UART: [state] CFI Enabled
49,130,321 UART: [state] LifecycleState = Unprovisioned
49,132,213 UART: [state] DebugLocked = No
49,134,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
49,138,605 UART: [kat] SHA2-256
49,308,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
49,318,756 UART: [kat] ++
49,319,212 UART: [kat] sha1
49,329,562 UART: [kat] SHA2-256
49,332,249 UART: [kat] SHA2-384
49,337,647 UART: [kat] SHA2-512-ACC
49,340,052 UART: [kat] ECC-384
51,636,496 UART: [kat] HMAC-384Kdf
51,668,333 UART: [kat] LMS
52,858,646 UART: [kat] --
52,863,306 UART: [update-reset] ++
61,748,875 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,753,209 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
62,135,495 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,805,164 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,126,312 >>> mbox cmd response: success
22,128,300 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
27,810,361 UART:
27,810,774 UART: Running Caliptra FMC ...
27,811,907 UART:
27,812,069 UART: [state] CFI Enabled
27,880,513 UART: [fht] FMC Alias Private Key: 7
30,218,218 UART: [art] Extend RT PCRs Done
30,219,450 UART: [art] Lock RT PCRs Done
30,221,108 UART: [art] Populate DV Done
30,226,896 UART: [fht] FMC Alias Private Key: 7
30,228,598 UART: [art] Derive CDI
30,229,413 UART: [art] Store in in slot 0x4
30,290,975 UART: [art] Derive Key Pair
30,292,010 UART: [art] Store priv key in slot 0x5
33,584,680 UART: [art] Derive Key Pair - Done
33,597,705 UART: [art] Signing Cert with AUTHO
33,599,027 UART: RITY.KEYID = 7
35,885,665 UART: [art] Erasing AUTHORITY.KEYID = 7
35,887,181 UART: [art] PUB.X = 6C23447E2A59132E4A9061CB3CADF8FC5A6B80C9F650F341697DB7A46872B5522EC150A392A3910804642BFB3E5A602A
35,894,387 UART: [art] PUB.Y = 703BA0846109BD4B0272E45738C0B7A3CE85268D0A7AC1934EF1A9E227B151582B6669C01F9EC53C0ACA09450A17FF40
35,901,618 UART: [art] SIG.R = 7B011FCF45278816BBEC96F47E3C8A34E3DB6ABA6811925108D430C739A6E31A3AD89B3CDA54755DE965ACF3FCB66893
35,909,040 UART: [art] SIG.S = C5E9D510D61F4771E511271C1A2793605FB635320FAFC847EF055EF1F8FCA32C93F4D84F7A2C141FF58D6232DECC04E6
37,213,834 UART: Caliptra RT
37,214,545 UART: [state] CFI Enabled
37,376,468 UART: [rt] RT listening for mailbox commands...
41,104,450 >>> mbox cmd response: failed
41,106,252 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
41,249,896 UART:
41,250,214 UART: Running Caliptra FMC ...
41,251,261 UART:
41,251,408 UART: [state] CFI Enabled
41,252,354 UART: [art] Extend RT PCRs Done
41,253,500 UART: [art] Lock RT PCRs Done
41,254,677 UART: [art] Populate DV Done
41,255,794 UART: [fht] FMC Alias Private Key: 7
41,257,120 UART: [art] Derive CDI
41,257,852 UART: [art] Store in in slot 0x4
41,277,145 UART: [art] Derive Key Pair
41,278,139 UART: [art] Store priv key in slot 0x5
44,570,479 UART: [art] Derive Key Pair - Done
44,583,373 UART: [art] Signing Cert with AUTHO
44,584,717 UART: RITY.KEYID = 7
46,871,232 UART: [art] Erasing AUTHORITY.KEYID = 7
46,872,737 UART: [art] PUB.X = 6C23447E2A59132E4A9061CB3CADF8FC5A6B80C9F650F341697DB7A46872B5522EC150A392A3910804642BFB3E5A602A
46,879,942 UART: [art] PUB.Y = 703BA0846109BD4B0272E45738C0B7A3CE85268D0A7AC1934EF1A9E227B151582B6669C01F9EC53C0ACA09450A17FF40
46,887,225 UART: [art] SIG.R = 7B011FCF45278816BBEC96F47E3C8A34E3DB6ABA6811925108D430C739A6E31A3AD89B3CDA54755DE965ACF3FCB66893
46,894,589 UART: [art] SIG.S = C5E9D510D61F4771E511271C1A2793605FB635320FAFC847EF055EF1F8FCA32C93F4D84F7A2C141FF58D6232DECC04E6
48,199,635 UART: Caliptra RT
48,200,362 UART: [state] CFI Enabled
48,555,577 UART: [rt] RT listening for mailbox commands...
61,392,471 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,453 UART:
192,837 UART: Running Caliptra ROM ...
193,974 UART:
603,680 UART: [state] CFI Enabled
616,589 UART: [state] LifecycleState = Unprovisioned
618,522 UART: [state] DebugLocked = No
620,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,269 UART: [kat] SHA2-256
794,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,527 UART: [kat] ++
805,974 UART: [kat] sha1
816,694 UART: [kat] SHA2-256
819,416 UART: [kat] SHA2-384
824,703 UART: [kat] SHA2-512-ACC
827,095 UART: [kat] ECC-384
3,110,579 UART: [kat] HMAC-384Kdf
3,122,872 UART: [kat] LMS
4,312,991 UART: [kat] --
4,317,769 UART: [cold-reset] ++
4,319,655 UART: [fht] Storing FHT @ 0x50003400
4,331,153 UART: [idev] ++
4,331,761 UART: [idev] CDI.KEYID = 6
4,332,676 UART: [idev] SUBJECT.KEYID = 7
4,333,947 UART: [idev] UDS.KEYID = 0
4,336,897 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,303 UART: [idev] Erasing UDS.KEYID = 0
7,619,758 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,675 UART: [idev] --
7,645,447 UART: [ldev] ++
7,646,016 UART: [ldev] CDI.KEYID = 6
7,646,985 UART: [ldev] SUBJECT.KEYID = 5
7,648,221 UART: [ldev] AUTHORITY.KEYID = 7
7,649,454 UART: [ldev] FE.KEYID = 1
7,660,532 UART: [ldev] Erasing FE.KEYID = 1
10,949,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,414 UART: [ldev] --
13,310,901 UART: [fwproc] Waiting for Commands...
13,313,972 UART: [fwproc] Received command 0x46574c44
13,316,164 UART: [fwproc] Received Image of size 114124 bytes
22,107,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,188,600 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,257,522 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,575,546 >>> mbox cmd response: success
22,577,682 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,720,981 UART: [afmc] ++
22,721,615 UART: [afmc] CDI.KEYID = 6
22,722,686 UART: [afmc] SUBJECT.KEYID = 7
22,723,789 UART: [afmc] AUTHORITY.KEYID = 5
25,895,934 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,189,878 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,192,136 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,206,726 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,221,452 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,235,688 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,257,778 UART: [afmc] --
28,261,109 UART: [cold-reset] --
28,265,886 UART: [state] Locking Datavault
28,272,203 UART: [state] Locking PCR0, PCR1 and PCR31
28,273,952 UART: [state] Locking ICCM
28,275,876 UART: [exit] Launching FMC @ 0x40000130
28,284,273 UART:
28,284,505 UART: Running Caliptra FMC ...
28,285,530 UART:
28,285,673 UART: [state] CFI Enabled
28,293,636 UART: [fht] FMC Alias Private Key: 7
30,624,850 UART: [art] Extend RT PCRs Done
30,626,065 UART: [art] Lock RT PCRs Done
30,627,615 UART: [art] Populate DV Done
30,633,083 UART: [fht] FMC Alias Private Key: 7
30,634,722 UART: [art] Derive CDI
30,635,456 UART: [art] Store in in slot 0x4
30,678,049 UART: [art] Derive Key Pair
30,679,086 UART: [art] Store priv key in slot 0x5
33,921,099 UART: [art] Derive Key Pair - Done
33,934,589 UART: [art] Signing Cert with AUTHO
33,935,948 UART: RITY.KEYID = 7
36,215,510 UART: [art] Erasing AUTHORITY.KEYID = 7
36,217,031 UART: [art] PUB.X = F595C372A0EFE70EC8A76C6E075A19BC8F4C623B530D1EF4AA90CCAE8883DF4935656C42F4495687A3E23AB92BF8E61C
36,224,247 UART: [art] PUB.Y = 5FD4183A402D35B3A74A635F939E2C2925EB552BFDFF840BE9A72F0C6EBE073D216D0608F3F6FCF6B2FDDE29E30BFD07
36,231,548 UART: [art] SIG.R = 8B258C57E15E9386DE318F89337692FDBEB57F458FFE360571A7293C16F441CA8EFE70DAC5D2C5923628DD0DE4AFF283
36,238,908 UART: [art] SIG.S = 187BE4FE916A1BACD263A9D919E1FD3AD123DF4EEF84C09B2455CAF0BF1DC8C30FCC768AF6D4CF65961E2ED735388DA0
37,543,395 UART: Caliptra RT
37,544,102 UART: [state] CFI Enabled
37,662,360 UART: [rt] RT listening for mailbox commands...
37,665,102 UART:
37,665,355 UART: Running Caliptra ROM ...
37,666,468 UART:
37,666,751 UART: [state] CFI Enabled
37,683,557 UART: [state] LifecycleState = Unprovisioned
37,685,447 UART: [state] DebugLocked = No
37,687,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,692,492 UART: [kat] SHA2-256
37,862,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,872,785 UART: [kat] ++
37,873,242 UART: [kat] sha1
37,883,483 UART: [kat] SHA2-256
37,886,172 UART: [kat] SHA2-384
37,892,102 UART: [kat] SHA2-512-ACC
37,894,502 UART: [kat] ECC-384
40,179,226 UART: [kat] HMAC-384Kdf
40,191,719 UART: [kat] LMS
41,381,771 UART: [kat] --
41,387,171 UART: [update-reset] ++
41,502,225 >>> mbox cmd response: failed
41,504,552 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
41,647,970 UART: ROM Non-Fatal Error: 0x000B003D
41,649,402 UART: [state] Locking Datavault
41,650,494 UART: [state] Locking PCR0, PCR1 and PCR31
41,652,030 UART: [state] Locking ICCM
41,652,911 UART: [exit] Launching FMC @ 0x40000130
41,654,255 UART:
41,654,403 UART: Running Caliptra FMC ...
41,655,504 UART:
41,655,654 UART: [state] CFI Enabled
41,656,485 UART: [art] Extend RT PCRs Done
41,657,543 UART: [art] Lock RT PCRs Done
41,658,524 UART: [art] Populate DV Done
41,659,554 UART: [fht] FMC Alias Private Key: 7
41,660,794 UART: [art] Derive CDI
41,661,521 UART: [art] Store in in slot 0x4
41,662,686 UART: [art] Derive Key Pair
41,663,628 UART: [art] Store priv key in slot 0x5
44,863,697 UART: [art] Derive Key Pair - Done
44,876,721 UART: [art] Signing Cert with AUTHO
44,878,028 UART: RITY.KEYID = 7
47,157,326 UART: [art] Erasing AUTHORITY.KEYID = 7
47,158,825 UART: [art] PUB.X = F595C372A0EFE70EC8A76C6E075A19BC8F4C623B530D1EF4AA90CCAE8883DF4935656C42F4495687A3E23AB92BF8E61C
47,166,066 UART: [art] PUB.Y = 5FD4183A402D35B3A74A635F939E2C2925EB552BFDFF840BE9A72F0C6EBE073D216D0608F3F6FCF6B2FDDE29E30BFD07
47,173,348 UART: [art] SIG.R = 8B258C57E15E9386DE318F89337692FDBEB57F458FFE360571A7293C16F441CA8EFE70DAC5D2C5923628DD0DE4AFF283
47,180,736 UART: [art] SIG.S = 187BE4FE916A1BACD263A9D919E1FD3AD123DF4EEF84C09B2455CAF0BF1DC8C30FCC768AF6D4CF65961E2ED735388DA0
48,486,238 UART: Caliptra RT
48,486,952 UART: [state] CFI Enabled
48,776,457 UART: [rt] RT listening for mailbox commands...
48,778,877 UART:
48,779,045 UART: Running Caliptra ROM ...
48,780,152 UART:
48,780,524 UART: [state] CFI Enabled
48,794,027 UART: [state] LifecycleState = Unprovisioned
48,795,908 UART: [state] DebugLocked = No
48,798,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
48,803,018 UART: [kat] SHA2-256
48,972,742 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
48,983,229 UART: [kat] ++
48,983,711 UART: [kat] sha1
48,994,382 UART: [kat] SHA2-256
48,997,077 UART: [kat] SHA2-384
49,002,473 UART: [kat] SHA2-512-ACC
49,004,877 UART: [kat] ECC-384
51,288,132 UART: [kat] HMAC-384Kdf
51,299,438 UART: [kat] LMS
52,489,491 UART: [kat] --
52,493,768 UART: [update-reset] ++
61,371,361 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,375,796 UART: [update-reset] Loading Runtime at address 0x40005000 len 89420
61,758,056 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
4,127,895 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,310,370 >>> mbox cmd response: success
22,312,357 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
27,948,675 UART:
27,949,261 UART: Running Caliptra FMC ...
27,950,407 UART:
27,950,565 UART: [state] CFI Enabled
27,958,188 UART: [fht] FMC Alias Private Key: 7
30,288,655 UART: [art] Extend RT PCRs Done
30,289,887 UART: [art] Lock RT PCRs Done
30,291,692 UART: [art] Populate DV Done
30,297,053 UART: [fht] FMC Alias Private Key: 7
30,298,600 UART: [art] Derive CDI
30,299,421 UART: [art] Store in in slot 0x4
30,342,266 UART: [art] Derive Key Pair
30,343,327 UART: [art] Store priv key in slot 0x5
33,584,883 UART: [art] Derive Key Pair - Done
33,597,716 UART: [art] Signing Cert with AUTHO
33,599,019 UART: RITY.KEYID = 7
35,878,412 UART: [art] Erasing AUTHORITY.KEYID = 7
35,879,925 UART: [art] PUB.X = 52ECB271CF67139DB679153FB6115921BC2093ADB163A6D7192DFA961C99C38FC72D2B48D30E53AE201E1B1099217B75
35,887,135 UART: [art] PUB.Y = B3F7457ECB840FDD2DC056FAC9D0F6000FC97A1A92C94BB7E07B122BABC807CF2DB45DA7B781D3B241188F16BDA5C55B
35,894,399 UART: [art] SIG.R = B037A1965650EF4592FFED20E7AD5BF1B37B9696912518CD009CC041CABCCB44B7D1748847D816B4F1052C6AE6F296E2
35,901,835 UART: [art] SIG.S = 0EC699A5706EFD5CB57F3A96D245D72BB0CD0DEBACEE952CD6FE8AFC090893EC8447707D5BEC04E14C2115D07357E219
37,207,355 UART: Caliptra RT
37,208,067 UART: [state] CFI Enabled
37,325,285 UART: [rt] RT listening for mailbox commands...
40,973,624 >>> mbox cmd response: failed
40,975,509 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
41,118,941 UART:
41,119,256 UART: Running Caliptra FMC ...
41,120,381 UART:
41,120,544 UART: [state] CFI Enabled
41,121,468 UART: [art] Extend RT PCRs Done
41,122,610 UART: [art] Lock RT PCRs Done
41,123,677 UART: [art] Populate DV Done
41,124,784 UART: [fht] FMC Alias Private Key: 7
41,126,128 UART: [art] Derive CDI
41,126,869 UART: [art] Store in in slot 0x4
41,127,957 UART: [art] Derive Key Pair
41,128,893 UART: [art] Store priv key in slot 0x5
44,329,494 UART: [art] Derive Key Pair - Done
44,342,445 UART: [art] Signing Cert with AUTHO
44,343,754 UART: RITY.KEYID = 7
46,623,117 UART: [art] Erasing AUTHORITY.KEYID = 7
46,624,632 UART: [art] PUB.X = 52ECB271CF67139DB679153FB6115921BC2093ADB163A6D7192DFA961C99C38FC72D2B48D30E53AE201E1B1099217B75
46,631,877 UART: [art] PUB.Y = B3F7457ECB840FDD2DC056FAC9D0F6000FC97A1A92C94BB7E07B122BABC807CF2DB45DA7B781D3B241188F16BDA5C55B
46,639,158 UART: [art] SIG.R = B037A1965650EF4592FFED20E7AD5BF1B37B9696912518CD009CC041CABCCB44B7D1748847D816B4F1052C6AE6F296E2
46,646,609 UART: [art] SIG.S = 0EC699A5706EFD5CB57F3A96D245D72BB0CD0DEBACEE952CD6FE8AFC090893EC8447707D5BEC04E14C2115D07357E219
47,951,636 UART: Caliptra RT
47,952,356 UART: [state] CFI Enabled
48,240,697 UART: [rt] RT listening for mailbox commands...
60,997,433 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,305 UART:
192,659 UART: Running Caliptra ROM ...
193,844 UART:
193,995 UART: [state] CFI Enabled
259,334 UART: [state] LifecycleState = Unprovisioned
261,251 UART: [state] DebugLocked = No
262,519 UART: [state] WD Timer not started. Device not locked for debugging
265,627 UART: [kat] SHA2-256
444,746 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,322 UART: [kat] ++
456,771 UART: [kat] sha1
469,196 UART: [kat] SHA2-256
472,200 UART: [kat] SHA2-384
478,921 UART: [kat] SHA2-512-ACC
481,901 UART: [kat] ECC-384
2,942,495 UART: [kat] HMAC-384Kdf
2,965,902 UART: [kat] LMS
3,495,335 UART: [kat] --
3,499,440 UART: [cold-reset] ++
3,501,970 UART: [fht] FHT @ 0x50003400
3,513,377 UART: [idev] ++
3,513,949 UART: [idev] CDI.KEYID = 6
3,514,930 UART: [idev] SUBJECT.KEYID = 7
3,516,089 UART: [idev] UDS.KEYID = 0
3,519,821 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,663,867 UART: [idev] Erasing UDS.KEYID = 0
6,019,195 UART: [idev] Sha1 KeyId Algorithm
6,043,451 UART: [idev] --
6,046,430 UART: [ldev] ++
6,047,007 UART: [ldev] CDI.KEYID = 6
6,047,925 UART: [ldev] SUBJECT.KEYID = 5
6,049,143 UART: [ldev] AUTHORITY.KEYID = 7
6,050,381 UART: [ldev] FE.KEYID = 1
6,095,834 UART: [ldev] Erasing FE.KEYID = 1
8,598,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,375 UART: [ldev] --
10,389,720 UART: [fwproc] Wait for Commands...
10,391,979 UART: [fwproc] Recv command 0x46574c44
10,394,085 UART: [fwproc] Recv'd Img size: 114448 bytes
14,960,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,032,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,100,882 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,419,497 >>> mbox cmd response: success
15,421,499 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,565,475 UART: [afmc] ++
15,566,134 UART: [afmc] CDI.KEYID = 6
15,567,029 UART: [afmc] SUBJECT.KEYID = 7
15,568,077 UART: [afmc] AUTHORITY.KEYID = 5
17,954,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,678,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,680,722 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,696,686 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,712,614 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,728,393 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,751,073 UART: [afmc] --
19,754,888 UART: [cold-reset] --
19,759,073 UART: [state] Locking Datavault
19,764,307 UART: [state] Locking PCR0, PCR1 and PCR31
19,765,963 UART: [state] Locking ICCM
19,768,062 UART: [exit] Launching FMC @ 0x40000130
19,776,516 UART:
19,776,771 UART: Running Caliptra FMC ...
19,777,877 UART:
19,778,040 UART: [state] CFI Enabled
19,835,999 UART: [fht] FMC Alias Private Key: 7
21,600,289 UART: [art] Extend RT PCRs Done
21,601,501 UART: [art] Lock RT PCRs Done
21,603,233 UART: [art] Populate DV Done
21,608,805 UART: [fht] FMC Alias Private Key: 7
21,610,341 UART: [art] Derive CDI
21,611,155 UART: [art] Store in in slot 0x4
21,669,814 UART: [art] Derive Key Pair
21,670,817 UART: [art] Store priv key in slot 0x5
24,133,749 UART: [art] Derive Key Pair - Done
24,146,844 UART: [art] Signing Cert with AUTHO
24,148,165 UART: RITY.KEYID = 7
25,862,999 UART: [art] Erasing AUTHORITY.KEYID = 7
25,864,574 UART: [art] PUB.X = E4BCD8E7BEB3A4F14A017266032D7FB4C06D6BB3AABADE5B1CF1D4B0F42A9F98952AA37259A66A0710C880EEDB431F98
25,871,806 UART: [art] PUB.Y = E012951473B3677A46D8F088A1215694C7019856117DB2EE00AF3EB5D5384C10432BA695872F38DA8B94B2F272450C6F
25,879,025 UART: [art] SIG.R = FE379C9B6CB33A18760132E90B020271B1FD1AE70A60D31B2805A36A56E26DD94EE8AF36E1894C85947B93534117FE8B
25,886,399 UART: [art] SIG.S = 18D87339499095C2A1ACAC3CFFB0C2187AC71AB05F372E9CA059501DC1E12B2541096AA7077424911D902994BA3EB282
26,864,516 UART: Caliptra RT
26,865,227 UART: [state] CFI Enabled
27,030,381 UART: [rt] RT listening for mailbox commands...
27,033,231 UART:
27,033,399 UART: Running Caliptra ROM ...
27,034,514 UART:
27,034,674 UART: [state] CFI Enabled
27,097,947 UART: [state] LifecycleState = Unprovisioned
27,099,819 UART: [state] DebugLocked = No
27,102,749 UART: [state] WD Timer not started. Device not locked for debugging
27,105,619 UART: [kat] SHA2-256
27,284,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,296,357 UART: [kat] ++
27,296,811 UART: [kat] sha1
27,307,967 UART: [kat] SHA2-256
27,310,976 UART: [kat] SHA2-384
27,317,122 UART: [kat] SHA2-512-ACC
27,320,064 UART: [kat] ECC-384
29,782,183 UART: [kat] HMAC-384Kdf
29,804,179 UART: [kat] LMS
30,333,656 UART: [kat] --
30,337,401 UART: [update-reset] ++
30,388,383 >>> mbox cmd response: failed
30,390,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,534,368 UART: ROM Non-Fatal Error: 0x000B003D
30,535,801 UART: [state] Locking Datavault
30,536,954 UART: [state] Locking PCR0, PCR1 and PCR31
30,538,491 UART: [state] Locking ICCM
30,539,420 UART: [exit] Launching FMC @ 0x40000130
30,540,850 UART:
30,541,014 UART: Running Caliptra FMC ...
30,542,114 UART:
30,542,272 UART: [state] CFI Enabled
30,543,192 UART: [art] Extend RT PCRs Done
30,544,328 UART: [art] Lock RT PCRs Done
30,545,392 UART: [art] Populate DV Done
30,546,421 UART: [fht] FMC Alias Private Key: 7
30,547,737 UART: [art] Derive CDI
30,548,474 UART: [art] Store in in slot 0x4
30,569,502 UART: [art] Derive Key Pair
30,570,578 UART: [art] Store priv key in slot 0x5
33,033,838 UART: [art] Derive Key Pair - Done
33,046,665 UART: [art] Signing Cert with AUTHO
33,048,003 UART: RITY.KEYID = 7
34,761,012 UART: [art] Erasing AUTHORITY.KEYID = 7
34,762,974 UART: [art] PUB.X = E4BCD8E7BEB3A4F14A017266032D7FB4C06D6BB3AABADE5B1CF1D4B0F42A9F98952AA37259A66A0710C880EEDB431F98
34,769,843 UART: [art] PUB.Y = E012951473B3677A46D8F088A1215694C7019856117DB2EE00AF3EB5D5384C10432BA695872F38DA8B94B2F272450C6F
34,777,050 UART: [art] SIG.R = FE379C9B6CB33A18760132E90B020271B1FD1AE70A60D31B2805A36A56E26DD94EE8AF36E1894C85947B93534117FE8B
34,784,437 UART: [art] SIG.S = 18D87339499095C2A1ACAC3CFFB0C2187AC71AB05F372E9CA059501DC1E12B2541096AA7077424911D902994BA3EB282
35,763,844 UART: Caliptra RT
35,764,553 UART: [state] CFI Enabled
36,104,340 UART: [rt] RT listening for mailbox commands...
36,106,979 UART:
36,107,188 UART: Running Caliptra ROM ...
36,108,296 UART:
36,108,477 UART: [state] CFI Enabled
36,169,774 UART: [state] LifecycleState = Unprovisioned
36,171,643 UART: [state] DebugLocked = No
36,173,029 UART: [state] WD Timer not started. Device not locked for debugging
36,176,772 UART: [kat] SHA2-256
36,355,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,367,479 UART: [kat] ++
36,368,027 UART: [kat] sha1
36,379,140 UART: [kat] SHA2-256
36,382,157 UART: [kat] SHA2-384
36,388,626 UART: [kat] SHA2-512-ACC
36,391,564 UART: [kat] ECC-384
38,852,008 UART: [kat] HMAC-384Kdf
38,873,854 UART: [kat] LMS
39,403,315 UART: [kat] --
39,408,837 UART: [update-reset] ++
44,000,336 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,003,443 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
44,386,787 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,362,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,008,192 >>> mbox cmd response: success
15,010,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,332,092 UART:
19,332,512 UART: Running Caliptra FMC ...
19,333,627 UART:
19,333,786 UART: [state] CFI Enabled
19,396,937 UART: [fht] FMC Alias Private Key: 7
21,160,751 UART: [art] Extend RT PCRs Done
21,161,971 UART: [art] Lock RT PCRs Done
21,163,815 UART: [art] Populate DV Done
21,169,242 UART: [fht] FMC Alias Private Key: 7
21,170,841 UART: [art] Derive CDI
21,171,662 UART: [art] Store in in slot 0x4
21,229,696 UART: [art] Derive Key Pair
21,230,695 UART: [art] Store priv key in slot 0x5
23,693,358 UART: [art] Derive Key Pair - Done
23,705,994 UART: [art] Signing Cert with AUTHO
23,707,296 UART: RITY.KEYID = 7
25,419,172 UART: [art] Erasing AUTHORITY.KEYID = 7
25,420,686 UART: [art] PUB.X = C4BCD597ED86AE62EE9C23F5D70A69E4F4EA8201E742BCF7452B0E1A7713D2E3E7F09A7CCC406C3E4AC1F3A0DA9B2F33
25,427,986 UART: [art] PUB.Y = 1B3FA2C89363423AC6F7A53296F28953794F2CA9684645DBB5A9FAFE29B92E7C027769E5CE2F1D09799BB0E56C34E70F
25,435,222 UART: [art] SIG.R = E0716433AF45590FE7346A6E8164311AD03C0824ADD1F01D7291DF5ABB03340E1901840E2064106934434709EE49F132
25,442,590 UART: [art] SIG.S = 4FBE041BE56325E8BB70FD84C807C29B66AD4CD8247E762393FEDA3151D5FE0949CB792D599BC7960CF99D38D0E84C76
26,421,397 UART: Caliptra RT
26,422,125 UART: [state] CFI Enabled
26,587,276 UART: [rt] RT listening for mailbox commands...
29,810,924 >>> mbox cmd response: failed
29,812,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,956,876 UART:
29,957,183 UART: Running Caliptra FMC ...
29,958,250 UART:
29,958,405 UART: [state] CFI Enabled
29,959,266 UART: [art] Extend RT PCRs Done
29,960,404 UART: [art] Lock RT PCRs Done
29,961,472 UART: [art] Populate DV Done
29,962,592 UART: [fht] FMC Alias Private Key: 7
29,963,912 UART: [art] Derive CDI
29,964,650 UART: [art] Store in in slot 0x4
29,997,681 UART: [art] Derive Key Pair
29,998,675 UART: [art] Store priv key in slot 0x5
32,461,656 UART: [art] Derive Key Pair - Done
32,474,654 UART: [art] Signing Cert with AUTHO
32,475,986 UART: RITY.KEYID = 7
34,187,525 UART: [art] Erasing AUTHORITY.KEYID = 7
34,189,041 UART: [art] PUB.X = C4BCD597ED86AE62EE9C23F5D70A69E4F4EA8201E742BCF7452B0E1A7713D2E3E7F09A7CCC406C3E4AC1F3A0DA9B2F33
34,196,358 UART: [art] PUB.Y = 1B3FA2C89363423AC6F7A53296F28953794F2CA9684645DBB5A9FAFE29B92E7C027769E5CE2F1D09799BB0E56C34E70F
34,203,582 UART: [art] SIG.R = E0716433AF45590FE7346A6E8164311AD03C0824ADD1F01D7291DF5ABB03340E1901840E2064106934434709EE49F132
34,210,910 UART: [art] SIG.S = 4FBE041BE56325E8BB70FD84C807C29B66AD4CD8247E762393FEDA3151D5FE0949CB792D599BC7960CF99D38D0E84C76
35,189,688 UART: Caliptra RT
35,190,401 UART: [state] CFI Enabled
35,522,809 UART: [rt] RT listening for mailbox commands...
43,463,758 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,379 UART:
192,756 UART: Running Caliptra ROM ...
193,875 UART:
603,514 UART: [state] CFI Enabled
618,371 UART: [state] LifecycleState = Unprovisioned
620,220 UART: [state] DebugLocked = No
622,630 UART: [state] WD Timer not started. Device not locked for debugging
626,185 UART: [kat] SHA2-256
805,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,897 UART: [kat] ++
817,437 UART: [kat] sha1
828,162 UART: [kat] SHA2-256
831,171 UART: [kat] SHA2-384
836,878 UART: [kat] SHA2-512-ACC
839,808 UART: [kat] ECC-384
3,282,997 UART: [kat] HMAC-384Kdf
3,294,629 UART: [kat] LMS
3,824,127 UART: [kat] --
3,828,030 UART: [cold-reset] ++
3,830,078 UART: [fht] FHT @ 0x50003400
3,841,327 UART: [idev] ++
3,841,900 UART: [idev] CDI.KEYID = 6
3,842,812 UART: [idev] SUBJECT.KEYID = 7
3,844,026 UART: [idev] UDS.KEYID = 0
3,847,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,219 UART: [idev] Erasing UDS.KEYID = 0
6,314,164 UART: [idev] Sha1 KeyId Algorithm
6,337,176 UART: [idev] --
6,342,229 UART: [ldev] ++
6,342,810 UART: [ldev] CDI.KEYID = 6
6,343,697 UART: [ldev] SUBJECT.KEYID = 5
6,344,908 UART: [ldev] AUTHORITY.KEYID = 7
6,346,141 UART: [ldev] FE.KEYID = 1
6,357,710 UART: [ldev] Erasing FE.KEYID = 1
8,833,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,651 UART: [ldev] --
10,623,862 UART: [fwproc] Wait for Commands...
10,625,491 UART: [fwproc] Recv command 0x46574c44
10,627,538 UART: [fwproc] Recv'd Img size: 114448 bytes
15,198,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,279,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,348,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
15,666,787 >>> mbox cmd response: success
15,669,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,812,891 UART: [afmc] ++
15,813,536 UART: [afmc] CDI.KEYID = 6
15,814,455 UART: [afmc] SUBJECT.KEYID = 7
15,815,562 UART: [afmc] AUTHORITY.KEYID = 5
18,175,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,893,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,895,697 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,911,651 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,927,646 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,943,442 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,966,072 UART: [afmc] --
19,969,622 UART: [cold-reset] --
19,974,080 UART: [state] Locking Datavault
19,980,244 UART: [state] Locking PCR0, PCR1 and PCR31
19,981,888 UART: [state] Locking ICCM
19,983,228 UART: [exit] Launching FMC @ 0x40000130
19,991,675 UART:
19,991,915 UART: Running Caliptra FMC ...
19,993,016 UART:
19,993,178 UART: [state] CFI Enabled
20,001,442 UART: [fht] FMC Alias Private Key: 7
21,758,110 UART: [art] Extend RT PCRs Done
21,759,335 UART: [art] Lock RT PCRs Done
21,760,743 UART: [art] Populate DV Done
21,766,107 UART: [fht] FMC Alias Private Key: 7
21,767,776 UART: [art] Derive CDI
21,768,599 UART: [art] Store in in slot 0x4
21,811,089 UART: [art] Derive Key Pair
21,812,132 UART: [art] Store priv key in slot 0x5
24,238,951 UART: [art] Derive Key Pair - Done
24,251,947 UART: [art] Signing Cert with AUTHO
24,253,250 UART: RITY.KEYID = 7
25,958,785 UART: [art] Erasing AUTHORITY.KEYID = 7
25,960,296 UART: [art] PUB.X = 962C54568832AF582FDF1067D9874D341799F8EDBF5C2AF9F55EB9D3B3C1BAF01A25643413AE1C535BB1139702CBCE8E
25,967,547 UART: [art] PUB.Y = 929E1953AC1B90ADDD58AC2BA0700F33510182BF4167C28CC5B2F31FEE35DC7983B7472F4BD4B5184EC3ABA6F23629D6
25,974,837 UART: [art] SIG.R = AFE9658B50AFC84DAE0AFEBBF079A10CB5DB8DA0CF1FC2939659D895AA9D58A5820B86290244A371D2C1557C50D0DB9C
25,982,234 UART: [art] SIG.S = 7AC1EE523D71F0EA41B4B127B79C7D6101ADF762044C48AE35482D7B4044BD15A5F2165FD71D6589FCA6A4D1B980C59C
26,960,789 UART: Caliptra RT
26,961,497 UART: [state] CFI Enabled
27,079,169 UART: [rt] RT listening for mailbox commands...
27,082,018 UART:
27,082,291 UART: Running Caliptra ROM ...
27,083,399 UART:
27,083,613 UART: [state] CFI Enabled
27,097,765 UART: [state] LifecycleState = Unprovisioned
27,099,599 UART: [state] DebugLocked = No
27,101,407 UART: [state] WD Timer not started. Device not locked for debugging
27,106,007 UART: [kat] SHA2-256
27,285,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,296,779 UART: [kat] ++
27,297,315 UART: [kat] sha1
27,308,583 UART: [kat] SHA2-256
27,311,598 UART: [kat] SHA2-384
27,316,609 UART: [kat] SHA2-512-ACC
27,319,545 UART: [kat] ECC-384
29,760,783 UART: [kat] HMAC-384Kdf
29,773,275 UART: [kat] LMS
30,302,764 UART: [kat] --
30,305,504 UART: [update-reset] ++
30,353,440 >>> mbox cmd response: failed
30,355,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,499,291 UART: ROM Non-Fatal Error: 0x000B003D
30,500,729 UART: [state] Locking Datavault
30,501,802 UART: [state] Locking PCR0, PCR1 and PCR31
30,503,337 UART: [state] Locking ICCM
30,504,215 UART: [exit] Launching FMC @ 0x40000130
30,505,558 UART:
30,505,707 UART: Running Caliptra FMC ...
30,506,806 UART:
30,506,962 UART: [state] CFI Enabled
30,507,883 UART: [art] Extend RT PCRs Done
30,509,015 UART: [art] Lock RT PCRs Done
30,510,080 UART: [art] Populate DV Done
30,511,129 UART: [fht] FMC Alias Private Key: 7
30,512,450 UART: [art] Derive CDI
30,513,185 UART: [art] Store in in slot 0x4
30,514,351 UART: [art] Derive Key Pair
30,515,291 UART: [art] Store priv key in slot 0x5
32,900,719 UART: [art] Derive Key Pair - Done
32,913,666 UART: [art] Signing Cert with AUTHO
32,915,050 UART: RITY.KEYID = 7
34,620,141 UART: [art] Erasing AUTHORITY.KEYID = 7
34,621,630 UART: [art] PUB.X = 962C54568832AF582FDF1067D9874D341799F8EDBF5C2AF9F55EB9D3B3C1BAF01A25643413AE1C535BB1139702CBCE8E
34,628,915 UART: [art] PUB.Y = 929E1953AC1B90ADDD58AC2BA0700F33510182BF4167C28CC5B2F31FEE35DC7983B7472F4BD4B5184EC3ABA6F23629D6
34,636,191 UART: [art] SIG.R = AFE9658B50AFC84DAE0AFEBBF079A10CB5DB8DA0CF1FC2939659D895AA9D58A5820B86290244A371D2C1557C50D0DB9C
34,643,566 UART: [art] SIG.S = 7AC1EE523D71F0EA41B4B127B79C7D6101ADF762044C48AE35482D7B4044BD15A5F2165FD71D6589FCA6A4D1B980C59C
35,622,226 UART: Caliptra RT
35,622,935 UART: [state] CFI Enabled
35,909,425 UART: [rt] RT listening for mailbox commands...
35,912,142 UART:
35,912,396 UART: Running Caliptra ROM ...
35,913,499 UART:
35,913,711 UART: [state] CFI Enabled
40,324,527 UART: [state] LifecycleState = Unprovisioned
40,326,444 UART: [state] DebugLocked = No
40,328,322 UART: [state] WD Timer not started. Device not locked for debugging
40,332,075 UART: [kat] SHA2-256
40,511,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,522,843 UART: [kat] ++
40,523,379 UART: [kat] sha1
40,534,758 UART: [kat] SHA2-256
40,537,816 UART: [kat] SHA2-384
40,543,469 UART: [kat] SHA2-512-ACC
40,546,363 UART: [kat] ECC-384
42,990,158 UART: [kat] HMAC-384Kdf
43,002,891 UART: [kat] LMS
43,532,400 UART: [kat] --
43,537,834 UART: [update-reset] ++
48,132,145 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,134,827 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
48,518,164 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,704,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,265,159 >>> mbox cmd response: success
15,267,004 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
19,514,353 UART:
19,514,760 UART: Running Caliptra FMC ...
19,515,890 UART:
19,516,049 UART: [state] CFI Enabled
19,523,940 UART: [fht] FMC Alias Private Key: 7
21,280,320 UART: [art] Extend RT PCRs Done
21,281,544 UART: [art] Lock RT PCRs Done
21,283,223 UART: [art] Populate DV Done
21,288,743 UART: [fht] FMC Alias Private Key: 7
21,290,234 UART: [art] Derive CDI
21,290,973 UART: [art] Store in in slot 0x4
21,333,542 UART: [art] Derive Key Pair
21,334,589 UART: [art] Store priv key in slot 0x5
23,761,506 UART: [art] Derive Key Pair - Done
23,774,361 UART: [art] Signing Cert with AUTHO
23,775,706 UART: RITY.KEYID = 7
25,480,821 UART: [art] Erasing AUTHORITY.KEYID = 7
25,482,361 UART: [art] PUB.X = E3D97FA854BC2D45B872B05E8D81F90AE24626B4A9BB182257AAE4EFED78EB3EB2200EF57ED97B366388D5A3994E6C9D
25,489,632 UART: [art] PUB.Y = 8A6D239B428E424C9C86F5C8C4AC20D0B0BF25945FCFE6EAD06A49120B143F0CBFB240447F6F892D0F93709A595ED188
25,496,917 UART: [art] SIG.R = C667B6C44C5E1FD9555C6D24EBAB8D6D5366700F8BF2B49BBBEE98880863D6048D55A8B0EBA2261998BFBBCA51B0EE46
25,504,321 UART: [art] SIG.S = 2F0746A7F9E6D3A202B7C5A15C728E4436B897A7F7D4F1BB037464F7E32FD866CCF9B318F8446233D2885F3C234D7A08
26,483,252 UART: Caliptra RT
26,483,966 UART: [state] CFI Enabled
26,600,728 UART: [rt] RT listening for mailbox commands...
29,738,130 >>> mbox cmd response: failed
29,739,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
29,883,815 UART:
29,884,141 UART: Running Caliptra FMC ...
29,885,182 UART:
29,885,331 UART: [state] CFI Enabled
29,886,257 UART: [art] Extend RT PCRs Done
29,887,348 UART: [art] Lock RT PCRs Done
29,888,353 UART: [art] Populate DV Done
29,889,458 UART: [fht] FMC Alias Private Key: 7
29,890,783 UART: [art] Derive CDI
29,891,518 UART: [art] Store in in slot 0x4
29,892,602 UART: [art] Derive Key Pair
29,893,585 UART: [art] Store priv key in slot 0x5
32,275,196 UART: [art] Derive Key Pair - Done
32,288,153 UART: [art] Signing Cert with AUTHO
32,289,459 UART: RITY.KEYID = 7
33,994,818 UART: [art] Erasing AUTHORITY.KEYID = 7
33,996,312 UART: [art] PUB.X = E3D97FA854BC2D45B872B05E8D81F90AE24626B4A9BB182257AAE4EFED78EB3EB2200EF57ED97B366388D5A3994E6C9D
34,003,650 UART: [art] PUB.Y = 8A6D239B428E424C9C86F5C8C4AC20D0B0BF25945FCFE6EAD06A49120B143F0CBFB240447F6F892D0F93709A595ED188
34,010,904 UART: [art] SIG.R = C667B6C44C5E1FD9555C6D24EBAB8D6D5366700F8BF2B49BBBEE98880863D6048D55A8B0EBA2261998BFBBCA51B0EE46
34,018,351 UART: [art] SIG.S = 2F0746A7F9E6D3A202B7C5A15C728E4436B897A7F7D4F1BB037464F7E32FD866CCF9B318F8446233D2885F3C234D7A08
34,997,231 UART: Caliptra RT
34,997,937 UART: [state] CFI Enabled
35,287,170 UART: [rt] RT listening for mailbox commands...
48,177,182 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,439,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
15,851,913 >>> mbox cmd response: success
15,853,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,156,345 UART:
20,156,784 UART: Running Caliptra FMC ...
20,157,925 UART:
20,158,079 UART: [state] CFI Enabled
20,221,607 UART: [fht] FMC Alias Private Key: 7
21,985,685 UART: [art] Extend RT PCRs Done
21,986,910 UART: [art] Lock RT PCRs Done
21,988,563 UART: [art] Populate DV Done
21,994,177 UART: [fht] FMC Alias Private Key: 7
21,995,932 UART: [art] Derive CDI
21,996,753 UART: [art] Store in in slot 0x4
22,055,016 UART: [art] Derive Key Pair
22,056,064 UART: [art] Store priv key in slot 0x5
24,518,801 UART: [art] Derive Key Pair - Done
24,532,227 UART: [art] Signing Cert with AUTHO
24,533,712 UART: RITY.KEYID = 7
26,245,116 UART: [art] Erasing AUTHORITY.KEYID = 7
26,246,642 UART: [art] PUB.X = 9D79E52AE7FE3B8DC783C2BA336E270CABC1B3A6B86989A9AB4FC0A5462E90F54D4280998ACDC9CAAC97D80057132044
26,253,886 UART: [art] PUB.Y = A65E5D6DD97022859197490583207ADF52479357B9BC237D3F7071FCD90CC646E1190D44B68346553E29E713E76FB280
26,261,126 UART: [art] SIG.R = 21D58D09184FDBDE1F36F53DA5C628818B5FBB63A2042BE151F24278AB2F4532CDA36582E48693FCF70BED8B1ABEC7CD
26,268,531 UART: [art] SIG.S = CC6AEDF9D367A722F29729EFA8F1A2412BF931FEE4B63E556CE1EA9282E699F4EB512C845ED0450AF44C1B8205E7F517
27,247,472 UART: Caliptra RT
27,248,171 UART: [state] CFI Enabled
27,413,675 UART: [rt] RT listening for mailbox commands...
30,694,061 >>> mbox cmd response: failed
30,695,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,839,753 UART:
30,840,068 UART: Running Caliptra FMC ...
30,841,193 UART:
30,841,370 UART: [state] CFI Enabled
30,842,294 UART: [art] Extend RT PCRs Done
30,843,432 UART: [art] Lock RT PCRs Done
30,844,500 UART: [art] Populate DV Done
30,845,618 UART: [fht] FMC Alias Private Key: 7
30,846,936 UART: [art] Derive CDI
30,847,673 UART: [art] Store in in slot 0x4
30,866,845 UART: [art] Derive Key Pair
30,867,879 UART: [art] Store priv key in slot 0x5
33,330,987 UART: [art] Derive Key Pair - Done
33,344,100 UART: [art] Signing Cert with AUTHO
33,345,442 UART: RITY.KEYID = 7
35,056,291 UART: [art] Erasing AUTHORITY.KEYID = 7
35,057,795 UART: [art] PUB.X = 9D79E52AE7FE3B8DC783C2BA336E270CABC1B3A6B86989A9AB4FC0A5462E90F54D4280998ACDC9CAAC97D80057132044
35,065,087 UART: [art] PUB.Y = A65E5D6DD97022859197490583207ADF52479357B9BC237D3F7071FCD90CC646E1190D44B68346553E29E713E76FB280
35,072,364 UART: [art] SIG.R = 21D58D09184FDBDE1F36F53DA5C628818B5FBB63A2042BE151F24278AB2F4532CDA36582E48693FCF70BED8B1ABEC7CD
35,079,744 UART: [art] SIG.S = CC6AEDF9D367A722F29729EFA8F1A2412BF931FEE4B63E556CE1EA9282E699F4EB512C845ED0450AF44C1B8205E7F517
36,058,392 UART: Caliptra RT
36,059,104 UART: [state] CFI Enabled
36,392,978 UART: [rt] RT listening for mailbox commands...
45,174,845 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,756,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,045,623 >>> mbox cmd response: success
16,047,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
20,305,117 UART:
20,305,526 UART: Running Caliptra FMC ...
20,306,675 UART:
20,306,835 UART: [state] CFI Enabled
20,314,832 UART: [fht] FMC Alias Private Key: 7
22,071,717 UART: [art] Extend RT PCRs Done
22,072,958 UART: [art] Lock RT PCRs Done
22,074,644 UART: [art] Populate DV Done
22,079,993 UART: [fht] FMC Alias Private Key: 7
22,081,600 UART: [art] Derive CDI
22,082,425 UART: [art] Store in in slot 0x4
22,124,706 UART: [art] Derive Key Pair
22,125,753 UART: [art] Store priv key in slot 0x5
24,552,299 UART: [art] Derive Key Pair - Done
24,565,404 UART: [art] Signing Cert with AUTHO
24,566,709 UART: RITY.KEYID = 7
26,272,419 UART: [art] Erasing AUTHORITY.KEYID = 7
26,273,940 UART: [art] PUB.X = DA4F06AB06C16093584C4A9ED0205BB6F157B8D345116B1241237AEBD73C9A89AE7D600B764E60C7DE761B0BA3222F2E
26,281,230 UART: [art] PUB.Y = 671536E95968016950262BD5978AA96092707C4E4F344BED6334428470FADBADC8B22153CAA3A11683763DB9814CF3AB
26,288,437 UART: [art] SIG.R = 61CFF894A3690B2F7F39D50551C83948E4140729FD64B8227E24A106F19DFD001FC4A8DD52B29D31DE6821FE22957D03
26,295,813 UART: [art] SIG.S = C64954AAE7F7404F0B263A45A6D5440E41DD8802E6971763196B456DC57247B5769356FC7629423A82F0C8930D10B848
27,274,903 UART: Caliptra RT
27,275,598 UART: [state] CFI Enabled
27,393,141 UART: [rt] RT listening for mailbox commands...
30,592,217 >>> mbox cmd response: failed
30,594,055 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,737,774 UART:
30,738,105 UART: Running Caliptra FMC ...
30,739,235 UART:
30,739,399 UART: [state] CFI Enabled
30,740,319 UART: [art] Extend RT PCRs Done
30,741,456 UART: [art] Lock RT PCRs Done
30,742,521 UART: [art] Populate DV Done
30,743,633 UART: [fht] FMC Alias Private Key: 7
30,744,971 UART: [art] Derive CDI
30,745,711 UART: [art] Store in in slot 0x4
30,746,878 UART: [art] Derive Key Pair
30,747,815 UART: [art] Store priv key in slot 0x5
33,131,431 UART: [art] Derive Key Pair - Done
33,144,324 UART: [art] Signing Cert with AUTHO
33,145,627 UART: RITY.KEYID = 7
34,851,190 UART: [art] Erasing AUTHORITY.KEYID = 7
34,852,709 UART: [art] PUB.X = DA4F06AB06C16093584C4A9ED0205BB6F157B8D345116B1241237AEBD73C9A89AE7D600B764E60C7DE761B0BA3222F2E
34,860,011 UART: [art] PUB.Y = 671536E95968016950262BD5978AA96092707C4E4F344BED6334428470FADBADC8B22153CAA3A11683763DB9814CF3AB
34,867,244 UART: [art] SIG.R = 61CFF894A3690B2F7F39D50551C83948E4140729FD64B8227E24A106F19DFD001FC4A8DD52B29D31DE6821FE22957D03
34,874,582 UART: [art] SIG.S = C64954AAE7F7404F0B263A45A6D5440E41DD8802E6971763196B456DC57247B5769356FC7629423A82F0C8930D10B848
35,853,344 UART: Caliptra RT
35,854,047 UART: [state] CFI Enabled
36,141,424 UART: [rt] RT listening for mailbox commands...
48,983,749 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,727 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,221 UART: [kat] SHA2-256
882,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,267 UART: [kat] ++
886,419 UART: [kat] sha1
890,667 UART: [kat] SHA2-256
892,605 UART: [kat] SHA2-384
895,546 UART: [kat] SHA2-512-ACC
897,447 UART: [kat] ECC-384
902,946 UART: [kat] HMAC-384Kdf
907,644 UART: [kat] LMS
1,475,840 UART: [kat] --
1,476,837 UART: [cold-reset] ++
1,477,295 UART: [fht] Storing FHT @ 0x50003400
1,480,048 UART: [idev] ++
1,480,216 UART: [idev] CDI.KEYID = 6
1,480,576 UART: [idev] SUBJECT.KEYID = 7
1,481,000 UART: [idev] UDS.KEYID = 0
1,481,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,914 UART: [idev] Erasing UDS.KEYID = 0
1,505,270 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,864 UART: [idev] --
1,514,755 UART: [ldev] ++
1,514,923 UART: [ldev] CDI.KEYID = 6
1,515,286 UART: [ldev] SUBJECT.KEYID = 5
1,515,712 UART: [ldev] AUTHORITY.KEYID = 7
1,516,175 UART: [ldev] FE.KEYID = 1
1,521,141 UART: [ldev] Erasing FE.KEYID = 1
1,546,210 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,494 UART: [ldev] --
1,585,907 UART: [fwproc] Waiting for Commands...
1,586,666 UART: [fwproc] Received command 0x46574c44
1,587,457 UART: [fwproc] Received Image of size 114448 bytes
5,235,032 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,262,822 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,292,174 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,428,271 >>> mbox cmd response: success
5,428,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,429,469 UART: [afmc] ++
5,429,637 UART: [afmc] CDI.KEYID = 6
5,429,999 UART: [afmc] SUBJECT.KEYID = 7
5,430,424 UART: [afmc] AUTHORITY.KEYID = 5
5,465,752 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,481,940 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,482,720 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,488,429 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,494,321 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,500,022 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,507,790 UART: [afmc] --
5,508,764 UART: [cold-reset] --
5,509,648 UART: [state] Locking Datavault
5,511,057 UART: [state] Locking PCR0, PCR1 and PCR31
5,511,661 UART: [state] Locking ICCM
5,512,167 UART: [exit] Launching FMC @ 0x40000130
5,517,496 UART:
5,517,512 UART: Running Caliptra FMC ...
5,517,920 UART:
5,517,974 UART: [state] CFI Enabled
5,528,500 UART: [fht] FMC Alias Private Key: 7
5,636,862 UART: [art] Extend RT PCRs Done
5,637,290 UART: [art] Lock RT PCRs Done
5,639,144 UART: [art] Populate DV Done
5,647,284 UART: [fht] FMC Alias Private Key: 7
5,648,376 UART: [art] Derive CDI
5,648,656 UART: [art] Store in in slot 0x4
5,734,183 UART: [art] Derive Key Pair
5,734,543 UART: [art] Store priv key in slot 0x5
5,747,633 UART: [art] Derive Key Pair - Done
5,762,343 UART: [art] Signing Cert with AUTHO
5,762,823 UART: RITY.KEYID = 7
5,778,251 UART: [art] Erasing AUTHORITY.KEYID = 7
5,779,016 UART: [art] PUB.X = B031FDC6B227B682372E4753CC3D9A85013199E9EC7CB1FECFBB49C3B3E0F5312C4D682EEA033BF44F7E867831B510D5
5,785,792 UART: [art] PUB.Y = F56F3CCEB81F421C2A457EC682D6F6F913A4F4DF91D669D9FCFECBE2F8A1C2BD4A28EA95F9E1213AA763D45AC3001415
5,792,742 UART: [art] SIG.R = 4389756A69DBBB332A1E4D2A54F770D39654FFF08693E51FB2F87A68FF4489B167043025826B87AF1E0110D9121CF0C0
5,799,504 UART: [art] SIG.S = 17B7514E764E2C6D79FA5316CF4E3C95846E229A06D68045AE25BAE7CC287A79320A5C97FACD4F598770A19550B2C6E0
5,823,273 UART: Caliptra RT
5,823,526 UART: [state] CFI Enabled
5,931,406 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,933,085 UART:
5,933,101 UART: Running Caliptra ROM ...
5,933,509 UART:
5,933,563 UART: [state] CFI Enabled
5,936,333 UART: [state] LifecycleState = Unprovisioned
5,936,988 UART: [state] DebugLocked = No
5,937,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,939,237 UART: [kat] SHA2-256
6,733,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,737,283 UART: [kat] ++
6,737,435 UART: [kat] sha1
6,741,727 UART: [kat] SHA2-256
6,743,665 UART: [kat] SHA2-384
6,746,284 UART: [kat] SHA2-512-ACC
6,748,184 UART: [kat] ECC-384
6,753,781 UART: [kat] HMAC-384Kdf
6,758,323 UART: [kat] LMS
7,326,519 UART: [kat] --
7,327,488 UART: [update-reset] ++
7,367,357 >>> mbox cmd response: failed
7,367,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
7,367,547 UART: ROM Non-Fatal Error: 0x000B003D
7,368,307 UART: [state] Locking Datavault
7,369,085 UART: [state] Locking PCR0, PCR1 and PCR31
7,369,689 UART: [state] Locking ICCM
7,370,155 UART: [exit] Launching FMC @ 0x40000130
7,375,484 UART:
7,375,500 UART: Running Caliptra FMC ...
7,375,908 UART:
7,375,962 UART: [state] CFI Enabled
7,464,957 UART: [art] Extend RT PCRs Done
7,465,385 UART: [art] Lock RT PCRs Done
7,466,612 UART: [art] Populate DV Done
7,475,010 UART: [fht] FMC Alias Private Key: 7
7,476,098 UART: [art] Derive CDI
7,476,378 UART: [art] Store in in slot 0x4
7,561,807 UART: [art] Derive Key Pair
7,562,167 UART: [art] Store priv key in slot 0x5
7,575,571 UART: [art] Derive Key Pair - Done
7,590,449 UART: [art] Signing Cert with AUTHO
7,590,929 UART: RITY.KEYID = 7
7,606,465 UART: [art] Erasing AUTHORITY.KEYID = 7
7,607,230 UART: [art] PUB.X = B031FDC6B227B682372E4753CC3D9A85013199E9EC7CB1FECFBB49C3B3E0F5312C4D682EEA033BF44F7E867831B510D5
7,614,006 UART: [art] PUB.Y = F56F3CCEB81F421C2A457EC682D6F6F913A4F4DF91D669D9FCFECBE2F8A1C2BD4A28EA95F9E1213AA763D45AC3001415
7,620,956 UART: [art] SIG.R = 4389756A69DBBB332A1E4D2A54F770D39654FFF08693E51FB2F87A68FF4489B167043025826B87AF1E0110D9121CF0C0
7,627,718 UART: [art] SIG.S = 17B7514E764E2C6D79FA5316CF4E3C95846E229A06D68045AE25BAE7CC287A79320A5C97FACD4F598770A19550B2C6E0
7,651,759 UART: Caliptra RT
7,652,012 UART: [state] CFI Enabled
7,938,128 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,939,528 UART:
7,939,544 UART: Running Caliptra ROM ...
7,939,952 UART:
7,940,006 UART: [state] CFI Enabled
7,942,324 UART: [state] LifecycleState = Unprovisioned
7,942,979 UART: [state] DebugLocked = No
7,943,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,945,392 UART: [kat] SHA2-256
8,739,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,743,438 UART: [kat] ++
8,743,590 UART: [kat] sha1
8,747,908 UART: [kat] SHA2-256
8,749,846 UART: [kat] SHA2-384
8,752,765 UART: [kat] SHA2-512-ACC
8,754,665 UART: [kat] ECC-384
8,760,588 UART: [kat] HMAC-384Kdf
8,765,160 UART: [kat] LMS
9,333,356 UART: [kat] --
9,333,903 UART: [update-reset] ++
13,018,214 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,019,300 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
13,169,350 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,317,154 >>> mbox cmd response: success
5,317,154 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,378,329 UART:
5,378,345 UART: Running Caliptra FMC ...
5,378,753 UART:
5,378,807 UART: [state] CFI Enabled
5,389,331 UART: [fht] FMC Alias Private Key: 7
5,497,629 UART: [art] Extend RT PCRs Done
5,498,057 UART: [art] Lock RT PCRs Done
5,499,861 UART: [art] Populate DV Done
5,508,077 UART: [fht] FMC Alias Private Key: 7
5,509,201 UART: [art] Derive CDI
5,509,481 UART: [art] Store in in slot 0x4
5,595,006 UART: [art] Derive Key Pair
5,595,366 UART: [art] Store priv key in slot 0x5
5,608,416 UART: [art] Derive Key Pair - Done
5,623,244 UART: [art] Signing Cert with AUTHO
5,623,724 UART: RITY.KEYID = 7
5,638,796 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,561 UART: [art] PUB.X = 1D301AD64E1E3C708D4DBA5FB55545CA92E9BD0CC205CD6C6394726031949D125D62C086427D16C7F00133E228134936
5,646,318 UART: [art] PUB.Y = 16A1AEB888AFC8DD666346E31FCBFBFC27A82418889FA70393E12CA0CDE87EC4FC8F286806CE0669744CB1E9EDE1A9E8
5,653,279 UART: [art] SIG.R = A40876111E857BAB00019777918E6FDD1682F829A6E4ECC72E2558CBAE67AEC4655B87DD3228A63616ADBA0017271BCD
5,660,005 UART: [art] SIG.S = CBFA2A677636F5C556C3204ABFEE6CA3135F83DC05C53BDD7EC9C6FAC9BFCB61E4E2EFC23D0D87ED5D9511A4E1EC890F
5,684,049 UART: Caliptra RT
5,684,302 UART: [state] CFI Enabled
5,792,674 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,112,744 >>> mbox cmd response: failed
7,112,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
7,118,475 UART:
7,118,491 UART: Running Caliptra FMC ...
7,118,899 UART:
7,118,953 UART: [state] CFI Enabled
7,208,300 UART: [art] Extend RT PCRs Done
7,208,728 UART: [art] Lock RT PCRs Done
7,209,867 UART: [art] Populate DV Done
7,217,965 UART: [fht] FMC Alias Private Key: 7
7,219,055 UART: [art] Derive CDI
7,219,335 UART: [art] Store in in slot 0x4
7,305,236 UART: [art] Derive Key Pair
7,305,596 UART: [art] Store priv key in slot 0x5
7,318,760 UART: [art] Derive Key Pair - Done
7,333,610 UART: [art] Signing Cert with AUTHO
7,334,090 UART: RITY.KEYID = 7
7,349,070 UART: [art] Erasing AUTHORITY.KEYID = 7
7,349,835 UART: [art] PUB.X = 1D301AD64E1E3C708D4DBA5FB55545CA92E9BD0CC205CD6C6394726031949D125D62C086427D16C7F00133E228134936
7,356,592 UART: [art] PUB.Y = 16A1AEB888AFC8DD666346E31FCBFBFC27A82418889FA70393E12CA0CDE87EC4FC8F286806CE0669744CB1E9EDE1A9E8
7,363,553 UART: [art] SIG.R = A40876111E857BAB00019777918E6FDD1682F829A6E4ECC72E2558CBAE67AEC4655B87DD3228A63616ADBA0017271BCD
7,370,279 UART: [art] SIG.S = CBFA2A677636F5C556C3204ABFEE6CA3135F83DC05C53BDD7EC9C6FAC9BFCB61E4E2EFC23D0D87ED5D9511A4E1EC890F
7,394,629 UART: Caliptra RT
7,394,882 UART: [state] CFI Enabled
7,679,582 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,831,201 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,718 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,376 UART: [kat] SHA2-256
882,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,422 UART: [kat] ++
886,574 UART: [kat] sha1
890,934 UART: [kat] SHA2-256
892,872 UART: [kat] SHA2-384
895,723 UART: [kat] SHA2-512-ACC
897,624 UART: [kat] ECC-384
903,393 UART: [kat] HMAC-384Kdf
907,975 UART: [kat] LMS
1,476,171 UART: [kat] --
1,477,052 UART: [cold-reset] ++
1,477,392 UART: [fht] Storing FHT @ 0x50003400
1,480,171 UART: [idev] ++
1,480,339 UART: [idev] CDI.KEYID = 6
1,480,699 UART: [idev] SUBJECT.KEYID = 7
1,481,123 UART: [idev] UDS.KEYID = 0
1,481,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,729 UART: [idev] Erasing UDS.KEYID = 0
1,505,613 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,319 UART: [idev] --
1,515,278 UART: [ldev] ++
1,515,446 UART: [ldev] CDI.KEYID = 6
1,515,809 UART: [ldev] SUBJECT.KEYID = 5
1,516,235 UART: [ldev] AUTHORITY.KEYID = 7
1,516,698 UART: [ldev] FE.KEYID = 1
1,522,028 UART: [ldev] Erasing FE.KEYID = 1
1,548,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,347 UART: [ldev] --
1,587,794 UART: [fwproc] Waiting for Commands...
1,588,663 UART: [fwproc] Received command 0x46574c44
1,589,454 UART: [fwproc] Received Image of size 114448 bytes
5,123,792 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,151,374 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,180,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
5,316,847 >>> mbox cmd response: success
5,316,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,317,953 UART: [afmc] ++
5,318,121 UART: [afmc] CDI.KEYID = 6
5,318,483 UART: [afmc] SUBJECT.KEYID = 7
5,318,908 UART: [afmc] AUTHORITY.KEYID = 5
5,353,944 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,370,096 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,370,876 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,376,585 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,382,477 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,388,178 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,395,850 UART: [afmc] --
5,396,900 UART: [cold-reset] --
5,397,666 UART: [state] Locking Datavault
5,398,611 UART: [state] Locking PCR0, PCR1 and PCR31
5,399,215 UART: [state] Locking ICCM
5,399,841 UART: [exit] Launching FMC @ 0x40000130
5,405,170 UART:
5,405,186 UART: Running Caliptra FMC ...
5,405,594 UART:
5,405,737 UART: [state] CFI Enabled
5,416,529 UART: [fht] FMC Alias Private Key: 7
5,524,613 UART: [art] Extend RT PCRs Done
5,525,041 UART: [art] Lock RT PCRs Done
5,526,455 UART: [art] Populate DV Done
5,534,463 UART: [fht] FMC Alias Private Key: 7
5,535,439 UART: [art] Derive CDI
5,535,719 UART: [art] Store in in slot 0x4
5,621,312 UART: [art] Derive Key Pair
5,621,672 UART: [art] Store priv key in slot 0x5
5,634,556 UART: [art] Derive Key Pair - Done
5,649,348 UART: [art] Signing Cert with AUTHO
5,649,828 UART: RITY.KEYID = 7
5,664,926 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,691 UART: [art] PUB.X = B4268227A508B2A04039B333434FFEC069859EB05C279CA2230729957C093788F7851ABE523291FAEC2BE514FAC0F532
5,672,448 UART: [art] PUB.Y = 54D90015CD735456C4B63BF5E7F5D226E27123A114D6B1F6DE1BD84DEAAEE3BBA0702D32156FFFE78E96D4782C3269BC
5,679,390 UART: [art] SIG.R = A8AA2C0FED657B370CEA336DAC0C340C8557D992161236C13D6381722E5C0CA3C4BD675FAB6C9EB7C0F536538DF60DBF
5,686,158 UART: [art] SIG.S = 4A756631D2B9BEA97561E13E36F50F6343B3C9F1048C4E3FD7BFCD90A0AB0F3FC8E822E7FACE520E8BD23C6F56C8615B
5,710,193 UART: Caliptra RT
5,710,538 UART: [state] CFI Enabled
5,818,517 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,820,258 UART:
5,820,274 UART: Running Caliptra ROM ...
5,820,682 UART:
5,820,823 UART: [state] CFI Enabled
5,823,101 UART: [state] LifecycleState = Unprovisioned
5,823,756 UART: [state] DebugLocked = No
5,824,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,826,059 UART: [kat] SHA2-256
6,619,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,624,105 UART: [kat] ++
6,624,257 UART: [kat] sha1
6,628,547 UART: [kat] SHA2-256
6,630,485 UART: [kat] SHA2-384
6,633,154 UART: [kat] SHA2-512-ACC
6,635,054 UART: [kat] ECC-384
6,640,623 UART: [kat] HMAC-384Kdf
6,645,499 UART: [kat] LMS
7,213,695 UART: [kat] --
7,214,494 UART: [update-reset] ++
7,254,877 >>> mbox cmd response: failed
7,254,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
7,255,151 UART: ROM Non-Fatal Error: 0x000B003D
7,255,949 UART: [state] Locking Datavault
7,256,601 UART: [state] Locking PCR0, PCR1 and PCR31
7,257,205 UART: [state] Locking ICCM
7,257,843 UART: [exit] Launching FMC @ 0x40000130
7,263,172 UART:
7,263,188 UART: Running Caliptra FMC ...
7,263,596 UART:
7,263,739 UART: [state] CFI Enabled
7,352,494 UART: [art] Extend RT PCRs Done
7,352,922 UART: [art] Lock RT PCRs Done
7,354,237 UART: [art] Populate DV Done
7,362,681 UART: [fht] FMC Alias Private Key: 7
7,363,805 UART: [art] Derive CDI
7,364,085 UART: [art] Store in in slot 0x4
7,449,558 UART: [art] Derive Key Pair
7,449,918 UART: [art] Store priv key in slot 0x5
7,463,048 UART: [art] Derive Key Pair - Done
7,477,786 UART: [art] Signing Cert with AUTHO
7,478,266 UART: RITY.KEYID = 7
7,493,614 UART: [art] Erasing AUTHORITY.KEYID = 7
7,494,379 UART: [art] PUB.X = B4268227A508B2A04039B333434FFEC069859EB05C279CA2230729957C093788F7851ABE523291FAEC2BE514FAC0F532
7,501,136 UART: [art] PUB.Y = 54D90015CD735456C4B63BF5E7F5D226E27123A114D6B1F6DE1BD84DEAAEE3BBA0702D32156FFFE78E96D4782C3269BC
7,508,078 UART: [art] SIG.R = A8AA2C0FED657B370CEA336DAC0C340C8557D992161236C13D6381722E5C0CA3C4BD675FAB6C9EB7C0F536538DF60DBF
7,514,846 UART: [art] SIG.S = 4A756631D2B9BEA97561E13E36F50F6343B3C9F1048C4E3FD7BFCD90A0AB0F3FC8E822E7FACE520E8BD23C6F56C8615B
7,538,277 UART: Caliptra RT
7,538,622 UART: [state] CFI Enabled
7,825,469 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,827,195 UART:
7,827,211 UART: Running Caliptra ROM ...
7,827,619 UART:
7,827,760 UART: [state] CFI Enabled
7,830,446 UART: [state] LifecycleState = Unprovisioned
7,831,101 UART: [state] DebugLocked = No
7,831,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,833,240 UART: [kat] SHA2-256
8,627,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,631,286 UART: [kat] ++
8,631,438 UART: [kat] sha1
8,635,794 UART: [kat] SHA2-256
8,637,732 UART: [kat] SHA2-384
8,640,643 UART: [kat] SHA2-512-ACC
8,642,543 UART: [kat] ECC-384
8,647,936 UART: [kat] HMAC-384Kdf
8,652,590 UART: [kat] LMS
9,220,786 UART: [kat] --
9,221,531 UART: [update-reset] ++
12,792,149 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,793,319 UART: [update-reset] Loading Runtime at address 0x40005000 len 89764
12,943,369 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,200,750 >>> mbox cmd response: success
5,200,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,262,523 UART:
5,262,539 UART: Running Caliptra FMC ...
5,262,947 UART:
5,263,090 UART: [state] CFI Enabled
5,273,548 UART: [fht] FMC Alias Private Key: 7
5,381,640 UART: [art] Extend RT PCRs Done
5,382,068 UART: [art] Lock RT PCRs Done
5,383,504 UART: [art] Populate DV Done
5,391,744 UART: [fht] FMC Alias Private Key: 7
5,392,796 UART: [art] Derive CDI
5,393,076 UART: [art] Store in in slot 0x4
5,478,473 UART: [art] Derive Key Pair
5,478,833 UART: [art] Store priv key in slot 0x5
5,491,895 UART: [art] Derive Key Pair - Done
5,506,847 UART: [art] Signing Cert with AUTHO
5,507,327 UART: RITY.KEYID = 7
5,522,793 UART: [art] Erasing AUTHORITY.KEYID = 7
5,523,558 UART: [art] PUB.X = 89A844E81EF4D3033CE054017BCFA2612B226965DBB522DC53222BE41BA9189CD1E5AB59AAC97F7B641861B500D51C1E
5,530,308 UART: [art] PUB.Y = 3FA7263EAEBFA0B06DBDD09295C8BFC714361DCC5A50E754A304DA329C577378718C63EBD359F4DD5872A78958540C80
5,537,260 UART: [art] SIG.R = 4F62C2D26617579E6CEBD1DC5BA3742B5260E526302458031A10CFD7BA198D17879AA019D0A486794FDD995DAF69060B
5,544,023 UART: [art] SIG.S = E4107B69491B6A954DFE144DF79D8579526DAE25A1BB9B0B6C0EAB0AD71AC31A1A008456D60E94D3304236DAFD5D78E9
5,568,130 UART: Caliptra RT
5,568,475 UART: [state] CFI Enabled
5,676,248 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,995,417 >>> mbox cmd response: failed
6,995,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
7,001,446 UART:
7,001,462 UART: Running Caliptra FMC ...
7,001,870 UART:
7,002,013 UART: [state] CFI Enabled
7,091,512 UART: [art] Extend RT PCRs Done
7,091,940 UART: [art] Lock RT PCRs Done
7,092,965 UART: [art] Populate DV Done
7,101,409 UART: [fht] FMC Alias Private Key: 7
7,102,487 UART: [art] Derive CDI
7,102,767 UART: [art] Store in in slot 0x4
7,188,366 UART: [art] Derive Key Pair
7,188,726 UART: [art] Store priv key in slot 0x5
7,202,186 UART: [art] Derive Key Pair - Done
7,217,048 UART: [art] Signing Cert with AUTHO
7,217,528 UART: RITY.KEYID = 7
7,232,770 UART: [art] Erasing AUTHORITY.KEYID = 7
7,233,535 UART: [art] PUB.X = 89A844E81EF4D3033CE054017BCFA2612B226965DBB522DC53222BE41BA9189CD1E5AB59AAC97F7B641861B500D51C1E
7,240,285 UART: [art] PUB.Y = 3FA7263EAEBFA0B06DBDD09295C8BFC714361DCC5A50E754A304DA329C577378718C63EBD359F4DD5872A78958540C80
7,247,237 UART: [art] SIG.R = 4F62C2D26617579E6CEBD1DC5BA3742B5260E526302458031A10CFD7BA198D17879AA019D0A486794FDD995DAF69060B
7,254,000 UART: [art] SIG.S = E4107B69491B6A954DFE144DF79D8579526DAE25A1BB9B0B6C0EAB0AD71AC31A1A008456D60E94D3304236DAFD5D78E9
7,277,533 UART: Caliptra RT
7,277,878 UART: [state] CFI Enabled
7,558,293 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,594,816 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
893,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,229 UART: [kat] ++
897,381 UART: [kat] sha1
901,485 UART: [kat] SHA2-256
903,425 UART: [kat] SHA2-384
905,958 UART: [kat] SHA2-512-ACC
907,859 UART: [kat] ECC-384
917,570 UART: [kat] HMAC-384Kdf
922,136 UART: [kat] LMS
1,170,464 UART: [kat] --
1,171,409 UART: [cold-reset] ++
1,171,797 UART: [fht] FHT @ 0x50003400
1,174,560 UART: [idev] ++
1,174,728 UART: [idev] CDI.KEYID = 6
1,175,088 UART: [idev] SUBJECT.KEYID = 7
1,175,512 UART: [idev] UDS.KEYID = 0
1,175,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,714 UART: [idev] Erasing UDS.KEYID = 0
1,200,511 UART: [idev] Sha1 KeyId Algorithm
1,208,791 UART: [idev] --
1,209,943 UART: [ldev] ++
1,210,111 UART: [ldev] CDI.KEYID = 6
1,210,474 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,243,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,057 UART: [ldev] --
1,282,536 UART: [fwproc] Wait for Commands...
1,283,140 UART: [fwproc] Recv command 0x46574c44
1,283,868 UART: [fwproc] Recv'd Img size: 114448 bytes
3,133,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,325,690 >>> mbox cmd response: success
3,325,690 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,326,876 UART: [afmc] ++
3,327,044 UART: [afmc] CDI.KEYID = 6
3,327,406 UART: [afmc] SUBJECT.KEYID = 7
3,327,831 UART: [afmc] AUTHORITY.KEYID = 5
3,363,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,638 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,347 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,239 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,950 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,721 UART: [afmc] --
3,406,669 UART: [cold-reset] --
3,407,619 UART: [state] Locking Datavault
3,408,730 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,334 UART: [state] Locking ICCM
3,409,904 UART: [exit] Launching FMC @ 0x40000130
3,415,233 UART:
3,415,249 UART: Running Caliptra FMC ...
3,415,657 UART:
3,415,711 UART: [state] CFI Enabled
3,426,335 UART: [fht] FMC Alias Private Key: 7
3,534,237 UART: [art] Extend RT PCRs Done
3,534,665 UART: [art] Lock RT PCRs Done
3,536,061 UART: [art] Populate DV Done
3,544,161 UART: [fht] FMC Alias Private Key: 7
3,545,295 UART: [art] Derive CDI
3,545,575 UART: [art] Store in in slot 0x4
3,630,930 UART: [art] Derive Key Pair
3,631,290 UART: [art] Store priv key in slot 0x5
3,644,418 UART: [art] Derive Key Pair - Done
3,658,900 UART: [art] Signing Cert with AUTHO
3,659,380 UART: RITY.KEYID = 7
3,674,676 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,441 UART: [art] PUB.X = FE88BFC216DEB734A085099A2B813B98F2B0D96483B068BA37C75096E12A0F52024D9C5F7067995049FCE6AE78078878
3,682,197 UART: [art] PUB.Y = 7C95DCEFD54E543A25CB55721FD7EC591CB113D0135562AFEAB59C9A849451192247BB8B7ACDE9B5E1931E0A43EF06DC
3,689,157 UART: [art] SIG.R = C964A586E227AC2617CF813A2265291C49D94F45F710B1735DC71A19D2FAF186755DB5A13B1C3C2663C293C48599E8C7
3,695,925 UART: [art] SIG.S = CDB79C31BFBD70DFE087A517ED2260799E9841FEF2877ADB42205BE663AA5A89A362ADB79B0629DB53975CEC6ED35F5B
3,720,179 UART: Caliptra RT
3,720,432 UART: [state] CFI Enabled
3,826,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,983 UART:
3,828,999 UART: Running Caliptra ROM ...
3,829,407 UART:
3,829,462 UART: [state] CFI Enabled
3,832,300 UART: [state] LifecycleState = Unprovisioned
3,832,955 UART: [state] DebugLocked = No
3,833,485 UART: [state] WD Timer not started. Device not locked for debugging
3,834,599 UART: [kat] SHA2-256
4,640,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,644,374 UART: [kat] ++
4,644,526 UART: [kat] sha1
4,648,900 UART: [kat] SHA2-256
4,650,840 UART: [kat] SHA2-384
4,653,665 UART: [kat] SHA2-512-ACC
4,655,565 UART: [kat] ECC-384
4,664,912 UART: [kat] HMAC-384Kdf
4,669,432 UART: [kat] LMS
4,917,760 UART: [kat] --
4,918,792 UART: [update-reset] ++
4,936,467 >>> mbox cmd response: failed
4,936,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,936,853 UART: ROM Non-Fatal Error: 0x000B003D
4,937,615 UART: [state] Locking Datavault
4,938,555 UART: [state] Locking PCR0, PCR1 and PCR31
4,939,159 UART: [state] Locking ICCM
4,939,593 UART: [exit] Launching FMC @ 0x40000130
4,944,922 UART:
4,944,938 UART: Running Caliptra FMC ...
4,945,346 UART:
4,945,400 UART: [state] CFI Enabled
5,034,639 UART: [art] Extend RT PCRs Done
5,035,067 UART: [art] Lock RT PCRs Done
5,036,248 UART: [art] Populate DV Done
5,044,388 UART: [fht] FMC Alias Private Key: 7
5,045,392 UART: [art] Derive CDI
5,045,672 UART: [art] Store in in slot 0x4
5,131,253 UART: [art] Derive Key Pair
5,131,613 UART: [art] Store priv key in slot 0x5
5,144,937 UART: [art] Derive Key Pair - Done
5,159,437 UART: [art] Signing Cert with AUTHO
5,159,917 UART: RITY.KEYID = 7
5,174,885 UART: [art] Erasing AUTHORITY.KEYID = 7
5,175,650 UART: [art] PUB.X = FE88BFC216DEB734A085099A2B813B98F2B0D96483B068BA37C75096E12A0F52024D9C5F7067995049FCE6AE78078878
5,182,406 UART: [art] PUB.Y = 7C95DCEFD54E543A25CB55721FD7EC591CB113D0135562AFEAB59C9A849451192247BB8B7ACDE9B5E1931E0A43EF06DC
5,189,366 UART: [art] SIG.R = C964A586E227AC2617CF813A2265291C49D94F45F710B1735DC71A19D2FAF186755DB5A13B1C3C2663C293C48599E8C7
5,196,134 UART: [art] SIG.S = CDB79C31BFBD70DFE087A517ED2260799E9841FEF2877ADB42205BE663AA5A89A362ADB79B0629DB53975CEC6ED35F5B
5,220,024 UART: Caliptra RT
5,220,277 UART: [state] CFI Enabled
5,499,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,501,279 UART:
5,501,295 UART: Running Caliptra ROM ...
5,501,703 UART:
5,501,758 UART: [state] CFI Enabled
5,504,562 UART: [state] LifecycleState = Unprovisioned
5,505,217 UART: [state] DebugLocked = No
5,505,897 UART: [state] WD Timer not started. Device not locked for debugging
5,507,257 UART: [kat] SHA2-256
6,312,907 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,317,032 UART: [kat] ++
6,317,184 UART: [kat] sha1
6,321,510 UART: [kat] SHA2-256
6,323,450 UART: [kat] SHA2-384
6,326,193 UART: [kat] SHA2-512-ACC
6,328,093 UART: [kat] ECC-384
6,337,474 UART: [kat] HMAC-384Kdf
6,341,922 UART: [kat] LMS
6,590,250 UART: [kat] --
6,591,238 UART: [update-reset] ++
8,453,623 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,454,710 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
8,604,708 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,166,533 >>> mbox cmd response: success
3,166,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,228,224 UART:
3,228,240 UART: Running Caliptra FMC ...
3,228,648 UART:
3,228,702 UART: [state] CFI Enabled
3,239,540 UART: [fht] FMC Alias Private Key: 7
3,347,274 UART: [art] Extend RT PCRs Done
3,347,702 UART: [art] Lock RT PCRs Done
3,349,232 UART: [art] Populate DV Done
3,357,428 UART: [fht] FMC Alias Private Key: 7
3,358,498 UART: [art] Derive CDI
3,358,778 UART: [art] Store in in slot 0x4
3,444,511 UART: [art] Derive Key Pair
3,444,871 UART: [art] Store priv key in slot 0x5
3,457,531 UART: [art] Derive Key Pair - Done
3,472,313 UART: [art] Signing Cert with AUTHO
3,472,793 UART: RITY.KEYID = 7
3,487,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,454 UART: [art] PUB.X = F2081573B8E26AD9285431977A7C3B02160D1B60CA9BF47675A6F6441C858E4CD9F75EC979020DFE99A3D168F12A008E
3,495,187 UART: [art] PUB.Y = 9F3B7D6A9440A4289843DC0A3BCAE0B5B3CB7DFB234C011C25448AC464118329DFF7813558882A0E4658EDBCD46B61A6
3,502,136 UART: [art] SIG.R = FB9727A897C0A92619B2F1D553F859B6B9C5089BCF1F6C6D52178AECBBDF51812770C4062550385984990841FD5C7B29
3,508,895 UART: [art] SIG.S = C746F477E0C8D2500DDA804CC7FE9A5B0F7301438620CFCE3BCD69658E890FC0E7D7A9AE39ACCD869E42DA78D5261DF7
3,532,582 UART: Caliptra RT
3,532,835 UART: [state] CFI Enabled
3,640,268 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,636,146 >>> mbox cmd response: failed
4,636,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,641,929 UART:
4,641,945 UART: Running Caliptra FMC ...
4,642,353 UART:
4,642,407 UART: [state] CFI Enabled
4,731,226 UART: [art] Extend RT PCRs Done
4,731,654 UART: [art] Lock RT PCRs Done
4,732,865 UART: [art] Populate DV Done
4,741,231 UART: [fht] FMC Alias Private Key: 7
4,742,399 UART: [art] Derive CDI
4,742,679 UART: [art] Store in in slot 0x4
4,828,682 UART: [art] Derive Key Pair
4,829,042 UART: [art] Store priv key in slot 0x5
4,842,358 UART: [art] Derive Key Pair - Done
4,856,888 UART: [art] Signing Cert with AUTHO
4,857,368 UART: RITY.KEYID = 7
4,872,594 UART: [art] Erasing AUTHORITY.KEYID = 7
4,873,359 UART: [art] PUB.X = F2081573B8E26AD9285431977A7C3B02160D1B60CA9BF47675A6F6441C858E4CD9F75EC979020DFE99A3D168F12A008E
4,880,092 UART: [art] PUB.Y = 9F3B7D6A9440A4289843DC0A3BCAE0B5B3CB7DFB234C011C25448AC464118329DFF7813558882A0E4658EDBCD46B61A6
4,887,041 UART: [art] SIG.R = FB9727A897C0A92619B2F1D553F859B6B9C5089BCF1F6C6D52178AECBBDF51812770C4062550385984990841FD5C7B29
4,893,800 UART: [art] SIG.S = C746F477E0C8D2500DDA804CC7FE9A5B0F7301438620CFCE3BCD69658E890FC0E7D7A9AE39ACCD869E42DA78D5261DF7
4,917,493 UART: Caliptra RT
4,917,746 UART: [state] CFI Enabled
5,203,707 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,182,932 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
87,090 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
893,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,980 UART: [kat] ++
898,132 UART: [kat] sha1
902,372 UART: [kat] SHA2-256
904,312 UART: [kat] SHA2-384
907,077 UART: [kat] SHA2-512-ACC
908,978 UART: [kat] ECC-384
918,981 UART: [kat] HMAC-384Kdf
923,603 UART: [kat] LMS
1,171,931 UART: [kat] --
1,172,894 UART: [cold-reset] ++
1,173,420 UART: [fht] FHT @ 0x50003400
1,176,027 UART: [idev] ++
1,176,195 UART: [idev] CDI.KEYID = 6
1,176,555 UART: [idev] SUBJECT.KEYID = 7
1,176,979 UART: [idev] UDS.KEYID = 0
1,177,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,579 UART: [idev] Erasing UDS.KEYID = 0
1,201,546 UART: [idev] Sha1 KeyId Algorithm
1,210,162 UART: [idev] --
1,211,070 UART: [ldev] ++
1,211,238 UART: [ldev] CDI.KEYID = 6
1,211,601 UART: [ldev] SUBJECT.KEYID = 5
1,212,027 UART: [ldev] AUTHORITY.KEYID = 7
1,212,490 UART: [ldev] FE.KEYID = 1
1,217,618 UART: [ldev] Erasing FE.KEYID = 1
1,244,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,640 UART: [ldev] --
1,283,925 UART: [fwproc] Wait for Commands...
1,284,639 UART: [fwproc] Recv command 0x46574c44
1,285,367 UART: [fwproc] Recv'd Img size: 114448 bytes
3,126,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,233 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,319,520 >>> mbox cmd response: success
3,319,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,320,660 UART: [afmc] ++
3,320,828 UART: [afmc] CDI.KEYID = 6
3,321,190 UART: [afmc] SUBJECT.KEYID = 7
3,321,615 UART: [afmc] AUTHORITY.KEYID = 5
3,356,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,754 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,463 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,355 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,066 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,815 UART: [afmc] --
3,399,805 UART: [cold-reset] --
3,400,817 UART: [state] Locking Datavault
3,402,186 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,790 UART: [state] Locking ICCM
3,403,328 UART: [exit] Launching FMC @ 0x40000130
3,408,657 UART:
3,408,673 UART: Running Caliptra FMC ...
3,409,081 UART:
3,409,224 UART: [state] CFI Enabled
3,419,620 UART: [fht] FMC Alias Private Key: 7
3,527,902 UART: [art] Extend RT PCRs Done
3,528,330 UART: [art] Lock RT PCRs Done
3,529,734 UART: [art] Populate DV Done
3,537,940 UART: [fht] FMC Alias Private Key: 7
3,539,076 UART: [art] Derive CDI
3,539,356 UART: [art] Store in in slot 0x4
3,624,979 UART: [art] Derive Key Pair
3,625,339 UART: [art] Store priv key in slot 0x5
3,638,653 UART: [art] Derive Key Pair - Done
3,653,513 UART: [art] Signing Cert with AUTHO
3,653,993 UART: RITY.KEYID = 7
3,669,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,310 UART: [art] PUB.X = 926FA15E637303357972B52419292CA0908A2DEEA78C140D124BE2B91EAE3ADE15714BA8778CA29DB405EEBA134FAB7B
3,677,081 UART: [art] PUB.Y = 61D06F33701710033C8FC1E6F549CAD53E5320D0FC8F2F44291505325FDB73006A8A2FEDCBEC99156FD861C34DB5188C
3,684,009 UART: [art] SIG.R = 926521B86133C299C096FEDDB5ABC70C5882B149D81960B240E6C517431585252C35674D1047FF842E77B21255EB4D49
3,690,766 UART: [art] SIG.S = 940E4297102EB37B3A369FFF584535530051124118C08CF936228943AF9190E398502455E94AA386FEB379CDC49C8527
3,714,056 UART: Caliptra RT
3,714,401 UART: [state] CFI Enabled
3,822,308 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,400 UART:
3,824,416 UART: Running Caliptra ROM ...
3,824,824 UART:
3,824,966 UART: [state] CFI Enabled
3,827,832 UART: [state] LifecycleState = Unprovisioned
3,828,487 UART: [state] DebugLocked = No
3,829,115 UART: [state] WD Timer not started. Device not locked for debugging
3,830,345 UART: [kat] SHA2-256
4,635,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,640,120 UART: [kat] ++
4,640,272 UART: [kat] sha1
4,644,526 UART: [kat] SHA2-256
4,646,466 UART: [kat] SHA2-384
4,649,235 UART: [kat] SHA2-512-ACC
4,651,135 UART: [kat] ECC-384
4,660,732 UART: [kat] HMAC-384Kdf
4,665,428 UART: [kat] LMS
4,913,756 UART: [kat] --
4,914,790 UART: [update-reset] ++
4,932,481 >>> mbox cmd response: failed
4,932,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,932,959 UART: ROM Non-Fatal Error: 0x000B003D
4,933,735 UART: [state] Locking Datavault
4,934,635 UART: [state] Locking PCR0, PCR1 and PCR31
4,935,239 UART: [state] Locking ICCM
4,935,757 UART: [exit] Launching FMC @ 0x40000130
4,941,086 UART:
4,941,102 UART: Running Caliptra FMC ...
4,941,510 UART:
4,941,653 UART: [state] CFI Enabled
5,030,404 UART: [art] Extend RT PCRs Done
5,030,832 UART: [art] Lock RT PCRs Done
5,032,305 UART: [art] Populate DV Done
5,040,683 UART: [fht] FMC Alias Private Key: 7
5,041,823 UART: [art] Derive CDI
5,042,103 UART: [art] Store in in slot 0x4
5,127,942 UART: [art] Derive Key Pair
5,128,302 UART: [art] Store priv key in slot 0x5
5,141,696 UART: [art] Derive Key Pair - Done
5,156,226 UART: [art] Signing Cert with AUTHO
5,156,706 UART: RITY.KEYID = 7
5,171,896 UART: [art] Erasing AUTHORITY.KEYID = 7
5,172,661 UART: [art] PUB.X = 926FA15E637303357972B52419292CA0908A2DEEA78C140D124BE2B91EAE3ADE15714BA8778CA29DB405EEBA134FAB7B
5,179,432 UART: [art] PUB.Y = 61D06F33701710033C8FC1E6F549CAD53E5320D0FC8F2F44291505325FDB73006A8A2FEDCBEC99156FD861C34DB5188C
5,186,360 UART: [art] SIG.R = 926521B86133C299C096FEDDB5ABC70C5882B149D81960B240E6C517431585252C35674D1047FF842E77B21255EB4D49
5,193,117 UART: [art] SIG.S = 940E4297102EB37B3A369FFF584535530051124118C08CF936228943AF9190E398502455E94AA386FEB379CDC49C8527
5,216,633 UART: Caliptra RT
5,216,978 UART: [state] CFI Enabled
5,495,065 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,496,410 UART:
5,496,426 UART: Running Caliptra ROM ...
5,496,834 UART:
5,496,976 UART: [state] CFI Enabled
5,499,668 UART: [state] LifecycleState = Unprovisioned
5,500,323 UART: [state] DebugLocked = No
5,500,933 UART: [state] WD Timer not started. Device not locked for debugging
5,502,095 UART: [kat] SHA2-256
6,307,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,311,870 UART: [kat] ++
6,312,022 UART: [kat] sha1
6,316,350 UART: [kat] SHA2-256
6,318,290 UART: [kat] SHA2-384
6,320,909 UART: [kat] SHA2-512-ACC
6,322,809 UART: [kat] ECC-384
6,332,798 UART: [kat] HMAC-384Kdf
6,337,434 UART: [kat] LMS
6,585,762 UART: [kat] --
6,586,548 UART: [update-reset] ++
8,441,454 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,442,415 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
8,592,413 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,169,676 >>> mbox cmd response: success
3,169,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,231,425 UART:
3,231,441 UART: Running Caliptra FMC ...
3,231,849 UART:
3,231,992 UART: [state] CFI Enabled
3,242,524 UART: [fht] FMC Alias Private Key: 7
3,350,752 UART: [art] Extend RT PCRs Done
3,351,180 UART: [art] Lock RT PCRs Done
3,352,626 UART: [art] Populate DV Done
3,360,704 UART: [fht] FMC Alias Private Key: 7
3,361,708 UART: [art] Derive CDI
3,361,988 UART: [art] Store in in slot 0x4
3,447,811 UART: [art] Derive Key Pair
3,448,171 UART: [art] Store priv key in slot 0x5
3,461,459 UART: [art] Derive Key Pair - Done
3,476,064 UART: [art] Signing Cert with AUTHO
3,476,544 UART: RITY.KEYID = 7
3,492,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,803 UART: [art] PUB.X = 4CAD9CF3EF949267F29BC433D2556FFD1AA7D3EB4D35E4878252052BF1BE7BCE8FFBE80956D4200C50013D296F5E6830
3,499,573 UART: [art] PUB.Y = B88FEF111A4E0545F6FA5B93C523702A863F82F7F62CFEA90592408957BF5A6CE2ADCDEC47835E2E985CACFD35DAED61
3,506,537 UART: [art] SIG.R = 1B30EFF0EB78C0E8D8CF932F86D6AD090C5C3B81BD94AA2892A2D52959F8A19E7DAD578ADB7353B1CB9D8A4F750C4DB5
3,513,320 UART: [art] SIG.S = 4694B8AAFB91ECFF01AA495E430D6FC1E0FBED99B94503DDA4C48004F3C66EAC38F57092BE669F7CA5867A6115CC058E
3,536,472 UART: Caliptra RT
3,536,817 UART: [state] CFI Enabled
3,645,188 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,640,431 >>> mbox cmd response: failed
4,640,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,646,170 UART:
4,646,186 UART: Running Caliptra FMC ...
4,646,594 UART:
4,646,737 UART: [state] CFI Enabled
4,735,954 UART: [art] Extend RT PCRs Done
4,736,382 UART: [art] Lock RT PCRs Done
4,737,851 UART: [art] Populate DV Done
4,746,313 UART: [fht] FMC Alias Private Key: 7
4,747,275 UART: [art] Derive CDI
4,747,555 UART: [art] Store in in slot 0x4
4,833,250 UART: [art] Derive Key Pair
4,833,610 UART: [art] Store priv key in slot 0x5
4,847,346 UART: [art] Derive Key Pair - Done
4,862,105 UART: [art] Signing Cert with AUTHO
4,862,585 UART: RITY.KEYID = 7
4,877,733 UART: [art] Erasing AUTHORITY.KEYID = 7
4,878,498 UART: [art] PUB.X = 4CAD9CF3EF949267F29BC433D2556FFD1AA7D3EB4D35E4878252052BF1BE7BCE8FFBE80956D4200C50013D296F5E6830
4,885,268 UART: [art] PUB.Y = B88FEF111A4E0545F6FA5B93C523702A863F82F7F62CFEA90592408957BF5A6CE2ADCDEC47835E2E985CACFD35DAED61
4,892,232 UART: [art] SIG.R = 1B30EFF0EB78C0E8D8CF932F86D6AD090C5C3B81BD94AA2892A2D52959F8A19E7DAD578ADB7353B1CB9D8A4F750C4DB5
4,899,015 UART: [art] SIG.S = 4694B8AAFB91ECFF01AA495E430D6FC1E0FBED99B94503DDA4C48004F3C66EAC38F57092BE669F7CA5867A6115CC058E
4,923,029 UART: Caliptra RT
4,923,374 UART: [state] CFI Enabled
5,204,849 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,186,141 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
891,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,225 UART: [kat] ++
895,377 UART: [kat] sha1
899,491 UART: [kat] SHA2-256
901,431 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
915,916 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,607 UART: [cold-reset] ++
1,170,057 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,174,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,927 UART: [idev] Erasing UDS.KEYID = 0
1,199,271 UART: [idev] Sha1 KeyId Algorithm
1,208,125 UART: [idev] --
1,209,026 UART: [ldev] ++
1,209,194 UART: [ldev] CDI.KEYID = 6
1,209,558 UART: [ldev] SUBJECT.KEYID = 5
1,209,985 UART: [ldev] AUTHORITY.KEYID = 7
1,210,448 UART: [ldev] FE.KEYID = 1
1,215,572 UART: [ldev] Erasing FE.KEYID = 1
1,241,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,956 UART: [ldev] --
1,280,428 UART: [fwproc] Wait for Commands...
1,281,201 UART: [fwproc] Recv command 0x46574c44
1,281,934 UART: [fwproc] Recv'd Img size: 114448 bytes
3,120,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,836 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,314,239 >>> mbox cmd response: success
3,314,239 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,315,354 UART: [afmc] ++
3,315,522 UART: [afmc] CDI.KEYID = 6
3,315,885 UART: [afmc] SUBJECT.KEYID = 7
3,316,311 UART: [afmc] AUTHORITY.KEYID = 5
3,352,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,262 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,972 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,862 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,573 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,453 UART: [afmc] --
3,395,467 UART: [cold-reset] --
3,396,391 UART: [state] Locking Datavault
3,397,576 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,180 UART: [state] Locking ICCM
3,398,652 UART: [exit] Launching FMC @ 0x40000130
3,403,981 UART:
3,403,997 UART: Running Caliptra FMC ...
3,404,405 UART:
3,404,459 UART: [state] CFI Enabled
3,414,841 UART: [fht] FMC Alias Private Key: 7
3,522,551 UART: [art] Extend RT PCRs Done
3,522,979 UART: [art] Lock RT PCRs Done
3,524,535 UART: [art] Populate DV Done
3,532,807 UART: [fht] FMC Alias Private Key: 7
3,533,929 UART: [art] Derive CDI
3,534,209 UART: [art] Store in in slot 0x4
3,620,290 UART: [art] Derive Key Pair
3,620,650 UART: [art] Store priv key in slot 0x5
3,634,116 UART: [art] Derive Key Pair - Done
3,648,809 UART: [art] Signing Cert with AUTHO
3,649,289 UART: RITY.KEYID = 7
3,664,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,542 UART: [art] PUB.X = 55D68BCBD6490250095473A14C26F0EC920CC1A7435A1557DC72AF34946CF57BE28C763BF428A0190A06209CD41B9A09
3,672,294 UART: [art] PUB.Y = 503E28012BF88EDE02FD6264E7EFFA74C273D6A5EF6AB301BBB9416748E057B5C583A966A8967CEB9E66C432DCFE8589
3,679,247 UART: [art] SIG.R = 08CC9B5D5BE0E040C2A7A74C199B9D8865F420CB827BD4E996CD7614046052F6AC93253E92C3DED1405E439DCDABE07B
3,686,023 UART: [art] SIG.S = B9F014B20AFB2D16DF2854513B8A7A91BE05A77BF4CE09876FE2C3F120D08287975333B81F7A230F09238D397A3CA969
3,709,907 UART: Caliptra RT
3,710,160 UART: [state] CFI Enabled
3,817,132 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,306 UART:
3,819,322 UART: Running Caliptra ROM ...
3,819,730 UART:
3,819,785 UART: [state] CFI Enabled
3,822,315 UART: [state] LifecycleState = Unprovisioned
3,822,970 UART: [state] DebugLocked = No
3,823,626 UART: [state] WD Timer not started. Device not locked for debugging
3,824,866 UART: [kat] SHA2-256
4,628,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,632,545 UART: [kat] ++
4,632,697 UART: [kat] sha1
4,637,069 UART: [kat] SHA2-256
4,639,009 UART: [kat] SHA2-384
4,641,714 UART: [kat] SHA2-512-ACC
4,643,614 UART: [kat] ECC-384
4,653,743 UART: [kat] HMAC-384Kdf
4,658,359 UART: [kat] LMS
4,906,671 UART: [kat] --
4,907,725 UART: [update-reset] ++
4,925,589 >>> mbox cmd response: failed
4,925,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,925,941 UART: ROM Non-Fatal Error: 0x000B003D
4,926,833 UART: [state] Locking Datavault
4,927,573 UART: [state] Locking PCR0, PCR1 and PCR31
4,928,177 UART: [state] Locking ICCM
4,928,819 UART: [exit] Launching FMC @ 0x40000130
4,934,148 UART:
4,934,164 UART: Running Caliptra FMC ...
4,934,572 UART:
4,934,626 UART: [state] CFI Enabled
5,023,213 UART: [art] Extend RT PCRs Done
5,023,641 UART: [art] Lock RT PCRs Done
5,024,918 UART: [art] Populate DV Done
5,032,978 UART: [fht] FMC Alias Private Key: 7
5,034,112 UART: [art] Derive CDI
5,034,392 UART: [art] Store in in slot 0x4
5,119,799 UART: [art] Derive Key Pair
5,120,159 UART: [art] Store priv key in slot 0x5
5,133,981 UART: [art] Derive Key Pair - Done
5,148,866 UART: [art] Signing Cert with AUTHO
5,149,346 UART: RITY.KEYID = 7
5,164,748 UART: [art] Erasing AUTHORITY.KEYID = 7
5,165,513 UART: [art] PUB.X = 55D68BCBD6490250095473A14C26F0EC920CC1A7435A1557DC72AF34946CF57BE28C763BF428A0190A06209CD41B9A09
5,172,265 UART: [art] PUB.Y = 503E28012BF88EDE02FD6264E7EFFA74C273D6A5EF6AB301BBB9416748E057B5C583A966A8967CEB9E66C432DCFE8589
5,179,218 UART: [art] SIG.R = 08CC9B5D5BE0E040C2A7A74C199B9D8865F420CB827BD4E996CD7614046052F6AC93253E92C3DED1405E439DCDABE07B
5,185,994 UART: [art] SIG.S = B9F014B20AFB2D16DF2854513B8A7A91BE05A77BF4CE09876FE2C3F120D08287975333B81F7A230F09238D397A3CA969
5,210,042 UART: Caliptra RT
5,210,295 UART: [state] CFI Enabled
5,494,421 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,495,842 UART:
5,495,858 UART: Running Caliptra ROM ...
5,496,266 UART:
5,496,321 UART: [state] CFI Enabled
5,499,011 UART: [state] LifecycleState = Unprovisioned
5,499,666 UART: [state] DebugLocked = No
5,500,318 UART: [state] WD Timer not started. Device not locked for debugging
5,501,642 UART: [kat] SHA2-256
6,305,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,309,321 UART: [kat] ++
6,309,473 UART: [kat] sha1
6,313,497 UART: [kat] SHA2-256
6,315,437 UART: [kat] SHA2-384
6,318,240 UART: [kat] SHA2-512-ACC
6,320,140 UART: [kat] ECC-384
6,329,865 UART: [kat] HMAC-384Kdf
6,334,573 UART: [kat] LMS
6,582,885 UART: [kat] --
6,583,693 UART: [update-reset] ++
8,436,465 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,437,462 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
8,587,460 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,554 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,171,706 >>> mbox cmd response: success
3,171,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,233,121 UART:
3,233,137 UART: Running Caliptra FMC ...
3,233,545 UART:
3,233,599 UART: [state] CFI Enabled
3,244,035 UART: [fht] FMC Alias Private Key: 7
3,351,541 UART: [art] Extend RT PCRs Done
3,351,969 UART: [art] Lock RT PCRs Done
3,353,335 UART: [art] Populate DV Done
3,361,723 UART: [fht] FMC Alias Private Key: 7
3,362,853 UART: [art] Derive CDI
3,363,133 UART: [art] Store in in slot 0x4
3,448,384 UART: [art] Derive Key Pair
3,448,744 UART: [art] Store priv key in slot 0x5
3,461,804 UART: [art] Derive Key Pair - Done
3,476,767 UART: [art] Signing Cert with AUTHO
3,477,247 UART: RITY.KEYID = 7
3,492,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,310 UART: [art] PUB.X = B3BD95E24E9557F01F4205E5209F9736DCEF9B456FB6C5F68E9A2CF8E1A296455419E82EC0087589B48E894862C7AEE4
3,500,078 UART: [art] PUB.Y = DD04EBEC4DBAFF2ADAE1F41240B97DA9654922C0165CFA91B2B117401C46EA6A39D67158C2F5D3F2F1F2FC8677AC6CAB
3,507,049 UART: [art] SIG.R = F4CF211A2AA0E0BE5BD9BC850FD4D970927FDBD6523B2863499697A0AF9F971679436678DAEBC8EB0FB9EBF2BE651FD7
3,513,833 UART: [art] SIG.S = EFA2636851B4D0A0B16A205502762728A6AE48F40FCB7001CD87A346FF916330896ABD504EF6FEC014D93EE69226C754
3,538,179 UART: Caliptra RT
3,538,432 UART: [state] CFI Enabled
3,645,367 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,636,408 >>> mbox cmd response: failed
4,636,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,642,285 UART:
4,642,301 UART: Running Caliptra FMC ...
4,642,709 UART:
4,642,763 UART: [state] CFI Enabled
4,731,662 UART: [art] Extend RT PCRs Done
4,732,090 UART: [art] Lock RT PCRs Done
4,733,535 UART: [art] Populate DV Done
4,741,557 UART: [fht] FMC Alias Private Key: 7
4,742,571 UART: [art] Derive CDI
4,742,851 UART: [art] Store in in slot 0x4
4,828,776 UART: [art] Derive Key Pair
4,829,136 UART: [art] Store priv key in slot 0x5
4,841,742 UART: [art] Derive Key Pair - Done
4,856,601 UART: [art] Signing Cert with AUTHO
4,857,081 UART: RITY.KEYID = 7
4,871,891 UART: [art] Erasing AUTHORITY.KEYID = 7
4,872,656 UART: [art] PUB.X = B3BD95E24E9557F01F4205E5209F9736DCEF9B456FB6C5F68E9A2CF8E1A296455419E82EC0087589B48E894862C7AEE4
4,879,424 UART: [art] PUB.Y = DD04EBEC4DBAFF2ADAE1F41240B97DA9654922C0165CFA91B2B117401C46EA6A39D67158C2F5D3F2F1F2FC8677AC6CAB
4,886,395 UART: [art] SIG.R = F4CF211A2AA0E0BE5BD9BC850FD4D970927FDBD6523B2863499697A0AF9F971679436678DAEBC8EB0FB9EBF2BE651FD7
4,893,179 UART: [art] SIG.S = EFA2636851B4D0A0B16A205502762728A6AE48F40FCB7001CD87A346FF916330896ABD504EF6FEC014D93EE69226C754
4,916,141 UART: Caliptra RT
4,916,394 UART: [state] CFI Enabled
5,197,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,179,114 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
915,869 UART: [kat] HMAC-384Kdf
920,395 UART: [kat] LMS
1,168,707 UART: [kat] --
1,169,574 UART: [cold-reset] ++
1,170,074 UART: [fht] FHT @ 0x50003400
1,172,812 UART: [idev] ++
1,172,980 UART: [idev] CDI.KEYID = 6
1,173,341 UART: [idev] SUBJECT.KEYID = 7
1,173,766 UART: [idev] UDS.KEYID = 0
1,174,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,198,762 UART: [idev] Sha1 KeyId Algorithm
1,207,442 UART: [idev] --
1,208,511 UART: [ldev] ++
1,208,679 UART: [ldev] CDI.KEYID = 6
1,209,043 UART: [ldev] SUBJECT.KEYID = 5
1,209,470 UART: [ldev] AUTHORITY.KEYID = 7
1,209,933 UART: [ldev] FE.KEYID = 1
1,215,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,755 UART: [ldev] --
1,282,053 UART: [fwproc] Wait for Commands...
1,282,652 UART: [fwproc] Recv command 0x46574c44
1,283,385 UART: [fwproc] Recv'd Img size: 114448 bytes
3,133,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,652 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,961 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
3,326,989 >>> mbox cmd response: success
3,326,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,328,184 UART: [afmc] ++
3,328,352 UART: [afmc] CDI.KEYID = 6
3,328,715 UART: [afmc] SUBJECT.KEYID = 7
3,329,141 UART: [afmc] AUTHORITY.KEYID = 5
3,364,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,414 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,387,124 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,393,014 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,725 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,641 UART: [afmc] --
3,407,677 UART: [cold-reset] --
3,408,639 UART: [state] Locking Datavault
3,409,924 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,528 UART: [state] Locking ICCM
3,411,108 UART: [exit] Launching FMC @ 0x40000130
3,416,437 UART:
3,416,453 UART: Running Caliptra FMC ...
3,416,861 UART:
3,417,004 UART: [state] CFI Enabled
3,427,380 UART: [fht] FMC Alias Private Key: 7
3,535,348 UART: [art] Extend RT PCRs Done
3,535,776 UART: [art] Lock RT PCRs Done
3,537,222 UART: [art] Populate DV Done
3,545,306 UART: [fht] FMC Alias Private Key: 7
3,546,244 UART: [art] Derive CDI
3,546,524 UART: [art] Store in in slot 0x4
3,632,553 UART: [art] Derive Key Pair
3,632,913 UART: [art] Store priv key in slot 0x5
3,645,641 UART: [art] Derive Key Pair - Done
3,660,448 UART: [art] Signing Cert with AUTHO
3,660,928 UART: RITY.KEYID = 7
3,675,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,601 UART: [art] PUB.X = 14F2C45AC71E451F82E8C0192797E8F6F9279CCC986C9D2E93DE5BDB69A99D118BA6F5AF6D3EEC986BFE43697C35FBCD
3,683,391 UART: [art] PUB.Y = 4A3A570F029680A19ADF5504F4966DB655988CFC8FBC636129153CE4F368A571E2940AC425299F01ED253BF1AF3CBB55
3,690,330 UART: [art] SIG.R = 6CE92B476F40BE64F4D8F4CA2D462CA2366BB9D0C75F0BAE83040888457A4762F37E1E2D50FDB4DF8B1BE1AA7C0F6DFB
3,697,110 UART: [art] SIG.S = 8309767E361A618F32189B248C0822FE462900E7F50AC1328ABFF557F58663596C178FFE16B36B61E8ACC730558336F5
3,720,972 UART: Caliptra RT
3,721,317 UART: [state] CFI Enabled
3,830,647 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,533 UART:
3,832,549 UART: Running Caliptra ROM ...
3,832,957 UART:
3,833,099 UART: [state] CFI Enabled
3,835,337 UART: [state] LifecycleState = Unprovisioned
3,835,992 UART: [state] DebugLocked = No
3,836,500 UART: [state] WD Timer not started. Device not locked for debugging
3,837,654 UART: [kat] SHA2-256
4,641,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,645,333 UART: [kat] ++
4,645,485 UART: [kat] sha1
4,649,651 UART: [kat] SHA2-256
4,651,591 UART: [kat] SHA2-384
4,654,208 UART: [kat] SHA2-512-ACC
4,656,108 UART: [kat] ECC-384
4,665,813 UART: [kat] HMAC-384Kdf
4,670,523 UART: [kat] LMS
4,918,835 UART: [kat] --
4,919,547 UART: [update-reset] ++
4,937,513 >>> mbox cmd response: failed
4,937,513 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,937,705 UART: ROM Non-Fatal Error: 0x000B003D
4,938,545 UART: [state] Locking Datavault
4,939,441 UART: [state] Locking PCR0, PCR1 and PCR31
4,940,045 UART: [state] Locking ICCM
4,940,525 UART: [exit] Launching FMC @ 0x40000130
4,945,854 UART:
4,945,870 UART: Running Caliptra FMC ...
4,946,278 UART:
4,946,421 UART: [state] CFI Enabled
5,034,956 UART: [art] Extend RT PCRs Done
5,035,384 UART: [art] Lock RT PCRs Done
5,036,573 UART: [art] Populate DV Done
5,044,725 UART: [fht] FMC Alias Private Key: 7
5,045,841 UART: [art] Derive CDI
5,046,121 UART: [art] Store in in slot 0x4
5,131,900 UART: [art] Derive Key Pair
5,132,260 UART: [art] Store priv key in slot 0x5
5,145,204 UART: [art] Derive Key Pair - Done
5,159,939 UART: [art] Signing Cert with AUTHO
5,160,419 UART: RITY.KEYID = 7
5,175,431 UART: [art] Erasing AUTHORITY.KEYID = 7
5,176,196 UART: [art] PUB.X = 14F2C45AC71E451F82E8C0192797E8F6F9279CCC986C9D2E93DE5BDB69A99D118BA6F5AF6D3EEC986BFE43697C35FBCD
5,182,986 UART: [art] PUB.Y = 4A3A570F029680A19ADF5504F4966DB655988CFC8FBC636129153CE4F368A571E2940AC425299F01ED253BF1AF3CBB55
5,189,925 UART: [art] SIG.R = 6CE92B476F40BE64F4D8F4CA2D462CA2366BB9D0C75F0BAE83040888457A4762F37E1E2D50FDB4DF8B1BE1AA7C0F6DFB
5,196,705 UART: [art] SIG.S = 8309767E361A618F32189B248C0822FE462900E7F50AC1328ABFF557F58663596C178FFE16B36B61E8ACC730558336F5
5,219,991 UART: Caliptra RT
5,220,336 UART: [state] CFI Enabled
5,502,128 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,503,857 UART:
5,503,873 UART: Running Caliptra ROM ...
5,504,281 UART:
5,504,423 UART: [state] CFI Enabled
5,507,413 UART: [state] LifecycleState = Unprovisioned
5,508,068 UART: [state] DebugLocked = No
5,508,660 UART: [state] WD Timer not started. Device not locked for debugging
5,509,894 UART: [kat] SHA2-256
6,313,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,317,573 UART: [kat] ++
6,317,725 UART: [kat] sha1
6,321,995 UART: [kat] SHA2-256
6,323,935 UART: [kat] SHA2-384
6,326,644 UART: [kat] SHA2-512-ACC
6,328,544 UART: [kat] ECC-384
6,337,843 UART: [kat] HMAC-384Kdf
6,342,451 UART: [kat] LMS
6,590,763 UART: [kat] --
6,591,859 UART: [update-reset] ++
8,456,794 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,457,805 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89764
8,607,803 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,178,511 >>> mbox cmd response: success
3,178,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,240,044 UART:
3,240,060 UART: Running Caliptra FMC ...
3,240,468 UART:
3,240,611 UART: [state] CFI Enabled
3,251,581 UART: [fht] FMC Alias Private Key: 7
3,359,503 UART: [art] Extend RT PCRs Done
3,359,931 UART: [art] Lock RT PCRs Done
3,361,689 UART: [art] Populate DV Done
3,369,751 UART: [fht] FMC Alias Private Key: 7
3,370,923 UART: [art] Derive CDI
3,371,203 UART: [art] Store in in slot 0x4
3,456,648 UART: [art] Derive Key Pair
3,457,008 UART: [art] Store priv key in slot 0x5
3,471,080 UART: [art] Derive Key Pair - Done
3,485,720 UART: [art] Signing Cert with AUTHO
3,486,200 UART: RITY.KEYID = 7
3,501,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,251 UART: [art] PUB.X = A9F788A2D3D3B363B5E7D47053B9E82A6E6757D051F379B3EC1D73411C7E5C2EAFDD06DAFDBBFE69C6054DCB8057EC40
3,509,035 UART: [art] PUB.Y = 50973F3A3B93FDAD0327EF96E5FF3A121EC81C3B7AC1ECC7087A09D2B2D2BE939721EBA152062D7AEBD2E954B1ACD86A
3,515,995 UART: [art] SIG.R = DBAAC4BFE0521FE568C4857E91B21E860D1B1B65313C37C13CF7E8921EC8CFEB418EF0ED2C4508688C1229ABBB0E8383
3,522,772 UART: [art] SIG.S = 960D8FD68B66613CA205B3ED1CC1BBF038203207E80F0A5CF6DB66BC30CD017D5D7B85AEB42795B04E03A5E3AC736EAF
3,546,078 UART: Caliptra RT
3,546,423 UART: [state] CFI Enabled
3,654,288 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,646,438 >>> mbox cmd response: failed
4,646,438 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,652,217 UART:
4,652,233 UART: Running Caliptra FMC ...
4,652,641 UART:
4,652,784 UART: [state] CFI Enabled
4,741,993 UART: [art] Extend RT PCRs Done
4,742,421 UART: [art] Lock RT PCRs Done
4,743,902 UART: [art] Populate DV Done
4,752,244 UART: [fht] FMC Alias Private Key: 7
4,753,330 UART: [art] Derive CDI
4,753,610 UART: [art] Store in in slot 0x4
4,839,091 UART: [art] Derive Key Pair
4,839,451 UART: [art] Store priv key in slot 0x5
4,853,091 UART: [art] Derive Key Pair - Done
4,867,825 UART: [art] Signing Cert with AUTHO
4,868,305 UART: RITY.KEYID = 7
4,883,125 UART: [art] Erasing AUTHORITY.KEYID = 7
4,883,890 UART: [art] PUB.X = A9F788A2D3D3B363B5E7D47053B9E82A6E6757D051F379B3EC1D73411C7E5C2EAFDD06DAFDBBFE69C6054DCB8057EC40
4,890,674 UART: [art] PUB.Y = 50973F3A3B93FDAD0327EF96E5FF3A121EC81C3B7AC1ECC7087A09D2B2D2BE939721EBA152062D7AEBD2E954B1ACD86A
4,897,634 UART: [art] SIG.R = DBAAC4BFE0521FE568C4857E91B21E860D1B1B65313C37C13CF7E8921EC8CFEB418EF0ED2C4508688C1229ABBB0E8383
4,904,411 UART: [art] SIG.S = 960D8FD68B66613CA205B3ED1CC1BBF038203207E80F0A5CF6DB66BC30CD017D5D7B85AEB42795B04E03A5E3AC736EAF
4,928,209 UART: Caliptra RT
4,928,554 UART: [state] CFI Enabled
5,211,737 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,199,089 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,243 UART:
192,598 UART: Running Caliptra ROM ...
193,787 UART:
193,945 UART: [state] CFI Enabled
259,472 UART: [state] LifecycleState = Unprovisioned
261,464 UART: [state] DebugLocked = No
264,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,712 UART: [kat] SHA2-256
438,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,915 UART: [kat] ++
449,363 UART: [kat] sha1
460,958 UART: [kat] SHA2-256
463,645 UART: [kat] SHA2-384
469,517 UART: [kat] SHA2-512-ACC
471,884 UART: [kat] ECC-384
2,764,521 UART: [kat] HMAC-384Kdf
2,796,718 UART: [kat] LMS
3,987,030 UART: [kat] --
3,993,559 UART: [cold-reset] ++
3,995,800 UART: [fht] Storing FHT @ 0x50003400
4,006,327 UART: [idev] ++
4,006,901 UART: [idev] CDI.KEYID = 6
4,007,876 UART: [idev] SUBJECT.KEYID = 7
4,009,100 UART: [idev] UDS.KEYID = 0
4,011,666 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,417 UART: [idev] Erasing UDS.KEYID = 0
7,345,309 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,172 UART: [idev] --
7,369,982 UART: [ldev] ++
7,370,578 UART: [ldev] CDI.KEYID = 6
7,371,498 UART: [ldev] SUBJECT.KEYID = 5
7,372,718 UART: [ldev] AUTHORITY.KEYID = 7
7,373,954 UART: [ldev] FE.KEYID = 1
7,421,712 UART: [ldev] Erasing FE.KEYID = 1
10,751,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,161 UART: [ldev] --
13,112,888 UART: [fwproc] Waiting for Commands...
13,114,979 UART: [fwproc] Received command 0x46574c44
13,117,188 UART: [fwproc] Received Image of size 114124 bytes
14,505,103 UART: ROM Fatal Error: 0x000B000D
14,508,599 >>> mbox cmd response: failed
14,509,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,509,341 >>> mbox cmd response: failed
14,509,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,509,905 >>> mbox cmd response: failed
Initializing fuses
2,055,578 writing to cptra_bootfsm_go
2,244,936 UART:
2,245,281 UART: Running Caliptra ROM ...
2,246,421 UART:
2,246,595 UART: [state] CFI Enabled
2,304,675 UART: [state] LifecycleState = Unprovisioned
2,306,614 UART: [state] DebugLocked = No
2,309,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,314,514 UART: [kat] SHA2-256
2,484,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,699 UART: [kat] ++
2,495,159 UART: [kat] sha1
2,506,267 UART: [kat] SHA2-256
2,508,966 UART: [kat] SHA2-384
2,514,956 UART: [kat] SHA2-512-ACC
2,517,359 UART: [kat] ECC-384
4,812,161 UART: [kat] HMAC-384Kdf
4,841,505 UART: [kat] LMS
6,031,779 UART: [kat] --
6,035,398 UART: [cold-reset] ++
6,037,118 UART: [fht] Storing FHT @ 0x50003400
6,049,086 UART: [idev] ++
6,049,691 UART: [idev] CDI.KEYID = 6
6,050,600 UART: [idev] SUBJECT.KEYID = 7
6,051,823 UART: [idev] UDS.KEYID = 0
6,054,108 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,197,612 UART: [idev] Erasing UDS.KEYID = 0
9,386,313 UART: [idev] Using Sha1 for KeyId Algorithm
9,408,214 UART: [idev] --
9,411,653 UART: [ldev] ++
9,412,290 UART: [ldev] CDI.KEYID = 6
9,413,203 UART: [ldev] SUBJECT.KEYID = 5
9,414,467 UART: [ldev] AUTHORITY.KEYID = 7
9,415,711 UART: [ldev] FE.KEYID = 1
9,463,897 UART: [ldev] Erasing FE.KEYID = 1
12,798,068 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,110,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,125,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,140,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,154,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,173,609 UART: [ldev] --
15,178,784 UART: [fwproc] Waiting for Commands...
15,181,370 UART: [fwproc] Received command 0x46574c44
15,183,562 UART: [fwproc] Received Image of size 114124 bytes
19,238,092 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,320,600 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,389,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,707,634 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,786,036 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,253,577 >>> mbox cmd response: failed
14,254,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,254,550 >>> mbox cmd response: failed
14,254,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,255,110 >>> mbox cmd response: failed
Initializing fuses
2,062,009 writing to cptra_bootfsm_go
5,848,014 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,923,036 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,401 UART:
192,756 UART: Running Caliptra ROM ...
193,939 UART:
603,565 UART: [state] CFI Enabled
617,215 UART: [state] LifecycleState = Unprovisioned
619,144 UART: [state] DebugLocked = No
621,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,858 UART: [kat] SHA2-256
796,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,136 UART: [kat] ++
807,670 UART: [kat] sha1
818,177 UART: [kat] SHA2-256
820,855 UART: [kat] SHA2-384
826,940 UART: [kat] SHA2-512-ACC
829,266 UART: [kat] ECC-384
3,114,587 UART: [kat] HMAC-384Kdf
3,127,602 UART: [kat] LMS
4,317,711 UART: [kat] --
4,321,986 UART: [cold-reset] ++
4,323,650 UART: [fht] Storing FHT @ 0x50003400
4,334,810 UART: [idev] ++
4,335,378 UART: [idev] CDI.KEYID = 6
4,336,354 UART: [idev] SUBJECT.KEYID = 7
4,337,571 UART: [idev] UDS.KEYID = 0
4,340,085 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,646 UART: [idev] Erasing UDS.KEYID = 0
7,621,533 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,983 UART: [idev] --
7,647,637 UART: [ldev] ++
7,648,218 UART: [ldev] CDI.KEYID = 6
7,649,133 UART: [ldev] SUBJECT.KEYID = 5
7,650,352 UART: [ldev] AUTHORITY.KEYID = 7
7,651,661 UART: [ldev] FE.KEYID = 1
7,663,392 UART: [ldev] Erasing FE.KEYID = 1
10,953,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,561 UART: [ldev] --
13,312,957 UART: [fwproc] Waiting for Commands...
13,314,852 UART: [fwproc] Received command 0x46574c44
13,317,040 UART: [fwproc] Received Image of size 114124 bytes
14,708,776 UART: ROM Fatal Error: 0x000B000D
14,712,273 >>> mbox cmd response: failed
14,712,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,713,040 >>> mbox cmd response: failed
14,713,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,713,625 >>> mbox cmd response: failed
Initializing fuses
2,056,042 writing to cptra_bootfsm_go
2,245,410 UART:
2,245,762 UART: Running Caliptra ROM ...
2,246,896 UART:
5,741,618 UART: [state] CFI Enabled
5,757,769 UART: [state] LifecycleState = Unprovisioned
5,759,680 UART: [state] DebugLocked = No
5,762,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,767,698 UART: [kat] SHA2-256
5,937,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,947,960 UART: [kat] ++
5,948,451 UART: [kat] sha1
5,959,111 UART: [kat] SHA2-256
5,961,844 UART: [kat] SHA2-384
5,967,679 UART: [kat] SHA2-512-ACC
5,970,084 UART: [kat] ECC-384
8,253,076 UART: [kat] HMAC-384Kdf
8,264,491 UART: [kat] LMS
9,454,616 UART: [kat] --
9,460,252 UART: [cold-reset] ++
9,462,514 UART: [fht] Storing FHT @ 0x50003400
9,475,193 UART: [idev] ++
9,475,806 UART: [idev] CDI.KEYID = 6
9,476,699 UART: [idev] SUBJECT.KEYID = 7
9,477,917 UART: [idev] UDS.KEYID = 0
9,480,201 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
9,623,507 UART: [idev] Erasing UDS.KEYID = 0
12,766,656 UART: [idev] Using Sha1 for KeyId Algorithm
12,788,155 UART: [idev] --
12,792,481 UART: [ldev] ++
12,793,048 UART: [ldev] CDI.KEYID = 6
12,794,015 UART: [ldev] SUBJECT.KEYID = 5
12,795,268 UART: [ldev] AUTHORITY.KEYID = 7
12,796,500 UART: [ldev] FE.KEYID = 1
12,805,174 UART: [ldev] Erasing FE.KEYID = 1
16,095,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,387,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,402,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,416,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,431,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,450,481 UART: [ldev] --
18,455,807 UART: [fwproc] Waiting for Commands...
18,458,450 UART: [fwproc] Received command 0x46574c44
18,460,637 UART: [fwproc] Received Image of size 114124 bytes
22,510,976 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,587,430 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,656,344 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,974,441 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,133,357 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,450,245 >>> mbox cmd response: failed
14,450,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,451,152 >>> mbox cmd response: failed
14,451,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,451,718 >>> mbox cmd response: failed
Initializing fuses
2,056,556 writing to cptra_bootfsm_go
9,531,091 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,465,569 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,188 UART:
192,556 UART: Running Caliptra ROM ...
193,753 UART:
193,906 UART: [state] CFI Enabled
261,821 UART: [state] LifecycleState = Unprovisioned
263,672 UART: [state] DebugLocked = No
265,922 UART: [state] WD Timer not started. Device not locked for debugging
270,014 UART: [kat] SHA2-256
449,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,729 UART: [kat] ++
461,265 UART: [kat] sha1
473,124 UART: [kat] SHA2-256
476,183 UART: [kat] SHA2-384
482,608 UART: [kat] SHA2-512-ACC
485,559 UART: [kat] ECC-384
2,943,306 UART: [kat] HMAC-384Kdf
2,968,044 UART: [kat] LMS
3,497,528 UART: [kat] --
3,500,992 UART: [cold-reset] ++
3,501,961 UART: [fht] FHT @ 0x50003400
3,512,779 UART: [idev] ++
3,513,344 UART: [idev] CDI.KEYID = 6
3,514,363 UART: [idev] SUBJECT.KEYID = 7
3,515,467 UART: [idev] UDS.KEYID = 0
3,518,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,662,383 UART: [idev] Erasing UDS.KEYID = 0
6,024,424 UART: [idev] Sha1 KeyId Algorithm
6,046,903 UART: [idev] --
6,051,603 UART: [ldev] ++
6,052,194 UART: [ldev] CDI.KEYID = 6
6,053,089 UART: [ldev] SUBJECT.KEYID = 5
6,054,201 UART: [ldev] AUTHORITY.KEYID = 7
6,055,493 UART: [ldev] FE.KEYID = 1
6,097,774 UART: [ldev] Erasing FE.KEYID = 1
8,597,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,860 UART: [ldev] --
10,403,373 UART: [fwproc] Wait for Commands...
10,404,884 UART: [fwproc] Recv command 0x46574c44
10,408,219 UART: [fwproc] Recv'd Img size: 114448 bytes
11,473,330 UART: ROM Fatal Error: 0x000B000D
11,476,414 >>> mbox cmd response: failed
11,476,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,477,211 >>> mbox cmd response: failed
11,477,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,477,772 >>> mbox cmd response: failed
Initializing fuses
2,059,658 writing to cptra_bootfsm_go
2,248,962 UART:
2,249,300 UART: Running Caliptra ROM ...
2,250,345 UART:
2,250,500 UART: [state] CFI Enabled
2,319,811 UART: [state] LifecycleState = Unprovisioned
2,321,699 UART: [state] DebugLocked = No
2,323,848 UART: [state] WD Timer not started. Device not locked for debugging
2,328,239 UART: [kat] SHA2-256
2,507,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,912 UART: [kat] ++
2,519,452 UART: [kat] sha1
2,529,266 UART: [kat] SHA2-256
2,532,280 UART: [kat] SHA2-384
2,539,776 UART: [kat] SHA2-512-ACC
2,542,753 UART: [kat] ECC-384
5,006,560 UART: [kat] HMAC-384Kdf
5,027,805 UART: [kat] LMS
5,557,232 UART: [kat] --
5,562,191 UART: [cold-reset] ++
5,564,715 UART: [fht] FHT @ 0x50003400
5,574,448 UART: [idev] ++
5,575,009 UART: [idev] CDI.KEYID = 6
5,575,896 UART: [idev] SUBJECT.KEYID = 7
5,577,162 UART: [idev] UDS.KEYID = 0
5,579,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,723,490 UART: [idev] Erasing UDS.KEYID = 0
8,084,018 UART: [idev] Sha1 KeyId Algorithm
8,107,393 UART: [idev] --
8,111,828 UART: [ldev] ++
8,112,404 UART: [ldev] CDI.KEYID = 6
8,113,318 UART: [ldev] SUBJECT.KEYID = 5
8,114,477 UART: [ldev] AUTHORITY.KEYID = 7
8,115,707 UART: [ldev] FE.KEYID = 1
8,149,532 UART: [ldev] Erasing FE.KEYID = 1
10,653,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,212 UART: [ldev] --
12,466,046 UART: [fwproc] Wait for Commands...
12,468,529 UART: [fwproc] Recv command 0x46574c44
12,470,630 UART: [fwproc] Recv'd Img size: 114448 bytes
15,872,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,946,483 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,015,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,333,522 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,361,181 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,265,627 >>> mbox cmd response: failed
11,266,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,266,528 >>> mbox cmd response: failed
11,266,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,267,110 >>> mbox cmd response: failed
Initializing fuses
2,053,138 writing to cptra_bootfsm_go
5,423,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,085,818 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,638 UART:
192,984 UART: Running Caliptra ROM ...
194,201 UART:
603,628 UART: [state] CFI Enabled
615,664 UART: [state] LifecycleState = Unprovisioned
617,494 UART: [state] DebugLocked = No
619,652 UART: [state] WD Timer not started. Device not locked for debugging
623,793 UART: [kat] SHA2-256
802,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,500 UART: [kat] ++
814,952 UART: [kat] sha1
826,579 UART: [kat] SHA2-256
829,590 UART: [kat] SHA2-384
835,080 UART: [kat] SHA2-512-ACC
838,013 UART: [kat] ECC-384
3,276,212 UART: [kat] HMAC-384Kdf
3,289,751 UART: [kat] LMS
3,819,253 UART: [kat] --
3,822,570 UART: [cold-reset] ++
3,823,912 UART: [fht] FHT @ 0x50003400
3,833,167 UART: [idev] ++
3,833,728 UART: [idev] CDI.KEYID = 6
3,834,745 UART: [idev] SUBJECT.KEYID = 7
3,835,848 UART: [idev] UDS.KEYID = 0
3,838,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,982,783 UART: [idev] Erasing UDS.KEYID = 0
6,309,455 UART: [idev] Sha1 KeyId Algorithm
6,332,533 UART: [idev] --
6,336,367 UART: [ldev] ++
6,336,934 UART: [ldev] CDI.KEYID = 6
6,337,852 UART: [ldev] SUBJECT.KEYID = 5
6,339,011 UART: [ldev] AUTHORITY.KEYID = 7
6,340,300 UART: [ldev] FE.KEYID = 1
6,351,545 UART: [ldev] Erasing FE.KEYID = 1
8,827,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,369 UART: [ldev] --
10,618,476 UART: [fwproc] Wait for Commands...
10,620,470 UART: [fwproc] Recv command 0x46574c44
10,622,568 UART: [fwproc] Recv'd Img size: 114448 bytes
11,688,292 UART: ROM Fatal Error: 0x000B000D
11,691,414 >>> mbox cmd response: failed
11,691,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,692,164 >>> mbox cmd response: failed
11,692,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,692,716 >>> mbox cmd response: failed
Initializing fuses
2,062,131 writing to cptra_bootfsm_go
2,251,457 UART:
2,251,792 UART: Running Caliptra ROM ...
2,252,843 UART:
8,762,186 UART: [state] CFI Enabled
8,776,461 UART: [state] LifecycleState = Unprovisioned
8,778,321 UART: [state] DebugLocked = No
8,780,384 UART: [state] WD Timer not started. Device not locked for debugging
8,784,391 UART: [kat] SHA2-256
8,963,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,975,083 UART: [kat] ++
8,975,544 UART: [kat] sha1
8,985,512 UART: [kat] SHA2-256
8,988,550 UART: [kat] SHA2-384
8,994,457 UART: [kat] SHA2-512-ACC
8,997,459 UART: [kat] ECC-384
11,441,310 UART: [kat] HMAC-384Kdf
11,453,521 UART: [kat] LMS
11,983,019 UART: [kat] --
11,988,002 UART: [cold-reset] ++
11,989,184 UART: [fht] FHT @ 0x50003400
11,999,973 UART: [idev] ++
12,000,531 UART: [idev] CDI.KEYID = 6
12,001,416 UART: [idev] SUBJECT.KEYID = 7
12,002,633 UART: [idev] UDS.KEYID = 0
12,004,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,148,806 UART: [idev] Erasing UDS.KEYID = 0
14,477,581 UART: [idev] Sha1 KeyId Algorithm
14,500,495 UART: [idev] --
14,504,973 UART: [ldev] ++
14,505,568 UART: [ldev] CDI.KEYID = 6
14,506,651 UART: [ldev] SUBJECT.KEYID = 5
14,507,714 UART: [ldev] AUTHORITY.KEYID = 7
14,509,008 UART: [ldev] FE.KEYID = 1
14,520,544 UART: [ldev] Erasing FE.KEYID = 1
16,994,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,713,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,729,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,744,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,760,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,782,766 UART: [ldev] --
18,787,328 UART: [fwproc] Wait for Commands...
18,790,289 UART: [fwproc] Recv command 0x46574c44
18,792,332 UART: [fwproc] Recv'd Img size: 114448 bytes
22,198,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,268,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,336,938 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,655,611 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
3,698,853 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,468,047 >>> mbox cmd response: failed
11,468,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,468,909 >>> mbox cmd response: failed
11,469,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,469,460 >>> mbox cmd response: failed
Initializing fuses
2,069,279 writing to cptra_bootfsm_go
12,084,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,649,524 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,439,281 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,312,778 >>> mbox cmd response: failed
11,313,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,313,718 >>> mbox cmd response: failed
11,314,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,314,308 >>> mbox cmd response: failed
Initializing fuses
2,057,327 writing to cptra_bootfsm_go
5,496,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,792,986 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,753,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,535,273 >>> mbox cmd response: failed
11,535,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,536,141 >>> mbox cmd response: failed
11,536,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,536,698 >>> mbox cmd response: failed
Initializing fuses
2,058,530 writing to cptra_bootfsm_go
12,068,598 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,260,648 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,929 UART: [kat] SHA2-256
881,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,975 UART: [kat] ++
886,127 UART: [kat] sha1
890,393 UART: [kat] SHA2-256
892,331 UART: [kat] SHA2-384
895,190 UART: [kat] SHA2-512-ACC
897,091 UART: [kat] ECC-384
902,728 UART: [kat] HMAC-384Kdf
907,154 UART: [kat] LMS
1,475,350 UART: [kat] --
1,476,429 UART: [cold-reset] ++
1,476,895 UART: [fht] Storing FHT @ 0x50003400
1,479,572 UART: [idev] ++
1,479,740 UART: [idev] CDI.KEYID = 6
1,480,100 UART: [idev] SUBJECT.KEYID = 7
1,480,524 UART: [idev] UDS.KEYID = 0
1,480,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,874 UART: [idev] Erasing UDS.KEYID = 0
1,505,338 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,828 UART: [idev] --
1,514,879 UART: [ldev] ++
1,515,047 UART: [ldev] CDI.KEYID = 6
1,515,410 UART: [ldev] SUBJECT.KEYID = 5
1,515,836 UART: [ldev] AUTHORITY.KEYID = 7
1,516,299 UART: [ldev] FE.KEYID = 1
1,521,697 UART: [ldev] Erasing FE.KEYID = 1
1,546,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,472 UART: [ldev] --
1,585,923 UART: [fwproc] Waiting for Commands...
1,586,766 UART: [fwproc] Received command 0x46574c44
1,587,557 UART: [fwproc] Received Image of size 114448 bytes
1,625,658 UART: ROM Fatal Error: 0x000B000D
1,626,817 >>> mbox cmd response: failed
1,626,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,823 >>> mbox cmd response: failed
1,626,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,143 UART: [kat] SHA2-256
882,074 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,189 UART: [kat] ++
886,341 UART: [kat] sha1
890,611 UART: [kat] SHA2-256
892,549 UART: [kat] SHA2-384
895,500 UART: [kat] SHA2-512-ACC
897,401 UART: [kat] ECC-384
902,660 UART: [kat] HMAC-384Kdf
907,250 UART: [kat] LMS
1,475,446 UART: [kat] --
1,476,347 UART: [cold-reset] ++
1,476,799 UART: [fht] Storing FHT @ 0x50003400
1,479,548 UART: [idev] ++
1,479,716 UART: [idev] CDI.KEYID = 6
1,480,076 UART: [idev] SUBJECT.KEYID = 7
1,480,500 UART: [idev] UDS.KEYID = 0
1,480,845 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,602 UART: [idev] Erasing UDS.KEYID = 0
1,504,676 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,316 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,941 UART: [ldev] Erasing FE.KEYID = 1
1,546,362 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,390 UART: [ldev] --
1,585,701 UART: [fwproc] Waiting for Commands...
1,586,450 UART: [fwproc] Received command 0x46574c44
1,587,241 UART: [fwproc] Received Image of size 114448 bytes
2,887,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,509 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,894 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,053 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,479,288 >>> mbox cmd response: failed
1,479,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,294 >>> mbox cmd response: failed
1,479,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,926 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,053 UART: [state] LifecycleState = Unprovisioned
86,708 UART: [state] DebugLocked = No
87,274 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,794 UART: [kat] SHA2-256
882,725 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,840 UART: [kat] ++
886,992 UART: [kat] sha1
891,182 UART: [kat] SHA2-256
893,120 UART: [kat] SHA2-384
896,109 UART: [kat] SHA2-512-ACC
898,010 UART: [kat] ECC-384
903,889 UART: [kat] HMAC-384Kdf
908,637 UART: [kat] LMS
1,476,833 UART: [kat] --
1,477,414 UART: [cold-reset] ++
1,477,834 UART: [fht] Storing FHT @ 0x50003400
1,480,579 UART: [idev] ++
1,480,747 UART: [idev] CDI.KEYID = 6
1,481,107 UART: [idev] SUBJECT.KEYID = 7
1,481,531 UART: [idev] UDS.KEYID = 0
1,481,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,483 UART: [idev] Erasing UDS.KEYID = 0
1,506,389 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,021 UART: [idev] --
1,515,926 UART: [ldev] ++
1,516,094 UART: [ldev] CDI.KEYID = 6
1,516,457 UART: [ldev] SUBJECT.KEYID = 5
1,516,883 UART: [ldev] AUTHORITY.KEYID = 7
1,517,346 UART: [ldev] FE.KEYID = 1
1,522,374 UART: [ldev] Erasing FE.KEYID = 1
1,547,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,005 UART: [ldev] --
1,587,352 UART: [fwproc] Waiting for Commands...
1,588,193 UART: [fwproc] Received command 0x46574c44
1,588,984 UART: [fwproc] Received Image of size 114448 bytes
1,627,401 UART: ROM Fatal Error: 0x000B000D
1,628,560 >>> mbox cmd response: failed
1,628,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,566 >>> mbox cmd response: failed
1,628,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
87,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,510 UART: [kat] SHA2-256
882,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,556 UART: [kat] ++
886,708 UART: [kat] sha1
891,058 UART: [kat] SHA2-256
892,996 UART: [kat] SHA2-384
895,551 UART: [kat] SHA2-512-ACC
897,452 UART: [kat] ECC-384
902,883 UART: [kat] HMAC-384Kdf
907,527 UART: [kat] LMS
1,475,723 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,477,170 UART: [fht] Storing FHT @ 0x50003400
1,479,947 UART: [idev] ++
1,480,115 UART: [idev] CDI.KEYID = 6
1,480,475 UART: [idev] SUBJECT.KEYID = 7
1,480,899 UART: [idev] UDS.KEYID = 0
1,481,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,077 UART: [idev] Erasing UDS.KEYID = 0
1,505,193 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,003 UART: [idev] --
1,515,208 UART: [ldev] ++
1,515,376 UART: [ldev] CDI.KEYID = 6
1,515,739 UART: [ldev] SUBJECT.KEYID = 5
1,516,165 UART: [ldev] AUTHORITY.KEYID = 7
1,516,628 UART: [ldev] FE.KEYID = 1
1,522,168 UART: [ldev] Erasing FE.KEYID = 1
1,547,755 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,527 UART: [ldev] --
1,587,012 UART: [fwproc] Waiting for Commands...
1,587,631 UART: [fwproc] Received command 0x46574c44
1,588,422 UART: [fwproc] Received Image of size 114448 bytes
2,887,304 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,312 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,737 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,479,817 >>> mbox cmd response: failed
1,479,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,823 >>> mbox cmd response: failed
1,479,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,795 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
893,656 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,781 UART: [kat] ++
897,933 UART: [kat] sha1
902,277 UART: [kat] SHA2-256
904,217 UART: [kat] SHA2-384
906,886 UART: [kat] SHA2-512-ACC
908,787 UART: [kat] ECC-384
918,146 UART: [kat] HMAC-384Kdf
922,880 UART: [kat] LMS
1,171,208 UART: [kat] --
1,172,027 UART: [cold-reset] ++
1,172,469 UART: [fht] FHT @ 0x50003400
1,174,948 UART: [idev] ++
1,175,116 UART: [idev] CDI.KEYID = 6
1,175,476 UART: [idev] SUBJECT.KEYID = 7
1,175,900 UART: [idev] UDS.KEYID = 0
1,176,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,952 UART: [idev] Erasing UDS.KEYID = 0
1,200,691 UART: [idev] Sha1 KeyId Algorithm
1,209,129 UART: [idev] --
1,210,183 UART: [ldev] ++
1,210,351 UART: [ldev] CDI.KEYID = 6
1,210,714 UART: [ldev] SUBJECT.KEYID = 5
1,211,140 UART: [ldev] AUTHORITY.KEYID = 7
1,211,603 UART: [ldev] FE.KEYID = 1
1,216,931 UART: [ldev] Erasing FE.KEYID = 1
1,243,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,189 UART: [ldev] --
1,282,676 UART: [fwproc] Wait for Commands...
1,283,286 UART: [fwproc] Recv command 0x46574c44
1,284,014 UART: [fwproc] Recv'd Img size: 114448 bytes
1,322,841 UART: ROM Fatal Error: 0x000B000D
1,324,000 >>> mbox cmd response: failed
1,324,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,006 >>> mbox cmd response: failed
1,324,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
893,306 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,431 UART: [kat] ++
897,583 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,314 UART: [kat] SHA2-512-ACC
908,215 UART: [kat] ECC-384
918,004 UART: [kat] HMAC-384Kdf
922,492 UART: [kat] LMS
1,170,820 UART: [kat] --
1,171,725 UART: [cold-reset] ++
1,172,147 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,175,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,436 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,869 UART: [idev] --
1,210,025 UART: [ldev] ++
1,210,193 UART: [ldev] CDI.KEYID = 6
1,210,556 UART: [ldev] SUBJECT.KEYID = 5
1,210,982 UART: [ldev] AUTHORITY.KEYID = 7
1,211,445 UART: [ldev] FE.KEYID = 1
1,216,737 UART: [ldev] Erasing FE.KEYID = 1
1,243,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,408 UART: [fwproc] Wait for Commands...
1,283,134 UART: [fwproc] Recv command 0x46574c44
1,283,862 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,082 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,263 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,791 >>> mbox cmd response: failed
1,176,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,797 >>> mbox cmd response: failed
1,176,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,368 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
893,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,488 UART: [kat] ++
897,640 UART: [kat] sha1
901,894 UART: [kat] SHA2-256
903,834 UART: [kat] SHA2-384
906,671 UART: [kat] SHA2-512-ACC
908,572 UART: [kat] ECC-384
918,463 UART: [kat] HMAC-384Kdf
922,997 UART: [kat] LMS
1,171,325 UART: [kat] --
1,172,226 UART: [cold-reset] ++
1,172,752 UART: [fht] FHT @ 0x50003400
1,175,643 UART: [idev] ++
1,175,811 UART: [idev] CDI.KEYID = 6
1,176,171 UART: [idev] SUBJECT.KEYID = 7
1,176,595 UART: [idev] UDS.KEYID = 0
1,176,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,787 UART: [idev] Erasing UDS.KEYID = 0
1,201,798 UART: [idev] Sha1 KeyId Algorithm
1,210,232 UART: [idev] --
1,211,396 UART: [ldev] ++
1,211,564 UART: [ldev] CDI.KEYID = 6
1,211,927 UART: [ldev] SUBJECT.KEYID = 5
1,212,353 UART: [ldev] AUTHORITY.KEYID = 7
1,212,816 UART: [ldev] FE.KEYID = 1
1,217,946 UART: [ldev] Erasing FE.KEYID = 1
1,244,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,598 UART: [ldev] --
1,283,951 UART: [fwproc] Wait for Commands...
1,284,527 UART: [fwproc] Recv command 0x46574c44
1,285,255 UART: [fwproc] Recv'd Img size: 114448 bytes
1,323,498 UART: ROM Fatal Error: 0x000B000D
1,324,657 >>> mbox cmd response: failed
1,324,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,663 >>> mbox cmd response: failed
1,324,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
893,527 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,652 UART: [kat] ++
897,804 UART: [kat] sha1
902,008 UART: [kat] SHA2-256
903,948 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,363 UART: [kat] HMAC-384Kdf
922,885 UART: [kat] LMS
1,171,213 UART: [kat] --
1,172,168 UART: [cold-reset] ++
1,172,620 UART: [fht] FHT @ 0x50003400
1,175,225 UART: [idev] ++
1,175,393 UART: [idev] CDI.KEYID = 6
1,175,753 UART: [idev] SUBJECT.KEYID = 7
1,176,177 UART: [idev] UDS.KEYID = 0
1,176,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,085 UART: [idev] Erasing UDS.KEYID = 0
1,201,434 UART: [idev] Sha1 KeyId Algorithm
1,210,026 UART: [idev] --
1,211,056 UART: [ldev] ++
1,211,224 UART: [ldev] CDI.KEYID = 6
1,211,587 UART: [ldev] SUBJECT.KEYID = 5
1,212,013 UART: [ldev] AUTHORITY.KEYID = 7
1,212,476 UART: [ldev] FE.KEYID = 1
1,217,696 UART: [ldev] Erasing FE.KEYID = 1
1,243,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,842 UART: [ldev] --
1,283,159 UART: [fwproc] Wait for Commands...
1,283,745 UART: [fwproc] Recv command 0x46574c44
1,284,473 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,706 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,480 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,360 >>> mbox cmd response: failed
1,179,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,366 >>> mbox cmd response: failed
1,179,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,259 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,981 UART: [kat] ++
895,133 UART: [kat] sha1
899,323 UART: [kat] SHA2-256
901,263 UART: [kat] SHA2-384
904,012 UART: [kat] SHA2-512-ACC
905,913 UART: [kat] ECC-384
915,200 UART: [kat] HMAC-384Kdf
920,030 UART: [kat] LMS
1,168,342 UART: [kat] --
1,169,373 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,399 UART: [idev] ++
1,172,567 UART: [idev] CDI.KEYID = 6
1,172,928 UART: [idev] SUBJECT.KEYID = 7
1,173,353 UART: [idev] UDS.KEYID = 0
1,173,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,919 UART: [idev] Erasing UDS.KEYID = 0
1,198,119 UART: [idev] Sha1 KeyId Algorithm
1,207,211 UART: [idev] --
1,208,262 UART: [ldev] ++
1,208,430 UART: [ldev] CDI.KEYID = 6
1,208,794 UART: [ldev] SUBJECT.KEYID = 5
1,209,221 UART: [ldev] AUTHORITY.KEYID = 7
1,209,684 UART: [ldev] FE.KEYID = 1
1,215,080 UART: [ldev] Erasing FE.KEYID = 1
1,241,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,344 UART: [ldev] --
1,280,660 UART: [fwproc] Wait for Commands...
1,281,409 UART: [fwproc] Recv command 0x46574c44
1,282,142 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,199 UART: ROM Fatal Error: 0x000B000D
1,321,358 >>> mbox cmd response: failed
1,321,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,364 >>> mbox cmd response: failed
1,321,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,646 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,239 UART: [cold-reset] ++
1,170,571 UART: [fht] FHT @ 0x50003400
1,173,123 UART: [idev] ++
1,173,291 UART: [idev] CDI.KEYID = 6
1,173,652 UART: [idev] SUBJECT.KEYID = 7
1,174,077 UART: [idev] UDS.KEYID = 0
1,174,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,199,581 UART: [idev] Sha1 KeyId Algorithm
1,208,473 UART: [idev] --
1,209,426 UART: [ldev] ++
1,209,594 UART: [ldev] CDI.KEYID = 6
1,209,958 UART: [ldev] SUBJECT.KEYID = 5
1,210,385 UART: [ldev] AUTHORITY.KEYID = 7
1,210,848 UART: [ldev] FE.KEYID = 1
1,216,098 UART: [ldev] Erasing FE.KEYID = 1
1,242,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,968 UART: [ldev] --
1,282,446 UART: [fwproc] Wait for Commands...
1,283,139 UART: [fwproc] Recv command 0x46574c44
1,283,872 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,878 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,187 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,149 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,172,787 >>> mbox cmd response: failed
1,172,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,793 >>> mbox cmd response: failed
1,172,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,127 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,155 UART: [kat] LMS
1,169,467 UART: [kat] --
1,170,624 UART: [cold-reset] ++
1,171,140 UART: [fht] FHT @ 0x50003400
1,173,958 UART: [idev] ++
1,174,126 UART: [idev] CDI.KEYID = 6
1,174,487 UART: [idev] SUBJECT.KEYID = 7
1,174,912 UART: [idev] UDS.KEYID = 0
1,175,258 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,050 UART: [idev] Erasing UDS.KEYID = 0
1,199,910 UART: [idev] Sha1 KeyId Algorithm
1,208,794 UART: [idev] --
1,209,843 UART: [ldev] ++
1,210,011 UART: [ldev] CDI.KEYID = 6
1,210,375 UART: [ldev] SUBJECT.KEYID = 5
1,210,802 UART: [ldev] AUTHORITY.KEYID = 7
1,211,265 UART: [ldev] FE.KEYID = 1
1,216,541 UART: [ldev] Erasing FE.KEYID = 1
1,243,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,747 UART: [ldev] --
1,282,109 UART: [fwproc] Wait for Commands...
1,282,840 UART: [fwproc] Recv command 0x46574c44
1,283,573 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,796 UART: ROM Fatal Error: 0x000B000D
1,322,955 >>> mbox cmd response: failed
1,322,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,961 >>> mbox cmd response: failed
1,322,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,967 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
891,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,856 UART: [kat] ++
896,008 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,447 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,680 UART: [cold-reset] ++
1,171,252 UART: [fht] FHT @ 0x50003400
1,174,038 UART: [idev] ++
1,174,206 UART: [idev] CDI.KEYID = 6
1,174,567 UART: [idev] SUBJECT.KEYID = 7
1,174,992 UART: [idev] UDS.KEYID = 0
1,175,338 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,114 UART: [idev] Erasing UDS.KEYID = 0
1,200,316 UART: [idev] Sha1 KeyId Algorithm
1,209,306 UART: [idev] --
1,210,417 UART: [ldev] ++
1,210,585 UART: [ldev] CDI.KEYID = 6
1,210,949 UART: [ldev] SUBJECT.KEYID = 5
1,211,376 UART: [ldev] AUTHORITY.KEYID = 7
1,211,839 UART: [ldev] FE.KEYID = 1
1,217,351 UART: [ldev] Erasing FE.KEYID = 1
1,243,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,127 UART: [ldev] --
1,282,563 UART: [fwproc] Wait for Commands...
1,283,374 UART: [fwproc] Recv command 0x46574c44
1,284,107 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,060 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,865 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,174,628 >>> mbox cmd response: failed
1,174,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,634 >>> mbox cmd response: failed
1,174,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,276 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,293 UART:
192,647 UART: Running Caliptra ROM ...
193,826 UART:
193,976 UART: [state] CFI Enabled
262,226 UART: [state] LifecycleState = Unprovisioned
264,208 UART: [state] DebugLocked = No
265,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,502 UART: [kat] SHA2-256
441,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,716 UART: [kat] ++
452,252 UART: [kat] sha1
463,941 UART: [kat] SHA2-256
466,583 UART: [kat] SHA2-384
471,488 UART: [kat] SHA2-512-ACC
473,894 UART: [kat] ECC-384
2,764,989 UART: [kat] HMAC-384Kdf
2,777,195 UART: [kat] LMS
3,967,512 UART: [kat] --
3,970,503 UART: [cold-reset] ++
3,972,282 UART: [fht] Storing FHT @ 0x50003400
3,984,102 UART: [idev] ++
3,984,666 UART: [idev] CDI.KEYID = 6
3,985,635 UART: [idev] SUBJECT.KEYID = 7
3,986,850 UART: [idev] UDS.KEYID = 0
3,989,659 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,133,382 UART: [idev] Erasing UDS.KEYID = 0
7,324,131 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,817 UART: [idev] --
7,348,798 UART: [ldev] ++
7,349,377 UART: [ldev] CDI.KEYID = 6
7,350,351 UART: [ldev] SUBJECT.KEYID = 5
7,351,546 UART: [ldev] AUTHORITY.KEYID = 7
7,352,853 UART: [ldev] FE.KEYID = 1
7,402,097 UART: [ldev] Erasing FE.KEYID = 1
10,735,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,601 UART: [ldev] --
13,115,613 UART: [fwproc] Waiting for Commands...
13,118,811 UART: [fwproc] Received command 0x46574c44
13,121,001 UART: [fwproc] Received Image of size 114124 bytes
13,191,858 UART: ROM Fatal Error: 0x000B0008
13,195,393 >>> mbox cmd response: failed
13,195,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,196,130 >>> mbox cmd response: failed
13,196,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,196,690 >>> mbox cmd response: failed
Initializing fuses
2,050,321 writing to cptra_bootfsm_go
2,239,577 UART:
2,239,946 UART: Running Caliptra ROM ...
2,241,086 UART:
2,241,252 UART: [state] CFI Enabled
2,298,566 UART: [state] LifecycleState = Unprovisioned
2,300,519 UART: [state] DebugLocked = No
2,302,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,308,068 UART: [kat] SHA2-256
2,477,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,488,304 UART: [kat] ++
2,488,764 UART: [kat] sha1
2,500,575 UART: [kat] SHA2-256
2,503,272 UART: [kat] SHA2-384
2,509,205 UART: [kat] SHA2-512-ACC
2,511,608 UART: [kat] ECC-384
4,801,982 UART: [kat] HMAC-384Kdf
4,812,864 UART: [kat] LMS
6,003,178 UART: [kat] --
6,009,547 UART: [cold-reset] ++
6,010,509 UART: [fht] Storing FHT @ 0x50003400
6,021,514 UART: [idev] ++
6,022,089 UART: [idev] CDI.KEYID = 6
6,023,133 UART: [idev] SUBJECT.KEYID = 7
6,024,300 UART: [idev] UDS.KEYID = 0
6,026,905 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,170,588 UART: [idev] Erasing UDS.KEYID = 0
9,357,567 UART: [idev] Using Sha1 for KeyId Algorithm
9,379,109 UART: [idev] --
9,383,912 UART: [ldev] ++
9,384,480 UART: [ldev] CDI.KEYID = 6
9,385,417 UART: [ldev] SUBJECT.KEYID = 5
9,386,736 UART: [ldev] AUTHORITY.KEYID = 7
9,387,865 UART: [ldev] FE.KEYID = 1
9,434,817 UART: [ldev] Erasing FE.KEYID = 1
12,770,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,060,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,074,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,089,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,104,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,122,699 UART: [ldev] --
15,127,657 UART: [fwproc] Waiting for Commands...
15,130,887 UART: [fwproc] Received command 0x46574c44
15,133,070 UART: [fwproc] Received Image of size 114124 bytes
19,187,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,264,739 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,333,604 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,650,830 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,800,313 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,920,604 >>> mbox cmd response: failed
12,921,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,668 >>> mbox cmd response: failed
12,921,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,179 >>> mbox cmd response: failed
Initializing fuses
2,048,065 writing to cptra_bootfsm_go
5,852,279 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,938,569 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,465 UART:
192,817 UART: Running Caliptra ROM ...
193,996 UART:
603,550 UART: [state] CFI Enabled
619,353 UART: [state] LifecycleState = Unprovisioned
621,294 UART: [state] DebugLocked = No
624,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,895 UART: [kat] SHA2-256
799,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,165 UART: [kat] ++
810,703 UART: [kat] sha1
820,239 UART: [kat] SHA2-256
822,981 UART: [kat] SHA2-384
829,820 UART: [kat] SHA2-512-ACC
832,159 UART: [kat] ECC-384
3,115,841 UART: [kat] HMAC-384Kdf
3,128,945 UART: [kat] LMS
4,319,066 UART: [kat] --
4,323,491 UART: [cold-reset] ++
4,324,886 UART: [fht] Storing FHT @ 0x50003400
4,337,341 UART: [idev] ++
4,337,958 UART: [idev] CDI.KEYID = 6
4,338,857 UART: [idev] SUBJECT.KEYID = 7
4,340,129 UART: [idev] UDS.KEYID = 0
4,342,751 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,634 UART: [idev] Erasing UDS.KEYID = 0
7,626,835 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,639 UART: [idev] --
7,651,801 UART: [ldev] ++
7,652,379 UART: [ldev] CDI.KEYID = 6
7,653,321 UART: [ldev] SUBJECT.KEYID = 5
7,654,592 UART: [ldev] AUTHORITY.KEYID = 7
7,655,820 UART: [ldev] FE.KEYID = 1
7,667,577 UART: [ldev] Erasing FE.KEYID = 1
10,955,291 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,598 UART: [ldev] --
13,314,917 UART: [fwproc] Waiting for Commands...
13,318,310 UART: [fwproc] Received command 0x46574c44
13,320,504 UART: [fwproc] Received Image of size 114124 bytes
13,392,834 UART: ROM Fatal Error: 0x000B0008
13,396,310 >>> mbox cmd response: failed
13,396,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,397,095 >>> mbox cmd response: failed
13,397,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,397,656 >>> mbox cmd response: failed
Initializing fuses
2,048,769 writing to cptra_bootfsm_go
2,238,134 UART:
2,238,490 UART: Running Caliptra ROM ...
2,239,594 UART:
7,070,405 UART: [state] CFI Enabled
7,087,148 UART: [state] LifecycleState = Unprovisioned
7,089,093 UART: [state] DebugLocked = No
7,090,707 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,094,872 UART: [kat] SHA2-256
7,264,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,275,138 UART: [kat] ++
7,275,599 UART: [kat] sha1
7,286,595 UART: [kat] SHA2-256
7,289,290 UART: [kat] SHA2-384
7,294,363 UART: [kat] SHA2-512-ACC
7,296,769 UART: [kat] ECC-384
9,579,405 UART: [kat] HMAC-384Kdf
9,591,820 UART: [kat] LMS
10,781,929 UART: [kat] --
10,786,264 UART: [cold-reset] ++
10,787,124 UART: [fht] Storing FHT @ 0x50003400
10,798,743 UART: [idev] ++
10,799,303 UART: [idev] CDI.KEYID = 6
10,800,238 UART: [idev] SUBJECT.KEYID = 7
10,801,504 UART: [idev] UDS.KEYID = 0
10,804,146 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,947,606 UART: [idev] Erasing UDS.KEYID = 0
14,086,579 UART: [idev] Using Sha1 for KeyId Algorithm
14,108,187 UART: [idev] --
14,113,750 UART: [ldev] ++
14,114,325 UART: [ldev] CDI.KEYID = 6
14,115,345 UART: [ldev] SUBJECT.KEYID = 5
14,116,549 UART: [ldev] AUTHORITY.KEYID = 7
14,117,805 UART: [ldev] FE.KEYID = 1
14,128,939 UART: [ldev] Erasing FE.KEYID = 1
17,419,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,712,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,726,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,741,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,756,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,774,480 UART: [ldev] --
19,778,774 UART: [fwproc] Waiting for Commands...
19,780,386 UART: [fwproc] Received command 0x46574c44
19,782,574 UART: [fwproc] Received Image of size 114124 bytes
23,836,310 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,912,722 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,981,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,299,278 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
4,126,697 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,135,867 >>> mbox cmd response: failed
13,136,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,136,828 >>> mbox cmd response: failed
13,137,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,137,395 >>> mbox cmd response: failed
Initializing fuses
2,045,689 writing to cptra_bootfsm_go
10,864,820 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,811,295 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,209 UART:
192,580 UART: Running Caliptra ROM ...
193,677 UART:
193,844 UART: [state] CFI Enabled
263,067 UART: [state] LifecycleState = Unprovisioned
264,940 UART: [state] DebugLocked = No
267,411 UART: [state] WD Timer not started. Device not locked for debugging
270,529 UART: [kat] SHA2-256
449,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,228 UART: [kat] ++
461,675 UART: [kat] sha1
473,899 UART: [kat] SHA2-256
476,914 UART: [kat] SHA2-384
482,355 UART: [kat] SHA2-512-ACC
485,350 UART: [kat] ECC-384
2,948,774 UART: [kat] HMAC-384Kdf
2,970,457 UART: [kat] LMS
3,499,907 UART: [kat] --
3,505,093 UART: [cold-reset] ++
3,507,267 UART: [fht] FHT @ 0x50003400
3,519,006 UART: [idev] ++
3,519,577 UART: [idev] CDI.KEYID = 6
3,520,547 UART: [idev] SUBJECT.KEYID = 7
3,521,706 UART: [idev] UDS.KEYID = 0
3,524,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,732 UART: [idev] Erasing UDS.KEYID = 0
6,025,859 UART: [idev] Sha1 KeyId Algorithm
6,049,578 UART: [idev] --
6,054,276 UART: [ldev] ++
6,054,849 UART: [ldev] CDI.KEYID = 6
6,055,759 UART: [ldev] SUBJECT.KEYID = 5
6,056,919 UART: [ldev] AUTHORITY.KEYID = 7
6,058,152 UART: [ldev] FE.KEYID = 1
6,100,529 UART: [ldev] Erasing FE.KEYID = 1
8,605,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,144 UART: [ldev] --
10,414,659 UART: [fwproc] Wait for Commands...
10,416,264 UART: [fwproc] Recv command 0x46574c44
10,418,305 UART: [fwproc] Recv'd Img size: 114448 bytes
10,491,279 UART: ROM Fatal Error: 0x000B0008
10,494,373 >>> mbox cmd response: failed
10,494,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,495,063 >>> mbox cmd response: failed
10,495,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,495,623 >>> mbox cmd response: failed
Initializing fuses
2,055,741 writing to cptra_bootfsm_go
2,245,050 UART:
2,245,402 UART: Running Caliptra ROM ...
2,246,542 UART:
2,246,714 UART: [state] CFI Enabled
2,313,069 UART: [state] LifecycleState = Unprovisioned
2,314,948 UART: [state] DebugLocked = No
2,317,367 UART: [state] WD Timer not started. Device not locked for debugging
2,321,711 UART: [kat] SHA2-256
2,500,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,512,395 UART: [kat] ++
2,512,857 UART: [kat] sha1
2,524,390 UART: [kat] SHA2-256
2,527,413 UART: [kat] SHA2-384
2,534,831 UART: [kat] SHA2-512-ACC
2,537,778 UART: [kat] ECC-384
4,998,766 UART: [kat] HMAC-384Kdf
5,019,612 UART: [kat] LMS
5,549,020 UART: [kat] --
5,554,874 UART: [cold-reset] ++
5,557,026 UART: [fht] FHT @ 0x50003400
5,569,464 UART: [idev] ++
5,570,028 UART: [idev] CDI.KEYID = 6
5,571,011 UART: [idev] SUBJECT.KEYID = 7
5,572,118 UART: [idev] UDS.KEYID = 0
5,574,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,763 UART: [idev] Erasing UDS.KEYID = 0
8,075,532 UART: [idev] Sha1 KeyId Algorithm
8,097,683 UART: [idev] --
8,101,575 UART: [ldev] ++
8,102,169 UART: [ldev] CDI.KEYID = 6
8,103,084 UART: [ldev] SUBJECT.KEYID = 5
8,104,165 UART: [ldev] AUTHORITY.KEYID = 7
8,105,502 UART: [ldev] FE.KEYID = 1
8,149,310 UART: [ldev] Erasing FE.KEYID = 1
10,653,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,368,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,384,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,400,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,415,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,435,929 UART: [ldev] --
12,440,440 UART: [fwproc] Wait for Commands...
12,442,534 UART: [fwproc] Recv command 0x46574c44
12,444,627 UART: [fwproc] Recv'd Img size: 114448 bytes
15,851,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,927,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,996,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,314,575 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,384,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,291,969 >>> mbox cmd response: failed
10,292,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,293,073 >>> mbox cmd response: failed
10,293,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,293,656 >>> mbox cmd response: failed
Initializing fuses
2,053,281 writing to cptra_bootfsm_go
5,418,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,092,398 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,494 UART:
192,853 UART: Running Caliptra ROM ...
193,976 UART:
603,823 UART: [state] CFI Enabled
619,922 UART: [state] LifecycleState = Unprovisioned
621,765 UART: [state] DebugLocked = No
624,003 UART: [state] WD Timer not started. Device not locked for debugging
626,961 UART: [kat] SHA2-256
806,081 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,687 UART: [kat] ++
818,226 UART: [kat] sha1
830,244 UART: [kat] SHA2-256
833,300 UART: [kat] SHA2-384
840,245 UART: [kat] SHA2-512-ACC
843,177 UART: [kat] ECC-384
3,285,473 UART: [kat] HMAC-384Kdf
3,298,193 UART: [kat] LMS
3,827,726 UART: [kat] --
3,833,120 UART: [cold-reset] ++
3,835,611 UART: [fht] FHT @ 0x50003400
3,847,721 UART: [idev] ++
3,848,294 UART: [idev] CDI.KEYID = 6
3,849,501 UART: [idev] SUBJECT.KEYID = 7
3,850,629 UART: [idev] UDS.KEYID = 0
3,853,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,997,143 UART: [idev] Erasing UDS.KEYID = 0
6,326,927 UART: [idev] Sha1 KeyId Algorithm
6,348,889 UART: [idev] --
6,354,177 UART: [ldev] ++
6,354,754 UART: [ldev] CDI.KEYID = 6
6,355,636 UART: [ldev] SUBJECT.KEYID = 5
6,356,794 UART: [ldev] AUTHORITY.KEYID = 7
6,358,022 UART: [ldev] FE.KEYID = 1
6,368,145 UART: [ldev] Erasing FE.KEYID = 1
8,843,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,223 UART: [ldev] --
10,634,191 UART: [fwproc] Wait for Commands...
10,636,555 UART: [fwproc] Recv command 0x46574c44
10,638,658 UART: [fwproc] Recv'd Img size: 114448 bytes
10,709,232 UART: ROM Fatal Error: 0x000B0008
10,712,318 >>> mbox cmd response: failed
10,712,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,713,056 >>> mbox cmd response: failed
10,713,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,713,614 >>> mbox cmd response: failed
Initializing fuses
2,050,928 writing to cptra_bootfsm_go
2,240,246 UART:
2,240,587 UART: Running Caliptra ROM ...
2,241,724 UART:
9,746,654 UART: [state] CFI Enabled
9,759,204 UART: [state] LifecycleState = Unprovisioned
9,761,063 UART: [state] DebugLocked = No
9,762,991 UART: [state] WD Timer not started. Device not locked for debugging
9,767,435 UART: [kat] SHA2-256
9,946,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,958,131 UART: [kat] ++
9,958,682 UART: [kat] sha1
9,969,250 UART: [kat] SHA2-256
9,972,267 UART: [kat] SHA2-384
9,977,678 UART: [kat] SHA2-512-ACC
9,980,619 UART: [kat] ECC-384
12,422,019 UART: [kat] HMAC-384Kdf
12,433,915 UART: [kat] LMS
12,963,390 UART: [kat] --
12,968,507 UART: [cold-reset] ++
12,970,328 UART: [fht] FHT @ 0x50003400
12,980,655 UART: [idev] ++
12,981,252 UART: [idev] CDI.KEYID = 6
12,982,171 UART: [idev] SUBJECT.KEYID = 7
12,983,330 UART: [idev] UDS.KEYID = 0
12,985,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,129,709 UART: [idev] Erasing UDS.KEYID = 0
15,454,402 UART: [idev] Sha1 KeyId Algorithm
15,477,447 UART: [idev] --
15,482,210 UART: [ldev] ++
15,482,797 UART: [ldev] CDI.KEYID = 6
15,483,677 UART: [ldev] SUBJECT.KEYID = 5
15,484,888 UART: [ldev] AUTHORITY.KEYID = 7
15,486,115 UART: [ldev] FE.KEYID = 1
15,496,139 UART: [ldev] Erasing FE.KEYID = 1
17,964,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,680,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,696,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,712,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,728,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,748,320 UART: [ldev] --
19,752,717 UART: [fwproc] Wait for Commands...
19,755,891 UART: [fwproc] Recv command 0x46574c44
19,757,933 UART: [fwproc] Recv'd Img size: 114448 bytes
23,151,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,221,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,289,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,607,785 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
3,700,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,475,636 >>> mbox cmd response: failed
10,476,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,476,576 >>> mbox cmd response: failed
10,476,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,477,137 >>> mbox cmd response: failed
Initializing fuses
2,049,607 writing to cptra_bootfsm_go
13,093,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,676,572 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,443,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,322,976 >>> mbox cmd response: failed
10,323,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,324,181 >>> mbox cmd response: failed
10,324,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,324,737 >>> mbox cmd response: failed
Initializing fuses
2,045,659 writing to cptra_bootfsm_go
5,468,953 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,767,149 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,758,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,542,037 >>> mbox cmd response: failed
10,542,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,543,100 >>> mbox cmd response: failed
10,543,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,543,675 >>> mbox cmd response: failed
Initializing fuses
2,051,968 writing to cptra_bootfsm_go
13,080,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,287,446 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,173 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,144 UART: [kat] SHA2-512-ACC
897,045 UART: [kat] ECC-384
902,610 UART: [kat] HMAC-384Kdf
907,208 UART: [kat] LMS
1,475,404 UART: [kat] --
1,476,273 UART: [cold-reset] ++
1,476,645 UART: [fht] Storing FHT @ 0x50003400
1,479,584 UART: [idev] ++
1,479,752 UART: [idev] CDI.KEYID = 6
1,480,112 UART: [idev] SUBJECT.KEYID = 7
1,480,536 UART: [idev] UDS.KEYID = 0
1,480,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,174 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,830 UART: [idev] --
1,514,863 UART: [ldev] ++
1,515,031 UART: [ldev] CDI.KEYID = 6
1,515,394 UART: [ldev] SUBJECT.KEYID = 5
1,515,820 UART: [ldev] AUTHORITY.KEYID = 7
1,516,283 UART: [ldev] FE.KEYID = 1
1,521,297 UART: [ldev] Erasing FE.KEYID = 1
1,546,242 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,182 UART: [ldev] --
1,585,691 UART: [fwproc] Waiting for Commands...
1,586,502 UART: [fwproc] Received command 0x46574c44
1,587,293 UART: [fwproc] Received Image of size 114448 bytes
1,612,624 UART: ROM Fatal Error: 0x000B0008
1,613,781 >>> mbox cmd response: failed
1,613,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,787 >>> mbox cmd response: failed
1,613,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,279 UART: [kat] SHA2-256
882,210 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,325 UART: [kat] ++
886,477 UART: [kat] sha1
890,771 UART: [kat] SHA2-256
892,709 UART: [kat] SHA2-384
895,436 UART: [kat] SHA2-512-ACC
897,337 UART: [kat] ECC-384
902,854 UART: [kat] HMAC-384Kdf
907,376 UART: [kat] LMS
1,475,572 UART: [kat] --
1,476,511 UART: [cold-reset] ++
1,476,935 UART: [fht] Storing FHT @ 0x50003400
1,479,706 UART: [idev] ++
1,479,874 UART: [idev] CDI.KEYID = 6
1,480,234 UART: [idev] SUBJECT.KEYID = 7
1,480,658 UART: [idev] UDS.KEYID = 0
1,481,003 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,894 UART: [idev] Erasing UDS.KEYID = 0
1,505,466 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,038 UART: [idev] --
1,514,873 UART: [ldev] ++
1,515,041 UART: [ldev] CDI.KEYID = 6
1,515,404 UART: [ldev] SUBJECT.KEYID = 5
1,515,830 UART: [ldev] AUTHORITY.KEYID = 7
1,516,293 UART: [ldev] FE.KEYID = 1
1,521,401 UART: [ldev] Erasing FE.KEYID = 1
1,546,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,524 UART: [ldev] --
1,586,027 UART: [fwproc] Waiting for Commands...
1,586,784 UART: [fwproc] Received command 0x46574c44
1,587,575 UART: [fwproc] Received Image of size 114448 bytes
2,886,707 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,235 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,678 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,167 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,465,454 >>> mbox cmd response: failed
1,465,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,460 >>> mbox cmd response: failed
1,465,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,466 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,782 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,811 UART: [state] LifecycleState = Unprovisioned
86,466 UART: [state] DebugLocked = No
86,996 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,616 UART: [kat] SHA2-256
882,547 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,662 UART: [kat] ++
886,814 UART: [kat] sha1
890,888 UART: [kat] SHA2-256
892,826 UART: [kat] SHA2-384
895,617 UART: [kat] SHA2-512-ACC
897,518 UART: [kat] ECC-384
903,353 UART: [kat] HMAC-384Kdf
907,967 UART: [kat] LMS
1,476,163 UART: [kat] --
1,477,262 UART: [cold-reset] ++
1,477,836 UART: [fht] Storing FHT @ 0x50003400
1,480,599 UART: [idev] ++
1,480,767 UART: [idev] CDI.KEYID = 6
1,481,127 UART: [idev] SUBJECT.KEYID = 7
1,481,551 UART: [idev] UDS.KEYID = 0
1,481,896 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,661 UART: [idev] Erasing UDS.KEYID = 0
1,506,439 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,229 UART: [idev] --
1,516,150 UART: [ldev] ++
1,516,318 UART: [ldev] CDI.KEYID = 6
1,516,681 UART: [ldev] SUBJECT.KEYID = 5
1,517,107 UART: [ldev] AUTHORITY.KEYID = 7
1,517,570 UART: [ldev] FE.KEYID = 1
1,522,890 UART: [ldev] Erasing FE.KEYID = 1
1,548,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,743 UART: [ldev] --
1,588,068 UART: [fwproc] Waiting for Commands...
1,588,937 UART: [fwproc] Received command 0x46574c44
1,589,728 UART: [fwproc] Received Image of size 114448 bytes
1,615,075 UART: ROM Fatal Error: 0x000B0008
1,616,232 >>> mbox cmd response: failed
1,616,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,238 >>> mbox cmd response: failed
1,616,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,154 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,798 UART: [kat] SHA2-256
882,729 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,844 UART: [kat] ++
886,996 UART: [kat] sha1
891,180 UART: [kat] SHA2-256
893,118 UART: [kat] SHA2-384
895,871 UART: [kat] SHA2-512-ACC
897,772 UART: [kat] ECC-384
903,509 UART: [kat] HMAC-384Kdf
908,049 UART: [kat] LMS
1,476,245 UART: [kat] --
1,477,158 UART: [cold-reset] ++
1,477,544 UART: [fht] Storing FHT @ 0x50003400
1,480,253 UART: [idev] ++
1,480,421 UART: [idev] CDI.KEYID = 6
1,480,781 UART: [idev] SUBJECT.KEYID = 7
1,481,205 UART: [idev] UDS.KEYID = 0
1,481,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,443 UART: [idev] Erasing UDS.KEYID = 0
1,506,409 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,789 UART: [idev] --
1,515,796 UART: [ldev] ++
1,515,964 UART: [ldev] CDI.KEYID = 6
1,516,327 UART: [ldev] SUBJECT.KEYID = 5
1,516,753 UART: [ldev] AUTHORITY.KEYID = 7
1,517,216 UART: [ldev] FE.KEYID = 1
1,522,756 UART: [ldev] Erasing FE.KEYID = 1
1,548,235 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,917 UART: [ldev] --
1,587,266 UART: [fwproc] Waiting for Commands...
1,588,125 UART: [fwproc] Received command 0x46574c44
1,588,916 UART: [fwproc] Received Image of size 114448 bytes
2,887,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,846 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,127 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,856 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,466,441 >>> mbox cmd response: failed
1,466,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,447 >>> mbox cmd response: failed
1,466,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,972 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,497 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
893,226 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,351 UART: [kat] ++
897,503 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,414 UART: [kat] SHA2-512-ACC
908,315 UART: [kat] ECC-384
918,100 UART: [kat] HMAC-384Kdf
922,462 UART: [kat] LMS
1,170,790 UART: [kat] --
1,171,939 UART: [cold-reset] ++
1,172,377 UART: [fht] FHT @ 0x50003400
1,174,886 UART: [idev] ++
1,175,054 UART: [idev] CDI.KEYID = 6
1,175,414 UART: [idev] SUBJECT.KEYID = 7
1,175,838 UART: [idev] UDS.KEYID = 0
1,176,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,948 UART: [idev] Erasing UDS.KEYID = 0
1,201,045 UART: [idev] Sha1 KeyId Algorithm
1,209,491 UART: [idev] --
1,210,535 UART: [ldev] ++
1,210,703 UART: [ldev] CDI.KEYID = 6
1,211,066 UART: [ldev] SUBJECT.KEYID = 5
1,211,492 UART: [ldev] AUTHORITY.KEYID = 7
1,211,955 UART: [ldev] FE.KEYID = 1
1,217,213 UART: [ldev] Erasing FE.KEYID = 1
1,243,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,465 UART: [ldev] --
1,282,728 UART: [fwproc] Wait for Commands...
1,283,458 UART: [fwproc] Recv command 0x46574c44
1,284,186 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,551 UART: ROM Fatal Error: 0x000B0008
1,309,708 >>> mbox cmd response: failed
1,309,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,714 >>> mbox cmd response: failed
1,309,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
85,927 UART: [state] WD Timer not started. Device not locked for debugging
87,248 UART: [kat] SHA2-256
892,898 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,023 UART: [kat] ++
897,175 UART: [kat] sha1
901,357 UART: [kat] SHA2-256
903,297 UART: [kat] SHA2-384
905,956 UART: [kat] SHA2-512-ACC
907,857 UART: [kat] ECC-384
917,350 UART: [kat] HMAC-384Kdf
922,058 UART: [kat] LMS
1,170,386 UART: [kat] --
1,171,367 UART: [cold-reset] ++
1,171,825 UART: [fht] FHT @ 0x50003400
1,174,442 UART: [idev] ++
1,174,610 UART: [idev] CDI.KEYID = 6
1,174,970 UART: [idev] SUBJECT.KEYID = 7
1,175,394 UART: [idev] UDS.KEYID = 0
1,175,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,334 UART: [idev] Erasing UDS.KEYID = 0
1,200,557 UART: [idev] Sha1 KeyId Algorithm
1,209,159 UART: [idev] --
1,210,259 UART: [ldev] ++
1,210,427 UART: [ldev] CDI.KEYID = 6
1,210,790 UART: [ldev] SUBJECT.KEYID = 5
1,211,216 UART: [ldev] AUTHORITY.KEYID = 7
1,211,679 UART: [ldev] FE.KEYID = 1
1,216,815 UART: [ldev] Erasing FE.KEYID = 1
1,243,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,945 UART: [ldev] --
1,283,248 UART: [fwproc] Wait for Commands...
1,283,996 UART: [fwproc] Recv command 0x46574c44
1,284,724 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,517 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,433 >>> mbox cmd response: failed
1,164,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,439 >>> mbox cmd response: failed
1,164,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,445 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,958 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,109 UART: [state] LifecycleState = Unprovisioned
86,764 UART: [state] DebugLocked = No
87,490 UART: [state] WD Timer not started. Device not locked for debugging
88,705 UART: [kat] SHA2-256
894,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,480 UART: [kat] ++
898,632 UART: [kat] sha1
902,952 UART: [kat] SHA2-256
904,892 UART: [kat] SHA2-384
907,711 UART: [kat] SHA2-512-ACC
909,612 UART: [kat] ECC-384
919,559 UART: [kat] HMAC-384Kdf
924,147 UART: [kat] LMS
1,172,475 UART: [kat] --
1,173,436 UART: [cold-reset] ++
1,173,960 UART: [fht] FHT @ 0x50003400
1,176,469 UART: [idev] ++
1,176,637 UART: [idev] CDI.KEYID = 6
1,176,997 UART: [idev] SUBJECT.KEYID = 7
1,177,421 UART: [idev] UDS.KEYID = 0
1,177,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,186,063 UART: [idev] Erasing UDS.KEYID = 0
1,203,764 UART: [idev] Sha1 KeyId Algorithm
1,212,272 UART: [idev] --
1,213,266 UART: [ldev] ++
1,213,434 UART: [ldev] CDI.KEYID = 6
1,213,797 UART: [ldev] SUBJECT.KEYID = 5
1,214,223 UART: [ldev] AUTHORITY.KEYID = 7
1,214,686 UART: [ldev] FE.KEYID = 1
1,219,976 UART: [ldev] Erasing FE.KEYID = 1
1,246,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,056 UART: [ldev] --
1,285,505 UART: [fwproc] Wait for Commands...
1,286,235 UART: [fwproc] Recv command 0x46574c44
1,286,963 UART: [fwproc] Recv'd Img size: 114448 bytes
1,311,610 UART: ROM Fatal Error: 0x000B0008
1,312,767 >>> mbox cmd response: failed
1,312,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,773 >>> mbox cmd response: failed
1,312,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,779 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
893,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,438 UART: [kat] ++
897,590 UART: [kat] sha1
901,704 UART: [kat] SHA2-256
903,644 UART: [kat] SHA2-384
906,329 UART: [kat] SHA2-512-ACC
908,230 UART: [kat] ECC-384
918,021 UART: [kat] HMAC-384Kdf
922,657 UART: [kat] LMS
1,170,985 UART: [kat] --
1,171,950 UART: [cold-reset] ++
1,172,330 UART: [fht] FHT @ 0x50003400
1,174,845 UART: [idev] ++
1,175,013 UART: [idev] CDI.KEYID = 6
1,175,373 UART: [idev] SUBJECT.KEYID = 7
1,175,797 UART: [idev] UDS.KEYID = 0
1,176,142 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,803 UART: [idev] Erasing UDS.KEYID = 0
1,201,172 UART: [idev] Sha1 KeyId Algorithm
1,209,654 UART: [idev] --
1,210,706 UART: [ldev] ++
1,210,874 UART: [ldev] CDI.KEYID = 6
1,211,237 UART: [ldev] SUBJECT.KEYID = 5
1,211,663 UART: [ldev] AUTHORITY.KEYID = 7
1,212,126 UART: [ldev] FE.KEYID = 1
1,217,256 UART: [ldev] Erasing FE.KEYID = 1
1,244,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,932 UART: [ldev] --
1,283,375 UART: [fwproc] Wait for Commands...
1,284,187 UART: [fwproc] Recv command 0x46574c44
1,284,915 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,522 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,398 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,165,646 >>> mbox cmd response: failed
1,165,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,652 >>> mbox cmd response: failed
1,165,652 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,733 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
891,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,561 UART: [kat] ++
895,713 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,173,247 UART: [idev] ++
1,173,415 UART: [idev] CDI.KEYID = 6
1,173,776 UART: [idev] SUBJECT.KEYID = 7
1,174,201 UART: [idev] UDS.KEYID = 0
1,174,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,023 UART: [idev] Erasing UDS.KEYID = 0
1,199,063 UART: [idev] Sha1 KeyId Algorithm
1,208,099 UART: [idev] --
1,208,942 UART: [ldev] ++
1,209,110 UART: [ldev] CDI.KEYID = 6
1,209,474 UART: [ldev] SUBJECT.KEYID = 5
1,209,901 UART: [ldev] AUTHORITY.KEYID = 7
1,210,364 UART: [ldev] FE.KEYID = 1
1,215,592 UART: [ldev] Erasing FE.KEYID = 1
1,242,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,814 UART: [ldev] --
1,281,112 UART: [fwproc] Wait for Commands...
1,281,829 UART: [fwproc] Recv command 0x46574c44
1,282,562 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,970 UART: ROM Fatal Error: 0x000B0008
1,308,127 >>> mbox cmd response: failed
1,308,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,133 >>> mbox cmd response: failed
1,308,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,374 UART: [kat] HMAC-384Kdf
920,940 UART: [kat] LMS
1,169,252 UART: [kat] --
1,170,467 UART: [cold-reset] ++
1,170,871 UART: [fht] FHT @ 0x50003400
1,173,575 UART: [idev] ++
1,173,743 UART: [idev] CDI.KEYID = 6
1,174,104 UART: [idev] SUBJECT.KEYID = 7
1,174,529 UART: [idev] UDS.KEYID = 0
1,174,875 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,779 UART: [idev] Erasing UDS.KEYID = 0
1,200,115 UART: [idev] Sha1 KeyId Algorithm
1,208,977 UART: [idev] --
1,210,242 UART: [ldev] ++
1,210,410 UART: [ldev] CDI.KEYID = 6
1,210,774 UART: [ldev] SUBJECT.KEYID = 5
1,211,201 UART: [ldev] AUTHORITY.KEYID = 7
1,211,664 UART: [ldev] FE.KEYID = 1
1,216,852 UART: [ldev] Erasing FE.KEYID = 1
1,243,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,758 UART: [ldev] --
1,283,164 UART: [fwproc] Wait for Commands...
1,283,801 UART: [fwproc] Recv command 0x46574c44
1,284,534 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,457 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,570 >>> mbox cmd response: failed
1,160,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,576 >>> mbox cmd response: failed
1,160,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,582 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,717 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,087 UART: [kat] LMS
1,169,399 UART: [kat] --
1,170,282 UART: [cold-reset] ++
1,170,844 UART: [fht] FHT @ 0x50003400
1,173,486 UART: [idev] ++
1,173,654 UART: [idev] CDI.KEYID = 6
1,174,015 UART: [idev] SUBJECT.KEYID = 7
1,174,440 UART: [idev] UDS.KEYID = 0
1,174,786 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,570 UART: [idev] Erasing UDS.KEYID = 0
1,200,108 UART: [idev] Sha1 KeyId Algorithm
1,208,998 UART: [idev] --
1,210,153 UART: [ldev] ++
1,210,321 UART: [ldev] CDI.KEYID = 6
1,210,685 UART: [ldev] SUBJECT.KEYID = 5
1,211,112 UART: [ldev] AUTHORITY.KEYID = 7
1,211,575 UART: [ldev] FE.KEYID = 1
1,216,861 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,757 UART: [ldev] --
1,282,107 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x46574c44
1,283,521 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,717 UART: ROM Fatal Error: 0x000B0008
1,309,874 >>> mbox cmd response: failed
1,309,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,880 >>> mbox cmd response: failed
1,309,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,529 UART: [kat] SHA2-256
891,079 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,208 UART: [kat] ++
895,360 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
916,167 UART: [kat] HMAC-384Kdf
920,795 UART: [kat] LMS
1,169,107 UART: [kat] --
1,169,972 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Sha1 KeyId Algorithm
1,208,668 UART: [idev] --
1,209,755 UART: [ldev] ++
1,209,923 UART: [ldev] CDI.KEYID = 6
1,210,287 UART: [ldev] SUBJECT.KEYID = 5
1,210,714 UART: [ldev] AUTHORITY.KEYID = 7
1,211,177 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,881 UART: [fwproc] Wait for Commands...
1,282,630 UART: [fwproc] Recv command 0x46574c44
1,283,363 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,480 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,277 >>> mbox cmd response: failed
1,160,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,283 >>> mbox cmd response: failed
1,160,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,198 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,282 UART:
192,642 UART: Running Caliptra ROM ...
193,730 UART:
193,873 UART: [state] CFI Enabled
264,467 UART: [state] LifecycleState = Unprovisioned
266,447 UART: [state] DebugLocked = No
268,505 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,071 UART: [kat] SHA2-256
442,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,271 UART: [kat] ++
453,715 UART: [kat] sha1
463,569 UART: [kat] SHA2-256
466,251 UART: [kat] SHA2-384
472,227 UART: [kat] SHA2-512-ACC
474,573 UART: [kat] ECC-384
2,765,303 UART: [kat] HMAC-384Kdf
2,777,919 UART: [kat] LMS
3,968,260 UART: [kat] --
3,971,195 UART: [cold-reset] ++
3,972,429 UART: [fht] Storing FHT @ 0x50003400
3,984,893 UART: [idev] ++
3,985,461 UART: [idev] CDI.KEYID = 6
3,986,399 UART: [idev] SUBJECT.KEYID = 7
3,987,685 UART: [idev] UDS.KEYID = 0
3,990,412 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,135 UART: [idev] Erasing UDS.KEYID = 0
7,325,626 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,761 UART: [idev] --
7,351,489 UART: [ldev] ++
7,352,064 UART: [ldev] CDI.KEYID = 6
7,353,004 UART: [ldev] SUBJECT.KEYID = 5
7,354,221 UART: [ldev] AUTHORITY.KEYID = 7
7,355,586 UART: [ldev] FE.KEYID = 1
7,402,132 UART: [ldev] Erasing FE.KEYID = 1
10,735,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,175 UART: [ldev] --
13,116,857 UART: [fwproc] Waiting for Commands...
13,118,792 UART: [fwproc] Received command 0x46574c44
13,120,990 UART: [fwproc] Received Image of size 114124 bytes
13,193,619 UART: ROM Fatal Error: 0x000B0009
13,197,137 >>> mbox cmd response: failed
13,197,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,197,867 >>> mbox cmd response: failed
13,198,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,198,430 >>> mbox cmd response: failed
Initializing fuses
2,050,115 writing to cptra_bootfsm_go
2,239,406 UART:
2,239,773 UART: Running Caliptra ROM ...
2,240,914 UART:
2,241,080 UART: [state] CFI Enabled
2,318,400 UART: [state] LifecycleState = Unprovisioned
2,320,340 UART: [state] DebugLocked = No
2,321,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,691 UART: [kat] SHA2-256
2,496,382 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,859 UART: [kat] ++
2,507,314 UART: [kat] sha1
2,519,229 UART: [kat] SHA2-256
2,521,925 UART: [kat] SHA2-384
2,528,076 UART: [kat] SHA2-512-ACC
2,530,482 UART: [kat] ECC-384
4,821,770 UART: [kat] HMAC-384Kdf
4,853,829 UART: [kat] LMS
6,044,149 UART: [kat] --
6,049,458 UART: [cold-reset] ++
6,051,015 UART: [fht] Storing FHT @ 0x50003400
6,062,559 UART: [idev] ++
6,063,128 UART: [idev] CDI.KEYID = 6
6,064,146 UART: [idev] SUBJECT.KEYID = 7
6,065,304 UART: [idev] UDS.KEYID = 0
6,067,993 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,211,675 UART: [idev] Erasing UDS.KEYID = 0
9,400,975 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,901 UART: [idev] --
9,425,869 UART: [ldev] ++
9,426,440 UART: [ldev] CDI.KEYID = 6
9,427,379 UART: [ldev] SUBJECT.KEYID = 5
9,428,632 UART: [ldev] AUTHORITY.KEYID = 7
9,429,821 UART: [ldev] FE.KEYID = 1
9,475,039 UART: [ldev] Erasing FE.KEYID = 1
12,806,951 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,101,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,130,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,145,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,087 UART: [ldev] --
15,167,865 UART: [fwproc] Waiting for Commands...
15,170,078 UART: [fwproc] Received command 0x46574c44
15,172,269 UART: [fwproc] Received Image of size 114124 bytes
19,219,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,291,770 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,360,691 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,677,700 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,802,572 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,934,048 >>> mbox cmd response: failed
12,934,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,057 >>> mbox cmd response: failed
12,935,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,616 >>> mbox cmd response: failed
Initializing fuses
2,053,906 writing to cptra_bootfsm_go
5,821,557 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,878,599 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,545 UART:
192,909 UART: Running Caliptra ROM ...
194,007 UART:
603,595 UART: [state] CFI Enabled
618,196 UART: [state] LifecycleState = Unprovisioned
620,146 UART: [state] DebugLocked = No
622,897 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,397 UART: [kat] SHA2-256
797,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,684 UART: [kat] ++
808,161 UART: [kat] sha1
819,903 UART: [kat] SHA2-256
822,588 UART: [kat] SHA2-384
828,726 UART: [kat] SHA2-512-ACC
831,064 UART: [kat] ECC-384
3,116,181 UART: [kat] HMAC-384Kdf
3,128,310 UART: [kat] LMS
4,318,416 UART: [kat] --
4,322,769 UART: [cold-reset] ++
4,325,260 UART: [fht] Storing FHT @ 0x50003400
4,336,753 UART: [idev] ++
4,337,317 UART: [idev] CDI.KEYID = 6
4,338,303 UART: [idev] SUBJECT.KEYID = 7
4,339,527 UART: [idev] UDS.KEYID = 0
4,342,619 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,486,237 UART: [idev] Erasing UDS.KEYID = 0
7,622,779 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,743 UART: [idev] --
7,649,033 UART: [ldev] ++
7,649,612 UART: [ldev] CDI.KEYID = 6
7,650,580 UART: [ldev] SUBJECT.KEYID = 5
7,651,739 UART: [ldev] AUTHORITY.KEYID = 7
7,653,025 UART: [ldev] FE.KEYID = 1
7,664,316 UART: [ldev] Erasing FE.KEYID = 1
10,950,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,052 UART: [ldev] --
13,310,643 UART: [fwproc] Waiting for Commands...
13,313,929 UART: [fwproc] Received command 0x46574c44
13,316,171 UART: [fwproc] Received Image of size 114124 bytes
13,390,919 UART: ROM Fatal Error: 0x000B0009
13,394,466 >>> mbox cmd response: failed
13,394,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,395,239 >>> mbox cmd response: failed
13,395,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,395,789 >>> mbox cmd response: failed
Initializing fuses
2,055,097 writing to cptra_bootfsm_go
2,244,417 UART:
2,244,785 UART: Running Caliptra ROM ...
2,245,830 UART:
7,075,500 UART: [state] CFI Enabled
7,088,097 UART: [state] LifecycleState = Unprovisioned
7,090,016 UART: [state] DebugLocked = No
7,092,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,097,684 UART: [kat] SHA2-256
7,267,445 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,277,970 UART: [kat] ++
7,278,618 UART: [kat] sha1
7,288,553 UART: [kat] SHA2-256
7,291,217 UART: [kat] SHA2-384
7,296,020 UART: [kat] SHA2-512-ACC
7,298,376 UART: [kat] ECC-384
9,582,216 UART: [kat] HMAC-384Kdf
9,594,467 UART: [kat] LMS
10,784,576 UART: [kat] --
10,788,967 UART: [cold-reset] ++
10,791,063 UART: [fht] Storing FHT @ 0x50003400
10,803,094 UART: [idev] ++
10,803,701 UART: [idev] CDI.KEYID = 6
10,804,620 UART: [idev] SUBJECT.KEYID = 7
10,805,845 UART: [idev] UDS.KEYID = 0
10,808,516 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,951,816 UART: [idev] Erasing UDS.KEYID = 0
14,092,069 UART: [idev] Using Sha1 for KeyId Algorithm
14,113,511 UART: [idev] --
14,117,559 UART: [ldev] ++
14,118,126 UART: [ldev] CDI.KEYID = 6
14,119,060 UART: [ldev] SUBJECT.KEYID = 5
14,120,316 UART: [ldev] AUTHORITY.KEYID = 7
14,121,572 UART: [ldev] FE.KEYID = 1
14,132,840 UART: [ldev] Erasing FE.KEYID = 1
17,420,440 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,716,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,731,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,746,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,760,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,780,119 UART: [ldev] --
19,784,410 UART: [fwproc] Waiting for Commands...
19,786,893 UART: [fwproc] Received command 0x46574c44
19,789,080 UART: [fwproc] Received Image of size 114124 bytes
23,842,232 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,921,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,990,527 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,308,521 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
4,127,711 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,132,641 >>> mbox cmd response: failed
13,133,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,133,561 >>> mbox cmd response: failed
13,133,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,134,113 >>> mbox cmd response: failed
Initializing fuses
2,045,612 writing to cptra_bootfsm_go
10,872,865 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,808,770 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,208 UART:
192,575 UART: Running Caliptra ROM ...
193,760 UART:
193,917 UART: [state] CFI Enabled
263,285 UART: [state] LifecycleState = Unprovisioned
265,168 UART: [state] DebugLocked = No
266,923 UART: [state] WD Timer not started. Device not locked for debugging
270,440 UART: [kat] SHA2-256
449,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,150 UART: [kat] ++
461,686 UART: [kat] sha1
472,241 UART: [kat] SHA2-256
475,242 UART: [kat] SHA2-384
481,980 UART: [kat] SHA2-512-ACC
484,967 UART: [kat] ECC-384
2,948,501 UART: [kat] HMAC-384Kdf
2,972,043 UART: [kat] LMS
3,501,467 UART: [kat] --
3,507,271 UART: [cold-reset] ++
3,508,182 UART: [fht] FHT @ 0x50003400
3,518,891 UART: [idev] ++
3,519,461 UART: [idev] CDI.KEYID = 6
3,520,383 UART: [idev] SUBJECT.KEYID = 7
3,521,540 UART: [idev] UDS.KEYID = 0
3,524,331 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,469 UART: [idev] Erasing UDS.KEYID = 0
6,038,951 UART: [idev] Sha1 KeyId Algorithm
6,061,617 UART: [idev] --
6,066,057 UART: [ldev] ++
6,066,637 UART: [ldev] CDI.KEYID = 6
6,067,531 UART: [ldev] SUBJECT.KEYID = 5
6,068,708 UART: [ldev] AUTHORITY.KEYID = 7
6,070,001 UART: [ldev] FE.KEYID = 1
6,112,664 UART: [ldev] Erasing FE.KEYID = 1
8,616,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,684 UART: [ldev] --
10,428,352 UART: [fwproc] Wait for Commands...
10,431,098 UART: [fwproc] Recv command 0x46574c44
10,433,158 UART: [fwproc] Recv'd Img size: 114448 bytes
10,509,495 UART: ROM Fatal Error: 0x000B0009
10,512,483 >>> mbox cmd response: failed
10,512,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,513,281 >>> mbox cmd response: failed
10,513,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,513,836 >>> mbox cmd response: failed
Initializing fuses
2,048,902 writing to cptra_bootfsm_go
2,238,223 UART:
2,238,566 UART: Running Caliptra ROM ...
2,239,699 UART:
2,239,886 UART: [state] CFI Enabled
2,306,819 UART: [state] LifecycleState = Unprovisioned
2,308,662 UART: [state] DebugLocked = No
2,311,284 UART: [state] WD Timer not started. Device not locked for debugging
2,315,851 UART: [kat] SHA2-256
2,494,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,561 UART: [kat] ++
2,507,107 UART: [kat] sha1
2,517,303 UART: [kat] SHA2-256
2,520,313 UART: [kat] SHA2-384
2,525,649 UART: [kat] SHA2-512-ACC
2,528,593 UART: [kat] ECC-384
4,993,031 UART: [kat] HMAC-384Kdf
5,015,203 UART: [kat] LMS
5,544,613 UART: [kat] --
5,548,167 UART: [cold-reset] ++
5,549,143 UART: [fht] FHT @ 0x50003400
5,559,851 UART: [idev] ++
5,560,413 UART: [idev] CDI.KEYID = 6
5,561,342 UART: [idev] SUBJECT.KEYID = 7
5,562,554 UART: [idev] UDS.KEYID = 0
5,565,143 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,709,597 UART: [idev] Erasing UDS.KEYID = 0
8,072,748 UART: [idev] Sha1 KeyId Algorithm
8,096,031 UART: [idev] --
8,100,602 UART: [ldev] ++
8,101,188 UART: [ldev] CDI.KEYID = 6
8,102,099 UART: [ldev] SUBJECT.KEYID = 5
8,103,268 UART: [ldev] AUTHORITY.KEYID = 7
8,104,498 UART: [ldev] FE.KEYID = 1
8,143,439 UART: [ldev] Erasing FE.KEYID = 1
10,647,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,190 UART: [ldev] --
12,457,126 UART: [fwproc] Wait for Commands...
12,458,732 UART: [fwproc] Recv command 0x46574c44
12,460,829 UART: [fwproc] Recv'd Img size: 114448 bytes
15,860,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,936,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,005,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,324,244 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,382,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,273,699 >>> mbox cmd response: failed
10,274,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,274,761 >>> mbox cmd response: failed
10,275,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,275,331 >>> mbox cmd response: failed
Initializing fuses
2,051,063 writing to cptra_bootfsm_go
5,413,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,119,764 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
192,443 UART:
192,844 UART: Running Caliptra ROM ...
193,981 UART:
603,529 UART: [state] CFI Enabled
616,383 UART: [state] LifecycleState = Unprovisioned
618,235 UART: [state] DebugLocked = No
621,014 UART: [state] WD Timer not started. Device not locked for debugging
624,567 UART: [kat] SHA2-256
803,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,283 UART: [kat] ++
815,814 UART: [kat] sha1
827,629 UART: [kat] SHA2-256
830,638 UART: [kat] SHA2-384
837,051 UART: [kat] SHA2-512-ACC
839,988 UART: [kat] ECC-384
3,279,669 UART: [kat] HMAC-384Kdf
3,292,158 UART: [kat] LMS
3,821,627 UART: [kat] --
3,824,290 UART: [cold-reset] ++
3,825,306 UART: [fht] FHT @ 0x50003400
3,837,202 UART: [idev] ++
3,837,765 UART: [idev] CDI.KEYID = 6
3,838,647 UART: [idev] SUBJECT.KEYID = 7
3,839,915 UART: [idev] UDS.KEYID = 0
3,842,660 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,595 UART: [idev] Erasing UDS.KEYID = 0
6,309,759 UART: [idev] Sha1 KeyId Algorithm
6,333,586 UART: [idev] --
6,337,701 UART: [ldev] ++
6,338,279 UART: [ldev] CDI.KEYID = 6
6,339,342 UART: [ldev] SUBJECT.KEYID = 5
6,340,470 UART: [ldev] AUTHORITY.KEYID = 7
6,341,651 UART: [ldev] FE.KEYID = 1
6,353,085 UART: [ldev] Erasing FE.KEYID = 1
8,825,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,005 UART: [ldev] --
10,613,735 UART: [fwproc] Wait for Commands...
10,616,165 UART: [fwproc] Recv command 0x46574c44
10,618,259 UART: [fwproc] Recv'd Img size: 114448 bytes
10,692,557 UART: ROM Fatal Error: 0x000B0009
10,695,663 >>> mbox cmd response: failed
10,696,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,696,424 >>> mbox cmd response: failed
10,696,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,696,990 >>> mbox cmd response: failed
Initializing fuses
2,048,373 writing to cptra_bootfsm_go
2,237,703 UART:
2,238,058 UART: Running Caliptra ROM ...
2,239,200 UART:
9,761,417 UART: [state] CFI Enabled
9,776,498 UART: [state] LifecycleState = Unprovisioned
9,778,365 UART: [state] DebugLocked = No
9,779,886 UART: [state] WD Timer not started. Device not locked for debugging
9,783,583 UART: [kat] SHA2-256
9,962,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,974,279 UART: [kat] ++
9,974,824 UART: [kat] sha1
9,986,961 UART: [kat] SHA2-256
9,989,984 UART: [kat] SHA2-384
9,996,995 UART: [kat] SHA2-512-ACC
9,999,989 UART: [kat] ECC-384
12,441,195 UART: [kat] HMAC-384Kdf
12,454,417 UART: [kat] LMS
12,983,899 UART: [kat] --
12,988,807 UART: [cold-reset] ++
12,990,469 UART: [fht] FHT @ 0x50003400
12,999,987 UART: [idev] ++
13,000,552 UART: [idev] CDI.KEYID = 6
13,001,487 UART: [idev] SUBJECT.KEYID = 7
13,002,743 UART: [idev] UDS.KEYID = 0
13,005,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,149,232 UART: [idev] Erasing UDS.KEYID = 0
15,474,240 UART: [idev] Sha1 KeyId Algorithm
15,496,099 UART: [idev] --
15,500,421 UART: [ldev] ++
15,501,006 UART: [ldev] CDI.KEYID = 6
15,501,919 UART: [ldev] SUBJECT.KEYID = 5
15,503,081 UART: [ldev] AUTHORITY.KEYID = 7
15,504,317 UART: [ldev] FE.KEYID = 1
15,514,095 UART: [ldev] Erasing FE.KEYID = 1
17,984,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,703,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,719,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,735,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,750,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,772,067 UART: [ldev] --
19,775,981 UART: [fwproc] Wait for Commands...
19,777,975 UART: [fwproc] Recv command 0x46574c44
19,780,017 UART: [fwproc] Recv'd Img size: 114448 bytes
23,190,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,265,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,334,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,652,485 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,696,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,474,036 >>> mbox cmd response: failed
10,474,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,474,934 >>> mbox cmd response: failed
10,475,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,475,464 >>> mbox cmd response: failed
Initializing fuses
2,048,455 writing to cptra_bootfsm_go
13,087,888 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,656,084 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,441,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,324,132 >>> mbox cmd response: failed
10,324,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,325,359 >>> mbox cmd response: failed
10,325,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,325,926 >>> mbox cmd response: failed
Initializing fuses
2,057,246 writing to cptra_bootfsm_go
5,488,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,780,771 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,758,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,544,711 >>> mbox cmd response: failed
10,545,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,545,856 >>> mbox cmd response: failed
10,546,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,470 >>> mbox cmd response: failed
Initializing fuses
2,051,599 writing to cptra_bootfsm_go
13,077,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,280,755 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,099 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,759 UART: [kat] SHA2-256
881,690 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,805 UART: [kat] ++
885,957 UART: [kat] sha1
890,289 UART: [kat] SHA2-256
892,227 UART: [kat] SHA2-384
894,830 UART: [kat] SHA2-512-ACC
896,731 UART: [kat] ECC-384
902,024 UART: [kat] HMAC-384Kdf
906,486 UART: [kat] LMS
1,474,682 UART: [kat] --
1,475,407 UART: [cold-reset] ++
1,475,767 UART: [fht] Storing FHT @ 0x50003400
1,478,464 UART: [idev] ++
1,478,632 UART: [idev] CDI.KEYID = 6
1,478,992 UART: [idev] SUBJECT.KEYID = 7
1,479,416 UART: [idev] UDS.KEYID = 0
1,479,761 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,658 UART: [idev] Erasing UDS.KEYID = 0
1,503,976 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,464 UART: [idev] --
1,513,659 UART: [ldev] ++
1,513,827 UART: [ldev] CDI.KEYID = 6
1,514,190 UART: [ldev] SUBJECT.KEYID = 5
1,514,616 UART: [ldev] AUTHORITY.KEYID = 7
1,515,079 UART: [ldev] FE.KEYID = 1
1,520,277 UART: [ldev] Erasing FE.KEYID = 1
1,545,184 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,056 UART: [ldev] --
1,584,327 UART: [fwproc] Waiting for Commands...
1,584,982 UART: [fwproc] Received command 0x46574c44
1,585,773 UART: [fwproc] Received Image of size 114448 bytes
1,611,317 UART: ROM Fatal Error: 0x000B0009
1,612,474 >>> mbox cmd response: failed
1,612,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,480 >>> mbox cmd response: failed
1,612,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,486 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,053 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,629 UART: [kat] SHA2-256
881,560 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,675 UART: [kat] ++
885,827 UART: [kat] sha1
890,201 UART: [kat] SHA2-256
892,139 UART: [kat] SHA2-384
894,894 UART: [kat] SHA2-512-ACC
896,795 UART: [kat] ECC-384
902,330 UART: [kat] HMAC-384Kdf
906,924 UART: [kat] LMS
1,475,120 UART: [kat] --
1,476,119 UART: [cold-reset] ++
1,476,679 UART: [fht] Storing FHT @ 0x50003400
1,479,500 UART: [idev] ++
1,479,668 UART: [idev] CDI.KEYID = 6
1,480,028 UART: [idev] SUBJECT.KEYID = 7
1,480,452 UART: [idev] UDS.KEYID = 0
1,480,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,484 UART: [idev] Erasing UDS.KEYID = 0
1,504,786 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,516 UART: [idev] --
1,514,555 UART: [ldev] ++
1,514,723 UART: [ldev] CDI.KEYID = 6
1,515,086 UART: [ldev] SUBJECT.KEYID = 5
1,515,512 UART: [ldev] AUTHORITY.KEYID = 7
1,515,975 UART: [ldev] FE.KEYID = 1
1,521,045 UART: [ldev] Erasing FE.KEYID = 1
1,546,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,552 UART: [ldev] --
1,585,845 UART: [fwproc] Waiting for Commands...
1,586,538 UART: [fwproc] Received command 0x46574c44
1,587,329 UART: [fwproc] Received Image of size 114448 bytes
2,885,655 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,569 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,000 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,797 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,466,999 >>> mbox cmd response: failed
1,466,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,005 >>> mbox cmd response: failed
1,467,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,412 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
87,032 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,602 UART: [kat] SHA2-256
882,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,648 UART: [kat] ++
886,800 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,707 UART: [kat] SHA2-512-ACC
897,608 UART: [kat] ECC-384
903,171 UART: [kat] HMAC-384Kdf
907,773 UART: [kat] LMS
1,475,969 UART: [kat] --
1,476,814 UART: [cold-reset] ++
1,477,208 UART: [fht] Storing FHT @ 0x50003400
1,480,097 UART: [idev] ++
1,480,265 UART: [idev] CDI.KEYID = 6
1,480,625 UART: [idev] SUBJECT.KEYID = 7
1,481,049 UART: [idev] UDS.KEYID = 0
1,481,394 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,431 UART: [idev] Erasing UDS.KEYID = 0
1,506,357 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,135 UART: [idev] --
1,516,130 UART: [ldev] ++
1,516,298 UART: [ldev] CDI.KEYID = 6
1,516,661 UART: [ldev] SUBJECT.KEYID = 5
1,517,087 UART: [ldev] AUTHORITY.KEYID = 7
1,517,550 UART: [ldev] FE.KEYID = 1
1,522,754 UART: [ldev] Erasing FE.KEYID = 1
1,548,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,521 UART: [ldev] --
1,587,912 UART: [fwproc] Waiting for Commands...
1,588,743 UART: [fwproc] Received command 0x46574c44
1,589,534 UART: [fwproc] Received Image of size 114448 bytes
1,614,940 UART: ROM Fatal Error: 0x000B0009
1,616,097 >>> mbox cmd response: failed
1,616,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,103 >>> mbox cmd response: failed
1,616,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,109 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,472 UART: [kat] SHA2-256
892,410 UART: [kat] SHA2-384
895,301 UART: [kat] SHA2-512-ACC
897,202 UART: [kat] ECC-384
902,877 UART: [kat] HMAC-384Kdf
907,483 UART: [kat] LMS
1,475,679 UART: [kat] --
1,476,430 UART: [cold-reset] ++
1,476,894 UART: [fht] Storing FHT @ 0x50003400
1,479,711 UART: [idev] ++
1,479,879 UART: [idev] CDI.KEYID = 6
1,480,239 UART: [idev] SUBJECT.KEYID = 7
1,480,663 UART: [idev] UDS.KEYID = 0
1,481,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,681 UART: [idev] Erasing UDS.KEYID = 0
1,505,061 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,707 UART: [idev] --
1,514,806 UART: [ldev] ++
1,514,974 UART: [ldev] CDI.KEYID = 6
1,515,337 UART: [ldev] SUBJECT.KEYID = 5
1,515,763 UART: [ldev] AUTHORITY.KEYID = 7
1,516,226 UART: [ldev] FE.KEYID = 1
1,521,398 UART: [ldev] Erasing FE.KEYID = 1
1,547,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,655 UART: [ldev] --
1,586,946 UART: [fwproc] Waiting for Commands...
1,587,739 UART: [fwproc] Received command 0x46574c44
1,588,530 UART: [fwproc] Received Image of size 114448 bytes
2,887,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,154 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,506 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,477 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,465,720 >>> mbox cmd response: failed
1,465,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,726 >>> mbox cmd response: failed
1,465,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,732 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,038 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,217 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
893,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,349 UART: [kat] ++
897,501 UART: [kat] sha1
901,747 UART: [kat] SHA2-256
903,687 UART: [kat] SHA2-384
906,314 UART: [kat] SHA2-512-ACC
908,215 UART: [kat] ECC-384
917,416 UART: [kat] HMAC-384Kdf
921,934 UART: [kat] LMS
1,170,262 UART: [kat] --
1,171,129 UART: [cold-reset] ++
1,171,587 UART: [fht] FHT @ 0x50003400
1,174,266 UART: [idev] ++
1,174,434 UART: [idev] CDI.KEYID = 6
1,174,794 UART: [idev] SUBJECT.KEYID = 7
1,175,218 UART: [idev] UDS.KEYID = 0
1,175,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,228 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,208,755 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,356 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,225 UART: [ldev] Erasing FE.KEYID = 1
1,242,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,111 UART: [ldev] --
1,281,396 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,700 UART: [fwproc] Recv'd Img size: 114448 bytes
1,307,760 UART: ROM Fatal Error: 0x000B0009
1,308,917 >>> mbox cmd response: failed
1,308,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,923 >>> mbox cmd response: failed
1,308,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,762 UART: [state] LifecycleState = Unprovisioned
85,417 UART: [state] DebugLocked = No
85,953 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
892,896 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,021 UART: [kat] ++
897,173 UART: [kat] sha1
901,369 UART: [kat] SHA2-256
903,309 UART: [kat] SHA2-384
906,032 UART: [kat] SHA2-512-ACC
907,933 UART: [kat] ECC-384
917,690 UART: [kat] HMAC-384Kdf
922,298 UART: [kat] LMS
1,170,626 UART: [kat] --
1,171,405 UART: [cold-reset] ++
1,171,843 UART: [fht] FHT @ 0x50003400
1,174,586 UART: [idev] ++
1,174,754 UART: [idev] CDI.KEYID = 6
1,175,114 UART: [idev] SUBJECT.KEYID = 7
1,175,538 UART: [idev] UDS.KEYID = 0
1,175,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,878 UART: [idev] Erasing UDS.KEYID = 0
1,201,383 UART: [idev] Sha1 KeyId Algorithm
1,209,843 UART: [idev] --
1,211,073 UART: [ldev] ++
1,211,241 UART: [ldev] CDI.KEYID = 6
1,211,604 UART: [ldev] SUBJECT.KEYID = 5
1,212,030 UART: [ldev] AUTHORITY.KEYID = 7
1,212,493 UART: [ldev] FE.KEYID = 1
1,217,523 UART: [ldev] Erasing FE.KEYID = 1
1,243,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,929 UART: [ldev] --
1,283,408 UART: [fwproc] Wait for Commands...
1,284,166 UART: [fwproc] Recv command 0x46574c44
1,284,894 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,257 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,165,246 >>> mbox cmd response: failed
1,165,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,252 >>> mbox cmd response: failed
1,165,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,611 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,482 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,545 UART: [kat] SHA2-256
893,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,320 UART: [kat] ++
897,472 UART: [kat] sha1
901,624 UART: [kat] SHA2-256
903,564 UART: [kat] SHA2-384
906,143 UART: [kat] SHA2-512-ACC
908,044 UART: [kat] ECC-384
917,231 UART: [kat] HMAC-384Kdf
921,815 UART: [kat] LMS
1,170,143 UART: [kat] --
1,170,946 UART: [cold-reset] ++
1,171,346 UART: [fht] FHT @ 0x50003400
1,173,933 UART: [idev] ++
1,174,101 UART: [idev] CDI.KEYID = 6
1,174,461 UART: [idev] SUBJECT.KEYID = 7
1,174,885 UART: [idev] UDS.KEYID = 0
1,175,230 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,951 UART: [idev] Erasing UDS.KEYID = 0
1,200,014 UART: [idev] Sha1 KeyId Algorithm
1,208,528 UART: [idev] --
1,209,598 UART: [ldev] ++
1,209,766 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,555 UART: [ldev] AUTHORITY.KEYID = 7
1,211,018 UART: [ldev] FE.KEYID = 1
1,216,578 UART: [ldev] Erasing FE.KEYID = 1
1,243,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,884 UART: [ldev] --
1,282,395 UART: [fwproc] Wait for Commands...
1,283,215 UART: [fwproc] Recv command 0x46574c44
1,283,943 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,707 UART: ROM Fatal Error: 0x000B0009
1,309,864 >>> mbox cmd response: failed
1,309,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,870 >>> mbox cmd response: failed
1,309,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,320 UART: [kat] SHA2-256
904,260 UART: [kat] SHA2-384
907,053 UART: [kat] SHA2-512-ACC
908,954 UART: [kat] ECC-384
918,631 UART: [kat] HMAC-384Kdf
923,381 UART: [kat] LMS
1,171,709 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,172,914 UART: [fht] FHT @ 0x50003400
1,175,475 UART: [idev] ++
1,175,643 UART: [idev] CDI.KEYID = 6
1,176,003 UART: [idev] SUBJECT.KEYID = 7
1,176,427 UART: [idev] UDS.KEYID = 0
1,176,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,341 UART: [idev] Erasing UDS.KEYID = 0
1,201,758 UART: [idev] Sha1 KeyId Algorithm
1,210,120 UART: [idev] --
1,211,352 UART: [ldev] ++
1,211,520 UART: [ldev] CDI.KEYID = 6
1,211,883 UART: [ldev] SUBJECT.KEYID = 5
1,212,309 UART: [ldev] AUTHORITY.KEYID = 7
1,212,772 UART: [ldev] FE.KEYID = 1
1,217,932 UART: [ldev] Erasing FE.KEYID = 1
1,244,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,568 UART: [ldev] --
1,284,049 UART: [fwproc] Wait for Commands...
1,284,649 UART: [fwproc] Recv command 0x46574c44
1,285,377 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,794 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,951 >>> mbox cmd response: failed
1,164,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,957 >>> mbox cmd response: failed
1,164,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,287 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
890,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,971 UART: [kat] ++
895,123 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,828 UART: [kat] LMS
1,169,140 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,511 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,174,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,697 UART: [idev] Sha1 KeyId Algorithm
1,207,613 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,426 UART: [ldev] Erasing FE.KEYID = 1
1,241,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,010 UART: [ldev] --
1,280,484 UART: [fwproc] Wait for Commands...
1,281,151 UART: [fwproc] Recv command 0x46574c44
1,281,884 UART: [fwproc] Recv'd Img size: 114448 bytes
1,306,692 UART: ROM Fatal Error: 0x000B0009
1,307,849 >>> mbox cmd response: failed
1,307,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,855 >>> mbox cmd response: failed
1,307,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,187 UART: [kat] ++
895,339 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,173,011 UART: [idev] ++
1,173,179 UART: [idev] CDI.KEYID = 6
1,173,540 UART: [idev] SUBJECT.KEYID = 7
1,173,965 UART: [idev] UDS.KEYID = 0
1,174,311 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,867 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,208,840 UART: [ldev] ++
1,209,008 UART: [ldev] CDI.KEYID = 6
1,209,372 UART: [ldev] SUBJECT.KEYID = 5
1,209,799 UART: [ldev] AUTHORITY.KEYID = 7
1,210,262 UART: [ldev] FE.KEYID = 1
1,215,578 UART: [ldev] Erasing FE.KEYID = 1
1,241,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,538 UART: [ldev] --
1,281,052 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,848 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,169 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,442 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,162 >>> mbox cmd response: failed
1,160,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,168 >>> mbox cmd response: failed
1,160,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,914 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,049 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,054 UART: [kat] SHA2-256
901,994 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,245 UART: [kat] LMS
1,169,557 UART: [kat] --
1,170,436 UART: [cold-reset] ++
1,170,762 UART: [fht] FHT @ 0x50003400
1,173,588 UART: [idev] ++
1,173,756 UART: [idev] CDI.KEYID = 6
1,174,117 UART: [idev] SUBJECT.KEYID = 7
1,174,542 UART: [idev] UDS.KEYID = 0
1,174,888 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,782 UART: [idev] Erasing UDS.KEYID = 0
1,200,244 UART: [idev] Sha1 KeyId Algorithm
1,209,174 UART: [idev] --
1,210,273 UART: [ldev] ++
1,210,441 UART: [ldev] CDI.KEYID = 6
1,210,805 UART: [ldev] SUBJECT.KEYID = 5
1,211,232 UART: [ldev] AUTHORITY.KEYID = 7
1,211,695 UART: [ldev] FE.KEYID = 1
1,217,191 UART: [ldev] Erasing FE.KEYID = 1
1,244,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,409 UART: [ldev] --
1,283,721 UART: [fwproc] Wait for Commands...
1,284,448 UART: [fwproc] Recv command 0x46574c44
1,285,181 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,731 UART: ROM Fatal Error: 0x000B0009
1,310,888 >>> mbox cmd response: failed
1,310,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,894 >>> mbox cmd response: failed
1,310,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
915,915 UART: [kat] HMAC-384Kdf
920,435 UART: [kat] LMS
1,168,747 UART: [kat] --
1,169,800 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,173,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,744 UART: [idev] Erasing UDS.KEYID = 0
1,198,596 UART: [idev] Sha1 KeyId Algorithm
1,207,548 UART: [idev] --
1,208,539 UART: [ldev] ++
1,208,707 UART: [ldev] CDI.KEYID = 6
1,209,071 UART: [ldev] SUBJECT.KEYID = 5
1,209,498 UART: [ldev] AUTHORITY.KEYID = 7
1,209,961 UART: [ldev] FE.KEYID = 1
1,215,519 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,275 UART: [ldev] --
1,281,661 UART: [fwproc] Wait for Commands...
1,282,282 UART: [fwproc] Recv command 0x46574c44
1,283,015 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,104 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,789 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,381 >>> mbox cmd response: failed
1,161,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,387 >>> mbox cmd response: failed
1,161,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,100 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,190 UART:
192,555 UART: Running Caliptra ROM ...
193,693 UART:
193,841 UART: [state] CFI Enabled
261,001 UART: [state] LifecycleState = Unprovisioned
262,944 UART: [state] DebugLocked = No
264,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,058 UART: [kat] SHA2-256
438,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,271 UART: [kat] ++
449,748 UART: [kat] sha1
460,273 UART: [kat] SHA2-256
462,954 UART: [kat] SHA2-384
468,291 UART: [kat] SHA2-512-ACC
470,688 UART: [kat] ECC-384
2,764,982 UART: [kat] HMAC-384Kdf
2,797,636 UART: [kat] LMS
3,987,919 UART: [kat] --
3,992,221 UART: [cold-reset] ++
3,993,407 UART: [fht] Storing FHT @ 0x50003400
4,005,433 UART: [idev] ++
4,006,073 UART: [idev] CDI.KEYID = 6
4,007,000 UART: [idev] SUBJECT.KEYID = 7
4,008,223 UART: [idev] UDS.KEYID = 0
4,011,243 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,155,032 UART: [idev] Erasing UDS.KEYID = 0
7,344,691 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,687 UART: [idev] --
7,371,036 UART: [ldev] ++
7,371,607 UART: [ldev] CDI.KEYID = 6
7,372,573 UART: [ldev] SUBJECT.KEYID = 5
7,373,787 UART: [ldev] AUTHORITY.KEYID = 7
7,375,021 UART: [ldev] FE.KEYID = 1
7,419,909 UART: [ldev] Erasing FE.KEYID = 1
10,753,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,802 UART: [ldev] --
13,134,366 UART: [fwproc] Waiting for Commands...
13,137,281 UART: [fwproc] Received command 0x46574c44
13,139,470 UART: [fwproc] Received Image of size 114124 bytes
14,526,321 UART: ROM Fatal Error: 0x000B000C
14,529,761 >>> mbox cmd response: failed
14,530,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,530,451 >>> mbox cmd response: failed
14,530,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,531,028 >>> mbox cmd response: failed
Initializing fuses
2,057,452 writing to cptra_bootfsm_go
2,246,759 UART:
2,247,100 UART: Running Caliptra ROM ...
2,248,148 UART:
2,248,301 UART: [state] CFI Enabled
2,305,092 UART: [state] LifecycleState = Unprovisioned
2,306,998 UART: [state] DebugLocked = No
2,308,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,312,880 UART: [kat] SHA2-256
2,482,598 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,493,103 UART: [kat] ++
2,493,566 UART: [kat] sha1
2,505,210 UART: [kat] SHA2-256
2,507,926 UART: [kat] SHA2-384
2,514,942 UART: [kat] SHA2-512-ACC
2,517,294 UART: [kat] ECC-384
4,810,285 UART: [kat] HMAC-384Kdf
4,842,819 UART: [kat] LMS
6,033,144 UART: [kat] --
6,038,778 UART: [cold-reset] ++
6,040,873 UART: [fht] Storing FHT @ 0x50003400
6,051,552 UART: [idev] ++
6,052,120 UART: [idev] CDI.KEYID = 6
6,053,058 UART: [idev] SUBJECT.KEYID = 7
6,054,335 UART: [idev] UDS.KEYID = 0
6,056,882 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,200,498 UART: [idev] Erasing UDS.KEYID = 0
9,388,258 UART: [idev] Using Sha1 for KeyId Algorithm
9,409,757 UART: [idev] --
9,414,154 UART: [ldev] ++
9,414,788 UART: [ldev] CDI.KEYID = 6
9,415,702 UART: [ldev] SUBJECT.KEYID = 5
9,416,969 UART: [ldev] AUTHORITY.KEYID = 7
9,418,208 UART: [ldev] FE.KEYID = 1
9,464,663 UART: [ldev] Erasing FE.KEYID = 1
12,795,117 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,089,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,104,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,133,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,612 UART: [ldev] --
15,158,338 UART: [fwproc] Waiting for Commands...
15,160,812 UART: [fwproc] Received command 0x46574c44
15,162,998 UART: [fwproc] Received Image of size 114124 bytes
19,211,433 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,295,415 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,364,282 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,681,085 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,809,110 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,277,763 >>> mbox cmd response: failed
14,278,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,278,705 >>> mbox cmd response: failed
14,278,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,279,322 >>> mbox cmd response: failed
Initializing fuses
2,052,299 writing to cptra_bootfsm_go
5,822,671 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,903,821 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,420 UART:
192,771 UART: Running Caliptra ROM ...
193,954 UART:
603,510 UART: [state] CFI Enabled
614,768 UART: [state] LifecycleState = Unprovisioned
616,728 UART: [state] DebugLocked = No
619,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,239 UART: [kat] SHA2-256
793,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,504 UART: [kat] ++
805,039 UART: [kat] sha1
816,522 UART: [kat] SHA2-256
819,257 UART: [kat] SHA2-384
825,514 UART: [kat] SHA2-512-ACC
827,853 UART: [kat] ECC-384
3,111,668 UART: [kat] HMAC-384Kdf
3,124,308 UART: [kat] LMS
4,314,456 UART: [kat] --
4,320,177 UART: [cold-reset] ++
4,321,790 UART: [fht] Storing FHT @ 0x50003400
4,334,802 UART: [idev] ++
4,335,369 UART: [idev] CDI.KEYID = 6
4,336,390 UART: [idev] SUBJECT.KEYID = 7
4,337,551 UART: [idev] UDS.KEYID = 0
4,340,523 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,021 UART: [idev] Erasing UDS.KEYID = 0
7,626,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,887 UART: [idev] --
7,651,240 UART: [ldev] ++
7,651,811 UART: [ldev] CDI.KEYID = 6
7,652,779 UART: [ldev] SUBJECT.KEYID = 5
7,653,996 UART: [ldev] AUTHORITY.KEYID = 7
7,655,289 UART: [ldev] FE.KEYID = 1
7,664,156 UART: [ldev] Erasing FE.KEYID = 1
10,949,432 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,179 UART: [ldev] --
13,307,416 UART: [fwproc] Waiting for Commands...
13,309,460 UART: [fwproc] Received command 0x46574c44
13,311,646 UART: [fwproc] Received Image of size 114124 bytes
14,702,484 UART: ROM Fatal Error: 0x000B000C
14,705,967 >>> mbox cmd response: failed
14,706,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,706,718 >>> mbox cmd response: failed
14,707,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,707,326 >>> mbox cmd response: failed
Initializing fuses
2,054,047 writing to cptra_bootfsm_go
2,243,353 UART:
2,243,706 UART: Running Caliptra ROM ...
2,244,917 UART:
5,759,037 UART: [state] CFI Enabled
5,772,508 UART: [state] LifecycleState = Unprovisioned
5,774,447 UART: [state] DebugLocked = No
5,775,729 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,781,442 UART: [kat] SHA2-256
5,951,191 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,961,770 UART: [kat] ++
5,962,258 UART: [kat] sha1
5,973,901 UART: [kat] SHA2-256
5,976,601 UART: [kat] SHA2-384
5,983,072 UART: [kat] SHA2-512-ACC
5,985,444 UART: [kat] ECC-384
8,269,832 UART: [kat] HMAC-384Kdf
8,281,911 UART: [kat] LMS
9,472,011 UART: [kat] --
9,476,187 UART: [cold-reset] ++
9,478,608 UART: [fht] Storing FHT @ 0x50003400
9,490,366 UART: [idev] ++
9,490,934 UART: [idev] CDI.KEYID = 6
9,491,843 UART: [idev] SUBJECT.KEYID = 7
9,493,116 UART: [idev] UDS.KEYID = 0
9,495,814 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
9,639,282 UART: [idev] Erasing UDS.KEYID = 0
12,782,724 UART: [idev] Using Sha1 for KeyId Algorithm
12,803,722 UART: [idev] --
12,807,795 UART: [ldev] ++
12,808,385 UART: [ldev] CDI.KEYID = 6
12,809,371 UART: [ldev] SUBJECT.KEYID = 5
12,810,569 UART: [ldev] AUTHORITY.KEYID = 7
12,811,809 UART: [ldev] FE.KEYID = 1
12,824,398 UART: [ldev] Erasing FE.KEYID = 1
16,111,964 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,406,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,420,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,435,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,449,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,469,564 UART: [ldev] --
18,474,837 UART: [fwproc] Waiting for Commands...
18,476,940 UART: [fwproc] Received command 0x46574c44
18,479,133 UART: [fwproc] Received Image of size 114124 bytes
22,528,806 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,604,935 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,673,853 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
22,990,853 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,148 writing to cptra_bootfsm_go
4,131,004 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,460,306 >>> mbox cmd response: failed
14,460,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,461,167 >>> mbox cmd response: failed
14,461,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,461,728 >>> mbox cmd response: failed
Initializing fuses
2,053,191 writing to cptra_bootfsm_go
9,524,269 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
23,464,975 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,110 UART:
192,475 UART: Running Caliptra ROM ...
193,555 UART:
193,720 UART: [state] CFI Enabled
259,720 UART: [state] LifecycleState = Unprovisioned
261,540 UART: [state] DebugLocked = No
263,699 UART: [state] WD Timer not started. Device not locked for debugging
267,092 UART: [kat] SHA2-256
446,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,793 UART: [kat] ++
458,328 UART: [kat] sha1
469,374 UART: [kat] SHA2-256
472,437 UART: [kat] SHA2-384
479,005 UART: [kat] SHA2-512-ACC
481,941 UART: [kat] ECC-384
2,945,869 UART: [kat] HMAC-384Kdf
2,968,747 UART: [kat] LMS
3,498,223 UART: [kat] --
3,502,722 UART: [cold-reset] ++
3,505,213 UART: [fht] FHT @ 0x50003400
3,516,306 UART: [idev] ++
3,516,868 UART: [idev] CDI.KEYID = 6
3,517,781 UART: [idev] SUBJECT.KEYID = 7
3,518,995 UART: [idev] UDS.KEYID = 0
3,521,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,938 UART: [idev] Erasing UDS.KEYID = 0
6,023,471 UART: [idev] Sha1 KeyId Algorithm
6,047,001 UART: [idev] --
6,049,928 UART: [ldev] ++
6,050,500 UART: [ldev] CDI.KEYID = 6
6,051,416 UART: [ldev] SUBJECT.KEYID = 5
6,052,639 UART: [ldev] AUTHORITY.KEYID = 7
6,053,873 UART: [ldev] FE.KEYID = 1
6,096,849 UART: [ldev] Erasing FE.KEYID = 1
8,598,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,976 UART: [ldev] --
10,388,402 UART: [fwproc] Wait for Commands...
10,391,310 UART: [fwproc] Recv command 0x46574c44
10,393,352 UART: [fwproc] Recv'd Img size: 114448 bytes
11,457,176 UART: ROM Fatal Error: 0x000B000C
11,460,274 >>> mbox cmd response: failed
11,460,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,461,096 >>> mbox cmd response: failed
11,461,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,461,662 >>> mbox cmd response: failed
Initializing fuses
2,051,004 writing to cptra_bootfsm_go
2,240,289 UART:
2,240,637 UART: Running Caliptra ROM ...
2,241,680 UART:
2,241,831 UART: [state] CFI Enabled
2,304,714 UART: [state] LifecycleState = Unprovisioned
2,306,553 UART: [state] DebugLocked = No
2,308,720 UART: [state] WD Timer not started. Device not locked for debugging
2,312,460 UART: [kat] SHA2-256
2,491,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,153 UART: [kat] ++
2,503,616 UART: [kat] sha1
2,514,604 UART: [kat] SHA2-256
2,517,631 UART: [kat] SHA2-384
2,524,236 UART: [kat] SHA2-512-ACC
2,527,239 UART: [kat] ECC-384
4,992,275 UART: [kat] HMAC-384Kdf
5,013,260 UART: [kat] LMS
5,542,737 UART: [kat] --
5,546,671 UART: [cold-reset] ++
5,547,737 UART: [fht] FHT @ 0x50003400
5,559,823 UART: [idev] ++
5,560,379 UART: [idev] CDI.KEYID = 6
5,561,313 UART: [idev] SUBJECT.KEYID = 7
5,562,525 UART: [idev] UDS.KEYID = 0
5,565,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,709,141 UART: [idev] Erasing UDS.KEYID = 0
8,068,546 UART: [idev] Sha1 KeyId Algorithm
8,091,723 UART: [idev] --
8,095,215 UART: [ldev] ++
8,095,815 UART: [ldev] CDI.KEYID = 6
8,096,745 UART: [ldev] SUBJECT.KEYID = 5
8,097,854 UART: [ldev] AUTHORITY.KEYID = 7
8,099,151 UART: [ldev] FE.KEYID = 1
8,144,314 UART: [ldev] Erasing FE.KEYID = 1
10,647,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,710 UART: [ldev] --
12,456,786 UART: [fwproc] Wait for Commands...
12,459,207 UART: [fwproc] Recv command 0x46574c44
12,461,302 UART: [fwproc] Recv'd Img size: 114448 bytes
15,867,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,243 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,323,117 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,383,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,262,585 >>> mbox cmd response: failed
11,263,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,263,503 >>> mbox cmd response: failed
11,263,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,264,064 >>> mbox cmd response: failed
Initializing fuses
2,047,487 writing to cptra_bootfsm_go
5,408,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,113,364 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,567 UART:
193,173 UART: Running Caliptra ROM ...
194,297 UART:
603,770 UART: [state] CFI Enabled
615,396 UART: [state] LifecycleState = Unprovisioned
617,246 UART: [state] DebugLocked = No
619,709 UART: [state] WD Timer not started. Device not locked for debugging
623,313 UART: [kat] SHA2-256
802,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,001 UART: [kat] ++
814,546 UART: [kat] sha1
825,501 UART: [kat] SHA2-256
828,567 UART: [kat] SHA2-384
834,815 UART: [kat] SHA2-512-ACC
837,746 UART: [kat] ECC-384
3,280,033 UART: [kat] HMAC-384Kdf
3,293,593 UART: [kat] LMS
3,823,061 UART: [kat] --
3,828,081 UART: [cold-reset] ++
3,830,661 UART: [fht] FHT @ 0x50003400
3,841,424 UART: [idev] ++
3,841,997 UART: [idev] CDI.KEYID = 6
3,842,912 UART: [idev] SUBJECT.KEYID = 7
3,844,131 UART: [idev] UDS.KEYID = 0
3,847,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,991,068 UART: [idev] Erasing UDS.KEYID = 0
6,308,047 UART: [idev] Sha1 KeyId Algorithm
6,330,440 UART: [idev] --
6,335,206 UART: [ldev] ++
6,335,840 UART: [ldev] CDI.KEYID = 6
6,336,764 UART: [ldev] SUBJECT.KEYID = 5
6,337,874 UART: [ldev] AUTHORITY.KEYID = 7
6,339,110 UART: [ldev] FE.KEYID = 1
6,347,385 UART: [ldev] Erasing FE.KEYID = 1
8,821,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,605 UART: [ldev] --
10,612,120 UART: [fwproc] Wait for Commands...
10,615,353 UART: [fwproc] Recv command 0x46574c44
10,617,459 UART: [fwproc] Recv'd Img size: 114448 bytes
11,678,077 UART: ROM Fatal Error: 0x000B000C
11,681,180 >>> mbox cmd response: failed
11,681,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,681,950 >>> mbox cmd response: failed
11,682,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,682,512 >>> mbox cmd response: failed
Initializing fuses
2,052,250 writing to cptra_bootfsm_go
2,241,520 UART:
2,241,874 UART: Running Caliptra ROM ...
2,242,957 UART:
8,775,713 UART: [state] CFI Enabled
8,789,918 UART: [state] LifecycleState = Unprovisioned
8,791,801 UART: [state] DebugLocked = No
8,794,546 UART: [state] WD Timer not started. Device not locked for debugging
8,797,969 UART: [kat] SHA2-256
8,977,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,988,712 UART: [kat] ++
8,989,174 UART: [kat] sha1
9,001,139 UART: [kat] SHA2-256
9,004,169 UART: [kat] SHA2-384
9,011,404 UART: [kat] SHA2-512-ACC
9,014,406 UART: [kat] ECC-384
11,456,038 UART: [kat] HMAC-384Kdf
11,468,480 UART: [kat] LMS
11,997,974 UART: [kat] --
12,000,392 UART: [cold-reset] ++
12,002,322 UART: [fht] FHT @ 0x50003400
12,013,139 UART: [idev] ++
12,013,763 UART: [idev] CDI.KEYID = 6
12,014,683 UART: [idev] SUBJECT.KEYID = 7
12,015,847 UART: [idev] UDS.KEYID = 0
12,018,445 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,162,163 UART: [idev] Erasing UDS.KEYID = 0
14,489,162 UART: [idev] Sha1 KeyId Algorithm
14,513,001 UART: [idev] --
14,516,405 UART: [ldev] ++
14,516,973 UART: [ldev] CDI.KEYID = 6
14,517,934 UART: [ldev] SUBJECT.KEYID = 5
14,519,094 UART: [ldev] AUTHORITY.KEYID = 7
14,520,329 UART: [ldev] FE.KEYID = 1
14,532,593 UART: [ldev] Erasing FE.KEYID = 1
17,007,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,726,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,742,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,758,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,774,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,794,755 UART: [ldev] --
18,799,972 UART: [fwproc] Wait for Commands...
18,802,076 UART: [fwproc] Recv command 0x46574c44
18,804,179 UART: [fwproc] Recv'd Img size: 114448 bytes
22,202,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,273,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,342,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,660,889 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
3,697,355 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,463,132 >>> mbox cmd response: failed
11,463,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,464,034 >>> mbox cmd response: failed
11,464,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,464,616 >>> mbox cmd response: failed
Initializing fuses
2,048,875 writing to cptra_bootfsm_go
12,100,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,684,975 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,454,519 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,334,944 >>> mbox cmd response: failed
11,335,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,335,886 >>> mbox cmd response: failed
11,336,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,336,456 >>> mbox cmd response: failed
Initializing fuses
2,045,838 writing to cptra_bootfsm_go
5,472,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,748,747 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,207 writing to cptra_bootfsm_go
3,754,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,541,585 >>> mbox cmd response: failed
11,542,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,542,731 >>> mbox cmd response: failed
11,542,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,543,286 >>> mbox cmd response: failed
Initializing fuses
2,046,494 writing to cptra_bootfsm_go
12,078,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,292,221 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,877 UART: [kat] SHA2-256
881,808 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,923 UART: [kat] ++
886,075 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
894,902 UART: [kat] SHA2-512-ACC
896,803 UART: [kat] ECC-384
902,562 UART: [kat] HMAC-384Kdf
906,998 UART: [kat] LMS
1,475,194 UART: [kat] --
1,476,175 UART: [cold-reset] ++
1,476,503 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,412 UART: [idev] Erasing UDS.KEYID = 0
1,504,612 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,212 UART: [idev] --
1,514,453 UART: [ldev] ++
1,514,621 UART: [ldev] CDI.KEYID = 6
1,514,984 UART: [ldev] SUBJECT.KEYID = 5
1,515,410 UART: [ldev] AUTHORITY.KEYID = 7
1,515,873 UART: [ldev] FE.KEYID = 1
1,521,107 UART: [ldev] Erasing FE.KEYID = 1
1,546,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,212 UART: [ldev] --
1,586,613 UART: [fwproc] Waiting for Commands...
1,587,380 UART: [fwproc] Received command 0x46574c44
1,588,171 UART: [fwproc] Received Image of size 114448 bytes
1,625,739 UART: ROM Fatal Error: 0x000B000C
1,626,898 >>> mbox cmd response: failed
1,626,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,904 >>> mbox cmd response: failed
1,626,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,365 UART: [kat] SHA2-256
882,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,411 UART: [kat] ++
886,563 UART: [kat] sha1
890,587 UART: [kat] SHA2-256
892,525 UART: [kat] SHA2-384
895,352 UART: [kat] SHA2-512-ACC
897,253 UART: [kat] ECC-384
902,882 UART: [kat] HMAC-384Kdf
907,594 UART: [kat] LMS
1,475,790 UART: [kat] --
1,476,581 UART: [cold-reset] ++
1,477,147 UART: [fht] Storing FHT @ 0x50003400
1,479,808 UART: [idev] ++
1,479,976 UART: [idev] CDI.KEYID = 6
1,480,336 UART: [idev] SUBJECT.KEYID = 7
1,480,760 UART: [idev] UDS.KEYID = 0
1,481,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,290 UART: [idev] Erasing UDS.KEYID = 0
1,506,452 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,070 UART: [idev] --
1,516,147 UART: [ldev] ++
1,516,315 UART: [ldev] CDI.KEYID = 6
1,516,678 UART: [ldev] SUBJECT.KEYID = 5
1,517,104 UART: [ldev] AUTHORITY.KEYID = 7
1,517,567 UART: [ldev] FE.KEYID = 1
1,522,731 UART: [ldev] Erasing FE.KEYID = 1
1,548,140 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,966 UART: [ldev] --
1,587,387 UART: [fwproc] Waiting for Commands...
1,588,040 UART: [fwproc] Received command 0x46574c44
1,588,831 UART: [fwproc] Received Image of size 114448 bytes
2,887,957 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,059 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,411 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,334 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,505 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,478,905 >>> mbox cmd response: failed
1,478,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,911 >>> mbox cmd response: failed
1,478,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,917 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,770 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,004 UART: [kat] SHA2-256
881,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,050 UART: [kat] ++
886,202 UART: [kat] sha1
890,384 UART: [kat] SHA2-256
892,322 UART: [kat] SHA2-384
895,095 UART: [kat] SHA2-512-ACC
896,996 UART: [kat] ECC-384
902,781 UART: [kat] HMAC-384Kdf
907,251 UART: [kat] LMS
1,475,447 UART: [kat] --
1,476,172 UART: [cold-reset] ++
1,476,722 UART: [fht] Storing FHT @ 0x50003400
1,479,511 UART: [idev] ++
1,479,679 UART: [idev] CDI.KEYID = 6
1,480,039 UART: [idev] SUBJECT.KEYID = 7
1,480,463 UART: [idev] UDS.KEYID = 0
1,480,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,405 UART: [idev] Erasing UDS.KEYID = 0
1,505,473 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,047 UART: [idev] --
1,515,068 UART: [ldev] ++
1,515,236 UART: [ldev] CDI.KEYID = 6
1,515,599 UART: [ldev] SUBJECT.KEYID = 5
1,516,025 UART: [ldev] AUTHORITY.KEYID = 7
1,516,488 UART: [ldev] FE.KEYID = 1
1,521,800 UART: [ldev] Erasing FE.KEYID = 1
1,547,683 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,045 UART: [ldev] --
1,587,440 UART: [fwproc] Waiting for Commands...
1,588,271 UART: [fwproc] Received command 0x46574c44
1,589,062 UART: [fwproc] Received Image of size 114448 bytes
1,626,100 UART: ROM Fatal Error: 0x000B000C
1,627,259 >>> mbox cmd response: failed
1,627,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,265 >>> mbox cmd response: failed
1,627,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,532 UART: [kat] SHA2-256
882,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,578 UART: [kat] ++
886,730 UART: [kat] sha1
891,160 UART: [kat] SHA2-256
893,098 UART: [kat] SHA2-384
895,815 UART: [kat] SHA2-512-ACC
897,716 UART: [kat] ECC-384
903,255 UART: [kat] HMAC-384Kdf
907,907 UART: [kat] LMS
1,476,103 UART: [kat] --
1,477,020 UART: [cold-reset] ++
1,477,444 UART: [fht] Storing FHT @ 0x50003400
1,480,235 UART: [idev] ++
1,480,403 UART: [idev] CDI.KEYID = 6
1,480,763 UART: [idev] SUBJECT.KEYID = 7
1,481,187 UART: [idev] UDS.KEYID = 0
1,481,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,007 UART: [idev] Erasing UDS.KEYID = 0
1,505,605 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,177 UART: [idev] --
1,515,270 UART: [ldev] ++
1,515,438 UART: [ldev] CDI.KEYID = 6
1,515,801 UART: [ldev] SUBJECT.KEYID = 5
1,516,227 UART: [ldev] AUTHORITY.KEYID = 7
1,516,690 UART: [ldev] FE.KEYID = 1
1,521,678 UART: [ldev] Erasing FE.KEYID = 1
1,546,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,253 UART: [ldev] --
1,586,638 UART: [fwproc] Waiting for Commands...
1,587,455 UART: [fwproc] Received command 0x46574c44
1,588,246 UART: [fwproc] Received Image of size 114448 bytes
2,887,258 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,232 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,584 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,561 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,478,696 >>> mbox cmd response: failed
1,478,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,702 >>> mbox cmd response: failed
1,478,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,416 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,175 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
893,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,191 UART: [kat] ++
897,343 UART: [kat] sha1
901,457 UART: [kat] SHA2-256
903,397 UART: [kat] SHA2-384
906,076 UART: [kat] SHA2-512-ACC
907,977 UART: [kat] ECC-384
917,278 UART: [kat] HMAC-384Kdf
921,910 UART: [kat] LMS
1,170,238 UART: [kat] --
1,171,177 UART: [cold-reset] ++
1,171,507 UART: [fht] FHT @ 0x50003400
1,174,274 UART: [idev] ++
1,174,442 UART: [idev] CDI.KEYID = 6
1,174,802 UART: [idev] SUBJECT.KEYID = 7
1,175,226 UART: [idev] UDS.KEYID = 0
1,175,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,221 UART: [idev] Sha1 KeyId Algorithm
1,208,523 UART: [idev] --
1,209,503 UART: [ldev] ++
1,209,671 UART: [ldev] CDI.KEYID = 6
1,210,034 UART: [ldev] SUBJECT.KEYID = 5
1,210,460 UART: [ldev] AUTHORITY.KEYID = 7
1,210,923 UART: [ldev] FE.KEYID = 1
1,215,925 UART: [ldev] Erasing FE.KEYID = 1
1,242,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,417 UART: [ldev] --
1,281,830 UART: [fwproc] Wait for Commands...
1,282,510 UART: [fwproc] Recv command 0x46574c44
1,283,238 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,664 UART: ROM Fatal Error: 0x000B000C
1,321,823 >>> mbox cmd response: failed
1,321,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,829 >>> mbox cmd response: failed
1,321,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
893,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,193 UART: [kat] ++
897,345 UART: [kat] sha1
901,609 UART: [kat] SHA2-256
903,549 UART: [kat] SHA2-384
906,140 UART: [kat] SHA2-512-ACC
908,041 UART: [kat] ECC-384
917,640 UART: [kat] HMAC-384Kdf
922,054 UART: [kat] LMS
1,170,382 UART: [kat] --
1,171,357 UART: [cold-reset] ++
1,171,835 UART: [fht] FHT @ 0x50003400
1,174,432 UART: [idev] ++
1,174,600 UART: [idev] CDI.KEYID = 6
1,174,960 UART: [idev] SUBJECT.KEYID = 7
1,175,384 UART: [idev] UDS.KEYID = 0
1,175,729 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,345 UART: [idev] Sha1 KeyId Algorithm
1,208,847 UART: [idev] --
1,209,969 UART: [ldev] ++
1,210,137 UART: [ldev] CDI.KEYID = 6
1,210,500 UART: [ldev] SUBJECT.KEYID = 5
1,210,926 UART: [ldev] AUTHORITY.KEYID = 7
1,211,389 UART: [ldev] FE.KEYID = 1
1,216,187 UART: [ldev] Erasing FE.KEYID = 1
1,242,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,843 UART: [ldev] --
1,281,340 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x46574c44
1,282,668 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,069 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,317 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,890 >>> mbox cmd response: failed
1,176,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,896 >>> mbox cmd response: failed
1,176,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,902 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,725 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,442 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
893,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,406 UART: [kat] ++
897,558 UART: [kat] sha1
901,674 UART: [kat] SHA2-256
903,614 UART: [kat] SHA2-384
906,375 UART: [kat] SHA2-512-ACC
908,276 UART: [kat] ECC-384
918,037 UART: [kat] HMAC-384Kdf
922,729 UART: [kat] LMS
1,171,057 UART: [kat] --
1,172,180 UART: [cold-reset] ++
1,172,606 UART: [fht] FHT @ 0x50003400
1,175,311 UART: [idev] ++
1,175,479 UART: [idev] CDI.KEYID = 6
1,175,839 UART: [idev] SUBJECT.KEYID = 7
1,176,263 UART: [idev] UDS.KEYID = 0
1,176,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,889 UART: [idev] Erasing UDS.KEYID = 0
1,201,288 UART: [idev] Sha1 KeyId Algorithm
1,209,770 UART: [idev] --
1,210,946 UART: [ldev] ++
1,211,114 UART: [ldev] CDI.KEYID = 6
1,211,477 UART: [ldev] SUBJECT.KEYID = 5
1,211,903 UART: [ldev] AUTHORITY.KEYID = 7
1,212,366 UART: [ldev] FE.KEYID = 1
1,217,744 UART: [ldev] Erasing FE.KEYID = 1
1,243,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,866 UART: [ldev] --
1,283,325 UART: [fwproc] Wait for Commands...
1,283,963 UART: [fwproc] Recv command 0x46574c44
1,284,691 UART: [fwproc] Recv'd Img size: 114448 bytes
1,322,367 UART: ROM Fatal Error: 0x000B000C
1,323,526 >>> mbox cmd response: failed
1,323,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,532 >>> mbox cmd response: failed
1,323,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,538 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
893,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,758 UART: [kat] ++
897,910 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,809 UART: [kat] SHA2-512-ACC
908,710 UART: [kat] ECC-384
918,277 UART: [kat] HMAC-384Kdf
922,991 UART: [kat] LMS
1,171,319 UART: [kat] --
1,172,224 UART: [cold-reset] ++
1,172,736 UART: [fht] FHT @ 0x50003400
1,175,377 UART: [idev] ++
1,175,545 UART: [idev] CDI.KEYID = 6
1,175,905 UART: [idev] SUBJECT.KEYID = 7
1,176,329 UART: [idev] UDS.KEYID = 0
1,176,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,639 UART: [idev] Erasing UDS.KEYID = 0
1,201,752 UART: [idev] Sha1 KeyId Algorithm
1,210,416 UART: [idev] --
1,211,568 UART: [ldev] ++
1,211,736 UART: [ldev] CDI.KEYID = 6
1,212,099 UART: [ldev] SUBJECT.KEYID = 5
1,212,525 UART: [ldev] AUTHORITY.KEYID = 7
1,212,988 UART: [ldev] FE.KEYID = 1
1,218,318 UART: [ldev] Erasing FE.KEYID = 1
1,244,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,780 UART: [ldev] --
1,284,205 UART: [fwproc] Wait for Commands...
1,284,985 UART: [fwproc] Recv command 0x46574c44
1,285,713 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,944 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,347 >>> mbox cmd response: failed
1,178,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,353 >>> mbox cmd response: failed
1,178,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,359 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,099 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,548 UART: [kat] SHA2-512-ACC
906,449 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,439 UART: [fht] FHT @ 0x50003400
1,173,049 UART: [idev] ++
1,173,217 UART: [idev] CDI.KEYID = 6
1,173,578 UART: [idev] SUBJECT.KEYID = 7
1,174,003 UART: [idev] UDS.KEYID = 0
1,174,349 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,127 UART: [idev] Erasing UDS.KEYID = 0
1,199,901 UART: [idev] Sha1 KeyId Algorithm
1,208,835 UART: [idev] --
1,209,928 UART: [ldev] ++
1,210,096 UART: [ldev] CDI.KEYID = 6
1,210,460 UART: [ldev] SUBJECT.KEYID = 5
1,210,887 UART: [ldev] AUTHORITY.KEYID = 7
1,211,350 UART: [ldev] FE.KEYID = 1
1,216,448 UART: [ldev] Erasing FE.KEYID = 1
1,243,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,994 UART: [ldev] --
1,282,282 UART: [fwproc] Wait for Commands...
1,282,889 UART: [fwproc] Recv command 0x46574c44
1,283,622 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,034 UART: ROM Fatal Error: 0x000B000C
1,322,193 >>> mbox cmd response: failed
1,322,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,199 >>> mbox cmd response: failed
1,322,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,205 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,412 UART: [kat] HMAC-384Kdf
920,044 UART: [kat] LMS
1,168,356 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,170,111 UART: [fht] FHT @ 0x50003400
1,172,829 UART: [idev] ++
1,172,997 UART: [idev] CDI.KEYID = 6
1,173,358 UART: [idev] SUBJECT.KEYID = 7
1,173,783 UART: [idev] UDS.KEYID = 0
1,174,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,509 UART: [idev] Erasing UDS.KEYID = 0
1,198,023 UART: [idev] Sha1 KeyId Algorithm
1,206,793 UART: [idev] --
1,207,742 UART: [ldev] ++
1,207,910 UART: [ldev] CDI.KEYID = 6
1,208,274 UART: [ldev] SUBJECT.KEYID = 5
1,208,701 UART: [ldev] AUTHORITY.KEYID = 7
1,209,164 UART: [ldev] FE.KEYID = 1
1,214,292 UART: [ldev] Erasing FE.KEYID = 1
1,240,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,288 UART: [ldev] --
1,279,806 UART: [fwproc] Wait for Commands...
1,280,405 UART: [fwproc] Recv command 0x46574c44
1,281,138 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,083 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,770,967 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,994 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,171,286 >>> mbox cmd response: failed
1,171,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,292 >>> mbox cmd response: failed
1,171,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,298 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,235 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,593 UART: [kat] SHA2-256
891,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,272 UART: [kat] ++
895,424 UART: [kat] sha1
899,662 UART: [kat] SHA2-256
901,602 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
915,827 UART: [kat] HMAC-384Kdf
920,495 UART: [kat] LMS
1,168,807 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,160 UART: [fht] FHT @ 0x50003400
1,172,716 UART: [idev] ++
1,172,884 UART: [idev] CDI.KEYID = 6
1,173,245 UART: [idev] SUBJECT.KEYID = 7
1,173,670 UART: [idev] UDS.KEYID = 0
1,174,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,584 UART: [idev] Erasing UDS.KEYID = 0
1,198,980 UART: [idev] Sha1 KeyId Algorithm
1,207,952 UART: [idev] --
1,209,051 UART: [ldev] ++
1,209,219 UART: [ldev] CDI.KEYID = 6
1,209,583 UART: [ldev] SUBJECT.KEYID = 5
1,210,010 UART: [ldev] AUTHORITY.KEYID = 7
1,210,473 UART: [ldev] FE.KEYID = 1
1,215,773 UART: [ldev] Erasing FE.KEYID = 1
1,242,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,561 UART: [ldev] --
1,281,957 UART: [fwproc] Wait for Commands...
1,282,646 UART: [fwproc] Recv command 0x46574c44
1,283,379 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,273 UART: ROM Fatal Error: 0x000B000C
1,321,432 >>> mbox cmd response: failed
1,321,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,438 >>> mbox cmd response: failed
1,321,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
87,026 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,937 UART: [kat] SHA2-512-ACC
906,838 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,320 UART: [cold-reset] ++
1,170,686 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,174,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,978 UART: [idev] Sha1 KeyId Algorithm
1,208,834 UART: [idev] --
1,209,719 UART: [ldev] ++
1,209,887 UART: [ldev] CDI.KEYID = 6
1,210,251 UART: [ldev] SUBJECT.KEYID = 5
1,210,678 UART: [ldev] AUTHORITY.KEYID = 7
1,211,141 UART: [ldev] FE.KEYID = 1
1,216,355 UART: [ldev] Erasing FE.KEYID = 1
1,243,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,851 UART: [ldev] --
1,282,121 UART: [fwproc] Wait for Commands...
1,282,894 UART: [fwproc] Recv command 0x46574c44
1,283,627 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,658 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,163 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,174,393 >>> mbox cmd response: failed
1,174,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,399 >>> mbox cmd response: failed
1,174,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,911 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,022 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,161 UART:
192,523 UART: Running Caliptra ROM ...
193,710 UART:
193,863 UART: [state] CFI Enabled
262,979 UART: [state] LifecycleState = Unprovisioned
264,946 UART: [state] DebugLocked = No
266,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,258 UART: [kat] SHA2-256
439,980 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,478 UART: [kat] ++
450,923 UART: [kat] sha1
462,727 UART: [kat] SHA2-256
465,446 UART: [kat] SHA2-384
471,321 UART: [kat] SHA2-512-ACC
473,721 UART: [kat] ECC-384
2,767,270 UART: [kat] HMAC-384Kdf
2,797,506 UART: [kat] LMS
3,987,844 UART: [kat] --
3,993,096 UART: [cold-reset] ++
3,994,816 UART: [fht] Storing FHT @ 0x50003400
4,007,542 UART: [idev] ++
4,008,167 UART: [idev] CDI.KEYID = 6
4,009,076 UART: [idev] SUBJECT.KEYID = 7
4,010,301 UART: [idev] UDS.KEYID = 0
4,013,231 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,452 UART: [idev] Erasing UDS.KEYID = 0
7,345,080 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,295 UART: [idev] --
7,371,150 UART: [ldev] ++
7,371,727 UART: [ldev] CDI.KEYID = 6
7,372,746 UART: [ldev] SUBJECT.KEYID = 5
7,373,911 UART: [ldev] AUTHORITY.KEYID = 7
7,375,146 UART: [ldev] FE.KEYID = 1
7,420,329 UART: [ldev] Erasing FE.KEYID = 1
10,754,824 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,664 UART: [ldev] --
13,133,957 UART: [fwproc] Waiting for Commands...
13,135,834 UART: [fwproc] Received command 0x46574c44
13,138,025 UART: [fwproc] Received Image of size 114124 bytes
13,235,610 UART: ROM Fatal Error: 0x000B001C
13,239,083 >>> mbox cmd response: failed
13,239,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,239,771 >>> mbox cmd response: failed
13,240,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,240,339 >>> mbox cmd response: failed
Initializing fuses
2,059,513 writing to cptra_bootfsm_go
2,248,858 UART:
2,249,272 UART: Running Caliptra ROM ...
2,250,331 UART:
2,250,490 UART: [state] CFI Enabled
2,316,036 UART: [state] LifecycleState = Unprovisioned
2,317,996 UART: [state] DebugLocked = No
2,320,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,163 UART: [kat] SHA2-256
2,494,913 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,394 UART: [kat] ++
2,505,942 UART: [kat] sha1
2,518,511 UART: [kat] SHA2-256
2,521,207 UART: [kat] SHA2-384
2,527,573 UART: [kat] SHA2-512-ACC
2,529,922 UART: [kat] ECC-384
4,818,934 UART: [kat] HMAC-384Kdf
4,850,469 UART: [kat] LMS
6,040,799 UART: [kat] --
6,045,850 UART: [cold-reset] ++
6,047,737 UART: [fht] Storing FHT @ 0x50003400
6,058,957 UART: [idev] ++
6,059,526 UART: [idev] CDI.KEYID = 6
6,060,439 UART: [idev] SUBJECT.KEYID = 7
6,061,717 UART: [idev] UDS.KEYID = 0
6,064,631 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,208,303 UART: [idev] Erasing UDS.KEYID = 0
9,397,865 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,782 UART: [idev] --
9,422,587 UART: [ldev] ++
9,423,159 UART: [ldev] CDI.KEYID = 6
9,424,125 UART: [ldev] SUBJECT.KEYID = 5
9,425,324 UART: [ldev] AUTHORITY.KEYID = 7
9,426,588 UART: [ldev] FE.KEYID = 1
9,473,110 UART: [ldev] Erasing FE.KEYID = 1
12,805,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,099,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,114,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,128,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,143,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,858 UART: [ldev] --
15,167,987 UART: [fwproc] Waiting for Commands...
15,170,569 UART: [fwproc] Received command 0x46574c44
15,172,757 UART: [fwproc] Received Image of size 114124 bytes
19,221,388 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,300,187 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,369,066 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,686,076 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,809,248 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,993,366 >>> mbox cmd response: failed
12,993,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,994,321 >>> mbox cmd response: failed
12,994,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,994,930 >>> mbox cmd response: failed
Initializing fuses
2,055,442 writing to cptra_bootfsm_go
5,847,481 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,911,272 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,413 UART:
192,797 UART: Running Caliptra ROM ...
193,893 UART:
603,727 UART: [state] CFI Enabled
619,346 UART: [state] LifecycleState = Unprovisioned
621,282 UART: [state] DebugLocked = No
622,984 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,593 UART: [kat] SHA2-256
797,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,847 UART: [kat] ++
808,361 UART: [kat] sha1
819,454 UART: [kat] SHA2-256
822,138 UART: [kat] SHA2-384
829,198 UART: [kat] SHA2-512-ACC
831,577 UART: [kat] ECC-384
3,114,664 UART: [kat] HMAC-384Kdf
3,125,445 UART: [kat] LMS
4,315,548 UART: [kat] --
4,322,047 UART: [cold-reset] ++
4,323,889 UART: [fht] Storing FHT @ 0x50003400
4,335,324 UART: [idev] ++
4,335,892 UART: [idev] CDI.KEYID = 6
4,336,860 UART: [idev] SUBJECT.KEYID = 7
4,338,076 UART: [idev] UDS.KEYID = 0
4,340,737 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,484,225 UART: [idev] Erasing UDS.KEYID = 0
7,625,831 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,777 UART: [idev] --
7,652,212 UART: [ldev] ++
7,652,789 UART: [ldev] CDI.KEYID = 6
7,653,726 UART: [ldev] SUBJECT.KEYID = 5
7,654,945 UART: [ldev] AUTHORITY.KEYID = 7
7,656,235 UART: [ldev] FE.KEYID = 1
7,666,929 UART: [ldev] Erasing FE.KEYID = 1
10,953,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,976 UART: [ldev] --
13,313,604 UART: [fwproc] Waiting for Commands...
13,316,367 UART: [fwproc] Received command 0x46574c44
13,318,556 UART: [fwproc] Received Image of size 114124 bytes
13,420,076 UART: ROM Fatal Error: 0x000B001C
13,423,550 >>> mbox cmd response: failed
13,423,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,424,204 >>> mbox cmd response: failed
13,424,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,424,763 >>> mbox cmd response: failed
Initializing fuses
2,052,628 writing to cptra_bootfsm_go
2,241,941 UART:
2,242,293 UART: Running Caliptra ROM ...
2,243,342 UART:
7,043,449 UART: [state] CFI Enabled
7,060,852 UART: [state] LifecycleState = Unprovisioned
7,062,779 UART: [state] DebugLocked = No
7,065,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,069,911 UART: [kat] SHA2-256
7,239,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,250,192 UART: [kat] ++
7,250,654 UART: [kat] sha1
7,261,728 UART: [kat] SHA2-256
7,264,422 UART: [kat] SHA2-384
7,268,898 UART: [kat] SHA2-512-ACC
7,271,249 UART: [kat] ECC-384
9,554,011 UART: [kat] HMAC-384Kdf
9,565,538 UART: [kat] LMS
10,755,661 UART: [kat] --
10,760,027 UART: [cold-reset] ++
10,761,740 UART: [fht] Storing FHT @ 0x50003400
10,773,204 UART: [idev] ++
10,773,780 UART: [idev] CDI.KEYID = 6
10,774,660 UART: [idev] SUBJECT.KEYID = 7
10,775,924 UART: [idev] UDS.KEYID = 0
10,778,551 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,922,009 UART: [idev] Erasing UDS.KEYID = 0
14,063,654 UART: [idev] Using Sha1 for KeyId Algorithm
14,086,020 UART: [idev] --
14,089,584 UART: [ldev] ++
14,090,213 UART: [ldev] CDI.KEYID = 6
14,091,125 UART: [ldev] SUBJECT.KEYID = 5
14,092,387 UART: [ldev] AUTHORITY.KEYID = 7
14,093,626 UART: [ldev] FE.KEYID = 1
14,104,331 UART: [ldev] Erasing FE.KEYID = 1
17,392,917 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,686,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,700,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,715,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,730,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,748,639 UART: [ldev] --
19,753,850 UART: [fwproc] Waiting for Commands...
19,757,239 UART: [fwproc] Received command 0x46574c44
19,759,483 UART: [fwproc] Received Image of size 114124 bytes
23,812,634 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,886,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,955,578 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,272,256 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
4,132,101 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,155,149 >>> mbox cmd response: failed
13,155,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,156,226 >>> mbox cmd response: failed
13,156,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,156,735 >>> mbox cmd response: failed
Initializing fuses
2,049,536 writing to cptra_bootfsm_go
10,827,628 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,779,320 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,218 UART:
192,607 UART: Running Caliptra ROM ...
193,705 UART:
193,848 UART: [state] CFI Enabled
266,927 UART: [state] LifecycleState = Unprovisioned
268,796 UART: [state] DebugLocked = No
271,655 UART: [state] WD Timer not started. Device not locked for debugging
275,594 UART: [kat] SHA2-256
454,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,263 UART: [kat] ++
466,811 UART: [kat] sha1
478,126 UART: [kat] SHA2-256
481,183 UART: [kat] SHA2-384
486,130 UART: [kat] SHA2-512-ACC
489,066 UART: [kat] ECC-384
2,949,497 UART: [kat] HMAC-384Kdf
2,972,201 UART: [kat] LMS
3,501,690 UART: [kat] --
3,505,354 UART: [cold-reset] ++
3,507,606 UART: [fht] FHT @ 0x50003400
3,519,176 UART: [idev] ++
3,519,741 UART: [idev] CDI.KEYID = 6
3,520,652 UART: [idev] SUBJECT.KEYID = 7
3,521,869 UART: [idev] UDS.KEYID = 0
3,524,815 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,985 UART: [idev] Erasing UDS.KEYID = 0
6,026,014 UART: [idev] Sha1 KeyId Algorithm
6,049,819 UART: [idev] --
6,053,873 UART: [ldev] ++
6,054,444 UART: [ldev] CDI.KEYID = 6
6,055,332 UART: [ldev] SUBJECT.KEYID = 5
6,056,543 UART: [ldev] AUTHORITY.KEYID = 7
6,057,781 UART: [ldev] FE.KEYID = 1
6,102,809 UART: [ldev] Erasing FE.KEYID = 1
8,602,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,066 UART: [ldev] --
10,393,465 UART: [fwproc] Wait for Commands...
10,394,968 UART: [fwproc] Recv command 0x46574c44
10,397,084 UART: [fwproc] Recv'd Img size: 114448 bytes
10,494,961 UART: ROM Fatal Error: 0x000B001C
10,498,019 >>> mbox cmd response: failed
10,498,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,498,801 >>> mbox cmd response: failed
10,499,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,479 >>> mbox cmd response: failed
Initializing fuses
2,059,090 writing to cptra_bootfsm_go
2,248,426 UART:
2,248,768 UART: Running Caliptra ROM ...
2,249,903 UART:
2,250,068 UART: [state] CFI Enabled
2,313,143 UART: [state] LifecycleState = Unprovisioned
2,315,039 UART: [state] DebugLocked = No
2,316,926 UART: [state] WD Timer not started. Device not locked for debugging
2,319,916 UART: [kat] SHA2-256
2,499,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,607 UART: [kat] ++
2,511,069 UART: [kat] sha1
2,522,657 UART: [kat] SHA2-256
2,525,669 UART: [kat] SHA2-384
2,531,330 UART: [kat] SHA2-512-ACC
2,534,327 UART: [kat] ECC-384
4,996,514 UART: [kat] HMAC-384Kdf
5,017,990 UART: [kat] LMS
5,547,466 UART: [kat] --
5,553,184 UART: [cold-reset] ++
5,554,739 UART: [fht] FHT @ 0x50003400
5,565,516 UART: [idev] ++
5,566,091 UART: [idev] CDI.KEYID = 6
5,567,005 UART: [idev] SUBJECT.KEYID = 7
5,568,225 UART: [idev] UDS.KEYID = 0
5,570,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,714,829 UART: [idev] Erasing UDS.KEYID = 0
8,071,851 UART: [idev] Sha1 KeyId Algorithm
8,094,946 UART: [idev] --
8,099,379 UART: [ldev] ++
8,099,948 UART: [ldev] CDI.KEYID = 6
8,100,835 UART: [ldev] SUBJECT.KEYID = 5
8,102,046 UART: [ldev] AUTHORITY.KEYID = 7
8,103,282 UART: [ldev] FE.KEYID = 1
8,146,846 UART: [ldev] Erasing FE.KEYID = 1
10,650,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,198 UART: [ldev] --
12,457,757 UART: [fwproc] Wait for Commands...
12,459,798 UART: [fwproc] Recv command 0x46574c44
12,461,891 UART: [fwproc] Recv'd Img size: 114448 bytes
15,864,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,321,758 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,363,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,301,274 >>> mbox cmd response: failed
10,301,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,302,245 >>> mbox cmd response: failed
10,302,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,302,802 >>> mbox cmd response: failed
Initializing fuses
2,056,306 writing to cptra_bootfsm_go
5,411,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,098,328 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,557 UART:
192,921 UART: Running Caliptra ROM ...
194,015 UART:
603,774 UART: [state] CFI Enabled
617,075 UART: [state] LifecycleState = Unprovisioned
618,969 UART: [state] DebugLocked = No
620,937 UART: [state] WD Timer not started. Device not locked for debugging
624,162 UART: [kat] SHA2-256
803,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,819 UART: [kat] ++
815,348 UART: [kat] sha1
826,448 UART: [kat] SHA2-256
829,501 UART: [kat] SHA2-384
835,689 UART: [kat] SHA2-512-ACC
838,675 UART: [kat] ECC-384
3,278,926 UART: [kat] HMAC-384Kdf
3,293,018 UART: [kat] LMS
3,822,490 UART: [kat] --
3,825,567 UART: [cold-reset] ++
3,828,036 UART: [fht] FHT @ 0x50003400
3,839,664 UART: [idev] ++
3,840,265 UART: [idev] CDI.KEYID = 6
3,841,153 UART: [idev] SUBJECT.KEYID = 7
3,842,371 UART: [idev] UDS.KEYID = 0
3,845,325 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,142 UART: [idev] Erasing UDS.KEYID = 0
6,317,086 UART: [idev] Sha1 KeyId Algorithm
6,341,089 UART: [idev] --
6,346,075 UART: [ldev] ++
6,346,646 UART: [ldev] CDI.KEYID = 6
6,347,557 UART: [ldev] SUBJECT.KEYID = 5
6,348,792 UART: [ldev] AUTHORITY.KEYID = 7
6,350,024 UART: [ldev] FE.KEYID = 1
6,360,404 UART: [ldev] Erasing FE.KEYID = 1
8,835,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,223 UART: [ldev] --
10,624,457 UART: [fwproc] Wait for Commands...
10,627,580 UART: [fwproc] Recv command 0x46574c44
10,629,675 UART: [fwproc] Recv'd Img size: 114448 bytes
10,725,826 UART: ROM Fatal Error: 0x000B001C
10,728,971 >>> mbox cmd response: failed
10,729,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,729,707 >>> mbox cmd response: failed
10,729,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,730,286 >>> mbox cmd response: failed
Initializing fuses
2,054,168 writing to cptra_bootfsm_go
2,243,518 UART:
2,243,876 UART: Running Caliptra ROM ...
2,244,925 UART:
9,723,961 UART: [state] CFI Enabled
9,741,144 UART: [state] LifecycleState = Unprovisioned
9,743,010 UART: [state] DebugLocked = No
9,744,267 UART: [state] WD Timer not started. Device not locked for debugging
9,747,890 UART: [kat] SHA2-256
9,927,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,938,586 UART: [kat] ++
9,939,046 UART: [kat] sha1
9,949,885 UART: [kat] SHA2-256
9,952,908 UART: [kat] SHA2-384
9,959,329 UART: [kat] SHA2-512-ACC
9,962,275 UART: [kat] ECC-384
12,405,202 UART: [kat] HMAC-384Kdf
12,417,533 UART: [kat] LMS
12,947,014 UART: [kat] --
12,950,344 UART: [cold-reset] ++
12,951,544 UART: [fht] FHT @ 0x50003400
12,962,320 UART: [idev] ++
12,962,884 UART: [idev] CDI.KEYID = 6
12,963,764 UART: [idev] SUBJECT.KEYID = 7
12,965,030 UART: [idev] UDS.KEYID = 0
12,967,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,111,556 UART: [idev] Erasing UDS.KEYID = 0
15,436,583 UART: [idev] Sha1 KeyId Algorithm
15,460,403 UART: [idev] --
15,464,333 UART: [ldev] ++
15,464,898 UART: [ldev] CDI.KEYID = 6
15,465,778 UART: [ldev] SUBJECT.KEYID = 5
15,466,943 UART: [ldev] AUTHORITY.KEYID = 7
15,468,229 UART: [ldev] FE.KEYID = 1
15,478,250 UART: [ldev] Erasing FE.KEYID = 1
17,955,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,669,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,685,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,701,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,717,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,737,524 UART: [ldev] --
19,741,701 UART: [fwproc] Wait for Commands...
19,743,277 UART: [fwproc] Recv command 0x46574c44
19,745,322 UART: [fwproc] Recv'd Img size: 114448 bytes
23,152,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,223,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,292,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,609,859 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,699,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,501,271 >>> mbox cmd response: failed
10,501,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,502,307 >>> mbox cmd response: failed
10,502,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,502,877 >>> mbox cmd response: failed
Initializing fuses
2,053,621 writing to cptra_bootfsm_go
13,061,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,636,526 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,439,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,345,921 >>> mbox cmd response: failed
10,346,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,346,823 >>> mbox cmd response: failed
10,347,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,347,390 >>> mbox cmd response: failed
Initializing fuses
2,048,862 writing to cptra_bootfsm_go
5,484,668 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,782,251 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,753,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,564,829 >>> mbox cmd response: failed
10,565,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,565,757 >>> mbox cmd response: failed
10,566,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,566,321 >>> mbox cmd response: failed
Initializing fuses
2,049,494 writing to cptra_bootfsm_go
13,054,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,252,927 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,837 UART: [kat] SHA2-256
881,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,883 UART: [kat] ++
886,035 UART: [kat] sha1
890,293 UART: [kat] SHA2-256
892,231 UART: [kat] SHA2-384
895,192 UART: [kat] SHA2-512-ACC
897,093 UART: [kat] ECC-384
902,454 UART: [kat] HMAC-384Kdf
907,048 UART: [kat] LMS
1,475,244 UART: [kat] --
1,476,133 UART: [cold-reset] ++
1,476,525 UART: [fht] Storing FHT @ 0x50003400
1,479,460 UART: [idev] ++
1,479,628 UART: [idev] CDI.KEYID = 6
1,479,988 UART: [idev] SUBJECT.KEYID = 7
1,480,412 UART: [idev] UDS.KEYID = 0
1,480,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,858 UART: [idev] Erasing UDS.KEYID = 0
1,505,072 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,780 UART: [idev] --
1,514,815 UART: [ldev] ++
1,514,983 UART: [ldev] CDI.KEYID = 6
1,515,346 UART: [ldev] SUBJECT.KEYID = 5
1,515,772 UART: [ldev] AUTHORITY.KEYID = 7
1,516,235 UART: [ldev] FE.KEYID = 1
1,521,461 UART: [ldev] Erasing FE.KEYID = 1
1,546,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,710 UART: [ldev] --
1,586,013 UART: [fwproc] Waiting for Commands...
1,586,636 UART: [fwproc] Received command 0x46574c44
1,587,427 UART: [fwproc] Received Image of size 114448 bytes
1,621,853 UART: ROM Fatal Error: 0x000B001C
1,623,012 >>> mbox cmd response: failed
1,623,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,018 >>> mbox cmd response: failed
1,623,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,091 UART: [kat] SHA2-256
882,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,137 UART: [kat] ++
886,289 UART: [kat] sha1
890,345 UART: [kat] SHA2-256
892,283 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,822 UART: [kat] HMAC-384Kdf
907,360 UART: [kat] LMS
1,475,556 UART: [kat] --
1,476,431 UART: [cold-reset] ++
1,476,985 UART: [fht] Storing FHT @ 0x50003400
1,479,738 UART: [idev] ++
1,479,906 UART: [idev] CDI.KEYID = 6
1,480,266 UART: [idev] SUBJECT.KEYID = 7
1,480,690 UART: [idev] UDS.KEYID = 0
1,481,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,306 UART: [idev] Erasing UDS.KEYID = 0
1,505,566 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,306 UART: [idev] --
1,515,203 UART: [ldev] ++
1,515,371 UART: [ldev] CDI.KEYID = 6
1,515,734 UART: [ldev] SUBJECT.KEYID = 5
1,516,160 UART: [ldev] AUTHORITY.KEYID = 7
1,516,623 UART: [ldev] FE.KEYID = 1
1,522,021 UART: [ldev] Erasing FE.KEYID = 1
1,547,240 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,212 UART: [ldev] --
1,586,621 UART: [fwproc] Waiting for Commands...
1,587,304 UART: [fwproc] Received command 0x46574c44
1,588,095 UART: [fwproc] Received Image of size 114448 bytes
2,888,009 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,667 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,019 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,976 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,476,631 >>> mbox cmd response: failed
1,476,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,637 >>> mbox cmd response: failed
1,476,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,920 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,096 UART: [kat] SHA2-256
882,027 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,142 UART: [kat] ++
886,294 UART: [kat] sha1
890,588 UART: [kat] SHA2-256
892,526 UART: [kat] SHA2-384
895,307 UART: [kat] SHA2-512-ACC
897,208 UART: [kat] ECC-384
902,783 UART: [kat] HMAC-384Kdf
907,471 UART: [kat] LMS
1,475,667 UART: [kat] --
1,476,490 UART: [cold-reset] ++
1,476,996 UART: [fht] Storing FHT @ 0x50003400
1,479,807 UART: [idev] ++
1,479,975 UART: [idev] CDI.KEYID = 6
1,480,335 UART: [idev] SUBJECT.KEYID = 7
1,480,759 UART: [idev] UDS.KEYID = 0
1,481,104 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,895 UART: [idev] Erasing UDS.KEYID = 0
1,505,735 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,361 UART: [idev] --
1,515,244 UART: [ldev] ++
1,515,412 UART: [ldev] CDI.KEYID = 6
1,515,775 UART: [ldev] SUBJECT.KEYID = 5
1,516,201 UART: [ldev] AUTHORITY.KEYID = 7
1,516,664 UART: [ldev] FE.KEYID = 1
1,522,048 UART: [ldev] Erasing FE.KEYID = 1
1,547,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,565 UART: [ldev] --
1,585,966 UART: [fwproc] Waiting for Commands...
1,586,779 UART: [fwproc] Received command 0x46574c44
1,587,570 UART: [fwproc] Received Image of size 114448 bytes
1,622,948 UART: ROM Fatal Error: 0x000B001C
1,624,107 >>> mbox cmd response: failed
1,624,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,113 >>> mbox cmd response: failed
1,624,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,396 UART: [kat] SHA2-256
882,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,442 UART: [kat] ++
886,594 UART: [kat] sha1
890,838 UART: [kat] SHA2-256
892,776 UART: [kat] SHA2-384
895,639 UART: [kat] SHA2-512-ACC
897,540 UART: [kat] ECC-384
903,083 UART: [kat] HMAC-384Kdf
907,641 UART: [kat] LMS
1,475,837 UART: [kat] --
1,476,504 UART: [cold-reset] ++
1,476,974 UART: [fht] Storing FHT @ 0x50003400
1,479,831 UART: [idev] ++
1,479,999 UART: [idev] CDI.KEYID = 6
1,480,359 UART: [idev] SUBJECT.KEYID = 7
1,480,783 UART: [idev] UDS.KEYID = 0
1,481,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,933 UART: [idev] Erasing UDS.KEYID = 0
1,505,799 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,241 UART: [idev] --
1,515,208 UART: [ldev] ++
1,515,376 UART: [ldev] CDI.KEYID = 6
1,515,739 UART: [ldev] SUBJECT.KEYID = 5
1,516,165 UART: [ldev] AUTHORITY.KEYID = 7
1,516,628 UART: [ldev] FE.KEYID = 1
1,521,678 UART: [ldev] Erasing FE.KEYID = 1
1,547,305 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,965 UART: [ldev] --
1,586,378 UART: [fwproc] Waiting for Commands...
1,587,231 UART: [fwproc] Received command 0x46574c44
1,588,022 UART: [fwproc] Received Image of size 114448 bytes
2,886,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,628 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,091 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,476,584 >>> mbox cmd response: failed
1,476,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,590 >>> mbox cmd response: failed
1,476,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,595 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
901,685 UART: [kat] SHA2-256
903,625 UART: [kat] SHA2-384
906,522 UART: [kat] SHA2-512-ACC
908,423 UART: [kat] ECC-384
918,382 UART: [kat] HMAC-384Kdf
922,878 UART: [kat] LMS
1,171,206 UART: [kat] --
1,171,977 UART: [cold-reset] ++
1,172,429 UART: [fht] FHT @ 0x50003400
1,175,114 UART: [idev] ++
1,175,282 UART: [idev] CDI.KEYID = 6
1,175,642 UART: [idev] SUBJECT.KEYID = 7
1,176,066 UART: [idev] UDS.KEYID = 0
1,176,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,068 UART: [idev] Erasing UDS.KEYID = 0
1,200,721 UART: [idev] Sha1 KeyId Algorithm
1,209,237 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,006 UART: [ldev] SUBJECT.KEYID = 5
1,211,432 UART: [ldev] AUTHORITY.KEYID = 7
1,211,895 UART: [ldev] FE.KEYID = 1
1,217,197 UART: [ldev] Erasing FE.KEYID = 1
1,244,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,019 UART: [ldev] --
1,283,322 UART: [fwproc] Wait for Commands...
1,283,950 UART: [fwproc] Recv command 0x46574c44
1,284,678 UART: [fwproc] Recv'd Img size: 114448 bytes
1,319,424 UART: ROM Fatal Error: 0x000B001C
1,320,583 >>> mbox cmd response: failed
1,320,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,589 >>> mbox cmd response: failed
1,320,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,595 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,698 UART: [state] LifecycleState = Unprovisioned
85,353 UART: [state] DebugLocked = No
86,013 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
892,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,091 UART: [kat] ++
897,243 UART: [kat] sha1
901,605 UART: [kat] SHA2-256
903,545 UART: [kat] SHA2-384
906,264 UART: [kat] SHA2-512-ACC
908,165 UART: [kat] ECC-384
917,948 UART: [kat] HMAC-384Kdf
922,364 UART: [kat] LMS
1,170,692 UART: [kat] --
1,171,577 UART: [cold-reset] ++
1,172,081 UART: [fht] FHT @ 0x50003400
1,174,676 UART: [idev] ++
1,174,844 UART: [idev] CDI.KEYID = 6
1,175,204 UART: [idev] SUBJECT.KEYID = 7
1,175,628 UART: [idev] UDS.KEYID = 0
1,175,973 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,504 UART: [idev] Erasing UDS.KEYID = 0
1,200,785 UART: [idev] Sha1 KeyId Algorithm
1,209,333 UART: [idev] --
1,210,455 UART: [ldev] ++
1,210,623 UART: [ldev] CDI.KEYID = 6
1,210,986 UART: [ldev] SUBJECT.KEYID = 5
1,211,412 UART: [ldev] AUTHORITY.KEYID = 7
1,211,875 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,911 UART: [ldev] --
1,282,242 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,562 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,201 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,688 >>> mbox cmd response: failed
1,176,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,694 >>> mbox cmd response: failed
1,176,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,466 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
893,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,854 UART: [kat] ++
898,006 UART: [kat] sha1
902,254 UART: [kat] SHA2-256
904,194 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,629 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,754 UART: [cold-reset] ++
1,173,186 UART: [fht] FHT @ 0x50003400
1,175,681 UART: [idev] ++
1,175,849 UART: [idev] CDI.KEYID = 6
1,176,209 UART: [idev] SUBJECT.KEYID = 7
1,176,633 UART: [idev] UDS.KEYID = 0
1,176,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,775 UART: [idev] Erasing UDS.KEYID = 0
1,201,958 UART: [idev] Sha1 KeyId Algorithm
1,210,366 UART: [idev] --
1,211,338 UART: [ldev] ++
1,211,506 UART: [ldev] CDI.KEYID = 6
1,211,869 UART: [ldev] SUBJECT.KEYID = 5
1,212,295 UART: [ldev] AUTHORITY.KEYID = 7
1,212,758 UART: [ldev] FE.KEYID = 1
1,218,114 UART: [ldev] Erasing FE.KEYID = 1
1,244,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,450 UART: [ldev] --
1,283,823 UART: [fwproc] Wait for Commands...
1,284,647 UART: [fwproc] Recv command 0x46574c44
1,285,375 UART: [fwproc] Recv'd Img size: 114448 bytes
1,320,685 UART: ROM Fatal Error: 0x000B001C
1,321,844 >>> mbox cmd response: failed
1,321,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,850 >>> mbox cmd response: failed
1,321,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
893,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,552 UART: [kat] ++
897,704 UART: [kat] sha1
902,086 UART: [kat] SHA2-256
904,026 UART: [kat] SHA2-384
906,769 UART: [kat] SHA2-512-ACC
908,670 UART: [kat] ECC-384
918,787 UART: [kat] HMAC-384Kdf
923,569 UART: [kat] LMS
1,171,897 UART: [kat] --
1,172,932 UART: [cold-reset] ++
1,173,260 UART: [fht] FHT @ 0x50003400
1,175,883 UART: [idev] ++
1,176,051 UART: [idev] CDI.KEYID = 6
1,176,411 UART: [idev] SUBJECT.KEYID = 7
1,176,835 UART: [idev] UDS.KEYID = 0
1,177,180 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,771 UART: [idev] Erasing UDS.KEYID = 0
1,201,632 UART: [idev] Sha1 KeyId Algorithm
1,210,248 UART: [idev] --
1,211,376 UART: [ldev] ++
1,211,544 UART: [ldev] CDI.KEYID = 6
1,211,907 UART: [ldev] SUBJECT.KEYID = 5
1,212,333 UART: [ldev] AUTHORITY.KEYID = 7
1,212,796 UART: [ldev] FE.KEYID = 1
1,218,232 UART: [ldev] Erasing FE.KEYID = 1
1,244,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,052 UART: [ldev] --
1,283,441 UART: [fwproc] Wait for Commands...
1,284,017 UART: [fwproc] Recv command 0x46574c44
1,284,745 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,091 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,180 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,942 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,027 >>> mbox cmd response: failed
1,176,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,033 >>> mbox cmd response: failed
1,176,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,839 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
921,000 UART: [kat] LMS
1,169,312 UART: [kat] --
1,170,457 UART: [cold-reset] ++
1,170,985 UART: [fht] FHT @ 0x50003400
1,173,567 UART: [idev] ++
1,173,735 UART: [idev] CDI.KEYID = 6
1,174,096 UART: [idev] SUBJECT.KEYID = 7
1,174,521 UART: [idev] UDS.KEYID = 0
1,174,867 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,669 UART: [idev] Erasing UDS.KEYID = 0
1,198,937 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,722 UART: [ldev] ++
1,208,890 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,681 UART: [ldev] AUTHORITY.KEYID = 7
1,210,144 UART: [ldev] FE.KEYID = 1
1,215,478 UART: [ldev] Erasing FE.KEYID = 1
1,242,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,082 UART: [ldev] --
1,281,392 UART: [fwproc] Wait for Commands...
1,282,153 UART: [fwproc] Recv command 0x46574c44
1,282,886 UART: [fwproc] Recv'd Img size: 114448 bytes
1,317,234 UART: ROM Fatal Error: 0x000B001C
1,318,393 >>> mbox cmd response: failed
1,318,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,399 >>> mbox cmd response: failed
1,318,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,028 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,861 UART: [idev] ++
1,173,029 UART: [idev] CDI.KEYID = 6
1,173,390 UART: [idev] SUBJECT.KEYID = 7
1,173,815 UART: [idev] UDS.KEYID = 0
1,174,161 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,011 UART: [idev] Erasing UDS.KEYID = 0
1,199,047 UART: [idev] Sha1 KeyId Algorithm
1,207,945 UART: [idev] --
1,209,024 UART: [ldev] ++
1,209,192 UART: [ldev] CDI.KEYID = 6
1,209,556 UART: [ldev] SUBJECT.KEYID = 5
1,209,983 UART: [ldev] AUTHORITY.KEYID = 7
1,210,446 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,241,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,476 UART: [fwproc] Wait for Commands...
1,281,103 UART: [fwproc] Recv command 0x46574c44
1,281,836 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,993 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,171,008 >>> mbox cmd response: failed
1,171,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,014 >>> mbox cmd response: failed
1,171,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,405 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,575 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,722 UART: [idev] ++
1,173,890 UART: [idev] CDI.KEYID = 6
1,174,251 UART: [idev] SUBJECT.KEYID = 7
1,174,676 UART: [idev] UDS.KEYID = 0
1,175,022 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,604 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,505 UART: [ldev] ++
1,209,673 UART: [ldev] CDI.KEYID = 6
1,210,037 UART: [ldev] SUBJECT.KEYID = 5
1,210,464 UART: [ldev] AUTHORITY.KEYID = 7
1,210,927 UART: [ldev] FE.KEYID = 1
1,216,277 UART: [ldev] Erasing FE.KEYID = 1
1,242,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,999 UART: [ldev] --
1,282,381 UART: [fwproc] Wait for Commands...
1,282,984 UART: [fwproc] Recv command 0x46574c44
1,283,717 UART: [fwproc] Recv'd Img size: 114448 bytes
1,318,001 UART: ROM Fatal Error: 0x000B001C
1,319,160 >>> mbox cmd response: failed
1,319,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,166 >>> mbox cmd response: failed
1,319,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
891,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,212 UART: [kat] ++
895,364 UART: [kat] sha1
899,572 UART: [kat] SHA2-256
901,512 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,643 UART: [kat] LMS
1,168,955 UART: [kat] --
1,169,700 UART: [cold-reset] ++
1,170,198 UART: [fht] FHT @ 0x50003400
1,172,734 UART: [idev] ++
1,172,902 UART: [idev] CDI.KEYID = 6
1,173,263 UART: [idev] SUBJECT.KEYID = 7
1,173,688 UART: [idev] UDS.KEYID = 0
1,174,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,854 UART: [idev] Erasing UDS.KEYID = 0
1,198,960 UART: [idev] Sha1 KeyId Algorithm
1,207,840 UART: [idev] --
1,208,935 UART: [ldev] ++
1,209,103 UART: [ldev] CDI.KEYID = 6
1,209,467 UART: [ldev] SUBJECT.KEYID = 5
1,209,894 UART: [ldev] AUTHORITY.KEYID = 7
1,210,357 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,241,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,947 UART: [ldev] --
1,281,307 UART: [fwproc] Wait for Commands...
1,281,998 UART: [fwproc] Recv command 0x46574c44
1,282,731 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,539 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,804 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,172,355 >>> mbox cmd response: failed
1,172,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,361 >>> mbox cmd response: failed
1,172,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,334 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
4,877,115 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,037,056 >>> mbox cmd response: failed
14,037,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,038,177 >>> mbox cmd response: failed
14,038,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,038,752 >>> mbox cmd response: failed
Initializing fuses
2,057,321 writing to cptra_bootfsm_go
6,923,916 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,485,558 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
4,879,539 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,037,559 >>> mbox cmd response: failed
14,038,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,038,476 >>> mbox cmd response: failed
14,038,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,039,041 >>> mbox cmd response: failed
Initializing fuses
2,061,489 writing to cptra_bootfsm_go
6,919,674 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,508,447 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
5,186,557 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,204,545 >>> mbox cmd response: failed
14,205,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,205,541 >>> mbox cmd response: failed
14,205,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,206,106 >>> mbox cmd response: failed
Initializing fuses
2,062,894 writing to cptra_bootfsm_go
10,837,999 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,267,933 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
5,187,152 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,205,345 >>> mbox cmd response: failed
14,205,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,206,272 >>> mbox cmd response: failed
14,206,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,206,842 >>> mbox cmd response: failed
Initializing fuses
2,062,021 writing to cptra_bootfsm_go
10,849,159 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,285,415 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,438,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,395,688 >>> mbox cmd response: failed
10,396,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,396,606 >>> mbox cmd response: failed
10,396,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,397,170 >>> mbox cmd response: failed
Initializing fuses
2,059,679 writing to cptra_bootfsm_go
5,516,420 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,339,143 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,439,111 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,435,762 >>> mbox cmd response: failed
10,436,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,436,684 >>> mbox cmd response: failed
10,436,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,437,262 >>> mbox cmd response: failed
Initializing fuses
2,060,855 writing to cptra_bootfsm_go
5,527,875 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,408,162 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,787,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,687,187 >>> mbox cmd response: failed
10,687,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,688,362 >>> mbox cmd response: failed
10,688,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,688,926 >>> mbox cmd response: failed
Initializing fuses
2,055,068 writing to cptra_bootfsm_go
12,954,261 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,696,537 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,774,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,660,989 >>> mbox cmd response: failed
10,661,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,661,874 >>> mbox cmd response: failed
10,662,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,662,440 >>> mbox cmd response: failed
Initializing fuses
2,067,236 writing to cptra_bootfsm_go
12,991,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,719,037 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,462,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,483,572 >>> mbox cmd response: failed
10,484,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,484,487 >>> mbox cmd response: failed
10,484,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,485,103 >>> mbox cmd response: failed
Initializing fuses
2,056,340 writing to cptra_bootfsm_go
5,478,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,314,899 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,779,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,657,323 >>> mbox cmd response: failed
10,657,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,658,249 >>> mbox cmd response: failed
10,658,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,658,811 >>> mbox cmd response: failed
Initializing fuses
2,055,464 writing to cptra_bootfsm_go
12,997,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,723,052 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,194,945 >>> mbox cmd response: failed
1,194,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,951 >>> mbox cmd response: failed
1,194,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,943 UART: [kat] SHA2-256
881,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,989 UART: [kat] ++
886,141 UART: [kat] sha1
890,383 UART: [kat] SHA2-256
892,321 UART: [kat] SHA2-384
895,104 UART: [kat] SHA2-512-ACC
897,005 UART: [kat] ECC-384
902,672 UART: [kat] HMAC-384Kdf
907,332 UART: [kat] LMS
1,475,528 UART: [kat] --
1,476,465 UART: [cold-reset] ++
1,476,919 UART: [fht] Storing FHT @ 0x50003400
1,479,538 UART: [idev] ++
1,479,706 UART: [idev] CDI.KEYID = 6
1,480,066 UART: [idev] SUBJECT.KEYID = 7
1,480,490 UART: [idev] UDS.KEYID = 0
1,480,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,424 UART: [idev] Erasing UDS.KEYID = 0
1,504,780 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,518 UART: [idev] --
1,514,543 UART: [ldev] ++
1,514,711 UART: [ldev] CDI.KEYID = 6
1,515,074 UART: [ldev] SUBJECT.KEYID = 5
1,515,500 UART: [ldev] AUTHORITY.KEYID = 7
1,515,963 UART: [ldev] FE.KEYID = 1
1,521,429 UART: [ldev] Erasing FE.KEYID = 1
1,546,748 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,078 UART: [ldev] --
1,586,541 UART: [fwproc] Waiting for Commands...
1,587,264 UART: [fwproc] Received command 0x46574c44
1,588,055 UART: [fwproc] Received Image of size 114448 bytes
2,887,483 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,249 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,601 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,752 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,327 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,109 >>> mbox cmd response: failed
1,195,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,115 >>> mbox cmd response: failed
1,195,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,467 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,724 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,012 >>> mbox cmd response: failed
1,196,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,018 >>> mbox cmd response: failed
1,196,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,092 UART: [kat] SHA2-256
882,023 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,138 UART: [kat] ++
886,290 UART: [kat] sha1
890,530 UART: [kat] SHA2-256
892,468 UART: [kat] SHA2-384
895,099 UART: [kat] SHA2-512-ACC
897,000 UART: [kat] ECC-384
902,599 UART: [kat] HMAC-384Kdf
907,343 UART: [kat] LMS
1,475,539 UART: [kat] --
1,476,206 UART: [cold-reset] ++
1,476,722 UART: [fht] Storing FHT @ 0x50003400
1,479,503 UART: [idev] ++
1,479,671 UART: [idev] CDI.KEYID = 6
1,480,031 UART: [idev] SUBJECT.KEYID = 7
1,480,455 UART: [idev] UDS.KEYID = 0
1,480,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,335 UART: [idev] Erasing UDS.KEYID = 0
1,505,733 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,383 UART: [idev] --
1,515,238 UART: [ldev] ++
1,515,406 UART: [ldev] CDI.KEYID = 6
1,515,769 UART: [ldev] SUBJECT.KEYID = 5
1,516,195 UART: [ldev] AUTHORITY.KEYID = 7
1,516,658 UART: [ldev] FE.KEYID = 1
1,521,950 UART: [ldev] Erasing FE.KEYID = 1
1,547,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,991 UART: [ldev] --
1,586,460 UART: [fwproc] Waiting for Commands...
1,587,095 UART: [fwproc] Received command 0x46574c44
1,587,886 UART: [fwproc] Received Image of size 114448 bytes
2,885,960 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,304 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,293 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,234 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,296 >>> mbox cmd response: failed
1,196,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,302 >>> mbox cmd response: failed
1,196,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,308 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,747 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,775 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,371 >>> mbox cmd response: failed
1,195,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,377 >>> mbox cmd response: failed
1,195,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
893,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,877 UART: [kat] ++
898,029 UART: [kat] sha1
902,207 UART: [kat] SHA2-256
904,147 UART: [kat] SHA2-384
906,820 UART: [kat] SHA2-512-ACC
908,721 UART: [kat] ECC-384
918,316 UART: [kat] HMAC-384Kdf
922,902 UART: [kat] LMS
1,171,230 UART: [kat] --
1,171,959 UART: [cold-reset] ++
1,172,413 UART: [fht] FHT @ 0x50003400
1,175,106 UART: [idev] ++
1,175,274 UART: [idev] CDI.KEYID = 6
1,175,634 UART: [idev] SUBJECT.KEYID = 7
1,176,058 UART: [idev] UDS.KEYID = 0
1,176,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,914 UART: [idev] Erasing UDS.KEYID = 0
1,200,681 UART: [idev] Sha1 KeyId Algorithm
1,209,079 UART: [idev] --
1,210,075 UART: [ldev] ++
1,210,243 UART: [ldev] CDI.KEYID = 6
1,210,606 UART: [ldev] SUBJECT.KEYID = 5
1,211,032 UART: [ldev] AUTHORITY.KEYID = 7
1,211,495 UART: [ldev] FE.KEYID = 1
1,216,601 UART: [ldev] Erasing FE.KEYID = 1
1,243,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,861 UART: [ldev] --
1,282,176 UART: [fwproc] Wait for Commands...
1,282,970 UART: [fwproc] Recv command 0x46574c44
1,283,698 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,204 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,505 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,605 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,485 >>> mbox cmd response: failed
1,195,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,491 >>> mbox cmd response: failed
1,195,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,654 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,434 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,194,676 >>> mbox cmd response: failed
1,194,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,682 >>> mbox cmd response: failed
1,194,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
893,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,810 UART: [kat] ++
897,962 UART: [kat] sha1
901,992 UART: [kat] SHA2-256
903,932 UART: [kat] SHA2-384
906,529 UART: [kat] SHA2-512-ACC
908,430 UART: [kat] ECC-384
918,159 UART: [kat] HMAC-384Kdf
922,663 UART: [kat] LMS
1,170,991 UART: [kat] --
1,171,770 UART: [cold-reset] ++
1,172,284 UART: [fht] FHT @ 0x50003400
1,175,117 UART: [idev] ++
1,175,285 UART: [idev] CDI.KEYID = 6
1,175,645 UART: [idev] SUBJECT.KEYID = 7
1,176,069 UART: [idev] UDS.KEYID = 0
1,176,414 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,105 UART: [idev] Erasing UDS.KEYID = 0
1,201,376 UART: [idev] Sha1 KeyId Algorithm
1,209,818 UART: [idev] --
1,210,910 UART: [ldev] ++
1,211,078 UART: [ldev] CDI.KEYID = 6
1,211,441 UART: [ldev] SUBJECT.KEYID = 5
1,211,867 UART: [ldev] AUTHORITY.KEYID = 7
1,212,330 UART: [ldev] FE.KEYID = 1
1,217,446 UART: [ldev] Erasing FE.KEYID = 1
1,243,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,822 UART: [ldev] --
1,283,283 UART: [fwproc] Wait for Commands...
1,283,991 UART: [fwproc] Recv command 0x46574c44
1,284,719 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,898 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,680 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,180 >>> mbox cmd response: failed
1,196,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,186 >>> mbox cmd response: failed
1,196,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,192 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,887 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,335 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,195,765 >>> mbox cmd response: failed
1,195,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,771 >>> mbox cmd response: failed
1,195,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,837 UART: [kat] SHA2-256
901,777 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,532 UART: [kat] LMS
1,168,844 UART: [kat] --
1,169,709 UART: [cold-reset] ++
1,170,057 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,174,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,005 UART: [idev] Erasing UDS.KEYID = 0
1,198,431 UART: [idev] Sha1 KeyId Algorithm
1,207,491 UART: [idev] --
1,208,530 UART: [ldev] ++
1,208,698 UART: [ldev] CDI.KEYID = 6
1,209,062 UART: [ldev] SUBJECT.KEYID = 5
1,209,489 UART: [ldev] AUTHORITY.KEYID = 7
1,209,952 UART: [ldev] FE.KEYID = 1
1,214,900 UART: [ldev] Erasing FE.KEYID = 1
1,240,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,716 UART: [ldev] --
1,280,074 UART: [fwproc] Wait for Commands...
1,280,893 UART: [fwproc] Recv command 0x46574c44
1,281,626 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,015 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,193,797 >>> mbox cmd response: failed
1,193,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,803 >>> mbox cmd response: failed
1,193,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,889 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,194,440 >>> mbox cmd response: failed
1,194,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,446 >>> mbox cmd response: failed
1,194,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,719 UART: [kat] LMS
1,169,031 UART: [kat] --
1,169,980 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,174,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,560 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,201 UART: [ldev] ++
1,209,369 UART: [ldev] CDI.KEYID = 6
1,209,733 UART: [ldev] SUBJECT.KEYID = 5
1,210,160 UART: [ldev] AUTHORITY.KEYID = 7
1,210,623 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,241,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,513 UART: [ldev] --
1,280,955 UART: [fwproc] Wait for Commands...
1,281,638 UART: [fwproc] Recv command 0x46574c44
1,282,371 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,024 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,198,140 >>> mbox cmd response: failed
1,198,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,146 >>> mbox cmd response: failed
1,198,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,705 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,694 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,145 UART:
192,528 UART: Running Caliptra ROM ...
193,728 UART:
193,882 UART: [state] CFI Enabled
265,136 UART: [state] LifecycleState = Unprovisioned
267,058 UART: [state] DebugLocked = No
268,635 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,794 UART: [kat] SHA2-256
443,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,983 UART: [kat] ++
454,493 UART: [kat] sha1
463,965 UART: [kat] SHA2-256
466,641 UART: [kat] SHA2-384
471,104 UART: [kat] SHA2-512-ACC
473,437 UART: [kat] ECC-384
2,770,804 UART: [kat] HMAC-384Kdf
2,800,408 UART: [kat] LMS
3,990,704 UART: [kat] --
3,995,949 UART: [cold-reset] ++
3,997,024 UART: [fht] Storing FHT @ 0x50003400
4,008,238 UART: [idev] ++
4,008,810 UART: [idev] CDI.KEYID = 6
4,009,726 UART: [idev] SUBJECT.KEYID = 7
4,011,003 UART: [idev] UDS.KEYID = 0
4,013,556 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,321 UART: [idev] Erasing UDS.KEYID = 0
7,348,372 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,554 UART: [idev] --
7,373,877 UART: [ldev] ++
7,374,449 UART: [ldev] CDI.KEYID = 6
7,375,417 UART: [ldev] SUBJECT.KEYID = 5
7,376,684 UART: [ldev] AUTHORITY.KEYID = 7
7,377,880 UART: [ldev] FE.KEYID = 1
7,421,638 UART: [ldev] Erasing FE.KEYID = 1
10,755,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,930 UART: [ldev] --
13,138,312 UART: [fwproc] Waiting for Commands...
13,140,418 UART: [fwproc] Received command 0x46574c44
13,142,621 UART: [fwproc] Received Image of size 114124 bytes
17,064,664 UART: ROM Fatal Error: 0x000B0030
17,068,057 >>> mbox cmd response: failed
17,068,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,068,803 >>> mbox cmd response: failed
17,069,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,069,389 >>> mbox cmd response: failed
Initializing fuses
2,051,906 writing to cptra_bootfsm_go
2,241,205 UART:
2,241,545 UART: Running Caliptra ROM ...
2,242,589 UART:
2,242,744 UART: [state] CFI Enabled
2,310,595 UART: [state] LifecycleState = Unprovisioned
2,312,556 UART: [state] DebugLocked = No
2,314,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,993 UART: [kat] SHA2-256
2,488,667 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,198 UART: [kat] ++
2,499,694 UART: [kat] sha1
2,511,773 UART: [kat] SHA2-256
2,514,471 UART: [kat] SHA2-384
2,521,760 UART: [kat] SHA2-512-ACC
2,524,112 UART: [kat] ECC-384
4,813,325 UART: [kat] HMAC-384Kdf
4,845,921 UART: [kat] LMS
6,036,218 UART: [kat] --
6,041,888 UART: [cold-reset] ++
6,043,550 UART: [fht] Storing FHT @ 0x50003400
6,054,930 UART: [idev] ++
6,055,559 UART: [idev] CDI.KEYID = 6
6,056,491 UART: [idev] SUBJECT.KEYID = 7
6,057,713 UART: [idev] UDS.KEYID = 0
6,060,041 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,203,701 UART: [idev] Erasing UDS.KEYID = 0
9,393,412 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,068 UART: [idev] --
9,419,667 UART: [ldev] ++
9,420,243 UART: [ldev] CDI.KEYID = 6
9,421,265 UART: [ldev] SUBJECT.KEYID = 5
9,422,473 UART: [ldev] AUTHORITY.KEYID = 7
9,423,655 UART: [ldev] FE.KEYID = 1
9,469,889 UART: [ldev] Erasing FE.KEYID = 1
12,805,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,115,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,130,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,145,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,159,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,177,362 UART: [ldev] --
15,181,814 UART: [fwproc] Waiting for Commands...
15,185,103 UART: [fwproc] Received command 0x46574c44
15,187,354 UART: [fwproc] Received Image of size 114124 bytes
19,234,506 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,319,450 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,388,317 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,705,982 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,806,522 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,535,791 >>> mbox cmd response: failed
16,536,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,536,863 >>> mbox cmd response: failed
16,537,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,537,431 >>> mbox cmd response: failed
Initializing fuses
2,052,171 writing to cptra_bootfsm_go
5,824,975 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,878,486 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,491 UART:
192,848 UART: Running Caliptra ROM ...
193,958 UART:
603,816 UART: [state] CFI Enabled
617,429 UART: [state] LifecycleState = Unprovisioned
619,364 UART: [state] DebugLocked = No
621,089 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,267 UART: [kat] SHA2-256
796,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,559 UART: [kat] ++
807,009 UART: [kat] sha1
818,218 UART: [kat] SHA2-256
820,907 UART: [kat] SHA2-384
826,831 UART: [kat] SHA2-512-ACC
829,172 UART: [kat] ECC-384
3,115,518 UART: [kat] HMAC-384Kdf
3,128,348 UART: [kat] LMS
4,318,457 UART: [kat] --
4,322,746 UART: [cold-reset] ++
4,323,810 UART: [fht] Storing FHT @ 0x50003400
4,334,571 UART: [idev] ++
4,335,148 UART: [idev] CDI.KEYID = 6
4,336,087 UART: [idev] SUBJECT.KEYID = 7
4,337,360 UART: [idev] UDS.KEYID = 0
4,339,915 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,464 UART: [idev] Erasing UDS.KEYID = 0
7,625,149 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,956 UART: [idev] --
7,652,386 UART: [ldev] ++
7,653,015 UART: [ldev] CDI.KEYID = 6
7,653,929 UART: [ldev] SUBJECT.KEYID = 5
7,655,143 UART: [ldev] AUTHORITY.KEYID = 7
7,656,432 UART: [ldev] FE.KEYID = 1
7,667,775 UART: [ldev] Erasing FE.KEYID = 1
10,958,813 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,598 UART: [ldev] --
13,317,630 UART: [fwproc] Waiting for Commands...
13,320,159 UART: [fwproc] Received command 0x46574c44
13,322,346 UART: [fwproc] Received Image of size 114124 bytes
17,168,986 UART: ROM Fatal Error: 0x000B0030
17,172,396 >>> mbox cmd response: failed
17,172,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,173,052 >>> mbox cmd response: failed
17,173,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,173,611 >>> mbox cmd response: failed
Initializing fuses
2,051,841 writing to cptra_bootfsm_go
2,241,119 UART:
2,241,490 UART: Running Caliptra ROM ...
2,242,542 UART:
3,294,662 UART: [state] CFI Enabled
3,306,188 UART: [state] LifecycleState = Unprovisioned
3,308,092 UART: [state] DebugLocked = No
3,309,834 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,315,490 UART: [kat] SHA2-256
3,485,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,495,807 UART: [kat] ++
3,496,263 UART: [kat] sha1
3,507,688 UART: [kat] SHA2-256
3,510,377 UART: [kat] SHA2-384
3,517,709 UART: [kat] SHA2-512-ACC
3,520,119 UART: [kat] ECC-384
5,805,445 UART: [kat] HMAC-384Kdf
5,816,272 UART: [kat] LMS
7,006,354 UART: [kat] --
7,010,968 UART: [cold-reset] ++
7,012,963 UART: [fht] Storing FHT @ 0x50003400
7,025,262 UART: [idev] ++
7,025,837 UART: [idev] CDI.KEYID = 6
7,026,809 UART: [idev] SUBJECT.KEYID = 7
7,028,025 UART: [idev] UDS.KEYID = 0
7,030,254 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
7,173,697 UART: [idev] Erasing UDS.KEYID = 0
10,316,520 UART: [idev] Using Sha1 for KeyId Algorithm
10,338,268 UART: [idev] --
10,342,993 UART: [ldev] ++
10,343,564 UART: [ldev] CDI.KEYID = 6
10,344,499 UART: [ldev] SUBJECT.KEYID = 5
10,345,778 UART: [ldev] AUTHORITY.KEYID = 7
10,346,880 UART: [ldev] FE.KEYID = 1
10,358,363 UART: [ldev] Erasing FE.KEYID = 1
13,641,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,932,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,947,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,962,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,976,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,995,816 UART: [ldev] --
16,000,865 UART: [fwproc] Waiting for Commands...
16,002,806 UART: [fwproc] Received command 0x46574c44
16,004,996 UART: [fwproc] Received Image of size 114124 bytes
20,057,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,128,909 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,197,830 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,515,167 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
4,129,961 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,717,581 >>> mbox cmd response: failed
16,718,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,718,468 >>> mbox cmd response: failed
16,718,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,719,040 >>> mbox cmd response: failed
Initializing fuses
2,058,317 writing to cptra_bootfsm_go
7,278,078 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,240,732 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,114 UART:
192,480 UART: Running Caliptra ROM ...
193,686 UART:
193,836 UART: [state] CFI Enabled
268,831 UART: [state] LifecycleState = Unprovisioned
270,698 UART: [state] DebugLocked = No
273,433 UART: [state] WD Timer not started. Device not locked for debugging
276,482 UART: [kat] SHA2-256
455,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,214 UART: [kat] ++
467,756 UART: [kat] sha1
477,239 UART: [kat] SHA2-256
480,237 UART: [kat] SHA2-384
485,510 UART: [kat] SHA2-512-ACC
488,499 UART: [kat] ECC-384
2,952,687 UART: [kat] HMAC-384Kdf
2,972,428 UART: [kat] LMS
3,501,896 UART: [kat] --
3,508,017 UART: [cold-reset] ++
3,509,146 UART: [fht] FHT @ 0x50003400
3,520,857 UART: [idev] ++
3,521,420 UART: [idev] CDI.KEYID = 6
3,522,305 UART: [idev] SUBJECT.KEYID = 7
3,523,537 UART: [idev] UDS.KEYID = 0
3,526,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,670,454 UART: [idev] Erasing UDS.KEYID = 0
6,029,545 UART: [idev] Sha1 KeyId Algorithm
6,052,070 UART: [idev] --
6,057,351 UART: [ldev] ++
6,057,933 UART: [ldev] CDI.KEYID = 6
6,058,849 UART: [ldev] SUBJECT.KEYID = 5
6,060,012 UART: [ldev] AUTHORITY.KEYID = 7
6,061,247 UART: [ldev] FE.KEYID = 1
6,102,195 UART: [ldev] Erasing FE.KEYID = 1
8,606,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,157 UART: [ldev] --
10,415,642 UART: [fwproc] Wait for Commands...
10,417,307 UART: [fwproc] Recv command 0x46574c44
10,419,404 UART: [fwproc] Recv'd Img size: 114448 bytes
12,063,330 UART: ROM Fatal Error: 0x000B0030
12,066,400 >>> mbox cmd response: failed
12,066,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,067,151 >>> mbox cmd response: failed
12,067,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,067,767 >>> mbox cmd response: failed
Initializing fuses
2,048,548 writing to cptra_bootfsm_go
2,237,877 UART:
2,238,226 UART: Running Caliptra ROM ...
2,239,324 UART:
2,239,486 UART: [state] CFI Enabled
2,298,483 UART: [state] LifecycleState = Unprovisioned
2,300,367 UART: [state] DebugLocked = No
2,302,570 UART: [state] WD Timer not started. Device not locked for debugging
2,305,666 UART: [kat] SHA2-256
2,484,800 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,496,331 UART: [kat] ++
2,496,872 UART: [kat] sha1
2,507,607 UART: [kat] SHA2-256
2,510,679 UART: [kat] SHA2-384
2,516,394 UART: [kat] SHA2-512-ACC
2,519,389 UART: [kat] ECC-384
4,979,668 UART: [kat] HMAC-384Kdf
5,006,077 UART: [kat] LMS
5,535,522 UART: [kat] --
5,539,221 UART: [cold-reset] ++
5,540,508 UART: [fht] FHT @ 0x50003400
5,550,733 UART: [idev] ++
5,551,302 UART: [idev] CDI.KEYID = 6
5,552,267 UART: [idev] SUBJECT.KEYID = 7
5,553,365 UART: [idev] UDS.KEYID = 0
5,555,783 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,699,800 UART: [idev] Erasing UDS.KEYID = 0
8,060,441 UART: [idev] Sha1 KeyId Algorithm
8,083,075 UART: [idev] --
8,086,317 UART: [ldev] ++
8,086,904 UART: [ldev] CDI.KEYID = 6
8,087,818 UART: [ldev] SUBJECT.KEYID = 5
8,089,047 UART: [ldev] AUTHORITY.KEYID = 7
8,090,184 UART: [ldev] FE.KEYID = 1
8,134,910 UART: [ldev] Erasing FE.KEYID = 1
10,640,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,376,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,392,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,408,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,445,160 UART: [ldev] --
12,450,149 UART: [fwproc] Wait for Commands...
12,451,822 UART: [fwproc] Recv command 0x46574c44
12,453,926 UART: [fwproc] Recv'd Img size: 114448 bytes
15,854,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,923,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,992,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,310,325 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,360,916 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,751,949 >>> mbox cmd response: failed
11,752,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,753,068 >>> mbox cmd response: failed
11,753,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,753,638 >>> mbox cmd response: failed
Initializing fuses
2,055,730 writing to cptra_bootfsm_go
5,430,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,095,289 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,596 UART:
192,971 UART: Running Caliptra ROM ...
194,084 UART:
603,845 UART: [state] CFI Enabled
616,293 UART: [state] LifecycleState = Unprovisioned
618,179 UART: [state] DebugLocked = No
620,479 UART: [state] WD Timer not started. Device not locked for debugging
624,842 UART: [kat] SHA2-256
803,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,524 UART: [kat] ++
815,973 UART: [kat] sha1
827,712 UART: [kat] SHA2-256
830,774 UART: [kat] SHA2-384
837,016 UART: [kat] SHA2-512-ACC
839,957 UART: [kat] ECC-384
3,280,844 UART: [kat] HMAC-384Kdf
3,294,831 UART: [kat] LMS
3,824,309 UART: [kat] --
3,828,096 UART: [cold-reset] ++
3,829,488 UART: [fht] FHT @ 0x50003400
3,840,157 UART: [idev] ++
3,840,724 UART: [idev] CDI.KEYID = 6
3,841,606 UART: [idev] SUBJECT.KEYID = 7
3,842,820 UART: [idev] UDS.KEYID = 0
3,845,803 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,774 UART: [idev] Erasing UDS.KEYID = 0
6,315,952 UART: [idev] Sha1 KeyId Algorithm
6,338,656 UART: [idev] --
6,342,214 UART: [ldev] ++
6,342,794 UART: [ldev] CDI.KEYID = 6
6,343,703 UART: [ldev] SUBJECT.KEYID = 5
6,344,867 UART: [ldev] AUTHORITY.KEYID = 7
6,346,101 UART: [ldev] FE.KEYID = 1
6,356,702 UART: [ldev] Erasing FE.KEYID = 1
8,831,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,562 UART: [ldev] --
10,623,042 UART: [fwproc] Wait for Commands...
10,626,280 UART: [fwproc] Recv command 0x46574c44
10,628,324 UART: [fwproc] Recv'd Img size: 114448 bytes
12,272,840 UART: ROM Fatal Error: 0x000B0030
12,275,971 >>> mbox cmd response: failed
12,276,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,276,642 >>> mbox cmd response: failed
12,276,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,277,232 >>> mbox cmd response: failed
Initializing fuses
2,051,346 writing to cptra_bootfsm_go
2,240,699 UART:
2,241,053 UART: Running Caliptra ROM ...
2,242,191 UART:
8,194,253 UART: [state] CFI Enabled
8,205,986 UART: [state] LifecycleState = Unprovisioned
8,207,852 UART: [state] DebugLocked = No
8,210,644 UART: [state] WD Timer not started. Device not locked for debugging
8,214,444 UART: [kat] SHA2-256
8,393,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,405,131 UART: [kat] ++
8,405,679 UART: [kat] sha1
8,415,927 UART: [kat] SHA2-256
8,418,945 UART: [kat] SHA2-384
8,424,284 UART: [kat] SHA2-512-ACC
8,427,224 UART: [kat] ECC-384
10,866,923 UART: [kat] HMAC-384Kdf
10,879,171 UART: [kat] LMS
11,408,653 UART: [kat] --
11,413,235 UART: [cold-reset] ++
11,414,997 UART: [fht] FHT @ 0x50003400
11,427,379 UART: [idev] ++
11,427,943 UART: [idev] CDI.KEYID = 6
11,428,847 UART: [idev] SUBJECT.KEYID = 7
11,430,062 UART: [idev] UDS.KEYID = 0
11,432,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,576,265 UART: [idev] Erasing UDS.KEYID = 0
13,905,512 UART: [idev] Sha1 KeyId Algorithm
13,928,787 UART: [idev] --
13,933,353 UART: [ldev] ++
13,933,930 UART: [ldev] CDI.KEYID = 6
13,934,842 UART: [ldev] SUBJECT.KEYID = 5
13,936,015 UART: [ldev] AUTHORITY.KEYID = 7
13,937,251 UART: [ldev] FE.KEYID = 1
13,946,385 UART: [ldev] Erasing FE.KEYID = 1
16,422,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,141,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,157,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,173,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,189,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,211,185 UART: [ldev] --
18,215,531 UART: [fwproc] Wait for Commands...
18,217,034 UART: [fwproc] Recv command 0x46574c44
18,219,136 UART: [fwproc] Recv'd Img size: 114448 bytes
21,619,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,692,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,761,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,078,902 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,701,369 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,971,433 >>> mbox cmd response: failed
11,971,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,972,313 >>> mbox cmd response: failed
11,972,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,972,870 >>> mbox cmd response: failed
Initializing fuses
2,053,770 writing to cptra_bootfsm_go
11,591,781 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,163,003 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
3,439,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,854,163 >>> mbox cmd response: failed
11,854,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,855,093 >>> mbox cmd response: failed
11,855,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,855,663 >>> mbox cmd response: failed
Initializing fuses
2,056,720 writing to cptra_bootfsm_go
5,496,909 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,773,266 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,503 writing to cptra_bootfsm_go
3,760,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,104,012 >>> mbox cmd response: failed
12,104,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,104,945 >>> mbox cmd response: failed
12,105,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,105,502 >>> mbox cmd response: failed
Initializing fuses
2,059,090 writing to cptra_bootfsm_go
11,521,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,726,944 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,305 UART: [kat] SHA2-256
882,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,351 UART: [kat] ++
886,503 UART: [kat] sha1
890,755 UART: [kat] SHA2-256
892,693 UART: [kat] SHA2-384
895,586 UART: [kat] SHA2-512-ACC
897,487 UART: [kat] ECC-384
903,324 UART: [kat] HMAC-384Kdf
907,872 UART: [kat] LMS
1,476,068 UART: [kat] --
1,476,859 UART: [cold-reset] ++
1,477,339 UART: [fht] Storing FHT @ 0x50003400
1,480,076 UART: [idev] ++
1,480,244 UART: [idev] CDI.KEYID = 6
1,480,604 UART: [idev] SUBJECT.KEYID = 7
1,481,028 UART: [idev] UDS.KEYID = 0
1,481,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,968 UART: [idev] Erasing UDS.KEYID = 0
1,505,450 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,182 UART: [idev] --
1,515,233 UART: [ldev] ++
1,515,401 UART: [ldev] CDI.KEYID = 6
1,515,764 UART: [ldev] SUBJECT.KEYID = 5
1,516,190 UART: [ldev] AUTHORITY.KEYID = 7
1,516,653 UART: [ldev] FE.KEYID = 1
1,521,779 UART: [ldev] Erasing FE.KEYID = 1
1,547,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,658 UART: [ldev] --
1,586,953 UART: [fwproc] Waiting for Commands...
1,587,672 UART: [fwproc] Received command 0x46574c44
1,588,463 UART: [fwproc] Received Image of size 114448 bytes
2,726,386 UART: ROM Fatal Error: 0x000B0030
2,727,543 >>> mbox cmd response: failed
2,727,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,727,549 >>> mbox cmd response: failed
2,727,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,727,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,911 UART: [kat] SHA2-256
881,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,957 UART: [kat] ++
886,109 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,192 UART: [kat] SHA2-512-ACC
897,093 UART: [kat] ECC-384
902,756 UART: [kat] HMAC-384Kdf
907,328 UART: [kat] LMS
1,475,524 UART: [kat] --
1,476,513 UART: [cold-reset] ++
1,476,919 UART: [fht] Storing FHT @ 0x50003400
1,479,906 UART: [idev] ++
1,480,074 UART: [idev] CDI.KEYID = 6
1,480,434 UART: [idev] SUBJECT.KEYID = 7
1,480,858 UART: [idev] UDS.KEYID = 0
1,481,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,802 UART: [idev] Erasing UDS.KEYID = 0
1,505,652 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,286 UART: [idev] --
1,515,249 UART: [ldev] ++
1,515,417 UART: [ldev] CDI.KEYID = 6
1,515,780 UART: [ldev] SUBJECT.KEYID = 5
1,516,206 UART: [ldev] AUTHORITY.KEYID = 7
1,516,669 UART: [ldev] FE.KEYID = 1
1,521,645 UART: [ldev] Erasing FE.KEYID = 1
1,547,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,162 UART: [ldev] --
1,586,627 UART: [fwproc] Waiting for Commands...
1,587,490 UART: [fwproc] Received command 0x46574c44
1,588,281 UART: [fwproc] Received Image of size 114448 bytes
2,887,949 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,631 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,983 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,972 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,652,944 >>> mbox cmd response: failed
2,652,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,950 >>> mbox cmd response: failed
2,652,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,246 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,942 UART: [kat] SHA2-256
881,873 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,988 UART: [kat] ++
886,140 UART: [kat] sha1
890,560 UART: [kat] SHA2-256
892,498 UART: [kat] SHA2-384
895,237 UART: [kat] SHA2-512-ACC
897,138 UART: [kat] ECC-384
902,707 UART: [kat] HMAC-384Kdf
907,349 UART: [kat] LMS
1,475,545 UART: [kat] --
1,476,520 UART: [cold-reset] ++
1,476,936 UART: [fht] Storing FHT @ 0x50003400
1,479,711 UART: [idev] ++
1,479,879 UART: [idev] CDI.KEYID = 6
1,480,239 UART: [idev] SUBJECT.KEYID = 7
1,480,663 UART: [idev] UDS.KEYID = 0
1,481,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,723 UART: [idev] Erasing UDS.KEYID = 0
1,505,529 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,331 UART: [idev] --
1,515,532 UART: [ldev] ++
1,515,700 UART: [ldev] CDI.KEYID = 6
1,516,063 UART: [ldev] SUBJECT.KEYID = 5
1,516,489 UART: [ldev] AUTHORITY.KEYID = 7
1,516,952 UART: [ldev] FE.KEYID = 1
1,522,416 UART: [ldev] Erasing FE.KEYID = 1
1,547,561 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,557 UART: [ldev] --
1,586,950 UART: [fwproc] Waiting for Commands...
1,587,761 UART: [fwproc] Received command 0x46574c44
1,588,552 UART: [fwproc] Received Image of size 114448 bytes
2,765,110 UART: ROM Fatal Error: 0x000B0030
2,766,267 >>> mbox cmd response: failed
2,766,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,766,273 >>> mbox cmd response: failed
2,766,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,766,279 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,845 UART: [state] LifecycleState = Unprovisioned
86,500 UART: [state] DebugLocked = No
87,152 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,868 UART: [kat] SHA2-256
882,799 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,914 UART: [kat] ++
887,066 UART: [kat] sha1
891,434 UART: [kat] SHA2-256
893,372 UART: [kat] SHA2-384
896,031 UART: [kat] SHA2-512-ACC
897,932 UART: [kat] ECC-384
903,631 UART: [kat] HMAC-384Kdf
908,257 UART: [kat] LMS
1,476,453 UART: [kat] --
1,477,138 UART: [cold-reset] ++
1,477,598 UART: [fht] Storing FHT @ 0x50003400
1,480,433 UART: [idev] ++
1,480,601 UART: [idev] CDI.KEYID = 6
1,480,961 UART: [idev] SUBJECT.KEYID = 7
1,481,385 UART: [idev] UDS.KEYID = 0
1,481,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,241 UART: [idev] Erasing UDS.KEYID = 0
1,506,279 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,915 UART: [idev] --
1,516,136 UART: [ldev] ++
1,516,304 UART: [ldev] CDI.KEYID = 6
1,516,667 UART: [ldev] SUBJECT.KEYID = 5
1,517,093 UART: [ldev] AUTHORITY.KEYID = 7
1,517,556 UART: [ldev] FE.KEYID = 1
1,523,000 UART: [ldev] Erasing FE.KEYID = 1
1,548,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,525 UART: [ldev] --
1,587,876 UART: [fwproc] Waiting for Commands...
1,588,553 UART: [fwproc] Received command 0x46574c44
1,589,344 UART: [fwproc] Received Image of size 114448 bytes
2,888,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,620 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,985 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,692,318 >>> mbox cmd response: failed
2,692,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,692,324 >>> mbox cmd response: failed
2,692,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,692,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,470 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,127 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
893,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,547 UART: [kat] ++
897,699 UART: [kat] sha1
901,839 UART: [kat] SHA2-256
903,779 UART: [kat] SHA2-384
906,612 UART: [kat] SHA2-512-ACC
908,513 UART: [kat] ECC-384
918,070 UART: [kat] HMAC-384Kdf
922,628 UART: [kat] LMS
1,170,956 UART: [kat] --
1,171,827 UART: [cold-reset] ++
1,172,171 UART: [fht] FHT @ 0x50003400
1,174,992 UART: [idev] ++
1,175,160 UART: [idev] CDI.KEYID = 6
1,175,520 UART: [idev] SUBJECT.KEYID = 7
1,175,944 UART: [idev] UDS.KEYID = 0
1,176,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,770 UART: [idev] Erasing UDS.KEYID = 0
1,200,861 UART: [idev] Sha1 KeyId Algorithm
1,209,209 UART: [idev] --
1,210,049 UART: [ldev] ++
1,210,217 UART: [ldev] CDI.KEYID = 6
1,210,580 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,216,661 UART: [ldev] Erasing FE.KEYID = 1
1,243,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,225 UART: [ldev] --
1,282,694 UART: [fwproc] Wait for Commands...
1,283,264 UART: [fwproc] Recv command 0x46574c44
1,283,992 UART: [fwproc] Recv'd Img size: 114448 bytes
1,589,815 UART: ROM Fatal Error: 0x000B0030
1,590,972 >>> mbox cmd response: failed
1,590,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,590,978 >>> mbox cmd response: failed
1,590,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,590,984 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
893,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,641 UART: [kat] ++
897,793 UART: [kat] sha1
901,943 UART: [kat] SHA2-256
903,883 UART: [kat] SHA2-384
906,474 UART: [kat] SHA2-512-ACC
908,375 UART: [kat] ECC-384
918,370 UART: [kat] HMAC-384Kdf
922,820 UART: [kat] LMS
1,171,148 UART: [kat] --
1,171,991 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,174,874 UART: [idev] ++
1,175,042 UART: [idev] CDI.KEYID = 6
1,175,402 UART: [idev] SUBJECT.KEYID = 7
1,175,826 UART: [idev] UDS.KEYID = 0
1,176,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,676 UART: [idev] Erasing UDS.KEYID = 0
1,200,633 UART: [idev] Sha1 KeyId Algorithm
1,209,247 UART: [idev] --
1,210,285 UART: [ldev] ++
1,210,453 UART: [ldev] CDI.KEYID = 6
1,210,816 UART: [ldev] SUBJECT.KEYID = 5
1,211,242 UART: [ldev] AUTHORITY.KEYID = 7
1,211,705 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,243,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,841 UART: [ldev] --
1,282,314 UART: [fwproc] Wait for Commands...
1,283,046 UART: [fwproc] Recv command 0x46574c44
1,283,774 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,349 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,453,781 >>> mbox cmd response: failed
1,453,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,787 >>> mbox cmd response: failed
1,453,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,241 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,976 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
893,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,438 UART: [kat] ++
897,590 UART: [kat] sha1
901,782 UART: [kat] SHA2-256
903,722 UART: [kat] SHA2-384
906,283 UART: [kat] SHA2-512-ACC
908,184 UART: [kat] ECC-384
917,981 UART: [kat] HMAC-384Kdf
922,709 UART: [kat] LMS
1,171,037 UART: [kat] --
1,171,994 UART: [cold-reset] ++
1,172,364 UART: [fht] FHT @ 0x50003400
1,174,927 UART: [idev] ++
1,175,095 UART: [idev] CDI.KEYID = 6
1,175,455 UART: [idev] SUBJECT.KEYID = 7
1,175,879 UART: [idev] UDS.KEYID = 0
1,176,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,931 UART: [idev] Erasing UDS.KEYID = 0
1,201,094 UART: [idev] Sha1 KeyId Algorithm
1,209,524 UART: [idev] --
1,210,402 UART: [ldev] ++
1,210,570 UART: [ldev] CDI.KEYID = 6
1,210,933 UART: [ldev] SUBJECT.KEYID = 5
1,211,359 UART: [ldev] AUTHORITY.KEYID = 7
1,211,822 UART: [ldev] FE.KEYID = 1
1,217,232 UART: [ldev] Erasing FE.KEYID = 1
1,243,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,044 UART: [ldev] --
1,282,459 UART: [fwproc] Wait for Commands...
1,283,279 UART: [fwproc] Recv command 0x46574c44
1,284,007 UART: [fwproc] Recv'd Img size: 114448 bytes
1,595,396 UART: ROM Fatal Error: 0x000B0030
1,596,553 >>> mbox cmd response: failed
1,596,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,559 >>> mbox cmd response: failed
1,596,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,565 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
901,864 UART: [kat] SHA2-256
903,804 UART: [kat] SHA2-384
906,359 UART: [kat] SHA2-512-ACC
908,260 UART: [kat] ECC-384
918,501 UART: [kat] HMAC-384Kdf
923,349 UART: [kat] LMS
1,171,677 UART: [kat] --
1,172,800 UART: [cold-reset] ++
1,173,212 UART: [fht] FHT @ 0x50003400
1,175,925 UART: [idev] ++
1,176,093 UART: [idev] CDI.KEYID = 6
1,176,453 UART: [idev] SUBJECT.KEYID = 7
1,176,877 UART: [idev] UDS.KEYID = 0
1,177,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,247 UART: [idev] Erasing UDS.KEYID = 0
1,202,504 UART: [idev] Sha1 KeyId Algorithm
1,210,854 UART: [idev] --
1,211,928 UART: [ldev] ++
1,212,096 UART: [ldev] CDI.KEYID = 6
1,212,459 UART: [ldev] SUBJECT.KEYID = 5
1,212,885 UART: [ldev] AUTHORITY.KEYID = 7
1,213,348 UART: [ldev] FE.KEYID = 1
1,218,500 UART: [ldev] Erasing FE.KEYID = 1
1,245,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,760 UART: [ldev] --
1,285,091 UART: [fwproc] Wait for Commands...
1,285,715 UART: [fwproc] Recv command 0x46574c44
1,286,443 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,303 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,394 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,451,735 >>> mbox cmd response: failed
1,451,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,451,741 >>> mbox cmd response: failed
1,451,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,451,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,876 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,265 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
890,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,027 UART: [kat] ++
895,179 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,190 UART: [kat] SHA2-512-ACC
906,091 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,781 UART: [idev] ++
1,172,949 UART: [idev] CDI.KEYID = 6
1,173,310 UART: [idev] SUBJECT.KEYID = 7
1,173,735 UART: [idev] UDS.KEYID = 0
1,174,081 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,199,203 UART: [idev] Sha1 KeyId Algorithm
1,207,899 UART: [idev] --
1,208,998 UART: [ldev] ++
1,209,166 UART: [ldev] CDI.KEYID = 6
1,209,530 UART: [ldev] SUBJECT.KEYID = 5
1,209,957 UART: [ldev] AUTHORITY.KEYID = 7
1,210,420 UART: [ldev] FE.KEYID = 1
1,215,434 UART: [ldev] Erasing FE.KEYID = 1
1,242,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,762 UART: [ldev] --
1,281,206 UART: [fwproc] Wait for Commands...
1,281,819 UART: [fwproc] Recv command 0x46574c44
1,282,552 UART: [fwproc] Recv'd Img size: 114448 bytes
1,590,074 UART: ROM Fatal Error: 0x000B0030
1,591,231 >>> mbox cmd response: failed
1,591,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,237 >>> mbox cmd response: failed
1,591,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,243 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
890,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,971 UART: [kat] ++
895,123 UART: [kat] sha1
899,317 UART: [kat] SHA2-256
901,257 UART: [kat] SHA2-384
903,842 UART: [kat] SHA2-512-ACC
905,743 UART: [kat] ECC-384
915,516 UART: [kat] HMAC-384Kdf
920,148 UART: [kat] LMS
1,168,460 UART: [kat] --
1,169,297 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,309 UART: [idev] ++
1,172,477 UART: [idev] CDI.KEYID = 6
1,172,838 UART: [idev] SUBJECT.KEYID = 7
1,173,263 UART: [idev] UDS.KEYID = 0
1,173,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,241 UART: [idev] Erasing UDS.KEYID = 0
1,198,203 UART: [idev] Sha1 KeyId Algorithm
1,206,945 UART: [idev] --
1,208,090 UART: [ldev] ++
1,208,258 UART: [ldev] CDI.KEYID = 6
1,208,622 UART: [ldev] SUBJECT.KEYID = 5
1,209,049 UART: [ldev] AUTHORITY.KEYID = 7
1,209,512 UART: [ldev] FE.KEYID = 1
1,214,730 UART: [ldev] Erasing FE.KEYID = 1
1,241,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,856 UART: [ldev] --
1,280,248 UART: [fwproc] Wait for Commands...
1,280,827 UART: [fwproc] Recv command 0x46574c44
1,281,560 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,973 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,180 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,449,244 >>> mbox cmd response: failed
1,449,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,250 >>> mbox cmd response: failed
1,449,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,621,565 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
87,060 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,886 UART: [kat] ++
896,038 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,973 UART: [kat] SHA2-512-ACC
906,874 UART: [kat] ECC-384
916,895 UART: [kat] HMAC-384Kdf
921,331 UART: [kat] LMS
1,169,643 UART: [kat] --
1,170,538 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,796 UART: [idev] ++
1,173,964 UART: [idev] CDI.KEYID = 6
1,174,325 UART: [idev] SUBJECT.KEYID = 7
1,174,750 UART: [idev] UDS.KEYID = 0
1,175,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,012 UART: [idev] Sha1 KeyId Algorithm
1,208,932 UART: [idev] --
1,210,001 UART: [ldev] ++
1,210,169 UART: [ldev] CDI.KEYID = 6
1,210,533 UART: [ldev] SUBJECT.KEYID = 5
1,210,960 UART: [ldev] AUTHORITY.KEYID = 7
1,211,423 UART: [ldev] FE.KEYID = 1
1,216,451 UART: [ldev] Erasing FE.KEYID = 1
1,242,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,267 UART: [ldev] --
1,282,743 UART: [fwproc] Wait for Commands...
1,283,332 UART: [fwproc] Recv command 0x46574c44
1,284,065 UART: [fwproc] Recv'd Img size: 114448 bytes
1,597,287 UART: ROM Fatal Error: 0x000B0030
1,598,444 >>> mbox cmd response: failed
1,598,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,450 >>> mbox cmd response: failed
1,598,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,306 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,174,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,218 UART: [idev] Erasing UDS.KEYID = 0
1,199,416 UART: [idev] Sha1 KeyId Algorithm
1,208,222 UART: [idev] --
1,209,223 UART: [ldev] ++
1,209,391 UART: [ldev] CDI.KEYID = 6
1,209,755 UART: [ldev] SUBJECT.KEYID = 5
1,210,182 UART: [ldev] AUTHORITY.KEYID = 7
1,210,645 UART: [ldev] FE.KEYID = 1
1,215,697 UART: [ldev] Erasing FE.KEYID = 1
1,242,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,243 UART: [ldev] --
1,281,643 UART: [fwproc] Wait for Commands...
1,282,326 UART: [fwproc] Recv command 0x46574c44
1,283,059 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,850 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,740 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,865 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,449,029 >>> mbox cmd response: failed
1,449,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,035 >>> mbox cmd response: failed
1,449,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,632 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,053 UART:
192,430 UART: Running Caliptra ROM ...
193,630 UART:
193,799 UART: [state] CFI Enabled
264,411 UART: [state] LifecycleState = Unprovisioned
266,392 UART: [state] DebugLocked = No
268,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,334 UART: [kat] SHA2-256
443,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,550 UART: [kat] ++
454,138 UART: [kat] sha1
465,453 UART: [kat] SHA2-256
468,142 UART: [kat] SHA2-384
473,311 UART: [kat] SHA2-512-ACC
475,702 UART: [kat] ECC-384
2,767,082 UART: [kat] HMAC-384Kdf
2,798,844 UART: [kat] LMS
3,989,162 UART: [kat] --
3,994,354 UART: [cold-reset] ++
3,996,720 UART: [fht] Storing FHT @ 0x50003400
4,009,285 UART: [idev] ++
4,009,856 UART: [idev] CDI.KEYID = 6
4,010,786 UART: [idev] SUBJECT.KEYID = 7
4,012,062 UART: [idev] UDS.KEYID = 0
4,015,085 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,159,140 UART: [idev] Erasing UDS.KEYID = 0
7,343,259 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,015 UART: [idev] --
7,371,262 UART: [ldev] ++
7,371,836 UART: [ldev] CDI.KEYID = 6
7,372,801 UART: [ldev] SUBJECT.KEYID = 5
7,374,020 UART: [ldev] AUTHORITY.KEYID = 7
7,375,420 UART: [ldev] FE.KEYID = 1
7,421,649 UART: [ldev] Erasing FE.KEYID = 1
10,753,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,948 UART: [ldev] --
13,135,156 UART: [fwproc] Waiting for Commands...
13,137,895 UART: [fwproc] Received command 0x46574c44
13,140,092 UART: [fwproc] Received Image of size 114124 bytes
13,214,991 UART: ROM Fatal Error: 0x000B0032
13,218,513 >>> mbox cmd response: failed
13,218,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,219,283 >>> mbox cmd response: failed
13,219,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,219,868 >>> mbox cmd response: failed
Initializing fuses
2,056,506 writing to cptra_bootfsm_go
2,245,805 UART:
2,246,166 UART: Running Caliptra ROM ...
2,247,241 UART:
2,247,399 UART: [state] CFI Enabled
2,318,288 UART: [state] LifecycleState = Unprovisioned
2,320,214 UART: [state] DebugLocked = No
2,323,284 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,716 UART: [kat] SHA2-256
2,497,442 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,922 UART: [kat] ++
2,508,404 UART: [kat] sha1
2,519,942 UART: [kat] SHA2-256
2,522,637 UART: [kat] SHA2-384
2,528,844 UART: [kat] SHA2-512-ACC
2,531,256 UART: [kat] ECC-384
4,821,589 UART: [kat] HMAC-384Kdf
4,851,807 UART: [kat] LMS
6,042,111 UART: [kat] --
6,045,586 UART: [cold-reset] ++
6,048,177 UART: [fht] Storing FHT @ 0x50003400
6,058,903 UART: [idev] ++
6,059,482 UART: [idev] CDI.KEYID = 6
6,060,420 UART: [idev] SUBJECT.KEYID = 7
6,061,687 UART: [idev] UDS.KEYID = 0
6,064,700 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,208,394 UART: [idev] Erasing UDS.KEYID = 0
9,399,383 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,170 UART: [idev] --
9,426,978 UART: [ldev] ++
9,427,604 UART: [ldev] CDI.KEYID = 6
9,428,515 UART: [ldev] SUBJECT.KEYID = 5
9,429,783 UART: [ldev] AUTHORITY.KEYID = 7
9,431,018 UART: [ldev] FE.KEYID = 1
9,475,870 UART: [ldev] Erasing FE.KEYID = 1
12,808,207 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,121,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,136,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,151,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,165,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,184,991 UART: [ldev] --
15,189,174 UART: [fwproc] Waiting for Commands...
15,191,487 UART: [fwproc] Received command 0x46574c44
15,193,692 UART: [fwproc] Received Image of size 114124 bytes
19,235,210 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,317,400 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,386,267 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,703,850 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,788,292 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,936,746 >>> mbox cmd response: failed
12,937,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,937,594 >>> mbox cmd response: failed
12,937,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,938,160 >>> mbox cmd response: failed
Initializing fuses
2,044,953 writing to cptra_bootfsm_go
5,825,742 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,871,076 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,506 UART:
193,198 UART: Running Caliptra ROM ...
194,347 UART:
603,893 UART: [state] CFI Enabled
616,369 UART: [state] LifecycleState = Unprovisioned
618,263 UART: [state] DebugLocked = No
619,806 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,582 UART: [kat] SHA2-256
794,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,833 UART: [kat] ++
805,417 UART: [kat] sha1
816,680 UART: [kat] SHA2-256
819,413 UART: [kat] SHA2-384
824,700 UART: [kat] SHA2-512-ACC
827,047 UART: [kat] ECC-384
3,111,055 UART: [kat] HMAC-384Kdf
3,123,029 UART: [kat] LMS
4,313,172 UART: [kat] --
4,318,208 UART: [cold-reset] ++
4,320,255 UART: [fht] Storing FHT @ 0x50003400
4,331,416 UART: [idev] ++
4,331,985 UART: [idev] CDI.KEYID = 6
4,332,952 UART: [idev] SUBJECT.KEYID = 7
4,334,166 UART: [idev] UDS.KEYID = 0
4,337,093 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,657 UART: [idev] Erasing UDS.KEYID = 0
7,617,699 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,740 UART: [idev] --
7,642,323 UART: [ldev] ++
7,642,918 UART: [ldev] CDI.KEYID = 6
7,643,833 UART: [ldev] SUBJECT.KEYID = 5
7,645,047 UART: [ldev] AUTHORITY.KEYID = 7
7,646,337 UART: [ldev] FE.KEYID = 1
7,658,549 UART: [ldev] Erasing FE.KEYID = 1
10,949,135 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,795 UART: [ldev] --
13,311,274 UART: [fwproc] Waiting for Commands...
13,313,704 UART: [fwproc] Received command 0x46574c44
13,315,935 UART: [fwproc] Received Image of size 114124 bytes
13,393,374 UART: ROM Fatal Error: 0x000B0032
13,396,882 >>> mbox cmd response: failed
13,397,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,397,687 >>> mbox cmd response: failed
13,397,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,398,249 >>> mbox cmd response: failed
Initializing fuses
2,049,262 writing to cptra_bootfsm_go
2,238,599 UART:
2,238,953 UART: Running Caliptra ROM ...
2,240,087 UART:
7,071,643 UART: [state] CFI Enabled
7,087,058 UART: [state] LifecycleState = Unprovisioned
7,088,982 UART: [state] DebugLocked = No
7,091,292 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,096,970 UART: [kat] SHA2-256
7,266,721 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,277,245 UART: [kat] ++
7,277,749 UART: [kat] sha1
7,288,372 UART: [kat] SHA2-256
7,291,068 UART: [kat] SHA2-384
7,296,249 UART: [kat] SHA2-512-ACC
7,298,655 UART: [kat] ECC-384
9,580,846 UART: [kat] HMAC-384Kdf
9,591,833 UART: [kat] LMS
10,781,958 UART: [kat] --
10,785,459 UART: [cold-reset] ++
10,786,520 UART: [fht] Storing FHT @ 0x50003400
10,798,332 UART: [idev] ++
10,798,935 UART: [idev] CDI.KEYID = 6
10,799,823 UART: [idev] SUBJECT.KEYID = 7
10,801,113 UART: [idev] UDS.KEYID = 0
10,803,860 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,947,160 UART: [idev] Erasing UDS.KEYID = 0
14,091,435 UART: [idev] Using Sha1 for KeyId Algorithm
14,112,866 UART: [idev] --
14,116,964 UART: [ldev] ++
14,117,586 UART: [ldev] CDI.KEYID = 6
14,118,551 UART: [ldev] SUBJECT.KEYID = 5
14,119,744 UART: [ldev] AUTHORITY.KEYID = 7
14,120,983 UART: [ldev] FE.KEYID = 1
14,133,362 UART: [ldev] Erasing FE.KEYID = 1
17,424,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,718,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,733,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,748,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,762,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,781,036 UART: [ldev] --
19,786,476 UART: [fwproc] Waiting for Commands...
19,788,258 UART: [fwproc] Received command 0x46574c44
19,790,448 UART: [fwproc] Received Image of size 114124 bytes
23,843,283 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,918,646 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,987,525 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,304,011 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
4,133,482 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,135,571 >>> mbox cmd response: failed
13,136,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,136,477 >>> mbox cmd response: failed
13,136,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,137,046 >>> mbox cmd response: failed
Initializing fuses
2,058,327 writing to cptra_bootfsm_go
10,866,760 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,804,007 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,140 UART:
192,518 UART: Running Caliptra ROM ...
193,646 UART:
193,793 UART: [state] CFI Enabled
263,223 UART: [state] LifecycleState = Unprovisioned
265,082 UART: [state] DebugLocked = No
266,523 UART: [state] WD Timer not started. Device not locked for debugging
270,772 UART: [kat] SHA2-256
449,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,450 UART: [kat] ++
461,899 UART: [kat] sha1
474,450 UART: [kat] SHA2-256
477,515 UART: [kat] SHA2-384
482,786 UART: [kat] SHA2-512-ACC
485,776 UART: [kat] ECC-384
2,945,884 UART: [kat] HMAC-384Kdf
2,970,228 UART: [kat] LMS
3,499,665 UART: [kat] --
3,503,500 UART: [cold-reset] ++
3,504,997 UART: [fht] FHT @ 0x50003400
3,516,837 UART: [idev] ++
3,517,407 UART: [idev] CDI.KEYID = 6
3,518,315 UART: [idev] SUBJECT.KEYID = 7
3,519,529 UART: [idev] UDS.KEYID = 0
3,522,244 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,379 UART: [idev] Erasing UDS.KEYID = 0
6,023,522 UART: [idev] Sha1 KeyId Algorithm
6,046,256 UART: [idev] --
6,050,959 UART: [ldev] ++
6,051,547 UART: [ldev] CDI.KEYID = 6
6,052,435 UART: [ldev] SUBJECT.KEYID = 5
6,053,649 UART: [ldev] AUTHORITY.KEYID = 7
6,054,828 UART: [ldev] FE.KEYID = 1
6,097,546 UART: [ldev] Erasing FE.KEYID = 1
8,601,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,273 UART: [ldev] --
10,391,939 UART: [fwproc] Wait for Commands...
10,393,501 UART: [fwproc] Recv command 0x46574c44
10,395,543 UART: [fwproc] Recv'd Img size: 114448 bytes
10,473,137 UART: ROM Fatal Error: 0x000B0032
10,476,270 >>> mbox cmd response: failed
10,476,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,477,075 >>> mbox cmd response: failed
10,477,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,477,653 >>> mbox cmd response: failed
Initializing fuses
2,054,166 writing to cptra_bootfsm_go
2,243,459 UART:
2,243,802 UART: Running Caliptra ROM ...
2,244,937 UART:
2,245,104 UART: [state] CFI Enabled
2,307,189 UART: [state] LifecycleState = Unprovisioned
2,309,058 UART: [state] DebugLocked = No
2,310,989 UART: [state] WD Timer not started. Device not locked for debugging
2,315,383 UART: [kat] SHA2-256
2,494,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,081 UART: [kat] ++
2,506,651 UART: [kat] sha1
2,516,791 UART: [kat] SHA2-256
2,519,867 UART: [kat] SHA2-384
2,524,613 UART: [kat] SHA2-512-ACC
2,527,605 UART: [kat] ECC-384
4,972,462 UART: [kat] HMAC-384Kdf
4,994,133 UART: [kat] LMS
5,523,582 UART: [kat] --
5,527,784 UART: [cold-reset] ++
5,530,362 UART: [fht] FHT @ 0x50003400
5,540,850 UART: [idev] ++
5,541,450 UART: [idev] CDI.KEYID = 6
5,542,367 UART: [idev] SUBJECT.KEYID = 7
5,543,587 UART: [idev] UDS.KEYID = 0
5,546,093 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,690,023 UART: [idev] Erasing UDS.KEYID = 0
8,049,641 UART: [idev] Sha1 KeyId Algorithm
8,071,736 UART: [idev] --
8,076,324 UART: [ldev] ++
8,076,893 UART: [ldev] CDI.KEYID = 6
8,077,805 UART: [ldev] SUBJECT.KEYID = 5
8,078,889 UART: [ldev] AUTHORITY.KEYID = 7
8,080,228 UART: [ldev] FE.KEYID = 1
8,123,237 UART: [ldev] Erasing FE.KEYID = 1
10,629,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,363,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,379,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,395,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,411,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,432,156 UART: [ldev] --
12,436,139 UART: [fwproc] Wait for Commands...
12,438,247 UART: [fwproc] Recv command 0x46574c44
12,440,375 UART: [fwproc] Recv'd Img size: 114448 bytes
15,846,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,924,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,993,127 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,311,041 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,382,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,274,705 >>> mbox cmd response: failed
10,275,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,275,823 >>> mbox cmd response: failed
10,276,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,276,339 >>> mbox cmd response: failed
Initializing fuses
2,043,903 writing to cptra_bootfsm_go
5,415,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,126,985 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,560 UART:
192,939 UART: Running Caliptra ROM ...
194,063 UART:
603,526 UART: [state] CFI Enabled
615,411 UART: [state] LifecycleState = Unprovisioned
617,309 UART: [state] DebugLocked = No
620,252 UART: [state] WD Timer not started. Device not locked for debugging
623,312 UART: [kat] SHA2-256
802,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,019 UART: [kat] ++
814,471 UART: [kat] sha1
825,673 UART: [kat] SHA2-256
828,727 UART: [kat] SHA2-384
835,193 UART: [kat] SHA2-512-ACC
838,177 UART: [kat] ECC-384
3,282,196 UART: [kat] HMAC-384Kdf
3,294,769 UART: [kat] LMS
3,824,253 UART: [kat] --
3,828,042 UART: [cold-reset] ++
3,830,617 UART: [fht] FHT @ 0x50003400
3,840,448 UART: [idev] ++
3,841,063 UART: [idev] CDI.KEYID = 6
3,841,983 UART: [idev] SUBJECT.KEYID = 7
3,843,150 UART: [idev] UDS.KEYID = 0
3,846,193 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,990,145 UART: [idev] Erasing UDS.KEYID = 0
6,315,835 UART: [idev] Sha1 KeyId Algorithm
6,338,860 UART: [idev] --
6,344,150 UART: [ldev] ++
6,344,796 UART: [ldev] CDI.KEYID = 6
6,345,693 UART: [ldev] SUBJECT.KEYID = 5
6,346,742 UART: [ldev] AUTHORITY.KEYID = 7
6,348,106 UART: [ldev] FE.KEYID = 1
6,360,427 UART: [ldev] Erasing FE.KEYID = 1
8,835,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,757 UART: [ldev] --
10,626,651 UART: [fwproc] Wait for Commands...
10,629,829 UART: [fwproc] Recv command 0x46574c44
10,631,927 UART: [fwproc] Recv'd Img size: 114448 bytes
10,712,435 UART: ROM Fatal Error: 0x000B0032
10,715,572 >>> mbox cmd response: failed
10,716,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,716,333 >>> mbox cmd response: failed
10,716,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,717,021 >>> mbox cmd response: failed
Initializing fuses
2,054,427 writing to cptra_bootfsm_go
2,243,723 UART:
2,244,069 UART: Running Caliptra ROM ...
2,245,207 UART:
9,744,568 UART: [state] CFI Enabled
9,757,161 UART: [state] LifecycleState = Unprovisioned
9,759,024 UART: [state] DebugLocked = No
9,760,901 UART: [state] WD Timer not started. Device not locked for debugging
9,765,462 UART: [kat] SHA2-256
9,944,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,956,200 UART: [kat] ++
9,956,762 UART: [kat] sha1
9,967,714 UART: [kat] SHA2-256
9,970,738 UART: [kat] SHA2-384
9,975,807 UART: [kat] SHA2-512-ACC
9,978,798 UART: [kat] ECC-384
12,418,467 UART: [kat] HMAC-384Kdf
12,432,192 UART: [kat] LMS
12,961,715 UART: [kat] --
12,965,861 UART: [cold-reset] ++
12,967,895 UART: [fht] FHT @ 0x50003400
12,979,948 UART: [idev] ++
12,980,510 UART: [idev] CDI.KEYID = 6
12,981,413 UART: [idev] SUBJECT.KEYID = 7
12,982,626 UART: [idev] UDS.KEYID = 0
12,985,498 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,129,227 UART: [idev] Erasing UDS.KEYID = 0
15,452,914 UART: [idev] Sha1 KeyId Algorithm
15,475,278 UART: [idev] --
15,477,942 UART: [ldev] ++
15,478,514 UART: [ldev] CDI.KEYID = 6
15,479,420 UART: [ldev] SUBJECT.KEYID = 5
15,480,638 UART: [ldev] AUTHORITY.KEYID = 7
15,481,863 UART: [ldev] FE.KEYID = 1
15,493,262 UART: [ldev] Erasing FE.KEYID = 1
17,967,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,684,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,700,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,715,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,731,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,752,295 UART: [ldev] --
19,756,530 UART: [fwproc] Wait for Commands...
19,758,787 UART: [fwproc] Recv command 0x46574c44
19,760,848 UART: [fwproc] Recv'd Img size: 114448 bytes
23,165,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,234,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,303,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,620,767 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,696,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,479,904 >>> mbox cmd response: failed
10,480,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,765 >>> mbox cmd response: failed
10,481,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,481,326 >>> mbox cmd response: failed
Initializing fuses
2,045,605 writing to cptra_bootfsm_go
13,085,281 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,662,156 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
3,441,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,301,548 >>> mbox cmd response: failed
10,302,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,302,436 >>> mbox cmd response: failed
10,302,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,302,996 >>> mbox cmd response: failed
Initializing fuses
2,049,399 writing to cptra_bootfsm_go
5,471,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,773,559 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,759,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,537,701 >>> mbox cmd response: failed
10,538,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,538,593 >>> mbox cmd response: failed
10,538,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,539,162 >>> mbox cmd response: failed
Initializing fuses
2,052,237 writing to cptra_bootfsm_go
13,079,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,285,175 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,319 UART: [kat] SHA2-256
882,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,365 UART: [kat] ++
886,517 UART: [kat] sha1
890,753 UART: [kat] SHA2-256
892,691 UART: [kat] SHA2-384
895,432 UART: [kat] SHA2-512-ACC
897,333 UART: [kat] ECC-384
902,856 UART: [kat] HMAC-384Kdf
907,424 UART: [kat] LMS
1,475,620 UART: [kat] --
1,476,635 UART: [cold-reset] ++
1,477,173 UART: [fht] Storing FHT @ 0x50003400
1,479,972 UART: [idev] ++
1,480,140 UART: [idev] CDI.KEYID = 6
1,480,500 UART: [idev] SUBJECT.KEYID = 7
1,480,924 UART: [idev] UDS.KEYID = 0
1,481,269 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,852 UART: [idev] Erasing UDS.KEYID = 0
1,506,228 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,730 UART: [idev] --
1,515,973 UART: [ldev] ++
1,516,141 UART: [ldev] CDI.KEYID = 6
1,516,504 UART: [ldev] SUBJECT.KEYID = 5
1,516,930 UART: [ldev] AUTHORITY.KEYID = 7
1,517,393 UART: [ldev] FE.KEYID = 1
1,522,411 UART: [ldev] Erasing FE.KEYID = 1
1,547,960 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,210 UART: [ldev] --
1,587,655 UART: [fwproc] Waiting for Commands...
1,588,296 UART: [fwproc] Received command 0x46574c44
1,589,087 UART: [fwproc] Received Image of size 114448 bytes
1,615,257 UART: ROM Fatal Error: 0x000B0032
1,616,414 >>> mbox cmd response: failed
1,616,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,420 >>> mbox cmd response: failed
1,616,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,727 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,399 UART: [kat] SHA2-256
882,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,445 UART: [kat] ++
886,597 UART: [kat] sha1
890,829 UART: [kat] SHA2-256
892,767 UART: [kat] SHA2-384
895,306 UART: [kat] SHA2-512-ACC
897,207 UART: [kat] ECC-384
902,608 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,433 UART: [cold-reset] ++
1,476,787 UART: [fht] Storing FHT @ 0x50003400
1,479,572 UART: [idev] ++
1,479,740 UART: [idev] CDI.KEYID = 6
1,480,100 UART: [idev] SUBJECT.KEYID = 7
1,480,524 UART: [idev] UDS.KEYID = 0
1,480,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,344 UART: [idev] Erasing UDS.KEYID = 0
1,505,096 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,720 UART: [idev] --
1,514,745 UART: [ldev] ++
1,514,913 UART: [ldev] CDI.KEYID = 6
1,515,276 UART: [ldev] SUBJECT.KEYID = 5
1,515,702 UART: [ldev] AUTHORITY.KEYID = 7
1,516,165 UART: [ldev] FE.KEYID = 1
1,521,167 UART: [ldev] Erasing FE.KEYID = 1
1,546,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,242 UART: [ldev] --
1,585,627 UART: [fwproc] Waiting for Commands...
1,586,356 UART: [fwproc] Received command 0x46574c44
1,587,147 UART: [fwproc] Received Image of size 114448 bytes
2,885,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,601 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,953 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,026 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,464,689 >>> mbox cmd response: failed
1,464,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,695 >>> mbox cmd response: failed
1,464,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,701 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,866 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,422 UART: [kat] SHA2-256
882,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,468 UART: [kat] ++
886,620 UART: [kat] sha1
890,882 UART: [kat] SHA2-256
892,820 UART: [kat] SHA2-384
895,585 UART: [kat] SHA2-512-ACC
897,486 UART: [kat] ECC-384
903,131 UART: [kat] HMAC-384Kdf
907,867 UART: [kat] LMS
1,476,063 UART: [kat] --
1,476,966 UART: [cold-reset] ++
1,477,440 UART: [fht] Storing FHT @ 0x50003400
1,480,299 UART: [idev] ++
1,480,467 UART: [idev] CDI.KEYID = 6
1,480,827 UART: [idev] SUBJECT.KEYID = 7
1,481,251 UART: [idev] UDS.KEYID = 0
1,481,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,375 UART: [idev] Erasing UDS.KEYID = 0
1,506,393 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,027 UART: [idev] --
1,516,190 UART: [ldev] ++
1,516,358 UART: [ldev] CDI.KEYID = 6
1,516,721 UART: [ldev] SUBJECT.KEYID = 5
1,517,147 UART: [ldev] AUTHORITY.KEYID = 7
1,517,610 UART: [ldev] FE.KEYID = 1
1,523,088 UART: [ldev] Erasing FE.KEYID = 1
1,548,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,057 UART: [ldev] --
1,588,378 UART: [fwproc] Waiting for Commands...
1,589,003 UART: [fwproc] Received command 0x46574c44
1,589,794 UART: [fwproc] Received Image of size 114448 bytes
1,616,302 UART: ROM Fatal Error: 0x000B0032
1,617,459 >>> mbox cmd response: failed
1,617,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,617,465 >>> mbox cmd response: failed
1,617,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,617,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,864 UART: [kat] SHA2-256
881,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,910 UART: [kat] ++
886,062 UART: [kat] sha1
890,224 UART: [kat] SHA2-256
892,162 UART: [kat] SHA2-384
894,829 UART: [kat] SHA2-512-ACC
896,730 UART: [kat] ECC-384
902,457 UART: [kat] HMAC-384Kdf
907,043 UART: [kat] LMS
1,475,239 UART: [kat] --
1,476,234 UART: [cold-reset] ++
1,476,574 UART: [fht] Storing FHT @ 0x50003400
1,479,331 UART: [idev] ++
1,479,499 UART: [idev] CDI.KEYID = 6
1,479,859 UART: [idev] SUBJECT.KEYID = 7
1,480,283 UART: [idev] UDS.KEYID = 0
1,480,628 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,265 UART: [idev] Erasing UDS.KEYID = 0
1,504,997 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,653 UART: [idev] --
1,514,726 UART: [ldev] ++
1,514,894 UART: [ldev] CDI.KEYID = 6
1,515,257 UART: [ldev] SUBJECT.KEYID = 5
1,515,683 UART: [ldev] AUTHORITY.KEYID = 7
1,516,146 UART: [ldev] FE.KEYID = 1
1,521,524 UART: [ldev] Erasing FE.KEYID = 1
1,547,215 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,069 UART: [ldev] --
1,586,480 UART: [fwproc] Waiting for Commands...
1,587,309 UART: [fwproc] Received command 0x46574c44
1,588,100 UART: [fwproc] Received Image of size 114448 bytes
2,886,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,894 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,246 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,277 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,467,824 >>> mbox cmd response: failed
1,467,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,830 >>> mbox cmd response: failed
1,467,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,257 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
893,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,465 UART: [kat] ++
897,617 UART: [kat] sha1
901,717 UART: [kat] SHA2-256
903,657 UART: [kat] SHA2-384
906,338 UART: [kat] SHA2-512-ACC
908,239 UART: [kat] ECC-384
917,766 UART: [kat] HMAC-384Kdf
922,356 UART: [kat] LMS
1,170,684 UART: [kat] --
1,171,723 UART: [cold-reset] ++
1,172,077 UART: [fht] FHT @ 0x50003400
1,174,688 UART: [idev] ++
1,174,856 UART: [idev] CDI.KEYID = 6
1,175,216 UART: [idev] SUBJECT.KEYID = 7
1,175,640 UART: [idev] UDS.KEYID = 0
1,175,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,297 UART: [idev] Sha1 KeyId Algorithm
1,208,899 UART: [idev] --
1,210,065 UART: [ldev] ++
1,210,233 UART: [ldev] CDI.KEYID = 6
1,210,596 UART: [ldev] SUBJECT.KEYID = 5
1,211,022 UART: [ldev] AUTHORITY.KEYID = 7
1,211,485 UART: [ldev] FE.KEYID = 1
1,216,617 UART: [ldev] Erasing FE.KEYID = 1
1,242,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,835 UART: [ldev] --
1,282,102 UART: [fwproc] Wait for Commands...
1,282,876 UART: [fwproc] Recv command 0x46574c44
1,283,604 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,780 UART: ROM Fatal Error: 0x000B0032
1,310,937 >>> mbox cmd response: failed
1,310,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,943 >>> mbox cmd response: failed
1,310,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,949 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
893,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,339 UART: [kat] ++
897,491 UART: [kat] sha1
901,577 UART: [kat] SHA2-256
903,517 UART: [kat] SHA2-384
906,080 UART: [kat] SHA2-512-ACC
907,981 UART: [kat] ECC-384
918,082 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,172,211 UART: [cold-reset] ++
1,172,695 UART: [fht] FHT @ 0x50003400
1,175,522 UART: [idev] ++
1,175,690 UART: [idev] CDI.KEYID = 6
1,176,050 UART: [idev] SUBJECT.KEYID = 7
1,176,474 UART: [idev] UDS.KEYID = 0
1,176,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,260 UART: [idev] Erasing UDS.KEYID = 0
1,201,107 UART: [idev] Sha1 KeyId Algorithm
1,209,699 UART: [idev] --
1,210,731 UART: [ldev] ++
1,210,899 UART: [ldev] CDI.KEYID = 6
1,211,262 UART: [ldev] SUBJECT.KEYID = 5
1,211,688 UART: [ldev] AUTHORITY.KEYID = 7
1,212,151 UART: [ldev] FE.KEYID = 1
1,217,347 UART: [ldev] Erasing FE.KEYID = 1
1,243,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,367 UART: [ldev] --
1,282,844 UART: [fwproc] Wait for Commands...
1,283,664 UART: [fwproc] Recv command 0x46574c44
1,284,392 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,232 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,153 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,164,830 >>> mbox cmd response: failed
1,164,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,836 >>> mbox cmd response: failed
1,164,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,894 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
893,373 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,498 UART: [kat] ++
897,650 UART: [kat] sha1
901,798 UART: [kat] SHA2-256
903,738 UART: [kat] SHA2-384
906,449 UART: [kat] SHA2-512-ACC
908,350 UART: [kat] ECC-384
918,221 UART: [kat] HMAC-384Kdf
922,837 UART: [kat] LMS
1,171,165 UART: [kat] --
1,171,874 UART: [cold-reset] ++
1,172,216 UART: [fht] FHT @ 0x50003400
1,175,001 UART: [idev] ++
1,175,169 UART: [idev] CDI.KEYID = 6
1,175,529 UART: [idev] SUBJECT.KEYID = 7
1,175,953 UART: [idev] UDS.KEYID = 0
1,176,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,993 UART: [idev] Erasing UDS.KEYID = 0
1,200,932 UART: [idev] Sha1 KeyId Algorithm
1,209,394 UART: [idev] --
1,210,442 UART: [ldev] ++
1,210,610 UART: [ldev] CDI.KEYID = 6
1,210,973 UART: [ldev] SUBJECT.KEYID = 5
1,211,399 UART: [ldev] AUTHORITY.KEYID = 7
1,211,862 UART: [ldev] FE.KEYID = 1
1,217,278 UART: [ldev] Erasing FE.KEYID = 1
1,243,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,670 UART: [ldev] --
1,282,931 UART: [fwproc] Wait for Commands...
1,283,567 UART: [fwproc] Recv command 0x46574c44
1,284,295 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,439 UART: ROM Fatal Error: 0x000B0032
1,311,596 >>> mbox cmd response: failed
1,311,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,602 >>> mbox cmd response: failed
1,311,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
893,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,594 UART: [kat] ++
897,746 UART: [kat] sha1
902,000 UART: [kat] SHA2-256
903,940 UART: [kat] SHA2-384
906,509 UART: [kat] SHA2-512-ACC
908,410 UART: [kat] ECC-384
918,031 UART: [kat] HMAC-384Kdf
922,707 UART: [kat] LMS
1,171,035 UART: [kat] --
1,172,062 UART: [cold-reset] ++
1,172,490 UART: [fht] FHT @ 0x50003400
1,175,311 UART: [idev] ++
1,175,479 UART: [idev] CDI.KEYID = 6
1,175,839 UART: [idev] SUBJECT.KEYID = 7
1,176,263 UART: [idev] UDS.KEYID = 0
1,176,608 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,663 UART: [idev] Erasing UDS.KEYID = 0
1,201,630 UART: [idev] Sha1 KeyId Algorithm
1,209,972 UART: [idev] --
1,211,082 UART: [ldev] ++
1,211,250 UART: [ldev] CDI.KEYID = 6
1,211,613 UART: [ldev] SUBJECT.KEYID = 5
1,212,039 UART: [ldev] AUTHORITY.KEYID = 7
1,212,502 UART: [ldev] FE.KEYID = 1
1,217,744 UART: [ldev] Erasing FE.KEYID = 1
1,244,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,540 UART: [ldev] --
1,283,957 UART: [fwproc] Wait for Commands...
1,284,617 UART: [fwproc] Recv command 0x46574c44
1,285,345 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,106 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,050 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,167,539 >>> mbox cmd response: failed
1,167,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,545 >>> mbox cmd response: failed
1,167,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,819 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,187 UART: [kat] ++
895,339 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,389 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,174,287 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,459 UART: [idev] Erasing UDS.KEYID = 0
1,199,511 UART: [idev] Sha1 KeyId Algorithm
1,208,265 UART: [idev] --
1,209,222 UART: [ldev] ++
1,209,390 UART: [ldev] CDI.KEYID = 6
1,209,754 UART: [ldev] SUBJECT.KEYID = 5
1,210,181 UART: [ldev] AUTHORITY.KEYID = 7
1,210,644 UART: [ldev] FE.KEYID = 1
1,215,840 UART: [ldev] Erasing FE.KEYID = 1
1,242,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,796 UART: [ldev] --
1,281,226 UART: [fwproc] Wait for Commands...
1,281,839 UART: [fwproc] Recv command 0x46574c44
1,282,572 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,048 UART: ROM Fatal Error: 0x000B0032
1,309,205 >>> mbox cmd response: failed
1,309,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,211 >>> mbox cmd response: failed
1,309,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
890,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,121 UART: [kat] ++
895,273 UART: [kat] sha1
899,461 UART: [kat] SHA2-256
901,401 UART: [kat] SHA2-384
904,316 UART: [kat] SHA2-512-ACC
906,217 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,113 UART: [fht] FHT @ 0x50003400
1,172,711 UART: [idev] ++
1,172,879 UART: [idev] CDI.KEYID = 6
1,173,240 UART: [idev] SUBJECT.KEYID = 7
1,173,665 UART: [idev] UDS.KEYID = 0
1,174,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,857 UART: [idev] Erasing UDS.KEYID = 0
1,198,789 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,215,128 UART: [ldev] Erasing FE.KEYID = 1
1,241,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,306 UART: [ldev] --
1,280,742 UART: [fwproc] Wait for Commands...
1,281,473 UART: [fwproc] Recv command 0x46574c44
1,282,206 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,165 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,724 >>> mbox cmd response: failed
1,161,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,730 >>> mbox cmd response: failed
1,161,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,731 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,607 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,292 UART: [cold-reset] ++
1,170,748 UART: [fht] FHT @ 0x50003400
1,173,490 UART: [idev] ++
1,173,658 UART: [idev] CDI.KEYID = 6
1,174,019 UART: [idev] SUBJECT.KEYID = 7
1,174,444 UART: [idev] UDS.KEYID = 0
1,174,790 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,660 UART: [idev] Erasing UDS.KEYID = 0
1,200,162 UART: [idev] Sha1 KeyId Algorithm
1,208,908 UART: [idev] --
1,209,843 UART: [ldev] ++
1,210,011 UART: [ldev] CDI.KEYID = 6
1,210,375 UART: [ldev] SUBJECT.KEYID = 5
1,210,802 UART: [ldev] AUTHORITY.KEYID = 7
1,211,265 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,749 UART: [ldev] --
1,282,155 UART: [fwproc] Wait for Commands...
1,282,962 UART: [fwproc] Recv command 0x46574c44
1,283,695 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,407 UART: ROM Fatal Error: 0x000B0032
1,310,564 >>> mbox cmd response: failed
1,310,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,570 >>> mbox cmd response: failed
1,310,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,549 UART: [kat] SHA2-256
891,099 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,228 UART: [kat] ++
895,380 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,229 UART: [kat] SHA2-512-ACC
906,130 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,276 UART: [fht] FHT @ 0x50003400
1,172,954 UART: [idev] ++
1,173,122 UART: [idev] CDI.KEYID = 6
1,173,483 UART: [idev] SUBJECT.KEYID = 7
1,173,908 UART: [idev] UDS.KEYID = 0
1,174,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,692 UART: [idev] Erasing UDS.KEYID = 0
1,199,190 UART: [idev] Sha1 KeyId Algorithm
1,208,208 UART: [idev] --
1,209,351 UART: [ldev] ++
1,209,519 UART: [ldev] CDI.KEYID = 6
1,209,883 UART: [ldev] SUBJECT.KEYID = 5
1,210,310 UART: [ldev] AUTHORITY.KEYID = 7
1,210,773 UART: [ldev] FE.KEYID = 1
1,216,129 UART: [ldev] Erasing FE.KEYID = 1
1,241,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,467 UART: [ldev] --
1,280,743 UART: [fwproc] Wait for Commands...
1,281,548 UART: [fwproc] Recv command 0x46574c44
1,282,281 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,628 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,113 >>> mbox cmd response: failed
1,162,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,119 >>> mbox cmd response: failed
1,162,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,674 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,257 UART:
192,636 UART: Running Caliptra ROM ...
193,772 UART:
193,923 UART: [state] CFI Enabled
264,411 UART: [state] LifecycleState = Unprovisioned
266,355 UART: [state] DebugLocked = No
267,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,723 UART: [kat] SHA2-256
442,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,949 UART: [kat] ++
453,419 UART: [kat] sha1
464,623 UART: [kat] SHA2-256
467,305 UART: [kat] SHA2-384
474,199 UART: [kat] SHA2-512-ACC
476,590 UART: [kat] ECC-384
2,764,302 UART: [kat] HMAC-384Kdf
2,775,848 UART: [kat] LMS
3,966,157 UART: [kat] --
3,970,504 UART: [cold-reset] ++
3,972,615 UART: [fht] Storing FHT @ 0x50003400
3,983,293 UART: [idev] ++
3,983,861 UART: [idev] CDI.KEYID = 6
3,984,831 UART: [idev] SUBJECT.KEYID = 7
3,986,046 UART: [idev] UDS.KEYID = 0
3,988,911 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,132,646 UART: [idev] Erasing UDS.KEYID = 0
7,322,326 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,577 UART: [idev] --
7,348,253 UART: [ldev] ++
7,348,830 UART: [ldev] CDI.KEYID = 6
7,349,852 UART: [ldev] SUBJECT.KEYID = 5
7,351,014 UART: [ldev] AUTHORITY.KEYID = 7
7,352,253 UART: [ldev] FE.KEYID = 1
7,396,235 UART: [ldev] Erasing FE.KEYID = 1
10,731,960 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,361 UART: [ldev] --
13,091,968 UART: [fwproc] Waiting for Commands...
13,094,833 UART: [fwproc] Received command 0x46574c44
13,097,045 UART: [fwproc] Received Image of size 114124 bytes
13,173,901 UART: ROM Fatal Error: 0x00B0003A
13,177,368 >>> mbox cmd response: failed
13,177,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,178,125 >>> mbox cmd response: failed
13,178,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,178,683 >>> mbox cmd response: failed
Initializing fuses
2,060,104 writing to cptra_bootfsm_go
2,249,426 UART:
2,249,787 UART: Running Caliptra ROM ...
2,250,931 UART:
2,251,100 UART: [state] CFI Enabled
2,310,233 UART: [state] LifecycleState = Unprovisioned
2,312,177 UART: [state] DebugLocked = No
2,314,817 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,429 UART: [kat] SHA2-256
2,490,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,648 UART: [kat] ++
2,501,290 UART: [kat] sha1
2,512,357 UART: [kat] SHA2-256
2,515,057 UART: [kat] SHA2-384
2,521,534 UART: [kat] SHA2-512-ACC
2,523,889 UART: [kat] ECC-384
4,814,698 UART: [kat] HMAC-384Kdf
4,846,696 UART: [kat] LMS
6,036,995 UART: [kat] --
6,041,849 UART: [cold-reset] ++
6,043,834 UART: [fht] Storing FHT @ 0x50003400
6,056,254 UART: [idev] ++
6,056,871 UART: [idev] CDI.KEYID = 6
6,057,810 UART: [idev] SUBJECT.KEYID = 7
6,059,033 UART: [idev] UDS.KEYID = 0
6,061,686 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,205,210 UART: [idev] Erasing UDS.KEYID = 0
9,396,229 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,293 UART: [idev] --
9,423,051 UART: [ldev] ++
9,423,632 UART: [ldev] CDI.KEYID = 6
9,424,652 UART: [ldev] SUBJECT.KEYID = 5
9,425,854 UART: [ldev] AUTHORITY.KEYID = 7
9,427,033 UART: [ldev] FE.KEYID = 1
9,467,768 UART: [ldev] Erasing FE.KEYID = 1
12,799,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,094,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,108,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,123,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,137,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,156,863 UART: [ldev] --
15,161,477 UART: [fwproc] Waiting for Commands...
15,163,683 UART: [fwproc] Received command 0x46574c44
15,165,869 UART: [fwproc] Received Image of size 114124 bytes
19,219,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,297,322 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,366,190 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,684,358 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,810,847 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,945,679 >>> mbox cmd response: failed
12,946,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,946,598 >>> mbox cmd response: failed
12,946,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,947,159 >>> mbox cmd response: failed
Initializing fuses
2,057,970 writing to cptra_bootfsm_go
5,859,118 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,910,550 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,567 UART:
192,921 UART: Running Caliptra ROM ...
194,008 UART:
603,953 UART: [state] CFI Enabled
619,893 UART: [state] LifecycleState = Unprovisioned
621,915 UART: [state] DebugLocked = No
624,077 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,786 UART: [kat] SHA2-256
799,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,090 UART: [kat] ++
810,540 UART: [kat] sha1
820,012 UART: [kat] SHA2-256
822,710 UART: [kat] SHA2-384
827,126 UART: [kat] SHA2-512-ACC
829,521 UART: [kat] ECC-384
3,113,409 UART: [kat] HMAC-384Kdf
3,125,966 UART: [kat] LMS
4,316,092 UART: [kat] --
4,321,293 UART: [cold-reset] ++
4,322,634 UART: [fht] Storing FHT @ 0x50003400
4,332,662 UART: [idev] ++
4,333,226 UART: [idev] CDI.KEYID = 6
4,334,241 UART: [idev] SUBJECT.KEYID = 7
4,335,453 UART: [idev] UDS.KEYID = 0
4,338,112 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,626 UART: [idev] Erasing UDS.KEYID = 0
7,618,544 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,952 UART: [idev] --
7,643,598 UART: [ldev] ++
7,644,168 UART: [ldev] CDI.KEYID = 6
7,645,146 UART: [ldev] SUBJECT.KEYID = 5
7,646,306 UART: [ldev] AUTHORITY.KEYID = 7
7,647,597 UART: [ldev] FE.KEYID = 1
7,658,674 UART: [ldev] Erasing FE.KEYID = 1
10,942,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,772 UART: [ldev] --
13,303,313 UART: [fwproc] Waiting for Commands...
13,305,626 UART: [fwproc] Received command 0x46574c44
13,307,813 UART: [fwproc] Received Image of size 114124 bytes
13,386,874 UART: ROM Fatal Error: 0x00B0003A
13,390,336 >>> mbox cmd response: failed
13,390,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,391,079 >>> mbox cmd response: failed
13,391,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,391,641 >>> mbox cmd response: failed
Initializing fuses
2,052,402 writing to cptra_bootfsm_go
2,241,740 UART:
2,242,119 UART: Running Caliptra ROM ...
2,243,261 UART:
7,065,981 UART: [state] CFI Enabled
7,082,231 UART: [state] LifecycleState = Unprovisioned
7,084,196 UART: [state] DebugLocked = No
7,086,894 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,092,346 UART: [kat] SHA2-256
7,262,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,272,652 UART: [kat] ++
7,273,140 UART: [kat] sha1
7,283,384 UART: [kat] SHA2-256
7,286,081 UART: [kat] SHA2-384
7,292,666 UART: [kat] SHA2-512-ACC
7,295,015 UART: [kat] ECC-384
9,576,942 UART: [kat] HMAC-384Kdf
9,588,145 UART: [kat] LMS
10,778,265 UART: [kat] --
10,782,871 UART: [cold-reset] ++
10,785,450 UART: [fht] Storing FHT @ 0x50003400
10,796,115 UART: [idev] ++
10,796,674 UART: [idev] CDI.KEYID = 6
10,797,608 UART: [idev] SUBJECT.KEYID = 7
10,798,876 UART: [idev] UDS.KEYID = 0
10,801,497 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,944,960 UART: [idev] Erasing UDS.KEYID = 0
14,088,798 UART: [idev] Using Sha1 for KeyId Algorithm
14,110,388 UART: [idev] --
14,115,009 UART: [ldev] ++
14,115,590 UART: [ldev] CDI.KEYID = 6
14,116,553 UART: [ldev] SUBJECT.KEYID = 5
14,117,803 UART: [ldev] AUTHORITY.KEYID = 7
14,119,041 UART: [ldev] FE.KEYID = 1
14,128,470 UART: [ldev] Erasing FE.KEYID = 1
17,420,115 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,712,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,726,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,741,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,756,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,775,703 UART: [ldev] --
19,779,945 UART: [fwproc] Waiting for Commands...
19,782,425 UART: [fwproc] Received command 0x46574c44
19,784,665 UART: [fwproc] Received Image of size 114124 bytes
23,830,910 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,909,091 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,978,005 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,295,582 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
4,133,251 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,136,243 >>> mbox cmd response: failed
13,136,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,137,316 >>> mbox cmd response: failed
13,137,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,137,826 >>> mbox cmd response: failed
Initializing fuses
2,049,550 writing to cptra_bootfsm_go
10,865,205 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,804,700 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,184 UART:
192,544 UART: Running Caliptra ROM ...
193,985 UART:
194,138 UART: [state] CFI Enabled
263,389 UART: [state] LifecycleState = Unprovisioned
265,236 UART: [state] DebugLocked = No
267,535 UART: [state] WD Timer not started. Device not locked for debugging
271,181 UART: [kat] SHA2-256
450,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,915 UART: [kat] ++
462,457 UART: [kat] sha1
472,932 UART: [kat] SHA2-256
475,945 UART: [kat] SHA2-384
481,436 UART: [kat] SHA2-512-ACC
484,419 UART: [kat] ECC-384
2,947,467 UART: [kat] HMAC-384Kdf
2,970,460 UART: [kat] LMS
3,499,934 UART: [kat] --
3,504,260 UART: [cold-reset] ++
3,506,513 UART: [fht] FHT @ 0x50003400
3,517,379 UART: [idev] ++
3,517,953 UART: [idev] CDI.KEYID = 6
3,518,969 UART: [idev] SUBJECT.KEYID = 7
3,520,071 UART: [idev] UDS.KEYID = 0
3,522,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,892 UART: [idev] Erasing UDS.KEYID = 0
6,025,427 UART: [idev] Sha1 KeyId Algorithm
6,049,436 UART: [idev] --
6,054,438 UART: [ldev] ++
6,055,022 UART: [ldev] CDI.KEYID = 6
6,056,094 UART: [ldev] SUBJECT.KEYID = 5
6,057,208 UART: [ldev] AUTHORITY.KEYID = 7
6,058,389 UART: [ldev] FE.KEYID = 1
6,099,822 UART: [ldev] Erasing FE.KEYID = 1
8,600,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,687 UART: [ldev] --
10,410,762 UART: [fwproc] Wait for Commands...
10,412,922 UART: [fwproc] Recv command 0x46574c44
10,415,022 UART: [fwproc] Recv'd Img size: 114448 bytes
10,495,230 UART: ROM Fatal Error: 0x00B0003A
10,498,366 >>> mbox cmd response: failed
10,498,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,148 >>> mbox cmd response: failed
10,499,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,824 >>> mbox cmd response: failed
Initializing fuses
2,056,677 writing to cptra_bootfsm_go
2,245,943 UART:
2,246,302 UART: Running Caliptra ROM ...
2,247,348 UART:
2,247,498 UART: [state] CFI Enabled
2,305,743 UART: [state] LifecycleState = Unprovisioned
2,307,606 UART: [state] DebugLocked = No
2,309,509 UART: [state] WD Timer not started. Device not locked for debugging
2,313,366 UART: [kat] SHA2-256
2,492,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,067 UART: [kat] ++
2,504,531 UART: [kat] sha1
2,514,714 UART: [kat] SHA2-256
2,517,738 UART: [kat] SHA2-384
2,524,327 UART: [kat] SHA2-512-ACC
2,527,275 UART: [kat] ECC-384
4,989,227 UART: [kat] HMAC-384Kdf
5,013,666 UART: [kat] LMS
5,543,080 UART: [kat] --
5,547,832 UART: [cold-reset] ++
5,549,550 UART: [fht] FHT @ 0x50003400
5,561,131 UART: [idev] ++
5,561,714 UART: [idev] CDI.KEYID = 6
5,562,626 UART: [idev] SUBJECT.KEYID = 7
5,563,789 UART: [idev] UDS.KEYID = 0
5,566,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,710,369 UART: [idev] Erasing UDS.KEYID = 0
8,066,884 UART: [idev] Sha1 KeyId Algorithm
8,089,250 UART: [idev] --
8,092,820 UART: [ldev] ++
8,093,554 UART: [ldev] CDI.KEYID = 6
8,094,546 UART: [ldev] SUBJECT.KEYID = 5
8,095,659 UART: [ldev] AUTHORITY.KEYID = 7
8,096,845 UART: [ldev] FE.KEYID = 1
8,141,841 UART: [ldev] Erasing FE.KEYID = 1
10,645,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,368 UART: [ldev] --
12,456,289 UART: [fwproc] Wait for Commands...
12,458,280 UART: [fwproc] Recv command 0x46574c44
12,460,380 UART: [fwproc] Recv'd Img size: 114448 bytes
15,860,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,933,106 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,001,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,320,981 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,383,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,284,152 >>> mbox cmd response: failed
10,284,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,285,211 >>> mbox cmd response: failed
10,285,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,285,772 >>> mbox cmd response: failed
Initializing fuses
2,055,508 writing to cptra_bootfsm_go
5,403,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,111,541 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
192,598 UART:
192,953 UART: Running Caliptra ROM ...
194,036 UART:
603,734 UART: [state] CFI Enabled
618,106 UART: [state] LifecycleState = Unprovisioned
620,023 UART: [state] DebugLocked = No
622,868 UART: [state] WD Timer not started. Device not locked for debugging
627,219 UART: [kat] SHA2-256
806,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,914 UART: [kat] ++
818,446 UART: [kat] sha1
828,089 UART: [kat] SHA2-256
831,087 UART: [kat] SHA2-384
837,869 UART: [kat] SHA2-512-ACC
840,851 UART: [kat] ECC-384
3,283,912 UART: [kat] HMAC-384Kdf
3,295,381 UART: [kat] LMS
3,824,872 UART: [kat] --
3,831,285 UART: [cold-reset] ++
3,832,997 UART: [fht] FHT @ 0x50003400
3,843,488 UART: [idev] ++
3,844,083 UART: [idev] CDI.KEYID = 6
3,845,003 UART: [idev] SUBJECT.KEYID = 7
3,846,167 UART: [idev] UDS.KEYID = 0
3,848,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,992,733 UART: [idev] Erasing UDS.KEYID = 0
6,315,577 UART: [idev] Sha1 KeyId Algorithm
6,337,100 UART: [idev] --
6,341,853 UART: [ldev] ++
6,342,421 UART: [ldev] CDI.KEYID = 6
6,343,307 UART: [ldev] SUBJECT.KEYID = 5
6,344,522 UART: [ldev] AUTHORITY.KEYID = 7
6,345,754 UART: [ldev] FE.KEYID = 1
6,354,107 UART: [ldev] Erasing FE.KEYID = 1
8,827,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,769 UART: [ldev] --
10,619,742 UART: [fwproc] Wait for Commands...
10,622,112 UART: [fwproc] Recv command 0x46574c44
10,624,258 UART: [fwproc] Recv'd Img size: 114448 bytes
10,698,410 UART: ROM Fatal Error: 0x00B0003A
10,701,511 >>> mbox cmd response: failed
10,701,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,702,315 >>> mbox cmd response: failed
10,702,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,702,907 >>> mbox cmd response: failed
Initializing fuses
2,050,970 writing to cptra_bootfsm_go
2,240,319 UART:
2,240,674 UART: Running Caliptra ROM ...
2,241,810 UART:
9,748,346 UART: [state] CFI Enabled
9,764,623 UART: [state] LifecycleState = Unprovisioned
9,766,518 UART: [state] DebugLocked = No
9,769,259 UART: [state] WD Timer not started. Device not locked for debugging
9,772,734 UART: [kat] SHA2-256
9,951,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,963,447 UART: [kat] ++
9,963,994 UART: [kat] sha1
9,973,322 UART: [kat] SHA2-256
9,976,387 UART: [kat] SHA2-384
9,982,910 UART: [kat] SHA2-512-ACC
9,985,905 UART: [kat] ECC-384
12,425,593 UART: [kat] HMAC-384Kdf
12,437,336 UART: [kat] LMS
12,966,848 UART: [kat] --
12,970,086 UART: [cold-reset] ++
12,971,529 UART: [fht] FHT @ 0x50003400
12,981,049 UART: [idev] ++
12,981,617 UART: [idev] CDI.KEYID = 6
12,982,527 UART: [idev] SUBJECT.KEYID = 7
12,983,740 UART: [idev] UDS.KEYID = 0
12,986,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,130,338 UART: [idev] Erasing UDS.KEYID = 0
15,453,318 UART: [idev] Sha1 KeyId Algorithm
15,476,122 UART: [idev] --
15,479,845 UART: [ldev] ++
15,480,414 UART: [ldev] CDI.KEYID = 6
15,481,322 UART: [ldev] SUBJECT.KEYID = 5
15,482,558 UART: [ldev] AUTHORITY.KEYID = 7
15,483,793 UART: [ldev] FE.KEYID = 1
15,495,590 UART: [ldev] Erasing FE.KEYID = 1
17,970,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,686,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,702,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,717,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,733,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,755,638 UART: [ldev] --
19,760,468 UART: [fwproc] Wait for Commands...
19,763,256 UART: [fwproc] Recv command 0x46574c44
19,765,310 UART: [fwproc] Recv'd Img size: 114448 bytes
23,171,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,238,539 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,307,298 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,625,903 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
3,699,738 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,482,707 >>> mbox cmd response: failed
10,483,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,483,576 >>> mbox cmd response: failed
10,483,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,484,139 >>> mbox cmd response: failed
Initializing fuses
2,054,346 writing to cptra_bootfsm_go
13,070,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,645,105 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,442,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,326,740 >>> mbox cmd response: failed
10,327,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,327,671 >>> mbox cmd response: failed
10,327,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,328,244 >>> mbox cmd response: failed
Initializing fuses
2,056,473 writing to cptra_bootfsm_go
5,485,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,787,869 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,755,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,534,310 >>> mbox cmd response: failed
10,534,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,535,186 >>> mbox cmd response: failed
10,535,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,535,746 >>> mbox cmd response: failed
Initializing fuses
2,048,252 writing to cptra_bootfsm_go
13,081,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,287,336 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,249 UART: [kat] SHA2-256
882,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,295 UART: [kat] ++
886,447 UART: [kat] sha1
890,673 UART: [kat] SHA2-256
892,611 UART: [kat] SHA2-384
895,162 UART: [kat] SHA2-512-ACC
897,063 UART: [kat] ECC-384
902,614 UART: [kat] HMAC-384Kdf
907,094 UART: [kat] LMS
1,475,290 UART: [kat] --
1,476,079 UART: [cold-reset] ++
1,476,605 UART: [fht] Storing FHT @ 0x50003400
1,479,452 UART: [idev] ++
1,479,620 UART: [idev] CDI.KEYID = 6
1,479,980 UART: [idev] SUBJECT.KEYID = 7
1,480,404 UART: [idev] UDS.KEYID = 0
1,480,749 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,534 UART: [idev] Erasing UDS.KEYID = 0
1,505,266 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,888 UART: [idev] --
1,514,811 UART: [ldev] ++
1,514,979 UART: [ldev] CDI.KEYID = 6
1,515,342 UART: [ldev] SUBJECT.KEYID = 5
1,515,768 UART: [ldev] AUTHORITY.KEYID = 7
1,516,231 UART: [ldev] FE.KEYID = 1
1,521,387 UART: [ldev] Erasing FE.KEYID = 1
1,546,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,764 UART: [ldev] --
1,586,189 UART: [fwproc] Waiting for Commands...
1,586,956 UART: [fwproc] Received command 0x46574c44
1,587,747 UART: [fwproc] Received Image of size 114448 bytes
1,612,760 UART: ROM Fatal Error: 0x00B0003A
1,613,921 >>> mbox cmd response: failed
1,613,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,927 >>> mbox cmd response: failed
1,613,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,933 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,747 UART: [kat] SHA2-256
881,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,793 UART: [kat] ++
885,945 UART: [kat] sha1
890,111 UART: [kat] SHA2-256
892,049 UART: [kat] SHA2-384
894,868 UART: [kat] SHA2-512-ACC
896,769 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
907,086 UART: [kat] LMS
1,475,282 UART: [kat] --
1,475,919 UART: [cold-reset] ++
1,476,359 UART: [fht] Storing FHT @ 0x50003400
1,479,074 UART: [idev] ++
1,479,242 UART: [idev] CDI.KEYID = 6
1,479,602 UART: [idev] SUBJECT.KEYID = 7
1,480,026 UART: [idev] UDS.KEYID = 0
1,480,371 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,642 UART: [idev] Erasing UDS.KEYID = 0
1,503,956 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,512 UART: [idev] --
1,513,511 UART: [ldev] ++
1,513,679 UART: [ldev] CDI.KEYID = 6
1,514,042 UART: [ldev] SUBJECT.KEYID = 5
1,514,468 UART: [ldev] AUTHORITY.KEYID = 7
1,514,931 UART: [ldev] FE.KEYID = 1
1,519,993 UART: [ldev] Erasing FE.KEYID = 1
1,545,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,232 UART: [ldev] --
1,584,515 UART: [fwproc] Waiting for Commands...
1,585,278 UART: [fwproc] Received command 0x46574c44
1,586,069 UART: [fwproc] Received Image of size 114448 bytes
2,885,227 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,427 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,934 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,466,264 >>> mbox cmd response: failed
1,466,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,270 >>> mbox cmd response: failed
1,466,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,927,162 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,410 UART: [kat] SHA2-256
882,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,456 UART: [kat] ++
886,608 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
903,133 UART: [kat] HMAC-384Kdf
907,685 UART: [kat] LMS
1,475,881 UART: [kat] --
1,476,720 UART: [cold-reset] ++
1,477,124 UART: [fht] Storing FHT @ 0x50003400
1,479,879 UART: [idev] ++
1,480,047 UART: [idev] CDI.KEYID = 6
1,480,407 UART: [idev] SUBJECT.KEYID = 7
1,480,831 UART: [idev] UDS.KEYID = 0
1,481,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,865 UART: [idev] Erasing UDS.KEYID = 0
1,505,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,187 UART: [idev] --
1,515,154 UART: [ldev] ++
1,515,322 UART: [ldev] CDI.KEYID = 6
1,515,685 UART: [ldev] SUBJECT.KEYID = 5
1,516,111 UART: [ldev] AUTHORITY.KEYID = 7
1,516,574 UART: [ldev] FE.KEYID = 1
1,522,046 UART: [ldev] Erasing FE.KEYID = 1
1,547,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,637 UART: [ldev] --
1,587,020 UART: [fwproc] Waiting for Commands...
1,587,635 UART: [fwproc] Received command 0x46574c44
1,588,426 UART: [fwproc] Received Image of size 114448 bytes
1,614,961 UART: ROM Fatal Error: 0x00B0003A
1,616,122 >>> mbox cmd response: failed
1,616,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,128 >>> mbox cmd response: failed
1,616,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,134 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,873 UART: [state] LifecycleState = Unprovisioned
85,528 UART: [state] DebugLocked = No
86,070 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,696 UART: [kat] SHA2-256
881,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,742 UART: [kat] ++
885,894 UART: [kat] sha1
890,300 UART: [kat] SHA2-256
892,238 UART: [kat] SHA2-384
895,073 UART: [kat] SHA2-512-ACC
896,974 UART: [kat] ECC-384
902,787 UART: [kat] HMAC-384Kdf
907,435 UART: [kat] LMS
1,475,631 UART: [kat] --
1,476,698 UART: [cold-reset] ++
1,477,064 UART: [fht] Storing FHT @ 0x50003400
1,479,953 UART: [idev] ++
1,480,121 UART: [idev] CDI.KEYID = 6
1,480,481 UART: [idev] SUBJECT.KEYID = 7
1,480,905 UART: [idev] UDS.KEYID = 0
1,481,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,801 UART: [idev] Erasing UDS.KEYID = 0
1,505,515 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,021 UART: [idev] --
1,515,038 UART: [ldev] ++
1,515,206 UART: [ldev] CDI.KEYID = 6
1,515,569 UART: [ldev] SUBJECT.KEYID = 5
1,515,995 UART: [ldev] AUTHORITY.KEYID = 7
1,516,458 UART: [ldev] FE.KEYID = 1
1,521,712 UART: [ldev] Erasing FE.KEYID = 1
1,547,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,373 UART: [ldev] --
1,586,676 UART: [fwproc] Waiting for Commands...
1,587,393 UART: [fwproc] Received command 0x46574c44
1,588,184 UART: [fwproc] Received Image of size 114448 bytes
2,887,342 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,294 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,671 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,467,393 >>> mbox cmd response: failed
1,467,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,399 >>> mbox cmd response: failed
1,467,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,980 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,929 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,591 UART: [kat] SHA2-256
903,531 UART: [kat] SHA2-384
906,276 UART: [kat] SHA2-512-ACC
908,177 UART: [kat] ECC-384
917,798 UART: [kat] HMAC-384Kdf
922,238 UART: [kat] LMS
1,170,566 UART: [kat] --
1,171,187 UART: [cold-reset] ++
1,171,703 UART: [fht] FHT @ 0x50003400
1,174,436 UART: [idev] ++
1,174,604 UART: [idev] CDI.KEYID = 6
1,174,964 UART: [idev] SUBJECT.KEYID = 7
1,175,388 UART: [idev] UDS.KEYID = 0
1,175,733 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,518 UART: [idev] Erasing UDS.KEYID = 0
1,200,363 UART: [idev] Sha1 KeyId Algorithm
1,208,887 UART: [idev] --
1,210,017 UART: [ldev] ++
1,210,185 UART: [ldev] CDI.KEYID = 6
1,210,548 UART: [ldev] SUBJECT.KEYID = 5
1,210,974 UART: [ldev] AUTHORITY.KEYID = 7
1,211,437 UART: [ldev] FE.KEYID = 1
1,216,891 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,145 UART: [ldev] --
1,282,452 UART: [fwproc] Wait for Commands...
1,283,252 UART: [fwproc] Recv command 0x46574c44
1,283,980 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,407 UART: ROM Fatal Error: 0x00B0003A
1,310,568 >>> mbox cmd response: failed
1,310,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,574 >>> mbox cmd response: failed
1,310,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
893,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,413 UART: [kat] ++
897,565 UART: [kat] sha1
901,829 UART: [kat] SHA2-256
903,769 UART: [kat] SHA2-384
906,664 UART: [kat] SHA2-512-ACC
908,565 UART: [kat] ECC-384
918,124 UART: [kat] HMAC-384Kdf
922,754 UART: [kat] LMS
1,171,082 UART: [kat] --
1,171,783 UART: [cold-reset] ++
1,172,125 UART: [fht] FHT @ 0x50003400
1,174,694 UART: [idev] ++
1,174,862 UART: [idev] CDI.KEYID = 6
1,175,222 UART: [idev] SUBJECT.KEYID = 7
1,175,646 UART: [idev] UDS.KEYID = 0
1,175,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,856 UART: [idev] Erasing UDS.KEYID = 0
1,200,911 UART: [idev] Sha1 KeyId Algorithm
1,209,381 UART: [idev] --
1,210,443 UART: [ldev] ++
1,210,611 UART: [ldev] CDI.KEYID = 6
1,210,974 UART: [ldev] SUBJECT.KEYID = 5
1,211,400 UART: [ldev] AUTHORITY.KEYID = 7
1,211,863 UART: [ldev] FE.KEYID = 1
1,216,939 UART: [ldev] Erasing FE.KEYID = 1
1,242,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,373 UART: [ldev] --
1,282,794 UART: [fwproc] Wait for Commands...
1,283,582 UART: [fwproc] Recv command 0x46574c44
1,284,310 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,958 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,023 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,165,461 >>> mbox cmd response: failed
1,165,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,467 >>> mbox cmd response: failed
1,165,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,945 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,764 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
893,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,898 UART: [kat] ++
898,050 UART: [kat] sha1
902,182 UART: [kat] SHA2-256
904,122 UART: [kat] SHA2-384
906,871 UART: [kat] SHA2-512-ACC
908,772 UART: [kat] ECC-384
919,117 UART: [kat] HMAC-384Kdf
923,853 UART: [kat] LMS
1,172,181 UART: [kat] --
1,172,958 UART: [cold-reset] ++
1,173,524 UART: [fht] FHT @ 0x50003400
1,176,085 UART: [idev] ++
1,176,253 UART: [idev] CDI.KEYID = 6
1,176,613 UART: [idev] SUBJECT.KEYID = 7
1,177,037 UART: [idev] UDS.KEYID = 0
1,177,382 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,895 UART: [idev] Erasing UDS.KEYID = 0
1,202,336 UART: [idev] Sha1 KeyId Algorithm
1,210,828 UART: [idev] --
1,211,832 UART: [ldev] ++
1,212,000 UART: [ldev] CDI.KEYID = 6
1,212,363 UART: [ldev] SUBJECT.KEYID = 5
1,212,789 UART: [ldev] AUTHORITY.KEYID = 7
1,213,252 UART: [ldev] FE.KEYID = 1
1,218,440 UART: [ldev] Erasing FE.KEYID = 1
1,244,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,858 UART: [ldev] --
1,284,209 UART: [fwproc] Wait for Commands...
1,284,789 UART: [fwproc] Recv command 0x46574c44
1,285,517 UART: [fwproc] Recv'd Img size: 114448 bytes
1,310,550 UART: ROM Fatal Error: 0x00B0003A
1,311,711 >>> mbox cmd response: failed
1,311,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,717 >>> mbox cmd response: failed
1,311,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,289 UART: [kat] SHA2-256
893,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,064 UART: [kat] ++
898,216 UART: [kat] sha1
902,272 UART: [kat] SHA2-256
904,212 UART: [kat] SHA2-384
907,045 UART: [kat] SHA2-512-ACC
908,946 UART: [kat] ECC-384
918,853 UART: [kat] HMAC-384Kdf
923,613 UART: [kat] LMS
1,171,941 UART: [kat] --
1,172,780 UART: [cold-reset] ++
1,173,298 UART: [fht] FHT @ 0x50003400
1,175,891 UART: [idev] ++
1,176,059 UART: [idev] CDI.KEYID = 6
1,176,419 UART: [idev] SUBJECT.KEYID = 7
1,176,843 UART: [idev] UDS.KEYID = 0
1,177,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,883 UART: [idev] Erasing UDS.KEYID = 0
1,201,684 UART: [idev] Sha1 KeyId Algorithm
1,210,026 UART: [idev] --
1,211,202 UART: [ldev] ++
1,211,370 UART: [ldev] CDI.KEYID = 6
1,211,733 UART: [ldev] SUBJECT.KEYID = 5
1,212,159 UART: [ldev] AUTHORITY.KEYID = 7
1,212,622 UART: [ldev] FE.KEYID = 1
1,217,914 UART: [ldev] Erasing FE.KEYID = 1
1,244,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,798 UART: [ldev] --
1,284,177 UART: [fwproc] Wait for Commands...
1,284,921 UART: [fwproc] Recv command 0x46574c44
1,285,649 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,302 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,166,300 >>> mbox cmd response: failed
1,166,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,306 >>> mbox cmd response: failed
1,166,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,576 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,307 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,144 UART: [kat] SHA2-512-ACC
906,045 UART: [kat] ECC-384
915,740 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,172,951 UART: [idev] ++
1,173,119 UART: [idev] CDI.KEYID = 6
1,173,480 UART: [idev] SUBJECT.KEYID = 7
1,173,905 UART: [idev] UDS.KEYID = 0
1,174,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,857 UART: [idev] Sha1 KeyId Algorithm
1,207,707 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,058 UART: [ldev] Erasing FE.KEYID = 1
1,241,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,252 UART: [ldev] --
1,280,526 UART: [fwproc] Wait for Commands...
1,281,311 UART: [fwproc] Recv command 0x46574c44
1,282,044 UART: [fwproc] Recv'd Img size: 114448 bytes
1,308,141 UART: ROM Fatal Error: 0x00B0003A
1,309,302 >>> mbox cmd response: failed
1,309,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,308 >>> mbox cmd response: failed
1,309,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,877 UART: [state] WD Timer not started. Device not locked for debugging
88,092 UART: [kat] SHA2-256
891,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,771 UART: [kat] ++
895,923 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
915,990 UART: [kat] HMAC-384Kdf
920,588 UART: [kat] LMS
1,168,900 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,303 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,174,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,021 UART: [idev] Erasing UDS.KEYID = 0
1,199,099 UART: [idev] Sha1 KeyId Algorithm
1,208,031 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,410 UART: [ldev] Erasing FE.KEYID = 1
1,241,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,638 UART: [ldev] --
1,280,910 UART: [fwproc] Wait for Commands...
1,281,689 UART: [fwproc] Recv command 0x46574c44
1,282,422 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,741 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,084 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,162,383 >>> mbox cmd response: failed
1,162,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,389 >>> mbox cmd response: failed
1,162,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,860 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,743 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,913 UART: [kat] SHA2-512-ACC
906,814 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,729 UART: [kat] LMS
1,169,041 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,478 UART: [fht] FHT @ 0x50003400
1,173,058 UART: [idev] ++
1,173,226 UART: [idev] CDI.KEYID = 6
1,173,587 UART: [idev] SUBJECT.KEYID = 7
1,174,012 UART: [idev] UDS.KEYID = 0
1,174,358 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,220 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,292 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,215,847 UART: [ldev] Erasing FE.KEYID = 1
1,242,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,223 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,508 UART: [fwproc] Recv command 0x46574c44
1,283,241 UART: [fwproc] Recv'd Img size: 114448 bytes
1,309,386 UART: ROM Fatal Error: 0x00B0003A
1,310,547 >>> mbox cmd response: failed
1,310,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,553 >>> mbox cmd response: failed
1,310,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,595 UART: [kat] SHA2-256
891,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,274 UART: [kat] ++
895,426 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,487 UART: [kat] HMAC-384Kdf
921,069 UART: [kat] LMS
1,169,381 UART: [kat] --
1,170,342 UART: [cold-reset] ++
1,170,770 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,174,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,200,116 UART: [idev] Sha1 KeyId Algorithm
1,209,110 UART: [idev] --
1,210,137 UART: [ldev] ++
1,210,305 UART: [ldev] CDI.KEYID = 6
1,210,669 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,807 UART: [ldev] Erasing FE.KEYID = 1
1,243,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,041 UART: [ldev] --
1,283,337 UART: [fwproc] Wait for Commands...
1,284,080 UART: [fwproc] Recv command 0x46574c44
1,284,813 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,919 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,373 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,163,244 >>> mbox cmd response: failed
1,163,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,250 >>> mbox cmd response: failed
1,163,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,954 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,046 UART:
192,419 UART: Running Caliptra ROM ...
193,554 UART:
193,702 UART: [state] CFI Enabled
264,589 UART: [state] LifecycleState = Unprovisioned
266,482 UART: [state] DebugLocked = No
268,729 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,100 UART: [kat] SHA2-256
443,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,229 UART: [kat] ++
454,710 UART: [kat] sha1
465,695 UART: [kat] SHA2-256
468,394 UART: [kat] SHA2-384
473,621 UART: [kat] SHA2-512-ACC
475,964 UART: [kat] ECC-384
2,765,683 UART: [kat] HMAC-384Kdf
2,778,312 UART: [kat] LMS
3,968,611 UART: [kat] --
3,972,349 UART: [cold-reset] ++
3,973,260 UART: [fht] Storing FHT @ 0x50003400
3,984,721 UART: [idev] ++
3,985,338 UART: [idev] CDI.KEYID = 6
3,986,217 UART: [idev] SUBJECT.KEYID = 7
3,987,488 UART: [idev] UDS.KEYID = 0
3,990,313 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,134,487 UART: [idev] Erasing UDS.KEYID = 0
7,321,735 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,563 UART: [idev] --
7,348,483 UART: [ldev] ++
7,349,055 UART: [ldev] CDI.KEYID = 6
7,350,000 UART: [ldev] SUBJECT.KEYID = 5
7,351,220 UART: [ldev] AUTHORITY.KEYID = 7
7,352,454 UART: [ldev] FE.KEYID = 1
7,400,619 UART: [ldev] Erasing FE.KEYID = 1
10,731,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,812 UART: [ldev] --
13,091,408 UART: [fwproc] Waiting for Commands...
13,094,272 UART: [fwproc] Received command 0x46574c44
13,096,464 UART: [fwproc] Received Image of size 114124 bytes
16,859,063 UART: ROM Fatal Error: 0x000B0033
16,862,474 >>> mbox cmd response: failed
16,862,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,863,194 >>> mbox cmd response: failed
16,863,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,863,796 >>> mbox cmd response: failed
Initializing fuses
2,056,401 writing to cptra_bootfsm_go
2,245,684 UART:
2,246,037 UART: Running Caliptra ROM ...
2,247,112 UART:
2,247,267 UART: [state] CFI Enabled
2,317,676 UART: [state] LifecycleState = Unprovisioned
2,319,612 UART: [state] DebugLocked = No
2,322,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,171 UART: [kat] SHA2-256
2,496,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,348 UART: [kat] ++
2,507,808 UART: [kat] sha1
2,518,910 UART: [kat] SHA2-256
2,521,609 UART: [kat] SHA2-384
2,526,521 UART: [kat] SHA2-512-ACC
2,528,873 UART: [kat] ECC-384
4,823,127 UART: [kat] HMAC-384Kdf
4,853,881 UART: [kat] LMS
6,044,188 UART: [kat] --
6,051,053 UART: [cold-reset] ++
6,053,360 UART: [fht] Storing FHT @ 0x50003400
6,066,209 UART: [idev] ++
6,066,788 UART: [idev] CDI.KEYID = 6
6,067,755 UART: [idev] SUBJECT.KEYID = 7
6,068,970 UART: [idev] UDS.KEYID = 0
6,071,960 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,215,867 UART: [idev] Erasing UDS.KEYID = 0
9,412,611 UART: [idev] Using Sha1 for KeyId Algorithm
9,434,099 UART: [idev] --
9,436,745 UART: [ldev] ++
9,437,322 UART: [ldev] CDI.KEYID = 6
9,438,294 UART: [ldev] SUBJECT.KEYID = 5
9,439,507 UART: [ldev] AUTHORITY.KEYID = 7
9,440,743 UART: [ldev] FE.KEYID = 1
9,488,013 UART: [ldev] Erasing FE.KEYID = 1
12,820,272 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,136,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,150,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,165,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,180,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,199,505 UART: [ldev] --
15,204,503 UART: [fwproc] Waiting for Commands...
15,206,561 UART: [fwproc] Received command 0x46574c44
15,208,744 UART: [fwproc] Received Image of size 114124 bytes
19,262,937 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,330,920 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,399,853 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,716,904 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,808,989 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,038,022 >>> mbox cmd response: failed
16,038,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,038,975 >>> mbox cmd response: failed
16,039,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,039,551 >>> mbox cmd response: failed
Initializing fuses
2,048,791 writing to cptra_bootfsm_go
5,834,262 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,894,209 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,442 UART:
192,821 UART: Running Caliptra ROM ...
194,199 UART:
603,629 UART: [state] CFI Enabled
617,316 UART: [state] LifecycleState = Unprovisioned
619,201 UART: [state] DebugLocked = No
620,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,833 UART: [kat] SHA2-256
795,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,133 UART: [kat] ++
806,580 UART: [kat] sha1
816,051 UART: [kat] SHA2-256
818,787 UART: [kat] SHA2-384
825,035 UART: [kat] SHA2-512-ACC
827,380 UART: [kat] ECC-384
3,111,799 UART: [kat] HMAC-384Kdf
3,123,011 UART: [kat] LMS
4,313,104 UART: [kat] --
4,318,901 UART: [cold-reset] ++
4,320,296 UART: [fht] Storing FHT @ 0x50003400
4,332,158 UART: [idev] ++
4,332,731 UART: [idev] CDI.KEYID = 6
4,333,667 UART: [idev] SUBJECT.KEYID = 7
4,334,935 UART: [idev] UDS.KEYID = 0
4,337,661 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,205 UART: [idev] Erasing UDS.KEYID = 0
7,628,659 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,056 UART: [idev] --
7,654,541 UART: [ldev] ++
7,655,118 UART: [ldev] CDI.KEYID = 6
7,656,134 UART: [ldev] SUBJECT.KEYID = 5
7,657,290 UART: [ldev] AUTHORITY.KEYID = 7
7,658,519 UART: [ldev] FE.KEYID = 1
7,669,055 UART: [ldev] Erasing FE.KEYID = 1
10,955,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,610 UART: [ldev] --
13,315,878 UART: [fwproc] Waiting for Commands...
13,318,726 UART: [fwproc] Received command 0x46574c44
13,320,922 UART: [fwproc] Received Image of size 114124 bytes
17,081,891 UART: ROM Fatal Error: 0x000B0033
17,085,299 >>> mbox cmd response: failed
17,085,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,086,103 >>> mbox cmd response: failed
17,086,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,086,671 >>> mbox cmd response: failed
Initializing fuses
2,052,672 writing to cptra_bootfsm_go
2,241,981 UART:
2,242,325 UART: Running Caliptra ROM ...
2,243,399 UART:
3,384,280 UART: [state] CFI Enabled
3,397,276 UART: [state] LifecycleState = Unprovisioned
3,399,194 UART: [state] DebugLocked = No
3,400,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,405,604 UART: [kat] SHA2-256
3,575,380 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,585,906 UART: [kat] ++
3,586,544 UART: [kat] sha1
3,597,004 UART: [kat] SHA2-256
3,599,707 UART: [kat] SHA2-384
3,604,452 UART: [kat] SHA2-512-ACC
3,606,853 UART: [kat] ECC-384
5,891,083 UART: [kat] HMAC-384Kdf
5,902,833 UART: [kat] LMS
7,092,929 UART: [kat] --
7,097,053 UART: [cold-reset] ++
7,099,642 UART: [fht] Storing FHT @ 0x50003400
7,110,800 UART: [idev] ++
7,111,416 UART: [idev] CDI.KEYID = 6
7,112,301 UART: [idev] SUBJECT.KEYID = 7
7,113,580 UART: [idev] UDS.KEYID = 0
7,116,044 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
7,259,361 UART: [idev] Erasing UDS.KEYID = 0
10,399,608 UART: [idev] Using Sha1 for KeyId Algorithm
10,420,941 UART: [idev] --
10,425,869 UART: [ldev] ++
10,426,436 UART: [ldev] CDI.KEYID = 6
10,427,414 UART: [ldev] SUBJECT.KEYID = 5
10,428,793 UART: [ldev] AUTHORITY.KEYID = 7
10,429,974 UART: [ldev] FE.KEYID = 1
10,439,708 UART: [ldev] Erasing FE.KEYID = 1
13,728,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,020,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,035,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,049,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,064,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,084,616 UART: [ldev] --
16,088,718 UART: [fwproc] Waiting for Commands...
16,090,822 UART: [fwproc] Received command 0x46574c44
16,093,011 UART: [fwproc] Received Image of size 114124 bytes
20,151,677 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,224,960 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,293,873 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,610,625 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,129,790 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
16,506,954 >>> mbox cmd response: failed
16,507,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,507,903 >>> mbox cmd response: failed
16,508,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,508,456 >>> mbox cmd response: failed
Initializing fuses
2,046,005 writing to cptra_bootfsm_go
7,482,139 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
21,421,527 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
192,298 UART:
192,667 UART: Running Caliptra ROM ...
193,789 UART:
193,933 UART: [state] CFI Enabled
262,805 UART: [state] LifecycleState = Unprovisioned
264,694 UART: [state] DebugLocked = No
267,050 UART: [state] WD Timer not started. Device not locked for debugging
270,191 UART: [kat] SHA2-256
449,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,881 UART: [kat] ++
461,416 UART: [kat] sha1
471,871 UART: [kat] SHA2-256
474,936 UART: [kat] SHA2-384
479,993 UART: [kat] SHA2-512-ACC
482,925 UART: [kat] ECC-384
2,928,303 UART: [kat] HMAC-384Kdf
2,950,306 UART: [kat] LMS
3,479,764 UART: [kat] --
3,485,226 UART: [cold-reset] ++
3,486,462 UART: [fht] FHT @ 0x50003400
3,497,399 UART: [idev] ++
3,498,030 UART: [idev] CDI.KEYID = 6
3,498,926 UART: [idev] SUBJECT.KEYID = 7
3,500,055 UART: [idev] UDS.KEYID = 0
3,502,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,647,016 UART: [idev] Erasing UDS.KEYID = 0
6,004,739 UART: [idev] Sha1 KeyId Algorithm
6,026,789 UART: [idev] --
6,030,678 UART: [ldev] ++
6,031,247 UART: [ldev] CDI.KEYID = 6
6,032,136 UART: [ldev] SUBJECT.KEYID = 5
6,033,243 UART: [ldev] AUTHORITY.KEYID = 7
6,034,587 UART: [ldev] FE.KEYID = 1
6,077,998 UART: [ldev] Erasing FE.KEYID = 1
8,582,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,657 UART: [ldev] --
10,391,289 UART: [fwproc] Wait for Commands...
10,393,921 UART: [fwproc] Recv command 0x46574c44
10,396,019 UART: [fwproc] Recv'd Img size: 114448 bytes
12,041,432 UART: ROM Fatal Error: 0x000B0033
12,044,555 >>> mbox cmd response: failed
12,044,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,045,263 >>> mbox cmd response: failed
12,045,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,045,861 >>> mbox cmd response: failed
Initializing fuses
2,049,374 writing to cptra_bootfsm_go
2,238,665 UART:
2,239,033 UART: Running Caliptra ROM ...
2,240,079 UART:
2,240,232 UART: [state] CFI Enabled
2,316,529 UART: [state] LifecycleState = Unprovisioned
2,318,410 UART: [state] DebugLocked = No
2,320,365 UART: [state] WD Timer not started. Device not locked for debugging
2,323,298 UART: [kat] SHA2-256
2,502,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,010 UART: [kat] ++
2,514,471 UART: [kat] sha1
2,525,895 UART: [kat] SHA2-256
2,528,903 UART: [kat] SHA2-384
2,536,288 UART: [kat] SHA2-512-ACC
2,539,239 UART: [kat] ECC-384
4,998,332 UART: [kat] HMAC-384Kdf
5,024,018 UART: [kat] LMS
5,553,467 UART: [kat] --
5,556,541 UART: [cold-reset] ++
5,558,311 UART: [fht] FHT @ 0x50003400
5,569,398 UART: [idev] ++
5,569,961 UART: [idev] CDI.KEYID = 6
5,570,869 UART: [idev] SUBJECT.KEYID = 7
5,572,083 UART: [idev] UDS.KEYID = 0
5,574,600 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,697 UART: [idev] Erasing UDS.KEYID = 0
8,081,070 UART: [idev] Sha1 KeyId Algorithm
8,104,362 UART: [idev] --
8,108,524 UART: [ldev] ++
8,109,108 UART: [ldev] CDI.KEYID = 6
8,110,019 UART: [ldev] SUBJECT.KEYID = 5
8,111,183 UART: [ldev] AUTHORITY.KEYID = 7
8,112,419 UART: [ldev] FE.KEYID = 1
8,152,313 UART: [ldev] Erasing FE.KEYID = 1
10,655,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,903 UART: [ldev] --
12,466,731 UART: [fwproc] Wait for Commands...
12,469,260 UART: [fwproc] Recv command 0x46574c44
12,471,356 UART: [fwproc] Recv'd Img size: 114448 bytes
15,873,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,942,335 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,011,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,328,569 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
3,362,975 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,747,066 >>> mbox cmd response: failed
11,747,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,748,014 >>> mbox cmd response: failed
11,748,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,748,626 >>> mbox cmd response: failed
Initializing fuses
2,044,950 writing to cptra_bootfsm_go
5,415,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,104,658 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
192,580 UART:
192,929 UART: Running Caliptra ROM ...
194,106 UART:
603,523 UART: [state] CFI Enabled
613,700 UART: [state] LifecycleState = Unprovisioned
615,542 UART: [state] DebugLocked = No
617,375 UART: [state] WD Timer not started. Device not locked for debugging
621,143 UART: [kat] SHA2-256
800,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,846 UART: [kat] ++
812,289 UART: [kat] sha1
823,217 UART: [kat] SHA2-256
826,292 UART: [kat] SHA2-384
833,454 UART: [kat] SHA2-512-ACC
836,447 UART: [kat] ECC-384
3,280,460 UART: [kat] HMAC-384Kdf
3,292,424 UART: [kat] LMS
3,821,924 UART: [kat] --
3,826,327 UART: [cold-reset] ++
3,827,801 UART: [fht] FHT @ 0x50003400
3,839,054 UART: [idev] ++
3,839,623 UART: [idev] CDI.KEYID = 6
3,840,558 UART: [idev] SUBJECT.KEYID = 7
3,841,768 UART: [idev] UDS.KEYID = 0
3,844,417 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,318 UART: [idev] Erasing UDS.KEYID = 0
6,314,908 UART: [idev] Sha1 KeyId Algorithm
6,339,332 UART: [idev] --
6,343,509 UART: [ldev] ++
6,344,080 UART: [ldev] CDI.KEYID = 6
6,344,996 UART: [ldev] SUBJECT.KEYID = 5
6,346,212 UART: [ldev] AUTHORITY.KEYID = 7
6,347,441 UART: [ldev] FE.KEYID = 1
6,357,278 UART: [ldev] Erasing FE.KEYID = 1
8,827,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,431 UART: [ldev] --
10,620,830 UART: [fwproc] Wait for Commands...
10,622,764 UART: [fwproc] Recv command 0x46574c44
10,624,867 UART: [fwproc] Recv'd Img size: 114448 bytes
12,268,624 UART: ROM Fatal Error: 0x000B0033
12,271,748 >>> mbox cmd response: failed
12,272,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,272,487 >>> mbox cmd response: failed
12,272,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,273,044 >>> mbox cmd response: failed
Initializing fuses
2,055,750 writing to cptra_bootfsm_go
2,245,035 UART:
2,245,376 UART: Running Caliptra ROM ...
2,246,514 UART:
8,182,562 UART: [state] CFI Enabled
8,197,896 UART: [state] LifecycleState = Unprovisioned
8,199,736 UART: [state] DebugLocked = No
8,201,643 UART: [state] WD Timer not started. Device not locked for debugging
8,204,746 UART: [kat] SHA2-256
8,383,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,395,439 UART: [kat] ++
8,395,900 UART: [kat] sha1
8,406,677 UART: [kat] SHA2-256
8,409,690 UART: [kat] SHA2-384
8,414,769 UART: [kat] SHA2-512-ACC
8,417,716 UART: [kat] ECC-384
10,857,560 UART: [kat] HMAC-384Kdf
10,869,361 UART: [kat] LMS
11,398,881 UART: [kat] --
11,404,504 UART: [cold-reset] ++
11,406,059 UART: [fht] FHT @ 0x50003400
11,417,632 UART: [idev] ++
11,418,200 UART: [idev] CDI.KEYID = 6
11,419,130 UART: [idev] SUBJECT.KEYID = 7
11,420,288 UART: [idev] UDS.KEYID = 0
11,423,188 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,567,042 UART: [idev] Erasing UDS.KEYID = 0
13,895,368 UART: [idev] Sha1 KeyId Algorithm
13,919,356 UART: [idev] --
13,923,565 UART: [ldev] ++
13,924,133 UART: [ldev] CDI.KEYID = 6
13,925,014 UART: [ldev] SUBJECT.KEYID = 5
13,926,228 UART: [ldev] AUTHORITY.KEYID = 7
13,927,463 UART: [ldev] FE.KEYID = 1
13,938,512 UART: [ldev] Erasing FE.KEYID = 1
16,412,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,128,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,144,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,160,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,176,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,196,842 UART: [ldev] --
18,201,551 UART: [fwproc] Wait for Commands...
18,204,415 UART: [fwproc] Recv command 0x46574c44
18,206,514 UART: [fwproc] Recv'd Img size: 114448 bytes
21,606,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,680,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,749,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
22,067,410 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
3,695,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,948,107 >>> mbox cmd response: failed
11,948,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,949,002 >>> mbox cmd response: failed
11,949,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,949,521 >>> mbox cmd response: failed
Initializing fuses
2,052,569 writing to cptra_bootfsm_go
11,608,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,173,036 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,422,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,835,238 >>> mbox cmd response: failed
11,836,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,836,653 >>> mbox cmd response: failed
11,836,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,837,214 >>> mbox cmd response: failed
Initializing fuses
2,045,050 writing to cptra_bootfsm_go
5,470,099 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,762,973 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,758,675 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,090,177 >>> mbox cmd response: failed
12,090,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,091,100 >>> mbox cmd response: failed
12,091,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,091,670 >>> mbox cmd response: failed
Initializing fuses
2,045,950 writing to cptra_bootfsm_go
11,527,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,730,403 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,927 UART: [kat] SHA2-256
881,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,973 UART: [kat] ++
886,125 UART: [kat] sha1
890,283 UART: [kat] SHA2-256
892,221 UART: [kat] SHA2-384
894,972 UART: [kat] SHA2-512-ACC
896,873 UART: [kat] ECC-384
902,664 UART: [kat] HMAC-384Kdf
907,190 UART: [kat] LMS
1,475,386 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,821 UART: [fht] Storing FHT @ 0x50003400
1,479,534 UART: [idev] ++
1,479,702 UART: [idev] CDI.KEYID = 6
1,480,062 UART: [idev] SUBJECT.KEYID = 7
1,480,486 UART: [idev] UDS.KEYID = 0
1,480,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,636 UART: [idev] Erasing UDS.KEYID = 0
1,505,770 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,468 UART: [idev] --
1,515,289 UART: [ldev] ++
1,515,457 UART: [ldev] CDI.KEYID = 6
1,515,820 UART: [ldev] SUBJECT.KEYID = 5
1,516,246 UART: [ldev] AUTHORITY.KEYID = 7
1,516,709 UART: [ldev] FE.KEYID = 1
1,521,759 UART: [ldev] Erasing FE.KEYID = 1
1,547,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,136 UART: [ldev] --
1,586,433 UART: [fwproc] Waiting for Commands...
1,587,272 UART: [fwproc] Received command 0x46574c44
1,588,063 UART: [fwproc] Received Image of size 114448 bytes
2,763,106 UART: ROM Fatal Error: 0x000B0033
2,764,263 >>> mbox cmd response: failed
2,764,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,269 >>> mbox cmd response: failed
2,764,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,275 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,115 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,667 UART: [kat] SHA2-256
881,598 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,713 UART: [kat] ++
885,865 UART: [kat] sha1
890,131 UART: [kat] SHA2-256
892,069 UART: [kat] SHA2-384
894,732 UART: [kat] SHA2-512-ACC
896,633 UART: [kat] ECC-384
902,280 UART: [kat] HMAC-384Kdf
907,042 UART: [kat] LMS
1,475,238 UART: [kat] --
1,476,061 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,472 UART: [idev] ++
1,479,640 UART: [idev] CDI.KEYID = 6
1,480,000 UART: [idev] SUBJECT.KEYID = 7
1,480,424 UART: [idev] UDS.KEYID = 0
1,480,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,140 UART: [idev] Erasing UDS.KEYID = 0
1,504,434 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,928 UART: [idev] --
1,513,971 UART: [ldev] ++
1,514,139 UART: [ldev] CDI.KEYID = 6
1,514,502 UART: [ldev] SUBJECT.KEYID = 5
1,514,928 UART: [ldev] AUTHORITY.KEYID = 7
1,515,391 UART: [ldev] FE.KEYID = 1
1,520,351 UART: [ldev] Erasing FE.KEYID = 1
1,545,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,838 UART: [ldev] --
1,585,241 UART: [fwproc] Waiting for Commands...
1,586,002 UART: [fwproc] Received command 0x46574c44
1,586,793 UART: [fwproc] Received Image of size 114448 bytes
2,885,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,667 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,019 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,966 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,617,542 >>> mbox cmd response: failed
2,617,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,617,548 >>> mbox cmd response: failed
2,617,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,617,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,038 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,382 UART: [kat] SHA2-256
882,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,428 UART: [kat] ++
886,580 UART: [kat] sha1
890,570 UART: [kat] SHA2-256
892,508 UART: [kat] SHA2-384
895,233 UART: [kat] SHA2-512-ACC
897,134 UART: [kat] ECC-384
903,055 UART: [kat] HMAC-384Kdf
907,569 UART: [kat] LMS
1,475,765 UART: [kat] --
1,476,904 UART: [cold-reset] ++
1,477,450 UART: [fht] Storing FHT @ 0x50003400
1,480,283 UART: [idev] ++
1,480,451 UART: [idev] CDI.KEYID = 6
1,480,811 UART: [idev] SUBJECT.KEYID = 7
1,481,235 UART: [idev] UDS.KEYID = 0
1,481,580 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,385 UART: [idev] Erasing UDS.KEYID = 0
1,506,127 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,969 UART: [idev] --
1,515,904 UART: [ldev] ++
1,516,072 UART: [ldev] CDI.KEYID = 6
1,516,435 UART: [ldev] SUBJECT.KEYID = 5
1,516,861 UART: [ldev] AUTHORITY.KEYID = 7
1,517,324 UART: [ldev] FE.KEYID = 1
1,522,516 UART: [ldev] Erasing FE.KEYID = 1
1,547,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,761 UART: [ldev] --
1,587,032 UART: [fwproc] Waiting for Commands...
1,587,731 UART: [fwproc] Received command 0x46574c44
1,588,522 UART: [fwproc] Received Image of size 114448 bytes
2,612,089 UART: ROM Fatal Error: 0x000B0033
2,613,246 >>> mbox cmd response: failed
2,613,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,613,252 >>> mbox cmd response: failed
2,613,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,613,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,882 UART: [kat] SHA2-256
881,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,928 UART: [kat] ++
886,080 UART: [kat] sha1
890,440 UART: [kat] SHA2-256
892,378 UART: [kat] SHA2-384
895,085 UART: [kat] SHA2-512-ACC
896,986 UART: [kat] ECC-384
902,829 UART: [kat] HMAC-384Kdf
907,609 UART: [kat] LMS
1,475,805 UART: [kat] --
1,476,778 UART: [cold-reset] ++
1,477,302 UART: [fht] Storing FHT @ 0x50003400
1,480,011 UART: [idev] ++
1,480,179 UART: [idev] CDI.KEYID = 6
1,480,539 UART: [idev] SUBJECT.KEYID = 7
1,480,963 UART: [idev] UDS.KEYID = 0
1,481,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,323 UART: [idev] Erasing UDS.KEYID = 0
1,505,647 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,321 UART: [idev] --
1,515,388 UART: [ldev] ++
1,515,556 UART: [ldev] CDI.KEYID = 6
1,515,919 UART: [ldev] SUBJECT.KEYID = 5
1,516,345 UART: [ldev] AUTHORITY.KEYID = 7
1,516,808 UART: [ldev] FE.KEYID = 1
1,522,058 UART: [ldev] Erasing FE.KEYID = 1
1,546,767 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,919 UART: [ldev] --
1,586,356 UART: [fwproc] Waiting for Commands...
1,587,209 UART: [fwproc] Received command 0x46574c44
1,588,000 UART: [fwproc] Received Image of size 114448 bytes
2,888,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,446 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,947 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,579,612 >>> mbox cmd response: failed
2,579,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,618 >>> mbox cmd response: failed
2,579,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,101 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,670 UART: [state] LifecycleState = Unprovisioned
86,325 UART: [state] DebugLocked = No
87,025 UART: [state] WD Timer not started. Device not locked for debugging
88,354 UART: [kat] SHA2-256
894,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,129 UART: [kat] ++
898,281 UART: [kat] sha1
902,549 UART: [kat] SHA2-256
904,489 UART: [kat] SHA2-384
907,210 UART: [kat] SHA2-512-ACC
909,111 UART: [kat] ECC-384
918,380 UART: [kat] HMAC-384Kdf
922,920 UART: [kat] LMS
1,171,248 UART: [kat] --
1,172,211 UART: [cold-reset] ++
1,172,647 UART: [fht] FHT @ 0x50003400
1,175,246 UART: [idev] ++
1,175,414 UART: [idev] CDI.KEYID = 6
1,175,774 UART: [idev] SUBJECT.KEYID = 7
1,176,198 UART: [idev] UDS.KEYID = 0
1,176,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,204 UART: [idev] Erasing UDS.KEYID = 0
1,201,389 UART: [idev] Sha1 KeyId Algorithm
1,209,767 UART: [idev] --
1,210,699 UART: [ldev] ++
1,210,867 UART: [ldev] CDI.KEYID = 6
1,211,230 UART: [ldev] SUBJECT.KEYID = 5
1,211,656 UART: [ldev] AUTHORITY.KEYID = 7
1,212,119 UART: [ldev] FE.KEYID = 1
1,217,623 UART: [ldev] Erasing FE.KEYID = 1
1,244,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,001 UART: [ldev] --
1,283,288 UART: [fwproc] Wait for Commands...
1,283,998 UART: [fwproc] Recv command 0x46574c44
1,284,726 UART: [fwproc] Recv'd Img size: 114448 bytes
1,587,509 UART: ROM Fatal Error: 0x000B0033
1,588,666 >>> mbox cmd response: failed
1,588,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,588,672 >>> mbox cmd response: failed
1,588,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,588,678 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,693 UART: [kat] SHA2-256
903,633 UART: [kat] SHA2-384
906,212 UART: [kat] SHA2-512-ACC
908,113 UART: [kat] ECC-384
917,808 UART: [kat] HMAC-384Kdf
922,556 UART: [kat] LMS
1,170,884 UART: [kat] --
1,171,733 UART: [cold-reset] ++
1,172,307 UART: [fht] FHT @ 0x50003400
1,174,992 UART: [idev] ++
1,175,160 UART: [idev] CDI.KEYID = 6
1,175,520 UART: [idev] SUBJECT.KEYID = 7
1,175,944 UART: [idev] UDS.KEYID = 0
1,176,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,975 UART: [idev] Sha1 KeyId Algorithm
1,208,263 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,854 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,215,765 UART: [ldev] Erasing FE.KEYID = 1
1,241,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,583 UART: [ldev] --
1,281,046 UART: [fwproc] Wait for Commands...
1,281,864 UART: [fwproc] Recv command 0x46574c44
1,282,592 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,091 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,441,945 >>> mbox cmd response: failed
1,441,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,951 >>> mbox cmd response: failed
1,441,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,605 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,178 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
893,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,858 UART: [kat] ++
898,010 UART: [kat] sha1
902,030 UART: [kat] SHA2-256
903,970 UART: [kat] SHA2-384
906,649 UART: [kat] SHA2-512-ACC
908,550 UART: [kat] ECC-384
918,169 UART: [kat] HMAC-384Kdf
922,791 UART: [kat] LMS
1,171,119 UART: [kat] --
1,172,372 UART: [cold-reset] ++
1,172,720 UART: [fht] FHT @ 0x50003400
1,175,607 UART: [idev] ++
1,175,775 UART: [idev] CDI.KEYID = 6
1,176,135 UART: [idev] SUBJECT.KEYID = 7
1,176,559 UART: [idev] UDS.KEYID = 0
1,176,904 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,683 UART: [idev] Erasing UDS.KEYID = 0
1,201,542 UART: [idev] Sha1 KeyId Algorithm
1,209,830 UART: [idev] --
1,210,778 UART: [ldev] ++
1,210,946 UART: [ldev] CDI.KEYID = 6
1,211,309 UART: [ldev] SUBJECT.KEYID = 5
1,211,735 UART: [ldev] AUTHORITY.KEYID = 7
1,212,198 UART: [ldev] FE.KEYID = 1
1,217,512 UART: [ldev] Erasing FE.KEYID = 1
1,244,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,048 UART: [ldev] --
1,283,493 UART: [fwproc] Wait for Commands...
1,284,087 UART: [fwproc] Recv command 0x46574c44
1,284,815 UART: [fwproc] Recv'd Img size: 114448 bytes
1,599,961 UART: ROM Fatal Error: 0x000B0033
1,601,118 >>> mbox cmd response: failed
1,601,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,601,124 >>> mbox cmd response: failed
1,601,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,601,130 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,360 UART: [kat] SHA2-256
904,300 UART: [kat] SHA2-384
907,129 UART: [kat] SHA2-512-ACC
909,030 UART: [kat] ECC-384
918,771 UART: [kat] HMAC-384Kdf
923,617 UART: [kat] LMS
1,171,945 UART: [kat] --
1,172,766 UART: [cold-reset] ++
1,173,314 UART: [fht] FHT @ 0x50003400
1,175,799 UART: [idev] ++
1,175,967 UART: [idev] CDI.KEYID = 6
1,176,327 UART: [idev] SUBJECT.KEYID = 7
1,176,751 UART: [idev] UDS.KEYID = 0
1,177,096 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,311 UART: [idev] Erasing UDS.KEYID = 0
1,201,646 UART: [idev] Sha1 KeyId Algorithm
1,210,116 UART: [idev] --
1,211,328 UART: [ldev] ++
1,211,496 UART: [ldev] CDI.KEYID = 6
1,211,859 UART: [ldev] SUBJECT.KEYID = 5
1,212,285 UART: [ldev] AUTHORITY.KEYID = 7
1,212,748 UART: [ldev] FE.KEYID = 1
1,217,774 UART: [ldev] Erasing FE.KEYID = 1
1,244,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,036 UART: [ldev] --
1,283,531 UART: [fwproc] Wait for Commands...
1,284,301 UART: [fwproc] Recv command 0x46574c44
1,285,029 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,146 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,444,601 >>> mbox cmd response: failed
1,444,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,607 >>> mbox cmd response: failed
1,444,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,613 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,100 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,057 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,262 UART: [kat] SHA2-256
890,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,941 UART: [kat] ++
895,093 UART: [kat] sha1
899,347 UART: [kat] SHA2-256
901,287 UART: [kat] SHA2-384
903,822 UART: [kat] SHA2-512-ACC
905,723 UART: [kat] ECC-384
915,610 UART: [kat] HMAC-384Kdf
920,320 UART: [kat] LMS
1,168,632 UART: [kat] --
1,169,257 UART: [cold-reset] ++
1,169,721 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,173,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,531 UART: [idev] Erasing UDS.KEYID = 0
1,198,439 UART: [idev] Sha1 KeyId Algorithm
1,207,231 UART: [idev] --
1,208,238 UART: [ldev] ++
1,208,406 UART: [ldev] CDI.KEYID = 6
1,208,770 UART: [ldev] SUBJECT.KEYID = 5
1,209,197 UART: [ldev] AUTHORITY.KEYID = 7
1,209,660 UART: [ldev] FE.KEYID = 1
1,214,914 UART: [ldev] Erasing FE.KEYID = 1
1,241,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,706 UART: [ldev] --
1,281,020 UART: [fwproc] Wait for Commands...
1,281,643 UART: [fwproc] Recv command 0x46574c44
1,282,376 UART: [fwproc] Recv'd Img size: 114448 bytes
1,594,397 UART: ROM Fatal Error: 0x000B0033
1,595,554 >>> mbox cmd response: failed
1,595,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,595,560 >>> mbox cmd response: failed
1,595,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,595,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,067 UART: [kat] ++
895,219 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,528 UART: [kat] HMAC-384Kdf
920,192 UART: [kat] LMS
1,168,504 UART: [kat] --
1,169,433 UART: [cold-reset] ++
1,169,951 UART: [fht] FHT @ 0x50003400
1,172,643 UART: [idev] ++
1,172,811 UART: [idev] CDI.KEYID = 6
1,173,172 UART: [idev] SUBJECT.KEYID = 7
1,173,597 UART: [idev] UDS.KEYID = 0
1,173,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,549 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,207,433 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,215,092 UART: [ldev] Erasing FE.KEYID = 1
1,241,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,054 UART: [ldev] --
1,280,336 UART: [fwproc] Wait for Commands...
1,281,057 UART: [fwproc] Recv command 0x46574c44
1,281,790 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,721 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,441,498 >>> mbox cmd response: failed
1,441,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,504 >>> mbox cmd response: failed
1,441,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,948 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,003 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,905 UART: [state] LifecycleState = Unprovisioned
86,560 UART: [state] DebugLocked = No
87,166 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
891,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,062 UART: [kat] ++
896,214 UART: [kat] sha1
900,570 UART: [kat] SHA2-256
902,510 UART: [kat] SHA2-384
905,393 UART: [kat] SHA2-512-ACC
907,294 UART: [kat] ECC-384
917,179 UART: [kat] HMAC-384Kdf
921,847 UART: [kat] LMS
1,170,159 UART: [kat] --
1,171,116 UART: [cold-reset] ++
1,171,456 UART: [fht] FHT @ 0x50003400
1,173,986 UART: [idev] ++
1,174,154 UART: [idev] CDI.KEYID = 6
1,174,515 UART: [idev] SUBJECT.KEYID = 7
1,174,940 UART: [idev] UDS.KEYID = 0
1,175,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,876 UART: [idev] Erasing UDS.KEYID = 0
1,199,578 UART: [idev] Sha1 KeyId Algorithm
1,208,538 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,309 UART: [ldev] Erasing FE.KEYID = 1
1,242,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,545 UART: [ldev] --
1,282,009 UART: [fwproc] Wait for Commands...
1,282,768 UART: [fwproc] Recv command 0x46574c44
1,283,501 UART: [fwproc] Recv'd Img size: 114448 bytes
1,588,271 UART: ROM Fatal Error: 0x000B0033
1,589,428 >>> mbox cmd response: failed
1,589,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,434 >>> mbox cmd response: failed
1,589,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,440 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,328 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,293 UART: [kat] SHA2-512-ACC
906,194 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,170,002 UART: [cold-reset] ++
1,170,392 UART: [fht] FHT @ 0x50003400
1,173,068 UART: [idev] ++
1,173,236 UART: [idev] CDI.KEYID = 6
1,173,597 UART: [idev] SUBJECT.KEYID = 7
1,174,022 UART: [idev] UDS.KEYID = 0
1,174,368 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,088 UART: [idev] Erasing UDS.KEYID = 0
1,199,048 UART: [idev] Sha1 KeyId Algorithm
1,207,880 UART: [idev] --
1,209,113 UART: [ldev] ++
1,209,281 UART: [ldev] CDI.KEYID = 6
1,209,645 UART: [ldev] SUBJECT.KEYID = 5
1,210,072 UART: [ldev] AUTHORITY.KEYID = 7
1,210,535 UART: [ldev] FE.KEYID = 1
1,215,631 UART: [ldev] Erasing FE.KEYID = 1
1,241,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,193 UART: [ldev] --
1,280,699 UART: [fwproc] Wait for Commands...
1,281,316 UART: [fwproc] Recv command 0x46574c44
1,282,049 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,566 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,439,442 >>> mbox cmd response: failed
1,439,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,439,448 >>> mbox cmd response: failed
1,439,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,439,454 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,309 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,962 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
4,878,727 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,327,000 >>> mbox cmd response: failed
15,327,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,328,010 >>> mbox cmd response: failed
15,328,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,328,584 >>> mbox cmd response: failed
Initializing fuses
2,051,360 writing to cptra_bootfsm_go
6,910,020 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,467,861 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
4,883,333 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,307,143 >>> mbox cmd response: failed
15,307,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,308,159 >>> mbox cmd response: failed
15,308,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,308,724 >>> mbox cmd response: failed
Initializing fuses
2,051,532 writing to cptra_bootfsm_go
6,905,482 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,497,003 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
5,188,872 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,497,370 >>> mbox cmd response: failed
15,498,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,498,353 >>> mbox cmd response: failed
15,498,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,498,917 >>> mbox cmd response: failed
Initializing fuses
2,054,837 writing to cptra_bootfsm_go
9,544,411 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,985,536 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
5,191,223 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,501,698 >>> mbox cmd response: failed
15,502,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,502,646 >>> mbox cmd response: failed
15,502,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,503,209 >>> mbox cmd response: failed
Initializing fuses
2,056,657 writing to cptra_bootfsm_go
9,544,602 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
22,976,493 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
3,456,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,434,930 >>> mbox cmd response: failed
11,435,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,435,866 >>> mbox cmd response: failed
11,436,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,436,433 >>> mbox cmd response: failed
Initializing fuses
2,048,110 writing to cptra_bootfsm_go
5,501,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,295,997 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,445,216 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,420,991 >>> mbox cmd response: failed
11,421,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,421,895 >>> mbox cmd response: failed
11,422,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,422,456 >>> mbox cmd response: failed
Initializing fuses
2,049,891 writing to cptra_bootfsm_go
5,522,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,345,233 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,517 writing to cptra_bootfsm_go
3,783,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,656,362 >>> mbox cmd response: failed
11,656,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,657,246 >>> mbox cmd response: failed
11,657,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,657,846 >>> mbox cmd response: failed
Initializing fuses
2,054,328 writing to cptra_bootfsm_go
11,984,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,702,556 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
3,783,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,646,810 >>> mbox cmd response: failed
11,647,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,647,743 >>> mbox cmd response: failed
11,648,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,648,303 >>> mbox cmd response: failed
Initializing fuses
2,049,420 writing to cptra_bootfsm_go
12,003,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,739,586 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,466,547 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,445,935 >>> mbox cmd response: failed
11,446,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,447,119 >>> mbox cmd response: failed
11,447,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,447,683 >>> mbox cmd response: failed
Initializing fuses
2,051,015 writing to cptra_bootfsm_go
5,489,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,355,898 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,784,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
11,652,865 >>> mbox cmd response: failed
11,653,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,653,964 >>> mbox cmd response: failed
11,654,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,654,526 >>> mbox cmd response: failed
Initializing fuses
2,051,923 writing to cptra_bootfsm_go
11,997,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
22,719,962 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,989 >>> mbox cmd response: failed
1,196,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,995 >>> mbox cmd response: failed
1,196,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,271 UART: [kat] SHA2-256
882,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,317 UART: [kat] ++
886,469 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,208 UART: [kat] SHA2-512-ACC
897,109 UART: [kat] ECC-384
903,032 UART: [kat] HMAC-384Kdf
907,406 UART: [kat] LMS
1,475,602 UART: [kat] --
1,476,449 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,822 UART: [idev] ++
1,479,990 UART: [idev] CDI.KEYID = 6
1,480,350 UART: [idev] SUBJECT.KEYID = 7
1,480,774 UART: [idev] UDS.KEYID = 0
1,481,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,826 UART: [idev] Erasing UDS.KEYID = 0
1,506,134 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,944 UART: [idev] --
1,515,879 UART: [ldev] ++
1,516,047 UART: [ldev] CDI.KEYID = 6
1,516,410 UART: [ldev] SUBJECT.KEYID = 5
1,516,836 UART: [ldev] AUTHORITY.KEYID = 7
1,517,299 UART: [ldev] FE.KEYID = 1
1,522,289 UART: [ldev] Erasing FE.KEYID = 1
1,547,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,800 UART: [ldev] --
1,587,119 UART: [fwproc] Waiting for Commands...
1,587,738 UART: [fwproc] Received command 0x46574c44
1,588,529 UART: [fwproc] Received Image of size 114448 bytes
2,888,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,705 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,057 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,102 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,198,437 >>> mbox cmd response: failed
1,198,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,443 >>> mbox cmd response: failed
1,198,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,449 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,482 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,998 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,198,564 >>> mbox cmd response: failed
1,198,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,570 >>> mbox cmd response: failed
1,198,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,132 UART: [kat] SHA2-256
882,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,178 UART: [kat] ++
886,330 UART: [kat] sha1
890,668 UART: [kat] SHA2-256
892,606 UART: [kat] SHA2-384
895,327 UART: [kat] SHA2-512-ACC
897,228 UART: [kat] ECC-384
902,769 UART: [kat] HMAC-384Kdf
907,493 UART: [kat] LMS
1,475,689 UART: [kat] --
1,476,730 UART: [cold-reset] ++
1,477,284 UART: [fht] Storing FHT @ 0x50003400
1,480,135 UART: [idev] ++
1,480,303 UART: [idev] CDI.KEYID = 6
1,480,663 UART: [idev] SUBJECT.KEYID = 7
1,481,087 UART: [idev] UDS.KEYID = 0
1,481,432 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,189 UART: [idev] Erasing UDS.KEYID = 0
1,506,031 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,651 UART: [idev] --
1,515,668 UART: [ldev] ++
1,515,836 UART: [ldev] CDI.KEYID = 6
1,516,199 UART: [ldev] SUBJECT.KEYID = 5
1,516,625 UART: [ldev] AUTHORITY.KEYID = 7
1,517,088 UART: [ldev] FE.KEYID = 1
1,522,266 UART: [ldev] Erasing FE.KEYID = 1
1,547,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,633 UART: [ldev] --
1,587,036 UART: [fwproc] Waiting for Commands...
1,587,721 UART: [fwproc] Received command 0x46574c44
1,588,512 UART: [fwproc] Received Image of size 114448 bytes
2,888,500 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,340 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,645 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,348 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,668 >>> mbox cmd response: failed
1,197,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,674 >>> mbox cmd response: failed
1,197,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,820 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,397 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,194,881 >>> mbox cmd response: failed
1,194,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,887 >>> mbox cmd response: failed
1,194,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
893,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,275 UART: [kat] ++
897,427 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,180 UART: [kat] SHA2-512-ACC
908,081 UART: [kat] ECC-384
917,696 UART: [kat] HMAC-384Kdf
922,182 UART: [kat] LMS
1,170,510 UART: [kat] --
1,171,449 UART: [cold-reset] ++
1,171,899 UART: [fht] FHT @ 0x50003400
1,174,580 UART: [idev] ++
1,174,748 UART: [idev] CDI.KEYID = 6
1,175,108 UART: [idev] SUBJECT.KEYID = 7
1,175,532 UART: [idev] UDS.KEYID = 0
1,175,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,802 UART: [idev] Erasing UDS.KEYID = 0
1,199,851 UART: [idev] Sha1 KeyId Algorithm
1,208,243 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,984 UART: [ldev] SUBJECT.KEYID = 5
1,210,410 UART: [ldev] AUTHORITY.KEYID = 7
1,210,873 UART: [ldev] FE.KEYID = 1
1,215,741 UART: [ldev] Erasing FE.KEYID = 1
1,242,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,771 UART: [ldev] --
1,281,104 UART: [fwproc] Wait for Commands...
1,281,740 UART: [fwproc] Recv command 0x46574c44
1,282,468 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,597 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,987 >>> mbox cmd response: failed
1,196,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,993 >>> mbox cmd response: failed
1,196,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,773 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,188 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,712 >>> mbox cmd response: failed
1,196,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,718 >>> mbox cmd response: failed
1,196,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,724 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,911 UART: [kat] SHA2-512-ACC
908,812 UART: [kat] ECC-384
919,077 UART: [kat] HMAC-384Kdf
923,787 UART: [kat] LMS
1,172,115 UART: [kat] --
1,172,990 UART: [cold-reset] ++
1,173,536 UART: [fht] FHT @ 0x50003400
1,176,355 UART: [idev] ++
1,176,523 UART: [idev] CDI.KEYID = 6
1,176,883 UART: [idev] SUBJECT.KEYID = 7
1,177,307 UART: [idev] UDS.KEYID = 0
1,177,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,259 UART: [idev] Erasing UDS.KEYID = 0
1,202,464 UART: [idev] Sha1 KeyId Algorithm
1,210,992 UART: [idev] --
1,212,074 UART: [ldev] ++
1,212,242 UART: [ldev] CDI.KEYID = 6
1,212,605 UART: [ldev] SUBJECT.KEYID = 5
1,213,031 UART: [ldev] AUTHORITY.KEYID = 7
1,213,494 UART: [ldev] FE.KEYID = 1
1,218,838 UART: [ldev] Erasing FE.KEYID = 1
1,245,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,896 UART: [ldev] --
1,284,345 UART: [fwproc] Wait for Commands...
1,284,963 UART: [fwproc] Recv command 0x46574c44
1,285,691 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,160 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,199,386 >>> mbox cmd response: failed
1,199,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,392 >>> mbox cmd response: failed
1,199,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,864 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,655 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,321 >>> mbox cmd response: failed
1,197,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,327 >>> mbox cmd response: failed
1,197,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
915,614 UART: [kat] HMAC-384Kdf
920,266 UART: [kat] LMS
1,168,578 UART: [kat] --
1,169,511 UART: [cold-reset] ++
1,169,851 UART: [fht] FHT @ 0x50003400
1,172,523 UART: [idev] ++
1,172,691 UART: [idev] CDI.KEYID = 6
1,173,052 UART: [idev] SUBJECT.KEYID = 7
1,173,477 UART: [idev] UDS.KEYID = 0
1,173,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,143 UART: [idev] Erasing UDS.KEYID = 0
1,197,581 UART: [idev] Sha1 KeyId Algorithm
1,206,297 UART: [idev] --
1,207,344 UART: [ldev] ++
1,207,512 UART: [ldev] CDI.KEYID = 6
1,207,876 UART: [ldev] SUBJECT.KEYID = 5
1,208,303 UART: [ldev] AUTHORITY.KEYID = 7
1,208,766 UART: [ldev] FE.KEYID = 1
1,214,256 UART: [ldev] Erasing FE.KEYID = 1
1,240,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,382 UART: [ldev] --
1,279,656 UART: [fwproc] Wait for Commands...
1,280,295 UART: [fwproc] Recv command 0x46574c44
1,281,028 UART: [fwproc] Recv'd Img size: 114448 bytes
2,579,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,254 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,772,473 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,119 >>> mbox cmd response: failed
1,197,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,125 >>> mbox cmd response: failed
1,197,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,818 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,933 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,682 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,196,930 >>> mbox cmd response: failed
1,196,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,936 >>> mbox cmd response: failed
1,196,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,712 UART: [kat] ++
895,864 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,967 UART: [kat] SHA2-512-ACC
906,868 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,245 UART: [kat] LMS
1,169,557 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,440 UART: [idev] ++
1,173,608 UART: [idev] CDI.KEYID = 6
1,173,969 UART: [idev] SUBJECT.KEYID = 7
1,174,394 UART: [idev] UDS.KEYID = 0
1,174,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,644 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,676 UART: [idev] --
1,209,933 UART: [ldev] ++
1,210,101 UART: [ldev] CDI.KEYID = 6
1,210,465 UART: [ldev] SUBJECT.KEYID = 5
1,210,892 UART: [ldev] AUTHORITY.KEYID = 7
1,211,355 UART: [ldev] FE.KEYID = 1
1,216,611 UART: [ldev] Erasing FE.KEYID = 1
1,243,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,361 UART: [fwproc] Wait for Commands...
1,283,152 UART: [fwproc] Recv command 0x46574c44
1,283,885 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,890 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,780 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,197,616 >>> mbox cmd response: failed
1,197,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,622 >>> mbox cmd response: failed
1,197,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,503 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,870 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
4,869,205 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,969,055 >>> mbox cmd response: failed
13,969,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,970,042 >>> mbox cmd response: failed
13,970,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,970,609 >>> mbox cmd response: failed
Initializing fuses
2,060,710 writing to cptra_bootfsm_go
6,937,557 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,554,121 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
4,884,223 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,000,516 >>> mbox cmd response: failed
14,001,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,001,540 >>> mbox cmd response: failed
14,001,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,002,116 >>> mbox cmd response: failed
Initializing fuses
2,059,418 writing to cptra_bootfsm_go
6,940,819 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,548,434 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
5,188,466 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,156,209 >>> mbox cmd response: failed
14,156,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,157,293 >>> mbox cmd response: failed
14,157,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,157,916 >>> mbox cmd response: failed
Initializing fuses
2,059,676 writing to cptra_bootfsm_go
10,890,282 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,363,098 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
5,187,321 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
14,171,167 >>> mbox cmd response: failed
14,171,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,172,129 >>> mbox cmd response: failed
14,172,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,172,706 >>> mbox cmd response: failed
Initializing fuses
2,052,919 writing to cptra_bootfsm_go
10,889,320 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,367,576 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,484,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,424,979 >>> mbox cmd response: failed
10,425,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,425,876 >>> mbox cmd response: failed
10,426,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,426,460 >>> mbox cmd response: failed
Initializing fuses
2,050,914 writing to cptra_bootfsm_go
5,535,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,425,509 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,467,659 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,396,549 >>> mbox cmd response: failed
10,397,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,397,572 >>> mbox cmd response: failed
10,397,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,398,159 >>> mbox cmd response: failed
Initializing fuses
2,057,199 writing to cptra_bootfsm_go
5,477,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,354,418 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,251 writing to cptra_bootfsm_go
3,791,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,642,869 >>> mbox cmd response: failed
10,643,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,643,807 >>> mbox cmd response: failed
10,644,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,644,368 >>> mbox cmd response: failed
Initializing fuses
2,055,258 writing to cptra_bootfsm_go
13,005,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,757,854 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
3,791,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,650,560 >>> mbox cmd response: failed
10,651,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,651,657 >>> mbox cmd response: failed
10,651,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,652,233 >>> mbox cmd response: failed
Initializing fuses
2,054,517 writing to cptra_bootfsm_go
12,991,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,753,038 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,463,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,410,557 >>> mbox cmd response: failed
10,411,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,411,762 >>> mbox cmd response: failed
10,412,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,412,333 >>> mbox cmd response: failed
Initializing fuses
2,058,647 writing to cptra_bootfsm_go
5,486,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,362,797 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,784,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,638,849 >>> mbox cmd response: failed
10,639,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,639,984 >>> mbox cmd response: failed
10,640,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,640,548 >>> mbox cmd response: failed
Initializing fuses
2,054,720 writing to cptra_bootfsm_go
13,012,060 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,789,883 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,957 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,177,831 >>> mbox cmd response: failed
1,177,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,837 >>> mbox cmd response: failed
1,177,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,843 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,935 UART: [kat] SHA2-256
881,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,981 UART: [kat] ++
886,133 UART: [kat] sha1
890,471 UART: [kat] SHA2-256
892,409 UART: [kat] SHA2-384
895,168 UART: [kat] SHA2-512-ACC
897,069 UART: [kat] ECC-384
902,804 UART: [kat] HMAC-384Kdf
907,468 UART: [kat] LMS
1,475,664 UART: [kat] --
1,476,611 UART: [cold-reset] ++
1,476,983 UART: [fht] Storing FHT @ 0x50003400
1,479,838 UART: [idev] ++
1,480,006 UART: [idev] CDI.KEYID = 6
1,480,366 UART: [idev] SUBJECT.KEYID = 7
1,480,790 UART: [idev] UDS.KEYID = 0
1,481,135 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,010 UART: [idev] Erasing UDS.KEYID = 0
1,505,434 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,178 UART: [idev] --
1,515,037 UART: [ldev] ++
1,515,205 UART: [ldev] CDI.KEYID = 6
1,515,568 UART: [ldev] SUBJECT.KEYID = 5
1,515,994 UART: [ldev] AUTHORITY.KEYID = 7
1,516,457 UART: [ldev] FE.KEYID = 1
1,521,675 UART: [ldev] Erasing FE.KEYID = 1
1,547,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,074 UART: [ldev] --
1,586,367 UART: [fwproc] Waiting for Commands...
1,586,994 UART: [fwproc] Received command 0x46574c44
1,587,785 UART: [fwproc] Received Image of size 114448 bytes
2,887,191 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,495 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,847 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,842 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,493 >>> mbox cmd response: failed
1,179,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,499 >>> mbox cmd response: failed
1,179,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,154 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,118 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,442 >>> mbox cmd response: failed
1,180,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,448 >>> mbox cmd response: failed
1,180,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,454 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,568 UART: [kat] SHA2-256
882,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,614 UART: [kat] ++
886,766 UART: [kat] sha1
891,186 UART: [kat] SHA2-256
893,124 UART: [kat] SHA2-384
896,015 UART: [kat] SHA2-512-ACC
897,916 UART: [kat] ECC-384
903,511 UART: [kat] HMAC-384Kdf
908,177 UART: [kat] LMS
1,476,373 UART: [kat] --
1,477,290 UART: [cold-reset] ++
1,477,672 UART: [fht] Storing FHT @ 0x50003400
1,480,463 UART: [idev] ++
1,480,631 UART: [idev] CDI.KEYID = 6
1,480,991 UART: [idev] SUBJECT.KEYID = 7
1,481,415 UART: [idev] UDS.KEYID = 0
1,481,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,109 UART: [idev] Erasing UDS.KEYID = 0
1,505,837 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,567 UART: [idev] --
1,515,824 UART: [ldev] ++
1,515,992 UART: [ldev] CDI.KEYID = 6
1,516,355 UART: [ldev] SUBJECT.KEYID = 5
1,516,781 UART: [ldev] AUTHORITY.KEYID = 7
1,517,244 UART: [ldev] FE.KEYID = 1
1,522,496 UART: [ldev] Erasing FE.KEYID = 1
1,547,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,233 UART: [ldev] --
1,587,570 UART: [fwproc] Waiting for Commands...
1,588,295 UART: [fwproc] Received command 0x46574c44
1,589,086 UART: [fwproc] Received Image of size 114448 bytes
2,887,238 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,398 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,750 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,693 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,598 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,612 >>> mbox cmd response: failed
1,181,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,618 >>> mbox cmd response: failed
1,181,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,667 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,829 >>> mbox cmd response: failed
1,178,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,835 >>> mbox cmd response: failed
1,178,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
85,981 UART: [state] WD Timer not started. Device not locked for debugging
87,148 UART: [kat] SHA2-256
892,798 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,923 UART: [kat] ++
897,075 UART: [kat] sha1
901,263 UART: [kat] SHA2-256
903,203 UART: [kat] SHA2-384
906,010 UART: [kat] SHA2-512-ACC
907,911 UART: [kat] ECC-384
917,460 UART: [kat] HMAC-384Kdf
922,000 UART: [kat] LMS
1,170,328 UART: [kat] --
1,171,179 UART: [cold-reset] ++
1,171,755 UART: [fht] FHT @ 0x50003400
1,174,494 UART: [idev] ++
1,174,662 UART: [idev] CDI.KEYID = 6
1,175,022 UART: [idev] SUBJECT.KEYID = 7
1,175,446 UART: [idev] UDS.KEYID = 0
1,175,791 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,652 UART: [idev] Erasing UDS.KEYID = 0
1,200,827 UART: [idev] Sha1 KeyId Algorithm
1,209,127 UART: [idev] --
1,210,287 UART: [ldev] ++
1,210,455 UART: [ldev] CDI.KEYID = 6
1,210,818 UART: [ldev] SUBJECT.KEYID = 5
1,211,244 UART: [ldev] AUTHORITY.KEYID = 7
1,211,707 UART: [ldev] FE.KEYID = 1
1,216,907 UART: [ldev] Erasing FE.KEYID = 1
1,242,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,965 UART: [ldev] --
1,282,292 UART: [fwproc] Wait for Commands...
1,283,094 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,447 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,425 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,745 >>> mbox cmd response: failed
1,178,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,751 >>> mbox cmd response: failed
1,178,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,480 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,794 >>> mbox cmd response: failed
1,181,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,800 >>> mbox cmd response: failed
1,181,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
893,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,502 UART: [kat] ++
897,654 UART: [kat] sha1
901,948 UART: [kat] SHA2-256
903,888 UART: [kat] SHA2-384
906,739 UART: [kat] SHA2-512-ACC
908,640 UART: [kat] ECC-384
918,231 UART: [kat] HMAC-384Kdf
923,099 UART: [kat] LMS
1,171,427 UART: [kat] --
1,172,276 UART: [cold-reset] ++
1,172,786 UART: [fht] FHT @ 0x50003400
1,175,587 UART: [idev] ++
1,175,755 UART: [idev] CDI.KEYID = 6
1,176,115 UART: [idev] SUBJECT.KEYID = 7
1,176,539 UART: [idev] UDS.KEYID = 0
1,176,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,371 UART: [idev] Erasing UDS.KEYID = 0
1,200,616 UART: [idev] Sha1 KeyId Algorithm
1,208,918 UART: [idev] --
1,209,946 UART: [ldev] ++
1,210,114 UART: [ldev] CDI.KEYID = 6
1,210,477 UART: [ldev] SUBJECT.KEYID = 5
1,210,903 UART: [ldev] AUTHORITY.KEYID = 7
1,211,366 UART: [ldev] FE.KEYID = 1
1,216,604 UART: [ldev] Erasing FE.KEYID = 1
1,242,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,220 UART: [ldev] --
1,281,489 UART: [fwproc] Wait for Commands...
1,282,203 UART: [fwproc] Recv command 0x46574c44
1,282,931 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,587 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,510 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,686 >>> mbox cmd response: failed
1,180,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,692 >>> mbox cmd response: failed
1,180,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,698 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,107 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,623 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,903 >>> mbox cmd response: failed
1,178,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,909 >>> mbox cmd response: failed
1,178,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,915 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
88,082 UART: [kat] SHA2-256
891,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,257 UART: [kat] SHA2-256
902,197 UART: [kat] SHA2-384
905,080 UART: [kat] SHA2-512-ACC
906,981 UART: [kat] ECC-384
916,726 UART: [kat] HMAC-384Kdf
921,224 UART: [kat] LMS
1,169,536 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,709 UART: [fht] FHT @ 0x50003400
1,173,391 UART: [idev] ++
1,173,559 UART: [idev] CDI.KEYID = 6
1,173,920 UART: [idev] SUBJECT.KEYID = 7
1,174,345 UART: [idev] UDS.KEYID = 0
1,174,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,703 UART: [idev] Erasing UDS.KEYID = 0
1,199,605 UART: [idev] Sha1 KeyId Algorithm
1,208,303 UART: [idev] --
1,209,422 UART: [ldev] ++
1,209,590 UART: [ldev] CDI.KEYID = 6
1,209,954 UART: [ldev] SUBJECT.KEYID = 5
1,210,381 UART: [ldev] AUTHORITY.KEYID = 7
1,210,844 UART: [ldev] FE.KEYID = 1
1,215,940 UART: [ldev] Erasing FE.KEYID = 1
1,242,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,166 UART: [ldev] --
1,281,554 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x46574c44
1,283,016 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,781 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,649 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,513 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,178,959 >>> mbox cmd response: failed
1,178,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,965 >>> mbox cmd response: failed
1,178,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,886 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,411 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,620 >>> mbox cmd response: failed
1,181,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,626 >>> mbox cmd response: failed
1,181,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,555 UART: [kat] SHA2-256
891,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,234 UART: [kat] ++
895,386 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
915,771 UART: [kat] HMAC-384Kdf
920,461 UART: [kat] LMS
1,168,773 UART: [kat] --
1,169,454 UART: [cold-reset] ++
1,170,022 UART: [fht] FHT @ 0x50003400
1,172,712 UART: [idev] ++
1,172,880 UART: [idev] CDI.KEYID = 6
1,173,241 UART: [idev] SUBJECT.KEYID = 7
1,173,666 UART: [idev] UDS.KEYID = 0
1,174,012 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,470 UART: [idev] Erasing UDS.KEYID = 0
1,199,176 UART: [idev] Sha1 KeyId Algorithm
1,208,132 UART: [idev] --
1,209,253 UART: [ldev] ++
1,209,421 UART: [ldev] CDI.KEYID = 6
1,209,785 UART: [ldev] SUBJECT.KEYID = 5
1,210,212 UART: [ldev] AUTHORITY.KEYID = 7
1,210,675 UART: [ldev] FE.KEYID = 1
1,215,825 UART: [ldev] Erasing FE.KEYID = 1
1,242,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,389 UART: [ldev] --
1,281,895 UART: [fwproc] Wait for Commands...
1,282,700 UART: [fwproc] Recv command 0x46574c44
1,283,433 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,070 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,016 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,180,210 >>> mbox cmd response: failed
1,180,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,216 >>> mbox cmd response: failed
1,180,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,222 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,107 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,480 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,341 writing to cptra_bootfsm_go
193,495 UART:
193,843 UART: Running Caliptra ROM ...
195,034 UART:
195,199 UART: [state] CFI Enabled
265,029 UART: [state] LifecycleState = Manufacturing
266,994 UART: [state] DebugLocked = No
269,135 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,626 UART: [kat] SHA2-256
443,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,826 UART: [kat] ++
454,304 UART: [kat] sha1
465,561 UART: [kat] SHA2-256
468,245 UART: [kat] SHA2-384
473,360 UART: [kat] SHA2-512-ACC
475,719 UART: [kat] ECC-384
2,770,026 UART: [kat] HMAC-384Kdf
2,800,306 UART: [kat] LMS
3,990,629 UART: [kat] --
3,995,832 UART: [cold-reset] ++
3,997,718 UART: [fht] Storing FHT @ 0x50003400
4,008,620 UART: [idev] ++
4,009,230 UART: [idev] CDI.KEYID = 6
4,010,126 UART: [idev] SUBJECT.KEYID = 7
4,011,402 UART: [idev] UDS.KEYID = 0
4,016,908 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,160,549 UART: [idev] Erasing UDS.KEYID = 0
7,348,114 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,148 UART: [idev] --
7,374,932 UART: [ldev] ++
7,375,536 UART: [ldev] CDI.KEYID = 6
7,376,452 UART: [ldev] SUBJECT.KEYID = 5
7,377,671 UART: [ldev] AUTHORITY.KEYID = 7
7,378,968 UART: [ldev] FE.KEYID = 1
7,422,947 UART: [ldev] Erasing FE.KEYID = 1
10,755,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,251 UART: [ldev] --
13,116,405 UART: [fwproc] Waiting for Commands...
13,119,261 UART: [fwproc] Received command 0x46574c44
13,121,449 UART: [fwproc] Received Image of size 114124 bytes
13,183,547 UART: ROM Fatal Error: 0x000B0003
13,187,041 >>> mbox cmd response: failed
13,187,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,187,730 >>> mbox cmd response: failed
13,188,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,188,300 >>> mbox cmd response: failed
Initializing fuses
2,051,298 writing to cptra_bootfsm_go
2,240,614 UART:
2,240,968 UART: Running Caliptra ROM ...
2,242,019 UART:
2,242,193 UART: [state] CFI Enabled
2,308,812 UART: [state] LifecycleState = Manufacturing
2,310,757 UART: [state] DebugLocked = No
2,312,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,735 UART: [kat] SHA2-256
2,487,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,928 UART: [kat] ++
2,498,388 UART: [kat] sha1
2,510,307 UART: [kat] SHA2-256
2,513,002 UART: [kat] SHA2-384
2,518,187 UART: [kat] SHA2-512-ACC
2,520,591 UART: [kat] ECC-384
4,812,329 UART: [kat] HMAC-384Kdf
4,844,316 UART: [kat] LMS
6,034,594 UART: [kat] --
6,038,331 UART: [cold-reset] ++
6,039,909 UART: [fht] Storing FHT @ 0x50003400
6,052,103 UART: [idev] ++
6,052,676 UART: [idev] CDI.KEYID = 6
6,053,621 UART: [idev] SUBJECT.KEYID = 7
6,054,887 UART: [idev] UDS.KEYID = 0
6,057,417 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,201,035 UART: [idev] Erasing UDS.KEYID = 0
9,390,139 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,152 UART: [idev] --
9,417,582 UART: [ldev] ++
9,418,152 UART: [ldev] CDI.KEYID = 6
9,419,121 UART: [ldev] SUBJECT.KEYID = 5
9,420,379 UART: [ldev] AUTHORITY.KEYID = 7
9,421,622 UART: [ldev] FE.KEYID = 1
9,465,878 UART: [ldev] Erasing FE.KEYID = 1
12,799,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,107,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,122,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,155,058 UART: [ldev] --
15,159,301 UART: [fwproc] Waiting for Commands...
15,161,291 UART: [fwproc] Received command 0x46574c44
15,163,530 UART: [fwproc] Received Image of size 114124 bytes
19,247,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,326,948 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,395,865 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,712,796 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,888 writing to cptra_bootfsm_go
3,791,519 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,919,440 >>> mbox cmd response: failed
12,920,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,920,478 >>> mbox cmd response: failed
12,920,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,045 >>> mbox cmd response: failed
Initializing fuses
2,051,202 writing to cptra_bootfsm_go
5,841,655 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,938,062 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,402 UART:
192,777 UART: Running Caliptra ROM ...
193,884 UART:
603,778 UART: [state] CFI Enabled
618,693 UART: [state] LifecycleState = Manufacturing
620,645 UART: [state] DebugLocked = No
622,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,217 UART: [kat] SHA2-256
796,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,496 UART: [kat] ++
807,964 UART: [kat] sha1
819,221 UART: [kat] SHA2-256
821,908 UART: [kat] SHA2-384
828,543 UART: [kat] SHA2-512-ACC
830,920 UART: [kat] ECC-384
3,114,115 UART: [kat] HMAC-384Kdf
3,126,129 UART: [kat] LMS
4,316,264 UART: [kat] --
4,320,290 UART: [cold-reset] ++
4,322,228 UART: [fht] Storing FHT @ 0x50003400
4,333,335 UART: [idev] ++
4,333,898 UART: [idev] CDI.KEYID = 6
4,334,878 UART: [idev] SUBJECT.KEYID = 7
4,336,095 UART: [idev] UDS.KEYID = 0
4,341,852 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,485,500 UART: [idev] Erasing UDS.KEYID = 0
7,625,473 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,082 UART: [idev] --
7,652,487 UART: [ldev] ++
7,653,056 UART: [ldev] CDI.KEYID = 6
7,654,026 UART: [ldev] SUBJECT.KEYID = 5
7,655,239 UART: [ldev] AUTHORITY.KEYID = 7
7,656,480 UART: [ldev] FE.KEYID = 1
7,668,374 UART: [ldev] Erasing FE.KEYID = 1
10,957,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,261 UART: [ldev] --
13,317,783 UART: [fwproc] Waiting for Commands...
13,319,426 UART: [fwproc] Received command 0x46574c44
13,321,615 UART: [fwproc] Received Image of size 114124 bytes
13,380,308 UART: ROM Fatal Error: 0x000B0003
13,383,841 >>> mbox cmd response: failed
13,384,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,384,565 >>> mbox cmd response: failed
13,384,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,385,121 >>> mbox cmd response: failed
Initializing fuses
2,063,563 writing to cptra_bootfsm_go
2,252,958 UART:
2,253,295 UART: Running Caliptra ROM ...
2,254,436 UART:
7,087,496 UART: [state] CFI Enabled
7,103,109 UART: [state] LifecycleState = Manufacturing
7,105,025 UART: [state] DebugLocked = No
7,107,228 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,111,548 UART: [kat] SHA2-256
7,281,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,291,825 UART: [kat] ++
7,292,321 UART: [kat] sha1
7,302,780 UART: [kat] SHA2-256
7,305,480 UART: [kat] SHA2-384
7,311,417 UART: [kat] SHA2-512-ACC
7,313,819 UART: [kat] ECC-384
9,597,732 UART: [kat] HMAC-384Kdf
9,608,719 UART: [kat] LMS
10,798,838 UART: [kat] --
10,802,727 UART: [cold-reset] ++
10,803,778 UART: [fht] Storing FHT @ 0x50003400
10,814,569 UART: [idev] ++
10,815,135 UART: [idev] CDI.KEYID = 6
10,816,149 UART: [idev] SUBJECT.KEYID = 7
10,817,317 UART: [idev] UDS.KEYID = 0
10,820,303 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,963,779 UART: [idev] Erasing UDS.KEYID = 0
14,100,384 UART: [idev] Using Sha1 for KeyId Algorithm
14,122,634 UART: [idev] --
14,126,197 UART: [ldev] ++
14,126,819 UART: [ldev] CDI.KEYID = 6
14,127,783 UART: [ldev] SUBJECT.KEYID = 5
14,128,992 UART: [ldev] AUTHORITY.KEYID = 7
14,130,232 UART: [ldev] FE.KEYID = 1
14,141,476 UART: [ldev] Erasing FE.KEYID = 1
17,433,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,727,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,742,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,757,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,771,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,791,109 UART: [ldev] --
19,796,592 UART: [fwproc] Waiting for Commands...
19,799,347 UART: [fwproc] Received command 0x46574c44
19,801,536 UART: [fwproc] Received Image of size 114124 bytes
23,877,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,950,186 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,019,093 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,335,501 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
4,132,363 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,099,632 >>> mbox cmd response: failed
13,100,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,100,595 >>> mbox cmd response: failed
13,100,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,101,165 >>> mbox cmd response: failed
Initializing fuses
2,059,640 writing to cptra_bootfsm_go
10,901,419 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,879,470 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,446 UART:
192,811 UART: Running Caliptra ROM ...
193,948 UART:
194,096 UART: [state] CFI Enabled
262,279 UART: [state] LifecycleState = Manufacturing
264,132 UART: [state] DebugLocked = No
266,438 UART: [state] WD Timer not started. Device not locked for debugging
270,310 UART: [kat] SHA2-256
449,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,038 UART: [kat] ++
461,582 UART: [kat] sha1
473,037 UART: [kat] SHA2-256
476,111 UART: [kat] SHA2-384
481,978 UART: [kat] SHA2-512-ACC
484,909 UART: [kat] ECC-384
2,947,792 UART: [kat] HMAC-384Kdf
2,971,540 UART: [kat] LMS
3,500,988 UART: [kat] --
3,506,676 UART: [cold-reset] ++
3,507,972 UART: [fht] FHT @ 0x50003400
3,519,062 UART: [idev] ++
3,519,631 UART: [idev] CDI.KEYID = 6
3,520,553 UART: [idev] SUBJECT.KEYID = 7
3,521,711 UART: [idev] UDS.KEYID = 0
3,524,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,864 UART: [idev] Erasing UDS.KEYID = 0
6,026,002 UART: [idev] Sha1 KeyId Algorithm
6,048,303 UART: [idev] --
6,051,869 UART: [ldev] ++
6,052,445 UART: [ldev] CDI.KEYID = 6
6,053,368 UART: [ldev] SUBJECT.KEYID = 5
6,054,531 UART: [ldev] AUTHORITY.KEYID = 7
6,055,768 UART: [ldev] FE.KEYID = 1
6,100,139 UART: [ldev] Erasing FE.KEYID = 1
8,602,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,969 UART: [ldev] --
10,390,704 UART: [fwproc] Wait for Commands...
10,392,588 UART: [fwproc] Recv command 0x46574c44
10,394,681 UART: [fwproc] Recv'd Img size: 114448 bytes
10,457,278 UART: ROM Fatal Error: 0x000B0003
10,460,360 >>> mbox cmd response: failed
10,460,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,461,109 >>> mbox cmd response: failed
10,461,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,461,670 >>> mbox cmd response: failed
Initializing fuses
2,047,641 writing to cptra_bootfsm_go
2,236,979 UART:
2,237,335 UART: Running Caliptra ROM ...
2,238,470 UART:
2,238,633 UART: [state] CFI Enabled
2,303,323 UART: [state] LifecycleState = Manufacturing
2,305,167 UART: [state] DebugLocked = No
2,307,038 UART: [state] WD Timer not started. Device not locked for debugging
2,311,539 UART: [kat] SHA2-256
2,490,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,502,237 UART: [kat] ++
2,502,704 UART: [kat] sha1
2,514,567 UART: [kat] SHA2-256
2,517,580 UART: [kat] SHA2-384
2,523,948 UART: [kat] SHA2-512-ACC
2,526,896 UART: [kat] ECC-384
4,987,275 UART: [kat] HMAC-384Kdf
5,010,583 UART: [kat] LMS
5,539,999 UART: [kat] --
5,544,226 UART: [cold-reset] ++
5,545,074 UART: [fht] FHT @ 0x50003400
5,556,969 UART: [idev] ++
5,557,532 UART: [idev] CDI.KEYID = 6
5,558,410 UART: [idev] SUBJECT.KEYID = 7
5,559,624 UART: [idev] UDS.KEYID = 0
5,562,237 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,706,319 UART: [idev] Erasing UDS.KEYID = 0
8,065,469 UART: [idev] Sha1 KeyId Algorithm
8,088,264 UART: [idev] --
8,092,027 UART: [ldev] ++
8,092,611 UART: [ldev] CDI.KEYID = 6
8,093,524 UART: [ldev] SUBJECT.KEYID = 5
8,094,691 UART: [ldev] AUTHORITY.KEYID = 7
8,095,925 UART: [ldev] FE.KEYID = 1
8,142,442 UART: [ldev] Erasing FE.KEYID = 1
10,647,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,383,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,964 UART: [ldev] --
12,455,875 UART: [fwproc] Wait for Commands...
12,458,943 UART: [fwproc] Recv command 0x46574c44
12,461,036 UART: [fwproc] Recv'd Img size: 114448 bytes
15,900,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,973,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,042,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,360,875 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,385,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,263,940 >>> mbox cmd response: failed
10,264,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,264,837 >>> mbox cmd response: failed
10,265,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,265,393 >>> mbox cmd response: failed
Initializing fuses
2,047,193 writing to cptra_bootfsm_go
5,426,368 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,111,018 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,545 UART:
192,908 UART: Running Caliptra ROM ...
194,043 UART:
603,817 UART: [state] CFI Enabled
616,269 UART: [state] LifecycleState = Manufacturing
618,146 UART: [state] DebugLocked = No
620,117 UART: [state] WD Timer not started. Device not locked for debugging
623,504 UART: [kat] SHA2-256
802,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,165 UART: [kat] ++
814,613 UART: [kat] sha1
825,538 UART: [kat] SHA2-256
828,559 UART: [kat] SHA2-384
834,802 UART: [kat] SHA2-512-ACC
837,795 UART: [kat] ECC-384
3,280,421 UART: [kat] HMAC-384Kdf
3,292,556 UART: [kat] LMS
3,822,045 UART: [kat] --
3,827,826 UART: [cold-reset] ++
3,828,676 UART: [fht] FHT @ 0x50003400
3,840,300 UART: [idev] ++
3,840,872 UART: [idev] CDI.KEYID = 6
3,841,891 UART: [idev] SUBJECT.KEYID = 7
3,842,995 UART: [idev] UDS.KEYID = 0
3,845,648 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,570 UART: [idev] Erasing UDS.KEYID = 0
6,315,415 UART: [idev] Sha1 KeyId Algorithm
6,338,777 UART: [idev] --
6,343,046 UART: [ldev] ++
6,343,635 UART: [ldev] CDI.KEYID = 6
6,344,524 UART: [ldev] SUBJECT.KEYID = 5
6,345,739 UART: [ldev] AUTHORITY.KEYID = 7
6,346,929 UART: [ldev] FE.KEYID = 1
6,358,606 UART: [ldev] Erasing FE.KEYID = 1
8,832,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,052 UART: [ldev] --
10,621,914 UART: [fwproc] Wait for Commands...
10,623,851 UART: [fwproc] Recv command 0x46574c44
10,625,946 UART: [fwproc] Recv'd Img size: 114448 bytes
10,687,815 UART: ROM Fatal Error: 0x000B0003
10,690,948 >>> mbox cmd response: failed
10,691,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,691,633 >>> mbox cmd response: failed
10,691,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,692,304 >>> mbox cmd response: failed
Initializing fuses
2,059,117 writing to cptra_bootfsm_go
2,248,418 UART:
2,248,765 UART: Running Caliptra ROM ...
2,249,899 UART:
9,775,193 UART: [state] CFI Enabled
9,789,201 UART: [state] LifecycleState = Manufacturing
9,791,081 UART: [state] DebugLocked = No
9,792,637 UART: [state] WD Timer not started. Device not locked for debugging
9,796,956 UART: [kat] SHA2-256
9,976,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,987,639 UART: [kat] ++
9,988,101 UART: [kat] sha1
9,999,039 UART: [kat] SHA2-256
10,002,111 UART: [kat] SHA2-384
10,008,430 UART: [kat] SHA2-512-ACC
10,011,375 UART: [kat] ECC-384
12,455,008 UART: [kat] HMAC-384Kdf
12,468,596 UART: [kat] LMS
12,998,083 UART: [kat] --
13,003,264 UART: [cold-reset] ++
13,004,391 UART: [fht] FHT @ 0x50003400
13,015,212 UART: [idev] ++
13,015,796 UART: [idev] CDI.KEYID = 6
13,016,709 UART: [idev] SUBJECT.KEYID = 7
13,017,922 UART: [idev] UDS.KEYID = 0
13,020,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,164,538 UART: [idev] Erasing UDS.KEYID = 0
15,494,814 UART: [idev] Sha1 KeyId Algorithm
15,517,015 UART: [idev] --
15,520,518 UART: [ldev] ++
15,521,084 UART: [ldev] CDI.KEYID = 6
15,522,047 UART: [ldev] SUBJECT.KEYID = 5
15,523,207 UART: [ldev] AUTHORITY.KEYID = 7
15,524,438 UART: [ldev] FE.KEYID = 1
15,533,350 UART: [ldev] Erasing FE.KEYID = 1
18,009,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,729,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,745,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,761,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,777,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,797,181 UART: [ldev] --
19,801,248 UART: [fwproc] Wait for Commands...
19,803,895 UART: [fwproc] Recv command 0x46574c44
19,805,993 UART: [fwproc] Recv'd Img size: 114448 bytes
23,243,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,314,106 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,382,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,700,952 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
3,699,653 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,469,161 >>> mbox cmd response: failed
10,469,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,470,006 >>> mbox cmd response: failed
10,470,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,470,598 >>> mbox cmd response: failed
Initializing fuses
2,048,924 writing to cptra_bootfsm_go
13,088,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,684,945 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,442,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,284,964 >>> mbox cmd response: failed
10,285,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,286,083 >>> mbox cmd response: failed
10,286,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,286,671 >>> mbox cmd response: failed
Initializing fuses
2,050,877 writing to cptra_bootfsm_go
5,481,518 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,821,483 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,760,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,521,046 >>> mbox cmd response: failed
10,521,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,522,260 >>> mbox cmd response: failed
10,522,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,522,848 >>> mbox cmd response: failed
Initializing fuses
2,054,862 writing to cptra_bootfsm_go
13,103,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,349,468 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Manufacturing
86,031 UART: [state] DebugLocked = No
86,591 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,189 UART: [kat] SHA2-256
882,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,235 UART: [kat] ++
886,387 UART: [kat] sha1
890,569 UART: [kat] SHA2-256
892,507 UART: [kat] SHA2-384
895,336 UART: [kat] SHA2-512-ACC
897,237 UART: [kat] ECC-384
902,700 UART: [kat] HMAC-384Kdf
907,214 UART: [kat] LMS
1,475,410 UART: [kat] --
1,476,321 UART: [cold-reset] ++
1,476,683 UART: [fht] Storing FHT @ 0x50003400
1,479,264 UART: [idev] ++
1,479,432 UART: [idev] CDI.KEYID = 6
1,479,792 UART: [idev] SUBJECT.KEYID = 7
1,480,216 UART: [idev] UDS.KEYID = 0
1,480,561 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,282 UART: [idev] Erasing UDS.KEYID = 0
1,504,454 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,104 UART: [idev] --
1,514,199 UART: [ldev] ++
1,514,367 UART: [ldev] CDI.KEYID = 6
1,514,730 UART: [ldev] SUBJECT.KEYID = 5
1,515,156 UART: [ldev] AUTHORITY.KEYID = 7
1,515,619 UART: [ldev] FE.KEYID = 1
1,520,825 UART: [ldev] Erasing FE.KEYID = 1
1,546,098 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,934 UART: [ldev] --
1,585,289 UART: [fwproc] Waiting for Commands...
1,585,936 UART: [fwproc] Received command 0x46574c44
1,586,727 UART: [fwproc] Received Image of size 114448 bytes
1,606,565 UART: ROM Fatal Error: 0x000B0003
1,607,722 >>> mbox cmd response: failed
1,607,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,728 >>> mbox cmd response: failed
1,607,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,734 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,493 UART: [kat] SHA2-256
892,431 UART: [kat] SHA2-384
895,086 UART: [kat] SHA2-512-ACC
896,987 UART: [kat] ECC-384
902,548 UART: [kat] HMAC-384Kdf
907,120 UART: [kat] LMS
1,475,316 UART: [kat] --
1,476,311 UART: [cold-reset] ++
1,476,723 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,488 UART: [idev] Erasing UDS.KEYID = 0
1,504,792 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,356 UART: [idev] --
1,514,465 UART: [ldev] ++
1,514,633 UART: [ldev] CDI.KEYID = 6
1,514,996 UART: [ldev] SUBJECT.KEYID = 5
1,515,422 UART: [ldev] AUTHORITY.KEYID = 7
1,515,885 UART: [ldev] FE.KEYID = 1
1,520,973 UART: [ldev] Erasing FE.KEYID = 1
1,546,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,076 UART: [ldev] --
1,585,347 UART: [fwproc] Waiting for Commands...
1,586,114 UART: [fwproc] Received command 0x46574c44
1,586,905 UART: [fwproc] Received Image of size 114448 bytes
2,886,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,759 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,111 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,138 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,461,203 >>> mbox cmd response: failed
1,461,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,209 >>> mbox cmd response: failed
1,461,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,892 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Manufacturing
85,950 UART: [state] DebugLocked = No
86,572 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,096 UART: [kat] SHA2-256
882,027 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,142 UART: [kat] ++
886,294 UART: [kat] sha1
890,460 UART: [kat] SHA2-256
892,398 UART: [kat] SHA2-384
894,957 UART: [kat] SHA2-512-ACC
896,858 UART: [kat] ECC-384
902,487 UART: [kat] HMAC-384Kdf
907,285 UART: [kat] LMS
1,475,481 UART: [kat] --
1,476,064 UART: [cold-reset] ++
1,476,542 UART: [fht] Storing FHT @ 0x50003400
1,479,415 UART: [idev] ++
1,479,583 UART: [idev] CDI.KEYID = 6
1,479,943 UART: [idev] SUBJECT.KEYID = 7
1,480,367 UART: [idev] UDS.KEYID = 0
1,480,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,305 UART: [idev] Erasing UDS.KEYID = 0
1,505,167 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,847 UART: [idev] --
1,514,810 UART: [ldev] ++
1,514,978 UART: [ldev] CDI.KEYID = 6
1,515,341 UART: [ldev] SUBJECT.KEYID = 5
1,515,767 UART: [ldev] AUTHORITY.KEYID = 7
1,516,230 UART: [ldev] FE.KEYID = 1
1,521,610 UART: [ldev] Erasing FE.KEYID = 1
1,547,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,013 UART: [ldev] --
1,586,336 UART: [fwproc] Waiting for Commands...
1,586,959 UART: [fwproc] Received command 0x46574c44
1,587,750 UART: [fwproc] Received Image of size 114448 bytes
1,608,350 UART: ROM Fatal Error: 0x000B0003
1,609,507 >>> mbox cmd response: failed
1,609,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,513 >>> mbox cmd response: failed
1,609,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
87,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,582 UART: [kat] SHA2-256
882,513 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,628 UART: [kat] ++
886,780 UART: [kat] sha1
891,164 UART: [kat] SHA2-256
893,102 UART: [kat] SHA2-384
895,749 UART: [kat] SHA2-512-ACC
897,650 UART: [kat] ECC-384
903,221 UART: [kat] HMAC-384Kdf
907,861 UART: [kat] LMS
1,476,057 UART: [kat] --
1,476,966 UART: [cold-reset] ++
1,477,442 UART: [fht] Storing FHT @ 0x50003400
1,480,101 UART: [idev] ++
1,480,269 UART: [idev] CDI.KEYID = 6
1,480,629 UART: [idev] SUBJECT.KEYID = 7
1,481,053 UART: [idev] UDS.KEYID = 0
1,481,398 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,865 UART: [idev] Erasing UDS.KEYID = 0
1,505,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,949 UART: [idev] --
1,514,962 UART: [ldev] ++
1,515,130 UART: [ldev] CDI.KEYID = 6
1,515,493 UART: [ldev] SUBJECT.KEYID = 5
1,515,919 UART: [ldev] AUTHORITY.KEYID = 7
1,516,382 UART: [ldev] FE.KEYID = 1
1,521,492 UART: [ldev] Erasing FE.KEYID = 1
1,547,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,885 UART: [ldev] --
1,586,288 UART: [fwproc] Waiting for Commands...
1,587,043 UART: [fwproc] Received command 0x46574c44
1,587,834 UART: [fwproc] Received Image of size 114448 bytes
2,886,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,018 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,370 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,453 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,462,160 >>> mbox cmd response: failed
1,462,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,166 >>> mbox cmd response: failed
1,462,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,086 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,991 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Manufacturing
85,657 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
893,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,337 UART: [kat] ++
897,489 UART: [kat] sha1
901,603 UART: [kat] SHA2-256
903,543 UART: [kat] SHA2-384
906,082 UART: [kat] SHA2-512-ACC
907,983 UART: [kat] ECC-384
917,510 UART: [kat] HMAC-384Kdf
922,288 UART: [kat] LMS
1,170,616 UART: [kat] --
1,171,535 UART: [cold-reset] ++
1,171,875 UART: [fht] FHT @ 0x50003400
1,174,460 UART: [idev] ++
1,174,628 UART: [idev] CDI.KEYID = 6
1,174,988 UART: [idev] SUBJECT.KEYID = 7
1,175,412 UART: [idev] UDS.KEYID = 0
1,175,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,042 UART: [idev] Erasing UDS.KEYID = 0
1,199,807 UART: [idev] Sha1 KeyId Algorithm
1,208,463 UART: [idev] --
1,209,533 UART: [ldev] ++
1,209,701 UART: [ldev] CDI.KEYID = 6
1,210,064 UART: [ldev] SUBJECT.KEYID = 5
1,210,490 UART: [ldev] AUTHORITY.KEYID = 7
1,210,953 UART: [ldev] FE.KEYID = 1
1,216,365 UART: [ldev] Erasing FE.KEYID = 1
1,241,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,765 UART: [ldev] --
1,281,042 UART: [fwproc] Wait for Commands...
1,281,854 UART: [fwproc] Recv command 0x46574c44
1,282,582 UART: [fwproc] Recv'd Img size: 114448 bytes
1,303,406 UART: ROM Fatal Error: 0x000B0003
1,304,563 >>> mbox cmd response: failed
1,304,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,569 >>> mbox cmd response: failed
1,304,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
893,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,669 UART: [kat] ++
897,821 UART: [kat] sha1
901,959 UART: [kat] SHA2-256
903,899 UART: [kat] SHA2-384
906,822 UART: [kat] SHA2-512-ACC
908,723 UART: [kat] ECC-384
918,686 UART: [kat] HMAC-384Kdf
923,410 UART: [kat] LMS
1,171,738 UART: [kat] --
1,172,573 UART: [cold-reset] ++
1,172,909 UART: [fht] FHT @ 0x50003400
1,175,606 UART: [idev] ++
1,175,774 UART: [idev] CDI.KEYID = 6
1,176,134 UART: [idev] SUBJECT.KEYID = 7
1,176,558 UART: [idev] UDS.KEYID = 0
1,176,903 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,628 UART: [idev] Erasing UDS.KEYID = 0
1,202,029 UART: [idev] Sha1 KeyId Algorithm
1,210,649 UART: [idev] --
1,211,635 UART: [ldev] ++
1,211,803 UART: [ldev] CDI.KEYID = 6
1,212,166 UART: [ldev] SUBJECT.KEYID = 5
1,212,592 UART: [ldev] AUTHORITY.KEYID = 7
1,213,055 UART: [ldev] FE.KEYID = 1
1,218,363 UART: [ldev] Erasing FE.KEYID = 1
1,244,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,151 UART: [ldev] --
1,283,630 UART: [fwproc] Wait for Commands...
1,284,256 UART: [fwproc] Recv command 0x46574c44
1,284,984 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,168 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,135 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,160,822 >>> mbox cmd response: failed
1,160,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,828 >>> mbox cmd response: failed
1,160,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,334 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Manufacturing
85,988 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
893,321 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,446 UART: [kat] ++
897,598 UART: [kat] sha1
901,944 UART: [kat] SHA2-256
903,884 UART: [kat] SHA2-384
906,413 UART: [kat] SHA2-512-ACC
908,314 UART: [kat] ECC-384
917,801 UART: [kat] HMAC-384Kdf
922,637 UART: [kat] LMS
1,170,965 UART: [kat] --
1,171,948 UART: [cold-reset] ++
1,172,470 UART: [fht] FHT @ 0x50003400
1,174,991 UART: [idev] ++
1,175,159 UART: [idev] CDI.KEYID = 6
1,175,519 UART: [idev] SUBJECT.KEYID = 7
1,175,943 UART: [idev] UDS.KEYID = 0
1,176,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,419 UART: [idev] Erasing UDS.KEYID = 0
1,201,110 UART: [idev] Sha1 KeyId Algorithm
1,209,516 UART: [idev] --
1,210,476 UART: [ldev] ++
1,210,644 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,433 UART: [ldev] AUTHORITY.KEYID = 7
1,211,896 UART: [ldev] FE.KEYID = 1
1,217,286 UART: [ldev] Erasing FE.KEYID = 1
1,243,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,738 UART: [ldev] --
1,283,151 UART: [fwproc] Wait for Commands...
1,283,961 UART: [fwproc] Recv command 0x46574c44
1,284,689 UART: [fwproc] Recv'd Img size: 114448 bytes
1,304,897 UART: ROM Fatal Error: 0x000B0003
1,306,054 >>> mbox cmd response: failed
1,306,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,060 >>> mbox cmd response: failed
1,306,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,481 UART: [kat] SHA2-256
894,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,256 UART: [kat] ++
898,408 UART: [kat] sha1
902,606 UART: [kat] SHA2-256
904,546 UART: [kat] SHA2-384
907,395 UART: [kat] SHA2-512-ACC
909,296 UART: [kat] ECC-384
919,159 UART: [kat] HMAC-384Kdf
923,881 UART: [kat] LMS
1,172,209 UART: [kat] --
1,173,000 UART: [cold-reset] ++
1,173,340 UART: [fht] FHT @ 0x50003400
1,176,203 UART: [idev] ++
1,176,371 UART: [idev] CDI.KEYID = 6
1,176,731 UART: [idev] SUBJECT.KEYID = 7
1,177,155 UART: [idev] UDS.KEYID = 0
1,177,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,299 UART: [idev] Erasing UDS.KEYID = 0
1,202,414 UART: [idev] Sha1 KeyId Algorithm
1,210,836 UART: [idev] --
1,212,028 UART: [ldev] ++
1,212,196 UART: [ldev] CDI.KEYID = 6
1,212,559 UART: [ldev] SUBJECT.KEYID = 5
1,212,985 UART: [ldev] AUTHORITY.KEYID = 7
1,213,448 UART: [ldev] FE.KEYID = 1
1,218,532 UART: [ldev] Erasing FE.KEYID = 1
1,244,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,736 UART: [ldev] --
1,284,027 UART: [fwproc] Wait for Commands...
1,284,703 UART: [fwproc] Recv command 0x46574c44
1,285,431 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,426 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,830 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,161,051 >>> mbox cmd response: failed
1,161,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,057 >>> mbox cmd response: failed
1,161,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,911 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,790 UART: [state] LifecycleState = Manufacturing
86,445 UART: [state] DebugLocked = No
86,973 UART: [state] WD Timer not started. Device not locked for debugging
88,150 UART: [kat] SHA2-256
891,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,829 UART: [kat] ++
895,981 UART: [kat] sha1
900,183 UART: [kat] SHA2-256
902,123 UART: [kat] SHA2-384
904,866 UART: [kat] SHA2-512-ACC
906,767 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,874 UART: [kat] LMS
1,169,186 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,174,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,198,603 UART: [idev] Sha1 KeyId Algorithm
1,207,605 UART: [idev] --
1,208,482 UART: [ldev] ++
1,208,650 UART: [ldev] CDI.KEYID = 6
1,209,014 UART: [ldev] SUBJECT.KEYID = 5
1,209,441 UART: [ldev] AUTHORITY.KEYID = 7
1,209,904 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,240,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,512 UART: [ldev] --
1,279,952 UART: [fwproc] Wait for Commands...
1,280,555 UART: [fwproc] Recv command 0x46574c44
1,281,288 UART: [fwproc] Recv'd Img size: 114448 bytes
1,301,389 UART: ROM Fatal Error: 0x000B0003
1,302,546 >>> mbox cmd response: failed
1,302,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,552 >>> mbox cmd response: failed
1,302,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,505 UART: [fht] FHT @ 0x50003400
1,173,265 UART: [idev] ++
1,173,433 UART: [idev] CDI.KEYID = 6
1,173,794 UART: [idev] SUBJECT.KEYID = 7
1,174,219 UART: [idev] UDS.KEYID = 0
1,174,565 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,403 UART: [idev] Erasing UDS.KEYID = 0
1,199,491 UART: [idev] Sha1 KeyId Algorithm
1,208,453 UART: [idev] --
1,209,420 UART: [ldev] ++
1,209,588 UART: [ldev] CDI.KEYID = 6
1,209,952 UART: [ldev] SUBJECT.KEYID = 5
1,210,379 UART: [ldev] AUTHORITY.KEYID = 7
1,210,842 UART: [ldev] FE.KEYID = 1
1,216,076 UART: [ldev] Erasing FE.KEYID = 1
1,242,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,096 UART: [ldev] --
1,281,522 UART: [fwproc] Wait for Commands...
1,282,149 UART: [fwproc] Recv command 0x46574c44
1,282,882 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,222 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,493 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,092 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,155,345 >>> mbox cmd response: failed
1,155,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,351 >>> mbox cmd response: failed
1,155,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,248 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Manufacturing
86,186 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,407 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,330 UART: [cold-reset] ++
1,170,890 UART: [fht] FHT @ 0x50003400
1,173,714 UART: [idev] ++
1,173,882 UART: [idev] CDI.KEYID = 6
1,174,243 UART: [idev] SUBJECT.KEYID = 7
1,174,668 UART: [idev] UDS.KEYID = 0
1,175,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,878 UART: [idev] Erasing UDS.KEYID = 0
1,200,132 UART: [idev] Sha1 KeyId Algorithm
1,208,992 UART: [idev] --
1,210,197 UART: [ldev] ++
1,210,365 UART: [ldev] CDI.KEYID = 6
1,210,729 UART: [ldev] SUBJECT.KEYID = 5
1,211,156 UART: [ldev] AUTHORITY.KEYID = 7
1,211,619 UART: [ldev] FE.KEYID = 1
1,217,043 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,211 UART: [fwproc] Wait for Commands...
1,282,902 UART: [fwproc] Recv command 0x46574c44
1,283,635 UART: [fwproc] Recv'd Img size: 114448 bytes
1,304,306 UART: ROM Fatal Error: 0x000B0003
1,305,463 >>> mbox cmd response: failed
1,305,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,469 >>> mbox cmd response: failed
1,305,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,021 UART: [kat] LMS
1,169,333 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,174,370 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,024 UART: [idev] Erasing UDS.KEYID = 0
1,199,186 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,325 UART: [ldev] ++
1,209,493 UART: [ldev] CDI.KEYID = 6
1,209,857 UART: [ldev] SUBJECT.KEYID = 5
1,210,284 UART: [ldev] AUTHORITY.KEYID = 7
1,210,747 UART: [ldev] FE.KEYID = 1
1,215,857 UART: [ldev] Erasing FE.KEYID = 1
1,242,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,785 UART: [ldev] --
1,281,127 UART: [fwproc] Wait for Commands...
1,281,870 UART: [fwproc] Recv command 0x46574c44
1,282,603 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,387 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,574 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,411 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,156,804 >>> mbox cmd response: failed
1,156,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,810 >>> mbox cmd response: failed
1,156,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,980 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,163 UART:
192,522 UART: Running Caliptra ROM ...
193,699 UART:
193,851 UART: [state] CFI Enabled
262,912 UART: [state] LifecycleState = Unprovisioned
264,836 UART: [state] DebugLocked = No
266,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,781 UART: [kat] SHA2-256
440,476 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,020 UART: [kat] ++
451,521 UART: [kat] sha1
461,916 UART: [kat] SHA2-256
464,625 UART: [kat] SHA2-384
469,887 UART: [kat] SHA2-512-ACC
472,295 UART: [kat] ECC-384
2,768,299 UART: [kat] HMAC-384Kdf
2,798,847 UART: [kat] LMS
3,989,135 UART: [kat] --
3,993,190 UART: [cold-reset] ++
3,995,068 UART: [fht] Storing FHT @ 0x50003400
4,006,936 UART: [idev] ++
4,007,507 UART: [idev] CDI.KEYID = 6
4,008,479 UART: [idev] SUBJECT.KEYID = 7
4,009,699 UART: [idev] UDS.KEYID = 0
4,012,373 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,141 UART: [idev] Erasing UDS.KEYID = 0
7,350,508 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,282 UART: [idev] --
7,374,706 UART: [ldev] ++
7,375,338 UART: [ldev] CDI.KEYID = 6
7,376,252 UART: [ldev] SUBJECT.KEYID = 5
7,377,471 UART: [ldev] AUTHORITY.KEYID = 7
7,378,767 UART: [ldev] FE.KEYID = 1
7,423,389 UART: [ldev] Erasing FE.KEYID = 1
10,756,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,218 UART: [ldev] --
13,137,161 UART: [fwproc] Waiting for Commands...
13,140,345 UART: [fwproc] Received command 0x46574c44
13,142,538 UART: [fwproc] Received Image of size 114124 bytes
13,242,074 UART: ROM Fatal Error: 0x000B001B
13,245,560 >>> mbox cmd response: failed
13,245,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,246,477 >>> mbox cmd response: failed
13,246,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,247,104 >>> mbox cmd response: failed
Initializing fuses
2,057,173 writing to cptra_bootfsm_go
2,246,543 UART:
2,246,889 UART: Running Caliptra ROM ...
2,248,031 UART:
2,248,206 UART: [state] CFI Enabled
2,311,843 UART: [state] LifecycleState = Unprovisioned
2,313,742 UART: [state] DebugLocked = No
2,316,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,442 UART: [kat] SHA2-256
2,490,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,670 UART: [kat] ++
2,501,176 UART: [kat] sha1
2,512,283 UART: [kat] SHA2-256
2,514,986 UART: [kat] SHA2-384
2,522,114 UART: [kat] SHA2-512-ACC
2,524,466 UART: [kat] ECC-384
4,815,365 UART: [kat] HMAC-384Kdf
4,847,198 UART: [kat] LMS
6,037,537 UART: [kat] --
6,039,666 UART: [cold-reset] ++
6,040,751 UART: [fht] Storing FHT @ 0x50003400
6,052,133 UART: [idev] ++
6,052,758 UART: [idev] CDI.KEYID = 6
6,053,698 UART: [idev] SUBJECT.KEYID = 7
6,054,919 UART: [idev] UDS.KEYID = 0
6,057,577 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,201,259 UART: [idev] Erasing UDS.KEYID = 0
9,391,585 UART: [idev] Using Sha1 for KeyId Algorithm
9,414,743 UART: [idev] --
9,419,066 UART: [ldev] ++
9,419,641 UART: [ldev] CDI.KEYID = 6
9,420,609 UART: [ldev] SUBJECT.KEYID = 5
9,421,862 UART: [ldev] AUTHORITY.KEYID = 7
9,423,098 UART: [ldev] FE.KEYID = 1
9,470,376 UART: [ldev] Erasing FE.KEYID = 1
12,802,507 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,115,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,129,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,144,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,159,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,178,310 UART: [ldev] --
15,182,449 UART: [fwproc] Waiting for Commands...
15,184,871 UART: [fwproc] Received command 0x46574c44
15,187,059 UART: [fwproc] Received Image of size 114124 bytes
19,235,189 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,311,726 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,380,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,698,122 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,787,853 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,915,766 >>> mbox cmd response: failed
12,916,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,916,790 >>> mbox cmd response: failed
12,917,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,351 >>> mbox cmd response: failed
Initializing fuses
2,049,917 writing to cptra_bootfsm_go
5,823,719 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,894,730 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,433 UART:
192,788 UART: Running Caliptra ROM ...
193,973 UART:
603,624 UART: [state] CFI Enabled
618,311 UART: [state] LifecycleState = Unprovisioned
620,246 UART: [state] DebugLocked = No
621,474 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,865 UART: [kat] SHA2-256
796,645 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,192 UART: [kat] ++
807,836 UART: [kat] sha1
818,346 UART: [kat] SHA2-256
821,077 UART: [kat] SHA2-384
827,598 UART: [kat] SHA2-512-ACC
829,992 UART: [kat] ECC-384
3,112,064 UART: [kat] HMAC-384Kdf
3,124,160 UART: [kat] LMS
4,314,279 UART: [kat] --
4,319,923 UART: [cold-reset] ++
4,321,264 UART: [fht] Storing FHT @ 0x50003400
4,333,729 UART: [idev] ++
4,334,303 UART: [idev] CDI.KEYID = 6
4,335,273 UART: [idev] SUBJECT.KEYID = 7
4,336,509 UART: [idev] UDS.KEYID = 0
4,339,505 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,483,073 UART: [idev] Erasing UDS.KEYID = 0
7,627,451 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,078 UART: [idev] --
7,652,989 UART: [ldev] ++
7,653,608 UART: [ldev] CDI.KEYID = 6
7,654,504 UART: [ldev] SUBJECT.KEYID = 5
7,655,729 UART: [ldev] AUTHORITY.KEYID = 7
7,656,886 UART: [ldev] FE.KEYID = 1
7,668,592 UART: [ldev] Erasing FE.KEYID = 1
10,957,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,650 UART: [ldev] --
13,318,135 UART: [fwproc] Waiting for Commands...
13,321,153 UART: [fwproc] Received command 0x46574c44
13,323,340 UART: [fwproc] Received Image of size 114124 bytes
13,423,762 UART: ROM Fatal Error: 0x000B001B
13,427,234 >>> mbox cmd response: failed
13,427,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,427,976 >>> mbox cmd response: failed
13,428,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,428,536 >>> mbox cmd response: failed
Initializing fuses
2,059,277 writing to cptra_bootfsm_go
2,248,591 UART:
2,248,968 UART: Running Caliptra ROM ...
2,250,115 UART:
7,040,755 UART: [state] CFI Enabled
7,053,992 UART: [state] LifecycleState = Unprovisioned
7,055,916 UART: [state] DebugLocked = No
7,058,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,062,967 UART: [kat] SHA2-256
7,232,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,243,266 UART: [kat] ++
7,243,731 UART: [kat] sha1
7,254,617 UART: [kat] SHA2-256
7,257,312 UART: [kat] SHA2-384
7,262,761 UART: [kat] SHA2-512-ACC
7,265,101 UART: [kat] ECC-384
9,549,130 UART: [kat] HMAC-384Kdf
9,562,513 UART: [kat] LMS
10,752,660 UART: [kat] --
10,756,432 UART: [cold-reset] ++
10,757,932 UART: [fht] Storing FHT @ 0x50003400
10,770,280 UART: [idev] ++
10,770,855 UART: [idev] CDI.KEYID = 6
10,771,766 UART: [idev] SUBJECT.KEYID = 7
10,772,976 UART: [idev] UDS.KEYID = 0
10,775,744 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,919,203 UART: [idev] Erasing UDS.KEYID = 0
14,058,515 UART: [idev] Using Sha1 for KeyId Algorithm
14,080,647 UART: [idev] --
14,083,594 UART: [ldev] ++
14,084,175 UART: [ldev] CDI.KEYID = 6
14,085,119 UART: [ldev] SUBJECT.KEYID = 5
14,086,380 UART: [ldev] AUTHORITY.KEYID = 7
14,087,568 UART: [ldev] FE.KEYID = 1
14,098,858 UART: [ldev] Erasing FE.KEYID = 1
17,386,863 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,682,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,696,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,711,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,726,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,745,186 UART: [ldev] --
19,749,517 UART: [fwproc] Waiting for Commands...
19,751,731 UART: [fwproc] Received command 0x46574c44
19,753,921 UART: [fwproc] Received Image of size 114124 bytes
23,806,158 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,876,940 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,945,857 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,262,462 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,794 writing to cptra_bootfsm_go
4,127,504 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,157,011 >>> mbox cmd response: failed
13,157,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,158,043 >>> mbox cmd response: failed
13,158,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,158,652 >>> mbox cmd response: failed
Initializing fuses
2,049,768 writing to cptra_bootfsm_go
10,837,087 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,765,666 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,277 UART:
192,626 UART: Running Caliptra ROM ...
193,733 UART:
193,874 UART: [state] CFI Enabled
262,733 UART: [state] LifecycleState = Unprovisioned
264,657 UART: [state] DebugLocked = No
266,300 UART: [state] WD Timer not started. Device not locked for debugging
270,127 UART: [kat] SHA2-256
449,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,843 UART: [kat] ++
461,297 UART: [kat] sha1
473,198 UART: [kat] SHA2-256
476,260 UART: [kat] SHA2-384
482,287 UART: [kat] SHA2-512-ACC
485,231 UART: [kat] ECC-384
2,945,463 UART: [kat] HMAC-384Kdf
2,968,185 UART: [kat] LMS
3,497,650 UART: [kat] --
3,502,993 UART: [cold-reset] ++
3,505,470 UART: [fht] FHT @ 0x50003400
3,516,073 UART: [idev] ++
3,516,641 UART: [idev] CDI.KEYID = 6
3,517,570 UART: [idev] SUBJECT.KEYID = 7
3,518,734 UART: [idev] UDS.KEYID = 0
3,521,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,485 UART: [idev] Erasing UDS.KEYID = 0
6,025,058 UART: [idev] Sha1 KeyId Algorithm
6,047,592 UART: [idev] --
6,050,237 UART: [ldev] ++
6,050,809 UART: [ldev] CDI.KEYID = 6
6,051,696 UART: [ldev] SUBJECT.KEYID = 5
6,053,452 UART: [ldev] AUTHORITY.KEYID = 7
6,054,571 UART: [ldev] FE.KEYID = 1
6,098,512 UART: [ldev] Erasing FE.KEYID = 1
8,599,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,425 UART: [ldev] --
10,411,432 UART: [fwproc] Wait for Commands...
10,413,638 UART: [fwproc] Recv command 0x46574c44
10,415,733 UART: [fwproc] Recv'd Img size: 114448 bytes
10,517,360 UART: ROM Fatal Error: 0x000B001B
10,520,447 >>> mbox cmd response: failed
10,520,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,181 >>> mbox cmd response: failed
10,521,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,740 >>> mbox cmd response: failed
Initializing fuses
2,057,418 writing to cptra_bootfsm_go
2,246,759 UART:
2,247,107 UART: Running Caliptra ROM ...
2,248,247 UART:
2,248,431 UART: [state] CFI Enabled
2,302,961 UART: [state] LifecycleState = Unprovisioned
2,304,865 UART: [state] DebugLocked = No
2,306,151 UART: [state] WD Timer not started. Device not locked for debugging
2,310,491 UART: [kat] SHA2-256
2,489,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,501,229 UART: [kat] ++
2,501,778 UART: [kat] sha1
2,513,053 UART: [kat] SHA2-256
2,516,069 UART: [kat] SHA2-384
2,522,327 UART: [kat] SHA2-512-ACC
2,525,278 UART: [kat] ECC-384
4,986,902 UART: [kat] HMAC-384Kdf
5,012,768 UART: [kat] LMS
5,542,232 UART: [kat] --
5,546,220 UART: [cold-reset] ++
5,548,260 UART: [fht] FHT @ 0x50003400
5,558,265 UART: [idev] ++
5,558,830 UART: [idev] CDI.KEYID = 6
5,559,739 UART: [idev] SUBJECT.KEYID = 7
5,560,955 UART: [idev] UDS.KEYID = 0
5,563,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,707,614 UART: [idev] Erasing UDS.KEYID = 0
8,068,436 UART: [idev] Sha1 KeyId Algorithm
8,092,223 UART: [idev] --
8,095,988 UART: [ldev] ++
8,096,574 UART: [ldev] CDI.KEYID = 6
8,097,488 UART: [ldev] SUBJECT.KEYID = 5
8,098,648 UART: [ldev] AUTHORITY.KEYID = 7
8,099,906 UART: [ldev] FE.KEYID = 1
8,140,374 UART: [ldev] Erasing FE.KEYID = 1
10,648,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,446,924 UART: [ldev] --
12,450,676 UART: [fwproc] Wait for Commands...
12,453,692 UART: [fwproc] Recv command 0x46574c44
12,455,734 UART: [fwproc] Recv'd Img size: 114448 bytes
15,861,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,937,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,006,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,323,902 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,385,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,273,776 >>> mbox cmd response: failed
10,274,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,274,688 >>> mbox cmd response: failed
10,274,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,275,244 >>> mbox cmd response: failed
Initializing fuses
2,051,465 writing to cptra_bootfsm_go
5,395,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,094,608 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
192,485 UART:
192,858 UART: Running Caliptra ROM ...
193,966 UART:
603,637 UART: [state] CFI Enabled
615,900 UART: [state] LifecycleState = Unprovisioned
617,753 UART: [state] DebugLocked = No
619,723 UART: [state] WD Timer not started. Device not locked for debugging
623,325 UART: [kat] SHA2-256
802,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,014 UART: [kat] ++
814,541 UART: [kat] sha1
827,373 UART: [kat] SHA2-256
830,425 UART: [kat] SHA2-384
835,707 UART: [kat] SHA2-512-ACC
838,694 UART: [kat] ECC-384
3,278,324 UART: [kat] HMAC-384Kdf
3,290,826 UART: [kat] LMS
3,820,327 UART: [kat] --
3,824,122 UART: [cold-reset] ++
3,826,543 UART: [fht] FHT @ 0x50003400
3,837,146 UART: [idev] ++
3,837,711 UART: [idev] CDI.KEYID = 6
3,838,620 UART: [idev] SUBJECT.KEYID = 7
3,839,837 UART: [idev] UDS.KEYID = 0
3,842,476 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,429 UART: [idev] Erasing UDS.KEYID = 0
6,311,374 UART: [idev] Sha1 KeyId Algorithm
6,335,215 UART: [idev] --
6,339,055 UART: [ldev] ++
6,339,633 UART: [ldev] CDI.KEYID = 6
6,340,544 UART: [ldev] SUBJECT.KEYID = 5
6,341,764 UART: [ldev] AUTHORITY.KEYID = 7
6,342,996 UART: [ldev] FE.KEYID = 1
6,354,245 UART: [ldev] Erasing FE.KEYID = 1
8,826,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,626 UART: [ldev] --
10,617,594 UART: [fwproc] Wait for Commands...
10,619,475 UART: [fwproc] Recv command 0x46574c44
10,621,579 UART: [fwproc] Recv'd Img size: 114448 bytes
10,714,745 UART: ROM Fatal Error: 0x000B001B
10,717,834 >>> mbox cmd response: failed
10,718,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,718,582 >>> mbox cmd response: failed
10,718,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,719,272 >>> mbox cmd response: failed
Initializing fuses
2,053,544 writing to cptra_bootfsm_go
2,242,865 UART:
2,243,211 UART: Running Caliptra ROM ...
2,244,351 UART:
9,734,833 UART: [state] CFI Enabled
9,749,019 UART: [state] LifecycleState = Unprovisioned
9,750,822 UART: [state] DebugLocked = No
9,753,723 UART: [state] WD Timer not started. Device not locked for debugging
9,756,600 UART: [kat] SHA2-256
9,935,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,947,302 UART: [kat] ++
9,947,999 UART: [kat] sha1
9,958,806 UART: [kat] SHA2-256
9,961,798 UART: [kat] SHA2-384
9,968,760 UART: [kat] SHA2-512-ACC
9,971,764 UART: [kat] ECC-384
12,414,356 UART: [kat] HMAC-384Kdf
12,425,726 UART: [kat] LMS
12,955,203 UART: [kat] --
12,958,759 UART: [cold-reset] ++
12,960,415 UART: [fht] FHT @ 0x50003400
12,971,119 UART: [idev] ++
12,971,687 UART: [idev] CDI.KEYID = 6
12,972,567 UART: [idev] SUBJECT.KEYID = 7
12,973,831 UART: [idev] UDS.KEYID = 0
12,976,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,120,594 UART: [idev] Erasing UDS.KEYID = 0
15,445,199 UART: [idev] Sha1 KeyId Algorithm
15,467,734 UART: [idev] --
15,472,205 UART: [ldev] ++
15,472,784 UART: [ldev] CDI.KEYID = 6
15,473,666 UART: [ldev] SUBJECT.KEYID = 5
15,474,825 UART: [ldev] AUTHORITY.KEYID = 7
15,476,113 UART: [ldev] FE.KEYID = 1
15,485,139 UART: [ldev] Erasing FE.KEYID = 1
17,961,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,678,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,694,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,710,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,726,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,745,906 UART: [ldev] --
19,750,254 UART: [fwproc] Wait for Commands...
19,751,703 UART: [fwproc] Recv command 0x46574c44
19,753,805 UART: [fwproc] Recv'd Img size: 114448 bytes
23,162,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,235,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,304,492 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,623,129 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,700,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,499,312 >>> mbox cmd response: failed
10,499,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,500,203 >>> mbox cmd response: failed
10,500,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,500,773 >>> mbox cmd response: failed
Initializing fuses
2,054,617 writing to cptra_bootfsm_go
13,067,890 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,649,796 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,440,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,368,452 >>> mbox cmd response: failed
10,369,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,369,491 >>> mbox cmd response: failed
10,369,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,370,068 >>> mbox cmd response: failed
Initializing fuses
2,049,192 writing to cptra_bootfsm_go
5,486,357 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,756,944 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
3,757,466 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,561,765 >>> mbox cmd response: failed
10,562,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,562,643 >>> mbox cmd response: failed
10,562,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,563,203 >>> mbox cmd response: failed
Initializing fuses
2,053,321 writing to cptra_bootfsm_go
13,064,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,269,627 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,971 UART: [kat] SHA2-256
881,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,017 UART: [kat] ++
886,169 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,696 UART: [kat] HMAC-384Kdf
907,446 UART: [kat] LMS
1,475,642 UART: [kat] --
1,476,401 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,618 UART: [idev] ++
1,479,786 UART: [idev] CDI.KEYID = 6
1,480,146 UART: [idev] SUBJECT.KEYID = 7
1,480,570 UART: [idev] UDS.KEYID = 0
1,480,915 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,826 UART: [idev] Erasing UDS.KEYID = 0
1,505,332 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,050 UART: [idev] --
1,515,189 UART: [ldev] ++
1,515,357 UART: [ldev] CDI.KEYID = 6
1,515,720 UART: [ldev] SUBJECT.KEYID = 5
1,516,146 UART: [ldev] AUTHORITY.KEYID = 7
1,516,609 UART: [ldev] FE.KEYID = 1
1,521,945 UART: [ldev] Erasing FE.KEYID = 1
1,547,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,602 UART: [ldev] --
1,586,959 UART: [fwproc] Waiting for Commands...
1,587,762 UART: [fwproc] Received command 0x46574c44
1,588,553 UART: [fwproc] Received Image of size 114448 bytes
1,623,374 UART: ROM Fatal Error: 0x000B001B
1,624,533 >>> mbox cmd response: failed
1,624,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,539 >>> mbox cmd response: failed
1,624,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,307 UART: [kat] SHA2-256
882,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,353 UART: [kat] ++
886,505 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,146 UART: [kat] SHA2-512-ACC
897,047 UART: [kat] ECC-384
902,288 UART: [kat] HMAC-384Kdf
907,080 UART: [kat] LMS
1,475,276 UART: [kat] --
1,476,195 UART: [cold-reset] ++
1,476,675 UART: [fht] Storing FHT @ 0x50003400
1,479,260 UART: [idev] ++
1,479,428 UART: [idev] CDI.KEYID = 6
1,479,788 UART: [idev] SUBJECT.KEYID = 7
1,480,212 UART: [idev] UDS.KEYID = 0
1,480,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,090 UART: [idev] Erasing UDS.KEYID = 0
1,504,266 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,948 UART: [idev] --
1,514,053 UART: [ldev] ++
1,514,221 UART: [ldev] CDI.KEYID = 6
1,514,584 UART: [ldev] SUBJECT.KEYID = 5
1,515,010 UART: [ldev] AUTHORITY.KEYID = 7
1,515,473 UART: [ldev] FE.KEYID = 1
1,520,481 UART: [ldev] Erasing FE.KEYID = 1
1,545,796 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,632 UART: [ldev] --
1,584,911 UART: [fwproc] Waiting for Commands...
1,585,744 UART: [fwproc] Received command 0x46574c44
1,586,535 UART: [fwproc] Received Image of size 114448 bytes
2,884,987 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,545 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,897 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,036 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,489 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,477,306 >>> mbox cmd response: failed
1,477,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,312 >>> mbox cmd response: failed
1,477,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,893 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,734 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,245 UART: [state] LifecycleState = Unprovisioned
86,900 UART: [state] DebugLocked = No
87,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,036 UART: [kat] SHA2-256
882,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,082 UART: [kat] ++
887,234 UART: [kat] sha1
891,678 UART: [kat] SHA2-256
893,616 UART: [kat] SHA2-384
896,519 UART: [kat] SHA2-512-ACC
898,420 UART: [kat] ECC-384
904,265 UART: [kat] HMAC-384Kdf
908,805 UART: [kat] LMS
1,477,001 UART: [kat] --
1,477,878 UART: [cold-reset] ++
1,478,276 UART: [fht] Storing FHT @ 0x50003400
1,480,991 UART: [idev] ++
1,481,159 UART: [idev] CDI.KEYID = 6
1,481,519 UART: [idev] SUBJECT.KEYID = 7
1,481,943 UART: [idev] UDS.KEYID = 0
1,482,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,490,105 UART: [idev] Erasing UDS.KEYID = 0
1,507,345 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,997 UART: [idev] --
1,517,064 UART: [ldev] ++
1,517,232 UART: [ldev] CDI.KEYID = 6
1,517,595 UART: [ldev] SUBJECT.KEYID = 5
1,518,021 UART: [ldev] AUTHORITY.KEYID = 7
1,518,484 UART: [ldev] FE.KEYID = 1
1,523,860 UART: [ldev] Erasing FE.KEYID = 1
1,548,973 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,191 UART: [ldev] --
1,588,514 UART: [fwproc] Waiting for Commands...
1,589,215 UART: [fwproc] Received command 0x46574c44
1,590,006 UART: [fwproc] Received Image of size 114448 bytes
1,625,205 UART: ROM Fatal Error: 0x000B001B
1,626,364 >>> mbox cmd response: failed
1,626,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,370 >>> mbox cmd response: failed
1,626,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,434 UART: [kat] SHA2-256
882,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,480 UART: [kat] ++
886,632 UART: [kat] sha1
890,912 UART: [kat] SHA2-256
892,850 UART: [kat] SHA2-384
895,521 UART: [kat] SHA2-512-ACC
897,422 UART: [kat] ECC-384
902,801 UART: [kat] HMAC-384Kdf
907,515 UART: [kat] LMS
1,475,711 UART: [kat] --
1,476,452 UART: [cold-reset] ++
1,476,938 UART: [fht] Storing FHT @ 0x50003400
1,479,819 UART: [idev] ++
1,479,987 UART: [idev] CDI.KEYID = 6
1,480,347 UART: [idev] SUBJECT.KEYID = 7
1,480,771 UART: [idev] UDS.KEYID = 0
1,481,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,737 UART: [idev] Erasing UDS.KEYID = 0
1,505,295 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,743 UART: [idev] --
1,514,704 UART: [ldev] ++
1,514,872 UART: [ldev] CDI.KEYID = 6
1,515,235 UART: [ldev] SUBJECT.KEYID = 5
1,515,661 UART: [ldev] AUTHORITY.KEYID = 7
1,516,124 UART: [ldev] FE.KEYID = 1
1,521,554 UART: [ldev] Erasing FE.KEYID = 1
1,547,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,119 UART: [ldev] --
1,586,530 UART: [fwproc] Waiting for Commands...
1,587,397 UART: [fwproc] Received command 0x46574c44
1,588,188 UART: [fwproc] Received Image of size 114448 bytes
2,885,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,902 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,254 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,077,263 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,954 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,477,679 >>> mbox cmd response: failed
1,477,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,685 >>> mbox cmd response: failed
1,477,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,691 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,972 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,361 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
893,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,687 UART: [kat] ++
897,839 UART: [kat] sha1
902,265 UART: [kat] SHA2-256
904,205 UART: [kat] SHA2-384
907,018 UART: [kat] SHA2-512-ACC
908,919 UART: [kat] ECC-384
918,564 UART: [kat] HMAC-384Kdf
923,182 UART: [kat] LMS
1,171,510 UART: [kat] --
1,172,239 UART: [cold-reset] ++
1,172,581 UART: [fht] FHT @ 0x50003400
1,175,118 UART: [idev] ++
1,175,286 UART: [idev] CDI.KEYID = 6
1,175,646 UART: [idev] SUBJECT.KEYID = 7
1,176,070 UART: [idev] UDS.KEYID = 0
1,176,415 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,050 UART: [idev] Erasing UDS.KEYID = 0
1,201,001 UART: [idev] Sha1 KeyId Algorithm
1,209,665 UART: [idev] --
1,210,647 UART: [ldev] ++
1,210,815 UART: [ldev] CDI.KEYID = 6
1,211,178 UART: [ldev] SUBJECT.KEYID = 5
1,211,604 UART: [ldev] AUTHORITY.KEYID = 7
1,212,067 UART: [ldev] FE.KEYID = 1
1,217,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,905 UART: [ldev] --
1,282,416 UART: [fwproc] Wait for Commands...
1,283,240 UART: [fwproc] Recv command 0x46574c44
1,283,968 UART: [fwproc] Recv'd Img size: 114448 bytes
1,319,353 UART: ROM Fatal Error: 0x000B001B
1,320,512 >>> mbox cmd response: failed
1,320,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,518 >>> mbox cmd response: failed
1,320,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,524 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
893,514 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,639 UART: [kat] ++
897,791 UART: [kat] sha1
902,061 UART: [kat] SHA2-256
904,001 UART: [kat] SHA2-384
906,846 UART: [kat] SHA2-512-ACC
908,747 UART: [kat] ECC-384
918,438 UART: [kat] HMAC-384Kdf
922,974 UART: [kat] LMS
1,171,302 UART: [kat] --
1,171,927 UART: [cold-reset] ++
1,172,381 UART: [fht] FHT @ 0x50003400
1,175,046 UART: [idev] ++
1,175,214 UART: [idev] CDI.KEYID = 6
1,175,574 UART: [idev] SUBJECT.KEYID = 7
1,175,998 UART: [idev] UDS.KEYID = 0
1,176,343 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,722 UART: [idev] Erasing UDS.KEYID = 0
1,200,533 UART: [idev] Sha1 KeyId Algorithm
1,209,121 UART: [idev] --
1,210,109 UART: [ldev] ++
1,210,277 UART: [ldev] CDI.KEYID = 6
1,210,640 UART: [ldev] SUBJECT.KEYID = 5
1,211,066 UART: [ldev] AUTHORITY.KEYID = 7
1,211,529 UART: [ldev] FE.KEYID = 1
1,216,743 UART: [ldev] Erasing FE.KEYID = 1
1,242,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,829 UART: [ldev] --
1,282,306 UART: [fwproc] Wait for Commands...
1,282,930 UART: [fwproc] Recv command 0x46574c44
1,283,658 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,711 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,891 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,174,817 >>> mbox cmd response: failed
1,174,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,823 >>> mbox cmd response: failed
1,174,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,439 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,984 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,003 UART: [state] LifecycleState = Unprovisioned
86,658 UART: [state] DebugLocked = No
87,222 UART: [state] WD Timer not started. Device not locked for debugging
88,399 UART: [kat] SHA2-256
894,049 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,174 UART: [kat] ++
898,326 UART: [kat] sha1
902,446 UART: [kat] SHA2-256
904,386 UART: [kat] SHA2-384
907,149 UART: [kat] SHA2-512-ACC
909,050 UART: [kat] ECC-384
918,683 UART: [kat] HMAC-384Kdf
923,205 UART: [kat] LMS
1,171,533 UART: [kat] --
1,172,610 UART: [cold-reset] ++
1,172,978 UART: [fht] FHT @ 0x50003400
1,175,659 UART: [idev] ++
1,175,827 UART: [idev] CDI.KEYID = 6
1,176,187 UART: [idev] SUBJECT.KEYID = 7
1,176,611 UART: [idev] UDS.KEYID = 0
1,176,956 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,637 UART: [idev] Erasing UDS.KEYID = 0
1,202,036 UART: [idev] Sha1 KeyId Algorithm
1,210,486 UART: [idev] --
1,211,714 UART: [ldev] ++
1,211,882 UART: [ldev] CDI.KEYID = 6
1,212,245 UART: [ldev] SUBJECT.KEYID = 5
1,212,671 UART: [ldev] AUTHORITY.KEYID = 7
1,213,134 UART: [ldev] FE.KEYID = 1
1,218,550 UART: [ldev] Erasing FE.KEYID = 1
1,245,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,870 UART: [ldev] --
1,284,259 UART: [fwproc] Wait for Commands...
1,285,077 UART: [fwproc] Recv command 0x46574c44
1,285,805 UART: [fwproc] Recv'd Img size: 114448 bytes
1,321,040 UART: ROM Fatal Error: 0x000B001B
1,322,199 >>> mbox cmd response: failed
1,322,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,205 >>> mbox cmd response: failed
1,322,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
901,992 UART: [kat] SHA2-256
903,932 UART: [kat] SHA2-384
906,579 UART: [kat] SHA2-512-ACC
908,480 UART: [kat] ECC-384
918,431 UART: [kat] HMAC-384Kdf
923,119 UART: [kat] LMS
1,171,447 UART: [kat] --
1,172,104 UART: [cold-reset] ++
1,172,626 UART: [fht] FHT @ 0x50003400
1,175,195 UART: [idev] ++
1,175,363 UART: [idev] CDI.KEYID = 6
1,175,723 UART: [idev] SUBJECT.KEYID = 7
1,176,147 UART: [idev] UDS.KEYID = 0
1,176,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,817 UART: [idev] Erasing UDS.KEYID = 0
1,201,278 UART: [idev] Sha1 KeyId Algorithm
1,209,948 UART: [idev] --
1,210,902 UART: [ldev] ++
1,211,070 UART: [ldev] CDI.KEYID = 6
1,211,433 UART: [ldev] SUBJECT.KEYID = 5
1,211,859 UART: [ldev] AUTHORITY.KEYID = 7
1,212,322 UART: [ldev] FE.KEYID = 1
1,217,682 UART: [ldev] Erasing FE.KEYID = 1
1,244,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,044 UART: [ldev] --
1,283,383 UART: [fwproc] Wait for Commands...
1,284,169 UART: [fwproc] Recv command 0x46574c44
1,284,897 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,766 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,875 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,176,624 >>> mbox cmd response: failed
1,176,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,630 >>> mbox cmd response: failed
1,176,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,636 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,471 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,296 UART: [kat] SHA2-512-ACC
906,197 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,810 UART: [kat] LMS
1,169,122 UART: [kat] --
1,170,365 UART: [cold-reset] ++
1,170,811 UART: [fht] FHT @ 0x50003400
1,173,325 UART: [idev] ++
1,173,493 UART: [idev] CDI.KEYID = 6
1,173,854 UART: [idev] SUBJECT.KEYID = 7
1,174,279 UART: [idev] UDS.KEYID = 0
1,174,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,267 UART: [idev] Erasing UDS.KEYID = 0
1,199,093 UART: [idev] Sha1 KeyId Algorithm
1,207,945 UART: [idev] --
1,208,992 UART: [ldev] ++
1,209,160 UART: [ldev] CDI.KEYID = 6
1,209,524 UART: [ldev] SUBJECT.KEYID = 5
1,209,951 UART: [ldev] AUTHORITY.KEYID = 7
1,210,414 UART: [ldev] FE.KEYID = 1
1,215,424 UART: [ldev] Erasing FE.KEYID = 1
1,241,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,002 UART: [ldev] --
1,281,426 UART: [fwproc] Wait for Commands...
1,282,029 UART: [fwproc] Recv command 0x46574c44
1,282,762 UART: [fwproc] Recv'd Img size: 114448 bytes
1,318,483 UART: ROM Fatal Error: 0x000B001B
1,319,642 >>> mbox cmd response: failed
1,319,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,648 >>> mbox cmd response: failed
1,319,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,654 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,705 UART: [kat] SHA2-256
901,645 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
915,818 UART: [kat] HMAC-384Kdf
920,430 UART: [kat] LMS
1,168,742 UART: [kat] --
1,169,793 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha1 KeyId Algorithm
1,207,889 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,400 UART: [ldev] Erasing FE.KEYID = 1
1,242,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,378 UART: [ldev] --
1,281,686 UART: [fwproc] Wait for Commands...
1,282,333 UART: [fwproc] Recv command 0x46574c44
1,283,066 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,391 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,171,413 >>> mbox cmd response: failed
1,171,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,419 >>> mbox cmd response: failed
1,171,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,425 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,673 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,190 UART: [state] WD Timer not started. Device not locked for debugging
88,397 UART: [kat] SHA2-256
891,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,076 UART: [kat] ++
896,228 UART: [kat] sha1
900,486 UART: [kat] SHA2-256
902,426 UART: [kat] SHA2-384
905,123 UART: [kat] SHA2-512-ACC
907,024 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,455 UART: [kat] LMS
1,169,767 UART: [kat] --
1,170,600 UART: [cold-reset] ++
1,171,028 UART: [fht] FHT @ 0x50003400
1,173,744 UART: [idev] ++
1,173,912 UART: [idev] CDI.KEYID = 6
1,174,273 UART: [idev] SUBJECT.KEYID = 7
1,174,698 UART: [idev] UDS.KEYID = 0
1,175,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,866 UART: [idev] Erasing UDS.KEYID = 0
1,200,040 UART: [idev] Sha1 KeyId Algorithm
1,208,846 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,479 UART: [ldev] SUBJECT.KEYID = 5
1,210,906 UART: [ldev] AUTHORITY.KEYID = 7
1,211,369 UART: [ldev] FE.KEYID = 1
1,216,605 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,597 UART: [ldev] --
1,281,945 UART: [fwproc] Wait for Commands...
1,282,670 UART: [fwproc] Recv command 0x46574c44
1,283,403 UART: [fwproc] Recv'd Img size: 114448 bytes
1,318,682 UART: ROM Fatal Error: 0x000B001B
1,319,841 >>> mbox cmd response: failed
1,319,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,847 >>> mbox cmd response: failed
1,319,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,261 UART: [kat] SHA2-512-ACC
906,162 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,637 UART: [kat] LMS
1,168,949 UART: [kat] --
1,169,574 UART: [cold-reset] ++
1,169,910 UART: [fht] FHT @ 0x50003400
1,172,470 UART: [idev] ++
1,172,638 UART: [idev] CDI.KEYID = 6
1,172,999 UART: [idev] SUBJECT.KEYID = 7
1,173,424 UART: [idev] UDS.KEYID = 0
1,173,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,372 UART: [idev] Erasing UDS.KEYID = 0
1,198,414 UART: [idev] Sha1 KeyId Algorithm
1,207,380 UART: [idev] --
1,208,335 UART: [ldev] ++
1,208,503 UART: [ldev] CDI.KEYID = 6
1,208,867 UART: [ldev] SUBJECT.KEYID = 5
1,209,294 UART: [ldev] AUTHORITY.KEYID = 7
1,209,757 UART: [ldev] FE.KEYID = 1
1,215,163 UART: [ldev] Erasing FE.KEYID = 1
1,240,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,595 UART: [ldev] --
1,279,997 UART: [fwproc] Wait for Commands...
1,280,598 UART: [fwproc] Recv command 0x46574c44
1,281,331 UART: [fwproc] Recv'd Img size: 114448 bytes
2,580,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,771,920 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,172,056 >>> mbox cmd response: failed
1,172,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,062 >>> mbox cmd response: failed
1,172,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,068 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,806 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,085 UART:
192,474 UART: Running Caliptra ROM ...
193,677 UART:
193,834 UART: [state] CFI Enabled
261,802 UART: [state] LifecycleState = Manufacturing
263,724 UART: [state] DebugLocked = No
265,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,497 UART: [kat] SHA2-256
440,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,725 UART: [kat] ++
451,204 UART: [kat] sha1
461,381 UART: [kat] SHA2-256
464,069 UART: [kat] SHA2-384
470,267 UART: [kat] SHA2-512-ACC
472,602 UART: [kat] ECC-384
2,766,811 UART: [kat] HMAC-384Kdf
2,798,876 UART: [kat] LMS
3,989,183 UART: [kat] --
3,993,014 UART: [cold-reset] ++
3,995,222 UART: [fht] Storing FHT @ 0x50003400
4,005,787 UART: [idev] ++
4,006,365 UART: [idev] CDI.KEYID = 6
4,007,390 UART: [idev] SUBJECT.KEYID = 7
4,008,576 UART: [idev] UDS.KEYID = 0
4,014,431 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,158,255 UART: [idev] Erasing UDS.KEYID = 0
7,344,719 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,018 UART: [idev] --
7,372,995 UART: [ldev] ++
7,373,566 UART: [ldev] CDI.KEYID = 6
7,374,535 UART: [ldev] SUBJECT.KEYID = 5
7,375,754 UART: [ldev] AUTHORITY.KEYID = 7
7,376,988 UART: [ldev] FE.KEYID = 1
7,419,183 UART: [ldev] Erasing FE.KEYID = 1
10,749,845 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,030 UART: [ldev] --
13,109,491 UART: [fwproc] Waiting for Commands...
13,112,348 UART: [fwproc] Received command 0x46574c44
13,114,537 UART: [fwproc] Received Image of size 114124 bytes
13,208,589 UART: ROM Fatal Error: 0x000B0005
13,212,055 >>> mbox cmd response: failed
13,212,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,212,811 >>> mbox cmd response: failed
13,213,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,213,373 >>> mbox cmd response: failed
Initializing fuses
2,053,021 writing to cptra_bootfsm_go
2,242,354 UART:
2,242,714 UART: Running Caliptra ROM ...
2,243,762 UART:
2,243,919 UART: [state] CFI Enabled
2,318,315 UART: [state] LifecycleState = Manufacturing
2,320,249 UART: [state] DebugLocked = No
2,322,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,337 UART: [kat] SHA2-256
2,498,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,568 UART: [kat] ++
2,509,068 UART: [kat] sha1
2,519,962 UART: [kat] SHA2-256
2,522,626 UART: [kat] SHA2-384
2,527,917 UART: [kat] SHA2-512-ACC
2,530,269 UART: [kat] ECC-384
4,821,262 UART: [kat] HMAC-384Kdf
4,833,937 UART: [kat] LMS
6,024,199 UART: [kat] --
6,027,076 UART: [cold-reset] ++
6,028,585 UART: [fht] Storing FHT @ 0x50003400
6,039,967 UART: [idev] ++
6,040,542 UART: [idev] CDI.KEYID = 6
6,041,511 UART: [idev] SUBJECT.KEYID = 7
6,042,734 UART: [idev] UDS.KEYID = 0
6,045,434 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,189,112 UART: [idev] Erasing UDS.KEYID = 0
9,384,648 UART: [idev] Using Sha1 for KeyId Algorithm
9,406,792 UART: [idev] --
9,409,620 UART: [ldev] ++
9,410,195 UART: [ldev] CDI.KEYID = 6
9,411,160 UART: [ldev] SUBJECT.KEYID = 5
9,412,418 UART: [ldev] AUTHORITY.KEYID = 7
9,413,660 UART: [ldev] FE.KEYID = 1
9,456,173 UART: [ldev] Erasing FE.KEYID = 1
12,787,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,082,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,097,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,112,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,126,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,145,706 UART: [ldev] --
15,150,872 UART: [fwproc] Waiting for Commands...
15,154,214 UART: [fwproc] Received command 0x46574c44
15,156,400 UART: [fwproc] Received Image of size 114124 bytes
19,243,921 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,318,463 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,387,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
19,704,332 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,792,631 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
12,954,176 >>> mbox cmd response: failed
12,954,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,955,205 >>> mbox cmd response: failed
12,955,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,955,765 >>> mbox cmd response: failed
Initializing fuses
2,059,766 writing to cptra_bootfsm_go
5,849,044 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
19,952,106 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,559 UART:
193,081 UART: Running Caliptra ROM ...
194,224 UART:
603,694 UART: [state] CFI Enabled
619,032 UART: [state] LifecycleState = Manufacturing
620,926 UART: [state] DebugLocked = No
622,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,607 UART: [kat] SHA2-256
797,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,928 UART: [kat] ++
808,415 UART: [kat] sha1
820,377 UART: [kat] SHA2-256
823,102 UART: [kat] SHA2-384
829,895 UART: [kat] SHA2-512-ACC
832,237 UART: [kat] ECC-384
3,115,227 UART: [kat] HMAC-384Kdf
3,128,235 UART: [kat] LMS
4,318,376 UART: [kat] --
4,323,023 UART: [cold-reset] ++
4,324,909 UART: [fht] Storing FHT @ 0x50003400
4,335,151 UART: [idev] ++
4,335,767 UART: [idev] CDI.KEYID = 6
4,336,654 UART: [idev] SUBJECT.KEYID = 7
4,337,870 UART: [idev] UDS.KEYID = 0
4,343,680 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,487,141 UART: [idev] Erasing UDS.KEYID = 0
7,627,357 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,667 UART: [idev] --
7,654,043 UART: [ldev] ++
7,654,614 UART: [ldev] CDI.KEYID = 6
7,655,573 UART: [ldev] SUBJECT.KEYID = 5
7,656,788 UART: [ldev] AUTHORITY.KEYID = 7
7,658,024 UART: [ldev] FE.KEYID = 1
7,671,135 UART: [ldev] Erasing FE.KEYID = 1
10,959,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,257,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,271,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,286,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,301,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,863 UART: [ldev] --
13,324,856 UART: [fwproc] Waiting for Commands...
13,327,548 UART: [fwproc] Received command 0x46574c44
13,329,730 UART: [fwproc] Received Image of size 114124 bytes
13,420,321 UART: ROM Fatal Error: 0x000B0005
13,423,834 >>> mbox cmd response: failed
13,424,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,424,547 >>> mbox cmd response: failed
13,424,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,425,201 >>> mbox cmd response: failed
Initializing fuses
2,058,873 writing to cptra_bootfsm_go
2,248,195 UART:
2,248,539 UART: Running Caliptra ROM ...
2,249,678 UART:
7,045,750 UART: [state] CFI Enabled
7,059,431 UART: [state] LifecycleState = Manufacturing
7,061,363 UART: [state] DebugLocked = No
7,062,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,067,117 UART: [kat] SHA2-256
7,236,867 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,247,399 UART: [kat] ++
7,247,861 UART: [kat] sha1
7,258,205 UART: [kat] SHA2-256
7,260,897 UART: [kat] SHA2-384
7,266,452 UART: [kat] SHA2-512-ACC
7,268,806 UART: [kat] ECC-384
9,552,079 UART: [kat] HMAC-384Kdf
9,564,588 UART: [kat] LMS
10,754,706 UART: [kat] --
10,759,688 UART: [cold-reset] ++
10,761,292 UART: [fht] Storing FHT @ 0x50003400
10,772,737 UART: [idev] ++
10,773,309 UART: [idev] CDI.KEYID = 6
10,774,189 UART: [idev] SUBJECT.KEYID = 7
10,775,456 UART: [idev] UDS.KEYID = 0
10,778,474 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
10,921,945 UART: [idev] Erasing UDS.KEYID = 0
14,063,081 UART: [idev] Using Sha1 for KeyId Algorithm
14,085,974 UART: [idev] --
14,090,401 UART: [ldev] ++
14,090,972 UART: [ldev] CDI.KEYID = 6
14,091,990 UART: [ldev] SUBJECT.KEYID = 5
14,093,193 UART: [ldev] AUTHORITY.KEYID = 7
14,094,370 UART: [ldev] FE.KEYID = 1
14,105,361 UART: [ldev] Erasing FE.KEYID = 1
17,394,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,685,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,700,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,715,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,729,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,748,356 UART: [ldev] --
19,752,439 UART: [fwproc] Waiting for Commands...
19,755,670 UART: [fwproc] Received command 0x46574c44
19,757,855 UART: [fwproc] Received Image of size 114124 bytes
23,841,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,915,049 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,983,943 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
24,301,960 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
4,126,044 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
13,137,873 >>> mbox cmd response: failed
13,138,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,138,992 >>> mbox cmd response: failed
13,139,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,139,561 >>> mbox cmd response: failed
Initializing fuses
2,052,534 writing to cptra_bootfsm_go
10,841,275 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
24,819,710 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,199 UART:
192,564 UART: Running Caliptra ROM ...
193,747 UART:
193,898 UART: [state] CFI Enabled
267,476 UART: [state] LifecycleState = Manufacturing
269,380 UART: [state] DebugLocked = No
270,838 UART: [state] WD Timer not started. Device not locked for debugging
275,418 UART: [kat] SHA2-256
454,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,105 UART: [kat] ++
466,563 UART: [kat] sha1
478,948 UART: [kat] SHA2-256
482,006 UART: [kat] SHA2-384
488,206 UART: [kat] SHA2-512-ACC
491,142 UART: [kat] ECC-384
2,948,686 UART: [kat] HMAC-384Kdf
2,970,950 UART: [kat] LMS
3,500,410 UART: [kat] --
3,504,938 UART: [cold-reset] ++
3,507,036 UART: [fht] FHT @ 0x50003400
3,518,071 UART: [idev] ++
3,518,638 UART: [idev] CDI.KEYID = 6
3,519,548 UART: [idev] SUBJECT.KEYID = 7
3,520,705 UART: [idev] UDS.KEYID = 0
3,523,677 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,668,281 UART: [idev] Erasing UDS.KEYID = 0
6,028,802 UART: [idev] Sha1 KeyId Algorithm
6,050,524 UART: [idev] --
6,055,011 UART: [ldev] ++
6,055,588 UART: [ldev] CDI.KEYID = 6
6,056,475 UART: [ldev] SUBJECT.KEYID = 5
6,057,692 UART: [ldev] AUTHORITY.KEYID = 7
6,058,948 UART: [ldev] FE.KEYID = 1
6,100,412 UART: [ldev] Erasing FE.KEYID = 1
8,602,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,570 UART: [ldev] --
10,414,862 UART: [fwproc] Wait for Commands...
10,416,298 UART: [fwproc] Recv command 0x46574c44
10,418,408 UART: [fwproc] Recv'd Img size: 114448 bytes
10,510,884 UART: ROM Fatal Error: 0x000B0005
10,514,017 >>> mbox cmd response: failed
10,514,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,514,845 >>> mbox cmd response: failed
10,515,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,515,423 >>> mbox cmd response: failed
Initializing fuses
2,050,153 writing to cptra_bootfsm_go
2,239,468 UART:
2,239,819 UART: Running Caliptra ROM ...
2,240,950 UART:
2,241,140 UART: [state] CFI Enabled
2,312,940 UART: [state] LifecycleState = Manufacturing
2,314,810 UART: [state] DebugLocked = No
2,316,522 UART: [state] WD Timer not started. Device not locked for debugging
2,320,160 UART: [kat] SHA2-256
2,499,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,835 UART: [kat] ++
2,511,382 UART: [kat] sha1
2,521,036 UART: [kat] SHA2-256
2,524,055 UART: [kat] SHA2-384
2,530,261 UART: [kat] SHA2-512-ACC
2,533,204 UART: [kat] ECC-384
4,999,757 UART: [kat] HMAC-384Kdf
5,022,576 UART: [kat] LMS
5,552,050 UART: [kat] --
5,556,637 UART: [cold-reset] ++
5,557,489 UART: [fht] FHT @ 0x50003400
5,567,913 UART: [idev] ++
5,568,470 UART: [idev] CDI.KEYID = 6
5,569,349 UART: [idev] SUBJECT.KEYID = 7
5,570,611 UART: [idev] UDS.KEYID = 0
5,573,457 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,718,060 UART: [idev] Erasing UDS.KEYID = 0
8,074,265 UART: [idev] Sha1 KeyId Algorithm
8,097,124 UART: [idev] --
8,101,504 UART: [ldev] ++
8,102,073 UART: [ldev] CDI.KEYID = 6
8,102,961 UART: [ldev] SUBJECT.KEYID = 5
8,104,177 UART: [ldev] AUTHORITY.KEYID = 7
8,105,412 UART: [ldev] FE.KEYID = 1
8,148,710 UART: [ldev] Erasing FE.KEYID = 1
10,650,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,370,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,386,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,402,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,418,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,438,923 UART: [ldev] --
12,442,942 UART: [fwproc] Wait for Commands...
12,444,944 UART: [fwproc] Recv command 0x46574c44
12,447,044 UART: [fwproc] Recv'd Img size: 114448 bytes
15,877,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,952,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,021,491 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,339,708 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,362,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,293,703 >>> mbox cmd response: failed
10,294,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,294,631 >>> mbox cmd response: failed
10,294,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,295,190 >>> mbox cmd response: failed
Initializing fuses
2,069,883 writing to cptra_bootfsm_go
5,436,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,140,909 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,527 UART:
192,923 UART: Running Caliptra ROM ...
194,257 UART:
603,747 UART: [state] CFI Enabled
617,475 UART: [state] LifecycleState = Manufacturing
619,358 UART: [state] DebugLocked = No
620,624 UART: [state] WD Timer not started. Device not locked for debugging
624,763 UART: [kat] SHA2-256
803,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,485 UART: [kat] ++
816,023 UART: [kat] sha1
826,644 UART: [kat] SHA2-256
829,662 UART: [kat] SHA2-384
836,342 UART: [kat] SHA2-512-ACC
839,327 UART: [kat] ECC-384
3,280,141 UART: [kat] HMAC-384Kdf
3,292,597 UART: [kat] LMS
3,822,093 UART: [kat] --
3,827,064 UART: [cold-reset] ++
3,828,241 UART: [fht] FHT @ 0x50003400
3,837,953 UART: [idev] ++
3,838,515 UART: [idev] CDI.KEYID = 6
3,839,394 UART: [idev] SUBJECT.KEYID = 7
3,840,608 UART: [idev] UDS.KEYID = 0
3,843,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,485 UART: [idev] Erasing UDS.KEYID = 0
6,311,018 UART: [idev] Sha1 KeyId Algorithm
6,333,705 UART: [idev] --
6,337,082 UART: [ldev] ++
6,337,661 UART: [ldev] CDI.KEYID = 6
6,338,575 UART: [ldev] SUBJECT.KEYID = 5
6,339,753 UART: [ldev] AUTHORITY.KEYID = 7
6,340,990 UART: [ldev] FE.KEYID = 1
6,352,394 UART: [ldev] Erasing FE.KEYID = 1
8,822,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,335 UART: [ldev] --
10,610,950 UART: [fwproc] Wait for Commands...
10,613,156 UART: [fwproc] Recv command 0x46574c44
10,615,253 UART: [fwproc] Recv'd Img size: 114448 bytes
10,707,784 UART: ROM Fatal Error: 0x000B0005
10,710,922 >>> mbox cmd response: failed
10,711,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,711,653 >>> mbox cmd response: failed
10,711,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,712,232 >>> mbox cmd response: failed
Initializing fuses
2,052,811 writing to cptra_bootfsm_go
2,242,100 UART:
2,242,458 UART: Running Caliptra ROM ...
2,243,599 UART:
9,755,953 UART: [state] CFI Enabled
9,767,008 UART: [state] LifecycleState = Manufacturing
9,768,870 UART: [state] DebugLocked = No
9,770,501 UART: [state] WD Timer not started. Device not locked for debugging
9,774,568 UART: [kat] SHA2-256
9,953,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,965,291 UART: [kat] ++
9,965,751 UART: [kat] sha1
9,978,313 UART: [kat] SHA2-256
9,981,335 UART: [kat] SHA2-384
9,986,623 UART: [kat] SHA2-512-ACC
9,989,564 UART: [kat] ECC-384
12,431,112 UART: [kat] HMAC-384Kdf
12,443,931 UART: [kat] LMS
12,973,418 UART: [kat] --
12,978,754 UART: [cold-reset] ++
12,979,739 UART: [fht] FHT @ 0x50003400
12,991,018 UART: [idev] ++
12,991,591 UART: [idev] CDI.KEYID = 6
12,992,469 UART: [idev] SUBJECT.KEYID = 7
12,993,682 UART: [idev] UDS.KEYID = 0
12,996,670 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
13,140,541 UART: [idev] Erasing UDS.KEYID = 0
15,465,940 UART: [idev] Sha1 KeyId Algorithm
15,488,251 UART: [idev] --
15,492,349 UART: [ldev] ++
15,492,915 UART: [ldev] CDI.KEYID = 6
15,493,845 UART: [ldev] SUBJECT.KEYID = 5
15,495,053 UART: [ldev] AUTHORITY.KEYID = 7
15,496,286 UART: [ldev] FE.KEYID = 1
15,508,283 UART: [ldev] Erasing FE.KEYID = 1
17,983,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,701,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,717,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,733,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,749,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,770,085 UART: [ldev] --
19,775,322 UART: [fwproc] Wait for Commands...
19,776,867 UART: [fwproc] Recv command 0x46574c44
19,778,930 UART: [fwproc] Recv'd Img size: 114448 bytes
23,213,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,282,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,351,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
23,670,485 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,698,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,493,595 >>> mbox cmd response: failed
10,494,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,494,540 >>> mbox cmd response: failed
10,494,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,495,104 >>> mbox cmd response: failed
Initializing fuses
2,051,313 writing to cptra_bootfsm_go
13,070,004 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
23,665,276 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,444,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,355,531 >>> mbox cmd response: failed
10,356,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,356,789 >>> mbox cmd response: failed
10,357,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,357,359 >>> mbox cmd response: failed
Initializing fuses
2,055,276 writing to cptra_bootfsm_go
5,475,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,789,030 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,761,733 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
10,570,526 >>> mbox cmd response: failed
10,571,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,572,045 >>> mbox cmd response: failed
10,572,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,572,682 >>> mbox cmd response: failed
Initializing fuses
2,055,446 writing to cptra_bootfsm_go
13,039,364 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
24,276,212 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Manufacturing
85,879 UART: [state] DebugLocked = No
86,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,043 UART: [kat] SHA2-256
881,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,089 UART: [kat] ++
886,241 UART: [kat] sha1
890,431 UART: [kat] SHA2-256
892,369 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,482 UART: [kat] HMAC-384Kdf
907,006 UART: [kat] LMS
1,475,202 UART: [kat] --
1,475,973 UART: [cold-reset] ++
1,476,423 UART: [fht] Storing FHT @ 0x50003400
1,479,130 UART: [idev] ++
1,479,298 UART: [idev] CDI.KEYID = 6
1,479,658 UART: [idev] SUBJECT.KEYID = 7
1,480,082 UART: [idev] UDS.KEYID = 0
1,480,427 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,174 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,144 UART: [idev] --
1,514,197 UART: [ldev] ++
1,514,365 UART: [ldev] CDI.KEYID = 6
1,514,728 UART: [ldev] SUBJECT.KEYID = 5
1,515,154 UART: [ldev] AUTHORITY.KEYID = 7
1,515,617 UART: [ldev] FE.KEYID = 1
1,520,509 UART: [ldev] Erasing FE.KEYID = 1
1,545,554 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,378 UART: [ldev] --
1,584,733 UART: [fwproc] Waiting for Commands...
1,585,352 UART: [fwproc] Received command 0x46574c44
1,586,143 UART: [fwproc] Received Image of size 114448 bytes
1,630,780 UART: ROM Fatal Error: 0x000B0005
1,631,937 >>> mbox cmd response: failed
1,631,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,943 >>> mbox cmd response: failed
1,631,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,949 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,618 UART: [state] LifecycleState = Unprovisioned
85,273 UART: [state] DebugLocked = No
85,895 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,485 UART: [kat] SHA2-256
881,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,531 UART: [kat] ++
885,683 UART: [kat] sha1
889,891 UART: [kat] SHA2-256
891,829 UART: [kat] SHA2-384
894,694 UART: [kat] SHA2-512-ACC
896,595 UART: [kat] ECC-384
902,262 UART: [kat] HMAC-384Kdf
906,880 UART: [kat] LMS
1,475,076 UART: [kat] --
1,475,737 UART: [cold-reset] ++
1,476,177 UART: [fht] Storing FHT @ 0x50003400
1,478,850 UART: [idev] ++
1,479,018 UART: [idev] CDI.KEYID = 6
1,479,378 UART: [idev] SUBJECT.KEYID = 7
1,479,802 UART: [idev] UDS.KEYID = 0
1,480,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,487,638 UART: [idev] Erasing UDS.KEYID = 0
1,504,414 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,152 UART: [idev] --
1,514,063 UART: [ldev] ++
1,514,231 UART: [ldev] CDI.KEYID = 6
1,514,594 UART: [ldev] SUBJECT.KEYID = 5
1,515,020 UART: [ldev] AUTHORITY.KEYID = 7
1,515,483 UART: [ldev] FE.KEYID = 1
1,520,887 UART: [ldev] Erasing FE.KEYID = 1
1,546,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,732 UART: [ldev] --
1,585,159 UART: [fwproc] Waiting for Commands...
1,586,016 UART: [fwproc] Received command 0x46574c44
1,586,807 UART: [fwproc] Received Image of size 114448 bytes
2,886,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,549 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,078,920 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,485,920 >>> mbox cmd response: failed
1,485,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,926 >>> mbox cmd response: failed
1,485,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,932 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,972 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Manufacturing
86,072 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,220 UART: [kat] SHA2-256
882,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,266 UART: [kat] ++
886,418 UART: [kat] sha1
890,634 UART: [kat] SHA2-256
892,572 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
902,653 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,462 UART: [cold-reset] ++
1,476,788 UART: [fht] Storing FHT @ 0x50003400
1,479,487 UART: [idev] ++
1,479,655 UART: [idev] CDI.KEYID = 6
1,480,015 UART: [idev] SUBJECT.KEYID = 7
1,480,439 UART: [idev] UDS.KEYID = 0
1,480,784 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,233 UART: [idev] Erasing UDS.KEYID = 0
1,504,599 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,289 UART: [idev] --
1,514,388 UART: [ldev] ++
1,514,556 UART: [ldev] CDI.KEYID = 6
1,514,919 UART: [ldev] SUBJECT.KEYID = 5
1,515,345 UART: [ldev] AUTHORITY.KEYID = 7
1,515,808 UART: [ldev] FE.KEYID = 1
1,520,886 UART: [ldev] Erasing FE.KEYID = 1
1,546,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,167 UART: [ldev] --
1,585,574 UART: [fwproc] Waiting for Commands...
1,586,207 UART: [fwproc] Received command 0x46574c44
1,586,998 UART: [fwproc] Received Image of size 114448 bytes
1,632,095 UART: ROM Fatal Error: 0x000B0005
1,633,252 >>> mbox cmd response: failed
1,633,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,258 >>> mbox cmd response: failed
1,633,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,248 UART: [kat] SHA2-256
882,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,294 UART: [kat] ++
886,446 UART: [kat] sha1
890,670 UART: [kat] SHA2-256
892,608 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
902,883 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,588 UART: [cold-reset] ++
1,477,152 UART: [fht] Storing FHT @ 0x50003400
1,479,927 UART: [idev] ++
1,480,095 UART: [idev] CDI.KEYID = 6
1,480,455 UART: [idev] SUBJECT.KEYID = 7
1,480,879 UART: [idev] UDS.KEYID = 0
1,481,224 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,191 UART: [idev] Erasing UDS.KEYID = 0
1,505,457 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,037 UART: [idev] --
1,515,234 UART: [ldev] ++
1,515,402 UART: [ldev] CDI.KEYID = 6
1,515,765 UART: [ldev] SUBJECT.KEYID = 5
1,516,191 UART: [ldev] AUTHORITY.KEYID = 7
1,516,654 UART: [ldev] FE.KEYID = 1
1,521,896 UART: [ldev] Erasing FE.KEYID = 1
1,547,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,369 UART: [ldev] --
1,586,682 UART: [fwproc] Waiting for Commands...
1,587,325 UART: [fwproc] Received command 0x46574c44
1,588,116 UART: [fwproc] Received Image of size 114448 bytes
2,887,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,312 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,637 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,986 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,485,231 >>> mbox cmd response: failed
1,485,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,237 >>> mbox cmd response: failed
1,485,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,243 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,037 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Manufacturing
85,697 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
893,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,137 UART: [kat] ++
897,289 UART: [kat] sha1
901,599 UART: [kat] SHA2-256
903,539 UART: [kat] SHA2-384
906,178 UART: [kat] SHA2-512-ACC
908,079 UART: [kat] ECC-384
917,680 UART: [kat] HMAC-384Kdf
922,026 UART: [kat] LMS
1,170,354 UART: [kat] --
1,170,969 UART: [cold-reset] ++
1,171,365 UART: [fht] FHT @ 0x50003400
1,173,820 UART: [idev] ++
1,173,988 UART: [idev] CDI.KEYID = 6
1,174,348 UART: [idev] SUBJECT.KEYID = 7
1,174,772 UART: [idev] UDS.KEYID = 0
1,175,117 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,778 UART: [idev] Erasing UDS.KEYID = 0
1,199,689 UART: [idev] Sha1 KeyId Algorithm
1,208,221 UART: [idev] --
1,209,385 UART: [ldev] ++
1,209,553 UART: [ldev] CDI.KEYID = 6
1,209,916 UART: [ldev] SUBJECT.KEYID = 5
1,210,342 UART: [ldev] AUTHORITY.KEYID = 7
1,210,805 UART: [ldev] FE.KEYID = 1
1,216,123 UART: [ldev] Erasing FE.KEYID = 1
1,242,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,219 UART: [ldev] --
1,282,722 UART: [fwproc] Wait for Commands...
1,283,534 UART: [fwproc] Recv command 0x46574c44
1,284,262 UART: [fwproc] Recv'd Img size: 114448 bytes
1,329,159 UART: ROM Fatal Error: 0x000B0005
1,330,316 >>> mbox cmd response: failed
1,330,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,322 >>> mbox cmd response: failed
1,330,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
893,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,489 UART: [kat] ++
897,641 UART: [kat] sha1
901,811 UART: [kat] SHA2-256
903,751 UART: [kat] SHA2-384
906,632 UART: [kat] SHA2-512-ACC
908,533 UART: [kat] ECC-384
918,158 UART: [kat] HMAC-384Kdf
922,708 UART: [kat] LMS
1,171,036 UART: [kat] --
1,171,617 UART: [cold-reset] ++
1,172,013 UART: [fht] FHT @ 0x50003400
1,174,736 UART: [idev] ++
1,174,904 UART: [idev] CDI.KEYID = 6
1,175,264 UART: [idev] SUBJECT.KEYID = 7
1,175,688 UART: [idev] UDS.KEYID = 0
1,176,033 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,488 UART: [idev] Erasing UDS.KEYID = 0
1,200,989 UART: [idev] Sha1 KeyId Algorithm
1,209,465 UART: [idev] --
1,210,505 UART: [ldev] ++
1,210,673 UART: [ldev] CDI.KEYID = 6
1,211,036 UART: [ldev] SUBJECT.KEYID = 5
1,211,462 UART: [ldev] AUTHORITY.KEYID = 7
1,211,925 UART: [ldev] FE.KEYID = 1
1,217,181 UART: [ldev] Erasing FE.KEYID = 1
1,243,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,181 UART: [ldev] --
1,282,498 UART: [fwproc] Wait for Commands...
1,283,198 UART: [fwproc] Recv command 0x46574c44
1,283,926 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,573 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,213 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,185,477 >>> mbox cmd response: failed
1,185,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,483 >>> mbox cmd response: failed
1,185,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,868 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Manufacturing
85,946 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
893,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,610 UART: [kat] ++
897,762 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,743 UART: [kat] SHA2-512-ACC
908,644 UART: [kat] ECC-384
918,575 UART: [kat] HMAC-384Kdf
923,299 UART: [kat] LMS
1,171,627 UART: [kat] --
1,172,252 UART: [cold-reset] ++
1,172,714 UART: [fht] FHT @ 0x50003400
1,175,457 UART: [idev] ++
1,175,625 UART: [idev] CDI.KEYID = 6
1,175,985 UART: [idev] SUBJECT.KEYID = 7
1,176,409 UART: [idev] UDS.KEYID = 0
1,176,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,251 UART: [idev] Erasing UDS.KEYID = 0
1,201,692 UART: [idev] Sha1 KeyId Algorithm
1,210,116 UART: [idev] --
1,211,210 UART: [ldev] ++
1,211,378 UART: [ldev] CDI.KEYID = 6
1,211,741 UART: [ldev] SUBJECT.KEYID = 5
1,212,167 UART: [ldev] AUTHORITY.KEYID = 7
1,212,630 UART: [ldev] FE.KEYID = 1
1,218,186 UART: [ldev] Erasing FE.KEYID = 1
1,244,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,814 UART: [ldev] --
1,284,161 UART: [fwproc] Wait for Commands...
1,284,875 UART: [fwproc] Recv command 0x46574c44
1,285,603 UART: [fwproc] Recv'd Img size: 114448 bytes
1,330,824 UART: ROM Fatal Error: 0x000B0005
1,331,981 >>> mbox cmd response: failed
1,331,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,987 >>> mbox cmd response: failed
1,331,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
893,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,974 UART: [kat] ++
898,126 UART: [kat] sha1
902,366 UART: [kat] SHA2-256
904,306 UART: [kat] SHA2-384
907,015 UART: [kat] SHA2-512-ACC
908,916 UART: [kat] ECC-384
918,641 UART: [kat] HMAC-384Kdf
923,079 UART: [kat] LMS
1,171,407 UART: [kat] --
1,172,092 UART: [cold-reset] ++
1,172,666 UART: [fht] FHT @ 0x50003400
1,175,313 UART: [idev] ++
1,175,481 UART: [idev] CDI.KEYID = 6
1,175,841 UART: [idev] SUBJECT.KEYID = 7
1,176,265 UART: [idev] UDS.KEYID = 0
1,176,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,091 UART: [idev] Erasing UDS.KEYID = 0
1,201,486 UART: [idev] Sha1 KeyId Algorithm
1,210,108 UART: [idev] --
1,211,280 UART: [ldev] ++
1,211,448 UART: [ldev] CDI.KEYID = 6
1,211,811 UART: [ldev] SUBJECT.KEYID = 5
1,212,237 UART: [ldev] AUTHORITY.KEYID = 7
1,212,700 UART: [ldev] FE.KEYID = 1
1,218,034 UART: [ldev] Erasing FE.KEYID = 1
1,244,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,214 UART: [ldev] --
1,283,629 UART: [fwproc] Wait for Commands...
1,284,245 UART: [fwproc] Recv command 0x46574c44
1,284,973 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,511 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,854 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,162 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,412 >>> mbox cmd response: failed
1,183,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,418 >>> mbox cmd response: failed
1,183,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,127 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Manufacturing
85,787 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,307 UART: [idev] ++
1,173,475 UART: [idev] CDI.KEYID = 6
1,173,836 UART: [idev] SUBJECT.KEYID = 7
1,174,261 UART: [idev] UDS.KEYID = 0
1,174,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,363 UART: [idev] Erasing UDS.KEYID = 0
1,199,503 UART: [idev] Sha1 KeyId Algorithm
1,208,365 UART: [idev] --
1,209,182 UART: [ldev] ++
1,209,350 UART: [ldev] CDI.KEYID = 6
1,209,714 UART: [ldev] SUBJECT.KEYID = 5
1,210,141 UART: [ldev] AUTHORITY.KEYID = 7
1,210,604 UART: [ldev] FE.KEYID = 1
1,215,466 UART: [ldev] Erasing FE.KEYID = 1
1,241,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,914 UART: [ldev] --
1,281,262 UART: [fwproc] Wait for Commands...
1,281,945 UART: [fwproc] Recv command 0x46574c44
1,282,678 UART: [fwproc] Recv'd Img size: 114448 bytes
1,327,533 UART: ROM Fatal Error: 0x000B0005
1,328,690 >>> mbox cmd response: failed
1,328,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,696 >>> mbox cmd response: failed
1,328,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,334 UART: [kat] SHA2-512-ACC
906,235 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,481 UART: [fht] FHT @ 0x50003400
1,173,159 UART: [idev] ++
1,173,327 UART: [idev] CDI.KEYID = 6
1,173,688 UART: [idev] SUBJECT.KEYID = 7
1,174,113 UART: [idev] UDS.KEYID = 0
1,174,459 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,341 UART: [idev] Erasing UDS.KEYID = 0
1,199,297 UART: [idev] Sha1 KeyId Algorithm
1,208,145 UART: [idev] --
1,209,244 UART: [ldev] ++
1,209,412 UART: [ldev] CDI.KEYID = 6
1,209,776 UART: [ldev] SUBJECT.KEYID = 5
1,210,203 UART: [ldev] AUTHORITY.KEYID = 7
1,210,666 UART: [ldev] FE.KEYID = 1
1,215,838 UART: [ldev] Erasing FE.KEYID = 1
1,242,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,798 UART: [ldev] --
1,282,252 UART: [fwproc] Wait for Commands...
1,282,839 UART: [fwproc] Recv command 0x46574c44
1,283,572 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,025 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,179,391 >>> mbox cmd response: failed
1,179,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,397 >>> mbox cmd response: failed
1,179,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,271 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Manufacturing
85,824 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,419 UART: [kat] SHA2-512-ACC
906,320 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,169,782 UART: [cold-reset] ++
1,170,188 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,174,014 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,448 UART: [idev] Erasing UDS.KEYID = 0
1,198,928 UART: [idev] Sha1 KeyId Algorithm
1,207,818 UART: [idev] --
1,208,909 UART: [ldev] ++
1,209,077 UART: [ldev] CDI.KEYID = 6
1,209,441 UART: [ldev] SUBJECT.KEYID = 5
1,209,868 UART: [ldev] AUTHORITY.KEYID = 7
1,210,331 UART: [ldev] FE.KEYID = 1
1,215,661 UART: [ldev] Erasing FE.KEYID = 1
1,241,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,843 UART: [ldev] --
1,281,241 UART: [fwproc] Wait for Commands...
1,281,968 UART: [fwproc] Recv command 0x46574c44
1,282,701 UART: [fwproc] Recv'd Img size: 114448 bytes
1,326,976 UART: ROM Fatal Error: 0x000B0005
1,328,133 >>> mbox cmd response: failed
1,328,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,139 >>> mbox cmd response: failed
1,328,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,672 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,169,918 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,174,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,972 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,207,792 UART: [idev] --
1,208,871 UART: [ldev] ++
1,209,039 UART: [ldev] CDI.KEYID = 6
1,209,403 UART: [ldev] SUBJECT.KEYID = 5
1,209,830 UART: [ldev] AUTHORITY.KEYID = 7
1,210,293 UART: [ldev] FE.KEYID = 1
1,215,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,747 UART: [ldev] --
1,281,063 UART: [fwproc] Wait for Commands...
1,281,856 UART: [fwproc] Recv command 0x46574c44
1,282,589 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,738 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,931 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,586 >>> mbox cmd response: failed
1,181,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,592 >>> mbox cmd response: failed
1,181,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,727 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
191,530 UART:
191,893 UART: Running Caliptra ROM ...
193,057 UART:
193,216 UART: [state] CFI Enabled
262,228 UART: [state] LifecycleState = Unprovisioned
264,188 UART: [state] DebugLocked = Yes
267,121 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,726 UART: [kat] SHA2-256
442,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,972 UART: [kat] ++
453,512 UART: [kat] sha1
464,773 UART: [kat] SHA2-256
467,458 UART: [kat] SHA2-384
473,435 UART: [kat] SHA2-512-ACC
475,827 UART: [kat] ECC-384
2,763,810 UART: [kat] HMAC-384Kdf
2,778,164 UART: [kat] LMS
3,968,437 UART: [kat] --
3,974,125 UART: [cold-reset] ++
3,975,742 UART: [fht] Storing FHT @ 0x50003400
3,987,118 UART: [idev] ++
3,987,701 UART: [idev] CDI.KEYID = 6
3,988,719 UART: [idev] SUBJECT.KEYID = 7
3,989,880 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,456 UART:
193,206 UART: Running Caliptra ROM ...
194,362 UART:
194,503 UART: [state] CFI Enabled
251,994 UART: [state] LifecycleState = Manufacturing
253,947 UART: [state] DebugLocked = Yes
256,333 UART: [state] Starting the Watchdog Timer 40000000 cycles
262,211 UART: [kat] SHA2-256
431,933 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,427 UART: [kat] ++
442,938 UART: [kat] sha1
455,620 UART: [kat] SHA2-256
457,822 UART: [kat] SHA2-384
464,321 UART: [kat] SHA2-512-ACC
466,667 UART: [kat] ECC-384
2,753,744 UART: [kat] HMAC-384Kdf
2,784,281 UART: [kat] LMS
3,974,594 UART: [kat] --
3,978,440 UART: [cold-reset] ++
3,980,826 UART: [fht] Storing FHT @ 0x50003400
3,991,988 UART: [idev] ++
3,992,608 UART: [idev] CDI.KEYID = 6
3,993,496 UART: [idev] SUBJECT.KEYID = 7
3,994,763 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
191,589 UART:
191,948 UART: Running Caliptra ROM ...
193,046 UART:
193,191 UART: [state] CFI Enabled
263,967 UART: [state] LifecycleState = Unknown
265,654 UART: [state] DebugLocked = Yes
266,937 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,023 UART: [kat] SHA2-256
442,731 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,230 UART: [kat] ++
453,698 UART: [kat] sha1
465,005 UART: [kat] SHA2-256
467,666 UART: [kat] SHA2-384
473,167 UART: [kat] SHA2-512-ACC
475,563 UART: [kat] ECC-384
2,766,537 UART: [kat] HMAC-384Kdf
2,777,996 UART: [kat] LMS
3,968,296 UART: [kat] --
3,971,280 UART: [cold-reset] ++
3,973,009 UART: [fht] Storing FHT @ 0x50003400
3,984,767 UART: [idev] ++
3,985,391 UART: [idev] CDI.KEYID = 6
3,986,274 UART: [idev] SUBJECT.KEYID = 7
3,987,540 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
191,722 UART:
192,443 UART: Running Caliptra ROM ...
193,606 UART:
193,750 UART: [state] CFI Enabled
268,707 UART: [state] LifecycleState = Production
270,582 UART: [state] DebugLocked = Yes
272,865 UART: [state] Starting the Watchdog Timer 40000000 cycles
277,670 UART: [kat] SHA2-256
447,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,887 UART: [kat] ++
458,407 UART: [kat] sha1
469,207 UART: [kat] SHA2-256
471,883 UART: [kat] SHA2-384
477,060 UART: [kat] SHA2-512-ACC
479,466 UART: [kat] ECC-384
2,771,468 UART: [kat] HMAC-384Kdf
2,803,159 UART: [kat] LMS
3,993,483 UART: [kat] --
3,997,441 UART: [cold-reset] ++
3,999,918 UART: [fht] Storing FHT @ 0x50003400
4,011,724 UART: [idev] ++
4,012,311 UART: [idev] CDI.KEYID = 6
4,013,332 UART: [idev] SUBJECT.KEYID = 7
4,014,494 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,415 UART:
193,158 UART: Running Caliptra ROM ...
194,304 UART:
194,451 UART: [state] CFI Enabled
266,043 UART: [state] LifecycleState = Unprovisioned
268,018 UART: [state] DebugLocked = No
270,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,264 UART: [kat] SHA2-256
444,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,488 UART: [kat] ++
455,965 UART: [kat] sha1
466,358 UART: [kat] SHA2-256
469,048 UART: [kat] SHA2-384
474,670 UART: [kat] SHA2-512-ACC
477,051 UART: [kat] ECC-384
2,771,919 UART: [kat] HMAC-384Kdf
2,803,520 UART: [kat] LMS
3,993,840 UART: [kat] --
3,999,963 UART: [cold-reset] ++
4,001,221 UART: [fht] Storing FHT @ 0x50003400
4,013,204 UART: [idev] ++
4,013,783 UART: [idev] CDI.KEYID = 6
4,014,700 UART: [idev] SUBJECT.KEYID = 7
4,015,969 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,221 UART:
192,592 UART: Running Caliptra ROM ...
193,824 UART:
193,974 UART: [state] CFI Enabled
263,735 UART: [state] LifecycleState = Manufacturing
265,677 UART: [state] DebugLocked = No
268,037 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,660 UART: [kat] SHA2-256
443,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,896 UART: [kat] ++
454,374 UART: [kat] sha1
465,278 UART: [kat] SHA2-256
467,962 UART: [kat] SHA2-384
473,911 UART: [kat] SHA2-512-ACC
476,237 UART: [kat] ECC-384
2,765,680 UART: [kat] HMAC-384Kdf
2,778,732 UART: [kat] LMS
3,969,049 UART: [kat] --
3,973,685 UART: [cold-reset] ++
3,976,208 UART: [fht] Storing FHT @ 0x50003400
3,988,824 UART: [idev] ++
3,989,388 UART: [idev] CDI.KEYID = 6
3,990,507 UART: [idev] SUBJECT.KEYID = 7
3,991,630 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,253 UART:
192,612 UART: Running Caliptra ROM ...
193,758 UART:
193,901 UART: [state] CFI Enabled
264,172 UART: [state] LifecycleState = Unknown
265,867 UART: [state] DebugLocked = No
268,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,171 UART: [kat] SHA2-256
443,921 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,415 UART: [kat] ++
454,889 UART: [kat] sha1
467,603 UART: [kat] SHA2-256
470,290 UART: [kat] SHA2-384
475,184 UART: [kat] SHA2-512-ACC
477,598 UART: [kat] ECC-384
2,767,135 UART: [kat] HMAC-384Kdf
2,797,350 UART: [kat] LMS
3,987,664 UART: [kat] --
3,991,689 UART: [cold-reset] ++
3,993,205 UART: [fht] Storing FHT @ 0x50003400
4,004,161 UART: [idev] ++
4,004,734 UART: [idev] CDI.KEYID = 6
4,005,647 UART: [idev] SUBJECT.KEYID = 7
4,006,925 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,127 UART:
192,492 UART: Running Caliptra ROM ...
193,720 UART:
193,876 UART: [state] CFI Enabled
264,063 UART: [state] LifecycleState = Production
265,913 UART: [state] DebugLocked = No
268,324 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,341 UART: [kat] SHA2-256
443,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,530 UART: [kat] ++
454,009 UART: [kat] sha1
465,323 UART: [kat] SHA2-256
468,008 UART: [kat] SHA2-384
473,621 UART: [kat] SHA2-512-ACC
476,015 UART: [kat] ECC-384
2,764,862 UART: [kat] HMAC-384Kdf
2,797,474 UART: [kat] LMS
3,987,757 UART: [kat] --
3,993,926 UART: [cold-reset] ++
3,995,756 UART: [fht] Storing FHT @ 0x50003400
4,006,216 UART: [idev] ++
4,006,788 UART: [idev] CDI.KEYID = 6
4,007,703 UART: [idev] SUBJECT.KEYID = 7
4,008,978 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,929 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
191,837 UART:
192,199 UART: Running Caliptra ROM ...
193,296 UART:
603,158 UART: [state] CFI Enabled
617,636 UART: [state] LifecycleState = Unprovisioned
619,546 UART: [state] DebugLocked = Yes
621,771 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,519 UART: [kat] SHA2-256
797,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,857 UART: [kat] ++
808,412 UART: [kat] sha1
817,836 UART: [kat] SHA2-256
820,600 UART: [kat] SHA2-384
825,065 UART: [kat] SHA2-512-ACC
827,408 UART: [kat] ECC-384
3,113,006 UART: [kat] HMAC-384Kdf
3,123,473 UART: [kat] LMS
4,313,563 UART: [kat] --
4,317,302 UART: [cold-reset] ++
4,319,292 UART: [fht] Storing FHT @ 0x50003400
4,331,421 UART: [idev] ++
4,331,983 UART: [idev] CDI.KEYID = 6
4,332,953 UART: [idev] SUBJECT.KEYID = 7
4,334,168 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
20,081 writing to cptra_bootfsm_go
210,869 UART:
211,763 UART: Running Caliptra ROM ...
212,947 UART:
622,054 UART: [state] CFI Enabled
635,001 UART: [state] LifecycleState = Manufacturing
636,932 UART: [state] DebugLocked = Yes
639,319 UART: [state] Starting the Watchdog Timer 40000000 cycles
644,974 UART: [kat] SHA2-256
814,772 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
825,318 UART: [kat] ++
825,815 UART: [kat] sha1
836,745 UART: [kat] SHA2-256
839,436 UART: [kat] SHA2-384
845,089 UART: [kat] SHA2-512-ACC
847,436 UART: [kat] ECC-384
3,131,058 UART: [kat] HMAC-384Kdf
3,143,796 UART: [kat] LMS
4,333,917 UART: [kat] --
4,337,937 UART: [cold-reset] ++
4,339,667 UART: [fht] Storing FHT @ 0x50003400
4,350,886 UART: [idev] ++
4,351,494 UART: [idev] CDI.KEYID = 6
4,352,414 UART: [idev] SUBJECT.KEYID = 7
4,353,683 UART: [idev] UDS.KEYID = 0
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
192,001 UART:
192,357 UART: Running Caliptra ROM ...
193,468 UART:
603,041 UART: [state] CFI Enabled
619,713 UART: [state] LifecycleState = Unknown
621,392 UART: [state] DebugLocked = Yes
623,302 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,210 UART: [kat] SHA2-256
798,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,570 UART: [kat] ++
809,117 UART: [kat] sha1
819,568 UART: [kat] SHA2-256
822,298 UART: [kat] SHA2-384
827,731 UART: [kat] SHA2-512-ACC
830,130 UART: [kat] ECC-384
3,114,471 UART: [kat] HMAC-384Kdf
3,126,278 UART: [kat] LMS
4,316,407 UART: [kat] --
4,321,829 UART: [cold-reset] ++
4,324,436 UART: [fht] Storing FHT @ 0x50003400
4,336,247 UART: [idev] ++
4,336,870 UART: [idev] CDI.KEYID = 6
4,337,754 UART: [idev] SUBJECT.KEYID = 7
4,339,020 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
191,899 UART:
192,808 UART: Running Caliptra ROM ...
193,990 UART:
603,073 UART: [state] CFI Enabled
618,678 UART: [state] LifecycleState = Production
620,486 UART: [state] DebugLocked = Yes
622,832 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,269 UART: [kat] SHA2-256
797,008 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,567 UART: [kat] ++
808,074 UART: [kat] sha1
819,985 UART: [kat] SHA2-256
822,679 UART: [kat] SHA2-384
829,093 UART: [kat] SHA2-512-ACC
831,496 UART: [kat] ECC-384
3,114,668 UART: [kat] HMAC-384Kdf
3,126,316 UART: [kat] LMS
4,316,438 UART: [kat] --
4,319,562 UART: [cold-reset] ++
4,321,604 UART: [fht] Storing FHT @ 0x50003400
4,334,437 UART: [idev] ++
4,334,999 UART: [idev] CDI.KEYID = 6
4,335,963 UART: [idev] SUBJECT.KEYID = 7
4,337,175 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
10,858 writing to cptra_bootfsm_go
200,210 UART:
200,893 UART: Running Caliptra ROM ...
202,042 UART:
611,252 UART: [state] CFI Enabled
625,411 UART: [state] LifecycleState = Unprovisioned
627,342 UART: [state] DebugLocked = No
628,827 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
633,901 UART: [kat] SHA2-256
803,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
814,194 UART: [kat] ++
814,706 UART: [kat] sha1
826,068 UART: [kat] SHA2-256
828,763 UART: [kat] SHA2-384
835,207 UART: [kat] SHA2-512-ACC
837,554 UART: [kat] ECC-384
3,122,426 UART: [kat] HMAC-384Kdf
3,133,115 UART: [kat] LMS
4,323,223 UART: [kat] --
4,328,159 UART: [cold-reset] ++
4,329,674 UART: [fht] Storing FHT @ 0x50003400
4,340,624 UART: [idev] ++
4,341,187 UART: [idev] CDI.KEYID = 6
4,342,205 UART: [idev] SUBJECT.KEYID = 7
4,343,364 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,599 UART:
192,955 UART: Running Caliptra ROM ...
194,176 UART:
604,214 UART: [state] CFI Enabled
619,889 UART: [state] LifecycleState = Manufacturing
621,824 UART: [state] DebugLocked = No
623,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,900 UART: [kat] SHA2-256
797,648 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,192 UART: [kat] ++
808,670 UART: [kat] sha1
819,864 UART: [kat] SHA2-256
822,608 UART: [kat] SHA2-384
829,017 UART: [kat] SHA2-512-ACC
831,359 UART: [kat] ECC-384
3,113,297 UART: [kat] HMAC-384Kdf
3,125,925 UART: [kat] LMS
4,316,065 UART: [kat] --
4,320,971 UART: [cold-reset] ++
4,322,683 UART: [fht] Storing FHT @ 0x50003400
4,334,058 UART: [idev] ++
4,334,623 UART: [idev] CDI.KEYID = 6
4,335,583 UART: [idev] SUBJECT.KEYID = 7
4,336,797 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,420 UART:
192,784 UART: Running Caliptra ROM ...
193,993 UART:
603,456 UART: [state] CFI Enabled
618,451 UART: [state] LifecycleState = Unknown
620,108 UART: [state] DebugLocked = No
621,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,963 UART: [kat] SHA2-256
795,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,258 UART: [kat] ++
806,701 UART: [kat] sha1
817,251 UART: [kat] SHA2-256
819,930 UART: [kat] SHA2-384
826,011 UART: [kat] SHA2-512-ACC
828,367 UART: [kat] ECC-384
3,113,380 UART: [kat] HMAC-384Kdf
3,126,644 UART: [kat] LMS
4,316,745 UART: [kat] --
4,322,323 UART: [cold-reset] ++
4,324,310 UART: [fht] Storing FHT @ 0x50003400
4,335,648 UART: [idev] ++
4,336,212 UART: [idev] CDI.KEYID = 6
4,337,149 UART: [idev] SUBJECT.KEYID = 7
4,338,416 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,571 UART:
192,959 UART: Running Caliptra ROM ...
194,102 UART:
603,932 UART: [state] CFI Enabled
617,601 UART: [state] LifecycleState = Production
619,408 UART: [state] DebugLocked = No
620,681 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,051 UART: [kat] SHA2-256
794,823 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,304 UART: [kat] ++
805,808 UART: [kat] sha1
817,061 UART: [kat] SHA2-256
819,776 UART: [kat] SHA2-384
826,892 UART: [kat] SHA2-512-ACC
829,257 UART: [kat] ECC-384
3,114,208 UART: [kat] HMAC-384Kdf
3,126,730 UART: [kat] LMS
4,316,815 UART: [kat] --
4,321,533 UART: [cold-reset] ++
4,322,442 UART: [fht] Storing FHT @ 0x50003400
4,333,413 UART: [idev] ++
4,333,979 UART: [idev] CDI.KEYID = 6
4,334,916 UART: [idev] SUBJECT.KEYID = 7
4,336,185 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
4,094 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,499 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
7,636 writing to cptra_bootfsm_go
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,550 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
191,655 UART:
192,052 UART: Running Caliptra ROM ...
193,254 UART:
193,405 UART: [state] CFI Enabled
262,594 UART: [state] LifecycleState = Unprovisioned
264,501 UART: [state] DebugLocked = Yes
266,080 UART: [state] Starting the WD Timer 40000000 cycles
270,241 UART: [kat] SHA2-256
449,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,997 UART: [kat] ++
461,555 UART: [kat] sha1
471,142 UART: [kat] SHA2-256
474,153 UART: [kat] SHA2-384
479,987 UART: [kat] SHA2-512-ACC
482,923 UART: [kat] ECC-384
2,946,273 UART: [kat] HMAC-384Kdf
2,962,408 UART: [kat] LMS
3,491,843 UART: [kat] --
3,495,904 UART: [cold-reset] ++
3,497,893 UART: [fht] FHT @ 0x50003400
3,509,199 UART: [idev] ++
3,509,771 UART: [idev] CDI.KEYID = 6
3,510,694 UART: [idev] SUBJECT.KEYID = 7
3,511,911 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
29,698 writing to cptra_bootfsm_go
218,994 UART:
219,680 UART: Running Caliptra ROM ...
220,842 UART:
220,988 UART: [state] CFI Enabled
280,058 UART: [state] LifecycleState = Manufacturing
282,007 UART: [state] DebugLocked = Yes
283,663 UART: [state] Starting the WD Timer 40000000 cycles
288,101 UART: [kat] SHA2-256
467,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
478,796 UART: [kat] ++
479,354 UART: [kat] sha1
490,924 UART: [kat] SHA2-256
493,970 UART: [kat] SHA2-384
500,339 UART: [kat] SHA2-512-ACC
503,325 UART: [kat] ECC-384
2,964,165 UART: [kat] HMAC-384Kdf
2,985,970 UART: [kat] LMS
3,515,461 UART: [kat] --
3,521,631 UART: [cold-reset] ++
3,523,193 UART: [fht] FHT @ 0x50003400
3,534,727 UART: [idev] ++
3,535,355 UART: [idev] CDI.KEYID = 6
3,536,281 UART: [idev] SUBJECT.KEYID = 7
3,537,444 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
7,575 writing to cptra_bootfsm_go
196,184 UART:
196,969 UART: Running Caliptra ROM ...
198,131 UART:
198,283 UART: [state] CFI Enabled
256,224 UART: [state] LifecycleState = Unknown
257,861 UART: [state] DebugLocked = Yes
259,232 UART: [state] Starting the WD Timer 40000000 cycles
263,826 UART: [kat] SHA2-256
442,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,565 UART: [kat] ++
455,096 UART: [kat] sha1
465,691 UART: [kat] SHA2-256
468,722 UART: [kat] SHA2-384
475,732 UART: [kat] SHA2-512-ACC
478,673 UART: [kat] ECC-384
2,942,351 UART: [kat] HMAC-384Kdf
2,964,603 UART: [kat] LMS
3,494,095 UART: [kat] --
3,497,604 UART: [cold-reset] ++
3,498,507 UART: [fht] FHT @ 0x50003400
3,509,299 UART: [idev] ++
3,509,857 UART: [idev] CDI.KEYID = 6
3,510,737 UART: [idev] SUBJECT.KEYID = 7
3,511,892 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
24,769 writing to cptra_bootfsm_go
213,404 UART:
214,085 UART: Running Caliptra ROM ...
215,218 UART:
215,359 UART: [state] CFI Enabled
276,113 UART: [state] LifecycleState = Production
277,911 UART: [state] DebugLocked = Yes
279,718 UART: [state] Starting the WD Timer 40000000 cycles
284,276 UART: [kat] SHA2-256
463,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
475,016 UART: [kat] ++
475,557 UART: [kat] sha1
487,444 UART: [kat] SHA2-256
490,684 UART: [kat] SHA2-384
496,506 UART: [kat] SHA2-512-ACC
499,441 UART: [kat] ECC-384
2,959,275 UART: [kat] HMAC-384Kdf
2,982,325 UART: [kat] LMS
3,511,776 UART: [kat] --
3,517,386 UART: [cold-reset] ++
3,519,966 UART: [fht] FHT @ 0x50003400
3,529,816 UART: [idev] ++
3,530,388 UART: [idev] CDI.KEYID = 6
3,531,971 UART: [idev] SUBJECT.KEYID = 7
3,533,030 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,947 writing to cptra_bootfsm_go
193,082 UART:
193,845 UART: Running Caliptra ROM ...
194,974 UART:
195,117 UART: [state] CFI Enabled
255,583 UART: [state] LifecycleState = Unprovisioned
257,486 UART: [state] DebugLocked = No
259,903 UART: [state] WD Timer not started. Device not locked for debugging
263,989 UART: [kat] SHA2-256
443,111 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,672 UART: [kat] ++
455,199 UART: [kat] sha1
466,067 UART: [kat] SHA2-256
469,117 UART: [kat] SHA2-384
475,257 UART: [kat] SHA2-512-ACC
478,238 UART: [kat] ECC-384
2,941,675 UART: [kat] HMAC-384Kdf
2,962,343 UART: [kat] LMS
3,491,801 UART: [kat] --
3,495,421 UART: [cold-reset] ++
3,497,951 UART: [fht] FHT @ 0x50003400
3,509,362 UART: [idev] ++
3,509,948 UART: [idev] CDI.KEYID = 6
3,510,863 UART: [idev] SUBJECT.KEYID = 7
3,512,080 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,415 UART:
192,777 UART: Running Caliptra ROM ...
193,985 UART:
194,135 UART: [state] CFI Enabled
258,662 UART: [state] LifecycleState = Manufacturing
260,571 UART: [state] DebugLocked = No
261,795 UART: [state] WD Timer not started. Device not locked for debugging
266,307 UART: [kat] SHA2-256
445,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,024 UART: [kat] ++
457,565 UART: [kat] sha1
468,235 UART: [kat] SHA2-256
471,237 UART: [kat] SHA2-384
477,879 UART: [kat] SHA2-512-ACC
480,850 UART: [kat] ECC-384
2,941,293 UART: [kat] HMAC-384Kdf
2,965,990 UART: [kat] LMS
3,495,493 UART: [kat] --
3,500,684 UART: [cold-reset] ++
3,502,562 UART: [fht] FHT @ 0x50003400
3,512,191 UART: [idev] ++
3,512,752 UART: [idev] CDI.KEYID = 6
3,513,718 UART: [idev] SUBJECT.KEYID = 7
3,514,873 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
192,356 UART:
192,729 UART: Running Caliptra ROM ...
193,923 UART:
194,085 UART: [state] CFI Enabled
260,462 UART: [state] LifecycleState = Unknown
262,107 UART: [state] DebugLocked = No
264,509 UART: [state] WD Timer not started. Device not locked for debugging
267,992 UART: [kat] SHA2-256
447,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,665 UART: [kat] ++
459,194 UART: [kat] sha1
470,617 UART: [kat] SHA2-256
473,680 UART: [kat] SHA2-384
478,463 UART: [kat] SHA2-512-ACC
481,446 UART: [kat] ECC-384
2,943,005 UART: [kat] HMAC-384Kdf
2,964,694 UART: [kat] LMS
3,494,126 UART: [kat] --
3,501,061 UART: [cold-reset] ++
3,503,436 UART: [fht] FHT @ 0x50003400
3,514,168 UART: [idev] ++
3,514,735 UART: [idev] CDI.KEYID = 6
3,515,643 UART: [idev] SUBJECT.KEYID = 7
3,516,856 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,116 UART:
192,483 UART: Running Caliptra ROM ...
193,670 UART:
193,828 UART: [state] CFI Enabled
261,236 UART: [state] LifecycleState = Production
262,995 UART: [state] DebugLocked = No
264,421 UART: [state] WD Timer not started. Device not locked for debugging
267,545 UART: [kat] SHA2-256
446,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,240 UART: [kat] ++
458,689 UART: [kat] sha1
471,368 UART: [kat] SHA2-256
474,376 UART: [kat] SHA2-384
480,894 UART: [kat] SHA2-512-ACC
483,832 UART: [kat] ECC-384
2,945,993 UART: [kat] HMAC-384Kdf
2,968,063 UART: [kat] LMS
3,497,528 UART: [kat] --
3,503,362 UART: [cold-reset] ++
3,504,977 UART: [fht] FHT @ 0x50003400
3,516,445 UART: [idev] ++
3,517,013 UART: [idev] CDI.KEYID = 6
3,517,937 UART: [idev] SUBJECT.KEYID = 7
3,519,148 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
5,951 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
11,509 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,183 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
9,502 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,660 writing to cptra_bootfsm_go
192,301 UART:
192,661 UART: Running Caliptra ROM ...
193,848 UART:
603,362 UART: [state] CFI Enabled
613,682 UART: [state] LifecycleState = Unprovisioned
615,573 UART: [state] DebugLocked = Yes
617,588 UART: [state] Starting the WD Timer 40000000 cycles
622,121 UART: [kat] SHA2-256
801,304 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,848 UART: [kat] ++
813,319 UART: [kat] sha1
823,112 UART: [kat] SHA2-256
826,171 UART: [kat] SHA2-384
832,706 UART: [kat] SHA2-512-ACC
835,697 UART: [kat] ECC-384
3,277,397 UART: [kat] HMAC-384Kdf
3,290,869 UART: [kat] LMS
3,820,406 UART: [kat] --
3,824,554 UART: [cold-reset] ++
3,825,417 UART: [fht] FHT @ 0x50003400
3,836,558 UART: [idev] ++
3,837,135 UART: [idev] CDI.KEYID = 6
3,838,047 UART: [idev] SUBJECT.KEYID = 7
3,839,215 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
7,290 writing to cptra_bootfsm_go
196,640 UART:
197,339 UART: Running Caliptra ROM ...
198,499 UART:
607,776 UART: [state] CFI Enabled
624,115 UART: [state] LifecycleState = Manufacturing
625,980 UART: [state] DebugLocked = Yes
627,926 UART: [state] Starting the WD Timer 40000000 cycles
632,400 UART: [kat] SHA2-256
811,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
823,123 UART: [kat] ++
823,682 UART: [kat] sha1
833,810 UART: [kat] SHA2-256
836,850 UART: [kat] SHA2-384
842,622 UART: [kat] SHA2-512-ACC
845,555 UART: [kat] ECC-384
3,288,466 UART: [kat] HMAC-384Kdf
3,301,146 UART: [kat] LMS
3,830,667 UART: [kat] --
3,835,043 UART: [cold-reset] ++
3,837,407 UART: [fht] FHT @ 0x50003400
3,848,598 UART: [idev] ++
3,849,161 UART: [idev] CDI.KEYID = 6
3,850,082 UART: [idev] SUBJECT.KEYID = 7
3,851,298 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
34,265 writing to cptra_bootfsm_go
222,893 UART:
223,781 UART: Running Caliptra ROM ...
224,935 UART:
633,811 UART: [state] CFI Enabled
647,413 UART: [state] LifecycleState = Unknown
649,165 UART: [state] DebugLocked = Yes
651,363 UART: [state] Starting the WD Timer 40000000 cycles
655,915 UART: [kat] SHA2-256
835,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
846,617 UART: [kat] ++
847,141 UART: [kat] sha1
858,477 UART: [kat] SHA2-256
861,481 UART: [kat] SHA2-384
869,083 UART: [kat] SHA2-512-ACC
872,014 UART: [kat] ECC-384
3,315,052 UART: [kat] HMAC-384Kdf
3,329,126 UART: [kat] LMS
3,858,645 UART: [kat] --
3,863,499 UART: [cold-reset] ++
3,865,707 UART: [fht] FHT @ 0x50003400
3,877,226 UART: [idev] ++
3,877,797 UART: [idev] CDI.KEYID = 6
3,878,738 UART: [idev] SUBJECT.KEYID = 7
3,879,904 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,090 writing to cptra_bootfsm_go
192,683 UART:
193,320 UART: Running Caliptra ROM ...
194,449 UART:
603,834 UART: [state] CFI Enabled
619,524 UART: [state] LifecycleState = Production
621,310 UART: [state] DebugLocked = Yes
623,215 UART: [state] Starting the WD Timer 40000000 cycles
627,259 UART: [kat] SHA2-256
806,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,959 UART: [kat] ++
818,488 UART: [kat] sha1
829,932 UART: [kat] SHA2-256
832,989 UART: [kat] SHA2-384
839,507 UART: [kat] SHA2-512-ACC
842,492 UART: [kat] ECC-384
3,285,501 UART: [kat] HMAC-384Kdf
3,299,423 UART: [kat] LMS
3,828,977 UART: [kat] --
3,834,639 UART: [cold-reset] ++
3,836,687 UART: [fht] FHT @ 0x50003400
3,848,151 UART: [idev] ++
3,848,711 UART: [idev] CDI.KEYID = 6
3,849,653 UART: [idev] SUBJECT.KEYID = 7
3,850,862 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
18,923 writing to cptra_bootfsm_go
219,803 UART:
220,597 UART: Running Caliptra ROM ...
221,739 UART:
630,841 UART: [state] CFI Enabled
645,617 UART: [state] LifecycleState = Unprovisioned
647,491 UART: [state] DebugLocked = No
650,326 UART: [state] WD Timer not started. Device not locked for debugging
653,336 UART: [kat] SHA2-256
832,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
844,073 UART: [kat] ++
844,607 UART: [kat] sha1
855,811 UART: [kat] SHA2-256
858,865 UART: [kat] SHA2-384
864,887 UART: [kat] SHA2-512-ACC
867,818 UART: [kat] ECC-384
3,310,018 UART: [kat] HMAC-384Kdf
3,322,163 UART: [kat] LMS
3,851,653 UART: [kat] --
3,857,699 UART: [cold-reset] ++
3,860,171 UART: [fht] FHT @ 0x50003400
3,870,535 UART: [idev] ++
3,871,155 UART: [idev] CDI.KEYID = 6
3,872,050 UART: [idev] SUBJECT.KEYID = 7
3,873,155 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
192,675 UART:
193,013 UART: Running Caliptra ROM ...
194,216 UART:
603,697 UART: [state] CFI Enabled
614,426 UART: [state] LifecycleState = Manufacturing
616,283 UART: [state] DebugLocked = No
618,661 UART: [state] WD Timer not started. Device not locked for debugging
621,880 UART: [kat] SHA2-256
800,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,585 UART: [kat] ++
813,031 UART: [kat] sha1
823,695 UART: [kat] SHA2-256
826,698 UART: [kat] SHA2-384
832,458 UART: [kat] SHA2-512-ACC
835,451 UART: [kat] ECC-384
3,278,328 UART: [kat] HMAC-384Kdf
3,291,168 UART: [kat] LMS
3,820,623 UART: [kat] --
3,826,284 UART: [cold-reset] ++
3,827,564 UART: [fht] FHT @ 0x50003400
3,837,786 UART: [idev] ++
3,838,347 UART: [idev] CDI.KEYID = 6
3,839,310 UART: [idev] SUBJECT.KEYID = 7
3,840,468 UART: [idev] UDS.KEYID = 0
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
6,111 writing to cptra_bootfsm_go
196,801 UART:
197,182 UART: Running Caliptra ROM ...
198,372 UART:
607,953 UART: [state] CFI Enabled
626,428 UART: [state] LifecycleState = Unknown
628,051 UART: [state] DebugLocked = No
629,539 UART: [state] WD Timer not started. Device not locked for debugging
633,994 UART: [kat] SHA2-256
813,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
824,678 UART: [kat] ++
825,123 UART: [kat] sha1
835,295 UART: [kat] SHA2-256
838,349 UART: [kat] SHA2-384
844,545 UART: [kat] SHA2-512-ACC
847,478 UART: [kat] ECC-384
3,287,507 UART: [kat] HMAC-384Kdf
3,299,764 UART: [kat] LMS
3,829,254 UART: [kat] --
3,831,808 UART: [cold-reset] ++
3,833,528 UART: [fht] FHT @ 0x50003400
3,845,667 UART: [idev] ++
3,846,275 UART: [idev] CDI.KEYID = 6
3,847,192 UART: [idev] SUBJECT.KEYID = 7
3,848,352 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,535 UART:
192,913 UART: Running Caliptra ROM ...
194,043 UART:
603,853 UART: [state] CFI Enabled
618,034 UART: [state] LifecycleState = Production
619,761 UART: [state] DebugLocked = No
621,866 UART: [state] WD Timer not started. Device not locked for debugging
625,220 UART: [kat] SHA2-256
804,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,924 UART: [kat] ++
816,371 UART: [kat] sha1
828,328 UART: [kat] SHA2-256
831,371 UART: [kat] SHA2-384
837,678 UART: [kat] SHA2-512-ACC
840,630 UART: [kat] ECC-384
3,281,645 UART: [kat] HMAC-384Kdf
3,292,698 UART: [kat] LMS
3,822,186 UART: [kat] --
3,826,676 UART: [cold-reset] ++
3,828,013 UART: [fht] FHT @ 0x50003400
3,839,426 UART: [idev] ++
3,839,996 UART: [idev] CDI.KEYID = 6
3,840,906 UART: [idev] SUBJECT.KEYID = 7
3,842,123 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
22,796 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
20,893 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
35,197 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
12,101 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,410 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
53,209 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
4,041 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
4,874,056 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,532,040 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
4,878,420 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,490,839 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
5,186,000 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,664,402 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
5,183,155 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,664,900 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,480,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,348,437 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,461,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,333,571 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
3,790,460 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,564,329 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
3,791,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,569,060 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,461,874 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,332,043 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,428 writing to cptra_bootfsm_go
3,779,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,547,296 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,592 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,675,005 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,340 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,159 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,673,470 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,673,272 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,672,928 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,675,606 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,676,388 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,692 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,685 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,196 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,672,088 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,677,182 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,674,669 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
191,654 UART:
192,012 UART: Running Caliptra ROM ...
193,191 UART:
193,345 UART: [state] CFI Enabled
262,771 UART: [state] LifecycleState = Production
264,545 UART: [state] DebugLocked = Yes
266,338 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,375 UART: [kat] SHA2-256
442,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,582 UART: [kat] ++
453,075 UART: [kat] sha1
464,743 UART: [kat] SHA2-256
467,459 UART: [kat] SHA2-384
474,629 UART: [kat] SHA2-512-ACC
477,032 UART: [kat] ECC-384
2,765,750 UART: [kat] HMAC-384Kdf
2,795,064 UART: [kat] LMS
3,985,383 UART: [kat] --
3,990,885 UART: [cold-reset] ++
3,993,520 UART: [fht] Storing FHT @ 0x50003400
4,006,255 UART: [idev] ++
4,006,827 UART: [idev] CDI.KEYID = 6
4,007,796 UART: [idev] SUBJECT.KEYID = 7
4,009,014 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
191,894 UART:
192,250 UART: Running Caliptra ROM ...
193,416 UART:
603,101 UART: [state] CFI Enabled
615,695 UART: [state] LifecycleState = Production
617,511 UART: [state] DebugLocked = Yes
619,544 UART: [state] Starting the Watchdog Timer 40000000 cycles
625,432 UART: [kat] SHA2-256
795,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,759 UART: [kat] ++
806,226 UART: [kat] sha1
816,779 UART: [kat] SHA2-256
819,463 UART: [kat] SHA2-384
824,902 UART: [kat] SHA2-512-ACC
827,315 UART: [kat] ECC-384
3,111,099 UART: [kat] HMAC-384Kdf
3,122,953 UART: [kat] LMS
4,313,049 UART: [kat] --
4,319,261 UART: [cold-reset] ++
4,321,575 UART: [fht] Storing FHT @ 0x50003400
4,333,545 UART: [idev] ++
4,334,206 UART: [idev] CDI.KEYID = 6
4,335,090 UART: [idev] SUBJECT.KEYID = 7
4,336,316 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
191,770 UART:
192,129 UART: Running Caliptra ROM ...
193,308 UART:
193,459 UART: [state] CFI Enabled
262,805 UART: [state] LifecycleState = Production
264,560 UART: [state] DebugLocked = Yes
267,546 UART: [state] Starting the WD Timer 40000000 cycles
273,329 UART: [kat] SHA2-256
452,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,038 UART: [kat] ++
464,580 UART: [kat] sha1
476,511 UART: [kat] SHA2-256
479,538 UART: [kat] SHA2-384
485,684 UART: [kat] SHA2-512-ACC
488,627 UART: [kat] ECC-384
2,950,025 UART: [kat] HMAC-384Kdf
2,972,935 UART: [kat] LMS
3,502,399 UART: [kat] --
3,506,776 UART: [cold-reset] ++
3,508,657 UART: [fht] FHT @ 0x50003400
3,519,416 UART: [idev] ++
3,519,982 UART: [idev] CDI.KEYID = 6
3,520,892 UART: [idev] SUBJECT.KEYID = 7
3,522,106 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,296 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,238 writing to cptra_bootfsm_go
192,842 UART:
193,194 UART: Running Caliptra ROM ...
194,275 UART:
603,803 UART: [state] CFI Enabled
621,005 UART: [state] LifecycleState = Production
622,729 UART: [state] DebugLocked = Yes
625,603 UART: [state] Starting the WD Timer 40000000 cycles
631,103 UART: [kat] SHA2-256
810,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
821,841 UART: [kat] ++
822,379 UART: [kat] sha1
832,915 UART: [kat] SHA2-256
835,927 UART: [kat] SHA2-384
843,166 UART: [kat] SHA2-512-ACC
846,153 UART: [kat] ECC-384
3,285,917 UART: [kat] HMAC-384Kdf
3,298,483 UART: [kat] LMS
3,827,977 UART: [kat] --
3,832,883 UART: [cold-reset] ++
3,833,734 UART: [fht] FHT @ 0x50003400
3,843,551 UART: [idev] ++
3,844,150 UART: [idev] CDI.KEYID = 6
3,845,039 UART: [idev] SUBJECT.KEYID = 7
3,846,260 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
6,070 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,869 UART: [state] LifecycleState = Production
85,477 UART: [state] DebugLocked = Yes
86,203 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,145 UART: [kat] SHA2-256
892,083 UART: [kat] SHA2-384
895,068 UART: [kat] SHA2-512-ACC
896,969 UART: [kat] ECC-384
902,428 UART: [kat] HMAC-384Kdf
907,156 UART: [kat] LMS
1,475,352 UART: [kat] --
1,476,243 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,545 UART: [idev] ++
1,479,713 UART: [idev] CDI.KEYID = 6
1,480,073 UART: [idev] SUBJECT.KEYID = 7
1,480,497 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Production
85,632 UART: [state] DebugLocked = Yes
86,368 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,986 UART: [kat] SHA2-256
881,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,032 UART: [kat] ++
886,184 UART: [kat] sha1
890,400 UART: [kat] SHA2-256
892,338 UART: [kat] SHA2-384
895,081 UART: [kat] SHA2-512-ACC
896,982 UART: [kat] ECC-384
902,811 UART: [kat] HMAC-384Kdf
907,553 UART: [kat] LMS
1,475,749 UART: [kat] --
1,476,658 UART: [cold-reset] ++
1,477,037 UART: [fht] Storing FHT @ 0x50003400
1,479,622 UART: [idev] ++
1,479,790 UART: [idev] CDI.KEYID = 6
1,480,150 UART: [idev] SUBJECT.KEYID = 7
1,480,574 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Production
85,701 UART: [state] DebugLocked = Yes
86,213 UART: [state] Starting the WD Timer 40000000 cycles
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
901,899 UART: [kat] SHA2-256
903,839 UART: [kat] SHA2-384
906,566 UART: [kat] SHA2-512-ACC
908,467 UART: [kat] ECC-384
918,246 UART: [kat] HMAC-384Kdf
922,992 UART: [kat] LMS
1,171,320 UART: [kat] --
1,172,501 UART: [cold-reset] ++
1,172,844 UART: [fht] FHT @ 0x50003400
1,175,535 UART: [idev] ++
1,175,703 UART: [idev] CDI.KEYID = 6
1,176,063 UART: [idev] SUBJECT.KEYID = 7
1,176,487 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Production
85,746 UART: [state] DebugLocked = Yes
86,508 UART: [state] Starting the WD Timer 40000000 cycles
88,081 UART: [kat] SHA2-256
893,731 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,856 UART: [kat] ++
898,008 UART: [kat] sha1
902,306 UART: [kat] SHA2-256
904,246 UART: [kat] SHA2-384
906,953 UART: [kat] SHA2-512-ACC
908,854 UART: [kat] ECC-384
918,323 UART: [kat] HMAC-384Kdf
923,133 UART: [kat] LMS
1,171,461 UART: [kat] --
1,172,412 UART: [cold-reset] ++
1,172,793 UART: [fht] FHT @ 0x50003400
1,175,336 UART: [idev] ++
1,175,504 UART: [idev] CDI.KEYID = 6
1,175,864 UART: [idev] SUBJECT.KEYID = 7
1,176,288 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,685 UART: [state] LifecycleState = Production
85,293 UART: [state] DebugLocked = Yes
85,951 UART: [state] Starting the WD Timer 40000000 cycles
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,672 UART: [idev] ++
1,172,840 UART: [idev] CDI.KEYID = 6
1,173,201 UART: [idev] SUBJECT.KEYID = 7
1,173,626 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Production
85,854 UART: [state] DebugLocked = Yes
86,568 UART: [state] Starting the WD Timer 40000000 cycles
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,204 UART: [kat] SHA2-256
902,144 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,553 UART: [kat] LMS
1,169,865 UART: [kat] --
1,171,048 UART: [cold-reset] ++
1,171,407 UART: [fht] FHT @ 0x50003400
1,174,189 UART: [idev] ++
1,174,357 UART: [idev] CDI.KEYID = 6
1,174,718 UART: [idev] SUBJECT.KEYID = 7
1,175,143 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
191,514 UART:
191,881 UART: Running Caliptra ROM ...
192,966 UART:
193,112 UART: [state] CFI Enabled
264,789 UART: [state] LifecycleState = Production
266,602 UART: [state] DebugLocked = Yes
269,231 UART: [state] Starting the Watchdog Timer 40000000 cycles
274,552 UART: [kat] SHA2-256
444,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,718 UART: [kat] ++
455,211 UART: [kat] sha1
465,874 UART: [kat] SHA2-256
468,607 UART: [kat] SHA2-384
475,027 UART: [kat] SHA2-512-ACC
477,408 UART: [kat] ECC-384
2,768,843 UART: [kat] HMAC-384Kdf
2,800,899 UART: [kat] LMS
3,991,216 UART: [kat] --
3,995,167 UART: [cold-reset] ++
3,997,750 UART: [fht] Storing FHT @ 0x50003400
4,009,247 UART: [idev] ++
4,009,819 UART: [idev] CDI.KEYID = 6
4,010,779 UART: [idev] SUBJECT.KEYID = 7
4,012,054 UART: [idev] UDS.KEYID = 0
4,012,965 ready_for_fw is high
4,013,186 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,838 UART: [idev] Erasing UDS.KEYID = 0
7,348,325 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,806 UART: [idev] --
7,377,531 UART: [ldev] ++
7,378,106 UART: [ldev] CDI.KEYID = 6
7,379,049 UART: [ldev] SUBJECT.KEYID = 5
7,380,230 UART: [ldev] AUTHORITY.KEYID = 7
7,381,529 UART: [ldev] FE.KEYID = 1
7,424,444 UART: [ldev] Erasing FE.KEYID = 1
10,758,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,413 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,065,940 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,080,636 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,094,984 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,115,109 UART: [ldev] --
13,119,945 UART: [fwproc] Waiting for Commands...
13,121,826 UART: [fwproc] Received command 0x46574c44
13,124,015 UART: [fwproc] Received Image of size 114124 bytes
17,205,058 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,041 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,345,969 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,663,515 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,787,784 ready_for_fw is high
3,788,280 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,916,856 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,340 writing to cptra_bootfsm_go
192,953 UART:
193,308 UART: Running Caliptra ROM ...
194,400 UART:
604,123 UART: [state] CFI Enabled
617,633 UART: [state] LifecycleState = Production
619,470 UART: [state] DebugLocked = Yes
621,167 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,310 UART: [kat] SHA2-256
797,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,603 UART: [kat] ++
808,102 UART: [kat] sha1
819,827 UART: [kat] SHA2-256
822,580 UART: [kat] SHA2-384
827,794 UART: [kat] SHA2-512-ACC
830,170 UART: [kat] ECC-384
3,113,114 UART: [kat] HMAC-384Kdf
3,124,538 UART: [kat] LMS
4,314,703 UART: [kat] --
4,318,860 UART: [cold-reset] ++
4,321,158 UART: [fht] Storing FHT @ 0x50003400
4,333,849 UART: [idev] ++
4,334,425 UART: [idev] CDI.KEYID = 6
4,335,388 UART: [idev] SUBJECT.KEYID = 7
4,336,638 UART: [idev] UDS.KEYID = 0
4,337,542 ready_for_fw is high
4,337,752 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,025 UART: [idev] Erasing UDS.KEYID = 0
7,629,074 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,006 UART: [idev] --
7,652,883 UART: [ldev] ++
7,653,456 UART: [ldev] CDI.KEYID = 6
7,654,478 UART: [ldev] SUBJECT.KEYID = 5
7,655,641 UART: [ldev] AUTHORITY.KEYID = 7
7,656,882 UART: [ldev] FE.KEYID = 1
7,667,671 UART: [ldev] Erasing FE.KEYID = 1
10,958,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,372 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,262,906 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,277,577 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,291,931 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,309,443 UART: [ldev] --
13,313,799 UART: [fwproc] Waiting for Commands...
13,315,626 UART: [fwproc] Received command 0x46574c44
13,317,813 UART: [fwproc] Received Image of size 114124 bytes
17,396,277 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,471,723 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,540,619 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,857,533 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
4,129,601 ready_for_fw is high
4,130,236 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,106,637 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
191,630 UART:
192,006 UART: Running Caliptra ROM ...
193,170 UART:
193,318 UART: [state] CFI Enabled
265,715 UART: [state] LifecycleState = Production
267,474 UART: [state] DebugLocked = Yes
269,833 UART: [state] Starting the WD Timer 40000000 cycles
274,854 UART: [kat] SHA2-256
453,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,523 UART: [kat] ++
466,061 UART: [kat] sha1
478,049 UART: [kat] SHA2-256
481,063 UART: [kat] SHA2-384
486,421 UART: [kat] SHA2-512-ACC
489,380 UART: [kat] ECC-384
2,949,066 UART: [kat] HMAC-384Kdf
2,971,179 UART: [kat] LMS
3,500,600 UART: [kat] --
3,504,532 UART: [cold-reset] ++
3,506,612 UART: [fht] FHT @ 0x50003400
3,518,161 UART: [idev] ++
3,518,730 UART: [idev] CDI.KEYID = 6
3,519,649 UART: [idev] SUBJECT.KEYID = 7
3,520,825 UART: [idev] UDS.KEYID = 0
3,521,752 ready_for_fw is high
3,521,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,014 UART: [idev] Erasing UDS.KEYID = 0
6,023,441 UART: [idev] Sha1 KeyId Algorithm
6,044,847 UART: [idev] --
6,049,067 UART: [ldev] ++
6,049,694 UART: [ldev] CDI.KEYID = 6
6,050,611 UART: [ldev] SUBJECT.KEYID = 5
6,051,775 UART: [ldev] AUTHORITY.KEYID = 7
6,053,009 UART: [ldev] FE.KEYID = 1
6,099,792 UART: [ldev] Erasing FE.KEYID = 1
8,603,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,520 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,473 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,329 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,267 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,873 UART: [ldev] --
10,412,595 UART: [fwproc] Wait for Commands...
10,414,223 UART: [fwproc] Recv command 0x46574c44
10,416,324 UART: [fwproc] Recv'd Img size: 114448 bytes
13,848,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,917,393 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,986,218 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,305,151 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,382,174 ready_for_fw is high
3,382,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,095,978 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
191,921 UART:
192,299 UART: Running Caliptra ROM ...
193,510 UART:
603,190 UART: [state] CFI Enabled
615,596 UART: [state] LifecycleState = Production
617,301 UART: [state] DebugLocked = Yes
618,723 UART: [state] Starting the WD Timer 40000000 cycles
623,169 UART: [kat] SHA2-256
802,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,888 UART: [kat] ++
814,337 UART: [kat] sha1
825,163 UART: [kat] SHA2-256
828,181 UART: [kat] SHA2-384
834,246 UART: [kat] SHA2-512-ACC
837,187 UART: [kat] ECC-384
3,279,106 UART: [kat] HMAC-384Kdf
3,291,483 UART: [kat] LMS
3,820,993 UART: [kat] --
3,827,120 UART: [cold-reset] ++
3,828,989 UART: [fht] FHT @ 0x50003400
3,838,998 UART: [idev] ++
3,839,600 UART: [idev] CDI.KEYID = 6
3,840,519 UART: [idev] SUBJECT.KEYID = 7
3,841,700 UART: [idev] UDS.KEYID = 0
3,842,630 ready_for_fw is high
3,842,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,986,398 UART: [idev] Erasing UDS.KEYID = 0
6,309,956 UART: [idev] Sha1 KeyId Algorithm
6,332,944 UART: [idev] --
6,336,923 UART: [ldev] ++
6,337,500 UART: [ldev] CDI.KEYID = 6
6,338,411 UART: [ldev] SUBJECT.KEYID = 5
6,339,629 UART: [ldev] AUTHORITY.KEYID = 7
6,340,884 UART: [ldev] FE.KEYID = 1
6,350,777 UART: [ldev] Erasing FE.KEYID = 1
8,827,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,905 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,561,946 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,577,744 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,593,679 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,613,614 UART: [ldev] --
10,618,284 UART: [fwproc] Wait for Commands...
10,620,547 UART: [fwproc] Recv command 0x46574c44
10,622,643 UART: [fwproc] Recv'd Img size: 114448 bytes
14,057,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,131,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,200,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,518,501 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
3,698,181 ready_for_fw is high
3,698,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,302,142 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,439,344 ready_for_fw is high
3,439,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,784,376 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,756,949 ready_for_fw is high
3,757,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,999,329 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,985 UART: [state] LifecycleState = Production
85,593 UART: [state] DebugLocked = Yes
86,185 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,803 UART: [kat] SHA2-256
881,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,849 UART: [kat] ++
886,001 UART: [kat] sha1
890,393 UART: [kat] SHA2-256
892,331 UART: [kat] SHA2-384
894,974 UART: [kat] SHA2-512-ACC
896,875 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,394 UART: [kat] LMS
1,475,590 UART: [kat] --
1,476,427 UART: [cold-reset] ++
1,476,910 UART: [fht] Storing FHT @ 0x50003400
1,479,693 UART: [idev] ++
1,479,861 UART: [idev] CDI.KEYID = 6
1,480,221 UART: [idev] SUBJECT.KEYID = 7
1,480,645 UART: [idev] UDS.KEYID = 0
1,480,990 ready_for_fw is high
1,480,990 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,634 UART: [idev] Erasing UDS.KEYID = 0
1,505,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,044 UART: [idev] --
1,515,177 UART: [ldev] ++
1,515,345 UART: [ldev] CDI.KEYID = 6
1,515,708 UART: [ldev] SUBJECT.KEYID = 5
1,516,134 UART: [ldev] AUTHORITY.KEYID = 7
1,516,597 UART: [ldev] FE.KEYID = 1
1,521,681 UART: [ldev] Erasing FE.KEYID = 1
1,546,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,599 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,293 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,165 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,871 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,861 UART: [ldev] --
1,586,186 UART: [fwproc] Waiting for Commands...
1,587,043 UART: [fwproc] Received command 0x46574c44
1,587,834 UART: [fwproc] Received Image of size 114448 bytes
2,913,746 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,941,117 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,970,469 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,106,519 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,206 ready_for_fw is high
1,362,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,954,871 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,680 UART: [state] LifecycleState = Production
86,288 UART: [state] DebugLocked = Yes
86,910 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,614 UART: [kat] SHA2-256
882,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,660 UART: [kat] ++
886,812 UART: [kat] sha1
891,150 UART: [kat] SHA2-256
893,088 UART: [kat] SHA2-384
895,879 UART: [kat] SHA2-512-ACC
897,780 UART: [kat] ECC-384
903,553 UART: [kat] HMAC-384Kdf
908,079 UART: [kat] LMS
1,476,275 UART: [kat] --
1,477,218 UART: [cold-reset] ++
1,477,781 UART: [fht] Storing FHT @ 0x50003400
1,480,658 UART: [idev] ++
1,480,826 UART: [idev] CDI.KEYID = 6
1,481,186 UART: [idev] SUBJECT.KEYID = 7
1,481,610 UART: [idev] UDS.KEYID = 0
1,481,955 ready_for_fw is high
1,481,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,489,849 UART: [idev] Erasing UDS.KEYID = 0
1,506,598 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,225 UART: [idev] --
1,516,334 UART: [ldev] ++
1,516,502 UART: [ldev] CDI.KEYID = 6
1,516,865 UART: [ldev] SUBJECT.KEYID = 5
1,517,291 UART: [ldev] AUTHORITY.KEYID = 7
1,517,754 UART: [ldev] FE.KEYID = 1
1,522,562 UART: [ldev] Erasing FE.KEYID = 1
1,547,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,884 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,578 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,450 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,579,156 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,586,280 UART: [ldev] --
1,587,599 UART: [fwproc] Waiting for Commands...
1,588,260 UART: [fwproc] Received command 0x46574c44
1,589,051 UART: [fwproc] Received Image of size 114448 bytes
2,913,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,941,130 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,970,482 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,106,484 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,115 ready_for_fw is high
1,363,115 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,954,048 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Production
85,661 UART: [state] DebugLocked = Yes
86,355 UART: [state] Starting the WD Timer 40000000 cycles
88,072 UART: [kat] SHA2-256
893,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,847 UART: [kat] ++
897,999 UART: [kat] sha1
902,083 UART: [kat] SHA2-256
904,023 UART: [kat] SHA2-384
906,946 UART: [kat] SHA2-512-ACC
908,847 UART: [kat] ECC-384
918,076 UART: [kat] HMAC-384Kdf
922,744 UART: [kat] LMS
1,171,072 UART: [kat] --
1,171,897 UART: [cold-reset] ++
1,172,356 UART: [fht] FHT @ 0x50003400
1,175,193 UART: [idev] ++
1,175,361 UART: [idev] CDI.KEYID = 6
1,175,721 UART: [idev] SUBJECT.KEYID = 7
1,176,145 UART: [idev] UDS.KEYID = 0
1,176,490 ready_for_fw is high
1,176,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,194 UART: [idev] Erasing UDS.KEYID = 0
1,201,740 UART: [idev] Sha1 KeyId Algorithm
1,210,343 UART: [idev] --
1,211,337 UART: [ldev] ++
1,211,505 UART: [ldev] CDI.KEYID = 6
1,211,868 UART: [ldev] SUBJECT.KEYID = 5
1,212,294 UART: [ldev] AUTHORITY.KEYID = 7
1,212,757 UART: [ldev] FE.KEYID = 1
1,217,759 UART: [ldev] Erasing FE.KEYID = 1
1,244,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,255 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,949 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,821 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,527 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,484 UART: [ldev] --
1,282,845 UART: [fwproc] Wait for Commands...
1,283,667 UART: [fwproc] Recv command 0x46574c44
1,284,395 UART: [fwproc] Recv'd Img size: 114448 bytes
2,609,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,636,284 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,588 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,801,506 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,924 ready_for_fw is high
1,060,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,652,745 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Production
86,164 UART: [state] DebugLocked = Yes
86,700 UART: [state] Starting the WD Timer 40000000 cycles
88,349 UART: [kat] SHA2-256
893,999 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,124 UART: [kat] ++
898,276 UART: [kat] sha1
902,286 UART: [kat] SHA2-256
904,226 UART: [kat] SHA2-384
906,985 UART: [kat] SHA2-512-ACC
908,886 UART: [kat] ECC-384
918,939 UART: [kat] HMAC-384Kdf
923,359 UART: [kat] LMS
1,171,687 UART: [kat] --
1,172,772 UART: [cold-reset] ++
1,173,287 UART: [fht] FHT @ 0x50003400
1,175,796 UART: [idev] ++
1,175,964 UART: [idev] CDI.KEYID = 6
1,176,324 UART: [idev] SUBJECT.KEYID = 7
1,176,748 UART: [idev] UDS.KEYID = 0
1,177,093 ready_for_fw is high
1,177,093 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,857 UART: [idev] Erasing UDS.KEYID = 0
1,201,951 UART: [idev] Sha1 KeyId Algorithm
1,210,362 UART: [idev] --
1,211,536 UART: [ldev] ++
1,211,704 UART: [ldev] CDI.KEYID = 6
1,212,067 UART: [ldev] SUBJECT.KEYID = 5
1,212,493 UART: [ldev] AUTHORITY.KEYID = 7
1,212,956 UART: [ldev] FE.KEYID = 1
1,218,436 UART: [ldev] Erasing FE.KEYID = 1
1,244,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,922 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,616 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,488 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,194 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,181 UART: [ldev] --
1,283,598 UART: [fwproc] Wait for Commands...
1,284,238 UART: [fwproc] Recv command 0x46574c44
1,284,966 UART: [fwproc] Recv'd Img size: 114448 bytes
2,611,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,638,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,667,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,803,481 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,857 ready_for_fw is high
1,061,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,654,510 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Production
86,347 UART: [state] DebugLocked = Yes
86,903 UART: [state] Starting the WD Timer 40000000 cycles
88,448 UART: [kat] SHA2-256
891,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,127 UART: [kat] ++
896,279 UART: [kat] sha1
900,423 UART: [kat] SHA2-256
902,363 UART: [kat] SHA2-384
905,180 UART: [kat] SHA2-512-ACC
907,081 UART: [kat] ECC-384
916,656 UART: [kat] HMAC-384Kdf
921,254 UART: [kat] LMS
1,169,566 UART: [kat] --
1,170,531 UART: [cold-reset] ++
1,170,986 UART: [fht] FHT @ 0x50003400
1,173,508 UART: [idev] ++
1,173,676 UART: [idev] CDI.KEYID = 6
1,174,037 UART: [idev] SUBJECT.KEYID = 7
1,174,462 UART: [idev] UDS.KEYID = 0
1,174,808 ready_for_fw is high
1,174,808 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,693 UART: [idev] Erasing UDS.KEYID = 0
1,199,740 UART: [idev] Sha1 KeyId Algorithm
1,208,601 UART: [idev] --
1,209,574 UART: [ldev] ++
1,209,742 UART: [ldev] CDI.KEYID = 6
1,210,106 UART: [ldev] SUBJECT.KEYID = 5
1,210,533 UART: [ldev] AUTHORITY.KEYID = 7
1,210,996 UART: [ldev] FE.KEYID = 1
1,216,034 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,115 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,809 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,679 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,385 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,251 UART: [ldev] --
1,280,739 UART: [fwproc] Wait for Commands...
1,281,500 UART: [fwproc] Recv command 0x46574c44
1,282,233 UART: [fwproc] Recv'd Img size: 114448 bytes
2,606,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,799,158 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,235 ready_for_fw is high
1,056,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,058 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Production
85,880 UART: [state] DebugLocked = Yes
86,556 UART: [state] Starting the WD Timer 40000000 cycles
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,894 UART: [kat] ++
896,046 UART: [kat] sha1
900,314 UART: [kat] SHA2-256
902,254 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,543 UART: [kat] HMAC-384Kdf
921,269 UART: [kat] LMS
1,169,581 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,971 UART: [fht] FHT @ 0x50003400
1,173,711 UART: [idev] ++
1,173,879 UART: [idev] CDI.KEYID = 6
1,174,240 UART: [idev] SUBJECT.KEYID = 7
1,174,665 UART: [idev] UDS.KEYID = 0
1,175,011 ready_for_fw is high
1,175,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,788 UART: [idev] Erasing UDS.KEYID = 0
1,199,757 UART: [idev] Sha1 KeyId Algorithm
1,208,610 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,233 UART: [ldev] SUBJECT.KEYID = 5
1,210,660 UART: [ldev] AUTHORITY.KEYID = 7
1,211,123 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,610 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,304 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,174 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,880 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,848 UART: [ldev] --
1,282,142 UART: [fwproc] Wait for Commands...
1,282,943 UART: [fwproc] Recv command 0x46574c44
1,283,676 UART: [fwproc] Recv'd Img size: 114448 bytes
2,608,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,636,233 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,542 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,801,613 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,262 ready_for_fw is high
1,057,262 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,651,913 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
7,082,592 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
7,074,595 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
7,390,674 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,410 writing to cptra_bootfsm_go
7,391,261 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
5,691,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
5,648,045 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
5,990,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
5,978,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
5,665,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
5,997,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,741 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,619 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,607 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,943 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,733 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,983 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,048 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,099 UART:
192,486 UART: Running Caliptra ROM ...
193,642 UART:
193,797 UART: [state] CFI Enabled
259,174 UART: [state] LifecycleState = Unprovisioned
261,557 UART: [state] DebugLocked = No
263,695 UART: [state] WD Timer not started. Device not locked for debugging
268,915 UART: [kat] SHA2-256
450,865 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,051 UART: ROM integrity test failed
463,270 UART: ROM Fatal Error: 0x90080001
2,717,993 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,862,222 >>> mbox cmd response: failed
2,862,791 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,005,981 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
192,285 UART:
192,655 UART: Running Caliptra ROM ...
193,805 UART:
193,956 UART: [state] CFI Enabled
265,705 UART: [state] LifecycleState = Unprovisioned
268,126 UART: [state] DebugLocked = No
269,844 UART: [state] WD Timer not started. Device not locked for debugging
273,995 UART: [kat] SHA2-256
455,921 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,052 UART: ROM integrity test failed
468,307 UART: ROM Fatal Error: 0x90080001
2,717,268 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,861,344 >>> mbox cmd response: failed
2,861,898 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,005,761 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,574 UART:
192,962 UART: Running Caliptra ROM ...
194,125 UART:
603,627 UART: [state] CFI Enabled
615,219 UART: [state] LifecycleState = Unprovisioned
617,575 UART: [state] DebugLocked = No
620,516 UART: [state] WD Timer not started. Device not locked for debugging
625,796 UART: [kat] SHA2-256
807,763 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,973 UART: ROM integrity test failed
820,294 UART: ROM Fatal Error: 0x90080001
3,071,769 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,215,982 >>> mbox cmd response: failed
3,216,545 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,359,716 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,513 UART:
192,897 UART: Running Caliptra ROM ...
194,001 UART:
603,551 UART: [state] CFI Enabled
617,647 UART: [state] LifecycleState = Unprovisioned
620,022 UART: [state] DebugLocked = No
622,919 UART: [state] WD Timer not started. Device not locked for debugging
628,197 UART: [kat] SHA2-256
810,134 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,370 UART: ROM integrity test failed
822,633 UART: ROM Fatal Error: 0x90080001
3,073,587 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,218,436 >>> mbox cmd response: failed
3,219,002 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,362,224 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
192,333 UART:
192,698 UART: Running Caliptra ROM ...
193,817 UART:
193,963 UART: [state] CFI Enabled
263,519 UART: [state] LifecycleState = Unprovisioned
265,414 UART: [state] DebugLocked = No
267,339 UART: [state] WD Timer not started. Device not locked for debugging
270,566 UART: [kat] SHA2-256
449,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,709 UART: ROM integrity test failed
461,974 UART: ROM Fatal Error: 0x90080001
2,711,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,855,762 >>> mbox cmd response: failed
2,856,361 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,999,971 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
192,288 UART:
192,658 UART: Running Caliptra ROM ...
193,824 UART:
193,976 UART: [state] CFI Enabled
261,926 UART: [state] LifecycleState = Unprovisioned
263,769 UART: [state] DebugLocked = No
266,329 UART: [state] WD Timer not started. Device not locked for debugging
270,643 UART: [kat] SHA2-256
449,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,777 UART: ROM integrity test failed
462,051 UART: ROM Fatal Error: 0x90080001
2,712,473 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,857,087 >>> mbox cmd response: failed
2,857,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,001,418 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,503 writing to cptra_bootfsm_go
192,861 UART:
193,219 UART: Running Caliptra ROM ...
194,398 UART:
603,869 UART: [state] CFI Enabled
616,083 UART: [state] LifecycleState = Unprovisioned
617,961 UART: [state] DebugLocked = No
620,794 UART: [state] WD Timer not started. Device not locked for debugging
624,336 UART: [kat] SHA2-256
803,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,501 UART: ROM integrity test failed
815,769 UART: ROM Fatal Error: 0x90080001
3,065,683 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,210,298 >>> mbox cmd response: failed
3,210,900 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,354,634 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
192,627 UART:
192,991 UART: Running Caliptra ROM ...
194,162 UART:
603,632 UART: [state] CFI Enabled
619,499 UART: [state] LifecycleState = Unprovisioned
621,355 UART: [state] DebugLocked = No
624,180 UART: [state] WD Timer not started. Device not locked for debugging
627,487 UART: [kat] SHA2-256
806,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,646 UART: ROM integrity test failed
818,867 UART: ROM Fatal Error: 0x90080001
3,061,036 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,205,630 >>> mbox cmd response: failed
3,206,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,349,940 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,539 UART:
192,913 UART: Running Caliptra ROM ...
194,018 UART:
194,169 UART: [state] CFI Enabled
262,952 UART: [state] LifecycleState = Unprovisioned
264,819 UART: [state] DebugLocked = No
266,103 UART: [state] WD Timer not started. Device not locked for debugging
269,905 UART: [kat] SHA2-256
449,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,026 UART: ROM integrity test failed
461,289 UART: ROM Fatal Error: 0x90080001
2,711,696 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,856,315 >>> mbox cmd response: failed
2,856,899 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,000,673 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,635 UART:
193,029 UART: Running Caliptra ROM ...
194,144 UART:
603,722 UART: [state] CFI Enabled
618,377 UART: [state] LifecycleState = Unprovisioned
620,240 UART: [state] DebugLocked = No
623,041 UART: [state] WD Timer not started. Device not locked for debugging
627,458 UART: [kat] SHA2-256
806,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,626 UART: ROM integrity test failed
818,830 UART: ROM Fatal Error: 0x90080001
3,077,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,221,735 >>> mbox cmd response: failed
3,222,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,366,012 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,075 UART: ROM integrity test failed
895,522 UART: ROM Fatal Error: 0x90080001
897,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,143 >>> mbox cmd response: failed
897,143 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,149 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,447 UART: ROM integrity test failed
895,894 UART: ROM Fatal Error: 0x90080001
897,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,515 >>> mbox cmd response: failed
897,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,521 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: ROM integrity test failed
895,905 UART: ROM Fatal Error: 0x90080001
897,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,526 >>> mbox cmd response: failed
897,526 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,532 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: ROM integrity test failed
895,879 UART: ROM Fatal Error: 0x90080001
897,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,500 >>> mbox cmd response: failed
897,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,506 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,702 UART: [state] LifecycleState = Unprovisioned
86,357 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,240 UART: [kat] SHA2-256
891,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,761 UART: ROM integrity test failed
896,208 UART: ROM Fatal Error: 0x90080001
897,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,829 >>> mbox cmd response: failed
897,829 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,835 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
88,032 UART: [kat] SHA2-256
891,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,553 UART: ROM integrity test failed
896,000 UART: ROM Fatal Error: 0x90080001
897,615 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,621 >>> mbox cmd response: failed
897,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,627 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: ROM integrity test failed
895,899 UART: ROM Fatal Error: 0x90080001
897,514 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,520 >>> mbox cmd response: failed
897,520 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,526 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,420 UART: ROM integrity test failed
895,867 UART: ROM Fatal Error: 0x90080001
897,482 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,488 >>> mbox cmd response: failed
897,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,494 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,666 UART: [state] LifecycleState = Unprovisioned
86,321 UART: [state] DebugLocked = No
86,979 UART: [state] WD Timer not started. Device not locked for debugging
88,248 UART: [kat] SHA2-256
891,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,769 UART: ROM integrity test failed
896,216 UART: ROM Fatal Error: 0x90080001
897,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,837 >>> mbox cmd response: failed
897,837 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,843 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: ROM integrity test failed
895,968 UART: ROM Fatal Error: 0x90080001
897,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,589 >>> mbox cmd response: failed
897,589 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,595 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: ROM integrity test failed
895,997 UART: ROM Fatal Error: 0x90080001
897,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,618 >>> mbox cmd response: failed
897,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,624 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "2f773865c07c7393964c5dee399de40a64663a9f2f7d807e58c88ca75ee3fafb6af94adc29c6e05a141de2616b60dd98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: ROM integrity test failed
895,913 UART: ROM Fatal Error: 0x90080001
897,528 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,534 >>> mbox cmd response: failed
897,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
897,540 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,747,159 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,891,689 >>> mbox cmd response: failed
2,892,266 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,035,650 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
4,864,535 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,441,154 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
2,705,581 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,849,750 >>> mbox cmd response: failed
2,850,305 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,993,640 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
4,852,049 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,428,414 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,049,423 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,193,463 >>> mbox cmd response: failed
3,194,016 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,337,885 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
21,578,863 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,020,682 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,056,742 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,201,112 >>> mbox cmd response: failed
3,201,681 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,344,866 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
21,585,910 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,036,647 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,710,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,854,938 >>> mbox cmd response: failed
2,855,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,999,093 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,460,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,299 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,708,128 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,852,786 >>> mbox cmd response: failed
2,853,356 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,997,095 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,452,414 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,297,449 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
3,069,230 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,213,861 >>> mbox cmd response: failed
3,214,456 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,358,051 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,181,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,913,627 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,056,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,200,823 >>> mbox cmd response: failed
3,201,384 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,345,110 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,203,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,935,639 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
2,708,021 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,852,614 >>> mbox cmd response: failed
2,853,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,996,912 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
3,427,495 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,251,092 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,070,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,214,878 >>> mbox cmd response: failed
3,215,443 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,360,061 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
20,173,940 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,892,026 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,756 >>> mbox cmd response: failed
814,756 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,513 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,848 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,966 >>> mbox cmd response: failed
814,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,288 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,679 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,687 >>> mbox cmd response: failed
814,687 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,895 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,689 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,697 >>> mbox cmd response: failed
814,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,851 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,774 >>> mbox cmd response: failed
814,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,004 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,774 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,782 >>> mbox cmd response: failed
814,782 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,788 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,788 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,455 >>> mbox cmd response: failed
814,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,380 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,379 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,249 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
815,257 >>> mbox cmd response: failed
815,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
815,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,097 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,870 >>> mbox cmd response: failed
814,870 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,068 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,702 >>> mbox cmd response: failed
814,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,172 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,167 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
815,175 >>> mbox cmd response: failed
815,175 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
815,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,532 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,613 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,591 >>> mbox cmd response: failed
814,591 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
814,597 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,597 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,163 UART:
192,523 UART: Running Caliptra ROM ...
193,649 UART:
193,793 UART: [state] CFI Enabled
264,196 UART: [state] LifecycleState = Unprovisioned
266,173 UART: [state] DebugLocked = No
268,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,659 UART: [kat] SHA2-256
442,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,886 UART: [kat] ++
453,363 UART: [kat] sha1
464,456 UART: [kat] SHA2-256
467,124 UART: [kat] SHA2-384
473,035 UART: [kat] SHA2-512-ACC
475,381 UART: [kat] ECC-384
2,766,429 UART: [kat] HMAC-384Kdf
2,790,245 UART: [kat] LMS
3,980,518 UART: [kat] --
3,984,087 UART: [cold-reset] ++
3,986,452 UART: [fht] Storing FHT @ 0x50003400
3,996,781 UART: [idev] ++
3,997,459 UART: [idev] CDI.KEYID = 6
3,998,381 UART: [idev] SUBJECT.KEYID = 7
3,999,564 UART: [idev] UDS.KEYID = 0
4,000,536 ready_for_fw is high
4,000,774 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,145,360 UART: [idev] Erasing UDS.KEYID = 0
7,336,659 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,586 UART: [idev] --
7,362,659 UART: [ldev] ++
7,363,304 UART: [ldev] CDI.KEYID = 6
7,364,221 UART: [ldev] SUBJECT.KEYID = 5
7,365,439 UART: [ldev] AUTHORITY.KEYID = 7
7,366,673 UART: [ldev] FE.KEYID = 1
7,414,533 UART: [ldev] Erasing FE.KEYID = 1
10,749,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,812 UART: [ldev] --
13,131,194 UART: [fwproc] Waiting for Commands...
13,133,251 UART: [fwproc] Received command 0x46574c44
13,135,440 UART: [fwproc] Received Image of size 114996 bytes
17,188,252 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,266,708 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,568 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,656,060 >>> mbox cmd response: success
17,660,812 UART: [afmc] ++
17,661,421 UART: [afmc] CDI.KEYID = 6
17,662,334 UART: [afmc] SUBJECT.KEYID = 7
17,663,605 UART: [afmc] AUTHORITY.KEYID = 5
21,021,158 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,321,537 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,323,793 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,338,174 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,353,017 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,367,462 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,389,522 UART: [afmc] --
23,392,910 UART: [cold-reset] --
23,395,747 UART: [state] Locking Datavault
23,400,348 UART: [state] Locking PCR0, PCR1 and PCR31
23,402,100 UART: [state] Locking ICCM
23,404,089 UART: [exit] Launching FMC @ 0x40000130
23,412,490 UART:
23,412,727 UART: Running Caliptra FMC ...
23,413,833 UART:
23,413,995 UART: [state] CFI Enabled
23,480,120 UART: [fht] FMC Alias Private Key: 7
25,818,900 UART: [art] Extend RT PCRs Done
25,820,119 UART: [art] Lock RT PCRs Done
25,821,962 UART: [art] Populate DV Done
25,827,101 UART: [fht] FMC Alias Private Key: 7
25,828,692 UART: [art] Derive CDI
25,829,510 UART: [art] Store in in slot 0x4
25,880,555 UART: [art] Derive Key Pair
25,881,620 UART: [art] Store priv key in slot 0x5
29,175,356 UART: [art] Derive Key Pair - Done
29,188,455 UART: [art] Signing Cert with AUTHO
29,189,757 UART: RITY.KEYID = 7
31,478,052 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,565 UART: [art] PUB.X = 71204AA8F18F1708B5280DBDDBBA64C662E6456F9413B4718AE0C6EC2462C099461F0B8E7D7973DBCB4A813E2FC09A44
31,486,826 UART: [art] PUB.Y = E37F9C3B2B6F38C494F3CA27873AE5DA3CA7E72FB9C31E36B7C11ABAEE401511D7E057B59A66F4D325A85C91A2BC2198
31,494,070 UART: [art] SIG.R = D22DE7C9B04777CCF9C094ECFE7B593C52D7DB3B6604B18B813E9ED6BC3F71E227A802841CB06E6C9946BC07DF642362
31,501,506 UART: [art] SIG.S = 42DE949B1BBBEE111A8DDC9B93475B33DFE5763484875F46244DA61D3F6B831EAAED61998414AE234D1092D90A46765C
32,806,082 UART: Caliptra RT
32,806,841 UART: [state] CFI Enabled
32,974,913 UART: [rt] RT listening for mailbox commands...
32,976,780 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,006,571 UART: [rt]cmd =0x46504c54, len=4
33,008,321 >>> mbox cmd response data (8 bytes)
33,009,297 UART: [rt] FIPS self test
33,010,248 UART: [kat] ++
33,010,699 UART: [kat] sha1
33,015,156 UART: [kat] SHA2-256
33,017,141 UART: [kat] SHA2-384
33,020,160 UART: [kat] SHA2-512-ACC
33,022,402 UART: [kat] ECC-384
33,024,467 UART: Fatal Error: 0x90040004
33,059,850 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,204,330 >>> mbox cmd response: failed
33,204,937 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,349,149 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
189,978 UART:
190,267 UART: Running Caliptra ROM ...
191,297 UART:
191,439 UART: [state] CFI Enabled
269,322 UART: [state] LifecycleState = Unprovisioned
271,246 UART: [state] DebugLocked = No
274,078 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,597 UART: [kat] SHA2-256
448,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,836 UART: [kat] ++
459,366 UART: [kat] sha1
470,218 UART: [kat] SHA2-256
472,951 UART: [kat] SHA2-384
479,413 UART: [kat] SHA2-512-ACC
481,756 UART: [kat] ECC-384
2,772,999 UART: [kat] HMAC-384Kdf
2,802,460 UART: [kat] LMS
3,992,783 UART: [kat] --
3,996,743 UART: [cold-reset] ++
3,998,731 UART: [fht] Storing FHT @ 0x50003400
4,009,510 UART: [idev] ++
4,010,120 UART: [idev] CDI.KEYID = 6
4,011,009 UART: [idev] SUBJECT.KEYID = 7
4,012,233 UART: [idev] UDS.KEYID = 0
4,013,784 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,158,220 UART: [idev] Erasing UDS.KEYID = 0
7,351,933 UART: [idev] Using Sha1 for KeyId Algorithm
7,375,337 UART: [idev] --
7,379,470 UART: [ldev] ++
7,380,050 UART: [ldev] CDI.KEYID = 6
7,381,019 UART: [ldev] SUBJECT.KEYID = 5
7,382,235 UART: [ldev] AUTHORITY.KEYID = 7
7,383,470 UART: [ldev] FE.KEYID = 1
7,425,609 UART: [ldev] Erasing FE.KEYID = 1
10,761,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,073,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,088,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,103,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,117,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,958 UART: [ldev] --
13,140,048 UART: [fwproc] Waiting for Commands...
13,141,882 UART: [fwproc] Received command 0x46574c44
13,144,074 UART: [fwproc] Received Image of size 114996 bytes
17,206,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,278,360 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,347,258 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,667,556 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,805,794 ready_for_fw is high
3,806,232 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,907,474 >>> mbox cmd response: success
23,607,576 UART:
23,607,982 UART: Running Caliptra FMC ...
23,609,099 UART:
23,609,259 UART: [state] CFI Enabled
23,675,358 UART: [fht] FMC Alias Private Key: 7
26,013,689 UART: [art] Extend RT PCRs Done
26,014,923 UART: [art] Lock RT PCRs Done
26,016,614 UART: [art] Populate DV Done
26,021,933 UART: [fht] FMC Alias Private Key: 7
26,023,532 UART: [art] Derive CDI
26,024,372 UART: [art] Store in in slot 0x4
26,084,893 UART: [art] Derive Key Pair
26,085,945 UART: [art] Store priv key in slot 0x5
29,378,755 UART: [art] Derive Key Pair - Done
29,391,766 UART: [art] Signing Cert with AUTHO
29,393,078 UART: RITY.KEYID = 7
31,680,414 UART: [art] Erasing AUTHORITY.KEYID = 7
31,681,926 UART: [art] PUB.X = D078CF236ED68C470F6E48A6A2F995F0AB6643024867A7681CDE2015096FD0BD89D6AD2034F514529B16427F78366335
31,689,126 UART: [art] PUB.Y = C7AEAE5130E254A118330751A03C5852EE3F19CF54315E1AC208D2577FF737FD4291D387063E6C7BC9E72DC073B6C39D
31,696,391 UART: [art] SIG.R = 3C49776BBCC406A4257ACEC97E903A48193BC365E00ED7ECD6443D143545DBB0DDC4DDDD5BB10575F565AFC924074947
31,703,735 UART: [art] SIG.S = 15DFB356BAAE0E986B4D55F9BA65849E25B3E9103146CBACB1C9EDF03B94842F02AFD137DB5E37CD845BC9CCD437E9F6
33,008,851 UART: Caliptra RT
33,009,569 UART: [state] CFI Enabled
33,169,552 UART: [rt] RT listening for mailbox commands...
33,171,411 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,201,374 UART: [rt]cmd =0x46504c54, len=4
33,202,956 >>> mbox cmd response data (8 bytes)
33,203,912 UART: [rt] FIPS self test
33,204,865 UART: [kat] ++
33,205,319 UART: [kat] sha1
33,209,774 UART: [kat] SHA2-256
33,211,759 UART: [kat] SHA2-384
33,214,727 UART: [kat] SHA2-512-ACC
33,217,029 UART: [kat] ECC-384
33,218,824 UART: Fatal Error: 0x90040004
33,254,034 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,398,472 >>> mbox cmd response: failed
33,399,124 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,543,546 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,770,257 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,877,915 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,515 UART:
192,887 UART: Running Caliptra ROM ...
194,072 UART:
603,873 UART: [state] CFI Enabled
617,956 UART: [state] LifecycleState = Unprovisioned
619,904 UART: [state] DebugLocked = No
622,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,370 UART: [kat] SHA2-256
797,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,662 UART: [kat] ++
808,117 UART: [kat] sha1
819,416 UART: [kat] SHA2-256
822,076 UART: [kat] SHA2-384
827,934 UART: [kat] SHA2-512-ACC
830,314 UART: [kat] ECC-384
3,114,819 UART: [kat] HMAC-384Kdf
3,125,542 UART: [kat] LMS
4,315,647 UART: [kat] --
4,320,930 UART: [cold-reset] ++
4,323,149 UART: [fht] Storing FHT @ 0x50003400
4,334,494 UART: [idev] ++
4,335,069 UART: [idev] CDI.KEYID = 6
4,336,028 UART: [idev] SUBJECT.KEYID = 7
4,337,277 UART: [idev] UDS.KEYID = 0
4,338,211 ready_for_fw is high
4,338,410 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,482,856 UART: [idev] Erasing UDS.KEYID = 0
7,621,970 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,530 UART: [idev] --
7,648,746 UART: [ldev] ++
7,649,370 UART: [ldev] CDI.KEYID = 6
7,650,256 UART: [ldev] SUBJECT.KEYID = 5
7,651,527 UART: [ldev] AUTHORITY.KEYID = 7
7,652,781 UART: [ldev] FE.KEYID = 1
7,663,975 UART: [ldev] Erasing FE.KEYID = 1
10,953,020 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,247 UART: [ldev] --
13,313,183 UART: [fwproc] Waiting for Commands...
13,315,558 UART: [fwproc] Received command 0x46574c44
13,317,746 UART: [fwproc] Received Image of size 114996 bytes
17,376,015 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,545 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,843,711 >>> mbox cmd response: success
17,847,276 UART: [afmc] ++
17,847,889 UART: [afmc] CDI.KEYID = 6
17,848,806 UART: [afmc] SUBJECT.KEYID = 7
17,850,025 UART: [afmc] AUTHORITY.KEYID = 5
21,166,537 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,954 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,300 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,164 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,507,585 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,949 UART: [afmc] --
23,532,696 UART: [cold-reset] --
23,537,316 UART: [state] Locking Datavault
23,540,789 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,543 UART: [state] Locking ICCM
23,544,097 UART: [exit] Launching FMC @ 0x40000130
23,552,440 UART:
23,552,698 UART: Running Caliptra FMC ...
23,553,805 UART:
23,553,974 UART: [state] CFI Enabled
23,562,238 UART: [fht] FMC Alias Private Key: 7
25,892,913 UART: [art] Extend RT PCRs Done
25,894,139 UART: [art] Lock RT PCRs Done
25,895,576 UART: [art] Populate DV Done
25,901,051 UART: [fht] FMC Alias Private Key: 7
25,902,755 UART: [art] Derive CDI
25,903,576 UART: [art] Store in in slot 0x4
25,946,247 UART: [art] Derive Key Pair
25,947,289 UART: [art] Store priv key in slot 0x5
29,189,273 UART: [art] Derive Key Pair - Done
29,202,049 UART: [art] Signing Cert with AUTHO
29,203,395 UART: RITY.KEYID = 7
31,482,533 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,056 UART: [art] PUB.X = C25A6BE596212F684781A6D2B628B540D8AA8FD3757F5191E1AB61EE7AFA1695D023A73C25CF60B68CF72F159F9A9DD4
31,491,268 UART: [art] PUB.Y = 8B1DE8327F7934328F810941986967FC8DCFD819B25C32C9C7014E6B92E3C80300D181BD39D249682D8BADF90FDC6A5D
31,498,511 UART: [art] SIG.R = A1178BF928E9B1E0B9F3FEE5E0F7BEAAF265F73C39275D5AF019696AEBC35490CEB4D194ACCCF161B05A2C865ED10154
31,505,905 UART: [art] SIG.S = 1F6F138C71F482D47FF47527A5B90C9291AC5AA58FDE3CC603DFA47F949EF8FDA76C1DA74F52AE3888E6D56692E2A6B0
32,810,964 UART: Caliptra RT
32,811,681 UART: [state] CFI Enabled
32,928,993 UART: [rt] RT listening for mailbox commands...
32,930,842 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,960,492 UART: [rt]cmd =0x46504c54, len=4
32,962,103 >>> mbox cmd response data (8 bytes)
32,963,032 UART: [rt] FIPS self test
32,963,978 UART: [kat] ++
32,964,433 UART: [kat] sha1
32,968,997 UART: [kat] SHA2-256
32,970,926 UART: [kat] SHA2-384
32,974,049 UART: [kat] SHA2-512-ACC
32,976,312 UART: [kat] ECC-384
32,978,157 UART: Fatal Error: 0x90040004
33,013,361 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,157,760 >>> mbox cmd response: failed
33,158,356 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,302,741 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
189,984 UART:
190,269 UART: Running Caliptra ROM ...
191,295 UART:
7,221,835 UART: [state] CFI Enabled
7,235,889 UART: [state] LifecycleState = Unprovisioned
7,237,798 UART: [state] DebugLocked = No
7,240,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,245,995 UART: [kat] SHA2-256
7,415,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,426,319 UART: [kat] ++
7,426,787 UART: [kat] sha1
7,437,837 UART: [kat] SHA2-256
7,440,541 UART: [kat] SHA2-384
7,447,019 UART: [kat] SHA2-512-ACC
7,449,374 UART: [kat] ECC-384
9,732,976 UART: [kat] HMAC-384Kdf
9,744,618 UART: [kat] LMS
10,934,752 UART: [kat] --
10,937,606 UART: [cold-reset] ++
10,939,377 UART: [fht] Storing FHT @ 0x50003400
10,949,346 UART: [idev] ++
10,949,907 UART: [idev] CDI.KEYID = 6
10,950,845 UART: [idev] SUBJECT.KEYID = 7
10,952,111 UART: [idev] UDS.KEYID = 0
10,953,640 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,098,382 UART: [idev] Erasing UDS.KEYID = 0
14,235,174 UART: [idev] Using Sha1 for KeyId Algorithm
14,255,743 UART: [idev] --
14,259,563 UART: [ldev] ++
14,260,145 UART: [ldev] CDI.KEYID = 6
14,261,112 UART: [ldev] SUBJECT.KEYID = 5
14,262,329 UART: [ldev] AUTHORITY.KEYID = 7
14,263,562 UART: [ldev] FE.KEYID = 1
14,274,366 UART: [ldev] Erasing FE.KEYID = 1
17,562,264 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,853,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,868,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,882,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,897,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,915,370 UART: [ldev] --
19,920,173 UART: [fwproc] Waiting for Commands...
19,922,819 UART: [fwproc] Received command 0x46574c44
19,925,011 UART: [fwproc] Received Image of size 114996 bytes
23,985,065 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,065,908 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,134,775 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,455,653 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
4,129,548 ready_for_fw is high
4,130,324 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,092,765 >>> mbox cmd response: success
23,738,460 UART:
23,738,868 UART: Running Caliptra FMC ...
23,740,197 UART:
23,740,375 UART: [state] CFI Enabled
23,748,313 UART: [fht] FMC Alias Private Key: 7
26,078,657 UART: [art] Extend RT PCRs Done
26,079,894 UART: [art] Lock RT PCRs Done
26,081,581 UART: [art] Populate DV Done
26,086,930 UART: [fht] FMC Alias Private Key: 7
26,088,476 UART: [art] Derive CDI
26,089,294 UART: [art] Store in in slot 0x4
26,132,061 UART: [art] Derive Key Pair
26,133,108 UART: [art] Store priv key in slot 0x5
29,374,947 UART: [art] Derive Key Pair - Done
29,387,897 UART: [art] Signing Cert with AUTHO
29,389,204 UART: RITY.KEYID = 7
31,668,468 UART: [art] Erasing AUTHORITY.KEYID = 7
31,669,979 UART: [art] PUB.X = 9151E2AA420BC2F80ABB2063885BA859CE17124FBC2F8DF605C437533B2DD185405C9B2C6CA481603F33AD79CCB5B26B
31,677,238 UART: [art] PUB.Y = 20CBABF78470F3DD8E01961D8832F26CFF83B359A7D536893669578B105E7C8306DD77743891AD50B1730EA75ED14920
31,684,471 UART: [art] SIG.R = 32EFF0C1D56B55015D9D0D8684DA0D732B1352AD7AC157C504A1F1F73CF59882996EB8F0298F7DA72D6B5EE82498007C
31,691,818 UART: [art] SIG.S = 7F29F1DCA0F7494261B07458EAC625B06195003A759D60BD8AC337D32E66BE8EB3337D36FB802FA28205A549B5250600
32,996,952 UART: Caliptra RT
32,997,656 UART: [state] CFI Enabled
33,114,820 UART: [rt] RT listening for mailbox commands...
33,116,740 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,146,700 UART: [rt]cmd =0x46504c54, len=4
33,148,446 >>> mbox cmd response data (8 bytes)
33,149,713 UART: [rt] FIPS self test
33,150,660 UART: [kat] ++
33,151,111 UART: [kat] sha1
33,155,676 UART: [kat] SHA2-256
33,157,610 UART: [kat] SHA2-384
33,160,623 UART: [kat] SHA2-512-ACC
33,162,869 UART: [kat] ECC-384
33,164,553 UART: Fatal Error: 0x90040004
33,199,935 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,344,875 >>> mbox cmd response: failed
33,345,534 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,489,770 >>> mbox cmd response: failed
Initializing fuses
994 writing to cptra_bootfsm_go
10,569,176 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,538,655 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
192,229 UART:
192,589 UART: Running Caliptra ROM ...
193,736 UART:
193,885 UART: [state] CFI Enabled
265,499 UART: [state] LifecycleState = Unprovisioned
267,407 UART: [state] DebugLocked = No
270,220 UART: [state] WD Timer not started. Device not locked for debugging
274,115 UART: [kat] SHA2-256
453,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,765 UART: [kat] ++
465,390 UART: [kat] sha1
477,346 UART: [kat] SHA2-256
480,426 UART: [kat] SHA2-384
486,416 UART: [kat] SHA2-512-ACC
489,361 UART: [kat] ECC-384
2,949,650 UART: [kat] HMAC-384Kdf
2,971,060 UART: [kat] LMS
3,500,522 UART: [kat] --
3,505,065 UART: [cold-reset] ++
3,506,655 UART: [fht] FHT @ 0x50003400
3,516,433 UART: [idev] ++
3,516,998 UART: [idev] CDI.KEYID = 6
3,517,905 UART: [idev] SUBJECT.KEYID = 7
3,519,084 UART: [idev] UDS.KEYID = 0
3,520,158 ready_for_fw is high
3,520,376 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,665,412 UART: [idev] Erasing UDS.KEYID = 0
6,024,279 UART: [idev] Sha1 KeyId Algorithm
6,047,235 UART: [idev] --
6,051,314 UART: [ldev] ++
6,051,895 UART: [ldev] CDI.KEYID = 6
6,052,805 UART: [ldev] SUBJECT.KEYID = 5
6,053,971 UART: [ldev] AUTHORITY.KEYID = 7
6,055,210 UART: [ldev] FE.KEYID = 1
6,100,969 UART: [ldev] Erasing FE.KEYID = 1
8,601,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,827 UART: [ldev] --
10,392,883 UART: [fwproc] Wait for Commands...
10,395,897 UART: [fwproc] Recv command 0x46574c44
10,397,992 UART: [fwproc] Recv'd Img size: 115304 bytes
13,816,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,270 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,281,551 >>> mbox cmd response: success
14,285,726 UART: [afmc] ++
14,286,311 UART: [afmc] CDI.KEYID = 6
14,287,496 UART: [afmc] SUBJECT.KEYID = 7
14,288,622 UART: [afmc] AUTHORITY.KEYID = 5
16,833,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,867 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,641 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,658 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,541 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,383 UART: [afmc] --
18,631,259 UART: [cold-reset] --
18,634,419 UART: [state] Locking Datavault
18,641,664 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,366 UART: [state] Locking ICCM
18,644,893 UART: [exit] Launching FMC @ 0x40000130
18,653,291 UART:
18,653,525 UART: Running Caliptra FMC ...
18,654,624 UART:
18,654,789 UART: [state] CFI Enabled
18,714,306 UART: [fht] FMC Alias Private Key: 7
20,478,051 UART: [art] Extend RT PCRs Done
20,479,275 UART: [art] Lock RT PCRs Done
20,480,925 UART: [art] Populate DV Done
20,486,246 UART: [fht] FMC Alias Private Key: 7
20,487,786 UART: [art] Derive CDI
20,488,522 UART: [art] Store in in slot 0x4
20,547,126 UART: [art] Derive Key Pair
20,548,184 UART: [art] Store priv key in slot 0x5
23,010,985 UART: [art] Derive Key Pair - Done
23,024,249 UART: [art] Signing Cert with AUTHO
23,025,555 UART: RITY.KEYID = 7
24,736,883 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,390 UART: [art] PUB.X = 380B06108A9332357CCAFC4D22D18C1F2F3E18E2F6D640A508C7107045063E3188695DFF482F8056AC0C45FEA5668026
24,745,638 UART: [art] PUB.Y = 09D32D4903D2B865105CEC55B6A2191E95524FBD20DB6F600632C78ED4E8127ED4015DABFFFFB9330B4E62689E114850
24,752,870 UART: [art] SIG.R = 4EBEDC3EA4450088156870FBFBBE3DDDA0C0605CBA0B91CB79EE768D5B9D5386735435F666107D0D71727E3290212995
24,760,260 UART: [art] SIG.S = 300079479B032B661635744BDD11658D18BA363E7669A4D37998692A9F7FCAFF49FD10BAF7CF3B1180C259C47DF6CB3A
25,739,733 UART: Caliptra RT
25,740,431 UART: [state] CFI Enabled
25,905,275 UART: [rt] RT listening for mailbox commands...
25,907,146 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,936,987 UART: [rt]cmd =0x46504c54, len=4
25,938,621 >>> mbox cmd response data (8 bytes)
25,939,595 UART: [rt] FIPS self test
25,940,537 UART: [kat] ++
25,940,982 UART: [kat] sha1
25,945,377 UART: [kat] SHA2-256
25,947,305 UART: [kat] SHA2-384
25,950,217 UART: [kat] SHA2-512-ACC
25,952,503 UART: [kat] ECC-384
25,954,296 UART: Fatal Error: 0x90040004
25,989,671 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,134,497 >>> mbox cmd response: failed
26,135,133 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,280,173 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
190,044 UART:
190,345 UART: Running Caliptra ROM ...
191,373 UART:
191,512 UART: [state] CFI Enabled
269,989 UART: [state] LifecycleState = Unprovisioned
271,853 UART: [state] DebugLocked = No
273,615 UART: [state] WD Timer not started. Device not locked for debugging
277,239 UART: [kat] SHA2-256
456,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,922 UART: [kat] ++
468,372 UART: [kat] sha1
480,433 UART: [kat] SHA2-256
483,447 UART: [kat] SHA2-384
490,719 UART: [kat] SHA2-512-ACC
493,638 UART: [kat] ECC-384
2,953,053 UART: [kat] HMAC-384Kdf
2,967,953 UART: [kat] LMS
3,497,365 UART: [kat] --
3,500,925 UART: [cold-reset] ++
3,502,258 UART: [fht] FHT @ 0x50003400
3,514,373 UART: [idev] ++
3,514,932 UART: [idev] CDI.KEYID = 6
3,515,814 UART: [idev] SUBJECT.KEYID = 7
3,517,024 UART: [idev] UDS.KEYID = 0
3,518,607 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,663,661 UART: [idev] Erasing UDS.KEYID = 0
6,023,987 UART: [idev] Sha1 KeyId Algorithm
6,047,219 UART: [idev] --
6,051,108 UART: [ldev] ++
6,051,684 UART: [ldev] CDI.KEYID = 6
6,052,600 UART: [ldev] SUBJECT.KEYID = 5
6,053,778 UART: [ldev] AUTHORITY.KEYID = 7
6,055,016 UART: [ldev] FE.KEYID = 1
6,096,612 UART: [ldev] Erasing FE.KEYID = 1
8,605,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,925 UART: [ldev] --
10,409,962 UART: [fwproc] Wait for Commands...
10,411,831 UART: [fwproc] Recv command 0x46574c44
10,413,882 UART: [fwproc] Recv'd Img size: 115304 bytes
13,831,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,909,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,977,999 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,299,461 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,360,203 ready_for_fw is high
3,360,829 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,080,828 >>> mbox cmd response: success
18,367,188 UART:
18,367,571 UART: Running Caliptra FMC ...
18,368,779 UART:
18,368,950 UART: [state] CFI Enabled
18,434,340 UART: [fht] FMC Alias Private Key: 7
20,198,938 UART: [art] Extend RT PCRs Done
20,200,177 UART: [art] Lock RT PCRs Done
20,201,979 UART: [art] Populate DV Done
20,207,584 UART: [fht] FMC Alias Private Key: 7
20,209,122 UART: [art] Derive CDI
20,209,938 UART: [art] Store in in slot 0x4
20,267,306 UART: [art] Derive Key Pair
20,268,338 UART: [art] Store priv key in slot 0x5
22,730,754 UART: [art] Derive Key Pair - Done
22,743,776 UART: [art] Signing Cert with AUTHO
22,745,088 UART: RITY.KEYID = 7
24,456,279 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,785 UART: [art] PUB.X = D4EB3011D6284AF82091471F55FD6408D1FA8E9B1952C23762796325A640E68BFDFBF74F6FD197418041869D8C2C6FD3
24,464,999 UART: [art] PUB.Y = 28ACC7255DE54CDD124F230CC4EDB5BB3193066B67E28C1F9A6CD35D0929CB1CF516D8F73667E5DE0679F1DE5537C00B
24,472,320 UART: [art] SIG.R = EAF0DFEFB68FB8D76C6D11BC50182B149A7AB25D24F8B34C40719E983DF7078868712286BA4E93F7E0A4BC813AE90962
24,479,721 UART: [art] SIG.S = 4655AA35E15DFF5BFD97DF140C76305948128003147AE644E10164838A191F4FC7C444694B008CF4C1F9DB23B62C2731
25,458,408 UART: Caliptra RT
25,459,131 UART: [state] CFI Enabled
25,623,534 UART: [rt] RT listening for mailbox commands...
25,625,381 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,655,049 UART: [rt]cmd =0x46504c54, len=4
25,656,790 >>> mbox cmd response data (8 bytes)
25,657,999 UART: [rt] FIPS self test
25,658,936 UART: [kat] ++
25,659,382 UART: [kat] sha1
25,663,942 UART: [kat] SHA2-256
25,665,865 UART: [kat] SHA2-384
25,668,770 UART: [kat] SHA2-512-ACC
25,671,034 UART: [kat] ECC-384
25,673,039 UART: Fatal Error: 0x90040004
25,708,423 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,853,315 >>> mbox cmd response: failed
25,853,949 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,998,608 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,364,613 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,086,280 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,503 UART:
192,877 UART: Running Caliptra ROM ...
194,081 UART:
603,444 UART: [state] CFI Enabled
617,803 UART: [state] LifecycleState = Unprovisioned
619,639 UART: [state] DebugLocked = No
621,873 UART: [state] WD Timer not started. Device not locked for debugging
624,697 UART: [kat] SHA2-256
803,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,410 UART: [kat] ++
815,864 UART: [kat] sha1
828,014 UART: [kat] SHA2-256
831,023 UART: [kat] SHA2-384
838,010 UART: [kat] SHA2-512-ACC
840,956 UART: [kat] ECC-384
3,284,616 UART: [kat] HMAC-384Kdf
3,296,493 UART: [kat] LMS
3,825,981 UART: [kat] --
3,829,973 UART: [cold-reset] ++
3,832,399 UART: [fht] FHT @ 0x50003400
3,843,905 UART: [idev] ++
3,844,473 UART: [idev] CDI.KEYID = 6
3,845,509 UART: [idev] SUBJECT.KEYID = 7
3,846,611 UART: [idev] UDS.KEYID = 0
3,847,537 ready_for_fw is high
3,847,760 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,992,631 UART: [idev] Erasing UDS.KEYID = 0
6,317,041 UART: [idev] Sha1 KeyId Algorithm
6,340,014 UART: [idev] --
6,343,414 UART: [ldev] ++
6,343,981 UART: [ldev] CDI.KEYID = 6
6,344,870 UART: [ldev] SUBJECT.KEYID = 5
6,346,088 UART: [ldev] AUTHORITY.KEYID = 7
6,347,323 UART: [ldev] FE.KEYID = 1
6,356,895 UART: [ldev] Erasing FE.KEYID = 1
8,836,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,554 UART: [ldev] --
10,625,743 UART: [fwproc] Wait for Commands...
10,628,542 UART: [fwproc] Recv command 0x46574c44
10,630,587 UART: [fwproc] Recv'd Img size: 115304 bytes
14,046,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,301 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,501,610 >>> mbox cmd response: success
14,505,828 UART: [afmc] ++
14,506,414 UART: [afmc] CDI.KEYID = 6
14,507,302 UART: [afmc] SUBJECT.KEYID = 7
14,508,405 UART: [afmc] AUTHORITY.KEYID = 5
17,010,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,730,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,732,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,748,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,764,492 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,780,352 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,821 UART: [afmc] --
18,806,690 UART: [cold-reset] --
18,809,747 UART: [state] Locking Datavault
18,816,132 UART: [state] Locking PCR0, PCR1 and PCR31
18,817,780 UART: [state] Locking ICCM
18,819,394 UART: [exit] Launching FMC @ 0x40000130
18,827,787 UART:
18,828,029 UART: Running Caliptra FMC ...
18,829,135 UART:
18,829,296 UART: [state] CFI Enabled
18,837,258 UART: [fht] FMC Alias Private Key: 7
20,593,716 UART: [art] Extend RT PCRs Done
20,594,939 UART: [art] Lock RT PCRs Done
20,596,551 UART: [art] Populate DV Done
20,602,179 UART: [fht] FMC Alias Private Key: 7
20,603,823 UART: [art] Derive CDI
20,604,561 UART: [art] Store in in slot 0x4
20,647,105 UART: [art] Derive Key Pair
20,648,148 UART: [art] Store priv key in slot 0x5
23,074,314 UART: [art] Derive Key Pair - Done
23,087,688 UART: [art] Signing Cert with AUTHO
23,088,998 UART: RITY.KEYID = 7
24,794,189 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,696 UART: [art] PUB.X = 80C75B102A26AFE3DDFA88E783C9E42357F559E31E69C15B99AC4BF08BDD62E6E04B2DD24156D9D255603CF478C68CAE
24,802,949 UART: [art] PUB.Y = 02A2DE8F3DDC02E47B3C1BE266C082425EB19D2D12D8F5CE2C6E20235EBDB501F123E3CD19EACA62709DB08D59D2E0D2
24,810,240 UART: [art] SIG.R = 9084B357DC77D66E5CB292B964AF6906594FC6D73559535C6A7C5A72A425F77A9F37B4B7EB4D74203E089F3A0F932778
24,817,659 UART: [art] SIG.S = 5701711A4C294C8C94886CD1B87213612B8BA6A58705B606BE9200F942893DEA9DBB8BF5E05184457112BAF2894D811B
25,796,168 UART: Caliptra RT
25,796,890 UART: [state] CFI Enabled
25,913,874 UART: [rt] RT listening for mailbox commands...
25,915,730 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,945,589 UART: [rt]cmd =0x46504c54, len=4
25,947,164 >>> mbox cmd response data (8 bytes)
25,948,067 UART: [rt] FIPS self test
25,949,011 UART: [kat] ++
25,949,467 UART: [kat] sha1
25,953,972 UART: [kat] SHA2-256
25,955,903 UART: [kat] SHA2-384
25,958,910 UART: [kat] SHA2-512-ACC
25,961,156 UART: [kat] ECC-384
25,962,890 UART: Fatal Error: 0x90040004
25,998,270 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,143,108 >>> mbox cmd response: failed
26,143,768 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,288,400 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,088 UART:
190,382 UART: Running Caliptra ROM ...
191,494 UART:
14,248,535 UART: [state] CFI Enabled
14,262,871 UART: [state] LifecycleState = Unprovisioned
14,264,740 UART: [state] DebugLocked = No
14,267,127 UART: [state] WD Timer not started. Device not locked for debugging
14,271,348 UART: [kat] SHA2-256
14,450,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,462,041 UART: [kat] ++
14,462,581 UART: [kat] sha1
14,474,368 UART: [kat] SHA2-256
14,477,393 UART: [kat] SHA2-384
14,483,431 UART: [kat] SHA2-512-ACC
14,486,356 UART: [kat] ECC-384
16,928,063 UART: [kat] HMAC-384Kdf
16,940,288 UART: [kat] LMS
17,469,729 UART: [kat] --
17,474,745 UART: [cold-reset] ++
17,476,137 UART: [fht] FHT @ 0x50003400
17,487,382 UART: [idev] ++
17,487,937 UART: [idev] CDI.KEYID = 6
17,488,876 UART: [idev] SUBJECT.KEYID = 7
17,490,085 UART: [idev] UDS.KEYID = 0
17,491,601 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,636,447 UART: [idev] Erasing UDS.KEYID = 0
19,959,714 UART: [idev] Sha1 KeyId Algorithm
19,982,261 UART: [idev] --
19,986,096 UART: [ldev] ++
19,986,665 UART: [ldev] CDI.KEYID = 6
19,987,548 UART: [ldev] SUBJECT.KEYID = 5
19,988,701 UART: [ldev] AUTHORITY.KEYID = 7
19,990,044 UART: [ldev] FE.KEYID = 1
20,002,445 UART: [ldev] Erasing FE.KEYID = 1
22,476,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,192,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,208,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,224,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,239,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,259,991 UART: [ldev] --
24,264,887 UART: [fwproc] Wait for Commands...
24,267,091 UART: [fwproc] Recv command 0x46574c44
24,269,194 UART: [fwproc] Recv'd Img size: 115304 bytes
27,686,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,760,394 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,829,155 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,150,530 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,496 writing to cptra_bootfsm_go
3,690,124 ready_for_fw is high
3,690,535 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,273,439 >>> mbox cmd response: success
18,525,423 UART:
18,525,822 UART: Running Caliptra FMC ...
18,526,931 UART:
18,527,087 UART: [state] CFI Enabled
18,535,262 UART: [fht] FMC Alias Private Key: 7
20,292,225 UART: [art] Extend RT PCRs Done
20,293,452 UART: [art] Lock RT PCRs Done
20,294,833 UART: [art] Populate DV Done
20,300,270 UART: [fht] FMC Alias Private Key: 7
20,301,821 UART: [art] Derive CDI
20,302,606 UART: [art] Store in in slot 0x4
20,345,320 UART: [art] Derive Key Pair
20,346,315 UART: [art] Store priv key in slot 0x5
22,772,747 UART: [art] Derive Key Pair - Done
22,785,982 UART: [art] Signing Cert with AUTHO
22,787,321 UART: RITY.KEYID = 7
24,492,768 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,270 UART: [art] PUB.X = D667607BAAB7F40A585261538E82A85231485168F40BCEAB91E94D5F9AA5A69383F6B8F5F696049038E96E5010FA5980
24,501,561 UART: [art] PUB.Y = 4265665196203C5A03C1A05F2CC6D52B4FF201DF5BAEEE84F98DCD3B3ECAD0D6F27D6B349D65C48B72C93B4420D12E3A
24,508,786 UART: [art] SIG.R = 315906290CB8DFD464EF956CE7B931C415B61A94DDABD3EEA42728458E6D0FB001CA2223B8836D070BD411CFBEBAA212
24,516,216 UART: [art] SIG.S = EA08F36FE27F2F3039832C3E8D51D8A04BC53DE5CC48ABCF4D71D72DC86E99D07405CAEBCE82F0B063B9634235A585F5
25,495,033 UART: Caliptra RT
25,495,737 UART: [state] CFI Enabled
25,612,317 UART: [rt] RT listening for mailbox commands...
25,614,170 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,643,590 UART: [rt]cmd =0x46504c54, len=4
25,645,131 >>> mbox cmd response data (8 bytes)
25,646,061 UART: [rt] FIPS self test
25,647,006 UART: [kat] ++
25,647,463 UART: [kat] sha1
25,652,080 UART: [kat] SHA2-256
25,653,964 UART: [kat] SHA2-384
25,656,867 UART: [kat] SHA2-512-ACC
25,659,120 UART: [kat] ECC-384
25,660,920 UART: Fatal Error: 0x90040004
25,696,128 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,840,908 >>> mbox cmd response: failed
25,841,560 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,986,285 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
17,643,336 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,234,442 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,440,104 ready_for_fw is high
3,440,563 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,767,274 >>> mbox cmd response: success
19,070,207 UART:
19,070,679 UART: Running Caliptra FMC ...
19,071,805 UART:
19,071,961 UART: [state] CFI Enabled
19,139,763 UART: [fht] FMC Alias Private Key: 7
20,903,973 UART: [art] Extend RT PCRs Done
20,905,191 UART: [art] Lock RT PCRs Done
20,906,734 UART: [art] Populate DV Done
20,912,275 UART: [fht] FMC Alias Private Key: 7
20,913,927 UART: [art] Derive CDI
20,914,750 UART: [art] Store in in slot 0x4
20,973,644 UART: [art] Derive Key Pair
20,974,639 UART: [art] Store priv key in slot 0x5
23,438,265 UART: [art] Derive Key Pair - Done
23,451,435 UART: [art] Signing Cert with AUTHO
23,452,741 UART: RITY.KEYID = 7
25,163,188 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,696 UART: [art] PUB.X = ABF2C2F797D5A48F97C0F3345BC80F7AFBD3B0F5B233D79222817F257A8CB863245725304545CDC8A1B04411C985F038
25,171,949 UART: [art] PUB.Y = 42A5BDBE0013C56FE33107D445B34034B590406A7443A2DE432B69B03724837F34ED8A9925C1287F56D683EE1135ECAF
25,179,162 UART: [art] SIG.R = 2D89E6E7067EAC15F6F8A2BE9CEEF300A9861E8AF8DC1A32FAE772453A569591A30B3E39BA7C730EC57CA76DACDBAED2
25,186,564 UART: [art] SIG.S = 22B99555D1EFA31E68D37C1EE7AEABF349185434A167DB51D2396BC06F4F3D6191DCD004D63B052A8545FC03A9357A65
26,165,273 UART: Caliptra RT
26,165,993 UART: [state] CFI Enabled
26,331,169 UART: [rt] RT listening for mailbox commands...
26,333,043 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,362,834 UART: [rt]cmd =0x46504c54, len=4
26,364,605 >>> mbox cmd response data (8 bytes)
26,365,458 UART: [rt] FIPS self test
26,366,404 UART: [kat] ++
26,366,855 UART: [kat] sha1
26,371,361 UART: [kat] SHA2-256
26,373,238 UART: [kat] SHA2-384
26,376,423 UART: [kat] SHA2-512-ACC
26,378,642 UART: [kat] ECC-384
26,380,430 UART: Fatal Error: 0x90040004
26,415,581 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,560,455 >>> mbox cmd response: failed
26,561,146 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,705,890 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
3,419,788 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,741,321 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,756,996 ready_for_fw is high
3,757,425 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,986,303 >>> mbox cmd response: success
19,243,214 UART:
19,243,598 UART: Running Caliptra FMC ...
19,244,746 UART:
19,244,906 UART: [state] CFI Enabled
19,253,108 UART: [fht] FMC Alias Private Key: 7
21,009,920 UART: [art] Extend RT PCRs Done
21,011,200 UART: [art] Lock RT PCRs Done
21,013,072 UART: [art] Populate DV Done
21,018,368 UART: [fht] FMC Alias Private Key: 7
21,019,994 UART: [art] Derive CDI
21,020,833 UART: [art] Store in in slot 0x4
21,062,792 UART: [art] Derive Key Pair
21,063,793 UART: [art] Store priv key in slot 0x5
23,490,177 UART: [art] Derive Key Pair - Done
23,503,220 UART: [art] Signing Cert with AUTHO
23,504,554 UART: RITY.KEYID = 7
25,210,304 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,805 UART: [art] PUB.X = DC2E3908F345A2E16EA488348B8FE696B8E2FCCEAFAE0A0BBB62BE3C9A7ACACA0E848AD90A3DC1A5E84A5C203E085DEA
25,219,089 UART: [art] PUB.Y = 639AAB7F8E85A920927D0B23ED3EE835A1FF10AF3ACE54D3FA1F26507CB6E534F87C6BF660BF561C560A021BF442B0F6
25,226,374 UART: [art] SIG.R = 041C503481CAAAB35894C8D733FB6E1029349144015DCCE5EE56DECBCF60418CE755E2EB8E4334D489726DFFB3639B50
25,233,748 UART: [art] SIG.S = 98D43BA664A6D9CC70F5F710B89DD44F865F84761671625634FBE193D92CAEB36B1D9B7B2AFB1EA561DEC19031C63AF1
26,212,616 UART: Caliptra RT
26,213,310 UART: [state] CFI Enabled
26,330,496 UART: [rt] RT listening for mailbox commands...
26,332,346 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,362,219 UART: [rt]cmd =0x46504c54, len=4
26,363,802 >>> mbox cmd response data (8 bytes)
26,364,790 UART: [rt] FIPS self test
26,365,740 UART: [kat] ++
26,366,190 UART: [kat] sha1
26,370,755 UART: [kat] SHA2-256
26,372,682 UART: [kat] SHA2-384
26,375,656 UART: [kat] SHA2-512-ACC
26,377,916 UART: [kat] ECC-384
26,379,832 UART: Fatal Error: 0x90040004
26,415,042 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,559,850 >>> mbox cmd response: failed
26,560,489 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,705,227 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
16,982,106 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,193,692 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,151 UART: [kat] SHA2-256
882,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,197 UART: [kat] ++
886,349 UART: [kat] sha1
890,609 UART: [kat] SHA2-256
892,547 UART: [kat] SHA2-384
895,390 UART: [kat] SHA2-512-ACC
897,291 UART: [kat] ECC-384
902,760 UART: [kat] HMAC-384Kdf
907,252 UART: [kat] LMS
1,475,448 UART: [kat] --
1,476,407 UART: [cold-reset] ++
1,476,779 UART: [fht] Storing FHT @ 0x50003400
1,479,718 UART: [idev] ++
1,479,886 UART: [idev] CDI.KEYID = 6
1,480,246 UART: [idev] SUBJECT.KEYID = 7
1,480,670 UART: [idev] UDS.KEYID = 0
1,481,015 ready_for_fw is high
1,481,015 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,718 UART: [idev] Erasing UDS.KEYID = 0
1,504,852 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,630 UART: [idev] --
1,514,663 UART: [ldev] ++
1,514,831 UART: [ldev] CDI.KEYID = 6
1,515,194 UART: [ldev] SUBJECT.KEYID = 5
1,515,620 UART: [ldev] AUTHORITY.KEYID = 7
1,516,083 UART: [ldev] FE.KEYID = 1
1,521,245 UART: [ldev] Erasing FE.KEYID = 1
1,546,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,736 UART: [ldev] --
1,586,095 UART: [fwproc] Waiting for Commands...
1,586,956 UART: [fwproc] Received command 0x46574c44
1,587,747 UART: [fwproc] Received Image of size 115304 bytes
2,897,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,630 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,982 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,249 >>> mbox cmd response: success
3,093,415 UART: [afmc] ++
3,093,583 UART: [afmc] CDI.KEYID = 6
3,093,945 UART: [afmc] SUBJECT.KEYID = 7
3,094,370 UART: [afmc] AUTHORITY.KEYID = 5
3,129,809 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,245 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,147,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,753 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,638 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,328 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,351 UART: [afmc] --
3,173,301 UART: [cold-reset] --
3,174,263 UART: [state] Locking Datavault
3,175,720 UART: [state] Locking PCR0, PCR1 and PCR31
3,176,324 UART: [state] Locking ICCM
3,176,814 UART: [exit] Launching FMC @ 0x40000130
3,182,143 UART:
3,182,159 UART: Running Caliptra FMC ...
3,182,567 UART:
3,182,621 UART: [state] CFI Enabled
3,192,824 UART: [fht] FMC Alias Private Key: 7
3,300,541 UART: [art] Extend RT PCRs Done
3,300,969 UART: [art] Lock RT PCRs Done
3,302,733 UART: [art] Populate DV Done
3,310,920 UART: [fht] FMC Alias Private Key: 7
3,312,044 UART: [art] Derive CDI
3,312,324 UART: [art] Store in in slot 0x4
3,397,913 UART: [art] Derive Key Pair
3,398,273 UART: [art] Store priv key in slot 0x5
3,411,347 UART: [art] Derive Key Pair - Done
3,426,305 UART: [art] Signing Cert with AUTHO
3,426,785 UART: RITY.KEYID = 7
3,442,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,443,124 UART: [art] PUB.X = DBD7F0DBD0C4A5B34D20B92A919DA157BF7AC9E732890A4AA16F38464AA7DA2C84570C724461F7192AE156100589432B
3,449,891 UART: [art] PUB.Y = C47D6173379C1EE336574F405DFBBCF07E76BCFC24D2BBB4F8AA4EC05851E0CBCE3E012B2DF4C6F6C2D363C6B4C3485E
3,456,862 UART: [art] SIG.R = 5FA0AAED81868293EEA8FB3128DE1E45CECC4084FFA59D1CC61CA08A1FCD0A9DCF0E3AEEF9BBA6100FC924EAA5435449
3,463,655 UART: [art] SIG.S = 3321F808363D16ACA066ED4454410A276F0E92F34C0BB70B09670EC7324D343D34434890987C2E8BB6BD4A1BBEC449A5
3,488,095 UART: Caliptra RT
3,488,348 UART: [state] CFI Enabled
3,596,772 UART: [rt] RT listening for mailbox commands...
3,597,435 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,140 UART: [rt]cmd =0x46504c54, len=4
3,628,487 >>> mbox cmd response data (8 bytes)
3,628,706 UART: [rt] FIPS self test
3,629,034 UART: [kat] ++
3,629,186 UART: [kat] sha1
3,633,612 UART: [kat] SHA2-256
3,635,634 UART: [kat] SHA2-384
3,638,405 UART: [kat] SHA2-512-ACC
3,640,332 UART: [kat] ECC-384
3,641,993 UART: Fatal Error: 0x90040004
3,643,543 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,643,548 >>> mbox cmd response: failed
3,643,548 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,643,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,789 UART: [kat] SHA2-256
881,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,835 UART: [kat] ++
885,987 UART: [kat] sha1
890,123 UART: [kat] SHA2-256
892,061 UART: [kat] SHA2-384
894,782 UART: [kat] SHA2-512-ACC
896,683 UART: [kat] ECC-384
902,228 UART: [kat] HMAC-384Kdf
906,886 UART: [kat] LMS
1,475,082 UART: [kat] --
1,475,957 UART: [cold-reset] ++
1,476,333 UART: [fht] Storing FHT @ 0x50003400
1,478,908 UART: [idev] ++
1,479,076 UART: [idev] CDI.KEYID = 6
1,479,436 UART: [idev] SUBJECT.KEYID = 7
1,479,860 UART: [idev] UDS.KEYID = 0
1,480,205 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,802 UART: [idev] Erasing UDS.KEYID = 0
1,503,868 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,590 UART: [idev] --
1,513,621 UART: [ldev] ++
1,513,789 UART: [ldev] CDI.KEYID = 6
1,514,152 UART: [ldev] SUBJECT.KEYID = 5
1,514,578 UART: [ldev] AUTHORITY.KEYID = 7
1,515,041 UART: [ldev] FE.KEYID = 1
1,520,227 UART: [ldev] Erasing FE.KEYID = 1
1,545,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,150 UART: [ldev] --
1,584,577 UART: [fwproc] Waiting for Commands...
1,585,266 UART: [fwproc] Received command 0x46574c44
1,586,057 UART: [fwproc] Received Image of size 115304 bytes
2,895,510 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,736 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,088 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,529 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,419 ready_for_fw is high
1,362,419 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,455 >>> mbox cmd response: success
3,001,209 UART:
3,001,225 UART: Running Caliptra FMC ...
3,001,633 UART:
3,001,687 UART: [state] CFI Enabled
3,012,338 UART: [fht] FMC Alias Private Key: 7
3,120,359 UART: [art] Extend RT PCRs Done
3,120,787 UART: [art] Lock RT PCRs Done
3,122,165 UART: [art] Populate DV Done
3,130,244 UART: [fht] FMC Alias Private Key: 7
3,131,214 UART: [art] Derive CDI
3,131,494 UART: [art] Store in in slot 0x4
3,217,385 UART: [art] Derive Key Pair
3,217,745 UART: [art] Store priv key in slot 0x5
3,231,001 UART: [art] Derive Key Pair - Done
3,245,502 UART: [art] Signing Cert with AUTHO
3,245,982 UART: RITY.KEYID = 7
3,260,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,501 UART: [art] PUB.X = A02072E4B1780F03E5E3BF588A2702D6AAEE6F902DA6AFDFF4A2C62BC723598BACA362DA88497C17768D621DD5267FF9
3,268,276 UART: [art] PUB.Y = 1BBCD33CA14518ECF97E95F3E9DA95565A6EF59270879D9BD47F0F30F74A0DFD091368E4B64DCB8519DF33DC83A47763
3,275,229 UART: [art] SIG.R = 97D7AA45F14DB59D9F76F05B7504FF0E563F727B2F2BBB858FB212F9BA280C3531937EFD735107DC984AF219D6CEC895
3,281,997 UART: [art] SIG.S = CFC0A431A9CC4A2CAAB29EBB162DA93E0D3396F82B232F7BD611CC684011C570F78CCC39FBCB63014E26259AF96A4893
3,306,468 UART: Caliptra RT
3,306,721 UART: [state] CFI Enabled
3,414,957 UART: [rt] RT listening for mailbox commands...
3,415,620 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,697 UART: [rt]cmd =0x46504c54, len=4
3,446,954 >>> mbox cmd response data (8 bytes)
3,447,071 UART: [rt] FIPS self test
3,447,399 UART: [kat] ++
3,447,551 UART: [kat] sha1
3,451,733 UART: [kat] SHA2-256
3,453,755 UART: [kat] SHA2-384
3,456,658 UART: [kat] SHA2-512-ACC
3,458,585 UART: [kat] ECC-384
3,459,950 UART: Fatal Error: 0x90040004
3,461,500 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,505 >>> mbox cmd response: failed
3,461,505 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,649 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,113 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,390 UART: [kat] SHA2-256
882,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,436 UART: [kat] ++
886,588 UART: [kat] sha1
890,768 UART: [kat] SHA2-256
892,706 UART: [kat] SHA2-384
895,397 UART: [kat] SHA2-512-ACC
897,298 UART: [kat] ECC-384
902,953 UART: [kat] HMAC-384Kdf
907,409 UART: [kat] LMS
1,475,605 UART: [kat] --
1,476,324 UART: [cold-reset] ++
1,476,804 UART: [fht] Storing FHT @ 0x50003400
1,479,617 UART: [idev] ++
1,479,785 UART: [idev] CDI.KEYID = 6
1,480,145 UART: [idev] SUBJECT.KEYID = 7
1,480,569 UART: [idev] UDS.KEYID = 0
1,480,914 ready_for_fw is high
1,480,914 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,339 UART: [idev] Erasing UDS.KEYID = 0
1,505,067 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,679 UART: [idev] --
1,514,818 UART: [ldev] ++
1,514,986 UART: [ldev] CDI.KEYID = 6
1,515,349 UART: [ldev] SUBJECT.KEYID = 5
1,515,775 UART: [ldev] AUTHORITY.KEYID = 7
1,516,238 UART: [ldev] FE.KEYID = 1
1,521,180 UART: [ldev] Erasing FE.KEYID = 1
1,546,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,281 UART: [ldev] --
1,586,566 UART: [fwproc] Waiting for Commands...
1,587,293 UART: [fwproc] Received command 0x46574c44
1,588,084 UART: [fwproc] Received Image of size 115304 bytes
2,897,555 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,873 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,438 >>> mbox cmd response: success
3,092,576 UART: [afmc] ++
3,092,744 UART: [afmc] CDI.KEYID = 6
3,093,106 UART: [afmc] SUBJECT.KEYID = 7
3,093,531 UART: [afmc] AUTHORITY.KEYID = 5
3,128,380 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,862 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,642 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,370 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,255 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,945 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,768 UART: [afmc] --
3,171,898 UART: [cold-reset] --
3,172,860 UART: [state] Locking Datavault
3,174,055 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,659 UART: [state] Locking ICCM
3,175,105 UART: [exit] Launching FMC @ 0x40000130
3,180,434 UART:
3,180,450 UART: Running Caliptra FMC ...
3,180,858 UART:
3,181,001 UART: [state] CFI Enabled
3,191,688 UART: [fht] FMC Alias Private Key: 7
3,300,575 UART: [art] Extend RT PCRs Done
3,301,003 UART: [art] Lock RT PCRs Done
3,302,285 UART: [art] Populate DV Done
3,310,770 UART: [fht] FMC Alias Private Key: 7
3,311,744 UART: [art] Derive CDI
3,312,024 UART: [art] Store in in slot 0x4
3,397,853 UART: [art] Derive Key Pair
3,398,213 UART: [art] Store priv key in slot 0x5
3,411,671 UART: [art] Derive Key Pair - Done
3,426,591 UART: [art] Signing Cert with AUTHO
3,427,071 UART: RITY.KEYID = 7
3,441,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,574 UART: [art] PUB.X = A6C4FAF2793883C0502251C2710801C25A9A4E462EA53504C2B8408738616FBA395571D75A1E63C22008C116EA1A90D5
3,449,324 UART: [art] PUB.Y = AB4660F49A9A3B152EDA1C8CA54EE57FBA6AC133168EF21CBA7B630D56376DF4ADAF4D459C9739C22C096479881BE270
3,456,282 UART: [art] SIG.R = 0575F530EBFF65A9CF33FE09725D0401BED5E56F672ADFAC732AD4F39481E07B0F93C4D450042E2F5D9ED92E694F0492
3,463,041 UART: [art] SIG.S = 1AC7E5DF58034A413C149B4C32F436C0F315863F6227B8A379D193818ABEDF9F6701F82EA9ADF0084DD5B10B8097BF00
3,487,162 UART: Caliptra RT
3,487,507 UART: [state] CFI Enabled
3,595,899 UART: [rt] RT listening for mailbox commands...
3,596,562 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,377 UART: [rt]cmd =0x46504c54, len=4
3,627,470 >>> mbox cmd response data (8 bytes)
3,627,769 UART: [rt] FIPS self test
3,628,097 UART: [kat] ++
3,628,249 UART: [kat] sha1
3,632,615 UART: [kat] SHA2-256
3,634,637 UART: [kat] SHA2-384
3,637,506 UART: [kat] SHA2-512-ACC
3,639,433 UART: [kat] ECC-384
3,640,900 UART: Fatal Error: 0x90040004
3,642,450 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,642,455 >>> mbox cmd response: failed
3,642,455 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,642,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,772 UART: [kat] SHA2-256
881,703 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,818 UART: [kat] ++
885,970 UART: [kat] sha1
890,186 UART: [kat] SHA2-256
892,124 UART: [kat] SHA2-384
894,925 UART: [kat] SHA2-512-ACC
896,826 UART: [kat] ECC-384
902,427 UART: [kat] HMAC-384Kdf
907,043 UART: [kat] LMS
1,475,239 UART: [kat] --
1,475,714 UART: [cold-reset] ++
1,476,246 UART: [fht] Storing FHT @ 0x50003400
1,479,045 UART: [idev] ++
1,479,213 UART: [idev] CDI.KEYID = 6
1,479,573 UART: [idev] SUBJECT.KEYID = 7
1,479,997 UART: [idev] UDS.KEYID = 0
1,480,342 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,009 UART: [idev] Erasing UDS.KEYID = 0
1,504,465 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,913 UART: [idev] --
1,514,154 UART: [ldev] ++
1,514,322 UART: [ldev] CDI.KEYID = 6
1,514,685 UART: [ldev] SUBJECT.KEYID = 5
1,515,111 UART: [ldev] AUTHORITY.KEYID = 7
1,515,574 UART: [ldev] FE.KEYID = 1
1,520,682 UART: [ldev] Erasing FE.KEYID = 1
1,545,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,995 UART: [ldev] --
1,585,362 UART: [fwproc] Waiting for Commands...
1,586,171 UART: [fwproc] Received command 0x46574c44
1,586,962 UART: [fwproc] Received Image of size 115304 bytes
2,896,325 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,001 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,554 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,244 ready_for_fw is high
1,363,244 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,943,746 >>> mbox cmd response: success
3,005,680 UART:
3,005,696 UART: Running Caliptra FMC ...
3,006,104 UART:
3,006,247 UART: [state] CFI Enabled
3,016,984 UART: [fht] FMC Alias Private Key: 7
3,125,339 UART: [art] Extend RT PCRs Done
3,125,767 UART: [art] Lock RT PCRs Done
3,127,525 UART: [art] Populate DV Done
3,135,526 UART: [fht] FMC Alias Private Key: 7
3,136,514 UART: [art] Derive CDI
3,136,794 UART: [art] Store in in slot 0x4
3,222,597 UART: [art] Derive Key Pair
3,222,957 UART: [art] Store priv key in slot 0x5
3,236,665 UART: [art] Derive Key Pair - Done
3,251,278 UART: [art] Signing Cert with AUTHO
3,251,758 UART: RITY.KEYID = 7
3,267,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,267,827 UART: [art] PUB.X = CD2EBA79DDBFC93F5AE054277D97DB06C29D56B79EFF40908FFBA4FD768A4CAA14F790F6F7FC73B1592C594D46F7D4EB
3,274,620 UART: [art] PUB.Y = FC80A875B1A57422EEA2408E5F68DEB01B1EFCF9DD7B9CD434EA6BBE65E2FD64D9106017EDB3F3182551109361BBF23A
3,281,588 UART: [art] SIG.R = 6903B64DE55A8F6C50B13AD14221D276255CBD51DA56BA98C8D0D40B46F67222FC1B4A63CCEC6B3C5E0F09D2D49A5B9C
3,288,362 UART: [art] SIG.S = 55DE3290CB160449E04F0E0D1B0FB0B975329AD702BF818E8EEA606C8E2B43D3DFD60222A2C632D39DFEDC6B88EA48E4
3,312,181 UART: Caliptra RT
3,312,526 UART: [state] CFI Enabled
3,421,382 UART: [rt] RT listening for mailbox commands...
3,422,045 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,451,992 UART: [rt]cmd =0x46504c54, len=4
3,452,953 >>> mbox cmd response data (8 bytes)
3,453,078 UART: [rt] FIPS self test
3,453,406 UART: [kat] ++
3,453,558 UART: [kat] sha1
3,457,636 UART: [kat] SHA2-256
3,459,658 UART: [kat] SHA2-384
3,462,471 UART: [kat] SHA2-512-ACC
3,464,398 UART: [kat] ECC-384
3,466,051 UART: Fatal Error: 0x90040004
3,467,601 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,467,606 >>> mbox cmd response: failed
3,467,606 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,467,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,274 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,078 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
893,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,599 UART: [kat] ++
897,751 UART: [kat] sha1
902,127 UART: [kat] SHA2-256
904,067 UART: [kat] SHA2-384
906,840 UART: [kat] SHA2-512-ACC
908,741 UART: [kat] ECC-384
918,460 UART: [kat] HMAC-384Kdf
923,154 UART: [kat] LMS
1,171,482 UART: [kat] --
1,172,321 UART: [cold-reset] ++
1,172,769 UART: [fht] FHT @ 0x50003400
1,175,478 UART: [idev] ++
1,175,646 UART: [idev] CDI.KEYID = 6
1,176,006 UART: [idev] SUBJECT.KEYID = 7
1,176,430 UART: [idev] UDS.KEYID = 0
1,176,775 ready_for_fw is high
1,176,775 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,918 UART: [idev] Erasing UDS.KEYID = 0
1,202,129 UART: [idev] Sha1 KeyId Algorithm
1,210,743 UART: [idev] --
1,211,679 UART: [ldev] ++
1,211,847 UART: [ldev] CDI.KEYID = 6
1,212,210 UART: [ldev] SUBJECT.KEYID = 5
1,212,636 UART: [ldev] AUTHORITY.KEYID = 7
1,213,099 UART: [ldev] FE.KEYID = 1
1,218,221 UART: [ldev] Erasing FE.KEYID = 1
1,244,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,825 UART: [ldev] --
1,283,210 UART: [fwproc] Wait for Commands...
1,283,866 UART: [fwproc] Recv command 0x46574c44
1,284,594 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,043 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,422 >>> mbox cmd response: success
2,789,628 UART: [afmc] ++
2,789,796 UART: [afmc] CDI.KEYID = 6
2,790,158 UART: [afmc] SUBJECT.KEYID = 7
2,790,583 UART: [afmc] AUTHORITY.KEYID = 5
2,826,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,258 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,977 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,667 UART: [afmc] --
2,869,681 UART: [cold-reset] --
2,870,319 UART: [state] Locking Datavault
2,871,614 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,218 UART: [state] Locking ICCM
2,872,752 UART: [exit] Launching FMC @ 0x40000130
2,878,081 UART:
2,878,097 UART: Running Caliptra FMC ...
2,878,505 UART:
2,878,559 UART: [state] CFI Enabled
2,889,270 UART: [fht] FMC Alias Private Key: 7
2,997,045 UART: [art] Extend RT PCRs Done
2,997,473 UART: [art] Lock RT PCRs Done
2,999,079 UART: [art] Populate DV Done
3,007,292 UART: [fht] FMC Alias Private Key: 7
3,008,414 UART: [art] Derive CDI
3,008,694 UART: [art] Store in in slot 0x4
3,094,143 UART: [art] Derive Key Pair
3,094,503 UART: [art] Store priv key in slot 0x5
3,108,061 UART: [art] Derive Key Pair - Done
3,122,770 UART: [art] Signing Cert with AUTHO
3,123,250 UART: RITY.KEYID = 7
3,138,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,545 UART: [art] PUB.X = 7AB945B0DAC488516D931D49530B06AA2D9AA888BDAD94A09252D0DB1569ABEE2E58CF6CA0755E7FC8E61397F53119C7
3,146,321 UART: [art] PUB.Y = 770E687491862F1FAD5133927D977F1723231F246FAECD6C96EC2D4B2FA6E7441F79469F63AAFDE7B7AB5C3A478B17A4
3,153,276 UART: [art] SIG.R = D28E84D3E7EEFC68B95FB73B0E8517D65A5C23102827A13902AA00C622C10FEDB46A10D1DB845243E5AAB9EC29B134C7
3,160,027 UART: [art] SIG.S = 6218966D5D06D6A2538C8856EA0902CEE97D2D950EE9463B771DF64ACF47ECE090BD6D699050712DECB57D5490625B81
3,183,648 UART: Caliptra RT
3,183,901 UART: [state] CFI Enabled
3,291,668 UART: [rt] RT listening for mailbox commands...
3,292,331 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,064 UART: [rt]cmd =0x46504c54, len=4
3,323,207 >>> mbox cmd response data (8 bytes)
3,323,492 UART: [rt] FIPS self test
3,323,820 UART: [kat] ++
3,323,972 UART: [kat] sha1
3,328,292 UART: [kat] SHA2-256
3,330,314 UART: [kat] SHA2-384
3,333,189 UART: [kat] SHA2-512-ACC
3,335,116 UART: [kat] ECC-384
3,336,369 UART: Fatal Error: 0x90040004
3,337,919 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,337,924 >>> mbox cmd response: failed
3,337,924 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,337,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
893,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,385 UART: [kat] ++
897,537 UART: [kat] sha1
901,771 UART: [kat] SHA2-256
903,711 UART: [kat] SHA2-384
906,576 UART: [kat] SHA2-512-ACC
908,477 UART: [kat] ECC-384
918,188 UART: [kat] HMAC-384Kdf
922,764 UART: [kat] LMS
1,171,092 UART: [kat] --
1,172,097 UART: [cold-reset] ++
1,172,497 UART: [fht] FHT @ 0x50003400
1,175,274 UART: [idev] ++
1,175,442 UART: [idev] CDI.KEYID = 6
1,175,802 UART: [idev] SUBJECT.KEYID = 7
1,176,226 UART: [idev] UDS.KEYID = 0
1,176,571 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,486 UART: [idev] Erasing UDS.KEYID = 0
1,201,185 UART: [idev] Sha1 KeyId Algorithm
1,209,603 UART: [idev] --
1,210,787 UART: [ldev] ++
1,210,955 UART: [ldev] CDI.KEYID = 6
1,211,318 UART: [ldev] SUBJECT.KEYID = 5
1,211,744 UART: [ldev] AUTHORITY.KEYID = 7
1,212,207 UART: [ldev] FE.KEYID = 1
1,217,397 UART: [ldev] Erasing FE.KEYID = 1
1,243,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,469 UART: [ldev] --
1,282,748 UART: [fwproc] Wait for Commands...
1,283,444 UART: [fwproc] Recv command 0x46574c44
1,284,172 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,209 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,530 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,553 ready_for_fw is high
1,060,553 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,703 >>> mbox cmd response: success
2,700,805 UART:
2,700,821 UART: Running Caliptra FMC ...
2,701,229 UART:
2,701,283 UART: [state] CFI Enabled
2,711,608 UART: [fht] FMC Alias Private Key: 7
2,819,901 UART: [art] Extend RT PCRs Done
2,820,329 UART: [art] Lock RT PCRs Done
2,822,147 UART: [art] Populate DV Done
2,830,582 UART: [fht] FMC Alias Private Key: 7
2,831,592 UART: [art] Derive CDI
2,831,872 UART: [art] Store in in slot 0x4
2,917,433 UART: [art] Derive Key Pair
2,917,793 UART: [art] Store priv key in slot 0x5
2,930,883 UART: [art] Derive Key Pair - Done
2,945,944 UART: [art] Signing Cert with AUTHO
2,946,424 UART: RITY.KEYID = 7
2,961,688 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,453 UART: [art] PUB.X = 137D37C390AE0C15B35658800765DB7A259B1369B49C2341DEC6C81B3DB75383197B847499A50A44E88C0B42ACAE1FF6
2,969,211 UART: [art] PUB.Y = 012515D80C435F31954E2F52B3FE96A8D2AA025E5F15A8CEB2D37467461E69949484771F511AA7F6A35A223D721D2E72
2,976,148 UART: [art] SIG.R = 23C4E0D8477408B81EEDB1F460A65CD9B863614D81A0A29E28ADE28641F995E5432201FB4910A7CF4048710DB6954E8D
2,982,909 UART: [art] SIG.S = E886153E11C350C32F2F4DEEE437BE1A3A43F878DA17011ADDAEAEA51414FEFFACF1B5154DC3CE1F59CE7AFE916394ED
3,006,747 UART: Caliptra RT
3,007,000 UART: [state] CFI Enabled
3,114,863 UART: [rt] RT listening for mailbox commands...
3,115,526 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,181 UART: [rt]cmd =0x46504c54, len=4
3,146,418 >>> mbox cmd response data (8 bytes)
3,146,569 UART: [rt] FIPS self test
3,146,897 UART: [kat] ++
3,147,049 UART: [kat] sha1
3,151,095 UART: [kat] SHA2-256
3,153,117 UART: [kat] SHA2-384
3,155,926 UART: [kat] SHA2-512-ACC
3,157,853 UART: [kat] ECC-384
3,159,646 UART: Fatal Error: 0x90040004
3,161,196 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,161,201 >>> mbox cmd response: failed
3,161,201 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,161,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,443 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,527 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
893,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,514 UART: [kat] ++
897,666 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,653 UART: [kat] SHA2-512-ACC
908,554 UART: [kat] ECC-384
917,983 UART: [kat] HMAC-384Kdf
922,585 UART: [kat] LMS
1,170,913 UART: [kat] --
1,171,818 UART: [cold-reset] ++
1,172,326 UART: [fht] FHT @ 0x50003400
1,174,833 UART: [idev] ++
1,175,001 UART: [idev] CDI.KEYID = 6
1,175,361 UART: [idev] SUBJECT.KEYID = 7
1,175,785 UART: [idev] UDS.KEYID = 0
1,176,130 ready_for_fw is high
1,176,130 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,621 UART: [idev] Erasing UDS.KEYID = 0
1,200,414 UART: [idev] Sha1 KeyId Algorithm
1,208,742 UART: [idev] --
1,210,014 UART: [ldev] ++
1,210,182 UART: [ldev] CDI.KEYID = 6
1,210,545 UART: [ldev] SUBJECT.KEYID = 5
1,210,971 UART: [ldev] AUTHORITY.KEYID = 7
1,211,434 UART: [ldev] FE.KEYID = 1
1,216,800 UART: [ldev] Erasing FE.KEYID = 1
1,242,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,078 UART: [ldev] --
1,282,593 UART: [fwproc] Wait for Commands...
1,283,271 UART: [fwproc] Recv command 0x46574c44
1,283,999 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,820 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,137 >>> mbox cmd response: success
2,789,149 UART: [afmc] ++
2,789,317 UART: [afmc] CDI.KEYID = 6
2,789,679 UART: [afmc] SUBJECT.KEYID = 7
2,790,104 UART: [afmc] AUTHORITY.KEYID = 5
2,826,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,871 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,590 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,234 UART: [afmc] --
2,869,144 UART: [cold-reset] --
2,870,144 UART: [state] Locking Datavault
2,871,205 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,809 UART: [state] Locking ICCM
2,872,365 UART: [exit] Launching FMC @ 0x40000130
2,877,694 UART:
2,877,710 UART: Running Caliptra FMC ...
2,878,118 UART:
2,878,261 UART: [state] CFI Enabled
2,888,840 UART: [fht] FMC Alias Private Key: 7
2,997,251 UART: [art] Extend RT PCRs Done
2,997,679 UART: [art] Lock RT PCRs Done
2,999,603 UART: [art] Populate DV Done
3,007,912 UART: [fht] FMC Alias Private Key: 7
3,008,914 UART: [art] Derive CDI
3,009,194 UART: [art] Store in in slot 0x4
3,094,911 UART: [art] Derive Key Pair
3,095,271 UART: [art] Store priv key in slot 0x5
3,108,641 UART: [art] Derive Key Pair - Done
3,123,181 UART: [art] Signing Cert with AUTHO
3,123,661 UART: RITY.KEYID = 7
3,139,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,772 UART: [art] PUB.X = 6C8E0A1E7794A96DD9F08A6CD7448427E671FBBFEDE1FE07C5DF632D13D549F19DB5350DC0569FCE42575C1CE96F890E
3,146,546 UART: [art] PUB.Y = AAE7763FCED24FC237F0FA2E98683B56E66671238B17EFF49ADC0504A635A91922885135D633139154637C0D97CA9E81
3,153,485 UART: [art] SIG.R = 06BB83910E9C77503F285ED67CB5BD734C637C75E8DAE575C788AB1892F84E3766A899ACAF014F29BB7A1A19DB000D38
3,160,229 UART: [art] SIG.S = 9A937AAC03E46E873F9CF33ABA9DCB3B3232E0321FEE32C41970CDE93C91B61EBB0D3C76EF98980F231425C0AD0E4F54
3,183,478 UART: Caliptra RT
3,183,823 UART: [state] CFI Enabled
3,291,836 UART: [rt] RT listening for mailbox commands...
3,292,499 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,322 UART: [rt]cmd =0x46504c54, len=4
3,323,575 >>> mbox cmd response data (8 bytes)
3,323,938 UART: [rt] FIPS self test
3,324,266 UART: [kat] ++
3,324,418 UART: [kat] sha1
3,328,664 UART: [kat] SHA2-256
3,330,686 UART: [kat] SHA2-384
3,333,511 UART: [kat] SHA2-512-ACC
3,335,438 UART: [kat] ECC-384
3,336,981 UART: Fatal Error: 0x90040004
3,338,531 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,338,536 >>> mbox cmd response: failed
3,338,536 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,338,541 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
893,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,476 UART: [kat] ++
897,628 UART: [kat] sha1
901,898 UART: [kat] SHA2-256
903,838 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
917,601 UART: [kat] HMAC-384Kdf
922,195 UART: [kat] LMS
1,170,523 UART: [kat] --
1,171,374 UART: [cold-reset] ++
1,171,808 UART: [fht] FHT @ 0x50003400
1,174,403 UART: [idev] ++
1,174,571 UART: [idev] CDI.KEYID = 6
1,174,931 UART: [idev] SUBJECT.KEYID = 7
1,175,355 UART: [idev] UDS.KEYID = 0
1,175,700 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,429 UART: [idev] Erasing UDS.KEYID = 0
1,200,512 UART: [idev] Sha1 KeyId Algorithm
1,209,114 UART: [idev] --
1,210,230 UART: [ldev] ++
1,210,398 UART: [ldev] CDI.KEYID = 6
1,210,761 UART: [ldev] SUBJECT.KEYID = 5
1,211,187 UART: [ldev] AUTHORITY.KEYID = 7
1,211,650 UART: [ldev] FE.KEYID = 1
1,216,698 UART: [ldev] Erasing FE.KEYID = 1
1,243,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,364 UART: [ldev] --
1,282,693 UART: [fwproc] Wait for Commands...
1,283,303 UART: [fwproc] Recv command 0x46574c44
1,284,031 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,638 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,909 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,102 ready_for_fw is high
1,061,102 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,152 >>> mbox cmd response: success
2,701,836 UART:
2,701,852 UART: Running Caliptra FMC ...
2,702,260 UART:
2,702,403 UART: [state] CFI Enabled
2,713,142 UART: [fht] FMC Alias Private Key: 7
2,820,967 UART: [art] Extend RT PCRs Done
2,821,395 UART: [art] Lock RT PCRs Done
2,822,953 UART: [art] Populate DV Done
2,830,862 UART: [fht] FMC Alias Private Key: 7
2,831,894 UART: [art] Derive CDI
2,832,174 UART: [art] Store in in slot 0x4
2,917,845 UART: [art] Derive Key Pair
2,918,205 UART: [art] Store priv key in slot 0x5
2,931,189 UART: [art] Derive Key Pair - Done
2,945,973 UART: [art] Signing Cert with AUTHO
2,946,453 UART: RITY.KEYID = 7
2,962,069 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,834 UART: [art] PUB.X = CB4C70378666152E9302BF3E8E3A63297DBD621D66257CACC655162D31D2D998ECB8555CCE9E17941FEA5A8874D12965
2,969,603 UART: [art] PUB.Y = 32958F00973856ABDBC162ABF234663D7D2122511F2E8B2302CC1DBC4873C021E4CFDA43AFFE9482FC376A8B51DC1606
2,976,533 UART: [art] SIG.R = F9C37C2608A4641E79296D485896E3C4EE02825A194579E4F3D44D407E43141158C9F19A6B08F71A67E0F0AC74750DFD
2,983,287 UART: [art] SIG.S = 7F5DA22719442F170B2A0B1D55FC492F041345A4C920DC63F956A559088C8CB83E6A2E36B87C620C3389EEC09785519C
3,006,517 UART: Caliptra RT
3,006,862 UART: [state] CFI Enabled
3,114,717 UART: [rt] RT listening for mailbox commands...
3,115,380 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,339 UART: [rt]cmd =0x46504c54, len=4
3,146,406 >>> mbox cmd response data (8 bytes)
3,146,713 UART: [rt] FIPS self test
3,147,041 UART: [kat] ++
3,147,193 UART: [kat] sha1
3,151,479 UART: [kat] SHA2-256
3,153,501 UART: [kat] SHA2-384
3,156,192 UART: [kat] SHA2-512-ACC
3,158,119 UART: [kat] ECC-384
3,159,430 UART: Fatal Error: 0x90040004
3,160,980 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,160,985 >>> mbox cmd response: failed
3,160,985 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,160,990 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,036 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,641,358 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,326 UART: [kat] LMS
1,168,638 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,173,991 ready_for_fw is high
1,173,991 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,757 UART: [idev] Erasing UDS.KEYID = 0
1,198,633 UART: [idev] Sha1 KeyId Algorithm
1,207,545 UART: [idev] --
1,208,708 UART: [ldev] ++
1,208,876 UART: [ldev] CDI.KEYID = 6
1,209,240 UART: [ldev] SUBJECT.KEYID = 5
1,209,667 UART: [ldev] AUTHORITY.KEYID = 7
1,210,130 UART: [ldev] FE.KEYID = 1
1,215,332 UART: [ldev] Erasing FE.KEYID = 1
1,241,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,586 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,701 UART: [fwproc] Recv command 0x46574c44
1,282,434 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,378 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,666 >>> mbox cmd response: success
2,786,755 UART: [afmc] ++
2,786,923 UART: [afmc] CDI.KEYID = 6
2,787,286 UART: [afmc] SUBJECT.KEYID = 7
2,787,712 UART: [afmc] AUTHORITY.KEYID = 5
2,822,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,270 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,882 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,601 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,228 UART: [afmc] --
2,865,312 UART: [cold-reset] --
2,866,182 UART: [state] Locking Datavault
2,867,491 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,095 UART: [state] Locking ICCM
2,868,611 UART: [exit] Launching FMC @ 0x40000130
2,873,940 UART:
2,873,956 UART: Running Caliptra FMC ...
2,874,364 UART:
2,874,418 UART: [state] CFI Enabled
2,884,843 UART: [fht] FMC Alias Private Key: 7
2,992,850 UART: [art] Extend RT PCRs Done
2,993,278 UART: [art] Lock RT PCRs Done
2,994,946 UART: [art] Populate DV Done
3,002,965 UART: [fht] FMC Alias Private Key: 7
3,004,003 UART: [art] Derive CDI
3,004,283 UART: [art] Store in in slot 0x4
3,089,724 UART: [art] Derive Key Pair
3,090,084 UART: [art] Store priv key in slot 0x5
3,103,228 UART: [art] Derive Key Pair - Done
3,118,070 UART: [art] Signing Cert with AUTHO
3,118,550 UART: RITY.KEYID = 7
3,133,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,485 UART: [art] PUB.X = 230E3DA0E752ED8A16CF1596708C7E0456C962CE123BA691C2ED2A8AB5A8D3BDC432B3DE6D07AA6BD195A07BC731843F
3,141,262 UART: [art] PUB.Y = CF6B4992ADEDC252DD36F1B142C408AAB338A4C47DA36C65998343E9C2FCB2B6316D6C3D3E596E6B9880610FDD40C012
3,148,218 UART: [art] SIG.R = 488DA5B771EE26785547DF9A5048E62B462E1362C6AF3ECEEDBDD9B7C5282F90707C941D026F5AA8B0B61727B38B0F9F
3,154,992 UART: [art] SIG.S = C81642A7A42D1218DB02E3B6B67108215E4401C1B232B3CF7E2822611DF515C6D441AA3FBB494CDBEF67E3894A09E18C
3,178,523 UART: Caliptra RT
3,178,776 UART: [state] CFI Enabled
3,287,285 UART: [rt] RT listening for mailbox commands...
3,287,948 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,445 UART: [rt]cmd =0x46504c54, len=4
3,318,360 >>> mbox cmd response data (8 bytes)
3,318,515 UART: [rt] FIPS self test
3,318,843 UART: [kat] ++
3,318,995 UART: [kat] sha1
3,323,245 UART: [kat] SHA2-256
3,325,267 UART: [kat] SHA2-384
3,328,224 UART: [kat] SHA2-512-ACC
3,330,151 UART: [kat] ECC-384
3,331,526 UART: Fatal Error: 0x90040004
3,333,076 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,081 >>> mbox cmd response: failed
3,333,081 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,342 UART: [kat] SHA2-256
890,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,021 UART: [kat] ++
895,173 UART: [kat] sha1
899,289 UART: [kat] SHA2-256
901,229 UART: [kat] SHA2-384
903,958 UART: [kat] SHA2-512-ACC
905,859 UART: [kat] ECC-384
915,480 UART: [kat] HMAC-384Kdf
920,024 UART: [kat] LMS
1,168,336 UART: [kat] --
1,168,981 UART: [cold-reset] ++
1,169,335 UART: [fht] FHT @ 0x50003400
1,172,003 UART: [idev] ++
1,172,171 UART: [idev] CDI.KEYID = 6
1,172,532 UART: [idev] SUBJECT.KEYID = 7
1,172,957 UART: [idev] UDS.KEYID = 0
1,173,303 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,063 UART: [idev] Erasing UDS.KEYID = 0
1,197,973 UART: [idev] Sha1 KeyId Algorithm
1,206,845 UART: [idev] --
1,207,806 UART: [ldev] ++
1,207,974 UART: [ldev] CDI.KEYID = 6
1,208,338 UART: [ldev] SUBJECT.KEYID = 5
1,208,765 UART: [ldev] AUTHORITY.KEYID = 7
1,209,228 UART: [ldev] FE.KEYID = 1
1,214,272 UART: [ldev] Erasing FE.KEYID = 1
1,240,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,358 UART: [ldev] --
1,279,652 UART: [fwproc] Wait for Commands...
1,280,467 UART: [fwproc] Recv command 0x46574c44
1,281,200 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,676 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,864 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,732 ready_for_fw is high
1,055,732 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,500 >>> mbox cmd response: success
2,697,412 UART:
2,697,428 UART: Running Caliptra FMC ...
2,697,836 UART:
2,697,890 UART: [state] CFI Enabled
2,708,195 UART: [fht] FMC Alias Private Key: 7
2,816,892 UART: [art] Extend RT PCRs Done
2,817,320 UART: [art] Lock RT PCRs Done
2,818,640 UART: [art] Populate DV Done
2,826,921 UART: [fht] FMC Alias Private Key: 7
2,827,993 UART: [art] Derive CDI
2,828,273 UART: [art] Store in in slot 0x4
2,913,848 UART: [art] Derive Key Pair
2,914,208 UART: [art] Store priv key in slot 0x5
2,927,630 UART: [art] Derive Key Pair - Done
2,942,488 UART: [art] Signing Cert with AUTHO
2,942,968 UART: RITY.KEYID = 7
2,958,422 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,187 UART: [art] PUB.X = 078A9C027603B8D7AE23C5960B3D009DA013B9EE204A4B0C0227886D87299369C4575B715C34A3425DD432308EF5BFB0
2,965,913 UART: [art] PUB.Y = 3DD622FF9B9100ECEC177900597251401A41023816E61906B69D4F4C6C5A9380C2469FC57C89FC34348AC55E99926EB7
2,972,807 UART: [art] SIG.R = 7857AF23DB146F389B5417BC678026E6FBAC4410E946575EDC0A826AB1041562A5C5827FE387AF066F10F0E408CDC111
2,979,567 UART: [art] SIG.S = 528005FE9C477E9A58CA08B1B5AC1C3AFA493A4936F15B845AD37415993AB34AD69C654412F9B4E6631754738445A9D4
3,003,566 UART: Caliptra RT
3,003,819 UART: [state] CFI Enabled
3,112,278 UART: [rt] RT listening for mailbox commands...
3,112,941 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,924 UART: [rt]cmd =0x46504c54, len=4
3,143,947 >>> mbox cmd response data (8 bytes)
3,144,114 UART: [rt] FIPS self test
3,144,442 UART: [kat] ++
3,144,594 UART: [kat] sha1
3,148,806 UART: [kat] SHA2-256
3,150,828 UART: [kat] SHA2-384
3,153,589 UART: [kat] SHA2-512-ACC
3,155,516 UART: [kat] ECC-384
3,157,151 UART: Fatal Error: 0x90040004
3,158,701 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,706 >>> mbox cmd response: failed
3,158,706 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,650 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,982 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,297 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,672 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,174,618 ready_for_fw is high
1,174,618 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,199,386 UART: [idev] Sha1 KeyId Algorithm
1,208,286 UART: [idev] --
1,209,295 UART: [ldev] ++
1,209,463 UART: [ldev] CDI.KEYID = 6
1,209,827 UART: [ldev] SUBJECT.KEYID = 5
1,210,254 UART: [ldev] AUTHORITY.KEYID = 7
1,210,717 UART: [ldev] FE.KEYID = 1
1,216,169 UART: [ldev] Erasing FE.KEYID = 1
1,242,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,819 UART: [ldev] --
1,282,215 UART: [fwproc] Wait for Commands...
1,282,970 UART: [fwproc] Recv command 0x46574c44
1,283,703 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,551 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,827 >>> mbox cmd response: success
2,787,078 UART: [afmc] ++
2,787,246 UART: [afmc] CDI.KEYID = 6
2,787,609 UART: [afmc] SUBJECT.KEYID = 7
2,788,035 UART: [afmc] AUTHORITY.KEYID = 5
2,823,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,472 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,389 UART: [afmc] --
2,867,461 UART: [cold-reset] --
2,868,303 UART: [state] Locking Datavault
2,869,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,040 UART: [state] Locking ICCM
2,870,542 UART: [exit] Launching FMC @ 0x40000130
2,875,871 UART:
2,875,887 UART: Running Caliptra FMC ...
2,876,295 UART:
2,876,438 UART: [state] CFI Enabled
2,886,807 UART: [fht] FMC Alias Private Key: 7
2,995,154 UART: [art] Extend RT PCRs Done
2,995,582 UART: [art] Lock RT PCRs Done
2,997,226 UART: [art] Populate DV Done
3,005,625 UART: [fht] FMC Alias Private Key: 7
3,006,613 UART: [art] Derive CDI
3,006,893 UART: [art] Store in in slot 0x4
3,092,732 UART: [art] Derive Key Pair
3,093,092 UART: [art] Store priv key in slot 0x5
3,106,386 UART: [art] Derive Key Pair - Done
3,121,234 UART: [art] Signing Cert with AUTHO
3,121,714 UART: RITY.KEYID = 7
3,137,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,003 UART: [art] PUB.X = 070E6B7F843CA0F0E6BF9620E302DAEFB24193ED4A7C1041F5EEE414A53226C2CC310A28D845C5733FDD9C1F9A85B817
3,144,773 UART: [art] PUB.Y = C75DC1CFA030E49CD1D87CAB4E44D8051A51816CDA9411A028BF9D7126B095912518C77A0C05D65A5C391AF3953335AC
3,151,720 UART: [art] SIG.R = 618C192B856E023FF8FEF7D562A516077F18407A4F1B42AC08B612A26B46C990FADB63D695229FD592521A1DCB60AAEC
3,158,489 UART: [art] SIG.S = 78746DDB02F22D43444CB1029ABF10C94A7338DC2775D215C28BBE74592E311A48B37A66932FEDFD7523800B8AC1B7A8
3,182,571 UART: Caliptra RT
3,182,916 UART: [state] CFI Enabled
3,291,107 UART: [rt] RT listening for mailbox commands...
3,291,770 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,521 UART: [rt]cmd =0x46504c54, len=4
3,322,686 >>> mbox cmd response data (8 bytes)
3,322,821 UART: [rt] FIPS self test
3,323,149 UART: [kat] ++
3,323,301 UART: [kat] sha1
3,327,737 UART: [kat] SHA2-256
3,329,759 UART: [kat] SHA2-384
3,332,834 UART: [kat] SHA2-512-ACC
3,334,761 UART: [kat] ECC-384
3,336,682 UART: Fatal Error: 0x90040004
3,338,232 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,338,237 >>> mbox cmd response: failed
3,338,237 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,338,242 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,170,022 UART: [fht] FHT @ 0x50003400
1,172,818 UART: [idev] ++
1,172,986 UART: [idev] CDI.KEYID = 6
1,173,347 UART: [idev] SUBJECT.KEYID = 7
1,173,772 UART: [idev] UDS.KEYID = 0
1,174,118 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,814 UART: [idev] Erasing UDS.KEYID = 0
1,199,446 UART: [idev] Sha1 KeyId Algorithm
1,208,378 UART: [idev] --
1,209,469 UART: [ldev] ++
1,209,637 UART: [ldev] CDI.KEYID = 6
1,210,001 UART: [ldev] SUBJECT.KEYID = 5
1,210,428 UART: [ldev] AUTHORITY.KEYID = 7
1,210,891 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,242,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,417 UART: [ldev] --
1,281,785 UART: [fwproc] Wait for Commands...
1,282,482 UART: [fwproc] Recv command 0x46574c44
1,283,215 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,184 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,493 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,857 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,941 ready_for_fw is high
1,055,941 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,173 >>> mbox cmd response: success
2,697,713 UART:
2,697,729 UART: Running Caliptra FMC ...
2,698,137 UART:
2,698,280 UART: [state] CFI Enabled
2,708,861 UART: [fht] FMC Alias Private Key: 7
2,816,142 UART: [art] Extend RT PCRs Done
2,816,570 UART: [art] Lock RT PCRs Done
2,818,204 UART: [art] Populate DV Done
2,826,421 UART: [fht] FMC Alias Private Key: 7
2,827,375 UART: [art] Derive CDI
2,827,655 UART: [art] Store in in slot 0x4
2,913,272 UART: [art] Derive Key Pair
2,913,632 UART: [art] Store priv key in slot 0x5
2,926,902 UART: [art] Derive Key Pair - Done
2,941,753 UART: [art] Signing Cert with AUTHO
2,942,233 UART: RITY.KEYID = 7
2,957,747 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,512 UART: [art] PUB.X = 7DA705A9B97395594309D4D719F57EE7DE111EF429A54930D605EFAF6C3547FF7DA4535F10B57B2B0870F5487A23B5FA
2,965,274 UART: [art] PUB.Y = 518154E6A37D2D42DF6B0308BB2AAD6585100879E7DC25D75EEA943B48E0B66E2A460EA250F77F8AC097E2DEC47CCD83
2,972,224 UART: [art] SIG.R = 05D04B2048DF9CB2C3605375249A60177D55E2B65163FAC02015AD2F4255122CAE57F2EB6E8FF5BB08214ECB03EF36E5
2,978,991 UART: [art] SIG.S = 0F4C44D5CAF1563711F84FF810CA1682A4403BE3B8560CA9D9535E2B2369492F15A2C3688F967F0EDFC61202D94EEE99
3,003,112 UART: Caliptra RT
3,003,457 UART: [state] CFI Enabled
3,111,754 UART: [rt] RT listening for mailbox commands...
3,112,417 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,300 UART: [rt]cmd =0x46504c54, len=4
3,143,585 >>> mbox cmd response data (8 bytes)
3,143,826 UART: [rt] FIPS self test
3,144,154 UART: [kat] ++
3,144,306 UART: [kat] sha1
3,148,300 UART: [kat] SHA2-256
3,150,322 UART: [kat] SHA2-384
3,153,161 UART: [kat] SHA2-512-ACC
3,155,088 UART: [kat] ECC-384
3,156,487 UART: Fatal Error: 0x90040004
3,158,037 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,042 >>> mbox cmd response: failed
3,158,042 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,599 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,081 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
5,980,791 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,125,017 >>> mbox cmd response: failed
6,125,593 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,268,974 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
4,874,600 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,437,439 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
5,977,017 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,121,090 >>> mbox cmd response: failed
6,121,666 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,265,001 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,850,380 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,426,150 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
6,296,446 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,440,853 >>> mbox cmd response: failed
6,441,400 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,584,742 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
18,465,976 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,903,907 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
6,295,389 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,439,596 >>> mbox cmd response: failed
6,440,157 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,583,504 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
18,467,017 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,906,731 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
5,163,969 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,308,645 >>> mbox cmd response: failed
5,309,202 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,453,441 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,421,536 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,259,061 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
5,187,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,332,679 >>> mbox cmd response: failed
5,333,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,476,859 >>> mbox cmd response: failed
Initializing fuses
1,155 writing to cptra_bootfsm_go
3,444,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,297,266 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
5,495,446 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,640,080 >>> mbox cmd response: failed
5,640,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,785,271 >>> mbox cmd response: failed
Initializing fuses
1,005 writing to cptra_bootfsm_go
17,858,087 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,566,159 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,527 writing to cptra_bootfsm_go
5,511,751 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,656,427 >>> mbox cmd response: failed
5,656,989 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,801,167 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
17,845,130 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,575,057 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
5,146,490 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,291,181 >>> mbox cmd response: failed
5,291,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,435,497 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,458,466 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,318,254 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
5,492,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,636,761 >>> mbox cmd response: failed
5,637,332 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,781,605 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
17,861,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,578,538 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,702 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,710 >>> mbox cmd response: failed
821,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,716 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,670 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,654 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,662 >>> mbox cmd response: failed
822,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,442 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,701 >>> mbox cmd response: failed
821,701 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,631 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,057 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,065 >>> mbox cmd response: failed
822,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,071 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,554 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,639 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,590 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,598 >>> mbox cmd response: failed
821,598 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,604 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,354 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,568 >>> mbox cmd response: failed
821,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,574 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,374 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,855 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,863 >>> mbox cmd response: failed
821,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,458 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,355 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,601 >>> mbox cmd response: failed
822,601 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,607 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,828 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,379 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,718 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,726 >>> mbox cmd response: failed
821,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,732 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,370 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,700 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,708 >>> mbox cmd response: failed
821,708 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,194 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,743 >>> mbox cmd response: failed
821,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
821,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,377 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,279 >>> mbox cmd response: failed
822,279 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,662 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,701 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,457 UART:
192,802 UART: Running Caliptra ROM ...
193,977 UART:
194,134 UART: [state] CFI Enabled
265,049 UART: [state] LifecycleState = Unprovisioned
267,057 UART: [state] DebugLocked = No
268,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,125 UART: [kat] SHA2-256
443,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,309 UART: [kat] ++
454,866 UART: [kat] sha1
467,547 UART: [kat] SHA2-256
470,246 UART: [kat] SHA2-384
475,183 UART: [kat] SHA2-512-ACC
477,566 UART: [kat] ECC-384
2,767,872 UART: [kat] HMAC-384Kdf
2,779,567 UART: [kat] LMS
3,969,860 UART: [kat] --
3,976,514 UART: [cold-reset] ++
3,977,638 UART: [fht] Storing FHT @ 0x50003400
3,989,491 UART: [idev] ++
3,990,059 UART: [idev] CDI.KEYID = 6
3,990,973 UART: [idev] SUBJECT.KEYID = 7
3,992,243 UART: [idev] UDS.KEYID = 0
3,993,192 ready_for_fw is high
3,993,395 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,138,049 UART: [idev] Erasing UDS.KEYID = 0
7,324,809 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,359 UART: [idev] --
7,350,548 UART: [ldev] ++
7,351,123 UART: [ldev] CDI.KEYID = 6
7,352,066 UART: [ldev] SUBJECT.KEYID = 5
7,353,290 UART: [ldev] AUTHORITY.KEYID = 7
7,354,530 UART: [ldev] FE.KEYID = 1
7,382,010 UART: [ldev] Erasing FE.KEYID = 1
10,718,163 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,330 UART: [ldev] --
13,097,591 UART: [fwproc] Waiting for Commands...
13,099,818 UART: [fwproc] Received command 0x46574c44
13,102,027 UART: [fwproc] Received Image of size 114996 bytes
17,166,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,240,261 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,160 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,629,542 >>> mbox cmd response: success
17,634,348 UART: [afmc] ++
17,634,940 UART: [afmc] CDI.KEYID = 6
17,635,962 UART: [afmc] SUBJECT.KEYID = 7
17,637,124 UART: [afmc] AUTHORITY.KEYID = 5
21,011,597 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,312,913 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,315,220 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,329,619 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,344,445 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,358,880 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,380,195 UART: [afmc] --
23,383,466 UART: [cold-reset] --
23,387,760 UART: [state] Locking Datavault
23,392,143 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,898 UART: [state] Locking ICCM
23,396,267 UART: [exit] Launching FMC @ 0x40000130
23,404,675 UART:
23,404,914 UART: Running Caliptra FMC ...
23,406,019 UART:
23,406,200 UART: [state] CFI Enabled
23,471,063 UART: [fht] FMC Alias Private Key: 7
25,809,691 UART: [art] Extend RT PCRs Done
25,810,910 UART: [art] Lock RT PCRs Done
25,812,447 UART: [art] Populate DV Done
25,817,865 UART: [fht] FMC Alias Private Key: 7
25,819,604 UART: [art] Derive CDI
25,820,428 UART: [art] Store in in slot 0x4
25,879,902 UART: [art] Derive Key Pair
25,880,904 UART: [art] Store priv key in slot 0x5
29,173,873 UART: [art] Derive Key Pair - Done
29,187,247 UART: [art] Signing Cert with AUTHO
29,188,587 UART: RITY.KEYID = 7
31,476,204 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,722 UART: [art] PUB.X = 7A233FCA06E450DF7ECF5248EE56E85CC7A830DF9F50DFD7861883AC4EC8BEC62E6792D6D04CD25B726CDF30A6D0FF08
31,484,979 UART: [art] PUB.Y = C41E5CDD545063CFEB6D0C485A2C88C6A9BB5F54014CAD2107E4BE20377C9367A1144F3FAD60959D392C2B8001DC9186
31,492,225 UART: [art] SIG.R = 1BDF993911B6E2A4B75A340D58D120F7962139C2CDA6F0E1DD907D95D51CCBF9EC0C3D5F5F16FC9CC7CE4788FB2C7FE5
31,499,678 UART: [art] SIG.S = 2ADD2AE22EDD48624CD41E5ED682744636700E8E066A781AFA5DBC8D20AA4B18BE792D58FAE29C694545B4110BA847C2
32,805,031 UART: Caliptra RT
32,805,751 UART: [state] CFI Enabled
32,966,498 UART: [rt] RT listening for mailbox commands...
32,968,359 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,997,984 UART: [rt]cmd =0x46504c54, len=4
32,999,352 >>> mbox cmd response data (8 bytes)
33,000,638 UART: [rt] FIPS self test
33,001,589 UART: [kat] ++
33,002,042 UART: [kat] sha1
33,006,644 UART: [kat] SHA2-256
33,008,585 UART: [kat] SHA2-384
33,011,710 UART: [kat] SHA2-512-ACC
33,014,003 UART: [kat] ECC-384
36,276,956 UART: Fatal Error: 0x90040005
36,312,362 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,456,889 >>> mbox cmd response: failed
36,457,532 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,602,133 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
189,994 UART:
190,290 UART: Running Caliptra ROM ...
191,317 UART:
191,458 UART: [state] CFI Enabled
266,591 UART: [state] LifecycleState = Unprovisioned
268,508 UART: [state] DebugLocked = No
271,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,828 UART: [kat] SHA2-256
445,538 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,052 UART: [kat] ++
456,502 UART: [kat] sha1
467,432 UART: [kat] SHA2-256
470,123 UART: [kat] SHA2-384
476,319 UART: [kat] SHA2-512-ACC
478,676 UART: [kat] ECC-384
2,774,125 UART: [kat] HMAC-384Kdf
2,803,581 UART: [kat] LMS
3,993,928 UART: [kat] --
3,998,952 UART: [cold-reset] ++
4,000,780 UART: [fht] Storing FHT @ 0x50003400
4,013,519 UART: [idev] ++
4,014,124 UART: [idev] CDI.KEYID = 6
4,015,049 UART: [idev] SUBJECT.KEYID = 7
4,016,267 UART: [idev] UDS.KEYID = 0
4,017,895 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,162,683 UART: [idev] Erasing UDS.KEYID = 0
7,352,454 UART: [idev] Using Sha1 for KeyId Algorithm
7,373,340 UART: [idev] --
7,376,400 UART: [ldev] ++
7,376,981 UART: [ldev] CDI.KEYID = 6
7,378,023 UART: [ldev] SUBJECT.KEYID = 5
7,379,141 UART: [ldev] AUTHORITY.KEYID = 7
7,380,432 UART: [ldev] FE.KEYID = 1
7,424,620 UART: [ldev] Erasing FE.KEYID = 1
10,756,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,667 UART: [ldev] --
13,118,535 UART: [fwproc] Waiting for Commands...
13,120,418 UART: [fwproc] Received command 0x46574c44
13,122,606 UART: [fwproc] Received Image of size 114996 bytes
17,195,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,542 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,657,057 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,802,438 ready_for_fw is high
3,802,958 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,859,570 >>> mbox cmd response: success
23,551,430 UART:
23,551,833 UART: Running Caliptra FMC ...
23,552,951 UART:
23,553,298 UART: [state] CFI Enabled
23,619,046 UART: [fht] FMC Alias Private Key: 7
25,956,883 UART: [art] Extend RT PCRs Done
25,958,116 UART: [art] Lock RT PCRs Done
25,959,723 UART: [art] Populate DV Done
25,964,987 UART: [fht] FMC Alias Private Key: 7
25,966,528 UART: [art] Derive CDI
25,967,261 UART: [art] Store in in slot 0x4
26,028,462 UART: [art] Derive Key Pair
26,029,487 UART: [art] Store priv key in slot 0x5
29,322,199 UART: [art] Derive Key Pair - Done
29,335,384 UART: [art] Signing Cert with AUTHO
29,336,690 UART: RITY.KEYID = 7
31,623,627 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,143 UART: [art] PUB.X = 61F406D909C44C017360069085E7BF71F9265F58B2741A194F0088FF6E93656E5676BFABDCCFD098642A141177F30AB2
31,632,340 UART: [art] PUB.Y = 3968206B13EE1B6FDFA51FDD7D30544E1048D5B268FBDE60C0016AEEB1373079895CE5FE90D45CC1C4D716111F32CBFF
31,639,620 UART: [art] SIG.R = 96B52B7A6FA1A364397CC25A8DD1A37EB8CF19C0FE45D94D99F7DAC7FAEF74741E5D069BE992AB2931CB98DB6FB31D35
31,647,094 UART: [art] SIG.S = 62DC91032CBB2E0C04BE58D042B4A4A5B8267A505B10A11484C3B900196CF78B5BB17D17368BC18C8EFD59B06B1867AF
32,951,917 UART: Caliptra RT
32,952,638 UART: [state] CFI Enabled
33,114,722 UART: [rt] RT listening for mailbox commands...
33,116,583 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,146,550 UART: [rt]cmd =0x46504c54, len=4
33,148,074 >>> mbox cmd response data (8 bytes)
33,149,357 UART: [rt] FIPS self test
33,150,322 UART: [kat] ++
33,150,772 UART: [kat] sha1
33,155,032 UART: [kat] SHA2-256
33,157,013 UART: [kat] SHA2-384
33,160,153 UART: [kat] SHA2-512-ACC
33,162,416 UART: [kat] ECC-384
36,426,100 UART: Fatal Error: 0x90040005
36,461,892 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,606,403 >>> mbox cmd response: failed
36,607,027 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,751,235 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,790,954 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,890,041 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,426 UART:
192,806 UART: Running Caliptra ROM ...
194,008 UART:
603,824 UART: [state] CFI Enabled
615,561 UART: [state] LifecycleState = Unprovisioned
617,437 UART: [state] DebugLocked = No
619,954 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,398 UART: [kat] SHA2-256
794,119 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,642 UART: [kat] ++
805,087 UART: [kat] sha1
815,985 UART: [kat] SHA2-256
818,674 UART: [kat] SHA2-384
826,168 UART: [kat] SHA2-512-ACC
828,552 UART: [kat] ECC-384
3,113,018 UART: [kat] HMAC-384Kdf
3,125,410 UART: [kat] LMS
4,315,497 UART: [kat] --
4,320,724 UART: [cold-reset] ++
4,321,600 UART: [fht] Storing FHT @ 0x50003400
4,333,434 UART: [idev] ++
4,334,006 UART: [idev] CDI.KEYID = 6
4,334,931 UART: [idev] SUBJECT.KEYID = 7
4,336,173 UART: [idev] UDS.KEYID = 0
4,337,128 ready_for_fw is high
4,337,332 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,481,630 UART: [idev] Erasing UDS.KEYID = 0
7,625,494 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,431 UART: [idev] --
7,652,428 UART: [ldev] ++
7,653,000 UART: [ldev] CDI.KEYID = 6
7,654,022 UART: [ldev] SUBJECT.KEYID = 5
7,655,186 UART: [ldev] AUTHORITY.KEYID = 7
7,656,439 UART: [ldev] FE.KEYID = 1
7,668,543 UART: [ldev] Erasing FE.KEYID = 1
10,952,210 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,483 UART: [ldev] --
13,315,501 UART: [fwproc] Waiting for Commands...
13,317,982 UART: [fwproc] Received command 0x46574c44
13,320,172 UART: [fwproc] Received Image of size 114996 bytes
17,375,968 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,198 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,062 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,841,626 >>> mbox cmd response: success
17,845,156 UART: [afmc] ++
17,845,774 UART: [afmc] CDI.KEYID = 6
17,846,691 UART: [afmc] SUBJECT.KEYID = 7
17,847,962 UART: [afmc] AUTHORITY.KEYID = 5
21,159,154 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,791 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,076 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,417 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,287 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,718 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,409 UART: [afmc] --
23,525,758 UART: [cold-reset] --
23,528,752 UART: [state] Locking Datavault
23,534,861 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,627 UART: [state] Locking ICCM
23,538,359 UART: [exit] Launching FMC @ 0x40000130
23,546,759 UART:
23,547,014 UART: Running Caliptra FMC ...
23,548,121 UART:
23,548,285 UART: [state] CFI Enabled
23,556,547 UART: [fht] FMC Alias Private Key: 7
25,886,764 UART: [art] Extend RT PCRs Done
25,887,991 UART: [art] Lock RT PCRs Done
25,889,530 UART: [art] Populate DV Done
25,895,048 UART: [fht] FMC Alias Private Key: 7
25,896,752 UART: [art] Derive CDI
25,897,568 UART: [art] Store in in slot 0x4
25,940,223 UART: [art] Derive Key Pair
25,941,259 UART: [art] Store priv key in slot 0x5
29,183,425 UART: [art] Derive Key Pair - Done
29,196,423 UART: [art] Signing Cert with AUTHO
29,197,733 UART: RITY.KEYID = 7
31,477,206 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,723 UART: [art] PUB.X = 2DADCC501B41AA3567A56C92CABFC5E79A396F39EBE459ABD4EDE1C08DD7EC299C2319485136823397683321A1CDE58B
31,485,986 UART: [art] PUB.Y = 710A545F5C782D6BF279CAEC151697D9C12702B6214E601BF9421BE4A5B0F1304A719384124776B7E9DC0A1363D1B02A
31,493,228 UART: [art] SIG.R = CBFB56B91A00EEBA426C0DBB43594722185C3D222FF3E0D46FFD5B34629943A7D1A64F38825F1FAC109825DEE87FC997
31,500,587 UART: [art] SIG.S = B5C5C219D08E0A379BF75E0F10D0CFB732BB7C2BB173878D39D8AB6C85896571D8704CE4DDB4BB2457A8860611DBC1FE
32,805,687 UART: Caliptra RT
32,806,391 UART: [state] CFI Enabled
32,924,977 UART: [rt] RT listening for mailbox commands...
32,926,831 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,956,460 UART: [rt]cmd =0x46504c54, len=4
32,958,089 >>> mbox cmd response data (8 bytes)
32,959,264 UART: [rt] FIPS self test
32,960,204 UART: [kat] ++
32,960,657 UART: [kat] sha1
32,965,356 UART: [kat] SHA2-256
32,967,292 UART: [kat] SHA2-384
32,970,199 UART: [kat] SHA2-512-ACC
32,972,510 UART: [kat] ECC-384
36,210,859 UART: Fatal Error: 0x90040005
36,246,149 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,390,643 >>> mbox cmd response: failed
36,391,291 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,535,672 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,130 UART:
190,416 UART: Running Caliptra ROM ...
191,524 UART:
4,000,821 UART: [state] CFI Enabled
4,018,442 UART: [state] LifecycleState = Unprovisioned
4,020,358 UART: [state] DebugLocked = No
4,022,939 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,028,112 UART: [kat] SHA2-256
4,197,859 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,208,426 UART: [kat] ++
4,208,925 UART: [kat] sha1
4,219,820 UART: [kat] SHA2-256
4,222,523 UART: [kat] SHA2-384
4,229,489 UART: [kat] SHA2-512-ACC
4,231,838 UART: [kat] ECC-384
6,517,438 UART: [kat] HMAC-384Kdf
6,530,027 UART: [kat] LMS
7,720,113 UART: [kat] --
7,723,696 UART: [cold-reset] ++
7,725,474 UART: [fht] Storing FHT @ 0x50003400
7,738,253 UART: [idev] ++
7,738,816 UART: [idev] CDI.KEYID = 6
7,739,841 UART: [idev] SUBJECT.KEYID = 7
7,741,004 UART: [idev] UDS.KEYID = 0
7,742,546 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
7,886,894 UART: [idev] Erasing UDS.KEYID = 0
11,030,343 UART: [idev] Using Sha1 for KeyId Algorithm
11,052,797 UART: [idev] --
11,056,578 UART: [ldev] ++
11,057,152 UART: [ldev] CDI.KEYID = 6
11,058,172 UART: [ldev] SUBJECT.KEYID = 5
11,059,330 UART: [ldev] AUTHORITY.KEYID = 7
11,060,558 UART: [ldev] FE.KEYID = 1
11,072,234 UART: [ldev] Erasing FE.KEYID = 1
14,360,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,649,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,663,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,678,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,693,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,710,866 UART: [ldev] --
16,715,824 UART: [fwproc] Waiting for Commands...
16,718,480 UART: [fwproc] Received command 0x46574c44
16,720,669 UART: [fwproc] Received Image of size 114996 bytes
20,790,478 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,866,795 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,935,705 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
21,256,793 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,125,387 ready_for_fw is high
4,126,137 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,082,697 >>> mbox cmd response: success
23,732,532 UART:
23,732,974 UART: Running Caliptra FMC ...
23,734,097 UART:
23,734,252 UART: [state] CFI Enabled
23,742,433 UART: [fht] FMC Alias Private Key: 7
26,073,043 UART: [art] Extend RT PCRs Done
26,074,686 UART: [art] Lock RT PCRs Done
26,075,762 UART: [art] Populate DV Done
26,081,276 UART: [fht] FMC Alias Private Key: 7
26,082,718 UART: [art] Derive CDI
26,083,462 UART: [art] Store in in slot 0x4
26,126,289 UART: [art] Derive Key Pair
26,127,363 UART: [art] Store priv key in slot 0x5
29,369,252 UART: [art] Derive Key Pair - Done
29,382,108 UART: [art] Signing Cert with AUTHO
29,383,428 UART: RITY.KEYID = 7
31,662,686 UART: [art] Erasing AUTHORITY.KEYID = 7
31,664,193 UART: [art] PUB.X = 3C713D3E2CD02117E57235C39754142F1BB5DA0D92E0C7DCA76E40A4EE244393ADA907AF8FA8B719386050B0B2E87590
31,671,411 UART: [art] PUB.Y = 6265982CAC3A47F4EDE1747D4D9AE08EFA808C70FF9E0DAB15E65556FC2F8F00D2F658F9C223D36D92C42068A99DBDF3
31,678,686 UART: [art] SIG.R = FC92B848CE3C11DF337ADEB6FA54D55822020C557F034479B5051EB50FDC3F7A84462AD29D50B0890B943C9752B7BFEE
31,686,088 UART: [art] SIG.S = 7BEC8AC8A9286978E106B9DE90E3E122B5252E317F7739903D196E9FEC2B3E9EB12F64CB3A1790AFC5DC387E6E3F27FD
32,990,883 UART: Caliptra RT
32,991,603 UART: [state] CFI Enabled
33,109,317 UART: [rt] RT listening for mailbox commands...
33,111,170 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,140,775 UART: [rt]cmd =0x46504c54, len=4
33,142,460 >>> mbox cmd response data (8 bytes)
33,143,637 UART: [rt] FIPS self test
33,144,575 UART: [kat] ++
33,145,027 UART: [kat] sha1
33,149,389 UART: [kat] SHA2-256
33,151,350 UART: [kat] SHA2-384
33,154,259 UART: [kat] SHA2-512-ACC
33,156,512 UART: [kat] ECC-384
36,395,668 UART: Fatal Error: 0x90040005
36,431,121 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,575,832 >>> mbox cmd response: failed
36,576,505 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,720,853 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
7,340,104 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
21,290,431 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,249 UART:
192,619 UART: Running Caliptra ROM ...
193,829 UART:
193,982 UART: [state] CFI Enabled
264,097 UART: [state] LifecycleState = Unprovisioned
266,019 UART: [state] DebugLocked = No
267,988 UART: [state] WD Timer not started. Device not locked for debugging
272,513 UART: [kat] SHA2-256
451,664 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,244 UART: [kat] ++
463,785 UART: [kat] sha1
474,815 UART: [kat] SHA2-256
477,829 UART: [kat] SHA2-384
484,676 UART: [kat] SHA2-512-ACC
487,619 UART: [kat] ECC-384
2,951,527 UART: [kat] HMAC-384Kdf
2,973,347 UART: [kat] LMS
3,502,761 UART: [kat] --
3,507,543 UART: [cold-reset] ++
3,509,762 UART: [fht] FHT @ 0x50003400
3,520,818 UART: [idev] ++
3,521,393 UART: [idev] CDI.KEYID = 6
3,522,316 UART: [idev] SUBJECT.KEYID = 7
3,523,431 UART: [idev] UDS.KEYID = 0
3,524,421 ready_for_fw is high
3,524,648 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,669,744 UART: [idev] Erasing UDS.KEYID = 0
6,027,777 UART: [idev] Sha1 KeyId Algorithm
6,050,411 UART: [idev] --
6,055,698 UART: [ldev] ++
6,056,272 UART: [ldev] CDI.KEYID = 6
6,057,186 UART: [ldev] SUBJECT.KEYID = 5
6,058,355 UART: [ldev] AUTHORITY.KEYID = 7
6,059,642 UART: [ldev] FE.KEYID = 1
6,102,157 UART: [ldev] Erasing FE.KEYID = 1
8,604,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,861 UART: [ldev] --
10,398,100 UART: [fwproc] Wait for Commands...
10,400,524 UART: [fwproc] Recv command 0x46574c44
10,402,619 UART: [fwproc] Recv'd Img size: 115304 bytes
13,821,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,052 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,817 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,286,724 >>> mbox cmd response: success
14,291,010 UART: [afmc] ++
14,291,605 UART: [afmc] CDI.KEYID = 6
14,292,525 UART: [afmc] SUBJECT.KEYID = 7
14,293,690 UART: [afmc] AUTHORITY.KEYID = 5
16,828,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,622 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,534 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,118 UART: [afmc] --
18,633,096 UART: [cold-reset] --
18,636,530 UART: [state] Locking Datavault
18,641,292 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,937 UART: [state] Locking ICCM
18,645,573 UART: [exit] Launching FMC @ 0x40000130
18,653,968 UART:
18,654,202 UART: Running Caliptra FMC ...
18,655,302 UART:
18,655,463 UART: [state] CFI Enabled
18,712,637 UART: [fht] FMC Alias Private Key: 7
20,476,396 UART: [art] Extend RT PCRs Done
20,477,623 UART: [art] Lock RT PCRs Done
20,479,381 UART: [art] Populate DV Done
20,484,743 UART: [fht] FMC Alias Private Key: 7
20,486,305 UART: [art] Derive CDI
20,487,125 UART: [art] Store in in slot 0x4
20,546,228 UART: [art] Derive Key Pair
20,547,269 UART: [art] Store priv key in slot 0x5
23,009,807 UART: [art] Derive Key Pair - Done
23,023,079 UART: [art] Signing Cert with AUTHO
23,024,396 UART: RITY.KEYID = 7
24,735,437 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,946 UART: [art] PUB.X = B6BFFD9851E3CFEC54CDBE1A635BD246A29BDFA5174685B2B116DEC0BD87DE3F4846C2359DAD877351D5CF2D71B486D4
24,744,282 UART: [art] PUB.Y = 813A2B65A70C0722FD03CF6D2633DD2C5D0C7EFD82242634099E51A91D1A89D934BEA7BA13D75FF84884F573F80D9D8A
24,751,530 UART: [art] SIG.R = B24DC3AFBBD834F2D95855EB4CA466322B4706CF7CE646428995202C696045D3BBF79EE986599F98487867CC5A110E99
24,758,876 UART: [art] SIG.S = E9458BE861481C5FC6FAFA29837F0B34CF95FA6CF7B50090A93159E2F3E7A94F1B1C562ACA7132F4CF1649FF9CA7C672
25,737,860 UART: Caliptra RT
25,738,572 UART: [state] CFI Enabled
25,901,413 UART: [rt] RT listening for mailbox commands...
25,903,263 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,933,117 UART: [rt]cmd =0x46504c54, len=4
25,934,643 >>> mbox cmd response data (8 bytes)
25,935,451 UART: [rt] FIPS self test
25,936,330 UART: [kat] ++
25,936,773 UART: [kat] sha1
25,941,228 UART: [kat] SHA2-256
25,943,126 UART: [kat] SHA2-384
25,946,123 UART: [kat] SHA2-512-ACC
25,948,370 UART: [kat] ECC-384
28,383,991 UART: Fatal Error: 0x90040005
28,419,282 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,564,165 >>> mbox cmd response: failed
28,564,837 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,709,611 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,156 UART:
190,446 UART: Running Caliptra ROM ...
191,561 UART:
191,709 UART: [state] CFI Enabled
263,711 UART: [state] LifecycleState = Unprovisioned
265,555 UART: [state] DebugLocked = No
266,875 UART: [state] WD Timer not started. Device not locked for debugging
270,277 UART: [kat] SHA2-256
449,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,980 UART: [kat] ++
461,427 UART: [kat] sha1
473,273 UART: [kat] SHA2-256
476,286 UART: [kat] SHA2-384
483,667 UART: [kat] SHA2-512-ACC
486,654 UART: [kat] ECC-384
2,951,014 UART: [kat] HMAC-384Kdf
2,972,990 UART: [kat] LMS
3,502,469 UART: [kat] --
3,506,620 UART: [cold-reset] ++
3,507,472 UART: [fht] FHT @ 0x50003400
3,517,821 UART: [idev] ++
3,518,402 UART: [idev] CDI.KEYID = 6
3,519,287 UART: [idev] SUBJECT.KEYID = 7
3,520,555 UART: [idev] UDS.KEYID = 0
3,522,070 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,667,119 UART: [idev] Erasing UDS.KEYID = 0
6,030,005 UART: [idev] Sha1 KeyId Algorithm
6,052,054 UART: [idev] --
6,056,683 UART: [ldev] ++
6,057,270 UART: [ldev] CDI.KEYID = 6
6,058,160 UART: [ldev] SUBJECT.KEYID = 5
6,059,321 UART: [ldev] AUTHORITY.KEYID = 7
6,060,577 UART: [ldev] FE.KEYID = 1
6,100,985 UART: [ldev] Erasing FE.KEYID = 1
8,605,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,934 UART: [ldev] --
10,414,303 UART: [fwproc] Wait for Commands...
10,417,380 UART: [fwproc] Recv command 0x46574c44
10,419,423 UART: [fwproc] Recv'd Img size: 115304 bytes
13,839,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,984,647 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,305,838 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,381,181 ready_for_fw is high
3,381,583 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,081,265 >>> mbox cmd response: success
18,362,410 UART:
18,362,806 UART: Running Caliptra FMC ...
18,363,949 UART:
18,364,109 UART: [state] CFI Enabled
18,432,199 UART: [fht] FMC Alias Private Key: 7
20,195,560 UART: [art] Extend RT PCRs Done
20,196,816 UART: [art] Lock RT PCRs Done
20,198,395 UART: [art] Populate DV Done
20,203,472 UART: [fht] FMC Alias Private Key: 7
20,205,125 UART: [art] Derive CDI
20,205,945 UART: [art] Store in in slot 0x4
20,264,934 UART: [art] Derive Key Pair
20,265,939 UART: [art] Store priv key in slot 0x5
22,728,696 UART: [art] Derive Key Pair - Done
22,741,652 UART: [art] Signing Cert with AUTHO
22,742,964 UART: RITY.KEYID = 7
24,455,714 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,246 UART: [art] PUB.X = 7E3100AEA304534CD9D860389BA085E32BA184D5882E127C98DCA0714BBA8BA1EBA8D980EBE0854925853D1525ACF87A
24,464,502 UART: [art] PUB.Y = D2BEA59FA6105C8373411A1592C643C63A7E1500AEAE6CF3609C34BA0459F84C09DA6FFB5DE9F5F2E89F667660689CFD
24,471,720 UART: [art] SIG.R = D4F85D63AAB1F54BE870BB6B1644BF3C176C861EF111654F40A3B37B10E26306378157FDE707F789D80DB9C0CA5802D8
24,479,123 UART: [art] SIG.S = 30517BECC13A7FB83C5D50C9F6DF01A1CE481B0A19F59A85425D8CBC183617EA407B85915FA1C16F5D46919A5043A9E4
25,457,992 UART: Caliptra RT
25,459,082 UART: [state] CFI Enabled
25,624,773 UART: [rt] RT listening for mailbox commands...
25,626,636 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,656,348 UART: [rt]cmd =0x46504c54, len=4
25,657,964 >>> mbox cmd response data (8 bytes)
25,659,330 UART: [rt] FIPS self test
25,660,276 UART: [kat] ++
25,660,728 UART: [kat] sha1
25,665,053 UART: [kat] SHA2-256
25,666,938 UART: [kat] SHA2-384
25,669,789 UART: [kat] SHA2-512-ACC
25,672,047 UART: [kat] ECC-384
28,105,830 UART: Fatal Error: 0x90040005
28,141,303 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,286,163 >>> mbox cmd response: failed
28,286,881 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,431,620 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,339,756 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,067,715 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,714 UART:
193,066 UART: Running Caliptra ROM ...
194,281 UART:
603,710 UART: [state] CFI Enabled
617,479 UART: [state] LifecycleState = Unprovisioned
619,384 UART: [state] DebugLocked = No
620,620 UART: [state] WD Timer not started. Device not locked for debugging
624,145 UART: [kat] SHA2-256
803,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,887 UART: [kat] ++
815,337 UART: [kat] sha1
827,633 UART: [kat] SHA2-256
830,637 UART: [kat] SHA2-384
835,918 UART: [kat] SHA2-512-ACC
838,862 UART: [kat] ECC-384
3,280,768 UART: [kat] HMAC-384Kdf
3,293,211 UART: [kat] LMS
3,822,704 UART: [kat] --
3,827,618 UART: [cold-reset] ++
3,830,186 UART: [fht] FHT @ 0x50003400
3,840,686 UART: [idev] ++
3,841,306 UART: [idev] CDI.KEYID = 6
3,842,236 UART: [idev] SUBJECT.KEYID = 7
3,843,417 UART: [idev] UDS.KEYID = 0
3,844,346 ready_for_fw is high
3,844,546 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,989,187 UART: [idev] Erasing UDS.KEYID = 0
6,312,734 UART: [idev] Sha1 KeyId Algorithm
6,335,321 UART: [idev] --
6,338,752 UART: [ldev] ++
6,339,328 UART: [ldev] CDI.KEYID = 6
6,340,212 UART: [ldev] SUBJECT.KEYID = 5
6,341,428 UART: [ldev] AUTHORITY.KEYID = 7
6,342,613 UART: [ldev] FE.KEYID = 1
6,355,794 UART: [ldev] Erasing FE.KEYID = 1
8,826,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,014 UART: [ldev] --
10,617,471 UART: [fwproc] Wait for Commands...
10,619,786 UART: [fwproc] Recv command 0x46574c44
10,621,879 UART: [fwproc] Recv'd Img size: 115304 bytes
14,044,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,184,651 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,505,626 >>> mbox cmd response: success
14,509,986 UART: [afmc] ++
14,510,576 UART: [afmc] CDI.KEYID = 6
14,511,463 UART: [afmc] SUBJECT.KEYID = 7
14,512,565 UART: [afmc] AUTHORITY.KEYID = 5
17,011,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,732,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,734,595 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,750,380 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,766,388 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,782,250 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,805,720 UART: [afmc] --
18,809,329 UART: [cold-reset] --
18,813,950 UART: [state] Locking Datavault
18,818,007 UART: [state] Locking PCR0, PCR1 and PCR31
18,819,660 UART: [state] Locking ICCM
18,822,297 UART: [exit] Launching FMC @ 0x40000130
18,830,696 UART:
18,830,940 UART: Running Caliptra FMC ...
18,832,050 UART:
18,832,214 UART: [state] CFI Enabled
18,839,993 UART: [fht] FMC Alias Private Key: 7
20,596,115 UART: [art] Extend RT PCRs Done
20,597,340 UART: [art] Lock RT PCRs Done
20,598,856 UART: [art] Populate DV Done
20,604,054 UART: [fht] FMC Alias Private Key: 7
20,605,599 UART: [art] Derive CDI
20,606,366 UART: [art] Store in in slot 0x4
20,648,741 UART: [art] Derive Key Pair
20,649,784 UART: [art] Store priv key in slot 0x5
23,076,523 UART: [art] Derive Key Pair - Done
23,089,310 UART: [art] Signing Cert with AUTHO
23,090,630 UART: RITY.KEYID = 7
24,796,412 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,929 UART: [art] PUB.X = F1714CD3B08CC1CFC66E60749039F63706106AE8ACA38AAFE47D5AB0EE15E1DC4652C683AAD1DAB8050FAA910C013122
24,805,245 UART: [art] PUB.Y = F37817FFC0ACDE694A70667CD51479BF38D64A5E05914C65E22B0529995BA315E3BC516640131FCE4840A8890809CD75
24,812,431 UART: [art] SIG.R = F68346083ACC6C49F9169495BA54D1DC431B6E363AAF27A4D9F57425B0466CE3A619F450A11655526DB9BD9AB2300A15
24,819,832 UART: [art] SIG.S = 2B34E68A58080844BEAF7D8A3EEA098AC2AD188B39DCF0A43C3856C7BB94FD075553A675045BC7D89EB0957972572CD0
25,798,795 UART: Caliptra RT
25,799,509 UART: [state] CFI Enabled
25,916,803 UART: [rt] RT listening for mailbox commands...
25,918,663 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,948,519 UART: [rt]cmd =0x46504c54, len=4
25,950,149 >>> mbox cmd response data (8 bytes)
25,951,039 UART: [rt] FIPS self test
25,951,982 UART: [kat] ++
25,952,432 UART: [kat] sha1
25,956,888 UART: [kat] SHA2-256
25,958,821 UART: [kat] SHA2-384
25,961,670 UART: [kat] SHA2-512-ACC
25,963,907 UART: [kat] ECC-384
28,387,933 UART: Fatal Error: 0x90040005
28,423,324 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,568,213 >>> mbox cmd response: failed
28,568,885 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,713,516 >>> mbox cmd response: failed
Initializing fuses
1,124 writing to cptra_bootfsm_go
190,352 UART:
190,649 UART: Running Caliptra ROM ...
191,678 UART:
11,817,260 UART: [state] CFI Enabled
11,829,188 UART: [state] LifecycleState = Unprovisioned
11,831,048 UART: [state] DebugLocked = No
11,832,921 UART: [state] WD Timer not started. Device not locked for debugging
11,837,091 UART: [kat] SHA2-256
12,016,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,027,789 UART: [kat] ++
12,028,339 UART: [kat] sha1
12,041,017 UART: [kat] SHA2-256
12,044,051 UART: [kat] SHA2-384
12,049,873 UART: [kat] SHA2-512-ACC
12,052,825 UART: [kat] ECC-384
14,493,149 UART: [kat] HMAC-384Kdf
14,506,290 UART: [kat] LMS
15,035,785 UART: [kat] --
15,039,287 UART: [cold-reset] ++
15,040,136 UART: [fht] FHT @ 0x50003400
15,050,876 UART: [idev] ++
15,051,462 UART: [idev] CDI.KEYID = 6
15,052,375 UART: [idev] SUBJECT.KEYID = 7
15,053,593 UART: [idev] UDS.KEYID = 0
15,055,112 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
15,199,725 UART: [idev] Erasing UDS.KEYID = 0
17,529,659 UART: [idev] Sha1 KeyId Algorithm
17,553,914 UART: [idev] --
17,556,743 UART: [ldev] ++
17,557,315 UART: [ldev] CDI.KEYID = 6
17,558,222 UART: [ldev] SUBJECT.KEYID = 5
17,559,381 UART: [ldev] AUTHORITY.KEYID = 7
17,560,610 UART: [ldev] FE.KEYID = 1
17,572,818 UART: [ldev] Erasing FE.KEYID = 1
20,045,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,764,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,780,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,795,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,811,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,831,637 UART: [ldev] --
21,836,739 UART: [fwproc] Wait for Commands...
21,838,406 UART: [fwproc] Recv command 0x46574c44
21,840,506 UART: [fwproc] Recv'd Img size: 115304 bytes
25,256,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,328,230 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,397,021 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,718,592 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
3,699,268 ready_for_fw is high
3,699,867 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,291,039 >>> mbox cmd response: success
18,542,846 UART:
18,543,242 UART: Running Caliptra FMC ...
18,544,575 UART:
18,544,742 UART: [state] CFI Enabled
18,552,222 UART: [fht] FMC Alias Private Key: 7
20,308,934 UART: [art] Extend RT PCRs Done
20,310,164 UART: [art] Lock RT PCRs Done
20,311,962 UART: [art] Populate DV Done
20,317,306 UART: [fht] FMC Alias Private Key: 7
20,318,798 UART: [art] Derive CDI
20,319,541 UART: [art] Store in in slot 0x4
20,362,075 UART: [art] Derive Key Pair
20,363,077 UART: [art] Store priv key in slot 0x5
22,789,424 UART: [art] Derive Key Pair - Done
22,802,641 UART: [art] Signing Cert with AUTHO
22,803,948 UART: RITY.KEYID = 7
24,509,444 UART: [art] Erasing AUTHORITY.KEYID = 7
24,510,959 UART: [art] PUB.X = C681F1EFC5DAF8A6F5782E30C196C2450F1D4621BD6F8274796639988EAD466B31BC8F7281AC2C964534DC6BF6EBF875
24,518,246 UART: [art] PUB.Y = 94204F5715C787D3479EE9CE68D53B418DEFA04D9514168D9B6581AB5E8F50BD439FD40CA146C75CA203D8878E954589
24,525,477 UART: [art] SIG.R = 92034FA15C3236B1B885653DF75382A8A0B5AE301831032EFD331BB0043E55367925EC79A65A244BB608A3758F11CEE7
24,532,847 UART: [art] SIG.S = 64B23DF6957D910A04186912AE31538E261F43BF78B284D7097ACF35D6C75BBA45DFB4142E79C689B90C792B75DC4337
25,511,353 UART: Caliptra RT
25,512,057 UART: [state] CFI Enabled
25,629,887 UART: [rt] RT listening for mailbox commands...
25,631,737 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,661,339 UART: [rt]cmd =0x46504c54, len=4
25,662,861 >>> mbox cmd response data (8 bytes)
25,663,968 UART: [rt] FIPS self test
25,664,914 UART: [kat] ++
25,665,364 UART: [kat] sha1
25,669,985 UART: [kat] SHA2-256
25,671,913 UART: [kat] SHA2-384
25,675,036 UART: [kat] SHA2-512-ACC
25,677,256 UART: [kat] ECC-384
28,101,210 UART: Fatal Error: 0x90040005
28,136,655 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,281,336 >>> mbox cmd response: failed
28,282,001 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,426,733 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
15,199,107 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,795,366 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,443,210 ready_for_fw is high
3,443,682 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,756,268 >>> mbox cmd response: success
19,071,311 UART:
19,071,720 UART: Running Caliptra FMC ...
19,072,833 UART:
19,072,998 UART: [state] CFI Enabled
19,135,592 UART: [fht] FMC Alias Private Key: 7
20,899,924 UART: [art] Extend RT PCRs Done
20,901,149 UART: [art] Lock RT PCRs Done
20,902,689 UART: [art] Populate DV Done
20,908,265 UART: [fht] FMC Alias Private Key: 7
20,909,935 UART: [art] Derive CDI
20,910,752 UART: [art] Store in in slot 0x4
20,969,413 UART: [art] Derive Key Pair
20,970,454 UART: [art] Store priv key in slot 0x5
23,433,469 UART: [art] Derive Key Pair - Done
23,446,426 UART: [art] Signing Cert with AUTHO
23,447,729 UART: RITY.KEYID = 7
25,159,633 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,263 UART: [art] PUB.X = 5357D253413E1B3C97A502EBB636AC6D1E83E5AAB7B725045150EC59D7E7561D9BDD032816E4A53C946784185FB3741E
25,168,419 UART: [art] PUB.Y = 43EB96C2DFD8A516BC49B87F9BB9C719643FA7868F1F527369C96C72C5E8B56B24FDCF33880C7509C5BDB6BA6E429823
25,175,677 UART: [art] SIG.R = CEC155942AEFABB557A0CB39B49B0F090F2D24FCBF4502BFA713CEC7C9711B94C3597F8AD35165F610531969B90447B6
25,183,086 UART: [art] SIG.S = 46D26FD6BD7AF53080E0F2AD2AC4E5AC361B5484779AF1E7EE2622D38E8CB271E24214D028D7BE977ECD341D443B799B
26,161,807 UART: Caliptra RT
26,162,534 UART: [state] CFI Enabled
26,327,920 UART: [rt] RT listening for mailbox commands...
26,329,781 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,359,591 UART: [rt]cmd =0x46504c54, len=4
26,361,155 >>> mbox cmd response data (8 bytes)
26,362,487 UART: [rt] FIPS self test
26,363,444 UART: [kat] ++
26,363,893 UART: [kat] sha1
26,368,275 UART: [kat] SHA2-256
26,370,213 UART: [kat] SHA2-384
26,373,021 UART: [kat] SHA2-512-ACC
26,375,296 UART: [kat] ECC-384
28,808,499 UART: Fatal Error: 0x90040005
28,843,897 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,988,622 >>> mbox cmd response: failed
28,989,260 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,134,001 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,420,719 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,742,460 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,755,626 ready_for_fw is high
3,756,083 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,980,623 >>> mbox cmd response: success
19,232,414 UART:
19,232,810 UART: Running Caliptra FMC ...
19,233,970 UART:
19,234,128 UART: [state] CFI Enabled
19,242,030 UART: [fht] FMC Alias Private Key: 7
20,999,041 UART: [art] Extend RT PCRs Done
21,000,271 UART: [art] Lock RT PCRs Done
21,002,067 UART: [art] Populate DV Done
21,007,327 UART: [fht] FMC Alias Private Key: 7
21,008,979 UART: [art] Derive CDI
21,009,801 UART: [art] Store in in slot 0x4
21,052,894 UART: [art] Derive Key Pair
21,053,901 UART: [art] Store priv key in slot 0x5
23,480,326 UART: [art] Derive Key Pair - Done
23,493,843 UART: [art] Signing Cert with AUTHO
23,495,158 UART: RITY.KEYID = 7
25,200,686 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,198 UART: [art] PUB.X = F7B33A1ECF639B8D9BF8A8148908EB01A0D33EC7C0A430BA11D2B66E4DFB9B2C284569D6A411F25C8DC4B786A96313A3
25,209,489 UART: [art] PUB.Y = BD8DF8B818F29981E9B2BD297BEE11E1B64B0B898A0A1B9D179790338313C19245639476CC4BFBE1B436BF4AA05AA1A2
25,216,770 UART: [art] SIG.R = 981CD90A391C84476ABC0E25E8CBAD010A998F12A246F6CE5D1D543CF615D09262C95D2ACED5C9E65422B306301CF55D
25,224,135 UART: [art] SIG.S = 1DEE6D35197C95AA5DBC67F14520FA1F40C3E9DCF2B7897BF58358A15E99F5A2885DC55A024574B4C48390EA19429F0B
26,203,464 UART: Caliptra RT
26,204,158 UART: [state] CFI Enabled
26,321,221 UART: [rt] RT listening for mailbox commands...
26,323,069 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,352,923 UART: [rt]cmd =0x46504c54, len=4
26,354,644 >>> mbox cmd response data (8 bytes)
26,355,961 UART: [rt] FIPS self test
26,356,900 UART: [kat] ++
26,357,356 UART: [kat] sha1
26,361,833 UART: [kat] SHA2-256
26,363,717 UART: [kat] SHA2-384
26,366,790 UART: [kat] SHA2-512-ACC
26,369,058 UART: [kat] ECC-384
28,792,874 UART: Fatal Error: 0x90040005
28,828,335 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,973,021 >>> mbox cmd response: failed
28,973,674 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,121,104 >>> mbox cmd response: failed
Initializing fuses
1,014 writing to cptra_bootfsm_go
14,558,011 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,775,820 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,535 UART: [kat] SHA2-256
892,473 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
902,576 UART: [kat] HMAC-384Kdf
907,106 UART: [kat] LMS
1,475,302 UART: [kat] --
1,475,875 UART: [cold-reset] ++
1,476,443 UART: [fht] Storing FHT @ 0x50003400
1,479,058 UART: [idev] ++
1,479,226 UART: [idev] CDI.KEYID = 6
1,479,586 UART: [idev] SUBJECT.KEYID = 7
1,480,010 UART: [idev] UDS.KEYID = 0
1,480,355 ready_for_fw is high
1,480,355 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,014 UART: [idev] Erasing UDS.KEYID = 0
1,504,752 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,232 UART: [idev] --
1,514,291 UART: [ldev] ++
1,514,459 UART: [ldev] CDI.KEYID = 6
1,514,822 UART: [ldev] SUBJECT.KEYID = 5
1,515,248 UART: [ldev] AUTHORITY.KEYID = 7
1,515,711 UART: [ldev] FE.KEYID = 1
1,520,989 UART: [ldev] Erasing FE.KEYID = 1
1,545,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,960 UART: [ldev] --
1,585,305 UART: [fwproc] Waiting for Commands...
1,586,146 UART: [fwproc] Received command 0x46574c44
1,586,937 UART: [fwproc] Received Image of size 115304 bytes
2,896,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,738 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,090 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,295 >>> mbox cmd response: success
3,091,321 UART: [afmc] ++
3,091,489 UART: [afmc] CDI.KEYID = 6
3,091,851 UART: [afmc] SUBJECT.KEYID = 7
3,092,276 UART: [afmc] AUTHORITY.KEYID = 5
3,127,351 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,463 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,243 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,971 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,856 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,546 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,429 UART: [afmc] --
3,170,503 UART: [cold-reset] --
3,171,321 UART: [state] Locking Datavault
3,172,604 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,208 UART: [state] Locking ICCM
3,173,760 UART: [exit] Launching FMC @ 0x40000130
3,179,089 UART:
3,179,105 UART: Running Caliptra FMC ...
3,179,513 UART:
3,179,567 UART: [state] CFI Enabled
3,190,106 UART: [fht] FMC Alias Private Key: 7
3,297,955 UART: [art] Extend RT PCRs Done
3,298,383 UART: [art] Lock RT PCRs Done
3,299,953 UART: [art] Populate DV Done
3,308,130 UART: [fht] FMC Alias Private Key: 7
3,309,100 UART: [art] Derive CDI
3,309,380 UART: [art] Store in in slot 0x4
3,394,971 UART: [art] Derive Key Pair
3,395,331 UART: [art] Store priv key in slot 0x5
3,408,471 UART: [art] Derive Key Pair - Done
3,423,178 UART: [art] Signing Cert with AUTHO
3,423,658 UART: RITY.KEYID = 7
3,439,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,937 UART: [art] PUB.X = 50F05F4C783EE5671A755ABE96E1B2E0939E5F98A374AB00514522B0BD8F3CCC4D8CBE24B5574DD831E6240E39430FD4
3,446,687 UART: [art] PUB.Y = D6D4D505A410AC71F40329404D1B7A1BFB2C3F6CAD24A9FC3FF1A31894E1DF363E51A3D8D70D9B4E5A999AECE76CEE73
3,453,650 UART: [art] SIG.R = 87889C061C2A8DAE8DDBB5EAFD50216CC3FED061E6925BAC1F47F15B00B112405EA618A1DB151DD91F65BD6BCF69B7D7
3,460,417 UART: [art] SIG.S = FD480D312228360F82DBE4E7E06E22F025956FA37DF5E6C363F0D88D1F5EA459A7F5BD42BA84C63E6574BA01514121CC
3,483,963 UART: Caliptra RT
3,484,216 UART: [state] CFI Enabled
3,591,214 UART: [rt] RT listening for mailbox commands...
3,591,877 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,978 UART: [rt]cmd =0x46504c54, len=4
3,623,239 >>> mbox cmd response data (8 bytes)
3,623,540 UART: [rt] FIPS self test
3,623,868 UART: [kat] ++
3,624,020 UART: [kat] sha1
3,628,242 UART: [kat] SHA2-256
3,630,264 UART: [kat] SHA2-384
3,632,989 UART: [kat] SHA2-512-ACC
3,634,916 UART: [kat] ECC-384
3,643,267 UART: Fatal Error: 0x90040005
3,644,817 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,644,822 >>> mbox cmd response: failed
3,644,822 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,644,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,481 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,143 UART: [kat] SHA2-256
882,074 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,189 UART: [kat] ++
886,341 UART: [kat] sha1
890,715 UART: [kat] SHA2-256
892,653 UART: [kat] SHA2-384
895,280 UART: [kat] SHA2-512-ACC
897,181 UART: [kat] ECC-384
902,510 UART: [kat] HMAC-384Kdf
907,022 UART: [kat] LMS
1,475,218 UART: [kat] --
1,476,169 UART: [cold-reset] ++
1,476,661 UART: [fht] Storing FHT @ 0x50003400
1,479,514 UART: [idev] ++
1,479,682 UART: [idev] CDI.KEYID = 6
1,480,042 UART: [idev] SUBJECT.KEYID = 7
1,480,466 UART: [idev] UDS.KEYID = 0
1,480,811 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,864 UART: [idev] Erasing UDS.KEYID = 0
1,505,068 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,866 UART: [idev] --
1,514,921 UART: [ldev] ++
1,515,089 UART: [ldev] CDI.KEYID = 6
1,515,452 UART: [ldev] SUBJECT.KEYID = 5
1,515,878 UART: [ldev] AUTHORITY.KEYID = 7
1,516,341 UART: [ldev] FE.KEYID = 1
1,521,401 UART: [ldev] Erasing FE.KEYID = 1
1,546,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,306 UART: [ldev] --
1,585,817 UART: [fwproc] Waiting for Commands...
1,586,452 UART: [fwproc] Received command 0x46574c44
1,587,243 UART: [fwproc] Received Image of size 115304 bytes
2,897,432 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,438 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,790 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,123 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,849 ready_for_fw is high
1,362,849 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,983 >>> mbox cmd response: success
3,001,309 UART:
3,001,325 UART: Running Caliptra FMC ...
3,001,733 UART:
3,001,787 UART: [state] CFI Enabled
3,012,162 UART: [fht] FMC Alias Private Key: 7
3,120,195 UART: [art] Extend RT PCRs Done
3,120,623 UART: [art] Lock RT PCRs Done
3,122,129 UART: [art] Populate DV Done
3,130,242 UART: [fht] FMC Alias Private Key: 7
3,131,242 UART: [art] Derive CDI
3,131,522 UART: [art] Store in in slot 0x4
3,217,119 UART: [art] Derive Key Pair
3,217,479 UART: [art] Store priv key in slot 0x5
3,231,145 UART: [art] Derive Key Pair - Done
3,246,053 UART: [art] Signing Cert with AUTHO
3,246,533 UART: RITY.KEYID = 7
3,261,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,284 UART: [art] PUB.X = BD5DD75E85D33B56C0DAC86E578F1E7E7126DB2CCF5B45BF8BAD6ACEA9EEE288CE099261737BAB4E1FE9A06EED33B3E5
3,269,083 UART: [art] PUB.Y = 968375D6A7A0A766B70481D8CB889F6FF31246BB86C3B90693F984C964161B64EC550A8B826ED195253DC43D945A7E7D
3,276,022 UART: [art] SIG.R = 4EF4784F1983FF51CFFF660200F74E2288901955B5D117B2E3BAE9EEE36B229E0CBB400F3819E6CAF8FDAFE4C866B013
3,282,775 UART: [art] SIG.S = 4F77283F24648E988595965B478C54D00D5F63EB012BB8C82A30AD7D4DDFBF249292C27E4EF14A94933A709AD2752CCC
3,306,908 UART: Caliptra RT
3,307,161 UART: [state] CFI Enabled
3,415,621 UART: [rt] RT listening for mailbox commands...
3,416,284 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,017 UART: [rt]cmd =0x46504c54, len=4
3,447,038 >>> mbox cmd response data (8 bytes)
3,447,155 UART: [rt] FIPS self test
3,447,483 UART: [kat] ++
3,447,635 UART: [kat] sha1
3,451,861 UART: [kat] SHA2-256
3,453,883 UART: [kat] SHA2-384
3,456,606 UART: [kat] SHA2-512-ACC
3,458,533 UART: [kat] ECC-384
3,467,520 UART: Fatal Error: 0x90040005
3,469,070 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,469,075 >>> mbox cmd response: failed
3,469,075 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,469,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,373 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,483 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,400 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,938 UART: [kat] SHA2-256
881,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,984 UART: [kat] ++
886,136 UART: [kat] sha1
890,352 UART: [kat] SHA2-256
892,290 UART: [kat] SHA2-384
894,989 UART: [kat] SHA2-512-ACC
896,890 UART: [kat] ECC-384
902,419 UART: [kat] HMAC-384Kdf
906,905 UART: [kat] LMS
1,475,101 UART: [kat] --
1,476,188 UART: [cold-reset] ++
1,476,612 UART: [fht] Storing FHT @ 0x50003400
1,479,539 UART: [idev] ++
1,479,707 UART: [idev] CDI.KEYID = 6
1,480,067 UART: [idev] SUBJECT.KEYID = 7
1,480,491 UART: [idev] UDS.KEYID = 0
1,480,836 ready_for_fw is high
1,480,836 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,283 UART: [idev] Erasing UDS.KEYID = 0
1,504,701 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,273 UART: [idev] --
1,514,136 UART: [ldev] ++
1,514,304 UART: [ldev] CDI.KEYID = 6
1,514,667 UART: [ldev] SUBJECT.KEYID = 5
1,515,093 UART: [ldev] AUTHORITY.KEYID = 7
1,515,556 UART: [ldev] FE.KEYID = 1
1,520,646 UART: [ldev] Erasing FE.KEYID = 1
1,546,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,367 UART: [ldev] --
1,585,800 UART: [fwproc] Waiting for Commands...
1,586,645 UART: [fwproc] Received command 0x46574c44
1,587,436 UART: [fwproc] Received Image of size 115304 bytes
2,897,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,659 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,272 >>> mbox cmd response: success
3,092,422 UART: [afmc] ++
3,092,590 UART: [afmc] CDI.KEYID = 6
3,092,952 UART: [afmc] SUBJECT.KEYID = 7
3,093,377 UART: [afmc] AUTHORITY.KEYID = 5
3,127,928 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,722 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,502 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,115 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,805 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,726 UART: [afmc] --
3,171,756 UART: [cold-reset] --
3,172,674 UART: [state] Locking Datavault
3,173,825 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,429 UART: [state] Locking ICCM
3,174,865 UART: [exit] Launching FMC @ 0x40000130
3,180,194 UART:
3,180,210 UART: Running Caliptra FMC ...
3,180,618 UART:
3,180,761 UART: [state] CFI Enabled
3,191,428 UART: [fht] FMC Alias Private Key: 7
3,299,179 UART: [art] Extend RT PCRs Done
3,299,607 UART: [art] Lock RT PCRs Done
3,301,233 UART: [art] Populate DV Done
3,309,336 UART: [fht] FMC Alias Private Key: 7
3,310,424 UART: [art] Derive CDI
3,310,704 UART: [art] Store in in slot 0x4
3,395,737 UART: [art] Derive Key Pair
3,396,097 UART: [art] Store priv key in slot 0x5
3,409,241 UART: [art] Derive Key Pair - Done
3,424,122 UART: [art] Signing Cert with AUTHO
3,424,602 UART: RITY.KEYID = 7
3,439,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,513 UART: [art] PUB.X = 70C2CCB3EDB04E8B9DF16B7A10FB21C449D1E940510CD8E04615ADD260851EA99196E6554E43B89E2243FAC882031A12
3,447,283 UART: [art] PUB.Y = 45C928B61AAB6DD980E0FE3370A0F3AA48627AD78401A0094D34BAF987B645F4CBD1E16830A8AFE7388C08026707AE7B
3,454,226 UART: [art] SIG.R = 7643D6E3ABF42DC6BB94ED3C881BB674295C2D2C13D46A9E292C72AC18909F64F2B284A9CCD89B0AC2C92D39EE1BD697
3,461,009 UART: [art] SIG.S = FCE9670F96C8205ADB71DBD86934BB241DA982AF63B6C4996A3F4B74D8E8B9E2550F5AE9DF306E356FF71704BECA9125
3,484,533 UART: Caliptra RT
3,484,878 UART: [state] CFI Enabled
3,592,621 UART: [rt] RT listening for mailbox commands...
3,593,284 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,117 UART: [rt]cmd =0x46504c54, len=4
3,624,134 >>> mbox cmd response data (8 bytes)
3,624,499 UART: [rt] FIPS self test
3,624,827 UART: [kat] ++
3,624,979 UART: [kat] sha1
3,629,297 UART: [kat] SHA2-256
3,631,319 UART: [kat] SHA2-384
3,634,216 UART: [kat] SHA2-512-ACC
3,636,143 UART: [kat] ECC-384
3,645,314 UART: Fatal Error: 0x90040005
3,646,864 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,646,869 >>> mbox cmd response: failed
3,646,869 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,646,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,802 UART: [kat] SHA2-256
881,733 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,848 UART: [kat] ++
886,000 UART: [kat] sha1
890,214 UART: [kat] SHA2-256
892,152 UART: [kat] SHA2-384
894,977 UART: [kat] SHA2-512-ACC
896,878 UART: [kat] ECC-384
902,495 UART: [kat] HMAC-384Kdf
906,955 UART: [kat] LMS
1,475,151 UART: [kat] --
1,475,912 UART: [cold-reset] ++
1,476,312 UART: [fht] Storing FHT @ 0x50003400
1,478,909 UART: [idev] ++
1,479,077 UART: [idev] CDI.KEYID = 6
1,479,437 UART: [idev] SUBJECT.KEYID = 7
1,479,861 UART: [idev] UDS.KEYID = 0
1,480,206 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,459 UART: [idev] Erasing UDS.KEYID = 0
1,503,817 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,489 UART: [idev] --
1,513,426 UART: [ldev] ++
1,513,594 UART: [ldev] CDI.KEYID = 6
1,513,957 UART: [ldev] SUBJECT.KEYID = 5
1,514,383 UART: [ldev] AUTHORITY.KEYID = 7
1,514,846 UART: [ldev] FE.KEYID = 1
1,520,036 UART: [ldev] Erasing FE.KEYID = 1
1,545,533 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,165 UART: [ldev] --
1,584,590 UART: [fwproc] Waiting for Commands...
1,585,205 UART: [fwproc] Received command 0x46574c44
1,585,996 UART: [fwproc] Received Image of size 115304 bytes
2,895,379 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,769 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,121 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,088,518 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,932 ready_for_fw is high
1,362,932 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,943,324 >>> mbox cmd response: success
3,005,056 UART:
3,005,072 UART: Running Caliptra FMC ...
3,005,480 UART:
3,005,623 UART: [state] CFI Enabled
3,016,004 UART: [fht] FMC Alias Private Key: 7
3,123,811 UART: [art] Extend RT PCRs Done
3,124,239 UART: [art] Lock RT PCRs Done
3,125,623 UART: [art] Populate DV Done
3,133,870 UART: [fht] FMC Alias Private Key: 7
3,135,016 UART: [art] Derive CDI
3,135,296 UART: [art] Store in in slot 0x4
3,220,875 UART: [art] Derive Key Pair
3,221,235 UART: [art] Store priv key in slot 0x5
3,234,229 UART: [art] Derive Key Pair - Done
3,249,014 UART: [art] Signing Cert with AUTHO
3,249,494 UART: RITY.KEYID = 7
3,264,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,465 UART: [art] PUB.X = B6DD69DC6978268D303ECA7520498651DA0BC4980AC36A9AD5AF7816F734F570F3CDAFE89AD1BC2FD1F116E9D6E39C31
3,272,245 UART: [art] PUB.Y = 43E804C9F69DA8918C2A025EC06FBB016881A21AC448F17372A0D73156C2C9DC173E64754D9EF78091FD9EBB409E66BF
3,279,192 UART: [art] SIG.R = F7BEF59B65BF096157EFFCCE3B045E420D77F5757C1250B57EBECD13D1687650E2C232721DED83014ED1CFEF8BF747A6
3,285,966 UART: [art] SIG.S = FF43B46FCB855759ABDA9846BBDB002B12FD84B0E39180065271E8FB5192F964623D1313B93BCD9394122387B5DDFF23
3,309,676 UART: Caliptra RT
3,310,021 UART: [state] CFI Enabled
3,418,237 UART: [rt] RT listening for mailbox commands...
3,418,900 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,873 UART: [rt]cmd =0x46504c54, len=4
3,449,958 >>> mbox cmd response data (8 bytes)
3,450,271 UART: [rt] FIPS self test
3,450,599 UART: [kat] ++
3,450,751 UART: [kat] sha1
3,454,919 UART: [kat] SHA2-256
3,456,941 UART: [kat] SHA2-384
3,459,736 UART: [kat] SHA2-512-ACC
3,461,663 UART: [kat] ECC-384
3,470,594 UART: Fatal Error: 0x90040005
3,472,144 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,472,149 >>> mbox cmd response: failed
3,472,149 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,472,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,260 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,330 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,238 UART: [kat] SHA2-256
892,888 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,013 UART: [kat] ++
897,165 UART: [kat] sha1
901,463 UART: [kat] SHA2-256
903,403 UART: [kat] SHA2-384
906,276 UART: [kat] SHA2-512-ACC
908,177 UART: [kat] ECC-384
917,614 UART: [kat] HMAC-384Kdf
922,110 UART: [kat] LMS
1,170,438 UART: [kat] --
1,171,301 UART: [cold-reset] ++
1,171,711 UART: [fht] FHT @ 0x50003400
1,174,192 UART: [idev] ++
1,174,360 UART: [idev] CDI.KEYID = 6
1,174,720 UART: [idev] SUBJECT.KEYID = 7
1,175,144 UART: [idev] UDS.KEYID = 0
1,175,489 ready_for_fw is high
1,175,489 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,795 UART: [idev] Sha1 KeyId Algorithm
1,208,207 UART: [idev] --
1,209,107 UART: [ldev] ++
1,209,275 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,215,787 UART: [ldev] Erasing FE.KEYID = 1
1,241,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,999 UART: [ldev] --
1,281,468 UART: [fwproc] Wait for Commands...
1,282,290 UART: [fwproc] Recv command 0x46574c44
1,283,018 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,337 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,641 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,954 >>> mbox cmd response: success
2,787,168 UART: [afmc] ++
2,787,336 UART: [afmc] CDI.KEYID = 6
2,787,698 UART: [afmc] SUBJECT.KEYID = 7
2,788,123 UART: [afmc] AUTHORITY.KEYID = 5
2,823,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,545 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,273 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,158 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,877 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,675 UART: [afmc] --
2,866,657 UART: [cold-reset] --
2,867,377 UART: [state] Locking Datavault
2,868,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,942 UART: [state] Locking ICCM
2,869,570 UART: [exit] Launching FMC @ 0x40000130
2,874,899 UART:
2,874,915 UART: Running Caliptra FMC ...
2,875,323 UART:
2,875,377 UART: [state] CFI Enabled
2,886,062 UART: [fht] FMC Alias Private Key: 7
2,994,431 UART: [art] Extend RT PCRs Done
2,994,859 UART: [art] Lock RT PCRs Done
2,996,279 UART: [art] Populate DV Done
3,004,474 UART: [fht] FMC Alias Private Key: 7
3,005,522 UART: [art] Derive CDI
3,005,802 UART: [art] Store in in slot 0x4
3,091,683 UART: [art] Derive Key Pair
3,092,043 UART: [art] Store priv key in slot 0x5
3,104,537 UART: [art] Derive Key Pair - Done
3,118,951 UART: [art] Signing Cert with AUTHO
3,119,431 UART: RITY.KEYID = 7
3,135,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,988 UART: [art] PUB.X = F355EB124D30081EF142CF69E2224FA0FF007C8FF7484BA2C33ABBF410262F72B36DCF6C25A1B7AB7680A16FCA050D39
3,142,741 UART: [art] PUB.Y = 4DF335035E94D5C4758E2C4F848919B0187E04B38AADAB612E5E00891944134AE9BD0F2A193989AE6BCF67D98FD6B3B4
3,149,666 UART: [art] SIG.R = 431A9017E8569805E6C46046F250983458F78F8E8B105DD441D3BB5FBF3230F4C7D3FC346A7D2BFC10F0AD7583F94954
3,156,433 UART: [art] SIG.S = 4EAFF1526CCC58C3864D71D1421DB29212812FFFBAD7C1D8ABB47C5D05AC11DC3253EF0FEEEA3CF08A250ED90CA27FD6
3,180,264 UART: Caliptra RT
3,180,517 UART: [state] CFI Enabled
3,289,078 UART: [rt] RT listening for mailbox commands...
3,289,741 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,530 UART: [rt]cmd =0x46504c54, len=4
3,320,739 >>> mbox cmd response data (8 bytes)
3,320,972 UART: [rt] FIPS self test
3,321,300 UART: [kat] ++
3,321,452 UART: [kat] sha1
3,325,558 UART: [kat] SHA2-256
3,327,580 UART: [kat] SHA2-384
3,330,379 UART: [kat] SHA2-512-ACC
3,332,306 UART: [kat] ECC-384
3,340,943 UART: Fatal Error: 0x90040005
3,342,493 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,342,498 >>> mbox cmd response: failed
3,342,498 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,342,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,456 UART: [kat] SHA2-512-ACC
908,357 UART: [kat] ECC-384
918,252 UART: [kat] HMAC-384Kdf
922,778 UART: [kat] LMS
1,171,106 UART: [kat] --
1,172,045 UART: [cold-reset] ++
1,172,547 UART: [fht] FHT @ 0x50003400
1,175,056 UART: [idev] ++
1,175,224 UART: [idev] CDI.KEYID = 6
1,175,584 UART: [idev] SUBJECT.KEYID = 7
1,176,008 UART: [idev] UDS.KEYID = 0
1,176,353 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,530 UART: [idev] Erasing UDS.KEYID = 0
1,201,433 UART: [idev] Sha1 KeyId Algorithm
1,210,049 UART: [idev] --
1,211,069 UART: [ldev] ++
1,211,237 UART: [ldev] CDI.KEYID = 6
1,211,600 UART: [ldev] SUBJECT.KEYID = 5
1,212,026 UART: [ldev] AUTHORITY.KEYID = 7
1,212,489 UART: [ldev] FE.KEYID = 1
1,217,651 UART: [ldev] Erasing FE.KEYID = 1
1,244,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,265 UART: [ldev] --
1,283,724 UART: [fwproc] Wait for Commands...
1,284,310 UART: [fwproc] Recv command 0x46574c44
1,285,038 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,567 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,892 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,885 ready_for_fw is high
1,060,885 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,039 >>> mbox cmd response: success
2,702,473 UART:
2,702,489 UART: Running Caliptra FMC ...
2,702,897 UART:
2,702,951 UART: [state] CFI Enabled
2,713,496 UART: [fht] FMC Alias Private Key: 7
2,822,197 UART: [art] Extend RT PCRs Done
2,822,625 UART: [art] Lock RT PCRs Done
2,823,931 UART: [art] Populate DV Done
2,832,088 UART: [fht] FMC Alias Private Key: 7
2,833,176 UART: [art] Derive CDI
2,833,456 UART: [art] Store in in slot 0x4
2,919,387 UART: [art] Derive Key Pair
2,919,747 UART: [art] Store priv key in slot 0x5
2,933,289 UART: [art] Derive Key Pair - Done
2,947,981 UART: [art] Signing Cert with AUTHO
2,948,461 UART: RITY.KEYID = 7
2,963,667 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,432 UART: [art] PUB.X = 2B26C1A08EA5EFE85F37D8BA6F7C9B45AE06E01E8B38B9FBDDF16BF580EC0B4B8D668B6BA30775D5A9F99191A06610B1
2,971,213 UART: [art] PUB.Y = A8269473E82B9751E50CB2864F1DA137DC0FDB3E17964FC7EE68AA3E4A13D154FE1F9B623D92EE02BB769BDE56D1DE5F
2,978,172 UART: [art] SIG.R = 558BA529090D4F797F7F74F27CC20D39F130DCC3F77AA3B12C145963244742BD013A66FEE3F8AC833EC0D3F1B3CFBDAD
2,984,946 UART: [art] SIG.S = 5152E43D32B1602DC05FBA5313DC047F3E357C7E0B709F1245DFB7984DA0809CF16E3ADF9F5D1C25AAA6BD7745379876
3,008,581 UART: Caliptra RT
3,008,834 UART: [state] CFI Enabled
3,116,473 UART: [rt] RT listening for mailbox commands...
3,117,136 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,865 UART: [rt]cmd =0x46504c54, len=4
3,148,160 >>> mbox cmd response data (8 bytes)
3,148,469 UART: [rt] FIPS self test
3,148,797 UART: [kat] ++
3,148,949 UART: [kat] sha1
3,152,947 UART: [kat] SHA2-256
3,154,969 UART: [kat] SHA2-384
3,157,842 UART: [kat] SHA2-512-ACC
3,159,769 UART: [kat] ECC-384
3,168,344 UART: Fatal Error: 0x90040005
3,169,894 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,899 >>> mbox cmd response: failed
3,169,899 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,169,904 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,519 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,475 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
893,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,642 UART: [kat] ++
897,794 UART: [kat] sha1
902,062 UART: [kat] SHA2-256
904,002 UART: [kat] SHA2-384
906,751 UART: [kat] SHA2-512-ACC
908,652 UART: [kat] ECC-384
918,189 UART: [kat] HMAC-384Kdf
922,935 UART: [kat] LMS
1,171,263 UART: [kat] --
1,172,032 UART: [cold-reset] ++
1,172,370 UART: [fht] FHT @ 0x50003400
1,174,803 UART: [idev] ++
1,174,971 UART: [idev] CDI.KEYID = 6
1,175,331 UART: [idev] SUBJECT.KEYID = 7
1,175,755 UART: [idev] UDS.KEYID = 0
1,176,100 ready_for_fw is high
1,176,100 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,911 UART: [idev] Erasing UDS.KEYID = 0
1,201,056 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,432 UART: [ldev] ++
1,210,600 UART: [ldev] CDI.KEYID = 6
1,210,963 UART: [ldev] SUBJECT.KEYID = 5
1,211,389 UART: [ldev] AUTHORITY.KEYID = 7
1,211,852 UART: [ldev] FE.KEYID = 1
1,216,974 UART: [ldev] Erasing FE.KEYID = 1
1,244,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,386 UART: [ldev] --
1,283,779 UART: [fwproc] Wait for Commands...
1,284,535 UART: [fwproc] Recv command 0x46574c44
1,285,263 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,048 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,237 >>> mbox cmd response: success
2,789,453 UART: [afmc] ++
2,789,621 UART: [afmc] CDI.KEYID = 6
2,789,983 UART: [afmc] SUBJECT.KEYID = 7
2,790,408 UART: [afmc] AUTHORITY.KEYID = 5
2,825,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,048 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,776 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,661 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,380 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,134 UART: [afmc] --
2,869,254 UART: [cold-reset] --
2,870,110 UART: [state] Locking Datavault
2,871,149 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,753 UART: [state] Locking ICCM
2,872,221 UART: [exit] Launching FMC @ 0x40000130
2,877,550 UART:
2,877,566 UART: Running Caliptra FMC ...
2,877,974 UART:
2,878,117 UART: [state] CFI Enabled
2,888,858 UART: [fht] FMC Alias Private Key: 7
2,996,637 UART: [art] Extend RT PCRs Done
2,997,065 UART: [art] Lock RT PCRs Done
2,998,139 UART: [art] Populate DV Done
3,006,426 UART: [fht] FMC Alias Private Key: 7
3,007,358 UART: [art] Derive CDI
3,007,638 UART: [art] Store in in slot 0x4
3,092,901 UART: [art] Derive Key Pair
3,093,261 UART: [art] Store priv key in slot 0x5
3,106,237 UART: [art] Derive Key Pair - Done
3,120,940 UART: [art] Signing Cert with AUTHO
3,121,420 UART: RITY.KEYID = 7
3,136,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,231 UART: [art] PUB.X = 25B47258E68C13E4B84DCA606759FB154AB38801A8E421FB6912148A38AD63149F3BC503057CBFF11BB683B1295E50DF
3,143,994 UART: [art] PUB.Y = AC0448B5CA545835FAC63E8173D657AC502B40340BA0E693E2E81F653FA91E59CAFD9DA7F6F84D462DCDD271948F25B4
3,150,950 UART: [art] SIG.R = 06B3E15093BEAA1C3A0EA300F3D3E509028FF93DC7A36964E59D36C05B4F3729C040F4F2855EB0A501CF9012E8336AA6
3,157,689 UART: [art] SIG.S = 4B4BA014B221B79D1B6A48E5E957381D3D8E54ED9CFB4F26DAFC9B7C90927CE732B1894C460FC11DD9EBC192373630EB
3,181,549 UART: Caliptra RT
3,181,894 UART: [state] CFI Enabled
3,289,971 UART: [rt] RT listening for mailbox commands...
3,290,634 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,639 UART: [rt]cmd =0x46504c54, len=4
3,322,032 >>> mbox cmd response data (8 bytes)
3,322,241 UART: [rt] FIPS self test
3,322,569 UART: [kat] ++
3,322,721 UART: [kat] sha1
3,326,817 UART: [kat] SHA2-256
3,328,839 UART: [kat] SHA2-384
3,331,724 UART: [kat] SHA2-512-ACC
3,333,651 UART: [kat] ECC-384
3,342,846 UART: Fatal Error: 0x90040005
3,344,396 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,344,401 >>> mbox cmd response: failed
3,344,401 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,344,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,093 UART: [state] LifecycleState = Unprovisioned
86,748 UART: [state] DebugLocked = No
87,460 UART: [state] WD Timer not started. Device not locked for debugging
88,659 UART: [kat] SHA2-256
894,309 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,434 UART: [kat] ++
898,586 UART: [kat] sha1
902,834 UART: [kat] SHA2-256
904,774 UART: [kat] SHA2-384
907,643 UART: [kat] SHA2-512-ACC
909,544 UART: [kat] ECC-384
919,279 UART: [kat] HMAC-384Kdf
924,089 UART: [kat] LMS
1,172,417 UART: [kat] --
1,173,656 UART: [cold-reset] ++
1,174,170 UART: [fht] FHT @ 0x50003400
1,176,861 UART: [idev] ++
1,177,029 UART: [idev] CDI.KEYID = 6
1,177,389 UART: [idev] SUBJECT.KEYID = 7
1,177,813 UART: [idev] UDS.KEYID = 0
1,178,158 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,939 UART: [idev] Erasing UDS.KEYID = 0
1,203,562 UART: [idev] Sha1 KeyId Algorithm
1,211,802 UART: [idev] --
1,212,860 UART: [ldev] ++
1,213,028 UART: [ldev] CDI.KEYID = 6
1,213,391 UART: [ldev] SUBJECT.KEYID = 5
1,213,817 UART: [ldev] AUTHORITY.KEYID = 7
1,214,280 UART: [ldev] FE.KEYID = 1
1,219,458 UART: [ldev] Erasing FE.KEYID = 1
1,245,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,496 UART: [ldev] --
1,284,969 UART: [fwproc] Wait for Commands...
1,285,595 UART: [fwproc] Recv command 0x46574c44
1,286,323 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,048 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,219 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,104 ready_for_fw is high
1,061,104 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,688 >>> mbox cmd response: success
2,702,564 UART:
2,702,580 UART: Running Caliptra FMC ...
2,702,988 UART:
2,703,131 UART: [state] CFI Enabled
2,713,730 UART: [fht] FMC Alias Private Key: 7
2,821,823 UART: [art] Extend RT PCRs Done
2,822,251 UART: [art] Lock RT PCRs Done
2,823,795 UART: [art] Populate DV Done
2,831,824 UART: [fht] FMC Alias Private Key: 7
2,832,822 UART: [art] Derive CDI
2,833,102 UART: [art] Store in in slot 0x4
2,918,679 UART: [art] Derive Key Pair
2,919,039 UART: [art] Store priv key in slot 0x5
2,932,555 UART: [art] Derive Key Pair - Done
2,947,311 UART: [art] Signing Cert with AUTHO
2,947,791 UART: RITY.KEYID = 7
2,962,851 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,616 UART: [art] PUB.X = 8637DA79C290C8950C0AC293D569CD52EAB8B2DD7C93E05CEA032B28BAE974229AA452917D35B17A7508C725239DCE44
2,970,380 UART: [art] PUB.Y = 08A125FAD8BED6F5CE87F607BEA839C812764C4356968AD4A17DEB066E29E7F79C868974501C22B2E45DED7B9B4EEABD
2,977,337 UART: [art] SIG.R = 700146CB9AB9261151F531C6E7BACC5F425CC13786B0D4DBAD346B383503235359F690C7C84DC8BE12474FE4CF4F175C
2,984,107 UART: [art] SIG.S = AE001E78D0A11220EB3E9813D1ACE1F371A195AFAA1FD9A186BF5B993728B497EB3A45372A37009B8EC2C21BBD330503
3,008,170 UART: Caliptra RT
3,008,515 UART: [state] CFI Enabled
3,117,034 UART: [rt] RT listening for mailbox commands...
3,117,697 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,562 UART: [rt]cmd =0x46504c54, len=4
3,148,609 >>> mbox cmd response data (8 bytes)
3,148,860 UART: [rt] FIPS self test
3,149,188 UART: [kat] ++
3,149,340 UART: [kat] sha1
3,153,720 UART: [kat] SHA2-256
3,155,742 UART: [kat] SHA2-384
3,158,667 UART: [kat] SHA2-512-ACC
3,160,594 UART: [kat] ECC-384
3,168,855 UART: Fatal Error: 0x90040005
3,170,405 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,410 >>> mbox cmd response: failed
3,170,410 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,692 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,104 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
916,108 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,169,813 UART: [cold-reset] ++
1,170,301 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,174,255 ready_for_fw is high
1,174,255 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,833 UART: [idev] Erasing UDS.KEYID = 0
1,199,089 UART: [idev] Sha1 KeyId Algorithm
1,207,903 UART: [idev] --
1,208,746 UART: [ldev] ++
1,208,914 UART: [ldev] CDI.KEYID = 6
1,209,278 UART: [ldev] SUBJECT.KEYID = 5
1,209,705 UART: [ldev] AUTHORITY.KEYID = 7
1,210,168 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,242,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,210 UART: [ldev] --
1,281,596 UART: [fwproc] Wait for Commands...
1,282,213 UART: [fwproc] Recv command 0x46574c44
1,282,946 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,843 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,152 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,530 >>> mbox cmd response: success
2,787,771 UART: [afmc] ++
2,787,939 UART: [afmc] CDI.KEYID = 6
2,788,302 UART: [afmc] SUBJECT.KEYID = 7
2,788,728 UART: [afmc] AUTHORITY.KEYID = 5
2,824,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,300 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,029 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,912 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,631 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,376 UART: [afmc] --
2,867,414 UART: [cold-reset] --
2,868,258 UART: [state] Locking Datavault
2,869,327 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,931 UART: [state] Locking ICCM
2,870,359 UART: [exit] Launching FMC @ 0x40000130
2,875,688 UART:
2,875,704 UART: Running Caliptra FMC ...
2,876,112 UART:
2,876,166 UART: [state] CFI Enabled
2,886,509 UART: [fht] FMC Alias Private Key: 7
2,994,676 UART: [art] Extend RT PCRs Done
2,995,104 UART: [art] Lock RT PCRs Done
2,996,650 UART: [art] Populate DV Done
3,005,029 UART: [fht] FMC Alias Private Key: 7
3,006,167 UART: [art] Derive CDI
3,006,447 UART: [art] Store in in slot 0x4
3,092,226 UART: [art] Derive Key Pair
3,092,586 UART: [art] Store priv key in slot 0x5
3,105,636 UART: [art] Derive Key Pair - Done
3,119,934 UART: [art] Signing Cert with AUTHO
3,120,414 UART: RITY.KEYID = 7
3,135,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,527 UART: [art] PUB.X = 12B2A192664B677E2F3AD1BCE600B711E753EA766FE07CD8BA37720A7D3C45727E5D3EAD55A8A379B9641BB6FC7FC81F
3,143,286 UART: [art] PUB.Y = 7A0C077A0FEF9B7CD333AA9E9B6483F6E48D3287CCA99AE7BDF54C14DBB6A0F61230C5928F8518F8A1B95DCC15835C4D
3,150,245 UART: [art] SIG.R = 1494ACC57F2BCEAAA18ED2F9E4E4F8EB4AF776E92DB67B505FF04FEC61919E4E78494178A6BB1560D5E519B539D99447
3,157,029 UART: [art] SIG.S = D13D39BFEE0961632403F625CC6D8FCD1666E1AAE906843F54B947E0E6E8F1933378B8DD857D081D1A4F4123937FAEB1
3,179,900 UART: Caliptra RT
3,180,153 UART: [state] CFI Enabled
3,288,210 UART: [rt] RT listening for mailbox commands...
3,288,873 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,006 UART: [rt]cmd =0x46504c54, len=4
3,320,195 >>> mbox cmd response data (8 bytes)
3,320,384 UART: [rt] FIPS self test
3,320,712 UART: [kat] ++
3,320,864 UART: [kat] sha1
3,325,102 UART: [kat] SHA2-256
3,327,124 UART: [kat] SHA2-384
3,329,789 UART: [kat] SHA2-512-ACC
3,331,716 UART: [kat] ECC-384
3,340,953 UART: Fatal Error: 0x90040005
3,342,503 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,342,508 >>> mbox cmd response: failed
3,342,508 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,342,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,500 UART: [kat] HMAC-384Kdf
921,046 UART: [kat] LMS
1,169,358 UART: [kat] --
1,170,327 UART: [cold-reset] ++
1,170,885 UART: [fht] FHT @ 0x50003400
1,173,545 UART: [idev] ++
1,173,713 UART: [idev] CDI.KEYID = 6
1,174,074 UART: [idev] SUBJECT.KEYID = 7
1,174,499 UART: [idev] UDS.KEYID = 0
1,174,845 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,485 UART: [idev] Erasing UDS.KEYID = 0
1,199,413 UART: [idev] Sha1 KeyId Algorithm
1,208,329 UART: [idev] --
1,209,430 UART: [ldev] ++
1,209,598 UART: [ldev] CDI.KEYID = 6
1,209,962 UART: [ldev] SUBJECT.KEYID = 5
1,210,389 UART: [ldev] AUTHORITY.KEYID = 7
1,210,852 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,242,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,080 UART: [ldev] --
1,281,440 UART: [fwproc] Wait for Commands...
1,282,191 UART: [fwproc] Recv command 0x46574c44
1,282,924 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,526 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,818 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,838 ready_for_fw is high
1,055,838 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,596 >>> mbox cmd response: success
2,698,644 UART:
2,698,660 UART: Running Caliptra FMC ...
2,699,068 UART:
2,699,122 UART: [state] CFI Enabled
2,709,697 UART: [fht] FMC Alias Private Key: 7
2,817,716 UART: [art] Extend RT PCRs Done
2,818,144 UART: [art] Lock RT PCRs Done
2,819,632 UART: [art] Populate DV Done
2,827,779 UART: [fht] FMC Alias Private Key: 7
2,828,891 UART: [art] Derive CDI
2,829,171 UART: [art] Store in in slot 0x4
2,914,836 UART: [art] Derive Key Pair
2,915,196 UART: [art] Store priv key in slot 0x5
2,927,902 UART: [art] Derive Key Pair - Done
2,942,582 UART: [art] Signing Cert with AUTHO
2,943,062 UART: RITY.KEYID = 7
2,958,144 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,909 UART: [art] PUB.X = 0B2A92CE9168913E571DB05A1E24540D50D888C2ED77F154F02076770F9834AA13EEF7CB9D23179518DF66A9319AD686
2,965,668 UART: [art] PUB.Y = B785AD192B717C7FD55B2BA587D3BB1368764002ACED26F8C2647DD5C1CCBB348323243FA1FE276C567FB695E2A9B908
2,972,622 UART: [art] SIG.R = 5D0A18BFDE74E8F9BCF447069D816C48C11383237AF8B245DB9225DD708F99C1C520AE4E1F9096F160D6E30BEC51630C
2,979,388 UART: [art] SIG.S = EC12E5E0CA2069C16DB3BC3303176076264553B08025C0CF54C9C9C760EA18A6CC5776EB124428C2BB9BAE28D773BD6D
3,003,178 UART: Caliptra RT
3,003,431 UART: [state] CFI Enabled
3,111,660 UART: [rt] RT listening for mailbox commands...
3,112,323 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,126 UART: [rt]cmd =0x46504c54, len=4
3,143,197 >>> mbox cmd response data (8 bytes)
3,143,488 UART: [rt] FIPS self test
3,143,816 UART: [kat] ++
3,143,968 UART: [kat] sha1
3,148,062 UART: [kat] SHA2-256
3,150,084 UART: [kat] SHA2-384
3,152,979 UART: [kat] SHA2-512-ACC
3,154,906 UART: [kat] ECC-384
3,164,041 UART: Fatal Error: 0x90040005
3,165,591 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,596 >>> mbox cmd response: failed
3,165,596 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,390 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,633,100 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,126 UART: [kat] SHA2-256
902,066 UART: [kat] SHA2-384
904,915 UART: [kat] SHA2-512-ACC
906,816 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,440 UART: [cold-reset] ++
1,170,876 UART: [fht] FHT @ 0x50003400
1,173,662 UART: [idev] ++
1,173,830 UART: [idev] CDI.KEYID = 6
1,174,191 UART: [idev] SUBJECT.KEYID = 7
1,174,616 UART: [idev] UDS.KEYID = 0
1,174,962 ready_for_fw is high
1,174,962 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,604 UART: [idev] Erasing UDS.KEYID = 0
1,199,458 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,245 UART: [ldev] ++
1,209,413 UART: [ldev] CDI.KEYID = 6
1,209,777 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,242,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,755 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x46574c44
1,283,129 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,704 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,013 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,325 >>> mbox cmd response: success
2,788,560 UART: [afmc] ++
2,788,728 UART: [afmc] CDI.KEYID = 6
2,789,091 UART: [afmc] SUBJECT.KEYID = 7
2,789,517 UART: [afmc] AUTHORITY.KEYID = 5
2,825,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,891 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,047 UART: [afmc] --
2,869,125 UART: [cold-reset] --
2,869,959 UART: [state] Locking Datavault
2,871,000 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,604 UART: [state] Locking ICCM
2,872,092 UART: [exit] Launching FMC @ 0x40000130
2,877,421 UART:
2,877,437 UART: Running Caliptra FMC ...
2,877,845 UART:
2,877,988 UART: [state] CFI Enabled
2,888,449 UART: [fht] FMC Alias Private Key: 7
2,996,456 UART: [art] Extend RT PCRs Done
2,996,884 UART: [art] Lock RT PCRs Done
2,998,426 UART: [art] Populate DV Done
3,006,729 UART: [fht] FMC Alias Private Key: 7
3,007,863 UART: [art] Derive CDI
3,008,143 UART: [art] Store in in slot 0x4
3,093,546 UART: [art] Derive Key Pair
3,093,906 UART: [art] Store priv key in slot 0x5
3,106,880 UART: [art] Derive Key Pair - Done
3,122,006 UART: [art] Signing Cert with AUTHO
3,122,486 UART: RITY.KEYID = 7
3,138,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,793 UART: [art] PUB.X = 3CE1AA7FC089D5C72EBEB1F0F99B6D916FB9D8CF825CD0164A3DADDBF6B531576E733F808BE7AB67F3D8DC56E85EE31C
3,145,591 UART: [art] PUB.Y = C968A4743296FE81F7B737467CEC7492462D7A2519E4F79CA038D9F1FC0C047E9E9B33332414D5667C8621A2DE4745ED
3,152,533 UART: [art] SIG.R = EB2DE214A67BBC8D2EBF0FFE1B8FA74DB136F2225C3056B1DA90A0E7CA55A339DDEBC8170BA066AB7D95A0BE2D9C2261
3,159,325 UART: [art] SIG.S = 8FDA393CE44071BAB6479A05CF667ACE95AE351EFA6AE1D7EECB040EC0B3EDD02DE467A2BEFDA09EBA104A77B3237A70
3,182,951 UART: Caliptra RT
3,183,296 UART: [state] CFI Enabled
3,290,962 UART: [rt] RT listening for mailbox commands...
3,291,625 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,352 UART: [rt]cmd =0x46504c54, len=4
3,322,355 >>> mbox cmd response data (8 bytes)
3,322,660 UART: [rt] FIPS self test
3,322,988 UART: [kat] ++
3,323,140 UART: [kat] sha1
3,327,348 UART: [kat] SHA2-256
3,329,370 UART: [kat] SHA2-384
3,332,269 UART: [kat] SHA2-512-ACC
3,334,196 UART: [kat] ECC-384
3,343,111 UART: Fatal Error: 0x90040005
3,344,661 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,344,666 >>> mbox cmd response: failed
3,344,666 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,344,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,997 UART: [state] LifecycleState = Unprovisioned
85,652 UART: [state] DebugLocked = No
86,258 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
891,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,151 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,169,890 UART: [cold-reset] ++
1,170,268 UART: [fht] FHT @ 0x50003400
1,172,946 UART: [idev] ++
1,173,114 UART: [idev] CDI.KEYID = 6
1,173,475 UART: [idev] SUBJECT.KEYID = 7
1,173,900 UART: [idev] UDS.KEYID = 0
1,174,246 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,078 UART: [idev] Erasing UDS.KEYID = 0
1,199,534 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,443 UART: [ldev] ++
1,209,611 UART: [ldev] CDI.KEYID = 6
1,209,975 UART: [ldev] SUBJECT.KEYID = 5
1,210,402 UART: [ldev] AUTHORITY.KEYID = 7
1,210,865 UART: [ldev] FE.KEYID = 1
1,216,039 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,025 UART: [ldev] --
1,281,457 UART: [fwproc] Wait for Commands...
1,282,218 UART: [fwproc] Recv command 0x46574c44
1,282,951 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,540 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,849 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,083 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,767 ready_for_fw is high
1,055,767 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,093 >>> mbox cmd response: success
2,697,869 UART:
2,697,885 UART: Running Caliptra FMC ...
2,698,293 UART:
2,698,436 UART: [state] CFI Enabled
2,708,879 UART: [fht] FMC Alias Private Key: 7
2,817,496 UART: [art] Extend RT PCRs Done
2,817,924 UART: [art] Lock RT PCRs Done
2,819,228 UART: [art] Populate DV Done
2,827,355 UART: [fht] FMC Alias Private Key: 7
2,828,355 UART: [art] Derive CDI
2,828,635 UART: [art] Store in in slot 0x4
2,914,428 UART: [art] Derive Key Pair
2,914,788 UART: [art] Store priv key in slot 0x5
2,928,274 UART: [art] Derive Key Pair - Done
2,942,835 UART: [art] Signing Cert with AUTHO
2,943,315 UART: RITY.KEYID = 7
2,958,415 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,180 UART: [art] PUB.X = 8B80976A13614E0791DA0C917FC12931EF2B225F4AA258256ED8754809CF681EAD69D94EA5B3A283DF33AEFE780D3740
2,965,942 UART: [art] PUB.Y = FD9445C1EEA1C61FFC33748533B21E4B6C0975323588B20A710F48210C675BCE08C9DFA9835CC8CCDCBEF357003325F4
2,972,863 UART: [art] SIG.R = AF60292106F9BA55B43B7E47ECAEBD0C2E026C4FB70B62885034799FD272F4FA4DB36CF3A2B99559977897E158C0AC6A
2,979,631 UART: [art] SIG.S = 131E3ADCBA3EFE969BE00920AFFDF20D09BAC421D4905E76756C41A2F402CC79F9B4FED15E77D9F1B3A9763C7FF6BC94
3,003,432 UART: Caliptra RT
3,003,777 UART: [state] CFI Enabled
3,112,278 UART: [rt] RT listening for mailbox commands...
3,112,941 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,948 UART: [rt]cmd =0x46504c54, len=4
3,143,869 >>> mbox cmd response data (8 bytes)
3,144,022 UART: [rt] FIPS self test
3,144,350 UART: [kat] ++
3,144,502 UART: [kat] sha1
3,148,654 UART: [kat] SHA2-256
3,150,676 UART: [kat] SHA2-384
3,153,381 UART: [kat] SHA2-512-ACC
3,155,308 UART: [kat] ECC-384
3,164,093 UART: Fatal Error: 0x90040005
3,165,643 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,648 >>> mbox cmd response: failed
3,165,648 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,383 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,615 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,678,070 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,822,321 >>> mbox cmd response: failed
3,822,874 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,966,227 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
4,874,491 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,448,429 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,673,915 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,818,203 >>> mbox cmd response: failed
3,818,793 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,962,127 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
4,860,180 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,446,627 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,013,050 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,157,290 >>> mbox cmd response: failed
4,157,870 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,301,189 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,746,542 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,187,289 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
4,006,060 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,150,169 >>> mbox cmd response: failed
4,150,735 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,294,063 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
20,761,073 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
34,206,487 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
3,462,832 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,607,508 >>> mbox cmd response: failed
3,608,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,751,825 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
3,486,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,277,809 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,438,977 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,583,687 >>> mbox cmd response: failed
3,584,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,728,509 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,442,287 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,228,590 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,501 writing to cptra_bootfsm_go
3,785,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,930,482 >>> mbox cmd response: failed
3,931,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,074,799 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
19,571,549 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,300,013 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,782,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,927,202 >>> mbox cmd response: failed
3,927,760 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,071,533 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
19,569,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,323,867 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
3,437,672 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,582,531 >>> mbox cmd response: failed
3,583,098 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,726,746 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,425,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,258,160 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,792,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,937,578 >>> mbox cmd response: failed
3,938,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
4,081,864 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
19,567,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,288,863 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,731 >>> mbox cmd response: failed
816,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,661 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,782 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,639 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,647 >>> mbox cmd response: failed
816,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,477 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,894 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,958 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,966 >>> mbox cmd response: failed
817,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,915 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,112 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,120 >>> mbox cmd response: failed
817,120 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,231 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,267 >>> mbox cmd response: failed
817,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,011 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,634 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,383 >>> mbox cmd response: failed
816,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,993 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,726 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,964 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,972 >>> mbox cmd response: failed
816,972 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,978 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,561 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,518 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,526 >>> mbox cmd response: failed
817,526 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,215 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,987 >>> mbox cmd response: failed
816,987 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,227 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,950 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,757 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,765 >>> mbox cmd response: failed
816,765 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
816,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,307 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,132 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,462 >>> mbox cmd response: failed
817,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,447 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,650 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,658 >>> mbox cmd response: failed
817,658 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
817,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,114 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,111 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,102 UART:
192,465 UART: Running Caliptra ROM ...
193,563 UART:
193,704 UART: [state] CFI Enabled
263,957 UART: [state] LifecycleState = Unprovisioned
265,861 UART: [state] DebugLocked = No
268,805 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,461 UART: [kat] SHA2-256
443,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,725 UART: [kat] ++
454,176 UART: [kat] sha1
465,333 UART: [kat] SHA2-256
467,998 UART: [kat] SHA2-384
473,001 UART: [kat] SHA2-512-ACC
475,402 UART: [kat] ECC-384
2,767,324 UART: [kat] HMAC-384Kdf
2,778,158 UART: [kat] LMS
3,968,399 UART: [kat] --
3,971,993 UART: [cold-reset] ++
3,973,193 UART: [fht] Storing FHT @ 0x50003400
3,984,757 UART: [idev] ++
3,985,406 UART: [idev] CDI.KEYID = 6
3,986,317 UART: [idev] SUBJECT.KEYID = 7
3,987,566 UART: [idev] UDS.KEYID = 0
3,988,511 ready_for_fw is high
3,988,714 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,133,351 UART: [idev] Erasing UDS.KEYID = 0
7,325,895 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,334 UART: [idev] --
7,350,281 UART: [ldev] ++
7,350,876 UART: [ldev] CDI.KEYID = 6
7,351,898 UART: [ldev] SUBJECT.KEYID = 5
7,353,065 UART: [ldev] AUTHORITY.KEYID = 7
7,354,305 UART: [ldev] FE.KEYID = 1
7,400,557 UART: [ldev] Erasing FE.KEYID = 1
10,734,747 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,812 UART: [ldev] --
13,094,770 UART: [fwproc] Waiting for Commands...
13,096,477 UART: [fwproc] Received command 0x46574c44
13,098,670 UART: [fwproc] Received Image of size 114996 bytes
17,161,165 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,236,500 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,305,389 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,625,717 >>> mbox cmd response: success
17,629,036 UART: [afmc] ++
17,629,630 UART: [afmc] CDI.KEYID = 6
17,630,515 UART: [afmc] SUBJECT.KEYID = 7
17,631,784 UART: [afmc] AUTHORITY.KEYID = 5
20,984,248 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,395 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,698 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,073 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,930 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,395 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,480 UART: [afmc] --
23,360,212 UART: [cold-reset] --
23,365,423 UART: [state] Locking Datavault
23,372,353 UART: [state] Locking PCR0, PCR1 and PCR31
23,374,128 UART: [state] Locking ICCM
23,375,471 UART: [exit] Launching FMC @ 0x40000130
23,383,865 UART:
23,384,110 UART: Running Caliptra FMC ...
23,385,213 UART:
23,385,375 UART: [state] CFI Enabled
23,446,444 UART: [fht] FMC Alias Private Key: 7
25,784,288 UART: [art] Extend RT PCRs Done
25,785,503 UART: [art] Lock RT PCRs Done
25,787,155 UART: [art] Populate DV Done
25,792,778 UART: [fht] FMC Alias Private Key: 7
25,794,421 UART: [art] Derive CDI
25,795,155 UART: [art] Store in in slot 0x4
25,855,717 UART: [art] Derive Key Pair
25,856,764 UART: [art] Store priv key in slot 0x5
29,149,797 UART: [art] Derive Key Pair - Done
29,162,656 UART: [art] Signing Cert with AUTHO
29,163,958 UART: RITY.KEYID = 7
31,452,249 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,750 UART: [art] PUB.X = AC1749B309D6510367DA058D4B4A2BBAE0408D2FBCAB619F01876CBF1DFD2755BA475B66AD0FE528C1D5EA16991D09D6
31,461,007 UART: [art] PUB.Y = B55B916D314C1F920709E5E9B3F7049AAF34CB0EB8BAD57E23B55D5365A48C2C6BC4DD79EE38A7E1AB8614211C01512E
31,468,269 UART: [art] SIG.R = B1C66CBE84F2D9C57D3A378B400F619E0D26F64DE528419D18031099ECBB73C3CFD2368A0CBFD8D866C2AA01BA271C57
31,475,626 UART: [art] SIG.S = AE9EC7C00440F38121EC6FBDF24190D8F03593B623EB22D3B3853389C5056CF2FEC31DA97D9AC01DFDF98BC3B777BC92
32,781,208 UART: Caliptra RT
32,781,929 UART: [state] CFI Enabled
32,942,718 UART: [rt] RT listening for mailbox commands...
32,944,587 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,974,382 UART: [rt]cmd =0x46504c54, len=4
32,975,956 >>> mbox cmd response data (8 bytes)
32,977,290 UART: [rt] FIPS self test
32,978,230 UART: [kat] ++
32,978,681 UART: [kat] sha1
32,983,192 UART: [kat] SHA2-256
32,985,125 UART: [kat] SHA2-384
32,988,027 UART: [kat] SHA2-512-ACC
32,990,274 UART: [kat] ECC-384
33,959,005 UART: Fatal Error: 0x90040004
33,994,430 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,139,294 >>> mbox cmd response: failed
34,139,944 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,284,216 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,089 UART:
190,380 UART: Running Caliptra ROM ...
191,583 UART:
191,750 UART: [state] CFI Enabled
261,857 UART: [state] LifecycleState = Unprovisioned
263,801 UART: [state] DebugLocked = No
266,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,203 UART: [kat] SHA2-256
440,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,377 UART: [kat] ++
451,852 UART: [kat] sha1
461,327 UART: [kat] SHA2-256
464,013 UART: [kat] SHA2-384
469,290 UART: [kat] SHA2-512-ACC
471,630 UART: [kat] ECC-384
2,763,419 UART: [kat] HMAC-384Kdf
2,776,141 UART: [kat] LMS
3,966,437 UART: [kat] --
3,970,663 UART: [cold-reset] ++
3,973,028 UART: [fht] Storing FHT @ 0x50003400
3,984,296 UART: [idev] ++
3,984,882 UART: [idev] CDI.KEYID = 6
3,985,847 UART: [idev] SUBJECT.KEYID = 7
3,987,008 UART: [idev] UDS.KEYID = 0
3,988,627 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,133,203 UART: [idev] Erasing UDS.KEYID = 0
7,322,297 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,702 UART: [idev] --
7,347,446 UART: [ldev] ++
7,348,068 UART: [ldev] CDI.KEYID = 6
7,348,982 UART: [ldev] SUBJECT.KEYID = 5
7,350,195 UART: [ldev] AUTHORITY.KEYID = 7
7,351,481 UART: [ldev] FE.KEYID = 1
7,398,699 UART: [ldev] Erasing FE.KEYID = 1
10,730,681 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,420 UART: [ldev] --
13,092,012 UART: [fwproc] Waiting for Commands...
13,094,610 UART: [fwproc] Received command 0x46574c44
13,096,801 UART: [fwproc] Received Image of size 114996 bytes
17,160,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,235,196 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,061 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,623,869 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,808,009 ready_for_fw is high
3,808,433 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,907,851 >>> mbox cmd response: success
23,608,380 UART:
23,608,791 UART: Running Caliptra FMC ...
23,609,931 UART:
23,610,096 UART: [state] CFI Enabled
23,678,369 UART: [fht] FMC Alias Private Key: 7
26,016,238 UART: [art] Extend RT PCRs Done
26,017,472 UART: [art] Lock RT PCRs Done
26,019,025 UART: [art] Populate DV Done
26,024,585 UART: [fht] FMC Alias Private Key: 7
26,026,192 UART: [art] Derive CDI
26,027,009 UART: [art] Store in in slot 0x4
26,087,798 UART: [art] Derive Key Pair
26,088,844 UART: [art] Store priv key in slot 0x5
29,381,732 UART: [art] Derive Key Pair - Done
29,394,199 UART: [art] Signing Cert with AUTHO
29,395,517 UART: RITY.KEYID = 7
31,683,453 UART: [art] Erasing AUTHORITY.KEYID = 7
31,684,973 UART: [art] PUB.X = 88BAC86A055903BA94ACA71C7052FC965AA7545D5128C02679001F2C2E5329ED1DEF23E6D1B75B45F53D51EED35C7A3B
31,692,170 UART: [art] PUB.Y = 20A8B583DC8B12178DD73BA919F354EAA1ED1CBF5A8D3C780B6E9D59C8087E6F1EFE07F7B202C9744B36FFD57FDF9B57
31,699,491 UART: [art] SIG.R = 537F2CA392B5A4501CB50378F36253F40F4747F27DC543AD7720A7BB3C9FB5C14A00AA346C6C1680226AF216CD117546
31,706,827 UART: [art] SIG.S = 80C80A1F86D3873D514A90B0D48945782A893624916C5A4A46B401F3C2F1B6C65D3C74F51E0453C910BA14BF6981F57D
33,011,736 UART: Caliptra RT
33,012,443 UART: [state] CFI Enabled
33,175,401 UART: [rt] RT listening for mailbox commands...
33,177,282 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,206,773 UART: [rt]cmd =0x46504c54, len=4
33,208,306 >>> mbox cmd response data (8 bytes)
33,209,423 UART: [rt] FIPS self test
33,210,368 UART: [kat] ++
33,210,817 UART: [kat] sha1
33,215,435 UART: [kat] SHA2-256
33,217,364 UART: [kat] SHA2-384
33,220,271 UART: [kat] SHA2-512-ACC
33,222,515 UART: [kat] ECC-384
34,191,882 UART: Fatal Error: 0x90040004
34,227,318 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,371,619 >>> mbox cmd response: failed
34,372,272 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,516,631 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,780,913 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,884,127 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,551 UART:
192,935 UART: Running Caliptra ROM ...
194,064 UART:
603,562 UART: [state] CFI Enabled
616,159 UART: [state] LifecycleState = Unprovisioned
618,113 UART: [state] DebugLocked = No
620,701 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,633 UART: [kat] SHA2-256
795,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,975 UART: [kat] ++
806,426 UART: [kat] sha1
817,586 UART: [kat] SHA2-256
820,315 UART: [kat] SHA2-384
826,662 UART: [kat] SHA2-512-ACC
829,043 UART: [kat] ECC-384
3,113,069 UART: [kat] HMAC-384Kdf
3,125,856 UART: [kat] LMS
4,315,942 UART: [kat] --
4,320,800 UART: [cold-reset] ++
4,322,609 UART: [fht] Storing FHT @ 0x50003400
4,335,515 UART: [idev] ++
4,336,077 UART: [idev] CDI.KEYID = 6
4,337,041 UART: [idev] SUBJECT.KEYID = 7
4,338,289 UART: [idev] UDS.KEYID = 0
4,339,217 ready_for_fw is high
4,339,407 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,483,831 UART: [idev] Erasing UDS.KEYID = 0
7,622,965 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,807 UART: [idev] --
7,649,012 UART: [ldev] ++
7,649,602 UART: [ldev] CDI.KEYID = 6
7,650,573 UART: [ldev] SUBJECT.KEYID = 5
7,651,787 UART: [ldev] AUTHORITY.KEYID = 7
7,653,040 UART: [ldev] FE.KEYID = 1
7,664,125 UART: [ldev] Erasing FE.KEYID = 1
10,950,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,907 UART: [ldev] --
13,310,899 UART: [fwproc] Waiting for Commands...
13,313,262 UART: [fwproc] Received command 0x46574c44
13,315,444 UART: [fwproc] Received Image of size 114996 bytes
17,385,662 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,463,034 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,531,944 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,852,394 >>> mbox cmd response: success
17,856,482 UART: [afmc] ++
17,857,091 UART: [afmc] CDI.KEYID = 6
17,857,986 UART: [afmc] SUBJECT.KEYID = 7
17,859,202 UART: [afmc] AUTHORITY.KEYID = 5
21,174,300 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,466,516 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,468,772 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,483,176 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,497,986 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,512,417 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,534,112 UART: [afmc] --
23,538,576 UART: [cold-reset] --
23,543,352 UART: [state] Locking Datavault
23,549,620 UART: [state] Locking PCR0, PCR1 and PCR31
23,551,371 UART: [state] Locking ICCM
23,553,118 UART: [exit] Launching FMC @ 0x40000130
23,561,507 UART:
23,561,772 UART: Running Caliptra FMC ...
23,562,881 UART:
23,563,041 UART: [state] CFI Enabled
23,571,092 UART: [fht] FMC Alias Private Key: 7
25,901,445 UART: [art] Extend RT PCRs Done
25,902,674 UART: [art] Lock RT PCRs Done
25,904,223 UART: [art] Populate DV Done
25,909,691 UART: [fht] FMC Alias Private Key: 7
25,911,392 UART: [art] Derive CDI
25,912,128 UART: [art] Store in in slot 0x4
25,954,825 UART: [art] Derive Key Pair
25,955,886 UART: [art] Store priv key in slot 0x5
29,197,902 UART: [art] Derive Key Pair - Done
29,210,637 UART: [art] Signing Cert with AUTHO
29,211,943 UART: RITY.KEYID = 7
31,491,059 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,603 UART: [art] PUB.X = DF1471BD2477F066DF7C432BDF68E4189E0043DC77AA6C5DEEEAB2D4D9A01601C5A28D2754E06CC63AEA2619F0AFA40F
31,499,808 UART: [art] PUB.Y = 9A1E448EC7E8704E8F899EBD70AC390AAF5DBE5B38589B6075E226F3A25F56378F0E778D65E92CA1D3BEE79DFB56726D
31,507,114 UART: [art] SIG.R = EF52D1C5DC45796C1A21D1CD4FC7ABE5989FBE817737575677CE394474AF4EC37232DE22825D11471E6F49F421589B70
31,514,462 UART: [art] SIG.S = 221F4AA086361B916BB41C69256313DFE40BFE52091CC5A8BAAA24C92620E4F6DB683A6CA379C2DCD897447C35233E4B
32,819,863 UART: Caliptra RT
32,820,581 UART: [state] CFI Enabled
32,938,397 UART: [rt] RT listening for mailbox commands...
32,940,251 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,970,016 UART: [rt]cmd =0x46504c54, len=4
32,971,786 >>> mbox cmd response data (8 bytes)
32,973,097 UART: [rt] FIPS self test
32,974,052 UART: [kat] ++
32,974,503 UART: [kat] sha1
32,978,956 UART: [kat] SHA2-256
32,980,884 UART: [kat] SHA2-384
32,983,820 UART: [kat] SHA2-512-ACC
32,986,125 UART: [kat] ECC-384
33,950,225 UART: Fatal Error: 0x90040004
33,985,431 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,129,845 >>> mbox cmd response: failed
34,130,520 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,275,260 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
189,996 UART:
190,288 UART: Running Caliptra ROM ...
191,314 UART:
6,262,166 UART: [state] CFI Enabled
6,274,408 UART: [state] LifecycleState = Unprovisioned
6,276,382 UART: [state] DebugLocked = No
6,279,254 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,283,934 UART: [kat] SHA2-256
6,453,733 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,464,264 UART: [kat] ++
6,464,723 UART: [kat] sha1
6,475,827 UART: [kat] SHA2-256
6,478,519 UART: [kat] SHA2-384
6,483,806 UART: [kat] SHA2-512-ACC
6,486,210 UART: [kat] ECC-384
8,772,466 UART: [kat] HMAC-384Kdf
8,785,086 UART: [kat] LMS
9,975,202 UART: [kat] --
9,978,059 UART: [cold-reset] ++
9,979,567 UART: [fht] Storing FHT @ 0x50003400
9,990,404 UART: [idev] ++
9,990,965 UART: [idev] CDI.KEYID = 6
9,991,899 UART: [idev] SUBJECT.KEYID = 7
9,993,164 UART: [idev] UDS.KEYID = 0
9,994,731 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
10,139,087 UART: [idev] Erasing UDS.KEYID = 0
13,282,163 UART: [idev] Using Sha1 for KeyId Algorithm
13,303,878 UART: [idev] --
13,307,925 UART: [ldev] ++
13,308,491 UART: [ldev] CDI.KEYID = 6
13,309,426 UART: [ldev] SUBJECT.KEYID = 5
13,310,634 UART: [ldev] AUTHORITY.KEYID = 7
13,311,920 UART: [ldev] FE.KEYID = 1
13,323,463 UART: [ldev] Erasing FE.KEYID = 1
16,609,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,900,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,915,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,929,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,944,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,962,781 UART: [ldev] --
18,967,359 UART: [fwproc] Waiting for Commands...
18,970,700 UART: [fwproc] Received command 0x46574c44
18,972,949 UART: [fwproc] Received Image of size 114996 bytes
23,035,280 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,110,823 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,179,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
23,500,023 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,125,216 ready_for_fw is high
4,125,805 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,084,243 >>> mbox cmd response: success
23,724,387 UART:
23,724,809 UART: Running Caliptra FMC ...
23,725,928 UART:
23,726,089 UART: [state] CFI Enabled
23,733,985 UART: [fht] FMC Alias Private Key: 7
26,064,571 UART: [art] Extend RT PCRs Done
26,065,835 UART: [art] Lock RT PCRs Done
26,067,385 UART: [art] Populate DV Done
26,072,705 UART: [fht] FMC Alias Private Key: 7
26,074,249 UART: [art] Derive CDI
26,075,018 UART: [art] Store in in slot 0x4
26,117,629 UART: [art] Derive Key Pair
26,118,671 UART: [art] Store priv key in slot 0x5
29,360,729 UART: [art] Derive Key Pair - Done
29,373,565 UART: [art] Signing Cert with AUTHO
29,374,873 UART: RITY.KEYID = 7
31,654,398 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,906 UART: [art] PUB.X = F454629419728AAFA61009E9F037745376522D3C169CD291155C7C281044C03E0220CC6F61210CD77A39202775D43AB0
31,663,122 UART: [art] PUB.Y = 253C4AF824D8190307001AF720E06E12A1747894FD137FD91391BE53BB04CFEBE115A498F7727829B00537AD7DA5E785
31,670,336 UART: [art] SIG.R = FEFFC9B6B9ED36DE6FE842EF22EAD8363037EDC0E850AF109E0A7B1C8C971CDA661A4CFFB91EC4EF3264E63510952674
31,677,747 UART: [art] SIG.S = BF859EBC8CE8931BF0F4452254E1BD4572466E04D7F2BF2FF61C8FEA1E421081A451E1EBE04431DF4444F98CD88AB6AB
32,982,681 UART: Caliptra RT
32,983,452 UART: [state] CFI Enabled
33,101,615 UART: [rt] RT listening for mailbox commands...
33,103,466 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,133,260 UART: [rt]cmd =0x46504c54, len=4
33,135,105 >>> mbox cmd response data (8 bytes)
33,135,831 UART: [rt] FIPS self test
33,136,773 UART: [kat] ++
33,137,271 UART: [kat] sha1
33,141,891 UART: [kat] SHA2-256
33,143,889 UART: [kat] SHA2-384
33,146,783 UART: [kat] SHA2-512-ACC
33,149,057 UART: [kat] ECC-384
34,112,436 UART: Fatal Error: 0x90040004
34,147,725 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,292,172 >>> mbox cmd response: failed
34,292,788 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
34,437,204 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
9,620,428 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
23,582,047 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,329 UART:
192,700 UART: Running Caliptra ROM ...
193,825 UART:
193,988 UART: [state] CFI Enabled
262,903 UART: [state] LifecycleState = Unprovisioned
264,828 UART: [state] DebugLocked = No
267,491 UART: [state] WD Timer not started. Device not locked for debugging
271,240 UART: [kat] SHA2-256
450,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,942 UART: [kat] ++
462,433 UART: [kat] sha1
473,737 UART: [kat] SHA2-256
476,758 UART: [kat] SHA2-384
481,333 UART: [kat] SHA2-512-ACC
484,274 UART: [kat] ECC-384
2,949,082 UART: [kat] HMAC-384Kdf
2,970,720 UART: [kat] LMS
3,500,155 UART: [kat] --
3,505,575 UART: [cold-reset] ++
3,507,032 UART: [fht] FHT @ 0x50003400
3,517,552 UART: [idev] ++
3,518,118 UART: [idev] CDI.KEYID = 6
3,519,005 UART: [idev] SUBJECT.KEYID = 7
3,520,188 UART: [idev] UDS.KEYID = 0
3,521,187 ready_for_fw is high
3,521,407 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,666,521 UART: [idev] Erasing UDS.KEYID = 0
6,028,624 UART: [idev] Sha1 KeyId Algorithm
6,052,018 UART: [idev] --
6,055,507 UART: [ldev] ++
6,056,094 UART: [ldev] CDI.KEYID = 6
6,057,010 UART: [ldev] SUBJECT.KEYID = 5
6,058,176 UART: [ldev] AUTHORITY.KEYID = 7
6,059,413 UART: [ldev] FE.KEYID = 1
6,099,014 UART: [ldev] Erasing FE.KEYID = 1
8,603,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,625 UART: [ldev] --
10,413,774 UART: [fwproc] Wait for Commands...
10,415,271 UART: [fwproc] Recv command 0x46574c44
10,417,314 UART: [fwproc] Recv'd Img size: 115304 bytes
13,830,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,910,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,979,293 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,300,762 >>> mbox cmd response: success
14,304,844 UART: [afmc] ++
14,305,427 UART: [afmc] CDI.KEYID = 6
14,306,311 UART: [afmc] SUBJECT.KEYID = 7
14,307,549 UART: [afmc] AUTHORITY.KEYID = 5
16,847,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,573,154 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,588,943 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,604,980 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,620,849 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,643,841 UART: [afmc] --
18,647,972 UART: [cold-reset] --
18,651,832 UART: [state] Locking Datavault
18,655,896 UART: [state] Locking PCR0, PCR1 and PCR31
18,657,541 UART: [state] Locking ICCM
18,659,610 UART: [exit] Launching FMC @ 0x40000130
18,668,004 UART:
18,668,246 UART: Running Caliptra FMC ...
18,669,348 UART:
18,669,528 UART: [state] CFI Enabled
18,729,189 UART: [fht] FMC Alias Private Key: 7
20,492,657 UART: [art] Extend RT PCRs Done
20,493,880 UART: [art] Lock RT PCRs Done
20,495,364 UART: [art] Populate DV Done
20,500,719 UART: [fht] FMC Alias Private Key: 7
20,502,310 UART: [art] Derive CDI
20,503,048 UART: [art] Store in in slot 0x4
20,561,608 UART: [art] Derive Key Pair
20,562,649 UART: [art] Store priv key in slot 0x5
23,025,541 UART: [art] Derive Key Pair - Done
23,038,432 UART: [art] Signing Cert with AUTHO
23,039,749 UART: RITY.KEYID = 7
24,750,534 UART: [art] Erasing AUTHORITY.KEYID = 7
24,752,038 UART: [art] PUB.X = 1A184F070F8F080026D7E4B972E7D77361A3840D5FCFA8831DF832B9B0BF097C574D07DF2181813E49898700397E3FDC
24,759,231 UART: [art] PUB.Y = 786E81720EC2C80BE0F896DB7C60EA465767683FC8A07530AF29295AA4DD26A6EE4B6A9CB606A9FADA74127AEAA7537C
24,766,534 UART: [art] SIG.R = 6355DDE583381FDF25E9E42F38468738928179E04C338CDE4BA6EBD28A83CD14326244BDB2583102CC208FD129C0DF5B
24,773,908 UART: [art] SIG.S = 8D6227B668EA98823FA62614D4330480873BD275CBD287114629B32BC94848450EA6749F3B283C4831D159AF1229438B
25,752,647 UART: Caliptra RT
25,753,355 UART: [state] CFI Enabled
25,917,283 UART: [rt] RT listening for mailbox commands...
25,919,134 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,948,748 UART: [rt]cmd =0x46504c54, len=4
25,950,385 >>> mbox cmd response data (8 bytes)
25,951,436 UART: [rt] FIPS self test
25,952,382 UART: [kat] ++
25,952,831 UART: [kat] sha1
25,957,393 UART: [kat] SHA2-256
25,959,321 UART: [kat] SHA2-384
25,962,284 UART: [kat] SHA2-512-ACC
25,964,572 UART: [kat] ECC-384
26,694,910 UART: Fatal Error: 0x90040004
26,730,141 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,874,988 >>> mbox cmd response: failed
26,875,583 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,020,317 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
189,997 UART:
190,295 UART: Running Caliptra ROM ...
191,319 UART:
191,461 UART: [state] CFI Enabled
264,852 UART: [state] LifecycleState = Unprovisioned
266,718 UART: [state] DebugLocked = No
269,255 UART: [state] WD Timer not started. Device not locked for debugging
272,345 UART: [kat] SHA2-256
451,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,044 UART: [kat] ++
463,600 UART: [kat] sha1
473,681 UART: [kat] SHA2-256
476,667 UART: [kat] SHA2-384
482,975 UART: [kat] SHA2-512-ACC
485,913 UART: [kat] ECC-384
2,950,114 UART: [kat] HMAC-384Kdf
2,973,059 UART: [kat] LMS
3,502,492 UART: [kat] --
3,506,335 UART: [cold-reset] ++
3,507,281 UART: [fht] FHT @ 0x50003400
3,519,520 UART: [idev] ++
3,520,089 UART: [idev] CDI.KEYID = 6
3,521,166 UART: [idev] SUBJECT.KEYID = 7
3,522,277 UART: [idev] UDS.KEYID = 0
3,523,809 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,754 UART: [idev] Erasing UDS.KEYID = 0
6,029,945 UART: [idev] Sha1 KeyId Algorithm
6,054,042 UART: [idev] --
6,057,072 UART: [ldev] ++
6,057,647 UART: [ldev] CDI.KEYID = 6
6,058,557 UART: [ldev] SUBJECT.KEYID = 5
6,059,775 UART: [ldev] AUTHORITY.KEYID = 7
6,061,009 UART: [ldev] FE.KEYID = 1
6,102,830 UART: [ldev] Erasing FE.KEYID = 1
8,605,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,278 UART: [ldev] --
10,417,250 UART: [fwproc] Wait for Commands...
10,418,917 UART: [fwproc] Recv command 0x46574c44
10,421,048 UART: [fwproc] Recv'd Img size: 115304 bytes
13,836,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,913,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,982,277 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,303,196 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,361,721 ready_for_fw is high
3,362,123 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,056,992 >>> mbox cmd response: success
18,354,205 UART:
18,354,637 UART: Running Caliptra FMC ...
18,355,763 UART:
18,355,935 UART: [state] CFI Enabled
18,423,375 UART: [fht] FMC Alias Private Key: 7
20,187,686 UART: [art] Extend RT PCRs Done
20,188,909 UART: [art] Lock RT PCRs Done
20,191,098 UART: [art] Populate DV Done
20,196,602 UART: [fht] FMC Alias Private Key: 7
20,198,196 UART: [art] Derive CDI
20,198,933 UART: [art] Store in in slot 0x4
20,255,911 UART: [art] Derive Key Pair
20,256,950 UART: [art] Store priv key in slot 0x5
22,719,566 UART: [art] Derive Key Pair - Done
22,732,399 UART: [art] Signing Cert with AUTHO
22,733,701 UART: RITY.KEYID = 7
24,445,941 UART: [art] Erasing AUTHORITY.KEYID = 7
24,447,444 UART: [art] PUB.X = 47FEB0DF40B5F413130F76F054E1676CDD132F13E5950D25E18CA4F6F6756744819785AE7D0094B734C6E0BBAD8F381C
24,454,701 UART: [art] PUB.Y = 0D723C49B213FF6416C2C0BC1813F2CAF792D7AF0C1DB36C4BB060515633B897F2E2A1EEAA06FE9F3D3B3A0E3E79500D
24,461,989 UART: [art] SIG.R = 18161CB871D5A08CB1F57CC7F31419F4E781EA2EA2C53AA99498BB9C1347E9987320BC2EE37DE300975228D6CE2368BF
24,469,334 UART: [art] SIG.S = 38B1A99179F35777B7413DD779F7EF61DE76BFBDF36C8BB74A4A5AE1345D65EF9CEB7B29440FA9D3D3A8EA4483E5A2AD
25,448,183 UART: Caliptra RT
25,448,903 UART: [state] CFI Enabled
25,614,084 UART: [rt] RT listening for mailbox commands...
25,615,948 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,645,581 UART: [rt]cmd =0x46504c54, len=4
25,647,321 >>> mbox cmd response data (8 bytes)
25,648,641 UART: [rt] FIPS self test
25,649,578 UART: [kat] ++
25,650,028 UART: [kat] sha1
25,654,538 UART: [kat] SHA2-256
25,656,475 UART: [kat] SHA2-384
25,659,493 UART: [kat] SHA2-512-ACC
25,661,763 UART: [kat] ECC-384
26,390,378 UART: Fatal Error: 0x90040004
26,425,757 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,570,597 >>> mbox cmd response: failed
26,571,294 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,715,894 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,362,931 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,052,074 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,965 writing to cptra_bootfsm_go
193,311 UART:
193,667 UART: Running Caliptra ROM ...
194,791 UART:
604,241 UART: [state] CFI Enabled
620,613 UART: [state] LifecycleState = Unprovisioned
622,505 UART: [state] DebugLocked = No
625,091 UART: [state] WD Timer not started. Device not locked for debugging
629,405 UART: [kat] SHA2-256
808,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,107 UART: [kat] ++
820,555 UART: [kat] sha1
831,851 UART: [kat] SHA2-256
834,858 UART: [kat] SHA2-384
842,270 UART: [kat] SHA2-512-ACC
845,213 UART: [kat] ECC-384
3,286,334 UART: [kat] HMAC-384Kdf
3,298,302 UART: [kat] LMS
3,827,749 UART: [kat] --
3,832,240 UART: [cold-reset] ++
3,834,319 UART: [fht] FHT @ 0x50003400
3,844,754 UART: [idev] ++
3,845,364 UART: [idev] CDI.KEYID = 6
3,846,290 UART: [idev] SUBJECT.KEYID = 7
3,847,472 UART: [idev] UDS.KEYID = 0
3,848,404 ready_for_fw is high
3,848,661 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,993,427 UART: [idev] Erasing UDS.KEYID = 0
6,318,659 UART: [idev] Sha1 KeyId Algorithm
6,341,295 UART: [idev] --
6,345,046 UART: [ldev] ++
6,345,628 UART: [ldev] CDI.KEYID = 6
6,346,539 UART: [ldev] SUBJECT.KEYID = 5
6,347,757 UART: [ldev] AUTHORITY.KEYID = 7
6,348,991 UART: [ldev] FE.KEYID = 1
6,361,957 UART: [ldev] Erasing FE.KEYID = 1
8,833,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,633 UART: [ldev] --
10,622,457 UART: [fwproc] Wait for Commands...
10,624,771 UART: [fwproc] Recv command 0x46574c44
10,626,814 UART: [fwproc] Recv'd Img size: 115304 bytes
14,041,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,117,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,186,386 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,508,127 >>> mbox cmd response: success
14,512,151 UART: [afmc] ++
14,512,751 UART: [afmc] CDI.KEYID = 6
14,513,663 UART: [afmc] SUBJECT.KEYID = 7
14,514,824 UART: [afmc] AUTHORITY.KEYID = 5
17,021,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,742,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,744,344 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,760,089 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,776,142 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,792,039 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,814,408 UART: [afmc] --
18,817,371 UART: [cold-reset] --
18,821,779 UART: [state] Locking Datavault
18,825,246 UART: [state] Locking PCR0, PCR1 and PCR31
18,826,887 UART: [state] Locking ICCM
18,828,707 UART: [exit] Launching FMC @ 0x40000130
18,837,156 UART:
18,837,399 UART: Running Caliptra FMC ...
18,838,504 UART:
18,838,663 UART: [state] CFI Enabled
18,846,602 UART: [fht] FMC Alias Private Key: 7
20,602,948 UART: [art] Extend RT PCRs Done
20,604,176 UART: [art] Lock RT PCRs Done
20,606,025 UART: [art] Populate DV Done
20,611,220 UART: [fht] FMC Alias Private Key: 7
20,612,937 UART: [art] Derive CDI
20,613,754 UART: [art] Store in in slot 0x4
20,656,186 UART: [art] Derive Key Pair
20,657,225 UART: [art] Store priv key in slot 0x5
23,084,342 UART: [art] Derive Key Pair - Done
23,097,246 UART: [art] Signing Cert with AUTHO
23,098,562 UART: RITY.KEYID = 7
24,803,568 UART: [art] Erasing AUTHORITY.KEYID = 7
24,805,089 UART: [art] PUB.X = 846BF3BDED8D85D0DF73F04ABB1E1ADA7AD0826893799623F7291E0E1C64B065920BB49C18DED8446172851AD1640361
24,812,358 UART: [art] PUB.Y = F377B01BD4340BFC25AE2157624D1A30E02C715A1427DFE742E9230E79CFB9C315840BD59BA951B94B3FA85BD5434241
24,819,605 UART: [art] SIG.R = DD728193F1FB3B56E15F19A8D15739051A63BAB792555C5A50318D6FC6079E05222F3DC9F507B3081B1DC5E4ADF1DA2F
24,826,947 UART: [art] SIG.S = 63F51A29F0EA4AA18B9D0C48064F9F5AD6768AAAAC79CBCFD76FBAD04E3F6CCD54CB5FE71A2767C508CABB585223A68A
25,806,126 UART: Caliptra RT
25,806,825 UART: [state] CFI Enabled
25,923,035 UART: [rt] RT listening for mailbox commands...
25,924,894 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,954,503 UART: [rt]cmd =0x46504c54, len=4
25,956,081 >>> mbox cmd response data (8 bytes)
25,957,409 UART: [rt] FIPS self test
25,958,349 UART: [kat] ++
25,958,804 UART: [kat] sha1
25,963,149 UART: [kat] SHA2-256
25,965,080 UART: [kat] SHA2-384
25,967,912 UART: [kat] SHA2-512-ACC
25,970,146 UART: [kat] ECC-384
26,692,317 UART: Fatal Error: 0x90040004
26,727,701 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,872,392 >>> mbox cmd response: failed
26,872,982 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,017,755 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,122 UART:
190,412 UART: Running Caliptra ROM ...
191,522 UART:
13,510,788 UART: [state] CFI Enabled
13,524,221 UART: [state] LifecycleState = Unprovisioned
13,526,084 UART: [state] DebugLocked = No
13,528,932 UART: [state] WD Timer not started. Device not locked for debugging
13,532,026 UART: [kat] SHA2-256
13,711,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
13,722,672 UART: [kat] ++
13,723,216 UART: [kat] sha1
13,735,350 UART: [kat] SHA2-256
13,738,373 UART: [kat] SHA2-384
13,743,385 UART: [kat] SHA2-512-ACC
13,746,378 UART: [kat] ECC-384
16,188,658 UART: [kat] HMAC-384Kdf
16,200,251 UART: [kat] LMS
16,729,785 UART: [kat] --
16,733,990 UART: [cold-reset] ++
16,734,952 UART: [fht] FHT @ 0x50003400
16,746,680 UART: [idev] ++
16,747,276 UART: [idev] CDI.KEYID = 6
16,748,189 UART: [idev] SUBJECT.KEYID = 7
16,749,411 UART: [idev] UDS.KEYID = 0
16,750,929 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
16,895,530 UART: [idev] Erasing UDS.KEYID = 0
19,218,047 UART: [idev] Sha1 KeyId Algorithm
19,240,615 UART: [idev] --
19,243,771 UART: [ldev] ++
19,244,347 UART: [ldev] CDI.KEYID = 6
19,245,231 UART: [ldev] SUBJECT.KEYID = 5
19,246,440 UART: [ldev] AUTHORITY.KEYID = 7
19,247,688 UART: [ldev] FE.KEYID = 1
19,258,340 UART: [ldev] Erasing FE.KEYID = 1
21,735,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,455,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,471,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,487,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,503,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,523,037 UART: [ldev] --
23,526,904 UART: [fwproc] Wait for Commands...
23,528,355 UART: [fwproc] Recv command 0x46574c44
23,530,452 UART: [fwproc] Recv'd Img size: 115304 bytes
26,943,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,015,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,084,219 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
27,405,080 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,696,507 ready_for_fw is high
3,697,168 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,284,472 >>> mbox cmd response: success
18,532,213 UART:
18,532,608 UART: Running Caliptra FMC ...
18,533,754 UART:
18,533,924 UART: [state] CFI Enabled
18,541,702 UART: [fht] FMC Alias Private Key: 7
20,298,190 UART: [art] Extend RT PCRs Done
20,299,419 UART: [art] Lock RT PCRs Done
20,300,996 UART: [art] Populate DV Done
20,306,127 UART: [fht] FMC Alias Private Key: 7
20,307,776 UART: [art] Derive CDI
20,308,590 UART: [art] Store in in slot 0x4
20,351,250 UART: [art] Derive Key Pair
20,352,283 UART: [art] Store priv key in slot 0x5
22,778,934 UART: [art] Derive Key Pair - Done
22,791,717 UART: [art] Signing Cert with AUTHO
22,793,026 UART: RITY.KEYID = 7
24,498,632 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,140 UART: [art] PUB.X = BA7C9179D7E1861B1AFC4CCEDA96BDDA1775CD8A3167DF2D83986546FE33FB1EA1CA20C11EE660A5F09447479F5BA1E7
24,507,425 UART: [art] PUB.Y = C95623F3FF61FE0484FB2C7307E0716E2227CF6B10BEF542D8E3668035A77101AB77B92313BC4F5E528ECE1CA081F2B6
24,514,687 UART: [art] SIG.R = 99C040A14E2DE7C490D4D1FB0A1A922411C27DBEBED108733FD976973238028C39FA83EA8EF8C2DB857FD72154E3E8DF
24,522,098 UART: [art] SIG.S = F3F58F8B77870D554745EE42AE6045850D1D08EA79A744352F742AD2BEB88AC624C97930F22D035BD4AEB29492B3B96C
25,500,781 UART: Caliptra RT
25,501,494 UART: [state] CFI Enabled
25,618,579 UART: [rt] RT listening for mailbox commands...
25,620,431 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,650,130 UART: [rt]cmd =0x46504c54, len=4
25,651,687 >>> mbox cmd response data (8 bytes)
25,653,122 UART: [rt] FIPS self test
25,654,065 UART: [kat] ++
25,654,515 UART: [kat] sha1
25,658,862 UART: [kat] SHA2-256
25,660,736 UART: [kat] SHA2-384
25,663,637 UART: [kat] SHA2-512-ACC
25,665,855 UART: [kat] ECC-384
26,388,072 UART: Fatal Error: 0x90040004
26,423,343 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,568,163 >>> mbox cmd response: failed
26,568,793 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,713,512 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
16,897,971 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,487,248 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,417,400 ready_for_fw is high
3,417,838 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,739,875 >>> mbox cmd response: success
19,027,689 UART:
19,028,116 UART: Running Caliptra FMC ...
19,029,241 UART:
19,029,397 UART: [state] CFI Enabled
19,096,538 UART: [fht] FMC Alias Private Key: 7
20,860,070 UART: [art] Extend RT PCRs Done
20,861,321 UART: [art] Lock RT PCRs Done
20,863,174 UART: [art] Populate DV Done
20,868,482 UART: [fht] FMC Alias Private Key: 7
20,870,023 UART: [art] Derive CDI
20,870,801 UART: [art] Store in in slot 0x4
20,928,670 UART: [art] Derive Key Pair
20,929,717 UART: [art] Store priv key in slot 0x5
23,392,492 UART: [art] Derive Key Pair - Done
23,405,547 UART: [art] Signing Cert with AUTHO
23,406,879 UART: RITY.KEYID = 7
25,118,303 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,817 UART: [art] PUB.X = 26CEB11043A17D875BDC654550A65F458E624561AD26132840BD5F371200B59D85B9EC09B914D8478CCBC0AD812076C2
25,127,027 UART: [art] PUB.Y = B25470A5F38FA78550996A5E31B95CF8B66B1C1387A1BD09AEDA6CF60C06448A4A98AE8888E6D206196ED5CBCC21F064
25,134,331 UART: [art] SIG.R = 445B0A0182A00F9D2FB34FFF0290FAAE7CECAD8DA68B48D1B061B3E9F9AAB7EA5BE4ADC99D85EBA435AFEE513758E2B6
25,141,725 UART: [art] SIG.S = BE75C180176D51BF2A44BC657D83A83FD12FAB07DF3E702B263551BE43919CA5513A8538BCB6537DB14B2F9DB7AD2401
26,120,487 UART: Caliptra RT
26,121,199 UART: [state] CFI Enabled
26,286,487 UART: [rt] RT listening for mailbox commands...
26,288,337 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,318,015 UART: [rt]cmd =0x46504c54, len=4
26,319,543 >>> mbox cmd response data (8 bytes)
26,320,548 UART: [rt] FIPS self test
26,321,492 UART: [kat] ++
26,321,943 UART: [kat] sha1
26,326,506 UART: [kat] SHA2-256
26,328,437 UART: [kat] SHA2-384
26,331,501 UART: [kat] SHA2-512-ACC
26,333,723 UART: [kat] ECC-384
27,062,261 UART: Fatal Error: 0x90040004
27,097,669 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,242,500 >>> mbox cmd response: failed
27,243,148 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,387,864 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,423,518 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,741,884 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,755,784 ready_for_fw is high
3,756,244 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,971,709 >>> mbox cmd response: success
19,225,725 UART:
19,226,135 UART: Running Caliptra FMC ...
19,227,262 UART:
19,227,423 UART: [state] CFI Enabled
19,235,536 UART: [fht] FMC Alias Private Key: 7
20,992,633 UART: [art] Extend RT PCRs Done
20,993,857 UART: [art] Lock RT PCRs Done
20,995,350 UART: [art] Populate DV Done
21,000,936 UART: [fht] FMC Alias Private Key: 7
21,002,648 UART: [art] Derive CDI
21,003,476 UART: [art] Store in in slot 0x4
21,046,309 UART: [art] Derive Key Pair
21,047,356 UART: [art] Store priv key in slot 0x5
23,474,587 UART: [art] Derive Key Pair - Done
23,487,316 UART: [art] Signing Cert with AUTHO
23,488,638 UART: RITY.KEYID = 7
25,194,480 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,985 UART: [art] PUB.X = F6C7CCFE4BA8FD041D956FF77389D6648116F63EE62887829BAC4E525D32E1EEED742495F8EAE18B6784477DAB86186A
25,203,259 UART: [art] PUB.Y = 832F2D5C7DDCAE10422BED11C6FF03CE500ED5183B99DC3AFC9B94C800FD52FF1105CD14B340D00BACF090D14487CA8A
25,210,539 UART: [art] SIG.R = 40779606067BC417C6C0B9AF512E218266B844A7CA5DFAB9BE63A8257BB871B71F0667FF26AF00E6BB5413A5039A393D
25,217,915 UART: [art] SIG.S = 3EE9AE9F95EA96122D1B0BF0F46BD78C366551ECE45D5E3F9558CD379B4AD3D67D70D75E38C23E9C75DAE1A6F53BE503
26,197,126 UART: Caliptra RT
26,197,826 UART: [state] CFI Enabled
26,315,125 UART: [rt] RT listening for mailbox commands...
26,316,969 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,346,605 UART: [rt]cmd =0x46504c54, len=4
26,348,296 >>> mbox cmd response data (8 bytes)
26,349,510 UART: [rt] FIPS self test
26,350,449 UART: [kat] ++
26,350,901 UART: [kat] sha1
26,355,343 UART: [kat] SHA2-256
26,357,246 UART: [kat] SHA2-384
26,360,372 UART: [kat] SHA2-512-ACC
26,362,593 UART: [kat] ECC-384
27,085,008 UART: Fatal Error: 0x90040004
27,120,403 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,265,257 >>> mbox cmd response: failed
27,265,905 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,410,486 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
16,271,153 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
27,496,144 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,807 UART: [kat] SHA2-256
881,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,853 UART: [kat] ++
886,005 UART: [kat] sha1
890,349 UART: [kat] SHA2-256
892,287 UART: [kat] SHA2-384
894,922 UART: [kat] SHA2-512-ACC
896,823 UART: [kat] ECC-384
902,396 UART: [kat] HMAC-384Kdf
907,064 UART: [kat] LMS
1,475,260 UART: [kat] --
1,476,103 UART: [cold-reset] ++
1,476,471 UART: [fht] Storing FHT @ 0x50003400
1,479,346 UART: [idev] ++
1,479,514 UART: [idev] CDI.KEYID = 6
1,479,874 UART: [idev] SUBJECT.KEYID = 7
1,480,298 UART: [idev] UDS.KEYID = 0
1,480,643 ready_for_fw is high
1,480,643 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,116 UART: [idev] Erasing UDS.KEYID = 0
1,504,338 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,766 UART: [idev] --
1,513,843 UART: [ldev] ++
1,514,011 UART: [ldev] CDI.KEYID = 6
1,514,374 UART: [ldev] SUBJECT.KEYID = 5
1,514,800 UART: [ldev] AUTHORITY.KEYID = 7
1,515,263 UART: [ldev] FE.KEYID = 1
1,520,309 UART: [ldev] Erasing FE.KEYID = 1
1,545,606 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,454 UART: [ldev] --
1,584,919 UART: [fwproc] Waiting for Commands...
1,585,768 UART: [fwproc] Received command 0x46574c44
1,586,559 UART: [fwproc] Received Image of size 115304 bytes
2,896,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,814 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,449 >>> mbox cmd response: success
3,091,687 UART: [afmc] ++
3,091,855 UART: [afmc] CDI.KEYID = 6
3,092,217 UART: [afmc] SUBJECT.KEYID = 7
3,092,642 UART: [afmc] AUTHORITY.KEYID = 5
3,127,303 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,401 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,181 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,794 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,484 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,503 UART: [afmc] --
3,170,635 UART: [cold-reset] --
3,171,431 UART: [state] Locking Datavault
3,172,498 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,102 UART: [state] Locking ICCM
3,173,706 UART: [exit] Launching FMC @ 0x40000130
3,179,035 UART:
3,179,051 UART: Running Caliptra FMC ...
3,179,459 UART:
3,179,513 UART: [state] CFI Enabled
3,190,378 UART: [fht] FMC Alias Private Key: 7
3,298,783 UART: [art] Extend RT PCRs Done
3,299,211 UART: [art] Lock RT PCRs Done
3,300,521 UART: [art] Populate DV Done
3,308,770 UART: [fht] FMC Alias Private Key: 7
3,309,948 UART: [art] Derive CDI
3,310,228 UART: [art] Store in in slot 0x4
3,395,653 UART: [art] Derive Key Pair
3,396,013 UART: [art] Store priv key in slot 0x5
3,408,825 UART: [art] Derive Key Pair - Done
3,423,556 UART: [art] Signing Cert with AUTHO
3,424,036 UART: RITY.KEYID = 7
3,439,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,031 UART: [art] PUB.X = 227308A16B86C4EFA6004E5A3166D5F61DDD44AB2C7DF7B58801C579D3554E329D7625BDB03E92E6DEC0DB3C0993D07F
3,446,780 UART: [art] PUB.Y = 36529BCE809501C42E5C6EC2C4A4AA438E354F622AD0AEE7983B152157BC5A233313C62243B9F3FF05B000D2BE5D500D
3,453,705 UART: [art] SIG.R = 05EC8E250B8084BBB5761FA81C1B424FDBFEB9A7EC8BC279AB09C22706037E2D664C8FD18ECDF7408C016AABFBBE2858
3,460,479 UART: [art] SIG.S = 0CBD7BFC470C677DEF23F30839BFE9F9CED3CA922ED8FDDA8CED795AAA0D103FDE050231EC844671A8CFC5CAECF42067
3,484,602 UART: Caliptra RT
3,484,855 UART: [state] CFI Enabled
3,593,045 UART: [rt] RT listening for mailbox commands...
3,593,708 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,765 UART: [rt]cmd =0x46504c54, len=4
3,624,898 >>> mbox cmd response data (8 bytes)
3,625,033 UART: [rt] FIPS self test
3,625,361 UART: [kat] ++
3,625,513 UART: [kat] sha1
3,629,885 UART: [kat] SHA2-256
3,631,907 UART: [kat] SHA2-384
3,634,682 UART: [kat] SHA2-512-ACC
3,636,609 UART: [kat] ECC-384
3,640,365 UART: Fatal Error: 0x90040004
3,641,915 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,641,920 >>> mbox cmd response: failed
3,641,920 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,641,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,570 UART: [state] LifecycleState = Unprovisioned
86,225 UART: [state] DebugLocked = No
86,753 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,409 UART: [kat] SHA2-256
882,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,455 UART: [kat] ++
886,607 UART: [kat] sha1
891,019 UART: [kat] SHA2-256
892,957 UART: [kat] SHA2-384
895,546 UART: [kat] SHA2-512-ACC
897,447 UART: [kat] ECC-384
902,996 UART: [kat] HMAC-384Kdf
907,674 UART: [kat] LMS
1,475,870 UART: [kat] --
1,476,765 UART: [cold-reset] ++
1,477,307 UART: [fht] Storing FHT @ 0x50003400
1,480,130 UART: [idev] ++
1,480,298 UART: [idev] CDI.KEYID = 6
1,480,658 UART: [idev] SUBJECT.KEYID = 7
1,481,082 UART: [idev] UDS.KEYID = 0
1,481,427 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,830 UART: [idev] Erasing UDS.KEYID = 0
1,505,498 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,188 UART: [idev] --
1,515,233 UART: [ldev] ++
1,515,401 UART: [ldev] CDI.KEYID = 6
1,515,764 UART: [ldev] SUBJECT.KEYID = 5
1,516,190 UART: [ldev] AUTHORITY.KEYID = 7
1,516,653 UART: [ldev] FE.KEYID = 1
1,522,001 UART: [ldev] Erasing FE.KEYID = 1
1,547,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,780 UART: [ldev] --
1,587,099 UART: [fwproc] Waiting for Commands...
1,587,850 UART: [fwproc] Received command 0x46574c44
1,588,641 UART: [fwproc] Received Image of size 115304 bytes
2,897,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,205 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,347 ready_for_fw is high
1,362,347 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,019 >>> mbox cmd response: success
3,002,719 UART:
3,002,735 UART: Running Caliptra FMC ...
3,003,143 UART:
3,003,197 UART: [state] CFI Enabled
3,013,678 UART: [fht] FMC Alias Private Key: 7
3,121,541 UART: [art] Extend RT PCRs Done
3,121,969 UART: [art] Lock RT PCRs Done
3,123,359 UART: [art] Populate DV Done
3,131,734 UART: [fht] FMC Alias Private Key: 7
3,132,872 UART: [art] Derive CDI
3,133,152 UART: [art] Store in in slot 0x4
3,218,461 UART: [art] Derive Key Pair
3,218,821 UART: [art] Store priv key in slot 0x5
3,231,441 UART: [art] Derive Key Pair - Done
3,246,506 UART: [art] Signing Cert with AUTHO
3,246,986 UART: RITY.KEYID = 7
3,261,912 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,677 UART: [art] PUB.X = 41430F12026377C3889221750376C02095394595332604FF8FBE23BD6FBBC9D6EF3FDB9B58EC19E25E35880EA2095B4B
3,269,425 UART: [art] PUB.Y = 7D835C37F3AED8CE6F69B9E3FFD85274061398DA9F3773499F43A4591BE15DF15042CAB64315D05AA31BD1A97DAA5C60
3,276,382 UART: [art] SIG.R = EC0FDE29955A1D7DDAC44078BD664F148DDC8D859739BB5A35A4662DCD214BFE4A6A01579798624195D1BB822F812EB0
3,283,156 UART: [art] SIG.S = 33FE164A1AABBAAE76845B9F2B60D154CBE3F12762BC84E416A096F90DB1A47B85FC1991D09A8991030D3E24DF7D4775
3,306,554 UART: Caliptra RT
3,306,807 UART: [state] CFI Enabled
3,415,290 UART: [rt] RT listening for mailbox commands...
3,415,953 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,864 UART: [rt]cmd =0x46504c54, len=4
3,446,969 >>> mbox cmd response data (8 bytes)
3,447,250 UART: [rt] FIPS self test
3,447,578 UART: [kat] ++
3,447,730 UART: [kat] sha1
3,452,034 UART: [kat] SHA2-256
3,454,056 UART: [kat] SHA2-384
3,456,937 UART: [kat] SHA2-512-ACC
3,458,864 UART: [kat] ECC-384
3,462,830 UART: Fatal Error: 0x90040004
3,464,380 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,464,385 >>> mbox cmd response: failed
3,464,385 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,464,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,851 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,823 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,879 UART: [state] LifecycleState = Unprovisioned
85,534 UART: [state] DebugLocked = No
86,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,942 UART: [kat] SHA2-256
881,873 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,988 UART: [kat] ++
886,140 UART: [kat] sha1
890,260 UART: [kat] SHA2-256
892,198 UART: [kat] SHA2-384
894,827 UART: [kat] SHA2-512-ACC
896,728 UART: [kat] ECC-384
902,291 UART: [kat] HMAC-384Kdf
906,893 UART: [kat] LMS
1,475,089 UART: [kat] --
1,475,986 UART: [cold-reset] ++
1,476,334 UART: [fht] Storing FHT @ 0x50003400
1,479,031 UART: [idev] ++
1,479,199 UART: [idev] CDI.KEYID = 6
1,479,559 UART: [idev] SUBJECT.KEYID = 7
1,479,983 UART: [idev] UDS.KEYID = 0
1,480,328 ready_for_fw is high
1,480,328 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,083 UART: [idev] Erasing UDS.KEYID = 0
1,504,635 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,289 UART: [idev] --
1,514,238 UART: [ldev] ++
1,514,406 UART: [ldev] CDI.KEYID = 6
1,514,769 UART: [ldev] SUBJECT.KEYID = 5
1,515,195 UART: [ldev] AUTHORITY.KEYID = 7
1,515,658 UART: [ldev] FE.KEYID = 1
1,520,614 UART: [ldev] Erasing FE.KEYID = 1
1,546,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,149 UART: [ldev] --
1,585,412 UART: [fwproc] Waiting for Commands...
1,586,069 UART: [fwproc] Received command 0x46574c44
1,586,860 UART: [fwproc] Received Image of size 115304 bytes
2,895,611 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,475 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,827 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,024 >>> mbox cmd response: success
3,090,032 UART: [afmc] ++
3,090,200 UART: [afmc] CDI.KEYID = 6
3,090,562 UART: [afmc] SUBJECT.KEYID = 7
3,090,987 UART: [afmc] AUTHORITY.KEYID = 5
3,125,832 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,536 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,316 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,044 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,929 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,619 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,556 UART: [afmc] --
3,169,536 UART: [cold-reset] --
3,170,342 UART: [state] Locking Datavault
3,171,535 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,139 UART: [state] Locking ICCM
3,172,757 UART: [exit] Launching FMC @ 0x40000130
3,178,086 UART:
3,178,102 UART: Running Caliptra FMC ...
3,178,510 UART:
3,178,653 UART: [state] CFI Enabled
3,189,420 UART: [fht] FMC Alias Private Key: 7
3,297,297 UART: [art] Extend RT PCRs Done
3,297,725 UART: [art] Lock RT PCRs Done
3,299,127 UART: [art] Populate DV Done
3,307,304 UART: [fht] FMC Alias Private Key: 7
3,308,338 UART: [art] Derive CDI
3,308,618 UART: [art] Store in in slot 0x4
3,394,145 UART: [art] Derive Key Pair
3,394,505 UART: [art] Store priv key in slot 0x5
3,407,407 UART: [art] Derive Key Pair - Done
3,422,281 UART: [art] Signing Cert with AUTHO
3,422,761 UART: RITY.KEYID = 7
3,438,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,766 UART: [art] PUB.X = A5C88D4385B597F96AA471CFC4D7858C8A18B2758D6DE168457AF8F0FAEA18E444B61A3E5011ED686AC219B9BADD3331
3,445,548 UART: [art] PUB.Y = DE8EF849CDFAC20996A0E4E9EBA3C42EA54F213DCBCA43327100589AE735833F48BCE85F698122DFD5507CA1E741C703
3,452,484 UART: [art] SIG.R = A15AFE9F2E3B5DC323C56152A569212F3D29F0DBD4608AEF66C60596A4E97DDAB46D108B8283D50D09781B42454CC3FE
3,459,255 UART: [art] SIG.S = F70168BA75ADB7F6709E223A6214402C7E906AD36888AF135DC066316BBB8957816613E71B6CA8CC4C511CCC7CDB82BD
3,483,327 UART: Caliptra RT
3,483,672 UART: [state] CFI Enabled
3,591,866 UART: [rt] RT listening for mailbox commands...
3,592,529 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,552 UART: [rt]cmd =0x46504c54, len=4
3,623,743 >>> mbox cmd response data (8 bytes)
3,623,984 UART: [rt] FIPS self test
3,624,312 UART: [kat] ++
3,624,464 UART: [kat] sha1
3,628,550 UART: [kat] SHA2-256
3,630,572 UART: [kat] SHA2-384
3,633,423 UART: [kat] SHA2-512-ACC
3,635,350 UART: [kat] ECC-384
3,638,888 UART: Fatal Error: 0x90040004
3,640,438 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,640,443 >>> mbox cmd response: failed
3,640,443 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,640,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,456 UART: [kat] SHA2-256
882,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,502 UART: [kat] ++
886,654 UART: [kat] sha1
890,796 UART: [kat] SHA2-256
892,734 UART: [kat] SHA2-384
895,695 UART: [kat] SHA2-512-ACC
897,596 UART: [kat] ECC-384
903,313 UART: [kat] HMAC-384Kdf
907,805 UART: [kat] LMS
1,476,001 UART: [kat] --
1,477,082 UART: [cold-reset] ++
1,477,532 UART: [fht] Storing FHT @ 0x50003400
1,480,391 UART: [idev] ++
1,480,559 UART: [idev] CDI.KEYID = 6
1,480,919 UART: [idev] SUBJECT.KEYID = 7
1,481,343 UART: [idev] UDS.KEYID = 0
1,481,688 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,267 UART: [idev] Erasing UDS.KEYID = 0
1,506,265 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,983 UART: [idev] --
1,515,822 UART: [ldev] ++
1,515,990 UART: [ldev] CDI.KEYID = 6
1,516,353 UART: [ldev] SUBJECT.KEYID = 5
1,516,779 UART: [ldev] AUTHORITY.KEYID = 7
1,517,242 UART: [ldev] FE.KEYID = 1
1,522,554 UART: [ldev] Erasing FE.KEYID = 1
1,548,321 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,463 UART: [ldev] --
1,587,748 UART: [fwproc] Waiting for Commands...
1,588,589 UART: [fwproc] Received command 0x46574c44
1,589,380 UART: [fwproc] Received Image of size 115304 bytes
2,899,203 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,507 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,859 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,130 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,882 ready_for_fw is high
1,362,882 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,728 >>> mbox cmd response: success
3,003,394 UART:
3,003,410 UART: Running Caliptra FMC ...
3,003,818 UART:
3,003,961 UART: [state] CFI Enabled
3,014,636 UART: [fht] FMC Alias Private Key: 7
3,122,285 UART: [art] Extend RT PCRs Done
3,122,713 UART: [art] Lock RT PCRs Done
3,124,389 UART: [art] Populate DV Done
3,132,492 UART: [fht] FMC Alias Private Key: 7
3,133,560 UART: [art] Derive CDI
3,133,840 UART: [art] Store in in slot 0x4
3,219,649 UART: [art] Derive Key Pair
3,220,009 UART: [art] Store priv key in slot 0x5
3,233,931 UART: [art] Derive Key Pair - Done
3,248,747 UART: [art] Signing Cert with AUTHO
3,249,227 UART: RITY.KEYID = 7
3,264,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,084 UART: [art] PUB.X = 39458FA4766C6D280BD24B9723ECA4E3C6EC577853DCB0129101B475F086CEFF45A31AC2AD6199BFE9DA7B8565FF9759
3,271,858 UART: [art] PUB.Y = 5F633D4EA93DBC56DC8F5C9A897D77FA26C529FBA3A2CB01A9F775234DFE15A05E11C5CC7C41BF392C508AF578268CD4
3,278,823 UART: [art] SIG.R = 0E0C3DECCBAB17A562E99D643D8943C0EE8E181B992167CA2B12A62F7BF34A9DC70E8135E24D0D8B134E3DC9DE40E1B2
3,285,599 UART: [art] SIG.S = 066F2804D83C5ABBA2E33F6643A79A2211AB2E25ACA077B6E6483E208BF062954432BFA6C8B6DA69287B9D27F65AAFFE
3,309,268 UART: Caliptra RT
3,309,613 UART: [state] CFI Enabled
3,417,407 UART: [rt] RT listening for mailbox commands...
3,418,070 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,991 UART: [rt]cmd =0x46504c54, len=4
3,449,348 >>> mbox cmd response data (8 bytes)
3,449,487 UART: [rt] FIPS self test
3,449,815 UART: [kat] ++
3,449,967 UART: [kat] sha1
3,454,387 UART: [kat] SHA2-256
3,456,409 UART: [kat] SHA2-384
3,459,342 UART: [kat] SHA2-512-ACC
3,461,269 UART: [kat] ECC-384
3,464,991 UART: Fatal Error: 0x90040004
3,466,541 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,466,546 >>> mbox cmd response: failed
3,466,546 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,466,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,250 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,224 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,756 UART: [state] LifecycleState = Unprovisioned
86,411 UART: [state] DebugLocked = No
86,897 UART: [state] WD Timer not started. Device not locked for debugging
88,176 UART: [kat] SHA2-256
893,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,951 UART: [kat] ++
898,103 UART: [kat] sha1
902,341 UART: [kat] SHA2-256
904,281 UART: [kat] SHA2-384
907,062 UART: [kat] SHA2-512-ACC
908,963 UART: [kat] ECC-384
918,968 UART: [kat] HMAC-384Kdf
923,758 UART: [kat] LMS
1,172,086 UART: [kat] --
1,173,089 UART: [cold-reset] ++
1,173,621 UART: [fht] FHT @ 0x50003400
1,176,446 UART: [idev] ++
1,176,614 UART: [idev] CDI.KEYID = 6
1,176,974 UART: [idev] SUBJECT.KEYID = 7
1,177,398 UART: [idev] UDS.KEYID = 0
1,177,743 ready_for_fw is high
1,177,743 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,364 UART: [idev] Erasing UDS.KEYID = 0
1,202,037 UART: [idev] Sha1 KeyId Algorithm
1,210,401 UART: [idev] --
1,211,415 UART: [ldev] ++
1,211,583 UART: [ldev] CDI.KEYID = 6
1,211,946 UART: [ldev] SUBJECT.KEYID = 5
1,212,372 UART: [ldev] AUTHORITY.KEYID = 7
1,212,835 UART: [ldev] FE.KEYID = 1
1,218,055 UART: [ldev] Erasing FE.KEYID = 1
1,244,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,479 UART: [ldev] --
1,282,988 UART: [fwproc] Wait for Commands...
1,283,734 UART: [fwproc] Recv command 0x46574c44
1,284,462 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,295 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,650 >>> mbox cmd response: success
2,788,810 UART: [afmc] ++
2,788,978 UART: [afmc] CDI.KEYID = 6
2,789,340 UART: [afmc] SUBJECT.KEYID = 7
2,789,765 UART: [afmc] AUTHORITY.KEYID = 5
2,824,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,869 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,473 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,445 UART: [afmc] --
2,868,519 UART: [cold-reset] --
2,869,243 UART: [state] Locking Datavault
2,870,486 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,090 UART: [state] Locking ICCM
2,871,552 UART: [exit] Launching FMC @ 0x40000130
2,876,881 UART:
2,876,897 UART: Running Caliptra FMC ...
2,877,305 UART:
2,877,359 UART: [state] CFI Enabled
2,888,018 UART: [fht] FMC Alias Private Key: 7
2,996,607 UART: [art] Extend RT PCRs Done
2,997,035 UART: [art] Lock RT PCRs Done
2,998,423 UART: [art] Populate DV Done
3,006,582 UART: [fht] FMC Alias Private Key: 7
3,007,642 UART: [art] Derive CDI
3,007,922 UART: [art] Store in in slot 0x4
3,093,879 UART: [art] Derive Key Pair
3,094,239 UART: [art] Store priv key in slot 0x5
3,107,161 UART: [art] Derive Key Pair - Done
3,122,216 UART: [art] Signing Cert with AUTHO
3,122,696 UART: RITY.KEYID = 7
3,138,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,775 UART: [art] PUB.X = 51115787381C5B527285DCFD02C2506AEE48C3FCD5113053B394A15ADC4BD95BEFDAB808EF22D41891150F94CA0ADB06
3,145,540 UART: [art] PUB.Y = 87F44ECAD0DE3E0D53B3DD96F1F757D96EE4B83A94153AC5CBB2A6D5EC89513722D43701D2B836A05845C62AFB33D65B
3,152,498 UART: [art] SIG.R = EA430B06B7EE681C6E1C7BC691E48F6AC9F1B0140B061363D1A12DC8321BB9066E741C16D650202CD8ED7C9B951FD3E5
3,159,263 UART: [art] SIG.S = 44843BBE0EA7DAB755046395CB28A5C5299D77D02BB79BBD38AE448BACA5C2AA86EC9D985D628EEF3FB3594B279DCF10
3,183,042 UART: Caliptra RT
3,183,295 UART: [state] CFI Enabled
3,290,538 UART: [rt] RT listening for mailbox commands...
3,291,201 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,874 UART: [rt]cmd =0x46504c54, len=4
3,321,909 >>> mbox cmd response data (8 bytes)
3,322,220 UART: [rt] FIPS self test
3,322,548 UART: [kat] ++
3,322,700 UART: [kat] sha1
3,326,920 UART: [kat] SHA2-256
3,328,942 UART: [kat] SHA2-384
3,331,887 UART: [kat] SHA2-512-ACC
3,333,814 UART: [kat] ECC-384
3,337,632 UART: Fatal Error: 0x90040004
3,339,182 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,339,187 >>> mbox cmd response: failed
3,339,187 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,339,192 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
893,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,153 UART: [kat] ++
897,305 UART: [kat] sha1
901,701 UART: [kat] SHA2-256
903,641 UART: [kat] SHA2-384
906,398 UART: [kat] SHA2-512-ACC
908,299 UART: [kat] ECC-384
917,516 UART: [kat] HMAC-384Kdf
922,020 UART: [kat] LMS
1,170,348 UART: [kat] --
1,171,419 UART: [cold-reset] ++
1,171,925 UART: [fht] FHT @ 0x50003400
1,174,682 UART: [idev] ++
1,174,850 UART: [idev] CDI.KEYID = 6
1,175,210 UART: [idev] SUBJECT.KEYID = 7
1,175,634 UART: [idev] UDS.KEYID = 0
1,175,979 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,136 UART: [idev] Erasing UDS.KEYID = 0
1,200,363 UART: [idev] Sha1 KeyId Algorithm
1,208,853 UART: [idev] --
1,209,917 UART: [ldev] ++
1,210,085 UART: [ldev] CDI.KEYID = 6
1,210,448 UART: [ldev] SUBJECT.KEYID = 5
1,210,874 UART: [ldev] AUTHORITY.KEYID = 7
1,211,337 UART: [ldev] FE.KEYID = 1
1,216,645 UART: [ldev] Erasing FE.KEYID = 1
1,243,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,085 UART: [ldev] --
1,283,548 UART: [fwproc] Wait for Commands...
1,284,176 UART: [fwproc] Recv command 0x46574c44
1,284,904 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,251 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,524 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,705 ready_for_fw is high
1,060,705 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,143 >>> mbox cmd response: success
2,700,457 UART:
2,700,473 UART: Running Caliptra FMC ...
2,700,881 UART:
2,700,935 UART: [state] CFI Enabled
2,711,524 UART: [fht] FMC Alias Private Key: 7
2,819,407 UART: [art] Extend RT PCRs Done
2,819,835 UART: [art] Lock RT PCRs Done
2,821,457 UART: [art] Populate DV Done
2,829,566 UART: [fht] FMC Alias Private Key: 7
2,830,722 UART: [art] Derive CDI
2,831,002 UART: [art] Store in in slot 0x4
2,916,347 UART: [art] Derive Key Pair
2,916,707 UART: [art] Store priv key in slot 0x5
2,930,731 UART: [art] Derive Key Pair - Done
2,945,537 UART: [art] Signing Cert with AUTHO
2,946,017 UART: RITY.KEYID = 7
2,961,185 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,950 UART: [art] PUB.X = A91B75A6FCF896E0E02F3351900AE40058A503A483BCC57CF501813761CE22614559C235BB55404C339FBD3761FDCF4F
2,968,691 UART: [art] PUB.Y = 9AABE19747F72790F617E4B31243962F95E40D79C7B1712CD6304C96782663F5797992A05C1B6A76C971F32A4E5131DA
2,975,630 UART: [art] SIG.R = EE8EF728CC6100CEF322888B9FC305B29CFC6F4BC6F33A661B4EF39F318EB26A649EA9C087B1D1A2BDB10243B1A9CA47
2,982,392 UART: [art] SIG.S = 05744213A5529B0770D0C468E11120E3FB70516E2E3FA4DE44740FEB4309F6576EEDB2147C4A7CB91B8BBD196F68C2FC
3,005,791 UART: Caliptra RT
3,006,044 UART: [state] CFI Enabled
3,115,339 UART: [rt] RT listening for mailbox commands...
3,116,002 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,625 UART: [rt]cmd =0x46504c54, len=4
3,146,624 >>> mbox cmd response data (8 bytes)
3,146,973 UART: [rt] FIPS self test
3,147,301 UART: [kat] ++
3,147,453 UART: [kat] sha1
3,151,697 UART: [kat] SHA2-256
3,153,719 UART: [kat] SHA2-384
3,156,788 UART: [kat] SHA2-512-ACC
3,158,715 UART: [kat] ECC-384
3,162,649 UART: Fatal Error: 0x90040004
3,164,199 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,164,204 >>> mbox cmd response: failed
3,164,204 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,164,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,181 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,211 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
893,449 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,574 UART: [kat] ++
897,726 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,571 UART: [kat] SHA2-512-ACC
908,472 UART: [kat] ECC-384
918,151 UART: [kat] HMAC-384Kdf
922,957 UART: [kat] LMS
1,171,285 UART: [kat] --
1,172,560 UART: [cold-reset] ++
1,173,050 UART: [fht] FHT @ 0x50003400
1,175,793 UART: [idev] ++
1,175,961 UART: [idev] CDI.KEYID = 6
1,176,321 UART: [idev] SUBJECT.KEYID = 7
1,176,745 UART: [idev] UDS.KEYID = 0
1,177,090 ready_for_fw is high
1,177,090 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,679 UART: [idev] Erasing UDS.KEYID = 0
1,201,606 UART: [idev] Sha1 KeyId Algorithm
1,210,074 UART: [idev] --
1,211,072 UART: [ldev] ++
1,211,240 UART: [ldev] CDI.KEYID = 6
1,211,603 UART: [ldev] SUBJECT.KEYID = 5
1,212,029 UART: [ldev] AUTHORITY.KEYID = 7
1,212,492 UART: [ldev] FE.KEYID = 1
1,217,848 UART: [ldev] Erasing FE.KEYID = 1
1,244,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,486 UART: [ldev] --
1,283,753 UART: [fwproc] Wait for Commands...
1,284,431 UART: [fwproc] Recv command 0x46574c44
1,285,159 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,602 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,906 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,279 >>> mbox cmd response: success
2,790,539 UART: [afmc] ++
2,790,707 UART: [afmc] CDI.KEYID = 6
2,791,069 UART: [afmc] SUBJECT.KEYID = 7
2,791,494 UART: [afmc] AUTHORITY.KEYID = 5
2,827,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,844,382 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,850,110 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,995 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,714 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,550 UART: [afmc] --
2,870,558 UART: [cold-reset] --
2,871,220 UART: [state] Locking Datavault
2,872,325 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,929 UART: [state] Locking ICCM
2,873,439 UART: [exit] Launching FMC @ 0x40000130
2,878,768 UART:
2,878,784 UART: Running Caliptra FMC ...
2,879,192 UART:
2,879,335 UART: [state] CFI Enabled
2,889,674 UART: [fht] FMC Alias Private Key: 7
2,997,929 UART: [art] Extend RT PCRs Done
2,998,357 UART: [art] Lock RT PCRs Done
3,000,161 UART: [art] Populate DV Done
3,008,286 UART: [fht] FMC Alias Private Key: 7
3,009,278 UART: [art] Derive CDI
3,009,558 UART: [art] Store in in slot 0x4
3,095,469 UART: [art] Derive Key Pair
3,095,829 UART: [art] Store priv key in slot 0x5
3,109,465 UART: [art] Derive Key Pair - Done
3,124,135 UART: [art] Signing Cert with AUTHO
3,124,615 UART: RITY.KEYID = 7
3,139,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,140,194 UART: [art] PUB.X = 0B0BE578456B7CCA10FE568193CE76D51301562C001042592984617A8F39BBE4C89943DB645C8CA72496DBEFD450640A
3,146,928 UART: [art] PUB.Y = 6EC62575B5FA4FA30B8E47D96DF4F89FECE1D4BB93FC6F37344BB8E69B640117AE1834550D6B86AD8E4CC72C9E0A51B4
3,153,884 UART: [art] SIG.R = 3647B282FABE1FC013C8E3CF33F18E3DC605275BFB4E9056DA73016880CB01BE9287A4691D7E05FD39A12AB20535235E
3,160,645 UART: [art] SIG.S = AD06674D9CE758AE4E12D1BC709EB0E4ED9BA51EAF64C2DB1E3C72BC2AB4CB4F7C3611160777EB16F1521D24AFC96E9D
3,184,482 UART: Caliptra RT
3,184,827 UART: [state] CFI Enabled
3,292,950 UART: [rt] RT listening for mailbox commands...
3,293,613 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,576 UART: [rt]cmd =0x46504c54, len=4
3,324,771 >>> mbox cmd response data (8 bytes)
3,324,924 UART: [rt] FIPS self test
3,325,252 UART: [kat] ++
3,325,404 UART: [kat] sha1
3,329,710 UART: [kat] SHA2-256
3,331,732 UART: [kat] SHA2-384
3,334,577 UART: [kat] SHA2-512-ACC
3,336,504 UART: [kat] ECC-384
3,340,340 UART: Fatal Error: 0x90040004
3,341,890 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,341,895 >>> mbox cmd response: failed
3,341,895 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,341,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,058 UART: [state] WD Timer not started. Device not locked for debugging
88,325 UART: [kat] SHA2-256
893,975 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,100 UART: [kat] ++
898,252 UART: [kat] sha1
902,514 UART: [kat] SHA2-256
904,454 UART: [kat] SHA2-384
907,329 UART: [kat] SHA2-512-ACC
909,230 UART: [kat] ECC-384
919,211 UART: [kat] HMAC-384Kdf
923,775 UART: [kat] LMS
1,172,103 UART: [kat] --
1,172,796 UART: [cold-reset] ++
1,173,344 UART: [fht] FHT @ 0x50003400
1,176,063 UART: [idev] ++
1,176,231 UART: [idev] CDI.KEYID = 6
1,176,591 UART: [idev] SUBJECT.KEYID = 7
1,177,015 UART: [idev] UDS.KEYID = 0
1,177,360 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,129 UART: [idev] Erasing UDS.KEYID = 0
1,202,008 UART: [idev] Sha1 KeyId Algorithm
1,210,660 UART: [idev] --
1,211,778 UART: [ldev] ++
1,211,946 UART: [ldev] CDI.KEYID = 6
1,212,309 UART: [ldev] SUBJECT.KEYID = 5
1,212,735 UART: [ldev] AUTHORITY.KEYID = 7
1,213,198 UART: [ldev] FE.KEYID = 1
1,218,312 UART: [ldev] Erasing FE.KEYID = 1
1,244,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,450 UART: [ldev] --
1,283,931 UART: [fwproc] Wait for Commands...
1,284,585 UART: [fwproc] Recv command 0x46574c44
1,285,313 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,374 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,709 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,238 ready_for_fw is high
1,060,238 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,804 >>> mbox cmd response: success
2,701,082 UART:
2,701,098 UART: Running Caliptra FMC ...
2,701,506 UART:
2,701,649 UART: [state] CFI Enabled
2,712,118 UART: [fht] FMC Alias Private Key: 7
2,820,357 UART: [art] Extend RT PCRs Done
2,820,785 UART: [art] Lock RT PCRs Done
2,822,489 UART: [art] Populate DV Done
2,830,646 UART: [fht] FMC Alias Private Key: 7
2,831,616 UART: [art] Derive CDI
2,831,896 UART: [art] Store in in slot 0x4
2,917,785 UART: [art] Derive Key Pair
2,918,145 UART: [art] Store priv key in slot 0x5
2,930,981 UART: [art] Derive Key Pair - Done
2,946,123 UART: [art] Signing Cert with AUTHO
2,946,603 UART: RITY.KEYID = 7
2,961,551 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,316 UART: [art] PUB.X = E20959088251404599FD7B9B0BBEC4F60F9C8C92403A5EF002E3654CAF69F88DF1C1138969EF3F7450BD45904F5BBF7F
2,969,077 UART: [art] PUB.Y = 7B6C661058AB89DCCCAC265385841C2005D4975E0B87FB7C75830479C62AB4F863D075842A6F5BE4AD9FA89390E95A6C
2,976,022 UART: [art] SIG.R = BCE7099C8F0A9DA31E23FF659AEABE95DCEFB00FF29848DA3C4B775C8993123767623D0C6FA67CB54E14B68ADD18BE3B
2,982,802 UART: [art] SIG.S = 27A66E29EE815EED0EA3606851AA59E9BBF126A2B6D33DDF108923BEC54C7609E206D731CB12B93C167758FB11B90DF5
3,007,053 UART: Caliptra RT
3,007,398 UART: [state] CFI Enabled
3,115,231 UART: [rt] RT listening for mailbox commands...
3,115,894 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,669 UART: [rt]cmd =0x46504c54, len=4
3,146,814 >>> mbox cmd response data (8 bytes)
3,147,167 UART: [rt] FIPS self test
3,147,495 UART: [kat] ++
3,147,647 UART: [kat] sha1
3,152,075 UART: [kat] SHA2-256
3,154,097 UART: [kat] SHA2-384
3,156,948 UART: [kat] SHA2-512-ACC
3,158,875 UART: [kat] ECC-384
3,162,633 UART: Fatal Error: 0x90040004
3,164,183 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,164,188 >>> mbox cmd response: failed
3,164,188 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,164,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,864 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,376 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,742 UART: [state] LifecycleState = Unprovisioned
85,397 UART: [state] DebugLocked = No
85,921 UART: [state] WD Timer not started. Device not locked for debugging
87,144 UART: [kat] SHA2-256
890,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,823 UART: [kat] ++
894,975 UART: [kat] sha1
899,377 UART: [kat] SHA2-256
901,317 UART: [kat] SHA2-384
904,046 UART: [kat] SHA2-512-ACC
905,947 UART: [kat] ECC-384
915,454 UART: [kat] HMAC-384Kdf
919,856 UART: [kat] LMS
1,168,168 UART: [kat] --
1,168,995 UART: [cold-reset] ++
1,169,447 UART: [fht] FHT @ 0x50003400
1,171,989 UART: [idev] ++
1,172,157 UART: [idev] CDI.KEYID = 6
1,172,518 UART: [idev] SUBJECT.KEYID = 7
1,172,943 UART: [idev] UDS.KEYID = 0
1,173,289 ready_for_fw is high
1,173,289 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,180,955 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,507 UART: [idev] --
1,208,588 UART: [ldev] ++
1,208,756 UART: [ldev] CDI.KEYID = 6
1,209,120 UART: [ldev] SUBJECT.KEYID = 5
1,209,547 UART: [ldev] AUTHORITY.KEYID = 7
1,210,010 UART: [ldev] FE.KEYID = 1
1,215,186 UART: [ldev] Erasing FE.KEYID = 1
1,241,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,540 UART: [ldev] --
1,280,994 UART: [fwproc] Wait for Commands...
1,281,721 UART: [fwproc] Recv command 0x46574c44
1,282,454 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,270 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,514 >>> mbox cmd response: success
2,787,631 UART: [afmc] ++
2,787,799 UART: [afmc] CDI.KEYID = 6
2,788,162 UART: [afmc] SUBJECT.KEYID = 7
2,788,588 UART: [afmc] AUTHORITY.KEYID = 5
2,824,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,198 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,810 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,529 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,156 UART: [afmc] --
2,867,160 UART: [cold-reset] --
2,867,760 UART: [state] Locking Datavault
2,868,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,467 UART: [state] Locking ICCM
2,870,135 UART: [exit] Launching FMC @ 0x40000130
2,875,464 UART:
2,875,480 UART: Running Caliptra FMC ...
2,875,888 UART:
2,875,942 UART: [state] CFI Enabled
2,886,237 UART: [fht] FMC Alias Private Key: 7
2,993,930 UART: [art] Extend RT PCRs Done
2,994,358 UART: [art] Lock RT PCRs Done
2,996,120 UART: [art] Populate DV Done
3,004,611 UART: [fht] FMC Alias Private Key: 7
3,005,683 UART: [art] Derive CDI
3,005,963 UART: [art] Store in in slot 0x4
3,091,690 UART: [art] Derive Key Pair
3,092,050 UART: [art] Store priv key in slot 0x5
3,104,806 UART: [art] Derive Key Pair - Done
3,119,859 UART: [art] Signing Cert with AUTHO
3,120,339 UART: RITY.KEYID = 7
3,135,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,216 UART: [art] PUB.X = 41BA9D4850506C3B3CA370CEAFF77436B89337864BD5DFD56D6F8C66409D56D5C88312FCCE18E359536458FE44363D90
3,142,988 UART: [art] PUB.Y = 01B75ABA03082480CCFA79D0CEEAEFAAD467AD3413A1E96B29C9F6611D862E2CDE0329DCC875799D65BB99A480A6F0CA
3,149,946 UART: [art] SIG.R = B0E06D88CE5459A7FCA75098AFF85557595F2AB78DFEBB425D23E6FD2E9F92DC78C9C5B18C60EA354EF1479A1F5B7445
3,156,732 UART: [art] SIG.S = 641FEE22D6506A6A0DD3367B7367FF4AE0B7ECEA122941B2A245D07BDCB317A02A053EEA25B53DB095A669B5AB9CFF9F
3,180,311 UART: Caliptra RT
3,180,564 UART: [state] CFI Enabled
3,288,483 UART: [rt] RT listening for mailbox commands...
3,289,146 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,981 UART: [rt]cmd =0x46504c54, len=4
3,320,208 >>> mbox cmd response data (8 bytes)
3,320,431 UART: [rt] FIPS self test
3,320,759 UART: [kat] ++
3,320,911 UART: [kat] sha1
3,325,237 UART: [kat] SHA2-256
3,327,259 UART: [kat] SHA2-384
3,330,226 UART: [kat] SHA2-512-ACC
3,332,153 UART: [kat] ECC-384
3,335,777 UART: Fatal Error: 0x90040004
3,337,327 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,337,332 >>> mbox cmd response: failed
3,337,332 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,337,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
891,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,225 UART: [kat] ++
895,377 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,865 UART: [cold-reset] ++
1,170,367 UART: [fht] FHT @ 0x50003400
1,173,183 UART: [idev] ++
1,173,351 UART: [idev] CDI.KEYID = 6
1,173,712 UART: [idev] SUBJECT.KEYID = 7
1,174,137 UART: [idev] UDS.KEYID = 0
1,174,483 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,309 UART: [idev] Sha1 KeyId Algorithm
1,208,077 UART: [idev] --
1,209,120 UART: [ldev] ++
1,209,288 UART: [ldev] CDI.KEYID = 6
1,209,652 UART: [ldev] SUBJECT.KEYID = 5
1,210,079 UART: [ldev] AUTHORITY.KEYID = 7
1,210,542 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,242,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,124 UART: [ldev] --
1,282,582 UART: [fwproc] Wait for Commands...
1,283,297 UART: [fwproc] Recv command 0x46574c44
1,284,030 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,924 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,092 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,842 ready_for_fw is high
1,055,842 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,938 >>> mbox cmd response: success
2,697,666 UART:
2,697,682 UART: Running Caliptra FMC ...
2,698,090 UART:
2,698,144 UART: [state] CFI Enabled
2,708,649 UART: [fht] FMC Alias Private Key: 7
2,817,286 UART: [art] Extend RT PCRs Done
2,817,714 UART: [art] Lock RT PCRs Done
2,819,368 UART: [art] Populate DV Done
2,827,729 UART: [fht] FMC Alias Private Key: 7
2,828,737 UART: [art] Derive CDI
2,829,017 UART: [art] Store in in slot 0x4
2,914,314 UART: [art] Derive Key Pair
2,914,674 UART: [art] Store priv key in slot 0x5
2,927,730 UART: [art] Derive Key Pair - Done
2,942,584 UART: [art] Signing Cert with AUTHO
2,943,064 UART: RITY.KEYID = 7
2,958,192 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,957 UART: [art] PUB.X = F52ADFEE3F741FA6DA7F9E313907F17994B7C453F024A2F0B43E14832BD0DB6CDA07CB28D992C8B39E59DAA9C8571A80
2,965,737 UART: [art] PUB.Y = 2882A901E470CBD1197E9228D60DC1247FC21DC0DE99C85811CDC0A272D8DE33D90E6AC0193A30988406215A9ED4F839
2,972,677 UART: [art] SIG.R = E8FB5EA227E4E396397DFA4A783BADFB632E7FF9071DD5A84D72D565A0553CABA65BF25EC68901152E15F5EB144B0FC8
2,979,456 UART: [art] SIG.S = 07E83DCB9FC0C3B6220BFF08BF5DECD6768C5FF72F6F915EC966F2B4D4FD55712626B7E5E10ECEB42DEA9959241699DA
3,002,637 UART: Caliptra RT
3,002,890 UART: [state] CFI Enabled
3,109,855 UART: [rt] RT listening for mailbox commands...
3,110,518 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,083 UART: [rt]cmd =0x46504c54, len=4
3,141,342 >>> mbox cmd response data (8 bytes)
3,141,537 UART: [rt] FIPS self test
3,141,865 UART: [kat] ++
3,142,017 UART: [kat] sha1
3,146,261 UART: [kat] SHA2-256
3,148,283 UART: [kat] SHA2-384
3,151,104 UART: [kat] SHA2-512-ACC
3,153,031 UART: [kat] ECC-384
3,156,707 UART: Fatal Error: 0x90040004
3,158,257 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,262 >>> mbox cmd response: failed
3,158,262 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,758 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,633,670 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
921,079 UART: [kat] LMS
1,169,391 UART: [kat] --
1,170,520 UART: [cold-reset] ++
1,170,852 UART: [fht] FHT @ 0x50003400
1,173,392 UART: [idev] ++
1,173,560 UART: [idev] CDI.KEYID = 6
1,173,921 UART: [idev] SUBJECT.KEYID = 7
1,174,346 UART: [idev] UDS.KEYID = 0
1,174,692 ready_for_fw is high
1,174,692 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,199,058 UART: [idev] Sha1 KeyId Algorithm
1,207,892 UART: [idev] --
1,208,831 UART: [ldev] ++
1,208,999 UART: [ldev] CDI.KEYID = 6
1,209,363 UART: [ldev] SUBJECT.KEYID = 5
1,209,790 UART: [ldev] AUTHORITY.KEYID = 7
1,210,253 UART: [ldev] FE.KEYID = 1
1,215,567 UART: [ldev] Erasing FE.KEYID = 1
1,241,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,385 UART: [ldev] --
1,280,883 UART: [fwproc] Wait for Commands...
1,281,642 UART: [fwproc] Recv command 0x46574c44
1,282,375 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,814 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,160 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,469 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,691 >>> mbox cmd response: success
2,787,798 UART: [afmc] ++
2,787,966 UART: [afmc] CDI.KEYID = 6
2,788,329 UART: [afmc] SUBJECT.KEYID = 7
2,788,755 UART: [afmc] AUTHORITY.KEYID = 5
2,824,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,051 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,770 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,417 UART: [afmc] --
2,867,493 UART: [cold-reset] --
2,868,275 UART: [state] Locking Datavault
2,869,514 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,118 UART: [state] Locking ICCM
2,870,764 UART: [exit] Launching FMC @ 0x40000130
2,876,093 UART:
2,876,109 UART: Running Caliptra FMC ...
2,876,517 UART:
2,876,660 UART: [state] CFI Enabled
2,887,119 UART: [fht] FMC Alias Private Key: 7
2,995,362 UART: [art] Extend RT PCRs Done
2,995,790 UART: [art] Lock RT PCRs Done
2,997,224 UART: [art] Populate DV Done
3,005,501 UART: [fht] FMC Alias Private Key: 7
3,006,451 UART: [art] Derive CDI
3,006,731 UART: [art] Store in in slot 0x4
3,092,308 UART: [art] Derive Key Pair
3,092,668 UART: [art] Store priv key in slot 0x5
3,105,908 UART: [art] Derive Key Pair - Done
3,120,540 UART: [art] Signing Cert with AUTHO
3,121,020 UART: RITY.KEYID = 7
3,136,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,445 UART: [art] PUB.X = 9558AF52919E18BE25B2F3F0B000C8B038FBB1383E267F672786CE624AEB320CA0885801FCF9093705A22133C97E070E
3,144,173 UART: [art] PUB.Y = 6B1E32B340882D268937826542CC2F955979395168C3F8E6F80C5ECD47DF9F784F5735B79771952162A604DA528BCAB4
3,151,109 UART: [art] SIG.R = 71116F6A4C76926D0DE03484964516397E2F245DAD102C828F8730D66651C1DFC5349058213B6ECA2C61081F5D602D88
3,157,863 UART: [art] SIG.S = EA9D7E44DF738BB2D94C87F315E0770311206502C88061BF30C641BE7CA8D7A761CDFC616B0F1CD36BD6ECC78F346619
3,181,719 UART: Caliptra RT
3,182,064 UART: [state] CFI Enabled
3,290,281 UART: [rt] RT listening for mailbox commands...
3,290,944 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,831 UART: [rt]cmd =0x46504c54, len=4
3,322,086 >>> mbox cmd response data (8 bytes)
3,322,405 UART: [rt] FIPS self test
3,322,733 UART: [kat] ++
3,322,885 UART: [kat] sha1
3,327,171 UART: [kat] SHA2-256
3,329,193 UART: [kat] SHA2-384
3,332,190 UART: [kat] SHA2-512-ACC
3,334,117 UART: [kat] ECC-384
3,338,047 UART: Fatal Error: 0x90040004
3,339,597 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,339,602 >>> mbox cmd response: failed
3,339,602 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,339,607 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
891,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,588 UART: [kat] SHA2-256
901,528 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,540 UART: [idev] ++
1,173,708 UART: [idev] CDI.KEYID = 6
1,174,069 UART: [idev] SUBJECT.KEYID = 7
1,174,494 UART: [idev] UDS.KEYID = 0
1,174,840 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,400 UART: [idev] Erasing UDS.KEYID = 0
1,199,640 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,371 UART: [ldev] ++
1,209,539 UART: [ldev] CDI.KEYID = 6
1,209,903 UART: [ldev] SUBJECT.KEYID = 5
1,210,330 UART: [ldev] AUTHORITY.KEYID = 7
1,210,793 UART: [ldev] FE.KEYID = 1
1,216,109 UART: [ldev] Erasing FE.KEYID = 1
1,242,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,609 UART: [ldev] --
1,281,953 UART: [fwproc] Wait for Commands...
1,282,596 UART: [fwproc] Recv command 0x46574c44
1,283,329 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,655 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,945 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,105 ready_for_fw is high
1,056,105 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,301 >>> mbox cmd response: success
2,699,919 UART:
2,699,935 UART: Running Caliptra FMC ...
2,700,343 UART:
2,700,486 UART: [state] CFI Enabled
2,710,789 UART: [fht] FMC Alias Private Key: 7
2,818,606 UART: [art] Extend RT PCRs Done
2,819,034 UART: [art] Lock RT PCRs Done
2,820,606 UART: [art] Populate DV Done
2,828,569 UART: [fht] FMC Alias Private Key: 7
2,829,731 UART: [art] Derive CDI
2,830,011 UART: [art] Store in in slot 0x4
2,915,662 UART: [art] Derive Key Pair
2,916,022 UART: [art] Store priv key in slot 0x5
2,929,350 UART: [art] Derive Key Pair - Done
2,943,974 UART: [art] Signing Cert with AUTHO
2,944,454 UART: RITY.KEYID = 7
2,959,882 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,647 UART: [art] PUB.X = FB525E6BE775966BE16EAF14A57DDC959255AE8F0057BC2397B6FD820F2CE5755C1530B575685CFF2A17419EDCCFC489
2,967,404 UART: [art] PUB.Y = AC6997DED509AB830B674FF56DD497B58437915C57AF051420BA317AE883FE99024F64923BCBE709A09D60B1500CA1D7
2,974,340 UART: [art] SIG.R = A2BF41AA5020A24B616247BD3EA36D2864C56F025A22624EC7B4E0DAD24464C85AD84F42857D6E38D1E66043BDA09371
2,981,111 UART: [art] SIG.S = D6C226E88CB41DE5B44742BA1F13215AA89813C6E72755478C45A545085C99FC11CE1D8BB1C2A32CEAE88ADF942F68DD
3,005,255 UART: Caliptra RT
3,005,600 UART: [state] CFI Enabled
3,113,826 UART: [rt] RT listening for mailbox commands...
3,114,489 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,236 UART: [rt]cmd =0x46504c54, len=4
3,145,387 >>> mbox cmd response data (8 bytes)
3,145,652 UART: [rt] FIPS self test
3,145,980 UART: [kat] ++
3,146,132 UART: [kat] sha1
3,150,180 UART: [kat] SHA2-256
3,152,202 UART: [kat] SHA2-384
3,155,183 UART: [kat] SHA2-512-ACC
3,157,110 UART: [kat] ECC-384
3,161,074 UART: Fatal Error: 0x90040004
3,162,624 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,162,629 >>> mbox cmd response: failed
3,162,629 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,162,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,019 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,537 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
5,981,193 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,126,314 >>> mbox cmd response: failed
6,126,892 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,270,137 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
4,877,676 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,462,606 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
5,982,774 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,127,001 >>> mbox cmd response: failed
6,127,560 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,270,898 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,876,371 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,450,897 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
6,302,353 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,446,593 >>> mbox cmd response: failed
6,447,153 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,590,325 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
18,458,004 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,901,186 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
6,300,691 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,444,906 >>> mbox cmd response: failed
6,445,470 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,589,345 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
18,461,285 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,901,552 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
5,186,785 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,331,472 >>> mbox cmd response: failed
5,332,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,475,790 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,426,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,235,279 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
5,177,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,321,730 >>> mbox cmd response: failed
5,322,293 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,466,037 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,448,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,233,002 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,505 writing to cptra_bootfsm_go
5,501,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,645,669 >>> mbox cmd response: failed
5,646,260 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,790,569 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
17,852,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,577,054 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
5,490,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,634,944 >>> mbox cmd response: failed
5,635,524 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,779,851 >>> mbox cmd response: failed
Initializing fuses
985 writing to cptra_bootfsm_go
17,883,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,615,585 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
5,179,208 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,323,818 >>> mbox cmd response: failed
5,324,397 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,467,994 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,436,487 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,254,507 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
5,508,259 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,652,894 >>> mbox cmd response: failed
5,653,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,797,176 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
17,854,353 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,591,577 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,127 >>> mbox cmd response: failed
823,127 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,133 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,312 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,337 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,345 >>> mbox cmd response: failed
822,345 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,855 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,148 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,156 >>> mbox cmd response: failed
822,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,607 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,602 >>> mbox cmd response: failed
822,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,158 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,399 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,209 >>> mbox cmd response: failed
822,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,033 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,656 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,533 >>> mbox cmd response: failed
822,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,534 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,536 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,544 >>> mbox cmd response: failed
822,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,125 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,008 >>> mbox cmd response: failed
823,008 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,014 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,011 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,663 >>> mbox cmd response: failed
822,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,780 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,441 >>> mbox cmd response: failed
822,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
822,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,507 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,654 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,322 >>> mbox cmd response: failed
823,322 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,190 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,973 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,272 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,280 >>> mbox cmd response: failed
823,280 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,912 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,879 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,755 writing to cptra_bootfsm_go
193,007 UART:
193,363 UART: Running Caliptra ROM ...
194,548 UART:
194,705 UART: [state] CFI Enabled
263,926 UART: [state] LifecycleState = Unprovisioned
265,847 UART: [state] DebugLocked = No
268,192 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,634 UART: [kat] SHA2-256
443,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,837 UART: [kat] ++
454,377 UART: [kat] sha1
466,039 UART: [kat] SHA2-256
468,709 UART: [kat] SHA2-384
476,335 UART: [kat] SHA2-512-ACC
478,704 UART: [kat] ECC-384
2,770,107 UART: [kat] HMAC-384Kdf
2,801,959 UART: [kat] LMS
3,992,205 UART: [kat] --
3,996,561 UART: [cold-reset] ++
3,998,352 UART: [fht] Storing FHT @ 0x50003400
4,009,294 UART: [idev] ++
4,009,908 UART: [idev] CDI.KEYID = 6
4,010,852 UART: [idev] SUBJECT.KEYID = 7
4,012,035 UART: [idev] UDS.KEYID = 0
4,013,049 ready_for_fw is high
4,013,266 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,157,781 UART: [idev] Erasing UDS.KEYID = 0
7,347,579 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,074 UART: [idev] --
7,372,571 UART: [ldev] ++
7,373,153 UART: [ldev] CDI.KEYID = 6
7,374,121 UART: [ldev] SUBJECT.KEYID = 5
7,375,340 UART: [ldev] AUTHORITY.KEYID = 7
7,376,576 UART: [ldev] FE.KEYID = 1
7,423,408 UART: [ldev] Erasing FE.KEYID = 1
10,755,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,674 UART: [ldev] --
13,118,833 UART: [fwproc] Waiting for Commands...
13,120,606 UART: [fwproc] Received command 0x46574c44
13,122,960 UART: [fwproc] Received Image of size 114996 bytes
17,180,287 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,260,636 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,329,512 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,649,258 >>> mbox cmd response: success
17,653,688 UART: [afmc] ++
17,654,275 UART: [afmc] CDI.KEYID = 6
17,655,185 UART: [afmc] SUBJECT.KEYID = 7
17,656,462 UART: [afmc] AUTHORITY.KEYID = 5
21,027,681 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,415 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,708 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,110 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,914 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,379 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,626 UART: [afmc] --
23,397,598 UART: [cold-reset] --
23,401,839 UART: [state] Locking Datavault
23,407,623 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,377 UART: [state] Locking ICCM
23,411,200 UART: [exit] Launching FMC @ 0x40000130
23,419,593 UART:
23,419,832 UART: Running Caliptra FMC ...
23,420,935 UART:
23,421,097 UART: [state] CFI Enabled
23,487,527 UART: [fht] FMC Alias Private Key: 7
25,826,552 UART: [art] Extend RT PCRs Done
25,827,793 UART: [art] Lock RT PCRs Done
25,829,496 UART: [art] Populate DV Done
25,834,853 UART: [fht] FMC Alias Private Key: 7
25,836,553 UART: [art] Derive CDI
25,837,367 UART: [art] Store in in slot 0x4
25,896,521 UART: [art] Derive Key Pair
25,897,560 UART: [art] Store priv key in slot 0x5
29,190,300 UART: [art] Derive Key Pair - Done
29,203,183 UART: [art] Signing Cert with AUTHO
29,204,509 UART: RITY.KEYID = 7
31,492,728 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,236 UART: [art] PUB.X = 32E371E7C2D7A52C96403AE42D25865FCAD99689623EF94DE4EEA25CE4B861D46A0CD4ABB521A9BAC3A47F293AF1BB95
31,501,506 UART: [art] PUB.Y = 33CBF3BB89448A555208188FC28968E1E1E7FE91E102D08868B192293DB62B6D6A5BE8E9E230B68CA812B630BBB2208A
31,508,755 UART: [art] SIG.R = A38E2E46A52ECB491FB0C38347DC4D9EA53325EB59AA39D6EC394901258E832A7792C4D3E50B0410F299F3644DD0E3C7
31,516,109 UART: [art] SIG.S = 4DF133FAC1FA221913FD02B0842C190262D7BF74AE6AA880ED6C23C1158FEE68E1597115A2CDB34ED98E4221C50B1945
32,820,409 UART: Caliptra RT
32,821,145 UART: [state] CFI Enabled
32,983,282 UART: [rt] RT listening for mailbox commands...
32,985,149 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,014,846 UART: [rt]cmd =0x46504c54, len=4
33,016,375 >>> mbox cmd response data (8 bytes)
33,017,561 UART: [rt] FIPS self test
33,018,522 UART: [kat] ++
33,018,978 UART: [kat] sha1
33,023,275 UART: [kat] SHA2-256
33,025,207 UART: [kat] SHA2-384
33,028,279 UART: [kat] SHA2-512-ACC
33,030,519 UART: [kat] ECC-384
36,297,029 UART: Fatal Error: 0x90040003
36,332,458 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,476,830 >>> mbox cmd response: failed
36,477,514 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,621,879 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,098 UART:
190,394 UART: Running Caliptra ROM ...
191,425 UART:
191,567 UART: [state] CFI Enabled
267,070 UART: [state] LifecycleState = Unprovisioned
268,992 UART: [state] DebugLocked = No
271,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,527 UART: [kat] SHA2-256
446,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,748 UART: [kat] ++
457,248 UART: [kat] sha1
468,290 UART: [kat] SHA2-256
471,023 UART: [kat] SHA2-384
477,344 UART: [kat] SHA2-512-ACC
479,696 UART: [kat] ECC-384
2,770,914 UART: [kat] HMAC-384Kdf
2,801,729 UART: [kat] LMS
3,992,036 UART: [kat] --
3,995,837 UART: [cold-reset] ++
3,998,311 UART: [fht] Storing FHT @ 0x50003400
4,009,583 UART: [idev] ++
4,010,152 UART: [idev] CDI.KEYID = 6
4,011,094 UART: [idev] SUBJECT.KEYID = 7
4,012,364 UART: [idev] UDS.KEYID = 0
4,013,934 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,158,485 UART: [idev] Erasing UDS.KEYID = 0
7,347,947 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,155 UART: [idev] --
7,376,281 UART: [ldev] ++
7,376,931 UART: [ldev] CDI.KEYID = 6
7,377,813 UART: [ldev] SUBJECT.KEYID = 5
7,379,028 UART: [ldev] AUTHORITY.KEYID = 7
7,380,850 UART: [ldev] FE.KEYID = 1
7,424,464 UART: [ldev] Erasing FE.KEYID = 1
10,756,425 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,396 UART: [ldev] --
13,119,826 UART: [fwproc] Waiting for Commands...
13,121,987 UART: [fwproc] Received command 0x46574c44
13,124,175 UART: [fwproc] Received Image of size 114996 bytes
17,189,154 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,302 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,233 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,657,227 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,780,864 ready_for_fw is high
3,781,291 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,881,358 >>> mbox cmd response: success
23,578,987 UART:
23,579,415 UART: Running Caliptra FMC ...
23,580,541 UART:
23,580,707 UART: [state] CFI Enabled
23,651,729 UART: [fht] FMC Alias Private Key: 7
25,989,664 UART: [art] Extend RT PCRs Done
25,990,896 UART: [art] Lock RT PCRs Done
25,992,933 UART: [art] Populate DV Done
25,998,522 UART: [fht] FMC Alias Private Key: 7
26,000,070 UART: [art] Derive CDI
26,000,849 UART: [art] Store in in slot 0x4
26,060,502 UART: [art] Derive Key Pair
26,061,565 UART: [art] Store priv key in slot 0x5
29,354,232 UART: [art] Derive Key Pair - Done
29,367,308 UART: [art] Signing Cert with AUTHO
29,368,618 UART: RITY.KEYID = 7
31,656,270 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,776 UART: [art] PUB.X = 98BEDCEFA2A4525BCBA2548CF44C32BC65AC463B7CCEA62B8ABFEF92759D8DCA8B2B93807D2C80C8A9532045A4785E1B
31,665,087 UART: [art] PUB.Y = 3E056512386BB2FC59874685BAB5CAAC1409BA17B7E7238E6AC67FF01AD0ECA11BC07F583D8C5A696DCA68697651A018
31,672,310 UART: [art] SIG.R = 1CF43440BA06B407801954A6E984CF622A3257F600E8E70E545FABEDC5D9F370FDCD3F5B453C3EC9E515014E94DDB8BD
31,679,710 UART: [art] SIG.S = 3DE0690E97367306B67B9D96BE5301DF553AA2E3C3E76CF3F42D83A5256425B3CA06BC665EDAB6B9351C9684F62C4722
32,984,413 UART: Caliptra RT
32,985,127 UART: [state] CFI Enabled
33,146,516 UART: [rt] RT listening for mailbox commands...
33,148,380 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,177,802 UART: [rt]cmd =0x46504c54, len=4
33,179,361 >>> mbox cmd response data (8 bytes)
33,180,408 UART: [rt] FIPS self test
33,181,379 UART: [kat] ++
33,181,838 UART: [kat] sha1
33,186,189 UART: [kat] SHA2-256
33,188,124 UART: [kat] SHA2-384
33,191,251 UART: [kat] SHA2-512-ACC
33,193,503 UART: [kat] ECC-384
36,461,461 UART: Fatal Error: 0x90040003
36,496,762 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,641,585 >>> mbox cmd response: failed
36,642,236 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,786,600 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
3,766,235 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,824,620 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,434 UART:
192,791 UART: Running Caliptra ROM ...
193,892 UART:
603,564 UART: [state] CFI Enabled
619,089 UART: [state] LifecycleState = Unprovisioned
621,050 UART: [state] DebugLocked = No
623,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,575 UART: [kat] SHA2-256
798,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,874 UART: [kat] ++
809,323 UART: [kat] sha1
821,817 UART: [kat] SHA2-256
824,475 UART: [kat] SHA2-384
830,332 UART: [kat] SHA2-512-ACC
832,703 UART: [kat] ECC-384
3,118,586 UART: [kat] HMAC-384Kdf
3,130,250 UART: [kat] LMS
4,320,354 UART: [kat] --
4,325,064 UART: [cold-reset] ++
4,326,150 UART: [fht] Storing FHT @ 0x50003400
4,338,289 UART: [idev] ++
4,338,852 UART: [idev] CDI.KEYID = 6
4,339,805 UART: [idev] SUBJECT.KEYID = 7
4,341,051 UART: [idev] UDS.KEYID = 0
4,341,974 ready_for_fw is high
4,342,164 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,486,588 UART: [idev] Erasing UDS.KEYID = 0
7,624,451 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,139 UART: [idev] --
7,650,587 UART: [ldev] ++
7,651,167 UART: [ldev] CDI.KEYID = 6
7,652,151 UART: [ldev] SUBJECT.KEYID = 5
7,653,312 UART: [ldev] AUTHORITY.KEYID = 7
7,654,597 UART: [ldev] FE.KEYID = 1
7,668,215 UART: [ldev] Erasing FE.KEYID = 1
10,956,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,404 UART: [ldev] --
13,315,748 UART: [fwproc] Waiting for Commands...
13,318,710 UART: [fwproc] Received command 0x46574c44
13,320,894 UART: [fwproc] Received Image of size 114996 bytes
17,388,376 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,463,367 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,532,266 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,852,894 >>> mbox cmd response: success
17,856,198 UART: [afmc] ++
17,856,787 UART: [afmc] CDI.KEYID = 6
17,857,699 UART: [afmc] SUBJECT.KEYID = 7
17,858,911 UART: [afmc] AUTHORITY.KEYID = 5
21,174,593 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,468,611 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,470,863 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,485,221 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,500,067 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,514,533 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,535,313 UART: [afmc] --
23,539,023 UART: [cold-reset] --
23,543,481 UART: [state] Locking Datavault
23,549,052 UART: [state] Locking PCR0, PCR1 and PCR31
23,550,752 UART: [state] Locking ICCM
23,552,002 UART: [exit] Launching FMC @ 0x40000130
23,560,349 UART:
23,560,586 UART: Running Caliptra FMC ...
23,561,688 UART:
23,561,851 UART: [state] CFI Enabled
23,569,741 UART: [fht] FMC Alias Private Key: 7
25,901,557 UART: [art] Extend RT PCRs Done
25,902,786 UART: [art] Lock RT PCRs Done
25,904,685 UART: [art] Populate DV Done
25,910,105 UART: [fht] FMC Alias Private Key: 7
25,911,645 UART: [art] Derive CDI
25,912,379 UART: [art] Store in in slot 0x4
25,954,879 UART: [art] Derive Key Pair
25,955,892 UART: [art] Store priv key in slot 0x5
29,198,429 UART: [art] Derive Key Pair - Done
29,211,276 UART: [art] Signing Cert with AUTHO
29,212,604 UART: RITY.KEYID = 7
31,491,988 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,551 UART: [art] PUB.X = EA92332E0230902D5010E326EE37D9F53477EC28CBFB0C46E6AFAF0C411178EB9797F532AAE89B5C43C587ACC26DDEEA
31,500,768 UART: [art] PUB.Y = 030A1769783C193B2F96700280C47F9F9C4E746B6D8C9DA4867818B3E4BB0C9E95986928E7459061763DB18A7D4B0AB5
31,507,958 UART: [art] SIG.R = 21E91AE7F2B1CDB1CE49B4ACD26ABB432400CB3817233EC7A063709000820F519312783B4B6C74A0D03248DDC247A0D3
31,515,340 UART: [art] SIG.S = 73EEAA34C77098539BFCBA560029E251B012B8DD67625FB4BDAB2856E7C100AD22509DA74D2754A7E570D5852ED8713D
32,820,930 UART: Caliptra RT
32,821,641 UART: [state] CFI Enabled
32,940,754 UART: [rt] RT listening for mailbox commands...
32,942,615 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,972,423 UART: [rt]cmd =0x46504c54, len=4
32,973,868 >>> mbox cmd response data (8 bytes)
32,975,220 UART: [rt] FIPS self test
32,976,162 UART: [kat] ++
32,976,615 UART: [kat] sha1
32,981,233 UART: [kat] SHA2-256
32,983,128 UART: [kat] SHA2-384
32,986,196 UART: [kat] SHA2-512-ACC
32,988,434 UART: [kat] ECC-384
36,229,757 UART: Fatal Error: 0x90040003
36,265,206 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,409,706 >>> mbox cmd response: failed
36,410,360 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,554,687 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,095 UART:
190,387 UART: Running Caliptra ROM ...
191,494 UART:
3,968,699 UART: [state] CFI Enabled
3,984,278 UART: [state] LifecycleState = Unprovisioned
3,986,202 UART: [state] DebugLocked = No
3,988,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,994,147 UART: [kat] SHA2-256
4,163,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,174,455 UART: [kat] ++
4,174,910 UART: [kat] sha1
4,184,663 UART: [kat] SHA2-256
4,187,406 UART: [kat] SHA2-384
4,192,742 UART: [kat] SHA2-512-ACC
4,195,092 UART: [kat] ECC-384
6,477,675 UART: [kat] HMAC-384Kdf
6,489,795 UART: [kat] LMS
7,679,933 UART: [kat] --
7,685,181 UART: [cold-reset] ++
7,687,166 UART: [fht] Storing FHT @ 0x50003400
7,697,515 UART: [idev] ++
7,698,085 UART: [idev] CDI.KEYID = 6
7,699,045 UART: [idev] SUBJECT.KEYID = 7
7,700,215 UART: [idev] UDS.KEYID = 0
7,701,821 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
7,846,274 UART: [idev] Erasing UDS.KEYID = 0
10,989,901 UART: [idev] Using Sha1 for KeyId Algorithm
11,012,033 UART: [idev] --
11,015,058 UART: [ldev] ++
11,015,629 UART: [ldev] CDI.KEYID = 6
11,016,595 UART: [ldev] SUBJECT.KEYID = 5
11,017,811 UART: [ldev] AUTHORITY.KEYID = 7
11,019,048 UART: [ldev] FE.KEYID = 1
11,031,380 UART: [ldev] Erasing FE.KEYID = 1
14,319,861 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,611,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,625,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,640,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,654,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,674,067 UART: [ldev] --
16,679,613 UART: [fwproc] Waiting for Commands...
16,681,874 UART: [fwproc] Received command 0x46574c44
16,684,061 UART: [fwproc] Received Image of size 114996 bytes
20,742,123 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,821,097 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,889,960 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
21,209,968 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,125,575 ready_for_fw is high
4,125,985 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,089,682 >>> mbox cmd response: success
23,728,741 UART:
23,729,139 UART: Running Caliptra FMC ...
23,730,296 UART:
23,730,461 UART: [state] CFI Enabled
23,738,194 UART: [fht] FMC Alias Private Key: 7
26,068,725 UART: [art] Extend RT PCRs Done
26,069,973 UART: [art] Lock RT PCRs Done
26,071,524 UART: [art] Populate DV Done
26,076,865 UART: [fht] FMC Alias Private Key: 7
26,078,525 UART: [art] Derive CDI
26,079,354 UART: [art] Store in in slot 0x4
26,122,143 UART: [art] Derive Key Pair
26,123,194 UART: [art] Store priv key in slot 0x5
29,365,024 UART: [art] Derive Key Pair - Done
29,378,293 UART: [art] Signing Cert with AUTHO
29,379,632 UART: RITY.KEYID = 7
31,658,850 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,358 UART: [art] PUB.X = D3C77A8F595F3E8E7DD6F49DC060E0CBC94665059CA4C8B8DE4F1FF95C155B4F878887C22304E5F7AC682F49535EEB5A
31,667,631 UART: [art] PUB.Y = 0C7F3FEAE6CB8A2C7F2C8AB73FFACD3A60F97EFE0BD05CBA73CBE1B7477EDF43029C6378E1D57C57DF4E3EC2411B4F55
31,674,950 UART: [art] SIG.R = 497A26DC1AFE9311C900A30E00D2014AEC8C16334AC01E27BC37616432D9D83DA61CF3446A824ABC0D024CCC17451D6D
31,682,294 UART: [art] SIG.S = 879957F1BFBF20578A78EAF5E3CA04E32896D00DE74FC4DD6F9E091CAF6C0F7A918B5A825F7D80426009A2DC1C6D7930
32,987,065 UART: Caliptra RT
32,987,780 UART: [state] CFI Enabled
33,105,232 UART: [rt] RT listening for mailbox commands...
33,107,083 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,136,721 UART: [rt]cmd =0x46504c54, len=4
33,138,325 >>> mbox cmd response data (8 bytes)
33,139,313 UART: [rt] FIPS self test
33,140,254 UART: [kat] ++
33,140,722 UART: [kat] sha1
33,145,266 UART: [kat] SHA2-256
33,147,207 UART: [kat] SHA2-384
33,150,111 UART: [kat] SHA2-512-ACC
33,152,409 UART: [kat] ECC-384
36,393,563 UART: Fatal Error: 0x90040003
36,429,022 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,573,321 >>> mbox cmd response: failed
36,573,966 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,718,399 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
7,344,344 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
21,306,522 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,384 UART:
192,748 UART: Running Caliptra ROM ...
193,986 UART:
194,141 UART: [state] CFI Enabled
265,265 UART: [state] LifecycleState = Unprovisioned
267,169 UART: [state] DebugLocked = No
269,485 UART: [state] WD Timer not started. Device not locked for debugging
273,289 UART: [kat] SHA2-256
452,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,974 UART: [kat] ++
464,507 UART: [kat] sha1
476,159 UART: [kat] SHA2-256
479,174 UART: [kat] SHA2-384
485,678 UART: [kat] SHA2-512-ACC
488,624 UART: [kat] ECC-384
2,948,572 UART: [kat] HMAC-384Kdf
2,973,108 UART: [kat] LMS
3,502,549 UART: [kat] --
3,507,419 UART: [cold-reset] ++
3,509,435 UART: [fht] FHT @ 0x50003400
3,520,145 UART: [idev] ++
3,520,749 UART: [idev] CDI.KEYID = 6
3,521,669 UART: [idev] SUBJECT.KEYID = 7
3,522,843 UART: [idev] UDS.KEYID = 0
3,523,767 ready_for_fw is high
3,523,959 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,831 UART: [idev] Erasing UDS.KEYID = 0
6,027,073 UART: [idev] Sha1 KeyId Algorithm
6,050,830 UART: [idev] --
6,055,483 UART: [ldev] ++
6,056,060 UART: [ldev] CDI.KEYID = 6
6,056,952 UART: [ldev] SUBJECT.KEYID = 5
6,058,114 UART: [ldev] AUTHORITY.KEYID = 7
6,059,402 UART: [ldev] FE.KEYID = 1
6,102,110 UART: [ldev] Erasing FE.KEYID = 1
8,605,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,495 UART: [ldev] --
10,415,979 UART: [fwproc] Wait for Commands...
10,419,099 UART: [fwproc] Recv command 0x46574c44
10,421,201 UART: [fwproc] Recv'd Img size: 115304 bytes
13,838,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,913,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,982,232 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,303,839 >>> mbox cmd response: success
14,307,885 UART: [afmc] ++
14,308,478 UART: [afmc] CDI.KEYID = 6
14,309,410 UART: [afmc] SUBJECT.KEYID = 7
14,310,572 UART: [afmc] AUTHORITY.KEYID = 5
16,854,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,590,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,592,710 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,608,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,624,507 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,640,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,662,374 UART: [afmc] --
18,666,831 UART: [cold-reset] --
18,671,124 UART: [state] Locking Datavault
18,676,915 UART: [state] Locking PCR0, PCR1 and PCR31
18,678,617 UART: [state] Locking ICCM
18,680,981 UART: [exit] Launching FMC @ 0x40000130
18,689,437 UART:
18,689,672 UART: Running Caliptra FMC ...
18,690,802 UART:
18,690,972 UART: [state] CFI Enabled
18,749,385 UART: [fht] FMC Alias Private Key: 7
20,513,650 UART: [art] Extend RT PCRs Done
20,514,871 UART: [art] Lock RT PCRs Done
20,516,633 UART: [art] Populate DV Done
20,522,160 UART: [fht] FMC Alias Private Key: 7
20,523,860 UART: [art] Derive CDI
20,524,594 UART: [art] Store in in slot 0x4
20,582,184 UART: [art] Derive Key Pair
20,583,220 UART: [art] Store priv key in slot 0x5
23,045,954 UART: [art] Derive Key Pair - Done
23,059,061 UART: [art] Signing Cert with AUTHO
23,060,374 UART: RITY.KEYID = 7
24,771,883 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,398 UART: [art] PUB.X = EF309D1378437409F1335072EAB6C299C9145979EF90F2B75C03CC276D8AD7401BBF19FF505B043781895ECDEF42CB49
24,780,680 UART: [art] PUB.Y = 88BFDCB36F07B9F8AA5DC0F6ECD425DA31E526BB1694E6572D5A3EB74DD6C169BFC8E1CE14ADC1FF9EFD7776529399D9
24,787,975 UART: [art] SIG.R = F11122B9F438BD28859083697F14A9223BE6056E5E46B3A24809B5A3E8B76B63D951627EBF62A2A22C1C0C917C31E2D3
24,795,518 UART: [art] SIG.S = 9F34F521DBE20C75FC471CEE4AE87AF99C354850DB74988583C0C8324813709FCB46F0E740C0FB238EB949731F3256D8
25,773,965 UART: Caliptra RT
25,774,683 UART: [state] CFI Enabled
25,941,812 UART: [rt] RT listening for mailbox commands...
25,943,667 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,973,296 UART: [rt]cmd =0x46504c54, len=4
25,974,978 >>> mbox cmd response data (8 bytes)
25,976,054 UART: [rt] FIPS self test
25,976,994 UART: [kat] ++
25,977,444 UART: [kat] sha1
25,981,792 UART: [kat] SHA2-256
25,983,664 UART: [kat] SHA2-384
25,986,727 UART: [kat] SHA2-512-ACC
25,988,961 UART: [kat] ECC-384
28,426,211 UART: Fatal Error: 0x90040003
28,461,523 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,606,409 >>> mbox cmd response: failed
28,607,072 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,751,819 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,008 UART:
190,302 UART: Running Caliptra ROM ...
191,328 UART:
191,466 UART: [state] CFI Enabled
263,515 UART: [state] LifecycleState = Unprovisioned
265,378 UART: [state] DebugLocked = No
267,429 UART: [state] WD Timer not started. Device not locked for debugging
271,968 UART: [kat] SHA2-256
451,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,689 UART: [kat] ++
463,134 UART: [kat] sha1
474,599 UART: [kat] SHA2-256
477,613 UART: [kat] SHA2-384
483,265 UART: [kat] SHA2-512-ACC
486,254 UART: [kat] ECC-384
2,949,503 UART: [kat] HMAC-384Kdf
2,971,346 UART: [kat] LMS
3,500,817 UART: [kat] --
3,506,590 UART: [cold-reset] ++
3,509,062 UART: [fht] FHT @ 0x50003400
3,520,366 UART: [idev] ++
3,520,928 UART: [idev] CDI.KEYID = 6
3,521,810 UART: [idev] SUBJECT.KEYID = 7
3,523,021 UART: [idev] UDS.KEYID = 0
3,524,513 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,669,653 UART: [idev] Erasing UDS.KEYID = 0
6,024,671 UART: [idev] Sha1 KeyId Algorithm
6,047,135 UART: [idev] --
6,051,157 UART: [ldev] ++
6,051,734 UART: [ldev] CDI.KEYID = 6
6,052,648 UART: [ldev] SUBJECT.KEYID = 5
6,053,811 UART: [ldev] AUTHORITY.KEYID = 7
6,055,101 UART: [ldev] FE.KEYID = 1
6,098,688 UART: [ldev] Erasing FE.KEYID = 1
8,604,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,561 UART: [ldev] --
10,413,177 UART: [fwproc] Wait for Commands...
10,414,754 UART: [fwproc] Recv command 0x46574c44
10,416,859 UART: [fwproc] Recv'd Img size: 115304 bytes
13,831,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,814 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,288,414 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,364,026 ready_for_fw is high
3,364,685 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,062,814 >>> mbox cmd response: success
18,349,003 UART:
18,349,388 UART: Running Caliptra FMC ...
18,350,537 UART:
18,350,698 UART: [state] CFI Enabled
18,414,517 UART: [fht] FMC Alias Private Key: 7
20,178,940 UART: [art] Extend RT PCRs Done
20,180,164 UART: [art] Lock RT PCRs Done
20,181,682 UART: [art] Populate DV Done
20,186,911 UART: [fht] FMC Alias Private Key: 7
20,188,447 UART: [art] Derive CDI
20,189,211 UART: [art] Store in in slot 0x4
20,247,016 UART: [art] Derive Key Pair
20,248,062 UART: [art] Store priv key in slot 0x5
22,710,988 UART: [art] Derive Key Pair - Done
22,723,722 UART: [art] Signing Cert with AUTHO
22,725,023 UART: RITY.KEYID = 7
24,436,359 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,869 UART: [art] PUB.X = 46C49DEF9D6B43415057070A6177E6FFF675E46A37B0AF78A001DE97D4557B934C890A696C1A525C720E6760785FAC2E
24,445,137 UART: [art] PUB.Y = 828E76C38ED79DE49A4151C1094EB0121563A8235DDF30E51C2C968446DB5BD7230C9C1348BA1215EF629C1F7F3D365E
24,452,386 UART: [art] SIG.R = EBFF85DDD992A998A9EF1CF78A9C9854FB352B7DF13654CA4E461F2F2FC3E9BAB326259DC4B76686B658D1E8F33A962D
24,459,800 UART: [art] SIG.S = D25DAC19982B5731B810AADC20B4404703B573EB936C63C0B8F0E4D0FE58A3086BCFC5D877007D66F6835618F75F2E36
25,439,079 UART: Caliptra RT
25,439,804 UART: [state] CFI Enabled
25,604,012 UART: [rt] RT listening for mailbox commands...
25,605,870 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,635,479 UART: [rt]cmd =0x46504c54, len=4
25,637,058 >>> mbox cmd response data (8 bytes)
25,638,215 UART: [rt] FIPS self test
25,639,154 UART: [kat] ++
25,639,625 UART: [kat] sha1
25,644,084 UART: [kat] SHA2-256
25,645,965 UART: [kat] SHA2-384
25,649,193 UART: [kat] SHA2-512-ACC
25,651,433 UART: [kat] ECC-384
28,087,750 UART: Fatal Error: 0x90040003
28,123,053 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,267,873 >>> mbox cmd response: failed
28,268,532 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,413,267 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,363,306 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,088,504 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
192,537 UART:
192,939 UART: Running Caliptra ROM ...
194,170 UART:
603,534 UART: [state] CFI Enabled
618,497 UART: [state] LifecycleState = Unprovisioned
620,376 UART: [state] DebugLocked = No
622,761 UART: [state] WD Timer not started. Device not locked for debugging
626,231 UART: [kat] SHA2-256
805,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,993 UART: [kat] ++
817,442 UART: [kat] sha1
829,049 UART: [kat] SHA2-256
832,030 UART: [kat] SHA2-384
837,539 UART: [kat] SHA2-512-ACC
840,478 UART: [kat] ECC-384
3,279,994 UART: [kat] HMAC-384Kdf
3,293,005 UART: [kat] LMS
3,822,520 UART: [kat] --
3,825,670 UART: [cold-reset] ++
3,827,535 UART: [fht] FHT @ 0x50003400
3,839,580 UART: [idev] ++
3,840,156 UART: [idev] CDI.KEYID = 6
3,841,042 UART: [idev] SUBJECT.KEYID = 7
3,842,292 UART: [idev] UDS.KEYID = 0
3,843,230 ready_for_fw is high
3,843,479 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,988,376 UART: [idev] Erasing UDS.KEYID = 0
6,316,399 UART: [idev] Sha1 KeyId Algorithm
6,339,562 UART: [idev] --
6,343,529 UART: [ldev] ++
6,344,106 UART: [ldev] CDI.KEYID = 6
6,344,993 UART: [ldev] SUBJECT.KEYID = 5
6,346,208 UART: [ldev] AUTHORITY.KEYID = 7
6,347,462 UART: [ldev] FE.KEYID = 1
6,359,519 UART: [ldev] Erasing FE.KEYID = 1
8,831,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,074 UART: [ldev] --
10,622,800 UART: [fwproc] Wait for Commands...
10,626,031 UART: [fwproc] Recv command 0x46574c44
10,628,127 UART: [fwproc] Recv'd Img size: 115304 bytes
14,043,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,122,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,191,711 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,513,882 >>> mbox cmd response: success
14,518,518 UART: [afmc] ++
14,519,119 UART: [afmc] CDI.KEYID = 6
14,520,007 UART: [afmc] SUBJECT.KEYID = 7
14,521,172 UART: [afmc] AUTHORITY.KEYID = 5
17,024,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,743,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,745,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,761,451 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,777,434 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,793,314 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,815,942 UART: [afmc] --
18,819,707 UART: [cold-reset] --
18,822,633 UART: [state] Locking Datavault
18,828,104 UART: [state] Locking PCR0, PCR1 and PCR31
18,829,751 UART: [state] Locking ICCM
18,832,254 UART: [exit] Launching FMC @ 0x40000130
18,840,701 UART:
18,840,955 UART: Running Caliptra FMC ...
18,841,986 UART:
18,842,130 UART: [state] CFI Enabled
18,850,504 UART: [fht] FMC Alias Private Key: 7
20,606,849 UART: [art] Extend RT PCRs Done
20,608,074 UART: [art] Lock RT PCRs Done
20,609,513 UART: [art] Populate DV Done
20,615,144 UART: [fht] FMC Alias Private Key: 7
20,616,739 UART: [art] Derive CDI
20,617,499 UART: [art] Store in in slot 0x4
20,660,243 UART: [art] Derive Key Pair
20,661,281 UART: [art] Store priv key in slot 0x5
23,087,677 UART: [art] Derive Key Pair - Done
23,100,624 UART: [art] Signing Cert with AUTHO
23,101,925 UART: RITY.KEYID = 7
24,807,471 UART: [art] Erasing AUTHORITY.KEYID = 7
24,809,002 UART: [art] PUB.X = 2C6CBD0D90C04D37FA52A565A447C5EC1F0ADAA0BE970201EB3DE1D10BD7D4ECD033DA2BC8135D63999347C53E4B3387
24,816,266 UART: [art] PUB.Y = 8D60BB3AF35E50D280A08F91F94A3E296402BAFDD4A36E9A3AA6FC216FA10A1752A13C6635A0DD612428A8784951D2DA
24,823,524 UART: [art] SIG.R = EA86E88722DC30FCCB766083D7F980FC848A629F621E324DDACB8EAD4378557DECE875CA6C8785307B1FFD41AFE6703C
24,830,936 UART: [art] SIG.S = D1764E56751152E1A548927E041F15828F7819D1C2A79260E463D5C9DF63B930E430540E244A0E39D7066A1627135351
25,810,085 UART: Caliptra RT
25,810,799 UART: [state] CFI Enabled
25,928,722 UART: [rt] RT listening for mailbox commands...
25,930,569 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,960,149 UART: [rt]cmd =0x46504c54, len=4
25,961,645 >>> mbox cmd response data (8 bytes)
25,962,727 UART: [rt] FIPS self test
25,963,667 UART: [kat] ++
25,964,119 UART: [kat] sha1
25,968,442 UART: [kat] SHA2-256
25,970,376 UART: [kat] SHA2-384
25,973,224 UART: [kat] SHA2-512-ACC
25,975,479 UART: [kat] ECC-384
28,401,803 UART: Fatal Error: 0x90040003
28,437,208 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,582,042 >>> mbox cmd response: failed
28,582,710 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,727,300 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,094 UART:
190,388 UART: Running Caliptra ROM ...
191,497 UART:
11,814,925 UART: [state] CFI Enabled
11,827,551 UART: [state] LifecycleState = Unprovisioned
11,829,415 UART: [state] DebugLocked = No
11,832,310 UART: [state] WD Timer not started. Device not locked for debugging
11,835,460 UART: [kat] SHA2-256
12,014,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,026,158 UART: [kat] ++
12,026,616 UART: [kat] sha1
12,038,364 UART: [kat] SHA2-256
12,041,385 UART: [kat] SHA2-384
12,046,781 UART: [kat] SHA2-512-ACC
12,049,726 UART: [kat] ECC-384
14,491,683 UART: [kat] HMAC-384Kdf
14,504,180 UART: [kat] LMS
15,033,668 UART: [kat] --
15,038,900 UART: [cold-reset] ++
15,040,015 UART: [fht] FHT @ 0x50003400
15,050,972 UART: [idev] ++
15,051,726 UART: [idev] CDI.KEYID = 6
15,052,613 UART: [idev] SUBJECT.KEYID = 7
15,053,662 UART: [idev] UDS.KEYID = 0
15,055,260 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
15,199,971 UART: [idev] Erasing UDS.KEYID = 0
17,529,817 UART: [idev] Sha1 KeyId Algorithm
17,554,156 UART: [idev] --
17,558,445 UART: [ldev] ++
17,559,020 UART: [ldev] CDI.KEYID = 6
17,559,931 UART: [ldev] SUBJECT.KEYID = 5
17,561,091 UART: [ldev] AUTHORITY.KEYID = 7
17,562,380 UART: [ldev] FE.KEYID = 1
17,572,488 UART: [ldev] Erasing FE.KEYID = 1
20,050,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,769,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,785,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,801,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,816,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,838,390 UART: [ldev] --
21,842,973 UART: [fwproc] Wait for Commands...
21,844,859 UART: [fwproc] Recv command 0x46574c44
21,846,958 UART: [fwproc] Recv'd Img size: 115304 bytes
25,265,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,335,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,404,582 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,726,469 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,696,948 ready_for_fw is high
3,697,433 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,292,152 >>> mbox cmd response: success
18,539,006 UART:
18,539,498 UART: Running Caliptra FMC ...
18,540,626 UART:
18,540,784 UART: [state] CFI Enabled
18,548,578 UART: [fht] FMC Alias Private Key: 7
20,305,732 UART: [art] Extend RT PCRs Done
20,306,966 UART: [art] Lock RT PCRs Done
20,308,656 UART: [art] Populate DV Done
20,313,946 UART: [fht] FMC Alias Private Key: 7
20,315,649 UART: [art] Derive CDI
20,316,463 UART: [art] Store in in slot 0x4
20,358,955 UART: [art] Derive Key Pair
20,359,993 UART: [art] Store priv key in slot 0x5
22,786,509 UART: [art] Derive Key Pair - Done
22,799,737 UART: [art] Signing Cert with AUTHO
22,801,045 UART: RITY.KEYID = 7
24,506,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,712 UART: [art] PUB.X = B35880E3813669793B38E173F0C42059F7E3581AECE238BAE4474FAFE0530E9AEAD15E03552CB6C1C5E5FCC6A3D26312
24,514,985 UART: [art] PUB.Y = 243E7D83EF24214182992C93AA4FDB0129C7EFFC43DB798401727BBFAB7D83FBDC6E337F176677FABB3EEBDAF7E56CE4
24,522,291 UART: [art] SIG.R = 1D0D02B5693626EACCCD3D34D38E6FA29ED57A83E4BF51A33D6E746D313C422E51600267863821ABFF926F3D5BC93F52
24,529,685 UART: [art] SIG.S = 4AE75824C8AF5638F0E62863DC09DCF4E24DF4292F4F1F123DBB9CE15F7557DBEF8434435CE8C9DC0F61D2DF1A3A6504
25,508,729 UART: Caliptra RT
25,509,449 UART: [state] CFI Enabled
25,627,816 UART: [rt] RT listening for mailbox commands...
25,629,692 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,659,343 UART: [rt]cmd =0x46504c54, len=4
25,660,809 >>> mbox cmd response data (8 bytes)
25,662,131 UART: [rt] FIPS self test
25,663,070 UART: [kat] ++
25,663,526 UART: [kat] sha1
25,668,197 UART: [kat] SHA2-256
25,670,122 UART: [kat] SHA2-384
25,673,037 UART: [kat] SHA2-512-ACC
25,675,253 UART: [kat] ECC-384
28,101,298 UART: Fatal Error: 0x90040003
28,136,579 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,281,467 >>> mbox cmd response: failed
28,282,150 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,426,875 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
15,204,337 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,790,919 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,437,933 ready_for_fw is high
3,438,363 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,751,998 >>> mbox cmd response: success
19,068,451 UART:
19,068,834 UART: Running Caliptra FMC ...
19,069,987 UART:
19,070,146 UART: [state] CFI Enabled
19,138,605 UART: [fht] FMC Alias Private Key: 7
20,902,090 UART: [art] Extend RT PCRs Done
20,903,310 UART: [art] Lock RT PCRs Done
20,904,993 UART: [art] Populate DV Done
20,910,079 UART: [fht] FMC Alias Private Key: 7
20,911,739 UART: [art] Derive CDI
20,912,555 UART: [art] Store in in slot 0x4
20,972,094 UART: [art] Derive Key Pair
20,973,142 UART: [art] Store priv key in slot 0x5
23,436,398 UART: [art] Derive Key Pair - Done
23,449,300 UART: [art] Signing Cert with AUTHO
23,450,605 UART: RITY.KEYID = 7
25,162,101 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,733 UART: [art] PUB.X = 0ACF823437C259140053816402A7C27B6967D3ACABB893D2B27AC1F006C758F5663813CE615880ADD15870A04DBE8975
25,170,835 UART: [art] PUB.Y = 66CC3A0885590C24C2452AB1D1829643D44F439C1A30147B2A4C3D9C55F0D39C0A68FC57F5B5243C3FCD7E82BA85BA22
25,178,073 UART: [art] SIG.R = 0E3077FB1843069E0E191B63D22BD486C47B46060A64DAB7102FA536F8CEDD116D985240F2C9C6EF890651EA11DE23B6
25,185,499 UART: [art] SIG.S = ADC3BF001170D902CF6636864E26682CF49D5D4923F40E4EDB471A60453E352B175307164925E66964A1046C4A53435E
26,163,887 UART: Caliptra RT
26,164,576 UART: [state] CFI Enabled
26,329,797 UART: [rt] RT listening for mailbox commands...
26,331,653 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,361,395 UART: [rt]cmd =0x46504c54, len=4
26,363,077 >>> mbox cmd response data (8 bytes)
26,364,181 UART: [rt] FIPS self test
26,365,135 UART: [kat] ++
26,365,588 UART: [kat] sha1
26,370,237 UART: [kat] SHA2-256
26,372,170 UART: [kat] SHA2-384
26,375,237 UART: [kat] SHA2-512-ACC
26,377,511 UART: [kat] ECC-384
28,814,190 UART: Fatal Error: 0x90040003
28,849,635 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,994,410 >>> mbox cmd response: failed
28,995,052 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,139,801 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,440,013 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,763,073 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,752,844 ready_for_fw is high
3,753,677 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,978,397 >>> mbox cmd response: success
19,236,392 UART:
19,236,800 UART: Running Caliptra FMC ...
19,237,922 UART:
19,238,076 UART: [state] CFI Enabled
19,246,300 UART: [fht] FMC Alias Private Key: 7
21,003,104 UART: [art] Extend RT PCRs Done
21,004,331 UART: [art] Lock RT PCRs Done
21,006,042 UART: [art] Populate DV Done
21,011,679 UART: [fht] FMC Alias Private Key: 7
21,013,274 UART: [art] Derive CDI
21,014,017 UART: [art] Store in in slot 0x4
21,057,055 UART: [art] Derive Key Pair
21,058,102 UART: [art] Store priv key in slot 0x5
23,484,079 UART: [art] Derive Key Pair - Done
23,496,818 UART: [art] Signing Cert with AUTHO
23,498,155 UART: RITY.KEYID = 7
25,203,131 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,637 UART: [art] PUB.X = 6D87F6938A425209101E1536BB486EF7427CC0867BD48197F4EC9399BBCA94A8EC6440BA36FCA834113E93B064C60E7B
25,211,883 UART: [art] PUB.Y = 678AB5539D7192E4E79300A7D88DA7581A87C440C941F3936AF88849F38D94987D0F96E7F676579EDFA41A95FFC25683
25,219,106 UART: [art] SIG.R = 7397CDAEA4DF576CED996537C5103EA66405539E90D14C112F5A0EC537A6C857D9AC3ACDA641AE7DE436657DB693235B
25,226,521 UART: [art] SIG.S = D32E8C97F190D29CB6830815A324D491AA3FC425E958D53E3C18F456ACE2DB36FFC49F946C5F0D6CC0D14D2F3BC11914
26,205,636 UART: Caliptra RT
26,206,351 UART: [state] CFI Enabled
26,323,642 UART: [rt] RT listening for mailbox commands...
26,325,493 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,355,016 UART: [rt]cmd =0x46504c54, len=4
26,356,542 >>> mbox cmd response data (8 bytes)
26,357,857 UART: [rt] FIPS self test
26,358,796 UART: [kat] ++
26,359,250 UART: [kat] sha1
26,363,815 UART: [kat] SHA2-256
26,365,700 UART: [kat] SHA2-384
26,368,819 UART: [kat] SHA2-512-ACC
26,371,096 UART: [kat] ECC-384
28,797,273 UART: Fatal Error: 0x90040003
28,832,566 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,977,365 >>> mbox cmd response: failed
28,978,052 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,122,778 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
14,570,006 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,794,791 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,096 UART: [kat] SHA2-512-ACC
896,997 UART: [kat] ECC-384
902,322 UART: [kat] HMAC-384Kdf
906,886 UART: [kat] LMS
1,475,082 UART: [kat] --
1,475,889 UART: [cold-reset] ++
1,476,265 UART: [fht] Storing FHT @ 0x50003400
1,478,902 UART: [idev] ++
1,479,070 UART: [idev] CDI.KEYID = 6
1,479,430 UART: [idev] SUBJECT.KEYID = 7
1,479,854 UART: [idev] UDS.KEYID = 0
1,480,199 ready_for_fw is high
1,480,199 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,602 UART: [idev] Erasing UDS.KEYID = 0
1,504,052 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,616 UART: [idev] --
1,513,635 UART: [ldev] ++
1,513,803 UART: [ldev] CDI.KEYID = 6
1,514,166 UART: [ldev] SUBJECT.KEYID = 5
1,514,592 UART: [ldev] AUTHORITY.KEYID = 7
1,515,055 UART: [ldev] FE.KEYID = 1
1,520,147 UART: [ldev] Erasing FE.KEYID = 1
1,545,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,574 UART: [ldev] --
1,584,969 UART: [fwproc] Waiting for Commands...
1,585,724 UART: [fwproc] Received command 0x46574c44
1,586,515 UART: [fwproc] Received Image of size 115304 bytes
2,896,264 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,772 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,124 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,397 >>> mbox cmd response: success
3,090,565 UART: [afmc] ++
3,090,733 UART: [afmc] CDI.KEYID = 6
3,091,095 UART: [afmc] SUBJECT.KEYID = 7
3,091,520 UART: [afmc] AUTHORITY.KEYID = 5
3,126,553 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,411 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,024 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,714 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,451 UART: [afmc] --
3,169,463 UART: [cold-reset] --
3,170,293 UART: [state] Locking Datavault
3,171,412 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,016 UART: [state] Locking ICCM
3,172,506 UART: [exit] Launching FMC @ 0x40000130
3,177,835 UART:
3,177,851 UART: Running Caliptra FMC ...
3,178,259 UART:
3,178,313 UART: [state] CFI Enabled
3,188,720 UART: [fht] FMC Alias Private Key: 7
3,297,333 UART: [art] Extend RT PCRs Done
3,297,761 UART: [art] Lock RT PCRs Done
3,299,051 UART: [art] Populate DV Done
3,307,218 UART: [fht] FMC Alias Private Key: 7
3,308,332 UART: [art] Derive CDI
3,308,612 UART: [art] Store in in slot 0x4
3,394,277 UART: [art] Derive Key Pair
3,394,637 UART: [art] Store priv key in slot 0x5
3,408,027 UART: [art] Derive Key Pair - Done
3,422,518 UART: [art] Signing Cert with AUTHO
3,422,998 UART: RITY.KEYID = 7
3,438,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,801 UART: [art] PUB.X = 3BF73FE799396A47529B305A601C9B84E050C5425B62DA6FE72D53DAAE69F9448C15D1044D4676FD2EC3D5B51A19DE40
3,445,574 UART: [art] PUB.Y = 811D707CEF0EA18619E78197AC8D130B3D825BE0F8D1B577E016948BC1337DE0B6B5FABF989A4DBAED3A406FA315D849
3,452,532 UART: [art] SIG.R = 758FF4C661BD61BB5772ADA53DF08B8A09B081AE7B908D0AF814D0D528568F16CDB029825955D4569D89481A65B6BD70
3,459,300 UART: [art] SIG.S = 3E14EC3BFB8A553A320D43D9B2CFC36E8474CF45832522B8AA972EFC309D81A92646FD6AF06B0EB124C7BAB0D57662CE
3,482,897 UART: Caliptra RT
3,483,150 UART: [state] CFI Enabled
3,591,098 UART: [rt] RT listening for mailbox commands...
3,591,761 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,528 UART: [rt]cmd =0x46504c54, len=4
3,622,477 >>> mbox cmd response data (8 bytes)
3,622,766 UART: [rt] FIPS self test
3,623,094 UART: [kat] ++
3,623,246 UART: [kat] sha1
3,627,294 UART: [kat] SHA2-256
3,629,316 UART: [kat] SHA2-384
3,632,189 UART: [kat] SHA2-512-ACC
3,634,116 UART: [kat] ECC-384
3,643,374 UART: Fatal Error: 0x90040003
3,644,924 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,644,929 >>> mbox cmd response: failed
3,644,929 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,644,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,817 UART: [kat] SHA2-256
881,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,863 UART: [kat] ++
886,015 UART: [kat] sha1
890,331 UART: [kat] SHA2-256
892,269 UART: [kat] SHA2-384
895,148 UART: [kat] SHA2-512-ACC
897,049 UART: [kat] ECC-384
902,552 UART: [kat] HMAC-384Kdf
906,986 UART: [kat] LMS
1,475,182 UART: [kat] --
1,475,853 UART: [cold-reset] ++
1,476,363 UART: [fht] Storing FHT @ 0x50003400
1,479,104 UART: [idev] ++
1,479,272 UART: [idev] CDI.KEYID = 6
1,479,632 UART: [idev] SUBJECT.KEYID = 7
1,480,056 UART: [idev] UDS.KEYID = 0
1,480,401 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,988 UART: [idev] Erasing UDS.KEYID = 0
1,504,676 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,404 UART: [idev] --
1,514,359 UART: [ldev] ++
1,514,527 UART: [ldev] CDI.KEYID = 6
1,514,890 UART: [ldev] SUBJECT.KEYID = 5
1,515,316 UART: [ldev] AUTHORITY.KEYID = 7
1,515,779 UART: [ldev] FE.KEYID = 1
1,520,987 UART: [ldev] Erasing FE.KEYID = 1
1,546,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,106 UART: [ldev] --
1,585,617 UART: [fwproc] Waiting for Commands...
1,586,336 UART: [fwproc] Received command 0x46574c44
1,587,127 UART: [fwproc] Received Image of size 115304 bytes
2,897,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,088 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,440 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,887 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,083 ready_for_fw is high
1,362,083 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,083 >>> mbox cmd response: success
3,001,681 UART:
3,001,697 UART: Running Caliptra FMC ...
3,002,105 UART:
3,002,159 UART: [state] CFI Enabled
3,012,254 UART: [fht] FMC Alias Private Key: 7
3,120,003 UART: [art] Extend RT PCRs Done
3,120,431 UART: [art] Lock RT PCRs Done
3,121,831 UART: [art] Populate DV Done
3,130,166 UART: [fht] FMC Alias Private Key: 7
3,131,228 UART: [art] Derive CDI
3,131,508 UART: [art] Store in in slot 0x4
3,217,099 UART: [art] Derive Key Pair
3,217,459 UART: [art] Store priv key in slot 0x5
3,230,367 UART: [art] Derive Key Pair - Done
3,244,888 UART: [art] Signing Cert with AUTHO
3,245,368 UART: RITY.KEYID = 7
3,260,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,663 UART: [art] PUB.X = 05C7B0D3AB53723E7AF797CF6CD2AA2CF429396DE50FA915AFFE359D28EC5FF3C657E523B92FCEA4D8F13EFCD83023E7
3,268,451 UART: [art] PUB.Y = 9D1180ECAFDFD00455E501674214A85D660E939A42DF3A3877B8E931042174FEB60FD4FE10959BB55B788E6659064D0A
3,275,380 UART: [art] SIG.R = 558B76A106490546E4C80985BA46676C1C8465FE7F0BAAD78ECE8062DCF48C25C4709BEE79CFAA8C34DB8D298FF9A15F
3,282,152 UART: [art] SIG.S = 9620265EC985F29A518F13C1170E6E4B58ABB4D7B0E097F2261F176DE392EC6A2606E0DBF9E72B48F50D87276B935DA8
3,305,668 UART: Caliptra RT
3,305,921 UART: [state] CFI Enabled
3,414,744 UART: [rt] RT listening for mailbox commands...
3,415,407 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,972 UART: [rt]cmd =0x46504c54, len=4
3,446,025 >>> mbox cmd response data (8 bytes)
3,446,254 UART: [rt] FIPS self test
3,446,582 UART: [kat] ++
3,446,734 UART: [kat] sha1
3,450,988 UART: [kat] SHA2-256
3,453,010 UART: [kat] SHA2-384
3,455,843 UART: [kat] SHA2-512-ACC
3,457,770 UART: [kat] ECC-384
3,467,238 UART: Fatal Error: 0x90040003
3,468,788 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,468,793 >>> mbox cmd response: failed
3,468,793 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,468,798 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,405 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,387 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,034 UART: [kat] SHA2-256
881,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,080 UART: [kat] ++
886,232 UART: [kat] sha1
890,410 UART: [kat] SHA2-256
892,348 UART: [kat] SHA2-384
895,113 UART: [kat] SHA2-512-ACC
897,014 UART: [kat] ECC-384
902,781 UART: [kat] HMAC-384Kdf
907,379 UART: [kat] LMS
1,475,575 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,477,170 UART: [fht] Storing FHT @ 0x50003400
1,479,975 UART: [idev] ++
1,480,143 UART: [idev] CDI.KEYID = 6
1,480,503 UART: [idev] SUBJECT.KEYID = 7
1,480,927 UART: [idev] UDS.KEYID = 0
1,481,272 ready_for_fw is high
1,481,272 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,103 UART: [idev] Erasing UDS.KEYID = 0
1,505,579 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,167 UART: [idev] --
1,515,172 UART: [ldev] ++
1,515,340 UART: [ldev] CDI.KEYID = 6
1,515,703 UART: [ldev] SUBJECT.KEYID = 5
1,516,129 UART: [ldev] AUTHORITY.KEYID = 7
1,516,592 UART: [ldev] FE.KEYID = 1
1,521,970 UART: [ldev] Erasing FE.KEYID = 1
1,547,517 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,373 UART: [ldev] --
1,586,790 UART: [fwproc] Waiting for Commands...
1,587,559 UART: [fwproc] Received command 0x46574c44
1,588,350 UART: [fwproc] Received Image of size 115304 bytes
2,897,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,685 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,037 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,430 >>> mbox cmd response: success
3,092,532 UART: [afmc] ++
3,092,700 UART: [afmc] CDI.KEYID = 6
3,093,062 UART: [afmc] SUBJECT.KEYID = 7
3,093,487 UART: [afmc] AUTHORITY.KEYID = 5
3,128,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,846 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,626 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,354 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,239 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,929 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,702 UART: [afmc] --
3,171,714 UART: [cold-reset] --
3,172,638 UART: [state] Locking Datavault
3,174,029 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,633 UART: [state] Locking ICCM
3,175,265 UART: [exit] Launching FMC @ 0x40000130
3,180,594 UART:
3,180,610 UART: Running Caliptra FMC ...
3,181,018 UART:
3,181,161 UART: [state] CFI Enabled
3,191,418 UART: [fht] FMC Alias Private Key: 7
3,299,465 UART: [art] Extend RT PCRs Done
3,299,893 UART: [art] Lock RT PCRs Done
3,301,447 UART: [art] Populate DV Done
3,309,564 UART: [fht] FMC Alias Private Key: 7
3,310,676 UART: [art] Derive CDI
3,310,956 UART: [art] Store in in slot 0x4
3,396,565 UART: [art] Derive Key Pair
3,396,925 UART: [art] Store priv key in slot 0x5
3,410,355 UART: [art] Derive Key Pair - Done
3,425,081 UART: [art] Signing Cert with AUTHO
3,425,561 UART: RITY.KEYID = 7
3,440,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,720 UART: [art] PUB.X = B1F7794DF8FA31F4D831207C90CA176A7066962AC0AABCCD0FB482A67145D0F245A877E1A84C8F79260F0BA9CFE0D8CA
3,448,497 UART: [art] PUB.Y = 98386A90A3AA64F40011F46689CFAFB69B27C3ACAEA5070A12E9E4A93ABE1A1C1810A1F628820C224335321E232096CD
3,455,420 UART: [art] SIG.R = F76EA474B7B8345FB3966212128C0AB4F3CA27742279C19782B11FBADDF6BBBA89F9DCA221C2FCA8980255E03AECC90D
3,462,197 UART: [art] SIG.S = 699DD0D5D1D114F93B6F1D318791105B2215C02D4C32B01FCADB6851283653C74AED9CDCE831F2DD520F345CBC7191A5
3,486,639 UART: Caliptra RT
3,486,984 UART: [state] CFI Enabled
3,596,195 UART: [rt] RT listening for mailbox commands...
3,596,858 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,921 UART: [rt]cmd =0x46504c54, len=4
3,627,938 >>> mbox cmd response data (8 bytes)
3,628,139 UART: [rt] FIPS self test
3,628,467 UART: [kat] ++
3,628,619 UART: [kat] sha1
3,632,935 UART: [kat] SHA2-256
3,634,957 UART: [kat] SHA2-384
3,637,838 UART: [kat] SHA2-512-ACC
3,639,765 UART: [kat] ECC-384
3,649,527 UART: Fatal Error: 0x90040003
3,651,077 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,651,082 >>> mbox cmd response: failed
3,651,082 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,651,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,362 UART: [kat] SHA2-256
882,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,408 UART: [kat] ++
886,560 UART: [kat] sha1
890,762 UART: [kat] SHA2-256
892,700 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
903,153 UART: [kat] HMAC-384Kdf
907,817 UART: [kat] LMS
1,476,013 UART: [kat] --
1,477,150 UART: [cold-reset] ++
1,477,674 UART: [fht] Storing FHT @ 0x50003400
1,480,473 UART: [idev] ++
1,480,641 UART: [idev] CDI.KEYID = 6
1,481,001 UART: [idev] SUBJECT.KEYID = 7
1,481,425 UART: [idev] UDS.KEYID = 0
1,481,770 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,595 UART: [idev] Erasing UDS.KEYID = 0
1,506,595 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,305 UART: [idev] --
1,516,294 UART: [ldev] ++
1,516,462 UART: [ldev] CDI.KEYID = 6
1,516,825 UART: [ldev] SUBJECT.KEYID = 5
1,517,251 UART: [ldev] AUTHORITY.KEYID = 7
1,517,714 UART: [ldev] FE.KEYID = 1
1,523,132 UART: [ldev] Erasing FE.KEYID = 1
1,549,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,453 UART: [ldev] --
1,588,946 UART: [fwproc] Waiting for Commands...
1,589,755 UART: [fwproc] Received command 0x46574c44
1,590,546 UART: [fwproc] Received Image of size 115304 bytes
2,899,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,947 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,299 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,616 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,988 ready_for_fw is high
1,362,988 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,232 >>> mbox cmd response: success
3,004,110 UART:
3,004,126 UART: Running Caliptra FMC ...
3,004,534 UART:
3,004,677 UART: [state] CFI Enabled
3,015,196 UART: [fht] FMC Alias Private Key: 7
3,123,521 UART: [art] Extend RT PCRs Done
3,123,949 UART: [art] Lock RT PCRs Done
3,125,443 UART: [art] Populate DV Done
3,133,654 UART: [fht] FMC Alias Private Key: 7
3,134,826 UART: [art] Derive CDI
3,135,106 UART: [art] Store in in slot 0x4
3,221,193 UART: [art] Derive Key Pair
3,221,553 UART: [art] Store priv key in slot 0x5
3,234,745 UART: [art] Derive Key Pair - Done
3,249,414 UART: [art] Signing Cert with AUTHO
3,249,894 UART: RITY.KEYID = 7
3,265,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,855 UART: [art] PUB.X = 7FBD467B784C4D71023EF609B0923FAF0C8E9EB3226F80BFEA439F736EB0A323BB2A8A7314F13D9F0C066A536917C57E
3,272,620 UART: [art] PUB.Y = A2D9596254C24696F25021A337599C4BC8A85CA5FD96125542EC98812D01B5FB6CAC5E860BCCFD65EE6F3A2B057C0CFD
3,279,570 UART: [art] SIG.R = B44769FE63F1015EEDC12910ABC9BBD9AA4B5E481E90A2662B712460474BE8C48445B073C8144E050EF10621EA4AA637
3,286,332 UART: [art] SIG.S = F8D2B6F17E74C2815843F9ADD8394C86FA3205BE272B6C17C8B1484D81B07B57D80B70392CDA35D59940092A31966BA1
3,310,248 UART: Caliptra RT
3,310,593 UART: [state] CFI Enabled
3,420,205 UART: [rt] RT listening for mailbox commands...
3,420,868 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,799 UART: [rt]cmd =0x46504c54, len=4
3,451,820 >>> mbox cmd response data (8 bytes)
3,451,979 UART: [rt] FIPS self test
3,452,307 UART: [kat] ++
3,452,459 UART: [kat] sha1
3,456,593 UART: [kat] SHA2-256
3,458,615 UART: [kat] SHA2-384
3,461,328 UART: [kat] SHA2-512-ACC
3,463,255 UART: [kat] ECC-384
3,472,705 UART: Fatal Error: 0x90040003
3,474,255 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,474,260 >>> mbox cmd response: failed
3,474,260 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,474,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,424 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,844 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
893,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,535 UART: [kat] ++
897,687 UART: [kat] sha1
901,917 UART: [kat] SHA2-256
903,857 UART: [kat] SHA2-384
906,590 UART: [kat] SHA2-512-ACC
908,491 UART: [kat] ECC-384
918,104 UART: [kat] HMAC-384Kdf
922,628 UART: [kat] LMS
1,170,956 UART: [kat] --
1,171,811 UART: [cold-reset] ++
1,172,151 UART: [fht] FHT @ 0x50003400
1,174,986 UART: [idev] ++
1,175,154 UART: [idev] CDI.KEYID = 6
1,175,514 UART: [idev] SUBJECT.KEYID = 7
1,175,938 UART: [idev] UDS.KEYID = 0
1,176,283 ready_for_fw is high
1,176,283 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,510 UART: [idev] Erasing UDS.KEYID = 0
1,200,867 UART: [idev] Sha1 KeyId Algorithm
1,209,353 UART: [idev] --
1,210,413 UART: [ldev] ++
1,210,581 UART: [ldev] CDI.KEYID = 6
1,210,944 UART: [ldev] SUBJECT.KEYID = 5
1,211,370 UART: [ldev] AUTHORITY.KEYID = 7
1,211,833 UART: [ldev] FE.KEYID = 1
1,216,657 UART: [ldev] Erasing FE.KEYID = 1
1,242,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,657 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,820 UART: [fwproc] Recv command 0x46574c44
1,283,548 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,407 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,700 >>> mbox cmd response: success
2,787,744 UART: [afmc] ++
2,787,912 UART: [afmc] CDI.KEYID = 6
2,788,274 UART: [afmc] SUBJECT.KEYID = 7
2,788,699 UART: [afmc] AUTHORITY.KEYID = 5
2,824,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,289 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,902 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,621 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,437 UART: [afmc] --
2,867,325 UART: [cold-reset] --
2,868,213 UART: [state] Locking Datavault
2,869,542 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,146 UART: [state] Locking ICCM
2,870,754 UART: [exit] Launching FMC @ 0x40000130
2,876,083 UART:
2,876,099 UART: Running Caliptra FMC ...
2,876,507 UART:
2,876,561 UART: [state] CFI Enabled
2,887,680 UART: [fht] FMC Alias Private Key: 7
2,995,807 UART: [art] Extend RT PCRs Done
2,996,235 UART: [art] Lock RT PCRs Done
2,997,627 UART: [art] Populate DV Done
3,005,574 UART: [fht] FMC Alias Private Key: 7
3,006,642 UART: [art] Derive CDI
3,006,922 UART: [art] Store in in slot 0x4
3,092,813 UART: [art] Derive Key Pair
3,093,173 UART: [art] Store priv key in slot 0x5
3,106,055 UART: [art] Derive Key Pair - Done
3,121,146 UART: [art] Signing Cert with AUTHO
3,121,626 UART: RITY.KEYID = 7
3,136,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,561 UART: [art] PUB.X = 2C80BD1A4D05F8A38F505B1975BF799E2C7AA765FB69ADC1D105BFAFE3F8D5817BBD42CE818E6E5C1F73902720AED152
3,144,343 UART: [art] PUB.Y = 133722A0FE20E8A649D7ABE650AB92FD3D13360DCB526DB39ECDE157C79E71E9486397C9C54792C835CF0B6FDF026CC0
3,151,296 UART: [art] SIG.R = 7BBD2374C4AB3B3D79C4E2D0256512532149B18247816979D01C6A3344123E166DFFEE747670C281345133281AAE0493
3,158,051 UART: [art] SIG.S = 2855FB648EA4144D412EC65F7E05E073E2319B428CDF0E1F8D1A8B185FCDF4AA6F8841BCAE4398874F70DE5E4CBF9259
3,182,000 UART: Caliptra RT
3,182,253 UART: [state] CFI Enabled
3,289,780 UART: [rt] RT listening for mailbox commands...
3,290,443 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,280 UART: [rt]cmd =0x46504c54, len=4
3,321,411 >>> mbox cmd response data (8 bytes)
3,321,752 UART: [rt] FIPS self test
3,322,080 UART: [kat] ++
3,322,232 UART: [kat] sha1
3,326,474 UART: [kat] SHA2-256
3,328,496 UART: [kat] SHA2-384
3,331,311 UART: [kat] SHA2-512-ACC
3,333,238 UART: [kat] ECC-384
3,342,776 UART: Fatal Error: 0x90040003
3,344,326 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,344,331 >>> mbox cmd response: failed
3,344,331 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,344,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
893,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,495 UART: [kat] ++
897,647 UART: [kat] sha1
901,665 UART: [kat] SHA2-256
903,605 UART: [kat] SHA2-384
906,348 UART: [kat] SHA2-512-ACC
908,249 UART: [kat] ECC-384
917,592 UART: [kat] HMAC-384Kdf
922,044 UART: [kat] LMS
1,170,372 UART: [kat] --
1,171,423 UART: [cold-reset] ++
1,171,931 UART: [fht] FHT @ 0x50003400
1,174,540 UART: [idev] ++
1,174,708 UART: [idev] CDI.KEYID = 6
1,175,068 UART: [idev] SUBJECT.KEYID = 7
1,175,492 UART: [idev] UDS.KEYID = 0
1,175,837 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,966 UART: [idev] Erasing UDS.KEYID = 0
1,199,925 UART: [idev] Sha1 KeyId Algorithm
1,208,361 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,924 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,216,109 UART: [ldev] Erasing FE.KEYID = 1
1,242,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,587 UART: [ldev] --
1,281,984 UART: [fwproc] Wait for Commands...
1,282,620 UART: [fwproc] Recv command 0x46574c44
1,283,348 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,365 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,736 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,839 ready_for_fw is high
1,059,839 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,301 >>> mbox cmd response: success
2,700,945 UART:
2,700,961 UART: Running Caliptra FMC ...
2,701,369 UART:
2,701,423 UART: [state] CFI Enabled
2,711,812 UART: [fht] FMC Alias Private Key: 7
2,819,997 UART: [art] Extend RT PCRs Done
2,820,425 UART: [art] Lock RT PCRs Done
2,821,843 UART: [art] Populate DV Done
2,830,166 UART: [fht] FMC Alias Private Key: 7
2,831,300 UART: [art] Derive CDI
2,831,580 UART: [art] Store in in slot 0x4
2,917,181 UART: [art] Derive Key Pair
2,917,541 UART: [art] Store priv key in slot 0x5
2,930,459 UART: [art] Derive Key Pair - Done
2,945,067 UART: [art] Signing Cert with AUTHO
2,945,547 UART: RITY.KEYID = 7
2,960,845 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,610 UART: [art] PUB.X = E65951E52090FFDDB873B806840F47FE6E76E3F740353E868B2AA53B370DBEC2C3EEDAB0544ABA832971845052901D05
2,968,372 UART: [art] PUB.Y = BBAA3EEAA0F3ED74E681115CA45C9B475DFD3F7DE21F4FCD8935A4C1119C0121216D9669E153188D0598E81EDECFCD45
2,975,334 UART: [art] SIG.R = 07AD1F02F9CCABD2675D106793FF6B36480CBD4B7414E415DC7F8D4166F15FA7DF354B097BA06C5F5110DAF48BCF81B7
2,982,108 UART: [art] SIG.S = 2A157315918C00CD7293F22BF85688FB83BA7C30B4227FF2050E184AC96A80C3143B7A4DD39D98F7EBD8DBEA3158E129
3,005,813 UART: Caliptra RT
3,006,066 UART: [state] CFI Enabled
3,113,825 UART: [rt] RT listening for mailbox commands...
3,114,488 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,231 UART: [rt]cmd =0x46504c54, len=4
3,145,440 >>> mbox cmd response data (8 bytes)
3,145,697 UART: [rt] FIPS self test
3,146,025 UART: [kat] ++
3,146,177 UART: [kat] sha1
3,150,303 UART: [kat] SHA2-256
3,152,325 UART: [kat] SHA2-384
3,155,076 UART: [kat] SHA2-512-ACC
3,157,003 UART: [kat] ECC-384
3,166,405 UART: Fatal Error: 0x90040003
3,167,955 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,167,960 >>> mbox cmd response: failed
3,167,960 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,167,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,221 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,639 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,855 UART: [state] LifecycleState = Unprovisioned
86,510 UART: [state] DebugLocked = No
87,188 UART: [state] WD Timer not started. Device not locked for debugging
88,477 UART: [kat] SHA2-256
894,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,252 UART: [kat] ++
898,404 UART: [kat] sha1
902,478 UART: [kat] SHA2-256
904,418 UART: [kat] SHA2-384
907,297 UART: [kat] SHA2-512-ACC
909,198 UART: [kat] ECC-384
918,749 UART: [kat] HMAC-384Kdf
923,269 UART: [kat] LMS
1,171,597 UART: [kat] --
1,172,660 UART: [cold-reset] ++
1,173,188 UART: [fht] FHT @ 0x50003400
1,175,703 UART: [idev] ++
1,175,871 UART: [idev] CDI.KEYID = 6
1,176,231 UART: [idev] SUBJECT.KEYID = 7
1,176,655 UART: [idev] UDS.KEYID = 0
1,177,000 ready_for_fw is high
1,177,000 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,837 UART: [idev] Erasing UDS.KEYID = 0
1,201,614 UART: [idev] Sha1 KeyId Algorithm
1,210,292 UART: [idev] --
1,211,144 UART: [ldev] ++
1,211,312 UART: [ldev] CDI.KEYID = 6
1,211,675 UART: [ldev] SUBJECT.KEYID = 5
1,212,101 UART: [ldev] AUTHORITY.KEYID = 7
1,212,564 UART: [ldev] FE.KEYID = 1
1,217,622 UART: [ldev] Erasing FE.KEYID = 1
1,243,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,096 UART: [ldev] --
1,283,519 UART: [fwproc] Wait for Commands...
1,284,261 UART: [fwproc] Recv command 0x46574c44
1,284,989 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,181 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,444 >>> mbox cmd response: success
2,790,500 UART: [afmc] ++
2,790,668 UART: [afmc] CDI.KEYID = 6
2,791,030 UART: [afmc] SUBJECT.KEYID = 7
2,791,455 UART: [afmc] AUTHORITY.KEYID = 5
2,827,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,844,621 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,850,349 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,856,234 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,953 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,949 UART: [afmc] --
2,870,837 UART: [cold-reset] --
2,871,529 UART: [state] Locking Datavault
2,872,740 UART: [state] Locking PCR0, PCR1 and PCR31
2,873,344 UART: [state] Locking ICCM
2,873,944 UART: [exit] Launching FMC @ 0x40000130
2,879,273 UART:
2,879,289 UART: Running Caliptra FMC ...
2,879,697 UART:
2,879,840 UART: [state] CFI Enabled
2,890,391 UART: [fht] FMC Alias Private Key: 7
2,998,650 UART: [art] Extend RT PCRs Done
2,999,078 UART: [art] Lock RT PCRs Done
3,000,462 UART: [art] Populate DV Done
3,008,775 UART: [fht] FMC Alias Private Key: 7
3,009,827 UART: [art] Derive CDI
3,010,107 UART: [art] Store in in slot 0x4
3,095,726 UART: [art] Derive Key Pair
3,096,086 UART: [art] Store priv key in slot 0x5
3,109,476 UART: [art] Derive Key Pair - Done
3,124,387 UART: [art] Signing Cert with AUTHO
3,124,867 UART: RITY.KEYID = 7
3,140,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,141,184 UART: [art] PUB.X = B025EEDA53167E09E7587C05672F2204C57D7A922050280BEC66B57C7CDEFDC52B9F710A370C148971F6C9A6AECE0915
3,147,939 UART: [art] PUB.Y = 10F4D005028443BABF385C8CB962E989D3F11287542770BFD4AFC70BB4AC69EBCF9A0D47AA28819D93A34448F3C09868
3,154,883 UART: [art] SIG.R = 4E60C4450E856A2D841D4B1652E6572D71BE8F24AE713E54537EACA05F2C70766A6C154D05405A965FB009464002CE67
3,161,637 UART: [art] SIG.S = 1738422CE7DF4302462BD750AD535BBC9FFE36E6B2B4E2D513CE8BF8069D9FD0E7815E0ED2D8E652968FCF2AEDE66248
3,185,207 UART: Caliptra RT
3,185,552 UART: [state] CFI Enabled
3,293,609 UART: [rt] RT listening for mailbox commands...
3,294,272 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,063 UART: [rt]cmd =0x46504c54, len=4
3,325,250 >>> mbox cmd response data (8 bytes)
3,325,507 UART: [rt] FIPS self test
3,325,835 UART: [kat] ++
3,325,987 UART: [kat] sha1
3,330,137 UART: [kat] SHA2-256
3,332,159 UART: [kat] SHA2-384
3,334,908 UART: [kat] SHA2-512-ACC
3,336,835 UART: [kat] ECC-384
3,346,649 UART: Fatal Error: 0x90040003
3,348,199 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,348,204 >>> mbox cmd response: failed
3,348,204 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,348,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
893,237 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,362 UART: [kat] ++
897,514 UART: [kat] sha1
901,794 UART: [kat] SHA2-256
903,734 UART: [kat] SHA2-384
906,521 UART: [kat] SHA2-512-ACC
908,422 UART: [kat] ECC-384
918,235 UART: [kat] HMAC-384Kdf
922,737 UART: [kat] LMS
1,171,065 UART: [kat] --
1,171,820 UART: [cold-reset] ++
1,172,234 UART: [fht] FHT @ 0x50003400
1,174,973 UART: [idev] ++
1,175,141 UART: [idev] CDI.KEYID = 6
1,175,501 UART: [idev] SUBJECT.KEYID = 7
1,175,925 UART: [idev] UDS.KEYID = 0
1,176,270 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,463 UART: [idev] Erasing UDS.KEYID = 0
1,201,928 UART: [idev] Sha1 KeyId Algorithm
1,210,270 UART: [idev] --
1,211,228 UART: [ldev] ++
1,211,396 UART: [ldev] CDI.KEYID = 6
1,211,759 UART: [ldev] SUBJECT.KEYID = 5
1,212,185 UART: [ldev] AUTHORITY.KEYID = 7
1,212,648 UART: [ldev] FE.KEYID = 1
1,217,808 UART: [ldev] Erasing FE.KEYID = 1
1,244,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,184 UART: [ldev] --
1,283,455 UART: [fwproc] Wait for Commands...
1,284,219 UART: [fwproc] Recv command 0x46574c44
1,284,947 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,729 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,992 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,454 ready_for_fw is high
1,060,454 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,290 >>> mbox cmd response: success
2,702,634 UART:
2,702,650 UART: Running Caliptra FMC ...
2,703,058 UART:
2,703,201 UART: [state] CFI Enabled
2,713,520 UART: [fht] FMC Alias Private Key: 7
2,822,285 UART: [art] Extend RT PCRs Done
2,822,713 UART: [art] Lock RT PCRs Done
2,824,491 UART: [art] Populate DV Done
2,832,700 UART: [fht] FMC Alias Private Key: 7
2,833,864 UART: [art] Derive CDI
2,834,144 UART: [art] Store in in slot 0x4
2,919,719 UART: [art] Derive Key Pair
2,920,079 UART: [art] Store priv key in slot 0x5
2,933,289 UART: [art] Derive Key Pair - Done
2,948,110 UART: [art] Signing Cert with AUTHO
2,948,590 UART: RITY.KEYID = 7
2,963,474 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,239 UART: [art] PUB.X = B6AEC89C45EA9BBA2A0577120C6629E566A12989BEC56B7D9A9D952AAA20F09843B73FF193C0495E00B2146C77265212
2,970,983 UART: [art] PUB.Y = 8512B2D4038370AEEC25229D430550A0AB7BA9883FC101DAD52265FB8DF622F7964495F8228E04B1D8D97803C2E00058
2,977,892 UART: [art] SIG.R = F93B2FC831A207A8C3CF5D2595D2BEBB4DFC043204BE74C88F98A20463676AD94D7A0F2D143ED564345E2BA695F64BB4
2,984,659 UART: [art] SIG.S = F5F89FB0673A21134B39B5A625163C65A3CD45B308690C7F2926FF658744E6CC0376B3C4E9C6CE3D6354EFB23CEF721F
3,008,619 UART: Caliptra RT
3,008,964 UART: [state] CFI Enabled
3,116,934 UART: [rt] RT listening for mailbox commands...
3,117,597 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,520 UART: [rt]cmd =0x46504c54, len=4
3,148,603 >>> mbox cmd response data (8 bytes)
3,148,826 UART: [rt] FIPS self test
3,149,154 UART: [kat] ++
3,149,306 UART: [kat] sha1
3,153,662 UART: [kat] SHA2-256
3,155,684 UART: [kat] SHA2-384
3,158,513 UART: [kat] SHA2-512-ACC
3,160,440 UART: [kat] ECC-384
3,169,758 UART: Fatal Error: 0x90040003
3,171,308 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,171,313 >>> mbox cmd response: failed
3,171,313 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,171,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,302 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,170 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,169,901 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,174,211 ready_for_fw is high
1,174,211 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,207,945 UART: [idev] --
1,208,874 UART: [ldev] ++
1,209,042 UART: [ldev] CDI.KEYID = 6
1,209,406 UART: [ldev] SUBJECT.KEYID = 5
1,209,833 UART: [ldev] AUTHORITY.KEYID = 7
1,210,296 UART: [ldev] FE.KEYID = 1
1,215,628 UART: [ldev] Erasing FE.KEYID = 1
1,241,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,478 UART: [ldev] --
1,281,836 UART: [fwproc] Wait for Commands...
1,282,609 UART: [fwproc] Recv command 0x46574c44
1,283,342 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,272 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,600 >>> mbox cmd response: success
2,788,855 UART: [afmc] ++
2,789,023 UART: [afmc] CDI.KEYID = 6
2,789,386 UART: [afmc] SUBJECT.KEYID = 7
2,789,812 UART: [afmc] AUTHORITY.KEYID = 5
2,825,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,327 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,210 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,929 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,766 UART: [afmc] --
2,868,700 UART: [cold-reset] --
2,869,586 UART: [state] Locking Datavault
2,870,825 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,429 UART: [state] Locking ICCM
2,872,087 UART: [exit] Launching FMC @ 0x40000130
2,877,416 UART:
2,877,432 UART: Running Caliptra FMC ...
2,877,840 UART:
2,877,894 UART: [state] CFI Enabled
2,887,985 UART: [fht] FMC Alias Private Key: 7
2,996,638 UART: [art] Extend RT PCRs Done
2,997,066 UART: [art] Lock RT PCRs Done
2,998,618 UART: [art] Populate DV Done
3,006,723 UART: [fht] FMC Alias Private Key: 7
3,007,717 UART: [art] Derive CDI
3,007,997 UART: [art] Store in in slot 0x4
3,094,028 UART: [art] Derive Key Pair
3,094,388 UART: [art] Store priv key in slot 0x5
3,107,594 UART: [art] Derive Key Pair - Done
3,122,104 UART: [art] Signing Cert with AUTHO
3,122,584 UART: RITY.KEYID = 7
3,138,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,019 UART: [art] PUB.X = 0E6194289E87C245EBDCC6EFA9AF156AF8E6AAA0DD00C9B776F5A7EA46351948D82AA7028E14D91303C6935B18CFEFDB
3,145,776 UART: [art] PUB.Y = 8C63A21103A76E3B586D243928F94853C6391214AF7569DC21FF8FB261A66FB317EEDE5E9816AA1125C1C9E997B19FC4
3,152,725 UART: [art] SIG.R = 85627A90361F74EF48AEBC1F353589C0CAB72D5BD220B64064A84D55C449CD835C3D2793F36D7F9F8E443AC5B135102A
3,159,499 UART: [art] SIG.S = 818227A8BBA14ABC55C3067A61A659EC7232C0EB85CBCA741B155B0D1BB478421D7CFAB646159C034610F81207F42192
3,183,078 UART: Caliptra RT
3,183,331 UART: [state] CFI Enabled
3,291,731 UART: [rt] RT listening for mailbox commands...
3,292,394 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,083 UART: [rt]cmd =0x46504c54, len=4
3,323,122 >>> mbox cmd response data (8 bytes)
3,323,477 UART: [rt] FIPS self test
3,323,805 UART: [kat] ++
3,323,957 UART: [kat] sha1
3,328,201 UART: [kat] SHA2-256
3,330,223 UART: [kat] SHA2-384
3,333,084 UART: [kat] SHA2-512-ACC
3,335,011 UART: [kat] ECC-384
3,344,487 UART: Fatal Error: 0x90040003
3,346,037 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,042 >>> mbox cmd response: failed
3,346,042 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
916,404 UART: [kat] HMAC-384Kdf
920,882 UART: [kat] LMS
1,169,194 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,305 UART: [fht] FHT @ 0x50003400
1,172,951 UART: [idev] ++
1,173,119 UART: [idev] CDI.KEYID = 6
1,173,480 UART: [idev] SUBJECT.KEYID = 7
1,173,905 UART: [idev] UDS.KEYID = 0
1,174,251 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,661 UART: [idev] Erasing UDS.KEYID = 0
1,198,533 UART: [idev] Sha1 KeyId Algorithm
1,207,325 UART: [idev] --
1,208,340 UART: [ldev] ++
1,208,508 UART: [ldev] CDI.KEYID = 6
1,208,872 UART: [ldev] SUBJECT.KEYID = 5
1,209,299 UART: [ldev] AUTHORITY.KEYID = 7
1,209,762 UART: [ldev] FE.KEYID = 1
1,214,680 UART: [ldev] Erasing FE.KEYID = 1
1,240,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,800 UART: [ldev] --
1,280,238 UART: [fwproc] Wait for Commands...
1,280,841 UART: [fwproc] Recv command 0x46574c44
1,281,574 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,984 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,374 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,096 ready_for_fw is high
1,056,096 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,388 >>> mbox cmd response: success
2,698,234 UART:
2,698,250 UART: Running Caliptra FMC ...
2,698,658 UART:
2,698,712 UART: [state] CFI Enabled
2,709,271 UART: [fht] FMC Alias Private Key: 7
2,817,382 UART: [art] Extend RT PCRs Done
2,817,810 UART: [art] Lock RT PCRs Done
2,819,652 UART: [art] Populate DV Done
2,827,869 UART: [fht] FMC Alias Private Key: 7
2,828,961 UART: [art] Derive CDI
2,829,241 UART: [art] Store in in slot 0x4
2,914,462 UART: [art] Derive Key Pair
2,914,822 UART: [art] Store priv key in slot 0x5
2,928,888 UART: [art] Derive Key Pair - Done
2,943,891 UART: [art] Signing Cert with AUTHO
2,944,371 UART: RITY.KEYID = 7
2,959,629 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,394 UART: [art] PUB.X = 91CBFF23FA472D6D16F1D641821552EC20A2CD0BC1F09650B2E70DA16DAFDF496449792883D5E5F7B4EA02FE6CB609A0
2,967,166 UART: [art] PUB.Y = 5D13B301C8CD7DA7517C63F3D3C1CC3DA223DC753913D8FEF8E4AFC73AC8D375CB57B9A72D3BD3F8778B81BCE99718B2
2,974,133 UART: [art] SIG.R = 027F4DDDFBB1A6ECC5F30E310AB921719742609035C8B0A9374687B191E0A76DAC6F39404680581E978016EA7CD433CB
2,980,896 UART: [art] SIG.S = 95817293EA81AD4049D56F290254167E3679EDC1769BDE57B321FDE01BDA52E1FF4DD1C4AA4467EBC6A13D2EDD902CE7
3,004,336 UART: Caliptra RT
3,004,589 UART: [state] CFI Enabled
3,112,360 UART: [rt] RT listening for mailbox commands...
3,113,023 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,086 UART: [rt]cmd =0x46504c54, len=4
3,144,225 >>> mbox cmd response data (8 bytes)
3,144,534 UART: [rt] FIPS self test
3,144,862 UART: [kat] ++
3,145,014 UART: [kat] sha1
3,149,192 UART: [kat] SHA2-256
3,151,214 UART: [kat] SHA2-384
3,154,137 UART: [kat] SHA2-512-ACC
3,156,064 UART: [kat] ECC-384
3,165,578 UART: Fatal Error: 0x90040003
3,167,128 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,167,133 >>> mbox cmd response: failed
3,167,133 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,167,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,772 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,194 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,253 UART: [kat] HMAC-384Kdf
920,699 UART: [kat] LMS
1,169,011 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,169,874 UART: [fht] FHT @ 0x50003400
1,172,534 UART: [idev] ++
1,172,702 UART: [idev] CDI.KEYID = 6
1,173,063 UART: [idev] SUBJECT.KEYID = 7
1,173,488 UART: [idev] UDS.KEYID = 0
1,173,834 ready_for_fw is high
1,173,834 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,000 UART: [idev] Erasing UDS.KEYID = 0
1,197,522 UART: [idev] Sha1 KeyId Algorithm
1,206,402 UART: [idev] --
1,207,467 UART: [ldev] ++
1,207,635 UART: [ldev] CDI.KEYID = 6
1,207,999 UART: [ldev] SUBJECT.KEYID = 5
1,208,426 UART: [ldev] AUTHORITY.KEYID = 7
1,208,889 UART: [ldev] FE.KEYID = 1
1,213,973 UART: [ldev] Erasing FE.KEYID = 1
1,240,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,967 UART: [ldev] --
1,280,471 UART: [fwproc] Wait for Commands...
1,281,228 UART: [fwproc] Recv command 0x46574c44
1,281,961 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,617 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,783,955 >>> mbox cmd response: success
2,784,972 UART: [afmc] ++
2,785,140 UART: [afmc] CDI.KEYID = 6
2,785,503 UART: [afmc] SUBJECT.KEYID = 7
2,785,929 UART: [afmc] AUTHORITY.KEYID = 5
2,821,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,155 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,767 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,486 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,455 UART: [afmc] --
2,865,369 UART: [cold-reset] --
2,866,003 UART: [state] Locking Datavault
2,867,016 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,620 UART: [state] Locking ICCM
2,868,222 UART: [exit] Launching FMC @ 0x40000130
2,873,551 UART:
2,873,567 UART: Running Caliptra FMC ...
2,873,975 UART:
2,874,118 UART: [state] CFI Enabled
2,884,717 UART: [fht] FMC Alias Private Key: 7
2,993,034 UART: [art] Extend RT PCRs Done
2,993,462 UART: [art] Lock RT PCRs Done
2,994,752 UART: [art] Populate DV Done
3,003,029 UART: [fht] FMC Alias Private Key: 7
3,004,151 UART: [art] Derive CDI
3,004,431 UART: [art] Store in in slot 0x4
3,090,244 UART: [art] Derive Key Pair
3,090,604 UART: [art] Store priv key in slot 0x5
3,103,618 UART: [art] Derive Key Pair - Done
3,118,304 UART: [art] Signing Cert with AUTHO
3,118,784 UART: RITY.KEYID = 7
3,134,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,041 UART: [art] PUB.X = 0EC1466066CBE96572E4CBC110657453F053CBCF244AA4C29C3F8E3EF30FDB8DF572E573CE516433F8A7C5B6EDB6DDE9
3,141,823 UART: [art] PUB.Y = B64E8FAA280DBFB5C1DB14A90DFBBCEB5E71E6B2D4492DAEC8F73C7D72E30CB03879D542F1C6B1B6AB8A13D66929CF5F
3,148,794 UART: [art] SIG.R = A1C08982A6E1A29D75CFEB9876231E0DF10F9FDD2317A2301E80E0B21B72C8E668FFB5518F90B4238A2FF962BEDF462A
3,155,570 UART: [art] SIG.S = 79C2F926CE0FF2519091FF62000A66C38CA7B1C3A0C9D37326E14E14AD83819DE04A4D509FFCD67024D1A1C7F6C01801
3,179,176 UART: Caliptra RT
3,179,521 UART: [state] CFI Enabled
3,287,010 UART: [rt] RT listening for mailbox commands...
3,287,673 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,236 UART: [rt]cmd =0x46504c54, len=4
3,318,255 >>> mbox cmd response data (8 bytes)
3,318,606 UART: [rt] FIPS self test
3,318,934 UART: [kat] ++
3,319,086 UART: [kat] sha1
3,323,210 UART: [kat] SHA2-256
3,325,232 UART: [kat] SHA2-384
3,328,253 UART: [kat] SHA2-512-ACC
3,330,180 UART: [kat] ECC-384
3,339,704 UART: Fatal Error: 0x90040003
3,341,254 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,341,259 >>> mbox cmd response: failed
3,341,259 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,341,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
899,810 UART: [kat] SHA2-256
901,750 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,201 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,354 UART: [cold-reset] ++
1,170,736 UART: [fht] FHT @ 0x50003400
1,173,484 UART: [idev] ++
1,173,652 UART: [idev] CDI.KEYID = 6
1,174,013 UART: [idev] SUBJECT.KEYID = 7
1,174,438 UART: [idev] UDS.KEYID = 0
1,174,784 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,444 UART: [idev] Sha1 KeyId Algorithm
1,208,412 UART: [idev] --
1,209,425 UART: [ldev] ++
1,209,593 UART: [ldev] CDI.KEYID = 6
1,209,957 UART: [ldev] SUBJECT.KEYID = 5
1,210,384 UART: [ldev] AUTHORITY.KEYID = 7
1,210,847 UART: [ldev] FE.KEYID = 1
1,216,021 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,021 UART: [ldev] --
1,281,307 UART: [fwproc] Wait for Commands...
1,282,038 UART: [fwproc] Recv command 0x46574c44
1,282,771 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,963 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,281 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,637 ready_for_fw is high
1,056,637 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,677 >>> mbox cmd response: success
2,699,373 UART:
2,699,389 UART: Running Caliptra FMC ...
2,699,797 UART:
2,699,940 UART: [state] CFI Enabled
2,710,563 UART: [fht] FMC Alias Private Key: 7
2,819,084 UART: [art] Extend RT PCRs Done
2,819,512 UART: [art] Lock RT PCRs Done
2,820,926 UART: [art] Populate DV Done
2,829,027 UART: [fht] FMC Alias Private Key: 7
2,830,101 UART: [art] Derive CDI
2,830,381 UART: [art] Store in in slot 0x4
2,915,982 UART: [art] Derive Key Pair
2,916,342 UART: [art] Store priv key in slot 0x5
2,929,506 UART: [art] Derive Key Pair - Done
2,944,150 UART: [art] Signing Cert with AUTHO
2,944,630 UART: RITY.KEYID = 7
2,959,646 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,411 UART: [art] PUB.X = CEB23B56840152B6A84DED647968ED86FFC43AB44D5BFCCBB1E67D833DDD2D76CA634D68DD5603B815AC1BB5CFBDC46D
2,967,203 UART: [art] PUB.Y = 846D330E7E11DB1A5CA4B3D034A85AB5B0E8D6A90325F4939ACE21DA6B1AF97A89CFC38543FDACA02105F6C9FD8DFF7F
2,974,168 UART: [art] SIG.R = 49712C04C649E39930A97BE22382428A6378D8FA384C1F3FAB8FA169FAAF3ADB96166E7DE657EF4E4E6F881E280D3080
2,980,938 UART: [art] SIG.S = 445CF210A6793CFD746498A65F5163E9A08BFA25A960FDF823F32C92EE0CA976C3853A9532F9F8D847D8E2D33E72060A
3,004,724 UART: Caliptra RT
3,005,069 UART: [state] CFI Enabled
3,111,532 UART: [rt] RT listening for mailbox commands...
3,112,195 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,874 UART: [rt]cmd =0x46504c54, len=4
3,142,939 >>> mbox cmd response data (8 bytes)
3,143,294 UART: [rt] FIPS self test
3,143,622 UART: [kat] ++
3,143,774 UART: [kat] sha1
3,148,028 UART: [kat] SHA2-256
3,150,050 UART: [kat] SHA2-384
3,152,953 UART: [kat] SHA2-512-ACC
3,154,880 UART: [kat] ECC-384
3,164,152 UART: Fatal Error: 0x90040003
3,165,702 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,707 >>> mbox cmd response: failed
3,165,707 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,165,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,071 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,823 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
276,513 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
276,899 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
653,499 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,518 writing to cptra_bootfsm_go
653,242 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
311,385 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
277,453 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
654,226 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
653,191 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
277,498 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
652,811 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
5,979,395 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,123,688 >>> mbox cmd response: failed
6,124,257 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,267,444 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
4,858,180 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,436,387 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
5,987,140 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,131,392 >>> mbox cmd response: failed
6,131,950 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,275,283 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
4,867,639 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,420,656 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
6,306,452 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,451,276 >>> mbox cmd response: failed
6,451,870 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,595,051 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
18,451,393 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,896,101 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
6,309,444 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,453,677 >>> mbox cmd response: failed
6,454,241 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,598,020 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
18,458,348 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,901,199 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
5,157,939 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,302,729 >>> mbox cmd response: failed
5,303,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,446,922 >>> mbox cmd response: failed
Initializing fuses
985 writing to cptra_bootfsm_go
3,449,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,288,638 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
5,180,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,325,249 >>> mbox cmd response: failed
5,325,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,469,702 >>> mbox cmd response: failed
Initializing fuses
985 writing to cptra_bootfsm_go
3,454,835 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,354 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
5,502,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,647,110 >>> mbox cmd response: failed
5,647,716 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,791,323 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
17,849,333 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,583,327 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
5,509,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,654,591 >>> mbox cmd response: failed
5,655,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,798,762 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
17,859,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,583,379 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,172 writing to cptra_bootfsm_go
5,159,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,304,273 >>> mbox cmd response: failed
5,304,842 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,448,584 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,451,212 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,256,090 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
5,517,593 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,662,246 >>> mbox cmd response: failed
5,662,847 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,806,574 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
17,835,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,566,564 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,043 >>> mbox cmd response: failed
823,043 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,049 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,806 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,257 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,265 >>> mbox cmd response: failed
824,265 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,686 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,684 >>> mbox cmd response: failed
823,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,554 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,865 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,976 >>> mbox cmd response: failed
823,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,085 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,525 >>> mbox cmd response: failed
824,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,796 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,179 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,187 >>> mbox cmd response: failed
823,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,603 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,930 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,296 >>> mbox cmd response: failed
824,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,302 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,058 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,761 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,726 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,734 >>> mbox cmd response: failed
823,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,200 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,459 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,537 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,545 >>> mbox cmd response: failed
823,545 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,807 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,643,988 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,517 >>> mbox cmd response: failed
823,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,523 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,070 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,612 >>> mbox cmd response: failed
823,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
823,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,430 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,853 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,484 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,492 >>> mbox cmd response: failed
824,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
824,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,457 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,074 writing to cptra_bootfsm_go
193,259 UART:
193,621 UART: Running Caliptra ROM ...
194,808 UART:
194,963 UART: [state] CFI Enabled
265,773 UART: [state] LifecycleState = Unprovisioned
267,783 UART: [state] DebugLocked = No
269,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,929 UART: [kat] SHA2-256
444,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,134 UART: [kat] ++
455,608 UART: [kat] sha1
467,338 UART: [kat] SHA2-256
470,008 UART: [kat] SHA2-384
476,296 UART: [kat] SHA2-512-ACC
478,668 UART: [kat] ECC-384
2,768,390 UART: [kat] HMAC-384Kdf
2,779,919 UART: [kat] LMS
3,970,268 UART: [kat] --
3,973,706 UART: [cold-reset] ++
3,975,853 UART: [fht] Storing FHT @ 0x50003400
3,987,835 UART: [idev] ++
3,988,479 UART: [idev] CDI.KEYID = 6
3,989,389 UART: [idev] SUBJECT.KEYID = 7
3,990,639 UART: [idev] UDS.KEYID = 0
3,991,590 ready_for_fw is high
3,991,800 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,136,457 UART: [idev] Erasing UDS.KEYID = 0
7,328,031 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,261 UART: [idev] --
7,352,996 UART: [ldev] ++
7,353,572 UART: [ldev] CDI.KEYID = 6
7,354,555 UART: [ldev] SUBJECT.KEYID = 5
7,355,776 UART: [ldev] AUTHORITY.KEYID = 7
7,357,012 UART: [ldev] FE.KEYID = 1
7,405,092 UART: [ldev] Erasing FE.KEYID = 1
10,738,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,068 UART: [ldev] --
13,118,553 UART: [fwproc] Waiting for Commands...
13,121,474 UART: [fwproc] Received command 0x46574c44
13,123,705 UART: [fwproc] Received Image of size 114996 bytes
17,184,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,262,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,651,781 >>> mbox cmd response: success
17,655,323 UART: [afmc] ++
17,655,911 UART: [afmc] CDI.KEYID = 6
17,656,796 UART: [afmc] SUBJECT.KEYID = 7
17,658,070 UART: [afmc] AUTHORITY.KEYID = 5
21,026,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,483 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,738 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,173 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,978 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,453 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,396 UART: [afmc] --
23,399,370 UART: [cold-reset] --
23,402,855 UART: [state] Locking Datavault
23,407,083 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,841 UART: [state] Locking ICCM
23,410,445 UART: [exit] Launching FMC @ 0x40000130
23,418,846 UART:
23,419,084 UART: Running Caliptra FMC ...
23,420,123 UART:
23,420,273 UART: [state] CFI Enabled
23,485,946 UART: [fht] FMC Alias Private Key: 7
25,824,056 UART: [art] Extend RT PCRs Done
25,825,713 UART: [art] Lock RT PCRs Done
25,827,273 UART: [art] Populate DV Done
25,832,526 UART: [fht] FMC Alias Private Key: 7
25,834,127 UART: [art] Derive CDI
25,835,052 UART: [art] Store in in slot 0x4
25,895,027 UART: [art] Derive Key Pair
25,896,080 UART: [art] Store priv key in slot 0x5
29,188,107 UART: [art] Derive Key Pair - Done
29,201,546 UART: [art] Signing Cert with AUTHO
29,202,901 UART: RITY.KEYID = 7
31,489,871 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,401 UART: [art] PUB.X = 54B5CBA54074DCBEB1A14DA062DE180372420D6BE028EBCBFE1920128F254E10CE4EB68F4CE2CC571E0845C843B018D9
31,498,660 UART: [art] PUB.Y = 85316CE6EEBFF4DECC4635E2C3BA332A02759F62BCB20439D6D3529064F85D17ECB99259BA4541570817FDFDF312A5F1
31,505,902 UART: [art] SIG.R = CEE92170341395A4727028B76B42087FEEBCC3355EF6CF1973844B611385E578E3D3C2C25D1DA4C7F119ECB25601F199
31,513,294 UART: [art] SIG.S = 71E2FD87329D20C8D0124082195F8E5178A27B23F38F5D8DAD8FF19425D4E49867BF72FA97CAFF675CEF17D1A74FA34A
32,818,246 UART: Caliptra RT
32,818,953 UART: [state] CFI Enabled
32,981,143 UART: [rt] RT listening for mailbox commands...
32,983,054 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,012,815 UART: [rt]cmd =0x46504c54, len=4
33,014,401 >>> mbox cmd response data (8 bytes)
33,015,340 UART: [rt] FIPS self test
33,016,291 UART: [kat] ++
33,016,747 UART: [kat] sha1
33,021,211 UART: [kat] SHA2-256
33,023,165 UART: [kat] SHA2-384
33,026,132 UART: [kat] SHA2-512-ACC
33,028,380 UART: [kat] ECC-384
36,295,424 UART: [kat] HMAC-384Kdf
36,296,532 UART: Fatal Error: 0x90030001
36,331,816 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,476,180 >>> mbox cmd response: failed
36,476,855 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,621,211 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,108 UART:
190,401 UART: Running Caliptra ROM ...
191,514 UART:
191,681 UART: [state] CFI Enabled
264,811 UART: [state] LifecycleState = Unprovisioned
266,752 UART: [state] DebugLocked = No
268,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,475 UART: [kat] SHA2-256
443,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,700 UART: [kat] ++
454,144 UART: [kat] sha1
464,968 UART: [kat] SHA2-256
467,650 UART: [kat] SHA2-384
473,791 UART: [kat] SHA2-512-ACC
476,185 UART: [kat] ECC-384
2,767,125 UART: [kat] HMAC-384Kdf
2,798,794 UART: [kat] LMS
3,989,082 UART: [kat] --
3,994,236 UART: [cold-reset] ++
3,996,121 UART: [fht] Storing FHT @ 0x50003400
4,007,657 UART: [idev] ++
4,008,260 UART: [idev] CDI.KEYID = 6
4,009,190 UART: [idev] SUBJECT.KEYID = 7
4,010,416 UART: [idev] UDS.KEYID = 0
4,011,991 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,156,566 UART: [idev] Erasing UDS.KEYID = 0
7,343,763 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,117 UART: [idev] --
7,369,036 UART: [ldev] ++
7,369,613 UART: [ldev] CDI.KEYID = 6
7,370,582 UART: [ldev] SUBJECT.KEYID = 5
7,371,802 UART: [ldev] AUTHORITY.KEYID = 7
7,373,039 UART: [ldev] FE.KEYID = 1
7,399,804 UART: [ldev] Erasing FE.KEYID = 1
10,732,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,317 UART: [ldev] --
13,114,042 UART: [fwproc] Waiting for Commands...
13,117,063 UART: [fwproc] Received command 0x46574c44
13,119,259 UART: [fwproc] Received Image of size 114996 bytes
17,180,180 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,992 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,642,562 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,797,632 ready_for_fw is high
3,798,153 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,906,983 >>> mbox cmd response: success
23,600,285 UART:
23,600,701 UART: Running Caliptra FMC ...
23,601,859 UART:
23,602,021 UART: [state] CFI Enabled
23,669,054 UART: [fht] FMC Alias Private Key: 7
26,007,504 UART: [art] Extend RT PCRs Done
26,008,734 UART: [art] Lock RT PCRs Done
26,010,656 UART: [art] Populate DV Done
26,016,032 UART: [fht] FMC Alias Private Key: 7
26,017,633 UART: [art] Derive CDI
26,018,452 UART: [art] Store in in slot 0x4
26,078,696 UART: [art] Derive Key Pair
26,079,746 UART: [art] Store priv key in slot 0x5
29,372,048 UART: [art] Derive Key Pair - Done
29,385,105 UART: [art] Signing Cert with AUTHO
29,386,416 UART: RITY.KEYID = 7
31,674,543 UART: [art] Erasing AUTHORITY.KEYID = 7
31,676,077 UART: [art] PUB.X = 5688C48538ECAFD77B4CED7BD4C13E93D1F9E166E0F00566BCCAE13067E630E2FD181C32CB6C8280C281203A12ECFFCD
31,683,385 UART: [art] PUB.Y = F43E441223A99F36F04104FC3F2D6CE08F083C6DE7F3BB7E517F58D8200EA538EC4A13652CBA158AFD5F6308FE64AD13
31,690,573 UART: [art] SIG.R = 0C86251F4507AD4A181F5AFC740CF24B80F58D432FE24AAFE6A2C6DC7E2C32F73AAC5EFD21191D66085FCA22A7AB0F85
31,697,980 UART: [art] SIG.S = 572C8548979AA86B127733FE5260A9179ADE63E6580805A1838AB574F7B5CBD8F4F01F8F128942D1F30DD9EDB975DF28
33,003,182 UART: Caliptra RT
33,003,893 UART: [state] CFI Enabled
33,172,425 UART: [rt] RT listening for mailbox commands...
33,174,294 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,203,902 UART: [rt]cmd =0x46504c54, len=4
33,205,415 >>> mbox cmd response data (8 bytes)
33,206,398 UART: [rt] FIPS self test
33,207,345 UART: [kat] ++
33,207,797 UART: [kat] sha1
33,212,399 UART: [kat] SHA2-256
33,214,331 UART: [kat] SHA2-384
33,217,408 UART: [kat] SHA2-512-ACC
33,219,682 UART: [kat] ECC-384
36,488,449 UART: [kat] HMAC-384Kdf
36,489,669 UART: Fatal Error: 0x90030001
36,524,819 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,669,245 >>> mbox cmd response: failed
36,669,901 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,814,318 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,788,826 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,889,672 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,584 UART:
192,959 UART: Running Caliptra ROM ...
194,066 UART:
603,668 UART: [state] CFI Enabled
616,825 UART: [state] LifecycleState = Unprovisioned
618,796 UART: [state] DebugLocked = No
620,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,481 UART: [kat] SHA2-256
794,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,778 UART: [kat] ++
805,312 UART: [kat] sha1
816,908 UART: [kat] SHA2-256
819,638 UART: [kat] SHA2-384
825,489 UART: [kat] SHA2-512-ACC
827,871 UART: [kat] ECC-384
3,111,273 UART: [kat] HMAC-384Kdf
3,123,582 UART: [kat] LMS
4,313,693 UART: [kat] --
4,317,647 UART: [cold-reset] ++
4,319,873 UART: [fht] Storing FHT @ 0x50003400
4,331,143 UART: [idev] ++
4,331,729 UART: [idev] CDI.KEYID = 6
4,332,645 UART: [idev] SUBJECT.KEYID = 7
4,333,899 UART: [idev] UDS.KEYID = 0
4,334,867 ready_for_fw is high
4,335,082 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,479,591 UART: [idev] Erasing UDS.KEYID = 0
7,622,744 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,079 UART: [idev] --
7,648,516 UART: [ldev] ++
7,649,084 UART: [ldev] CDI.KEYID = 6
7,650,022 UART: [ldev] SUBJECT.KEYID = 5
7,651,235 UART: [ldev] AUTHORITY.KEYID = 7
7,652,520 UART: [ldev] FE.KEYID = 1
7,662,980 UART: [ldev] Erasing FE.KEYID = 1
10,953,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,781 UART: [ldev] --
13,311,401 UART: [fwproc] Waiting for Commands...
13,314,470 UART: [fwproc] Received command 0x46574c44
13,316,651 UART: [fwproc] Received Image of size 114996 bytes
17,383,872 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,154 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,058 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,845,850 >>> mbox cmd response: success
17,849,942 UART: [afmc] ++
17,850,528 UART: [afmc] CDI.KEYID = 6
17,851,470 UART: [afmc] SUBJECT.KEYID = 7
17,852,735 UART: [afmc] AUTHORITY.KEYID = 5
21,165,121 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,000 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,312 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,648 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,501 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,928 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,079 UART: [afmc] --
23,528,495 UART: [cold-reset] --
23,531,331 UART: [state] Locking Datavault
23,536,306 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,063 UART: [state] Locking ICCM
23,540,700 UART: [exit] Launching FMC @ 0x40000130
23,549,090 UART:
23,549,332 UART: Running Caliptra FMC ...
23,550,435 UART:
23,550,595 UART: [state] CFI Enabled
23,558,479 UART: [fht] FMC Alias Private Key: 7
25,889,355 UART: [art] Extend RT PCRs Done
25,890,573 UART: [art] Lock RT PCRs Done
25,892,089 UART: [art] Populate DV Done
25,897,558 UART: [fht] FMC Alias Private Key: 7
25,899,043 UART: [art] Derive CDI
25,899,808 UART: [art] Store in in slot 0x4
25,942,509 UART: [art] Derive Key Pair
25,943,554 UART: [art] Store priv key in slot 0x5
29,185,696 UART: [art] Derive Key Pair - Done
29,198,792 UART: [art] Signing Cert with AUTHO
29,200,151 UART: RITY.KEYID = 7
31,479,497 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,005 UART: [art] PUB.X = 13E23FA737AFF70089AB819C50FE3F73FFA7E0D1FA9869364A6283C8567E98F69A81850621031F178039B1A2BE05857A
31,488,217 UART: [art] PUB.Y = 3A89C73CB90B46A0528FEAF8A8C15D59109424D5B65098DDED1DB44F074FF9196C916AE75F12A8F7F0B6249517D7EA95
31,495,452 UART: [art] SIG.R = 40DAD7B0997E83BAAEF5D2E90E50593D86C43200DA86B0D75ED10F2E889E2810D17861B65E2D5241E61913362759760F
31,502,847 UART: [art] SIG.S = B753CBA1462D51747D3317EB8578928280F118D2DB6B825B44A07A6E12EE760AFA5AC207D5AA09786702E61D7862E9C8
32,808,039 UART: Caliptra RT
32,808,742 UART: [state] CFI Enabled
32,926,828 UART: [rt] RT listening for mailbox commands...
32,928,679 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,958,574 UART: [rt]cmd =0x46504c54, len=4
32,960,239 >>> mbox cmd response data (8 bytes)
32,961,422 UART: [rt] FIPS self test
32,962,358 UART: [kat] ++
32,962,864 UART: [kat] sha1
32,967,104 UART: [kat] SHA2-256
32,969,040 UART: [kat] SHA2-384
32,972,108 UART: [kat] SHA2-512-ACC
32,974,352 UART: [kat] ECC-384
36,217,031 UART: [kat] HMAC-384Kdf
36,218,484 UART: Fatal Error: 0x90030001
36,253,787 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,398,252 >>> mbox cmd response: failed
36,398,905 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,543,102 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,095 UART:
190,395 UART: Running Caliptra ROM ...
191,422 UART:
3,988,839 UART: [state] CFI Enabled
4,002,499 UART: [state] LifecycleState = Unprovisioned
4,004,425 UART: [state] DebugLocked = No
4,005,792 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,010,173 UART: [kat] SHA2-256
4,179,944 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,190,463 UART: [kat] ++
4,191,005 UART: [kat] sha1
4,202,412 UART: [kat] SHA2-256
4,205,154 UART: [kat] SHA2-384
4,209,680 UART: [kat] SHA2-512-ACC
4,212,039 UART: [kat] ECC-384
6,495,845 UART: [kat] HMAC-384Kdf
6,507,590 UART: [kat] LMS
7,697,672 UART: [kat] --
7,703,658 UART: [cold-reset] ++
7,704,738 UART: [fht] Storing FHT @ 0x50003400
7,716,063 UART: [idev] ++
7,716,639 UART: [idev] CDI.KEYID = 6
7,717,604 UART: [idev] SUBJECT.KEYID = 7
7,718,819 UART: [idev] UDS.KEYID = 0
7,720,372 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
7,864,710 UART: [idev] Erasing UDS.KEYID = 0
11,005,974 UART: [idev] Using Sha1 for KeyId Algorithm
11,029,473 UART: [idev] --
11,033,681 UART: [ldev] ++
11,034,252 UART: [ldev] CDI.KEYID = 6
11,035,219 UART: [ldev] SUBJECT.KEYID = 5
11,036,433 UART: [ldev] AUTHORITY.KEYID = 7
11,037,718 UART: [ldev] FE.KEYID = 1
11,049,424 UART: [ldev] Erasing FE.KEYID = 1
14,340,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,632,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,647,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,662,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,676,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,696,259 UART: [ldev] --
16,701,092 UART: [fwproc] Waiting for Commands...
16,704,326 UART: [fwproc] Received command 0x46574c44
16,706,515 UART: [fwproc] Received Image of size 114996 bytes
20,773,167 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,852,128 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,920,985 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
21,241,635 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,125,666 ready_for_fw is high
4,126,342 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,083,077 >>> mbox cmd response: success
23,728,375 UART:
23,728,775 UART: Running Caliptra FMC ...
23,729,884 UART:
23,730,038 UART: [state] CFI Enabled
23,737,979 UART: [fht] FMC Alias Private Key: 7
26,068,745 UART: [art] Extend RT PCRs Done
26,069,978 UART: [art] Lock RT PCRs Done
26,071,742 UART: [art] Populate DV Done
26,077,383 UART: [fht] FMC Alias Private Key: 7
26,078,928 UART: [art] Derive CDI
26,079,669 UART: [art] Store in in slot 0x4
26,121,967 UART: [art] Derive Key Pair
26,123,014 UART: [art] Store priv key in slot 0x5
29,364,520 UART: [art] Derive Key Pair - Done
29,377,412 UART: [art] Signing Cert with AUTHO
29,378,717 UART: RITY.KEYID = 7
31,658,008 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,531 UART: [art] PUB.X = 191709BE436B9811E2D9B032CCBF15CD73AED66812345312E527DAADB451BA7F2B2B2254EF0707D10A79BFF56180CC09
31,666,793 UART: [art] PUB.Y = 4C22CD8DB89A91E2FE62B3BE13CE196BC130E029A76EC8C01B18F3DEEE349A0C1484594FD151CF1ADE47218FC340D6A1
31,674,051 UART: [art] SIG.R = 32E9CDEA870D9F48506A641AD874005DF2112DAD4F0FE4661E1AD308D70E482F86E1BBF00B104EE14DD206A1C8C28A65
31,681,401 UART: [art] SIG.S = DC14A38EF5C376A25DCDF9B0B76B82C3F48575AD55633B85986437110F9CA43A4E8C122A0B62AAF6B56448ABC23E4103
32,986,205 UART: Caliptra RT
32,986,910 UART: [state] CFI Enabled
33,105,170 UART: [rt] RT listening for mailbox commands...
33,107,041 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,136,889 UART: [rt]cmd =0x46504c54, len=4
33,138,577 >>> mbox cmd response data (8 bytes)
33,139,582 UART: [rt] FIPS self test
33,140,531 UART: [kat] ++
33,140,991 UART: [kat] sha1
33,145,450 UART: [kat] SHA2-256
33,147,437 UART: [kat] SHA2-384
33,150,395 UART: [kat] SHA2-512-ACC
33,152,645 UART: [kat] ECC-384
36,395,460 UART: [kat] HMAC-384Kdf
36,396,776 UART: Fatal Error: 0x90030001
36,431,999 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,576,421 >>> mbox cmd response: failed
36,577,065 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,721,384 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
7,347,388 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
21,286,108 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,233 UART:
192,606 UART: Running Caliptra ROM ...
193,714 UART:
193,881 UART: [state] CFI Enabled
263,688 UART: [state] LifecycleState = Unprovisioned
265,613 UART: [state] DebugLocked = No
267,350 UART: [state] WD Timer not started. Device not locked for debugging
270,949 UART: [kat] SHA2-256
450,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,630 UART: [kat] ++
462,165 UART: [kat] sha1
472,835 UART: [kat] SHA2-256
475,840 UART: [kat] SHA2-384
483,536 UART: [kat] SHA2-512-ACC
486,555 UART: [kat] ECC-384
2,949,739 UART: [kat] HMAC-384Kdf
2,972,933 UART: [kat] LMS
3,502,333 UART: [kat] --
3,505,706 UART: [cold-reset] ++
3,507,514 UART: [fht] FHT @ 0x50003400
3,519,849 UART: [idev] ++
3,520,413 UART: [idev] CDI.KEYID = 6
3,521,299 UART: [idev] SUBJECT.KEYID = 7
3,522,547 UART: [idev] UDS.KEYID = 0
3,523,445 ready_for_fw is high
3,523,651 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,695 UART: [idev] Erasing UDS.KEYID = 0
6,026,113 UART: [idev] Sha1 KeyId Algorithm
6,050,099 UART: [idev] --
6,054,507 UART: [ldev] ++
6,055,090 UART: [ldev] CDI.KEYID = 6
6,055,981 UART: [ldev] SUBJECT.KEYID = 5
6,057,142 UART: [ldev] AUTHORITY.KEYID = 7
6,058,378 UART: [ldev] FE.KEYID = 1
6,100,252 UART: [ldev] Erasing FE.KEYID = 1
8,606,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,912 UART: [ldev] --
10,413,798 UART: [fwproc] Wait for Commands...
10,415,518 UART: [fwproc] Recv command 0x46574c44
10,417,616 UART: [fwproc] Recv'd Img size: 115304 bytes
13,829,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,947 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,289,046 >>> mbox cmd response: success
14,293,262 UART: [afmc] ++
14,293,849 UART: [afmc] CDI.KEYID = 6
14,294,774 UART: [afmc] SUBJECT.KEYID = 7
14,295,949 UART: [afmc] AUTHORITY.KEYID = 5
16,827,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,030 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,795 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,831 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,682 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,939 UART: [afmc] --
18,630,225 UART: [cold-reset] --
18,632,681 UART: [state] Locking Datavault
18,638,631 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,321 UART: [state] Locking ICCM
18,643,045 UART: [exit] Launching FMC @ 0x40000130
18,651,445 UART:
18,651,679 UART: Running Caliptra FMC ...
18,652,709 UART:
18,652,879 UART: [state] CFI Enabled
18,711,408 UART: [fht] FMC Alias Private Key: 7
20,476,168 UART: [art] Extend RT PCRs Done
20,477,386 UART: [art] Lock RT PCRs Done
20,478,819 UART: [art] Populate DV Done
20,484,018 UART: [fht] FMC Alias Private Key: 7
20,485,555 UART: [art] Derive CDI
20,486,289 UART: [art] Store in in slot 0x4
20,543,922 UART: [art] Derive Key Pair
20,544,963 UART: [art] Store priv key in slot 0x5
23,007,576 UART: [art] Derive Key Pair - Done
23,020,491 UART: [art] Signing Cert with AUTHO
23,021,797 UART: RITY.KEYID = 7
24,732,994 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,502 UART: [art] PUB.X = D8CC9421E783EC744DA7DC2998122EBF9C7260BE56020011BC130C14AED1C1AB3AF76E7E15A8B98C0AA366E671138A03
24,741,749 UART: [art] PUB.Y = ACCFF3B9F6023F2AA065CE34A4AF79B92304D94728317CECCC8815A9DFBD2BD7D5C267BD3F20A425AC314FAAF25825E5
24,749,069 UART: [art] SIG.R = 8A65D23C33A9A1F58E80E953BE32119EF6FBB359BCE513B4902E6FE6E17D4B1535F3E07F9404FCB6F4B5CCBB5A55F315
24,756,464 UART: [art] SIG.S = 0B5196443E49C1F93FD5974DF713AEE1FC413D2FEA2096E534AA9A0F066AA5D133CDDDB5C329E0098D60870F3F66820F
25,735,035 UART: Caliptra RT
25,735,739 UART: [state] CFI Enabled
25,900,828 UART: [rt] RT listening for mailbox commands...
25,902,700 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,932,350 UART: [rt]cmd =0x46504c54, len=4
25,933,927 >>> mbox cmd response data (8 bytes)
25,935,208 UART: [rt] FIPS self test
25,936,157 UART: [kat] ++
25,936,605 UART: [kat] sha1
25,940,984 UART: [kat] SHA2-256
25,942,871 UART: [kat] SHA2-384
25,945,783 UART: [kat] SHA2-512-ACC
25,948,021 UART: [kat] ECC-384
28,386,054 UART: [kat] HMAC-384Kdf
28,387,223 UART: Fatal Error: 0x90030001
28,422,455 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,567,281 >>> mbox cmd response: failed
28,567,909 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,712,685 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
190,012 UART:
190,303 UART: Running Caliptra ROM ...
191,331 UART:
191,470 UART: [state] CFI Enabled
261,289 UART: [state] LifecycleState = Unprovisioned
263,152 UART: [state] DebugLocked = No
264,446 UART: [state] WD Timer not started. Device not locked for debugging
268,116 UART: [kat] SHA2-256
447,267 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,822 UART: [kat] ++
459,272 UART: [kat] sha1
471,119 UART: [kat] SHA2-256
474,176 UART: [kat] SHA2-384
481,278 UART: [kat] SHA2-512-ACC
484,267 UART: [kat] ECC-384
2,946,396 UART: [kat] HMAC-384Kdf
2,968,833 UART: [kat] LMS
3,498,254 UART: [kat] --
3,504,265 UART: [cold-reset] ++
3,505,712 UART: [fht] FHT @ 0x50003400
3,515,990 UART: [idev] ++
3,516,552 UART: [idev] CDI.KEYID = 6
3,517,488 UART: [idev] SUBJECT.KEYID = 7
3,518,695 UART: [idev] UDS.KEYID = 0
3,520,202 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,665,262 UART: [idev] Erasing UDS.KEYID = 0
6,024,366 UART: [idev] Sha1 KeyId Algorithm
6,046,563 UART: [idev] --
6,049,968 UART: [ldev] ++
6,050,542 UART: [ldev] CDI.KEYID = 6
6,051,452 UART: [ldev] SUBJECT.KEYID = 5
6,052,618 UART: [ldev] AUTHORITY.KEYID = 7
6,053,853 UART: [ldev] FE.KEYID = 1
6,096,844 UART: [ldev] Erasing FE.KEYID = 1
8,599,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,665 UART: [ldev] --
10,410,851 UART: [fwproc] Wait for Commands...
10,412,479 UART: [fwproc] Recv command 0x46574c44
10,414,577 UART: [fwproc] Recv'd Img size: 115304 bytes
13,833,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,608 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,293,368 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,375,623 ready_for_fw is high
3,376,248 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,068,255 >>> mbox cmd response: success
18,360,819 UART:
18,361,509 UART: Running Caliptra FMC ...
18,362,645 UART:
18,362,797 UART: [state] CFI Enabled
18,428,975 UART: [fht] FMC Alias Private Key: 7
20,193,713 UART: [art] Extend RT PCRs Done
20,194,944 UART: [art] Lock RT PCRs Done
20,196,597 UART: [art] Populate DV Done
20,201,842 UART: [fht] FMC Alias Private Key: 7
20,203,497 UART: [art] Derive CDI
20,204,321 UART: [art] Store in in slot 0x4
20,262,174 UART: [art] Derive Key Pair
20,263,211 UART: [art] Store priv key in slot 0x5
22,726,065 UART: [art] Derive Key Pair - Done
22,738,642 UART: [art] Signing Cert with AUTHO
22,739,950 UART: RITY.KEYID = 7
24,451,956 UART: [art] Erasing AUTHORITY.KEYID = 7
24,453,469 UART: [art] PUB.X = ABFC16376CAF324C21056A42C8B85E0FD5ECA5E2692DAD7AE13CB4730119022648348EC6954CD3A260A88E812E6C32C0
24,460,735 UART: [art] PUB.Y = CB2A276F2D5569E9C0C7D3BEBDF789EDBFCA48252FDF654CF4C797544DB9D2DD08B146FE66B9D3800731FA36A5AF891B
24,468,032 UART: [art] SIG.R = 26539E2C69C783E93FBE1041B8309D915D4EAD1B926986B2A1948C2115A250C3198E1C86A98439D58371AC4C5FD4242D
24,475,386 UART: [art] SIG.S = A7A54387072361C38F2E095A88CF06A29EF68DC9E138F95C341966F0FFDBE1C100B3A7B833549DCC87D2C405C739915F
25,454,242 UART: Caliptra RT
25,454,950 UART: [state] CFI Enabled
25,620,131 UART: [rt] RT listening for mailbox commands...
25,621,994 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,651,650 UART: [rt]cmd =0x46504c54, len=4
25,653,428 >>> mbox cmd response data (8 bytes)
25,654,451 UART: [rt] FIPS self test
25,655,396 UART: [kat] ++
25,655,863 UART: [kat] sha1
25,660,211 UART: [kat] SHA2-256
25,662,100 UART: [kat] SHA2-384
25,665,149 UART: [kat] SHA2-512-ACC
25,667,363 UART: [kat] ECC-384
28,106,259 UART: [kat] HMAC-384Kdf
28,107,953 UART: Fatal Error: 0x90030001
28,143,637 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,288,523 >>> mbox cmd response: failed
28,289,224 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,433,818 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
3,356,099 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,069,984 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
192,823 UART:
193,170 UART: Running Caliptra ROM ...
194,380 UART:
603,778 UART: [state] CFI Enabled
617,598 UART: [state] LifecycleState = Unprovisioned
619,494 UART: [state] DebugLocked = No
621,297 UART: [state] WD Timer not started. Device not locked for debugging
625,388 UART: [kat] SHA2-256
804,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,106 UART: [kat] ++
816,550 UART: [kat] sha1
828,345 UART: [kat] SHA2-256
831,349 UART: [kat] SHA2-384
837,906 UART: [kat] SHA2-512-ACC
840,922 UART: [kat] ECC-384
3,282,150 UART: [kat] HMAC-384Kdf
3,294,533 UART: [kat] LMS
3,824,053 UART: [kat] --
3,828,404 UART: [cold-reset] ++
3,830,191 UART: [fht] FHT @ 0x50003400
3,840,957 UART: [idev] ++
3,841,529 UART: [idev] CDI.KEYID = 6
3,842,484 UART: [idev] SUBJECT.KEYID = 7
3,843,658 UART: [idev] UDS.KEYID = 0
3,844,580 ready_for_fw is high
3,844,799 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,989,598 UART: [idev] Erasing UDS.KEYID = 0
6,318,918 UART: [idev] Sha1 KeyId Algorithm
6,341,008 UART: [idev] --
6,344,089 UART: [ldev] ++
6,344,666 UART: [ldev] CDI.KEYID = 6
6,345,578 UART: [ldev] SUBJECT.KEYID = 5
6,346,737 UART: [ldev] AUTHORITY.KEYID = 7
6,347,971 UART: [ldev] FE.KEYID = 1
6,358,296 UART: [ldev] Erasing FE.KEYID = 1
8,832,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,148 UART: [ldev] --
10,624,638 UART: [fwproc] Wait for Commands...
10,626,290 UART: [fwproc] Recv command 0x46574c44
10,628,395 UART: [fwproc] Recv'd Img size: 115304 bytes
14,042,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,513 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,503,428 >>> mbox cmd response: success
14,507,215 UART: [afmc] ++
14,507,802 UART: [afmc] CDI.KEYID = 6
14,508,717 UART: [afmc] SUBJECT.KEYID = 7
14,509,878 UART: [afmc] AUTHORITY.KEYID = 5
17,009,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,731,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,733,559 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,749,295 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,765,314 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,781,196 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,804,245 UART: [afmc] --
18,808,872 UART: [cold-reset] --
18,811,650 UART: [state] Locking Datavault
18,818,634 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,282 UART: [state] Locking ICCM
18,821,894 UART: [exit] Launching FMC @ 0x40000130
18,830,343 UART:
18,830,579 UART: Running Caliptra FMC ...
18,831,681 UART:
18,831,845 UART: [state] CFI Enabled
18,839,998 UART: [fht] FMC Alias Private Key: 7
20,597,076 UART: [art] Extend RT PCRs Done
20,598,300 UART: [art] Lock RT PCRs Done
20,599,719 UART: [art] Populate DV Done
20,605,429 UART: [fht] FMC Alias Private Key: 7
20,607,132 UART: [art] Derive CDI
20,607,951 UART: [art] Store in in slot 0x4
20,650,279 UART: [art] Derive Key Pair
20,651,322 UART: [art] Store priv key in slot 0x5
23,077,800 UART: [art] Derive Key Pair - Done
23,090,599 UART: [art] Signing Cert with AUTHO
23,091,911 UART: RITY.KEYID = 7
24,797,136 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,645 UART: [art] PUB.X = E25F0642DF3EE99942DEC80A607FBD177647F0A40CF2F0E2741BA0E4668891532682F3F6A2614128E2A3E45955EDF9C5
24,805,906 UART: [art] PUB.Y = 73E4A521E4876591EA86903923DEF819C64DF509A7B6A40AD14577DD8AA910FE352097B609312D1D8737E517C4B130B6
24,813,147 UART: [art] SIG.R = F32AFD66531A357CE566DEF5453A0F4C0F147FEC904D2A977B1E65B2DE320841420915275CE3D6A39511C51C0A228F07
24,820,491 UART: [art] SIG.S = C71A6563F5AC7E297A402F1B9C7ACB604E666D530D379B465246659FDB68FF7A2ACB14844AA92C0D491BF07EDA15AA09
25,799,395 UART: Caliptra RT
25,800,094 UART: [state] CFI Enabled
25,918,722 UART: [rt] RT listening for mailbox commands...
25,920,615 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,950,589 UART: [rt]cmd =0x46504c54, len=4
25,952,226 >>> mbox cmd response data (8 bytes)
25,953,507 UART: [rt] FIPS self test
25,954,451 UART: [kat] ++
25,954,903 UART: [kat] sha1
25,959,251 UART: [kat] SHA2-256
25,961,180 UART: [kat] SHA2-384
25,964,084 UART: [kat] SHA2-512-ACC
25,966,322 UART: [kat] ECC-384
28,394,234 UART: [kat] HMAC-384Kdf
28,395,607 UART: Fatal Error: 0x90030001
28,430,836 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,575,640 >>> mbox cmd response: failed
28,576,323 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,721,041 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,154 UART:
190,446 UART: Running Caliptra ROM ...
191,470 UART:
11,810,208 UART: [state] CFI Enabled
11,822,862 UART: [state] LifecycleState = Unprovisioned
11,824,763 UART: [state] DebugLocked = No
11,826,884 UART: [state] WD Timer not started. Device not locked for debugging
11,829,977 UART: [kat] SHA2-256
12,009,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,020,686 UART: [kat] ++
12,021,144 UART: [kat] sha1
12,033,273 UART: [kat] SHA2-256
12,036,291 UART: [kat] SHA2-384
12,041,685 UART: [kat] SHA2-512-ACC
12,044,645 UART: [kat] ECC-384
14,486,883 UART: [kat] HMAC-384Kdf
14,499,213 UART: [kat] LMS
15,028,711 UART: [kat] --
15,033,077 UART: [cold-reset] ++
15,034,416 UART: [fht] FHT @ 0x50003400
15,044,047 UART: [idev] ++
15,044,610 UART: [idev] CDI.KEYID = 6
15,045,549 UART: [idev] SUBJECT.KEYID = 7
15,046,759 UART: [idev] UDS.KEYID = 0
15,048,257 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
15,193,050 UART: [idev] Erasing UDS.KEYID = 0
17,519,041 UART: [idev] Sha1 KeyId Algorithm
17,543,510 UART: [idev] --
17,546,643 UART: [ldev] ++
17,547,209 UART: [ldev] CDI.KEYID = 6
17,548,112 UART: [ldev] SUBJECT.KEYID = 5
17,549,326 UART: [ldev] AUTHORITY.KEYID = 7
17,550,559 UART: [ldev] FE.KEYID = 1
17,560,046 UART: [ldev] Erasing FE.KEYID = 1
20,032,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,749,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,764,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,780,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,796,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,816,468 UART: [ldev] --
21,820,212 UART: [fwproc] Wait for Commands...
21,822,324 UART: [fwproc] Recv command 0x46574c44
21,824,406 UART: [fwproc] Recv'd Img size: 115304 bytes
25,238,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,311,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,380,678 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,702,273 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,692,011 ready_for_fw is high
3,692,634 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,278,862 >>> mbox cmd response: success
18,523,883 UART:
18,524,270 UART: Running Caliptra FMC ...
18,525,486 UART:
18,525,671 UART: [state] CFI Enabled
18,533,327 UART: [fht] FMC Alias Private Key: 7
20,289,946 UART: [art] Extend RT PCRs Done
20,291,175 UART: [art] Lock RT PCRs Done
20,293,048 UART: [art] Populate DV Done
20,298,497 UART: [fht] FMC Alias Private Key: 7
20,300,151 UART: [art] Derive CDI
20,300,990 UART: [art] Store in in slot 0x4
20,344,088 UART: [art] Derive Key Pair
20,345,136 UART: [art] Store priv key in slot 0x5
22,771,750 UART: [art] Derive Key Pair - Done
22,784,650 UART: [art] Signing Cert with AUTHO
22,785,960 UART: RITY.KEYID = 7
24,491,177 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,682 UART: [art] PUB.X = 9FECC92381F598207FBDB1A44F0BF91BFF6CDBFF429D4EECED983FE0EDBF0D0445DE07D8D1A2D8694831766446EC19B5
24,499,963 UART: [art] PUB.Y = 4E5CF9CEAE6EAFF2FF123188F17EBC4A21369DC43CA2BCDAD5FED28CEFAB5DBCDBFD205339F9D8BE6F8BCB006BC1754E
24,507,253 UART: [art] SIG.R = B2E7E7BAF0D9C0A262995E743F1876D375FD62DCF95D6040D7262F65461227F165E739101F3A93F241934420BA7AA6B0
24,514,628 UART: [art] SIG.S = 73ECF506F459575115E5D1E3A8E5FB14EB680C05BB503728BCBB25E78F5CD3EA042F8C295F14DCEB7844FB1678B873E4
25,493,067 UART: Caliptra RT
25,493,825 UART: [state] CFI Enabled
25,610,757 UART: [rt] RT listening for mailbox commands...
25,612,611 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,642,453 UART: [rt]cmd =0x46504c54, len=4
25,644,053 >>> mbox cmd response data (8 bytes)
25,645,111 UART: [rt] FIPS self test
25,646,065 UART: [kat] ++
25,646,514 UART: [kat] sha1
25,650,965 UART: [kat] SHA2-256
25,652,888 UART: [kat] SHA2-384
25,655,958 UART: [kat] SHA2-512-ACC
25,658,222 UART: [kat] ECC-384
28,085,612 UART: [kat] HMAC-384Kdf
28,087,039 UART: Fatal Error: 0x90030001
28,122,301 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,267,190 >>> mbox cmd response: failed
28,267,862 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,412,622 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
15,203,050 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,793,723 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,439,000 ready_for_fw is high
3,439,449 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,759,092 >>> mbox cmd response: success
19,049,459 UART:
19,049,884 UART: Running Caliptra FMC ...
19,051,013 UART:
19,051,178 UART: [state] CFI Enabled
19,118,253 UART: [fht] FMC Alias Private Key: 7
20,881,835 UART: [art] Extend RT PCRs Done
20,883,069 UART: [art] Lock RT PCRs Done
20,885,084 UART: [art] Populate DV Done
20,890,387 UART: [fht] FMC Alias Private Key: 7
20,891,941 UART: [art] Derive CDI
20,892,690 UART: [art] Store in in slot 0x4
20,950,648 UART: [art] Derive Key Pair
20,951,652 UART: [art] Store priv key in slot 0x5
23,414,843 UART: [art] Derive Key Pair - Done
23,427,963 UART: [art] Signing Cert with AUTHO
23,429,274 UART: RITY.KEYID = 7
25,140,606 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,116 UART: [art] PUB.X = 9266289940EC0672FFC5B3A44CAFDB15CBFE43909BA61A171EC69F808B823E9A8108343F9D18FAD37377C2AF92448DD9
25,149,384 UART: [art] PUB.Y = B5565DA514F44CD4C0DE4F43A8A4063AB136DA847E4C54496ECC097BA9E610C4ECD973969AA57D6980C3D65BB26F1445
25,156,682 UART: [art] SIG.R = 1D3EC72C4D0DDF9F93395B3EF3899BAE9AEB4C191AAEFB3D3DA966B6210BB52ABA1FC1C911FDC6E6AE5C3BFF5442E8EB
25,164,087 UART: [art] SIG.S = 3D21FE9C04D128540D4A9EF0911FF4A106518FF1A8998A295AB7827419AEB65BCAAC4DB8B2C7827775834264FB3B1F4B
26,142,999 UART: Caliptra RT
26,143,720 UART: [state] CFI Enabled
26,308,735 UART: [rt] RT listening for mailbox commands...
26,310,596 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,340,143 UART: [rt]cmd =0x46504c54, len=4
26,341,703 >>> mbox cmd response data (8 bytes)
26,342,827 UART: [rt] FIPS self test
26,343,771 UART: [kat] ++
26,344,223 UART: [kat] sha1
26,348,734 UART: [kat] SHA2-256
26,350,612 UART: [kat] SHA2-384
26,353,679 UART: [kat] SHA2-512-ACC
26,355,948 UART: [kat] ECC-384
28,794,677 UART: [kat] HMAC-384Kdf
28,796,048 UART: Fatal Error: 0x90030001
28,831,385 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,976,287 >>> mbox cmd response: failed
28,976,896 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,121,540 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
3,438,607 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,752,588 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,754,271 ready_for_fw is high
3,754,709 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,972,949 >>> mbox cmd response: success
19,218,564 UART:
19,218,963 UART: Running Caliptra FMC ...
19,220,288 UART:
19,220,459 UART: [state] CFI Enabled
19,228,407 UART: [fht] FMC Alias Private Key: 7
20,985,341 UART: [art] Extend RT PCRs Done
20,986,584 UART: [art] Lock RT PCRs Done
20,988,463 UART: [art] Populate DV Done
20,993,726 UART: [fht] FMC Alias Private Key: 7
20,995,393 UART: [art] Derive CDI
20,996,136 UART: [art] Store in in slot 0x4
21,038,526 UART: [art] Derive Key Pair
21,039,570 UART: [art] Store priv key in slot 0x5
23,465,897 UART: [art] Derive Key Pair - Done
23,478,953 UART: [art] Signing Cert with AUTHO
23,480,267 UART: RITY.KEYID = 7
25,186,063 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,590 UART: [art] PUB.X = 7DB249580412BB34DB8D0D5B1485FFFD952DE4C1815C9D6643EC4F1C5619F0BA3C0EA4CAA92BBAF7F6DD31791150CFCC
25,194,902 UART: [art] PUB.Y = 712338D511C7F1122F4A797587DE7EB7D01C44114A49AF70E5F17C51309E87B2E4DB2762AD59BE89C4A47E882DE1BD88
25,202,099 UART: [art] SIG.R = 6BBD37E145E6968BC63E2D10E4272C7B20C4A47CA92F8C1D901D4F12913F276A458874BC5C1F9321FC5628B0ED1103CA
25,209,492 UART: [art] SIG.S = 9954F470E25FD9A8ACE83883F931772FDFD6164B60DAE7D0F8C6485A7AB6BA590F9873FB52E9C11555BDD041FCC7132B
26,188,466 UART: Caliptra RT
26,189,162 UART: [state] CFI Enabled
26,306,872 UART: [rt] RT listening for mailbox commands...
26,308,720 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,338,330 UART: [rt]cmd =0x46504c54, len=4
26,339,837 >>> mbox cmd response data (8 bytes)
26,341,052 UART: [rt] FIPS self test
26,342,000 UART: [kat] ++
26,342,456 UART: [kat] sha1
26,347,017 UART: [kat] SHA2-256
26,348,903 UART: [kat] SHA2-384
26,351,810 UART: [kat] SHA2-512-ACC
26,354,086 UART: [kat] ECC-384
28,780,892 UART: [kat] HMAC-384Kdf
28,781,994 UART: Fatal Error: 0x90030001
28,817,384 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,962,553 >>> mbox cmd response: failed
28,963,215 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,107,856 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
14,577,327 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,818,770 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,921 UART: [kat] SHA2-256
881,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,967 UART: [kat] ++
886,119 UART: [kat] sha1
890,241 UART: [kat] SHA2-256
892,179 UART: [kat] SHA2-384
895,006 UART: [kat] SHA2-512-ACC
896,907 UART: [kat] ECC-384
902,562 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,475,965 UART: [cold-reset] ++
1,476,381 UART: [fht] Storing FHT @ 0x50003400
1,479,294 UART: [idev] ++
1,479,462 UART: [idev] CDI.KEYID = 6
1,479,822 UART: [idev] SUBJECT.KEYID = 7
1,480,246 UART: [idev] UDS.KEYID = 0
1,480,591 ready_for_fw is high
1,480,591 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,504,866 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,522 UART: [idev] --
1,514,639 UART: [ldev] ++
1,514,807 UART: [ldev] CDI.KEYID = 6
1,515,170 UART: [ldev] SUBJECT.KEYID = 5
1,515,596 UART: [ldev] AUTHORITY.KEYID = 7
1,516,059 UART: [ldev] FE.KEYID = 1
1,520,955 UART: [ldev] Erasing FE.KEYID = 1
1,546,106 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,888 UART: [ldev] --
1,585,201 UART: [fwproc] Waiting for Commands...
1,585,910 UART: [fwproc] Received command 0x46574c44
1,586,701 UART: [fwproc] Received Image of size 115304 bytes
2,896,336 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,062 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,414 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,861 >>> mbox cmd response: success
3,091,003 UART: [afmc] ++
3,091,171 UART: [afmc] CDI.KEYID = 6
3,091,533 UART: [afmc] SUBJECT.KEYID = 7
3,091,958 UART: [afmc] AUTHORITY.KEYID = 5
3,126,197 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,515 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,908 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,598 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,389 UART: [afmc] --
3,169,387 UART: [cold-reset] --
3,170,291 UART: [state] Locking Datavault
3,171,398 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,002 UART: [state] Locking ICCM
3,172,500 UART: [exit] Launching FMC @ 0x40000130
3,177,829 UART:
3,177,845 UART: Running Caliptra FMC ...
3,178,253 UART:
3,178,307 UART: [state] CFI Enabled
3,188,652 UART: [fht] FMC Alias Private Key: 7
3,296,005 UART: [art] Extend RT PCRs Done
3,296,433 UART: [art] Lock RT PCRs Done
3,297,859 UART: [art] Populate DV Done
3,306,302 UART: [fht] FMC Alias Private Key: 7
3,307,428 UART: [art] Derive CDI
3,307,708 UART: [art] Store in in slot 0x4
3,393,533 UART: [art] Derive Key Pair
3,393,893 UART: [art] Store priv key in slot 0x5
3,407,031 UART: [art] Derive Key Pair - Done
3,421,806 UART: [art] Signing Cert with AUTHO
3,422,286 UART: RITY.KEYID = 7
3,437,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,451 UART: [art] PUB.X = 0FD269B69CDCDFCF11443728B5EFA52C7BEE55061CC02548115A1B9383484CCA3D80BB95598491C7A567FD7A15BE9C19
3,445,225 UART: [art] PUB.Y = 791A7E24A8CF8E864F9A1AACFA7CF9D53811F38BA372310DDD7506E5D3CBDD67D55169F79F38BEC98D9DE34A255A8666
3,452,185 UART: [art] SIG.R = 00BBCF43D0F6D7EC8DB31D94AD34BA31F0FB5384EB18E276D0EA85EA8BE8CD7CDF4C1DAA756C2D43E779150F4F7FB2FE
3,458,962 UART: [art] SIG.S = 374944DEF4F7EA7AF08F573E647F228EEF49B2F60CAA1E2651E1A49EC2CE0EEE7489A4DF8A2481810AEA138EC41916FB
3,482,926 UART: Caliptra RT
3,483,179 UART: [state] CFI Enabled
3,591,126 UART: [rt] RT listening for mailbox commands...
3,591,789 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,500 UART: [rt]cmd =0x46504c54, len=4
3,622,727 >>> mbox cmd response data (8 bytes)
3,622,864 UART: [rt] FIPS self test
3,623,192 UART: [kat] ++
3,623,344 UART: [kat] sha1
3,627,494 UART: [kat] SHA2-256
3,629,516 UART: [kat] SHA2-384
3,632,383 UART: [kat] SHA2-512-ACC
3,634,310 UART: [kat] ECC-384
3,644,078 UART: [kat] HMAC-384Kdf
3,645,144 UART: Fatal Error: 0x90030001
3,646,694 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,646,699 >>> mbox cmd response: failed
3,646,699 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,646,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,580 UART: [state] LifecycleState = Unprovisioned
86,235 UART: [state] DebugLocked = No
86,805 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,353 UART: [kat] SHA2-256
882,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,399 UART: [kat] ++
886,551 UART: [kat] sha1
890,975 UART: [kat] SHA2-256
892,913 UART: [kat] SHA2-384
895,668 UART: [kat] SHA2-512-ACC
897,569 UART: [kat] ECC-384
903,408 UART: [kat] HMAC-384Kdf
907,980 UART: [kat] LMS
1,476,176 UART: [kat] --
1,476,853 UART: [cold-reset] ++
1,477,275 UART: [fht] Storing FHT @ 0x50003400
1,480,120 UART: [idev] ++
1,480,288 UART: [idev] CDI.KEYID = 6
1,480,648 UART: [idev] SUBJECT.KEYID = 7
1,481,072 UART: [idev] UDS.KEYID = 0
1,481,417 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,970 UART: [idev] Erasing UDS.KEYID = 0
1,505,646 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,184 UART: [idev] --
1,515,127 UART: [ldev] ++
1,515,295 UART: [ldev] CDI.KEYID = 6
1,515,658 UART: [ldev] SUBJECT.KEYID = 5
1,516,084 UART: [ldev] AUTHORITY.KEYID = 7
1,516,547 UART: [ldev] FE.KEYID = 1
1,521,579 UART: [ldev] Erasing FE.KEYID = 1
1,546,848 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,694 UART: [ldev] --
1,586,071 UART: [fwproc] Waiting for Commands...
1,586,878 UART: [fwproc] Received command 0x46574c44
1,587,669 UART: [fwproc] Received Image of size 115304 bytes
2,896,966 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,984 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,336 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,727 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,115 ready_for_fw is high
1,363,115 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,281 >>> mbox cmd response: success
3,003,893 UART:
3,003,909 UART: Running Caliptra FMC ...
3,004,317 UART:
3,004,371 UART: [state] CFI Enabled
3,014,506 UART: [fht] FMC Alias Private Key: 7
3,122,137 UART: [art] Extend RT PCRs Done
3,122,565 UART: [art] Lock RT PCRs Done
3,124,175 UART: [art] Populate DV Done
3,132,310 UART: [fht] FMC Alias Private Key: 7
3,133,246 UART: [art] Derive CDI
3,133,526 UART: [art] Store in in slot 0x4
3,219,169 UART: [art] Derive Key Pair
3,219,529 UART: [art] Store priv key in slot 0x5
3,232,641 UART: [art] Derive Key Pair - Done
3,247,632 UART: [art] Signing Cert with AUTHO
3,248,112 UART: RITY.KEYID = 7
3,263,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,377 UART: [art] PUB.X = 912006F43462D08FD3ED12D1AF21BC6E69C54AC9A028DC48C64B5F3121D1F78ECCBCF2A61402B0E55434E738EFCA5291
3,271,153 UART: [art] PUB.Y = DE03770F370953E06F0460AF81009BD40C3856FC0FF7438A81B305A2617CE42A7F4294A00FE62809BCB8DEA1ABFCEDDA
3,278,068 UART: [art] SIG.R = 457995C11DA3F137C4E2D349D0A19D1C4F9CC990F26F6DAF6BB4ADF45034F0106888DC3B12D3D4EA7C81B091B09597F9
3,284,848 UART: [art] SIG.S = 8C1565B1EA23F78F7E76DA29AB7A476D6ED97A160CF8B1E6103B7D79F91BD8127DCA7CC5E9E6835A6063D0FA15F33CE0
3,308,394 UART: Caliptra RT
3,308,647 UART: [state] CFI Enabled
3,417,108 UART: [rt] RT listening for mailbox commands...
3,417,771 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,472 UART: [rt]cmd =0x46504c54, len=4
3,448,673 >>> mbox cmd response data (8 bytes)
3,448,992 UART: [rt] FIPS self test
3,449,320 UART: [kat] ++
3,449,472 UART: [kat] sha1
3,453,706 UART: [kat] SHA2-256
3,455,728 UART: [kat] SHA2-384
3,458,573 UART: [kat] SHA2-512-ACC
3,460,500 UART: [kat] ECC-384
3,470,652 UART: [kat] HMAC-384Kdf
3,471,916 UART: Fatal Error: 0x90030001
3,473,466 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,473,471 >>> mbox cmd response: failed
3,473,471 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,473,476 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,541 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,893 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,490 UART: [kat] SHA2-256
882,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,536 UART: [kat] ++
886,688 UART: [kat] sha1
890,962 UART: [kat] SHA2-256
892,900 UART: [kat] SHA2-384
895,559 UART: [kat] SHA2-512-ACC
897,460 UART: [kat] ECC-384
903,249 UART: [kat] HMAC-384Kdf
907,853 UART: [kat] LMS
1,476,049 UART: [kat] --
1,476,926 UART: [cold-reset] ++
1,477,388 UART: [fht] Storing FHT @ 0x50003400
1,480,353 UART: [idev] ++
1,480,521 UART: [idev] CDI.KEYID = 6
1,480,881 UART: [idev] SUBJECT.KEYID = 7
1,481,305 UART: [idev] UDS.KEYID = 0
1,481,650 ready_for_fw is high
1,481,650 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,603 UART: [idev] Erasing UDS.KEYID = 0
1,506,253 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,763 UART: [idev] --
1,515,916 UART: [ldev] ++
1,516,084 UART: [ldev] CDI.KEYID = 6
1,516,447 UART: [ldev] SUBJECT.KEYID = 5
1,516,873 UART: [ldev] AUTHORITY.KEYID = 7
1,517,336 UART: [ldev] FE.KEYID = 1
1,522,662 UART: [ldev] Erasing FE.KEYID = 1
1,547,953 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,885 UART: [ldev] --
1,587,234 UART: [fwproc] Waiting for Commands...
1,587,969 UART: [fwproc] Received command 0x46574c44
1,588,760 UART: [fwproc] Received Image of size 115304 bytes
2,898,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,515 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,867 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,068 >>> mbox cmd response: success
3,094,208 UART: [afmc] ++
3,094,376 UART: [afmc] CDI.KEYID = 6
3,094,738 UART: [afmc] SUBJECT.KEYID = 7
3,095,163 UART: [afmc] AUTHORITY.KEYID = 5
3,130,640 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,146,678 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,147,458 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,153,186 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,159,071 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,761 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,172,652 UART: [afmc] --
3,173,684 UART: [cold-reset] --
3,174,562 UART: [state] Locking Datavault
3,175,843 UART: [state] Locking PCR0, PCR1 and PCR31
3,176,447 UART: [state] Locking ICCM
3,177,099 UART: [exit] Launching FMC @ 0x40000130
3,182,428 UART:
3,182,444 UART: Running Caliptra FMC ...
3,182,852 UART:
3,182,995 UART: [state] CFI Enabled
3,193,400 UART: [fht] FMC Alias Private Key: 7
3,300,819 UART: [art] Extend RT PCRs Done
3,301,247 UART: [art] Lock RT PCRs Done
3,303,021 UART: [art] Populate DV Done
3,311,450 UART: [fht] FMC Alias Private Key: 7
3,312,620 UART: [art] Derive CDI
3,312,900 UART: [art] Store in in slot 0x4
3,398,615 UART: [art] Derive Key Pair
3,398,975 UART: [art] Store priv key in slot 0x5
3,412,283 UART: [art] Derive Key Pair - Done
3,427,390 UART: [art] Signing Cert with AUTHO
3,427,870 UART: RITY.KEYID = 7
3,443,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,444,111 UART: [art] PUB.X = 0BCC21A61F83FEF534FC5D3CE43A6785D906ADE9B6CB1604FD383857894250D9175C9D4ADD40BAB29E7D85EDF80825CB
3,450,885 UART: [art] PUB.Y = 64FF00BA393DC48C298BA0D1047C69B6BD4972DC57A86E7E1B12F572E44A13F28EA6EB7B1F882A8095D92B00DEFFC819
3,457,802 UART: [art] SIG.R = 883AD40E69F9B80691D7265675A1C8D8E904D15CB2BF4AF755AECB4B59FAE778E3D687DBBD95C7C216AC6F946D7C2C79
3,464,579 UART: [art] SIG.S = 4B11841EC30FDBABE604E3407D48EF75AEE14C85F0D9A60806A3218CC864F915F406347F9644AFECED32E3023C84196D
3,487,936 UART: Caliptra RT
3,488,281 UART: [state] CFI Enabled
3,597,908 UART: [rt] RT listening for mailbox commands...
3,598,571 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,106 UART: [rt]cmd =0x46504c54, len=4
3,629,291 >>> mbox cmd response data (8 bytes)
3,629,554 UART: [rt] FIPS self test
3,629,882 UART: [kat] ++
3,630,034 UART: [kat] sha1
3,634,152 UART: [kat] SHA2-256
3,636,174 UART: [kat] SHA2-384
3,639,133 UART: [kat] SHA2-512-ACC
3,641,060 UART: [kat] ECC-384
3,651,228 UART: [kat] HMAC-384Kdf
3,652,106 UART: Fatal Error: 0x90030001
3,653,656 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,653,661 >>> mbox cmd response: failed
3,653,661 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,653,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,642 UART: [kat] SHA2-256
892,580 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,577 UART: [kat] LMS
1,475,773 UART: [kat] --
1,476,446 UART: [cold-reset] ++
1,476,856 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,783 UART: [idev] Erasing UDS.KEYID = 0
1,506,083 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,549 UART: [idev] --
1,515,610 UART: [ldev] ++
1,515,778 UART: [ldev] CDI.KEYID = 6
1,516,141 UART: [ldev] SUBJECT.KEYID = 5
1,516,567 UART: [ldev] AUTHORITY.KEYID = 7
1,517,030 UART: [ldev] FE.KEYID = 1
1,522,684 UART: [ldev] Erasing FE.KEYID = 1
1,548,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,191 UART: [ldev] --
1,587,662 UART: [fwproc] Waiting for Commands...
1,588,381 UART: [fwproc] Received command 0x46574c44
1,589,172 UART: [fwproc] Received Image of size 115304 bytes
2,899,615 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,927,015 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,956,367 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,616 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,934 ready_for_fw is high
1,362,934 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,306 >>> mbox cmd response: success
3,001,482 UART:
3,001,498 UART: Running Caliptra FMC ...
3,001,906 UART:
3,002,049 UART: [state] CFI Enabled
3,012,248 UART: [fht] FMC Alias Private Key: 7
3,119,895 UART: [art] Extend RT PCRs Done
3,120,323 UART: [art] Lock RT PCRs Done
3,122,067 UART: [art] Populate DV Done
3,130,266 UART: [fht] FMC Alias Private Key: 7
3,131,346 UART: [art] Derive CDI
3,131,626 UART: [art] Store in in slot 0x4
3,217,521 UART: [art] Derive Key Pair
3,217,881 UART: [art] Store priv key in slot 0x5
3,230,969 UART: [art] Derive Key Pair - Done
3,245,540 UART: [art] Signing Cert with AUTHO
3,246,020 UART: RITY.KEYID = 7
3,261,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,277 UART: [art] PUB.X = 29E568E0956887E724CDCABEECAC2B90EAAC1DD4739C4083FE75115C44A96D5BDE7F7110191D7BFAB163F0300E9E318C
3,269,060 UART: [art] PUB.Y = 2A6CD8774CBA81D92A31BAD7A6BD637C19690A097CD5CE1F6AB2E8F222C2CF60435C3944B1C95C7E201E97ACB0BB6F5B
3,276,024 UART: [art] SIG.R = ADCFCEA4BC5F3B5B926AE7A4F11EC52FCD4893A13D49BCE6A6EFFDF8A2867AC483BAE77658E976AB4C89AA297FEBD042
3,282,828 UART: [art] SIG.S = AF2AA015D702DF6FAC53BC8C6059B12E29C699DE965CE16C1AA20E2F4BF90C58AC56789BA5916B8AB4BDF11C6BB4B58A
3,306,728 UART: Caliptra RT
3,307,073 UART: [state] CFI Enabled
3,414,669 UART: [rt] RT listening for mailbox commands...
3,415,332 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,043 UART: [rt]cmd =0x46504c54, len=4
3,446,018 >>> mbox cmd response data (8 bytes)
3,446,197 UART: [rt] FIPS self test
3,446,525 UART: [kat] ++
3,446,677 UART: [kat] sha1
3,450,903 UART: [kat] SHA2-256
3,452,925 UART: [kat] SHA2-384
3,455,818 UART: [kat] SHA2-512-ACC
3,457,745 UART: [kat] ECC-384
3,467,481 UART: [kat] HMAC-384Kdf
3,468,301 UART: Fatal Error: 0x90030001
3,469,851 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,469,856 >>> mbox cmd response: failed
3,469,856 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,469,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,876 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,944,110 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,719 UART: [kat] SHA2-256
903,659 UART: [kat] SHA2-384
906,314 UART: [kat] SHA2-512-ACC
908,215 UART: [kat] ECC-384
917,636 UART: [kat] HMAC-384Kdf
922,228 UART: [kat] LMS
1,170,556 UART: [kat] --
1,171,419 UART: [cold-reset] ++
1,171,759 UART: [fht] FHT @ 0x50003400
1,174,226 UART: [idev] ++
1,174,394 UART: [idev] CDI.KEYID = 6
1,174,754 UART: [idev] SUBJECT.KEYID = 7
1,175,178 UART: [idev] UDS.KEYID = 0
1,175,523 ready_for_fw is high
1,175,523 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,280 UART: [idev] Erasing UDS.KEYID = 0
1,200,125 UART: [idev] Sha1 KeyId Algorithm
1,208,797 UART: [idev] --
1,209,773 UART: [ldev] ++
1,209,941 UART: [ldev] CDI.KEYID = 6
1,210,304 UART: [ldev] SUBJECT.KEYID = 5
1,210,730 UART: [ldev] AUTHORITY.KEYID = 7
1,211,193 UART: [ldev] FE.KEYID = 1
1,216,571 UART: [ldev] Erasing FE.KEYID = 1
1,242,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,771 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,908 UART: [fwproc] Recv command 0x46574c44
1,283,636 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,859 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,142 >>> mbox cmd response: success
2,787,318 UART: [afmc] ++
2,787,486 UART: [afmc] CDI.KEYID = 6
2,787,848 UART: [afmc] SUBJECT.KEYID = 7
2,788,273 UART: [afmc] AUTHORITY.KEYID = 5
2,823,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,407 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,135 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,020 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,739 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,589 UART: [afmc] --
2,866,517 UART: [cold-reset] --
2,867,385 UART: [state] Locking Datavault
2,868,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,278 UART: [state] Locking ICCM
2,869,924 UART: [exit] Launching FMC @ 0x40000130
2,875,253 UART:
2,875,269 UART: Running Caliptra FMC ...
2,875,677 UART:
2,875,731 UART: [state] CFI Enabled
2,886,484 UART: [fht] FMC Alias Private Key: 7
2,994,129 UART: [art] Extend RT PCRs Done
2,994,557 UART: [art] Lock RT PCRs Done
2,995,949 UART: [art] Populate DV Done
3,004,052 UART: [fht] FMC Alias Private Key: 7
3,005,012 UART: [art] Derive CDI
3,005,292 UART: [art] Store in in slot 0x4
3,091,073 UART: [art] Derive Key Pair
3,091,433 UART: [art] Store priv key in slot 0x5
3,104,107 UART: [art] Derive Key Pair - Done
3,118,751 UART: [art] Signing Cert with AUTHO
3,119,231 UART: RITY.KEYID = 7
3,134,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,200 UART: [art] PUB.X = 29D04D8643BED67A9A09F15BEFF449AC310402A7F4BBD408ED8258917727A276BEC365A33F1DEA7862428338758F4BD8
3,141,962 UART: [art] PUB.Y = 25687A8F4A6CC558828FA035DDACC0C571F20312A76BE0F57AF9AF89AB9EFC393A3371F7B94704666C484EA515699041
3,148,910 UART: [art] SIG.R = 49862041C12F0CA19C20E80D77168F95A7B1E97DE193F6F9418B9E39A55520CE7E1E55A0936AA2F333DDC4887F275427
3,155,672 UART: [art] SIG.S = AF3528BC1B5AAA198E5449E13C0FDD639B53BF099EDD6291534F0308B9299FDBFB60289125D75AADED06B0DBDEC6EC50
3,179,310 UART: Caliptra RT
3,179,563 UART: [state] CFI Enabled
3,286,788 UART: [rt] RT listening for mailbox commands...
3,287,451 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,982 UART: [rt]cmd =0x46504c54, len=4
3,318,025 >>> mbox cmd response data (8 bytes)
3,318,332 UART: [rt] FIPS self test
3,318,660 UART: [kat] ++
3,318,812 UART: [kat] sha1
3,323,176 UART: [kat] SHA2-256
3,325,198 UART: [kat] SHA2-384
3,328,155 UART: [kat] SHA2-512-ACC
3,330,082 UART: [kat] ECC-384
3,339,836 UART: [kat] HMAC-384Kdf
3,340,750 UART: Fatal Error: 0x90030001
3,342,300 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,342,305 >>> mbox cmd response: failed
3,342,305 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,342,310 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,747 UART: [kat] SHA2-256
903,687 UART: [kat] SHA2-384
906,642 UART: [kat] SHA2-512-ACC
908,543 UART: [kat] ECC-384
918,102 UART: [kat] HMAC-384Kdf
922,716 UART: [kat] LMS
1,171,044 UART: [kat] --
1,171,845 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,175,008 UART: [idev] ++
1,175,176 UART: [idev] CDI.KEYID = 6
1,175,536 UART: [idev] SUBJECT.KEYID = 7
1,175,960 UART: [idev] UDS.KEYID = 0
1,176,305 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,910 UART: [idev] Erasing UDS.KEYID = 0
1,200,175 UART: [idev] Sha1 KeyId Algorithm
1,208,735 UART: [idev] --
1,209,857 UART: [ldev] ++
1,210,025 UART: [ldev] CDI.KEYID = 6
1,210,388 UART: [ldev] SUBJECT.KEYID = 5
1,210,814 UART: [ldev] AUTHORITY.KEYID = 7
1,211,277 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,187 UART: [ldev] --
1,281,676 UART: [fwproc] Wait for Commands...
1,282,450 UART: [fwproc] Recv command 0x46574c44
1,283,178 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,869 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,054 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 ready_for_fw is high
1,060,523 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,405 >>> mbox cmd response: success
2,702,255 UART:
2,702,271 UART: Running Caliptra FMC ...
2,702,679 UART:
2,702,733 UART: [state] CFI Enabled
2,713,314 UART: [fht] FMC Alias Private Key: 7
2,821,265 UART: [art] Extend RT PCRs Done
2,821,693 UART: [art] Lock RT PCRs Done
2,823,033 UART: [art] Populate DV Done
2,831,322 UART: [fht] FMC Alias Private Key: 7
2,832,280 UART: [art] Derive CDI
2,832,560 UART: [art] Store in in slot 0x4
2,918,485 UART: [art] Derive Key Pair
2,918,845 UART: [art] Store priv key in slot 0x5
2,931,883 UART: [art] Derive Key Pair - Done
2,946,630 UART: [art] Signing Cert with AUTHO
2,947,110 UART: RITY.KEYID = 7
2,962,108 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,873 UART: [art] PUB.X = 91D1850BEDE8466EB5FDF2385D9F32FC3A6B6125FD646344C66C7E913BA3A0FA856A89ABA9F07CD9DC9EE6FCA8C536B7
2,969,662 UART: [art] PUB.Y = 0667D6CDCBF5242FC209FE8F19EC85797E0104F2BE79726F5E893A2ADA7D014767AF517E414D26D3343DB501E02A9681
2,976,598 UART: [art] SIG.R = B2D3DA11855B53C832D5C7939194EA91E94FF7B6474DFEB7DE978B000B65ECA6243DD1B502A4DB47B2E88DA9630FAC4A
2,983,353 UART: [art] SIG.S = 37788A314F8D0053495C9517F11A835816839D19E13559C717D65FD2E51349BC41095CBED308674D9E912D98FF9BD78B
3,006,962 UART: Caliptra RT
3,007,215 UART: [state] CFI Enabled
3,115,016 UART: [rt] RT listening for mailbox commands...
3,115,679 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,534 UART: [rt]cmd =0x46504c54, len=4
3,146,827 >>> mbox cmd response data (8 bytes)
3,147,150 UART: [rt] FIPS self test
3,147,478 UART: [kat] ++
3,147,630 UART: [kat] sha1
3,151,882 UART: [kat] SHA2-256
3,153,904 UART: [kat] SHA2-384
3,156,685 UART: [kat] SHA2-512-ACC
3,158,612 UART: [kat] ECC-384
3,168,718 UART: [kat] HMAC-384Kdf
3,169,676 UART: Fatal Error: 0x90030001
3,171,226 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,171,231 >>> mbox cmd response: failed
3,171,231 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,171,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,269 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,641,815 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
893,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,460 UART: [kat] ++
897,612 UART: [kat] sha1
901,964 UART: [kat] SHA2-256
903,904 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
922,735 UART: [kat] LMS
1,171,063 UART: [kat] --
1,172,110 UART: [cold-reset] ++
1,172,482 UART: [fht] FHT @ 0x50003400
1,175,047 UART: [idev] ++
1,175,215 UART: [idev] CDI.KEYID = 6
1,175,575 UART: [idev] SUBJECT.KEYID = 7
1,175,999 UART: [idev] UDS.KEYID = 0
1,176,344 ready_for_fw is high
1,176,344 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,875 UART: [idev] Erasing UDS.KEYID = 0
1,200,956 UART: [idev] Sha1 KeyId Algorithm
1,209,316 UART: [idev] --
1,210,326 UART: [ldev] ++
1,210,494 UART: [ldev] CDI.KEYID = 6
1,210,857 UART: [ldev] SUBJECT.KEYID = 5
1,211,283 UART: [ldev] AUTHORITY.KEYID = 7
1,211,746 UART: [ldev] FE.KEYID = 1
1,216,956 UART: [ldev] Erasing FE.KEYID = 1
1,243,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,396 UART: [ldev] --
1,282,661 UART: [fwproc] Wait for Commands...
1,283,235 UART: [fwproc] Recv command 0x46574c44
1,283,963 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,388 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,551 >>> mbox cmd response: success
2,787,649 UART: [afmc] ++
2,787,817 UART: [afmc] CDI.KEYID = 6
2,788,179 UART: [afmc] SUBJECT.KEYID = 7
2,788,604 UART: [afmc] AUTHORITY.KEYID = 5
2,825,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,490 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,103 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,822 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,642 UART: [afmc] --
2,868,644 UART: [cold-reset] --
2,869,362 UART: [state] Locking Datavault
2,870,449 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,053 UART: [state] Locking ICCM
2,871,687 UART: [exit] Launching FMC @ 0x40000130
2,877,016 UART:
2,877,032 UART: Running Caliptra FMC ...
2,877,440 UART:
2,877,583 UART: [state] CFI Enabled
2,887,968 UART: [fht] FMC Alias Private Key: 7
2,995,881 UART: [art] Extend RT PCRs Done
2,996,309 UART: [art] Lock RT PCRs Done
2,997,795 UART: [art] Populate DV Done
3,006,096 UART: [fht] FMC Alias Private Key: 7
3,007,076 UART: [art] Derive CDI
3,007,356 UART: [art] Store in in slot 0x4
3,092,859 UART: [art] Derive Key Pair
3,093,219 UART: [art] Store priv key in slot 0x5
3,106,141 UART: [art] Derive Key Pair - Done
3,120,929 UART: [art] Signing Cert with AUTHO
3,121,409 UART: RITY.KEYID = 7
3,136,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,282 UART: [art] PUB.X = BFE15582BF7A56F4CB4595132D5652E0DB0D4AFE8D0F2974DC29F3DC31CF8F522EA79E5A291CF70BCC2C60D6072C4E8C
3,144,060 UART: [art] PUB.Y = A113B7D6B6E74E929290F6B9EDFC4A5F6EADE3385970AF221E7A82C0FCD5B9C51741650A5C1A8C26B5C376B9E7F8A586
3,151,021 UART: [art] SIG.R = 669E44AB1130082D9EB12CE45A9949C40DF920A138898E7451DC29C0CA518EC14EA31BABB4778E892553E035C757F83A
3,157,787 UART: [art] SIG.S = 7455DC88FE5CA287E6DE6A19FEDACAF919731EC2079E1944AAA7FA22D01570466BC68C86C9611B2A57971D6D648CB9AF
3,181,997 UART: Caliptra RT
3,182,342 UART: [state] CFI Enabled
3,290,429 UART: [rt] RT listening for mailbox commands...
3,291,092 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,843 UART: [rt]cmd =0x46504c54, len=4
3,322,060 >>> mbox cmd response data (8 bytes)
3,322,373 UART: [rt] FIPS self test
3,322,701 UART: [kat] ++
3,322,853 UART: [kat] sha1
3,326,949 UART: [kat] SHA2-256
3,328,971 UART: [kat] SHA2-384
3,331,658 UART: [kat] SHA2-512-ACC
3,333,585 UART: [kat] ECC-384
3,343,433 UART: [kat] HMAC-384Kdf
3,344,579 UART: Fatal Error: 0x90030001
3,346,129 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,134 >>> mbox cmd response: failed
3,346,134 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
893,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,380 UART: [kat] ++
897,532 UART: [kat] sha1
901,652 UART: [kat] SHA2-256
903,592 UART: [kat] SHA2-384
906,269 UART: [kat] SHA2-512-ACC
908,170 UART: [kat] ECC-384
917,995 UART: [kat] HMAC-384Kdf
922,683 UART: [kat] LMS
1,171,011 UART: [kat] --
1,172,034 UART: [cold-reset] ++
1,172,486 UART: [fht] FHT @ 0x50003400
1,175,143 UART: [idev] ++
1,175,311 UART: [idev] CDI.KEYID = 6
1,175,671 UART: [idev] SUBJECT.KEYID = 7
1,176,095 UART: [idev] UDS.KEYID = 0
1,176,440 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,837 UART: [idev] Erasing UDS.KEYID = 0
1,200,714 UART: [idev] Sha1 KeyId Algorithm
1,208,950 UART: [idev] --
1,210,220 UART: [ldev] ++
1,210,388 UART: [ldev] CDI.KEYID = 6
1,210,751 UART: [ldev] SUBJECT.KEYID = 5
1,211,177 UART: [ldev] AUTHORITY.KEYID = 7
1,211,640 UART: [ldev] FE.KEYID = 1
1,217,080 UART: [ldev] Erasing FE.KEYID = 1
1,244,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,188 UART: [ldev] --
1,283,481 UART: [fwproc] Wait for Commands...
1,284,233 UART: [fwproc] Recv command 0x46574c44
1,284,961 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,880 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,184 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,561 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,020 ready_for_fw is high
1,060,020 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,400 >>> mbox cmd response: success
2,701,906 UART:
2,701,922 UART: Running Caliptra FMC ...
2,702,330 UART:
2,702,473 UART: [state] CFI Enabled
2,713,420 UART: [fht] FMC Alias Private Key: 7
2,821,213 UART: [art] Extend RT PCRs Done
2,821,641 UART: [art] Lock RT PCRs Done
2,823,247 UART: [art] Populate DV Done
2,831,492 UART: [fht] FMC Alias Private Key: 7
2,832,606 UART: [art] Derive CDI
2,832,886 UART: [art] Store in in slot 0x4
2,918,673 UART: [art] Derive Key Pair
2,919,033 UART: [art] Store priv key in slot 0x5
2,931,455 UART: [art] Derive Key Pair - Done
2,946,295 UART: [art] Signing Cert with AUTHO
2,946,775 UART: RITY.KEYID = 7
2,961,875 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,640 UART: [art] PUB.X = AA01C107D318D4EA4E9EDE766C8E5977A7220A37254E3427C20A9492A7CF57A0C70C5245EBA0AEA532AEE66C2FFF92E1
2,969,409 UART: [art] PUB.Y = D67B812426AB47D436C07B5B75752819A2696DB5E12D85FFC6254F779D0A0D2E456708479A76A0B6C57DD6C202358040
2,976,341 UART: [art] SIG.R = 4DAF0A650C7FB7B82C738D675A69C993580C4C970E38AB7CF615F2F132F90EA3C10E1ACC7549118BAD2E7BE192EC1FB6
2,983,109 UART: [art] SIG.S = BF6B0109B10730AC33A7AC0DA4C823CDFFAE37A2AD71F4D0B6560320D199333AA914B0094FE6CA115CD9339B80755FE4
3,006,950 UART: Caliptra RT
3,007,295 UART: [state] CFI Enabled
3,114,522 UART: [rt] RT listening for mailbox commands...
3,115,185 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,098 UART: [rt]cmd =0x46504c54, len=4
3,146,399 >>> mbox cmd response data (8 bytes)
3,146,536 UART: [rt] FIPS self test
3,146,864 UART: [kat] ++
3,147,016 UART: [kat] sha1
3,151,196 UART: [kat] SHA2-256
3,153,218 UART: [kat] SHA2-384
3,156,101 UART: [kat] SHA2-512-ACC
3,158,028 UART: [kat] ECC-384
3,168,340 UART: [kat] HMAC-384Kdf
3,169,318 UART: Fatal Error: 0x90030001
3,170,868 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,873 >>> mbox cmd response: failed
3,170,873 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,482 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,182 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
891,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,519 UART: [kat] ++
895,671 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
916,384 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,633 UART: [fht] FHT @ 0x50003400
1,173,065 UART: [idev] ++
1,173,233 UART: [idev] CDI.KEYID = 6
1,173,594 UART: [idev] SUBJECT.KEYID = 7
1,174,019 UART: [idev] UDS.KEYID = 0
1,174,365 ready_for_fw is high
1,174,365 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,937 UART: [idev] Erasing UDS.KEYID = 0
1,198,727 UART: [idev] Sha1 KeyId Algorithm
1,207,501 UART: [idev] --
1,208,584 UART: [ldev] ++
1,208,752 UART: [ldev] CDI.KEYID = 6
1,209,116 UART: [ldev] SUBJECT.KEYID = 5
1,209,543 UART: [ldev] AUTHORITY.KEYID = 7
1,210,006 UART: [ldev] FE.KEYID = 1
1,215,188 UART: [ldev] Erasing FE.KEYID = 1
1,241,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,832 UART: [ldev] --
1,281,274 UART: [fwproc] Wait for Commands...
1,281,989 UART: [fwproc] Recv command 0x46574c44
1,282,722 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,216 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,588 >>> mbox cmd response: success
2,787,761 UART: [afmc] ++
2,787,929 UART: [afmc] CDI.KEYID = 6
2,788,292 UART: [afmc] SUBJECT.KEYID = 7
2,788,718 UART: [afmc] AUTHORITY.KEYID = 5
2,824,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,308 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,037 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,639 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,408 UART: [afmc] --
2,867,326 UART: [cold-reset] --
2,868,344 UART: [state] Locking Datavault
2,869,235 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,839 UART: [state] Locking ICCM
2,870,471 UART: [exit] Launching FMC @ 0x40000130
2,875,800 UART:
2,875,816 UART: Running Caliptra FMC ...
2,876,224 UART:
2,876,278 UART: [state] CFI Enabled
2,886,773 UART: [fht] FMC Alias Private Key: 7
2,994,584 UART: [art] Extend RT PCRs Done
2,995,012 UART: [art] Lock RT PCRs Done
2,996,402 UART: [art] Populate DV Done
3,004,469 UART: [fht] FMC Alias Private Key: 7
3,005,649 UART: [art] Derive CDI
3,005,929 UART: [art] Store in in slot 0x4
3,091,454 UART: [art] Derive Key Pair
3,091,814 UART: [art] Store priv key in slot 0x5
3,104,874 UART: [art] Derive Key Pair - Done
3,119,560 UART: [art] Signing Cert with AUTHO
3,120,040 UART: RITY.KEYID = 7
3,135,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,769 UART: [art] PUB.X = 1E8636C0B8321A92BDE891B12ADA3C652E1F49756A06BD5C755947E9BEFE0F39824F21CAD84A2826C4C466309A90ED14
3,142,539 UART: [art] PUB.Y = 2FDF73030A532BB92E9DAA9BD4E4B79E325ED30943949CD3CFC88995B6197AD9A81CBF00BE8E06C0F1AAFC3E10103B6E
3,149,475 UART: [art] SIG.R = 5EB2DE3215C6E7542894337C9DECD580CF7C2BD8C132FD81D3911F98FCE364F6D142F5AE9B39A9DFF1A9A89792ED54AB
3,156,263 UART: [art] SIG.S = DD46475E4A49337C52877975800E062EE86F661489274CFC941D8698FE94665BF922C5547B58181592589ADF648505E9
3,180,079 UART: Caliptra RT
3,180,332 UART: [state] CFI Enabled
3,288,309 UART: [rt] RT listening for mailbox commands...
3,288,972 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,147 UART: [rt]cmd =0x46504c54, len=4
3,320,278 >>> mbox cmd response data (8 bytes)
3,320,601 UART: [rt] FIPS self test
3,320,929 UART: [kat] ++
3,321,081 UART: [kat] sha1
3,325,401 UART: [kat] SHA2-256
3,327,423 UART: [kat] SHA2-384
3,330,356 UART: [kat] SHA2-512-ACC
3,332,283 UART: [kat] ECC-384
3,342,683 UART: [kat] HMAC-384Kdf
3,343,661 UART: Fatal Error: 0x90030001
3,345,211 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,345,216 >>> mbox cmd response: failed
3,345,216 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,345,221 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,790 UART: [kat] LMS
1,169,102 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,317 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,174,419 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,195 UART: [idev] Erasing UDS.KEYID = 0
1,199,333 UART: [idev] Sha1 KeyId Algorithm
1,208,125 UART: [idev] --
1,209,148 UART: [ldev] ++
1,209,316 UART: [ldev] CDI.KEYID = 6
1,209,680 UART: [ldev] SUBJECT.KEYID = 5
1,210,107 UART: [ldev] AUTHORITY.KEYID = 7
1,210,570 UART: [ldev] FE.KEYID = 1
1,215,854 UART: [ldev] Erasing FE.KEYID = 1
1,242,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,642 UART: [ldev] --
1,282,064 UART: [fwproc] Wait for Commands...
1,282,691 UART: [fwproc] Recv command 0x46574c44
1,283,424 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,427 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,736 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,944 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,202 ready_for_fw is high
1,056,202 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,244 >>> mbox cmd response: success
2,697,846 UART:
2,697,862 UART: Running Caliptra FMC ...
2,698,270 UART:
2,698,324 UART: [state] CFI Enabled
2,708,777 UART: [fht] FMC Alias Private Key: 7
2,817,152 UART: [art] Extend RT PCRs Done
2,817,580 UART: [art] Lock RT PCRs Done
2,818,936 UART: [art] Populate DV Done
2,827,011 UART: [fht] FMC Alias Private Key: 7
2,828,073 UART: [art] Derive CDI
2,828,353 UART: [art] Store in in slot 0x4
2,913,920 UART: [art] Derive Key Pair
2,914,280 UART: [art] Store priv key in slot 0x5
2,926,718 UART: [art] Derive Key Pair - Done
2,941,627 UART: [art] Signing Cert with AUTHO
2,942,107 UART: RITY.KEYID = 7
2,957,275 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,040 UART: [art] PUB.X = F311AD235B3780CAB53932FF748B8E7F9DD2F5DDAEC664EEF7DB2558267F4092CDCA10C9C42966C2EE2D424DA10BAF05
2,964,824 UART: [art] PUB.Y = 73232B9F7D06442097267FE806B1F05744544FD6AEBCDB51A1AA39FDAC5F19FF028A1FC469D14B1554FD6849C953F020
2,971,771 UART: [art] SIG.R = 11C5069FA43D78B627CE50E0E1875B79AFA1F2CF5F1865F734BBE98065EDE1D77FD63C24A9DFAAB4BDFC2148AF67A3E2
2,978,560 UART: [art] SIG.S = F974DB27B9BFDD6672E69FA5F8D677994E9BAEF615EBFBBF59A3CF290B2168F06D6C69D2EC0103C44A89C9E0B929AA89
3,002,258 UART: Caliptra RT
3,002,511 UART: [state] CFI Enabled
3,110,440 UART: [rt] RT listening for mailbox commands...
3,111,103 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,104 UART: [rt]cmd =0x46504c54, len=4
3,142,159 >>> mbox cmd response data (8 bytes)
3,142,462 UART: [rt] FIPS self test
3,142,790 UART: [kat] ++
3,142,942 UART: [kat] sha1
3,147,276 UART: [kat] SHA2-256
3,149,298 UART: [kat] SHA2-384
3,152,201 UART: [kat] SHA2-512-ACC
3,154,128 UART: [kat] ECC-384
3,164,700 UART: [kat] HMAC-384Kdf
3,165,618 UART: Fatal Error: 0x90030001
3,167,168 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,167,173 >>> mbox cmd response: failed
3,167,173 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,167,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,214 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,740 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,272 UART: [kat] SHA2-256
902,212 UART: [kat] SHA2-384
905,039 UART: [kat] SHA2-512-ACC
906,940 UART: [kat] ECC-384
916,453 UART: [kat] HMAC-384Kdf
921,107 UART: [kat] LMS
1,169,419 UART: [kat] --
1,170,458 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,464 UART: [idev] ++
1,173,632 UART: [idev] CDI.KEYID = 6
1,173,993 UART: [idev] SUBJECT.KEYID = 7
1,174,418 UART: [idev] UDS.KEYID = 0
1,174,764 ready_for_fw is high
1,174,764 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,552 UART: [idev] Erasing UDS.KEYID = 0
1,200,112 UART: [idev] Sha1 KeyId Algorithm
1,208,836 UART: [idev] --
1,210,021 UART: [ldev] ++
1,210,189 UART: [ldev] CDI.KEYID = 6
1,210,553 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,603 UART: [ldev] --
1,282,059 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,399 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,724 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,033 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,427 >>> mbox cmd response: success
2,787,478 UART: [afmc] ++
2,787,646 UART: [afmc] CDI.KEYID = 6
2,788,009 UART: [afmc] SUBJECT.KEYID = 7
2,788,435 UART: [afmc] AUTHORITY.KEYID = 5
2,824,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,003 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,732 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,615 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,334 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,121 UART: [afmc] --
2,868,167 UART: [cold-reset] --
2,868,823 UART: [state] Locking Datavault
2,870,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,638 UART: [state] Locking ICCM
2,871,078 UART: [exit] Launching FMC @ 0x40000130
2,876,407 UART:
2,876,423 UART: Running Caliptra FMC ...
2,876,831 UART:
2,876,974 UART: [state] CFI Enabled
2,887,739 UART: [fht] FMC Alias Private Key: 7
2,995,106 UART: [art] Extend RT PCRs Done
2,995,534 UART: [art] Lock RT PCRs Done
2,997,032 UART: [art] Populate DV Done
3,005,263 UART: [fht] FMC Alias Private Key: 7
3,006,229 UART: [art] Derive CDI
3,006,509 UART: [art] Store in in slot 0x4
3,092,344 UART: [art] Derive Key Pair
3,092,704 UART: [art] Store priv key in slot 0x5
3,106,106 UART: [art] Derive Key Pair - Done
3,121,234 UART: [art] Signing Cert with AUTHO
3,121,714 UART: RITY.KEYID = 7
3,136,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,327 UART: [art] PUB.X = 0DAB8B9A4FD7198782DACE33996CFA7FF3F366D1CC94B72DCB954F080F19C74EFA4082463E6DA0064A8FE333FBF5CDD9
3,144,107 UART: [art] PUB.Y = D53EC11AB541D47872C3A05BEF39F091AA434F999ACDB1E609E1F05C97BEF056802FD294931F3D5993AFA82F3C36157F
3,151,064 UART: [art] SIG.R = E538024F31A80B2DD771F296A50F2D19B241823390D3A5C7BF5EAF47F74EF1425C86572755765D6B3518436F59762B53
3,157,817 UART: [art] SIG.S = 2449B5FC1BD21FB88635D5F1C83643EA6BF5138EF676C13252EDFDCF4C277967B92BB56642F1066830DECEC41FB065EE
3,182,119 UART: Caliptra RT
3,182,464 UART: [state] CFI Enabled
3,290,135 UART: [rt] RT listening for mailbox commands...
3,290,798 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,697 UART: [rt]cmd =0x46504c54, len=4
3,321,806 >>> mbox cmd response data (8 bytes)
3,322,049 UART: [rt] FIPS self test
3,322,377 UART: [kat] ++
3,322,529 UART: [kat] sha1
3,326,829 UART: [kat] SHA2-256
3,328,851 UART: [kat] SHA2-384
3,331,782 UART: [kat] SHA2-512-ACC
3,333,709 UART: [kat] ECC-384
3,343,591 UART: [kat] HMAC-384Kdf
3,344,629 UART: Fatal Error: 0x90030001
3,346,179 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,184 >>> mbox cmd response: failed
3,346,184 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,126 UART: [kat] SHA2-256
902,066 UART: [kat] SHA2-384
904,925 UART: [kat] SHA2-512-ACC
906,826 UART: [kat] ECC-384
916,489 UART: [kat] HMAC-384Kdf
921,063 UART: [kat] LMS
1,169,375 UART: [kat] --
1,170,444 UART: [cold-reset] ++
1,171,002 UART: [fht] FHT @ 0x50003400
1,173,630 UART: [idev] ++
1,173,798 UART: [idev] CDI.KEYID = 6
1,174,159 UART: [idev] SUBJECT.KEYID = 7
1,174,584 UART: [idev] UDS.KEYID = 0
1,174,930 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,334 UART: [idev] Erasing UDS.KEYID = 0
1,199,452 UART: [idev] Sha1 KeyId Algorithm
1,208,448 UART: [idev] --
1,209,499 UART: [ldev] ++
1,209,667 UART: [ldev] CDI.KEYID = 6
1,210,031 UART: [ldev] SUBJECT.KEYID = 5
1,210,458 UART: [ldev] AUTHORITY.KEYID = 7
1,210,921 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,927 UART: [fwproc] Wait for Commands...
1,282,630 UART: [fwproc] Recv command 0x46574c44
1,283,363 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,687 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,045 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,203 ready_for_fw is high
1,057,203 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,647 >>> mbox cmd response: success
2,695,565 UART:
2,695,581 UART: Running Caliptra FMC ...
2,695,989 UART:
2,696,132 UART: [state] CFI Enabled
2,706,569 UART: [fht] FMC Alias Private Key: 7
2,814,486 UART: [art] Extend RT PCRs Done
2,814,914 UART: [art] Lock RT PCRs Done
2,816,304 UART: [art] Populate DV Done
2,824,539 UART: [fht] FMC Alias Private Key: 7
2,825,703 UART: [art] Derive CDI
2,825,983 UART: [art] Store in in slot 0x4
2,911,250 UART: [art] Derive Key Pair
2,911,610 UART: [art] Store priv key in slot 0x5
2,924,708 UART: [art] Derive Key Pair - Done
2,939,307 UART: [art] Signing Cert with AUTHO
2,939,787 UART: RITY.KEYID = 7
2,954,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,634 UART: [art] PUB.X = 7BFBCD5885A1AE5899C34BCB11DFEF42F91C288AD7DB477A4C01F75C12AF639FE8BAA68B43CEB9B038F0D1E882954210
2,962,421 UART: [art] PUB.Y = D4880A430602EAA39E494A166DEC637798C46D02F1D7768D7D9C8296ACD93BC7FEF635C83B86C97D8556636803B4BF54
2,969,358 UART: [art] SIG.R = 2997D028360CE1270B660BC158FBCCF990C2C0E1B6A71CF4810479817BC113121ABC5D561AB16164792A17AA8A361A7B
2,976,118 UART: [art] SIG.S = A1868713236644FFB6875644D88465721E5D64C619B024C5C9F7B87AA93F3600F4C50845DE0F1E52E764E0E64DCB7070
2,999,623 UART: Caliptra RT
2,999,968 UART: [state] CFI Enabled
3,108,303 UART: [rt] RT listening for mailbox commands...
3,108,966 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,863 UART: [rt]cmd =0x46504c54, len=4
3,139,892 >>> mbox cmd response data (8 bytes)
3,140,005 UART: [rt] FIPS self test
3,140,333 UART: [kat] ++
3,140,485 UART: [kat] sha1
3,144,491 UART: [kat] SHA2-256
3,146,513 UART: [kat] SHA2-384
3,149,180 UART: [kat] SHA2-512-ACC
3,151,107 UART: [kat] ECC-384
3,161,201 UART: [kat] HMAC-384Kdf
3,162,289 UART: Fatal Error: 0x90030001
3,163,839 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,163,844 >>> mbox cmd response: failed
3,163,844 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,163,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,575 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,829 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
6,000,332 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,144,778 >>> mbox cmd response: failed
6,145,343 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,289,466 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
4,875,881 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,449,892 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
6,009,110 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,153,917 >>> mbox cmd response: failed
6,154,493 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,297,687 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
4,872,349 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,450,117 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
6,313,767 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,458,231 >>> mbox cmd response: failed
6,458,797 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,602,204 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
18,443,154 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,880,114 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
6,308,674 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,453,055 >>> mbox cmd response: failed
6,453,619 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
6,596,977 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
18,447,915 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
31,883,851 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
5,175,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,319,667 >>> mbox cmd response: failed
5,320,251 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,463,993 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,450,478 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,302,858 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,493 writing to cptra_bootfsm_go
5,191,792 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,336,304 >>> mbox cmd response: failed
5,336,872 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,480,683 >>> mbox cmd response: failed
Initializing fuses
989 writing to cptra_bootfsm_go
3,488,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,322,977 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,518 writing to cptra_bootfsm_go
5,524,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,669,227 >>> mbox cmd response: failed
5,669,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,813,371 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
17,840,918 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,579,652 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,083 writing to cptra_bootfsm_go
5,521,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,666,397 >>> mbox cmd response: failed
5,666,981 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,810,708 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
17,848,979 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,595,844 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
5,190,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,334,711 >>> mbox cmd response: failed
5,335,281 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,479,041 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
3,423,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,231,775 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
5,523,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,667,773 >>> mbox cmd response: failed
5,668,347 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,812,071 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
17,831,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,570,514 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,750 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,758 >>> mbox cmd response: failed
827,758 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,723 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,490 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,494 >>> mbox cmd response: failed
827,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,500 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,762 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,657 >>> mbox cmd response: failed
827,657 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,865 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,823 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,831 >>> mbox cmd response: failed
827,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,837 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,372 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,931 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,746 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,754 >>> mbox cmd response: failed
827,754 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,971 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,956 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,368 >>> mbox cmd response: failed
827,368 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,770 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,865 >>> mbox cmd response: failed
827,865 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,871 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,995 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,625 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,633 >>> mbox cmd response: failed
827,633 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,639 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,462 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,759 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,198 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,206 >>> mbox cmd response: failed
827,206 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,901 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,958 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,626 >>> mbox cmd response: failed
827,626 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,313 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,884 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,141 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,149 >>> mbox cmd response: failed
827,149 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
827,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,176 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,855 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,295 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
828,303 >>> mbox cmd response: failed
828,303 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
828,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,066 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,919 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,201 UART:
192,567 UART: Running Caliptra ROM ...
193,663 UART:
193,804 UART: [state] CFI Enabled
262,218 UART: [state] LifecycleState = Unprovisioned
264,146 UART: [state] DebugLocked = No
265,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,181 UART: [kat] SHA2-256
440,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,370 UART: [kat] ++
451,817 UART: [kat] sha1
461,712 UART: [kat] SHA2-256
464,421 UART: [kat] SHA2-384
469,360 UART: [kat] SHA2-512-ACC
471,731 UART: [kat] ECC-384
2,766,804 UART: [kat] HMAC-384Kdf
2,799,519 UART: [kat] LMS
3,989,822 UART: [kat] --
3,996,474 UART: [cold-reset] ++
3,998,558 UART: [fht] Storing FHT @ 0x50003400
4,010,490 UART: [idev] ++
4,011,064 UART: [idev] CDI.KEYID = 6
4,012,137 UART: [idev] SUBJECT.KEYID = 7
4,013,249 UART: [idev] UDS.KEYID = 0
4,014,214 ready_for_fw is high
4,014,425 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,159,109 UART: [idev] Erasing UDS.KEYID = 0
7,345,971 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,054 UART: [idev] --
7,370,518 UART: [ldev] ++
7,371,089 UART: [ldev] CDI.KEYID = 6
7,372,066 UART: [ldev] SUBJECT.KEYID = 5
7,373,287 UART: [ldev] AUTHORITY.KEYID = 7
7,374,518 UART: [ldev] FE.KEYID = 1
7,402,123 UART: [ldev] Erasing FE.KEYID = 1
10,735,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,993 UART: [ldev] --
13,096,532 UART: [fwproc] Waiting for Commands...
13,099,119 UART: [fwproc] Received command 0x46574c44
13,101,360 UART: [fwproc] Received Image of size 114996 bytes
17,166,233 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,906 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,825 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,634,441 >>> mbox cmd response: success
17,638,557 UART: [afmc] ++
17,639,145 UART: [afmc] CDI.KEYID = 6
17,640,030 UART: [afmc] SUBJECT.KEYID = 7
17,641,301 UART: [afmc] AUTHORITY.KEYID = 5
21,010,504 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,211 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,462 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,848 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,699 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,145 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,514 UART: [afmc] --
23,381,758 UART: [cold-reset] --
23,384,976 UART: [state] Locking Datavault
23,389,629 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,331 UART: [state] Locking ICCM
23,393,216 UART: [exit] Launching FMC @ 0x40000130
23,401,608 UART:
23,401,843 UART: Running Caliptra FMC ...
23,402,945 UART:
23,403,107 UART: [state] CFI Enabled
23,471,393 UART: [fht] FMC Alias Private Key: 7
25,809,278 UART: [art] Extend RT PCRs Done
25,810,502 UART: [art] Lock RT PCRs Done
25,812,188 UART: [art] Populate DV Done
25,817,710 UART: [fht] FMC Alias Private Key: 7
25,819,302 UART: [art] Derive CDI
25,820,119 UART: [art] Store in in slot 0x4
25,879,692 UART: [art] Derive Key Pair
25,880,704 UART: [art] Store priv key in slot 0x5
29,173,262 UART: [art] Derive Key Pair - Done
29,186,367 UART: [art] Signing Cert with AUTHO
29,187,704 UART: RITY.KEYID = 7
31,475,935 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,443 UART: [art] PUB.X = 411D21DD9324C73E15B1D547B6DC0A58CB16AAACEC2307149D63E6DCBF47D94DCB9EBC01B9C36CA96BA241042CBB0415
31,484,705 UART: [art] PUB.Y = 594E95EE365FE0BE30B409456089DB5753E6153A2736A576D9E32CCA7E1F36CD82BEFC605C961989632E3A99EE704CEE
31,491,955 UART: [art] SIG.R = 1BDF403A9B9F701ABE85B36E38996B5EAD54E2798A567B0F073861F8BE202965CAF7BF19631E966074903D251D8A9ED6
31,499,331 UART: [art] SIG.S = A9711F5699AB50FD03A91276EE6561904EF6DB742D691712A6E7D65984DFA23594952BA2817A8D715D728387CF84678E
32,804,117 UART: Caliptra RT
32,804,835 UART: [state] CFI Enabled
32,966,650 UART: [rt] RT listening for mailbox commands...
32,968,511 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,998,422 UART: [rt]cmd =0x46504c54, len=4
32,999,958 >>> mbox cmd response data (8 bytes)
33,001,299 UART: [rt] FIPS self test
33,002,249 UART: [kat] ++
33,002,709 UART: [kat] sha1
33,007,062 UART: [kat] SHA2-256
33,009,013 UART: [kat] SHA2-384
33,011,982 UART: [kat] SHA2-512-ACC
33,014,225 UART: [kat] ECC-384
36,281,664 UART: [kat] HMAC-384Kdf
36,288,827 UART: Fatal Error: 0x90030002
36,324,235 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,468,697 >>> mbox cmd response: failed
36,469,351 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,613,560 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,101 UART:
190,395 UART: Running Caliptra ROM ...
191,512 UART:
191,663 UART: [state] CFI Enabled
259,598 UART: [state] LifecycleState = Unprovisioned
261,572 UART: [state] DebugLocked = No
264,031 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,978 UART: [kat] SHA2-256
438,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,227 UART: [kat] ++
449,696 UART: [kat] sha1
459,710 UART: [kat] SHA2-256
462,451 UART: [kat] SHA2-384
469,243 UART: [kat] SHA2-512-ACC
471,643 UART: [kat] ECC-384
2,763,239 UART: [kat] HMAC-384Kdf
2,796,262 UART: [kat] LMS
3,986,536 UART: [kat] --
3,992,534 UART: [cold-reset] ++
3,993,928 UART: [fht] Storing FHT @ 0x50003400
4,006,331 UART: [idev] ++
4,007,104 UART: [idev] CDI.KEYID = 6
4,008,024 UART: [idev] SUBJECT.KEYID = 7
4,009,140 UART: [idev] UDS.KEYID = 0
4,010,663 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,155,079 UART: [idev] Erasing UDS.KEYID = 0
7,343,127 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,755 UART: [idev] --
7,370,455 UART: [ldev] ++
7,371,063 UART: [ldev] CDI.KEYID = 6
7,371,982 UART: [ldev] SUBJECT.KEYID = 5
7,373,199 UART: [ldev] AUTHORITY.KEYID = 7
7,374,433 UART: [ldev] FE.KEYID = 1
7,418,301 UART: [ldev] Erasing FE.KEYID = 1
10,748,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,811 UART: [ldev] --
13,110,238 UART: [fwproc] Waiting for Commands...
13,112,353 UART: [fwproc] Received command 0x46574c44
13,114,566 UART: [fwproc] Received Image of size 114996 bytes
17,169,407 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,720 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,621 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,638,235 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,806,173 ready_for_fw is high
3,806,596 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,908,386 >>> mbox cmd response: success
23,610,411 UART:
23,610,812 UART: Running Caliptra FMC ...
23,611,949 UART:
23,612,114 UART: [state] CFI Enabled
23,678,545 UART: [fht] FMC Alias Private Key: 7
26,016,608 UART: [art] Extend RT PCRs Done
26,017,841 UART: [art] Lock RT PCRs Done
26,019,852 UART: [art] Populate DV Done
26,025,465 UART: [fht] FMC Alias Private Key: 7
26,027,011 UART: [art] Derive CDI
26,027,831 UART: [art] Store in in slot 0x4
26,089,408 UART: [art] Derive Key Pair
26,090,444 UART: [art] Store priv key in slot 0x5
29,383,517 UART: [art] Derive Key Pair - Done
29,396,568 UART: [art] Signing Cert with AUTHO
29,397,868 UART: RITY.KEYID = 7
31,684,475 UART: [art] Erasing AUTHORITY.KEYID = 7
31,685,977 UART: [art] PUB.X = 2753A2C6ABB7F40C02BB326BDA8EB06E2B2024672903FE7AD0948C1E66BBFCA2D108B85A533F2337F8F94F948576B92D
31,693,274 UART: [art] PUB.Y = FA26FBFAB300C0C6691B53FD6A8F02C3207C2A5EF905068359405B502E1694655F3703F9AA9395F2540C8F7B3947C9F7
31,700,423 UART: [art] SIG.R = 8D03C1E042F533063E9C6C0EF4D7B7E2F2BFBBB34E282FF58427D8E7A0DA1A13D1EED84E6B5EAF550BBC37D0553C4D26
31,707,875 UART: [art] SIG.S = C4727E1D33B13016ACC629A88818B9009B9162E06DE0DE3E48894A15A71B750B6C3A4C8526B7E52DC5AD4B2135B3ECFE
33,013,122 UART: Caliptra RT
33,013,827 UART: [state] CFI Enabled
33,174,113 UART: [rt] RT listening for mailbox commands...
33,175,991 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,205,629 UART: [rt]cmd =0x46504c54, len=4
33,207,134 >>> mbox cmd response data (8 bytes)
33,208,481 UART: [rt] FIPS self test
33,209,481 UART: [kat] ++
33,209,941 UART: [kat] sha1
33,214,346 UART: [kat] SHA2-256
33,216,267 UART: [kat] SHA2-384
33,219,187 UART: [kat] SHA2-512-ACC
33,221,436 UART: [kat] ECC-384
36,491,477 UART: [kat] HMAC-384Kdf
36,498,158 UART: Fatal Error: 0x90030002
36,533,398 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,677,833 >>> mbox cmd response: failed
36,678,420 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,822,778 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,802,475 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,877,212 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,498 UART:
192,867 UART: Running Caliptra ROM ...
194,035 UART:
603,555 UART: [state] CFI Enabled
618,589 UART: [state] LifecycleState = Unprovisioned
620,580 UART: [state] DebugLocked = No
622,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,930 UART: [kat] SHA2-256
796,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,267 UART: [kat] ++
807,747 UART: [kat] sha1
817,988 UART: [kat] SHA2-256
820,648 UART: [kat] SHA2-384
826,075 UART: [kat] SHA2-512-ACC
828,452 UART: [kat] ECC-384
3,115,272 UART: [kat] HMAC-384Kdf
3,126,296 UART: [kat] LMS
4,316,366 UART: [kat] --
4,320,530 UART: [cold-reset] ++
4,322,818 UART: [fht] Storing FHT @ 0x50003400
4,334,578 UART: [idev] ++
4,335,139 UART: [idev] CDI.KEYID = 6
4,336,094 UART: [idev] SUBJECT.KEYID = 7
4,337,341 UART: [idev] UDS.KEYID = 0
4,338,260 ready_for_fw is high
4,338,454 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,482,893 UART: [idev] Erasing UDS.KEYID = 0
7,625,612 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,598 UART: [idev] --
7,653,532 UART: [ldev] ++
7,654,141 UART: [ldev] CDI.KEYID = 6
7,655,030 UART: [ldev] SUBJECT.KEYID = 5
7,656,304 UART: [ldev] AUTHORITY.KEYID = 7
7,657,537 UART: [ldev] FE.KEYID = 1
7,669,567 UART: [ldev] Erasing FE.KEYID = 1
10,954,524 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,421 UART: [ldev] --
13,311,714 UART: [fwproc] Waiting for Commands...
13,313,972 UART: [fwproc] Received command 0x46574c44
13,316,152 UART: [fwproc] Received Image of size 114996 bytes
17,378,081 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,623 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,499 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,843,857 >>> mbox cmd response: success
17,847,516 UART: [afmc] ++
17,848,112 UART: [afmc] CDI.KEYID = 6
17,849,041 UART: [afmc] SUBJECT.KEYID = 7
17,850,262 UART: [afmc] AUTHORITY.KEYID = 5
21,165,434 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,772 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,077 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,411 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,250 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,735 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,530 UART: [afmc] --
23,530,530 UART: [cold-reset] --
23,535,415 UART: [state] Locking Datavault
23,540,720 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,471 UART: [state] Locking ICCM
23,544,974 UART: [exit] Launching FMC @ 0x40000130
23,553,367 UART:
23,553,603 UART: Running Caliptra FMC ...
23,554,646 UART:
23,554,793 UART: [state] CFI Enabled
23,562,947 UART: [fht] FMC Alias Private Key: 7
25,893,733 UART: [art] Extend RT PCRs Done
25,894,968 UART: [art] Lock RT PCRs Done
25,896,943 UART: [art] Populate DV Done
25,902,360 UART: [fht] FMC Alias Private Key: 7
25,903,951 UART: [art] Derive CDI
25,904,712 UART: [art] Store in in slot 0x4
25,947,576 UART: [art] Derive Key Pair
25,948,580 UART: [art] Store priv key in slot 0x5
29,190,755 UART: [art] Derive Key Pair - Done
29,203,759 UART: [art] Signing Cert with AUTHO
29,205,068 UART: RITY.KEYID = 7
31,484,221 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,733 UART: [art] PUB.X = DD970B933C17178847F95EF2992EA1A1D89F6CD34371EF8D8040C46CCC22EDBEBE2042532524A7D9E8D3D7D8AAA9B409
31,493,040 UART: [art] PUB.Y = FED970E46A8791549100450DCCEC387650E4424313D338A42BEA18B6238B753649E38F3107CB2D455440B367464022CB
31,500,195 UART: [art] SIG.R = 8BE02EA7BC7B446034EC3DD67F1BDD1E2E4760A2F14247578985480BDBFF446D55D06F0E39F3032B7C649D5AC2876EE6
31,507,604 UART: [art] SIG.S = 26A9ACDBF815F2B92422BD4BB3269146D3688ACB86BA029A1D328CF8678B242429DD4BBA512F72CE4CC4DFC0FDF79FB7
32,812,665 UART: Caliptra RT
32,813,390 UART: [state] CFI Enabled
32,930,674 UART: [rt] RT listening for mailbox commands...
32,932,638 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,962,436 UART: [rt]cmd =0x46504c54, len=4
32,964,233 >>> mbox cmd response data (8 bytes)
32,965,630 UART: [rt] FIPS self test
32,966,567 UART: [kat] ++
32,967,018 UART: [kat] sha1
32,971,533 UART: [kat] SHA2-256
32,973,461 UART: [kat] SHA2-384
32,976,321 UART: [kat] SHA2-512-ACC
32,978,615 UART: [kat] ECC-384
36,221,481 UART: [kat] HMAC-384Kdf
36,226,805 UART: Fatal Error: 0x90030002
36,262,040 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,406,519 >>> mbox cmd response: failed
36,407,198 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,551,598 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,097 UART:
190,391 UART: Running Caliptra ROM ...
191,445 UART:
3,971,796 UART: [state] CFI Enabled
3,986,214 UART: [state] LifecycleState = Unprovisioned
3,988,151 UART: [state] DebugLocked = No
3,989,713 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,995,442 UART: [kat] SHA2-256
4,165,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,175,734 UART: [kat] ++
4,176,280 UART: [kat] sha1
4,185,770 UART: [kat] SHA2-256
4,188,465 UART: [kat] SHA2-384
4,194,345 UART: [kat] SHA2-512-ACC
4,196,696 UART: [kat] ECC-384
6,480,491 UART: [kat] HMAC-384Kdf
6,491,745 UART: [kat] LMS
7,681,869 UART: [kat] --
7,687,045 UART: [cold-reset] ++
7,688,920 UART: [fht] Storing FHT @ 0x50003400
7,701,208 UART: [idev] ++
7,701,772 UART: [idev] CDI.KEYID = 6
7,702,655 UART: [idev] SUBJECT.KEYID = 7
7,703,920 UART: [idev] UDS.KEYID = 0
7,705,479 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
7,849,813 UART: [idev] Erasing UDS.KEYID = 0
10,989,290 UART: [idev] Using Sha1 for KeyId Algorithm
11,009,761 UART: [idev] --
11,014,090 UART: [ldev] ++
11,014,723 UART: [ldev] CDI.KEYID = 6
11,015,639 UART: [ldev] SUBJECT.KEYID = 5
11,016,854 UART: [ldev] AUTHORITY.KEYID = 7
11,018,143 UART: [ldev] FE.KEYID = 1
11,029,335 UART: [ldev] Erasing FE.KEYID = 1
14,320,661 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,610,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,625,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,640,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,654,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,673,667 UART: [ldev] --
16,678,946 UART: [fwproc] Waiting for Commands...
16,682,081 UART: [fwproc] Received command 0x46574c44
16,684,270 UART: [fwproc] Received Image of size 114996 bytes
20,745,560 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,821,161 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,890,025 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
21,210,891 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
4,128,719 ready_for_fw is high
4,129,368 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,101,320 >>> mbox cmd response: success
23,748,633 UART:
23,749,016 UART: Running Caliptra FMC ...
23,750,127 UART:
23,750,284 UART: [state] CFI Enabled
23,758,180 UART: [fht] FMC Alias Private Key: 7
26,089,107 UART: [art] Extend RT PCRs Done
26,090,345 UART: [art] Lock RT PCRs Done
26,091,896 UART: [art] Populate DV Done
26,097,051 UART: [fht] FMC Alias Private Key: 7
26,098,598 UART: [art] Derive CDI
26,099,335 UART: [art] Store in in slot 0x4
26,142,034 UART: [art] Derive Key Pair
26,143,080 UART: [art] Store priv key in slot 0x5
29,385,876 UART: [art] Derive Key Pair - Done
29,398,905 UART: [art] Signing Cert with AUTHO
29,400,213 UART: RITY.KEYID = 7
31,679,179 UART: [art] Erasing AUTHORITY.KEYID = 7
31,680,705 UART: [art] PUB.X = B23298DE0863E585B7904AB183A1BA732154726E7A366018A3FFC0030F6768EEB11A0E2044B5CA4FB15DCA16CF76A3BC
31,687,971 UART: [art] PUB.Y = CAA2AC1D214B6B9DEFF9317B86CE82904357081D512C1940ADB4996FA0FB7F096F3C7BF9C944F0BF5B9B6B8EA9D0EA20
31,695,183 UART: [art] SIG.R = 1A76C34A7F904B89447EC63161F436097F139464F9701DBABCFFCCAF4392877F7C2B2089B6B3C45144AD7F300E159A54
31,702,593 UART: [art] SIG.S = CCAE0F7D7670616FF5A6F5B8376FE70CA532D47EEDB813DE821357A0EAA9986914936202E0F313FD65469CD8510E3982
33,007,721 UART: Caliptra RT
33,008,447 UART: [state] CFI Enabled
33,126,869 UART: [rt] RT listening for mailbox commands...
33,128,720 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,158,800 UART: [rt]cmd =0x46504c54, len=4
33,160,380 >>> mbox cmd response data (8 bytes)
33,161,196 UART: [rt] FIPS self test
33,162,111 UART: [kat] ++
33,162,560 UART: [kat] sha1
33,166,926 UART: [kat] SHA2-256
33,168,876 UART: [kat] SHA2-384
33,172,008 UART: [kat] SHA2-512-ACC
33,174,316 UART: [kat] ECC-384
36,416,987 UART: [kat] HMAC-384Kdf
36,422,410 UART: Fatal Error: 0x90030002
36,457,804 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,602,282 >>> mbox cmd response: failed
36,602,910 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
36,747,157 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
7,314,206 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
21,272,313 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,333 UART:
192,753 UART: Running Caliptra ROM ...
193,900 UART:
194,054 UART: [state] CFI Enabled
262,379 UART: [state] LifecycleState = Unprovisioned
264,302 UART: [state] DebugLocked = No
266,023 UART: [state] WD Timer not started. Device not locked for debugging
269,928 UART: [kat] SHA2-256
449,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,646 UART: [kat] ++
461,184 UART: [kat] sha1
471,997 UART: [kat] SHA2-256
475,001 UART: [kat] SHA2-384
480,571 UART: [kat] SHA2-512-ACC
483,528 UART: [kat] ECC-384
2,929,169 UART: [kat] HMAC-384Kdf
2,950,524 UART: [kat] LMS
3,479,944 UART: [kat] --
3,484,936 UART: [cold-reset] ++
3,487,296 UART: [fht] FHT @ 0x50003400
3,497,568 UART: [idev] ++
3,498,149 UART: [idev] CDI.KEYID = 6
3,499,059 UART: [idev] SUBJECT.KEYID = 7
3,500,243 UART: [idev] UDS.KEYID = 0
3,501,149 ready_for_fw is high
3,501,384 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,646,914 UART: [idev] Erasing UDS.KEYID = 0
6,009,982 UART: [idev] Sha1 KeyId Algorithm
6,033,151 UART: [idev] --
6,037,281 UART: [ldev] ++
6,037,877 UART: [ldev] CDI.KEYID = 6
6,038,793 UART: [ldev] SUBJECT.KEYID = 5
6,039,953 UART: [ldev] AUTHORITY.KEYID = 7
6,041,244 UART: [ldev] FE.KEYID = 1
6,080,413 UART: [ldev] Erasing FE.KEYID = 1
8,583,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,703 UART: [ldev] --
10,392,505 UART: [fwproc] Wait for Commands...
10,394,172 UART: [fwproc] Recv command 0x46574c44
10,396,273 UART: [fwproc] Recv'd Img size: 115304 bytes
13,818,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,656 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,280,753 >>> mbox cmd response: success
14,284,997 UART: [afmc] ++
14,285,583 UART: [afmc] CDI.KEYID = 6
14,286,492 UART: [afmc] SUBJECT.KEYID = 7
14,287,707 UART: [afmc] AUTHORITY.KEYID = 5
16,832,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,384 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,404 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,944 UART: [afmc] --
18,631,708 UART: [cold-reset] --
18,635,513 UART: [state] Locking Datavault
18,640,438 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,115 UART: [state] Locking ICCM
18,644,592 UART: [exit] Launching FMC @ 0x40000130
18,652,995 UART:
18,653,272 UART: Running Caliptra FMC ...
18,654,387 UART:
18,654,552 UART: [state] CFI Enabled
18,713,507 UART: [fht] FMC Alias Private Key: 7
20,477,241 UART: [art] Extend RT PCRs Done
20,478,462 UART: [art] Lock RT PCRs Done
20,480,291 UART: [art] Populate DV Done
20,485,759 UART: [fht] FMC Alias Private Key: 7
20,487,465 UART: [art] Derive CDI
20,488,281 UART: [art] Store in in slot 0x4
20,546,517 UART: [art] Derive Key Pair
20,547,562 UART: [art] Store priv key in slot 0x5
23,010,438 UART: [art] Derive Key Pair - Done
23,023,674 UART: [art] Signing Cert with AUTHO
23,024,989 UART: RITY.KEYID = 7
24,736,354 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,862 UART: [art] PUB.X = 77B0D25C23A382DF1487A876819D1E80B7BCE0EC2A66AB0629E96A56AF97F8669CE606AB3F7CB9F2045CB55FF960C97A
24,745,129 UART: [art] PUB.Y = 1C6AB97D3CDF505B9E1F5E499C156C5BE3F867BE1CCCB8DB21021306DD49158B79616739AE666B94889F4BC49E2D3559
24,752,365 UART: [art] SIG.R = F673444E757A6412E7F909696A514B7AA999C28B1F0CAFE3DDABCDCD0CF7F981801DBCB9049AE3FF638E9AAA35CD57B2
24,759,758 UART: [art] SIG.S = 4D9CD5A1F1E81A3649457C29AD6930F10DE928DECF18625AA03FE11B2747B16A6388820CC32E59D956E4AFDE34E6266B
25,738,327 UART: Caliptra RT
25,739,031 UART: [state] CFI Enabled
25,903,280 UART: [rt] RT listening for mailbox commands...
25,905,129 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,934,800 UART: [rt]cmd =0x46504c54, len=4
25,936,519 >>> mbox cmd response data (8 bytes)
25,937,638 UART: [rt] FIPS self test
25,938,581 UART: [kat] ++
25,939,038 UART: [kat] sha1
25,943,678 UART: [kat] SHA2-256
25,945,558 UART: [kat] SHA2-384
25,948,515 UART: [kat] SHA2-512-ACC
25,950,748 UART: [kat] ECC-384
28,388,230 UART: [kat] HMAC-384Kdf
28,414,420 UART: Fatal Error: 0x90030002
28,449,674 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,594,859 >>> mbox cmd response: failed
28,595,466 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,740,798 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,113 UART:
190,401 UART: Running Caliptra ROM ...
191,459 UART:
191,602 UART: [state] CFI Enabled
258,150 UART: [state] LifecycleState = Unprovisioned
260,019 UART: [state] DebugLocked = No
261,354 UART: [state] WD Timer not started. Device not locked for debugging
265,462 UART: [kat] SHA2-256
444,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,161 UART: [kat] ++
456,606 UART: [kat] sha1
468,560 UART: [kat] SHA2-256
471,565 UART: [kat] SHA2-384
477,366 UART: [kat] SHA2-512-ACC
480,306 UART: [kat] ECC-384
2,942,407 UART: [kat] HMAC-384Kdf
2,964,720 UART: [kat] LMS
3,494,165 UART: [kat] --
3,496,704 UART: [cold-reset] ++
3,497,826 UART: [fht] FHT @ 0x50003400
3,509,974 UART: [idev] ++
3,510,546 UART: [idev] CDI.KEYID = 6
3,511,594 UART: [idev] SUBJECT.KEYID = 7
3,512,716 UART: [idev] UDS.KEYID = 0
3,514,200 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,659,022 UART: [idev] Erasing UDS.KEYID = 0
6,016,403 UART: [idev] Sha1 KeyId Algorithm
6,037,855 UART: [idev] --
6,041,211 UART: [ldev] ++
6,041,786 UART: [ldev] CDI.KEYID = 6
6,042,699 UART: [ldev] SUBJECT.KEYID = 5
6,043,866 UART: [ldev] AUTHORITY.KEYID = 7
6,045,104 UART: [ldev] FE.KEYID = 1
6,072,127 UART: [ldev] Erasing FE.KEYID = 1
8,575,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,359,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,380,181 UART: [ldev] --
10,384,093 UART: [fwproc] Wait for Commands...
10,387,270 UART: [fwproc] Recv command 0x46574c44
10,389,366 UART: [fwproc] Recv'd Img size: 115304 bytes
13,802,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,603 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,354 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,265,231 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
3,362,466 ready_for_fw is high
3,362,885 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,040,087 >>> mbox cmd response: success
18,335,398 UART:
18,335,804 UART: Running Caliptra FMC ...
18,336,926 UART:
18,337,099 UART: [state] CFI Enabled
18,402,973 UART: [fht] FMC Alias Private Key: 7
20,167,061 UART: [art] Extend RT PCRs Done
20,168,288 UART: [art] Lock RT PCRs Done
20,170,108 UART: [art] Populate DV Done
20,175,659 UART: [fht] FMC Alias Private Key: 7
20,177,257 UART: [art] Derive CDI
20,178,004 UART: [art] Store in in slot 0x4
20,235,759 UART: [art] Derive Key Pair
20,236,809 UART: [art] Store priv key in slot 0x5
22,700,034 UART: [art] Derive Key Pair - Done
22,713,035 UART: [art] Signing Cert with AUTHO
22,714,348 UART: RITY.KEYID = 7
24,425,612 UART: [art] Erasing AUTHORITY.KEYID = 7
24,427,101 UART: [art] PUB.X = 6A97D01F63113B1515C9DF5F7704949D014BA8FC7994E412D242C62E79BBC7D941F4FD513B34DC39316C674170AE375E
24,434,368 UART: [art] PUB.Y = A9547428D81CD8ADBF2AA0E3C7741D84812DC11A1A334FF1A77B75752069C04E977FC640BB37D2753250903A5E9612CD
24,441,584 UART: [art] SIG.R = 75C6BD6B88C78B5FA2AAC9DF8893FC0795099619BAFA2B2BAEAF33C26A70DE8BC313D309A99208402CC45A03A27E4B73
24,448,996 UART: [art] SIG.S = 29E16E75B8EF9D2495443B64843482182D0A5B7B166A9BC53388605249EE49132847DB6B96FFE57544CB9BFFAA80BC7F
25,427,135 UART: Caliptra RT
25,427,857 UART: [state] CFI Enabled
25,593,150 UART: [rt] RT listening for mailbox commands...
25,594,995 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,624,877 UART: [rt]cmd =0x46504c54, len=4
25,626,434 >>> mbox cmd response data (8 bytes)
25,627,305 UART: [rt] FIPS self test
25,628,255 UART: [kat] ++
25,628,702 UART: [kat] sha1
25,633,051 UART: [kat] SHA2-256
25,634,925 UART: [kat] SHA2-384
25,637,967 UART: [kat] SHA2-512-ACC
25,640,230 UART: [kat] ECC-384
28,079,980 UART: [kat] HMAC-384Kdf
28,106,092 UART: Fatal Error: 0x90030002
28,141,309 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,286,189 >>> mbox cmd response: failed
28,286,852 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,431,638 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,353,443 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,040,225 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
192,729 UART:
193,121 UART: Running Caliptra ROM ...
194,255 UART:
603,715 UART: [state] CFI Enabled
615,332 UART: [state] LifecycleState = Unprovisioned
617,289 UART: [state] DebugLocked = No
619,404 UART: [state] WD Timer not started. Device not locked for debugging
622,376 UART: [kat] SHA2-256
801,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,062 UART: [kat] ++
813,609 UART: [kat] sha1
825,770 UART: [kat] SHA2-256
828,795 UART: [kat] SHA2-384
834,302 UART: [kat] SHA2-512-ACC
837,243 UART: [kat] ECC-384
3,280,128 UART: [kat] HMAC-384Kdf
3,293,912 UART: [kat] LMS
3,823,388 UART: [kat] --
3,829,802 UART: [cold-reset] ++
3,831,604 UART: [fht] FHT @ 0x50003400
3,842,159 UART: [idev] ++
3,842,728 UART: [idev] CDI.KEYID = 6
3,843,641 UART: [idev] SUBJECT.KEYID = 7
3,844,764 UART: [idev] UDS.KEYID = 0
3,845,730 ready_for_fw is high
3,845,962 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,990,842 UART: [idev] Erasing UDS.KEYID = 0
6,314,636 UART: [idev] Sha1 KeyId Algorithm
6,337,019 UART: [idev] --
6,341,066 UART: [ldev] ++
6,341,639 UART: [ldev] CDI.KEYID = 6
6,342,545 UART: [ldev] SUBJECT.KEYID = 5
6,343,760 UART: [ldev] AUTHORITY.KEYID = 7
6,345,003 UART: [ldev] FE.KEYID = 1
6,356,631 UART: [ldev] Erasing FE.KEYID = 1
8,826,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,593 UART: [ldev] --
10,618,588 UART: [fwproc] Wait for Commands...
10,620,183 UART: [fwproc] Recv command 0x46574c44
10,622,289 UART: [fwproc] Recv'd Img size: 115304 bytes
14,039,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,120,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,189,147 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,511,378 >>> mbox cmd response: success
14,515,574 UART: [afmc] ++
14,516,158 UART: [afmc] CDI.KEYID = 6
14,517,227 UART: [afmc] SUBJECT.KEYID = 7
14,518,330 UART: [afmc] AUTHORITY.KEYID = 5
17,021,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,743,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,745,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,761,109 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,777,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,793,036 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,815,669 UART: [afmc] --
18,819,155 UART: [cold-reset] --
18,822,928 UART: [state] Locking Datavault
18,828,833 UART: [state] Locking PCR0, PCR1 and PCR31
18,830,477 UART: [state] Locking ICCM
18,831,490 UART: [exit] Launching FMC @ 0x40000130
18,839,884 UART:
18,840,122 UART: Running Caliptra FMC ...
18,841,222 UART:
18,841,386 UART: [state] CFI Enabled
18,849,704 UART: [fht] FMC Alias Private Key: 7
20,605,915 UART: [art] Extend RT PCRs Done
20,607,151 UART: [art] Lock RT PCRs Done
20,608,862 UART: [art] Populate DV Done
20,614,275 UART: [fht] FMC Alias Private Key: 7
20,615,977 UART: [art] Derive CDI
20,616,713 UART: [art] Store in in slot 0x4
20,659,356 UART: [art] Derive Key Pair
20,660,390 UART: [art] Store priv key in slot 0x5
23,086,423 UART: [art] Derive Key Pair - Done
23,099,534 UART: [art] Signing Cert with AUTHO
23,100,877 UART: RITY.KEYID = 7
24,806,576 UART: [art] Erasing AUTHORITY.KEYID = 7
24,808,088 UART: [art] PUB.X = 976BE499D0767C95A8ADE61F619137044A48E9B8B24A3652C62F50953C9893D1021AA8FAB94ADCD9499EFB21BE319731
24,815,359 UART: [art] PUB.Y = E9D386B80AF4BB08F4E056913B851718E17876EF0A0BE0E7F3C6CD11F3A6334B73FD885FC36D2ACF395FD92BD448FC7D
24,822,606 UART: [art] SIG.R = FC62FEEC229465BE8DA733B18E9793AAE006B3DF2ED0FDFF30723FF68B9F657DE846600992E914C72295A1B162B013AF
24,830,006 UART: [art] SIG.S = 4E43CCE948F7A0356A9EBE05F97ECFCCC29231DA08455419FBBC8F7BDB568B56C2E9F9FC293495D163B7F0115AF8479A
25,808,504 UART: Caliptra RT
25,809,219 UART: [state] CFI Enabled
25,926,586 UART: [rt] RT listening for mailbox commands...
25,928,442 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,958,127 UART: [rt]cmd =0x46504c54, len=4
25,959,701 >>> mbox cmd response data (8 bytes)
25,961,149 UART: [rt] FIPS self test
25,962,110 UART: [kat] ++
25,962,559 UART: [kat] sha1
25,966,832 UART: [kat] SHA2-256
25,968,764 UART: [kat] SHA2-384
25,971,775 UART: [kat] SHA2-512-ACC
25,974,009 UART: [kat] ECC-384
28,401,996 UART: [kat] HMAC-384Kdf
28,407,519 UART: Fatal Error: 0x90030002
28,442,696 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,587,550 >>> mbox cmd response: failed
28,588,169 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,732,953 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,003 UART:
190,301 UART: Running Caliptra ROM ...
191,345 UART:
11,785,419 UART: [state] CFI Enabled
11,795,987 UART: [state] LifecycleState = Unprovisioned
11,797,856 UART: [state] DebugLocked = No
11,799,372 UART: [state] WD Timer not started. Device not locked for debugging
11,802,188 UART: [kat] SHA2-256
11,981,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
11,992,864 UART: [kat] ++
11,993,319 UART: [kat] sha1
12,005,391 UART: [kat] SHA2-256
12,008,421 UART: [kat] SHA2-384
12,014,360 UART: [kat] SHA2-512-ACC
12,017,354 UART: [kat] ECC-384
14,458,661 UART: [kat] HMAC-384Kdf
14,470,935 UART: [kat] LMS
15,000,424 UART: [kat] --
15,004,346 UART: [cold-reset] ++
15,006,307 UART: [fht] FHT @ 0x50003400
15,017,667 UART: [idev] ++
15,018,229 UART: [idev] CDI.KEYID = 6
15,019,138 UART: [idev] SUBJECT.KEYID = 7
15,020,350 UART: [idev] UDS.KEYID = 0
15,021,879 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
15,166,631 UART: [idev] Erasing UDS.KEYID = 0
17,494,239 UART: [idev] Sha1 KeyId Algorithm
17,517,705 UART: [idev] --
17,522,558 UART: [ldev] ++
17,523,132 UART: [ldev] CDI.KEYID = 6
17,524,010 UART: [ldev] SUBJECT.KEYID = 5
17,525,225 UART: [ldev] AUTHORITY.KEYID = 7
17,526,460 UART: [ldev] FE.KEYID = 1
17,538,778 UART: [ldev] Erasing FE.KEYID = 1
20,014,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,734,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,750,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,766,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,782,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,802,892 UART: [ldev] --
21,807,351 UART: [fwproc] Wait for Commands...
21,809,386 UART: [fwproc] Recv command 0x46574c44
21,811,437 UART: [fwproc] Recv'd Img size: 115304 bytes
25,221,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,290,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,359,379 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,681,596 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,344 writing to cptra_bootfsm_go
3,697,972 ready_for_fw is high
3,698,642 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,286,303 >>> mbox cmd response: success
18,539,587 UART:
18,539,976 UART: Running Caliptra FMC ...
18,541,129 UART:
18,541,311 UART: [state] CFI Enabled
18,549,128 UART: [fht] FMC Alias Private Key: 7
20,306,070 UART: [art] Extend RT PCRs Done
20,307,306 UART: [art] Lock RT PCRs Done
20,308,670 UART: [art] Populate DV Done
20,314,229 UART: [fht] FMC Alias Private Key: 7
20,315,822 UART: [art] Derive CDI
20,316,584 UART: [art] Store in in slot 0x4
20,359,237 UART: [art] Derive Key Pair
20,360,272 UART: [art] Store priv key in slot 0x5
22,786,638 UART: [art] Derive Key Pair - Done
22,799,537 UART: [art] Signing Cert with AUTHO
22,801,029 UART: RITY.KEYID = 7
24,506,204 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,721 UART: [art] PUB.X = 59BEA29F845B89F7A18627FC67CF0D13133632038CFD32BD74C78CC5A102918DD043EC89767DEFA7BBA863BA0A697A27
24,514,999 UART: [art] PUB.Y = FB6A5A27C9B684B66F99F27FDC9D6916D89EDEACAF559935912215D5EEB7014AE07C2C79F46A85DAE01935A9C5A50892
24,522,245 UART: [art] SIG.R = 0D8DF965BACA7955EF4B57AE666341E5A917883E8F693E7EEEE170476C997868ACAE5F1DB44F4D2B980C2464FF351466
24,529,667 UART: [art] SIG.S = C457FF27A579588B4084628ECBFED5D4A3DBD98AB78B046933C2061F4FA07C5F9A9C889D54584B8718698AA34924992E
25,508,854 UART: Caliptra RT
25,509,563 UART: [state] CFI Enabled
25,626,539 UART: [rt] RT listening for mailbox commands...
25,628,409 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,657,925 UART: [rt]cmd =0x46504c54, len=4
25,659,453 >>> mbox cmd response data (8 bytes)
25,660,719 UART: [rt] FIPS self test
25,661,660 UART: [kat] ++
25,662,111 UART: [kat] sha1
25,666,565 UART: [kat] SHA2-256
25,668,496 UART: [kat] SHA2-384
25,671,345 UART: [kat] SHA2-512-ACC
25,673,618 UART: [kat] ECC-384
28,101,043 UART: [kat] HMAC-384Kdf
28,106,495 UART: Fatal Error: 0x90030002
28,141,733 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,286,596 >>> mbox cmd response: failed
28,287,233 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,431,939 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
15,188,999 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,778,142 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,437,891 ready_for_fw is high
3,438,551 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,747,152 >>> mbox cmd response: success
19,025,761 UART:
19,026,155 UART: Running Caliptra FMC ...
19,027,286 UART:
19,027,445 UART: [state] CFI Enabled
19,094,963 UART: [fht] FMC Alias Private Key: 7
20,858,796 UART: [art] Extend RT PCRs Done
20,860,016 UART: [art] Lock RT PCRs Done
20,861,520 UART: [art] Populate DV Done
20,866,957 UART: [fht] FMC Alias Private Key: 7
20,868,613 UART: [art] Derive CDI
20,869,427 UART: [art] Store in in slot 0x4
20,928,367 UART: [art] Derive Key Pair
20,929,411 UART: [art] Store priv key in slot 0x5
23,391,380 UART: [art] Derive Key Pair - Done
23,404,439 UART: [art] Signing Cert with AUTHO
23,405,775 UART: RITY.KEYID = 7
25,119,566 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,388 UART: [art] PUB.X = 02AE728875077403DC20AC7064F94766B2426DBCBB8DBA98D743F0685BD9A58FA9E73F35950ECA586A22E81DA0E77C1B
25,128,335 UART: [art] PUB.Y = 8DD10F57F47C165FD53E9EF6F818B7588FB92D1F4AF463C13983ACD46DDB751A7B3BB7E27BDBF21E62ABED2C209C19A9
25,135,619 UART: [art] SIG.R = D1391ED1F211F2B13CBA3B4E71E7EB36F15F92CC13058ED95D0F53AF3303FD5080AF691D74E4818417E14439E042309A
25,143,017 UART: [art] SIG.S = 5F6A7AFF31225B374EA9427E9A1F32FDDE5A676767F335FF1A90D8C7BA7D57D048B4792247D0DADE6A8BCEEC258AFEC3
26,121,258 UART: Caliptra RT
26,121,957 UART: [state] CFI Enabled
26,287,787 UART: [rt] RT listening for mailbox commands...
26,289,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,319,489 UART: [rt]cmd =0x46504c54, len=4
26,321,226 >>> mbox cmd response data (8 bytes)
26,322,409 UART: [rt] FIPS self test
26,323,348 UART: [kat] ++
26,323,799 UART: [kat] sha1
26,328,092 UART: [kat] SHA2-256
26,329,981 UART: [kat] SHA2-384
26,332,944 UART: [kat] SHA2-512-ACC
26,335,214 UART: [kat] ECC-384
28,773,161 UART: [kat] HMAC-384Kdf
28,778,653 UART: Fatal Error: 0x90030002
28,813,847 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,959,082 >>> mbox cmd response: failed
28,959,782 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,104,593 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
3,432,017 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,719,722 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,757,249 ready_for_fw is high
3,757,862 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,979,277 >>> mbox cmd response: success
19,228,710 UART:
19,229,101 UART: Running Caliptra FMC ...
19,230,217 UART:
19,230,389 UART: [state] CFI Enabled
19,238,118 UART: [fht] FMC Alias Private Key: 7
20,995,144 UART: [art] Extend RT PCRs Done
20,996,370 UART: [art] Lock RT PCRs Done
20,997,860 UART: [art] Populate DV Done
21,003,227 UART: [fht] FMC Alias Private Key: 7
21,004,721 UART: [art] Derive CDI
21,005,460 UART: [art] Store in in slot 0x4
21,048,546 UART: [art] Derive Key Pair
21,049,587 UART: [art] Store priv key in slot 0x5
23,476,100 UART: [art] Derive Key Pair - Done
23,488,883 UART: [art] Signing Cert with AUTHO
23,490,180 UART: RITY.KEYID = 7
25,195,759 UART: [art] Erasing AUTHORITY.KEYID = 7
25,197,265 UART: [art] PUB.X = C4391D0FDCC4388BC63D548804A33F78682F44F206F053227C205531F99062D10B5DDDB7F04B57467224CA3110551547
25,204,564 UART: [art] PUB.Y = 0C554C8C4E375E9DF56C3431E03AC89CC4D0DC246BB885BCFACD7E301B1E1B695E9FFF7F265CEF92FA0D82E7A53F8499
25,211,806 UART: [art] SIG.R = C1214237B66A67A6F601DD8C0AFA40D192647C22EE218FB18E8BA172C688B13CBA95A9B994D60147F69810128DAA76B5
25,219,171 UART: [art] SIG.S = 42FCA857C14DF0B86BECADF7099D63CCB7965D71DAF72DC0A0431132529CF5C67D0CAD59473B49533A7247BB22385E47
26,197,724 UART: Caliptra RT
26,198,445 UART: [state] CFI Enabled
26,315,717 UART: [rt] RT listening for mailbox commands...
26,317,563 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,347,088 UART: [rt]cmd =0x46504c54, len=4
26,348,542 >>> mbox cmd response data (8 bytes)
26,349,639 UART: [rt] FIPS self test
26,350,588 UART: [kat] ++
26,351,040 UART: [kat] sha1
26,355,213 UART: [kat] SHA2-256
26,357,152 UART: [kat] SHA2-384
26,360,165 UART: [kat] SHA2-512-ACC
26,362,383 UART: [kat] ECC-384
28,789,945 UART: [kat] HMAC-384Kdf
28,795,719 UART: Fatal Error: 0x90030002
28,831,123 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,976,285 >>> mbox cmd response: failed
28,976,924 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,121,661 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
14,561,736 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,780,978 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,517 UART: [kat] SHA2-256
892,455 UART: [kat] SHA2-384
895,080 UART: [kat] SHA2-512-ACC
896,981 UART: [kat] ECC-384
902,612 UART: [kat] HMAC-384Kdf
907,198 UART: [kat] LMS
1,475,394 UART: [kat] --
1,476,441 UART: [cold-reset] ++
1,476,971 UART: [fht] Storing FHT @ 0x50003400
1,479,750 UART: [idev] ++
1,479,918 UART: [idev] CDI.KEYID = 6
1,480,278 UART: [idev] SUBJECT.KEYID = 7
1,480,702 UART: [idev] UDS.KEYID = 0
1,481,047 ready_for_fw is high
1,481,047 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,146 UART: [idev] Erasing UDS.KEYID = 0
1,506,088 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,690 UART: [idev] --
1,515,635 UART: [ldev] ++
1,515,803 UART: [ldev] CDI.KEYID = 6
1,516,166 UART: [ldev] SUBJECT.KEYID = 5
1,516,592 UART: [ldev] AUTHORITY.KEYID = 7
1,517,055 UART: [ldev] FE.KEYID = 1
1,522,105 UART: [ldev] Erasing FE.KEYID = 1
1,546,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,680 UART: [ldev] --
1,586,035 UART: [fwproc] Waiting for Commands...
1,586,658 UART: [fwproc] Received command 0x46574c44
1,587,449 UART: [fwproc] Received Image of size 115304 bytes
2,897,286 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,706 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,058 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,365 >>> mbox cmd response: success
3,092,607 UART: [afmc] ++
3,092,775 UART: [afmc] CDI.KEYID = 6
3,093,137 UART: [afmc] SUBJECT.KEYID = 7
3,093,562 UART: [afmc] AUTHORITY.KEYID = 5
3,128,589 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,425 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,205 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,933 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,818 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,508 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,529 UART: [afmc] --
3,172,635 UART: [cold-reset] --
3,173,475 UART: [state] Locking Datavault
3,174,806 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,410 UART: [state] Locking ICCM
3,175,926 UART: [exit] Launching FMC @ 0x40000130
3,181,255 UART:
3,181,271 UART: Running Caliptra FMC ...
3,181,679 UART:
3,181,733 UART: [state] CFI Enabled
3,191,864 UART: [fht] FMC Alias Private Key: 7
3,299,383 UART: [art] Extend RT PCRs Done
3,299,811 UART: [art] Lock RT PCRs Done
3,301,553 UART: [art] Populate DV Done
3,309,852 UART: [fht] FMC Alias Private Key: 7
3,310,848 UART: [art] Derive CDI
3,311,128 UART: [art] Store in in slot 0x4
3,396,573 UART: [art] Derive Key Pair
3,396,933 UART: [art] Store priv key in slot 0x5
3,409,339 UART: [art] Derive Key Pair - Done
3,423,866 UART: [art] Signing Cert with AUTHO
3,424,346 UART: RITY.KEYID = 7
3,439,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,385 UART: [art] PUB.X = 341F4AC63F7BCB1E84A91698C3713DBB10E7D7CD8A05EF479C1DB28D8C81CEF90D0B4CFC1F81C488B2465628ACBD3564
3,447,164 UART: [art] PUB.Y = 99CA0B07FB1BA35A8958D34C8863FAFA9C7A8FDD151E89BFC194F53D0D790F4DF8B73DC468E46B286179599E14101B2B
3,454,114 UART: [art] SIG.R = 126BD4CD47718F946D23ABDB5E9627DEEFE279872E20AD64346D112D7CF5FA436F0C9217127CF9CC0A05FCBCCCA751EF
3,460,895 UART: [art] SIG.S = C9C8429952EBF670E9C49A448A32C99056F6159ADBD5372FDF1E390CD5ADD5DE91AC411ED775AEC6B2D2FF2AC9C1C594
3,484,635 UART: Caliptra RT
3,484,888 UART: [state] CFI Enabled
3,593,757 UART: [rt] RT listening for mailbox commands...
3,594,420 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,885 UART: [rt]cmd =0x46504c54, len=4
3,624,852 >>> mbox cmd response data (8 bytes)
3,625,095 UART: [rt] FIPS self test
3,625,423 UART: [kat] ++
3,625,575 UART: [kat] sha1
3,629,797 UART: [kat] SHA2-256
3,631,819 UART: [kat] SHA2-384
3,634,658 UART: [kat] SHA2-512-ACC
3,636,585 UART: [kat] ECC-384
3,646,901 UART: [kat] HMAC-384Kdf
3,651,345 UART: Fatal Error: 0x90030002
3,652,895 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,652,900 >>> mbox cmd response: failed
3,652,900 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,652,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,670 UART: [state] LifecycleState = Unprovisioned
86,325 UART: [state] DebugLocked = No
86,837 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,555 UART: [kat] SHA2-256
882,486 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,601 UART: [kat] ++
886,753 UART: [kat] sha1
891,039 UART: [kat] SHA2-256
892,977 UART: [kat] SHA2-384
895,626 UART: [kat] SHA2-512-ACC
897,527 UART: [kat] ECC-384
903,004 UART: [kat] HMAC-384Kdf
907,560 UART: [kat] LMS
1,475,756 UART: [kat] --
1,476,773 UART: [cold-reset] ++
1,477,285 UART: [fht] Storing FHT @ 0x50003400
1,480,040 UART: [idev] ++
1,480,208 UART: [idev] CDI.KEYID = 6
1,480,568 UART: [idev] SUBJECT.KEYID = 7
1,480,992 UART: [idev] UDS.KEYID = 0
1,481,337 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,842 UART: [idev] Erasing UDS.KEYID = 0
1,505,548 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,100 UART: [idev] --
1,514,955 UART: [ldev] ++
1,515,123 UART: [ldev] CDI.KEYID = 6
1,515,486 UART: [ldev] SUBJECT.KEYID = 5
1,515,912 UART: [ldev] AUTHORITY.KEYID = 7
1,516,375 UART: [ldev] FE.KEYID = 1
1,521,767 UART: [ldev] Erasing FE.KEYID = 1
1,546,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,728 UART: [ldev] --
1,586,007 UART: [fwproc] Waiting for Commands...
1,586,680 UART: [fwproc] Received command 0x46574c44
1,587,471 UART: [fwproc] Received Image of size 115304 bytes
2,896,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,740 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,092 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,541 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,217 ready_for_fw is high
1,362,217 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,363 >>> mbox cmd response: success
3,001,767 UART:
3,001,783 UART: Running Caliptra FMC ...
3,002,191 UART:
3,002,245 UART: [state] CFI Enabled
3,012,784 UART: [fht] FMC Alias Private Key: 7
3,121,293 UART: [art] Extend RT PCRs Done
3,121,721 UART: [art] Lock RT PCRs Done
3,123,211 UART: [art] Populate DV Done
3,131,426 UART: [fht] FMC Alias Private Key: 7
3,132,394 UART: [art] Derive CDI
3,132,674 UART: [art] Store in in slot 0x4
3,218,033 UART: [art] Derive Key Pair
3,218,393 UART: [art] Store priv key in slot 0x5
3,231,473 UART: [art] Derive Key Pair - Done
3,246,443 UART: [art] Signing Cert with AUTHO
3,246,923 UART: RITY.KEYID = 7
3,261,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,638 UART: [art] PUB.X = 7092009A3267097D09AAD98ECA8EB344E80ED0862FA5377CD6D762772B02EA3D80CF88AD43A51DD3E74DA85F9D773D9D
3,269,384 UART: [art] PUB.Y = D87F75584B1E4419A61789966E36EFD00C8BAC5CF689BD4EBA2B42D01C43F5F5CD56548B47FBBBDAD254A31C13EEFEF6
3,276,353 UART: [art] SIG.R = FE5CA775CF86FA4D392CDBC7CC2315B0DA3F1097293B90344E7EDFED1AB60B5741B93D3EA6CBB878697E5B473A14764F
3,283,138 UART: [art] SIG.S = F4CA0A51603EB2A832F369461F66A7DE1FD63F262004869AB122575E78D88C834821AD28F467928B05D864E467EFEC31
3,307,262 UART: Caliptra RT
3,307,515 UART: [state] CFI Enabled
3,415,185 UART: [rt] RT listening for mailbox commands...
3,415,848 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,699 UART: [rt]cmd =0x46504c54, len=4
3,446,840 >>> mbox cmd response data (8 bytes)
3,447,059 UART: [rt] FIPS self test
3,447,387 UART: [kat] ++
3,447,539 UART: [kat] sha1
3,451,607 UART: [kat] SHA2-256
3,453,629 UART: [kat] SHA2-384
3,456,490 UART: [kat] SHA2-512-ACC
3,458,417 UART: [kat] ECC-384
3,468,695 UART: [kat] HMAC-384Kdf
3,473,105 UART: Fatal Error: 0x90030002
3,474,655 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,474,660 >>> mbox cmd response: failed
3,474,660 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,474,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,955 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,149 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,409 UART: [state] LifecycleState = Unprovisioned
85,064 UART: [state] DebugLocked = No
85,666 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,340 UART: [kat] SHA2-256
881,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,386 UART: [kat] ++
885,538 UART: [kat] sha1
889,644 UART: [kat] SHA2-256
891,582 UART: [kat] SHA2-384
894,523 UART: [kat] SHA2-512-ACC
896,424 UART: [kat] ECC-384
902,145 UART: [kat] HMAC-384Kdf
906,589 UART: [kat] LMS
1,474,785 UART: [kat] --
1,475,432 UART: [cold-reset] ++
1,475,806 UART: [fht] Storing FHT @ 0x50003400
1,478,679 UART: [idev] ++
1,478,847 UART: [idev] CDI.KEYID = 6
1,479,207 UART: [idev] SUBJECT.KEYID = 7
1,479,631 UART: [idev] UDS.KEYID = 0
1,479,976 ready_for_fw is high
1,479,976 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,871 UART: [idev] Erasing UDS.KEYID = 0
1,504,799 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,489 UART: [idev] --
1,514,400 UART: [ldev] ++
1,514,568 UART: [ldev] CDI.KEYID = 6
1,514,931 UART: [ldev] SUBJECT.KEYID = 5
1,515,357 UART: [ldev] AUTHORITY.KEYID = 7
1,515,820 UART: [ldev] FE.KEYID = 1
1,521,064 UART: [ldev] Erasing FE.KEYID = 1
1,546,365 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,405 UART: [ldev] --
1,585,858 UART: [fwproc] Waiting for Commands...
1,586,499 UART: [fwproc] Received command 0x46574c44
1,587,290 UART: [fwproc] Received Image of size 115304 bytes
2,897,405 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,017 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,808 >>> mbox cmd response: success
3,092,050 UART: [afmc] ++
3,092,218 UART: [afmc] CDI.KEYID = 6
3,092,580 UART: [afmc] SUBJECT.KEYID = 7
3,093,005 UART: [afmc] AUTHORITY.KEYID = 5
3,128,486 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,880 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,660 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,388 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,273 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,963 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,830 UART: [afmc] --
3,171,724 UART: [cold-reset] --
3,172,626 UART: [state] Locking Datavault
3,173,717 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,321 UART: [state] Locking ICCM
3,174,791 UART: [exit] Launching FMC @ 0x40000130
3,180,120 UART:
3,180,136 UART: Running Caliptra FMC ...
3,180,544 UART:
3,180,687 UART: [state] CFI Enabled
3,190,994 UART: [fht] FMC Alias Private Key: 7
3,297,877 UART: [art] Extend RT PCRs Done
3,298,305 UART: [art] Lock RT PCRs Done
3,299,859 UART: [art] Populate DV Done
3,308,202 UART: [fht] FMC Alias Private Key: 7
3,309,140 UART: [art] Derive CDI
3,309,420 UART: [art] Store in in slot 0x4
3,394,987 UART: [art] Derive Key Pair
3,395,347 UART: [art] Store priv key in slot 0x5
3,408,443 UART: [art] Derive Key Pair - Done
3,423,457 UART: [art] Signing Cert with AUTHO
3,423,937 UART: RITY.KEYID = 7
3,439,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,910 UART: [art] PUB.X = 60C476EB6FFB4F8457DF981A973863C3FDAACA45049E37DFC67AA67124E30BF98E3AD838B2B61CD072566AD971B4F260
3,446,686 UART: [art] PUB.Y = E80467681CC9C09FA69D5CB69A0A9F2F3CE48EC72E468632FDBE34103DF4F7DAD981E3F04D8A0D9ABD2751DBC9635693
3,453,643 UART: [art] SIG.R = AE62DF3C6AEE6FA7649995E31E947358C4605308237BB409623E141CB76049503DDA89F27FB76CF1D519FC118029185B
3,460,405 UART: [art] SIG.S = 8F945F2B8EE280F6F37F81F03274DF1E358F7C85D5BEE4451C0D6DAC60C97B9DD290DB12B16C1BB861E718E9EA4C1836
3,483,883 UART: Caliptra RT
3,484,228 UART: [state] CFI Enabled
3,592,396 UART: [rt] RT listening for mailbox commands...
3,593,059 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,812 UART: [rt]cmd =0x46504c54, len=4
3,623,955 >>> mbox cmd response data (8 bytes)
3,624,144 UART: [rt] FIPS self test
3,624,472 UART: [kat] ++
3,624,624 UART: [kat] sha1
3,628,848 UART: [kat] SHA2-256
3,630,870 UART: [kat] SHA2-384
3,633,751 UART: [kat] SHA2-512-ACC
3,635,678 UART: [kat] ECC-384
3,645,764 UART: [kat] HMAC-384Kdf
3,650,600 UART: Fatal Error: 0x90030002
3,652,150 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,652,155 >>> mbox cmd response: failed
3,652,155 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,652,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
87,032 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,616 UART: [kat] SHA2-256
882,547 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,662 UART: [kat] ++
886,814 UART: [kat] sha1
891,090 UART: [kat] SHA2-256
893,028 UART: [kat] SHA2-384
895,761 UART: [kat] SHA2-512-ACC
897,662 UART: [kat] ECC-384
903,025 UART: [kat] HMAC-384Kdf
907,629 UART: [kat] LMS
1,475,825 UART: [kat] --
1,476,688 UART: [cold-reset] ++
1,477,066 UART: [fht] Storing FHT @ 0x50003400
1,479,885 UART: [idev] ++
1,480,053 UART: [idev] CDI.KEYID = 6
1,480,413 UART: [idev] SUBJECT.KEYID = 7
1,480,837 UART: [idev] UDS.KEYID = 0
1,481,182 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,569 UART: [idev] Erasing UDS.KEYID = 0
1,504,797 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,451 UART: [idev] --
1,514,496 UART: [ldev] ++
1,514,664 UART: [ldev] CDI.KEYID = 6
1,515,027 UART: [ldev] SUBJECT.KEYID = 5
1,515,453 UART: [ldev] AUTHORITY.KEYID = 7
1,515,916 UART: [ldev] FE.KEYID = 1
1,521,302 UART: [ldev] Erasing FE.KEYID = 1
1,546,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,075 UART: [ldev] --
1,586,558 UART: [fwproc] Waiting for Commands...
1,587,207 UART: [fwproc] Received command 0x46574c44
1,587,998 UART: [fwproc] Received Image of size 115304 bytes
2,897,181 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,457 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,809 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,080 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,446 ready_for_fw is high
1,362,446 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,988 >>> mbox cmd response: success
3,003,504 UART:
3,003,520 UART: Running Caliptra FMC ...
3,003,928 UART:
3,004,071 UART: [state] CFI Enabled
3,015,066 UART: [fht] FMC Alias Private Key: 7
3,122,665 UART: [art] Extend RT PCRs Done
3,123,093 UART: [art] Lock RT PCRs Done
3,124,483 UART: [art] Populate DV Done
3,132,540 UART: [fht] FMC Alias Private Key: 7
3,133,488 UART: [art] Derive CDI
3,133,768 UART: [art] Store in in slot 0x4
3,219,757 UART: [art] Derive Key Pair
3,220,117 UART: [art] Store priv key in slot 0x5
3,234,001 UART: [art] Derive Key Pair - Done
3,248,865 UART: [art] Signing Cert with AUTHO
3,249,345 UART: RITY.KEYID = 7
3,264,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,410 UART: [art] PUB.X = 9649ED72A4ABACC2501A3C5B2828481C3B8B82C265026786DBDD0658BEBFE12FE8AFD50796A166AAC960C39238952059
3,272,177 UART: [art] PUB.Y = 705F0BAA4423F09BA12005F7A59DAFB93F1DE93C071761AD98C0E4D813283E0F2AB96F4E4A384B8902909F5E7456D03E
3,279,118 UART: [art] SIG.R = B627889CD869BFFB13DF153DCC9E3B2842B0C7A6F6DC0BE88BAE9D4B88E96C6D2623009D3EF912A722FC25F3F2086FC6
3,285,878 UART: [art] SIG.S = D7556395185D44813C684C8C1B59AA70766E58F8D7532CE2E2939B1837D4E5BA1C7941128273B186AE95E41B7DAE2197
3,309,801 UART: Caliptra RT
3,310,146 UART: [state] CFI Enabled
3,418,132 UART: [rt] RT listening for mailbox commands...
3,418,795 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,318 UART: [rt]cmd =0x46504c54, len=4
3,449,325 >>> mbox cmd response data (8 bytes)
3,449,562 UART: [rt] FIPS self test
3,449,890 UART: [kat] ++
3,450,042 UART: [kat] sha1
3,454,350 UART: [kat] SHA2-256
3,456,372 UART: [kat] SHA2-384
3,459,245 UART: [kat] SHA2-512-ACC
3,461,172 UART: [kat] ECC-384
3,471,546 UART: [kat] HMAC-384Kdf
3,476,342 UART: Fatal Error: 0x90030002
3,477,892 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,477,897 >>> mbox cmd response: failed
3,477,897 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,477,902 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,296 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,118 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
893,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,399 UART: [kat] ++
897,551 UART: [kat] sha1
901,687 UART: [kat] SHA2-256
903,627 UART: [kat] SHA2-384
906,222 UART: [kat] SHA2-512-ACC
908,123 UART: [kat] ECC-384
917,938 UART: [kat] HMAC-384Kdf
922,478 UART: [kat] LMS
1,170,806 UART: [kat] --
1,171,527 UART: [cold-reset] ++
1,171,967 UART: [fht] FHT @ 0x50003400
1,174,728 UART: [idev] ++
1,174,896 UART: [idev] CDI.KEYID = 6
1,175,256 UART: [idev] SUBJECT.KEYID = 7
1,175,680 UART: [idev] UDS.KEYID = 0
1,176,025 ready_for_fw is high
1,176,025 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,600 UART: [idev] Erasing UDS.KEYID = 0
1,200,505 UART: [idev] Sha1 KeyId Algorithm
1,209,083 UART: [idev] --
1,210,251 UART: [ldev] ++
1,210,419 UART: [ldev] CDI.KEYID = 6
1,210,782 UART: [ldev] SUBJECT.KEYID = 5
1,211,208 UART: [ldev] AUTHORITY.KEYID = 7
1,211,671 UART: [ldev] FE.KEYID = 1
1,216,785 UART: [ldev] Erasing FE.KEYID = 1
1,243,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,147 UART: [ldev] --
1,282,450 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,886 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,193 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,497 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,738 >>> mbox cmd response: success
2,787,760 UART: [afmc] ++
2,787,928 UART: [afmc] CDI.KEYID = 6
2,788,290 UART: [afmc] SUBJECT.KEYID = 7
2,788,715 UART: [afmc] AUTHORITY.KEYID = 5
2,823,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,431 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,044 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,763 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,613 UART: [afmc] --
2,866,745 UART: [cold-reset] --
2,867,821 UART: [state] Locking Datavault
2,869,124 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,728 UART: [state] Locking ICCM
2,870,342 UART: [exit] Launching FMC @ 0x40000130
2,875,671 UART:
2,875,687 UART: Running Caliptra FMC ...
2,876,095 UART:
2,876,149 UART: [state] CFI Enabled
2,886,790 UART: [fht] FMC Alias Private Key: 7
2,995,131 UART: [art] Extend RT PCRs Done
2,995,559 UART: [art] Lock RT PCRs Done
2,997,327 UART: [art] Populate DV Done
3,005,312 UART: [fht] FMC Alias Private Key: 7
3,006,442 UART: [art] Derive CDI
3,006,722 UART: [art] Store in in slot 0x4
3,092,485 UART: [art] Derive Key Pair
3,092,845 UART: [art] Store priv key in slot 0x5
3,106,149 UART: [art] Derive Key Pair - Done
3,120,755 UART: [art] Signing Cert with AUTHO
3,121,235 UART: RITY.KEYID = 7
3,136,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,070 UART: [art] PUB.X = A88B7971495E3856B0C145D02EC7B9EE072A71D216E3385F92A3EF68AA360B385E35CCA4D0CD0A81915C28E2DA02F0DF
3,143,838 UART: [art] PUB.Y = 1B9EB1669EEA40AB291C52D51FD09A52E2883158C14787AC4D11D5946E13FC2E9CC4D569F1ACA08E7545D43DDA4359A0
3,150,798 UART: [art] SIG.R = C2B58509EB8852421D1DA2205AD2D426B141F206A66B19B733B1CD149CB7FD8EEBBD09AFB6C8921A8B5462DA94C3CF08
3,157,570 UART: [art] SIG.S = EF8D5FC1518C1FBF921685D129EB63D14FCBCBCFF4A76B5346726B18829B6EFFDB89B3282F5082DB248D2A790EB55E31
3,180,580 UART: Caliptra RT
3,180,833 UART: [state] CFI Enabled
3,287,847 UART: [rt] RT listening for mailbox commands...
3,288,510 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,511 UART: [rt]cmd =0x46504c54, len=4
3,319,670 >>> mbox cmd response data (8 bytes)
3,319,987 UART: [rt] FIPS self test
3,320,315 UART: [kat] ++
3,320,467 UART: [kat] sha1
3,324,609 UART: [kat] SHA2-256
3,326,631 UART: [kat] SHA2-384
3,329,600 UART: [kat] SHA2-512-ACC
3,331,527 UART: [kat] ECC-384
3,341,721 UART: [kat] HMAC-384Kdf
3,346,183 UART: Fatal Error: 0x90030002
3,347,733 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,347,738 >>> mbox cmd response: failed
3,347,738 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,347,743 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
893,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,533 UART: [kat] ++
897,685 UART: [kat] sha1
902,019 UART: [kat] SHA2-256
903,959 UART: [kat] SHA2-384
906,694 UART: [kat] SHA2-512-ACC
908,595 UART: [kat] ECC-384
918,356 UART: [kat] HMAC-384Kdf
922,936 UART: [kat] LMS
1,171,264 UART: [kat] --
1,172,337 UART: [cold-reset] ++
1,172,829 UART: [fht] FHT @ 0x50003400
1,175,546 UART: [idev] ++
1,175,714 UART: [idev] CDI.KEYID = 6
1,176,074 UART: [idev] SUBJECT.KEYID = 7
1,176,498 UART: [idev] UDS.KEYID = 0
1,176,843 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,296 UART: [idev] Erasing UDS.KEYID = 0
1,201,295 UART: [idev] Sha1 KeyId Algorithm
1,209,841 UART: [idev] --
1,210,833 UART: [ldev] ++
1,211,001 UART: [ldev] CDI.KEYID = 6
1,211,364 UART: [ldev] SUBJECT.KEYID = 5
1,211,790 UART: [ldev] AUTHORITY.KEYID = 7
1,212,253 UART: [ldev] FE.KEYID = 1
1,217,339 UART: [ldev] Erasing FE.KEYID = 1
1,243,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,719 UART: [ldev] --
1,283,080 UART: [fwproc] Wait for Commands...
1,283,724 UART: [fwproc] Recv command 0x46574c44
1,284,452 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,013 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,204 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,767 ready_for_fw is high
1,059,767 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,193 >>> mbox cmd response: success
2,701,889 UART:
2,701,905 UART: Running Caliptra FMC ...
2,702,313 UART:
2,702,367 UART: [state] CFI Enabled
2,712,768 UART: [fht] FMC Alias Private Key: 7
2,820,687 UART: [art] Extend RT PCRs Done
2,821,115 UART: [art] Lock RT PCRs Done
2,822,373 UART: [art] Populate DV Done
2,830,726 UART: [fht] FMC Alias Private Key: 7
2,831,856 UART: [art] Derive CDI
2,832,136 UART: [art] Store in in slot 0x4
2,917,801 UART: [art] Derive Key Pair
2,918,161 UART: [art] Store priv key in slot 0x5
2,930,657 UART: [art] Derive Key Pair - Done
2,945,675 UART: [art] Signing Cert with AUTHO
2,946,155 UART: RITY.KEYID = 7
2,960,819 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,584 UART: [art] PUB.X = 7F2813E6C8391447D124D6C04FCA38A4F430534B612C4E0DA21FE2066A43CECFF6F2EFB1780B27F89ED8E9BA5ACF7ADB
2,968,365 UART: [art] PUB.Y = B831F1100BBF54A77C46AD65E46E46C8F7CAF030DBA294360C008D1161C8F2D2AF4256AC9408867F65B3A8D9EB75A4CE
2,975,296 UART: [art] SIG.R = 8F6A9141A42D0707285A2C62CC3D1CE858D39B3D5E2714F55C9BD59A27445A3AC1D8F3A256DD02161C7ED60833BD7C6C
2,982,062 UART: [art] SIG.S = 6CC0732D169370D63E9E86A6B1694951DA1BE117BB0748678596B931A2C8FCFBBE88B64C93CC5DDD75B3D10CE83AAB95
3,005,931 UART: Caliptra RT
3,006,184 UART: [state] CFI Enabled
3,114,885 UART: [rt] RT listening for mailbox commands...
3,115,548 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,325 UART: [rt]cmd =0x46504c54, len=4
3,146,460 >>> mbox cmd response data (8 bytes)
3,146,671 UART: [rt] FIPS self test
3,146,999 UART: [kat] ++
3,147,151 UART: [kat] sha1
3,151,477 UART: [kat] SHA2-256
3,153,499 UART: [kat] SHA2-384
3,156,556 UART: [kat] SHA2-512-ACC
3,158,483 UART: [kat] ECC-384
3,168,633 UART: [kat] HMAC-384Kdf
3,173,045 UART: Fatal Error: 0x90030002
3,174,595 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,174,600 >>> mbox cmd response: failed
3,174,600 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,174,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,211 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,642,275 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
893,317 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,442 UART: [kat] ++
897,594 UART: [kat] sha1
901,940 UART: [kat] SHA2-256
903,880 UART: [kat] SHA2-384
906,573 UART: [kat] SHA2-512-ACC
908,474 UART: [kat] ECC-384
918,377 UART: [kat] HMAC-384Kdf
922,971 UART: [kat] LMS
1,171,299 UART: [kat] --
1,171,902 UART: [cold-reset] ++
1,172,288 UART: [fht] FHT @ 0x50003400
1,174,945 UART: [idev] ++
1,175,113 UART: [idev] CDI.KEYID = 6
1,175,473 UART: [idev] SUBJECT.KEYID = 7
1,175,897 UART: [idev] UDS.KEYID = 0
1,176,242 ready_for_fw is high
1,176,242 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,949 UART: [idev] Erasing UDS.KEYID = 0
1,201,166 UART: [idev] Sha1 KeyId Algorithm
1,209,676 UART: [idev] --
1,210,828 UART: [ldev] ++
1,210,996 UART: [ldev] CDI.KEYID = 6
1,211,359 UART: [ldev] SUBJECT.KEYID = 5
1,211,785 UART: [ldev] AUTHORITY.KEYID = 7
1,212,248 UART: [ldev] FE.KEYID = 1
1,217,654 UART: [ldev] Erasing FE.KEYID = 1
1,243,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,672 UART: [ldev] --
1,283,155 UART: [fwproc] Wait for Commands...
1,283,947 UART: [fwproc] Recv command 0x46574c44
1,284,675 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,748 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,135 >>> mbox cmd response: success
2,788,381 UART: [afmc] ++
2,788,549 UART: [afmc] CDI.KEYID = 6
2,788,911 UART: [afmc] SUBJECT.KEYID = 7
2,789,336 UART: [afmc] AUTHORITY.KEYID = 5
2,825,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,606 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,388 UART: [afmc] --
2,868,370 UART: [cold-reset] --
2,869,208 UART: [state] Locking Datavault
2,870,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,981 UART: [state] Locking ICCM
2,871,593 UART: [exit] Launching FMC @ 0x40000130
2,876,922 UART:
2,876,938 UART: Running Caliptra FMC ...
2,877,346 UART:
2,877,489 UART: [state] CFI Enabled
2,888,030 UART: [fht] FMC Alias Private Key: 7
2,996,129 UART: [art] Extend RT PCRs Done
2,996,557 UART: [art] Lock RT PCRs Done
2,997,903 UART: [art] Populate DV Done
3,006,126 UART: [fht] FMC Alias Private Key: 7
3,007,148 UART: [art] Derive CDI
3,007,428 UART: [art] Store in in slot 0x4
3,093,291 UART: [art] Derive Key Pair
3,093,651 UART: [art] Store priv key in slot 0x5
3,106,985 UART: [art] Derive Key Pair - Done
3,122,314 UART: [art] Signing Cert with AUTHO
3,122,794 UART: RITY.KEYID = 7
3,137,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,485 UART: [art] PUB.X = 5AA158AB729EB01FA2E90833A900A66ECFFAAA0A246B81BD9DC57761824E8381379BCB59B0C0F6F10BFF0FDC9D678C48
3,145,239 UART: [art] PUB.Y = 1FD82CC6CBDE63D4D20B8902B716599199C986493217A5D49B72EE8B9F454AF9A4FB9C5E6A3F1CC38580A59F441CCE00
3,152,171 UART: [art] SIG.R = 02EAD604B4E3E43C02BC4108FDA350B5488376C8C8E7C1648FE2441B476CCB826132A47BE2F2DBB66BB14380B32529DB
3,158,937 UART: [art] SIG.S = 9CB24F6EF378E47DC12FB878417A7FB21F7CE1E9D867732AD8AFF60520AEA91358DA70B3ECBB938EA23D56546CF23128
3,182,937 UART: Caliptra RT
3,183,282 UART: [state] CFI Enabled
3,291,573 UART: [rt] RT listening for mailbox commands...
3,292,236 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,173 UART: [rt]cmd =0x46504c54, len=4
3,323,374 >>> mbox cmd response data (8 bytes)
3,323,585 UART: [rt] FIPS self test
3,323,913 UART: [kat] ++
3,324,065 UART: [kat] sha1
3,328,265 UART: [kat] SHA2-256
3,330,287 UART: [kat] SHA2-384
3,333,006 UART: [kat] SHA2-512-ACC
3,334,933 UART: [kat] ECC-384
3,345,213 UART: [kat] HMAC-384Kdf
3,349,965 UART: Fatal Error: 0x90030002
3,351,515 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,351,520 >>> mbox cmd response: failed
3,351,520 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,351,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
893,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,496 UART: [kat] ++
897,648 UART: [kat] sha1
902,082 UART: [kat] SHA2-256
904,022 UART: [kat] SHA2-384
906,749 UART: [kat] SHA2-512-ACC
908,650 UART: [kat] ECC-384
918,643 UART: [kat] HMAC-384Kdf
923,223 UART: [kat] LMS
1,171,551 UART: [kat] --
1,172,486 UART: [cold-reset] ++
1,173,004 UART: [fht] FHT @ 0x50003400
1,175,699 UART: [idev] ++
1,175,867 UART: [idev] CDI.KEYID = 6
1,176,227 UART: [idev] SUBJECT.KEYID = 7
1,176,651 UART: [idev] UDS.KEYID = 0
1,176,996 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,577 UART: [idev] Erasing UDS.KEYID = 0
1,201,906 UART: [idev] Sha1 KeyId Algorithm
1,210,298 UART: [idev] --
1,211,342 UART: [ldev] ++
1,211,510 UART: [ldev] CDI.KEYID = 6
1,211,873 UART: [ldev] SUBJECT.KEYID = 5
1,212,299 UART: [ldev] AUTHORITY.KEYID = 7
1,212,762 UART: [ldev] FE.KEYID = 1
1,218,198 UART: [ldev] Erasing FE.KEYID = 1
1,244,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,738 UART: [ldev] --
1,284,199 UART: [fwproc] Wait for Commands...
1,284,943 UART: [fwproc] Recv command 0x46574c44
1,285,671 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,100 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,404 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,591 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,634 ready_for_fw is high
1,061,634 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,641,596 >>> mbox cmd response: success
2,704,214 UART:
2,704,230 UART: Running Caliptra FMC ...
2,704,638 UART:
2,704,781 UART: [state] CFI Enabled
2,715,536 UART: [fht] FMC Alias Private Key: 7
2,824,135 UART: [art] Extend RT PCRs Done
2,824,563 UART: [art] Lock RT PCRs Done
2,825,969 UART: [art] Populate DV Done
2,834,258 UART: [fht] FMC Alias Private Key: 7
2,835,434 UART: [art] Derive CDI
2,835,714 UART: [art] Store in in slot 0x4
2,921,325 UART: [art] Derive Key Pair
2,921,685 UART: [art] Store priv key in slot 0x5
2,935,077 UART: [art] Derive Key Pair - Done
2,949,877 UART: [art] Signing Cert with AUTHO
2,950,357 UART: RITY.KEYID = 7
2,966,127 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,892 UART: [art] PUB.X = 98497B15B8F1C011A77ED55A66BFBDE3E5D16D78690E9D292D18EF6E5B8A215EED7D86898BF7CC8FF87A3BBB2CF686C1
2,973,679 UART: [art] PUB.Y = 016E4D1D9A16A9F9D6349A061602CA1A57A74934F116D40B0DBF3BE2BAB80497A9758A0CA8C4EF9CBD96A85C5027AEF4
2,980,622 UART: [art] SIG.R = E5D5ECBA4CCFDD60A7AE8EB28629FC94EA8098D650E2041F168DEA1E0C648A395911F8F8072AE34EFAE5C3DE15FEEF09
2,987,406 UART: [art] SIG.S = 6167BBF8300093671817D9B5BF19C331D70884C3ED304E9A745DCE71375455780A126EB534531041BBCE210E041459B0
3,010,885 UART: Caliptra RT
3,011,230 UART: [state] CFI Enabled
3,119,073 UART: [rt] RT listening for mailbox commands...
3,119,736 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,485 UART: [rt]cmd =0x46504c54, len=4
3,150,640 >>> mbox cmd response data (8 bytes)
3,150,807 UART: [rt] FIPS self test
3,151,135 UART: [kat] ++
3,151,287 UART: [kat] sha1
3,155,493 UART: [kat] SHA2-256
3,157,515 UART: [kat] SHA2-384
3,160,546 UART: [kat] SHA2-512-ACC
3,162,473 UART: [kat] ECC-384
3,172,607 UART: [kat] HMAC-384Kdf
3,177,291 UART: Fatal Error: 0x90030002
3,178,841 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,178,846 >>> mbox cmd response: failed
3,178,846 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,178,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,596 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,478 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,172,909 UART: [idev] ++
1,173,077 UART: [idev] CDI.KEYID = 6
1,173,438 UART: [idev] SUBJECT.KEYID = 7
1,173,863 UART: [idev] UDS.KEYID = 0
1,174,209 ready_for_fw is high
1,174,209 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,371 UART: [idev] Erasing UDS.KEYID = 0
1,198,523 UART: [idev] Sha1 KeyId Algorithm
1,207,413 UART: [idev] --
1,208,520 UART: [ldev] ++
1,208,688 UART: [ldev] CDI.KEYID = 6
1,209,052 UART: [ldev] SUBJECT.KEYID = 5
1,209,479 UART: [ldev] AUTHORITY.KEYID = 7
1,209,942 UART: [ldev] FE.KEYID = 1
1,215,066 UART: [ldev] Erasing FE.KEYID = 1
1,240,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,916 UART: [ldev] --
1,280,322 UART: [fwproc] Wait for Commands...
1,281,011 UART: [fwproc] Recv command 0x46574c44
1,281,744 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,843 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,125 >>> mbox cmd response: success
2,786,218 UART: [afmc] ++
2,786,386 UART: [afmc] CDI.KEYID = 6
2,786,749 UART: [afmc] SUBJECT.KEYID = 7
2,787,175 UART: [afmc] AUTHORITY.KEYID = 5
2,822,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,375 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,104 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,987 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,706 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,677 UART: [afmc] --
2,865,627 UART: [cold-reset] --
2,866,279 UART: [state] Locking Datavault
2,867,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,972 UART: [state] Locking ICCM
2,868,492 UART: [exit] Launching FMC @ 0x40000130
2,873,821 UART:
2,873,837 UART: Running Caliptra FMC ...
2,874,245 UART:
2,874,299 UART: [state] CFI Enabled
2,884,952 UART: [fht] FMC Alias Private Key: 7
2,992,387 UART: [art] Extend RT PCRs Done
2,992,815 UART: [art] Lock RT PCRs Done
2,994,437 UART: [art] Populate DV Done
3,002,576 UART: [fht] FMC Alias Private Key: 7
3,003,660 UART: [art] Derive CDI
3,003,940 UART: [art] Store in in slot 0x4
3,089,503 UART: [art] Derive Key Pair
3,089,863 UART: [art] Store priv key in slot 0x5
3,102,797 UART: [art] Derive Key Pair - Done
3,117,886 UART: [art] Signing Cert with AUTHO
3,118,366 UART: RITY.KEYID = 7
3,133,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,251 UART: [art] PUB.X = A81E6F31728389BAC49C7DA01561EC6B5193CB684C92550EE18A491D9486A9E0F5E64D3F43CD93578A04976863C0E107
3,141,010 UART: [art] PUB.Y = 8348479A81699627957AB98B6B0F269C854653310ED8CDC3A0F308382A7F1C55D8E42FC281C9B97740A89948C139D3C3
3,147,943 UART: [art] SIG.R = A1F639858D587AF3410CFA48AE09C09229C0641CC03F3D2B86A2D09E449EA6742E44202FF6550EF072BF6CE4CA2E629A
3,154,712 UART: [art] SIG.S = 5BA0C539570DF7635E8464C20EBBD06A52BFD95314CD5E2C817B4E3AC31B7687D619CA0CE16E8B9FB531BC653E32FB9E
3,178,708 UART: Caliptra RT
3,178,961 UART: [state] CFI Enabled
3,287,280 UART: [rt] RT listening for mailbox commands...
3,287,943 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,730 UART: [rt]cmd =0x46504c54, len=4
3,318,917 >>> mbox cmd response data (8 bytes)
3,319,080 UART: [rt] FIPS self test
3,319,408 UART: [kat] ++
3,319,560 UART: [kat] sha1
3,323,732 UART: [kat] SHA2-256
3,325,754 UART: [kat] SHA2-384
3,328,661 UART: [kat] SHA2-512-ACC
3,330,588 UART: [kat] ECC-384
3,340,448 UART: [kat] HMAC-384Kdf
3,345,044 UART: Fatal Error: 0x90030002
3,346,594 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,599 >>> mbox cmd response: failed
3,346,599 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,346,604 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
915,628 UART: [kat] HMAC-384Kdf
920,002 UART: [kat] LMS
1,168,314 UART: [kat] --
1,169,381 UART: [cold-reset] ++
1,169,927 UART: [fht] FHT @ 0x50003400
1,172,439 UART: [idev] ++
1,172,607 UART: [idev] CDI.KEYID = 6
1,172,968 UART: [idev] SUBJECT.KEYID = 7
1,173,393 UART: [idev] UDS.KEYID = 0
1,173,739 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,547 UART: [idev] --
1,208,594 UART: [ldev] ++
1,208,762 UART: [ldev] CDI.KEYID = 6
1,209,126 UART: [ldev] SUBJECT.KEYID = 5
1,209,553 UART: [ldev] AUTHORITY.KEYID = 7
1,210,016 UART: [ldev] FE.KEYID = 1
1,214,910 UART: [ldev] Erasing FE.KEYID = 1
1,241,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,398 UART: [ldev] --
1,280,684 UART: [fwproc] Wait for Commands...
1,281,257 UART: [fwproc] Recv command 0x46574c44
1,281,990 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,389 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,769 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,778 ready_for_fw is high
1,055,778 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,633,942 >>> mbox cmd response: success
2,695,782 UART:
2,695,798 UART: Running Caliptra FMC ...
2,696,206 UART:
2,696,260 UART: [state] CFI Enabled
2,706,725 UART: [fht] FMC Alias Private Key: 7
2,814,820 UART: [art] Extend RT PCRs Done
2,815,248 UART: [art] Lock RT PCRs Done
2,816,478 UART: [art] Populate DV Done
2,825,005 UART: [fht] FMC Alias Private Key: 7
2,826,103 UART: [art] Derive CDI
2,826,383 UART: [art] Store in in slot 0x4
2,911,992 UART: [art] Derive Key Pair
2,912,352 UART: [art] Store priv key in slot 0x5
2,925,598 UART: [art] Derive Key Pair - Done
2,940,845 UART: [art] Signing Cert with AUTHO
2,941,325 UART: RITY.KEYID = 7
2,956,929 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,694 UART: [art] PUB.X = 33F61726AA835E9535A7C6B3725A396455C1ACD05906C797501562E882F58A8753EC5FB7D8E133D2BD03A853882C0819
2,964,447 UART: [art] PUB.Y = D1DDD923C881B4E19BC74CC906BB718C076384BD431E716A1FB8C80B3A0836BFF65ACB18C4B8FCBC3A8C95602163B6BA
2,971,403 UART: [art] SIG.R = 9D1D6ACCC284C1D913F78AE1DB9274E4F2FA1F3CD03AD61BC03202C245DF46FD60A97841519BA91465B7FDEC71C902ED
2,978,185 UART: [art] SIG.S = 87534C2BDC364C60922EC9198364D143F010690DDD5570D366787DB559A28F51B289ECD0A7D7711762B27C0271B056E6
3,002,508 UART: Caliptra RT
3,002,761 UART: [state] CFI Enabled
3,110,987 UART: [rt] RT listening for mailbox commands...
3,111,650 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,709 UART: [rt]cmd =0x46504c54, len=4
3,142,950 >>> mbox cmd response data (8 bytes)
3,143,257 UART: [rt] FIPS self test
3,143,585 UART: [kat] ++
3,143,737 UART: [kat] sha1
3,147,873 UART: [kat] SHA2-256
3,149,895 UART: [kat] SHA2-384
3,152,666 UART: [kat] SHA2-512-ACC
3,154,593 UART: [kat] ECC-384
3,164,393 UART: [kat] HMAC-384Kdf
3,169,039 UART: Fatal Error: 0x90030002
3,170,589 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,594 >>> mbox cmd response: failed
3,170,594 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,170,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,904 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,528 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,106 UART: [kat] SHA2-256
902,046 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,611 UART: [kat] HMAC-384Kdf
921,309 UART: [kat] LMS
1,169,621 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,378 UART: [idev] ++
1,173,546 UART: [idev] CDI.KEYID = 6
1,173,907 UART: [idev] SUBJECT.KEYID = 7
1,174,332 UART: [idev] UDS.KEYID = 0
1,174,678 ready_for_fw is high
1,174,678 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,199,766 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,243,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,033 UART: [ldev] --
1,282,511 UART: [fwproc] Wait for Commands...
1,283,124 UART: [fwproc] Recv command 0x46574c44
1,283,857 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,239 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,577 >>> mbox cmd response: success
2,787,826 UART: [afmc] ++
2,787,994 UART: [afmc] CDI.KEYID = 6
2,788,357 UART: [afmc] SUBJECT.KEYID = 7
2,788,783 UART: [afmc] AUTHORITY.KEYID = 5
2,824,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,677 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,406 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,289 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,008 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,753 UART: [afmc] --
2,867,769 UART: [cold-reset] --
2,868,389 UART: [state] Locking Datavault
2,869,366 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,970 UART: [state] Locking ICCM
2,870,436 UART: [exit] Launching FMC @ 0x40000130
2,875,765 UART:
2,875,781 UART: Running Caliptra FMC ...
2,876,189 UART:
2,876,332 UART: [state] CFI Enabled
2,886,901 UART: [fht] FMC Alias Private Key: 7
2,994,674 UART: [art] Extend RT PCRs Done
2,995,102 UART: [art] Lock RT PCRs Done
2,996,718 UART: [art] Populate DV Done
3,004,837 UART: [fht] FMC Alias Private Key: 7
3,005,779 UART: [art] Derive CDI
3,006,059 UART: [art] Store in in slot 0x4
3,092,060 UART: [art] Derive Key Pair
3,092,420 UART: [art] Store priv key in slot 0x5
3,105,880 UART: [art] Derive Key Pair - Done
3,120,346 UART: [art] Signing Cert with AUTHO
3,120,826 UART: RITY.KEYID = 7
3,135,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,643 UART: [art] PUB.X = 2FC8D48B89F2A28F14CF70D959DFAF9D6647A5F68FEDC51C299CEC7B657B99D4B77BC114C355145DFD8C9FBFD40AF228
3,143,432 UART: [art] PUB.Y = CDF73904609133EB5A15EE705A7E68954050EC984F3F867B9E8CFFCDB896A6E6B174A5FC64AC1C723C418ECB3DC1B146
3,150,393 UART: [art] SIG.R = 9D22B8E7DE1DF92E7D7B2809DBD7CA961477E9EB5259E0BCAEEC0BEF71E8724AC8E48E6F64D4EC29689C4BA142FAE60B
3,157,180 UART: [art] SIG.S = 15397B4A95AD8DC8E443E708274E269ACC7C5156CD06802498000FCB5313865622EA264F2678EB1E72005D395640F1F2
3,180,180 UART: Caliptra RT
3,180,525 UART: [state] CFI Enabled
3,288,556 UART: [rt] RT listening for mailbox commands...
3,289,219 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,134 UART: [rt]cmd =0x46504c54, len=4
3,320,197 >>> mbox cmd response data (8 bytes)
3,320,352 UART: [rt] FIPS self test
3,320,680 UART: [kat] ++
3,320,832 UART: [kat] sha1
3,325,086 UART: [kat] SHA2-256
3,327,108 UART: [kat] SHA2-384
3,329,973 UART: [kat] SHA2-512-ACC
3,331,900 UART: [kat] ECC-384
3,341,744 UART: [kat] HMAC-384Kdf
3,346,322 UART: Fatal Error: 0x90030002
3,347,872 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,347,877 >>> mbox cmd response: failed
3,347,877 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,347,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,890 UART: [kat] ++
896,042 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
905,151 UART: [kat] SHA2-512-ACC
907,052 UART: [kat] ECC-384
916,595 UART: [kat] HMAC-384Kdf
921,171 UART: [kat] LMS
1,169,483 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,816 UART: [fht] FHT @ 0x50003400
1,173,462 UART: [idev] ++
1,173,630 UART: [idev] CDI.KEYID = 6
1,173,991 UART: [idev] SUBJECT.KEYID = 7
1,174,416 UART: [idev] UDS.KEYID = 0
1,174,762 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,562 UART: [idev] Erasing UDS.KEYID = 0
1,199,802 UART: [idev] Sha1 KeyId Algorithm
1,208,632 UART: [idev] --
1,209,563 UART: [ldev] ++
1,209,731 UART: [ldev] CDI.KEYID = 6
1,210,095 UART: [ldev] SUBJECT.KEYID = 5
1,210,522 UART: [ldev] AUTHORITY.KEYID = 7
1,210,985 UART: [ldev] FE.KEYID = 1
1,216,193 UART: [ldev] Erasing FE.KEYID = 1
1,242,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,995 UART: [ldev] --
1,281,349 UART: [fwproc] Wait for Commands...
1,282,046 UART: [fwproc] Recv command 0x46574c44
1,282,779 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,097 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,475 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,103 ready_for_fw is high
1,056,103 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,669 >>> mbox cmd response: success
2,698,513 UART:
2,698,529 UART: Running Caliptra FMC ...
2,698,937 UART:
2,699,080 UART: [state] CFI Enabled
2,710,127 UART: [fht] FMC Alias Private Key: 7
2,818,166 UART: [art] Extend RT PCRs Done
2,818,594 UART: [art] Lock RT PCRs Done
2,820,146 UART: [art] Populate DV Done
2,828,307 UART: [fht] FMC Alias Private Key: 7
2,829,471 UART: [art] Derive CDI
2,829,751 UART: [art] Store in in slot 0x4
2,915,852 UART: [art] Derive Key Pair
2,916,212 UART: [art] Store priv key in slot 0x5
2,929,324 UART: [art] Derive Key Pair - Done
2,943,999 UART: [art] Signing Cert with AUTHO
2,944,479 UART: RITY.KEYID = 7
2,959,939 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,704 UART: [art] PUB.X = 5EC17C2262F00B797F17DA77067F8F7DD70237A668EF262B763417A6BE4D2DEDEC390117B78E23A903EB8D04064E2BB4
2,967,459 UART: [art] PUB.Y = 0CCC058DFB502A1FF499DD68A03FCEA48032B5976E76EF4EDB4F2C2D98D3F1A1960A909F0C3DCA8335539072AE69739F
2,974,411 UART: [art] SIG.R = 1480A884DE7345CAD06AA863D17E9AE215D3A4AF440F35F5DF9ECAE49978010E2FA071E1CE0CA09AAB56C48EA288101F
2,981,185 UART: [art] SIG.S = AEF0118C87B4F7E83DD9AB4B2944A1B9CE172E447391E76FD963F884B25DCFBD9C9B7980F39CE3752F735396F0F1A237
3,005,238 UART: Caliptra RT
3,005,583 UART: [state] CFI Enabled
3,113,650 UART: [rt] RT listening for mailbox commands...
3,114,313 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,996 UART: [rt]cmd =0x46504c54, len=4
3,145,203 >>> mbox cmd response data (8 bytes)
3,145,320 UART: [rt] FIPS self test
3,145,648 UART: [kat] ++
3,145,800 UART: [kat] sha1
3,150,084 UART: [kat] SHA2-256
3,152,106 UART: [kat] SHA2-384
3,154,875 UART: [kat] SHA2-512-ACC
3,156,802 UART: [kat] ECC-384
3,167,006 UART: [kat] HMAC-384Kdf
3,171,622 UART: Fatal Error: 0x90030002
3,173,172 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,173,177 >>> mbox cmd response: failed
3,173,177 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,173,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,129 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,179 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
8,188,805 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,332,847 >>> mbox cmd response: failed
8,333,403 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,476,750 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,867,168 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,448,060 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,699 writing to cptra_bootfsm_go
8,196,796 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,341,017 >>> mbox cmd response: failed
8,341,601 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,484,938 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
4,860,462 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,470,543 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
8,500,850 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,645,053 >>> mbox cmd response: failed
8,645,621 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,788,923 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
16,270,391 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
29,706,192 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
8,500,437 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,644,516 >>> mbox cmd response: failed
8,645,067 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
8,788,400 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
16,272,979 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
29,715,205 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
5,734,271 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,879,963 >>> mbox cmd response: failed
5,880,548 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,024,297 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,444,935 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,283,453 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
5,735,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,879,479 >>> mbox cmd response: failed
5,880,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,023,794 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,431,204 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,258,418 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
6,061,627 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,206,266 >>> mbox cmd response: failed
6,206,830 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,350,554 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
17,304,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,007,336 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
6,059,696 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,204,533 >>> mbox cmd response: failed
6,205,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,348,861 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
17,301,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
28,027,814 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
5,722,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
5,867,105 >>> mbox cmd response: failed
5,867,681 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,011,425 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,465,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,320,439 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
6,076,763 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,221,948 >>> mbox cmd response: failed
6,222,533 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
6,366,265 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
17,273,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
27,998,195 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,342 >>> mbox cmd response: failed
1,097,342 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,348 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,076 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,976 >>> mbox cmd response: failed
1,097,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,022 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,691 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,699 >>> mbox cmd response: failed
1,098,699 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,862 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,475 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,571 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,579 >>> mbox cmd response: failed
1,097,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,585 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,550 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,313 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,166 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,174 >>> mbox cmd response: failed
1,097,174 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,180 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,609 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,476 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,436 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,444 >>> mbox cmd response: failed
1,097,444 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,318 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,307 >>> mbox cmd response: failed
1,097,307 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,299 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,187 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,195 >>> mbox cmd response: failed
1,098,195 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,336 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,293 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,610 >>> mbox cmd response: failed
1,097,610 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,616 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,501 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,736 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,884 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,892 >>> mbox cmd response: failed
1,097,892 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,302 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,027 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,035 >>> mbox cmd response: failed
1,098,035 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,098,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,732 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,345 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,871 >>> mbox cmd response: failed
1,097,871 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,097,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,880 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,011 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,134 UART:
192,505 UART: Running Caliptra ROM ...
193,703 UART:
193,863 UART: [state] CFI Enabled
267,872 UART: [state] LifecycleState = Unprovisioned
269,862 UART: [state] DebugLocked = No
272,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,778 UART: [kat] SHA2-256
446,446 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,929 UART: [kat] ++
457,540 UART: [kat] sha1
468,567 UART: [kat] SHA2-256
471,226 UART: [kat] SHA2-384
476,087 UART: [kat] SHA2-512-ACC
478,462 UART: [kat] ECC-384
2,770,760 UART: [kat] HMAC-384Kdf
2,802,194 UART: [kat] LMS
3,992,471 UART: [kat] --
3,996,465 UART: [cold-reset] ++
3,998,398 UART: [fht] Storing FHT @ 0x50003400
4,010,164 UART: [idev] ++
4,010,731 UART: [idev] CDI.KEYID = 6
4,011,652 UART: [idev] SUBJECT.KEYID = 7
4,012,903 UART: [idev] UDS.KEYID = 0
4,013,885 ready_for_fw is high
4,014,127 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,158,857 UART: [idev] Erasing UDS.KEYID = 0
7,348,146 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,080 UART: [idev] --
7,373,298 UART: [ldev] ++
7,373,874 UART: [ldev] CDI.KEYID = 6
7,374,846 UART: [ldev] SUBJECT.KEYID = 5
7,376,083 UART: [ldev] AUTHORITY.KEYID = 7
7,377,326 UART: [ldev] FE.KEYID = 1
7,424,756 UART: [ldev] Erasing FE.KEYID = 1
10,755,041 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,700 UART: [ldev] --
13,116,489 UART: [fwproc] Waiting for Commands...
13,119,584 UART: [fwproc] Received command 0x46574c44
13,121,776 UART: [fwproc] Received Image of size 114996 bytes
17,184,435 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,257,924 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,326,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,647,665 >>> mbox cmd response: success
17,651,832 UART: [afmc] ++
17,652,428 UART: [afmc] CDI.KEYID = 6
17,653,344 UART: [afmc] SUBJECT.KEYID = 7
17,654,618 UART: [afmc] AUTHORITY.KEYID = 5
21,008,325 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,564 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,828 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,274 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,077 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,507 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,349 UART: [afmc] --
23,381,481 UART: [cold-reset] --
23,384,507 UART: [state] Locking Datavault
23,391,428 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,142 UART: [state] Locking ICCM
23,395,888 UART: [exit] Launching FMC @ 0x40000130
23,404,252 UART:
23,404,495 UART: Running Caliptra FMC ...
23,405,606 UART:
23,405,770 UART: [state] CFI Enabled
23,470,540 UART: [fht] FMC Alias Private Key: 7
25,808,438 UART: [art] Extend RT PCRs Done
25,809,709 UART: [art] Lock RT PCRs Done
25,811,420 UART: [art] Populate DV Done
25,816,835 UART: [fht] FMC Alias Private Key: 7
25,818,332 UART: [art] Derive CDI
25,819,075 UART: [art] Store in in slot 0x4
25,867,315 UART: [art] Derive Key Pair
25,868,362 UART: [art] Store priv key in slot 0x5
29,161,617 UART: [art] Derive Key Pair - Done
29,174,902 UART: [art] Signing Cert with AUTHO
29,176,218 UART: RITY.KEYID = 7
31,462,696 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,333 UART: [art] PUB.X = E16679D2056451E0B00461E6D44018F5FFDC00FBEB35434640450030BB5CC9C471E32E9077C68EFD49491DF03440BE1A
31,471,384 UART: [art] PUB.Y = 34DB8B9C6768EA9CDB5A196A1B8C5E1D6143B6C483486621BB40C072A7863AE4383F1D6BEE388A2506017F21D156FEA6
31,478,633 UART: [art] SIG.R = BC822CB3CE882EF5174DE35AD9968A7459AC7F860009503E7AD96EE21C005B1DBB7A8439DE076608A057DCEEAE9C2651
31,485,978 UART: [art] SIG.S = 9ED3DBF296AD26C6562324EE746FE56578DDB101EB7026B4284B399D5E09FF35F4B0289A858B54532527850E1DD8E7B9
32,791,580 UART: Caliptra RT
32,792,301 UART: [state] CFI Enabled
32,952,918 UART: [rt] RT listening for mailbox commands...
32,954,785 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,984,420 UART: [rt]cmd =0x46504c54, len=4
32,985,932 >>> mbox cmd response data (8 bytes)
32,986,809 UART: [rt] FIPS self test
32,987,760 UART: [kat] ++
32,988,211 UART: [kat] sha1
32,992,697 UART: [kat] SHA2-256
32,994,631 UART: [kat] SHA2-384
32,997,503 UART: [kat] SHA2-512-ACC
32,999,740 UART: [kat] ECC-384
36,268,352 UART: [kat] HMAC-384Kdf
36,275,234 UART: [kat] LMS
37,048,577 UART: Fatal Error: 0x90070002
37,084,000 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,228,557 >>> mbox cmd response: failed
37,229,179 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,373,391 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
190,112 UART:
190,405 UART: Running Caliptra ROM ...
191,438 UART:
191,581 UART: [state] CFI Enabled
251,042 UART: [state] LifecycleState = Unprovisioned
252,985 UART: [state] DebugLocked = No
255,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
260,965 UART: [kat] SHA2-256
430,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,153 UART: [kat] ++
441,738 UART: [kat] sha1
452,787 UART: [kat] SHA2-256
455,471 UART: [kat] SHA2-384
460,692 UART: [kat] SHA2-512-ACC
463,044 UART: [kat] ECC-384
2,755,085 UART: [kat] HMAC-384Kdf
2,765,931 UART: [kat] LMS
3,956,185 UART: [kat] --
3,959,805 UART: [cold-reset] ++
3,961,525 UART: [fht] Storing FHT @ 0x50003400
3,973,286 UART: [idev] ++
3,973,871 UART: [idev] CDI.KEYID = 6
3,974,841 UART: [idev] SUBJECT.KEYID = 7
3,976,054 UART: [idev] UDS.KEYID = 0
3,977,626 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,122,180 UART: [idev] Erasing UDS.KEYID = 0
7,311,913 UART: [idev] Using Sha1 for KeyId Algorithm
7,333,188 UART: [idev] --
7,336,813 UART: [ldev] ++
7,337,440 UART: [ldev] CDI.KEYID = 6
7,338,345 UART: [ldev] SUBJECT.KEYID = 5
7,339,564 UART: [ldev] AUTHORITY.KEYID = 7
7,340,855 UART: [ldev] FE.KEYID = 1
7,387,814 UART: [ldev] Erasing FE.KEYID = 1
10,717,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,014,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,029,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,044,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,058,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,078,188 UART: [ldev] --
13,082,541 UART: [fwproc] Waiting for Commands...
13,084,536 UART: [fwproc] Received command 0x46574c44
13,086,726 UART: [fwproc] Received Image of size 114996 bytes
17,154,490 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,343 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,301,232 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,621,202 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,804,664 ready_for_fw is high
3,805,069 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,895,867 >>> mbox cmd response: success
23,590,451 UART:
23,590,876 UART: Running Caliptra FMC ...
23,592,034 UART:
23,592,209 UART: [state] CFI Enabled
23,660,584 UART: [fht] FMC Alias Private Key: 7
25,999,135 UART: [art] Extend RT PCRs Done
26,000,388 UART: [art] Lock RT PCRs Done
26,002,028 UART: [art] Populate DV Done
26,007,251 UART: [fht] FMC Alias Private Key: 7
26,008,754 UART: [art] Derive CDI
26,009,522 UART: [art] Store in in slot 0x4
26,070,253 UART: [art] Derive Key Pair
26,071,308 UART: [art] Store priv key in slot 0x5
29,364,288 UART: [art] Derive Key Pair - Done
29,377,239 UART: [art] Signing Cert with AUTHO
29,378,541 UART: RITY.KEYID = 7
31,665,882 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,388 UART: [art] PUB.X = 93CAB5548562B536F18C44B6C2778839EE6BF968A6BBC3CED596D1167C9AD19FF0B0AAD0415C7D7680C7402DA7EBE217
31,674,653 UART: [art] PUB.Y = 9D9F04A1D2D671AD6B8580B9459B35BB1F4C1FFD189F739C413D70B7CA34758D33E9A2D67549240C6A43B2E34BCBEB46
31,681,858 UART: [art] SIG.R = 8AC4ED4DBE9C5361D74E27ECE78BB4D7EEC82578E727EC28A89B265990373024A16C948B051E2202AC0C7D6AE96E1BC3
31,689,249 UART: [art] SIG.S = 2BF73C6EC4E7F723F52793F3EC3B44FEFBC907ED3B47B89F0A429811DFE232E0B3C816024CA52939FE64E964E1ADA040
32,994,349 UART: Caliptra RT
32,995,083 UART: [state] CFI Enabled
33,156,841 UART: [rt] RT listening for mailbox commands...
33,158,701 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,188,504 UART: [rt]cmd =0x46504c54, len=4
33,190,012 >>> mbox cmd response data (8 bytes)
33,190,972 UART: [rt] FIPS self test
33,191,915 UART: [kat] ++
33,192,423 UART: [kat] sha1
33,196,938 UART: [kat] SHA2-256
33,198,870 UART: [kat] SHA2-384
33,201,881 UART: [kat] SHA2-512-ACC
33,204,184 UART: [kat] ECC-384
36,472,034 UART: [kat] HMAC-384Kdf
36,479,300 UART: [kat] LMS
37,252,284 UART: Fatal Error: 0x90070002
37,287,729 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,432,208 >>> mbox cmd response: failed
37,432,879 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,577,205 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,771,949 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,853,247 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,606 UART:
192,968 UART: Running Caliptra ROM ...
194,148 UART:
603,977 UART: [state] CFI Enabled
620,847 UART: [state] LifecycleState = Unprovisioned
622,802 UART: [state] DebugLocked = No
624,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,951 UART: [kat] SHA2-256
798,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,221 UART: [kat] ++
809,672 UART: [kat] sha1
819,555 UART: [kat] SHA2-256
822,214 UART: [kat] SHA2-384
827,213 UART: [kat] SHA2-512-ACC
829,516 UART: [kat] ECC-384
3,113,735 UART: [kat] HMAC-384Kdf
3,125,059 UART: [kat] LMS
4,315,120 UART: [kat] --
4,318,338 UART: [cold-reset] ++
4,319,638 UART: [fht] Storing FHT @ 0x50003400
4,330,210 UART: [idev] ++
4,330,774 UART: [idev] CDI.KEYID = 6
4,331,729 UART: [idev] SUBJECT.KEYID = 7
4,332,981 UART: [idev] UDS.KEYID = 0
4,333,908 ready_for_fw is high
4,334,127 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,478,934 UART: [idev] Erasing UDS.KEYID = 0
7,620,731 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,910 UART: [idev] --
7,646,801 UART: [ldev] ++
7,647,370 UART: [ldev] CDI.KEYID = 6
7,648,307 UART: [ldev] SUBJECT.KEYID = 5
7,649,519 UART: [ldev] AUTHORITY.KEYID = 7
7,650,806 UART: [ldev] FE.KEYID = 1
7,663,483 UART: [ldev] Erasing FE.KEYID = 1
10,953,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,405 UART: [ldev] --
13,316,691 UART: [fwproc] Waiting for Commands...
13,318,746 UART: [fwproc] Received command 0x46574c44
13,320,934 UART: [fwproc] Received Image of size 114996 bytes
17,379,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,591 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,846,641 >>> mbox cmd response: success
17,850,948 UART: [afmc] ++
17,851,537 UART: [afmc] CDI.KEYID = 6
17,852,474 UART: [afmc] SUBJECT.KEYID = 7
17,853,743 UART: [afmc] AUTHORITY.KEYID = 5
21,173,953 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,464,822 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,467,080 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,481,466 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,496,325 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,510,808 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,532,606 UART: [afmc] --
23,536,853 UART: [cold-reset] --
23,540,280 UART: [state] Locking Datavault
23,544,068 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,826 UART: [state] Locking ICCM
23,548,575 UART: [exit] Launching FMC @ 0x40000130
23,556,976 UART:
23,557,213 UART: Running Caliptra FMC ...
23,558,316 UART:
23,558,473 UART: [state] CFI Enabled
23,566,738 UART: [fht] FMC Alias Private Key: 7
25,897,040 UART: [art] Extend RT PCRs Done
25,898,273 UART: [art] Lock RT PCRs Done
25,899,870 UART: [art] Populate DV Done
25,905,335 UART: [fht] FMC Alias Private Key: 7
25,906,843 UART: [art] Derive CDI
25,907,586 UART: [art] Store in in slot 0x4
25,949,935 UART: [art] Derive Key Pair
25,950,935 UART: [art] Store priv key in slot 0x5
29,192,605 UART: [art] Derive Key Pair - Done
29,205,491 UART: [art] Signing Cert with AUTHO
29,206,797 UART: RITY.KEYID = 7
31,486,456 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,966 UART: [art] PUB.X = B52EE97975896E58B1C7DDE1A0CFAF0AF6BC8CCB65FB1FE346806B7D7E04199A20FD1FB9D921B35D130DF8DEBAC50E45
31,495,220 UART: [art] PUB.Y = B4C56619E9CA523156A8666285892990C99A6EBBACD617380393E4118C0712AF276D6CF3C0F7A22D04EBB9497B32C967
31,502,415 UART: [art] SIG.R = B7D43619C35B7C73D1B17296863CE562F9D747B9BCE6C2C18F17A7036723FE6FE4480B64E259B47E306FCBCB4A098851
31,509,863 UART: [art] SIG.S = 425BF5177B48E962DF8FDF4D7CC4F90126C4E8A57ED2F946DD52C1D88DB14BF0BFF4C021E47D81BB022B53310E8079CE
32,815,261 UART: Caliptra RT
32,815,971 UART: [state] CFI Enabled
32,933,634 UART: [rt] RT listening for mailbox commands...
32,935,485 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,965,183 UART: [rt]cmd =0x46504c54, len=4
32,966,693 >>> mbox cmd response data (8 bytes)
32,967,754 UART: [rt] FIPS self test
32,968,696 UART: [kat] ++
32,969,147 UART: [kat] sha1
32,973,711 UART: [kat] SHA2-256
32,975,643 UART: [kat] SHA2-384
32,978,550 UART: [kat] SHA2-512-ACC
32,980,838 UART: [kat] ECC-384
36,223,155 UART: [kat] HMAC-384Kdf
36,229,125 UART: [kat] LMS
37,002,104 UART: Fatal Error: 0x90070002
37,037,497 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,181,807 >>> mbox cmd response: failed
37,182,405 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,326,724 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,101 UART:
190,400 UART: Running Caliptra ROM ...
191,515 UART:
3,205,033 UART: [state] CFI Enabled
3,219,118 UART: [state] LifecycleState = Unprovisioned
3,221,064 UART: [state] DebugLocked = No
3,222,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,227,745 UART: [kat] SHA2-256
3,397,481 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,408,060 UART: [kat] ++
3,408,608 UART: [kat] sha1
3,419,718 UART: [kat] SHA2-256
3,422,422 UART: [kat] SHA2-384
3,427,924 UART: [kat] SHA2-512-ACC
3,430,294 UART: [kat] ECC-384
5,714,737 UART: [kat] HMAC-384Kdf
5,726,164 UART: [kat] LMS
6,916,257 UART: [kat] --
6,920,652 UART: [cold-reset] ++
6,923,029 UART: [fht] Storing FHT @ 0x50003400
6,933,491 UART: [idev] ++
6,934,056 UART: [idev] CDI.KEYID = 6
6,934,996 UART: [idev] SUBJECT.KEYID = 7
6,936,269 UART: [idev] UDS.KEYID = 0
6,937,770 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
7,082,120 UART: [idev] Erasing UDS.KEYID = 0
10,225,377 UART: [idev] Using Sha1 for KeyId Algorithm
10,247,189 UART: [idev] --
10,251,725 UART: [ldev] ++
10,252,294 UART: [ldev] CDI.KEYID = 6
10,253,284 UART: [ldev] SUBJECT.KEYID = 5
10,254,448 UART: [ldev] AUTHORITY.KEYID = 7
10,255,736 UART: [ldev] FE.KEYID = 1
10,263,586 UART: [ldev] Erasing FE.KEYID = 1
13,554,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,849,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,864,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,879,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,893,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,912,329 UART: [ldev] --
15,916,944 UART: [fwproc] Waiting for Commands...
15,920,124 UART: [fwproc] Received command 0x46574c44
15,922,316 UART: [fwproc] Received Image of size 114996 bytes
19,982,034 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,062,025 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,130,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
20,450,912 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,127,788 ready_for_fw is high
4,128,467 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,090,514 >>> mbox cmd response: success
23,729,450 UART:
23,729,870 UART: Running Caliptra FMC ...
23,730,994 UART:
23,731,166 UART: [state] CFI Enabled
23,739,068 UART: [fht] FMC Alias Private Key: 7
26,070,052 UART: [art] Extend RT PCRs Done
26,071,286 UART: [art] Lock RT PCRs Done
26,073,029 UART: [art] Populate DV Done
26,078,408 UART: [fht] FMC Alias Private Key: 7
26,080,009 UART: [art] Derive CDI
26,080,836 UART: [art] Store in in slot 0x4
26,123,550 UART: [art] Derive Key Pair
26,124,586 UART: [art] Store priv key in slot 0x5
29,366,442 UART: [art] Derive Key Pair - Done
29,379,551 UART: [art] Signing Cert with AUTHO
29,380,862 UART: RITY.KEYID = 7
31,660,135 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,644 UART: [art] PUB.X = 772746435DEAEEFAFA5DC4A8C9C2CD209FE6CB0B1A0C912CD9454AD393DFDD47D221FB36189B99C0AE4A3A47F9CA9D2A
31,668,967 UART: [art] PUB.Y = A885BD05524C64C86E96EE4477973139D3A6785D57F23D81B922C1220BF218A11CC813DB8905CF85D202047B307A19B9
31,676,135 UART: [art] SIG.R = 56CDB236391D5C24B4D71030A8B8529D8FC8FBB1307C775FB15D70047B7BFED8CCCD07E081EFAE82459F536ED33A968E
31,683,535 UART: [art] SIG.S = C3DF50F0FE12E8C2F68B79C3C6E841D5FD3B6AD2F5FFEC4067DA6EAE4185FD9F928A48DFD1D37D7C129E96CCE71BA7AF
32,988,495 UART: Caliptra RT
32,989,237 UART: [state] CFI Enabled
33,106,807 UART: [rt] RT listening for mailbox commands...
33,108,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,138,321 UART: [rt]cmd =0x46504c54, len=4
33,139,953 >>> mbox cmd response data (8 bytes)
33,141,175 UART: [rt] FIPS self test
33,142,117 UART: [kat] ++
33,142,589 UART: [kat] sha1
33,146,885 UART: [kat] SHA2-256
33,148,817 UART: [kat] SHA2-384
33,151,941 UART: [kat] SHA2-512-ACC
33,154,206 UART: [kat] ECC-384
36,397,012 UART: [kat] HMAC-384Kdf
36,402,868 UART: [kat] LMS
37,175,925 UART: Fatal Error: 0x90070002
37,211,209 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,355,798 >>> mbox cmd response: failed
37,356,479 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
37,500,824 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
6,561,214 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
20,515,729 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,181 UART:
192,550 UART: Running Caliptra ROM ...
193,668 UART:
193,812 UART: [state] CFI Enabled
260,323 UART: [state] LifecycleState = Unprovisioned
262,238 UART: [state] DebugLocked = No
264,770 UART: [state] WD Timer not started. Device not locked for debugging
268,020 UART: [kat] SHA2-256
447,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,680 UART: [kat] ++
459,217 UART: [kat] sha1
469,411 UART: [kat] SHA2-256
472,492 UART: [kat] SHA2-384
477,947 UART: [kat] SHA2-512-ACC
480,865 UART: [kat] ECC-384
2,927,939 UART: [kat] HMAC-384Kdf
2,948,524 UART: [kat] LMS
3,477,951 UART: [kat] --
3,480,817 UART: [cold-reset] ++
3,482,969 UART: [fht] FHT @ 0x50003400
3,493,598 UART: [idev] ++
3,494,165 UART: [idev] CDI.KEYID = 6
3,495,084 UART: [idev] SUBJECT.KEYID = 7
3,496,338 UART: [idev] UDS.KEYID = 0
3,497,264 ready_for_fw is high
3,497,470 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,642,513 UART: [idev] Erasing UDS.KEYID = 0
6,001,188 UART: [idev] Sha1 KeyId Algorithm
6,025,492 UART: [idev] --
6,030,201 UART: [ldev] ++
6,030,776 UART: [ldev] CDI.KEYID = 6
6,031,663 UART: [ldev] SUBJECT.KEYID = 5
6,032,771 UART: [ldev] AUTHORITY.KEYID = 7
6,034,118 UART: [ldev] FE.KEYID = 1
6,077,855 UART: [ldev] Erasing FE.KEYID = 1
8,579,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,363,263 UART: [ldev] --
10,367,613 UART: [fwproc] Wait for Commands...
10,370,842 UART: [fwproc] Recv command 0x46574c44
10,372,904 UART: [fwproc] Recv'd Img size: 115304 bytes
13,795,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,937,160 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,258,129 >>> mbox cmd response: success
14,262,408 UART: [afmc] ++
14,263,003 UART: [afmc] CDI.KEYID = 6
14,263,895 UART: [afmc] SUBJECT.KEYID = 7
14,265,115 UART: [afmc] AUTHORITY.KEYID = 5
16,801,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,555 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,545,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,561,380 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,213 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,599,390 UART: [afmc] --
18,603,115 UART: [cold-reset] --
18,606,594 UART: [state] Locking Datavault
18,615,026 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,728 UART: [state] Locking ICCM
18,617,716 UART: [exit] Launching FMC @ 0x40000130
18,626,157 UART:
18,626,392 UART: Running Caliptra FMC ...
18,627,495 UART:
18,627,653 UART: [state] CFI Enabled
18,688,103 UART: [fht] FMC Alias Private Key: 7
20,451,572 UART: [art] Extend RT PCRs Done
20,452,788 UART: [art] Lock RT PCRs Done
20,454,419 UART: [art] Populate DV Done
20,459,723 UART: [fht] FMC Alias Private Key: 7
20,461,368 UART: [art] Derive CDI
20,462,182 UART: [art] Store in in slot 0x4
20,520,655 UART: [art] Derive Key Pair
20,521,699 UART: [art] Store priv key in slot 0x5
22,984,669 UART: [art] Derive Key Pair - Done
22,997,575 UART: [art] Signing Cert with AUTHO
22,998,880 UART: RITY.KEYID = 7
24,711,110 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,615 UART: [art] PUB.X = 0D7BABDF8B222E9CA892838E1D8A9EE1D82677C6B3C8839ED02CA002F8E52CE3B110EA44D4AA2E389B18EFD310B332A9
24,719,900 UART: [art] PUB.Y = 147B3842578619B0427897721B144FDB47D64D008DF7C2CD594EE6613415CF933761B7FCE0230B5389254F0549AC39E7
24,727,101 UART: [art] SIG.R = 8FF37407EB6C8DD6448B99D98C83077A136C00017D2033AAA084B5B37CDC37D6A0840EF6CE0ABE3103EFC0EAE9517433
24,734,494 UART: [art] SIG.S = 3320032EAB0C515381669885EEF79A1D5875D337E78401140B5DDBE93C68FC0B522E49AE8EE0D5858254D9F44E40D960
25,713,365 UART: Caliptra RT
25,714,065 UART: [state] CFI Enabled
25,879,729 UART: [rt] RT listening for mailbox commands...
25,881,574 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,911,408 UART: [rt]cmd =0x46504c54, len=4
25,913,150 >>> mbox cmd response data (8 bytes)
25,914,080 UART: [rt] FIPS self test
25,915,030 UART: [kat] ++
25,915,485 UART: [kat] sha1
25,920,032 UART: [kat] SHA2-256
25,921,955 UART: [kat] SHA2-384
25,924,917 UART: [kat] SHA2-512-ACC
25,927,210 UART: [kat] ECC-384
28,366,332 UART: [kat] HMAC-384Kdf
28,393,005 UART: [kat] LMS
28,617,671 UART: Fatal Error: 0x90070002
28,653,081 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,798,337 >>> mbox cmd response: failed
28,799,008 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,943,659 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,159 UART:
190,457 UART: Running Caliptra ROM ...
191,486 UART:
191,625 UART: [state] CFI Enabled
264,692 UART: [state] LifecycleState = Unprovisioned
266,607 UART: [state] DebugLocked = No
268,904 UART: [state] WD Timer not started. Device not locked for debugging
272,801 UART: [kat] SHA2-256
451,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,526 UART: [kat] ++
464,054 UART: [kat] sha1
476,074 UART: [kat] SHA2-256
479,083 UART: [kat] SHA2-384
486,085 UART: [kat] SHA2-512-ACC
489,071 UART: [kat] ECC-384
2,951,148 UART: [kat] HMAC-384Kdf
2,972,904 UART: [kat] LMS
3,502,360 UART: [kat] --
3,508,197 UART: [cold-reset] ++
3,510,560 UART: [fht] FHT @ 0x50003400
3,521,429 UART: [idev] ++
3,522,002 UART: [idev] CDI.KEYID = 6
3,522,973 UART: [idev] SUBJECT.KEYID = 7
3,524,133 UART: [idev] UDS.KEYID = 0
3,525,637 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,670,580 UART: [idev] Erasing UDS.KEYID = 0
6,029,951 UART: [idev] Sha1 KeyId Algorithm
6,053,612 UART: [idev] --
6,057,988 UART: [ldev] ++
6,058,562 UART: [ldev] CDI.KEYID = 6
6,059,478 UART: [ldev] SUBJECT.KEYID = 5
6,060,644 UART: [ldev] AUTHORITY.KEYID = 7
6,061,897 UART: [ldev] FE.KEYID = 1
6,101,626 UART: [ldev] Erasing FE.KEYID = 1
8,605,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,395 UART: [ldev] --
10,416,768 UART: [fwproc] Wait for Commands...
10,418,642 UART: [fwproc] Recv command 0x46574c44
10,420,703 UART: [fwproc] Recv'd Img size: 115304 bytes
13,847,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,921,427 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,990,241 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,311,828 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,360,391 ready_for_fw is high
3,361,074 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,083,102 >>> mbox cmd response: success
18,364,316 UART:
18,364,712 UART: Running Caliptra FMC ...
18,365,860 UART:
18,366,018 UART: [state] CFI Enabled
18,433,146 UART: [fht] FMC Alias Private Key: 7
20,197,556 UART: [art] Extend RT PCRs Done
20,198,821 UART: [art] Lock RT PCRs Done
20,200,581 UART: [art] Populate DV Done
20,206,152 UART: [fht] FMC Alias Private Key: 7
20,207,748 UART: [art] Derive CDI
20,208,566 UART: [art] Store in in slot 0x4
20,266,103 UART: [art] Derive Key Pair
20,267,161 UART: [art] Store priv key in slot 0x5
22,730,083 UART: [art] Derive Key Pair - Done
22,742,871 UART: [art] Signing Cert with AUTHO
22,744,226 UART: RITY.KEYID = 7
24,456,300 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,792 UART: [art] PUB.X = FCD5F81AB1569B6EAE65E8445FBA886C9F8C43E6EF251D46E7C541B90CB5A1EEF48543DE8ADC0A5EF2FC88564B83545C
24,465,103 UART: [art] PUB.Y = 24529DF7F11404086E2865657ADEDA26D1A002DDE2B3D9678CFB5AE447833EEB9D8A2324811B8CC18459CBBC14194CA5
24,472,393 UART: [art] SIG.R = 6DE930B15A410977DCC38F7ECFBB069E8335289792BD0FF1EB518687B35A6EA188B70CFA7A8C45614E41576DB4EADE18
24,479,789 UART: [art] SIG.S = 4706061DA1CE3EF71436321C99C2F351A5315CDC9083BB3DF6289801F0E6F5D16AA2458365074767A6AF3FA99FC8C5A4
25,458,924 UART: Caliptra RT
25,459,642 UART: [state] CFI Enabled
25,625,158 UART: [rt] RT listening for mailbox commands...
25,627,005 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,656,868 UART: [rt]cmd =0x46504c54, len=4
25,658,669 >>> mbox cmd response data (8 bytes)
25,659,477 UART: [rt] FIPS self test
25,660,434 UART: [kat] ++
25,660,886 UART: [kat] sha1
25,665,479 UART: [kat] SHA2-256
25,667,358 UART: [kat] SHA2-384
25,670,371 UART: [kat] SHA2-512-ACC
25,672,598 UART: [kat] ECC-384
28,110,445 UART: [kat] HMAC-384Kdf
28,137,394 UART: [kat] LMS
28,362,087 UART: Fatal Error: 0x90070002
28,397,354 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,542,231 >>> mbox cmd response: failed
28,542,902 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,687,638 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,342,116 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,036,254 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,409 UART:
192,777 UART: Running Caliptra ROM ...
193,999 UART:
603,519 UART: [state] CFI Enabled
614,715 UART: [state] LifecycleState = Unprovisioned
616,606 UART: [state] DebugLocked = No
618,070 UART: [state] WD Timer not started. Device not locked for debugging
622,381 UART: [kat] SHA2-256
801,528 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,095 UART: [kat] ++
813,640 UART: [kat] sha1
825,025 UART: [kat] SHA2-256
828,041 UART: [kat] SHA2-384
835,594 UART: [kat] SHA2-512-ACC
838,534 UART: [kat] ECC-384
3,281,247 UART: [kat] HMAC-384Kdf
3,294,490 UART: [kat] LMS
3,824,029 UART: [kat] --
3,828,741 UART: [cold-reset] ++
3,830,604 UART: [fht] FHT @ 0x50003400
3,842,934 UART: [idev] ++
3,843,500 UART: [idev] CDI.KEYID = 6
3,844,462 UART: [idev] SUBJECT.KEYID = 7
3,845,649 UART: [idev] UDS.KEYID = 0
3,846,581 ready_for_fw is high
3,846,827 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,991,745 UART: [idev] Erasing UDS.KEYID = 0
6,320,849 UART: [idev] Sha1 KeyId Algorithm
6,342,788 UART: [idev] --
6,346,567 UART: [ldev] ++
6,347,137 UART: [ldev] CDI.KEYID = 6
6,348,021 UART: [ldev] SUBJECT.KEYID = 5
6,349,239 UART: [ldev] AUTHORITY.KEYID = 7
6,350,528 UART: [ldev] FE.KEYID = 1
6,361,667 UART: [ldev] Erasing FE.KEYID = 1
8,835,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,429 UART: [ldev] --
10,621,753 UART: [fwproc] Wait for Commands...
10,623,267 UART: [fwproc] Recv command 0x46574c44
10,625,372 UART: [fwproc] Recv'd Img size: 115304 bytes
14,044,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,361 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,503,410 >>> mbox cmd response: success
14,508,154 UART: [afmc] ++
14,508,742 UART: [afmc] CDI.KEYID = 6
14,509,652 UART: [afmc] SUBJECT.KEYID = 7
14,510,810 UART: [afmc] AUTHORITY.KEYID = 5
17,006,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,533 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,163 UART: [afmc] --
18,802,601 UART: [cold-reset] --
18,807,271 UART: [state] Locking Datavault
18,810,140 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,838 UART: [state] Locking ICCM
18,814,097 UART: [exit] Launching FMC @ 0x40000130
18,822,549 UART:
18,822,791 UART: Running Caliptra FMC ...
18,823,896 UART:
18,824,057 UART: [state] CFI Enabled
18,832,486 UART: [fht] FMC Alias Private Key: 7
20,589,657 UART: [art] Extend RT PCRs Done
20,590,878 UART: [art] Lock RT PCRs Done
20,592,477 UART: [art] Populate DV Done
20,597,730 UART: [fht] FMC Alias Private Key: 7
20,599,437 UART: [art] Derive CDI
20,600,290 UART: [art] Store in in slot 0x4
20,642,784 UART: [art] Derive Key Pair
20,643,786 UART: [art] Store priv key in slot 0x5
23,070,880 UART: [art] Derive Key Pair - Done
23,083,988 UART: [art] Signing Cert with AUTHO
23,085,330 UART: RITY.KEYID = 7
24,790,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,467 UART: [art] PUB.X = AB17EE132A89018048AC49038E3F58FFF58B1597E60163A89BB53B354592852C1A016A991C79508F156DF15FAE0FC3BB
24,799,629 UART: [art] PUB.Y = E003C439FBC654CB8AE5F45552E9921A023FD8A6D66E67B381A5BE16A9BDE853559E59AC00EC8561246B612219233F8D
24,806,877 UART: [art] SIG.R = 1B7211480A07690760EE8ABE2B1B7C57AC393C8D3AEE241E31D1A2D03B66D4409C4859B959CD34B193B3D524BC98DA46
24,814,218 UART: [art] SIG.S = 9B63CBC7834574AC3DA213164151E0A7A5F51B0992306E78C7D6E4907B0841D9ADFF859261FDB2AC94D040C86A1484AF
25,793,576 UART: Caliptra RT
25,794,306 UART: [state] CFI Enabled
25,911,612 UART: [rt] RT listening for mailbox commands...
25,913,472 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,943,519 UART: [rt]cmd =0x46504c54, len=4
25,945,151 >>> mbox cmd response data (8 bytes)
25,946,461 UART: [rt] FIPS self test
25,947,400 UART: [kat] ++
25,947,846 UART: [kat] sha1
25,952,195 UART: [kat] SHA2-256
25,954,068 UART: [kat] SHA2-384
25,957,116 UART: [kat] SHA2-512-ACC
25,959,354 UART: [kat] ECC-384
28,387,148 UART: [kat] HMAC-384Kdf
28,393,061 UART: [kat] LMS
28,617,716 UART: Fatal Error: 0x90070002
28,652,986 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,797,809 >>> mbox cmd response: failed
28,798,475 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,943,690 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,095 UART:
190,389 UART: Running Caliptra ROM ...
191,499 UART:
11,589,247 UART: [state] CFI Enabled
11,607,669 UART: [state] LifecycleState = Unprovisioned
11,609,525 UART: [state] DebugLocked = No
11,610,942 UART: [state] WD Timer not started. Device not locked for debugging
11,614,571 UART: [kat] SHA2-256
11,793,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
11,805,283 UART: [kat] ++
11,805,742 UART: [kat] sha1
11,816,245 UART: [kat] SHA2-256
11,819,245 UART: [kat] SHA2-384
11,825,020 UART: [kat] SHA2-512-ACC
11,827,986 UART: [kat] ECC-384
14,273,835 UART: [kat] HMAC-384Kdf
14,285,413 UART: [kat] LMS
14,814,905 UART: [kat] --
14,819,864 UART: [cold-reset] ++
14,822,440 UART: [fht] FHT @ 0x50003400
14,833,682 UART: [idev] ++
14,834,248 UART: [idev] CDI.KEYID = 6
14,835,158 UART: [idev] SUBJECT.KEYID = 7
14,836,367 UART: [idev] UDS.KEYID = 0
14,837,907 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,982,673 UART: [idev] Erasing UDS.KEYID = 0
17,306,231 UART: [idev] Sha1 KeyId Algorithm
17,330,054 UART: [idev] --
17,333,999 UART: [ldev] ++
17,334,568 UART: [ldev] CDI.KEYID = 6
17,335,867 UART: [ldev] SUBJECT.KEYID = 5
17,336,986 UART: [ldev] AUTHORITY.KEYID = 7
17,338,159 UART: [ldev] FE.KEYID = 1
17,348,968 UART: [ldev] Erasing FE.KEYID = 1
19,820,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,538,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,554,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,569,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,585,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,605,998 UART: [ldev] --
21,610,570 UART: [fwproc] Wait for Commands...
21,612,886 UART: [fwproc] Recv command 0x46574c44
21,614,928 UART: [fwproc] Recv'd Img size: 115304 bytes
25,035,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,115,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,184,150 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
25,505,297 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,688,001 ready_for_fw is high
3,688,448 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,265,498 >>> mbox cmd response: success
18,510,852 UART:
18,511,236 UART: Running Caliptra FMC ...
18,512,402 UART:
18,512,567 UART: [state] CFI Enabled
18,520,609 UART: [fht] FMC Alias Private Key: 7
20,276,751 UART: [art] Extend RT PCRs Done
20,277,979 UART: [art] Lock RT PCRs Done
20,279,685 UART: [art] Populate DV Done
20,285,085 UART: [fht] FMC Alias Private Key: 7
20,286,683 UART: [art] Derive CDI
20,287,500 UART: [art] Store in in slot 0x4
20,330,213 UART: [art] Derive Key Pair
20,331,257 UART: [art] Store priv key in slot 0x5
22,757,729 UART: [art] Derive Key Pair - Done
22,770,939 UART: [art] Signing Cert with AUTHO
22,772,259 UART: RITY.KEYID = 7
24,476,849 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,359 UART: [art] PUB.X = 8BAFB109D6329C97273C530DBC4EDF8DE977115876582246FC841CCD93B02911BA814416B11C07827F1715A5020E508D
24,485,676 UART: [art] PUB.Y = 8A326D755A7E8A828238493C065F6AC75B97D529F3FB5EF8CC934F90717313EABD644406E3BB6BE7D798C48B0A38BBB7
24,492,909 UART: [art] SIG.R = 1AEF2A72ED57A864E0C1A74C5670EAB3B762430BDE6927CCF5DBB3556011E27E864B05CAEF124E545F0022F4DB2F99FC
24,500,288 UART: [art] SIG.S = 8EB5ED11960B943A5A024792B80671D5DBD36F93636B1366185D84DDBA9AE9D9F715E271D58DA9F329220387622B912E
25,478,961 UART: Caliptra RT
25,479,663 UART: [state] CFI Enabled
25,596,236 UART: [rt] RT listening for mailbox commands...
25,598,085 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,627,942 UART: [rt]cmd =0x46504c54, len=4
25,629,606 >>> mbox cmd response data (8 bytes)
25,630,569 UART: [rt] FIPS self test
25,631,513 UART: [kat] ++
25,631,963 UART: [kat] sha1
25,636,287 UART: [kat] SHA2-256
25,638,218 UART: [kat] SHA2-384
25,641,230 UART: [kat] SHA2-512-ACC
25,643,508 UART: [kat] ECC-384
28,071,216 UART: [kat] HMAC-384Kdf
28,077,063 UART: [kat] LMS
28,301,790 UART: Fatal Error: 0x90070002
28,337,171 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,481,848 >>> mbox cmd response: failed
28,482,524 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,627,303 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
15,010,430 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,614,073 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,439,595 ready_for_fw is high
3,439,990 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,781,362 >>> mbox cmd response: success
19,065,615 UART:
19,065,994 UART: Running Caliptra FMC ...
19,067,162 UART:
19,067,322 UART: [state] CFI Enabled
19,134,279 UART: [fht] FMC Alias Private Key: 7
20,898,051 UART: [art] Extend RT PCRs Done
20,899,270 UART: [art] Lock RT PCRs Done
20,901,062 UART: [art] Populate DV Done
20,906,553 UART: [fht] FMC Alias Private Key: 7
20,908,043 UART: [art] Derive CDI
20,908,812 UART: [art] Store in in slot 0x4
20,967,369 UART: [art] Derive Key Pair
20,968,404 UART: [art] Store priv key in slot 0x5
23,431,242 UART: [art] Derive Key Pair - Done
23,444,182 UART: [art] Signing Cert with AUTHO
23,445,485 UART: RITY.KEYID = 7
25,157,497 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,017 UART: [art] PUB.X = F5AAC222B57D6B7E28812F5217AC3EDEAA48D10D4DDA19C9B804265069E3FC4009D93E32DE125124B24A87AD336BF7E4
25,166,281 UART: [art] PUB.Y = 55CEA1A6F63981B0D77BE54A9DC1A7C696308BF3A53690C0A6A5FB85B811238AB81CB7887E77B66D0A797F6AF9F85231
25,173,548 UART: [art] SIG.R = 93CB5651D96E6C3720AE6CE9502BDFE87A54F8C6726BEF62C6188E7AC7F08EC2CBDF3E96C0803B244DAF4C6E87420EEB
25,180,961 UART: [art] SIG.S = 0D38EAEA3B17D77411EA89BEB2EB5F2EED36AD1BACD115CBB39E1ABBBA20BD659D823E89149E75CB4467B5FF9576535C
26,160,154 UART: Caliptra RT
26,160,849 UART: [state] CFI Enabled
26,325,704 UART: [rt] RT listening for mailbox commands...
26,327,579 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,357,204 UART: [rt]cmd =0x46504c54, len=4
26,358,948 >>> mbox cmd response data (8 bytes)
26,360,152 UART: [rt] FIPS self test
26,361,094 UART: [kat] ++
26,361,546 UART: [kat] sha1
26,366,109 UART: [kat] SHA2-256
26,368,038 UART: [kat] SHA2-384
26,371,007 UART: [kat] SHA2-512-ACC
26,373,282 UART: [kat] ECC-384
28,812,140 UART: [kat] HMAC-384Kdf
28,838,831 UART: [kat] LMS
29,063,453 UART: Fatal Error: 0x90070002
29,098,722 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,243,594 >>> mbox cmd response: failed
29,244,250 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,389,094 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,420,463 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,742,748 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,755,530 ready_for_fw is high
3,756,184 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,978,067 >>> mbox cmd response: success
19,233,278 UART:
19,233,680 UART: Running Caliptra FMC ...
19,234,829 UART:
19,234,990 UART: [state] CFI Enabled
19,242,838 UART: [fht] FMC Alias Private Key: 7
20,999,965 UART: [art] Extend RT PCRs Done
21,001,210 UART: [art] Lock RT PCRs Done
21,002,924 UART: [art] Populate DV Done
21,008,350 UART: [fht] FMC Alias Private Key: 7
21,009,844 UART: [art] Derive CDI
21,010,611 UART: [art] Store in in slot 0x4
21,052,615 UART: [art] Derive Key Pair
21,053,625 UART: [art] Store priv key in slot 0x5
23,480,349 UART: [art] Derive Key Pair - Done
23,493,241 UART: [art] Signing Cert with AUTHO
23,494,545 UART: RITY.KEYID = 7
25,199,582 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,094 UART: [art] PUB.X = 2CCAAF4C94907464AB29B4EF2F393FA7D77635414A758DA378FDE5DF6EF711D5F9C5F7289A57634123A3C77162EB9C22
25,208,379 UART: [art] PUB.Y = 399AA35E2F2F3F05A71B2168F440C92572D8EC4D252B4AB86A0BB5696FD175E94A2F30AFA69AD5D90E312FE8D0E81AD3
25,215,622 UART: [art] SIG.R = 107F9907574259D8D4A3C77A4CD4E3D2B58494693F77D3DA0E5786BD6139582F12244D36D8A22C950949D66B5F017A15
25,222,995 UART: [art] SIG.S = 29C94226733440A86B79B1D6F1101052E5CD624BA889556FF7D7C1F16F6AF71F382FF1CF96D9802DF6E2C19F9D5D6071
26,202,314 UART: Caliptra RT
26,203,021 UART: [state] CFI Enabled
26,320,465 UART: [rt] RT listening for mailbox commands...
26,322,314 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,351,853 UART: [rt]cmd =0x46504c54, len=4
26,353,626 >>> mbox cmd response data (8 bytes)
26,354,783 UART: [rt] FIPS self test
26,355,726 UART: [kat] ++
26,356,180 UART: [kat] sha1
26,360,851 UART: [kat] SHA2-256
26,362,724 UART: [kat] SHA2-384
26,365,682 UART: [kat] SHA2-512-ACC
26,367,921 UART: [kat] ECC-384
28,794,906 UART: [kat] HMAC-384Kdf
28,800,867 UART: [kat] LMS
29,025,564 UART: Fatal Error: 0x90070002
29,060,826 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,205,676 >>> mbox cmd response: failed
29,206,305 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
29,351,082 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
14,331,113 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,558,223 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,265 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,775 UART: [kat] SHA2-256
881,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,821 UART: [kat] ++
885,973 UART: [kat] sha1
890,115 UART: [kat] SHA2-256
892,053 UART: [kat] SHA2-384
895,056 UART: [kat] SHA2-512-ACC
896,957 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
906,844 UART: [kat] LMS
1,475,040 UART: [kat] --
1,475,969 UART: [cold-reset] ++
1,476,429 UART: [fht] Storing FHT @ 0x50003400
1,479,210 UART: [idev] ++
1,479,378 UART: [idev] CDI.KEYID = 6
1,479,738 UART: [idev] SUBJECT.KEYID = 7
1,480,162 UART: [idev] UDS.KEYID = 0
1,480,507 ready_for_fw is high
1,480,507 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,334 UART: [idev] Erasing UDS.KEYID = 0
1,504,444 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,918 UART: [idev] --
1,514,115 UART: [ldev] ++
1,514,283 UART: [ldev] CDI.KEYID = 6
1,514,646 UART: [ldev] SUBJECT.KEYID = 5
1,515,072 UART: [ldev] AUTHORITY.KEYID = 7
1,515,535 UART: [ldev] FE.KEYID = 1
1,520,877 UART: [ldev] Erasing FE.KEYID = 1
1,546,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,634 UART: [ldev] --
1,586,057 UART: [fwproc] Waiting for Commands...
1,586,688 UART: [fwproc] Received command 0x46574c44
1,587,479 UART: [fwproc] Received Image of size 115304 bytes
2,896,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,100 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,837 >>> mbox cmd response: success
3,092,001 UART: [afmc] ++
3,092,169 UART: [afmc] CDI.KEYID = 6
3,092,531 UART: [afmc] SUBJECT.KEYID = 7
3,092,956 UART: [afmc] AUTHORITY.KEYID = 5
3,127,925 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,143 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,756 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,446 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,251 UART: [afmc] --
3,171,251 UART: [cold-reset] --
3,172,017 UART: [state] Locking Datavault
3,173,102 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,706 UART: [state] Locking ICCM
3,174,148 UART: [exit] Launching FMC @ 0x40000130
3,179,477 UART:
3,179,493 UART: Running Caliptra FMC ...
3,179,901 UART:
3,179,955 UART: [state] CFI Enabled
3,190,356 UART: [fht] FMC Alias Private Key: 7
3,298,053 UART: [art] Extend RT PCRs Done
3,298,481 UART: [art] Lock RT PCRs Done
3,300,387 UART: [art] Populate DV Done
3,308,734 UART: [fht] FMC Alias Private Key: 7
3,309,740 UART: [art] Derive CDI
3,310,020 UART: [art] Store in in slot 0x4
3,395,483 UART: [art] Derive Key Pair
3,395,843 UART: [art] Store priv key in slot 0x5
3,408,149 UART: [art] Derive Key Pair - Done
3,423,070 UART: [art] Signing Cert with AUTHO
3,423,550 UART: RITY.KEYID = 7
3,439,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,083 UART: [art] PUB.X = B6525AE324D368CD1232D600AC7A1135F2ECDA06FE0E497760A2047D2D8A5D7C0883AE15FB7300438C8A938A31763286
3,446,797 UART: [art] PUB.Y = 7EFE8076112B52E0B802CB72CA19CBAFDD4057A7A9862A1D2D03B0E18F5C1C625273AA207FAD86C482D5AE527FBB1E77
3,453,757 UART: [art] SIG.R = 82FC0DEE1D797EDEF3C73B679D255B10652715065E3D42E75301FED8AC90B734B2042047DE46E5293873E6069DD4D070
3,460,512 UART: [art] SIG.S = 66CB34FCC5826D14DD24B380A740B446B298A53DA2B2E3EDBA2492466FC7BFF7AB1DB59484C652FB5363118ABAAF78FB
3,484,505 UART: Caliptra RT
3,484,758 UART: [state] CFI Enabled
3,593,223 UART: [rt] RT listening for mailbox commands...
3,593,886 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,401 UART: [rt]cmd =0x46504c54, len=4
3,624,518 >>> mbox cmd response data (8 bytes)
3,624,779 UART: [rt] FIPS self test
3,625,107 UART: [kat] ++
3,625,259 UART: [kat] sha1
3,629,657 UART: [kat] SHA2-256
3,631,679 UART: [kat] SHA2-384
3,634,500 UART: [kat] SHA2-512-ACC
3,636,427 UART: [kat] ECC-384
3,646,589 UART: [kat] HMAC-384Kdf
3,651,363 UART: [kat] LMS
3,922,530 UART: Fatal Error: 0x90070002
3,924,080 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,924,085 >>> mbox cmd response: failed
3,924,085 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,924,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,293 UART: [kat] SHA2-256
882,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,339 UART: [kat] ++
886,491 UART: [kat] sha1
890,743 UART: [kat] SHA2-256
892,681 UART: [kat] SHA2-384
895,388 UART: [kat] SHA2-512-ACC
897,289 UART: [kat] ECC-384
902,928 UART: [kat] HMAC-384Kdf
907,548 UART: [kat] LMS
1,475,744 UART: [kat] --
1,476,627 UART: [cold-reset] ++
1,477,137 UART: [fht] Storing FHT @ 0x50003400
1,479,870 UART: [idev] ++
1,480,038 UART: [idev] CDI.KEYID = 6
1,480,398 UART: [idev] SUBJECT.KEYID = 7
1,480,822 UART: [idev] UDS.KEYID = 0
1,481,167 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,678 UART: [idev] Erasing UDS.KEYID = 0
1,504,962 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,564 UART: [idev] --
1,514,421 UART: [ldev] ++
1,514,589 UART: [ldev] CDI.KEYID = 6
1,514,952 UART: [ldev] SUBJECT.KEYID = 5
1,515,378 UART: [ldev] AUTHORITY.KEYID = 7
1,515,841 UART: [ldev] FE.KEYID = 1
1,521,073 UART: [ldev] Erasing FE.KEYID = 1
1,545,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,570 UART: [ldev] --
1,584,909 UART: [fwproc] Waiting for Commands...
1,585,682 UART: [fwproc] Received command 0x46574c44
1,586,473 UART: [fwproc] Received Image of size 115304 bytes
2,896,280 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,087 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,241 ready_for_fw is high
1,362,241 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,283 >>> mbox cmd response: success
3,000,289 UART:
3,000,305 UART: Running Caliptra FMC ...
3,000,713 UART:
3,000,767 UART: [state] CFI Enabled
3,011,568 UART: [fht] FMC Alias Private Key: 7
3,120,195 UART: [art] Extend RT PCRs Done
3,120,623 UART: [art] Lock RT PCRs Done
3,122,103 UART: [art] Populate DV Done
3,130,466 UART: [fht] FMC Alias Private Key: 7
3,131,608 UART: [art] Derive CDI
3,131,888 UART: [art] Store in in slot 0x4
3,217,655 UART: [art] Derive Key Pair
3,218,015 UART: [art] Store priv key in slot 0x5
3,231,731 UART: [art] Derive Key Pair - Done
3,246,253 UART: [art] Signing Cert with AUTHO
3,246,733 UART: RITY.KEYID = 7
3,262,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,918 UART: [art] PUB.X = F7F884AFC93F3CB876FA0B67A688F87D591FCBE6B05BB4AF22A633B9514DF3F3DCAA510184FFC1D7EF5F2966C3033AE3
3,269,701 UART: [art] PUB.Y = 096B73C88A2819782193DF536F0D3D4B921336E933C97A9B23A190FD575B17573D2535744D06D515ED0BDCD11F925A21
3,276,633 UART: [art] SIG.R = D9C1DCDB66EBD5E82126C973FC98E22914B37C0D914D95C7FC55C4BB7D3A1DEA186BD4ECC710DCB338E186DAC6B4A18B
3,283,426 UART: [art] SIG.S = 2F54EB06C0A8AAD06E7825DC3E6613BB23EE3F99382C5FE5C2F62F512356B25DB0200D94BB1077697B1F3EC9216F70F7
3,307,121 UART: Caliptra RT
3,307,374 UART: [state] CFI Enabled
3,416,343 UART: [rt] RT listening for mailbox commands...
3,417,006 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,743 UART: [rt]cmd =0x46504c54, len=4
3,447,924 >>> mbox cmd response data (8 bytes)
3,448,103 UART: [rt] FIPS self test
3,448,431 UART: [kat] ++
3,448,583 UART: [kat] sha1
3,452,725 UART: [kat] SHA2-256
3,454,747 UART: [kat] SHA2-384
3,457,596 UART: [kat] SHA2-512-ACC
3,459,523 UART: [kat] ECC-384
3,470,001 UART: [kat] HMAC-384Kdf
3,474,353 UART: [kat] LMS
3,745,320 UART: Fatal Error: 0x90070002
3,746,870 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,746,875 >>> mbox cmd response: failed
3,746,875 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,746,880 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,989 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,489 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,362 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,884 UART: [kat] SHA2-256
881,815 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,930 UART: [kat] ++
886,082 UART: [kat] sha1
890,218 UART: [kat] SHA2-256
892,156 UART: [kat] SHA2-384
894,781 UART: [kat] SHA2-512-ACC
896,682 UART: [kat] ECC-384
902,087 UART: [kat] HMAC-384Kdf
906,703 UART: [kat] LMS
1,474,899 UART: [kat] --
1,475,634 UART: [cold-reset] ++
1,476,000 UART: [fht] Storing FHT @ 0x50003400
1,478,993 UART: [idev] ++
1,479,161 UART: [idev] CDI.KEYID = 6
1,479,521 UART: [idev] SUBJECT.KEYID = 7
1,479,945 UART: [idev] UDS.KEYID = 0
1,480,290 ready_for_fw is high
1,480,290 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,701 UART: [idev] Erasing UDS.KEYID = 0
1,504,361 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,111 UART: [idev] --
1,514,288 UART: [ldev] ++
1,514,456 UART: [ldev] CDI.KEYID = 6
1,514,819 UART: [ldev] SUBJECT.KEYID = 5
1,515,245 UART: [ldev] AUTHORITY.KEYID = 7
1,515,708 UART: [ldev] FE.KEYID = 1
1,521,096 UART: [ldev] Erasing FE.KEYID = 1
1,545,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,853 UART: [ldev] --
1,585,304 UART: [fwproc] Waiting for Commands...
1,586,001 UART: [fwproc] Received command 0x46574c44
1,586,792 UART: [fwproc] Received Image of size 115304 bytes
2,896,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,553 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,216 >>> mbox cmd response: success
3,090,228 UART: [afmc] ++
3,090,396 UART: [afmc] CDI.KEYID = 6
3,090,758 UART: [afmc] SUBJECT.KEYID = 7
3,091,183 UART: [afmc] AUTHORITY.KEYID = 5
3,126,376 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,774 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,554 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,167 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,857 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,762 UART: [afmc] --
3,169,868 UART: [cold-reset] --
3,170,750 UART: [state] Locking Datavault
3,171,987 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,591 UART: [state] Locking ICCM
3,173,027 UART: [exit] Launching FMC @ 0x40000130
3,178,356 UART:
3,178,372 UART: Running Caliptra FMC ...
3,178,780 UART:
3,178,923 UART: [state] CFI Enabled
3,189,570 UART: [fht] FMC Alias Private Key: 7
3,297,369 UART: [art] Extend RT PCRs Done
3,297,797 UART: [art] Lock RT PCRs Done
3,299,431 UART: [art] Populate DV Done
3,307,706 UART: [fht] FMC Alias Private Key: 7
3,308,760 UART: [art] Derive CDI
3,309,040 UART: [art] Store in in slot 0x4
3,394,999 UART: [art] Derive Key Pair
3,395,359 UART: [art] Store priv key in slot 0x5
3,408,609 UART: [art] Derive Key Pair - Done
3,423,350 UART: [art] Signing Cert with AUTHO
3,423,830 UART: RITY.KEYID = 7
3,439,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,085 UART: [art] PUB.X = 401965F4392A424DBEDEAEEEC35F6ECD07ACAB3F5B22DD6B3A55DCC7E5FD1989DF7486E90DCAAB990824A329CB940036
3,446,848 UART: [art] PUB.Y = 8E98CAE8E960D8E9DE4A6B844BFDB89C952E4C2ECDFFCEE5DA236072A0A40E4A2A3BBAAEC9EFDA58BC9335999A8E7311
3,453,827 UART: [art] SIG.R = 375C96022199E2246C2ECDFC2F2938846E9B1162DE30C8F55F8E4322326586D3ED51F80AAFF21C641215CD1D435B1B65
3,460,591 UART: [art] SIG.S = 83755AB4B57F192DBEB533709A8D5B1063BA3D14C48EFED2ABD8879BB26C32F9D9BFEFDA45DAABE39B6102B32C98D866
3,484,275 UART: Caliptra RT
3,484,620 UART: [state] CFI Enabled
3,592,697 UART: [rt] RT listening for mailbox commands...
3,593,360 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,021 UART: [rt]cmd =0x46504c54, len=4
3,624,274 >>> mbox cmd response data (8 bytes)
3,624,499 UART: [rt] FIPS self test
3,624,827 UART: [kat] ++
3,624,979 UART: [kat] sha1
3,629,075 UART: [kat] SHA2-256
3,631,097 UART: [kat] SHA2-384
3,634,028 UART: [kat] SHA2-512-ACC
3,635,955 UART: [kat] ECC-384
3,645,797 UART: [kat] HMAC-384Kdf
3,650,415 UART: [kat] LMS
3,921,438 UART: Fatal Error: 0x90070002
3,922,988 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,922,993 >>> mbox cmd response: failed
3,922,993 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,922,998 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,013 UART: [state] LifecycleState = Unprovisioned
86,668 UART: [state] DebugLocked = No
87,226 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,874 UART: [kat] SHA2-256
882,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,920 UART: [kat] ++
887,072 UART: [kat] sha1
891,542 UART: [kat] SHA2-256
893,480 UART: [kat] SHA2-384
896,219 UART: [kat] SHA2-512-ACC
898,120 UART: [kat] ECC-384
903,863 UART: [kat] HMAC-384Kdf
908,597 UART: [kat] LMS
1,476,793 UART: [kat] --
1,477,530 UART: [cold-reset] ++
1,477,974 UART: [fht] Storing FHT @ 0x50003400
1,480,817 UART: [idev] ++
1,480,985 UART: [idev] CDI.KEYID = 6
1,481,345 UART: [idev] SUBJECT.KEYID = 7
1,481,769 UART: [idev] UDS.KEYID = 0
1,482,114 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,490,073 UART: [idev] Erasing UDS.KEYID = 0
1,507,099 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,579 UART: [idev] --
1,516,398 UART: [ldev] ++
1,516,566 UART: [ldev] CDI.KEYID = 6
1,516,929 UART: [ldev] SUBJECT.KEYID = 5
1,517,355 UART: [ldev] AUTHORITY.KEYID = 7
1,517,818 UART: [ldev] FE.KEYID = 1
1,523,058 UART: [ldev] Erasing FE.KEYID = 1
1,547,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,085 UART: [ldev] --
1,587,406 UART: [fwproc] Waiting for Commands...
1,588,157 UART: [fwproc] Received command 0x46574c44
1,588,948 UART: [fwproc] Received Image of size 115304 bytes
2,899,367 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,269 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,621 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,008 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,992 ready_for_fw is high
1,362,992 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,892 >>> mbox cmd response: success
3,004,764 UART:
3,004,780 UART: Running Caliptra FMC ...
3,005,188 UART:
3,005,331 UART: [state] CFI Enabled
3,016,056 UART: [fht] FMC Alias Private Key: 7
3,123,361 UART: [art] Extend RT PCRs Done
3,123,789 UART: [art] Lock RT PCRs Done
3,125,433 UART: [art] Populate DV Done
3,133,472 UART: [fht] FMC Alias Private Key: 7
3,134,436 UART: [art] Derive CDI
3,134,716 UART: [art] Store in in slot 0x4
3,220,579 UART: [art] Derive Key Pair
3,220,939 UART: [art] Store priv key in slot 0x5
3,234,191 UART: [art] Derive Key Pair - Done
3,248,952 UART: [art] Signing Cert with AUTHO
3,249,432 UART: RITY.KEYID = 7
3,264,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,305 UART: [art] PUB.X = 325A1F849494E394360367AF649B467EC190187704620FE437EA2D05633382D069164964680F5F4096EB16C7B558B490
3,272,040 UART: [art] PUB.Y = 460C8F30250C147AA47E65F53532024FFE5B7A129EFB7E8B73908A1A17300A80D2EE10CD3754F6361750283B0B0E2E9E
3,278,972 UART: [art] SIG.R = 2D4151FCEC95CE822C3215A1E966D38B0318430A74AD0F0EADA9F0BEA1EF3DFA938764ADE26C5A96A28915AB04EB71D3
3,285,745 UART: [art] SIG.S = A1ED9B4946A57C9E5EB5D34C97E17758F568FDF462205D7D343AEB6C5FA287CCC12B5F3988176C17F9383B57312DB2A9
3,309,034 UART: Caliptra RT
3,309,379 UART: [state] CFI Enabled
3,418,208 UART: [rt] RT listening for mailbox commands...
3,418,871 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,778 UART: [rt]cmd =0x46504c54, len=4
3,450,101 >>> mbox cmd response data (8 bytes)
3,450,332 UART: [rt] FIPS self test
3,450,660 UART: [kat] ++
3,450,812 UART: [kat] sha1
3,454,846 UART: [kat] SHA2-256
3,456,868 UART: [kat] SHA2-384
3,459,853 UART: [kat] SHA2-512-ACC
3,461,780 UART: [kat] ECC-384
3,472,028 UART: [kat] HMAC-384Kdf
3,476,562 UART: [kat] LMS
3,747,705 UART: Fatal Error: 0x90070002
3,749,255 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,749,260 >>> mbox cmd response: failed
3,749,260 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,749,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,980 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,390 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
893,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,699 UART: [kat] ++
897,851 UART: [kat] sha1
901,977 UART: [kat] SHA2-256
903,917 UART: [kat] SHA2-384
906,890 UART: [kat] SHA2-512-ACC
908,791 UART: [kat] ECC-384
918,598 UART: [kat] HMAC-384Kdf
923,232 UART: [kat] LMS
1,171,560 UART: [kat] --
1,172,537 UART: [cold-reset] ++
1,172,901 UART: [fht] FHT @ 0x50003400
1,175,638 UART: [idev] ++
1,175,806 UART: [idev] CDI.KEYID = 6
1,176,166 UART: [idev] SUBJECT.KEYID = 7
1,176,590 UART: [idev] UDS.KEYID = 0
1,176,935 ready_for_fw is high
1,176,935 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,458 UART: [idev] Erasing UDS.KEYID = 0
1,200,995 UART: [idev] Sha1 KeyId Algorithm
1,209,275 UART: [idev] --
1,210,243 UART: [ldev] ++
1,210,411 UART: [ldev] CDI.KEYID = 6
1,210,774 UART: [ldev] SUBJECT.KEYID = 5
1,211,200 UART: [ldev] AUTHORITY.KEYID = 7
1,211,663 UART: [ldev] FE.KEYID = 1
1,216,871 UART: [ldev] Erasing FE.KEYID = 1
1,243,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,285 UART: [ldev] --
1,282,728 UART: [fwproc] Wait for Commands...
1,283,386 UART: [fwproc] Recv command 0x46574c44
1,284,114 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,587 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,970 >>> mbox cmd response: success
2,788,026 UART: [afmc] ++
2,788,194 UART: [afmc] CDI.KEYID = 6
2,788,556 UART: [afmc] SUBJECT.KEYID = 7
2,788,981 UART: [afmc] AUTHORITY.KEYID = 5
2,824,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,215 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,943 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,828 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,547 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,417 UART: [afmc] --
2,868,295 UART: [cold-reset] --
2,868,983 UART: [state] Locking Datavault
2,869,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,582 UART: [state] Locking ICCM
2,871,040 UART: [exit] Launching FMC @ 0x40000130
2,876,369 UART:
2,876,385 UART: Running Caliptra FMC ...
2,876,793 UART:
2,876,847 UART: [state] CFI Enabled
2,887,186 UART: [fht] FMC Alias Private Key: 7
2,995,061 UART: [art] Extend RT PCRs Done
2,995,489 UART: [art] Lock RT PCRs Done
2,997,087 UART: [art] Populate DV Done
3,005,194 UART: [fht] FMC Alias Private Key: 7
3,006,164 UART: [art] Derive CDI
3,006,444 UART: [art] Store in in slot 0x4
3,092,115 UART: [art] Derive Key Pair
3,092,475 UART: [art] Store priv key in slot 0x5
3,105,367 UART: [art] Derive Key Pair - Done
3,120,388 UART: [art] Signing Cert with AUTHO
3,120,868 UART: RITY.KEYID = 7
3,135,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,743 UART: [art] PUB.X = 90F06E6F61FEF7E525E59ECD55B8CFB6DAF8E0B7BAA03E1E627E56DA6305A726328E712640922B3EECC8725B9565AFB5
3,143,526 UART: [art] PUB.Y = DBE97A56AF963B5776D82812C3EC88C5C7BD66A29EC973403B1F26E258DC3D84D81A621A9788F5C010587E8AC427C5B1
3,150,482 UART: [art] SIG.R = B5C817D0A66FC01635DD86A95D4A90ABE3CD8DEFFB36D0AFD49D9E0CAF1C3DEB79E32FC7A88240EDFF0FA213F3E5488A
3,157,278 UART: [art] SIG.S = E703D8B98DB71E980419AE2992CFB5CEBFA31C6EC6A388659ACF57606642B2A91E58BC3CD54DBCDDD58D5423FE529906
3,181,292 UART: Caliptra RT
3,181,545 UART: [state] CFI Enabled
3,289,183 UART: [rt] RT listening for mailbox commands...
3,289,846 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,793 UART: [rt]cmd =0x46504c54, len=4
3,320,908 >>> mbox cmd response data (8 bytes)
3,321,063 UART: [rt] FIPS self test
3,321,391 UART: [kat] ++
3,321,543 UART: [kat] sha1
3,325,761 UART: [kat] SHA2-256
3,327,783 UART: [kat] SHA2-384
3,330,674 UART: [kat] SHA2-512-ACC
3,332,601 UART: [kat] ECC-384
3,342,745 UART: [kat] HMAC-384Kdf
3,347,513 UART: [kat] LMS
3,618,562 UART: Fatal Error: 0x90070002
3,620,112 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,620,117 >>> mbox cmd response: failed
3,620,117 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,620,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
893,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,497 UART: [kat] ++
897,649 UART: [kat] sha1
901,993 UART: [kat] SHA2-256
903,933 UART: [kat] SHA2-384
906,690 UART: [kat] SHA2-512-ACC
908,591 UART: [kat] ECC-384
918,200 UART: [kat] HMAC-384Kdf
922,844 UART: [kat] LMS
1,171,172 UART: [kat] --
1,172,247 UART: [cold-reset] ++
1,172,723 UART: [fht] FHT @ 0x50003400
1,175,526 UART: [idev] ++
1,175,694 UART: [idev] CDI.KEYID = 6
1,176,054 UART: [idev] SUBJECT.KEYID = 7
1,176,478 UART: [idev] UDS.KEYID = 0
1,176,823 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,590 UART: [idev] Erasing UDS.KEYID = 0
1,201,331 UART: [idev] Sha1 KeyId Algorithm
1,209,979 UART: [idev] --
1,210,889 UART: [ldev] ++
1,211,057 UART: [ldev] CDI.KEYID = 6
1,211,420 UART: [ldev] SUBJECT.KEYID = 5
1,211,846 UART: [ldev] AUTHORITY.KEYID = 7
1,212,309 UART: [ldev] FE.KEYID = 1
1,217,453 UART: [ldev] Erasing FE.KEYID = 1
1,243,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,645 UART: [ldev] --
1,282,956 UART: [fwproc] Wait for Commands...
1,283,680 UART: [fwproc] Recv command 0x46574c44
1,284,408 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,637 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,940 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,053 ready_for_fw is high
1,060,053 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,937 >>> mbox cmd response: success
2,702,513 UART:
2,702,529 UART: Running Caliptra FMC ...
2,702,937 UART:
2,702,991 UART: [state] CFI Enabled
2,713,268 UART: [fht] FMC Alias Private Key: 7
2,821,427 UART: [art] Extend RT PCRs Done
2,821,855 UART: [art] Lock RT PCRs Done
2,823,709 UART: [art] Populate DV Done
2,831,878 UART: [fht] FMC Alias Private Key: 7
2,832,822 UART: [art] Derive CDI
2,833,102 UART: [art] Store in in slot 0x4
2,918,967 UART: [art] Derive Key Pair
2,919,327 UART: [art] Store priv key in slot 0x5
2,932,195 UART: [art] Derive Key Pair - Done
2,946,845 UART: [art] Signing Cert with AUTHO
2,947,325 UART: RITY.KEYID = 7
2,962,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,348 UART: [art] PUB.X = A396DD7BE63C34B1B8F5707C7312BF3654EB695C00E38ACB3BF25060AD6F0F00E76778AD11855582E42E099DF035CA6F
2,970,076 UART: [art] PUB.Y = 1F3CE37161C7D1160B08390300A0342B7E382DA7C5799DB8A7EF34240C087B441904B3382B172D936C2D8424950590AA
2,976,973 UART: [art] SIG.R = 4FDBFC82C2312B8E1610908EB83D5A380BE4C94A5F3CAB516DF1143124031CDF606164DC538600E9B9925B8DB71EAA02
2,983,720 UART: [art] SIG.S = 81437C2F67654BA68AE95D4AE1F7A41D4188649408764C236B86414BD3D3686C08ED32F4A90D202992EB62646EF30280
3,007,333 UART: Caliptra RT
3,007,586 UART: [state] CFI Enabled
3,114,421 UART: [rt] RT listening for mailbox commands...
3,115,084 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,889 UART: [rt]cmd =0x46504c54, len=4
3,146,046 >>> mbox cmd response data (8 bytes)
3,146,355 UART: [rt] FIPS self test
3,146,683 UART: [kat] ++
3,146,835 UART: [kat] sha1
3,151,089 UART: [kat] SHA2-256
3,153,111 UART: [kat] SHA2-384
3,155,844 UART: [kat] SHA2-512-ACC
3,157,771 UART: [kat] ECC-384
3,167,715 UART: [kat] HMAC-384Kdf
3,172,303 UART: [kat] LMS
3,443,372 UART: Fatal Error: 0x90070002
3,444,922 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,444,927 >>> mbox cmd response: failed
3,444,927 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,444,932 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,581 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
893,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,006 UART: [kat] ++
898,158 UART: [kat] sha1
902,350 UART: [kat] SHA2-256
904,290 UART: [kat] SHA2-384
907,101 UART: [kat] SHA2-512-ACC
909,002 UART: [kat] ECC-384
918,787 UART: [kat] HMAC-384Kdf
923,459 UART: [kat] LMS
1,171,787 UART: [kat] --
1,172,716 UART: [cold-reset] ++
1,173,156 UART: [fht] FHT @ 0x50003400
1,175,773 UART: [idev] ++
1,175,941 UART: [idev] CDI.KEYID = 6
1,176,301 UART: [idev] SUBJECT.KEYID = 7
1,176,725 UART: [idev] UDS.KEYID = 0
1,177,070 ready_for_fw is high
1,177,070 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,857 UART: [idev] Erasing UDS.KEYID = 0
1,201,824 UART: [idev] Sha1 KeyId Algorithm
1,210,252 UART: [idev] --
1,211,366 UART: [ldev] ++
1,211,534 UART: [ldev] CDI.KEYID = 6
1,211,897 UART: [ldev] SUBJECT.KEYID = 5
1,212,323 UART: [ldev] AUTHORITY.KEYID = 7
1,212,786 UART: [ldev] FE.KEYID = 1
1,217,852 UART: [ldev] Erasing FE.KEYID = 1
1,244,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,064 UART: [ldev] --
1,283,481 UART: [fwproc] Wait for Commands...
1,284,093 UART: [fwproc] Recv command 0x46574c44
1,284,821 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,734 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,937 >>> mbox cmd response: success
2,789,979 UART: [afmc] ++
2,790,147 UART: [afmc] CDI.KEYID = 6
2,790,509 UART: [afmc] SUBJECT.KEYID = 7
2,790,934 UART: [afmc] AUTHORITY.KEYID = 5
2,825,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,589 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,308 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,194 UART: [afmc] --
2,869,304 UART: [cold-reset] --
2,870,240 UART: [state] Locking Datavault
2,871,429 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,033 UART: [state] Locking ICCM
2,872,653 UART: [exit] Launching FMC @ 0x40000130
2,877,982 UART:
2,877,998 UART: Running Caliptra FMC ...
2,878,406 UART:
2,878,549 UART: [state] CFI Enabled
2,889,322 UART: [fht] FMC Alias Private Key: 7
2,997,131 UART: [art] Extend RT PCRs Done
2,997,559 UART: [art] Lock RT PCRs Done
2,999,301 UART: [art] Populate DV Done
3,007,512 UART: [fht] FMC Alias Private Key: 7
3,008,566 UART: [art] Derive CDI
3,008,846 UART: [art] Store in in slot 0x4
3,094,193 UART: [art] Derive Key Pair
3,094,553 UART: [art] Store priv key in slot 0x5
3,108,045 UART: [art] Derive Key Pair - Done
3,122,705 UART: [art] Signing Cert with AUTHO
3,123,185 UART: RITY.KEYID = 7
3,138,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,402 UART: [art] PUB.X = 2D663503F354EBD1CC2735F29A7E617DA4E6F50F41B86A665090F2BEFB08D71A23B3BD5735EB312ADE9AF36A78FAD294
3,146,177 UART: [art] PUB.Y = 2A31DCD3427A435B798D77AE453D4D4AC37C542736BBA2FA440F33A503D382CD7B4A648B19A4DCA0A59E74475B2DB175
3,153,131 UART: [art] SIG.R = 4D51C9053712ED6F340FF0BD57D7EA681B89614BD9593A62BF66CB5BF34C058DC12996223586E1494B45E34579AB9292
3,159,890 UART: [art] SIG.S = A80DB83F00A9C10F0863C96141A9D6BDF1F2FC244A9C81C97B6030A025180A83941D5D04C1CF180C6B2502DE65E6A052
3,184,150 UART: Caliptra RT
3,184,495 UART: [state] CFI Enabled
3,293,632 UART: [rt] RT listening for mailbox commands...
3,294,295 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,330 UART: [rt]cmd =0x46504c54, len=4
3,325,483 >>> mbox cmd response data (8 bytes)
3,325,606 UART: [rt] FIPS self test
3,325,934 UART: [kat] ++
3,326,086 UART: [kat] sha1
3,330,338 UART: [kat] SHA2-256
3,332,360 UART: [kat] SHA2-384
3,335,135 UART: [kat] SHA2-512-ACC
3,337,062 UART: [kat] ECC-384
3,346,974 UART: [kat] HMAC-384Kdf
3,351,490 UART: [kat] LMS
3,622,653 UART: Fatal Error: 0x90070002
3,624,203 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,624,208 >>> mbox cmd response: failed
3,624,208 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,624,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
893,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,550 UART: [kat] ++
897,702 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,653 UART: [kat] SHA2-512-ACC
908,554 UART: [kat] ECC-384
918,077 UART: [kat] HMAC-384Kdf
922,833 UART: [kat] LMS
1,171,161 UART: [kat] --
1,171,896 UART: [cold-reset] ++
1,172,264 UART: [fht] FHT @ 0x50003400
1,174,887 UART: [idev] ++
1,175,055 UART: [idev] CDI.KEYID = 6
1,175,415 UART: [idev] SUBJECT.KEYID = 7
1,175,839 UART: [idev] UDS.KEYID = 0
1,176,184 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,849 UART: [idev] Erasing UDS.KEYID = 0
1,200,998 UART: [idev] Sha1 KeyId Algorithm
1,209,508 UART: [idev] --
1,210,504 UART: [ldev] ++
1,210,672 UART: [ldev] CDI.KEYID = 6
1,211,035 UART: [ldev] SUBJECT.KEYID = 5
1,211,461 UART: [ldev] AUTHORITY.KEYID = 7
1,211,924 UART: [ldev] FE.KEYID = 1
1,216,978 UART: [ldev] Erasing FE.KEYID = 1
1,243,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,420 UART: [ldev] --
1,282,785 UART: [fwproc] Wait for Commands...
1,283,367 UART: [fwproc] Recv command 0x46574c44
1,284,095 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,372 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,673 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,874 ready_for_fw is high
1,060,874 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,716 >>> mbox cmd response: success
2,702,844 UART:
2,702,860 UART: Running Caliptra FMC ...
2,703,268 UART:
2,703,411 UART: [state] CFI Enabled
2,714,354 UART: [fht] FMC Alias Private Key: 7
2,822,247 UART: [art] Extend RT PCRs Done
2,822,675 UART: [art] Lock RT PCRs Done
2,824,437 UART: [art] Populate DV Done
2,832,732 UART: [fht] FMC Alias Private Key: 7
2,833,746 UART: [art] Derive CDI
2,834,026 UART: [art] Store in in slot 0x4
2,919,247 UART: [art] Derive Key Pair
2,919,607 UART: [art] Store priv key in slot 0x5
2,933,113 UART: [art] Derive Key Pair - Done
2,948,237 UART: [art] Signing Cert with AUTHO
2,948,717 UART: RITY.KEYID = 7
2,963,999 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,764 UART: [art] PUB.X = CBB57560B08B85982ED360A7F30E78DDE6A65B792B32E98D5B44083114B21ED91F18F839A2769D12A806235CA2AA7DDF
2,971,531 UART: [art] PUB.Y = 60C0C9C0CC71AA7A30125F79B740B892A7C25167F2D02EA7A27122C20B4159EFC84C683FA635E1B6DA991CB83E85E9F5
2,978,486 UART: [art] SIG.R = DED24D8D3EDCEE9AB0CA02668972ECF7F9DD7FAB595490477DA2FEE25033231E0F221AF19BF0B72D381645F598FF1C0E
2,985,267 UART: [art] SIG.S = BF845AD6CC357E6AC720F5E36627CA4D0E6561D96932997775B4FB5177693C0E9697EF56DCB0FE47FEE06D4BB255B339
3,009,738 UART: Caliptra RT
3,010,083 UART: [state] CFI Enabled
3,119,075 UART: [rt] RT listening for mailbox commands...
3,119,738 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,701 UART: [rt]cmd =0x46504c54, len=4
3,150,792 >>> mbox cmd response data (8 bytes)
3,151,055 UART: [rt] FIPS self test
3,151,383 UART: [kat] ++
3,151,535 UART: [kat] sha1
3,155,837 UART: [kat] SHA2-256
3,157,859 UART: [kat] SHA2-384
3,160,934 UART: [kat] SHA2-512-ACC
3,162,861 UART: [kat] ECC-384
3,172,959 UART: [kat] HMAC-384Kdf
3,177,603 UART: [kat] LMS
3,448,630 UART: Fatal Error: 0x90070002
3,450,180 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,450,185 >>> mbox cmd response: failed
3,450,185 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,450,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,748 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,280 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,526 UART: [kat] HMAC-384Kdf
919,996 UART: [kat] LMS
1,168,308 UART: [kat] --
1,169,231 UART: [cold-reset] ++
1,169,589 UART: [fht] FHT @ 0x50003400
1,172,125 UART: [idev] ++
1,172,293 UART: [idev] CDI.KEYID = 6
1,172,654 UART: [idev] SUBJECT.KEYID = 7
1,173,079 UART: [idev] UDS.KEYID = 0
1,173,425 ready_for_fw is high
1,173,425 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,099 UART: [idev] Sha1 KeyId Algorithm
1,207,085 UART: [idev] --
1,208,246 UART: [ldev] ++
1,208,414 UART: [ldev] CDI.KEYID = 6
1,208,778 UART: [ldev] SUBJECT.KEYID = 5
1,209,205 UART: [ldev] AUTHORITY.KEYID = 7
1,209,668 UART: [ldev] FE.KEYID = 1
1,214,550 UART: [ldev] Erasing FE.KEYID = 1
1,240,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,780 UART: [ldev] --
1,280,256 UART: [fwproc] Wait for Commands...
1,280,967 UART: [fwproc] Recv command 0x46574c44
1,281,700 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,874 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,200 >>> mbox cmd response: success
2,786,451 UART: [afmc] ++
2,786,619 UART: [afmc] CDI.KEYID = 6
2,786,982 UART: [afmc] SUBJECT.KEYID = 7
2,787,408 UART: [afmc] AUTHORITY.KEYID = 5
2,822,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,054 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,783 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,666 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,385 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,270 UART: [afmc] --
2,866,278 UART: [cold-reset] --
2,867,000 UART: [state] Locking Datavault
2,868,163 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,767 UART: [state] Locking ICCM
2,869,289 UART: [exit] Launching FMC @ 0x40000130
2,874,618 UART:
2,874,634 UART: Running Caliptra FMC ...
2,875,042 UART:
2,875,096 UART: [state] CFI Enabled
2,885,261 UART: [fht] FMC Alias Private Key: 7
2,993,424 UART: [art] Extend RT PCRs Done
2,993,852 UART: [art] Lock RT PCRs Done
2,995,484 UART: [art] Populate DV Done
3,003,539 UART: [fht] FMC Alias Private Key: 7
3,004,497 UART: [art] Derive CDI
3,004,777 UART: [art] Store in in slot 0x4
3,090,698 UART: [art] Derive Key Pair
3,091,058 UART: [art] Store priv key in slot 0x5
3,104,402 UART: [art] Derive Key Pair - Done
3,119,095 UART: [art] Signing Cert with AUTHO
3,119,575 UART: RITY.KEYID = 7
3,134,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,600 UART: [art] PUB.X = CCA544EE79E59489635C70ACA93E2108EC7A5D15FD3AF269DF8D5B56EC6DDDCF6B5876D00596085EBCBEA38CA33E4F9A
3,142,385 UART: [art] PUB.Y = EF9ABBB1CB02DC176A6B40C81C7E5EF1652962EC8B31F4068A62D1E4221BFB7EAB9CA279486E2A4C4A6A8C0C8B87D45C
3,149,348 UART: [art] SIG.R = 2016400C368BDE468F9A5B89272AF1F11536B8B6D4FD028F29B75CE3A59422CB7EACB15EF686C1300D56048845995BE0
3,156,108 UART: [art] SIG.S = DA34B40A7F00053E4D7C096706202BFCB59A25019D54D584FDF1FE62D218CDC545AF82027B9BF1A3E2885B144B5B65AC
3,179,511 UART: Caliptra RT
3,179,764 UART: [state] CFI Enabled
3,288,221 UART: [rt] RT listening for mailbox commands...
3,288,884 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,935 UART: [rt]cmd =0x46504c54, len=4
3,320,220 >>> mbox cmd response data (8 bytes)
3,320,385 UART: [rt] FIPS self test
3,320,713 UART: [kat] ++
3,320,865 UART: [kat] sha1
3,325,001 UART: [kat] SHA2-256
3,327,023 UART: [kat] SHA2-384
3,329,824 UART: [kat] SHA2-512-ACC
3,331,751 UART: [kat] ECC-384
3,341,473 UART: [kat] HMAC-384Kdf
3,346,077 UART: [kat] LMS
3,617,250 UART: Fatal Error: 0x90070002
3,618,800 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,618,805 >>> mbox cmd response: failed
3,618,805 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,618,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,338 UART: [kat] HMAC-384Kdf
920,900 UART: [kat] LMS
1,169,212 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,199,263 UART: [idev] Sha1 KeyId Algorithm
1,208,099 UART: [idev] --
1,209,228 UART: [ldev] ++
1,209,396 UART: [ldev] CDI.KEYID = 6
1,209,760 UART: [ldev] SUBJECT.KEYID = 5
1,210,187 UART: [ldev] AUTHORITY.KEYID = 7
1,210,650 UART: [ldev] FE.KEYID = 1
1,216,036 UART: [ldev] Erasing FE.KEYID = 1
1,242,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,020 UART: [ldev] --
1,281,394 UART: [fwproc] Wait for Commands...
1,282,119 UART: [fwproc] Recv command 0x46574c44
1,282,852 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,682 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,928 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,124 ready_for_fw is high
1,055,124 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,256 >>> mbox cmd response: success
2,697,620 UART:
2,697,636 UART: Running Caliptra FMC ...
2,698,044 UART:
2,698,098 UART: [state] CFI Enabled
2,708,695 UART: [fht] FMC Alias Private Key: 7
2,817,338 UART: [art] Extend RT PCRs Done
2,817,766 UART: [art] Lock RT PCRs Done
2,819,456 UART: [art] Populate DV Done
2,827,679 UART: [fht] FMC Alias Private Key: 7
2,828,677 UART: [art] Derive CDI
2,828,957 UART: [art] Store in in slot 0x4
2,915,134 UART: [art] Derive Key Pair
2,915,494 UART: [art] Store priv key in slot 0x5
2,928,270 UART: [art] Derive Key Pair - Done
2,942,772 UART: [art] Signing Cert with AUTHO
2,943,252 UART: RITY.KEYID = 7
2,958,378 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,143 UART: [art] PUB.X = 1AF571A827221A7C4C9DE247550F3F97662594144A64DEF501E5F8814D85BF3B33A7E4F8BBF2099C4C3BDC12535BBA13
2,965,910 UART: [art] PUB.Y = ADADFEDCB3C9426A645041F7DFE20D8867C5A6F9E70A15F0F4CDBA54C8F7C4B063F2A657AAB2E8D638D8D567D1F2B5A7
2,972,880 UART: [art] SIG.R = 4E304413D9AB73A1525A307EF9CA5692A7143F2E5CD5D46F003A1C7758C463460356CF1A9C9C3631957D72EBEE669FD5
2,979,627 UART: [art] SIG.S = 2311CB167308EB7D9881320223CE231D30BA3E0C449742759AC5A22EE0824BF5FA6D5376C92921FE6129E7BE527AAADE
3,003,379 UART: Caliptra RT
3,003,632 UART: [state] CFI Enabled
3,111,513 UART: [rt] RT listening for mailbox commands...
3,112,176 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,203 UART: [rt]cmd =0x46504c54, len=4
3,143,200 >>> mbox cmd response data (8 bytes)
3,143,501 UART: [rt] FIPS self test
3,143,829 UART: [kat] ++
3,143,981 UART: [kat] sha1
3,147,999 UART: [kat] SHA2-256
3,150,021 UART: [kat] SHA2-384
3,152,708 UART: [kat] SHA2-512-ACC
3,154,635 UART: [kat] ECC-384
3,164,787 UART: [kat] HMAC-384Kdf
3,169,391 UART: [kat] LMS
3,440,450 UART: Fatal Error: 0x90070002
3,442,000 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,442,005 >>> mbox cmd response: failed
3,442,005 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,442,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,404 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,804 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,459 UART: [kat] HMAC-384Kdf
921,209 UART: [kat] LMS
1,169,521 UART: [kat] --
1,170,650 UART: [cold-reset] ++
1,171,048 UART: [fht] FHT @ 0x50003400
1,173,602 UART: [idev] ++
1,173,770 UART: [idev] CDI.KEYID = 6
1,174,131 UART: [idev] SUBJECT.KEYID = 7
1,174,556 UART: [idev] UDS.KEYID = 0
1,174,902 ready_for_fw is high
1,174,902 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,834 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,927 UART: [ldev] ++
1,210,095 UART: [ldev] CDI.KEYID = 6
1,210,459 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,927 UART: [ldev] Erasing FE.KEYID = 1
1,243,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,099 UART: [ldev] --
1,282,593 UART: [fwproc] Wait for Commands...
1,283,338 UART: [fwproc] Recv command 0x46574c44
1,284,071 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,121 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,293 >>> mbox cmd response: success
2,787,438 UART: [afmc] ++
2,787,606 UART: [afmc] CDI.KEYID = 6
2,787,969 UART: [afmc] SUBJECT.KEYID = 7
2,788,395 UART: [afmc] AUTHORITY.KEYID = 5
2,823,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,219 UART: [afmc] --
2,867,263 UART: [cold-reset] --
2,868,163 UART: [state] Locking Datavault
2,869,340 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,944 UART: [state] Locking ICCM
2,870,464 UART: [exit] Launching FMC @ 0x40000130
2,875,793 UART:
2,875,809 UART: Running Caliptra FMC ...
2,876,217 UART:
2,876,360 UART: [state] CFI Enabled
2,887,205 UART: [fht] FMC Alias Private Key: 7
2,994,844 UART: [art] Extend RT PCRs Done
2,995,272 UART: [art] Lock RT PCRs Done
2,996,876 UART: [art] Populate DV Done
3,005,213 UART: [fht] FMC Alias Private Key: 7
3,006,179 UART: [art] Derive CDI
3,006,459 UART: [art] Store in in slot 0x4
3,092,078 UART: [art] Derive Key Pair
3,092,438 UART: [art] Store priv key in slot 0x5
3,106,726 UART: [art] Derive Key Pair - Done
3,121,399 UART: [art] Signing Cert with AUTHO
3,121,879 UART: RITY.KEYID = 7
3,137,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,198 UART: [art] PUB.X = E6C254A2F0F948337911013871F88361FE82C73D3CFD685AB2C3954FD212C4275B5D7867F0CC0EC0486EA08F1D47902A
3,144,962 UART: [art] PUB.Y = D1E497544F19264280FC7306E7D481C81AD4ACD0F3E98CAB8F34055564469D88D2D774A975A74294811E7B3D51B1B1D3
3,151,904 UART: [art] SIG.R = 07987A282F4D6F0E29A513DCDB0143C4CE46F592E5A59CEE6B9B7D09BC537C239F757B3D48672D11685F21B0F238D620
3,158,666 UART: [art] SIG.S = C23C5EBE3FE8D5FD729AC9FEEC05BA7D83C9764349EBD1734898510BF2F5713C3C398979C849E0B2A489DD2EF2619CB6
3,182,017 UART: Caliptra RT
3,182,362 UART: [state] CFI Enabled
3,290,879 UART: [rt] RT listening for mailbox commands...
3,291,542 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,293 UART: [rt]cmd =0x46504c54, len=4
3,322,418 >>> mbox cmd response data (8 bytes)
3,322,783 UART: [rt] FIPS self test
3,323,111 UART: [kat] ++
3,323,263 UART: [kat] sha1
3,327,465 UART: [kat] SHA2-256
3,329,487 UART: [kat] SHA2-384
3,332,288 UART: [kat] SHA2-512-ACC
3,334,215 UART: [kat] ECC-384
3,344,017 UART: [kat] HMAC-384Kdf
3,348,631 UART: [kat] LMS
3,619,806 UART: Fatal Error: 0x90070002
3,621,356 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,621,361 >>> mbox cmd response: failed
3,621,361 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,621,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,902 UART: [kat] ++
896,054 UART: [kat] sha1
900,422 UART: [kat] SHA2-256
902,362 UART: [kat] SHA2-384
905,059 UART: [kat] SHA2-512-ACC
906,960 UART: [kat] ECC-384
916,817 UART: [kat] HMAC-384Kdf
921,403 UART: [kat] LMS
1,169,715 UART: [kat] --
1,170,620 UART: [cold-reset] ++
1,171,144 UART: [fht] FHT @ 0x50003400
1,173,786 UART: [idev] ++
1,173,954 UART: [idev] CDI.KEYID = 6
1,174,315 UART: [idev] SUBJECT.KEYID = 7
1,174,740 UART: [idev] UDS.KEYID = 0
1,175,086 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,746 UART: [idev] Erasing UDS.KEYID = 0
1,199,958 UART: [idev] Sha1 KeyId Algorithm
1,208,730 UART: [idev] --
1,209,771 UART: [ldev] ++
1,209,939 UART: [ldev] CDI.KEYID = 6
1,210,303 UART: [ldev] SUBJECT.KEYID = 5
1,210,730 UART: [ldev] AUTHORITY.KEYID = 7
1,211,193 UART: [ldev] FE.KEYID = 1
1,216,743 UART: [ldev] Erasing FE.KEYID = 1
1,243,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,991 UART: [ldev] --
1,282,427 UART: [fwproc] Wait for Commands...
1,283,166 UART: [fwproc] Recv command 0x46574c44
1,283,899 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,833 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,051 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,499 ready_for_fw is high
1,056,499 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,193 >>> mbox cmd response: success
2,697,609 UART:
2,697,625 UART: Running Caliptra FMC ...
2,698,033 UART:
2,698,176 UART: [state] CFI Enabled
2,708,815 UART: [fht] FMC Alias Private Key: 7
2,816,932 UART: [art] Extend RT PCRs Done
2,817,360 UART: [art] Lock RT PCRs Done
2,818,766 UART: [art] Populate DV Done
2,826,943 UART: [fht] FMC Alias Private Key: 7
2,828,081 UART: [art] Derive CDI
2,828,361 UART: [art] Store in in slot 0x4
2,913,876 UART: [art] Derive Key Pair
2,914,236 UART: [art] Store priv key in slot 0x5
2,927,610 UART: [art] Derive Key Pair - Done
2,942,428 UART: [art] Signing Cert with AUTHO
2,942,908 UART: RITY.KEYID = 7
2,957,908 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,673 UART: [art] PUB.X = 53860B6B28A074F4701122AF1F2FC046C62EEBF6F43161591A19E76CC34D89B43CC6096F8DE8FA0CD4431EA9C207C025
2,965,437 UART: [art] PUB.Y = BF8B071BC649CF2FC446AA8E887E9F8DABE4D14D7848B49AC5CB8968D53AEE1932ED194134703D8AF8AE5C1955D728EB
2,972,402 UART: [art] SIG.R = 3DD9EE60244C8AAD4779BED82EE2C033CEDE294484DE3FBF63B4595417EFB17AA5800C336BF3EAC95DC615B2BE329C45
2,979,189 UART: [art] SIG.S = 51878A2A314A35C52F4E14DCB2AFAFD5BC54B3037A783CD70A3DF44D98E4CEF826A76CD4E91C1158C58CBD99E75B4EA5
3,002,874 UART: Caliptra RT
3,003,219 UART: [state] CFI Enabled
3,111,450 UART: [rt] RT listening for mailbox commands...
3,112,113 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,860 UART: [rt]cmd =0x46504c54, len=4
3,142,883 >>> mbox cmd response data (8 bytes)
3,142,996 UART: [rt] FIPS self test
3,143,324 UART: [kat] ++
3,143,476 UART: [kat] sha1
3,147,808 UART: [kat] SHA2-256
3,149,830 UART: [kat] SHA2-384
3,152,617 UART: [kat] SHA2-512-ACC
3,154,544 UART: [kat] ECC-384
3,164,806 UART: [kat] HMAC-384Kdf
3,169,406 UART: [kat] LMS
3,440,443 UART: Fatal Error: 0x90070002
3,441,993 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,441,998 >>> mbox cmd response: failed
3,441,998 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,442,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,001 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,067 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
2,670,972 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,815,159 >>> mbox cmd response: failed
2,815,718 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,959,054 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,878,013 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,441,517 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
2,672,571 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,816,815 >>> mbox cmd response: failed
2,817,377 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,960,718 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
4,866,474 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,447,361 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,015,967 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,160,178 >>> mbox cmd response: failed
3,160,736 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,304,053 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
21,589,397 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,037,352 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,020,967 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,165,467 >>> mbox cmd response: failed
3,166,037 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,309,412 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
21,578,736 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,010,887 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
2,681,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,826,086 >>> mbox cmd response: failed
2,826,670 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,970,418 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,473,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,324,509 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
2,673,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,818,306 >>> mbox cmd response: failed
2,818,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,962,642 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,420,669 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,252,101 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
3,053,500 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,198,112 >>> mbox cmd response: failed
3,198,697 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,342,401 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,176,399 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,909,025 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
3,044,250 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,188,890 >>> mbox cmd response: failed
3,189,459 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,333,230 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
20,172,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,913,567 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
2,677,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,822,610 >>> mbox cmd response: failed
2,823,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,966,939 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,434,423 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,291,573 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
3,034,985 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,179,645 >>> mbox cmd response: failed
3,180,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,323,985 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,182,706 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,899,576 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,640 >>> mbox cmd response: failed
803,640 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,162 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,300 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,308 >>> mbox cmd response: failed
803,308 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,597 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,446 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,031 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,039 >>> mbox cmd response: failed
804,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,156 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,735 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,105 >>> mbox cmd response: failed
804,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,111 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,388 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,993 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,508 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,516 >>> mbox cmd response: failed
803,516 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,522 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,665 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,892 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,580 >>> mbox cmd response: failed
803,580 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,266 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,831 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,839 >>> mbox cmd response: failed
803,839 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,810 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,253 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,703 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,711 >>> mbox cmd response: failed
803,711 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,565 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,902 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,910 >>> mbox cmd response: failed
803,910 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,289 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,630 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,826 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,834 >>> mbox cmd response: failed
803,834 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
803,840 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,382 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,579 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,587 >>> mbox cmd response: failed
804,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,115 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,291 >>> mbox cmd response: failed
804,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
804,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,709 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,068 UART:
192,435 UART: Running Caliptra ROM ...
193,516 UART:
193,658 UART: [state] CFI Enabled
261,336 UART: [state] LifecycleState = Unprovisioned
263,264 UART: [state] DebugLocked = No
265,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,832 UART: [kat] SHA2-256
439,522 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,003 UART: [kat] ++
450,527 UART: [kat] sha1
460,792 UART: [kat] SHA2-256
463,424 UART: [kat] SHA2-384
467,584 UART: [kat] SHA2-512-ACC
469,964 UART: [kat] ECC-384
2,766,928 UART: [kat] HMAC-384Kdf
2,778,918 UART: [kat] LMS
3,969,183 UART: [kat] --
3,972,572 UART: [cold-reset] ++
3,975,077 UART: [fht] Storing FHT @ 0x50003400
3,986,543 UART: [idev] ++
3,987,150 UART: [idev] CDI.KEYID = 6
3,988,103 UART: [idev] SUBJECT.KEYID = 7
3,989,288 UART: [idev] UDS.KEYID = 0
3,990,329 ready_for_fw is high
3,990,566 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,135,138 UART: [idev] Erasing UDS.KEYID = 0
7,324,707 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,170 UART: [idev] --
7,350,711 UART: [ldev] ++
7,351,288 UART: [ldev] CDI.KEYID = 6
7,352,227 UART: [ldev] SUBJECT.KEYID = 5
7,353,441 UART: [ldev] AUTHORITY.KEYID = 7
7,354,730 UART: [ldev] FE.KEYID = 1
7,400,564 UART: [ldev] Erasing FE.KEYID = 1
10,733,135 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,178 UART: [ldev] --
13,093,202 UART: [fwproc] Waiting for Commands...
13,096,270 UART: [fwproc] Received command 0x46574c44
13,098,510 UART: [fwproc] Received Image of size 114996 bytes
17,159,372 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,887 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,621,887 >>> mbox cmd response: success
17,625,168 UART: [afmc] ++
17,625,760 UART: [afmc] CDI.KEYID = 6
17,626,725 UART: [afmc] SUBJECT.KEYID = 7
17,627,939 UART: [afmc] AUTHORITY.KEYID = 5
20,988,896 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,253 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,524 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,919 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,774 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,192 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,395 UART: [afmc] --
23,359,650 UART: [cold-reset] --
23,363,189 UART: [state] Locking Datavault
23,370,161 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,915 UART: [state] Locking ICCM
23,373,257 UART: [exit] Launching FMC @ 0x40000130
23,381,654 UART:
23,381,904 UART: Running Caliptra FMC ...
23,383,006 UART:
23,383,173 UART: [state] CFI Enabled
23,447,744 UART: [fht] FMC Alias Private Key: 7
25,786,175 UART: [art] Extend RT PCRs Done
25,787,423 UART: [art] Lock RT PCRs Done
25,789,159 UART: [art] Populate DV Done
25,794,524 UART: [fht] FMC Alias Private Key: 7
25,796,060 UART: [art] Derive CDI
25,796,878 UART: [art] Store in in slot 0x4
25,857,716 UART: [art] Derive Key Pair
25,858,766 UART: [art] Store priv key in slot 0x5
29,151,044 UART: [art] Derive Key Pair - Done
29,163,948 UART: [art] Signing Cert with AUTHO
29,165,260 UART: RITY.KEYID = 7
31,453,192 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,716 UART: [art] PUB.X = 64DFC135CC3AF63B37409F173AF700147CC8202C454A505FCF6D38B4B4F69A67AB778C7D5F7B0771A9D2BF40795FB61F
31,461,978 UART: [art] PUB.Y = 28912A003890714D63295B9C1DF946E8ED17A10BEB8145360F4DF17D7A37DC490D9836B13106DE4CAF4FF906CEA0C235
31,469,219 UART: [art] SIG.R = F0501F98C406E00C370FA20967C8F64F603C4BA0708E58D2CC129D994272BBFEEB36335003D7DB1ECCDD434DA2A873EC
31,476,579 UART: [art] SIG.S = 9931F92543928B9963798FE4E4275518AD13DD2E36980BC6CF5985DEF0CAEB648F316C519FFC970D6597425FC529211C
32,782,191 UART: Caliptra RT
32,782,921 UART: [state] CFI Enabled
32,943,217 UART: [rt] RT listening for mailbox commands...
32,945,081 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,974,708 UART: [rt]cmd =0x46504c54, len=4
32,976,260 >>> mbox cmd response data (8 bytes)
32,977,555 UART: [rt] FIPS self test
32,978,499 UART: [kat] ++
32,978,953 UART: [kat] sha1
32,979,495 UART: Fatal Error: 0x90060001
33,014,586 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,159,017 >>> mbox cmd response: failed
33,159,651 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,304,111 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,086 UART:
190,389 UART: Running Caliptra ROM ...
191,501 UART:
191,649 UART: [state] CFI Enabled
264,184 UART: [state] LifecycleState = Unprovisioned
266,149 UART: [state] DebugLocked = No
269,156 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,806 UART: [kat] SHA2-256
444,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,995 UART: [kat] ++
455,464 UART: [kat] sha1
465,696 UART: [kat] SHA2-256
468,380 UART: [kat] SHA2-384
473,383 UART: [kat] SHA2-512-ACC
475,721 UART: [kat] ECC-384
2,763,700 UART: [kat] HMAC-384Kdf
2,775,828 UART: [kat] LMS
3,966,089 UART: [kat] --
3,972,355 UART: [cold-reset] ++
3,974,827 UART: [fht] Storing FHT @ 0x50003400
3,986,210 UART: [idev] ++
3,986,779 UART: [idev] CDI.KEYID = 6
3,987,798 UART: [idev] SUBJECT.KEYID = 7
3,988,960 UART: [idev] UDS.KEYID = 0
3,990,584 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,135,249 UART: [idev] Erasing UDS.KEYID = 0
7,322,665 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,801 UART: [idev] --
7,349,067 UART: [ldev] ++
7,349,640 UART: [ldev] CDI.KEYID = 6
7,350,577 UART: [ldev] SUBJECT.KEYID = 5
7,351,792 UART: [ldev] AUTHORITY.KEYID = 7
7,353,093 UART: [ldev] FE.KEYID = 1
7,398,902 UART: [ldev] Erasing FE.KEYID = 1
10,728,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,051,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,713 UART: [ldev] --
13,091,938 UART: [fwproc] Waiting for Commands...
13,094,633 UART: [fwproc] Received command 0x46574c44
13,096,825 UART: [fwproc] Received Image of size 114996 bytes
17,158,073 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,234,283 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,303,155 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,622,875 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,774,154 ready_for_fw is high
3,774,673 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,879,128 >>> mbox cmd response: success
23,564,507 UART:
23,564,912 UART: Running Caliptra FMC ...
23,566,030 UART:
23,566,192 UART: [state] CFI Enabled
23,635,815 UART: [fht] FMC Alias Private Key: 7
25,973,525 UART: [art] Extend RT PCRs Done
25,974,757 UART: [art] Lock RT PCRs Done
25,976,685 UART: [art] Populate DV Done
25,982,110 UART: [fht] FMC Alias Private Key: 7
25,983,702 UART: [art] Derive CDI
25,984,439 UART: [art] Store in in slot 0x4
26,043,648 UART: [art] Derive Key Pair
26,044,693 UART: [art] Store priv key in slot 0x5
29,336,676 UART: [art] Derive Key Pair - Done
29,349,519 UART: [art] Signing Cert with AUTHO
29,350,848 UART: RITY.KEYID = 7
31,637,902 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,549 UART: [art] PUB.X = 273A1296FCD6BEC2BB46861F85B27D8CC27FC6E7DB59A04A8331CBCDEC05C59805D999D5DA7CCD0379A5ACFF64120413
31,646,638 UART: [art] PUB.Y = CD2623AFAE87C7DAD31022BB8DA3408AA089CC8D42A53C796816F42DF47565E35B12180BE5340FA14F1381176FF8CD5B
31,653,900 UART: [art] SIG.R = B952565D03C6A5C949EBFCEB844E75BAA54D3ECB92F9E0A304039E5A511284197576C019F21AC959F08040CE73505624
31,661,240 UART: [art] SIG.S = 50F5F876F8551C7F2A19C0C6ABF7492255F64820D47FE6D3E1F9C342938565D6BE9DCD8A169BAC25BE95C23D7CD6A4EB
32,966,159 UART: Caliptra RT
32,966,858 UART: [state] CFI Enabled
33,127,798 UART: [rt] RT listening for mailbox commands...
33,129,652 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,159,230 UART: [rt]cmd =0x46504c54, len=4
33,160,739 >>> mbox cmd response data (8 bytes)
33,161,635 UART: [rt] FIPS self test
33,162,524 UART: [kat] ++
33,162,969 UART: [kat] sha1
33,163,838 UART: Fatal Error: 0x90060001
33,199,074 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,343,512 >>> mbox cmd response: failed
33,344,153 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,488,930 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,801,204 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,890,929 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,561 UART:
192,945 UART: Running Caliptra ROM ...
194,076 UART:
603,638 UART: [state] CFI Enabled
617,454 UART: [state] LifecycleState = Unprovisioned
619,402 UART: [state] DebugLocked = No
621,210 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,647 UART: [kat] SHA2-256
796,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,916 UART: [kat] ++
807,358 UART: [kat] sha1
817,186 UART: [kat] SHA2-256
819,930 UART: [kat] SHA2-384
825,429 UART: [kat] SHA2-512-ACC
827,809 UART: [kat] ECC-384
3,112,054 UART: [kat] HMAC-384Kdf
3,123,868 UART: [kat] LMS
4,313,989 UART: [kat] --
4,317,928 UART: [cold-reset] ++
4,319,652 UART: [fht] Storing FHT @ 0x50003400
4,330,638 UART: [idev] ++
4,331,213 UART: [idev] CDI.KEYID = 6
4,332,126 UART: [idev] SUBJECT.KEYID = 7
4,333,385 UART: [idev] UDS.KEYID = 0
4,334,332 ready_for_fw is high
4,334,525 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,478,986 UART: [idev] Erasing UDS.KEYID = 0
7,621,980 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,760 UART: [idev] --
7,649,201 UART: [ldev] ++
7,649,794 UART: [ldev] CDI.KEYID = 6
7,650,713 UART: [ldev] SUBJECT.KEYID = 5
7,651,931 UART: [ldev] AUTHORITY.KEYID = 7
7,653,219 UART: [ldev] FE.KEYID = 1
7,664,838 UART: [ldev] Erasing FE.KEYID = 1
10,954,161 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,823 UART: [ldev] --
13,315,982 UART: [fwproc] Waiting for Commands...
13,318,723 UART: [fwproc] Received command 0x46574c44
13,320,896 UART: [fwproc] Received Image of size 114996 bytes
17,384,969 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,460,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,529,730 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,849,848 >>> mbox cmd response: success
17,854,028 UART: [afmc] ++
17,854,631 UART: [afmc] CDI.KEYID = 6
17,855,600 UART: [afmc] SUBJECT.KEYID = 7
17,856,818 UART: [afmc] AUTHORITY.KEYID = 5
21,170,269 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,466,787 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,469,053 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,483,470 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,498,283 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,512,714 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,533,295 UART: [afmc] --
23,537,911 UART: [cold-reset] --
23,542,118 UART: [state] Locking Datavault
23,547,695 UART: [state] Locking PCR0, PCR1 and PCR31
23,549,396 UART: [state] Locking ICCM
23,551,704 UART: [exit] Launching FMC @ 0x40000130
23,560,094 UART:
23,560,375 UART: Running Caliptra FMC ...
23,561,485 UART:
23,561,649 UART: [state] CFI Enabled
23,569,590 UART: [fht] FMC Alias Private Key: 7
25,900,590 UART: [art] Extend RT PCRs Done
25,901,813 UART: [art] Lock RT PCRs Done
25,903,608 UART: [art] Populate DV Done
25,909,076 UART: [fht] FMC Alias Private Key: 7
25,910,564 UART: [art] Derive CDI
25,911,327 UART: [art] Store in in slot 0x4
25,953,976 UART: [art] Derive Key Pair
25,954,998 UART: [art] Store priv key in slot 0x5
29,197,320 UART: [art] Derive Key Pair - Done
29,210,646 UART: [art] Signing Cert with AUTHO
29,211,945 UART: RITY.KEYID = 7
31,491,488 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,999 UART: [art] PUB.X = 153A0A9EAC08D097824BF87B502A4D7937CAA73C81EA30BA6C53296AF3293FED721E448BC1DC0E532B162017139EA26C
31,500,252 UART: [art] PUB.Y = D356B5414783B93D799A198192B2658F6BE7882CA5B8E7C0F357EFCA6BCD5CAA9B753413E8238E6634592426688E8083
31,507,496 UART: [art] SIG.R = 27753C4742F69E2AC049FE2C0DF992FDE6883924DB72CC14526FE02BE7A317AA1AAD0703D6051E5BB2806F7279456518
31,514,834 UART: [art] SIG.S = 0581856274D2E3600B81F44F996650C1CF3AE61B23690423F3B508175C6BB854B7754E6E8016E93502A02F37743E0188
32,820,355 UART: Caliptra RT
32,821,059 UART: [state] CFI Enabled
32,938,568 UART: [rt] RT listening for mailbox commands...
32,940,415 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,969,983 UART: [rt]cmd =0x46504c54, len=4
32,971,451 >>> mbox cmd response data (8 bytes)
32,972,301 UART: [rt] FIPS self test
32,973,265 UART: [kat] ++
32,973,719 UART: [kat] sha1
32,974,230 UART: Fatal Error: 0x90060001
33,009,596 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,153,950 >>> mbox cmd response: failed
33,154,614 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,298,947 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,131 UART:
190,439 UART: Running Caliptra ROM ...
191,465 UART:
7,234,543 UART: [state] CFI Enabled
7,247,667 UART: [state] LifecycleState = Unprovisioned
7,249,576 UART: [state] DebugLocked = No
7,252,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,256,244 UART: [kat] SHA2-256
7,426,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,436,547 UART: [kat] ++
7,437,007 UART: [kat] sha1
7,447,738 UART: [kat] SHA2-256
7,450,482 UART: [kat] SHA2-384
7,455,387 UART: [kat] SHA2-512-ACC
7,457,796 UART: [kat] ECC-384
9,742,679 UART: [kat] HMAC-384Kdf
9,754,854 UART: [kat] LMS
10,944,980 UART: [kat] --
10,950,123 UART: [cold-reset] ++
10,952,002 UART: [fht] Storing FHT @ 0x50003400
10,963,759 UART: [idev] ++
10,964,330 UART: [idev] CDI.KEYID = 6
10,965,292 UART: [idev] SUBJECT.KEYID = 7
10,966,525 UART: [idev] UDS.KEYID = 0
10,968,102 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,112,448 UART: [idev] Erasing UDS.KEYID = 0
14,252,242 UART: [idev] Using Sha1 for KeyId Algorithm
14,273,997 UART: [idev] --
14,277,698 UART: [ldev] ++
14,278,273 UART: [ldev] CDI.KEYID = 6
14,279,237 UART: [ldev] SUBJECT.KEYID = 5
14,280,452 UART: [ldev] AUTHORITY.KEYID = 7
14,281,743 UART: [ldev] FE.KEYID = 1
14,293,149 UART: [ldev] Erasing FE.KEYID = 1
17,577,337 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,869,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,883,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,898,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,913,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,933,180 UART: [ldev] --
19,937,157 UART: [fwproc] Waiting for Commands...
19,939,257 UART: [fwproc] Received command 0x46574c44
19,941,483 UART: [fwproc] Received Image of size 114996 bytes
24,005,100 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,079,196 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,148,120 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,468,458 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,130,548 ready_for_fw is high
4,131,185 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,085,936 >>> mbox cmd response: success
23,727,791 UART:
23,728,265 UART: Running Caliptra FMC ...
23,729,392 UART:
23,729,547 UART: [state] CFI Enabled
23,737,614 UART: [fht] FMC Alias Private Key: 7
26,068,971 UART: [art] Extend RT PCRs Done
26,070,216 UART: [art] Lock RT PCRs Done
26,071,928 UART: [art] Populate DV Done
26,077,359 UART: [fht] FMC Alias Private Key: 7
26,079,017 UART: [art] Derive CDI
26,079,758 UART: [art] Store in in slot 0x4
26,121,829 UART: [art] Derive Key Pair
26,122,867 UART: [art] Store priv key in slot 0x5
29,364,638 UART: [art] Derive Key Pair - Done
29,377,695 UART: [art] Signing Cert with AUTHO
29,379,024 UART: RITY.KEYID = 7
31,658,222 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,722 UART: [art] PUB.X = 76FB4BB9ACFC423F78EA06DCDACA19D351BEB8E45D3B44921ED89B9124451C9D952BA44C1B11BC9E4685EC83FF18D7B9
31,666,979 UART: [art] PUB.Y = F99BC3D8068BCE2F1A106E1765688914C7BA0DE82F135286A44D705691A166B688150EC4A591E18D7137A3279213795D
31,674,187 UART: [art] SIG.R = 44B79FF851FE035CED6E7F7A7C9968771A2D341B2EBBF89AF79403BC648A5570C43EA49F9FAB49A844756ADE1392AA44
31,681,588 UART: [art] SIG.S = DC263DDE6B055278A386DA272362440E6759A9CC42D012720BF7CCD38807469D5893CDBB6D3F08BBFC406341C0276340
32,987,134 UART: Caliptra RT
32,987,861 UART: [state] CFI Enabled
33,105,461 UART: [rt] RT listening for mailbox commands...
33,107,331 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,136,923 UART: [rt]cmd =0x46504c54, len=4
33,138,510 >>> mbox cmd response data (8 bytes)
33,139,893 UART: [rt] FIPS self test
33,140,832 UART: [kat] ++
33,141,285 UART: [kat] sha1
33,141,851 UART: Fatal Error: 0x90060001
33,177,248 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,321,759 >>> mbox cmd response: failed
33,322,398 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,466,649 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
10,605,790 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,566,409 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,260 UART:
192,766 UART: Running Caliptra ROM ...
193,918 UART:
194,066 UART: [state] CFI Enabled
265,427 UART: [state] LifecycleState = Unprovisioned
267,341 UART: [state] DebugLocked = No
268,865 UART: [state] WD Timer not started. Device not locked for debugging
272,396 UART: [kat] SHA2-256
451,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,090 UART: [kat] ++
463,628 UART: [kat] sha1
474,654 UART: [kat] SHA2-256
477,733 UART: [kat] SHA2-384
482,748 UART: [kat] SHA2-512-ACC
485,688 UART: [kat] ECC-384
2,948,878 UART: [kat] HMAC-384Kdf
2,971,790 UART: [kat] LMS
3,501,231 UART: [kat] --
3,504,953 UART: [cold-reset] ++
3,505,828 UART: [fht] FHT @ 0x50003400
3,517,370 UART: [idev] ++
3,517,931 UART: [idev] CDI.KEYID = 6
3,518,887 UART: [idev] SUBJECT.KEYID = 7
3,520,065 UART: [idev] UDS.KEYID = 0
3,520,974 ready_for_fw is high
3,521,197 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,666,904 UART: [idev] Erasing UDS.KEYID = 0
6,025,905 UART: [idev] Sha1 KeyId Algorithm
6,048,332 UART: [idev] --
6,050,893 UART: [ldev] ++
6,051,473 UART: [ldev] CDI.KEYID = 6
6,052,390 UART: [ldev] SUBJECT.KEYID = 5
6,053,553 UART: [ldev] AUTHORITY.KEYID = 7
6,054,788 UART: [ldev] FE.KEYID = 1
6,100,172 UART: [ldev] Erasing FE.KEYID = 1
8,600,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,452 UART: [ldev] --
10,414,948 UART: [fwproc] Wait for Commands...
10,417,303 UART: [fwproc] Recv command 0x46574c44
10,419,409 UART: [fwproc] Recv'd Img size: 115304 bytes
13,840,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,912,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,981,410 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,302,221 >>> mbox cmd response: success
14,306,555 UART: [afmc] ++
14,307,143 UART: [afmc] CDI.KEYID = 6
14,308,033 UART: [afmc] SUBJECT.KEYID = 7
14,309,259 UART: [afmc] AUTHORITY.KEYID = 5
16,851,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,883 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,590,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,606,656 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,622,482 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,645,650 UART: [afmc] --
18,650,274 UART: [cold-reset] --
18,653,165 UART: [state] Locking Datavault
18,657,574 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,264 UART: [state] Locking ICCM
18,660,338 UART: [exit] Launching FMC @ 0x40000130
18,668,742 UART:
18,668,990 UART: Running Caliptra FMC ...
18,670,042 UART:
18,670,200 UART: [state] CFI Enabled
18,730,187 UART: [fht] FMC Alias Private Key: 7
20,494,844 UART: [art] Extend RT PCRs Done
20,496,070 UART: [art] Lock RT PCRs Done
20,497,649 UART: [art] Populate DV Done
20,503,231 UART: [fht] FMC Alias Private Key: 7
20,504,878 UART: [art] Derive CDI
20,505,698 UART: [art] Store in in slot 0x4
20,562,424 UART: [art] Derive Key Pair
20,563,428 UART: [art] Store priv key in slot 0x5
23,026,397 UART: [art] Derive Key Pair - Done
23,039,569 UART: [art] Signing Cert with AUTHO
23,040,876 UART: RITY.KEYID = 7
24,752,015 UART: [art] Erasing AUTHORITY.KEYID = 7
24,753,526 UART: [art] PUB.X = A257887A19F70B2FD2099F53D9B3E04D090F222439855129B7832B5CDCC856247788CFCEE056D09660F068452BA6CA44
24,760,779 UART: [art] PUB.Y = 038775CBED9142F43EDD977083113B713D469D3958C778B8AB9CF55E6F40C930FED40B012FB497781AA5EDA5C8AD3875
24,768,013 UART: [art] SIG.R = DD2A3037BA6E7B6370F129DAF32183B4C14A33E673F43012579889EDCF412D3F96BE271D007B3B14041C20F5B02AFBEF
24,775,412 UART: [art] SIG.S = 5CBDFDF913B16597141A187DF72EE7D211323464CAA030950184047E8970371D021452E62E5EF49F7BC518F829EEAFC3
25,754,193 UART: Caliptra RT
25,754,895 UART: [state] CFI Enabled
25,919,096 UART: [rt] RT listening for mailbox commands...
25,920,965 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,950,909 UART: [rt]cmd =0x46504c54, len=4
25,952,632 >>> mbox cmd response data (8 bytes)
25,953,816 UART: [rt] FIPS self test
25,954,758 UART: [kat] ++
25,955,225 UART: [kat] sha1
25,955,739 UART: Fatal Error: 0x90060001
25,990,802 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,135,662 >>> mbox cmd response: failed
26,136,289 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,281,006 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,037 UART:
190,331 UART: Running Caliptra ROM ...
191,442 UART:
191,593 UART: [state] CFI Enabled
257,367 UART: [state] LifecycleState = Unprovisioned
259,235 UART: [state] DebugLocked = No
261,801 UART: [state] WD Timer not started. Device not locked for debugging
264,992 UART: [kat] SHA2-256
444,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
455,724 UART: [kat] ++
456,256 UART: [kat] sha1
467,682 UART: [kat] SHA2-256
470,744 UART: [kat] SHA2-384
478,178 UART: [kat] SHA2-512-ACC
481,108 UART: [kat] ECC-384
2,944,816 UART: [kat] HMAC-384Kdf
2,965,424 UART: [kat] LMS
3,494,872 UART: [kat] --
3,498,866 UART: [cold-reset] ++
3,499,929 UART: [fht] FHT @ 0x50003400
3,510,095 UART: [idev] ++
3,510,663 UART: [idev] CDI.KEYID = 6
3,511,681 UART: [idev] SUBJECT.KEYID = 7
3,512,788 UART: [idev] UDS.KEYID = 0
3,514,321 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,659,767 UART: [idev] Erasing UDS.KEYID = 0
6,021,475 UART: [idev] Sha1 KeyId Algorithm
6,044,653 UART: [idev] --
6,049,518 UART: [ldev] ++
6,050,092 UART: [ldev] CDI.KEYID = 6
6,050,986 UART: [ldev] SUBJECT.KEYID = 5
6,052,205 UART: [ldev] AUTHORITY.KEYID = 7
6,053,762 UART: [ldev] FE.KEYID = 1
6,094,157 UART: [ldev] Erasing FE.KEYID = 1
8,596,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,055 UART: [ldev] --
10,409,236 UART: [fwproc] Wait for Commands...
10,410,956 UART: [fwproc] Recv command 0x46574c44
10,413,049 UART: [fwproc] Recv'd Img size: 115304 bytes
13,831,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,910,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,979,719 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,301,058 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,360,990 ready_for_fw is high
3,361,408 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,067,424 >>> mbox cmd response: success
18,347,614 UART:
18,347,999 UART: Running Caliptra FMC ...
18,349,125 UART:
18,349,279 UART: [state] CFI Enabled
18,415,311 UART: [fht] FMC Alias Private Key: 7
20,179,318 UART: [art] Extend RT PCRs Done
20,180,540 UART: [art] Lock RT PCRs Done
20,182,149 UART: [art] Populate DV Done
20,187,765 UART: [fht] FMC Alias Private Key: 7
20,189,347 UART: [art] Derive CDI
20,190,091 UART: [art] Store in in slot 0x4
20,248,112 UART: [art] Derive Key Pair
20,249,115 UART: [art] Store priv key in slot 0x5
22,712,234 UART: [art] Derive Key Pair - Done
22,725,129 UART: [art] Signing Cert with AUTHO
22,726,444 UART: RITY.KEYID = 7
24,438,211 UART: [art] Erasing AUTHORITY.KEYID = 7
24,439,719 UART: [art] PUB.X = E975716D21CE6DA1C17A61D4656B987D5E4C2FEEAB13FDC58B6C8B9ACF3ABB4D49F99D168D86B0A3BFB5AF8C350D7093
24,446,985 UART: [art] PUB.Y = 6482F9CB9BFFC35999961A994145F53B28AE6EBB330D43BD89251724C9FC8C6E5DF922DC44A06D3C060C806F737E1A9B
24,454,249 UART: [art] SIG.R = 5CE3FB6EEA0A6B6DD2F2CBF14F66DF48F466550C764D6CD18F1D9674FDA3990E82FD6F76FC1D2681B2483FA6CD17D152
24,461,711 UART: [art] SIG.S = D40585780BB1FF44396995D44DDFEB1DCBCEF21E228511A00A801A25E767EE93340DE0E97B9CA654CFC7D52B0B22C8A0
25,440,810 UART: Caliptra RT
25,441,519 UART: [state] CFI Enabled
25,607,982 UART: [rt] RT listening for mailbox commands...
25,609,833 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,639,351 UART: [rt]cmd =0x46504c54, len=4
25,640,974 >>> mbox cmd response data (8 bytes)
25,642,036 UART: [rt] FIPS self test
25,642,995 UART: [kat] ++
25,643,445 UART: [kat] sha1
25,643,952 UART: Fatal Error: 0x90060001
25,679,008 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,824,208 >>> mbox cmd response: failed
25,824,873 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,969,691 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,356,859 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,081,401 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,302 writing to cptra_bootfsm_go
193,694 UART:
194,057 UART: Running Caliptra ROM ...
195,269 UART:
604,902 UART: [state] CFI Enabled
617,015 UART: [state] LifecycleState = Unprovisioned
618,917 UART: [state] DebugLocked = No
620,674 UART: [state] WD Timer not started. Device not locked for debugging
624,366 UART: [kat] SHA2-256
803,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,064 UART: [kat] ++
815,616 UART: [kat] sha1
826,430 UART: [kat] SHA2-256
829,445 UART: [kat] SHA2-384
834,943 UART: [kat] SHA2-512-ACC
837,886 UART: [kat] ECC-384
3,279,737 UART: [kat] HMAC-384Kdf
3,293,265 UART: [kat] LMS
3,822,717 UART: [kat] --
3,826,354 UART: [cold-reset] ++
3,828,145 UART: [fht] FHT @ 0x50003400
3,838,495 UART: [idev] ++
3,839,075 UART: [idev] CDI.KEYID = 6
3,840,042 UART: [idev] SUBJECT.KEYID = 7
3,841,234 UART: [idev] UDS.KEYID = 0
3,842,177 ready_for_fw is high
3,842,402 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,987,298 UART: [idev] Erasing UDS.KEYID = 0
6,315,155 UART: [idev] Sha1 KeyId Algorithm
6,337,783 UART: [idev] --
6,342,021 UART: [ldev] ++
6,342,602 UART: [ldev] CDI.KEYID = 6
6,343,485 UART: [ldev] SUBJECT.KEYID = 5
6,344,695 UART: [ldev] AUTHORITY.KEYID = 7
6,345,922 UART: [ldev] FE.KEYID = 1
6,357,652 UART: [ldev] Erasing FE.KEYID = 1
8,831,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,350 UART: [ldev] --
10,621,214 UART: [fwproc] Wait for Commands...
10,623,523 UART: [fwproc] Recv command 0x46574c44
10,625,617 UART: [fwproc] Recv'd Img size: 115304 bytes
14,046,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,183,284 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,503,881 >>> mbox cmd response: success
14,508,965 UART: [afmc] ++
14,509,550 UART: [afmc] CDI.KEYID = 6
14,510,464 UART: [afmc] SUBJECT.KEYID = 7
14,511,678 UART: [afmc] AUTHORITY.KEYID = 5
17,014,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,735,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,736,937 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,752,756 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,768,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,784,572 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,808,102 UART: [afmc] --
18,812,210 UART: [cold-reset] --
18,816,350 UART: [state] Locking Datavault
18,819,705 UART: [state] Locking PCR0, PCR1 and PCR31
18,821,350 UART: [state] Locking ICCM
18,823,258 UART: [exit] Launching FMC @ 0x40000130
18,831,701 UART:
18,831,938 UART: Running Caliptra FMC ...
18,832,966 UART:
18,833,116 UART: [state] CFI Enabled
18,841,110 UART: [fht] FMC Alias Private Key: 7
20,597,611 UART: [art] Extend RT PCRs Done
20,598,835 UART: [art] Lock RT PCRs Done
20,600,264 UART: [art] Populate DV Done
20,605,838 UART: [fht] FMC Alias Private Key: 7
20,607,322 UART: [art] Derive CDI
20,608,085 UART: [art] Store in in slot 0x4
20,650,513 UART: [art] Derive Key Pair
20,651,556 UART: [art] Store priv key in slot 0x5
23,078,337 UART: [art] Derive Key Pair - Done
23,091,628 UART: [art] Signing Cert with AUTHO
23,092,943 UART: RITY.KEYID = 7
24,798,318 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,824 UART: [art] PUB.X = E075A61C6E7E0F0B47ED9BF2E73CBC73EE089F496BF4F1519FD5AD4A530B80B3C1385E1ECB047D75AB38F1CE9FFB0701
24,807,155 UART: [art] PUB.Y = C9EC68E68D021E6C642A3D8B4865A68A3978938A1E02E5913A509A3246B5247B8D47A722F5A3678BBDCB390178696A61
24,814,356 UART: [art] SIG.R = 13A0C620808798DB456F4C2798D8678F6E674701941D2EB7DCD1FA8C6F3142FB4AF3950A75FF68DDE383531C0B8148A8
24,821,757 UART: [art] SIG.S = 28A84E53C5DCBDB3730C31129804E8CC9E979170E787CA86F07ABA824C14F4C450B38FFFA10E51365F990F3A374A9A14
25,800,811 UART: Caliptra RT
25,801,519 UART: [state] CFI Enabled
25,918,897 UART: [rt] RT listening for mailbox commands...
25,920,746 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,950,483 UART: [rt]cmd =0x46504c54, len=4
25,952,145 >>> mbox cmd response data (8 bytes)
25,953,203 UART: [rt] FIPS self test
25,954,153 UART: [kat] ++
25,954,603 UART: [kat] sha1
25,955,110 UART: Fatal Error: 0x90060001
25,990,233 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,135,077 >>> mbox cmd response: failed
26,135,673 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,280,407 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
189,998 UART:
190,289 UART: Running Caliptra ROM ...
191,315 UART:
14,255,532 UART: [state] CFI Enabled
14,269,742 UART: [state] LifecycleState = Unprovisioned
14,271,613 UART: [state] DebugLocked = No
14,273,131 UART: [state] WD Timer not started. Device not locked for debugging
14,276,432 UART: [kat] SHA2-256
14,455,565 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,467,110 UART: [kat] ++
14,467,655 UART: [kat] sha1
14,478,875 UART: [kat] SHA2-256
14,481,882 UART: [kat] SHA2-384
14,487,755 UART: [kat] SHA2-512-ACC
14,490,698 UART: [kat] ECC-384
16,934,502 UART: [kat] HMAC-384Kdf
16,946,859 UART: [kat] LMS
17,476,349 UART: [kat] --
17,481,628 UART: [cold-reset] ++
17,483,735 UART: [fht] FHT @ 0x50003400
17,493,856 UART: [idev] ++
17,494,427 UART: [idev] CDI.KEYID = 6
17,495,335 UART: [idev] SUBJECT.KEYID = 7
17,496,549 UART: [idev] UDS.KEYID = 0
17,498,078 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,642,833 UART: [idev] Erasing UDS.KEYID = 0
19,968,642 UART: [idev] Sha1 KeyId Algorithm
19,990,465 UART: [idev] --
19,994,300 UART: [ldev] ++
19,994,866 UART: [ldev] CDI.KEYID = 6
19,995,805 UART: [ldev] SUBJECT.KEYID = 5
19,996,963 UART: [ldev] AUTHORITY.KEYID = 7
19,998,268 UART: [ldev] FE.KEYID = 1
20,006,244 UART: [ldev] Erasing FE.KEYID = 1
22,480,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,198,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,214,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,230,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,245,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,264,803 UART: [ldev] --
24,269,314 UART: [fwproc] Wait for Commands...
24,272,113 UART: [fwproc] Recv command 0x46574c44
24,274,156 UART: [fwproc] Recv'd Img size: 115304 bytes
27,691,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,761,238 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,830,034 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,151,557 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
3,693,276 ready_for_fw is high
3,693,708 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,276,884 >>> mbox cmd response: success
18,525,843 UART:
18,526,259 UART: Running Caliptra FMC ...
18,527,378 UART:
18,527,541 UART: [state] CFI Enabled
18,535,390 UART: [fht] FMC Alias Private Key: 7
20,292,426 UART: [art] Extend RT PCRs Done
20,293,649 UART: [art] Lock RT PCRs Done
20,295,387 UART: [art] Populate DV Done
20,300,567 UART: [fht] FMC Alias Private Key: 7
20,302,054 UART: [art] Derive CDI
20,302,819 UART: [art] Store in in slot 0x4
20,345,306 UART: [art] Derive Key Pair
20,346,309 UART: [art] Store priv key in slot 0x5
22,773,264 UART: [art] Derive Key Pair - Done
22,786,432 UART: [art] Signing Cert with AUTHO
22,787,744 UART: RITY.KEYID = 7
24,493,296 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,800 UART: [art] PUB.X = 00D19E6A87CDB2822829DFB4E073E72C72226730C9303811BCBBAB0AF3FE684A21A780C93F9ADAB1C0F6EC283DE5C3BD
24,502,086 UART: [art] PUB.Y = EB040D36826FC1CFB18C938EFFD84DFD6FF379F7055505DB7D68E5EAB7196028EA12B509D8FCA88556C5254D8AE4E744
24,509,329 UART: [art] SIG.R = FF7165FB561503A01E71968DEA0583BF519F9A429D87A6307C66F32BF35596F2A87B3691364FEEBDE8AE773635DDBC3D
24,516,772 UART: [art] SIG.S = 024A55E447C632E6D6F197FA9837DCD65506FA33A07091132948B7AB6F3E56DD6D3B2C91CCD1C3D593FB0E0787765B0C
25,495,916 UART: Caliptra RT
25,496,616 UART: [state] CFI Enabled
25,613,896 UART: [rt] RT listening for mailbox commands...
25,615,740 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,645,374 UART: [rt]cmd =0x46504c54, len=4
25,646,876 >>> mbox cmd response data (8 bytes)
25,647,758 UART: [rt] FIPS self test
25,648,814 UART: [kat] ++
25,649,310 UART: [kat] sha1
25,649,932 UART: Fatal Error: 0x90060001
25,685,139 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,829,914 >>> mbox cmd response: failed
25,830,569 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,975,660 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
17,650,373 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,240,975 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,440,764 ready_for_fw is high
3,441,386 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,753,348 >>> mbox cmd response: success
19,047,235 UART:
19,047,625 UART: Running Caliptra FMC ...
19,048,773 UART:
19,048,940 UART: [state] CFI Enabled
19,116,123 UART: [fht] FMC Alias Private Key: 7
20,880,787 UART: [art] Extend RT PCRs Done
20,882,009 UART: [art] Lock RT PCRs Done
20,883,533 UART: [art] Populate DV Done
20,888,895 UART: [fht] FMC Alias Private Key: 7
20,890,560 UART: [art] Derive CDI
20,891,379 UART: [art] Store in in slot 0x4
20,948,648 UART: [art] Derive Key Pair
20,949,694 UART: [art] Store priv key in slot 0x5
23,412,808 UART: [art] Derive Key Pair - Done
23,425,919 UART: [art] Signing Cert with AUTHO
23,427,235 UART: RITY.KEYID = 7
25,138,721 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,231 UART: [art] PUB.X = E715D362E1D28E116B7C88B27FA93185BB48E2FE7B0AE574EE0DCCA6E286BFA1B5D57001271A3392FE89B49C18F02128
25,147,492 UART: [art] PUB.Y = 1C2136F0AAD47AC76F4E82600A7CF6A539C9972AB2E2AB845D169FD2870376B4AE296BD436598E54D0235C25A5FA3495
25,154,735 UART: [art] SIG.R = 0D19E6C51E7CDD772E9259C01E1F166A054C6AF19311BAC9E2E4970E5848A9BB5EA727897B1B4679D0BB3E73EFA8A257
25,162,142 UART: [art] SIG.S = 06DF31120B28FD2E431FF02C4220FFDC1B30CF8762750FDA423F60320BF374FF1DE55AE841E44D1B8A4AB86E7A5F2A2B
26,142,024 UART: Caliptra RT
26,142,724 UART: [state] CFI Enabled
26,306,124 UART: [rt] RT listening for mailbox commands...
26,307,995 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,337,845 UART: [rt]cmd =0x46504c54, len=4
26,339,650 >>> mbox cmd response data (8 bytes)
26,340,909 UART: [rt] FIPS self test
26,341,856 UART: [kat] ++
26,342,308 UART: [kat] sha1
26,343,200 UART: Fatal Error: 0x90060001
26,378,585 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,523,761 >>> mbox cmd response: failed
26,524,398 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,669,133 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,434,701 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,762,776 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
3,759,210 ready_for_fw is high
3,759,683 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,975,961 >>> mbox cmd response: success
19,231,351 UART:
19,231,759 UART: Running Caliptra FMC ...
19,232,928 UART:
19,233,087 UART: [state] CFI Enabled
19,240,808 UART: [fht] FMC Alias Private Key: 7
20,997,621 UART: [art] Extend RT PCRs Done
20,998,849 UART: [art] Lock RT PCRs Done
21,000,718 UART: [art] Populate DV Done
21,005,987 UART: [fht] FMC Alias Private Key: 7
21,007,463 UART: [art] Derive CDI
21,008,411 UART: [art] Store in in slot 0x4
21,050,958 UART: [art] Derive Key Pair
21,051,967 UART: [art] Store priv key in slot 0x5
23,478,180 UART: [art] Derive Key Pair - Done
23,491,281 UART: [art] Signing Cert with AUTHO
23,492,619 UART: RITY.KEYID = 7
25,197,932 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,444 UART: [art] PUB.X = 7EA9D5F5C92E85C97DD52F109EC80A131685180444377B44C499508757F0C593322FB5DFB82FBCA688BEE494F9FB3B10
25,206,689 UART: [art] PUB.Y = B6E41F410EAC677BAA47A5C566B2594FD1C36978611B05D0713F6F9B33AED72C444F810CF8004B8B469CB114642F0C18
25,213,910 UART: [art] SIG.R = 76335BF5D370DE25935165C7E63451030153960B38438889BE17579F73C4E65F804CC9D5686AF4D3C7183D35B7D6E3A6
25,221,279 UART: [art] SIG.S = 0620D397436F5DA0B0511F67E371A00FECEECDF0C80ED1C3A04DFD0EC651A76EC021AE74782A722F5448FD022320FFB2
26,200,477 UART: Caliptra RT
26,201,177 UART: [state] CFI Enabled
26,317,515 UART: [rt] RT listening for mailbox commands...
26,319,366 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,349,158 UART: [rt]cmd =0x46504c54, len=4
26,350,626 >>> mbox cmd response data (8 bytes)
26,351,889 UART: [rt] FIPS self test
26,352,830 UART: [kat] ++
26,353,281 UART: [kat] sha1
26,354,017 UART: Fatal Error: 0x90060001
26,389,400 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,534,277 >>> mbox cmd response: failed
26,534,896 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,679,474 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
17,003,464 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,229,213 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,642 UART: [state] LifecycleState = Unprovisioned
85,297 UART: [state] DebugLocked = No
85,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,645 UART: [kat] SHA2-256
881,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,691 UART: [kat] ++
885,843 UART: [kat] sha1
890,163 UART: [kat] SHA2-256
892,101 UART: [kat] SHA2-384
894,920 UART: [kat] SHA2-512-ACC
896,821 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
906,980 UART: [kat] LMS
1,475,176 UART: [kat] --
1,475,751 UART: [cold-reset] ++
1,476,125 UART: [fht] Storing FHT @ 0x50003400
1,478,802 UART: [idev] ++
1,478,970 UART: [idev] CDI.KEYID = 6
1,479,330 UART: [idev] SUBJECT.KEYID = 7
1,479,754 UART: [idev] UDS.KEYID = 0
1,480,099 ready_for_fw is high
1,480,099 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,560 UART: [idev] Erasing UDS.KEYID = 0
1,503,814 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,412 UART: [idev] --
1,513,487 UART: [ldev] ++
1,513,655 UART: [ldev] CDI.KEYID = 6
1,514,018 UART: [ldev] SUBJECT.KEYID = 5
1,514,444 UART: [ldev] AUTHORITY.KEYID = 7
1,514,907 UART: [ldev] FE.KEYID = 1
1,520,075 UART: [ldev] Erasing FE.KEYID = 1
1,545,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,382 UART: [ldev] --
1,584,837 UART: [fwproc] Waiting for Commands...
1,585,686 UART: [fwproc] Received command 0x46574c44
1,586,477 UART: [fwproc] Received Image of size 115304 bytes
2,896,150 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,374 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,973 >>> mbox cmd response: success
3,090,983 UART: [afmc] ++
3,091,151 UART: [afmc] CDI.KEYID = 6
3,091,513 UART: [afmc] SUBJECT.KEYID = 7
3,091,938 UART: [afmc] AUTHORITY.KEYID = 5
3,126,709 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,083 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,863 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,591 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,476 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,166 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,069 UART: [afmc] --
3,170,035 UART: [cold-reset] --
3,170,899 UART: [state] Locking Datavault
3,171,892 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,496 UART: [state] Locking ICCM
3,173,140 UART: [exit] Launching FMC @ 0x40000130
3,178,469 UART:
3,178,485 UART: Running Caliptra FMC ...
3,178,893 UART:
3,178,947 UART: [state] CFI Enabled
3,189,270 UART: [fht] FMC Alias Private Key: 7
3,296,893 UART: [art] Extend RT PCRs Done
3,297,321 UART: [art] Lock RT PCRs Done
3,298,989 UART: [art] Populate DV Done
3,307,082 UART: [fht] FMC Alias Private Key: 7
3,308,066 UART: [art] Derive CDI
3,308,346 UART: [art] Store in in slot 0x4
3,394,089 UART: [art] Derive Key Pair
3,394,449 UART: [art] Store priv key in slot 0x5
3,407,701 UART: [art] Derive Key Pair - Done
3,422,569 UART: [art] Signing Cert with AUTHO
3,423,049 UART: RITY.KEYID = 7
3,438,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,170 UART: [art] PUB.X = 2CD85AE0D56F29CA7226C9405C54C4C1CBC0ADD4EB6E6381D29A46AC1DAFB9159305D2C065E8A2E5A748417682333536
3,445,945 UART: [art] PUB.Y = 5FABB5F716D6C9C6840C0F13582C597C238F4C6D325C5791603F1D0C5A12D5A97EF9D1AD92783DDA5E1996FD5ED57161
3,452,894 UART: [art] SIG.R = 368BEFF778710A537ACB4EC6757C2F11E1A61B55A3C4EBF2AB2A00D9589716BC4962EACAD428FB5D959E7D51BE6B2D1D
3,459,659 UART: [art] SIG.S = 64383CC1E553D75007AA038D8F598413FCCB1C4FA4D0C7FABA53EBB2D462D735C5FC2226AF2B06607CC0175F76C4B4D3
3,483,027 UART: Caliptra RT
3,483,280 UART: [state] CFI Enabled
3,591,458 UART: [rt] RT listening for mailbox commands...
3,592,121 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,798 UART: [rt]cmd =0x46504c54, len=4
3,622,791 >>> mbox cmd response data (8 bytes)
3,622,974 UART: [rt] FIPS self test
3,623,302 UART: [kat] ++
3,623,454 UART: [kat] sha1
3,624,030 UART: Fatal Error: 0x90060001
3,625,580 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,625,585 >>> mbox cmd response: failed
3,625,585 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,625,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,093 UART: [kat] SHA2-256
892,031 UART: [kat] SHA2-384
894,618 UART: [kat] SHA2-512-ACC
896,519 UART: [kat] ECC-384
902,080 UART: [kat] HMAC-384Kdf
906,544 UART: [kat] LMS
1,474,740 UART: [kat] --
1,475,399 UART: [cold-reset] ++
1,475,861 UART: [fht] Storing FHT @ 0x50003400
1,478,680 UART: [idev] ++
1,478,848 UART: [idev] CDI.KEYID = 6
1,479,208 UART: [idev] SUBJECT.KEYID = 7
1,479,632 UART: [idev] UDS.KEYID = 0
1,479,977 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,498 UART: [idev] Erasing UDS.KEYID = 0
1,503,924 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,688 UART: [idev] --
1,513,959 UART: [ldev] ++
1,514,127 UART: [ldev] CDI.KEYID = 6
1,514,490 UART: [ldev] SUBJECT.KEYID = 5
1,514,916 UART: [ldev] AUTHORITY.KEYID = 7
1,515,379 UART: [ldev] FE.KEYID = 1
1,521,061 UART: [ldev] Erasing FE.KEYID = 1
1,546,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,596 UART: [ldev] --
1,586,101 UART: [fwproc] Waiting for Commands...
1,586,764 UART: [fwproc] Received command 0x46574c44
1,587,555 UART: [fwproc] Received Image of size 115304 bytes
2,898,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,716 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,068 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,505 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,529 ready_for_fw is high
1,362,529 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,938,629 >>> mbox cmd response: success
3,000,049 UART:
3,000,065 UART: Running Caliptra FMC ...
3,000,473 UART:
3,000,527 UART: [state] CFI Enabled
3,010,968 UART: [fht] FMC Alias Private Key: 7
3,118,793 UART: [art] Extend RT PCRs Done
3,119,221 UART: [art] Lock RT PCRs Done
3,120,739 UART: [art] Populate DV Done
3,128,974 UART: [fht] FMC Alias Private Key: 7
3,130,156 UART: [art] Derive CDI
3,130,436 UART: [art] Store in in slot 0x4
3,216,119 UART: [art] Derive Key Pair
3,216,479 UART: [art] Store priv key in slot 0x5
3,230,105 UART: [art] Derive Key Pair - Done
3,244,859 UART: [art] Signing Cert with AUTHO
3,245,339 UART: RITY.KEYID = 7
3,260,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,372 UART: [art] PUB.X = 652D4AF964EF3B883C29C9DA3E309255A72FA3312694026FB2FAC786C1147C8DA03DC75C212A3E11BD22AC4D6C7C7AA8
3,268,151 UART: [art] PUB.Y = 91B1B39365EE1F69B36D9579E80024E2FEC07BC5D80DE4ABBA45D5C604532E03ABA84C5EDC04C251C10FE97FC709CDBA
3,275,081 UART: [art] SIG.R = 5E563233EE49A9CF6AC36A2AE4027EC293E888533DAA8F2F9EBB4FB478AE24DCFB43D8399EAF77580C23DB5391C715F5
3,281,861 UART: [art] SIG.S = 83C6D0076CAECEEA03C934938CB6100472E4B371CF6E0FEF619A0AB77AF563ADBD6EAB55E29C65DBEB72DFA73ECCF231
3,305,353 UART: Caliptra RT
3,305,606 UART: [state] CFI Enabled
3,414,197 UART: [rt] RT listening for mailbox commands...
3,414,860 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,709 UART: [rt]cmd =0x46504c54, len=4
3,445,742 >>> mbox cmd response data (8 bytes)
3,446,001 UART: [rt] FIPS self test
3,446,329 UART: [kat] ++
3,446,481 UART: [kat] sha1
3,447,353 UART: Fatal Error: 0x90060001
3,448,903 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,448,908 >>> mbox cmd response: failed
3,448,908 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,448,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,809 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,919 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,138 UART: [kat] SHA2-256
882,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,184 UART: [kat] ++
886,336 UART: [kat] sha1
890,528 UART: [kat] SHA2-256
892,466 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,637 UART: [kat] HMAC-384Kdf
907,067 UART: [kat] LMS
1,475,263 UART: [kat] --
1,476,194 UART: [cold-reset] ++
1,476,648 UART: [fht] Storing FHT @ 0x50003400
1,479,255 UART: [idev] ++
1,479,423 UART: [idev] CDI.KEYID = 6
1,479,783 UART: [idev] SUBJECT.KEYID = 7
1,480,207 UART: [idev] UDS.KEYID = 0
1,480,552 ready_for_fw is high
1,480,552 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,313 UART: [idev] Erasing UDS.KEYID = 0
1,504,809 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,461 UART: [idev] --
1,514,398 UART: [ldev] ++
1,514,566 UART: [ldev] CDI.KEYID = 6
1,514,929 UART: [ldev] SUBJECT.KEYID = 5
1,515,355 UART: [ldev] AUTHORITY.KEYID = 7
1,515,818 UART: [ldev] FE.KEYID = 1
1,521,098 UART: [ldev] Erasing FE.KEYID = 1
1,547,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,919 UART: [ldev] --
1,586,192 UART: [fwproc] Waiting for Commands...
1,586,941 UART: [fwproc] Received command 0x46574c44
1,587,732 UART: [fwproc] Received Image of size 115304 bytes
2,897,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,539 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,891 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,300 >>> mbox cmd response: success
3,092,390 UART: [afmc] ++
3,092,558 UART: [afmc] CDI.KEYID = 6
3,092,920 UART: [afmc] SUBJECT.KEYID = 7
3,093,345 UART: [afmc] AUTHORITY.KEYID = 5
3,128,192 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,386 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,894 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,779 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,469 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,486 UART: [afmc] --
3,171,470 UART: [cold-reset] --
3,172,124 UART: [state] Locking Datavault
3,173,467 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,071 UART: [state] Locking ICCM
3,174,519 UART: [exit] Launching FMC @ 0x40000130
3,179,848 UART:
3,179,864 UART: Running Caliptra FMC ...
3,180,272 UART:
3,180,415 UART: [state] CFI Enabled
3,190,770 UART: [fht] FMC Alias Private Key: 7
3,299,231 UART: [art] Extend RT PCRs Done
3,299,659 UART: [art] Lock RT PCRs Done
3,301,365 UART: [art] Populate DV Done
3,309,638 UART: [fht] FMC Alias Private Key: 7
3,310,720 UART: [art] Derive CDI
3,311,000 UART: [art] Store in in slot 0x4
3,396,577 UART: [art] Derive Key Pair
3,396,937 UART: [art] Store priv key in slot 0x5
3,409,969 UART: [art] Derive Key Pair - Done
3,424,841 UART: [art] Signing Cert with AUTHO
3,425,321 UART: RITY.KEYID = 7
3,440,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,912 UART: [art] PUB.X = 39D5CD7FB77940D22D48766032EA4066D5B72E297D7309EDF1664E5C2C487B203AF9A5FF89B18902FBC97D94EB9F21F4
3,447,682 UART: [art] PUB.Y = 254F341684A00A92E35EB4FA4646807DAF01BE36295393D7631B0DA0A167AC5C4061A0A3D4B428D71B315867B667752C
3,454,619 UART: [art] SIG.R = DD83B0232199FD1E33AC4B4E95F91909284137722628AFB2BDB907E16460A83D8DEC74C72A0266A1588E90EA3B1B1994
3,461,380 UART: [art] SIG.S = A8A0C00C29C51DA6D8BE5799B10D5ABAA3890555534634E4DD177EDFC55202B0B58305F1DB5BD7773B43FFD34A10970B
3,484,577 UART: Caliptra RT
3,484,922 UART: [state] CFI Enabled
3,593,322 UART: [rt] RT listening for mailbox commands...
3,593,985 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,764 UART: [rt]cmd =0x46504c54, len=4
3,624,901 >>> mbox cmd response data (8 bytes)
3,625,086 UART: [rt] FIPS self test
3,625,414 UART: [kat] ++
3,625,566 UART: [kat] sha1
3,626,460 UART: Fatal Error: 0x90060001
3,628,010 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,628,015 >>> mbox cmd response: failed
3,628,015 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,628,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,182 UART: [kat] SHA2-256
882,113 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,228 UART: [kat] ++
886,380 UART: [kat] sha1
890,490 UART: [kat] SHA2-256
892,428 UART: [kat] SHA2-384
895,235 UART: [kat] SHA2-512-ACC
897,136 UART: [kat] ECC-384
902,887 UART: [kat] HMAC-384Kdf
907,351 UART: [kat] LMS
1,475,547 UART: [kat] --
1,476,206 UART: [cold-reset] ++
1,476,570 UART: [fht] Storing FHT @ 0x50003400
1,479,479 UART: [idev] ++
1,479,647 UART: [idev] CDI.KEYID = 6
1,480,007 UART: [idev] SUBJECT.KEYID = 7
1,480,431 UART: [idev] UDS.KEYID = 0
1,480,776 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,395 UART: [idev] Erasing UDS.KEYID = 0
1,505,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,889 UART: [idev] --
1,514,908 UART: [ldev] ++
1,515,076 UART: [ldev] CDI.KEYID = 6
1,515,439 UART: [ldev] SUBJECT.KEYID = 5
1,515,865 UART: [ldev] AUTHORITY.KEYID = 7
1,516,328 UART: [ldev] FE.KEYID = 1
1,521,270 UART: [ldev] Erasing FE.KEYID = 1
1,546,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,537 UART: [ldev] --
1,586,036 UART: [fwproc] Waiting for Commands...
1,586,793 UART: [fwproc] Received command 0x46574c44
1,587,584 UART: [fwproc] Received Image of size 115304 bytes
2,897,275 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,797 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,530 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,100 ready_for_fw is high
1,363,100 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,004 >>> mbox cmd response: success
3,003,154 UART:
3,003,170 UART: Running Caliptra FMC ...
3,003,578 UART:
3,003,721 UART: [state] CFI Enabled
3,014,808 UART: [fht] FMC Alias Private Key: 7
3,123,599 UART: [art] Extend RT PCRs Done
3,124,027 UART: [art] Lock RT PCRs Done
3,125,697 UART: [art] Populate DV Done
3,134,012 UART: [fht] FMC Alias Private Key: 7
3,134,968 UART: [art] Derive CDI
3,135,248 UART: [art] Store in in slot 0x4
3,221,449 UART: [art] Derive Key Pair
3,221,809 UART: [art] Store priv key in slot 0x5
3,235,423 UART: [art] Derive Key Pair - Done
3,250,452 UART: [art] Signing Cert with AUTHO
3,250,932 UART: RITY.KEYID = 7
3,266,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,903 UART: [art] PUB.X = 16A206055623B5AA752280C2EFFD52AB0897FB6EF6C086E713E6D7E37D0F3BB19E35F809BFEC3304B45841F9F022F9D1
3,273,663 UART: [art] PUB.Y = 232A0EBEC5FA6FCDC4E971F94510E615DA3DF5C2E9590713726D0CD34C5CEE8FFC44150A841F872B25833E88641A2080
3,280,609 UART: [art] SIG.R = 2F599D2F7A7CC80BCC6AFA4F81E1AA6C30F23EE873576C6DE181BD64BBC0553772CAB710C73FA1C982BF4582134BBD1E
3,287,396 UART: [art] SIG.S = 205144E94276563A4B9F8A55722F17F49901C2B7E2DCFFD67C8E97576F50AC1AF9232D23A0F1571B75130029773A9606
3,311,537 UART: Caliptra RT
3,311,882 UART: [state] CFI Enabled
3,419,838 UART: [rt] RT listening for mailbox commands...
3,420,501 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,608 UART: [rt]cmd =0x46504c54, len=4
3,451,779 >>> mbox cmd response data (8 bytes)
3,452,130 UART: [rt] FIPS self test
3,452,458 UART: [kat] ++
3,452,610 UART: [kat] sha1
3,453,338 UART: Fatal Error: 0x90060001
3,454,888 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,454,893 >>> mbox cmd response: failed
3,454,893 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,454,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,600 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,214 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
893,092 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,217 UART: [kat] ++
897,369 UART: [kat] sha1
901,615 UART: [kat] SHA2-256
903,555 UART: [kat] SHA2-384
906,386 UART: [kat] SHA2-512-ACC
908,287 UART: [kat] ECC-384
917,998 UART: [kat] HMAC-384Kdf
922,546 UART: [kat] LMS
1,170,874 UART: [kat] --
1,171,851 UART: [cold-reset] ++
1,172,395 UART: [fht] FHT @ 0x50003400
1,175,054 UART: [idev] ++
1,175,222 UART: [idev] CDI.KEYID = 6
1,175,582 UART: [idev] SUBJECT.KEYID = 7
1,176,006 UART: [idev] UDS.KEYID = 0
1,176,351 ready_for_fw is high
1,176,351 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,302 UART: [idev] Erasing UDS.KEYID = 0
1,201,469 UART: [idev] Sha1 KeyId Algorithm
1,210,077 UART: [idev] --
1,211,133 UART: [ldev] ++
1,211,301 UART: [ldev] CDI.KEYID = 6
1,211,664 UART: [ldev] SUBJECT.KEYID = 5
1,212,090 UART: [ldev] AUTHORITY.KEYID = 7
1,212,553 UART: [ldev] FE.KEYID = 1
1,217,749 UART: [ldev] Erasing FE.KEYID = 1
1,243,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,587 UART: [ldev] --
1,282,862 UART: [fwproc] Wait for Commands...
1,283,622 UART: [fwproc] Recv command 0x46574c44
1,284,350 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,249 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,538 >>> mbox cmd response: success
2,788,792 UART: [afmc] ++
2,788,960 UART: [afmc] CDI.KEYID = 6
2,789,322 UART: [afmc] SUBJECT.KEYID = 7
2,789,747 UART: [afmc] AUTHORITY.KEYID = 5
2,825,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,981 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,594 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,313 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,191 UART: [afmc] --
2,869,071 UART: [cold-reset] --
2,869,901 UART: [state] Locking Datavault
2,871,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,932 UART: [state] Locking ICCM
2,872,520 UART: [exit] Launching FMC @ 0x40000130
2,877,849 UART:
2,877,865 UART: Running Caliptra FMC ...
2,878,273 UART:
2,878,327 UART: [state] CFI Enabled
2,889,196 UART: [fht] FMC Alias Private Key: 7
2,997,419 UART: [art] Extend RT PCRs Done
2,997,847 UART: [art] Lock RT PCRs Done
2,999,391 UART: [art] Populate DV Done
3,007,392 UART: [fht] FMC Alias Private Key: 7
3,008,560 UART: [art] Derive CDI
3,008,840 UART: [art] Store in in slot 0x4
3,093,987 UART: [art] Derive Key Pair
3,094,347 UART: [art] Store priv key in slot 0x5
3,107,879 UART: [art] Derive Key Pair - Done
3,122,720 UART: [art] Signing Cert with AUTHO
3,123,200 UART: RITY.KEYID = 7
3,138,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,445 UART: [art] PUB.X = D0FA1728B358FF1C40A4DBD2C6404845AF17D1EF32A3D28D0CC16931169B30E7B1D7F465015EC0EAA9D22B091C8F52FD
3,146,220 UART: [art] PUB.Y = 3082CEC84878757960A26461A3850DE7C86B98F6D95065D0B590FD703CCA95B6417AD13B65CAEBF57685620669B9C5E5
3,153,162 UART: [art] SIG.R = CC2F6D8CAF6EC2201700774EAAB8764EB75A711FECBCFEED6A16FB5E60F93973B9720A1C6BB870DF6400F0826181E443
3,159,901 UART: [art] SIG.S = 4ECFA2B4E9C87782186527BED8025B3595C170667ABFD28D62F38CAC86E228A5DC3CA46840BA4627C490821689906F6B
3,184,079 UART: Caliptra RT
3,184,332 UART: [state] CFI Enabled
3,291,295 UART: [rt] RT listening for mailbox commands...
3,291,958 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,547 UART: [rt]cmd =0x46504c54, len=4
3,322,708 >>> mbox cmd response data (8 bytes)
3,323,019 UART: [rt] FIPS self test
3,323,347 UART: [kat] ++
3,323,499 UART: [kat] sha1
3,324,275 UART: Fatal Error: 0x90060001
3,325,825 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,325,830 >>> mbox cmd response: failed
3,325,830 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,325,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,857 UART: [kat] SHA2-256
903,797 UART: [kat] SHA2-384
906,716 UART: [kat] SHA2-512-ACC
908,617 UART: [kat] ECC-384
918,482 UART: [kat] HMAC-384Kdf
923,110 UART: [kat] LMS
1,171,438 UART: [kat] --
1,172,415 UART: [cold-reset] ++
1,172,803 UART: [fht] FHT @ 0x50003400
1,175,444 UART: [idev] ++
1,175,612 UART: [idev] CDI.KEYID = 6
1,175,972 UART: [idev] SUBJECT.KEYID = 7
1,176,396 UART: [idev] UDS.KEYID = 0
1,176,741 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,546 UART: [idev] Erasing UDS.KEYID = 0
1,201,513 UART: [idev] Sha1 KeyId Algorithm
1,209,881 UART: [idev] --
1,210,873 UART: [ldev] ++
1,211,041 UART: [ldev] CDI.KEYID = 6
1,211,404 UART: [ldev] SUBJECT.KEYID = 5
1,211,830 UART: [ldev] AUTHORITY.KEYID = 7
1,212,293 UART: [ldev] FE.KEYID = 1
1,217,779 UART: [ldev] Erasing FE.KEYID = 1
1,244,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,297 UART: [ldev] --
1,283,808 UART: [fwproc] Wait for Commands...
1,284,480 UART: [fwproc] Recv command 0x46574c44
1,285,208 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,581 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,898 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,693 ready_for_fw is high
1,059,693 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,769 >>> mbox cmd response: success
2,702,399 UART:
2,702,415 UART: Running Caliptra FMC ...
2,702,823 UART:
2,702,877 UART: [state] CFI Enabled
2,713,384 UART: [fht] FMC Alias Private Key: 7
2,821,757 UART: [art] Extend RT PCRs Done
2,822,185 UART: [art] Lock RT PCRs Done
2,823,645 UART: [art] Populate DV Done
2,831,934 UART: [fht] FMC Alias Private Key: 7
2,832,868 UART: [art] Derive CDI
2,833,148 UART: [art] Store in in slot 0x4
2,918,867 UART: [art] Derive Key Pair
2,919,227 UART: [art] Store priv key in slot 0x5
2,932,207 UART: [art] Derive Key Pair - Done
2,947,064 UART: [art] Signing Cert with AUTHO
2,947,544 UART: RITY.KEYID = 7
2,962,878 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,643 UART: [art] PUB.X = 3492A600722374C487A2EB9AD00266071887D58CBD057188290DF7CD5637B72216102383F72233D0D9D2D20F674AE277
2,970,362 UART: [art] PUB.Y = F3C0044CB22D835F90551975B73551AD11E17606D7BF285385B2765EB9098BC872410493EA7E175EDBBA8908F469420B
2,977,288 UART: [art] SIG.R = 5D9C463A92733ACCB7F32A678881D8BD1A689C5313E2F30D534D6319F18A28E4346FF0A20A8DAD55D762D3A154F43365
2,984,054 UART: [art] SIG.S = 8D2567EABEE9720DF2DD35B217DFD4C594633CCEAB9818AEDF305DE39D6A7BD446B3C7E2E756FEBC009297B636661712
3,008,098 UART: Caliptra RT
3,008,351 UART: [state] CFI Enabled
3,115,796 UART: [rt] RT listening for mailbox commands...
3,116,459 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,078 UART: [rt]cmd =0x46504c54, len=4
3,147,283 >>> mbox cmd response data (8 bytes)
3,147,472 UART: [rt] FIPS self test
3,147,800 UART: [kat] ++
3,147,952 UART: [kat] sha1
3,148,636 UART: Fatal Error: 0x90060001
3,150,186 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,150,191 >>> mbox cmd response: failed
3,150,191 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,150,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,073 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,647 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
893,407 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,532 UART: [kat] ++
897,684 UART: [kat] sha1
901,836 UART: [kat] SHA2-256
903,776 UART: [kat] SHA2-384
906,613 UART: [kat] SHA2-512-ACC
908,514 UART: [kat] ECC-384
918,223 UART: [kat] HMAC-384Kdf
922,679 UART: [kat] LMS
1,171,007 UART: [kat] --
1,172,156 UART: [cold-reset] ++
1,172,632 UART: [fht] FHT @ 0x50003400
1,175,393 UART: [idev] ++
1,175,561 UART: [idev] CDI.KEYID = 6
1,175,921 UART: [idev] SUBJECT.KEYID = 7
1,176,345 UART: [idev] UDS.KEYID = 0
1,176,690 ready_for_fw is high
1,176,690 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,919 UART: [idev] Erasing UDS.KEYID = 0
1,200,994 UART: [idev] Sha1 KeyId Algorithm
1,209,456 UART: [idev] --
1,210,372 UART: [ldev] ++
1,210,540 UART: [ldev] CDI.KEYID = 6
1,210,903 UART: [ldev] SUBJECT.KEYID = 5
1,211,329 UART: [ldev] AUTHORITY.KEYID = 7
1,211,792 UART: [ldev] FE.KEYID = 1
1,217,084 UART: [ldev] Erasing FE.KEYID = 1
1,244,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,422 UART: [ldev] --
1,283,869 UART: [fwproc] Wait for Commands...
1,284,693 UART: [fwproc] Recv command 0x46574c44
1,285,421 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,268 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,613 >>> mbox cmd response: success
2,789,729 UART: [afmc] ++
2,789,897 UART: [afmc] CDI.KEYID = 6
2,790,259 UART: [afmc] SUBJECT.KEYID = 7
2,790,684 UART: [afmc] AUTHORITY.KEYID = 5
2,826,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,010 UART: [afmc] --
2,870,116 UART: [cold-reset] --
2,870,840 UART: [state] Locking Datavault
2,871,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,513 UART: [state] Locking ICCM
2,872,969 UART: [exit] Launching FMC @ 0x40000130
2,878,298 UART:
2,878,314 UART: Running Caliptra FMC ...
2,878,722 UART:
2,878,865 UART: [state] CFI Enabled
2,889,610 UART: [fht] FMC Alias Private Key: 7
2,997,247 UART: [art] Extend RT PCRs Done
2,997,675 UART: [art] Lock RT PCRs Done
2,999,407 UART: [art] Populate DV Done
3,007,696 UART: [fht] FMC Alias Private Key: 7
3,008,740 UART: [art] Derive CDI
3,009,020 UART: [art] Store in in slot 0x4
3,094,715 UART: [art] Derive Key Pair
3,095,075 UART: [art] Store priv key in slot 0x5
3,108,155 UART: [art] Derive Key Pair - Done
3,122,909 UART: [art] Signing Cert with AUTHO
3,123,389 UART: RITY.KEYID = 7
3,138,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,590 UART: [art] PUB.X = AFE3EEFBD068FA45596390566D44E79E46EF08BD32D150A83800C071B05BA04D4BEF269BCBB4CFE827A37504F5239EAE
3,146,348 UART: [art] PUB.Y = 09D2B7BCD497C5E399CB212C8E4F4F38688F32954D3994B2B06EF62296D46D86B546BFE8111495AE2B484A7DB807A670
3,153,294 UART: [art] SIG.R = B7172D5206E127B6189936279918359638BCBA9A4D3B2BC391940F250B0762E84430D6D536DF451AD95FDBDBD81E3F15
3,160,050 UART: [art] SIG.S = E677B52D8EBC21EBD988AD4FBE422FD81B91141791523207EE0E5EE0DEC642878CEB5D9CD61F3F9B365C985A437C1BE6
3,183,703 UART: Caliptra RT
3,184,048 UART: [state] CFI Enabled
3,291,984 UART: [rt] RT listening for mailbox commands...
3,292,647 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,620 UART: [rt]cmd =0x46504c54, len=4
3,323,731 >>> mbox cmd response data (8 bytes)
3,324,094 UART: [rt] FIPS self test
3,324,422 UART: [kat] ++
3,324,574 UART: [kat] sha1
3,325,258 UART: Fatal Error: 0x90060001
3,326,808 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,813 >>> mbox cmd response: failed
3,326,813 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
893,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,980 UART: [kat] ++
898,132 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,853 UART: [kat] SHA2-512-ACC
908,754 UART: [kat] ECC-384
918,121 UART: [kat] HMAC-384Kdf
922,931 UART: [kat] LMS
1,171,259 UART: [kat] --
1,172,236 UART: [cold-reset] ++
1,172,672 UART: [fht] FHT @ 0x50003400
1,175,439 UART: [idev] ++
1,175,607 UART: [idev] CDI.KEYID = 6
1,175,967 UART: [idev] SUBJECT.KEYID = 7
1,176,391 UART: [idev] UDS.KEYID = 0
1,176,736 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,938 UART: [idev] Sha1 KeyId Algorithm
1,210,280 UART: [idev] --
1,211,328 UART: [ldev] ++
1,211,496 UART: [ldev] CDI.KEYID = 6
1,211,859 UART: [ldev] SUBJECT.KEYID = 5
1,212,285 UART: [ldev] AUTHORITY.KEYID = 7
1,212,748 UART: [ldev] FE.KEYID = 1
1,217,994 UART: [ldev] Erasing FE.KEYID = 1
1,244,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,022 UART: [ldev] --
1,283,337 UART: [fwproc] Wait for Commands...
1,283,955 UART: [fwproc] Recv command 0x46574c44
1,284,683 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,552 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,705 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,842 ready_for_fw is high
1,060,842 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,642,170 >>> mbox cmd response: success
2,704,640 UART:
2,704,656 UART: Running Caliptra FMC ...
2,705,064 UART:
2,705,207 UART: [state] CFI Enabled
2,715,876 UART: [fht] FMC Alias Private Key: 7
2,824,043 UART: [art] Extend RT PCRs Done
2,824,471 UART: [art] Lock RT PCRs Done
2,825,853 UART: [art] Populate DV Done
2,833,984 UART: [fht] FMC Alias Private Key: 7
2,834,940 UART: [art] Derive CDI
2,835,220 UART: [art] Store in in slot 0x4
2,920,381 UART: [art] Derive Key Pair
2,920,741 UART: [art] Store priv key in slot 0x5
2,934,055 UART: [art] Derive Key Pair - Done
2,948,788 UART: [art] Signing Cert with AUTHO
2,949,268 UART: RITY.KEYID = 7
2,964,376 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,141 UART: [art] PUB.X = F5A6E1F387397B26C818EA12CE74622AB4C150E4D7F0173767D27A36D45C0D91A650D2C139DFBF251118762D69DE6BB5
2,971,912 UART: [art] PUB.Y = 4BD3D4D26B61F6E63BF635B73FD8CF910D51AB9966FA41D3379C423C5D72F9BB7B8767A394E7E8C6154079A0DB17A76F
2,978,869 UART: [art] SIG.R = 0378335E3D37629813D849519A4CFD12CFC6312E0F04C7C2289024477204029B94B3A1DCC6F07BD8D82D740EC15AFC4E
2,985,621 UART: [art] SIG.S = 5A0337BB5C972658D2227BC516706B0411FB2A1CCB51AFE3C9C7B21DCDDA5AB0A280780F47E98DFC1023B723D50E8075
3,009,392 UART: Caliptra RT
3,009,737 UART: [state] CFI Enabled
3,116,550 UART: [rt] RT listening for mailbox commands...
3,117,213 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,948 UART: [rt]cmd =0x46504c54, len=4
3,148,329 >>> mbox cmd response data (8 bytes)
3,148,588 UART: [rt] FIPS self test
3,148,916 UART: [kat] ++
3,149,068 UART: [kat] sha1
3,149,846 UART: Fatal Error: 0x90060001
3,151,396 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,151,401 >>> mbox cmd response: failed
3,151,401 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,151,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,578 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,652 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,845 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,705 UART: [kat] ++
895,857 UART: [kat] sha1
900,183 UART: [kat] SHA2-256
902,123 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,906 UART: [kat] LMS
1,169,218 UART: [kat] --
1,170,221 UART: [cold-reset] ++
1,170,741 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,174,627 ready_for_fw is high
1,174,627 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,169 UART: [idev] Erasing UDS.KEYID = 0
1,199,463 UART: [idev] Sha1 KeyId Algorithm
1,208,211 UART: [idev] --
1,209,258 UART: [ldev] ++
1,209,426 UART: [ldev] CDI.KEYID = 6
1,209,790 UART: [ldev] SUBJECT.KEYID = 5
1,210,217 UART: [ldev] AUTHORITY.KEYID = 7
1,210,680 UART: [ldev] FE.KEYID = 1
1,215,886 UART: [ldev] Erasing FE.KEYID = 1
1,241,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,998 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,107 UART: [fwproc] Recv command 0x46574c44
1,282,840 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,140 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,540 >>> mbox cmd response: success
2,787,603 UART: [afmc] ++
2,787,771 UART: [afmc] CDI.KEYID = 6
2,788,134 UART: [afmc] SUBJECT.KEYID = 7
2,788,560 UART: [afmc] AUTHORITY.KEYID = 5
2,824,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,779 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,520 UART: [afmc] --
2,867,614 UART: [cold-reset] --
2,868,420 UART: [state] Locking Datavault
2,869,295 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,899 UART: [state] Locking ICCM
2,870,513 UART: [exit] Launching FMC @ 0x40000130
2,875,842 UART:
2,875,858 UART: Running Caliptra FMC ...
2,876,266 UART:
2,876,320 UART: [state] CFI Enabled
2,886,509 UART: [fht] FMC Alias Private Key: 7
2,994,316 UART: [art] Extend RT PCRs Done
2,994,744 UART: [art] Lock RT PCRs Done
2,996,062 UART: [art] Populate DV Done
3,004,425 UART: [fht] FMC Alias Private Key: 7
3,005,561 UART: [art] Derive CDI
3,005,841 UART: [art] Store in in slot 0x4
3,091,272 UART: [art] Derive Key Pair
3,091,632 UART: [art] Store priv key in slot 0x5
3,104,654 UART: [art] Derive Key Pair - Done
3,119,164 UART: [art] Signing Cert with AUTHO
3,119,644 UART: RITY.KEYID = 7
3,134,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,335 UART: [art] PUB.X = C00899CC1D71049D89FF4FF8A5EDBB450FF1154C79304A08908A09BF94C92D7460EB060F9FAECE8EF9D6FAB7F98D48D1
3,142,102 UART: [art] PUB.Y = 172D528C2F03B184B37549A9BD3658C6CEBE7913A7F187DC76B03345FB76D2A80D0E9CD5DB35D2D3C485AF4363B01C56
3,149,051 UART: [art] SIG.R = 4B35BBF0D1EE93246F516653CB85C14383D2717D4E368DD444CD8BCA5F91CF22753B40FFEACEB5A355951DC110C26B53
3,155,833 UART: [art] SIG.S = F6B2ABEE901F12739D04F36424EE715DEFEED6D0F8E38C0996D8FC390AC23DE568C1A04525A5300D1EDF7FD5025E43A4
3,179,791 UART: Caliptra RT
3,180,044 UART: [state] CFI Enabled
3,287,635 UART: [rt] RT listening for mailbox commands...
3,288,298 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,915 UART: [rt]cmd =0x46504c54, len=4
3,319,122 >>> mbox cmd response data (8 bytes)
3,319,313 UART: [rt] FIPS self test
3,319,641 UART: [kat] ++
3,319,793 UART: [kat] sha1
3,320,441 UART: Fatal Error: 0x90060001
3,321,991 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,321,996 >>> mbox cmd response: failed
3,321,996 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,322,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,818 UART: [kat] HMAC-384Kdf
920,384 UART: [kat] LMS
1,168,696 UART: [kat] --
1,169,357 UART: [cold-reset] ++
1,169,735 UART: [fht] FHT @ 0x50003400
1,172,507 UART: [idev] ++
1,172,675 UART: [idev] CDI.KEYID = 6
1,173,036 UART: [idev] SUBJECT.KEYID = 7
1,173,461 UART: [idev] UDS.KEYID = 0
1,173,807 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,198,159 UART: [idev] Sha1 KeyId Algorithm
1,207,127 UART: [idev] --
1,208,242 UART: [ldev] ++
1,208,410 UART: [ldev] CDI.KEYID = 6
1,208,774 UART: [ldev] SUBJECT.KEYID = 5
1,209,201 UART: [ldev] AUTHORITY.KEYID = 7
1,209,664 UART: [ldev] FE.KEYID = 1
1,214,856 UART: [ldev] Erasing FE.KEYID = 1
1,240,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,062 UART: [ldev] --
1,280,426 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,539 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,848 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,096 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,970 ready_for_fw is high
1,055,970 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,588 >>> mbox cmd response: success
2,698,518 UART:
2,698,534 UART: Running Caliptra FMC ...
2,698,942 UART:
2,698,996 UART: [state] CFI Enabled
2,709,457 UART: [fht] FMC Alias Private Key: 7
2,817,240 UART: [art] Extend RT PCRs Done
2,817,668 UART: [art] Lock RT PCRs Done
2,819,156 UART: [art] Populate DV Done
2,827,355 UART: [fht] FMC Alias Private Key: 7
2,828,533 UART: [art] Derive CDI
2,828,813 UART: [art] Store in in slot 0x4
2,914,684 UART: [art] Derive Key Pair
2,915,044 UART: [art] Store priv key in slot 0x5
2,928,114 UART: [art] Derive Key Pair - Done
2,942,660 UART: [art] Signing Cert with AUTHO
2,943,140 UART: RITY.KEYID = 7
2,958,102 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,867 UART: [art] PUB.X = 0336D83419B478A0441954492E1FEF3A56AB757A064A36D852677B2D4459B7635906D55B628F839A29AF75DE38CE1EC3
2,965,622 UART: [art] PUB.Y = 45EF918EB2EC74C9CFA02BE75C8BA6C6A10E4D11097572A8B076E02E0581188FD86AEE7F0DD2CAA1A47BC06F9484740B
2,972,573 UART: [art] SIG.R = 0CD958FA63E2FFE5CB4E499D321342D5A6581A609534C8336854B576DD4A03DF1C25D8DA293EDAB6062B98D8243AFA28
2,979,342 UART: [art] SIG.S = D6C5046555FA63DF7C1A6455952D1F46AA6F6D00F2AD3DF8BF77DD259429A0576A871BB0DC666B716715A90122684D0E
3,003,814 UART: Caliptra RT
3,004,067 UART: [state] CFI Enabled
3,112,366 UART: [rt] RT listening for mailbox commands...
3,113,029 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,802 UART: [rt]cmd =0x46504c54, len=4
3,143,955 >>> mbox cmd response data (8 bytes)
3,144,248 UART: [rt] FIPS self test
3,144,576 UART: [kat] ++
3,144,728 UART: [kat] sha1
3,145,458 UART: Fatal Error: 0x90060001
3,147,008 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,147,013 >>> mbox cmd response: failed
3,147,013 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,147,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,450 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,804 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
916,641 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,920 UART: [fht] FHT @ 0x50003400
1,173,670 UART: [idev] ++
1,173,838 UART: [idev] CDI.KEYID = 6
1,174,199 UART: [idev] SUBJECT.KEYID = 7
1,174,624 UART: [idev] UDS.KEYID = 0
1,174,970 ready_for_fw is high
1,174,970 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,424 UART: [idev] Erasing UDS.KEYID = 0
1,199,760 UART: [idev] Sha1 KeyId Algorithm
1,208,572 UART: [idev] --
1,209,653 UART: [ldev] ++
1,209,821 UART: [ldev] CDI.KEYID = 6
1,210,185 UART: [ldev] SUBJECT.KEYID = 5
1,210,612 UART: [ldev] AUTHORITY.KEYID = 7
1,211,075 UART: [ldev] FE.KEYID = 1
1,216,315 UART: [ldev] Erasing FE.KEYID = 1
1,241,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,573 UART: [ldev] --
1,280,947 UART: [fwproc] Wait for Commands...
1,281,592 UART: [fwproc] Recv command 0x46574c44
1,282,325 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,025 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,369 >>> mbox cmd response: success
2,787,622 UART: [afmc] ++
2,787,790 UART: [afmc] CDI.KEYID = 6
2,788,153 UART: [afmc] SUBJECT.KEYID = 7
2,788,579 UART: [afmc] AUTHORITY.KEYID = 5
2,824,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,905 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,517 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,236 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,053 UART: [afmc] --
2,868,003 UART: [cold-reset] --
2,868,901 UART: [state] Locking Datavault
2,869,816 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,420 UART: [state] Locking ICCM
2,871,068 UART: [exit] Launching FMC @ 0x40000130
2,876,397 UART:
2,876,413 UART: Running Caliptra FMC ...
2,876,821 UART:
2,876,964 UART: [state] CFI Enabled
2,887,653 UART: [fht] FMC Alias Private Key: 7
2,995,696 UART: [art] Extend RT PCRs Done
2,996,124 UART: [art] Lock RT PCRs Done
2,997,608 UART: [art] Populate DV Done
3,005,787 UART: [fht] FMC Alias Private Key: 7
3,006,953 UART: [art] Derive CDI
3,007,233 UART: [art] Store in in slot 0x4
3,092,508 UART: [art] Derive Key Pair
3,092,868 UART: [art] Store priv key in slot 0x5
3,106,314 UART: [art] Derive Key Pair - Done
3,121,282 UART: [art] Signing Cert with AUTHO
3,121,762 UART: RITY.KEYID = 7
3,136,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,491 UART: [art] PUB.X = EDD797ED9249796C890F49FF01809CF135003DC938E1CB8BC18D3C3CEE6A4BAE05FB5D63BF362AA57AE1A6FEA53C2D51
3,144,252 UART: [art] PUB.Y = 07284BF5905E13E757DD4F704168EF8EA3CBB8FF5051A697152FAB03FA3717C2E1A49938407D1567AC9B64C8F2D47396
3,151,198 UART: [art] SIG.R = 53FEDEAD9705E60D213BE25653669E23E0F950BAA395D7ACFA0403AB133837F0B91A66C050DE3CF383497B82D129058D
3,157,959 UART: [art] SIG.S = D6D299DDB6796A52BB969D10D56AF5AAFA8330DE9E8B8FECBB961E5D3699AB1AD1FE329486F2CCA74D3C3F193214C46F
3,181,642 UART: Caliptra RT
3,181,987 UART: [state] CFI Enabled
3,290,712 UART: [rt] RT listening for mailbox commands...
3,291,375 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,840 UART: [rt]cmd =0x46504c54, len=4
3,322,081 >>> mbox cmd response data (8 bytes)
3,322,360 UART: [rt] FIPS self test
3,322,688 UART: [kat] ++
3,322,840 UART: [kat] sha1
3,323,448 UART: Fatal Error: 0x90060001
3,324,998 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,325,003 >>> mbox cmd response: failed
3,325,003 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,325,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,836 UART: [kat] ++
895,988 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,689 UART: [kat] LMS
1,170,001 UART: [kat] --
1,170,842 UART: [cold-reset] ++
1,171,252 UART: [fht] FHT @ 0x50003400
1,173,948 UART: [idev] ++
1,174,116 UART: [idev] CDI.KEYID = 6
1,174,477 UART: [idev] SUBJECT.KEYID = 7
1,174,902 UART: [idev] UDS.KEYID = 0
1,175,248 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,564 UART: [idev] Erasing UDS.KEYID = 0
1,199,238 UART: [idev] Sha1 KeyId Algorithm
1,208,040 UART: [idev] --
1,208,925 UART: [ldev] ++
1,209,093 UART: [ldev] CDI.KEYID = 6
1,209,457 UART: [ldev] SUBJECT.KEYID = 5
1,209,884 UART: [ldev] AUTHORITY.KEYID = 7
1,210,347 UART: [ldev] FE.KEYID = 1
1,215,777 UART: [ldev] Erasing FE.KEYID = 1
1,242,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,045 UART: [ldev] --
1,281,563 UART: [fwproc] Wait for Commands...
1,282,354 UART: [fwproc] Recv command 0x46574c44
1,283,087 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,223 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,487 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,417 ready_for_fw is high
1,056,417 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,657 >>> mbox cmd response: success
2,698,667 UART:
2,698,683 UART: Running Caliptra FMC ...
2,699,091 UART:
2,699,234 UART: [state] CFI Enabled
2,709,685 UART: [fht] FMC Alias Private Key: 7
2,816,772 UART: [art] Extend RT PCRs Done
2,817,200 UART: [art] Lock RT PCRs Done
2,818,652 UART: [art] Populate DV Done
2,827,011 UART: [fht] FMC Alias Private Key: 7
2,827,959 UART: [art] Derive CDI
2,828,239 UART: [art] Store in in slot 0x4
2,913,756 UART: [art] Derive Key Pair
2,914,116 UART: [art] Store priv key in slot 0x5
2,927,516 UART: [art] Derive Key Pair - Done
2,942,053 UART: [art] Signing Cert with AUTHO
2,942,533 UART: RITY.KEYID = 7
2,958,187 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,952 UART: [art] PUB.X = 2E6C6795FE7659EE5B49052993A68426496828C64978EF30FA27AC098D12CB1B626261E8B4FAB4206043A2D1D50AB9A5
2,965,711 UART: [art] PUB.Y = 432543DA902970A710F535FA20370E5E19AAE320370B1B9484D7E4643B9EFD50D1882E429BDA85DD0E822098BBC74B8C
2,972,654 UART: [art] SIG.R = F318D94C99CC950C966D9A0027A66A0E8F41CCE97F7BFA080DB880064739D49B553EF741C28FA66AB758E353B7AB91F0
2,979,395 UART: [art] SIG.S = 4A4F8997970D49CCB2DC26978DA60995C5E895B0ED90E7379DAF1C613997F0B53DF8F664E6953533B1D068962D31FE13
3,003,286 UART: Caliptra RT
3,003,631 UART: [state] CFI Enabled
3,112,062 UART: [rt] RT listening for mailbox commands...
3,112,725 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,626 UART: [rt]cmd =0x46504c54, len=4
3,143,725 >>> mbox cmd response data (8 bytes)
3,144,062 UART: [rt] FIPS self test
3,144,390 UART: [kat] ++
3,144,542 UART: [kat] sha1
3,145,390 UART: Fatal Error: 0x90060001
3,146,940 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,146,945 >>> mbox cmd response: failed
3,146,945 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,146,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,551 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,809 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
2,687,050 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,831,514 >>> mbox cmd response: failed
2,832,082 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,975,437 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
4,865,311 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,450,600 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
2,688,546 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,832,756 >>> mbox cmd response: failed
2,833,423 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,976,763 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
4,864,582 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,418,806 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,035,651 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,179,852 >>> mbox cmd response: failed
3,180,420 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,323,739 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
21,590,297 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,029,923 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,033,951 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,178,006 >>> mbox cmd response: failed
3,178,573 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,321,930 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
21,580,721 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,027,983 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
2,688,205 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,832,863 >>> mbox cmd response: failed
2,833,435 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,977,024 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,446,034 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,305,185 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,692,991 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,837,629 >>> mbox cmd response: failed
2,838,201 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,981,952 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,453,170 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,259,037 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,059,877 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,204,520 >>> mbox cmd response: failed
3,205,070 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,348,656 >>> mbox cmd response: failed
Initializing fuses
1,005 writing to cptra_bootfsm_go
20,179,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,884,075 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,049,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,194,056 >>> mbox cmd response: failed
3,194,618 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,338,357 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,181,684 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,896,791 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
2,689,063 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,833,531 >>> mbox cmd response: failed
2,834,085 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,978,303 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,430,913 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,243,310 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,045,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,189,859 >>> mbox cmd response: failed
3,190,454 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,334,723 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
20,176,042 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,901,714 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,207 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,215 >>> mbox cmd response: failed
807,215 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,221 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,158 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,051 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,059 >>> mbox cmd response: failed
807,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,209 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,264 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,318 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,326 >>> mbox cmd response: failed
807,326 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,632 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,807 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,562 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,570 >>> mbox cmd response: failed
807,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,194 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,515 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
808,061 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
808,069 >>> mbox cmd response: failed
808,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
808,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,575 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,194 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,441 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,449 >>> mbox cmd response: failed
807,449 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,932 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
808,054 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
808,062 >>> mbox cmd response: failed
808,062 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
808,068 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,469 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,344 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,352 >>> mbox cmd response: failed
807,352 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,358 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,378 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,695 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,731 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
806,739 >>> mbox cmd response: failed
806,739 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
806,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,928 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,737 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
806,745 >>> mbox cmd response: failed
806,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
806,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,770 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,294 >>> mbox cmd response: failed
807,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,734 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,621 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,602 >>> mbox cmd response: failed
807,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
807,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,150 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,737 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,211 UART:
192,573 UART: Running Caliptra ROM ...
193,752 UART:
193,906 UART: [state] CFI Enabled
263,800 UART: [state] LifecycleState = Unprovisioned
265,786 UART: [state] DebugLocked = No
267,216 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,782 UART: [kat] SHA2-256
442,525 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,999 UART: [kat] ++
453,482 UART: [kat] sha1
465,246 UART: [kat] SHA2-256
467,949 UART: [kat] SHA2-384
474,730 UART: [kat] SHA2-512-ACC
477,103 UART: [kat] ECC-384
2,765,004 UART: [kat] HMAC-384Kdf
2,778,335 UART: [kat] LMS
3,968,670 UART: [kat] --
3,972,312 UART: [cold-reset] ++
3,974,601 UART: [fht] Storing FHT @ 0x50003400
3,986,945 UART: [idev] ++
3,987,616 UART: [idev] CDI.KEYID = 6
3,988,528 UART: [idev] SUBJECT.KEYID = 7
3,989,711 UART: [idev] UDS.KEYID = 0
3,990,790 ready_for_fw is high
3,991,001 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,135,520 UART: [idev] Erasing UDS.KEYID = 0
7,320,952 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,991 UART: [idev] --
7,346,746 UART: [ldev] ++
7,347,326 UART: [ldev] CDI.KEYID = 6
7,348,238 UART: [ldev] SUBJECT.KEYID = 5
7,349,456 UART: [ldev] AUTHORITY.KEYID = 7
7,350,746 UART: [ldev] FE.KEYID = 1
7,378,628 UART: [ldev] Erasing FE.KEYID = 1
10,710,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,298 UART: [ldev] --
13,090,861 UART: [fwproc] Waiting for Commands...
13,092,970 UART: [fwproc] Received command 0x46574c44
13,095,217 UART: [fwproc] Received Image of size 114996 bytes
17,157,356 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,324 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,623,253 >>> mbox cmd response: success
17,627,966 UART: [afmc] ++
17,628,559 UART: [afmc] CDI.KEYID = 6
17,629,471 UART: [afmc] SUBJECT.KEYID = 7
17,630,688 UART: [afmc] AUTHORITY.KEYID = 5
21,005,314 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,399 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,708 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,110 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,947 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,393 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,144 UART: [afmc] --
23,376,741 UART: [cold-reset] --
23,379,633 UART: [state] Locking Datavault
23,386,342 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,101 UART: [state] Locking ICCM
23,389,497 UART: [exit] Launching FMC @ 0x40000130
23,397,892 UART:
23,398,131 UART: Running Caliptra FMC ...
23,399,235 UART:
23,399,397 UART: [state] CFI Enabled
23,464,863 UART: [fht] FMC Alias Private Key: 7
25,803,278 UART: [art] Extend RT PCRs Done
25,804,505 UART: [art] Lock RT PCRs Done
25,805,875 UART: [art] Populate DV Done
25,811,244 UART: [fht] FMC Alias Private Key: 7
25,812,999 UART: [art] Derive CDI
25,813,822 UART: [art] Store in in slot 0x4
25,873,177 UART: [art] Derive Key Pair
25,874,224 UART: [art] Store priv key in slot 0x5
29,167,314 UART: [art] Derive Key Pair - Done
29,180,164 UART: [art] Signing Cert with AUTHO
29,181,511 UART: RITY.KEYID = 7
31,468,237 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,743 UART: [art] PUB.X = 34CFFA635CF89453FD35EAC3D303571D7E8813551493B4FFE1F9144C1164F279261165C299925B5B34BF63489E300DA1
31,477,004 UART: [art] PUB.Y = 8A75826147C8AF905097AFA0F2C371786CED0C25449FC6ECFE4F899058E479318B8DEE138B5053085545FC12F8716B26
31,484,257 UART: [art] SIG.R = 345ED628BFCB6CCDCE5432F801F490B1932C830B6305FCB0E68BD5FD77EB5F0E2D9BCDDF6BE34F4038A3D43DCF6B3CEB
31,491,677 UART: [art] SIG.S = 4233196A0635A55728FE3D98F659763390F64EB2FC76EC9858E49623EBD08BA2A34369ECD07F5C6D479FE5027A98C474
32,796,657 UART: Caliptra RT
32,797,358 UART: [state] CFI Enabled
32,958,674 UART: [rt] RT listening for mailbox commands...
32,960,521 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,990,260 UART: [rt]cmd =0x46504c54, len=4
32,991,678 >>> mbox cmd response data (8 bytes)
32,992,970 UART: [rt] FIPS self test
32,993,910 UART: [kat] ++
32,994,359 UART: [kat] sha1
32,998,794 UART: Fatal Error: 0x90060002
33,034,176 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,179,059 >>> mbox cmd response: failed
33,179,686 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,323,924 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
189,985 UART:
190,278 UART: Running Caliptra ROM ...
191,309 UART:
191,447 UART: [state] CFI Enabled
255,785 UART: [state] LifecycleState = Unprovisioned
257,704 UART: [state] DebugLocked = No
259,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,892 UART: [kat] SHA2-256
433,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,109 UART: [kat] ++
444,617 UART: [kat] sha1
456,519 UART: [kat] SHA2-256
459,198 UART: [kat] SHA2-384
465,818 UART: [kat] SHA2-512-ACC
468,218 UART: [kat] ECC-384
2,758,816 UART: [kat] HMAC-384Kdf
2,789,412 UART: [kat] LMS
3,979,730 UART: [kat] --
3,983,578 UART: [cold-reset] ++
3,984,874 UART: [fht] Storing FHT @ 0x50003400
3,995,780 UART: [idev] ++
3,996,347 UART: [idev] CDI.KEYID = 6
3,997,313 UART: [idev] SUBJECT.KEYID = 7
3,998,528 UART: [idev] UDS.KEYID = 0
4,000,142 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,144,798 UART: [idev] Erasing UDS.KEYID = 0
7,336,351 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,143 UART: [idev] --
7,362,929 UART: [ldev] ++
7,363,505 UART: [ldev] CDI.KEYID = 6
7,364,472 UART: [ldev] SUBJECT.KEYID = 5
7,365,709 UART: [ldev] AUTHORITY.KEYID = 7
7,366,948 UART: [ldev] FE.KEYID = 1
7,411,566 UART: [ldev] Erasing FE.KEYID = 1
10,742,666 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,035,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,050,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,065,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,079,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,098,209 UART: [ldev] --
13,102,240 UART: [fwproc] Waiting for Commands...
13,105,529 UART: [fwproc] Received command 0x46574c44
13,107,718 UART: [fwproc] Received Image of size 114996 bytes
17,171,209 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,920 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,635,860 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,782,376 ready_for_fw is high
3,782,771 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,890,021 >>> mbox cmd response: success
23,578,093 UART:
23,578,485 UART: Running Caliptra FMC ...
23,579,604 UART:
23,579,770 UART: [state] CFI Enabled
23,647,792 UART: [fht] FMC Alias Private Key: 7
25,985,920 UART: [art] Extend RT PCRs Done
25,987,138 UART: [art] Lock RT PCRs Done
25,988,987 UART: [art] Populate DV Done
25,994,460 UART: [fht] FMC Alias Private Key: 7
25,995,945 UART: [art] Derive CDI
25,996,728 UART: [art] Store in in slot 0x4
26,056,217 UART: [art] Derive Key Pair
26,057,222 UART: [art] Store priv key in slot 0x5
29,350,019 UART: [art] Derive Key Pair - Done
29,362,801 UART: [art] Signing Cert with AUTHO
29,364,138 UART: RITY.KEYID = 7
31,651,937 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,445 UART: [art] PUB.X = 300C14C65CD19667CB1441CCC9443479DE9F93D8D033A73F18620BB80B79337B277F6053AE72980600F249FD08365A9D
31,660,644 UART: [art] PUB.Y = 7B9AC105B034875E66434B840C91CEA412009C3C1B175EF25DD69BD56ADF0F53B2FB109B8E4AAD061CDBB7F43D2F3CFE
31,667,900 UART: [art] SIG.R = 98C4F5105E3CC8533DE0A2F1837E9B5F4D8449017C734FB96F41957723580F8BD3A401E6A86230B08C9E5BE287A219F8
31,675,256 UART: [art] SIG.S = 98F4D9DE4881D09896C5F2197EDBE92CA8442B01E4595AE902457698AAA303D32687FC3A0B65964DDA38A666E7974446
32,980,789 UART: Caliptra RT
32,981,500 UART: [state] CFI Enabled
33,140,722 UART: [rt] RT listening for mailbox commands...
33,142,580 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,172,060 UART: [rt]cmd =0x46504c54, len=4
33,173,862 >>> mbox cmd response data (8 bytes)
33,174,918 UART: [rt] FIPS self test
33,175,863 UART: [kat] ++
33,176,317 UART: [kat] sha1
33,180,722 UART: Fatal Error: 0x90060002
33,216,094 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,360,605 >>> mbox cmd response: failed
33,361,224 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,505,861 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,798,539 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,902,492 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,565 UART:
192,933 UART: Running Caliptra ROM ...
194,054 UART:
603,688 UART: [state] CFI Enabled
616,844 UART: [state] LifecycleState = Unprovisioned
618,793 UART: [state] DebugLocked = No
620,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,487 UART: [kat] SHA2-256
796,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,855 UART: [kat] ++
807,338 UART: [kat] sha1
818,147 UART: [kat] SHA2-256
820,879 UART: [kat] SHA2-384
827,092 UART: [kat] SHA2-512-ACC
829,476 UART: [kat] ECC-384
3,113,591 UART: [kat] HMAC-384Kdf
3,124,631 UART: [kat] LMS
4,314,716 UART: [kat] --
4,317,454 UART: [cold-reset] ++
4,319,463 UART: [fht] Storing FHT @ 0x50003400
4,332,245 UART: [idev] ++
4,332,856 UART: [idev] CDI.KEYID = 6
4,333,773 UART: [idev] SUBJECT.KEYID = 7
4,335,021 UART: [idev] UDS.KEYID = 0
4,335,991 ready_for_fw is high
4,336,198 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,480,485 UART: [idev] Erasing UDS.KEYID = 0
7,623,963 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,054 UART: [idev] --
7,651,678 UART: [ldev] ++
7,652,249 UART: [ldev] CDI.KEYID = 6
7,653,270 UART: [ldev] SUBJECT.KEYID = 5
7,654,442 UART: [ldev] AUTHORITY.KEYID = 7
7,655,677 UART: [ldev] FE.KEYID = 1
7,666,217 UART: [ldev] Erasing FE.KEYID = 1
10,953,900 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,855 UART: [ldev] --
13,316,205 UART: [fwproc] Waiting for Commands...
13,318,955 UART: [fwproc] Received command 0x46574c44
13,321,141 UART: [fwproc] Received Image of size 114996 bytes
17,384,071 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,658 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,845,308 >>> mbox cmd response: success
17,849,043 UART: [afmc] ++
17,849,664 UART: [afmc] CDI.KEYID = 6
17,850,738 UART: [afmc] SUBJECT.KEYID = 7
17,851,843 UART: [afmc] AUTHORITY.KEYID = 5
21,171,643 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,466,649 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,468,909 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,483,257 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,498,106 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,512,530 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,534,729 UART: [afmc] --
23,538,022 UART: [cold-reset] --
23,540,434 UART: [state] Locking Datavault
23,545,191 UART: [state] Locking PCR0, PCR1 and PCR31
23,546,940 UART: [state] Locking ICCM
23,549,737 UART: [exit] Launching FMC @ 0x40000130
23,558,128 UART:
23,558,371 UART: Running Caliptra FMC ...
23,559,477 UART:
23,559,637 UART: [state] CFI Enabled
23,567,632 UART: [fht] FMC Alias Private Key: 7
25,899,292 UART: [art] Extend RT PCRs Done
25,900,516 UART: [art] Lock RT PCRs Done
25,902,362 UART: [art] Populate DV Done
25,908,124 UART: [fht] FMC Alias Private Key: 7
25,909,727 UART: [art] Derive CDI
25,910,549 UART: [art] Store in in slot 0x4
25,953,040 UART: [art] Derive Key Pair
25,954,084 UART: [art] Store priv key in slot 0x5
29,195,798 UART: [art] Derive Key Pair - Done
29,208,698 UART: [art] Signing Cert with AUTHO
29,210,036 UART: RITY.KEYID = 7
31,489,639 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,148 UART: [art] PUB.X = A5663DD5E4AD50D3B2D9B5304CB3D4F9B5F41B359888F63D05FB90BC911DB6109A33DF88F573D7468FFB7BD30530BC30
31,498,405 UART: [art] PUB.Y = 52F9F9DC98FAEFFA2A4301C189D254A42DCC4C68CD98BBE5055D7F9EF4D6FF7E9080EB99A81B0AF58D96E81942113B1B
31,505,701 UART: [art] SIG.R = 5209A6A65FA6524E2F32F86CBA8640564ADC73FAAD397634DC1B944C8C224791AA603CA476AE1484184EF6558DFFC82B
31,513,041 UART: [art] SIG.S = 2EADCBB3F053A1059BCC51EE74105FFB1A406A6EDE8528065883ABC343C929C26DE9AE719BD3C371CD14AB6319651507
32,817,812 UART: Caliptra RT
32,818,526 UART: [state] CFI Enabled
32,935,493 UART: [rt] RT listening for mailbox commands...
32,937,360 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,967,205 UART: [rt]cmd =0x46504c54, len=4
32,968,872 >>> mbox cmd response data (8 bytes)
32,970,163 UART: [rt] FIPS self test
32,971,112 UART: [kat] ++
32,971,559 UART: [kat] sha1
32,975,690 UART: Fatal Error: 0x90060002
33,010,890 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,155,310 >>> mbox cmd response: failed
33,155,947 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,300,353 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,097 UART:
190,390 UART: Running Caliptra ROM ...
191,504 UART:
7,228,800 UART: [state] CFI Enabled
7,244,310 UART: [state] LifecycleState = Unprovisioned
7,246,228 UART: [state] DebugLocked = No
7,248,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,253,400 UART: [kat] SHA2-256
7,423,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,433,694 UART: [kat] ++
7,434,153 UART: [kat] sha1
7,445,852 UART: [kat] SHA2-256
7,448,595 UART: [kat] SHA2-384
7,452,910 UART: [kat] SHA2-512-ACC
7,455,321 UART: [kat] ECC-384
9,736,651 UART: [kat] HMAC-384Kdf
9,748,651 UART: [kat] LMS
10,938,793 UART: [kat] --
10,944,243 UART: [cold-reset] ++
10,946,790 UART: [fht] Storing FHT @ 0x50003400
10,958,844 UART: [idev] ++
10,959,479 UART: [idev] CDI.KEYID = 6
10,960,358 UART: [idev] SUBJECT.KEYID = 7
10,961,624 UART: [idev] UDS.KEYID = 0
10,963,168 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,107,607 UART: [idev] Erasing UDS.KEYID = 0
14,248,280 UART: [idev] Using Sha1 for KeyId Algorithm
14,270,200 UART: [idev] --
14,273,173 UART: [ldev] ++
14,273,741 UART: [ldev] CDI.KEYID = 6
14,274,703 UART: [ldev] SUBJECT.KEYID = 5
14,275,916 UART: [ldev] AUTHORITY.KEYID = 7
14,277,144 UART: [ldev] FE.KEYID = 1
14,287,790 UART: [ldev] Erasing FE.KEYID = 1
17,571,530 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,867,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,881,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,896,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,911,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,929,722 UART: [ldev] --
19,935,151 UART: [fwproc] Waiting for Commands...
19,938,116 UART: [fwproc] Received command 0x46574c44
19,940,301 UART: [fwproc] Received Image of size 114996 bytes
23,999,579 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,082,159 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,151,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,471,311 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
4,125,555 ready_for_fw is high
4,126,171 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,077,574 >>> mbox cmd response: success
23,717,326 UART:
23,717,730 UART: Running Caliptra FMC ...
23,718,838 UART:
23,718,989 UART: [state] CFI Enabled
23,727,092 UART: [fht] FMC Alias Private Key: 7
26,057,764 UART: [art] Extend RT PCRs Done
26,059,001 UART: [art] Lock RT PCRs Done
26,060,713 UART: [art] Populate DV Done
26,066,157 UART: [fht] FMC Alias Private Key: 7
26,067,816 UART: [art] Derive CDI
26,068,560 UART: [art] Store in in slot 0x4
26,111,655 UART: [art] Derive Key Pair
26,112,698 UART: [art] Store priv key in slot 0x5
29,354,559 UART: [art] Derive Key Pair - Done
29,367,459 UART: [art] Signing Cert with AUTHO
29,368,806 UART: RITY.KEYID = 7
31,647,847 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,358 UART: [art] PUB.X = C6AF61049F05251090044C838C7F012435267E3BBFB4EFC9C0F502F608B632C35D98EF2008586C05D42B957D600A5501
31,656,621 UART: [art] PUB.Y = 2530E58F3ED13D00F4D6D37C0036A34AF9BF047C8BF501F5E7ED8F13A447BF296CC2DD4C20D7FB4F97C72B3B5C54584C
31,663,837 UART: [art] SIG.R = F78622C84CF45B7290E0F5D2BB8092BC44F744B117CFFF44792A0E7E1373BBBBE69DB78A46E8939FFEA2D84A4DC38263
31,671,235 UART: [art] SIG.S = 0FDCE9AF3824171971E2DE779016839996203E695212CC965B5AE7EBDAF2963845E21BEC24253D625296C3496AC3EE47
32,976,557 UART: Caliptra RT
32,977,279 UART: [state] CFI Enabled
33,095,223 UART: [rt] RT listening for mailbox commands...
33,097,105 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,126,704 UART: [rt]cmd =0x46504c54, len=4
33,128,264 >>> mbox cmd response data (8 bytes)
33,129,853 UART: [rt] FIPS self test
33,130,796 UART: [kat] ++
33,131,248 UART: [kat] sha1
33,135,648 UART: Fatal Error: 0x90060002
33,170,848 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,315,261 >>> mbox cmd response: failed
33,315,924 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,460,293 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
10,600,734 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,550,349 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,133 UART:
192,513 UART: Running Caliptra ROM ...
193,739 UART:
193,895 UART: [state] CFI Enabled
264,035 UART: [state] LifecycleState = Unprovisioned
265,954 UART: [state] DebugLocked = No
268,130 UART: [state] WD Timer not started. Device not locked for debugging
271,447 UART: [kat] SHA2-256
450,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,149 UART: [kat] ++
462,686 UART: [kat] sha1
474,775 UART: [kat] SHA2-256
477,794 UART: [kat] SHA2-384
484,138 UART: [kat] SHA2-512-ACC
487,078 UART: [kat] ECC-384
2,951,008 UART: [kat] HMAC-384Kdf
2,971,500 UART: [kat] LMS
3,500,916 UART: [kat] --
3,505,415 UART: [cold-reset] ++
3,507,918 UART: [fht] FHT @ 0x50003400
3,518,905 UART: [idev] ++
3,519,472 UART: [idev] CDI.KEYID = 6
3,520,383 UART: [idev] SUBJECT.KEYID = 7
3,521,560 UART: [idev] UDS.KEYID = 0
3,522,485 ready_for_fw is high
3,522,706 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,667,755 UART: [idev] Erasing UDS.KEYID = 0
6,026,012 UART: [idev] Sha1 KeyId Algorithm
6,049,632 UART: [idev] --
6,054,393 UART: [ldev] ++
6,054,969 UART: [ldev] CDI.KEYID = 6
6,055,882 UART: [ldev] SUBJECT.KEYID = 5
6,057,045 UART: [ldev] AUTHORITY.KEYID = 7
6,058,279 UART: [ldev] FE.KEYID = 1
6,102,697 UART: [ldev] Erasing FE.KEYID = 1
8,605,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,871 UART: [ldev] --
10,397,667 UART: [fwproc] Wait for Commands...
10,399,765 UART: [fwproc] Recv command 0x46574c44
10,401,864 UART: [fwproc] Recv'd Img size: 115304 bytes
13,818,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,742 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,285,521 >>> mbox cmd response: success
14,289,254 UART: [afmc] ++
14,289,844 UART: [afmc] CDI.KEYID = 6
14,290,754 UART: [afmc] SUBJECT.KEYID = 7
14,291,909 UART: [afmc] AUTHORITY.KEYID = 5
16,832,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,558,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,559,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,575,739 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,591,721 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,607,605 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,630,478 UART: [afmc] --
18,633,858 UART: [cold-reset] --
18,636,150 UART: [state] Locking Datavault
18,640,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,335 UART: [state] Locking ICCM
18,644,755 UART: [exit] Launching FMC @ 0x40000130
18,653,150 UART:
18,653,393 UART: Running Caliptra FMC ...
18,654,490 UART:
18,654,651 UART: [state] CFI Enabled
18,715,985 UART: [fht] FMC Alias Private Key: 7
20,479,925 UART: [art] Extend RT PCRs Done
20,481,131 UART: [art] Lock RT PCRs Done
20,482,779 UART: [art] Populate DV Done
20,488,347 UART: [fht] FMC Alias Private Key: 7
20,489,850 UART: [art] Derive CDI
20,490,617 UART: [art] Store in in slot 0x4
20,549,595 UART: [art] Derive Key Pair
20,550,632 UART: [art] Store priv key in slot 0x5
23,013,611 UART: [art] Derive Key Pair - Done
23,026,348 UART: [art] Signing Cert with AUTHO
23,027,656 UART: RITY.KEYID = 7
24,738,833 UART: [art] Erasing AUTHORITY.KEYID = 7
24,740,382 UART: [art] PUB.X = 9D7A18C1413BC0C8426F01801395457D52A29D64F8D6A07CB6748AA00B04FFEBDF9E551ED2D6F80468D880D7B411F780
24,747,585 UART: [art] PUB.Y = 697B566AFDAF49F1F4D42D8DF60CE7E3982FCD564E854EE84B220EA39B6219850C61B38676AE17C53C4840E8C806F5A1
24,754,836 UART: [art] SIG.R = 7E0B733FD6F8DACB641998FDCAE80BB98E622654DA3D89F4004646AB3FF077D33168BC29DB354901CFA14A6CB0B9DAA9
24,762,233 UART: [art] SIG.S = 1AF75CBA67DC96C1ED3194D38D06043076DA0C4E70D0C94BFAA3014B2E39BE849963C4E232C34B7BE20A8D9AED79A514
25,741,375 UART: Caliptra RT
25,742,072 UART: [state] CFI Enabled
25,907,499 UART: [rt] RT listening for mailbox commands...
25,909,347 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,939,261 UART: [rt]cmd =0x46504c54, len=4
25,940,848 >>> mbox cmd response data (8 bytes)
25,942,080 UART: [rt] FIPS self test
25,943,035 UART: [kat] ++
25,943,492 UART: [kat] sha1
25,947,680 UART: Fatal Error: 0x90060002
25,982,893 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,127,757 >>> mbox cmd response: failed
26,128,345 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,273,079 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,033 UART:
190,324 UART: Running Caliptra ROM ...
191,347 UART:
191,485 UART: [state] CFI Enabled
259,231 UART: [state] LifecycleState = Unprovisioned
261,094 UART: [state] DebugLocked = No
262,930 UART: [state] WD Timer not started. Device not locked for debugging
266,170 UART: [kat] SHA2-256
445,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,833 UART: [kat] ++
457,277 UART: [kat] sha1
468,254 UART: [kat] SHA2-256
471,296 UART: [kat] SHA2-384
476,792 UART: [kat] SHA2-512-ACC
479,781 UART: [kat] ECC-384
2,940,625 UART: [kat] HMAC-384Kdf
2,965,083 UART: [kat] LMS
3,494,540 UART: [kat] --
3,498,583 UART: [cold-reset] ++
3,499,920 UART: [fht] FHT @ 0x50003400
3,510,693 UART: [idev] ++
3,511,275 UART: [idev] CDI.KEYID = 6
3,512,185 UART: [idev] SUBJECT.KEYID = 7
3,513,344 UART: [idev] UDS.KEYID = 0
3,514,904 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,659,815 UART: [idev] Erasing UDS.KEYID = 0
6,020,127 UART: [idev] Sha1 KeyId Algorithm
6,042,600 UART: [idev] --
6,048,047 UART: [ldev] ++
6,048,624 UART: [ldev] CDI.KEYID = 6
6,049,536 UART: [ldev] SUBJECT.KEYID = 5
6,050,701 UART: [ldev] AUTHORITY.KEYID = 7
6,051,934 UART: [ldev] FE.KEYID = 1
6,094,761 UART: [ldev] Erasing FE.KEYID = 1
8,592,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,345,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,719 UART: [ldev] --
10,387,292 UART: [fwproc] Wait for Commands...
10,389,999 UART: [fwproc] Recv command 0x46574c44
10,392,110 UART: [fwproc] Recv'd Img size: 115304 bytes
13,809,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,477 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,274,267 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,379,252 ready_for_fw is high
3,379,683 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,094,468 >>> mbox cmd response: success
18,413,317 UART:
18,413,744 UART: Running Caliptra FMC ...
18,414,860 UART:
18,415,016 UART: [state] CFI Enabled
18,479,911 UART: [fht] FMC Alias Private Key: 7
20,243,902 UART: [art] Extend RT PCRs Done
20,245,123 UART: [art] Lock RT PCRs Done
20,246,721 UART: [art] Populate DV Done
20,252,130 UART: [fht] FMC Alias Private Key: 7
20,253,672 UART: [art] Derive CDI
20,254,490 UART: [art] Store in in slot 0x4
20,313,101 UART: [art] Derive Key Pair
20,314,140 UART: [art] Store priv key in slot 0x5
22,788,681 UART: [art] Derive Key Pair - Done
22,801,678 UART: [art] Signing Cert with AUTHO
22,802,987 UART: RITY.KEYID = 7
24,514,547 UART: [art] Erasing AUTHORITY.KEYID = 7
24,516,049 UART: [art] PUB.X = BCA8746A926DF9E450B76E55E2F1DEDB63DF194BA489D4FB8A6293457779F619530C539CA9799EE7F0781996B1931D56
24,523,317 UART: [art] PUB.Y = 17538476A176F8F51FD6C505EDA5A510851E50A8940672A9C96C3FA342A1CE29F6490854839EA09836E1EF4A7784358F
24,530,568 UART: [art] SIG.R = 03147061A5AD7AFF0BBA72A607B37E76C3F60FB38F3085929CE53FD2210DCD7FD279B0707730C0639E2EE51A8CFEB7CE
24,537,982 UART: [art] SIG.S = 6CC59767720A3F94AF840ADB0FE4C11ACEC94DE274E29F1E7D62D44BF23B86BCC9466E95979F58D41958D413CCB3ECAC
25,516,867 UART: Caliptra RT
25,517,569 UART: [state] CFI Enabled
25,682,740 UART: [rt] RT listening for mailbox commands...
25,684,605 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,714,337 UART: [rt]cmd =0x46504c54, len=4
25,715,806 >>> mbox cmd response data (8 bytes)
25,716,911 UART: [rt] FIPS self test
25,717,859 UART: [kat] ++
25,718,309 UART: [kat] sha1
25,722,763 UART: Fatal Error: 0x90060002
25,758,191 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,903,082 >>> mbox cmd response: failed
25,903,733 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,048,331 >>> mbox cmd response: failed
Initializing fuses
1,123 writing to cptra_bootfsm_go
3,375,158 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,108,570 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,432 UART:
192,827 UART: Running Caliptra ROM ...
194,037 UART:
603,492 UART: [state] CFI Enabled
617,871 UART: [state] LifecycleState = Unprovisioned
619,772 UART: [state] DebugLocked = No
621,221 UART: [state] WD Timer not started. Device not locked for debugging
624,106 UART: [kat] SHA2-256
803,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,781 UART: [kat] ++
815,229 UART: [kat] sha1
826,526 UART: [kat] SHA2-256
829,614 UART: [kat] SHA2-384
836,030 UART: [kat] SHA2-512-ACC
838,970 UART: [kat] ECC-384
3,278,866 UART: [kat] HMAC-384Kdf
3,290,606 UART: [kat] LMS
3,820,106 UART: [kat] --
3,823,563 UART: [cold-reset] ++
3,824,861 UART: [fht] FHT @ 0x50003400
3,835,842 UART: [idev] ++
3,836,427 UART: [idev] CDI.KEYID = 6
3,837,342 UART: [idev] SUBJECT.KEYID = 7
3,838,520 UART: [idev] UDS.KEYID = 0
3,839,574 ready_for_fw is high
3,839,791 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,984,617 UART: [idev] Erasing UDS.KEYID = 0
6,308,859 UART: [idev] Sha1 KeyId Algorithm
6,330,437 UART: [idev] --
6,335,526 UART: [ldev] ++
6,336,142 UART: [ldev] CDI.KEYID = 6
6,337,059 UART: [ldev] SUBJECT.KEYID = 5
6,338,233 UART: [ldev] AUTHORITY.KEYID = 7
6,339,470 UART: [ldev] FE.KEYID = 1
6,351,195 UART: [ldev] Erasing FE.KEYID = 1
8,828,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,980 UART: [ldev] --
10,617,485 UART: [fwproc] Wait for Commands...
10,620,335 UART: [fwproc] Recv command 0x46574c44
10,622,380 UART: [fwproc] Recv'd Img size: 115304 bytes
14,037,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,922 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,504,305 >>> mbox cmd response: success
14,507,740 UART: [afmc] ++
14,508,333 UART: [afmc] CDI.KEYID = 6
14,509,246 UART: [afmc] SUBJECT.KEYID = 7
14,510,404 UART: [afmc] AUTHORITY.KEYID = 5
17,012,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,733,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,735,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,751,544 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,767,524 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,783,413 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,806,731 UART: [afmc] --
18,810,860 UART: [cold-reset] --
18,814,348 UART: [state] Locking Datavault
18,819,155 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,865 UART: [state] Locking ICCM
18,823,285 UART: [exit] Launching FMC @ 0x40000130
18,831,739 UART:
18,831,974 UART: Running Caliptra FMC ...
18,833,121 UART:
18,833,292 UART: [state] CFI Enabled
18,841,211 UART: [fht] FMC Alias Private Key: 7
20,597,815 UART: [art] Extend RT PCRs Done
20,599,028 UART: [art] Lock RT PCRs Done
20,600,923 UART: [art] Populate DV Done
20,606,223 UART: [fht] FMC Alias Private Key: 7
20,607,925 UART: [art] Derive CDI
20,608,741 UART: [art] Store in in slot 0x4
20,651,062 UART: [art] Derive Key Pair
20,652,618 UART: [art] Store priv key in slot 0x5
23,078,949 UART: [art] Derive Key Pair - Done
23,091,728 UART: [art] Signing Cert with AUTHO
23,093,039 UART: RITY.KEYID = 7
24,798,511 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,008 UART: [art] PUB.X = 9D8AD3964EC692DEE4F15A7323EA7C1B1576D5B1E8059954C379A1227B591C963D37392EF45617CC1B4A3B4B2169B677
24,807,262 UART: [art] PUB.Y = 4BEBFA93A1274BCD6580A4A141DC7B84B992B19E4EB2622A01F84893AA3040BB3DA2F115CD62CA9D36246B26F54F8239
24,814,570 UART: [art] SIG.R = 0C0DA4AFC1067E77EE509E88F9A2130C677DB1494D0B7E218F2ECA3DCB63235F0B821BA4396352EDE9DCB4D3BCDACEC9
24,821,936 UART: [art] SIG.S = A52EFAC893E7FF4A39F1425CC08902475DD6D48C4BC5D81541DF09D76F432795CD8CFB6A195FC1B11C3D3E008D3D0620
25,800,573 UART: Caliptra RT
25,801,276 UART: [state] CFI Enabled
25,917,965 UART: [rt] RT listening for mailbox commands...
25,919,851 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,949,550 UART: [rt]cmd =0x46504c54, len=4
25,951,272 >>> mbox cmd response data (8 bytes)
25,952,457 UART: [rt] FIPS self test
25,953,417 UART: [kat] ++
25,953,867 UART: [kat] sha1
25,958,156 UART: Fatal Error: 0x90060002
25,993,357 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,138,212 >>> mbox cmd response: failed
26,138,797 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,283,561 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,059 UART:
190,349 UART: Running Caliptra ROM ...
191,378 UART:
14,252,605 UART: [state] CFI Enabled
14,265,813 UART: [state] LifecycleState = Unprovisioned
14,267,678 UART: [state] DebugLocked = No
14,269,477 UART: [state] WD Timer not started. Device not locked for debugging
14,272,460 UART: [kat] SHA2-256
14,451,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,463,120 UART: [kat] ++
14,463,577 UART: [kat] sha1
14,474,677 UART: [kat] SHA2-256
14,477,691 UART: [kat] SHA2-384
14,484,058 UART: [kat] SHA2-512-ACC
14,486,998 UART: [kat] ECC-384
16,925,913 UART: [kat] HMAC-384Kdf
16,936,926 UART: [kat] LMS
17,466,444 UART: [kat] --
17,471,584 UART: [cold-reset] ++
17,473,842 UART: [fht] FHT @ 0x50003400
17,483,844 UART: [idev] ++
17,484,403 UART: [idev] CDI.KEYID = 6
17,485,368 UART: [idev] SUBJECT.KEYID = 7
17,486,582 UART: [idev] UDS.KEYID = 0
17,488,267 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,632,891 UART: [idev] Erasing UDS.KEYID = 0
19,960,232 UART: [idev] Sha1 KeyId Algorithm
19,982,486 UART: [idev] --
19,988,133 UART: [ldev] ++
19,988,707 UART: [ldev] CDI.KEYID = 6
19,989,590 UART: [ldev] SUBJECT.KEYID = 5
19,990,804 UART: [ldev] AUTHORITY.KEYID = 7
19,992,056 UART: [ldev] FE.KEYID = 1
20,002,677 UART: [ldev] Erasing FE.KEYID = 1
22,473,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,195,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,211,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,227,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,243,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,262,779 UART: [ldev] --
24,267,018 UART: [fwproc] Wait for Commands...
24,268,525 UART: [fwproc] Recv command 0x46574c44
24,270,623 UART: [fwproc] Recv'd Img size: 115304 bytes
27,685,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,752,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,821,612 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,143,179 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,695,111 ready_for_fw is high
3,695,558 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,286,739 >>> mbox cmd response: success
18,535,151 UART:
18,535,630 UART: Running Caliptra FMC ...
18,536,760 UART:
18,536,918 UART: [state] CFI Enabled
18,544,741 UART: [fht] FMC Alias Private Key: 7
20,301,617 UART: [art] Extend RT PCRs Done
20,302,845 UART: [art] Lock RT PCRs Done
20,304,583 UART: [art] Populate DV Done
20,309,712 UART: [fht] FMC Alias Private Key: 7
20,311,254 UART: [art] Derive CDI
20,312,077 UART: [art] Store in in slot 0x4
20,354,685 UART: [art] Derive Key Pair
20,355,723 UART: [art] Store priv key in slot 0x5
22,781,979 UART: [art] Derive Key Pair - Done
22,794,956 UART: [art] Signing Cert with AUTHO
22,796,268 UART: RITY.KEYID = 7
24,501,892 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,421 UART: [art] PUB.X = 2AED119BE80D7AA6243A4A944C1202BF461C61D6A5FB7875564B750B7E5EE66FC01C7EB561211066BD05A34C54EE7CA7
24,510,742 UART: [art] PUB.Y = D8661BDC3D74A45C96AC52588BB96634C718B84CD6902441B3D4D5838ACEEE70C89B13BC2D27BC97F370B662060AFBE0
24,517,989 UART: [art] SIG.R = 4E106367EFD6157201F96EE61C89FC21E41E97789A9BB036145A7B5FE643B40CF9E537C20143D1EC374C8B670942D493
24,525,310 UART: [art] SIG.S = 2D32A567B1225281DBC3747CE7DC3D47236F140F345062DAC8198578BB429A05BB1F9DC95C9D28F96130E06D76668C0E
25,504,370 UART: Caliptra RT
25,505,069 UART: [state] CFI Enabled
25,623,112 UART: [rt] RT listening for mailbox commands...
25,625,104 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,654,814 UART: [rt]cmd =0x46504c54, len=4
25,656,555 >>> mbox cmd response data (8 bytes)
25,657,761 UART: [rt] FIPS self test
25,658,704 UART: [kat] ++
25,659,153 UART: [kat] sha1
25,663,559 UART: Fatal Error: 0x90060002
25,698,768 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,843,621 >>> mbox cmd response: failed
25,844,322 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,989,477 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
17,637,332 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,242,711 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,439,802 ready_for_fw is high
3,440,195 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,753,427 >>> mbox cmd response: success
19,070,648 UART:
19,071,047 UART: Running Caliptra FMC ...
19,072,168 UART:
19,072,323 UART: [state] CFI Enabled
19,140,172 UART: [fht] FMC Alias Private Key: 7
20,904,265 UART: [art] Extend RT PCRs Done
20,905,492 UART: [art] Lock RT PCRs Done
20,907,149 UART: [art] Populate DV Done
20,912,724 UART: [fht] FMC Alias Private Key: 7
20,914,263 UART: [art] Derive CDI
20,914,998 UART: [art] Store in in slot 0x4
20,973,060 UART: [art] Derive Key Pair
20,974,104 UART: [art] Store priv key in slot 0x5
23,438,163 UART: [art] Derive Key Pair - Done
23,451,212 UART: [art] Signing Cert with AUTHO
23,452,522 UART: RITY.KEYID = 7
25,163,239 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,740 UART: [art] PUB.X = 47A57FF65E330BFD31D7B7232BD1543867415B91492ECE5912B9993028F1F00AE54AD6187620EAF999D0A359FE711EFC
25,172,019 UART: [art] PUB.Y = D31FBA581BC5C175D95FB77BF057475290EA1B3BF85D194D3C0B6709E17B76B806814840FFC440D35E6754A52B69BBD3
25,179,283 UART: [art] SIG.R = A8783F7074FF1AF69536481141B54DA3BC9A3B227037F5FDE02DEA13F96C7EDF2CEDBB6E7F87E53ECFADAA7E0139D87D
25,186,681 UART: [art] SIG.S = 1638404687EAA34AAF2D5E23FEF31565D0B11C7F8E0BB4B96FA5C412DF97F1DA8D8AE34FF9BC5B2C11EE535888CEDB37
26,166,224 UART: Caliptra RT
26,166,934 UART: [state] CFI Enabled
26,331,655 UART: [rt] RT listening for mailbox commands...
26,333,506 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,363,124 UART: [rt]cmd =0x46504c54, len=4
26,364,809 >>> mbox cmd response data (8 bytes)
26,365,916 UART: [rt] FIPS self test
26,366,852 UART: [kat] ++
26,367,303 UART: [kat] sha1
26,371,787 UART: Fatal Error: 0x90060002
26,407,166 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,552,076 >>> mbox cmd response: failed
26,552,676 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,697,333 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
3,431,477 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,754,698 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,756,261 ready_for_fw is high
3,756,765 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,978,486 >>> mbox cmd response: success
19,226,139 UART:
19,226,522 UART: Running Caliptra FMC ...
19,227,851 UART:
19,228,017 UART: [state] CFI Enabled
19,236,183 UART: [fht] FMC Alias Private Key: 7
20,993,291 UART: [art] Extend RT PCRs Done
20,994,517 UART: [art] Lock RT PCRs Done
20,996,087 UART: [art] Populate DV Done
21,001,339 UART: [fht] FMC Alias Private Key: 7
21,003,003 UART: [art] Derive CDI
21,003,832 UART: [art] Store in in slot 0x4
21,046,272 UART: [art] Derive Key Pair
21,047,316 UART: [art] Store priv key in slot 0x5
23,474,082 UART: [art] Derive Key Pair - Done
23,487,268 UART: [art] Signing Cert with AUTHO
23,488,753 UART: RITY.KEYID = 7
25,194,287 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,794 UART: [art] PUB.X = 3489D60DE17EBF25F00B0B0F4BE3FC3ADC4A18C19639E212698ACA40FA6410FFBE00D485535ADF481E4D90C7E69F0546
25,203,083 UART: [art] PUB.Y = F988DDE8E1B9FE39A49E4C7DA2118153078D920FB14856B7911B34EE79D2CE4E65B868F49F91CAD8F94331DC8B450E12
25,210,307 UART: [art] SIG.R = E1E4C906F426A3F429C2C917FF3448489E19C54C419E8E5E14BC1615D14281F05AD855731EA386546EA045CC57C3953B
25,217,695 UART: [art] SIG.S = B7BDD203A55AFA46630BB70F7CC186867261E6F23298CD10C74BD5CC6FEDB5B181286F96BFC2A81A33414EA0CA5F98E5
26,196,392 UART: Caliptra RT
26,197,080 UART: [state] CFI Enabled
26,314,909 UART: [rt] RT listening for mailbox commands...
26,316,821 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,346,789 UART: [rt]cmd =0x46504c54, len=4
26,348,215 >>> mbox cmd response data (8 bytes)
26,349,634 UART: [rt] FIPS self test
26,350,573 UART: [kat] ++
26,351,028 UART: [kat] sha1
26,355,234 UART: Fatal Error: 0x90060002
26,390,620 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,535,451 >>> mbox cmd response: failed
26,536,083 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,680,671 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,007,359 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,240,395 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
86,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,569 UART: [kat] SHA2-256
881,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,615 UART: [kat] ++
885,767 UART: [kat] sha1
890,165 UART: [kat] SHA2-256
892,103 UART: [kat] SHA2-384
894,978 UART: [kat] SHA2-512-ACC
896,879 UART: [kat] ECC-384
902,710 UART: [kat] HMAC-384Kdf
907,386 UART: [kat] LMS
1,475,582 UART: [kat] --
1,476,469 UART: [cold-reset] ++
1,477,001 UART: [fht] Storing FHT @ 0x50003400
1,479,668 UART: [idev] ++
1,479,836 UART: [idev] CDI.KEYID = 6
1,480,196 UART: [idev] SUBJECT.KEYID = 7
1,480,620 UART: [idev] UDS.KEYID = 0
1,480,965 ready_for_fw is high
1,480,965 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,760 UART: [idev] Erasing UDS.KEYID = 0
1,505,336 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,924 UART: [idev] --
1,515,051 UART: [ldev] ++
1,515,219 UART: [ldev] CDI.KEYID = 6
1,515,582 UART: [ldev] SUBJECT.KEYID = 5
1,516,008 UART: [ldev] AUTHORITY.KEYID = 7
1,516,471 UART: [ldev] FE.KEYID = 1
1,521,343 UART: [ldev] Erasing FE.KEYID = 1
1,546,906 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,066 UART: [ldev] --
1,586,517 UART: [fwproc] Waiting for Commands...
1,587,242 UART: [fwproc] Received command 0x46574c44
1,588,033 UART: [fwproc] Received Image of size 115304 bytes
2,897,828 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,292 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,644 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,953 >>> mbox cmd response: success
3,093,067 UART: [afmc] ++
3,093,235 UART: [afmc] CDI.KEYID = 6
3,093,597 UART: [afmc] SUBJECT.KEYID = 7
3,094,022 UART: [afmc] AUTHORITY.KEYID = 5
3,129,131 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,389 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,169 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,782 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,472 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,501 UART: [afmc] --
3,172,523 UART: [cold-reset] --
3,173,407 UART: [state] Locking Datavault
3,174,710 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,314 UART: [state] Locking ICCM
3,175,772 UART: [exit] Launching FMC @ 0x40000130
3,181,101 UART:
3,181,117 UART: Running Caliptra FMC ...
3,181,525 UART:
3,181,579 UART: [state] CFI Enabled
3,191,782 UART: [fht] FMC Alias Private Key: 7
3,299,395 UART: [art] Extend RT PCRs Done
3,299,823 UART: [art] Lock RT PCRs Done
3,301,277 UART: [art] Populate DV Done
3,309,116 UART: [fht] FMC Alias Private Key: 7
3,310,142 UART: [art] Derive CDI
3,310,422 UART: [art] Store in in slot 0x4
3,396,305 UART: [art] Derive Key Pair
3,396,665 UART: [art] Store priv key in slot 0x5
3,409,857 UART: [art] Derive Key Pair - Done
3,424,443 UART: [art] Signing Cert with AUTHO
3,424,923 UART: RITY.KEYID = 7
3,440,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,768 UART: [art] PUB.X = B6E2D4B21743DEC4585720A37D5CA106245717D218E189EF1C766A74079DD94308D53B1242464D81890A3FF512410BB7
3,447,515 UART: [art] PUB.Y = 66F149E0D381E501C44A4156146AE7D47CEA770ADAC35F8B13DD715523D800434C1C9901F8055125F6A5422486A32A7B
3,454,427 UART: [art] SIG.R = 29A173775DD72508B40540DE2F5827AD6E5448BCA585A5B153C21873AC534C8FEA2E526C73C98A5F3FC32541B32F8C8F
3,461,195 UART: [art] SIG.S = 0042E2C96C923FF444E3C80238B27B276B6AF2B060816DA379788E05AA2BAA322058C7CFF96DC71DFE4E32FA0FAD2897
3,485,251 UART: Caliptra RT
3,485,504 UART: [state] CFI Enabled
3,594,664 UART: [rt] RT listening for mailbox commands...
3,595,327 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,278 UART: [rt]cmd =0x46504c54, len=4
3,626,313 >>> mbox cmd response data (8 bytes)
3,626,614 UART: [rt] FIPS self test
3,626,942 UART: [kat] ++
3,627,094 UART: [kat] sha1
3,631,433 UART: Fatal Error: 0x90060002
3,632,983 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,632,988 >>> mbox cmd response: failed
3,632,988 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,632,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,909 UART: [kat] SHA2-256
881,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,955 UART: [kat] ++
886,107 UART: [kat] sha1
890,321 UART: [kat] SHA2-256
892,259 UART: [kat] SHA2-384
894,926 UART: [kat] SHA2-512-ACC
896,827 UART: [kat] ECC-384
902,372 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,269 UART: [cold-reset] ++
1,476,663 UART: [fht] Storing FHT @ 0x50003400
1,479,474 UART: [idev] ++
1,479,642 UART: [idev] CDI.KEYID = 6
1,480,002 UART: [idev] SUBJECT.KEYID = 7
1,480,426 UART: [idev] UDS.KEYID = 0
1,480,771 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,504,908 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,586 UART: [idev] --
1,514,659 UART: [ldev] ++
1,514,827 UART: [ldev] CDI.KEYID = 6
1,515,190 UART: [ldev] SUBJECT.KEYID = 5
1,515,616 UART: [ldev] AUTHORITY.KEYID = 7
1,516,079 UART: [ldev] FE.KEYID = 1
1,521,107 UART: [ldev] Erasing FE.KEYID = 1
1,546,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,176 UART: [ldev] --
1,585,489 UART: [fwproc] Waiting for Commands...
1,586,296 UART: [fwproc] Received command 0x46574c44
1,587,087 UART: [fwproc] Received Image of size 115304 bytes
2,897,226 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,892 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,244 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,675 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,255 ready_for_fw is high
1,363,255 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,433 >>> mbox cmd response: success
3,002,619 UART:
3,002,635 UART: Running Caliptra FMC ...
3,003,043 UART:
3,003,097 UART: [state] CFI Enabled
3,013,674 UART: [fht] FMC Alias Private Key: 7
3,122,341 UART: [art] Extend RT PCRs Done
3,122,769 UART: [art] Lock RT PCRs Done
3,124,581 UART: [art] Populate DV Done
3,132,776 UART: [fht] FMC Alias Private Key: 7
3,133,856 UART: [art] Derive CDI
3,134,136 UART: [art] Store in in slot 0x4
3,219,613 UART: [art] Derive Key Pair
3,219,973 UART: [art] Store priv key in slot 0x5
3,232,667 UART: [art] Derive Key Pair - Done
3,247,472 UART: [art] Signing Cert with AUTHO
3,247,952 UART: RITY.KEYID = 7
3,262,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,699 UART: [art] PUB.X = 2F75B02B088A31D093E59E641DCF6C1F422920F64090DEE44E6F8A7EFC2B22DFAD9FB4FC44FE59357DAD83CE27CD0FDE
3,270,487 UART: [art] PUB.Y = A3D5C07AE0A4FE00B45696632076F0075B2E57A163C0F5025C6CFDEFE487476263224C93D64C986B2E684D916BF74CD8
3,277,411 UART: [art] SIG.R = 9D0B3AC9D7EF13270FBE6A4DC252A2EB35718C0C7640283D4C8926321A3293394BD00CFB73B084BF530C74993058E4EA
3,284,170 UART: [art] SIG.S = A3690BB4BDF8A9C29D7D103D513FF2CB08309AD5DFB357D84F17579767307A77759D77185730A9DD55A12501860A58F9
3,307,683 UART: Caliptra RT
3,307,936 UART: [state] CFI Enabled
3,415,448 UART: [rt] RT listening for mailbox commands...
3,416,111 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,960 UART: [rt]cmd =0x46504c54, len=4
3,447,141 >>> mbox cmd response data (8 bytes)
3,447,396 UART: [rt] FIPS self test
3,447,724 UART: [kat] ++
3,447,876 UART: [kat] sha1
3,452,027 UART: Fatal Error: 0x90060002
3,453,577 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,453,582 >>> mbox cmd response: failed
3,453,582 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,453,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,475 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,423 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,574 UART: [kat] SHA2-256
882,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,620 UART: [kat] ++
886,772 UART: [kat] sha1
891,158 UART: [kat] SHA2-256
893,096 UART: [kat] SHA2-384
895,901 UART: [kat] SHA2-512-ACC
897,802 UART: [kat] ECC-384
903,523 UART: [kat] HMAC-384Kdf
908,033 UART: [kat] LMS
1,476,229 UART: [kat] --
1,477,174 UART: [cold-reset] ++
1,477,732 UART: [fht] Storing FHT @ 0x50003400
1,480,425 UART: [idev] ++
1,480,593 UART: [idev] CDI.KEYID = 6
1,480,953 UART: [idev] SUBJECT.KEYID = 7
1,481,377 UART: [idev] UDS.KEYID = 0
1,481,722 ready_for_fw is high
1,481,722 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,065 UART: [idev] Erasing UDS.KEYID = 0
1,506,121 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,905 UART: [idev] --
1,515,778 UART: [ldev] ++
1,515,946 UART: [ldev] CDI.KEYID = 6
1,516,309 UART: [ldev] SUBJECT.KEYID = 5
1,516,735 UART: [ldev] AUTHORITY.KEYID = 7
1,517,198 UART: [ldev] FE.KEYID = 1
1,522,430 UART: [ldev] Erasing FE.KEYID = 1
1,548,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,097 UART: [ldev] --
1,587,418 UART: [fwproc] Waiting for Commands...
1,588,255 UART: [fwproc] Received command 0x46574c44
1,589,046 UART: [fwproc] Received Image of size 115304 bytes
2,898,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,001 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,644 >>> mbox cmd response: success
3,093,702 UART: [afmc] ++
3,093,870 UART: [afmc] CDI.KEYID = 6
3,094,232 UART: [afmc] SUBJECT.KEYID = 7
3,094,657 UART: [afmc] AUTHORITY.KEYID = 5
3,129,658 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,940 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,720 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,448 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,333 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,164,023 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,764 UART: [afmc] --
3,172,772 UART: [cold-reset] --
3,173,608 UART: [state] Locking Datavault
3,174,775 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,379 UART: [state] Locking ICCM
3,176,033 UART: [exit] Launching FMC @ 0x40000130
3,181,362 UART:
3,181,378 UART: Running Caliptra FMC ...
3,181,786 UART:
3,181,929 UART: [state] CFI Enabled
3,192,504 UART: [fht] FMC Alias Private Key: 7
3,300,533 UART: [art] Extend RT PCRs Done
3,300,961 UART: [art] Lock RT PCRs Done
3,302,805 UART: [art] Populate DV Done
3,311,168 UART: [fht] FMC Alias Private Key: 7
3,312,338 UART: [art] Derive CDI
3,312,618 UART: [art] Store in in slot 0x4
3,398,237 UART: [art] Derive Key Pair
3,398,597 UART: [art] Store priv key in slot 0x5
3,412,247 UART: [art] Derive Key Pair - Done
3,426,876 UART: [art] Signing Cert with AUTHO
3,427,356 UART: RITY.KEYID = 7
3,442,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,443,375 UART: [art] PUB.X = 470D59A3F14918229144BFBF5055655C1831F2C2D811EF2488C740BB456DA893197EE141358060D7B70EBD510DB4E072
3,450,130 UART: [art] PUB.Y = 4494B35CD5A7EFC0B9BB25BA76B5EA3899B984BF94ED60811ED34A76A6885A38EE6F66558D74AF64AE885B9746836E9B
3,457,090 UART: [art] SIG.R = 575B266017D4CCF73A43BB358619F6706E08C1BBCCA75DA2631C21F24B4BF2837250D452F92E3B664F9886412A4C670D
3,463,854 UART: [art] SIG.S = 840CCB01CDE391A9140FAC567639E121BA60365EC6FF24E51AAA9C6CDC802226B34DCB272CFBAA7357749CEF82F882EE
3,487,424 UART: Caliptra RT
3,487,769 UART: [state] CFI Enabled
3,596,396 UART: [rt] RT listening for mailbox commands...
3,597,059 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,914 UART: [rt]cmd =0x46504c54, len=4
3,627,909 >>> mbox cmd response data (8 bytes)
3,628,220 UART: [rt] FIPS self test
3,628,548 UART: [kat] ++
3,628,700 UART: [kat] sha1
3,633,067 UART: Fatal Error: 0x90060002
3,634,617 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,622 >>> mbox cmd response: failed
3,634,622 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,824 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,334 UART: [kat] SHA2-256
882,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,380 UART: [kat] ++
886,532 UART: [kat] sha1
890,966 UART: [kat] SHA2-256
892,904 UART: [kat] SHA2-384
895,501 UART: [kat] SHA2-512-ACC
897,402 UART: [kat] ECC-384
903,095 UART: [kat] HMAC-384Kdf
907,639 UART: [kat] LMS
1,475,835 UART: [kat] --
1,476,860 UART: [cold-reset] ++
1,477,206 UART: [fht] Storing FHT @ 0x50003400
1,480,087 UART: [idev] ++
1,480,255 UART: [idev] CDI.KEYID = 6
1,480,615 UART: [idev] SUBJECT.KEYID = 7
1,481,039 UART: [idev] UDS.KEYID = 0
1,481,384 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,519 UART: [idev] Erasing UDS.KEYID = 0
1,506,005 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,581 UART: [idev] --
1,515,548 UART: [ldev] ++
1,515,716 UART: [ldev] CDI.KEYID = 6
1,516,079 UART: [ldev] SUBJECT.KEYID = 5
1,516,505 UART: [ldev] AUTHORITY.KEYID = 7
1,516,968 UART: [ldev] FE.KEYID = 1
1,522,346 UART: [ldev] Erasing FE.KEYID = 1
1,547,643 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,901 UART: [ldev] --
1,587,350 UART: [fwproc] Waiting for Commands...
1,588,137 UART: [fwproc] Received command 0x46574c44
1,588,928 UART: [fwproc] Received Image of size 115304 bytes
2,899,171 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,956,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,532 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,358 ready_for_fw is high
1,363,358 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,681 >>> mbox cmd response: success
3,004,929 UART:
3,004,945 UART: Running Caliptra FMC ...
3,005,353 UART:
3,005,496 UART: [state] CFI Enabled
3,016,223 UART: [fht] FMC Alias Private Key: 7
3,124,090 UART: [art] Extend RT PCRs Done
3,124,518 UART: [art] Lock RT PCRs Done
3,125,902 UART: [art] Populate DV Done
3,134,135 UART: [fht] FMC Alias Private Key: 7
3,135,193 UART: [art] Derive CDI
3,135,473 UART: [art] Store in in slot 0x4
3,221,398 UART: [art] Derive Key Pair
3,221,758 UART: [art] Store priv key in slot 0x5
3,235,082 UART: [art] Derive Key Pair - Done
3,249,586 UART: [art] Signing Cert with AUTHO
3,250,066 UART: RITY.KEYID = 7
3,265,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,959 UART: [art] PUB.X = 67BD6369B7C9A04D75C44F6085BAB398097EF63AFF207EA4A2268C55980B682A8795DC6C38122E073870BB340C9B4445
3,272,715 UART: [art] PUB.Y = FE95C33C7DFB42F26B4681A37E461D78363C841C010413D5AD249B16BD7DEBE45366A3BF7691D70015260DDEDD59A59E
3,279,642 UART: [art] SIG.R = 65BF3D8582A336F4D5C66302263F6C6ADC1E13ABB29CCA4CB12EBD66C45864FBBBEE4CA28C988074C2A08BACB4F958F4
3,286,431 UART: [art] SIG.S = A013EF740FEF6348730A326A065023AAE68BB4CDAD1973A7D3D190BA7D5AAAE45E9F37BC622737BC86012CAA8FB2EDE9
3,310,478 UART: Caliptra RT
3,310,823 UART: [state] CFI Enabled
3,419,686 UART: [rt] RT listening for mailbox commands...
3,420,349 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,112 UART: [rt]cmd =0x46504c54, len=4
3,451,269 >>> mbox cmd response data (8 bytes)
3,451,558 UART: [rt] FIPS self test
3,451,886 UART: [kat] ++
3,452,038 UART: [kat] sha1
3,456,233 UART: Fatal Error: 0x90060002
3,457,783 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,457,788 >>> mbox cmd response: failed
3,457,788 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,457,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,494 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,943,439 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
893,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,473 UART: [kat] ++
897,625 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,652 UART: [kat] SHA2-512-ACC
908,553 UART: [kat] ECC-384
918,396 UART: [kat] HMAC-384Kdf
923,004 UART: [kat] LMS
1,171,332 UART: [kat] --
1,172,361 UART: [cold-reset] ++
1,172,843 UART: [fht] FHT @ 0x50003400
1,175,438 UART: [idev] ++
1,175,606 UART: [idev] CDI.KEYID = 6
1,175,966 UART: [idev] SUBJECT.KEYID = 7
1,176,390 UART: [idev] UDS.KEYID = 0
1,176,735 ready_for_fw is high
1,176,735 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,786 UART: [idev] Erasing UDS.KEYID = 0
1,201,691 UART: [idev] Sha1 KeyId Algorithm
1,210,035 UART: [idev] --
1,211,121 UART: [ldev] ++
1,211,289 UART: [ldev] CDI.KEYID = 6
1,211,652 UART: [ldev] SUBJECT.KEYID = 5
1,212,078 UART: [ldev] AUTHORITY.KEYID = 7
1,212,541 UART: [ldev] FE.KEYID = 1
1,217,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,547 UART: [ldev] --
1,282,956 UART: [fwproc] Wait for Commands...
1,283,586 UART: [fwproc] Recv command 0x46574c44
1,284,314 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,879 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,220 >>> mbox cmd response: success
2,790,382 UART: [afmc] ++
2,790,550 UART: [afmc] CDI.KEYID = 6
2,790,912 UART: [afmc] SUBJECT.KEYID = 7
2,791,337 UART: [afmc] AUTHORITY.KEYID = 5
2,827,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,844,089 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,817 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,441 UART: [afmc] --
2,870,533 UART: [cold-reset] --
2,871,335 UART: [state] Locking Datavault
2,872,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,873,336 UART: [state] Locking ICCM
2,873,926 UART: [exit] Launching FMC @ 0x40000130
2,879,255 UART:
2,879,271 UART: Running Caliptra FMC ...
2,879,679 UART:
2,879,733 UART: [state] CFI Enabled
2,890,284 UART: [fht] FMC Alias Private Key: 7
2,997,533 UART: [art] Extend RT PCRs Done
2,997,961 UART: [art] Lock RT PCRs Done
2,999,477 UART: [art] Populate DV Done
3,007,986 UART: [fht] FMC Alias Private Key: 7
3,008,968 UART: [art] Derive CDI
3,009,248 UART: [art] Store in in slot 0x4
3,094,873 UART: [art] Derive Key Pair
3,095,233 UART: [art] Store priv key in slot 0x5
3,107,999 UART: [art] Derive Key Pair - Done
3,122,541 UART: [art] Signing Cert with AUTHO
3,123,021 UART: RITY.KEYID = 7
3,138,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,004 UART: [art] PUB.X = 48EA030F39A9EB9621506FFD27CB140DF80E7FFE0647B54A051D3120C1962E2A9569E7CF4AB67A737DB82229F6135698
3,145,758 UART: [art] PUB.Y = 1DCE821077045BB9CE4BFBBD486779187576A85776D19E0F5BE384D08937FAED9A2B3945425713AB0428F3A19F33CAB2
3,152,703 UART: [art] SIG.R = 98FA36D461EF2F97E0DC268132D2AF1C4065C6AB58F9A1EE111DA71E3B8A00D1F98C19B8AD3F5D21865B9CB37B5577ED
3,159,467 UART: [art] SIG.S = 0781616BE347B911BDDAC05B5F74502397BCFCB6175769B5B9076A640140FCA85668075290DECEBD6F5416F2A960C2D2
3,183,334 UART: Caliptra RT
3,183,587 UART: [state] CFI Enabled
3,291,406 UART: [rt] RT listening for mailbox commands...
3,292,069 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,308 UART: [rt]cmd =0x46504c54, len=4
3,323,537 >>> mbox cmd response data (8 bytes)
3,323,772 UART: [rt] FIPS self test
3,324,100 UART: [kat] ++
3,324,252 UART: [kat] sha1
3,328,401 UART: Fatal Error: 0x90060002
3,329,951 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,329,956 >>> mbox cmd response: failed
3,329,956 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,329,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
893,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,331 UART: [kat] ++
897,483 UART: [kat] sha1
901,667 UART: [kat] SHA2-256
903,607 UART: [kat] SHA2-384
906,340 UART: [kat] SHA2-512-ACC
908,241 UART: [kat] ECC-384
917,986 UART: [kat] HMAC-384Kdf
922,698 UART: [kat] LMS
1,171,026 UART: [kat] --
1,172,097 UART: [cold-reset] ++
1,172,651 UART: [fht] FHT @ 0x50003400
1,175,444 UART: [idev] ++
1,175,612 UART: [idev] CDI.KEYID = 6
1,175,972 UART: [idev] SUBJECT.KEYID = 7
1,176,396 UART: [idev] UDS.KEYID = 0
1,176,741 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,424 UART: [idev] Erasing UDS.KEYID = 0
1,201,269 UART: [idev] Sha1 KeyId Algorithm
1,209,921 UART: [idev] --
1,210,939 UART: [ldev] ++
1,211,107 UART: [ldev] CDI.KEYID = 6
1,211,470 UART: [ldev] SUBJECT.KEYID = 5
1,211,896 UART: [ldev] AUTHORITY.KEYID = 7
1,212,359 UART: [ldev] FE.KEYID = 1
1,217,223 UART: [ldev] Erasing FE.KEYID = 1
1,243,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,057 UART: [ldev] --
1,283,416 UART: [fwproc] Wait for Commands...
1,284,042 UART: [fwproc] Recv command 0x46574c44
1,284,770 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,505 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,714 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,673 ready_for_fw is high
1,059,673 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,717 >>> mbox cmd response: success
2,701,607 UART:
2,701,623 UART: Running Caliptra FMC ...
2,702,031 UART:
2,702,085 UART: [state] CFI Enabled
2,712,854 UART: [fht] FMC Alias Private Key: 7
2,820,351 UART: [art] Extend RT PCRs Done
2,820,779 UART: [art] Lock RT PCRs Done
2,822,505 UART: [art] Populate DV Done
2,830,794 UART: [fht] FMC Alias Private Key: 7
2,831,788 UART: [art] Derive CDI
2,832,068 UART: [art] Store in in slot 0x4
2,917,729 UART: [art] Derive Key Pair
2,918,089 UART: [art] Store priv key in slot 0x5
2,931,257 UART: [art] Derive Key Pair - Done
2,945,952 UART: [art] Signing Cert with AUTHO
2,946,432 UART: RITY.KEYID = 7
2,961,650 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,415 UART: [art] PUB.X = B2874FCD87E7DD59F06B24660ABE457741F0CE1C8C18A2132BAAC0E4C594BED3DADFA0E36B84E1DA55FB61BB9B88A0AF
2,969,210 UART: [art] PUB.Y = 0EB926D8DBF46FADDEBCC7B4311C769F6FDBB4C06F5968D91561E29E6EA1C116F143461467803780CB2B285777189CBB
2,976,167 UART: [art] SIG.R = 965877E4C7B092D6DB9385D2CDA639ECCA18C3C5C87C164C36C1C397FFFDA1A40583AFC14FB04CC500B7D0F1DA48A2C4
2,982,932 UART: [art] SIG.S = 9C7699E27C1922ABA11B62F1860F700312D0036E9C8C68EFDF56D193296F3A4D87529651417303686A7C0B7457AB45AD
3,006,814 UART: Caliptra RT
3,007,067 UART: [state] CFI Enabled
3,113,953 UART: [rt] RT listening for mailbox commands...
3,114,616 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,367 UART: [rt]cmd =0x46504c54, len=4
3,145,612 >>> mbox cmd response data (8 bytes)
3,145,907 UART: [rt] FIPS self test
3,146,235 UART: [kat] ++
3,146,387 UART: [kat] sha1
3,150,866 UART: Fatal Error: 0x90060002
3,152,416 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,421 >>> mbox cmd response: failed
3,152,421 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,555 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,367 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
893,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,732 UART: [kat] ++
897,884 UART: [kat] sha1
902,308 UART: [kat] SHA2-256
904,248 UART: [kat] SHA2-384
907,019 UART: [kat] SHA2-512-ACC
908,920 UART: [kat] ECC-384
918,655 UART: [kat] HMAC-384Kdf
923,511 UART: [kat] LMS
1,171,839 UART: [kat] --
1,172,682 UART: [cold-reset] ++
1,173,246 UART: [fht] FHT @ 0x50003400
1,175,991 UART: [idev] ++
1,176,159 UART: [idev] CDI.KEYID = 6
1,176,519 UART: [idev] SUBJECT.KEYID = 7
1,176,943 UART: [idev] UDS.KEYID = 0
1,177,288 ready_for_fw is high
1,177,288 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,897 UART: [idev] Erasing UDS.KEYID = 0
1,202,052 UART: [idev] Sha1 KeyId Algorithm
1,210,356 UART: [idev] --
1,211,514 UART: [ldev] ++
1,211,682 UART: [ldev] CDI.KEYID = 6
1,212,045 UART: [ldev] SUBJECT.KEYID = 5
1,212,471 UART: [ldev] AUTHORITY.KEYID = 7
1,212,934 UART: [ldev] FE.KEYID = 1
1,218,488 UART: [ldev] Erasing FE.KEYID = 1
1,244,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,794 UART: [ldev] --
1,284,285 UART: [fwproc] Wait for Commands...
1,285,095 UART: [fwproc] Recv command 0x46574c44
1,285,823 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,918 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,163 >>> mbox cmd response: success
2,789,339 UART: [afmc] ++
2,789,507 UART: [afmc] CDI.KEYID = 6
2,789,869 UART: [afmc] SUBJECT.KEYID = 7
2,790,294 UART: [afmc] AUTHORITY.KEYID = 5
2,825,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,381 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,100 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,004 UART: [afmc] --
2,869,032 UART: [cold-reset] --
2,869,712 UART: [state] Locking Datavault
2,870,691 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,295 UART: [state] Locking ICCM
2,871,793 UART: [exit] Launching FMC @ 0x40000130
2,877,122 UART:
2,877,138 UART: Running Caliptra FMC ...
2,877,546 UART:
2,877,689 UART: [state] CFI Enabled
2,888,866 UART: [fht] FMC Alias Private Key: 7
2,996,663 UART: [art] Extend RT PCRs Done
2,997,091 UART: [art] Lock RT PCRs Done
2,998,845 UART: [art] Populate DV Done
3,006,880 UART: [fht] FMC Alias Private Key: 7
3,008,026 UART: [art] Derive CDI
3,008,306 UART: [art] Store in in slot 0x4
3,094,055 UART: [art] Derive Key Pair
3,094,415 UART: [art] Store priv key in slot 0x5
3,107,923 UART: [art] Derive Key Pair - Done
3,122,794 UART: [art] Signing Cert with AUTHO
3,123,274 UART: RITY.KEYID = 7
3,138,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,635 UART: [art] PUB.X = A1E77757B3805FB9ECCFEEAE1BC6A51B8614170065F4DF9BEB1EF63454D81723B975FEE0D6B60C0EBB6A4E7E19FA5083
3,146,397 UART: [art] PUB.Y = BE10F3DEB3670C5D5DD61D5FB7E393D188B295FECD60BE8F127FCF9982F9CB201C7FEBB4FD96BF1F3ECAF7394BB3042F
3,153,371 UART: [art] SIG.R = 38C678B253B1D5E0BBC206C912ECAD4888B03365FD56380698E49AE7125D9A0927398E642FA39C61002DE32AAA438BD1
3,160,112 UART: [art] SIG.S = FEA681D476087E0CC18F150EF039EFCF0C35A7A1D779B9BD3DD8528E40CB4211BE6BBDE1ACBAAE7309887A6600B32261
3,183,818 UART: Caliptra RT
3,184,163 UART: [state] CFI Enabled
3,293,100 UART: [rt] RT listening for mailbox commands...
3,293,763 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,100 UART: [rt]cmd =0x46504c54, len=4
3,325,143 >>> mbox cmd response data (8 bytes)
3,325,396 UART: [rt] FIPS self test
3,325,724 UART: [kat] ++
3,325,876 UART: [kat] sha1
3,330,291 UART: Fatal Error: 0x90060002
3,331,841 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,846 >>> mbox cmd response: failed
3,331,846 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
893,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,738 UART: [kat] ++
897,890 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,973 UART: [kat] SHA2-512-ACC
908,874 UART: [kat] ECC-384
918,989 UART: [kat] HMAC-384Kdf
923,615 UART: [kat] LMS
1,171,943 UART: [kat] --
1,173,118 UART: [cold-reset] ++
1,173,474 UART: [fht] FHT @ 0x50003400
1,176,205 UART: [idev] ++
1,176,373 UART: [idev] CDI.KEYID = 6
1,176,733 UART: [idev] SUBJECT.KEYID = 7
1,177,157 UART: [idev] UDS.KEYID = 0
1,177,502 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,413 UART: [idev] Erasing UDS.KEYID = 0
1,202,630 UART: [idev] Sha1 KeyId Algorithm
1,211,032 UART: [idev] --
1,212,072 UART: [ldev] ++
1,212,240 UART: [ldev] CDI.KEYID = 6
1,212,603 UART: [ldev] SUBJECT.KEYID = 5
1,213,029 UART: [ldev] AUTHORITY.KEYID = 7
1,213,492 UART: [ldev] FE.KEYID = 1
1,219,004 UART: [ldev] Erasing FE.KEYID = 1
1,245,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,582 UART: [ldev] --
1,284,849 UART: [fwproc] Wait for Commands...
1,285,627 UART: [fwproc] Recv command 0x46574c44
1,286,355 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,546 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,850 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,115 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,532 ready_for_fw is high
1,060,532 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,444 >>> mbox cmd response: success
2,701,764 UART:
2,701,780 UART: Running Caliptra FMC ...
2,702,188 UART:
2,702,331 UART: [state] CFI Enabled
2,712,706 UART: [fht] FMC Alias Private Key: 7
2,820,871 UART: [art] Extend RT PCRs Done
2,821,299 UART: [art] Lock RT PCRs Done
2,823,059 UART: [art] Populate DV Done
2,831,344 UART: [fht] FMC Alias Private Key: 7
2,832,500 UART: [art] Derive CDI
2,832,780 UART: [art] Store in in slot 0x4
2,918,555 UART: [art] Derive Key Pair
2,918,915 UART: [art] Store priv key in slot 0x5
2,932,357 UART: [art] Derive Key Pair - Done
2,947,533 UART: [art] Signing Cert with AUTHO
2,948,013 UART: RITY.KEYID = 7
2,963,161 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,926 UART: [art] PUB.X = 2C0FBF1C20CF2844B7632CE31A4A6D2BB837520FFB5BFA85C5E1605E176F60DAAFB8F3A971FFBC705579F903A0AD9248
2,970,705 UART: [art] PUB.Y = 40A3900EB134A4B38E7C176FE6743B3812BA76D2C12FF97DCF2953F0B1EE511FEBD41D9A6FB79CA04471B16148493FC8
2,977,662 UART: [art] SIG.R = 3C71490D8D8C6DF6FD2F7DCDEFABCB46E4DADDA0227D49F4B0AC85F097143E5F13488B6AC70A4F2FCE416A4B88F68F89
2,984,452 UART: [art] SIG.S = F0E60D63E22F249E6A0EFA039BBD0DB5E08BA7E3D6AF7BEE37881318BFF0E2B019ADB04BC473ED2D09A6F4377A40CB57
3,008,004 UART: Caliptra RT
3,008,349 UART: [state] CFI Enabled
3,116,766 UART: [rt] RT listening for mailbox commands...
3,117,429 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,312 UART: [rt]cmd =0x46504c54, len=4
3,148,385 >>> mbox cmd response data (8 bytes)
3,148,616 UART: [rt] FIPS self test
3,148,944 UART: [kat] ++
3,149,096 UART: [kat] sha1
3,153,457 UART: Fatal Error: 0x90060002
3,155,007 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,012 >>> mbox cmd response: failed
3,155,012 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,017 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,608 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,438 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,568 UART: [kat] HMAC-384Kdf
921,154 UART: [kat] LMS
1,169,466 UART: [kat] --
1,170,427 UART: [cold-reset] ++
1,170,803 UART: [fht] FHT @ 0x50003400
1,173,361 UART: [idev] ++
1,173,529 UART: [idev] CDI.KEYID = 6
1,173,890 UART: [idev] SUBJECT.KEYID = 7
1,174,315 UART: [idev] UDS.KEYID = 0
1,174,661 ready_for_fw is high
1,174,661 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,687 UART: [idev] Erasing UDS.KEYID = 0
1,199,875 UART: [idev] Sha1 KeyId Algorithm
1,208,649 UART: [idev] --
1,209,678 UART: [ldev] ++
1,209,846 UART: [ldev] CDI.KEYID = 6
1,210,210 UART: [ldev] SUBJECT.KEYID = 5
1,210,637 UART: [ldev] AUTHORITY.KEYID = 7
1,211,100 UART: [ldev] FE.KEYID = 1
1,216,464 UART: [ldev] Erasing FE.KEYID = 1
1,242,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,674 UART: [ldev] --
1,282,028 UART: [fwproc] Wait for Commands...
1,282,623 UART: [fwproc] Recv command 0x46574c44
1,283,356 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,359 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,668 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,884 >>> mbox cmd response: success
2,788,141 UART: [afmc] ++
2,788,309 UART: [afmc] CDI.KEYID = 6
2,788,672 UART: [afmc] SUBJECT.KEYID = 7
2,789,098 UART: [afmc] AUTHORITY.KEYID = 5
2,825,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,458 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,187 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,070 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,789 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,736 UART: [afmc] --
2,868,782 UART: [cold-reset] --
2,869,762 UART: [state] Locking Datavault
2,871,047 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,651 UART: [state] Locking ICCM
2,872,167 UART: [exit] Launching FMC @ 0x40000130
2,877,496 UART:
2,877,512 UART: Running Caliptra FMC ...
2,877,920 UART:
2,877,974 UART: [state] CFI Enabled
2,888,411 UART: [fht] FMC Alias Private Key: 7
2,996,138 UART: [art] Extend RT PCRs Done
2,996,566 UART: [art] Lock RT PCRs Done
2,998,424 UART: [art] Populate DV Done
3,006,755 UART: [fht] FMC Alias Private Key: 7
3,007,799 UART: [art] Derive CDI
3,008,079 UART: [art] Store in in slot 0x4
3,093,808 UART: [art] Derive Key Pair
3,094,168 UART: [art] Store priv key in slot 0x5
3,106,802 UART: [art] Derive Key Pair - Done
3,121,488 UART: [art] Signing Cert with AUTHO
3,121,968 UART: RITY.KEYID = 7
3,137,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,001 UART: [art] PUB.X = F43A877C4E524678D64C04E3EDCE9CB403149FE76721D325169EEA10D336705179A2CEC76D65DD1B548D692772B0C603
3,144,762 UART: [art] PUB.Y = 946772F0B8C28E96F8A42791C07D412729394D098C3A979780C7D1BF03BA8583003F1440C417CAEEAE36DFE91E5C2354
3,151,682 UART: [art] SIG.R = 37F4B4126501233EA3FC636F0EA1DCA1F77FAAAE39F8BF785FA07E5DE07C257EE617E4B681CAFA6BB908146F30B19198
3,158,459 UART: [art] SIG.S = FBB9845A665DC81CC314857C6ACDE7D4E2E0000D0C7F201D65A6AA746865E2B5C33FC57CFE2F1E9003536964E5435DD9
3,182,251 UART: Caliptra RT
3,182,504 UART: [state] CFI Enabled
3,290,385 UART: [rt] RT listening for mailbox commands...
3,291,048 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,759 UART: [rt]cmd =0x46504c54, len=4
3,321,754 >>> mbox cmd response data (8 bytes)
3,321,973 UART: [rt] FIPS self test
3,322,301 UART: [kat] ++
3,322,453 UART: [kat] sha1
3,326,834 UART: Fatal Error: 0x90060002
3,328,384 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,389 >>> mbox cmd response: failed
3,328,389 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
915,904 UART: [kat] HMAC-384Kdf
920,640 UART: [kat] LMS
1,168,952 UART: [kat] --
1,170,041 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,174,659 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,709 UART: [idev] Erasing UDS.KEYID = 0
1,199,775 UART: [idev] Sha1 KeyId Algorithm
1,208,545 UART: [idev] --
1,209,528 UART: [ldev] ++
1,209,696 UART: [ldev] CDI.KEYID = 6
1,210,060 UART: [ldev] SUBJECT.KEYID = 5
1,210,487 UART: [ldev] AUTHORITY.KEYID = 7
1,210,950 UART: [ldev] FE.KEYID = 1
1,215,966 UART: [ldev] Erasing FE.KEYID = 1
1,242,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,160 UART: [ldev] --
1,281,442 UART: [fwproc] Wait for Commands...
1,282,093 UART: [fwproc] Recv command 0x46574c44
1,282,826 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,915 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,224 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,420 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,494 ready_for_fw is high
1,056,494 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,548 >>> mbox cmd response: success
2,697,768 UART:
2,697,784 UART: Running Caliptra FMC ...
2,698,192 UART:
2,698,246 UART: [state] CFI Enabled
2,708,885 UART: [fht] FMC Alias Private Key: 7
2,816,944 UART: [art] Extend RT PCRs Done
2,817,372 UART: [art] Lock RT PCRs Done
2,819,136 UART: [art] Populate DV Done
2,827,437 UART: [fht] FMC Alias Private Key: 7
2,828,421 UART: [art] Derive CDI
2,828,701 UART: [art] Store in in slot 0x4
2,914,558 UART: [art] Derive Key Pair
2,914,918 UART: [art] Store priv key in slot 0x5
2,928,652 UART: [art] Derive Key Pair - Done
2,943,509 UART: [art] Signing Cert with AUTHO
2,943,989 UART: RITY.KEYID = 7
2,958,879 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,644 UART: [art] PUB.X = A158DCD114034BDC4BECA8204E546DED9D4415CF180E5B3BCA964D62EB2044845AD8E9F71E676A785E1A7BF148E3C07A
2,966,424 UART: [art] PUB.Y = B156A51BAE4EEB8EFC65A6CDBB654B3C326FE6D9FEA33E3F31623690B42FAC4BD40C4F9D4B3ACF0273B6F82F69957F1D
2,973,394 UART: [art] SIG.R = 5271E29ECABFAD8FD5A7C2A4AE0E7A1E4CF0143BA00969B99D2B0460F20B847B43D7C777E0E9DC5C390D8724F29D4829
2,980,163 UART: [art] SIG.S = 5FB6BA6CEFEB57855F655028DFE3B0D12B4D9F3899DB16890C73AD47E5BBBCEAA27BABA4F939D190640F44D65C884FA9
3,004,188 UART: Caliptra RT
3,004,441 UART: [state] CFI Enabled
3,112,320 UART: [rt] RT listening for mailbox commands...
3,112,983 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,052 UART: [rt]cmd =0x46504c54, len=4
3,144,117 >>> mbox cmd response data (8 bytes)
3,144,326 UART: [rt] FIPS self test
3,144,654 UART: [kat] ++
3,144,806 UART: [kat] sha1
3,149,281 UART: Fatal Error: 0x90060002
3,150,831 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,150,836 >>> mbox cmd response: failed
3,150,836 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,150,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,478 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,998 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,701 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,468 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,686 UART: [idev] ++
1,173,854 UART: [idev] CDI.KEYID = 6
1,174,215 UART: [idev] SUBJECT.KEYID = 7
1,174,640 UART: [idev] UDS.KEYID = 0
1,174,986 ready_for_fw is high
1,174,986 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,780 UART: [idev] Erasing UDS.KEYID = 0
1,199,728 UART: [idev] Sha1 KeyId Algorithm
1,208,606 UART: [idev] --
1,209,557 UART: [ldev] ++
1,209,725 UART: [ldev] CDI.KEYID = 6
1,210,089 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,043 UART: [ldev] --
1,281,371 UART: [fwproc] Wait for Commands...
1,282,122 UART: [fwproc] Recv command 0x46574c44
1,282,855 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,989 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,141 >>> mbox cmd response: success
2,787,330 UART: [afmc] ++
2,787,498 UART: [afmc] CDI.KEYID = 6
2,787,861 UART: [afmc] SUBJECT.KEYID = 7
2,788,287 UART: [afmc] AUTHORITY.KEYID = 5
2,823,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,301 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,030 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,913 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,632 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,459 UART: [afmc] --
2,867,457 UART: [cold-reset] --
2,868,311 UART: [state] Locking Datavault
2,869,300 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,904 UART: [state] Locking ICCM
2,870,464 UART: [exit] Launching FMC @ 0x40000130
2,875,793 UART:
2,875,809 UART: Running Caliptra FMC ...
2,876,217 UART:
2,876,360 UART: [state] CFI Enabled
2,886,965 UART: [fht] FMC Alias Private Key: 7
2,994,364 UART: [art] Extend RT PCRs Done
2,994,792 UART: [art] Lock RT PCRs Done
2,996,294 UART: [art] Populate DV Done
3,004,407 UART: [fht] FMC Alias Private Key: 7
3,005,561 UART: [art] Derive CDI
3,005,841 UART: [art] Store in in slot 0x4
3,091,610 UART: [art] Derive Key Pair
3,091,970 UART: [art] Store priv key in slot 0x5
3,105,146 UART: [art] Derive Key Pair - Done
3,119,758 UART: [art] Signing Cert with AUTHO
3,120,238 UART: RITY.KEYID = 7
3,135,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,011 UART: [art] PUB.X = 7F5968975A37A4740D47784CF4C4B76DC73A16A8306A134FDA48678C68ABF13C19F3402DA5064F17CFBB1434A66F2D7D
3,142,779 UART: [art] PUB.Y = C29F8A693127413147614D63AA93C969371FDCDF64DADBEB883CEF7061F6CA4CBF7E00DE5AF732DEFF5E1667F04811D8
3,149,723 UART: [art] SIG.R = A783EAEF8564E5ABFB644D625585CDDEE424D7DAB693A60D0AE36064C097DE4CAC5D57F66AEB9EE40B10206BE213BA7F
3,156,508 UART: [art] SIG.S = F00C37D6466DF60B4A8244A3922547AB0BB09020DC03B31DB3858F1289A081EDB02F8BE15441E799BEF54614C22902C7
3,179,610 UART: Caliptra RT
3,179,955 UART: [state] CFI Enabled
3,287,909 UART: [rt] RT listening for mailbox commands...
3,288,572 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,343 UART: [rt]cmd =0x46504c54, len=4
3,319,582 >>> mbox cmd response data (8 bytes)
3,319,889 UART: [rt] FIPS self test
3,320,217 UART: [kat] ++
3,320,369 UART: [kat] sha1
3,324,614 UART: Fatal Error: 0x90060002
3,326,164 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,169 >>> mbox cmd response: failed
3,326,169 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
916,623 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,550 UART: [cold-reset] ++
1,170,976 UART: [fht] FHT @ 0x50003400
1,173,744 UART: [idev] ++
1,173,912 UART: [idev] CDI.KEYID = 6
1,174,273 UART: [idev] SUBJECT.KEYID = 7
1,174,698 UART: [idev] UDS.KEYID = 0
1,175,044 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,684 UART: [idev] Erasing UDS.KEYID = 0
1,199,148 UART: [idev] Sha1 KeyId Algorithm
1,208,202 UART: [idev] --
1,209,267 UART: [ldev] ++
1,209,435 UART: [ldev] CDI.KEYID = 6
1,209,799 UART: [ldev] SUBJECT.KEYID = 5
1,210,226 UART: [ldev] AUTHORITY.KEYID = 7
1,210,689 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,037 UART: [ldev] --
1,281,323 UART: [fwproc] Wait for Commands...
1,281,976 UART: [fwproc] Recv command 0x46574c44
1,282,709 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,905 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,221 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,243 ready_for_fw is high
1,056,243 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,571 >>> mbox cmd response: success
2,695,233 UART:
2,695,249 UART: Running Caliptra FMC ...
2,695,657 UART:
2,695,800 UART: [state] CFI Enabled
2,706,481 UART: [fht] FMC Alias Private Key: 7
2,814,396 UART: [art] Extend RT PCRs Done
2,814,824 UART: [art] Lock RT PCRs Done
2,816,340 UART: [art] Populate DV Done
2,824,519 UART: [fht] FMC Alias Private Key: 7
2,825,553 UART: [art] Derive CDI
2,825,833 UART: [art] Store in in slot 0x4
2,911,260 UART: [art] Derive Key Pair
2,911,620 UART: [art] Store priv key in slot 0x5
2,924,430 UART: [art] Derive Key Pair - Done
2,939,096 UART: [art] Signing Cert with AUTHO
2,939,576 UART: RITY.KEYID = 7
2,954,674 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,439 UART: [art] PUB.X = 517085E77CC1A696BEFC25AAABEF2B4929CCCBBCACF9E5C7FA9FEA3211E139EED7C0ED0DFDF3F3A4168A8B1A879A6480
2,962,240 UART: [art] PUB.Y = 5FAB9587D2C5E76520509DAB656F7864ADA40E4198E856528F87A0BD43528E551889BCABEAABFF9B9AAAB2F07137F7BF
2,969,203 UART: [art] SIG.R = 215056C10B0FF56C340B49B8554B4EAC09C932E201B35F43B6195283DC29D0EF2DBCFCD933F019E44F4844E730FFC58A
2,975,966 UART: [art] SIG.S = BC7F90A4112C8E908B049A643C82B53D69EECE79766C1FDCEAD3827959A69B3487E22D0277EFF752CFB5F3CEC595D1A9
2,999,275 UART: Caliptra RT
2,999,620 UART: [state] CFI Enabled
3,107,265 UART: [rt] RT listening for mailbox commands...
3,107,928 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,499 UART: [rt]cmd =0x46504c54, len=4
3,138,774 >>> mbox cmd response data (8 bytes)
3,139,099 UART: [rt] FIPS self test
3,139,427 UART: [kat] ++
3,139,579 UART: [kat] sha1
3,143,866 UART: Fatal Error: 0x90060002
3,145,416 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,145,421 >>> mbox cmd response: failed
3,145,421 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,145,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,279 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,265 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,507,594 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,651,813 >>> mbox cmd response: failed
2,652,373 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,795,682 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
4,863,232 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,438,285 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,508,227 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,652,278 >>> mbox cmd response: failed
2,652,850 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,796,222 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
4,874,933 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,462,794 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,460 writing to cptra_bootfsm_go
2,865,482 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,009,556 >>> mbox cmd response: failed
3,010,126 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,153,447 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
21,582,920 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,026,034 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
2,863,603 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,007,821 >>> mbox cmd response: failed
3,008,378 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,151,749 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
21,582,587 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,025,375 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
2,524,709 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,669,686 >>> mbox cmd response: failed
2,670,291 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,814,027 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,465,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,320,761 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
2,516,186 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,661,004 >>> mbox cmd response: failed
2,661,596 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,805,226 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
3,450,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,259,359 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
2,874,240 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,018,871 >>> mbox cmd response: failed
3,019,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,163,508 >>> mbox cmd response: failed
Initializing fuses
1,014 writing to cptra_bootfsm_go
20,180,197 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,907,471 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
2,870,246 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,014,863 >>> mbox cmd response: failed
3,015,419 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,159,007 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,190,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,895,544 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,527,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,671,928 >>> mbox cmd response: failed
2,672,492 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,816,089 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,433,766 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,764 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
2,875,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,019,822 >>> mbox cmd response: failed
3,020,390 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,164,114 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,168,653 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,878,905 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,788 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,796 >>> mbox cmd response: failed
85,796 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,802 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,012 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,578 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,586 >>> mbox cmd response: failed
85,586 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,677 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,908 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,221 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,229 >>> mbox cmd response: failed
86,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,235 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,501 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,183 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,191 >>> mbox cmd response: failed
86,191 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,850 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,097 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,584 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,592 >>> mbox cmd response: failed
85,592 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,162 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,624 >>> mbox cmd response: failed
85,624 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,897 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,244 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,059 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,067 >>> mbox cmd response: failed
86,067 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,073 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,468 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,407 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,637 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,645 >>> mbox cmd response: failed
85,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,001 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,270 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,278 >>> mbox cmd response: failed
85,278 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,505 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,910 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,974 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,982 >>> mbox cmd response: failed
85,982 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
85,988 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,287 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,020 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,009 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,017 >>> mbox cmd response: failed
86,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,824 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,621 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,083 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,091 >>> mbox cmd response: failed
86,091 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
86,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,955 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,120 UART:
192,491 UART: Running Caliptra ROM ...
193,622 UART:
193,772 UART: [state] CFI Enabled
263,629 UART: [state] LifecycleState = Unprovisioned
265,635 UART: [state] DebugLocked = No
267,042 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,288 UART: [kat] SHA2-256
440,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,447 UART: [kat] ++
451,922 UART: [kat] sha1
462,250 UART: [kat] SHA2-256
464,982 UART: [kat] SHA2-384
470,051 UART: [kat] SHA2-512-ACC
472,366 UART: [kat] ECC-384
2,770,340 UART: [kat] HMAC-384Kdf
2,801,542 UART: [kat] LMS
3,991,894 UART: [kat] --
3,997,195 UART: [cold-reset] ++
3,999,627 UART: [fht] Storing FHT @ 0x50003400
4,010,758 UART: [idev] ++
4,011,404 UART: [idev] CDI.KEYID = 6
4,012,328 UART: [idev] SUBJECT.KEYID = 7
4,013,590 UART: [idev] UDS.KEYID = 0
4,014,582 ready_for_fw is high
4,014,815 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,159,529 UART: [idev] Erasing UDS.KEYID = 0
7,348,335 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,743 UART: [idev] --
7,374,310 UART: [ldev] ++
7,374,881 UART: [ldev] CDI.KEYID = 6
7,375,849 UART: [ldev] SUBJECT.KEYID = 5
7,377,068 UART: [ldev] AUTHORITY.KEYID = 7
7,378,305 UART: [ldev] FE.KEYID = 1
7,423,872 UART: [ldev] Erasing FE.KEYID = 1
10,758,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,944 UART: [ldev] --
13,138,352 UART: [fwproc] Waiting for Commands...
13,139,966 UART: [fwproc] Received command 0x46574c44
13,142,183 UART: [fwproc] Received Image of size 114996 bytes
17,199,859 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,281,071 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,349,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,670,995 >>> mbox cmd response: success
17,675,700 UART: [afmc] ++
17,676,348 UART: [afmc] CDI.KEYID = 6
17,677,233 UART: [afmc] SUBJECT.KEYID = 7
17,678,504 UART: [afmc] AUTHORITY.KEYID = 5
21,053,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,348,054 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,350,315 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,364,696 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,379,561 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,393,990 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,415,256 UART: [afmc] --
23,419,647 UART: [cold-reset] --
23,424,814 UART: [state] Locking Datavault
23,429,958 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,713 UART: [state] Locking ICCM
23,433,112 UART: [exit] Launching FMC @ 0x40000130
23,441,514 UART:
23,441,753 UART: Running Caliptra FMC ...
23,442,857 UART:
23,443,014 UART: [state] CFI Enabled
23,508,794 UART: [fht] FMC Alias Private Key: 7
25,846,954 UART: [art] Extend RT PCRs Done
25,848,173 UART: [art] Lock RT PCRs Done
25,849,745 UART: [art] Populate DV Done
25,855,270 UART: [fht] FMC Alias Private Key: 7
25,856,915 UART: [art] Derive CDI
25,857,736 UART: [art] Store in in slot 0x4
25,908,586 UART: [art] Derive Key Pair
25,909,630 UART: [art] Store priv key in slot 0x5
29,201,982 UART: [art] Derive Key Pair - Done
29,215,146 UART: [art] Signing Cert with AUTHO
29,216,449 UART: RITY.KEYID = 7
31,504,482 UART: [art] Erasing AUTHORITY.KEYID = 7
31,505,998 UART: [art] PUB.X = 4C795B25D8EC2EC7F3DD9C70372225F02442BDC6004F5852E72CC716E1FECAD8276C7A2CBBF4A0C1076356397873A258
31,513,270 UART: [art] PUB.Y = 7593539BDDF9E693A9FAE16E51AE71820BF528E2229BA027BF6919824AC909354495FC4CAB5E3A9EA1DE28F40F32596D
31,520,505 UART: [art] SIG.R = B651A8E1EC43E076FCEFAF8D994A7E25E3D6C55B20AFBDA5D6AB20ED1FB03274DB61242CD6B037D9B37A369E18D494F4
31,527,905 UART: [art] SIG.S = BAC56E8B9BE9E86A70C9845181C9437AF491DABDC22FD1A3028AC73643C631DFDA12B08CE2ECE531F71EF18AEC24FC68
32,832,957 UART: Caliptra RT
32,833,661 UART: [state] CFI Enabled
32,995,179 UART: [rt] RT listening for mailbox commands...
32,997,064 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,026,651 UART: [rt]cmd =0x46504c54, len=4
33,028,494 >>> mbox cmd response data (8 bytes)
33,029,666 UART: [rt] FIPS self test
33,030,618 UART: [kat] ++
33,031,075 UART: [kat] sha1
33,035,376 UART: [kat] SHA2-256
33,036,176 UART: Fatal Error: 0x90010001
33,071,386 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,215,812 >>> mbox cmd response: failed
33,216,454 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,360,863 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,115 UART:
190,411 UART: Running Caliptra ROM ...
191,521 UART:
191,666 UART: [state] CFI Enabled
252,047 UART: [state] LifecycleState = Unprovisioned
253,993 UART: [state] DebugLocked = No
255,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
260,856 UART: [kat] SHA2-256
430,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,096 UART: [kat] ++
441,552 UART: [kat] sha1
453,184 UART: [kat] SHA2-256
455,827 UART: [kat] SHA2-384
461,919 UART: [kat] SHA2-512-ACC
464,259 UART: [kat] ECC-384
2,758,890 UART: [kat] HMAC-384Kdf
2,789,323 UART: [kat] LMS
3,979,632 UART: [kat] --
3,984,675 UART: [cold-reset] ++
3,986,343 UART: [fht] Storing FHT @ 0x50003400
3,998,264 UART: [idev] ++
3,998,850 UART: [idev] CDI.KEYID = 6
3,999,762 UART: [idev] SUBJECT.KEYID = 7
4,000,984 UART: [idev] UDS.KEYID = 0
4,002,620 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,147,273 UART: [idev] Erasing UDS.KEYID = 0
7,338,114 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,030 UART: [idev] --
7,364,460 UART: [ldev] ++
7,365,031 UART: [ldev] CDI.KEYID = 6
7,366,000 UART: [ldev] SUBJECT.KEYID = 5
7,367,221 UART: [ldev] AUTHORITY.KEYID = 7
7,368,460 UART: [ldev] FE.KEYID = 1
7,412,869 UART: [ldev] Erasing FE.KEYID = 1
10,743,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,425 UART: [ldev] --
13,107,264 UART: [fwproc] Waiting for Commands...
13,109,741 UART: [fwproc] Received command 0x46574c44
13,111,987 UART: [fwproc] Received Image of size 114996 bytes
17,174,591 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,153 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,638,743 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,784,295 ready_for_fw is high
3,784,893 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,892,198 >>> mbox cmd response: success
23,600,785 UART:
23,601,206 UART: Running Caliptra FMC ...
23,602,322 UART:
23,602,485 UART: [state] CFI Enabled
23,672,167 UART: [fht] FMC Alias Private Key: 7
26,009,332 UART: [art] Extend RT PCRs Done
26,010,559 UART: [art] Lock RT PCRs Done
26,012,436 UART: [art] Populate DV Done
26,017,645 UART: [fht] FMC Alias Private Key: 7
26,019,352 UART: [art] Derive CDI
26,020,176 UART: [art] Store in in slot 0x4
26,081,543 UART: [art] Derive Key Pair
26,082,549 UART: [art] Store priv key in slot 0x5
29,375,087 UART: [art] Derive Key Pair - Done
29,388,147 UART: [art] Signing Cert with AUTHO
29,389,451 UART: RITY.KEYID = 7
31,676,480 UART: [art] Erasing AUTHORITY.KEYID = 7
31,678,000 UART: [art] PUB.X = B41DFDA65AD8C74822BA54BD595884F21A39A6CE3A6D5A04F39C53E8DE619919B82E2D1C8A0D59046EEEBC76E428769A
31,685,257 UART: [art] PUB.Y = 7044796DEF348890DAFCF6D6D31F4943DC3F133E9D2D7D94738AE144AC22759118077816627464BAFC5E0AE9B4C25868
31,692,512 UART: [art] SIG.R = A32241ABADE92BA383CF3B8AAE32C3217FE142D69358B9656CF67B6601D677127BE4F466F0EB7A3E02D86A7E7CB15045
31,699,872 UART: [art] SIG.S = 5F2D2C943F682E5CB70271DDD87824C48BA7C9670CE02414C4287781D14174F8180EEB240581695F6B892FE56C783CD7
33,004,879 UART: Caliptra RT
33,005,602 UART: [state] CFI Enabled
33,167,051 UART: [rt] RT listening for mailbox commands...
33,168,920 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,198,624 UART: [rt]cmd =0x46504c54, len=4
33,200,314 >>> mbox cmd response data (8 bytes)
33,201,272 UART: [rt] FIPS self test
33,202,222 UART: [kat] ++
33,202,678 UART: [kat] sha1
33,207,255 UART: [kat] SHA2-256
33,208,050 UART: Fatal Error: 0x90010001
33,243,283 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,387,754 >>> mbox cmd response: failed
33,388,401 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,532,745 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,797,812 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,905,355 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,543 UART:
192,924 UART: Running Caliptra ROM ...
194,113 UART:
603,781 UART: [state] CFI Enabled
616,463 UART: [state] LifecycleState = Unprovisioned
618,350 UART: [state] DebugLocked = No
620,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,191 UART: [kat] SHA2-256
795,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,465 UART: [kat] ++
806,990 UART: [kat] sha1
818,998 UART: [kat] SHA2-256
821,651 UART: [kat] SHA2-384
828,280 UART: [kat] SHA2-512-ACC
830,649 UART: [kat] ECC-384
3,115,205 UART: [kat] HMAC-384Kdf
3,127,337 UART: [kat] LMS
4,317,391 UART: [kat] --
4,320,757 UART: [cold-reset] ++
4,322,436 UART: [fht] Storing FHT @ 0x50003400
4,334,356 UART: [idev] ++
4,334,993 UART: [idev] CDI.KEYID = 6
4,335,875 UART: [idev] SUBJECT.KEYID = 7
4,337,121 UART: [idev] UDS.KEYID = 0
4,338,197 ready_for_fw is high
4,338,401 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,483,213 UART: [idev] Erasing UDS.KEYID = 0
7,625,916 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,286 UART: [idev] --
7,652,013 UART: [ldev] ++
7,652,589 UART: [ldev] CDI.KEYID = 6
7,653,559 UART: [ldev] SUBJECT.KEYID = 5
7,654,796 UART: [ldev] AUTHORITY.KEYID = 7
7,656,037 UART: [ldev] FE.KEYID = 1
7,667,877 UART: [ldev] Erasing FE.KEYID = 1
10,953,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,743 UART: [ldev] --
13,314,308 UART: [fwproc] Waiting for Commands...
13,316,084 UART: [fwproc] Received command 0x46574c44
13,318,275 UART: [fwproc] Received Image of size 114996 bytes
17,380,271 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,595 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,457 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,843,411 >>> mbox cmd response: success
17,847,828 UART: [afmc] ++
17,848,420 UART: [afmc] CDI.KEYID = 6
17,849,362 UART: [afmc] SUBJECT.KEYID = 7
17,850,627 UART: [afmc] AUTHORITY.KEYID = 5
21,168,281 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,463,889 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,466,141 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,480,520 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,495,367 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,509,758 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,373 UART: [afmc] --
23,534,024 UART: [cold-reset] --
23,537,832 UART: [state] Locking Datavault
23,544,318 UART: [state] Locking PCR0, PCR1 and PCR31
23,546,073 UART: [state] Locking ICCM
23,548,115 UART: [exit] Launching FMC @ 0x40000130
23,556,475 UART:
23,556,726 UART: Running Caliptra FMC ...
23,557,832 UART:
23,557,991 UART: [state] CFI Enabled
23,565,983 UART: [fht] FMC Alias Private Key: 7
25,896,905 UART: [art] Extend RT PCRs Done
25,898,129 UART: [art] Lock RT PCRs Done
25,899,805 UART: [art] Populate DV Done
25,905,219 UART: [fht] FMC Alias Private Key: 7
25,906,866 UART: [art] Derive CDI
25,907,605 UART: [art] Store in in slot 0x4
25,950,093 UART: [art] Derive Key Pair
25,951,135 UART: [art] Store priv key in slot 0x5
29,192,705 UART: [art] Derive Key Pair - Done
29,205,481 UART: [art] Signing Cert with AUTHO
29,206,812 UART: RITY.KEYID = 7
31,486,614 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,119 UART: [art] PUB.X = A4D4284D09260B49BBB1F57B0AE77911604D771EC37FA1B4DECC7281AB32FE9C79B07741B568D2A6F629D36F2C15E181
31,495,376 UART: [art] PUB.Y = 5EFEF01B4ABAC4A2FC65605D8546717CF058918AF4492E8F57BC4186743222EA45B4F5C532E443DBBDAA646B35BA698B
31,502,677 UART: [art] SIG.R = BE1F970C4331BCF6A6534799E0B39B165033143C409BF98468DA2C30A735EDBF98297C9FF6FEAE6A756CFFA2761F298E
31,510,036 UART: [art] SIG.S = 2FD44247462321316571EB6548B5A0B352D21AE594BC7632FF4B9AD2E64CE1D4BE1629685F740E3792BB765B5686224E
32,815,800 UART: Caliptra RT
32,816,515 UART: [state] CFI Enabled
32,935,088 UART: [rt] RT listening for mailbox commands...
32,936,943 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,966,697 UART: [rt]cmd =0x46504c54, len=4
32,968,312 >>> mbox cmd response data (8 bytes)
32,969,166 UART: [rt] FIPS self test
32,970,115 UART: [kat] ++
32,970,570 UART: [kat] sha1
32,975,027 UART: [kat] SHA2-256
32,975,773 UART: Fatal Error: 0x90010001
33,010,997 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,155,482 >>> mbox cmd response: failed
33,156,101 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,300,474 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
189,976 UART:
190,267 UART: Running Caliptra ROM ...
191,293 UART:
7,235,593 UART: [state] CFI Enabled
7,250,205 UART: [state] LifecycleState = Unprovisioned
7,252,127 UART: [state] DebugLocked = No
7,254,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,258,647 UART: [kat] SHA2-256
7,428,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,438,933 UART: [kat] ++
7,439,414 UART: [kat] sha1
7,450,414 UART: [kat] SHA2-256
7,453,112 UART: [kat] SHA2-384
7,458,510 UART: [kat] SHA2-512-ACC
7,460,859 UART: [kat] ECC-384
9,744,066 UART: [kat] HMAC-384Kdf
9,755,809 UART: [kat] LMS
10,945,932 UART: [kat] --
10,950,454 UART: [cold-reset] ++
10,951,813 UART: [fht] Storing FHT @ 0x50003400
10,962,871 UART: [idev] ++
10,963,435 UART: [idev] CDI.KEYID = 6
10,964,448 UART: [idev] SUBJECT.KEYID = 7
10,965,603 UART: [idev] UDS.KEYID = 0
10,967,226 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,111,598 UART: [idev] Erasing UDS.KEYID = 0
14,251,134 UART: [idev] Using Sha1 for KeyId Algorithm
14,273,099 UART: [idev] --
14,277,415 UART: [ldev] ++
14,277,986 UART: [ldev] CDI.KEYID = 6
14,278,952 UART: [ldev] SUBJECT.KEYID = 5
14,280,165 UART: [ldev] AUTHORITY.KEYID = 7
14,281,390 UART: [ldev] FE.KEYID = 1
14,294,034 UART: [ldev] Erasing FE.KEYID = 1
17,580,431 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,874,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,888,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,903,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,917,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,938,047 UART: [ldev] --
19,943,372 UART: [fwproc] Waiting for Commands...
19,946,439 UART: [fwproc] Received command 0x46574c44
19,948,707 UART: [fwproc] Received Image of size 114996 bytes
24,010,274 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,086,939 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,155,817 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,475,665 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,157 writing to cptra_bootfsm_go
4,128,406 ready_for_fw is high
4,128,965 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,075,697 >>> mbox cmd response: success
23,719,425 UART:
23,719,812 UART: Running Caliptra FMC ...
23,720,929 UART:
23,721,083 UART: [state] CFI Enabled
23,728,928 UART: [fht] FMC Alias Private Key: 7
26,060,233 UART: [art] Extend RT PCRs Done
26,061,475 UART: [art] Lock RT PCRs Done
26,062,808 UART: [art] Populate DV Done
26,067,990 UART: [fht] FMC Alias Private Key: 7
26,069,645 UART: [art] Derive CDI
26,070,470 UART: [art] Store in in slot 0x4
26,113,126 UART: [art] Derive Key Pair
26,114,165 UART: [art] Store priv key in slot 0x5
29,355,515 UART: [art] Derive Key Pair - Done
29,368,183 UART: [art] Signing Cert with AUTHO
29,369,525 UART: RITY.KEYID = 7
31,648,584 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,101 UART: [art] PUB.X = 4CC68052FA7A474AF69D9C1C4BBF122BCF3D843249B5DB52C857E2EBBCD5B94494BF3656B11C0B7F9904AAC01B58A0F1
31,657,319 UART: [art] PUB.Y = 14E1269A43B0896737EBBD2BA95928211A926F2F1404C4678FB3DF48F4DE035A82CC761FF6AE439479D7A944F3F78401
31,664,593 UART: [art] SIG.R = 7E0C32A732475B041270842FC754D6AFD6D0905A49334E0F90624BB0E19986BC6158B3433590F640C4B4178BD1FFD89A
31,671,940 UART: [art] SIG.S = A2D5F15B1F08B674D576FC4EA94691DC834FB7FE58FD15610DB4FBBD68449A761CF9399FF6A3D8941B3FB4506F5C9291
32,977,052 UART: Caliptra RT
32,977,758 UART: [state] CFI Enabled
33,095,469 UART: [rt] RT listening for mailbox commands...
33,097,340 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,127,140 UART: [rt]cmd =0x46504c54, len=4
33,128,704 >>> mbox cmd response data (8 bytes)
33,130,407 UART: [rt] FIPS self test
33,131,351 UART: [kat] ++
33,131,797 UART: [kat] sha1
33,136,198 UART: [kat] SHA2-256
33,136,935 UART: Fatal Error: 0x90010001
33,172,062 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,316,846 >>> mbox cmd response: failed
33,317,481 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,462,284 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
10,597,474 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,564,777 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
192,274 UART:
192,655 UART: Running Caliptra ROM ...
194,561 UART:
194,731 UART: [state] CFI Enabled
266,592 UART: [state] LifecycleState = Unprovisioned
268,457 UART: [state] DebugLocked = No
269,626 UART: [state] WD Timer not started. Device not locked for debugging
273,367 UART: [kat] SHA2-256
452,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,020 UART: [kat] ++
464,565 UART: [kat] sha1
476,160 UART: [kat] SHA2-256
479,242 UART: [kat] SHA2-384
484,309 UART: [kat] SHA2-512-ACC
487,246 UART: [kat] ECC-384
2,950,607 UART: [kat] HMAC-384Kdf
2,972,503 UART: [kat] LMS
3,501,995 UART: [kat] --
3,505,989 UART: [cold-reset] ++
3,507,140 UART: [fht] FHT @ 0x50003400
3,518,761 UART: [idev] ++
3,519,324 UART: [idev] CDI.KEYID = 6
3,520,234 UART: [idev] SUBJECT.KEYID = 7
3,521,481 UART: [idev] UDS.KEYID = 0
3,522,415 ready_for_fw is high
3,522,630 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,667,664 UART: [idev] Erasing UDS.KEYID = 0
6,040,726 UART: [idev] Sha1 KeyId Algorithm
6,064,551 UART: [idev] --
6,068,981 UART: [ldev] ++
6,069,554 UART: [ldev] CDI.KEYID = 6
6,070,486 UART: [ldev] SUBJECT.KEYID = 5
6,071,653 UART: [ldev] AUTHORITY.KEYID = 7
6,072,889 UART: [ldev] FE.KEYID = 1
6,113,356 UART: [ldev] Erasing FE.KEYID = 1
8,618,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,041 UART: [ldev] --
10,426,828 UART: [fwproc] Wait for Commands...
10,429,143 UART: [fwproc] Recv command 0x46574c44
10,431,239 UART: [fwproc] Recv'd Img size: 115304 bytes
13,846,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,919,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,988,725 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,310,925 >>> mbox cmd response: success
14,315,762 UART: [afmc] ++
14,316,349 UART: [afmc] CDI.KEYID = 6
14,317,257 UART: [afmc] SUBJECT.KEYID = 7
14,318,418 UART: [afmc] AUTHORITY.KEYID = 5
16,865,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,585,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,587,275 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,603,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,619,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,634,940 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,657,723 UART: [afmc] --
18,662,064 UART: [cold-reset] --
18,666,678 UART: [state] Locking Datavault
18,671,173 UART: [state] Locking PCR0, PCR1 and PCR31
18,672,872 UART: [state] Locking ICCM
18,675,375 UART: [exit] Launching FMC @ 0x40000130
18,683,793 UART:
18,684,037 UART: Running Caliptra FMC ...
18,685,144 UART:
18,685,304 UART: [state] CFI Enabled
18,745,939 UART: [fht] FMC Alias Private Key: 7
20,510,244 UART: [art] Extend RT PCRs Done
20,511,471 UART: [art] Lock RT PCRs Done
20,512,988 UART: [art] Populate DV Done
20,518,615 UART: [fht] FMC Alias Private Key: 7
20,520,329 UART: [art] Derive CDI
20,521,149 UART: [art] Store in in slot 0x4
20,578,746 UART: [art] Derive Key Pair
20,579,748 UART: [art] Store priv key in slot 0x5
23,042,021 UART: [art] Derive Key Pair - Done
23,055,401 UART: [art] Signing Cert with AUTHO
23,056,734 UART: RITY.KEYID = 7
24,767,987 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,479 UART: [art] PUB.X = CF386ECA837C5161CE6B30BF5BF64BE47AF488282328ECD42743BF4800B7FF7CEF6C4C614B48665E32B7D745B84F0EBA
24,776,786 UART: [art] PUB.Y = 7F50366676063261340D15DABE4A76B47948FCDB5DB94DEAFEB64825F349F975930F0EB57E4ED5FBED00F45FC082431A
24,784,022 UART: [art] SIG.R = 1B6D3B14187BB230207944CA500672E22BE6220DBF2886B7E46625674F961E8C97343597E18A2B822544795A66A7E095
24,791,383 UART: [art] SIG.S = 46B1CEABFF115C0201F662D024959019125550F3463DDF5AEFE3CDD8F26182AF8ED490EEAEB0D301A88BDE9853E59EC9
25,770,406 UART: Caliptra RT
25,771,123 UART: [state] CFI Enabled
25,937,219 UART: [rt] RT listening for mailbox commands...
25,939,079 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,968,766 UART: [rt]cmd =0x46504c54, len=4
25,970,539 >>> mbox cmd response data (8 bytes)
25,971,624 UART: [rt] FIPS self test
25,972,574 UART: [kat] ++
25,973,027 UART: [kat] sha1
25,977,543 UART: [kat] SHA2-256
25,978,305 UART: Fatal Error: 0x90010001
26,013,457 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,158,327 >>> mbox cmd response: failed
26,158,901 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,303,636 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,095 UART:
190,377 UART: Running Caliptra ROM ...
191,485 UART:
191,635 UART: [state] CFI Enabled
256,116 UART: [state] LifecycleState = Unprovisioned
257,981 UART: [state] DebugLocked = No
260,223 UART: [state] WD Timer not started. Device not locked for debugging
263,467 UART: [kat] SHA2-256
442,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,135 UART: [kat] ++
454,672 UART: [kat] sha1
463,987 UART: [kat] SHA2-256
467,039 UART: [kat] SHA2-384
472,097 UART: [kat] SHA2-512-ACC
475,084 UART: [kat] ECC-384
2,937,193 UART: [kat] HMAC-384Kdf
2,960,661 UART: [kat] LMS
3,490,093 UART: [kat] --
3,495,168 UART: [cold-reset] ++
3,497,754 UART: [fht] FHT @ 0x50003400
3,509,325 UART: [idev] ++
3,509,889 UART: [idev] CDI.KEYID = 6
3,510,856 UART: [idev] SUBJECT.KEYID = 7
3,512,015 UART: [idev] UDS.KEYID = 0
3,513,580 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,658,665 UART: [idev] Erasing UDS.KEYID = 0
6,014,132 UART: [idev] Sha1 KeyId Algorithm
6,037,263 UART: [idev] --
6,040,667 UART: [ldev] ++
6,041,237 UART: [ldev] CDI.KEYID = 6
6,042,126 UART: [ldev] SUBJECT.KEYID = 5
6,043,340 UART: [ldev] AUTHORITY.KEYID = 7
6,044,576 UART: [ldev] FE.KEYID = 1
6,089,490 UART: [ldev] Erasing FE.KEYID = 1
8,594,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,715 UART: [ldev] --
10,404,550 UART: [fwproc] Wait for Commands...
10,407,211 UART: [fwproc] Recv command 0x46574c44
10,409,306 UART: [fwproc] Recv'd Img size: 115304 bytes
13,826,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,641 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,439 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,292,061 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,358,515 ready_for_fw is high
3,358,896 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,085,977 >>> mbox cmd response: success
18,368,447 UART:
18,368,845 UART: Running Caliptra FMC ...
18,369,988 UART:
18,370,154 UART: [state] CFI Enabled
18,436,357 UART: [fht] FMC Alias Private Key: 7
20,200,483 UART: [art] Extend RT PCRs Done
20,201,732 UART: [art] Lock RT PCRs Done
20,203,252 UART: [art] Populate DV Done
20,208,703 UART: [fht] FMC Alias Private Key: 7
20,210,412 UART: [art] Derive CDI
20,211,228 UART: [art] Store in in slot 0x4
20,268,609 UART: [art] Derive Key Pair
20,269,652 UART: [art] Store priv key in slot 0x5
22,732,580 UART: [art] Derive Key Pair - Done
22,745,309 UART: [art] Signing Cert with AUTHO
22,746,611 UART: RITY.KEYID = 7
24,458,083 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,590 UART: [art] PUB.X = E298256EDEA58D314252F87307246C4C86F79889A52A1A7C5566E553BD279332799416162B4481DDBFF24F19F82CF496
24,466,849 UART: [art] PUB.Y = E8CE90CD9BEABBBF88174E6F858102DE7FF02895FDB94BD6E03A1AEACB92CADF8B6DD08B884096552227882D4A4D42FB
24,474,121 UART: [art] SIG.R = AF73A6C697C444F5D1C30EFFD9AE3BF4EE5A09CFEC88DF3EC69B9FAB009B2ED9F40EEAA563259533390B44062CFCAEF8
24,481,526 UART: [art] SIG.S = 2FA9D0F66076ED946B81164ADCD9D376AE32E5593F3F1CCF4B61424A92BA4FFE6EC4BDAD2E75A9793E1F8F541AE3D26C
25,459,813 UART: Caliptra RT
25,460,549 UART: [state] CFI Enabled
25,625,994 UART: [rt] RT listening for mailbox commands...
25,627,851 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,657,457 UART: [rt]cmd =0x46504c54, len=4
25,659,144 >>> mbox cmd response data (8 bytes)
25,660,421 UART: [rt] FIPS self test
25,661,363 UART: [kat] ++
25,661,809 UART: [kat] sha1
25,666,264 UART: [kat] SHA2-256
25,666,999 UART: Fatal Error: 0x90010001
25,702,272 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,847,097 >>> mbox cmd response: failed
25,847,718 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,992,450 >>> mbox cmd response: failed
Initializing fuses
929 writing to cptra_bootfsm_go
3,375,130 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,089,287 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,487 UART:
192,891 UART: Running Caliptra ROM ...
194,114 UART:
603,761 UART: [state] CFI Enabled
615,390 UART: [state] LifecycleState = Unprovisioned
617,204 UART: [state] DebugLocked = No
618,935 UART: [state] WD Timer not started. Device not locked for debugging
623,531 UART: [kat] SHA2-256
802,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,217 UART: [kat] ++
814,660 UART: [kat] sha1
827,042 UART: [kat] SHA2-256
830,087 UART: [kat] SHA2-384
835,450 UART: [kat] SHA2-512-ACC
838,391 UART: [kat] ECC-384
3,278,927 UART: [kat] HMAC-384Kdf
3,291,804 UART: [kat] LMS
3,821,307 UART: [kat] --
3,823,952 UART: [cold-reset] ++
3,825,815 UART: [fht] FHT @ 0x50003400
3,837,098 UART: [idev] ++
3,837,670 UART: [idev] CDI.KEYID = 6
3,838,580 UART: [idev] SUBJECT.KEYID = 7
3,839,757 UART: [idev] UDS.KEYID = 0
3,840,681 ready_for_fw is high
3,840,906 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,985,728 UART: [idev] Erasing UDS.KEYID = 0
6,316,350 UART: [idev] Sha1 KeyId Algorithm
6,339,625 UART: [idev] --
6,343,334 UART: [ldev] ++
6,343,920 UART: [ldev] CDI.KEYID = 6
6,344,832 UART: [ldev] SUBJECT.KEYID = 5
6,345,996 UART: [ldev] AUTHORITY.KEYID = 7
6,347,249 UART: [ldev] FE.KEYID = 1
6,357,522 UART: [ldev] Erasing FE.KEYID = 1
8,829,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,293 UART: [ldev] --
10,620,583 UART: [fwproc] Wait for Commands...
10,623,445 UART: [fwproc] Recv command 0x46574c44
10,625,541 UART: [fwproc] Recv'd Img size: 115304 bytes
14,031,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,464 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,280 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,492,035 >>> mbox cmd response: success
14,495,546 UART: [afmc] ++
14,496,152 UART: [afmc] CDI.KEYID = 6
14,497,266 UART: [afmc] SUBJECT.KEYID = 7
14,498,324 UART: [afmc] AUTHORITY.KEYID = 5
16,998,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,776 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,538 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,585 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,551 UART: [afmc] --
18,797,116 UART: [cold-reset] --
18,802,595 UART: [state] Locking Datavault
18,807,146 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,845 UART: [state] Locking ICCM
18,811,369 UART: [exit] Launching FMC @ 0x40000130
18,819,771 UART:
18,820,062 UART: Running Caliptra FMC ...
18,821,178 UART:
18,821,343 UART: [state] CFI Enabled
18,829,664 UART: [fht] FMC Alias Private Key: 7
20,585,869 UART: [art] Extend RT PCRs Done
20,587,088 UART: [art] Lock RT PCRs Done
20,588,711 UART: [art] Populate DV Done
20,593,904 UART: [fht] FMC Alias Private Key: 7
20,595,388 UART: [art] Derive CDI
20,596,150 UART: [art] Store in in slot 0x4
20,638,902 UART: [art] Derive Key Pair
20,639,904 UART: [art] Store priv key in slot 0x5
23,067,045 UART: [art] Derive Key Pair - Done
23,080,041 UART: [art] Signing Cert with AUTHO
23,081,351 UART: RITY.KEYID = 7
24,786,948 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,465 UART: [art] PUB.X = 4D3E0865BE715ED5C74FC92B566F90A23D9A0B94D6FC2663E82EF4FB4643C6285B87A86756AE7D1F25E3EBE0A8C69E3B
24,795,723 UART: [art] PUB.Y = 4E25E490B0E42CE633B72434692637950B6981997A570CA431222D619C669368CD115F57C52AB8F4FDAB661D08369E9E
24,802,972 UART: [art] SIG.R = 6C7745461D38A86635B8DCCFB34192BBDCEA0D735E1A30FFE3EDA81C5CB19F7D91665023A377AB8F8E18A775382A9961
24,810,370 UART: [art] SIG.S = B592F16B6A77D2E54703CDD4DE7DC90087F8B5AE85C91B0E893D81777887B765D8AAA04C98E68D0FDC34C9AFC781F661
25,789,345 UART: Caliptra RT
25,790,054 UART: [state] CFI Enabled
25,907,280 UART: [rt] RT listening for mailbox commands...
25,909,133 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,938,991 UART: [rt]cmd =0x46504c54, len=4
25,940,758 >>> mbox cmd response data (8 bytes)
25,941,828 UART: [rt] FIPS self test
25,942,772 UART: [kat] ++
25,943,225 UART: [kat] sha1
25,947,572 UART: [kat] SHA2-256
25,948,366 UART: Fatal Error: 0x90010001
25,983,522 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,128,357 >>> mbox cmd response: failed
26,129,034 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,273,815 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
190,153 UART:
190,446 UART: Running Caliptra ROM ...
191,556 UART:
14,261,795 UART: [state] CFI Enabled
14,275,676 UART: [state] LifecycleState = Unprovisioned
14,277,541 UART: [state] DebugLocked = No
14,278,933 UART: [state] WD Timer not started. Device not locked for debugging
14,283,101 UART: [kat] SHA2-256
14,462,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,473,819 UART: [kat] ++
14,474,364 UART: [kat] sha1
14,486,574 UART: [kat] SHA2-256
14,489,597 UART: [kat] SHA2-384
14,494,827 UART: [kat] SHA2-512-ACC
14,497,768 UART: [kat] ECC-384
16,937,585 UART: [kat] HMAC-384Kdf
16,950,603 UART: [kat] LMS
17,480,106 UART: [kat] --
17,485,763 UART: [cold-reset] ++
17,487,583 UART: [fht] FHT @ 0x50003400
17,498,993 UART: [idev] ++
17,499,557 UART: [idev] CDI.KEYID = 6
17,500,521 UART: [idev] SUBJECT.KEYID = 7
17,501,679 UART: [idev] UDS.KEYID = 0
17,503,323 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,647,951 UART: [idev] Erasing UDS.KEYID = 0
19,976,482 UART: [idev] Sha1 KeyId Algorithm
19,998,746 UART: [idev] --
20,004,010 UART: [ldev] ++
20,004,589 UART: [ldev] CDI.KEYID = 6
20,005,479 UART: [ldev] SUBJECT.KEYID = 5
20,006,694 UART: [ldev] AUTHORITY.KEYID = 7
20,007,875 UART: [ldev] FE.KEYID = 1
20,015,176 UART: [ldev] Erasing FE.KEYID = 1
22,490,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,209,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,225,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,241,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,257,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,277,531 UART: [ldev] --
24,282,576 UART: [fwproc] Wait for Commands...
24,285,213 UART: [fwproc] Recv command 0x46574c44
24,287,306 UART: [fwproc] Recv'd Img size: 115304 bytes
27,697,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,774,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,843,274 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,164,287 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,692,686 ready_for_fw is high
3,693,123 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,290,964 >>> mbox cmd response: success
18,544,157 UART:
18,544,572 UART: Running Caliptra FMC ...
18,545,737 UART:
18,545,900 UART: [state] CFI Enabled
18,553,350 UART: [fht] FMC Alias Private Key: 7
20,310,290 UART: [art] Extend RT PCRs Done
20,311,513 UART: [art] Lock RT PCRs Done
20,313,113 UART: [art] Populate DV Done
20,318,673 UART: [fht] FMC Alias Private Key: 7
20,320,270 UART: [art] Derive CDI
20,321,089 UART: [art] Store in in slot 0x4
20,363,488 UART: [art] Derive Key Pair
20,364,533 UART: [art] Store priv key in slot 0x5
22,791,555 UART: [art] Derive Key Pair - Done
22,804,880 UART: [art] Signing Cert with AUTHO
22,806,180 UART: RITY.KEYID = 7
24,511,968 UART: [art] Erasing AUTHORITY.KEYID = 7
24,513,487 UART: [art] PUB.X = EDE8E3B48C2225B56F27117A954A815FC54E4C839AF0A3565855760E23F6C89BCE656FD5BD7A028F0AE10DD73A79F982
24,520,764 UART: [art] PUB.Y = 5AF8D132BA7EA1723C5286D61703EA6FD39CB9316EDD4CA714CA6A999B00FCC5C0661882A2B82CD2A93C941C49FDD3F9
24,528,051 UART: [art] SIG.R = 5A8C72E6D8A2D63AD983116361D49DBAF15B78D21304FA45FF2A2C974E926EBD0E6ADC73D11D464EBA1F885F55DF1358
24,535,427 UART: [art] SIG.S = 5544CB08D0AD74C60105357E9E2728EE2759DB750D207410B9A8631B1EB3A3BE390611261C230A229AFEBCF4A9DB8E87
25,514,621 UART: Caliptra RT
25,515,320 UART: [state] CFI Enabled
25,632,212 UART: [rt] RT listening for mailbox commands...
25,634,059 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,664,012 UART: [rt]cmd =0x46504c54, len=4
25,665,480 >>> mbox cmd response data (8 bytes)
25,666,687 UART: [rt] FIPS self test
25,667,624 UART: [kat] ++
25,668,079 UART: [kat] sha1
25,672,516 UART: [kat] SHA2-256
25,673,424 UART: Fatal Error: 0x90010001
25,708,810 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,853,660 >>> mbox cmd response: failed
25,854,356 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,998,931 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
17,625,594 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,227,599 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,436,926 ready_for_fw is high
3,437,353 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,761,996 >>> mbox cmd response: success
19,044,298 UART:
19,044,736 UART: Running Caliptra FMC ...
19,045,866 UART:
19,046,022 UART: [state] CFI Enabled
19,115,504 UART: [fht] FMC Alias Private Key: 7
20,879,755 UART: [art] Extend RT PCRs Done
20,880,989 UART: [art] Lock RT PCRs Done
20,882,674 UART: [art] Populate DV Done
20,888,039 UART: [fht] FMC Alias Private Key: 7
20,889,639 UART: [art] Derive CDI
20,890,461 UART: [art] Store in in slot 0x4
20,948,222 UART: [art] Derive Key Pair
20,949,262 UART: [art] Store priv key in slot 0x5
23,412,343 UART: [art] Derive Key Pair - Done
23,425,345 UART: [art] Signing Cert with AUTHO
23,426,650 UART: RITY.KEYID = 7
25,137,447 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,959 UART: [art] PUB.X = 9C7BDA5FC46E1E23BF9492691EEA8F47297617D2E2D47F6522A6D30826E7526EBC6B1703D60E327151CB9BEFADA1A37F
25,146,216 UART: [art] PUB.Y = 3EAEC5C1B28C6211A93365B6E748D3476099FB86AF11C9CE0A000ABFA99FAE09423A1C1BCD4FD858065A050CCFFC2F7C
25,153,473 UART: [art] SIG.R = 408159EAEF9911464791377544046547D574F96DF562543BCC7B8EE0D1737FF8AFFD184CA79C92100452617987459B32
25,160,885 UART: [art] SIG.S = 2194DD1C5CD8E8313AF530F6125F2403525CC2B405104156EDAFF877E6C98068C1E4BBB986B6B5BB2728D5A58B4E2456
26,139,776 UART: Caliptra RT
26,140,491 UART: [state] CFI Enabled
26,304,923 UART: [rt] RT listening for mailbox commands...
26,306,773 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,336,450 UART: [rt]cmd =0x46504c54, len=4
26,337,954 >>> mbox cmd response data (8 bytes)
26,338,959 UART: [rt] FIPS self test
26,339,899 UART: [kat] ++
26,340,424 UART: [kat] sha1
26,344,779 UART: [kat] SHA2-256
26,345,632 UART: Fatal Error: 0x90010001
26,380,873 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,525,747 >>> mbox cmd response: failed
26,526,425 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,671,163 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,430,886 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,729,750 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,758,129 ready_for_fw is high
3,758,513 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,979,888 >>> mbox cmd response: success
19,234,627 UART:
19,235,026 UART: Running Caliptra FMC ...
19,236,247 UART:
19,236,419 UART: [state] CFI Enabled
19,244,312 UART: [fht] FMC Alias Private Key: 7
21,001,581 UART: [art] Extend RT PCRs Done
21,002,842 UART: [art] Lock RT PCRs Done
21,004,452 UART: [art] Populate DV Done
21,009,547 UART: [fht] FMC Alias Private Key: 7
21,011,148 UART: [art] Derive CDI
21,011,898 UART: [art] Store in in slot 0x4
21,054,392 UART: [art] Derive Key Pair
21,055,436 UART: [art] Store priv key in slot 0x5
23,481,796 UART: [art] Derive Key Pair - Done
23,494,789 UART: [art] Signing Cert with AUTHO
23,496,097 UART: RITY.KEYID = 7
25,201,321 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,830 UART: [art] PUB.X = 73F50C7531D271995B005F124A2F7E278FBA4F8DC60E171EEA913401C0BE0DD03089983FD0E1EC5979A90A6439A819F1
25,210,061 UART: [art] PUB.Y = A75C23FBA758D86C03CE4480CE71846398EE5EE5596228A7E4802EAF46828ED1EE40BE85D555C37D0DBCE0BE1C21C190
25,217,308 UART: [art] SIG.R = 228243A6D9092DE8B5AD6A8CBE7D1B26266479500A9005BC9E55489A19E94AB269BC5E7190B5C42ABDD371B2BB31A3AF
25,224,736 UART: [art] SIG.S = F929A6BC010F1AA51BA8813775B163E590AC7384ED96CE4542605A45AD57AD53ED6B195FB0087A8E42C4ACDA33B75B65
26,204,064 UART: Caliptra RT
26,204,803 UART: [state] CFI Enabled
26,322,029 UART: [rt] RT listening for mailbox commands...
26,323,898 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,353,605 UART: [rt]cmd =0x46504c54, len=4
26,355,353 >>> mbox cmd response data (8 bytes)
26,356,412 UART: [rt] FIPS self test
26,357,352 UART: [kat] ++
26,357,813 UART: [kat] sha1
26,362,377 UART: [kat] SHA2-256
26,363,159 UART: Fatal Error: 0x90010001
26,398,544 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,543,285 >>> mbox cmd response: failed
26,543,940 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,688,716 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
16,990,765 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,222,877 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,419 UART: [kat] SHA2-256
892,357 UART: [kat] SHA2-384
895,116 UART: [kat] SHA2-512-ACC
897,017 UART: [kat] ECC-384
902,490 UART: [kat] HMAC-384Kdf
907,060 UART: [kat] LMS
1,475,256 UART: [kat] --
1,476,127 UART: [cold-reset] ++
1,476,497 UART: [fht] Storing FHT @ 0x50003400
1,479,466 UART: [idev] ++
1,479,634 UART: [idev] CDI.KEYID = 6
1,479,994 UART: [idev] SUBJECT.KEYID = 7
1,480,418 UART: [idev] UDS.KEYID = 0
1,480,763 ready_for_fw is high
1,480,763 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,508 UART: [idev] Erasing UDS.KEYID = 0
1,505,144 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,854 UART: [idev] --
1,514,845 UART: [ldev] ++
1,515,013 UART: [ldev] CDI.KEYID = 6
1,515,376 UART: [ldev] SUBJECT.KEYID = 5
1,515,802 UART: [ldev] AUTHORITY.KEYID = 7
1,516,265 UART: [ldev] FE.KEYID = 1
1,521,465 UART: [ldev] Erasing FE.KEYID = 1
1,546,994 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,046 UART: [ldev] --
1,586,331 UART: [fwproc] Waiting for Commands...
1,587,014 UART: [fwproc] Received command 0x46574c44
1,587,805 UART: [fwproc] Received Image of size 115304 bytes
2,897,906 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,530 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,763 >>> mbox cmd response: success
3,094,015 UART: [afmc] ++
3,094,183 UART: [afmc] CDI.KEYID = 6
3,094,545 UART: [afmc] SUBJECT.KEYID = 7
3,094,970 UART: [afmc] AUTHORITY.KEYID = 5
3,130,905 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,147,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,148,201 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,153,929 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,159,814 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,165,504 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,173,461 UART: [afmc] --
3,174,425 UART: [cold-reset] --
3,175,121 UART: [state] Locking Datavault
3,176,414 UART: [state] Locking PCR0, PCR1 and PCR31
3,177,018 UART: [state] Locking ICCM
3,177,532 UART: [exit] Launching FMC @ 0x40000130
3,182,861 UART:
3,182,877 UART: Running Caliptra FMC ...
3,183,285 UART:
3,183,339 UART: [state] CFI Enabled
3,193,566 UART: [fht] FMC Alias Private Key: 7
3,301,349 UART: [art] Extend RT PCRs Done
3,301,777 UART: [art] Lock RT PCRs Done
3,303,217 UART: [art] Populate DV Done
3,311,488 UART: [fht] FMC Alias Private Key: 7
3,312,432 UART: [art] Derive CDI
3,312,712 UART: [art] Store in in slot 0x4
3,398,419 UART: [art] Derive Key Pair
3,398,779 UART: [art] Store priv key in slot 0x5
3,411,613 UART: [art] Derive Key Pair - Done
3,426,385 UART: [art] Signing Cert with AUTHO
3,426,865 UART: RITY.KEYID = 7
3,441,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,750 UART: [art] PUB.X = 53E0DBA28F69C9072CCE126FAE226926E9F17EEBA906C2C216ADB96303D1874357741834C0AE752B88097444C2247BBB
3,449,510 UART: [art] PUB.Y = 42DC9C81435E2B1AF6588D1ED005D9ED1A2F002DDB287470A7F1AE14B75DBFBC2123DE45DB5EEB4131F48A60565BA774
3,456,451 UART: [art] SIG.R = B2AA653EC0ECFA1FA08807DC3C2E85FD0D114B641F1D579A60584072FC8286752A2C6CAA326D679503C368FFEDF3A8DB
3,463,228 UART: [art] SIG.S = 8DCEA8D5CFCB0F9095021E154224D766221D73284D9627A792AD80B6F716AC9B90B91FB41DF7063B94408E5177DC6420
3,487,010 UART: Caliptra RT
3,487,263 UART: [state] CFI Enabled
3,595,673 UART: [rt] RT listening for mailbox commands...
3,596,336 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,063 UART: [rt]cmd =0x46504c54, len=4
3,627,396 >>> mbox cmd response data (8 bytes)
3,627,763 UART: [rt] FIPS self test
3,628,091 UART: [kat] ++
3,628,243 UART: [kat] sha1
3,632,351 UART: [kat] SHA2-256
3,632,925 UART: Fatal Error: 0x90010001
3,634,475 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,480 >>> mbox cmd response: failed
3,634,480 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,485 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,771 UART: [kat] SHA2-256
881,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,817 UART: [kat] ++
885,969 UART: [kat] sha1
890,419 UART: [kat] SHA2-256
892,357 UART: [kat] SHA2-384
895,156 UART: [kat] SHA2-512-ACC
897,057 UART: [kat] ECC-384
902,638 UART: [kat] HMAC-384Kdf
907,414 UART: [kat] LMS
1,475,610 UART: [kat] --
1,476,613 UART: [cold-reset] ++
1,477,131 UART: [fht] Storing FHT @ 0x50003400
1,479,950 UART: [idev] ++
1,480,118 UART: [idev] CDI.KEYID = 6
1,480,478 UART: [idev] SUBJECT.KEYID = 7
1,480,902 UART: [idev] UDS.KEYID = 0
1,481,247 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,924 UART: [idev] Erasing UDS.KEYID = 0
1,506,022 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,816 UART: [idev] --
1,515,841 UART: [ldev] ++
1,516,009 UART: [ldev] CDI.KEYID = 6
1,516,372 UART: [ldev] SUBJECT.KEYID = 5
1,516,798 UART: [ldev] AUTHORITY.KEYID = 7
1,517,261 UART: [ldev] FE.KEYID = 1
1,522,671 UART: [ldev] Erasing FE.KEYID = 1
1,548,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,670 UART: [ldev] --
1,588,081 UART: [fwproc] Waiting for Commands...
1,588,896 UART: [fwproc] Received command 0x46574c44
1,589,687 UART: [fwproc] Received Image of size 115304 bytes
2,899,406 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,494 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,099 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,135 ready_for_fw is high
1,362,135 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,048 >>> mbox cmd response: success
3,002,502 UART:
3,002,518 UART: Running Caliptra FMC ...
3,002,926 UART:
3,002,980 UART: [state] CFI Enabled
3,013,789 UART: [fht] FMC Alias Private Key: 7
3,122,124 UART: [art] Extend RT PCRs Done
3,122,552 UART: [art] Lock RT PCRs Done
3,124,158 UART: [art] Populate DV Done
3,132,365 UART: [fht] FMC Alias Private Key: 7
3,133,409 UART: [art] Derive CDI
3,133,689 UART: [art] Store in in slot 0x4
3,219,418 UART: [art] Derive Key Pair
3,219,778 UART: [art] Store priv key in slot 0x5
3,232,650 UART: [art] Derive Key Pair - Done
3,247,479 UART: [art] Signing Cert with AUTHO
3,247,959 UART: RITY.KEYID = 7
3,262,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,522 UART: [art] PUB.X = A42470A4EA38D3845AD85DDE7D73042F3474CC37B754657D90022013396161E79F0A11CF934C17738403632279EF6E54
3,270,268 UART: [art] PUB.Y = F0F4BA28E3D0D625682D4533D15C285F778009999B93DD7A5C061C62F4E6C3ACA3F933CA1F22387E99D946DB4AD3349F
3,277,218 UART: [art] SIG.R = AB5761C55331536B97FC2F957DBF7504907A4AAB7579B5590334F79D42039427CD19A47706A1D8F548AB283396DC28B3
3,283,970 UART: [art] SIG.S = 00385BB6B2FF886A74835A90801DED56F3DE354BCD54B9BA8A1CA5CFE283BB3C71284131F88FE382E2646A5C96DFD42A
3,307,503 UART: Caliptra RT
3,307,756 UART: [state] CFI Enabled
3,415,963 UART: [rt] RT listening for mailbox commands...
3,416,626 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,185 UART: [rt]cmd =0x46504c54, len=4
3,447,270 >>> mbox cmd response data (8 bytes)
3,447,579 UART: [rt] FIPS self test
3,447,907 UART: [kat] ++
3,448,059 UART: [kat] sha1
3,452,303 UART: [kat] SHA2-256
3,452,811 UART: Fatal Error: 0x90010001
3,454,361 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,454,366 >>> mbox cmd response: failed
3,454,366 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,454,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,183 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,974 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,570 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,126 UART: [kat] SHA2-256
882,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,172 UART: [kat] ++
886,324 UART: [kat] sha1
890,490 UART: [kat] SHA2-256
892,428 UART: [kat] SHA2-384
895,183 UART: [kat] SHA2-512-ACC
897,084 UART: [kat] ECC-384
902,685 UART: [kat] HMAC-384Kdf
907,235 UART: [kat] LMS
1,475,431 UART: [kat] --
1,476,574 UART: [cold-reset] ++
1,477,018 UART: [fht] Storing FHT @ 0x50003400
1,479,765 UART: [idev] ++
1,479,933 UART: [idev] CDI.KEYID = 6
1,480,293 UART: [idev] SUBJECT.KEYID = 7
1,480,717 UART: [idev] UDS.KEYID = 0
1,481,062 ready_for_fw is high
1,481,062 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,957 UART: [idev] Erasing UDS.KEYID = 0
1,505,915 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,631 UART: [idev] --
1,515,748 UART: [ldev] ++
1,515,916 UART: [ldev] CDI.KEYID = 6
1,516,279 UART: [ldev] SUBJECT.KEYID = 5
1,516,705 UART: [ldev] AUTHORITY.KEYID = 7
1,517,168 UART: [ldev] FE.KEYID = 1
1,522,464 UART: [ldev] Erasing FE.KEYID = 1
1,547,603 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,767 UART: [ldev] --
1,587,138 UART: [fwproc] Waiting for Commands...
1,587,931 UART: [fwproc] Received command 0x46574c44
1,588,722 UART: [fwproc] Received Image of size 115304 bytes
2,897,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,845 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,606 >>> mbox cmd response: success
3,092,776 UART: [afmc] ++
3,092,944 UART: [afmc] CDI.KEYID = 6
3,093,306 UART: [afmc] SUBJECT.KEYID = 7
3,093,731 UART: [afmc] AUTHORITY.KEYID = 5
3,129,482 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,736 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,516 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,129 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,819 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,678 UART: [afmc] --
3,172,586 UART: [cold-reset] --
3,173,178 UART: [state] Locking Datavault
3,174,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,829 UART: [state] Locking ICCM
3,175,379 UART: [exit] Launching FMC @ 0x40000130
3,180,708 UART:
3,180,724 UART: Running Caliptra FMC ...
3,181,132 UART:
3,181,275 UART: [state] CFI Enabled
3,191,450 UART: [fht] FMC Alias Private Key: 7
3,300,291 UART: [art] Extend RT PCRs Done
3,300,719 UART: [art] Lock RT PCRs Done
3,302,463 UART: [art] Populate DV Done
3,310,348 UART: [fht] FMC Alias Private Key: 7
3,311,332 UART: [art] Derive CDI
3,311,612 UART: [art] Store in in slot 0x4
3,397,161 UART: [art] Derive Key Pair
3,397,521 UART: [art] Store priv key in slot 0x5
3,411,091 UART: [art] Derive Key Pair - Done
3,425,775 UART: [art] Signing Cert with AUTHO
3,426,255 UART: RITY.KEYID = 7
3,441,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,046 UART: [art] PUB.X = B30EDB51C14AAB43DB60137152D15F0C16AA3FC4EB06769A4EAE68A382618F5CB81F8859861930E218A43E2AC98601E8
3,448,810 UART: [art] PUB.Y = E0F08E61DA622CA8AC5D86EB71BA9AD8AA55BE5FCA51F02D18218C7D05EA772F4CC85CBD7F850AE15C4BE0CCF309FD4F
3,455,783 UART: [art] SIG.R = 4299018351E0FC34CD35BAFAD4F5B79D37F279A270861FEB8DDEC725933EFB6C005F133D1BD1367E424B456F7201828E
3,462,531 UART: [art] SIG.S = 6581C7FF95E70FA63EBDF2506545971D97308C1F5E3E7DA124327EFC9B9A0FC8FCB97B1DA628E39EEF577229B4FE8A81
3,487,008 UART: Caliptra RT
3,487,353 UART: [state] CFI Enabled
3,595,513 UART: [rt] RT listening for mailbox commands...
3,596,176 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,899 UART: [rt]cmd =0x46504c54, len=4
3,626,954 >>> mbox cmd response data (8 bytes)
3,627,229 UART: [rt] FIPS self test
3,627,557 UART: [kat] ++
3,627,709 UART: [kat] sha1
3,631,877 UART: [kat] SHA2-256
3,632,303 UART: Fatal Error: 0x90010001
3,633,853 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,633,858 >>> mbox cmd response: failed
3,633,858 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,633,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,209 UART: [kat] SHA2-512-ACC
897,110 UART: [kat] ECC-384
902,905 UART: [kat] HMAC-384Kdf
907,683 UART: [kat] LMS
1,475,879 UART: [kat] --
1,476,922 UART: [cold-reset] ++
1,477,250 UART: [fht] Storing FHT @ 0x50003400
1,479,961 UART: [idev] ++
1,480,129 UART: [idev] CDI.KEYID = 6
1,480,489 UART: [idev] SUBJECT.KEYID = 7
1,480,913 UART: [idev] UDS.KEYID = 0
1,481,258 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,679 UART: [idev] Erasing UDS.KEYID = 0
1,505,261 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,879 UART: [idev] --
1,514,888 UART: [ldev] ++
1,515,056 UART: [ldev] CDI.KEYID = 6
1,515,419 UART: [ldev] SUBJECT.KEYID = 5
1,515,845 UART: [ldev] AUTHORITY.KEYID = 7
1,516,308 UART: [ldev] FE.KEYID = 1
1,521,602 UART: [ldev] Erasing FE.KEYID = 1
1,546,817 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,991 UART: [ldev] --
1,586,398 UART: [fwproc] Waiting for Commands...
1,587,185 UART: [fwproc] Received command 0x46574c44
1,587,976 UART: [fwproc] Received Image of size 115304 bytes
2,898,061 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,981 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,698 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,216 ready_for_fw is high
1,363,216 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,945,456 >>> mbox cmd response: success
3,006,782 UART:
3,006,798 UART: Running Caliptra FMC ...
3,007,206 UART:
3,007,349 UART: [state] CFI Enabled
3,017,788 UART: [fht] FMC Alias Private Key: 7
3,126,753 UART: [art] Extend RT PCRs Done
3,127,181 UART: [art] Lock RT PCRs Done
3,128,855 UART: [art] Populate DV Done
3,137,380 UART: [fht] FMC Alias Private Key: 7
3,138,520 UART: [art] Derive CDI
3,138,800 UART: [art] Store in in slot 0x4
3,224,327 UART: [art] Derive Key Pair
3,224,687 UART: [art] Store priv key in slot 0x5
3,238,205 UART: [art] Derive Key Pair - Done
3,253,191 UART: [art] Signing Cert with AUTHO
3,253,671 UART: RITY.KEYID = 7
3,269,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,270,014 UART: [art] PUB.X = 8D58A8F83D61851C7E02AE0E0A4B11BA44519CFCE73C77F2A51989B36F08B27323063408B938FEAF71301D1098BF31F9
3,276,768 UART: [art] PUB.Y = 771EE329B349859FC93348B571D71040D4314E90FB0DD8F2618EFBD8667119F796FB07E1981F81B652E0421A26D35E8A
3,283,708 UART: [art] SIG.R = 711A8ADDB97A4798F263AED9AE40D9FF22D6EA88C5DDAD7F3FE7CF285668E15F4E62A83A849841C580424380E6469416
3,290,486 UART: [art] SIG.S = A480E3FF40A9A933E0B0B71BEB85CF734966AC932FD8352F626743B153B20F72F3E98AC4516E6A24934AB23552069894
3,314,463 UART: Caliptra RT
3,314,808 UART: [state] CFI Enabled
3,423,371 UART: [rt] RT listening for mailbox commands...
3,424,034 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,453,895 UART: [rt]cmd =0x46504c54, len=4
3,455,234 >>> mbox cmd response data (8 bytes)
3,455,399 UART: [rt] FIPS self test
3,455,727 UART: [kat] ++
3,455,879 UART: [kat] sha1
3,460,111 UART: [kat] SHA2-256
3,460,515 UART: Fatal Error: 0x90010001
3,462,065 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,462,070 >>> mbox cmd response: failed
3,462,070 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,462,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,520 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,914 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
893,026 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,151 UART: [kat] ++
897,303 UART: [kat] sha1
901,497 UART: [kat] SHA2-256
903,437 UART: [kat] SHA2-384
906,176 UART: [kat] SHA2-512-ACC
908,077 UART: [kat] ECC-384
917,648 UART: [kat] HMAC-384Kdf
922,110 UART: [kat] LMS
1,170,438 UART: [kat] --
1,171,245 UART: [cold-reset] ++
1,171,649 UART: [fht] FHT @ 0x50003400
1,174,232 UART: [idev] ++
1,174,400 UART: [idev] CDI.KEYID = 6
1,174,760 UART: [idev] SUBJECT.KEYID = 7
1,175,184 UART: [idev] UDS.KEYID = 0
1,175,529 ready_for_fw is high
1,175,529 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,655 UART: [idev] Sha1 KeyId Algorithm
1,208,085 UART: [idev] --
1,209,135 UART: [ldev] ++
1,209,303 UART: [ldev] CDI.KEYID = 6
1,209,666 UART: [ldev] SUBJECT.KEYID = 5
1,210,092 UART: [ldev] AUTHORITY.KEYID = 7
1,210,555 UART: [ldev] FE.KEYID = 1
1,215,423 UART: [ldev] Erasing FE.KEYID = 1
1,241,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,563 UART: [ldev] --
1,281,044 UART: [fwproc] Wait for Commands...
1,281,654 UART: [fwproc] Recv command 0x46574c44
1,282,382 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,669 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,906 >>> mbox cmd response: success
2,786,048 UART: [afmc] ++
2,786,216 UART: [afmc] CDI.KEYID = 6
2,786,578 UART: [afmc] SUBJECT.KEYID = 7
2,787,003 UART: [afmc] AUTHORITY.KEYID = 5
2,822,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,133 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,861 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,746 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,465 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,171 UART: [afmc] --
2,866,135 UART: [cold-reset] --
2,866,933 UART: [state] Locking Datavault
2,868,246 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,850 UART: [state] Locking ICCM
2,869,362 UART: [exit] Launching FMC @ 0x40000130
2,874,691 UART:
2,874,707 UART: Running Caliptra FMC ...
2,875,115 UART:
2,875,169 UART: [state] CFI Enabled
2,885,616 UART: [fht] FMC Alias Private Key: 7
2,993,737 UART: [art] Extend RT PCRs Done
2,994,165 UART: [art] Lock RT PCRs Done
2,995,285 UART: [art] Populate DV Done
3,003,200 UART: [fht] FMC Alias Private Key: 7
3,004,248 UART: [art] Derive CDI
3,004,528 UART: [art] Store in in slot 0x4
3,090,125 UART: [art] Derive Key Pair
3,090,485 UART: [art] Store priv key in slot 0x5
3,104,487 UART: [art] Derive Key Pair - Done
3,119,245 UART: [art] Signing Cert with AUTHO
3,119,725 UART: RITY.KEYID = 7
3,134,747 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,512 UART: [art] PUB.X = B86C58DF70038D415CE0538472D8871559BB1D415A825786AE75F9336287A2BD74ED047019ABF78C3DC5900F59A367A4
3,142,269 UART: [art] PUB.Y = EEB50E82A79C10F7047B078388B0DAFE1B404EA70BB19613EFBDDA833E4F258A1A45FBF164DF7EBD33EBD4925591B8C7
3,149,227 UART: [art] SIG.R = BBCAD783322B956C3C4FA754CB7AD393E58F6855801BD8FDC4E2ED044F7E26D93E3A8E719666490FB085E3ED4DCB1F02
3,156,004 UART: [art] SIG.S = B76D492DF61C84FE56F0731FCA4667071DCE4A642927C41C124343B9F7F0E7F4414FC402BEB3FA5C2B8E8FCA4150B529
3,179,579 UART: Caliptra RT
3,179,832 UART: [state] CFI Enabled
3,287,296 UART: [rt] RT listening for mailbox commands...
3,287,959 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,708 UART: [rt]cmd =0x46504c54, len=4
3,318,967 >>> mbox cmd response data (8 bytes)
3,319,222 UART: [rt] FIPS self test
3,319,550 UART: [kat] ++
3,319,702 UART: [kat] sha1
3,323,982 UART: [kat] SHA2-256
3,324,462 UART: Fatal Error: 0x90010001
3,326,012 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,017 >>> mbox cmd response: failed
3,326,017 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,644 UART: [state] LifecycleState = Unprovisioned
86,299 UART: [state] DebugLocked = No
86,789 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
893,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,801 UART: [kat] ++
897,953 UART: [kat] sha1
902,293 UART: [kat] SHA2-256
904,233 UART: [kat] SHA2-384
906,916 UART: [kat] SHA2-512-ACC
908,817 UART: [kat] ECC-384
918,430 UART: [kat] HMAC-384Kdf
923,058 UART: [kat] LMS
1,171,386 UART: [kat] --
1,172,365 UART: [cold-reset] ++
1,172,929 UART: [fht] FHT @ 0x50003400
1,175,708 UART: [idev] ++
1,175,876 UART: [idev] CDI.KEYID = 6
1,176,236 UART: [idev] SUBJECT.KEYID = 7
1,176,660 UART: [idev] UDS.KEYID = 0
1,177,005 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,620 UART: [idev] Erasing UDS.KEYID = 0
1,201,789 UART: [idev] Sha1 KeyId Algorithm
1,210,255 UART: [idev] --
1,211,245 UART: [ldev] ++
1,211,413 UART: [ldev] CDI.KEYID = 6
1,211,776 UART: [ldev] SUBJECT.KEYID = 5
1,212,202 UART: [ldev] AUTHORITY.KEYID = 7
1,212,665 UART: [ldev] FE.KEYID = 1
1,218,019 UART: [ldev] Erasing FE.KEYID = 1
1,243,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,775 UART: [ldev] --
1,283,092 UART: [fwproc] Wait for Commands...
1,283,688 UART: [fwproc] Recv command 0x46574c44
1,284,416 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,179 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,364 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,673 ready_for_fw is high
1,060,673 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,271 >>> mbox cmd response: success
2,700,463 UART:
2,700,479 UART: Running Caliptra FMC ...
2,700,887 UART:
2,700,941 UART: [state] CFI Enabled
2,711,234 UART: [fht] FMC Alias Private Key: 7
2,819,671 UART: [art] Extend RT PCRs Done
2,820,099 UART: [art] Lock RT PCRs Done
2,821,421 UART: [art] Populate DV Done
2,829,542 UART: [fht] FMC Alias Private Key: 7
2,830,646 UART: [art] Derive CDI
2,830,926 UART: [art] Store in in slot 0x4
2,916,707 UART: [art] Derive Key Pair
2,917,067 UART: [art] Store priv key in slot 0x5
2,929,933 UART: [art] Derive Key Pair - Done
2,945,119 UART: [art] Signing Cert with AUTHO
2,945,599 UART: RITY.KEYID = 7
2,960,543 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,308 UART: [art] PUB.X = C816F95E2EEC0A6C61B0E6B195F7ADFA29503A624E0C1EDEF7AAEB5D9896A03B5E2451C11E742CA57A2744E8026654C6
2,968,083 UART: [art] PUB.Y = ED65DFE9AC9CBC48AD4585FC30DEB3A300AE400261251A22743A1578FFC1F581897FA861BDB9561880124FC67CB389F1
2,975,018 UART: [art] SIG.R = 4034A5D9933E65997ABA234C1B45E81DE5D9ADFEF2C8FE1098B7C1E40884386C04665ABBF076AAA9FA079CBEDDFF5A95
2,981,799 UART: [art] SIG.S = E19EF5709CF914594E502A6EB109791954D547D289E347AAD4802731EA769D1460F194148FC1BAB178A11512FAA1FDD1
3,005,825 UART: Caliptra RT
3,006,078 UART: [state] CFI Enabled
3,115,641 UART: [rt] RT listening for mailbox commands...
3,116,304 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,099 UART: [rt]cmd =0x46504c54, len=4
3,147,264 >>> mbox cmd response data (8 bytes)
3,147,531 UART: [rt] FIPS self test
3,147,859 UART: [kat] ++
3,148,011 UART: [kat] sha1
3,152,331 UART: [kat] SHA2-256
3,152,809 UART: Fatal Error: 0x90010001
3,154,359 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,364 >>> mbox cmd response: failed
3,154,364 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,369 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,157 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,191 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,306 UART: [kat] SHA2-256
904,246 UART: [kat] SHA2-384
907,031 UART: [kat] SHA2-512-ACC
908,932 UART: [kat] ECC-384
918,735 UART: [kat] HMAC-384Kdf
923,215 UART: [kat] LMS
1,171,543 UART: [kat] --
1,172,342 UART: [cold-reset] ++
1,172,842 UART: [fht] FHT @ 0x50003400
1,175,447 UART: [idev] ++
1,175,615 UART: [idev] CDI.KEYID = 6
1,175,975 UART: [idev] SUBJECT.KEYID = 7
1,176,399 UART: [idev] UDS.KEYID = 0
1,176,744 ready_for_fw is high
1,176,744 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,803 UART: [idev] Erasing UDS.KEYID = 0
1,202,114 UART: [idev] Sha1 KeyId Algorithm
1,210,520 UART: [idev] --
1,211,600 UART: [ldev] ++
1,211,768 UART: [ldev] CDI.KEYID = 6
1,212,131 UART: [ldev] SUBJECT.KEYID = 5
1,212,557 UART: [ldev] AUTHORITY.KEYID = 7
1,213,020 UART: [ldev] FE.KEYID = 1
1,218,714 UART: [ldev] Erasing FE.KEYID = 1
1,245,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,402 UART: [ldev] --
1,284,833 UART: [fwproc] Wait for Commands...
1,285,631 UART: [fwproc] Recv command 0x46574c44
1,286,359 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,110 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,423 >>> mbox cmd response: success
2,790,647 UART: [afmc] ++
2,790,815 UART: [afmc] CDI.KEYID = 6
2,791,177 UART: [afmc] SUBJECT.KEYID = 7
2,791,602 UART: [afmc] AUTHORITY.KEYID = 5
2,826,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,894 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,622 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,507 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,226 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,954 UART: [afmc] --
2,869,876 UART: [cold-reset] --
2,870,764 UART: [state] Locking Datavault
2,872,117 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,721 UART: [state] Locking ICCM
2,873,371 UART: [exit] Launching FMC @ 0x40000130
2,878,700 UART:
2,878,716 UART: Running Caliptra FMC ...
2,879,124 UART:
2,879,267 UART: [state] CFI Enabled
2,889,594 UART: [fht] FMC Alias Private Key: 7
2,997,115 UART: [art] Extend RT PCRs Done
2,997,543 UART: [art] Lock RT PCRs Done
2,999,255 UART: [art] Populate DV Done
3,007,580 UART: [fht] FMC Alias Private Key: 7
3,008,536 UART: [art] Derive CDI
3,008,816 UART: [art] Store in in slot 0x4
3,094,437 UART: [art] Derive Key Pair
3,094,797 UART: [art] Store priv key in slot 0x5
3,107,391 UART: [art] Derive Key Pair - Done
3,122,008 UART: [art] Signing Cert with AUTHO
3,122,488 UART: RITY.KEYID = 7
3,137,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,191 UART: [art] PUB.X = 6729AA1C5CF8CF68370603E25C0D6D0A04DFA6E7615FE893D061E0C8EE9B6B3B85FCB57F9D6D63D3554EDA69A755C434
3,144,960 UART: [art] PUB.Y = 10AE31F8517A077DB33ABAE1B233B93F9A1E773AA8F230897E65470A2BAADE8CB58CC05C252BBB1141E936AC7D641130
3,151,916 UART: [art] SIG.R = D54BC722BCB2AE92F74EA72CDDEEE175B7460064A83FDF79F8DCD918B4B650FEB15F8C27321DA455944E5FACBE06A967
3,158,683 UART: [art] SIG.S = A1CE68096FCD520150C1800A621A33AF79804B5F593CFAE4B981BBB6B04BFEA7EBE073863FBF1EA906584B686C167FD5
3,181,998 UART: Caliptra RT
3,182,343 UART: [state] CFI Enabled
3,289,977 UART: [rt] RT listening for mailbox commands...
3,290,640 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,531 UART: [rt]cmd =0x46504c54, len=4
3,321,634 >>> mbox cmd response data (8 bytes)
3,321,983 UART: [rt] FIPS self test
3,322,311 UART: [kat] ++
3,322,463 UART: [kat] sha1
3,326,715 UART: [kat] SHA2-256
3,327,277 UART: Fatal Error: 0x90010001
3,328,827 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,832 >>> mbox cmd response: failed
3,328,832 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,837 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
893,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,848 UART: [kat] ++
898,000 UART: [kat] sha1
902,182 UART: [kat] SHA2-256
904,122 UART: [kat] SHA2-384
906,723 UART: [kat] SHA2-512-ACC
908,624 UART: [kat] ECC-384
918,255 UART: [kat] HMAC-384Kdf
922,865 UART: [kat] LMS
1,171,193 UART: [kat] --
1,172,164 UART: [cold-reset] ++
1,172,626 UART: [fht] FHT @ 0x50003400
1,175,123 UART: [idev] ++
1,175,291 UART: [idev] CDI.KEYID = 6
1,175,651 UART: [idev] SUBJECT.KEYID = 7
1,176,075 UART: [idev] UDS.KEYID = 0
1,176,420 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,111 UART: [idev] Erasing UDS.KEYID = 0
1,201,528 UART: [idev] Sha1 KeyId Algorithm
1,209,842 UART: [idev] --
1,210,760 UART: [ldev] ++
1,210,928 UART: [ldev] CDI.KEYID = 6
1,211,291 UART: [ldev] SUBJECT.KEYID = 5
1,211,717 UART: [ldev] AUTHORITY.KEYID = 7
1,212,180 UART: [ldev] FE.KEYID = 1
1,217,350 UART: [ldev] Erasing FE.KEYID = 1
1,244,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,796 UART: [ldev] --
1,283,199 UART: [fwproc] Wait for Commands...
1,283,795 UART: [fwproc] Recv command 0x46574c44
1,284,523 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,228 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,619 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,058 ready_for_fw is high
1,060,058 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,264 >>> mbox cmd response: success
2,699,290 UART:
2,699,306 UART: Running Caliptra FMC ...
2,699,714 UART:
2,699,857 UART: [state] CFI Enabled
2,710,456 UART: [fht] FMC Alias Private Key: 7
2,818,023 UART: [art] Extend RT PCRs Done
2,818,451 UART: [art] Lock RT PCRs Done
2,820,005 UART: [art] Populate DV Done
2,828,406 UART: [fht] FMC Alias Private Key: 7
2,829,384 UART: [art] Derive CDI
2,829,664 UART: [art] Store in in slot 0x4
2,915,675 UART: [art] Derive Key Pair
2,916,035 UART: [art] Store priv key in slot 0x5
2,929,443 UART: [art] Derive Key Pair - Done
2,944,193 UART: [art] Signing Cert with AUTHO
2,944,673 UART: RITY.KEYID = 7
2,960,411 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,176 UART: [art] PUB.X = B1F6E7A93392EFED377BEF8616F641655E5CEAD91A061984897F6F3310109BE2D83555388F37BC4B0C3A43816F393FA0
2,967,942 UART: [art] PUB.Y = 1F69F42C52EF51229F632D65EA220425D244E372AA1724BE9913EA652054778FA444FDE56F511343D333EB2549D5DCB0
2,974,887 UART: [art] SIG.R = A7E7A2FD7C6A0BABBF95267AA39B38A1CFAB1071EB8BF2EDEAB2D95DB631118DCA73446CAF0734D4A451CC94B20E05A2
2,981,673 UART: [art] SIG.S = 0F4F1F31D1851CBD57768E92D3AB33A42EA44B3C885C3EB94104BB497D46426C38CA82115A0A091E43023BB6D560E2E7
3,005,381 UART: Caliptra RT
3,005,726 UART: [state] CFI Enabled
3,113,079 UART: [rt] RT listening for mailbox commands...
3,113,742 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,493 UART: [rt]cmd =0x46504c54, len=4
3,144,706 >>> mbox cmd response data (8 bytes)
3,145,031 UART: [rt] FIPS self test
3,145,359 UART: [kat] ++
3,145,511 UART: [kat] sha1
3,149,629 UART: [kat] SHA2-256
3,150,111 UART: Fatal Error: 0x90010001
3,151,661 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,151,666 >>> mbox cmd response: failed
3,151,666 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,151,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,964 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
916,424 UART: [kat] HMAC-384Kdf
921,076 UART: [kat] LMS
1,169,388 UART: [kat] --
1,170,387 UART: [cold-reset] ++
1,170,931 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,174,771 ready_for_fw is high
1,174,771 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,289 UART: [idev] Erasing UDS.KEYID = 0
1,198,911 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] --
1,208,772 UART: [ldev] ++
1,208,940 UART: [ldev] CDI.KEYID = 6
1,209,304 UART: [ldev] SUBJECT.KEYID = 5
1,209,731 UART: [ldev] AUTHORITY.KEYID = 7
1,210,194 UART: [ldev] FE.KEYID = 1
1,215,544 UART: [ldev] Erasing FE.KEYID = 1
1,242,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,696 UART: [ldev] --
1,281,164 UART: [fwproc] Wait for Commands...
1,281,963 UART: [fwproc] Recv command 0x46574c44
1,282,696 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,301 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,610 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,856 >>> mbox cmd response: success
2,786,887 UART: [afmc] ++
2,787,055 UART: [afmc] CDI.KEYID = 6
2,787,418 UART: [afmc] SUBJECT.KEYID = 7
2,787,844 UART: [afmc] AUTHORITY.KEYID = 5
2,823,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,133 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,016 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,735 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,562 UART: [afmc] --
2,866,552 UART: [cold-reset] --
2,867,312 UART: [state] Locking Datavault
2,868,609 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,213 UART: [state] Locking ICCM
2,869,685 UART: [exit] Launching FMC @ 0x40000130
2,875,014 UART:
2,875,030 UART: Running Caliptra FMC ...
2,875,438 UART:
2,875,492 UART: [state] CFI Enabled
2,886,029 UART: [fht] FMC Alias Private Key: 7
2,994,458 UART: [art] Extend RT PCRs Done
2,994,886 UART: [art] Lock RT PCRs Done
2,996,202 UART: [art] Populate DV Done
3,004,099 UART: [fht] FMC Alias Private Key: 7
3,005,137 UART: [art] Derive CDI
3,005,417 UART: [art] Store in in slot 0x4
3,091,092 UART: [art] Derive Key Pair
3,091,452 UART: [art] Store priv key in slot 0x5
3,104,348 UART: [art] Derive Key Pair - Done
3,118,973 UART: [art] Signing Cert with AUTHO
3,119,453 UART: RITY.KEYID = 7
3,134,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,422 UART: [art] PUB.X = FF80F038B736380D6E9FD00212E79FF2C930B8239D1E8A46C3E2AE361A8A03E351A6B244C8751FC28B1BC4D7C83FDCDF
3,142,197 UART: [art] PUB.Y = 8660CFCC02C76E3263C4BDD933C5DC403DDE23CC23391126DDB788B0E3420679B5CD0A2D5F80D9A67558D2859CDDBD1E
3,149,152 UART: [art] SIG.R = 92EF292011F591DD2515CF59146CB959587021E325CBA436F079A042139A6B682D5F5F5C8BE7F762490C904FC99C9944
3,155,913 UART: [art] SIG.S = 9E34E65BAA774E6906C0CCA203829B7B1E40A7023AEB8B70670EBA2B3969C2655529EEF74F49ECAB851B55F0D86C2C93
3,179,842 UART: Caliptra RT
3,180,095 UART: [state] CFI Enabled
3,287,633 UART: [rt] RT listening for mailbox commands...
3,288,296 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,259 UART: [rt]cmd =0x46504c54, len=4
3,319,400 >>> mbox cmd response data (8 bytes)
3,319,661 UART: [rt] FIPS self test
3,319,989 UART: [kat] ++
3,320,141 UART: [kat] sha1
3,324,371 UART: [kat] SHA2-256
3,324,945 UART: Fatal Error: 0x90010001
3,326,495 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,500 >>> mbox cmd response: failed
3,326,500 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,290 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,169,869 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,172,835 UART: [idev] ++
1,173,003 UART: [idev] CDI.KEYID = 6
1,173,364 UART: [idev] SUBJECT.KEYID = 7
1,173,789 UART: [idev] UDS.KEYID = 0
1,174,135 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,583 UART: [idev] Erasing UDS.KEYID = 0
1,198,165 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,208,028 UART: [ldev] ++
1,208,196 UART: [ldev] CDI.KEYID = 6
1,208,560 UART: [ldev] SUBJECT.KEYID = 5
1,208,987 UART: [ldev] AUTHORITY.KEYID = 7
1,209,450 UART: [ldev] FE.KEYID = 1
1,214,338 UART: [ldev] Erasing FE.KEYID = 1
1,240,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,594 UART: [ldev] --
1,280,030 UART: [fwproc] Wait for Commands...
1,280,823 UART: [fwproc] Recv command 0x46574c44
1,281,556 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,888 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,116 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,372 ready_for_fw is high
1,055,372 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,366 >>> mbox cmd response: success
2,696,722 UART:
2,696,738 UART: Running Caliptra FMC ...
2,697,146 UART:
2,697,200 UART: [state] CFI Enabled
2,707,359 UART: [fht] FMC Alias Private Key: 7
2,814,882 UART: [art] Extend RT PCRs Done
2,815,310 UART: [art] Lock RT PCRs Done
2,816,894 UART: [art] Populate DV Done
2,825,295 UART: [fht] FMC Alias Private Key: 7
2,826,387 UART: [art] Derive CDI
2,826,667 UART: [art] Store in in slot 0x4
2,912,284 UART: [art] Derive Key Pair
2,912,644 UART: [art] Store priv key in slot 0x5
2,925,922 UART: [art] Derive Key Pair - Done
2,940,793 UART: [art] Signing Cert with AUTHO
2,941,273 UART: RITY.KEYID = 7
2,956,595 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,360 UART: [art] PUB.X = CD5908048F09A559BF1F5ABBCEF400DD2A0427B1B82B32B1CC661E257FB09CE81EE60CCFC0B1E335C88E0B03306476BC
2,964,105 UART: [art] PUB.Y = C3E7D2306DA0958D13C63CAF8CB3436580D276B88F90057C8B093E22DC9C056D2CF6115C44FCBCE42DAEB51C26B15354
2,971,056 UART: [art] SIG.R = B389359BCBE3B4A55E31B2C70B138F24C56267BBA625ED0DA98060EF2A7FE8D86FE2C8EAE4186E7B93C90CAAE0F67506
2,977,832 UART: [art] SIG.S = 157363432B2263BCB3EAC3050983709A0F69B3281B9EC4E872A2D567AC0CA3535B98267D47934B4CD1759F5DC9639E97
3,002,059 UART: Caliptra RT
3,002,312 UART: [state] CFI Enabled
3,110,127 UART: [rt] RT listening for mailbox commands...
3,110,790 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,663 UART: [rt]cmd =0x46504c54, len=4
3,141,882 >>> mbox cmd response data (8 bytes)
3,142,235 UART: [rt] FIPS self test
3,142,563 UART: [kat] ++
3,142,715 UART: [kat] sha1
3,146,999 UART: [kat] SHA2-256
3,147,477 UART: Fatal Error: 0x90010001
3,149,027 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,149,032 >>> mbox cmd response: failed
3,149,032 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,149,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,494 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,616 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,297 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,380 UART: [fht] FHT @ 0x50003400
1,173,052 UART: [idev] ++
1,173,220 UART: [idev] CDI.KEYID = 6
1,173,581 UART: [idev] SUBJECT.KEYID = 7
1,174,006 UART: [idev] UDS.KEYID = 0
1,174,352 ready_for_fw is high
1,174,352 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,232 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,427 UART: [ldev] ++
1,209,595 UART: [ldev] CDI.KEYID = 6
1,209,959 UART: [ldev] SUBJECT.KEYID = 5
1,210,386 UART: [ldev] AUTHORITY.KEYID = 7
1,210,849 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,241,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,181 UART: [ldev] --
1,281,591 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,622 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,931 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,279 >>> mbox cmd response: success
2,787,396 UART: [afmc] ++
2,787,564 UART: [afmc] CDI.KEYID = 6
2,787,927 UART: [afmc] SUBJECT.KEYID = 7
2,788,353 UART: [afmc] AUTHORITY.KEYID = 5
2,824,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,999 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,718 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,529 UART: [afmc] --
2,867,463 UART: [cold-reset] --
2,868,427 UART: [state] Locking Datavault
2,869,378 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,982 UART: [state] Locking ICCM
2,870,546 UART: [exit] Launching FMC @ 0x40000130
2,875,875 UART:
2,875,891 UART: Running Caliptra FMC ...
2,876,299 UART:
2,876,442 UART: [state] CFI Enabled
2,887,145 UART: [fht] FMC Alias Private Key: 7
2,995,082 UART: [art] Extend RT PCRs Done
2,995,510 UART: [art] Lock RT PCRs Done
2,997,210 UART: [art] Populate DV Done
3,005,149 UART: [fht] FMC Alias Private Key: 7
3,006,289 UART: [art] Derive CDI
3,006,569 UART: [art] Store in in slot 0x4
3,092,186 UART: [art] Derive Key Pair
3,092,546 UART: [art] Store priv key in slot 0x5
3,105,464 UART: [art] Derive Key Pair - Done
3,120,078 UART: [art] Signing Cert with AUTHO
3,120,558 UART: RITY.KEYID = 7
3,135,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,427 UART: [art] PUB.X = 99A368425DC9268E2AE7A44A3D83B18856B278FADEBBAC27E8CB6DB7DDA2E715023FA51916CB02DCD8EE96817E7E063B
3,143,206 UART: [art] PUB.Y = F19A440353E7D2FC6748D3D21C499CEB26946B194D97F6A4210120A7541E0F1732346C6A3AC01FEF691BCFB4E6D3FD47
3,150,153 UART: [art] SIG.R = 9131EC58A38577C0F4E847B09C4C2ECC97B69AD21E3C9CC83AF6891E2F21D704146F40E0646DA9D327BB0DFFDCD650E7
3,156,931 UART: [art] SIG.S = CBB3FB6236BA4671C4F01F9DB79286CD323298FFDAAC3B9666B049B642CAA44A947E52E42898A45B52F1BD8180596485
3,180,228 UART: Caliptra RT
3,180,573 UART: [state] CFI Enabled
3,288,879 UART: [rt] RT listening for mailbox commands...
3,289,542 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,383 UART: [rt]cmd =0x46504c54, len=4
3,320,602 >>> mbox cmd response data (8 bytes)
3,320,859 UART: [rt] FIPS self test
3,321,187 UART: [kat] ++
3,321,339 UART: [kat] sha1
3,325,661 UART: [kat] SHA2-256
3,326,209 UART: Fatal Error: 0x90010001
3,327,759 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,327,764 >>> mbox cmd response: failed
3,327,764 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,327,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,890 UART: [kat] ++
896,042 UART: [kat] sha1
900,390 UART: [kat] SHA2-256
902,330 UART: [kat] SHA2-384
905,157 UART: [kat] SHA2-512-ACC
907,058 UART: [kat] ECC-384
916,453 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,174,648 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,199,258 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,223 UART: [ldev] ++
1,209,391 UART: [ldev] CDI.KEYID = 6
1,209,755 UART: [ldev] SUBJECT.KEYID = 5
1,210,182 UART: [ldev] AUTHORITY.KEYID = 7
1,210,645 UART: [ldev] FE.KEYID = 1
1,215,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,547 UART: [ldev] --
1,281,829 UART: [fwproc] Wait for Commands...
1,282,524 UART: [fwproc] Recv command 0x46574c44
1,283,257 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,091 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,267 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,039 ready_for_fw is high
1,057,039 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,761 >>> mbox cmd response: success
2,699,597 UART:
2,699,613 UART: Running Caliptra FMC ...
2,700,021 UART:
2,700,164 UART: [state] CFI Enabled
2,710,527 UART: [fht] FMC Alias Private Key: 7
2,818,888 UART: [art] Extend RT PCRs Done
2,819,316 UART: [art] Lock RT PCRs Done
2,821,068 UART: [art] Populate DV Done
2,829,293 UART: [fht] FMC Alias Private Key: 7
2,830,453 UART: [art] Derive CDI
2,830,733 UART: [art] Store in in slot 0x4
2,916,602 UART: [art] Derive Key Pair
2,916,962 UART: [art] Store priv key in slot 0x5
2,930,440 UART: [art] Derive Key Pair - Done
2,945,348 UART: [art] Signing Cert with AUTHO
2,945,828 UART: RITY.KEYID = 7
2,961,030 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,795 UART: [art] PUB.X = 6990AE32335D5A79C568F5FBAB420400212B4B4FC5B32D0D0575FB10A4A5D7B96C7D54F55A9AE6F65A5D4B48A29EAE4C
2,968,548 UART: [art] PUB.Y = 1EF469076D1130B12C42A60C48AA595B32EF281D2C511A131BD7D0DEFEAFD5A139A87B211D5E05F6AFFC264478F9D903
2,975,498 UART: [art] SIG.R = 855F36DB58C2ACA783A5B0CB9A7E69B4C6401C07FD8DADEADC084AC464CEFBBE80CE85C8EE20FF6956AF7B945E50C833
2,982,290 UART: [art] SIG.S = 9E9B81B85455EE6FB8E42C9C8737996D82D6E5659110358FC49DE6424F7229729260FC965CA9EC6E16F17DE1DB441371
3,006,027 UART: Caliptra RT
3,006,372 UART: [state] CFI Enabled
3,114,114 UART: [rt] RT listening for mailbox commands...
3,114,777 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,838 UART: [rt]cmd =0x46504c54, len=4
3,145,983 >>> mbox cmd response data (8 bytes)
3,146,106 UART: [rt] FIPS self test
3,146,434 UART: [kat] ++
3,146,586 UART: [kat] sha1
3,150,704 UART: [kat] SHA2-256
3,151,086 UART: Fatal Error: 0x90010001
3,152,636 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,641 >>> mbox cmd response: failed
3,152,641 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,029 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,261 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
2,519,680 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,663,866 >>> mbox cmd response: failed
2,664,433 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,807,746 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
4,861,746 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,422,750 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
2,512,842 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,657,083 >>> mbox cmd response: failed
2,657,659 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,800,972 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,872,354 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,453,506 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,867,940 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,012,162 >>> mbox cmd response: failed
3,012,731 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,156,153 >>> mbox cmd response: failed
Initializing fuses
988 writing to cptra_bootfsm_go
21,586,026 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,024,744 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,863,637 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,007,826 >>> mbox cmd response: failed
3,008,390 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,151,574 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
21,580,558 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,027,740 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
2,520,341 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,665,010 >>> mbox cmd response: failed
2,665,570 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,809,649 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,440,961 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,908 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
2,516,630 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,661,224 >>> mbox cmd response: failed
2,661,777 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,805,342 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,476,509 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,289,122 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
2,875,587 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,020,051 >>> mbox cmd response: failed
3,020,631 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,164,384 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,191,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,926,425 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
2,876,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,020,994 >>> mbox cmd response: failed
3,021,563 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,165,238 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
20,174,523 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,902,419 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,515,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,660,155 >>> mbox cmd response: failed
2,660,712 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,804,971 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,473,168 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,280,839 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,871,678 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,017,047 >>> mbox cmd response: failed
3,017,652 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,161,392 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
20,183,256 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,919,643 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,108 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,116 >>> mbox cmd response: failed
87,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,315 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,188 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,466 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,474 >>> mbox cmd response: failed
87,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,480 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,420 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,531 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,539 >>> mbox cmd response: failed
87,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,312 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,571 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,685 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,693 >>> mbox cmd response: failed
87,693 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,698 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,031 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,612 >>> mbox cmd response: failed
87,612 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,809 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,102 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,298 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,306 >>> mbox cmd response: failed
87,306 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,770 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,253 >>> mbox cmd response: failed
87,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,259 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,392 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,567 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,827 >>> mbox cmd response: failed
87,827 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,302 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,937 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,366 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,374 >>> mbox cmd response: failed
87,374 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,364 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,622 >>> mbox cmd response: failed
87,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,313 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,510 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,771 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,779 >>> mbox cmd response: failed
87,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,334 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,017 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,869 >>> mbox cmd response: failed
87,869 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
87,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,164 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,315 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,322 UART:
192,686 UART: Running Caliptra ROM ...
193,877 UART:
194,026 UART: [state] CFI Enabled
262,696 UART: [state] LifecycleState = Unprovisioned
264,691 UART: [state] DebugLocked = No
266,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,097 UART: [kat] SHA2-256
441,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,306 UART: [kat] ++
452,754 UART: [kat] sha1
463,131 UART: [kat] SHA2-256
465,846 UART: [kat] SHA2-384
471,293 UART: [kat] SHA2-512-ACC
473,663 UART: [kat] ECC-384
2,768,423 UART: [kat] HMAC-384Kdf
2,798,368 UART: [kat] LMS
3,988,638 UART: [kat] --
3,992,792 UART: [cold-reset] ++
3,995,015 UART: [fht] Storing FHT @ 0x50003400
4,007,493 UART: [idev] ++
4,008,068 UART: [idev] CDI.KEYID = 6
4,009,039 UART: [idev] SUBJECT.KEYID = 7
4,010,294 UART: [idev] UDS.KEYID = 0
4,011,238 ready_for_fw is high
4,011,441 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,156,106 UART: [idev] Erasing UDS.KEYID = 0
7,344,537 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,340 UART: [idev] --
7,369,396 UART: [ldev] ++
7,369,970 UART: [ldev] CDI.KEYID = 6
7,370,936 UART: [ldev] SUBJECT.KEYID = 5
7,372,154 UART: [ldev] AUTHORITY.KEYID = 7
7,373,447 UART: [ldev] FE.KEYID = 1
7,398,945 UART: [ldev] Erasing FE.KEYID = 1
10,733,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,179 UART: [ldev] --
13,110,487 UART: [fwproc] Waiting for Commands...
13,113,039 UART: [fwproc] Received command 0x46574c44
13,115,232 UART: [fwproc] Received Image of size 114996 bytes
17,179,346 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,646 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,510 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,649,622 >>> mbox cmd response: success
17,654,536 UART: [afmc] ++
17,655,126 UART: [afmc] CDI.KEYID = 6
17,656,036 UART: [afmc] SUBJECT.KEYID = 7
17,657,306 UART: [afmc] AUTHORITY.KEYID = 5
21,024,558 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,742 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,188 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,006 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,465 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,391,561 UART: [afmc] --
23,394,886 UART: [cold-reset] --
23,396,477 UART: [state] Locking Datavault
23,400,647 UART: [state] Locking PCR0, PCR1 and PCR31
23,402,400 UART: [state] Locking ICCM
23,403,684 UART: [exit] Launching FMC @ 0x40000130
23,412,075 UART:
23,412,314 UART: Running Caliptra FMC ...
23,413,417 UART:
23,413,586 UART: [state] CFI Enabled
23,484,880 UART: [fht] FMC Alias Private Key: 7
25,822,331 UART: [art] Extend RT PCRs Done
25,823,559 UART: [art] Lock RT PCRs Done
25,825,299 UART: [art] Populate DV Done
25,830,695 UART: [fht] FMC Alias Private Key: 7
25,832,294 UART: [art] Derive CDI
25,833,113 UART: [art] Store in in slot 0x4
25,893,829 UART: [art] Derive Key Pair
25,894,831 UART: [art] Store priv key in slot 0x5
29,187,368 UART: [art] Derive Key Pair - Done
29,200,576 UART: [art] Signing Cert with AUTHO
29,201,883 UART: RITY.KEYID = 7
31,489,097 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,611 UART: [art] PUB.X = 0D5779F7772A94EA4C69DDF38247982A4CB9BD42F7DD384DFD9E462070605F68344C3FC54E5144FB2DAAB6035841E774
31,497,815 UART: [art] PUB.Y = 9949A7814FE4FDE0D1130AB1D766DD9BBFE699131ACAAF2674925987850CC619A16DD583B1A118533BB68AA4E43438F2
31,505,096 UART: [art] SIG.R = 84B3F54BAA04C4319123B52D5306E156C364CB747FF6C1C789E6545B13F333B95DBD4A85873C20E8C1174A9B6045F0CC
31,512,461 UART: [art] SIG.S = AAE77D5B702FAF945B3A5DF442F04B7B3905B29A4634258EB40BB67D9216FAA32F331BEE02B6486894A1E4A2CFC287E3
32,817,899 UART: Caliptra RT
32,818,613 UART: [state] CFI Enabled
32,999,305 UART: [rt] RT listening for mailbox commands...
33,001,181 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,031,091 UART: [rt]cmd =0x46504c54, len=4
33,032,655 >>> mbox cmd response data (8 bytes)
33,033,514 UART: [rt] FIPS self test
33,034,463 UART: [kat] ++
33,034,916 UART: [kat] sha1
33,039,349 UART: [kat] SHA2-256
33,041,011 UART: Fatal Error: 0x90010002
33,076,229 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,220,651 >>> mbox cmd response: failed
33,221,315 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,365,726 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,121 UART:
190,417 UART: Running Caliptra ROM ...
191,462 UART:
191,602 UART: [state] CFI Enabled
253,929 UART: [state] LifecycleState = Unprovisioned
255,906 UART: [state] DebugLocked = No
257,797 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,329 UART: [kat] SHA2-256
433,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,524 UART: [kat] ++
444,025 UART: [kat] sha1
454,852 UART: [kat] SHA2-256
457,534 UART: [kat] SHA2-384
464,791 UART: [kat] SHA2-512-ACC
467,143 UART: [kat] ECC-384
2,759,206 UART: [kat] HMAC-384Kdf
2,789,853 UART: [kat] LMS
3,980,179 UART: [kat] --
3,985,027 UART: [cold-reset] ++
3,987,248 UART: [fht] Storing FHT @ 0x50003400
3,999,055 UART: [idev] ++
3,999,625 UART: [idev] CDI.KEYID = 6
4,000,641 UART: [idev] SUBJECT.KEYID = 7
4,001,809 UART: [idev] UDS.KEYID = 0
4,003,441 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,148,208 UART: [idev] Erasing UDS.KEYID = 0
7,337,736 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,465 UART: [idev] --
7,364,020 UART: [ldev] ++
7,364,605 UART: [ldev] CDI.KEYID = 6
7,365,492 UART: [ldev] SUBJECT.KEYID = 5
7,366,800 UART: [ldev] AUTHORITY.KEYID = 7
7,367,907 UART: [ldev] FE.KEYID = 1
7,411,599 UART: [ldev] Erasing FE.KEYID = 1
10,741,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,035,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,049,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,064,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,079,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,098,073 UART: [ldev] --
13,102,679 UART: [fwproc] Waiting for Commands...
13,105,708 UART: [fwproc] Received command 0x46574c44
13,107,906 UART: [fwproc] Received Image of size 114996 bytes
17,175,098 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,023 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,896 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,639,550 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,805,332 ready_for_fw is high
3,805,828 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,880,371 >>> mbox cmd response: success
23,581,100 UART:
23,581,536 UART: Running Caliptra FMC ...
23,582,652 UART:
23,582,822 UART: [state] CFI Enabled
23,649,467 UART: [fht] FMC Alias Private Key: 7
25,987,618 UART: [art] Extend RT PCRs Done
25,988,847 UART: [art] Lock RT PCRs Done
25,990,749 UART: [art] Populate DV Done
25,996,285 UART: [fht] FMC Alias Private Key: 7
25,997,830 UART: [art] Derive CDI
25,998,645 UART: [art] Store in in slot 0x4
26,058,288 UART: [art] Derive Key Pair
26,059,329 UART: [art] Store priv key in slot 0x5
29,352,688 UART: [art] Derive Key Pair - Done
29,365,865 UART: [art] Signing Cert with AUTHO
29,367,197 UART: RITY.KEYID = 7
31,654,818 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,324 UART: [art] PUB.X = 4D58CAE23824D750E21C4F566977FF5632168FDFDCDA63A61A84DA22FF350A8F86E7736C607E04C7F1382EDBAD960E17
31,663,575 UART: [art] PUB.Y = F777666B86B44743066C4F43C0314FA00F5B816620BB18EB3C281CE71376DA0202FBE493EAC8A9E5B056AEF95AFC8B9A
31,670,796 UART: [art] SIG.R = B5C5124BDF243BCF4A73A3619EC87A2B082517605EC171DFB1339B03F3A565F6EE6CBEEB49C2BD660FC50ABA9DA2281B
31,678,192 UART: [art] SIG.S = 016EAF69F2D0F3ADB8FFEEE2BD79799A8E272687565E3BA735455EA1CA632F31FE9C6254D74CE3B0920D9A9EDA459393
32,983,323 UART: Caliptra RT
32,984,025 UART: [state] CFI Enabled
33,146,314 UART: [rt] RT listening for mailbox commands...
33,148,198 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,178,009 UART: [rt]cmd =0x46504c54, len=4
33,179,584 >>> mbox cmd response data (8 bytes)
33,180,651 UART: [rt] FIPS self test
33,181,611 UART: [kat] ++
33,182,064 UART: [kat] sha1
33,186,363 UART: [kat] SHA2-256
33,187,939 UART: Fatal Error: 0x90010002
33,223,174 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,367,666 >>> mbox cmd response: failed
33,368,331 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,512,755 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,794,581 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,890,134 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,557 UART:
192,925 UART: Running Caliptra ROM ...
194,027 UART:
603,861 UART: [state] CFI Enabled
616,594 UART: [state] LifecycleState = Unprovisioned
618,475 UART: [state] DebugLocked = No
620,811 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,219 UART: [kat] SHA2-256
795,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,477 UART: [kat] ++
807,010 UART: [kat] sha1
817,684 UART: [kat] SHA2-256
820,344 UART: [kat] SHA2-384
825,838 UART: [kat] SHA2-512-ACC
828,212 UART: [kat] ECC-384
3,110,937 UART: [kat] HMAC-384Kdf
3,122,186 UART: [kat] LMS
4,312,323 UART: [kat] --
4,317,690 UART: [cold-reset] ++
4,319,908 UART: [fht] Storing FHT @ 0x50003400
4,332,746 UART: [idev] ++
4,333,322 UART: [idev] CDI.KEYID = 6
4,334,235 UART: [idev] SUBJECT.KEYID = 7
4,335,489 UART: [idev] UDS.KEYID = 0
4,336,519 ready_for_fw is high
4,336,725 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,481,183 UART: [idev] Erasing UDS.KEYID = 0
7,627,159 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,617 UART: [idev] --
7,653,263 UART: [ldev] ++
7,653,832 UART: [ldev] CDI.KEYID = 6
7,654,850 UART: [ldev] SUBJECT.KEYID = 5
7,656,007 UART: [ldev] AUTHORITY.KEYID = 7
7,657,243 UART: [ldev] FE.KEYID = 1
7,668,793 UART: [ldev] Erasing FE.KEYID = 1
10,956,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,045 UART: [ldev] --
13,316,775 UART: [fwproc] Waiting for Commands...
13,319,896 UART: [fwproc] Received command 0x46574c44
13,322,082 UART: [fwproc] Received Image of size 114996 bytes
17,380,652 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,499 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,406 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,842,875 >>> mbox cmd response: success
17,847,930 UART: [afmc] ++
17,848,524 UART: [afmc] CDI.KEYID = 6
17,849,409 UART: [afmc] SUBJECT.KEYID = 7
17,850,677 UART: [afmc] AUTHORITY.KEYID = 5
21,160,564 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,646 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,909 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,301 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,126 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,703 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,394 UART: [afmc] --
23,525,540 UART: [cold-reset] --
23,529,948 UART: [state] Locking Datavault
23,536,167 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,916 UART: [state] Locking ICCM
23,539,688 UART: [exit] Launching FMC @ 0x40000130
23,548,080 UART:
23,548,315 UART: Running Caliptra FMC ...
23,549,418 UART:
23,549,575 UART: [state] CFI Enabled
23,558,217 UART: [fht] FMC Alias Private Key: 7
25,889,281 UART: [art] Extend RT PCRs Done
25,890,503 UART: [art] Lock RT PCRs Done
25,892,315 UART: [art] Populate DV Done
25,897,907 UART: [fht] FMC Alias Private Key: 7
25,899,446 UART: [art] Derive CDI
25,900,182 UART: [art] Store in in slot 0x4
25,943,091 UART: [art] Derive Key Pair
25,944,112 UART: [art] Store priv key in slot 0x5
29,186,129 UART: [art] Derive Key Pair - Done
29,199,129 UART: [art] Signing Cert with AUTHO
29,200,438 UART: RITY.KEYID = 7
31,480,013 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,523 UART: [art] PUB.X = 5415FF377338466B9D6FF62BC6C21DE3B815985C51C80F1C1571D6C9C64EDF43AA4CCA7526EC95B858B68E106611E051
31,488,732 UART: [art] PUB.Y = 358BE78FF4F13B03C97D4C715FB32B575C459F0201F14EB8890A2AFDE743A33146B51B506F30C6C4C6614466A9AC3D5F
31,495,976 UART: [art] SIG.R = 41106ED21A850830D949850409D85E93499BE5FC109C33914FB649CB8BA8A7ACC9CFAE217F2A510D1B315E19E0E11248
31,503,415 UART: [art] SIG.S = 487B15544A7A6EC1A6D4F777643B585CBFF84C7CCE378FCA896C338FF07A34058172AEDF88C6470A3C3E471DAFCDC8CB
32,808,433 UART: Caliptra RT
32,809,171 UART: [state] CFI Enabled
32,926,409 UART: [rt] RT listening for mailbox commands...
32,928,272 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,957,987 UART: [rt]cmd =0x46504c54, len=4
32,959,603 >>> mbox cmd response data (8 bytes)
32,960,760 UART: [rt] FIPS self test
32,961,708 UART: [kat] ++
32,962,159 UART: [kat] sha1
32,966,609 UART: [kat] SHA2-256
32,968,107 UART: Fatal Error: 0x90010002
33,003,237 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,147,705 >>> mbox cmd response: failed
33,148,358 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,292,744 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
189,995 UART:
190,303 UART: Running Caliptra ROM ...
191,356 UART:
7,234,987 UART: [state] CFI Enabled
7,247,421 UART: [state] LifecycleState = Unprovisioned
7,249,357 UART: [state] DebugLocked = No
7,250,669 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,255,907 UART: [kat] SHA2-256
7,425,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,436,148 UART: [kat] ++
7,436,605 UART: [kat] sha1
7,446,522 UART: [kat] SHA2-256
7,449,269 UART: [kat] SHA2-384
7,454,608 UART: [kat] SHA2-512-ACC
7,456,956 UART: [kat] ECC-384
9,740,044 UART: [kat] HMAC-384Kdf
9,751,859 UART: [kat] LMS
10,941,929 UART: [kat] --
10,945,465 UART: [cold-reset] ++
10,946,923 UART: [fht] Storing FHT @ 0x50003400
10,958,027 UART: [idev] ++
10,958,594 UART: [idev] CDI.KEYID = 6
10,959,610 UART: [idev] SUBJECT.KEYID = 7
10,960,766 UART: [idev] UDS.KEYID = 0
10,962,351 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,106,697 UART: [idev] Erasing UDS.KEYID = 0
14,245,745 UART: [idev] Using Sha1 for KeyId Algorithm
14,267,288 UART: [idev] --
14,271,712 UART: [ldev] ++
14,272,281 UART: [ldev] CDI.KEYID = 6
14,273,252 UART: [ldev] SUBJECT.KEYID = 5
14,274,412 UART: [ldev] AUTHORITY.KEYID = 7
14,275,698 UART: [ldev] FE.KEYID = 1
14,286,452 UART: [ldev] Erasing FE.KEYID = 1
17,577,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,868,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,883,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,898,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,912,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,931,171 UART: [ldev] --
19,936,762 UART: [fwproc] Waiting for Commands...
19,939,238 UART: [fwproc] Received command 0x46574c44
19,941,422 UART: [fwproc] Received Image of size 114996 bytes
24,009,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,082,570 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,151,439 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,471,534 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
4,125,391 ready_for_fw is high
4,125,772 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,093,357 >>> mbox cmd response: success
23,735,013 UART:
23,735,436 UART: Running Caliptra FMC ...
23,736,557 UART:
23,736,711 UART: [state] CFI Enabled
23,744,378 UART: [fht] FMC Alias Private Key: 7
26,075,021 UART: [art] Extend RT PCRs Done
26,076,265 UART: [art] Lock RT PCRs Done
26,077,979 UART: [art] Populate DV Done
26,083,303 UART: [fht] FMC Alias Private Key: 7
26,084,909 UART: [art] Derive CDI
26,085,651 UART: [art] Store in in slot 0x4
26,128,302 UART: [art] Derive Key Pair
26,129,307 UART: [art] Store priv key in slot 0x5
29,371,099 UART: [art] Derive Key Pair - Done
29,383,727 UART: [art] Signing Cert with AUTHO
29,385,049 UART: RITY.KEYID = 7
31,664,636 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,142 UART: [art] PUB.X = BBC9B1E404E9E4826017D57D80FEDAC14B1DD29C765526D1B8538969786428062AB1B685369618E2D40983A2FFDB6D2D
31,673,351 UART: [art] PUB.Y = C768A91C9A60B29981476BC4E4100234D4056CB5C10074AB02E658198EB70E0D768D0D94B9EFB003346B1D09D00E6624
31,680,606 UART: [art] SIG.R = CD33F5F1B2F7E41FDEC942C4D3A018DB511FCDFA0CE970D28D3CDA8027A0E02BCA0664A747B3EDCC21F95826C75375E1
31,688,006 UART: [art] SIG.S = 28E98DEFC4CCC5D726EBBC71E03CA51A2B1276A5A07F763769A9C48A0E3C41CBA42F3402936ACA7B2A980BEDFD3BDFB1
32,993,676 UART: Caliptra RT
32,994,385 UART: [state] CFI Enabled
33,113,032 UART: [rt] RT listening for mailbox commands...
33,114,895 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,144,702 UART: [rt]cmd =0x46504c54, len=4
33,146,340 >>> mbox cmd response data (8 bytes)
33,147,599 UART: [rt] FIPS self test
33,148,538 UART: [kat] ++
33,148,989 UART: [kat] sha1
33,153,256 UART: [kat] SHA2-256
33,154,808 UART: Fatal Error: 0x90010002
33,190,253 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,334,594 >>> mbox cmd response: failed
33,335,386 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,479,579 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
10,583,812 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,550,805 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
192,198 UART:
192,572 UART: Running Caliptra ROM ...
193,689 UART:
193,836 UART: [state] CFI Enabled
266,472 UART: [state] LifecycleState = Unprovisioned
268,316 UART: [state] DebugLocked = No
269,715 UART: [state] WD Timer not started. Device not locked for debugging
272,820 UART: [kat] SHA2-256
451,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,553 UART: [kat] ++
464,093 UART: [kat] sha1
474,269 UART: [kat] SHA2-256
477,283 UART: [kat] SHA2-384
483,628 UART: [kat] SHA2-512-ACC
486,572 UART: [kat] ECC-384
2,948,997 UART: [kat] HMAC-384Kdf
2,972,317 UART: [kat] LMS
3,501,783 UART: [kat] --
3,505,019 UART: [cold-reset] ++
3,506,533 UART: [fht] FHT @ 0x50003400
3,516,908 UART: [idev] ++
3,517,478 UART: [idev] CDI.KEYID = 6
3,518,514 UART: [idev] SUBJECT.KEYID = 7
3,519,619 UART: [idev] UDS.KEYID = 0
3,520,520 ready_for_fw is high
3,520,725 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,665,753 UART: [idev] Erasing UDS.KEYID = 0
6,027,072 UART: [idev] Sha1 KeyId Algorithm
6,051,109 UART: [idev] --
6,055,513 UART: [ldev] ++
6,056,094 UART: [ldev] CDI.KEYID = 6
6,056,984 UART: [ldev] SUBJECT.KEYID = 5
6,058,200 UART: [ldev] AUTHORITY.KEYID = 7
6,059,438 UART: [ldev] FE.KEYID = 1
6,100,411 UART: [ldev] Erasing FE.KEYID = 1
8,602,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,390 UART: [ldev] --
10,394,361 UART: [fwproc] Wait for Commands...
10,396,452 UART: [fwproc] Recv command 0x46574c44
10,398,512 UART: [fwproc] Recv'd Img size: 115304 bytes
13,811,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,541 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,282,764 >>> mbox cmd response: success
14,287,751 UART: [afmc] ++
14,288,373 UART: [afmc] CDI.KEYID = 6
14,289,294 UART: [afmc] SUBJECT.KEYID = 7
14,290,407 UART: [afmc] AUTHORITY.KEYID = 5
16,832,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,563 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,072 UART: [afmc] --
18,631,251 UART: [cold-reset] --
18,633,759 UART: [state] Locking Datavault
18,638,256 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,899 UART: [state] Locking ICCM
18,641,757 UART: [exit] Launching FMC @ 0x40000130
18,650,203 UART:
18,650,451 UART: Running Caliptra FMC ...
18,651,557 UART:
18,651,713 UART: [state] CFI Enabled
18,712,417 UART: [fht] FMC Alias Private Key: 7
20,477,136 UART: [art] Extend RT PCRs Done
20,478,360 UART: [art] Lock RT PCRs Done
20,479,956 UART: [art] Populate DV Done
20,485,258 UART: [fht] FMC Alias Private Key: 7
20,486,738 UART: [art] Derive CDI
20,487,473 UART: [art] Store in in slot 0x4
20,545,682 UART: [art] Derive Key Pair
20,546,719 UART: [art] Store priv key in slot 0x5
23,009,122 UART: [art] Derive Key Pair - Done
23,022,231 UART: [art] Signing Cert with AUTHO
23,023,537 UART: RITY.KEYID = 7
24,736,385 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,892 UART: [art] PUB.X = 6A300763DECF7DF1670520F98F0313E3B3F1EE9F8FC849887848FC95583AB137AD8D5147BB1D1A6E9419403AEF7E0939
24,745,201 UART: [art] PUB.Y = 02B9E38D7334184A696671D17F19EA97CA77E86076AFE9810B279E660F6F93ADF2BC686C5526E857A38E8740F362F5F9
24,752,394 UART: [art] SIG.R = B1A1918087A5DFAB1233A1EAF985DE03EEB316D6F30149E83736FF0A8F126D38ED67669ACBD8D1099E953C8A032C1CF6
24,759,866 UART: [art] SIG.S = 9A1873F395619FEF9024E71625F8EBD51E5D3579E7E3279743A70B389680D492DFABCA8D33FD25F99A00A8A9EDF532EC
25,738,971 UART: Caliptra RT
25,739,670 UART: [state] CFI Enabled
25,904,792 UART: [rt] RT listening for mailbox commands...
25,906,638 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,936,315 UART: [rt]cmd =0x46504c54, len=4
25,937,890 >>> mbox cmd response data (8 bytes)
25,938,993 UART: [rt] FIPS self test
25,939,954 UART: [kat] ++
25,940,402 UART: [kat] sha1
25,944,693 UART: [kat] SHA2-256
25,946,188 UART: Fatal Error: 0x90010002
25,981,489 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,126,668 >>> mbox cmd response: failed
26,127,257 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,271,913 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,088 UART:
190,376 UART: Running Caliptra ROM ...
191,435 UART:
191,582 UART: [state] CFI Enabled
253,207 UART: [state] LifecycleState = Unprovisioned
255,067 UART: [state] DebugLocked = No
257,746 UART: [state] WD Timer not started. Device not locked for debugging
261,423 UART: [kat] SHA2-256
440,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,161 UART: [kat] ++
452,687 UART: [kat] sha1
463,193 UART: [kat] SHA2-256
466,199 UART: [kat] SHA2-384
471,908 UART: [kat] SHA2-512-ACC
474,864 UART: [kat] ECC-384
2,940,459 UART: [kat] HMAC-384Kdf
2,964,239 UART: [kat] LMS
3,493,686 UART: [kat] --
3,497,355 UART: [cold-reset] ++
3,498,469 UART: [fht] FHT @ 0x50003400
3,508,720 UART: [idev] ++
3,509,280 UART: [idev] CDI.KEYID = 6
3,510,161 UART: [idev] SUBJECT.KEYID = 7
3,511,373 UART: [idev] UDS.KEYID = 0
3,512,937 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,657,986 UART: [idev] Erasing UDS.KEYID = 0
6,018,230 UART: [idev] Sha1 KeyId Algorithm
6,041,243 UART: [idev] --
6,044,600 UART: [ldev] ++
6,045,176 UART: [ldev] CDI.KEYID = 6
6,046,107 UART: [ldev] SUBJECT.KEYID = 5
6,047,275 UART: [ldev] AUTHORITY.KEYID = 7
6,048,603 UART: [ldev] FE.KEYID = 1
6,094,516 UART: [ldev] Erasing FE.KEYID = 1
8,599,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,723 UART: [ldev] --
10,407,986 UART: [fwproc] Wait for Commands...
10,410,030 UART: [fwproc] Recv command 0x46574c44
10,412,128 UART: [fwproc] Recv'd Img size: 115304 bytes
13,832,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,912,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,980,922 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,302,897 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,382,442 ready_for_fw is high
3,382,851 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,079,097 >>> mbox cmd response: success
18,369,247 UART:
18,369,623 UART: Running Caliptra FMC ...
18,370,779 UART:
18,370,937 UART: [state] CFI Enabled
18,435,609 UART: [fht] FMC Alias Private Key: 7
20,199,553 UART: [art] Extend RT PCRs Done
20,200,780 UART: [art] Lock RT PCRs Done
20,202,306 UART: [art] Populate DV Done
20,207,626 UART: [fht] FMC Alias Private Key: 7
20,209,176 UART: [art] Derive CDI
20,210,012 UART: [art] Store in in slot 0x4
20,268,245 UART: [art] Derive Key Pair
20,269,240 UART: [art] Store priv key in slot 0x5
22,732,462 UART: [art] Derive Key Pair - Done
22,745,519 UART: [art] Signing Cert with AUTHO
22,746,821 UART: RITY.KEYID = 7
24,458,267 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,776 UART: [art] PUB.X = F25CC7A541684E83B6B31D3DD293B97DCDA8974BC8D2B9CEE59F2EB637DC77F3595247C312CCDDD718835A9444BC3FBF
24,467,043 UART: [art] PUB.Y = 5C25C789EFB1A77D5DBE1D73D1BF272208A72386322A9BDDA4A4B79C52E3DFEE4EB8C888D4E7174DBD37A973849CFC1C
24,474,364 UART: [art] SIG.R = 461013E26C3D755CCE21B62959CC3FDDF616BB8F65E84460FBE1598D96FC8B0DFF69729498A10EFC578C70BA86C69B7A
24,481,772 UART: [art] SIG.S = 62AC6A8650B3176E4E9088022049881D35CDC64D3AAEA3262F7200BDBEE7F059DA10A083120D001D4AA23288E040D5C7
25,460,471 UART: Caliptra RT
25,461,192 UART: [state] CFI Enabled
25,626,232 UART: [rt] RT listening for mailbox commands...
25,628,080 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,657,761 UART: [rt]cmd =0x46504c54, len=4
25,659,499 >>> mbox cmd response data (8 bytes)
25,660,448 UART: [rt] FIPS self test
25,661,396 UART: [kat] ++
25,661,867 UART: [kat] sha1
25,666,324 UART: [kat] SHA2-256
25,667,878 UART: Fatal Error: 0x90010002
25,703,121 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,847,943 >>> mbox cmd response: failed
25,848,577 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,993,689 >>> mbox cmd response: failed
Initializing fuses
926 writing to cptra_bootfsm_go
3,372,060 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,069,093 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
45 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,494 UART:
192,862 UART: Running Caliptra ROM ...
194,003 UART:
603,601 UART: [state] CFI Enabled
616,554 UART: [state] LifecycleState = Unprovisioned
618,404 UART: [state] DebugLocked = No
620,076 UART: [state] WD Timer not started. Device not locked for debugging
624,480 UART: [kat] SHA2-256
803,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,170 UART: [kat] ++
815,623 UART: [kat] sha1
827,277 UART: [kat] SHA2-256
830,291 UART: [kat] SHA2-384
836,079 UART: [kat] SHA2-512-ACC
839,041 UART: [kat] ECC-384
3,281,225 UART: [kat] HMAC-384Kdf
3,293,044 UART: [kat] LMS
3,822,592 UART: [kat] --
3,827,933 UART: [cold-reset] ++
3,829,224 UART: [fht] FHT @ 0x50003400
3,839,920 UART: [idev] ++
3,840,486 UART: [idev] CDI.KEYID = 6
3,841,405 UART: [idev] SUBJECT.KEYID = 7
3,842,578 UART: [idev] UDS.KEYID = 0
3,843,639 ready_for_fw is high
3,843,881 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,989,222 UART: [idev] Erasing UDS.KEYID = 0
6,314,516 UART: [idev] Sha1 KeyId Algorithm
6,338,414 UART: [idev] --
6,343,599 UART: [ldev] ++
6,344,194 UART: [ldev] CDI.KEYID = 6
6,345,115 UART: [ldev] SUBJECT.KEYID = 5
6,346,275 UART: [ldev] AUTHORITY.KEYID = 7
6,347,507 UART: [ldev] FE.KEYID = 1
6,358,098 UART: [ldev] Erasing FE.KEYID = 1
8,833,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,758 UART: [ldev] --
10,627,984 UART: [fwproc] Wait for Commands...
10,630,783 UART: [fwproc] Recv command 0x46574c44
10,632,822 UART: [fwproc] Recv'd Img size: 115304 bytes
14,051,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,128,170 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,196,946 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,517,585 >>> mbox cmd response: success
14,522,297 UART: [afmc] ++
14,522,888 UART: [afmc] CDI.KEYID = 6
14,523,801 UART: [afmc] SUBJECT.KEYID = 7
14,525,017 UART: [afmc] AUTHORITY.KEYID = 5
17,023,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,745,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,747,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,762,985 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,779,028 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,794,865 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,817,010 UART: [afmc] --
18,821,530 UART: [cold-reset] --
18,825,179 UART: [state] Locking Datavault
18,833,069 UART: [state] Locking PCR0, PCR1 and PCR31
18,834,738 UART: [state] Locking ICCM
18,836,781 UART: [exit] Launching FMC @ 0x40000130
18,845,186 UART:
18,845,418 UART: Running Caliptra FMC ...
18,846,519 UART:
18,846,681 UART: [state] CFI Enabled
18,854,882 UART: [fht] FMC Alias Private Key: 7
20,611,499 UART: [art] Extend RT PCRs Done
20,612,719 UART: [art] Lock RT PCRs Done
20,614,557 UART: [art] Populate DV Done
20,620,017 UART: [fht] FMC Alias Private Key: 7
20,621,673 UART: [art] Derive CDI
20,622,487 UART: [art] Store in in slot 0x4
20,664,808 UART: [art] Derive Key Pair
20,665,807 UART: [art] Store priv key in slot 0x5
23,093,043 UART: [art] Derive Key Pair - Done
23,105,602 UART: [art] Signing Cert with AUTHO
23,106,908 UART: RITY.KEYID = 7
24,812,347 UART: [art] Erasing AUTHORITY.KEYID = 7
24,813,847 UART: [art] PUB.X = 31917F816F122E4902BB155AC514F73A8959B3D6751C1BA9E57EAF3E3EAE4B946F7C8DDE5E48D98331E65B9C522F0D91
24,821,100 UART: [art] PUB.Y = 77131565913C19B449F066DC3529A03F7A92C8C6F5B4ADB51E8C5DD6B02899367EC9A74A52AC7B1B10FF3371FA3F02BB
24,828,390 UART: [art] SIG.R = ED64607C4F6B13DCA7F72F439EB5499F925B3A58CF240051C8622CA8D3D29793FDD49B17C13B96458D2020B4837DBCED
24,835,728 UART: [art] SIG.S = 90FBB0E6D75888B7DC2914A519F8040DDF1212E37A742D7914A35EBC3DFE4D70DA26A01729DB1576CBDBB5F6DE230F8E
25,814,829 UART: Caliptra RT
25,815,538 UART: [state] CFI Enabled
25,932,600 UART: [rt] RT listening for mailbox commands...
25,934,446 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,964,136 UART: [rt]cmd =0x46504c54, len=4
25,965,763 >>> mbox cmd response data (8 bytes)
25,967,259 UART: [rt] FIPS self test
25,968,397 UART: [kat] ++
25,968,855 UART: [kat] sha1
25,973,116 UART: [kat] SHA2-256
25,974,617 UART: Fatal Error: 0x90010002
26,009,749 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,154,605 >>> mbox cmd response: failed
26,155,273 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,299,995 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,001 UART:
190,295 UART: Running Caliptra ROM ...
191,318 UART:
14,231,466 UART: [state] CFI Enabled
14,244,170 UART: [state] LifecycleState = Unprovisioned
14,246,028 UART: [state] DebugLocked = No
14,247,445 UART: [state] WD Timer not started. Device not locked for debugging
14,252,046 UART: [kat] SHA2-256
14,431,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,442,747 UART: [kat] ++
14,443,207 UART: [kat] sha1
14,454,794 UART: [kat] SHA2-256
14,457,808 UART: [kat] SHA2-384
14,463,466 UART: [kat] SHA2-512-ACC
14,466,401 UART: [kat] ECC-384
16,908,274 UART: [kat] HMAC-384Kdf
16,921,752 UART: [kat] LMS
17,451,195 UART: [kat] --
17,455,071 UART: [cold-reset] ++
17,456,567 UART: [fht] FHT @ 0x50003400
17,466,676 UART: [idev] ++
17,467,239 UART: [idev] CDI.KEYID = 6
17,468,142 UART: [idev] SUBJECT.KEYID = 7
17,469,352 UART: [idev] UDS.KEYID = 0
17,470,893 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,615,996 UART: [idev] Erasing UDS.KEYID = 0
19,942,172 UART: [idev] Sha1 KeyId Algorithm
19,964,642 UART: [idev] --
19,968,683 UART: [ldev] ++
19,969,254 UART: [ldev] CDI.KEYID = 6
19,970,134 UART: [ldev] SUBJECT.KEYID = 5
19,971,345 UART: [ldev] AUTHORITY.KEYID = 7
19,972,630 UART: [ldev] FE.KEYID = 1
19,981,954 UART: [ldev] Erasing FE.KEYID = 1
22,455,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,171,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,187,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,203,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,218,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,239,724 UART: [ldev] --
24,244,906 UART: [fwproc] Wait for Commands...
24,247,271 UART: [fwproc] Recv command 0x46574c44
24,249,365 UART: [fwproc] Recv'd Img size: 115304 bytes
27,665,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,744,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,812,806 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,133,771 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
3,700,854 ready_for_fw is high
3,701,244 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,284,990 >>> mbox cmd response: success
18,534,291 UART:
18,534,699 UART: Running Caliptra FMC ...
18,535,845 UART:
18,536,005 UART: [state] CFI Enabled
18,543,794 UART: [fht] FMC Alias Private Key: 7
20,300,924 UART: [art] Extend RT PCRs Done
20,302,163 UART: [art] Lock RT PCRs Done
20,304,095 UART: [art] Populate DV Done
20,309,486 UART: [fht] FMC Alias Private Key: 7
20,311,145 UART: [art] Derive CDI
20,311,965 UART: [art] Store in in slot 0x4
20,354,563 UART: [art] Derive Key Pair
20,355,565 UART: [art] Store priv key in slot 0x5
22,782,379 UART: [art] Derive Key Pair - Done
22,795,536 UART: [art] Signing Cert with AUTHO
22,796,873 UART: RITY.KEYID = 7
24,502,475 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,987 UART: [art] PUB.X = 5DE8032D86C89964BD03353A29AF696738FEA2C488B81478929DAE5C048E82C43DE32A9BD3BD5474794D0F771A168F93
24,511,234 UART: [art] PUB.Y = E21FF3CBC5E67CF2C520717E79B3BC85CA955D7D228F81C813AF819FB7E087BF6CE4AABB75365BA33481453E90D4C794
24,518,483 UART: [art] SIG.R = A0D732CF5BF166DDFE6DECF4B808606B9DAF48F130CB20CA7FEFD5BCD715A46F4C69BA6CB6DA417B69A75036A148B269
24,525,963 UART: [art] SIG.S = 9747C1CA282E9F13EF5FA97C32510431C23CEA90BB9371A215DC126511B8C16546944200BC10EEA747DA700CED822273
25,504,774 UART: Caliptra RT
25,505,478 UART: [state] CFI Enabled
25,622,971 UART: [rt] RT listening for mailbox commands...
25,624,815 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,654,441 UART: [rt]cmd =0x46504c54, len=4
25,655,966 >>> mbox cmd response data (8 bytes)
25,656,952 UART: [rt] FIPS self test
25,657,890 UART: [kat] ++
25,658,339 UART: [kat] sha1
25,662,794 UART: [kat] SHA2-256
25,664,404 UART: Fatal Error: 0x90010002
25,699,564 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,844,407 >>> mbox cmd response: failed
25,845,099 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,989,842 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
17,626,942 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,213,584 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,438,580 ready_for_fw is high
3,439,029 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,754,724 >>> mbox cmd response: success
19,049,888 UART:
19,050,321 UART: Running Caliptra FMC ...
19,051,449 UART:
19,051,612 UART: [state] CFI Enabled
19,116,604 UART: [fht] FMC Alias Private Key: 7
20,880,166 UART: [art] Extend RT PCRs Done
20,881,385 UART: [art] Lock RT PCRs Done
20,882,863 UART: [art] Populate DV Done
20,888,229 UART: [fht] FMC Alias Private Key: 7
20,889,769 UART: [art] Derive CDI
20,890,505 UART: [art] Store in in slot 0x4
20,948,739 UART: [art] Derive Key Pair
20,949,783 UART: [art] Store priv key in slot 0x5
23,412,244 UART: [art] Derive Key Pair - Done
23,425,213 UART: [art] Signing Cert with AUTHO
23,426,516 UART: RITY.KEYID = 7
25,138,000 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,521 UART: [art] PUB.X = 29B9B3C8B434A42A73D80149183C321B809437B2520E531F8C853A4C2E09D8B4360851BF2131954BD7C2D208BBBF192C
25,146,812 UART: [art] PUB.Y = 050BC7478FD48D0D4900E857990B1660B1366501ACAC2D2DD867114680679918918865D9EEBADA55887A20D47D22D9CF
25,153,972 UART: [art] SIG.R = EFDD158EA16ADCCAB68BF7EB9A01D18506E384AA64E0F62CD30FFEBD13F98282977DA1CE0DD08EADC1991B67ED11F434
25,161,437 UART: [art] SIG.S = 203E893DD749FEB33E48CCF6A5EB0F272FAF4E2F5466EA8FFC2080806A64F99E0AA14FB4BF8358CD2506D2F071094624
26,140,095 UART: Caliptra RT
26,140,792 UART: [state] CFI Enabled
26,306,061 UART: [rt] RT listening for mailbox commands...
26,307,910 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,337,644 UART: [rt]cmd =0x46504c54, len=4
26,339,276 >>> mbox cmd response data (8 bytes)
26,340,490 UART: [rt] FIPS self test
26,341,426 UART: [kat] ++
26,341,873 UART: [kat] sha1
26,346,192 UART: [kat] SHA2-256
26,347,632 UART: Fatal Error: 0x90010002
26,382,786 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,527,990 >>> mbox cmd response: failed
26,528,675 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,673,455 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,428,544 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,751,629 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,760,753 ready_for_fw is high
3,761,346 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,985,685 >>> mbox cmd response: success
19,240,985 UART:
19,241,435 UART: Running Caliptra FMC ...
19,242,557 UART:
19,242,712 UART: [state] CFI Enabled
19,250,821 UART: [fht] FMC Alias Private Key: 7
21,007,171 UART: [art] Extend RT PCRs Done
21,008,415 UART: [art] Lock RT PCRs Done
21,010,073 UART: [art] Populate DV Done
21,015,180 UART: [fht] FMC Alias Private Key: 7
21,016,785 UART: [art] Derive CDI
21,017,607 UART: [art] Store in in slot 0x4
21,060,230 UART: [art] Derive Key Pair
21,061,283 UART: [art] Store priv key in slot 0x5
23,488,275 UART: [art] Derive Key Pair - Done
23,501,596 UART: [art] Signing Cert with AUTHO
23,502,899 UART: RITY.KEYID = 7
25,208,497 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,007 UART: [art] PUB.X = 9FFFE856A5C4D94B26C70FA4E6FC48771E14AA5D9705C94625A57245AC9D7FE4A225C8123B541ACA8370A036C921A7C6
25,217,256 UART: [art] PUB.Y = 37ECA7F71430CDED965651EF0C1039623F6B20DF1CBE35B0EFD850A6AA087E24BA1FE3EB3A9151E03527805A10EA39F2
25,224,540 UART: [art] SIG.R = 54BA6F1C5F88BFAE3B81362EB3F66A999EACDA38FB3DD62C357427A4D7288C872B5176B9E4822C19F721364DB0F2EEE6
25,231,968 UART: [art] SIG.S = 204E8E329DE34E40FB8E6A9340CDB46197B2E94EE30BBA4E0ECCAE0C44F589640007FEF240805C3D9DC39BEF2FE650B0
26,211,081 UART: Caliptra RT
26,211,772 UART: [state] CFI Enabled
26,329,594 UART: [rt] RT listening for mailbox commands...
26,331,444 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,361,075 UART: [rt]cmd =0x46504c54, len=4
26,362,658 >>> mbox cmd response data (8 bytes)
26,363,836 UART: [rt] FIPS self test
26,364,786 UART: [kat] ++
26,365,237 UART: [kat] sha1
26,369,526 UART: [kat] SHA2-256
26,371,027 UART: Fatal Error: 0x90010002
26,406,436 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,551,586 >>> mbox cmd response: failed
26,552,201 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,697,367 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
16,985,210 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,207,215 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,791 UART: [kat] SHA2-256
881,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,837 UART: [kat] ++
885,989 UART: [kat] sha1
890,179 UART: [kat] SHA2-256
892,117 UART: [kat] SHA2-384
894,966 UART: [kat] SHA2-512-ACC
896,867 UART: [kat] ECC-384
902,656 UART: [kat] HMAC-384Kdf
907,314 UART: [kat] LMS
1,475,510 UART: [kat] --
1,476,235 UART: [cold-reset] ++
1,476,591 UART: [fht] Storing FHT @ 0x50003400
1,479,432 UART: [idev] ++
1,479,600 UART: [idev] CDI.KEYID = 6
1,479,960 UART: [idev] SUBJECT.KEYID = 7
1,480,384 UART: [idev] UDS.KEYID = 0
1,480,729 ready_for_fw is high
1,480,729 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,552 UART: [idev] Erasing UDS.KEYID = 0
1,504,926 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,666 UART: [idev] --
1,514,721 UART: [ldev] ++
1,514,889 UART: [ldev] CDI.KEYID = 6
1,515,252 UART: [ldev] SUBJECT.KEYID = 5
1,515,678 UART: [ldev] AUTHORITY.KEYID = 7
1,516,141 UART: [ldev] FE.KEYID = 1
1,521,229 UART: [ldev] Erasing FE.KEYID = 1
1,546,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,240 UART: [ldev] --
1,585,593 UART: [fwproc] Waiting for Commands...
1,586,404 UART: [fwproc] Received command 0x46574c44
1,587,195 UART: [fwproc] Received Image of size 115304 bytes
2,896,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,496 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,848 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,063 >>> mbox cmd response: success
3,092,143 UART: [afmc] ++
3,092,311 UART: [afmc] CDI.KEYID = 6
3,092,673 UART: [afmc] SUBJECT.KEYID = 7
3,093,098 UART: [afmc] AUTHORITY.KEYID = 5
3,127,807 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,966 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,656 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,721 UART: [afmc] --
3,171,811 UART: [cold-reset] --
3,172,913 UART: [state] Locking Datavault
3,174,016 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,620 UART: [state] Locking ICCM
3,175,174 UART: [exit] Launching FMC @ 0x40000130
3,180,503 UART:
3,180,519 UART: Running Caliptra FMC ...
3,180,927 UART:
3,180,981 UART: [state] CFI Enabled
3,191,450 UART: [fht] FMC Alias Private Key: 7
3,300,279 UART: [art] Extend RT PCRs Done
3,300,707 UART: [art] Lock RT PCRs Done
3,302,287 UART: [art] Populate DV Done
3,310,350 UART: [fht] FMC Alias Private Key: 7
3,311,358 UART: [art] Derive CDI
3,311,638 UART: [art] Store in in slot 0x4
3,397,197 UART: [art] Derive Key Pair
3,397,557 UART: [art] Store priv key in slot 0x5
3,410,597 UART: [art] Derive Key Pair - Done
3,425,661 UART: [art] Signing Cert with AUTHO
3,426,141 UART: RITY.KEYID = 7
3,441,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,106 UART: [art] PUB.X = B965B6279235FAC408A8A12F45278C799EA214C89C8A8B62077BC861AAE922DE73918FFFEE63D719963ECB0C2528E3C7
3,448,873 UART: [art] PUB.Y = A732223D27B478A11F19F235022A97FB56B5FDEC1AEC9C48901038547B4AB8D8D3783C7FCD121E340E5A6B06DF3FE40E
3,455,821 UART: [art] SIG.R = C84EF01DA51ADEE9EE65019BC45003CF67620ACF9042E403AE14232BB4D89E75C3BEF271583C58DD1AE4894BBDAB099D
3,462,594 UART: [art] SIG.S = 6C3881C94D997B1DAB6211AA2013CFD1CF52F4F15213B3ABB3F9667A46FC642C6A9D8D8967FD8F4C04551EDD67786C64
3,486,112 UART: Caliptra RT
3,486,365 UART: [state] CFI Enabled
3,594,014 UART: [rt] RT listening for mailbox commands...
3,594,677 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,678 UART: [rt]cmd =0x46504c54, len=4
3,625,789 >>> mbox cmd response data (8 bytes)
3,625,958 UART: [rt] FIPS self test
3,626,286 UART: [kat] ++
3,626,438 UART: [kat] sha1
3,630,550 UART: [kat] SHA2-256
3,632,462 UART: Fatal Error: 0x90010002
3,634,012 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,017 >>> mbox cmd response: failed
3,634,017 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,405 UART: [kat] SHA2-256
892,343 UART: [kat] SHA2-384
895,030 UART: [kat] SHA2-512-ACC
896,931 UART: [kat] ECC-384
902,718 UART: [kat] HMAC-384Kdf
907,412 UART: [kat] LMS
1,475,608 UART: [kat] --
1,476,667 UART: [cold-reset] ++
1,477,137 UART: [fht] Storing FHT @ 0x50003400
1,479,730 UART: [idev] ++
1,479,898 UART: [idev] CDI.KEYID = 6
1,480,258 UART: [idev] SUBJECT.KEYID = 7
1,480,682 UART: [idev] UDS.KEYID = 0
1,481,027 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,398 UART: [idev] Erasing UDS.KEYID = 0
1,504,926 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,598 UART: [idev] --
1,514,777 UART: [ldev] ++
1,514,945 UART: [ldev] CDI.KEYID = 6
1,515,308 UART: [ldev] SUBJECT.KEYID = 5
1,515,734 UART: [ldev] AUTHORITY.KEYID = 7
1,516,197 UART: [ldev] FE.KEYID = 1
1,520,933 UART: [ldev] Erasing FE.KEYID = 1
1,546,466 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,242 UART: [ldev] --
1,585,693 UART: [fwproc] Waiting for Commands...
1,586,480 UART: [fwproc] Received command 0x46574c44
1,587,271 UART: [fwproc] Received Image of size 115304 bytes
2,896,722 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,816 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,365 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,483 ready_for_fw is high
1,362,483 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,487 >>> mbox cmd response: success
3,000,585 UART:
3,000,601 UART: Running Caliptra FMC ...
3,001,009 UART:
3,001,063 UART: [state] CFI Enabled
3,011,656 UART: [fht] FMC Alias Private Key: 7
3,119,481 UART: [art] Extend RT PCRs Done
3,119,909 UART: [art] Lock RT PCRs Done
3,121,211 UART: [art] Populate DV Done
3,129,682 UART: [fht] FMC Alias Private Key: 7
3,130,688 UART: [art] Derive CDI
3,130,968 UART: [art] Store in in slot 0x4
3,216,505 UART: [art] Derive Key Pair
3,216,865 UART: [art] Store priv key in slot 0x5
3,230,525 UART: [art] Derive Key Pair - Done
3,245,273 UART: [art] Signing Cert with AUTHO
3,245,753 UART: RITY.KEYID = 7
3,260,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,266 UART: [art] PUB.X = 785DA9D67CEA8B45D025786ED959207DBE0896BEC728D1884F3E564B1038E0434A5FF8E8E4521BD7D0036FC8571236BB
3,268,034 UART: [art] PUB.Y = 95F6528C06EBBAAFBB56A3566196B56D5874670BCB63AF1C7BE7FEBA0BE85E9ED24F5DE4B62A36BBB69D63DDBBB20390
3,274,998 UART: [art] SIG.R = EB301135DBDA8BBFCDBA3C7A4A61CD5BE3A567E3C9F808FAED6B28F8064DFEF351E937817A2A25DE44FFE85CC60CA8E0
3,281,791 UART: [art] SIG.S = AE8EA5239C7E530C06099DB3CA1A59213C4C287C4063BA556FCCA6DB8A7DBCDBDC2A2F354FD6A3132D0DFFFBEE2CC146
3,305,770 UART: Caliptra RT
3,306,023 UART: [state] CFI Enabled
3,414,337 UART: [rt] RT listening for mailbox commands...
3,415,000 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,577 UART: [rt]cmd =0x46504c54, len=4
3,445,668 >>> mbox cmd response data (8 bytes)
3,445,897 UART: [rt] FIPS self test
3,446,225 UART: [kat] ++
3,446,377 UART: [kat] sha1
3,450,581 UART: [kat] SHA2-256
3,452,587 UART: Fatal Error: 0x90010002
3,454,137 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,454,142 >>> mbox cmd response: failed
3,454,142 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,454,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,835 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,115 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,464 UART: [kat] SHA2-256
882,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,510 UART: [kat] ++
886,662 UART: [kat] sha1
890,946 UART: [kat] SHA2-256
892,884 UART: [kat] SHA2-384
895,645 UART: [kat] SHA2-512-ACC
897,546 UART: [kat] ECC-384
903,283 UART: [kat] HMAC-384Kdf
907,995 UART: [kat] LMS
1,476,191 UART: [kat] --
1,476,956 UART: [cold-reset] ++
1,477,358 UART: [fht] Storing FHT @ 0x50003400
1,480,329 UART: [idev] ++
1,480,497 UART: [idev] CDI.KEYID = 6
1,480,857 UART: [idev] SUBJECT.KEYID = 7
1,481,281 UART: [idev] UDS.KEYID = 0
1,481,626 ready_for_fw is high
1,481,626 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,419 UART: [idev] Erasing UDS.KEYID = 0
1,506,031 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,675 UART: [idev] --
1,515,760 UART: [ldev] ++
1,515,928 UART: [ldev] CDI.KEYID = 6
1,516,291 UART: [ldev] SUBJECT.KEYID = 5
1,516,717 UART: [ldev] AUTHORITY.KEYID = 7
1,517,180 UART: [ldev] FE.KEYID = 1
1,522,460 UART: [ldev] Erasing FE.KEYID = 1
1,548,073 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,097 UART: [ldev] --
1,587,612 UART: [fwproc] Waiting for Commands...
1,588,297 UART: [fwproc] Received command 0x46574c44
1,589,088 UART: [fwproc] Received Image of size 115304 bytes
2,899,187 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,383 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,735 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,080 >>> mbox cmd response: success
3,094,262 UART: [afmc] ++
3,094,430 UART: [afmc] CDI.KEYID = 6
3,094,792 UART: [afmc] SUBJECT.KEYID = 7
3,095,217 UART: [afmc] AUTHORITY.KEYID = 5
3,130,474 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,147,024 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,147,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,153,532 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,159,417 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,165,107 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,173,070 UART: [afmc] --
3,173,982 UART: [cold-reset] --
3,174,648 UART: [state] Locking Datavault
3,175,811 UART: [state] Locking PCR0, PCR1 and PCR31
3,176,415 UART: [state] Locking ICCM
3,176,983 UART: [exit] Launching FMC @ 0x40000130
3,182,312 UART:
3,182,328 UART: Running Caliptra FMC ...
3,182,736 UART:
3,182,879 UART: [state] CFI Enabled
3,193,332 UART: [fht] FMC Alias Private Key: 7
3,300,587 UART: [art] Extend RT PCRs Done
3,301,015 UART: [art] Lock RT PCRs Done
3,302,927 UART: [art] Populate DV Done
3,311,210 UART: [fht] FMC Alias Private Key: 7
3,312,174 UART: [art] Derive CDI
3,312,454 UART: [art] Store in in slot 0x4
3,398,155 UART: [art] Derive Key Pair
3,398,515 UART: [art] Store priv key in slot 0x5
3,412,245 UART: [art] Derive Key Pair - Done
3,426,922 UART: [art] Signing Cert with AUTHO
3,427,402 UART: RITY.KEYID = 7
3,442,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,443,105 UART: [art] PUB.X = C0931E94F826F6C209B974021648D2678FBCF70A15A9A9145BDCE1BDE39191E8A697FD3A587D7761D6CDB3B494340DE0
3,449,869 UART: [art] PUB.Y = 2D5D23E0456B2BC2F29281F22BE693871E5FDEA627F2D6B6B8B724F4746F230C1A38BE714202710C2B2B8A6D982FDB45
3,456,816 UART: [art] SIG.R = A3EB0E042BD5B845B6A2086A911E1BB083B9D7D33470DABD2C7D2E88EFDB1E22BA682B28959D9979AB4A938BFE6CEB01
3,463,594 UART: [art] SIG.S = 389EE5A7C4F0961A4CC2F15DD4B35E43E4A1413D944B9B540D2462AE05289BF18B5E71D7174D621CC62F06F7498D12FD
3,487,410 UART: Caliptra RT
3,487,755 UART: [state] CFI Enabled
3,596,234 UART: [rt] RT listening for mailbox commands...
3,596,897 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,574 UART: [rt]cmd =0x46504c54, len=4
3,627,551 >>> mbox cmd response data (8 bytes)
3,627,834 UART: [rt] FIPS self test
3,628,162 UART: [kat] ++
3,628,314 UART: [kat] sha1
3,632,588 UART: [kat] SHA2-256
3,634,538 UART: Fatal Error: 0x90010002
3,636,088 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,636,093 >>> mbox cmd response: failed
3,636,093 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,636,098 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,571 UART: [kat] SHA2-512-ACC
897,472 UART: [kat] ECC-384
903,061 UART: [kat] HMAC-384Kdf
907,685 UART: [kat] LMS
1,475,881 UART: [kat] --
1,476,774 UART: [cold-reset] ++
1,477,302 UART: [fht] Storing FHT @ 0x50003400
1,479,951 UART: [idev] ++
1,480,119 UART: [idev] CDI.KEYID = 6
1,480,479 UART: [idev] SUBJECT.KEYID = 7
1,480,903 UART: [idev] UDS.KEYID = 0
1,481,248 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,825 UART: [idev] Erasing UDS.KEYID = 0
1,505,735 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,493 UART: [idev] --
1,515,546 UART: [ldev] ++
1,515,714 UART: [ldev] CDI.KEYID = 6
1,516,077 UART: [ldev] SUBJECT.KEYID = 5
1,516,503 UART: [ldev] AUTHORITY.KEYID = 7
1,516,966 UART: [ldev] FE.KEYID = 1
1,522,060 UART: [ldev] Erasing FE.KEYID = 1
1,547,305 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,253 UART: [ldev] --
1,586,702 UART: [fwproc] Waiting for Commands...
1,587,339 UART: [fwproc] Received command 0x46574c44
1,588,130 UART: [fwproc] Received Image of size 115304 bytes
2,898,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,213 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,565 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,858 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,324 ready_for_fw is high
1,363,324 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,943,716 >>> mbox cmd response: success
3,004,708 UART:
3,004,724 UART: Running Caliptra FMC ...
3,005,132 UART:
3,005,275 UART: [state] CFI Enabled
3,016,222 UART: [fht] FMC Alias Private Key: 7
3,123,885 UART: [art] Extend RT PCRs Done
3,124,313 UART: [art] Lock RT PCRs Done
3,126,027 UART: [art] Populate DV Done
3,134,270 UART: [fht] FMC Alias Private Key: 7
3,135,368 UART: [art] Derive CDI
3,135,648 UART: [art] Store in in slot 0x4
3,220,917 UART: [art] Derive Key Pair
3,221,277 UART: [art] Store priv key in slot 0x5
3,234,671 UART: [art] Derive Key Pair - Done
3,249,567 UART: [art] Signing Cert with AUTHO
3,250,047 UART: RITY.KEYID = 7
3,265,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,434 UART: [art] PUB.X = 0436DDECE5B79BCD2444FC465A9EDEA3E26DD2BF44844C0B056EEB1A03D97E1CA736F9D5A76055B50D9C933D2387FAAE
3,273,211 UART: [art] PUB.Y = A511D3608B46F79B51BA4143CC11AC583F6A37CF647D375AFDA123A9E3AA451924496BC082FDC9F7D717B6860814649D
3,280,162 UART: [art] SIG.R = AA5D88B7301C6870A7C046C5A15B8FA8227C6EDB9FFE58EFD45C0AC1D5F2687D9426C11BD638AFFB2DCF586422D2B98F
3,286,949 UART: [art] SIG.S = 0B2162F8A56E7F0E939A581526A859D8BE33860D479032DD1E006AA9DF5F3C03FDCF75A55CB45D8CC57F7F4C661CE5E1
3,310,632 UART: Caliptra RT
3,310,977 UART: [state] CFI Enabled
3,418,364 UART: [rt] RT listening for mailbox commands...
3,419,027 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,578 UART: [rt]cmd =0x46504c54, len=4
3,449,821 >>> mbox cmd response data (8 bytes)
3,450,172 UART: [rt] FIPS self test
3,450,500 UART: [kat] ++
3,450,652 UART: [kat] sha1
3,454,736 UART: [kat] SHA2-256
3,456,836 UART: Fatal Error: 0x90010002
3,458,386 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,458,391 >>> mbox cmd response: failed
3,458,391 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,458,396 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,848 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,142 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
893,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,219 UART: [kat] ++
897,371 UART: [kat] sha1
901,703 UART: [kat] SHA2-256
903,643 UART: [kat] SHA2-384
906,280 UART: [kat] SHA2-512-ACC
908,181 UART: [kat] ECC-384
918,030 UART: [kat] HMAC-384Kdf
922,646 UART: [kat] LMS
1,170,974 UART: [kat] --
1,171,839 UART: [cold-reset] ++
1,172,383 UART: [fht] FHT @ 0x50003400
1,174,986 UART: [idev] ++
1,175,154 UART: [idev] CDI.KEYID = 6
1,175,514 UART: [idev] SUBJECT.KEYID = 7
1,175,938 UART: [idev] UDS.KEYID = 0
1,176,283 ready_for_fw is high
1,176,283 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,762 UART: [idev] Erasing UDS.KEYID = 0
1,200,919 UART: [idev] Sha1 KeyId Algorithm
1,209,459 UART: [idev] --
1,210,657 UART: [ldev] ++
1,210,825 UART: [ldev] CDI.KEYID = 6
1,211,188 UART: [ldev] SUBJECT.KEYID = 5
1,211,614 UART: [ldev] AUTHORITY.KEYID = 7
1,212,077 UART: [ldev] FE.KEYID = 1
1,217,001 UART: [ldev] Erasing FE.KEYID = 1
1,243,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,959 UART: [ldev] --
1,282,232 UART: [fwproc] Wait for Commands...
1,283,048 UART: [fwproc] Recv command 0x46574c44
1,283,776 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,653 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,957 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,282 >>> mbox cmd response: success
2,789,440 UART: [afmc] ++
2,789,608 UART: [afmc] CDI.KEYID = 6
2,789,970 UART: [afmc] SUBJECT.KEYID = 7
2,790,395 UART: [afmc] AUTHORITY.KEYID = 5
2,825,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,099 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,712 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,431 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,197 UART: [afmc] --
2,869,111 UART: [cold-reset] --
2,869,819 UART: [state] Locking Datavault
2,870,920 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,524 UART: [state] Locking ICCM
2,872,188 UART: [exit] Launching FMC @ 0x40000130
2,877,517 UART:
2,877,533 UART: Running Caliptra FMC ...
2,877,941 UART:
2,877,995 UART: [state] CFI Enabled
2,888,160 UART: [fht] FMC Alias Private Key: 7
2,996,537 UART: [art] Extend RT PCRs Done
2,996,965 UART: [art] Lock RT PCRs Done
2,998,201 UART: [art] Populate DV Done
3,006,530 UART: [fht] FMC Alias Private Key: 7
3,007,468 UART: [art] Derive CDI
3,007,748 UART: [art] Store in in slot 0x4
3,093,197 UART: [art] Derive Key Pair
3,093,557 UART: [art] Store priv key in slot 0x5
3,107,155 UART: [art] Derive Key Pair - Done
3,121,721 UART: [art] Signing Cert with AUTHO
3,122,201 UART: RITY.KEYID = 7
3,137,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,290 UART: [art] PUB.X = FC23192FBDAC31D38E80BB05653B6B8E938F84DE2296E930ACCB9721449BCA57A0214559A7420C366ABAD9DB5BDE5FA5
3,145,070 UART: [art] PUB.Y = CEE48FF07E8FEB5117D677E1D361BE1F6B60076CC67E64639BA80AA8216E9B2E602F5D79E707283044A7E63799FAE725
3,152,017 UART: [art] SIG.R = 885BC5EBBCC33D039D66FCF470736ABC5CAF45782A25E3E487BE0C3723F4994EAF5A6E6F28C1C30AB73B790754B46C5F
3,158,791 UART: [art] SIG.S = 7B80BB06324D7E50C3C6F4640B61D2AA283489445BF12AF0D9A9C07749CA38075491E2D23C63A8CDB0F0B9FD2AB01ACB
3,182,879 UART: Caliptra RT
3,183,132 UART: [state] CFI Enabled
3,291,199 UART: [rt] RT listening for mailbox commands...
3,291,862 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,945 UART: [rt]cmd =0x46504c54, len=4
3,322,946 >>> mbox cmd response data (8 bytes)
3,323,115 UART: [rt] FIPS self test
3,323,443 UART: [kat] ++
3,323,595 UART: [kat] sha1
3,327,829 UART: [kat] SHA2-256
3,329,971 UART: Fatal Error: 0x90010002
3,331,521 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,526 >>> mbox cmd response: failed
3,331,526 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,331,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
893,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,203 UART: [kat] ++
897,355 UART: [kat] sha1
901,635 UART: [kat] SHA2-256
903,575 UART: [kat] SHA2-384
906,336 UART: [kat] SHA2-512-ACC
908,237 UART: [kat] ECC-384
917,704 UART: [kat] HMAC-384Kdf
922,354 UART: [kat] LMS
1,170,682 UART: [kat] --
1,171,447 UART: [cold-reset] ++
1,171,793 UART: [fht] FHT @ 0x50003400
1,174,574 UART: [idev] ++
1,174,742 UART: [idev] CDI.KEYID = 6
1,175,102 UART: [idev] SUBJECT.KEYID = 7
1,175,526 UART: [idev] UDS.KEYID = 0
1,175,871 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,344 UART: [idev] Erasing UDS.KEYID = 0
1,200,601 UART: [idev] Sha1 KeyId Algorithm
1,209,161 UART: [idev] --
1,210,353 UART: [ldev] ++
1,210,521 UART: [ldev] CDI.KEYID = 6
1,210,884 UART: [ldev] SUBJECT.KEYID = 5
1,211,310 UART: [ldev] AUTHORITY.KEYID = 7
1,211,773 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,243,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,183 UART: [ldev] --
1,282,522 UART: [fwproc] Wait for Commands...
1,283,142 UART: [fwproc] Recv command 0x46574c44
1,283,870 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,461 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,765 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,090 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,671 ready_for_fw is high
1,060,671 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,831 >>> mbox cmd response: success
2,702,577 UART:
2,702,593 UART: Running Caliptra FMC ...
2,703,001 UART:
2,703,055 UART: [state] CFI Enabled
2,713,548 UART: [fht] FMC Alias Private Key: 7
2,822,091 UART: [art] Extend RT PCRs Done
2,822,519 UART: [art] Lock RT PCRs Done
2,824,091 UART: [art] Populate DV Done
2,832,538 UART: [fht] FMC Alias Private Key: 7
2,833,698 UART: [art] Derive CDI
2,833,978 UART: [art] Store in in slot 0x4
2,919,791 UART: [art] Derive Key Pair
2,920,151 UART: [art] Store priv key in slot 0x5
2,933,175 UART: [art] Derive Key Pair - Done
2,947,850 UART: [art] Signing Cert with AUTHO
2,948,330 UART: RITY.KEYID = 7
2,963,920 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,685 UART: [art] PUB.X = B5FAFADD5D175BFBB72E84260090B0C6EA87BF610E8F695C37BC36E7C0CF47E283C9F6958A3B85348A55BA7ABA0CB8AC
2,971,451 UART: [art] PUB.Y = 6AECDA315243221D163EB44F078A3EA8B90DCE09B560AB266D5DEF5E129683EDDB157AFAE5290DED5EE80BA54E953CE0
2,978,408 UART: [art] SIG.R = C704343078761634A48F215C4B816F084EFFEEBB7CE6A1C7B9335C8B1D90DBD94419C6ED544500A979ED51148946849C
2,985,150 UART: [art] SIG.S = 4475358CF5E75666B71303730BD3BBEF732E5DE554B5A5B699E10F408E3B66793D4C76DF7470430202B75B135E324A86
3,009,110 UART: Caliptra RT
3,009,363 UART: [state] CFI Enabled
3,116,418 UART: [rt] RT listening for mailbox commands...
3,117,081 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,792 UART: [rt]cmd =0x46504c54, len=4
3,147,961 >>> mbox cmd response data (8 bytes)
3,148,256 UART: [rt] FIPS self test
3,148,584 UART: [kat] ++
3,148,736 UART: [kat] sha1
3,153,086 UART: [kat] SHA2-256
3,155,068 UART: Fatal Error: 0x90010002
3,156,618 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,156,623 >>> mbox cmd response: failed
3,156,623 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,156,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,159 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,137 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,184 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
894,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,158 UART: [kat] ++
898,310 UART: [kat] sha1
902,398 UART: [kat] SHA2-256
904,338 UART: [kat] SHA2-384
907,089 UART: [kat] SHA2-512-ACC
908,990 UART: [kat] ECC-384
918,699 UART: [kat] HMAC-384Kdf
923,469 UART: [kat] LMS
1,171,797 UART: [kat] --
1,172,588 UART: [cold-reset] ++
1,172,960 UART: [fht] FHT @ 0x50003400
1,175,789 UART: [idev] ++
1,175,957 UART: [idev] CDI.KEYID = 6
1,176,317 UART: [idev] SUBJECT.KEYID = 7
1,176,741 UART: [idev] UDS.KEYID = 0
1,177,086 ready_for_fw is high
1,177,086 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,735 UART: [idev] Erasing UDS.KEYID = 0
1,202,464 UART: [idev] Sha1 KeyId Algorithm
1,211,098 UART: [idev] --
1,212,224 UART: [ldev] ++
1,212,392 UART: [ldev] CDI.KEYID = 6
1,212,755 UART: [ldev] SUBJECT.KEYID = 5
1,213,181 UART: [ldev] AUTHORITY.KEYID = 7
1,213,644 UART: [ldev] FE.KEYID = 1
1,218,910 UART: [ldev] Erasing FE.KEYID = 1
1,245,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,720 UART: [ldev] --
1,285,081 UART: [fwproc] Wait for Commands...
1,285,737 UART: [fwproc] Recv command 0x46574c44
1,286,465 UART: [fwproc] Recv'd Img size: 115304 bytes
2,597,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,624,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,653,748 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,790,939 >>> mbox cmd response: success
2,792,133 UART: [afmc] ++
2,792,301 UART: [afmc] CDI.KEYID = 6
2,792,663 UART: [afmc] SUBJECT.KEYID = 7
2,793,088 UART: [afmc] AUTHORITY.KEYID = 5
2,828,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,845,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,845,798 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,851,526 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,857,411 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,863,130 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,871,088 UART: [afmc] --
2,872,024 UART: [cold-reset] --
2,873,052 UART: [state] Locking Datavault
2,874,247 UART: [state] Locking PCR0, PCR1 and PCR31
2,874,851 UART: [state] Locking ICCM
2,875,333 UART: [exit] Launching FMC @ 0x40000130
2,880,662 UART:
2,880,678 UART: Running Caliptra FMC ...
2,881,086 UART:
2,881,229 UART: [state] CFI Enabled
2,892,172 UART: [fht] FMC Alias Private Key: 7
3,000,295 UART: [art] Extend RT PCRs Done
3,000,723 UART: [art] Lock RT PCRs Done
3,002,539 UART: [art] Populate DV Done
3,010,820 UART: [fht] FMC Alias Private Key: 7
3,011,810 UART: [art] Derive CDI
3,012,090 UART: [art] Store in in slot 0x4
3,097,699 UART: [art] Derive Key Pair
3,098,059 UART: [art] Store priv key in slot 0x5
3,111,557 UART: [art] Derive Key Pair - Done
3,126,604 UART: [art] Signing Cert with AUTHO
3,127,084 UART: RITY.KEYID = 7
3,142,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,181 UART: [art] PUB.X = 637F7B9AE00556ECF70B55A0C9B5E3BD8309610F65D60B08334331E1BD275BFB9D30660C4AAF48DA24590C5A7387DAB7
3,149,935 UART: [art] PUB.Y = 4C9121E15CE1ACDFAE4A07DB3496E435DDBAAC7F263AE5A66C1AA9994D348B36594EC6DDDEBAEE18DCD7405754F115C9
3,156,908 UART: [art] SIG.R = F31A23FF9188B40F4DEAA4036BD43DA220CCDFC3132229A7783B6EE9D6CB85E2AE46C253A105314085D6073DAB1D3C83
3,163,678 UART: [art] SIG.S = 345411C5FD315E01BF671C10DE59F6F63888FCC899416F2D34CBC17B564508F8B26DBE4BD6ECF489DE4D4D08A027DED6
3,187,246 UART: Caliptra RT
3,187,591 UART: [state] CFI Enabled
3,295,492 UART: [rt] RT listening for mailbox commands...
3,296,155 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,810 UART: [rt]cmd =0x46504c54, len=4
3,326,959 >>> mbox cmd response data (8 bytes)
3,327,320 UART: [rt] FIPS self test
3,327,648 UART: [kat] ++
3,327,800 UART: [kat] sha1
3,332,066 UART: [kat] SHA2-256
3,333,966 UART: Fatal Error: 0x90010002
3,335,516 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,521 >>> mbox cmd response: failed
3,335,521 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
902,360 UART: [kat] SHA2-256
904,300 UART: [kat] SHA2-384
907,053 UART: [kat] SHA2-512-ACC
908,954 UART: [kat] ECC-384
918,519 UART: [kat] HMAC-384Kdf
923,209 UART: [kat] LMS
1,171,537 UART: [kat] --
1,172,398 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,567 UART: [idev] ++
1,175,735 UART: [idev] CDI.KEYID = 6
1,176,095 UART: [idev] SUBJECT.KEYID = 7
1,176,519 UART: [idev] UDS.KEYID = 0
1,176,864 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,385 UART: [idev] Erasing UDS.KEYID = 0
1,201,044 UART: [idev] Sha1 KeyId Algorithm
1,209,376 UART: [idev] --
1,210,502 UART: [ldev] ++
1,210,670 UART: [ldev] CDI.KEYID = 6
1,211,033 UART: [ldev] SUBJECT.KEYID = 5
1,211,459 UART: [ldev] AUTHORITY.KEYID = 7
1,211,922 UART: [ldev] FE.KEYID = 1
1,217,036 UART: [ldev] Erasing FE.KEYID = 1
1,243,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,088 UART: [ldev] --
1,283,351 UART: [fwproc] Wait for Commands...
1,284,167 UART: [fwproc] Recv command 0x46574c44
1,284,895 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,204 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,441 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,386 ready_for_fw is high
1,060,386 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,510 >>> mbox cmd response: success
2,701,668 UART:
2,701,684 UART: Running Caliptra FMC ...
2,702,092 UART:
2,702,235 UART: [state] CFI Enabled
2,712,834 UART: [fht] FMC Alias Private Key: 7
2,821,329 UART: [art] Extend RT PCRs Done
2,821,757 UART: [art] Lock RT PCRs Done
2,823,215 UART: [art] Populate DV Done
2,831,356 UART: [fht] FMC Alias Private Key: 7
2,832,502 UART: [art] Derive CDI
2,832,782 UART: [art] Store in in slot 0x4
2,918,731 UART: [art] Derive Key Pair
2,919,091 UART: [art] Store priv key in slot 0x5
2,932,743 UART: [art] Derive Key Pair - Done
2,947,640 UART: [art] Signing Cert with AUTHO
2,948,120 UART: RITY.KEYID = 7
2,963,252 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,017 UART: [art] PUB.X = 0B05C3400825F85B7A660726AF1A1368075CCCF1111B9BC3117607380812420C4405EA7A409BFD3E990286678ECA5F56
2,970,749 UART: [art] PUB.Y = 5E39D6483815BC4614AA37028EF4ADBE16CBEF57CEF1514DC213F9F7A22CC51DCEAD9A54674059C1C650B8374E9B5F6B
2,977,712 UART: [art] SIG.R = A9E74F8F01129D35B77CC1C28258CC0F3C4B4D65BA9DE173FB839D1E1CE9EE669C872EC768B823FA7BE44BF05B6A4820
2,984,492 UART: [art] SIG.S = F6BE1169CE984A00806016B659C3FB4460478201D405988EA8481D8F7C5185AD61E83321EC32B5490E005E835A7E43BB
3,007,770 UART: Caliptra RT
3,008,115 UART: [state] CFI Enabled
3,115,309 UART: [rt] RT listening for mailbox commands...
3,115,972 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,677 UART: [rt]cmd =0x46504c54, len=4
3,146,756 >>> mbox cmd response data (8 bytes)
3,146,913 UART: [rt] FIPS self test
3,147,241 UART: [kat] ++
3,147,393 UART: [kat] sha1
3,151,685 UART: [kat] SHA2-256
3,153,671 UART: Fatal Error: 0x90010002
3,155,221 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,226 >>> mbox cmd response: failed
3,155,226 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,866 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,756 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,502 UART: [state] LifecycleState = Unprovisioned
85,157 UART: [state] DebugLocked = No
85,821 UART: [state] WD Timer not started. Device not locked for debugging
87,138 UART: [kat] SHA2-256
890,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,817 UART: [kat] ++
894,969 UART: [kat] sha1
899,071 UART: [kat] SHA2-256
901,011 UART: [kat] SHA2-384
903,710 UART: [kat] SHA2-512-ACC
905,611 UART: [kat] ECC-384
915,110 UART: [kat] HMAC-384Kdf
919,614 UART: [kat] LMS
1,167,926 UART: [kat] --
1,169,049 UART: [cold-reset] ++
1,169,447 UART: [fht] FHT @ 0x50003400
1,172,223 UART: [idev] ++
1,172,391 UART: [idev] CDI.KEYID = 6
1,172,752 UART: [idev] SUBJECT.KEYID = 7
1,173,177 UART: [idev] UDS.KEYID = 0
1,173,523 ready_for_fw is high
1,173,523 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,121 UART: [idev] Erasing UDS.KEYID = 0
1,197,893 UART: [idev] Sha1 KeyId Algorithm
1,206,799 UART: [idev] --
1,207,732 UART: [ldev] ++
1,207,900 UART: [ldev] CDI.KEYID = 6
1,208,264 UART: [ldev] SUBJECT.KEYID = 5
1,208,691 UART: [ldev] AUTHORITY.KEYID = 7
1,209,154 UART: [ldev] FE.KEYID = 1
1,214,294 UART: [ldev] Erasing FE.KEYID = 1
1,240,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,150 UART: [ldev] --
1,279,464 UART: [fwproc] Wait for Commands...
1,280,085 UART: [fwproc] Recv command 0x46574c44
1,280,818 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,436 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,700 >>> mbox cmd response: success
2,785,795 UART: [afmc] ++
2,785,963 UART: [afmc] CDI.KEYID = 6
2,786,326 UART: [afmc] SUBJECT.KEYID = 7
2,786,752 UART: [afmc] AUTHORITY.KEYID = 5
2,821,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,488 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,217 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,100 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,819 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,522 UART: [afmc] --
2,864,602 UART: [cold-reset] --
2,865,536 UART: [state] Locking Datavault
2,866,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,585 UART: [state] Locking ICCM
2,868,061 UART: [exit] Launching FMC @ 0x40000130
2,873,390 UART:
2,873,406 UART: Running Caliptra FMC ...
2,873,814 UART:
2,873,868 UART: [state] CFI Enabled
2,884,231 UART: [fht] FMC Alias Private Key: 7
2,992,282 UART: [art] Extend RT PCRs Done
2,992,710 UART: [art] Lock RT PCRs Done
2,994,204 UART: [art] Populate DV Done
3,002,429 UART: [fht] FMC Alias Private Key: 7
3,003,551 UART: [art] Derive CDI
3,003,831 UART: [art] Store in in slot 0x4
3,089,542 UART: [art] Derive Key Pair
3,089,902 UART: [art] Store priv key in slot 0x5
3,102,896 UART: [art] Derive Key Pair - Done
3,117,525 UART: [art] Signing Cert with AUTHO
3,118,005 UART: RITY.KEYID = 7
3,133,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,012 UART: [art] PUB.X = 39F2DB468666BF7278CD2450CB4C31E5B4A6A083FA5ED72D1AB396044924FD113018C20C1F9AF8D5578E93766C99CC91
3,140,780 UART: [art] PUB.Y = 2FF227642103C0661DD3C844CB5586E3C37244CB2B358E08F86300329974D55CC1619272B9EA9F7CF70D3DCBB746762B
3,147,697 UART: [art] SIG.R = 36AE651909BDFD397A21A497435A152BE0E6012005367ED2D083D67C8A2FCC7FA4AF5EA6C000EF055CB9AEA2A5B5534B
3,154,447 UART: [art] SIG.S = E895DE42AE2517DDEACE6113F7284EE203E30D402DBA91528D079E7564D3AA2C3AAF001E4991BF8139CD044B884C1843
3,178,218 UART: Caliptra RT
3,178,471 UART: [state] CFI Enabled
3,286,268 UART: [rt] RT listening for mailbox commands...
3,286,931 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,604 UART: [rt]cmd =0x46504c54, len=4
3,317,677 >>> mbox cmd response data (8 bytes)
3,317,840 UART: [rt] FIPS self test
3,318,168 UART: [kat] ++
3,318,320 UART: [kat] sha1
3,322,702 UART: [kat] SHA2-256
3,324,618 UART: Fatal Error: 0x90010002
3,326,168 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,173 >>> mbox cmd response: failed
3,326,173 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,326,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,296 UART: [kat] SHA2-512-ACC
906,197 UART: [kat] ECC-384
915,656 UART: [kat] HMAC-384Kdf
920,110 UART: [kat] LMS
1,168,422 UART: [kat] --
1,168,991 UART: [cold-reset] ++
1,169,545 UART: [fht] FHT @ 0x50003400
1,172,119 UART: [idev] ++
1,172,287 UART: [idev] CDI.KEYID = 6
1,172,648 UART: [idev] SUBJECT.KEYID = 7
1,173,073 UART: [idev] UDS.KEYID = 0
1,173,419 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,180,811 UART: [idev] Erasing UDS.KEYID = 0
1,198,095 UART: [idev] Sha1 KeyId Algorithm
1,207,007 UART: [idev] --
1,208,244 UART: [ldev] ++
1,208,412 UART: [ldev] CDI.KEYID = 6
1,208,776 UART: [ldev] SUBJECT.KEYID = 5
1,209,203 UART: [ldev] AUTHORITY.KEYID = 7
1,209,666 UART: [ldev] FE.KEYID = 1
1,214,894 UART: [ldev] Erasing FE.KEYID = 1
1,241,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,510 UART: [fwproc] Wait for Commands...
1,281,107 UART: [fwproc] Recv command 0x46574c44
1,281,840 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,177 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,486 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,878 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,460 ready_for_fw is high
1,056,460 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,006 >>> mbox cmd response: success
2,696,916 UART:
2,696,932 UART: Running Caliptra FMC ...
2,697,340 UART:
2,697,394 UART: [state] CFI Enabled
2,708,311 UART: [fht] FMC Alias Private Key: 7
2,816,292 UART: [art] Extend RT PCRs Done
2,816,720 UART: [art] Lock RT PCRs Done
2,818,808 UART: [art] Populate DV Done
2,826,947 UART: [fht] FMC Alias Private Key: 7
2,827,957 UART: [art] Derive CDI
2,828,237 UART: [art] Store in in slot 0x4
2,913,716 UART: [art] Derive Key Pair
2,914,076 UART: [art] Store priv key in slot 0x5
2,926,704 UART: [art] Derive Key Pair - Done
2,941,519 UART: [art] Signing Cert with AUTHO
2,941,999 UART: RITY.KEYID = 7
2,956,817 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,582 UART: [art] PUB.X = 25C10BC2157F577F1EABE3545F18B431C69BD604C9E92DFCF1B7A3EF83FFDCE49575138388CFD7D81A537B259AA5E0E0
2,964,362 UART: [art] PUB.Y = 95594FA811ED21CDEDB7E6ED65705F5C9FE7BDC6306120FA5C5916CBF2D01F48414F1E20F86F8ACA5B30EF4F5BAF1EEB
2,971,338 UART: [art] SIG.R = B9254BD91038A8EC78963B24488C6C3853744B7FC120935D0FC924332318866FB7C38A3D33B5FABF3290ED39983DB48F
2,978,103 UART: [art] SIG.S = 74558401D82B5A4A476D633F1C3B2B7D848CB07070D5FFDE4863A3032352B5900D4005659EC7736F2A1F2B8B2537D08A
3,002,334 UART: Caliptra RT
3,002,587 UART: [state] CFI Enabled
3,110,712 UART: [rt] RT listening for mailbox commands...
3,111,375 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,124 UART: [rt]cmd =0x46504c54, len=4
3,142,197 >>> mbox cmd response data (8 bytes)
3,142,532 UART: [rt] FIPS self test
3,142,860 UART: [kat] ++
3,143,012 UART: [kat] sha1
3,147,472 UART: [kat] SHA2-256
3,149,404 UART: Fatal Error: 0x90010002
3,150,954 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,150,959 >>> mbox cmd response: failed
3,150,959 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,150,964 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,582 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,334 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
915,971 UART: [kat] HMAC-384Kdf
920,453 UART: [kat] LMS
1,168,765 UART: [kat] --
1,169,574 UART: [cold-reset] ++
1,169,986 UART: [fht] FHT @ 0x50003400
1,172,506 UART: [idev] ++
1,172,674 UART: [idev] CDI.KEYID = 6
1,173,035 UART: [idev] SUBJECT.KEYID = 7
1,173,460 UART: [idev] UDS.KEYID = 0
1,173,806 ready_for_fw is high
1,173,806 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,268 UART: [idev] Erasing UDS.KEYID = 0
1,198,478 UART: [idev] Sha1 KeyId Algorithm
1,207,506 UART: [idev] --
1,208,491 UART: [ldev] ++
1,208,659 UART: [ldev] CDI.KEYID = 6
1,209,023 UART: [ldev] SUBJECT.KEYID = 5
1,209,450 UART: [ldev] AUTHORITY.KEYID = 7
1,209,913 UART: [ldev] FE.KEYID = 1
1,215,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,109 UART: [ldev] --
1,281,457 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x46574c44
1,282,827 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,591 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,931 >>> mbox cmd response: success
2,788,042 UART: [afmc] ++
2,788,210 UART: [afmc] CDI.KEYID = 6
2,788,573 UART: [afmc] SUBJECT.KEYID = 7
2,788,999 UART: [afmc] AUTHORITY.KEYID = 5
2,824,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,144 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,027 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,467 UART: [afmc] --
2,867,519 UART: [cold-reset] --
2,868,327 UART: [state] Locking Datavault
2,869,606 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,210 UART: [state] Locking ICCM
2,870,884 UART: [exit] Launching FMC @ 0x40000130
2,876,213 UART:
2,876,229 UART: Running Caliptra FMC ...
2,876,637 UART:
2,876,780 UART: [state] CFI Enabled
2,887,617 UART: [fht] FMC Alias Private Key: 7
2,995,606 UART: [art] Extend RT PCRs Done
2,996,034 UART: [art] Lock RT PCRs Done
2,997,648 UART: [art] Populate DV Done
3,005,863 UART: [fht] FMC Alias Private Key: 7
3,006,795 UART: [art] Derive CDI
3,007,075 UART: [art] Store in in slot 0x4
3,092,930 UART: [art] Derive Key Pair
3,093,290 UART: [art] Store priv key in slot 0x5
3,106,448 UART: [art] Derive Key Pair - Done
3,121,187 UART: [art] Signing Cert with AUTHO
3,121,667 UART: RITY.KEYID = 7
3,136,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,598 UART: [art] PUB.X = 8D22F714D09B4653852D76BB2D515ADCA99619B9BD0AEC54EF21F06BE83FCD67C02F6C0F6647C1C171EC0D352749B005
3,144,366 UART: [art] PUB.Y = 64C9933FA9553B642BA92BFB8D8B975798A9CD2E68ACF58499AEF4F15E59ED949C0AC71A7C48D3665AC58E09D74EE89C
3,151,324 UART: [art] SIG.R = CF518E723786A09BD002FD1ED4E0A2E7F821BD9D7B4F9E1B00813B33755E304B1D27825FEBF36B29D64E5859AEBD7EB9
3,158,083 UART: [art] SIG.S = CDE8C59E962AC044486DF5C0A2C15A136DDC5E611A6CD5F2094EE6B1667C9CD8FDCBC7A53D0507E01F9EB56C58D78416
3,181,341 UART: Caliptra RT
3,181,686 UART: [state] CFI Enabled
3,289,278 UART: [rt] RT listening for mailbox commands...
3,289,941 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,936 UART: [rt]cmd =0x46504c54, len=4
3,321,093 >>> mbox cmd response data (8 bytes)
3,321,374 UART: [rt] FIPS self test
3,321,702 UART: [kat] ++
3,321,854 UART: [kat] sha1
3,326,014 UART: [kat] SHA2-256
3,327,910 UART: Fatal Error: 0x90010002
3,329,460 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,329,465 >>> mbox cmd response: failed
3,329,465 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,329,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
900,216 UART: [kat] SHA2-256
902,156 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,103 UART: [kat] LMS
1,169,415 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,684 UART: [fht] FHT @ 0x50003400
1,173,174 UART: [idev] ++
1,173,342 UART: [idev] CDI.KEYID = 6
1,173,703 UART: [idev] SUBJECT.KEYID = 7
1,174,128 UART: [idev] UDS.KEYID = 0
1,174,474 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,580 UART: [idev] Sha1 KeyId Algorithm
1,208,410 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,781 UART: [fwproc] Wait for Commands...
1,282,400 UART: [fwproc] Recv command 0x46574c44
1,283,133 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,155 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,417 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,945 ready_for_fw is high
1,055,945 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,935 >>> mbox cmd response: success
2,699,289 UART:
2,699,305 UART: Running Caliptra FMC ...
2,699,713 UART:
2,699,856 UART: [state] CFI Enabled
2,710,461 UART: [fht] FMC Alias Private Key: 7
2,818,596 UART: [art] Extend RT PCRs Done
2,819,024 UART: [art] Lock RT PCRs Done
2,820,526 UART: [art] Populate DV Done
2,828,609 UART: [fht] FMC Alias Private Key: 7
2,829,643 UART: [art] Derive CDI
2,829,923 UART: [art] Store in in slot 0x4
2,915,340 UART: [art] Derive Key Pair
2,915,700 UART: [art] Store priv key in slot 0x5
2,929,330 UART: [art] Derive Key Pair - Done
2,943,977 UART: [art] Signing Cert with AUTHO
2,944,457 UART: RITY.KEYID = 7
2,960,133 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,898 UART: [art] PUB.X = 0C4A49085F15DE14F7401E31B3F47013029C6DC9AFE67773129CCAEF8E3AD1B203D791D0632DC66ADF43A71B3746B37E
2,967,664 UART: [art] PUB.Y = 6D7B3941F9DA7904A618B0A5FCBFB5F2E0E7EEACB86E3A7F6C88E3814C2705CAAEC30927E4E06F366F9F67531EC19C50
2,974,623 UART: [art] SIG.R = 948DB24B1E4C5A43CD1F5805CF901EFF00150C3E9977219B29C5A89A5DCD736C3EC66EF4E13A8C84A8E2C6C53D01EE03
2,981,373 UART: [art] SIG.S = DE6E760A65E5DA45CEDAB638CF8956483E1B0B12BDEFE8A6B14BB228EAB7B91C963A4B27E9D5AAD064DFD073D3082AC4
3,005,351 UART: Caliptra RT
3,005,696 UART: [state] CFI Enabled
3,113,382 UART: [rt] RT listening for mailbox commands...
3,114,045 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,098 UART: [rt]cmd =0x46504c54, len=4
3,145,319 >>> mbox cmd response data (8 bytes)
3,145,684 UART: [rt] FIPS self test
3,146,012 UART: [kat] ++
3,146,164 UART: [kat] sha1
3,150,346 UART: [kat] SHA2-256
3,152,286 UART: Fatal Error: 0x90010002
3,153,836 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,841 >>> mbox cmd response: failed
3,153,841 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,846 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,585 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,343 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,851 writing to cptra_bootfsm_go
2,698,975 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,843,202 >>> mbox cmd response: failed
2,843,808 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,987,751 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
4,864,100 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,427,023 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
2,683,441 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,827,602 >>> mbox cmd response: failed
2,828,173 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,971,520 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
4,868,182 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,442,869 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,621 writing to cptra_bootfsm_go
3,054,141 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,198,400 >>> mbox cmd response: failed
3,198,967 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,342,290 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
21,589,812 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,019,645 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,036,311 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,180,344 >>> mbox cmd response: failed
3,180,901 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,324,245 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
21,579,540 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,014,967 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
2,691,583 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,836,472 >>> mbox cmd response: failed
2,837,052 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,980,996 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,457,479 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,265,483 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,063 writing to cptra_bootfsm_go
2,706,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,850,676 >>> mbox cmd response: failed
2,851,243 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,994,979 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,429,488 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,239,830 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,058,089 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,202,735 >>> mbox cmd response: failed
3,203,310 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,347,537 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
20,178,649 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,912,199 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
3,054,171 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,199,164 >>> mbox cmd response: failed
3,199,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,343,513 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
20,179,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,921,222 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
2,694,599 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,839,255 >>> mbox cmd response: failed
2,839,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,983,618 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,440,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,260,684 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,064,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,209,433 >>> mbox cmd response: failed
3,210,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,354,437 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
20,166,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,896,320 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,710 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,718 >>> mbox cmd response: failed
811,718 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,724 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,409 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,440 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,496 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,504 >>> mbox cmd response: failed
811,504 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,641 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,394 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,157 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,165 >>> mbox cmd response: failed
812,165 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,730 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,311 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,881 >>> mbox cmd response: failed
811,881 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,330 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,801 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,728 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,736 >>> mbox cmd response: failed
811,736 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,623 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,856 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,936 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,944 >>> mbox cmd response: failed
811,944 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,694 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,929 >>> mbox cmd response: failed
811,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,744 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,523 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,663 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,671 >>> mbox cmd response: failed
812,671 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,137 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,280 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,288 >>> mbox cmd response: failed
812,288 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,403 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,454 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,010 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,018 >>> mbox cmd response: failed
812,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,319 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,142 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,997 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,005 >>> mbox cmd response: failed
812,005 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,722 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,373 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,577 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,585 >>> mbox cmd response: failed
812,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,802 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,585 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,085 UART:
192,459 UART: Running Caliptra ROM ...
193,555 UART:
193,699 UART: [state] CFI Enabled
262,804 UART: [state] LifecycleState = Unprovisioned
264,787 UART: [state] DebugLocked = No
267,092 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,752 UART: [kat] SHA2-256
441,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,936 UART: [kat] ++
452,384 UART: [kat] sha1
463,472 UART: [kat] SHA2-256
466,127 UART: [kat] SHA2-384
472,788 UART: [kat] SHA2-512-ACC
475,140 UART: [kat] ECC-384
2,766,888 UART: [kat] HMAC-384Kdf
2,779,776 UART: [kat] LMS
3,970,094 UART: [kat] --
3,975,259 UART: [cold-reset] ++
3,976,198 UART: [fht] Storing FHT @ 0x50003400
3,987,890 UART: [idev] ++
3,988,528 UART: [idev] CDI.KEYID = 6
3,989,415 UART: [idev] SUBJECT.KEYID = 7
3,990,664 UART: [idev] UDS.KEYID = 0
3,991,814 ready_for_fw is high
3,992,061 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,136,650 UART: [idev] Erasing UDS.KEYID = 0
7,325,770 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,961 UART: [idev] --
7,352,880 UART: [ldev] ++
7,353,489 UART: [ldev] CDI.KEYID = 6
7,354,405 UART: [ldev] SUBJECT.KEYID = 5
7,355,629 UART: [ldev] AUTHORITY.KEYID = 7
7,356,868 UART: [ldev] FE.KEYID = 1
7,401,651 UART: [ldev] Erasing FE.KEYID = 1
10,735,568 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,427 UART: [ldev] --
13,115,459 UART: [fwproc] Waiting for Commands...
13,118,383 UART: [fwproc] Received command 0x46574c44
13,120,571 UART: [fwproc] Received Image of size 114996 bytes
17,181,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,257,971 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,326,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,646,795 >>> mbox cmd response: success
17,650,832 UART: [afmc] ++
17,651,425 UART: [afmc] CDI.KEYID = 6
17,652,336 UART: [afmc] SUBJECT.KEYID = 7
17,653,605 UART: [afmc] AUTHORITY.KEYID = 5
21,009,199 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,949 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,261 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,652 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,471 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,968 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,941 UART: [afmc] --
23,379,215 UART: [cold-reset] --
23,384,429 UART: [state] Locking Datavault
23,389,630 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,383 UART: [state] Locking ICCM
23,392,665 UART: [exit] Launching FMC @ 0x40000130
23,401,064 UART:
23,401,304 UART: Running Caliptra FMC ...
23,402,408 UART:
23,402,570 UART: [state] CFI Enabled
23,471,041 UART: [fht] FMC Alias Private Key: 7
25,809,232 UART: [art] Extend RT PCRs Done
25,810,496 UART: [art] Lock RT PCRs Done
25,812,097 UART: [art] Populate DV Done
25,817,469 UART: [fht] FMC Alias Private Key: 7
25,819,036 UART: [art] Derive CDI
25,819,861 UART: [art] Store in in slot 0x4
25,880,381 UART: [art] Derive Key Pair
25,881,421 UART: [art] Store priv key in slot 0x5
29,173,871 UART: [art] Derive Key Pair - Done
29,186,648 UART: [art] Signing Cert with AUTHO
29,187,949 UART: RITY.KEYID = 7
31,475,978 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,483 UART: [art] PUB.X = 595DF41013A1B9C7397B9619166CC84BE2F22BAB8544E5A83376A7D008B4E46B6D7BFEAD4D9F357323B16D09F108294A
31,484,687 UART: [art] PUB.Y = 8E07F6410B61BD1BF18C7D989DEE68EB837D94640929EE687AC9AD98CB416BC414C17BE6779BC25EB7718E77CC0984AF
31,491,983 UART: [art] SIG.R = 8544CFCABC2C5A5AAE7E42CB88C919FE24FBD208C0C6EDB028611E590DBD8C6D92263518D85003127CAE092C4237A03C
31,499,326 UART: [art] SIG.S = 62B9E19303059CB2B60FB3502432B7CB14CBEE124289F6881E8208341BA01769F04BB7BA46B97F1AD62CBACE26986B07
32,804,820 UART: Caliptra RT
32,805,534 UART: [state] CFI Enabled
32,967,652 UART: [rt] RT listening for mailbox commands...
32,969,516 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,999,219 UART: [rt]cmd =0x46504c54, len=4
33,000,964 >>> mbox cmd response data (8 bytes)
33,001,794 UART: [rt] FIPS self test
33,002,750 UART: [kat] ++
33,003,204 UART: [kat] sha1
33,007,613 UART: [kat] SHA2-256
33,009,549 UART: [kat] SHA2-384
33,012,696 UART: [kat] SHA2-512-ACC
33,013,584 UART: Droping operation
33,014,359 UART: Fatal Error: 0x90050002
33,049,605 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,194,114 >>> mbox cmd response: failed
33,194,732 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,338,996 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
190,015 UART:
190,309 UART: Running Caliptra ROM ...
191,334 UART:
191,474 UART: [state] CFI Enabled
247,212 UART: [state] LifecycleState = Unprovisioned
249,151 UART: [state] DebugLocked = No
250,741 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
255,071 UART: [kat] SHA2-256
424,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
435,298 UART: [kat] ++
435,744 UART: [kat] sha1
445,378 UART: [kat] SHA2-256
448,056 UART: [kat] SHA2-384
455,007 UART: [kat] SHA2-512-ACC
457,406 UART: [kat] ECC-384
2,752,137 UART: [kat] HMAC-384Kdf
2,765,569 UART: [kat] LMS
3,955,844 UART: [kat] --
3,959,354 UART: [cold-reset] ++
3,961,446 UART: [fht] Storing FHT @ 0x50003400
3,974,172 UART: [idev] ++
3,974,745 UART: [idev] CDI.KEYID = 6
3,975,712 UART: [idev] SUBJECT.KEYID = 7
3,976,924 UART: [idev] UDS.KEYID = 0
3,978,495 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,123,176 UART: [idev] Erasing UDS.KEYID = 0
7,313,246 UART: [idev] Using Sha1 for KeyId Algorithm
7,335,033 UART: [idev] --
7,339,411 UART: [ldev] ++
7,339,996 UART: [ldev] CDI.KEYID = 6
7,340,881 UART: [ldev] SUBJECT.KEYID = 5
7,342,152 UART: [ldev] AUTHORITY.KEYID = 7
7,343,490 UART: [ldev] FE.KEYID = 1
7,390,454 UART: [ldev] Erasing FE.KEYID = 1
10,725,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,051,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,066,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,473 UART: [ldev] --
13,105,147 UART: [fwproc] Waiting for Commands...
13,108,000 UART: [fwproc] Received command 0x46574c44
13,110,248 UART: [fwproc] Received Image of size 114996 bytes
17,175,896 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,939 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,848 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,640,591 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,782,780 ready_for_fw is high
3,783,325 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,867,496 >>> mbox cmd response: success
23,563,226 UART:
23,563,620 UART: Running Caliptra FMC ...
23,564,766 UART:
23,564,931 UART: [state] CFI Enabled
23,632,440 UART: [fht] FMC Alias Private Key: 7
25,970,567 UART: [art] Extend RT PCRs Done
25,972,033 UART: [art] Lock RT PCRs Done
25,973,545 UART: [art] Populate DV Done
25,978,975 UART: [fht] FMC Alias Private Key: 7
25,980,471 UART: [art] Derive CDI
25,981,220 UART: [art] Store in in slot 0x4
26,040,752 UART: [art] Derive Key Pair
26,041,761 UART: [art] Store priv key in slot 0x5
29,334,565 UART: [art] Derive Key Pair - Done
29,347,574 UART: [art] Signing Cert with AUTHO
29,348,941 UART: RITY.KEYID = 7
31,635,645 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,165 UART: [art] PUB.X = 39317BE129E01A78430B00B1B0A1DDF8DD04507CE3934F8A408A96AE507CCC0E53C6A8EDF0C5C0297A3E07CC974A4DFF
31,644,424 UART: [art] PUB.Y = BFDBB497B0740A4288630E776153DCE3FF095120324735BC0E26A538983C9936020EA99002B024E2B5E971C4FC195266
31,651,630 UART: [art] SIG.R = 865288B2884C96AF5F9788BDA529B5DEDB7D7C45F863C3CE8E18EC33E73C0C3EE1A053961D90FD5F06BFB1DE924D59E0
31,659,064 UART: [art] SIG.S = 8E2094BE5A262E660933A89A7422A06A3CE775E00FFAC485BB60E3B26ED6578602A7E471F774CA8480584503653ABAAD
32,964,358 UART: Caliptra RT
32,965,073 UART: [state] CFI Enabled
33,146,155 UART: [rt] RT listening for mailbox commands...
33,148,023 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,177,834 UART: [rt]cmd =0x46504c54, len=4
33,179,616 >>> mbox cmd response data (8 bytes)
33,180,703 UART: [rt] FIPS self test
33,181,650 UART: [kat] ++
33,182,102 UART: [kat] sha1
33,186,778 UART: [kat] SHA2-256
33,188,725 UART: [kat] SHA2-384
33,191,584 UART: [kat] SHA2-512-ACC
33,192,528 UART: Droping operation
33,193,304 UART: Fatal Error: 0x90050002
33,228,414 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,372,907 >>> mbox cmd response: failed
33,373,567 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,517,911 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,790,523 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,873,487 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,369 UART:
192,730 UART: Running Caliptra ROM ...
193,866 UART:
603,704 UART: [state] CFI Enabled
619,509 UART: [state] LifecycleState = Unprovisioned
621,404 UART: [state] DebugLocked = No
624,218 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,974 UART: [kat] SHA2-256
798,723 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,278 UART: [kat] ++
809,815 UART: [kat] sha1
820,985 UART: [kat] SHA2-256
823,720 UART: [kat] SHA2-384
830,917 UART: [kat] SHA2-512-ACC
833,287 UART: [kat] ECC-384
3,114,871 UART: [kat] HMAC-384Kdf
3,126,559 UART: [kat] LMS
4,316,663 UART: [kat] --
4,320,107 UART: [cold-reset] ++
4,322,133 UART: [fht] Storing FHT @ 0x50003400
4,334,472 UART: [idev] ++
4,335,109 UART: [idev] CDI.KEYID = 6
4,336,030 UART: [idev] SUBJECT.KEYID = 7
4,337,305 UART: [idev] UDS.KEYID = 0
4,338,263 ready_for_fw is high
4,338,507 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,483,021 UART: [idev] Erasing UDS.KEYID = 0
7,623,006 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,180 UART: [idev] --
7,646,629 UART: [ldev] ++
7,647,211 UART: [ldev] CDI.KEYID = 6
7,648,122 UART: [ldev] SUBJECT.KEYID = 5
7,649,339 UART: [ldev] AUTHORITY.KEYID = 7
7,650,625 UART: [ldev] FE.KEYID = 1
7,661,974 UART: [ldev] Erasing FE.KEYID = 1
10,950,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,520 UART: [ldev] --
13,309,088 UART: [fwproc] Waiting for Commands...
13,311,783 UART: [fwproc] Received command 0x46574c44
13,313,968 UART: [fwproc] Received Image of size 114996 bytes
17,376,514 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,426 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,290 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,842,054 >>> mbox cmd response: success
17,846,247 UART: [afmc] ++
17,846,844 UART: [afmc] CDI.KEYID = 6
17,847,940 UART: [afmc] SUBJECT.KEYID = 7
17,849,044 UART: [afmc] AUTHORITY.KEYID = 5
21,168,442 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,463,600 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,465,864 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,480,296 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,495,118 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,509,538 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,531,870 UART: [afmc] --
23,535,362 UART: [cold-reset] --
23,541,328 UART: [state] Locking Datavault
23,545,547 UART: [state] Locking PCR0, PCR1 and PCR31
23,547,300 UART: [state] Locking ICCM
23,548,693 UART: [exit] Launching FMC @ 0x40000130
23,557,087 UART:
23,557,328 UART: Running Caliptra FMC ...
23,558,643 UART:
23,558,813 UART: [state] CFI Enabled
23,566,704 UART: [fht] FMC Alias Private Key: 7
25,897,455 UART: [art] Extend RT PCRs Done
25,898,687 UART: [art] Lock RT PCRs Done
25,900,255 UART: [art] Populate DV Done
25,905,892 UART: [fht] FMC Alias Private Key: 7
25,907,593 UART: [art] Derive CDI
25,908,331 UART: [art] Store in in slot 0x4
25,951,030 UART: [art] Derive Key Pair
25,952,036 UART: [art] Store priv key in slot 0x5
29,193,569 UART: [art] Derive Key Pair - Done
29,206,626 UART: [art] Signing Cert with AUTHO
29,207,930 UART: RITY.KEYID = 7
31,487,645 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,161 UART: [art] PUB.X = D24FE5D9832FF48E3893A8465B618EC8AA4D0A0AABF7DFA72E3DE3F3A86F54B77B0B757905AB529FE45A6EB213FA7FE5
31,496,416 UART: [art] PUB.Y = A7A57E370757723FC92F07AE467D29068A076682C9DEEF923C7A102C6393B65F07C0B5841B83F2CEAE9E6663116FC75C
31,503,658 UART: [art] SIG.R = 618172375FE0A1EA90CD487AFBF26F7E396C3DF0BB9D84FD897A05540E72BDDE1539AC69FC662C4312634E3737A214F0
31,511,057 UART: [art] SIG.S = 50B04F5FF4E51D7456AF228EE43B9161F0FE90BFD4DD990B38E31216CA1203F8B61850687C27786FC4764F928AB97BA2
32,815,838 UART: Caliptra RT
32,816,546 UART: [state] CFI Enabled
32,934,176 UART: [rt] RT listening for mailbox commands...
32,936,025 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,965,860 UART: [rt]cmd =0x46504c54, len=4
32,967,489 >>> mbox cmd response data (8 bytes)
32,968,666 UART: [rt] FIPS self test
32,969,610 UART: [kat] ++
32,970,062 UART: [kat] sha1
32,974,521 UART: [kat] SHA2-256
32,976,500 UART: [kat] SHA2-384
32,979,297 UART: [kat] SHA2-512-ACC
32,980,178 UART: Droping operation
32,980,946 UART: Fatal Error: 0x90050002
33,016,186 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,160,622 >>> mbox cmd response: failed
33,161,224 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,305,824 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,034 UART:
190,336 UART: Running Caliptra ROM ...
191,365 UART:
7,231,726 UART: [state] CFI Enabled
7,247,778 UART: [state] LifecycleState = Unprovisioned
7,249,689 UART: [state] DebugLocked = No
7,252,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,256,361 UART: [kat] SHA2-256
7,426,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,436,636 UART: [kat] ++
7,437,181 UART: [kat] sha1
7,449,482 UART: [kat] SHA2-256
7,452,180 UART: [kat] SHA2-384
7,457,559 UART: [kat] SHA2-512-ACC
7,459,940 UART: [kat] ECC-384
9,743,474 UART: [kat] HMAC-384Kdf
9,756,457 UART: [kat] LMS
10,946,564 UART: [kat] --
10,948,789 UART: [cold-reset] ++
10,949,915 UART: [fht] Storing FHT @ 0x50003400
10,960,693 UART: [idev] ++
10,961,256 UART: [idev] CDI.KEYID = 6
10,962,272 UART: [idev] SUBJECT.KEYID = 7
10,963,383 UART: [idev] UDS.KEYID = 0
10,965,075 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,109,437 UART: [idev] Erasing UDS.KEYID = 0
14,248,159 UART: [idev] Using Sha1 for KeyId Algorithm
14,270,062 UART: [idev] --
14,274,139 UART: [ldev] ++
14,274,772 UART: [ldev] CDI.KEYID = 6
14,275,698 UART: [ldev] SUBJECT.KEYID = 5
14,276,916 UART: [ldev] AUTHORITY.KEYID = 7
14,278,147 UART: [ldev] FE.KEYID = 1
14,288,738 UART: [ldev] Erasing FE.KEYID = 1
17,576,278 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,868,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,883,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,897,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,912,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,931,486 UART: [ldev] --
19,935,929 UART: [fwproc] Waiting for Commands...
19,939,281 UART: [fwproc] Received command 0x46574c44
19,941,538 UART: [fwproc] Received Image of size 114996 bytes
24,003,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,088,410 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,157,283 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,478,265 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
4,126,317 ready_for_fw is high
4,126,768 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,093,906 >>> mbox cmd response: success
23,731,750 UART:
23,732,165 UART: Running Caliptra FMC ...
23,733,309 UART:
23,733,476 UART: [state] CFI Enabled
23,741,154 UART: [fht] FMC Alias Private Key: 7
26,071,818 UART: [art] Extend RT PCRs Done
26,073,052 UART: [art] Lock RT PCRs Done
26,074,686 UART: [art] Populate DV Done
26,080,214 UART: [fht] FMC Alias Private Key: 7
26,081,917 UART: [art] Derive CDI
26,082,764 UART: [art] Store in in slot 0x4
26,125,457 UART: [art] Derive Key Pair
26,126,511 UART: [art] Store priv key in slot 0x5
29,368,549 UART: [art] Derive Key Pair - Done
29,381,982 UART: [art] Signing Cert with AUTHO
29,383,483 UART: RITY.KEYID = 7
31,662,819 UART: [art] Erasing AUTHORITY.KEYID = 7
31,664,333 UART: [art] PUB.X = 73AFCA14170DB036387133B170886EA60CCABA3BFC98F89A6750FAB0B797FC434B547722EBA961478D5976CF486BC21D
31,671,554 UART: [art] PUB.Y = D72DF26BFE69D87237C8840F008BBF7027665D56089E12016D724D44FA6F1FF91B4EE08C38B19A893EFAA8CC16BD0435
31,678,816 UART: [art] SIG.R = A1F47162EB43DE07AFA84FD1CD306FE0B5A4DAEDCE0E76A776AB7B07753F7F8C1F7FFD938E6D44DA6CA6E5FA2295FFE1
31,686,215 UART: [art] SIG.S = B60E99FC15CF4958E33EA0643C8F36521EB3140FD6F97258923599EAF27B5C7BFCD16525BFAD48CA9BE0F9D715D0926F
32,991,857 UART: Caliptra RT
32,992,562 UART: [state] CFI Enabled
33,111,026 UART: [rt] RT listening for mailbox commands...
33,112,877 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,142,446 UART: [rt]cmd =0x46504c54, len=4
33,143,858 >>> mbox cmd response data (8 bytes)
33,144,914 UART: [rt] FIPS self test
33,145,866 UART: [kat] ++
33,146,317 UART: [kat] sha1
33,150,884 UART: [kat] SHA2-256
33,152,868 UART: [kat] SHA2-384
33,155,938 UART: [kat] SHA2-512-ACC
33,156,887 UART: Droping operation
33,157,659 UART: Fatal Error: 0x90050002
33,192,808 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,337,229 >>> mbox cmd response: failed
33,337,891 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,482,648 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
10,581,722 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,529,451 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
192,504 UART:
192,898 UART: Running Caliptra ROM ...
194,069 UART:
194,218 UART: [state] CFI Enabled
267,271 UART: [state] LifecycleState = Unprovisioned
269,178 UART: [state] DebugLocked = No
271,147 UART: [state] WD Timer not started. Device not locked for debugging
275,109 UART: [kat] SHA2-256
454,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,839 UART: [kat] ++
466,378 UART: [kat] sha1
477,423 UART: [kat] SHA2-256
480,440 UART: [kat] SHA2-384
487,643 UART: [kat] SHA2-512-ACC
490,594 UART: [kat] ECC-384
2,951,351 UART: [kat] HMAC-384Kdf
2,972,350 UART: [kat] LMS
3,501,840 UART: [kat] --
3,505,719 UART: [cold-reset] ++
3,506,666 UART: [fht] FHT @ 0x50003400
3,518,649 UART: [idev] ++
3,519,218 UART: [idev] CDI.KEYID = 6
3,520,255 UART: [idev] SUBJECT.KEYID = 7
3,521,364 UART: [idev] UDS.KEYID = 0
3,522,296 ready_for_fw is high
3,522,495 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,667,594 UART: [idev] Erasing UDS.KEYID = 0
6,027,803 UART: [idev] Sha1 KeyId Algorithm
6,052,281 UART: [idev] --
6,056,603 UART: [ldev] ++
6,057,178 UART: [ldev] CDI.KEYID = 6
6,058,092 UART: [ldev] SUBJECT.KEYID = 5
6,059,254 UART: [ldev] AUTHORITY.KEYID = 7
6,060,545 UART: [ldev] FE.KEYID = 1
6,101,389 UART: [ldev] Erasing FE.KEYID = 1
8,603,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,486 UART: [ldev] --
10,414,939 UART: [fwproc] Wait for Commands...
10,416,765 UART: [fwproc] Recv command 0x46574c44
10,418,880 UART: [fwproc] Recv'd Img size: 115304 bytes
13,841,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,599 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,985,411 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,306,824 >>> mbox cmd response: success
14,311,709 UART: [afmc] ++
14,312,298 UART: [afmc] CDI.KEYID = 6
14,313,222 UART: [afmc] SUBJECT.KEYID = 7
14,314,388 UART: [afmc] AUTHORITY.KEYID = 5
16,848,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,590,060 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,606,092 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,621,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,645,283 UART: [afmc] --
18,648,247 UART: [cold-reset] --
18,650,811 UART: [state] Locking Datavault
18,657,840 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,482 UART: [state] Locking ICCM
18,660,756 UART: [exit] Launching FMC @ 0x40000130
18,669,170 UART:
18,669,421 UART: Running Caliptra FMC ...
18,670,457 UART:
18,670,604 UART: [state] CFI Enabled
18,731,560 UART: [fht] FMC Alias Private Key: 7
20,495,513 UART: [art] Extend RT PCRs Done
20,496,744 UART: [art] Lock RT PCRs Done
20,498,015 UART: [art] Populate DV Done
20,503,434 UART: [fht] FMC Alias Private Key: 7
20,504,901 UART: [art] Derive CDI
20,505,636 UART: [art] Store in in slot 0x4
20,564,375 UART: [art] Derive Key Pair
20,565,378 UART: [art] Store priv key in slot 0x5
23,028,526 UART: [art] Derive Key Pair - Done
23,041,692 UART: [art] Signing Cert with AUTHO
23,042,991 UART: RITY.KEYID = 7
24,753,909 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,416 UART: [art] PUB.X = A6FFEC5A24874389A91D6F822A72F6578D7D9F077458629B77E889E5F8E45AACEB541610991D2A7633876C3BF8DB87AA
24,762,668 UART: [art] PUB.Y = 8E91F1FC8AF1818D055107D4D6EA0A40400B5867E8570AC74BD5919CBE74B2886510C7A2476FB14B78FA6EC52E7B5965
24,769,959 UART: [art] SIG.R = 178F3D31B0591E680A4AFDF13554C862E8867C26D66C696ADC0D7F74CA166CB89F8FAAD377D4A5B61BA371210D1C8126
24,777,306 UART: [art] SIG.S = 03097E5E38537AEC326A6551602045F32130CF2BAF26DF7D3D24F1DE5FC6913A82C65B990AF352E7612F2839A3BC452F
25,755,820 UART: Caliptra RT
25,756,523 UART: [state] CFI Enabled
25,921,156 UART: [rt] RT listening for mailbox commands...
25,923,003 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,952,577 UART: [rt]cmd =0x46504c54, len=4
25,954,137 >>> mbox cmd response data (8 bytes)
25,955,248 UART: [rt] FIPS self test
25,956,201 UART: [kat] ++
25,956,652 UART: [kat] sha1
25,961,040 UART: [kat] SHA2-256
25,962,975 UART: [kat] SHA2-384
25,965,882 UART: [kat] SHA2-512-ACC
25,966,775 UART: Droping operation
25,967,543 UART: Fatal Error: 0x90050002
26,002,690 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,147,956 >>> mbox cmd response: failed
26,148,648 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,293,425 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,108 UART:
190,398 UART: Running Caliptra ROM ...
191,442 UART:
191,583 UART: [state] CFI Enabled
248,618 UART: [state] LifecycleState = Unprovisioned
250,485 UART: [state] DebugLocked = No
251,834 UART: [state] WD Timer not started. Device not locked for debugging
255,230 UART: [kat] SHA2-256
434,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
445,938 UART: [kat] ++
446,571 UART: [kat] sha1
456,480 UART: [kat] SHA2-256
459,493 UART: [kat] SHA2-384
466,008 UART: [kat] SHA2-512-ACC
469,002 UART: [kat] ECC-384
2,933,818 UART: [kat] HMAC-384Kdf
2,954,630 UART: [kat] LMS
3,484,079 UART: [kat] --
3,489,054 UART: [cold-reset] ++
3,490,535 UART: [fht] FHT @ 0x50003400
3,501,576 UART: [idev] ++
3,502,140 UART: [idev] CDI.KEYID = 6
3,503,045 UART: [idev] SUBJECT.KEYID = 7
3,504,260 UART: [idev] UDS.KEYID = 0
3,505,769 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,650,811 UART: [idev] Erasing UDS.KEYID = 0
6,011,697 UART: [idev] Sha1 KeyId Algorithm
6,033,477 UART: [idev] --
6,036,071 UART: [ldev] ++
6,036,648 UART: [ldev] CDI.KEYID = 6
6,037,560 UART: [ldev] SUBJECT.KEYID = 5
6,038,784 UART: [ldev] AUTHORITY.KEYID = 7
6,040,023 UART: [ldev] FE.KEYID = 1
6,082,167 UART: [ldev] Erasing FE.KEYID = 1
8,582,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,829 UART: [ldev] --
10,372,846 UART: [fwproc] Wait for Commands...
10,375,334 UART: [fwproc] Recv command 0x46574c44
10,377,433 UART: [fwproc] Recv'd Img size: 115304 bytes
13,796,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,844 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,661 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,261,022 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
3,381,510 ready_for_fw is high
3,381,899 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,067,414 >>> mbox cmd response: success
18,342,831 UART:
18,343,227 UART: Running Caliptra FMC ...
18,344,378 UART:
18,344,546 UART: [state] CFI Enabled
18,413,222 UART: [fht] FMC Alias Private Key: 7
20,176,428 UART: [art] Extend RT PCRs Done
20,177,655 UART: [art] Lock RT PCRs Done
20,179,723 UART: [art] Populate DV Done
20,184,786 UART: [fht] FMC Alias Private Key: 7
20,186,480 UART: [art] Derive CDI
20,187,291 UART: [art] Store in in slot 0x4
20,245,683 UART: [art] Derive Key Pair
20,246,717 UART: [art] Store priv key in slot 0x5
22,709,814 UART: [art] Derive Key Pair - Done
22,722,485 UART: [art] Signing Cert with AUTHO
22,723,787 UART: RITY.KEYID = 7
24,435,361 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,860 UART: [art] PUB.X = 14EF05D837501D44A862A7EF948B625CF881D61FAD82DE6807C5BF4EBB8D4C353118EE34DF7191A02C874AA68FE82F37
24,444,117 UART: [art] PUB.Y = BA0BE12BCEFA298E42C231D9445277768E26D3C74A5391F7398B3EBDA8960FB48C8559BDF255E59A9152A54558B150A3
24,451,389 UART: [art] SIG.R = B44CC73EB9D7A1E844A70F0984F4AA9D0E476DB78077EADD24799EB4B28DA8F2E6B44A24B65C359B530D1ECB4264BCB0
24,458,801 UART: [art] SIG.S = 56EF886FF189BD164E655FCB2A23DBFCD966272DF5991B27451549A231EB78164914A01D3E72EB1AA93BA064D1EBF036
25,436,718 UART: Caliptra RT
25,437,424 UART: [state] CFI Enabled
25,603,585 UART: [rt] RT listening for mailbox commands...
25,605,427 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,635,164 UART: [rt]cmd =0x46504c54, len=4
25,636,796 >>> mbox cmd response data (8 bytes)
25,637,851 UART: [rt] FIPS self test
25,638,785 UART: [kat] ++
25,639,233 UART: [kat] sha1
25,643,523 UART: [kat] SHA2-256
25,645,448 UART: [kat] SHA2-384
25,648,517 UART: [kat] SHA2-512-ACC
25,649,440 UART: Droping operation
25,650,211 UART: Fatal Error: 0x90050002
25,685,446 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,830,334 >>> mbox cmd response: failed
25,831,025 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,975,625 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,349,307 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,029,540 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,567 UART:
192,947 UART: Running Caliptra ROM ...
194,071 UART:
603,850 UART: [state] CFI Enabled
617,310 UART: [state] LifecycleState = Unprovisioned
619,187 UART: [state] DebugLocked = No
621,714 UART: [state] WD Timer not started. Device not locked for debugging
626,170 UART: [kat] SHA2-256
805,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,864 UART: [kat] ++
817,418 UART: [kat] sha1
828,657 UART: [kat] SHA2-256
831,737 UART: [kat] SHA2-384
838,013 UART: [kat] SHA2-512-ACC
840,958 UART: [kat] ECC-384
3,284,131 UART: [kat] HMAC-384Kdf
3,296,236 UART: [kat] LMS
3,825,741 UART: [kat] --
3,830,334 UART: [cold-reset] ++
3,831,635 UART: [fht] FHT @ 0x50003400
3,842,132 UART: [idev] ++
3,842,700 UART: [idev] CDI.KEYID = 6
3,843,628 UART: [idev] SUBJECT.KEYID = 7
3,844,804 UART: [idev] UDS.KEYID = 0
3,846,406 ready_for_fw is high
3,846,663 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,991,471 UART: [idev] Erasing UDS.KEYID = 0
6,319,208 UART: [idev] Sha1 KeyId Algorithm
6,342,612 UART: [idev] --
6,345,777 UART: [ldev] ++
6,346,358 UART: [ldev] CDI.KEYID = 6
6,347,272 UART: [ldev] SUBJECT.KEYID = 5
6,348,432 UART: [ldev] AUTHORITY.KEYID = 7
6,349,722 UART: [ldev] FE.KEYID = 1
6,361,451 UART: [ldev] Erasing FE.KEYID = 1
8,830,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,750 UART: [ldev] --
10,620,093 UART: [fwproc] Wait for Commands...
10,623,288 UART: [fwproc] Recv command 0x46574c44
10,625,328 UART: [fwproc] Recv'd Img size: 115304 bytes
14,043,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,184,011 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,505,074 >>> mbox cmd response: success
14,508,867 UART: [afmc] ++
14,509,475 UART: [afmc] CDI.KEYID = 6
14,510,389 UART: [afmc] SUBJECT.KEYID = 7
14,511,547 UART: [afmc] AUTHORITY.KEYID = 5
17,015,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,737,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,738,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,754,652 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,770,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,786,527 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,810,035 UART: [afmc] --
18,813,297 UART: [cold-reset] --
18,818,090 UART: [state] Locking Datavault
18,823,933 UART: [state] Locking PCR0, PCR1 and PCR31
18,825,632 UART: [state] Locking ICCM
18,827,706 UART: [exit] Launching FMC @ 0x40000130
18,836,095 UART:
18,836,335 UART: Running Caliptra FMC ...
18,837,384 UART:
18,837,538 UART: [state] CFI Enabled
18,845,265 UART: [fht] FMC Alias Private Key: 7
20,602,732 UART: [art] Extend RT PCRs Done
20,603,947 UART: [art] Lock RT PCRs Done
20,605,683 UART: [art] Populate DV Done
20,610,934 UART: [fht] FMC Alias Private Key: 7
20,612,537 UART: [art] Derive CDI
20,613,375 UART: [art] Store in in slot 0x4
20,656,245 UART: [art] Derive Key Pair
20,657,286 UART: [art] Store priv key in slot 0x5
23,084,387 UART: [art] Derive Key Pair - Done
23,097,438 UART: [art] Signing Cert with AUTHO
23,098,742 UART: RITY.KEYID = 7
24,804,171 UART: [art] Erasing AUTHORITY.KEYID = 7
24,805,813 UART: [art] PUB.X = 51EE79FCE8EDC8456B9D6AB34AB3F6C1DB5BB08885C73AFC61B9E7C85520519606A7E7ED3942D75797A6C2F040712C7E
24,812,911 UART: [art] PUB.Y = 4497F754F23E072578A50E48C72E652D171D808047619440C9A8EC2012BC33BAB8CD09EE256281A5187260C26EA913F4
24,820,144 UART: [art] SIG.R = CD986682A5688A6EEA917ECC78842FCB2443EE18C78460F6DCCFAAAE45DD6911611DA5D52C96AAA3DDADE816F4381887
24,827,545 UART: [art] SIG.S = 984E5B8C5A463EB3805A7643DEBFB621378789A88A6B472CC5682BC7575B1D3D5FB66251D4E47D2821BF432A7E62110E
25,806,190 UART: Caliptra RT
25,806,884 UART: [state] CFI Enabled
25,923,946 UART: [rt] RT listening for mailbox commands...
25,925,932 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,955,834 UART: [rt]cmd =0x46504c54, len=4
25,957,478 >>> mbox cmd response data (8 bytes)
25,958,485 UART: [rt] FIPS self test
25,959,429 UART: [kat] ++
25,959,877 UART: [kat] sha1
25,964,146 UART: [kat] SHA2-256
25,966,078 UART: [kat] SHA2-384
25,969,039 UART: [kat] SHA2-512-ACC
25,969,933 UART: Droping operation
25,970,709 UART: Fatal Error: 0x90050002
26,006,028 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,150,713 >>> mbox cmd response: failed
26,151,352 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,296,130 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,102 UART:
190,402 UART: Running Caliptra ROM ...
191,509 UART:
14,239,545 UART: [state] CFI Enabled
14,251,699 UART: [state] LifecycleState = Unprovisioned
14,253,564 UART: [state] DebugLocked = No
14,255,437 UART: [state] WD Timer not started. Device not locked for debugging
14,258,269 UART: [kat] SHA2-256
14,437,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,448,960 UART: [kat] ++
14,449,500 UART: [kat] sha1
14,461,905 UART: [kat] SHA2-256
14,464,970 UART: [kat] SHA2-384
14,471,220 UART: [kat] SHA2-512-ACC
14,474,169 UART: [kat] ECC-384
16,918,616 UART: [kat] HMAC-384Kdf
16,932,632 UART: [kat] LMS
17,462,130 UART: [kat] --
17,467,980 UART: [cold-reset] ++
17,470,274 UART: [fht] FHT @ 0x50003400
17,481,320 UART: [idev] ++
17,481,885 UART: [idev] CDI.KEYID = 6
17,482,826 UART: [idev] SUBJECT.KEYID = 7
17,484,036 UART: [idev] UDS.KEYID = 0
17,485,543 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,630,302 UART: [idev] Erasing UDS.KEYID = 0
19,961,889 UART: [idev] Sha1 KeyId Algorithm
19,985,058 UART: [idev] --
19,989,434 UART: [ldev] ++
19,989,999 UART: [ldev] CDI.KEYID = 6
19,990,935 UART: [ldev] SUBJECT.KEYID = 5
19,992,143 UART: [ldev] AUTHORITY.KEYID = 7
19,993,371 UART: [ldev] FE.KEYID = 1
20,002,715 UART: [ldev] Erasing FE.KEYID = 1
22,476,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,195,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,211,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,227,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,242,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,263,958 UART: [ldev] --
24,268,462 UART: [fwproc] Wait for Commands...
24,271,620 UART: [fwproc] Recv command 0x46574c44
24,273,678 UART: [fwproc] Recv'd Img size: 115304 bytes
27,690,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,769,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,838,494 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,159,047 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,699,855 ready_for_fw is high
3,700,466 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,291,107 >>> mbox cmd response: success
18,542,575 UART:
18,542,976 UART: Running Caliptra FMC ...
18,544,153 UART:
18,544,315 UART: [state] CFI Enabled
18,551,862 UART: [fht] FMC Alias Private Key: 7
20,309,186 UART: [art] Extend RT PCRs Done
20,310,418 UART: [art] Lock RT PCRs Done
20,312,057 UART: [art] Populate DV Done
20,317,405 UART: [fht] FMC Alias Private Key: 7
20,318,892 UART: [art] Derive CDI
20,319,658 UART: [art] Store in in slot 0x4
20,362,042 UART: [art] Derive Key Pair
20,363,091 UART: [art] Store priv key in slot 0x5
22,789,512 UART: [art] Derive Key Pair - Done
22,802,465 UART: [art] Signing Cert with AUTHO
22,803,777 UART: RITY.KEYID = 7
24,509,134 UART: [art] Erasing AUTHORITY.KEYID = 7
24,510,642 UART: [art] PUB.X = 7E3874D6E572965E3225ABBA5D8991ED539C06F8D1FDECAE5871951D697615712CC18A6360A118149C712FB0ED3BCEAC
24,517,902 UART: [art] PUB.Y = 4CEB65897D49407EAD46063E8DFF20E01F7B86730F0603AE231D95266470C1597AB68BA5C52A7239DCDEFE7B6C1D8BE2
24,525,208 UART: [art] SIG.R = 24D4F11DAECEB382BA093A727DACC7077E74112FF5E39607CA71AE17A98714BEA5585A93D1C337E1648E9D4EF706E980
24,532,604 UART: [art] SIG.S = EAEE3AD920C1DB02812AAF89A6AC6287291512E0488C32B485EA6705CC67B30527FA7DDA4C1FCC431707A1CD771CD7E3
25,511,745 UART: Caliptra RT
25,512,451 UART: [state] CFI Enabled
25,629,568 UART: [rt] RT listening for mailbox commands...
25,631,422 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,660,896 UART: [rt]cmd =0x46504c54, len=4
25,662,513 >>> mbox cmd response data (8 bytes)
25,663,248 UART: [rt] FIPS self test
25,664,200 UART: [kat] ++
25,664,650 UART: [kat] sha1
25,669,030 UART: [kat] SHA2-256
25,670,979 UART: [kat] SHA2-384
25,673,883 UART: [kat] SHA2-512-ACC
25,674,803 UART: Droping operation
25,675,599 UART: Fatal Error: 0x90050002
25,710,669 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,855,450 >>> mbox cmd response: failed
25,856,090 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,000,817 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,627,303 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,216,577 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,440,770 ready_for_fw is high
3,441,189 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,768,663 >>> mbox cmd response: success
19,064,281 UART:
19,064,692 UART: Running Caliptra FMC ...
19,065,852 UART:
19,066,018 UART: [state] CFI Enabled
19,131,398 UART: [fht] FMC Alias Private Key: 7
20,895,442 UART: [art] Extend RT PCRs Done
20,896,692 UART: [art] Lock RT PCRs Done
20,898,374 UART: [art] Populate DV Done
20,903,847 UART: [fht] FMC Alias Private Key: 7
20,905,444 UART: [art] Derive CDI
20,906,262 UART: [art] Store in in slot 0x4
20,964,382 UART: [art] Derive Key Pair
20,965,382 UART: [art] Store priv key in slot 0x5
23,428,632 UART: [art] Derive Key Pair - Done
23,441,735 UART: [art] Signing Cert with AUTHO
23,443,039 UART: RITY.KEYID = 7
25,154,157 UART: [art] Erasing AUTHORITY.KEYID = 7
25,155,669 UART: [art] PUB.X = 1389E114549358BAEC15515CFB861BFDA1F47230C3862E19825D2C2C88A9BD3BA2E775C415ED282A35BBF2F7D41FE42C
25,162,931 UART: [art] PUB.Y = 06B5FBB515834A3AF26205BAC2F2C8883F557C6F9C21DA38CC9EC3B3CC9D1526D0CD17AD6A212D72EF2E48EE1DE257DC
25,170,229 UART: [art] SIG.R = 11D61FBFE20E9FF338C5EAB74E6BACA306F21181702CCB6A92BE7557F38035CF1B759602DF47C1A04DF5578CEB9E73F3
25,177,638 UART: [art] SIG.S = CA7F0B05A2682067B28BD5C21BE35103092C6D64CF1F57CA5D961BD01E11A45E9E17BC1D09021C8B033D3CB91C4D1A8A
26,156,895 UART: Caliptra RT
26,157,603 UART: [state] CFI Enabled
26,322,997 UART: [rt] RT listening for mailbox commands...
26,324,841 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,354,251 UART: [rt]cmd =0x46504c54, len=4
26,355,781 >>> mbox cmd response data (8 bytes)
26,356,800 UART: [rt] FIPS self test
26,357,750 UART: [kat] ++
26,358,201 UART: [kat] sha1
26,362,765 UART: [kat] SHA2-256
26,364,696 UART: [kat] SHA2-384
26,367,606 UART: [kat] SHA2-512-ACC
26,368,523 UART: Droping operation
26,369,294 UART: Fatal Error: 0x90050002
26,404,437 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,549,259 >>> mbox cmd response: failed
26,549,941 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,694,706 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,400,962 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,721,034 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,750,282 ready_for_fw is high
3,750,859 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,972,338 >>> mbox cmd response: success
19,225,558 UART:
19,225,964 UART: Running Caliptra FMC ...
19,227,117 UART:
19,227,278 UART: [state] CFI Enabled
19,235,358 UART: [fht] FMC Alias Private Key: 7
20,992,508 UART: [art] Extend RT PCRs Done
20,993,749 UART: [art] Lock RT PCRs Done
20,995,780 UART: [art] Populate DV Done
21,001,041 UART: [fht] FMC Alias Private Key: 7
21,002,724 UART: [art] Derive CDI
21,003,556 UART: [art] Store in in slot 0x4
21,045,517 UART: [art] Derive Key Pair
21,046,563 UART: [art] Store priv key in slot 0x5
23,473,560 UART: [art] Derive Key Pair - Done
23,486,245 UART: [art] Signing Cert with AUTHO
23,487,555 UART: RITY.KEYID = 7
25,193,108 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,626 UART: [art] PUB.X = DE00D694D0A0DCECD0C6025CAE7A3E5741FEF49895BFD6D5D910C1261449ACB5E7E40D30AABB0084E5073F64DD2EF993
25,201,850 UART: [art] PUB.Y = A1F0E75D932674DF094560F3FED491FD2FEB505DB60232FD62A9BA3B71141D72E337FE243B724A046215B5303705417D
25,209,090 UART: [art] SIG.R = C1F4074269A21B4FA6495C1624401BF5526F31CD40F472A0821C3BD37B616051017AA637A5DDB4486E89427E2F7752B6
25,216,468 UART: [art] SIG.S = 3F10B1D60DABE30E0EAA52B433F6A91BB13109173A024C89B072C28FCB61AA1AE8D080F12647DCE71186E56A2A89D4EE
26,195,320 UART: Caliptra RT
26,196,015 UART: [state] CFI Enabled
26,313,090 UART: [rt] RT listening for mailbox commands...
26,314,940 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,344,756 UART: [rt]cmd =0x46504c54, len=4
26,346,439 >>> mbox cmd response data (8 bytes)
26,347,539 UART: [rt] FIPS self test
26,348,486 UART: [kat] ++
26,348,933 UART: [kat] sha1
26,353,389 UART: [kat] SHA2-256
26,355,263 UART: [kat] SHA2-384
26,358,250 UART: [kat] SHA2-512-ACC
26,359,175 UART: Droping operation
26,359,949 UART: Fatal Error: 0x90050002
26,395,179 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,539,853 >>> mbox cmd response: failed
26,540,437 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,685,159 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
16,998,746 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,217,436 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,660 UART: [state] LifecycleState = Unprovisioned
85,315 UART: [state] DebugLocked = No
85,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,423 UART: [kat] SHA2-256
881,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,469 UART: [kat] ++
885,621 UART: [kat] sha1
889,909 UART: [kat] SHA2-256
891,847 UART: [kat] SHA2-384
894,654 UART: [kat] SHA2-512-ACC
896,555 UART: [kat] ECC-384
901,978 UART: [kat] HMAC-384Kdf
906,702 UART: [kat] LMS
1,474,898 UART: [kat] --
1,475,749 UART: [cold-reset] ++
1,476,253 UART: [fht] Storing FHT @ 0x50003400
1,478,920 UART: [idev] ++
1,479,088 UART: [idev] CDI.KEYID = 6
1,479,448 UART: [idev] SUBJECT.KEYID = 7
1,479,872 UART: [idev] UDS.KEYID = 0
1,480,217 ready_for_fw is high
1,480,217 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,472 UART: [idev] Erasing UDS.KEYID = 0
1,503,986 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,554 UART: [idev] --
1,513,733 UART: [ldev] ++
1,513,901 UART: [ldev] CDI.KEYID = 6
1,514,264 UART: [ldev] SUBJECT.KEYID = 5
1,514,690 UART: [ldev] AUTHORITY.KEYID = 7
1,515,153 UART: [ldev] FE.KEYID = 1
1,520,191 UART: [ldev] Erasing FE.KEYID = 1
1,545,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,004 UART: [ldev] --
1,584,283 UART: [fwproc] Waiting for Commands...
1,584,938 UART: [fwproc] Received command 0x46574c44
1,585,729 UART: [fwproc] Received Image of size 115304 bytes
2,894,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,506 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,195 >>> mbox cmd response: success
3,090,269 UART: [afmc] ++
3,090,437 UART: [afmc] CDI.KEYID = 6
3,090,799 UART: [afmc] SUBJECT.KEYID = 7
3,091,224 UART: [afmc] AUTHORITY.KEYID = 5
3,126,481 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,859 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,252 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,942 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,743 UART: [afmc] --
3,169,835 UART: [cold-reset] --
3,170,725 UART: [state] Locking Datavault
3,171,820 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,424 UART: [state] Locking ICCM
3,172,972 UART: [exit] Launching FMC @ 0x40000130
3,178,301 UART:
3,178,317 UART: Running Caliptra FMC ...
3,178,725 UART:
3,178,779 UART: [state] CFI Enabled
3,189,280 UART: [fht] FMC Alias Private Key: 7
3,297,297 UART: [art] Extend RT PCRs Done
3,297,725 UART: [art] Lock RT PCRs Done
3,299,029 UART: [art] Populate DV Done
3,307,104 UART: [fht] FMC Alias Private Key: 7
3,308,152 UART: [art] Derive CDI
3,308,432 UART: [art] Store in in slot 0x4
3,393,947 UART: [art] Derive Key Pair
3,394,307 UART: [art] Store priv key in slot 0x5
3,408,191 UART: [art] Derive Key Pair - Done
3,422,785 UART: [art] Signing Cert with AUTHO
3,423,265 UART: RITY.KEYID = 7
3,438,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,698 UART: [art] PUB.X = FF8E4B3321EA8F8E1D7A89F5222E24E1206A04684FB448CEABE9E783E1F0B53E1FC12214AE03D2D6C69B59AFFCDB6FEB
3,446,486 UART: [art] PUB.Y = D44BD58C3CCF62A9A2CC57E8FA6C2CEDCA56AD7BE8DDA493E4127FF5C3852CD43CFA54FAD61B73103EF0295A0187409F
3,453,459 UART: [art] SIG.R = 431FE0B0D5773596256200CF7F8124E2D1EAB97DBBD27A1645BEF9259D6A6C8734B0A6718F473949A53AD2A843A61F87
3,460,209 UART: [art] SIG.S = C9B32DDA9A0863AB1470D66F745C57A6530C3E1D90819C071FA73B1BB122F684B2FE3408B031B054C792E41B667EC438
3,483,064 UART: Caliptra RT
3,483,317 UART: [state] CFI Enabled
3,591,518 UART: [rt] RT listening for mailbox commands...
3,592,181 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,026 UART: [rt]cmd =0x46504c54, len=4
3,623,405 >>> mbox cmd response data (8 bytes)
3,623,624 UART: [rt] FIPS self test
3,623,952 UART: [kat] ++
3,624,104 UART: [kat] sha1
3,628,270 UART: [kat] SHA2-256
3,630,292 UART: [kat] SHA2-384
3,633,099 UART: [kat] SHA2-512-ACC
3,633,504 UART: Droping operation
3,634,011 UART: Fatal Error: 0x90050002
3,635,561 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,635,566 >>> mbox cmd response: failed
3,635,566 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,635,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,620 UART: [state] LifecycleState = Unprovisioned
85,275 UART: [state] DebugLocked = No
85,943 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,527 UART: [kat] SHA2-256
881,458 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,573 UART: [kat] ++
885,725 UART: [kat] sha1
889,769 UART: [kat] SHA2-256
891,707 UART: [kat] SHA2-384
894,388 UART: [kat] SHA2-512-ACC
896,289 UART: [kat] ECC-384
901,872 UART: [kat] HMAC-384Kdf
906,570 UART: [kat] LMS
1,474,766 UART: [kat] --
1,475,663 UART: [cold-reset] ++
1,476,125 UART: [fht] Storing FHT @ 0x50003400
1,478,840 UART: [idev] ++
1,479,008 UART: [idev] CDI.KEYID = 6
1,479,368 UART: [idev] SUBJECT.KEYID = 7
1,479,792 UART: [idev] UDS.KEYID = 0
1,480,137 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,914 UART: [idev] Erasing UDS.KEYID = 0
1,504,734 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,246 UART: [idev] --
1,514,471 UART: [ldev] ++
1,514,639 UART: [ldev] CDI.KEYID = 6
1,515,002 UART: [ldev] SUBJECT.KEYID = 5
1,515,428 UART: [ldev] AUTHORITY.KEYID = 7
1,515,891 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,545,964 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,626 UART: [ldev] --
1,584,997 UART: [fwproc] Waiting for Commands...
1,585,664 UART: [fwproc] Received command 0x46574c44
1,586,455 UART: [fwproc] Received Image of size 115304 bytes
2,896,926 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,970 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,587 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,817 ready_for_fw is high
1,362,817 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,175 >>> mbox cmd response: success
3,003,121 UART:
3,003,137 UART: Running Caliptra FMC ...
3,003,545 UART:
3,003,599 UART: [state] CFI Enabled
3,014,028 UART: [fht] FMC Alias Private Key: 7
3,122,331 UART: [art] Extend RT PCRs Done
3,122,759 UART: [art] Lock RT PCRs Done
3,124,371 UART: [art] Populate DV Done
3,132,618 UART: [fht] FMC Alias Private Key: 7
3,133,556 UART: [art] Derive CDI
3,133,836 UART: [art] Store in in slot 0x4
3,218,921 UART: [art] Derive Key Pair
3,219,281 UART: [art] Store priv key in slot 0x5
3,232,233 UART: [art] Derive Key Pair - Done
3,246,755 UART: [art] Signing Cert with AUTHO
3,247,235 UART: RITY.KEYID = 7
3,262,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,990 UART: [art] PUB.X = 8CCB2DFB6503C705E2B43A94691D729EAC7DB08B469B854E118CF6CB50F89C063EE20B848E8FD4C748526CEC083F5AEF
3,269,761 UART: [art] PUB.Y = 6EC39AE5B4DF539E7F3A1571E55C75BE9AA64CED3E28ADF8E835BFA965D18FC0B9919BEFC927831F67CAA2571DD90EE9
3,276,732 UART: [art] SIG.R = 3F0D75A4C4BB7C75D5DD463EAEDC2AAC9F983D85F9AC665FC2157E2CF0634ACA7B02F7DFBC08D41226DE062544DBDCA0
3,283,518 UART: [art] SIG.S = 6E89A82A1F1FB5A518B42A7EB65420F68278A497874CA40D575F8D2E2EAE72BCA7E82CB029CF69655014E6A58475A1B2
3,307,744 UART: Caliptra RT
3,307,997 UART: [state] CFI Enabled
3,416,261 UART: [rt] RT listening for mailbox commands...
3,416,924 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,001 UART: [rt]cmd =0x46504c54, len=4
3,447,922 >>> mbox cmd response data (8 bytes)
3,448,127 UART: [rt] FIPS self test
3,448,455 UART: [kat] ++
3,448,607 UART: [kat] sha1
3,452,725 UART: [kat] SHA2-256
3,454,747 UART: [kat] SHA2-384
3,457,578 UART: [kat] SHA2-512-ACC
3,457,983 UART: Droping operation
3,458,454 UART: Fatal Error: 0x90050002
3,460,004 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,460,009 >>> mbox cmd response: failed
3,460,009 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,460,014 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,529 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,938,521 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,490 UART: [kat] SHA2-256
882,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,536 UART: [kat] ++
886,688 UART: [kat] sha1
890,780 UART: [kat] SHA2-256
892,718 UART: [kat] SHA2-384
895,579 UART: [kat] SHA2-512-ACC
897,480 UART: [kat] ECC-384
903,157 UART: [kat] HMAC-384Kdf
907,825 UART: [kat] LMS
1,476,021 UART: [kat] --
1,476,900 UART: [cold-reset] ++
1,477,420 UART: [fht] Storing FHT @ 0x50003400
1,480,093 UART: [idev] ++
1,480,261 UART: [idev] CDI.KEYID = 6
1,480,621 UART: [idev] SUBJECT.KEYID = 7
1,481,045 UART: [idev] UDS.KEYID = 0
1,481,390 ready_for_fw is high
1,481,390 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,343 UART: [idev] Erasing UDS.KEYID = 0
1,505,873 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,451 UART: [idev] --
1,515,490 UART: [ldev] ++
1,515,658 UART: [ldev] CDI.KEYID = 6
1,516,021 UART: [ldev] SUBJECT.KEYID = 5
1,516,447 UART: [ldev] AUTHORITY.KEYID = 7
1,516,910 UART: [ldev] FE.KEYID = 1
1,522,274 UART: [ldev] Erasing FE.KEYID = 1
1,547,523 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,047 UART: [ldev] --
1,586,508 UART: [fwproc] Waiting for Commands...
1,587,131 UART: [fwproc] Received command 0x46574c44
1,587,922 UART: [fwproc] Received Image of size 115304 bytes
2,898,571 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,383 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,735 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,930 >>> mbox cmd response: success
3,092,090 UART: [afmc] ++
3,092,258 UART: [afmc] CDI.KEYID = 6
3,092,620 UART: [afmc] SUBJECT.KEYID = 7
3,093,045 UART: [afmc] AUTHORITY.KEYID = 5
3,128,676 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,964 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,472 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,357 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,047 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,820 UART: [afmc] --
3,171,728 UART: [cold-reset] --
3,172,680 UART: [state] Locking Datavault
3,173,817 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,421 UART: [state] Locking ICCM
3,175,053 UART: [exit] Launching FMC @ 0x40000130
3,180,382 UART:
3,180,398 UART: Running Caliptra FMC ...
3,180,806 UART:
3,180,949 UART: [state] CFI Enabled
3,191,740 UART: [fht] FMC Alias Private Key: 7
3,300,563 UART: [art] Extend RT PCRs Done
3,300,991 UART: [art] Lock RT PCRs Done
3,302,491 UART: [art] Populate DV Done
3,310,674 UART: [fht] FMC Alias Private Key: 7
3,311,728 UART: [art] Derive CDI
3,312,008 UART: [art] Store in in slot 0x4
3,397,595 UART: [art] Derive Key Pair
3,397,955 UART: [art] Store priv key in slot 0x5
3,411,547 UART: [art] Derive Key Pair - Done
3,426,336 UART: [art] Signing Cert with AUTHO
3,426,816 UART: RITY.KEYID = 7
3,442,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,993 UART: [art] PUB.X = 6B01C6D15CFB2DB95218CF6745F90EBB226BFB45096AFD48E1F9CD8B0FB141B944B9A333FBA7CB2A0F55EFAEF1EC70C9
3,449,776 UART: [art] PUB.Y = 8C8D0CC2E262230B34BD1EC53E3D3D121E3D54127E8C65832A8691E9CA1FF92B3AD9C6267020326F30BE6FCA4209805C
3,456,723 UART: [art] SIG.R = EFD090F33414D075A8B35E977B274F45216A7538AD20645072DA6489BF4182388ADECA7E653D410A5CE923906E886A5F
3,463,488 UART: [art] SIG.S = 3F3B52F40161D06E04C3A04D1CA463814D9FEE2099B91370ADC097A305B42D55ED949339C319401CDDA29A75F5CA782C
3,487,234 UART: Caliptra RT
3,487,579 UART: [state] CFI Enabled
3,595,818 UART: [rt] RT listening for mailbox commands...
3,596,481 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,380 UART: [rt]cmd =0x46504c54, len=4
3,627,551 >>> mbox cmd response data (8 bytes)
3,627,668 UART: [rt] FIPS self test
3,627,996 UART: [kat] ++
3,628,148 UART: [kat] sha1
3,632,438 UART: [kat] SHA2-256
3,634,460 UART: [kat] SHA2-384
3,637,171 UART: [kat] SHA2-512-ACC
3,637,576 UART: Droping operation
3,638,115 UART: Fatal Error: 0x90050002
3,639,665 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,670 >>> mbox cmd response: failed
3,639,670 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,675 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,042 UART: [kat] SHA2-256
881,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,088 UART: [kat] ++
886,240 UART: [kat] sha1
890,496 UART: [kat] SHA2-256
892,434 UART: [kat] SHA2-384
895,223 UART: [kat] SHA2-512-ACC
897,124 UART: [kat] ECC-384
902,851 UART: [kat] HMAC-384Kdf
907,531 UART: [kat] LMS
1,475,727 UART: [kat] --
1,476,516 UART: [cold-reset] ++
1,477,022 UART: [fht] Storing FHT @ 0x50003400
1,479,745 UART: [idev] ++
1,479,913 UART: [idev] CDI.KEYID = 6
1,480,273 UART: [idev] SUBJECT.KEYID = 7
1,480,697 UART: [idev] UDS.KEYID = 0
1,481,042 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,447 UART: [idev] Erasing UDS.KEYID = 0
1,504,669 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,077 UART: [idev] --
1,514,226 UART: [ldev] ++
1,514,394 UART: [ldev] CDI.KEYID = 6
1,514,757 UART: [ldev] SUBJECT.KEYID = 5
1,515,183 UART: [ldev] AUTHORITY.KEYID = 7
1,515,646 UART: [ldev] FE.KEYID = 1
1,520,782 UART: [ldev] Erasing FE.KEYID = 1
1,546,831 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,085 UART: [ldev] --
1,586,500 UART: [fwproc] Waiting for Commands...
1,587,355 UART: [fwproc] Received command 0x46574c44
1,588,146 UART: [fwproc] Received Image of size 115304 bytes
2,898,341 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,383 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,735 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,042 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,940 ready_for_fw is high
1,362,940 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,246 >>> mbox cmd response: success
3,003,072 UART:
3,003,088 UART: Running Caliptra FMC ...
3,003,496 UART:
3,003,639 UART: [state] CFI Enabled
3,014,482 UART: [fht] FMC Alias Private Key: 7
3,122,825 UART: [art] Extend RT PCRs Done
3,123,253 UART: [art] Lock RT PCRs Done
3,124,777 UART: [art] Populate DV Done
3,132,724 UART: [fht] FMC Alias Private Key: 7
3,133,856 UART: [art] Derive CDI
3,134,136 UART: [art] Store in in slot 0x4
3,220,063 UART: [art] Derive Key Pair
3,220,423 UART: [art] Store priv key in slot 0x5
3,234,335 UART: [art] Derive Key Pair - Done
3,249,098 UART: [art] Signing Cert with AUTHO
3,249,578 UART: RITY.KEYID = 7
3,264,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,749 UART: [art] PUB.X = BCE93C3EF018E13A9FD3C984FDD021B786E26D1A58A5820EB8B6FE351B9CE0A99917F9DD842B87C16F6990135BEF8446
3,272,528 UART: [art] PUB.Y = 54BCB1E968AD2DE80E5CADE7DCE6DF0360522A466B74E367F5DEDE28BA52E73430F1A96B22EA4EAA73AD4AE4C8AA65C6
3,279,500 UART: [art] SIG.R = 9263F7C4B427D115EB1236EBE23B913234D7DAFEC5C538CF71727D3EAAA0EA161C0C16E699A21B716F2DE461137E7F59
3,286,277 UART: [art] SIG.S = E7706215FDA32B943520ABAB436E58B5CDD5D71D0750A4630DAE2E9C8E3435884C9966F0D3D810B9A388F96B143278B9
3,309,954 UART: Caliptra RT
3,310,299 UART: [state] CFI Enabled
3,418,159 UART: [rt] RT listening for mailbox commands...
3,418,822 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,419 UART: [rt]cmd =0x46504c54, len=4
3,449,610 >>> mbox cmd response data (8 bytes)
3,449,969 UART: [rt] FIPS self test
3,450,297 UART: [kat] ++
3,450,449 UART: [kat] sha1
3,454,595 UART: [kat] SHA2-256
3,456,617 UART: [kat] SHA2-384
3,459,352 UART: [kat] SHA2-512-ACC
3,459,757 UART: Droping operation
3,460,178 UART: Fatal Error: 0x90050002
3,461,728 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,733 >>> mbox cmd response: failed
3,461,733 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,506 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,943,644 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
893,594 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,719 UART: [kat] ++
897,871 UART: [kat] sha1
902,001 UART: [kat] SHA2-256
903,941 UART: [kat] SHA2-384
906,656 UART: [kat] SHA2-512-ACC
908,557 UART: [kat] ECC-384
918,190 UART: [kat] HMAC-384Kdf
922,816 UART: [kat] LMS
1,171,144 UART: [kat] --
1,172,161 UART: [cold-reset] ++
1,172,501 UART: [fht] FHT @ 0x50003400
1,175,150 UART: [idev] ++
1,175,318 UART: [idev] CDI.KEYID = 6
1,175,678 UART: [idev] SUBJECT.KEYID = 7
1,176,102 UART: [idev] UDS.KEYID = 0
1,176,447 ready_for_fw is high
1,176,447 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,524 UART: [idev] Erasing UDS.KEYID = 0
1,200,985 UART: [idev] Sha1 KeyId Algorithm
1,209,705 UART: [idev] --
1,210,741 UART: [ldev] ++
1,210,909 UART: [ldev] CDI.KEYID = 6
1,211,272 UART: [ldev] SUBJECT.KEYID = 5
1,211,698 UART: [ldev] AUTHORITY.KEYID = 7
1,212,161 UART: [ldev] FE.KEYID = 1
1,217,415 UART: [ldev] Erasing FE.KEYID = 1
1,243,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,788 UART: [fwproc] Wait for Commands...
1,283,456 UART: [fwproc] Recv command 0x46574c44
1,284,184 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,453 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,832 >>> mbox cmd response: success
2,788,062 UART: [afmc] ++
2,788,230 UART: [afmc] CDI.KEYID = 6
2,788,592 UART: [afmc] SUBJECT.KEYID = 7
2,789,017 UART: [afmc] AUTHORITY.KEYID = 5
2,824,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,731 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,479 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,092 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,811 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,593 UART: [afmc] --
2,867,603 UART: [cold-reset] --
2,868,289 UART: [state] Locking Datavault
2,869,422 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,026 UART: [state] Locking ICCM
2,870,480 UART: [exit] Launching FMC @ 0x40000130
2,875,809 UART:
2,875,825 UART: Running Caliptra FMC ...
2,876,233 UART:
2,876,287 UART: [state] CFI Enabled
2,886,714 UART: [fht] FMC Alias Private Key: 7
2,994,913 UART: [art] Extend RT PCRs Done
2,995,341 UART: [art] Lock RT PCRs Done
2,996,893 UART: [art] Populate DV Done
3,005,100 UART: [fht] FMC Alias Private Key: 7
3,006,222 UART: [art] Derive CDI
3,006,502 UART: [art] Store in in slot 0x4
3,092,329 UART: [art] Derive Key Pair
3,092,689 UART: [art] Store priv key in slot 0x5
3,106,301 UART: [art] Derive Key Pair - Done
3,121,163 UART: [art] Signing Cert with AUTHO
3,121,643 UART: RITY.KEYID = 7
3,136,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,266 UART: [art] PUB.X = 4DD8094EC322F63D43527BA10475D31AD3B691E51D21D2FCD1EB8545D746F98B6C2595E6F4654C97C6049E18FFDCC699
3,144,033 UART: [art] PUB.Y = 19CCC20B45A83AB99A0A3C3D43FFE52764FAAB4EF809360958A35B79972E13F4E2FB195BCE82A2E367BAFE4F3E5E2313
3,150,987 UART: [art] SIG.R = D8E8ED4F382ADC58E2B8339DEE36AC26025A8BAACC73C04F576CEFD6ABBB9691C5452E92A5F3F044EF773EFD3ADD89C6
3,157,782 UART: [art] SIG.S = 1660EE221DCDD966B2B2200966159EF35EC28F6DB1B9065A7BCD73CB18FAB2E5492F9862D0784FBC526BFF98D45B1B62
3,181,751 UART: Caliptra RT
3,182,004 UART: [state] CFI Enabled
3,289,709 UART: [rt] RT listening for mailbox commands...
3,290,372 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,337 UART: [rt]cmd =0x46504c54, len=4
3,321,474 >>> mbox cmd response data (8 bytes)
3,321,781 UART: [rt] FIPS self test
3,322,109 UART: [kat] ++
3,322,261 UART: [kat] sha1
3,326,537 UART: [kat] SHA2-256
3,328,559 UART: [kat] SHA2-384
3,331,562 UART: [kat] SHA2-512-ACC
3,331,967 UART: Droping operation
3,332,480 UART: Fatal Error: 0x90050002
3,334,030 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,035 >>> mbox cmd response: failed
3,334,035 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,040 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
893,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,707 UART: [kat] ++
897,859 UART: [kat] sha1
902,245 UART: [kat] SHA2-256
904,185 UART: [kat] SHA2-384
907,030 UART: [kat] SHA2-512-ACC
908,931 UART: [kat] ECC-384
918,770 UART: [kat] HMAC-384Kdf
923,358 UART: [kat] LMS
1,171,686 UART: [kat] --
1,172,833 UART: [cold-reset] ++
1,173,175 UART: [fht] FHT @ 0x50003400
1,175,774 UART: [idev] ++
1,175,942 UART: [idev] CDI.KEYID = 6
1,176,302 UART: [idev] SUBJECT.KEYID = 7
1,176,726 UART: [idev] UDS.KEYID = 0
1,177,071 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,848 UART: [idev] Erasing UDS.KEYID = 0
1,201,643 UART: [idev] Sha1 KeyId Algorithm
1,210,247 UART: [idev] --
1,211,363 UART: [ldev] ++
1,211,531 UART: [ldev] CDI.KEYID = 6
1,211,894 UART: [ldev] SUBJECT.KEYID = 5
1,212,320 UART: [ldev] AUTHORITY.KEYID = 7
1,212,783 UART: [ldev] FE.KEYID = 1
1,218,151 UART: [ldev] Erasing FE.KEYID = 1
1,244,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,491 UART: [ldev] --
1,284,000 UART: [fwproc] Wait for Commands...
1,284,738 UART: [fwproc] Recv command 0x46574c44
1,285,466 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,503 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,754 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,917 ready_for_fw is high
1,060,917 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,467 >>> mbox cmd response: success
2,702,617 UART:
2,702,633 UART: Running Caliptra FMC ...
2,703,041 UART:
2,703,095 UART: [state] CFI Enabled
2,713,650 UART: [fht] FMC Alias Private Key: 7
2,821,791 UART: [art] Extend RT PCRs Done
2,822,219 UART: [art] Lock RT PCRs Done
2,823,789 UART: [art] Populate DV Done
2,831,750 UART: [fht] FMC Alias Private Key: 7
2,832,750 UART: [art] Derive CDI
2,833,030 UART: [art] Store in in slot 0x4
2,918,943 UART: [art] Derive Key Pair
2,919,303 UART: [art] Store priv key in slot 0x5
2,932,021 UART: [art] Derive Key Pair - Done
2,946,427 UART: [art] Signing Cert with AUTHO
2,946,907 UART: RITY.KEYID = 7
2,962,099 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,864 UART: [art] PUB.X = 5FE60BA90F7FBAE3360C138E21921A0F4FC6D523EE6FEE7FF8DAE3FECF1771FD077E25F4E46BFC5BCD2650B94F33C152
2,969,645 UART: [art] PUB.Y = AAF5133BEA630F36B5FA008D6603826AAEB5FB016D5E75C1739D599786805AE331A83015EB2C8E6F8F52E5DFC260FD23
2,976,574 UART: [art] SIG.R = 6AFD9FB69A2114A005477C33BACDC7299CCE968769B62FF0907C34A60ACC7F32CDEBBCDD241A4991F57BB83D45FCB56F
2,983,360 UART: [art] SIG.S = 83BD91FFDB25F227C12CACC2E1A74B306F54641F9468E3475ECF268C195EC64C2EB1703B9E2EAF7BBA4C484BD303E54A
3,006,996 UART: Caliptra RT
3,007,249 UART: [state] CFI Enabled
3,115,092 UART: [rt] RT listening for mailbox commands...
3,115,755 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,446 UART: [rt]cmd =0x46504c54, len=4
3,146,405 >>> mbox cmd response data (8 bytes)
3,146,730 UART: [rt] FIPS self test
3,147,058 UART: [kat] ++
3,147,210 UART: [kat] sha1
3,151,384 UART: [kat] SHA2-256
3,153,406 UART: [kat] SHA2-384
3,156,315 UART: [kat] SHA2-512-ACC
3,156,720 UART: Droping operation
3,157,335 UART: Fatal Error: 0x90050002
3,158,885 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,890 >>> mbox cmd response: failed
3,158,890 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,031 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,695 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
893,385 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,510 UART: [kat] ++
897,662 UART: [kat] sha1
901,868 UART: [kat] SHA2-256
903,808 UART: [kat] SHA2-384
906,611 UART: [kat] SHA2-512-ACC
908,512 UART: [kat] ECC-384
918,499 UART: [kat] HMAC-384Kdf
923,097 UART: [kat] LMS
1,171,425 UART: [kat] --
1,172,242 UART: [cold-reset] ++
1,172,694 UART: [fht] FHT @ 0x50003400
1,175,323 UART: [idev] ++
1,175,491 UART: [idev] CDI.KEYID = 6
1,175,851 UART: [idev] SUBJECT.KEYID = 7
1,176,275 UART: [idev] UDS.KEYID = 0
1,176,620 ready_for_fw is high
1,176,620 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,021 UART: [idev] Erasing UDS.KEYID = 0
1,200,852 UART: [idev] Sha1 KeyId Algorithm
1,209,452 UART: [idev] --
1,210,602 UART: [ldev] ++
1,210,770 UART: [ldev] CDI.KEYID = 6
1,211,133 UART: [ldev] SUBJECT.KEYID = 5
1,211,559 UART: [ldev] AUTHORITY.KEYID = 7
1,212,022 UART: [ldev] FE.KEYID = 1
1,217,316 UART: [ldev] Erasing FE.KEYID = 1
1,243,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,568 UART: [ldev] --
1,283,081 UART: [fwproc] Wait for Commands...
1,283,707 UART: [fwproc] Recv command 0x46574c44
1,284,435 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,546 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,850 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,003 >>> mbox cmd response: success
2,789,153 UART: [afmc] ++
2,789,321 UART: [afmc] CDI.KEYID = 6
2,789,683 UART: [afmc] SUBJECT.KEYID = 7
2,790,108 UART: [afmc] AUTHORITY.KEYID = 5
2,825,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,860 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,588 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,473 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,192 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,150 UART: [afmc] --
2,869,074 UART: [cold-reset] --
2,869,744 UART: [state] Locking Datavault
2,870,945 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,549 UART: [state] Locking ICCM
2,872,053 UART: [exit] Launching FMC @ 0x40000130
2,877,382 UART:
2,877,398 UART: Running Caliptra FMC ...
2,877,806 UART:
2,877,949 UART: [state] CFI Enabled
2,888,560 UART: [fht] FMC Alias Private Key: 7
2,996,779 UART: [art] Extend RT PCRs Done
2,997,207 UART: [art] Lock RT PCRs Done
2,998,909 UART: [art] Populate DV Done
3,007,162 UART: [fht] FMC Alias Private Key: 7
3,008,176 UART: [art] Derive CDI
3,008,456 UART: [art] Store in in slot 0x4
3,093,751 UART: [art] Derive Key Pair
3,094,111 UART: [art] Store priv key in slot 0x5
3,107,263 UART: [art] Derive Key Pair - Done
3,122,195 UART: [art] Signing Cert with AUTHO
3,122,675 UART: RITY.KEYID = 7
3,138,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,034 UART: [art] PUB.X = 955836B3EC9E7DD45C509A107EE3B0DD607979A18F071A1DE9DF1056153FF9EFCC8FD3B53B43CBAB764B9E654F69E8E6
3,145,817 UART: [art] PUB.Y = 3709AEF97830E1ED3D95A289DE9ED657A6D99E2ECF21AB5C0621D0630C021A46715DC654F243B3D13FB25DC3E321A9C6
3,152,765 UART: [art] SIG.R = 3247FF48E3884302D33726E0B1CB86A5CED9B7E47F3B035EC010D377FCC5CA19439F2EB0F34508D0D14C137F90D6CCE6
3,159,536 UART: [art] SIG.S = 3E47E6F5B6564346BFACB6829AAB20FB4403BD72B84107A566E9E3CBEEA46324A763A7E11671B3B9C4F7C8280E3DFE22
3,183,162 UART: Caliptra RT
3,183,507 UART: [state] CFI Enabled
3,292,028 UART: [rt] RT listening for mailbox commands...
3,292,691 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,122 UART: [rt]cmd =0x46504c54, len=4
3,323,221 >>> mbox cmd response data (8 bytes)
3,323,546 UART: [rt] FIPS self test
3,323,874 UART: [kat] ++
3,324,026 UART: [kat] sha1
3,328,232 UART: [kat] SHA2-256
3,330,254 UART: [kat] SHA2-384
3,333,189 UART: [kat] SHA2-512-ACC
3,333,594 UART: Droping operation
3,334,071 UART: Fatal Error: 0x90050002
3,335,621 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,626 >>> mbox cmd response: failed
3,335,626 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,964 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
893,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,026 UART: [kat] ++
898,178 UART: [kat] sha1
902,618 UART: [kat] SHA2-256
904,558 UART: [kat] SHA2-384
907,427 UART: [kat] SHA2-512-ACC
909,328 UART: [kat] ECC-384
919,447 UART: [kat] HMAC-384Kdf
924,113 UART: [kat] LMS
1,172,441 UART: [kat] --
1,173,422 UART: [cold-reset] ++
1,173,902 UART: [fht] FHT @ 0x50003400
1,176,745 UART: [idev] ++
1,176,913 UART: [idev] CDI.KEYID = 6
1,177,273 UART: [idev] SUBJECT.KEYID = 7
1,177,697 UART: [idev] UDS.KEYID = 0
1,178,042 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,827 UART: [idev] Erasing UDS.KEYID = 0
1,203,042 UART: [idev] Sha1 KeyId Algorithm
1,211,520 UART: [idev] --
1,212,768 UART: [ldev] ++
1,212,936 UART: [ldev] CDI.KEYID = 6
1,213,299 UART: [ldev] SUBJECT.KEYID = 5
1,213,725 UART: [ldev] AUTHORITY.KEYID = 7
1,214,188 UART: [ldev] FE.KEYID = 1
1,219,402 UART: [ldev] Erasing FE.KEYID = 1
1,246,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,884 UART: [ldev] --
1,285,281 UART: [fwproc] Wait for Commands...
1,285,965 UART: [fwproc] Recv command 0x46574c44
1,286,693 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,802 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,653,106 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,790,353 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,022 ready_for_fw is high
1,060,022 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,862 >>> mbox cmd response: success
2,702,068 UART:
2,702,084 UART: Running Caliptra FMC ...
2,702,492 UART:
2,702,635 UART: [state] CFI Enabled
2,713,384 UART: [fht] FMC Alias Private Key: 7
2,821,713 UART: [art] Extend RT PCRs Done
2,822,141 UART: [art] Lock RT PCRs Done
2,823,661 UART: [art] Populate DV Done
2,831,940 UART: [fht] FMC Alias Private Key: 7
2,833,052 UART: [art] Derive CDI
2,833,332 UART: [art] Store in in slot 0x4
2,918,947 UART: [art] Derive Key Pair
2,919,307 UART: [art] Store priv key in slot 0x5
2,931,893 UART: [art] Derive Key Pair - Done
2,945,969 UART: [art] Signing Cert with AUTHO
2,946,449 UART: RITY.KEYID = 7
2,962,141 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,906 UART: [art] PUB.X = F098D540F2D5589007B362DA5C5094F5A22ABD848593B71F542FDB2670352E6ADB61AEBDB1E7B588778B4BA67D998EAD
2,969,683 UART: [art] PUB.Y = 88D3B7D37F9D6B1664B568C56B47C8F20F0D50256572A9CB8AAF98555824992B1E72E2BAE9DB2DC166F8B2CFAB316D1A
2,976,639 UART: [art] SIG.R = 4444907D194C412B7D1235DBA1C527EC91728285D3A1F2DD9073B3087F12B380BF02736CD7A797A46F945CBBBC19C472
2,983,403 UART: [art] SIG.S = 8F5AD1C2D8AA4E27B1B635CD765062AD0FF3411BEF415F80B0E3D5982C1573B5466121556B01EC58667B250AED2E5595
3,007,423 UART: Caliptra RT
3,007,768 UART: [state] CFI Enabled
3,115,451 UART: [rt] RT listening for mailbox commands...
3,116,114 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,121 UART: [rt]cmd =0x46504c54, len=4
3,147,304 >>> mbox cmd response data (8 bytes)
3,147,441 UART: [rt] FIPS self test
3,147,769 UART: [kat] ++
3,147,921 UART: [kat] sha1
3,152,139 UART: [kat] SHA2-256
3,154,161 UART: [kat] SHA2-384
3,156,838 UART: [kat] SHA2-512-ACC
3,157,243 UART: Droping operation
3,157,670 UART: Fatal Error: 0x90050002
3,159,220 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,225 >>> mbox cmd response: failed
3,159,225 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,230 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,872 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,886 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,758 UART: [state] LifecycleState = Unprovisioned
85,413 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,238 UART: [kat] SHA2-256
890,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,917 UART: [kat] ++
895,069 UART: [kat] sha1
899,327 UART: [kat] SHA2-256
901,267 UART: [kat] SHA2-384
903,818 UART: [kat] SHA2-512-ACC
905,719 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,130 UART: [kat] LMS
1,168,442 UART: [kat] --
1,169,135 UART: [cold-reset] ++
1,169,601 UART: [fht] FHT @ 0x50003400
1,172,117 UART: [idev] ++
1,172,285 UART: [idev] CDI.KEYID = 6
1,172,646 UART: [idev] SUBJECT.KEYID = 7
1,173,071 UART: [idev] UDS.KEYID = 0
1,173,417 ready_for_fw is high
1,173,417 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,180,997 UART: [idev] Erasing UDS.KEYID = 0
1,198,099 UART: [idev] Sha1 KeyId Algorithm
1,207,123 UART: [idev] --
1,208,096 UART: [ldev] ++
1,208,264 UART: [ldev] CDI.KEYID = 6
1,208,628 UART: [ldev] SUBJECT.KEYID = 5
1,209,055 UART: [ldev] AUTHORITY.KEYID = 7
1,209,518 UART: [ldev] FE.KEYID = 1
1,214,706 UART: [ldev] Erasing FE.KEYID = 1
1,241,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,736 UART: [ldev] --
1,280,180 UART: [fwproc] Wait for Commands...
1,280,991 UART: [fwproc] Recv command 0x46574c44
1,281,724 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,350 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,564 >>> mbox cmd response: success
2,786,601 UART: [afmc] ++
2,786,769 UART: [afmc] CDI.KEYID = 6
2,787,132 UART: [afmc] SUBJECT.KEYID = 7
2,787,558 UART: [afmc] AUTHORITY.KEYID = 5
2,823,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,069 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,952 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,671 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,390 UART: [afmc] --
2,867,400 UART: [cold-reset] --
2,868,384 UART: [state] Locking Datavault
2,869,417 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,021 UART: [state] Locking ICCM
2,870,471 UART: [exit] Launching FMC @ 0x40000130
2,875,800 UART:
2,875,816 UART: Running Caliptra FMC ...
2,876,224 UART:
2,876,278 UART: [state] CFI Enabled
2,886,849 UART: [fht] FMC Alias Private Key: 7
2,995,174 UART: [art] Extend RT PCRs Done
2,995,602 UART: [art] Lock RT PCRs Done
2,996,978 UART: [art] Populate DV Done
3,005,319 UART: [fht] FMC Alias Private Key: 7
3,006,257 UART: [art] Derive CDI
3,006,537 UART: [art] Store in in slot 0x4
3,092,262 UART: [art] Derive Key Pair
3,092,622 UART: [art] Store priv key in slot 0x5
3,105,734 UART: [art] Derive Key Pair - Done
3,120,553 UART: [art] Signing Cert with AUTHO
3,121,033 UART: RITY.KEYID = 7
3,136,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,122 UART: [art] PUB.X = F883A5FB0C73DC3C061F9731D288D4938BDD2BEC6178F4104600F86BA8E8B06F169BBA2CA5831AEDC3C56BDFD37D76CC
3,143,884 UART: [art] PUB.Y = 0F961D3ACD2F1CA26EA3DA9A3D00662F8C5C7BEB073474C87115A95995F66C5EE1832A3C4DCAAD1041303563D7761FEA
3,150,818 UART: [art] SIG.R = 764413B92B44D718FD244356645574A8791F43F07ADBDC5EC4DAF82D48AC5B8F9B9BDDBA1464571402FD4A176D888714
3,157,589 UART: [art] SIG.S = A96205C4F7CBC5F691507491086F0C4582254C35837DE1BF569E801871B5299230EAA8430B16123055B3DC50B225211A
3,181,304 UART: Caliptra RT
3,181,557 UART: [state] CFI Enabled
3,289,264 UART: [rt] RT listening for mailbox commands...
3,289,927 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,620 UART: [rt]cmd =0x46504c54, len=4
3,320,789 >>> mbox cmd response data (8 bytes)
3,321,054 UART: [rt] FIPS self test
3,321,382 UART: [kat] ++
3,321,534 UART: [kat] sha1
3,325,582 UART: [kat] SHA2-256
3,327,604 UART: [kat] SHA2-384
3,330,443 UART: [kat] SHA2-512-ACC
3,330,848 UART: Droping operation
3,331,327 UART: Fatal Error: 0x90050002
3,332,877 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,882 >>> mbox cmd response: failed
3,332,882 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,965 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,174,487 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,797 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,565 UART: [idev] --
1,208,422 UART: [ldev] ++
1,208,590 UART: [ldev] CDI.KEYID = 6
1,208,954 UART: [ldev] SUBJECT.KEYID = 5
1,209,381 UART: [ldev] AUTHORITY.KEYID = 7
1,209,844 UART: [ldev] FE.KEYID = 1
1,214,978 UART: [ldev] Erasing FE.KEYID = 1
1,240,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,128 UART: [ldev] --
1,280,558 UART: [fwproc] Wait for Commands...
1,281,361 UART: [fwproc] Recv command 0x46574c44
1,282,094 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,970 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,316 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,702 ready_for_fw is high
1,055,702 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,632,784 >>> mbox cmd response: success
2,694,828 UART:
2,694,844 UART: Running Caliptra FMC ...
2,695,252 UART:
2,695,306 UART: [state] CFI Enabled
2,705,553 UART: [fht] FMC Alias Private Key: 7
2,813,864 UART: [art] Extend RT PCRs Done
2,814,292 UART: [art] Lock RT PCRs Done
2,815,922 UART: [art] Populate DV Done
2,824,147 UART: [fht] FMC Alias Private Key: 7
2,825,327 UART: [art] Derive CDI
2,825,607 UART: [art] Store in in slot 0x4
2,911,202 UART: [art] Derive Key Pair
2,911,562 UART: [art] Store priv key in slot 0x5
2,925,158 UART: [art] Derive Key Pair - Done
2,940,297 UART: [art] Signing Cert with AUTHO
2,940,777 UART: RITY.KEYID = 7
2,956,067 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,832 UART: [art] PUB.X = 40D60B4D6ECA20859E216AA44BCB393F6F382BD3C604392FBF2E87DC6EFD4222D041D55B163252207F25D168527C20DA
2,963,602 UART: [art] PUB.Y = FA03B05E700A18405FA506DD9B6F1CED6FF8884D7FE1E0BA3168FCF8858C1F24D45045CD313099B20ACDD890ED4A63A8
2,970,556 UART: [art] SIG.R = 152E22C884F44476303AFC96D9A6AAD38892A944B220C309EA5EB96414972E40A3E492171C50A8C92B1EBFB11F457BFC
2,977,327 UART: [art] SIG.S = 2328078854542CE5FFBC53B4939307088E71CAC63C33B4DF0D185CEDE54A7624645DE379E8E88E6F6A9FADDCA78D9A96
3,001,420 UART: Caliptra RT
3,001,673 UART: [state] CFI Enabled
3,110,118 UART: [rt] RT listening for mailbox commands...
3,110,781 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,808 UART: [rt]cmd =0x46504c54, len=4
3,141,943 >>> mbox cmd response data (8 bytes)
3,142,188 UART: [rt] FIPS self test
3,142,516 UART: [kat] ++
3,142,668 UART: [kat] sha1
3,146,972 UART: [kat] SHA2-256
3,148,994 UART: [kat] SHA2-384
3,151,759 UART: [kat] SHA2-512-ACC
3,152,164 UART: Droping operation
3,152,701 UART: Fatal Error: 0x90050002
3,154,251 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,256 >>> mbox cmd response: failed
3,154,256 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,586 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,633,886 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,144 UART: [idev] ++
1,173,312 UART: [idev] CDI.KEYID = 6
1,173,673 UART: [idev] SUBJECT.KEYID = 7
1,174,098 UART: [idev] UDS.KEYID = 0
1,174,444 ready_for_fw is high
1,174,444 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,390 UART: [idev] --
1,209,487 UART: [ldev] ++
1,209,655 UART: [ldev] CDI.KEYID = 6
1,210,019 UART: [ldev] SUBJECT.KEYID = 5
1,210,446 UART: [ldev] AUTHORITY.KEYID = 7
1,210,909 UART: [ldev] FE.KEYID = 1
1,216,003 UART: [ldev] Erasing FE.KEYID = 1
1,242,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,145 UART: [ldev] --
1,282,603 UART: [fwproc] Wait for Commands...
1,283,314 UART: [fwproc] Recv command 0x46574c44
1,284,047 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,309 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,643 >>> mbox cmd response: success
2,787,734 UART: [afmc] ++
2,787,902 UART: [afmc] CDI.KEYID = 6
2,788,265 UART: [afmc] SUBJECT.KEYID = 7
2,788,691 UART: [afmc] AUTHORITY.KEYID = 5
2,824,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,797 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,526 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,128 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,909 UART: [afmc] --
2,867,821 UART: [cold-reset] --
2,868,667 UART: [state] Locking Datavault
2,869,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,526 UART: [state] Locking ICCM
2,870,986 UART: [exit] Launching FMC @ 0x40000130
2,876,315 UART:
2,876,331 UART: Running Caliptra FMC ...
2,876,739 UART:
2,876,882 UART: [state] CFI Enabled
2,888,173 UART: [fht] FMC Alias Private Key: 7
2,996,178 UART: [art] Extend RT PCRs Done
2,996,606 UART: [art] Lock RT PCRs Done
2,998,300 UART: [art] Populate DV Done
3,006,519 UART: [fht] FMC Alias Private Key: 7
3,007,673 UART: [art] Derive CDI
3,007,953 UART: [art] Store in in slot 0x4
3,093,554 UART: [art] Derive Key Pair
3,093,914 UART: [art] Store priv key in slot 0x5
3,106,788 UART: [art] Derive Key Pair - Done
3,121,312 UART: [art] Signing Cert with AUTHO
3,121,792 UART: RITY.KEYID = 7
3,137,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,921 UART: [art] PUB.X = AF9E913E212C338FDA855369D19D7EA975FE7C56D8684D04EB2A3A57E34CE8A63E73F9469C20110C53E84BB8F9F5222E
3,144,693 UART: [art] PUB.Y = 2CD31BC562DDB9FBE78BE9F0E27F5953DD6E2EEC289B544C476F45264433C502ABD418ED3A92C759283862D1306FC1E5
3,151,650 UART: [art] SIG.R = 86E39EE262C5C4BE96171E7F3308AE2AA8B36545FBD372E27E8B58535150A206DB02734BCDE534D3A404F353B5EF7918
3,158,412 UART: [art] SIG.S = 458C19BFA8AE388B4577FDEDF51172D66CEDE29F3E4DDE5FA5FC5028C22F5A0EFE9E8242A5D14F97BFE8A0B85A382BB6
3,182,534 UART: Caliptra RT
3,182,879 UART: [state] CFI Enabled
3,290,074 UART: [rt] RT listening for mailbox commands...
3,290,737 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,774 UART: [rt]cmd =0x46504c54, len=4
3,321,889 >>> mbox cmd response data (8 bytes)
3,322,042 UART: [rt] FIPS self test
3,322,370 UART: [kat] ++
3,322,522 UART: [kat] sha1
3,326,878 UART: [kat] SHA2-256
3,328,900 UART: [kat] SHA2-384
3,331,787 UART: [kat] SHA2-512-ACC
3,332,192 UART: Droping operation
3,332,585 UART: Fatal Error: 0x90050002
3,334,135 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,140 >>> mbox cmd response: failed
3,334,140 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,169,942 UART: [cold-reset] ++
1,170,314 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,174,264 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,158 UART: [idev] Erasing UDS.KEYID = 0
1,198,706 UART: [idev] Sha1 KeyId Algorithm
1,207,508 UART: [idev] --
1,208,593 UART: [ldev] ++
1,208,761 UART: [ldev] CDI.KEYID = 6
1,209,125 UART: [ldev] SUBJECT.KEYID = 5
1,209,552 UART: [ldev] AUTHORITY.KEYID = 7
1,210,015 UART: [ldev] FE.KEYID = 1
1,215,257 UART: [ldev] Erasing FE.KEYID = 1
1,241,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,705 UART: [ldev] --
1,280,987 UART: [fwproc] Wait for Commands...
1,281,570 UART: [fwproc] Recv command 0x46574c44
1,282,303 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,671 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,059 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,035 ready_for_fw is high
1,057,035 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,995 >>> mbox cmd response: success
2,698,087 UART:
2,698,103 UART: Running Caliptra FMC ...
2,698,511 UART:
2,698,654 UART: [state] CFI Enabled
2,708,885 UART: [fht] FMC Alias Private Key: 7
2,817,196 UART: [art] Extend RT PCRs Done
2,817,624 UART: [art] Lock RT PCRs Done
2,819,340 UART: [art] Populate DV Done
2,827,477 UART: [fht] FMC Alias Private Key: 7
2,828,525 UART: [art] Derive CDI
2,828,805 UART: [art] Store in in slot 0x4
2,914,598 UART: [art] Derive Key Pair
2,914,958 UART: [art] Store priv key in slot 0x5
2,928,620 UART: [art] Derive Key Pair - Done
2,943,165 UART: [art] Signing Cert with AUTHO
2,943,645 UART: RITY.KEYID = 7
2,959,023 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,788 UART: [art] PUB.X = C2BF1ED59EC93A8DDB5B89E04535748A4BAF477CD45687B89AF19247059361901F0806895D03C9480A2DE663229F6049
2,966,539 UART: [art] PUB.Y = 6CA29C28A960625F3C2BDFD62C0AD8C9BDD1FBC2B805F784F8B146786E65F532BA9AD16A4AC84198FB27E712C3DD1EDA
2,973,505 UART: [art] SIG.R = 6786D4DC5E55B560878F6CB46DA054B0D817091984E5D67BA2676DE94999B83ABC484C977876E348F4BA3B180598CB72
2,980,267 UART: [art] SIG.S = 49720CE1270F9DA377603E32B9CBEF1F4F6E560512A553414E825CC0419DD0F1EA8679C6E916F394A3E1DBCDCB53474D
3,004,067 UART: Caliptra RT
3,004,412 UART: [state] CFI Enabled
3,112,839 UART: [rt] RT listening for mailbox commands...
3,113,502 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,461 UART: [rt]cmd =0x46504c54, len=4
3,144,546 >>> mbox cmd response data (8 bytes)
3,144,877 UART: [rt] FIPS self test
3,145,205 UART: [kat] ++
3,145,357 UART: [kat] sha1
3,149,521 UART: [kat] SHA2-256
3,151,543 UART: [kat] SHA2-384
3,154,456 UART: [kat] SHA2-512-ACC
3,154,861 UART: Droping operation
3,155,448 UART: Fatal Error: 0x90050002
3,156,998 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,157,003 >>> mbox cmd response: failed
3,157,003 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,157,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,725 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,513 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,689,885 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,834,126 >>> mbox cmd response: failed
2,834,688 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,977,866 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
4,857,292 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,414,757 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,693,389 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,838,143 >>> mbox cmd response: failed
2,838,729 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,982,083 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
4,858,934 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,439,040 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,509 writing to cptra_bootfsm_go
3,044,467 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,188,480 >>> mbox cmd response: failed
3,189,028 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,332,342 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
21,589,217 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,023,977 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
3,045,278 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,189,546 >>> mbox cmd response: failed
3,190,116 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,333,289 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
21,587,712 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,015,895 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
2,703,026 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,847,664 >>> mbox cmd response: failed
2,848,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,991,873 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,457,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,281,370 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,700,572 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,845,170 >>> mbox cmd response: failed
2,845,735 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,989,530 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,541,254 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,390,367 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,669 writing to cptra_bootfsm_go
3,053,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,198,430 >>> mbox cmd response: failed
3,199,015 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,343,196 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,187,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,921,755 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,053,018 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,197,522 >>> mbox cmd response: failed
3,198,097 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,341,831 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,182,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,888,451 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,701,894 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,847,223 >>> mbox cmd response: failed
2,847,819 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,991,580 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,479,743 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,339,038 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,050,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,195,200 >>> mbox cmd response: failed
3,195,787 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,340,022 >>> mbox cmd response: failed
Initializing fuses
994 writing to cptra_bootfsm_go
20,188,923 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,926,154 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,594 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,602 >>> mbox cmd response: failed
813,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,120 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,064 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,072 >>> mbox cmd response: failed
813,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,433 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,832 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,117 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,125 >>> mbox cmd response: failed
813,125 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,061 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,211 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,219 >>> mbox cmd response: failed
813,219 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,225 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,132 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,349 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,622 >>> mbox cmd response: failed
812,622 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,292 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,874 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,882 >>> mbox cmd response: failed
812,882 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,497 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,564 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,283 >>> mbox cmd response: failed
813,283 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,720 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,353 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,705 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,713 >>> mbox cmd response: failed
813,713 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,719 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,544 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,771 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,074 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,082 >>> mbox cmd response: failed
813,082 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,088 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,299 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,138 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,286 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,294 >>> mbox cmd response: failed
813,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,229 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,342 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,517 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,525 >>> mbox cmd response: failed
813,525 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,328 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,055 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,113 >>> mbox cmd response: failed
813,113 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
813,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,576 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,817 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,066 UART:
192,440 UART: Running Caliptra ROM ...
193,622 UART:
193,798 UART: [state] CFI Enabled
262,731 UART: [state] LifecycleState = Unprovisioned
264,699 UART: [state] DebugLocked = No
267,657 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,108 UART: [kat] SHA2-256
441,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,304 UART: [kat] ++
452,793 UART: [kat] sha1
464,308 UART: [kat] SHA2-256
467,039 UART: [kat] SHA2-384
472,185 UART: [kat] SHA2-512-ACC
474,554 UART: [kat] ECC-384
2,767,812 UART: [kat] HMAC-384Kdf
2,800,800 UART: [kat] LMS
3,991,098 UART: [kat] --
3,997,335 UART: [cold-reset] ++
3,998,873 UART: [fht] Storing FHT @ 0x50003400
4,011,783 UART: [idev] ++
4,012,358 UART: [idev] CDI.KEYID = 6
4,013,243 UART: [idev] SUBJECT.KEYID = 7
4,014,494 UART: [idev] UDS.KEYID = 0
4,015,456 ready_for_fw is high
4,015,677 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,160,413 UART: [idev] Erasing UDS.KEYID = 0
7,348,203 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,573 UART: [idev] --
7,372,403 UART: [ldev] ++
7,372,971 UART: [ldev] CDI.KEYID = 6
7,373,936 UART: [ldev] SUBJECT.KEYID = 5
7,375,149 UART: [ldev] AUTHORITY.KEYID = 7
7,376,384 UART: [ldev] FE.KEYID = 1
7,424,412 UART: [ldev] Erasing FE.KEYID = 1
10,758,235 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,359 UART: [ldev] --
13,139,031 UART: [fwproc] Waiting for Commands...
13,141,674 UART: [fwproc] Received command 0x46574c44
13,143,863 UART: [fwproc] Received Image of size 114996 bytes
17,209,650 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,286,565 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,355,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,676,332 >>> mbox cmd response: success
17,681,294 UART: [afmc] ++
17,681,886 UART: [afmc] CDI.KEYID = 6
17,682,818 UART: [afmc] SUBJECT.KEYID = 7
17,684,061 UART: [afmc] AUTHORITY.KEYID = 5
21,054,785 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,353,501 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,355,761 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,370,172 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,384,979 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,399,438 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,419,925 UART: [afmc] --
23,423,685 UART: [cold-reset] --
23,426,571 UART: [state] Locking Datavault
23,432,192 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,946 UART: [state] Locking ICCM
23,435,936 UART: [exit] Launching FMC @ 0x40000130
23,444,329 UART:
23,444,572 UART: Running Caliptra FMC ...
23,445,674 UART:
23,445,858 UART: [state] CFI Enabled
23,514,113 UART: [fht] FMC Alias Private Key: 7
25,851,540 UART: [art] Extend RT PCRs Done
25,852,769 UART: [art] Lock RT PCRs Done
25,854,289 UART: [art] Populate DV Done
25,859,602 UART: [fht] FMC Alias Private Key: 7
25,861,196 UART: [art] Derive CDI
25,862,016 UART: [art] Store in in slot 0x4
25,922,423 UART: [art] Derive Key Pair
25,923,461 UART: [art] Store priv key in slot 0x5
29,217,036 UART: [art] Derive Key Pair - Done
29,229,988 UART: [art] Signing Cert with AUTHO
29,231,299 UART: RITY.KEYID = 7
31,517,340 UART: [art] Erasing AUTHORITY.KEYID = 7
31,519,125 UART: [art] PUB.X = 287BC1EEB5636D4C94D1A5244ADBCA0FA2159146AC624071A7DDF1AC2381E8027AFF63448D903626E8670CF6045980F5
31,526,064 UART: [art] PUB.Y = 92D3C561D85CF8852AB7A3984E6310E82C30FF5ED5D14C61AEC8FBFD18A0784C169F13950A60DBC908579B7F6FD942A9
31,533,332 UART: [art] SIG.R = F9E0C4E1839DFC05E0782FAAA150BA020701F90A89EE92DED58482E95634C067E4A95DED553150B77B26521A5D86F340
31,540,696 UART: [art] SIG.S = 5E9937483436A4502B1AC4FB70E4F7B76148270AAA72C7B2051AF51FF30C017256D183961F10384E9CC4058D14D756F7
32,846,430 UART: Caliptra RT
32,847,848 UART: [state] CFI Enabled
33,011,109 UART: [rt] RT listening for mailbox commands...
33,013,587 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,043,320 UART: [rt]cmd =0x46504c54, len=4
33,044,941 >>> mbox cmd response data (8 bytes)
33,046,546 UART: [rt] FIPS self test
33,047,728 UART: [kat] ++
33,048,230 UART: [kat] sha1
33,052,313 UART: [kat] SHA2-256
33,054,255 UART: [kat] SHA2-384
33,057,226 UART: [kat] SHA2-512-ACC
33,058,230 UART: Droping operation
33,059,097 UART: Fatal Error: 0x90050003
33,094,802 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,239,979 >>> mbox cmd response: failed
33,241,272 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,385,885 >>> mbox cmd response: failed
Initializing fuses
1,020 writing to cptra_bootfsm_go
190,106 UART:
190,899 UART: Running Caliptra ROM ...
191,940 UART:
192,088 UART: [state] CFI Enabled
265,071 UART: [state] LifecycleState = Unprovisioned
267,405 UART: [state] DebugLocked = No
269,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,089 UART: [kat] SHA2-256
443,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,295 UART: [kat] ++
454,865 UART: [kat] sha1
464,671 UART: [kat] SHA2-256
467,361 UART: [kat] SHA2-384
472,962 UART: [kat] SHA2-512-ACC
475,302 UART: [kat] ECC-384
2,778,615 UART: [kat] HMAC-384Kdf
2,794,830 UART: [kat] LMS
3,985,099 UART: [kat] --
3,990,390 UART: [cold-reset] ++
3,992,505 UART: [fht] Storing FHT @ 0x50003400
4,003,619 UART: [idev] ++
4,004,241 UART: [idev] CDI.KEYID = 6
4,005,150 UART: [idev] SUBJECT.KEYID = 7
4,006,295 UART: [idev] UDS.KEYID = 0
4,008,438 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,153,126 UART: [idev] Erasing UDS.KEYID = 0
7,349,204 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,378 UART: [idev] --
7,373,572 UART: [ldev] ++
7,374,164 UART: [ldev] CDI.KEYID = 6
7,375,082 UART: [ldev] SUBJECT.KEYID = 5
7,376,308 UART: [ldev] AUTHORITY.KEYID = 7
7,377,609 UART: [ldev] FE.KEYID = 1
7,407,490 UART: [ldev] Erasing FE.KEYID = 1
10,732,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,118 UART: [ldev] --
13,104,950 UART: [fwproc] Waiting for Commands...
13,108,029 UART: [fwproc] Received command 0x46574c44
13,110,239 UART: [fwproc] Received Image of size 114996 bytes
17,167,256 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,696 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,637,956 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,784,558 ready_for_fw is high
3,784,954 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,886,624 >>> mbox cmd response: success
23,569,636 UART:
23,570,042 UART: Running Caliptra FMC ...
23,571,175 UART:
23,571,331 UART: [state] CFI Enabled
23,638,789 UART: [fht] FMC Alias Private Key: 7
25,977,057 UART: [art] Extend RT PCRs Done
25,978,313 UART: [art] Lock RT PCRs Done
25,980,301 UART: [art] Populate DV Done
25,985,789 UART: [fht] FMC Alias Private Key: 7
25,987,330 UART: [art] Derive CDI
25,988,065 UART: [art] Store in in slot 0x4
26,039,459 UART: [art] Derive Key Pair
26,040,501 UART: [art] Store priv key in slot 0x5
29,325,272 UART: [art] Derive Key Pair - Done
29,338,286 UART: [art] Signing Cert with AUTHO
29,339,587 UART: RITY.KEYID = 7
31,626,232 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,745 UART: [art] PUB.X = DE4F67425D903183BF0ABC4255B8DE2A1D78704B20FCE8A2894AF6E2213814F4A785CB9D46A52877098FCADC38383333
31,635,004 UART: [art] PUB.Y = 312B2D562D48C61DAF7CE9CC58E6C61BBEFE73CE19ED50EE0E584F4FB2D45B47D0A6B12B10BC62A50C46FF32FBA6AEFA
31,642,279 UART: [art] SIG.R = 75BA3624B1E8B7022D01516B8209F08B0EE18C756EC4A14DB65BCFAA5702D087EB7992036366797D60C2ACAE09F6D3B9
31,649,677 UART: [art] SIG.S = F88C903434E14874D33743C1C1A0064E61AA78CA51049A21BC50756440E1BE79EDFF08DB29EA7D8CD479AC3BD8A61CFC
32,954,801 UART: Caliptra RT
32,955,502 UART: [state] CFI Enabled
33,119,362 UART: [rt] RT listening for mailbox commands...
33,121,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,151,159 UART: [rt]cmd =0x46504c54, len=4
33,152,959 >>> mbox cmd response data (8 bytes)
33,154,372 UART: [rt] FIPS self test
33,155,315 UART: [kat] ++
33,155,760 UART: [kat] sha1
33,160,270 UART: [kat] SHA2-256
33,162,199 UART: [kat] SHA2-384
33,165,351 UART: [kat] SHA2-512-ACC
33,166,356 UART: Droping operation
33,167,293 UART: Fatal Error: 0x90050003
33,202,676 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,346,992 >>> mbox cmd response: failed
33,347,652 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,492,429 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,771,051 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,854,010 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,589 UART:
192,949 UART: Running Caliptra ROM ...
194,094 UART:
603,953 UART: [state] CFI Enabled
617,469 UART: [state] LifecycleState = Unprovisioned
619,350 UART: [state] DebugLocked = No
621,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,800 UART: [kat] SHA2-256
796,536 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,136 UART: [kat] ++
807,669 UART: [kat] sha1
817,174 UART: [kat] SHA2-256
819,894 UART: [kat] SHA2-384
826,534 UART: [kat] SHA2-512-ACC
828,842 UART: [kat] ECC-384
3,112,539 UART: [kat] HMAC-384Kdf
3,123,607 UART: [kat] LMS
4,313,733 UART: [kat] --
4,318,840 UART: [cold-reset] ++
4,319,852 UART: [fht] Storing FHT @ 0x50003400
4,331,857 UART: [idev] ++
4,332,426 UART: [idev] CDI.KEYID = 6
4,333,383 UART: [idev] SUBJECT.KEYID = 7
4,334,843 UART: [idev] UDS.KEYID = 0
4,335,803 ready_for_fw is high
4,336,026 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,480,391 UART: [idev] Erasing UDS.KEYID = 0
7,619,913 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,112 UART: [idev] --
7,646,854 UART: [ldev] ++
7,647,418 UART: [ldev] CDI.KEYID = 6
7,648,353 UART: [ldev] SUBJECT.KEYID = 5
7,649,622 UART: [ldev] AUTHORITY.KEYID = 7
7,650,773 UART: [ldev] FE.KEYID = 1
7,662,851 UART: [ldev] Erasing FE.KEYID = 1
10,950,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,898 UART: [ldev] --
13,308,695 UART: [fwproc] Waiting for Commands...
13,311,117 UART: [fwproc] Received command 0x46574c44
13,313,326 UART: [fwproc] Received Image of size 114996 bytes
17,362,795 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,500 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,827,203 >>> mbox cmd response: success
17,830,643 UART: [afmc] ++
17,831,238 UART: [afmc] CDI.KEYID = 6
17,832,125 UART: [afmc] SUBJECT.KEYID = 7
17,833,390 UART: [afmc] AUTHORITY.KEYID = 5
21,150,810 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,173 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,440 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,810 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,632 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,066 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,078 UART: [afmc] --
23,517,313 UART: [cold-reset] --
23,519,774 UART: [state] Locking Datavault
23,524,913 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,613 UART: [state] Locking ICCM
23,528,870 UART: [exit] Launching FMC @ 0x40000130
23,537,273 UART:
23,537,549 UART: Running Caliptra FMC ...
23,538,661 UART:
23,538,822 UART: [state] CFI Enabled
23,547,087 UART: [fht] FMC Alias Private Key: 7
25,878,454 UART: [art] Extend RT PCRs Done
25,879,680 UART: [art] Lock RT PCRs Done
25,880,924 UART: [art] Populate DV Done
25,886,340 UART: [fht] FMC Alias Private Key: 7
25,887,821 UART: [art] Derive CDI
25,888,583 UART: [art] Store in in slot 0x4
25,930,975 UART: [art] Derive Key Pair
25,931,981 UART: [art] Store priv key in slot 0x5
29,173,979 UART: [art] Derive Key Pair - Done
29,186,924 UART: [art] Signing Cert with AUTHO
29,188,225 UART: RITY.KEYID = 7
31,467,803 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,316 UART: [art] PUB.X = 1695EEF125D0689EFF817AD0AD18894E8951B2A2B99643D3358E8352BD041A6DF1F8C8CB394CE785B8AD78A720C55166
31,476,508 UART: [art] PUB.Y = 19DCF17AFCC89C89A3BD294F427A14C911F60405417E251A3CBD8BE479067C3D02CCA88893FCF1D016B78EE104451739
31,483,808 UART: [art] SIG.R = 0918A5B6FFFE141D64265F5B9C7FF685BD57776F9FF5D4B9CFA265B9308AB6C63E532C703FECBDA39E8E25F26E3233C9
31,491,157 UART: [art] SIG.S = 7A5B508888D336712945EF9BF46D0BC8902107FD633427FFD9F5D07A7BFA2B6127CA84CC75A235FB6DFD148BB6682E22
32,795,676 UART: Caliptra RT
32,796,394 UART: [state] CFI Enabled
32,913,911 UART: [rt] RT listening for mailbox commands...
32,915,766 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,945,655 UART: [rt]cmd =0x46504c54, len=4
32,947,340 >>> mbox cmd response data (8 bytes)
32,948,062 UART: [rt] FIPS self test
32,949,007 UART: [kat] ++
32,949,504 UART: [kat] sha1
32,954,018 UART: [kat] SHA2-256
32,956,004 UART: [kat] SHA2-384
32,958,815 UART: [kat] SHA2-512-ACC
32,959,865 UART: Droping operation
32,960,716 UART: Fatal Error: 0x90050003
32,996,089 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,140,585 >>> mbox cmd response: failed
33,141,178 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,285,346 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,121 UART:
190,413 UART: Running Caliptra ROM ...
191,493 UART:
7,245,290 UART: [state] CFI Enabled
7,257,664 UART: [state] LifecycleState = Unprovisioned
7,259,573 UART: [state] DebugLocked = No
7,262,474 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,267,803 UART: [kat] SHA2-256
7,437,530 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,448,057 UART: [kat] ++
7,448,607 UART: [kat] sha1
7,459,854 UART: [kat] SHA2-256
7,462,553 UART: [kat] SHA2-384
7,468,214 UART: [kat] SHA2-512-ACC
7,470,561 UART: [kat] ECC-384
9,752,406 UART: [kat] HMAC-384Kdf
9,763,394 UART: [kat] LMS
10,953,510 UART: [kat] --
10,956,544 UART: [cold-reset] ++
10,958,207 UART: [fht] Storing FHT @ 0x50003400
10,969,689 UART: [idev] ++
10,970,295 UART: [idev] CDI.KEYID = 6
10,971,213 UART: [idev] SUBJECT.KEYID = 7
10,972,430 UART: [idev] UDS.KEYID = 0
10,973,997 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,118,229 UART: [idev] Erasing UDS.KEYID = 0
14,261,466 UART: [idev] Using Sha1 for KeyId Algorithm
14,283,119 UART: [idev] --
14,286,248 UART: [ldev] ++
14,286,872 UART: [ldev] CDI.KEYID = 6
14,287,780 UART: [ldev] SUBJECT.KEYID = 5
14,288,998 UART: [ldev] AUTHORITY.KEYID = 7
14,290,288 UART: [ldev] FE.KEYID = 1
14,300,510 UART: [ldev] Erasing FE.KEYID = 1
17,589,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,879,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,893,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,908,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,923,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,942,154 UART: [ldev] --
19,947,591 UART: [fwproc] Waiting for Commands...
19,949,423 UART: [fwproc] Received command 0x46574c44
19,951,616 UART: [fwproc] Received Image of size 114996 bytes
24,023,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,101,729 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,170,595 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,490,855 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,127,934 ready_for_fw is high
4,128,396 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,085,835 >>> mbox cmd response: success
23,724,090 UART:
23,724,494 UART: Running Caliptra FMC ...
23,725,718 UART:
23,725,888 UART: [state] CFI Enabled
23,734,044 UART: [fht] FMC Alias Private Key: 7
26,064,386 UART: [art] Extend RT PCRs Done
26,065,618 UART: [art] Lock RT PCRs Done
26,066,874 UART: [art] Populate DV Done
26,072,133 UART: [fht] FMC Alias Private Key: 7
26,073,790 UART: [art] Derive CDI
26,074,613 UART: [art] Store in in slot 0x4
26,117,119 UART: [art] Derive Key Pair
26,118,159 UART: [art] Store priv key in slot 0x5
29,360,149 UART: [art] Derive Key Pair - Done
29,373,296 UART: [art] Signing Cert with AUTHO
29,374,637 UART: RITY.KEYID = 7
31,653,862 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,380 UART: [art] PUB.X = AC69D4A8C2162B4E109E18D44E50B7273D82E280B0016BD6F0325BD7A10C1E8BE52DA76BECBF5DC16145AEB2BAF36BD7
31,662,604 UART: [art] PUB.Y = 6F375802173E1479DAA3158AE87488E01BEE9B7E6B224C47B573C68C0D25236F5693B7C31344825D1E3AC6470B105AB2
31,669,815 UART: [art] SIG.R = 7237E361B7875E6D959182CE38F6C51DE801E6245F00210BC27251FEA8E2C59373320F6A882E6C6C30AAD8BBDE0396B0
31,677,216 UART: [art] SIG.S = F4BB10C22BC015CF555421A208BEEC709C16A91B8E2A6745ABA98721F764C0F40553E2755AE1E2D13E7043CD52FD722E
32,981,763 UART: Caliptra RT
32,982,488 UART: [state] CFI Enabled
33,101,185 UART: [rt] RT listening for mailbox commands...
33,103,034 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,133,060 UART: [rt]cmd =0x46504c54, len=4
33,134,565 >>> mbox cmd response data (8 bytes)
33,135,674 UART: [rt] FIPS self test
33,136,656 UART: [kat] ++
33,137,110 UART: [kat] sha1
33,141,317 UART: [kat] SHA2-256
33,143,304 UART: [kat] SHA2-384
33,146,102 UART: [kat] SHA2-512-ACC
33,147,104 UART: Droping operation
33,148,041 UART: Fatal Error: 0x90050003
33,183,252 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,327,737 >>> mbox cmd response: failed
33,328,397 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,472,749 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
10,586,704 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,550,198 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
192,161 UART:
192,532 UART: Running Caliptra ROM ...
193,682 UART:
194,046 UART: [state] CFI Enabled
260,533 UART: [state] LifecycleState = Unprovisioned
262,407 UART: [state] DebugLocked = No
264,367 UART: [state] WD Timer not started. Device not locked for debugging
268,255 UART: [kat] SHA2-256
447,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,940 UART: [kat] ++
459,479 UART: [kat] sha1
470,432 UART: [kat] SHA2-256
473,449 UART: [kat] SHA2-384
480,601 UART: [kat] SHA2-512-ACC
483,618 UART: [kat] ECC-384
2,947,818 UART: [kat] HMAC-384Kdf
2,972,716 UART: [kat] LMS
3,502,126 UART: [kat] --
3,508,126 UART: [cold-reset] ++
3,509,066 UART: [fht] FHT @ 0x50003400
3,519,839 UART: [idev] ++
3,520,403 UART: [idev] CDI.KEYID = 6
3,521,402 UART: [idev] SUBJECT.KEYID = 7
3,522,580 UART: [idev] UDS.KEYID = 0
3,523,508 ready_for_fw is high
3,523,742 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,877 UART: [idev] Erasing UDS.KEYID = 0
6,028,614 UART: [idev] Sha1 KeyId Algorithm
6,050,838 UART: [idev] --
6,055,206 UART: [ldev] ++
6,055,787 UART: [ldev] CDI.KEYID = 6
6,056,677 UART: [ldev] SUBJECT.KEYID = 5
6,057,897 UART: [ldev] AUTHORITY.KEYID = 7
6,059,139 UART: [ldev] FE.KEYID = 1
6,102,924 UART: [ldev] Erasing FE.KEYID = 1
8,609,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,312 UART: [ldev] --
10,416,173 UART: [fwproc] Wait for Commands...
10,418,275 UART: [fwproc] Recv command 0x46574c44
10,420,316 UART: [fwproc] Recv'd Img size: 115304 bytes
13,834,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,908,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,977,620 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,298,399 >>> mbox cmd response: success
14,302,938 UART: [afmc] ++
14,303,533 UART: [afmc] CDI.KEYID = 6
14,304,444 UART: [afmc] SUBJECT.KEYID = 7
14,305,603 UART: [afmc] AUTHORITY.KEYID = 5
16,844,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,590,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,606,484 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,622,371 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,646,207 UART: [afmc] --
18,649,108 UART: [cold-reset] --
18,652,381 UART: [state] Locking Datavault
18,656,455 UART: [state] Locking PCR0, PCR1 and PCR31
18,658,101 UART: [state] Locking ICCM
18,659,275 UART: [exit] Launching FMC @ 0x40000130
18,667,668 UART:
18,667,907 UART: Running Caliptra FMC ...
18,669,007 UART:
18,669,175 UART: [state] CFI Enabled
18,730,624 UART: [fht] FMC Alias Private Key: 7
20,494,764 UART: [art] Extend RT PCRs Done
20,495,991 UART: [art] Lock RT PCRs Done
20,497,726 UART: [art] Populate DV Done
20,503,029 UART: [fht] FMC Alias Private Key: 7
20,504,571 UART: [art] Derive CDI
20,505,384 UART: [art] Store in in slot 0x4
20,563,286 UART: [art] Derive Key Pair
20,564,319 UART: [art] Store priv key in slot 0x5
23,028,527 UART: [art] Derive Key Pair - Done
23,041,373 UART: [art] Signing Cert with AUTHO
23,042,678 UART: RITY.KEYID = 7
24,754,883 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,386 UART: [art] PUB.X = E319313E1AC43D7261A75F56930A452932CCF84CE12E06FC0A59E874CDA51BBB69ECF7AAEF114E606B49BED6F272F41E
24,763,688 UART: [art] PUB.Y = C921BBBB0ADDD52777F1186944482232E71257771165C53C1C0754F196D2AE71E099CE080864941D9CE46148F86DA76B
24,770,936 UART: [art] SIG.R = 339E085250693264A10F911CDA62F1AD74753075E84CEC3A167BFF4AD62E3D89DFA45BDCAAB405B123F2EADE46252250
24,778,325 UART: [art] SIG.S = 61591305C2530B5651785C6807F0814EB516E098BA6B6DEC7CC98D9FF59F1CD48BD3E8D3A104A3420AC9DC3F153692EF
25,756,945 UART: Caliptra RT
25,757,656 UART: [state] CFI Enabled
25,922,775 UART: [rt] RT listening for mailbox commands...
25,924,628 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,954,256 UART: [rt]cmd =0x46504c54, len=4
25,955,866 >>> mbox cmd response data (8 bytes)
25,956,724 UART: [rt] FIPS self test
25,957,679 UART: [kat] ++
25,958,152 UART: [kat] sha1
25,962,750 UART: [kat] SHA2-256
25,964,641 UART: [kat] SHA2-384
25,967,600 UART: [kat] SHA2-512-ACC
25,968,542 UART: Droping operation
25,969,343 UART: Fatal Error: 0x90050003
26,004,487 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,149,309 >>> mbox cmd response: failed
26,150,033 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,294,777 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,012 UART:
190,303 UART: Running Caliptra ROM ...
191,329 UART:
191,466 UART: [state] CFI Enabled
252,890 UART: [state] LifecycleState = Unprovisioned
254,759 UART: [state] DebugLocked = No
257,217 UART: [state] WD Timer not started. Device not locked for debugging
260,462 UART: [kat] SHA2-256
439,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
451,143 UART: [kat] ++
451,671 UART: [kat] sha1
462,496 UART: [kat] SHA2-256
465,533 UART: [kat] SHA2-384
470,175 UART: [kat] SHA2-512-ACC
473,163 UART: [kat] ECC-384
2,935,647 UART: [kat] HMAC-384Kdf
2,958,080 UART: [kat] LMS
3,487,519 UART: [kat] --
3,490,882 UART: [cold-reset] ++
3,492,117 UART: [fht] FHT @ 0x50003400
3,502,960 UART: [idev] ++
3,503,559 UART: [idev] CDI.KEYID = 6
3,504,444 UART: [idev] SUBJECT.KEYID = 7
3,505,661 UART: [idev] UDS.KEYID = 0
3,507,144 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,652,117 UART: [idev] Erasing UDS.KEYID = 0
6,017,331 UART: [idev] Sha1 KeyId Algorithm
6,041,473 UART: [idev] --
6,046,390 UART: [ldev] ++
6,046,962 UART: [ldev] CDI.KEYID = 6
6,047,871 UART: [ldev] SUBJECT.KEYID = 5
6,049,031 UART: [ldev] AUTHORITY.KEYID = 7
6,050,267 UART: [ldev] FE.KEYID = 1
6,085,318 UART: [ldev] Erasing FE.KEYID = 1
8,589,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,943 UART: [ldev] --
10,399,350 UART: [fwproc] Wait for Commands...
10,401,069 UART: [fwproc] Recv command 0x46574c44
10,403,168 UART: [fwproc] Recv'd Img size: 115304 bytes
13,820,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,536 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,289,360 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
3,361,988 ready_for_fw is high
3,362,422 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,061,050 >>> mbox cmd response: success
18,348,249 UART:
18,348,665 UART: Running Caliptra FMC ...
18,349,789 UART:
18,349,955 UART: [state] CFI Enabled
18,414,124 UART: [fht] FMC Alias Private Key: 7
20,177,457 UART: [art] Extend RT PCRs Done
20,178,678 UART: [art] Lock RT PCRs Done
20,180,169 UART: [art] Populate DV Done
20,185,855 UART: [fht] FMC Alias Private Key: 7
20,187,353 UART: [art] Derive CDI
20,188,088 UART: [art] Store in in slot 0x4
20,246,926 UART: [art] Derive Key Pair
20,247,968 UART: [art] Store priv key in slot 0x5
22,710,941 UART: [art] Derive Key Pair - Done
22,723,565 UART: [art] Signing Cert with AUTHO
22,724,875 UART: RITY.KEYID = 7
24,436,948 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,452 UART: [art] PUB.X = B082F2CF22B6551B9868F30A72B1EEF3E02534E237C6995AE1E6A23DE99C15DEDE2BD46C2A40B6371EF94E3BA1D2FED0
24,445,731 UART: [art] PUB.Y = D590ED102ADA92713FD9664ACB47DA81E9AE5BA3765F140735A4667CAF75EB557B731B36665D22FD6469B940BCD6B950
24,453,008 UART: [art] SIG.R = 9B439E6482ECF368D5806257E56E50A4281DCA0F9B765F83595AC0E65D814D45F10C0308594A4FE4B18533D63D159703
24,460,421 UART: [art] SIG.S = A664B7AA0FD58856A60DCBB9A3534BA6D1CBF8CBAD9FFD611323B884211C52BCB64305BAC5EB85E9B7B59AA0969F0399
25,440,173 UART: Caliptra RT
25,440,894 UART: [state] CFI Enabled
25,606,180 UART: [rt] RT listening for mailbox commands...
25,608,059 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,637,744 UART: [rt]cmd =0x46504c54, len=4
25,639,544 >>> mbox cmd response data (8 bytes)
25,640,546 UART: [rt] FIPS self test
25,641,485 UART: [kat] ++
25,641,939 UART: [kat] sha1
25,646,370 UART: [kat] SHA2-256
25,648,304 UART: [kat] SHA2-384
25,651,101 UART: [kat] SHA2-512-ACC
25,652,077 UART: Droping operation
25,652,882 UART: Fatal Error: 0x90050003
25,688,258 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,833,438 >>> mbox cmd response: failed
25,834,128 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,978,782 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
3,356,730 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,047,394 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
192,485 UART:
192,866 UART: Running Caliptra ROM ...
194,039 UART:
603,470 UART: [state] CFI Enabled
614,161 UART: [state] LifecycleState = Unprovisioned
616,044 UART: [state] DebugLocked = No
618,361 UART: [state] WD Timer not started. Device not locked for debugging
621,469 UART: [kat] SHA2-256
800,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,170 UART: [kat] ++
812,707 UART: [kat] sha1
822,968 UART: [kat] SHA2-256
826,039 UART: [kat] SHA2-384
832,543 UART: [kat] SHA2-512-ACC
835,478 UART: [kat] ECC-384
3,275,718 UART: [kat] HMAC-384Kdf
3,288,563 UART: [kat] LMS
3,818,014 UART: [kat] --
3,821,661 UART: [cold-reset] ++
3,823,023 UART: [fht] FHT @ 0x50003400
3,834,717 UART: [idev] ++
3,835,282 UART: [idev] CDI.KEYID = 6
3,836,313 UART: [idev] SUBJECT.KEYID = 7
3,837,418 UART: [idev] UDS.KEYID = 0
3,838,360 ready_for_fw is high
3,838,605 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,983,941 UART: [idev] Erasing UDS.KEYID = 0
6,307,838 UART: [idev] Sha1 KeyId Algorithm
6,330,866 UART: [idev] --
6,334,965 UART: [ldev] ++
6,335,541 UART: [ldev] CDI.KEYID = 6
6,336,426 UART: [ldev] SUBJECT.KEYID = 5
6,337,583 UART: [ldev] AUTHORITY.KEYID = 7
6,338,965 UART: [ldev] FE.KEYID = 1
6,347,734 UART: [ldev] Erasing FE.KEYID = 1
8,818,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,585,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,605,097 UART: [ldev] --
10,609,339 UART: [fwproc] Wait for Commands...
10,611,325 UART: [fwproc] Recv command 0x46574c44
10,613,431 UART: [fwproc] Recv'd Img size: 115304 bytes
14,027,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,096 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,493,709 >>> mbox cmd response: success
14,498,168 UART: [afmc] ++
14,498,785 UART: [afmc] CDI.KEYID = 6
14,499,675 UART: [afmc] SUBJECT.KEYID = 7
14,500,840 UART: [afmc] AUTHORITY.KEYID = 5
16,996,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,117 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,095 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,985 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,823 UART: [afmc] --
18,793,684 UART: [cold-reset] --
18,797,458 UART: [state] Locking Datavault
18,801,359 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,010 UART: [state] Locking ICCM
18,805,327 UART: [exit] Launching FMC @ 0x40000130
18,813,723 UART:
18,813,967 UART: Running Caliptra FMC ...
18,815,073 UART:
18,815,241 UART: [state] CFI Enabled
18,823,677 UART: [fht] FMC Alias Private Key: 7
20,580,391 UART: [art] Extend RT PCRs Done
20,581,621 UART: [art] Lock RT PCRs Done
20,583,142 UART: [art] Populate DV Done
20,588,498 UART: [fht] FMC Alias Private Key: 7
20,590,139 UART: [art] Derive CDI
20,590,953 UART: [art] Store in in slot 0x4
20,634,194 UART: [art] Derive Key Pair
20,635,216 UART: [art] Store priv key in slot 0x5
23,061,379 UART: [art] Derive Key Pair - Done
23,074,157 UART: [art] Signing Cert with AUTHO
23,075,475 UART: RITY.KEYID = 7
24,780,760 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,270 UART: [art] PUB.X = 92BE90CFCEB0D5499A63EC3C886EAFC9210AD28EF5049B211A887FBB841680F1D81798B2CD59F17726ECEF2F5C53127E
24,789,581 UART: [art] PUB.Y = D336AC3137CEC2E38B7DBE5A6A67DBC9F4C257840380525D0D326526182222AD637A8F7278B75A2EAD104F6B8F30F5A6
24,796,815 UART: [art] SIG.R = 981539DA9CB73B26B0F414B884E842B5D6A14C81BC93F28D098099B3BAA71A981FD89C9BBE3817D5F848063ABE528B94
24,804,210 UART: [art] SIG.S = F82C621E8E468DEE27EC17F7A2C2A24ECBE9B16194937D54FD4A6335E7298B86B2C7226B176C1FDBDEBDD2F857BC7109
25,783,163 UART: Caliptra RT
25,783,864 UART: [state] CFI Enabled
25,901,461 UART: [rt] RT listening for mailbox commands...
25,903,308 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,933,167 UART: [rt]cmd =0x46504c54, len=4
25,934,791 >>> mbox cmd response data (8 bytes)
25,936,177 UART: [rt] FIPS self test
25,937,134 UART: [kat] ++
25,937,580 UART: [kat] sha1
25,941,962 UART: [kat] SHA2-256
25,943,906 UART: [kat] SHA2-384
25,947,116 UART: [kat] SHA2-512-ACC
25,948,107 UART: Droping operation
25,948,933 UART: Fatal Error: 0x90050003
25,984,131 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,128,919 >>> mbox cmd response: failed
26,129,569 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,274,298 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,038 UART:
190,326 UART: Running Caliptra ROM ...
191,351 UART:
14,252,987 UART: [state] CFI Enabled
14,268,088 UART: [state] LifecycleState = Unprovisioned
14,269,954 UART: [state] DebugLocked = No
14,272,283 UART: [state] WD Timer not started. Device not locked for debugging
14,275,322 UART: [kat] SHA2-256
14,454,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,466,044 UART: [kat] ++
14,466,589 UART: [kat] sha1
14,477,428 UART: [kat] SHA2-256
14,480,498 UART: [kat] SHA2-384
14,487,400 UART: [kat] SHA2-512-ACC
14,490,338 UART: [kat] ECC-384
16,929,972 UART: [kat] HMAC-384Kdf
16,943,678 UART: [kat] LMS
17,473,192 UART: [kat] --
17,479,195 UART: [cold-reset] ++
17,481,526 UART: [fht] FHT @ 0x50003400
17,491,260 UART: [idev] ++
17,491,820 UART: [idev] CDI.KEYID = 6
17,492,752 UART: [idev] SUBJECT.KEYID = 7
17,493,966 UART: [idev] UDS.KEYID = 0
17,495,488 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,640,353 UART: [idev] Erasing UDS.KEYID = 0
19,966,207 UART: [idev] Sha1 KeyId Algorithm
19,990,281 UART: [idev] --
19,994,513 UART: [ldev] ++
19,995,091 UART: [ldev] CDI.KEYID = 6
19,995,975 UART: [ldev] SUBJECT.KEYID = 5
19,997,182 UART: [ldev] AUTHORITY.KEYID = 7
19,998,416 UART: [ldev] FE.KEYID = 1
20,008,226 UART: [ldev] Erasing FE.KEYID = 1
22,481,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,199,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,216,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,231,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,247,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,266,405 UART: [ldev] --
24,270,749 UART: [fwproc] Wait for Commands...
24,273,490 UART: [fwproc] Recv command 0x46574c44
24,275,589 UART: [fwproc] Recv'd Img size: 115304 bytes
27,697,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,765,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,834,733 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,156,354 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
3,693,725 ready_for_fw is high
3,694,325 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,283,734 >>> mbox cmd response: success
18,535,153 UART:
18,535,563 UART: Running Caliptra FMC ...
18,536,684 UART:
18,536,845 UART: [state] CFI Enabled
18,544,668 UART: [fht] FMC Alias Private Key: 7
20,301,816 UART: [art] Extend RT PCRs Done
20,303,047 UART: [art] Lock RT PCRs Done
20,304,683 UART: [art] Populate DV Done
20,310,239 UART: [fht] FMC Alias Private Key: 7
20,311,888 UART: [art] Derive CDI
20,312,727 UART: [art] Store in in slot 0x4
20,355,393 UART: [art] Derive Key Pair
20,356,442 UART: [art] Store priv key in slot 0x5
22,782,729 UART: [art] Derive Key Pair - Done
22,795,627 UART: [art] Signing Cert with AUTHO
22,796,923 UART: RITY.KEYID = 7
24,502,145 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,789 UART: [art] PUB.X = E5AD7847001D78C479997C4360A685B8EB3116FBAE5AFDD2BC9EB16F4AAD8B5D791E951167E4AB58294E452DB4C4D9B1
24,510,923 UART: [art] PUB.Y = 370FCDF6C249D2683C5853AEEE7A1D94E0F641422F0F7D65A513869045D799E0CD19475EB6B57D12EAD5980034873D04
24,518,115 UART: [art] SIG.R = A282DE43E7543935DCE493E7E2FDC58E47BDEE406A37D7475F0A6F48EF2903600C40D734A6E4F9E4BF0C0BEC2897F7E2
24,525,537 UART: [art] SIG.S = 23DEA60D2CEB9370CB3A7FC9B18A8018BB7B96A01D01E4EAFF4B97914A439D1F9EC0C3BA784D3F8E7BF4CD061361EB1C
25,504,614 UART: Caliptra RT
25,505,317 UART: [state] CFI Enabled
25,622,699 UART: [rt] RT listening for mailbox commands...
25,624,690 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,654,698 UART: [rt]cmd =0x46504c54, len=4
25,656,352 >>> mbox cmd response data (8 bytes)
25,657,627 UART: [rt] FIPS self test
25,658,570 UART: [kat] ++
25,659,020 UART: [kat] sha1
25,663,370 UART: [kat] SHA2-256
25,665,302 UART: [kat] SHA2-384
25,668,320 UART: [kat] SHA2-512-ACC
25,669,298 UART: Droping operation
25,670,071 UART: Fatal Error: 0x90050003
25,705,452 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,850,185 >>> mbox cmd response: failed
25,850,815 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,995,599 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
17,630,421 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,217,772 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,440,512 ready_for_fw is high
3,441,061 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,750,386 >>> mbox cmd response: success
19,027,463 UART:
19,027,875 UART: Running Caliptra FMC ...
19,029,202 UART:
19,029,383 UART: [state] CFI Enabled
19,085,926 UART: [fht] FMC Alias Private Key: 7
20,850,240 UART: [art] Extend RT PCRs Done
20,851,468 UART: [art] Lock RT PCRs Done
20,853,291 UART: [art] Populate DV Done
20,858,708 UART: [fht] FMC Alias Private Key: 7
20,860,359 UART: [art] Derive CDI
20,861,101 UART: [art] Store in in slot 0x4
20,918,850 UART: [art] Derive Key Pair
20,919,896 UART: [art] Store priv key in slot 0x5
23,382,555 UART: [art] Derive Key Pair - Done
23,395,663 UART: [art] Signing Cert with AUTHO
23,396,967 UART: RITY.KEYID = 7
25,108,816 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,350 UART: [art] PUB.X = F5A54AD4FB0225428345FAE5EB2469F9B91E3C6732042AEF55186CEFCE3467D17D8895B4AE3C51DFB4B2B1F2CFAEABD7
25,117,610 UART: [art] PUB.Y = 76A20DF285B4FD0B37C650E28B760FF01B41CDAB9687D34287F6100B712E81342C1D9CA0C114CEC8E5082CE3EE523413
25,124,861 UART: [art] SIG.R = 5F63F81B869081E7D1D2C1EEDC67B047694E3D0E9CC682B74388553E27AB480E673241E8D265FD4FFD0246D7CC51103C
25,132,270 UART: [art] SIG.S = 61E7FEBB3530FE8B9F2A21AB2879F532B51D076C62026C5417C60FE79B32815DD3F74DB03DCEB3315DB49423388F04C7
26,110,937 UART: Caliptra RT
26,111,630 UART: [state] CFI Enabled
26,276,802 UART: [rt] RT listening for mailbox commands...
26,278,653 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,308,484 UART: [rt]cmd =0x46504c54, len=4
26,309,901 >>> mbox cmd response data (8 bytes)
26,311,011 UART: [rt] FIPS self test
26,311,952 UART: [kat] ++
26,312,433 UART: [kat] sha1
26,317,053 UART: [kat] SHA2-256
26,318,952 UART: [kat] SHA2-384
26,322,012 UART: [kat] SHA2-512-ACC
26,323,017 UART: Droping operation
26,323,853 UART: Fatal Error: 0x90050003
26,359,057 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,503,868 >>> mbox cmd response: failed
26,504,490 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,649,198 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,418,171 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,729,880 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,757,323 ready_for_fw is high
3,757,751 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,979,636 >>> mbox cmd response: success
19,230,573 UART:
19,230,969 UART: Running Caliptra FMC ...
19,232,283 UART:
19,232,454 UART: [state] CFI Enabled
19,240,162 UART: [fht] FMC Alias Private Key: 7
20,997,371 UART: [art] Extend RT PCRs Done
20,998,595 UART: [art] Lock RT PCRs Done
21,000,500 UART: [art] Populate DV Done
21,005,936 UART: [fht] FMC Alias Private Key: 7
21,007,390 UART: [art] Derive CDI
21,008,164 UART: [art] Store in in slot 0x4
21,050,548 UART: [art] Derive Key Pair
21,051,553 UART: [art] Store priv key in slot 0x5
23,478,241 UART: [art] Derive Key Pair - Done
23,491,360 UART: [art] Signing Cert with AUTHO
23,492,666 UART: RITY.KEYID = 7
25,198,255 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,765 UART: [art] PUB.X = 476E812E46A21A8F2B201EDE4ACED92B3F9A6AEF6C79C4D65E138DA70716A4EB4878D64317D236C7667B240C286E5D3A
25,206,991 UART: [art] PUB.Y = 1986B986CAC6BCD7C2065DD7E40E95C0FEE8455ABAEB2FE5BB464DD07212BF6A7C34FA014B78CC7CAA630126E28D7F34
25,214,268 UART: [art] SIG.R = C8CB87583C3064106A259A51CE42AA637A261DCA36757009386231146EC70E2D860EF6913CFF2B8813FC81A03C0F18C2
25,221,648 UART: [art] SIG.S = C6DB4C9D114C5DA17BE66F7E0649FFD094988AC8D42BB779B7A5716AAE38251EB4A0FB6AB5A9DCE4F61C6FB9722BE256
26,200,735 UART: Caliptra RT
26,201,428 UART: [state] CFI Enabled
26,318,640 UART: [rt] RT listening for mailbox commands...
26,320,531 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,350,433 UART: [rt]cmd =0x46504c54, len=4
26,352,057 >>> mbox cmd response data (8 bytes)
26,352,950 UART: [rt] FIPS self test
26,353,894 UART: [kat] ++
26,354,346 UART: [kat] sha1
26,359,018 UART: [kat] SHA2-256
26,360,957 UART: [kat] SHA2-384
26,363,858 UART: [kat] SHA2-512-ACC
26,364,829 UART: Droping operation
26,365,680 UART: Fatal Error: 0x90050003
26,400,884 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,545,747 >>> mbox cmd response: failed
26,546,363 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,691,099 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
16,997,684 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,208,309 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,316 UART: [kat] SHA2-512-ACC
897,217 UART: [kat] ECC-384
902,708 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,583 UART: [cold-reset] ++
1,476,923 UART: [fht] Storing FHT @ 0x50003400
1,479,778 UART: [idev] ++
1,479,946 UART: [idev] CDI.KEYID = 6
1,480,306 UART: [idev] SUBJECT.KEYID = 7
1,480,730 UART: [idev] UDS.KEYID = 0
1,481,075 ready_for_fw is high
1,481,075 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,868 UART: [idev] Erasing UDS.KEYID = 0
1,505,834 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,524 UART: [idev] --
1,515,533 UART: [ldev] ++
1,515,701 UART: [ldev] CDI.KEYID = 6
1,516,064 UART: [ldev] SUBJECT.KEYID = 5
1,516,490 UART: [ldev] AUTHORITY.KEYID = 7
1,516,953 UART: [ldev] FE.KEYID = 1
1,522,203 UART: [ldev] Erasing FE.KEYID = 1
1,547,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,074 UART: [ldev] --
1,586,365 UART: [fwproc] Waiting for Commands...
1,586,992 UART: [fwproc] Received command 0x46574c44
1,587,783 UART: [fwproc] Received Image of size 115304 bytes
2,898,040 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,208 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,560 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,913 >>> mbox cmd response: success
3,093,077 UART: [afmc] ++
3,093,245 UART: [afmc] CDI.KEYID = 6
3,093,607 UART: [afmc] SUBJECT.KEYID = 7
3,094,032 UART: [afmc] AUTHORITY.KEYID = 5
3,129,075 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,383 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,163 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,891 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,776 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,466 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,455 UART: [afmc] --
3,172,577 UART: [cold-reset] --
3,173,523 UART: [state] Locking Datavault
3,174,654 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,258 UART: [state] Locking ICCM
3,175,830 UART: [exit] Launching FMC @ 0x40000130
3,181,159 UART:
3,181,175 UART: Running Caliptra FMC ...
3,181,583 UART:
3,181,637 UART: [state] CFI Enabled
3,191,984 UART: [fht] FMC Alias Private Key: 7
3,299,427 UART: [art] Extend RT PCRs Done
3,299,855 UART: [art] Lock RT PCRs Done
3,301,535 UART: [art] Populate DV Done
3,309,748 UART: [fht] FMC Alias Private Key: 7
3,310,910 UART: [art] Derive CDI
3,311,190 UART: [art] Store in in slot 0x4
3,396,703 UART: [art] Derive Key Pair
3,397,063 UART: [art] Store priv key in slot 0x5
3,410,373 UART: [art] Derive Key Pair - Done
3,425,197 UART: [art] Signing Cert with AUTHO
3,425,677 UART: RITY.KEYID = 7
3,440,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,764 UART: [art] PUB.X = 212265C6A98B59EE5F49EE86009B5CF29CE481569F2046F2399FEC4A81AA36909AAB6DCA30AFC79CF241F91C1385C356
3,448,520 UART: [art] PUB.Y = 42094B1FCB78361F7C7D935BF0856AFE6FBD844AC8BCAF44D096454B2BC1D5FC0D6E1F1E4EC339D24B31F34FC3AB6A2D
3,455,488 UART: [art] SIG.R = 92A85027771D0DC99420D8CC8D8C6FA3BCDFC38F7EB39D6B2955369D42B3915408271EC204BF2C435B8548DACC6862C8
3,462,255 UART: [art] SIG.S = 087FF2269EAA79E684F6ACBCD2948D7ED0A5926C7714275A7DC89B32BE25450A880CB684E444D822BE6CEF6F030C700E
3,486,034 UART: Caliptra RT
3,486,287 UART: [state] CFI Enabled
3,594,792 UART: [rt] RT listening for mailbox commands...
3,595,455 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,768 UART: [rt]cmd =0x46504c54, len=4
3,626,049 >>> mbox cmd response data (8 bytes)
3,626,188 UART: [rt] FIPS self test
3,626,516 UART: [kat] ++
3,626,668 UART: [kat] sha1
3,630,846 UART: [kat] SHA2-256
3,632,868 UART: [kat] SHA2-384
3,635,553 UART: [kat] SHA2-512-ACC
3,637,036 UART: Droping operation
3,637,651 UART: Fatal Error: 0x90050003
3,639,201 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,206 >>> mbox cmd response: failed
3,639,206 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,219 UART: [kat] SHA2-256
882,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,265 UART: [kat] ++
886,417 UART: [kat] sha1
890,809 UART: [kat] SHA2-256
892,747 UART: [kat] SHA2-384
895,572 UART: [kat] SHA2-512-ACC
897,473 UART: [kat] ECC-384
903,294 UART: [kat] HMAC-384Kdf
907,944 UART: [kat] LMS
1,476,140 UART: [kat] --
1,476,909 UART: [cold-reset] ++
1,477,465 UART: [fht] Storing FHT @ 0x50003400
1,480,172 UART: [idev] ++
1,480,340 UART: [idev] CDI.KEYID = 6
1,480,700 UART: [idev] SUBJECT.KEYID = 7
1,481,124 UART: [idev] UDS.KEYID = 0
1,481,469 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,152 UART: [idev] Erasing UDS.KEYID = 0
1,505,844 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,604 UART: [idev] --
1,515,609 UART: [ldev] ++
1,515,777 UART: [ldev] CDI.KEYID = 6
1,516,140 UART: [ldev] SUBJECT.KEYID = 5
1,516,566 UART: [ldev] AUTHORITY.KEYID = 7
1,517,029 UART: [ldev] FE.KEYID = 1
1,522,093 UART: [ldev] Erasing FE.KEYID = 1
1,547,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,376 UART: [ldev] --
1,586,639 UART: [fwproc] Waiting for Commands...
1,587,302 UART: [fwproc] Received command 0x46574c44
1,588,093 UART: [fwproc] Received Image of size 115304 bytes
2,898,906 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,278 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,630 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,955 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,419 ready_for_fw is high
1,362,419 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,957 >>> mbox cmd response: success
3,003,747 UART:
3,003,763 UART: Running Caliptra FMC ...
3,004,171 UART:
3,004,225 UART: [state] CFI Enabled
3,014,548 UART: [fht] FMC Alias Private Key: 7
3,122,475 UART: [art] Extend RT PCRs Done
3,122,903 UART: [art] Lock RT PCRs Done
3,124,485 UART: [art] Populate DV Done
3,132,634 UART: [fht] FMC Alias Private Key: 7
3,133,740 UART: [art] Derive CDI
3,134,020 UART: [art] Store in in slot 0x4
3,219,429 UART: [art] Derive Key Pair
3,219,789 UART: [art] Store priv key in slot 0x5
3,233,217 UART: [art] Derive Key Pair - Done
3,248,105 UART: [art] Signing Cert with AUTHO
3,248,585 UART: RITY.KEYID = 7
3,263,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,096 UART: [art] PUB.X = F23AFD6A9F4B73D4BB9F4A6AC46538F44AAB4472468136F30654B149DAC74B677CA439A02D57FE9A6B2CE9337C798633
3,270,871 UART: [art] PUB.Y = A9965E215C2879EFA73859F1C8B109F5387478D8785C21A42CEB30E42F324EB65D54AE6C9A453CE9A5FFB5C90723C201
3,277,816 UART: [art] SIG.R = D9647F962BAF84A45E59B00DD5830D41EC65DD4C8798BF9ACA6F5455D53E4A4C891AF46F9DE8AB4438F9F2B8330EDC42
3,284,593 UART: [art] SIG.S = AE53424DB28051D3BDFA861A3C48E35E6DF2CC9089BF90D4407ED4B13D76715493B7ACE836400D1BD86CE8926131039A
3,308,716 UART: Caliptra RT
3,308,969 UART: [state] CFI Enabled
3,417,557 UART: [rt] RT listening for mailbox commands...
3,418,220 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,919 UART: [rt]cmd =0x46504c54, len=4
3,449,218 >>> mbox cmd response data (8 bytes)
3,449,567 UART: [rt] FIPS self test
3,449,895 UART: [kat] ++
3,450,047 UART: [kat] sha1
3,454,203 UART: [kat] SHA2-256
3,456,225 UART: [kat] SHA2-384
3,459,028 UART: [kat] SHA2-512-ACC
3,460,511 UART: Droping operation
3,460,994 UART: Fatal Error: 0x90050003
3,462,544 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,462,549 >>> mbox cmd response: failed
3,462,549 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,462,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,071 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,901 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,544 UART: [kat] SHA2-256
882,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,590 UART: [kat] ++
886,742 UART: [kat] sha1
891,096 UART: [kat] SHA2-256
893,034 UART: [kat] SHA2-384
895,773 UART: [kat] SHA2-512-ACC
897,674 UART: [kat] ECC-384
903,349 UART: [kat] HMAC-384Kdf
908,097 UART: [kat] LMS
1,476,293 UART: [kat] --
1,477,426 UART: [cold-reset] ++
1,477,882 UART: [fht] Storing FHT @ 0x50003400
1,480,657 UART: [idev] ++
1,480,825 UART: [idev] CDI.KEYID = 6
1,481,185 UART: [idev] SUBJECT.KEYID = 7
1,481,609 UART: [idev] UDS.KEYID = 0
1,481,954 ready_for_fw is high
1,481,954 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,957 UART: [idev] Erasing UDS.KEYID = 0
1,507,643 UART: [idev] Using Sha1 for KeyId Algorithm
1,516,333 UART: [idev] --
1,517,380 UART: [ldev] ++
1,517,548 UART: [ldev] CDI.KEYID = 6
1,517,911 UART: [ldev] SUBJECT.KEYID = 5
1,518,337 UART: [ldev] AUTHORITY.KEYID = 7
1,518,800 UART: [ldev] FE.KEYID = 1
1,524,032 UART: [ldev] Erasing FE.KEYID = 1
1,549,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,569,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,575,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,588,073 UART: [ldev] --
1,589,464 UART: [fwproc] Waiting for Commands...
1,590,107 UART: [fwproc] Received command 0x46574c44
1,590,898 UART: [fwproc] Received Image of size 115304 bytes
2,900,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,928,787 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,958,139 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,095,352 >>> mbox cmd response: success
3,096,382 UART: [afmc] ++
3,096,550 UART: [afmc] CDI.KEYID = 6
3,096,912 UART: [afmc] SUBJECT.KEYID = 7
3,097,337 UART: [afmc] AUTHORITY.KEYID = 5
3,133,016 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,149,398 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,150,178 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,155,906 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,161,791 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,167,481 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,175,424 UART: [afmc] --
3,176,518 UART: [cold-reset] --
3,177,596 UART: [state] Locking Datavault
3,178,751 UART: [state] Locking PCR0, PCR1 and PCR31
3,179,355 UART: [state] Locking ICCM
3,179,899 UART: [exit] Launching FMC @ 0x40000130
3,185,228 UART:
3,185,244 UART: Running Caliptra FMC ...
3,185,652 UART:
3,185,795 UART: [state] CFI Enabled
3,196,496 UART: [fht] FMC Alias Private Key: 7
3,304,917 UART: [art] Extend RT PCRs Done
3,305,345 UART: [art] Lock RT PCRs Done
3,306,877 UART: [art] Populate DV Done
3,315,276 UART: [fht] FMC Alias Private Key: 7
3,316,248 UART: [art] Derive CDI
3,316,528 UART: [art] Store in in slot 0x4
3,402,613 UART: [art] Derive Key Pair
3,402,973 UART: [art] Store priv key in slot 0x5
3,416,741 UART: [art] Derive Key Pair - Done
3,431,444 UART: [art] Signing Cert with AUTHO
3,431,924 UART: RITY.KEYID = 7
3,447,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,447,947 UART: [art] PUB.X = 94F464767CAB5F6F1E2B5E9C5652D4B44585C2515CC981B05357BD3D2E16B7DF905D5F93332D96AD4594A7CBA25518A7
3,454,721 UART: [art] PUB.Y = F0C6CC0691DCCEB3CEAD55F93B6CEF545FDDC5F11B39CB877F0F0B41C8D0101F999172F96CD3CAFD85A4C6C2C85568FB
3,461,690 UART: [art] SIG.R = A0F8BF889041EEF84BE13F7E2C6323881E0AC84D627CED963B6EAEA712B9AE48979CC16F9B9E6FDD9E6B956F4F3B6366
3,468,475 UART: [art] SIG.S = D455F8BC2B93C69C73443358E19041D8E20005D6A54D97D6C20FC64763D1621BEF4AEC75C572AC1B5A066AF3E7DECED2
3,492,517 UART: Caliptra RT
3,492,862 UART: [state] CFI Enabled
3,601,576 UART: [rt] RT listening for mailbox commands...
3,602,239 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,006 UART: [rt]cmd =0x46504c54, len=4
3,633,223 >>> mbox cmd response data (8 bytes)
3,633,342 UART: [rt] FIPS self test
3,633,670 UART: [kat] ++
3,633,822 UART: [kat] sha1
3,637,978 UART: [kat] SHA2-256
3,640,000 UART: [kat] SHA2-384
3,642,879 UART: [kat] SHA2-512-ACC
3,644,362 UART: Droping operation
3,644,749 UART: Fatal Error: 0x90050003
3,646,299 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,646,304 >>> mbox cmd response: failed
3,646,304 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,646,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,250 UART: [kat] SHA2-256
882,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,296 UART: [kat] ++
886,448 UART: [kat] sha1
890,730 UART: [kat] SHA2-256
892,668 UART: [kat] SHA2-384
895,421 UART: [kat] SHA2-512-ACC
897,322 UART: [kat] ECC-384
903,063 UART: [kat] HMAC-384Kdf
907,885 UART: [kat] LMS
1,476,081 UART: [kat] --
1,477,068 UART: [cold-reset] ++
1,477,530 UART: [fht] Storing FHT @ 0x50003400
1,480,433 UART: [idev] ++
1,480,601 UART: [idev] CDI.KEYID = 6
1,480,961 UART: [idev] SUBJECT.KEYID = 7
1,481,385 UART: [idev] UDS.KEYID = 0
1,481,730 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,711 UART: [idev] Erasing UDS.KEYID = 0
1,505,959 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,743 UART: [idev] --
1,515,844 UART: [ldev] ++
1,516,012 UART: [ldev] CDI.KEYID = 6
1,516,375 UART: [ldev] SUBJECT.KEYID = 5
1,516,801 UART: [ldev] AUTHORITY.KEYID = 7
1,517,264 UART: [ldev] FE.KEYID = 1
1,522,616 UART: [ldev] Erasing FE.KEYID = 1
1,548,221 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,503 UART: [ldev] --
1,587,864 UART: [fwproc] Waiting for Commands...
1,588,709 UART: [fwproc] Received command 0x46574c44
1,589,500 UART: [fwproc] Received Image of size 115304 bytes
2,899,283 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,926,531 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,883 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,093,154 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,612 ready_for_fw is high
1,362,612 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,939,610 >>> mbox cmd response: success
3,001,438 UART:
3,001,454 UART: Running Caliptra FMC ...
3,001,862 UART:
3,002,005 UART: [state] CFI Enabled
3,012,850 UART: [fht] FMC Alias Private Key: 7
3,120,855 UART: [art] Extend RT PCRs Done
3,121,283 UART: [art] Lock RT PCRs Done
3,123,013 UART: [art] Populate DV Done
3,131,174 UART: [fht] FMC Alias Private Key: 7
3,132,126 UART: [art] Derive CDI
3,132,406 UART: [art] Store in in slot 0x4
3,218,217 UART: [art] Derive Key Pair
3,218,577 UART: [art] Store priv key in slot 0x5
3,232,119 UART: [art] Derive Key Pair - Done
3,246,726 UART: [art] Signing Cert with AUTHO
3,247,206 UART: RITY.KEYID = 7
3,262,088 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,853 UART: [art] PUB.X = 5B6310BB884C9132B77394D2205423EF36453473956834D63F876E3AF1C0BB1E48ABDAC0A4A98A3AF8FF0C11B1BFEEAD
3,269,632 UART: [art] PUB.Y = 5A815636FA0B95FE2917CB347763E74448EE1DC0FD043A0B2E2656979B5776F564F6FF5DDBA73CA2A581579ED90A684F
3,276,576 UART: [art] SIG.R = 2B5CAB06AC5CDDFA0EFB9D100AF8AC99DDB28890CAB516465E57CC4AFDC3D79FB8B85DDE0D04423D9F17D886836C1E74
3,283,359 UART: [art] SIG.S = D163055DD2ABB23624042425D1590BC96427002CE2C25A62D5A9C8CAB24761DE12C83FED06A3DE18328391CEBF700FAE
3,306,871 UART: Caliptra RT
3,307,216 UART: [state] CFI Enabled
3,415,563 UART: [rt] RT listening for mailbox commands...
3,416,226 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,937 UART: [rt]cmd =0x46504c54, len=4
3,447,200 >>> mbox cmd response data (8 bytes)
3,447,453 UART: [rt] FIPS self test
3,447,781 UART: [kat] ++
3,447,933 UART: [kat] sha1
3,452,115 UART: [kat] SHA2-256
3,454,137 UART: [kat] SHA2-384
3,457,110 UART: [kat] SHA2-512-ACC
3,458,593 UART: Droping operation
3,459,144 UART: Fatal Error: 0x90050003
3,460,694 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,460,699 >>> mbox cmd response: failed
3,460,699 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,460,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,902 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,154 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
893,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,651 UART: [kat] ++
897,803 UART: [kat] sha1
902,163 UART: [kat] SHA2-256
904,103 UART: [kat] SHA2-384
906,892 UART: [kat] SHA2-512-ACC
908,793 UART: [kat] ECC-384
918,682 UART: [kat] HMAC-384Kdf
923,486 UART: [kat] LMS
1,171,814 UART: [kat] --
1,172,661 UART: [cold-reset] ++
1,173,141 UART: [fht] FHT @ 0x50003400
1,175,818 UART: [idev] ++
1,175,986 UART: [idev] CDI.KEYID = 6
1,176,346 UART: [idev] SUBJECT.KEYID = 7
1,176,770 UART: [idev] UDS.KEYID = 0
1,177,115 ready_for_fw is high
1,177,115 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,022 UART: [idev] Erasing UDS.KEYID = 0
1,202,603 UART: [idev] Sha1 KeyId Algorithm
1,210,991 UART: [idev] --
1,211,965 UART: [ldev] ++
1,212,133 UART: [ldev] CDI.KEYID = 6
1,212,496 UART: [ldev] SUBJECT.KEYID = 5
1,212,922 UART: [ldev] AUTHORITY.KEYID = 7
1,213,385 UART: [ldev] FE.KEYID = 1
1,218,515 UART: [ldev] Erasing FE.KEYID = 1
1,244,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,617 UART: [ldev] --
1,284,006 UART: [fwproc] Wait for Commands...
1,284,756 UART: [fwproc] Recv command 0x46574c44
1,285,484 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,629 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,776 >>> mbox cmd response: success
2,789,886 UART: [afmc] ++
2,790,054 UART: [afmc] CDI.KEYID = 6
2,790,416 UART: [afmc] SUBJECT.KEYID = 7
2,790,841 UART: [afmc] AUTHORITY.KEYID = 5
2,826,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,844,173 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,901 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,786 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,505 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,413 UART: [afmc] --
2,870,409 UART: [cold-reset] --
2,871,153 UART: [state] Locking Datavault
2,872,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,864 UART: [state] Locking ICCM
2,873,462 UART: [exit] Launching FMC @ 0x40000130
2,878,791 UART:
2,878,807 UART: Running Caliptra FMC ...
2,879,215 UART:
2,879,269 UART: [state] CFI Enabled
2,889,788 UART: [fht] FMC Alias Private Key: 7
2,997,185 UART: [art] Extend RT PCRs Done
2,997,613 UART: [art] Lock RT PCRs Done
2,999,255 UART: [art] Populate DV Done
3,007,380 UART: [fht] FMC Alias Private Key: 7
3,008,518 UART: [art] Derive CDI
3,008,798 UART: [art] Store in in slot 0x4
3,094,591 UART: [art] Derive Key Pair
3,094,951 UART: [art] Store priv key in slot 0x5
3,107,697 UART: [art] Derive Key Pair - Done
3,122,272 UART: [art] Signing Cert with AUTHO
3,122,752 UART: RITY.KEYID = 7
3,137,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,749 UART: [art] PUB.X = 6B60DCA9609A36D7A3E91125AD65F453E314E03B7296A8008D00B624281E5ED53166EB5A556F6748401DBA9786D2CE33
3,145,473 UART: [art] PUB.Y = F5150E6A4F3ED7A88BB1C217FCEDC25C570EADBBC01A066467193CC7DB68C4D837F058D4884C3482ECE6AB5A73D10B6C
3,152,431 UART: [art] SIG.R = CF10C0FF126B1E1A745A9471129D56296DAFA0645EAFCFE06F5C9BE1B0C2086608140297271C40B1F205D1F3BD7B0D5D
3,159,196 UART: [art] SIG.S = D096D1B50A8031D395DAF040566F6A8695FEB8D464EC5E2F78472B7F83825B2AB120C5FBC9ABE7DDF28B770C48864983
3,182,265 UART: Caliptra RT
3,182,518 UART: [state] CFI Enabled
3,290,098 UART: [rt] RT listening for mailbox commands...
3,290,761 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,828 UART: [rt]cmd =0x46504c54, len=4
3,322,009 >>> mbox cmd response data (8 bytes)
3,322,360 UART: [rt] FIPS self test
3,322,688 UART: [kat] ++
3,322,840 UART: [kat] sha1
3,326,994 UART: [kat] SHA2-256
3,329,016 UART: [kat] SHA2-384
3,331,811 UART: [kat] SHA2-512-ACC
3,333,294 UART: Droping operation
3,333,767 UART: Fatal Error: 0x90050003
3,335,317 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,322 >>> mbox cmd response: failed
3,335,322 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,327 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
901,813 UART: [kat] SHA2-256
903,753 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
918,008 UART: [kat] HMAC-384Kdf
922,746 UART: [kat] LMS
1,171,074 UART: [kat] --
1,172,195 UART: [cold-reset] ++
1,172,585 UART: [fht] FHT @ 0x50003400
1,175,274 UART: [idev] ++
1,175,442 UART: [idev] CDI.KEYID = 6
1,175,802 UART: [idev] SUBJECT.KEYID = 7
1,176,226 UART: [idev] UDS.KEYID = 0
1,176,571 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,032 UART: [idev] Erasing UDS.KEYID = 0
1,201,213 UART: [idev] Sha1 KeyId Algorithm
1,209,479 UART: [idev] --
1,210,641 UART: [ldev] ++
1,210,809 UART: [ldev] CDI.KEYID = 6
1,211,172 UART: [ldev] SUBJECT.KEYID = 5
1,211,598 UART: [ldev] AUTHORITY.KEYID = 7
1,212,061 UART: [ldev] FE.KEYID = 1
1,217,251 UART: [ldev] Erasing FE.KEYID = 1
1,243,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,839 UART: [ldev] --
1,283,194 UART: [fwproc] Wait for Commands...
1,283,812 UART: [fwproc] Recv command 0x46574c44
1,284,540 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,509 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,813 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,978 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,497 ready_for_fw is high
1,060,497 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,711 >>> mbox cmd response: success
2,703,275 UART:
2,703,291 UART: Running Caliptra FMC ...
2,703,699 UART:
2,703,753 UART: [state] CFI Enabled
2,714,214 UART: [fht] FMC Alias Private Key: 7
2,822,361 UART: [art] Extend RT PCRs Done
2,822,789 UART: [art] Lock RT PCRs Done
2,824,439 UART: [art] Populate DV Done
2,832,588 UART: [fht] FMC Alias Private Key: 7
2,833,652 UART: [art] Derive CDI
2,833,932 UART: [art] Store in in slot 0x4
2,919,365 UART: [art] Derive Key Pair
2,919,725 UART: [art] Store priv key in slot 0x5
2,932,765 UART: [art] Derive Key Pair - Done
2,947,560 UART: [art] Signing Cert with AUTHO
2,948,040 UART: RITY.KEYID = 7
2,963,572 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,337 UART: [art] PUB.X = 9461008957E3C07AE8E3328CB69408233AD002A2AB1082017F7D55B78B7A4645B817A063DA87E676F60153813CC63079
2,971,061 UART: [art] PUB.Y = A8C2272FE3C0BB87D52728C798D7040C118ABA432A81A8D91F522A3A967653DC6505E48E693683BF868DA25F30115192
2,977,998 UART: [art] SIG.R = DE2577A61479F9E497186F6E41731D9F11FB9E510D1AF28852471170A6A687952F9DBE0F315149E24584A4C76AABC88A
2,984,760 UART: [art] SIG.S = DD2D4D4BF16EE957EB01C18D00E35ECC201E241999BB39354E43F1CBB750F2720011C59B9A07F6C3BD683F208499D1C0
3,008,529 UART: Caliptra RT
3,008,782 UART: [state] CFI Enabled
3,116,828 UART: [rt] RT listening for mailbox commands...
3,117,491 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,506 UART: [rt]cmd =0x46504c54, len=4
3,148,649 >>> mbox cmd response data (8 bytes)
3,148,924 UART: [rt] FIPS self test
3,149,252 UART: [kat] ++
3,149,404 UART: [kat] sha1
3,153,682 UART: [kat] SHA2-256
3,155,704 UART: [kat] SHA2-384
3,158,595 UART: [kat] SHA2-512-ACC
3,160,078 UART: Droping operation
3,160,689 UART: Fatal Error: 0x90050003
3,162,239 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,162,244 >>> mbox cmd response: failed
3,162,244 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,162,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,521 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,929 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
893,603 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,728 UART: [kat] ++
897,880 UART: [kat] sha1
902,084 UART: [kat] SHA2-256
904,024 UART: [kat] SHA2-384
906,929 UART: [kat] SHA2-512-ACC
908,830 UART: [kat] ECC-384
918,867 UART: [kat] HMAC-384Kdf
923,439 UART: [kat] LMS
1,171,767 UART: [kat] --
1,172,648 UART: [cold-reset] ++
1,173,060 UART: [fht] FHT @ 0x50003400
1,175,637 UART: [idev] ++
1,175,805 UART: [idev] CDI.KEYID = 6
1,176,165 UART: [idev] SUBJECT.KEYID = 7
1,176,589 UART: [idev] UDS.KEYID = 0
1,176,934 ready_for_fw is high
1,176,934 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,384 UART: [idev] Sha1 KeyId Algorithm
1,209,846 UART: [idev] --
1,210,744 UART: [ldev] ++
1,210,912 UART: [ldev] CDI.KEYID = 6
1,211,275 UART: [ldev] SUBJECT.KEYID = 5
1,211,701 UART: [ldev] AUTHORITY.KEYID = 7
1,212,164 UART: [ldev] FE.KEYID = 1
1,217,604 UART: [ldev] Erasing FE.KEYID = 1
1,244,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,422 UART: [ldev] --
1,283,937 UART: [fwproc] Wait for Commands...
1,284,713 UART: [fwproc] Recv command 0x46574c44
1,285,441 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,272 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,627 >>> mbox cmd response: success
2,789,693 UART: [afmc] ++
2,789,861 UART: [afmc] CDI.KEYID = 6
2,790,223 UART: [afmc] SUBJECT.KEYID = 7
2,790,648 UART: [afmc] AUTHORITY.KEYID = 5
2,826,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,381 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,100 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,772 UART: [afmc] --
2,869,746 UART: [cold-reset] --
2,870,458 UART: [state] Locking Datavault
2,871,657 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,261 UART: [state] Locking ICCM
2,872,733 UART: [exit] Launching FMC @ 0x40000130
2,878,062 UART:
2,878,078 UART: Running Caliptra FMC ...
2,878,486 UART:
2,878,629 UART: [state] CFI Enabled
2,889,394 UART: [fht] FMC Alias Private Key: 7
2,997,199 UART: [art] Extend RT PCRs Done
2,997,627 UART: [art] Lock RT PCRs Done
2,999,389 UART: [art] Populate DV Done
3,007,454 UART: [fht] FMC Alias Private Key: 7
3,008,600 UART: [art] Derive CDI
3,008,880 UART: [art] Store in in slot 0x4
3,094,681 UART: [art] Derive Key Pair
3,095,041 UART: [art] Store priv key in slot 0x5
3,108,745 UART: [art] Derive Key Pair - Done
3,123,631 UART: [art] Signing Cert with AUTHO
3,124,111 UART: RITY.KEYID = 7
3,139,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,962 UART: [art] PUB.X = 8D97AA773ADACA2278B2ED20E540389543DDF54A3E170265B76769F03A7665C094BA3C80F32C40EC38CE24382FC23532
3,146,731 UART: [art] PUB.Y = 71D4BF916D4A29F7CC0646A417F89E12A83F3E4DFCFC1960D2BCD4EAB23044F54ABD3ABB2E9961778ECDB9B794464B0A
3,153,695 UART: [art] SIG.R = 6E45E04096C05E3735FB8353CF0479E94CC1A5F92F0DD3AD7BB9E41664139B370D274AD553A49CE016A1203A7BA1F9F1
3,160,462 UART: [art] SIG.S = EDE7F3199499CDB5796321F614CE133ABFDC47E72AEC38759A12E2150C00DE4EAC512A6BF2B27C22A8EC5CDBD6195780
3,184,650 UART: Caliptra RT
3,184,995 UART: [state] CFI Enabled
3,293,124 UART: [rt] RT listening for mailbox commands...
3,293,787 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,790 UART: [rt]cmd =0x46504c54, len=4
3,324,921 >>> mbox cmd response data (8 bytes)
3,325,216 UART: [rt] FIPS self test
3,325,544 UART: [kat] ++
3,325,696 UART: [kat] sha1
3,329,696 UART: [kat] SHA2-256
3,331,718 UART: [kat] SHA2-384
3,334,599 UART: [kat] SHA2-512-ACC
3,336,082 UART: Droping operation
3,336,671 UART: Fatal Error: 0x90050003
3,338,221 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,338,226 >>> mbox cmd response: failed
3,338,226 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,338,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
893,827 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,952 UART: [kat] ++
898,104 UART: [kat] sha1
902,392 UART: [kat] SHA2-256
904,332 UART: [kat] SHA2-384
907,009 UART: [kat] SHA2-512-ACC
908,910 UART: [kat] ECC-384
918,627 UART: [kat] HMAC-384Kdf
923,231 UART: [kat] LMS
1,171,559 UART: [kat] --
1,172,394 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,501 UART: [idev] ++
1,175,669 UART: [idev] CDI.KEYID = 6
1,176,029 UART: [idev] SUBJECT.KEYID = 7
1,176,453 UART: [idev] UDS.KEYID = 0
1,176,798 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,531 UART: [idev] Erasing UDS.KEYID = 0
1,201,678 UART: [idev] Sha1 KeyId Algorithm
1,210,298 UART: [idev] --
1,211,384 UART: [ldev] ++
1,211,552 UART: [ldev] CDI.KEYID = 6
1,211,915 UART: [ldev] SUBJECT.KEYID = 5
1,212,341 UART: [ldev] AUTHORITY.KEYID = 7
1,212,804 UART: [ldev] FE.KEYID = 1
1,218,278 UART: [ldev] Erasing FE.KEYID = 1
1,244,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,438 UART: [ldev] --
1,283,921 UART: [fwproc] Wait for Commands...
1,284,687 UART: [fwproc] Recv command 0x46574c44
1,285,415 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,582 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,931 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,658 ready_for_fw is high
1,059,658 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,488 >>> mbox cmd response: success
2,701,126 UART:
2,701,142 UART: Running Caliptra FMC ...
2,701,550 UART:
2,701,693 UART: [state] CFI Enabled
2,712,358 UART: [fht] FMC Alias Private Key: 7
2,820,337 UART: [art] Extend RT PCRs Done
2,820,765 UART: [art] Lock RT PCRs Done
2,822,439 UART: [art] Populate DV Done
2,830,410 UART: [fht] FMC Alias Private Key: 7
2,831,442 UART: [art] Derive CDI
2,831,722 UART: [art] Store in in slot 0x4
2,917,549 UART: [art] Derive Key Pair
2,917,909 UART: [art] Store priv key in slot 0x5
2,931,721 UART: [art] Derive Key Pair - Done
2,946,389 UART: [art] Signing Cert with AUTHO
2,946,869 UART: RITY.KEYID = 7
2,962,087 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,852 UART: [art] PUB.X = 06FD77E09DBBAF2FDA78C7252D2D93FBF125C9ED39F5DE9945843F4F778F9F2C669DB153AE3609F2A0156D4E48D35AC4
2,969,632 UART: [art] PUB.Y = 9A9A4644DF0C90BC715FE5BF96E9328A1814E3A9DFCA039996CA20572F103D136818D3101A8FAC4D8A25B8CD0A5D5C1A
2,976,585 UART: [art] SIG.R = E14C00E3457780ABD7536DEDDFDFA07910DDEAABA927F7136F8445520B0FF1BCAA03412898B64AF3392AE62ACDD79DF4
2,983,344 UART: [art] SIG.S = CD96D9EBC16DC91BC87E829D002D590DFBC72F49372DBDFED56C12D6995976E41DBC310B0BCFCFE8A5F317C924DF79AA
3,007,030 UART: Caliptra RT
3,007,375 UART: [state] CFI Enabled
3,116,173 UART: [rt] RT listening for mailbox commands...
3,116,836 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,625 UART: [rt]cmd =0x46504c54, len=4
3,147,742 >>> mbox cmd response data (8 bytes)
3,147,973 UART: [rt] FIPS self test
3,148,301 UART: [kat] ++
3,148,453 UART: [kat] sha1
3,152,737 UART: [kat] SHA2-256
3,154,759 UART: [kat] SHA2-384
3,157,488 UART: [kat] SHA2-512-ACC
3,158,971 UART: Droping operation
3,159,552 UART: Fatal Error: 0x90050003
3,161,102 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,161,107 >>> mbox cmd response: failed
3,161,107 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,161,112 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,492 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
891,396 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
899,931 UART: [kat] SHA2-256
901,871 UART: [kat] SHA2-384
904,698 UART: [kat] SHA2-512-ACC
906,599 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,174,659 ready_for_fw is high
1,174,659 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,375 UART: [idev] Erasing UDS.KEYID = 0
1,199,715 UART: [idev] Sha1 KeyId Algorithm
1,208,619 UART: [idev] --
1,209,608 UART: [ldev] ++
1,209,776 UART: [ldev] CDI.KEYID = 6
1,210,140 UART: [ldev] SUBJECT.KEYID = 5
1,210,567 UART: [ldev] AUTHORITY.KEYID = 7
1,211,030 UART: [ldev] FE.KEYID = 1
1,216,378 UART: [ldev] Erasing FE.KEYID = 1
1,242,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,030 UART: [ldev] --
1,282,336 UART: [fwproc] Wait for Commands...
1,283,143 UART: [fwproc] Recv command 0x46574c44
1,283,876 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,564 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,942 >>> mbox cmd response: success
2,787,037 UART: [afmc] ++
2,787,205 UART: [afmc] CDI.KEYID = 6
2,787,568 UART: [afmc] SUBJECT.KEYID = 7
2,787,994 UART: [afmc] AUTHORITY.KEYID = 5
2,823,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,836 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,565 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,448 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,167 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,024 UART: [afmc] --
2,867,038 UART: [cold-reset] --
2,867,992 UART: [state] Locking Datavault
2,869,123 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,727 UART: [state] Locking ICCM
2,870,333 UART: [exit] Launching FMC @ 0x40000130
2,875,662 UART:
2,875,678 UART: Running Caliptra FMC ...
2,876,086 UART:
2,876,140 UART: [state] CFI Enabled
2,886,393 UART: [fht] FMC Alias Private Key: 7
2,994,208 UART: [art] Extend RT PCRs Done
2,994,636 UART: [art] Lock RT PCRs Done
2,996,340 UART: [art] Populate DV Done
3,004,617 UART: [fht] FMC Alias Private Key: 7
3,005,573 UART: [art] Derive CDI
3,005,853 UART: [art] Store in in slot 0x4
3,091,482 UART: [art] Derive Key Pair
3,091,842 UART: [art] Store priv key in slot 0x5
3,105,098 UART: [art] Derive Key Pair - Done
3,119,668 UART: [art] Signing Cert with AUTHO
3,120,148 UART: RITY.KEYID = 7
3,135,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,867 UART: [art] PUB.X = 1C053553E6C4BE5D97CAE05F0CEB870B80E1FA55C2B7658C60B5199A52FB6AB55DC4DA2C8CCAC1944CAA92C75ADFD7D8
3,142,654 UART: [art] PUB.Y = 5D97C9C4977A7161B6236560F416F6E831A0ADFD01A4728936C4E1E77E7F81BF3254D516E525C2E8C7FF34735B0C7E30
3,149,598 UART: [art] SIG.R = 78FDDC0204C258B3516719854EE3329499BFD7496E02A92816875F897CB9A20421767B937786DD0BF80261EB6D68CA07
3,156,339 UART: [art] SIG.S = 02C67A350FBAA9D73C935F55AC3D18DE3DBC8EE168AD1889F6CE2936F0D7E2572E37AA96E4A0A0E11AB0CA577BB786C2
3,180,148 UART: Caliptra RT
3,180,401 UART: [state] CFI Enabled
3,288,324 UART: [rt] RT listening for mailbox commands...
3,288,987 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,910 UART: [rt]cmd =0x46504c54, len=4
3,320,153 >>> mbox cmd response data (8 bytes)
3,320,408 UART: [rt] FIPS self test
3,320,736 UART: [kat] ++
3,320,888 UART: [kat] sha1
3,325,054 UART: [kat] SHA2-256
3,327,076 UART: [kat] SHA2-384
3,329,759 UART: [kat] SHA2-512-ACC
3,331,242 UART: Droping operation
3,331,777 UART: Fatal Error: 0x90050003
3,333,327 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,332 >>> mbox cmd response: failed
3,333,332 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,333,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
915,312 UART: [kat] HMAC-384Kdf
920,110 UART: [kat] LMS
1,168,422 UART: [kat] --
1,169,177 UART: [cold-reset] ++
1,169,549 UART: [fht] FHT @ 0x50003400
1,172,103 UART: [idev] ++
1,172,271 UART: [idev] CDI.KEYID = 6
1,172,632 UART: [idev] SUBJECT.KEYID = 7
1,173,057 UART: [idev] UDS.KEYID = 0
1,173,403 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,180,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,041 UART: [idev] Sha1 KeyId Algorithm
1,207,125 UART: [idev] --
1,208,084 UART: [ldev] ++
1,208,252 UART: [ldev] CDI.KEYID = 6
1,208,616 UART: [ldev] SUBJECT.KEYID = 5
1,209,043 UART: [ldev] AUTHORITY.KEYID = 7
1,209,506 UART: [ldev] FE.KEYID = 1
1,214,380 UART: [ldev] Erasing FE.KEYID = 1
1,240,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,098 UART: [ldev] --
1,279,374 UART: [fwproc] Wait for Commands...
1,279,957 UART: [fwproc] Recv command 0x46574c44
1,280,690 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,726 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,932 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,808 ready_for_fw is high
1,055,808 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,042 >>> mbox cmd response: success
2,697,042 UART:
2,697,058 UART: Running Caliptra FMC ...
2,697,466 UART:
2,697,520 UART: [state] CFI Enabled
2,707,617 UART: [fht] FMC Alias Private Key: 7
2,816,044 UART: [art] Extend RT PCRs Done
2,816,472 UART: [art] Lock RT PCRs Done
2,818,198 UART: [art] Populate DV Done
2,826,623 UART: [fht] FMC Alias Private Key: 7
2,827,571 UART: [art] Derive CDI
2,827,851 UART: [art] Store in in slot 0x4
2,913,752 UART: [art] Derive Key Pair
2,914,112 UART: [art] Store priv key in slot 0x5
2,927,398 UART: [art] Derive Key Pair - Done
2,942,204 UART: [art] Signing Cert with AUTHO
2,942,684 UART: RITY.KEYID = 7
2,957,958 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,723 UART: [art] PUB.X = 3734ABF2011CB9154B5755C8D8081C13032F77BEC0D6F4557E50AB4959AFB39CAE5622300B4F89759D9853E69E4CD5E2
2,965,483 UART: [art] PUB.Y = EEB4DF49DB3708209D6A0B3741094D43C4300223E7A4E5DEEF6F388BD5B748569798CF580D32DE7D35456C38383F9697
2,972,418 UART: [art] SIG.R = 72B4C23305FD044F8BAD1B051635456DDAA58D2BBF040C792C08C8DA88F37718274C07BCB067BE462783D9E6ECECCC12
2,979,179 UART: [art] SIG.S = 78355DE3155F4A8F511927EC987A17917621A7DB9435073BAC198B195A203D1EF768FBDE06BC8946753F98FE869F0C9D
3,002,701 UART: Caliptra RT
3,002,954 UART: [state] CFI Enabled
3,111,431 UART: [rt] RT listening for mailbox commands...
3,112,094 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,077 UART: [rt]cmd =0x46504c54, len=4
3,143,144 >>> mbox cmd response data (8 bytes)
3,143,333 UART: [rt] FIPS self test
3,143,661 UART: [kat] ++
3,143,813 UART: [kat] sha1
3,148,025 UART: [kat] SHA2-256
3,150,047 UART: [kat] SHA2-384
3,153,078 UART: [kat] SHA2-512-ACC
3,154,561 UART: Droping operation
3,155,022 UART: Fatal Error: 0x90050003
3,156,572 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,156,577 >>> mbox cmd response: failed
3,156,577 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,156,582 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,662 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,646 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,828 UART: [kat] SHA2-256
901,768 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,709 UART: [kat] HMAC-384Kdf
921,123 UART: [kat] LMS
1,169,435 UART: [kat] --
1,170,396 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,646 UART: [idev] ++
1,173,814 UART: [idev] CDI.KEYID = 6
1,174,175 UART: [idev] SUBJECT.KEYID = 7
1,174,600 UART: [idev] UDS.KEYID = 0
1,174,946 ready_for_fw is high
1,174,946 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,806 UART: [idev] Erasing UDS.KEYID = 0
1,199,730 UART: [idev] Sha1 KeyId Algorithm
1,208,852 UART: [idev] --
1,209,929 UART: [ldev] ++
1,210,097 UART: [ldev] CDI.KEYID = 6
1,210,461 UART: [ldev] SUBJECT.KEYID = 5
1,210,888 UART: [ldev] AUTHORITY.KEYID = 7
1,211,351 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,243,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,827 UART: [ldev] --
1,283,335 UART: [fwproc] Wait for Commands...
1,283,932 UART: [fwproc] Recv command 0x46574c44
1,284,665 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,173 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,441 >>> mbox cmd response: success
2,788,518 UART: [afmc] ++
2,788,686 UART: [afmc] CDI.KEYID = 6
2,789,049 UART: [afmc] SUBJECT.KEYID = 7
2,789,475 UART: [afmc] AUTHORITY.KEYID = 5
2,824,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,155 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,767 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,486 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,315 UART: [afmc] --
2,868,263 UART: [cold-reset] --
2,869,091 UART: [state] Locking Datavault
2,870,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,936 UART: [state] Locking ICCM
2,871,504 UART: [exit] Launching FMC @ 0x40000130
2,876,833 UART:
2,876,849 UART: Running Caliptra FMC ...
2,877,257 UART:
2,877,400 UART: [state] CFI Enabled
2,887,933 UART: [fht] FMC Alias Private Key: 7
2,996,682 UART: [art] Extend RT PCRs Done
2,997,110 UART: [art] Lock RT PCRs Done
2,999,038 UART: [art] Populate DV Done
3,007,339 UART: [fht] FMC Alias Private Key: 7
3,008,411 UART: [art] Derive CDI
3,008,691 UART: [art] Store in in slot 0x4
3,094,474 UART: [art] Derive Key Pair
3,094,834 UART: [art] Store priv key in slot 0x5
3,108,000 UART: [art] Derive Key Pair - Done
3,122,865 UART: [art] Signing Cert with AUTHO
3,123,345 UART: RITY.KEYID = 7
3,138,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,440 UART: [art] PUB.X = 31DD843B217782A9B207AF3BA88B818A84BD7F753BB69AAD2DC3C4A4CB09AB063AA8E242D1CB5184211C7447A0E82578
3,146,211 UART: [art] PUB.Y = E52C9156AE73A336218616C667B259BC0FDCB05EED30FB361F11A003A5826AE64BD39432E8B2A2E35A2D12EB351C12CC
3,153,165 UART: [art] SIG.R = 3D95B2340473ABA5FB888E3894C1A43A33934B07E8CA532DCDB242E823B4552ABA6980CA804F003C47D2D57C7FAFB98F
3,159,917 UART: [art] SIG.S = AD4197CCFD1EEA2B0A990A942FD7246BED4EB0247F4BBEE9962EC52B74E37FF8F296E34A55AF675EDF2877079EF1D530
3,184,247 UART: Caliptra RT
3,184,592 UART: [state] CFI Enabled
3,292,335 UART: [rt] RT listening for mailbox commands...
3,292,998 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,965 UART: [rt]cmd =0x46504c54, len=4
3,324,116 >>> mbox cmd response data (8 bytes)
3,324,393 UART: [rt] FIPS self test
3,324,721 UART: [kat] ++
3,324,873 UART: [kat] sha1
3,329,123 UART: [kat] SHA2-256
3,331,145 UART: [kat] SHA2-384
3,334,114 UART: [kat] SHA2-512-ACC
3,335,597 UART: Droping operation
3,336,052 UART: Fatal Error: 0x90050003
3,337,602 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,337,607 >>> mbox cmd response: failed
3,337,607 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,337,612 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
921,259 UART: [kat] LMS
1,169,571 UART: [kat] --
1,170,498 UART: [cold-reset] ++
1,170,918 UART: [fht] FHT @ 0x50003400
1,173,662 UART: [idev] ++
1,173,830 UART: [idev] CDI.KEYID = 6
1,174,191 UART: [idev] SUBJECT.KEYID = 7
1,174,616 UART: [idev] UDS.KEYID = 0
1,174,962 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,760 UART: [idev] Erasing UDS.KEYID = 0
1,199,830 UART: [idev] Sha1 KeyId Algorithm
1,208,742 UART: [idev] --
1,209,729 UART: [ldev] ++
1,209,897 UART: [ldev] CDI.KEYID = 6
1,210,261 UART: [ldev] SUBJECT.KEYID = 5
1,210,688 UART: [ldev] AUTHORITY.KEYID = 7
1,211,151 UART: [ldev] FE.KEYID = 1
1,216,513 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,269 UART: [ldev] --
1,282,533 UART: [fwproc] Wait for Commands...
1,283,120 UART: [fwproc] Recv command 0x46574c44
1,283,853 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,275 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,511 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,091 ready_for_fw is high
1,057,091 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,251 >>> mbox cmd response: success
2,699,113 UART:
2,699,129 UART: Running Caliptra FMC ...
2,699,537 UART:
2,699,680 UART: [state] CFI Enabled
2,710,209 UART: [fht] FMC Alias Private Key: 7
2,818,208 UART: [art] Extend RT PCRs Done
2,818,636 UART: [art] Lock RT PCRs Done
2,820,534 UART: [art] Populate DV Done
2,828,579 UART: [fht] FMC Alias Private Key: 7
2,829,595 UART: [art] Derive CDI
2,829,875 UART: [art] Store in in slot 0x4
2,915,574 UART: [art] Derive Key Pair
2,915,934 UART: [art] Store priv key in slot 0x5
2,928,960 UART: [art] Derive Key Pair - Done
2,943,689 UART: [art] Signing Cert with AUTHO
2,944,169 UART: RITY.KEYID = 7
2,959,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,100 UART: [art] PUB.X = AD9AF1B8F17231599E5F703944B8D31FD7A7FCCF0E908AE360481846B11FC08A4A94178D9A4A8FF18D22EE94FA8A14C7
2,966,879 UART: [art] PUB.Y = 300240A81B9086021E6AA1CA0C0AF4A57D7313FF4160355F6DC1ED7DBD417ED99FA8D60D05E15CA7D13471D20DD057CD
2,973,820 UART: [art] SIG.R = 1B5792BEB6F34EFECD7F69772D4278F05CE583717ECB74163766FF9F8AF9DB85FC6F64958EAFC60A2D0A8B4BBA1086A3
2,980,602 UART: [art] SIG.S = 59289653B1022672974912099E8C2ED6E43F7F37C4CAAAAA12FE54161AA3690613A5BC7E306FC5771DC0208D3A3407A9
3,004,747 UART: Caliptra RT
3,005,092 UART: [state] CFI Enabled
3,113,147 UART: [rt] RT listening for mailbox commands...
3,113,810 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,429 UART: [rt]cmd =0x46504c54, len=4
3,144,704 >>> mbox cmd response data (8 bytes)
3,145,003 UART: [rt] FIPS self test
3,145,331 UART: [kat] ++
3,145,483 UART: [kat] sha1
3,149,623 UART: [kat] SHA2-256
3,151,645 UART: [kat] SHA2-384
3,154,728 UART: [kat] SHA2-512-ACC
3,156,211 UART: Droping operation
3,156,738 UART: Fatal Error: 0x90050003
3,158,288 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,293 >>> mbox cmd response: failed
3,158,293 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,158,298 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,873 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,757 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,695,484 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,839,929 >>> mbox cmd response: failed
2,840,487 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,984,136 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
4,879,685 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,443,172 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
2,684,714 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,828,913 >>> mbox cmd response: failed
2,829,490 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,972,852 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
4,869,005 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,452,220 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,038,788 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,184,005 >>> mbox cmd response: failed
3,184,857 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,328,084 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
21,576,745 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,029,136 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,038,160 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,182,402 >>> mbox cmd response: failed
3,182,990 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,326,166 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
21,583,055 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,013,249 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,694,296 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,839,128 >>> mbox cmd response: failed
2,839,673 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,983,287 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,459,412 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,282,422 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
2,707,065 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,851,510 >>> mbox cmd response: failed
2,852,069 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,995,803 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,454,873 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,251,415 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
3,051,169 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,195,688 >>> mbox cmd response: failed
3,196,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,339,958 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,178,924 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,897,686 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,044,238 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,188,884 >>> mbox cmd response: failed
3,189,452 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,333,192 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
20,174,968 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,915,937 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
2,710,413 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,855,030 >>> mbox cmd response: failed
2,855,623 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,999,206 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,445,667 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,295,025 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,055,320 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,200,007 >>> mbox cmd response: failed
3,200,604 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,344,183 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
20,182,999 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,895,402 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,828 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,836 >>> mbox cmd response: failed
811,836 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,305 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,714 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,748 >>> mbox cmd response: failed
811,748 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,754 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,959 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,376 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,447 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,455 >>> mbox cmd response: failed
812,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,858 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,417 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,849 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,857 >>> mbox cmd response: failed
811,857 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,831 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,762 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,770 >>> mbox cmd response: failed
811,770 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,842 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,072 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,080 >>> mbox cmd response: failed
812,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,539 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,208 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,875 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,883 >>> mbox cmd response: failed
811,883 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,978 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,283 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,921 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,929 >>> mbox cmd response: failed
811,929 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,616 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,605 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,560 >>> mbox cmd response: failed
812,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,745 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,720 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,804 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,812 >>> mbox cmd response: failed
811,812 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,481 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,240 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,375 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,383 >>> mbox cmd response: failed
812,383 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,606 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,025 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,385 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,393 >>> mbox cmd response: failed
812,393 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,399 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,458 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,071 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,043 UART:
192,432 UART: Running Caliptra ROM ...
193,580 UART:
193,730 UART: [state] CFI Enabled
266,047 UART: [state] LifecycleState = Unprovisioned
268,056 UART: [state] DebugLocked = No
269,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,121 UART: [kat] SHA2-256
443,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,279 UART: [kat] ++
454,889 UART: [kat] sha1
466,460 UART: [kat] SHA2-256
469,114 UART: [kat] SHA2-384
475,816 UART: [kat] SHA2-512-ACC
478,191 UART: [kat] ECC-384
2,769,353 UART: [kat] HMAC-384Kdf
2,799,931 UART: [kat] LMS
3,990,223 UART: [kat] --
3,995,503 UART: [cold-reset] ++
3,997,659 UART: [fht] Storing FHT @ 0x50003400
4,009,074 UART: [idev] ++
4,009,652 UART: [idev] CDI.KEYID = 6
4,010,717 UART: [idev] SUBJECT.KEYID = 7
4,011,827 UART: [idev] UDS.KEYID = 0
4,012,857 ready_for_fw is high
4,013,107 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,157,845 UART: [idev] Erasing UDS.KEYID = 0
7,344,635 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,547 UART: [idev] --
7,371,389 UART: [ldev] ++
7,371,962 UART: [ldev] CDI.KEYID = 6
7,372,934 UART: [ldev] SUBJECT.KEYID = 5
7,374,155 UART: [ldev] AUTHORITY.KEYID = 7
7,375,543 UART: [ldev] FE.KEYID = 1
7,402,512 UART: [ldev] Erasing FE.KEYID = 1
10,738,899 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,433 UART: [ldev] --
13,115,857 UART: [fwproc] Waiting for Commands...
13,118,552 UART: [fwproc] Received command 0x46574c44
13,120,750 UART: [fwproc] Received Image of size 114996 bytes
17,181,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,964 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,646,209 >>> mbox cmd response: success
17,650,200 UART: [afmc] ++
17,650,795 UART: [afmc] CDI.KEYID = 6
17,651,680 UART: [afmc] SUBJECT.KEYID = 7
17,652,955 UART: [afmc] AUTHORITY.KEYID = 5
21,029,155 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,951 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,205 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,597 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,467 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,955 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,851 UART: [afmc] --
23,400,242 UART: [cold-reset] --
23,403,617 UART: [state] Locking Datavault
23,409,512 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,210 UART: [state] Locking ICCM
23,412,874 UART: [exit] Launching FMC @ 0x40000130
23,421,271 UART:
23,421,515 UART: Running Caliptra FMC ...
23,422,620 UART:
23,422,777 UART: [state] CFI Enabled
23,488,230 UART: [fht] FMC Alias Private Key: 7
25,826,073 UART: [art] Extend RT PCRs Done
25,827,296 UART: [art] Lock RT PCRs Done
25,829,003 UART: [art] Populate DV Done
25,834,205 UART: [fht] FMC Alias Private Key: 7
25,835,815 UART: [art] Derive CDI
25,836,551 UART: [art] Store in in slot 0x4
25,897,272 UART: [art] Derive Key Pair
25,898,312 UART: [art] Store priv key in slot 0x5
29,191,101 UART: [art] Derive Key Pair - Done
29,204,097 UART: [art] Signing Cert with AUTHO
29,205,413 UART: RITY.KEYID = 7
31,493,321 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,836 UART: [art] PUB.X = 2318590FC6BF98A5F8988A27FB376CD22C4873D613F407468582A7CF28028C0814166C79EA97F7EB5DA7A44C07B7BE34
31,502,092 UART: [art] PUB.Y = AE743E58B3C7C6A8EF32202878317C66089A430C9AE746D6061D7B411ED55F7E270C761BE33CB121C559C81942507DDA
31,509,290 UART: [art] SIG.R = 99FF6FE41D69018C58AC0162FE97A23DEDEB565033359EFEC29CFC8C3D9646067CF6F3AD99BFB932F5B970D43FC4E7C1
31,516,702 UART: [art] SIG.S = 77A047ED25A8AF56E5F52B1253F655B16ED70A6DC578D90EFBA749A83A096BC11D60322CB308D8B8317A31183D0CC965
32,822,117 UART: Caliptra RT
32,822,818 UART: [state] CFI Enabled
32,985,855 UART: [rt] RT listening for mailbox commands...
32,987,708 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,017,243 UART: [rt]cmd =0x46504c54, len=4
33,018,875 >>> mbox cmd response data (8 bytes)
33,019,579 UART: [rt] FIPS self test
33,020,519 UART: [kat] ++
33,020,972 UART: [kat] sha1
33,025,407 UART: [kat] SHA2-256
33,027,342 UART: [kat] SHA2-384
33,030,465 UART: [kat] SHA2-512-ACC
33,031,519 UART: Fatal Error: 0x90050001
33,066,899 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,211,186 >>> mbox cmd response: failed
33,211,799 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,356,205 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,118 UART:
190,439 UART: Running Caliptra ROM ...
191,551 UART:
191,704 UART: [state] CFI Enabled
249,165 UART: [state] LifecycleState = Unprovisioned
251,093 UART: [state] DebugLocked = No
252,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
256,493 UART: [kat] SHA2-256
426,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
436,695 UART: [kat] ++
437,278 UART: [kat] sha1
448,271 UART: [kat] SHA2-256
450,956 UART: [kat] SHA2-384
455,909 UART: [kat] SHA2-512-ACC
458,249 UART: [kat] ECC-384
2,753,380 UART: [kat] HMAC-384Kdf
2,765,129 UART: [kat] LMS
3,955,411 UART: [kat] --
3,959,896 UART: [cold-reset] ++
3,962,581 UART: [fht] Storing FHT @ 0x50003400
3,974,933 UART: [idev] ++
3,975,497 UART: [idev] CDI.KEYID = 6
3,976,436 UART: [idev] SUBJECT.KEYID = 7
3,977,707 UART: [idev] UDS.KEYID = 0
3,979,194 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,123,753 UART: [idev] Erasing UDS.KEYID = 0
7,311,520 UART: [idev] Using Sha1 for KeyId Algorithm
7,334,350 UART: [idev] --
7,339,264 UART: [ldev] ++
7,339,837 UART: [ldev] CDI.KEYID = 6
7,340,772 UART: [ldev] SUBJECT.KEYID = 5
7,341,986 UART: [ldev] AUTHORITY.KEYID = 7
7,343,275 UART: [ldev] FE.KEYID = 1
7,385,740 UART: [ldev] Erasing FE.KEYID = 1
10,718,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,851 UART: [ldev] --
13,101,229 UART: [fwproc] Waiting for Commands...
13,103,867 UART: [fwproc] Received command 0x46574c44
13,106,056 UART: [fwproc] Received Image of size 114996 bytes
17,161,928 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,235,960 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,825 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,625,335 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,785,161 ready_for_fw is high
3,785,604 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,882,658 >>> mbox cmd response: success
23,584,601 UART:
23,584,978 UART: Running Caliptra FMC ...
23,586,134 UART:
23,586,297 UART: [state] CFI Enabled
23,651,623 UART: [fht] FMC Alias Private Key: 7
25,989,168 UART: [art] Extend RT PCRs Done
25,990,391 UART: [art] Lock RT PCRs Done
25,992,214 UART: [art] Populate DV Done
25,997,643 UART: [fht] FMC Alias Private Key: 7
25,999,186 UART: [art] Derive CDI
25,999,919 UART: [art] Store in in slot 0x4
26,060,069 UART: [art] Derive Key Pair
26,061,119 UART: [art] Store priv key in slot 0x5
29,354,008 UART: [art] Derive Key Pair - Done
29,366,952 UART: [art] Signing Cert with AUTHO
29,368,253 UART: RITY.KEYID = 7
31,655,447 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,960 UART: [art] PUB.X = F33549C387E97ADD9B64DF05049B2201D2940D1C6058B883A6102DCD3F556F99CCD29FD4A45969B33999E778EA428B4A
31,664,202 UART: [art] PUB.Y = 27AA6F25657117A83E77CE93746CF26D271032FC2B6FA7976C25FC88C3C9C7F8C4338A8FECDCC0B9E3F3DEB815BC6397
31,671,458 UART: [art] SIG.R = 014C229CC5EAC0932577DBD453FEAB76E40E3CFBB97714EBFE89673D0624B7BBEE8461185507BDBA40C39180F2278FE5
31,678,804 UART: [art] SIG.S = 4B5DB78356C80AB3D4AB0F732980A360B28A2E54023E15DE97A23AE9264C002CC6DFC9F11A5DD444551B13F6751AE27E
32,983,818 UART: Caliptra RT
32,984,539 UART: [state] CFI Enabled
33,147,275 UART: [rt] RT listening for mailbox commands...
33,149,135 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,178,808 UART: [rt]cmd =0x46504c54, len=4
33,180,468 >>> mbox cmd response data (8 bytes)
33,181,589 UART: [rt] FIPS self test
33,182,539 UART: [kat] ++
33,182,994 UART: [kat] sha1
33,187,560 UART: [kat] SHA2-256
33,189,502 UART: [kat] SHA2-384
33,192,358 UART: [kat] SHA2-512-ACC
33,193,315 UART: Fatal Error: 0x90050001
33,228,474 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,372,947 >>> mbox cmd response: failed
33,373,525 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,518,115 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
3,795,088 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,886,443 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,523 UART:
192,892 UART: Running Caliptra ROM ...
194,069 UART:
603,787 UART: [state] CFI Enabled
617,683 UART: [state] LifecycleState = Unprovisioned
619,665 UART: [state] DebugLocked = No
621,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,679 UART: [kat] SHA2-256
795,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,934 UART: [kat] ++
806,461 UART: [kat] sha1
818,044 UART: [kat] SHA2-256
820,708 UART: [kat] SHA2-384
826,560 UART: [kat] SHA2-512-ACC
828,928 UART: [kat] ECC-384
3,111,346 UART: [kat] HMAC-384Kdf
3,122,171 UART: [kat] LMS
4,312,250 UART: [kat] --
4,317,856 UART: [cold-reset] ++
4,319,674 UART: [fht] Storing FHT @ 0x50003400
4,331,659 UART: [idev] ++
4,332,227 UART: [idev] CDI.KEYID = 6
4,333,141 UART: [idev] SUBJECT.KEYID = 7
4,334,387 UART: [idev] UDS.KEYID = 0
4,335,359 ready_for_fw is high
4,335,583 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,480,131 UART: [idev] Erasing UDS.KEYID = 0
7,622,287 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,098 UART: [idev] --
7,648,798 UART: [ldev] ++
7,649,405 UART: [ldev] CDI.KEYID = 6
7,650,316 UART: [ldev] SUBJECT.KEYID = 5
7,651,535 UART: [ldev] AUTHORITY.KEYID = 7
7,652,824 UART: [ldev] FE.KEYID = 1
7,664,606 UART: [ldev] Erasing FE.KEYID = 1
10,958,721 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,457 UART: [ldev] --
13,318,102 UART: [fwproc] Waiting for Commands...
13,320,901 UART: [fwproc] Received command 0x46574c44
13,323,085 UART: [fwproc] Received Image of size 114996 bytes
17,375,899 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,050 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,837,027 >>> mbox cmd response: success
17,840,506 UART: [afmc] ++
17,841,093 UART: [afmc] CDI.KEYID = 6
17,842,005 UART: [afmc] SUBJECT.KEYID = 7
17,843,277 UART: [afmc] AUTHORITY.KEYID = 5
21,161,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,911 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,182 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,587 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,407 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,869 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,170 UART: [afmc] --
23,527,787 UART: [cold-reset] --
23,532,304 UART: [state] Locking Datavault
23,537,876 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,625 UART: [state] Locking ICCM
23,540,660 UART: [exit] Launching FMC @ 0x40000130
23,549,057 UART:
23,549,300 UART: Running Caliptra FMC ...
23,550,406 UART:
23,550,563 UART: [state] CFI Enabled
23,558,667 UART: [fht] FMC Alias Private Key: 7
25,889,764 UART: [art] Extend RT PCRs Done
25,890,991 UART: [art] Lock RT PCRs Done
25,892,619 UART: [art] Populate DV Done
25,898,034 UART: [fht] FMC Alias Private Key: 7
25,899,583 UART: [art] Derive CDI
25,900,398 UART: [art] Store in in slot 0x4
25,943,103 UART: [art] Derive Key Pair
25,944,101 UART: [art] Store priv key in slot 0x5
29,186,598 UART: [art] Derive Key Pair - Done
29,199,762 UART: [art] Signing Cert with AUTHO
29,201,083 UART: RITY.KEYID = 7
31,480,174 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,686 UART: [art] PUB.X = 03284C1E0E13B696CD393486CB12266B15359B1EE907C35A6CA1D2BB2546349FD8F1E7B8F4AABB4FE731E1FA5599D85F
31,488,973 UART: [art] PUB.Y = B42BDDF96AD49F8BD2850F9BA2501A0FEB085BC1B7A4EBC8176C6E92EA6A85EC044EC9CE4C19762FE30FB431AF899AC7
31,496,234 UART: [art] SIG.R = 30217EEF70A1C3779D75B7DEB6FB959ED230A7A2BDF35DC7795487B62011AB9014F060A32661303BB0F655DC1A37DD9E
31,503,580 UART: [art] SIG.S = 6975D50AC905432FC2CDFDD0414FFC25C28131F3C108E0B5172A81E45710E160E41CD45D9E5C46B47517070BDFBEC9BD
32,809,200 UART: Caliptra RT
32,809,927 UART: [state] CFI Enabled
32,928,194 UART: [rt] RT listening for mailbox commands...
32,930,045 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,959,616 UART: [rt]cmd =0x46504c54, len=4
32,961,198 >>> mbox cmd response data (8 bytes)
32,961,997 UART: [rt] FIPS self test
32,962,948 UART: [kat] ++
32,963,402 UART: [kat] sha1
32,967,860 UART: [kat] SHA2-256
32,969,807 UART: [kat] SHA2-384
32,972,825 UART: [kat] SHA2-512-ACC
32,973,871 UART: Fatal Error: 0x90050001
33,009,245 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,153,600 >>> mbox cmd response: failed
33,154,168 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,298,557 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,034 UART:
190,349 UART: Running Caliptra ROM ...
191,376 UART:
7,228,301 UART: [state] CFI Enabled
7,243,539 UART: [state] LifecycleState = Unprovisioned
7,245,509 UART: [state] DebugLocked = No
7,246,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,251,387 UART: [kat] SHA2-256
7,421,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,431,650 UART: [kat] ++
7,432,138 UART: [kat] sha1
7,442,923 UART: [kat] SHA2-256
7,445,673 UART: [kat] SHA2-384
7,450,471 UART: [kat] SHA2-512-ACC
7,452,874 UART: [kat] ECC-384
9,737,668 UART: [kat] HMAC-384Kdf
9,749,525 UART: [kat] LMS
10,939,625 UART: [kat] --
10,944,931 UART: [cold-reset] ++
10,945,946 UART: [fht] Storing FHT @ 0x50003400
10,957,911 UART: [idev] ++
10,958,529 UART: [idev] CDI.KEYID = 6
10,959,436 UART: [idev] SUBJECT.KEYID = 7
10,960,727 UART: [idev] UDS.KEYID = 0
10,962,317 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,106,707 UART: [idev] Erasing UDS.KEYID = 0
14,244,505 UART: [idev] Using Sha1 for KeyId Algorithm
14,266,942 UART: [idev] --
14,272,032 UART: [ldev] ++
14,272,649 UART: [ldev] CDI.KEYID = 6
14,273,574 UART: [ldev] SUBJECT.KEYID = 5
14,274,789 UART: [ldev] AUTHORITY.KEYID = 7
14,276,024 UART: [ldev] FE.KEYID = 1
14,287,754 UART: [ldev] Erasing FE.KEYID = 1
17,573,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,865,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,880,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,894,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,909,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,928,114 UART: [ldev] --
19,932,462 UART: [fwproc] Waiting for Commands...
19,935,263 UART: [fwproc] Received command 0x46574c44
19,937,451 UART: [fwproc] Received Image of size 114996 bytes
24,001,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,081,691 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,150,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,470,643 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,130,946 ready_for_fw is high
4,132,142 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,109,126 >>> mbox cmd response: success
23,749,344 UART:
23,749,757 UART: Running Caliptra FMC ...
23,750,909 UART:
23,751,072 UART: [state] CFI Enabled
23,759,187 UART: [fht] FMC Alias Private Key: 7
26,089,560 UART: [art] Extend RT PCRs Done
26,090,788 UART: [art] Lock RT PCRs Done
26,092,582 UART: [art] Populate DV Done
26,098,174 UART: [fht] FMC Alias Private Key: 7
26,099,721 UART: [art] Derive CDI
26,100,505 UART: [art] Store in in slot 0x4
26,143,348 UART: [art] Derive Key Pair
26,144,375 UART: [art] Store priv key in slot 0x5
29,386,228 UART: [art] Derive Key Pair - Done
29,399,026 UART: [art] Signing Cert with AUTHO
29,400,345 UART: RITY.KEYID = 7
31,679,669 UART: [art] Erasing AUTHORITY.KEYID = 7
31,681,184 UART: [art] PUB.X = 6E7F93513D267B678CBFBD877CC90DDDE7BFDD545DC1C13FEA1B455FBA6B71AC9797D13289B29D8FE228F424443D5A4B
31,688,395 UART: [art] PUB.Y = 23E8B04B67C7D4506808DDEF570576865F96AFFF25DC503E32DF5840EBD0DDB146AEC39097429FA61A6DF5070CC181D4
31,695,660 UART: [art] SIG.R = EA4828C537EEDB7CE4FD74F87199DD4E38F374FC267F4D865B754CF894C885EFF6C7AB304EDF31B6B5168C0F1F4A0D7F
31,703,117 UART: [art] SIG.S = 9FDF86C29D5B9A980866385C06DB51C38EC5FAAD9284013A33DA23C8E495BEA870EE2A7074335414C44771532D6150FF
33,007,652 UART: Caliptra RT
33,008,370 UART: [state] CFI Enabled
33,125,603 UART: [rt] RT listening for mailbox commands...
33,127,461 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,157,120 UART: [rt]cmd =0x46504c54, len=4
33,158,625 >>> mbox cmd response data (8 bytes)
33,160,018 UART: [rt] FIPS self test
33,160,960 UART: [kat] ++
33,161,436 UART: [kat] sha1
33,165,946 UART: [kat] SHA2-256
33,167,877 UART: [kat] SHA2-384
33,170,892 UART: [kat] SHA2-512-ACC
33,171,957 UART: Fatal Error: 0x90050001
33,207,166 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,351,577 >>> mbox cmd response: failed
33,352,241 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,497,135 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
10,565,801 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,541,446 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,202 UART:
192,604 UART: Running Caliptra ROM ...
193,770 UART:
193,917 UART: [state] CFI Enabled
265,486 UART: [state] LifecycleState = Unprovisioned
267,362 UART: [state] DebugLocked = No
269,909 UART: [state] WD Timer not started. Device not locked for debugging
274,154 UART: [kat] SHA2-256
453,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,867 UART: [kat] ++
465,401 UART: [kat] sha1
477,346 UART: [kat] SHA2-256
480,358 UART: [kat] SHA2-384
486,066 UART: [kat] SHA2-512-ACC
489,010 UART: [kat] ECC-384
2,948,850 UART: [kat] HMAC-384Kdf
2,972,448 UART: [kat] LMS
3,501,905 UART: [kat] --
3,507,209 UART: [cold-reset] ++
3,508,656 UART: [fht] FHT @ 0x50003400
3,519,574 UART: [idev] ++
3,520,157 UART: [idev] CDI.KEYID = 6
3,521,141 UART: [idev] SUBJECT.KEYID = 7
3,522,320 UART: [idev] UDS.KEYID = 0
3,523,246 ready_for_fw is high
3,523,465 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,527 UART: [idev] Erasing UDS.KEYID = 0
6,029,011 UART: [idev] Sha1 KeyId Algorithm
6,052,644 UART: [idev] --
6,057,652 UART: [ldev] ++
6,058,235 UART: [ldev] CDI.KEYID = 6
6,059,123 UART: [ldev] SUBJECT.KEYID = 5
6,060,242 UART: [ldev] AUTHORITY.KEYID = 7
6,061,588 UART: [ldev] FE.KEYID = 1
6,101,787 UART: [ldev] Erasing FE.KEYID = 1
8,605,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,878 UART: [ldev] --
10,416,709 UART: [fwproc] Wait for Commands...
10,419,782 UART: [fwproc] Recv command 0x46574c44
10,421,883 UART: [fwproc] Recv'd Img size: 115304 bytes
13,834,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,973,086 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,295,013 >>> mbox cmd response: success
14,300,020 UART: [afmc] ++
14,300,612 UART: [afmc] CDI.KEYID = 6
14,301,503 UART: [afmc] SUBJECT.KEYID = 7
14,302,719 UART: [afmc] AUTHORITY.KEYID = 5
16,830,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,172 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,002 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,862 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,240 UART: [afmc] --
18,629,537 UART: [cold-reset] --
18,634,045 UART: [state] Locking Datavault
18,639,139 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,841 UART: [state] Locking ICCM
18,643,269 UART: [exit] Launching FMC @ 0x40000130
18,651,664 UART:
18,651,899 UART: Running Caliptra FMC ...
18,653,004 UART:
18,653,168 UART: [state] CFI Enabled
18,711,364 UART: [fht] FMC Alias Private Key: 7
20,475,481 UART: [art] Extend RT PCRs Done
20,476,741 UART: [art] Lock RT PCRs Done
20,478,557 UART: [art] Populate DV Done
20,484,020 UART: [fht] FMC Alias Private Key: 7
20,485,673 UART: [art] Derive CDI
20,486,489 UART: [art] Store in in slot 0x4
20,544,232 UART: [art] Derive Key Pair
20,545,278 UART: [art] Store priv key in slot 0x5
23,008,471 UART: [art] Derive Key Pair - Done
23,021,313 UART: [art] Signing Cert with AUTHO
23,022,620 UART: RITY.KEYID = 7
24,734,299 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,818 UART: [art] PUB.X = 73B849C514C2409A5945523CAC0B2E59D5CEE60769F8DD712D6156F12DB25C1F1422E561434988C1C9F79D1CEB57CE76
24,743,087 UART: [art] PUB.Y = DC2EF33F3765E9118B805BA5B963673E198FA7F03E5D4F6362C05CF07FC88275A7646D80DB882F668AA7F527BB22A2C7
24,750,330 UART: [art] SIG.R = 568B272E8D5E44C145568D5A972C3F8CCCDDC8057334D80577D3D215F6C5A8B74D58C57B24D312E01496180A31D77E8F
24,757,715 UART: [art] SIG.S = EC99E86007FD6EB49F56B63E90F99401FFB80BDD907F45E3E9A3539264BA3505698DBA7614CF131879013D2283697EE1
25,736,427 UART: Caliptra RT
25,737,138 UART: [state] CFI Enabled
25,902,414 UART: [rt] RT listening for mailbox commands...
25,904,268 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,934,035 UART: [rt]cmd =0x46504c54, len=4
25,935,779 >>> mbox cmd response data (8 bytes)
25,936,678 UART: [rt] FIPS self test
25,937,622 UART: [kat] ++
25,938,069 UART: [kat] sha1
25,942,526 UART: [kat] SHA2-256
25,944,451 UART: [kat] SHA2-384
25,947,520 UART: [kat] SHA2-512-ACC
25,948,566 UART: Fatal Error: 0x90050001
25,983,863 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,128,699 >>> mbox cmd response: failed
26,129,383 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,273,992 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,103 UART:
190,391 UART: Running Caliptra ROM ...
191,416 UART:
191,553 UART: [state] CFI Enabled
252,418 UART: [state] LifecycleState = Unprovisioned
254,281 UART: [state] DebugLocked = No
257,056 UART: [state] WD Timer not started. Device not locked for debugging
261,490 UART: [kat] SHA2-256
440,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,184 UART: [kat] ++
452,719 UART: [kat] sha1
463,872 UART: [kat] SHA2-256
466,882 UART: [kat] SHA2-384
471,960 UART: [kat] SHA2-512-ACC
474,891 UART: [kat] ECC-384
2,936,716 UART: [kat] HMAC-384Kdf
2,961,319 UART: [kat] LMS
3,490,760 UART: [kat] --
3,495,239 UART: [cold-reset] ++
3,497,659 UART: [fht] FHT @ 0x50003400
3,508,371 UART: [idev] ++
3,508,933 UART: [idev] CDI.KEYID = 6
3,509,843 UART: [idev] SUBJECT.KEYID = 7
3,511,059 UART: [idev] UDS.KEYID = 0
3,512,572 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,657,613 UART: [idev] Erasing UDS.KEYID = 0
6,014,387 UART: [idev] Sha1 KeyId Algorithm
6,036,804 UART: [idev] --
6,041,874 UART: [ldev] ++
6,042,465 UART: [ldev] CDI.KEYID = 6
6,043,351 UART: [ldev] SUBJECT.KEYID = 5
6,044,510 UART: [ldev] AUTHORITY.KEYID = 7
6,045,804 UART: [ldev] FE.KEYID = 1
6,089,637 UART: [ldev] Erasing FE.KEYID = 1
8,592,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,117 UART: [ldev] --
10,403,090 UART: [fwproc] Wait for Commands...
10,405,517 UART: [fwproc] Recv command 0x46574c44
10,407,560 UART: [fwproc] Recv'd Img size: 115304 bytes
13,824,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,645 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,289,490 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,381,301 ready_for_fw is high
3,381,712 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,080,528 >>> mbox cmd response: success
18,369,533 UART:
18,369,942 UART: Running Caliptra FMC ...
18,371,106 UART:
18,371,269 UART: [state] CFI Enabled
18,434,907 UART: [fht] FMC Alias Private Key: 7
20,199,164 UART: [art] Extend RT PCRs Done
20,200,390 UART: [art] Lock RT PCRs Done
20,202,296 UART: [art] Populate DV Done
20,207,685 UART: [fht] FMC Alias Private Key: 7
20,209,332 UART: [art] Derive CDI
20,210,070 UART: [art] Store in in slot 0x4
20,267,452 UART: [art] Derive Key Pair
20,268,454 UART: [art] Store priv key in slot 0x5
22,731,073 UART: [art] Derive Key Pair - Done
22,744,293 UART: [art] Signing Cert with AUTHO
22,745,596 UART: RITY.KEYID = 7
24,456,728 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,228 UART: [art] PUB.X = 75AC9AA138DEBF2699CCC852F1C2F6033061A8EEA6920E75BFD26024AE2480545367D5C7B843151CA26F0530436E03C0
24,465,490 UART: [art] PUB.Y = C06F7852D1A684E22D5AF8872A6590B4D0169E2637DC3F6E1276C9C7C62073796E47AED6CE3A8BEB8145C168236DA103
24,472,706 UART: [art] SIG.R = EB4765A3BB2CDF65E9E3D3674C0826E871C1669D852E339CE2A3AFA052CF06B1F4060DED420CEDC5B2132ADD5FB92E9B
24,480,165 UART: [art] SIG.S = ADBB97CA7D04F6DFFB05B00CB700D61B74192D252740A5D1A121850898685F936530B0401138E39D1F76500316FD8407
25,459,381 UART: Caliptra RT
25,460,096 UART: [state] CFI Enabled
25,625,285 UART: [rt] RT listening for mailbox commands...
25,627,147 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,656,567 UART: [rt]cmd =0x46504c54, len=4
25,658,128 >>> mbox cmd response data (8 bytes)
25,659,276 UART: [rt] FIPS self test
25,660,230 UART: [kat] ++
25,660,726 UART: [kat] sha1
25,665,019 UART: [kat] SHA2-256
25,666,953 UART: [kat] SHA2-384
25,670,111 UART: [kat] SHA2-512-ACC
25,671,092 UART: Fatal Error: 0x90050001
25,706,302 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,851,115 >>> mbox cmd response: failed
25,851,792 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,996,594 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,347,617 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,047,645 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
192,672 UART:
193,051 UART: Running Caliptra ROM ...
194,271 UART:
603,754 UART: [state] CFI Enabled
619,136 UART: [state] LifecycleState = Unprovisioned
621,020 UART: [state] DebugLocked = No
622,704 UART: [state] WD Timer not started. Device not locked for debugging
626,310 UART: [kat] SHA2-256
805,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,006 UART: [kat] ++
817,575 UART: [kat] sha1
829,879 UART: [kat] SHA2-256
832,900 UART: [kat] SHA2-384
839,041 UART: [kat] SHA2-512-ACC
841,986 UART: [kat] ECC-384
3,285,167 UART: [kat] HMAC-384Kdf
3,298,331 UART: [kat] LMS
3,827,836 UART: [kat] --
3,831,691 UART: [cold-reset] ++
3,832,772 UART: [fht] FHT @ 0x50003400
3,845,167 UART: [idev] ++
3,845,734 UART: [idev] CDI.KEYID = 6
3,846,622 UART: [idev] SUBJECT.KEYID = 7
3,847,746 UART: [idev] UDS.KEYID = 0
3,848,720 ready_for_fw is high
3,848,943 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,994,182 UART: [idev] Erasing UDS.KEYID = 0
6,320,249 UART: [idev] Sha1 KeyId Algorithm
6,344,558 UART: [idev] --
6,348,531 UART: [ldev] ++
6,349,108 UART: [ldev] CDI.KEYID = 6
6,349,992 UART: [ldev] SUBJECT.KEYID = 5
6,351,209 UART: [ldev] AUTHORITY.KEYID = 7
6,352,442 UART: [ldev] FE.KEYID = 1
6,362,176 UART: [ldev] Erasing FE.KEYID = 1
8,838,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,639 UART: [ldev] --
10,628,201 UART: [fwproc] Wait for Commands...
10,629,937 UART: [fwproc] Recv command 0x46574c44
10,632,031 UART: [fwproc] Recv'd Img size: 115304 bytes
14,044,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,121,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,190,470 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,512,509 >>> mbox cmd response: success
14,516,824 UART: [afmc] ++
14,517,422 UART: [afmc] CDI.KEYID = 6
14,518,339 UART: [afmc] SUBJECT.KEYID = 7
14,519,439 UART: [afmc] AUTHORITY.KEYID = 5
17,020,845 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,742,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,744,104 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,759,892 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,775,941 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,791,762 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,814,620 UART: [afmc] --
18,818,476 UART: [cold-reset] --
18,822,402 UART: [state] Locking Datavault
18,828,951 UART: [state] Locking PCR0, PCR1 and PCR31
18,830,595 UART: [state] Locking ICCM
18,832,369 UART: [exit] Launching FMC @ 0x40000130
18,840,817 UART:
18,841,061 UART: Running Caliptra FMC ...
18,842,170 UART:
18,842,331 UART: [state] CFI Enabled
18,850,597 UART: [fht] FMC Alias Private Key: 7
20,607,109 UART: [art] Extend RT PCRs Done
20,608,322 UART: [art] Lock RT PCRs Done
20,609,814 UART: [art] Populate DV Done
20,615,177 UART: [fht] FMC Alias Private Key: 7
20,616,878 UART: [art] Derive CDI
20,617,716 UART: [art] Store in in slot 0x4
20,660,262 UART: [art] Derive Key Pair
20,661,306 UART: [art] Store priv key in slot 0x5
23,087,992 UART: [art] Derive Key Pair - Done
23,100,929 UART: [art] Signing Cert with AUTHO
23,102,237 UART: RITY.KEYID = 7
24,807,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,808,975 UART: [art] PUB.X = E4F95744E0CC5ED5EB0B68F9492D4B77EC3663B5598E94A4FE7F7F20F66C945D44E77EAA580D0010056AC719A326C99A
24,816,265 UART: [art] PUB.Y = 572607932F830DD06FEB98DF574D871CA930A7E1EFB292D10B137C86B063E1F70EF0A928BF9D3CD5573D71359AC022A4
24,823,517 UART: [art] SIG.R = F911B7C29A26DDB55159B8BE5721C520165AE46674EF26EBA774DA000BF4332D616EBA5BCDB119F6BB535ECA1CDEEA45
24,830,914 UART: [art] SIG.S = DD02AC93E3DEA644A35B2DC9027A4EB3AD0E27939E6D36C335B4A644B82A485DB06C0D68B3F01C17A947D5E3B56532DD
25,809,783 UART: Caliptra RT
25,810,477 UART: [state] CFI Enabled
25,927,590 UART: [rt] RT listening for mailbox commands...
25,929,434 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,959,634 UART: [rt]cmd =0x46504c54, len=4
25,961,251 >>> mbox cmd response data (8 bytes)
25,962,422 UART: [rt] FIPS self test
25,963,358 UART: [kat] ++
25,963,810 UART: [kat] sha1
25,968,373 UART: [kat] SHA2-256
25,970,309 UART: [kat] SHA2-384
25,973,488 UART: [kat] SHA2-512-ACC
25,974,373 UART: Fatal Error: 0x90050001
26,009,520 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,154,419 >>> mbox cmd response: failed
26,154,982 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,299,700 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,096 UART:
190,379 UART: Running Caliptra ROM ...
191,452 UART:
14,233,959 UART: [state] CFI Enabled
14,245,070 UART: [state] LifecycleState = Unprovisioned
14,246,933 UART: [state] DebugLocked = No
14,248,402 UART: [state] WD Timer not started. Device not locked for debugging
14,252,411 UART: [kat] SHA2-256
14,431,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,443,128 UART: [kat] ++
14,443,583 UART: [kat] sha1
14,454,794 UART: [kat] SHA2-256
14,457,812 UART: [kat] SHA2-384
14,465,469 UART: [kat] SHA2-512-ACC
14,468,412 UART: [kat] ECC-384
16,908,942 UART: [kat] HMAC-384Kdf
16,920,649 UART: [kat] LMS
17,450,110 UART: [kat] --
17,453,542 UART: [cold-reset] ++
17,455,854 UART: [fht] FHT @ 0x50003400
17,467,534 UART: [idev] ++
17,468,095 UART: [idev] CDI.KEYID = 6
17,468,978 UART: [idev] SUBJECT.KEYID = 7
17,470,195 UART: [idev] UDS.KEYID = 0
17,471,855 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,616,468 UART: [idev] Erasing UDS.KEYID = 0
19,942,112 UART: [idev] Sha1 KeyId Algorithm
19,964,257 UART: [idev] --
19,968,058 UART: [ldev] ++
19,968,644 UART: [ldev] CDI.KEYID = 6
19,969,552 UART: [ldev] SUBJECT.KEYID = 5
19,970,766 UART: [ldev] AUTHORITY.KEYID = 7
19,971,995 UART: [ldev] FE.KEYID = 1
19,982,586 UART: [ldev] Erasing FE.KEYID = 1
22,451,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,170,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,186,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,202,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,218,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,238,718 UART: [ldev] --
24,243,010 UART: [fwproc] Wait for Commands...
24,245,809 UART: [fwproc] Recv command 0x46574c44
24,247,904 UART: [fwproc] Recv'd Img size: 115304 bytes
27,665,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,737,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,806,778 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,128,935 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,697,535 ready_for_fw is high
3,698,047 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,303,343 >>> mbox cmd response: success
18,552,904 UART:
18,553,293 UART: Running Caliptra FMC ...
18,554,437 UART:
18,554,602 UART: [state] CFI Enabled
18,562,321 UART: [fht] FMC Alias Private Key: 7
20,319,044 UART: [art] Extend RT PCRs Done
20,320,281 UART: [art] Lock RT PCRs Done
20,321,940 UART: [art] Populate DV Done
20,327,307 UART: [fht] FMC Alias Private Key: 7
20,329,008 UART: [art] Derive CDI
20,329,792 UART: [art] Store in in slot 0x4
20,372,553 UART: [art] Derive Key Pair
20,373,560 UART: [art] Store priv key in slot 0x5
22,800,196 UART: [art] Derive Key Pair - Done
22,813,141 UART: [art] Signing Cert with AUTHO
22,814,482 UART: RITY.KEYID = 7
24,519,706 UART: [art] Erasing AUTHORITY.KEYID = 7
24,521,205 UART: [art] PUB.X = 6AE7611BEB74D764F8ABDCA97BA66CD931E522F18FF21832983E99D4C3894F5BE5ED6923DB8A6B709A344B4E3A4AC3DF
24,528,489 UART: [art] PUB.Y = 88E131BABF70971DC88585032C3BFB787ADA3D50446F656529E0DF57E6D188C57422A03064D0132CF670621D93ADD880
24,535,730 UART: [art] SIG.R = 12AE3C9A1B5822FE7CA6C9371E2B0E458B73C2A2FB441207FD9EAFF82CBB48CC5B6DF245715C46E8A1A7B4ADCD5A2415
24,543,164 UART: [art] SIG.S = 87852D27C8A3C0BFC0341A65ADE9AAC3121DEE8E512EA14C5AE5633A95DD87955963005CB7D512DE4A084F50AB0A4634
25,522,163 UART: Caliptra RT
25,522,870 UART: [state] CFI Enabled
25,639,246 UART: [rt] RT listening for mailbox commands...
25,641,114 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,671,118 UART: [rt]cmd =0x46504c54, len=4
25,672,810 >>> mbox cmd response data (8 bytes)
25,674,227 UART: [rt] FIPS self test
25,675,174 UART: [kat] ++
25,675,624 UART: [kat] sha1
25,680,240 UART: [kat] SHA2-256
25,682,177 UART: [kat] SHA2-384
25,685,191 UART: [kat] SHA2-512-ACC
25,686,114 UART: Fatal Error: 0x90050001
25,721,439 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,866,667 >>> mbox cmd response: failed
25,867,301 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,012,107 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
17,610,463 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,207,563 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,437,283 ready_for_fw is high
3,437,845 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,757,374 >>> mbox cmd response: success
19,046,488 UART:
19,046,874 UART: Running Caliptra FMC ...
19,047,999 UART:
19,048,155 UART: [state] CFI Enabled
19,115,785 UART: [fht] FMC Alias Private Key: 7
20,880,106 UART: [art] Extend RT PCRs Done
20,881,337 UART: [art] Lock RT PCRs Done
20,883,061 UART: [art] Populate DV Done
20,888,588 UART: [fht] FMC Alias Private Key: 7
20,890,181 UART: [art] Derive CDI
20,890,922 UART: [art] Store in in slot 0x4
20,948,933 UART: [art] Derive Key Pair
20,949,973 UART: [art] Store priv key in slot 0x5
23,412,155 UART: [art] Derive Key Pair - Done
23,424,885 UART: [art] Signing Cert with AUTHO
23,426,189 UART: RITY.KEYID = 7
25,138,486 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,044 UART: [art] PUB.X = D82337E05AD97EDE40F009CAE57BA138A5A2677D45DD94F61E581716966716FB59733F3993B585B95DD071B5907E52F3
25,147,260 UART: [art] PUB.Y = 90B108C31E92C68DCA75B04A55C77B342D8A12136BCDD33530DFD0D9E202CA8188C9A45B60A056EBCFB9BBE1D6E316EE
25,154,525 UART: [art] SIG.R = 5FCC3F6BB64940E198A57305A4A3CE9E2730CE00A49350E3C740D34BA0261EA6B0317E11248E089E58954973BE278E7E
25,161,880 UART: [art] SIG.S = 2943ACC0F8D06760148091C27F64515B72871A3E94E279BCFF4F37FBD4E5FA1BAA3965627EFD9E16D3BDE83A48D78852
26,140,610 UART: Caliptra RT
26,141,329 UART: [state] CFI Enabled
26,307,585 UART: [rt] RT listening for mailbox commands...
26,309,578 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,339,319 UART: [rt]cmd =0x46504c54, len=4
26,341,038 >>> mbox cmd response data (8 bytes)
26,342,053 UART: [rt] FIPS self test
26,343,006 UART: [kat] ++
26,343,465 UART: [kat] sha1
26,347,951 UART: [kat] SHA2-256
26,349,833 UART: [kat] SHA2-384
26,352,897 UART: [kat] SHA2-512-ACC
26,353,815 UART: Fatal Error: 0x90050001
26,389,148 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,533,820 >>> mbox cmd response: failed
26,534,460 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,679,204 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,424,114 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,746,438 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
3,755,031 ready_for_fw is high
3,755,483 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,970,988 >>> mbox cmd response: success
19,229,184 UART:
19,229,577 UART: Running Caliptra FMC ...
19,230,698 UART:
19,230,861 UART: [state] CFI Enabled
19,239,189 UART: [fht] FMC Alias Private Key: 7
20,996,275 UART: [art] Extend RT PCRs Done
20,997,503 UART: [art] Lock RT PCRs Done
20,998,960 UART: [art] Populate DV Done
21,004,217 UART: [fht] FMC Alias Private Key: 7
21,005,826 UART: [art] Derive CDI
21,006,574 UART: [art] Store in in slot 0x4
21,049,177 UART: [art] Derive Key Pair
21,050,184 UART: [art] Store priv key in slot 0x5
23,477,427 UART: [art] Derive Key Pair - Done
23,490,527 UART: [art] Signing Cert with AUTHO
23,491,830 UART: RITY.KEYID = 7
25,197,239 UART: [art] Erasing AUTHORITY.KEYID = 7
25,198,756 UART: [art] PUB.X = D2F87303C5826EED132B0E5CA8260FBA23BC754842CBEF7C6358817F82B7D40D6D79924AE4B04753DA14B2A77C7AFF4F
25,206,042 UART: [art] PUB.Y = AD629257F5CEC5A86A26F55D1C82E87B2F6CC9FDD385248743F6A22944F070C410B474CFB15575E0C090D3FFC792AE0C
25,213,272 UART: [art] SIG.R = D77B7630DDDDADEA4722AC8F5C53E44FD45F74A96B1949E8869BB84F42241D40BE47724A3407DB01CEF9AFE77741ED71
25,220,700 UART: [art] SIG.S = 0B54222AAC68E5E14FC729F677E4B4CCD258F2A108DEE59EB63E37C04A0B9E0598D0A314FE4F4BB104188AED249C1390
26,199,447 UART: Caliptra RT
26,200,156 UART: [state] CFI Enabled
26,316,916 UART: [rt] RT listening for mailbox commands...
26,318,762 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,348,463 UART: [rt]cmd =0x46504c54, len=4
26,350,056 >>> mbox cmd response data (8 bytes)
26,351,159 UART: [rt] FIPS self test
26,352,160 UART: [kat] ++
26,352,620 UART: [kat] sha1
26,357,074 UART: [kat] SHA2-256
26,359,008 UART: [kat] SHA2-384
26,362,028 UART: [kat] SHA2-512-ACC
26,362,955 UART: Fatal Error: 0x90050001
26,398,103 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,542,957 >>> mbox cmd response: failed
26,543,583 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,688,291 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
16,976,921 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,199,444 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,805 UART: [kat] SHA2-256
881,736 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,851 UART: [kat] ++
886,003 UART: [kat] sha1
890,115 UART: [kat] SHA2-256
892,053 UART: [kat] SHA2-384
894,872 UART: [kat] SHA2-512-ACC
896,773 UART: [kat] ECC-384
902,636 UART: [kat] HMAC-384Kdf
907,358 UART: [kat] LMS
1,475,554 UART: [kat] --
1,476,273 UART: [cold-reset] ++
1,476,767 UART: [fht] Storing FHT @ 0x50003400
1,479,410 UART: [idev] ++
1,479,578 UART: [idev] CDI.KEYID = 6
1,479,938 UART: [idev] SUBJECT.KEYID = 7
1,480,362 UART: [idev] UDS.KEYID = 0
1,480,707 ready_for_fw is high
1,480,707 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,340 UART: [idev] Erasing UDS.KEYID = 0
1,504,862 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,292 UART: [idev] --
1,514,381 UART: [ldev] ++
1,514,549 UART: [ldev] CDI.KEYID = 6
1,514,912 UART: [ldev] SUBJECT.KEYID = 5
1,515,338 UART: [ldev] AUTHORITY.KEYID = 7
1,515,801 UART: [ldev] FE.KEYID = 1
1,520,767 UART: [ldev] Erasing FE.KEYID = 1
1,545,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,796 UART: [ldev] --
1,585,167 UART: [fwproc] Waiting for Commands...
1,585,910 UART: [fwproc] Received command 0x46574c44
1,586,701 UART: [fwproc] Received Image of size 115304 bytes
2,896,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,964 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,727 >>> mbox cmd response: success
3,091,831 UART: [afmc] ++
3,091,999 UART: [afmc] CDI.KEYID = 6
3,092,361 UART: [afmc] SUBJECT.KEYID = 7
3,092,786 UART: [afmc] AUTHORITY.KEYID = 5
3,128,091 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,151 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,931 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,659 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,544 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,234 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,021 UART: [afmc] --
3,170,939 UART: [cold-reset] --
3,171,909 UART: [state] Locking Datavault
3,172,976 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,580 UART: [state] Locking ICCM
3,174,072 UART: [exit] Launching FMC @ 0x40000130
3,179,401 UART:
3,179,417 UART: Running Caliptra FMC ...
3,179,825 UART:
3,179,879 UART: [state] CFI Enabled
3,190,132 UART: [fht] FMC Alias Private Key: 7
3,298,411 UART: [art] Extend RT PCRs Done
3,298,839 UART: [art] Lock RT PCRs Done
3,300,589 UART: [art] Populate DV Done
3,308,616 UART: [fht] FMC Alias Private Key: 7
3,309,656 UART: [art] Derive CDI
3,309,936 UART: [art] Store in in slot 0x4
3,395,363 UART: [art] Derive Key Pair
3,395,723 UART: [art] Store priv key in slot 0x5
3,408,947 UART: [art] Derive Key Pair - Done
3,423,730 UART: [art] Signing Cert with AUTHO
3,424,210 UART: RITY.KEYID = 7
3,438,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,697 UART: [art] PUB.X = CFF53CA0C670B1AB949F7BD1C78E6BD2D3D79F9D50A8BA4831BF8E4B3ED6D2891ED460BB2A025854487DC47D0274C629
3,446,477 UART: [art] PUB.Y = 96B72A7B09123CC136D5B0CC2DAB17E189F64E2C1E68A12F9498E343F1C912564C9581B6B97F6D297403C4A183DEAA04
3,453,422 UART: [art] SIG.R = 1E16CB8C6ADF4A1914E0EC1842FFB1C53F507CBA74F98BD682F647582ADFC6D8ADEEFD0C894D02B55BF701245E1DFED0
3,460,209 UART: [art] SIG.S = 5BBC836940E5403979D3FC8B80F1C44F8552F1B56FB237AC75FD9F9DF166D6EADB3F221215AA2880ACB2F7EA81F3BB37
3,483,310 UART: Caliptra RT
3,483,563 UART: [state] CFI Enabled
3,591,419 UART: [rt] RT listening for mailbox commands...
3,592,082 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,777 UART: [rt]cmd =0x46504c54, len=4
3,622,834 >>> mbox cmd response data (8 bytes)
3,623,003 UART: [rt] FIPS self test
3,623,331 UART: [kat] ++
3,623,483 UART: [kat] sha1
3,627,723 UART: [kat] SHA2-256
3,629,745 UART: [kat] SHA2-384
3,632,798 UART: [kat] SHA2-512-ACC
3,633,428 UART: Fatal Error: 0x90050001
3,634,978 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,983 >>> mbox cmd response: failed
3,634,983 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,634,988 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
85,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,571 UART: [kat] SHA2-256
881,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,617 UART: [kat] ++
885,769 UART: [kat] sha1
890,041 UART: [kat] SHA2-256
891,979 UART: [kat] SHA2-384
894,544 UART: [kat] SHA2-512-ACC
896,445 UART: [kat] ECC-384
901,840 UART: [kat] HMAC-384Kdf
906,228 UART: [kat] LMS
1,474,424 UART: [kat] --
1,475,241 UART: [cold-reset] ++
1,475,805 UART: [fht] Storing FHT @ 0x50003400
1,478,680 UART: [idev] ++
1,478,848 UART: [idev] CDI.KEYID = 6
1,479,208 UART: [idev] SUBJECT.KEYID = 7
1,479,632 UART: [idev] UDS.KEYID = 0
1,479,977 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,712 UART: [idev] Erasing UDS.KEYID = 0
1,504,320 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,810 UART: [idev] --
1,513,889 UART: [ldev] ++
1,514,057 UART: [ldev] CDI.KEYID = 6
1,514,420 UART: [ldev] SUBJECT.KEYID = 5
1,514,846 UART: [ldev] AUTHORITY.KEYID = 7
1,515,309 UART: [ldev] FE.KEYID = 1
1,520,391 UART: [ldev] Erasing FE.KEYID = 1
1,545,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,614 UART: [ldev] --
1,584,989 UART: [fwproc] Waiting for Commands...
1,585,618 UART: [fwproc] Received command 0x46574c44
1,586,409 UART: [fwproc] Received Image of size 115304 bytes
2,895,910 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,892 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,244 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,479 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,023 ready_for_fw is high
1,362,023 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,027 >>> mbox cmd response: success
3,003,127 UART:
3,003,143 UART: Running Caliptra FMC ...
3,003,551 UART:
3,003,605 UART: [state] CFI Enabled
3,014,166 UART: [fht] FMC Alias Private Key: 7
3,122,373 UART: [art] Extend RT PCRs Done
3,122,801 UART: [art] Lock RT PCRs Done
3,124,551 UART: [art] Populate DV Done
3,132,668 UART: [fht] FMC Alias Private Key: 7
3,133,738 UART: [art] Derive CDI
3,134,018 UART: [art] Store in in slot 0x4
3,219,589 UART: [art] Derive Key Pair
3,219,949 UART: [art] Store priv key in slot 0x5
3,232,757 UART: [art] Derive Key Pair - Done
3,247,440 UART: [art] Signing Cert with AUTHO
3,247,920 UART: RITY.KEYID = 7
3,263,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,781 UART: [art] PUB.X = B01D9096A36F1B77B987BA1481EF361648F2062B317C40F1E64E5ECD0DF9E9A7C95AED972C5C90463BAAFB3C71FA9C20
3,270,559 UART: [art] PUB.Y = F8177D5ADEF28C50B72E152AE32F6A89CA26198F3E36BB8B99B2BF42D6E05DE172DC22BD59AA9284A95AC3BF64937A11
3,277,525 UART: [art] SIG.R = D97C12C557C73EB4CF8AF6E86562F7C28DCD92368DBAD3C75CE4513569B7A68E37286E5E1485E3CFC2ADD14427D20DC3
3,284,306 UART: [art] SIG.S = EEE095E61DB74A680953887D9F9F523DC1E31F9E4F6C3885FC188A960B35A67615386A13521282D417795225A54BA35D
3,308,497 UART: Caliptra RT
3,308,750 UART: [state] CFI Enabled
3,417,686 UART: [rt] RT listening for mailbox commands...
3,418,349 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,342 UART: [rt]cmd =0x46504c54, len=4
3,449,531 >>> mbox cmd response data (8 bytes)
3,449,870 UART: [rt] FIPS self test
3,450,198 UART: [kat] ++
3,450,350 UART: [kat] sha1
3,454,646 UART: [kat] SHA2-256
3,456,668 UART: [kat] SHA2-384
3,459,453 UART: [kat] SHA2-512-ACC
3,460,097 UART: Fatal Error: 0x90050001
3,461,647 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,652 >>> mbox cmd response: failed
3,461,652 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,939 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,829 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,872 UART: [kat] SHA2-256
881,803 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,918 UART: [kat] ++
886,070 UART: [kat] sha1
890,436 UART: [kat] SHA2-256
892,374 UART: [kat] SHA2-384
895,155 UART: [kat] SHA2-512-ACC
897,056 UART: [kat] ECC-384
902,727 UART: [kat] HMAC-384Kdf
907,433 UART: [kat] LMS
1,475,629 UART: [kat] --
1,476,494 UART: [cold-reset] ++
1,476,876 UART: [fht] Storing FHT @ 0x50003400
1,479,559 UART: [idev] ++
1,479,727 UART: [idev] CDI.KEYID = 6
1,480,087 UART: [idev] SUBJECT.KEYID = 7
1,480,511 UART: [idev] UDS.KEYID = 0
1,480,856 ready_for_fw is high
1,480,856 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,215 UART: [idev] Erasing UDS.KEYID = 0
1,505,513 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,259 UART: [idev] --
1,515,338 UART: [ldev] ++
1,515,506 UART: [ldev] CDI.KEYID = 6
1,515,869 UART: [ldev] SUBJECT.KEYID = 5
1,516,295 UART: [ldev] AUTHORITY.KEYID = 7
1,516,758 UART: [ldev] FE.KEYID = 1
1,522,178 UART: [ldev] Erasing FE.KEYID = 1
1,548,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,273 UART: [ldev] --
1,587,578 UART: [fwproc] Waiting for Commands...
1,588,393 UART: [fwproc] Received command 0x46574c44
1,589,184 UART: [fwproc] Received Image of size 115304 bytes
2,898,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,655 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,955,007 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,092,324 >>> mbox cmd response: success
3,093,460 UART: [afmc] ++
3,093,628 UART: [afmc] CDI.KEYID = 6
3,093,990 UART: [afmc] SUBJECT.KEYID = 7
3,094,415 UART: [afmc] AUTHORITY.KEYID = 5
3,129,518 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,408 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,136 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,021 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,711 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,584 UART: [afmc] --
3,172,608 UART: [cold-reset] --
3,173,260 UART: [state] Locking Datavault
3,174,471 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,075 UART: [state] Locking ICCM
3,175,609 UART: [exit] Launching FMC @ 0x40000130
3,180,938 UART:
3,180,954 UART: Running Caliptra FMC ...
3,181,362 UART:
3,181,505 UART: [state] CFI Enabled
3,192,180 UART: [fht] FMC Alias Private Key: 7
3,299,923 UART: [art] Extend RT PCRs Done
3,300,351 UART: [art] Lock RT PCRs Done
3,301,823 UART: [art] Populate DV Done
3,310,016 UART: [fht] FMC Alias Private Key: 7
3,311,062 UART: [art] Derive CDI
3,311,342 UART: [art] Store in in slot 0x4
3,397,303 UART: [art] Derive Key Pair
3,397,663 UART: [art] Store priv key in slot 0x5
3,411,245 UART: [art] Derive Key Pair - Done
3,425,744 UART: [art] Signing Cert with AUTHO
3,426,224 UART: RITY.KEYID = 7
3,441,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,371 UART: [art] PUB.X = 2BE3834BA73A5A9CFBE8BF67CB11D0B9FD89C6B84C6E17DDE60186DE1805F5BC1E7DBA0100C5E227756BC560FF8E40DC
3,449,134 UART: [art] PUB.Y = F472708C2330666D1A5346B87FEC43A7CA4D22B7FC865C60868C87C061E2BC860AEAB2AE11B94678C227733B342E3CF2
3,456,085 UART: [art] SIG.R = C67FFD321D36BA5F34EABE7D142F54CCA7BA7B4DFCF53C8FFB4AEAE85081B29C2246CE285294D0A7C717661F37BF4990
3,462,877 UART: [art] SIG.S = F5EC5F24E6AA69DDC6AD51459E87681BDC85500B1A586E67EB5EA5E3215F5473D22FF9E639BD83D6295BAF68CB979D71
3,486,915 UART: Caliptra RT
3,487,260 UART: [state] CFI Enabled
3,595,790 UART: [rt] RT listening for mailbox commands...
3,596,453 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,534 UART: [rt]cmd =0x46504c54, len=4
3,627,709 >>> mbox cmd response data (8 bytes)
3,627,936 UART: [rt] FIPS self test
3,628,264 UART: [kat] ++
3,628,416 UART: [kat] sha1
3,632,688 UART: [kat] SHA2-256
3,634,710 UART: [kat] SHA2-384
3,637,627 UART: [kat] SHA2-512-ACC
3,638,179 UART: Fatal Error: 0x90050001
3,639,729 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,734 >>> mbox cmd response: failed
3,639,734 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,639,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,278 UART: [kat] SHA2-256
882,209 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,324 UART: [kat] ++
886,476 UART: [kat] sha1
890,674 UART: [kat] SHA2-256
892,612 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
902,913 UART: [kat] HMAC-384Kdf
907,515 UART: [kat] LMS
1,475,711 UART: [kat] --
1,476,832 UART: [cold-reset] ++
1,477,310 UART: [fht] Storing FHT @ 0x50003400
1,480,049 UART: [idev] ++
1,480,217 UART: [idev] CDI.KEYID = 6
1,480,577 UART: [idev] SUBJECT.KEYID = 7
1,481,001 UART: [idev] UDS.KEYID = 0
1,481,346 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,077 UART: [idev] Erasing UDS.KEYID = 0
1,505,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,523 UART: [idev] --
1,515,554 UART: [ldev] ++
1,515,722 UART: [ldev] CDI.KEYID = 6
1,516,085 UART: [ldev] SUBJECT.KEYID = 5
1,516,511 UART: [ldev] AUTHORITY.KEYID = 7
1,516,974 UART: [ldev] FE.KEYID = 1
1,522,422 UART: [ldev] Erasing FE.KEYID = 1
1,547,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,805 UART: [ldev] --
1,586,238 UART: [fwproc] Waiting for Commands...
1,587,029 UART: [fwproc] Received command 0x46574c44
1,587,820 UART: [fwproc] Received Image of size 115304 bytes
2,897,507 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,333 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,685 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,030 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,740 ready_for_fw is high
1,362,740 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,134 >>> mbox cmd response: success
3,004,134 UART:
3,004,150 UART: Running Caliptra FMC ...
3,004,558 UART:
3,004,701 UART: [state] CFI Enabled
3,015,470 UART: [fht] FMC Alias Private Key: 7
3,123,399 UART: [art] Extend RT PCRs Done
3,123,827 UART: [art] Lock RT PCRs Done
3,125,617 UART: [art] Populate DV Done
3,133,974 UART: [fht] FMC Alias Private Key: 7
3,135,076 UART: [art] Derive CDI
3,135,356 UART: [art] Store in in slot 0x4
3,221,045 UART: [art] Derive Key Pair
3,221,405 UART: [art] Store priv key in slot 0x5
3,234,243 UART: [art] Derive Key Pair - Done
3,248,735 UART: [art] Signing Cert with AUTHO
3,249,215 UART: RITY.KEYID = 7
3,263,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,686 UART: [art] PUB.X = 4FC34B03B829068EE80739FCCF5F80970A5F88FC5FFF7B69F4B98F5DD5DC3EDCE888C86A558DD42461DC4850682C54FA
3,271,460 UART: [art] PUB.Y = 1DD1B4A9E5EF121E24742F8635CA97C799A4CEE1FFA1B561474E725282629F76ACEEADACDF6F6E917771B7B0B6931A40
3,278,424 UART: [art] SIG.R = F762110EFC0323EDC966481419AA7C091645561243DEAD561CAE2E6C845EDADB9EE1A03A8E7B08B01DD8715F92F2BC33
3,285,194 UART: [art] SIG.S = 29C90B091F884B08089085949A059411F14558BBFFFF60629FDA3E2F7F763439653E9E78C45058CD8CDB355B2E64DCBD
3,309,388 UART: Caliptra RT
3,309,733 UART: [state] CFI Enabled
3,417,550 UART: [rt] RT listening for mailbox commands...
3,418,213 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,034 UART: [rt]cmd =0x46504c54, len=4
3,449,101 >>> mbox cmd response data (8 bytes)
3,449,246 UART: [rt] FIPS self test
3,449,574 UART: [kat] ++
3,449,726 UART: [kat] sha1
3,453,996 UART: [kat] SHA2-256
3,456,018 UART: [kat] SHA2-384
3,459,085 UART: [kat] SHA2-512-ACC
3,459,663 UART: Fatal Error: 0x90050001
3,461,213 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,218 >>> mbox cmd response: failed
3,461,218 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,461,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,702 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,724 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,590 UART: [kat] SHA2-512-ACC
908,491 UART: [kat] ECC-384
918,392 UART: [kat] HMAC-384Kdf
923,086 UART: [kat] LMS
1,171,414 UART: [kat] --
1,172,323 UART: [cold-reset] ++
1,172,749 UART: [fht] FHT @ 0x50003400
1,175,366 UART: [idev] ++
1,175,534 UART: [idev] CDI.KEYID = 6
1,175,894 UART: [idev] SUBJECT.KEYID = 7
1,176,318 UART: [idev] UDS.KEYID = 0
1,176,663 ready_for_fw is high
1,176,663 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,188 UART: [idev] Erasing UDS.KEYID = 0
1,201,231 UART: [idev] Sha1 KeyId Algorithm
1,209,685 UART: [idev] --
1,210,763 UART: [ldev] ++
1,210,931 UART: [ldev] CDI.KEYID = 6
1,211,294 UART: [ldev] SUBJECT.KEYID = 5
1,211,720 UART: [ldev] AUTHORITY.KEYID = 7
1,212,183 UART: [ldev] FE.KEYID = 1
1,217,479 UART: [ldev] Erasing FE.KEYID = 1
1,244,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,213 UART: [ldev] --
1,283,594 UART: [fwproc] Wait for Commands...
1,284,274 UART: [fwproc] Recv command 0x46574c44
1,285,002 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,153 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,457 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,698 >>> mbox cmd response: success
2,788,858 UART: [afmc] ++
2,789,026 UART: [afmc] CDI.KEYID = 6
2,789,388 UART: [afmc] SUBJECT.KEYID = 7
2,789,813 UART: [afmc] AUTHORITY.KEYID = 5
2,825,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,019 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,632 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,351 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,311 UART: [afmc] --
2,868,327 UART: [cold-reset] --
2,869,127 UART: [state] Locking Datavault
2,870,744 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,348 UART: [state] Locking ICCM
2,871,940 UART: [exit] Launching FMC @ 0x40000130
2,877,269 UART:
2,877,285 UART: Running Caliptra FMC ...
2,877,693 UART:
2,877,747 UART: [state] CFI Enabled
2,888,028 UART: [fht] FMC Alias Private Key: 7
2,995,749 UART: [art] Extend RT PCRs Done
2,996,177 UART: [art] Lock RT PCRs Done
2,997,583 UART: [art] Populate DV Done
3,006,028 UART: [fht] FMC Alias Private Key: 7
3,007,140 UART: [art] Derive CDI
3,007,420 UART: [art] Store in in slot 0x4
3,093,003 UART: [art] Derive Key Pair
3,093,363 UART: [art] Store priv key in slot 0x5
3,106,687 UART: [art] Derive Key Pair - Done
3,121,474 UART: [art] Signing Cert with AUTHO
3,121,954 UART: RITY.KEYID = 7
3,137,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,063 UART: [art] PUB.X = 371E522C7A8EB1AE0C978B3DE8AE4CBB724CA884F9F6C3235298D5133EE67B6ACA3A15D873AD8E0C3373FF0897D76E19
3,144,838 UART: [art] PUB.Y = 75E4DCF227620D85375A5FFB89EC657FD4032A1883F31B44ACEA91B3DAF37A7641BD012B9E88A7FC3E9CF07B4B23EBCE
3,151,799 UART: [art] SIG.R = 388308B1F84BE5C8A1AA98FB71E36A032CCEE491685A8B06F02B8F0DFEB66DF9E19293FAF32DE3F90C4E2E4746B3B88A
3,158,572 UART: [art] SIG.S = 8A28688D99B9A93BA6CECE8DE3568B8F6B36EC9C114E8925E5D0A9E354DBB5E830BE298B9CECD0CD38C0498C0FC2B714
3,183,018 UART: Caliptra RT
3,183,271 UART: [state] CFI Enabled
3,291,066 UART: [rt] RT listening for mailbox commands...
3,291,729 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,506 UART: [rt]cmd =0x46504c54, len=4
3,322,433 >>> mbox cmd response data (8 bytes)
3,322,550 UART: [rt] FIPS self test
3,322,878 UART: [kat] ++
3,323,030 UART: [kat] sha1
3,327,376 UART: [kat] SHA2-256
3,329,398 UART: [kat] SHA2-384
3,332,063 UART: [kat] SHA2-512-ACC
3,332,699 UART: Fatal Error: 0x90050001
3,334,249 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,254 >>> mbox cmd response: failed
3,334,254 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,259 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
893,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,641 UART: [kat] ++
897,793 UART: [kat] sha1
901,965 UART: [kat] SHA2-256
903,905 UART: [kat] SHA2-384
906,722 UART: [kat] SHA2-512-ACC
908,623 UART: [kat] ECC-384
918,312 UART: [kat] HMAC-384Kdf
922,812 UART: [kat] LMS
1,171,140 UART: [kat] --
1,172,167 UART: [cold-reset] ++
1,172,677 UART: [fht] FHT @ 0x50003400
1,175,314 UART: [idev] ++
1,175,482 UART: [idev] CDI.KEYID = 6
1,175,842 UART: [idev] SUBJECT.KEYID = 7
1,176,266 UART: [idev] UDS.KEYID = 0
1,176,611 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,332 UART: [idev] Erasing UDS.KEYID = 0
1,201,397 UART: [idev] Sha1 KeyId Algorithm
1,209,787 UART: [idev] --
1,210,755 UART: [ldev] ++
1,210,923 UART: [ldev] CDI.KEYID = 6
1,211,286 UART: [ldev] SUBJECT.KEYID = 5
1,211,712 UART: [ldev] AUTHORITY.KEYID = 7
1,212,175 UART: [ldev] FE.KEYID = 1
1,217,629 UART: [ldev] Erasing FE.KEYID = 1
1,243,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,553 UART: [ldev] --
1,282,880 UART: [fwproc] Wait for Commands...
1,283,632 UART: [fwproc] Recv command 0x46574c44
1,284,360 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,195 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,520 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,643 ready_for_fw is high
1,060,643 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,399 >>> mbox cmd response: success
2,702,527 UART:
2,702,543 UART: Running Caliptra FMC ...
2,702,951 UART:
2,703,005 UART: [state] CFI Enabled
2,713,208 UART: [fht] FMC Alias Private Key: 7
2,820,871 UART: [art] Extend RT PCRs Done
2,821,299 UART: [art] Lock RT PCRs Done
2,822,893 UART: [art] Populate DV Done
2,831,210 UART: [fht] FMC Alias Private Key: 7
2,832,142 UART: [art] Derive CDI
2,832,422 UART: [art] Store in in slot 0x4
2,918,589 UART: [art] Derive Key Pair
2,918,949 UART: [art] Store priv key in slot 0x5
2,931,823 UART: [art] Derive Key Pair - Done
2,946,625 UART: [art] Signing Cert with AUTHO
2,947,105 UART: RITY.KEYID = 7
2,962,213 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,978 UART: [art] PUB.X = 9C675CE3FD65843FA805F33BAC2000D26B9756B82E59BAEDDEC1D5DAA519F8F036E4065485717A50D63FB585EF01D0F4
2,969,729 UART: [art] PUB.Y = DB6A0A6A46768D0CEE39F4A94DABDA45FB79ED20E1547C23B13B9E62043A1BB9F95F40607D42E5E291731F7F016A3ABE
2,976,683 UART: [art] SIG.R = 4494576627EFFB02D22B1C994F2B8110075D341968DD754A1F92F7610A1B07ADDEF6A31405172E77DF63B10716B4E2A8
2,983,433 UART: [art] SIG.S = 59BC5457909F769F80DA3C56D5E6D4B9AAFA4C19DD836FD69A1462512E4EA33B68F9930E8222EE12E3175EDC3DD57198
3,007,539 UART: Caliptra RT
3,007,792 UART: [state] CFI Enabled
3,115,957 UART: [rt] RT listening for mailbox commands...
3,116,620 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,447 UART: [rt]cmd =0x46504c54, len=4
3,147,624 >>> mbox cmd response data (8 bytes)
3,147,851 UART: [rt] FIPS self test
3,148,179 UART: [kat] ++
3,148,331 UART: [kat] sha1
3,152,645 UART: [kat] SHA2-256
3,154,667 UART: [kat] SHA2-384
3,157,374 UART: [kat] SHA2-512-ACC
3,158,026 UART: Fatal Error: 0x90050001
3,159,576 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,581 >>> mbox cmd response: failed
3,159,581 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,003 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,638,739 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,328 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
893,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,440 UART: [kat] ++
897,592 UART: [kat] sha1
901,670 UART: [kat] SHA2-256
903,610 UART: [kat] SHA2-384
906,447 UART: [kat] SHA2-512-ACC
908,348 UART: [kat] ECC-384
917,983 UART: [kat] HMAC-384Kdf
922,595 UART: [kat] LMS
1,170,923 UART: [kat] --
1,171,754 UART: [cold-reset] ++
1,172,182 UART: [fht] FHT @ 0x50003400
1,174,663 UART: [idev] ++
1,174,831 UART: [idev] CDI.KEYID = 6
1,175,191 UART: [idev] SUBJECT.KEYID = 7
1,175,615 UART: [idev] UDS.KEYID = 0
1,175,960 ready_for_fw is high
1,175,960 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,241 UART: [idev] Erasing UDS.KEYID = 0
1,200,440 UART: [idev] Sha1 KeyId Algorithm
1,208,930 UART: [idev] --
1,209,888 UART: [ldev] ++
1,210,056 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,845 UART: [ldev] AUTHORITY.KEYID = 7
1,211,308 UART: [ldev] FE.KEYID = 1
1,216,896 UART: [ldev] Erasing FE.KEYID = 1
1,244,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,726 UART: [ldev] --
1,283,111 UART: [fwproc] Wait for Commands...
1,283,905 UART: [fwproc] Recv command 0x46574c44
1,284,633 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,836 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,209 >>> mbox cmd response: success
2,789,391 UART: [afmc] ++
2,789,559 UART: [afmc] CDI.KEYID = 6
2,789,921 UART: [afmc] SUBJECT.KEYID = 7
2,790,346 UART: [afmc] AUTHORITY.KEYID = 5
2,825,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,820 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,548 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,433 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,152 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,866 UART: [afmc] --
2,868,978 UART: [cold-reset] --
2,869,874 UART: [state] Locking Datavault
2,870,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,601 UART: [state] Locking ICCM
2,872,163 UART: [exit] Launching FMC @ 0x40000130
2,877,492 UART:
2,877,508 UART: Running Caliptra FMC ...
2,877,916 UART:
2,878,059 UART: [state] CFI Enabled
2,889,008 UART: [fht] FMC Alias Private Key: 7
2,996,603 UART: [art] Extend RT PCRs Done
2,997,031 UART: [art] Lock RT PCRs Done
2,998,927 UART: [art] Populate DV Done
3,006,996 UART: [fht] FMC Alias Private Key: 7
3,008,078 UART: [art] Derive CDI
3,008,358 UART: [art] Store in in slot 0x4
3,094,109 UART: [art] Derive Key Pair
3,094,469 UART: [art] Store priv key in slot 0x5
3,107,969 UART: [art] Derive Key Pair - Done
3,122,815 UART: [art] Signing Cert with AUTHO
3,123,295 UART: RITY.KEYID = 7
3,138,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,506 UART: [art] PUB.X = CA7225739FB51961D3F3BD43C3B0419E1CAB7C243B1985749F4DE4DC7DA7A526F734EF65012D782D55635E6D95F41EE1
3,146,279 UART: [art] PUB.Y = 3AB4854BBD8F558986AA40B10A39CCFC6506058DAB46DEA9C1EB90C237C4F6EC72BDA122ED9024AF5E14118540873FBF
3,153,236 UART: [art] SIG.R = 817D686E12CDE28C0BE32EF6D263D2A21FCB220A2026502DF763977B5A5D407FF0420BCD077ADCDCEBD34C527AA94C3C
3,160,012 UART: [art] SIG.S = 857CAC861F894A1DAD049E84EAC47590EE5D19B24B4108BC18B4AA44DA3E97A44EB66F7B09A12691DE2F10317AE31AA4
3,183,838 UART: Caliptra RT
3,184,183 UART: [state] CFI Enabled
3,292,305 UART: [rt] RT listening for mailbox commands...
3,292,968 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,865 UART: [rt]cmd =0x46504c54, len=4
3,323,868 >>> mbox cmd response data (8 bytes)
3,324,003 UART: [rt] FIPS self test
3,324,331 UART: [kat] ++
3,324,483 UART: [kat] sha1
3,328,589 UART: [kat] SHA2-256
3,330,611 UART: [kat] SHA2-384
3,333,440 UART: [kat] SHA2-512-ACC
3,333,944 UART: Fatal Error: 0x90050001
3,335,494 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,499 >>> mbox cmd response: failed
3,335,499 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
902,000 UART: [kat] SHA2-256
903,940 UART: [kat] SHA2-384
906,597 UART: [kat] SHA2-512-ACC
908,498 UART: [kat] ECC-384
918,037 UART: [kat] HMAC-384Kdf
922,509 UART: [kat] LMS
1,170,837 UART: [kat] --
1,171,350 UART: [cold-reset] ++
1,171,730 UART: [fht] FHT @ 0x50003400
1,174,251 UART: [idev] ++
1,174,419 UART: [idev] CDI.KEYID = 6
1,174,779 UART: [idev] SUBJECT.KEYID = 7
1,175,203 UART: [idev] UDS.KEYID = 0
1,175,548 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,007 UART: [idev] Erasing UDS.KEYID = 0
1,200,204 UART: [idev] Sha1 KeyId Algorithm
1,208,612 UART: [idev] --
1,209,834 UART: [ldev] ++
1,210,002 UART: [ldev] CDI.KEYID = 6
1,210,365 UART: [ldev] SUBJECT.KEYID = 5
1,210,791 UART: [ldev] AUTHORITY.KEYID = 7
1,211,254 UART: [ldev] FE.KEYID = 1
1,216,768 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,070 UART: [ldev] --
1,281,333 UART: [fwproc] Wait for Commands...
1,281,923 UART: [fwproc] Recv command 0x46574c44
1,282,651 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,894 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,127 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,708 ready_for_fw is high
1,060,708 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,372 >>> mbox cmd response: success
2,702,592 UART:
2,702,608 UART: Running Caliptra FMC ...
2,703,016 UART:
2,703,159 UART: [state] CFI Enabled
2,713,818 UART: [fht] FMC Alias Private Key: 7
2,821,201 UART: [art] Extend RT PCRs Done
2,821,629 UART: [art] Lock RT PCRs Done
2,822,973 UART: [art] Populate DV Done
2,831,438 UART: [fht] FMC Alias Private Key: 7
2,832,398 UART: [art] Derive CDI
2,832,678 UART: [art] Store in in slot 0x4
2,918,045 UART: [art] Derive Key Pair
2,918,405 UART: [art] Store priv key in slot 0x5
2,932,193 UART: [art] Derive Key Pair - Done
2,946,787 UART: [art] Signing Cert with AUTHO
2,947,267 UART: RITY.KEYID = 7
2,962,743 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,508 UART: [art] PUB.X = 03C93697F451390A49AB9E10EA4CE0B9868FA8736123E923301340AD82861D7AE17A926AACA11338CC74438BC2B9E8A7
2,970,272 UART: [art] PUB.Y = F81711C36FEB8476C6DCF4A31ADC1F9DCC473047379662B1240CDD10A1B29694B35CD449A21F0CC0F7956BA78863D0CC
2,977,226 UART: [art] SIG.R = 470E1F980BCA8330A66698529EE3E401680E571FE904D45EF559E5B16C355244E25EC4706F5BE9548CE03AAB112D10AB
2,983,983 UART: [art] SIG.S = DB54796FB3B8C9E2F8D0422508A4996C324B68E673B8610D041E15D7787B7AC56FD60FB718DF2282052E7C47A65F198F
3,007,749 UART: Caliptra RT
3,008,094 UART: [state] CFI Enabled
3,116,307 UART: [rt] RT listening for mailbox commands...
3,116,970 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,607 UART: [rt]cmd =0x46504c54, len=4
3,147,658 >>> mbox cmd response data (8 bytes)
3,147,977 UART: [rt] FIPS self test
3,148,305 UART: [kat] ++
3,148,457 UART: [kat] sha1
3,152,805 UART: [kat] SHA2-256
3,154,827 UART: [kat] SHA2-384
3,157,834 UART: [kat] SHA2-512-ACC
3,158,406 UART: Fatal Error: 0x90050001
3,159,956 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,961 >>> mbox cmd response: failed
3,159,961 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,908 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,896 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
905,014 UART: [kat] SHA2-512-ACC
906,915 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,836 UART: [kat] LMS
1,169,148 UART: [kat] --
1,170,005 UART: [cold-reset] ++
1,170,439 UART: [fht] FHT @ 0x50003400
1,173,081 UART: [idev] ++
1,173,249 UART: [idev] CDI.KEYID = 6
1,173,610 UART: [idev] SUBJECT.KEYID = 7
1,174,035 UART: [idev] UDS.KEYID = 0
1,174,381 ready_for_fw is high
1,174,381 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,035 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,207,961 UART: [idev] --
1,208,946 UART: [ldev] ++
1,209,114 UART: [ldev] CDI.KEYID = 6
1,209,478 UART: [ldev] SUBJECT.KEYID = 5
1,209,905 UART: [ldev] AUTHORITY.KEYID = 7
1,210,368 UART: [ldev] FE.KEYID = 1
1,215,440 UART: [ldev] Erasing FE.KEYID = 1
1,241,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,088 UART: [ldev] --
1,281,486 UART: [fwproc] Wait for Commands...
1,282,285 UART: [fwproc] Recv command 0x46574c44
1,283,018 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,566 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,804 >>> mbox cmd response: success
2,788,063 UART: [afmc] ++
2,788,231 UART: [afmc] CDI.KEYID = 6
2,788,594 UART: [afmc] SUBJECT.KEYID = 7
2,789,020 UART: [afmc] AUTHORITY.KEYID = 5
2,824,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,588 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,022 UART: [afmc] --
2,866,984 UART: [cold-reset] --
2,867,948 UART: [state] Locking Datavault
2,869,167 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,771 UART: [state] Locking ICCM
2,870,285 UART: [exit] Launching FMC @ 0x40000130
2,875,614 UART:
2,875,630 UART: Running Caliptra FMC ...
2,876,038 UART:
2,876,092 UART: [state] CFI Enabled
2,886,979 UART: [fht] FMC Alias Private Key: 7
2,994,872 UART: [art] Extend RT PCRs Done
2,995,300 UART: [art] Lock RT PCRs Done
2,997,028 UART: [art] Populate DV Done
3,005,265 UART: [fht] FMC Alias Private Key: 7
3,006,397 UART: [art] Derive CDI
3,006,677 UART: [art] Store in in slot 0x4
3,092,454 UART: [art] Derive Key Pair
3,092,814 UART: [art] Store priv key in slot 0x5
3,106,234 UART: [art] Derive Key Pair - Done
3,121,018 UART: [art] Signing Cert with AUTHO
3,121,498 UART: RITY.KEYID = 7
3,136,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,265 UART: [art] PUB.X = 88728AB74F0DE41ED11AC80A8292C5C326FFCC4007E0916E134FA457AD9762B6B808442F3447F48848B0CA0B2DA2D42C
3,144,026 UART: [art] PUB.Y = 1E47254093AD8ABC89799BA393C02AA366B6282AD09E42FBEB8338EFAF117330DBA12BACD65D909DCE344EF802FDAE09
3,150,988 UART: [art] SIG.R = 3A736DB19B9D8DB7C5B66B22947D38581FF6D2E4D18F3EB129685F9586A875D89AA8E3D8467123E36EE10D78BAA241A1
3,157,761 UART: [art] SIG.S = 354D95B860280325099CFF785477569E8177A32D68AFDD74A2F0A3E3CBF7C1EE3E0D73C8FB46EDFCD7460B9B1D86EF40
3,181,668 UART: Caliptra RT
3,181,921 UART: [state] CFI Enabled
3,289,406 UART: [rt] RT listening for mailbox commands...
3,290,069 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,698 UART: [rt]cmd =0x46504c54, len=4
3,320,851 >>> mbox cmd response data (8 bytes)
3,321,058 UART: [rt] FIPS self test
3,321,386 UART: [kat] ++
3,321,538 UART: [kat] sha1
3,325,742 UART: [kat] SHA2-256
3,327,764 UART: [kat] SHA2-384
3,330,673 UART: [kat] SHA2-512-ACC
3,331,361 UART: Fatal Error: 0x90050001
3,332,911 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,916 >>> mbox cmd response: failed
3,332,916 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,921 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,691 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,659 UART: [idev] ++
1,172,827 UART: [idev] CDI.KEYID = 6
1,173,188 UART: [idev] SUBJECT.KEYID = 7
1,173,613 UART: [idev] UDS.KEYID = 0
1,173,959 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,711 UART: [idev] Erasing UDS.KEYID = 0
1,198,841 UART: [idev] Sha1 KeyId Algorithm
1,207,721 UART: [idev] --
1,208,802 UART: [ldev] ++
1,208,970 UART: [ldev] CDI.KEYID = 6
1,209,334 UART: [ldev] SUBJECT.KEYID = 5
1,209,761 UART: [ldev] AUTHORITY.KEYID = 7
1,210,224 UART: [ldev] FE.KEYID = 1
1,215,424 UART: [ldev] Erasing FE.KEYID = 1
1,241,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,022 UART: [ldev] --
1,281,500 UART: [fwproc] Wait for Commands...
1,282,247 UART: [fwproc] Recv command 0x46574c44
1,282,980 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,587 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,896 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,242 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,014 ready_for_fw is high
1,055,014 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,633,904 >>> mbox cmd response: success
2,696,596 UART:
2,696,612 UART: Running Caliptra FMC ...
2,697,020 UART:
2,697,074 UART: [state] CFI Enabled
2,707,141 UART: [fht] FMC Alias Private Key: 7
2,814,664 UART: [art] Extend RT PCRs Done
2,815,092 UART: [art] Lock RT PCRs Done
2,816,464 UART: [art] Populate DV Done
2,824,445 UART: [fht] FMC Alias Private Key: 7
2,825,397 UART: [art] Derive CDI
2,825,677 UART: [art] Store in in slot 0x4
2,911,054 UART: [art] Derive Key Pair
2,911,414 UART: [art] Store priv key in slot 0x5
2,924,670 UART: [art] Derive Key Pair - Done
2,939,471 UART: [art] Signing Cert with AUTHO
2,939,951 UART: RITY.KEYID = 7
2,955,137 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,902 UART: [art] PUB.X = 0CA94533DE06252CA6ADA269BDCC63241E73166A09BCC5C4477A1DCCA9DE82E6CDD8F5B14DD2E26D7C1E6590BB736634
2,962,681 UART: [art] PUB.Y = FEC20CFEE4643C5FBBCC750567EEB7173785FB964BE3F20FA44F602893E5178FF262BFD3224410879C914A4E6A0559F1
2,969,627 UART: [art] SIG.R = 96E65A01BCEFE567DC480CADF0216449069B8AD7F20DA4F196C5AC87EDD3345E65B79DD1069A2801A0B27AC7DCDBAAAE
2,976,403 UART: [art] SIG.S = BBA46B98E10E13DEEF11A46BFBE5D568E30C31E998E0E66A553E2598CA88BB83FF96C25BFA721C80399EBDD63C04B7D6
3,000,927 UART: Caliptra RT
3,001,180 UART: [state] CFI Enabled
3,108,540 UART: [rt] RT listening for mailbox commands...
3,109,203 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,082 UART: [rt]cmd =0x46504c54, len=4
3,140,305 >>> mbox cmd response data (8 bytes)
3,140,668 UART: [rt] FIPS self test
3,140,996 UART: [kat] ++
3,141,148 UART: [kat] sha1
3,145,478 UART: [kat] SHA2-256
3,147,500 UART: [kat] SHA2-384
3,150,159 UART: [kat] SHA2-512-ACC
3,150,797 UART: Fatal Error: 0x90050001
3,152,347 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,352 >>> mbox cmd response: failed
3,152,352 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,182 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,204 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
921,019 UART: [kat] LMS
1,169,331 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,468 UART: [idev] ++
1,173,636 UART: [idev] CDI.KEYID = 6
1,173,997 UART: [idev] SUBJECT.KEYID = 7
1,174,422 UART: [idev] UDS.KEYID = 0
1,174,768 ready_for_fw is high
1,174,768 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,138 UART: [idev] Erasing UDS.KEYID = 0
1,199,240 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,149 UART: [ldev] ++
1,209,317 UART: [ldev] CDI.KEYID = 6
1,209,681 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,215,983 UART: [ldev] Erasing FE.KEYID = 1
1,242,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,149 UART: [ldev] --
1,281,609 UART: [fwproc] Wait for Commands...
1,282,282 UART: [fwproc] Recv command 0x46574c44
1,283,015 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,649 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,895 >>> mbox cmd response: success
2,788,130 UART: [afmc] ++
2,788,298 UART: [afmc] CDI.KEYID = 6
2,788,661 UART: [afmc] SUBJECT.KEYID = 7
2,789,087 UART: [afmc] AUTHORITY.KEYID = 5
2,825,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,269 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,998 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,881 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,600 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,589 UART: [afmc] --
2,868,599 UART: [cold-reset] --
2,869,529 UART: [state] Locking Datavault
2,870,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,406 UART: [state] Locking ICCM
2,871,826 UART: [exit] Launching FMC @ 0x40000130
2,877,155 UART:
2,877,171 UART: Running Caliptra FMC ...
2,877,579 UART:
2,877,722 UART: [state] CFI Enabled
2,888,607 UART: [fht] FMC Alias Private Key: 7
2,996,700 UART: [art] Extend RT PCRs Done
2,997,128 UART: [art] Lock RT PCRs Done
2,998,560 UART: [art] Populate DV Done
3,006,773 UART: [fht] FMC Alias Private Key: 7
3,007,783 UART: [art] Derive CDI
3,008,063 UART: [art] Store in in slot 0x4
3,094,132 UART: [art] Derive Key Pair
3,094,492 UART: [art] Store priv key in slot 0x5
3,107,572 UART: [art] Derive Key Pair - Done
3,122,349 UART: [art] Signing Cert with AUTHO
3,122,829 UART: RITY.KEYID = 7
3,137,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,334 UART: [art] PUB.X = 28D339657965F4126D2FF2C28E17B42BAA3DD7E4E5CC66713937EAD3E9E0163B6362C8C48541E21072AB883A07EA39F2
3,145,103 UART: [art] PUB.Y = 0ED4492DCD5464B6A17717ACA24E98B52EC2FF9F2547C755904A9951B26F8253663EE5CA71C670D746C50974B690DA48
3,152,047 UART: [art] SIG.R = 1445170750F11248E0F41B9080FBB38D53694881D4BE99D0C6213A4FB26320248F6486AA52B5245EBE16BC01487CF687
3,158,803 UART: [art] SIG.S = 0B0BCC1D1D471D5B1EDE19F0E6CF969193C2841541B660255097F67B6E0034BBDE615FA269D79C8C417229E7E4FFBC19
3,182,568 UART: Caliptra RT
3,182,913 UART: [state] CFI Enabled
3,291,536 UART: [rt] RT listening for mailbox commands...
3,292,199 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,952 UART: [rt]cmd =0x46504c54, len=4
3,323,257 >>> mbox cmd response data (8 bytes)
3,323,490 UART: [rt] FIPS self test
3,323,818 UART: [kat] ++
3,323,970 UART: [kat] sha1
3,328,152 UART: [kat] SHA2-256
3,330,174 UART: [kat] SHA2-384
3,333,023 UART: [kat] SHA2-512-ACC
3,333,701 UART: Fatal Error: 0x90050001
3,335,251 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,256 >>> mbox cmd response: failed
3,335,256 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,902 UART: [kat] ++
896,054 UART: [kat] sha1
900,326 UART: [kat] SHA2-256
902,266 UART: [kat] SHA2-384
905,047 UART: [kat] SHA2-512-ACC
906,948 UART: [kat] ECC-384
916,881 UART: [kat] HMAC-384Kdf
921,335 UART: [kat] LMS
1,169,647 UART: [kat] --
1,170,434 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,522 UART: [idev] ++
1,173,690 UART: [idev] CDI.KEYID = 6
1,174,051 UART: [idev] SUBJECT.KEYID = 7
1,174,476 UART: [idev] UDS.KEYID = 0
1,174,822 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,404 UART: [idev] Erasing UDS.KEYID = 0
1,200,078 UART: [idev] Sha1 KeyId Algorithm
1,209,098 UART: [idev] --
1,210,177 UART: [ldev] ++
1,210,345 UART: [ldev] CDI.KEYID = 6
1,210,709 UART: [ldev] SUBJECT.KEYID = 5
1,211,136 UART: [ldev] AUTHORITY.KEYID = 7
1,211,599 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,243,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,719 UART: [ldev] --
1,283,099 UART: [fwproc] Wait for Commands...
1,283,840 UART: [fwproc] Recv command 0x46574c44
1,284,573 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,001 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,369 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,843 ready_for_fw is high
1,056,843 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,321 >>> mbox cmd response: success
2,698,675 UART:
2,698,691 UART: Running Caliptra FMC ...
2,699,099 UART:
2,699,242 UART: [state] CFI Enabled
2,710,107 UART: [fht] FMC Alias Private Key: 7
2,818,874 UART: [art] Extend RT PCRs Done
2,819,302 UART: [art] Lock RT PCRs Done
2,821,054 UART: [art] Populate DV Done
2,829,423 UART: [fht] FMC Alias Private Key: 7
2,830,365 UART: [art] Derive CDI
2,830,645 UART: [art] Store in in slot 0x4
2,916,082 UART: [art] Derive Key Pair
2,916,442 UART: [art] Store priv key in slot 0x5
2,929,150 UART: [art] Derive Key Pair - Done
2,944,129 UART: [art] Signing Cert with AUTHO
2,944,609 UART: RITY.KEYID = 7
2,959,853 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,618 UART: [art] PUB.X = E0352B16DC882941CDC5A73464E57205A83DCFF38DEA0E34BF126786F385FB569E63BC9E1903E57BFE462B268277CC38
2,967,385 UART: [art] PUB.Y = B9B7FED6590E6D2304BF822A60CCA5E74E088FC5A2D0CB930003105AFF270CC584F71DD02DC7B484AF7299CBB89A91FC
2,974,316 UART: [art] SIG.R = 34C500929B7EBD4C416FE0F6DCF8670D7F5A0DE26FE44A7A07A89172A47AEC4A454E11BED95BB2366D161BDF4282D864
2,981,069 UART: [art] SIG.S = 6FF5BF63A2159719D3A5C7C4B1C67C3E888F155D01DC1A0E62A77723AC8C2150914670C199E2C9F8365BEEFD8EC03CFD
3,004,302 UART: Caliptra RT
3,004,647 UART: [state] CFI Enabled
3,112,000 UART: [rt] RT listening for mailbox commands...
3,112,663 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,420 UART: [rt]cmd =0x46504c54, len=4
3,143,509 >>> mbox cmd response data (8 bytes)
3,143,792 UART: [rt] FIPS self test
3,144,120 UART: [kat] ++
3,144,272 UART: [kat] sha1
3,148,492 UART: [kat] SHA2-256
3,150,514 UART: [kat] SHA2-384
3,153,255 UART: [kat] SHA2-512-ACC
3,153,935 UART: Fatal Error: 0x90050001
3,155,485 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,490 >>> mbox cmd response: failed
3,155,490 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,011 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,623 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
2,687,088 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,831,308 >>> mbox cmd response: failed
2,831,872 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,975,212 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
4,865,162 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,425,510 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,680,008 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,824,239 >>> mbox cmd response: failed
2,824,817 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,968,154 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,872,352 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,460,718 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,035,295 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,179,690 >>> mbox cmd response: failed
3,180,274 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,323,642 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
21,580,922 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,015,351 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,039,128 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,183,267 >>> mbox cmd response: failed
3,183,823 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,327,151 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
21,587,279 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,033,423 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
2,699,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,844,051 >>> mbox cmd response: failed
2,844,621 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,988,411 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,437,655 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,263,752 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,686,264 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,830,886 >>> mbox cmd response: failed
2,831,451 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,975,408 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,427,740 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,235,822 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,547 writing to cptra_bootfsm_go
3,047,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,192,654 >>> mbox cmd response: failed
3,193,236 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,336,814 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,170,474 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,914,742 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
3,045,351 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,190,736 >>> mbox cmd response: failed
3,191,324 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,335,086 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
20,175,105 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,925,834 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,704,602 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,849,223 >>> mbox cmd response: failed
2,849,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,993,603 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,436,242 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,250,168 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,054,387 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,198,959 >>> mbox cmd response: failed
3,199,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,343,269 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,180,247 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,892,063 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,806 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,814 >>> mbox cmd response: failed
809,814 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,820 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,557 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,216 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,184 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,192 >>> mbox cmd response: failed
809,192 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,203 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,304 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,455 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,463 >>> mbox cmd response: failed
810,463 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,649,035 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,263 >>> mbox cmd response: failed
810,263 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,269 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,362 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,673 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,764 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,772 >>> mbox cmd response: failed
809,772 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,647 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,682 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,102 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,110 >>> mbox cmd response: failed
810,110 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,612 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,863 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,871 >>> mbox cmd response: failed
809,871 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,552 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,651,005 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,947 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,955 >>> mbox cmd response: failed
809,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,360 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,149 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,040 >>> mbox cmd response: failed
810,040 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,779 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,396 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,560 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,568 >>> mbox cmd response: failed
809,568 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,574 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,431 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,418 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,039 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,047 >>> mbox cmd response: failed
810,047 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
810,053 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,840 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,969 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,937 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,945 >>> mbox cmd response: failed
809,945 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
809,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,566 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,233 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,037 UART:
192,412 UART: Running Caliptra ROM ...
193,552 UART:
193,701 UART: [state] CFI Enabled
264,829 UART: [state] LifecycleState = Unprovisioned
266,820 UART: [state] DebugLocked = No
269,649 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,312 UART: [kat] SHA2-256
445,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,517 UART: [kat] ++
456,002 UART: [kat] sha1
466,106 UART: [kat] SHA2-256
468,769 UART: [kat] SHA2-384
474,408 UART: [kat] SHA2-512-ACC
476,801 UART: [kat] ECC-384
2,767,843 UART: [kat] HMAC-384Kdf
2,780,257 UART: [kat] LMS
3,970,591 UART: [kat] --
3,975,316 UART: [cold-reset] ++
3,977,750 UART: [fht] Storing FHT @ 0x50003400
3,989,240 UART: [idev] ++
3,989,815 UART: [idev] CDI.KEYID = 6
3,990,805 UART: [idev] SUBJECT.KEYID = 7
3,991,926 UART: [idev] UDS.KEYID = 0
3,993,005 ready_for_fw is high
3,993,230 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,137,854 UART: [idev] Erasing UDS.KEYID = 0
7,325,943 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,098 UART: [idev] --
7,351,479 UART: [ldev] ++
7,352,077 UART: [ldev] CDI.KEYID = 6
7,353,026 UART: [ldev] SUBJECT.KEYID = 5
7,354,254 UART: [ldev] AUTHORITY.KEYID = 7
7,355,493 UART: [ldev] FE.KEYID = 1
7,403,521 UART: [ldev] Erasing FE.KEYID = 1
10,734,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,823 UART: [ldev] --
13,099,405 UART: [fwproc] Waiting for Commands...
13,101,676 UART: [fwproc] Received command 0x46574c44
13,103,871 UART: [fwproc] Received Image of size 114996 bytes
17,170,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,633 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,635,102 >>> mbox cmd response: success
17,639,912 UART: [afmc] ++
17,640,561 UART: [afmc] CDI.KEYID = 6
17,641,446 UART: [afmc] SUBJECT.KEYID = 7
17,642,717 UART: [afmc] AUTHORITY.KEYID = 5
21,009,652 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,163 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,426 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,835 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,637 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,087 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,188 UART: [afmc] --
23,380,493 UART: [cold-reset] --
23,384,675 UART: [state] Locking Datavault
23,390,946 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,716 UART: [state] Locking ICCM
23,394,189 UART: [exit] Launching FMC @ 0x40000130
23,402,582 UART:
23,402,818 UART: Running Caliptra FMC ...
23,403,844 UART:
23,403,992 UART: [state] CFI Enabled
23,468,302 UART: [fht] FMC Alias Private Key: 7
25,806,337 UART: [art] Extend RT PCRs Done
25,807,558 UART: [art] Lock RT PCRs Done
25,809,373 UART: [art] Populate DV Done
25,814,772 UART: [fht] FMC Alias Private Key: 7
25,816,332 UART: [art] Derive CDI
25,817,075 UART: [art] Store in in slot 0x4
25,876,179 UART: [art] Derive Key Pair
25,877,182 UART: [art] Store priv key in slot 0x5
29,169,656 UART: [art] Derive Key Pair - Done
29,182,240 UART: [art] Signing Cert with AUTHO
29,183,543 UART: RITY.KEYID = 7
31,470,846 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,352 UART: [art] PUB.X = AAE11686B3FFC61002C67E58718F8CE1DCBE94FDDF9F3C5808319511350D68B8C2D60FECAC14BDDA2B45782A43678487
31,479,617 UART: [art] PUB.Y = C863F0D43147438F6A0855714B2DCF55E56EF8DD0C59A28F60A8E8A2FA04D2682CD4FB09DDE9BC871FDAFA7983856232
31,486,866 UART: [art] SIG.R = 04FF065EAE83602D5011122C432014A64F78B6CFA0B2B254680BB673593F9A9675325729A95C24941CF6790F24858B1A
31,494,247 UART: [art] SIG.S = 06EE9D12A8946AEA7080CED57E3DB79A9B20FB766AD607E9B811F2D47C8A1DDAE9C9CA662ABFA3A56B259AFC95886737
32,798,987 UART: Caliptra RT
32,799,707 UART: [state] CFI Enabled
32,961,469 UART: [rt] RT listening for mailbox commands...
32,963,330 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,992,904 UART: [rt]cmd =0x46504c54, len=4
32,994,538 >>> mbox cmd response data (8 bytes)
32,995,665 UART: [rt] FIPS self test
32,996,605 UART: [kat] ++
32,997,057 UART: [kat] sha1
33,001,594 UART: [kat] SHA2-256
33,003,534 UART: [kat] SHA2-384
33,004,881 UART: Fatal Error: 0x90020001
33,040,274 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,184,803 >>> mbox cmd response: failed
33,185,458 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,329,782 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,109 UART:
190,395 UART: Running Caliptra ROM ...
191,506 UART:
191,658 UART: [state] CFI Enabled
254,199 UART: [state] LifecycleState = Unprovisioned
256,118 UART: [state] DebugLocked = No
259,009 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,761 UART: [kat] SHA2-256
433,429 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,949 UART: [kat] ++
444,423 UART: [kat] sha1
456,116 UART: [kat] SHA2-256
458,804 UART: [kat] SHA2-384
463,484 UART: [kat] SHA2-512-ACC
465,822 UART: [kat] ECC-384
2,754,334 UART: [kat] HMAC-384Kdf
2,767,168 UART: [kat] LMS
3,957,503 UART: [kat] --
3,961,357 UART: [cold-reset] ++
3,963,406 UART: [fht] Storing FHT @ 0x50003400
3,975,648 UART: [idev] ++
3,976,212 UART: [idev] CDI.KEYID = 6
3,977,179 UART: [idev] SUBJECT.KEYID = 7
3,978,419 UART: [idev] UDS.KEYID = 0
3,979,958 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,124,601 UART: [idev] Erasing UDS.KEYID = 0
7,316,607 UART: [idev] Using Sha1 for KeyId Algorithm
7,339,875 UART: [idev] --
7,344,469 UART: [ldev] ++
7,345,042 UART: [ldev] CDI.KEYID = 6
7,345,987 UART: [ldev] SUBJECT.KEYID = 5
7,347,206 UART: [ldev] AUTHORITY.KEYID = 7
7,348,443 UART: [ldev] FE.KEYID = 1
7,396,506 UART: [ldev] Erasing FE.KEYID = 1
10,730,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,992 UART: [ldev] --
13,111,448 UART: [fwproc] Waiting for Commands...
13,113,115 UART: [fwproc] Received command 0x46574c44
13,115,311 UART: [fwproc] Received Image of size 114996 bytes
17,176,117 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,286 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,639,373 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,784,718 ready_for_fw is high
3,785,347 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,859,093 >>> mbox cmd response: success
23,546,563 UART:
23,546,966 UART: Running Caliptra FMC ...
23,548,086 UART:
23,548,263 UART: [state] CFI Enabled
23,600,103 UART: [fht] FMC Alias Private Key: 7
25,938,452 UART: [art] Extend RT PCRs Done
25,939,686 UART: [art] Lock RT PCRs Done
25,941,272 UART: [art] Populate DV Done
25,946,799 UART: [fht] FMC Alias Private Key: 7
25,948,502 UART: [art] Derive CDI
25,949,318 UART: [art] Store in in slot 0x4
26,009,228 UART: [art] Derive Key Pair
26,010,300 UART: [art] Store priv key in slot 0x5
29,302,794 UART: [art] Derive Key Pair - Done
29,315,528 UART: [art] Signing Cert with AUTHO
29,316,835 UART: RITY.KEYID = 7
31,597,661 UART: [art] Erasing AUTHORITY.KEYID = 7
31,599,165 UART: [art] PUB.X = B83BC6390270DDAB10ACD33C3E0F75D4E7424534AA8EF31CBA82D2E53D48430CA382F209689FB4A9EA546656F27A9580
31,606,423 UART: [art] PUB.Y = 17036A6C7C6E5CDF8106A7A697BF0567810CE1A9192F9A95ABC594E5BE4716DD3D5C5152B2BE755861E2EBBA3584CD3E
31,613,674 UART: [art] SIG.R = F4975A0CD2946B369C50653392B609518FE853241DA91A807DD0EA183B7F5DDB9F10C368B114A1B667FC0A6B93A80065
31,621,011 UART: [art] SIG.S = C66AE8E5BC000592CBA0F4B050841640070570409F11E7C1616F15BF50AD23DEFA6A1745F33C783D6F682EEA6CC4ED21
32,926,641 UART: Caliptra RT
32,927,345 UART: [state] CFI Enabled
33,086,888 UART: [rt] RT listening for mailbox commands...
33,088,748 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,118,327 UART: [rt]cmd =0x46504c54, len=4
33,119,692 >>> mbox cmd response data (8 bytes)
33,120,422 UART: [rt] FIPS self test
33,121,388 UART: [kat] ++
33,121,847 UART: [kat] sha1
33,126,088 UART: [kat] SHA2-256
33,128,028 UART: [kat] SHA2-384
33,129,423 UART: Fatal Error: 0x90020001
33,164,798 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,309,451 >>> mbox cmd response: failed
33,310,072 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,454,491 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,777,479 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,866,989 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,388 UART:
192,753 UART: Running Caliptra ROM ...
193,870 UART:
603,767 UART: [state] CFI Enabled
617,772 UART: [state] LifecycleState = Unprovisioned
619,732 UART: [state] DebugLocked = No
621,981 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,073 UART: [kat] SHA2-256
795,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,402 UART: [kat] ++
806,852 UART: [kat] sha1
817,803 UART: [kat] SHA2-256
820,465 UART: [kat] SHA2-384
827,100 UART: [kat] SHA2-512-ACC
829,400 UART: [kat] ECC-384
3,111,887 UART: [kat] HMAC-384Kdf
3,123,355 UART: [kat] LMS
4,313,445 UART: [kat] --
4,318,143 UART: [cold-reset] ++
4,320,653 UART: [fht] Storing FHT @ 0x50003400
4,332,212 UART: [idev] ++
4,332,776 UART: [idev] CDI.KEYID = 6
4,333,813 UART: [idev] SUBJECT.KEYID = 7
4,334,990 UART: [idev] UDS.KEYID = 0
4,336,015 ready_for_fw is high
4,336,252 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,480,762 UART: [idev] Erasing UDS.KEYID = 0
7,622,149 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,839 UART: [idev] --
7,649,142 UART: [ldev] ++
7,649,724 UART: [ldev] CDI.KEYID = 6
7,650,702 UART: [ldev] SUBJECT.KEYID = 5
7,651,865 UART: [ldev] AUTHORITY.KEYID = 7
7,653,155 UART: [ldev] FE.KEYID = 1
7,663,446 UART: [ldev] Erasing FE.KEYID = 1
10,951,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,330 UART: [ldev] --
13,313,785 UART: [fwproc] Waiting for Commands...
13,316,801 UART: [fwproc] Received command 0x46574c44
13,319,052 UART: [fwproc] Received Image of size 114996 bytes
17,382,743 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,460,521 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,529,411 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,849,198 >>> mbox cmd response: success
17,853,388 UART: [afmc] ++
17,853,982 UART: [afmc] CDI.KEYID = 6
17,854,968 UART: [afmc] SUBJECT.KEYID = 7
17,856,186 UART: [afmc] AUTHORITY.KEYID = 5
21,172,360 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,465,950 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,468,208 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,482,620 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,497,434 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,511,895 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,533,282 UART: [afmc] --
23,536,881 UART: [cold-reset] --
23,539,768 UART: [state] Locking Datavault
23,544,042 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,743 UART: [state] Locking ICCM
23,548,538 UART: [exit] Launching FMC @ 0x40000130
23,556,881 UART:
23,557,117 UART: Running Caliptra FMC ...
23,558,243 UART:
23,558,411 UART: [state] CFI Enabled
23,566,461 UART: [fht] FMC Alias Private Key: 7
25,896,783 UART: [art] Extend RT PCRs Done
25,898,017 UART: [art] Lock RT PCRs Done
25,899,807 UART: [art] Populate DV Done
25,905,173 UART: [fht] FMC Alias Private Key: 7
25,906,711 UART: [art] Derive CDI
25,907,448 UART: [art] Store in in slot 0x4
25,949,823 UART: [art] Derive Key Pair
25,950,828 UART: [art] Store priv key in slot 0x5
29,193,051 UART: [art] Derive Key Pair - Done
29,205,894 UART: [art] Signing Cert with AUTHO
29,207,197 UART: RITY.KEYID = 7
31,486,647 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,164 UART: [art] PUB.X = 1177DA6F7DF42E2C655E3F1102B90D3ACCD967B820B52164800E8A25BEBF90EBFC3BD3EA904447538C049D492A19E3D3
31,495,389 UART: [art] PUB.Y = 6B4485A4C5DFDB1F4474E50E47FC2CD9FFA0740C6CFCB5C1F5160A5996372EDECA25E19C1CE77EFB99FFC6B66266B0DE
31,502,694 UART: [art] SIG.R = EC9E83A792045265CB5D71CB62901072BCC64BF82EE0D6564F1901F336636BE921F5C9EA2BD3E6FA0F7CD3578532F173
31,510,043 UART: [art] SIG.S = 714D2F9A469915A7D6AD25F9ADABA061E78E49B979587F036C26A9A9AF3A0186B338461230991796E22CD6AA72260F29
32,815,490 UART: Caliptra RT
32,816,208 UART: [state] CFI Enabled
32,933,487 UART: [rt] RT listening for mailbox commands...
32,935,338 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,964,968 UART: [rt]cmd =0x46504c54, len=4
32,966,592 >>> mbox cmd response data (8 bytes)
32,967,657 UART: [rt] FIPS self test
32,968,602 UART: [kat] ++
32,969,051 UART: [kat] sha1
32,973,505 UART: [kat] SHA2-256
32,975,436 UART: [kat] SHA2-384
32,976,680 UART: Fatal Error: 0x90020001
33,012,060 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,156,375 >>> mbox cmd response: failed
33,156,993 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,301,391 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
189,998 UART:
190,292 UART: Running Caliptra ROM ...
191,316 UART:
7,223,429 UART: [state] CFI Enabled
7,236,009 UART: [state] LifecycleState = Unprovisioned
7,237,939 UART: [state] DebugLocked = No
7,240,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,246,443 UART: [kat] SHA2-256
7,416,190 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,426,713 UART: [kat] ++
7,427,196 UART: [kat] sha1
7,438,419 UART: [kat] SHA2-256
7,441,117 UART: [kat] SHA2-384
7,448,458 UART: [kat] SHA2-512-ACC
7,450,816 UART: [kat] ECC-384
9,733,486 UART: [kat] HMAC-384Kdf
9,745,937 UART: [kat] LMS
10,936,014 UART: [kat] --
10,941,198 UART: [cold-reset] ++
10,943,721 UART: [fht] Storing FHT @ 0x50003400
10,954,284 UART: [idev] ++
10,954,857 UART: [idev] CDI.KEYID = 6
10,955,875 UART: [idev] SUBJECT.KEYID = 7
10,957,032 UART: [idev] UDS.KEYID = 0
10,958,659 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,103,047 UART: [idev] Erasing UDS.KEYID = 0
14,239,422 UART: [idev] Using Sha1 for KeyId Algorithm
14,260,442 UART: [idev] --
14,266,188 UART: [ldev] ++
14,266,765 UART: [ldev] CDI.KEYID = 6
14,267,732 UART: [ldev] SUBJECT.KEYID = 5
14,268,893 UART: [ldev] AUTHORITY.KEYID = 7
14,270,186 UART: [ldev] FE.KEYID = 1
14,281,426 UART: [ldev] Erasing FE.KEYID = 1
17,569,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,861,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,876,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,890,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,905,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,925,679 UART: [ldev] --
19,931,001 UART: [fwproc] Waiting for Commands...
19,933,591 UART: [fwproc] Received command 0x46574c44
19,935,779 UART: [fwproc] Received Image of size 114996 bytes
24,004,663 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,083,232 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,152,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,472,110 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,132,136 ready_for_fw is high
4,132,624 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,082,150 >>> mbox cmd response: success
23,723,078 UART:
23,723,491 UART: Running Caliptra FMC ...
23,724,637 UART:
23,724,796 UART: [state] CFI Enabled
23,732,899 UART: [fht] FMC Alias Private Key: 7
26,063,981 UART: [art] Extend RT PCRs Done
26,065,218 UART: [art] Lock RT PCRs Done
26,066,918 UART: [art] Populate DV Done
26,072,393 UART: [fht] FMC Alias Private Key: 7
26,073,935 UART: [art] Derive CDI
26,074,754 UART: [art] Store in in slot 0x4
26,117,630 UART: [art] Derive Key Pair
26,118,842 UART: [art] Store priv key in slot 0x5
29,360,999 UART: [art] Derive Key Pair - Done
29,373,746 UART: [art] Signing Cert with AUTHO
29,375,052 UART: RITY.KEYID = 7
31,654,353 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,870 UART: [art] PUB.X = 34DDEABBC657DD7D3505758E4CD4A0596D2683DD63653B5AEC593B6F94DFDA46A35FF2BF5958CC5F322BE2CEC4DAD3AF
31,663,137 UART: [art] PUB.Y = DAE6988A6B60D1E82F877063F0F986F1F9D0B87163A0C4CCC2B36AF917D6392A0BA6E1DC187F5F6C55BC6F4D08AE2D35
31,670,404 UART: [art] SIG.R = F2704F8F9F7B7ABC2EDD2891467101844BDB1B75EA6F3F45A0CE1BB9DDEDFDE238A81471CE634F6E8A2E338FB3FF60D7
31,677,758 UART: [art] SIG.S = 6AEC276C8250B8902B88142F08EF54C8583606DD71F1807F52576C79ED72A020C89956AC44BD5CF3A660437C0800CB50
32,982,658 UART: Caliptra RT
32,983,364 UART: [state] CFI Enabled
33,100,607 UART: [rt] RT listening for mailbox commands...
33,102,451 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,132,309 UART: [rt]cmd =0x46504c54, len=4
33,133,939 >>> mbox cmd response data (8 bytes)
33,135,163 UART: [rt] FIPS self test
33,136,104 UART: [kat] ++
33,136,552 UART: [kat] sha1
33,141,114 UART: [kat] SHA2-256
33,143,044 UART: [kat] SHA2-384
33,143,925 UART: Fatal Error: 0x90020001
33,179,317 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,323,822 >>> mbox cmd response: failed
33,324,478 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,469,107 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
10,584,078 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,544,128 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,339 UART:
192,708 UART: Running Caliptra ROM ...
193,830 UART:
193,973 UART: [state] CFI Enabled
264,174 UART: [state] LifecycleState = Unprovisioned
266,090 UART: [state] DebugLocked = No
267,638 UART: [state] WD Timer not started. Device not locked for debugging
271,668 UART: [kat] SHA2-256
450,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,385 UART: [kat] ++
462,925 UART: [kat] sha1
474,467 UART: [kat] SHA2-256
477,481 UART: [kat] SHA2-384
484,825 UART: [kat] SHA2-512-ACC
487,763 UART: [kat] ECC-384
2,948,545 UART: [kat] HMAC-384Kdf
2,972,801 UART: [kat] LMS
3,502,243 UART: [kat] --
3,507,096 UART: [cold-reset] ++
3,508,751 UART: [fht] FHT @ 0x50003400
3,519,451 UART: [idev] ++
3,520,015 UART: [idev] CDI.KEYID = 6
3,521,051 UART: [idev] SUBJECT.KEYID = 7
3,522,155 UART: [idev] UDS.KEYID = 0
3,523,084 ready_for_fw is high
3,523,286 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,668,390 UART: [idev] Erasing UDS.KEYID = 0
6,037,621 UART: [idev] Sha1 KeyId Algorithm
6,061,404 UART: [idev] --
6,066,598 UART: [ldev] ++
6,067,175 UART: [ldev] CDI.KEYID = 6
6,068,066 UART: [ldev] SUBJECT.KEYID = 5
6,069,287 UART: [ldev] AUTHORITY.KEYID = 7
6,070,526 UART: [ldev] FE.KEYID = 1
6,112,158 UART: [ldev] Erasing FE.KEYID = 1
8,615,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,351,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,698 UART: [ldev] --
10,422,813 UART: [fwproc] Wait for Commands...
10,424,586 UART: [fwproc] Recv command 0x46574c44
10,426,706 UART: [fwproc] Recv'd Img size: 115304 bytes
13,840,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,917,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,986,130 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,307,917 >>> mbox cmd response: success
14,312,288 UART: [afmc] ++
14,312,885 UART: [afmc] CDI.KEYID = 6
14,313,798 UART: [afmc] SUBJECT.KEYID = 7
14,314,965 UART: [afmc] AUTHORITY.KEYID = 5
16,845,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,567,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,569,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,585,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,601,166 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,616,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,639,956 UART: [afmc] --
18,644,429 UART: [cold-reset] --
18,649,744 UART: [state] Locking Datavault
18,654,557 UART: [state] Locking PCR0, PCR1 and PCR31
18,656,265 UART: [state] Locking ICCM
18,658,808 UART: [exit] Launching FMC @ 0x40000130
18,667,237 UART:
18,667,481 UART: Running Caliptra FMC ...
18,668,589 UART:
18,668,751 UART: [state] CFI Enabled
18,735,171 UART: [fht] FMC Alias Private Key: 7
20,498,802 UART: [art] Extend RT PCRs Done
20,500,019 UART: [art] Lock RT PCRs Done
20,501,703 UART: [art] Populate DV Done
20,507,223 UART: [fht] FMC Alias Private Key: 7
20,508,974 UART: [art] Derive CDI
20,509,791 UART: [art] Store in in slot 0x4
20,567,959 UART: [art] Derive Key Pair
20,568,964 UART: [art] Store priv key in slot 0x5
23,032,064 UART: [art] Derive Key Pair - Done
23,045,286 UART: [art] Signing Cert with AUTHO
23,046,592 UART: RITY.KEYID = 7
24,757,898 UART: [art] Erasing AUTHORITY.KEYID = 7
24,759,406 UART: [art] PUB.X = F8B572808FFC8E32A12496F270CE5163957EF5D464D5EB5F5BB64AD31F8C16168FD821EA3F203506196C87C0EE75435F
24,766,657 UART: [art] PUB.Y = EA7923BC77BDF21A00A49799734733E2A8ECB7763320C7573927BCDC95C26BF06F121C3408C322B9BFF7DF4A2A1EE832
24,773,893 UART: [art] SIG.R = F450DEFBBB7B9F19E1BB3963C596B4BED65D545EA09577B798490B1B95D27AD8F986530AFFA2FE3C3D50C79E79550107
24,781,291 UART: [art] SIG.S = D2D93DD8F63E1AFA361C37BA3391475D4E85DE38CF88A4DFFEBB9E6665DC4311AE747BF5217CBD26FCA62126FCE7E9EA
25,760,078 UART: Caliptra RT
25,760,780 UART: [state] CFI Enabled
25,926,696 UART: [rt] RT listening for mailbox commands...
25,928,573 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,958,433 UART: [rt]cmd =0x46504c54, len=4
25,959,988 >>> mbox cmd response data (8 bytes)
25,960,783 UART: [rt] FIPS self test
25,961,668 UART: [kat] ++
25,962,117 UART: [kat] sha1
25,966,734 UART: [kat] SHA2-256
25,968,614 UART: [kat] SHA2-384
25,969,932 UART: Fatal Error: 0x90020001
26,005,131 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,149,953 >>> mbox cmd response: failed
26,150,564 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,295,359 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,012 UART:
190,305 UART: Running Caliptra ROM ...
191,332 UART:
191,472 UART: [state] CFI Enabled
252,891 UART: [state] LifecycleState = Unprovisioned
254,812 UART: [state] DebugLocked = No
256,998 UART: [state] WD Timer not started. Device not locked for debugging
259,971 UART: [kat] SHA2-256
439,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
450,649 UART: [kat] ++
451,186 UART: [kat] sha1
461,418 UART: [kat] SHA2-256
464,471 UART: [kat] SHA2-384
469,955 UART: [kat] SHA2-512-ACC
472,939 UART: [kat] ECC-384
2,938,308 UART: [kat] HMAC-384Kdf
2,960,413 UART: [kat] LMS
3,489,867 UART: [kat] --
3,496,295 UART: [cold-reset] ++
3,497,314 UART: [fht] FHT @ 0x50003400
3,509,127 UART: [idev] ++
3,509,691 UART: [idev] CDI.KEYID = 6
3,510,705 UART: [idev] SUBJECT.KEYID = 7
3,511,805 UART: [idev] UDS.KEYID = 0
3,513,427 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,658,920 UART: [idev] Erasing UDS.KEYID = 0
6,016,863 UART: [idev] Sha1 KeyId Algorithm
6,039,603 UART: [idev] --
6,043,037 UART: [ldev] ++
6,043,680 UART: [ldev] CDI.KEYID = 6
6,044,603 UART: [ldev] SUBJECT.KEYID = 5
6,045,713 UART: [ldev] AUTHORITY.KEYID = 7
6,046,952 UART: [ldev] FE.KEYID = 1
6,088,598 UART: [ldev] Erasing FE.KEYID = 1
8,589,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,310,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,326,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,341,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,357,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,378,302 UART: [ldev] --
10,382,873 UART: [fwproc] Wait for Commands...
10,384,751 UART: [fwproc] Recv command 0x46574c44
10,386,845 UART: [fwproc] Recv'd Img size: 115304 bytes
13,803,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,882,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,869 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,273,071 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,382,766 ready_for_fw is high
3,383,236 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,072,583 >>> mbox cmd response: success
18,368,060 UART:
18,368,466 UART: Running Caliptra FMC ...
18,369,582 UART:
18,369,735 UART: [state] CFI Enabled
18,436,629 UART: [fht] FMC Alias Private Key: 7
20,200,206 UART: [art] Extend RT PCRs Done
20,201,436 UART: [art] Lock RT PCRs Done
20,203,159 UART: [art] Populate DV Done
20,208,399 UART: [fht] FMC Alias Private Key: 7
20,209,940 UART: [art] Derive CDI
20,210,675 UART: [art] Store in in slot 0x4
20,269,172 UART: [art] Derive Key Pair
20,270,211 UART: [art] Store priv key in slot 0x5
22,733,543 UART: [art] Derive Key Pair - Done
22,746,350 UART: [art] Signing Cert with AUTHO
22,747,657 UART: RITY.KEYID = 7
24,459,158 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,676 UART: [art] PUB.X = 1FE5FD627A5B34DD42CFCDA2714D50CE6990B2C8104F1BE3E1C62CB7B20F153766DA1B9DD8DBFEE3B31C61EECA73C258
24,467,997 UART: [art] PUB.Y = 09073EF50B49A2BA63454BAEC44F43B80C2CC5A23E5C27465C2A147A981B9674E067FA961994D3979FD6615FD8F37F6E
24,475,225 UART: [art] SIG.R = ECF0608242F6083F82E24B804AB45A374B289CAA537111D293CC9D0CBD6BC103601B97BCE5F5FF42083543C1B857AA61
24,482,631 UART: [art] SIG.S = 5447EE0306FC8325DD6BF1866EDB5659CD1BABA5198D2B0816AC8ECA10E3C2F46045AE74411AC4886984577EBF2EDA35
25,462,144 UART: Caliptra RT
25,462,861 UART: [state] CFI Enabled
25,627,822 UART: [rt] RT listening for mailbox commands...
25,629,679 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,659,315 UART: [rt]cmd =0x46504c54, len=4
25,660,785 >>> mbox cmd response data (8 bytes)
25,661,776 UART: [rt] FIPS self test
25,662,720 UART: [kat] ++
25,663,169 UART: [kat] sha1
25,667,696 UART: [kat] SHA2-256
25,669,583 UART: [kat] SHA2-384
25,670,683 UART: Fatal Error: 0x90020001
25,706,092 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,850,931 >>> mbox cmd response: failed
25,851,615 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,996,211 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,351,140 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,054,376 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
192,607 UART:
192,965 UART: Running Caliptra ROM ...
194,085 UART:
603,512 UART: [state] CFI Enabled
616,763 UART: [state] LifecycleState = Unprovisioned
618,654 UART: [state] DebugLocked = No
620,920 UART: [state] WD Timer not started. Device not locked for debugging
625,136 UART: [kat] SHA2-256
804,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,851 UART: [kat] ++
816,304 UART: [kat] sha1
828,169 UART: [kat] SHA2-256
831,207 UART: [kat] SHA2-384
836,921 UART: [kat] SHA2-512-ACC
839,931 UART: [kat] ECC-384
3,278,343 UART: [kat] HMAC-384Kdf
3,289,303 UART: [kat] LMS
3,818,861 UART: [kat] --
3,822,949 UART: [cold-reset] ++
3,824,348 UART: [fht] FHT @ 0x50003400
3,833,995 UART: [idev] ++
3,834,566 UART: [idev] CDI.KEYID = 6
3,835,477 UART: [idev] SUBJECT.KEYID = 7
3,836,657 UART: [idev] UDS.KEYID = 0
3,837,590 ready_for_fw is high
3,837,811 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,982,680 UART: [idev] Erasing UDS.KEYID = 0
6,311,850 UART: [idev] Sha1 KeyId Algorithm
6,335,272 UART: [idev] --
6,339,054 UART: [ldev] ++
6,339,628 UART: [ldev] CDI.KEYID = 6
6,340,538 UART: [ldev] SUBJECT.KEYID = 5
6,341,755 UART: [ldev] AUTHORITY.KEYID = 7
6,342,991 UART: [ldev] FE.KEYID = 1
6,353,693 UART: [ldev] Erasing FE.KEYID = 1
8,829,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,733 UART: [ldev] --
10,619,130 UART: [fwproc] Wait for Commands...
10,622,377 UART: [fwproc] Recv command 0x46574c44
10,624,457 UART: [fwproc] Recv'd Img size: 115304 bytes
14,038,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,600 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,361 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,501,154 >>> mbox cmd response: success
14,506,077 UART: [afmc] ++
14,506,676 UART: [afmc] CDI.KEYID = 6
14,507,589 UART: [afmc] SUBJECT.KEYID = 7
14,508,750 UART: [afmc] AUTHORITY.KEYID = 5
17,010,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,730,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,732,552 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,748,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,764,386 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,780,217 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,587 UART: [afmc] --
18,805,520 UART: [cold-reset] --
18,809,240 UART: [state] Locking Datavault
18,816,002 UART: [state] Locking PCR0, PCR1 and PCR31
18,817,707 UART: [state] Locking ICCM
18,819,262 UART: [exit] Launching FMC @ 0x40000130
18,827,657 UART:
18,827,893 UART: Running Caliptra FMC ...
18,828,995 UART:
18,829,156 UART: [state] CFI Enabled
18,837,148 UART: [fht] FMC Alias Private Key: 7
20,593,781 UART: [art] Extend RT PCRs Done
20,595,013 UART: [art] Lock RT PCRs Done
20,596,563 UART: [art] Populate DV Done
20,601,973 UART: [fht] FMC Alias Private Key: 7
20,603,627 UART: [art] Derive CDI
20,604,369 UART: [art] Store in in slot 0x4
20,646,907 UART: [art] Derive Key Pair
20,647,973 UART: [art] Store priv key in slot 0x5
23,074,573 UART: [art] Derive Key Pair - Done
23,087,627 UART: [art] Signing Cert with AUTHO
23,088,934 UART: RITY.KEYID = 7
24,794,421 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,930 UART: [art] PUB.X = 96F8B618DEFA565579F13073B68BB9A296E332A1F187C7F423B1357DBE488F06B6FCBEEFFACCF2BF87FBA04EFCDD89B2
24,803,189 UART: [art] PUB.Y = F5D4CF80F86C6DADA70DA50ECF0BBC11772C454B0CF59851C1907A4D4D8D216D04474C78EABB71FB0102D7F12CD025C6
24,810,478 UART: [art] SIG.R = F37A405A23DAC3B1429DF79F48BDC1B87560EEBA9F049E167B5112C88CE4A3AC4E78D97A368832FCA70984A572DC198D
24,817,880 UART: [art] SIG.S = 3F378224AA42F64ACB765C9F4264BC251CB16FBADD0D8682C8EC081004789122E48E4B7E5B9AD2C2DD7AE61549B387C1
25,797,071 UART: Caliptra RT
25,797,792 UART: [state] CFI Enabled
25,914,295 UART: [rt] RT listening for mailbox commands...
25,916,157 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,945,640 UART: [rt]cmd =0x46504c54, len=4
25,947,216 >>> mbox cmd response data (8 bytes)
25,948,511 UART: [rt] FIPS self test
25,949,467 UART: [kat] ++
25,949,914 UART: [kat] sha1
25,954,314 UART: [kat] SHA2-256
25,956,242 UART: [kat] SHA2-384
25,957,181 UART: Fatal Error: 0x90020001
25,992,553 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,137,229 >>> mbox cmd response: failed
26,137,905 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,282,688 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,013 UART:
190,303 UART: Running Caliptra ROM ...
191,413 UART:
14,243,901 UART: [state] CFI Enabled
14,255,052 UART: [state] LifecycleState = Unprovisioned
14,256,933 UART: [state] DebugLocked = No
14,258,488 UART: [state] WD Timer not started. Device not locked for debugging
14,261,490 UART: [kat] SHA2-256
14,440,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,452,190 UART: [kat] ++
14,452,646 UART: [kat] sha1
14,464,123 UART: [kat] SHA2-256
14,467,188 UART: [kat] SHA2-384
14,473,712 UART: [kat] SHA2-512-ACC
14,476,667 UART: [kat] ECC-384
16,918,982 UART: [kat] HMAC-384Kdf
16,931,801 UART: [kat] LMS
17,461,255 UART: [kat] --
17,466,592 UART: [cold-reset] ++
17,468,739 UART: [fht] FHT @ 0x50003400
17,479,075 UART: [idev] ++
17,479,662 UART: [idev] CDI.KEYID = 6
17,480,542 UART: [idev] SUBJECT.KEYID = 7
17,481,755 UART: [idev] UDS.KEYID = 0
17,483,270 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,628,135 UART: [idev] Erasing UDS.KEYID = 0
19,953,694 UART: [idev] Sha1 KeyId Algorithm
19,977,244 UART: [idev] --
19,982,209 UART: [ldev] ++
19,982,778 UART: [ldev] CDI.KEYID = 6
19,983,654 UART: [ldev] SUBJECT.KEYID = 5
19,984,865 UART: [ldev] AUTHORITY.KEYID = 7
19,986,097 UART: [ldev] FE.KEYID = 1
19,995,961 UART: [ldev] Erasing FE.KEYID = 1
22,472,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,192,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,208,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,224,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,240,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,259,405 UART: [ldev] --
24,263,628 UART: [fwproc] Wait for Commands...
24,265,195 UART: [fwproc] Recv command 0x46574c44
24,267,248 UART: [fwproc] Recv'd Img size: 115304 bytes
27,686,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,757,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,826,582 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,148,201 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,694,813 ready_for_fw is high
3,695,228 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,285,091 >>> mbox cmd response: success
18,534,989 UART:
18,535,407 UART: Running Caliptra FMC ...
18,536,559 UART:
18,536,721 UART: [state] CFI Enabled
18,544,799 UART: [fht] FMC Alias Private Key: 7
20,301,884 UART: [art] Extend RT PCRs Done
20,303,112 UART: [art] Lock RT PCRs Done
20,304,820 UART: [art] Populate DV Done
20,310,324 UART: [fht] FMC Alias Private Key: 7
20,311,810 UART: [art] Derive CDI
20,312,544 UART: [art] Store in in slot 0x4
20,355,519 UART: [art] Derive Key Pair
20,356,518 UART: [art] Store priv key in slot 0x5
22,783,344 UART: [art] Derive Key Pair - Done
22,796,507 UART: [art] Signing Cert with AUTHO
22,797,819 UART: RITY.KEYID = 7
24,504,143 UART: [art] Erasing AUTHORITY.KEYID = 7
24,505,672 UART: [art] PUB.X = 0D5FBDEDBDAF476EAB45875057F9DA236F2CE056C0C04C3322551622F1449553CE0FE9D5E64ED04D4FB38F5164F1B66A
24,512,907 UART: [art] PUB.Y = 1141E25556C0F5E99625A88016D645FDAF3A351F1FF10F3FB9D831B197F9A1A5F513E3897A6622145866EBF5140FCCEE
24,520,141 UART: [art] SIG.R = D765335C55E9219DD362B0ED289C8AFBACEC6EE759F89E6256B4625EE83D334048451BE46143A649D921EAA790FAE280
24,527,569 UART: [art] SIG.S = 9BADEFD2495AEBF789B230FF44A0831879FEEB4D0F8550B78D0B406FF7C0411504CF5C7CC754B1C608F578286C5A8A3F
25,506,200 UART: Caliptra RT
25,506,909 UART: [state] CFI Enabled
25,624,508 UART: [rt] RT listening for mailbox commands...
25,626,368 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,655,789 UART: [rt]cmd =0x46504c54, len=4
25,657,456 >>> mbox cmd response data (8 bytes)
25,658,457 UART: [rt] FIPS self test
25,659,410 UART: [kat] ++
25,659,866 UART: [kat] sha1
25,664,213 UART: [kat] SHA2-256
25,666,145 UART: [kat] SHA2-384
25,667,379 UART: Fatal Error: 0x90020001
25,702,643 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,847,807 >>> mbox cmd response: failed
25,848,504 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,993,298 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
17,632,531 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,221,662 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,417,202 ready_for_fw is high
3,417,605 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,746,123 >>> mbox cmd response: success
19,030,094 UART:
19,030,492 UART: Running Caliptra FMC ...
19,031,644 UART:
19,031,810 UART: [state] CFI Enabled
19,095,749 UART: [fht] FMC Alias Private Key: 7
20,860,330 UART: [art] Extend RT PCRs Done
20,861,553 UART: [art] Lock RT PCRs Done
20,863,399 UART: [art] Populate DV Done
20,868,545 UART: [fht] FMC Alias Private Key: 7
20,870,193 UART: [art] Derive CDI
20,871,034 UART: [art] Store in in slot 0x4
20,928,945 UART: [art] Derive Key Pair
20,929,948 UART: [art] Store priv key in slot 0x5
23,393,195 UART: [art] Derive Key Pair - Done
23,406,138 UART: [art] Signing Cert with AUTHO
23,407,439 UART: RITY.KEYID = 7
25,119,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,633 UART: [art] PUB.X = 5E7BF1F175CE931FA02434114655EEA7ADD980B82C02138250D9419F069FFF6D4D3D6A9709B6D5F8C98574756B920BD1
25,128,585 UART: [art] PUB.Y = BDF28DDA380F19E2B0DA506D70A49B9E55DB2F06C437758F32B841461148F6C833A27B8BEFDF1B4FE5D9C656A9712783
25,135,840 UART: [art] SIG.R = 24930FF911AB8FCF2E48867F29F06EAF5BA90986798F36F0F3D18C9C59968F746ED60874774B76677109C16A3518AEDC
25,143,253 UART: [art] SIG.S = 379EED7B89CA5473BF31B78666A590338D344801D819DA49B2B3157CE1B1A155C7E82C2833647BD48455D3642D554914
26,121,988 UART: Caliptra RT
26,122,702 UART: [state] CFI Enabled
26,288,318 UART: [rt] RT listening for mailbox commands...
26,290,191 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,319,856 UART: [rt]cmd =0x46504c54, len=4
26,321,392 >>> mbox cmd response data (8 bytes)
26,322,386 UART: [rt] FIPS self test
26,323,333 UART: [kat] ++
26,323,784 UART: [kat] sha1
26,328,124 UART: [kat] SHA2-256
26,330,055 UART: [kat] SHA2-384
26,331,127 UART: Fatal Error: 0x90020001
26,366,321 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,511,174 >>> mbox cmd response: failed
26,511,846 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,656,631 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,410,177 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,723,725 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,758,546 ready_for_fw is high
3,759,113 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,983,924 >>> mbox cmd response: success
19,241,516 UART:
19,241,958 UART: Running Caliptra FMC ...
19,243,073 UART:
19,243,237 UART: [state] CFI Enabled
19,251,202 UART: [fht] FMC Alias Private Key: 7
21,008,214 UART: [art] Extend RT PCRs Done
21,009,446 UART: [art] Lock RT PCRs Done
21,011,120 UART: [art] Populate DV Done
21,016,335 UART: [fht] FMC Alias Private Key: 7
21,017,974 UART: [art] Derive CDI
21,018,722 UART: [art] Store in in slot 0x4
21,061,537 UART: [art] Derive Key Pair
21,062,542 UART: [art] Store priv key in slot 0x5
23,489,889 UART: [art] Derive Key Pair - Done
23,503,063 UART: [art] Signing Cert with AUTHO
23,504,409 UART: RITY.KEYID = 7
25,209,641 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,157 UART: [art] PUB.X = 19204B8C5E99785070D81B9535996C019CCC02041FCD082246DCB63B88ED58E83EA2CCEA7E45B2DF7872FF057AE6F72F
25,218,440 UART: [art] PUB.Y = FAA6E1DD644B051AC6AA713295700E6DDD127C09A9FEFC5208B3F7C4FAFA97BB6EA6CA33A932E48B4E7DD7397359C6AA
25,225,727 UART: [art] SIG.R = 79AEDBD0D921144815D47C88BBC7DCCF4311799CBA8723A9E0F5E482C7D52536ED05EC79FCCE8DA726274B5BCF429629
25,233,148 UART: [art] SIG.S = 93A88C56E95F8204554AE89075BF65ABF5471223585BF84BFED6195130213F999839FCC29287C37FD8B69231C215D31E
26,213,161 UART: Caliptra RT
26,213,874 UART: [state] CFI Enabled
26,330,926 UART: [rt] RT listening for mailbox commands...
26,332,783 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,362,589 UART: [rt]cmd =0x46504c54, len=4
26,364,228 >>> mbox cmd response data (8 bytes)
26,365,696 UART: [rt] FIPS self test
26,366,641 UART: [kat] ++
26,367,094 UART: [kat] sha1
26,371,463 UART: [kat] SHA2-256
26,373,395 UART: [kat] SHA2-384
26,374,678 UART: Fatal Error: 0x90020001
26,410,086 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,554,950 >>> mbox cmd response: failed
26,555,604 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,700,379 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
16,988,304 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,216,386 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,837 UART: [kat] SHA2-256
881,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,883 UART: [kat] ++
886,035 UART: [kat] sha1
890,337 UART: [kat] SHA2-256
892,275 UART: [kat] SHA2-384
895,092 UART: [kat] SHA2-512-ACC
896,993 UART: [kat] ECC-384
902,210 UART: [kat] HMAC-384Kdf
906,982 UART: [kat] LMS
1,475,178 UART: [kat] --
1,475,875 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,479,114 UART: [idev] ++
1,479,282 UART: [idev] CDI.KEYID = 6
1,479,642 UART: [idev] SUBJECT.KEYID = 7
1,480,066 UART: [idev] UDS.KEYID = 0
1,480,411 ready_for_fw is high
1,480,411 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,504,398 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,086 UART: [idev] --
1,514,189 UART: [ldev] ++
1,514,357 UART: [ldev] CDI.KEYID = 6
1,514,720 UART: [ldev] SUBJECT.KEYID = 5
1,515,146 UART: [ldev] AUTHORITY.KEYID = 7
1,515,609 UART: [ldev] FE.KEYID = 1
1,521,015 UART: [ldev] Erasing FE.KEYID = 1
1,545,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,684 UART: [ldev] --
1,585,055 UART: [fwproc] Waiting for Commands...
1,585,674 UART: [fwproc] Received command 0x46574c44
1,586,465 UART: [fwproc] Received Image of size 115304 bytes
2,896,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,324 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,013 >>> mbox cmd response: success
3,092,083 UART: [afmc] ++
3,092,251 UART: [afmc] CDI.KEYID = 6
3,092,613 UART: [afmc] SUBJECT.KEYID = 7
3,093,038 UART: [afmc] AUTHORITY.KEYID = 5
3,128,281 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,959 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,352 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,042 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,919 UART: [afmc] --
3,172,035 UART: [cold-reset] --
3,172,815 UART: [state] Locking Datavault
3,174,010 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,614 UART: [state] Locking ICCM
3,175,142 UART: [exit] Launching FMC @ 0x40000130
3,180,471 UART:
3,180,487 UART: Running Caliptra FMC ...
3,180,895 UART:
3,180,949 UART: [state] CFI Enabled
3,191,092 UART: [fht] FMC Alias Private Key: 7
3,298,947 UART: [art] Extend RT PCRs Done
3,299,375 UART: [art] Lock RT PCRs Done
3,300,761 UART: [art] Populate DV Done
3,308,812 UART: [fht] FMC Alias Private Key: 7
3,309,788 UART: [art] Derive CDI
3,310,068 UART: [art] Store in in slot 0x4
3,395,665 UART: [art] Derive Key Pair
3,396,025 UART: [art] Store priv key in slot 0x5
3,408,921 UART: [art] Derive Key Pair - Done
3,423,992 UART: [art] Signing Cert with AUTHO
3,424,472 UART: RITY.KEYID = 7
3,439,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,517 UART: [art] PUB.X = AAAD0D0C35B691F50DC8DF6B02D0931FD36ABECAF6C2D7F8045779798EE3305B96C987F59879475426C25A99184C15BB
3,447,280 UART: [art] PUB.Y = 24DF93B11508FE6C5116DDD42EDE6454702BE402E54390C8C42083D6683D2286CDE96376C12267B24AA4A087FCC9EAC9
3,454,228 UART: [art] SIG.R = BE2B20F2BC802FA80966BAE871F2209851C9FC7512A3A07FE91B4C70954900070FA73D3BB793EEB3EA9A7E9F51BF52A4
3,460,979 UART: [art] SIG.S = C74E859D4654349799C3E87E57BD9208296EB97B3497CC6DAE0B7FFA900E5B7C9A5CC6FE5E615A10B71B12E837DD4E2D
3,484,961 UART: Caliptra RT
3,485,214 UART: [state] CFI Enabled
3,593,922 UART: [rt] RT listening for mailbox commands...
3,594,585 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,176 UART: [rt]cmd =0x46504c54, len=4
3,625,475 >>> mbox cmd response data (8 bytes)
3,625,716 UART: [rt] FIPS self test
3,626,044 UART: [kat] ++
3,626,196 UART: [kat] sha1
3,630,422 UART: [kat] SHA2-256
3,632,444 UART: [kat] SHA2-384
3,633,494 UART: Fatal Error: 0x90020001
3,635,044 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,635,049 >>> mbox cmd response: failed
3,635,049 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,635,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,714 UART: [kat] HMAC-384Kdf
907,364 UART: [kat] LMS
1,475,560 UART: [kat] --
1,476,569 UART: [cold-reset] ++
1,477,077 UART: [fht] Storing FHT @ 0x50003400
1,479,832 UART: [idev] ++
1,480,000 UART: [idev] CDI.KEYID = 6
1,480,360 UART: [idev] SUBJECT.KEYID = 7
1,480,784 UART: [idev] UDS.KEYID = 0
1,481,129 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,814 UART: [idev] Erasing UDS.KEYID = 0
1,505,448 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,056 UART: [idev] --
1,515,069 UART: [ldev] ++
1,515,237 UART: [ldev] CDI.KEYID = 6
1,515,600 UART: [ldev] SUBJECT.KEYID = 5
1,516,026 UART: [ldev] AUTHORITY.KEYID = 7
1,516,489 UART: [ldev] FE.KEYID = 1
1,521,511 UART: [ldev] Erasing FE.KEYID = 1
1,547,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,514 UART: [ldev] --
1,585,997 UART: [fwproc] Waiting for Commands...
1,586,666 UART: [fwproc] Received command 0x46574c44
1,587,457 UART: [fwproc] Received Image of size 115304 bytes
2,897,050 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,640 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,992 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,251 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,803 ready_for_fw is high
1,361,803 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,089 >>> mbox cmd response: success
3,000,791 UART:
3,000,807 UART: Running Caliptra FMC ...
3,001,215 UART:
3,001,269 UART: [state] CFI Enabled
3,011,486 UART: [fht] FMC Alias Private Key: 7
3,119,817 UART: [art] Extend RT PCRs Done
3,120,245 UART: [art] Lock RT PCRs Done
3,121,757 UART: [art] Populate DV Done
3,129,986 UART: [fht] FMC Alias Private Key: 7
3,131,144 UART: [art] Derive CDI
3,131,424 UART: [art] Store in in slot 0x4
3,216,669 UART: [art] Derive Key Pair
3,217,029 UART: [art] Store priv key in slot 0x5
3,229,631 UART: [art] Derive Key Pair - Done
3,244,693 UART: [art] Signing Cert with AUTHO
3,245,173 UART: RITY.KEYID = 7
3,260,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,358 UART: [art] PUB.X = E546DFED8D7CA4D03DE96DDF5EF010DB02AFC3264AC8430CF246E2E56FB487ABF8BA7B4777C5AF5212EA1C378AAACF51
3,268,152 UART: [art] PUB.Y = AA3E8B2557167D6AC300B603459B3383076D4E3CEEC233D4F7FBA7354AD9379236020B37467578EEFEFE9278E8363F2C
3,275,070 UART: [art] SIG.R = A0862F0C713E721B339B96E7001AE08C058062923C55B2D4159441972F505AED9794F203E1C13EF3B3A7B3CC6E380225
3,281,800 UART: [art] SIG.S = 9AB39205DFA73CAED1CFB1D3CA768D31AC1BAA793D5C67D95197FFF91C96ADBEB78B4EB805F332263ED9B99B65DAC7C4
3,305,683 UART: Caliptra RT
3,305,936 UART: [state] CFI Enabled
3,414,750 UART: [rt] RT listening for mailbox commands...
3,415,413 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,526 UART: [rt]cmd =0x46504c54, len=4
3,446,799 >>> mbox cmd response data (8 bytes)
3,447,000 UART: [rt] FIPS self test
3,447,328 UART: [kat] ++
3,447,480 UART: [kat] sha1
3,451,768 UART: [kat] SHA2-256
3,453,790 UART: [kat] SHA2-384
3,454,780 UART: Fatal Error: 0x90020001
3,456,330 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,456,335 >>> mbox cmd response: failed
3,456,335 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,456,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,061 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,324 UART: [kat] SHA2-256
882,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,370 UART: [kat] ++
886,522 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,309 UART: [kat] SHA2-512-ACC
897,210 UART: [kat] ECC-384
903,045 UART: [kat] HMAC-384Kdf
907,683 UART: [kat] LMS
1,475,879 UART: [kat] --
1,476,606 UART: [cold-reset] ++
1,476,986 UART: [fht] Storing FHT @ 0x50003400
1,479,751 UART: [idev] ++
1,479,919 UART: [idev] CDI.KEYID = 6
1,480,279 UART: [idev] SUBJECT.KEYID = 7
1,480,703 UART: [idev] UDS.KEYID = 0
1,481,048 ready_for_fw is high
1,481,048 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,563 UART: [idev] Erasing UDS.KEYID = 0
1,504,977 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,573 UART: [idev] --
1,514,734 UART: [ldev] ++
1,514,902 UART: [ldev] CDI.KEYID = 6
1,515,265 UART: [ldev] SUBJECT.KEYID = 5
1,515,691 UART: [ldev] AUTHORITY.KEYID = 7
1,516,154 UART: [ldev] FE.KEYID = 1
1,521,494 UART: [ldev] Erasing FE.KEYID = 1
1,547,227 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,013 UART: [ldev] --
1,586,350 UART: [fwproc] Waiting for Commands...
1,587,143 UART: [fwproc] Received command 0x46574c44
1,587,934 UART: [fwproc] Received Image of size 115304 bytes
2,897,471 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,965 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,317 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,594 >>> mbox cmd response: success
3,092,654 UART: [afmc] ++
3,092,822 UART: [afmc] CDI.KEYID = 6
3,093,184 UART: [afmc] SUBJECT.KEYID = 7
3,093,609 UART: [afmc] AUTHORITY.KEYID = 5
3,128,666 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,020 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,800 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,528 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,413 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,103 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,194 UART: [afmc] --
3,172,242 UART: [cold-reset] --
3,173,036 UART: [state] Locking Datavault
3,174,267 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,871 UART: [state] Locking ICCM
3,175,427 UART: [exit] Launching FMC @ 0x40000130
3,180,756 UART:
3,180,772 UART: Running Caliptra FMC ...
3,181,180 UART:
3,181,323 UART: [state] CFI Enabled
3,191,978 UART: [fht] FMC Alias Private Key: 7
3,300,573 UART: [art] Extend RT PCRs Done
3,301,001 UART: [art] Lock RT PCRs Done
3,302,521 UART: [art] Populate DV Done
3,310,620 UART: [fht] FMC Alias Private Key: 7
3,311,750 UART: [art] Derive CDI
3,312,030 UART: [art] Store in in slot 0x4
3,398,111 UART: [art] Derive Key Pair
3,398,471 UART: [art] Store priv key in slot 0x5
3,411,483 UART: [art] Derive Key Pair - Done
3,426,235 UART: [art] Signing Cert with AUTHO
3,426,715 UART: RITY.KEYID = 7
3,442,207 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,972 UART: [art] PUB.X = 29324916DD11F774E1C7EE2B6EF99AEEAC279418E67825F2880166514DD86BC91A1F5E07698FD922409F7A1A76FD8312
3,449,736 UART: [art] PUB.Y = CE287929F5712C99FBA6BFF38B3DA1F4AD4F0A9DD090ECAF8BAF160EE6918B8182D73FF685CBDD6D3CE47669A14C6F60
3,456,704 UART: [art] SIG.R = 41CB0DED21BC98D501BDFF55719A56515D371D26EDD854783399899D6B64591FBF4D6071AD30C54081AB4DAD88184278
3,463,470 UART: [art] SIG.S = A40B7688EF582DBA1943A87D64AC695138C25D68783667FF29B2445FA1721B1C91ABEA8148660D90322F7D2888969A24
3,487,329 UART: Caliptra RT
3,487,674 UART: [state] CFI Enabled
3,595,797 UART: [rt] RT listening for mailbox commands...
3,596,460 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,013 UART: [rt]cmd =0x46504c54, len=4
3,627,162 >>> mbox cmd response data (8 bytes)
3,627,329 UART: [rt] FIPS self test
3,627,657 UART: [kat] ++
3,627,809 UART: [kat] sha1
3,632,099 UART: [kat] SHA2-256
3,634,121 UART: [kat] SHA2-384
3,635,225 UART: Fatal Error: 0x90020001
3,636,775 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,636,780 >>> mbox cmd response: failed
3,636,780 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,636,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,847 UART: [state] LifecycleState = Unprovisioned
86,502 UART: [state] DebugLocked = No
87,178 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,780 UART: [kat] SHA2-256
882,711 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,826 UART: [kat] ++
886,978 UART: [kat] sha1
890,998 UART: [kat] SHA2-256
892,936 UART: [kat] SHA2-384
895,811 UART: [kat] SHA2-512-ACC
897,712 UART: [kat] ECC-384
903,337 UART: [kat] HMAC-384Kdf
907,899 UART: [kat] LMS
1,476,095 UART: [kat] --
1,477,002 UART: [cold-reset] ++
1,477,418 UART: [fht] Storing FHT @ 0x50003400
1,480,259 UART: [idev] ++
1,480,427 UART: [idev] CDI.KEYID = 6
1,480,787 UART: [idev] SUBJECT.KEYID = 7
1,481,211 UART: [idev] UDS.KEYID = 0
1,481,556 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,703 UART: [idev] Erasing UDS.KEYID = 0
1,505,295 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,789 UART: [idev] --
1,514,746 UART: [ldev] ++
1,514,914 UART: [ldev] CDI.KEYID = 6
1,515,277 UART: [ldev] SUBJECT.KEYID = 5
1,515,703 UART: [ldev] AUTHORITY.KEYID = 7
1,516,166 UART: [ldev] FE.KEYID = 1
1,521,448 UART: [ldev] Erasing FE.KEYID = 1
1,546,395 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,007 UART: [ldev] --
1,585,488 UART: [fwproc] Waiting for Commands...
1,586,251 UART: [fwproc] Received command 0x46574c44
1,587,042 UART: [fwproc] Received Image of size 115304 bytes
2,897,217 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,257 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,609 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,928 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,938 ready_for_fw is high
1,363,938 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,566 >>> mbox cmd response: success
3,003,168 UART:
3,003,184 UART: Running Caliptra FMC ...
3,003,592 UART:
3,003,735 UART: [state] CFI Enabled
3,014,458 UART: [fht] FMC Alias Private Key: 7
3,122,745 UART: [art] Extend RT PCRs Done
3,123,173 UART: [art] Lock RT PCRs Done
3,124,907 UART: [art] Populate DV Done
3,133,208 UART: [fht] FMC Alias Private Key: 7
3,134,376 UART: [art] Derive CDI
3,134,656 UART: [art] Store in in slot 0x4
3,220,587 UART: [art] Derive Key Pair
3,220,947 UART: [art] Store priv key in slot 0x5
3,234,051 UART: [art] Derive Key Pair - Done
3,248,781 UART: [art] Signing Cert with AUTHO
3,249,261 UART: RITY.KEYID = 7
3,264,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,716 UART: [art] PUB.X = 1F20A4195343FBC61E52F6018AF8DBE2077B24E905F1ADD642014EE7166C5CF3B4858FC65803368C808040F0DD1B267B
3,272,473 UART: [art] PUB.Y = 93DB78EB7D2D011FC5EAF59114F5B1AE6FFE1DC9679A5BF927D35A1320132EC601F6B0F8AA6B715583185E139BAEE315
3,279,431 UART: [art] SIG.R = 7CD351B13C90AC1C942A3DD45708178CEC75678EA06A656485248A1855527A22755F8C93229F492F9C3CCFD11B1576D9
3,286,194 UART: [art] SIG.S = 6B750F290BD44DD8C6ED786E871A31D93A395125CDB60AAAFE0859983BF75FC89AE015797CB0243BD8D7990841D6E649
3,310,026 UART: Caliptra RT
3,310,371 UART: [state] CFI Enabled
3,419,757 UART: [rt] RT listening for mailbox commands...
3,420,420 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,227 UART: [rt]cmd =0x46504c54, len=4
3,451,370 >>> mbox cmd response data (8 bytes)
3,451,617 UART: [rt] FIPS self test
3,451,945 UART: [kat] ++
3,452,097 UART: [kat] sha1
3,456,393 UART: [kat] SHA2-256
3,458,415 UART: [kat] SHA2-384
3,459,203 UART: Fatal Error: 0x90020001
3,460,753 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,460,758 >>> mbox cmd response: failed
3,460,758 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,460,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,934 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,656 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
893,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,635 UART: [kat] ++
897,787 UART: [kat] sha1
901,907 UART: [kat] SHA2-256
903,847 UART: [kat] SHA2-384
906,532 UART: [kat] SHA2-512-ACC
908,433 UART: [kat] ECC-384
917,804 UART: [kat] HMAC-384Kdf
922,490 UART: [kat] LMS
1,170,818 UART: [kat] --
1,171,485 UART: [cold-reset] ++
1,171,907 UART: [fht] FHT @ 0x50003400
1,174,496 UART: [idev] ++
1,174,664 UART: [idev] CDI.KEYID = 6
1,175,024 UART: [idev] SUBJECT.KEYID = 7
1,175,448 UART: [idev] UDS.KEYID = 0
1,175,793 ready_for_fw is high
1,175,793 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,378 UART: [idev] Erasing UDS.KEYID = 0
1,200,023 UART: [idev] Sha1 KeyId Algorithm
1,208,655 UART: [idev] --
1,209,891 UART: [ldev] ++
1,210,059 UART: [ldev] CDI.KEYID = 6
1,210,422 UART: [ldev] SUBJECT.KEYID = 5
1,210,848 UART: [ldev] AUTHORITY.KEYID = 7
1,211,311 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,371 UART: [ldev] --
1,281,852 UART: [fwproc] Wait for Commands...
1,282,518 UART: [fwproc] Recv command 0x46574c44
1,283,246 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,837 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,141 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,396 >>> mbox cmd response: success
2,786,564 UART: [afmc] ++
2,786,732 UART: [afmc] CDI.KEYID = 6
2,787,094 UART: [afmc] SUBJECT.KEYID = 7
2,787,519 UART: [afmc] AUTHORITY.KEYID = 5
2,823,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,133 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,861 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,746 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,465 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,439 UART: [afmc] --
2,866,417 UART: [cold-reset] --
2,867,359 UART: [state] Locking Datavault
2,868,356 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,960 UART: [state] Locking ICCM
2,869,618 UART: [exit] Launching FMC @ 0x40000130
2,874,947 UART:
2,874,963 UART: Running Caliptra FMC ...
2,875,371 UART:
2,875,425 UART: [state] CFI Enabled
2,886,244 UART: [fht] FMC Alias Private Key: 7
2,994,173 UART: [art] Extend RT PCRs Done
2,994,601 UART: [art] Lock RT PCRs Done
2,995,865 UART: [art] Populate DV Done
3,004,040 UART: [fht] FMC Alias Private Key: 7
3,004,972 UART: [art] Derive CDI
3,005,252 UART: [art] Store in in slot 0x4
3,090,533 UART: [art] Derive Key Pair
3,090,893 UART: [art] Store priv key in slot 0x5
3,103,765 UART: [art] Derive Key Pair - Done
3,118,779 UART: [art] Signing Cert with AUTHO
3,119,259 UART: RITY.KEYID = 7
3,134,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,334 UART: [art] PUB.X = F4FE3EAFD9F555A0819FA52EEF654343724BA4054E8B4A92123410AE076F2BE629DEA97A0E566AB61BD87AB9F366B922
3,142,107 UART: [art] PUB.Y = 355A0DD37FCB3146E075AF6B44E7D6F10EEE2D54D0B9244D00A33D350DA2ECD5DBC5A2D2230A48507149FF0C7A5A3482
3,149,034 UART: [art] SIG.R = CA2181A781B6B2B328D04D6EDBF17AAC426DEBE04A1F0CC52954862334ABA7D47C090DE59B54927808AEF45B0C37E9C9
3,155,803 UART: [art] SIG.S = E194E6DEC742920067D8FAEBDB065E82D97ADBB8C370ADCCD4C70E6071C81B7F5E47908683CA92B27D627D3A2214A1EB
3,179,896 UART: Caliptra RT
3,180,149 UART: [state] CFI Enabled
3,288,423 UART: [rt] RT listening for mailbox commands...
3,289,086 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,615 UART: [rt]cmd =0x46504c54, len=4
3,319,958 >>> mbox cmd response data (8 bytes)
3,320,147 UART: [rt] FIPS self test
3,320,475 UART: [kat] ++
3,320,627 UART: [kat] sha1
3,324,745 UART: [kat] SHA2-256
3,326,767 UART: [kat] SHA2-384
3,327,651 UART: Fatal Error: 0x90020001
3,329,201 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,329,206 >>> mbox cmd response: failed
3,329,206 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,329,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,900 UART: [kat] SHA2-256
893,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,675 UART: [kat] ++
897,827 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,696 UART: [kat] SHA2-512-ACC
908,597 UART: [kat] ECC-384
918,054 UART: [kat] HMAC-384Kdf
922,770 UART: [kat] LMS
1,171,098 UART: [kat] --
1,172,231 UART: [cold-reset] ++
1,172,767 UART: [fht] FHT @ 0x50003400
1,175,488 UART: [idev] ++
1,175,656 UART: [idev] CDI.KEYID = 6
1,176,016 UART: [idev] SUBJECT.KEYID = 7
1,176,440 UART: [idev] UDS.KEYID = 0
1,176,785 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,222 UART: [idev] Erasing UDS.KEYID = 0
1,201,371 UART: [idev] Sha1 KeyId Algorithm
1,209,669 UART: [idev] --
1,210,601 UART: [ldev] ++
1,210,769 UART: [ldev] CDI.KEYID = 6
1,211,132 UART: [ldev] SUBJECT.KEYID = 5
1,211,558 UART: [ldev] AUTHORITY.KEYID = 7
1,212,021 UART: [ldev] FE.KEYID = 1
1,217,325 UART: [ldev] Erasing FE.KEYID = 1
1,244,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,823 UART: [ldev] --
1,283,088 UART: [fwproc] Wait for Commands...
1,283,870 UART: [fwproc] Recv command 0x46574c44
1,284,598 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,387 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,666 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,773 ready_for_fw is high
1,059,773 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,389 >>> mbox cmd response: success
2,701,231 UART:
2,701,247 UART: Running Caliptra FMC ...
2,701,655 UART:
2,701,709 UART: [state] CFI Enabled
2,712,770 UART: [fht] FMC Alias Private Key: 7
2,821,027 UART: [art] Extend RT PCRs Done
2,821,455 UART: [art] Lock RT PCRs Done
2,823,411 UART: [art] Populate DV Done
2,831,546 UART: [fht] FMC Alias Private Key: 7
2,832,616 UART: [art] Derive CDI
2,832,896 UART: [art] Store in in slot 0x4
2,918,257 UART: [art] Derive Key Pair
2,918,617 UART: [art] Store priv key in slot 0x5
2,931,695 UART: [art] Derive Key Pair - Done
2,946,320 UART: [art] Signing Cert with AUTHO
2,946,800 UART: RITY.KEYID = 7
2,962,012 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,777 UART: [art] PUB.X = 9148E8DB4D655857D3318B7A0D5CDCB4FF62A88CCA8F9857F9F6AFF62CE0ADF90097DA835DCD305F9DF9A4CD7607888F
2,969,539 UART: [art] PUB.Y = ECE5C6FDF3DE46B7441F34784F8C3870D717F208D5A6BD6275E6881BE5E35ACAA7B0928DB7F43DE7D8BC96E4CE907302
2,976,499 UART: [art] SIG.R = 9B8B5A024BBAAEB835D03C58F058BF8E93AA472854C0C82B7BBCC4FEB609B77767EC82522A8DC87D33AE618C327C0586
2,983,274 UART: [art] SIG.S = 78575C289740B6D32101BF858FEE972A200FEE117C5835D4845EE96BC3D92B712A31B3181962EB951AB31B2E4FF651FB
3,007,049 UART: Caliptra RT
3,007,302 UART: [state] CFI Enabled
3,114,785 UART: [rt] RT listening for mailbox commands...
3,115,448 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,127 UART: [rt]cmd =0x46504c54, len=4
3,146,068 >>> mbox cmd response data (8 bytes)
3,146,343 UART: [rt] FIPS self test
3,146,671 UART: [kat] ++
3,146,823 UART: [kat] sha1
3,151,099 UART: [kat] SHA2-256
3,153,121 UART: [kat] SHA2-384
3,154,103 UART: Fatal Error: 0x90020001
3,155,653 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,658 >>> mbox cmd response: failed
3,155,658 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,155,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,263 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,675 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [kat] SHA2-256
893,831 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,956 UART: [kat] ++
898,108 UART: [kat] sha1
902,216 UART: [kat] SHA2-256
904,156 UART: [kat] SHA2-384
906,975 UART: [kat] SHA2-512-ACC
908,876 UART: [kat] ECC-384
918,815 UART: [kat] HMAC-384Kdf
923,461 UART: [kat] LMS
1,171,789 UART: [kat] --
1,172,498 UART: [cold-reset] ++
1,172,960 UART: [fht] FHT @ 0x50003400
1,175,649 UART: [idev] ++
1,175,817 UART: [idev] CDI.KEYID = 6
1,176,177 UART: [idev] SUBJECT.KEYID = 7
1,176,601 UART: [idev] UDS.KEYID = 0
1,176,946 ready_for_fw is high
1,176,946 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,441 UART: [idev] Erasing UDS.KEYID = 0
1,201,492 UART: [idev] Sha1 KeyId Algorithm
1,209,948 UART: [idev] --
1,211,210 UART: [ldev] ++
1,211,378 UART: [ldev] CDI.KEYID = 6
1,211,741 UART: [ldev] SUBJECT.KEYID = 5
1,212,167 UART: [ldev] AUTHORITY.KEYID = 7
1,212,630 UART: [ldev] FE.KEYID = 1
1,218,004 UART: [ldev] Erasing FE.KEYID = 1
1,244,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,242 UART: [ldev] --
1,283,613 UART: [fwproc] Wait for Commands...
1,284,213 UART: [fwproc] Recv command 0x46574c44
1,284,941 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,782 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,151 >>> mbox cmd response: success
2,790,403 UART: [afmc] ++
2,790,571 UART: [afmc] CDI.KEYID = 6
2,790,933 UART: [afmc] SUBJECT.KEYID = 7
2,791,358 UART: [afmc] AUTHORITY.KEYID = 5
2,827,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,844,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,850,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,606 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,558 UART: [afmc] --
2,870,544 UART: [cold-reset] --
2,871,160 UART: [state] Locking Datavault
2,872,523 UART: [state] Locking PCR0, PCR1 and PCR31
2,873,127 UART: [state] Locking ICCM
2,873,691 UART: [exit] Launching FMC @ 0x40000130
2,879,020 UART:
2,879,036 UART: Running Caliptra FMC ...
2,879,444 UART:
2,879,587 UART: [state] CFI Enabled
2,890,592 UART: [fht] FMC Alias Private Key: 7
2,998,777 UART: [art] Extend RT PCRs Done
2,999,205 UART: [art] Lock RT PCRs Done
3,000,769 UART: [art] Populate DV Done
3,008,996 UART: [fht] FMC Alias Private Key: 7
3,009,942 UART: [art] Derive CDI
3,010,222 UART: [art] Store in in slot 0x4
3,096,027 UART: [art] Derive Key Pair
3,096,387 UART: [art] Store priv key in slot 0x5
3,109,055 UART: [art] Derive Key Pair - Done
3,123,903 UART: [art] Signing Cert with AUTHO
3,124,383 UART: RITY.KEYID = 7
3,140,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,141,030 UART: [art] PUB.X = 86D5973CB6189E2867F66CA3EC9F6EA35F5890A26403363F92BE43047CD67AFC553C672ECC0102A7E2D6A74104761A8F
3,147,787 UART: [art] PUB.Y = C743017256AEABA12E3A1A459AED81F5B998210E125FC2636AA1FEB94A952AF38D48090CD6567AD5A0E698D9F023BF7C
3,154,737 UART: [art] SIG.R = F80770B2B4217C7E49EF4942EC116AA655D6803BDAEA57B62697A0087A8AF5D465B8A6B1F0EA17F7A0B06FEDF02383BA
3,161,515 UART: [art] SIG.S = 6E498E8F3B6C1524AA567E93CEDCE5557F62CE627A96E0D58682645F7A4F499B319124648C1EC196EFC6DF6723F8F818
3,185,430 UART: Caliptra RT
3,185,775 UART: [state] CFI Enabled
3,292,810 UART: [rt] RT listening for mailbox commands...
3,293,473 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,476 UART: [rt]cmd =0x46504c54, len=4
3,324,651 >>> mbox cmd response data (8 bytes)
3,324,968 UART: [rt] FIPS self test
3,325,296 UART: [kat] ++
3,325,448 UART: [kat] sha1
3,329,760 UART: [kat] SHA2-256
3,331,782 UART: [kat] SHA2-384
3,332,660 UART: Fatal Error: 0x90020001
3,334,210 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,215 >>> mbox cmd response: failed
3,334,215 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,334,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
893,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,972 UART: [kat] ++
898,124 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
907,041 UART: [kat] SHA2-512-ACC
908,942 UART: [kat] ECC-384
918,693 UART: [kat] HMAC-384Kdf
923,269 UART: [kat] LMS
1,171,597 UART: [kat] --
1,172,540 UART: [cold-reset] ++
1,173,030 UART: [fht] FHT @ 0x50003400
1,175,757 UART: [idev] ++
1,175,925 UART: [idev] CDI.KEYID = 6
1,176,285 UART: [idev] SUBJECT.KEYID = 7
1,176,709 UART: [idev] UDS.KEYID = 0
1,177,054 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,027 UART: [idev] Erasing UDS.KEYID = 0
1,201,758 UART: [idev] Sha1 KeyId Algorithm
1,210,196 UART: [idev] --
1,211,170 UART: [ldev] ++
1,211,338 UART: [ldev] CDI.KEYID = 6
1,211,701 UART: [ldev] SUBJECT.KEYID = 5
1,212,127 UART: [ldev] AUTHORITY.KEYID = 7
1,212,590 UART: [ldev] FE.KEYID = 1
1,217,944 UART: [ldev] Erasing FE.KEYID = 1
1,244,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,444 UART: [ldev] --
1,283,949 UART: [fwproc] Wait for Commands...
1,284,661 UART: [fwproc] Recv command 0x46574c44
1,285,389 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,410 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,714 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,790,109 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,098 ready_for_fw is high
1,060,098 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,198 >>> mbox cmd response: success
2,701,200 UART:
2,701,216 UART: Running Caliptra FMC ...
2,701,624 UART:
2,701,767 UART: [state] CFI Enabled
2,712,192 UART: [fht] FMC Alias Private Key: 7
2,820,257 UART: [art] Extend RT PCRs Done
2,820,685 UART: [art] Lock RT PCRs Done
2,822,097 UART: [art] Populate DV Done
2,830,346 UART: [fht] FMC Alias Private Key: 7
2,831,510 UART: [art] Derive CDI
2,831,790 UART: [art] Store in in slot 0x4
2,917,745 UART: [art] Derive Key Pair
2,918,105 UART: [art] Store priv key in slot 0x5
2,931,035 UART: [art] Derive Key Pair - Done
2,945,797 UART: [art] Signing Cert with AUTHO
2,946,277 UART: RITY.KEYID = 7
2,961,127 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,892 UART: [art] PUB.X = D981FE74E4813B5B23800280BF2DE0AE96BA6DC1966BAED2E16D3A5D402CB6D19453E21CCE4B0B6A28AFE326C47621CE
2,968,674 UART: [art] PUB.Y = DD1C9CDEBCAD418B5261883956C2219B757A9E52176584C1060EAF24240EBA921E2F72FC122E7505F60E4B94C74E0FE6
2,975,612 UART: [art] SIG.R = A68E39A69ED031740FB9648FC41CC766C2EDB39BE1B20A95813B9A470DFB482D340484E64F5646973910F4470B263AF6
2,982,367 UART: [art] SIG.S = AD9D73FD38CCD466124304B4E1B4C9087A2EB2BE12D9D12D732454522080DF4533A687FF90777E90E2C5D48852556D3B
3,006,532 UART: Caliptra RT
3,006,877 UART: [state] CFI Enabled
3,115,217 UART: [rt] RT listening for mailbox commands...
3,115,880 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,869 UART: [rt]cmd =0x46504c54, len=4
3,147,112 >>> mbox cmd response data (8 bytes)
3,147,353 UART: [rt] FIPS self test
3,147,681 UART: [kat] ++
3,147,833 UART: [kat] sha1
3,151,975 UART: [kat] SHA2-256
3,153,997 UART: [kat] SHA2-384
3,154,943 UART: Fatal Error: 0x90020001
3,156,493 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,156,498 >>> mbox cmd response: failed
3,156,498 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,156,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,330 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,292 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,903 UART: [kat] ++
895,055 UART: [kat] sha1
899,295 UART: [kat] SHA2-256
901,235 UART: [kat] SHA2-384
904,120 UART: [kat] SHA2-512-ACC
906,021 UART: [kat] ECC-384
915,664 UART: [kat] HMAC-384Kdf
920,156 UART: [kat] LMS
1,168,468 UART: [kat] --
1,169,653 UART: [cold-reset] ++
1,170,129 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 ready_for_fw is high
1,174,127 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,207,693 UART: [idev] --
1,208,830 UART: [ldev] ++
1,208,998 UART: [ldev] CDI.KEYID = 6
1,209,362 UART: [ldev] SUBJECT.KEYID = 5
1,209,789 UART: [ldev] AUTHORITY.KEYID = 7
1,210,252 UART: [ldev] FE.KEYID = 1
1,215,244 UART: [ldev] Erasing FE.KEYID = 1
1,241,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,428 UART: [ldev] --
1,280,826 UART: [fwproc] Wait for Commands...
1,281,451 UART: [fwproc] Recv command 0x46574c44
1,282,184 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,536 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,812 >>> mbox cmd response: success
2,786,053 UART: [afmc] ++
2,786,221 UART: [afmc] CDI.KEYID = 6
2,786,584 UART: [afmc] SUBJECT.KEYID = 7
2,787,010 UART: [afmc] AUTHORITY.KEYID = 5
2,822,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,762 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,491 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,374 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,093 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,052 UART: [afmc] --
2,866,032 UART: [cold-reset] --
2,866,790 UART: [state] Locking Datavault
2,867,913 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,517 UART: [state] Locking ICCM
2,869,145 UART: [exit] Launching FMC @ 0x40000130
2,874,474 UART:
2,874,490 UART: Running Caliptra FMC ...
2,874,898 UART:
2,874,952 UART: [state] CFI Enabled
2,885,123 UART: [fht] FMC Alias Private Key: 7
2,993,452 UART: [art] Extend RT PCRs Done
2,993,880 UART: [art] Lock RT PCRs Done
2,995,428 UART: [art] Populate DV Done
3,003,491 UART: [fht] FMC Alias Private Key: 7
3,004,459 UART: [art] Derive CDI
3,004,739 UART: [art] Store in in slot 0x4
3,090,500 UART: [art] Derive Key Pair
3,090,860 UART: [art] Store priv key in slot 0x5
3,104,104 UART: [art] Derive Key Pair - Done
3,119,095 UART: [art] Signing Cert with AUTHO
3,119,575 UART: RITY.KEYID = 7
3,134,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,668 UART: [art] PUB.X = 01B9B92F4668CB4F54B448F171CD8CF800C69EC71F9269F1154C6D2141CE8CCD00DD7FC3645538807B280B9D8F1BE113
3,142,394 UART: [art] PUB.Y = EF2CBA3E8521C1E874BD620BABD298A9A1FFD11E87E8BFB313B1EFB8BD40FFA80645B8D51AD2795FD2CAE1ABF954DDBC
3,149,374 UART: [art] SIG.R = A6D504995B5A127669F3A8DDBB76FFEAA628AD889FA15235F7847AD16ABDEE2963F1FBC24A7F07DCE27C87C62F36F281
3,156,156 UART: [art] SIG.S = 0074F11D789B790B7D966ADD51B6D4C96D8D4833568E9A23D5CE916FF52F4D3CE7C948C292E5B29B6F6A57D9129431FB
3,180,008 UART: Caliptra RT
3,180,261 UART: [state] CFI Enabled
3,288,723 UART: [rt] RT listening for mailbox commands...
3,289,386 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,189 UART: [rt]cmd =0x46504c54, len=4
3,320,276 >>> mbox cmd response data (8 bytes)
3,320,429 UART: [rt] FIPS self test
3,320,757 UART: [kat] ++
3,320,909 UART: [kat] sha1
3,325,005 UART: [kat] SHA2-256
3,327,027 UART: [kat] SHA2-384
3,327,897 UART: Fatal Error: 0x90020001
3,329,447 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,329,452 >>> mbox cmd response: failed
3,329,452 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,329,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,170,115 UART: [fht] FHT @ 0x50003400
1,172,893 UART: [idev] ++
1,173,061 UART: [idev] CDI.KEYID = 6
1,173,422 UART: [idev] SUBJECT.KEYID = 7
1,173,847 UART: [idev] UDS.KEYID = 0
1,174,193 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,199,251 UART: [idev] Sha1 KeyId Algorithm
1,208,187 UART: [idev] --
1,209,388 UART: [ldev] ++
1,209,556 UART: [ldev] CDI.KEYID = 6
1,209,920 UART: [ldev] SUBJECT.KEYID = 5
1,210,347 UART: [ldev] AUTHORITY.KEYID = 7
1,210,810 UART: [ldev] FE.KEYID = 1
1,215,982 UART: [ldev] Erasing FE.KEYID = 1
1,242,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,154 UART: [ldev] --
1,281,598 UART: [fwproc] Wait for Commands...
1,282,299 UART: [fwproc] Recv command 0x46574c44
1,283,032 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,918 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,288 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,020 ready_for_fw is high
1,056,020 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,002 >>> mbox cmd response: success
2,696,838 UART:
2,696,854 UART: Running Caliptra FMC ...
2,697,262 UART:
2,697,316 UART: [state] CFI Enabled
2,707,479 UART: [fht] FMC Alias Private Key: 7
2,815,578 UART: [art] Extend RT PCRs Done
2,816,006 UART: [art] Lock RT PCRs Done
2,817,048 UART: [art] Populate DV Done
2,825,245 UART: [fht] FMC Alias Private Key: 7
2,826,225 UART: [art] Derive CDI
2,826,505 UART: [art] Store in in slot 0x4
2,911,986 UART: [art] Derive Key Pair
2,912,346 UART: [art] Store priv key in slot 0x5
2,925,246 UART: [art] Derive Key Pair - Done
2,940,270 UART: [art] Signing Cert with AUTHO
2,940,750 UART: RITY.KEYID = 7
2,956,054 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,819 UART: [art] PUB.X = 4B5C94B20FB41244B77D9A0CFE3B947AEBB49C0C5C0DDB135456B1F9D3710EC80D9CEEC929C9A30BF4EE4A30E87D0B97
2,963,587 UART: [art] PUB.Y = F1F949F6F26C8938D1D20EAA945F2C6006C06FB74E50C3A09A5E359BD6623733725685FC2766AB6DA2C8AF1519C3E73D
2,970,537 UART: [art] SIG.R = 0BD7FFFAB6DA60AB385454CF636F5577F609CBBCA62FD5B62BC303B89D24E9E2AF6E4331EB443E941FF9E421922E8127
2,977,314 UART: [art] SIG.S = 102CE0B394271A6B183390CA0E73316367319858074483866BAF77914817378985BB6C56588907B30B80FE1FF31F93BD
3,000,551 UART: Caliptra RT
3,000,804 UART: [state] CFI Enabled
3,108,063 UART: [rt] RT listening for mailbox commands...
3,108,726 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,769 UART: [rt]cmd =0x46504c54, len=4
3,139,954 >>> mbox cmd response data (8 bytes)
3,140,071 UART: [rt] FIPS self test
3,140,399 UART: [kat] ++
3,140,551 UART: [kat] sha1
3,144,877 UART: [kat] SHA2-256
3,146,899 UART: [kat] SHA2-384
3,147,871 UART: Fatal Error: 0x90020001
3,149,421 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,149,426 >>> mbox cmd response: failed
3,149,426 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,149,431 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,910 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,444 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,359 UART: [kat] SHA2-512-ACC
906,260 UART: [kat] ECC-384
916,459 UART: [kat] HMAC-384Kdf
921,209 UART: [kat] LMS
1,169,521 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,736 UART: [fht] FHT @ 0x50003400
1,173,550 UART: [idev] ++
1,173,718 UART: [idev] CDI.KEYID = 6
1,174,079 UART: [idev] SUBJECT.KEYID = 7
1,174,504 UART: [idev] UDS.KEYID = 0
1,174,850 ready_for_fw is high
1,174,850 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,658 UART: [idev] Erasing UDS.KEYID = 0
1,200,204 UART: [idev] Sha1 KeyId Algorithm
1,209,224 UART: [idev] --
1,210,453 UART: [ldev] ++
1,210,621 UART: [ldev] CDI.KEYID = 6
1,210,985 UART: [ldev] SUBJECT.KEYID = 5
1,211,412 UART: [ldev] AUTHORITY.KEYID = 7
1,211,875 UART: [ldev] FE.KEYID = 1
1,217,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,557 UART: [ldev] --
1,282,867 UART: [fwproc] Wait for Commands...
1,283,662 UART: [fwproc] Recv command 0x46574c44
1,284,395 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,407 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,613 >>> mbox cmd response: success
2,789,840 UART: [afmc] ++
2,790,008 UART: [afmc] CDI.KEYID = 6
2,790,371 UART: [afmc] SUBJECT.KEYID = 7
2,790,797 UART: [afmc] AUTHORITY.KEYID = 5
2,825,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,963 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,692 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,575 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,294 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,261 UART: [afmc] --
2,869,157 UART: [cold-reset] --
2,870,065 UART: [state] Locking Datavault
2,871,166 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,770 UART: [state] Locking ICCM
2,872,432 UART: [exit] Launching FMC @ 0x40000130
2,877,761 UART:
2,877,777 UART: Running Caliptra FMC ...
2,878,185 UART:
2,878,328 UART: [state] CFI Enabled
2,888,589 UART: [fht] FMC Alias Private Key: 7
2,996,782 UART: [art] Extend RT PCRs Done
2,997,210 UART: [art] Lock RT PCRs Done
2,998,446 UART: [art] Populate DV Done
3,006,671 UART: [fht] FMC Alias Private Key: 7
3,007,755 UART: [art] Derive CDI
3,008,035 UART: [art] Store in in slot 0x4
3,093,906 UART: [art] Derive Key Pair
3,094,266 UART: [art] Store priv key in slot 0x5
3,108,382 UART: [art] Derive Key Pair - Done
3,123,115 UART: [art] Signing Cert with AUTHO
3,123,595 UART: RITY.KEYID = 7
3,138,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,552 UART: [art] PUB.X = BDC9B2051EC8D9C9917DD44453FF6C67C980998F74875A3344609AD4CD5928C1B11A4E7EC7AE7893C6E35DFBEAE9618B
3,146,331 UART: [art] PUB.Y = 8EC257DA8F5B375772EC2C7ACB6EE0CDB02C22C2F940E724AA2DB3BED053528AD2332E9CADEF65A10F86F3429C1CD40E
3,153,299 UART: [art] SIG.R = F60D5B5AB9D32B232BE46AE9027A0830817D3102582F6655FC876C8B0D5A3721D8C635EC90621FB90DBA2CC1B2A80045
3,160,033 UART: [art] SIG.S = D2E8A7F9832205BC9F18B4ECADB60F86A51D9DC5938E7E76F50740063C77534A3D24D4CD6706ABC652CB9B6FA5C7AE8D
3,184,013 UART: Caliptra RT
3,184,358 UART: [state] CFI Enabled
3,291,476 UART: [rt] RT listening for mailbox commands...
3,292,139 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,886 UART: [rt]cmd =0x46504c54, len=4
3,323,195 >>> mbox cmd response data (8 bytes)
3,323,544 UART: [rt] FIPS self test
3,323,872 UART: [kat] ++
3,324,024 UART: [kat] sha1
3,328,240 UART: [kat] SHA2-256
3,330,262 UART: [kat] SHA2-384
3,331,220 UART: Fatal Error: 0x90020001
3,332,770 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,775 >>> mbox cmd response: failed
3,332,775 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,894 UART: [kat] ++
896,046 UART: [kat] sha1
900,304 UART: [kat] SHA2-256
902,244 UART: [kat] SHA2-384
904,961 UART: [kat] SHA2-512-ACC
906,862 UART: [kat] ECC-384
916,647 UART: [kat] HMAC-384Kdf
921,281 UART: [kat] LMS
1,169,593 UART: [kat] --
1,170,432 UART: [cold-reset] ++
1,170,916 UART: [fht] FHT @ 0x50003400
1,173,382 UART: [idev] ++
1,173,550 UART: [idev] CDI.KEYID = 6
1,173,911 UART: [idev] SUBJECT.KEYID = 7
1,174,336 UART: [idev] UDS.KEYID = 0
1,174,682 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,884 UART: [idev] Erasing UDS.KEYID = 0
1,199,294 UART: [idev] Sha1 KeyId Algorithm
1,208,286 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,011 UART: [ldev] --
1,281,497 UART: [fwproc] Wait for Commands...
1,282,302 UART: [fwproc] Recv command 0x46574c44
1,283,035 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,442 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,751 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,101 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,303 ready_for_fw is high
1,055,303 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,063 >>> mbox cmd response: success
2,698,401 UART:
2,698,417 UART: Running Caliptra FMC ...
2,698,825 UART:
2,698,968 UART: [state] CFI Enabled
2,709,977 UART: [fht] FMC Alias Private Key: 7
2,817,834 UART: [art] Extend RT PCRs Done
2,818,262 UART: [art] Lock RT PCRs Done
2,819,878 UART: [art] Populate DV Done
2,828,075 UART: [fht] FMC Alias Private Key: 7
2,829,235 UART: [art] Derive CDI
2,829,515 UART: [art] Store in in slot 0x4
2,915,408 UART: [art] Derive Key Pair
2,915,768 UART: [art] Store priv key in slot 0x5
2,928,522 UART: [art] Derive Key Pair - Done
2,942,962 UART: [art] Signing Cert with AUTHO
2,943,442 UART: RITY.KEYID = 7
2,959,066 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,831 UART: [art] PUB.X = 6ECF9888E5BE15DD8146721F2ABF58BF19BC5AE7F5DDC7628B65EED8F34D201D8FB637CD442B2F6208ADB86A60DCF09D
2,966,622 UART: [art] PUB.Y = 28B2AD63B81FCC01955EC1377A17A2633E5B55DDB6A0EC4769811F7C108E0B3FD82337566CAC65BDBAAD0221D2C9A6FE
2,973,579 UART: [art] SIG.R = 10E368CA5DFD1EA247D31BC1259EBB4DCE79714CB05FC94EB6022028D93F0B196A4057A83E1904158D568DE9C2E6DFD5
2,980,352 UART: [art] SIG.S = B49DC39C5C9EFB0FD8584DFE16571A59B3E9E7C91F9BF75E5DC06550C1D845E47D3DB8FAF37E14CCD46C4944E5CFEBEC
3,003,602 UART: Caliptra RT
3,003,947 UART: [state] CFI Enabled
3,111,364 UART: [rt] RT listening for mailbox commands...
3,112,027 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,930 UART: [rt]cmd =0x46504c54, len=4
3,143,103 >>> mbox cmd response data (8 bytes)
3,143,232 UART: [rt] FIPS self test
3,143,560 UART: [kat] ++
3,143,712 UART: [kat] sha1
3,148,032 UART: [kat] SHA2-256
3,150,054 UART: [kat] SHA2-384
3,150,928 UART: Fatal Error: 0x90020001
3,152,478 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,483 >>> mbox cmd response: failed
3,152,483 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,152,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,941 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,399 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,687,815 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,832,050 >>> mbox cmd response: failed
2,832,616 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,976,343 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
4,866,019 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,430,367 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,684,818 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,829,005 >>> mbox cmd response: failed
2,829,573 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
2,972,909 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
4,868,877 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,438,275 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,034,864 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,179,187 >>> mbox cmd response: failed
3,179,756 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,323,067 >>> mbox cmd response: failed
Initializing fuses
1,021 writing to cptra_bootfsm_go
21,582,693 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,023,780 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,040,468 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,184,687 >>> mbox cmd response: failed
3,185,235 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
3,328,540 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
21,586,261 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
35,045,274 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
2,705,742 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,850,577 >>> mbox cmd response: failed
2,851,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,995,005 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,453,534 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,285,526 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,687,321 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,832,117 >>> mbox cmd response: failed
2,832,688 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,976,710 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,454,938 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,275,536 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,055,304 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,199,958 >>> mbox cmd response: failed
3,200,522 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,344,255 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,189,225 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,922,293 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,058,276 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,202,739 >>> mbox cmd response: failed
3,203,305 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,347,042 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,182,408 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,915,635 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
2,702,109 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,846,760 >>> mbox cmd response: failed
2,847,314 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,991,056 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,456,285 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,305,444 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,053,963 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,198,445 >>> mbox cmd response: failed
3,199,013 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,342,741 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
20,190,865 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
30,941,547 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,145 >>> mbox cmd response: failed
811,145 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,846 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,121 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,129 >>> mbox cmd response: failed
812,129 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,135 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,245 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,645,906 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,976 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,984 >>> mbox cmd response: failed
811,984 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,990 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,676 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,650,737 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,136 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,144 >>> mbox cmd response: failed
812,144 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,150 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,398 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,741 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,551 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,559 >>> mbox cmd response: failed
811,559 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,565 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,377 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,888 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,267 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,275 >>> mbox cmd response: failed
811,275 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,629 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,471 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,962 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,970 >>> mbox cmd response: failed
811,970 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,494 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,641 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,666 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,674 >>> mbox cmd response: failed
811,674 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,583 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,147 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,155 >>> mbox cmd response: failed
812,155 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,646,874 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,041 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,049 >>> mbox cmd response: failed
812,049 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,613 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,160 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,814 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,822 >>> mbox cmd response: failed
811,822 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
811,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,210 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,647,615 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,024 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,032 >>> mbox cmd response: failed
812,032 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
812,038 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "d18bf5b386bb69b306bc1e321b71996c53fe113d6828a69350264f1cd8188af560df05e6d2fbbf97ae2445ebc9945440",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,518 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,648,611 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,159 UART:
192,675 UART: Running Caliptra ROM ...
193,817 UART:
193,985 UART: [state] CFI Enabled
263,638 UART: [state] LifecycleState = Unprovisioned
265,625 UART: [state] DebugLocked = No
267,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,031 UART: [kat] SHA2-256
442,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,237 UART: [kat] ++
453,727 UART: [kat] sha1
465,033 UART: [kat] SHA2-256
467,694 UART: [kat] SHA2-384
474,184 UART: [kat] SHA2-512-ACC
476,554 UART: [kat] ECC-384
2,770,273 UART: [kat] HMAC-384Kdf
2,800,913 UART: [kat] LMS
3,991,185 UART: [kat] --
3,994,997 UART: [cold-reset] ++
3,996,320 UART: [fht] Storing FHT @ 0x50003400
4,007,670 UART: [idev] ++
4,008,251 UART: [idev] CDI.KEYID = 6
4,009,140 UART: [idev] SUBJECT.KEYID = 7
4,010,464 UART: [idev] UDS.KEYID = 0
4,011,394 ready_for_fw is high
4,011,619 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,156,345 UART: [idev] Erasing UDS.KEYID = 0
7,349,475 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,600 UART: [idev] --
7,374,607 UART: [ldev] ++
7,375,237 UART: [ldev] CDI.KEYID = 6
7,376,160 UART: [ldev] SUBJECT.KEYID = 5
7,377,322 UART: [ldev] AUTHORITY.KEYID = 7
7,378,616 UART: [ldev] FE.KEYID = 1
7,422,878 UART: [ldev] Erasing FE.KEYID = 1
10,753,322 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,671 UART: [ldev] --
13,117,401 UART: [fwproc] Waiting for Commands...
13,119,069 UART: [fwproc] Received command 0x46574c44
13,121,255 UART: [fwproc] Received Image of size 114996 bytes
17,182,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,784 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,703 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,649,297 >>> mbox cmd response: success
17,653,685 UART: [afmc] ++
17,654,281 UART: [afmc] CDI.KEYID = 6
17,655,165 UART: [afmc] SUBJECT.KEYID = 7
17,656,460 UART: [afmc] AUTHORITY.KEYID = 5
21,026,785 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,725 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,033 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,423 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,232 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,719 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,391,610 UART: [afmc] --
23,394,681 UART: [cold-reset] --
23,398,327 UART: [state] Locking Datavault
23,404,549 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,303 UART: [state] Locking ICCM
23,408,992 UART: [exit] Launching FMC @ 0x40000130
23,417,392 UART:
23,417,628 UART: Running Caliptra FMC ...
23,418,730 UART:
23,418,908 UART: [state] CFI Enabled
23,485,334 UART: [fht] FMC Alias Private Key: 7
25,822,751 UART: [art] Extend RT PCRs Done
25,823,976 UART: [art] Lock RT PCRs Done
25,825,806 UART: [art] Populate DV Done
25,831,333 UART: [fht] FMC Alias Private Key: 7
25,832,981 UART: [art] Derive CDI
25,833,718 UART: [art] Store in in slot 0x4
25,893,526 UART: [art] Derive Key Pair
25,894,571 UART: [art] Store priv key in slot 0x5
29,186,879 UART: [art] Derive Key Pair - Done
29,199,981 UART: [art] Signing Cert with AUTHO
29,201,283 UART: RITY.KEYID = 7
31,487,446 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,951 UART: [art] PUB.X = C9A0F8E87B7FDABDA780C2F62CA99714168091995350547F2520FDE43B6FB0B5FA1CC08AD181D29BFAD3E0F951F36682
31,496,209 UART: [art] PUB.Y = 1D771CAD4B83F1F4A2414E4C2AD1084127BA8D76BC330A6A5A2352243069A39C05E594FA1888AE005E542FA84FA62E0C
31,503,480 UART: [art] SIG.R = 459197B36CDAEE65AA17A6FBDE33F3781CEDAA2566C04C6422F4484711F9FFA7EA96F9A08D4F16BCEE7979B0281C6BB8
31,510,891 UART: [art] SIG.S = 75B19E7EF8E8CB7500D12D774ECD542202956FF44B49EA508A2B042D097C25594CD98BB91F31BDFFE14FCD55FB3BAC2F
32,816,012 UART: Caliptra RT
32,816,729 UART: [state] CFI Enabled
32,998,332 UART: [rt] RT listening for mailbox commands...
33,000,185 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,029,866 UART: [rt]cmd =0x46504c54, len=4
33,031,344 >>> mbox cmd response data (8 bytes)
33,032,475 UART: [rt] FIPS self test
33,033,431 UART: [kat] ++
33,033,886 UART: [kat] sha1
33,038,399 UART: [kat] SHA2-256
33,040,336 UART: [kat] SHA2-384
33,042,436 UART: Fatal Error: 0x90020002
33,077,829 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,222,292 >>> mbox cmd response: failed
33,222,932 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,367,139 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,076 UART:
190,368 UART: Running Caliptra ROM ...
191,482 UART:
191,628 UART: [state] CFI Enabled
250,979 UART: [state] LifecycleState = Unprovisioned
252,915 UART: [state] DebugLocked = No
255,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
260,904 UART: [kat] SHA2-256
430,584 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,100 UART: [kat] ++
441,549 UART: [kat] sha1
453,832 UART: [kat] SHA2-256
456,476 UART: [kat] SHA2-384
460,886 UART: [kat] SHA2-512-ACC
463,226 UART: [kat] ECC-384
2,755,970 UART: [kat] HMAC-384Kdf
2,785,783 UART: [kat] LMS
3,976,051 UART: [kat] --
3,979,158 UART: [cold-reset] ++
3,981,312 UART: [fht] Storing FHT @ 0x50003400
3,994,092 UART: [idev] ++
3,994,668 UART: [idev] CDI.KEYID = 6
3,995,610 UART: [idev] SUBJECT.KEYID = 7
3,996,824 UART: [idev] UDS.KEYID = 0
3,998,393 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,143,169 UART: [idev] Erasing UDS.KEYID = 0
7,332,937 UART: [idev] Using Sha1 for KeyId Algorithm
7,355,889 UART: [idev] --
7,360,337 UART: [ldev] ++
7,360,913 UART: [ldev] CDI.KEYID = 6
7,361,884 UART: [ldev] SUBJECT.KEYID = 5
7,363,046 UART: [ldev] AUTHORITY.KEYID = 7
7,364,288 UART: [ldev] FE.KEYID = 1
7,410,426 UART: [ldev] Erasing FE.KEYID = 1
10,745,390 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,055,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,070,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,085,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,099,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,119,587 UART: [ldev] --
13,125,181 UART: [fwproc] Waiting for Commands...
13,127,495 UART: [fwproc] Received command 0x46574c44
13,129,686 UART: [fwproc] Received Image of size 114996 bytes
17,191,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,500 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,412 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,656,400 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,806,058 ready_for_fw is high
3,806,518 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,907,433 >>> mbox cmd response: success
23,587,443 UART:
23,587,849 UART: Running Caliptra FMC ...
23,589,003 UART:
23,589,177 UART: [state] CFI Enabled
23,658,625 UART: [fht] FMC Alias Private Key: 7
25,997,048 UART: [art] Extend RT PCRs Done
25,998,274 UART: [art] Lock RT PCRs Done
25,999,775 UART: [art] Populate DV Done
26,005,032 UART: [fht] FMC Alias Private Key: 7
26,006,637 UART: [art] Derive CDI
26,007,405 UART: [art] Store in in slot 0x4
26,067,159 UART: [art] Derive Key Pair
26,068,198 UART: [art] Store priv key in slot 0x5
29,360,292 UART: [art] Derive Key Pair - Done
29,373,616 UART: [art] Signing Cert with AUTHO
29,374,928 UART: RITY.KEYID = 7
31,661,640 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,166 UART: [art] PUB.X = 5DE826FB401DC236881A23DDB14727A05B2E690DE4E7D1CFDF375CB97C9328F83DEB0922EE98136F7A03F1FBE4457B7A
31,670,417 UART: [art] PUB.Y = 7ADDECCF804CDDD666CB475F3549C10E5F10E2FDDEB8055C8D2C57F268C5237D835ACC19FCCA538D31AFBEEFC10C1814
31,677,671 UART: [art] SIG.R = 21D37681B314625A0A34E57A67D98E87E685FDAAF35FD81B53A9E370F4FFC9CDB6F74B868AE3F59821F7C6F397EC72D6
31,685,067 UART: [art] SIG.S = D92451A35971D53D54D79A443BAD31832CF5F98B8280F322AE0BBB3A9E93A1E91F063C78FAAF2A0867FB00476EEFBEE2
32,990,258 UART: Caliptra RT
32,990,958 UART: [state] CFI Enabled
33,150,832 UART: [rt] RT listening for mailbox commands...
33,152,718 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,182,613 UART: [rt]cmd =0x46504c54, len=4
33,184,014 >>> mbox cmd response data (8 bytes)
33,185,240 UART: [rt] FIPS self test
33,186,186 UART: [kat] ++
33,186,636 UART: [kat] sha1
33,191,037 UART: [kat] SHA2-256
33,192,970 UART: [kat] SHA2-384
33,195,396 UART: Fatal Error: 0x90020002
33,230,627 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,375,056 >>> mbox cmd response: failed
33,375,632 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,519,983 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
3,795,830 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,895,661 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,576 UART:
192,936 UART: Running Caliptra ROM ...
194,133 UART:
603,987 UART: [state] CFI Enabled
617,215 UART: [state] LifecycleState = Unprovisioned
619,152 UART: [state] DebugLocked = No
621,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,053 UART: [kat] SHA2-256
795,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,378 UART: [kat] ++
806,854 UART: [kat] sha1
816,876 UART: [kat] SHA2-256
819,602 UART: [kat] SHA2-384
825,190 UART: [kat] SHA2-512-ACC
827,532 UART: [kat] ECC-384
3,112,522 UART: [kat] HMAC-384Kdf
3,124,423 UART: [kat] LMS
4,314,472 UART: [kat] --
4,318,000 UART: [cold-reset] ++
4,320,159 UART: [fht] Storing FHT @ 0x50003400
4,332,136 UART: [idev] ++
4,332,773 UART: [idev] CDI.KEYID = 6
4,333,692 UART: [idev] SUBJECT.KEYID = 7
4,334,939 UART: [idev] UDS.KEYID = 0
4,335,900 ready_for_fw is high
4,336,137 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,480,679 UART: [idev] Erasing UDS.KEYID = 0
7,620,704 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,838 UART: [idev] --
7,647,558 UART: [ldev] ++
7,648,143 UART: [ldev] CDI.KEYID = 6
7,649,115 UART: [ldev] SUBJECT.KEYID = 5
7,650,350 UART: [ldev] AUTHORITY.KEYID = 7
7,651,586 UART: [ldev] FE.KEYID = 1
7,663,965 UART: [ldev] Erasing FE.KEYID = 1
10,954,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,283 UART: [ldev] --
13,315,423 UART: [fwproc] Waiting for Commands...
13,318,557 UART: [fwproc] Received command 0x46574c44
13,320,745 UART: [fwproc] Received Image of size 114996 bytes
17,388,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,466,557 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,535,429 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,856,423 >>> mbox cmd response: success
17,860,447 UART: [afmc] ++
17,861,039 UART: [afmc] CDI.KEYID = 6
17,861,953 UART: [afmc] SUBJECT.KEYID = 7
17,863,165 UART: [afmc] AUTHORITY.KEYID = 5
21,177,891 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,471,618 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,473,874 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,488,249 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,503,089 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,517,514 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,538,349 UART: [afmc] --
23,541,999 UART: [cold-reset] --
23,546,514 UART: [state] Locking Datavault
23,549,647 UART: [state] Locking PCR0, PCR1 and PCR31
23,551,408 UART: [state] Locking ICCM
23,552,644 UART: [exit] Launching FMC @ 0x40000130
23,561,000 UART:
23,561,245 UART: Running Caliptra FMC ...
23,562,347 UART:
23,562,508 UART: [state] CFI Enabled
23,570,232 UART: [fht] FMC Alias Private Key: 7
25,900,954 UART: [art] Extend RT PCRs Done
25,902,195 UART: [art] Lock RT PCRs Done
25,903,711 UART: [art] Populate DV Done
25,908,966 UART: [fht] FMC Alias Private Key: 7
25,910,504 UART: [art] Derive CDI
25,911,319 UART: [art] Store in in slot 0x4
25,953,975 UART: [art] Derive Key Pair
25,955,009 UART: [art] Store priv key in slot 0x5
29,196,706 UART: [art] Derive Key Pair - Done
29,209,769 UART: [art] Signing Cert with AUTHO
29,211,082 UART: RITY.KEYID = 7
31,491,275 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,787 UART: [art] PUB.X = D2D410482F4F5106D6C645DA488E44B7C937AF5630996F38721F3E1D84A9659C6810248500A31144C2E91DB87EF74920
31,499,994 UART: [art] PUB.Y = 65757829EF6690B44D061C9FF124CC37AD8919BF19D579667A9A9E4F9E576D09A63863E8155BFF08F0A5A7B18C5822FB
31,507,235 UART: [art] SIG.R = DC4B1B094A4A1CC09F7471BD751F8F0E2253D5378DAEEA1563EFE1AF6632A66BA78CA2D628CCB67014C30D75A2241C03
31,514,632 UART: [art] SIG.S = E7D2FB7234AB92083EEE15011CC08F0351A8D1A024C50F487FA796869888F9ACA4CC710985DBCC27BC1B18DF21AAF0C7
32,820,116 UART: Caliptra RT
32,820,831 UART: [state] CFI Enabled
32,939,094 UART: [rt] RT listening for mailbox commands...
32,940,945 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,970,576 UART: [rt]cmd =0x46504c54, len=4
32,972,048 >>> mbox cmd response data (8 bytes)
32,973,067 UART: [rt] FIPS self test
32,974,013 UART: [kat] ++
32,974,466 UART: [kat] sha1
32,978,815 UART: [kat] SHA2-256
32,980,740 UART: [kat] SHA2-384
32,982,697 UART: Fatal Error: 0x90020002
33,018,107 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,162,527 >>> mbox cmd response: failed
33,163,168 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,307,508 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
189,990 UART:
190,279 UART: Running Caliptra ROM ...
191,310 UART:
7,212,750 UART: [state] CFI Enabled
7,223,079 UART: [state] LifecycleState = Unprovisioned
7,224,998 UART: [state] DebugLocked = No
7,226,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,231,449 UART: [kat] SHA2-256
7,401,244 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,411,786 UART: [kat] ++
7,412,333 UART: [kat] sha1
7,424,468 UART: [kat] SHA2-256
7,427,161 UART: [kat] SHA2-384
7,432,121 UART: [kat] SHA2-512-ACC
7,434,524 UART: [kat] ECC-384
9,719,722 UART: [kat] HMAC-384Kdf
9,730,651 UART: [kat] LMS
10,920,817 UART: [kat] --
10,926,381 UART: [cold-reset] ++
10,927,934 UART: [fht] Storing FHT @ 0x50003400
10,937,897 UART: [idev] ++
10,938,469 UART: [idev] CDI.KEYID = 6
10,939,429 UART: [idev] SUBJECT.KEYID = 7
10,940,641 UART: [idev] UDS.KEYID = 0
10,942,201 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
11,086,576 UART: [idev] Erasing UDS.KEYID = 0
14,224,325 UART: [idev] Using Sha1 for KeyId Algorithm
14,246,186 UART: [idev] --
14,251,718 UART: [ldev] ++
14,252,302 UART: [ldev] CDI.KEYID = 6
14,253,264 UART: [ldev] SUBJECT.KEYID = 5
14,254,483 UART: [ldev] AUTHORITY.KEYID = 7
14,255,715 UART: [ldev] FE.KEYID = 1
14,265,283 UART: [ldev] Erasing FE.KEYID = 1
17,551,726 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,843,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,858,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,873,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,887,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,908,329 UART: [ldev] --
19,912,513 UART: [fwproc] Waiting for Commands...
19,915,282 UART: [fwproc] Received command 0x46574c44
19,917,515 UART: [fwproc] Received Image of size 114996 bytes
23,981,197 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,054,697 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,123,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
24,444,679 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
4,127,316 ready_for_fw is high
4,127,785 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,084,189 >>> mbox cmd response: success
23,720,559 UART:
23,720,950 UART: Running Caliptra FMC ...
23,722,263 UART:
23,722,431 UART: [state] CFI Enabled
23,730,208 UART: [fht] FMC Alias Private Key: 7
26,060,723 UART: [art] Extend RT PCRs Done
26,061,946 UART: [art] Lock RT PCRs Done
26,063,359 UART: [art] Populate DV Done
26,068,572 UART: [fht] FMC Alias Private Key: 7
26,070,116 UART: [art] Derive CDI
26,070,935 UART: [art] Store in in slot 0x4
26,113,219 UART: [art] Derive Key Pair
26,114,259 UART: [art] Store priv key in slot 0x5
29,356,132 UART: [art] Derive Key Pair - Done
29,369,256 UART: [art] Signing Cert with AUTHO
29,370,595 UART: RITY.KEYID = 7
31,650,015 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,524 UART: [art] PUB.X = 508228F8E3E2FF822DE2A78CB849D6A7A21690A6D5676FD443D00247AC9A65C407BB0420BE828C752E6C7940FB4581F3
31,658,794 UART: [art] PUB.Y = 47B57D4FB2BCCA2A3E660BE9CCA98F6C2CF8B9FB095516C09B7C58EE1FE074E155B421A3B0B954AB781B1B338602A7F4
31,666,055 UART: [art] SIG.R = EF3779FC0787FFF98D8C698903521126B163ECE9B763506B1898F42B565B3E10A41E809463C7317F8DDFB9D05E675D88
31,673,404 UART: [art] SIG.S = 494C0D06537431B2342FEF05D9CF679BDEF7D688A1DA11471D04D95CC4986895C3850862A67325E64230F8FA0D1A1AA8
32,979,158 UART: Caliptra RT
32,979,879 UART: [state] CFI Enabled
33,098,549 UART: [rt] RT listening for mailbox commands...
33,100,397 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,129,978 UART: [rt]cmd =0x46504c54, len=4
33,131,748 >>> mbox cmd response data (8 bytes)
33,132,858 UART: [rt] FIPS self test
33,133,858 UART: [kat] ++
33,134,314 UART: [kat] sha1
33,138,625 UART: [kat] SHA2-256
33,140,566 UART: [kat] SHA2-384
33,142,881 UART: Fatal Error: 0x90020002
33,178,100 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,322,519 >>> mbox cmd response: failed
33,323,167 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
33,467,545 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
10,591,433 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
24,546,155 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,258 UART:
192,631 UART: Running Caliptra ROM ...
193,799 UART:
193,969 UART: [state] CFI Enabled
261,564 UART: [state] LifecycleState = Unprovisioned
263,435 UART: [state] DebugLocked = No
265,111 UART: [state] WD Timer not started. Device not locked for debugging
268,427 UART: [kat] SHA2-256
447,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,130 UART: [kat] ++
459,671 UART: [kat] sha1
471,274 UART: [kat] SHA2-256
474,288 UART: [kat] SHA2-384
480,282 UART: [kat] SHA2-512-ACC
483,290 UART: [kat] ECC-384
2,948,656 UART: [kat] HMAC-384Kdf
2,964,356 UART: [kat] LMS
3,493,795 UART: [kat] --
3,499,144 UART: [cold-reset] ++
3,500,822 UART: [fht] FHT @ 0x50003400
3,513,086 UART: [idev] ++
3,513,656 UART: [idev] CDI.KEYID = 6
3,514,578 UART: [idev] SUBJECT.KEYID = 7
3,515,757 UART: [idev] UDS.KEYID = 0
3,516,683 ready_for_fw is high
3,516,925 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,662,076 UART: [idev] Erasing UDS.KEYID = 0
6,023,901 UART: [idev] Sha1 KeyId Algorithm
6,046,775 UART: [idev] --
6,049,567 UART: [ldev] ++
6,050,154 UART: [ldev] CDI.KEYID = 6
6,051,066 UART: [ldev] SUBJECT.KEYID = 5
6,052,233 UART: [ldev] AUTHORITY.KEYID = 7
6,053,522 UART: [ldev] FE.KEYID = 1
6,091,118 UART: [ldev] Erasing FE.KEYID = 1
8,593,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,359 UART: [ldev] --
10,404,623 UART: [fwproc] Wait for Commands...
10,406,990 UART: [fwproc] Recv command 0x46574c44
10,409,114 UART: [fwproc] Recv'd Img size: 115304 bytes
13,827,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,923 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,288,701 >>> mbox cmd response: success
14,292,089 UART: [afmc] ++
14,292,681 UART: [afmc] CDI.KEYID = 6
14,293,575 UART: [afmc] SUBJECT.KEYID = 7
14,294,692 UART: [afmc] AUTHORITY.KEYID = 5
16,819,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,543,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,545,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,561,339 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,577,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,593,284 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,616,171 UART: [afmc] --
18,619,063 UART: [cold-reset] --
18,623,249 UART: [state] Locking Datavault
18,629,305 UART: [state] Locking PCR0, PCR1 and PCR31
18,630,959 UART: [state] Locking ICCM
18,633,380 UART: [exit] Launching FMC @ 0x40000130
18,641,779 UART:
18,642,017 UART: Running Caliptra FMC ...
18,643,122 UART:
18,643,306 UART: [state] CFI Enabled
18,701,345 UART: [fht] FMC Alias Private Key: 7
20,465,616 UART: [art] Extend RT PCRs Done
20,466,835 UART: [art] Lock RT PCRs Done
20,468,730 UART: [art] Populate DV Done
20,474,142 UART: [fht] FMC Alias Private Key: 7
20,475,800 UART: [art] Derive CDI
20,476,621 UART: [art] Store in in slot 0x4
20,534,470 UART: [art] Derive Key Pair
20,535,507 UART: [art] Store priv key in slot 0x5
22,998,863 UART: [art] Derive Key Pair - Done
23,012,027 UART: [art] Signing Cert with AUTHO
23,013,346 UART: RITY.KEYID = 7
24,724,193 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,707 UART: [art] PUB.X = E331E9810AE595E144345832C86FB3892161AB01E16F2846468455224883C170E8D289A21DFDECE81818980E1EFF9CEA
24,732,918 UART: [art] PUB.Y = ADB1EA22D4F42EB537D786F431540FF22476A0752DB31914A0EB2F6C8C5384A791B9718C283CA64F3D6091A6519472F3
24,740,171 UART: [art] SIG.R = E0BF5DDBDF5E0D72738053C3EDAE8991BC8A82B59E370EFAF6AD397CC6A6C9B9933041F29F5F73691F6AEA8230B107FF
24,747,568 UART: [art] SIG.S = 0EBF86038573D3CC4D2F1E10AF0A138F28033CF1F1EB2900D9625B43A7D60A5F670A1913E64773E407C29D53253FCE52
25,726,262 UART: Caliptra RT
25,726,978 UART: [state] CFI Enabled
25,892,618 UART: [rt] RT listening for mailbox commands...
25,894,468 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,924,306 UART: [rt]cmd =0x46504c54, len=4
25,925,996 >>> mbox cmd response data (8 bytes)
25,927,014 UART: [rt] FIPS self test
25,927,963 UART: [kat] ++
25,928,415 UART: [kat] sha1
25,932,708 UART: [kat] SHA2-256
25,934,585 UART: [kat] SHA2-384
25,936,627 UART: Fatal Error: 0x90020002
25,971,947 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,116,822 >>> mbox cmd response: failed
26,117,467 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,262,060 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,102 UART:
190,396 UART: Running Caliptra ROM ...
191,453 UART:
191,592 UART: [state] CFI Enabled
251,795 UART: [state] LifecycleState = Unprovisioned
253,654 UART: [state] DebugLocked = No
256,246 UART: [state] WD Timer not started. Device not locked for debugging
260,621 UART: [kat] SHA2-256
439,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
451,301 UART: [kat] ++
451,747 UART: [kat] sha1
462,838 UART: [kat] SHA2-256
465,863 UART: [kat] SHA2-384
473,465 UART: [kat] SHA2-512-ACC
476,454 UART: [kat] ECC-384
2,937,539 UART: [kat] HMAC-384Kdf
2,958,678 UART: [kat] LMS
3,488,101 UART: [kat] --
3,492,812 UART: [cold-reset] ++
3,493,887 UART: [fht] FHT @ 0x50003400
3,503,789 UART: [idev] ++
3,504,363 UART: [idev] CDI.KEYID = 6
3,505,271 UART: [idev] SUBJECT.KEYID = 7
3,506,484 UART: [idev] UDS.KEYID = 0
3,507,997 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,653,038 UART: [idev] Erasing UDS.KEYID = 0
6,015,180 UART: [idev] Sha1 KeyId Algorithm
6,036,911 UART: [idev] --
6,040,927 UART: [ldev] ++
6,041,511 UART: [ldev] CDI.KEYID = 6
6,042,423 UART: [ldev] SUBJECT.KEYID = 5
6,043,586 UART: [ldev] AUTHORITY.KEYID = 7
6,044,824 UART: [ldev] FE.KEYID = 1
6,086,153 UART: [ldev] Erasing FE.KEYID = 1
8,589,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,474 UART: [ldev] --
10,402,901 UART: [fwproc] Wait for Commands...
10,405,923 UART: [fwproc] Recv command 0x46574c44
10,408,024 UART: [fwproc] Recv'd Img size: 115304 bytes
13,825,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,223 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,288,943 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,359,213 ready_for_fw is high
3,359,653 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,045,522 >>> mbox cmd response: success
18,327,243 UART:
18,327,686 UART: Running Caliptra FMC ...
18,328,808 UART:
18,328,969 UART: [state] CFI Enabled
18,393,224 UART: [fht] FMC Alias Private Key: 7
20,157,544 UART: [art] Extend RT PCRs Done
20,158,774 UART: [art] Lock RT PCRs Done
20,160,348 UART: [art] Populate DV Done
20,165,957 UART: [fht] FMC Alias Private Key: 7
20,167,499 UART: [art] Derive CDI
20,168,327 UART: [art] Store in in slot 0x4
20,225,859 UART: [art] Derive Key Pair
20,226,896 UART: [art] Store priv key in slot 0x5
22,690,145 UART: [art] Derive Key Pair - Done
22,703,470 UART: [art] Signing Cert with AUTHO
22,704,787 UART: RITY.KEYID = 7
24,415,207 UART: [art] Erasing AUTHORITY.KEYID = 7
24,416,712 UART: [art] PUB.X = BDA2BACF11BDC79274137D0D5D98939A3E7B9FC86237DF61229F7FD464003B0909C7F5C263A15C179B37333DB8EB2B1D
24,423,975 UART: [art] PUB.Y = A0F31CC2194BE1CC0ABD368B6524BA77DC373D838A7D70DB858463ACED6AFD33473E80993566334FCD94AC323E2E91C5
24,431,301 UART: [art] SIG.R = 238572A6260708524AD0046BC670925C7C24CEC0D6A94782C81FEAD74B6B370972798657A4DBFBEC98A8398230D4A07C
24,438,697 UART: [art] SIG.S = CDFB7397CDB9752FFB2B671A64BBCEAD970B0BF8DEEB7B4F57F9347544876F242D3685CFF64C0CE98B97DE7858B69A00
25,417,590 UART: Caliptra RT
25,418,306 UART: [state] CFI Enabled
25,583,171 UART: [rt] RT listening for mailbox commands...
25,585,038 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,615,001 UART: [rt]cmd =0x46504c54, len=4
25,616,527 >>> mbox cmd response data (8 bytes)
25,617,696 UART: [rt] FIPS self test
25,618,644 UART: [kat] ++
25,619,097 UART: [kat] sha1
25,623,608 UART: [kat] SHA2-256
25,625,555 UART: [kat] SHA2-384
25,627,611 UART: Fatal Error: 0x90020002
25,662,977 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,807,867 >>> mbox cmd response: failed
25,808,584 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,953,310 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,349,051 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,038,416 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,432 UART:
192,807 UART: Running Caliptra ROM ...
193,978 UART:
603,699 UART: [state] CFI Enabled
619,574 UART: [state] LifecycleState = Unprovisioned
621,391 UART: [state] DebugLocked = No
624,129 UART: [state] WD Timer not started. Device not locked for debugging
628,004 UART: [kat] SHA2-256
807,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,730 UART: [kat] ++
819,258 UART: [kat] sha1
830,024 UART: [kat] SHA2-256
833,073 UART: [kat] SHA2-384
840,282 UART: [kat] SHA2-512-ACC
843,292 UART: [kat] ECC-384
3,286,694 UART: [kat] HMAC-384Kdf
3,300,501 UART: [kat] LMS
3,830,003 UART: [kat] --
3,835,951 UART: [cold-reset] ++
3,837,031 UART: [fht] FHT @ 0x50003400
3,848,445 UART: [idev] ++
3,849,021 UART: [idev] CDI.KEYID = 6
3,849,938 UART: [idev] SUBJECT.KEYID = 7
3,851,117 UART: [idev] UDS.KEYID = 0
3,852,067 ready_for_fw is high
3,852,299 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,997,154 UART: [idev] Erasing UDS.KEYID = 0
6,321,843 UART: [idev] Sha1 KeyId Algorithm
6,346,104 UART: [idev] --
6,349,905 UART: [ldev] ++
6,350,481 UART: [ldev] CDI.KEYID = 6
6,351,390 UART: [ldev] SUBJECT.KEYID = 5
6,352,605 UART: [ldev] AUTHORITY.KEYID = 7
6,353,839 UART: [ldev] FE.KEYID = 1
6,364,055 UART: [ldev] Erasing FE.KEYID = 1
8,836,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,641 UART: [ldev] --
10,625,095 UART: [fwproc] Wait for Commands...
10,627,621 UART: [fwproc] Recv command 0x46574c44
10,629,663 UART: [fwproc] Recv'd Img size: 115304 bytes
14,046,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,120,577 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,189,382 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,510,239 >>> mbox cmd response: success
14,514,969 UART: [afmc] ++
14,515,560 UART: [afmc] CDI.KEYID = 6
14,516,474 UART: [afmc] SUBJECT.KEYID = 7
14,517,636 UART: [afmc] AUTHORITY.KEYID = 5
17,019,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,740,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,742,310 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,758,083 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,774,116 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,789,938 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,812,251 UART: [afmc] --
18,815,629 UART: [cold-reset] --
18,819,064 UART: [state] Locking Datavault
18,824,367 UART: [state] Locking PCR0, PCR1 and PCR31
18,826,158 UART: [state] Locking ICCM
18,827,129 UART: [exit] Launching FMC @ 0x40000130
18,835,528 UART:
18,835,774 UART: Running Caliptra FMC ...
18,836,881 UART:
18,837,042 UART: [state] CFI Enabled
18,844,933 UART: [fht] FMC Alias Private Key: 7
20,602,809 UART: [art] Extend RT PCRs Done
20,604,028 UART: [art] Lock RT PCRs Done
20,605,387 UART: [art] Populate DV Done
20,610,655 UART: [fht] FMC Alias Private Key: 7
20,612,140 UART: [art] Derive CDI
20,612,899 UART: [art] Store in in slot 0x4
20,655,870 UART: [art] Derive Key Pair
20,656,869 UART: [art] Store priv key in slot 0x5
23,083,607 UART: [art] Derive Key Pair - Done
23,096,937 UART: [art] Signing Cert with AUTHO
23,098,246 UART: RITY.KEYID = 7
24,803,795 UART: [art] Erasing AUTHORITY.KEYID = 7
24,805,303 UART: [art] PUB.X = 74F5695CC46A45C9719F3365A2B6B8713F6301469D8A185C9FD8BB147CEE8806E1CF3E47B849D52603EAFA1393041AB3
24,812,571 UART: [art] PUB.Y = BADC016419D4C14B0C337E7EE65DCCA3915B563A602A7210B974C2BD34EB9E294DC51BA0CB93472BF3A971E1F324CAF2
24,819,863 UART: [art] SIG.R = D6AFBA93250461ABCBC46E0E1D0105231044C5A92C41EC73C3AB200C34D5E9CE09A151FEC2E1DE7B447078FACC0194A4
24,827,303 UART: [art] SIG.S = C7E25DBE07A70DEA1882A49963683276CB6C4E931B71606ADE0EEC23EB832516FA5305DAB46612993FE939CD05CAE259
25,806,608 UART: Caliptra RT
25,807,304 UART: [state] CFI Enabled
25,924,203 UART: [rt] RT listening for mailbox commands...
25,926,068 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,955,599 UART: [rt]cmd =0x46504c54, len=4
25,957,103 >>> mbox cmd response data (8 bytes)
25,958,501 UART: [rt] FIPS self test
25,959,446 UART: [kat] ++
25,959,897 UART: [kat] sha1
25,964,243 UART: [kat] SHA2-256
25,966,169 UART: [kat] SHA2-384
25,968,642 UART: Fatal Error: 0x90020002
26,003,843 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,148,620 >>> mbox cmd response: failed
26,149,228 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,294,004 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,131 UART:
190,453 UART: Running Caliptra ROM ...
191,562 UART:
14,229,575 UART: [state] CFI Enabled
14,247,018 UART: [state] LifecycleState = Unprovisioned
14,248,882 UART: [state] DebugLocked = No
14,250,271 UART: [state] WD Timer not started. Device not locked for debugging
14,253,582 UART: [kat] SHA2-256
14,432,689 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,444,289 UART: [kat] ++
14,444,746 UART: [kat] sha1
14,455,683 UART: [kat] SHA2-256
14,458,740 UART: [kat] SHA2-384
14,463,922 UART: [kat] SHA2-512-ACC
14,466,866 UART: [kat] ECC-384
16,909,877 UART: [kat] HMAC-384Kdf
16,923,741 UART: [kat] LMS
17,453,263 UART: [kat] --
17,458,177 UART: [cold-reset] ++
17,459,239 UART: [fht] FHT @ 0x50003400
17,471,109 UART: [idev] ++
17,471,666 UART: [idev] CDI.KEYID = 6
17,472,602 UART: [idev] SUBJECT.KEYID = 7
17,473,809 UART: [idev] UDS.KEYID = 0
17,475,363 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
17,620,200 UART: [idev] Erasing UDS.KEYID = 0
19,946,884 UART: [idev] Sha1 KeyId Algorithm
19,970,606 UART: [idev] --
19,974,833 UART: [ldev] ++
19,975,411 UART: [ldev] CDI.KEYID = 6
19,976,293 UART: [ldev] SUBJECT.KEYID = 5
19,977,500 UART: [ldev] AUTHORITY.KEYID = 7
19,978,735 UART: [ldev] FE.KEYID = 1
19,990,778 UART: [ldev] Erasing FE.KEYID = 1
22,463,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,183,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,199,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,215,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,231,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,250,704 UART: [ldev] --
24,255,438 UART: [fwproc] Wait for Commands...
24,258,562 UART: [fwproc] Recv command 0x46574c44
24,260,657 UART: [fwproc] Recv'd Img size: 115304 bytes
27,676,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,757,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,826,795 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
28,148,036 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,700,466 ready_for_fw is high
3,700,903 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,283,482 >>> mbox cmd response: success
18,534,343 UART:
18,534,734 UART: Running Caliptra FMC ...
18,535,844 UART:
18,536,004 UART: [state] CFI Enabled
18,543,667 UART: [fht] FMC Alias Private Key: 7
20,300,785 UART: [art] Extend RT PCRs Done
20,302,029 UART: [art] Lock RT PCRs Done
20,303,782 UART: [art] Populate DV Done
20,308,804 UART: [fht] FMC Alias Private Key: 7
20,310,399 UART: [art] Derive CDI
20,311,220 UART: [art] Store in in slot 0x4
20,354,203 UART: [art] Derive Key Pair
20,355,254 UART: [art] Store priv key in slot 0x5
22,781,941 UART: [art] Derive Key Pair - Done
22,794,733 UART: [art] Signing Cert with AUTHO
22,796,045 UART: RITY.KEYID = 7
24,501,625 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,110 UART: [art] PUB.X = 0331BA773F099427EAFF783CCDB9B6813B06C743DE91586340062B977656FD960F83FF22DF8831E6FDA551812A6EB4F1
24,510,383 UART: [art] PUB.Y = 3969E1F5A6788E731BD8E9A5B6FDF8CD8FC71782F6A5C6E470F9CC1D3A1A506028F681D0BCA7CB836F5E48E360BD3481
24,517,676 UART: [art] SIG.R = 9CE26CAC1DD344E2B5D4A3E46DD0A119E9DC6F3C774AB0DC2A85378B2FE9C4FF331EDA0F17E15F49DD382EB229024A6B
24,525,097 UART: [art] SIG.S = 252FE04D57CD5389AE45EA4BFE5AEE26F096C3399FFFE3614F695411FB594E4E300E1B0F7C33E2E8FFAFB0CC6BC7C507
25,504,170 UART: Caliptra RT
25,504,889 UART: [state] CFI Enabled
25,623,266 UART: [rt] RT listening for mailbox commands...
25,625,124 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,654,601 UART: [rt]cmd =0x46504c54, len=4
25,656,184 >>> mbox cmd response data (8 bytes)
25,657,332 UART: [rt] FIPS self test
25,658,277 UART: [kat] ++
25,658,727 UART: [kat] sha1
25,663,184 UART: [kat] SHA2-256
25,665,112 UART: [kat] SHA2-384
25,667,581 UART: Fatal Error: 0x90020002
25,702,987 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,847,817 >>> mbox cmd response: failed
25,848,504 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
25,993,074 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
17,630,593 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,223,156 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,438,397 ready_for_fw is high
3,438,827 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,747,490 >>> mbox cmd response: success
19,031,042 UART:
19,031,491 UART: Running Caliptra FMC ...
19,032,617 UART:
19,032,786 UART: [state] CFI Enabled
19,097,061 UART: [fht] FMC Alias Private Key: 7
20,860,972 UART: [art] Extend RT PCRs Done
20,862,199 UART: [art] Lock RT PCRs Done
20,863,909 UART: [art] Populate DV Done
20,869,656 UART: [fht] FMC Alias Private Key: 7
20,871,107 UART: [art] Derive CDI
20,872,032 UART: [art] Store in in slot 0x4
20,929,691 UART: [art] Derive Key Pair
20,930,759 UART: [art] Store priv key in slot 0x5
23,394,075 UART: [art] Derive Key Pair - Done
23,406,862 UART: [art] Signing Cert with AUTHO
23,408,174 UART: RITY.KEYID = 7
25,120,089 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,616 UART: [art] PUB.X = 95AFEDDD2894753844504606997EF4053AA6BC64E38F25CA4006AE316A6B6DA7BF188E305B2E69CD7B362E997AD70BFE
25,128,842 UART: [art] PUB.Y = F2ADEA0E89389AEDCF654DAAE0B345C152EAA31EC4FCF2B1D0C159FC055494D7F713B728B56F2239A53D835CD9BAC13F
25,136,093 UART: [art] SIG.R = 29DE1739B5C419A5D6164D8A94B53AA2428679B468600968D55A1389A30620270A41D39FF39324D9180C59A691B32064
25,143,446 UART: [art] SIG.S = BE858E531FD53CA021B58264D026051BFA57E962B8BFE272B9D7FF3CE72874C5AB60319CF056CCA542C513013BAA0B95
26,121,980 UART: Caliptra RT
26,122,679 UART: [state] CFI Enabled
26,288,001 UART: [rt] RT listening for mailbox commands...
26,289,998 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,319,727 UART: [rt]cmd =0x46504c54, len=4
26,321,203 >>> mbox cmd response data (8 bytes)
26,322,371 UART: [rt] FIPS self test
26,323,337 UART: [kat] ++
26,323,784 UART: [kat] sha1
26,328,128 UART: [kat] SHA2-256
26,330,059 UART: [kat] SHA2-384
26,332,539 UART: Fatal Error: 0x90020002
26,367,713 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,512,535 >>> mbox cmd response: failed
26,513,226 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,658,027 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,429,698 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,755,247 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,711 writing to cptra_bootfsm_go
3,759,405 ready_for_fw is high
3,759,979 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,981,330 >>> mbox cmd response: success
19,237,233 UART:
19,237,632 UART: Running Caliptra FMC ...
19,238,790 UART:
19,238,952 UART: [state] CFI Enabled
19,246,416 UART: [fht] FMC Alias Private Key: 7
21,003,244 UART: [art] Extend RT PCRs Done
21,004,475 UART: [art] Lock RT PCRs Done
21,006,375 UART: [art] Populate DV Done
21,012,030 UART: [fht] FMC Alias Private Key: 7
21,013,576 UART: [art] Derive CDI
21,014,395 UART: [art] Store in in slot 0x4
21,057,111 UART: [art] Derive Key Pair
21,058,155 UART: [art] Store priv key in slot 0x5
23,484,423 UART: [art] Derive Key Pair - Done
23,497,203 UART: [art] Signing Cert with AUTHO
23,498,510 UART: RITY.KEYID = 7
25,203,787 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,287 UART: [art] PUB.X = 6968D6131CDCC90C634FE5F9871F52F11BA87943EB34ED673AF8E982B27A9B89018E4A0343844B86569A3E8C35CB5AC0
25,212,532 UART: [art] PUB.Y = 2021C47B8173258BECD8C481BB037EF8AF340DF19ADA6537B0ABF3B93A0EE051D8CDB721F95D50B3B1A1A6515E44E779
25,219,829 UART: [art] SIG.R = A87965855C834F91A1A6FA387A0B7E4B461B521D9546AF863290966FCDEB6DB43E5B295CF1B575793F1ECCF2D558D68D
25,227,205 UART: [art] SIG.S = E937751305A20C3C4B36896CE1C9577673EF5F3AE6F035074601A0C289E9F653DC7394EDE6A095D6724B08D0A0CB6C6D
26,205,930 UART: Caliptra RT
26,206,622 UART: [state] CFI Enabled
26,324,180 UART: [rt] RT listening for mailbox commands...
26,326,046 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,355,843 UART: [rt]cmd =0x46504c54, len=4
26,357,367 >>> mbox cmd response data (8 bytes)
26,358,408 UART: [rt] FIPS self test
26,359,346 UART: [kat] ++
26,359,796 UART: [kat] sha1
26,364,497 UART: [kat] SHA2-256
26,366,429 UART: [kat] SHA2-384
26,368,629 UART: Fatal Error: 0x90020002
26,404,554 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,549,280 >>> mbox cmd response: failed
26,549,879 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
26,694,671 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
16,993,386 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
28,225,277 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
86,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,725 UART: [kat] SHA2-256
881,656 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,771 UART: [kat] ++
885,923 UART: [kat] sha1
890,177 UART: [kat] SHA2-256
892,115 UART: [kat] SHA2-384
894,714 UART: [kat] SHA2-512-ACC
896,615 UART: [kat] ECC-384
902,308 UART: [kat] HMAC-384Kdf
906,752 UART: [kat] LMS
1,474,948 UART: [kat] --
1,475,903 UART: [cold-reset] ++
1,476,329 UART: [fht] Storing FHT @ 0x50003400
1,479,112 UART: [idev] ++
1,479,280 UART: [idev] CDI.KEYID = 6
1,479,640 UART: [idev] SUBJECT.KEYID = 7
1,480,064 UART: [idev] UDS.KEYID = 0
1,480,409 ready_for_fw is high
1,480,409 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,487,988 UART: [idev] Erasing UDS.KEYID = 0
1,504,438 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,972 UART: [idev] --
1,513,985 UART: [ldev] ++
1,514,153 UART: [ldev] CDI.KEYID = 6
1,514,516 UART: [ldev] SUBJECT.KEYID = 5
1,514,942 UART: [ldev] AUTHORITY.KEYID = 7
1,515,405 UART: [ldev] FE.KEYID = 1
1,520,577 UART: [ldev] Erasing FE.KEYID = 1
1,546,036 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,918 UART: [ldev] --
1,585,187 UART: [fwproc] Waiting for Commands...
1,585,888 UART: [fwproc] Received command 0x46574c44
1,586,679 UART: [fwproc] Received Image of size 115304 bytes
2,895,620 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,194 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,546 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,089,851 >>> mbox cmd response: success
3,090,877 UART: [afmc] ++
3,091,045 UART: [afmc] CDI.KEYID = 6
3,091,407 UART: [afmc] SUBJECT.KEYID = 7
3,091,832 UART: [afmc] AUTHORITY.KEYID = 5
3,126,321 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,763 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,648 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,338 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,285 UART: [afmc] --
3,169,385 UART: [cold-reset] --
3,170,233 UART: [state] Locking Datavault
3,171,316 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,920 UART: [state] Locking ICCM
3,172,444 UART: [exit] Launching FMC @ 0x40000130
3,177,773 UART:
3,177,789 UART: Running Caliptra FMC ...
3,178,197 UART:
3,178,251 UART: [state] CFI Enabled
3,188,704 UART: [fht] FMC Alias Private Key: 7
3,296,705 UART: [art] Extend RT PCRs Done
3,297,133 UART: [art] Lock RT PCRs Done
3,298,507 UART: [art] Populate DV Done
3,306,482 UART: [fht] FMC Alias Private Key: 7
3,307,588 UART: [art] Derive CDI
3,307,868 UART: [art] Store in in slot 0x4
3,393,831 UART: [art] Derive Key Pair
3,394,191 UART: [art] Store priv key in slot 0x5
3,407,405 UART: [art] Derive Key Pair - Done
3,421,896 UART: [art] Signing Cert with AUTHO
3,422,376 UART: RITY.KEYID = 7
3,437,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,481 UART: [art] PUB.X = 03CC2C13164E572303ABC63461D6127DBDC745143689762DA4551E94657D519143C6CA51A229F2D29DE076BF42C1C5CC
3,445,243 UART: [art] PUB.Y = 395BCB29B947814AF082534FDFB02201E760A4662A88928E0BECC988B32961393DF932769D565D9945453B98164808A7
3,452,172 UART: [art] SIG.R = C97C82C5E005A6E3FF51E4A63EA4250C24813A20E8107BE58FEEFDBA07234BBA0FC29BABF6F4463E857063FB66D4975B
3,458,946 UART: [art] SIG.S = B736E214FD157987703DB82180FE708C563D485C6B75E06938DEBEADDAE44D6295BA44C4906CE8E327E3B23CAC995BF8
3,482,463 UART: Caliptra RT
3,482,716 UART: [state] CFI Enabled
3,590,560 UART: [rt] RT listening for mailbox commands...
3,591,223 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,994 UART: [rt]cmd =0x46504c54, len=4
3,621,999 >>> mbox cmd response data (8 bytes)
3,622,188 UART: [rt] FIPS self test
3,622,516 UART: [kat] ++
3,622,668 UART: [kat] sha1
3,627,034 UART: [kat] SHA2-256
3,629,056 UART: [kat] SHA2-384
3,631,815 UART: Fatal Error: 0x90020002
3,633,365 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,633,370 >>> mbox cmd response: failed
3,633,370 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,633,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,475 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,411 UART: [kat] SHA2-256
892,349 UART: [kat] SHA2-384
895,212 UART: [kat] SHA2-512-ACC
897,113 UART: [kat] ECC-384
902,686 UART: [kat] HMAC-384Kdf
907,400 UART: [kat] LMS
1,475,596 UART: [kat] --
1,476,777 UART: [cold-reset] ++
1,477,237 UART: [fht] Storing FHT @ 0x50003400
1,480,016 UART: [idev] ++
1,480,184 UART: [idev] CDI.KEYID = 6
1,480,544 UART: [idev] SUBJECT.KEYID = 7
1,480,968 UART: [idev] UDS.KEYID = 0
1,481,313 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,160 UART: [idev] Erasing UDS.KEYID = 0
1,506,008 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,736 UART: [idev] --
1,515,673 UART: [ldev] ++
1,515,841 UART: [ldev] CDI.KEYID = 6
1,516,204 UART: [ldev] SUBJECT.KEYID = 5
1,516,630 UART: [ldev] AUTHORITY.KEYID = 7
1,517,093 UART: [ldev] FE.KEYID = 1
1,522,159 UART: [ldev] Erasing FE.KEYID = 1
1,547,666 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,492 UART: [ldev] --
1,586,907 UART: [fwproc] Waiting for Commands...
1,587,776 UART: [fwproc] Received command 0x46574c44
1,588,567 UART: [fwproc] Received Image of size 115304 bytes
2,898,476 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,940 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,292 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,607 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,979 ready_for_fw is high
1,362,979 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,944,317 >>> mbox cmd response: success
3,006,005 UART:
3,006,021 UART: Running Caliptra FMC ...
3,006,429 UART:
3,006,483 UART: [state] CFI Enabled
3,016,732 UART: [fht] FMC Alias Private Key: 7
3,124,375 UART: [art] Extend RT PCRs Done
3,124,803 UART: [art] Lock RT PCRs Done
3,126,595 UART: [art] Populate DV Done
3,135,062 UART: [fht] FMC Alias Private Key: 7
3,136,114 UART: [art] Derive CDI
3,136,394 UART: [art] Store in in slot 0x4
3,222,135 UART: [art] Derive Key Pair
3,222,495 UART: [art] Store priv key in slot 0x5
3,235,803 UART: [art] Derive Key Pair - Done
3,250,405 UART: [art] Signing Cert with AUTHO
3,250,885 UART: RITY.KEYID = 7
3,266,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,766 UART: [art] PUB.X = 8CDC2816089C02CB78D1C0204ECB80FFC5E373009A9B733631DF5AAB164083969E91B29C71797FEFC1464A4496AF0050
3,273,488 UART: [art] PUB.Y = 27861642420C27BEB621F9F15C451F21BABBD77E80438FCD57A468DF98DE99E8383EE147358212394642A1BB4EECD0EC
3,280,441 UART: [art] SIG.R = A7B834BFD9C4579A7B8210279E783FFAD667F1230B33BED663A1FC95CCE860DFA5941C049675B8B731AABC4D10F130D3
3,287,217 UART: [art] SIG.S = 3A4715981B95D6940855D9F32BCF6B4785813EB52FFB899FED9D8FDBE482E58B8938B5BCB929004F3B999570145589BF
3,311,395 UART: Caliptra RT
3,311,648 UART: [state] CFI Enabled
3,419,747 UART: [rt] RT listening for mailbox commands...
3,420,410 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,437 UART: [rt]cmd =0x46504c54, len=4
3,451,528 >>> mbox cmd response data (8 bytes)
3,451,649 UART: [rt] FIPS self test
3,451,977 UART: [kat] ++
3,452,129 UART: [kat] sha1
3,456,421 UART: [kat] SHA2-256
3,458,443 UART: [kat] SHA2-384
3,461,484 UART: Fatal Error: 0x90020002
3,463,034 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,463,039 >>> mbox cmd response: failed
3,463,039 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,463,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,075 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,271 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,142 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,792 UART: [kat] SHA2-256
882,723 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,838 UART: [kat] ++
886,990 UART: [kat] sha1
891,404 UART: [kat] SHA2-256
893,342 UART: [kat] SHA2-384
895,937 UART: [kat] SHA2-512-ACC
897,838 UART: [kat] ECC-384
903,477 UART: [kat] HMAC-384Kdf
907,883 UART: [kat] LMS
1,476,079 UART: [kat] --
1,476,844 UART: [cold-reset] ++
1,477,240 UART: [fht] Storing FHT @ 0x50003400
1,479,901 UART: [idev] ++
1,480,069 UART: [idev] CDI.KEYID = 6
1,480,429 UART: [idev] SUBJECT.KEYID = 7
1,480,853 UART: [idev] UDS.KEYID = 0
1,481,198 ready_for_fw is high
1,481,198 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,069 UART: [idev] Erasing UDS.KEYID = 0
1,506,077 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,679 UART: [idev] --
1,515,776 UART: [ldev] ++
1,515,944 UART: [ldev] CDI.KEYID = 6
1,516,307 UART: [ldev] SUBJECT.KEYID = 5
1,516,733 UART: [ldev] AUTHORITY.KEYID = 7
1,517,196 UART: [ldev] FE.KEYID = 1
1,522,274 UART: [ldev] Erasing FE.KEYID = 1
1,548,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,277 UART: [ldev] --
1,587,582 UART: [fwproc] Waiting for Commands...
1,588,405 UART: [fwproc] Received command 0x46574c44
1,589,196 UART: [fwproc] Received Image of size 115304 bytes
2,898,499 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,274 >>> mbox cmd response: success
3,092,454 UART: [afmc] ++
3,092,622 UART: [afmc] CDI.KEYID = 6
3,092,984 UART: [afmc] SUBJECT.KEYID = 7
3,093,409 UART: [afmc] AUTHORITY.KEYID = 5
3,128,648 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,032 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,812 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,540 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,425 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,115 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,888 UART: [afmc] --
3,171,816 UART: [cold-reset] --
3,172,738 UART: [state] Locking Datavault
3,173,777 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,381 UART: [state] Locking ICCM
3,174,813 UART: [exit] Launching FMC @ 0x40000130
3,180,142 UART:
3,180,158 UART: Running Caliptra FMC ...
3,180,566 UART:
3,180,709 UART: [state] CFI Enabled
3,191,374 UART: [fht] FMC Alias Private Key: 7
3,299,095 UART: [art] Extend RT PCRs Done
3,299,523 UART: [art] Lock RT PCRs Done
3,301,277 UART: [art] Populate DV Done
3,309,456 UART: [fht] FMC Alias Private Key: 7
3,310,552 UART: [art] Derive CDI
3,310,832 UART: [art] Store in in slot 0x4
3,396,629 UART: [art] Derive Key Pair
3,396,989 UART: [art] Store priv key in slot 0x5
3,410,217 UART: [art] Derive Key Pair - Done
3,424,801 UART: [art] Signing Cert with AUTHO
3,425,281 UART: RITY.KEYID = 7
3,440,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,852 UART: [art] PUB.X = D96D0A158B9E458317459C6835A7E5FCA8B3C52332F8B6B47D84CDDCB1752972C43D4C27C1CC812CD2E9EF8478C13875
3,447,625 UART: [art] PUB.Y = CFA35F5808891441FAAB6C14DE7A000DC8F58559EBDEE0460FABF7E03F37F3C3DEE0404E8FF03CE1D84FF45FD282A98C
3,454,568 UART: [art] SIG.R = 8A9B256B66E83A31E5F521CC0571AE923C44B19A0E543830B9FABB704D5B04C03740FF10F7B761A5BAE1C337DCFDB553
3,461,341 UART: [art] SIG.S = 06385F83D22A168E707F36AA1BF7BAA4C52DE094C7F6274DF94C50E57180E8858020D07466888958F25CF30A910A03E6
3,484,870 UART: Caliptra RT
3,485,215 UART: [state] CFI Enabled
3,593,082 UART: [rt] RT listening for mailbox commands...
3,593,745 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,462 UART: [rt]cmd =0x46504c54, len=4
3,624,543 >>> mbox cmd response data (8 bytes)
3,624,710 UART: [rt] FIPS self test
3,625,038 UART: [kat] ++
3,625,190 UART: [kat] sha1
3,629,348 UART: [kat] SHA2-256
3,631,370 UART: [kat] SHA2-384
3,634,097 UART: Fatal Error: 0x90020002
3,635,647 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,635,652 >>> mbox cmd response: failed
3,635,652 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,635,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,997 UART: [state] LifecycleState = Unprovisioned
85,652 UART: [state] DebugLocked = No
86,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,968 UART: [kat] SHA2-256
881,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,014 UART: [kat] ++
886,166 UART: [kat] sha1
890,458 UART: [kat] SHA2-256
892,396 UART: [kat] SHA2-384
895,057 UART: [kat] SHA2-512-ACC
896,958 UART: [kat] ECC-384
902,351 UART: [kat] HMAC-384Kdf
907,157 UART: [kat] LMS
1,475,353 UART: [kat] --
1,476,390 UART: [cold-reset] ++
1,476,942 UART: [fht] Storing FHT @ 0x50003400
1,479,555 UART: [idev] ++
1,479,723 UART: [idev] CDI.KEYID = 6
1,480,083 UART: [idev] SUBJECT.KEYID = 7
1,480,507 UART: [idev] UDS.KEYID = 0
1,480,852 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,455 UART: [idev] Erasing UDS.KEYID = 0
1,505,533 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,009 UART: [idev] --
1,515,106 UART: [ldev] ++
1,515,274 UART: [ldev] CDI.KEYID = 6
1,515,637 UART: [ldev] SUBJECT.KEYID = 5
1,516,063 UART: [ldev] AUTHORITY.KEYID = 7
1,516,526 UART: [ldev] FE.KEYID = 1
1,521,460 UART: [ldev] Erasing FE.KEYID = 1
1,546,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,869 UART: [ldev] --
1,586,246 UART: [fwproc] Waiting for Commands...
1,586,935 UART: [fwproc] Received command 0x46574c44
1,587,726 UART: [fwproc] Received Image of size 115304 bytes
2,896,453 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,467 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,819 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,090,220 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,016 ready_for_fw is high
1,363,016 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,620 >>> mbox cmd response: success
3,002,844 UART:
3,002,860 UART: Running Caliptra FMC ...
3,003,268 UART:
3,003,411 UART: [state] CFI Enabled
3,013,804 UART: [fht] FMC Alias Private Key: 7
3,121,077 UART: [art] Extend RT PCRs Done
3,121,505 UART: [art] Lock RT PCRs Done
3,122,777 UART: [art] Populate DV Done
3,130,920 UART: [fht] FMC Alias Private Key: 7
3,131,940 UART: [art] Derive CDI
3,132,220 UART: [art] Store in in slot 0x4
3,218,387 UART: [art] Derive Key Pair
3,218,747 UART: [art] Store priv key in slot 0x5
3,231,733 UART: [art] Derive Key Pair - Done
3,246,371 UART: [art] Signing Cert with AUTHO
3,246,851 UART: RITY.KEYID = 7
3,261,957 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,722 UART: [art] PUB.X = 992D0959CCF2A47F4CD4522848187F1053B842B0EAF02AFE01240C7318F008CDFFEEED05AFC6A7AC3474927D87B10954
3,269,482 UART: [art] PUB.Y = 1AA8D34EA78A76674BF56E255331F100C795E406CBE8A3402E6C20F8DEBF643632DDF9EB60B6DF0028DC730BF35AFF47
3,276,396 UART: [art] SIG.R = 3041C1CF8E6EC955BADD0A59B2DC8D9242371DD95DD81F50A47E2A671E7F81149B5C4CB69F69741B8A429332C836C6DB
3,283,173 UART: [art] SIG.S = B1DBD87EEEDD123B40932550B1F97B720844755A4CCDFF5365111FF4311AFA951B6F03A258AFF7B147C9241E314650F5
3,307,408 UART: Caliptra RT
3,307,753 UART: [state] CFI Enabled
3,416,154 UART: [rt] RT listening for mailbox commands...
3,416,817 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,762 UART: [rt]cmd =0x46504c54, len=4
3,447,951 >>> mbox cmd response data (8 bytes)
3,448,274 UART: [rt] FIPS self test
3,448,602 UART: [kat] ++
3,448,754 UART: [kat] sha1
3,452,936 UART: [kat] SHA2-256
3,454,958 UART: [kat] SHA2-384
3,457,819 UART: Fatal Error: 0x90020002
3,459,369 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,459,374 >>> mbox cmd response: failed
3,459,374 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,459,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,616 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,941,792 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
893,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,211 UART: [kat] ++
897,363 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,178 UART: [kat] SHA2-512-ACC
908,079 UART: [kat] ECC-384
917,952 UART: [kat] HMAC-384Kdf
922,432 UART: [kat] LMS
1,170,760 UART: [kat] --
1,171,503 UART: [cold-reset] ++
1,171,897 UART: [fht] FHT @ 0x50003400
1,174,684 UART: [idev] ++
1,174,852 UART: [idev] CDI.KEYID = 6
1,175,212 UART: [idev] SUBJECT.KEYID = 7
1,175,636 UART: [idev] UDS.KEYID = 0
1,175,981 ready_for_fw is high
1,175,981 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,183,658 UART: [idev] Erasing UDS.KEYID = 0
1,200,711 UART: [idev] Sha1 KeyId Algorithm
1,209,123 UART: [idev] --
1,210,399 UART: [ldev] ++
1,210,567 UART: [ldev] CDI.KEYID = 6
1,210,930 UART: [ldev] SUBJECT.KEYID = 5
1,211,356 UART: [ldev] AUTHORITY.KEYID = 7
1,211,819 UART: [ldev] FE.KEYID = 1
1,217,247 UART: [ldev] Erasing FE.KEYID = 1
1,244,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,061 UART: [ldev] --
1,283,492 UART: [fwproc] Wait for Commands...
1,284,066 UART: [fwproc] Recv command 0x46574c44
1,284,794 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,531 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,778 >>> mbox cmd response: success
2,789,992 UART: [afmc] ++
2,790,160 UART: [afmc] CDI.KEYID = 6
2,790,522 UART: [afmc] SUBJECT.KEYID = 7
2,790,947 UART: [afmc] AUTHORITY.KEYID = 5
2,826,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,391 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,119 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,004 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,723 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,517 UART: [afmc] --
2,869,425 UART: [cold-reset] --
2,870,443 UART: [state] Locking Datavault
2,871,514 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,118 UART: [state] Locking ICCM
2,872,778 UART: [exit] Launching FMC @ 0x40000130
2,878,107 UART:
2,878,123 UART: Running Caliptra FMC ...
2,878,531 UART:
2,878,585 UART: [state] CFI Enabled
2,888,898 UART: [fht] FMC Alias Private Key: 7
2,996,793 UART: [art] Extend RT PCRs Done
2,997,221 UART: [art] Lock RT PCRs Done
2,998,697 UART: [art] Populate DV Done
3,006,834 UART: [fht] FMC Alias Private Key: 7
3,007,868 UART: [art] Derive CDI
3,008,148 UART: [art] Store in in slot 0x4
3,093,981 UART: [art] Derive Key Pair
3,094,341 UART: [art] Store priv key in slot 0x5
3,107,495 UART: [art] Derive Key Pair - Done
3,122,009 UART: [art] Signing Cert with AUTHO
3,122,489 UART: RITY.KEYID = 7
3,137,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,864 UART: [art] PUB.X = 78F46FD030702B133F740EAE155EC3DB0748A434FEEB9AFA13C0AF4CA549220C26A343D1F29924B5933A36AC2DF45F27
3,144,635 UART: [art] PUB.Y = 172BC1BC873ED43332B245ACA6349652EB772C06EF8FC1E2A0F507A7B4E85F1F93FA72494B612B9C5A2A3E92EFC1DEFB
3,151,597 UART: [art] SIG.R = 5888B47A8355386DEEFC93D87EF330595E06C6959A4176913C9F290BFA26D88F69672D1B438A772E3E2787B86B628C19
3,158,355 UART: [art] SIG.S = D861BD3610218996A68049224973B359AC6C4A6DB1D1A03F5086AA32AC990C76C72BE759866C5D3174282281107644D4
3,182,489 UART: Caliptra RT
3,182,742 UART: [state] CFI Enabled
3,290,109 UART: [rt] RT listening for mailbox commands...
3,290,772 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,443 UART: [rt]cmd =0x46504c54, len=4
3,321,396 >>> mbox cmd response data (8 bytes)
3,321,705 UART: [rt] FIPS self test
3,322,033 UART: [kat] ++
3,322,185 UART: [kat] sha1
3,326,447 UART: [kat] SHA2-256
3,328,469 UART: [kat] SHA2-384
3,330,896 UART: Fatal Error: 0x90020002
3,332,446 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,451 >>> mbox cmd response: failed
3,332,451 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,332,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
893,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,511 UART: [kat] ++
897,663 UART: [kat] sha1
901,967 UART: [kat] SHA2-256
903,907 UART: [kat] SHA2-384
906,740 UART: [kat] SHA2-512-ACC
908,641 UART: [kat] ECC-384
918,700 UART: [kat] HMAC-384Kdf
923,298 UART: [kat] LMS
1,171,626 UART: [kat] --
1,172,153 UART: [cold-reset] ++
1,172,669 UART: [fht] FHT @ 0x50003400
1,175,372 UART: [idev] ++
1,175,540 UART: [idev] CDI.KEYID = 6
1,175,900 UART: [idev] SUBJECT.KEYID = 7
1,176,324 UART: [idev] UDS.KEYID = 0
1,176,669 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,042 UART: [idev] Erasing UDS.KEYID = 0
1,200,843 UART: [idev] Sha1 KeyId Algorithm
1,209,325 UART: [idev] --
1,210,273 UART: [ldev] ++
1,210,441 UART: [ldev] CDI.KEYID = 6
1,210,804 UART: [ldev] SUBJECT.KEYID = 5
1,211,230 UART: [ldev] AUTHORITY.KEYID = 7
1,211,693 UART: [ldev] FE.KEYID = 1
1,216,887 UART: [ldev] Erasing FE.KEYID = 1
1,243,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,519 UART: [ldev] --
1,282,822 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,130 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,089 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,393 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,576 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,461 ready_for_fw is high
1,060,461 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,393 >>> mbox cmd response: success
2,699,269 UART:
2,699,285 UART: Running Caliptra FMC ...
2,699,693 UART:
2,699,747 UART: [state] CFI Enabled
2,710,378 UART: [fht] FMC Alias Private Key: 7
2,818,139 UART: [art] Extend RT PCRs Done
2,818,567 UART: [art] Lock RT PCRs Done
2,820,185 UART: [art] Populate DV Done
2,828,422 UART: [fht] FMC Alias Private Key: 7
2,829,532 UART: [art] Derive CDI
2,829,812 UART: [art] Store in in slot 0x4
2,915,501 UART: [art] Derive Key Pair
2,915,861 UART: [art] Store priv key in slot 0x5
2,928,357 UART: [art] Derive Key Pair - Done
2,942,976 UART: [art] Signing Cert with AUTHO
2,943,456 UART: RITY.KEYID = 7
2,958,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,319 UART: [art] PUB.X = 3BEB160BE40AC14333A2DD753B2AFA18C3977F959282A6FB5EE80425E39867D891043424EB189513B141BFEAE780F819
2,966,079 UART: [art] PUB.Y = EC592BFFD2A1121511BC6A015262A44B4389C0D665B641B66B1C882507F169076A941C6CADF5E24CBA2C350BC7765031
2,973,019 UART: [art] SIG.R = 03A4A22C7B1E9C530A5AA193F2517C31AC9EDB95D30605DAEDC29F06C9C93DC76E28A7C74DE67EA7876DA102B916F201
2,979,782 UART: [art] SIG.S = C28349DB8604ECF321694EFB68A436006DE56059BEEBA3B544333D9BD16FC9DFF5F5D0F724AADB9F8C478A2802B0032C
3,003,234 UART: Caliptra RT
3,003,487 UART: [state] CFI Enabled
3,111,762 UART: [rt] RT listening for mailbox commands...
3,112,425 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,242 UART: [rt]cmd =0x46504c54, len=4
3,143,289 >>> mbox cmd response data (8 bytes)
3,143,402 UART: [rt] FIPS self test
3,143,730 UART: [kat] ++
3,143,882 UART: [kat] sha1
3,148,012 UART: [kat] SHA2-256
3,150,034 UART: [kat] SHA2-384
3,152,561 UART: Fatal Error: 0x90020002
3,154,111 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,116 >>> mbox cmd response: failed
3,154,116 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,879 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,637,833 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,132 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
894,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,130 UART: [kat] ++
898,282 UART: [kat] sha1
902,650 UART: [kat] SHA2-256
904,590 UART: [kat] SHA2-384
907,305 UART: [kat] SHA2-512-ACC
909,206 UART: [kat] ECC-384
918,987 UART: [kat] HMAC-384Kdf
923,625 UART: [kat] LMS
1,171,953 UART: [kat] --
1,172,844 UART: [cold-reset] ++
1,173,252 UART: [fht] FHT @ 0x50003400
1,176,065 UART: [idev] ++
1,176,233 UART: [idev] CDI.KEYID = 6
1,176,593 UART: [idev] SUBJECT.KEYID = 7
1,177,017 UART: [idev] UDS.KEYID = 0
1,177,362 ready_for_fw is high
1,177,362 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,095 UART: [idev] Erasing UDS.KEYID = 0
1,202,470 UART: [idev] Sha1 KeyId Algorithm
1,210,918 UART: [idev] --
1,211,944 UART: [ldev] ++
1,212,112 UART: [ldev] CDI.KEYID = 6
1,212,475 UART: [ldev] SUBJECT.KEYID = 5
1,212,901 UART: [ldev] AUTHORITY.KEYID = 7
1,213,364 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,438 UART: [ldev] --
1,283,739 UART: [fwproc] Wait for Commands...
1,284,525 UART: [fwproc] Recv command 0x46574c44
1,285,253 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,300 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,604 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,788,863 >>> mbox cmd response: success
2,789,951 UART: [afmc] ++
2,790,119 UART: [afmc] CDI.KEYID = 6
2,790,481 UART: [afmc] SUBJECT.KEYID = 7
2,790,906 UART: [afmc] AUTHORITY.KEYID = 5
2,827,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,844,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,850,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,856,141 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,860 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,648 UART: [afmc] --
2,870,632 UART: [cold-reset] --
2,871,646 UART: [state] Locking Datavault
2,872,751 UART: [state] Locking PCR0, PCR1 and PCR31
2,873,355 UART: [state] Locking ICCM
2,873,851 UART: [exit] Launching FMC @ 0x40000130
2,879,180 UART:
2,879,196 UART: Running Caliptra FMC ...
2,879,604 UART:
2,879,747 UART: [state] CFI Enabled
2,890,224 UART: [fht] FMC Alias Private Key: 7
2,998,689 UART: [art] Extend RT PCRs Done
2,999,117 UART: [art] Lock RT PCRs Done
3,000,601 UART: [art] Populate DV Done
3,008,770 UART: [fht] FMC Alias Private Key: 7
3,009,836 UART: [art] Derive CDI
3,010,116 UART: [art] Store in in slot 0x4
3,095,871 UART: [art] Derive Key Pair
3,096,231 UART: [art] Store priv key in slot 0x5
3,109,935 UART: [art] Derive Key Pair - Done
3,124,509 UART: [art] Signing Cert with AUTHO
3,124,989 UART: RITY.KEYID = 7
3,140,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,141,082 UART: [art] PUB.X = D1049FFD4A66BE975E0123B1D14D26D976065F7436F10508EAEC62BF7D4D2337B2425B1196389CBD0D8CDEC90D920F1A
3,147,836 UART: [art] PUB.Y = 3D266EAFE4EC97D55B54CEF22346118AF598840B08CB94F07742C3B2726BAF3E39686DCA0426FC029AE324CCC74FA944
3,154,784 UART: [art] SIG.R = 92B5E8919FFCDC4CD6062D83AC729D9622919590B3890514658BFBB4B03819AADED33897CED45BE0B83FFBC4093A1582
3,161,553 UART: [art] SIG.S = 1D0554081B39D26EFF358B44C4764B2CD9C0EF1ABC30948B47321EAA714232F8833B830E18FC15C7370C7DD017845EFE
3,185,348 UART: Caliptra RT
3,185,693 UART: [state] CFI Enabled
3,293,132 UART: [rt] RT listening for mailbox commands...
3,293,795 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,386 UART: [rt]cmd =0x46504c54, len=4
3,324,491 >>> mbox cmd response data (8 bytes)
3,324,680 UART: [rt] FIPS self test
3,325,008 UART: [kat] ++
3,325,160 UART: [kat] sha1
3,329,554 UART: [kat] SHA2-256
3,331,576 UART: [kat] SHA2-384
3,334,287 UART: Fatal Error: 0x90020002
3,335,837 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,842 >>> mbox cmd response: failed
3,335,842 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,335,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
893,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,036 UART: [kat] ++
898,188 UART: [kat] sha1
902,500 UART: [kat] SHA2-256
904,440 UART: [kat] SHA2-384
907,331 UART: [kat] SHA2-512-ACC
909,232 UART: [kat] ECC-384
919,153 UART: [kat] HMAC-384Kdf
923,739 UART: [kat] LMS
1,172,067 UART: [kat] --
1,172,868 UART: [cold-reset] ++
1,173,320 UART: [fht] FHT @ 0x50003400
1,175,775 UART: [idev] ++
1,175,943 UART: [idev] CDI.KEYID = 6
1,176,303 UART: [idev] SUBJECT.KEYID = 7
1,176,727 UART: [idev] UDS.KEYID = 0
1,177,072 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,785 UART: [idev] Erasing UDS.KEYID = 0
1,201,782 UART: [idev] Sha1 KeyId Algorithm
1,210,412 UART: [idev] --
1,211,382 UART: [ldev] ++
1,211,550 UART: [ldev] CDI.KEYID = 6
1,211,913 UART: [ldev] SUBJECT.KEYID = 5
1,212,339 UART: [ldev] AUTHORITY.KEYID = 7
1,212,802 UART: [ldev] FE.KEYID = 1
1,218,336 UART: [ldev] Erasing FE.KEYID = 1
1,244,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,644 UART: [ldev] --
1,284,063 UART: [fwproc] Wait for Commands...
1,284,663 UART: [fwproc] Recv command 0x46574c44
1,285,391 UART: [fwproc] Recv'd Img size: 115304 bytes
2,595,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,130 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,507 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,108 ready_for_fw is high
1,061,108 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,584 >>> mbox cmd response: success
2,701,550 UART:
2,701,566 UART: Running Caliptra FMC ...
2,701,974 UART:
2,702,117 UART: [state] CFI Enabled
2,712,952 UART: [fht] FMC Alias Private Key: 7
2,820,837 UART: [art] Extend RT PCRs Done
2,821,265 UART: [art] Lock RT PCRs Done
2,822,741 UART: [art] Populate DV Done
2,830,846 UART: [fht] FMC Alias Private Key: 7
2,831,964 UART: [art] Derive CDI
2,832,244 UART: [art] Store in in slot 0x4
2,918,017 UART: [art] Derive Key Pair
2,918,377 UART: [art] Store priv key in slot 0x5
2,932,053 UART: [art] Derive Key Pair - Done
2,946,558 UART: [art] Signing Cert with AUTHO
2,947,038 UART: RITY.KEYID = 7
2,962,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,159 UART: [art] PUB.X = 924CAE817C1A7D3D502FF75B1EDC81911354553DE01A9D8435D832A984B29E0CF8414398BABBE93729803FD0C56AE729
2,969,930 UART: [art] PUB.Y = 1B0D16AACCCC1FE44F521AEA16CF48BFF1C2CB595440C873B211CF815511F7DDBDE9F08C40D0E3A27F60AF6CB8393A7C
2,976,903 UART: [art] SIG.R = 208732B91B09380C89F17E35E682C269CBBA05503F889B4F761204848683E170052836A1468C487400C6C92287EF1FAC
2,983,622 UART: [art] SIG.S = 46F4894AA7B6B0F3D58D74B97C6CD32B3FA116061AF3181024B1F63E517AD3631D3100FBCEF61B0856FDE94E58E041AE
3,007,293 UART: Caliptra RT
3,007,638 UART: [state] CFI Enabled
3,116,431 UART: [rt] RT listening for mailbox commands...
3,117,094 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,933 UART: [rt]cmd =0x46504c54, len=4
3,148,000 >>> mbox cmd response data (8 bytes)
3,148,247 UART: [rt] FIPS self test
3,148,575 UART: [kat] ++
3,148,727 UART: [kat] sha1
3,153,061 UART: [kat] SHA2-256
3,155,083 UART: [kat] SHA2-384
3,157,724 UART: Fatal Error: 0x90020002
3,159,274 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,279 >>> mbox cmd response: failed
3,159,279 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,159,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,656 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,639,102 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,035 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,903 UART: [kat] ++
895,055 UART: [kat] sha1
899,249 UART: [kat] SHA2-256
901,189 UART: [kat] SHA2-384
903,872 UART: [kat] SHA2-512-ACC
905,773 UART: [kat] ECC-384
915,228 UART: [kat] HMAC-384Kdf
919,932 UART: [kat] LMS
1,168,244 UART: [kat] --
1,169,065 UART: [cold-reset] ++
1,169,471 UART: [fht] FHT @ 0x50003400
1,172,301 UART: [idev] ++
1,172,469 UART: [idev] CDI.KEYID = 6
1,172,830 UART: [idev] SUBJECT.KEYID = 7
1,173,255 UART: [idev] UDS.KEYID = 0
1,173,601 ready_for_fw is high
1,173,601 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,369 UART: [idev] Erasing UDS.KEYID = 0
1,197,889 UART: [idev] Sha1 KeyId Algorithm
1,206,771 UART: [idev] --
1,207,846 UART: [ldev] ++
1,208,014 UART: [ldev] CDI.KEYID = 6
1,208,378 UART: [ldev] SUBJECT.KEYID = 5
1,208,805 UART: [ldev] AUTHORITY.KEYID = 7
1,209,268 UART: [ldev] FE.KEYID = 1
1,214,488 UART: [ldev] Erasing FE.KEYID = 1
1,240,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,216 UART: [ldev] --
1,279,522 UART: [fwproc] Wait for Commands...
1,280,113 UART: [fwproc] Recv command 0x46574c44
1,280,846 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,158 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,784,520 >>> mbox cmd response: success
2,785,627 UART: [afmc] ++
2,785,795 UART: [afmc] CDI.KEYID = 6
2,786,158 UART: [afmc] SUBJECT.KEYID = 7
2,786,584 UART: [afmc] AUTHORITY.KEYID = 5
2,821,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,262 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,991 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,874 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,593 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,252 UART: [afmc] --
2,864,190 UART: [cold-reset] --
2,865,102 UART: [state] Locking Datavault
2,866,325 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,929 UART: [state] Locking ICCM
2,867,393 UART: [exit] Launching FMC @ 0x40000130
2,872,722 UART:
2,872,738 UART: Running Caliptra FMC ...
2,873,146 UART:
2,873,200 UART: [state] CFI Enabled
2,883,745 UART: [fht] FMC Alias Private Key: 7
2,991,880 UART: [art] Extend RT PCRs Done
2,992,308 UART: [art] Lock RT PCRs Done
2,993,696 UART: [art] Populate DV Done
3,001,875 UART: [fht] FMC Alias Private Key: 7
3,002,823 UART: [art] Derive CDI
3,003,103 UART: [art] Store in in slot 0x4
3,088,858 UART: [art] Derive Key Pair
3,089,218 UART: [art] Store priv key in slot 0x5
3,102,294 UART: [art] Derive Key Pair - Done
3,117,013 UART: [art] Signing Cert with AUTHO
3,117,493 UART: RITY.KEYID = 7
3,132,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,288 UART: [art] PUB.X = 5208F176EF9C6CE33877EF3E21228E3CDF174274E5509B9B07A8100DB35CF57C23327AAAFFCC0753250F096671432324
3,140,038 UART: [art] PUB.Y = E1DC03953C01880A59B4A310BE12348000ADDBB0BDF2769D6DF4BB7E017CDCC65FEEEB983A6603874204236C54FC0CAB
3,146,961 UART: [art] SIG.R = 0AD4656E543EC3CE97A95AB643C14821A9E9EB4664306D0114E345B204070742D01CB620376A21A9A30100932BAE677A
3,153,685 UART: [art] SIG.S = 4A1C363A432EA66A0B03534FF468B581B465B8F3DCF50995F2B968CC468FB36AD23F00BD98AC96A99E15759E1EEB59DC
3,177,453 UART: Caliptra RT
3,177,706 UART: [state] CFI Enabled
3,284,721 UART: [rt] RT listening for mailbox commands...
3,285,384 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,275 UART: [rt]cmd =0x46504c54, len=4
3,316,266 >>> mbox cmd response data (8 bytes)
3,316,499 UART: [rt] FIPS self test
3,316,827 UART: [kat] ++
3,316,979 UART: [kat] sha1
3,321,299 UART: [kat] SHA2-256
3,323,321 UART: [kat] SHA2-384
3,325,964 UART: Fatal Error: 0x90020002
3,327,514 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,327,519 >>> mbox cmd response: failed
3,327,519 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,327,524 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,447 UART: [kat] ++
895,599 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,342 UART: [kat] HMAC-384Kdf
920,996 UART: [kat] LMS
1,169,308 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,399 UART: [fht] FHT @ 0x50003400
1,172,995 UART: [idev] ++
1,173,163 UART: [idev] CDI.KEYID = 6
1,173,524 UART: [idev] SUBJECT.KEYID = 7
1,173,949 UART: [idev] UDS.KEYID = 0
1,174,295 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,719 UART: [idev] Sha1 KeyId Algorithm
1,207,639 UART: [idev] --
1,208,708 UART: [ldev] ++
1,208,876 UART: [ldev] CDI.KEYID = 6
1,209,240 UART: [ldev] SUBJECT.KEYID = 5
1,209,667 UART: [ldev] AUTHORITY.KEYID = 7
1,210,130 UART: [ldev] FE.KEYID = 1
1,215,262 UART: [ldev] Erasing FE.KEYID = 1
1,241,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,936 UART: [ldev] --
1,280,390 UART: [fwproc] Wait for Commands...
1,281,207 UART: [fwproc] Recv command 0x46574c44
1,281,940 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,166 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,344 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,492 ready_for_fw is high
1,055,492 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,202 >>> mbox cmd response: success
2,696,958 UART:
2,696,974 UART: Running Caliptra FMC ...
2,697,382 UART:
2,697,436 UART: [state] CFI Enabled
2,707,947 UART: [fht] FMC Alias Private Key: 7
2,815,932 UART: [art] Extend RT PCRs Done
2,816,360 UART: [art] Lock RT PCRs Done
2,817,942 UART: [art] Populate DV Done
2,825,857 UART: [fht] FMC Alias Private Key: 7
2,826,789 UART: [art] Derive CDI
2,827,069 UART: [art] Store in in slot 0x4
2,912,826 UART: [art] Derive Key Pair
2,913,186 UART: [art] Store priv key in slot 0x5
2,926,158 UART: [art] Derive Key Pair - Done
2,940,965 UART: [art] Signing Cert with AUTHO
2,941,445 UART: RITY.KEYID = 7
2,956,657 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,422 UART: [art] PUB.X = B14B3582B9F7B978F4DC394308E437EB9EA7199F32D105D4409005E495CD9E097C03A0EEFDE051E671F9FAC3D50A7C72
2,964,182 UART: [art] PUB.Y = D601BBEB9F24E7511A7EE5750C2A9CC73B4DB2D586DFEBE9322C01DB843C9C9ACCFC3FD6860329BAC04712AF717808E8
2,971,137 UART: [art] SIG.R = E072C4936BF7B0D1977479E5407D5846C8A92ED045DCADFB51C43EE21FB0E2D3845D5C9BB8DDB87BB5CBE3BF56BC6924
2,977,927 UART: [art] SIG.S = BDBBEE5A67CF036F69D7949DF2E16611708C5F36C9B048B88EB6498CA9C5846DEEFA5ABD394F9749F70F0DB1689CC0B0
3,002,057 UART: Caliptra RT
3,002,310 UART: [state] CFI Enabled
3,110,424 UART: [rt] RT listening for mailbox commands...
3,111,087 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,182 UART: [rt]cmd =0x46504c54, len=4
3,142,585 >>> mbox cmd response data (8 bytes)
3,142,746 UART: [rt] FIPS self test
3,143,074 UART: [kat] ++
3,143,226 UART: [kat] sha1
3,147,514 UART: [kat] SHA2-256
3,149,536 UART: [kat] SHA2-384
3,152,363 UART: Fatal Error: 0x90020002
3,153,913 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,918 >>> mbox cmd response: failed
3,153,918 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,153,923 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,322 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,634,956 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,386 UART: [kat] ++
895,538 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,063 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,174,728 ready_for_fw is high
1,174,728 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,199,120 UART: [idev] Sha1 KeyId Algorithm
1,208,012 UART: [idev] --
1,208,871 UART: [ldev] ++
1,209,039 UART: [ldev] CDI.KEYID = 6
1,209,403 UART: [ldev] SUBJECT.KEYID = 5
1,209,830 UART: [ldev] AUTHORITY.KEYID = 7
1,210,293 UART: [ldev] FE.KEYID = 1
1,215,603 UART: [ldev] Erasing FE.KEYID = 1
1,241,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,523 UART: [ldev] --
1,280,873 UART: [fwproc] Wait for Commands...
1,281,494 UART: [fwproc] Recv command 0x46574c44
1,282,227 UART: [fwproc] Recv'd Img size: 115304 bytes
2,590,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,655 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,021 >>> mbox cmd response: success
2,786,158 UART: [afmc] ++
2,786,326 UART: [afmc] CDI.KEYID = 6
2,786,689 UART: [afmc] SUBJECT.KEYID = 7
2,787,115 UART: [afmc] AUTHORITY.KEYID = 5
2,822,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,657 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,386 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,269 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,988 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,891 UART: [afmc] --
2,865,987 UART: [cold-reset] --
2,866,781 UART: [state] Locking Datavault
2,867,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,434 UART: [state] Locking ICCM
2,868,970 UART: [exit] Launching FMC @ 0x40000130
2,874,299 UART:
2,874,315 UART: Running Caliptra FMC ...
2,874,723 UART:
2,874,866 UART: [state] CFI Enabled
2,885,691 UART: [fht] FMC Alias Private Key: 7
2,993,324 UART: [art] Extend RT PCRs Done
2,993,752 UART: [art] Lock RT PCRs Done
2,995,182 UART: [art] Populate DV Done
3,003,213 UART: [fht] FMC Alias Private Key: 7
3,004,169 UART: [art] Derive CDI
3,004,449 UART: [art] Store in in slot 0x4
3,089,710 UART: [art] Derive Key Pair
3,090,070 UART: [art] Store priv key in slot 0x5
3,103,226 UART: [art] Derive Key Pair - Done
3,118,304 UART: [art] Signing Cert with AUTHO
3,118,784 UART: RITY.KEYID = 7
3,133,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,391 UART: [art] PUB.X = 8633ABC6D264B381D2AFE170E7CFD68086636BF49D6F69769D77F08A44C0890988FB0FAFBC8D0126C51DFFA626AEEDB5
3,141,168 UART: [art] PUB.Y = C66144A84B665F95F3B70E8C305052C8EEBF88F98CE220DCCC84526DEF46A8F8787A125C6DBAF4F6674613395F6A81BF
3,148,125 UART: [art] SIG.R = 578471047E2BC6181A57B933CB5C77AB1CE330421CEA82EBD32B39B5B3659D474F14E5B3D96666D2611026F9DB77C774
3,154,892 UART: [art] SIG.S = 7EDCD3AF95E8D1E7225E0A1C4B4C8CDB5829E2A14E3BFED51ABC63930D89BB120B50CDCD5B189035459C695D2DC6DF0A
3,178,365 UART: Caliptra RT
3,178,710 UART: [state] CFI Enabled
3,285,959 UART: [rt] RT listening for mailbox commands...
3,286,622 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,275 UART: [rt]cmd =0x46504c54, len=4
3,317,190 >>> mbox cmd response data (8 bytes)
3,317,339 UART: [rt] FIPS self test
3,317,667 UART: [kat] ++
3,317,819 UART: [kat] sha1
3,322,115 UART: [kat] SHA2-256
3,324,137 UART: [kat] SHA2-384
3,326,870 UART: Fatal Error: 0x90020002
3,328,420 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,425 >>> mbox cmd response: failed
3,328,425 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,328,430 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,968 UART: [kat] SHA2-256
901,908 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,243 UART: [kat] LMS
1,169,555 UART: [kat] --
1,170,342 UART: [cold-reset] ++
1,170,870 UART: [fht] FHT @ 0x50003400
1,173,554 UART: [idev] ++
1,173,722 UART: [idev] CDI.KEYID = 6
1,174,083 UART: [idev] SUBJECT.KEYID = 7
1,174,508 UART: [idev] UDS.KEYID = 0
1,174,854 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,156 UART: [idev] Sha1 KeyId Algorithm
1,209,002 UART: [idev] --
1,210,181 UART: [ldev] ++
1,210,349 UART: [ldev] CDI.KEYID = 6
1,210,713 UART: [ldev] SUBJECT.KEYID = 5
1,211,140 UART: [ldev] AUTHORITY.KEYID = 7
1,211,603 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,242,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,282,063 UART: [fwproc] Wait for Commands...
1,282,776 UART: [fwproc] Recv command 0x46574c44
1,283,509 UART: [fwproc] Recv'd Img size: 115304 bytes
2,593,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,645 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,933 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,397 ready_for_fw is high
1,056,397 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,251 >>> mbox cmd response: success
2,697,803 UART:
2,697,819 UART: Running Caliptra FMC ...
2,698,227 UART:
2,698,370 UART: [state] CFI Enabled
2,708,921 UART: [fht] FMC Alias Private Key: 7
2,816,708 UART: [art] Extend RT PCRs Done
2,817,136 UART: [art] Lock RT PCRs Done
2,818,414 UART: [art] Populate DV Done
2,826,755 UART: [fht] FMC Alias Private Key: 7
2,827,783 UART: [art] Derive CDI
2,828,063 UART: [art] Store in in slot 0x4
2,913,920 UART: [art] Derive Key Pair
2,914,280 UART: [art] Store priv key in slot 0x5
2,928,146 UART: [art] Derive Key Pair - Done
2,942,967 UART: [art] Signing Cert with AUTHO
2,943,447 UART: RITY.KEYID = 7
2,959,029 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,794 UART: [art] PUB.X = A64D820416208581B5571902C4E58874938B07FD98BE28D39BCB18D6E67F342F3875A6520DE4E4DC1F39E73307E2125F
2,966,543 UART: [art] PUB.Y = D446864AD02665A5E0D7A35FEB314FD680314C55E3E48ECA96BDD0D06E77696F80CE4B3AA695AA512C1CFD1FE2A1AA6F
2,973,513 UART: [art] SIG.R = 2387AD948F8EF6FC28B90233F13929450936EE34E53B90E4C78200C3135A2D6A3DA5A7E3C5386081AD989F7B50D74A8B
2,980,255 UART: [art] SIG.S = 308726B01CD72EB5D28CA249E3B706E3BE4A945A3CA0C8C9D938FC967F135466C4B885ACBB7B712CDACA4278A1F423B8
3,004,337 UART: Caliptra RT
3,004,682 UART: [state] CFI Enabled
3,112,193 UART: [rt] RT listening for mailbox commands...
3,112,856 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,387 UART: [rt]cmd =0x46504c54, len=4
3,143,442 >>> mbox cmd response data (8 bytes)
3,143,643 UART: [rt] FIPS self test
3,143,971 UART: [kat] ++
3,144,123 UART: [kat] sha1
3,148,351 UART: [kat] SHA2-256
3,150,373 UART: [kat] SHA2-384
3,152,996 UART: Fatal Error: 0x90020002
3,154,546 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,551 >>> mbox cmd response: failed
3,154,551 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,154,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,619 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,641 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,283 UART:
192,638 UART: Running Caliptra ROM ...
193,797 UART:
193,950 UART: [state] CFI Enabled
265,565 UART: [state] LifecycleState = Unprovisioned
267,525 UART: [state] DebugLocked = No
269,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,081 UART: [kat] SHA2-256
443,787 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,367 UART: [kat] ++
454,848 UART: [kat] sha1
465,022 UART: [kat] SHA2-256
467,728 UART: [kat] SHA2-384
473,111 UART: [kat] SHA2-512-ACC
475,452 UART: [kat] ECC-384
2,765,650 UART: [kat] HMAC-384Kdf
2,796,415 UART: [kat] LMS
3,986,712 UART: [kat] --
3,991,320 UART: [cold-reset] ++
3,993,802 UART: [fht] Storing FHT @ 0x50003400
4,005,048 UART: [idev] ++
4,005,548 UART: [idev] CDI.KEYID = 6
4,006,536 UART: [idev] SUBJECT.KEYID = 7
4,007,719 UART: [idev] UDS.KEYID = 0
4,008,887 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,027,365 UART: [idev] Erasing UDS.KEYID = 0
7,340,401 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,839 UART: [idev] --
7,365,953 UART: [ldev] ++
7,366,572 UART: [ldev] CDI.KEYID = 6
7,367,485 UART: [ldev] SUBJECT.KEYID = 5
7,368,703 UART: [ldev] AUTHORITY.KEYID = 7
7,369,993 UART: [ldev] FE.KEYID = 1
7,414,023 UART: [ldev] Erasing FE.KEYID = 1
10,744,029 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,041,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,085,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,103,944 UART: [ldev] --
13,109,415 UART: [fwproc] Waiting for Commands...
13,111,522 UART: [fwproc] Received command 0x46505652
13,113,928 UART: [rt] FIPS Version
13,115,541 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,784,683 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,801,895 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,513 UART:
192,879 UART: Running Caliptra ROM ...
194,034 UART:
603,703 UART: [state] CFI Enabled
619,209 UART: [state] LifecycleState = Unprovisioned
621,143 UART: [state] DebugLocked = No
623,136 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,104 UART: [kat] SHA2-256
797,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,434 UART: [kat] ++
808,913 UART: [kat] sha1
820,111 UART: [kat] SHA2-256
822,798 UART: [kat] SHA2-384
829,315 UART: [kat] SHA2-512-ACC
831,707 UART: [kat] ECC-384
3,116,905 UART: [kat] HMAC-384Kdf
3,129,851 UART: [kat] LMS
4,319,923 UART: [kat] --
4,325,660 UART: [cold-reset] ++
4,327,492 UART: [fht] Storing FHT @ 0x50003400
4,339,355 UART: [idev] ++
4,339,980 UART: [idev] CDI.KEYID = 6
4,340,911 UART: [idev] SUBJECT.KEYID = 7
4,342,127 UART: [idev] UDS.KEYID = 0
4,343,253 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,357,033 UART: [idev] Erasing UDS.KEYID = 0
7,626,427 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,484 UART: [idev] --
7,651,925 UART: [ldev] ++
7,652,541 UART: [ldev] CDI.KEYID = 6
7,653,435 UART: [ldev] SUBJECT.KEYID = 5
7,654,713 UART: [ldev] AUTHORITY.KEYID = 7
7,655,898 UART: [ldev] FE.KEYID = 1
7,667,656 UART: [ldev] Erasing FE.KEYID = 1
10,957,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,158 UART: [ldev] --
13,315,529 UART: [fwproc] Waiting for Commands...
13,318,876 UART: [fwproc] Received command 0x46505652
13,321,281 UART: [rt] FIPS Version
13,322,951 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
4,127,052 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,050,607 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,080 UART:
192,482 UART: Running Caliptra ROM ...
193,670 UART:
193,826 UART: [state] CFI Enabled
264,106 UART: [state] LifecycleState = Unprovisioned
266,009 UART: [state] DebugLocked = No
268,854 UART: [state] WD Timer not started. Device not locked for debugging
273,143 UART: [kat] SHA2-256
452,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,831 UART: [kat] ++
464,364 UART: [kat] sha1
475,842 UART: [kat] SHA2-256
478,850 UART: [kat] SHA2-384
485,637 UART: [kat] SHA2-512-ACC
488,627 UART: [kat] ECC-384
2,947,562 UART: [kat] HMAC-384Kdf
2,970,819 UART: [kat] LMS
3,500,286 UART: [kat] --
3,505,474 UART: [cold-reset] ++
3,507,194 UART: [fht] FHT @ 0x50003400
3,518,330 UART: [idev] ++
3,518,893 UART: [idev] CDI.KEYID = 6
3,519,807 UART: [idev] SUBJECT.KEYID = 7
3,521,021 UART: [idev] UDS.KEYID = 0
3,522,021 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,543,339 UART: [idev] Erasing UDS.KEYID = 0
6,029,296 UART: [idev] Sha1 KeyId Algorithm
6,053,176 UART: [idev] --
6,056,688 UART: [ldev] ++
6,057,258 UART: [ldev] CDI.KEYID = 6
6,058,170 UART: [ldev] SUBJECT.KEYID = 5
6,059,331 UART: [ldev] AUTHORITY.KEYID = 7
6,060,565 UART: [ldev] FE.KEYID = 1
6,099,002 UART: [ldev] Erasing FE.KEYID = 1
8,601,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,751 UART: [ldev] --
10,413,288 UART: [fwproc] Wait for Commands...
10,416,042 UART: [fwproc] Recv command 0x46505652
10,418,396 UART: [rt] FIPS Version
10,419,861 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,124 writing to cptra_bootfsm_go
3,381,887 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,182,091 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,508 UART:
192,892 UART: Running Caliptra ROM ...
194,076 UART:
603,672 UART: [state] CFI Enabled
616,606 UART: [state] LifecycleState = Unprovisioned
618,479 UART: [state] DebugLocked = No
620,823 UART: [state] WD Timer not started. Device not locked for debugging
624,305 UART: [kat] SHA2-256
803,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,013 UART: [kat] ++
815,472 UART: [kat] sha1
826,812 UART: [kat] SHA2-256
829,880 UART: [kat] SHA2-384
836,341 UART: [kat] SHA2-512-ACC
839,328 UART: [kat] ECC-384
3,282,313 UART: [kat] HMAC-384Kdf
3,293,903 UART: [kat] LMS
3,823,392 UART: [kat] --
3,828,474 UART: [cold-reset] ++
3,831,053 UART: [fht] FHT @ 0x50003400
3,841,495 UART: [idev] ++
3,842,067 UART: [idev] CDI.KEYID = 6
3,842,959 UART: [idev] SUBJECT.KEYID = 7
3,844,171 UART: [idev] UDS.KEYID = 0
3,845,201 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,860,781 UART: [idev] Erasing UDS.KEYID = 0
6,312,887 UART: [idev] Sha1 KeyId Algorithm
6,335,854 UART: [idev] --
6,339,739 UART: [ldev] ++
6,340,306 UART: [ldev] CDI.KEYID = 6
6,341,190 UART: [ldev] SUBJECT.KEYID = 5
6,342,400 UART: [ldev] AUTHORITY.KEYID = 7
6,343,653 UART: [ldev] FE.KEYID = 1
6,354,623 UART: [ldev] Erasing FE.KEYID = 1
8,830,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,445 UART: [ldev] --
10,622,857 UART: [fwproc] Wait for Commands...
10,624,629 UART: [fwproc] Recv command 0x46505652
10,626,944 UART: [rt] FIPS Version
10,628,429 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,405 writing to cptra_bootfsm_go
3,697,988 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,404,930 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,436,681 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,246,190 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,759,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,471,695 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,573 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,155 UART: [kat] SHA2-256
882,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,201 UART: [kat] ++
886,353 UART: [kat] sha1
890,701 UART: [kat] SHA2-256
892,639 UART: [kat] SHA2-384
895,308 UART: [kat] SHA2-512-ACC
897,209 UART: [kat] ECC-384
902,542 UART: [kat] HMAC-384Kdf
907,032 UART: [kat] LMS
1,475,228 UART: [kat] --
1,475,973 UART: [cold-reset] ++
1,476,441 UART: [fht] Storing FHT @ 0x50003400
1,479,258 UART: [idev] ++
1,479,426 UART: [idev] CDI.KEYID = 6
1,479,786 UART: [idev] SUBJECT.KEYID = 7
1,480,210 UART: [idev] UDS.KEYID = 0
1,480,555 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,020 UART: [idev] Erasing UDS.KEYID = 0
1,504,460 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,274 UART: [idev] --
1,514,349 UART: [ldev] ++
1,514,517 UART: [ldev] CDI.KEYID = 6
1,514,880 UART: [ldev] SUBJECT.KEYID = 5
1,515,306 UART: [ldev] AUTHORITY.KEYID = 7
1,515,769 UART: [ldev] FE.KEYID = 1
1,521,267 UART: [ldev] Erasing FE.KEYID = 1
1,546,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,434 UART: [ldev] --
1,585,839 UART: [fwproc] Waiting for Commands...
1,586,632 UART: [fwproc] Received command 0x46505652
1,587,514 UART: [rt] FIPS Version
1,588,067 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,019 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,440,738 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Unprovisioned
85,664 UART: [state] DebugLocked = No
86,216 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,924 UART: [kat] SHA2-256
881,855 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,970 UART: [kat] ++
886,122 UART: [kat] sha1
890,400 UART: [kat] SHA2-256
892,338 UART: [kat] SHA2-384
895,245 UART: [kat] SHA2-512-ACC
897,146 UART: [kat] ECC-384
902,605 UART: [kat] HMAC-384Kdf
907,185 UART: [kat] LMS
1,475,381 UART: [kat] --
1,476,500 UART: [cold-reset] ++
1,477,046 UART: [fht] Storing FHT @ 0x50003400
1,479,751 UART: [idev] ++
1,479,919 UART: [idev] CDI.KEYID = 6
1,480,279 UART: [idev] SUBJECT.KEYID = 7
1,480,703 UART: [idev] UDS.KEYID = 0
1,481,048 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,719 UART: [idev] Erasing UDS.KEYID = 0
1,505,153 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,731 UART: [idev] --
1,514,936 UART: [ldev] ++
1,515,104 UART: [ldev] CDI.KEYID = 6
1,515,467 UART: [ldev] SUBJECT.KEYID = 5
1,515,893 UART: [ldev] AUTHORITY.KEYID = 7
1,516,356 UART: [ldev] FE.KEYID = 1
1,521,768 UART: [ldev] Erasing FE.KEYID = 1
1,546,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,843 UART: [ldev] --
1,586,232 UART: [fwproc] Waiting for Commands...
1,587,029 UART: [fwproc] Received command 0x46505652
1,587,911 UART: [rt] FIPS Version
1,588,464 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,908 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,979 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,661 UART: [kat] SHA2-256
903,601 UART: [kat] SHA2-384
906,402 UART: [kat] SHA2-512-ACC
908,303 UART: [kat] ECC-384
918,128 UART: [kat] HMAC-384Kdf
922,898 UART: [kat] LMS
1,171,226 UART: [kat] --
1,171,861 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,174,740 UART: [idev] ++
1,174,908 UART: [idev] CDI.KEYID = 6
1,175,268 UART: [idev] SUBJECT.KEYID = 7
1,175,692 UART: [idev] UDS.KEYID = 0
1,176,037 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,596 UART: [idev] Erasing UDS.KEYID = 0
1,200,413 UART: [idev] Sha1 KeyId Algorithm
1,208,727 UART: [idev] --
1,209,815 UART: [ldev] ++
1,209,983 UART: [ldev] CDI.KEYID = 6
1,210,346 UART: [ldev] SUBJECT.KEYID = 5
1,210,772 UART: [ldev] AUTHORITY.KEYID = 7
1,211,235 UART: [ldev] FE.KEYID = 1
1,216,469 UART: [ldev] Erasing FE.KEYID = 1
1,242,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,999 UART: [ldev] --
1,281,358 UART: [fwproc] Wait for Commands...
1,282,134 UART: [fwproc] Recv command 0x46505652
1,282,955 UART: [rt] FIPS Version
1,283,509 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,713 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,477 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
893,409 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,534 UART: [kat] ++
897,686 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,857 UART: [kat] SHA2-512-ACC
908,758 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,403 UART: [kat] LMS
1,171,731 UART: [kat] --
1,172,636 UART: [cold-reset] ++
1,172,962 UART: [fht] FHT @ 0x50003400
1,175,729 UART: [idev] ++
1,175,897 UART: [idev] CDI.KEYID = 6
1,176,257 UART: [idev] SUBJECT.KEYID = 7
1,176,681 UART: [idev] UDS.KEYID = 0
1,177,026 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,599 UART: [idev] Erasing UDS.KEYID = 0
1,201,876 UART: [idev] Sha1 KeyId Algorithm
1,210,180 UART: [idev] --
1,211,208 UART: [ldev] ++
1,211,376 UART: [ldev] CDI.KEYID = 6
1,211,739 UART: [ldev] SUBJECT.KEYID = 5
1,212,165 UART: [ldev] AUTHORITY.KEYID = 7
1,212,628 UART: [ldev] FE.KEYID = 1
1,217,672 UART: [ldev] Erasing FE.KEYID = 1
1,244,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,108 UART: [ldev] --
1,283,573 UART: [fwproc] Wait for Commands...
1,284,263 UART: [fwproc] Recv command 0x46505652
1,285,084 UART: [rt] FIPS Version
1,285,638 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,658 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,424 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,306 UART: [kat] SHA2-256
890,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,985 UART: [kat] ++
895,137 UART: [kat] sha1
899,219 UART: [kat] SHA2-256
901,159 UART: [kat] SHA2-384
903,780 UART: [kat] SHA2-512-ACC
905,681 UART: [kat] ECC-384
915,154 UART: [kat] HMAC-384Kdf
919,688 UART: [kat] LMS
1,168,000 UART: [kat] --
1,168,683 UART: [cold-reset] ++
1,169,073 UART: [fht] FHT @ 0x50003400
1,171,537 UART: [idev] ++
1,171,705 UART: [idev] CDI.KEYID = 6
1,172,066 UART: [idev] SUBJECT.KEYID = 7
1,172,491 UART: [idev] UDS.KEYID = 0
1,172,837 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,180,625 UART: [idev] Erasing UDS.KEYID = 0
1,197,791 UART: [idev] Sha1 KeyId Algorithm
1,206,897 UART: [idev] --
1,207,840 UART: [ldev] ++
1,208,008 UART: [ldev] CDI.KEYID = 6
1,208,372 UART: [ldev] SUBJECT.KEYID = 5
1,208,799 UART: [ldev] AUTHORITY.KEYID = 7
1,209,262 UART: [ldev] FE.KEYID = 1
1,214,158 UART: [ldev] Erasing FE.KEYID = 1
1,240,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,530 UART: [ldev] --
1,279,824 UART: [fwproc] Wait for Commands...
1,280,513 UART: [fwproc] Recv command 0x46505652
1,281,340 UART: [rt] FIPS Version
1,281,901 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,646 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,198 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
891,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,800 UART: [kat] ++
895,952 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
904,947 UART: [kat] SHA2-512-ACC
906,848 UART: [kat] ECC-384
916,443 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,169,810 UART: [cold-reset] ++
1,170,208 UART: [fht] FHT @ 0x50003400
1,172,824 UART: [idev] ++
1,172,992 UART: [idev] CDI.KEYID = 6
1,173,353 UART: [idev] SUBJECT.KEYID = 7
1,173,778 UART: [idev] UDS.KEYID = 0
1,174,124 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,922 UART: [idev] Erasing UDS.KEYID = 0
1,198,890 UART: [idev] Sha1 KeyId Algorithm
1,207,726 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,471 UART: [ldev] Erasing FE.KEYID = 1
1,241,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,341 UART: [ldev] --
1,280,657 UART: [fwproc] Wait for Commands...
1,281,324 UART: [fwproc] Recv command 0x46505652
1,282,151 UART: [rt] FIPS Version
1,282,712 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,073 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,157 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,110 UART:
192,482 UART: Running Caliptra ROM ...
193,676 UART:
193,828 UART: [state] CFI Enabled
264,531 UART: [state] LifecycleState = Unprovisioned
266,396 UART: [state] DebugLocked = No
269,346 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,000 UART: [kat] SHA2-256
444,697 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,216 UART: [kat] ++
455,664 UART: [kat] sha1
467,035 UART: [kat] SHA2-256
469,703 UART: [kat] SHA2-384
475,629 UART: [kat] SHA2-512-ACC
478,004 UART: [kat] ECC-384
2,767,906 UART: [kat] HMAC-384Kdf
2,799,415 UART: [kat] LMS
3,989,700 UART: [kat] --
3,994,053 UART: [cold-reset] ++
3,995,784 UART: [fht] Storing FHT @ 0x50003400
4,006,206 UART: [idev] ++
4,006,777 UART: [idev] CDI.KEYID = 6
4,007,785 UART: [idev] SUBJECT.KEYID = 7
4,008,970 UART: [idev] UDS.KEYID = 0
4,010,071 ready_for_fw is high
4,010,317 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,153,972 UART: [idev] Erasing UDS.KEYID = 0
7,346,316 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,953 UART: [idev] --
7,370,890 UART: [ldev] ++
7,371,464 UART: [ldev] CDI.KEYID = 6
7,372,406 UART: [ldev] SUBJECT.KEYID = 5
7,373,585 UART: [ldev] AUTHORITY.KEYID = 7
7,374,937 UART: [ldev] FE.KEYID = 1
7,422,620 UART: [ldev] Erasing FE.KEYID = 1
10,753,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,135 UART: [ldev] --
13,117,514 UART: [fwproc] Waiting for Commands...
13,120,748 UART: [fwproc] Received command 0x46574c44
13,122,935 UART: [fwproc] Received Image of size 114124 bytes
17,170,930 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,864 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,733 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,629,749 >>> mbox cmd response: success
17,630,502 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,633,523 UART: [afmc] ++
17,634,173 UART: [afmc] CDI.KEYID = 6
17,635,060 UART: [afmc] SUBJECT.KEYID = 7
17,636,286 UART: [afmc] AUTHORITY.KEYID = 5
21,007,895 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,476 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,742 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,201 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,971 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,455 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,133 UART: [afmc] --
23,379,374 UART: [cold-reset] --
23,384,588 UART: [state] Locking Datavault
23,390,764 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,502 UART: [state] Locking ICCM
23,393,921 UART: [exit] Launching FMC @ 0x40000130
23,402,326 UART:
23,402,567 UART: Running Caliptra FMC ...
23,403,669 UART:
23,403,831 UART: [state] CFI Enabled
23,467,621 UART: [fht] FMC Alias Private Key: 7
25,805,708 UART: [art] Extend RT PCRs Done
25,806,953 UART: [art] Lock RT PCRs Done
25,808,848 UART: [art] Populate DV Done
25,814,207 UART: [fht] FMC Alias Private Key: 7
25,815,749 UART: [art] Derive CDI
25,816,509 UART: [art] Store in in slot 0x4
25,876,226 UART: [art] Derive Key Pair
25,877,260 UART: [art] Store priv key in slot 0x5
29,170,813 UART: [art] Derive Key Pair - Done
29,183,876 UART: [art] Signing Cert with AUTHO
29,185,203 UART: RITY.KEYID = 7
31,473,137 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,657 UART: [art] PUB.X = BEDE0D034E3B8A3BF48812FEAEB00E2EA0BDE44D135FF8590BD3FA3D56230A0A136083C5408CEBDB57EECDE0CCB07418
31,481,922 UART: [art] PUB.Y = 393CEDE2A1F53FB15634B684B97FDE8F17731F6F4204E52359A3485818CFABF34AC06B7F64A35FD38D2905FB7DDF7D74
31,489,173 UART: [art] SIG.R = D35E6B4624E035B2445A0E35B9CBC2036B0AD0C69861FF629043EC27BA377DD5E7CED184F7E8405CBC8F22FA531550E4
31,496,581 UART: [art] SIG.S = D534E3B85AD37F9250FFAB613D896F28FFC2E51954469CB42E8AFAD4070BB6097729D6F7AE711B07C9D1915915D5B0F4
32,801,649 UART: Caliptra RT
32,802,366 UART: [state] CFI Enabled
32,962,274 UART: [rt] RT listening for mailbox commands...
32,993,575 UART: [rt]cmd =0x46505652, len=4
32,994,853 UART: [rt] FIPS Version
32,995,862 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,805,450 ready_for_fw is high
3,806,007 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,903,968 >>> mbox cmd response: success
17,904,692 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,588,503 UART:
23,588,895 UART: Running Caliptra FMC ...
23,590,057 UART:
23,590,226 UART: [state] CFI Enabled
23,640,666 UART: [fht] FMC Alias Private Key: 7
25,978,532 UART: [art] Extend RT PCRs Done
25,979,765 UART: [art] Lock RT PCRs Done
25,981,232 UART: [art] Populate DV Done
25,986,718 UART: [fht] FMC Alias Private Key: 7
25,988,404 UART: [art] Derive CDI
25,989,229 UART: [art] Store in in slot 0x4
26,048,621 UART: [art] Derive Key Pair
26,049,631 UART: [art] Store priv key in slot 0x5
29,342,936 UART: [art] Derive Key Pair - Done
29,356,001 UART: [art] Signing Cert with AUTHO
29,357,341 UART: RITY.KEYID = 7
31,643,886 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,395 UART: [art] PUB.X = A9B99CE04A4EB41F1341003B57B1BFD805B5B31492D928D79FF332D17F6683C58199C8D7C978EA08FDD475779398CF0F
31,652,662 UART: [art] PUB.Y = B71BE7F5CA835091141E84E9AF886816DC316AEE920B88D97748FE9FD3B2B4440CA51FD75387147F24D24B7449F51030
31,659,894 UART: [art] SIG.R = AA19E8EA7DA83EC35C1D726E093C7F2FCE3370D0E33C3AC1AB95DB59612B2AB2B28FAD8D792DC9FD1E76D35D325B2C21
31,667,343 UART: [art] SIG.S = 1A8B141CA86CF8BD53E123B0BA966D0AE48D215C8278DE6D6D80DBBBCFA51E3076E2B63C1FA8F05D209269793234C349
32,972,379 UART: Caliptra RT
32,973,094 UART: [state] CFI Enabled
33,145,541 UART: [rt] RT listening for mailbox commands...
33,176,912 UART: [rt]cmd =0x46505652, len=4
33,178,160 UART: [rt] FIPS Version
33,179,490 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,583 UART:
192,942 UART: Running Caliptra ROM ...
194,077 UART:
603,658 UART: [state] CFI Enabled
617,421 UART: [state] LifecycleState = Unprovisioned
619,414 UART: [state] DebugLocked = No
622,005 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,313 UART: [kat] SHA2-256
797,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,597 UART: [kat] ++
808,046 UART: [kat] sha1
818,430 UART: [kat] SHA2-256
821,152 UART: [kat] SHA2-384
826,996 UART: [kat] SHA2-512-ACC
829,386 UART: [kat] ECC-384
3,113,271 UART: [kat] HMAC-384Kdf
3,124,319 UART: [kat] LMS
4,314,428 UART: [kat] --
4,319,347 UART: [cold-reset] ++
4,321,629 UART: [fht] Storing FHT @ 0x50003400
4,334,746 UART: [idev] ++
4,335,328 UART: [idev] CDI.KEYID = 6
4,336,213 UART: [idev] SUBJECT.KEYID = 7
4,337,460 UART: [idev] UDS.KEYID = 0
4,338,444 ready_for_fw is high
4,338,656 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,482,375 UART: [idev] Erasing UDS.KEYID = 0
7,623,865 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,373 UART: [idev] --
7,651,381 UART: [ldev] ++
7,651,983 UART: [ldev] CDI.KEYID = 6
7,652,896 UART: [ldev] SUBJECT.KEYID = 5
7,654,115 UART: [ldev] AUTHORITY.KEYID = 7
7,655,404 UART: [ldev] FE.KEYID = 1
7,665,942 UART: [ldev] Erasing FE.KEYID = 1
10,951,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,410 UART: [ldev] --
13,314,411 UART: [fwproc] Waiting for Commands...
13,316,674 UART: [fwproc] Received command 0x46574c44
13,318,921 UART: [fwproc] Received Image of size 114124 bytes
17,377,621 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,839,427 >>> mbox cmd response: success
17,839,972 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,843,195 UART: [afmc] ++
17,843,781 UART: [afmc] CDI.KEYID = 6
17,844,665 UART: [afmc] SUBJECT.KEYID = 7
17,845,933 UART: [afmc] AUTHORITY.KEYID = 5
21,159,628 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,956 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,216 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,615 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,423 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,939 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,776 UART: [afmc] --
23,524,024 UART: [cold-reset] --
23,527,782 UART: [state] Locking Datavault
23,531,319 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,078 UART: [state] Locking ICCM
23,535,391 UART: [exit] Launching FMC @ 0x40000130
23,543,785 UART:
23,544,030 UART: Running Caliptra FMC ...
23,545,134 UART:
23,545,296 UART: [state] CFI Enabled
23,553,374 UART: [fht] FMC Alias Private Key: 7
25,884,487 UART: [art] Extend RT PCRs Done
25,885,713 UART: [art] Lock RT PCRs Done
25,887,385 UART: [art] Populate DV Done
25,892,705 UART: [fht] FMC Alias Private Key: 7
25,894,247 UART: [art] Derive CDI
25,895,009 UART: [art] Store in in slot 0x4
25,937,662 UART: [art] Derive Key Pair
25,938,664 UART: [art] Store priv key in slot 0x5
29,180,871 UART: [art] Derive Key Pair - Done
29,194,300 UART: [art] Signing Cert with AUTHO
29,195,595 UART: RITY.KEYID = 7
31,475,278 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,793 UART: [art] PUB.X = EAF4EE011FAD91D219413ACDA13FCC3E50799E79799B187EA9D2C1431B02E05B67C19A787813FAFE37AF582FD5C9F778
31,484,050 UART: [art] PUB.Y = FD8C9BA6AB018A56AC0F67C9289E66FF55017FF3B8C75C8F5C8BD8A406EDF9EA8B445912FF10E12E54D38F650A246C21
31,491,346 UART: [art] SIG.R = E2C6B24E290D091F35A016DFC3725C318D23C2686EB0C35ABE53854DDEA3DB5F5F2E7F15AAC21A6768B3726638B0526C
31,498,705 UART: [art] SIG.S = 91CF6F92A0CFE9740CD812F2A327615608A7F4BB1547DC2DAB35C62172C00ABE1B785C681F64AB3F2F45180EA2BC8E10
32,803,565 UART: Caliptra RT
32,804,271 UART: [state] CFI Enabled
32,922,625 UART: [rt] RT listening for mailbox commands...
32,953,971 UART: [rt]cmd =0x46505652, len=4
32,955,244 UART: [rt] FIPS Version
32,956,463 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,130,121 ready_for_fw is high
4,130,777 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,073,858 >>> mbox cmd response: success
18,074,545 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,720,288 UART:
23,720,697 UART: Running Caliptra FMC ...
23,721,820 UART:
23,721,978 UART: [state] CFI Enabled
23,729,804 UART: [fht] FMC Alias Private Key: 7
26,060,360 UART: [art] Extend RT PCRs Done
26,061,593 UART: [art] Lock RT PCRs Done
26,063,406 UART: [art] Populate DV Done
26,068,991 UART: [fht] FMC Alias Private Key: 7
26,070,587 UART: [art] Derive CDI
26,071,405 UART: [art] Store in in slot 0x4
26,113,635 UART: [art] Derive Key Pair
26,114,674 UART: [art] Store priv key in slot 0x5
29,356,433 UART: [art] Derive Key Pair - Done
29,369,471 UART: [art] Signing Cert with AUTHO
29,370,773 UART: RITY.KEYID = 7
31,649,977 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,486 UART: [art] PUB.X = F5227EB88842A3FA838E482C38EC3971359791BC5E61A33E020ABDC4DE00BB731719F4A42BE9523CEFC1172FC47FCEFC
31,658,748 UART: [art] PUB.Y = 239091D1B1C29BAAB6ABA94B39EE94AA46EB69D083FC70AB887205B0E287347D57B4C183F7B7BFBF02A6476276145193
31,666,014 UART: [art] SIG.R = 01B3A344A9C0F63A572AB268864969A838BC40150507C788B189B05DC6F32D448DD9511BC323D1F118640C85740188F1
31,673,376 UART: [art] SIG.S = 3894FACE14611DE3507DD72387973B91B95F005EFF336FAA0854D3D7BE7D6F1724CA1AF96243DE16AF40852139C98E9A
32,978,712 UART: Caliptra RT
32,979,424 UART: [state] CFI Enabled
33,096,613 UART: [rt] RT listening for mailbox commands...
33,128,030 UART: [rt]cmd =0x46505652, len=4
33,129,281 UART: [rt] FIPS Version
33,130,488 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,323 UART:
192,672 UART: Running Caliptra ROM ...
193,891 UART:
194,045 UART: [state] CFI Enabled
264,481 UART: [state] LifecycleState = Unprovisioned
266,396 UART: [state] DebugLocked = No
268,280 UART: [state] WD Timer not started. Device not locked for debugging
271,604 UART: [kat] SHA2-256
450,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,320 UART: [kat] ++
462,854 UART: [kat] sha1
473,733 UART: [kat] SHA2-256
476,762 UART: [kat] SHA2-384
482,276 UART: [kat] SHA2-512-ACC
485,979 UART: [kat] ECC-384
2,947,488 UART: [kat] HMAC-384Kdf
2,970,756 UART: [kat] LMS
3,500,234 UART: [kat] --
3,505,091 UART: [cold-reset] ++
3,507,312 UART: [fht] FHT @ 0x50003400
3,517,961 UART: [idev] ++
3,518,572 UART: [idev] CDI.KEYID = 6
3,519,502 UART: [idev] SUBJECT.KEYID = 7
3,520,683 UART: [idev] UDS.KEYID = 0
3,521,608 ready_for_fw is high
3,521,807 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,652 UART: [idev] Erasing UDS.KEYID = 0
6,030,036 UART: [idev] Sha1 KeyId Algorithm
6,053,119 UART: [idev] --
6,057,275 UART: [ldev] ++
6,057,850 UART: [ldev] CDI.KEYID = 6
6,058,782 UART: [ldev] SUBJECT.KEYID = 5
6,059,946 UART: [ldev] AUTHORITY.KEYID = 7
6,061,176 UART: [ldev] FE.KEYID = 1
6,100,461 UART: [ldev] Erasing FE.KEYID = 1
8,606,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,052 UART: [ldev] --
10,414,330 UART: [fwproc] Wait for Commands...
10,416,226 UART: [fwproc] Recv command 0x46574c44
10,418,324 UART: [fwproc] Recv'd Img size: 114448 bytes
13,826,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,286,466 >>> mbox cmd response: success
14,286,998 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,291,185 UART: [afmc] ++
14,291,767 UART: [afmc] CDI.KEYID = 6
14,292,682 UART: [afmc] SUBJECT.KEYID = 7
14,293,842 UART: [afmc] AUTHORITY.KEYID = 5
16,829,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,674 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,506 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,368 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,531 UART: [afmc] --
18,627,232 UART: [cold-reset] --
18,630,279 UART: [state] Locking Datavault
18,633,147 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,020 UART: [state] Locking ICCM
18,636,913 UART: [exit] Launching FMC @ 0x40000130
18,645,317 UART:
18,645,556 UART: Running Caliptra FMC ...
18,646,657 UART:
18,646,817 UART: [state] CFI Enabled
18,710,866 UART: [fht] FMC Alias Private Key: 7
20,474,867 UART: [art] Extend RT PCRs Done
20,476,081 UART: [art] Lock RT PCRs Done
20,477,705 UART: [art] Populate DV Done
20,483,164 UART: [fht] FMC Alias Private Key: 7
20,484,695 UART: [art] Derive CDI
20,485,511 UART: [art] Store in in slot 0x4
20,543,329 UART: [art] Derive Key Pair
20,544,328 UART: [art] Store priv key in slot 0x5
23,007,099 UART: [art] Derive Key Pair - Done
23,020,131 UART: [art] Signing Cert with AUTHO
23,021,448 UART: RITY.KEYID = 7
24,732,872 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,378 UART: [art] PUB.X = B762F30CC88F8ECE19E0B0B3879E0C02A407B236B74E16A1B36DCE1F9CB9822DFE018D67E190866CED9E0D63C793F856
24,741,668 UART: [art] PUB.Y = 18E8A64892E74D4406E61F3C08F796E081A5F02823E5E0D1E9D59BF457AE4BBC3AE82C160AD5808FCD91EFA7BB831841
24,748,948 UART: [art] SIG.R = 9E94F2D300CF738966F01136FE7A5692A113C6AA07AB020F05AAF4A6CAF75E3EC4ED120309D6ADCC3AB6DA23948F03D1
24,756,325 UART: [art] SIG.S = 390D6DB662353F756074A192D9C11BAAB26735F1905EAEC141BF84F547C2C050FF9AE3D34AC13C4784EB1C7B1964A154
25,735,447 UART: Caliptra RT
25,736,166 UART: [state] CFI Enabled
25,900,451 UART: [rt] RT listening for mailbox commands...
25,931,805 UART: [rt]cmd =0x46505652, len=4
25,933,080 UART: [rt] FIPS Version
25,934,412 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,381,500 ready_for_fw is high
3,382,124 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,057,106 >>> mbox cmd response: success
14,057,889 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,345,861 UART:
18,346,236 UART: Running Caliptra FMC ...
18,347,493 UART:
18,347,661 UART: [state] CFI Enabled
18,412,144 UART: [fht] FMC Alias Private Key: 7
20,175,625 UART: [art] Extend RT PCRs Done
20,176,865 UART: [art] Lock RT PCRs Done
20,178,332 UART: [art] Populate DV Done
20,183,529 UART: [fht] FMC Alias Private Key: 7
20,185,119 UART: [art] Derive CDI
20,185,935 UART: [art] Store in in slot 0x4
20,245,655 UART: [art] Derive Key Pair
20,246,684 UART: [art] Store priv key in slot 0x5
22,710,285 UART: [art] Derive Key Pair - Done
22,723,169 UART: [art] Signing Cert with AUTHO
22,724,470 UART: RITY.KEYID = 7
24,436,506 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,008 UART: [art] PUB.X = FFE190B69E78B83D8AD15A25177347B3D719B31636961B6F4174387FDC547234055D181800E5CE024DC16BE650B5D407
24,445,229 UART: [art] PUB.Y = 64DA5DC7666C2D003430A27B6F4EFC4B0FC07621BDE81AF3C89DF849961D5ACCA6E463BCA1D6A97B0E174A46DA7BE8A1
24,452,481 UART: [art] SIG.R = 4F580C4D99C883FC167E30FF1145537697F5B77B81A1E131BEACBF710AD6A700BADB9E8D5EE45BABBE6E6334E026A48A
24,459,899 UART: [art] SIG.S = 240B4FB10BB956075D5F07D1445819055E1286A4AE78BC901F686746164DD49146E721B4803D8EBDE3646983EB5612DA
25,438,124 UART: Caliptra RT
25,438,847 UART: [state] CFI Enabled
25,604,709 UART: [rt] RT listening for mailbox commands...
25,636,332 UART: [rt]cmd =0x46505652, len=4
25,637,669 UART: [rt] FIPS Version
25,638,833 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,677 UART:
193,027 UART: Running Caliptra ROM ...
194,230 UART:
603,896 UART: [state] CFI Enabled
617,217 UART: [state] LifecycleState = Unprovisioned
619,090 UART: [state] DebugLocked = No
620,416 UART: [state] WD Timer not started. Device not locked for debugging
623,879 UART: [kat] SHA2-256
802,983 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,622 UART: [kat] ++
815,068 UART: [kat] sha1
825,307 UART: [kat] SHA2-256
828,311 UART: [kat] SHA2-384
834,727 UART: [kat] SHA2-512-ACC
837,673 UART: [kat] ECC-384
3,280,316 UART: [kat] HMAC-384Kdf
3,293,304 UART: [kat] LMS
3,822,760 UART: [kat] --
3,826,504 UART: [cold-reset] ++
3,828,465 UART: [fht] FHT @ 0x50003400
3,839,381 UART: [idev] ++
3,839,951 UART: [idev] CDI.KEYID = 6
3,840,843 UART: [idev] SUBJECT.KEYID = 7
3,842,091 UART: [idev] UDS.KEYID = 0
3,842,998 ready_for_fw is high
3,843,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,987,124 UART: [idev] Erasing UDS.KEYID = 0
6,315,288 UART: [idev] Sha1 KeyId Algorithm
6,338,455 UART: [idev] --
6,342,591 UART: [ldev] ++
6,343,200 UART: [ldev] CDI.KEYID = 6
6,344,092 UART: [ldev] SUBJECT.KEYID = 5
6,345,312 UART: [ldev] AUTHORITY.KEYID = 7
6,346,623 UART: [ldev] FE.KEYID = 1
6,358,398 UART: [ldev] Erasing FE.KEYID = 1
8,829,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,388 UART: [ldev] --
10,621,276 UART: [fwproc] Wait for Commands...
10,623,154 UART: [fwproc] Recv command 0x46574c44
10,625,264 UART: [fwproc] Recv'd Img size: 114448 bytes
14,034,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,376 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,494,458 >>> mbox cmd response: success
14,495,041 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,498,772 UART: [afmc] ++
14,499,355 UART: [afmc] CDI.KEYID = 6
14,500,289 UART: [afmc] SUBJECT.KEYID = 7
14,501,456 UART: [afmc] AUTHORITY.KEYID = 5
16,999,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,413 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,160 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,057 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,794,783 UART: [afmc] --
18,799,249 UART: [cold-reset] --
18,802,674 UART: [state] Locking Datavault
18,806,732 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,376 UART: [state] Locking ICCM
18,810,253 UART: [exit] Launching FMC @ 0x40000130
18,818,648 UART:
18,818,885 UART: Running Caliptra FMC ...
18,820,005 UART:
18,820,170 UART: [state] CFI Enabled
18,828,326 UART: [fht] FMC Alias Private Key: 7
20,584,678 UART: [art] Extend RT PCRs Done
20,585,902 UART: [art] Lock RT PCRs Done
20,587,853 UART: [art] Populate DV Done
20,593,484 UART: [fht] FMC Alias Private Key: 7
20,595,019 UART: [art] Derive CDI
20,595,760 UART: [art] Store in in slot 0x4
20,638,508 UART: [art] Derive Key Pair
20,639,546 UART: [art] Store priv key in slot 0x5
23,066,477 UART: [art] Derive Key Pair - Done
23,079,418 UART: [art] Signing Cert with AUTHO
23,080,723 UART: RITY.KEYID = 7
24,785,832 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,333 UART: [art] PUB.X = 574A3E0758B3D3136C0E94F7C1110E00709E269A456D6A3A2D77A98A8E877F71FD71B5184F4B01930F70F809C4E3635F
24,794,598 UART: [art] PUB.Y = CC59423E58E39A0F6251161AD66B40D8D0C52EF22F12243F1B0082AC085987D188E12781554C89B8F915D950DCEB5965
24,801,803 UART: [art] SIG.R = 98D8208D0A790180E4120D8FA68A8102BF98922FD3248A1AE12D5F9B3287B5362E4ED95C6A5A149EBE6A644327208B2B
24,809,185 UART: [art] SIG.S = A64DA1717104FA8E71AA793DA9411EBD7B1CEBF094FA0A1D34360D2FBB655240CFB3EDE118B193D84B0CDA0301CB0E93
25,788,686 UART: Caliptra RT
25,789,381 UART: [state] CFI Enabled
25,906,336 UART: [rt] RT listening for mailbox commands...
25,937,741 UART: [rt]cmd =0x46505652, len=4
25,939,038 UART: [rt] FIPS Version
25,940,302 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,689,763 ready_for_fw is high
3,690,222 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,267,465 >>> mbox cmd response: success
14,268,100 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,517,279 UART:
18,517,658 UART: Running Caliptra FMC ...
18,518,814 UART:
18,518,967 UART: [state] CFI Enabled
18,526,852 UART: [fht] FMC Alias Private Key: 7
20,283,236 UART: [art] Extend RT PCRs Done
20,284,458 UART: [art] Lock RT PCRs Done
20,286,274 UART: [art] Populate DV Done
20,291,678 UART: [fht] FMC Alias Private Key: 7
20,293,269 UART: [art] Derive CDI
20,294,005 UART: [art] Store in in slot 0x4
20,336,493 UART: [art] Derive Key Pair
20,337,494 UART: [art] Store priv key in slot 0x5
22,764,449 UART: [art] Derive Key Pair - Done
22,777,179 UART: [art] Signing Cert with AUTHO
22,778,478 UART: RITY.KEYID = 7
24,484,096 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,603 UART: [art] PUB.X = 0FBBC4F96FCE7F551F9F1D4A9FF017D56F6BC69B79AE05EEAC0ABD83ACCDE5F2065F5F51EFA90D94BB9A747540D42E3C
24,492,902 UART: [art] PUB.Y = BD3B8D03AE78EA1C76B17BFD3C61B2A95857F40E2C31D4B2193633D6109BBB081B7B0330C4806E62FB1F7C2ED4DDB78F
24,500,182 UART: [art] SIG.R = 4A37DD2EC1B8CA7B92DAE62717C4AEEC44D86DD809A190BF44F27940D5EDB0313CEEBEA5930342F12EE3A70298333D05
24,507,580 UART: [art] SIG.S = 5EA54A2330769C2459069EC5B37C60BE0587101647CD862F1D8F37E8AF0F76247A6219E6B8EF79A358701538CC1BB5B2
25,486,495 UART: Caliptra RT
25,487,203 UART: [state] CFI Enabled
25,604,428 UART: [rt] RT listening for mailbox commands...
25,635,676 UART: [rt]cmd =0x46505652, len=4
25,637,010 UART: [rt] FIPS Version
25,638,231 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,437,693 ready_for_fw is high
3,438,294 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,725,861 >>> mbox cmd response: success
14,726,521 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,005,530 UART:
19,005,932 UART: Running Caliptra FMC ...
19,007,069 UART:
19,007,232 UART: [state] CFI Enabled
19,071,409 UART: [fht] FMC Alias Private Key: 7
20,835,936 UART: [art] Extend RT PCRs Done
20,837,158 UART: [art] Lock RT PCRs Done
20,839,047 UART: [art] Populate DV Done
20,844,477 UART: [fht] FMC Alias Private Key: 7
20,846,098 UART: [art] Derive CDI
20,846,855 UART: [art] Store in in slot 0x4
20,903,979 UART: [art] Derive Key Pair
20,905,020 UART: [art] Store priv key in slot 0x5
23,368,054 UART: [art] Derive Key Pair - Done
23,381,220 UART: [art] Signing Cert with AUTHO
23,382,529 UART: RITY.KEYID = 7
25,106,290 UART: [art] Erasing AUTHORITY.KEYID = 7
25,107,801 UART: [art] PUB.X = 1D23A70C6D1DEAC8BF208702297354FE75D784A8F96E4C88162F73C316D306DA59666A7805D05612241CE188AB3BBB21
25,115,034 UART: [art] PUB.Y = FCFE4B1E056B3293C5BE5CACC432661AF24667F43DFB5FC7E5C159116CF16CCA94F579213147ABF2081D8EB0550E04A5
25,122,327 UART: [art] SIG.R = E83D3069BC716141A09E6A4B730FD70E0FB9B67CFAD1E1B0E51BFC232CD7E2397B6BC99DCAF09238859EC9D213B6B38B
25,129,713 UART: [art] SIG.S = 459C905F6A218D4214EE397FD4F7AD800D2BFB5F427FD45ABEFADB45FB45BD274CB0EB6D60EE5BE991ECF4D6200859DF
26,108,694 UART: Caliptra RT
26,109,412 UART: [state] CFI Enabled
26,273,603 UART: [rt] RT listening for mailbox commands...
26,305,064 UART: [rt]cmd =0x46505652, len=4
26,306,347 UART: [rt] FIPS Version
26,307,567 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,759,058 ready_for_fw is high
3,759,510 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,970,085 >>> mbox cmd response: success
14,970,953 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,225,742 UART:
19,226,132 UART: Running Caliptra FMC ...
19,227,273 UART:
19,227,425 UART: [state] CFI Enabled
19,235,374 UART: [fht] FMC Alias Private Key: 7
20,992,279 UART: [art] Extend RT PCRs Done
20,993,511 UART: [art] Lock RT PCRs Done
20,995,380 UART: [art] Populate DV Done
21,000,939 UART: [fht] FMC Alias Private Key: 7
21,002,490 UART: [art] Derive CDI
21,003,313 UART: [art] Store in in slot 0x4
21,045,480 UART: [art] Derive Key Pair
21,046,483 UART: [art] Store priv key in slot 0x5
23,473,528 UART: [art] Derive Key Pair - Done
23,486,419 UART: [art] Signing Cert with AUTHO
23,487,721 UART: RITY.KEYID = 7
25,193,234 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,747 UART: [art] PUB.X = F7452284A5DE7811AEA91A95B9B3E67B6599A7A1AF3AF02454DC9253728E6956BE2CE648865B305816BAEDBFD2ECB161
25,201,988 UART: [art] PUB.Y = E9A451A341F6BA12F5A5E46F472D9433C42CB3B6804255A88AF377AB0B65713AE1DC54C30A04A7A059958B7D46DA4137
25,209,284 UART: [art] SIG.R = 7072D41BA0DE1A3D5C3F6B06AFAE25C7C4C8AFEB46CAA27396566CA7DD3BDCFE681771664F7943B0D511572B034366E8
25,216,679 UART: [art] SIG.S = F8A12EBF25F5DDE92159E334D76D91851F9191E30194E55DBA06D09BB7F88A1343FFB75486832D54E1C1DAD22C880F49
26,195,215 UART: Caliptra RT
26,195,928 UART: [state] CFI Enabled
26,312,391 UART: [rt] RT listening for mailbox commands...
26,343,820 UART: [rt]cmd =0x46505652, len=4
26,345,121 UART: [rt] FIPS Version
26,346,280 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,561 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,279 UART: [kat] SHA2-256
882,210 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,325 UART: [kat] ++
886,477 UART: [kat] sha1
890,503 UART: [kat] SHA2-256
892,441 UART: [kat] SHA2-384
895,198 UART: [kat] SHA2-512-ACC
897,099 UART: [kat] ECC-384
902,554 UART: [kat] HMAC-384Kdf
907,084 UART: [kat] LMS
1,475,280 UART: [kat] --
1,475,901 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,218 UART: [idev] ++
1,479,386 UART: [idev] CDI.KEYID = 6
1,479,746 UART: [idev] SUBJECT.KEYID = 7
1,480,170 UART: [idev] UDS.KEYID = 0
1,480,515 ready_for_fw is high
1,480,515 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,370 UART: [idev] Erasing UDS.KEYID = 0
1,505,650 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,152 UART: [idev] --
1,515,065 UART: [ldev] ++
1,515,233 UART: [ldev] CDI.KEYID = 6
1,515,596 UART: [ldev] SUBJECT.KEYID = 5
1,516,022 UART: [ldev] AUTHORITY.KEYID = 7
1,516,485 UART: [ldev] FE.KEYID = 1
1,521,579 UART: [ldev] Erasing FE.KEYID = 1
1,546,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,024 UART: [ldev] --
1,586,313 UART: [fwproc] Waiting for Commands...
1,587,162 UART: [fwproc] Received command 0x46574c44
1,587,953 UART: [fwproc] Received Image of size 114448 bytes
2,887,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,824 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,176 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,141 >>> mbox cmd response: success
3,080,141 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,081,367 UART: [afmc] ++
3,081,535 UART: [afmc] CDI.KEYID = 6
3,081,897 UART: [afmc] SUBJECT.KEYID = 7
3,082,322 UART: [afmc] AUTHORITY.KEYID = 5
3,117,143 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,191 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,971 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,699 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,584 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,274 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,193 UART: [afmc] --
3,160,229 UART: [cold-reset] --
3,160,997 UART: [state] Locking Datavault
3,162,226 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,830 UART: [state] Locking ICCM
3,163,266 UART: [exit] Launching FMC @ 0x40000130
3,168,595 UART:
3,168,611 UART: Running Caliptra FMC ...
3,169,019 UART:
3,169,073 UART: [state] CFI Enabled
3,179,728 UART: [fht] FMC Alias Private Key: 7
3,287,795 UART: [art] Extend RT PCRs Done
3,288,223 UART: [art] Lock RT PCRs Done
3,289,925 UART: [art] Populate DV Done
3,298,120 UART: [fht] FMC Alias Private Key: 7
3,299,246 UART: [art] Derive CDI
3,299,526 UART: [art] Store in in slot 0x4
3,385,121 UART: [art] Derive Key Pair
3,385,481 UART: [art] Store priv key in slot 0x5
3,398,623 UART: [art] Derive Key Pair - Done
3,413,359 UART: [art] Signing Cert with AUTHO
3,413,839 UART: RITY.KEYID = 7
3,428,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,384 UART: [art] PUB.X = A8602D258BD97A0BABB4B0BBE458EC6A84490440ED54683D3C1826936AC1854DF86AB83480957E5EC311C5C5C77E9B5F
3,436,156 UART: [art] PUB.Y = BE3BC5A00B2225B264914E0E1DCFD18A01026408DF4E693F98B5E63E49967BDCCDBDC2225D59D9343044824017752356
3,443,091 UART: [art] SIG.R = E7AAB1753A62A9306C5ECED1B280A195A30BD0FC2842A02BC7E3F1D2DC87F7F1A9A0DEEF799379CAE6EF4B023EF4BA2B
3,449,883 UART: [art] SIG.S = 6C45528644661830D0AC78415712F1B17593B107B50B55F85825F48D1D4FFE31CF0D2A2AE134C3877A496DA8D38FBD95
3,473,805 UART: Caliptra RT
3,474,058 UART: [state] CFI Enabled
3,582,919 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,247 UART: [rt]cmd =0x46505652, len=4
3,613,918 UART: [rt] FIPS Version
3,615,177 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,235 ready_for_fw is high
1,362,235 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,893 >>> mbox cmd response: success
2,928,893 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,425 UART:
2,989,441 UART: Running Caliptra FMC ...
2,989,849 UART:
2,989,903 UART: [state] CFI Enabled
3,000,422 UART: [fht] FMC Alias Private Key: 7
3,108,681 UART: [art] Extend RT PCRs Done
3,109,109 UART: [art] Lock RT PCRs Done
3,110,683 UART: [art] Populate DV Done
3,118,842 UART: [fht] FMC Alias Private Key: 7
3,119,968 UART: [art] Derive CDI
3,120,248 UART: [art] Store in in slot 0x4
3,205,801 UART: [art] Derive Key Pair
3,206,161 UART: [art] Store priv key in slot 0x5
3,219,353 UART: [art] Derive Key Pair - Done
3,234,489 UART: [art] Signing Cert with AUTHO
3,234,969 UART: RITY.KEYID = 7
3,249,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,666 UART: [art] PUB.X = E2AAC082ADA788917859281BB44BDD9360A52FEF065AA90C6533B39AB6BFED21166671196C74A6D41FC5403E3245340C
3,257,431 UART: [art] PUB.Y = B7084D9DD80991B6BAE0BCE99B74B674258703B143494F3BDA8268CDCB663E5575B8749D93EAE806D58BF4E88970E1C3
3,264,375 UART: [art] SIG.R = 4F85A45F06838E227C4E86695F25B57263DF4B4284198E21C4143BABE170CB5524315FDDC8B312C4959A15FE72521A6B
3,271,140 UART: [art] SIG.S = F94852B46C51D7489860EED9FFC65A21B65FF6DDF557A8112EB4A9C34E910F927D0C6AA053A8AEBFEAC8B289E5F7F496
3,294,701 UART: Caliptra RT
3,294,954 UART: [state] CFI Enabled
3,403,501 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,819 UART: [rt]cmd =0x46505652, len=4
3,434,490 UART: [rt] FIPS Version
3,435,395 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,292 UART: [kat] SHA2-256
882,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,338 UART: [kat] ++
886,490 UART: [kat] sha1
890,560 UART: [kat] SHA2-256
892,498 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
902,483 UART: [kat] HMAC-384Kdf
907,159 UART: [kat] LMS
1,475,355 UART: [kat] --
1,476,378 UART: [cold-reset] ++
1,476,950 UART: [fht] Storing FHT @ 0x50003400
1,479,819 UART: [idev] ++
1,479,987 UART: [idev] CDI.KEYID = 6
1,480,347 UART: [idev] SUBJECT.KEYID = 7
1,480,771 UART: [idev] UDS.KEYID = 0
1,481,116 ready_for_fw is high
1,481,116 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,885 UART: [idev] Erasing UDS.KEYID = 0
1,505,687 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,181 UART: [idev] --
1,515,186 UART: [ldev] ++
1,515,354 UART: [ldev] CDI.KEYID = 6
1,515,717 UART: [ldev] SUBJECT.KEYID = 5
1,516,143 UART: [ldev] AUTHORITY.KEYID = 7
1,516,606 UART: [ldev] FE.KEYID = 1
1,522,106 UART: [ldev] Erasing FE.KEYID = 1
1,547,227 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,295 UART: [ldev] --
1,586,720 UART: [fwproc] Waiting for Commands...
1,587,371 UART: [fwproc] Received command 0x46574c44
1,588,162 UART: [fwproc] Received Image of size 114448 bytes
2,887,067 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,728 >>> mbox cmd response: success
3,079,728 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,754 UART: [afmc] ++
3,080,922 UART: [afmc] CDI.KEYID = 6
3,081,284 UART: [afmc] SUBJECT.KEYID = 7
3,081,709 UART: [afmc] AUTHORITY.KEYID = 5
3,116,514 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,076 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,856 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,584 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,469 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,159 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,178 UART: [afmc] --
3,160,308 UART: [cold-reset] --
3,161,248 UART: [state] Locking Datavault
3,162,297 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,901 UART: [state] Locking ICCM
3,163,565 UART: [exit] Launching FMC @ 0x40000130
3,168,894 UART:
3,168,910 UART: Running Caliptra FMC ...
3,169,318 UART:
3,169,461 UART: [state] CFI Enabled
3,180,530 UART: [fht] FMC Alias Private Key: 7
3,288,675 UART: [art] Extend RT PCRs Done
3,289,103 UART: [art] Lock RT PCRs Done
3,290,649 UART: [art] Populate DV Done
3,299,018 UART: [fht] FMC Alias Private Key: 7
3,299,984 UART: [art] Derive CDI
3,300,264 UART: [art] Store in in slot 0x4
3,385,883 UART: [art] Derive Key Pair
3,386,243 UART: [art] Store priv key in slot 0x5
3,398,997 UART: [art] Derive Key Pair - Done
3,414,150 UART: [art] Signing Cert with AUTHO
3,414,630 UART: RITY.KEYID = 7
3,429,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,153 UART: [art] PUB.X = F2DFAF00C9F7AA146A6C977D16F8D0606E26F131429D46D54C05363936C4D6DD8122EE4AF35E89539FE21ED495A732EE
3,436,906 UART: [art] PUB.Y = 1CDC79CA37F7D629A2FF7576D89B75150B4C632BF646A1734AB24CFBEF9588C54CF72B49460164EDE6E09BCAE8520675
3,443,857 UART: [art] SIG.R = D5DDAE25379EE5E52D0DFEAD0F84A89828335A84D73F7F38EF84C46F6F55770586A5AB78D26060B5BFD97D2AACA6F289
3,450,634 UART: [art] SIG.S = FDCD136A641B5DD3FBBFAD9E10374D7A96B8460516274003E3B6439F6DEBB2F8A1E65DD98B3B3CC8497AEF606C740D42
3,475,040 UART: Caliptra RT
3,475,385 UART: [state] CFI Enabled
3,583,891 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,293 UART: [rt]cmd =0x46505652, len=4
3,614,964 UART: [rt] FIPS Version
3,616,073 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,346 ready_for_fw is high
1,363,346 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,930,060 >>> mbox cmd response: success
2,930,060 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,992,652 UART:
2,992,668 UART: Running Caliptra FMC ...
2,993,076 UART:
2,993,219 UART: [state] CFI Enabled
3,004,046 UART: [fht] FMC Alias Private Key: 7
3,112,433 UART: [art] Extend RT PCRs Done
3,112,861 UART: [art] Lock RT PCRs Done
3,114,617 UART: [art] Populate DV Done
3,122,928 UART: [fht] FMC Alias Private Key: 7
3,124,058 UART: [art] Derive CDI
3,124,338 UART: [art] Store in in slot 0x4
3,209,839 UART: [art] Derive Key Pair
3,210,199 UART: [art] Store priv key in slot 0x5
3,223,607 UART: [art] Derive Key Pair - Done
3,238,413 UART: [art] Signing Cert with AUTHO
3,238,893 UART: RITY.KEYID = 7
3,253,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,588 UART: [art] PUB.X = 8C04CE0423BDBE40B831A294C95262C9FDE1F81CF453BC618A908DC1D1B22C1AB05D4B1B3B394B0362C576B24A0C86E1
3,261,358 UART: [art] PUB.Y = 7D2BE5E62A2C728960458633539C8C0EA75ADEA78E7BEBDD8FBBBA1F8CC3B18634F1A70F0E4D525DD5005689FCA28954
3,268,293 UART: [art] SIG.R = 859BF4634110AD4CA98E7AD57AD8130F7748B3057E39BD868B5DDB6D1054C325E89D1099F1E6F6CE76348C0FAB6B521E
3,275,062 UART: [art] SIG.S = 7C00EBBB341A7653F14AA3A5CE3D080C9FEC71D7B5E4FAE0A4B64EA9F0213575F50F7CEFD1D53036DA891C11A043F1A6
3,299,188 UART: Caliptra RT
3,299,533 UART: [state] CFI Enabled
3,408,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,488 UART: [rt]cmd =0x46505652, len=4
3,439,159 UART: [rt] FIPS Version
3,440,108 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
893,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,643 UART: [kat] ++
897,795 UART: [kat] sha1
901,997 UART: [kat] SHA2-256
903,937 UART: [kat] SHA2-384
906,690 UART: [kat] SHA2-512-ACC
908,591 UART: [kat] ECC-384
918,294 UART: [kat] HMAC-384Kdf
922,956 UART: [kat] LMS
1,171,284 UART: [kat] --
1,172,193 UART: [cold-reset] ++
1,172,743 UART: [fht] FHT @ 0x50003400
1,175,338 UART: [idev] ++
1,175,506 UART: [idev] CDI.KEYID = 6
1,175,866 UART: [idev] SUBJECT.KEYID = 7
1,176,290 UART: [idev] UDS.KEYID = 0
1,176,635 ready_for_fw is high
1,176,635 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,358 UART: [idev] Erasing UDS.KEYID = 0
1,201,543 UART: [idev] Sha1 KeyId Algorithm
1,209,965 UART: [idev] --
1,210,971 UART: [ldev] ++
1,211,139 UART: [ldev] CDI.KEYID = 6
1,211,502 UART: [ldev] SUBJECT.KEYID = 5
1,211,928 UART: [ldev] AUTHORITY.KEYID = 7
1,212,391 UART: [ldev] FE.KEYID = 1
1,217,911 UART: [ldev] Erasing FE.KEYID = 1
1,244,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,351 UART: [ldev] --
1,283,626 UART: [fwproc] Wait for Commands...
1,284,198 UART: [fwproc] Recv command 0x46574c44
1,284,926 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,987 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,291 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,308 >>> mbox cmd response: success
2,776,308 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,777,438 UART: [afmc] ++
2,777,606 UART: [afmc] CDI.KEYID = 6
2,777,968 UART: [afmc] SUBJECT.KEYID = 7
2,778,393 UART: [afmc] AUTHORITY.KEYID = 5
2,813,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,867 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,595 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,480 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,199 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,167 UART: [afmc] --
2,857,171 UART: [cold-reset] --
2,858,131 UART: [state] Locking Datavault
2,859,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,018 UART: [state] Locking ICCM
2,860,662 UART: [exit] Launching FMC @ 0x40000130
2,865,991 UART:
2,866,007 UART: Running Caliptra FMC ...
2,866,415 UART:
2,866,469 UART: [state] CFI Enabled
2,877,170 UART: [fht] FMC Alias Private Key: 7
2,984,975 UART: [art] Extend RT PCRs Done
2,985,403 UART: [art] Lock RT PCRs Done
2,987,215 UART: [art] Populate DV Done
2,995,400 UART: [fht] FMC Alias Private Key: 7
2,996,534 UART: [art] Derive CDI
2,996,814 UART: [art] Store in in slot 0x4
3,082,277 UART: [art] Derive Key Pair
3,082,637 UART: [art] Store priv key in slot 0x5
3,096,591 UART: [art] Derive Key Pair - Done
3,111,328 UART: [art] Signing Cert with AUTHO
3,111,808 UART: RITY.KEYID = 7
3,127,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,847 UART: [art] PUB.X = 739E29A1F3EC232D2BF60311C524AFE7C415BA9D9EF0C963F463C1784ED2BD285739D204E6C7DE19FA3FFBC29DE65BE5
3,134,629 UART: [art] PUB.Y = 433052F8C9297063214A5411EC064E094DB68110C348370D6BB41AFA319BEF7FD42110B55978A437F359A8D55424F4A2
3,141,562 UART: [art] SIG.R = 9C2677DBA032F504537C02A7AEEC7EC6098DA1F5D6152E0D8A19BED26ED54B5A17DFD31E547308D2E220C0E7F33F8531
3,148,329 UART: [art] SIG.S = 376000E4D29BE4FC894E9E9D45B03FCE52F4238642DEEE9A383C97D2AD53C5FACE8EDC0C8B77786404C80769CBD6DF7B
3,172,605 UART: Caliptra RT
3,172,858 UART: [state] CFI Enabled
3,279,991 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,497 UART: [rt]cmd =0x46505652, len=4
3,311,168 UART: [rt] FIPS Version
3,312,397 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,329 ready_for_fw is high
1,060,329 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,107 >>> mbox cmd response: success
2,628,107 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,071 UART:
2,689,087 UART: Running Caliptra FMC ...
2,689,495 UART:
2,689,549 UART: [state] CFI Enabled
2,700,210 UART: [fht] FMC Alias Private Key: 7
2,809,033 UART: [art] Extend RT PCRs Done
2,809,461 UART: [art] Lock RT PCRs Done
2,811,147 UART: [art] Populate DV Done
2,819,454 UART: [fht] FMC Alias Private Key: 7
2,820,500 UART: [art] Derive CDI
2,820,780 UART: [art] Store in in slot 0x4
2,906,591 UART: [art] Derive Key Pair
2,906,951 UART: [art] Store priv key in slot 0x5
2,919,827 UART: [art] Derive Key Pair - Done
2,934,451 UART: [art] Signing Cert with AUTHO
2,934,931 UART: RITY.KEYID = 7
2,949,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,634 UART: [art] PUB.X = 7139CA1147EE914A10EB07AFA8894B3DA90B18722708AAA198641B3F570DE5442E5E81BE74E3E8E6BC8C9CE83344C06C
2,957,400 UART: [art] PUB.Y = 1AC71448A3556AB79DD561237E8A0A0F03D382868F314BA1BE8DBA412E87909D6D7A0B546F42B90A4E14047D18720FF9
2,964,331 UART: [art] SIG.R = E9DEB9EC778757622380335B70A3EFC83F32116123DE1DFD57D34357227507F1836A6A9452B66C4A9F2808C4DF50B3CB
2,971,095 UART: [art] SIG.S = CC7877B8F1F26570BBAA031BBA1FC9A46C822CE5A87CD64C2DB7A75972171308D1508E2DAEACA8CE92762422EAA83BB3
2,994,748 UART: Caliptra RT
2,995,001 UART: [state] CFI Enabled
3,102,333 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,801 UART: [rt]cmd =0x46505652, len=4
3,133,472 UART: [rt] FIPS Version
3,134,529 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
893,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,522 UART: [kat] ++
897,674 UART: [kat] sha1
902,002 UART: [kat] SHA2-256
903,942 UART: [kat] SHA2-384
906,761 UART: [kat] SHA2-512-ACC
908,662 UART: [kat] ECC-384
918,577 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,278 UART: [cold-reset] ++
1,172,690 UART: [fht] FHT @ 0x50003400
1,175,397 UART: [idev] ++
1,175,565 UART: [idev] CDI.KEYID = 6
1,175,925 UART: [idev] SUBJECT.KEYID = 7
1,176,349 UART: [idev] UDS.KEYID = 0
1,176,694 ready_for_fw is high
1,176,694 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,351 UART: [idev] Erasing UDS.KEYID = 0
1,201,380 UART: [idev] Sha1 KeyId Algorithm
1,209,902 UART: [idev] --
1,211,036 UART: [ldev] ++
1,211,204 UART: [ldev] CDI.KEYID = 6
1,211,567 UART: [ldev] SUBJECT.KEYID = 5
1,211,993 UART: [ldev] AUTHORITY.KEYID = 7
1,212,456 UART: [ldev] FE.KEYID = 1
1,217,568 UART: [ldev] Erasing FE.KEYID = 1
1,244,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,490 UART: [ldev] --
1,283,771 UART: [fwproc] Wait for Commands...
1,284,467 UART: [fwproc] Recv command 0x46574c44
1,285,195 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,302 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,671 >>> mbox cmd response: success
2,778,671 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,779,699 UART: [afmc] ++
2,779,867 UART: [afmc] CDI.KEYID = 6
2,780,229 UART: [afmc] SUBJECT.KEYID = 7
2,780,654 UART: [afmc] AUTHORITY.KEYID = 5
2,816,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,280 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,008 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,893 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,612 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,406 UART: [afmc] --
2,859,452 UART: [cold-reset] --
2,860,398 UART: [state] Locking Datavault
2,861,453 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,057 UART: [state] Locking ICCM
2,862,557 UART: [exit] Launching FMC @ 0x40000130
2,867,886 UART:
2,867,902 UART: Running Caliptra FMC ...
2,868,310 UART:
2,868,453 UART: [state] CFI Enabled
2,879,150 UART: [fht] FMC Alias Private Key: 7
2,987,955 UART: [art] Extend RT PCRs Done
2,988,383 UART: [art] Lock RT PCRs Done
2,990,107 UART: [art] Populate DV Done
2,998,380 UART: [fht] FMC Alias Private Key: 7
2,999,406 UART: [art] Derive CDI
2,999,686 UART: [art] Store in in slot 0x4
3,085,237 UART: [art] Derive Key Pair
3,085,597 UART: [art] Store priv key in slot 0x5
3,098,679 UART: [art] Derive Key Pair - Done
3,113,522 UART: [art] Signing Cert with AUTHO
3,114,002 UART: RITY.KEYID = 7
3,129,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,347 UART: [art] PUB.X = 64C34F5CC8A67AD842BC695D63963D0D2BC541B78DD8AE31EE9144249F173A33ABCF593DDD95C40046DBC0327ED0E0AD
3,137,108 UART: [art] PUB.Y = 6D8842B204879CCD3074D17984C65721B806FE68F62749A03454C0DCEF8C5AA53CC43AE3947206682563530E0C649471
3,144,033 UART: [art] SIG.R = 04384C401A08B42DD4B3304EA2B8DB01B23BE1329E07EBEF64EC8DFC17648644BAFEEF349888BAEB94428B9532598914
3,150,799 UART: [art] SIG.S = 3CF7E7122BD3E43AE20CB22B1ED7C1613AC1A0CCBB7320F48A0532A5399A94F43ED83BF178237581E1A8E2F1B92D6AA6
3,174,318 UART: Caliptra RT
3,174,663 UART: [state] CFI Enabled
3,281,926 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,806 UART: [rt]cmd =0x46505652, len=4
3,313,477 UART: [rt] FIPS Version
3,314,704 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,066 ready_for_fw is high
1,060,066 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,144 >>> mbox cmd response: success
2,628,144 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,690,332 UART:
2,690,348 UART: Running Caliptra FMC ...
2,690,756 UART:
2,690,899 UART: [state] CFI Enabled
2,701,612 UART: [fht] FMC Alias Private Key: 7
2,809,995 UART: [art] Extend RT PCRs Done
2,810,423 UART: [art] Lock RT PCRs Done
2,811,539 UART: [art] Populate DV Done
2,820,006 UART: [fht] FMC Alias Private Key: 7
2,821,068 UART: [art] Derive CDI
2,821,348 UART: [art] Store in in slot 0x4
2,906,895 UART: [art] Derive Key Pair
2,907,255 UART: [art] Store priv key in slot 0x5
2,920,557 UART: [art] Derive Key Pair - Done
2,935,324 UART: [art] Signing Cert with AUTHO
2,935,804 UART: RITY.KEYID = 7
2,950,452 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,217 UART: [art] PUB.X = 21E82EA6A8E253AF1CD5300E3C841108CD4EBE5528D9B952747BB0F942F280F9AC1441CD523CB59A6F3A18E72600B0CC
2,957,969 UART: [art] PUB.Y = A634C077FE76A0C902002D78EB4BCC07ABA9F4435A742507109E0B3288C56BA929A4CA5B4488DFD0CCBFD41C8E79D412
2,964,897 UART: [art] SIG.R = E92BEA5A0C216312629964334315C6DB0AA37DF0D337552AF1F8611BCBB2E6EB439B8EC46A26FB670B31C38D58AC799E
2,971,668 UART: [art] SIG.S = 83520350797C15CFC5B628710F1BD4279EAE34B44539FB2C6F0E71CE23BB718965C54A4506A58585D383ADC863CF0582
2,996,206 UART: Caliptra RT
2,996,551 UART: [state] CFI Enabled
3,104,741 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,181 UART: [rt]cmd =0x46505652, len=4
3,135,852 UART: [rt] FIPS Version
3,136,939 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,814 UART: [kat] SHA2-512-ACC
906,715 UART: [kat] ECC-384
916,732 UART: [kat] HMAC-384Kdf
921,390 UART: [kat] LMS
1,169,702 UART: [kat] --
1,170,723 UART: [cold-reset] ++
1,171,063 UART: [fht] FHT @ 0x50003400
1,173,953 UART: [idev] ++
1,174,121 UART: [idev] CDI.KEYID = 6
1,174,482 UART: [idev] SUBJECT.KEYID = 7
1,174,907 UART: [idev] UDS.KEYID = 0
1,175,253 ready_for_fw is high
1,175,253 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,787 UART: [idev] Erasing UDS.KEYID = 0
1,199,511 UART: [idev] Sha1 KeyId Algorithm
1,208,231 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,894 UART: [ldev] Erasing FE.KEYID = 1
1,242,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,320 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,359 UART: [fwproc] Recv command 0x46574c44
1,283,092 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,688 >>> mbox cmd response: success
2,774,688 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,801 UART: [afmc] ++
2,775,969 UART: [afmc] CDI.KEYID = 6
2,776,332 UART: [afmc] SUBJECT.KEYID = 7
2,776,758 UART: [afmc] AUTHORITY.KEYID = 5
2,812,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,290 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,908 UART: [afmc] --
2,856,032 UART: [cold-reset] --
2,856,626 UART: [state] Locking Datavault
2,857,679 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,283 UART: [state] Locking ICCM
2,858,953 UART: [exit] Launching FMC @ 0x40000130
2,864,282 UART:
2,864,298 UART: Running Caliptra FMC ...
2,864,706 UART:
2,864,760 UART: [state] CFI Enabled
2,875,353 UART: [fht] FMC Alias Private Key: 7
2,983,998 UART: [art] Extend RT PCRs Done
2,984,426 UART: [art] Lock RT PCRs Done
2,985,914 UART: [art] Populate DV Done
2,994,181 UART: [fht] FMC Alias Private Key: 7
2,995,271 UART: [art] Derive CDI
2,995,551 UART: [art] Store in in slot 0x4
3,081,210 UART: [art] Derive Key Pair
3,081,570 UART: [art] Store priv key in slot 0x5
3,094,060 UART: [art] Derive Key Pair - Done
3,108,805 UART: [art] Signing Cert with AUTHO
3,109,285 UART: RITY.KEYID = 7
3,123,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,708 UART: [art] PUB.X = 5BD4539EB96C3F3DA9912935416331D57D03206B46F7F2A0AB5B6EB000B364CCCF7D27ECB0BA9E1C48BF4AA7ED80C7F3
3,131,471 UART: [art] PUB.Y = DD9C6FE7CCE91E2859B2C77F0CA7F27EBEECC5406794936DD0F4D2BF5DC3EBF2D8F54F96591AC6BC608799F32751A3A4
3,138,440 UART: [art] SIG.R = BC56E71958561ACBE5698AB904BE7191232D17890ECBECEE607E9E7CF097BEC4CFD7858B14AF0C16BE410F97FAC6CB6F
3,145,220 UART: [art] SIG.S = E02434AEFCEB5A0547BC750143F96C208D28DC579BD0B8B7F1174908709CE80A75D0F5B4851E36E2FD64E57D61C2186B
3,169,223 UART: Caliptra RT
3,169,476 UART: [state] CFI Enabled
3,277,234 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,998 UART: [rt]cmd =0x46505652, len=4
3,308,669 UART: [rt] FIPS Version
3,309,590 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,966 ready_for_fw is high
1,055,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,818 >>> mbox cmd response: success
2,622,818 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,774 UART:
2,684,790 UART: Running Caliptra FMC ...
2,685,198 UART:
2,685,252 UART: [state] CFI Enabled
2,695,865 UART: [fht] FMC Alias Private Key: 7
2,803,386 UART: [art] Extend RT PCRs Done
2,803,814 UART: [art] Lock RT PCRs Done
2,805,260 UART: [art] Populate DV Done
2,813,679 UART: [fht] FMC Alias Private Key: 7
2,814,857 UART: [art] Derive CDI
2,815,137 UART: [art] Store in in slot 0x4
2,900,328 UART: [art] Derive Key Pair
2,900,688 UART: [art] Store priv key in slot 0x5
2,914,012 UART: [art] Derive Key Pair - Done
2,928,892 UART: [art] Signing Cert with AUTHO
2,929,372 UART: RITY.KEYID = 7
2,944,384 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,149 UART: [art] PUB.X = 880074DC20C865FC25E3931F636E1AF4552ABCC47427DA4D5029AC35CB56B484A53A1290966E8E50AAFAD036BCB28782
2,951,903 UART: [art] PUB.Y = D4462E948B11C2E07AB90FD70EC07C69AC2B033080CF2834EF607C2BDC57CC0E75A69478C1FFCA409DD4E32110FB1447
2,958,853 UART: [art] SIG.R = 28026CAA4EDD7EDABA7A7816686C4208F3D577F2E5DAFD83A5BF97AB9411500A1213D1AB0B781394B7A9952D731652DB
2,965,621 UART: [art] SIG.S = 84E90A6A191B75EF710977E10145F4A13BF0F5F422234B2213720D50A5A783A132CAFA631BFFA265B35C324A480FEB55
2,989,671 UART: Caliptra RT
2,989,924 UART: [state] CFI Enabled
3,096,773 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,335 UART: [rt]cmd =0x46505652, len=4
3,128,006 UART: [rt] FIPS Version
3,129,089 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,628 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,174,574 ready_for_fw is high
1,174,574 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,744 UART: [idev] Sha1 KeyId Algorithm
1,208,712 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,455 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,243,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,063 UART: [ldev] --
1,282,361 UART: [fwproc] Wait for Commands...
1,283,170 UART: [fwproc] Recv command 0x46574c44
1,283,903 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,019 >>> mbox cmd response: success
2,775,019 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,152 UART: [afmc] ++
2,776,320 UART: [afmc] CDI.KEYID = 6
2,776,683 UART: [afmc] SUBJECT.KEYID = 7
2,777,109 UART: [afmc] AUTHORITY.KEYID = 5
2,812,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,109 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,838 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,721 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,321 UART: [afmc] --
2,856,383 UART: [cold-reset] --
2,857,315 UART: [state] Locking Datavault
2,858,468 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,072 UART: [state] Locking ICCM
2,859,586 UART: [exit] Launching FMC @ 0x40000130
2,864,915 UART:
2,864,931 UART: Running Caliptra FMC ...
2,865,339 UART:
2,865,482 UART: [state] CFI Enabled
2,876,141 UART: [fht] FMC Alias Private Key: 7
2,983,744 UART: [art] Extend RT PCRs Done
2,984,172 UART: [art] Lock RT PCRs Done
2,985,946 UART: [art] Populate DV Done
2,994,165 UART: [fht] FMC Alias Private Key: 7
2,995,319 UART: [art] Derive CDI
2,995,599 UART: [art] Store in in slot 0x4
3,081,494 UART: [art] Derive Key Pair
3,081,854 UART: [art] Store priv key in slot 0x5
3,095,344 UART: [art] Derive Key Pair - Done
3,110,310 UART: [art] Signing Cert with AUTHO
3,110,790 UART: RITY.KEYID = 7
3,125,676 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,441 UART: [art] PUB.X = B540160323281ACAB845048FFCCC3641A073FADB8DDE60C54F521BA5CF7F736DE36A53BFB0D5AEC5D31E2A8AF639614B
3,133,225 UART: [art] PUB.Y = 8EBDD0F0888B0E2824D682D4C8F731A455A17C472EFA60C01D7E62DDA320308D3FF56C0BB0008C788C5EE2DE39E890FD
3,140,161 UART: [art] SIG.R = 7FF2BD88F84CED064640C1AAA1E5CFA6B42454C175E5B73E155633EE72B73CEEDFD25C9496C84C02AE9E01194D3B7B22
3,146,938 UART: [art] SIG.S = 03C84F317FC82911E96C8990099BE6C5642E1FF25E3CDD0B19B190669846A99454C787E5AC3E7A1831D4B900D73A1002
3,170,603 UART: Caliptra RT
3,170,948 UART: [state] CFI Enabled
3,277,601 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,965 UART: [rt]cmd =0x46505652, len=4
3,308,636 UART: [rt] FIPS Version
3,309,577 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,019 ready_for_fw is high
1,056,019 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,622,453 >>> mbox cmd response: success
2,622,453 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,655 UART:
2,684,671 UART: Running Caliptra FMC ...
2,685,079 UART:
2,685,222 UART: [state] CFI Enabled
2,696,023 UART: [fht] FMC Alias Private Key: 7
2,804,516 UART: [art] Extend RT PCRs Done
2,804,944 UART: [art] Lock RT PCRs Done
2,806,440 UART: [art] Populate DV Done
2,814,799 UART: [fht] FMC Alias Private Key: 7
2,815,961 UART: [art] Derive CDI
2,816,241 UART: [art] Store in in slot 0x4
2,901,978 UART: [art] Derive Key Pair
2,902,338 UART: [art] Store priv key in slot 0x5
2,915,790 UART: [art] Derive Key Pair - Done
2,930,806 UART: [art] Signing Cert with AUTHO
2,931,286 UART: RITY.KEYID = 7
2,946,142 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,907 UART: [art] PUB.X = F50E4E1055998EBCB7D00B5D7766CE3764CD6D71BB39A3B3B2A162865553A44B716989787C2878F6FBF4479727F6ADBA
2,953,675 UART: [art] PUB.Y = C40B76ED8E6FC30CEF80254C06C6484C2C8076830C42F220A06CE51491A751A6C67DB6E484F4496E1D196BCD812A231B
2,960,617 UART: [art] SIG.R = 709F78F3CE8EB17CEA96F88BEF7010D923EC68117F289B3B2498D87E0BD8ACFC80BD0C9C23AB03E1EBF8321AA368F8F6
2,967,398 UART: [art] SIG.S = 559EB29EC4226539FDD5E3EBC2F463FB139D12B7753682614489810CE01E71B9A7FB22A9650C8F2D65662EE7F5BC71E5
2,991,655 UART: Caliptra RT
2,992,000 UART: [state] CFI Enabled
3,099,455 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,875 UART: [rt]cmd =0x46505652, len=4
3,130,546 UART: [rt] FIPS Version
3,131,629 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,036 UART:
192,439 UART: Running Caliptra ROM ...
193,599 UART:
193,753 UART: [state] CFI Enabled
264,759 UART: [state] LifecycleState = Unprovisioned
266,704 UART: [state] DebugLocked = No
269,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,286 UART: [kat] SHA2-256
443,993 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,481 UART: [kat] ++
454,985 UART: [kat] sha1
464,726 UART: [kat] SHA2-256
467,468 UART: [kat] SHA2-384
472,418 UART: [kat] SHA2-512-ACC
474,812 UART: [kat] ECC-384
2,766,337 UART: [kat] HMAC-384Kdf
2,779,505 UART: [kat] LMS
3,969,785 UART: [kat] --
3,973,747 UART: [cold-reset] ++
3,975,795 UART: [fht] Storing FHT @ 0x50003400
3,988,469 UART: [idev] ++
3,989,040 UART: [idev] CDI.KEYID = 6
3,989,951 UART: [idev] SUBJECT.KEYID = 7
3,991,220 UART: [idev] UDS.KEYID = 0
4,076,925 UART: [idev] Erasing UDS.KEYID = 0
4,079,141 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,325,573 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,368 UART: [idev] --
7,350,696 UART: [ldev] ++
7,351,267 UART: [ldev] CDI.KEYID = 6
7,352,251 UART: [ldev] SUBJECT.KEYID = 5
7,353,468 UART: [ldev] AUTHORITY.KEYID = 7
7,354,699 UART: [ldev] FE.KEYID = 1
7,401,449 UART: [ldev] Erasing FE.KEYID = 1
10,734,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,695 UART: [ldev] --
13,095,228 UART: [fwproc] Waiting for Commands...
13,098,467 UART: [fwproc] Received command 0x46505652
13,100,876 UART: [rt] FIPS Version
13,102,498 >>> mbox cmd response data (36 bytes)
13,103,378 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,104,826 UART: [fwproc] Received command 0x46504c54
13,107,304 UART: [kat] SHA2-256
13,276,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,287,332 UART: [kat] ++
13,287,821 UART: [kat] sha1
13,300,490 UART: [kat] SHA2-256
13,303,253 UART: [kat] SHA2-384
13,310,055 UART: [kat] SHA2-512-ACC
13,312,460 UART: [kat] ECC-384
15,609,910 UART: [kat] HMAC-384Kdf
15,621,382 UART: [kat] LMS
16,810,857 UART: [kat] --
16,811,557 >>> mbox cmd response data (8 bytes)
16,811,912 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,812,619 UART: [fwproc] Received command 0x46504c67
16,815,260 >>> mbox cmd response data (8 bytes)
16,815,580 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,816,490 UART: [fwproc] Received command 0x43415053
16,819,501 >>> mbox cmd response data (24 bytes)
16,820,022 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,820,593 UART: [fwproc] Received command 0x4d454153
16,829,550 >>> mbox cmd response data (12 bytes)
16,829,967 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,830,667 UART: [fwproc] Received command 0x46505344
16,833,463 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,867,225 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,822,022 >>> mbox cmd response data (36 bytes)
12,823,225 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,355,424 >>> mbox cmd response data (8 bytes)
16,355,924 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,357,566 >>> mbox cmd response data (8 bytes)
16,357,979 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,359,768 >>> mbox cmd response data (24 bytes)
16,360,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,368,980 >>> mbox cmd response data (12 bytes)
16,369,408 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,370,762 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
192,348 UART:
192,723 UART: Running Caliptra ROM ...
193,883 UART:
603,614 UART: [state] CFI Enabled
617,422 UART: [state] LifecycleState = Unprovisioned
619,335 UART: [state] DebugLocked = No
621,573 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,988 UART: [kat] SHA2-256
795,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,243 UART: [kat] ++
806,774 UART: [kat] sha1
817,599 UART: [kat] SHA2-256
820,289 UART: [kat] SHA2-384
826,611 UART: [kat] SHA2-512-ACC
828,958 UART: [kat] ECC-384
3,112,117 UART: [kat] HMAC-384Kdf
3,122,960 UART: [kat] LMS
4,313,065 UART: [kat] --
4,317,784 UART: [cold-reset] ++
4,320,376 UART: [fht] Storing FHT @ 0x50003400
4,331,580 UART: [idev] ++
4,332,161 UART: [idev] CDI.KEYID = 6
4,333,181 UART: [idev] SUBJECT.KEYID = 7
4,334,340 UART: [idev] UDS.KEYID = 0
4,419,342 UART: [idev] Erasing UDS.KEYID = 0
4,421,509 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,618,579 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,653 UART: [idev] --
7,645,339 UART: [ldev] ++
7,645,914 UART: [ldev] CDI.KEYID = 6
7,646,883 UART: [ldev] SUBJECT.KEYID = 5
7,648,100 UART: [ldev] AUTHORITY.KEYID = 7
7,649,354 UART: [ldev] FE.KEYID = 1
7,661,142 UART: [ldev] Erasing FE.KEYID = 1
10,948,255 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,886 UART: [ldev] --
13,309,157 UART: [fwproc] Waiting for Commands...
13,311,852 UART: [fwproc] Received command 0x46505652
13,314,258 UART: [rt] FIPS Version
13,315,923 >>> mbox cmd response data (36 bytes)
13,316,784 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,317,204 UART: [fwproc] Received command 0x46504c54
13,319,687 UART: [kat] SHA2-256
13,489,362 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,499,731 UART: [kat] ++
13,500,218 UART: [kat] sha1
13,511,218 UART: [kat] SHA2-256
13,513,960 UART: [kat] SHA2-384
13,520,162 UART: [kat] SHA2-512-ACC
13,522,549 UART: [kat] ECC-384
15,809,272 UART: [kat] HMAC-384Kdf
15,820,904 UART: [kat] LMS
17,010,338 UART: [kat] --
17,011,084 >>> mbox cmd response data (8 bytes)
17,011,435 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,012,471 UART: [fwproc] Received command 0x46504c67
17,015,134 >>> mbox cmd response data (8 bytes)
17,015,463 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,016,864 UART: [fwproc] Received command 0x43415053
17,019,851 >>> mbox cmd response data (24 bytes)
17,020,330 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,020,900 UART: [fwproc] Received command 0x4d454153
17,029,920 >>> mbox cmd response data (12 bytes)
17,030,342 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,031,480 UART: [fwproc] Received command 0x46505344
17,034,280 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,220,182 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,046,955 >>> mbox cmd response data (36 bytes)
13,048,071 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,546,739 >>> mbox cmd response data (8 bytes)
16,547,747 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,548,668 >>> mbox cmd response data (8 bytes)
16,548,975 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,550,426 >>> mbox cmd response data (24 bytes)
16,551,018 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,560,177 >>> mbox cmd response data (12 bytes)
16,560,624 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,562,037 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,404 UART:
192,793 UART: Running Caliptra ROM ...
193,920 UART:
194,067 UART: [state] CFI Enabled
265,684 UART: [state] LifecycleState = Unprovisioned
267,573 UART: [state] DebugLocked = No
269,166 UART: [state] WD Timer not started. Device not locked for debugging
273,566 UART: [kat] SHA2-256
452,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,294 UART: [kat] ++
464,823 UART: [kat] sha1
474,190 UART: [kat] SHA2-256
477,247 UART: [kat] SHA2-384
483,110 UART: [kat] SHA2-512-ACC
486,064 UART: [kat] ECC-384
2,949,660 UART: [kat] HMAC-384Kdf
2,971,224 UART: [kat] LMS
3,500,702 UART: [kat] --
3,505,563 UART: [cold-reset] ++
3,506,695 UART: [fht] FHT @ 0x50003400
3,516,678 UART: [idev] ++
3,517,243 UART: [idev] CDI.KEYID = 6
3,518,127 UART: [idev] SUBJECT.KEYID = 7
3,519,291 UART: [idev] UDS.KEYID = 0
3,601,695 UART: [idev] Erasing UDS.KEYID = 0
3,603,890 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,026,600 UART: [idev] Sha1 KeyId Algorithm
6,049,883 UART: [idev] --
6,053,350 UART: [ldev] ++
6,053,927 UART: [ldev] CDI.KEYID = 6
6,054,820 UART: [ldev] SUBJECT.KEYID = 5
6,055,928 UART: [ldev] AUTHORITY.KEYID = 7
6,057,279 UART: [ldev] FE.KEYID = 1
6,099,191 UART: [ldev] Erasing FE.KEYID = 1
8,601,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,611 UART: [ldev] --
10,416,387 UART: [fwproc] Wait for Commands...
10,419,185 UART: [fwproc] Recv command 0x46505652
10,421,551 UART: [rt] FIPS Version
10,423,033 >>> mbox cmd response data (36 bytes)
10,423,736 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,424,842 UART: [fwproc] Recv command 0x46504c54
10,427,158 UART: [kat] SHA2-256
10,606,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,618,002 UART: [kat] ++
10,618,581 UART: [kat] sha1
10,630,234 UART: [kat] SHA2-256
10,633,247 UART: [kat] SHA2-384
10,638,908 UART: [kat] SHA2-512-ACC
10,641,852 UART: [kat] ECC-384
13,099,920 UART: [kat] HMAC-384Kdf
13,124,100 UART: [kat] LMS
13,653,611 UART: [kat] --
13,654,307 >>> mbox cmd response data (8 bytes)
13,654,649 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,655,515 UART: [fwproc] Recv command 0x46504c67
13,658,062 >>> mbox cmd response data (8 bytes)
13,658,372 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,659,824 UART: [fwproc] Recv command 0x43415053
13,662,526 >>> mbox cmd response data (24 bytes)
13,662,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,663,777 UART: [fwproc] Recv command 0x4d454153
13,672,325 >>> mbox cmd response data (12 bytes)
13,672,750 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,673,505 UART: [fwproc] Recv command 0x46505344
13,675,987 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,123 writing to cptra_bootfsm_go
3,460,355 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,179,638 >>> mbox cmd response data (36 bytes)
10,180,815 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,263,643 >>> mbox cmd response data (8 bytes)
13,264,138 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,265,189 >>> mbox cmd response data (8 bytes)
13,265,601 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,267,282 >>> mbox cmd response data (24 bytes)
13,267,814 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,275,298 >>> mbox cmd response data (12 bytes)
13,275,709 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,278,469 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,573 UART:
192,949 UART: Running Caliptra ROM ...
194,117 UART:
603,787 UART: [state] CFI Enabled
618,301 UART: [state] LifecycleState = Unprovisioned
620,166 UART: [state] DebugLocked = No
621,973 UART: [state] WD Timer not started. Device not locked for debugging
625,666 UART: [kat] SHA2-256
804,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,367 UART: [kat] ++
816,901 UART: [kat] sha1
828,053 UART: [kat] SHA2-256
831,060 UART: [kat] SHA2-384
837,686 UART: [kat] SHA2-512-ACC
840,617 UART: [kat] ECC-384
3,284,871 UART: [kat] HMAC-384Kdf
3,297,331 UART: [kat] LMS
3,826,797 UART: [kat] --
3,829,383 UART: [cold-reset] ++
3,830,937 UART: [fht] FHT @ 0x50003400
3,841,968 UART: [idev] ++
3,842,530 UART: [idev] CDI.KEYID = 6
3,843,444 UART: [idev] SUBJECT.KEYID = 7
3,844,661 UART: [idev] UDS.KEYID = 0
3,925,624 UART: [idev] Erasing UDS.KEYID = 0
3,927,890 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,315,765 UART: [idev] Sha1 KeyId Algorithm
6,339,120 UART: [idev] --
6,343,703 UART: [ldev] ++
6,344,288 UART: [ldev] CDI.KEYID = 6
6,345,183 UART: [ldev] SUBJECT.KEYID = 5
6,346,403 UART: [ldev] AUTHORITY.KEYID = 7
6,347,638 UART: [ldev] FE.KEYID = 1
6,357,880 UART: [ldev] Erasing FE.KEYID = 1
8,828,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,816 UART: [ldev] --
10,619,538 UART: [fwproc] Wait for Commands...
10,621,909 UART: [fwproc] Recv command 0x46505652
10,624,276 UART: [rt] FIPS Version
10,625,759 >>> mbox cmd response data (36 bytes)
10,626,494 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,627,599 UART: [fwproc] Recv command 0x46504c54
10,629,987 UART: [kat] SHA2-256
10,809,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,820,761 UART: [kat] ++
10,821,220 UART: [kat] sha1
10,832,374 UART: [kat] SHA2-256
10,835,449 UART: [kat] SHA2-384
10,840,956 UART: [kat] SHA2-512-ACC
10,843,950 UART: [kat] ECC-384
13,285,527 UART: [kat] HMAC-384Kdf
13,297,099 UART: [kat] LMS
13,826,728 UART: [kat] --
13,827,387 >>> mbox cmd response data (8 bytes)
13,827,739 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,829,520 UART: [fwproc] Recv command 0x46504c67
13,832,092 >>> mbox cmd response data (8 bytes)
13,832,406 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,833,532 UART: [fwproc] Recv command 0x43415053
13,836,231 >>> mbox cmd response data (24 bytes)
13,836,708 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,837,651 UART: [fwproc] Recv command 0x4d454153
13,846,139 >>> mbox cmd response data (12 bytes)
13,846,549 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,847,896 UART: [fwproc] Recv command 0x46505344
13,850,444 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,995 writing to cptra_bootfsm_go
3,780,411 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,411,192 >>> mbox cmd response data (36 bytes)
10,412,181 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,477,238 >>> mbox cmd response data (8 bytes)
13,477,745 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,479,498 >>> mbox cmd response data (8 bytes)
13,479,908 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,481,236 >>> mbox cmd response data (24 bytes)
13,481,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,489,305 >>> mbox cmd response data (12 bytes)
13,489,736 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,491,472 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,597 writing to cptra_bootfsm_go
3,524,151 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,246,497 >>> mbox cmd response data (36 bytes)
10,247,765 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,406,809 >>> mbox cmd response data (8 bytes)
13,407,330 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,409,029 >>> mbox cmd response data (8 bytes)
13,409,382 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,411,172 >>> mbox cmd response data (24 bytes)
13,411,736 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,419,875 >>> mbox cmd response data (12 bytes)
13,420,286 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,421,582 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
3,841,333 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,470,491 >>> mbox cmd response data (36 bytes)
10,471,717 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,594,113 >>> mbox cmd response data (8 bytes)
13,594,638 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,595,736 >>> mbox cmd response data (8 bytes)
13,596,148 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,597,284 >>> mbox cmd response data (24 bytes)
13,597,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,606,119 >>> mbox cmd response data (12 bytes)
13,606,532 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,608,584 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,661 UART: [kat] SHA2-256
881,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,707 UART: [kat] ++
885,859 UART: [kat] sha1
890,281 UART: [kat] SHA2-256
892,219 UART: [kat] SHA2-384
894,920 UART: [kat] SHA2-512-ACC
896,821 UART: [kat] ECC-384
902,648 UART: [kat] HMAC-384Kdf
907,188 UART: [kat] LMS
1,475,384 UART: [kat] --
1,476,273 UART: [cold-reset] ++
1,476,759 UART: [fht] Storing FHT @ 0x50003400
1,479,476 UART: [idev] ++
1,479,644 UART: [idev] CDI.KEYID = 6
1,480,004 UART: [idev] SUBJECT.KEYID = 7
1,480,428 UART: [idev] UDS.KEYID = 0
1,480,773 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,390 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,154 UART: [idev] --
1,515,159 UART: [ldev] ++
1,515,327 UART: [ldev] CDI.KEYID = 6
1,515,690 UART: [ldev] SUBJECT.KEYID = 5
1,516,116 UART: [ldev] AUTHORITY.KEYID = 7
1,516,579 UART: [ldev] FE.KEYID = 1
1,521,619 UART: [ldev] Erasing FE.KEYID = 1
1,546,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,562 UART: [ldev] --
1,585,855 UART: [fwproc] Waiting for Commands...
1,586,650 UART: [fwproc] Received command 0x46505652
1,587,532 UART: [rt] FIPS Version
1,588,085 >>> mbox cmd response data (36 bytes)
1,588,086 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,588,248 UART: [fwproc] Received command 0x46504c54
1,589,155 UART: [kat] SHA2-256
2,383,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,201 UART: [kat] ++
2,387,353 UART: [kat] sha1
2,391,567 UART: [kat] SHA2-256
2,393,505 UART: [kat] SHA2-384
2,396,180 UART: [kat] SHA2-512-ACC
2,398,080 UART: [kat] ECC-384
2,403,603 UART: [kat] HMAC-384Kdf
2,408,151 UART: [kat] LMS
2,976,347 UART: [kat] --
2,976,585 >>> mbox cmd response data (8 bytes)
2,976,586 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,784 UART: [fwproc] Received command 0x46504c67
2,977,738 >>> mbox cmd response data (8 bytes)
2,977,739 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,977,893 UART: [fwproc] Received command 0x43415053
2,978,941 >>> mbox cmd response data (24 bytes)
2,978,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,979,184 UART: [fwproc] Received command 0x4d454153
2,983,248 >>> mbox cmd response data (12 bytes)
2,983,249 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,983,421 UART: [fwproc] Received command 0x46505344
2,984,369 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,657 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,298 >>> mbox cmd response data (36 bytes)
1,441,299 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,392 >>> mbox cmd response data (8 bytes)
2,716,393 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,751 >>> mbox cmd response data (8 bytes)
2,716,752 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,717,184 >>> mbox cmd response data (24 bytes)
2,717,185 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,720,643 >>> mbox cmd response data (12 bytes)
2,720,644 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,721,117 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,198 UART: [kat] SHA2-256
882,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,244 UART: [kat] ++
886,396 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
902,789 UART: [kat] HMAC-384Kdf
907,405 UART: [kat] LMS
1,475,601 UART: [kat] --
1,476,672 UART: [cold-reset] ++
1,477,020 UART: [fht] Storing FHT @ 0x50003400
1,479,893 UART: [idev] ++
1,480,061 UART: [idev] CDI.KEYID = 6
1,480,421 UART: [idev] SUBJECT.KEYID = 7
1,480,845 UART: [idev] UDS.KEYID = 0
1,481,190 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,457 UART: [idev] Erasing UDS.KEYID = 0
1,505,475 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,235 UART: [idev] --
1,515,334 UART: [ldev] ++
1,515,502 UART: [ldev] CDI.KEYID = 6
1,515,865 UART: [ldev] SUBJECT.KEYID = 5
1,516,291 UART: [ldev] AUTHORITY.KEYID = 7
1,516,754 UART: [ldev] FE.KEYID = 1
1,522,294 UART: [ldev] Erasing FE.KEYID = 1
1,548,641 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,517 UART: [ldev] --
1,587,818 UART: [fwproc] Waiting for Commands...
1,588,455 UART: [fwproc] Received command 0x46505652
1,589,337 UART: [rt] FIPS Version
1,589,890 >>> mbox cmd response data (36 bytes)
1,589,891 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,590,137 UART: [fwproc] Received command 0x46504c54
1,591,044 UART: [kat] SHA2-256
2,384,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,389,090 UART: [kat] ++
2,389,242 UART: [kat] sha1
2,393,496 UART: [kat] SHA2-256
2,395,434 UART: [kat] SHA2-384
2,398,265 UART: [kat] SHA2-512-ACC
2,400,165 UART: [kat] ECC-384
2,406,306 UART: [kat] HMAC-384Kdf
2,410,920 UART: [kat] LMS
2,979,116 UART: [kat] --
2,979,354 >>> mbox cmd response data (8 bytes)
2,979,355 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,979,549 UART: [fwproc] Received command 0x46504c67
2,980,503 >>> mbox cmd response data (8 bytes)
2,980,504 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,980,722 UART: [fwproc] Received command 0x43415053
2,981,770 >>> mbox cmd response data (24 bytes)
2,981,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,981,991 UART: [fwproc] Received command 0x4d454153
2,986,055 >>> mbox cmd response data (12 bytes)
2,986,056 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,986,302 UART: [fwproc] Received command 0x46505344
2,987,250 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,450 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,663 >>> mbox cmd response data (36 bytes)
1,441,664 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,873 >>> mbox cmd response data (8 bytes)
2,716,874 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,316 >>> mbox cmd response data (8 bytes)
2,717,317 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,717,795 >>> mbox cmd response data (24 bytes)
2,717,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,721,266 >>> mbox cmd response data (12 bytes)
2,721,267 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,721,568 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,773 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
893,668 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,793 UART: [kat] ++
897,945 UART: [kat] sha1
902,207 UART: [kat] SHA2-256
904,147 UART: [kat] SHA2-384
906,882 UART: [kat] SHA2-512-ACC
908,783 UART: [kat] ECC-384
918,666 UART: [kat] HMAC-384Kdf
923,256 UART: [kat] LMS
1,171,584 UART: [kat] --
1,172,487 UART: [cold-reset] ++
1,172,999 UART: [fht] FHT @ 0x50003400
1,175,670 UART: [idev] ++
1,175,838 UART: [idev] CDI.KEYID = 6
1,176,198 UART: [idev] SUBJECT.KEYID = 7
1,176,622 UART: [idev] UDS.KEYID = 0
1,176,967 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,544 UART: [idev] Erasing UDS.KEYID = 0
1,200,749 UART: [idev] Sha1 KeyId Algorithm
1,209,205 UART: [idev] --
1,210,177 UART: [ldev] ++
1,210,345 UART: [ldev] CDI.KEYID = 6
1,210,708 UART: [ldev] SUBJECT.KEYID = 5
1,211,134 UART: [ldev] AUTHORITY.KEYID = 7
1,211,597 UART: [ldev] FE.KEYID = 1
1,216,825 UART: [ldev] Erasing FE.KEYID = 1
1,243,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,433 UART: [ldev] --
1,282,836 UART: [fwproc] Wait for Commands...
1,283,632 UART: [fwproc] Recv command 0x46505652
1,284,453 UART: [rt] FIPS Version
1,285,007 >>> mbox cmd response data (36 bytes)
1,285,008 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,285,276 UART: [fwproc] Recv command 0x46504c54
1,286,122 UART: [kat] SHA2-256
2,091,772 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,095,897 UART: [kat] ++
2,096,049 UART: [kat] sha1
2,100,389 UART: [kat] SHA2-256
2,102,329 UART: [kat] SHA2-384
2,105,046 UART: [kat] SHA2-512-ACC
2,106,946 UART: [kat] ECC-384
2,116,705 UART: [kat] HMAC-384Kdf
2,121,413 UART: [kat] LMS
2,369,741 UART: [kat] --
2,369,979 >>> mbox cmd response data (8 bytes)
2,369,980 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,370,277 UART: [fwproc] Recv command 0x46504c67
2,371,170 >>> mbox cmd response data (8 bytes)
2,371,171 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,371,422 UART: [fwproc] Recv command 0x43415053
2,372,405 >>> mbox cmd response data (24 bytes)
2,372,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,372,665 UART: [fwproc] Recv command 0x4d454153
2,376,674 >>> mbox cmd response data (12 bytes)
2,376,675 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,376,918 UART: [fwproc] Recv command 0x46505344
2,377,805 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,163 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,055 >>> mbox cmd response data (36 bytes)
1,139,056 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,718 >>> mbox cmd response data (8 bytes)
2,111,719 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,213 >>> mbox cmd response data (8 bytes)
2,112,214 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,112,564 >>> mbox cmd response data (24 bytes)
2,112,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,116,059 >>> mbox cmd response data (12 bytes)
2,116,060 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,116,408 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,897 UART: [state] LifecycleState = Unprovisioned
85,552 UART: [state] DebugLocked = No
86,106 UART: [state] WD Timer not started. Device not locked for debugging
87,305 UART: [kat] SHA2-256
892,955 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,080 UART: [kat] ++
897,232 UART: [kat] sha1
901,476 UART: [kat] SHA2-256
903,416 UART: [kat] SHA2-384
906,255 UART: [kat] SHA2-512-ACC
908,156 UART: [kat] ECC-384
917,843 UART: [kat] HMAC-384Kdf
922,529 UART: [kat] LMS
1,170,857 UART: [kat] --
1,171,488 UART: [cold-reset] ++
1,171,840 UART: [fht] FHT @ 0x50003400
1,174,631 UART: [idev] ++
1,174,799 UART: [idev] CDI.KEYID = 6
1,175,159 UART: [idev] SUBJECT.KEYID = 7
1,175,583 UART: [idev] UDS.KEYID = 0
1,175,928 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,727 UART: [idev] Erasing UDS.KEYID = 0
1,200,882 UART: [idev] Sha1 KeyId Algorithm
1,209,392 UART: [idev] --
1,210,544 UART: [ldev] ++
1,210,712 UART: [ldev] CDI.KEYID = 6
1,211,075 UART: [ldev] SUBJECT.KEYID = 5
1,211,501 UART: [ldev] AUTHORITY.KEYID = 7
1,211,964 UART: [ldev] FE.KEYID = 1
1,217,194 UART: [ldev] Erasing FE.KEYID = 1
1,244,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,322 UART: [ldev] --
1,283,829 UART: [fwproc] Wait for Commands...
1,284,433 UART: [fwproc] Recv command 0x46505652
1,285,254 UART: [rt] FIPS Version
1,285,808 >>> mbox cmd response data (36 bytes)
1,285,809 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,285,919 UART: [fwproc] Recv command 0x46504c54
1,286,765 UART: [kat] SHA2-256
2,092,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,096,540 UART: [kat] ++
2,096,692 UART: [kat] sha1
2,100,960 UART: [kat] SHA2-256
2,102,900 UART: [kat] SHA2-384
2,105,531 UART: [kat] SHA2-512-ACC
2,107,431 UART: [kat] ECC-384
2,117,112 UART: [kat] HMAC-384Kdf
2,121,772 UART: [kat] LMS
2,370,100 UART: [kat] --
2,370,338 >>> mbox cmd response data (8 bytes)
2,370,339 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,370,614 UART: [fwproc] Recv command 0x46504c67
2,371,507 >>> mbox cmd response data (8 bytes)
2,371,508 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,371,705 UART: [fwproc] Recv command 0x43415053
2,372,688 >>> mbox cmd response data (24 bytes)
2,372,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,372,862 UART: [fwproc] Recv command 0x4d454153
2,376,871 >>> mbox cmd response data (12 bytes)
2,376,872 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,376,971 UART: [fwproc] Recv command 0x46505344
2,377,858 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,386 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,788 >>> mbox cmd response data (36 bytes)
1,139,789 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,603 >>> mbox cmd response data (8 bytes)
2,112,604 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,012 >>> mbox cmd response data (8 bytes)
2,113,013 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,113,389 >>> mbox cmd response data (24 bytes)
2,113,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,116,956 >>> mbox cmd response data (12 bytes)
2,116,957 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,117,425 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,883 UART: [kat] SHA2-256
901,823 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
915,988 UART: [kat] HMAC-384Kdf
920,502 UART: [kat] LMS
1,168,814 UART: [kat] --
1,169,561 UART: [cold-reset] ++
1,170,055 UART: [fht] FHT @ 0x50003400
1,172,573 UART: [idev] ++
1,172,741 UART: [idev] CDI.KEYID = 6
1,173,102 UART: [idev] SUBJECT.KEYID = 7
1,173,527 UART: [idev] UDS.KEYID = 0
1,173,873 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,199,099 UART: [idev] Sha1 KeyId Algorithm
1,208,001 UART: [idev] --
1,208,920 UART: [ldev] ++
1,209,088 UART: [ldev] CDI.KEYID = 6
1,209,452 UART: [ldev] SUBJECT.KEYID = 5
1,209,879 UART: [ldev] AUTHORITY.KEYID = 7
1,210,342 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,241,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,980 UART: [ldev] --
1,281,470 UART: [fwproc] Wait for Commands...
1,282,075 UART: [fwproc] Recv command 0x46505652
1,282,902 UART: [rt] FIPS Version
1,283,463 >>> mbox cmd response data (36 bytes)
1,283,464 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,651 UART: [fwproc] Recv command 0x46504c54
1,284,505 UART: [kat] SHA2-256
2,088,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,092,184 UART: [kat] ++
2,092,336 UART: [kat] sha1
2,096,450 UART: [kat] SHA2-256
2,098,390 UART: [kat] SHA2-384
2,101,057 UART: [kat] SHA2-512-ACC
2,102,957 UART: [kat] ECC-384
2,112,752 UART: [kat] HMAC-384Kdf
2,117,316 UART: [kat] LMS
2,365,628 UART: [kat] --
2,365,869 >>> mbox cmd response data (8 bytes)
2,365,870 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,162 UART: [fwproc] Recv command 0x46504c67
2,367,066 >>> mbox cmd response data (8 bytes)
2,367,067 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,367,261 UART: [fwproc] Recv command 0x43415053
2,368,256 >>> mbox cmd response data (24 bytes)
2,368,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,368,422 UART: [fwproc] Recv command 0x4d454153
2,372,449 >>> mbox cmd response data (12 bytes)
2,372,450 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,372,659 UART: [fwproc] Recv command 0x46505344
2,373,562 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,330 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,132 >>> mbox cmd response data (36 bytes)
1,136,133 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,104,993 >>> mbox cmd response data (8 bytes)
2,104,994 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,105,394 >>> mbox cmd response data (8 bytes)
2,105,395 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,105,912 >>> mbox cmd response data (24 bytes)
2,105,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,109,291 >>> mbox cmd response data (12 bytes)
2,109,292 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,109,690 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,672 UART: [state] DebugLocked = No
86,254 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
891,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,722 UART: [kat] SHA2-256
901,662 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,551 UART: [kat] HMAC-384Kdf
921,139 UART: [kat] LMS
1,169,451 UART: [kat] --
1,169,968 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,242 UART: [idev] ++
1,173,410 UART: [idev] CDI.KEYID = 6
1,173,771 UART: [idev] SUBJECT.KEYID = 7
1,174,196 UART: [idev] UDS.KEYID = 0
1,174,542 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,926 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,209,843 UART: [ldev] ++
1,210,011 UART: [ldev] CDI.KEYID = 6
1,210,375 UART: [ldev] SUBJECT.KEYID = 5
1,210,802 UART: [ldev] AUTHORITY.KEYID = 7
1,211,265 UART: [ldev] FE.KEYID = 1
1,216,759 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,851 UART: [ldev] --
1,282,357 UART: [fwproc] Wait for Commands...
1,282,960 UART: [fwproc] Recv command 0x46505652
1,283,787 UART: [rt] FIPS Version
1,284,348 >>> mbox cmd response data (36 bytes)
1,284,349 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,284,466 UART: [fwproc] Recv command 0x46504c54
1,285,320 UART: [kat] SHA2-256
2,088,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,092,999 UART: [kat] ++
2,093,151 UART: [kat] sha1
2,097,265 UART: [kat] SHA2-256
2,099,205 UART: [kat] SHA2-384
2,102,058 UART: [kat] SHA2-512-ACC
2,103,958 UART: [kat] ECC-384
2,113,843 UART: [kat] HMAC-384Kdf
2,118,345 UART: [kat] LMS
2,366,657 UART: [kat] --
2,366,898 >>> mbox cmd response data (8 bytes)
2,366,899 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,201 UART: [fwproc] Recv command 0x46504c67
2,368,105 >>> mbox cmd response data (8 bytes)
2,368,106 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,368,292 UART: [fwproc] Recv command 0x43415053
2,369,287 >>> mbox cmd response data (24 bytes)
2,369,288 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,369,351 UART: [fwproc] Recv command 0x4d454153
2,373,378 >>> mbox cmd response data (12 bytes)
2,373,379 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,373,448 UART: [fwproc] Recv command 0x46505344
2,374,351 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,671 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,399 >>> mbox cmd response data (36 bytes)
1,136,400 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,182 >>> mbox cmd response data (8 bytes)
2,105,183 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,105,559 >>> mbox cmd response data (8 bytes)
2,105,560 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,105,965 >>> mbox cmd response data (24 bytes)
2,105,966 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,109,554 >>> mbox cmd response data (12 bytes)
2,109,555 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,110,033 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,218 UART:
192,630 UART: Running Caliptra ROM ...
193,762 UART:
193,918 UART: [state] CFI Enabled
260,218 UART: [state] LifecycleState = Unprovisioned
262,156 UART: [state] DebugLocked = No
264,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,186 UART: [kat] SHA2-256
438,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,425 UART: [kat] ++
449,901 UART: [kat] sha1
460,495 UART: [kat] SHA2-256
463,148 UART: [kat] SHA2-384
468,714 UART: [kat] SHA2-512-ACC
471,071 UART: [kat] ECC-384
2,766,097 UART: [kat] HMAC-384Kdf
2,798,052 UART: [kat] LMS
3,988,349 UART: [kat] --
3,993,579 UART: [cold-reset] ++
3,995,695 UART: [fht] Storing FHT @ 0x50003400
4,007,262 UART: [idev] ++
4,007,837 UART: [idev] CDI.KEYID = 6
4,008,754 UART: [idev] SUBJECT.KEYID = 7
4,010,010 UART: [idev] UDS.KEYID = 0
4,011,027 ready_for_fw is high
4,011,261 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,154,920 UART: [idev] Erasing UDS.KEYID = 0
7,348,664 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,059 UART: [idev] --
7,373,172 UART: [ldev] ++
7,373,743 UART: [ldev] CDI.KEYID = 6
7,374,739 UART: [ldev] SUBJECT.KEYID = 5
7,375,905 UART: [ldev] AUTHORITY.KEYID = 7
7,377,197 UART: [ldev] FE.KEYID = 1
7,419,873 UART: [ldev] Erasing FE.KEYID = 1
10,751,389 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,389 UART: [ldev] --
13,114,992 UART: [fwproc] Waiting for Commands...
13,118,242 UART: [fwproc] Received command 0x46574c44
13,120,433 UART: [fwproc] Received Image of size 114124 bytes
17,168,891 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,240,655 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,569 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,626,225 >>> mbox cmd response: success
17,629,260 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,630,251 UART: [afmc] ++
17,630,841 UART: [afmc] CDI.KEYID = 6
17,631,869 UART: [afmc] SUBJECT.KEYID = 7
17,632,953 UART: [afmc] AUTHORITY.KEYID = 5
21,005,703 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,567 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,833 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,251 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,334,070 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,496 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,448 UART: [afmc] --
23,374,871 UART: [cold-reset] --
23,379,220 UART: [state] Locking Datavault
23,383,978 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,754 UART: [state] Locking ICCM
23,387,851 UART: [exit] Launching FMC @ 0x40000130
23,396,252 UART:
23,396,497 UART: Running Caliptra FMC ...
23,397,600 UART:
23,397,758 UART: [state] CFI Enabled
23,464,225 UART: [fht] FMC Alias Private Key: 7
25,802,092 UART: [art] Extend RT PCRs Done
25,803,316 UART: [art] Lock RT PCRs Done
25,805,272 UART: [art] Populate DV Done
25,810,800 UART: [fht] FMC Alias Private Key: 7
25,812,393 UART: [art] Derive CDI
25,813,129 UART: [art] Store in in slot 0x4
25,873,165 UART: [art] Derive Key Pair
25,874,206 UART: [art] Store priv key in slot 0x5
29,166,980 UART: [art] Derive Key Pair - Done
29,180,205 UART: [art] Signing Cert with AUTHO
29,181,511 UART: RITY.KEYID = 7
31,469,442 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,954 UART: [art] PUB.X = A8D6D105AD4B21F66CEA8CC46723F3D7B43D473C2FD3AB5E27233DAA5E40A831C6EF5198E53ABD7F197B8B9EA5EECA3C
31,478,228 UART: [art] PUB.Y = AB04A550E97DBED9D4B56B5D7B2AA18912511E8445D278A3A216688038C4E7CC6A06CE4F9A5D49E47C459065404B1110
31,485,476 UART: [art] SIG.R = 3C8D5E8DD19CF54FD33FB1A22B1EEAC407366BB3B3500AB7BAFD8D612B844E5FED089304DA915311D416B5B2594416CD
31,492,887 UART: [art] SIG.S = F99695DBE6177B0F13A55456919E83619E930D01EA9BFE2C0A38F30E03918F138B2BBC23A9E4A3ACACA39AA333AF2174
32,798,127 UART: Caliptra RT
32,798,842 UART: [state] CFI Enabled
32,960,342 UART: [rt] RT listening for mailbox commands...
32,991,872 UART: [rt]cmd =0x46505652, len=4
32,993,174 UART: [rt] FIPS Version
32,994,331 >>> mbox cmd response data (36 bytes)
32,995,060 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,024,946 UART: [rt]cmd =0x46504c54, len=4
33,026,538 >>> mbox cmd response data (8 bytes)
33,026,903 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,057,105 UART: [rt]cmd =0x46504c67, len=4
33,058,438 >>> mbox cmd response: failed
33,059,237 UART: [rt] FIPS self test
33,060,082 UART: [kat] ++
33,060,529 UART: [kat] sha1
33,064,815 UART: [kat] SHA2-256
33,066,618 UART: [kat] SHA2-384
33,069,304 UART: [kat] SHA2-512-ACC
33,071,553 UART: [kat] ECC-384
36,339,418 UART: [kat] HMAC-384Kdf
36,347,339 UART: [kat] LMS
36,757,620 UART: [kat] --
36,909,745 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,742,474 UART: [rt] Verify complete
40,903,684 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,933,770 UART: [rt]cmd =0x46504c67, len=4
40,935,417 >>> mbox cmd response data (8 bytes)
40,935,773 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
40,965,374 UART: [rt]cmd =0x49444543, len=4
40,972,392 >>> mbox cmd response data (37 bytes)
40,972,980 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,002,470 UART: [rt]cmd =0x49444549, len=4
41,005,247 >>> mbox cmd response data (104 bytes)
41,006,135 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,036,052 UART: [rt]cmd =0x49444550, len=4
41,046,579 >>> mbox cmd response data (8 bytes)
41,046,991 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,076,753 UART: [rt]cmd =0x4c444556, len=4
41,087,947 >>> mbox cmd response data (687 bytes)
41,091,464 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,121,291 UART: [rt]cmd =0x43455246, len=4
41,134,158 >>> mbox cmd response data (920 bytes)
41,138,716 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,168,512 UART: [rt]cmd =0x43455252, len=4
41,179,918 >>> mbox cmd response data (783 bytes)
41,184,613 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,216,241 UART: [rt]cmd =0x53494756, len=196
42,508,258 >>> mbox cmd response data (8 bytes)
42,508,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,539,240 UART: [rt]cmd =0x4d454153, len=108
42,557,929 >>> mbox cmd response data (12 bytes)
42,558,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,588,263 UART: [rt]cmd =0x494e464f, len=4
42,592,113 >>> mbox cmd response data (264 bytes)
42,594,382 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,624,509 UART: [rt]cmd =0x54514754, len=24
42,627,165 >>> mbox cmd response data (8 bytes)
42,627,604 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,657,341 UART: [rt]cmd =0x47544744, len=8
42,660,414 >>> mbox cmd response data (104 bytes)
42,661,278 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,691,315 UART: [rt]cmd =0x50435252, len=8
42,693,378 >>> mbox cmd response data (8 bytes)
42,693,730 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,723,701 UART: [rt]cmd =0x50435251, len=36
43,895,127 >>> mbox cmd response data (1848 bytes)
43,904,034 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,934,149 UART: [rt]cmd =0x50435245, len=56
43,937,527 >>> mbox cmd response data (8 bytes)
43,937,992 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,968,160 UART: [rt]cmd =0x44504543, len=20
43,988,570 >>> mbox cmd response data (44 bytes)
43,989,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,019,267 UART: [rt]cmd =0x44504543, len=24
44,063,262 >>> mbox cmd response data (40 bytes)
44,063,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,094,380 UART: [rt]cmd =0x44504543, len=96
44,133,299 >>> mbox cmd response data (56 bytes)
44,134,050 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,164,385 UART: [rt]cmd =0x44504543, len=92
52,204,449 >>> mbox cmd response data (6284 bytes)
52,233,801 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,264,973 UART: [rt]cmd =0x44504543, len=136
57,902,205 >>> mbox cmd response data (136 bytes)
57,903,444 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,933,563 UART: [rt]cmd =0x44504543, len=40
57,972,861 >>> mbox cmd response data (40 bytes)
57,973,549 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,003,412 UART: [rt]cmd =0x44504543, len=28
58,046,251 >>> mbox cmd response data (2076 bytes)
58,056,174 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,086,366 UART: [rt]cmd =0x44504543, len=36
58,115,775 >>> mbox cmd response data (24 bytes)
58,116,349 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,146,224 UART: [rt]cmd =0x4453424c, len=4
61,445,226 >>> mbox cmd response data (8 bytes)
61,445,725 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,475,600 UART: [rt]cmd =0x46505344, len=4
61,585,682 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,802,114 ready_for_fw is high
3,802,527 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,871,735 >>> mbox cmd response: success
17,874,805 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,569,722 UART:
23,570,119 UART: Running Caliptra FMC ...
23,571,285 UART:
23,571,453 UART: [state] CFI Enabled
23,638,588 UART: [fht] FMC Alias Private Key: 7
25,975,926 UART: [art] Extend RT PCRs Done
25,977,156 UART: [art] Lock RT PCRs Done
25,978,868 UART: [art] Populate DV Done
25,984,131 UART: [fht] FMC Alias Private Key: 7
25,985,781 UART: [art] Derive CDI
25,986,524 UART: [art] Store in in slot 0x4
26,047,924 UART: [art] Derive Key Pair
26,048,976 UART: [art] Store priv key in slot 0x5
29,341,399 UART: [art] Derive Key Pair - Done
29,354,565 UART: [art] Signing Cert with AUTHO
29,355,918 UART: RITY.KEYID = 7
31,643,924 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,428 UART: [art] PUB.X = 22E45A530102B5DE388AA4D2C56F4BC591E084EEA66A45E7DC1149709A7646CF3F4B36FB3A444889470B59D6180F76F9
31,652,726 UART: [art] PUB.Y = B6A6BB96E9F534AFA5FCCF60393BF52B465BDFA4BFCAAEE03A122519E85EAB573B93855975CEB73D8A884F430AB34063
31,659,934 UART: [art] SIG.R = AC891E5CD2A13843DFC9FB97C735A56CDB433075412151F4FFE146BC70E3ABDE771BB94CEB02A05020886EA0F8757C2B
31,667,350 UART: [art] SIG.S = 07B838E8BBA236767E9C926B2FFEB22B1A11287C8723C64F31712F1FC13AE2248F016B9911912465483FC5F5B006F11F
32,972,740 UART: Caliptra RT
32,973,446 UART: [state] CFI Enabled
33,133,208 UART: [rt] RT listening for mailbox commands...
33,164,355 UART: [rt]cmd =0x46505652, len=4
33,165,602 UART: [rt] FIPS Version
33,166,657 >>> mbox cmd response data (36 bytes)
33,167,330 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,197,224 UART: [rt]cmd =0x46504c54, len=4
33,198,845 >>> mbox cmd response data (8 bytes)
33,199,189 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,229,556 UART: [rt]cmd =0x46504c67, len=4
33,230,851 >>> mbox cmd response: failed
33,231,813 UART: [rt] FIPS self test
33,232,798 UART: [kat] ++
33,233,249 UART: [kat] sha1
33,237,674 UART: [kat] SHA2-256
33,239,502 UART: [kat] SHA2-384
33,242,320 UART: [kat] SHA2-512-ACC
33,244,533 UART: [kat] ECC-384
36,512,022 UART: [kat] HMAC-384Kdf
36,519,055 UART: [kat] LMS
36,929,306 UART: [kat] --
37,061,172 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,893,502 UART: [rt] Verify complete
41,075,687 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,105,587 UART: [rt]cmd =0x46504c67, len=4
41,107,140 >>> mbox cmd response data (8 bytes)
41,107,493 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,137,208 UART: [rt]cmd =0x49444543, len=4
41,144,230 >>> mbox cmd response data (37 bytes)
41,144,821 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,174,800 UART: [rt]cmd =0x49444549, len=4
41,177,460 >>> mbox cmd response data (104 bytes)
41,178,346 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,208,360 UART: [rt]cmd =0x49444550, len=4
41,218,938 >>> mbox cmd response data (8 bytes)
41,219,354 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,249,221 UART: [rt]cmd =0x4c444556, len=4
41,260,403 >>> mbox cmd response data (687 bytes)
41,263,915 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,293,838 UART: [rt]cmd =0x43455246, len=4
41,306,847 >>> mbox cmd response data (920 bytes)
41,311,422 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,341,224 UART: [rt]cmd =0x43455252, len=4
41,352,577 >>> mbox cmd response data (783 bytes)
41,357,468 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,388,837 UART: [rt]cmd =0x53494756, len=196
42,680,572 >>> mbox cmd response data (8 bytes)
42,681,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,711,612 UART: [rt]cmd =0x4d454153, len=108
42,729,752 >>> mbox cmd response data (12 bytes)
42,730,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,759,988 UART: [rt]cmd =0x494e464f, len=4
42,763,942 >>> mbox cmd response data (264 bytes)
42,766,114 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,796,050 UART: [rt]cmd =0x54514754, len=24
42,798,727 >>> mbox cmd response data (8 bytes)
42,799,067 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,829,005 UART: [rt]cmd =0x47544744, len=8
42,831,888 >>> mbox cmd response data (104 bytes)
42,832,656 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,862,335 UART: [rt]cmd =0x50435252, len=8
42,864,240 >>> mbox cmd response data (8 bytes)
42,864,575 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,894,497 UART: [rt]cmd =0x50435251, len=36
44,064,064 >>> mbox cmd response data (1848 bytes)
44,073,005 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,103,093 UART: [rt]cmd =0x50435245, len=56
44,106,265 >>> mbox cmd response data (8 bytes)
44,106,729 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,136,675 UART: [rt]cmd =0x44504543, len=20
44,156,822 >>> mbox cmd response data (44 bytes)
44,157,589 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,187,381 UART: [rt]cmd =0x44504543, len=24
44,232,340 >>> mbox cmd response data (40 bytes)
44,233,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,263,559 UART: [rt]cmd =0x44504543, len=96
44,302,092 >>> mbox cmd response data (56 bytes)
44,302,842 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,333,223 UART: [rt]cmd =0x44504543, len=92
52,394,098 >>> mbox cmd response data (6284 bytes)
52,423,210 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,453,985 UART: [rt]cmd =0x44504543, len=136
58,088,009 >>> mbox cmd response data (136 bytes)
58,089,227 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,119,221 UART: [rt]cmd =0x44504543, len=40
58,157,977 >>> mbox cmd response data (40 bytes)
58,158,677 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,188,698 UART: [rt]cmd =0x44504543, len=28
58,231,321 >>> mbox cmd response data (2076 bytes)
58,241,403 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,271,822 UART: [rt]cmd =0x44504543, len=36
58,301,202 >>> mbox cmd response data (24 bytes)
58,301,772 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,331,660 UART: [rt]cmd =0x4453424c, len=4
61,629,991 >>> mbox cmd response data (8 bytes)
61,630,489 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,660,318 UART: [rt]cmd =0x46505344, len=4
61,769,882 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,620 UART:
192,993 UART: Running Caliptra ROM ...
194,208 UART:
603,885 UART: [state] CFI Enabled
615,196 UART: [state] LifecycleState = Unprovisioned
617,145 UART: [state] DebugLocked = No
618,972 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,067 UART: [kat] SHA2-256
792,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,333 UART: [kat] ++
803,815 UART: [kat] sha1
815,331 UART: [kat] SHA2-256
817,992 UART: [kat] SHA2-384
824,870 UART: [kat] SHA2-512-ACC
827,211 UART: [kat] ECC-384
3,110,921 UART: [kat] HMAC-384Kdf
3,123,376 UART: [kat] LMS
4,313,432 UART: [kat] --
4,319,180 UART: [cold-reset] ++
4,321,622 UART: [fht] Storing FHT @ 0x50003400
4,332,971 UART: [idev] ++
4,333,611 UART: [idev] CDI.KEYID = 6
4,334,674 UART: [idev] SUBJECT.KEYID = 7
4,335,778 UART: [idev] UDS.KEYID = 0
4,336,771 ready_for_fw is high
4,336,971 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,480,349 UART: [idev] Erasing UDS.KEYID = 0
7,621,339 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,576 UART: [idev] --
7,645,181 UART: [ldev] ++
7,645,754 UART: [ldev] CDI.KEYID = 6
7,646,771 UART: [ldev] SUBJECT.KEYID = 5
7,647,934 UART: [ldev] AUTHORITY.KEYID = 7
7,649,163 UART: [ldev] FE.KEYID = 1
7,660,889 UART: [ldev] Erasing FE.KEYID = 1
10,945,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,263 UART: [ldev] --
13,306,817 UART: [fwproc] Waiting for Commands...
13,309,628 UART: [fwproc] Received command 0x46574c44
13,311,817 UART: [fwproc] Received Image of size 114124 bytes
17,364,891 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,109 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,019 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,828,391 >>> mbox cmd response: success
17,831,402 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,832,707 UART: [afmc] ++
17,833,230 UART: [afmc] CDI.KEYID = 6
17,834,305 UART: [afmc] SUBJECT.KEYID = 7
17,835,438 UART: [afmc] AUTHORITY.KEYID = 5
21,151,695 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,188 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,588 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,401 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,861 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,077 UART: [afmc] --
23,519,262 UART: [cold-reset] --
23,525,175 UART: [state] Locking Datavault
23,531,123 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,880 UART: [state] Locking ICCM
23,535,058 UART: [exit] Launching FMC @ 0x40000130
23,543,404 UART:
23,543,699 UART: Running Caliptra FMC ...
23,544,732 UART:
23,544,880 UART: [state] CFI Enabled
23,552,932 UART: [fht] FMC Alias Private Key: 7
25,884,268 UART: [art] Extend RT PCRs Done
25,885,486 UART: [art] Lock RT PCRs Done
25,887,084 UART: [art] Populate DV Done
25,892,446 UART: [fht] FMC Alias Private Key: 7
25,894,095 UART: [art] Derive CDI
25,894,835 UART: [art] Store in in slot 0x4
25,937,429 UART: [art] Derive Key Pair
25,938,431 UART: [art] Store priv key in slot 0x5
29,180,737 UART: [art] Derive Key Pair - Done
29,194,119 UART: [art] Signing Cert with AUTHO
29,195,436 UART: RITY.KEYID = 7
31,474,662 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,191 UART: [art] PUB.X = 8296C99F85BD8094FE89F41990A8D3DF322346E71DFD6D9E50A26C4138161E2437CA8BC2D3BF64257DB38E226E90D7C7
31,483,404 UART: [art] PUB.Y = 0DEFF24A0BC458E32C2EFB3F8A7106974055D4323075D0953FC9A5690A4D481B5D47C9130CF3C47DEB87EF4B81A4F20D
31,490,659 UART: [art] SIG.R = 28C21DD1F18EF5251F903BE80F66BD50C14D04493165F45DC061173F8A7213D3571DEF46FF78A8F5EC1407CBF63F5FDA
31,498,067 UART: [art] SIG.S = 5920DCEF23BC0AF1FEF7A01D9D3995524EB445F09CA536C3B8EDD41C7A1F1BB7CFA7A37EB0F82881849842473CCC8425
32,803,412 UART: Caliptra RT
32,804,122 UART: [state] CFI Enabled
32,921,804 UART: [rt] RT listening for mailbox commands...
32,953,111 UART: [rt]cmd =0x46505652, len=4
32,954,354 UART: [rt] FIPS Version
32,955,612 >>> mbox cmd response data (36 bytes)
32,956,329 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,986,222 UART: [rt]cmd =0x46504c54, len=4
32,987,835 >>> mbox cmd response data (8 bytes)
32,988,179 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,018,522 UART: [rt]cmd =0x46504c67, len=4
33,019,873 >>> mbox cmd response: failed
33,021,369 UART: [rt] FIPS self test
33,022,305 UART: [kat] ++
33,022,753 UART: [kat] sha1
33,027,111 UART: [kat] SHA2-256
33,028,904 UART: [kat] SHA2-384
33,031,657 UART: [kat] SHA2-512-ACC
33,033,871 UART: [kat] ECC-384
36,275,990 UART: [kat] HMAC-384Kdf
36,281,768 UART: [kat] LMS
36,692,031 UART: [kat] --
36,844,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,676,738 UART: [rt] Verify complete
40,868,150 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,897,840 UART: [rt]cmd =0x46504c67, len=4
40,899,428 >>> mbox cmd response data (8 bytes)
40,899,863 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
40,929,715 UART: [rt]cmd =0x49444543, len=4
40,936,684 >>> mbox cmd response data (37 bytes)
40,937,301 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
40,966,959 UART: [rt]cmd =0x49444549, len=4
40,969,723 >>> mbox cmd response data (104 bytes)
40,970,616 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,000,414 UART: [rt]cmd =0x49444550, len=4
41,011,075 >>> mbox cmd response data (8 bytes)
41,011,500 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,041,372 UART: [rt]cmd =0x4c444556, len=4
41,052,402 >>> mbox cmd response data (687 bytes)
41,055,922 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,085,856 UART: [rt]cmd =0x43455246, len=4
41,098,770 >>> mbox cmd response data (920 bytes)
41,103,329 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,133,234 UART: [rt]cmd =0x43455252, len=4
41,144,568 >>> mbox cmd response data (782 bytes)
41,149,337 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,180,799 UART: [rt]cmd =0x53494756, len=196
42,472,901 >>> mbox cmd response data (8 bytes)
42,473,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,504,098 UART: [rt]cmd =0x4d454153, len=108
42,522,643 >>> mbox cmd response data (12 bytes)
42,523,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,552,957 UART: [rt]cmd =0x494e464f, len=4
42,556,961 >>> mbox cmd response data (264 bytes)
42,559,311 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,589,400 UART: [rt]cmd =0x54514754, len=24
42,592,029 >>> mbox cmd response data (8 bytes)
42,592,451 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,622,271 UART: [rt]cmd =0x47544744, len=8
42,625,295 >>> mbox cmd response data (104 bytes)
42,626,168 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,655,931 UART: [rt]cmd =0x50435252, len=8
42,657,994 >>> mbox cmd response data (8 bytes)
42,658,406 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,688,216 UART: [rt]cmd =0x50435251, len=36
43,843,582 >>> mbox cmd response data (1848 bytes)
43,852,491 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,882,711 UART: [rt]cmd =0x50435245, len=56
43,885,985 >>> mbox cmd response data (8 bytes)
43,886,441 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,916,169 UART: [rt]cmd =0x44504543, len=20
43,936,413 >>> mbox cmd response data (44 bytes)
43,937,111 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
43,966,863 UART: [rt]cmd =0x44504543, len=24
43,992,603 >>> mbox cmd response data (40 bytes)
43,993,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,023,839 UART: [rt]cmd =0x44504543, len=96
44,060,978 >>> mbox cmd response data (56 bytes)
44,061,724 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,092,410 UART: [rt]cmd =0x44504543, len=92
52,074,944 >>> mbox cmd response data (6284 bytes)
52,104,204 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,135,153 UART: [rt]cmd =0x44504543, len=136
57,696,386 >>> mbox cmd response data (136 bytes)
57,697,595 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,727,683 UART: [rt]cmd =0x44504543, len=40
57,753,928 >>> mbox cmd response data (40 bytes)
57,754,613 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,784,268 UART: [rt]cmd =0x44504543, len=28
57,826,750 >>> mbox cmd response data (2076 bytes)
57,836,654 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
57,866,836 UART: [rt]cmd =0x44504543, len=36
57,896,102 >>> mbox cmd response data (24 bytes)
57,896,679 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
57,926,171 UART: [rt]cmd =0x4453424c, len=4
61,169,369 >>> mbox cmd response data (8 bytes)
61,169,866 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,199,749 UART: [rt]cmd =0x46505344, len=4
61,309,485 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
4,127,476 ready_for_fw is high
4,128,145 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,071,853 >>> mbox cmd response: success
18,074,981 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,710,329 UART:
23,710,746 UART: Running Caliptra FMC ...
23,711,876 UART:
23,712,028 UART: [state] CFI Enabled
23,719,916 UART: [fht] FMC Alias Private Key: 7
26,051,375 UART: [art] Extend RT PCRs Done
26,052,757 UART: [art] Lock RT PCRs Done
26,054,481 UART: [art] Populate DV Done
26,060,196 UART: [fht] FMC Alias Private Key: 7
26,061,906 UART: [art] Derive CDI
26,062,646 UART: [art] Store in in slot 0x4
26,105,350 UART: [art] Derive Key Pair
26,106,350 UART: [art] Store priv key in slot 0x5
29,348,576 UART: [art] Derive Key Pair - Done
29,361,744 UART: [art] Signing Cert with AUTHO
29,363,080 UART: RITY.KEYID = 7
31,642,658 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,179 UART: [art] PUB.X = F46BC2987200FCF056F4AA0162A503F8068030ED25215AFDC655AE7317E529BBAD9516956FD53E0D64F17E174A821ABB
31,651,390 UART: [art] PUB.Y = 57CC9FBFC69762B81C07AFC36B68A1226B41A42F734B2B2C83069E7586AE00D92DF99C4156F3724975034CB08121264B
31,658,625 UART: [art] SIG.R = 231A89AF67C09976D03DC1E6216CAB8757BE464B69F63AE3FBCDE71C811B83131EA4A81C3BE587C8DEBD8F82365B19D2
31,666,057 UART: [art] SIG.S = 56B06C40EBD3DE37D166A830EB345AD81F9482891CEC9D915C355FEDA71E7A283BB260E514E1540D5EA271A5D2795ABA
32,971,531 UART: Caliptra RT
32,972,253 UART: [state] CFI Enabled
33,090,243 UART: [rt] RT listening for mailbox commands...
33,121,870 UART: [rt]cmd =0x46505652, len=4
33,123,150 UART: [rt] FIPS Version
33,124,370 >>> mbox cmd response data (36 bytes)
33,125,095 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,154,819 UART: [rt]cmd =0x46504c54, len=4
33,156,356 >>> mbox cmd response data (8 bytes)
33,156,682 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,186,793 UART: [rt]cmd =0x46504c67, len=4
33,188,231 >>> mbox cmd response: failed
33,189,367 UART: [rt] FIPS self test
33,190,350 UART: [kat] ++
33,190,803 UART: [kat] sha1
33,195,025 UART: [kat] SHA2-256
33,196,826 UART: [kat] SHA2-384
33,199,644 UART: [kat] SHA2-512-ACC
33,201,866 UART: [kat] ECC-384
36,444,134 UART: [kat] HMAC-384Kdf
36,449,916 UART: [kat] LMS
36,860,178 UART: [kat] --
36,991,501 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,824,171 UART: [rt] Verify complete
41,034,462 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,064,299 UART: [rt]cmd =0x46504c67, len=4
41,065,916 >>> mbox cmd response data (8 bytes)
41,066,290 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,096,013 UART: [rt]cmd =0x49444543, len=4
41,102,985 >>> mbox cmd response data (37 bytes)
41,103,580 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,133,451 UART: [rt]cmd =0x49444549, len=4
41,136,327 >>> mbox cmd response data (104 bytes)
41,137,203 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,166,855 UART: [rt]cmd =0x49444550, len=4
41,177,734 >>> mbox cmd response data (8 bytes)
41,178,177 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,207,722 UART: [rt]cmd =0x4c444556, len=4
41,218,858 >>> mbox cmd response data (687 bytes)
41,222,367 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,252,212 UART: [rt]cmd =0x43455246, len=4
41,265,426 >>> mbox cmd response data (920 bytes)
41,269,992 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,299,623 UART: [rt]cmd =0x43455252, len=4
41,310,975 >>> mbox cmd response data (782 bytes)
41,315,675 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,347,104 UART: [rt]cmd =0x53494756, len=196
42,638,665 >>> mbox cmd response data (8 bytes)
42,639,161 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,669,864 UART: [rt]cmd =0x4d454153, len=108
42,688,693 >>> mbox cmd response data (12 bytes)
42,689,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,718,629 UART: [rt]cmd =0x494e464f, len=4
42,722,459 >>> mbox cmd response data (264 bytes)
42,724,720 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,754,795 UART: [rt]cmd =0x54514754, len=24
42,757,555 >>> mbox cmd response data (8 bytes)
42,757,968 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,787,618 UART: [rt]cmd =0x47544744, len=8
42,790,746 >>> mbox cmd response data (104 bytes)
42,791,612 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,821,218 UART: [rt]cmd =0x50435252, len=8
42,823,124 >>> mbox cmd response data (8 bytes)
42,823,456 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,853,519 UART: [rt]cmd =0x50435251, len=36
44,009,101 >>> mbox cmd response data (1848 bytes)
44,017,996 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,048,147 UART: [rt]cmd =0x50435245, len=56
44,051,384 >>> mbox cmd response data (8 bytes)
44,051,833 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,081,644 UART: [rt]cmd =0x44504543, len=20
44,102,036 >>> mbox cmd response data (44 bytes)
44,102,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,132,430 UART: [rt]cmd =0x44504543, len=24
44,158,850 >>> mbox cmd response data (40 bytes)
44,159,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,190,166 UART: [rt]cmd =0x44504543, len=96
44,227,868 >>> mbox cmd response data (56 bytes)
44,228,643 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,259,387 UART: [rt]cmd =0x44504543, len=92
52,241,001 >>> mbox cmd response data (6284 bytes)
52,270,129 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,301,240 UART: [rt]cmd =0x44504543, len=136
57,861,901 >>> mbox cmd response data (136 bytes)
57,863,087 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,893,095 UART: [rt]cmd =0x44504543, len=40
57,919,219 >>> mbox cmd response data (40 bytes)
57,919,900 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,949,864 UART: [rt]cmd =0x44504543, len=28
57,992,284 >>> mbox cmd response data (2076 bytes)
58,002,230 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,032,526 UART: [rt]cmd =0x44504543, len=36
58,062,288 >>> mbox cmd response data (24 bytes)
58,062,887 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,092,879 UART: [rt]cmd =0x4453424c, len=4
61,336,642 >>> mbox cmd response data (8 bytes)
61,337,176 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,366,901 UART: [rt]cmd =0x46505344, len=4
61,476,615 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,094 UART:
192,468 UART: Running Caliptra ROM ...
193,580 UART:
193,726 UART: [state] CFI Enabled
262,636 UART: [state] LifecycleState = Unprovisioned
264,544 UART: [state] DebugLocked = No
266,157 UART: [state] WD Timer not started. Device not locked for debugging
269,050 UART: [kat] SHA2-256
448,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,773 UART: [kat] ++
460,309 UART: [kat] sha1
472,043 UART: [kat] SHA2-256
475,052 UART: [kat] SHA2-384
481,978 UART: [kat] SHA2-512-ACC
484,992 UART: [kat] ECC-384
2,945,996 UART: [kat] HMAC-384Kdf
2,972,666 UART: [kat] LMS
3,502,140 UART: [kat] --
3,505,858 UART: [cold-reset] ++
3,507,651 UART: [fht] FHT @ 0x50003400
3,517,996 UART: [idev] ++
3,518,568 UART: [idev] CDI.KEYID = 6
3,519,526 UART: [idev] SUBJECT.KEYID = 7
3,520,699 UART: [idev] UDS.KEYID = 0
3,521,604 ready_for_fw is high
3,521,813 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,666,240 UART: [idev] Erasing UDS.KEYID = 0
6,027,820 UART: [idev] Sha1 KeyId Algorithm
6,050,195 UART: [idev] --
6,054,840 UART: [ldev] ++
6,055,418 UART: [ldev] CDI.KEYID = 6
6,056,351 UART: [ldev] SUBJECT.KEYID = 5
6,057,521 UART: [ldev] AUTHORITY.KEYID = 7
6,058,755 UART: [ldev] FE.KEYID = 1
6,102,135 UART: [ldev] Erasing FE.KEYID = 1
8,607,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,375 UART: [ldev] --
10,417,098 UART: [fwproc] Wait for Commands...
10,418,668 UART: [fwproc] Recv command 0x46574c44
10,420,699 UART: [fwproc] Recv'd Img size: 114448 bytes
13,823,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,284,864 >>> mbox cmd response: success
14,287,896 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,289,441 UART: [afmc] ++
14,290,046 UART: [afmc] CDI.KEYID = 6
14,290,970 UART: [afmc] SUBJECT.KEYID = 7
14,292,132 UART: [afmc] AUTHORITY.KEYID = 5
16,832,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,558,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,560,249 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,576,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,592,065 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,607,903 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,863 UART: [afmc] --
18,633,080 UART: [cold-reset] --
18,635,324 UART: [state] Locking Datavault
18,638,956 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,675 UART: [state] Locking ICCM
18,641,910 UART: [exit] Launching FMC @ 0x40000130
18,650,308 UART:
18,650,542 UART: Running Caliptra FMC ...
18,651,643 UART:
18,651,804 UART: [state] CFI Enabled
18,716,786 UART: [fht] FMC Alias Private Key: 7
20,480,742 UART: [art] Extend RT PCRs Done
20,481,961 UART: [art] Lock RT PCRs Done
20,483,747 UART: [art] Populate DV Done
20,489,274 UART: [fht] FMC Alias Private Key: 7
20,490,917 UART: [art] Derive CDI
20,491,735 UART: [art] Store in in slot 0x4
20,548,865 UART: [art] Derive Key Pair
20,549,908 UART: [art] Store priv key in slot 0x5
23,013,098 UART: [art] Derive Key Pair - Done
23,026,072 UART: [art] Signing Cert with AUTHO
23,027,386 UART: RITY.KEYID = 7
24,740,131 UART: [art] Erasing AUTHORITY.KEYID = 7
24,741,640 UART: [art] PUB.X = DD8C9140EF5880F90246C8E20A0097FE0730833D0471F177C220967C900F24D76A50418AE87995D824FAE21877398F75
24,748,809 UART: [art] PUB.Y = 70DE6DA09DC51F574A53BEF34811A553A6400E23B8E6491E949329C0EF4FE6FCF68E4D0414D6687CEBC46176ACB50597
24,756,112 UART: [art] SIG.R = C057727E2A7148FBCC502605C0F7FF26001AD270080A73B4E0B8DF155B0F476942CA8D1567F58931B0B1919EB036A670
24,763,486 UART: [art] SIG.S = 9C787139DF6FDE873434CD6C8217A48B5097FBA6FF7A4390102DFB577C215312E53E5F824C0BC0E8C865CCFBA5BCBD95
25,742,315 UART: Caliptra RT
25,743,016 UART: [state] CFI Enabled
25,909,458 UART: [rt] RT listening for mailbox commands...
25,940,756 UART: [rt]cmd =0x46505652, len=4
25,942,030 UART: [rt] FIPS Version
25,943,198 >>> mbox cmd response data (36 bytes)
25,943,845 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,973,830 UART: [rt]cmd =0x46504c54, len=4
25,975,304 >>> mbox cmd response data (8 bytes)
25,975,663 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,005,472 UART: [rt]cmd =0x46504c67, len=4
26,006,768 >>> mbox cmd response: failed
26,008,043 UART: [rt] FIPS self test
26,008,978 UART: [kat] ++
26,009,431 UART: [kat] sha1
26,013,977 UART: [kat] SHA2-256
26,015,815 UART: [kat] SHA2-384
26,018,738 UART: [kat] SHA2-512-ACC
26,020,892 UART: [kat] ECC-384
28,458,647 UART: [kat] HMAC-384Kdf
28,485,187 UART: [kat] LMS
28,683,143 UART: [kat] --
28,836,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,019,540 UART: [rt] Verify complete
32,148,725 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,178,531 UART: [rt]cmd =0x46504c67, len=4
32,180,250 >>> mbox cmd response data (8 bytes)
32,180,583 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,210,445 UART: [rt]cmd =0x49444543, len=4
32,217,482 >>> mbox cmd response data (37 bytes)
32,218,063 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,247,877 UART: [rt]cmd =0x49444549, len=4
32,250,799 >>> mbox cmd response data (104 bytes)
32,251,680 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,281,449 UART: [rt]cmd =0x49444550, len=4
32,291,813 >>> mbox cmd response data (8 bytes)
32,292,226 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,321,979 UART: [rt]cmd =0x4c444556, len=4
32,332,893 >>> mbox cmd response data (687 bytes)
32,336,406 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,366,272 UART: [rt]cmd =0x43455246, len=4
32,378,754 >>> mbox cmd response data (887 bytes)
32,383,171 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,412,915 UART: [rt]cmd =0x43455252, len=4
32,424,171 >>> mbox cmd response data (784 bytes)
32,428,899 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,460,512 UART: [rt]cmd =0x53494756, len=196
33,425,953 >>> mbox cmd response data (8 bytes)
33,426,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,457,327 UART: [rt]cmd =0x4d454153, len=108
33,476,180 >>> mbox cmd response data (12 bytes)
33,476,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,506,557 UART: [rt]cmd =0x494e464f, len=4
33,510,343 >>> mbox cmd response data (264 bytes)
33,512,602 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,542,524 UART: [rt]cmd =0x54514754, len=24
33,545,105 >>> mbox cmd response data (8 bytes)
33,545,463 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,575,223 UART: [rt]cmd =0x47544744, len=8
33,578,203 >>> mbox cmd response data (104 bytes)
33,579,000 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,608,764 UART: [rt]cmd =0x50435252, len=8
33,610,770 >>> mbox cmd response data (8 bytes)
33,611,183 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,641,158 UART: [rt]cmd =0x50435251, len=36
34,567,440 >>> mbox cmd response data (1848 bytes)
34,576,323 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,606,599 UART: [rt]cmd =0x50435245, len=56
34,609,431 >>> mbox cmd response data (8 bytes)
34,609,879 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,639,391 UART: [rt]cmd =0x44504543, len=20
34,659,743 >>> mbox cmd response data (44 bytes)
34,660,514 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,690,384 UART: [rt]cmd =0x44504543, len=24
34,727,389 >>> mbox cmd response data (40 bytes)
34,728,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,758,460 UART: [rt]cmd =0x44504543, len=96
34,797,555 >>> mbox cmd response data (56 bytes)
34,798,314 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,828,594 UART: [rt]cmd =0x44504543, len=92
40,928,514 >>> mbox cmd response data (6284 bytes)
40,957,583 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,988,703 UART: [rt]cmd =0x44504543, len=136
45,217,329 >>> mbox cmd response data (136 bytes)
45,218,552 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,248,955 UART: [rt]cmd =0x44504543, len=40
45,285,535 >>> mbox cmd response data (40 bytes)
45,286,207 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,316,397 UART: [rt]cmd =0x44504543, len=28
45,359,065 >>> mbox cmd response data (2076 bytes)
45,368,969 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,399,160 UART: [rt]cmd =0x44504543, len=36
45,428,676 >>> mbox cmd response data (24 bytes)
45,429,251 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,458,925 UART: [rt]cmd =0x4453424c, len=4
47,928,195 >>> mbox cmd response data (8 bytes)
47,928,697 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,958,364 UART: [rt]cmd =0x46505344, len=4
48,068,167 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,380,073 ready_for_fw is high
3,380,719 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,060,110 >>> mbox cmd response: success
14,063,230 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,344,435 UART:
18,344,807 UART: Running Caliptra FMC ...
18,346,071 UART:
18,346,246 UART: [state] CFI Enabled
18,412,487 UART: [fht] FMC Alias Private Key: 7
20,176,547 UART: [art] Extend RT PCRs Done
20,177,773 UART: [art] Lock RT PCRs Done
20,179,209 UART: [art] Populate DV Done
20,184,458 UART: [fht] FMC Alias Private Key: 7
20,185,943 UART: [art] Derive CDI
20,186,680 UART: [art] Store in in slot 0x4
20,245,216 UART: [art] Derive Key Pair
20,246,259 UART: [art] Store priv key in slot 0x5
22,710,185 UART: [art] Derive Key Pair - Done
22,722,864 UART: [art] Signing Cert with AUTHO
22,724,179 UART: RITY.KEYID = 7
24,435,526 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,010 UART: [art] PUB.X = C6D925581861573DC76CDFB590D9FE18C448B9E444A50B267B8250AE1E8841B3C507C99ED97410306ED55AC0EDDA0621
24,444,293 UART: [art] PUB.Y = 6F10DDD26A975A07979E8B4A220E304100737BB2EE5D4DA50D2A62F634E40A4FCC3520F50AF5E9D3F027CE095EB48DCF
24,451,542 UART: [art] SIG.R = 016D412E7C12333F12F58693F146CCF6E9D6B8C4F1ECC9FC977D960ABDDB89940F566693177AF25E91F4E7F152219203
24,458,987 UART: [art] SIG.S = 87BA19533B04F61238AF0B126C0B9CBEF019A510C88BACD6A28682BB1F067578BD688F1BC657F700CF85B019D2C0D42C
25,437,953 UART: Caliptra RT
25,438,653 UART: [state] CFI Enabled
25,604,017 UART: [rt] RT listening for mailbox commands...
25,635,324 UART: [rt]cmd =0x46505652, len=4
25,636,628 UART: [rt] FIPS Version
25,637,899 >>> mbox cmd response data (36 bytes)
25,638,635 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,668,552 UART: [rt]cmd =0x46504c54, len=4
25,669,956 >>> mbox cmd response data (8 bytes)
25,670,299 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,700,214 UART: [rt]cmd =0x46504c67, len=4
25,701,506 >>> mbox cmd response: failed
25,702,500 UART: [rt] FIPS self test
25,703,485 UART: [kat] ++
25,703,938 UART: [kat] sha1
25,708,376 UART: [kat] SHA2-256
25,710,207 UART: [kat] SHA2-384
25,712,920 UART: [kat] SHA2-512-ACC
25,715,135 UART: [kat] ECC-384
28,153,519 UART: [kat] HMAC-384Kdf
28,180,616 UART: [kat] LMS
28,378,554 UART: [kat] --
28,511,854 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
31,694,568 UART: [rt] Verify complete
31,843,913 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,873,701 UART: [rt]cmd =0x46504c67, len=4
31,875,235 >>> mbox cmd response data (8 bytes)
31,875,594 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
31,905,420 UART: [rt]cmd =0x49444543, len=4
31,912,544 >>> mbox cmd response data (37 bytes)
31,913,144 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
31,942,599 UART: [rt]cmd =0x49444549, len=4
31,945,203 >>> mbox cmd response data (104 bytes)
31,946,075 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
31,975,643 UART: [rt]cmd =0x49444550, len=4
31,985,992 >>> mbox cmd response data (8 bytes)
31,986,392 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,016,151 UART: [rt]cmd =0x4c444556, len=4
32,027,285 >>> mbox cmd response data (687 bytes)
32,030,790 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,060,510 UART: [rt]cmd =0x43455246, len=4
32,073,115 >>> mbox cmd response data (887 bytes)
32,077,532 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,107,435 UART: [rt]cmd =0x43455252, len=4
32,118,732 >>> mbox cmd response data (783 bytes)
32,123,418 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,155,098 UART: [rt]cmd =0x53494756, len=196
33,120,930 >>> mbox cmd response data (8 bytes)
33,121,425 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,152,081 UART: [rt]cmd =0x4d454153, len=108
33,169,938 >>> mbox cmd response data (12 bytes)
33,170,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,200,347 UART: [rt]cmd =0x494e464f, len=4
33,204,170 >>> mbox cmd response data (264 bytes)
33,206,224 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,235,978 UART: [rt]cmd =0x54514754, len=24
33,238,471 >>> mbox cmd response data (8 bytes)
33,238,808 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,268,480 UART: [rt]cmd =0x47544744, len=8
33,271,772 >>> mbox cmd response data (104 bytes)
33,272,643 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,302,406 UART: [rt]cmd =0x50435252, len=8
33,304,256 >>> mbox cmd response data (8 bytes)
33,304,609 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,334,793 UART: [rt]cmd =0x50435251, len=36
34,242,890 >>> mbox cmd response data (1848 bytes)
34,251,786 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,282,152 UART: [rt]cmd =0x50435245, len=56
34,285,227 >>> mbox cmd response data (8 bytes)
34,285,662 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,315,567 UART: [rt]cmd =0x44504543, len=20
34,335,904 >>> mbox cmd response data (44 bytes)
34,336,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,366,378 UART: [rt]cmd =0x44504543, len=24
34,403,489 >>> mbox cmd response data (40 bytes)
34,404,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,434,625 UART: [rt]cmd =0x44504543, len=96
34,473,675 >>> mbox cmd response data (56 bytes)
34,474,455 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,505,107 UART: [rt]cmd =0x44504543, len=92
40,605,003 >>> mbox cmd response data (6284 bytes)
40,634,271 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,665,482 UART: [rt]cmd =0x44504543, len=136
44,891,890 >>> mbox cmd response data (136 bytes)
44,893,099 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,923,141 UART: [rt]cmd =0x44504543, len=40
44,960,038 >>> mbox cmd response data (40 bytes)
44,960,744 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
44,990,708 UART: [rt]cmd =0x44504543, len=28
45,033,744 >>> mbox cmd response data (2076 bytes)
45,043,671 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,073,796 UART: [rt]cmd =0x44504543, len=36
45,103,135 >>> mbox cmd response data (24 bytes)
45,103,739 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,133,449 UART: [rt]cmd =0x4453424c, len=4
47,602,297 >>> mbox cmd response data (8 bytes)
47,602,784 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,632,506 UART: [rt]cmd =0x46505344, len=4
47,742,827 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,712 UART:
193,096 UART: Running Caliptra ROM ...
194,320 UART:
603,908 UART: [state] CFI Enabled
615,961 UART: [state] LifecycleState = Unprovisioned
617,879 UART: [state] DebugLocked = No
619,921 UART: [state] WD Timer not started. Device not locked for debugging
624,386 UART: [kat] SHA2-256
803,554 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,119 UART: [kat] ++
815,652 UART: [kat] sha1
826,574 UART: [kat] SHA2-256
829,593 UART: [kat] SHA2-384
835,157 UART: [kat] SHA2-512-ACC
838,100 UART: [kat] ECC-384
3,281,699 UART: [kat] HMAC-384Kdf
3,293,719 UART: [kat] LMS
3,823,159 UART: [kat] --
3,828,137 UART: [cold-reset] ++
3,830,520 UART: [fht] FHT @ 0x50003400
3,840,655 UART: [idev] ++
3,841,219 UART: [idev] CDI.KEYID = 6
3,842,100 UART: [idev] SUBJECT.KEYID = 7
3,843,347 UART: [idev] UDS.KEYID = 0
3,844,246 ready_for_fw is high
3,844,453 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,988,176 UART: [idev] Erasing UDS.KEYID = 0
6,320,201 UART: [idev] Sha1 KeyId Algorithm
6,342,665 UART: [idev] --
6,346,942 UART: [ldev] ++
6,347,513 UART: [ldev] CDI.KEYID = 6
6,348,441 UART: [ldev] SUBJECT.KEYID = 5
6,349,657 UART: [ldev] AUTHORITY.KEYID = 7
6,350,886 UART: [ldev] FE.KEYID = 1
6,360,509 UART: [ldev] Erasing FE.KEYID = 1
8,836,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,366 UART: [ldev] --
10,628,469 UART: [fwproc] Wait for Commands...
10,630,089 UART: [fwproc] Recv command 0x46574c44
10,632,139 UART: [fwproc] Recv'd Img size: 114448 bytes
14,031,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,183 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,999 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,491,732 >>> mbox cmd response: success
14,494,712 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,496,562 UART: [afmc] ++
14,497,147 UART: [afmc] CDI.KEYID = 6
14,498,080 UART: [afmc] SUBJECT.KEYID = 7
14,499,247 UART: [afmc] AUTHORITY.KEYID = 5
16,997,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,764 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,818 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,674 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,820 UART: [afmc] --
18,795,235 UART: [cold-reset] --
18,797,320 UART: [state] Locking Datavault
18,801,976 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,620 UART: [state] Locking ICCM
18,805,229 UART: [exit] Launching FMC @ 0x40000130
18,813,621 UART:
18,813,857 UART: Running Caliptra FMC ...
18,814,977 UART:
18,815,140 UART: [state] CFI Enabled
18,823,402 UART: [fht] FMC Alias Private Key: 7
20,579,888 UART: [art] Extend RT PCRs Done
20,581,093 UART: [art] Lock RT PCRs Done
20,582,881 UART: [art] Populate DV Done
20,588,617 UART: [fht] FMC Alias Private Key: 7
20,590,206 UART: [art] Derive CDI
20,591,017 UART: [art] Store in in slot 0x4
20,633,664 UART: [art] Derive Key Pair
20,634,704 UART: [art] Store priv key in slot 0x5
23,061,634 UART: [art] Derive Key Pair - Done
23,074,362 UART: [art] Signing Cert with AUTHO
23,075,673 UART: RITY.KEYID = 7
24,781,212 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,690 UART: [art] PUB.X = 1BACAF30567EA476BD4B39C56E6C4F6349B55943A241D33EB26CCAB353E16A2D9CFAC49219FD326C9E68925FF5FC7D71
24,790,085 UART: [art] PUB.Y = 93EFD384480C0C53D5EB937FFEB9BEAB9AEA072397F4EC9403E62B00127B1A4DD6A415EC8AE342AC6B31D458D6C4EED1
24,797,315 UART: [art] SIG.R = 4BE499C51B059DE819AEF323BB78CF02123B9D630B57555D7F5DFA59DF3F310D32388D83BA8E294B1787A8C5B9508123
24,804,702 UART: [art] SIG.S = A0DCFF2E9DB89B12A162277905DB6D910D4BFABA0B2039BDC1F79B9BA90237120381FDCFA136A2F66EB93CD11398423E
25,783,383 UART: Caliptra RT
25,784,102 UART: [state] CFI Enabled
25,901,276 UART: [rt] RT listening for mailbox commands...
25,932,801 UART: [rt]cmd =0x46505652, len=4
25,934,103 UART: [rt] FIPS Version
25,935,474 >>> mbox cmd response data (36 bytes)
25,936,139 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,965,806 UART: [rt]cmd =0x46504c54, len=4
25,967,443 >>> mbox cmd response data (8 bytes)
25,967,771 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,997,377 UART: [rt]cmd =0x46504c67, len=4
25,998,697 >>> mbox cmd response: failed
25,999,360 UART: [rt] FIPS self test
26,000,314 UART: [kat] ++
26,000,772 UART: [kat] sha1
26,004,966 UART: [kat] SHA2-256
26,006,766 UART: [kat] SHA2-384
26,009,591 UART: [kat] SHA2-512-ACC
26,011,808 UART: [kat] ECC-384
28,439,086 UART: [kat] HMAC-384Kdf
28,445,055 UART: [kat] LMS
28,642,974 UART: [kat] --
28,796,588 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
31,979,212 UART: [rt] Verify complete
32,140,237 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,169,957 UART: [rt]cmd =0x46504c67, len=4
32,171,431 >>> mbox cmd response data (8 bytes)
32,171,822 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,201,570 UART: [rt]cmd =0x49444543, len=4
32,208,404 >>> mbox cmd response data (37 bytes)
32,208,983 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,238,764 UART: [rt]cmd =0x49444549, len=4
32,241,616 >>> mbox cmd response data (104 bytes)
32,242,418 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,272,204 UART: [rt]cmd =0x49444550, len=4
32,282,635 >>> mbox cmd response data (8 bytes)
32,283,032 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,312,860 UART: [rt]cmd =0x4c444556, len=4
32,323,869 >>> mbox cmd response data (687 bytes)
32,327,390 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,357,414 UART: [rt]cmd =0x43455246, len=4
32,370,009 >>> mbox cmd response data (887 bytes)
32,374,469 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,404,214 UART: [rt]cmd =0x43455252, len=4
32,415,569 >>> mbox cmd response data (783 bytes)
32,420,285 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,451,698 UART: [rt]cmd =0x53494756, len=196
33,416,711 >>> mbox cmd response data (8 bytes)
33,417,222 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,448,041 UART: [rt]cmd =0x4d454153, len=108
33,466,924 >>> mbox cmd response data (12 bytes)
33,467,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,496,993 UART: [rt]cmd =0x494e464f, len=4
33,500,765 >>> mbox cmd response data (264 bytes)
33,503,118 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,533,362 UART: [rt]cmd =0x54514754, len=24
33,535,954 >>> mbox cmd response data (8 bytes)
33,536,370 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,566,080 UART: [rt]cmd =0x47544744, len=8
33,568,954 >>> mbox cmd response data (104 bytes)
33,569,981 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,599,843 UART: [rt]cmd =0x50435252, len=8
33,601,707 >>> mbox cmd response data (8 bytes)
33,602,042 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,632,165 UART: [rt]cmd =0x50435251, len=36
34,539,837 >>> mbox cmd response data (1848 bytes)
34,548,743 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,578,845 UART: [rt]cmd =0x50435245, len=56
34,581,873 >>> mbox cmd response data (8 bytes)
34,582,317 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,612,008 UART: [rt]cmd =0x44504543, len=20
34,632,182 >>> mbox cmd response data (44 bytes)
34,632,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,662,771 UART: [rt]cmd =0x44504543, len=24
34,689,117 >>> mbox cmd response data (40 bytes)
34,689,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,720,677 UART: [rt]cmd =0x44504543, len=96
34,758,130 >>> mbox cmd response data (56 bytes)
34,758,878 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,789,417 UART: [rt]cmd =0x44504543, len=92
40,807,397 >>> mbox cmd response data (6284 bytes)
40,836,530 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,867,645 UART: [rt]cmd =0x44504543, len=136
45,039,619 >>> mbox cmd response data (136 bytes)
45,040,906 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,070,926 UART: [rt]cmd =0x44504543, len=40
45,097,093 >>> mbox cmd response data (40 bytes)
45,097,819 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,127,621 UART: [rt]cmd =0x44504543, len=28
45,170,143 >>> mbox cmd response data (2076 bytes)
45,180,077 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,210,041 UART: [rt]cmd =0x44504543, len=36
45,239,742 >>> mbox cmd response data (24 bytes)
45,240,315 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,269,826 UART: [rt]cmd =0x4453424c, len=4
47,697,579 >>> mbox cmd response data (8 bytes)
47,698,075 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,727,693 UART: [rt]cmd =0x46505344, len=4
47,837,790 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,694,553 ready_for_fw is high
3,695,031 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,274,101 >>> mbox cmd response: success
14,277,418 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,527,599 UART:
18,527,997 UART: Running Caliptra FMC ...
18,529,191 UART:
18,529,356 UART: [state] CFI Enabled
18,537,184 UART: [fht] FMC Alias Private Key: 7
20,293,850 UART: [art] Extend RT PCRs Done
20,295,063 UART: [art] Lock RT PCRs Done
20,296,854 UART: [art] Populate DV Done
20,302,097 UART: [fht] FMC Alias Private Key: 7
20,303,640 UART: [art] Derive CDI
20,304,459 UART: [art] Store in in slot 0x4
20,346,942 UART: [art] Derive Key Pair
20,348,011 UART: [art] Store priv key in slot 0x5
22,774,496 UART: [art] Derive Key Pair - Done
22,787,492 UART: [art] Signing Cert with AUTHO
22,788,809 UART: RITY.KEYID = 7
24,494,418 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,412 UART: [art] PUB.X = 99718F6485503FB2D6C6B6D226B1FD303F02CDA0F95A18ADE7DFBDE21B4492664F94C65DF7B764B37A760E5C6D9D12E4
24,503,174 UART: [art] PUB.Y = FBDF5B751B6D7DEBBF81B02976EE854A88C60D0BBFF624CA992B15EBE23FBF79B3B39B297E7DC059AD6A34220A11B18D
24,510,456 UART: [art] SIG.R = 327D37030D3ADCEB8E00E26ADAC0458CB81B89EA110797C7D5A9D1A0E273E6566CC6BDACE7FCFB8196DC84921C4066D6
24,517,850 UART: [art] SIG.S = 52DEE6A0A77ABE09887A5E49E3915BA87314E34874AB787FE0194DA3F6075C1CD3B72DEE8AAE9766EE580FE648808CA8
25,496,254 UART: Caliptra RT
25,496,958 UART: [state] CFI Enabled
25,614,073 UART: [rt] RT listening for mailbox commands...
25,645,195 UART: [rt]cmd =0x46505652, len=4
25,646,497 UART: [rt] FIPS Version
25,647,879 >>> mbox cmd response data (36 bytes)
25,648,508 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,678,226 UART: [rt]cmd =0x46504c54, len=4
25,679,836 >>> mbox cmd response data (8 bytes)
25,680,172 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,709,671 UART: [rt]cmd =0x46504c67, len=4
25,711,001 >>> mbox cmd response: failed
25,711,914 UART: [rt] FIPS self test
25,712,896 UART: [kat] ++
25,713,347 UART: [kat] sha1
25,717,695 UART: [kat] SHA2-256
25,719,501 UART: [kat] SHA2-384
25,722,515 UART: [kat] SHA2-512-ACC
25,724,726 UART: [kat] ECC-384
28,152,152 UART: [kat] HMAC-384Kdf
28,158,002 UART: [kat] LMS
28,355,910 UART: [kat] --
28,489,141 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
31,671,840 UART: [rt] Verify complete
31,852,952 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,882,631 UART: [rt]cmd =0x46504c67, len=4
31,884,081 >>> mbox cmd response data (8 bytes)
31,884,434 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
31,914,133 UART: [rt]cmd =0x49444543, len=4
31,921,115 >>> mbox cmd response data (37 bytes)
31,921,702 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
31,951,533 UART: [rt]cmd =0x49444549, len=4
31,954,393 >>> mbox cmd response data (104 bytes)
31,955,189 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
31,984,970 UART: [rt]cmd =0x49444550, len=4
31,995,729 >>> mbox cmd response data (8 bytes)
31,996,120 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,025,940 UART: [rt]cmd =0x4c444556, len=4
32,037,171 >>> mbox cmd response data (687 bytes)
32,040,691 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,070,615 UART: [rt]cmd =0x43455246, len=4
32,083,272 >>> mbox cmd response data (887 bytes)
32,087,662 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,117,256 UART: [rt]cmd =0x43455252, len=4
32,128,637 >>> mbox cmd response data (782 bytes)
32,133,333 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,164,732 UART: [rt]cmd =0x53494756, len=196
33,130,725 >>> mbox cmd response data (8 bytes)
33,131,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,161,888 UART: [rt]cmd =0x4d454153, len=108
33,180,592 >>> mbox cmd response data (12 bytes)
33,181,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,210,947 UART: [rt]cmd =0x494e464f, len=4
33,214,795 >>> mbox cmd response data (264 bytes)
33,216,972 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,247,118 UART: [rt]cmd =0x54514754, len=24
33,250,007 >>> mbox cmd response data (8 bytes)
33,250,429 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,280,192 UART: [rt]cmd =0x47544744, len=8
33,283,013 >>> mbox cmd response data (104 bytes)
33,283,865 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,313,649 UART: [rt]cmd =0x50435252, len=8
33,315,537 >>> mbox cmd response data (8 bytes)
33,315,883 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,345,947 UART: [rt]cmd =0x50435251, len=36
34,253,330 >>> mbox cmd response data (1848 bytes)
34,262,409 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,292,687 UART: [rt]cmd =0x50435245, len=56
34,295,710 >>> mbox cmd response data (8 bytes)
34,296,102 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,325,986 UART: [rt]cmd =0x44504543, len=20
34,346,242 >>> mbox cmd response data (44 bytes)
34,347,012 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,376,644 UART: [rt]cmd =0x44504543, len=24
34,402,782 >>> mbox cmd response data (40 bytes)
34,403,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,434,146 UART: [rt]cmd =0x44504543, len=96
34,470,895 >>> mbox cmd response data (56 bytes)
34,471,644 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,502,339 UART: [rt]cmd =0x44504543, len=92
40,520,212 >>> mbox cmd response data (6284 bytes)
40,549,282 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,580,274 UART: [rt]cmd =0x44504543, len=136
44,752,619 >>> mbox cmd response data (136 bytes)
44,753,808 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,784,004 UART: [rt]cmd =0x44504543, len=40
44,810,256 >>> mbox cmd response data (40 bytes)
44,810,904 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
44,840,728 UART: [rt]cmd =0x44504543, len=28
44,883,609 >>> mbox cmd response data (2076 bytes)
44,893,510 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
44,923,765 UART: [rt]cmd =0x44504543, len=36
44,953,276 >>> mbox cmd response data (24 bytes)
44,953,851 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,983,575 UART: [rt]cmd =0x4453424c, len=4
47,411,717 >>> mbox cmd response data (8 bytes)
47,412,225 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,441,893 UART: [rt]cmd =0x46505344, len=4
47,551,886 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,442,358 ready_for_fw is high
3,443,029 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,738,213 >>> mbox cmd response: success
14,741,298 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,026,601 UART:
19,027,014 UART: Running Caliptra FMC ...
19,028,246 UART:
19,028,425 UART: [state] CFI Enabled
19,096,580 UART: [fht] FMC Alias Private Key: 7
20,860,830 UART: [art] Extend RT PCRs Done
20,862,058 UART: [art] Lock RT PCRs Done
20,863,983 UART: [art] Populate DV Done
20,869,343 UART: [fht] FMC Alias Private Key: 7
20,870,992 UART: [art] Derive CDI
20,871,810 UART: [art] Store in in slot 0x4
20,929,431 UART: [art] Derive Key Pair
20,930,471 UART: [art] Store priv key in slot 0x5
23,393,607 UART: [art] Derive Key Pair - Done
23,406,405 UART: [art] Signing Cert with AUTHO
23,407,708 UART: RITY.KEYID = 7
25,119,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,343 UART: [art] PUB.X = D1481F2A0621F05E2759196C314111A4D8102CC9F10702CE9F88F93BB627C31A6F3D44B435FB4800DA1676E6D0FC126E
25,128,593 UART: [art] PUB.Y = 5DE315C7ECABFD29E7F9E8C43699E213B6E5F9A7AD9FE456A26B81A475966AE5D237A0801536CC61B3BCE9C1E2270DD9
25,135,846 UART: [art] SIG.R = 01C08B240D8020E542CCD7EE77EC607F11DE19A1A6AD947BFE5C8458372839FFE38A050531D255EB656774433A95D32E
25,143,231 UART: [art] SIG.S = FE626A2B713B382DFFE955B021C0CED23414CD0FBEE4FD9D2BC22B9A0E8294B8F3A3B89691103023206D7AAE816562AD
26,122,056 UART: Caliptra RT
26,122,753 UART: [state] CFI Enabled
26,287,618 UART: [rt] RT listening for mailbox commands...
26,319,018 UART: [rt]cmd =0x46505652, len=4
26,320,271 UART: [rt] FIPS Version
26,321,478 >>> mbox cmd response data (36 bytes)
26,322,157 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,351,829 UART: [rt]cmd =0x46504c54, len=4
26,353,601 >>> mbox cmd response data (8 bytes)
26,353,940 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,383,596 UART: [rt]cmd =0x46504c67, len=4
26,384,921 >>> mbox cmd response: failed
26,386,193 UART: [rt] FIPS self test
26,387,180 UART: [kat] ++
26,387,627 UART: [kat] sha1
26,392,147 UART: [kat] SHA2-256
26,393,948 UART: [kat] SHA2-384
26,396,655 UART: [kat] SHA2-512-ACC
26,398,895 UART: [kat] ECC-384
28,837,696 UART: [kat] HMAC-384Kdf
28,844,214 UART: [kat] LMS
29,042,119 UART: [kat] --
29,176,087 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,358,833 UART: [rt] Verify complete
32,527,060 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,556,967 UART: [rt]cmd =0x46504c67, len=4
32,558,580 >>> mbox cmd response data (8 bytes)
32,558,932 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,588,846 UART: [rt]cmd =0x49444543, len=4
32,595,883 >>> mbox cmd response data (37 bytes)
32,596,472 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,625,889 UART: [rt]cmd =0x49444549, len=4
32,628,823 >>> mbox cmd response data (104 bytes)
32,629,719 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,659,373 UART: [rt]cmd =0x49444550, len=4
32,669,973 >>> mbox cmd response data (8 bytes)
32,670,382 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,700,052 UART: [rt]cmd =0x4c444556, len=4
32,711,062 >>> mbox cmd response data (687 bytes)
32,714,582 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,744,451 UART: [rt]cmd =0x43455246, len=4
32,757,097 >>> mbox cmd response data (887 bytes)
32,761,498 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,791,630 UART: [rt]cmd =0x43455252, len=4
32,802,970 >>> mbox cmd response data (783 bytes)
32,807,672 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,839,173 UART: [rt]cmd =0x53494756, len=196
33,804,608 >>> mbox cmd response data (8 bytes)
33,805,104 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,835,982 UART: [rt]cmd =0x4d454153, len=108
33,855,765 >>> mbox cmd response data (12 bytes)
33,856,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,885,796 UART: [rt]cmd =0x494e464f, len=4
33,889,654 >>> mbox cmd response data (264 bytes)
33,891,757 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,921,722 UART: [rt]cmd =0x54514754, len=24
33,924,118 >>> mbox cmd response data (8 bytes)
33,924,549 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,954,311 UART: [rt]cmd =0x47544744, len=8
33,956,966 >>> mbox cmd response data (104 bytes)
33,957,739 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,987,383 UART: [rt]cmd =0x50435252, len=8
33,989,433 >>> mbox cmd response data (8 bytes)
33,989,802 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,019,765 UART: [rt]cmd =0x50435251, len=36
34,940,846 >>> mbox cmd response data (1848 bytes)
34,949,755 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,980,189 UART: [rt]cmd =0x50435245, len=56
34,983,320 >>> mbox cmd response data (8 bytes)
34,983,774 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,013,764 UART: [rt]cmd =0x44504543, len=20
35,034,393 >>> mbox cmd response data (44 bytes)
35,035,147 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,064,838 UART: [rt]cmd =0x44504543, len=24
35,101,642 >>> mbox cmd response data (40 bytes)
35,102,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,132,822 UART: [rt]cmd =0x44504543, len=96
35,172,096 >>> mbox cmd response data (56 bytes)
35,172,874 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,203,291 UART: [rt]cmd =0x44504543, len=92
41,304,379 >>> mbox cmd response data (6284 bytes)
41,333,654 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,364,710 UART: [rt]cmd =0x44504543, len=136
45,593,498 >>> mbox cmd response data (136 bytes)
45,594,691 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,624,980 UART: [rt]cmd =0x44504543, len=40
45,663,880 >>> mbox cmd response data (40 bytes)
45,664,570 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,694,661 UART: [rt]cmd =0x44504543, len=28
45,737,125 >>> mbox cmd response data (2076 bytes)
45,747,053 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,777,078 UART: [rt]cmd =0x44504543, len=36
45,806,614 >>> mbox cmd response data (24 bytes)
45,807,174 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,836,957 UART: [rt]cmd =0x4453424c, len=4
48,306,272 >>> mbox cmd response data (8 bytes)
48,306,767 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,336,214 UART: [rt]cmd =0x46505344, len=4
48,446,067 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,757,645 ready_for_fw is high
3,758,255 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,962,524 >>> mbox cmd response: success
14,965,590 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,211,365 UART:
19,211,770 UART: Running Caliptra FMC ...
19,212,936 UART:
19,213,117 UART: [state] CFI Enabled
19,220,993 UART: [fht] FMC Alias Private Key: 7
20,977,931 UART: [art] Extend RT PCRs Done
20,979,161 UART: [art] Lock RT PCRs Done
20,981,228 UART: [art] Populate DV Done
20,986,644 UART: [fht] FMC Alias Private Key: 7
20,988,134 UART: [art] Derive CDI
20,988,897 UART: [art] Store in in slot 0x4
21,031,762 UART: [art] Derive Key Pair
21,032,807 UART: [art] Store priv key in slot 0x5
23,460,060 UART: [art] Derive Key Pair - Done
23,472,846 UART: [art] Signing Cert with AUTHO
23,474,160 UART: RITY.KEYID = 7
25,179,348 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,856 UART: [art] PUB.X = F0051411E4B03E4D7ED4265085B58F71A7444B5876DA26E0EB0D1A6CF1A52ECE2A0A80A5D52FC73CB98C203C5F6906FB
25,188,132 UART: [art] PUB.Y = 91AC07CCA6B81AABC027AD849D42B879A55CB607EFEA89B497ACE7376C2EE706C6D92B5272654024684B1042577505D1
25,195,397 UART: [art] SIG.R = 380DB26AC9B1CBD839C3770AAB13D9752AB4EC813326FA4F6F7ACE08E063F04101E14BBB01D5F585172CAA212A24F76B
25,202,791 UART: [art] SIG.S = 7694EC3566FBD584915336D4218E8832DA47A761A8C899F510D98B97A13A9642680416A1C9E2803E2E85B10D9E9D7658
26,181,092 UART: Caliptra RT
26,181,788 UART: [state] CFI Enabled
26,298,048 UART: [rt] RT listening for mailbox commands...
26,329,189 UART: [rt]cmd =0x46505652, len=4
26,330,491 UART: [rt] FIPS Version
26,331,863 >>> mbox cmd response data (36 bytes)
26,332,562 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,362,291 UART: [rt]cmd =0x46504c54, len=4
26,363,743 >>> mbox cmd response data (8 bytes)
26,364,120 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,394,204 UART: [rt]cmd =0x46504c67, len=4
26,395,503 >>> mbox cmd response: failed
26,396,605 UART: [rt] FIPS self test
26,397,592 UART: [kat] ++
26,398,059 UART: [kat] sha1
26,402,315 UART: [kat] SHA2-256
26,404,113 UART: [kat] SHA2-384
26,406,966 UART: [kat] SHA2-512-ACC
26,409,174 UART: [kat] ECC-384
28,836,641 UART: [kat] HMAC-384Kdf
28,842,398 UART: [kat] LMS
29,040,315 UART: [kat] --
29,174,314 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,357,463 UART: [rt] Verify complete
32,537,437 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,567,392 UART: [rt]cmd =0x46504c67, len=4
32,568,973 >>> mbox cmd response data (8 bytes)
32,569,327 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,598,972 UART: [rt]cmd =0x49444543, len=4
32,606,064 >>> mbox cmd response data (37 bytes)
32,606,708 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,636,314 UART: [rt]cmd =0x49444549, len=4
32,639,141 >>> mbox cmd response data (104 bytes)
32,640,012 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,669,886 UART: [rt]cmd =0x49444550, len=4
32,680,644 >>> mbox cmd response data (8 bytes)
32,681,047 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,710,718 UART: [rt]cmd =0x4c444556, len=4
32,721,731 >>> mbox cmd response data (687 bytes)
32,725,252 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,754,995 UART: [rt]cmd =0x43455246, len=4
32,767,601 >>> mbox cmd response data (887 bytes)
32,772,047 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,801,634 UART: [rt]cmd =0x43455252, len=4
32,812,933 >>> mbox cmd response data (782 bytes)
32,817,631 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,849,110 UART: [rt]cmd =0x53494756, len=196
33,814,667 >>> mbox cmd response data (8 bytes)
33,815,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,845,817 UART: [rt]cmd =0x4d454153, len=108
33,864,104 >>> mbox cmd response data (12 bytes)
33,864,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,894,299 UART: [rt]cmd =0x494e464f, len=4
33,898,236 >>> mbox cmd response data (264 bytes)
33,900,253 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,930,118 UART: [rt]cmd =0x54514754, len=24
33,932,875 >>> mbox cmd response data (8 bytes)
33,933,290 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,963,027 UART: [rt]cmd =0x47544744, len=8
33,965,884 >>> mbox cmd response data (104 bytes)
33,966,750 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,996,735 UART: [rt]cmd =0x50435252, len=8
33,998,873 >>> mbox cmd response data (8 bytes)
33,999,287 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,029,248 UART: [rt]cmd =0x50435251, len=36
34,936,840 >>> mbox cmd response data (1848 bytes)
34,945,763 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,976,200 UART: [rt]cmd =0x50435245, len=56
34,979,224 >>> mbox cmd response data (8 bytes)
34,979,664 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,009,217 UART: [rt]cmd =0x44504543, len=20
35,029,794 >>> mbox cmd response data (44 bytes)
35,030,511 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,060,522 UART: [rt]cmd =0x44504543, len=24
35,086,410 >>> mbox cmd response data (40 bytes)
35,087,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,117,908 UART: [rt]cmd =0x44504543, len=96
35,154,732 >>> mbox cmd response data (56 bytes)
35,155,490 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,185,872 UART: [rt]cmd =0x44504543, len=92
41,203,659 >>> mbox cmd response data (6284 bytes)
41,232,770 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,263,691 UART: [rt]cmd =0x44504543, len=136
45,435,219 >>> mbox cmd response data (136 bytes)
45,436,455 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,466,413 UART: [rt]cmd =0x44504543, len=40
45,492,689 >>> mbox cmd response data (40 bytes)
45,493,384 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,523,562 UART: [rt]cmd =0x44504543, len=28
45,566,133 >>> mbox cmd response data (2076 bytes)
45,576,073 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,606,526 UART: [rt]cmd =0x44504543, len=36
45,635,901 >>> mbox cmd response data (24 bytes)
45,636,461 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,666,099 UART: [rt]cmd =0x4453424c, len=4
48,093,896 >>> mbox cmd response data (8 bytes)
48,094,393 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,124,075 UART: [rt]cmd =0x46505344, len=4
48,233,851 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
895,180 UART: [kat] SHA2-512-ACC
897,081 UART: [kat] ECC-384
902,644 UART: [kat] HMAC-384Kdf
907,234 UART: [kat] LMS
1,475,430 UART: [kat] --
1,476,457 UART: [cold-reset] ++
1,476,889 UART: [fht] Storing FHT @ 0x50003400
1,479,658 UART: [idev] ++
1,479,826 UART: [idev] CDI.KEYID = 6
1,480,186 UART: [idev] SUBJECT.KEYID = 7
1,480,610 UART: [idev] UDS.KEYID = 0
1,480,955 ready_for_fw is high
1,480,955 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,626 UART: [idev] Erasing UDS.KEYID = 0
1,505,132 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,666 UART: [idev] --
1,514,627 UART: [ldev] ++
1,514,795 UART: [ldev] CDI.KEYID = 6
1,515,158 UART: [ldev] SUBJECT.KEYID = 5
1,515,584 UART: [ldev] AUTHORITY.KEYID = 7
1,516,047 UART: [ldev] FE.KEYID = 1
1,521,305 UART: [ldev] Erasing FE.KEYID = 1
1,546,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,386 UART: [ldev] --
1,585,653 UART: [fwproc] Waiting for Commands...
1,586,398 UART: [fwproc] Received command 0x46574c44
1,587,189 UART: [fwproc] Received Image of size 114448 bytes
2,886,740 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,862 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,214 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,217 >>> mbox cmd response: success
3,079,217 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,389 UART: [afmc] ++
3,080,557 UART: [afmc] CDI.KEYID = 6
3,080,919 UART: [afmc] SUBJECT.KEYID = 7
3,081,344 UART: [afmc] AUTHORITY.KEYID = 5
3,116,481 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,779 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,559 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,287 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,172 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,862 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,657 UART: [afmc] --
3,159,689 UART: [cold-reset] --
3,160,685 UART: [state] Locking Datavault
3,161,818 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,422 UART: [state] Locking ICCM
3,162,882 UART: [exit] Launching FMC @ 0x40000130
3,168,211 UART:
3,168,227 UART: Running Caliptra FMC ...
3,168,635 UART:
3,168,689 UART: [state] CFI Enabled
3,179,586 UART: [fht] FMC Alias Private Key: 7
3,287,475 UART: [art] Extend RT PCRs Done
3,287,903 UART: [art] Lock RT PCRs Done
3,289,105 UART: [art] Populate DV Done
3,297,432 UART: [fht] FMC Alias Private Key: 7
3,298,450 UART: [art] Derive CDI
3,298,730 UART: [art] Store in in slot 0x4
3,384,751 UART: [art] Derive Key Pair
3,385,111 UART: [art] Store priv key in slot 0x5
3,398,407 UART: [art] Derive Key Pair - Done
3,413,150 UART: [art] Signing Cert with AUTHO
3,413,630 UART: RITY.KEYID = 7
3,428,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,485 UART: [art] PUB.X = 2A59DD5360F6B2360D6445E139869F590D4B6C4B79A5A4763AA221D8F48B4308F0455BFC110FCD8634EC7002EE72A833
3,436,240 UART: [art] PUB.Y = C5112D765107CE384047A4B06544C14684911C816E5F943A5F5D1C21E5CAF439C7BCBE5194D120F4935207D752D221F8
3,443,178 UART: [art] SIG.R = 46FFE150C1F7E3E42CB956FF49F23E5EBD8D51674CC472D2B9D8199F062D345F58F50979F34F4D4451F913B87E72CED2
3,449,950 UART: [art] SIG.S = 782B6E6E26F51CDEAB67378848FE322A011B8A3FF6AE03430A86BEED2B54DC91AEF7FFA277AF8B1C9581B2C68C5065C6
3,473,904 UART: Caliptra RT
3,474,157 UART: [state] CFI Enabled
3,582,035 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,243 UART: [rt]cmd =0x46505652, len=4
3,612,914 UART: [rt] FIPS Version
3,614,155 >>> mbox cmd response data (36 bytes)
3,614,156 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,631 UART: [rt]cmd =0x46504c54, len=4
3,644,848 >>> mbox cmd response data (8 bytes)
3,644,849 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,674,452 UART: [rt]cmd =0x46504c67, len=4
3,675,605 >>> mbox cmd response: failed
3,675,813 UART: [rt] FIPS self test
3,676,144 UART: [kat] ++
3,676,296 UART: [kat] sha1
3,680,357 UART: [kat] SHA2-256
3,682,287 UART: [kat] SHA2-384
3,685,120 UART: [kat] SHA2-512-ACC
3,687,015 UART: [kat] ECC-384
3,696,694 UART: [kat] HMAC-384Kdf
3,701,145 UART: [kat] LMS
3,950,036 UART: [kat] --
4,744,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,175,090 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,185,354 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,214,816 UART: [rt]cmd =0x46504c67, len=4
6,215,994 >>> mbox cmd response data (8 bytes)
6,215,995 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,245,364 UART: [rt]cmd =0x49444543, len=4
6,251,921 >>> mbox cmd response data (37 bytes)
6,251,922 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,281,303 UART: [rt]cmd =0x49444549, len=4
6,283,491 >>> mbox cmd response data (104 bytes)
6,283,492 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,312,655 UART: [rt]cmd =0x49444550, len=4
6,322,726 >>> mbox cmd response data (8 bytes)
6,322,727 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,352,036 UART: [rt]cmd =0x4c444556, len=4
6,362,512 >>> mbox cmd response data (687 bytes)
6,362,513 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,391,984 UART: [rt]cmd =0x43455246, len=4
6,404,372 >>> mbox cmd response data (920 bytes)
6,404,373 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,433,598 UART: [rt]cmd =0x43455252, len=4
6,444,545 >>> mbox cmd response data (782 bytes)
6,444,546 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,475,319 UART: [rt]cmd =0x53494756, len=196
6,480,834 >>> mbox cmd response data (8 bytes)
6,480,835 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,510,776 UART: [rt]cmd =0x4d454153, len=108
6,531,374 >>> mbox cmd response data (12 bytes)
6,531,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,560,738 UART: [rt]cmd =0x494e464f, len=4
6,564,099 >>> mbox cmd response data (264 bytes)
6,564,100 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,593,629 UART: [rt]cmd =0x54514754, len=24
6,595,476 >>> mbox cmd response data (8 bytes)
6,595,477 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,625,058 UART: [rt]cmd =0x47544744, len=8
6,627,619 >>> mbox cmd response data (104 bytes)
6,627,620 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,656,725 UART: [rt]cmd =0x50435252, len=8
6,658,484 >>> mbox cmd response data (8 bytes)
6,658,485 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,688,120 UART: [rt]cmd =0x50435251, len=36
6,855,670 >>> mbox cmd response data (1848 bytes)
6,855,671 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,885,508 UART: [rt]cmd =0x50435245, len=56
6,889,355 >>> mbox cmd response data (8 bytes)
6,889,356 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,919,095 UART: [rt]cmd =0x44504543, len=20
6,939,859 >>> mbox cmd response data (44 bytes)
6,939,860 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,969,503 UART: [rt]cmd =0x44504543, len=24
6,995,402 >>> mbox cmd response data (40 bytes)
6,995,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,025,398 UART: [rt]cmd =0x44504543, len=96
7,061,491 >>> mbox cmd response data (56 bytes)
7,061,492 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,091,515 UART: [rt]cmd =0x44504543, len=92
7,319,901 >>> mbox cmd response data (6284 bytes)
7,319,902 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,350,115 UART: [rt]cmd =0x44504543, len=136
7,416,585 >>> mbox cmd response data (136 bytes)
7,416,586 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,446,215 UART: [rt]cmd =0x44504543, len=40
7,472,227 >>> mbox cmd response data (40 bytes)
7,472,228 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,502,003 UART: [rt]cmd =0x44504543, len=28
7,545,077 >>> mbox cmd response data (2076 bytes)
7,545,078 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,574,741 UART: [rt]cmd =0x44504543, len=36
7,604,887 >>> mbox cmd response data (24 bytes)
7,604,888 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,634,309 UART: [rt]cmd =0x4453424c, len=4
7,648,493 >>> mbox cmd response data (8 bytes)
7,648,494 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,677,857 UART: [rt]cmd =0x46505344, len=4
7,786,459 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 ready_for_fw is high
1,362,585 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,745 >>> mbox cmd response: success
2,928,745 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,990,535 UART:
2,990,551 UART: Running Caliptra FMC ...
2,990,959 UART:
2,991,013 UART: [state] CFI Enabled
3,001,310 UART: [fht] FMC Alias Private Key: 7
3,109,253 UART: [art] Extend RT PCRs Done
3,109,681 UART: [art] Lock RT PCRs Done
3,111,291 UART: [art] Populate DV Done
3,119,402 UART: [fht] FMC Alias Private Key: 7
3,120,400 UART: [art] Derive CDI
3,120,680 UART: [art] Store in in slot 0x4
3,206,761 UART: [art] Derive Key Pair
3,207,121 UART: [art] Store priv key in slot 0x5
3,220,213 UART: [art] Derive Key Pair - Done
3,234,903 UART: [art] Signing Cert with AUTHO
3,235,383 UART: RITY.KEYID = 7
3,250,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,506 UART: [art] PUB.X = EEC9E2ACC7EDDB110F8A970413DABC98BE58B41D2F4847F5C7DEAC25930A78AFFE59C248EA6776B33783F24EC0E482B7
3,258,289 UART: [art] PUB.Y = 22797DB2466790753450F25D21F937F077AE3E8D971D3B6857BD9DCE30BE777FB0B15FC7F1A9AB8FE6AE8AFA5F67E5AB
3,265,255 UART: [art] SIG.R = 2E4BAD793A625AC6544CC56F5876BAAA44B88DE4AC304379DD00BB112ADEC50B8DAA7EE2EE5033C36A17C7C83B4F2F0D
3,272,021 UART: [art] SIG.S = 02E3CE99ED3308412A5655903F1129E99409AEAF0F39E262A9037DC06A195915C9BF5951B06C1CD0D4DB7D2CAF5BF98B
3,295,455 UART: Caliptra RT
3,295,708 UART: [state] CFI Enabled
3,404,022 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,360 UART: [rt]cmd =0x46505652, len=4
3,435,031 UART: [rt] FIPS Version
3,436,168 >>> mbox cmd response data (36 bytes)
3,436,169 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,618 UART: [rt]cmd =0x46504c54, len=4
3,466,583 >>> mbox cmd response data (8 bytes)
3,466,584 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,496,561 UART: [rt]cmd =0x46504c67, len=4
3,497,634 >>> mbox cmd response: failed
3,497,814 UART: [rt] FIPS self test
3,498,145 UART: [kat] ++
3,498,297 UART: [kat] sha1
3,502,500 UART: [kat] SHA2-256
3,504,430 UART: [kat] SHA2-384
3,507,215 UART: [kat] SHA2-512-ACC
3,509,110 UART: [kat] ECC-384
3,519,137 UART: [kat] HMAC-384Kdf
3,523,712 UART: [kat] LMS
3,772,603 UART: [kat] --
4,460,004 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,889,170 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,897,394 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,926,846 UART: [rt]cmd =0x46504c67, len=4
5,927,980 >>> mbox cmd response data (8 bytes)
5,927,981 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,957,336 UART: [rt]cmd =0x49444543, len=4
5,963,751 >>> mbox cmd response data (37 bytes)
5,963,752 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,993,061 UART: [rt]cmd =0x49444549, len=4
5,995,285 >>> mbox cmd response data (104 bytes)
5,995,286 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,024,801 UART: [rt]cmd =0x49444550, len=4
6,034,934 >>> mbox cmd response data (8 bytes)
6,034,935 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,064,330 UART: [rt]cmd =0x4c444556, len=4
6,074,870 >>> mbox cmd response data (687 bytes)
6,074,871 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,104,290 UART: [rt]cmd =0x43455246, len=4
6,116,702 >>> mbox cmd response data (920 bytes)
6,116,703 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,146,384 UART: [rt]cmd =0x43455252, len=4
6,157,277 >>> mbox cmd response data (782 bytes)
6,157,278 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,188,099 UART: [rt]cmd =0x53494756, len=196
6,193,684 >>> mbox cmd response data (8 bytes)
6,193,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,223,724 UART: [rt]cmd =0x4d454153, len=108
6,244,158 >>> mbox cmd response data (12 bytes)
6,244,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,273,230 UART: [rt]cmd =0x494e464f, len=4
6,276,619 >>> mbox cmd response data (264 bytes)
6,276,620 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,305,955 UART: [rt]cmd =0x54514754, len=24
6,308,090 >>> mbox cmd response data (8 bytes)
6,308,091 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,337,342 UART: [rt]cmd =0x47544744, len=8
6,339,977 >>> mbox cmd response data (104 bytes)
6,339,978 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,369,471 UART: [rt]cmd =0x50435252, len=8
6,371,020 >>> mbox cmd response data (8 bytes)
6,371,021 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,400,382 UART: [rt]cmd =0x50435251, len=36
6,567,692 >>> mbox cmd response data (1848 bytes)
6,567,693 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,597,352 UART: [rt]cmd =0x50435245, len=56
6,600,721 >>> mbox cmd response data (8 bytes)
6,600,722 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,630,215 UART: [rt]cmd =0x44504543, len=20
6,650,871 >>> mbox cmd response data (44 bytes)
6,650,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,680,363 UART: [rt]cmd =0x44504543, len=24
6,706,358 >>> mbox cmd response data (40 bytes)
6,706,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,736,450 UART: [rt]cmd =0x44504543, len=96
6,773,691 >>> mbox cmd response data (56 bytes)
6,773,692 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,803,397 UART: [rt]cmd =0x44504543, len=92
7,031,806 >>> mbox cmd response data (6284 bytes)
7,031,807 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,062,086 UART: [rt]cmd =0x44504543, len=136
7,128,974 >>> mbox cmd response data (136 bytes)
7,128,975 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,158,416 UART: [rt]cmd =0x44504543, len=40
7,184,590 >>> mbox cmd response data (40 bytes)
7,184,591 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,213,854 UART: [rt]cmd =0x44504543, len=28
7,256,850 >>> mbox cmd response data (2076 bytes)
7,256,851 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,286,246 UART: [rt]cmd =0x44504543, len=36
7,315,862 >>> mbox cmd response data (24 bytes)
7,315,863 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,345,234 UART: [rt]cmd =0x4453424c, len=4
7,359,144 >>> mbox cmd response data (8 bytes)
7,359,145 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,388,396 UART: [rt]cmd =0x46505344, len=4
7,496,718 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,780 UART: [kat] SHA2-256
881,711 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,826 UART: [kat] ++
885,978 UART: [kat] sha1
890,298 UART: [kat] SHA2-256
892,236 UART: [kat] SHA2-384
895,011 UART: [kat] SHA2-512-ACC
896,912 UART: [kat] ECC-384
902,143 UART: [kat] HMAC-384Kdf
906,671 UART: [kat] LMS
1,474,867 UART: [kat] --
1,475,946 UART: [cold-reset] ++
1,476,450 UART: [fht] Storing FHT @ 0x50003400
1,479,317 UART: [idev] ++
1,479,485 UART: [idev] CDI.KEYID = 6
1,479,845 UART: [idev] SUBJECT.KEYID = 7
1,480,269 UART: [idev] UDS.KEYID = 0
1,480,614 ready_for_fw is high
1,480,614 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,219 UART: [idev] Erasing UDS.KEYID = 0
1,504,573 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,245 UART: [idev] --
1,514,312 UART: [ldev] ++
1,514,480 UART: [ldev] CDI.KEYID = 6
1,514,843 UART: [ldev] SUBJECT.KEYID = 5
1,515,269 UART: [ldev] AUTHORITY.KEYID = 7
1,515,732 UART: [ldev] FE.KEYID = 1
1,520,904 UART: [ldev] Erasing FE.KEYID = 1
1,546,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,979 UART: [ldev] --
1,586,430 UART: [fwproc] Waiting for Commands...
1,587,075 UART: [fwproc] Received command 0x46574c44
1,587,866 UART: [fwproc] Received Image of size 114448 bytes
2,887,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,359 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,711 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,814 >>> mbox cmd response: success
3,079,814 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,942 UART: [afmc] ++
3,081,110 UART: [afmc] CDI.KEYID = 6
3,081,472 UART: [afmc] SUBJECT.KEYID = 7
3,081,897 UART: [afmc] AUTHORITY.KEYID = 5
3,116,588 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,032 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,760 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,645 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,335 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,212 UART: [afmc] --
3,160,296 UART: [cold-reset] --
3,161,202 UART: [state] Locking Datavault
3,162,183 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,787 UART: [state] Locking ICCM
3,163,357 UART: [exit] Launching FMC @ 0x40000130
3,168,686 UART:
3,168,702 UART: Running Caliptra FMC ...
3,169,110 UART:
3,169,253 UART: [state] CFI Enabled
3,180,052 UART: [fht] FMC Alias Private Key: 7
3,287,827 UART: [art] Extend RT PCRs Done
3,288,255 UART: [art] Lock RT PCRs Done
3,289,757 UART: [art] Populate DV Done
3,298,056 UART: [fht] FMC Alias Private Key: 7
3,299,224 UART: [art] Derive CDI
3,299,504 UART: [art] Store in in slot 0x4
3,385,599 UART: [art] Derive Key Pair
3,385,959 UART: [art] Store priv key in slot 0x5
3,399,461 UART: [art] Derive Key Pair - Done
3,414,064 UART: [art] Signing Cert with AUTHO
3,414,544 UART: RITY.KEYID = 7
3,429,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,247 UART: [art] PUB.X = BB8979636D7F918529BCCDE21BCA6F8E0B5E657E39DDB6F79E606F37B8D2E5ED3A45413597FFC1A15D534531BC2101D2
3,437,023 UART: [art] PUB.Y = A5D1BB05CAFBD87E51328988477533712B35DE7508FDE8D1E54AE3235DDF199B06B1B210B914AC105FD044E50D6A3914
3,443,967 UART: [art] SIG.R = F66BDCD770B5D5B98D69FCCBAA008E002B7B1809DD7E0F5087C44F625DBE59F2BE2CBEAD6D282E08B398478CEE2E81A1
3,450,708 UART: [art] SIG.S = B024447A4E4DE0BEABD8947CFFBFB2A01F7C6B7E4F7BF7B3B8671B0EF0D15057613930C22660022618DAD9E5FD1F77E6
3,474,665 UART: Caliptra RT
3,475,010 UART: [state] CFI Enabled
3,584,200 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,608 UART: [rt]cmd =0x46505652, len=4
3,615,279 UART: [rt] FIPS Version
3,616,340 >>> mbox cmd response data (36 bytes)
3,616,341 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,654 UART: [rt]cmd =0x46504c54, len=4
3,646,609 >>> mbox cmd response data (8 bytes)
3,646,610 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,676,319 UART: [rt]cmd =0x46504c67, len=4
3,677,274 >>> mbox cmd response: failed
3,677,562 UART: [rt] FIPS self test
3,677,893 UART: [kat] ++
3,678,045 UART: [kat] sha1
3,682,244 UART: [kat] SHA2-256
3,684,174 UART: [kat] SHA2-384
3,686,837 UART: [kat] SHA2-512-ACC
3,688,732 UART: [kat] ECC-384
3,698,667 UART: [kat] HMAC-384Kdf
3,703,206 UART: [kat] LMS
3,952,097 UART: [kat] --
4,746,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,176,557 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,187,023 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,216,517 UART: [rt]cmd =0x46504c67, len=4
6,217,663 >>> mbox cmd response data (8 bytes)
6,217,664 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,246,971 UART: [rt]cmd =0x49444543, len=4
6,253,486 >>> mbox cmd response data (37 bytes)
6,253,487 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,282,770 UART: [rt]cmd =0x49444549, len=4
6,285,080 >>> mbox cmd response data (104 bytes)
6,285,081 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,314,242 UART: [rt]cmd =0x49444550, len=4
6,324,487 >>> mbox cmd response data (8 bytes)
6,324,488 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,353,813 UART: [rt]cmd =0x4c444556, len=4
6,364,191 >>> mbox cmd response data (687 bytes)
6,364,192 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,393,543 UART: [rt]cmd =0x43455246, len=4
6,405,849 >>> mbox cmd response data (920 bytes)
6,405,850 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,435,307 UART: [rt]cmd =0x43455252, len=4
6,445,973 >>> mbox cmd response data (784 bytes)
6,445,974 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,476,389 UART: [rt]cmd =0x53494756, len=196
6,481,814 >>> mbox cmd response data (8 bytes)
6,481,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,511,880 UART: [rt]cmd =0x4d454153, len=108
6,533,448 >>> mbox cmd response data (12 bytes)
6,533,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,563,040 UART: [rt]cmd =0x494e464f, len=4
6,566,273 >>> mbox cmd response data (264 bytes)
6,566,274 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,595,581 UART: [rt]cmd =0x54514754, len=24
6,597,586 >>> mbox cmd response data (8 bytes)
6,597,587 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,626,940 UART: [rt]cmd =0x47544744, len=8
6,629,609 >>> mbox cmd response data (104 bytes)
6,629,610 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,658,985 UART: [rt]cmd =0x50435252, len=8
6,660,692 >>> mbox cmd response data (8 bytes)
6,660,693 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,690,178 UART: [rt]cmd =0x50435251, len=36
6,857,412 >>> mbox cmd response data (1848 bytes)
6,857,413 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,887,148 UART: [rt]cmd =0x50435245, len=56
6,890,939 >>> mbox cmd response data (8 bytes)
6,890,940 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,920,381 UART: [rt]cmd =0x44504543, len=20
6,941,233 >>> mbox cmd response data (44 bytes)
6,941,234 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,970,653 UART: [rt]cmd =0x44504543, len=24
6,997,074 >>> mbox cmd response data (40 bytes)
6,997,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,027,064 UART: [rt]cmd =0x44504543, len=96
7,063,771 >>> mbox cmd response data (56 bytes)
7,063,772 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,093,515 UART: [rt]cmd =0x44504543, len=92
7,320,952 >>> mbox cmd response data (6284 bytes)
7,320,953 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,351,130 UART: [rt]cmd =0x44504543, len=136
7,417,432 >>> mbox cmd response data (136 bytes)
7,417,433 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,447,260 UART: [rt]cmd =0x44504543, len=40
7,473,140 >>> mbox cmd response data (40 bytes)
7,473,141 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,502,758 UART: [rt]cmd =0x44504543, len=28
7,546,048 >>> mbox cmd response data (2076 bytes)
7,546,049 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,575,446 UART: [rt]cmd =0x44504543, len=36
7,605,768 >>> mbox cmd response data (24 bytes)
7,605,769 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,635,134 UART: [rt]cmd =0x4453424c, len=4
7,649,664 >>> mbox cmd response data (8 bytes)
7,649,665 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,679,056 UART: [rt]cmd =0x46505344, len=4
7,787,548 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,638 ready_for_fw is high
1,362,638 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,696 >>> mbox cmd response: success
2,929,696 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,991,836 UART:
2,991,852 UART: Running Caliptra FMC ...
2,992,260 UART:
2,992,403 UART: [state] CFI Enabled
3,003,030 UART: [fht] FMC Alias Private Key: 7
3,110,925 UART: [art] Extend RT PCRs Done
3,111,353 UART: [art] Lock RT PCRs Done
3,112,745 UART: [art] Populate DV Done
3,121,004 UART: [fht] FMC Alias Private Key: 7
3,122,042 UART: [art] Derive CDI
3,122,322 UART: [art] Store in in slot 0x4
3,207,919 UART: [art] Derive Key Pair
3,208,279 UART: [art] Store priv key in slot 0x5
3,221,611 UART: [art] Derive Key Pair - Done
3,236,341 UART: [art] Signing Cert with AUTHO
3,236,821 UART: RITY.KEYID = 7
3,252,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,772 UART: [art] PUB.X = DEDF8A554DAFB10314380083CCA87B2A5FC9C38AFF8B64BF762C7FB8AA88F94F61BF4907E366C59E3D31D7C41ADAF203
3,259,533 UART: [art] PUB.Y = 5AC7C0FF97A9919162CFD42537B60290040029699B4F5E683F737A3EDA2FC42F9076D8511A067BD6D7A297B9C0C19F4A
3,266,454 UART: [art] SIG.R = DF05289813A617E710156B507A5888A37E2B0C22AFF28AB009BACD9666DB8FC42F36DC6F034E4230BB69A51B94DEDB67
3,273,222 UART: [art] SIG.S = 5D310EC455664A643A4E7D2F6D7B488D11BAB8BAE7EEA0F99BDA7301351D429B71C9819D8FC5E419589BCB02388D0CE0
3,297,161 UART: Caliptra RT
3,297,506 UART: [state] CFI Enabled
3,406,251 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,689 UART: [rt]cmd =0x46505652, len=4
3,437,360 UART: [rt] FIPS Version
3,438,511 >>> mbox cmd response data (36 bytes)
3,438,512 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,881 UART: [rt]cmd =0x46504c54, len=4
3,469,072 >>> mbox cmd response data (8 bytes)
3,469,073 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,498,942 UART: [rt]cmd =0x46504c67, len=4
3,499,779 >>> mbox cmd response: failed
3,500,137 UART: [rt] FIPS self test
3,500,468 UART: [kat] ++
3,500,620 UART: [kat] sha1
3,504,941 UART: [kat] SHA2-256
3,506,871 UART: [kat] SHA2-384
3,509,742 UART: [kat] SHA2-512-ACC
3,511,637 UART: [kat] ECC-384
3,521,130 UART: [kat] HMAC-384Kdf
3,525,843 UART: [kat] LMS
3,774,734 UART: [kat] --
4,462,257 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,891,791 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,899,539 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,928,819 UART: [rt]cmd =0x46504c67, len=4
5,929,809 >>> mbox cmd response data (8 bytes)
5,929,810 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,959,047 UART: [rt]cmd =0x49444543, len=4
5,965,534 >>> mbox cmd response data (37 bytes)
5,965,535 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,994,860 UART: [rt]cmd =0x49444549, len=4
5,997,322 >>> mbox cmd response data (104 bytes)
5,997,323 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,026,830 UART: [rt]cmd =0x49444550, len=4
6,037,132 >>> mbox cmd response data (8 bytes)
6,037,133 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,066,592 UART: [rt]cmd =0x4c444556, len=4
6,076,994 >>> mbox cmd response data (687 bytes)
6,076,995 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,106,392 UART: [rt]cmd =0x43455246, len=4
6,118,918 >>> mbox cmd response data (920 bytes)
6,118,919 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,148,106 UART: [rt]cmd =0x43455252, len=4
6,158,709 >>> mbox cmd response data (783 bytes)
6,158,710 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,189,395 UART: [rt]cmd =0x53494756, len=196
6,194,554 >>> mbox cmd response data (8 bytes)
6,194,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,224,428 UART: [rt]cmd =0x4d454153, len=108
6,245,838 >>> mbox cmd response data (12 bytes)
6,245,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,275,168 UART: [rt]cmd =0x494e464f, len=4
6,278,487 >>> mbox cmd response data (264 bytes)
6,278,488 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,307,821 UART: [rt]cmd =0x54514754, len=24
6,310,014 >>> mbox cmd response data (8 bytes)
6,310,015 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,339,292 UART: [rt]cmd =0x47544744, len=8
6,342,045 >>> mbox cmd response data (104 bytes)
6,342,046 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,371,417 UART: [rt]cmd =0x50435252, len=8
6,372,912 >>> mbox cmd response data (8 bytes)
6,372,913 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,402,640 UART: [rt]cmd =0x50435251, len=36
6,570,098 >>> mbox cmd response data (1848 bytes)
6,570,099 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,599,714 UART: [rt]cmd =0x50435245, len=56
6,603,267 >>> mbox cmd response data (8 bytes)
6,603,268 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,632,739 UART: [rt]cmd =0x44504543, len=20
6,653,663 >>> mbox cmd response data (44 bytes)
6,653,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,683,199 UART: [rt]cmd =0x44504543, len=24
6,709,440 >>> mbox cmd response data (40 bytes)
6,709,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,739,458 UART: [rt]cmd =0x44504543, len=96
6,776,335 >>> mbox cmd response data (56 bytes)
6,776,336 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,806,209 UART: [rt]cmd =0x44504543, len=92
7,035,038 >>> mbox cmd response data (6284 bytes)
7,035,039 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,065,308 UART: [rt]cmd =0x44504543, len=136
7,131,674 >>> mbox cmd response data (136 bytes)
7,131,675 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,161,252 UART: [rt]cmd =0x44504543, len=40
7,187,392 >>> mbox cmd response data (40 bytes)
7,187,393 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,217,164 UART: [rt]cmd =0x44504543, len=28
7,260,316 >>> mbox cmd response data (2076 bytes)
7,260,317 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,289,770 UART: [rt]cmd =0x44504543, len=36
7,319,678 >>> mbox cmd response data (24 bytes)
7,319,679 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,349,380 UART: [rt]cmd =0x4453424c, len=4
7,363,378 >>> mbox cmd response data (8 bytes)
7,363,379 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,392,700 UART: [rt]cmd =0x46505344, len=4
7,500,760 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
893,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,473 UART: [kat] ++
897,625 UART: [kat] sha1
901,765 UART: [kat] SHA2-256
903,705 UART: [kat] SHA2-384
906,320 UART: [kat] SHA2-512-ACC
908,221 UART: [kat] ECC-384
917,902 UART: [kat] HMAC-384Kdf
922,468 UART: [kat] LMS
1,170,796 UART: [kat] --
1,171,563 UART: [cold-reset] ++
1,171,897 UART: [fht] FHT @ 0x50003400
1,174,670 UART: [idev] ++
1,174,838 UART: [idev] CDI.KEYID = 6
1,175,198 UART: [idev] SUBJECT.KEYID = 7
1,175,622 UART: [idev] UDS.KEYID = 0
1,175,967 ready_for_fw is high
1,175,967 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,183,262 UART: [idev] Erasing UDS.KEYID = 0
1,199,383 UART: [idev] Sha1 KeyId Algorithm
1,207,823 UART: [idev] --
1,208,825 UART: [ldev] ++
1,208,993 UART: [ldev] CDI.KEYID = 6
1,209,356 UART: [ldev] SUBJECT.KEYID = 5
1,209,782 UART: [ldev] AUTHORITY.KEYID = 7
1,210,245 UART: [ldev] FE.KEYID = 1
1,215,899 UART: [ldev] Erasing FE.KEYID = 1
1,242,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,282,184 UART: [fwproc] Wait for Commands...
1,282,988 UART: [fwproc] Recv command 0x46574c44
1,283,716 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,472 >>> mbox cmd response: success
2,776,472 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,777,640 UART: [afmc] ++
2,777,808 UART: [afmc] CDI.KEYID = 6
2,778,170 UART: [afmc] SUBJECT.KEYID = 7
2,778,595 UART: [afmc] AUTHORITY.KEYID = 5
2,813,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,549 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,277 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,881 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,651 UART: [afmc] --
2,856,693 UART: [cold-reset] --
2,857,423 UART: [state] Locking Datavault
2,858,608 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,212 UART: [state] Locking ICCM
2,859,664 UART: [exit] Launching FMC @ 0x40000130
2,864,993 UART:
2,865,009 UART: Running Caliptra FMC ...
2,865,417 UART:
2,865,471 UART: [state] CFI Enabled
2,875,838 UART: [fht] FMC Alias Private Key: 7
2,983,669 UART: [art] Extend RT PCRs Done
2,984,097 UART: [art] Lock RT PCRs Done
2,985,547 UART: [art] Populate DV Done
2,993,698 UART: [fht] FMC Alias Private Key: 7
2,994,736 UART: [art] Derive CDI
2,995,016 UART: [art] Store in in slot 0x4
3,080,615 UART: [art] Derive Key Pair
3,080,975 UART: [art] Store priv key in slot 0x5
3,094,343 UART: [art] Derive Key Pair - Done
3,109,235 UART: [art] Signing Cert with AUTHO
3,109,715 UART: RITY.KEYID = 7
3,125,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,956 UART: [art] PUB.X = 596A44507D3F3B6B9C091A236B75F5138202237D04334B75DD4FA33A9C3650E6F502AB6D838C82B998C340FD7BBC8D7E
3,132,716 UART: [art] PUB.Y = CFD2F8EB44330A8D33EEA8341E2C3E66F0C2393E3A1F1BAF45B0E592FCD969B8BB64B48F3B33C2717C0FDD515777AA96
3,139,678 UART: [art] SIG.R = 734ADB89DA4F71D49BBC26763175C1E16CA2F258658423F5A6D9EE429F0A7D3B4F716251485EA9EC8B61A1CF8D1604CE
3,146,452 UART: [art] SIG.S = FE050E7DBCD7713BB81A94E8189EDDBA855898646F63C558B45CA60F8EB39BE9BFA8A0CCD3A78BDC93F23EAA5BCA071B
3,169,863 UART: Caliptra RT
3,170,116 UART: [state] CFI Enabled
3,278,463 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,203 UART: [rt]cmd =0x46505652, len=4
3,309,874 UART: [rt] FIPS Version
3,311,067 >>> mbox cmd response data (36 bytes)
3,311,068 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,415 UART: [rt]cmd =0x46504c54, len=4
3,341,630 >>> mbox cmd response data (8 bytes)
3,341,631 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,371,186 UART: [rt]cmd =0x46504c67, len=4
3,372,085 >>> mbox cmd response: failed
3,372,233 UART: [rt] FIPS self test
3,372,564 UART: [kat] ++
3,372,716 UART: [kat] sha1
3,376,877 UART: [kat] SHA2-256
3,378,807 UART: [kat] SHA2-384
3,381,584 UART: [kat] SHA2-512-ACC
3,383,479 UART: [kat] ECC-384
3,392,956 UART: [kat] HMAC-384Kdf
3,397,575 UART: [kat] LMS
3,646,466 UART: [kat] --
4,450,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,880,946 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,891,833 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,921,225 UART: [rt]cmd =0x46504c67, len=4
5,922,365 >>> mbox cmd response data (8 bytes)
5,922,366 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,951,553 UART: [rt]cmd =0x49444543, len=4
5,958,244 >>> mbox cmd response data (37 bytes)
5,958,245 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,987,300 UART: [rt]cmd =0x49444549, len=4
5,989,592 >>> mbox cmd response data (104 bytes)
5,989,593 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,018,930 UART: [rt]cmd =0x49444550, len=4
6,028,927 >>> mbox cmd response data (8 bytes)
6,028,928 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,058,371 UART: [rt]cmd =0x4c444556, len=4
6,068,987 >>> mbox cmd response data (687 bytes)
6,068,988 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,098,289 UART: [rt]cmd =0x43455246, len=4
6,110,271 >>> mbox cmd response data (887 bytes)
6,110,272 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,139,577 UART: [rt]cmd =0x43455252, len=4
6,150,346 >>> mbox cmd response data (783 bytes)
6,150,347 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,180,918 UART: [rt]cmd =0x53494756, len=196
6,186,365 >>> mbox cmd response data (8 bytes)
6,186,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,216,203 UART: [rt]cmd =0x4d454153, len=108
6,237,073 >>> mbox cmd response data (12 bytes)
6,237,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,266,575 UART: [rt]cmd =0x494e464f, len=4
6,269,766 >>> mbox cmd response data (264 bytes)
6,269,767 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,299,370 UART: [rt]cmd =0x54514754, len=24
6,301,385 >>> mbox cmd response data (8 bytes)
6,301,386 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,330,915 UART: [rt]cmd =0x47544744, len=8
6,333,368 >>> mbox cmd response data (104 bytes)
6,333,369 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,362,644 UART: [rt]cmd =0x50435252, len=8
6,364,151 >>> mbox cmd response data (8 bytes)
6,364,152 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,393,779 UART: [rt]cmd =0x50435251, len=36
6,561,127 >>> mbox cmd response data (1848 bytes)
6,561,128 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,590,803 UART: [rt]cmd =0x50435245, len=56
6,594,430 >>> mbox cmd response data (8 bytes)
6,594,431 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,623,818 UART: [rt]cmd =0x44504543, len=20
6,644,772 >>> mbox cmd response data (44 bytes)
6,644,773 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,674,204 UART: [rt]cmd =0x44504543, len=24
6,700,051 >>> mbox cmd response data (40 bytes)
6,700,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,729,927 UART: [rt]cmd =0x44504543, len=96
6,766,822 >>> mbox cmd response data (56 bytes)
6,766,823 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,796,692 UART: [rt]cmd =0x44504543, len=92
7,025,182 >>> mbox cmd response data (6284 bytes)
7,025,183 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,055,482 UART: [rt]cmd =0x44504543, len=136
7,122,282 >>> mbox cmd response data (136 bytes)
7,122,283 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,151,768 UART: [rt]cmd =0x44504543, len=40
7,177,916 >>> mbox cmd response data (40 bytes)
7,177,917 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,207,446 UART: [rt]cmd =0x44504543, len=28
7,250,656 >>> mbox cmd response data (2076 bytes)
7,250,657 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,280,204 UART: [rt]cmd =0x44504543, len=36
7,310,150 >>> mbox cmd response data (24 bytes)
7,310,151 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,339,386 UART: [rt]cmd =0x4453424c, len=4
7,353,270 >>> mbox cmd response data (8 bytes)
7,353,271 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,382,698 UART: [rt]cmd =0x46505344, len=4
7,491,256 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,543 ready_for_fw is high
1,060,543 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,627,379 >>> mbox cmd response: success
2,627,379 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,575 UART:
2,689,591 UART: Running Caliptra FMC ...
2,689,999 UART:
2,690,053 UART: [state] CFI Enabled
2,700,058 UART: [fht] FMC Alias Private Key: 7
2,808,273 UART: [art] Extend RT PCRs Done
2,808,701 UART: [art] Lock RT PCRs Done
2,810,289 UART: [art] Populate DV Done
2,818,504 UART: [fht] FMC Alias Private Key: 7
2,819,646 UART: [art] Derive CDI
2,819,926 UART: [art] Store in in slot 0x4
2,905,503 UART: [art] Derive Key Pair
2,905,863 UART: [art] Store priv key in slot 0x5
2,919,083 UART: [art] Derive Key Pair - Done
2,933,793 UART: [art] Signing Cert with AUTHO
2,934,273 UART: RITY.KEYID = 7
2,949,455 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,220 UART: [art] PUB.X = 9826B941FFFF9F27968CE7B86C3F0025BB1EBCF8780BB6684DFB2FCDB046EA2D98809A840342571ED33DB7ACA85182E3
2,956,976 UART: [art] PUB.Y = 4FB8484175BF18296015924EE64B7901F2D10AE7D67AEB293E41F815AE8688A30B987BE28C11B693F5CA784B74D04278
2,963,915 UART: [art] SIG.R = 245AD97ABC1C63B21EB38A6150F7EC64509A232C4DED5DC321CCA99056002F86F7547337EC47249D6B5E1630DE576751
2,970,665 UART: [art] SIG.S = 1B3FEE7DCBDD6A513C3FC9924DA6DD3009CBE0297B0DABCA56A616029C193470F4C08517E196AED61E5360E5A2379A0D
2,993,900 UART: Caliptra RT
2,994,153 UART: [state] CFI Enabled
3,103,162 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,624 UART: [rt]cmd =0x46505652, len=4
3,134,295 UART: [rt] FIPS Version
3,135,302 >>> mbox cmd response data (36 bytes)
3,135,303 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,766 UART: [rt]cmd =0x46504c54, len=4
3,165,911 >>> mbox cmd response data (8 bytes)
3,165,912 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,195,429 UART: [rt]cmd =0x46504c67, len=4
3,196,380 >>> mbox cmd response: failed
3,196,510 UART: [rt] FIPS self test
3,196,841 UART: [kat] ++
3,196,993 UART: [kat] sha1
3,201,202 UART: [kat] SHA2-256
3,203,132 UART: [kat] SHA2-384
3,205,687 UART: [kat] SHA2-512-ACC
3,207,582 UART: [kat] ECC-384
3,217,151 UART: [kat] HMAC-384Kdf
3,221,648 UART: [kat] LMS
3,470,539 UART: [kat] --
4,169,714 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,599,521 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,606,139 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,635,493 UART: [rt]cmd =0x46504c67, len=4
5,636,591 >>> mbox cmd response data (8 bytes)
5,636,592 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,665,759 UART: [rt]cmd =0x49444543, len=4
5,672,284 >>> mbox cmd response data (37 bytes)
5,672,285 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,701,450 UART: [rt]cmd =0x49444549, len=4
5,703,806 >>> mbox cmd response data (104 bytes)
5,703,807 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,733,266 UART: [rt]cmd =0x49444550, len=4
5,743,317 >>> mbox cmd response data (8 bytes)
5,743,318 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,772,495 UART: [rt]cmd =0x4c444556, len=4
5,782,767 >>> mbox cmd response data (687 bytes)
5,782,768 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,812,309 UART: [rt]cmd =0x43455246, len=4
5,824,437 >>> mbox cmd response data (887 bytes)
5,824,438 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,853,829 UART: [rt]cmd =0x43455252, len=4
5,864,574 >>> mbox cmd response data (782 bytes)
5,864,575 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,895,184 UART: [rt]cmd =0x53494756, len=196
5,900,651 >>> mbox cmd response data (8 bytes)
5,900,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,930,539 UART: [rt]cmd =0x4d454153, len=108
5,950,769 >>> mbox cmd response data (12 bytes)
5,950,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,980,147 UART: [rt]cmd =0x494e464f, len=4
5,983,526 >>> mbox cmd response data (264 bytes)
5,983,527 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,126 UART: [rt]cmd =0x54514754, len=24
6,015,235 >>> mbox cmd response data (8 bytes)
6,015,236 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,044,617 UART: [rt]cmd =0x47544744, len=8
6,047,138 >>> mbox cmd response data (104 bytes)
6,047,139 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,076,456 UART: [rt]cmd =0x50435252, len=8
6,077,859 >>> mbox cmd response data (8 bytes)
6,077,860 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,107,623 UART: [rt]cmd =0x50435251, len=36
6,274,859 >>> mbox cmd response data (1848 bytes)
6,274,860 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,304,607 UART: [rt]cmd =0x50435245, len=56
6,308,168 >>> mbox cmd response data (8 bytes)
6,308,169 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,337,664 UART: [rt]cmd =0x44504543, len=20
6,358,168 >>> mbox cmd response data (44 bytes)
6,358,169 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,387,566 UART: [rt]cmd =0x44504543, len=24
6,413,367 >>> mbox cmd response data (40 bytes)
6,413,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,443,403 UART: [rt]cmd =0x44504543, len=96
6,480,802 >>> mbox cmd response data (56 bytes)
6,480,803 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,510,790 UART: [rt]cmd =0x44504543, len=92
6,739,638 >>> mbox cmd response data (6284 bytes)
6,739,639 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,770,140 UART: [rt]cmd =0x44504543, len=136
6,835,832 >>> mbox cmd response data (136 bytes)
6,835,833 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,865,610 UART: [rt]cmd =0x44504543, len=40
6,891,824 >>> mbox cmd response data (40 bytes)
6,891,825 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,921,258 UART: [rt]cmd =0x44504543, len=28
6,964,350 >>> mbox cmd response data (2076 bytes)
6,964,351 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,993,752 UART: [rt]cmd =0x44504543, len=36
7,023,528 >>> mbox cmd response data (24 bytes)
7,023,529 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,052,910 UART: [rt]cmd =0x4453424c, len=4
7,066,548 >>> mbox cmd response data (8 bytes)
7,066,549 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,096,082 UART: [rt]cmd =0x46505344, len=4
7,204,558 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,216 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
893,185 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,310 UART: [kat] ++
897,462 UART: [kat] sha1
901,692 UART: [kat] SHA2-256
903,632 UART: [kat] SHA2-384
906,541 UART: [kat] SHA2-512-ACC
908,442 UART: [kat] ECC-384
918,329 UART: [kat] HMAC-384Kdf
923,017 UART: [kat] LMS
1,171,345 UART: [kat] --
1,172,250 UART: [cold-reset] ++
1,172,712 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 ready_for_fw is high
1,176,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,545 UART: [idev] Erasing UDS.KEYID = 0
1,201,428 UART: [idev] Sha1 KeyId Algorithm
1,209,686 UART: [idev] --
1,210,818 UART: [ldev] ++
1,210,986 UART: [ldev] CDI.KEYID = 6
1,211,349 UART: [ldev] SUBJECT.KEYID = 5
1,211,775 UART: [ldev] AUTHORITY.KEYID = 7
1,212,238 UART: [ldev] FE.KEYID = 1
1,217,668 UART: [ldev] Erasing FE.KEYID = 1
1,244,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,540 UART: [ldev] --
1,283,945 UART: [fwproc] Wait for Commands...
1,284,689 UART: [fwproc] Recv command 0x46574c44
1,285,417 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,409 >>> mbox cmd response: success
2,777,409 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,778,487 UART: [afmc] ++
2,778,655 UART: [afmc] CDI.KEYID = 6
2,779,017 UART: [afmc] SUBJECT.KEYID = 7
2,779,442 UART: [afmc] AUTHORITY.KEYID = 5
2,815,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,310 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,923 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,642 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,518 UART: [afmc] --
2,858,428 UART: [cold-reset] --
2,859,432 UART: [state] Locking Datavault
2,860,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,125 UART: [state] Locking ICCM
2,861,651 UART: [exit] Launching FMC @ 0x40000130
2,866,980 UART:
2,866,996 UART: Running Caliptra FMC ...
2,867,404 UART:
2,867,547 UART: [state] CFI Enabled
2,877,796 UART: [fht] FMC Alias Private Key: 7
2,985,487 UART: [art] Extend RT PCRs Done
2,985,915 UART: [art] Lock RT PCRs Done
2,987,409 UART: [art] Populate DV Done
2,995,424 UART: [fht] FMC Alias Private Key: 7
2,996,594 UART: [art] Derive CDI
2,996,874 UART: [art] Store in in slot 0x4
3,082,441 UART: [art] Derive Key Pair
3,082,801 UART: [art] Store priv key in slot 0x5
3,095,953 UART: [art] Derive Key Pair - Done
3,110,489 UART: [art] Signing Cert with AUTHO
3,110,969 UART: RITY.KEYID = 7
3,125,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,754 UART: [art] PUB.X = B34FC92786BA7AB05D84F9F80115E6A77FEF24761B768A46E2D77C67F33703F8E61BCC5A945D6A182DAF52BD2AD05F30
3,133,530 UART: [art] PUB.Y = 8262E9A99EF974F8FDB15889D5E4F8C140F96A2532B46053564E9D4A1D3DA12975875E7C3B9FAFE1A773505AA5A96776
3,140,482 UART: [art] SIG.R = E1B1115FF9716732A7D12976FC2348377AE58E39F05F8AD906E31EC1388CB17AD8F5AE3AFCB7D6E975C589B6E616717E
3,147,257 UART: [art] SIG.S = C560B38C36A03C11790FFC3DF3C00D76B70C09ED5790642300694772086FBEE619C5E914CFD54DB025300293500B7CFD
3,171,151 UART: Caliptra RT
3,171,496 UART: [state] CFI Enabled
3,279,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,872 UART: [rt]cmd =0x46505652, len=4
3,310,543 UART: [rt] FIPS Version
3,311,552 >>> mbox cmd response data (36 bytes)
3,311,553 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,076 UART: [rt]cmd =0x46504c54, len=4
3,342,291 >>> mbox cmd response data (8 bytes)
3,342,292 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,371,903 UART: [rt]cmd =0x46504c67, len=4
3,372,768 >>> mbox cmd response: failed
3,373,080 UART: [rt] FIPS self test
3,373,411 UART: [kat] ++
3,373,563 UART: [kat] sha1
3,377,830 UART: [kat] SHA2-256
3,379,760 UART: [kat] SHA2-384
3,382,433 UART: [kat] SHA2-512-ACC
3,384,328 UART: [kat] ECC-384
3,394,249 UART: [kat] HMAC-384Kdf
3,398,666 UART: [kat] LMS
3,647,557 UART: [kat] --
4,451,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,881,971 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,892,516 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,921,804 UART: [rt]cmd =0x46504c67, len=4
5,922,904 >>> mbox cmd response data (8 bytes)
5,922,905 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,952,116 UART: [rt]cmd =0x49444543, len=4
5,958,505 >>> mbox cmd response data (37 bytes)
5,958,506 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,988,073 UART: [rt]cmd =0x49444549, len=4
5,990,561 >>> mbox cmd response data (104 bytes)
5,990,562 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,019,879 UART: [rt]cmd =0x49444550, len=4
6,030,019 >>> mbox cmd response data (8 bytes)
6,030,020 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,059,451 UART: [rt]cmd =0x4c444556, len=4
6,070,079 >>> mbox cmd response data (687 bytes)
6,070,080 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,099,373 UART: [rt]cmd =0x43455246, len=4
6,111,593 >>> mbox cmd response data (887 bytes)
6,111,594 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,140,815 UART: [rt]cmd =0x43455252, len=4
6,151,737 >>> mbox cmd response data (784 bytes)
6,151,738 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,182,185 UART: [rt]cmd =0x53494756, len=196
6,187,458 >>> mbox cmd response data (8 bytes)
6,187,459 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,217,400 UART: [rt]cmd =0x4d454153, len=108
6,237,736 >>> mbox cmd response data (12 bytes)
6,237,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,267,320 UART: [rt]cmd =0x494e464f, len=4
6,270,605 >>> mbox cmd response data (264 bytes)
6,270,606 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,300,343 UART: [rt]cmd =0x54514754, len=24
6,302,438 >>> mbox cmd response data (8 bytes)
6,302,439 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,331,846 UART: [rt]cmd =0x47544744, len=8
6,334,599 >>> mbox cmd response data (104 bytes)
6,334,600 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,363,795 UART: [rt]cmd =0x50435252, len=8
6,365,306 >>> mbox cmd response data (8 bytes)
6,365,307 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,395,024 UART: [rt]cmd =0x50435251, len=36
6,562,432 >>> mbox cmd response data (1848 bytes)
6,562,433 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,591,982 UART: [rt]cmd =0x50435245, len=56
6,595,407 >>> mbox cmd response data (8 bytes)
6,595,408 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,624,925 UART: [rt]cmd =0x44504543, len=20
6,645,705 >>> mbox cmd response data (44 bytes)
6,645,706 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,675,377 UART: [rt]cmd =0x44504543, len=24
6,701,986 >>> mbox cmd response data (40 bytes)
6,701,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,731,992 UART: [rt]cmd =0x44504543, len=96
6,768,579 >>> mbox cmd response data (56 bytes)
6,768,580 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,798,401 UART: [rt]cmd =0x44504543, len=92
7,026,131 >>> mbox cmd response data (6284 bytes)
7,026,132 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,056,319 UART: [rt]cmd =0x44504543, len=136
7,123,503 >>> mbox cmd response data (136 bytes)
7,123,504 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,153,011 UART: [rt]cmd =0x44504543, len=40
7,179,199 >>> mbox cmd response data (40 bytes)
7,179,200 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,208,725 UART: [rt]cmd =0x44504543, len=28
7,252,215 >>> mbox cmd response data (2076 bytes)
7,252,216 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,281,955 UART: [rt]cmd =0x44504543, len=36
7,311,661 >>> mbox cmd response data (24 bytes)
7,311,662 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,341,203 UART: [rt]cmd =0x4453424c, len=4
7,355,715 >>> mbox cmd response data (8 bytes)
7,355,716 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,385,055 UART: [rt]cmd =0x46505344, len=4
7,493,273 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,556 ready_for_fw is high
1,060,556 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,178 >>> mbox cmd response: success
2,628,178 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,328 UART:
2,689,344 UART: Running Caliptra FMC ...
2,689,752 UART:
2,689,895 UART: [state] CFI Enabled
2,700,894 UART: [fht] FMC Alias Private Key: 7
2,809,005 UART: [art] Extend RT PCRs Done
2,809,433 UART: [art] Lock RT PCRs Done
2,810,573 UART: [art] Populate DV Done
2,818,646 UART: [fht] FMC Alias Private Key: 7
2,819,740 UART: [art] Derive CDI
2,820,020 UART: [art] Store in in slot 0x4
2,905,895 UART: [art] Derive Key Pair
2,906,255 UART: [art] Store priv key in slot 0x5
2,919,323 UART: [art] Derive Key Pair - Done
2,933,836 UART: [art] Signing Cert with AUTHO
2,934,316 UART: RITY.KEYID = 7
2,949,600 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,365 UART: [art] PUB.X = 721C15A79AF9FF3EE553B6230D593B5B4CFA0738605BB7EE841BC9D5CE657C377C910CD02D96069E78386BAEABF8E673
2,957,135 UART: [art] PUB.Y = 0D7015612CD9446530F6D2F7312C1FD67E4C482298040A9ED2680B756440E19E4E49217065A9781943510318AE046DA5
2,964,051 UART: [art] SIG.R = 948EEF6DE1A4F0759DD8DF30B4CCB4C759DDB98EB5A7922006EA2447C48BC837E42672FDA18F52EA9804D8639CCB8916
2,970,829 UART: [art] SIG.S = 26C7A88CD62D26D50AE2CB609788BB97BF07CB24EE3DA630DF99338DEF50FCDC0A24FC2164B0DA9F84F7F0DC9D3E9CC7
2,995,053 UART: Caliptra RT
2,995,398 UART: [state] CFI Enabled
3,102,803 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,099 UART: [rt]cmd =0x46505652, len=4
3,133,770 UART: [rt] FIPS Version
3,134,761 >>> mbox cmd response data (36 bytes)
3,134,762 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,165 UART: [rt]cmd =0x46504c54, len=4
3,165,434 >>> mbox cmd response data (8 bytes)
3,165,435 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,194,818 UART: [rt]cmd =0x46504c67, len=4
3,195,899 >>> mbox cmd response: failed
3,196,111 UART: [rt] FIPS self test
3,196,442 UART: [kat] ++
3,196,594 UART: [kat] sha1
3,200,781 UART: [kat] SHA2-256
3,202,711 UART: [kat] SHA2-384
3,205,310 UART: [kat] SHA2-512-ACC
3,207,205 UART: [kat] ECC-384
3,217,078 UART: [kat] HMAC-384Kdf
3,221,527 UART: [kat] LMS
3,470,418 UART: [kat] --
4,169,531 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,599,880 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,605,658 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,635,024 UART: [rt]cmd =0x46504c67, len=4
5,636,190 >>> mbox cmd response data (8 bytes)
5,636,191 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,665,350 UART: [rt]cmd =0x49444543, len=4
5,671,553 >>> mbox cmd response data (37 bytes)
5,671,554 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,701,101 UART: [rt]cmd =0x49444549, len=4
5,703,423 >>> mbox cmd response data (104 bytes)
5,703,424 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,657 UART: [rt]cmd =0x49444550, len=4
5,742,842 >>> mbox cmd response data (8 bytes)
5,742,843 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,772,220 UART: [rt]cmd =0x4c444556, len=4
5,782,512 >>> mbox cmd response data (687 bytes)
5,782,513 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,811,626 UART: [rt]cmd =0x43455246, len=4
5,823,632 >>> mbox cmd response data (887 bytes)
5,823,633 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,852,964 UART: [rt]cmd =0x43455252, len=4
5,863,849 >>> mbox cmd response data (783 bytes)
5,863,850 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,894,713 UART: [rt]cmd =0x53494756, len=196
5,900,224 >>> mbox cmd response data (8 bytes)
5,900,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,930,344 UART: [rt]cmd =0x4d454153, len=108
5,951,358 >>> mbox cmd response data (12 bytes)
5,951,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,980,636 UART: [rt]cmd =0x494e464f, len=4
5,984,067 >>> mbox cmd response data (264 bytes)
5,984,068 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,595 UART: [rt]cmd =0x54514754, len=24
6,016,054 >>> mbox cmd response data (8 bytes)
6,016,055 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,045,462 UART: [rt]cmd =0x47544744, len=8
6,048,091 >>> mbox cmd response data (104 bytes)
6,048,092 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,077,217 UART: [rt]cmd =0x50435252, len=8
6,079,058 >>> mbox cmd response data (8 bytes)
6,079,059 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,108,708 UART: [rt]cmd =0x50435251, len=36
6,275,960 >>> mbox cmd response data (1848 bytes)
6,275,961 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,305,504 UART: [rt]cmd =0x50435245, len=56
6,309,179 >>> mbox cmd response data (8 bytes)
6,309,180 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,338,791 UART: [rt]cmd =0x44504543, len=20
6,359,467 >>> mbox cmd response data (44 bytes)
6,359,468 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,389,021 UART: [rt]cmd =0x44504543, len=24
6,415,636 >>> mbox cmd response data (40 bytes)
6,415,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,445,500 UART: [rt]cmd =0x44504543, len=96
6,482,747 >>> mbox cmd response data (56 bytes)
6,482,748 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,512,957 UART: [rt]cmd =0x44504543, len=92
6,740,786 >>> mbox cmd response data (6284 bytes)
6,740,787 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,770,918 UART: [rt]cmd =0x44504543, len=136
6,837,944 >>> mbox cmd response data (136 bytes)
6,837,945 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,867,448 UART: [rt]cmd =0x44504543, len=40
6,893,530 >>> mbox cmd response data (40 bytes)
6,893,531 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,923,260 UART: [rt]cmd =0x44504543, len=28
6,966,446 >>> mbox cmd response data (2076 bytes)
6,966,447 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,996,242 UART: [rt]cmd =0x44504543, len=36
7,026,254 >>> mbox cmd response data (24 bytes)
7,026,255 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,055,536 UART: [rt]cmd =0x4453424c, len=4
7,069,346 >>> mbox cmd response data (8 bytes)
7,069,347 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,098,844 UART: [rt]cmd =0x46505344, len=4
7,207,290 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,449 UART: [kat] SHA2-256
901,389 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
915,834 UART: [kat] HMAC-384Kdf
920,246 UART: [kat] LMS
1,168,558 UART: [kat] --
1,169,551 UART: [cold-reset] ++
1,170,021 UART: [fht] FHT @ 0x50003400
1,172,717 UART: [idev] ++
1,172,885 UART: [idev] CDI.KEYID = 6
1,173,246 UART: [idev] SUBJECT.KEYID = 7
1,173,671 UART: [idev] UDS.KEYID = 0
1,174,017 ready_for_fw is high
1,174,017 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,181,735 UART: [idev] Erasing UDS.KEYID = 0
1,199,067 UART: [idev] Sha1 KeyId Algorithm
1,207,817 UART: [idev] --
1,208,982 UART: [ldev] ++
1,209,150 UART: [ldev] CDI.KEYID = 6
1,209,514 UART: [ldev] SUBJECT.KEYID = 5
1,209,941 UART: [ldev] AUTHORITY.KEYID = 7
1,210,404 UART: [ldev] FE.KEYID = 1
1,215,786 UART: [ldev] Erasing FE.KEYID = 1
1,241,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,118 UART: [ldev] --
1,281,476 UART: [fwproc] Wait for Commands...
1,282,227 UART: [fwproc] Recv command 0x46574c44
1,282,960 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,592 >>> mbox cmd response: success
2,774,592 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,675 UART: [afmc] ++
2,775,843 UART: [afmc] CDI.KEYID = 6
2,776,206 UART: [afmc] SUBJECT.KEYID = 7
2,776,632 UART: [afmc] AUTHORITY.KEYID = 5
2,812,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,855 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,738 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,457 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,330 UART: [afmc] --
2,855,376 UART: [cold-reset] --
2,856,192 UART: [state] Locking Datavault
2,857,361 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,965 UART: [state] Locking ICCM
2,858,563 UART: [exit] Launching FMC @ 0x40000130
2,863,892 UART:
2,863,908 UART: Running Caliptra FMC ...
2,864,316 UART:
2,864,370 UART: [state] CFI Enabled
2,875,063 UART: [fht] FMC Alias Private Key: 7
2,982,978 UART: [art] Extend RT PCRs Done
2,983,406 UART: [art] Lock RT PCRs Done
2,984,846 UART: [art] Populate DV Done
2,993,101 UART: [fht] FMC Alias Private Key: 7
2,994,199 UART: [art] Derive CDI
2,994,479 UART: [art] Store in in slot 0x4
3,080,300 UART: [art] Derive Key Pair
3,080,660 UART: [art] Store priv key in slot 0x5
3,093,672 UART: [art] Derive Key Pair - Done
3,108,300 UART: [art] Signing Cert with AUTHO
3,108,780 UART: RITY.KEYID = 7
3,123,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,701 UART: [art] PUB.X = 6CE61817F7D6EBFC59C2C437D17DC9D469F9B432440E49B070CE7218848BDE3D71E4ED6165DBB1052638BF7F61B1AA26
3,131,475 UART: [art] PUB.Y = EB57C7B12C39BAAB08433DE5966F0DB8DFBD2C3F7657C37A39531B07A3F9913748BBB255050F268BF831E7178849BC49
3,138,416 UART: [art] SIG.R = 06D82F4F5CD643E75139AEA040E8DAE98B1FEDA49931C0CF4AA18358657144888BD12DB437AE2AC270C4192CE8C6E29F
3,145,195 UART: [art] SIG.S = EE3766A717EE0299880B9281957006A28A69652800241AFC4A195E5D752A55C5D3BC41FECBBE99F480E2F7367FFF470D
3,169,336 UART: Caliptra RT
3,169,589 UART: [state] CFI Enabled
3,278,098 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,506 UART: [rt]cmd =0x46505652, len=4
3,309,177 UART: [rt] FIPS Version
3,310,136 >>> mbox cmd response data (36 bytes)
3,310,137 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,340 UART: [rt]cmd =0x46504c54, len=4
3,340,401 >>> mbox cmd response data (8 bytes)
3,340,402 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,370,161 UART: [rt]cmd =0x46504c67, len=4
3,371,232 >>> mbox cmd response: failed
3,371,508 UART: [rt] FIPS self test
3,371,839 UART: [kat] ++
3,371,991 UART: [kat] sha1
3,376,032 UART: [kat] SHA2-256
3,377,962 UART: [kat] SHA2-384
3,380,699 UART: [kat] SHA2-512-ACC
3,382,594 UART: [kat] ECC-384
3,391,639 UART: [kat] HMAC-384Kdf
3,396,272 UART: [kat] LMS
3,645,163 UART: [kat] --
4,447,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,877,263 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,981 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,910,175 UART: [rt]cmd =0x46504c67, len=4
5,911,285 >>> mbox cmd response data (8 bytes)
5,911,286 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,501 UART: [rt]cmd =0x49444543, len=4
5,947,094 >>> mbox cmd response data (37 bytes)
5,947,095 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,456 UART: [rt]cmd =0x49444549, len=4
5,978,852 >>> mbox cmd response data (104 bytes)
5,978,853 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,030 UART: [rt]cmd =0x49444550, len=4
6,018,193 >>> mbox cmd response data (8 bytes)
6,018,194 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,047,679 UART: [rt]cmd =0x4c444556, len=4
6,058,269 >>> mbox cmd response data (687 bytes)
6,058,270 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,087,813 UART: [rt]cmd =0x43455246, len=4
6,099,971 >>> mbox cmd response data (887 bytes)
6,099,972 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,129,107 UART: [rt]cmd =0x43455252, len=4
6,139,854 >>> mbox cmd response data (783 bytes)
6,139,855 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,170,404 UART: [rt]cmd =0x53494756, len=196
6,175,775 >>> mbox cmd response data (8 bytes)
6,175,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,205,765 UART: [rt]cmd =0x4d454153, len=108
6,225,539 >>> mbox cmd response data (12 bytes)
6,225,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,254,981 UART: [rt]cmd =0x494e464f, len=4
6,258,360 >>> mbox cmd response data (264 bytes)
6,258,361 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,287,942 UART: [rt]cmd =0x54514754, len=24
6,290,003 >>> mbox cmd response data (8 bytes)
6,290,004 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,319,161 UART: [rt]cmd =0x47544744, len=8
6,321,966 >>> mbox cmd response data (104 bytes)
6,321,967 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,351,594 UART: [rt]cmd =0x50435252, len=8
6,353,355 >>> mbox cmd response data (8 bytes)
6,353,356 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,383,097 UART: [rt]cmd =0x50435251, len=36
6,550,583 >>> mbox cmd response data (1848 bytes)
6,550,584 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,580,517 UART: [rt]cmd =0x50435245, len=56
6,584,082 >>> mbox cmd response data (8 bytes)
6,584,083 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,613,586 UART: [rt]cmd =0x44504543, len=20
6,634,542 >>> mbox cmd response data (44 bytes)
6,634,543 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,664,118 UART: [rt]cmd =0x44504543, len=24
6,690,319 >>> mbox cmd response data (40 bytes)
6,690,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,720,363 UART: [rt]cmd =0x44504543, len=96
6,756,954 >>> mbox cmd response data (56 bytes)
6,756,955 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,786,932 UART: [rt]cmd =0x44504543, len=92
7,013,904 >>> mbox cmd response data (6284 bytes)
7,013,905 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,044,174 UART: [rt]cmd =0x44504543, len=136
7,110,524 >>> mbox cmd response data (136 bytes)
7,110,525 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,140,264 UART: [rt]cmd =0x44504543, len=40
7,166,614 >>> mbox cmd response data (40 bytes)
7,166,615 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,196,090 UART: [rt]cmd =0x44504543, len=28
7,239,504 >>> mbox cmd response data (2076 bytes)
7,239,505 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,269,102 UART: [rt]cmd =0x44504543, len=36
7,299,030 >>> mbox cmd response data (24 bytes)
7,299,031 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,328,306 UART: [rt]cmd =0x4453424c, len=4
7,341,668 >>> mbox cmd response data (8 bytes)
7,341,669 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,371,070 UART: [rt]cmd =0x46505344, len=4
7,479,244 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,946 ready_for_fw is high
1,055,946 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,623,454 >>> mbox cmd response: success
2,623,454 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,360 UART:
2,685,376 UART: Running Caliptra FMC ...
2,685,784 UART:
2,685,838 UART: [state] CFI Enabled
2,696,495 UART: [fht] FMC Alias Private Key: 7
2,804,804 UART: [art] Extend RT PCRs Done
2,805,232 UART: [art] Lock RT PCRs Done
2,806,610 UART: [art] Populate DV Done
2,815,001 UART: [fht] FMC Alias Private Key: 7
2,815,991 UART: [art] Derive CDI
2,816,271 UART: [art] Store in in slot 0x4
2,901,814 UART: [art] Derive Key Pair
2,902,174 UART: [art] Store priv key in slot 0x5
2,914,834 UART: [art] Derive Key Pair - Done
2,929,682 UART: [art] Signing Cert with AUTHO
2,930,162 UART: RITY.KEYID = 7
2,945,488 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,253 UART: [art] PUB.X = AF9D5AA2660778E574AFA9B7736D4B3E4F9D57012ED1A009C9868FAC75898D10402ED5F44DB4F7F851EDD006221CFBFA
2,953,025 UART: [art] PUB.Y = 2F6105D1DB62A12551292C200A6AC096248363BDAE9DEA667280AFA49A5E7E56F151F69095FBFC0E76B0F32FC5E7C555
2,959,974 UART: [art] SIG.R = D80A70A51721DABB5B3D22018342FE1C21D63DCBA0E8295C88FAB3E35064367EAB8583C84485D5778A29A18F1E3270BE
2,966,744 UART: [art] SIG.S = E5FA7A78CFC5F6D779C304B65C63FD9F20C81D629B66658DB3A39072E64BE27AFA855105CC309FB40B22156A1B5D3AA3
2,990,804 UART: Caliptra RT
2,991,057 UART: [state] CFI Enabled
3,097,813 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,589 UART: [rt]cmd =0x46505652, len=4
3,129,260 UART: [rt] FIPS Version
3,130,329 >>> mbox cmd response data (36 bytes)
3,130,330 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,805 UART: [rt]cmd =0x46504c54, len=4
3,160,864 >>> mbox cmd response data (8 bytes)
3,160,865 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,190,848 UART: [rt]cmd =0x46504c67, len=4
3,191,859 >>> mbox cmd response: failed
3,191,981 UART: [rt] FIPS self test
3,192,312 UART: [kat] ++
3,192,464 UART: [kat] sha1
3,196,579 UART: [kat] SHA2-256
3,198,509 UART: [kat] SHA2-384
3,201,180 UART: [kat] SHA2-512-ACC
3,203,075 UART: [kat] ECC-384
3,212,704 UART: [kat] HMAC-384Kdf
3,217,255 UART: [kat] LMS
3,466,146 UART: [kat] --
4,160,891 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,591,774 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,601,618 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,631,150 UART: [rt]cmd =0x46504c67, len=4
5,632,534 >>> mbox cmd response data (8 bytes)
5,632,535 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,661,952 UART: [rt]cmd =0x49444543, len=4
5,668,371 >>> mbox cmd response data (37 bytes)
5,668,372 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,697,695 UART: [rt]cmd =0x49444549, len=4
5,700,035 >>> mbox cmd response data (104 bytes)
5,700,036 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,729,289 UART: [rt]cmd =0x49444550, len=4
5,739,423 >>> mbox cmd response data (8 bytes)
5,739,424 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,769,099 UART: [rt]cmd =0x4c444556, len=4
5,779,615 >>> mbox cmd response data (687 bytes)
5,779,616 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,808,895 UART: [rt]cmd =0x43455246, len=4
5,820,883 >>> mbox cmd response data (887 bytes)
5,820,884 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,850,283 UART: [rt]cmd =0x43455252, len=4
5,860,959 >>> mbox cmd response data (784 bytes)
5,860,960 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,891,565 UART: [rt]cmd =0x53494756, len=196
5,896,848 >>> mbox cmd response data (8 bytes)
5,896,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,927,030 UART: [rt]cmd =0x4d454153, len=108
5,948,128 >>> mbox cmd response data (12 bytes)
5,948,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,977,630 UART: [rt]cmd =0x494e464f, len=4
5,980,963 >>> mbox cmd response data (264 bytes)
5,980,964 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,010,229 UART: [rt]cmd =0x54514754, len=24
6,012,518 >>> mbox cmd response data (8 bytes)
6,012,519 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,041,912 UART: [rt]cmd =0x47544744, len=8
6,044,333 >>> mbox cmd response data (104 bytes)
6,044,334 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,073,491 UART: [rt]cmd =0x50435252, len=8
6,075,134 >>> mbox cmd response data (8 bytes)
6,075,135 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,104,404 UART: [rt]cmd =0x50435251, len=36
6,271,862 >>> mbox cmd response data (1848 bytes)
6,271,863 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,301,432 UART: [rt]cmd =0x50435245, len=56
6,304,975 >>> mbox cmd response data (8 bytes)
6,304,976 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,334,459 UART: [rt]cmd =0x44504543, len=20
6,355,299 >>> mbox cmd response data (44 bytes)
6,355,300 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,384,923 UART: [rt]cmd =0x44504543, len=24
6,411,196 >>> mbox cmd response data (40 bytes)
6,411,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,441,108 UART: [rt]cmd =0x44504543, len=96
6,478,393 >>> mbox cmd response data (56 bytes)
6,478,394 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,508,253 UART: [rt]cmd =0x44504543, len=92
6,736,126 >>> mbox cmd response data (6284 bytes)
6,736,127 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,766,186 UART: [rt]cmd =0x44504543, len=136
6,832,992 >>> mbox cmd response data (136 bytes)
6,832,993 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,862,782 UART: [rt]cmd =0x44504543, len=40
6,888,902 >>> mbox cmd response data (40 bytes)
6,888,903 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,918,366 UART: [rt]cmd =0x44504543, len=28
6,961,564 >>> mbox cmd response data (2076 bytes)
6,961,565 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,991,364 UART: [rt]cmd =0x44504543, len=36
7,021,338 >>> mbox cmd response data (24 bytes)
7,021,339 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,050,440 UART: [rt]cmd =0x4453424c, len=4
7,064,000 >>> mbox cmd response data (8 bytes)
7,064,001 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,093,548 UART: [rt]cmd =0x46505344, len=4
7,202,078 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,575 UART: [kat] HMAC-384Kdf
921,183 UART: [kat] LMS
1,169,495 UART: [kat] --
1,170,290 UART: [cold-reset] ++
1,170,730 UART: [fht] FHT @ 0x50003400
1,173,288 UART: [idev] ++
1,173,456 UART: [idev] CDI.KEYID = 6
1,173,817 UART: [idev] SUBJECT.KEYID = 7
1,174,242 UART: [idev] UDS.KEYID = 0
1,174,588 ready_for_fw is high
1,174,588 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,824 UART: [idev] Sha1 KeyId Algorithm
1,208,586 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,363 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,419 UART: [ldev] Erasing FE.KEYID = 1
1,242,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,403 UART: [ldev] --
1,281,769 UART: [fwproc] Wait for Commands...
1,282,460 UART: [fwproc] Recv command 0x46574c44
1,283,193 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,097 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,065 >>> mbox cmd response: success
2,774,065 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,138 UART: [afmc] ++
2,775,306 UART: [afmc] CDI.KEYID = 6
2,775,669 UART: [afmc] SUBJECT.KEYID = 7
2,776,095 UART: [afmc] AUTHORITY.KEYID = 5
2,811,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,313 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,042 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,925 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,644 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,661 UART: [afmc] --
2,854,571 UART: [cold-reset] --
2,855,357 UART: [state] Locking Datavault
2,856,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,280 UART: [state] Locking ICCM
2,857,828 UART: [exit] Launching FMC @ 0x40000130
2,863,157 UART:
2,863,173 UART: Running Caliptra FMC ...
2,863,581 UART:
2,863,724 UART: [state] CFI Enabled
2,874,301 UART: [fht] FMC Alias Private Key: 7
2,982,728 UART: [art] Extend RT PCRs Done
2,983,156 UART: [art] Lock RT PCRs Done
2,984,308 UART: [art] Populate DV Done
2,992,435 UART: [fht] FMC Alias Private Key: 7
2,993,531 UART: [art] Derive CDI
2,993,811 UART: [art] Store in in slot 0x4
3,079,770 UART: [art] Derive Key Pair
3,080,130 UART: [art] Store priv key in slot 0x5
3,093,470 UART: [art] Derive Key Pair - Done
3,108,539 UART: [art] Signing Cert with AUTHO
3,109,019 UART: RITY.KEYID = 7
3,124,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,940 UART: [art] PUB.X = 1A79491F6AC9795319166DC4F3148E4E8475F1FDCBCE9D5BE73866EEE042996853462AFB67A4B20E96BCF7F6A2716CC3
3,131,715 UART: [art] PUB.Y = 792EC491709A27879E41FED06FC72FBD53B90871F82ED71DC18140E0E208218B8456EABCD978DE92422366D32F346474
3,138,657 UART: [art] SIG.R = 49175B583EAA09A0291DFE726FEC93A054E5753A684F17DB53248D506078DBFBE65DCC7115EFC8681458D2FD3DEBA835
3,145,434 UART: [art] SIG.S = A23718353F9AF9791390D5BA55A51BE001E6EE2775F405432EF1435E1CA6DA1C44C60308B5174F988534495694247F45
3,169,387 UART: Caliptra RT
3,169,732 UART: [state] CFI Enabled
3,276,741 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,047 UART: [rt]cmd =0x46505652, len=4
3,307,718 UART: [rt] FIPS Version
3,308,785 >>> mbox cmd response data (36 bytes)
3,308,786 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,003 UART: [rt]cmd =0x46504c54, len=4
3,339,214 >>> mbox cmd response data (8 bytes)
3,339,215 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,368,690 UART: [rt]cmd =0x46504c67, len=4
3,369,475 >>> mbox cmd response: failed
3,369,605 UART: [rt] FIPS self test
3,369,936 UART: [kat] ++
3,370,088 UART: [kat] sha1
3,374,303 UART: [kat] SHA2-256
3,376,233 UART: [kat] SHA2-384
3,379,168 UART: [kat] SHA2-512-ACC
3,381,063 UART: [kat] ECC-384
3,390,912 UART: [kat] HMAC-384Kdf
3,395,439 UART: [kat] LMS
3,644,330 UART: [kat] --
4,446,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,875,908 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,224 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,908,404 UART: [rt]cmd =0x46504c67, len=4
5,909,492 >>> mbox cmd response data (8 bytes)
5,909,493 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,938,794 UART: [rt]cmd =0x49444543, len=4
5,945,189 >>> mbox cmd response data (37 bytes)
5,945,190 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,974,609 UART: [rt]cmd =0x49444549, len=4
5,976,903 >>> mbox cmd response data (104 bytes)
5,976,904 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,445 UART: [rt]cmd =0x49444550, len=4
6,016,676 >>> mbox cmd response data (8 bytes)
6,016,677 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,046,118 UART: [rt]cmd =0x4c444556, len=4
6,056,620 >>> mbox cmd response data (687 bytes)
6,056,621 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,086,036 UART: [rt]cmd =0x43455246, len=4
6,098,190 >>> mbox cmd response data (887 bytes)
6,098,191 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,127,762 UART: [rt]cmd =0x43455252, len=4
6,138,573 >>> mbox cmd response data (783 bytes)
6,138,574 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,191 UART: [rt]cmd =0x53494756, len=196
6,174,526 >>> mbox cmd response data (8 bytes)
6,174,527 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,204,388 UART: [rt]cmd =0x4d454153, len=108
6,224,898 >>> mbox cmd response data (12 bytes)
6,224,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,254,292 UART: [rt]cmd =0x494e464f, len=4
6,257,705 >>> mbox cmd response data (264 bytes)
6,257,706 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,287,219 UART: [rt]cmd =0x54514754, len=24
6,289,218 >>> mbox cmd response data (8 bytes)
6,289,219 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,318,700 UART: [rt]cmd =0x47544744, len=8
6,321,121 >>> mbox cmd response data (104 bytes)
6,321,122 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,350,673 UART: [rt]cmd =0x50435252, len=8
6,352,074 >>> mbox cmd response data (8 bytes)
6,352,075 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,381,516 UART: [rt]cmd =0x50435251, len=36
6,549,136 >>> mbox cmd response data (1848 bytes)
6,549,137 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,578,774 UART: [rt]cmd =0x50435245, len=56
6,582,491 >>> mbox cmd response data (8 bytes)
6,582,492 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,612,037 UART: [rt]cmd =0x44504543, len=20
6,632,807 >>> mbox cmd response data (44 bytes)
6,632,808 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,662,491 UART: [rt]cmd =0x44504543, len=24
6,688,878 >>> mbox cmd response data (40 bytes)
6,688,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,719,060 UART: [rt]cmd =0x44504543, len=96
6,755,509 >>> mbox cmd response data (56 bytes)
6,755,510 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,785,553 UART: [rt]cmd =0x44504543, len=92
7,013,435 >>> mbox cmd response data (6284 bytes)
7,013,436 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,043,667 UART: [rt]cmd =0x44504543, len=136
7,110,271 >>> mbox cmd response data (136 bytes)
7,110,272 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,139,749 UART: [rt]cmd =0x44504543, len=40
7,165,687 >>> mbox cmd response data (40 bytes)
7,165,688 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,195,053 UART: [rt]cmd =0x44504543, len=28
7,238,199 >>> mbox cmd response data (2076 bytes)
7,238,200 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,267,865 UART: [rt]cmd =0x44504543, len=36
7,297,657 >>> mbox cmd response data (24 bytes)
7,297,658 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,326,947 UART: [rt]cmd =0x4453424c, len=4
7,341,189 >>> mbox cmd response data (8 bytes)
7,341,190 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,370,801 UART: [rt]cmd =0x46505344, len=4
7,479,397 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,795 ready_for_fw is high
1,056,795 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,041 >>> mbox cmd response: success
2,624,041 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,259 UART:
2,686,275 UART: Running Caliptra FMC ...
2,686,683 UART:
2,686,826 UART: [state] CFI Enabled
2,697,393 UART: [fht] FMC Alias Private Key: 7
2,805,926 UART: [art] Extend RT PCRs Done
2,806,354 UART: [art] Lock RT PCRs Done
2,807,870 UART: [art] Populate DV Done
2,816,171 UART: [fht] FMC Alias Private Key: 7
2,817,229 UART: [art] Derive CDI
2,817,509 UART: [art] Store in in slot 0x4
2,903,126 UART: [art] Derive Key Pair
2,903,486 UART: [art] Store priv key in slot 0x5
2,916,980 UART: [art] Derive Key Pair - Done
2,931,849 UART: [art] Signing Cert with AUTHO
2,932,329 UART: RITY.KEYID = 7
2,947,617 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,382 UART: [art] PUB.X = F1B1DC6E4D9D2C50754955B529BF9CF3CCBB1872E867CE2693C3AF8EDB73EFAD0132B1650C6808C0608F93E32D4D7BA9
2,955,159 UART: [art] PUB.Y = B876FF7E81AACA10CE4FDEEB880C286572E9548814F69ACF745FB139A66C47614E4D3DC8FE248FC6FF5881689E1832DE
2,962,120 UART: [art] SIG.R = 2BC2320BF2965BB2AA9EBF4E70E87C162C26C1E150AEB7163A50F68CC6506258FE7B18D706119D0DB8DE9DB242055750
2,968,886 UART: [art] SIG.S = EBA006431843AEA0A89AB976972D1A2CC30C7D974FC5CCFE95D1F0A5FED5E8D2535501DBD56A418D2EE0AF6B15EBF3E6
2,992,184 UART: Caliptra RT
2,992,529 UART: [state] CFI Enabled
3,101,568 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,850 UART: [rt]cmd =0x46505652, len=4
3,132,521 UART: [rt] FIPS Version
3,133,702 >>> mbox cmd response data (36 bytes)
3,133,703 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,112 UART: [rt]cmd =0x46504c54, len=4
3,164,253 >>> mbox cmd response data (8 bytes)
3,164,254 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,193,811 UART: [rt]cmd =0x46504c67, len=4
3,194,684 >>> mbox cmd response: failed
3,194,816 UART: [rt] FIPS self test
3,195,147 UART: [kat] ++
3,195,299 UART: [kat] sha1
3,199,404 UART: [kat] SHA2-256
3,201,334 UART: [kat] SHA2-384
3,204,203 UART: [kat] SHA2-512-ACC
3,206,098 UART: [kat] ECC-384
3,215,961 UART: [kat] HMAC-384Kdf
3,220,600 UART: [kat] LMS
3,469,491 UART: [kat] --
4,164,458 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,595,351 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,604,443 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,633,739 UART: [rt]cmd =0x46504c67, len=4
5,635,055 >>> mbox cmd response data (8 bytes)
5,635,056 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,664,297 UART: [rt]cmd =0x49444543, len=4
5,670,776 >>> mbox cmd response data (37 bytes)
5,670,777 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,699,928 UART: [rt]cmd =0x49444549, len=4
5,702,360 >>> mbox cmd response data (104 bytes)
5,702,361 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,731,976 UART: [rt]cmd =0x49444550, len=4
5,742,107 >>> mbox cmd response data (8 bytes)
5,742,108 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,771,659 UART: [rt]cmd =0x4c444556, len=4
5,782,141 >>> mbox cmd response data (687 bytes)
5,782,142 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,811,589 UART: [rt]cmd =0x43455246, len=4
5,823,733 >>> mbox cmd response data (887 bytes)
5,823,734 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,853,173 UART: [rt]cmd =0x43455252, len=4
5,863,906 >>> mbox cmd response data (783 bytes)
5,863,907 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,894,268 UART: [rt]cmd =0x53494756, len=196
5,899,325 >>> mbox cmd response data (8 bytes)
5,899,326 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,929,161 UART: [rt]cmd =0x4d454153, len=108
5,950,353 >>> mbox cmd response data (12 bytes)
5,950,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,573 UART: [rt]cmd =0x494e464f, len=4
5,982,728 >>> mbox cmd response data (264 bytes)
5,982,729 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,012,206 UART: [rt]cmd =0x54514754, len=24
6,014,261 >>> mbox cmd response data (8 bytes)
6,014,262 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,043,769 UART: [rt]cmd =0x47544744, len=8
6,046,320 >>> mbox cmd response data (104 bytes)
6,046,321 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,075,810 UART: [rt]cmd =0x50435252, len=8
6,077,363 >>> mbox cmd response data (8 bytes)
6,077,364 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,106,841 UART: [rt]cmd =0x50435251, len=36
6,274,109 >>> mbox cmd response data (1848 bytes)
6,274,110 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,303,737 UART: [rt]cmd =0x50435245, len=56
6,307,310 >>> mbox cmd response data (8 bytes)
6,307,311 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,336,696 UART: [rt]cmd =0x44504543, len=20
6,357,702 >>> mbox cmd response data (44 bytes)
6,357,703 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,387,312 UART: [rt]cmd =0x44504543, len=24
6,413,663 >>> mbox cmd response data (40 bytes)
6,413,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,443,605 UART: [rt]cmd =0x44504543, len=96
6,481,398 >>> mbox cmd response data (56 bytes)
6,481,399 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,511,242 UART: [rt]cmd =0x44504543, len=92
6,739,378 >>> mbox cmd response data (6284 bytes)
6,739,379 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,769,684 UART: [rt]cmd =0x44504543, len=136
6,836,216 >>> mbox cmd response data (136 bytes)
6,836,217 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,865,680 UART: [rt]cmd =0x44504543, len=40
6,891,884 >>> mbox cmd response data (40 bytes)
6,891,885 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,921,642 UART: [rt]cmd =0x44504543, len=28
6,964,932 >>> mbox cmd response data (2076 bytes)
6,964,933 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,994,478 UART: [rt]cmd =0x44504543, len=36
7,024,398 >>> mbox cmd response data (24 bytes)
7,024,399 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,053,652 UART: [rt]cmd =0x4453424c, len=4
7,066,828 >>> mbox cmd response data (8 bytes)
7,066,829 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,096,266 UART: [rt]cmd =0x46505344, len=4
7,204,576 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,370 UART:
192,739 UART: Running Caliptra ROM ...
193,886 UART:
194,036 UART: [state] CFI Enabled
263,205 UART: [state] LifecycleState = Unprovisioned
265,147 UART: [state] DebugLocked = No
267,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,116 UART: [kat] SHA2-256
440,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,333 UART: [kat] ++
451,937 UART: [kat] sha1
463,091 UART: [kat] SHA2-256
465,786 UART: [kat] SHA2-384
470,951 UART: [kat] SHA2-512-ACC
473,297 UART: [kat] ECC-384
2,766,381 UART: [kat] HMAC-384Kdf
2,778,149 UART: [kat] LMS
3,968,451 UART: [kat] --
3,972,274 UART: [cold-reset] ++
3,973,189 UART: [fht] Storing FHT @ 0x50003400
3,985,974 UART: [idev] ++
3,986,540 UART: [idev] CDI.KEYID = 6
3,987,523 UART: [idev] SUBJECT.KEYID = 7
3,988,742 UART: [idev] UDS.KEYID = 0
3,989,854 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,012,324 UART: [idev] Erasing UDS.KEYID = 0
7,324,001 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,740 UART: [idev] --
7,352,027 UART: [ldev] ++
7,352,597 UART: [ldev] CDI.KEYID = 6
7,353,583 UART: [ldev] SUBJECT.KEYID = 5
7,354,663 UART: [ldev] AUTHORITY.KEYID = 7
7,356,005 UART: [ldev] FE.KEYID = 1
7,400,210 UART: [ldev] Erasing FE.KEYID = 1
10,734,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,567 UART: [ldev] --
13,114,506 UART: [fwproc] Waiting for Commands...
13,117,151 UART: [fwproc] Received command 0x46504c54
13,119,626 UART: [kat] SHA2-256
13,289,283 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,299,644 UART: [kat] ++
13,300,131 UART: [kat] sha1
13,311,496 UART: [kat] SHA2-256
13,314,203 UART: [kat] SHA2-384
13,319,654 UART: [kat] SHA2-512-ACC
13,322,057 UART: [kat] ECC-384
15,608,504 UART: [kat] HMAC-384Kdf
15,640,435 UART: [kat] LMS
16,829,945 UART: [kat] --
16,830,622 >>> mbox cmd response data (8 bytes)
16,831,107 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,831,783 UART: [fwproc] Received command 0x46504c67
16,834,433 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,783,432 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,332,528 >>> mbox cmd response data (8 bytes)
16,333,392 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,335,026 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
192,440 UART:
192,811 UART: Running Caliptra ROM ...
193,970 UART:
603,734 UART: [state] CFI Enabled
618,291 UART: [state] LifecycleState = Unprovisioned
620,198 UART: [state] DebugLocked = No
622,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,536 UART: [kat] SHA2-256
798,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,841 UART: [kat] ++
809,321 UART: [kat] sha1
820,118 UART: [kat] SHA2-256
822,785 UART: [kat] SHA2-384
828,767 UART: [kat] SHA2-512-ACC
831,158 UART: [kat] ECC-384
3,116,921 UART: [kat] HMAC-384Kdf
3,127,749 UART: [kat] LMS
4,317,891 UART: [kat] --
4,324,225 UART: [cold-reset] ++
4,325,351 UART: [fht] Storing FHT @ 0x50003400
4,337,104 UART: [idev] ++
4,337,678 UART: [idev] CDI.KEYID = 6
4,338,732 UART: [idev] SUBJECT.KEYID = 7
4,339,853 UART: [idev] UDS.KEYID = 0
4,340,836 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,356,176 UART: [idev] Erasing UDS.KEYID = 0
7,630,771 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,900 UART: [idev] --
7,655,953 UART: [ldev] ++
7,656,579 UART: [ldev] CDI.KEYID = 6
7,657,464 UART: [ldev] SUBJECT.KEYID = 5
7,658,749 UART: [ldev] AUTHORITY.KEYID = 7
7,659,981 UART: [ldev] FE.KEYID = 1
7,669,385 UART: [ldev] Erasing FE.KEYID = 1
10,959,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,537 UART: [ldev] --
13,317,657 UART: [fwproc] Waiting for Commands...
13,319,271 UART: [fwproc] Received command 0x46504c54
13,321,784 UART: [kat] SHA2-256
13,491,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,501,776 UART: [kat] ++
13,502,272 UART: [kat] sha1
13,513,005 UART: [kat] SHA2-256
13,515,719 UART: [kat] SHA2-384
13,521,381 UART: [kat] SHA2-512-ACC
13,523,787 UART: [kat] ECC-384
15,810,528 UART: [kat] HMAC-384Kdf
15,822,269 UART: [kat] LMS
17,011,720 UART: [kat] --
17,012,452 >>> mbox cmd response data (8 bytes)
17,012,903 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,013,735 UART: [fwproc] Received command 0x46504c67
17,016,384 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
4,126,517 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,530,141 >>> mbox cmd response data (8 bytes)
16,530,971 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,531,895 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,488 UART:
192,858 UART: Running Caliptra ROM ...
193,969 UART:
194,112 UART: [state] CFI Enabled
262,846 UART: [state] LifecycleState = Unprovisioned
264,748 UART: [state] DebugLocked = No
265,976 UART: [state] WD Timer not started. Device not locked for debugging
269,568 UART: [kat] SHA2-256
448,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,208 UART: [kat] ++
460,749 UART: [kat] sha1
472,497 UART: [kat] SHA2-256
475,550 UART: [kat] SHA2-384
481,476 UART: [kat] SHA2-512-ACC
484,404 UART: [kat] ECC-384
2,946,702 UART: [kat] HMAC-384Kdf
2,968,598 UART: [kat] LMS
3,498,066 UART: [kat] --
3,502,874 UART: [cold-reset] ++
3,504,435 UART: [fht] FHT @ 0x50003400
3,515,532 UART: [idev] ++
3,516,098 UART: [idev] CDI.KEYID = 6
3,517,011 UART: [idev] SUBJECT.KEYID = 7
3,518,229 UART: [idev] UDS.KEYID = 0
3,519,590 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,541,408 UART: [idev] Erasing UDS.KEYID = 0
6,024,223 UART: [idev] Sha1 KeyId Algorithm
6,047,886 UART: [idev] --
6,051,348 UART: [ldev] ++
6,051,926 UART: [ldev] CDI.KEYID = 6
6,052,840 UART: [ldev] SUBJECT.KEYID = 5
6,054,056 UART: [ldev] AUTHORITY.KEYID = 7
6,055,292 UART: [ldev] FE.KEYID = 1
6,097,810 UART: [ldev] Erasing FE.KEYID = 1
8,601,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,328 UART: [ldev] --
10,410,363 UART: [fwproc] Wait for Commands...
10,412,263 UART: [fwproc] Recv command 0x46504c54
10,414,689 UART: [kat] SHA2-256
10,593,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,605,514 UART: [kat] ++
10,606,047 UART: [kat] sha1
10,615,808 UART: [kat] SHA2-256
10,618,876 UART: [kat] SHA2-384
10,624,371 UART: [kat] SHA2-512-ACC
10,627,309 UART: [kat] ECC-384
13,079,063 UART: [kat] HMAC-384Kdf
13,102,590 UART: [kat] LMS
13,632,118 UART: [kat] --
13,632,817 >>> mbox cmd response data (8 bytes)
13,633,326 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,634,699 UART: [fwproc] Recv command 0x46504c67
13,637,199 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,174 writing to cptra_bootfsm_go
3,380,055 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,302,007 >>> mbox cmd response data (8 bytes)
13,302,681 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,304,125 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,629 UART:
192,999 UART: Running Caliptra ROM ...
194,180 UART:
603,552 UART: [state] CFI Enabled
616,240 UART: [state] LifecycleState = Unprovisioned
618,107 UART: [state] DebugLocked = No
619,534 UART: [state] WD Timer not started. Device not locked for debugging
623,935 UART: [kat] SHA2-256
803,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,616 UART: [kat] ++
815,150 UART: [kat] sha1
825,757 UART: [kat] SHA2-256
828,812 UART: [kat] SHA2-384
834,961 UART: [kat] SHA2-512-ACC
837,893 UART: [kat] ECC-384
3,278,466 UART: [kat] HMAC-384Kdf
3,290,820 UART: [kat] LMS
3,820,314 UART: [kat] --
3,824,544 UART: [cold-reset] ++
3,826,480 UART: [fht] FHT @ 0x50003400
3,837,245 UART: [idev] ++
3,837,806 UART: [idev] CDI.KEYID = 6
3,838,713 UART: [idev] SUBJECT.KEYID = 7
3,839,925 UART: [idev] UDS.KEYID = 0
3,840,923 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,856,820 UART: [idev] Erasing UDS.KEYID = 0
6,316,710 UART: [idev] Sha1 KeyId Algorithm
6,339,352 UART: [idev] --
6,343,449 UART: [ldev] ++
6,344,028 UART: [ldev] CDI.KEYID = 6
6,344,944 UART: [ldev] SUBJECT.KEYID = 5
6,346,159 UART: [ldev] AUTHORITY.KEYID = 7
6,347,396 UART: [ldev] FE.KEYID = 1
6,359,878 UART: [ldev] Erasing FE.KEYID = 1
8,832,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,391 UART: [ldev] --
10,621,733 UART: [fwproc] Wait for Commands...
10,623,835 UART: [fwproc] Recv command 0x46504c54
10,626,254 UART: [kat] SHA2-256
10,805,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,817,056 UART: [kat] ++
10,817,607 UART: [kat] sha1
10,827,421 UART: [kat] SHA2-256
10,830,484 UART: [kat] SHA2-384
10,836,245 UART: [kat] SHA2-512-ACC
10,839,186 UART: [kat] ECC-384
13,282,001 UART: [kat] HMAC-384Kdf
13,293,957 UART: [kat] LMS
13,823,544 UART: [kat] --
13,824,244 >>> mbox cmd response data (8 bytes)
13,824,707 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,826,023 UART: [fwproc] Recv command 0x46504c67
13,828,579 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,076 writing to cptra_bootfsm_go
3,697,831 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,477,843 >>> mbox cmd response data (8 bytes)
13,478,650 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,480,427 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,439,726 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,405,702 >>> mbox cmd response data (8 bytes)
13,406,351 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,408,014 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,760,208 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,589,803 >>> mbox cmd response data (8 bytes)
13,590,509 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,591,465 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,773 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,273 UART: [kat] SHA2-256
882,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,319 UART: [kat] ++
886,471 UART: [kat] sha1
890,661 UART: [kat] SHA2-256
892,599 UART: [kat] SHA2-384
895,424 UART: [kat] SHA2-512-ACC
897,325 UART: [kat] ECC-384
902,838 UART: [kat] HMAC-384Kdf
907,330 UART: [kat] LMS
1,475,526 UART: [kat] --
1,476,385 UART: [cold-reset] ++
1,476,849 UART: [fht] Storing FHT @ 0x50003400
1,479,612 UART: [idev] ++
1,479,780 UART: [idev] CDI.KEYID = 6
1,480,140 UART: [idev] SUBJECT.KEYID = 7
1,480,564 UART: [idev] UDS.KEYID = 0
1,480,909 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,690 UART: [idev] Erasing UDS.KEYID = 0
1,505,342 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,092 UART: [idev] --
1,515,041 UART: [ldev] ++
1,515,209 UART: [ldev] CDI.KEYID = 6
1,515,572 UART: [ldev] SUBJECT.KEYID = 5
1,515,998 UART: [ldev] AUTHORITY.KEYID = 7
1,516,461 UART: [ldev] FE.KEYID = 1
1,521,727 UART: [ldev] Erasing FE.KEYID = 1
1,547,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,624 UART: [ldev] --
1,587,071 UART: [fwproc] Waiting for Commands...
1,587,838 UART: [fwproc] Received command 0x46504c54
1,588,745 UART: [kat] SHA2-256
2,382,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,791 UART: [kat] ++
2,386,943 UART: [kat] sha1
2,391,161 UART: [kat] SHA2-256
2,393,099 UART: [kat] SHA2-384
2,395,812 UART: [kat] SHA2-512-ACC
2,397,712 UART: [kat] ECC-384
2,403,649 UART: [kat] HMAC-384Kdf
2,408,149 UART: [kat] LMS
2,976,345 UART: [kat] --
2,976,583 >>> mbox cmd response data (8 bytes)
2,976,584 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,898 UART: [fwproc] Received command 0x46504c67
2,977,852 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,477 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,463 >>> mbox cmd response data (8 bytes)
2,716,464 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,742 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,488 UART: [kat] SHA2-256
882,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,534 UART: [kat] ++
886,686 UART: [kat] sha1
891,000 UART: [kat] SHA2-256
892,938 UART: [kat] SHA2-384
895,739 UART: [kat] SHA2-512-ACC
897,640 UART: [kat] ECC-384
903,227 UART: [kat] HMAC-384Kdf
908,071 UART: [kat] LMS
1,476,267 UART: [kat] --
1,477,084 UART: [cold-reset] ++
1,477,634 UART: [fht] Storing FHT @ 0x50003400
1,480,389 UART: [idev] ++
1,480,557 UART: [idev] CDI.KEYID = 6
1,480,917 UART: [idev] SUBJECT.KEYID = 7
1,481,341 UART: [idev] UDS.KEYID = 0
1,481,686 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,489,235 UART: [idev] Erasing UDS.KEYID = 0
1,505,713 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,239 UART: [idev] --
1,515,238 UART: [ldev] ++
1,515,406 UART: [ldev] CDI.KEYID = 6
1,515,769 UART: [ldev] SUBJECT.KEYID = 5
1,516,195 UART: [ldev] AUTHORITY.KEYID = 7
1,516,658 UART: [ldev] FE.KEYID = 1
1,522,078 UART: [ldev] Erasing FE.KEYID = 1
1,546,985 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,927 UART: [ldev] --
1,586,384 UART: [fwproc] Waiting for Commands...
1,587,105 UART: [fwproc] Received command 0x46504c54
1,588,012 UART: [kat] SHA2-256
2,381,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,058 UART: [kat] ++
2,386,210 UART: [kat] sha1
2,390,290 UART: [kat] SHA2-256
2,392,228 UART: [kat] SHA2-384
2,395,035 UART: [kat] SHA2-512-ACC
2,396,935 UART: [kat] ECC-384
2,402,544 UART: [kat] HMAC-384Kdf
2,407,150 UART: [kat] LMS
2,975,346 UART: [kat] --
2,975,584 >>> mbox cmd response data (8 bytes)
2,975,585 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,975,649 UART: [fwproc] Received command 0x46504c67
2,976,603 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,944 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,064 >>> mbox cmd response data (8 bytes)
2,716,065 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,439 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
893,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,319 UART: [kat] ++
897,471 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,548 UART: [kat] SHA2-512-ACC
908,449 UART: [kat] ECC-384
918,360 UART: [kat] HMAC-384Kdf
923,030 UART: [kat] LMS
1,171,358 UART: [kat] --
1,172,505 UART: [cold-reset] ++
1,172,933 UART: [fht] FHT @ 0x50003400
1,175,488 UART: [idev] ++
1,175,656 UART: [idev] CDI.KEYID = 6
1,176,016 UART: [idev] SUBJECT.KEYID = 7
1,176,440 UART: [idev] UDS.KEYID = 0
1,176,785 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,976 UART: [idev] Erasing UDS.KEYID = 0
1,202,715 UART: [idev] Sha1 KeyId Algorithm
1,211,319 UART: [idev] --
1,212,539 UART: [ldev] ++
1,212,707 UART: [ldev] CDI.KEYID = 6
1,213,070 UART: [ldev] SUBJECT.KEYID = 5
1,213,496 UART: [ldev] AUTHORITY.KEYID = 7
1,213,959 UART: [ldev] FE.KEYID = 1
1,219,227 UART: [ldev] Erasing FE.KEYID = 1
1,245,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,877 UART: [ldev] --
1,285,326 UART: [fwproc] Wait for Commands...
1,286,042 UART: [fwproc] Recv command 0x46504c54
1,286,888 UART: [kat] SHA2-256
2,092,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,096,663 UART: [kat] ++
2,096,815 UART: [kat] sha1
2,100,895 UART: [kat] SHA2-256
2,102,835 UART: [kat] SHA2-384
2,105,724 UART: [kat] SHA2-512-ACC
2,107,624 UART: [kat] ECC-384
2,117,475 UART: [kat] HMAC-384Kdf
2,121,971 UART: [kat] LMS
2,370,299 UART: [kat] --
2,370,537 >>> mbox cmd response data (8 bytes)
2,370,538 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,370,767 UART: [fwproc] Recv command 0x46504c67
2,371,660 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,399 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,113,790 >>> mbox cmd response data (8 bytes)
2,113,791 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,114,107 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,919 UART: [state] LifecycleState = Unprovisioned
85,574 UART: [state] DebugLocked = No
86,078 UART: [state] WD Timer not started. Device not locked for debugging
87,387 UART: [kat] SHA2-256
893,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,162 UART: [kat] ++
897,314 UART: [kat] sha1
901,462 UART: [kat] SHA2-256
903,402 UART: [kat] SHA2-384
906,117 UART: [kat] SHA2-512-ACC
908,018 UART: [kat] ECC-384
917,877 UART: [kat] HMAC-384Kdf
922,511 UART: [kat] LMS
1,170,839 UART: [kat] --
1,171,836 UART: [cold-reset] ++
1,172,350 UART: [fht] FHT @ 0x50003400
1,174,981 UART: [idev] ++
1,175,149 UART: [idev] CDI.KEYID = 6
1,175,509 UART: [idev] SUBJECT.KEYID = 7
1,175,933 UART: [idev] UDS.KEYID = 0
1,176,278 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,183,991 UART: [idev] Erasing UDS.KEYID = 0
1,201,078 UART: [idev] Sha1 KeyId Algorithm
1,209,712 UART: [idev] --
1,210,638 UART: [ldev] ++
1,210,806 UART: [ldev] CDI.KEYID = 6
1,211,169 UART: [ldev] SUBJECT.KEYID = 5
1,211,595 UART: [ldev] AUTHORITY.KEYID = 7
1,212,058 UART: [ldev] FE.KEYID = 1
1,217,154 UART: [ldev] Erasing FE.KEYID = 1
1,243,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,748 UART: [ldev] --
1,282,131 UART: [fwproc] Wait for Commands...
1,282,715 UART: [fwproc] Recv command 0x46504c54
1,283,561 UART: [kat] SHA2-256
2,089,211 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,093,336 UART: [kat] ++
2,093,488 UART: [kat] sha1
2,097,564 UART: [kat] SHA2-256
2,099,504 UART: [kat] SHA2-384
2,102,083 UART: [kat] SHA2-512-ACC
2,103,983 UART: [kat] ECC-384
2,113,438 UART: [kat] HMAC-384Kdf
2,117,928 UART: [kat] LMS
2,366,256 UART: [kat] --
2,366,494 >>> mbox cmd response data (8 bytes)
2,366,495 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,700 UART: [fwproc] Recv command 0x46504c67
2,367,593 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,758 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,114,661 >>> mbox cmd response data (8 bytes)
2,114,662 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,115,090 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
86,001 UART: [state] WD Timer not started. Device not locked for debugging
87,230 UART: [kat] SHA2-256
890,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,909 UART: [kat] ++
895,061 UART: [kat] sha1
899,131 UART: [kat] SHA2-256
901,071 UART: [kat] SHA2-384
903,914 UART: [kat] SHA2-512-ACC
905,815 UART: [kat] ECC-384
915,016 UART: [kat] HMAC-384Kdf
919,704 UART: [kat] LMS
1,168,016 UART: [kat] --
1,169,157 UART: [cold-reset] ++
1,169,559 UART: [fht] FHT @ 0x50003400
1,172,109 UART: [idev] ++
1,172,277 UART: [idev] CDI.KEYID = 6
1,172,638 UART: [idev] SUBJECT.KEYID = 7
1,173,063 UART: [idev] UDS.KEYID = 0
1,173,409 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,181,045 UART: [idev] Erasing UDS.KEYID = 0
1,197,393 UART: [idev] Sha1 KeyId Algorithm
1,206,265 UART: [idev] --
1,207,326 UART: [ldev] ++
1,207,494 UART: [ldev] CDI.KEYID = 6
1,207,858 UART: [ldev] SUBJECT.KEYID = 5
1,208,285 UART: [ldev] AUTHORITY.KEYID = 7
1,208,748 UART: [ldev] FE.KEYID = 1
1,214,004 UART: [ldev] Erasing FE.KEYID = 1
1,240,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,764 UART: [ldev] --
1,280,222 UART: [fwproc] Wait for Commands...
1,280,909 UART: [fwproc] Recv command 0x46504c54
1,281,763 UART: [kat] SHA2-256
2,085,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,089,442 UART: [kat] ++
2,089,594 UART: [kat] sha1
2,093,892 UART: [kat] SHA2-256
2,095,832 UART: [kat] SHA2-384
2,098,607 UART: [kat] SHA2-512-ACC
2,100,507 UART: [kat] ECC-384
2,110,466 UART: [kat] HMAC-384Kdf
2,115,164 UART: [kat] LMS
2,363,476 UART: [kat] --
2,363,717 >>> mbox cmd response data (8 bytes)
2,363,718 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,363,856 UART: [fwproc] Recv command 0x46504c67
2,364,760 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,220 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,103,789 >>> mbox cmd response data (8 bytes)
2,103,790 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,104,272 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,716 UART: [kat] ++
895,868 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,533 UART: [kat] HMAC-384Kdf
921,087 UART: [kat] LMS
1,169,399 UART: [kat] --
1,170,568 UART: [cold-reset] ++
1,171,142 UART: [fht] FHT @ 0x50003400
1,173,614 UART: [idev] ++
1,173,782 UART: [idev] CDI.KEYID = 6
1,174,143 UART: [idev] SUBJECT.KEYID = 7
1,174,568 UART: [idev] UDS.KEYID = 0
1,174,914 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,222 UART: [idev] --
1,209,265 UART: [ldev] ++
1,209,433 UART: [ldev] CDI.KEYID = 6
1,209,797 UART: [ldev] SUBJECT.KEYID = 5
1,210,224 UART: [ldev] AUTHORITY.KEYID = 7
1,210,687 UART: [ldev] FE.KEYID = 1
1,215,861 UART: [ldev] Erasing FE.KEYID = 1
1,242,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,282,119 UART: [fwproc] Wait for Commands...
1,282,920 UART: [fwproc] Recv command 0x46504c54
1,283,774 UART: [kat] SHA2-256
2,087,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,091,453 UART: [kat] ++
2,091,605 UART: [kat] sha1
2,095,899 UART: [kat] SHA2-256
2,097,839 UART: [kat] SHA2-384
2,100,520 UART: [kat] SHA2-512-ACC
2,102,420 UART: [kat] ECC-384
2,112,211 UART: [kat] HMAC-384Kdf
2,116,811 UART: [kat] LMS
2,365,123 UART: [kat] --
2,365,364 >>> mbox cmd response data (8 bytes)
2,365,365 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,365,663 UART: [fwproc] Recv command 0x46504c67
2,366,567 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,786 >>> mbox cmd response data (8 bytes)
2,105,787 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,106,115 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,043 UART:
192,418 UART: Running Caliptra ROM ...
193,620 UART:
193,773 UART: [state] CFI Enabled
261,993 UART: [state] LifecycleState = Unprovisioned
263,935 UART: [state] DebugLocked = No
266,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,304 UART: [kat] SHA2-256
440,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,563 UART: [kat] ++
451,036 UART: [kat] sha1
462,412 UART: [kat] SHA2-256
465,147 UART: [kat] SHA2-384
471,001 UART: [kat] SHA2-512-ACC
473,375 UART: [kat] ECC-384
2,768,218 UART: [kat] HMAC-384Kdf
2,800,350 UART: [kat] LMS
3,990,611 UART: [kat] --
3,995,496 UART: [cold-reset] ++
3,996,512 UART: [fht] Storing FHT @ 0x50003400
4,008,566 UART: [idev] ++
4,009,139 UART: [idev] CDI.KEYID = 6
4,010,212 UART: [idev] SUBJECT.KEYID = 7
4,011,319 UART: [idev] UDS.KEYID = 0
4,012,372 ready_for_fw is high
4,012,607 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,156,201 UART: [idev] Erasing UDS.KEYID = 0
7,347,333 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,559 UART: [idev] --
7,373,088 UART: [ldev] ++
7,373,658 UART: [ldev] CDI.KEYID = 6
7,374,599 UART: [ldev] SUBJECT.KEYID = 5
7,375,752 UART: [ldev] AUTHORITY.KEYID = 7
7,377,097 UART: [ldev] FE.KEYID = 1
7,422,594 UART: [ldev] Erasing FE.KEYID = 1
10,756,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,123 UART: [ldev] --
13,115,332 UART: [fwproc] Waiting for Commands...
13,117,536 UART: [fwproc] Received command 0x46574c44
13,119,722 UART: [fwproc] Received Image of size 114124 bytes
17,173,569 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,776 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,698 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,634,623 >>> mbox cmd response: success
17,635,046 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,639,019 UART: [afmc] ++
17,639,618 UART: [afmc] CDI.KEYID = 6
17,640,527 UART: [afmc] SUBJECT.KEYID = 7
17,641,795 UART: [afmc] AUTHORITY.KEYID = 5
21,006,835 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,604 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,867 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,298 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,142 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,596 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,976 UART: [afmc] --
23,374,462 UART: [cold-reset] --
23,379,345 UART: [state] Locking Datavault
23,387,346 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,106 UART: [state] Locking ICCM
23,390,393 UART: [exit] Launching FMC @ 0x40000130
23,398,783 UART:
23,399,048 UART: Running Caliptra FMC ...
23,400,156 UART:
23,400,322 UART: [state] CFI Enabled
23,466,241 UART: [fht] FMC Alias Private Key: 7
25,804,152 UART: [art] Extend RT PCRs Done
25,805,366 UART: [art] Lock RT PCRs Done
25,807,315 UART: [art] Populate DV Done
25,812,565 UART: [fht] FMC Alias Private Key: 7
25,814,103 UART: [art] Derive CDI
25,814,919 UART: [art] Store in in slot 0x4
25,874,419 UART: [art] Derive Key Pair
25,875,453 UART: [art] Store priv key in slot 0x5
29,167,806 UART: [art] Derive Key Pair - Done
29,180,696 UART: [art] Signing Cert with AUTHO
29,181,996 UART: RITY.KEYID = 7
31,468,894 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,411 UART: [art] PUB.X = B096405E2932C358C42DFC37110735F79F126BF701AC372A0253555EBE9AC4ED2EA7F4A56902A7E75325CEBAE396EC7D
31,477,684 UART: [art] PUB.Y = EE719F573199FE23C01574C004A3A5BDDF1038EF5A27DEEDA84D461F25FD783E839B6D4FFCADBFF9ADE5CE2A601EFC95
31,484,944 UART: [art] SIG.R = C608311623F2D70C83D8C95BA6E2EDCB18D0260EE1689EF833653A241F96234057429C8ABF8C3BCCB5BF9A172883A598
31,492,296 UART: [art] SIG.S = 668F2BDF24EED90A51C898D2125F708CECF2689FF1685C1F19AD61FA99F0DAD9289583BDF02AFDD5478C0004B13517EA
32,797,750 UART: Caliptra RT
32,798,461 UART: [state] CFI Enabled
32,959,246 UART: [rt] RT listening for mailbox commands...
32,990,933 UART: [rt]cmd =0x46504c54, len=4
32,992,430 >>> mbox cmd response data (8 bytes)
32,992,861 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,022,841 UART: [rt]cmd =0x46504c67, len=4
33,024,357 >>> mbox cmd response: failed
33,025,393 UART: [rt] FIPS self test
33,026,331 UART: [kat] ++
33,026,782 UART: [kat] sha1
33,031,270 UART: [kat] SHA2-256
33,033,095 UART: [kat] SHA2-384
33,036,163 UART: [kat] SHA2-512-ACC
33,038,377 UART: [kat] ECC-384
36,317,193 UART: [kat] HMAC-384Kdf
36,324,194 UART: [kat] LMS
36,734,465 UART: [kat] --
36,886,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,718,924 UART: [rt] Verify complete
40,869,705 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,899,500 UART: [rt]cmd =0x46504c67, len=4
40,900,923 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,808,331 ready_for_fw is high
3,808,830 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
17,882,327 >>> mbox cmd response: success
17,883,045 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,566,448 UART:
23,566,858 UART: Running Caliptra FMC ...
23,568,003 UART:
23,568,170 UART: [state] CFI Enabled
23,636,012 UART: [fht] FMC Alias Private Key: 7
25,973,709 UART: [art] Extend RT PCRs Done
25,974,944 UART: [art] Lock RT PCRs Done
25,976,599 UART: [art] Populate DV Done
25,982,048 UART: [fht] FMC Alias Private Key: 7
25,983,649 UART: [art] Derive CDI
25,984,469 UART: [art] Store in in slot 0x4
26,044,131 UART: [art] Derive Key Pair
26,045,136 UART: [art] Store priv key in slot 0x5
29,337,729 UART: [art] Derive Key Pair - Done
29,350,620 UART: [art] Signing Cert with AUTHO
29,351,927 UART: RITY.KEYID = 7
31,639,700 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,208 UART: [art] PUB.X = 853AF9D66DD4C472D76B5FA8BBE58BB9F438C2A6ABDE19E27BBD3F4756B4748854653AE78695F34F1E0B8E52CA5E7F65
31,648,535 UART: [art] PUB.Y = 4DADCF85A58DFA9B62E46926DE20557D392A85CEAB413BEB5E33FED052B6D393F499A5CE8F52DE785B458C6F264E4DE2
31,655,780 UART: [art] SIG.R = 25EC42155620D8716ED4D184085E7E887E1C21195B2B8E00160C1DCD57D28153BC0CB4D8DA04B98BF08DAF8FFF8E2680
31,663,128 UART: [art] SIG.S = 0E32F6AEE418C849DC0F77AAEF85E3C2A56843717792CE97F18982CA20BCF14FCAA47CA53403A11938ECA90E29C8C0CA
32,968,339 UART: Caliptra RT
32,969,049 UART: [state] CFI Enabled
33,129,403 UART: [rt] RT listening for mailbox commands...
33,160,949 UART: [rt]cmd =0x46504c54, len=4
33,162,529 >>> mbox cmd response data (8 bytes)
33,162,978 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,192,546 UART: [rt]cmd =0x46504c67, len=4
33,193,980 >>> mbox cmd response: failed
33,195,153 UART: [rt] FIPS self test
33,196,086 UART: [kat] ++
33,196,541 UART: [kat] sha1
33,200,962 UART: [kat] SHA2-256
33,202,772 UART: [kat] SHA2-384
33,205,559 UART: [kat] SHA2-512-ACC
33,207,773 UART: [kat] ECC-384
36,486,763 UART: [kat] HMAC-384Kdf
36,494,034 UART: [kat] LMS
36,904,314 UART: [kat] --
37,036,077 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,869,261 UART: [rt] Verify complete
41,039,490 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,069,284 UART: [rt]cmd =0x46504c67, len=4
41,070,876 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
192,497 UART:
192,860 UART: Running Caliptra ROM ...
194,008 UART:
603,881 UART: [state] CFI Enabled
616,071 UART: [state] LifecycleState = Unprovisioned
618,036 UART: [state] DebugLocked = No
619,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,985 UART: [kat] SHA2-256
793,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,314 UART: [kat] ++
804,769 UART: [kat] sha1
815,272 UART: [kat] SHA2-256
817,934 UART: [kat] SHA2-384
823,219 UART: [kat] SHA2-512-ACC
825,601 UART: [kat] ECC-384
3,110,195 UART: [kat] HMAC-384Kdf
3,122,246 UART: [kat] LMS
4,312,373 UART: [kat] --
4,318,306 UART: [cold-reset] ++
4,320,696 UART: [fht] Storing FHT @ 0x50003400
4,333,535 UART: [idev] ++
4,334,104 UART: [idev] CDI.KEYID = 6
4,335,028 UART: [idev] SUBJECT.KEYID = 7
4,336,284 UART: [idev] UDS.KEYID = 0
4,337,270 ready_for_fw is high
4,337,466 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
4,481,197 UART: [idev] Erasing UDS.KEYID = 0
7,628,063 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,541 UART: [idev] --
7,652,897 UART: [ldev] ++
7,653,471 UART: [ldev] CDI.KEYID = 6
7,654,442 UART: [ldev] SUBJECT.KEYID = 5
7,655,544 UART: [ldev] AUTHORITY.KEYID = 7
7,656,891 UART: [ldev] FE.KEYID = 1
7,666,679 UART: [ldev] Erasing FE.KEYID = 1
10,953,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,791 UART: [ldev] --
13,314,113 UART: [fwproc] Waiting for Commands...
13,316,534 UART: [fwproc] Received command 0x46574c44
13,318,716 UART: [fwproc] Received Image of size 114124 bytes
17,378,029 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,460,017 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,894 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
17,846,965 >>> mbox cmd response: success
17,847,419 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,850,810 UART: [afmc] ++
17,851,453 UART: [afmc] CDI.KEYID = 6
17,852,361 UART: [afmc] SUBJECT.KEYID = 7
17,853,577 UART: [afmc] AUTHORITY.KEYID = 5
21,165,771 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,624 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,884 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,276 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,072 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,496 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,150 UART: [afmc] --
23,529,287 UART: [cold-reset] --
23,532,118 UART: [state] Locking Datavault
23,536,340 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,096 UART: [state] Locking ICCM
23,539,299 UART: [exit] Launching FMC @ 0x40000130
23,547,692 UART:
23,547,924 UART: Running Caliptra FMC ...
23,549,025 UART:
23,549,184 UART: [state] CFI Enabled
23,557,610 UART: [fht] FMC Alias Private Key: 7
25,888,169 UART: [art] Extend RT PCRs Done
25,889,400 UART: [art] Lock RT PCRs Done
25,890,972 UART: [art] Populate DV Done
25,896,599 UART: [fht] FMC Alias Private Key: 7
25,898,081 UART: [art] Derive CDI
25,898,897 UART: [art] Store in in slot 0x4
25,941,548 UART: [art] Derive Key Pair
25,942,590 UART: [art] Store priv key in slot 0x5
29,184,499 UART: [art] Derive Key Pair - Done
29,197,402 UART: [art] Signing Cert with AUTHO
29,198,894 UART: RITY.KEYID = 7
31,477,849 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,360 UART: [art] PUB.X = 2C43CFABB4647801E91C7E7C4171C0E648FB04C5CA7C5F16E0DFDFB3FB1EB380AD7A0FE6946EBF760C1C13E162ECA3D8
31,486,623 UART: [art] PUB.Y = 7115157D65AF4CF061D2058D167C56686BB37F8D0308AC18569BCAA845E0CF2DB36B4AC81BBDDA5E04CBEC9D043B70B9
31,493,866 UART: [art] SIG.R = D7016C77891D622E3210542B494A0E1BD8AC86B48D1ACB932EA812870D7DEB5E3B9267A56C92286EC5DD1E254D6707AC
31,501,273 UART: [art] SIG.S = F6643BF8F260D32FA4BF2853C93B9B5A4C741BD51A6083EAE6C9BC3412AF0D1A50AA3185D5A40682E9CE84E1B0343DFA
32,806,238 UART: Caliptra RT
32,806,952 UART: [state] CFI Enabled
32,924,984 UART: [rt] RT listening for mailbox commands...
32,956,225 UART: [rt]cmd =0x46504c54, len=4
32,957,910 >>> mbox cmd response data (8 bytes)
32,958,526 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,988,503 UART: [rt]cmd =0x46504c67, len=4
32,989,855 >>> mbox cmd response: failed
32,990,884 UART: [rt] FIPS self test
32,991,752 UART: [kat] ++
32,992,191 UART: [kat] sha1
32,996,670 UART: [kat] SHA2-256
32,998,466 UART: [kat] SHA2-384
33,001,273 UART: [kat] SHA2-512-ACC
33,003,485 UART: [kat] ECC-384
36,245,882 UART: [kat] HMAC-384Kdf
36,251,785 UART: [kat] LMS
36,662,067 UART: [kat] --
36,813,574 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,646,249 UART: [rt] Verify complete
40,836,358 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,866,200 UART: [rt]cmd =0x46504c67, len=4
40,867,622 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
4,128,917 ready_for_fw is high
4,129,378 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
18,062,315 >>> mbox cmd response: success
18,062,871 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,701,360 UART:
23,701,761 UART: Running Caliptra FMC ...
23,702,896 UART:
23,703,052 UART: [state] CFI Enabled
23,710,939 UART: [fht] FMC Alias Private Key: 7
26,041,918 UART: [art] Extend RT PCRs Done
26,043,163 UART: [art] Lock RT PCRs Done
26,044,493 UART: [art] Populate DV Done
26,049,958 UART: [fht] FMC Alias Private Key: 7
26,051,595 UART: [art] Derive CDI
26,052,344 UART: [art] Store in in slot 0x4
26,095,113 UART: [art] Derive Key Pair
26,096,113 UART: [art] Store priv key in slot 0x5
29,338,295 UART: [art] Derive Key Pair - Done
29,351,401 UART: [art] Signing Cert with AUTHO
29,352,712 UART: RITY.KEYID = 7
31,632,005 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,528 UART: [art] PUB.X = E52D50DFB7FB8E832EB4FCF73E4ECAA517B96F381340D02FC7BADED228EB138841263C58CD89564131FE1541B4A87B0A
31,640,782 UART: [art] PUB.Y = D754079000A8F8420E3C1AFB81E914F2D99A012CE483B9EF7A6FB33C2DF1188783AB724554AF500F423A340C3116B59D
31,648,108 UART: [art] SIG.R = 988B142E0FE6BA52120C5762FC3027B20DD129A8502A99D926B5B70E339B57993E7C047E86BEE0E5F783BC585868F943
31,655,411 UART: [art] SIG.S = DFE82FDBF10CC3B16D55EBEBB133909892E77A8AEC0884C0F57BF7B9A5CF276B961FDABCB74F5EA4593F5D9AB58D0201
32,960,611 UART: Caliptra RT
32,961,330 UART: [state] CFI Enabled
33,077,796 UART: [rt] RT listening for mailbox commands...
33,109,091 UART: [rt]cmd =0x46504c54, len=4
33,110,863 >>> mbox cmd response data (8 bytes)
33,111,274 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,141,466 UART: [rt]cmd =0x46504c67, len=4
33,142,807 >>> mbox cmd response: failed
33,143,693 UART: [rt] FIPS self test
33,144,535 UART: [kat] ++
33,144,975 UART: [kat] sha1
33,149,458 UART: [kat] SHA2-256
33,151,269 UART: [kat] SHA2-384
33,154,368 UART: [kat] SHA2-512-ACC
33,156,583 UART: [kat] ECC-384
36,398,865 UART: [kat] HMAC-384Kdf
36,404,748 UART: [kat] LMS
36,815,020 UART: [kat] --
36,946,094 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,778,465 UART: [rt] Verify complete
40,988,846 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,018,757 UART: [rt]cmd =0x46504c67, len=4
41,020,370 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,398 UART:
192,758 UART: Running Caliptra ROM ...
193,874 UART:
194,022 UART: [state] CFI Enabled
261,943 UART: [state] LifecycleState = Unprovisioned
263,781 UART: [state] DebugLocked = No
265,943 UART: [state] WD Timer not started. Device not locked for debugging
269,268 UART: [kat] SHA2-256
448,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,987 UART: [kat] ++
460,439 UART: [kat] sha1
470,887 UART: [kat] SHA2-256
473,925 UART: [kat] SHA2-384
481,058 UART: [kat] SHA2-512-ACC
484,078 UART: [kat] ECC-384
2,949,631 UART: [kat] HMAC-384Kdf
2,972,653 UART: [kat] LMS
3,502,079 UART: [kat] --
3,505,863 UART: [cold-reset] ++
3,507,094 UART: [fht] FHT @ 0x50003400
3,517,940 UART: [idev] ++
3,518,509 UART: [idev] CDI.KEYID = 6
3,519,433 UART: [idev] SUBJECT.KEYID = 7
3,520,614 UART: [idev] UDS.KEYID = 0
3,521,544 ready_for_fw is high
3,521,769 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,665,793 UART: [idev] Erasing UDS.KEYID = 0
6,026,412 UART: [idev] Sha1 KeyId Algorithm
6,049,504 UART: [idev] --
6,052,373 UART: [ldev] ++
6,052,951 UART: [ldev] CDI.KEYID = 6
6,053,865 UART: [ldev] SUBJECT.KEYID = 5
6,055,180 UART: [ldev] AUTHORITY.KEYID = 7
6,056,372 UART: [ldev] FE.KEYID = 1
6,101,539 UART: [ldev] Erasing FE.KEYID = 1
8,603,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,073 UART: [ldev] --
10,392,619 UART: [fwproc] Wait for Commands...
10,394,505 UART: [fwproc] Recv command 0x46574c44
10,396,553 UART: [fwproc] Recv'd Img size: 114448 bytes
13,799,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,136 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,262,827 >>> mbox cmd response: success
14,263,234 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,267,526 UART: [afmc] ++
14,268,103 UART: [afmc] CDI.KEYID = 6
14,268,985 UART: [afmc] SUBJECT.KEYID = 7
14,270,197 UART: [afmc] AUTHORITY.KEYID = 5
16,807,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,304 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,143 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,977 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,106 UART: [afmc] --
18,607,091 UART: [cold-reset] --
18,609,655 UART: [state] Locking Datavault
18,615,501 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,187 UART: [state] Locking ICCM
18,619,772 UART: [exit] Launching FMC @ 0x40000130
18,628,169 UART:
18,628,405 UART: Running Caliptra FMC ...
18,629,506 UART:
18,629,661 UART: [state] CFI Enabled
18,688,744 UART: [fht] FMC Alias Private Key: 7
20,452,712 UART: [art] Extend RT PCRs Done
20,453,927 UART: [art] Lock RT PCRs Done
20,455,716 UART: [art] Populate DV Done
20,461,194 UART: [fht] FMC Alias Private Key: 7
20,462,898 UART: [art] Derive CDI
20,463,710 UART: [art] Store in in slot 0x4
20,521,393 UART: [art] Derive Key Pair
20,522,394 UART: [art] Store priv key in slot 0x5
22,985,964 UART: [art] Derive Key Pair - Done
22,998,957 UART: [art] Signing Cert with AUTHO
23,000,264 UART: RITY.KEYID = 7
24,712,039 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,550 UART: [art] PUB.X = C73D5100B2CF09B1506CB707CC8EF803BFABDF9541E26BACE17E3E05A32128089DE2A0A5A778E69C8D0272C4292DBE70
24,720,826 UART: [art] PUB.Y = 7F0FB9159DBFE4DDCDA11CD4D4AE27074DD514E48804BED8DFB3F89A171A6BBD03FE7D761BF33CC7BA736D18ED7D4159
24,728,155 UART: [art] SIG.R = 122805A310F41F34F35A6AEE5D490EADD539A0E6E9FCAF82FEBBAD53AA5B0E1702EEF8BE48EFD21036756509F369963A
24,735,510 UART: [art] SIG.S = 38762D144425B2E90ABB1826560237245F52683E2794FFD538875F7ED7F6C64889BF87128B5874FD0588D75E65FDB017
25,713,899 UART: Caliptra RT
25,714,614 UART: [state] CFI Enabled
25,888,347 UART: [rt] RT listening for mailbox commands...
25,919,698 UART: [rt]cmd =0x46504c54, len=4
25,921,355 >>> mbox cmd response data (8 bytes)
25,921,776 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,951,395 UART: [rt]cmd =0x46504c67, len=4
25,952,748 >>> mbox cmd response: failed
25,953,918 UART: [rt] FIPS self test
25,954,849 UART: [kat] ++
25,955,298 UART: [kat] sha1
25,959,650 UART: [kat] SHA2-256
25,961,475 UART: [kat] SHA2-384
25,964,323 UART: [kat] SHA2-512-ACC
25,966,534 UART: [kat] ECC-384
28,416,626 UART: [kat] HMAC-384Kdf
28,422,463 UART: [kat] LMS
28,620,446 UART: [kat] --
28,774,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
31,958,296 UART: [rt] Verify complete
32,095,187 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,125,248 UART: [rt]cmd =0x46504c67, len=4
32,126,585 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,385,231 ready_for_fw is high
3,385,646 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,072,241 >>> mbox cmd response: success
14,072,974 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,371,656 UART:
18,372,047 UART: Running Caliptra FMC ...
18,373,251 UART:
18,373,410 UART: [state] CFI Enabled
18,436,538 UART: [fht] FMC Alias Private Key: 7
20,199,872 UART: [art] Extend RT PCRs Done
20,201,231 UART: [art] Lock RT PCRs Done
20,203,075 UART: [art] Populate DV Done
20,208,326 UART: [fht] FMC Alias Private Key: 7
20,209,976 UART: [art] Derive CDI
20,210,793 UART: [art] Store in in slot 0x4
20,268,720 UART: [art] Derive Key Pair
20,269,714 UART: [art] Store priv key in slot 0x5
22,732,468 UART: [art] Derive Key Pair - Done
22,745,523 UART: [art] Signing Cert with AUTHO
22,746,831 UART: RITY.KEYID = 7
24,457,582 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,069 UART: [art] PUB.X = E0E28CA18EF79AC13EB08EFE3EF6A8A91E7C8F8804D5211D10FDB5459E87E8F39829331F79D8EEF08FEF6C633014B3EB
24,466,382 UART: [art] PUB.Y = B4073209D02265C0BD47F0C368FFC0BCCA339E02E6ED5BCD5BCC81616C66A62982D858AAE1546EA201433CD76D09C03B
24,473,673 UART: [art] SIG.R = 5CAFB1E2699738E977B38B313B984A0B27DBB393FEF44B46E97AEA4B43D9121A385F4B15D87BAFD2A49A855A9210F2DC
24,481,085 UART: [art] SIG.S = FE5E38560B783D9B703844B736F59E8F85A42DA361E7D97D1BC0AABDE1BDE906D2C4FFA33B3BCEE956C7FABEF24BEAD6
25,460,019 UART: Caliptra RT
25,460,733 UART: [state] CFI Enabled
25,625,378 UART: [rt] RT listening for mailbox commands...
25,656,670 UART: [rt]cmd =0x46504c54, len=4
25,658,224 >>> mbox cmd response data (8 bytes)
25,658,637 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,688,768 UART: [rt]cmd =0x46504c67, len=4
25,690,145 >>> mbox cmd response: failed
25,691,153 UART: [rt] FIPS self test
25,692,082 UART: [kat] ++
25,692,533 UART: [kat] sha1
25,696,954 UART: [kat] SHA2-256
25,698,780 UART: [kat] SHA2-384
25,701,802 UART: [kat] SHA2-512-ACC
25,704,046 UART: [kat] ECC-384
28,153,047 UART: [kat] HMAC-384Kdf
28,179,630 UART: [kat] LMS
28,377,575 UART: [kat] --
28,510,775 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
31,693,090 UART: [rt] Verify complete
31,832,182 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,862,031 UART: [rt]cmd =0x46504c67, len=4
31,863,624 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
192,603 UART:
192,983 UART: Running Caliptra ROM ...
194,130 UART:
603,570 UART: [state] CFI Enabled
618,605 UART: [state] LifecycleState = Unprovisioned
620,430 UART: [state] DebugLocked = No
622,822 UART: [state] WD Timer not started. Device not locked for debugging
626,504 UART: [kat] SHA2-256
805,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,255 UART: [kat] ++
817,791 UART: [kat] sha1
828,746 UART: [kat] SHA2-256
831,763 UART: [kat] SHA2-384
838,604 UART: [kat] SHA2-512-ACC
841,545 UART: [kat] ECC-384
3,283,743 UART: [kat] HMAC-384Kdf
3,296,219 UART: [kat] LMS
3,825,687 UART: [kat] --
3,829,756 UART: [cold-reset] ++
3,831,264 UART: [fht] FHT @ 0x50003400
3,841,965 UART: [idev] ++
3,842,535 UART: [idev] CDI.KEYID = 6
3,843,419 UART: [idev] SUBJECT.KEYID = 7
3,844,668 UART: [idev] UDS.KEYID = 0
3,845,591 ready_for_fw is high
3,845,816 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
3,989,939 UART: [idev] Erasing UDS.KEYID = 0
6,318,722 UART: [idev] Sha1 KeyId Algorithm
6,342,179 UART: [idev] --
6,346,332 UART: [ldev] ++
6,346,905 UART: [ldev] CDI.KEYID = 6
6,347,817 UART: [ldev] SUBJECT.KEYID = 5
6,348,982 UART: [ldev] AUTHORITY.KEYID = 7
6,350,211 UART: [ldev] FE.KEYID = 1
6,361,828 UART: [ldev] Erasing FE.KEYID = 1
8,832,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,950 UART: [ldev] --
10,624,175 UART: [fwproc] Wait for Commands...
10,626,165 UART: [fwproc] Recv command 0x46574c44
10,628,257 UART: [fwproc] Recv'd Img size: 114448 bytes
14,027,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
14,487,199 >>> mbox cmd response: success
14,487,645 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,491,835 UART: [afmc] ++
14,492,409 UART: [afmc] CDI.KEYID = 6
14,493,291 UART: [afmc] SUBJECT.KEYID = 7
14,494,505 UART: [afmc] AUTHORITY.KEYID = 5
16,994,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,255 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,026 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,021 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,089 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,302 UART: [afmc] --
18,791,304 UART: [cold-reset] --
18,795,158 UART: [state] Locking Datavault
18,799,919 UART: [state] Locking PCR0, PCR1 and PCR31
18,801,562 UART: [state] Locking ICCM
18,802,871 UART: [exit] Launching FMC @ 0x40000130
18,811,262 UART:
18,811,494 UART: Running Caliptra FMC ...
18,812,519 UART:
18,812,664 UART: [state] CFI Enabled
18,821,304 UART: [fht] FMC Alias Private Key: 7
20,578,861 UART: [art] Extend RT PCRs Done
20,580,072 UART: [art] Lock RT PCRs Done
20,581,576 UART: [art] Populate DV Done
20,586,876 UART: [fht] FMC Alias Private Key: 7
20,588,624 UART: [art] Derive CDI
20,589,359 UART: [art] Store in in slot 0x4
20,632,114 UART: [art] Derive Key Pair
20,633,174 UART: [art] Store priv key in slot 0x5
23,059,373 UART: [art] Derive Key Pair - Done
23,072,511 UART: [art] Signing Cert with AUTHO
23,073,823 UART: RITY.KEYID = 7
24,779,471 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,974 UART: [art] PUB.X = EF87AE048D5A4534F98DB9E7E0B1205CB3F48E5F3E2D3CB204C5A737C0067A2BBD845EDF15B803BF77D8C8FBA335CD3F
24,788,216 UART: [art] PUB.Y = 25AAC54C3707CB73E1BBC8E52BCAC8AF3913D2A8404CEFF483F9C74A938BFE305AEA6EA5C40A62ED962E3C761629AC15
24,795,549 UART: [art] SIG.R = B649DD4A1FE6FA6619849C38FF92765BC070F0261FFD6F1E3BEBFCEAB089AF250A261EF9F3DF102700849839AC614EE5
24,802,917 UART: [art] SIG.S = E80251F284786156DF4F2A1AE4D43AAFD230DD84E9FDA8A79C8A0BC4911C50064B76D4D139CE197A4EAD4CE2FF72E520
25,781,366 UART: Caliptra RT
25,782,057 UART: [state] CFI Enabled
25,899,754 UART: [rt] RT listening for mailbox commands...
25,931,191 UART: [rt]cmd =0x46504c54, len=4
25,932,986 >>> mbox cmd response data (8 bytes)
25,933,452 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,963,651 UART: [rt]cmd =0x46504c67, len=4
25,965,202 >>> mbox cmd response: failed
25,966,176 UART: [rt] FIPS self test
25,967,110 UART: [kat] ++
25,967,560 UART: [kat] sha1
25,971,815 UART: [kat] SHA2-256
25,973,639 UART: [kat] SHA2-384
25,976,660 UART: [kat] SHA2-512-ACC
25,978,871 UART: [kat] ECC-384
28,405,972 UART: [kat] HMAC-384Kdf
28,411,621 UART: [kat] LMS
28,609,558 UART: [kat] --
28,763,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
31,945,767 UART: [rt] Verify complete
32,107,201 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,136,836 UART: [rt]cmd =0x46504c67, len=4
32,138,287 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
3,696,235 ready_for_fw is high
3,696,861 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,273,629 >>> mbox cmd response: success
14,274,258 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,515,493 UART:
18,515,882 UART: Running Caliptra FMC ...
18,517,156 UART:
18,517,326 UART: [state] CFI Enabled
18,524,772 UART: [fht] FMC Alias Private Key: 7
20,281,880 UART: [art] Extend RT PCRs Done
20,283,093 UART: [art] Lock RT PCRs Done
20,284,784 UART: [art] Populate DV Done
20,289,969 UART: [fht] FMC Alias Private Key: 7
20,291,569 UART: [art] Derive CDI
20,292,309 UART: [art] Store in in slot 0x4
20,335,069 UART: [art] Derive Key Pair
20,336,114 UART: [art] Store priv key in slot 0x5
22,763,392 UART: [art] Derive Key Pair - Done
22,776,075 UART: [art] Signing Cert with AUTHO
22,777,377 UART: RITY.KEYID = 7
24,482,884 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,421 UART: [art] PUB.X = C762EFAB1FEFB4E817352A9B2BEE8B43AF3CA3AD9E741CF0BD8954D3138DCF2AC3E7AA299E3D90D367A9350F06CB5515
24,491,716 UART: [art] PUB.Y = 6026DBB476ADA46939E9165DC590829DF5D686A7E26D162718C9174B5BB9A78A202EB9475118FAA7FFBB3F1CC72443A3
24,498,972 UART: [art] SIG.R = 880F811C36C68B21350EB622C354AA50C1FA138F92879E4CBB9B29DB7BCB1F852FD9FB8459CC51B78C689A291E6DE446
24,506,368 UART: [art] SIG.S = 9E919F1A122545E1D530DEC8145FE59C5296C9233E58819053A004021B1F3B29FA02D9DA3AD1E131E9C7C7E0C12781C1
25,485,547 UART: Caliptra RT
25,486,263 UART: [state] CFI Enabled
25,603,472 UART: [rt] RT listening for mailbox commands...
25,635,032 UART: [rt]cmd =0x46504c54, len=4
25,636,426 >>> mbox cmd response data (8 bytes)
25,636,868 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,667,183 UART: [rt]cmd =0x46504c67, len=4
25,668,525 >>> mbox cmd response: failed
25,669,555 UART: [rt] FIPS self test
25,670,484 UART: [kat] ++
25,670,937 UART: [kat] sha1
25,675,494 UART: [kat] SHA2-256
25,677,323 UART: [kat] SHA2-384
25,680,096 UART: [kat] SHA2-512-ACC
25,682,329 UART: [kat] ECC-384
28,109,277 UART: [kat] HMAC-384Kdf
28,115,153 UART: [kat] LMS
28,313,096 UART: [kat] --
28,446,238 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
31,629,330 UART: [rt] Verify complete
31,810,713 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,840,507 UART: [rt]cmd =0x46504c67, len=4
31,842,094 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,442,615 ready_for_fw is high
3,443,044 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,739,458 >>> mbox cmd response: success
14,740,188 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,026,200 UART:
19,026,602 UART: Running Caliptra FMC ...
19,027,769 UART:
19,027,928 UART: [state] CFI Enabled
19,097,648 UART: [fht] FMC Alias Private Key: 7
20,862,008 UART: [art] Extend RT PCRs Done
20,863,226 UART: [art] Lock RT PCRs Done
20,864,963 UART: [art] Populate DV Done
20,870,282 UART: [fht] FMC Alias Private Key: 7
20,871,767 UART: [art] Derive CDI
20,872,529 UART: [art] Store in in slot 0x4
20,930,740 UART: [art] Derive Key Pair
20,931,772 UART: [art] Store priv key in slot 0x5
23,394,706 UART: [art] Derive Key Pair - Done
23,407,966 UART: [art] Signing Cert with AUTHO
23,409,263 UART: RITY.KEYID = 7
25,121,003 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,518 UART: [art] PUB.X = 880F8665C7782CB0B7ABE399D70F4ABC75B015D9315ED01DE869657627D56DEEF283536677A53DC247BD9D723A74F41B
25,129,721 UART: [art] PUB.Y = 45244EA8D821E729AF4BA01E1DC604849F01D88EB977B97AB460133D162787E78D406825319D35E5D89343A8B36CA1A7
25,137,006 UART: [art] SIG.R = 1EA88DCBD4C4E8C4191E793A601E4FCA89EAFEFF0993A5AEF774068C10D83D4CDF6C514A1653E54BB8AE755C0E5BC4D2
25,144,410 UART: [art] SIG.S = C2A791AE8741D6EF7C40DF7FA8DA0DCFBD3605B9300A74D564BD2E279028E74E8DFB3CCF34E64848A29C06C9A1E137F9
26,123,231 UART: Caliptra RT
26,123,917 UART: [state] CFI Enabled
26,289,388 UART: [rt] RT listening for mailbox commands...
26,320,796 UART: [rt]cmd =0x46504c54, len=4
26,322,429 >>> mbox cmd response data (8 bytes)
26,322,838 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,352,437 UART: [rt]cmd =0x46504c67, len=4
26,353,869 >>> mbox cmd response: failed
26,354,734 UART: [rt] FIPS self test
26,355,579 UART: [kat] ++
26,356,019 UART: [kat] sha1
26,360,462 UART: [kat] SHA2-256
26,362,306 UART: [kat] SHA2-384
26,365,153 UART: [kat] SHA2-512-ACC
26,367,365 UART: [kat] ECC-384
28,818,067 UART: [kat] HMAC-384Kdf
28,825,813 UART: [kat] LMS
29,023,773 UART: [kat] --
29,157,804 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,340,192 UART: [rt] Verify complete
32,495,931 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,525,727 UART: [rt]cmd =0x46504c67, len=4
32,527,233 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,754,101 ready_for_fw is high
3,754,535 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
14,965,114 >>> mbox cmd response: success
14,965,847 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,217,656 UART:
19,218,049 UART: Running Caliptra FMC ...
19,219,224 UART:
19,219,387 UART: [state] CFI Enabled
19,227,319 UART: [fht] FMC Alias Private Key: 7
20,984,577 UART: [art] Extend RT PCRs Done
20,985,801 UART: [art] Lock RT PCRs Done
20,987,493 UART: [art] Populate DV Done
20,992,694 UART: [fht] FMC Alias Private Key: 7
20,994,231 UART: [art] Derive CDI
20,994,978 UART: [art] Store in in slot 0x4
21,038,058 UART: [art] Derive Key Pair
21,039,068 UART: [art] Store priv key in slot 0x5
23,465,478 UART: [art] Derive Key Pair - Done
23,478,476 UART: [art] Signing Cert with AUTHO
23,479,832 UART: RITY.KEYID = 7
25,185,402 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,912 UART: [art] PUB.X = EC8609E91EC1402362C116F9A7EF05E83A96DEA6CDC6B612128C2B0CC5277652FC647C07E71D00AB7FB5B05D4E22DC87
25,194,169 UART: [art] PUB.Y = AC40DB39814D7C7B66C543355C12D376E3058423BA50871129C93BE55E49B3AD947EA1234E342090EA3E6502B0FF11A2
25,201,381 UART: [art] SIG.R = B9E73A480A6DB00F00458BF1D729B02A9352DC8E0683B736D12E46FA8EC62BBD865A64EC9CB573548B7C49E297AA7EC4
25,208,800 UART: [art] SIG.S = 8B33822E7F87359FE4022CFDB1237785662BDD774EB4BEE040FA7A50E2DF450AABC3A78778282393B77DE364C6F91EF1
26,187,049 UART: Caliptra RT
26,187,741 UART: [state] CFI Enabled
26,305,460 UART: [rt] RT listening for mailbox commands...
26,336,875 UART: [rt]cmd =0x46504c54, len=4
26,338,562 >>> mbox cmd response data (8 bytes)
26,339,005 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,368,795 UART: [rt]cmd =0x46504c67, len=4
26,370,140 >>> mbox cmd response: failed
26,371,112 UART: [rt] FIPS self test
26,371,960 UART: [kat] ++
26,372,423 UART: [kat] sha1
26,376,913 UART: [kat] SHA2-256
26,378,736 UART: [kat] SHA2-384
26,381,492 UART: [kat] SHA2-512-ACC
26,383,711 UART: [kat] ECC-384
28,810,848 UART: [kat] HMAC-384Kdf
28,816,742 UART: [kat] LMS
29,014,678 UART: [kat] --
29,148,607 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,330,806 UART: [rt] Verify complete
32,511,794 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,541,493 UART: [rt]cmd =0x46504c67, len=4
32,542,897 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,913 UART: [kat] SHA2-256
881,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,959 UART: [kat] ++
886,111 UART: [kat] sha1
890,431 UART: [kat] SHA2-256
892,369 UART: [kat] SHA2-384
895,006 UART: [kat] SHA2-512-ACC
896,907 UART: [kat] ECC-384
902,290 UART: [kat] HMAC-384Kdf
906,956 UART: [kat] LMS
1,475,152 UART: [kat] --
1,475,785 UART: [cold-reset] ++
1,476,323 UART: [fht] Storing FHT @ 0x50003400
1,479,110 UART: [idev] ++
1,479,278 UART: [idev] CDI.KEYID = 6
1,479,638 UART: [idev] SUBJECT.KEYID = 7
1,480,062 UART: [idev] UDS.KEYID = 0
1,480,407 ready_for_fw is high
1,480,407 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,170 UART: [idev] Erasing UDS.KEYID = 0
1,504,570 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,384 UART: [idev] --
1,514,299 UART: [ldev] ++
1,514,467 UART: [ldev] CDI.KEYID = 6
1,514,830 UART: [ldev] SUBJECT.KEYID = 5
1,515,256 UART: [ldev] AUTHORITY.KEYID = 7
1,515,719 UART: [ldev] FE.KEYID = 1
1,520,765 UART: [ldev] Erasing FE.KEYID = 1
1,545,450 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,706 UART: [ldev] --
1,585,193 UART: [fwproc] Waiting for Commands...
1,585,874 UART: [fwproc] Received command 0x46574c44
1,586,665 UART: [fwproc] Received Image of size 114448 bytes
2,885,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,934 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,286 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,079,279 >>> mbox cmd response: success
3,079,279 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,080,397 UART: [afmc] ++
3,080,565 UART: [afmc] CDI.KEYID = 6
3,080,927 UART: [afmc] SUBJECT.KEYID = 7
3,081,352 UART: [afmc] AUTHORITY.KEYID = 5
3,116,493 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,875 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,655 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,383 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,268 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,958 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,713 UART: [afmc] --
3,159,735 UART: [cold-reset] --
3,160,589 UART: [state] Locking Datavault
3,161,466 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,070 UART: [state] Locking ICCM
3,162,592 UART: [exit] Launching FMC @ 0x40000130
3,167,921 UART:
3,167,937 UART: Running Caliptra FMC ...
3,168,345 UART:
3,168,399 UART: [state] CFI Enabled
3,178,816 UART: [fht] FMC Alias Private Key: 7
3,287,229 UART: [art] Extend RT PCRs Done
3,287,657 UART: [art] Lock RT PCRs Done
3,289,111 UART: [art] Populate DV Done
3,297,344 UART: [fht] FMC Alias Private Key: 7
3,298,420 UART: [art] Derive CDI
3,298,700 UART: [art] Store in in slot 0x4
3,384,475 UART: [art] Derive Key Pair
3,384,835 UART: [art] Store priv key in slot 0x5
3,398,275 UART: [art] Derive Key Pair - Done
3,412,876 UART: [art] Signing Cert with AUTHO
3,413,356 UART: RITY.KEYID = 7
3,428,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,939 UART: [art] PUB.X = 9CDEFEABE362E1406EA1A6FC615450678D39A9487C605687C8979C24D0E75959BF58F9BE82D681962B62AF1310434A7A
3,435,711 UART: [art] PUB.Y = ED1FB5BC0B1C32690831100062156F3940C03C49670DFD1901F12B4F4B0FE52D943616F2CB066C754D007271830054E2
3,442,569 UART: [art] SIG.R = C388E39CBB635D5FE5026D4A83A2DFA6C56249EC046432212F7C984E9EC710A1A6D1F360224803C86AC51529B139B982
3,449,330 UART: [art] SIG.S = 357A2A73171A9B92184A8107F11E6981E586B9989C9BEA9F371171EAF8C4152A9329B71DAA940C5D816C88B19847DCCC
3,472,813 UART: Caliptra RT
3,473,066 UART: [state] CFI Enabled
3,580,855 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,089 UART: [rt]cmd =0x46504c54, len=4
3,612,286 >>> mbox cmd response data (8 bytes)
3,612,287 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,641,874 UART: [rt]cmd =0x46504c67, len=4
3,643,017 >>> mbox cmd response: failed
3,643,229 UART: [rt] FIPS self test
3,643,560 UART: [kat] ++
3,643,712 UART: [kat] sha1
3,648,051 UART: [kat] SHA2-256
3,649,981 UART: [kat] SHA2-384
3,652,702 UART: [kat] SHA2-512-ACC
3,654,597 UART: [kat] ECC-384
3,663,984 UART: [kat] HMAC-384Kdf
3,668,645 UART: [kat] LMS
3,917,536 UART: [kat] --
4,712,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,141,200 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,142,767 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,171,985 UART: [rt]cmd =0x46504c67, len=4
6,173,235 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,389 ready_for_fw is high
1,362,389 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,929,025 >>> mbox cmd response: success
2,929,025 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,990,155 UART:
2,990,171 UART: Running Caliptra FMC ...
2,990,579 UART:
2,990,633 UART: [state] CFI Enabled
3,000,912 UART: [fht] FMC Alias Private Key: 7
3,109,001 UART: [art] Extend RT PCRs Done
3,109,429 UART: [art] Lock RT PCRs Done
3,111,085 UART: [art] Populate DV Done
3,119,530 UART: [fht] FMC Alias Private Key: 7
3,120,464 UART: [art] Derive CDI
3,120,744 UART: [art] Store in in slot 0x4
3,206,401 UART: [art] Derive Key Pair
3,206,761 UART: [art] Store priv key in slot 0x5
3,219,287 UART: [art] Derive Key Pair - Done
3,234,154 UART: [art] Signing Cert with AUTHO
3,234,634 UART: RITY.KEYID = 7
3,249,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,715 UART: [art] PUB.X = 8D39B91AD1E8FE8554B14E388BA0E7337A8FAD74DDBDFC7C7A63197E31A3454C26B10D6E142C40AF57CFC928A07D4BE1
3,257,500 UART: [art] PUB.Y = 89C9B9222791BBA9D3116C8F4A7B9AED9B78C9310C04B16E90A3FE2B7C51B854411848F2421D53CBA397853D3554553C
3,264,444 UART: [art] SIG.R = 1775E4EB408FDE301CC35243B547EC494790C580BF496B6C70F485A18B9A13BCBEEA91EE373AE55F8E63F25F4D450C3D
3,271,223 UART: [art] SIG.S = C9D4C8FE0329105B42E23B795D717CCDAC06E310F3CFA7BAA32399E73A43A8FFD05CAE26F2476D2E7E368DAAEFE8A3E2
3,294,826 UART: Caliptra RT
3,295,079 UART: [state] CFI Enabled
3,403,364 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,826 UART: [rt]cmd =0x46504c54, len=4
3,434,881 >>> mbox cmd response data (8 bytes)
3,434,882 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,464,341 UART: [rt]cmd =0x46504c67, len=4
3,465,358 >>> mbox cmd response: failed
3,465,598 UART: [rt] FIPS self test
3,465,929 UART: [kat] ++
3,466,081 UART: [kat] sha1
3,470,300 UART: [kat] SHA2-256
3,472,230 UART: [kat] SHA2-384
3,475,021 UART: [kat] SHA2-512-ACC
3,476,916 UART: [kat] ECC-384
3,486,295 UART: [kat] HMAC-384Kdf
3,490,734 UART: [kat] LMS
3,739,625 UART: [kat] --
4,427,156 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,856,464 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,865,118 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,894,404 UART: [rt]cmd =0x46504c67, len=4
5,895,578 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,046 UART: [kat] SHA2-256
881,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,092 UART: [kat] ++
886,244 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,081 UART: [kat] SHA2-512-ACC
896,982 UART: [kat] ECC-384
902,713 UART: [kat] HMAC-384Kdf
907,265 UART: [kat] LMS
1,475,461 UART: [kat] --
1,476,522 UART: [cold-reset] ++
1,476,966 UART: [fht] Storing FHT @ 0x50003400
1,479,669 UART: [idev] ++
1,479,837 UART: [idev] CDI.KEYID = 6
1,480,197 UART: [idev] SUBJECT.KEYID = 7
1,480,621 UART: [idev] UDS.KEYID = 0
1,480,966 ready_for_fw is high
1,480,966 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,488,567 UART: [idev] Erasing UDS.KEYID = 0
1,504,973 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,625 UART: [idev] --
1,514,474 UART: [ldev] ++
1,514,642 UART: [ldev] CDI.KEYID = 6
1,515,005 UART: [ldev] SUBJECT.KEYID = 5
1,515,431 UART: [ldev] AUTHORITY.KEYID = 7
1,515,894 UART: [ldev] FE.KEYID = 1
1,521,374 UART: [ldev] Erasing FE.KEYID = 1
1,546,657 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,565 UART: [ldev] --
1,586,062 UART: [fwproc] Waiting for Commands...
1,586,775 UART: [fwproc] Received command 0x46574c44
1,587,566 UART: [fwproc] Received Image of size 114448 bytes
2,887,025 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,887 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,239 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,398 >>> mbox cmd response: success
3,080,398 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,081,606 UART: [afmc] ++
3,081,774 UART: [afmc] CDI.KEYID = 6
3,082,136 UART: [afmc] SUBJECT.KEYID = 7
3,082,561 UART: [afmc] AUTHORITY.KEYID = 5
3,117,774 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,110 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,503 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,193 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,088 UART: [afmc] --
3,161,124 UART: [cold-reset] --
3,161,858 UART: [state] Locking Datavault
3,163,135 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,739 UART: [state] Locking ICCM
3,164,203 UART: [exit] Launching FMC @ 0x40000130
3,169,532 UART:
3,169,548 UART: Running Caliptra FMC ...
3,169,956 UART:
3,170,099 UART: [state] CFI Enabled
3,180,806 UART: [fht] FMC Alias Private Key: 7
3,288,723 UART: [art] Extend RT PCRs Done
3,289,151 UART: [art] Lock RT PCRs Done
3,290,769 UART: [art] Populate DV Done
3,298,808 UART: [fht] FMC Alias Private Key: 7
3,299,748 UART: [art] Derive CDI
3,300,028 UART: [art] Store in in slot 0x4
3,385,801 UART: [art] Derive Key Pair
3,386,161 UART: [art] Store priv key in slot 0x5
3,399,561 UART: [art] Derive Key Pair - Done
3,414,555 UART: [art] Signing Cert with AUTHO
3,415,035 UART: RITY.KEYID = 7
3,430,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,536 UART: [art] PUB.X = C52A442CC4F05FE4DD96FEDFCBC7354AAD192A6C8A7D205C0BB3D2C3CC443921759467D4FFC91DDA8BB7D53FE449F693
3,438,327 UART: [art] PUB.Y = E350B425A1063AFB0C9BDDB61BE34730FD55C3FA103E79FE9F2290ABCC175871E1640EA903FD9A8C7876689821FEEE48
3,445,277 UART: [art] SIG.R = A6AA0B40D139716C9902C65B3EB5117E7DB57D21E9669E4F05FD6A0F341100E66CCA5B3526D130019F7965F1FE3954BD
3,452,014 UART: [art] SIG.S = F09B387B434B370CCEAD2512A54B295A5AC9476E74A1426BFB07D7AA0B2E5951CEA59E8D4EA21B435D4CBC13F40B1A52
3,475,381 UART: Caliptra RT
3,475,726 UART: [state] CFI Enabled
3,583,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,072 UART: [rt]cmd =0x46504c54, len=4
3,615,243 >>> mbox cmd response data (8 bytes)
3,615,244 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,644,721 UART: [rt]cmd =0x46504c67, len=4
3,645,798 >>> mbox cmd response: failed
3,645,974 UART: [rt] FIPS self test
3,646,305 UART: [kat] ++
3,646,457 UART: [kat] sha1
3,650,622 UART: [kat] SHA2-256
3,652,552 UART: [kat] SHA2-384
3,655,277 UART: [kat] SHA2-512-ACC
3,657,172 UART: [kat] ECC-384
3,666,863 UART: [kat] HMAC-384Kdf
3,671,408 UART: [kat] LMS
3,920,299 UART: [kat] --
4,715,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,144,529 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,145,548 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,174,698 UART: [rt]cmd =0x46504c67, len=4
6,175,770 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,960 ready_for_fw is high
1,362,960 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,931,396 >>> mbox cmd response: success
2,931,396 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,993,854 UART:
2,993,870 UART: Running Caliptra FMC ...
2,994,278 UART:
2,994,421 UART: [state] CFI Enabled
3,005,354 UART: [fht] FMC Alias Private Key: 7
3,112,583 UART: [art] Extend RT PCRs Done
3,113,011 UART: [art] Lock RT PCRs Done
3,114,259 UART: [art] Populate DV Done
3,122,304 UART: [fht] FMC Alias Private Key: 7
3,123,242 UART: [art] Derive CDI
3,123,522 UART: [art] Store in in slot 0x4
3,209,125 UART: [art] Derive Key Pair
3,209,485 UART: [art] Store priv key in slot 0x5
3,223,289 UART: [art] Derive Key Pair - Done
3,237,961 UART: [art] Signing Cert with AUTHO
3,238,441 UART: RITY.KEYID = 7
3,253,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,516 UART: [art] PUB.X = 63667E517E5A321F42C16F05C302045AA3FE52BCA5362AC3FB89DEC80EBF10C764F6A2893B972988D522FF8D2C636032
3,261,278 UART: [art] PUB.Y = 1E416A87694426D4A9F2A3858014F3A7A2D5DF1DCC4C5A014AC7BA99302AA2674159896A3C8B9575FDA98DE7740B8F04
3,268,223 UART: [art] SIG.R = 5B50F34E900297D86DECFA79530FC973D54586F2EFB4F15D3159935AA5B12F92F56E1E9CA61770AB0B4FE3091CB64439
3,274,987 UART: [art] SIG.S = 57063B5195E079A46296926E196823C8AD8F1459DFD8DE5E393F6C9241923414ED2D6F579533011960F449FB882CBE6E
3,298,392 UART: Caliptra RT
3,298,737 UART: [state] CFI Enabled
3,406,713 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,315 UART: [rt]cmd =0x46504c54, len=4
3,438,638 >>> mbox cmd response data (8 bytes)
3,438,639 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,468,348 UART: [rt]cmd =0x46504c67, len=4
3,469,335 >>> mbox cmd response: failed
3,469,495 UART: [rt] FIPS self test
3,469,826 UART: [kat] ++
3,469,978 UART: [kat] sha1
3,474,163 UART: [kat] SHA2-256
3,476,093 UART: [kat] SHA2-384
3,478,820 UART: [kat] SHA2-512-ACC
3,480,715 UART: [kat] ECC-384
3,490,344 UART: [kat] HMAC-384Kdf
3,494,967 UART: [kat] LMS
3,743,858 UART: [kat] --
4,431,299 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,860,941 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,869,095 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,898,423 UART: [rt]cmd =0x46504c67, len=4
5,899,575 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
893,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,877 UART: [kat] ++
898,029 UART: [kat] sha1
902,361 UART: [kat] SHA2-256
904,301 UART: [kat] SHA2-384
906,892 UART: [kat] SHA2-512-ACC
908,793 UART: [kat] ECC-384
918,976 UART: [kat] HMAC-384Kdf
923,380 UART: [kat] LMS
1,171,708 UART: [kat] --
1,172,795 UART: [cold-reset] ++
1,173,221 UART: [fht] FHT @ 0x50003400
1,175,856 UART: [idev] ++
1,176,024 UART: [idev] CDI.KEYID = 6
1,176,384 UART: [idev] SUBJECT.KEYID = 7
1,176,808 UART: [idev] UDS.KEYID = 0
1,177,153 ready_for_fw is high
1,177,153 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,940 UART: [idev] Erasing UDS.KEYID = 0
1,201,361 UART: [idev] Sha1 KeyId Algorithm
1,209,677 UART: [idev] --
1,210,703 UART: [ldev] ++
1,210,871 UART: [ldev] CDI.KEYID = 6
1,211,234 UART: [ldev] SUBJECT.KEYID = 5
1,211,660 UART: [ldev] AUTHORITY.KEYID = 7
1,212,123 UART: [ldev] FE.KEYID = 1
1,217,277 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,645 UART: [ldev] --
1,282,962 UART: [fwproc] Wait for Commands...
1,283,610 UART: [fwproc] Recv command 0x46574c44
1,284,338 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,776,616 >>> mbox cmd response: success
2,776,616 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,777,688 UART: [afmc] ++
2,777,856 UART: [afmc] CDI.KEYID = 6
2,778,218 UART: [afmc] SUBJECT.KEYID = 7
2,778,643 UART: [afmc] AUTHORITY.KEYID = 5
2,814,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,258 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,977 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,763 UART: [afmc] --
2,857,779 UART: [cold-reset] --
2,858,721 UART: [state] Locking Datavault
2,859,832 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,436 UART: [state] Locking ICCM
2,861,040 UART: [exit] Launching FMC @ 0x40000130
2,866,369 UART:
2,866,385 UART: Running Caliptra FMC ...
2,866,793 UART:
2,866,847 UART: [state] CFI Enabled
2,877,284 UART: [fht] FMC Alias Private Key: 7
2,984,987 UART: [art] Extend RT PCRs Done
2,985,415 UART: [art] Lock RT PCRs Done
2,986,927 UART: [art] Populate DV Done
2,995,260 UART: [fht] FMC Alias Private Key: 7
2,996,386 UART: [art] Derive CDI
2,996,666 UART: [art] Store in in slot 0x4
3,082,193 UART: [art] Derive Key Pair
3,082,553 UART: [art] Store priv key in slot 0x5
3,095,545 UART: [art] Derive Key Pair - Done
3,109,968 UART: [art] Signing Cert with AUTHO
3,110,448 UART: RITY.KEYID = 7
3,125,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,225 UART: [art] PUB.X = CF52775E2D242729B3A6EB5C48DF4BF5F65BD0F407BAA77E48398F695BDB6083DB563ECDDEF3CA356E121EEEFFC6AB16
3,133,018 UART: [art] PUB.Y = 95CE6D9812C89956F2D4B2600A22976C3FDAF71FB0E616393032D917573103C32B1566F63641F78D8A99092A63A66610
3,139,947 UART: [art] SIG.R = 1C49CFAA3E91BFDE7F942C32B18E036DA192AD05F967945493033EE9CFC5FABDAACD0802C864F221FDF50873C61577D8
3,146,715 UART: [art] SIG.S = C9BD18C9212E64AFFDE5D91D30863EA39691754B75B4F50C6B5B5D2E6B9A518A4D6D9ADB7A9B2B898B028109FBF4510B
3,170,288 UART: Caliptra RT
3,170,541 UART: [state] CFI Enabled
3,277,700 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,204 UART: [rt]cmd =0x46504c54, len=4
3,309,467 >>> mbox cmd response data (8 bytes)
3,309,468 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,339,119 UART: [rt]cmd =0x46504c67, len=4
3,340,120 >>> mbox cmd response: failed
3,340,394 UART: [rt] FIPS self test
3,340,725 UART: [kat] ++
3,340,877 UART: [kat] sha1
3,345,084 UART: [kat] SHA2-256
3,347,014 UART: [kat] SHA2-384
3,349,785 UART: [kat] SHA2-512-ACC
3,351,680 UART: [kat] ECC-384
3,361,709 UART: [kat] HMAC-384Kdf
3,366,046 UART: [kat] LMS
3,614,937 UART: [kat] --
4,419,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,848,471 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,849,869 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,229 UART: [rt]cmd =0x46504c67, len=4
5,880,263 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,119 ready_for_fw is high
1,059,119 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,269 >>> mbox cmd response: success
2,626,269 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,688,583 UART:
2,688,599 UART: Running Caliptra FMC ...
2,689,007 UART:
2,689,061 UART: [state] CFI Enabled
2,699,218 UART: [fht] FMC Alias Private Key: 7
2,807,081 UART: [art] Extend RT PCRs Done
2,807,509 UART: [art] Lock RT PCRs Done
2,809,213 UART: [art] Populate DV Done
2,817,426 UART: [fht] FMC Alias Private Key: 7
2,818,542 UART: [art] Derive CDI
2,818,822 UART: [art] Store in in slot 0x4
2,904,485 UART: [art] Derive Key Pair
2,904,845 UART: [art] Store priv key in slot 0x5
2,917,869 UART: [art] Derive Key Pair - Done
2,932,857 UART: [art] Signing Cert with AUTHO
2,933,337 UART: RITY.KEYID = 7
2,948,807 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,572 UART: [art] PUB.X = 513B2299EF8B94EBAFD3D2D8F7960F17DA797008E1246392C272BE240D4C8CE84B71225446C5104F225E53C5F7050F52
2,956,325 UART: [art] PUB.Y = 768B9B7A4E0EB87827AA8DFE1BC7D4A367C7BDD5453186A6055CA5E66E6631A7A4B425ADBE083F05A48B7264EF746798
2,963,273 UART: [art] SIG.R = A32040566EB9F4861D6EA80162BFB1EFE874E3641B086B4E6EE2AEA4756727AF9503A800A154BBBA9CDCD7225B39D065
2,970,022 UART: [art] SIG.S = A4C279ECB157B5D99BDBB2F2E9B151EC9D9ADA2CC48C34BDE3B9887939BFA20C523ED0A714D8CCED55AC2BE652DE39DD
2,994,236 UART: Caliptra RT
2,994,489 UART: [state] CFI Enabled
3,102,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,069 UART: [rt]cmd =0x46504c54, len=4
3,134,208 >>> mbox cmd response data (8 bytes)
3,134,209 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,163,848 UART: [rt]cmd =0x46504c67, len=4
3,164,647 >>> mbox cmd response: failed
3,164,855 UART: [rt] FIPS self test
3,165,186 UART: [kat] ++
3,165,338 UART: [kat] sha1
3,169,601 UART: [kat] SHA2-256
3,171,531 UART: [kat] SHA2-384
3,174,186 UART: [kat] SHA2-512-ACC
3,176,081 UART: [kat] ECC-384
3,186,070 UART: [kat] HMAC-384Kdf
3,190,697 UART: [kat] LMS
3,439,588 UART: [kat] --
4,138,623 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,568,162 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,574,406 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,603,618 UART: [rt]cmd =0x46504c67, len=4
5,604,636 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
893,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,972 UART: [kat] ++
898,124 UART: [kat] sha1
902,380 UART: [kat] SHA2-256
904,320 UART: [kat] SHA2-384
907,089 UART: [kat] SHA2-512-ACC
908,990 UART: [kat] ECC-384
918,541 UART: [kat] HMAC-384Kdf
923,085 UART: [kat] LMS
1,171,413 UART: [kat] --
1,172,518 UART: [cold-reset] ++
1,172,944 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 ready_for_fw is high
1,176,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,184,545 UART: [idev] Erasing UDS.KEYID = 0
1,201,782 UART: [idev] Sha1 KeyId Algorithm
1,210,208 UART: [idev] --
1,211,264 UART: [ldev] ++
1,211,432 UART: [ldev] CDI.KEYID = 6
1,211,795 UART: [ldev] SUBJECT.KEYID = 5
1,212,221 UART: [ldev] AUTHORITY.KEYID = 7
1,212,684 UART: [ldev] FE.KEYID = 1
1,217,854 UART: [ldev] Erasing FE.KEYID = 1
1,244,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,730 UART: [ldev] --
1,284,023 UART: [fwproc] Wait for Commands...
1,284,837 UART: [fwproc] Recv command 0x46574c44
1,285,565 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,997 >>> mbox cmd response: success
2,777,997 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,779,105 UART: [afmc] ++
2,779,273 UART: [afmc] CDI.KEYID = 6
2,779,635 UART: [afmc] SUBJECT.KEYID = 7
2,780,060 UART: [afmc] AUTHORITY.KEYID = 5
2,815,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,808 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,421 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,140 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,798 UART: [afmc] --
2,858,846 UART: [cold-reset] --
2,859,588 UART: [state] Locking Datavault
2,860,905 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,509 UART: [state] Locking ICCM
2,862,109 UART: [exit] Launching FMC @ 0x40000130
2,867,438 UART:
2,867,454 UART: Running Caliptra FMC ...
2,867,862 UART:
2,868,005 UART: [state] CFI Enabled
2,878,980 UART: [fht] FMC Alias Private Key: 7
2,987,115 UART: [art] Extend RT PCRs Done
2,987,543 UART: [art] Lock RT PCRs Done
2,988,977 UART: [art] Populate DV Done
2,997,022 UART: [fht] FMC Alias Private Key: 7
2,998,118 UART: [art] Derive CDI
2,998,398 UART: [art] Store in in slot 0x4
3,084,181 UART: [art] Derive Key Pair
3,084,541 UART: [art] Store priv key in slot 0x5
3,097,679 UART: [art] Derive Key Pair - Done
3,112,415 UART: [art] Signing Cert with AUTHO
3,112,895 UART: RITY.KEYID = 7
3,128,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,030 UART: [art] PUB.X = 0FDB612834B4E161E47AF3CA79AA87500DD6622493EC5B3A1ADC1A7C7073420CAD60A593F265F231CC81F3DDC7191964
3,135,799 UART: [art] PUB.Y = ECA85C6678CA0C8A0746CC71445A71D9899D18FDFFF25EAC39BEAE2894B89F8FCD97083C09E04364AE613A870F7C495A
3,142,748 UART: [art] SIG.R = DBBEC4A76203B4D47AA90164C50E78F03522527A75073619EE1085C3B199E180EB678294393BE0A69B00CBC262B2D23A
3,149,484 UART: [art] SIG.S = 16C527264B20D1D3A993416FD70C9C9E967D7D56F66D83979DF8C6871D60A6CB0C2650B3E5B0550BB0EDA6B3A1DBFEB4
3,173,694 UART: Caliptra RT
3,174,039 UART: [state] CFI Enabled
3,282,412 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,018 UART: [rt]cmd =0x46504c54, len=4
3,314,125 >>> mbox cmd response data (8 bytes)
3,314,126 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,343,719 UART: [rt]cmd =0x46504c67, len=4
3,344,602 >>> mbox cmd response: failed
3,344,810 UART: [rt] FIPS self test
3,345,141 UART: [kat] ++
3,345,293 UART: [kat] sha1
3,349,466 UART: [kat] SHA2-256
3,351,396 UART: [kat] SHA2-384
3,354,379 UART: [kat] SHA2-512-ACC
3,356,274 UART: [kat] ECC-384
3,366,101 UART: [kat] HMAC-384Kdf
3,370,580 UART: [kat] LMS
3,619,471 UART: [kat] --
4,423,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,853,451 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,854,351 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,883,793 UART: [rt]cmd =0x46504c67, len=4
5,884,839 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,800 ready_for_fw is high
1,060,800 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,629,428 >>> mbox cmd response: success
2,629,428 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,691,302 UART:
2,691,318 UART: Running Caliptra FMC ...
2,691,726 UART:
2,691,869 UART: [state] CFI Enabled
2,702,938 UART: [fht] FMC Alias Private Key: 7
2,810,865 UART: [art] Extend RT PCRs Done
2,811,293 UART: [art] Lock RT PCRs Done
2,813,085 UART: [art] Populate DV Done
2,821,496 UART: [fht] FMC Alias Private Key: 7
2,822,494 UART: [art] Derive CDI
2,822,774 UART: [art] Store in in slot 0x4
2,908,565 UART: [art] Derive Key Pair
2,908,925 UART: [art] Store priv key in slot 0x5
2,921,799 UART: [art] Derive Key Pair - Done
2,936,453 UART: [art] Signing Cert with AUTHO
2,936,933 UART: RITY.KEYID = 7
2,951,757 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,522 UART: [art] PUB.X = 110B180F8E9D5F48304BB62E4185FCA0671E3953670798C5A0F9D1B800A8846F5878C54E783887CB31F3FF73E39D21E3
2,959,257 UART: [art] PUB.Y = E932BBA89D13AF34932C94DCA34750664A297F155546CC2E1BE25A0B53E32B8457C28CF17A7016166A0FDF7C79F20552
2,966,200 UART: [art] SIG.R = 712367CE52FDC8636F59348A2C81DD7034CBDC602AA94765F1E3DDB6E447E6B112ED020B80FAA5E813382A0BC64CDD0B
2,972,972 UART: [art] SIG.S = A3273F98144E2A7D8A4F1F7EA08B69A680A3CBFDC5ACBF9F22873E0E0A6F6884203E48B939AB23C9F60DFB8694BA9C50
2,996,850 UART: Caliptra RT
2,997,195 UART: [state] CFI Enabled
3,105,132 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,666 UART: [rt]cmd =0x46504c54, len=4
3,136,857 >>> mbox cmd response data (8 bytes)
3,136,858 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,166,591 UART: [rt]cmd =0x46504c67, len=4
3,167,676 >>> mbox cmd response: failed
3,167,864 UART: [rt] FIPS self test
3,168,195 UART: [kat] ++
3,168,347 UART: [kat] sha1
3,172,586 UART: [kat] SHA2-256
3,174,516 UART: [kat] SHA2-384
3,177,211 UART: [kat] SHA2-512-ACC
3,179,106 UART: [kat] ECC-384
3,189,117 UART: [kat] HMAC-384Kdf
3,193,742 UART: [kat] LMS
3,442,633 UART: [kat] --
4,141,576 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,571,553 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,577,435 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,606,679 UART: [rt]cmd =0x46504c67, len=4
5,607,781 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,825 UART: [state] WD Timer not started. Device not locked for debugging
88,098 UART: [kat] SHA2-256
891,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,777 UART: [kat] ++
895,929 UART: [kat] sha1
900,181 UART: [kat] SHA2-256
902,121 UART: [kat] SHA2-384
904,948 UART: [kat] SHA2-512-ACC
906,849 UART: [kat] ECC-384
916,534 UART: [kat] HMAC-384Kdf
921,208 UART: [kat] LMS
1,169,520 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,767 UART: [fht] FHT @ 0x50003400
1,173,503 UART: [idev] ++
1,173,671 UART: [idev] CDI.KEYID = 6
1,174,032 UART: [idev] SUBJECT.KEYID = 7
1,174,457 UART: [idev] UDS.KEYID = 0
1,174,803 ready_for_fw is high
1,174,803 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,481 UART: [idev] Erasing UDS.KEYID = 0
1,199,445 UART: [idev] Sha1 KeyId Algorithm
1,208,373 UART: [idev] --
1,209,388 UART: [ldev] ++
1,209,556 UART: [ldev] CDI.KEYID = 6
1,209,920 UART: [ldev] SUBJECT.KEYID = 5
1,210,347 UART: [ldev] AUTHORITY.KEYID = 7
1,210,810 UART: [ldev] FE.KEYID = 1
1,215,818 UART: [ldev] Erasing FE.KEYID = 1
1,242,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,596 UART: [ldev] --
1,281,916 UART: [fwproc] Wait for Commands...
1,282,517 UART: [fwproc] Recv command 0x46574c44
1,283,250 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,774,742 >>> mbox cmd response: success
2,774,742 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,775,881 UART: [afmc] ++
2,776,049 UART: [afmc] CDI.KEYID = 6
2,776,412 UART: [afmc] SUBJECT.KEYID = 7
2,776,838 UART: [afmc] AUTHORITY.KEYID = 5
2,811,945 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,865 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,748 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,467 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,464 UART: [afmc] --
2,855,418 UART: [cold-reset] --
2,856,408 UART: [state] Locking Datavault
2,857,307 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,911 UART: [state] Locking ICCM
2,858,429 UART: [exit] Launching FMC @ 0x40000130
2,863,758 UART:
2,863,774 UART: Running Caliptra FMC ...
2,864,182 UART:
2,864,236 UART: [state] CFI Enabled
2,875,025 UART: [fht] FMC Alias Private Key: 7
2,983,500 UART: [art] Extend RT PCRs Done
2,983,928 UART: [art] Lock RT PCRs Done
2,985,528 UART: [art] Populate DV Done
2,993,577 UART: [fht] FMC Alias Private Key: 7
2,994,751 UART: [art] Derive CDI
2,995,031 UART: [art] Store in in slot 0x4
3,080,798 UART: [art] Derive Key Pair
3,081,158 UART: [art] Store priv key in slot 0x5
3,094,246 UART: [art] Derive Key Pair - Done
3,109,240 UART: [art] Signing Cert with AUTHO
3,109,720 UART: RITY.KEYID = 7
3,124,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,373 UART: [art] PUB.X = 033A83FA97397C6DD9B384CCC7971B4D69AEA794283314ACC42C80BB7B23A97683512A65097ED20A5A07D4C59C0D98B2
3,132,132 UART: [art] PUB.Y = BF3BB808B5B9322AD82BFDAEADDBB978CCC9D967FB8F8A60986113A0E5D66A8A920B344ACEC66700461673A1AF7AB61F
3,139,076 UART: [art] SIG.R = 9851CB9FC45ADC9E82D1FF79AC6C37A7BB50358768C2B39D2E67C49E9C3B5933A03624DDC1D7635F06D0118CC01C3D24
3,145,853 UART: [art] SIG.S = 00E526842E54406E6C35939ED813D8BABDED337824C1A35D505C4EED324698F1A83A2758C288CA60E6C341CDFEDE39F7
3,169,794 UART: Caliptra RT
3,170,047 UART: [state] CFI Enabled
3,277,307 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,871 UART: [rt]cmd =0x46504c54, len=4
3,308,964 >>> mbox cmd response data (8 bytes)
3,308,965 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,338,412 UART: [rt]cmd =0x46504c67, len=4
3,339,443 >>> mbox cmd response: failed
3,339,573 UART: [rt] FIPS self test
3,339,904 UART: [kat] ++
3,340,056 UART: [kat] sha1
3,344,125 UART: [kat] SHA2-256
3,346,055 UART: [kat] SHA2-384
3,348,746 UART: [kat] SHA2-512-ACC
3,350,641 UART: [kat] ECC-384
3,360,518 UART: [kat] HMAC-384Kdf
3,365,125 UART: [kat] LMS
3,614,016 UART: [kat] --
4,416,011 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,846,276 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,849,192 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,528 UART: [rt]cmd =0x46504c67, len=4
5,879,634 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,192 ready_for_fw is high
1,056,192 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,626,050 >>> mbox cmd response: success
2,626,050 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,688,766 UART:
2,688,782 UART: Running Caliptra FMC ...
2,689,190 UART:
2,689,244 UART: [state] CFI Enabled
2,699,953 UART: [fht] FMC Alias Private Key: 7
2,807,538 UART: [art] Extend RT PCRs Done
2,807,966 UART: [art] Lock RT PCRs Done
2,809,556 UART: [art] Populate DV Done
2,817,857 UART: [fht] FMC Alias Private Key: 7
2,819,033 UART: [art] Derive CDI
2,819,313 UART: [art] Store in in slot 0x4
2,905,296 UART: [art] Derive Key Pair
2,905,656 UART: [art] Store priv key in slot 0x5
2,918,534 UART: [art] Derive Key Pair - Done
2,933,087 UART: [art] Signing Cert with AUTHO
2,933,567 UART: RITY.KEYID = 7
2,948,669 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,434 UART: [art] PUB.X = 0EA9B7263D0904AC459D759D610D73DC85E7D6FB72E57F7FF61DCBE308C5664115E0F879630EAED4CA06BDDED5233901
2,956,192 UART: [art] PUB.Y = 8996F79D1CCE3871907973437A826558D69C185D2A17FC32492E48FBD750504BA3F8D38D69DA4881FEFD4CD2A326721F
2,963,142 UART: [art] SIG.R = 233EB0D4384A6C29035143C7DB529D105C6450C50CEB9FFE82761C845F77D21D10CEE9ACBD4A1827857F25DB7A7E5C4A
2,969,916 UART: [art] SIG.S = 5E1ABD63362B77C918CE36911302ADFC3D4D72B2A0D799B7363C39C44C72E20406BD71CF81614F34C584364BF39E4C8F
2,993,234 UART: Caliptra RT
2,993,487 UART: [state] CFI Enabled
3,101,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,350 UART: [rt]cmd =0x46504c54, len=4
3,133,647 >>> mbox cmd response data (8 bytes)
3,133,648 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,163,419 UART: [rt]cmd =0x46504c67, len=4
3,164,532 >>> mbox cmd response: failed
3,164,796 UART: [rt] FIPS self test
3,165,127 UART: [kat] ++
3,165,279 UART: [kat] sha1
3,169,698 UART: [kat] SHA2-256
3,171,628 UART: [kat] SHA2-384
3,174,335 UART: [kat] SHA2-512-ACC
3,176,230 UART: [kat] ECC-384
3,185,753 UART: [kat] HMAC-384Kdf
3,190,124 UART: [kat] LMS
3,439,015 UART: [kat] --
4,133,882 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,562,973 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,564,292 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,593,624 UART: [rt]cmd =0x46504c67, len=4
5,594,698 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,971 UART: [kat] SHA2-512-ACC
906,872 UART: [kat] ECC-384
917,007 UART: [kat] HMAC-384Kdf
921,551 UART: [kat] LMS
1,169,863 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,098 UART: [fht] FHT @ 0x50003400
1,173,780 UART: [idev] ++
1,173,948 UART: [idev] CDI.KEYID = 6
1,174,309 UART: [idev] SUBJECT.KEYID = 7
1,174,734 UART: [idev] UDS.KEYID = 0
1,175,080 ready_for_fw is high
1,175,080 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,182,454 UART: [idev] Erasing UDS.KEYID = 0
1,199,632 UART: [idev] Sha1 KeyId Algorithm
1,208,478 UART: [idev] --
1,209,693 UART: [ldev] ++
1,209,861 UART: [ldev] CDI.KEYID = 6
1,210,225 UART: [ldev] SUBJECT.KEYID = 5
1,210,652 UART: [ldev] AUTHORITY.KEYID = 7
1,211,115 UART: [ldev] FE.KEYID = 1
1,216,529 UART: [ldev] Erasing FE.KEYID = 1
1,242,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,777 UART: [fwproc] Wait for Commands...
1,282,370 UART: [fwproc] Recv command 0x46574c44
1,283,103 UART: [fwproc] Recv'd Img size: 114448 bytes
2,581,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,701 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,773,749 >>> mbox cmd response: success
2,773,749 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,774,954 UART: [afmc] ++
2,775,122 UART: [afmc] CDI.KEYID = 6
2,775,485 UART: [afmc] SUBJECT.KEYID = 7
2,775,911 UART: [afmc] AUTHORITY.KEYID = 5
2,811,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,000 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,883 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,602 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,483 UART: [afmc] --
2,854,479 UART: [cold-reset] --
2,855,321 UART: [state] Locking Datavault
2,856,772 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,376 UART: [state] Locking ICCM
2,857,942 UART: [exit] Launching FMC @ 0x40000130
2,863,271 UART:
2,863,287 UART: Running Caliptra FMC ...
2,863,695 UART:
2,863,838 UART: [state] CFI Enabled
2,874,609 UART: [fht] FMC Alias Private Key: 7
2,983,012 UART: [art] Extend RT PCRs Done
2,983,440 UART: [art] Lock RT PCRs Done
2,984,874 UART: [art] Populate DV Done
2,993,103 UART: [fht] FMC Alias Private Key: 7
2,994,151 UART: [art] Derive CDI
2,994,431 UART: [art] Store in in slot 0x4
3,080,172 UART: [art] Derive Key Pair
3,080,532 UART: [art] Store priv key in slot 0x5
3,093,752 UART: [art] Derive Key Pair - Done
3,108,444 UART: [art] Signing Cert with AUTHO
3,108,924 UART: RITY.KEYID = 7
3,124,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,251 UART: [art] PUB.X = 95FA84D65A6DD1108514559CC99DD95C2D60C76856BCB9BA6F20FD67C9B38F3D1B62396063F693C82F2711C48F8DFB4A
3,132,029 UART: [art] PUB.Y = 358B5D3CDF59BD6EB260334F73192C74177DA7BD877331471207294C592BFF65CB6E495536060B212AD4921F40EA31B3
3,138,966 UART: [art] SIG.R = B0EF98272DD239BCB042AE31B54CF0E4C138429AA6E16E432B06CE153D3B0417F1C1A9C49CF24E4512E2C86111F64D16
3,145,738 UART: [art] SIG.S = AABB0CE976F543FEC86A305C9ED5FFE30FEEEC8EECA79FA442C852BDE668CED8A897A68F0E489A5AB9DA205395C05808
3,169,435 UART: Caliptra RT
3,169,780 UART: [state] CFI Enabled
3,277,328 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,828 UART: [rt]cmd =0x46504c54, len=4
3,309,083 >>> mbox cmd response data (8 bytes)
3,309,084 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,338,753 UART: [rt]cmd =0x46504c67, len=4
3,339,858 >>> mbox cmd response: failed
3,340,168 UART: [rt] FIPS self test
3,340,499 UART: [kat] ++
3,340,651 UART: [kat] sha1
3,345,026 UART: [kat] SHA2-256
3,346,956 UART: [kat] SHA2-384
3,349,733 UART: [kat] SHA2-512-ACC
3,351,628 UART: [kat] ECC-384
3,361,569 UART: [kat] HMAC-384Kdf
3,366,100 UART: [kat] LMS
3,614,991 UART: [kat] --
4,416,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,846,515 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,849,607 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,879 UART: [rt]cmd =0x46504c67, len=4
5,880,073 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,471 ready_for_fw is high
1,056,471 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,687 >>> mbox cmd response: success
2,624,687 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,688,101 UART:
2,688,117 UART: Running Caliptra FMC ...
2,688,525 UART:
2,688,668 UART: [state] CFI Enabled
2,699,553 UART: [fht] FMC Alias Private Key: 7
2,807,190 UART: [art] Extend RT PCRs Done
2,807,618 UART: [art] Lock RT PCRs Done
2,809,364 UART: [art] Populate DV Done
2,817,609 UART: [fht] FMC Alias Private Key: 7
2,818,759 UART: [art] Derive CDI
2,819,039 UART: [art] Store in in slot 0x4
2,904,954 UART: [art] Derive Key Pair
2,905,314 UART: [art] Store priv key in slot 0x5
2,919,254 UART: [art] Derive Key Pair - Done
2,934,388 UART: [art] Signing Cert with AUTHO
2,934,868 UART: RITY.KEYID = 7
2,950,422 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,187 UART: [art] PUB.X = 82C5DF5D649F4B45C32E9910AD1E761D5FB3B7F016B0F931119399DF6B2DAE04864EE6A6C756DC1CC10626565C74D426
2,957,957 UART: [art] PUB.Y = EB54FB07045ABB5A48840ED69672527651ABB77C24C1F90240BB52DD50B6E1CBFA071B92B42840B9CEED544B6CD362FE
2,964,906 UART: [art] SIG.R = 1F7029F1D5BB9A060C3E484BFC7620DA808948A79FE68C482EE6B444BE6DBE8B273296E0F1776524DD45F4B79D8D10C9
2,971,678 UART: [art] SIG.S = B8770CBD1E9CBD43BB906240AFB8E4BA5AA3F639D5314C37A2F9C58DBC4E0DC12C9531434D94C7A86C0A050C85EB32E5
2,995,972 UART: Caliptra RT
2,996,317 UART: [state] CFI Enabled
3,103,342 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,802 UART: [rt]cmd =0x46504c54, len=4
3,135,139 >>> mbox cmd response data (8 bytes)
3,135,140 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,164,781 UART: [rt]cmd =0x46504c67, len=4
3,165,750 >>> mbox cmd response: failed
3,165,876 UART: [rt] FIPS self test
3,166,207 UART: [kat] ++
3,166,359 UART: [kat] sha1
3,170,548 UART: [kat] SHA2-256
3,172,478 UART: [kat] SHA2-384
3,175,275 UART: [kat] SHA2-512-ACC
3,177,170 UART: [kat] ECC-384
3,186,945 UART: [kat] HMAC-384Kdf
3,191,498 UART: [kat] LMS
3,440,389 UART: [kat] --
4,135,374 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,565,975 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,575,509 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,604,865 UART: [rt]cmd =0x46504c67, len=4
5,606,115 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,991 UART:
192,344 UART: Running Caliptra ROM ...
193,522 UART:
193,673 UART: [state] CFI Enabled
261,101 UART: [state] LifecycleState = Unprovisioned
263,077 UART: [state] DebugLocked = No
265,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,004 UART: [kat] SHA2-256
440,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,203 UART: [kat] ++
451,735 UART: [kat] sha1
461,541 UART: [kat] SHA2-256
464,226 UART: [kat] SHA2-384
469,608 UART: [kat] SHA2-512-ACC
471,999 UART: [kat] ECC-384
2,768,264 UART: [kat] HMAC-384Kdf
2,799,518 UART: [kat] LMS
3,989,839 UART: [kat] --
3,994,629 UART: [cold-reset] ++
3,997,105 UART: [fht] Storing FHT @ 0x50003400
4,008,431 UART: [idev] ++
4,009,005 UART: [idev] CDI.KEYID = 6
4,009,925 UART: [idev] SUBJECT.KEYID = 7
4,011,200 UART: [idev] UDS.KEYID = 0
4,012,389 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,032,461 UART: [idev] Erasing UDS.KEYID = 0
7,343,001 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,782 UART: [idev] --
7,367,564 UART: [ldev] ++
7,368,132 UART: [ldev] CDI.KEYID = 6
7,369,076 UART: [ldev] SUBJECT.KEYID = 5
7,370,291 UART: [ldev] AUTHORITY.KEYID = 7
7,371,577 UART: [ldev] FE.KEYID = 1
7,420,501 UART: [ldev] Erasing FE.KEYID = 1
10,745,956 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,038,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,082,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,348 UART: [ldev] --
13,105,892 UART: [fwproc] Waiting for Commands...
13,108,426 UART: [fwproc] Received command 0x46505652
13,110,828 UART: [rt] FIPS Version
13,112,497 >>> mbox cmd response data (36 bytes)
15,338,444 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,483,058 UART: [fwproc] Received command 0x46574c44
15,485,397 UART: [fwproc] Received Image of size 114124 bytes
19,545,382 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,622,197 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,691,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,008,732 >>> mbox cmd response: success
20,009,099 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,012,528 UART: [afmc] ++
20,013,165 UART: [afmc] CDI.KEYID = 6
20,014,091 UART: [afmc] SUBJECT.KEYID = 7
20,015,314 UART: [afmc] AUTHORITY.KEYID = 5
23,384,119 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,683,665 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,685,919 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,700,334 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,715,152 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,729,643 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,751,793 UART: [afmc] --
25,756,094 UART: [cold-reset] --
25,760,826 UART: [state] Locking Datavault
25,765,752 UART: [state] Locking PCR0, PCR1 and PCR31
25,767,514 UART: [state] Locking ICCM
25,768,641 UART: [exit] Launching FMC @ 0x40000130
25,776,986 UART:
25,777,226 UART: Running Caliptra FMC ...
25,778,330 UART:
25,778,488 UART: [state] CFI Enabled
25,844,898 UART: [fht] FMC Alias Private Key: 7
28,182,687 UART: [art] Extend RT PCRs Done
28,183,910 UART: [art] Lock RT PCRs Done
28,185,723 UART: [art] Populate DV Done
28,191,241 UART: [fht] FMC Alias Private Key: 7
28,192,938 UART: [art] Derive CDI
28,193,694 UART: [art] Store in in slot 0x4
28,253,240 UART: [art] Derive Key Pair
28,254,254 UART: [art] Store priv key in slot 0x5
31,547,080 UART: [art] Derive Key Pair - Done
31,560,402 UART: [art] Signing Cert with AUTHO
31,561,738 UART: RITY.KEYID = 7
33,848,425 UART: [art] Erasing AUTHORITY.KEYID = 7
33,849,930 UART: [art] PUB.X = 0883001FC2261D44646089115D4BC674AACF5D4B9B82AD88EB34723AE507A0487E1A4EB8BE491FA98F8152A5918CEFB1
33,857,173 UART: [art] PUB.Y = 1787F92F72C845F691A4EF9BB40B3EB26977F1E80D0649A4F274ABBC6CEBB75B0A553192D6F1B5E55A662A2690C1A266
33,864,457 UART: [art] SIG.R = F0DF594C412A1BC827E64440F56EC7E743F3ECD457B239BCD54EFA3C5728F7182418F95B4636C61BFECD193F09023D2F
33,871,844 UART: [art] SIG.S = D6ACDD2FF9690B95A72758FA63054DFD77C8FD221D89003018ACEABEC08C9B928F49AA9851DE0572A5D264D0EF051BF5
35,177,807 UART: Caliptra RT
35,178,523 UART: [state] CFI Enabled
35,338,186 UART: [rt] RT listening for mailbox commands...
35,369,447 UART: [rt]cmd =0x46505652, len=4
35,370,752 UART: [rt] FIPS Version
35,371,877 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,783,316 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,805,983 >>> mbox cmd response data (36 bytes)
15,028,375 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,194,667 >>> mbox cmd response: success
20,195,180 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,895,884 UART:
25,896,291 UART: Running Caliptra FMC ...
25,897,399 UART:
25,897,563 UART: [state] CFI Enabled
25,964,703 UART: [fht] FMC Alias Private Key: 7
28,301,878 UART: [art] Extend RT PCRs Done
28,303,105 UART: [art] Lock RT PCRs Done
28,305,066 UART: [art] Populate DV Done
28,310,638 UART: [fht] FMC Alias Private Key: 7
28,312,232 UART: [art] Derive CDI
28,312,977 UART: [art] Store in in slot 0x4
28,374,155 UART: [art] Derive Key Pair
28,375,225 UART: [art] Store priv key in slot 0x5
31,667,909 UART: [art] Derive Key Pair - Done
31,681,016 UART: [art] Signing Cert with AUTHO
31,682,331 UART: RITY.KEYID = 7
33,970,203 UART: [art] Erasing AUTHORITY.KEYID = 7
33,971,705 UART: [art] PUB.X = 3F363C044B3FD3B9EF5AC39B8F756CD081C764C92B06DBAE057D45BC5AAB99B53FAB926F8B7792A57151674D6E398265
33,979,001 UART: [art] PUB.Y = 52C30A843F8BB050048013660E33DC58E9BD235C1E5063D11F8EF7B7AE262B12E76429EFE4E026D1849783DBBEA990AC
33,986,164 UART: [art] SIG.R = 92C0CC56614C8A3BEA86479F3C2836CD6FCB456F27EBC6FFD91A09FE48B4F9E1E03E15868148C816179C43E8F114D455
33,993,564 UART: [art] SIG.S = B9617234F594E6F05595716A95DC254EFC9EE2A647285CDEB77C1D2DED82F52D21CFBE401C0BBFE62495D79DA0856F1F
35,299,287 UART: Caliptra RT
35,300,008 UART: [state] CFI Enabled
35,459,651 UART: [rt] RT listening for mailbox commands...
35,491,220 UART: [rt]cmd =0x46505652, len=4
35,492,496 UART: [rt] FIPS Version
35,493,721 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,439 UART:
192,827 UART: Running Caliptra ROM ...
194,088 UART:
603,815 UART: [state] CFI Enabled
618,225 UART: [state] LifecycleState = Unprovisioned
620,135 UART: [state] DebugLocked = No
621,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,120 UART: [kat] SHA2-256
796,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,402 UART: [kat] ++
808,041 UART: [kat] sha1
818,877 UART: [kat] SHA2-256
821,586 UART: [kat] SHA2-384
828,739 UART: [kat] SHA2-512-ACC
831,093 UART: [kat] ECC-384
3,118,174 UART: [kat] HMAC-384Kdf
3,129,881 UART: [kat] LMS
4,319,999 UART: [kat] --
4,326,768 UART: [cold-reset] ++
4,329,144 UART: [fht] Storing FHT @ 0x50003400
4,341,076 UART: [idev] ++
4,341,693 UART: [idev] CDI.KEYID = 6
4,342,778 UART: [idev] SUBJECT.KEYID = 7
4,343,841 UART: [idev] UDS.KEYID = 0
4,344,993 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,360,478 UART: [idev] Erasing UDS.KEYID = 0
7,631,381 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,321 UART: [idev] --
7,657,369 UART: [ldev] ++
7,657,943 UART: [ldev] CDI.KEYID = 6
7,658,858 UART: [ldev] SUBJECT.KEYID = 5
7,660,017 UART: [ldev] AUTHORITY.KEYID = 7
7,661,366 UART: [ldev] FE.KEYID = 1
7,674,054 UART: [ldev] Erasing FE.KEYID = 1
10,965,967 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,257,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,272,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,287,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,301,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,320,810 UART: [ldev] --
13,325,426 UART: [fwproc] Waiting for Commands...
13,328,493 UART: [fwproc] Received command 0x46505652
13,330,900 UART: [rt] FIPS Version
13,332,545 >>> mbox cmd response data (36 bytes)
15,557,796 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
15,702,183 UART: [fwproc] Received command 0x46574c44
15,704,505 UART: [fwproc] Received Image of size 114124 bytes
19,755,787 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,830,314 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,899,199 UART: [fwproc] Loading Runtime at address 0x40005000 len 89420
20,216,729 >>> mbox cmd response: success
20,217,086 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,220,188 UART: [afmc] ++
20,220,821 UART: [afmc] CDI.KEYID = 6
20,221,705 UART: [afmc] SUBJECT.KEYID = 7
20,222,976 UART: [afmc] AUTHORITY.KEYID = 5
23,536,361 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,829,585 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,831,839 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,846,205 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,861,017 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,875,496 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,896,736 UART: [afmc] --
25,900,820 UART: [cold-reset] --
25,904,896 UART: [state] Locking Datavault
25,908,526 UART: [state] Locking PCR0, PCR1 and PCR31
25,910,280 UART: [state] Locking ICCM
25,912,834 UART: [exit] Launching FMC @ 0x40000130
25,921,226 UART:
25,921,469 UART: Running Caliptra FMC ...
25,922,490 UART:
25,922,638 UART: [state] CFI Enabled
25,930,710 UART: [fht] FMC Alias Private Key: 7
28,261,168 UART: [art] Extend RT PCRs Done
28,262,399 UART: [art] Lock RT PCRs Done
28,264,270 UART: [art] Populate DV Done
28,269,628 UART: [fht] FMC Alias Private Key: 7
28,271,163 UART: [art] Derive CDI
28,271,895 UART: [art] Store in in slot 0x4
28,314,811 UART: [art] Derive Key Pair
28,315,812 UART: [art] Store priv key in slot 0x5
31,558,063 UART: [art] Derive Key Pair - Done
31,571,064 UART: [art] Signing Cert with AUTHO
31,572,367 UART: RITY.KEYID = 7
33,851,541 UART: [art] Erasing AUTHORITY.KEYID = 7
33,853,055 UART: [art] PUB.X = AD4083333311A2E35320B347E58F2A0E5A80B10922E713015FDAC0AF9D88C88F8755F1FBBAE1D7E800735CB18891DFB5
33,860,257 UART: [art] PUB.Y = 13657267DF0ECA3748F07143A207E58120D504B73290FCD695CCF96723D9903EF886753A7155609494501E84E4573A6D
33,867,490 UART: [art] SIG.R = 56E317F9FDE550BF2A9C04B9E7FE9639F5E77CEAEA39DEFB7C343DEC1FDD0D557C0F6990C24911BD5DDFD54258E9BEA6
33,874,928 UART: [art] SIG.S = 089276DBDD9D6CDC75DFD5DA76D301D98AB54B6CF52DB4A83A7D3EB06F0F52644D51BFA6DC8BFBE2995F5C9ADB497F2D
35,180,417 UART: Caliptra RT
35,181,170 UART: [state] CFI Enabled
35,299,326 UART: [rt] RT listening for mailbox commands...
35,330,512 UART: [rt]cmd =0x46505652, len=4
35,331,770 UART: [rt] FIPS Version
35,332,822 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,093 writing to cptra_bootfsm_go
4,125,857 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,042,048 >>> mbox cmd response data (36 bytes)
15,261,261 <<< Executing mbox cmd 0x46574c44 (114124 bytes) from SoC
20,439,588 >>> mbox cmd response: success
20,440,110 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,082,189 UART:
26,082,598 UART: Running Caliptra FMC ...
26,083,695 UART:
26,083,854 UART: [state] CFI Enabled
26,092,067 UART: [fht] FMC Alias Private Key: 7
28,423,037 UART: [art] Extend RT PCRs Done
28,424,296 UART: [art] Lock RT PCRs Done
28,425,994 UART: [art] Populate DV Done
28,431,354 UART: [fht] FMC Alias Private Key: 7
28,432,895 UART: [art] Derive CDI
28,433,713 UART: [art] Store in in slot 0x4
28,476,034 UART: [art] Derive Key Pair
28,477,042 UART: [art] Store priv key in slot 0x5
31,718,628 UART: [art] Derive Key Pair - Done
31,731,466 UART: [art] Signing Cert with AUTHO
31,732,776 UART: RITY.KEYID = 7
34,012,492 UART: [art] Erasing AUTHORITY.KEYID = 7
34,014,015 UART: [art] PUB.X = 7F8F74F07AB46B1D731C84E71B7FD6EEB5B5A4DD0363CF84A35FD367B601899FCA0BFD35663161A19938600EA71C6256
34,021,231 UART: [art] PUB.Y = 50EF5BA0527D4F37DF957451D48145D4C016AFF4AE234832296C2ADD4BC801B559CAF5C859EFADBA742AD0B3E835620B
34,028,507 UART: [art] SIG.R = 7CB730E5936BFA5D7DD0FAF7BFE9E10348ADEA50BA4D2939F01A2B37892E38CDDC2A63F4EC7721637131F0143B88E377
34,035,927 UART: [art] SIG.S = 8CD9549D68C682DDA5ED12EEB0BBA5853AAA778D37F2FD16C75A5C345B4E8BDC1B8479A55E7B4B2F5504DAB6DF65E79C
35,341,035 UART: Caliptra RT
35,341,771 UART: [state] CFI Enabled
35,459,791 UART: [rt] RT listening for mailbox commands...
35,491,046 UART: [rt]cmd =0x46505652, len=4
35,492,304 UART: [rt] FIPS Version
35,493,572 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
192,278 UART:
192,644 UART: Running Caliptra ROM ...
193,812 UART:
193,969 UART: [state] CFI Enabled
263,317 UART: [state] LifecycleState = Unprovisioned
265,207 UART: [state] DebugLocked = No
267,723 UART: [state] WD Timer not started. Device not locked for debugging
272,284 UART: [kat] SHA2-256
451,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,971 UART: [kat] ++
463,510 UART: [kat] sha1
475,402 UART: [kat] SHA2-256
478,446 UART: [kat] SHA2-384
483,672 UART: [kat] SHA2-512-ACC
486,602 UART: [kat] ECC-384
2,946,839 UART: [kat] HMAC-384Kdf
2,971,623 UART: [kat] LMS
3,501,067 UART: [kat] --
3,505,383 UART: [cold-reset] ++
3,507,586 UART: [fht] FHT @ 0x50003400
3,516,948 UART: [idev] ++
3,517,553 UART: [idev] CDI.KEYID = 6
3,518,471 UART: [idev] SUBJECT.KEYID = 7
3,519,631 UART: [idev] UDS.KEYID = 0
3,520,742 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,543,027 UART: [idev] Erasing UDS.KEYID = 0
6,026,613 UART: [idev] Sha1 KeyId Algorithm
6,050,430 UART: [idev] --
6,054,640 UART: [ldev] ++
6,055,212 UART: [ldev] CDI.KEYID = 6
6,056,102 UART: [ldev] SUBJECT.KEYID = 5
6,057,311 UART: [ldev] AUTHORITY.KEYID = 7
6,058,545 UART: [ldev] FE.KEYID = 1
6,099,119 UART: [ldev] Erasing FE.KEYID = 1
8,605,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,085 UART: [ldev] --
10,412,201 UART: [fwproc] Wait for Commands...
10,414,162 UART: [fwproc] Recv command 0x46505652
10,416,530 UART: [rt] FIPS Version
10,418,019 >>> mbox cmd response data (36 bytes)
12,645,354 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,790,756 UART: [fwproc] Recv command 0x46574c44
12,792,879 UART: [fwproc] Recv'd Img size: 114448 bytes
16,190,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,263,111 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,331,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,649,588 >>> mbox cmd response: success
16,649,939 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,653,031 UART: [afmc] ++
16,653,612 UART: [afmc] CDI.KEYID = 6
16,654,495 UART: [afmc] SUBJECT.KEYID = 7
16,655,709 UART: [afmc] AUTHORITY.KEYID = 5
19,196,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,939,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,941,275 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,957,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,973,123 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,988,946 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,011,136 UART: [afmc] --
21,014,293 UART: [cold-reset] --
21,017,341 UART: [state] Locking Datavault
21,021,940 UART: [state] Locking PCR0, PCR1 and PCR31
21,023,586 UART: [state] Locking ICCM
21,025,518 UART: [exit] Launching FMC @ 0x40000130
21,033,925 UART:
21,034,202 UART: Running Caliptra FMC ...
21,035,316 UART:
21,035,477 UART: [state] CFI Enabled
21,096,581 UART: [fht] FMC Alias Private Key: 7
22,860,142 UART: [art] Extend RT PCRs Done
22,861,361 UART: [art] Lock RT PCRs Done
22,863,063 UART: [art] Populate DV Done
22,868,368 UART: [fht] FMC Alias Private Key: 7
22,870,064 UART: [art] Derive CDI
22,870,833 UART: [art] Store in in slot 0x4
22,928,888 UART: [art] Derive Key Pair
22,929,891 UART: [art] Store priv key in slot 0x5
25,392,998 UART: [art] Derive Key Pair - Done
25,405,882 UART: [art] Signing Cert with AUTHO
25,407,182 UART: RITY.KEYID = 7
27,119,341 UART: [art] Erasing AUTHORITY.KEYID = 7
27,120,853 UART: [art] PUB.X = A433D817A9B621C891EDE64B95592F050FF8DE9EC961F6D0A2821C24D01CFBC10E9EC5198AFD9DA971D8E3AF3EAEEDEA
27,128,189 UART: [art] PUB.Y = BA651849ED7E1977E0A351DC9E3669E7E39728649E99A48D2EBAF3337FE873B9414964C8B1EFFC97C8B4411E978A6A05
27,135,442 UART: [art] SIG.R = DD0F5C2A1691C10DEC715EF8AC6E7D3BE2C9E1BA12A001EE10610083C73189B37422739BAB8FBD5C8349945F1B30CCD7
27,142,855 UART: [art] SIG.S = 344A790F16D5292317DB30CACADD68EB4FC5E78D5B7617A6984B80EE3339D1A93DAA7C20753ED9F78EFAB07BA0D298FA
28,121,437 UART: Caliptra RT
28,122,156 UART: [state] CFI Enabled
28,287,628 UART: [rt] RT listening for mailbox commands...
28,318,818 UART: [rt]cmd =0x46505652, len=4
28,320,156 UART: [rt] FIPS Version
28,321,211 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,107 writing to cptra_bootfsm_go
3,384,260 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,227,013 >>> mbox cmd response data (36 bytes)
12,448,643 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,454,072 >>> mbox cmd response: success
16,454,551 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,734,453 UART:
20,734,840 UART: Running Caliptra FMC ...
20,736,026 UART:
20,736,204 UART: [state] CFI Enabled
20,802,253 UART: [fht] FMC Alias Private Key: 7
22,566,335 UART: [art] Extend RT PCRs Done
22,567,553 UART: [art] Lock RT PCRs Done
22,568,856 UART: [art] Populate DV Done
22,574,573 UART: [fht] FMC Alias Private Key: 7
22,576,209 UART: [art] Derive CDI
22,577,032 UART: [art] Store in in slot 0x4
22,635,190 UART: [art] Derive Key Pair
22,636,183 UART: [art] Store priv key in slot 0x5
25,099,265 UART: [art] Derive Key Pair - Done
25,112,070 UART: [art] Signing Cert with AUTHO
25,113,383 UART: RITY.KEYID = 7
26,825,180 UART: [art] Erasing AUTHORITY.KEYID = 7
26,826,705 UART: [art] PUB.X = F7F8BE3A461C0DBA5D41F23C514EEEFD88748BB27D8CF66E8E05297F48ED45677AEB91208BD14E7D58E1614E262AD6D2
26,833,956 UART: [art] PUB.Y = A71DE89FB590F344CFD9BE0A581ADDF97E0B215E8AD3F280EAA45619DD8ED2F033927EDE15C155EB0A85F811E46CEBD3
26,841,239 UART: [art] SIG.R = EC157712B48AF7BE49988A330BEFD77BF5B6E85EF5453163B38169880585BADBD13BF3A4901F513D810F09911B3BB1FA
26,848,626 UART: [art] SIG.S = 72E49FFDABF9C60ACE1DB957F7726C54650C9F85BBBD8D8EF4F35A9EE1A1F14313C09CA4FC1EBF505E4EFA81224B3896
27,827,857 UART: Caliptra RT
27,828,578 UART: [state] CFI Enabled
27,994,699 UART: [rt] RT listening for mailbox commands...
28,026,170 UART: [rt]cmd =0x46505652, len=4
28,027,508 UART: [rt] FIPS Version
28,028,671 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,571 UART:
192,953 UART: Running Caliptra ROM ...
194,137 UART:
603,502 UART: [state] CFI Enabled
616,816 UART: [state] LifecycleState = Unprovisioned
618,636 UART: [state] DebugLocked = No
621,204 UART: [state] WD Timer not started. Device not locked for debugging
624,964 UART: [kat] SHA2-256
804,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,656 UART: [kat] ++
816,185 UART: [kat] sha1
826,255 UART: [kat] SHA2-256
829,315 UART: [kat] SHA2-384
836,047 UART: [kat] SHA2-512-ACC
838,981 UART: [kat] ECC-384
3,279,681 UART: [kat] HMAC-384Kdf
3,291,814 UART: [kat] LMS
3,821,309 UART: [kat] --
3,824,262 UART: [cold-reset] ++
3,826,348 UART: [fht] FHT @ 0x50003400
3,837,447 UART: [idev] ++
3,838,014 UART: [idev] CDI.KEYID = 6
3,838,931 UART: [idev] SUBJECT.KEYID = 7
3,840,086 UART: [idev] UDS.KEYID = 0
3,841,297 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,857,850 UART: [idev] Erasing UDS.KEYID = 0
6,311,013 UART: [idev] Sha1 KeyId Algorithm
6,333,478 UART: [idev] --
6,337,254 UART: [ldev] ++
6,337,823 UART: [ldev] CDI.KEYID = 6
6,338,702 UART: [ldev] SUBJECT.KEYID = 5
6,339,914 UART: [ldev] AUTHORITY.KEYID = 7
6,341,148 UART: [ldev] FE.KEYID = 1
6,353,228 UART: [ldev] Erasing FE.KEYID = 1
8,825,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,407 UART: [ldev] --
10,617,438 UART: [fwproc] Wait for Commands...
10,619,699 UART: [fwproc] Recv command 0x46505652
10,622,078 UART: [rt] FIPS Version
10,623,538 >>> mbox cmd response data (36 bytes)
12,843,137 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
12,988,474 UART: [fwproc] Recv command 0x46574c44
12,990,598 UART: [fwproc] Recv'd Img size: 114448 bytes
16,401,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,475,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,544,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
16,861,949 >>> mbox cmd response: success
16,862,333 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,865,378 UART: [afmc] ++
16,865,960 UART: [afmc] CDI.KEYID = 6
16,866,843 UART: [afmc] SUBJECT.KEYID = 7
16,868,058 UART: [afmc] AUTHORITY.KEYID = 5
19,363,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,084,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,086,011 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,101,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,117,850 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,133,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,155,490 UART: [afmc] --
21,159,514 UART: [cold-reset] --
21,163,050 UART: [state] Locking Datavault
21,167,205 UART: [state] Locking PCR0, PCR1 and PCR31
21,168,916 UART: [state] Locking ICCM
21,170,733 UART: [exit] Launching FMC @ 0x40000130
21,179,184 UART:
21,179,423 UART: Running Caliptra FMC ...
21,180,524 UART:
21,180,684 UART: [state] CFI Enabled
21,188,893 UART: [fht] FMC Alias Private Key: 7
22,946,365 UART: [art] Extend RT PCRs Done
22,947,591 UART: [art] Lock RT PCRs Done
22,949,516 UART: [art] Populate DV Done
22,954,935 UART: [fht] FMC Alias Private Key: 7
22,956,592 UART: [art] Derive CDI
22,957,411 UART: [art] Store in in slot 0x4
23,000,116 UART: [art] Derive Key Pair
23,001,122 UART: [art] Store priv key in slot 0x5
25,427,931 UART: [art] Derive Key Pair - Done
25,441,198 UART: [art] Signing Cert with AUTHO
25,442,515 UART: RITY.KEYID = 7
27,148,151 UART: [art] Erasing AUTHORITY.KEYID = 7
27,149,651 UART: [art] PUB.X = 771F79F289359DCE7419912CE0EC10AD22A627420290CC879F1EFA99278054AF58A48CE6E21DA3BDF7F3381CD5FE7526
27,156,876 UART: [art] PUB.Y = F3BA094868443262E81C780642E76B4C10ABDD4799499476686E3C260FB115966C26AAC27889ED5C8C45C17448F6B50B
27,164,161 UART: [art] SIG.R = 37A9CE4EFB108A790D07C93BFC1118CD73A2DC3B98D26E62563D536331707A1A3BBD5B20A4ABB32D14FB00FE6D157286
27,171,559 UART: [art] SIG.S = 66F314D6A8414F80EF0A2E05A8C476512F7C8C0D4944702BC8E32AE8F856B2AABDE6072A0AF75046B43381E984BD73C7
28,150,600 UART: Caliptra RT
28,151,305 UART: [state] CFI Enabled
28,268,309 UART: [rt] RT listening for mailbox commands...
28,299,594 UART: [rt]cmd =0x46505652, len=4
28,300,868 UART: [rt] FIPS Version
28,302,249 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,044 writing to cptra_bootfsm_go
3,705,183 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,418,062 >>> mbox cmd response data (36 bytes)
12,633,078 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
16,647,696 >>> mbox cmd response: success
16,648,209 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,897,488 UART:
20,897,884 UART: Running Caliptra FMC ...
20,898,993 UART:
20,899,148 UART: [state] CFI Enabled
20,906,828 UART: [fht] FMC Alias Private Key: 7
22,663,372 UART: [art] Extend RT PCRs Done
22,664,590 UART: [art] Lock RT PCRs Done
22,666,270 UART: [art] Populate DV Done
22,671,782 UART: [fht] FMC Alias Private Key: 7
22,673,408 UART: [art] Derive CDI
22,674,228 UART: [art] Store in in slot 0x4
22,717,164 UART: [art] Derive Key Pair
22,718,211 UART: [art] Store priv key in slot 0x5
25,145,091 UART: [art] Derive Key Pair - Done
25,157,878 UART: [art] Signing Cert with AUTHO
25,159,184 UART: RITY.KEYID = 7
26,864,953 UART: [art] Erasing AUTHORITY.KEYID = 7
26,866,617 UART: [art] PUB.X = 2062B375C13928E1F3D80A662D3B4423EC452EF966BDADC38C43614F69366D331C8467B4D82D32D7717525F5A81E2E28
26,873,700 UART: [art] PUB.Y = 8C87356455BC09C1E414E584C67AF21375B57D6EF355F33830CF78895F32EA67F7E5D5A64390FAD4665CE2BEC8F9B601
26,880,974 UART: [art] SIG.R = 5187C2A6ABF42FC1641D34B7B36AB3A254DD09BE3D6D99A69DC00DA173DE8F1AE58321224854B87C55C7E997C559001A
26,888,333 UART: [art] SIG.S = E6AC55A8F68CEF9BB03DA88880376E73BE7FB2AD836C45E791321994DD0E300ADB868F53462F89F843707F24ACC5AB49
27,867,161 UART: Caliptra RT
27,867,860 UART: [state] CFI Enabled
27,984,213 UART: [rt] RT listening for mailbox commands...
28,015,549 UART: [rt]cmd =0x46505652, len=4
28,016,876 UART: [rt] FIPS Version
28,017,980 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,441,127 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,246,410 >>> mbox cmd response data (36 bytes)
12,467,567 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
17,113,549 >>> mbox cmd response: success
17,114,042 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,395,039 UART:
21,395,436 UART: Running Caliptra FMC ...
21,396,549 UART:
21,396,706 UART: [state] CFI Enabled
21,461,139 UART: [fht] FMC Alias Private Key: 7
23,225,192 UART: [art] Extend RT PCRs Done
23,226,413 UART: [art] Lock RT PCRs Done
23,228,205 UART: [art] Populate DV Done
23,233,987 UART: [fht] FMC Alias Private Key: 7
23,235,687 UART: [art] Derive CDI
23,236,501 UART: [art] Store in in slot 0x4
23,294,354 UART: [art] Derive Key Pair
23,295,396 UART: [art] Store priv key in slot 0x5
25,758,426 UART: [art] Derive Key Pair - Done
25,771,422 UART: [art] Signing Cert with AUTHO
25,772,746 UART: RITY.KEYID = 7
27,484,351 UART: [art] Erasing AUTHORITY.KEYID = 7
27,485,857 UART: [art] PUB.X = F3305A0D9C22FD1E50474FEB912F2E6FA851B75C8264BC0C6F35CFA264D5CD95FA2A3E1FBCB097A94F6A09716230E8F3
27,493,092 UART: [art] PUB.Y = 817D5D2D0B6AEA36EF3486BBD8C4EC279A6F811635E2AE53F7A39E7CCCC2E1A1AFC93910CD9DF4C3D36C8B927EF149EF
27,500,400 UART: [art] SIG.R = 3B5EFF2A7BD8AAB6315F7CD70514DE99FC41204B1408400F6A73104961331EC2807423D8BE1B39138E0439519B8D7D70
27,507,800 UART: [art] SIG.S = EFCFDADD4B152D54CDA680C0EDC47150BE07A68B649673DFD7229882BB427B203EAAF625B635FE48B983F30A52A8E82D
28,486,787 UART: Caliptra RT
28,487,481 UART: [state] CFI Enabled
28,652,650 UART: [rt] RT listening for mailbox commands...
28,684,408 UART: [rt]cmd =0x46505652, len=4
28,685,663 UART: [rt] FIPS Version
28,686,877 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,849 writing to cptra_bootfsm_go
3,762,186 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,478,121 >>> mbox cmd response data (36 bytes)
12,698,486 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
17,349,010 >>> mbox cmd response: success
17,349,504 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,600,612 UART:
21,600,983 UART: Running Caliptra FMC ...
21,602,104 UART:
21,602,258 UART: [state] CFI Enabled
21,610,354 UART: [fht] FMC Alias Private Key: 7
23,366,277 UART: [art] Extend RT PCRs Done
23,367,507 UART: [art] Lock RT PCRs Done
23,369,263 UART: [art] Populate DV Done
23,374,449 UART: [fht] FMC Alias Private Key: 7
23,375,963 UART: [art] Derive CDI
23,376,699 UART: [art] Store in in slot 0x4
23,419,404 UART: [art] Derive Key Pair
23,420,408 UART: [art] Store priv key in slot 0x5
25,846,801 UART: [art] Derive Key Pair - Done
25,859,477 UART: [art] Signing Cert with AUTHO
25,860,777 UART: RITY.KEYID = 7
27,566,374 UART: [art] Erasing AUTHORITY.KEYID = 7
27,567,882 UART: [art] PUB.X = 38D6B35852FE67781CCA367D3704FC72A8D95DCB4813188730AEE91566F952003C13779EB90ED9C0E66ABF9542B4A6B6
27,575,078 UART: [art] PUB.Y = 226D4D02FF4BF49858E730872F04CB2A44821B0FB5AE712C281B8D313E6563A2F8394A2C94CDC50177BB04366449ABB5
27,582,348 UART: [art] SIG.R = F8DFBC6869BB89A1C8C9B5F7B36FC3D193914FE46636BD5C38CDBC4955243399E532FBBE4311305BC7DFD88CC05A0039
27,589,773 UART: [art] SIG.S = F8AEBDC67540208A479FA464163B31C7551AD65B0F0B1E46F5E7108DA6C2851972E18C84EB32264F9FCFE80D2BBC31E8
28,568,819 UART: Caliptra RT
28,569,528 UART: [state] CFI Enabled
28,687,018 UART: [rt] RT listening for mailbox commands...
28,718,273 UART: [rt]cmd =0x46505652, len=4
28,719,540 UART: [rt] FIPS Version
28,720,760 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,331 UART: [kat] SHA2-256
882,262 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,377 UART: [kat] ++
886,529 UART: [kat] sha1
890,633 UART: [kat] SHA2-256
892,571 UART: [kat] SHA2-384
895,270 UART: [kat] SHA2-512-ACC
897,171 UART: [kat] ECC-384
902,946 UART: [kat] HMAC-384Kdf
907,466 UART: [kat] LMS
1,475,662 UART: [kat] --
1,476,655 UART: [cold-reset] ++
1,477,151 UART: [fht] Storing FHT @ 0x50003400
1,479,916 UART: [idev] ++
1,480,084 UART: [idev] CDI.KEYID = 6
1,480,444 UART: [idev] SUBJECT.KEYID = 7
1,480,868 UART: [idev] UDS.KEYID = 0
1,481,213 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,758 UART: [idev] Erasing UDS.KEYID = 0
1,505,956 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,514 UART: [idev] --
1,515,569 UART: [ldev] ++
1,515,737 UART: [ldev] CDI.KEYID = 6
1,516,100 UART: [ldev] SUBJECT.KEYID = 5
1,516,526 UART: [ldev] AUTHORITY.KEYID = 7
1,516,989 UART: [ldev] FE.KEYID = 1
1,522,121 UART: [ldev] Erasing FE.KEYID = 1
1,547,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,364 UART: [ldev] --
1,586,751 UART: [fwproc] Waiting for Commands...
1,587,564 UART: [fwproc] Received command 0x46505652
1,588,446 UART: [rt] FIPS Version
1,588,999 >>> mbox cmd response data (36 bytes)
1,589,000 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,589,280 UART: [fwproc] Received command 0x46574c44
1,590,071 UART: [fwproc] Received Image of size 114448 bytes
2,889,104 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,482 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,834 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,081,867 >>> mbox cmd response: success
3,081,867 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,082,947 UART: [afmc] ++
3,083,115 UART: [afmc] CDI.KEYID = 6
3,083,477 UART: [afmc] SUBJECT.KEYID = 7
3,083,902 UART: [afmc] AUTHORITY.KEYID = 5
3,118,661 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,801 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,581 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,309 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,194 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,884 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,829 UART: [afmc] --
3,161,831 UART: [cold-reset] --
3,162,915 UART: [state] Locking Datavault
3,164,126 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,730 UART: [state] Locking ICCM
3,165,214 UART: [exit] Launching FMC @ 0x40000130
3,170,543 UART:
3,170,559 UART: Running Caliptra FMC ...
3,170,967 UART:
3,171,021 UART: [state] CFI Enabled
3,181,220 UART: [fht] FMC Alias Private Key: 7
3,288,567 UART: [art] Extend RT PCRs Done
3,288,995 UART: [art] Lock RT PCRs Done
3,290,923 UART: [art] Populate DV Done
3,299,202 UART: [fht] FMC Alias Private Key: 7
3,300,272 UART: [art] Derive CDI
3,300,552 UART: [art] Store in in slot 0x4
3,386,271 UART: [art] Derive Key Pair
3,386,631 UART: [art] Store priv key in slot 0x5
3,399,581 UART: [art] Derive Key Pair - Done
3,414,241 UART: [art] Signing Cert with AUTHO
3,414,721 UART: RITY.KEYID = 7
3,429,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,326 UART: [art] PUB.X = A9D2C3F4448F5B8A4085F7481D8FA5DB628746590685D662C7FBB4F64F584A3376D4B6D09E407B12CC9A717D35D9DECF
3,437,101 UART: [art] PUB.Y = 1BBFEF59EE25E3B0323411E9894F2AD50B36D0180B26B86E82A667A9AD8E6DC455228A403DED626AEA1FCFDAA34ADE13
3,444,065 UART: [art] SIG.R = 76319D84A720198B15C5FA128701EDCCEF755C05B283E3CA32BD7815D2B905981554BDAA8DE7A9E0BA1C6DC23E4C55FD
3,450,840 UART: [art] SIG.S = 21A9A30BDFB11D38EECC8B3D11B313E14280A00CF6E81976B823744DA5D507405B49B1D84096C5D0E45BC5E464E41BA8
3,474,290 UART: Caliptra RT
3,474,543 UART: [state] CFI Enabled
3,582,503 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,093 UART: [rt]cmd =0x46505652, len=4
3,613,764 UART: [rt] FIPS Version
3,614,985 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,153 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,510 >>> mbox cmd response data (36 bytes)
1,441,511 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,928,828 >>> mbox cmd response: success
2,928,828 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,988 UART:
2,990,004 UART: Running Caliptra FMC ...
2,990,412 UART:
2,990,466 UART: [state] CFI Enabled
3,001,075 UART: [fht] FMC Alias Private Key: 7
3,108,762 UART: [art] Extend RT PCRs Done
3,109,190 UART: [art] Lock RT PCRs Done
3,110,626 UART: [art] Populate DV Done
3,118,673 UART: [fht] FMC Alias Private Key: 7
3,119,671 UART: [art] Derive CDI
3,119,951 UART: [art] Store in in slot 0x4
3,205,716 UART: [art] Derive Key Pair
3,206,076 UART: [art] Store priv key in slot 0x5
3,219,258 UART: [art] Derive Key Pair - Done
3,233,960 UART: [art] Signing Cert with AUTHO
3,234,440 UART: RITY.KEYID = 7
3,249,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,285 UART: [art] PUB.X = 3F1EBF9D5EAAFEFB13EBFD050E4CDEF0CD9A0CE7F1A23B2BA0F36CE86F96C4D07D6E3ACDF51EC719D4475E0A87E68477
3,257,079 UART: [art] PUB.Y = 0BC2339ED104F56796012E2E33A524B97120ECADC3AE4699D949660D3AB153A7FFD3C95190352D65DF70FDD7192CDA98
3,264,023 UART: [art] SIG.R = DB54195F5C5F3F6F2D0746940200B99D407F9FF7C0D6A1EA87686A077E5E17B0D436FF333AC018F088C1A0A04382DC6C
3,270,768 UART: [art] SIG.S = 441BA087A23D0E0BFBAB43BC48C75F3076F19FFAAFEA07EE534C1394AD0D7194873A24A56D392696BA3CA50B08794D89
3,293,869 UART: Caliptra RT
3,294,122 UART: [state] CFI Enabled
3,401,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,057 UART: [rt]cmd =0x46505652, len=4
3,432,728 UART: [rt] FIPS Version
3,433,925 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,658 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,232 UART: [kat] SHA2-256
882,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,278 UART: [kat] ++
886,430 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
903,275 UART: [kat] HMAC-384Kdf
907,841 UART: [kat] LMS
1,476,037 UART: [kat] --
1,476,854 UART: [cold-reset] ++
1,477,182 UART: [fht] Storing FHT @ 0x50003400
1,479,967 UART: [idev] ++
1,480,135 UART: [idev] CDI.KEYID = 6
1,480,495 UART: [idev] SUBJECT.KEYID = 7
1,480,919 UART: [idev] UDS.KEYID = 0
1,481,264 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,815 UART: [idev] Erasing UDS.KEYID = 0
1,505,707 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,355 UART: [idev] --
1,515,328 UART: [ldev] ++
1,515,496 UART: [ldev] CDI.KEYID = 6
1,515,859 UART: [ldev] SUBJECT.KEYID = 5
1,516,285 UART: [ldev] AUTHORITY.KEYID = 7
1,516,748 UART: [ldev] FE.KEYID = 1
1,522,040 UART: [ldev] Erasing FE.KEYID = 1
1,547,165 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,399 UART: [ldev] --
1,586,690 UART: [fwproc] Waiting for Commands...
1,587,459 UART: [fwproc] Received command 0x46505652
1,588,341 UART: [rt] FIPS Version
1,588,894 >>> mbox cmd response data (36 bytes)
1,588,895 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,588,965 UART: [fwproc] Received command 0x46574c44
1,589,756 UART: [fwproc] Received Image of size 114448 bytes
2,889,521 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,597 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,949 UART: [fwproc] Loading Runtime at address 0x40005000 len 89764
3,080,938 >>> mbox cmd response: success
3,080,938 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,081,972 UART: [afmc] ++
3,082,140 UART: [afmc] CDI.KEYID = 6
3,082,502 UART: [afmc] SUBJECT.KEYID = 7
3,082,927 UART: [afmc] AUTHORITY.KEYID = 5
3,117,908 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,332 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,840 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,725 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,415 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,418 UART: [afmc] --
3,161,332 UART: [cold-reset] --
3,162,220 UART: [state] Locking Datavault
3,163,591 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,195 UART: [state] Locking ICCM
3,164,617 UART: [exit] Launching FMC @ 0x40000130
3,169,946 UART:
3,169,962 UART: Running Caliptra FMC ...
3,170,370 UART:
3,170,513 UART: [state] CFI Enabled
3,181,058 UART: [fht] FMC Alias Private Key: 7
3,288,079 UART: [art] Extend RT PCRs Done
3,288,507 UART: [art] Lock RT PCRs Done
3,290,169 UART: [art] Populate DV Done
3,298,560 UART: [fht] FMC Alias Private Key: 7
3,299,570 UART: [art] Derive CDI
3,299,850 UART: [art] Store in in slot 0x4
3,385,837 UART: [art] Derive Key Pair
3,386,197 UART: [art] Store priv key in slot 0x5
3,399,691 UART: [art] Derive Key Pair - Done
3,414,328 UART: [art] Signing Cert with AUTHO
3,414,808 UART: RITY.KEYID = 7
3,429,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,675 UART: [art] PUB.X = 92C927B39B94A03B6D22988C6442A0A0545BBC9BBF2C7B3F1B02A7B98E0DF1CDBAC8932253EDF534843814D011B13B21
3,437,447 UART: [art] PUB.Y = A0C3D915DDD76D6612CDECAAD6EC53BA10B98BC704E97E60DB56F8388D3D47A8F3887E6B7F6803B843AA8D362F0FDAB1
3,444,410 UART: [art] SIG.R = A4F854A877BD8A6B9D25927683957BC9AF9DA8328A52A9D49AC161966A8E1564ED11DA289D0FF12118AD2A6853020C0E
3,451,172 UART: [art] SIG.S = 9E37BC54CB0065D2A2429C69A336D42078B5B7FC8B941D0B45654C084910A10353BF5CF757F803479733202534EF8DD2
3,474,687 UART: Caliptra RT
3,475,032 UART: [state] CFI Enabled
3,583,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,540 UART: [rt]cmd =0x46505652, len=4
3,614,211 UART: [rt] FIPS Version
3,615,412 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,150 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,443,145 >>> mbox cmd response data (36 bytes)
1,443,146 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,932,199 >>> mbox cmd response: success
2,932,199 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,992,991 UART:
2,993,007 UART: Running Caliptra FMC ...
2,993,415 UART:
2,993,558 UART: [state] CFI Enabled
3,004,361 UART: [fht] FMC Alias Private Key: 7
3,112,308 UART: [art] Extend RT PCRs Done
3,112,736 UART: [art] Lock RT PCRs Done
3,114,408 UART: [art] Populate DV Done
3,122,595 UART: [fht] FMC Alias Private Key: 7
3,123,667 UART: [art] Derive CDI
3,123,947 UART: [art] Store in in slot 0x4
3,209,198 UART: [art] Derive Key Pair
3,209,558 UART: [art] Store priv key in slot 0x5
3,223,080 UART: [art] Derive Key Pair - Done
3,237,794 UART: [art] Signing Cert with AUTHO
3,238,274 UART: RITY.KEYID = 7
3,253,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,661 UART: [art] PUB.X = C611BEC16AF47B7E2FB7F8FE8852B15B60C08908EB9AC9EA949DCF8070CF15061F7133E557BAEB351D3CD337E47B258A
3,261,441 UART: [art] PUB.Y = FCD132AD0DC22515293D4A352FE7E914647BAD4E9CA63A7058FB12A44A2718D8D04E2C1205A0099930AFE8B387813AF8
3,268,388 UART: [art] SIG.R = 852D4A693E66F4DEB2393454BB414FB886E977A352A622E349D991980A8E8A91FD96D8F860F189EB172CEE72B157AAFC
3,275,161 UART: [art] SIG.S = EA3FCA5AFCF9E26CCC3CB828284D50734E07B861E1F33A23AEBAB3E0255A7738F8C33DBA95A4A29F07AFD1D6DE18918E
3,298,914 UART: Caliptra RT
3,299,259 UART: [state] CFI Enabled
3,406,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,781 UART: [rt]cmd =0x46505652, len=4
3,437,452 UART: [rt] FIPS Version
3,438,379 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,798 UART: [kat] SHA2-512-ACC
908,699 UART: [kat] ECC-384
918,112 UART: [kat] HMAC-384Kdf
922,818 UART: [kat] LMS
1,171,146 UART: [kat] --
1,172,005 UART: [cold-reset] ++
1,172,439 UART: [fht] FHT @ 0x50003400
1,175,216 UART: [idev] ++
1,175,384 UART: [idev] CDI.KEYID = 6
1,175,744 UART: [idev] SUBJECT.KEYID = 7
1,176,168 UART: [idev] UDS.KEYID = 0
1,176,513 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,860 UART: [idev] Erasing UDS.KEYID = 0
1,200,589 UART: [idev] Sha1 KeyId Algorithm
1,209,071 UART: [idev] --
1,210,203 UART: [ldev] ++
1,210,371 UART: [ldev] CDI.KEYID = 6
1,210,734 UART: [ldev] SUBJECT.KEYID = 5
1,211,160 UART: [ldev] AUTHORITY.KEYID = 7
1,211,623 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,242,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,761 UART: [ldev] --
1,282,236 UART: [fwproc] Wait for Commands...
1,283,050 UART: [fwproc] Recv command 0x46505652
1,283,871 UART: [rt] FIPS Version
1,284,425 >>> mbox cmd response data (36 bytes)
1,284,426 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,618 UART: [fwproc] Recv command 0x46574c44
1,285,346 UART: [fwproc] Recv'd Img size: 114448 bytes
2,584,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,777,926 >>> mbox cmd response: success
2,777,926 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,778,956 UART: [afmc] ++
2,779,124 UART: [afmc] CDI.KEYID = 6
2,779,486 UART: [afmc] SUBJECT.KEYID = 7
2,779,911 UART: [afmc] AUTHORITY.KEYID = 5
2,815,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,352 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,071 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,839 UART: [afmc] --
2,858,965 UART: [cold-reset] --
2,859,691 UART: [state] Locking Datavault
2,861,028 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,632 UART: [state] Locking ICCM
2,862,232 UART: [exit] Launching FMC @ 0x40000130
2,867,561 UART:
2,867,577 UART: Running Caliptra FMC ...
2,867,985 UART:
2,868,039 UART: [state] CFI Enabled
2,878,282 UART: [fht] FMC Alias Private Key: 7
2,985,955 UART: [art] Extend RT PCRs Done
2,986,383 UART: [art] Lock RT PCRs Done
2,988,341 UART: [art] Populate DV Done
2,996,404 UART: [fht] FMC Alias Private Key: 7
2,997,380 UART: [art] Derive CDI
2,997,660 UART: [art] Store in in slot 0x4
3,083,103 UART: [art] Derive Key Pair
3,083,463 UART: [art] Store priv key in slot 0x5
3,096,297 UART: [art] Derive Key Pair - Done
3,111,326 UART: [art] Signing Cert with AUTHO
3,111,806 UART: RITY.KEYID = 7
3,127,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,865 UART: [art] PUB.X = D04E8CC4839F2A906EE19C959C46956CF6D6B190B423AF46E28FC2A00083B5F13A2FBDA68A729A5C91D758F8612A1BA6
3,134,623 UART: [art] PUB.Y = 87BBA03B10B1EF0A8BAFFDE3422C63EFF7AD893A80028E43C1B12ED06B4CB71CD6B4926B46CE06ED5D34634AB52DD1B3
3,141,588 UART: [art] SIG.R = A7D5254620EB69E7E627A1AACB35E95871178E5DCD476B1A7D331662D2182C71515489FBDD559B41B1605D3DD5892350
3,148,356 UART: [art] SIG.S = AE3A8733D1CF067F1992ED56D2B060A4D4B4D31EB0CDEF73B6E372E68D3EF77251CBB7DCE098AE473DBD485251324014
3,172,406 UART: Caliptra RT
3,172,659 UART: [state] CFI Enabled
3,280,635 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,433 UART: [rt]cmd =0x46505652, len=4
3,312,104 UART: [rt] FIPS Version
3,313,007 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,187 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,449 >>> mbox cmd response data (36 bytes)
1,139,450 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,628,051 >>> mbox cmd response: success
2,628,051 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,601 UART:
2,689,617 UART: Running Caliptra FMC ...
2,690,025 UART:
2,690,079 UART: [state] CFI Enabled
2,700,300 UART: [fht] FMC Alias Private Key: 7
2,808,159 UART: [art] Extend RT PCRs Done
2,808,587 UART: [art] Lock RT PCRs Done
2,810,199 UART: [art] Populate DV Done
2,818,444 UART: [fht] FMC Alias Private Key: 7
2,819,578 UART: [art] Derive CDI
2,819,858 UART: [art] Store in in slot 0x4
2,905,551 UART: [art] Derive Key Pair
2,905,911 UART: [art] Store priv key in slot 0x5
2,919,299 UART: [art] Derive Key Pair - Done
2,933,756 UART: [art] Signing Cert with AUTHO
2,934,236 UART: RITY.KEYID = 7
2,949,840 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,605 UART: [art] PUB.X = BC503C6DAA4F2F05A9726766EB9551AFE7921FD2B46E96F3FC60CD9354A434B0C30D07B27B2CE760076DD6F2F0B7F15A
2,957,377 UART: [art] PUB.Y = F52657998BB660281FDB830015B4BAD48A25FB34F629B0FD2A7AA6ADC1F1BF1CA7E5B354486CA3DD2E71B30BF0D5139C
2,964,320 UART: [art] SIG.R = DEF07ADEAAC1A52A14CABB645C8A8D7FCB2E0F9FEEF55BF67CE2F95C96F4BC9AC1E26858CBC19555E4AC211EFB1B940E
2,971,122 UART: [art] SIG.S = D2C751EB3335C350FE9F60341E00A2E0BB2D35DD2E9EF06841BC06E476E7398FC655D76703A66A438EEBE4556E6686F3
2,995,053 UART: Caliptra RT
2,995,306 UART: [state] CFI Enabled
3,102,756 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,028 UART: [rt]cmd =0x46505652, len=4
3,133,699 UART: [rt] FIPS Version
3,134,614 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
893,283 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,408 UART: [kat] ++
897,560 UART: [kat] sha1
901,748 UART: [kat] SHA2-256
903,688 UART: [kat] SHA2-384
906,411 UART: [kat] SHA2-512-ACC
908,312 UART: [kat] ECC-384
918,411 UART: [kat] HMAC-384Kdf
923,033 UART: [kat] LMS
1,171,361 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,816 UART: [fht] FHT @ 0x50003400
1,175,391 UART: [idev] ++
1,175,559 UART: [idev] CDI.KEYID = 6
1,175,919 UART: [idev] SUBJECT.KEYID = 7
1,176,343 UART: [idev] UDS.KEYID = 0
1,176,688 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,439 UART: [idev] Erasing UDS.KEYID = 0
1,201,400 UART: [idev] Sha1 KeyId Algorithm
1,209,844 UART: [idev] --
1,210,850 UART: [ldev] ++
1,211,018 UART: [ldev] CDI.KEYID = 6
1,211,381 UART: [ldev] SUBJECT.KEYID = 5
1,211,807 UART: [ldev] AUTHORITY.KEYID = 7
1,212,270 UART: [ldev] FE.KEYID = 1
1,217,566 UART: [ldev] Erasing FE.KEYID = 1
1,243,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,898 UART: [ldev] --
1,282,209 UART: [fwproc] Wait for Commands...
1,282,987 UART: [fwproc] Recv command 0x46505652
1,283,808 UART: [rt] FIPS Version
1,284,362 >>> mbox cmd response data (36 bytes)
1,284,363 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,553 UART: [fwproc] Recv command 0x46574c44
1,285,281 UART: [fwproc] Recv'd Img size: 114448 bytes
2,585,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,910 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,778,325 >>> mbox cmd response: success
2,778,325 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,779,459 UART: [afmc] ++
2,779,627 UART: [afmc] CDI.KEYID = 6
2,779,989 UART: [afmc] SUBJECT.KEYID = 7
2,780,414 UART: [afmc] AUTHORITY.KEYID = 5
2,815,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,992 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,720 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,605 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,322 UART: [afmc] --
2,859,270 UART: [cold-reset] --
2,860,132 UART: [state] Locking Datavault
2,861,277 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,881 UART: [state] Locking ICCM
2,862,431 UART: [exit] Launching FMC @ 0x40000130
2,867,760 UART:
2,867,776 UART: Running Caliptra FMC ...
2,868,184 UART:
2,868,327 UART: [state] CFI Enabled
2,878,868 UART: [fht] FMC Alias Private Key: 7
2,986,929 UART: [art] Extend RT PCRs Done
2,987,357 UART: [art] Lock RT PCRs Done
2,989,441 UART: [art] Populate DV Done
2,997,554 UART: [fht] FMC Alias Private Key: 7
2,998,522 UART: [art] Derive CDI
2,998,802 UART: [art] Store in in slot 0x4
3,084,775 UART: [art] Derive Key Pair
3,085,135 UART: [art] Store priv key in slot 0x5
3,099,071 UART: [art] Derive Key Pair - Done
3,113,792 UART: [art] Signing Cert with AUTHO
3,114,272 UART: RITY.KEYID = 7
3,129,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,613 UART: [art] PUB.X = A70A89803A83F338868722360BEC488ACC0AF0098DF46D13EC796F1B1F08BEB28547D0761D360D169783AEA104A332D3
3,137,362 UART: [art] PUB.Y = 468E9BF2C1A316D9A2A404C1B5FF2DAE41D2E090A4BDEAB000B113DBA2B07FBB8E8DCDE3394CA51450B11676BEF6AEB2
3,144,315 UART: [art] SIG.R = 5FC8C8B0F8BCCAFD3B4105D269DCD94C0C3BDD3D55BCA659465ABCEE68CAE1950C01DF6CAD99CCA373BF410298FC6A22
3,151,102 UART: [art] SIG.S = DED9AC81366F0271A7F0CAC695EDF4AF3967F94DEED7B1F8958F09206CC669181434AA070E9E1C42580EE2F444B83FBB
3,175,102 UART: Caliptra RT
3,175,447 UART: [state] CFI Enabled
3,283,138 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,814 UART: [rt]cmd =0x46505652, len=4
3,314,485 UART: [rt] FIPS Version
3,315,688 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,462 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,594 >>> mbox cmd response data (36 bytes)
1,141,595 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,630,643 >>> mbox cmd response: success
2,630,643 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,693,303 UART:
2,693,319 UART: Running Caliptra FMC ...
2,693,727 UART:
2,693,870 UART: [state] CFI Enabled
2,704,299 UART: [fht] FMC Alias Private Key: 7
2,811,998 UART: [art] Extend RT PCRs Done
2,812,426 UART: [art] Lock RT PCRs Done
2,813,638 UART: [art] Populate DV Done
2,822,115 UART: [fht] FMC Alias Private Key: 7
2,823,227 UART: [art] Derive CDI
2,823,507 UART: [art] Store in in slot 0x4
2,909,382 UART: [art] Derive Key Pair
2,909,742 UART: [art] Store priv key in slot 0x5
2,923,058 UART: [art] Derive Key Pair - Done
2,937,767 UART: [art] Signing Cert with AUTHO
2,938,247 UART: RITY.KEYID = 7
2,953,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,128 UART: [art] PUB.X = 5E79D2372700856CF2CD573843047620C1F8B8918BA8B6F8F93FCDD8DB6BF64265DE4F2C9F36AD35AD8375E13A873C8C
2,960,881 UART: [art] PUB.Y = 016A31BB71CC64902088438D4A538048FC6AC872533B18A625A3CB7A4F9365E164602670918F3A4298D8AC4DBF7EBEFA
2,967,830 UART: [art] SIG.R = 3E84299C35692BEBDEC3428B800639C11D9EA60B6DEC9EBF9011439F906A7B2D63267EABE8A7319DE32D06D60CCD5395
2,974,598 UART: [art] SIG.S = 1D9C9539347D1C7E9DBAE67423CFA68092BA08A6480524B0FE1FB4B9889D888AA3F6E0C80A3B17B85C4CB1650A5201E0
2,998,230 UART: Caliptra RT
2,998,575 UART: [state] CFI Enabled
3,106,426 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,304 UART: [rt]cmd =0x46505652, len=4
3,137,975 UART: [rt] FIPS Version
3,138,842 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,035 UART: [kat] ++
895,187 UART: [kat] sha1
899,575 UART: [kat] SHA2-256
901,515 UART: [kat] SHA2-384
904,158 UART: [kat] SHA2-512-ACC
906,059 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,505 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,198,881 UART: [idev] Sha1 KeyId Algorithm
1,207,859 UART: [idev] --
1,208,852 UART: [ldev] ++
1,209,020 UART: [ldev] CDI.KEYID = 6
1,209,384 UART: [ldev] SUBJECT.KEYID = 5
1,209,811 UART: [ldev] AUTHORITY.KEYID = 7
1,210,274 UART: [ldev] FE.KEYID = 1
1,215,632 UART: [ldev] Erasing FE.KEYID = 1
1,241,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,636 UART: [ldev] --
1,281,046 UART: [fwproc] Wait for Commands...
1,281,839 UART: [fwproc] Recv command 0x46505652
1,282,666 UART: [rt] FIPS Version
1,283,227 >>> mbox cmd response data (36 bytes)
1,283,228 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,283,419 UART: [fwproc] Recv command 0x46574c44
1,284,152 UART: [fwproc] Recv'd Img size: 114448 bytes
2,582,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,719 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,092 >>> mbox cmd response: success
2,775,092 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,291 UART: [afmc] ++
2,776,459 UART: [afmc] CDI.KEYID = 6
2,776,822 UART: [afmc] SUBJECT.KEYID = 7
2,777,248 UART: [afmc] AUTHORITY.KEYID = 5
2,812,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,864 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,476 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,195 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,126 UART: [afmc] --
2,856,042 UART: [cold-reset] --
2,856,898 UART: [state] Locking Datavault
2,858,145 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,749 UART: [state] Locking ICCM
2,859,219 UART: [exit] Launching FMC @ 0x40000130
2,864,548 UART:
2,864,564 UART: Running Caliptra FMC ...
2,864,972 UART:
2,865,026 UART: [state] CFI Enabled
2,874,843 UART: [fht] FMC Alias Private Key: 7
2,983,166 UART: [art] Extend RT PCRs Done
2,983,594 UART: [art] Lock RT PCRs Done
2,985,174 UART: [art] Populate DV Done
2,993,811 UART: [fht] FMC Alias Private Key: 7
2,994,917 UART: [art] Derive CDI
2,995,197 UART: [art] Store in in slot 0x4
3,080,958 UART: [art] Derive Key Pair
3,081,318 UART: [art] Store priv key in slot 0x5
3,094,452 UART: [art] Derive Key Pair - Done
3,109,265 UART: [art] Signing Cert with AUTHO
3,109,745 UART: RITY.KEYID = 7
3,125,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,818 UART: [art] PUB.X = 673B0A5232106A8CB7607F4489FE6692C2F576283536387629CA4988295CFFED2007D2AAE5ABA40D831CCE24C787A730
3,132,577 UART: [art] PUB.Y = 803F290306E3C02A8C84ED14A4284FECEF3BAF25CB2352D728CA70488ED6C66A0C40E509EC8E22F58A8892E40381AF7F
3,139,522 UART: [art] SIG.R = 4DF7F9AA5AEBA60C96B6978490B8FA6E154837B31A9813657BB6278D942FA2E48338DB4569F7F72C691D0EAD41441EFC
3,146,294 UART: [art] SIG.S = BBB6BC75A1FF050F6938B81C9C6748504C177579C8DFEBA8CD2E5C080531EAB34DE283680134E288BEBF9C99350F596B
3,169,963 UART: Caliptra RT
3,170,216 UART: [state] CFI Enabled
3,277,683 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,259 UART: [rt]cmd =0x46505652, len=4
3,308,930 UART: [rt] FIPS Version
3,309,811 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,404 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,644 >>> mbox cmd response data (36 bytes)
1,135,645 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,624,170 >>> mbox cmd response: success
2,624,170 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,344 UART:
2,686,360 UART: Running Caliptra FMC ...
2,686,768 UART:
2,686,822 UART: [state] CFI Enabled
2,696,857 UART: [fht] FMC Alias Private Key: 7
2,805,456 UART: [art] Extend RT PCRs Done
2,805,884 UART: [art] Lock RT PCRs Done
2,807,428 UART: [art] Populate DV Done
2,815,407 UART: [fht] FMC Alias Private Key: 7
2,816,421 UART: [art] Derive CDI
2,816,701 UART: [art] Store in in slot 0x4
2,902,346 UART: [art] Derive Key Pair
2,902,706 UART: [art] Store priv key in slot 0x5
2,915,466 UART: [art] Derive Key Pair - Done
2,929,785 UART: [art] Signing Cert with AUTHO
2,930,265 UART: RITY.KEYID = 7
2,945,465 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,230 UART: [art] PUB.X = BA0D1C0CC39F4B7A2B52E1CDB7FCAD562B4FD5FB379412A9DF26BB2825EBC1DE1897B31E5F52C8524433A788D59D5AB4
2,953,016 UART: [art] PUB.Y = 86251B269BD19E625BC92FBBC2890B666AB461C51AE2A59143F9DEADBE55FC984622F6FE712FEC338A4ED9BCF3002901
2,959,952 UART: [art] SIG.R = 38CB4CE56CD7DD16A39EAFD6B43388B648C5CD10C5CD97A403715CEAB9D367416907EF054141AFA8818519A72C8FA0AB
2,966,727 UART: [art] SIG.S = B682B782A6E8E412138CDE97FD01853272A2ECA737A65AA33231BF46100D27545AE8040952CC6306AE451492F6B9AB30
2,990,777 UART: Caliptra RT
2,991,030 UART: [state] CFI Enabled
3,098,783 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,139 UART: [rt]cmd =0x46505652, len=4
3,129,810 UART: [rt] FIPS Version
3,130,865 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,674 UART: [kat] SHA2-256
901,614 UART: [kat] SHA2-384
904,277 UART: [kat] SHA2-512-ACC
906,178 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,661 UART: [kat] LMS
1,168,973 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,172,754 UART: [idev] ++
1,172,922 UART: [idev] CDI.KEYID = 6
1,173,283 UART: [idev] SUBJECT.KEYID = 7
1,173,708 UART: [idev] UDS.KEYID = 0
1,174,054 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,942 UART: [idev] Erasing UDS.KEYID = 0
1,199,238 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,216,127 UART: [ldev] Erasing FE.KEYID = 1
1,242,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,393 UART: [ldev] --
1,281,731 UART: [fwproc] Wait for Commands...
1,282,528 UART: [fwproc] Recv command 0x46505652
1,283,355 UART: [rt] FIPS Version
1,283,916 >>> mbox cmd response data (36 bytes)
1,283,917 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
1,284,118 UART: [fwproc] Recv command 0x46574c44
1,284,851 UART: [fwproc] Recv'd Img size: 114448 bytes
2,583,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89764
2,775,745 >>> mbox cmd response: success
2,775,745 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,962 UART: [afmc] ++
2,777,130 UART: [afmc] CDI.KEYID = 6
2,777,493 UART: [afmc] SUBJECT.KEYID = 7
2,777,919 UART: [afmc] AUTHORITY.KEYID = 5
2,813,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,001 UART: [afmc] --
2,856,905 UART: [cold-reset] --
2,857,957 UART: [state] Locking Datavault
2,859,112 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,716 UART: [state] Locking ICCM
2,860,228 UART: [exit] Launching FMC @ 0x40000130
2,865,557 UART:
2,865,573 UART: Running Caliptra FMC ...
2,865,981 UART:
2,866,124 UART: [state] CFI Enabled
2,876,665 UART: [fht] FMC Alias Private Key: 7
2,984,848 UART: [art] Extend RT PCRs Done
2,985,276 UART: [art] Lock RT PCRs Done
2,986,638 UART: [art] Populate DV Done
2,994,929 UART: [fht] FMC Alias Private Key: 7
2,995,929 UART: [art] Derive CDI
2,996,209 UART: [art] Store in in slot 0x4
3,081,884 UART: [art] Derive Key Pair
3,082,244 UART: [art] Store priv key in slot 0x5
3,095,582 UART: [art] Derive Key Pair - Done
3,110,440 UART: [art] Signing Cert with AUTHO
3,110,920 UART: RITY.KEYID = 7
3,126,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,343 UART: [art] PUB.X = 1C330ED309143FFBEA5F01F1B410B77C6CA70B0DC7F019B9274354CEE746CD6C016B31F56EFD6E57A27BA33513B677FB
3,134,109 UART: [art] PUB.Y = 0C7EC166935604626F9BE5492D5782A91F7E41A7BD3DAEB03FC0286BBF55248CAB8103CB18F8F55B497B100DDD02E8F3
3,141,054 UART: [art] SIG.R = 11947E0FECB0B0AD8034542B7CB9F62B402D0E024DA2EC954C747B40FBF80894A262ACCCD9B981D556F7A4F8616803EE
3,147,821 UART: [art] SIG.S = D1E80FAFA408F830BA649607839817FB6A988DE121B4CDE160E6866019687F5C49E85B858CC249282DB8F3AF0845DEA1
3,171,160 UART: Caliptra RT
3,171,505 UART: [state] CFI Enabled
3,280,658 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,328 UART: [rt]cmd =0x46505652, len=4
3,311,999 UART: [rt] FIPS Version
3,313,154 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,257 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,231 >>> mbox cmd response data (36 bytes)
1,137,232 <<< Executing mbox cmd 0x46574c44 (114448 bytes) from SoC
2,625,041 >>> mbox cmd response: success
2,625,041 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,857 UART:
2,686,873 UART: Running Caliptra FMC ...
2,687,281 UART:
2,687,424 UART: [state] CFI Enabled
2,697,823 UART: [fht] FMC Alias Private Key: 7
2,805,524 UART: [art] Extend RT PCRs Done
2,805,952 UART: [art] Lock RT PCRs Done
2,807,674 UART: [art] Populate DV Done
2,815,959 UART: [fht] FMC Alias Private Key: 7
2,817,023 UART: [art] Derive CDI
2,817,303 UART: [art] Store in in slot 0x4
2,902,838 UART: [art] Derive Key Pair
2,903,198 UART: [art] Store priv key in slot 0x5
2,916,570 UART: [art] Derive Key Pair - Done
2,931,122 UART: [art] Signing Cert with AUTHO
2,931,602 UART: RITY.KEYID = 7
2,946,864 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,629 UART: [art] PUB.X = DEB6E0DECCBD79FEF94F9BDD8926CD598F77A18AA0D7D3C1C8181781EC0B22DB447364A8D2DB1E0903A2D6462B2EA214
2,954,412 UART: [art] PUB.Y = 6B09708A063024FC2DC5D08C17D07E7E8D59E6B57145D409FF3924DEB77EA0DF04D31C4DB939C6942D7C17722F1014E6
2,961,354 UART: [art] SIG.R = F71C6AD33E547B80AD046C8B6D884FEA65B08990905B0BC969EFD7C9A4C5DEBA276CD7FE1559CEDC73E3E312967BB419
2,968,136 UART: [art] SIG.S = 88C71BA1A58A6586F80E40661B0F1CDCD5C483E7644A2B6242703D622FA087888BBC560D1535DCFDF183700D6AB2241D
2,992,529 UART: Caliptra RT
2,992,874 UART: [state] CFI Enabled
3,100,594 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,162 UART: [rt]cmd =0x46505652, len=4
3,131,833 UART: [rt] FIPS Version
3,132,990 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,051 UART:
192,430 UART: Running Caliptra ROM ...
193,617 UART:
193,792 UART: [state] CFI Enabled
265,609 UART: [state] LifecycleState = Unprovisioned
267,592 UART: [state] DebugLocked = No
269,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,855 UART: [kat] SHA2-256
444,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,034 UART: [kat] ++
455,524 UART: [kat] sha1
467,540 UART: [kat] SHA2-256
470,195 UART: [kat] SHA2-384
476,765 UART: [kat] SHA2-512-ACC
479,139 UART: [kat] ECC-384
2,766,986 UART: [kat] HMAC-384Kdf
2,798,714 UART: [kat] LMS
3,988,986 UART: [kat] --
3,992,719 UART: [cold-reset] ++
3,994,691 UART: [fht] Storing FHT @ 0x50003400
4,005,473 UART: [idev] ++
4,006,089 UART: [idev] CDI.KEYID = 6
4,006,991 UART: [idev] SUBJECT.KEYID = 7
4,008,249 UART: [idev] UDS.KEYID = 0
4,009,305 ready_for_fw is high
4,009,535 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,154,255 UART: [idev] Erasing UDS.KEYID = 0
7,347,653 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,126 UART: [idev] --
7,372,933 UART: [ldev] ++
7,373,560 UART: [ldev] CDI.KEYID = 6
7,374,447 UART: [ldev] SUBJECT.KEYID = 5
7,375,659 UART: [ldev] AUTHORITY.KEYID = 7
7,376,951 UART: [ldev] FE.KEYID = 1
7,423,295 UART: [ldev] Erasing FE.KEYID = 1
10,755,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,441 UART: [ldev] --
13,138,003 UART: [fwproc] Waiting for Commands...
13,140,058 UART: [fwproc] Received command 0x46574c44
13,142,250 UART: [fwproc] Received Image of size 114996 bytes
17,204,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,284,919 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,353,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,674,900 >>> mbox cmd response: success
17,675,312 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,679,441 UART: [afmc] ++
17,680,057 UART: [afmc] CDI.KEYID = 6
17,680,963 UART: [afmc] SUBJECT.KEYID = 7
17,682,206 UART: [afmc] AUTHORITY.KEYID = 5
21,042,068 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,342,578 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,344,834 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,359,265 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,374,090 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,388,523 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,408,607 UART: [afmc] --
23,412,746 UART: [cold-reset] --
23,417,689 UART: [state] Locking Datavault
23,422,871 UART: [state] Locking PCR0, PCR1 and PCR31
23,424,612 UART: [state] Locking ICCM
23,426,542 UART: [exit] Launching FMC @ 0x40000130
23,434,938 UART:
23,435,181 UART: Running Caliptra FMC ...
23,436,309 UART:
23,436,469 UART: [state] CFI Enabled
23,501,463 UART: [fht] FMC Alias Private Key: 7
25,839,304 UART: [art] Extend RT PCRs Done
25,840,527 UART: [art] Lock RT PCRs Done
25,842,242 UART: [art] Populate DV Done
25,847,657 UART: [fht] FMC Alias Private Key: 7
25,849,320 UART: [art] Derive CDI
25,850,061 UART: [art] Store in in slot 0x4
25,910,028 UART: [art] Derive Key Pair
25,911,069 UART: [art] Store priv key in slot 0x5
29,203,524 UART: [art] Derive Key Pair - Done
29,216,925 UART: [art] Signing Cert with AUTHO
29,218,228 UART: RITY.KEYID = 7
31,504,895 UART: [art] Erasing AUTHORITY.KEYID = 7
31,506,398 UART: [art] PUB.X = 265BAFA325E98F0B3128972F50B1947E7A69C0C717ED7590B6ADAF077F2FE640CF351B916B2C5A3115FE85DB7410EE09
31,513,669 UART: [art] PUB.Y = AD62705BF47CD02844FAFE324E7B8386D653BAC9F1CE88D27F67FA5A1C5237AD0E4102429B19D9F0E9BA07CBA029B80B
31,520,903 UART: [art] SIG.R = 77A0E57E5B37A217167186B1978373ED50A8D4DD304F9E05D45C13D93120714C775563F4A75402DA847828D40BA358C4
31,528,255 UART: [art] SIG.S = C9DB52783188D01D006248143CDA3EE9DFACAD704BFDE8746D433B776890F351A05ABFE0C971E572221F5914070FE8A8
32,833,295 UART: Caliptra RT
32,834,009 UART: [state] CFI Enabled
33,015,455 UART: [rt] RT listening for mailbox commands...
33,046,759 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,784,294 ready_for_fw is high
3,784,758 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
17,876,872 >>> mbox cmd response: success
17,877,402 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,570,907 UART:
23,571,382 UART: Running Caliptra FMC ...
23,572,563 UART:
23,572,726 UART: [state] CFI Enabled
23,642,804 UART: [fht] FMC Alias Private Key: 7
25,980,369 UART: [art] Extend RT PCRs Done
25,981,596 UART: [art] Lock RT PCRs Done
25,983,316 UART: [art] Populate DV Done
25,988,853 UART: [fht] FMC Alias Private Key: 7
25,990,549 UART: [art] Derive CDI
25,991,288 UART: [art] Store in in slot 0x4
26,051,099 UART: [art] Derive Key Pair
26,052,144 UART: [art] Store priv key in slot 0x5
29,344,786 UART: [art] Derive Key Pair - Done
29,357,542 UART: [art] Signing Cert with AUTHO
29,358,848 UART: RITY.KEYID = 7
31,645,823 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,352 UART: [art] PUB.X = D6646AE4491EF1FAB6F120C8AE02C7E313EE79596AF6016B74907B035391924CB25DE29BC7F585BEE75430E5261A5A32
31,654,575 UART: [art] PUB.Y = 87F4B58CF9720F69DF41F546362C2072729551C5B76001D5429B767510201E3AE261509B09F84147569E315A86D43FFB
31,661,795 UART: [art] SIG.R = FF655EA8D137B50D443C51C7F7EAC2EDB3F2BA265FBB457348629B25F52E182195694FAFEA28DBF597C30E2551216963
31,669,160 UART: [art] SIG.S = 2DA264C71515DEF49847B48F66F919884F9B4FF38015ABF24F431F509292C85B45087C8EA4879D7DB862978E261185E0
32,974,070 UART: Caliptra RT
32,974,769 UART: [state] CFI Enabled
33,135,517 UART: [rt] RT listening for mailbox commands...
33,167,018 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,322 UART:
192,682 UART: Running Caliptra ROM ...
193,780 UART:
603,397 UART: [state] CFI Enabled
619,267 UART: [state] LifecycleState = Unprovisioned
621,212 UART: [state] DebugLocked = No
622,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,387 UART: [kat] SHA2-256
797,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,735 UART: [kat] ++
808,183 UART: [kat] sha1
818,983 UART: [kat] SHA2-256
821,647 UART: [kat] SHA2-384
828,419 UART: [kat] SHA2-512-ACC
830,798 UART: [kat] ECC-384
3,115,189 UART: [kat] HMAC-384Kdf
3,126,357 UART: [kat] LMS
4,316,511 UART: [kat] --
4,321,232 UART: [cold-reset] ++
4,323,193 UART: [fht] Storing FHT @ 0x50003400
4,333,691 UART: [idev] ++
4,334,257 UART: [idev] CDI.KEYID = 6
4,335,179 UART: [idev] SUBJECT.KEYID = 7
4,336,430 UART: [idev] UDS.KEYID = 0
4,337,477 ready_for_fw is high
4,337,694 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
4,482,148 UART: [idev] Erasing UDS.KEYID = 0
7,622,782 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,989 UART: [idev] --
7,647,256 UART: [ldev] ++
7,647,824 UART: [ldev] CDI.KEYID = 6
7,648,765 UART: [ldev] SUBJECT.KEYID = 5
7,649,977 UART: [ldev] AUTHORITY.KEYID = 7
7,651,266 UART: [ldev] FE.KEYID = 1
7,663,832 UART: [ldev] Erasing FE.KEYID = 1
10,955,659 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,515 UART: [ldev] --
13,315,189 UART: [fwproc] Waiting for Commands...
13,317,394 UART: [fwproc] Received command 0x46574c44
13,319,584 UART: [fwproc] Received Image of size 114996 bytes
17,377,977 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,540 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 90292
17,845,421 >>> mbox cmd response: success
17,845,868 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,848,859 UART: [afmc] ++
17,849,442 UART: [afmc] CDI.KEYID = 6
17,850,413 UART: [afmc] SUBJECT.KEYID = 7
17,851,621 UART: [afmc] AUTHORITY.KEYID = 5
21,167,847 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,463,164 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,465,460 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,479,839 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,494,654 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,509,089 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,488 UART: [afmc] --
23,535,044 UART: [cold-reset] --
23,539,535 UART: [state] Locking Datavault
23,546,211 UART: [state] Locking PCR0, PCR1 and PCR31
23,547,911 UART: [state] Locking ICCM
23,550,076 UART: [exit] Launching FMC @ 0x40000130
23,558,471 UART:
23,558,715 UART: Running Caliptra FMC ...
23,559,836 UART:
23,559,996 UART: [state] CFI Enabled
23,568,146 UART: [fht] FMC Alias Private Key: 7
25,898,637 UART: [art] Extend RT PCRs Done
25,899,855 UART: [art] Lock RT PCRs Done
25,901,641 UART: [art] Populate DV Done
25,907,365 UART: [fht] FMC Alias Private Key: 7
25,908,928 UART: [art] Derive CDI
25,909,689 UART: [art] Store in in slot 0x4
25,952,389 UART: [art] Derive Key Pair
25,953,427 UART: [art] Store priv key in slot 0x5
29,195,453 UART: [art] Derive Key Pair - Done
29,208,554 UART: [art] Signing Cert with AUTHO
29,209,863 UART: RITY.KEYID = 7
31,489,086 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,596 UART: [art] PUB.X = 29E1A894AB2F30BD2E997C8A5BF13D2BF8BBF97FD5D887B52793F136D2AA49E9FFF5412E9339D8D5071B982BC869A773
31,497,860 UART: [art] PUB.Y = 0FEE7D9BFF878D38AA4321C0408161A277BD88E9398253061789BCD5AA9211EDBEABB96217EFF4DEADB862A5EE12E79E
31,505,096 UART: [art] SIG.R = D3D74F4AAB3F1ACCCA566ABD9D938060BCD26F0325A297F0D230748213780F401C93F096257FD015B3C157A59D6342EC
31,512,494 UART: [art] SIG.S = 1ED2316F86CA5C6CA3E238AEF7482C770771A22816088FE9BEF243FFA6E3C72C50B2037789A87576D8EBC19527E787FA
32,817,915 UART: Caliptra RT
32,818,627 UART: [state] CFI Enabled
32,936,027 UART: [rt] RT listening for mailbox commands...
32,967,509 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
4,127,976 ready_for_fw is high
4,128,516 <<< Executing mbox cmd 0x46574c44 (114996 bytes) from SoC
18,090,286 >>> mbox cmd response: success
18,090,847 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,736,904 UART:
23,737,392 UART: Running Caliptra FMC ...
23,738,550 UART:
23,738,705 UART: [state] CFI Enabled
23,746,838 UART: [fht] FMC Alias Private Key: 7
26,077,335 UART: [art] Extend RT PCRs Done
26,078,563 UART: [art] Lock RT PCRs Done
26,080,046 UART: [art] Populate DV Done
26,085,717 UART: [fht] FMC Alias Private Key: 7
26,087,451 UART: [art] Derive CDI
26,088,190 UART: [art] Store in in slot 0x4
26,130,837 UART: [art] Derive Key Pair
26,131,837 UART: [art] Store priv key in slot 0x5
29,373,683 UART: [art] Derive Key Pair - Done
29,386,701 UART: [art] Signing Cert with AUTHO
29,388,013 UART: RITY.KEYID = 7
31,667,591 UART: [art] Erasing AUTHORITY.KEYID = 7
31,669,130 UART: [art] PUB.X = 84279E363E9EC33EEC5779E78BAE3AAD805C143A1449E71B592F44D8D9744F72762779759117ACD40DE7D052E47F7126
31,676,329 UART: [art] PUB.Y = BCA320EB320C61B9D7C8BADB46C6AD4E4DB47ED6866323ED849C8A2951780898311ACC4A4824B7FFBE254BB5ED0F7E7F
31,683,596 UART: [art] SIG.R = 10BDD99FB711B4A0BC345012D72C3FB64FE007B7E88DCF2C220F7EEDA48DF41B7A4A7FECF98D37D4AD9CE559FEFD8F6B
31,690,997 UART: [art] SIG.S = B94BDD3331455820E8E3E2CDDA1DE04BA27E4631DA6F5DDC4CD59ADD91ABD4BA80A984369EF9BE8887ED4C2DEE25EB72
32,995,569 UART: Caliptra RT
32,996,270 UART: [state] CFI Enabled
33,113,904 UART: [rt] RT listening for mailbox commands...
33,145,174 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
192,230 UART:
192,607 UART: Running Caliptra ROM ...
193,806 UART:
193,969 UART: [state] CFI Enabled
263,041 UART: [state] LifecycleState = Unprovisioned
264,959 UART: [state] DebugLocked = No
266,638 UART: [state] WD Timer not started. Device not locked for debugging
269,817 UART: [kat] SHA2-256
448,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,481 UART: [kat] ++
461,017 UART: [kat] sha1
472,579 UART: [kat] SHA2-256
475,601 UART: [kat] SHA2-384
480,602 UART: [kat] SHA2-512-ACC
483,544 UART: [kat] ECC-384
2,924,663 UART: [kat] HMAC-384Kdf
2,949,065 UART: [kat] LMS
3,478,531 UART: [kat] --
3,483,548 UART: [cold-reset] ++
3,484,919 UART: [fht] FHT @ 0x50003400
3,496,855 UART: [idev] ++
3,497,460 UART: [idev] CDI.KEYID = 6
3,498,377 UART: [idev] SUBJECT.KEYID = 7
3,499,561 UART: [idev] UDS.KEYID = 0
3,500,512 ready_for_fw is high
3,500,740 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,645,649 UART: [idev] Erasing UDS.KEYID = 0
6,005,740 UART: [idev] Sha1 KeyId Algorithm
6,029,098 UART: [idev] --
6,032,886 UART: [ldev] ++
6,033,457 UART: [ldev] CDI.KEYID = 6
6,034,373 UART: [ldev] SUBJECT.KEYID = 5
6,035,541 UART: [ldev] AUTHORITY.KEYID = 7
6,036,830 UART: [ldev] FE.KEYID = 1
6,078,433 UART: [ldev] Erasing FE.KEYID = 1
8,577,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,637 UART: [ldev] --
10,371,480 UART: [fwproc] Wait for Commands...
10,373,559 UART: [fwproc] Recv command 0x46574c44
10,375,663 UART: [fwproc] Recv'd Img size: 115304 bytes
13,789,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,860,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,928,988 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,250,412 >>> mbox cmd response: success
14,250,798 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,254,329 UART: [afmc] ++
14,254,907 UART: [afmc] CDI.KEYID = 6
14,255,824 UART: [afmc] SUBJECT.KEYID = 7
14,256,997 UART: [afmc] AUTHORITY.KEYID = 5
16,781,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,525,693 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,541,692 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,557,542 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,579,007 UART: [afmc] --
18,582,909 UART: [cold-reset] --
18,587,192 UART: [state] Locking Datavault
18,594,049 UART: [state] Locking PCR0, PCR1 and PCR31
18,595,719 UART: [state] Locking ICCM
18,597,574 UART: [exit] Launching FMC @ 0x40000130
18,605,986 UART:
18,606,228 UART: Running Caliptra FMC ...
18,607,331 UART:
18,607,488 UART: [state] CFI Enabled
18,665,018 UART: [fht] FMC Alias Private Key: 7
20,428,583 UART: [art] Extend RT PCRs Done
20,429,798 UART: [art] Lock RT PCRs Done
20,431,836 UART: [art] Populate DV Done
20,437,194 UART: [fht] FMC Alias Private Key: 7
20,438,682 UART: [art] Derive CDI
20,439,443 UART: [art] Store in in slot 0x4
20,497,832 UART: [art] Derive Key Pair
20,498,871 UART: [art] Store priv key in slot 0x5
22,960,781 UART: [art] Derive Key Pair - Done
22,973,572 UART: [art] Signing Cert with AUTHO
22,974,885 UART: RITY.KEYID = 7
24,687,342 UART: [art] Erasing AUTHORITY.KEYID = 7
24,688,980 UART: [art] PUB.X = F0984AB5B4FAD5A270516D1504600159DD0D18302040A19EE94970DC26C0A16F796496AE68DA5F4627CBB8E970B23FF8
24,696,097 UART: [art] PUB.Y = 66F06071D152F18BEF94BDDA846EBBE4617B7C64284F1B02B6F65E9E1F85D4CB23667C5CBB1ADF25874930E4052F8291
24,703,367 UART: [art] SIG.R = 322EABF8C1EFFC7FA5F4BADD7668566D107C58C64CA8280921D3541047D3CDA4CEF28ABFE8506CAEC76906E19BDF6BEC
24,710,807 UART: [art] SIG.S = F054AF2AC13EF627D776B11BDCCC17ABB249DD1B3C29413D9319ADDC584C21087A3FB2737A62EBFAE89599CABB19E5AC
25,689,808 UART: Caliptra RT
25,690,520 UART: [state] CFI Enabled
25,865,091 UART: [rt] RT listening for mailbox commands...
25,896,512 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,361,495 ready_for_fw is high
3,361,926 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,032,602 >>> mbox cmd response: success
14,033,266 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,324,523 UART:
18,324,910 UART: Running Caliptra FMC ...
18,326,196 UART:
18,326,368 UART: [state] CFI Enabled
18,390,904 UART: [fht] FMC Alias Private Key: 7
20,154,414 UART: [art] Extend RT PCRs Done
20,155,641 UART: [art] Lock RT PCRs Done
20,157,188 UART: [art] Populate DV Done
20,162,420 UART: [fht] FMC Alias Private Key: 7
20,164,049 UART: [art] Derive CDI
20,164,870 UART: [art] Store in in slot 0x4
20,223,406 UART: [art] Derive Key Pair
20,224,440 UART: [art] Store priv key in slot 0x5
22,687,499 UART: [art] Derive Key Pair - Done
22,700,345 UART: [art] Signing Cert with AUTHO
22,701,683 UART: RITY.KEYID = 7
24,413,686 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,194 UART: [art] PUB.X = E54AC852BFECE9869FF43567345426CCDE231598BB763A0DA7D43836772CDDD8894016F85E4FB0033732A9942B2D4D99
24,422,451 UART: [art] PUB.Y = FC82E18A18A605F68BC25EB2D9D452FCF910617DAEE9E3BE47746B799B21DE266146D85D0D23E0790500DB03B534AE99
24,429,704 UART: [art] SIG.R = 2EA89640B0F39A8820B3FBAF1EAD76AE5E3DBFB5DF62E8D60FDD4D71F45FE8093A8B44F0056941D3A7EDC3BB2ED15522
24,437,134 UART: [art] SIG.S = 32DAF060B09154C23A24283947699D27A76D34B0CFEC73C095077657B9D9EB7CDFFBF3CE54B9425B76E56D99BB11CB20
25,415,677 UART: Caliptra RT
25,416,379 UART: [state] CFI Enabled
25,581,631 UART: [rt] RT listening for mailbox commands...
25,612,671 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
192,737 UART:
193,107 UART: Running Caliptra ROM ...
194,336 UART:
603,804 UART: [state] CFI Enabled
619,887 UART: [state] LifecycleState = Unprovisioned
621,707 UART: [state] DebugLocked = No
624,663 UART: [state] WD Timer not started. Device not locked for debugging
629,211 UART: [kat] SHA2-256
808,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,904 UART: [kat] ++
820,449 UART: [kat] sha1
830,952 UART: [kat] SHA2-256
833,972 UART: [kat] SHA2-384
840,680 UART: [kat] SHA2-512-ACC
843,624 UART: [kat] ECC-384
3,287,799 UART: [kat] HMAC-384Kdf
3,300,256 UART: [kat] LMS
3,829,750 UART: [kat] --
3,833,590 UART: [cold-reset] ++
3,835,171 UART: [fht] FHT @ 0x50003400
3,846,087 UART: [idev] ++
3,846,652 UART: [idev] CDI.KEYID = 6
3,847,609 UART: [idev] SUBJECT.KEYID = 7
3,848,807 UART: [idev] UDS.KEYID = 0
3,849,742 ready_for_fw is high
3,849,956 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
3,994,755 UART: [idev] Erasing UDS.KEYID = 0
6,311,768 UART: [idev] Sha1 KeyId Algorithm
6,335,118 UART: [idev] --
6,339,172 UART: [ldev] ++
6,339,744 UART: [ldev] CDI.KEYID = 6
6,340,654 UART: [ldev] SUBJECT.KEYID = 5
6,341,817 UART: [ldev] AUTHORITY.KEYID = 7
6,343,102 UART: [ldev] FE.KEYID = 1
6,354,235 UART: [ldev] Erasing FE.KEYID = 1
8,830,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,594 UART: [ldev] --
10,620,216 UART: [fwproc] Wait for Commands...
10,623,130 UART: [fwproc] Recv command 0x46574c44
10,625,229 UART: [fwproc] Recv'd Img size: 115304 bytes
14,037,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,741 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
14,501,773 >>> mbox cmd response: success
14,502,205 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,506,526 UART: [afmc] ++
14,507,105 UART: [afmc] CDI.KEYID = 6
14,507,988 UART: [afmc] SUBJECT.KEYID = 7
14,509,225 UART: [afmc] AUTHORITY.KEYID = 5
17,009,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,618 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,379 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,284 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,321 UART: [afmc] --
18,805,590 UART: [cold-reset] --
18,810,043 UART: [state] Locking Datavault
18,815,470 UART: [state] Locking PCR0, PCR1 and PCR31
18,817,102 UART: [state] Locking ICCM
18,819,707 UART: [exit] Launching FMC @ 0x40000130
18,828,126 UART:
18,828,360 UART: Running Caliptra FMC ...
18,829,460 UART:
18,829,619 UART: [state] CFI Enabled
18,837,163 UART: [fht] FMC Alias Private Key: 7
20,593,581 UART: [art] Extend RT PCRs Done
20,594,820 UART: [art] Lock RT PCRs Done
20,596,360 UART: [art] Populate DV Done
20,601,564 UART: [fht] FMC Alias Private Key: 7
20,603,057 UART: [art] Derive CDI
20,603,823 UART: [art] Store in in slot 0x4
20,646,355 UART: [art] Derive Key Pair
20,647,393 UART: [art] Store priv key in slot 0x5
23,074,011 UART: [art] Derive Key Pair - Done
23,087,282 UART: [art] Signing Cert with AUTHO
23,088,596 UART: RITY.KEYID = 7
24,794,189 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,708 UART: [art] PUB.X = CF72329C56CFE3FA3881F7CA7AE5037D807C617A98594F740F6DC062C9212767C36B9A88BA13A38D2CE4269B2F519042
24,802,932 UART: [art] PUB.Y = 945C3640DF6E6D77576CF39F0672260C48BCBCE4B4817290566A33718BFCB5ED245CFC58FA9C2455CDBAD13DFE206C95
24,810,225 UART: [art] SIG.R = E2EEA8E98E602634A614A47D8E37658396EE113FF9D57B086AA3C7040AF3C8FED0F9B40C0CFB8FE4BE6EAB5CA249C673
24,817,622 UART: [art] SIG.S = 7598940C22983EF2A6A3884817595DDF7C9802E4017BCE7785DDAD3438A54CC7A9FE3FCB73C3E1B1BB8A47E0CBDB4165
25,796,975 UART: Caliptra RT
25,797,706 UART: [state] CFI Enabled
25,914,748 UART: [rt] RT listening for mailbox commands...
25,946,188 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,701,265 ready_for_fw is high
3,701,728 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,290,157 >>> mbox cmd response: success
14,290,650 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,538,096 UART:
18,538,464 UART: Running Caliptra FMC ...
18,539,667 UART:
18,539,844 UART: [state] CFI Enabled
18,547,615 UART: [fht] FMC Alias Private Key: 7
20,304,574 UART: [art] Extend RT PCRs Done
20,305,788 UART: [art] Lock RT PCRs Done
20,307,570 UART: [art] Populate DV Done
20,312,973 UART: [fht] FMC Alias Private Key: 7
20,314,493 UART: [art] Derive CDI
20,315,254 UART: [art] Store in in slot 0x4
20,357,760 UART: [art] Derive Key Pair
20,358,761 UART: [art] Store priv key in slot 0x5
22,785,760 UART: [art] Derive Key Pair - Done
22,798,529 UART: [art] Signing Cert with AUTHO
22,799,834 UART: RITY.KEYID = 7
24,505,405 UART: [art] Erasing AUTHORITY.KEYID = 7
24,506,889 UART: [art] PUB.X = E69FF7E8B11B22BB8D2DCA9A333104E1A31596508002B4DE72839F6B32CEC23CDC6E9F8E12D80D210FE00E9FB4F930DE
24,514,191 UART: [art] PUB.Y = D67C88758B5FA0BA75A313324C39074DBE4114C343BDF10AE83C0CDD9D539F57B8AB8CFFF10D10A8BD0E25BC3DCF72AD
24,521,475 UART: [art] SIG.R = A34D328F8E91FB8B2161D35A26A97A18F0F112033EE069FFCFDE37DD89D915490887D6538E233E70CAE9AF3A64DD2BAD
24,528,873 UART: [art] SIG.S = 5CAED538F79177C36AC72808F8C0D4188FD74D8612B72BB864BB16F43AE4F36D72812117C5825A8D11C350BA88AFBFEE
25,507,025 UART: Caliptra RT
25,507,742 UART: [state] CFI Enabled
25,624,792 UART: [rt] RT listening for mailbox commands...
25,656,509 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,438,205 ready_for_fw is high
3,438,788 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,765,875 >>> mbox cmd response: success
14,766,398 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,050,593 UART:
19,050,994 UART: Running Caliptra FMC ...
19,052,171 UART:
19,052,331 UART: [state] CFI Enabled
19,115,935 UART: [fht] FMC Alias Private Key: 7
20,880,186 UART: [art] Extend RT PCRs Done
20,881,424 UART: [art] Lock RT PCRs Done
20,883,302 UART: [art] Populate DV Done
20,888,715 UART: [fht] FMC Alias Private Key: 7
20,890,239 UART: [art] Derive CDI
20,890,998 UART: [art] Store in in slot 0x4
20,948,655 UART: [art] Derive Key Pair
20,949,692 UART: [art] Store priv key in slot 0x5
23,412,902 UART: [art] Derive Key Pair - Done
23,426,174 UART: [art] Signing Cert with AUTHO
23,427,511 UART: RITY.KEYID = 7
25,138,472 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,969 UART: [art] PUB.X = F02CF1BFBBB547A2CEFDB8EEAE87BEFA4B60AD9FCDA665047ED330F0CFCDF9274303A8AFB0CB3C55A7CCB80732834325
25,147,287 UART: [art] PUB.Y = 2ACAA9EAE115CF7852A71975D18EEFF4343AC20D5206C4033521A78748A3809A29311330B927129945F4BAA6A782F075
25,154,500 UART: [art] SIG.R = 80057DB3C98B39A35AFD5B9A306DB84EC2BF75F46DD023B893FD85337E53CAB53B8644D56E0B6FF042E229ABF9A11D80
25,161,899 UART: [art] SIG.S = D2F35929C6A23A0EBCE014B5EEA0CC6C6C41DE4C22D345B7BA6C5BBC98A1AA2A46C9FC5C6AB5FE1FE71F6305F0DE9401
26,140,993 UART: Caliptra RT
26,141,728 UART: [state] CFI Enabled
26,305,382 UART: [rt] RT listening for mailbox commands...
26,336,859 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,756,270 ready_for_fw is high
3,756,900 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
14,984,676 >>> mbox cmd response: success
14,985,255 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,241,167 UART:
19,241,566 UART: Running Caliptra FMC ...
19,242,706 UART:
19,242,858 UART: [state] CFI Enabled
19,250,796 UART: [fht] FMC Alias Private Key: 7
21,007,822 UART: [art] Extend RT PCRs Done
21,009,049 UART: [art] Lock RT PCRs Done
21,010,541 UART: [art] Populate DV Done
21,015,952 UART: [fht] FMC Alias Private Key: 7
21,017,552 UART: [art] Derive CDI
21,018,291 UART: [art] Store in in slot 0x4
21,060,579 UART: [art] Derive Key Pair
21,061,582 UART: [art] Store priv key in slot 0x5
23,488,587 UART: [art] Derive Key Pair - Done
23,501,618 UART: [art] Signing Cert with AUTHO
23,502,924 UART: RITY.KEYID = 7
25,208,210 UART: [art] Erasing AUTHORITY.KEYID = 7
25,209,721 UART: [art] PUB.X = DED8EB00FA3CEA447EE927E6482B19695E280157E3BD22DE90330FEF95AE0473F960D48CD23BB99088413B09B8DB0903
25,216,934 UART: [art] PUB.Y = 93CF6EECE784986C3350C1631F638F4B536C900A18C9B7BA4959F1DAB81BAFCF0EC10B210F4340A80A5A7D4CECDEB9B7
25,224,220 UART: [art] SIG.R = E5DABA034BFF2E04995AFC04A5AE26933D88550DCB991ACC0076941CFCF0BBBCAE41870A97FE34F266E36FAF22AC0FCE
25,231,675 UART: [art] SIG.S = BAF50D7A14A3BCA304A4351119BE403374728CA19D9B4E5C4C8EAFC2406819DD253E33808E0AA983B55E63236D00B0BA
26,210,482 UART: Caliptra RT
26,211,200 UART: [state] CFI Enabled
26,329,772 UART: [rt] RT listening for mailbox commands...
26,361,242 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,141 UART: [kat] SHA2-256
882,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,187 UART: [kat] ++
886,339 UART: [kat] sha1
890,469 UART: [kat] SHA2-256
892,407 UART: [kat] SHA2-384
895,058 UART: [kat] SHA2-512-ACC
896,959 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
907,114 UART: [kat] LMS
1,475,310 UART: [kat] --
1,476,027 UART: [cold-reset] ++
1,476,525 UART: [fht] Storing FHT @ 0x50003400
1,479,160 UART: [idev] ++
1,479,328 UART: [idev] CDI.KEYID = 6
1,479,688 UART: [idev] SUBJECT.KEYID = 7
1,480,112 UART: [idev] UDS.KEYID = 0
1,480,457 ready_for_fw is high
1,480,457 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,488,204 UART: [idev] Erasing UDS.KEYID = 0
1,505,076 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,522 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,521,055 UART: [ldev] Erasing FE.KEYID = 1
1,546,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,712 UART: [ldev] --
1,586,171 UART: [fwproc] Waiting for Commands...
1,586,978 UART: [fwproc] Received command 0x46574c44
1,587,769 UART: [fwproc] Received Image of size 115304 bytes
2,896,960 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,432 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,784 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,091,037 >>> mbox cmd response: success
3,091,037 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,092,101 UART: [afmc] ++
3,092,269 UART: [afmc] CDI.KEYID = 6
3,092,631 UART: [afmc] SUBJECT.KEYID = 7
3,093,056 UART: [afmc] AUTHORITY.KEYID = 5
3,128,005 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,207 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,715 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,600 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,290 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,093 UART: [afmc] --
3,171,169 UART: [cold-reset] --
3,172,077 UART: [state] Locking Datavault
3,173,202 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,806 UART: [state] Locking ICCM
3,174,432 UART: [exit] Launching FMC @ 0x40000130
3,179,761 UART:
3,179,777 UART: Running Caliptra FMC ...
3,180,185 UART:
3,180,239 UART: [state] CFI Enabled
3,191,042 UART: [fht] FMC Alias Private Key: 7
3,299,221 UART: [art] Extend RT PCRs Done
3,299,649 UART: [art] Lock RT PCRs Done
3,301,385 UART: [art] Populate DV Done
3,309,782 UART: [fht] FMC Alias Private Key: 7
3,310,804 UART: [art] Derive CDI
3,311,084 UART: [art] Store in in slot 0x4
3,396,773 UART: [art] Derive Key Pair
3,397,133 UART: [art] Store priv key in slot 0x5
3,410,183 UART: [art] Derive Key Pair - Done
3,425,075 UART: [art] Signing Cert with AUTHO
3,425,555 UART: RITY.KEYID = 7
3,440,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,334 UART: [art] PUB.X = 4E7B4F81242C7952129D2619ACD777C9EE84979BF3AF1419E1CC8EDE7362E7CDFE9AB9D3C4E8161BE028DE713E758B40
3,448,116 UART: [art] PUB.Y = 01734D5AA45C1965FF63EB4503CD3F20FAF33507D04061EA68FEDD63A5019D91BA51A6A1C95AE80B4D78EEB28B23EF9A
3,455,067 UART: [art] SIG.R = 20AA0D62AF8BCD20E2133AF7DD6A1071B9EA94F2A2C580E54A48191F29D366AACF476E8213C45F304ED777E44171B34A
3,461,844 UART: [art] SIG.S = B81C7ED6E5035D6FD43E6342FD046462C18191F23F8AE2B7C99EA38C0EBCE7D85153140EB8AC7BDF2A6F0D8DAF291EC9
3,485,726 UART: Caliptra RT
3,485,979 UART: [state] CFI Enabled
3,594,190 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,532 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,221 ready_for_fw is high
1,362,221 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,940,571 >>> mbox cmd response: success
2,940,571 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,001,697 UART:
3,001,713 UART: Running Caliptra FMC ...
3,002,121 UART:
3,002,175 UART: [state] CFI Enabled
3,012,738 UART: [fht] FMC Alias Private Key: 7
3,120,215 UART: [art] Extend RT PCRs Done
3,120,643 UART: [art] Lock RT PCRs Done
3,122,289 UART: [art] Populate DV Done
3,130,720 UART: [fht] FMC Alias Private Key: 7
3,131,846 UART: [art] Derive CDI
3,132,126 UART: [art] Store in in slot 0x4
3,217,835 UART: [art] Derive Key Pair
3,218,195 UART: [art] Store priv key in slot 0x5
3,231,301 UART: [art] Derive Key Pair - Done
3,245,681 UART: [art] Signing Cert with AUTHO
3,246,161 UART: RITY.KEYID = 7
3,261,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,914 UART: [art] PUB.X = 989CD989920925E571D059C2CF6EDB9F3502D91321196FA3F8AD24B75F4AAA122876B50A289A7A0EE3F7A70E39E8AC39
3,268,675 UART: [art] PUB.Y = 2B3E63C7769B69F682FA341854B443861598281E1DEE5E74B72C567DE6C19F7308400AE8889B9CC1CE3CDC42EFDBCB7E
3,275,629 UART: [art] SIG.R = 74805FEF274C6173665CABC7B088CC0DCDCF1A65D0D3CAF4016840C45407F5A835E1B38ED13D33482D4707EF960B2298
3,282,390 UART: [art] SIG.S = EF6D46B5A2E2F386BA4C018450ABADF8065A038A8CEC940D30C40BC540ECA31155DB8566C3A6F0D147653211172E68D2
3,306,242 UART: Caliptra RT
3,306,495 UART: [state] CFI Enabled
3,413,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,324 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,136 UART: [kat] SHA2-256
882,067 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,182 UART: [kat] ++
886,334 UART: [kat] sha1
890,588 UART: [kat] SHA2-256
892,526 UART: [kat] SHA2-384
895,199 UART: [kat] SHA2-512-ACC
897,100 UART: [kat] ECC-384
902,987 UART: [kat] HMAC-384Kdf
907,639 UART: [kat] LMS
1,475,835 UART: [kat] --
1,476,846 UART: [cold-reset] ++
1,477,414 UART: [fht] Storing FHT @ 0x50003400
1,480,241 UART: [idev] ++
1,480,409 UART: [idev] CDI.KEYID = 6
1,480,769 UART: [idev] SUBJECT.KEYID = 7
1,481,193 UART: [idev] UDS.KEYID = 0
1,481,538 ready_for_fw is high
1,481,538 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,489,337 UART: [idev] Erasing UDS.KEYID = 0
1,506,039 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,471 UART: [idev] --
1,515,506 UART: [ldev] ++
1,515,674 UART: [ldev] CDI.KEYID = 6
1,516,037 UART: [ldev] SUBJECT.KEYID = 5
1,516,463 UART: [ldev] AUTHORITY.KEYID = 7
1,516,926 UART: [ldev] FE.KEYID = 1
1,522,108 UART: [ldev] Erasing FE.KEYID = 1
1,547,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,767 UART: [ldev] --
1,587,280 UART: [fwproc] Waiting for Commands...
1,587,957 UART: [fwproc] Received command 0x46574c44
1,588,748 UART: [fwproc] Received Image of size 115304 bytes
2,899,757 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,927,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,957,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 90620
3,094,548 >>> mbox cmd response: success
3,094,548 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,095,794 UART: [afmc] ++
3,095,962 UART: [afmc] CDI.KEYID = 6
3,096,324 UART: [afmc] SUBJECT.KEYID = 7
3,096,749 UART: [afmc] AUTHORITY.KEYID = 5
3,132,180 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,148,806 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,149,586 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,155,314 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,161,199 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,166,889 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,174,828 UART: [afmc] --
3,175,810 UART: [cold-reset] --
3,176,450 UART: [state] Locking Datavault
3,177,491 UART: [state] Locking PCR0, PCR1 and PCR31
3,178,095 UART: [state] Locking ICCM
3,178,599 UART: [exit] Launching FMC @ 0x40000130
3,183,928 UART:
3,183,944 UART: Running Caliptra FMC ...
3,184,352 UART:
3,184,495 UART: [state] CFI Enabled
3,195,064 UART: [fht] FMC Alias Private Key: 7
3,303,075 UART: [art] Extend RT PCRs Done
3,303,503 UART: [art] Lock RT PCRs Done
3,305,283 UART: [art] Populate DV Done
3,313,534 UART: [fht] FMC Alias Private Key: 7
3,314,622 UART: [art] Derive CDI
3,314,902 UART: [art] Store in in slot 0x4
3,400,239 UART: [art] Derive Key Pair
3,400,599 UART: [art] Store priv key in slot 0x5
3,414,271 UART: [art] Derive Key Pair - Done
3,429,199 UART: [art] Signing Cert with AUTHO
3,429,679 UART: RITY.KEYID = 7
3,445,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,445,820 UART: [art] PUB.X = E39831FDC292F6B2092461520E117152725D8A9BC3FC7D5EF39CB0A240C402F785BE9650FAC9983B3933FFD8AC3AAF33
3,452,589 UART: [art] PUB.Y = 6FDDEAB23AAEBF4680AFD2C96DAAC5EB7624164CDD560334BD72AA8F49EE3C4785B5E0C4A0066DC3D9B089E5FC8E5A6F
3,459,563 UART: [art] SIG.R = 496EDD44597D948635687553581045B7B2FB933C937FF3022C5E540EC2B4658A61386D02F611F485E96E2D16F69E95D3
3,466,314 UART: [art] SIG.S = C4668A7CDA119C38096DE0929BCF484DFC211FD49B84C6999272D6927F1A297D3D134C4821B532A9F08764541C362244
3,489,726 UART: Caliptra RT
3,490,071 UART: [state] CFI Enabled
3,599,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,748 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,456 ready_for_fw is high
1,362,456 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,942,566 >>> mbox cmd response: success
2,942,566 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,004,312 UART:
3,004,328 UART: Running Caliptra FMC ...
3,004,736 UART:
3,004,879 UART: [state] CFI Enabled
3,015,342 UART: [fht] FMC Alias Private Key: 7
3,123,469 UART: [art] Extend RT PCRs Done
3,123,897 UART: [art] Lock RT PCRs Done
3,125,203 UART: [art] Populate DV Done
3,133,148 UART: [fht] FMC Alias Private Key: 7
3,134,220 UART: [art] Derive CDI
3,134,500 UART: [art] Store in in slot 0x4
3,219,961 UART: [art] Derive Key Pair
3,220,321 UART: [art] Store priv key in slot 0x5
3,233,797 UART: [art] Derive Key Pair - Done
3,248,653 UART: [art] Signing Cert with AUTHO
3,249,133 UART: RITY.KEYID = 7
3,264,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,802 UART: [art] PUB.X = 849338EA819D78F5E02E1A0EFD168943949E98EEADDFB6330AF5CD48B4BC0BF6060170B284288947D93D45725BB42655
3,271,559 UART: [art] PUB.Y = D38B51FD38A12C942021975C2D5B87FD2F71D37FE4A2DEF9A17E3272C0A5E28565F690EFAF65C3E14A14658756C7219B
3,278,515 UART: [art] SIG.R = FB579629DDFDF2721BFE717FAE75A16AB7956A10D25D4F85544D7EED875CA02ADBC98E892A5E3AE3A2C74CB70A0A1BA5
3,285,303 UART: [art] SIG.S = A8ED7DD70A568D01FB1CCD17212C4E4D84B99F73C741BCF4960E5DAC5BE895DCEAD5AB4016F7A47FD495881F7C3FB097
3,308,763 UART: Caliptra RT
3,309,108 UART: [state] CFI Enabled
3,416,818 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,090 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,580 UART: [state] LifecycleState = Unprovisioned
86,235 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
893,610 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,735 UART: [kat] ++
897,887 UART: [kat] sha1
902,285 UART: [kat] SHA2-256
904,225 UART: [kat] SHA2-384
907,058 UART: [kat] SHA2-512-ACC
908,959 UART: [kat] ECC-384
918,852 UART: [kat] HMAC-384Kdf
923,554 UART: [kat] LMS
1,171,882 UART: [kat] --
1,172,803 UART: [cold-reset] ++
1,173,225 UART: [fht] FHT @ 0x50003400
1,175,934 UART: [idev] ++
1,176,102 UART: [idev] CDI.KEYID = 6
1,176,462 UART: [idev] SUBJECT.KEYID = 7
1,176,886 UART: [idev] UDS.KEYID = 0
1,177,231 ready_for_fw is high
1,177,231 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,185,170 UART: [idev] Erasing UDS.KEYID = 0
1,201,721 UART: [idev] Sha1 KeyId Algorithm
1,210,135 UART: [idev] --
1,211,193 UART: [ldev] ++
1,211,361 UART: [ldev] CDI.KEYID = 6
1,211,724 UART: [ldev] SUBJECT.KEYID = 5
1,212,150 UART: [ldev] AUTHORITY.KEYID = 7
1,212,613 UART: [ldev] FE.KEYID = 1
1,217,915 UART: [ldev] Erasing FE.KEYID = 1
1,244,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,767 UART: [ldev] --
1,284,260 UART: [fwproc] Wait for Commands...
1,284,990 UART: [fwproc] Recv command 0x46574c44
1,285,718 UART: [fwproc] Recv'd Img size: 115304 bytes
2,596,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,623,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,652,337 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,789,510 >>> mbox cmd response: success
2,789,510 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,790,684 UART: [afmc] ++
2,790,852 UART: [afmc] CDI.KEYID = 6
2,791,214 UART: [afmc] SUBJECT.KEYID = 7
2,791,639 UART: [afmc] AUTHORITY.KEYID = 5
2,826,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,844,237 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,965 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,850 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,569 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,383 UART: [afmc] --
2,870,501 UART: [cold-reset] --
2,871,527 UART: [state] Locking Datavault
2,872,628 UART: [state] Locking PCR0, PCR1 and PCR31
2,873,232 UART: [state] Locking ICCM
2,873,666 UART: [exit] Launching FMC @ 0x40000130
2,878,995 UART:
2,879,011 UART: Running Caliptra FMC ...
2,879,419 UART:
2,879,473 UART: [state] CFI Enabled
2,890,066 UART: [fht] FMC Alias Private Key: 7
2,997,837 UART: [art] Extend RT PCRs Done
2,998,265 UART: [art] Lock RT PCRs Done
2,999,683 UART: [art] Populate DV Done
3,008,220 UART: [fht] FMC Alias Private Key: 7
3,009,328 UART: [art] Derive CDI
3,009,608 UART: [art] Store in in slot 0x4
3,095,585 UART: [art] Derive Key Pair
3,095,945 UART: [art] Store priv key in slot 0x5
3,108,957 UART: [art] Derive Key Pair - Done
3,123,597 UART: [art] Signing Cert with AUTHO
3,124,077 UART: RITY.KEYID = 7
3,139,033 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,798 UART: [art] PUB.X = 5C983E951210D923E9620937B032C31ACCC1B306D8EA69220472A27C119C1BB40E320F8490558D20C02B82D505053275
3,146,535 UART: [art] PUB.Y = 1574D9AF1C685CACC1160B10DDC008CD335E27306ED6694A7F44B000D0024F507D09A11100A07525056DACF8716C14A1
3,153,426 UART: [art] SIG.R = 1C36F529EE442C942D4DB0A4ECC8DB6C96BD0E46316219205FAF6231B2F73BAED5B7A46130B20734619E926B53473BE5
3,160,196 UART: [art] SIG.S = 1C2163601C317CEC3D32E2B1A9774FDE72B1A1921D6088BCBE5104E6AAE9C5CB4182AEBC61875C31C41441E100A42D65
3,183,930 UART: Caliptra RT
3,184,183 UART: [state] CFI Enabled
3,291,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,840 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,941 ready_for_fw is high
1,059,941 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,081 >>> mbox cmd response: success
2,640,081 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,702,431 UART:
2,702,447 UART: Running Caliptra FMC ...
2,702,855 UART:
2,702,909 UART: [state] CFI Enabled
2,713,602 UART: [fht] FMC Alias Private Key: 7
2,821,421 UART: [art] Extend RT PCRs Done
2,821,849 UART: [art] Lock RT PCRs Done
2,823,289 UART: [art] Populate DV Done
2,831,356 UART: [fht] FMC Alias Private Key: 7
2,832,408 UART: [art] Derive CDI
2,832,688 UART: [art] Store in in slot 0x4
2,918,151 UART: [art] Derive Key Pair
2,918,511 UART: [art] Store priv key in slot 0x5
2,930,817 UART: [art] Derive Key Pair - Done
2,945,844 UART: [art] Signing Cert with AUTHO
2,946,324 UART: RITY.KEYID = 7
2,961,352 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,117 UART: [art] PUB.X = 09B109BF37AD10A87EB8CB615B710AE5801655404DB6046926B602BBD8C863871D8E1AD4A664C2E2F1660532A6DA9F4D
2,968,873 UART: [art] PUB.Y = DBFE1C29B16ED5BDA667AB0A979B0DBD73EE3981E98543BD0AF1EF314AF82B13497AA57C8F330910A6E5A4DA213DFEA0
2,975,835 UART: [art] SIG.R = 3497F0454427186A84814F16C95D1DBED74DBCC416D907B4EA10845EF3C9670D4F09685D14AF780946D8178B3309A6E1
2,982,586 UART: [art] SIG.S = 798FBAFDC02B4DC2D298BDEC7D9D408F12B59C904A3D38A635D4E13F31A979534065C0B16621E6CD24181196330E2352
3,006,578 UART: Caliptra RT
3,006,831 UART: [state] CFI Enabled
3,114,382 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,964 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
893,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,848 UART: [kat] ++
898,000 UART: [kat] sha1
902,318 UART: [kat] SHA2-256
904,258 UART: [kat] SHA2-384
907,161 UART: [kat] SHA2-512-ACC
909,062 UART: [kat] ECC-384
919,005 UART: [kat] HMAC-384Kdf
923,601 UART: [kat] LMS
1,171,929 UART: [kat] --
1,172,870 UART: [cold-reset] ++
1,173,302 UART: [fht] FHT @ 0x50003400
1,175,909 UART: [idev] ++
1,176,077 UART: [idev] CDI.KEYID = 6
1,176,437 UART: [idev] SUBJECT.KEYID = 7
1,176,861 UART: [idev] UDS.KEYID = 0
1,177,206 ready_for_fw is high
1,177,206 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,184,751 UART: [idev] Erasing UDS.KEYID = 0
1,201,910 UART: [idev] Sha1 KeyId Algorithm
1,210,386 UART: [idev] --
1,211,276 UART: [ldev] ++
1,211,444 UART: [ldev] CDI.KEYID = 6
1,211,807 UART: [ldev] SUBJECT.KEYID = 5
1,212,233 UART: [ldev] AUTHORITY.KEYID = 7
1,212,696 UART: [ldev] FE.KEYID = 1
1,217,892 UART: [ldev] Erasing FE.KEYID = 1
1,243,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,734 UART: [ldev] --
1,283,107 UART: [fwproc] Wait for Commands...
1,283,841 UART: [fwproc] Recv command 0x46574c44
1,284,569 UART: [fwproc] Recv'd Img size: 115304 bytes
2,594,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,948 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,787,305 >>> mbox cmd response: success
2,787,305 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,788,365 UART: [afmc] ++
2,788,533 UART: [afmc] CDI.KEYID = 6
2,788,895 UART: [afmc] SUBJECT.KEYID = 7
2,789,320 UART: [afmc] AUTHORITY.KEYID = 5
2,824,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,284 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,012 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,897 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,616 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,326 UART: [afmc] --
2,867,438 UART: [cold-reset] --
2,868,236 UART: [state] Locking Datavault
2,869,541 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,145 UART: [state] Locking ICCM
2,870,799 UART: [exit] Launching FMC @ 0x40000130
2,876,128 UART:
2,876,144 UART: Running Caliptra FMC ...
2,876,552 UART:
2,876,695 UART: [state] CFI Enabled
2,887,180 UART: [fht] FMC Alias Private Key: 7
2,994,995 UART: [art] Extend RT PCRs Done
2,995,423 UART: [art] Lock RT PCRs Done
2,996,839 UART: [art] Populate DV Done
3,005,204 UART: [fht] FMC Alias Private Key: 7
3,006,296 UART: [art] Derive CDI
3,006,576 UART: [art] Store in in slot 0x4
3,092,417 UART: [art] Derive Key Pair
3,092,777 UART: [art] Store priv key in slot 0x5
3,106,241 UART: [art] Derive Key Pair - Done
3,121,070 UART: [art] Signing Cert with AUTHO
3,121,550 UART: RITY.KEYID = 7
3,136,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,625 UART: [art] PUB.X = 7D7F952FF2AD2ACBB23C93AA3C0015E073B2ECD1B254C396A269BD0D61808612FE13F71489496C39C2B35F77F69B649B
3,144,378 UART: [art] PUB.Y = FEC5563E1E52B4A1B0E6418B5A6766F9D6AAC5AFC17FCF6EFFD58BA3CF6ED29C688E0C80005DF1D5AD9014C9D6412320
3,151,325 UART: [art] SIG.R = DE72A7C50E52C6B83E7C917760364EA5301D50B4AD717758826FA276FBB407855EE4D0E140C47FF7EA66CB7642F1C9E4
3,158,095 UART: [art] SIG.S = EEFDAFBB07BBFE3A0A0275A4B9C0655B3B7F61188E8132694BBA5EC7145DFAA9736B7A182C6BC49CA8C9537799F7C505
3,181,910 UART: Caliptra RT
3,182,255 UART: [state] CFI Enabled
3,289,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,647 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,906 ready_for_fw is high
1,060,906 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,640,900 >>> mbox cmd response: success
2,640,900 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,702,858 UART:
2,702,874 UART: Running Caliptra FMC ...
2,703,282 UART:
2,703,425 UART: [state] CFI Enabled
2,714,232 UART: [fht] FMC Alias Private Key: 7
2,822,245 UART: [art] Extend RT PCRs Done
2,822,673 UART: [art] Lock RT PCRs Done
2,824,157 UART: [art] Populate DV Done
2,832,456 UART: [fht] FMC Alias Private Key: 7
2,833,532 UART: [art] Derive CDI
2,833,812 UART: [art] Store in in slot 0x4
2,919,457 UART: [art] Derive Key Pair
2,919,817 UART: [art] Store priv key in slot 0x5
2,933,149 UART: [art] Derive Key Pair - Done
2,948,158 UART: [art] Signing Cert with AUTHO
2,948,638 UART: RITY.KEYID = 7
2,963,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,467 UART: [art] PUB.X = FCA70F7752DE62A6EBA50A71DDC4BBE23357C35325165B5BB5C5557F85A58A0D68069DC6C8C2723B6165084423C4F96B
2,971,228 UART: [art] PUB.Y = EBB2D07D44F042F792F60E800A48BE0593386E063C1618081B539FE925FC5B32BA92A74F56880C5252B7229F26000700
2,978,105 UART: [art] SIG.R = D63A66C3FE29792760CC9A35269880C66C65AEF6753F854F2CFA7FA7C6FD231BA07C0BAC86E079FCA532C69D8C509265
2,984,882 UART: [art] SIG.S = 5D3655D9090FA8C3916A130DF33AFFB8984C9A7DA560B4FEDC3EFEAD52E7D817FE0010EDE054F33061A3F08AD8D22024
3,008,136 UART: Caliptra RT
3,008,481 UART: [state] CFI Enabled
3,117,000 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,612 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
891,554 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,683 UART: [kat] ++
895,835 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
904,902 UART: [kat] SHA2-512-ACC
906,803 UART: [kat] ECC-384
916,540 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,467 UART: [cold-reset] ++
1,170,793 UART: [fht] FHT @ 0x50003400
1,173,335 UART: [idev] ++
1,173,503 UART: [idev] CDI.KEYID = 6
1,173,864 UART: [idev] SUBJECT.KEYID = 7
1,174,289 UART: [idev] UDS.KEYID = 0
1,174,635 ready_for_fw is high
1,174,635 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,182,539 UART: [idev] Erasing UDS.KEYID = 0
1,199,489 UART: [idev] Sha1 KeyId Algorithm
1,208,357 UART: [idev] --
1,209,418 UART: [ldev] ++
1,209,586 UART: [ldev] CDI.KEYID = 6
1,209,950 UART: [ldev] SUBJECT.KEYID = 5
1,210,377 UART: [ldev] AUTHORITY.KEYID = 7
1,210,840 UART: [ldev] FE.KEYID = 1
1,216,114 UART: [ldev] Erasing FE.KEYID = 1
1,242,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,878 UART: [ldev] --
1,281,188 UART: [fwproc] Wait for Commands...
1,281,923 UART: [fwproc] Recv command 0x46574c44
1,282,656 UART: [fwproc] Recv'd Img size: 115304 bytes
2,591,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,421 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,730 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,785,022 >>> mbox cmd response: success
2,785,022 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,786,161 UART: [afmc] ++
2,786,329 UART: [afmc] CDI.KEYID = 6
2,786,692 UART: [afmc] SUBJECT.KEYID = 7
2,787,118 UART: [afmc] AUTHORITY.KEYID = 5
2,822,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,331 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,214 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,933 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,544 UART: [afmc] --
2,865,594 UART: [cold-reset] --
2,866,198 UART: [state] Locking Datavault
2,867,379 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,983 UART: [state] Locking ICCM
2,868,657 UART: [exit] Launching FMC @ 0x40000130
2,873,986 UART:
2,874,002 UART: Running Caliptra FMC ...
2,874,410 UART:
2,874,464 UART: [state] CFI Enabled
2,885,219 UART: [fht] FMC Alias Private Key: 7
2,993,028 UART: [art] Extend RT PCRs Done
2,993,456 UART: [art] Lock RT PCRs Done
2,994,850 UART: [art] Populate DV Done
3,003,015 UART: [fht] FMC Alias Private Key: 7
3,004,115 UART: [art] Derive CDI
3,004,395 UART: [art] Store in in slot 0x4
3,090,152 UART: [art] Derive Key Pair
3,090,512 UART: [art] Store priv key in slot 0x5
3,103,286 UART: [art] Derive Key Pair - Done
3,117,836 UART: [art] Signing Cert with AUTHO
3,118,316 UART: RITY.KEYID = 7
3,133,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,783 UART: [art] PUB.X = C8E763B38EEAD3CA7EAAC216D239DDEAFAF3757E4923ED977416BC1DCF846A6403343CBAF40AE5409A52FF0BDB6EAFDF
3,140,576 UART: [art] PUB.Y = D9054B1801B3E543EBBBA948B7A938B0B28BBE45B7CB2CAEB03230EE0DB0D65224BF996D1B3B52A65A651D8A1862A7DB
3,147,535 UART: [art] SIG.R = 239331DF18A7DCEB12C59B0151C3EFE822436E8043EE8ED46311C096CE80A7A44DBADBC6A64B415D3944B9BDECD9CEC6
3,154,322 UART: [art] SIG.S = 5980C21F77CD51A198586D36F28B9968E3580AA10050C0163A139387BC4458EC51D58E9CFA767A4B0E199BEF99B72DEE
3,178,029 UART: Caliptra RT
3,178,282 UART: [state] CFI Enabled
3,285,877 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,549 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,940 ready_for_fw is high
1,055,940 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,635,547 >>> mbox cmd response: success
2,635,547 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,698,273 UART:
2,698,289 UART: Running Caliptra FMC ...
2,698,697 UART:
2,698,751 UART: [state] CFI Enabled
2,708,964 UART: [fht] FMC Alias Private Key: 7
2,817,347 UART: [art] Extend RT PCRs Done
2,817,775 UART: [art] Lock RT PCRs Done
2,819,573 UART: [art] Populate DV Done
2,827,810 UART: [fht] FMC Alias Private Key: 7
2,828,750 UART: [art] Derive CDI
2,829,030 UART: [art] Store in in slot 0x4
2,914,571 UART: [art] Derive Key Pair
2,914,931 UART: [art] Store priv key in slot 0x5
2,927,809 UART: [art] Derive Key Pair - Done
2,942,673 UART: [art] Signing Cert with AUTHO
2,943,153 UART: RITY.KEYID = 7
2,958,521 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,286 UART: [art] PUB.X = FFFF6877861DE3066B133683FCB7209D7FE484DD5737E29943E0F178524899F95D922DF727522BB30643646F1A524CF8
2,966,044 UART: [art] PUB.Y = 15DF7301AAE05AA2E9F789428A84F0F1D0D41841532323E27AA5570AFA65E075E2D0750593B15928884D5A08BF582521
2,972,976 UART: [art] SIG.R = AF0331EA4D70BACBCE03E0CE0822BCCED121229D750B8CFC2F56D755412F4E341D04030491DC4805431120B46B3DC4B9
2,979,732 UART: [art] SIG.S = B9AF8816E2DFB1144A2F469A66C5166205CB3D3C83ED7B344139CE7563C9D521F2D70CC1088AB3073CC12572A8D2ED21
3,003,713 UART: Caliptra RT
3,003,966 UART: [state] CFI Enabled
3,111,638 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,996 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,901 UART: [state] LifecycleState = Unprovisioned
85,556 UART: [state] DebugLocked = No
86,114 UART: [state] WD Timer not started. Device not locked for debugging
87,371 UART: [kat] SHA2-256
890,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,050 UART: [kat] ++
895,202 UART: [kat] sha1
899,344 UART: [kat] SHA2-256
901,284 UART: [kat] SHA2-384
903,901 UART: [kat] SHA2-512-ACC
905,802 UART: [kat] ECC-384
915,569 UART: [kat] HMAC-384Kdf
920,125 UART: [kat] LMS
1,168,437 UART: [kat] --
1,169,350 UART: [cold-reset] ++
1,169,710 UART: [fht] FHT @ 0x50003400
1,172,282 UART: [idev] ++
1,172,450 UART: [idev] CDI.KEYID = 6
1,172,811 UART: [idev] SUBJECT.KEYID = 7
1,173,236 UART: [idev] UDS.KEYID = 0
1,173,582 ready_for_fw is high
1,173,582 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
1,181,302 UART: [idev] Erasing UDS.KEYID = 0
1,198,624 UART: [idev] Sha1 KeyId Algorithm
1,207,502 UART: [idev] --
1,208,401 UART: [ldev] ++
1,208,569 UART: [ldev] CDI.KEYID = 6
1,208,933 UART: [ldev] SUBJECT.KEYID = 5
1,209,360 UART: [ldev] AUTHORITY.KEYID = 7
1,209,823 UART: [ldev] FE.KEYID = 1
1,215,139 UART: [ldev] Erasing FE.KEYID = 1
1,242,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,289 UART: [ldev] --
1,281,643 UART: [fwproc] Wait for Commands...
1,282,290 UART: [fwproc] Recv command 0x46574c44
1,283,023 UART: [fwproc] Recv'd Img size: 115304 bytes
2,592,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,244 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,553 UART: [fwproc] Load Runtime at address 0x40005000 len 90620
2,786,943 >>> mbox cmd response: success
2,786,943 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,788,062 UART: [afmc] ++
2,788,230 UART: [afmc] CDI.KEYID = 6
2,788,593 UART: [afmc] SUBJECT.KEYID = 7
2,789,019 UART: [afmc] AUTHORITY.KEYID = 5
2,824,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,008 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,610 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,415 UART: [afmc] --
2,867,479 UART: [cold-reset] --
2,868,397 UART: [state] Locking Datavault
2,869,442 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,046 UART: [state] Locking ICCM
2,870,632 UART: [exit] Launching FMC @ 0x40000130
2,875,961 UART:
2,875,977 UART: Running Caliptra FMC ...
2,876,385 UART:
2,876,528 UART: [state] CFI Enabled
2,886,853 UART: [fht] FMC Alias Private Key: 7
2,993,952 UART: [art] Extend RT PCRs Done
2,994,380 UART: [art] Lock RT PCRs Done
2,996,092 UART: [art] Populate DV Done
3,004,425 UART: [fht] FMC Alias Private Key: 7
3,005,529 UART: [art] Derive CDI
3,005,809 UART: [art] Store in in slot 0x4
3,091,752 UART: [art] Derive Key Pair
3,092,112 UART: [art] Store priv key in slot 0x5
3,104,438 UART: [art] Derive Key Pair - Done
3,119,228 UART: [art] Signing Cert with AUTHO
3,119,708 UART: RITY.KEYID = 7
3,134,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,387 UART: [art] PUB.X = 30D5FEE2A43484E79495B3ED891A6BABA1572DEEE2012B9CBBBED1AFBD3733A07D20E8896F789E66402B51449405A84A
3,142,163 UART: [art] PUB.Y = 7ED649CC07B9C66C576D1657524122E6A8201D25EFDB6A01F4DC4B0AAA3998D3F3C85E5DC39572F750938177767E3E20
3,149,106 UART: [art] SIG.R = 0E8BDBC4BC4B0809E1825987CF6AF5F12EE6F22B987C547A03EC0387BA5397F9AA7CB2622A5CFC32583C2748CDB7A035
3,155,875 UART: [art] SIG.S = 61DC10F1DADE7D3677F1B6A959AF108A1DC2BE332D76C107A99DB03AB1B7F0914122FAE419E68ECD2720D8A1B6298972
3,179,753 UART: Caliptra RT
3,180,098 UART: [state] CFI Enabled
3,288,531 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,175 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,525 ready_for_fw is high
1,056,525 <<< Executing mbox cmd 0x46574c44 (115304 bytes) from SoC
2,636,039 >>> mbox cmd response: success
2,636,039 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,698,111 UART:
2,698,127 UART: Running Caliptra FMC ...
2,698,535 UART:
2,698,678 UART: [state] CFI Enabled
2,709,401 UART: [fht] FMC Alias Private Key: 7
2,817,168 UART: [art] Extend RT PCRs Done
2,817,596 UART: [art] Lock RT PCRs Done
2,819,254 UART: [art] Populate DV Done
2,827,605 UART: [fht] FMC Alias Private Key: 7
2,828,653 UART: [art] Derive CDI
2,828,933 UART: [art] Store in in slot 0x4
2,914,740 UART: [art] Derive Key Pair
2,915,100 UART: [art] Store priv key in slot 0x5
2,928,372 UART: [art] Derive Key Pair - Done
2,942,939 UART: [art] Signing Cert with AUTHO
2,943,419 UART: RITY.KEYID = 7
2,958,593 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,358 UART: [art] PUB.X = 08E37604CCA19B0994A9AC1B966D8CBD69F2AE83815E727D92D111CC6566CA8759751165AE6B0BC9AA7FE9F30115D521
2,966,119 UART: [art] PUB.Y = 3A1743F7D69838DF3C5177D8DF30DEAAE157355BE1340E5B50317D8F56ED3BD9DA0B8FF2915A58E1B18F4248A1B13152
2,973,071 UART: [art] SIG.R = 53E86A8A6C662130D305C96034498924B6F4AF0D5CB2D686A7E02B15B68F32D000F05D8497A3434B0B39EBC08B5BD82C
2,979,812 UART: [art] SIG.S = 2E2D7CF52D897C64A83ADBA958CE20BCF3D32DEBCBAE2BA2E635D418A5ED10188CE9BC1E424AD52977BE097D3B3B096D
3,003,871 UART: Caliptra RT
3,004,216 UART: [state] CFI Enabled
3,112,347 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,891 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
191,975 UART:
192,326 UART: Running Caliptra ROM ...
193,414 UART:
193,554 UART: [state] CFI Enabled
265,251 UART: [state] LifecycleState = Unprovisioned
267,220 UART: [state] DebugLocked = No
268,949 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,299 UART: [kat] SHA2-256
443,995 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,526 UART: [kat] ++
454,971 UART: [kat] sha1
464,706 UART: [kat] SHA2-256
467,350 UART: [kat] SHA2-384
472,435 UART: [kat] SHA2-512-ACC
474,803 UART: [kat] ECC-384
2,769,398 UART: [kat] HMAC-384Kdf
2,801,252 UART: [kat] LMS
3,991,566 UART: [kat] --
3,996,455 UART: [cold-reset] ++
3,997,331 UART: [fht] Storing FHT @ 0x50003400
4,008,804 UART: [idev] ++
4,009,372 UART: [idev] CDI.KEYID = 6
4,010,409 UART: [idev] SUBJECT.KEYID = 7
4,011,584 UART: [idev] UDS.KEYID = 0
4,012,681 ready_for_fw is high
4,012,907 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
4,035,386 UART: [idev] Erasing UDS.KEYID = 0
7,348,680 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,671 UART: [idev] --
7,374,299 UART: [ldev] ++
7,374,921 UART: [ldev] CDI.KEYID = 6
7,375,802 UART: [ldev] SUBJECT.KEYID = 5
7,377,066 UART: [ldev] AUTHORITY.KEYID = 7
7,378,356 UART: [ldev] FE.KEYID = 1
7,424,552 UART: [ldev] Erasing FE.KEYID = 1
10,757,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,224 UART: [ldev] --
13,139,569 UART: [fwproc] Waiting for Commands...
13,141,346 UART: [fwproc] Received command 0x46574c44
13,143,530 UART: [fwproc] Received Image of size 7036 bytes
15,882,162 UART: [fwproc] Image verified using Vendor ECC Key Index 0
15,952,974 UART: [fwproc] Loading FMC at address 0x40000000 len 64
15,956,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
15,963,646 >>> mbox cmd response: success
15,968,212 UART: [afmc] ++
15,968,791 UART: [afmc] CDI.KEYID = 6
15,969,707 UART: [afmc] SUBJECT.KEYID = 7
15,970,922 UART: [afmc] AUTHORITY.KEYID = 5
19,346,618 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,642,211 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,644,439 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,658,913 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,673,790 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,688,142 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,710,095 UART: [afmc] --
21,714,770 UART: [cold-reset] --
21,717,818 UART: [state] Locking Datavault
21,722,725 UART: [state] Locking PCR0, PCR1 and PCR31
21,724,464 UART: [state] Locking ICCM
21,726,570 UART: [exit] Launching FMC @ 0x40000000
21,734,968 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,740,243 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,804,565 ready_for_fw is high
3,805,334 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
15,722,468 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,458 UART:
192,822 UART: Running Caliptra ROM ...
194,010 UART:
603,800 UART: [state] CFI Enabled
620,365 UART: [state] LifecycleState = Unprovisioned
622,308 UART: [state] DebugLocked = No
624,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,197 UART: [kat] SHA2-256
799,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,554 UART: [kat] ++
811,016 UART: [kat] sha1
823,320 UART: [kat] SHA2-256
826,054 UART: [kat] SHA2-384
831,836 UART: [kat] SHA2-512-ACC
834,203 UART: [kat] ECC-384
3,119,059 UART: [kat] HMAC-384Kdf
3,131,616 UART: [kat] LMS
4,321,727 UART: [kat] --
4,326,103 UART: [cold-reset] ++
4,327,898 UART: [fht] Storing FHT @ 0x50003400
4,337,963 UART: [idev] ++
4,338,524 UART: [idev] CDI.KEYID = 6
4,339,474 UART: [idev] SUBJECT.KEYID = 7
4,340,714 UART: [idev] UDS.KEYID = 0
4,341,737 ready_for_fw is high
4,341,956 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
4,357,947 UART: [idev] Erasing UDS.KEYID = 0
7,626,420 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,546 UART: [idev] --
7,653,723 UART: [ldev] ++
7,654,284 UART: [ldev] CDI.KEYID = 6
7,655,249 UART: [ldev] SUBJECT.KEYID = 5
7,656,459 UART: [ldev] AUTHORITY.KEYID = 7
7,657,737 UART: [ldev] FE.KEYID = 1
7,667,709 UART: [ldev] Erasing FE.KEYID = 1
10,954,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,008 UART: [ldev] --
13,313,745 UART: [fwproc] Waiting for Commands...
13,316,380 UART: [fwproc] Received command 0x46574c44
13,318,561 UART: [fwproc] Received Image of size 7036 bytes
16,064,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,135,581 UART: [fwproc] Loading FMC at address 0x40000000 len 64
16,138,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
16,146,559 >>> mbox cmd response: success
16,150,326 UART: [afmc] ++
16,150,897 UART: [afmc] CDI.KEYID = 6
16,151,779 UART: [afmc] SUBJECT.KEYID = 7
16,153,044 UART: [afmc] AUTHORITY.KEYID = 5
19,472,588 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,768,347 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,770,604 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,785,086 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,799,902 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,814,293 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,836,652 UART: [afmc] --
21,841,374 UART: [cold-reset] --
21,844,481 UART: [state] Locking Datavault
21,849,236 UART: [state] Locking PCR0, PCR1 and PCR31
21,850,984 UART: [state] Locking ICCM
21,852,649 UART: [exit] Launching FMC @ 0x40000000
21,861,040 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,866,454 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
4,130,612 ready_for_fw is high
4,131,033 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
15,890,219 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,461 UART:
192,814 UART: Running Caliptra ROM ...
194,004 UART:
194,167 UART: [state] CFI Enabled
262,018 UART: [state] LifecycleState = Unprovisioned
263,919 UART: [state] DebugLocked = No
265,242 UART: [state] WD Timer not started. Device not locked for debugging
269,501 UART: [kat] SHA2-256
448,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,191 UART: [kat] ++
460,723 UART: [kat] sha1
473,448 UART: [kat] SHA2-256
476,522 UART: [kat] SHA2-384
481,393 UART: [kat] SHA2-512-ACC
484,392 UART: [kat] ECC-384
2,948,057 UART: [kat] HMAC-384Kdf
2,973,678 UART: [kat] LMS
3,503,123 UART: [kat] --
3,510,022 UART: [cold-reset] ++
3,512,096 UART: [fht] FHT @ 0x50003400
3,524,367 UART: [idev] ++
3,524,974 UART: [idev] CDI.KEYID = 6
3,525,864 UART: [idev] SUBJECT.KEYID = 7
3,527,008 UART: [idev] UDS.KEYID = 0
3,528,004 ready_for_fw is high
3,528,199 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,546,505 UART: [idev] Erasing UDS.KEYID = 0
6,029,473 UART: [idev] Sha1 KeyId Algorithm
6,052,820 UART: [idev] --
6,057,624 UART: [ldev] ++
6,058,189 UART: [ldev] CDI.KEYID = 6
6,059,269 UART: [ldev] SUBJECT.KEYID = 5
6,060,380 UART: [ldev] AUTHORITY.KEYID = 7
6,061,558 UART: [ldev] FE.KEYID = 1
6,102,009 UART: [ldev] Erasing FE.KEYID = 1
8,608,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,128 UART: [ldev] --
10,416,111 UART: [fwproc] Wait for Commands...
10,417,940 UART: [fwproc] Recv command 0x46574c44
10,420,032 UART: [fwproc] Recv'd Img size: 7036 bytes
12,512,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,583,249 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,586,275 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,594,650 >>> mbox cmd response: success
12,599,270 UART: [afmc] ++
12,599,846 UART: [afmc] CDI.KEYID = 6
12,600,751 UART: [afmc] SUBJECT.KEYID = 7
12,601,967 UART: [afmc] AUTHORITY.KEYID = 5
15,143,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,867,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,869,826 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,885,822 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,901,658 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,917,471 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,940,413 UART: [afmc] --
16,943,468 UART: [cold-reset] --
16,946,199 UART: [state] Locking Datavault
16,951,120 UART: [state] Locking PCR0, PCR1 and PCR31
16,952,763 UART: [state] Locking ICCM
16,954,154 UART: [exit] Launching FMC @ 0x40000000
16,962,597 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
16,968,015 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,382,929 ready_for_fw is high
3,383,338 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,361,039 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
192,331 UART:
192,698 UART: Running Caliptra ROM ...
194,016 UART:
603,405 UART: [state] CFI Enabled
615,204 UART: [state] LifecycleState = Unprovisioned
617,080 UART: [state] DebugLocked = No
618,461 UART: [state] WD Timer not started. Device not locked for debugging
621,775 UART: [kat] SHA2-256
800,939 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,517 UART: [kat] ++
812,961 UART: [kat] sha1
823,903 UART: [kat] SHA2-256
826,913 UART: [kat] SHA2-384
832,692 UART: [kat] SHA2-512-ACC
835,629 UART: [kat] ECC-384
3,276,384 UART: [kat] HMAC-384Kdf
3,288,619 UART: [kat] LMS
3,818,079 UART: [kat] --
3,823,817 UART: [cold-reset] ++
3,825,474 UART: [fht] FHT @ 0x50003400
3,835,598 UART: [idev] ++
3,836,162 UART: [idev] CDI.KEYID = 6
3,837,077 UART: [idev] SUBJECT.KEYID = 7
3,838,326 UART: [idev] UDS.KEYID = 0
3,839,250 ready_for_fw is high
3,839,440 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,853,936 UART: [idev] Erasing UDS.KEYID = 0
6,308,753 UART: [idev] Sha1 KeyId Algorithm
6,331,946 UART: [idev] --
6,336,641 UART: [ldev] ++
6,337,210 UART: [ldev] CDI.KEYID = 6
6,338,176 UART: [ldev] SUBJECT.KEYID = 5
6,339,337 UART: [ldev] AUTHORITY.KEYID = 7
6,340,564 UART: [ldev] FE.KEYID = 1
6,351,337 UART: [ldev] Erasing FE.KEYID = 1
8,825,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,137 UART: [ldev] --
10,615,406 UART: [fwproc] Wait for Commands...
10,617,184 UART: [fwproc] Recv command 0x46574c44
10,619,285 UART: [fwproc] Recv'd Img size: 7036 bytes
12,709,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,784,451 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,787,478 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,795,529 >>> mbox cmd response: success
12,799,807 UART: [afmc] ++
12,800,397 UART: [afmc] CDI.KEYID = 6
12,801,299 UART: [afmc] SUBJECT.KEYID = 7
12,802,463 UART: [afmc] AUTHORITY.KEYID = 5
15,298,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,019,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,021,281 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,037,208 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,053,116 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,068,924 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,091,171 UART: [afmc] --
17,094,559 UART: [cold-reset] --
17,098,314 UART: [state] Locking Datavault
17,104,166 UART: [state] Locking PCR0, PCR1 and PCR31
17,105,811 UART: [state] Locking ICCM
17,108,102 UART: [exit] Launching FMC @ 0x40000000
17,116,550 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,121,925 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,702,796 ready_for_fw is high
3,703,441 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,568,630 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
3,437,111 ready_for_fw is high
3,437,705 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,398,421 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,762,475 ready_for_fw is high
3,763,049 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,650,580 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,325 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,047 UART: [kat] SHA2-256
881,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,093 UART: [kat] ++
886,245 UART: [kat] sha1
890,543 UART: [kat] SHA2-256
892,481 UART: [kat] SHA2-384
895,328 UART: [kat] SHA2-512-ACC
897,229 UART: [kat] ECC-384
902,902 UART: [kat] HMAC-384Kdf
907,486 UART: [kat] LMS
1,475,682 UART: [kat] --
1,476,557 UART: [cold-reset] ++
1,477,031 UART: [fht] Storing FHT @ 0x50003400
1,479,856 UART: [idev] ++
1,480,024 UART: [idev] CDI.KEYID = 6
1,480,384 UART: [idev] SUBJECT.KEYID = 7
1,480,808 UART: [idev] UDS.KEYID = 0
1,481,153 ready_for_fw is high
1,481,153 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,488,690 UART: [idev] Erasing UDS.KEYID = 0
1,505,158 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,840 UART: [idev] --
1,514,913 UART: [ldev] ++
1,515,081 UART: [ldev] CDI.KEYID = 6
1,515,444 UART: [ldev] SUBJECT.KEYID = 5
1,515,870 UART: [ldev] AUTHORITY.KEYID = 7
1,516,333 UART: [ldev] FE.KEYID = 1
1,521,373 UART: [ldev] Erasing FE.KEYID = 1
1,547,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,568 UART: [ldev] --
1,586,049 UART: [fwproc] Waiting for Commands...
1,586,806 UART: [fwproc] Received command 0x46574c44
1,587,597 UART: [fwproc] Received Image of size 7036 bytes
1,655,646 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,682,452 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,683,616 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,686,663 >>> mbox cmd response: success
1,687,885 UART: [afmc] ++
1,688,053 UART: [afmc] CDI.KEYID = 6
1,688,415 UART: [afmc] SUBJECT.KEYID = 7
1,688,840 UART: [afmc] AUTHORITY.KEYID = 5
1,724,274 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,740,950 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,741,730 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,747,451 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,753,346 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,759,058 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,766,991 UART: [afmc] --
1,767,885 UART: [cold-reset] --
1,768,609 UART: [state] Locking Datavault
1,769,852 UART: [state] Locking PCR0, PCR1 and PCR31
1,770,456 UART: [state] Locking ICCM
1,771,092 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,776,387 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,778,270 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,741 ready_for_fw is high
1,361,741 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,535,627 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,366 UART: [kat] SHA2-256
882,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,412 UART: [kat] ++
886,564 UART: [kat] sha1
891,000 UART: [kat] SHA2-256
892,938 UART: [kat] SHA2-384
895,563 UART: [kat] SHA2-512-ACC
897,464 UART: [kat] ECC-384
903,067 UART: [kat] HMAC-384Kdf
907,815 UART: [kat] LMS
1,476,011 UART: [kat] --
1,476,792 UART: [cold-reset] ++
1,477,256 UART: [fht] Storing FHT @ 0x50003400
1,479,927 UART: [idev] ++
1,480,095 UART: [idev] CDI.KEYID = 6
1,480,455 UART: [idev] SUBJECT.KEYID = 7
1,480,879 UART: [idev] UDS.KEYID = 0
1,481,224 ready_for_fw is high
1,481,224 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,488,839 UART: [idev] Erasing UDS.KEYID = 0
1,505,433 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,995 UART: [idev] --
1,515,102 UART: [ldev] ++
1,515,270 UART: [ldev] CDI.KEYID = 6
1,515,633 UART: [ldev] SUBJECT.KEYID = 5
1,516,059 UART: [ldev] AUTHORITY.KEYID = 7
1,516,522 UART: [ldev] FE.KEYID = 1
1,521,726 UART: [ldev] Erasing FE.KEYID = 1
1,547,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,305 UART: [ldev] --
1,586,642 UART: [fwproc] Waiting for Commands...
1,587,311 UART: [fwproc] Received command 0x46574c44
1,588,102 UART: [fwproc] Received Image of size 7036 bytes
1,655,863 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,683,911 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,685,075 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,688,122 >>> mbox cmd response: success
1,689,292 UART: [afmc] ++
1,689,460 UART: [afmc] CDI.KEYID = 6
1,689,822 UART: [afmc] SUBJECT.KEYID = 7
1,690,247 UART: [afmc] AUTHORITY.KEYID = 5
1,726,137 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,742,275 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,743,055 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,748,776 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,754,671 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,760,383 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,768,468 UART: [afmc] --
1,769,450 UART: [cold-reset] --
1,770,458 UART: [state] Locking Datavault
1,771,671 UART: [state] Locking PCR0, PCR1 and PCR31
1,772,275 UART: [state] Locking ICCM
1,772,705 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,778,000 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,779,883 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,828 ready_for_fw is high
1,362,828 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,536,754 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
893,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,379 UART: [kat] ++
897,531 UART: [kat] sha1
901,691 UART: [kat] SHA2-256
903,631 UART: [kat] SHA2-384
906,314 UART: [kat] SHA2-512-ACC
908,215 UART: [kat] ECC-384
917,888 UART: [kat] HMAC-384Kdf
922,570 UART: [kat] LMS
1,170,898 UART: [kat] --
1,171,527 UART: [cold-reset] ++
1,171,957 UART: [fht] FHT @ 0x50003400
1,174,630 UART: [idev] ++
1,174,798 UART: [idev] CDI.KEYID = 6
1,175,158 UART: [idev] SUBJECT.KEYID = 7
1,175,582 UART: [idev] UDS.KEYID = 0
1,175,927 ready_for_fw is high
1,175,927 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,183,952 UART: [idev] Erasing UDS.KEYID = 0
1,201,327 UART: [idev] Sha1 KeyId Algorithm
1,209,921 UART: [idev] --
1,211,001 UART: [ldev] ++
1,211,169 UART: [ldev] CDI.KEYID = 6
1,211,532 UART: [ldev] SUBJECT.KEYID = 5
1,211,958 UART: [ldev] AUTHORITY.KEYID = 7
1,212,421 UART: [ldev] FE.KEYID = 1
1,217,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,641 UART: [ldev] --
1,283,128 UART: [fwproc] Wait for Commands...
1,283,932 UART: [fwproc] Recv command 0x46574c44
1,284,660 UART: [fwproc] Recv'd Img size: 7036 bytes
1,352,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,379,683 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,380,799 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,383,650 >>> mbox cmd response: success
1,384,848 UART: [afmc] ++
1,385,016 UART: [afmc] CDI.KEYID = 6
1,385,378 UART: [afmc] SUBJECT.KEYID = 7
1,385,803 UART: [afmc] AUTHORITY.KEYID = 5
1,421,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,437,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,438,248 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,443,969 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,449,864 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,556 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,463,520 UART: [afmc] --
1,464,402 UART: [cold-reset] --
1,465,466 UART: [state] Locking Datavault
1,466,447 UART: [state] Locking PCR0, PCR1 and PCR31
1,467,051 UART: [state] Locking ICCM
1,467,685 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,472,980 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,863 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,031 ready_for_fw is high
1,060,031 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,234,521 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
893,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,588 UART: [kat] ++
897,740 UART: [kat] sha1
902,026 UART: [kat] SHA2-256
903,966 UART: [kat] SHA2-384
906,907 UART: [kat] SHA2-512-ACC
908,808 UART: [kat] ECC-384
918,215 UART: [kat] HMAC-384Kdf
922,779 UART: [kat] LMS
1,171,107 UART: [kat] --
1,172,060 UART: [cold-reset] ++
1,172,636 UART: [fht] FHT @ 0x50003400
1,175,295 UART: [idev] ++
1,175,463 UART: [idev] CDI.KEYID = 6
1,175,823 UART: [idev] SUBJECT.KEYID = 7
1,176,247 UART: [idev] UDS.KEYID = 0
1,176,592 ready_for_fw is high
1,176,592 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,184,335 UART: [idev] Erasing UDS.KEYID = 0
1,201,450 UART: [idev] Sha1 KeyId Algorithm
1,209,866 UART: [idev] --
1,210,898 UART: [ldev] ++
1,211,066 UART: [ldev] CDI.KEYID = 6
1,211,429 UART: [ldev] SUBJECT.KEYID = 5
1,211,855 UART: [ldev] AUTHORITY.KEYID = 7
1,212,318 UART: [ldev] FE.KEYID = 1
1,217,450 UART: [ldev] Erasing FE.KEYID = 1
1,244,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,564 UART: [ldev] --
1,283,827 UART: [fwproc] Wait for Commands...
1,284,479 UART: [fwproc] Recv command 0x46574c44
1,285,207 UART: [fwproc] Recv'd Img size: 7036 bytes
1,352,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,379,786 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,380,902 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,383,805 >>> mbox cmd response: success
1,385,041 UART: [afmc] ++
1,385,209 UART: [afmc] CDI.KEYID = 6
1,385,571 UART: [afmc] SUBJECT.KEYID = 7
1,385,996 UART: [afmc] AUTHORITY.KEYID = 5
1,421,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,437,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,438,501 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,444,222 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,450,117 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,809 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,463,757 UART: [afmc] --
1,464,713 UART: [cold-reset] --
1,465,417 UART: [state] Locking Datavault
1,466,548 UART: [state] Locking PCR0, PCR1 and PCR31
1,467,152 UART: [state] Locking ICCM
1,467,750 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,473,045 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,928 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,728 ready_for_fw is high
1,060,728 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,236,750 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,674 UART: [state] LifecycleState = Unprovisioned
85,329 UART: [state] DebugLocked = No
85,981 UART: [state] WD Timer not started. Device not locked for debugging
87,252 UART: [kat] SHA2-256
890,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,931 UART: [kat] ++
895,083 UART: [kat] sha1
899,251 UART: [kat] SHA2-256
901,191 UART: [kat] SHA2-384
903,952 UART: [kat] SHA2-512-ACC
905,853 UART: [kat] ECC-384
915,966 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,303 UART: [fht] FHT @ 0x50003400
1,172,917 UART: [idev] ++
1,173,085 UART: [idev] CDI.KEYID = 6
1,173,446 UART: [idev] SUBJECT.KEYID = 7
1,173,871 UART: [idev] UDS.KEYID = 0
1,174,217 ready_for_fw is high
1,174,217 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,181,663 UART: [idev] Erasing UDS.KEYID = 0
1,198,135 UART: [idev] Sha1 KeyId Algorithm
1,206,791 UART: [idev] --
1,207,900 UART: [ldev] ++
1,208,068 UART: [ldev] CDI.KEYID = 6
1,208,432 UART: [ldev] SUBJECT.KEYID = 5
1,208,859 UART: [ldev] AUTHORITY.KEYID = 7
1,209,322 UART: [ldev] FE.KEYID = 1
1,214,448 UART: [ldev] Erasing FE.KEYID = 1
1,240,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,712 UART: [ldev] --
1,280,082 UART: [fwproc] Wait for Commands...
1,280,709 UART: [fwproc] Recv command 0x46574c44
1,281,442 UART: [fwproc] Recv'd Img size: 7036 bytes
1,348,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,375,079 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,376,200 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,379,198 >>> mbox cmd response: success
1,380,429 UART: [afmc] ++
1,380,597 UART: [afmc] CDI.KEYID = 6
1,380,960 UART: [afmc] SUBJECT.KEYID = 7
1,381,386 UART: [afmc] AUTHORITY.KEYID = 5
1,416,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,433,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,433,837 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,439,559 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,445,452 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,451,144 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,458,993 UART: [afmc] --
1,460,063 UART: [cold-reset] --
1,461,015 UART: [state] Locking Datavault
1,462,104 UART: [state] Locking PCR0, PCR1 and PCR31
1,462,708 UART: [state] Locking ICCM
1,463,186 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,468,481 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,470,364 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,594 ready_for_fw is high
1,056,594 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,230,506 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76443751b8764056676951f3f48758b4f34d43b8e1611b6d5dd2b9e2c4f6b34f63e575250e544bf1ff2633cfb217318e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,386 UART: [kat] ++
895,538 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,169,862 UART: [cold-reset] ++
1,170,428 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,174,294 ready_for_fw is high
1,174,294 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,686 UART: [idev] Sha1 KeyId Algorithm
1,208,540 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,216,513 UART: [ldev] Erasing FE.KEYID = 1
1,243,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,381 UART: [ldev] --
1,282,845 UART: [fwproc] Wait for Commands...
1,283,650 UART: [fwproc] Recv command 0x46574c44
1,284,383 UART: [fwproc] Recv'd Img size: 7036 bytes
1,351,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,378,546 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,379,667 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,382,685 >>> mbox cmd response: success
1,383,704 UART: [afmc] ++
1,383,872 UART: [afmc] CDI.KEYID = 6
1,384,235 UART: [afmc] SUBJECT.KEYID = 7
1,384,661 UART: [afmc] AUTHORITY.KEYID = 5
1,419,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,436,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,437,448 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,443,170 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,449,063 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,454,755 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,462,748 UART: [afmc] --
1,463,876 UART: [cold-reset] --
1,464,912 UART: [state] Locking Datavault
1,466,217 UART: [state] Locking PCR0, PCR1 and PCR31
1,466,821 UART: [state] Locking ICCM
1,467,359 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,472,654 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,537 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0cad5833306f0e4496071f4111ca2d5c1ca13ee51e38cc770ef18933d8768376be35b96be8b5126b127958374b499ff9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,751 ready_for_fw is high
1,056,751 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,233,185 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s